mirror of
https://git.yoctoproject.org/meta-ti
synced 2026-04-04 01:59:02 +00:00
Compare commits
11 Commits
cicd.maste
...
master
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
3db8ddf7f8 | ||
|
|
7640ce6a58 | ||
|
|
764817c28e | ||
|
|
bd0e3d7ba5 | ||
|
|
6f205ef079 | ||
|
|
4c4f4b495d | ||
|
|
ed4c7f9ead | ||
|
|
e00f8d22d8 | ||
|
|
36901e8b0f | ||
|
|
2537d1cce4 | ||
|
|
60d0643b51 |
@@ -19,7 +19,8 @@
|
||||
"meta-ti-bsp/recipes-devtools/binutils/binutils-cross-canadian_%.bbappend",
|
||||
"meta-ti-bsp/recipes-security/optee/optee-%.bbappend",
|
||||
"meta-ti-bsp/dynamic-layers/openembedded-layer/recipes-bsp/u-boot/u-boot-ti-%.bbappend",
|
||||
"meta-ti-bsp/dynamic-layers/openembedded-layer/recipes-ti/initramfs/packagegroup-ti-core-initramfs.bbappend"
|
||||
"meta-ti-bsp/dynamic-layers/openembedded-layer/recipes-ti/initramfs/packagegroup-ti-core-initramfs.bbappend",
|
||||
"meta-ti-bsp/dynamic-layers/tpm-layer/recipes-ti/initramfs/packagegroup-ti-core-initramfs.bbappend"
|
||||
]
|
||||
},
|
||||
"GUARD-2" : {
|
||||
|
||||
@@ -20,10 +20,13 @@ LAYERDEPENDS_meta-ti-bsp = " \
|
||||
|
||||
LAYERRECOMMENDS_meta-ti-bsp = " \
|
||||
openembedded-layer \
|
||||
tpm-layer \
|
||||
"
|
||||
|
||||
BBFILES_DYNAMIC += " \
|
||||
openembedded-layer:${LAYERDIR}/dynamic-layers/openembedded-layer/recipes*/*/*.bbappend \
|
||||
tpm-layer:${LAYERDIR}/dynamic-layers/tpm-layer/recipes*/*/*.bb \
|
||||
tpm-layer:${LAYERDIR}/dynamic-layers/tpm-layer/recipes*/*/*.bbappend \
|
||||
"
|
||||
|
||||
SIGGEN_EXCLUDERECIPES_ABISAFE += " \
|
||||
|
||||
@@ -6,7 +6,7 @@ require conf/machine/include/am62lxx.inc
|
||||
|
||||
IMAGE_FSTYPES += "ubifs ubi"
|
||||
|
||||
MKUBIFS_ARGS ?= "-F -m 4096 -e 258048 -c 8500"
|
||||
MKUBIFS_ARGS ?= "-F -m 4096 -e 258048 -c 12000"
|
||||
|
||||
UBINIZE_ARGS ?= "-m 4096 -p 256KiB -s 1024 -O 1024"
|
||||
|
||||
@@ -17,3 +17,10 @@ KERNEL_DEVICETREE_PREFIX = " \
|
||||
KERNEL_DEVICETREE = ""
|
||||
|
||||
UBOOT_MACHINE = "am62lx_evm_defconfig"
|
||||
FIT_CONF_DEFAULT_DTB = "k3-am62l3-evm.dtb"
|
||||
UBOOT_LOADADDRESS = "0x82400000"
|
||||
UBOOT_ENTRYPOINT = "0x82400000"
|
||||
UBOOT_RD_LOADADDRESS = "0x84000000"
|
||||
UBOOT_RD_ENTRYPOINT = "0x84000000"
|
||||
UBOOT_DTB_LOADADDRESS = "0x84f00000"
|
||||
UBOOT_DTBO_LOADADDRESS = "0x84f80000"
|
||||
|
||||
@@ -9,5 +9,5 @@ UBOOT_MACHINE:tie-test-builds = ""
|
||||
|
||||
UBOOT_CONFIG = ""
|
||||
UBOOT_CONFIG:prepend:tie-test-builds = "usbdfu main"
|
||||
UBOOT_CONFIG[main] = "am62x_evm_r5_defconfig"
|
||||
UBOOT_CONFIG[main] = "am65x_evm_r5_defconfig"
|
||||
UBOOT_CONFIG[usbdfu] = "am65x_evm_r5_usbdfu_defconfig"
|
||||
|
||||
@@ -5,7 +5,7 @@
|
||||
# TI_CORE_INITRAMFS_ENABLED = "0"
|
||||
#
|
||||
#------------------------------------------------------------------------------
|
||||
TI_CORE_INITRAMFS_ENABLED ?= "${@ '1' if d.getVar('TI_CORE_INITRAMFS_KERNEL_MODULES') or d.getVar('TI_CORE_INITRAMFS_EXTRA_INSTALL') else '0'}"
|
||||
TI_CORE_INITRAMFS_ENABLED ?= "${@ '1' if d.getVar('TI_CORE_INITRAMFS_KERNEL_MODULES') or d.getVar('TI_CORE_INITRAMFS_EXTRA_INSTALL') or bb.utils.contains('DISTRO_FEATURES', 'luks', True, False, d) else '0'}"
|
||||
|
||||
TI_CORE_INITRAMFS_KERNEL_MODULES ?= ""
|
||||
TI_CORE_INITRAMFS_EXTRA_INSTALL ?= ""
|
||||
|
||||
@@ -0,0 +1,341 @@
|
||||
#!/bin/sh
|
||||
# initramfs-framework module for LUKS encryption with fTPM support
|
||||
|
||||
# Configuration
|
||||
BOOT_DEV="/dev/mmcblk1p1" # Boot partition (FAT, unencrypted)
|
||||
ROOT_DEV="/dev/mmcblk1p2" # Root partition (will be encrypted)
|
||||
CRYPT_NAME="root_crypt"
|
||||
CRYPT_DEV="/dev/mapper/${CRYPT_NAME}"
|
||||
BOOT_MNT="/boot_part"
|
||||
TPM_PRIMARY_CTX="/tmp/tpm_primary.ctx"
|
||||
TPM_KEY_PRIV="/tmp/tpm_key.priv"
|
||||
TPM_KEY_PUB="/tmp/tpm_key.pub"
|
||||
TPM_KEY_CTX="/tmp/tpm_key.ctx"
|
||||
TPM2_HANDLE="0x81080001" # TPM persistent handle for LUKS key
|
||||
ENCRYPTION_MARKER="${BOOT_MNT}/.encryption_in_progress"
|
||||
|
||||
# Wait for MMC device to appear
|
||||
wait_for_device() {
|
||||
local device="$1"
|
||||
local timeout="${2:-10}"
|
||||
|
||||
msg "Waiting for storage device ${device}..."
|
||||
for i in $(seq 1 ${timeout}); do
|
||||
if [ -b "${device}" ]; then
|
||||
return 0
|
||||
fi
|
||||
sleep 1
|
||||
done
|
||||
return 1
|
||||
}
|
||||
|
||||
# Initialize fTPM and check availability
|
||||
init_ftpm() {
|
||||
msg "Initializing secure hardware (fTPM)..."
|
||||
|
||||
# Start TEE supplicant (required for fTPM TA to work)
|
||||
if [ -x /usr/sbin/tee-supplicant ]; then
|
||||
/usr/sbin/tee-supplicant -d &
|
||||
TEE_SUPPLICANT_PID=$!
|
||||
sleep 5
|
||||
else
|
||||
info "Warning: Trusted execution environment not available"
|
||||
return 1
|
||||
fi
|
||||
|
||||
# Load fTPM kernel module
|
||||
if ! /sbin/modprobe tpm_ftpm_tee; then
|
||||
info "Warning: TPM module failed to load"
|
||||
return 1
|
||||
fi
|
||||
|
||||
# Wait for TPM device
|
||||
for i in $(seq 1 10); do
|
||||
if [ -c /dev/tpmrm0 ]; then
|
||||
export TPM2TOOLS_TCTI="device:/dev/tpmrm0"
|
||||
return 0
|
||||
fi
|
||||
sleep 1
|
||||
done
|
||||
|
||||
info "Warning: fTPM not available - encryption will be skipped"
|
||||
return 1
|
||||
}
|
||||
|
||||
# Generate 32-byte random key using TPM RNG
|
||||
generate_random_key() {
|
||||
/usr/bin/tpm2_getrandom --hex 32
|
||||
}
|
||||
|
||||
# Seal data with TPM and store in persistent handle
|
||||
tpm_seal_key() {
|
||||
local KEY_DATA="$1"
|
||||
|
||||
# Create primary key in owner hierarchy
|
||||
/usr/bin/tpm2_createprimary -C o -c "${TPM_PRIMARY_CTX}" -Q || return 1
|
||||
|
||||
# Create sealed object
|
||||
echo -n "${KEY_DATA}" | \
|
||||
/usr/bin/tpm2_create -C "${TPM_PRIMARY_CTX}" \
|
||||
-u "${TPM_KEY_PUB}" -r "${TPM_KEY_PRIV}" \
|
||||
-i- -Q || return 1
|
||||
|
||||
# Load sealed object into TPM
|
||||
/usr/bin/tpm2_load -C "${TPM_PRIMARY_CTX}" \
|
||||
-u "${TPM_KEY_PUB}" -r "${TPM_KEY_PRIV}" \
|
||||
-c "${TPM_KEY_CTX}" -Q || return 1
|
||||
|
||||
# Make key persistent at handle (stored in TPM NV RAM - RPMB)
|
||||
/usr/bin/tpm2_evictcontrol -C o -c "${TPM_KEY_CTX}" "${TPM2_HANDLE}" || return 1
|
||||
|
||||
return 0
|
||||
}
|
||||
|
||||
# Unseal data from TPM persistent handle
|
||||
tpm_unseal_key() {
|
||||
# Check if persistent handle exists
|
||||
if ! /usr/bin/tpm2_getcap handles-persistent | grep -q "${TPM2_HANDLE}"; then
|
||||
debug "ERROR: TPM persistent handle not found"
|
||||
return 1
|
||||
fi
|
||||
|
||||
# Unseal key directly from persistent handle
|
||||
/usr/bin/tpm2_unseal -c "${TPM2_HANDLE}" || return 1
|
||||
|
||||
return 0
|
||||
}
|
||||
|
||||
# Perform in-place LUKS encryption (first boot)
|
||||
encrypt_root_filesystem() {
|
||||
msg "=========================================="
|
||||
msg "First boot: Encrypting root filesystem"
|
||||
msg "=========================================="
|
||||
|
||||
# Set marker to track encryption progress
|
||||
touch "${ENCRYPTION_MARKER}"
|
||||
sync
|
||||
|
||||
# Generate random encryption key using TPM RNG
|
||||
msg "Generating encryption key..."
