All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH v5 00/18] Introduce security commands for CXL pmem device
@ 2022-11-16 21:17 Dave Jiang
  2022-11-16 21:17 ` [PATCH v5 01/18] cxl/pmem: Introduce nvdimm_security_ops with ->get_flags() operation Dave Jiang
                   ` (18 more replies)
  0 siblings, 19 replies; 28+ messages in thread
From: Dave Jiang @ 2022-11-16 21:17 UTC (permalink / raw)
  To: linux-cxl, nvdimm
  Cc: dan.j.williams, ira.weiny, vishal.l.verma, alison.schofield,
	Jonathan.Cameron, dave, benjamin.cheatham

This series adds the support for "Persistent Memory Data-at-rest Security"
block of command set for the CXL Memory Devices. The enabling is done through
the nvdimm_security_ops as the operations are very similar to the same
operations that the persistent memory devices through NFIT provider support.
This enabling does not include the security pass-through commands nor the
Santize commands.

Under the nvdimm_security_ops, this patch series will enable get_flags(),
freeze(), change_key(), unlock(), disable(), and erase(). The disable() API
does not support disabling of the master passphrase. To maintain established
user ABI through the sysfs attribute "security", the "disable" command is
left untouched and a new "disable_master" command is introduced with a new
disable_master() API call for the nvdimm_security_ops().

This series does not include plumbing to directly handle the security commands
through cxl control util. The enabled security commands will still go through
ndctl tool with this enabling.

The first commit is from Davidlohr [1]. It's submitted separately and can be
dropped. It's here for reference and 0-day testing convenience. The series does
have dependency on the patch.

[1]: https://lore.kernel.org/linux-cxl/166698148737.3132474.5901874516011784201.stgit@dwillia2-xfh.jf.intel.com/

v5:
- Fix unintended passphrase type overwrite for disable op. (Ben)
- Fix passphrase secure erase emulation in cxl_test. (Jonathan)

v4:
- Revert check for master passphrase check in mock secure erase. (Jonathan)
- Add user passphrase check for user password limit in mock secure erase. (Jonathan)
- Add master passphrase check for master password limit in mock secure erase.

v3:
- Change all spec reference to v3. (Jonathan)
- Remove errant commit log in patch 1. (Davidlohr)
- Change return to -EINVAL for cpu_cache_has_invalidate_memregion() error. (Davidlohr)
- Fix mock_freeze_security() to be spec compliant. (Jonathan)
- Change OP_PASSPHRASE_ERASE to OP_PASSPHRASE_SECURE_ERASE. (Jonathan)
- Fix mock_passphrase_erase to be spec compliant. (Jonathan)
- Change password retry limit handling to helper function.
- Add ABI documentation to new sysfs attribs. (Jonathan)
- Have security_lock_show() emit 0 or 1 instead of "locked or "unlocked". (Jonathan)
- Set pdev->dev.groups instead of using device_add_groups(). (Jonathan)
- Add context to NVDIMM_SECURITY_TEST on possible side effects. (Jonathan)

v2:
- Rebased against Davidlohr's memregion flush call
- Remove SECURITY Kconfig and merge with PMEM (Davidlohr & Jonathan)
- Remove inclusion of ndctl.h from security.c (Davidlohr)
- Return errno and leave out return_code for error cases not in spec for mock device (Jonathan)
- Add comment for using NVDIMM_PASSPHRASE_LEN (Jonathan)
- Put 'struct cxl_set_pass' on the stack instead of kmalloc (Jonathan)
- Directly return in mock_set_passphrase() when done. (Jonathan)
- Tie user interface change commenting for passphrase disable. (Jonathan)
- Pass passphrase directly in command and remove copy. (Jonathan)
- Remove state check to enable first time passphrase set in mock device.
- Fix missing ptr assignment in mock secure erase
- Tested against cxl_test with new cxl security test.
---

Dave Jiang (18):
      cxl/pmem: Introduce nvdimm_security_ops with ->get_flags() operation
      tools/testing/cxl: Add "Get Security State" opcode support
      cxl/pmem: Add "Set Passphrase" security command support
      tools/testing/cxl: Add "Set Passphrase" opcode support
      cxl/pmem: Add Disable Passphrase security command support
      tools/testing/cxl: Add "Disable" security opcode support
      cxl/pmem: Add "Freeze Security State" security command support
      tools/testing/cxl: Add "Freeze Security State" security opcode support
      cxl/pmem: Add "Unlock" security command support
      tools/testing/cxl: Add "Unlock" security opcode support
      cxl/pmem: Add "Passphrase Secure Erase" security command support
      tools/testing/cxl: Add "passphrase secure erase" opcode support
      nvdimm/cxl/pmem: Add support for master passphrase disable security command
      cxl/pmem: add id attribute to CXL based nvdimm
      tools/testing/cxl: add mechanism to lock mem device for testing
      cxl/pmem: add provider name to cxl pmem dimm attribute group
      libnvdimm: Introduce CONFIG_NVDIMM_SECURITY_TEST flag
      cxl: add dimm_id support for __nvdimm_create()


 Documentation/ABI/testing/sysfs-bus-nvdimm |  12 +
 drivers/cxl/Makefile                       |   2 +-
 drivers/cxl/core/mbox.c                    |   6 +
 drivers/cxl/cxlmem.h                       |  44 +++
 drivers/cxl/pci.c                          |   4 +
 drivers/cxl/pmem.c                         |  44 ++-
 drivers/cxl/security.c                     | 185 ++++++++++++
 drivers/nvdimm/Kconfig                     |  12 +
 drivers/nvdimm/dimm_devs.c                 |   9 +-
 drivers/nvdimm/security.c                  |  37 ++-
 include/linux/libnvdimm.h                  |   2 +
 include/uapi/linux/cxl_mem.h               |   6 +
 tools/testing/cxl/Kbuild                   |   1 +
 tools/testing/cxl/test/cxl.c               |  58 ++++
 tools/testing/cxl/test/mem.c               | 331 +++++++++++++++++++++
 tools/testing/cxl/test/mem_pdata.h         |  16 +
 tools/testing/nvdimm/Kbuild                |   1 -
 tools/testing/nvdimm/dimm_devs.c           |  30 --
 18 files changed, 758 insertions(+), 42 deletions(-)
 create mode 100644 drivers/cxl/security.c
 create mode 100644 tools/testing/cxl/test/mem_pdata.h
 delete mode 100644 tools/testing/nvdimm/dimm_devs.c

--


^ permalink raw reply	[flat|nested] 28+ messages in thread

end of thread, other threads:[~2022-11-30  1:33 UTC | newest]

Thread overview: 28+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-11-16 21:17 [PATCH v5 00/18] Introduce security commands for CXL pmem device Dave Jiang
2022-11-16 21:17 ` [PATCH v5 01/18] cxl/pmem: Introduce nvdimm_security_ops with ->get_flags() operation Dave Jiang
2022-11-16 21:17 ` [PATCH v5 02/18] tools/testing/cxl: Add "Get Security State" opcode support Dave Jiang
2022-11-16 21:18 ` [PATCH v5 03/18] cxl/pmem: Add "Set Passphrase" security command support Dave Jiang
2022-11-30  0:51   ` Dan Williams
2022-11-16 21:18 ` [PATCH v5 04/18] tools/testing/cxl: Add "Set Passphrase" opcode support Dave Jiang
2022-11-16 21:18 ` [PATCH v5 05/18] cxl/pmem: Add Disable Passphrase security command support Dave Jiang
2022-11-30  0:56   ` Dan Williams
2022-11-16 21:18 ` [PATCH v5 06/18] tools/testing/cxl: Add "Disable" security opcode support Dave Jiang
2022-11-16 21:18 ` [PATCH v5 07/18] cxl/pmem: Add "Freeze Security State" security command support Dave Jiang
2022-11-16 21:18 ` [PATCH v5 08/18] tools/testing/cxl: Add "Freeze Security State" security opcode support Dave Jiang
2022-11-16 21:18 ` [PATCH v5 09/18] cxl/pmem: Add "Unlock" security command support Dave Jiang
2022-11-16 21:18 ` [PATCH v5 10/18] tools/testing/cxl: Add "Unlock" security opcode support Dave Jiang
2022-11-16 21:18 ` [PATCH v5 11/18] cxl/pmem: Add "Passphrase Secure Erase" security command support Dave Jiang
2022-11-16 21:18 ` [PATCH v5 12/18] tools/testing/cxl: Add "passphrase secure erase" opcode support Dave Jiang
2022-11-17 13:57   ` Jonathan Cameron
2022-11-18 22:07     ` [PATCH v6] " Dave Jiang
2022-11-16 21:19 ` [PATCH v5 13/18] nvdimm/cxl/pmem: Add support for master passphrase disable security command Dave Jiang
2022-11-16 21:19 ` [PATCH v5 14/18] cxl/pmem: add id attribute to CXL based nvdimm Dave Jiang
2022-11-30  1:07   ` Dan Williams
2022-11-16 21:19 ` [PATCH v5 15/18] tools/testing/cxl: add mechanism to lock mem device for testing Dave Jiang
2022-11-16 21:19 ` [PATCH v5 16/18] cxl/pmem: add provider name to cxl pmem dimm attribute group Dave Jiang
2022-11-30  1:12   ` Dan Williams
2022-11-16 21:19 ` [PATCH v5 17/18] libnvdimm: Introduce CONFIG_NVDIMM_SECURITY_TEST flag Dave Jiang
2022-11-30  1:26   ` Dan Williams
2022-11-16 21:19 ` [PATCH v5 18/18] cxl: add dimm_id support for __nvdimm_create() Dave Jiang
2022-11-30  1:33   ` Dan Williams
2022-11-18 18:56 ` [PATCH v5 00/18] Introduce security commands for CXL pmem device Davidlohr Bueso

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.