This presentation will give an overview of the Linux UEFI Validation (LUV) project; its motivations and objectives. LUV creates a Linux validation OS which can be used by Linux kernel developers and firmware engineers alike to reduce the development and enabling time of Linux on UEFI systems. It is an architecture-agnostic, automated framework consisting of several open-source test-suites packaged into a cohesive and easy-to-use product. It aims to help uncover bugs in the implementation of UEFI firmware and Linux kernel thereby improving the quality of the interaction between the UEFI firmware and the Linux kernel.
YVR18-403:Improving the interoperability between Linux and UEFI using LUV
BKK19-111 - DRM HW Composer for Beagle X15 BoardTuesday, April 16, 2019
Describing the process of adaptation AOSP DRM HWC to be used on Beagle X15 Board (4.14 kernel).
This can be used as an example of launching the external/drm_hwc on a board: a simple "How to" with the minimun steps required to get the drm_hwc functional.
SAN19-413 - TEE based Trusted Keys in LinuxFriday, October 4, 2019
Protecting key confidentiality is essential for many kernel security use-cases such as disk encryption, file encryption and protecting the integrity of file metadata. Trusted and encrypted keys provides a mechanism to export keys to user-space for storage as an encrypted blob and for the user-space to later reload them onto Linux keyring without the user-space knowing the encryption key. The existing Trusted Keys implementation relied on a TPM device but what if you are working on a system without one?
This session will introduce a Trusted Keys implementation which relies on a much simpler trusted application running in a Trusted Execution Environment (TEE) for sealing and unsealing of Trusted Keys using a hardware unique key provided by the TEE.