|
||||
LUKS_KEY=$(generate_random_key)
|
||||
|
||||
if [ -z "${LUKS_KEY}" ]; then
|
||||
msg "ERROR: Failed to generate encryption key"
|
||||
rm -f "${ENCRYPTION_MARKER}"
|
||||
return 1
|
||||
fi
|
||||
|
||||
# Seal key with TPM before encryption starts
|
||||
msg "Securing key with TPM..."
|
||||
if ! tpm_seal_key "${LUKS_KEY}"; then
|
||||
msg "ERROR: Failed to secure key"
|
||||
rm -f "${ENCRYPTION_MARKER}"
|
||||
return 1
|
||||
fi
|
||||
|
||||
# Filesystem check before encryption
|
||||
msg "Checking filesystem integrity..."
|
||||
/usr/sbin/e2fsck -f -y "${ROOT_DEV}"
|
||||
E2FSCK_RET=$?
|
||||
if [ ${E2FSCK_RET} -ge 4 ]; then
|
||||
msg "ERROR: Filesystem check failed"
|
||||
rm -f "${ENCRYPTION_MARKER}"
|
||||
return 1
|
||||
fi
|
||||
|
||||
# Shrink filesystem before encryption to leave room for LUKS header
|
||||
msg "Preparing filesystem for encryption..."
|
||||
/usr/sbin/resize2fs -M "${ROOT_DEV}" || {
|
||||
msg "ERROR: Failed to prepare filesystem"
|
||||
rm -f "${ENCRYPTION_MARKER}"
|
||||
return 1
|
||||
}
|
||||
|
||||
# Verify partition has sufficient space for LUKS header
|
||||
msg "Verifying space for encryption..."
|
||||
MIN_BLOCKS=$(/usr/sbin/resize2fs -P "${ROOT_DEV}" 2>&1 | awk '/[Mm]inimum.*:/ {print $NF}')
|
||||
|
||||
# Get filesystem block size and device size
|
||||
BLOCK_SIZE=$(/usr/sbin/tune2fs -l "${ROOT_DEV}" 2>/dev/null | awk '/^Block size:/ {print $NF}')
|
||||
DEV_NAME=$(basename "${ROOT_DEV}")
|
||||
PART_SECTORS=$(cat /sys/class/block/"${DEV_NAME}"/size 2>/dev/null)
|
||||
|
||||
if [ -z "${MIN_BLOCKS}" ] || [ -z "${BLOCK_SIZE}" ] || [ -z "${PART_SECTORS}" ]; then
|
||||
msg "ERROR: Unable to determine partition geometry"
|
||||
rm -f "${ENCRYPTION_MARKER}"
|
||||
return 1
|
||||
fi
|
||||
|
||||
# Convert filesystem blocks to 512-byte sectors
|
||||
MIN_SECTORS=$((MIN_BLOCKS * BLOCK_SIZE / 512))
|
||||
LUKS_SECTORS=65536 # 32MB in 512-byte sectors
|
||||
|
||||
if [ $((PART_SECTORS - MIN_SECTORS)) -lt ${LUKS_SECTORS} ]; then
|
||||
msg "ERROR: Insufficient space for LUKS header (need 32MB free)"
|
||||
rm -f "${ENCRYPTION_MARKER}"
|
||||
return 1
|
||||
fi
|
||||
|
||||
# Perform in-place encryption
|
||||
msg "=========================================="
|
||||
msg "Encrypting filesystem..."
|
||||
msg "This will take several minutes."
|
||||
msg "DO NOT POWER OFF THE DEVICE!"
|
||||
msg "=========================================="
|
||||
|
||||
echo -n "${LUKS_KEY}" | \
|
||||
/usr/sbin/cryptsetup reencrypt --encrypt \
|
||||
--type luks2 \
|
||||
--cipher aes-xts-plain64 \
|
||||
--key-size 256 \
|
||||
--hash sha256 \
|
||||
--reduce-device-size 32M \
|
||||
--key-file - \
|
||||
"${ROOT_DEV}" || {
|
||||
msg "ERROR: Encryption failed"
|
||||
rm -f "${ENCRYPTION_MARKER}"
|
||||
return 1
|
||||
}
|
||||
|
||||
msg "=========================================="
|
||||
msg "Encryption completed successfully!"
|
||||
msg "=========================================="
|
||||
|
||||
# Remove encryption marker
|
||||
rm -f "${ENCRYPTION_MARKER}"
|
||||
sync
|
||||
|
||||
# Unlock the newly encrypted device
|
||||
msg "Activating encrypted filesystem..."
