From patchwork Wed Mar 4 19:38:22 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Shiva Tripathi X-Patchwork-Id: 82510 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 45C78EFCE3F for ; Wed, 4 Mar 2026 19:39:00 +0000 (UTC) Received: from CO1PR03CU002.outbound.protection.outlook.com (CO1PR03CU002.outbound.protection.outlook.com [52.101.46.68]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.27092.1772653130764843667 for ; Wed, 04 Mar 2026 11:38:50 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="dkim: body hash did not verify" header.i=@ti.com header.s=selector1 header.b=WuOQhS57; spf=permerror, err=parse error for token &{10 18 spf.protection.outlook.com}: limit exceeded (domain: ti.com, ip: 52.101.46.68, mailfrom: s-tripathi1@ti.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=WmKKhhpdN97CvX/G7SteP5ZK3OqtWanz3AtPkJ2ofJHcJ7QNRbGLSN+pkesOFACMKVpbSTd3vbSuZe6aetn/NUAax2Z9MN+QqnPA52V2JjH1qFJCcuqG4VdeR+z+n2X6r0W8hOEPdYvu2RCK7SFfPiccnKX+79UN3VnvDTfgS097PSsCRFse88uQ+okCSuFjGRrBbRSD+IrmfuuGJUn7V8hrk/yTawVVdp3IyZQ2g+awTCnydTwEWYbPWkAqRkuamtAaFD5tJUyGz/sDtF9AOYHjLX+5zxzd81E800n7KujaZNHR+kxWmyweDBd79l1QW2gs+cz8NV3MGZmEOjYyYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=vgpXKbP4Hnrn7c6jaSrwKUgzLC2d+9h/NpWF4xUW5SU=; b=l9nqdpn5bYlsW66LmC9/mdneBVdBynMdZQ8uBbJTQRoy+m1FcyTUKqjg5HDVQEwD9tTgoKirz8pUwYmmDmFasYt7tU0SFDoLd1P1zAqBggLMOwxtCckFZ2KghBLIY8Ga83oly/3aQtc2ELWEy9ICRYw13DCZ5On/rps5GNV5ReEFllXLZsQHJRmqW019qYoaPYmxQuQuqkpUhCoH/NG1TeJK/wLXKhCbC2U7ILWMY2xktQA1N+sSLp9pZ7/hW0em+Afw15RErsKUxQNDB8XLzniohic35eB4CrzBjQhVSF5a60cLvB0fFb//iSjVpRhi03XvcdtPXqLJa028O7LRvQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 198.47.23.195) smtp.rcpttodomain=criticallink.com smtp.mailfrom=ti.com; dmarc=pass (p=quarantine sp=none pct=100) action=none header.from=ti.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vgpXKbP4Hnrn7c6jaSrwKUgzLC2d+9h/NpWF4xUW5SU=; b=WuOQhS57+hm9lolq3b9n8u5MJEHRbP6XU2iK8rNzF0PKXjlZcxOAX/jkWrLlnfoc+9G2O6wd6aZBKhUe9XFyBEWm6EET298vFKybYXIuTcTRXY62ZVfMkc9S5oV6l5HgdBZGGDnMymmivTEo7cZUAc5B4tssgAks0Yr6VEAIx/I= Received: from DS7PR06CA0046.namprd06.prod.outlook.com (2603:10b6:8:54::13) by SA2PR10MB4763.namprd10.prod.outlook.com (2603:10b6:806:117::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9654.22; Wed, 4 Mar 2026 19:38:47 +0000 Received: from DS1PEPF00017096.namprd05.prod.outlook.com (2603:10b6:8:54:cafe::94) by DS7PR06CA0046.outlook.office365.com (2603:10b6:8:54::13) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9654.22 via Frontend Transport; Wed, 4 Mar 2026 19:38:23 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 198.47.23.195) smtp.mailfrom=ti.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=ti.com; Received-SPF: Pass (protection.outlook.com: domain of ti.com designates 198.47.23.195 as permitted sender) receiver=protection.outlook.com; client-ip=198.47.23.195; helo=lewvzet201.ext.ti.com; pr=C Received: from lewvzet201.ext.ti.com (198.47.23.195) by DS1PEPF00017096.mail.protection.outlook.com (10.167.18.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9678.18 via Frontend Transport; Wed, 4 Mar 2026 19:38:47 +0000 Received: from DLEE213.ent.ti.com (157.170.170.116) by lewvzet201.ext.ti.com (10.4.14.104) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Wed, 4 Mar 2026 13:38:47 -0600 Received: from DLEE206.ent.ti.com (157.170.170.90) by DLEE213.ent.ti.com (157.170.170.116) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Wed, 4 Mar 2026 13:38:46 -0600 Received: from lelvem-mr05.itg.ti.com (10.180.75.9) by DLEE206.ent.ti.com (157.170.170.90) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20 via Frontend Transport; Wed, 4 Mar 2026 13:38:46 -0600 Received: from HP-Z2-Tower-G9.dhcp.ti.com (hp-z2-tower-g9.dhcp.ti.com [10.24.68.200]) by lelvem-mr05.itg.ti.com (8.18.1/8.18.1) with ESMTP id 624JcaZK956747; Wed, 4 Mar 2026 13:38:44 -0600 From: Shiva Tripathi To: CC: , , , , , , , Subject: [meta-ti][master][PATCH v3 1/3] linux-ti-staging: Add LUKS encryption config Date: Thu, 5 Mar 2026 01:08:22 +0530 Message-ID: <20260304193824.2495898-2-s-tripathi1@ti.