-
Notifications
You must be signed in to change notification settings - Fork 139
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ndctl keys not removed after ndctl sanitize-dimm nmem0 --overwrite #239
Comments
if I only do sanitize-dimm operation, the key can be removed.
|
https://lore.kernel.org/nvdimm/168357518158.2750073.1393407560977941832.stgit@djiang5-mobl3/ Can you please try this fix and see if that does the job? Thanks! |
Hi Dave I tried your patch, after [1]
[2] [3]
[4]
|
Do you have CONFIG_NVDIMM_SECURITY_TEST=y in your kernel config? I talked to Vishal and he said it works for him. The only thing I can think of right now is that you don't have that config on and it doesn't do the extra poll to update the security state when using ndtest and therefore it remains in "locked" state. |
Yes, the CONFIG_NVDIMM_SECURITY_TEST was enabled.
|
So issue 239, where key blob isn't removed after overwrite, is addressed correct? The remaining issue is 244, where overwrite is issued anyways even though there's error of some sort? |
yes, the key was removed finally with your patch.
For #244, maybe we just need to fix the output. :) |
BTW, since my dimm nmem0's security feature was enabled:unlocked and no key now, do you know how to disable the security w/o key. |
Did you call ndctl wait-overwrite nmem0 to wait for overwrite completion first before checking the state? |
Yes, I already called that cmd.
|
Looking at the DSM 1.8 spec, I'm starting to get the feeling that overwrite does not change the security state of being enabled. And that when I implemented overwrite, maybe there was a reason that the key blob was not removed. Sorry it's been a few years since I looked at this stuff. What happens if you reboot? Does it come back as locked? There may be a way to recover via BIOS reset of the DIMM. Otherwise the DIMM may be unrecoverable. :( Do you still have the Intel contact that you guys originally got the DIMM from? |
Also, is this a Crow Pass on Sapphire Rapids or some other DIMM on a different platform? Trying to find some help internally.... |
If your BIOS has the feature:
Otherwise, we may need to investigate other means. |
OK, so it's expected to not remove the key with "overwrite" operation, it was locked after reboot.
I will check with our hw team if they can help me reset the DIMM. |
It's should be Intel Purley, Wolf Pass, I checked the BIOS and no such option. :( |
Can you open up an IPS case so Intel can track it? We can look into how to get that DIMM serviced. |
I've asked our HW team to do that, thanks for the help. |
Thanks! Sorry about the troubles. |
Hello
I found after
sanitize-dimm --overwrite
operation, the ndctl key still existing there and not removed, is it by design, but from the man page, the key should be removed after sanitize-dimm operation.The text was updated successfully, but these errors were encountered: