Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp107208pxu; Thu, 3 Dec 2020 21:21:04 -0800 (PST) X-Google-Smtp-Source: ABdhPJwRDYbhnZXLs63z/0i6+dTC6yDXfpblbZQ+XlKk3iJx1qzy3D3dXKczw1Nn3s49EoauWbkk X-Received: by 2002:a17:906:7b82:: with SMTP id s2mr5467459ejo.435.1607059264510; Thu, 03 Dec 2020 21:21:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607059264; cv=none; d=google.com; s=arc-20160816; b=JETDGSycTe7/uTmpaOonf1GL9aelTH7rABpyGWStTcKx/Eq3Nn/x1H68cGNd3dSVIM eo2Fgk/SkP8zrHwzCYGw67gN6szH/BaMA77NWzognKOC5QDaSEf4JEqsfnd+W+cs91xb 531yCt8ZOkwv5XGU0RN9P15/b/UvOjW8gaIsdov3BB6z6H5gUp38qHvhrYagS5pvlZb2 aJXMsyGCXg7geFbVsQL8FYubE6GRVKp6GD2eBNdxwGEYNcjzejRQXu7TxZMHHm2FgWDr qvUbDzb6O1f9OPu6FKbnDC9zDFS9q7mneXmEvcLuRFfYyzmVJPn1uh+ZI5GTApHv99GH 1bOg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:dkim-signature:date; bh=QeNquX67CoEsRhZjkImxkj5adNs9U2yYMvZolfYaA5Q=; b=OMnOM2qfvtFEN/YKntnVuGyhhitHEFhOp2aCUu3bpY04t8H5OAklhfmiUANFXhNql6 c/+crstqufprSp6xZiH8UxjPmaSJMP0cT3KEREuQKBsCM2+N4hE8yx6D/uh5ItN8P1+n +leFGHSGB+zmGXAzy+x31kx6MO9TtpiXLkD11iIlY7d2D2QnBTwWuqi+pD9CH3diGmu3 waWPbYegfferkifiAJj+vnoBBcHQr6+at8aanC9OoZB06MBc1Iyh/Xo9z7IppKLbEHJK kRLeAffuNf4SsNbyuGk1oJsJPOk+WxwWFtO2F2lSItAUTeX5wsBHesoV+lHwOgMUuiux AuRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=SuRTAIIU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z15si695685eju.429.2020.12.03.21.20.37; Thu, 03 Dec 2020 21:21:04 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=SuRTAIIU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726469AbgLDFRb (ORCPT + 99 others); Fri, 4 Dec 2020 00:17:31 -0500 Received: from mail.kernel.org ([198.145.29.99]:47726 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725300AbgLDFRb (ORCPT ); Fri, 4 Dec 2020 00:17:31 -0500 Date: Fri, 4 Dec 2020 07:16:42 +0200 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1607059009; bh=MytoTQmK0FWpezBeB0/MIP6XIJc0eGXJUDMWPEVo7PA=; h=From:To:Cc:Subject:References:In-Reply-To:From; b=SuRTAIIUpLjq3GUyKoK3lRf2aP+PaQZ5/PHvW+PdJV9RBOUq4jqvEwmrkzGp23Mdc eHU+vvWSnsIKri9zYinMa5cNfTq7O8qk25EG7K9tHw3MNzJSWMhy4BuJvYtAWx0msc A9UW3vaU51sXDgVCz1Ez1SLfJqsEuk2sgqH6EOS58woJacVBUqlsqVrFI5mvfP6a4C YIVa8iBrmGRX2zXFu2DiXu65vG5IUZExc0SCeKhrmoiQfnToOd3WOOdrfCX8/8WDUg d7kzEaS/3nYG3eBiXmopNWZrEKe/FxTZT/2vZ+nfuQdH9kkAwpGMoyk9DRrXHv+Hwz SB1T4+ZpRwx7Q== From: Jarkko Sakkinen To: Sumit Garg Cc: Jarkko Sakkinen , Mimi Zohar , James Bottomley , David Howells , Jens Wiklander , Jonathan Corbet , James Morris , "Serge E. Hallyn" , Casey Schaufler , Janne Karhunen , Daniel Thompson , Markus Wamser , Luke Hinds , "open list:ASYMMETRIC KEYS" , linux-integrity@vger.kernel.org, "open list:SECURITY SUBSYSTEM" , Linux Doc Mailing List , Linux Kernel Mailing List , linux-arm-kernel , op-tee@lists.trustedfirmware.org Subject: Re: [PATCH v8 0/4] Introduce TEE based Trusted Keys support Message-ID: <20201204051642.GA154469@kernel.org> References: <1604419306-26105-1-git-send-email-sumit.garg@linaro.org> <20201105050736.GA702944@kernel.org> <20201106145252.GA10434@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20201106145252.GA10434@kernel.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Nov 06, 2020 at 04:52:52PM +0200, Jarkko Sakkinen wrote: > On Fri, Nov 06, 2020 at 03:02:41PM +0530, Sumit Garg wrote: > > On Thu, 5 Nov 2020 at 10:37, Jarkko Sakkinen wrote: > > > > > > On Tue, Nov 03, 2020 at 09:31:42PM +0530, Sumit Garg wrote: > > > > Add support for TEE based trusted keys where TEE provides the functionality > > > > to seal and unseal trusted keys using hardware unique key. Also, this is > > > > an alternative in case platform doesn't possess a TPM device. > > > > > > > > This patch-set has been tested with OP-TEE based early TA which is already > > > > merged in upstream [1]. > > > > > > Is the new RPI400 computer a platform that can be used for testing > > > patch sets like this? I've been looking for a while something ARM64 > > > based with similar convenience as Intel NUC's, and on the surface > > > this new RPI product looks great for kernel testing purposes. > > > > Here [1] is the list of supported versions of Raspberry Pi in OP-TEE. > > The easiest approach would be to pick up a supported version or else > > do an OP-TEE port for an unsupported one (which should involve minimal > > effort). > > > > [1] https://optee.readthedocs.io/en/latest/building/devices/rpi3.html#what-versions-of-raspberry-pi-will-work > > > > -Sumit > > If porting is doable, then I'll just order RPI 400, and test with QEMU > up until either I port OP-TEE myself or someone else does it. > > For seldom ARM testing, RPI 400 is really convenient device with its > boxed form factor. I'm now a proud owner of Raspberry Pi 400 home computer :-) I also found instructions on how to boot a custom OS from a USB stick: https://www.raspberrypi.org/documentation/hardware/raspberrypi/bootmodes/msd.md Also, my favorite build system BuildRoot has bunch of of the shelf configs: ➜ buildroot-sgx (master) ✔ ls -1 configs | grep raspberry raspberrypi0_defconfig raspberrypi0w_defconfig raspberrypi2_defconfig raspberrypi3_64_defconfig raspberrypi3_defconfig raspberrypi3_qt5we_defconfig raspberrypi4_64_defconfig raspberrypi4_defconfig raspberrypi_defconfig I.e. I'm capable of compiling kernel and user space and boot it up with it. Further, I can select this compilation option: BR2_TARGET_OPTEE_OS: │ │ OP-TEE OS provides the secure world boot image and the trust │ application development kit of the OP-TEE project. OP-TEE OS │ also provides generic trusted application one can embedded │ into its system. │ │ http://github.com/OP-TEE/optee_os Is that what I want? If I put this all together and apply your patches, should the expectation be that I can use trusted keys? Please note that I had a few remarks about your patches (minor but need to be fixed), but this version is already solid enough for testing. /Jarkko