1
0
mirror of https://git.yoctoproject.org/meta-ti synced 2026-04-18 02:29:32 +00:00

Compare commits

...

148 Commits

Author SHA1 Message Date
LCPD Automation Script
fa04fd281b CI/CD Auto-Merger: cicd.master.202604161800
Updated the value(s) for:
  atf: SRCREV_tfa:am62lxx
  u-boot-ti-staging_2025.01: SRCREV_uboot
  u-boot-ti-staging_2026.01: SRCREV_uboot
  linux-ti-staging-rt_6.12: SRCREV_ARM32
  linux-ti-staging_6.12: SRCREV
  linux-ti-staging_6.18: SRCREV

Changelogs:
  u-boot-ti-staging_2025.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=7b9dedb046eb6a720997f61582c7b13da1b5b9f0..19795f63be7ee27e38b6e800ff6c88a2feaae13f
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=2549829cc194ffd9e38b755d2e10c7fc4cd971eb..ee3048ee0822c35312379b6e24b5c80e9a845110
  linux-ti-staging-rt_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=a3bc6dc973a99822f0707b1c9ba06b56bf142076..62fdc7890cde3197051743120ff44162b7356cc5
  linux-ti-staging_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=da3c0f0a33ac00f7138c695a16d90301cf7ec02b..c52c5589aab8c376f975b1feb7b8746b7b6624bd
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=c214492085504176b9c252a7175e4e60b4b442af..fa14abf25646c5814b997836539dbb859d6a669f

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-04-17 10:39:25 -05:00
LCPD Automation Script
f3081d9c34 u-boot-ti-mainline: Update to version: v2026.04
Updated the value(s) for:
  u-boot-ti-mainline: PV,SRCREV_uboot

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-04-17 10:39:09 -05:00
Franz Schnyder
27615406ab conf: machine: j784s4: Move ti-eth-fw-j784s4 to EVM conf
The `ti-eth-fw-j784s4` firmware is added in the generic J784s4 SoC
include, which is therefore used for all the J784s4-based machines.
That firmware seems to be developed specifically for the EVM, as it
takes control of pins used for the Ethernet board setup on the EVM. On
non-EVM boards, like the Aquila-AM69, those signals are used for other
functions, so enabling the firmware in the SoC include is too broad
and breaks functionality.

Move the machine-essential recommend from the SoC include
to the EVM configuration.

Signed-off-by: Franz Schnyder <franz.schnyder@toradex.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-04-17 10:39:09 -05:00
Ryan Eatmon
1a17ddb163 check_yocto_rules: Add new exclude file
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-04-17 10:36:46 -05:00
Antonios Christidis
00102868ec mesa-pvr: Add patch for gallium fix due to LLVM 22
Add patch for gallium fix due to LLVM 22.

Signed-off-by: Antonios Christidis <a-christidis@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-04-17 10:36:46 -05:00
Randolph Sapp
705e9d2bb0 k3: use ttyS2 as the primary console
The ordering of parameters in SERIAL_CONSOLES matters. The first value
is picked as the KERNEL_CONSOLE and used as the console definition for
grub as of:

9dc647e5 (k3: set console parameter to KERNEL_CONSOLE, 2026-03-18)

Ideally this will be split out into a separate board configuration
parameter in the future, as there are already some board specific
overrides right now.

Signed-off-by: Randolph Sapp <rs@ti.com>
Acked-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-04-17 10:36:43 -05:00
Denys Dmytriyenko (TI)
f342599208 wic: move wks files into files/wic/
Move our wks files into files/wic/ per [1].

[1] https://git.openembedded.org/openembedded-core/commit/?id=07e410600c41103098b670f12abe87f64419a624

Signed-off-by: Denys Dmytriyenko (TI) <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-04-08 16:05:22 -05:00
LCPD Automation Script
3db8ddf7f8 CI/CD Auto-Merger: cicd.master.202603261656
Updated the value(s) for:
  u-boot-ti-staging_2026.01: SRCREV_uboot
  linux-ti-staging_6.18: SRCREV

Changelogs:
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=a46241db71e383bb6dda103ecad12b13e7af3c38..2549829cc194ffd9e38b755d2e10c7fc4cd971eb
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=c164e381f6bc1a72b527f0bf3a6b1fc9af06517f..c214492085504176b9c252a7175e4e60b4b442af

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-03-26 16:57:53 -05:00
Anshul Dalal
7640ce6a58 am62lxx-evm: fix fitImage address for 128MiB
This patch modifies the load addresses for the kernel fitImage to
provide out-of-box support for 128MiB DDR sizes on AM62l.

The current fitImage uses 0x88000000 as the DTB load address which is
beyond the 128MiB boundary while the kernel load address of 0x82000000
conflicts with U-Boot's SPL load address which causes problems when
enabling falcon mode on the device.

Signed-off-by: Anshul Dalal <anshuld@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-26 15:19:43 -05:00
Shiva Tripathi
764817c28e conf: Enable dynamic tpm-layer support for LUKS
Add BBFILES_DYNAMIC registration for 'tpm-layer' collection to
conditionally include LUKS recipes from dynamic-layers/tpm-layer/
when meta-security/meta-tpm layer is present.

Add tpm-layer to LAYERRECOMMENDS to document the optional
dependency for LUKS functionality.

Update ti-core-initramfs.inc to auto-enable initramfs generation
when DISTRO_FEATURES contains 'luks'.

Signed-off-by: Shiva Tripathi <s-tripathi1@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-26 09:40:56 -05:00
Shiva Tripathi
bd0e3d7ba5 initramfs-module-luks-ftpm: Add fTPM support
Add initramfs module to dynamic-layers/tpm-layer providing LUKS2 full
disk encryption with TPM-sealed keys for TI K3 platforms. Keys are
sealed by firmware TPM (fTPM) running in OP-TEE and stored in eMMC
RPMB.

Features:
- First-boot in-place encryption with tpm2_getrandom key generation
- TPM-sealed key storage via persistent handle 0x81080001
- Automatic unlock on subsequent boots
- Space verification ensuring 32MB available for LUKS header

The module is built only when meta-tpm layer is present and gets
included in initramfs only when DISTRO_FEATURES='luks' and
MACHINE_FEATURES='optee-ftpm'

LUKS packages (cryptsetup, tpm2-tools, tpm2-tss, optee-ftpm,
e2fsprogs-*) significantly increase initramfs size beyond the default
131072 limit. Increase INITRAMFS_MAXSIZE to 200000 to accommodate
these packages.

Signed-off-by: Shiva Tripathi <s-tripathi1@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-26 09:40:56 -05:00
Shiva Tripathi
6f205ef079 linux-ti-staging: Add LUKS encryption config
Add kernel configuration fragment enabling dm-crypt and crypto
algorithms required for LUKS2 full disk encryption. Config is
applied when DISTRO_FEATURES contains 'luks'.

Includes ARM64 crypto optimizations and fTPM support.

Signed-off-by: Shiva Tripathi <s-tripathi1@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-26 09:40:56 -05:00
Mahammed Sadik Shaik
4c4f4b495d ti-extras: update srcrev for jailhouse
update jailhouse linux and uboot to latest

Signed-off-by: Mahammed Sadik Shaik <s-sadik@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-26 09:40:56 -05:00
LCPD Automation Script
ed4c7f9ead CI/CD Auto-Merger: cicd.master.202603241800
Updated the value(s) for:
  ti-linux-fw: TI_LINUX_FW_SRCREV
  u-boot-ti-staging_2025.01: SRCREV_uboot
  linux-ti-staging_6.18: SRCREV

Changelogs:
  ti-linux-fw: https://git.ti.com/cgit/processor-firmware/ti-linux-firmware/log/?qt=range&q=aaa3d54aaa9e837834fa6b6dd99e9fefdfcf7949..9e9d50ff563f83db86d36b72cd7fb4f487d6b414
  u-boot-ti-staging_2025.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=ef2eb76b650415637bd93b0eddfb1e31489117f9..7b9dedb046eb6a720997f61582c7b13da1b5b9f0
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=fa0fe817f5ee1b0542f757abaded245c6e5a1321..c164e381f6bc1a72b527f0bf3a6b1fc9af06517f

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-03-24 18:00:45 -05:00
Ryan Eatmon
e00f8d22d8 weston: Update to 15.0.0
oe-core has bumped the version to 15.0.0 [1].  We need to adjust the
bbappend version to % to better match future version changes.

Additionally, the patch needs to be updated to match the weston code
changes.

[1] https://git.openembedded.org/openembedded-core/commit/?id=a1ed6fddd99171536e23d63a5d5b180019d672ad

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-24 16:56:39 -05:00
Ryan Eatmon
36901e8b0f am65xx-evm-k3r5.conf: Fix defconfig for the main build
A copy/paste error set the wrong defconfig for the main build when
setting up the test build flow.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-20 14:21:11 -05:00
Ryan Eatmon
2537d1cce4 check_yocto_rules: Add new exception
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-20 14:21:11 -05:00
Pratham Deshmukh
60d0643b51 conf: machine: am62lxx-evm: Increase max LEB count
The mkfs.ubifs tool was failing with "max_leb_cnt too low (10077 needed)"
error when building tisdk-default-image for am62lxx-evm-rt. Increased
the -c parameter in MKUBIFS_ARGS from 8500 to 12000 to accommodate the
larger filesystem size requirement.

Signed-off-by: Pratham Deshmukh <p-deshmukh@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-20 14:21:11 -05:00
LCPD Automation Script
10a5021d17 CI/CD Auto-Merger: cicd.master.202603191530
Updated the value(s) for:
  ti-linux-fw: TI_LINUX_FW_SRCREV
  atf: SRCREV_tfa:am62lxx
  u-boot-ti-staging_2026.01: SRCREV_uboot
  linux-ti-staging_6.18: SRCREV

Changelogs:
  ti-linux-fw: https://git.ti.com/cgit/processor-firmware/ti-linux-firmware/log/?qt=range&q=a85ebd5c5b216646779b3d34efa09f0a7d818d62..aaa3d54aaa9e837834fa6b6dd99e9fefdfcf7949
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=81a97a3303f8c786014d8644d185a368fba902c5..a46241db71e383bb6dda103ecad12b13e7af3c38
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=d6380d740b3af3be9a9ebbd347b5b0c34cd82e81..fa0fe817f5ee1b0542f757abaded245c6e5a1321

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-03-19 15:30:57 -05:00
Judith Mendez
5aa1c6ef15 meta-beagle: Fix TF-A machine name for badge
BeagleBadge board has been renamed to am62l3-badge
in the new TFA ti-tfa-2.14.y branch [0], so update
recipe TFA_BOARD accordingly.

[0] d203b84539

Signed-off-by: Judith Mendez <jm@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-19 15:24:11 -05:00
Randolph Sapp
9dc647e5b9 k3: set console parameter to KERNEL_CONSOLE
Set the default value of TI_WKS_BOOTLOADER_APPEND to
"console=${KERNEL_CONSOLE}" to populate the kernel cmdline console
variable for all k3 devices.

Also define SERIAL_CONSOLES for am64xx.inc, since it was previously
overriding TI_WKS_BOOTLOADER_APPEND directly for this functionality.

The KERNEL_CONSOLE variable provided by openembedded-core is a sane
default console parameter automatically populated by the first value in
the SERIAL_CONSOLES variable. Their UKI and EFI flows already use this
variable to ensure the kernel cmdline console value is set to something
machine appropriate.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-19 14:00:25 -05:00
Ryan Eatmon
7eaa6ae23a linux-bb.org_6.12: Backport C23 compile fix from linux-stable
A recent change in oe-core [1] to glibc 2.43 has introduced a build
error with 6.12 kernels.  Backport a patch [2] from linux-stable to
address this.

