From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 4CF80203B99C8 for ; Thu, 12 Jul 2018 13:48:28 -0700 (PDT) Subject: [PATCH v4 00/11] Adding security support for nvdimm From: Dave Jiang Date: Thu, 12 Jul 2018 13:48:27 -0700 Message-ID: <153142840572.27297.8070233763007198738.stgit@djiang5-desk3.ch.intel.com> MIME-Version: 1.0 List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: linux-nvdimm-bounces@lists.01.org Sender: "Linux-nvdimm" To: dan.j.williams@intel.com Cc: dhowells@redhat.com, alison.schofield@intel.com, keyrings@vger.kernel.org, keescook@chromium.org, linux-nvdimm@lists.01.org List-ID: The following series implements security support for nvdimm. Mostly adding new security DSM support from the Intel NVDIMM DSM spec v1.7, but also adding generic support libnvdimm for other vendors. The most important security features are unlocking locked nvdimms, and updating/setting security passphrase to nvdimms. Security folks, thanks in advance for taking a look at my key management implementation and making sure that I'm doing something sane. Mainly you'll want to review patches 2, 4, and 5 as most relevant ones that need scrutiny. v4: - flip payload layout for update passphrase to make it easier on userland. v3: - Set x86 wrappers for x86 only bits. (Dan) - Fixed up some verbiage in commit headers. - Put in usage of sysfs_streq() for sysfs inputs. - 0-day build fixes for non-x86 archs. v2: - Move inclusion of intel.h to relevant source files and not in nfit.h. (Dan) - Moved security ring relevant code to dimm_devs.c. (Dan) - Added dimm_id to nfit_mem to avoid recreate per sysfs show call. (Dan) - Added routine to return security_ops based on family supplied. (Dan) - Added nvdimm_key_data struct to wrap raw passphrase string. (Dan) - Allocate firmware package on stack. (Dan) - Added missing frozen state detection when retrieving security state. --- Dave Jiang (11): nfit: add support for Intel DSM 1.7 commands libnvdimm: create keyring to store security keys nfit/libnvdimm: store dimm id as a member to struct nvdimm nfit/libnvdimm: add unlock of nvdimm support for Intel DIMMs nfit/libnvdimm: add set passphrase support for Intel nvdimms nfit/libnvdimm: add disable passphrase support to Intel nvdimm. nfit/libnvdimm: add freeze security support to Intel nvdimm nfit/libnvdimm: add support for issue secure erase DSM to Intel nvdimm nfit_test: add context to dimm_dev for nfit_test nfit_test: add test support for Intel nvdimm security DSMs libnvdimm: add documentation for nvdimm security support Documentation/nvdimm/security | 70 ++++++ drivers/acpi/nfit/Makefile | 1 drivers/acpi/nfit/core.c | 64 +++++- drivers/acpi/nfit/intel.c | 366 +++++++++++++++++++++++++++++++++ drivers/acpi/nfit/intel.h | 83 +++++++ drivers/acpi/nfit/nfit.h | 18 ++ drivers/nvdimm/bus.c | 2 drivers/nvdimm/core.c | 7 + drivers/nvdimm/dimm.c | 7 + drivers/nvdimm/dimm_devs.c | 426 ++++++++++++++++++++++++++++++++++++++ drivers/nvdimm/nd-core.h | 4 drivers/nvdimm/nd.h | 2 include/linux/libnvdimm.h | 41 +++- tools/testing/nvdimm/Kbuild | 1 tools/testing/nvdimm/test/nfit.c | 227 +++++++++++++++++++- 15 files changed, 1285 insertions(+), 34 deletions(-) create mode 100644 Documentation/nvdimm/security create mode 100644 drivers/acpi/nfit/intel.c create mode 100644 drivers/acpi/nfit/intel.h -- _______________________________________________ Linux-nvdimm mailing list Linux-nvdimm@lists.01.org https://lists.01.org/mailman/listinfo/linux-nvdimm