Skip to content

Initial text for the SCS chapter#1

Merged
jenninikko merged 3 commits intomainfrom
feature/scs_intro
Dec 13, 2022
Merged

Initial text for the SCS chapter#1
jenninikko merged 3 commits intomainfrom
feature/scs_intro

Conversation

@alextserepov
Copy link
Copy Markdown
Contributor

Signed-off-by: Aleksandr Tserepov-Savolainen alextserepov@gmail.com

Signed-off-by: Aleksandr Tserepov-Savolainen <alextserepov@gmail.com>
src/scs/scs.md Outdated
@@ -1,3 +1,7 @@
# SCS
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let's make the full name here.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Agree. Better always open acronyms on topic level.

src/scs/scs.md Outdated

Supply Chain Security is a process of securitng the machinery of the development, build and release environment, in other words, securing every component that a software artifact might be touching on its way from the developer towards the consumer. The software artifact should be encrypted on each possilbe transition phase and the integrity of it should be verified at each destination.

The SBOM (Software Bill Of Materials) containing reference to each dependency, its source and version togerher with provenance, containing build information are collected at the build time, signed and used for vulnerability analysis during the next steps. The SBOM is also published together with the final image, thus making further analysis of the software possible by the end customer.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can agree on introducing acronyms this way instead?
Software Bill of Materials (SBOM)
If yes, I'll also align all text that way.

src/scs/scs.md Outdated
@@ -1,3 +1,7 @@
# SCS

Supply Chain Security is a process of securitng the machinery of the development, build and release environment, in other words, securing every component that a software artifact might be touching on its way from the developer towards the consumer. The software artifact should be encrypted on each possilbe transition phase and the integrity of it should be verified at each destination.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

And here, Supply Chain Security (SCS).
After that, you can use SCS to your heart's extent :-)

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I will add this information to our Style Guide.

src/scs/scs.md Outdated

The SBOM (Software Bill Of Materials) containing reference to each dependency, its source and version togerher with provenance, containing build information are collected at the build time, signed and used for vulnerability analysis during the next steps. The SBOM is also published together with the final image, thus making further analysis of the software possible by the end customer.

The software artifact, SBOM and provenance are signed by the build machinery at the build time and the signature is verifiable at every destination of the package. The certificates that are used for signing and verification are provided by the PKI system and are signed by the same root CA, thus making it possible to easily confirm the signature author (build machinery) and guarantee that the package has not been tampered with since the build time.
Copy link
Copy Markdown
Contributor

@vilvo vilvo Dec 9, 2022

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Public-Key Infrastructure (PKI).
Certfiicate Authority (CA)

Copy link
Copy Markdown
Contributor

@vilvo vilvo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please address the comments on the first introduction of acronyms. At least on topic.

src/scs/scs.md Outdated
@@ -1,3 +1,7 @@
# SCS

Supply Chain Security is a process of securitng the machinery of the development, build and release environment, in other words, securing every component that a software artifact might be touching on its way from the developer towards the consumer. The software artifact should be encrypted on each possilbe transition phase and the integrity of it should be verified at each destination.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The first sentence is too long. Let's do the following:

  1. Let's end the first sentence with the words "release environment". Also, please change it to the following: Supply Chain Security (SCS) is a process of securing the machinery of the development, building and release environment.

  2. The next sentence should be something like this: That means every component that a software artifact might be touching on its way from the developer to the consumer will be secured.

src/scs/scs.md Outdated
@@ -1,3 +1,7 @@
# SCS

Supply Chain Security is a process of securitng the machinery of the development, build and release environment, in other words, securing every component that a software artifact might be touching on its way from the developer towards the consumer. The software artifact should be encrypted on each possilbe transition phase and the integrity of it should be verified at each destination.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In the last sentence:

  1. Misspelling: possilbe -> possible
  2. ... and its integrity should be verified at each destination.

src/scs/scs.md Outdated

Supply Chain Security is a process of securitng the machinery of the development, build and release environment, in other words, securing every component that a software artifact might be touching on its way from the developer towards the consumer. The software artifact should be encrypted on each possilbe transition phase and the integrity of it should be verified at each destination.

