diff mbox series

[v13,13/17] acpi/nfit, libnvdimm/security: add Intel DSM 1.8 master passphrase support

Message ID 154455999610.26509.15229596933105420734.stgit@djiang5-desk3.ch.intel.com (mailing list archive)
State Superseded
Headers show
Series Adding security support for nvdimm | expand

Commit Message

Dave Jiang Dec. 11, 2018, 8:26 p.m. UTC
With Intel DSM 1.8 [1] two new security DSMs are introduced. Enable/update
master passphrase and master secure erase. The master passphrase allows
a secure erase to be performed without the user passphrase that is set on
the NVDIMM. The commands of master_update and master_erase are added to
the sysfs knob in order to initiate the DSMs. They are similar in opeartion
mechanism compare to update and erase.

[1]: http://pmem.io/documents/NVDIMM_DSM_Interface-V1.8.pdf

Signed-off-by: Dave Jiang <dave.jiang@intel.com>
---
 drivers/acpi/nfit/core.c   |    2 +
 drivers/acpi/nfit/intel.c  |   61 ++++++++++++++++++++++++++++++++------------
 drivers/nvdimm/dimm_devs.c |   33 +++++++++++++++++++++---
 drivers/nvdimm/nd-core.h   |   10 ++++---
 drivers/nvdimm/security.c  |   41 ++++++++++++++++++++----------
 include/linux/libnvdimm.h  |    9 ++++--
 6 files changed, 115 insertions(+), 41 deletions(-)

Comments

Dan Williams Dec. 11, 2018, 11:30 p.m. UTC | #1
On Tue, Dec 11, 2018 at 12:26 PM Dave Jiang <dave.jiang@intel.com> wrote:
>
> With Intel DSM 1.8 [1] two new security DSMs are introduced. Enable/update
> master passphrase and master secure erase. The master passphrase allows
> a secure erase to be performed without the user passphrase that is set on
> the NVDIMM. The commands of master_update and master_erase are added to
> the sysfs knob in order to initiate the DSMs. They are similar in opeartion
> mechanism compare to update and erase.
>
> [1]: http://pmem.io/documents/NVDIMM_DSM_Interface-V1.8.pdf
>
> Signed-off-by: Dave Jiang <dave.jiang@intel.com>
> ---
>  drivers/acpi/nfit/core.c   |    2 +
>  drivers/acpi/nfit/intel.c  |   61 ++++++++++++++++++++++++++++++++------------
>  drivers/nvdimm/dimm_devs.c |   33 +++++++++++++++++++++---
>  drivers/nvdimm/nd-core.h   |   10 ++++---
>  drivers/nvdimm/security.c  |   41 ++++++++++++++++++++----------
>  include/linux/libnvdimm.h  |    9 ++++--
>  6 files changed, 115 insertions(+), 41 deletions(-)
>
> diff --git a/drivers/acpi/nfit/core.c b/drivers/acpi/nfit/core.c
> index 173517eb35b1..2e92b9d51c38 100644
> --- a/drivers/acpi/nfit/core.c
> +++ b/drivers/acpi/nfit/core.c
> @@ -389,6 +389,8 @@ static u8 nfit_dsm_revid(unsigned family, unsigned func)
>                         [NVDIMM_INTEL_SECURE_ERASE] = 2,
>                         [NVDIMM_INTEL_OVERWRITE] = 2,
>                         [NVDIMM_INTEL_QUERY_OVERWRITE] = 2,
> +                       [NVDIMM_INTEL_SET_MASTER_PASSPHRASE] = 2,
> +                       [NVDIMM_INTEL_MASTER_SECURE_ERASE] = 2,
>                 },
>         };
>         u8 id;
> diff --git a/drivers/acpi/nfit/intel.c b/drivers/acpi/nfit/intel.c
> index 3c3f99dfc32c..09317ea23e72 100644
> --- a/drivers/acpi/nfit/intel.c
> +++ b/drivers/acpi/nfit/intel.c
> @@ -6,7 +6,8 @@
>  #include "intel.h"
>  #include "nfit.h"
>
> -static enum nvdimm_security_state intel_security_state(struct nvdimm *nvdimm)
> +static enum nvdimm_security_state intel_security_state(struct nvdimm *nvdimm,
> +               bool master)

Make this argument an enum and define values like NVDIMM_USER and
NVDIMM_MASTER, that way the code becomes more readable relative to
trying to recall what "true" and "false" mean. E.g.

    nvdimm->sec.ext_state = nvdimm_security_state(nvdimm, NVDIMM_MASTER);

...also makes it easier to grep for all the places that care about the
master passphrase.

>  {
>         struct nfit_mem *nfit_mem = nvdimm_provider_data(nvdimm);
>         struct {
> @@ -34,17 +35,28 @@ static enum nvdimm_security_state intel_security_state(struct nvdimm *nvdimm)
>                 return -EIO;
>
>         /* check and see if security is enabled and locked */
> -       if (nd_cmd.cmd.state & ND_INTEL_SEC_STATE_UNSUPPORTED)
> -               return -ENXIO;
> -       else if (nd_cmd.cmd.state & ND_INTEL_SEC_STATE_ENABLED) {
> -               if (nd_cmd.cmd.state & ND_INTEL_SEC_STATE_LOCKED)
> -                       return NVDIMM_SECURITY_LOCKED;
> -               else if (nd_cmd.cmd.state & ND_INTEL_SEC_STATE_FROZEN ||
> -                               nd_cmd.cmd.state & ND_INTEL_SEC_STATE_PLIMIT)
> -                       return NVDIMM_SECURITY_FROZEN;
> -               else
> -                       return NVDIMM_SECURITY_UNLOCKED;
> +       if (master) {
> +               if (nd_cmd.cmd.extended_state & ND_INTEL_SEC_ESTATE_ENABLED)
> +                       return NVDIMM_SECURITY_MASTER_ENABLED;
> +               else if (nd_cmd.cmd.extended_state &
> +                               ND_INTEL_SEC_ESTATE_PLIMIT)
> +                       return NVDIMM_SECURITY_MASTER_FROZEN;

Do we need these states? If we're already passing in the "master" flag
then we can reuse the state names. NVDIMM_SECURITY_DISABLED and
NVDIMM_SECURITY_FROZEN. Because elsewhere we have code like:

    if (nvdimm->sec.state >= NVDIMM_SECURITY_FROZEN) {

...where its not clear whether NVDIMM_SECURITY_FROZEN and
NVDIMM_SECURITY_OVERWRITE are the concern, or if the MASTER states are
also meant to be covered.


> +       } else {
> +               if (nd_cmd.cmd.state & ND_INTEL_SEC_STATE_UNSUPPORTED)
> +                       return -ENXIO;
> +               else if (nd_cmd.cmd.state & ND_INTEL_SEC_STATE_ENABLED) {
> +                       if (nd_cmd.cmd.state & ND_INTEL_SEC_STATE_LOCKED)
> +                               return NVDIMM_SECURITY_LOCKED;
> +                       else if (nd_cmd.cmd.state & ND_INTEL_SEC_STATE_FROZEN
> +                                       || nd_cmd.cmd.state &
> +                                       ND_INTEL_SEC_STATE_PLIMIT)
> +                               return NVDIMM_SECURITY_FROZEN;
> +                       else
> +                               return NVDIMM_SECURITY_UNLOCKED;
> +               }
>         }
> +
> +       /* this should cover master security disabled as well */
>         return NVDIMM_SECURITY_DISABLED;
>  }
>
> @@ -77,7 +89,8 @@ static int intel_security_freeze(struct nvdimm *nvdimm)
>
>  static int intel_security_change_key(struct nvdimm *nvdimm,
>                 const struct nvdimm_key_data *old_data,
> -               const struct nvdimm_key_data *new_data)
> +               const struct nvdimm_key_data *new_data,
> +               bool master)
>  {
>         struct nfit_mem *nfit_mem = nvdimm_provider_data(nvdimm);
>         struct {
> @@ -85,7 +98,6 @@ static int intel_security_change_key(struct nvdimm *nvdimm,
>                 struct nd_intel_set_passphrase cmd;
>         } nd_cmd = {
>                 .pkg = {
> -                       .nd_command = NVDIMM_INTEL_SET_PASSPHRASE,
>                         .nd_family = NVDIMM_FAMILY_INTEL,
>                         .nd_size_in = ND_INTEL_PASSPHRASE_SIZE * 2,
>                         .nd_size_out = ND_INTEL_STATUS_SIZE,
> @@ -94,7 +106,15 @@ static int intel_security_change_key(struct nvdimm *nvdimm,
>         };
>         int rc;
>
> -       if (!test_bit(NVDIMM_INTEL_SET_PASSPHRASE, &nfit_mem->dsm_mask))
> +       if (master)
> +               nd_cmd.pkg.nd_command = NVDIMM_INTEL_SET_MASTER_PASSPHRASE;
> +       else
> +               nd_cmd.pkg.nd_command = NVDIMM_INTEL_SET_PASSPHRASE;
> +
> +       if (!test_bit(NVDIMM_INTEL_SET_PASSPHRASE, &nfit_mem->dsm_mask) ||
> +                       (master &&
> +                        !test_bit(NVDIMM_INTEL_SET_MASTER_PASSPHRASE,
> +                                &nfit_mem->dsm_mask)))

See below for some potential cleanups...

>                 return -ENOTTY;
>
>         if (old_data)
> @@ -206,7 +226,7 @@ static int intel_security_disable(struct nvdimm *nvdimm,
>  }
>
>  static int intel_security_erase(struct nvdimm *nvdimm,
> -               const struct nvdimm_key_data *key)
> +               const struct nvdimm_key_data *key, bool master)
>  {
>         int rc;
>         struct nfit_mem *nfit_mem = nvdimm_provider_data(nvdimm);
> @@ -219,14 +239,21 @@ static int intel_security_erase(struct nvdimm *nvdimm,
>                         .nd_size_in = ND_INTEL_PASSPHRASE_SIZE,
>                         .nd_size_out = ND_INTEL_STATUS_SIZE,
>                         .nd_fw_size = ND_INTEL_STATUS_SIZE,
> -                       .nd_command = NVDIMM_INTEL_SECURE_ERASE,
>                 },
>                 .cmd = {
>                         .status = 0,
>                 },
>         };
>
> -       if (!test_bit(NVDIMM_INTEL_SECURE_ERASE, &nfit_mem->dsm_mask))
> +       if (master)
> +               nd_cmd.pkg.nd_command = NVDIMM_INTEL_MASTER_SECURE_ERASE;
> +       else
> +               nd_cmd.pkg.nd_command = NVDIMM_INTEL_SECURE_ERASE;

Would be nice to keep to the c99 going. You could do:

    unsigned command = master ? NVDIMM_INTEL_MASTER_SECURE_ERASE :
NVDIMM_INTEL_SECURE_ERASE;

...before starting the struct declaration and then do:

    .nd_command = command,

...in the initialization.

> +
> +       if (!test_bit(NVDIMM_INTEL_SECURE_ERASE, &nfit_mem->dsm_mask) ||
> +                       (master &&
> +                        !test_bit(NVDIMM_INTEL_MASTER_SECURE_ERASE,
> +                                &nfit_mem->dsm_mask)))

Similarly here you could do:

    test_bit(command, &nfit_mem->dsm_mask)

...and not worry about testing "master" again.

>                 return -ENOTTY;
>
>         /* flush all cache before we erase DIMM */
> diff --git a/drivers/nvdimm/dimm_devs.c b/drivers/nvdimm/dimm_devs.c
> index fa42774efb15..8825551aad84 100644
> --- a/drivers/nvdimm/dimm_devs.c
> +++ b/drivers/nvdimm/dimm_devs.c
> @@ -387,6 +387,8 @@ static ssize_t security_show(struct device *dev,
>                 return sprintf(buf, "frozen\n");
>         case NVDIMM_SECURITY_OVERWRITE:
>                 return sprintf(buf, "overwrite\n");
> +       default:
> +               return -ENOTTY;
>         }
>
>         return -ENOTTY;
> @@ -428,7 +430,7 @@ static ssize_t __security_store(struct device *dev, const char *buf, size_t len)
>                 rc = kstrtouint(nkeystr, 0, &newkey);
>                 if (rc < 0)
>                         return rc;
> -               rc = nvdimm_security_update(nvdimm, key, newkey);
> +               rc = nvdimm_security_update(nvdimm, key, newkey, false);
>                 if (rc < 0)
>                         return rc;
>         } else if (sysfs_streq(cmd, "erase")) {
> @@ -437,7 +439,7 @@ static ssize_t __security_store(struct device *dev, const char *buf, size_t len)
>                 rc = kstrtouint(keystr, 0, &key);
>                 if (rc < 0)
>                         return rc;
> -               rc = nvdimm_security_erase(nvdimm, key);
> +               rc = nvdimm_security_erase(nvdimm, key, false);
>                 if (rc < 0)
>                         return rc;
>         } else if (sysfs_streq(cmd, "overwite")) {
> @@ -449,6 +451,27 @@ static ssize_t __security_store(struct device *dev, const char *buf, size_t len)
>                 rc = nvdimm_security_overwrite(nvdimm, key);
>                 if (rc < 0)
>                         return rc;
> +       } else if (sysfs_streq(cmd, "master_update")) {
> +               if (rc != 3)
> +                       return -EINVAL;
> +               rc = kstrtouint(keystr, 0, &key);
> +               if (rc < 0)
> +                       return rc;
> +               rc = kstrtouint(nkeystr, 0, &newkey);
> +               if (rc < 0)
> +                       return rc;
> +               rc = nvdimm_security_update(nvdimm, key, newkey, true);
> +               if (rc < 0)
> +                       return rc;
> +       } else if (sysfs_streq(cmd, "master_erase")) {
> +               if (rc != 2)
> +                       return -EINVAL;
> +               rc = kstrtouint(keystr, 0, &key);
> +               if (rc < 0)
> +                       return rc;
> +               rc = nvdimm_security_erase(nvdimm, key, true);
> +               if (rc < 0)
> +                       return rc;
>         } else
>                 return -EINVAL;
>
> @@ -551,7 +574,9 @@ struct nvdimm *__nvdimm_create(struct nvdimm_bus *nvdimm_bus,
>          * Security state must be initialized before device_add() for
>          * attribute visibility.
>          */
> -       nvdimm->sec.state = nvdimm_security_state(nvdimm);
> +       /* get security state and extended (master) state */
> +       nvdimm->sec.state = nvdimm_security_state(nvdimm, false);
> +       nvdimm->sec.ext_state = nvdimm_security_state(nvdimm, true);
>         nd_device_register(dev);
>
>         return nvdimm;
> @@ -587,7 +612,7 @@ int nvdimm_security_freeze(struct nvdimm *nvdimm)
>         }
>
>         rc = nvdimm->sec.ops->freeze(nvdimm);
> -       nvdimm->sec.state = nvdimm_security_state(nvdimm);
> +       nvdimm->sec.state = nvdimm_security_state(nvdimm, false);
>
>         return rc;
>  }
> diff --git a/drivers/nvdimm/nd-core.h b/drivers/nvdimm/nd-core.h
> index 2c93e2139346..f3e05e32c530 100644
> --- a/drivers/nvdimm/nd-core.h
> +++ b/drivers/nvdimm/nd-core.h
> @@ -46,6 +46,7 @@ struct nvdimm {
>         struct {
>                 const struct nvdimm_security_ops *ops;
>                 enum nvdimm_security_state state;
> +               enum nvdimm_security_state ext_state;
>                 unsigned int overwrite_tmo;
>                 struct kernfs_node *overwrite_state;
>         } sec;
> @@ -53,18 +54,19 @@ struct nvdimm {
>  };
>
>  static inline enum nvdimm_security_state nvdimm_security_state(
> -               struct nvdimm *nvdimm)
> +               struct nvdimm *nvdimm, bool master)
>  {
>         if (!nvdimm->sec.ops)
>                 return -ENXIO;
>
> -       return nvdimm->sec.ops->state(nvdimm);
> +       return nvdimm->sec.ops->state(nvdimm, master);
>  }
>  int nvdimm_security_freeze(struct nvdimm *nvdimm);
>  int nvdimm_security_disable(struct nvdimm *nvdimm, unsigned int keyid);
>  int nvdimm_security_update(struct nvdimm *nvdimm, unsigned int keyid,
> -               unsigned int new_keyid);
> -int nvdimm_security_erase(struct nvdimm *nvdimm, unsigned int keyid);
> +               unsigned int new_keyid, bool master);
> +int nvdimm_security_erase(struct nvdimm *nvdimm, unsigned int keyid,
> +               bool master);
>  static inline int nvdimm_security_check_busy(struct nvdimm *nvdimm)
>  {
>         if (test_bit(NDD_SECURITY_BUSY, &nvdimm->flags))
> diff --git a/drivers/nvdimm/security.c b/drivers/nvdimm/security.c
> index 3603c5fda1cf..a10eaf4e23c3 100644
> --- a/drivers/nvdimm/security.c
> +++ b/drivers/nvdimm/security.c
> @@ -121,7 +121,8 @@ static struct key *nvdimm_key_revalidate(struct nvdimm *nvdimm)
>          * Send the same key to the hardware as new and old key to
>          * verify that the key is good.
>          */
> -       rc = nvdimm->sec.ops->change_key(nvdimm, key_data(key), key_data(key));
> +       rc = nvdimm->sec.ops->change_key(nvdimm, key_data(key),
> +                       key_data(key), false);
>         if (rc < 0) {
>                 nvdimm_put_key(key);
>                 key = NULL;
> @@ -174,7 +175,7 @@ static int __nvdimm_security_unlock(struct nvdimm *nvdimm)
>                         rc == 0 ? "success" : "fail");
>
>         nvdimm_put_key(key);
> -       nvdimm->sec.state = nvdimm_security_state(nvdimm);
> +       nvdimm->sec.state = nvdimm_security_state(nvdimm, false);
>         return rc;
>  }
>
> @@ -224,12 +225,12 @@ int nvdimm_security_disable(struct nvdimm *nvdimm, unsigned int keyid)
>                         rc == 0 ? "success" : "fail");
>
>         nvdimm_put_key(key);
> -       nvdimm->sec.state = nvdimm_security_state(nvdimm);
> +       nvdimm->sec.state = nvdimm_security_state(nvdimm, false);
>         return rc;
>  }
>
>  int nvdimm_security_update(struct nvdimm *nvdimm, unsigned int keyid,
> -               unsigned int new_keyid)
> +               unsigned int new_keyid, bool master)
>  {
>         struct device *dev = &nvdimm->dev;
>         struct nvdimm_bus *nvdimm_bus = walk_to_nvdimm_bus(dev);
> @@ -264,18 +265,23 @@ int nvdimm_security_update(struct nvdimm *nvdimm, unsigned int keyid,
>         }
>
>         rc = nvdimm->sec.ops->change_key(nvdimm, key ? key_data(key) : NULL,
> -                       key_data(newkey));
> -       dev_dbg(dev, "key: %d %d update: %s\n",
> +                       key_data(newkey), master);
> +       dev_dbg(dev, "key: %d %d update%s: %s\n",
>                         key_serial(key), key_serial(newkey),
> +                       master ? "(master)" : "",
>                         rc == 0 ? "success" : "fail");
>
>         nvdimm_put_key(newkey);
>         nvdimm_put_key(key);
> -       nvdimm->sec.state = nvdimm_security_state(nvdimm);
> +       if (master)
> +               nvdimm->sec.ext_state = nvdimm_security_state(nvdimm, true);
> +       else
> +               nvdimm->sec.state = nvdimm_security_state(nvdimm, false);
>         return rc;
>  }
>
> -int nvdimm_security_erase(struct nvdimm *nvdimm, unsigned int keyid)
> +int nvdimm_security_erase(struct nvdimm *nvdimm, unsigned int keyid,
> +               bool master)
>  {
>         struct device *dev = &nvdimm->dev;
>         struct nvdimm_bus *nvdimm_bus = walk_to_nvdimm_bus(dev);
> @@ -306,16 +312,24 @@ int nvdimm_security_erase(struct nvdimm *nvdimm, unsigned int keyid)
>                 return rc;
>         }
>
> +       if (nvdimm->sec.ext_state !=
> +                       NVDIMM_SECURITY_MASTER_ENABLED  && master) {
> +               dev_warn(dev,
> +                       "Attempt to secure erase in wrong master state.\n");
> +               return -EOPNOTSUPP;
> +       }
> +
>         key = nvdimm_lookup_user_key(nvdimm, keyid, NVDIMM_BASE_KEY);
>         if (!key)
>                 return -ENOKEY;
>
> -       rc = nvdimm->sec.ops->erase(nvdimm, key_data(key));
> -       dev_dbg(dev, "key: %d erase: %s\n", key_serial(key),
> +       rc = nvdimm->sec.ops->erase(nvdimm, key_data(key), master);
> +       dev_dbg(dev, "key: %d erase%s: %s\n", key_serial(key),
> +                       master ? "(master)" : "",
>                         rc == 0 ? "success" : "fail");
>
>         nvdimm_put_key(key);
> -       nvdimm->sec.state = nvdimm_security_state(nvdimm);
> +       nvdimm->sec.state = nvdimm_security_state(nvdimm, false);
>         return rc;
>  }
>
> @@ -370,7 +384,7 @@ int nvdimm_security_overwrite(struct nvdimm *nvdimm, unsigned int keyid)
>                         rc == 0 ? "success" : "fail");
>
>         nvdimm_put_key(key);
> -       nvdimm->sec.state = nvdimm_security_state(nvdimm);
> +       nvdimm->sec.state = nvdimm_security_state(nvdimm, false);
>         nvdimm_set_security_busy(nvdimm);
>         return rc;
>  }
> @@ -412,5 +426,6 @@ void nvdimm_security_overwrite_query(struct work_struct *work)
>                 sysfs_notify_dirent(nvdimm->sec.overwrite_state);
>         nvdimm->sec.overwrite_tmo = 0;
>         nvdimm_clear_security_busy(nvdimm);
> -       nvdimm->sec.state = nvdimm_security_state(nvdimm);
> +       nvdimm->sec.state = nvdimm_security_state(nvdimm, false);
> +       nvdimm->sec.ext_state = nvdimm_security_state(nvdimm, true);
>  }
> diff --git a/include/linux/libnvdimm.h b/include/linux/libnvdimm.h
> index b728952ccb28..5383a22d6ba0 100644
> --- a/include/linux/libnvdimm.h
> +++ b/include/linux/libnvdimm.h
> @@ -163,6 +163,8 @@ enum nvdimm_security_state {
>         NVDIMM_SECURITY_LOCKED,
>         NVDIMM_SECURITY_FROZEN,
>         NVDIMM_SECURITY_OVERWRITE,
> +       NVDIMM_SECURITY_MASTER_ENABLED,
> +       NVDIMM_SECURITY_MASTER_FROZEN,

As per above I think we can get by without these.

>  };
>
>  #define NVDIMM_PASSPHRASE_LEN          32
> @@ -173,17 +175,18 @@ struct nvdimm_key_data {
>  };
>
>  struct nvdimm_security_ops {
> -       enum nvdimm_security_state (*state)(struct nvdimm *nvdimm);
> +       enum nvdimm_security_state (*state)(struct nvdimm *nvdimm,
> +                       bool master);
>         int (*freeze)(struct nvdimm *nvdimm);
>         int (*change_key)(struct nvdimm *nvdimm,
>                         const struct nvdimm_key_data *old_data,
> -                       const struct nvdimm_key_data *new_data);
> +                       const struct nvdimm_key_data *new_data, bool master);
>         int (*unlock)(struct nvdimm *nvdimm,
>                         const struct nvdimm_key_data *key_data);
>         int (*disable)(struct nvdimm *nvdimm,
>                         const struct nvdimm_key_data *key_data);
>         int (*erase)(struct nvdimm *nvdimm,
> -                       const struct nvdimm_key_data *key_data);
> +                       const struct nvdimm_key_data *key_data, bool master);
>         int (*overwrite)(struct nvdimm *nvdimm,
>                         const struct nvdimm_key_data *key_data);
>         int (*query_overwrite)(struct nvdimm *nvdimm);
>
diff mbox series

Patch

diff --git a/drivers/acpi/nfit/core.c b/drivers/acpi/nfit/core.c
index 173517eb35b1..2e92b9d51c38 100644
--- a/drivers/acpi/nfit/core.c
+++ b/drivers/acpi/nfit/core.c
@@ -389,6 +389,8 @@  static u8 nfit_dsm_revid(unsigned family, unsigned func)
 			[NVDIMM_INTEL_SECURE_ERASE] = 2,
 			[NVDIMM_INTEL_OVERWRITE] = 2,
 			[NVDIMM_INTEL_QUERY_OVERWRITE] = 2,
+			[NVDIMM_INTEL_SET_MASTER_PASSPHRASE] = 2,
+			[NVDIMM_INTEL_MASTER_SECURE_ERASE] = 2,
 		},
 	};
 	u8 id;
diff --git a/drivers/acpi/nfit/intel.c b/drivers/acpi/nfit/intel.c
index 3c3f99dfc32c..09317ea23e72 100644
--- a/drivers/acpi/nfit/intel.c
+++ b/drivers/acpi/nfit/intel.c
@@ -6,7 +6,8 @@ 
 #include "intel.h"
 #include "nfit.h"
 
-static enum nvdimm_security_state intel_security_state(struct nvdimm *nvdimm)
+static enum nvdimm_security_state intel_security_state(struct nvdimm *nvdimm,
+		bool master)
 {
 	struct nfit_mem *nfit_mem = nvdimm_provider_data(nvdimm);
 	struct {
@@ -34,17 +35,28 @@  static enum nvdimm_security_state intel_security_state(struct nvdimm *nvdimm)
 		return -EIO;
 
 	/* check and see if security is enabled and locked */
-	if (nd_cmd.cmd.state & ND_INTEL_SEC_STATE_UNSUPPORTED)
-		return -ENXIO;
-	else if (nd_cmd.cmd.state & ND_INTEL_SEC_STATE_ENABLED) {
-		if (nd_cmd.cmd.state & ND_INTEL_SEC_STATE_LOCKED)
-			return NVDIMM_SECURITY_LOCKED;
-		else if (nd_cmd.cmd.state & ND_INTEL_SEC_STATE_FROZEN ||
-				nd_cmd.cmd.state & ND_INTEL_SEC_STATE_PLIMIT)
-			return NVDIMM_SECURITY_FROZEN;
-		else
-			return NVDIMM_SECURITY_UNLOCKED;
+	if (master) {
+		if (nd_cmd.cmd.extended_state & ND_INTEL_SEC_ESTATE_ENABLED)
+			return NVDIMM_SECURITY_MASTER_ENABLED;
+		else if (nd_cmd.cmd.extended_state &
+				ND_INTEL_SEC_ESTATE_PLIMIT)
+			return NVDIMM_SECURITY_MASTER_FROZEN;
+	} else {
+		if (nd_cmd.cmd.state & ND_INTEL_SEC_STATE_UNSUPPORTED)
+			return -ENXIO;
+		else if (nd_cmd.cmd.state & ND_INTEL_SEC_STATE_ENABLED) {
+			if (nd_cmd.cmd.state & ND_INTEL_SEC_STATE_LOCKED)
+				return NVDIMM_SECURITY_LOCKED;
+			else if (nd_cmd.cmd.state & ND_INTEL_SEC_STATE_FROZEN
+					|| nd_cmd.cmd.state &
+					ND_INTEL_SEC_STATE_PLIMIT)
+				return NVDIMM_SECURITY_FROZEN;
+			else
+				return NVDIMM_SECURITY_UNLOCKED;
+		}
 	}
+
+	/* this should cover master security disabled as well */
 	return NVDIMM_SECURITY_DISABLED;
 }
 
