Skip to content

Commit 1fa2613

Browse files
committed
feat: linux: Add information on REE FS alongside RPMB
Presently, TI's OP-TEE docs speak only of RPMB Secure Storage mechanism, and not of REE FS. REE FS is supported by-default, so mention it too. Signed-off-by: Suhaas Joshi <[email protected]>
1 parent acfa2f5 commit 1fa2613

File tree

1 file changed

+40
-12
lines changed

1 file changed

+40
-12
lines changed

source/linux/Foundational_Components_OPTEE.rst

Lines changed: 40 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -75,17 +75,34 @@ of entropy can work around these issues.
7575
7676
$ make CROSS_COMPILE="$CROSS_COMPILE_32" CROSS_COMPILE64="$CROSS_COMPILE_64" PLATFORM=k3-|__OPTEE_PLATFORM_FLAVOR__| CFG_ARM64_core=y CFG_WITH_SOFTWARE_PRNG=y
7777
78+
.. _optee-rpmb-flags:
7879

79-
Secure Storage with RPMB (For HS)
80-
*********************************
80+
OP-TEE Secure Storage
81+
*********************
8182

82-
OP-TEE provides secure storage functionality. TI SoCs with HS configuration have a
83-
KEK embedded in them that is programmed across OP-TEE instances that are distributed
84-
in a derived manner. Each HS device has its own HUK signing key (DKEK) which is different
85-
from other HS devices.
83+
OP-TEE provides secure storage functionality through two mechanisms:
84+
**REE FS** (Rich Execution Environment Filesystem) and **RPMB**
85+
(Replay Protected Memory Block).
8686

87-
For enabling RPMB support along with secure storage, additional flags need to be passed to
88-
the build instructions. The information for the flags can be found here.
87+
TI SDK enables REE FS by-default, and configures OP-TEE to store
88+
encrypted binary blobs created by REE FS in
89+
:file:`/var/lib/tee/`. The SDK also keeps RPMB disabled.
90+
91+
RPMB works in TI SoCs with HS configuration. These have a KEK embedded
92+
in them that is programmed across OP-TEE instances that are
93+
distributed in a derived manner. Each HS device has its own HUK
94+
signing key (DKEK) which is different from other HS devices.
95+
96+
.. note::
97+
98+
Presently, AM62L does not support RPMB. This support will be added
99+
in subsequent releases. It does support REE FS.
100+
101+
The remaining devices support both: REE FS by-default and RPMB if
102+
OP-TEE binaries are re-compiled with required flags.
103+
104+
For learning more about secure storage in OP-TEE, and instructions to
105+
enable RPMB, refer:
89106
https://optee.readthedocs.io/en/latest/architecture/secure_storage.html
90107

91108
There is a hybrid mode in which both the flags i.e `CFG_REE_FS=y` and `CFG_RPMB_FS=y` are enabled.
@@ -100,22 +117,33 @@ E.g. For enabling hybrid mode of RPMB along with REE_FS
100117
101118
$ export CFG_CONSOLE_UART=0x8
102119
103-
.. parsed-literal::
120+
.. ifconfig:: CONFIG_part_variant not in ('AM62LX')
121+
122+
.. parsed-literal::
104123
105-
$ make CROSS_COMPILE64="$CROSS_COMPILE_64" PLATFORM=|__OPTEE_PLATFORM_FLAVOR__| CFG_ARM64_core=y CFG_REE_FS=y CFG_RPMB_FS=y
124+
$ make CROSS_COMPILE64="$CROSS_COMPILE_64" PLATFORM=|__OPTEE_PLATFORM_FLAVOR__| CFG_ARM64_core=y CFG_REE_FS=y CFG_RPMB_FS=y
106125
107-
OPTEE-client also needs to be updated to enable the use of real
108-
emmc instead of the virtual emmc that is enabled by default
126+
OPTEE-client also needs to be updated to enable the use of real
127+
emmc instead of the virtual emmc that is enabled by default
109128

110129
Getting OP-TEE Client source code
111130
---------------------------------
112131

132+
To get optee_client source code, do:
133+
134+
.. rubric:: Getting OP-TEE Client source code
135+
113136
.. code-block:: console
114137
115138
$ git clone https://github.com/OP-TEE/optee_client
116139
117140
.. rubric:: Building OP-TEE Client with RPMB support
118141

142+
To use emulated RPMB, set RPMB_EMU=1. Otherwise, set RPMB_EMU=0.
143+
144+
For example, the following command builds optee_client to use the real RPMB,
145+
instead of the emulated one.
146+
119147
.. code-block:: console
120148
121149
$ make CROSS_COMPILE="$CROSS_COMPILE_64" PLATFORM=k3 CFG_TEE_SUPP_LOG_LEVEL=2 RPMB_EMU=0 CFG_ARM64_core=y

0 commit comments

Comments
 (0)