The SBOM (Software Bill Of Materials) containing reference to each dependency, its source and version togerher with provenance, containing build information are collected at the build time, signed and used for vulnerability analysis during the next steps. The SBOM is also published together with the final image, thus making further analysis of the software possible by the end customer.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  1. In the first paragraph, you tell about the SCS for the first time. Now we know what is it. How did you go from SCS to SBOM? What is the connection?
  2. Misspelling: togerher -> together

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

will try to come up with a couple of sentences to connect those 2.

src/scs/scs.md Outdated

The SBOM (Software Bill Of Materials) containing reference to each dependency, its source and version togerher with provenance, containing build information are collected at the build time, signed and used for vulnerability analysis during the next steps. The SBOM is also published together with the final image, thus making further analysis of the software possible by the end customer.

The software artifact, SBOM and provenance are signed by the build machinery at the build time and the signature is verifiable at every destination of the package. The certificates that are used for signing and verification are provided by the PKI system and are signed by the same root CA, thus making it possible to easily confirm the signature author (build machinery) and guarantee that the package has not been tampered with since the build time.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What is the connection with the previous paragraphs?
Are SBOM and software artifacts parts of the process?

Signed-off-by: Aleksandr Tserepov-Savolainen <alextserepov@gmail.com>
Signed-off-by: Aleksandr Tserepov-Savolainen <alextserepov@gmail.com>
Copy link
Copy Markdown
Contributor

@jenninikko jenninikko left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you! Let's add the first version and see how it goes.

@jenninikko jenninikko merged commit 3b92b2f into main Dec 13, 2022
alextserepov pushed a commit that referenced this pull request Dec 21, 2022
Signed-off-by: Aleksandr Tserepov-Savolainen <alextserepov@gmail.com>
@jenninikko jenninikko deleted the feature/scs_intro branch December 29, 2022 11:47
@jenninikko jenninikko added the documentation Improvements or additions to documentation label Jan 9, 2023
jpruiz84 pushed a commit to jpruiz84/ghaf that referenced this pull request Jan 23, 2025
enesoztrk pushed a commit to enesoztrk/ghaf that referenced this pull request Mar 26, 2025
Add XDG_DATA_DIRS and LIBGL_ALWAYS_SOFTWARE to wrapper env
vunnyso added a commit to vunnyso/ghaf that referenced this pull request Feb 27, 2026
Some WiFi drivers require at least 1GB of memory to function properly.
The default is updated to improve compatibility while still allowing
overrides via vmConfig.

Resolves the kernel crashes outlined below that are related to memory:

awk: page allocation failure: order:4, mode:0x40820(GFP_ATOMIC|__GFP_COMP), nodemask=(null),cpuset=msFetchUrl.service,mems_allowed=0
CPU: 1 UID: 994 PID: 918 Comm: awk Not tainted 6.18.8 tiiuae#1-NixOS PREEMPT(voluntary)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.17.0-0-gb52ca86e094d-prebuilt.qemu.org 04/01/2014
Call Trace:
 <TASK>
 dump_stack_lvl+0x5d/0x80
 warn_alloc+0x163/0x190
 ? wakeup_kswapd+0xa3/0x1d0
 __alloc_frozen_pages_noprof+0xc47/0x10f0
 ? get_page_from_freelist+0x1a06/0x1c20
 alloc_pages_mpol+0x86/0x170
 ? virtio_fs_enqueue_req+0x214/0x600 [virtiofs]
 ___kmalloc_large_node+0x99/0xb0
 __kmalloc_large_node_noprof+0x1d/0xb0
 __kmalloc_noprof+0x4dd/0x700
 ? __alloc_frozen_pages_noprof+0x478/0x10f0
 ? virtio_fs_enqueue_req+0x214/0x600 [virtiofs]
 virtio_fs_enqueue_req+0x214/0x600 [virtiofs]
 virtio_fs_send_req+0x51/0x110 [virtiofs]
 __fuse_simple_request+0x118/0x310 [fuse]
 fuse_readdir_uncached+0x16f/0x8c0 [fuse]
 ? virtqueue_add_sgs+0xb5/0xd0 [virtio_ring]
 ? vp_notify+0x16/0x20 [virtio_pci]
 ? virtqueue_notify+0x1f/0x40 [virtio_ring]
 ? virtio_fs_enqueue_req+0x50c/0x600 [virtiofs]
 iterate_dir+0xaa/0x270
 ovl_iterate+0x168/0x3a0 [overlay]
 ? __pfx_ovl_iterate+0x10/0x10 [overlay]
 wrap_directory_iterator+0x4b/0x70
 iterate_dir+0xaa/0x270
 __x64_sys_getdents64+0x7b/0x110
 ? __pfx_filldir64+0x10/0x10
 do_syscall_64+0xb6/0x7e0
 ? exc_page_fault+0x6a/0x150

Signed-off-by: Vunny Sodhi <vunny.sodhi@unikie.com>
vunnyso added a commit to vunnyso/ghaf that referenced this pull request Feb 27, 2026
Some WiFi drivers require at least 1GB of memory to function properly.
The default is updated to improve compatibility while still allowing
overrides via vmConfig.

Resolves the kernel crashes outlined below that are related to memory:

awk: page allocation failure: order:4, mode:0x40820(GFP_ATOMIC|__GFP_COMP), nodemask=(null),cpuset=msFetchUrl.service,mems_allowed=0
CPU: 1 UID: 994 PID: 918 Comm: awk Not tainted 6.18.8 tiiuae#1-NixOS PREEMPT(voluntary)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.17.0-0-gb52ca86e094d-prebuilt.qemu.org 04/01/2014
Call Trace:
 <TASK>
 dump_stack_lvl+0x5d/0x80
 warn_alloc+0x163/0x190
 ? wakeup_kswapd+0xa3/0x1d0
 __alloc_frozen_pages_noprof+0xc47/0x10f0
 ? get_page_from_freelist+0x1a06/0x1c20
 alloc_pages_mpol+0x86/0x170
 ? virtio_fs_enqueue_req+0x214/0x600 [virtiofs]
 ___kmalloc_large_node+0x99/0xb0
 __kmalloc_large_node_noprof+0x1d/0xb0
 __kmalloc_noprof+0x4dd/0x700
 ? __alloc_frozen_pages_noprof+0x478/0x10f0
 ? virtio_fs_enqueue_req+0x214/0x600 [virtiofs]
 virtio_fs_enqueue_req+0x214/0x600 [virtiofs]
 virtio_fs_send_req+0x51/0x110 [virtiofs]
 __fuse_simple_request+0x118/0x310 [fuse]
 fuse_readdir_uncached+0x16f/0x8c0 [fuse]
 ? virtqueue_add_sgs+0xb5/0xd0 [virtio_ring]
 ? vp_notify+0x16/0x20 [virtio_pci]
 ? virtqueue_notify+0x1f/0x40 [virtio_ring]
 ? virtio_fs_enqueue_req+0x50c/0x600 [virtiofs]
 iterate_dir+0xaa/0x270
 ovl_iterate+0x168/0x3a0 [overlay]
 ? __pfx_ovl_iterate+0x10/0x10 [overlay]
 wrap_directory_iterator+0x4b/0x70
 iterate_dir+0xaa/0x270
 __x64_sys_getdents64+0x7b/0x110
 ? __pfx_filldir64+0x10/0x10
 do_syscall_64+0xb6/0x7e0
 ? exc_page_fault+0x6a/0x150

Signed-off-by: Vunny Sodhi <vunny.sodhi@unikie.com>
vunnyso added a commit to vunnyso/ghaf that referenced this pull request Mar 2, 2026
Some WiFi drivers require at least 1GB of memory to function properly.
The default is updated to improve compatibility while still allowing
overrides via vmConfig.

Resolves the kernel crashes outlined below that are related to memory:

awk: page allocation failure: order:4, mode:0x40820(GFP_ATOMIC|__GFP_COMP), nodemask=(null),cpuset=msFetchUrl.service,mems_allowed=0
CPU: 1 UID: 994 PID: 918 Comm: awk Not tainted 6.18.8 tiiuae#1-NixOS PREEMPT(voluntary)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.17.0-0-gb52ca86e094d-prebuilt.qemu.org 04/01/2014
Call Trace:
 <TASK>
 dump_stack_lvl+0x5d/0x80
 warn_alloc+0x163/0x190
 ? wakeup_kswapd+0xa3/0x1d0
 __alloc_frozen_pages_noprof+0xc47/0x10f0
 ? get_page_from_freelist+0x1a06/0x1c20
 alloc_pages_mpol+0x86/0x170
 ? virtio_fs_enqueue_req+0x214/0x600 [virtiofs]
 ___kmalloc_large_node+0x99/0xb0
 __kmalloc_large_node_noprof+0x1d/0xb0
 __kmalloc_noprof+0x4dd/0x700
 ? __alloc_frozen_pages_noprof+0x478/0x10f0
 ? virtio_fs_enqueue_req+0x214/0x600 [virtiofs]
 virtio_fs_enqueue_req+0x214/0x600 [virtiofs]
 virtio_fs_send_req+0x51/0x110 [virtiofs]
 __fuse_simple_request+0x118/0x310 [fuse]
 fuse_readdir_uncached+0x16f/0x8c0 [fuse]
 ? virtqueue_add_sgs+0xb5/0xd0 [virtio_ring]
 ? vp_notify+0x16/0x20 [virtio_pci]
 ? virtqueue_notify+0x1f/0x40 [virtio_ring]
 ? virtio_fs_enqueue_req+0x50c/0x600 [virtiofs]
 iterate_dir+0xaa/0x270
 ovl_iterate+0x168/0x3a0 [overlay]
 ? __pfx_ovl_iterate+0x10/0x10 [overlay]
 wrap_directory_iterator+0x4b/0x70
 iterate_dir+0xaa/0x270
 __x64_sys_getdents64+0x7b/0x110
 ? __pfx_filldir64+0x10/0x10
 do_syscall_64+0xb6/0x7e0
 ? exc_page_fault+0x6a/0x150

Signed-off-by: Vunny Sodhi <vunny.sodhi@unikie.com>
brianmcgillion pushed a commit that referenced this pull request Mar 6, 2026
Some WiFi drivers require at least 1GB of memory to function properly.
The default is updated to improve compatibility while still allowing
overrides via vmConfig.

Resolves the kernel crashes outlined below that are related to memory:

awk: page allocation failure: order:4, mode:0x40820(GFP_ATOMIC|__GFP_COMP), nodemask=(null),cpuset=msFetchUrl.service,mems_allowed=0
CPU: 1 UID: 994 PID: 918 Comm: awk Not tainted 6.18.8 #1-NixOS PREEMPT(voluntary)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.17.0-0-gb52ca86e094d-prebuilt.qemu.org 04/01/2014
Call Trace:
 <TASK>
 dump_stack_lvl+0x5d/0x80
 warn_alloc+0x163/0x190
 ? wakeup_kswapd+0xa3/0x1d0
 __alloc_frozen_pages_noprof+0xc47/0x10f0
 ? get_page_from_freelist+0x1a06/0x1c20
 alloc_pages_mpol+0x86/0x170
 ? virtio_fs_enqueue_req+0x214/0x600 [virtiofs]
 ___kmalloc_large_node+0x99/0xb0
 __kmalloc_large_node_noprof+0x1d/0xb0
 __kmalloc_noprof+0x4dd/0x700
 ? __alloc_frozen_pages_noprof+0x478/0x10f0
 ? virtio_fs_enqueue_req+0x214/0x600 [virtiofs]
 virtio_fs_enqueue_req+0x214/0x600 [virtiofs]
 virtio_fs_send_req+0x51/0x110 [virtiofs]
 __fuse_simple_request+0x118/0x310 [fuse]
 fuse_readdir_uncached+0x16f/0x8c0 [fuse]
 ? virtqueue_add_sgs+0xb5/0xd0 [virtio_ring]
 ? vp_notify+0x16/0x20 [virtio_pci]
 ? virtqueue_notify+0x1f/0x40 [virtio_ring]
 ? virtio_fs_enqueue_req+0x50c/0x600 [virtiofs]
 iterate_dir+0xaa/0x270
 ovl_iterate+0x168/0x3a0 [overlay]
 ? __pfx_ovl_iterate+0x10/0x10 [overlay]
 wrap_directory_iterator+0x4b/0x70
 iterate_dir+0xaa/0x270
 __x64_sys_getdents64+0x7b/0x110
 ? __pfx_filldir64+0x10/0x10
 do_syscall_64+0xb6/0x7e0
 ? exc_page_fault+0x6a/0x150

