Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp6787904iob; Wed, 11 May 2022 05:29:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzFI1xoLLib14FQFeLxyBAdJinfvgg5zvhECJzpQUVgQnGKpDC/tF6hdjes35DNTNFXOU1V X-Received: by 2002:a17:907:3e90:b0:6f7:f63:78b6 with SMTP id hs16-20020a1709073e9000b006f70f6378b6mr21206575ejc.3.1652272182606; Wed, 11 May 2022 05:29:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652272182; cv=none; d=google.com; s=arc-20160816; b=wHF4KnBauKoJ+kLcbrxneQ8mUO7bKUI3hzUMIkTCQWUIj8/t7FGhrCWaaTieUN+liD OUTNU5fqWe7v3E+CEnfcOzNzY/d0SFx/vMs28tRTm++0pP+3Jw0Uzi4PW9p5wf2fKIH8 lmCvTXP9Xvxg31OQkjpk7VT9bA97yVmNeMfttwMeGbHCJCrAPMo+KCRXG5lWomWoqAUw erFGm0vnBtdNUTs9uckYsMyFR8FxwJ0FlQ8+gZZ3h1CZr3ORW6535wXP3uEirVl85G/s PTKjTYNkVMKH/uBCUSFIX1MvTz0a7yYJtKoSeeKZqc2PHFpsdOgE+XPmXG6NP5PNa2qj H4vQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=z2oIuze8afD0QzVYyjC6ps773umM6eg3S9uKaq9bdHQ=; b=qU5cSfUysl6eeQZjVF5G5J8BZGdOpkfLY4uDZH+CE36eMFxwO/XVQs71gQF2sclgWX QjN66xFDkfrp6CyVfKYLYuX0FbyXIdV/oSp6IYku5qhU9ih0ez5XMOkOpu9oZVpxsQEf b0HFYVED81LxZ1/WDIDa1Jr53XwqrUFD7gQZvzL1AVYlXpFiCc0772bmYthVhMcMDEEE 8Hddwxq2+4pg7/uXc1GkwkVOjQNCVqCAeVDSWPSq8PfuSfzgl2Z4ikaGDiJkz282s6xY KSDQHS/1TLEbZ76xS41sZUi5NxbVLeuDucE0DtyqRAxfHzZ3wEEJ/ryU7vFOqMo/U2ks fWEQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id nd12-20020a170907628c00b006f3a2a53c3asi2502267ejc.172.2022.05.11.05.29.04; Wed, 11 May 2022 05:29:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229720AbiEKKr1 (ORCPT + 99 others); Wed, 11 May 2022 06:47:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37380 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229940AbiEKKrZ (ORCPT ); Wed, 11 May 2022 06:47:25 -0400 Received: from metis.ext.pengutronix.de (metis.ext.pengutronix.de [IPv6:2001:67c:670:201:290:27ff:fe1d:cc33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AFFFB4BFEC for ; Wed, 11 May 2022 03:47:23 -0700 (PDT) Received: from ptz.office.stw.pengutronix.de ([2a0a:edc0:0:900:1d::77] helo=[127.0.0.1]) by metis.ext.pengutronix.de with esmtp (Exim 4.92) (envelope-from ) id 1nojs0-0005aX-R8; Wed, 11 May 2022 12:47:04 +0200 Message-ID: <3a8c493b-b19c-4490-85b4-22d240bfd06e@pengutronix.de> Date: Wed, 11 May 2022 12:47:02 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.8.0 Subject: Re: [PATCH v9 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys Content-Language: en-US To: Michael Walle Cc: Jarkko Sakkinen , =?UTF-8?Q?Horia_Geant=c4=83?= , Mimi Zohar , Pankaj Gupta , Herbert Xu , "David S. Miller" , James Bottomley , kernel@pengutronix.de, David Howells , James Morris , "Serge E. Hallyn" , Steffen Trumtrar , Jan Luebbe , David Gstir , Eric Biggers , Richard Weinberger , Franck LENORMAND , Sumit Garg , Andreas Rammhold , Tim Harvey , Matthias Schiffer , linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org References: <20220506062553.1068296-1-a.fatoum@pengutronix.de> <49e1738c55c73819ee0e2cac0be74d81@walle.cc> From: Ahmad Fatoum In-Reply-To: <49e1738c55c73819ee0e2cac0be74d81@walle.cc> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-SA-Exim-Connect-IP: 2a0a:edc0:0:900:1d::77 X-SA-Exim-Mail-From: a.fatoum@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-crypto@vger.kernel.org X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hello Michael, On 06.05.22 12:52, Michael Walle wrote: > Am 2022-05-06 08:25, schrieb Ahmad Fatoum: >> Series applies on top of v5.18-rc5. Would be great