[PATCH v7 2/3 RESEND] block: sed-opal: keystore access for SED Opal keys
Hannes Reinecke
hare at suse.de
Thu Aug 17 15:44:43 AEST 2023
On 7/21/23 23:19, gjoyce at linux.vnet.ibm.com wrote:
> From: Greg Joyce <gjoyce at linux.vnet.ibm.com>
>
> Allow for permanent SED authentication keys by
> reading/writing to the SED Opal non-volatile keystore.
>
> Signed-off-by: Greg Joyce <gjoyce at linux.vnet.ibm.com>
> Reviewed-by: Jonathan Derrick <jonathan.derrick at linux.dev>
> ---
> block/sed-opal.c | 18 ++++++++++++++++--
> 1 file changed, 16 insertions(+), 2 deletions(-)
>
> diff --git a/block/sed-opal.c b/block/sed-opal.c
> index 6d7f25d1711b..fa23a6a60485 100644
> --- a/block/sed-opal.c
> +++ b/block/sed-opal.c
> @@ -18,6 +18,7 @@
> #include <linux/uaccess.h>
> #include <uapi/linux/sed-opal.h>
> #include <linux/sed-opal.h>
> +#include <linux/sed-opal-key.h>
> #include <linux/string.h>
> #include <linux/kdev_t.h>
> #include <linux/key.h>
> @@ -3019,7 +3020,13 @@ static int opal_set_new_pw(struct opal_dev *dev, struct opal_new_pw *opal_pw)
> if (ret)
> return ret;
>
> - /* update keyring with new password */
> + /* update keyring and key store with new password */
> + ret = sed_write_key(OPAL_AUTH_KEY,
> + opal_pw->new_user_pw.opal_key.key,
> + opal_pw->new_user_pw.opal_key.key_len);
> + if (ret != -EOPNOTSUPP)
> + pr_warn("error updating SED key: %d\n", ret);
> +
> ret = update_sed_opal_key(OPAL_AUTH_KEY,
> opal_pw->new_user_pw.opal_key.key,
> opal_pw->new_user_pw.opal_key.key_len);
> @@ -3292,6 +3299,8 @@ EXPORT_SYMBOL_GPL(sed_ioctl);
> static int __init sed_opal_init(void)
> {
> struct key *kr;
> + char init_sed_key[OPAL_KEY_MAX];
> + int keylen = OPAL_KEY_MAX - 1;
>
> kr = keyring_alloc(".sed_opal",
> GLOBAL_ROOT_UID, GLOBAL_ROOT_GID, current_cred(),
> @@ -3304,6 +3313,11 @@ static int __init sed_opal_init(void)
>
> sed_opal_keyring = kr;
>
> - return 0;
> + if (sed_read_key(OPAL_AUTH_KEY, init_sed_key, &keylen) < 0) {
> + memset(init_sed_key, '\0', sizeof(init_sed_key));
> + keylen = OPAL_KEY_MAX - 1;
> + }
> +
> + return update_sed_opal_key(OPAL_AUTH_KEY, init_sed_key, keylen);
> }
> late_initcall(sed_opal_init);
See the previous patch for comments about 'struct key'.
Cheers,
Hannes
--
Dr. Hannes Reinecke Kernel Storage Architect
hare at suse.de +49 911 74053 688
SUSE Software Solutions GmbH, Maxfeldstr. 5, 90409 Nürnberg
HRB 36809 (AG Nürnberg), Geschäftsführer: Ivo Totev, Andrew
Myers, Andrew McDonald, Martje Boudien Moerman
More information about the Linuxppc-dev
mailing list