Signed-off-by: Vunny Sodhi <vunny.sodhi@unikie.com>
tkaratapanis pushed a commit to tkaratapanis/ghaf that referenced this pull request Mar 23, 2026
Add a Unified Kernel Image (UKI) option for the SD card image ESP.
When ghaf.image.sdcard.uki.enable is set, the ESP is populated with
a single UKI binary instead of the traditional Type tiiuae#1 BLS entries
produced by mk-esp-contents.py.

The UKI bundles kernel, initrd, cmdline, DTB, and os-release into a
PE/COFF binary that systemd-boot discovers automatically from
EFI/Linux/. This is a prerequisite for secure boot, which can
authenticate all bundled components as a single signed image.

Signed-off-by: Theodore Karatapanis <tkaratapanis@census-labs.com>
tkaratapanis pushed a commit to tkaratapanis/ghaf that referenced this pull request Mar 23, 2026
Add a Unified Kernel Image (UKI) option for the SD card image ESP.
When ghaf.image.sdcard.uki.enable is set, the ESP is populated with
a single UKI binary instead of the traditional Type tiiuae#1 BLS entries
produced by mk-esp-contents.py.

The UKI bundles kernel, initrd, cmdline, DTB, and os-release into a
PE/COFF binary that systemd-boot discovers automatically from
EFI/Linux/. This is a prerequisite for secure boot, which can
authenticate all bundled components as a single signed image.

Signed-off-by: Theodore Karatapanis <tkaratapanis@census-labs.com>
tkaratapanis pushed a commit to tkaratapanis/ghaf that referenced this pull request Mar 23, 2026
Add a Unified Kernel Image (UKI) option for the SD card image ESP.
When ghaf.image.sdcard.uki.enable is set, the ESP is populated with
a single UKI binary instead of the traditional Type tiiuae#1 BLS entries
produced by mk-esp-contents.py with separate kernel, initrd and DTB
binaries.

The UKI (Type tiiuae#2 BLS entry) bundles kernel, initrd, cmdline, DTB,
and os-release into a single binary that systemd-boot discovers
automatically from EFI/Linux/.

Signed-off-by: Theodore Karatapanis <tkaratapanis@census-labs.com>
tkaratapanis added a commit to tkaratapanis/ghaf that referenced this pull request Mar 23, 2026
Add a Unified Kernel Image (UKI) option for the SD card image ESP.
When ghaf.image.sdcard.uki.enable is set, the ESP is populated with
a single UKI binary instead of the traditional Type tiiuae#1 BLS entries
produced by mk-esp-contents.py with separate kernel, initrd and DTB
binaries.

The UKI (Type tiiuae#2 BLS entry) bundles kernel, initrd, cmdline, DTB,
and os-release into a single binary that systemd-boot discovers
automatically from EFI/Linux/.

Signed-off-by: Theodore Karatapanis <tkaratapanis@census-labs.com>
tkaratapanis added a commit to tkaratapanis/ghaf that referenced this pull request Mar 23, 2026
Add a Unified Kernel Image (UKI) option for the SD card image ESP.
When ghaf.image.sdcard.uki.enable is set, the ESP is populated with
a single UKI binary instead of the traditional Type tiiuae#1 BLS entries
produced by mk-esp-contents.py with separate kernel, initrd and DTB
binaries.

The UKI (Type tiiuae#2 BLS entry) bundles kernel, initrd, cmdline, DTB,
and os-release into a single binary that systemd-boot discovers
automatically from EFI/Linux/.