[1] https://git.openembedded.org/openembedded-core/commit/?id=f791d6c52870f3571e740ff7818d45bb0a717934
[2] https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-6.12.y&id=3dedeeecd1ae42a751721d83dc21877122cc1795

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-18 08:24:01 -05:00
Leon Anavi
204dbf803b u-boot-bb.org: Add a tick-timer for PocketBeagle
Add a chosen tick-timer in version 2025.10 to boot on PocketBeagle.

Fixes:

CPU  : AM335X-GP rev 2.1
Model: TI AM335x PocketBeagle
DRAM:  512 MiB
Core:  155 devices, 16 uclasses, devicetree: separate
Could not initialize timer (err -19)

The patch is based on the following related discussions:

- arm: dts: am335x-*-u-boot: Add chosen tick-timer
https://lists.denx.de/pipermail/u-boot/2026-January/608684.html

- pocketbeagle stuck in boot loop with timer error
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=269124

Signed-off-by: Leon Anavi <leon.anavi@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-18 08:24:01 -05:00
Judith Mendez
ee4b9d9053 conf: machine: am62-lp: Package ECAP Capture overlay
Package k3-am62x-sk-ecap-capture.dtbo for AM62 LP SK to
enable ECAP in capture mode.

Signed-off-by: Judith Mendez <jm@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-18 08:24:01 -05:00
Judith Mendez
237d409aaf conf: machine: am62a: Fix overlays in KERNEL_DEVICETREE_PREFIX
There have been changes in k3-am62x* overlays due to conflicts
in DT, so update KERNEL_DEVICETREE_PREFIX for AM62A SK appropriately.

Signed-off-by: Judith Mendez <jm@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-18 08:24:01 -05:00
Mahammed Sadik Shaik
df378fdf63 ti-extras: Update SRCREV for Jailhouse
Update SRCREV for Jailhouse-enabled U-Boot and Linux kernel
and ti-jailhouse for the bsp-ti-6_18

Changes include:
- u-boot/ti-extras.inc: Update to latest SRCREV
- linux/ti-extras.inc: Update to latest SRCREV
- linux/ti-extras-rt.inc: Update to latest SRCREV
- jailhouse/ti-jailhouse: Update to latest SRCREV

Signed-off-by: Mahammed Sadik Shaik <s-sadik@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-18 08:24:01 -05:00
Ryan Eatmon
732327f153 layer.conf: Update the layers to support wrynose
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-18 08:24:01 -05:00
LCPD Automation Script
81cd032c09 CI/CD Auto-Merger: cicd.master.202603161800
Updated the value(s) for:
  ti-linux-fw: PRUETH_FW_AM65X_SR2_VERSION,TI_LINUX_FW_SRCREV,TI_SYSFW_VERSION
  atf: SRCREV_tfa:am62lxx
  u-boot-ti-staging_2026.01: SRCREV_uboot
  linux-ti-staging_6.18: SRCREV

Changelogs:
  ti-linux-fw: https://git.ti.com/cgit/processor-firmware/ti-linux-firmware/log/?qt=range&q=58a8a47f9063cfcd9eebcfb2825b99a34ef19b80..a85ebd5c5b216646779b3d34efa09f0a7d818d62
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=e585d2fccbb4c11389ecd9afb00ec5e707267afc..81a97a3303f8c786014d8644d185a368fba902c5
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=f13c6190c45bc24cc6640e39c36304bbc4ff22e7..d6380d740b3af3be9a9ebbd347b5b0c34cd82e81

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-03-16 18:00:48 -05:00
Ryan Eatmon
88a85e8148 u-boot-ti-staging_2025.01: Backport fix for python3-setuptools change
A recent change in oe-core [1] to bump the python3-setuptools change
introduced a build error with the 2025.01 version of u-boot in binman.
Backport a fix from the master branch of u-boot [2] to address this.

[1] https://git.openembedded.org/openembedded-core/commit/?id=ab6b2bf7b555d3516abea6255b800fe6f9673a69
[2] 538719cb6a

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-16 14:16:21 -05:00
Ryan Eatmon
b92d66ad10 linux-ti-staging_6.12: Backport C23 compile fix from linux-stable
A recent change in oe-core [1] to glibc 2.43 has introduced a build
error with 6.12 kernels.  Backport a patch [2] from linux-stable to
address this.

[1] https://git.openembedded.org/openembedded-core/commit/?id=f791d6c52870f3571e740ff7818d45bb0a717934
[2] https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-6.12.y&id=3dedeeecd1ae42a751721d83dc21877122cc1795

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-16 14:16:21 -05:00
Randolph Sapp
a77f6ead75 mesa-pvr: fix compilation errors with c23
Pull a fix from mesa/main regarding C23/glibc's definition of once_init
in stdlib.h.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-16 14:16:21 -05:00
Paresh Bhagat
c4f9ff1eff recipes-ti: ti-librpmsg-dma: Update branch and disable example build
Switch from scarthgap to main branch for ti-librpmsg-dma library. Also
update SRCREV and add -DBUILD_SIGNAL_CHAIN_BIQUAD_EXAMPLE=OFF to cmake
options to exclude building the sigchain example.

Signed-off-by: Paresh Bhagat <p-bhagat@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-12 10:25:58 -05:00
Mahammed Sadik Shaik
8eaa5cace4 ti-jailhouse: Fix buildpaths QA warning and cleanup
Add -ffile-prefix-map flags to KCFLAGS to remove build path
references from kernel module compilation, ensuring reproducible
builds and preventing absolute path leakage in binaries.

inherit module-base kernel-module-split for building kernel modules

move V=1 into EXTRA_OEMAKE and remove overriding do_compile()

This resolves buildpaths QA warnings during packaging.

Signed-off-by: Mahammed Sadik Shaik <s-sadik@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-12 10:25:58 -05:00
Mahammed Sadik Shaik
dbedef732f jailhouse-inmate: Inhibit debug package split
Inmate binaries are bare-metal applications without standard debug
symbols that can be meaningfully split. Inhibit debug package
creation to avoid unnecessary packaging overhead and potential
QA warnings.

Signed-off-by: Mahammed Sadik Shaik <s-sadik@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-12 10:25:58 -05:00
Mahammed Sadik Shaik
6d51093a81 jailhouse: Fix JH_RAMFS image path
Update JH_RAMFS_IMAGE references to use correct .cpio
extension instead of .rootfs.cpio to match current image
naming convention

Signed-off-by: Mahammed Sadik Shaik <s-sadik@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-12 10:25:58 -05:00
LCPD Automation Script
9c336bc837 CI/CD Auto-Merger: cicd.master.202603091800
Updated the value(s) for:
  atf: SRCREV_tfa:am62lxx
  u-boot-ti-staging_2026.01: SRCREV_uboot
  linux-ti-staging_6.18: SRCREV

Changelogs:
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=8dedb46bfd7e7bba52cbedfbab10fe4383317b7b..e585d2fccbb4c11389ecd9afb00ec5e707267afc
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=1ae61a325571a4b242dac987edcbff0bf11cbd35..f13c6190c45bc24cc6640e39c36304bbc4ff22e7

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-03-09 18:00:46 -05:00
LCPD Automation Script
db4353bc7e CI/CD Auto-Merger: cicd.master.202603060742
Updated the value(s) for:
  ti-linux-fw: TI_LINUX_FW_SRCREV
  atf: SRCREV_tfa:am62lxx
  u-boot-ti-staging_2026.01: SRCREV_uboot
  linux-ti-staging_6.18: SRCREV

Changelogs:
  ti-linux-fw: https://git.ti.com/cgit/processor-firmware/ti-linux-firmware/log/?qt=range&q=cf4a45b898294c96af02a62b7321c35651b3fa67..58a8a47f9063cfcd9eebcfb2825b99a34ef19b80
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=90e682a353fe494e4058068a02bd8ee9f7a1bbf2..8dedb46bfd7e7bba52cbedfbab10fe4383317b7b
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=30182cf3ac7db7fd66c36870f3fc5db91a32f36c..1ae61a325571a4b242dac987edcbff0bf11cbd35

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-03-06 07:43:07 -06:00
Mahammed Sadik Shaik
acea5fac41 ti-extras: Add Jailhouse support for bsp-ti-6_18
Add Jailhouse-enabled U-Boot and Linux kernel configurations
for the bsp-ti-6_18 release to support AM62xx, AM62Pxx, and
AM62Lxx platforms.

Changes include:
- u-boot/ti-extras.inc: Add ti-u-boot-2026.01-jailhouse branch
- linux/ti-extras.inc: Add ti-linux-6.18.y-jailhouse branch
- linux/ti-extras-rt.inc: Add ti-linux-6.18.y-jailhouse branch

Signed-off-by: Mahammed Sadik Shaik <s-sadik@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-05 10:55:37 -06:00
Suhaas Joshi
bf93262beb meta-ti: optee: Update SHA in optee_os to integrate timeout increase
optee_os has a driver for AM62L's mailbox. Recently it started timing
out waiting for a response from TIFS. It seems that the timeout we had
given was at the edge of what was acceptable, since unrelated changes to
rest of the boot chain were breaking it. So a patch was sent to optee_os
to fix this by increasing the timeout from 10ms to 1000ms.

Update the optee_os recipe's SHA to integrate this change into the SDK.

Signed-off-by: Suhaas Joshi <s-joshi@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-05 10:55:37 -06:00
LCPD Automation Script
de85a85c0c CI/CD Auto-Merger: cicd.master.202603050509
Updated the value(s) for:
  atf: SRCREV_tfa:am62lxx
  linux-ti-staging_6.18: SRCREV

Changelogs:
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=8f753312db559c2f1f0867030e5fb36b89f2ea05..30182cf3ac7db7fd66c36870f3fc5db91a32f36c

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-03-05 05:09:58 -06:00
LCPD Automation Script
563ffd7ea2 CI/CD Auto-Merger: cicd.master.202603041808
Updated the value(s) for:
  ti-linux-fw: TI_LINUX_FW_SRCREV
  atf: SRCREV_tfa:am62lxx
  u-boot-ti-staging_2026.01: SRCREV_uboot
  linux-ti-staging_6.18: SRCREV

Changelogs:
  ti-linux-fw: https://git.ti.com/cgit/processor-firmware/ti-linux-firmware/log/?qt=range&q=c5eea0af8225334b1babfa750b329200dcee3d2b..cf4a45b898294c96af02a62b7321c35651b3fa67
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=c42989009c209834eb512c065e283c492ec3dd50..90e682a353fe494e4058068a02bd8ee9f7a1bbf2
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=e9ebc825175636714e0ffa113133ef03879748df..8f753312db559c2f1f0867030e5fb36b89f2ea05

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-03-04 18:08:45 -06:00
Denys Dmytriyenko (TI)
92c2198288 beagle-bsp: unset TI_CORE_INITRAMFS_KERNEL_MODULES
As BB.org kernel comes with own custom defconfig, there are no modules
required to be loaded from initramfs in order to boot the platforms, as
required drivers are built in. Unset the list of such modules to avoid
breakage.

Signed-off-by: Denys Dmytriyenko (TI) <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-02 14:38:39 -06:00
Randolph Sapp
59af86a220 beagleplay-ti: use the am62xx.inc
We should inherit the am62xx.inc and just override values as needed.

