Confessions of a Security Hardware Driver Maintainer

Total Page:16

File Type:pdf, Size:1020Kb

Confessions of a Security Hardware Driver Maintainer Confessions of a security hardware driver maintainer Gilad Ben-Yossef © 2017 Arm Limited Principal Software Engineer About me My name is Gilad Ben-Yossef. I work on upstream Linux kernel cryptography and security in genera,l and arm® TrustZone® CryptoCell® support in particular. I’ve been working in various forms with and on the Linux kernel and other Open Source projects for close to twenty years – i.e. I’m an old bugger… ☺ I co-authored “Building Embedded Linux Systems” 2nd edition from O’Reilly. I’m a co-founder of HaMakor, an Israeli NPO for free and open source software and of August Penguin, the longest running Israeli FOSS conference. 2 © 2017 Arm Limited What I am NOT going to talk about today The CryptoCell out-of-tree device driver went into staging commit abefd6741d540fc624e73a2a3bdef2397bcbd064 Author: Gilad Ben-Yossef <[email protected]> Date: Sun Apr 23 12:26:09 2017 +0300 staging: ccree: introduce CryptoCell HW driver Introduce basic low level Arm TrustZone CryptoCell HW support. This first patch doesn't actually register any Crypto API transformations, these will follow up in the next patch. This first revision supports the CC 712 REE component. Signed-off-by: Gilad Ben-Yossef <[email protected]> Signed-off-by: Greg Kroah-Hartman <[email protected]> 3 © 2017 Arm Limited What I am going to talk about… Kernel software and security hardware integration mismatches ? 4 © 2017 Arm Limited Android Secure boot sequence 2 Boot loader verifies kernel 1 Firmware verifies the boot loader image and boot file system “For verifying boot and recovery partitions, the bootloader has a fixed OEM key available to it. It always attempts to verify the boot 1 partition using the OEM key.” 2 3 OS verifies the system and additional partitions “Once execution has moved to the boot 3 partition, the software there is responsible for setting up verification of further partitions. “Bootloader integrity is always verified Due to its large size, the system partition using a hardware root of trust.” typically cannot be verified similarly to previous parts but is verified as it’s being accessed instead using the dm-verity kernel driver or a similar solution.” 5 © 2017 Arm Limited The quotes are from taken from https://source.android.com/security/verifiedboot/verified-boot on . 8/5/2017 under the Creative Commons Attribution 3.0 License DM-Verity Device-Mapper's "verity" target provides transparent integrity checking of block devices using a cryptographic digest provided by the kernel crypto API. EXT4 Super Block EXT4 File System Meta Data Hash Tree 6 © 2017 Arm Limited What is Arm® TrustZone® CryptoCell? The ARM® TrustZone® CryptoCell solution is a comprehensive collectionReaders of silicon -Digestproven security version: modules that provide platform level security services. Its multi-layered hardware and software architecture combines hardware accelerators, hardware roots-of-trust control with a rich layer of security software and off chip tools. The high performance TrustZone CryptoCell-700 family is focused at providing platform security for devices serving data intensive use cases. It provides the system with various cryptography related services (implementation of symmetric and asymmetric schemes, HASH and Keyed HASH functions, Random number generation) as well as platform security services required to assure the integrity, authenticity and confidentiality of code and data belonging to different stakeholders (e.g. an OEM, a service provider or the user). 7 © 2017 Arm Limited Allowing DM-Verity to use async. transformations The upstream DM-Verity implementation was using the synchronous crypto API designed for in- core based implementations. This caused customers to use various unspeakable hacks to get it to work. We changed the implementation to use the asynchronous API that allows use of off core crypto accelerators. Patch accepted for 4.12. 8 © 2017 Arm Limited But how did we get here? crypto_alloc_ahash(“md5”, 0, CRYPTO_ALG_ASYNC); 9 © 2017 Arm Limited Rusty Russel's API Design Manifesto http://ozlabs.org/~rusty/index.cgi/tech/2008-03-30.html How Do I Make This Hard to Misuse? What If I Don't Actually Like My Users? 10. It's impossible to get wrong. -1. Read the mailing list thread and you'll get it 9. The compiler/linker won't let you get it wrong. wrong. 8. The compiler will warn if you get it wrong. -2. Read the implementation and you'll get it wrong. 7. The obvious use is (probably) the correct one. -3. Read the documentation and you'll get it wrong. 6. The name tells you how to use it. -4. Follow common convention and you'll get it 5. Do it right or it will always break at runtime. wrong. 4. Follow common convention and you'll get it -5. Do it right and it will sometimes break at right. runtime. 3. Read the documentation and you'll get it right. -6. The name tells you how not to use it. 2. Read the implementation and you'll get it right. -7. The obvious use is wrong. 1. Read the correct mailing list thread and you'll -8. The compiler will warn if you get it right. get it right. -9. The compiler/linker won't let you get it right. -10. It's impossible to get right. 10 © 2017 Arm Limited Symmetric cryptography code example struct tcrypt_result { /* Perform cipher operation */ struct completion completion; static unsigned int test_skcipher_encdec(struct skcipher_def *sk, int err; int enc) }; { int rc = 0; /* tie all data structures together */ struct skcipher_def { if (enc) struct scatterlist sg; rc = crypto_skcipher_encrypt(sk->req); struct crypto_skcipher *tfm; else struct skcipher_request *req; rc = crypto_skcipher_decrypt(sk->req); struct tcrypt_result result; }; switch (rc) { case 0: /* Callback function */ break; static void test_skcipher_cb(struct crypto_async_request *req, int error) case -EINPROGRESS: { case -EBUSY: struct tcrypt_result *result = req->data; rc = wait_for_completion_interruptible( &sk->result.completion); if (error == -EINPROGRESS) if (!rc && !sk->result.err) { return; reinit_completion(&sk->result.completion); result->err = error; break; complete(&result->completion); } pr_info("Encryption finished successfully\n"); default: } pr_info("skcipher encrypt returned with %d result %d\n", rc, sk->result.err); break; } init_completion(&sk->result.completion); return rc; } 11 © 2017 Arm Limited The good, the bad and the ugly struct tcrypt_result { /* Perform cipher operation */ struct completion completion; static unsigned int test_skcipher_encdec(struct skcipher_def *sk, int err; int enc) }; { int rc = 0; /* tie all data structures together */ Boilerplate struct skcipher_def { if (enc) struct scatterlist sg; rc = crypto_skcipher_encrypt(sk->req); struct crypto_skcipher *tfm; else struct skcipher_request *req; rc = crypto_skcipher_decrypt(sk->req); struct tcrypt_result result; }; switch (rc) { case 0: /* Callback function */ break; static void test_skcipher_cb(struct crypto_async_request *req, int error) case -EINPROGRESS: { case -EBUSY: struct tcrypt_result *result = req->data; rc = wait_for_completion_interruptible( &sk->result.completion); if (error == -EINPROGRESS) if (!rc && !sk->result.err) { return; reinit_completion(&sk->result.completion); result->err = error; break; complete(&result->completion); } pr_info("Encryption finished successfully\n"); default: } pr_info("skcipher encrypt returned with %d result %d\n", rc, sk->result.err); break; } init_completion(&sk->result.completion); return rc; } 12 © 2017 Arm Limited -3. Read the documentation and you'll get it wrong. Symmetric cryptography code example – after change /* tie all data structures together */ /* Perform cipher operation */ struct skcipher_def { static unsigned int test_skcipher_encdec(struct skcipher_def *sk, struct scatterlist sg; int enc) struct crypto_skcipher *tfm; { struct skcipher_request *req; int rc = 0; struct crypto_wait wait; }; if (enc) rc = crypto_skcipher_encrypt(sk->req); else rc = crypto_skcipher_decrypt(sk->req); rc = crypto_wait_req(sk->req, rc); if (rc) pr_info("skcipher encrypt returned with %d result %d\n", rc, sk->result.err); crypto_init_wait(&sk->wait); return rc; } 36 files changed, 310 insertions(+), 737 deletions(-) 13 © 2017 Arm Limited Latency hiding via parallelism “Hardware is parallel” Decoding DMA In Encryption DMA Out Decoding DMA In Encryption DMA Out Decoding DMA In Encryption DMA Out Decoding DMA In Encryption DMA Out Decoding DMA In Encryption DMA Out Decoding DMA In Encryption DMA Out Decoding DMA In Encryption DMA Out Time 14 © 2017 Arm Limited Effect of parallelism on latency Latency in cycles for one CBC(AES-128) encryption operation 700 600 500 400 300 200 100 0 16 byte 64 byte 256 byte 1024 byte 4096 bytes 8192 bytes Multiple Buffers Single Buffer 15 © 2017 Arm Limited Parallelism status in-kernel crypto users Already doing a very good job of parallelism: • DM-Crypt • IPsec code Working on improving: • DM-Verity • Fscrypt • Probably more 16 © 2017 Arm Limited Effect of buffer sizes on efficiency Bytes per cycle of latency for one 128 bit key CBC(AES-128) encryption operation 25 20 15 10 5 0 16 byte 64 byte 256 byte 1024 byte 4096 bytes 8192 bytes Bytes per cycle 17 © 2017 Arm Limited DM-Crypt XTS/ESSIV generation handling 4K page of file data in RAM • DM-Crypt (and fscrypt) implements IV generation internally. • Two separate different implementations. • Limiting ability to use hardware AES/XTS acceleration for … storage. 8 9 10 11 • Working with Binoy 12 13 14 15 Jayan from Linaro on … separating IV code. 512 bytes Sector Number Sector of Ciphertext provided as IV 18 © 2017 Arm Limited
Recommended publications
  • Dm-X: Protecting Volume-Level Integrity for Cloud Volumes and Local
    dm-x: Protecting Volume-level Integrity for Cloud Volumes and Local Block Devices Anrin Chakraborti Bhushan Jain Jan Kasiak Stony Brook University Stony Brook University & Stony Brook University UNC, Chapel Hill Tao Zhang Donald Porter Radu Sion Stony Brook University & Stony Brook University & Stony Brook University UNC, Chapel Hill UNC, Chapel Hill ABSTRACT on Amazon’s Virtual Private Cloud (VPC) [2] (which provides The verified boot feature in recent Android devices, which strong security guarantees through network isolation) store deploys dm-verity, has been overwhelmingly successful in elim- data on untrusted storage devices residing in the public cloud. inating the extremely popular Android smart phone rooting For example, Amazon VPC file systems, object stores, and movement [25]. Unfortunately, dm-verity integrity guarantees databases reside on virtual block devices in the Amazon are read-only and do not extend to writable volumes. Elastic Block Storage (EBS). This paper introduces a new device mapper, dm-x, that This allows numerous attack vectors for a malicious cloud efficiently (fast) and reliably (metadata journaling) assures provider/untrusted software running on the server. For in- volume-level integrity for entire, writable volumes. In a direct stance, to ensure SEC-mandated assurances of end-to-end disk setup, dm-x overheads are around 6-35% over ext4 on the integrity, banks need to guarantee that the external cloud raw volume while offering additional integrity guarantees. For storage service is unable to remove log entries documenting cloud storage (Amazon EBS), dm-x overheads are negligible. financial transactions. Yet, without integrity of the storage device, a malicious cloud storage service could remove logs of a coordinated attack.
    [Show full text]
  • Open Source Projects As Incubators of Innovation
    RESEARCH CONTRIBUTIONS TO ORGANIZATIONAL SOCIOLOGY AND INNOVATION STUDIES / STUTTGARTER BEITRÄGE ZUR ORGANISATIONS- UND INNOVATIONSSOZIOLOGIE SOI Discussion Paper 2017-03 Open Source Projects as Incubators of Innovation From Niche Phenomenon to Integral Part of the Software Industry Jan-Felix Schrape Institute for Social Sciences Organizational Sociology and Innovation Studies Jan-Felix Schrape Open Source Projects as Incubators of Innovation. From Niche Phenomenon to Integral Part of the Software Industry. SOI Discussion Paper 2017-03 University of Stuttgart Institute for Social Sciences Department of Organizational Sociology and Innovation Studies Seidenstr. 36 D-70174 Stuttgart Editor Prof. Dr. Ulrich Dolata Tel.: +49 711 / 685-81001 [email protected] Managing Editor Dr. Jan-Felix Schrape Tel.: +49 711 / 685-81004 [email protected] Research Contributions to Organizational Sociology and Innovation Studies Discussion Paper 2017-03 (May 2017) ISSN 2191-4990 © 2017 by the author(s) Jan-Felix Schrape is senior researcher at the Department of Organizational Sociology and Innovation Studies, University of Stuttgart (Germany). [email protected] Additional downloads from the Department of Organizational Sociology and Innovation Studies at the Institute for Social Sciences (University of Stuttgart) are filed under: http://www.uni-stuttgart.de/soz/oi/publikationen/ Abstract Over the last 20 years, open source development has become an integral part of the software industry and a key component of the innovation strategies of all major IT providers. Against this backdrop, this paper seeks to develop a systematic overview of open source communities and their socio-economic contexts. I begin with a recon- struction of the genesis of open source software projects and their changing relation- ships to established IT companies.
    [Show full text]
  • MINCS - the Container in the Shell (Script)
    MINCS - The Container in the Shell (script) - Masami Hiramatsu <[email protected]> Tech Lead, Linaro Ltd. Open Source Summit Japan 2017 LEADING COLLABORATION IN THE ARM ECOSYSTEM Who am I... Masami Hiramatsu - Linux kernel kprobes maintainer - Working for Linaro as a Tech Lead LEADING COLLABORATION IN THE ARM ECOSYSTEM Demo # minc top # minc -r /opt/debian/x86_64 # minc -r /opt/debian/arm64 --arch arm64 LEADING COLLABORATION IN THE ARM ECOSYSTEM What Is MINCS? My Personal Fun Project to learn how linux containers work :-) LEADING COLLABORATION IN THE ARM ECOSYSTEM What Is MINCS? Mini Container Shell Scripts (pronounced ‘minks’) - Container engine implementation using POSIX shell scripts - It is small (~60KB, ~2KLOC) (~20KB in minimum) - It can run on busybox - No architecture dependency (* except for qemu/um mode) - No need for special binaries (* except for libcap, just for capsh --exec) - Main Features - Namespaces (Mount, PID, User, UTS, Net*) - Cgroups (CPU, Memory) - Capabilities - Overlay filesystem - Qemu cross-arch/system emulation - User-mode-linux - Image importing from dockerhub And all are done by CLI commands :-) LEADING COLLABORATION IN THE ARM ECOSYSTEM Why Shell Script? That is my favorite language :-) - Easy to understand for *nix administrators - Just a bunch of commands - Easy to modify - Good for prototyping - Easy to deploy - No architecture dependencies - Very small - Able to run on busybox (+ libcap is perfect) LEADING COLLABORATION IN THE ARM ECOSYSTEM MINCS Use-Cases For Learning - Understand how containers work For Development - Prepare isolated (cross-)build environment For Testing - Test new applications in isolated environment - Test new kernel features on qemu using local tools For products? - Maybe good for embedded devices which has small resources LEADING COLLABORATION IN THE ARM ECOSYSTEM What Is A Linux Container? There are many linux container engines - Docker, LXC, rkt, runc, ..
    [Show full text]
  • LVC20-108 Arm64 Linux Kernel Architecture Update
    Arm64 Linux Kernel architecture update Matteo Carlini Director, Software Technology Management Arm – Open Source Software A-profile Architecture new feature names! https://developer.arm.com/architectures/cpu-architecture/a-profile/exploration-tools/feature-names-for-a-profile A-profile features: arm64 kernel support table https://developer.arm.com/tools-and-software/open-source-software/linux-kernel/architecture-and-kvm-enablement A-class architecture kernel enablement – Mar 20 TTS2UXN A64ISA AA32HPD PAUTH CNTS PMU S2FW FHM TTPBHA C B Trace LSE LSE IESB LSMAOC Debug SHA PMU RDMA CompNum JSconv S-EL2 SM SM TTCNP TTST VMID16 HPD v8.3 DIT SHA UAO v8.1 v8.2 RAS v8.4 IDST RCPC CCIDX DotProd ATS1E1 LOR VHE DFE CondM TTRe NV RCPC RAS LP16 m PAN TTHM MPAM AMU TTL NV Debug LVA TLBI VPIPT LPA DCPOP EVT DoPD GTG ECV MTPMU ETS SVE2 SPE SpecRest MPAM CTSS PMU PredInv PAuth2/ Future FGT FPAC architectures v8.0 RNG BT v8.5 v8.6 F64MM DGH DCCVADP MemTag Enablement complete TME EOPD CSEH F32MM TWED Enablement ongoing Enablement TBD SB CMODX I8MM BF16 FRINT CondM AMU N/A – no Kernel impact A-class architecture kernel enablement – Today TTS2UXN A64ISA AA32HPD PAUTH PMU FHM TTPBHA CNTSC S2FWB S-EL2 LSE LSE IESB LSMAOC TTST SHA PMU RDMA CompNum JSconv RAS SM SM TTCNP VMID16 HPD v8.3 DFE DIT SHA UAO TTRem v8.4 v8.1 v8.2 IDST RCPC CCIDX DotProd ATS1E1 LOR VHE Trace CondM NV Debug RCPC RAS LP16 PAN TTHM MPAM AMU Debug LVA NV TLBI TTL VPIPT LPA DCPOP GTG SPE SpecRest ECV MTPMU ETS SVE2 PMU PredInv MPAM CTSS RNG MemTag PAuth2/ Future FGT FPAC architectures v8.0
    [Show full text]
  • Linux Kernal II 9.1 Architecture
    Page 1 of 7 Linux Kernal II 9.1 Architecture: The Linux kernel is a Unix-like operating system kernel used by a variety of operating systems based on it, which are usually in the form of Linux distributions. The Linux kernel is a prominent example of free and open source software. Programming language The Linux kernel is written in the version of the C programming language supported by GCC (which has introduced a number of extensions and changes to standard C), together with a number of short sections of code written in the assembly language (in GCC's "AT&T-style" syntax) of the target architecture. Because of the extensions to C it supports, GCC was for a long time the only compiler capable of correctly building the Linux kernel. Compiler compatibility GCC is the default compiler for the Linux kernel source. In 2004, Intel claimed to have modified the kernel so that its C compiler also was capable of compiling it. There was another such reported success in 2009 with a modified 2.6.22 version of the kernel. Since 2010, effort has been underway to build the Linux kernel with Clang, an alternative compiler for the C language; as of 12 April 2014, the official kernel could almost be compiled by Clang. The project dedicated to this effort is named LLVMLinxu after the LLVM compiler infrastructure upon which Clang is built. LLVMLinux does not aim to fork either the Linux kernel or the LLVM, therefore it is a meta-project composed of patches that are eventually submitted to the upstream projects.
    [Show full text]
  • A Linux Kernel Scheduler Extension for Multi-Core Systems
    A Linux Kernel Scheduler Extension For Multi-Core Systems Aleix Roca Nonell Master in Innovation and Research in Informatics (MIRI) specialized in High Performance Computing (HPC) Facultat d’informàtica de Barcelona (FIB) Universitat Politècnica de Catalunya Supervisor: Vicenç Beltran Querol Cosupervisor: Eduard Ayguadé Parra Presentation date: 25 October 2017 Abstract The Linux Kernel OS is a black box from the user-space point of view. In most cases, this is not a problem. However, for parallel high performance computing applications it can be a limitation. Such applications usually execute on top of a runtime system, itself executing on top of a general purpose kernel. Current runtime systems take care of getting the most of each system core by distributing work among the multiple CPUs of a machine but they are not aware of when one of their threads perform blocking calls (e.g. I/O operations). When such a blocking call happens, the processing core is stalled, leading to performance loss. In this thesis, it is presented the proof-of-concept of a Linux kernel extension denoted User Monitored Threads (UMT). The extension allows a user-space application to be notified of the blocking and unblocking of its threads, making it possible for a core to execute another worker thread while the other is blocked. An existing runtime system (namely Nanos6) is adapted, so that it takes advantage of the kernel extension. The whole prototype is tested on a synthetic benchmarks and an industry mock-up application. The analysis of the results shows, on the tested hardware and the appropriate conditions, a significant speedup improvement.
    [Show full text]
  • Hdcp Support in Optee
    HDCP SUPPORT IN OPTEE PRODUCT PRESENTATION Linaro Multimedia Working Group MICR ADVANCED TECHNOLOGIES • https://www.linaro.org/ SEPTEMBER 2019 Agenda • Quick introduction to HDCP • Secure Video Path overview • Current HDCP control in Linux • Proposal to control HDCP in OPTEE • Questions HDCP OVERVIEW 3 HDCP : High bandwidth Digital Content Protection • A digital copy protection developed by Intel™ to prevent copying of digital and audio video content. Before sending data, the source device shall check the destination device is authorized to received it. If so, the source device encrypts the data, only the destination device can decrypt. - data encryption - prevent non-licensed devices from receiving content • Android and Linux NXP bsp manage HDCP at Linux Level, through libDRM. So nothing prevent a user to disable HDCP protection while secure content is under playback. It is a security holes in the Secure Video Path. • HDCP support currently under development for wayland/Weston: https://gitlab.freedesktop.org/wayland/weston/merge_requests/48 • No Open Source solution exists to manage HDCP in secure mode. • HDCP versions: ▪ HDCP 1.X: Hacked: Master key published (leak/reverse engineering) ▪ HDCP 2.0: Hacked before release ▪ HDCP 2.1: Hacked before release ▪ HDCP 2.2: Not yet hacked 4 ▪ HDCP 2.3: Not yet hacked HDCP control state Machine Content with HDCP protection mandatory no yes Local display Local display yes no yes no Video displayed Video displayed without HDCP Digital Display without HDCP Digital Display encryption encryption yes no yes no It means we have analog display Video displayed Video displayed HDCP supported without HDCP HDCP supported without HDCP encryption encryption yes no yes no Video displayed Video displayed without Widevine/PlayReady To Video not displayed Application to decide if HDCP check current HDCP version Application to display a Warning 5 HDCP encryption message HDCP Unauthorized, encryption to be used >= expected HDCP version Content Disabled.' Error.
    [Show full text]
  • Implantación De Linux Sobre Microcontroladores
    Embedded Linux system development Embedded Linux system development DSI Embedded Linux Free Electrons Developers © Copyright 2004-2018, Free Electrons. Creative Commons BY-SA 3.0 license. Latest update: March 14, 2018. Document updates and sources: http://free-electrons.com/doc/training/embedded-linux Corrections, suggestions, contributions and translations are welcome! DSI - FCEIA http://dsi.fceia.unr.edu.ar 1/263 Derechos de copia © Copyright 2018, Luciano Diamand Licencia: Creative Commons Attribution - Share Alike 3.0 http://creativecommons.org/licenses/by-sa/3.0/legalcode Ud es libre de: I copiar, distribuir, mostrar y realizar el trabajo I hacer trabajos derivados I hacer uso comercial del trabajo Bajo las siguientes condiciones: I Atribuci´on. Debes darle el cr´editoal autor original. I Compartir por igual. Si altera, transforma o construye sobre este trabajo, usted puede distribuir el trabajo resultante solamente bajo una licencia id´enticaa ´esta. I Para cualquier reutilizaci´ono distribuci´on,debe dejar claro a otros los t´erminos de la licencia de este trabajo. I Se puede renunciar a cualquiera de estas condiciones si usted consigue el permiso del titular de los derechos de autor. El uso justo y otros derechos no se ven afectados por lo anterior. DSI - FCEIA http://dsi.fceia.unr.edu.ar 2/263 Hiperv´ınculosen el documento Hay muchos hiperv´ınculosen el documento I Hiperv´ıncluosregulares: http://kernel.org/ I Enlaces a la documentaci´ondel Kernel: Documentation/kmemcheck.txt I Enlaces a los archivos fuente y directorios del kernel: drivers/input include/linux/fb.h I Enlaces a declaraciones, definiciones e instancias de los simbolos del kernel (funciones, tipos, datos, estructuras): platform_get_irq() GFP_KERNEL struct file_operations DSI - FCEIA http://dsi.fceia.unr.edu.ar 3/263 Introducci´ona Linux Embebido Introducci´ona DSI Linux Embebido Embedded Linux Developers Free Electrons © Copyright 2004-2018, Free Electrons.
    [Show full text]
  • SFO17-409 TSC OSS Toolchain Discussion David a Rusling Ryan S
    SFO17-409 TSC OSS Toolchain Discussion David A Rusling Ryan S. Arnold, Maxim Kuvyrkov linaro Committee Confidential @ 2017 Overview ● Toolchain work in Linaro ○ GCC ■ ARM GNU funding to TCWG and the effect on Linaro TCWG's roadmap ■ Transition of GNU toolchain release to ARM in 2018 (august) ■ ARMv8.2 ■ SVE upstream progress ● GDB SVE enablement moving forward ○ LLVM ■ ARMv8.2 ■ LLVM growth roadmap ■ SVE upstream progress ○ ILP32 ■ ILP32 toolchain progress update ○ FDPIC Toolchain ● Discussion ○ Does this all fit together? ○ Is there anything that we’re missing? linaro Committee Confidential @ 2017 ENGINEERS AND DEVICES WORKING TOGETHER Key GNU Deliverables 1.TCWG-1232 Link Time Optimization tuning for AArch64 2.TCWG-64 Sign/Zero-Extension Elimination optimizations 3.TCWG-1233 Investigate scalability of libgomp on SPEC CPU2017 4.TCWG-1207 ILP32 Toolchain 5.TCWG-159 GDB Kernel Awareness 6.TCWG-1035 GDB target description rework for SVE enablement 7.TCWG-1160, TCWG-1161 OpenOCD AArch64 & GDB Remote debugging interoperability 8.TCWG-935 Automated regression testing of upstream branches 9.TCWG-1231 Automated benchmarking of upstream branches linaro Committee Confidential @ 2017 ENGINEERS AND DEVICES WORKING TOGETHER ARM funding of GNU work & Need for LLVM ● High volume of LLVM work needed to be done (see LLVM Growth Roadmap slides). Linaro Exec Mgmt was planning to propose TCWG transition to LLVM in the future. This initial proposal was shared with ARM. ● ARM expressed concern as there is still important GNU work Linaro can do especially on behalf of ARM enterprise workloads. ● ARM has decided to fund three existing (full-time equivalent) TCWG engineers to continue to focus on GNU for at least the next year.
    [Show full text]
  • Embedded Linux Conference Europe 2019
    Embedded Linux Conference Europe 2019 Linux kernel debugging: going beyond printk messages Embedded Labworks By Sergio Prado. São Paulo, October 2019 ® Copyright Embedded Labworks 2004-2019. All rights reserved. Embedded Labworks ABOUT THIS DOCUMENT ✗ This document is available under Creative Commons BY- SA 4.0. https://creativecommons.org/licenses/by-sa/4.0/ ✗ The source code of this document is available at: https://e-labworks.com/talks/elce2019 Embedded Labworks $ WHOAMI ✗ Embedded software developer for more than 20 years. ✗ Principal Engineer of Embedded Labworks, a company specialized in the development of software projects and BSPs for embedded systems. https://e-labworks.com/en/ ✗ Active in the embedded systems community in Brazil, creator of the website Embarcados and blogger (Portuguese language). https://sergioprado.org ✗ Contributor of several open source projects, including Buildroot, Yocto Project and the Linux kernel. Embedded Labworks THIS TALK IS NOT ABOUT... ✗ printk and all related functions and features (pr_ and dev_ family of functions, dynamic debug, etc). ✗ Static analysis tools and fuzzing (sparse, smatch, coccinelle, coverity, trinity, syzkaller, syzbot, etc). ✗ User space debugging. ✗ This is also not a tutorial! We will talk about a lot of tools and techniches and have fun with some demos! Embedded Labworks DEBUGGING STEP-BY-STEP 1. Understand the problem. 2. Reproduce the problem. 3. Identify the source of the problem. 4. Fix the problem. 5. Fixed? If so, celebrate! If not, go back to step 1. Embedded Labworks TYPES OF PROBLEMS ✗ We can consider as the top 5 types of problems in software: ✗ Crash. ✗ Lockup. ✗ Logic/implementation error. ✗ Resource leak. ✗ Performance.
    [Show full text]
  • Is Android the New Embedded Linux?
    Is Android the new Embedded Linux? AnDevCon 2013 Karim Yaghmour [email protected] 1 These slides are made available to you under a Creative Commons Share- Delivered and/or customized by Alike 3.0 license. The full terms of this license are here: https://creativecommons.org/licenses/by-sa/3.0/ Attribution requirements and misc., PLEASE READ: ● This slide must remain as-is in this specific location (slide #2), everything else you are free to change; including the logo :-) ● Use of figures in other documents must feature the below “Originals at” URL immediately under that figure and the below copyright notice where appropriate. ● You are free to fill in the “Delivered and/or customized by” space on the right as you see fit. ● You are FORBIDEN from using the default “About” slide as-is or any of its contents. rd ● You are FORBIDEN from using any content provided by 3 parties without the EXPLICIT consent from those parties. (C) Copyright 2013, Opersys inc. These slides created by: Karim Yaghmour Originals at: www.opersys.com/community/docs 2 About ● Author of: ● Introduced Linux Trace Toolkit in 1999 ● Originated Adeos and relayfs (kernel/relay.c) ● Training, Custom Dev, Consulting, ... 3 1. Why are we asking this question? ● Android is based on Linux ● Android is “embedded” ● Android is extremely popular ● Android enjoys good support from SoC vendors Mostly - The trends are there 4 1.1. Why did Embedded Linux rise? ● EETimes 2005 survey ... http://www.embedded.com/electronics-blogs/- include/4025539/Embedded-systems-survey-Operating- systems-up-for-grabs ● EETimes 2013 survey http://www.slideshare.net/MTKDMI/2013-embedded-market- study-final http://www.eetimes.com/electronics-news/4407897/Android-- FreeRTOS-top-EE-Times--2013-embedded-survey 5 1.2.
    [Show full text]
  • I.MX Encrypted Storage Using CAAM Secure Keys Rev
    AN12714 i.MX Encrypted Storage Using CAAM Secure Keys Rev. 1 — 11/2020 Application Note Contents 1 Preface 1 Preface............................................1 Devices often contain highly sensitive information which is consistently at risk 1.1 Intended audience and scope......1 1.2 References...................................1 to get physically lost or stolen. Setting user passwords does not guarantee data 2 Overview......................................... 1 protection against unauthorized access. The attackers can simply bypass the 2.1 DM-Crypt......................................1 software system of a device and access the data storage directly. Only the 2.2 DM-Crypt accelerated by CAAM use of encryption can guarantee data confidentiality in the case where storage .....................................................2 media is directly accessed. 2.3 DM-Crypt using CAAM's Secure Key...............................................3 This document provides steps to run a transparent storage encryption at block 3 Hands-On........................................4 level using DM-Crypt taking advantage of the secure key feature provided 3.1 Installation....................................4 by i.MXs Cryptographic Accelerator and Assurance Module (CAAM). The 3.2 Usage...........................................6 document applies to all i.MX SoCs having CAAM module. The feature is not 3.3 Performance................................ 9 available on i.MX SoCs with DCP. 4 Revision History............................ 10 5 Appendix A. Configuration...........
    [Show full text]