Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp3134871pxu; Tue, 8 Dec 2020 04:38:13 -0800 (PST) X-Google-Smtp-Source: ABdhPJyPvj9uyfKuqf4c0/a8T1BYq9vvu2s5QgL7qkfg9TL4RGT/QTXZO78mNzYOPKKIuwhlAeTZ X-Received: by 2002:a17:906:895:: with SMTP id n21mr22878756eje.52.1607431093442; Tue, 08 Dec 2020 04:38:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607431093; cv=none; d=google.com; s=arc-20160816; b=U4Xyamd4wntvz4CwMoBDDf8jiFeHf25bilDcTqWLrPGr5UeWRrhIJz+jqITiTAaD4K ++zAio3Z8WMDZD5dmArekI5bfCH9PwhsmP9m2BB8N0L6kwsWn7vbb5T00ulO6pjSVBUa cmS0On29dRauqbOkeMn3SOVyz9GWnhNihwicADj5Pq4yVDyopSDMQ0StPVXpTdwMEzKN TFHfn2bFrVuKFVfasqzrIdvmFoUOJODak9Uqxk9iWvhBFLGBV8d1SSrLviKI0KlhYP6U re9KThZvts4u/BSP/7H6/xdvzWu07NjmdZqN6jD+6YrXIJOrcz631X0sK40ykj3VuVwn 2duA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=p3UOlT4T7w2iGiGz4zhACGCaX1lqFN/iswpw5ZnkzrM=; b=GPsO3i+FZg3yMz27x2WR+q6e2b0u7UmltpJjJ9smahf2QYjUbld/G/tk+LAIq7VIwJ Je+sXrNLU3L8D2qQzOJRXV006RYcLMKmf0uk/vjL8cZiDEWaA38aJaFFhGLnibPOFZBV oYun6BzOr43M1TMX+h5j84RkLAZ74ZxfZo5Jq/f6QqL199q009F0qmRpixAh08ZmHZ12 uQ4IN6XpJAMbiY4RDHs2Vh/UXEUsFLEzEHGfPYtQEj3Zr7RvN1Oq8/gckiyVSVwfkB4F OtXTWzcIJ10670qy1vw9R/D71iY6CQqOLPksInK5Ok16mdniFpcDKS9CW8fh4Zt2CRng EiHA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=K1JWSFkT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x101si9997182ede.118.2020.12.08.04.37.50; Tue, 08 Dec 2020 04:38:13 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=K1JWSFkT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729168AbgLHLwr (ORCPT + 99 others); Tue, 8 Dec 2020 06:52:47 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41530 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726738AbgLHLwr (ORCPT ); Tue, 8 Dec 2020 06:52:47 -0500 Received: from mail-lf1-x12f.google.com (mail-lf1-x12f.google.com [IPv6:2a00:1450:4864:20::12f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B6B74C061793 for ; Tue, 8 Dec 2020 03:52:06 -0800 (PST) Received: by mail-lf1-x12f.google.com with SMTP id m19so2754726lfb.1 for ; Tue, 08 Dec 2020 03:52:06 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=p3UOlT4T7w2iGiGz4zhACGCaX1lqFN/iswpw5ZnkzrM=; b=K1JWSFkTy6XixhuEVjqMYIhYotaaw0q/FmwnMPxBVqxc3uSIdIQNYkJEUr0zLiMovp Y0J20mo1QFGat7zPDCW9WuyHBkQfBpKMyRvu00gjUJNlb2GAUa17YVVVPqW0lFr9YbDB Rvn30VX44R4T4AkOP2Y2aXUToxPR5Yu1LUL+aHc3tePoKK7BUMW+UqcdeZwpyHa80wQh PTjCv5cb2fOmKBNmTlci7Qko2+3OLqE0zyjN3v/J0afe3bNXScVJI5FqsyXg+g1lmvBr SQTpwTUMlSpA8Z90euuAlNPXWkOlDB2idVQthpeMFDdcIpQ57mTKAFl8wy6LwcJqGkJu Gdqg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=p3UOlT4T7w2iGiGz4zhACGCaX1lqFN/iswpw5ZnkzrM=; b=ooNPeszeg3Cft24F36kpcqZeGyk5Nxy6ZTNF/bYywPW6lqWITcYcRIvsMEKZQYMLx8 8xvjYzNO4Sj8PHKGeSk+YLSeuhh6oqddbk0tXreo39xjd/C9STHDgzRvZVgOtuvwAwJ4 NfNa+hzwor8UsjqiNM++vgernFdnXAy09Xz4gDqgiuNupJXi5FHyLVhoTWwJIIhz1Mij Bx5nLf0XO8q+SgrLlqJurTaZSPerIfkDc2pG43SDvsp1wcKKCNbQ0lWwjyMaeGxbpPQ8 X1oZ4ihA8Lz84zdRQVIHQqQzm5U4TovqoxVOSHzgpoxFjFRWlNm2bp/ZxNwA2b6AGP1f ahUQ== X-Gm-Message-State: AOAM532Wf3xUPpqvivmaG8ItY5RVa48ph0cC2FEMATHOODfh8bzvfMiU zm1V2QVUFOjToy+tiR/Nur8IqRdRlszglMeKUJsPbQ== X-Received: by 2002:a19:6144:: with SMTP id m4mr10079549lfk.546.1607428324986; Tue, 08 Dec 2020 03:52:04 -0800 (PST) MIME-Version: 1.0 References: <1604419306-26105-1-git-send-email-sumit.garg@linaro.org> <20201105050736.GA702944@kernel.org> <20201106145252.GA10434@kernel.org> <20201204051642.GA154469@kernel.org> In-Reply-To: <20201204051642.GA154469@kernel.org> From: Sumit Garg Date: Tue, 8 Dec 2020 17:21:53 +0530 Message-ID: Subject: Re: [PATCH v8 0/4] Introduce TEE based Trusted Keys support To: Jarkko Sakkinen Cc: Jarkko Sakkinen , Mimi Zohar , James Bottomley , David Howells , Jens Wiklander , Jonathan Corbet , James Morris , "Serge E. Hallyn" , Casey Schaufler , Janne Karhunen , Daniel Thompson , Markus Wamser , Luke Hinds , "open list:ASYMMETRIC KEYS" , linux-integrity@vger.kernel.org, "open list:SECURITY SUBSYSTEM" , Linux Doc Mailing List , Linux Kernel Mailing List , linux-arm-kernel , op-tee@lists.trustedfirmware.