|
||||
echo -n "${LUKS_KEY}" | \
|
||||
/usr/sbin/cryptsetup luksOpen "${ROOT_DEV}" "${CRYPT_NAME}" --key-file - || {
|
||||
msg "ERROR: Failed to activate encrypted filesystem"
|
||||
return 1
|
||||
}
|
||||
|
||||
# Resize filesystem to fit the encrypted device
|
||||
msg "Optimizing filesystem..."
|
||||
/usr/sbin/resize2fs -f "${CRYPT_DEV}" || {
|
||||
msg "ERROR: Failed to optimize filesystem"
|
||||
return 1
|
||||
}
|
||||
|
||||
# Verify filesystem after resize
|
||||
/usr/sbin/e2fsck -f -y "${CRYPT_DEV}" || {
|
||||
info "WARNING: Filesystem verification had issues, but continuing"
|
||||
}
|
||||
|
||||
return 0
|
||||
}
|
||||
|
||||
# Unlock encrypted root filesystem (subsequent boots)
|
||||
unlock_encrypted_root() {
|
||||
msg "Unlocking encrypted filesystem..."
|
||||
|
||||
# Unseal key from TPM persistent handle
|
||||
LUKS_KEY=$(tpm_unseal_key)
|
||||
|
||||
if [ -z "${LUKS_KEY}" ]; then
|
||||
msg "ERROR: Failed to retrieve encryption key from TPM"
|
||||
msg "Attempting passphrase fallback..."
|
||||
|
||||
# Try to unlock with passphrase (interactive)
|
||||
/usr/sbin/cryptsetup luksOpen "${ROOT_DEV}" "${CRYPT_NAME}" || {
|
||||
fatal "ERROR: Failed to unlock encrypted filesystem"
|
||||
}
|
||||
else
|
||||
# Unlock with unsealed key
|
||||
echo -n "${LUKS_KEY}" | \
|
||||
/usr/sbin/cryptsetup luksOpen "${ROOT_DEV}" "${CRYPT_NAME}" --key-file - || {
|
||||
fatal "ERROR: Failed to unlock with TPM key"
|
||||
}
|
||||
fi
|
||||
|
||||
msg "Encrypted filesystem unlocked"
|
||||
}
|
||||
|
||||
# Module enabled check
|
||||
luksftpm_enabled() {
|
||||
# Always run this module - it handles both encrypted and unencrypted cases
|
||||
return 0
|
||||
}
|
||||
|
||||
# Module main function
|
||||
luksftpm_run() {
|
||||
# Wait for storage device
|
||||
if ! wait_for_device "${ROOT_DEV}" 10; then
|
||||
info "Storage device not found, skipping encryption module"
|
||||
return 0
|
||||
fi
|
||||
|
||||
# Mount boot partition
|
||||
msg "Mounting boot partition..."
|
||||
mkdir -p "${BOOT_MNT}"
|
||||
if ! mount "${BOOT_DEV}" "${BOOT_MNT}"; then
|
||||
info "ERROR: Failed to mount boot partition, attempting standard boot..."
|
||||
mkdir -p ${ROOTFS_DIR}
|
||||
mount "${ROOT_DEV}" ${ROOTFS_DIR}
|
||||
return 0
|
||||
fi
|
||||
|
||||
# Initialize fTPM
|
||||
TPM_AVAILABLE=0
|
||||
if init_ftpm; then
|
||||
TPM_AVAILABLE=1
|
||||
fi
|
||||
|
||||
# Check filesystem encryption status
|
||||
msg "Checking filesystem encryption status..."
|
||||
|
||||
MOUNT_DEV="${ROOT_DEV}"
|
||||
|
||||
if /usr/sbin/cryptsetup isLuks "${ROOT_DEV}"; then
|
||||
msg "Filesystem is encrypted"
|
||||
unlock_encrypted_root
|
||||
MOUNT_DEV="${CRYPT_DEV}"
|
||||
else
|
||||
msg "Filesystem is not encrypted"
|
||||
|
||||
# Check if encryption is enabled and TPM is available
|
||||
if [ $TPM_AVAILABLE -eq 1 ]; then
|
||||
# Check for encryption marker (resume interrupted encryption)
|
||||
if [ -f "${ENCRYPTION_MARKER}" ]; then
|
||||
msg "Resuming interrupted encryption..."
|
||||
if ! encrypt_root_filesystem; then
|
||||
msg "ERROR: Failed to resume encryption"
|
||||
msg "Booting without encryption..."
|
||||
MOUNT_DEV="${ROOT_DEV}"
|
||||
else
|
||||
MOUNT_DEV="${CRYPT_DEV}"
|
||||
fi
|
||||
else
|
||||
# First boot - perform encryption
|
||||
if encrypt_root_filesystem; then
|
||||
MOUNT_DEV="${CRYPT_DEV}"
|
||||
else
|
||||
msg "ERROR: Encryption failed - booting without encryption"
|
||||
MOUNT_DEV="${ROOT_DEV}"
|
||||
fi
|
||||
fi
|
||||
else
|
||||
msg "TPM not available - skipping encryption"
|
||||
MOUNT_DEV="${ROOT_DEV}"
|
||||
fi
|
||||
fi
|
||||
|
||||
# Unmount boot partition before switching root
|
||||
umount "${BOOT_MNT}"
|
||||
|
||||
# Mount root filesystem to $ROOTFS_DIR (framework expects this)
|
||||
msg "Mounting root filesystem..."