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20260304193824.2495898-1-s-tripathi1@ti.com> References: <20260304193824.2495898-1-s-tripathi1@ti.com> MIME-Version: 1.0 X-C2ProcessedOrg: 333ef613-75bf-4e12-a4b1-8e3623f5dcea X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DS1PEPF00017096:EE_|SA2PR10MB4763:EE_ X-MS-Office365-Filtering-Correlation-Id: 4953c633-da3a-4cb7-0c86-08de7a25a776 X-LD-Processed: e5b49634-450b-4709-8abb-1e2b19b982b7,ExtAddr X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|36860700016|34020700016|82310400026|376014|1800799024; X-Microsoft-Antispam-Message-Info: fkv9VEnG0RLjlp1TK+2L9dilCzV50NHlMR9bZ+BgsPBZtupmPyBEua0+VQiarR48n2spINVxTgBcQz2Bpj6w68l4gaiLVbm96S1xdggt276n2z+izhA+QrC0y1H0IsW9LYHY+LXinyI3WN+gyeItobG1QLDhqDskqWswyu/tiZYsJ+77hf3MsZhr2Tr3HZ4ZG+NTSiSjlFnSnZ4HBIl2nlV7VMjBlXx4UI/AeC4YmN6yXTrvWwYew5rAy8CmkZXf0cTXTkTd3pjJ4uEhk2IpEPf7kl3JHX+OQh/U0WpJem38XJkREVMfzIXDDilEKUzyuMWGAism8LLjiapXdqTLzuZNA6H1DBYQGFKWwsCsgz++GPYfaSTRwDCpS1iV55m+tKe+PjK22p84em9AdAIJ0SovkubuKOF4PZhdzjxvwEbPaC4PbmxNuIExNcS5xGjc4o4AdSeOJxCH1KGUfoHKDw5nKYDWBc4kIdcMv+IDOrn9PKzbYjPqYz0NTfZ4qC/Yl7y83kBZ5wyQU+BhpJmFP0n5O3+zdrsrhqkeCam1+GbLe1csF/CdxIPMEwMZZMou3ZrVdpV/w7q/rbK1a0g6FnwCY78h7Afk8eJZCIGAtixnn5JIkGmYRwU0AltcHJtoh1udHPZcZ200ySCbh0tXTuTRnG0xXmBmONBVf6HZohZYdMtw01txG4QEW4gvGKsLehMny2l6RuTodws5EG+CWCkH0QA8Sgi7O73t8Q7WEsnvrpk9wxaAA9J+6iN05jHF1G55Z2MlYxbHsACgcsOLRQ== X-Forefront-Antispam-Report: CIP:198.47.23.195;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:lewvzet201.ext.ti.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(36860700016)(34020700016)(82310400026)(376014)(1800799024);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 8RdV4Dw95PCsD02VD0dfAmXp4dd1M5IjoyoYL5TAprg6gXwsIDGqo10w40RBr3PMwyjuyt0mvRRFRtyR1889YQgjBO2o319l3K/Oio/OwXgbHNPcEXxrKt3t9bDPWL97Iw35E930meAnxO0Nwv02WAzT/DA2LnlsoLy6cAyEj3AIu0A0q3sJWCuChz/DCaRHgw6DrxkQY9sO9SoRNYreLiNCdzB8wVgM3DnYAPOhJNbTJMOtaw/lg/NVswA9A5hO/g8UX3EjrFTDdL0aEVnezNByy6m8Q2DMIGD52WiZ/cNFFC8EXPIxlHhak4eH5Qk3gV1Ezs/oKhWlLvUbevqmfMhoLsc81P9fDoi3GZ6H9L+sjG893MqqOa8np4vHksfy7eIT9resbsz4ucku5S8un+YxR7JG/CAC9o1FU/e7+oVq5zTSXB2NGa968whnnT/o X-OriginatorOrg: ti.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2026 19:38:47.4083 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 4953c633-da3a-4cb7-0c86-08de7a25a776 X-MS-Exchange-CrossTenant-Id: e5b49634-450b-4709-8abb-1e2b19b982b7 X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=e5b49634-450b-4709-8abb-1e2b19b982b7;Ip=[198.47.23.195];Helo=[lewvzet201.ext.ti.com] X-MS-Exchange-CrossTenant-AuthSource: DS1PEPF00017096.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA2PR10MB4763 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 04 Mar 2026 19:39:00 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-ti/message/19642 Add conditional kernel configuration fragment for LUKS encryption with fTPM support. This enables dm-crypt and necessary crypto algorithms when MACHINE_FEATURES contains 'luks-encryption'. Signed-off-by: Shiva Tripathi --- .../linux/linux-ti-staging-6.18/luks-ftpm.cfg | 28 +++++++++++++++++++ .../linux/linux-ti-staging_6.18.bb | 9 ++++++ 2 files changed, 37 insertions(+) create mode 100644 meta-ti-bsp/recipes-kernel/linux/linux-ti-staging-6.18/luks-ftpm.cfg diff --git a/meta-ti-bsp/recipes-kernel/linux/linux-ti-staging-6.18/luks-ftpm.cfg b/meta-ti-bsp/recipes-kernel/linux/linux-ti-staging-6.18/luks-ftpm.cfg new file mode 100644 index 00000000..234cc087 --- /dev/null +++ b/meta-ti-bsp/recipes-kernel/linux/linux-ti-staging-6.18/luks-ftpm.cfg @@ -0,0 +1,28 @@ +# Device Mapper support +CONFIG_MD=y +CONFIG_BLK_DEV_DM=y +CONFIG_DM_CRYPT=y + +# Crypto algorithms for LUKS +CONFIG_CRYPTO_XTS=y +CONFIG_CRYPTO_AES=y +CONFIG_CRYPTO_AES_ARM64=y +CONFIG_CRYPTO_AES_ARM64_CE=y +CONFIG_CRYPTO_AES_ARM64_CE_BLK=y +CONFIG_CRYPTO_SHA256=y +CONFIG_CRYPTO_SHA256_ARM64=y +CONFIG_CRYPTO_SHA512=y +CONFIG_CRYPTO_USER_API_HASH=y +CONFIG_CRYPTO_USER_API_SKCIPHER=y + +# Additional crypto support for LUKS2 +CONFIG_CRYPTO_CBC=y +CONFIG_CRYPTO_ECB=y +CONFIG_CRYPTO_ESSIV=y +CONFIG_CRYPTO_LRW=y +CONFIG_CRYPTO_PCBC=y + +# TPM kernel modules needed for initramfs +CONFIG_TCG_TIS_CORE=m +CONFIG_TCG_CRB=m + diff --git a/meta-ti-bsp/recipes-kernel/linux/linux-ti-staging_6.18.bb b/meta-ti-bsp/recipes-kernel/linux/linux-ti-staging_6.18.bb index 8e4ccd7d..69d6217f 100644 --- a/meta-ti-bsp/recipes-kernel/linux/linux-ti-staging_6.18.bb +++ b/meta-ti-bsp/recipes-kernel/linux/linux-ti-staging_6.18.bb @@ -35,3 +35,12 @@ module_conf_rpmsg_client_sample = "blacklist rpmsg_client_sample" module_conf_ti_k3_r5_remoteproc = "softdep ti_k3_r5_remoteproc pre: virtio_rpmsg_bus" module_conf_ti_k3_dsp_remoteproc = "softdep ti_k3_dsp_remoteproc pre: virtio_rpmsg_bus" KERNEL_MODULE_PROBECONF += "rpmsg_client_sample ti_k3_r5_remoteproc ti_k3_dsp_remoteproc" + +# LUKS encryption with fTPM kernel configuration +SRC_URI:append:k3 = " \ + ${@bb.utils.contains('MACHINE_FEATURES', 'luks-encryption', 'file://luks-ftpm.cfg', '', d)} \ +" +KERNEL_CONFIG_FRAGMENTS:append:k3 = " \ + ${@bb.utils.contains('MACHINE_FEATURES', 'luks-encryption', '${UNPACKDIR}/luks-ftpm.cfg', '', d)} \ +" + From patchwork Wed Mar 4 19:38:23 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Shiva Tripathi X-Patchwork-Id: 82511 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4B8CCEFCE3D for ; Wed, 4 Mar 2026 19:39:00 +0000 (UTC) Received: from CH1PR05CU001.outbound.protection.outlook.com (CH1PR05CU001.outbound.protection.outlook.com [52.101.193.6]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.27169.1772653137534472146 for ; Wed, 04 Mar 2026 11:38:57 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="dkim: body hash did not verify" header.i=@ti.com header.s=selector1 header.b=JQ7Crk/i; spf=permerror, err=parse error for token &{10 18 spf.protection.outlook.com}: limit exceeded (domain: ti.com, ip: 52.101.193.6, mailfrom: s-tripathi1@ti.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=L2erbYN+XGFqsJN2oCoXdQdJ5DohKNxYDB4ob9wW4/NExUnZQncX6/huxMw5xlDAw8gOr+BaNhqe27XSBv1OPV0xcVvci+ukk4dXKPLjWh9qdEufLBZ8t5Frcwj6xBPc2OSoNxe/rSDlTIBQzOlZIjESh72AqKoSY/wtcCU1Uvq2O30DmaDapgWdp2GhcyTuw57Ozc3suvdJuMlpJZW3Dx6iAtsjY0K2AcOqAQt1HkEAbufepVNx5Ku7yigvBIjKXi5WNF9k77Sm73FPLZJKVf8l6Bh8qdiwXak34LDovlgPYkc12D9ihsf7+A8zKuHAe1G/WbvVWIPFlUF5JQh5zA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=2yGmiLxBZFmZ41oyr9qOr6WwTstIqAwjdLBRfbs/y00=; b=kBNtRTIDQJq1lHCYqNOqDZHMJRTkpVx5k6aP14kMAnR/X2vR9eUTWVzSb52F4yXuFGA1KpLww9CFsLjSga5D2WzMFdj43UvdkUDQFd3TDgI0jRN5Tc3vFU7p0XHo5Q1FDfZkrF513bumpBxNtXVO8+lR4wr6huQqM4/yATXIZcDuw/vWTCRLRTr5DtkM6cL75DUmZZV0YaO9TkufYppVUV7+glinSApK9BzvMZDZw60J3eT1C3Q67UoLmcse6DqN/hdtX3zxH9ZJPKHUnFkD/Eu9brRy7CO9EnYmzzXeiO37ysFIvB76nKyoqF+1m5Z3CFbPsIeiY2ApQRyy0HLHaA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 198.47.21.194) smtp.rcpttodomain=criticallink.com smtp.mailfrom=ti.com; dmarc=pass (p=quarantine sp=none pct=100) action=none header.from=ti.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2yGmiLxBZFmZ41oyr9qOr6WwTstIqAwjdLBRfbs/y00=; b=JQ7Crk/itoR8qzitzIOO1Fby63dlTJpYVboLOBi+lCsu+ITWMEEJfkfGv1Xv2FkjSxrUdVdNQMPveRIuX0ACjRf6uZ+qjzMaoSWM6fokt7UJsFSceXHSw9Vse0H/4VXsRbAldE0p0IRv4lFbr5ys+UrXnXEc57HGOy3AJAcbbXY= Received: from BY3PR04CA0017.namprd04.prod.outlook.com (2603:10b6:a03:217::22) by BN0PR10MB5094.namprd10.prod.outlook.com (2603:10b6:408:129::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9678.17; Wed, 4 Mar 2026 19:38:55 +0000 Received: from SJ1PEPF00002324.namprd03.prod.outlook.com (2603:10b6:a03:217:cafe::d9) by BY3PR04CA0017.outlook.office365.com (2603:10b6:a03:217::22) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9654.22 via Frontend Transport; Wed, 4 Mar 2026 19:38:35 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 198.47.21.194) smtp.mailfrom=ti.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=ti.com; Received-SPF: Pass (protection.outlook.com: domain of ti.com designates 198.47.21.194 as permitted sender) receiver=protection.outlook.com; client-ip=198.47.21.194; helo=flwvzet200.ext.ti.com; pr=C Received: from flwvzet200.ext.ti.com (198.47.21.194) by SJ1PEPF00002324.mail.protection.outlook.com (10.167.242.87) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9654.16 via Frontend Transport; Wed, 4 Mar 2026 19:38:53 +0000 Received: from DFLE204.ent.ti.com (10.64.6.62) by flwvzet200.ext.ti.com (10.248.192.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Wed, 4 Mar 2026 13:38:52 -0600 Received: from DFLE205.ent.ti.com (10.64.6.63) by DFLE204.ent.ti.com (10.64.6.62) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Wed, 4 Mar 2026 13:38:51 -0600 Received: from lelvem-mr05.itg.ti.com (10.180.75.9) by DFLE205.ent.ti.com (10.64.6.63) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20 via Frontend Transport; Wed, 4 Mar 2026 13:38:51 -0600 Received: from HP-Z2-Tower-G9.dhcp.ti.com (hp-z2-tower-g9.dhcp.ti.com [10.24.68.200]) by lelvem-mr05.itg.ti.com (8.18.1/8.18.1) with ESMTP id 624JcaZL956747; Wed, 4 Mar 2026 13:38:49 -0600 From: Shiva Tripathi To: CC: , , , , , , , Subject: [meta-ti][master][PATCH v3 2/3] initramfs: Add LUKS encryption module with fTPM Date: Thu, 5 Mar 2026 01:08:23 +0530 Message-ID: <20260304193824.2495898-3-s-tripathi1@ti.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20260304193824.2495898-1-s-tripathi1@ti.com> References: <20260304193824.2495898-1-s-tripathi1@ti.com> MIME-Version: 1.0 X-C2ProcessedOrg: 333ef613-75bf-4e12-a4b1-8e3623f5dcea X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ1PEPF00002324:EE_|BN0PR10MB5094:EE_ X-MS-Office365-Filtering-Correlation-Id: 6e01f931-1288-4231-dc28-08de7a25ab16 X-LD-Processed: e5b49634-450b-4709-8abb-1e2b19b982b7,ExtAddr X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|36860700016|376014|34020700016|1800799024|82310400026|7142099003; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:198.47.21.194;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:flwvzet200.ext.ti.com;PTR:ErrorRetry;CAT:NONE;SFS:(13230040)(36860700016)(376014)(34020700016)(1800799024)(82310400026)(7142099003);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: sG6JOZGSC5pAlJKQwOE6ZIF7d5AGGjHFfDW6zkNP0hEZjrghebNkyqODOzxPIq1jTwImEcs2rJZV9AeZUlbaFgEsEds04AfHiD8ZNzrMKhrg3Ewa/SSEJxVCTzKKiodLVyYmz7nnbjhWxnRDhgetaut756XC4Da97Jav23hie93BIY6AeweImIxqFZPJGwsaPfVDUL6h/WRdMOktwC0F4oWtyI27izlUR/zzQoIsOtk7jTGwyvnFfBv7Wf8GLTST65ajh7eDIcnquJ8WNvTgqiLOaX4ZwivySTNHYSAU6N3kFKAQSmzuZ87lxaxNMUl1dYjBlYLEKnwIh7GEnYporwJSvztWWC+jxlWI48D0tGrFL/N2zMMwSKK9nahbNyjHy9ZlGgqS+2N4/qcjDjRWBMDp+ol6jcDlki4u8BJQazjkReb0uwIPdPU/3uGr/sO0 X-OriginatorOrg: ti.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2026 19:38:53.4691 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 6e01f931-1288-4231-dc28-08de7a25ab16 X-MS-Exchange-CrossTenant-Id: e5b49634-450b-4709-8abb-1e2b19b982b7 X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=e5b49634-450b-4709-8abb-1e2b19b982b7;Ip=[198.47.21.194];Helo=[flwvzet200.ext.ti.com] X-MS-Exchange-CrossTenant-AuthSource: SJ1PEPF00002324.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN0PR10MB5094 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 04 Mar 2026 19:39:00 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-ti/message/19643 Add initramfs-module-luks-ftpm providing LUKS2 full disk encryption with TPM-sealed keys for TI K3 platforms. Keys are sealed by firmware TPM (fTPM) running in OP-TEE and stored in eMMC RPMB. Features: - First-boot in-place encryption with tpm2_getrandom key generation - TPM-sealed key storage via persistent handle 0x81080001 - Automatic unlock on subsequent boots - Space verification ensuring 32MB available for LUKS header Update packagegroup-ti-core-initramfs to conditionally include the module when MACHINE_FEATURES contains 'luks-encryption'. Signed-off-by: Shiva Tripathi --- .../initramfs-module-luks-ftpm/luksftpm | 341 ++++++++++++++++++ .../initramfs-module-luks-ftpm_1.0.bb | 41 +++ .../packagegroup-ti-core-initramfs.bb | 1 + 3 files changed, 383 insertions(+) create mode 100644 meta-ti-bsp/recipes-ti/initramfs/initramfs-module-luks-ftpm/luksftpm create mode 100644 meta-ti-bsp/recipes-ti/initramfs/initramfs-module-luks-ftpm_1.0.bb diff --git a/meta-ti-bsp/recipes-ti/initramfs/initramfs-module-luks-ftpm/luksftpm b/meta-ti-bsp/recipes-ti/initramfs/initramfs-module-luks-ftpm/luksftpm new file mode 100644 index 00000000..5e3aedc4 --- /dev/null +++ b/meta-ti-bsp/recipes-ti/initramfs/initramfs-module-luks-ftpm/luksftpm @@ -0,0 +1,341 @@ +#!/bin/sh +# initramfs-framework module for LUKS encryption with fTPM support + +# Configuration +BOOT_DEV="/dev/mmcblk1p1" # Boot partition (FAT, unencrypted) +ROOT_DEV="/dev/mmcblk1p2" # Root partition (will be encrypted) +CRYPT_NAME="root_crypt" +CRYPT_DEV="/dev/mapper/${CRYPT_NAME}" +BOOT_MNT="/boot_part" +TPM_PRIMARY_CTX="/tmp/tpm_primary.ctx" +TPM_KEY_PRIV="/tmp/tpm_key.priv" +TPM_KEY_PUB="/tmp/tpm_key.pub" +TPM_KEY_CTX="/tmp/tpm_key.ctx" +TPM2_HANDLE="0x81080001" # TPM persistent handle for LUKS key +ENCRYPTION_MARKER="${BOOT_MNT}/.encryption_in_progress" + +# Wait for MMC device to appear +wait_for_device() { + local device="$1" + local timeout="${2:-10}" + + msg "Waiting for storage device ${device}..." + for i in $(seq 1 ${timeout}); do + if [ -b "${device}" ]; then + return 0 + fi + sleep 1 + done + return 1 +} + +# Initialize fTPM and check availability +init_ftpm() { + msg "Initializing secure hardware (fTPM)..." + + # Start TEE supplicant (required for fTPM TA to work) + if [ -x /usr/sbin/tee-supplicant ]; then + /usr/sbin/tee-supplicant -d & + TEE_SUPPLICANT_PID=$! + sleep 5 + else + info "Warning: Trusted execution environment not available" + return 1 + fi + + # Load