if this could make it >> into v5.19. >> >> v8 was here: >> https://lore.kernel.org/linux-integrity/09e2552c-7392-e1da-926b-53c7db0b118d@pengutronix.de >> >> Changelog is beneath each individual patch. Compared to v8, only code >> change is checking whether CAAM can support blobbing at init-time as >> apparently some Layerscape SoCs are available in a non-E(ncryption) >> variant that doesn't do AES. Previously, adding trusted keys on such >> SoCs would return an error with a cryptic error message. >> >> >> The Cryptographic Acceleration and Assurance Module (CAAM) is an IP core >> built into many newer i.MX and QorIQ SoCs by NXP. >> >> Its blob mechanism can AES encrypt/decrypt user data using a unique >> never-disclosed device-specific key. >> >> There has been multiple discussions on how to represent this within the kernel: >> >> The Cryptographic Acceleration and Assurance Module (CAAM) is an IP core >> built into many newer i.MX and QorIQ SoCs by NXP. >> >> Its blob mechanism can AES encrypt/decrypt user data using a unique >> never-disclosed device-specific key. There has been multiple >> discussions on how to represent this within the kernel: >> >>  - [RFC] crypto: caam - add red blobifier >>    Steffen implemented[1] a PoC sysfs driver to start a discussion on how to >>    best integrate the blob mechanism. >>    Mimi suggested that it could be used to implement trusted keys. >>    Trusted keys back then were a TPM-only feature. >> >>  - security/keys/secure_key: Adds the secure key support based on CAAM. >>    Udit Agarwal added[2] a new "secure" key type with the CAAM as backend. >>    The key material stays within the kernel only. >>    Mimi and James agreed that this needs a generic interface, not specific >>    to CAAM. Mimi suggested trusted keys. Jan noted that this could serve as >>    basis for TEE-backed keys. >> >>  - [RFC] drivers: crypto: caam: key: Add caam_tk key type >>    Franck added[3] a new "caam_tk" key type based on Udit's work. This time >>    it uses CAAM "black blobs" instead of "red blobs", so key material stays >>    within the CAAM and isn't exposed to kernel in plaintext. >>    James voiced the opinion that there should be just one user-facing generic >>    wrap/unwrap key type with multiple possible handlers. >>    David suggested trusted keys. >> >>  - Introduce TEE based Trusted Keys support >>    Sumit reworked[4] trusted keys to support multiple possible backends with >>    one chosen at boot time and added a new TEE backend along with TPM. >>    This now sits in Jarkko's master branch to be sent out for v5.13 >> >> This patch series builds on top of Sumit's rework to have the CAAM as >> yet another >> trusted key backend. >> >> The CAAM bits are based on Steffen's initial patch from 2015. His work had been >> used in the field for some years now, so I preferred not to deviate >> too much from it. >> >> This series has been tested with dmcrypt[5] on an i.MX6Q/DL and an i.MX8M[6]. >> >> Looking forward to your feedback. > > For the whole series: > > Tested-by: Michael Walle # on ls1028a (non-E and E) Thanks! Did you test checkpatch.pl and make htmldocs/pdfdocs too or should I add the Tested-by just for the first 5 patches? Cheers, Ahmad > > -michael > -- Pengutronix e.K. | | Steuerwalder Str. 21 | http://www.pengutronix.de/ | 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 | Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |