2026-03-29 6:18 AM - edited 2026-03-29 6:24 AM
Hello,
we are currently integrating secure boot on an STM32MP15-based platform using the ST OpenSTLinux ecosystem (TF-A + OP-TEE + U-Boot + RAUC / ST update solution here: https://github.com/STMicroelectronics/meta-st-ota/).
During this work, we identified a potential gap in the chain of trust related to the boot filesystem (bootfs), specifically the use of a mutable extlinux.conf.
In our current setup:
With secure boot enabled, if extlinux remains mutable, it cannot be signature-protected, which violates the chain of trust.
What is the recommended approach in ST architecture to handle this?
Specifically:
Any guidance, best practices, or references to ST-secured designs would be highly appreciated.
Thanks in advance!
2026-04-10 8:18 AM
Hello @maxim-senec,
The quick answer would be to build the two bootfs images (A and B) and make them available on the server, so each image is properly signed. This solution also addresses the read-only filesystem issue.
I understand your point, and I will look for a better solution.
Best regards,
Christophe