fTPM kernel module + if ! /sbin/modprobe tpm_ftpm_tee; then + info "Warning: TPM module failed to load" + return 1 + fi + + # Wait for TPM device + for i in $(seq 1 10); do + if [ -c /dev/tpmrm0 ]; then + export TPM2TOOLS_TCTI="device:/dev/tpmrm0" + return 0 + fi + sleep 1 + done + + info "Warning: fTPM not available - encryption will be skipped" + return 1 +} + +# Generate 32-byte random key using TPM RNG +generate_random_key() { + /usr/bin/tpm2_getrandom --hex 32 +} + +# Seal data with TPM and store in persistent handle +tpm_seal_key() { + local KEY_DATA="$1" + + # Create primary key in owner hierarchy + /usr/bin/tpm2_createprimary -C o -c "${TPM_PRIMARY_CTX}" -Q || return 1 + + # Create sealed object + echo -n "${KEY_DATA}" | \ + /usr/bin/tpm2_create -C "${TPM_PRIMARY_CTX}" \ + -u "${TPM_KEY_PUB}" -r "${TPM_KEY_PRIV}" \ + -i- -Q || return 1 + + # Load sealed object into TPM + /usr/bin/tpm2_load -C "${TPM_PRIMARY_CTX}" \ + -u "${TPM_KEY_PUB}" -r "${TPM_KEY_PRIV}" \ + -c "${TPM_KEY_CTX}" -Q || return 1 + + # Make key persistent at handle (stored in TPM NV RAM - RPMB) + /usr/bin/tpm2_evictcontrol -C o -c "${TPM_KEY_CTX}" "${TPM2_HANDLE}" || return 1 + + return 0 +} + +# Unseal data from TPM persistent handle +tpm_unseal_key() { + # Check if persistent handle exists + if ! /usr/bin/tpm2_getcap handles-persistent | grep -q "${TPM2_HANDLE}"; then + debug "ERROR: TPM persistent handle not found" + return 1 + fi + + # Unseal key directly from persistent handle + /usr/bin/tpm2_unseal -c "${TPM2_HANDLE}" || return 1 + + return 0 +} + +# Perform in-place LUKS encryption (first boot) +encrypt_root_filesystem() { + msg "==========================================" + msg "First boot: Encrypting root filesystem" + msg "==========================================" + + # Set marker to track encryption progress + touch "${ENCRYPTION_MARKER}" + sync + + # Generate random encryption key using TPM RNG + msg "Generating encryption key..." + LUKS_KEY=$(generate_random_key) + + if [ -z "${LUKS_KEY}" ]; then + msg "ERROR: Failed to generate encryption key" + rm -f "${ENCRYPTION_MARKER}" + return 1 + fi + + # Seal key with TPM before encryption starts + msg "Securing key with TPM..." + if ! tpm_seal_key "${LUKS_KEY}"; then + msg "ERROR: Failed to secure key" + rm -f "${ENCRYPTION_MARKER}" + return 1 + fi + + # Filesystem check before encryption + msg "Checking filesystem integrity..." + /usr/sbin/e2fsck -f -y "${ROOT_DEV}" + E2FSCK_RET=$? + if [ ${E2FSCK_RET} -ge 4 ]; then + msg "ERROR: Filesystem check failed" + rm -f "${ENCRYPTION_MARKER}" + return 1 + fi + + # Shrink filesystem before encryption to leave room for LUKS header + msg "Preparing filesystem for encryption..." + /usr/sbin/resize2fs -M "${ROOT_DEV}" || { + msg "ERROR: Failed to prepare filesystem" + rm -f "${ENCRYPTION_MARKER}" + return 1 + } + + # Verify partition has sufficient space for LUKS header + msg "Verifying space for encryption..." + MIN_BLOCKS=$(/usr/sbin/resize2fs -P "${ROOT_DEV}" 2>&1 | awk '/[Mm]inimum.*:/ {print $NF}') + + # Get filesystem block size and device size + BLOCK_SIZE=$(/usr/sbin/tune2fs -l "${ROOT_DEV}" 2>/dev/null | awk '/^Block size:/ {print $NF}') + DEV_NAME=$(basename "${ROOT_DEV}") + PART_SECTORS=$(cat /sys/class/block/"${DEV_NAME}"/size 2>/dev/null) + + if [ -z "${MIN_BLOCKS}" ] || [ -z "${BLOCK_SIZE}" ] || [ -z "${PART_SECTORS}" ]; then + msg "ERROR: Unable to determine partition geometry" + rm -f "${ENCRYPTION_MARKER}" + return 1 + fi + + # Convert filesystem blocks to 512-byte sectors + MIN_SECTORS=$((MIN_BLOCKS * BLOCK_SIZE / 512)) + LUKS_SECTORS=65536 # 32MB in 512-byte sectors + + if [ $((PART_SECTORS - MIN_SECTORS)) -lt ${LUKS_SECTORS} ]; then + msg "ERROR: Insufficient space for LUKS header (need 32MB free)" + rm -f "${ENCRYPTION_MARKER}" + return 1 + fi + + # Perform in-place encryption + msg "==========================================" + msg "Encrypting filesystem..." + msg "This will take several minutes." + msg "DO NOT POWER OFF THE DEVICE!" + msg "==========================================" + + echo -n "${LUKS_KEY}" | \ + /usr/sbin/cryptsetup reencrypt --encrypt \ + --type luks2 \ + --cipher aes-xts-plain64 \ + --key-size 256 \ + --hash sha256 \ + --reduce-device-size 32M \ + --key-file - \ + "${ROOT_DEV}" || { + msg "ERROR: Encryption failed" + rm -f "${ENCRYPTION_MARKER}" + return 1 + } + + msg "==========================================" + msg "Encryption completed