Signed-off-by: Randolph Sapp <rs@ti.com>
Acked-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-02 14:38:39 -06:00
Randolph Sapp
cb50cbab2f beagley-ai: add beagley-ai-ti
Split the existing config into a beagley-ai-ti and beagley-ai that
includes it, like the existing beagleplay machine.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-02 14:38:39 -06:00
Randolph Sapp
87f5d17fd0 meta-beagle: move all beagle board configurations
Move all beagle board configurations to meta-beagle. There are 2 skews
currently:

1. A base TI configuration setting all the default variables required to
   use the device with meta-ti-bsp provided packages.

2. An override that uses meta-beagle BSP components. This includes all
   the values defined in the TI skew as well as any meta-beagle specific
   configuration.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-03-02 14:38:39 -06:00
LCPD Automation Script
e9c0421352 CI/CD Auto-Merger: cicd.master.202602271140
Updated the value(s) for:
  ti-linux-fw: TI_LINUX_FW_SRCREV
  atf: SRCREV_tfa:am62lxx
  u-boot-ti-staging_2026.01: SRCREV_uboot
  linux-ti-staging_6.18: PV,SRCREV

Changelogs:
  ti-linux-fw: https://git.ti.com/cgit/processor-firmware/ti-linux-firmware/log/?qt=range&q=fc93d06371ec35ef634284748e8263907327d6fd..c5eea0af8225334b1babfa750b329200dcee3d2b
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=cb63a11faef453412da23e72c5e9b6782cf62274..c42989009c209834eb512c065e283c492ec3dd50
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=7e2c5ee21e318f67edb760f67fe16d41b1dc5a1e..e9ebc825175636714e0ffa113133ef03879748df

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-02-27 11:41:17 -06:00
Paresh Bhagat
74f14d872c conf: am62dxx-evm: Package k3-am62a7-sk-e3-max-opp overlay
Package k3-am62a7-sk-e3-max-opp.dtbo for AM62D2-EVM to configure C7x DSP
to run at its maximum supported frequency of 1GHz.

Signed-off-by: Paresh Bhagat <p-bhagat@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-26 19:15:19 -06:00
Suhaas Joshi
c4caa380b8 optee: Update optee_os to integrate Firewall RNG changes
Recently, a few commits were merged beyond the 4.9.0 tag in optee_os. These
commits refactor some code in SA2UL, and add firewall configurations for RNG in
AM62L. Therefore, to integrate these changes in the SDK, update the optee_os
SHA.

Signed-off-by: Suhaas Joshi <s-joshi@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-26 19:15:19 -06:00
Manorit Chawdhry
15f5c84ecd trusted-firmware-a: Update to 2.14+
Updates trusted-firmware-a to a commit with the LPM patches and removes
them from yocto.

Signed-off-by: Manorit Chawdhry <m-chawdhry@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-26 19:15:14 -06:00
Antonios Christidis
e24a537683 ti-img-rogue-driver: Support for unified GPU bindings
New sha brings support for unified GPU bindings.

Signed-off-by: Antonios Christidis <a-christidis@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-26 19:12:20 -06:00
Ryan Eatmon
135dfe3f26 ti-bsp: Make ti-6_18 the default BSP
Our initial testing is nearing completion and 6.18 is ready to be our
default kernel along with 2026.01 uboot.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-25 14:13:55 -06:00
Ryan Eatmon
ddbc40d2ab packagegroup-ti-core-initramfs: Add nfs-utils-mount
When loading an initramfs, the kernel no longer provides functionality
for mounting the rootfs.  nfs-utils-mount is the minimal required
packages to provide the needed tooling for the kernel to mount the
rootfs over nfs when using an initramfs.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-25 14:13:55 -06:00
Ryan Eatmon
cd0391b2ea gdbc6x: Tweak lcl_maybe_fortify security setting
A change in oe-core [1] has turned on higher security checks, but gdbc6x
will not build with FORTIFY_SOURCE turned on.  Remove that setting to
get it building again.

[1] https://git.openembedded.org/openembedded-core/commit/?id=4c2d64c10a5b0437ab1ea04df22386f0f95124d1

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-24 20:54:51 -06:00
Ryan Eatmon
03a7ad132c dsptop: Tweak SECURITY_STRINGFORMAT
A change in oe-core [1] has turned on higher security checks, but dsptop
will not build with all of them turned on.  Remove a single setting to
get it building again.

[1] https://git.openembedded.org/openembedded-core/commit/?id=4c2d64c10a5b0437ab1ea04df22386f0f95124d1

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-24 20:54:51 -06:00
Ryan Eatmon
38758c5d17 ti-ipc: Set DISABLE_STATIC = ""
As of [1], static libs are disabled by default.  But this package relies
on static libs, so we need to allow for building them.

[1] https://git.openembedded.org/openembedded-core/commit/?id=03fc931bfe9ea3fa9f33553e6020cbc067b24291

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-24 20:54:51 -06:00
Ryan Eatmon
bb64ebf304 ti-rpmsg-char: Set DISABLE_STATIC = ""
As of [1], static libs are disabled by default.  But this package relies
on static libs, so we need to allow for building them.

[1] https://git.openembedded.org/openembedded-core/commit/?id=03fc931bfe9ea3fa9f33553e6020cbc067b24291

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-24 20:54:51 -06:00
Ryan Eatmon
f60581dc51 *: Remove unused patches
We have added checking for unused patches in our repo checking tool.
Remove two patch files that it found.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-23 16:33:03 -06:00
LCPD Automation Script
fdca2e3472 CI/CD Auto-Merger: cicd.master-ltsprep.202602191451
Updated the value(s) for:
  ti-linux-fw: TI_LINUX_FW_SRCREV
  u-boot-ti-staging_2026.01: SRCREV_uboot
  linux-ti-staging_6.18: SRCREV

Changelogs:
  ti-linux-fw: https://git.ti.com/cgit/processor-firmware/ti-linux-firmware/log/?qt=range&q=941e1f7a3b3f683a59a0e51fb78817eb31841430..fc93d06371ec35ef634284748e8263907327d6fd
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=0c5b72a0b975e5e01ed6164cc9547526c680fe95..cb63a11faef453412da23e72c5e9b6782cf62274
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=49a4f3a41af39ec952f7caadb856418e1b734449..7e2c5ee21e318f67edb760f67fe16d41b1dc5a1e

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-02-19 14:52:30 -06:00
Ryan Eatmon
a8e59d34c4 conf: j722s: Add usbdfu tie-test-builds config
Using the new UBOOT_CONFIG flow, enable a mode where additional uboot
configurations can be built along side the main config.  In this case,
turning on USBDFU for a board for testing purposes.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-19 14:10:01 -06:00
Ryan Eatmon
82f15401cd trusted-firmware-a: Updates for am62l
Change the branch for am62l to ti-tfa-2.14y and change the TFA_PLATFORM
for am62l.

License-Udpate: am62l branch is now in line with master, so the md5sum
changed to match.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-19 14:10:01 -06:00
Ryan Eatmon
65ba600b16 conf: am64: Add ECDSA key signing
Add support for signing the u-boot files with an ECDSA key.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-19 14:10:01 -06:00
Antonios Christidis
135b7041e8 ti-img-rogue-*: Migrate GPU driver version 25.2 -> 25.3
New recipes for GPU DDK 25.3. Update BSP configuration file to
package driver, which now supports kernel 6.18.

Signed-off-by: Antonios Christidis <a-christidis@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-19 14:10:01 -06:00
Hari Nagalla
4107d315a5 ipc: ti-rpmsg-char: Update library to 0.6.11
update ti-rpmsg-char library to 0.6.11

It brings the below fixes:
dd4783422bf  lib: Do not update local endpoint
f26e4a30ca7  example: benchmark: move latencies array to data section.

Signed-off-by: Hari Nagalla <hnagalla@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-19 14:10:01 -06:00
LCPD Automation Script
ee9f5e1dfe CI/CD Auto-Merger: cicd.master-ltsprep.202602181811
Updated the value(s) for:
  ti-linux-fw: TI_LINUX_FW_SRCREV
  u-boot-ti-staging_2026.01: SRCREV_uboot
  linux-ti-staging_6.18: PV,SRCREV

Changelogs:
  ti-linux-fw: https://git.ti.com/cgit/processor-firmware/ti-linux-firmware/log/?qt=range&q=3c35ffe92dd85b5acfcbf350cd1a6cc829994b20..941e1f7a3b3f683a59a0e51fb78817eb31841430
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=65c7cac7324df20db0cfec1377fc3728018d5808..0c5b72a0b975e5e01ed6164cc9547526c680fe95
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=abdf4e7f1d6d22a2162c91baa1f2a32f8e7adf88..49a4f3a41af39ec952f7caadb856418e1b734449

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-02-18 18:11:59 -06:00
Ryan Eatmon
123245b638 conf: Change weak assignment of IMAGE_BOOT_FILES
Rather than using ?= to default the value of IMAGE_BOOT_FILES, instead
use += to add the files we want to the probably empty value.

We ran into an issue where the recent ti-core-initramfs changes used +=
and overrode the ?= in k3.inc, resulting in no boot files being packaged
in the wic boot partition.  This addresses the issue by ensuring that we
never have a situation where the required files are not in the final
list.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-17 16:05:14 -06:00
LCPD Automation Script
1c2398c320 CI/CD Auto-Merger: cicd.master-ltsprep.202602130934
Updated the value(s) for:
  ti-linux-fw: TI_LINUX_FW_SRCREV
  u-boot-ti-staging_2026.01: SRCREV_uboot
  linux-ti-staging_6.18: SRCREV

Changelogs:
  ti-linux-fw: https://git.ti.com/cgit/processor-firmware/ti-linux-firmware/log/?qt=range&q=dfa62d2a6b9de71dc6fb682882834c9390324c42..3c35ffe92dd85b5acfcbf350cd1a6cc829994b20
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=41842a7ccad599b3b5aa4500de859a0f01583a8c..65c7cac7324df20db0cfec1377fc3728018d5808
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=8210918c3b8678d9781cf982c86757705405bfb3..abdf4e7f1d6d22a2162c91baa1f2a32f8e7adf88

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-02-13 09:34:52 -06:00
LCPD Automation Script
dd88379196 CI/CD Auto-Merger: cicd.master.202602130100
Updated the value(s) for:
  atf: SRCREV_tfa:am62lxx
  k3conf: SRCREV

Changelogs:
  k3conf: https://git.ti.com/cgit/k3conf/k3conf/log/?qt=range&q=4e3a44c4b961831f2de80606942dd0d8eb508eca..c50875c7c4ad112d5e632bea3301e06a0aa8669f

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-02-13 01:00:59 -06:00
Ryan Eatmon
8a36d5613c optee: Update to 4.9.0 tag
Update optee_os, optee_client, optee_examples and optee_test to the
newer 4.9.0 tag.

Signed-off-by: Manorit Chawdhry <m-chawdhry@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-12 17:23:08 -06:00
Ryan Eatmon
77de8a110a ti-core-initramfs: Add TI_CORE_INITRAMFS_EXTRA_INSTALL
Add TI_CORE_INITRAMFS_EXTRA_INSTALL variable that another layer can use to
install additional packages/changes into the initramfs.  Setting this
variable will also turn on the initramfs even if the platform does not
have kernel modules to include.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-12 09:11:19 -06:00
Ryan Eatmon
300f2a8d00 ti-core-initramfs: Rework logic
Clean up the logic of the new ti-core-initramfs to reduce the impact on
downstream layers.

- Flip the logic in the machine .conf files to track the list of
  required kernel modules for that platform, but if the variable is set
  to "" then the ti-core-initramfs will not be created.

- Redo the logic of when we require creation/usage of the initramfs to
  just platforms that need it (ie that set TI_CORE_INITRAMFS_KERNEL_MODULES).

