Skip to content

feat(linux): Add fTPM based filesystem encryption rst#660

Open
shiva-ti wants to merge 1 commit intoTexasInstruments:masterfrom
shiva-ti:ftpm_encrypted_boot
Open

feat(linux): Add fTPM based filesystem encryption rst#660
shiva-ti wants to merge 1 commit intoTexasInstruments:masterfrom
shiva-ti:ftpm_encrypted_boot

Conversation

@shiva-ti
Copy link
Copy Markdown
Collaborator

Add new security subsection for fTPM based filesystem encryption feature.
Enable this documentation for AM62AX, AM62AX, AM62PX, AM62LX as per testing done with 12.0 SDK.

Copy link
Copy Markdown
Contributor

@Pratham-T Pratham-T left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Enable this documentation for AM62AX, AM62AX, AM62PX, AM62LX

Correct the commit message

@shiva-ti shiva-ti force-pushed the ftpm_encrypted_boot branch from 0749309 to b1b9add Compare April 13, 2026 11:07
@shiva-ti shiva-ti requested a review from Pratham-T April 13, 2026 11:08
Comment thread source/linux/Foundational_Components/System_Security/Security_overview.rst Outdated
Comment thread source/linux/Foundational_Components/System_Security/Security_overview.rst Outdated
Copy link
Copy Markdown
Member

@StaticRocket StaticRocket left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Two vale comments, but otherwise this looks fine to me

Comment thread source/linux/Foundational_Components/System_Security/Filesystem_Encryption.rst Outdated
Comment thread source/linux/Foundational_Components/System_Security/Filesystem_Encryption.rst Outdated
@shiva-ti shiva-ti force-pushed the ftpm_encrypted_boot branch from b1b9add to 03c35d9 Compare April 15, 2026 10:22
@shiva-ti shiva-ti requested a review from StaticRocket April 15, 2026 10:24
Comment thread source/linux/Foundational_Components/System_Security/Filesystem_Encryption.rst Outdated
@shiva-ti shiva-ti force-pushed the ftpm_encrypted_boot branch from 03c35d9 to f620288 Compare April 16, 2026 06:10
Add new security subsection for fTPM based filesystem encryption
feature.
Enable this documentation for AM62X, AM62AX, AM62PX, AM62LX as per
testing done with 12.0 SDK.

Signed-off-by: Shiva Tripathi <s-tripathi1@ti.com>
@shiva-ti shiva-ti force-pushed the ftpm_encrypted_boot branch from f620288 to ecd67c4 Compare April 16, 2026 06:25
@shiva-ti shiva-ti requested a review from StaticRocket April 16, 2026 06:26
steps specific to LUKS:

#. Use the latest :ref:`oe-config file <yocto-layer-configuration>`, using
the "luks" specific config.
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
the "luks" specific config.
the LUKS specific config.

Comment on lines +165 to +166
components in yocto setup should be configured to make use of these
hardware keys.
Copy link
Copy Markdown
Member

@StaticRocket StaticRocket Apr 17, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
components in yocto setup should be configured to make use of these
hardware keys.
components in Yocto should be configured to make use of these
hardware keys.

- Once the keys are written to RPMB, the optee-os and optee-client
components in yocto setup should be configured to make use of these
hardware keys.
Following can be used in yocto for the same:
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Following can be used in yocto for the same:
The following explains how Yocto should be configured:

hardware keys.
Following can be used in yocto for the same:

- for **optee-os**: under meta-ti layer:
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- for **optee-os**: under meta-ti layer:
- **optee-os**: under the ``meta-ti`` layer

Following can be used in yocto for the same:

- for **optee-os**: under meta-ti layer:
*"meta-ti-bsp/recipes-security/optee/optee-os-ti-overrides.inc"*
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
*"meta-ti-bsp/recipes-security/optee/optee-os-ti-overrides.inc"*
:file:`meta-ti-bsp/recipes-security/optee/optee-os-ti-overrides.inc`


EXTRA_OECMAKE:append = " -DRPMB_EMU=OFF"

- **u-boot configuration**: The kernel Image and dtbs are read from the
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- **u-boot configuration**: The kernel Image and dtbs are read from the
- **u-boot**: The kernel Image and dtbs are read from the

EXTRA_OECMAKE:append = " -DRPMB_EMU=OFF"

- **u-boot configuration**: The kernel Image and dtbs are read from the
root partition of SD by default. But since this implemenation encrypts the root
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
root partition of SD by default. But since this implemenation encrypts the root
root partition of SD by default. Since this implementation encrypts the root

Comment on lines +191 to +192
and initramfs from the boot partition. This can be done using such
following change in uboot (can be a patch in u-boot meta-ti layer):
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
and initramfs from the boot partition. This can be done using such
following change in uboot (can be a patch in u-boot meta-ti layer):
and initramfs from the boot partition. This can be done by overriding the ``CONFIG_BOOTCOMMAND``:

Comment on lines +236 to +237
- Size of initramfs image can be reduced by using the busybox
optimizations, for reference:
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Size of initramfs image can be reduced by using the busybox
optimizations, for reference:
- The size of initramfs image can be reduced by using busybox:


- The first boot involves encryption of complete root filesystem using the
ARM aes-generic (software implmentation), giving around 17.0 MB/s of
performance. This makes use of "cryptsetup reencrypt" which reads,
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
performance. This makes use of "cryptsetup reencrypt" which reads,
performance. This makes use of :command:`cryptsetup reencrypt` which reads,

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

8 participants