|
||||
mkdir -p ${ROOTFS_DIR}
|
||||
mount "${MOUNT_DEV}" ${ROOTFS_DIR} || {
|
||||
fatal "ERROR: Failed to mount root filesystem!"
|
||||
}
|
||||
|
||||
# Clean up tmpfs and sensitive variables
|
||||
rm -f "${TPM_PRIMARY_CTX}" "${TPM_KEY_PUB}" "${TPM_KEY_PRIV}" "${TPM_KEY_CTX}"
|
||||
unset LUKS_KEY TPM_AVAILABLE MOUNT_DEV TEE_SUPPLICANT_PID
|
||||
|
||||
msg "Boot complete"
|
||||
}
|
||||
@@ -0,0 +1,43 @@
|
||||
SUMMARY = "initramfs support for LUKS encryption with fTPM"
|
||||
DESCRIPTION = "Provides LUKS2 full disk encryption using firmware TPM (fTPM) for key management on TI K3 platforms"
|
||||
|
||||
LICENSE = "MIT"
|
||||
LIC_FILES_CHKSUM = "file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420"
|
||||
|
||||
# Only build for platforms with optee-ftpm support
|
||||
COMPATIBLE_MACHINE = "null"
|
||||
COMPATIBLE_MACHINE:k3 = "${@bb.utils.contains('MACHINE_FEATURES', 'optee-ftpm', '.*', 'null', d)}"
|
||||
|
||||
FILESEXTRAPATHS:prepend := "${THISDIR}/${PN}:"
|
||||
|
||||
SRC_URI = "file://luksftpm"
|
||||
|
||||
S = "${UNPACKDIR}"
|
||||
|
||||
do_install() {
|
||||
install -d ${D}/init.d
|
||||
# Install as 85-luksftpm (runs after udev at 01, before rootfs at 90)
|
||||
install -m 0755 ${UNPACKDIR}/luksftpm ${D}/init.d/85-luksftpm
|
||||
}
|
||||
|
||||
FILES:${PN} = "/init.d/85-luksftpm"
|
||||
|
||||
# Runtime dependencies
|
||||
RDEPENDS:${PN} = "\
|
||||
initramfs-framework-base \
|
||||
busybox \
|
||||
kmod \
|
||||
cryptsetup \
|
||||
tpm2-tools \
|
||||
tpm2-tss \
|
||||
libtss2-tcti-device \
|
||||
optee-client \
|
||||
optee-ftpm \
|
||||
e2fsprogs-e2fsck \
|
||||
e2fsprogs-resize2fs \
|
||||
e2fsprogs-tune2fs \
|
||||
util-linux-blkid \
|
||||
kernel-module-tpm-ftpm-tee \
|
||||
"
|
||||
|
||||
PACKAGE_ARCH = "${MACHINE_ARCH}"
|
||||
@@ -0,0 +1,3 @@
|
||||
LUKS_ENCRYPTION ?= "${@bb.utils.contains('MACHINE_FEATURES', 'optee-ftpm', 'initramfs-module-luks-ftpm', '', d)}"
|
||||
|
||||
RDEPENDS:${PN}:append = " ${@bb.utils.contains('DISTRO_FEATURES', 'luks', '${LUKS_ENCRYPTION}', '', d)}"
|
||||
@@ -0,0 +1 @@
|
||||
INITRAMFS_MAXSIZE = "200000"
|
||||
@@ -21,7 +21,7 @@ TI_PKA_FW_VERSION = "2.1.0"
|
||||
TI_IPC_EXAMPLES_FW_VERSION = "3.52.00.01"
|
||||
PCM6240_FW_VERSION = "1.0.0.0"
|
||||
|
||||
TI_LINUX_FW_SRCREV ?= "aaa3d54aaa9e837834fa6b6dd99e9fefdfcf7949"
|
||||
TI_LINUX_FW_SRCREV ?= "9e9d50ff563f83db86d36b72cd7fb4f487d6b414"
|
||||
SRCREV = "${TI_LINUX_FW_SRCREV}"
|
||||
|
||||
BRANCH ?= "ti-linux-firmware"
|
||||
|
||||
@@ -7,6 +7,6 @@ BRANCH:tie-jailhouse:bsp-ti-6_12 = "ti-u-boot-2025.01-jailhouse"
|
||||
BRANCH:tie-jailhouse:bsp-ti-6_18 = "ti-u-boot-2026.01-jailhouse"
|
||||
|
||||
SRCREV_uboot:tie-jailhouse:bsp-ti-6_12 = "e718bbcec3ebf663c021839753034a224be4cc53"
|
||||
SRCREV_uboot:tie-jailhouse:bsp-ti-6_18 = "cfac87057b6fed15c4be4f1d35bf0c4001807484"
|
||||
SRCREV_uboot:tie-jailhouse:bsp-ti-6_18 = "53a287d24610f0747ae4e35cff2afa3af23a48e3"
|
||||
|
||||
UBOOT_GIT_URI:tie-jailhouse = "git://git.ti.com/git/processor-sdk/u-boot.git"
|
||||
|
||||
@@ -4,6 +4,6 @@ PR = "r0"
|
||||
|
||||
BRANCH = "ti-u-boot-2025.01"
|
||||
|
||||
SRCREV_uboot = "ef2eb76b650415637bd93b0eddfb1e31489117f9"
|
||||
SRCREV_uboot = "7b9dedb046eb6a720997f61582c7b13da1b5b9f0"
|
||||
|
||||
SRC_URI += "file://0001-binman-migrate-form-pkg_resources-to-importlib.patch"
|
||||
|
||||
@@ -4,4 +4,4 @@ PR = "r0"
|
||||
|
||||
BRANCH = "ti-u-boot-2026.01"
|
||||
|
||||
SRCREV_uboot = "a46241db71e383bb6dda103ecad12b13e7af3c38"
|
||||
SRCREV_uboot = "2549829cc194ffd9e38b755d2e10c7fc4cd971eb"
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
From 5a05e5b66dd3831a9c9c2b3f64bd42419d9ade2d Mon Sep 17 00:00:00 2001
|
||||
From: Denys Dmytriyenko <denys@konsulko.com>
|
||||
Date: Thu, 6 Jul 2023 01:48:41 +0000
|
||||
From 3cddacaa9ea3cfd75732ea9a84312fa68e0bfda7 Mon Sep 17 00:00:00 2001
|
||||
From: Ryan Eatmon <reatmon@ti.com>
|
||||
Date: Tue, 24 Mar 2026 10:52:59 -0500
|
||||
Subject: [PATCH] Revert require GL_EXT_unpack_subimage commit
|
||||
|
||||
This reverts commit 593d5af43a8e2c2a3371088fa7ae430d0517c82d.
|
||||
@@ -13,83 +13,76 @@ Upstream-Status: Inappropriate [specific to TI SGX]
|
||||
|
||||
Signed-off-by: Andrew Davis <afd@ti.com>
|
||||
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
|
||||
|
||||
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
|
||||
---
|
||||
libweston/renderer-gl/gl-renderer-internal.h | 2 ++
|
||||
libweston/renderer-gl/gl-renderer.c | 29 ++++++++++++++++----
|
||||
2 files changed, 26 insertions(+), 5 deletions(-)
|
||||
libweston/renderer-gl/gl-renderer.c | 26 ++++++++++++++++----
|
||||
2 files changed, 23 insertions(+), 5 deletions(-)
|
||||
|
||||
diff --git a/libweston/renderer-gl/gl-renderer-internal.h b/libweston/renderer-gl/gl-renderer-internal.h
|
||||
index 5032035..85616c9 100644
|
||||
index 1afffbda..dbf7b1c3 100644
|
||||
--- a/libweston/renderer-gl/gl-renderer-internal.h
|
||||
+++ b/libweston/renderer-gl/gl-renderer-internal.h
|
||||
@@ -229,6 +229,8 @@ struct gl_renderer {
|
||||
PFNEGLCREATEPLATFORMWINDOWSURFACEEXTPROC create_platform_window;
|
||||
bool has_platform_base;
|
||||
|
||||
+ bool has_unpack_subimage;
|
||||
@@ -526,6 +526,8 @@ struct gl_renderer {
|
||||
struct weston_log_scope *shader_scope;
|
||||
|
||||
struct dmabuf_allocator *allocator;
|
||||
+
|
||||
PFNEGLBINDWAYLANDDISPLAYWL bind_display;
|
||||
PFNEGLUNBINDWAYLANDDISPLAYWL unbind_display;
|
||||
PFNEGLQUERYWAYLANDBUFFERWL query_buffer;
|
||||
+ bool has_unpack_subimage;
|
||||
};
|
||||
|
||||
static inline uint32_t
|
||||
diff --git a/libweston/renderer-gl/gl-renderer.c b/libweston/renderer-gl/gl-renderer.c
|
||||
index e694418b..2be6d621 100644
|
||||
index 45a2a148..8b238208 100644
|
||||
--- a/libweston/renderer-gl/gl-renderer.c
|
||||
+++ b/libweston/renderer-gl/gl-renderer.c
|
||||
@@ -2523,6 +2523,7 @@ gl_renderer_flush_damage(struct weston_paint_node *pnode)
|
||||
struct weston_surface *surface = pnode->surface;
|
||||
const struct weston_testsuite_quirks *quirks =
|
||||
&surface->compositor->test_data.test_quirks;
|
||||
+ struct gl_renderer *gr = get_renderer(surface->compositor);
|
||||
struct weston_buffer *buffer = surface->buffer_ref.buffer;
|
||||
struct gl_surface_state *gs = get_surface_state(surface);
|
||||
struct gl_buffer_state *gb = gs->buffer;
|
||||
@@ -2550,6 +2551,24 @@ gl_renderer_flush_damage(struct weston_paint_node *pnode)
|
||||
|
||||
data = wl_shm_buffer_get_data(buffer->shm_buffer);
|
||||
|
||||
@@ -3021,6 +3021,22 @@ gl_renderer_flush_damage(struct weston_paint_node *pnode)
|
||||
|
||||
data = wl_shm_buffer_get_data(buffer->shm_buffer);
|
||||
|
||||
+ if (!gr->has_unpack_subimage) {
|
||||
+ wl_shm_buffer_begin_access(buffer->shm_buffer);
|
||||
+ for (j = 0; j < gs->buffer->num_textures; j++) {
|
||||
+ glBindTexture(GL_TEXTURE_2D, gs->buffer->textures[j]);
|
||||
+ glTexImage2D(GL_TEXTURE_2D, 0,
|
||||
+ gs->buffer->gl_format[j],
|
||||
+ gs->buffer->pitch / pixel_format_hsub(buffer->pixel_format, j),
|
||||
+ buffer->height / pixel_format_vsub(buffer->pixel_format, j),
|
||||
+ 0,
|
||||
+ gl_format_from_internal(gs->buffer->gl_format[j]),
|
||||
+ gs->buffer->gl_pixel_type,
|
||||
+ data + gs->buffer->offset[j]);
|
||||
+ for (j = 0; j < gb->num_textures; j++) {
|
||||
+ glBindTexture(GL_TEXTURE_2D, gb->textures[j]);
|
||||
+ gl_texture_2d_store(gr, 0, 0, 0,
|
||||
+ gb->pitch / pixel_format_hsub(buffer->pixel_format, j),
|
||||
+ buffer->height / pixel_format_vsub(buffer->pixel_format, j),
|
||||
+ gb->texture_format[j].external,
|
||||
+ gb->texture_format[j].type,
|
||||
+ data + gb->offset[j]);
|
||||
+ }
|
||||
+ wl_shm_buffer_end_access(buffer->shm_buffer);
|
||||
+
|
||||
+ goto done;
|
||||
+ }
|
||||
+
|
||||
if (gb->needs_full_upload || quirks->gl_force_full_upload) {
|
||||
wl_shm_buffer_begin_access(buffer->shm_buffer);
|
||||
|
||||
@@ -4754,11 +4773,9 @@ gl_renderer_setup(struct weston_compositor *ec)
|
||||
else
|
||||
ec->read_format = pixel_format_get_info(DRM_FORMAT_ABGR8888);
|
||||
|
||||
- if (gr->gl_version < gr_gl_version(3, 0) &&
|
||||
- !weston_check_egl_extension(extensions, "GL_EXT_unpack_subimage")) {
|
||||
if (gb->needs_full_upload || quirks->force_full_upload) {
|
||||
wl_shm_buffer_begin_access(buffer->shm_buffer);
|
||||
|
||||
@@ -5171,11 +5187,9 @@ gl_renderer_setup(struct weston_compositor *ec)
|
||||
else
|
||||
ec->read_format = pixel_format_get_info(DRM_FORMAT_ABGR8888);
|
||||
|
||||
- if (gr->gl_version < gl_version(3, 0) &&
|
||||
- !gl_extensions_has(gr, EXTENSION_EXT_UNPACK_SUBIMAGE)) {
|
||||
- weston_log("GL_EXT_unpack_subimage not available.\n");
|
||||
- return -1;
|
||||
- }
|
||||
+ if (gr->gl_version >= gr_gl_version(3, 0) ||
|
||||
+ if (gr->gl_version >= gl_version(3, 0) ||
|
||||
+ weston_check_egl_extension(extensions, "GL_EXT_unpack_subimage"))
|
||||
+ gr->has_unpack_subimage = true;
|
||||
|
||||
if (gr->gl_version >= gr_gl_version(3, 0) ||
|
||||
weston_check_egl_extension(extensions, "GL_EXT_texture_type_2_10_10_10_REV"))
|
||||
@@ -4880,6 +4897,8 @@ gl_renderer_setup(struct weston_compositor *ec)
|
||||
gr_gl_version_minor(gr->gl_version));
|
||||
weston_log_continue(STAMP_SPACE "read-back format: %s\n",
|
||||
ec->read_format->drm_format_name);
|
||||
|
||||
if (gl_extensions_has(gr, EXTENSION_OES_MAPBUFFER))
|
||||
GET_PROC_ADDRESS(gr->unmap_buffer, "glUnmapBufferOES");
|
||||
@@ -5303,6 +5317,8 @@ gl_renderer_setup(struct weston_compositor *ec)
|
||||
gl_version_minor(gr->gl_version));
|
||||
weston_log_continue(STAMP_SPACE "read-back format: %s\n",
|
||||
ec->read_format->drm_format_name);
|
||||
+ weston_log_continue(STAMP_SPACE "wl_shm sub-image to texture: %s\n",
|
||||
+ gr->has_unpack_subimage ? "yes" : "no");
|
||||
weston_log_continue(STAMP_SPACE "glReadPixels supports y-flip: %s\n",
|
||||
yesno(gr->has_pack_reverse));
|
||||
weston_log_continue(STAMP_SPACE "glReadPixels supports PBO: %s\n",
|
||||
weston_log_continue(STAMP_SPACE "glReadPixels supports y-flip: %s\n",
|
||||
yesno(gl_extensions_has(gr, EXTENSION_ANGLE_PACK_REVERSE_ROW_ORDER)));
|
||||
weston_log_continue(STAMP_SPACE "glReadPixels supports PBO: %s\n",
|
||||
--
|
||||
2.43.0
|
||||
|
||||
|
||||
@@ -0,0 +1,22 @@
|
||||
# Device Mapper support
|
||||
CONFIG_MD=y
|
||||
CONFIG_BLK_DEV_DM=y
|
||||
CONFIG_DM_CRYPT=y
|
||||
|
||||
# Core crypto algorithms for LUKS encryption
|
||||
CONFIG_CRYPTO_AES=y
|
||||
CONFIG_CRYPTO_XTS=y
|
||||
CONFIG_CRYPTO_SHA256=y
|
||||
CONFIG_CRYPTO_SHA512=y
|
||||
|
||||
# ARM64 optimized crypto for better performance
|
||||
CONFIG_CRYPTO_AES_ARM64=y
|
||||
CONFIG_CRYPTO_AES_ARM64_CE=y
|
||||
CONFIG_CRYPTO_AES_ARM64_CE_BLK=y
|
||||
|
||||
# Userspace crypto API for cryptsetup
|
||||
CONFIG_CRYPTO_USER_API_HASH=y
|
||||
CONFIG_CRYPTO_USER_API_SKCIPHER=y
|
||||
|
||||
# Firmware TPM support via OP-TEE
|
||||
CONFIG_TCG_FTPM_TEE=m
|
||||
@@ -22,7 +22,7 @@ S = "${UNPACKDIR}/${BB_GIT_DEFAULT_DESTSUFFIX}"
|
||||
|
||||
BRANCH ?= "ti-linux-6.18.y"
|
||||
|
||||
SRCREV ?= "fa0fe817f5ee1b0542f757abaded245c6e5a1321"
|
||||
SRCREV ?= "c214492085504176b9c252a7175e4e60b4b442af"
|
||||
PV = "6.18.13+git"
|
||||
|
||||
KERNEL_REPRODUCIBILITY_PATCHES = " \
|
||||
@@ -35,3 +35,11 @@ module_conf_rpmsg_client_sample = "blacklist rpmsg_client_sample"
|
||||
module_conf_ti_k3_r5_remoteproc = "softdep ti_k3_r5_remoteproc pre: virtio_rpmsg_bus"
|
||||
module_conf_ti_k3_dsp_remoteproc = "softdep ti_k3_dsp_remoteproc pre: virtio_rpmsg_bus"
|
||||
KERNEL_MODULE_PROBECONF += "rpmsg_client_sample ti_k3_r5_remoteproc ti_k3_dsp_remoteproc"
|
||||
|
||||
# LUKS encryption with fTPM kernel configuration
|
||||
SRC_URI:append:k3 = " \
|
||||
${@bb.utils.contains('DISTRO_FEATURES', 'luks', 'file://luks-ftpm.cfg', '', d)} \
|
||||
"
|
||||
KERNEL_CONFIG_FRAGMENTS:append:k3 = " \
|
||||
${@bb.utils.contains('DISTRO_FEATURES', 'luks', '${UNPACKDIR}/luks-ftpm.cfg', '', d)} \
|
||||
"
|
||||
|
||||
@@ -5,4 +5,4 @@ BRANCH:tie-jailhouse:bsp-ti-6_12 = "ti-linux-6.12.y-jailhouse"
|
||||
BRANCH:tie-jailhouse:bsp-ti-6_18 = "ti-linux-6.18.y-jailhouse"
|
||||
|
||||
SRCREV:tie-jailhouse:bsp-ti-6_12 = "229a48602ad1557612a4ffabec6a3cbcdd745f87"
|
||||
SRCREV:tie-jailhouse:bsp-ti-6_18 = "e80c3501e727c8c01454594ca5b10555377dfd60"
|
||||
SRCREV:tie-jailhouse:bsp-ti-6_18 = "b27ed9ea7bdad936265fe38c6e112d86743fd379"
|
||||
|
||||
@@ -9,6 +9,6 @@ BRANCH:tie-jailhouse:bsp-ti-6_12 = "ti-linux-6.12.y-jailhouse"
|
||||
BRANCH:tie-jailhouse:bsp-ti-6_18 = "ti-linux-6.18.y-jailhouse"
|
||||
|
||||
SRCREV:tie-jailhouse:bsp-ti-6_12 = "229a48602ad1557612a4ffabec6a3cbcdd745f87"
|
||||
SRCREV:tie-jailhouse:bsp-ti-6_18 = "e80c3501e727c8c01454594ca5b10555377dfd60"
|
||||
SRCREV:tie-jailhouse:bsp-ti-6_18 = "b27ed9ea7bdad936265fe38c6e112d86743fd379"
|
||||
|
||||
KERNEL_GIT_URI:tie-jailhouse = "git://git.ti.com/git/processor-sdk/linux.git"
|
||||
|
||||
Reference in New Issue
Block a user