[PATCH v4 0/6] SED OPAL Library
Scott Bauer
scott.bauer at intel.com
Thu Dec 29 13:00:58 PST 2016
Apparently I can't insert in emacs to save my life, here is 1->4:
Changes from v3->v4:
1) Moved back from lib/ to block/
2) Files are hidden behind a CONFIG_ must be explicitly enabled in menuconfig
3) NVMe support is hidden behind a CONFIG_ that depends on the above CONFIG
4) Fixed Issues pointed out by Christoph and Jon in previous v3 review.
4a) Tried to aggregate UAPI/In kernel structures/On-the-wire structures into
seperate headers.
4b) Renamed block/sed.c to block/sed-ioctl.c...
There was discussion around trying to remove the sed to opal inderection.
The code still has some inderection, but it's specifically for doing
copy_from_user before going into the opal core. I want to keep the sed-opal.c
a "Library" where it doesn't have to do any copy_from_user stuff. This way,
when we have in-kernel users they don't have to do gross get_fs(), set_fs()
calls.
On Thu, Dec 29, 2016 at 12:26:49PM -0700, Scott Bauer wrote:
> 5) Removed dependency on the file struct. We also do not add a new entry into the
> block structures. We enter through the drivers block ioctl handler, which will
> test if it's a sed ioctl. If it is, we pass a previously allocated sed_context
> structure, cmd and arg, into the sed-ioctl.c which will dispatch it into the opal
> core.
>
> 6) The NVMe patch changed a bit:
> The sed_context is now per-namespace for two reasons. First The spec says we have
> to send a namespace ID for the security commands, even if TCG spec currently
> ignores them. Second, there is public review for a modification to the spec where
> the namespace ID will be vitally important:
> https://www.trustedcomputinggroup.org/wp-content/uploads/TCG_Storage_Feature_Set_Namespaces_phase_1b_v1_00_r1_19_public-review.pdf
>
> 7) To facilitate the above public review changes, and potentially future changes
> the Opal core now exposes a new method which in-kernel users can call:
> is_opal_supported().
> The method is not exposed to userland, but will be used for drivers who wish to
> see if their controller supports Opal. The function can save the entire disovery0
> payload which the driver can then parse to find out more info.
>
> 8) The NVMe driver now calls the new function above to see if the controller
> supports opal. If it does not we free the structures. The current implementation
> does not save the discovery0 payload. When the public review spec is finalized
> and someone ships devices with multiple namespace multiple LR support they can
> modify the code to save the payload and parse it to figure out what NS/LR mode
> they're going to be operating in.
>
>
> ===============================================================================
> This Patch series implements a large portion of the Opal protocol for
> self encrypting devices. The driver has the capability of storing a
> locking range's password. The password can then be replayed
> during a resume from previous suspend-to-RAM.
>
> The driver also supports logic to bring the device out of a factory
> default-inactive state into a functional Opal state.
>
> The following logic is supported in order to bring the tper into a
> working state:
>
> 1) Taking Ownership of the drive (Setting the Admin CPIN).
> 2) Activating the Locking SP (In Single User Mode or Normal Mode).
> 3) Setting up Locking Ranges (Single User or Normal Mode).
> 4) Adding users to Locking Ranges (Normal Mode Only).
> 5) Locking or Unlocking Locking Ranges (Single User Mode or Normal Mode).
> 6) Reverting the TPer (Restore to factory default).
> 7) Setting LR/User passwords (Single User Mode or Normal Mode).
> 8) Enabling/disabling Shadow MBR.
> 9) Enabling Users in the LockingSP (Normal Mode Only).
> 10) Saving Password for resume from suspend.
> 11) Erase and Secure erasing locking ranges.
>
> Scott Bauer (6):
> Include: Uapi: Add user ABI for Sed/Opal
> block: Add Sed-opal library
> block: add ioctl interface for interfacing with Opal library
> block: Add Opal Files to Makefile & add config option to Kconfig
> nvme: Add Support for Opal: Unlock from S3 & Opal Allocation/Ioctls
> Maintainers: Add maintainer info for SED/Opal library
>
> MAINTAINERS | 11 +
> block/Kconfig | 6 +
> block/Makefile | 1 +
> block/opal_proto.h | 588 ++++++++++
> block/sed-ioctl.c | 164 +++
> block/sed-opal.c | 2392 +++++++++++++++++++++++++++++++++++++++++
> drivers/nvme/host/Kconfig | 7 +
> drivers/nvme/host/core.c | 78 ++
> drivers/nvme/host/nvme.h | 9 +-
> drivers/nvme/host/pci.c | 4 +
> include/linux/sed-opal.h | 59 +
> include/linux/sed.h | 80 ++
> include/uapi/linux/sed-opal.h | 107 ++
> 13 files changed, 3505 insertions(+), 1 deletion(-)
> create mode 100644 block/opal_proto.h
> create mode 100644 block/sed-ioctl.c
> create mode 100644 block/sed-opal.c
> create mode 100644 include/linux/sed-opal.h
> create mode 100644 include/linux/sed.h
> create mode 100644 include/uapi/linux/sed-opal.h
>
>
> _______________________________________________
> Linux-nvme mailing list
> Linux-nvme at lists.infradead.org
> http://lists.infradead.org/mailman/listinfo/linux-nvme
More information about the Linux-nvme
mailing list