@@ -77,7 +89,8 @@  static int intel_security_freeze(struct nvdimm *nvdimm)
 
 static int intel_security_change_key(struct nvdimm *nvdimm,
 		const struct nvdimm_key_data *old_data,
-		const struct nvdimm_key_data *new_data)
+		const struct nvdimm_key_data *new_data,
+		bool master)
 {
 	struct nfit_mem *nfit_mem = nvdimm_provider_data(nvdimm);
 	struct {
@@ -85,7 +98,6 @@  static int intel_security_change_key(struct nvdimm *nvdimm,
 		struct nd_intel_set_passphrase cmd;
 	} nd_cmd = {
 		.pkg = {
-			.nd_command = NVDIMM_INTEL_SET_PASSPHRASE,
 			.nd_family = NVDIMM_FAMILY_INTEL,
 			.nd_size_in = ND_INTEL_PASSPHRASE_SIZE * 2,
 			.nd_size_out = ND_INTEL_STATUS_SIZE,
@@ -94,7 +106,15 @@  static int intel_security_change_key(struct nvdimm *nvdimm,
 	};
 	int rc;
 
-	if (!test_bit(NVDIMM_INTEL_SET_PASSPHRASE, &nfit_mem->dsm_mask))
+	if (master)
+		nd_cmd.pkg.nd_command = NVDIMM_INTEL_SET_MASTER_PASSPHRASE;
+	else
+		nd_cmd.pkg.nd_command = NVDIMM_INTEL_SET_PASSPHRASE;
+
+	if (!test_bit(NVDIMM_INTEL_SET_PASSPHRASE, &nfit_mem->dsm_mask) ||
+			(master &&
+			 !test_bit(NVDIMM_INTEL_SET_MASTER_PASSPHRASE,
+				 &nfit_mem->dsm_mask)))
 		return -ENOTTY;
 
 	if (old_data)
@@ -206,7 +226,7 @@  static int intel_security_disable(struct nvdimm *nvdimm,
 }
 
 static int intel_security_erase(struct nvdimm *nvdimm,
-		const struct nvdimm_key_data *key)
+		const struct nvdimm_key_data *key, bool master)
 {
 	int rc;
 	struct nfit_mem *nfit_mem = nvdimm_provider_data(nvdimm);
@@ -219,14 +239,21 @@  static int intel_security_erase(struct nvdimm *nvdimm,
 			.nd_size_in = ND_INTEL_PASSPHRASE_SIZE,
 			.nd_size_out = ND_INTEL_STATUS_SIZE,
 			.nd_fw_size = ND_INTEL_STATUS_SIZE,
-			.nd_command = NVDIMM_INTEL_SECURE_ERASE,
 		},
 		.cmd = {
 			.status = 0,
 		},
 	};
 
-	if (!test_bit(NVDIMM_INTEL_SECURE_ERASE, &nfit_mem->dsm_mask))
+	if (master)
+		nd_cmd.pkg.nd_command = NVDIMM_INTEL_MASTER_SECURE_ERASE;
+	else
+		nd_cmd.pkg.nd_command = NVDIMM_INTEL_SECURE_ERASE;
+
+	if (!test_bit(NVDIMM_INTEL_SECURE_ERASE, &nfit_mem->dsm_mask) ||
+			(master &&
+			 !test_bit(NVDIMM_INTEL_MASTER_SECURE_ERASE,
+				 &nfit_mem->dsm_mask)))
 		return -ENOTTY;
 
 	/* flush all cache before we erase DIMM */
diff --git a/drivers/nvdimm/dimm_devs.c b/drivers/nvdimm/dimm_devs.c
index fa42774efb15..8825551aad84 100644
--- a/drivers/nvdimm/dimm_devs.c
+++ b/drivers/nvdimm/dimm_devs.c
@@ -387,6 +387,8 @@  static ssize_t security_show(struct device *dev,
 		return sprintf(buf, "frozen\n");
 	case NVDIMM_SECURITY_OVERWRITE:
 		return sprintf(buf, "overwrite\n");
+	default:
+		return -ENOTTY;
 	}
 
 	return -ENOTTY;
@@ -428,7 +430,7 @@  static ssize_t __security_store(struct device *dev, const char *buf, size_t len)
 		rc = kstrtouint(nkeystr, 0, &newkey);
 		if (rc < 0)
 			return rc;
-		rc = nvdimm_security_update(nvdimm, key, newkey);
+		rc = nvdimm_security_update(nvdimm, key, newkey, false);
 		if (rc < 0)
 			return rc;
 	} else if (sysfs_streq(cmd, "erase")) {
@@ -437,7 +439,7 @@  static ssize_t __security_store(struct device *dev, const char *buf, size_t len)
 		rc = kstrtouint(keystr, 0, &key);
 		if (rc < 0)
 			return rc;
-		rc = nvdimm_security_erase(nvdimm, key);
+		rc = nvdimm_security_erase(nvdimm, key, false);
 		if (rc < 0)
 			return rc;
 	} else if (sysfs_streq(cmd, "overwite")) {
@@ -449,6 +451,27 @@  static ssize_t __security_store(struct device *dev, const char *buf, size_t len)
 		rc = nvdimm_security_overwrite(nvdimm, key);
 		if (rc < 0)
 			return rc;
+	} else if (sysfs_streq(cmd, "master_update")) {
+		if (rc != 3)
+			return -EINVAL;
+		rc = kstrtouint(keystr, 0, &key);
+		if (rc < 0)
+			return rc;
+		rc = kstrtouint(nkeystr, 0, &newkey);
+		if (rc < 0)
+			return rc;
+		rc = nvdimm_security_update(nvdimm, key, newkey, true);
+		if (rc < 0)
+			return rc;
+	} else if (sysfs_streq(cmd, "master_erase")) {
+		if (rc != 2)
+			return -EINVAL;
+		rc = kstrtouint(keystr, 0, &key);
+		if (rc < 0)
+			return rc;
+		rc = nvdimm_security_erase(nvdimm, key, true);
+		if (rc < 0)
+			return rc;
 	} else
 		return -EINVAL;
 
@@ -551,7 +574,9 @@  struct nvdimm *__nvdimm_create(struct nvdimm_bus *nvdimm_bus,
 	 * Security state must be initialized before device_add() for
 	 * attribute visibility.
 	 */
-	nvdimm->sec.state = nvdimm_security_state(nvdimm);
+	/* get security state and extended (master) state */
+	nvdimm->sec.state = nvdimm_security_state(nvdimm, false);
+	nvdimm->sec.ext_state = nvdimm_security_state(nvdimm, true);
 	nd_device_register(dev);
 
 	return nvdimm;
@@ -587,7 +612,7 @@  int nvdimm_security_freeze(struct nvdimm *nvdimm)
 	}
 
 	rc = nvdimm->sec.ops->freeze(nvdimm);
-	nvdimm->sec.state = nvdimm_security_state(nvdimm);
+	nvdimm->sec.state = nvdimm_security_state(nvdimm, false);
 
 	return rc;
 }
diff --git a/drivers/nvdimm/nd-core.h b/drivers/nvdimm/nd-core.h
index 2c93e2139346..f3e05e32c530 100644
--- a/drivers/nvdimm/nd-core.h
+++ b/drivers/nvdimm/nd-core.h
@@ -46,6 +46,7 @@  struct nvdimm {
 	struct {
 		const struct nvdimm_security_ops *ops;
 		enum nvdimm_security_state state;
+		enum nvdimm_security_state ext_state;
 		unsigned int overwrite_tmo;
 		struct kernfs_node *overwrite_state;
 	} sec;
@@ -53,18 +54,19 @@  struct nvdimm {
 };
 
 static inline enum nvdimm_security_state nvdimm_security_state(
-		struct nvdimm *nvdimm)
+		struct nvdimm *nvdimm, bool master)
 {
 	if (!nvdimm->sec.ops)
 		return -ENXIO;
 
-	return nvdimm->sec.ops->state(nvdimm);
+	return nvdimm->sec.ops->state(nvdimm, master);
 }
 int nvdimm_security_freeze(struct nvdimm *nvdimm);
 int nvdimm_security_disable(struct nvdimm *nvdimm, unsigned int keyid);
 int nvdimm_security_update(struct nvdimm *nvdimm, unsigned int keyid,
-		unsigned int new_keyid);
-int nvdimm_security_erase(struct nvdimm *nvdimm, unsigned int keyid);
+		unsigned int new_keyid, bool master);
+int nvdimm_security_erase(struct nvdimm *nvdimm, unsigned int keyid,
+		bool master);
 static inline int nvdimm_security_check_busy(struct nvdimm *nvdimm)
 {
 	if (test_bit(NDD_SECURITY_BUSY, &nvdimm->flags))
diff --git a/drivers/nvdimm/security.c b/drivers/nvdimm/security.c
index 3603c5fda1cf..a10eaf4e23c3 100644
--- a/drivers/nvdimm/security.c
+++ b/drivers/nvdimm/security.c
@@ -121,7 +121,8 @@  static struct key *nvdimm_key_revalidate(struct nvdimm *nvdimm)
 	 * Send the same key to the hardware as new and old key to
 	 * verify that the key is good.
 	 */
-	rc = nvdimm->sec.ops->change_key(nvdimm, key_data(key), key_data(key));
+	rc = nvdimm->sec.ops->change_key(nvdimm, key_data(key),
+			key_data(key), false);
 	if (rc < 0) {
 		nvdimm_put_key(key);
 		key = NULL;
@@ -174,7 +175,7 @@  static int __nvdimm_security_unlock(struct nvdimm *nvdimm)
 			rc == 0 ? "success" : "fail");
 
 	nvdimm_put_key(key);
-	nvdimm->sec.state = nvdimm_security_state(nvdimm);
+	nvdimm->sec.state = nvdimm_security_state(nvdimm, false);
 	return rc;
 }
 
@@ -224,12 +225,12 @@  int nvdimm_security_disable(struct nvdimm *nvdimm, unsigned int keyid)
 			rc == 0 ? "success" : "fail");
 
 	nvdimm_put_key(key);
-	nvdimm->sec.state = nvdimm_security_state(nvdimm);
+	nvdimm->sec.state = nvdimm_security_state(nvdimm, false);
 	return rc;
 }
 
 int nvdimm_security_update(struct nvdimm *nvdimm, unsigned int keyid,
-		unsigned int new_keyid)
+		unsigned int new_keyid, bool master)
 {
 	struct device *dev = &nvdimm->dev;
 	struct nvdimm_bus *nvdimm_bus = walk_to_nvdimm_bus(dev);
@@ -264,18 +265,23 @@  int nvdimm_security_update(struct nvdimm *nvdimm, unsigned int keyid,
 	}
 
 	rc = nvdimm->sec.ops->change_key(nvdimm, key ? key_data(key) : NULL,
-			key_data(newkey));
-	dev_dbg(dev, "key: %d %d update: %s\n",
+			key_data(newkey), master);
+	dev_dbg(dev, "key: %d %d update%s: %s\n",
 			key_serial(key), key_serial(newkey),
+			master ? "(master)" : "",
 			rc == 0 ? "success" : "fail");
 
 	nvdimm_put_key(newkey);
 	nvdimm_put_key(key);
-	nvdimm->sec.state = nvdimm_security_state(nvdimm);
+	if (master)
+		nvdimm->sec.ext_state = nvdimm_security_state(nvdimm, true);
+	else
+		nvdimm->sec.state = nvdimm_security_state(nvdimm, false);
 	return rc;
 }
 
-int nvdimm_security_erase(struct nvdimm *nvdimm, unsigned int keyid)
+int nvdimm_security_erase(struct nvdimm *nvdimm, unsigned int keyid,
+		bool master)
 {
 	struct device *dev = &nvdimm->dev;
 	struct nvdimm_bus *nvdimm_bus = walk_to_nvdimm_bus(dev);
@@ -306,16 +312,24 @@  int nvdimm_security_erase(struct nvdimm *nvdimm, unsigned int keyid)
 		return rc;
 	}
 
+	if (nvdimm->sec.ext_state !=
+			NVDIMM_SECURITY_MASTER_ENABLED	&& master) {
+		dev_warn(dev,
+			"Attempt to secure erase in wrong master state.\n");
+		return -EOPNOTSUPP;
+	}
+
 	key = nvdimm_lookup_user_key(nvdimm, keyid, NVDIMM_BASE_KEY);
 	if (!key)
 		return -ENOKEY;
 
-	rc = nvdimm->sec.ops->erase(nvdimm, key_data(key));
-	dev_dbg(dev, "key: %d erase: %s\n", key_serial(key),
+	rc = nvdimm->sec.ops->erase(nvdimm, key_data(key), master);
+	dev_dbg(dev, "key: %d erase%s: %s\n", key_serial(key),
+			master ? "(master)" : "",
 			rc == 0 ? "success" : "fail");
 
 	nvdimm_put_key(key);
-	nvdimm->sec.state = nvdimm_security_state(nvdimm);
+	nvdimm->sec.state = nvdimm_security_state(nvdimm, false);
 	return rc;
 }
 
@@ -370,7 +384,7 @@  int nvdimm_security_overwrite(struct nvdimm *nvdimm, unsigned int keyid)
 			rc == 0 ? "success" : "fail");
 
 	nvdimm_put_key(key);
-	nvdimm->sec.state = nvdimm_security_state(nvdimm);
+	nvdimm->sec.state = nvdimm_security_state(nvdimm, false);
 	nvdimm_set_security_busy(nvdimm);
 	return rc;
 }
@@ -412,5 +426,6 @@  void nvdimm_security_overwrite_query(struct work_struct *work)
 		sysfs_notify_dirent(nvdimm->sec.overwrite_state);
 	nvdimm->sec.overwrite_tmo = 0;
 	nvdimm_clear_security_busy(nvdimm);
-	nvdimm->sec.state = nvdimm_security_state(nvdimm);
+	nvdimm->sec.state = nvdimm_security_state(nvdimm, false);
+	nvdimm->sec.ext_state = nvdimm_security_state(nvdimm, true);
 }
diff --git a/include/linux/libnvdimm.h b/include/linux/libnvdimm.h
index b728952ccb28..5383a22d6ba0 100644
--- a/include/linux/libnvdimm.h
+++ b/include/linux/libnvdimm.h
@@ -163,6 +163,8 @@  enum nvdimm_security_state {
 	NVDIMM_SECURITY_LOCKED,
 	NVDIMM_SECURITY_FROZEN,
 	NVDIMM_SECURITY_OVERWRITE,
+	NVDIMM_SECURITY_MASTER_ENABLED,
+	NVDIMM_SECURITY_MASTER_FROZEN,
 };
 
 #define NVDIMM_PASSPHRASE_LEN		32
@@ -173,17 +175,18 @@  struct nvdimm_key_data {
 };
 
 struct nvdimm_security_ops {
-	enum nvdimm_security_state (*state)(struct nvdimm *nvdimm);
+	enum nvdimm_security_state (*state)(struct nvdimm *nvdimm,
+			bool master);
 	int (*freeze)(struct nvdimm *nvdimm);
 	int (*change_key)(struct nvdimm *nvdimm,
 			const struct nvdimm_key_data *old_data,
-			const struct nvdimm_key_data *new_data);
+			const struct nvdimm_key_data *new_data, bool master);
 	int (*unlock)(struct nvdimm *nvdimm,
 			const struct nvdimm_key_data *key_data);
 	int (*disable)(struct nvdimm *nvdimm,
 			const struct nvdimm_key_data *key_data);
 	int (*erase)(struct nvdimm *nvdimm,
-			const struct nvdimm_key_data *key_data);
+			const struct nvdimm_key_data *key_data, bool master);
 	int (*overwrite)(struct nvdimm *nvdimm,
 			const struct nvdimm_key_data *key_data);
 	int (*query_overwrite)(struct nvdimm *nvdimm);