Hi Morné,

thanks for you answer. Maybe, I will explain more: we have a Dragonboard 410c based hardware. We use a read-only rootfs in one partition (actually two with A/B approach) and we have a data partition for user data as well as device specific data. We can partition and flash the device through fastboot. So, if we can prepare ext4 filesystems (maybe through yocto instead of hand-crafted scripting) for each device, commissioning will be an easy task for the manufacturer.

I guess, we are not the only ones that need to store device specific information besides the rootfs, and I do not find a whole lot about it in the yocto manuals. I wonder, if there are best practices, how to protect the data from getting corrupted (intentionally by an attacker or by accident through ... flash corruption or whatever).

Regards,

   Matthias

On 6/24/19 9:08 AM, Morné Lamprecht wrote:
On Mon, Jun 17, 2019 at 05:25:56PM +0200, Matthias Schoepfer wrote:
Is there a smart, recommended way to deal with device specific data (i.e.  serial number, credentials for backend access, you name it), that is specific for *one* device, and hence does not belong into the rootfs. I know, that there are (safe) hardware stores for it, but what, if your device does not have one.

Not sure if I'm misunderstanding your question, but this should be part of your device commissioning process, i.e. like injecting specific security keys etc...so basically this will part of your image install / flash process, and not really part of the Yocto build process. The specifics of such a process would depend on your specific commissioning process.

        - Morné
--
_______________________________________________
yocto mailing list
yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/yocto

Reply via email to