Re: [PATCH v1 1/2] dt/bindings: add bindings for optional optee rng-uuid property

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Jan 4, 2019 at 1:02 PM Sumit Garg <sumit.garg@xxxxxxxxxx> wrote:
>
> On Fri, 4 Jan 2019 at 16:31, Jens Wiklander <jens.wiklander@xxxxxxxxxx> wrote:
> >
> > On Fri, Jan 4, 2019 at 7:39 AM Sumit Garg <sumit.garg@xxxxxxxxxx> wrote:
> > >
> > > On Thu, 3 Jan 2019 at 22:44, Daniel Thompson <daniel.thompson@xxxxxxxxxx> wrote:
> > > >
> > > > On Fri, Dec 28, 2018 at 02:41:01PM +0530, Sumit Garg wrote:
> > > > > On Thu, 27 Dec 2018 at 19:10, Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx> wrote:
> > > > > >
> > > > > > On Thu, 27 Dec 2018 at 12:08, Sumit Garg <sumit.garg@xxxxxxxxxx> wrote:
> > > > > > >
> > > > > > > Add bindings for OP-TEE based optional hardware random number
> > > > > > > generator identifier property. It could be used on ARM based devices
> > > > > > > where entropy source is not accessible to normal world (linux in this
> > > > > > > case).
> > > > > > >
> > > > > > > Signed-off-by: Sumit Garg <sumit.garg@xxxxxxxxxx>
> > > > > > > ---
> > > > > > >  Documentation/devicetree/bindings/arm/firmware/linaro,optee-tz.txt | 4 ++++
> > > > > > >  1 file changed, 4 insertions(+)
> > > > > > >
> > > > > > > diff --git a/Documentation/devicetree/bindings/arm/firmware/linaro,optee-tz.txt b/Documentation/devicetree/bindings/arm/firmware/linaro,optee-tz.txt
> > > > > > > index d38834c..e3a4c35 100644
> > > > > > > --- a/Documentation/devicetree/bindings/arm/firmware/linaro,optee-tz.txt
> > > > > > > +++ b/Documentation/devicetree/bindings/arm/firmware/linaro,optee-tz.txt
> > > > > > > @@ -20,6 +20,9 @@ the reference implementation maintained by Linaro.
> > > > > > >                     "hvc" : HVC #0, with the register assignments specified
> > > > > > >                            in drivers/tee/optee/optee_smc.h
> > > > > > >
> > > > > > > +- rng-uuid       : Optional OP-TEE based RNG service identifier in case
> > > > > > > +                   hardware entropy source is not accesible to normal world
> > > > > > > +                   (Linux).
> > > > > > >
> > > > > > >
> > > > > > >  Example:
> > > > > > > @@ -27,5 +30,6 @@ Example:
> > > > > > >                 optee {
> > > > > > >                         compatible = "linaro,optee-tz";
> > > > > > >                         method = "smc";
> > > > > > > +                       rng-uuid = "ab7a617c-b8e7-4d8f-8301-d09b61036b64";
> > > > > >
> > > > > > If OP-TEE is going to expose devices in this way, it should be modeled
> > > > > > more like a bus driver, i.e., sub-nodes that represent the devices,
> > > > > > with compatible strings, and perhaps even 'reg' properties for the
> > > > > > UUIDs.
> > > > > >
> > > > >
> > > > > This is something Daniel also suggested during our discussion. But we
> > > > > agreed to discuss in upstream to get more feedback.
> > > > >
> > > > > I think generic TEE should be modelled as a bus driver with devices
> > > > > identified via UUIDs, probably queried from underline implementations
> > > > > like OP-TEE regarding which resident devices (pseudo-TA UUIDs) it
> > > > > supports. Then this list of device UUIDs can be compared against child
> > > > > driver's UUID as part of match callback during driver registration.
> > > > > Also the child driver could maintain list of device UUIDs which it
> > > > > supports.
> > > > >
> > > > > If we go via this approach we may not require device tree entry for
> > > > > corresponding device UUIDs.
> > > >
> > > > That's pretty much aligned with my thinking.
> > > >
> > > > Having said that I had wondered whether all TEEs would be prepared to
> > > > describe the set of available UUIDs since AFAIK UUID enumeration isn't
> > > > part of the GlobalPlatform standards so it is not implemented by GP
> > > > based TEEs (such as OP-TEE).
> > > >
> > > > Is it feasible to extend OP-TEE to enumerate the available UUIDs?
> > > > If nothing else can it provide an (optional) pseudo TA to provide such a
> > > > service? Personally I'd be OK with a kernel TEE bus infrastructure that
> > > > mandated such a service (e.g. a TEE that does not provide the service
> > > > can only interact with TEE from userspace).
> > > >
> > >
> > > Following is the kernel interface for OP-TEE device enumeration that I
> > > would like to propose:
> > >
> > > /*
> > >  * Get next OP-TEE based kernel device
> > >  *
> > >  * Secure world can provide support for resident kernel devices/services
> > >  * as pseudo/early trusted applications. So this function is used to
> > >  * enumerate OP-TEE based kernel devices.
> > >  *
> > >  * Call register usage:
> > >  * a0   SMC Function ID, OPTEE_SMC_GET_NEXT_DEVICE
> > >  * a1-6 Not used
> > >  * a7   Hypervisor Client ID register
> > >  *
> > >  * Possible return values:
> > >  *
> > >  * OP-TEE OS returns next device UUID.
> > >  * a0   OPTEE_SMC_RETURN_OK
> > >  * a1-4 Device UUID
> > >  * a5-7 Preserved
> > >  *
> > >  * OP-TEE OS does not recognize this function.
> > >  * a0   OPTEE_SMC_RETURN_UNKNOWN_FUNCTION
> > >  * a1-7 Preserved
> > >  *
> > >  * OP-TEE OS done with device enumeration.
> > >  * a0   OPTEE_SMC_RETURN_ENOTAVAIL
> > >  * a1-7 Preserved
> > >  */
> > > #define OPTEE_SMC_FUNCID_GET_NEXT_DEVICE       15
> > > #define OPTEE_SMC_GET_NEXT_DEVICE \
> > >         OPTEE_SMC_FAST_CALL_VAL(OPTEE_SMC_FUNCID_GET_NEXT_DEVICE)
> > >
> > > Also at OP-TEE end, we should add additional TA_FLAG_KERNEL_DEVICE to
> > > detect particular pseudo/early TA as a kernel device during
> > > enumeration.
> >
> > I'd rather provide this enumeration via a pseudo TA, to keep the SMC
> > interface as small as possible. The pseudo TA can be optional, if it's
> > not available then there's no need to try to instantiate any dependent
> > drivers either.
> >
>
> I did thought about having a pseudo TA but following are some
> negatives to this approach:
> 1. Where do we specify UUID for this pseudo TA? Should it come from devicetree?

This should be a well known UUID, provided in the .h file describing the TA.

> 2. Adds whole TEE call sequence (ctx, session, shared memory etc.)
> during "optee_probe".

Yes, is that a problem?

> 3. This pseudo TA would be exposed to user-space as well. I am not
> sure if we would like user-space to access kernel device specific
> info.

Doesn't matter, that's not a secret. We can assume that an attacker
already know the UUID of whatever TA it will target.

- Jens

>
> -Sumit
>
> > - Jens
> >
> > >
> > > -Sumit
> > >
> > > >
> > > > Daniel.



[Index of Archives]     [Device Tree Compilter]     [Device Tree Spec]     [Linux Driver Backports]     [Video for Linux]     [Linux USB Devel]     [Linux PCI Devel]     [Linux Audio Users]     [Linux Kernel]     [Linux SCSI]     [XFree86]     [Yosemite Backpacking]


  Powered by Linux