David always enjoyed mathematics, but America’s space program together with ‘Star Trek’ made him think that computers were really interesting and so he graduated in 1982 with a degree in Computer Science. The future turns out to have less flashing lights than he expected. At Digital Equipment Corporation he got involved in the port of Linux® to the Alpha processor. This gave him an abiding respect for the power of open source in general and Linux in particular. He worked on StrongArm before moving to Arm where he added tools experience. He’s an Arm Fellow; which he says, “really means that I’m a techno-dweeb with a wide freedom to meddle.”
Keynote: David Rusling
BKK19-111 - DRM HW Composer for Beagle X15 BoardTuesday, April 16, 2019
Describing the process of adaptation AOSP DRM HWC to be used on Beagle X15 Board (4.14 kernel).
This can be used as an example of launching the external/drm_hwc on a board: a simple "How to" with the minimun steps required to get the drm_hwc functional.
SAN19-413 - TEE based Trusted Keys in LinuxFriday, October 4, 2019
Protecting key confidentiality is essential for many kernel security use-cases such as disk encryption, file encryption and protecting the integrity of file metadata. Trusted and encrypted keys provides a mechanism to export keys to user-space for storage as an encrypted blob and for the user-space to later reload them onto Linux keyring without the user-space knowing the encryption key. The existing Trusted Keys implementation relied on a TPM device but what if you are working on a system without one?
This session will introduce a Trusted Keys implementation which relies on a much simpler trusted application running in a Trusted Execution Environment (TEE) for sealing and unsealing of Trusted Keys using a hardware unique key provided by the TEE.