SFO15-TR3: Upstreaming 201 ————————————————— Speaker: Track: Training ————————————————— ★ Session Summary ★ This session is an advanced course on Linux kernel upstreaming fundamentals. The course covers how the arm-soc kernel tree is maintained and why that is important to Arm Linux kernel developers. The focus of the course is the explanation of the detailed mechanics of creating and posting patch series to upstream mailing lists for several common cases. Annotated session content is made up of previously upstreamed Arm support captured from emails to the kernel mailing lists. The target audience is both software engineers and engineering managers preparing to upstream software into the kernel. The topic requires a solid background in software configuration management terminology and the git SCM tool as well as a good technical understanding of the Linux kernel itself. ————————————————— ★ Resources ★ pathable: https://sfo15.pathable.com/meetings/302928 Presentation: http://www.slideshare.net/linaroorg/sfo15-t3-upstreaming-201 Video: N Eatherpad: pad.linaro.org/p/sfo15-tr3 ————————————————— ★ Event Details ★ Linaro Connect San Francisco 2015 - #SFO15 September 21-25th, 2015 Hyatt Regency San Francisco Airport ————————————————— > http://www.linaro.org > http://connect.linaro.org
SFO15-TR3 : Upstreaming 201
BKK19-111 - DRM HW Composer for Beagle X15 BoardTuesday, April 16, 2019
Describing the process of adaptation AOSP DRM HWC to be used on Beagle X15 Board (4.14 kernel).
This can be used as an example of launching the external/drm_hwc on a board: a simple "How to" with the minimun steps required to get the drm_hwc functional.
SAN19-413 - TEE based Trusted Keys in LinuxFriday, October 4, 2019
Protecting key confidentiality is essential for many kernel security use-cases such as disk encryption, file encryption and protecting the integrity of file metadata. Trusted and encrypted keys provides a mechanism to export keys to user-space for storage as an encrypted blob and for the user-space to later reload them onto Linux keyring without the user-space knowing the encryption key. The existing Trusted Keys implementation relied on a TPM device but what if you are working on a system without one?
This session will introduce a Trusted Keys implementation which relies on a much simpler trusted application running in a Trusted Execution Environment (TEE) for sealing and unsealing of Trusted Keys using a hardware unique key provided by the TEE.