[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <57679146.8030804@gmail.com>
Date: Mon, 20 Jun 2016 09:46:30 +0300
From: Sagi Grimberg <sagigrim@...il.com>
To: Jethro Beekman <kernel@...ekman.nl>, keith.busch@...el.com,
axboe@...com, linux-nvme@...ts.infradead.org,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH 0/3] nvme: Don't add namespaces for locked drives
> Hi all,
>
> If an NVMe drive is locked with ATA Security, most commands sent to the drive
> will fail. This includes commands sent by the kernel upon discovery to probe
> for partitions. The failing happens in such a way that trying to do anything
> with the drive (e.g. sending an unlock command; unloading the nvme module) is
> basically impossible with the high default command timeout.
>
> This patch adds a check to see if the drive is locked, and if it is, its
> namespaces are not initialized. It is expected that userspace will send the
> proper "security send/unlock" command and then reset the controller. Userspace
> tools are available at [1].
>
> This is my first kernel patch so please let me know if you have any feedback.
>
> I intend to also submit a future patch that tracks ATA Security commands sent
> from userspace and remembers the password so it can be submitted to a locked
> drive upon pm_resume. (still WIP)
>
> Jethro Beekman
>
> [1] https://github.com/jethrogb/nvme-ata-security
>
> Jethro Beekman (3):
> nvme: When scanning namespaces, make sure the drive is not locked
> nvme: Add function for NVMe security receive command
> nvme: Check if drive is locked using ATA Security
Hey Jethro,
I think it would make better sense to squash patches 1,3 together and
have patch 2 come before them:
patch 1: nvme: Add function for NVMe security receive command
patch 2: nvme: Check if drive is locked using ATA Security when scanning
namespaces
Powered by blists - more mailing lists