Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp6958536ybi; Thu, 1 Aug 2019 01:00:59 -0700 (PDT) X-Google-Smtp-Source: APXvYqxaPqqeUTi1rnVXPyBKAGmmTI7NlKFNMlxjcsqabnfDiMbrs139owEUob6/+J3r9jTIDrpc X-Received: by 2002:a17:902:da4:: with SMTP id 33mr113729495plv.209.1564646458969; Thu, 01 Aug 2019 01:00:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564646458; cv=none; d=google.com; s=arc-20160816; b=g0L1OEUt2tVfJXel5SO2zUPi3pR/bqD7ky0eoNZ2WrYhljxGYshZphwHpAWlD8jU9T vwGuGNhAbVWZPYM9OYX8CxqSFPBJ4KT7McbRxNUb5jAY3ch/24o8p4ZMWycBGLZMlyKB m8qEwZl/aAgffnHsd+8FhQO474uQOk6+ha98bbi7Z7p1GSlrQJalM5lXkjwb1hQh0Y6q dm0gxd8oqz5ex7JOMqJMQzQaJwjaK5Z7SHVCv+p5FKxWbgPoWST/PFtJjdkiEH3KCEFL ByK66+YMHfLd8l20AKVoWoY4hf7+mtL3DCHxBA9z+NLh+Lhz0QXgUCXAzQkKRiWWlt7/ ljog== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=7KXLQpVfkqV0NkCYw8UjiB+5rejcfZgxPXsUmGm7V/0=; b=IyizxDrWS+aOjQlfWyvMVD/HKRX4MoSbKCOq3IQZ0leQR96b17YNSJnCkaDBqGx+gQ cCo10tkdPfpDnkEkCGlrkkbkk1T9ZFh9NTI5HGZ+cXKWh9QFdAnDomZh6LZxBjsmmNyO b8BiiG7iBisNwH8oXtm/64tgV9ULWPUTTOQCPS8em0iNRYiEKOHpnWgo04uL1ScsH49j ssSEGM1W9fcxbaqWPc/4mTDVXFaNP2jMVnXwke98IV2Kt58WJCS5vlvM7agzXfu2H39d 8EBkJ5XGzT//K+WQnWeRqpaaofTKFeUr4KHTUrYP22FjfCsqJ0fWDoYRKbkJek+U7Xm6 AJNg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=sSXfHrLb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l186si34186242pge.215.2019.08.01.01.00.43; Thu, 01 Aug 2019 01:00:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=sSXfHrLb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730394AbfHAH6q (ORCPT + 99 others); Thu, 1 Aug 2019 03:58:46 -0400 Received: from mail-lf1-f68.google.com ([209.85.167.68]:42705 "EHLO mail-lf1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729465AbfHAH6p (ORCPT ); Thu, 1 Aug 2019 03:58:45 -0400 Received: by mail-lf1-f68.google.com with SMTP id s19so49507490lfb.9 for ; Thu, 01 Aug 2019 00:58:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=7KXLQpVfkqV0NkCYw8UjiB+5rejcfZgxPXsUmGm7V/0=; b=sSXfHrLbSWYOGs8KaK1hqPPLlLXMXxIBBJstsrMzQsi+667jQGLbwjDjxh3KfCrW0z UaDglwbPR5kBydRmx7Ii16KtUJWRC0S8laKgopb2JG0n6aqt8i3JIG26mCejzCDl/D5Q B8HBpZcM7oyex3pImWnL147wdh9OVEOWakkHgZPqJoW7iAipZyJqptfoDXg5Dwz8rLYN ibL9nInRk4c2y7VpkUWY/YaLrpk7NtZKIkmwoi5GVJymVpIzl3VLb21mY01uTBkNoINk Q9Eme1ddkFKjtiAvIQfyEDFFLuyYbm2t9cMc5NY9ZBFoUjWOeT2pVmazB3NNhsDnkP6l ifXA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=7KXLQpVfkqV0NkCYw8UjiB+5rejcfZgxPXsUmGm7V/0=; b=f0+1zddqDWDzAL6eCEY4mS7Qcm/kcx8r7YpvzU+wpg5C0fsHcKOD57YuMlWUgzc5Rg D+SlVlDd5vdifPAMfTuG29i7Y6F8qyhc3ELc7QOPpV/MjZfcKvi14gk1bIric+r/XyGW dThj7bSdeBRC36FtHQr4khoN8AQkyXpIgICJV6+M7gL9UfNteWs5JUTd9Cfe4u4cfCDT cM5l+Jbl2mhxEIlWJkFes6Y3H8LW4j50XRxaH0ZWvlnhtRaUC9aZLm2lMgbUT1mrs6zG 5KZlDgcGKs3+1jcG2K8+clQpcz5J+ExP9GLcoOP3lU/ZY8cZDfsw5aBYfxAr/N0MkEfg w+QQ== X-Gm-Message-State: APjAAAUvO1ri6jozWVG2BHQacaB34lVc5n8AwFGWJjYrwfe3ngadxlaO 4IAbZRRAMVnEEJb5pvfd4FMIRVZ9he0cyvnJF9vQ+Q== X-Received: by 2002:ac2:5337:: with SMTP id f23mr61398922lfh.15.1564646323439; Thu, 01 Aug 2019 00:58:43 -0700 (PDT) MIME-Version: 1.0 References: <1564489420-677-1-git-send-email-sumit.garg@linaro.org> <19d9be198619e951750dedeb4d0a7f372083b42c.camel@pengutronix.de> In-Reply-To: From: Sumit Garg Date: Thu, 1 Aug 2019 13:28:32 +0530 Message-ID: Subject: Re: [Tee-dev] [RFC v2 0/6] Introduce TEE based Trusted Keys support To: Janne Karhunen Cc: Rouven Czerwinski , "tee-dev @ lists . linaro . org" , Daniel Thompson , Jonathan Corbet , jejb@linux.ibm.com, Ard Biesheuvel , Linux Doc Mailing List , Jarkko Sakkinen , Linux Kernel Mailing List , dhowells@redhat.com, linux-security-module@vger.kernel.org, keyrings@vger.kernel.org, Mimi Zohar , Casey Schaufler , linux-integrity@vger.kernel.org, linux-arm-kernel , "Serge E. Hallyn" Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 1 Aug 2019 at 13:00, Janne Karhunen wrote: > > On Thu, Aug 1, 2019 at 9:50 AM Rouven Czerwinski > wrote: > > > > I'm aware of it - I have implemented a large part of the GP TEE APIs > > > earlier (primarily the crypto functions). Does the TEE you work with > > > actually support GP properly? Can I take a look at the code? > > > > AFAIK Sumit is working with the OP-TEE implementation, which can be > > found on github: https://github.com/op-tee/optee_os > > Thanks, I will take a look. For documentation, refer to: https://optee.readthedocs.io/ > The fundamental problem with these things > is that there are infinite amount of ways how TEEs and ROTs can be > done in terms of the hardware and software. I really doubt there are 2 > implementations in existence that are even remotely compatible in real > life. I agree with you regarding implementation specific nature of TEE but having a standardized client interface does solves the problem. > As such, all things TEE/ROT would logically really belong in the > userland and thanks to the bpfilter folks now the umh logic really > makes that possible ... I think. The key implementation I did was just > an RFC on the concept, what if we start to move the stuff that really > belongs in the userspace to this pseudo-userland. It's not kernel, but > it's not commonly accessible userland either. The shared memory would > also work without any modifications between the umh based TEE/ROT > driver and the userland if needed. > > Anyway, just my .02c. I guess having any new support in the kernel for > new trust sources is good and improvement from the current state. I > can certainly make my stuff work with your setup as well, what ever > people think is the best. Yes your implementation can very well fit under trusted keys abstraction framework without creating a new keytype: "ext-trusted". -Sumit > > > -- > Janne