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Jarkko, Apologies for the delay in my response as I was busy with other high priority work. On Fri, 4 Dec 2020 at 10:46, Jarkko Sakkinen wrote: > > On Fri, Nov 06, 2020 at 04:52:52PM +0200, Jarkko Sakkinen wrote: > > On Fri, Nov 06, 2020 at 03:02:41PM +0530, Sumit Garg wrote: > > > On Thu, 5 Nov 2020 at 10:37, Jarkko Sakkinen wrot= e: > > > > > > > > On Tue, Nov 03, 2020 at 09:31:42PM +0530, Sumit Garg wrote: > > > > > Add support for TEE based trusted keys where TEE provides the fun= ctionality > > > > > to seal and unseal trusted keys using hardware unique key. Also, = this is > > > > > an alternative in case platform doesn't possess a TPM device. > > > > > > > > > > This patch-set has been tested with OP-TEE based early TA which i= s already > > > > > merged in upstream [1]. > > > > > > > > Is the new RPI400 computer a platform that can be used for testing > > > > patch sets like this? I've been looking for a while something ARM64 > > > > based with similar convenience as Intel NUC's, and on the surface > > > > this new RPI product looks great for kernel testing purposes. > > > > > > Here [1] is the list of supported versions of Raspberry Pi in OP-TEE. > > > The easiest approach would be to pick up a supported version or else > > > do an OP-TEE port for an unsupported one (which should involve minima= l > > > effort). > > > > > > [1] https://optee.readthedocs.io/en/latest/building/devices/rpi3.html= #what-versions-of-raspberry-pi-will-work > > > > > > -Sumit > > > > If porting is doable, then I'll just order RPI 400, and test with QEMU > > up until either I port OP-TEE myself or someone else does it. > > > > For seldom ARM testing, RPI 400 is really convenient device with its > > boxed form factor. > > I'm now a proud owner of Raspberry Pi 400 home computer :-) > > I also found instructions on how to boot a custom OS from a USB stick: > > https://www.raspberrypi.org/documentation/hardware/raspberrypi/bootmodes/= msd.md > > Also, my favorite build system BuildRoot has bunch of of the shelf > configs: > > =E2=9E=9C buildroot-sgx (master) =E2=9C=94 ls -1 configs | grep raspberr= y > raspberrypi0_defconfig > raspberrypi0w_defconfig > raspberrypi2_defconfig > raspberrypi3_64_defconfig > raspberrypi3_defconfig > raspberrypi3_qt5we_defconfig > raspberrypi4_64_defconfig > raspberrypi4_defconfig > raspberrypi_defconfig > > I.e. I'm capable of compiling kernel and user space and boot it up > with it. > > Further, I can select this compilation option: > > BR2_TARGET_OPTEE_OS: = = =E2=94=82 > = = =E2=94=82 > OP-TEE OS provides the secure world boot image and the trust = = =E2=94=82 > application development kit of the OP-TEE project. OP-TEE OS = = =E2=94=82 > also provides generic trusted application one can embedded = = =E2=94=82 > into its system. = = =E2=94=82 > = = =E2=94=82 > http://github.com/OP-TEE/optee_os > > Is that what I want? If I put this all together and apply your patches, > should the expectation be that I can use trusted keys? > Firstly you need to do an OP-TEE port for RPI 400 (refer here [1] for guidelines). And then in order to boot up OP-TEE on RPI 400, you can refer to Raspberry Pi 3 build instructions [2]. [1] https://optee.readthedocs.io/en/latest/architecture/porting_guidelines.= html [2] https://optee.readthedocs.io/en/latest/building/devices/rpi3.html#build= -instructions > Please note that I had a few remarks about your patches (minor but need > to be fixed), but this version is already solid enough for testing. > Sure, I will incorporate your remarks and Randy's documentation comments in the next version. -Sumit > /Jarkko