Signed-off-by: Theodore Karatapanis <tkaratapanis@census-labs.com>
tkaratapanis added a commit to tkaratapanis/ghaf that referenced this pull request Mar 23, 2026
Add a Unified Kernel Image (UKI) option for the SD card image ESP.
When ghaf.image.sdcard.uki.enable is set, the ESP is populated with
a single UKI binary instead of the traditional Type tiiuae#1 BLS entries
produced by mk-esp-contents.py with separate kernel, initrd and DTB
binaries.

The UKI (Type tiiuae#2 BLS entry) bundles kernel, initrd, cmdline, DTB,
and os-release into a single binary that systemd-boot discovers
automatically from EFI/Linux/.

Signed-off-by: Theodore Karatapanis <tkaratapanis@census-labs.com>
tkaratapanis added a commit to tkaratapanis/ghaf that referenced this pull request Mar 24, 2026
Add a Unified Kernel Image (UKI) option for the SD card image ESP.
When ghaf.image.sdcard.uki.enable is set, the ESP is populated with
a single UKI binary instead of the traditional Type tiiuae#1 BLS entry
produced by mk-esp-contents.py with separate kernel, initrd and DTB
binaries.

The UKI (Type tiiuae#2 BLS entry) bundles kernel, initrd, cmdline, DTB,
and os-release into a single binary that systemd-boot discovers
automatically from EFI/Linux/.

Signed-off-by: Theodore Karatapanis <tkaratapanis@census-labs.com>
tkaratapanis added a commit to tkaratapanis/ghaf that referenced this pull request Mar 24, 2026
Add a Unified Kernel Image (UKI) option for the SD card image ESP.
When ghaf.image.sdcard.uki.enable is set, the ESP is populated with
a single UKI binary instead of the traditional Type tiiuae#1 BLS entry
produced by mk-esp-contents.py with separate kernel, initrd and DTB
binaries.

The UKI (Type tiiuae#2 BLS entry) bundles kernel, initrd, cmdline, DTB,
and os-release into a single binary that systemd-boot discovers
automatically from EFI/Linux/.

Signed-off-by: Theodore Karatapanis <tkaratapanis@census-labs.com>
tkaratapanis added a commit to tkaratapanis/ghaf that referenced this pull request Mar 24, 2026
Add a Unified Kernel Image (UKI) option for the SD card image ESP.
When ghaf.image.sdcard.uki.enable is set, the ESP is populated with
a single UKI binary instead of the traditional Type tiiuae#1 BLS entry
produced by mk-esp-contents.py with separate kernel, initrd and DTB
binaries.

The UKI (Type tiiuae#2 BLS entry) bundles kernel, initrd, cmdline, DTB,
and os-release into a single binary that systemd-boot discovers
automatically from EFI/Linux/.

Signed-off-by: Theodore Karatapanis <tkaratapanis@census-labs.com>
tkaratapanis added a commit to tkaratapanis/ghaf that referenced this pull request Mar 24, 2026
Add a Unified Kernel Image (UKI) option for the SD card image ESP.
When ghaf.image.sdcard.uki.enable is set, the ESP is populated with
a single UKI binary instead of the traditional Type tiiuae#1 BLS entry
produced by mk-esp-contents.py with separate kernel, initrd and DTB
binaries.

The UKI (Type tiiuae#2 BLS entry) bundles kernel, initrd, cmdline, DTB,
and os-release into a single binary that systemd-boot discovers
automatically from EFI/Linux/.

Signed-off-by: Theodore Karatapanis <tkaratapanis@census-labs.com>
tkaratapanis added a commit to tkaratapanis/ghaf that referenced this pull request Mar 24, 2026
Add a Unified Kernel Image (UKI) option for the SD card image ESP.
When ghaf.image.sdcard.uki.enable is set, the ESP is populated with
a single UKI binary instead of the traditional Type tiiuae#1 BLS entry
produced by mk-esp-contents.py with separate kernel, initrd and DTB
binaries.

The UKI (Type tiiuae#2 BLS entry) bundles kernel, initrd, cmdline, DTB,
and os-release into a single binary that systemd-boot discovers
automatically from EFI/Linux/.

Signed-off-by: Theodore Karatapanis <tkaratapanis@census-labs.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

documentation Improvements or additions to documentation

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants