Am 08.02.23 um 21:58 schrieb Ryan Eatmon:
>
>
> On 2/7/2023 17:44, Andrew Davis via lists.yoctoproject.org wrote:
>> On 2/1/23 8:31 AM, Wadim Egorov wrote:
>>> Check if ${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh is set
>>> before signing firmware for am62xx based machines. Otherwise do not
>>> sign, instead copy the binary and warn about it.
>>>
>>> Fixes
>>>    run.do_install: 111: /scripts/secure-binary-image.sh: not found
>>>
>>> Signed-off-by: Wadim Egorov <[email protected]>
>>> ---
>>
>> This patch only fixes this for AM62x, a better way might be to use
>> the ti-k3-secdev-native package to get the signing tool when it is
>> not defined. I do that in the series for Kirkstone that includes
>> several fixes to this recipe[0].
>>
>> Andrew
>>
>> [0] 
>> https://lists.yoctoproject.org/g/meta-ti/topic/master_kirkstone_patch_1_8/96819771
>
> I had similar comments.  This patch is too narrowly focused to just a single 
> platform, I know it was the platform you were caring about but the patch as 
> is 
> is too narrow.  And, the requirement we have is to generate the signed 
> images, 
> so bypassing the signing is not going to fly.
>
> All that said, I have back ported the above patch that is pending for 
> kirkstone to dunfell.  So this patch should not be needed because it will use 
> in the internal recipe to fetch the signing tool if you are not using the 
> external toolset.

Thank you for backporting it to dunfell :)


>
>
>>> recipes-ti/ti-rtos-bin/ti-rtos-firmware.bb | 17 ++++++++++++++---
>>>   1 file changed, 14 insertions(+), 3 deletions(-)
>>>
>>> diff --git a/recipes-ti/ti-rtos-bin/ti-rtos-firmware.bb 
>>> b/recipes-ti/ti-rtos-bin/ti-rtos-firmware.bb
>>> index 72d85a6b..66c6a4e4 100644
>>> --- a/recipes-ti/ti-rtos-bin/ti-rtos-firmware.bb
>>> +++ b/recipes-ti/ti-rtos-bin/ti-rtos-firmware.bb
>>> @@ -179,12 +179,23 @@ do_install_prepend_am62xx() {
>>>           export TI_SECURE_DEV_PKG=${TI_SECURE_DEV_PKG}
>>>           ( cd ${RTOS_DM_FW_DIR}; \
>>>                   mv ${DM_FIRMWARE} ${DM_FIRMWARE}.unsigned; \
>>> - ${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh 
>>> ${DM_FIRMWARE}.unsigned ${DM_FIRMWARE}; \
>>> +                if [ -f 
>>> ${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh 
>>> ]; then \
>>> + ${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh 
>>> ${DM_FIRMWARE}.unsigned ${DM_FIRMWARE}; \
>>> +                else \
>>> +                    echo "Warning: TI_SECURE_DEV_PKG not set, 
>>> ${DM_FIRMWARE} not signed."; \
>>> +                    cp ${DM_FIRMWARE}.unsigned ${DM_FIRMWARE}; \
>>> +                fi; \
>>>           )
>>>           ( cd ${RTOS_IPC_FW_DIR}; \
>>>                   mv am62-mcu-m4f0_0-fw 
>>> ipc_echo_baremetal_test_mcu2_0_release_strip.xer5f; \
>>> - ${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh 
>>> ipc_echo_baremetal_test_mcu2_0_release_strip.xer5f \
>>> - ipc_echo_baremetal_test_mcu2_0_release_strip.xer5f.signed; \
>>> +
>>> +                if [ -f 
>>> ${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh 
>>> ]; then \
>>> + ${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh 
>>> ipc_echo_baremetal_test_mcu2_0_release_strip.xer5f \
>>> + ipc_echo_baremetal_test_mcu2_0_release_strip.xer5f.signed; \
>>> +                else \
>>> +                    echo "Warning: TI_SECURE_DEV_PKG not set, 
>>> ipc_echo_baremetal_test_mcu2_0_release_strip.xer5f not signed"; \
>>> +                    cp ipc_echo_baremetal_test_mcu2_0_release_strip.xer5f 
>>> ipc_echo_baremetal_test_mcu2_0_release_strip.xer5f.signed; \
>>> +                fi; \
>>>           )
>>>   }
>>>
>>>
>>>
>>>
>>>
>>
>>
>> 
>>
>

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#15770): 
https://lists.yoctoproject.org/g/meta-ti/message/15770
Mute This Topic: https://lists.yoctoproject.org/mt/96677334/21656
Group Owner: [email protected]
Unsubscribe: https://lists.yoctoproject.org/g/meta-ti/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to