All of lore.kernel.org
 help / color / mirror / Atom feed
From: Marek Vasut <marex@denx.de>
To: Patrick DELAUNAY <patrick.delaunay@foss.st.com>,
	Alexandru Gagniuc <mr.nuke.me@gmail.com>,
	u-boot@lists.denx.de
Cc: Etienne Carriere <etienne.carriere@linaro.org>,
	Patrice CHOTARD <patrice.chotard@foss.st.com>,
	Tom Rini <trini@konsulko.com>
Subject: Re: [RFC PATCH] stm32mp1: Replace STM32IMAGE config with TFABOOT_FIP
Date: Tue, 31 Aug 2021 18:42:16 +0200	[thread overview]
Message-ID: <5dce263b-7325-9119-cb2b-74a9f397b970@denx.de> (raw)
In-Reply-To: <b3881cf7-1a22-bf7a-9dad-548501df94df@foss.st.com>

On 8/31/21 4:54 PM, Patrick DELAUNAY wrote:
> Hi Alexandru,

Hi,

> On 8/26/21 11:47 PM, Alexandru Gagniuc wrote:
>> Hi Patrick,
>>
>> I proposing a better fix fir the issues I outlined earlier, I made a
>> classification of the currently supported boot modes.
>>
>>     1) BL1 -> SPL -> U-Boot
>>     2) BL1 -> SPL -> OP-TEE
>> ---------------------------------------------------------------------
>> |  3) BL1 -> TF-A -> U-Boot                                         |
>> |  4) BL1 -> TF-A -> OP-TEE                                         |
>> | _________________________________________________________________ |
>> || 5) BL1 -> TF-A -> FIP container                                 ||
>> || CONFIG_TFABOOT_FIP                                              ||
>> ||_________________________________________________________________||
>> |                                                                   |
>> | CONFIG_TFABOOT                                                    |
>> ---------------------------------------------------------------------
>>
>> Here, I'm looking at FIP as a new boot mode. In order to avoid
>> breakage, any changes to support FIP it should naturally be done only
>> to this new path.
>>
>> This proposal contains several changes, but I've squashed them into
>> one for ease of discussion.
>>
>> This better matches the boot mode classification above.
> 
> 1) is supported but with many constraint for security part and low power 
> management
> 
>      it is not recommended for real product / it will be not supported 
> by STMicroelectronics

Does this mean ST will be cutting off their own customers who use this 
boot mode because they do not need/want additional complex 
problematically licensed components in their boot chain and/or ST will 
be forcing those customers into adding such unneeded/unwanted components 
unconditionally ?

I am strongly opposed to that.

I would argue that the U-Boot crypto code went through multiple 
independent security reviews, personally I trust that more than code 
fully controlled and maintained by any one single company, so I am not 
buying the security constraint argument here.

Regarding power management and low power modes, there is literally 
nothing preventing Linux from implementing those low power modes, so 
there is no reason to hide all that code in firmware, so I am not buying 
the low power argument either.

Finally, the argument that the component that is being forced upon 
everyone is "open source" is really turning any design with such a SoC 
into a huge risk.

There have been SoCs where the vendor took "open source" bootloader 
code, compiled a blob, released a blob and never gave out the sources, 
because it is "open source" and not "free software", the BSD license 
permits such practice, GPL does not. Whoever wanted to design a board or 
SoM with such a SoC, had to adjust their design to match that one blob. 
Of course, that also implies that any security problems were not fixable 
in that blob.

[...]

  reply	other threads:[~2021-08-31 16:42 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-08-24 20:30 Massive stm32mp1 breakage with v2021.10-rc2 Alex G.
2021-08-26 21:47 ` [RFC PATCH] stm32mp1: Replace STM32IMAGE config with TFABOOT_FIP Alexandru Gagniuc
2021-08-31 14:54   ` Patrick DELAUNAY
2021-08-31 16:42     ` Marek Vasut [this message]
2021-09-01  9:07       ` Patrick DELAUNAY
2021-09-03 15:32         ` Marek Vasut
2021-09-03 17:47           ` Alex G.
2021-09-06  6:16             ` Etienne Carriere

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=5dce263b-7325-9119-cb2b-74a9f397b970@denx.de \
    --to=marex@denx.de \
    --cc=etienne.carriere@linaro.org \
    --cc=mr.nuke.me@gmail.com \
    --cc=patrice.chotard@foss.st.com \
    --cc=patrick.delaunay@foss.st.com \
    --cc=trini@konsulko.com \
    --cc=u-boot@lists.denx.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.