successfully!" + msg "==========================================" + + # Remove encryption marker + rm -f "${ENCRYPTION_MARKER}" + sync + + # Unlock the newly encrypted device + msg "Activating encrypted filesystem..." + echo -n "${LUKS_KEY}" | \ + /usr/sbin/cryptsetup luksOpen "${ROOT_DEV}" "${CRYPT_NAME}" --key-file - || { + msg "ERROR: Failed to activate encrypted filesystem" + return 1 + } + + # Resize filesystem to fit the encrypted device + msg "Optimizing filesystem..." + /usr/sbin/resize2fs -f "${CRYPT_DEV}" || { + msg "ERROR: Failed to optimize filesystem" + return 1 + } + + # Verify filesystem after resize + /usr/sbin/e2fsck -f -y "${CRYPT_DEV}" || { + info "WARNING: Filesystem verification had issues, but continuing" + } + + return 0 +} + +# Unlock encrypted root filesystem (subsequent boots) +unlock_encrypted_root() { + msg "Unlocking encrypted filesystem..." + + # Unseal key from TPM persistent handle + LUKS_KEY=$(tpm_unseal_key) + + if [ -z "${LUKS_KEY}" ]; then + msg "ERROR: Failed to retrieve encryption key from TPM" + msg "Attempting passphrase fallback..." + + # Try to unlock with passphrase (interactive) + /usr/sbin/cryptsetup luksOpen "${ROOT_DEV}" "${CRYPT_NAME}" || { + fatal "ERROR: Failed to unlock encrypted filesystem" + } + else + # Unlock with unsealed key + echo -n "${LUKS_KEY}" | \ + /usr/sbin/cryptsetup luksOpen "${ROOT_DEV}" "${CRYPT_NAME}" --key-file - || { + fatal "ERROR: Failed to unlock with TPM key" + } + fi + + msg "Encrypted filesystem unlocked" +} + +# Module enabled check +luksftpm_enabled() { + # Always run this module - it handles both encrypted and unencrypted cases + return 0 +} + +# Module main function +luksftpm_run() { + # Wait for storage device + if ! wait_for_device "${ROOT_DEV}" 10; then + info "Storage device not found, skipping encryption module" + return 0 + fi + + # Mount boot partition + msg "Mounting boot partition..." + mkdir -p "${BOOT_MNT}" + if ! mount "${BOOT_DEV}" "${BOOT_MNT}"; then + info "ERROR: Failed to mount boot partition, attempting standard boot..." + mkdir -p ${ROOTFS_DIR} + mount "${ROOT_DEV}" ${ROOTFS_DIR} + return 0 + fi + + # Initialize fTPM + TPM_AVAILABLE=0 + if init_ftpm; then + TPM_AVAILABLE=1 + fi + + # Check filesystem encryption status + msg "Checking filesystem encryption status..." + + MOUNT_DEV="${ROOT_DEV}" + + if /usr/sbin/cryptsetup isLuks "${ROOT_DEV}"; then + msg "Filesystem is encrypted" + unlock_encrypted_root + MOUNT_DEV="${CRYPT_DEV}" + else + msg "Filesystem is not encrypted" + + # Check if encryption is enabled and TPM is available + if [ $TPM_AVAILABLE -eq 1 ]; then + # Check for encryption marker (resume interrupted encryption) + if [ -f "${ENCRYPTION_MARKER}" ]; then + msg "Resuming interrupted encryption..." + if ! encrypt_root_filesystem; then + msg "ERROR: Failed to resume encryption" + msg "Booting without encryption..." + MOUNT_DEV="${ROOT_DEV}" + else + MOUNT_DEV="${CRYPT_DEV}" + fi + else + # First boot - perform encryption + if encrypt_root_filesystem; then + MOUNT_DEV="${CRYPT_DEV}" + else + msg "ERROR: Encryption failed - booting without encryption" + MOUNT_DEV="${ROOT_DEV}" + fi + fi + else + msg "TPM not available - skipping encryption" + MOUNT_DEV="${ROOT_DEV}" + fi + fi + + # Unmount boot partition before switching root + umount "${BOOT_MNT}" + + # Mount root filesystem to $ROOTFS_DIR (framework expects this) + msg "Mounting root filesystem..." + mkdir -p ${ROOTFS_DIR} + mount "${MOUNT_DEV}" ${ROOTFS_DIR} || { + fatal "ERROR: Failed to mount root filesystem!" + } + + # Clean up tmpfs and sensitive variables + rm -f "${TPM_PRIMARY_CTX}" "${TPM_KEY_PUB}" "${TPM_KEY_PRIV}" "${TPM_KEY_CTX}" + unset LUKS_KEY TPM_AVAILABLE MOUNT_DEV TEE_SUPPLICANT_PID + + msg "Boot complete" +} diff --git a/meta-ti-bsp/recipes-ti/initramfs/initramfs-module-luks-ftpm_1.0.bb b/meta-ti-bsp/recipes-ti/initramfs/initramfs-module-luks-ftpm_1.0.bb new file mode 100644 index 00000000..c0a07bde --- /dev/null +++ b/meta-ti-bsp/recipes-ti/initramfs/initramfs-module-luks-ftpm_1.0.bb @@ -0,0 +1,41 @@ +SUMMARY = "initramfs support for LUKS encryption with fTPM" +DESCRIPTION = "Provides LUKS2 full disk encryption using firmware TPM (fTPM) for key management on TI K3 platforms" + +LICENSE = "MIT" +LIC_FILES_CHKSUM = "file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420" + +# Only build this when luks-encryption feature is enabled +COMPATIBLE_MACHINE = "null" +COMPATIBLE_MACHINE:k3 = "${@bb.utils.contains('MACHINE_FEATURES', 'luks-encryption', '.*', 'null', d)}" + +FILESEXTRAPATHS:prepend := "${THISDIR}/${PN}:" + +SRC_URI = "file://luksftpm" + +do_install() { + install -d ${D}/init.d + # Install as 85-luksftpm (runs after udev at 01, before rootfs at 90) + install -m 0755 ${UNPACKDIR}/luksftpm ${D}/init.d/85-luksftpm +} + +FILES:${PN} = "/init.d/85-luksftpm" + +# Runtime dependencies +RDEPENDS:${PN} = "\ + initramfs-framework-base \ + busybox \ + kmod \ + cryptsetup \ + tpm2-tools \ + tpm2-tss \ + libtss2-tcti-device \ + optee-client \ + optee-ftpm \ + e2fsprogs-e2fsck \ + e2fsprogs-resize2fs \ + e2fsprogs-tune2fs \ + util-linux-blkid \ + kernel-module-tpm-ftpm-tee \ +" + +PACKAGE_ARCH = "${MACHINE_ARCH}" diff --git a/meta-ti-bsp/recipes-ti/initramfs/packagegroup-ti-core-initramfs.bb b/meta-ti-bsp/recipes-ti/initramfs/packagegroup-ti-core-initramfs.bb index a9eff847..9d8f0a47 100644 --- a/meta-ti-bsp/recipes-ti/initramfs/packagegroup-ti-core-initramfs.bb +++ b/meta-ti-bsp/recipes-ti/initramfs/packagegroup-ti-core-initramfs.bb @@ -22,4 +22,5 @@ RDEPENDS:${PN} += "\ initramfs-module-udev \ initramfs-module-nfsrootfs \ nfs-utils-mount \ + ${@bb.utils.contains('MACHINE_FEATURES', 'luks-encryption', 'initramfs-module-luks-ftpm', '', d)} \ " From patchwork Wed Mar 4 19:38:24 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Shiva Tripathi X-Patchwork-Id: 82512 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 416DBEFCE41 for ; Wed, 4 Mar 2026 19:39:10 +0000 (UTC) Received: from PH7PR06CU001.outbound.protection.outlook.com (PH7PR06CU001.outbound.protection.outlook.com [52.101.201.9]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.27172.1772653143820727912 for ; Wed, 04 Mar 2026 11:39:03 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="dkim: body hash did not verify" header.i=@ti.com header.s=selector1 header.b=hB0SdAzy; spf=permerror, err=parse error for token &{10 18 spf.protection.outlook.com}: limit exceeded (domain: ti.com, ip: 52.101.201.9, mailfrom: s-tripathi1@ti.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=RYKJFNzDionai/q+XbBngQGeAUkk8Dz6acKKnWOjgS2Fz3bPwXtRQ84HqB//O5eMO5ZCd/lCdCD0gQIoEx0rFqcs0UlWXUgcN7s/oboM5RMsqbfkJ57YKcuojfmu+AsHhF4kCL6Z0O344Po+0YG0V1kkcPtJEuE4w2JpdE2KjnhOg4Uz4qWHC1ACEx4JvduF9NH8VrRd4rqD1HVNjKQXMHiX2NasqOYSSAwvOskCp2ZmtZ5EKpsSY9qJnTJvDpPp/bMeq61yYOMzOMkj1bY56eOSVAdQAzy8smIVMRwAX3NN0YBDxqi/nbnVspKwfKfd40enTjXBR/kHAlntYvHT2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=7Cct0HzdbOkp8APV2bfilgofKlq4DPVEGJocCtMuvBs=; b=Uweq91RT5xkFzQOSxWvi79uu8Eoy60CisvF7GnAvUxADf3Etbl0n041y9uY0MhUibEjCNpuGo9NvDNSBKvwsjqSaPSvcbB1wenFEWRpxuIAY9bZixjYkBYRK6Ik+2EnzGxlY33S01AFt9t4BXIXqVah2cJcY8Yhp+WnlRIlSRWDvCjUqH6PdKNNqP7YKaRTvWuBN4Gx3lanKfxHi4BEuxOvR1s6NbotkeNuWh2xrW28SDBhPFxA34Bzf6C6ywS0VCPCVEkuCFcuFfUIkmmfUX9LODr6IDYx1FOQ+a+z6fI+WntqXcWp1YXV337jHiN14q88ZvWdSLU39RKlwcG/mrg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 198.47.23.195) smtp.rcpttodomain=criticallink.com smtp.mailfrom=ti.com; dmarc=pass (p=quarantine sp=none pct=100) action=none header.from=ti.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7Cct0HzdbOkp8APV2bfilgofKlq4DPVEGJocCtMuvBs=; b=hB0SdAzylCp53V3gEXGQ/ehwvQkExn9hKFUJVKnUBd87FwVSv6IrHETwMlPG1BV1v4qwaIRZj6gWo3jJ7ftP33wpC0h86Nm1Zh14gVER2ZAt9uDIOczpa5zIXjJwL6z4y7yuc1VAistAu928x4z3RZDSvGK7rVzG50wc5XbMu98= Received: from DS0PR17CA0015.namprd17.prod.outlook.com (2603:10b6:8:191::23) by SJ0PR10MB4735.namprd10.prod.outlook.com (2603:10b6:a03:2d1::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9654.14; Wed, 4 Mar 2026 19:39:01 +0000 Received: from DS1PEPF0001709B.namprd05.prod.outlook.com (2603:10b6:8:191:cafe::ad) by DS0PR17CA0015.outlook.office365.com (2603:10b6:8:191::23) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9654.22 via Frontend Transport; Wed, 4 Mar 2026 19:39:01 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 198.47.23.195) smtp.mailfrom=ti.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=ti.com; Received-SPF: Pass (protection.outlook.com: domain of ti.com designates 198.47.23.195 as permitted sender) receiver=protection.outlook.com; client-ip=198.47.23.195; helo=lewvzet201.ext.ti.com; pr=C Received: from lewvzet201.ext.ti.com (198.47.23.195) by DS1PEPF0001709B.mail.protection.outlook.com (10.167.18.105) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9678.18 via Frontend Transport; Wed, 4 Mar 2026 19:39:00 +0000 Received: from DLEE207.ent.ti.com (157.170.170.95) by lewvzet201.ext.ti.com (10.4.14.104) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Wed, 4 Mar 2026 13:39:00 -0600 Received: from DLEE215.ent.ti.com (157.170.170.118) by DLEE207.ent.ti.com (157.170.170.95) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Wed, 4 Mar 2026 13:39:00 -0600 Received: from lelvem-mr05.itg.ti.com (10.180.75.9) by DLEE215.ent.ti.com (157.170.170.118) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20 via Frontend Transport; Wed, 4 Mar 2026 13:39:00 -0600 Received: from HP-Z2-Tower-G9.dhcp.ti.com (hp-z2-tower-g9.dhcp.ti.com [10.24.68.200]) by lelvem-mr05.itg.ti.com (8.18.1/8.18.1) with ESMTP id 624JcaZM956747; Wed, 4 Mar 2026 13:38:57 -0600 From: Shiva Tripathi To: CC: , , , , , , , Subject: [meta-ti][master][PATCH v3 3/3] machine: Add encrypted boot configuration Date: Thu, 5 Mar 2026 01:08:24 +0530 Message-ID: <20260304193824.2495898-4-s-tripathi1@ti.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20260304193824.2495898-1-s-tripathi1@ti.com> References: <20260304193824.2495898-1-s-tripathi1@ti.com> MIME-Version: 1.0 X-C2ProcessedOrg: 333ef613-75bf-4e12-a4b1-8e3623f5dcea X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DS1PEPF0001709B:EE_|SJ0PR10MB4735:EE_ X-MS-Office365-Filtering-Correlation-Id: 4564631f-21ee-4eea-8cea-08de7a25af80 X-LD-Processed: e5b49634-450b-4709-8abb-1e2b19b982b7,ExtAddr X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|36860700016|1800799024|34020700016|82310400026|376014; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:198.47.23.195;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:lewvzet201.ext.ti.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(36860700016)(1800799024)(34020700016)(82310400026)(376014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 36/DLVx8sjfEiTQQW5QsttRoDHkpj7QMBdKp2spP3+49K2g/3pQCXwFHXGmvubsrVrzCE9kK/eg+6GZEjEdYZX/CJzZTLTMLH02QfaLm7E4qdw5HCi/4+1FGuWEfuflASnTUvlKzqQINyj8CU89CFZWjYtEuX1Us0HKDeKumobosSO9m/FUBGnhRyQLFktrSpy0Zb6K+6s84viUA6zhAvQKyzqrSQ3zk+ovJLeUR6VJ2PHw8m/zNb98lda9A2Ti2TCHxFLwt2qk3HLAvS5ng9XYF7J8H3CKGzd/Lmgt3yWyJlPwDA0Ku5gT6BqddmJayY5mnB07Zds9azras8Hg2y01VDYq7TmXU/gebtfcDzRvuVSff2J+tmlaU0ABIwt54S/eOlI2UFWJuDJPxReMv7fFtmeZjuGyHTXkYQ2Phwmimq+41lUYmy2ZXpsA5JyDd X-OriginatorOrg: ti.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2026 19:39:00.8947 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 4564631f-21ee-4eea-8cea-08de7a25af80 X-MS-Exchange-CrossTenant-Id: e5b49634-450b-4709-8abb-1e2b19b982b7 X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=e5b49634-450b-4709-8abb-1e2b19b982b7;Ip=[198.47.23.195];Helo=[lewvzet201.ext.ti.com] X-MS-Exchange-CrossTenant-AuthSource: DS1PEPF0001709B.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR10MB4735 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 04 Mar 2026 19:39:10 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-ti/message/19644 Add encrypted-boot-common.inc for machines supporting LUKS encryption with fTPM. Triggers ti-core-initramfs build and overrides IMAGE_FILE to use uncompressed cpio. Signed-off-by: Shiva Tripathi --- .../machine/include/encrypted-boot-common.inc | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) create mode 100644 meta-ti-bsp/conf/machine/include/encrypted-boot-common.inc diff --git a/meta-ti-bsp/conf/machine/include/encrypted-boot-common.inc b/meta-ti-bsp/conf/machine/include/encrypted-boot-common.inc new file mode 100644 index 00000000..10a5cb86 --- /dev/null +++ b/meta-ti-bsp/conf/machine/include/encrypted-boot-common.inc @@ -0,0 +1,16 @@ +# Common logic for encrypted boot with TPM-sealed LUKS keys +# +# This include file enables ti-core-initramfs with LUKS encryption support +# via the initramfs-module-luks-ftpm hook module. +# +# To use this in custom image, add to your image bbappend: +# require conf/machine/include/encrypted-boot-common.inc +# +# This will activate when MACHINE_FEATURES contains 'luks-encryption' + +TI_CORE_INITRAMFS_EXTRA_INSTALL:append = "${@bb.utils.contains('MACHINE_FEATURES', 'luks-encryption', ' ', '', d)}" + +TI_CORE_INITRAMFS_ENABLED ?= "${@ '1' if d.getVar('TI_CORE_INITRAMFS_KERNEL_MODULES') or d.getVar('TI_CORE_INITRAMFS_EXTRA_INSTALL') or bb.utils.contains('MACHINE_FEATURES', 'luks-encryption', 'true', 'false', d) else '0'}" + +# Override to use uncompressed cpio (U-Boot can't decompress XZ format) +TI_CORE_INITRAMFS_IMAGE_FILE = "${TI_CORE_INITRAMFS_IMAGE}.cpio;initramfs.cpio"