Skip to content

meta-ti-security: Add new layer for security features#57

Draft
AashvijShenai wants to merge 5 commits intoTexasInstruments:scarthgapfrom
AashvijShenai:meta-ti-security
Draft

meta-ti-security: Add new layer for security features#57
AashvijShenai wants to merge 5 commits intoTexasInstruments:scarthgapfrom
AashvijShenai:meta-ti-security

Conversation

@AashvijShenai
Copy link

@AashvijShenai AashvijShenai commented Mar 10, 2025

DO NOT MERGE THIS PR YET

This new sub layer adds security features that are relevant to TI's
products.

Signed-off-by: Aashvij Shenai <a-shenai@ti.com>
1. For authenticated boot, the initramfs needs to decrypt & verify the
   secure root filesystem. recipes-core/images/files/init_crypt_verity.sh
   will be the init that will run in the initramfs for this purpose.

2. Extend the capabilities of the initramfs image by including dm-crypt
   and dm-verity via cryptsetup, lvm2. e2fsprogs-mke2fs adds support to
   convert partitions to ext4

3. Due to the encryption utility erasing exisiting data when setting up
   the secure partition, a post-install script is being used on the
   target that will setup crypt and verity partitions

Signed-off-by: Aashvij Shenai <a-shenai@ti.com>
1. recipes-kernel/linux/files/security.cfg adds dm-* configs

2. This also specifies the initramfs that needs to be packaged along
   with the kernel. The idea is to use tisdk-default-image build the
   full root filesystem and package the tisdk-tiny-initramfs

Signed-off-by: Aashvij Shenai <a-shenai@ti.com>
This creates a wic image of 4 partitions. dm-crypt and dm-verity require
a partition each.

The crypt partition needs to be as large as the
filesystem it contains + at least 32MB of additional buffer for the
headers.

The verity partition needs about 10% of the size of the partition it is
verifying.

Signed-off-by: Aashvij Shenai <a-shenai@ti.com>
Signed-off-by: Aashvij Shenai <a-shenai@ti.com>
@AashvijShenai
Copy link
Author

AashvijShenai commented Mar 13, 2025

DO NOT MERGE THIS PR

It needs to be worked on further to be functional

@cshilwant
Copy link
Member

@AashvijShenai AashvijShenai marked this pull request as draft March 13, 2025 09:37
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants