#include <linux/uaccess.h>
 #include <uapi/linux/sed-opal.h>
 #include <linux/sed-opal.h>
+#include <linux/sed-opal-key.h>
 #include <linux/string.h>
 #include <linux/kdev_t.h>
 #include <linux/key.h>
        if (ret)
                return ret;
 
-       /* update keyring with new password */
+       /* update keyring and key store with new password */
+       ret = sed_write_key(OPAL_AUTH_KEY,
+                           opal_pw->new_user_pw.opal_key.key,
+                           opal_pw->new_user_pw.opal_key.key_len);
+       if (ret != -EOPNOTSUPP)
+               pr_warn("error updating SED key: %d\n", ret);
+
        ret = update_sed_opal_key(OPAL_AUTH_KEY,
                                  opal_pw->new_user_pw.opal_key.key,
                                  opal_pw->new_user_pw.opal_key.key_len);
 static int __init sed_opal_init(void)
 {
        struct key *kr;
+       char init_sed_key[OPAL_KEY_MAX];
+       int keylen = OPAL_KEY_MAX - 1;
 
        kr = keyring_alloc(".sed_opal",
                           GLOBAL_ROOT_UID, GLOBAL_ROOT_GID, current_cred(),
 
        sed_opal_keyring = kr;
 
-       return 0;
+       if (sed_read_key(OPAL_AUTH_KEY, init_sed_key, &keylen) < 0) {
+               memset(init_sed_key, '\0', sizeof(init_sed_key));
+               keylen = OPAL_KEY_MAX - 1;
+       }
+
+       return update_sed_opal_key(OPAL_AUTH_KEY, init_sed_key, keylen);
 }
 late_initcall(sed_opal_init);