- Add a big switch to disable the initramfs entirely.  In that case, the
  user is on their own to make sure that the kernel has everything it
  needs to boot either via config fragments to turn on the needed
  modules, or by using the TI_CORE_INITRAMFS_KERNEL_MODULES
  variable to populate their own initramfs.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-12 08:56:40 -06:00
Denys Dmytriyenko (TI)
eb0d589bb7 ti-core-initramfs: pull correct VIRTUAL_RUNTIME components
Pull additional standard VIRTUAL_RUNTIME components to respect Distro
configuration (e.g. systemd/udev, etc.)
This only requires adjusting the size to 128MB.

Signed-off-by: Denys Dmytriyenko (TI) <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-12 08:56:40 -06:00
Paresh Bhagat
220c16be11 recipes-bsp: Remove TI TAD5212 DAC firmware recipe
TAD5212 now uses a dedicated driver instead of the PCM6240 driver,
making the firmware files no longer needed. So remove the recipe and
corresponding changes.

Signed-off-by: Paresh Bhagat <p-bhagat@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-12 08:24:58 -06:00
Vishnu Singh
7e27e75a5d recipes-bsp: Add TI PCM6240 ADC firmware recipe
Add PCM6240 ADC firmware recipe for am62dxx-evm to support 2 PCM6240
ADC's, each supporting 4 channel recording.

Signed-off-by: Vishnu Singh <v-singh1@ti.com>
Signed-off-by: Paresh Bhagat <p-bhagat@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-12 08:24:58 -06:00
LCPD Automation Script
a6bf8a8f6e CI/CD Auto-Merger: cicd.master-ltsprep.202602111800
Updated the value(s) for:
  ti-linux-fw: TI_LINUX_FW_SRCREV,TI_SYSFW_VERSION
  u-boot-ti-staging_2026.01: SRCREV_uboot
  linux-ti-staging_6.18: PV,SRCREV

Changelogs:
  ti-linux-fw: https://git.ti.com/cgit/processor-firmware/ti-linux-firmware/log/?qt=range&q=8ec0c42b8ccf2c9e8bebfd7c4e03d93fed555442..dfa62d2a6b9de71dc6fb682882834c9390324c42
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=7db1482473e9a9562061c6f89e6d3cd86a17e616..41842a7ccad599b3b5aa4500de859a0f01583a8c
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=e36172c9eb8513198f33eee06b8cff28c6556e11..8210918c3b8678d9781cf982c86757705405bfb3

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-02-11 18:00:55 -06:00
Ryan Eatmon
c0e80f86de u-boot: Update ECDSA signing make option
When the feature was sent to upstream, it was requested to change the
command line option for specifying the key.  Adapt to that change and
ensure it still works as is for bsp-ti-6_12.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-06 17:52:40 -06:00
LCPD Automation Script
c79f7b833e CI/CD Auto-Merger: cicd.master-ltsprep.202602051800
Updated the value(s) for:
  atf: SRCREV_tfa:am62lxx
  u-boot-ti-staging_2026.01: SRCREV_uboot
  linux-ti-staging_6.18: PV,SRCREV

Changelogs:
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=0456d31970eeef8678fd20a6683d1acd9fc8da4a..7db1482473e9a9562061c6f89e6d3cd86a17e616
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=33b7bd36f11719837307a92818393608faafbc10..e36172c9eb8513198f33eee06b8cff28c6556e11

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-02-05 18:00:50 -06:00
LCPD Automation Script
721c33800f CI/CD Auto-Merger: cicd.master.202602031100
Updated the value(s) for:
  atf: SRCREV_tfa:am62lxx

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-02-03 11:00:57 -06:00
Ryan Eatmon
634a30e2c1 conf: am62p: Add ECDSA key signing
Use the new framework to add alternative key signing for the am62p
platform as an example.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-02 13:50:02 -06:00
Ryan Eatmon
507125eedd u-boot: Add alternative key signing
Provide framework for how to sign the uboot files with different keys
so that customers can see how it is done.  We have provided an ECDSA
key and follow on patches will show how to point to it.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-02 13:50:02 -06:00
LCPD Automation Script
22e889c205 CI/CD Auto-Merger: cicd.master-ltsprep.202602021018
Updated the value(s) for:
  u-boot-ti-staging_2025.01: SRCREV_uboot
  u-boot-ti-staging_2026.01: SRCREV_uboot
  linux-ti-staging-rt_6.12: SRCREV_ARM32
  linux-ti-staging_6.12: SRCREV
  linux-ti-staging_6.18: PV,SRCREV

Changelogs:
  u-boot-ti-staging_2025.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=42cf2abb5f42b4e8dca8b9df584b816d8a0da7fa..ef2eb76b650415637bd93b0eddfb1e31489117f9
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=127a42c7257a6ffbbd1575ed1cbaa8f5408a44b3..0456d31970eeef8678fd20a6683d1acd9fc8da4a
  linux-ti-staging-rt_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=2bae13c52d344e96fce42ab8209c068d1e67c944..a3bc6dc973a99822f0707b1c9ba06b56bf142076
  linux-ti-staging_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=8843c53f444321e22f1eaeec0478ffc0a6191203..da3c0f0a33ac00f7138c695a16d90301cf7ec02b
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=2d64b9f10d1d9e7cbd041d613b40222c11291f14..33b7bd36f11719837307a92818393608faafbc10

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-02-02 10:19:37 -06:00
LCPD Automation Script
8529512dd0 CI/CD Auto-Merger: cicd.master.202601292132
Updated the value(s) for:
  u-boot-ti-staging_2026.01: SRCREV_uboot

Changelogs:
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=c5e6d2ab7eba68cbfb600cdc131c0c375ced2ec9..127a42c7257a6ffbbd1575ed1cbaa8f5408a44b3

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-01-29 21:33:57 -06:00
Ryan Eatmon
6da7194248 Revert "CI/CD Auto-Merger: cicd.master-ltsprep.202601290100"
This reverts commit bb2c3dcb6c.

There is something wrong withour CICD scripts.  This should not have
been promoted.
2026-01-29 20:12:00 -06:00
LCPD Automation Script
bb2c3dcb6c CI/CD Auto-Merger: cicd.master-ltsprep.202601290100
Updated the value(s) for:
  u-boot-ti-staging_2026.01: SRCREV_uboot
  linux-ti-staging_6.18: PV,SRCREV

Changelogs:
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=c5e6d2ab7eba68cbfb600cdc131c0c375ced2ec9..677076fc270788c97e15cd5fc47b32d8a6bda672
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=2d64b9f10d1d9e7cbd041d613b40222c11291f14..25e529b290fc89f777503b34100b2c8f5532b66b

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-01-29 09:03:40 -06:00
Ryan Eatmon
0614454216 optee-ftpm: Adapt to meta-arm change
meta-arm updated optee to 4.9.0 and added logic manage the
tag=xx;nobranch=1 vs branch=master in the SRC_URI for all of the optee
recipes except for optee-ftpm.  Set the new variable to the same logic
as the other optee recipes to fix an unpack error.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-29 09:03:23 -06:00
Ryan Eatmon
a546e95d0d linux-ti-staging: Update 6.18 SRCREV
It looks like the ti-linux-6.18.y was force pushed.  As we are still in
the process of getting the LTA up and running, we need to update the
SHA.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-27 16:05:12 -06:00
Ryan Eatmon
69deabbd85 conf: am65: Add usbdfu tie-test-builds config
Using the new UBOOT_CONFIG flow, enable a mode where additional uboot
configurations can be built along side the main config.  In this case,
turning on USBDFU for a board for testing purposes.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-23 10:15:24 -06:00
Ryan Eatmon
bd7a32b603 conf: am62: Add usbdfu tie-test-builds configs
Using the new UBOOT_CONFIG flow, enable a mode where additional uboot
configurations can be built along side the main config.  In this case,
turning on USBDFU for a board for testing purposes.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-23 10:15:24 -06:00
Ryan Eatmon
380d3e91b0 u-boot: Move ti-extras.inc into u-boot-ti.inc
Since the extras stuff should "theoretically" apply to all u-boot
versions, move the include out of each recipe and into the central
include file.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-23 10:15:24 -06:00
Antonios Christidis
5470b4f4d4 ti-gc320-driver: Port module for kernel 6.18
Port the kernel module for gc320 driver to build on linux kernel 6.18.

The overall version of the driver remains the same.

Signed-off-by: Antonios Christidis <a-christidis@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-23 10:15:24 -06:00
Ryan Eatmon
85c3cc60be u-boot: Adapt to upstream change to UBOOT_CONFIG flow
A recent change to the UBOOT_CONFIG flow in oe-core [1], introduced
support for UBOOT_FRAGMENTS.  We need to stop using our internal
UBOOT_CONFIG_FRAGMENTS and start using the new UBOOT_FRAGMENTS.

[1] https://git.openembedded.org/openembedded-core/commit/?id=cd9e7304481b24b27df61c03ad73496d18e4d47c

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-20 13:13:40 -06:00
LCPD Automation Script
fc26d5dc11 CI/CD Auto-Merger: cicd.master.202601171053
Updated the value(s) for:
  atf: SRCREV_tfa:am62lxx
  u-boot-ti-staging_2025.01: SRCREV_uboot
  linux-ti-staging-rt_6.12: SRCREV_ARM32
  linux-ti-staging_6.12: SRCREV

Changelogs:
  u-boot-ti-staging_2025.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=df1fe238230433ba3e5b731356156e145aa90917..42cf2abb5f42b4e8dca8b9df584b816d8a0da7fa
  linux-ti-staging-rt_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=1379a8eb9786e78509f67ff8eac658bde5ddc66d..2bae13c52d344e96fce42ab8209c068d1e67c944
  linux-ti-staging_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=15b58b1dcd0e0a79d83740b81da1a1367f6f3f68..8843c53f444321e22f1eaeec0478ffc0a6191203

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-01-17 10:53:56 -06:00
Ryan Eatmon
48901ff242 j721e: Disable ti-vxe-vde-driver for 6.18
The ti-vxe-vxd-driver recipe is not building with the 6.18 kernel.
Once a new version that addresses this is available we can turn this
back on.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-17 10:48:11 -06:00
Brandon Brnich
4a36d60f3a ti-bsp: ti-img-encode-decode: Update SRCREV
V4L2 API has been updated to remove the flags parameter from
v4l2_m2m_buf_copy_metadata in the 6.19 stable kernel release. Driver has
been updated to reflect these changes. Update SRCREV to pull these
changes.

Signed-off-by: Brandon Brnich <b-brnich@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-17 10:48:11 -06:00
LCPD Automation Script
a051601c80 u-boot-ti-mainline: Update to version: v2026.01
Updated the value(s) for:
  u-boot-ti-mainline: PV,SRCREV_uboot

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-17 10:48:11 -06:00
Ryan Eatmon
bdcbe5d6bc trusted-firmware-a: Clean up bbappend guard variables
Rather than using shorthand variables for the guard, move to a longer
more explicit naming.  This is mostly a cosmetic change, but we might
make a rule for it in the future so that we can check for it.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-17 10:48:11 -06:00
Ryan Eatmon
ce6dccea3b conf: Add support for bsp-ti-6_18 to ti-core-initramfs
With the 6.18 we are moving to using an initramfs to provide non-default
modules for booting.  So add that override to the machines that need it.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-12 15:01:47 -06:00
Ryan Eatmon
54ce94f577 ti-core-initramfs: Shrink size of initramfs
It looks like we were modelling this initramfs off of the wrong example
from poky.  This setup produces a much smaller initramfs.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-12 15:01:47 -06:00
Ryan Eatmon
270b7b6445 u-boot-ti: Clean up config looping code
Cleanup a few incorrect issues with the current file naming under the
config looping code.

1) Since binman is creating the tiboot3 files and signing them, when we
   are trying to create the named version of the files, we do not want
   to link against the spl/uboot-spl.bin file.  We need to figure out
   what the tiboot3.bin is pointing at and make this named version point
   at the same thing.

2) When deploying the tiboot3 files, if we are deploying something that
   is a link, then we should point the deployed link to the same named
   target.  This should help with figuring out what all of the links
   actually point to from the build dir instead of running into .bin
   file that has lost the audit trail.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-12 15:01:47 -06:00
LCPD Automation Script
3b7aad2f15 CI/CD Auto-Merger: cicd.master.202601090100
Updated the value(s) for:
  atf: SRCREV_tfa:am62lxx

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-01-09 01:00:43 -06:00
LCPD Automation Script
61fa7d2a15 CI/CD Auto-Merger: cicd.master.202601050100
Updated the value(s) for:
  u-boot-ti-staging_2025.01: SRCREV_uboot
  linux-ti-staging-rt_6.12: SRCREV_ARM32
  linux-ti-staging_6.12: SRCREV

Changelogs:
  u-boot-ti-staging_2025.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=afb6e41006ca88067397873e015a21adaf31fd06..df1fe238230433ba3e5b731356156e145aa90917
  linux-ti-staging-rt_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=2a440e3d83789c8220b722e077255a89d826e48a..1379a8eb9786e78509f67ff8eac658bde5ddc66d
  linux-ti-staging_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=ee0a0f44964f12d6668a14b4b0b3594ce2ab8871..15b58b1dcd0e0a79d83740b81da1a1367f6f3f68

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-01-05 01:00:36 -06:00
LCPD Automation Script
8050c16e48 CI/CD Auto-Merger: cicd.master.202512191404
Updated the value(s) for:
  ti-linux-fw: TI_LINUX_FW_SRCREV
  atf: SRCREV_tfa:am62lxx
  u-boot-ti-staging_2025.01: SRCREV_uboot
  k3conf: SRCREV
  linux-ti-staging-rt_6.12: SRCREV_ARM32
  linux-ti-staging_6.12: SRCREV

Changelogs:
  ti-linux-fw: https://git.ti.com/cgit/processor-firmware/ti-linux-firmware/log/?qt=range&q=b5f45f14e23b927f3ab1f4e00c58eacb47b01d31..8ec0c42b8ccf2c9e8bebfd7c4e03d93fed555442
  u-boot-ti-staging_2025.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=3f3051bacd384bf331193070c29053d781296ab0..afb6e41006ca88067397873e015a21adaf31fd06
  k3conf: https://git.ti.com/cgit/k3conf/k3conf/log/?qt=range&q=cba7dc13a39191ac18bf64fccbba429faff112b4..4e3a44c4b961831f2de80606942dd0d8eb508eca
  linux-ti-staging-rt_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=1db5d0126012c7a0b82eff330f9f8a68b3d10f19..2a440e3d83789c8220b722e077255a89d826e48a
  linux-ti-staging_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=2d5f05489a39201c2fcf95d2dc04af57b6f7f356..ee0a0f44964f12d6668a14b4b0b3594ce2ab8871

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2025-12-19 14:05:06 -06:00
Judith Mendez
1d045003d8 trusted-firmware-a: am62l: Update to latest ti-master
Update to latest ti-master commit which includes support for
BeagleBadge.

Signed-off-by: Judith Mendez <jm@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-12-19 12:27:03 -06:00
Judith Mendez
05d73bf19f beaglebadge-ti: Add support for BeagleBadge
Add support for the BeagleBadge which is an AM62L
based device that requires new build configuration
for U-Boot and TF-A sources.

Signed-off-by: Judith Mendez <jm@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-12-19 12:27:03 -06:00
Ryan Eatmon
26f5767fd2 u-boot: Update trusted-firmware-a locations
A recent change in meta-arm installs all of files into a
trusted-firmware-a directory.  We need that added to the paths for the
PACKAGECONFIG settings so that u-boot can compile.

Take this opportunity to also break all of the firmware paths into
separate variables in case we need to override one of them in the future.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-12-19 09:57:39 -06:00
Ryan Eatmon
d42f338a0a gdbserverproxy-module-drv: Add support for kernel 6.15+
Add a patch to support a kernel change in 6.15:

- removed del_timer() in favor of timer_delete().

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-12-19 09:57:39 -06:00
Ryan Eatmon
48de7dc6a4 am62xxsip-evm: Update for 6.18 and 2026.01
The name of the u-boot defconfig changed when it was upstreamed into
2026.01, and the name of the dtb changed to k3-am6254atl-sk.dtb in the
kernel.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-12-19 09:57:39 -06:00
Ryan Eatmon
8267e14677 ti-bsp: Add ti-6_18 for LTS development
Add entries for ti-6_18 for the upcoming LTS development effort.  This
includes:

kernel: 6.18
u-boot: 2026.01

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-12-19 09:57:39 -06:00
Ryan Eatmon
413cb96496 u-boot-ti-staging: Add initial 2026.01 recipe for LTS development
Add then initial recipe needed for 6.18 development.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-12-19 09:57:39 -06:00
Ryan Eatmon
ff8d85e8a4 linux-ti-staging: Add initial 6.18 recipes for LTS development
Add all of the initial recipes/files needed for 6.18 development.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-12-19 09:57:39 -06:00
Andrew Davis
010c6a4336 meta-ti/all: Merge omap-a15.inc into am57xx.inc
As am57xx.inc is now the only user of omap-a15.inc, merge the content of
omap-a15.inc into am57xx.inc and remove omap-a15.inc. As we no longer have
this common include, also remove "omap-a15" and use "am57xx" in its place.

Signed-off-by: Andrew Davis <afd@ti.com>
Reviewed-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-12-19 09:57:39 -06:00
Andrew Davis
3a9e75ebba meta-ti/all: Make DRA7xx support a subset of AM57xx support
As AM57xx already defined both "dra7xx" and "am57xx" as SOC_FAMILY the
AM57xx was effectively a superset MACHINE. Although not all features of
AM57xx are needed for DRA7xx, make DRA7xx-EVM use the AM57xx definition.
This allows us to still support DRA7xx as the only differences that
impact device function are the selection of U-Boot defconfig, DTBs, and
OPTEE, all handled by the MACHINE conf file which is left unchanged.

Signed-off-by: Andrew Davis <afd@ti.com>
Reviewed-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-12-19 09:57:39 -06:00
Andrew Davis
534edb03e5 linux-bb.org: Remove unused EXTRA_DTC_ARGS from kernel args
This is no longer used anywhere, drop it out.

Signed-off-by: Andrew Davis <afd@ti.com>
Reviewed-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-12-19 09:57:39 -06:00
Andrew Davis
27c220e87c linux-ti-staging: Remove unused EXTRA_DTC_ARGS from kernel args
This is no longer used anywhere, drop it out.

Signed-off-by: Andrew Davis <afd@ti.com>
Reviewed-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-12-19 09:57:39 -06:00
Andrew Davis
6c8b8fe015 k3r5: Remove per-board SYSFW_ variables
These were used back when each board had to select the correct tiboot3.bin
to become the default for that board's image. Two things have changed since
then, first we deploy all options for tiboot3.bin generated by U-Boot. And
second, U-Boot's binman tool now symlinks the most appropriate version of
this file for us for the selected U-Boot defconfig file.

These are no longer needed so drop them.

Signed-off-by: Andrew Davis <afd@ti.com>
Reviewed-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-12-19 09:57:39 -06:00
Andrew Davis
32e30bef7a k3r5: Use UBOOT_BINARY for R5 U-Boot Image
As R5 only builds one working image (tiboot3.bin), define this as the
"UBOOT_BINARY", even though it was technically build using the SPL build
pass in U-Boot. This allows some simplification and removes deploying of
a dummy file (u-boot-spl.bin) which is not a usable boot file. It was only
deployed as UBOOT_BINARY is not optional and so something needed to be set
here.

BeagleBone-AI64 already did something similar to this so the overrides
in that MACHINE conf can now be removed.

Signed-off-by: Andrew Davis <afd@ti.com>
Reviewed-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-12-19 09:57:39 -06:00
Andrew Davis
65ee7c49c8 u-boot: Remove defaults for UBOOT_SUFFIX and SPL_BINARY
These were set to the defaults we would expect from OMAP class U-Boot,
but as all board families set these including the OMAP class MACHINEs
we can remove these defaults. This helps in the cases that we do not
want to define one of these, such as SPL_BINARY in the case of OMAP-L138
which does not use SPL.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-12-19 09:57:39 -06:00
Andrew Davis
d29a9cc06f conf: machine: Remove remaining K3 HS machines
Every MACHINE build deploys a tiboot3.bin file for all three K3 security
types (GP, HS-FS, HS-SE). These extra MACHINE configs existed to select
a different default. As U-Boot now selects a default for us this logic
does not need to exist here. Instead if one wants to use a non-default
security type for an EVM then can simply rename the tiboot3.bin file in
the boot partition. Testing automation already handles this and Sitara-
family devices have dropped the dedicated MACHINE configs, do the same
for Jacinto-family devices.

Signed-off-by: Andrew Davis <afd@ti.com>
Reviewed-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-12-19 09:57:39 -06:00
Moteen Shah
3073bf9e29 am62axx.inc: Add TPS6594 regulator and core modules to initramfs image
Add TPS6594 core and regulator driver modules in the initramfs image so
that the SD card can be probed for am62axx as it is dependent on regulator
to get the SD card probing and eventually boot from it.

Signed-off-by: Moteen Shah <m-shah@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-12-19 09:57:39 -06:00
LCPD Automation Script
2b3ca72005 CI/CD Auto-Merger: cicd.master.202512040100
Updated the value(s) for:
  ti-linux-fw: TI_DM_FW_VERSION,TI_LINUX_FW_SRCREV
  u-boot-ti-staging_2025.01: SRCREV_uboot
  linux-ti-staging-rt_6.12: PV_ARM32,SRCREV_ARM32
  linux-ti-staging_6.12: PV,SRCREV

Changelogs:
  ti-linux-fw: https://git.ti.com/cgit/processor-firmware/ti-linux-firmware/log/?qt=range&q=0a37dc07b1120127eba73c7196a0b532350b9639..b5f45f14e23b927f3ab1f4e00c58eacb47b01d31
  u-boot-ti-staging_2025.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=a44465cad8a30cbad5e8b22baef59aa7f5151494..3f3051bacd384bf331193070c29053d781296ab0
  linux-ti-staging-rt_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=6ebb538029fdce262760611915225be608c31257..1db5d0126012c7a0b82eff330f9f8a68b3d10f19
  linux-ti-staging_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=1a86d36433eac7cef246d41fbd4d2bdd9612253f..2d5f05489a39201c2fcf95d2dc04af57b6f7f356

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2025-12-04 01:00:51 -06:00
Manorit Chawdhry
b05876bb9c trusted-firmware-a/optee-os: Add LPM support on few platforms
Adds the required TF-A and OP-TEE patches to enable LPM support on
J7200, J784s4, J742s2.

Signed-off-by: Manorit Chawdhry <m-chawdhry@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-12-01 16:12:44 -06:00
Ryan Eatmon
7bec7f73c6 check_yocto_rules: Add new PV-1 entries
We have added a new PV check to the check_repo script that checks to
make sure that PV is set either in the filename or via the PV variable
in the recipe.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-11-20 14:15:29 -06:00
Randolph Sapp
780d73ff61 layer: add github MIRRORS definitions
We have some projects mirrored to GitHub currently. It makes sense to
add a MIRRORS entry for git.ti.com sources to fall back on in the event
git.ti.com is unreachable.

Placing this in the main BSP layer configuration file should be all that
is required for this and any other layers that depend this core layer to
fall back to GitHub.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-11-20 14:15:29 -06:00
Antonios Christidis
a349aed7bd ti-img-rogue-*: Migrate GPU driver version 24.2 -> 25.2
New recipes for GPU DDK 25.2. Update BSP configuration files with new
preferred recipe versions.

For the driver recipe, specifically unset the CC variable due to yocto
appending CROSS_COMPILE and CC, resulting in a warning for the
do_compile task:

make[1]: aarch64-oe-linux-aarch64-oe-linux-gcc: No such file or directory

Signed-off-by: Antonios Christidis <a-christidis@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-11-20 14:15:29 -06:00
LCPD Automation Script
2676538ee0 CI/CD Auto-Merger: cicd.master.202511180100
Updated the value(s) for:
  ti-linux-fw: PRUETH_FW_AM65X_SR2_VERSION,TI_LINUX_FW_SRCREV,TI_SYSFW_VERSION
  atf: SRCREV_tfa:am62lxx
  u-boot-ti-staging_2025.01: SRCREV_uboot
  linux-ti-staging-rt_6.12: SRCREV_ARM32
  linux-ti-staging_6.12: SRCREV

Changelogs:
  ti-linux-fw: https://git.ti.com/cgit/processor-firmware/ti-linux-firmware/log/?qt=range&q=faf2980429e83e502d1a2da907f8be14b131c9fc..0a37dc07b1120127eba73c7196a0b532350b9639
  u-boot-ti-staging_2025.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=934cf94788c505068308069903d42f6cdf30c0ae..a44465cad8a30cbad5e8b22baef59aa7f5151494
  linux-ti-staging-rt_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=998927d273b149e4e03abc087965dbfafdec66a2..6ebb538029fdce262760611915225be608c31257
  linux-ti-staging_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=4be12a82ab1650b6313835b4d2fc70848f38dc13..1a86d36433eac7cef246d41fbd4d2bdd9612253f

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2025-11-18 01:00:43 -06:00
Ryan Eatmon
e8eb6eac34 ti-rpmsg-char-examples: Fix patch
The recent SRCREV bump to ti-rpmsg-char makes this patch not apply.
Update the patch to match the new changes.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-11-17 13:50:55 -06:00
Hari Nagalla
5d15cce6fc ipc: ti-rpmsg-char: Update library to 0.6.10
update rpmsg library to 0.6.10
It brings the following fixes from ti-rpmsg-char repo:

d4cf638 src: fix bug in file_read_string()
3e72722 src: add api to fetch kernel allocated remote proc id
5061690 benchmark: update max runs = 1 trillion, max latency = 9sec
4aa2a84 examples: clean up tabs, delay metering
07660dd example: add rpmsg_char_benchmark
b40845f Replace read bytes from 256 --> 496
b2e9e2f Update max message size to 496

Signed-off-by: Hari Nagalla <hnagalla@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-11-17 13:50:55 -06:00
Anurag Dutta
20f7b83e1c conf: machine: j722s: Fix overlay name in KERNEL_DEVICETREE_PREFIX
Currently, the overlay mentioned in KERNEL_DEVICETREE_PREFIX in case
of j722s is "k3-am625-sk-mcspi-loopback" which is incorrect as it has
been renamed recently. Change the overlay to "k3-am62x-sk-mcspi-loopback"
in order to carry out SPI loopback tests successfully.

Fixes: 3b2097d727 ("conf: machine: j722s: Change overlay in KERNEL_DEVICETREE_PREFIX")
Signed-off-by: Anurag Dutta <a-dutta@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-11-17 13:50:55 -06:00
Ryan Eatmon
de5d6d7e35 check_yocto_rules: Add new exception for packagegroup-ti-core-initramfs.bbappend
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-11-12 15:53:07 -06:00
LCPD Automation Script
10c316b005 CI/CD Auto-Merger: cicd.master.202511120100
Updated the value(s) for:
  atf: SRCREV_tfa:am62lxx

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2025-11-12 01:00:40 -06:00
LCPD Automation Script
7cff97509d CI/CD Auto-Merger: cicd.master.202511110100
Updated the value(s) for:
  ti-linux-fw: TI_LINUX_FW_SRCREV,TI_SYSFW_VERSION
  atf: SRCREV_tfa:am62lxx
  u-boot-ti-staging_2025.01: SRCREV_uboot
  linux-ti-staging-rt_6.12: SRCREV_ARM32
  linux-ti-staging_6.12: SRCREV

Changelogs:
  ti-linux-fw: https://git.ti.com/cgit/processor-firmware/ti-linux-firmware/log/?qt=range&q=3c8ad7386e818cb42cce6ed4ce2aa1e76d7c688f..faf2980429e83e502d1a2da907f8be14b131c9fc
  u-boot-ti-staging_2025.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=aa613c2e83299906b121fcf0d6a5824f1d1c3ff9..934cf94788c505068308069903d42f6cdf30c0ae
  linux-ti-staging-rt_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=a55efe5b7adbb88ee55b67f4f044c2882978d1b5..998927d273b149e4e03abc087965dbfafdec66a2
  linux-ti-staging_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=9b2678be3a92ebdbf376000f06636eab8f7c1dd8..4be12a82ab1650b6313835b4d2fc70848f38dc13

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2025-11-11 01:00:43 -06:00
Paresh Bhagat
aca8792dec conf: machine: am62dxx-evm: Package eHRPWM overlay
Package eHRPWM overlay for am62dxx-evm by reusing the existing overlay
for am62a7-sk.

Signed-off-by: Paresh Bhagat <p-bhagat@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-11-05 17:55:43 -06:00
Denys Dmytriyenko
ea3574a504 packagegroup-ti-core-initramfs: move cifs-utils to dynamic-layers
Since cifs-utils is available in meta-openembedded, not OE-Core, it
cannot be added to this packagegroup unconditionally, as meta-ti-bsp
doesn't depend on meta-oe, only recommends it.

As it breaks yocto-check-layer now, move cifs-utils addition to
dynamic-layers to be added conditionally on meta-oe presence.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-11-05 17:55:43 -06:00
Ryan Eatmon
2264eb9462 ti-core-initramfs: Set IMAGE_OVERHEAD_FACTOR
We are seeing errors when building against linux-next where we run into
the INITRAMFS_MAXSIZE check.  Lower the overhead factor a little to give
us a little more room.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-11-05 17:55:43 -06:00
Vishnu Singh
53154b7a45 ti-librpmsg-dma: update ti-librpmsg-dma SRCREV & LICENSE
Replace MIT license with TI-TFL to align with TI release policy
and product requirements. Legal approval: SRAS00013045
Update scarthgap srcrev and disable 2dfft example from lib build.

License-Update: Replace MIT to TI-TFL license

Signed-off-by: Vishnu Singh <v-singh1@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-11-05 17:55:43 -06:00
LCPD Automation Script
39b81fac90 CI/CD Auto-Merger: cicd.master.202510310100
Updated the value(s) for:
  atf: SRCREV_tfa:am62lxx
  u-boot-ti-staging_2025.01: SRCREV_uboot
  k3conf: SRCREV
  linux-ti-staging-rt_6.12: SRCREV_ARM32
  linux-ti-staging_6.12: SRCREV

Changelogs:
  u-boot-ti-staging_2025.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=87519a151561393ce1244ba53401196b011b7a39..aa613c2e83299906b121fcf0d6a5824f1d1c3ff9
  k3conf: https://git.ti.com/cgit/k3conf/k3conf/log/?qt=range&q=4612157b45912dfc21ef49e364931c5ce3cb27a0..cba7dc13a39191ac18bf64fccbba429faff112b4
  linux-ti-staging-rt_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=f4bae38e160972f3dbfee640421bad168443cc0a..a55efe5b7adbb88ee55b67f4f044c2882978d1b5
  linux-ti-staging_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=2edd47b56fbddaa47a5b85fe3440bb3516bca8ea..9b2678be3a92ebdbf376000f06636eab8f7c1dd8

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2025-10-31 01:03:17 -05:00
LCPD Automation Script
6c0e4d3ca6 CI/CD Auto-Merger: cicd.master.202510281158
Updated the value(s) for:
  atf: SRCREV_tfa:am62lxx

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2025-10-28 11:58:43 -05:00
Sabeeh Khan
7422c85a9a meta-ti-extras: cc33xx-fw: update cc33xx firmware to 1.7.0.323
Major Updates since 1.7.0.120:
- Added WPA1 support
- Addressed many stability issues in WiFi and BLE
- Enabled thermal protection for operation up to 105C

SHA1 checksum:
c364c4d89802bcac769ee6eebc08ae1c4ef5a205  cc33xx_2nd_loader.bin
b39bfac65e0300e81dfcfee7301e07b4289df448  cc33xx-conf.bin
821fa40f608e350baa9e4cdfea6719bf469c5220  cc33xx_fw.bin

Signed-off-by: Sabeeh Khan <sabeeh-khan@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-10-28 11:48:43 -05:00
Ryan Eatmon
8f01b68d92 k3: Move from UBOOT_SIGN_ENABLE to KERNEL_FITIMAGE_SIGN_ENABLE
A recent change in oe-core [1] allowed for signing the fitImage without
signing the uboot files.  Since we use binman to sign all of the uboot
files, we do not want oe-core to re-sign themm, but we do want the
fitImage signed.

[1] https://git.openembedded.org/openembedded-core/commit/?id=313ff06fdfec36a09328dbd60471bd53127fabe3

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-10-28 11:48:43 -05:00
Ryan Eatmon
69aaf68a25 check_yocto_rules: Add new rule exception
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-10-27 14:23:31 -05:00
Judith Mendez
ea34013372 conf: machine: Include MCSPI overlay for am62p and am62 LP
MCSPI overlay can be used for all am62* SK boards as well as
am62p SK, so include the overlay for am62p and am62 LP SK builds
since it is not included in the default configuration.

Signed-off-by: Judith Mendez <jm@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-10-27 14:23:31 -05:00
Denys Dmytriyenko
cf1c495375 linux-bb.org: update to 6.12.43
Update bb.org kernel to 6.12.43 for 64-bit platforms.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-10-27 14:23:31 -05:00
Denys Dmytriyenko
9fd6bae832 u-boot-bb.org: upgrade 2025.07 -> 2025.10
Upgrade U-boot to 2025.10.

PocketBeagle2 defconfigs and branch got slight name change.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-10-27 14:23:31 -05:00
Ryan Eatmon
f308333e68 am62axx: Add whitespace to append assignment
Add missing whitespace on append assignment since the list is space
separated.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-10-24 13:59:24 -05:00
Telukula Jeevan Kumar Sahu
1e831a61f0 conf: am335x-evm and am437x-evm: Bump up max_leb_cnt
New features added require another increase to max_leb_cnt

Signed-off-by: Telukula Jeevan Kumar Sahu <j-sahu@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-10-24 13:59:24 -05:00
Paresh Bhagat
5ef2be147b conf: machine: am62dxx-evm: Package overlays
Package overlays which are common for AM62 family of devices for
am62dxx-evm by adding prefix string in KERNEL_DEVICETREE_PREFIX.

Signed-off-by: Paresh Bhagat <p-bhagat@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-10-24 13:59:24 -05:00
Paresh Bhagat
9bb0269438 ti-dm-fw: Update DM for am62dxx
am62dxx previously reused am62axx DM, but now that a dedicated DM is
available, migrate to device-specific DM.

Signed-off-by: Paresh Bhagat <p-bhagat@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-10-24 13:59:24 -05:00
Ryan Eatmon
a58677ffed packagegroup-ti-core-initramfs: ensure TI_INITRAMFS_KERNEL_MODULES is set
TI_INITRAMFS_KERNEL_MODULES gets set only for TI platfroms and ends up
being undefined otherwise, which breaks parsing in yocto-check-layer
and/or in multi-BSP setups. Ensure the variable is defined in the
packagegroup, if not already set by the machine configuration.

Remove the previous default assignment since we put it in the wrong
location.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2025-10-24 10:52:17 -05:00
LCPD Automation Script
6b9a2b3225 CI/CD Auto-Merger: cicd.master.202510240100
Updated the value(s) for:
  ti-linux-fw: TI_LINUX_FW_SRCREV
  u-boot-ti-staging_2025.01: SRCREV_uboot
  linux-ti-staging-rt_6.12: SRCREV_ARM32
  linux-ti-staging_6.12: SRCREV

Changelogs:
  ti-linux-fw: https://git.ti.com/cgit/processor-firmware/ti-linux-firmware/log/?qt=range&q=237071793594723bf1c2e9eef8ff836ffa3b09df..3c8ad7386e818cb42cce6ed4ce2aa1e76d7c688f
  u-boot-ti-staging_2025.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=b5956eebf45b7b604c046a21792883a42cd9c198..87519a151561393ce1244ba53401196b011b7a39
  linux-ti-staging-rt_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=dd80e6d61d8ccba753eb372040107ff195c8550d..f4bae38e160972f3dbfee640421bad168443cc0a
  linux-ti-staging_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=2ce6f0999344a368217d04cdbee0922144ecc899..2edd47b56fbddaa47a5b85fe3440bb3516bca8ea

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2025-10-24 01:00:44 -05:00
168 changed files with 1561 additions and 685 deletions

View File

@@ -18,12 +18,34 @@
"meta-ti-bsp/recipes-core/udev/eudev_%.bbappend",
"meta-ti-bsp/recipes-devtools/binutils/binutils-cross-canadian_%.bbappend",
"meta-ti-bsp/recipes-security/optee/optee-%.bbappend",
"meta-ti-bsp/dynamic-layers/openembedded-layer/recipes-bsp/u-boot/u-boot-ti-%.bbappend"
"meta-ti-bsp/dynamic-layers/openembedded-layer/recipes-bsp/u-boot/u-boot-ti-%.bbappend",
"meta-ti-bsp/dynamic-layers/openembedded-layer/recipes-ti/initramfs/packagegroup-ti-core-initramfs.bbappend",
"meta-ti-bsp/dynamic-layers/tpm-layer/recipes-ti/initramfs/packagegroup-ti-core-initramfs.bbappend",
"meta-ti-bsp/dynamic-layers/tpm-layer/recipes-ti/initramfs/ti-core-initramfs.bbappend"
]
},
"GUARD-2" : {
"skip_vars" : [ "k3" , "ti-soc" ]
},
"GUARD-3" : {
"skip_files" : [
"meta-ti-bsp/recipes-security/optee/optee-os-tadevkit_%.bbappend"
]
},
"PV-1" :{
"skip_files" : [
"meta-ti-bsp/recipes-kernel/linux/ti-kernel-fitimage.bb",
"meta-ti-bsp/recipes-multimedia/ti-multimedia-udev/ti-multimedia-udev.bb",
"meta-ti-bsp/recipes-ti/initramfs/packagegroup-ti-core-initramfs.bb",
"meta-ti-bsp/recipes-ti/initramfs/ti-core-initramfs.bb",
"meta-ti-bsp/recipes-ti/secdev/ti-k3-secdev_git.bb",
"meta-ti-extras/recipes-connectivity/cc33xx-target-scripts/cc33xx-target-scripts_git.bb",
"meta-ti-extras/recipes-ti/beagleboard/beaglebone-capes.bb",
"meta-ti-extras/recipes-ti/beagleboard/beaglebone-getting-started.bb",
"meta-ti-extras/recipes-ti/ipc/ti-ipc-examples-linux_git.bb",
"meta-ti-extras/recipes-ti/ipc/ti-ipc-rtos_git.bb"
]
},
"SUMMARY-1" : {
"skip_files" : [
"meta-ti-extras/recipes-ti/ipc/ti-ipc-rtos_git.bb"

View File

@@ -8,7 +8,7 @@ BBFILE_COLLECTIONS += "meta-beagle"
BBFILE_PATTERN_meta-beagle := "^${LAYERDIR}/"
BBFILE_PRIORITY_meta-beagle = "6"
LAYERSERIES_COMPAT_meta-beagle = "whinlatter"
LAYERSERIES_COMPAT_meta-beagle = "whinlatter wrynose"
LAYERDEPENDS_meta-beagle = " \
meta-ti-bsp \

View File

@@ -0,0 +1,21 @@
#@TYPE: Machine
#@NAME: AM62L Badge
#@DESCRIPTION: Machine configuration for the TI AM62L Badge
require conf/machine/include/am62lxx.inc
IMAGE_FSTYPES += "ubifs ubi"
MKUBIFS_ARGS ?= "-F -m 4096 -e 258048 -c 8500"
UBINIZE_ARGS ?= "-m 4096 -p 256KiB -s 1024 -O 1024"
KERNEL_DEVICETREE_PREFIX = " \
ti/k3-am62l3-badge \
"
KERNEL_DEVICETREE = ""
UBOOT_MACHINE = "am62lx_badge_defconfig"
TFA_BOARD = "am62l3-badge"

View File

@@ -5,14 +5,4 @@
require conf/machine/include/k3r5.inc
require conf/machine/include/beagle-bsp.inc
SYSFW_SOC = "j721e"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "gp"
SPL_BINARY = "spl/u-boot-spl.${UBOOT_SUFFIX}"
SPL_SYMLINK = "u-boot-r5spl.${UBOOT_SUFFIX}"
UBOOT_BINARY = "tiboot3.${UBOOT_SUFFIX}"
UBOOT_IMAGE = "tiboot3-${MAINMACHINE}-${PV}-${PR}.${UBOOT_SUFFIX}"
UBOOT_SYMLINK = "tiboot3-${MAINMACHINE}.${UBOOT_SUFFIX}"
UBOOT_MACHINE = "j721e_beagleboneai64_r5_defconfig"

View File

@@ -4,8 +4,4 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "am62x"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "gp"
UBOOT_MACHINE = "am62x_beagleplay_r5_defconfig"

View File

@@ -2,23 +2,10 @@
#@NAME: BeaglePlay (A53)
#@DESCRIPTION: Machine configuration for the BeaglePlay board (A53 core)
require conf/machine/include/k3.inc
require conf/machine/include/mc_k3r5.inc
SOC_FAMILY:append = ":am62xx"
MACHINE_FEATURES += "screen"
require conf/machine/include/am62xx.inc
SERIAL_CONSOLES = "115200;ttyS2"
require conf/machine/include/mesa-pvr.inc
PREFERRED_PROVIDER_virtual/gpudriver ?= "${BSP_ROGUE_DRIVER_PROVIDER}"
TFA_BOARD = "lite"
TFA_K3_SYSTEM_SUSPEND = "1"
OPTEEMACHINE = "k3-am62x"
UBOOT_MACHINE = "am62x_beagleplay_a53_defconfig"
SPL_BINARY = "tispl.bin_unsigned"

View File

@@ -2,14 +2,8 @@
#@NAME: BeagleY AI (R5F)
#@DESCRIPTION: Machine configuration for the BeagleY AI (R5F core)
require conf/machine/include/k3r5.inc
require conf/machine/beagley-ai-ti-k3r5.conf
require conf/machine/include/beagle-bsp.inc
SYSFW_SOC = "j722s"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs-fs"
UBOOT_MACHINE = "am67a_beagley_ai_r5_defconfig"
UBOOT_MACHINE:bsp-bb_org-6_6 = "j722s_evm_r5_defconfig"
UBOOT_MACHINE:bsp-ti-6_6 = "j722s_evm_r5_defconfig"
UBOOT_MACHINE:bsp-ti-6_12 = "j722s_evm_r5_defconfig"

View File

@@ -0,0 +1,8 @@
#@TYPE: Machine
#@NAME: BeagleY AI (R5F)
#@DESCRIPTION: Machine configuration for the BeagleY AI (R5F core)
require conf/machine/include/k3r5.inc
UBOOT_MACHINE = "am67a_beagley_ai_r5_defconfig"
UBOOT_MACHINE:bsp-ti-6_6 = "j722s_evm_r5_defconfig"

View File

@@ -0,0 +1,15 @@
#@TYPE: Machine
#@NAME: BeagleY AI (A53)
#@DESCRIPTION: Machine configuration for the BeagleY AI board (A53 core)
require conf/machine/include/j722s.inc
UBOOT_MACHINE = "am67a_beagley_ai_a53_defconfig"
UBOOT_MACHINE:bsp-ti-6_6 = "j722s_evm_a53_config"
KERNEL_DEVICETREE_PREFIX = " \
ti/k3-am67a \
ti/k3-j722s \
"
MACHINE_GUI_CLASS = "bigscreen"

View File

@@ -2,18 +2,11 @@
#@NAME: BeagleY AI (A53)
#@DESCRIPTION: Machine configuration for the BeagleY AI board (A53 core)
require conf/machine/include/j722s.inc
require conf/machine/beagley-ai-ti.conf
require conf/machine/include/beagle-bsp.inc
UBOOT_MACHINE = "am67a_beagley_ai_a53_defconfig"
UBOOT_MACHINE:bsp-bb_org-6_6 = "j722s_evm_a53_config"
UBOOT_MACHINE:bsp-ti-6_6 = "j722s_evm_a53_config"
UBOOT_MACHINE:bsp-ti-6_12 = "j722s_evm_a53_config"
KERNEL_DEVICETREE_PREFIX = " \
ti/k3-am67a \
ti/k3-j722s \
"
KERNEL_DEVICETREE:bsp-bb_org-6_6 = " \
ti/k3-am67a-beagley-ai.dtb \

View File

@@ -15,11 +15,12 @@ BSP_KERNEL_VERSION:bsp-bb_org-6_12 = "6.12.%"
BSP_BOOTLOADER_PROVIDER:bsp-bb_org-6_12 = "u-boot-bb.org"
BSP_BOOTLOADER_VERSION:bsp-bb_org-6_12 = "2025.%"
KERNEL_DEVICETREE_PREFIX:bsp-bb_org-6_12 = ""
TI_CORE_INITRAMFS_KERNEL_MODULES:bsp-bb_org-6_12 = ""
BSP_SGX_DRIVER_PROVIDER:bsp-bb_org-6_12 = "ti-sgx-ddk-km"
BSP_SGX_DRIVER_VERSION:bsp-bb_org-6_12 = "1.17%"
BSP_ROGUE_DRIVER_PROVIDER:bsp-bb_org-6_12 = "ti-img-rogue-driver"
BSP_ROGUE_DRIVER_VERSION:bsp-bb_org-6_12 = "24%"
BSP_ROGUE_DRIVER_VERSION:bsp-bb_org-6_12 = "25%"
BSP_MESA_PVR_VERSION:bsp-bb_org-6_12 = "24%"
# GC320 support requires out-of-tree drivers not yet available in bb.org 6.12
@@ -36,11 +37,12 @@ BSP_KERNEL_VERSION:bsp-bb_org-6_6 = "6.6.%"
BSP_BOOTLOADER_PROVIDER:bsp-bb_org-6_6 = "u-boot-bb.org"
BSP_BOOTLOADER_VERSION:bsp-bb_org-6_6 = "2024.%"
KERNEL_DEVICETREE_PREFIX:bsp-bb_org-6_6 = ""
TI_CORE_INITRAMFS_KERNEL_MODULES:bsp-bb_org-6_6 = ""
BSP_SGX_DRIVER_PROVIDER:bsp-bb_org-6_6 = "ti-sgx-ddk-km"
BSP_SGX_DRIVER_VERSION:bsp-bb_org-6_6 = "1.17%"
BSP_ROGUE_DRIVER_PROVIDER:bsp-bb_org-6_6 = "ti-img-rogue-driver"
BSP_ROGUE_DRIVER_VERSION:bsp-bb_org-6_6 = "24%"
BSP_ROGUE_DRIVER_VERSION:bsp-bb_org-6_6 = "25%"
BSP_MESA_PVR_VERSION:bsp-bb_org-6_6 = "24%"
# GC320 support requires out-of-tree drivers not yet available in bb.org 6.6

View File

@@ -5,8 +5,4 @@
require conf/machine/include/k3r5.inc
require conf/machine/include/beagle-bsp.inc
SYSFW_SOC = "am62x"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs-fs"
UBOOT_MACHINE = "am6232_pocketbeagle2_r5_defconfig"
UBOOT_MACHINE = "am62_pocketbeagle2_r5_defconfig"

View File

@@ -16,7 +16,7 @@ TFA_K3_SYSTEM_SUSPEND = "1"
OPTEEMACHINE = "k3-am62x"
UBOOT_MACHINE = "am6232_pocketbeagle2_a53_defconfig"
UBOOT_MACHINE = "am62_pocketbeagle2_a53_defconfig"
KERNEL_DEVICETREE_PREFIX = " \
ti/k3-am6232 \

View File

@@ -0,0 +1,28 @@
From 55ee5fecd68d0858ba6743137162252adedf2f72 Mon Sep 17 00:00:00 2001
From: Leon Anavi <leon.anavi@konsulko.com>
Date: Mon, 16 Mar 2026 18:34:58 +0000
Subject: [PATCH] arm: dts: am335x-pocketbeagle: Add tick-timer
Add a binding for the tick-timer for PocketBeagle.
Upstream-Status: Pending [https://lists.denx.de/pipermail/u-boot/2026-January/608684.html]
Signed-off-by: Leon Anavi <leon.anavi@konsulko.com>
---
arch/arm/dts/am335x-pocketbeagle.dts | 1 +
1 file changed, 1 insertion(+)
diff --git a/arch/arm/dts/am335x-pocketbeagle.dts b/arch/arm/dts/am335x-pocketbeagle.dts
index b379e3a5570..02e3aac5606 100644
--- a/arch/arm/dts/am335x-pocketbeagle.dts
+++ b/arch/arm/dts/am335x-pocketbeagle.dts
@@ -15,6 +15,7 @@
chosen {
stdout-path = &uart0;
+ tick-timer = &timer2;
};
leds {
--
2.53.0

View File

@@ -1,19 +0,0 @@
require recipes-bsp/u-boot/u-boot-ti.inc
SUMMARY = "BeagleBoard.org U-Boot"
COMPATIBLE_MACHINE = "pocketbeagle2|beagle.*"
PV = "2025.07"
UBOOT_GIT_URI = "git://github.com/beagleboard/u-boot.git"
UBOOT_GIT_PROTOCOL = "https"
BRANCH = "v2025.07-Beagle"
SRCREV = "919ec3cd84f39e6960d1705d4ba7f810bc1067fc"
BRANCH:pocketbeagle2 = "v2025.07-am6232-pocketbeagle2"
BRANCH:pocketbeagle2-k3r5 = "v2025.07-am6232-pocketbeagle2"
SRCREV:pocketbeagle2 = "6d5b4abc28f036a4a83ccb234f04d72eceafdc4e"
SRCREV:pocketbeagle2-k3r5 = "6d5b4abc28f036a4a83ccb234f04d72eceafdc4e"
SRC_URI:append:pocketbeagle2 = " file://bootcmd-ti-mmc.cfg"

View File

@@ -0,0 +1,20 @@
require recipes-bsp/u-boot/u-boot-ti.inc
SUMMARY = "BeagleBoard.org U-Boot"
COMPATIBLE_MACHINE = "pocketbeagle2|beagle.*"
PV = "2025.10"
UBOOT_GIT_URI = "git://github.com/beagleboard/u-boot.git"
UBOOT_GIT_PROTOCOL = "https"
BRANCH = "v2025.10-Beagle"
SRCREV = "6825d60bea17774358f4199c4c7062801cfb931e"
BRANCH:pocketbeagle2 = "v2025.10-am62-pocketbeagle2"
BRANCH:pocketbeagle2-k3r5 = "v2025.10-am62-pocketbeagle2"
SRCREV:pocketbeagle2 = "4e0b6294a1185029d34eff6ed91f3ad1734b643f"
SRCREV:pocketbeagle2-k3r5 = "4e0b6294a1185029d34eff6ed91f3ad1734b643f"
SRC_URI:append:pocketbeagle2 = " file://bootcmd-ti-mmc.cfg"
SRC_URI:append:beaglebone = " file://0001-arm-dts-am335x-pocketbeagle-Add-tick-timer.patch"

View File

@@ -0,0 +1,60 @@
From 3dedeeecd1ae42a751721d83dc21877122cc1795 Mon Sep 17 00:00:00 2001
From: Mikhail Gavrilov <mikhail.v.gavrilov@gmail.com>
Date: Sat, 6 Dec 2025 14:28:25 +0500
Subject: libbpf: Fix -Wdiscarded-qualifiers under C23
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
commit d70f79fef65810faf64dbae1f3a1b5623cdb2345 upstream.
glibc ≥ 2.42 (GCC 15) defaults to -std=gnu23, which promotes
-Wdiscarded-qualifiers to an error.
In C23, strstr() and strchr() return "const char *".
Change variable types to const char * where the pointers are never
modified (res, sym_sfx, next_path).
Suggested-by: Florian Weimer <fweimer@redhat.com>
Suggested-by: Andrii Nakryiko <andrii@kernel.org>
Signed-off-by: Mikhail Gavrilov <mikhail.v.gavrilov@gmail.com>
Link: https://lore.kernel.org/r/20251206092825.1471385-1-mikhail.v.gavrilov@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
[ shung-hsi.yu: needed to fix kernel build failure due to libbpf since glibc
2.43+ (which adds 'const' qualifier to strstr). 'sym_sfx' hunk dropped because
commit f8a05692de06 ("libbpf: Work around kernel inconsistently stripping
'.llvm.' suffix") is not present. ]
Signed-off-by: Shung-Hsi Yu <shung-hsi.yu@suse.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Upstream-Status: Backport
---
tools/lib/bpf/libbpf.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/tools/lib/bpf/libbpf.c b/tools/lib/bpf/libbpf.c
index 060aecf60b76b1..7d496f0a9a30d1 100644
--- a/tools/lib/bpf/libbpf.c
+++ b/tools/lib/bpf/libbpf.c
@@ -8174,7 +8174,7 @@ static int kallsyms_cb(unsigned long long sym_addr, char sym_type,
struct bpf_object *obj = ctx;
const struct btf_type *t;
struct extern_desc *ext;
- char *res;
+ const char *res;
res = strstr(sym_name, ".llvm.");
if (sym_type == 'd' && res)
@@ -11959,7 +11959,7 @@ static int resolve_full_path(const char *file, char *result, size_t result_sz)
if (!search_paths[i])
continue;
for (s = search_paths[i]; s != NULL; s = strchr(s, ':')) {
- char *next_path;
+ const char *next_path;
int seg_len;
if (s[0] == ':')
--
cgit 1.2.3-korg

View File

@@ -15,7 +15,7 @@ require recipes-kernel/linux/ti-kernel.inc
DEPENDS += "gmp-native libmpc-native"
KERNEL_EXTRA_ARGS += "LOADADDR=${UBOOT_ENTRYPOINT} ${EXTRA_DTC_ARGS}"
KERNEL_EXTRA_ARGS += "LOADADDR=${UBOOT_ENTRYPOINT}"
# Extra DT overlays/capes
KERNEL_DEVICETREE:append:armv7a = " \
@@ -52,12 +52,6 @@ KERNEL_DEVICETREE:append:armv7a = " \
ti/omap/PB-MIKROBUS-1.dtbo \
"
KERNEL_DEVICETREE:append:aarch64 = " \
ti/BONE-I2C1.dtbo \
ti/BONE-I2C2.dtbo \
ti/BONE-I2C3.dtbo \
"
S = "${UNPACKDIR}/${BB_GIT_DEFAULT_DESTSUFFIX}"
# 6.12.34 version for 32-bit
@@ -65,9 +59,11 @@ SRCREV:armv7a = "9e419b26243bd7efcd103ae0f6456f828592b34b"
PV:armv7a = "6.12.34+git"
BRANCH:armv7a = "v6.12.34-ti-arm32-r12"
# 6.12.34 version for 64-bit
SRCREV:aarch64 = "9ca36b8c54806a037f357efcd40eaa8399798b05"
PV:aarch64 = "6.12.34+git"
BRANCH:aarch64 = "v6.12.34-ti-arm64-r46"
# 6.12.43 version for 64-bit
SRCREV:aarch64 = "84c4b4613a852db269620a3fdfed65de90569fa1"
PV:aarch64 = "6.12.43+git"
BRANCH:aarch64 = "v6.12.43-ti-arm64-r54"
KERNEL_GIT_URI = "git://github.com/beagleboard/linux.git"
SRC_URI += "file://0001-libbpf-Fix-Wdiscarded-qualifiers-under-C23.patch"

View File

@@ -15,7 +15,7 @@ require recipes-kernel/linux/ti-kernel.inc
DEPENDS += "gmp-native libmpc-native"
KERNEL_EXTRA_ARGS += "LOADADDR=${UBOOT_ENTRYPOINT} ${EXTRA_DTC_ARGS}"
KERNEL_EXTRA_ARGS += "LOADADDR=${UBOOT_ENTRYPOINT}"
# Extra DT overlays/capes
KERNEL_DEVICETREE:append:armv7a = " \

View File

@@ -15,7 +15,6 @@ TI_SECURE_DEV_PKG:k3r5 = "${@ d.getVar('TI_SECURE_DEV_PKG_K3') or d.getVar('TI_K
TI_SECURE_DEV_PKG:ti33x = "${TI_SECURE_DEV_PKG_CAT}/am3x"
TI_SECURE_DEV_PKG:ti43x = "${TI_SECURE_DEV_PKG_CAT}/am4x"
TI_SECURE_DEV_PKG:am57xx = "${TI_SECURE_DEV_PKG_AUTO}/am5x"
TI_SECURE_DEV_PKG:dra7xx = "${TI_SECURE_DEV_PKG_AUTO}/dra7"
# The SECDEV scripts may need their own location provided through the environment
export TI_SECURE_DEV_PKG

View File

@@ -9,7 +9,7 @@ BBFILE_COLLECTIONS += "meta-ti-bsp"
BBFILE_PATTERN_meta-ti-bsp := "^${LAYERDIR}/"
BBFILE_PRIORITY_meta-ti-bsp = "6"
LAYERSERIES_COMPAT_meta-ti-bsp = "whinlatter"
LAYERSERIES_COMPAT_meta-ti-bsp = "whinlatter wrynose"
LICENSE_PATH += "${LAYERDIR}/licenses"
@@ -20,10 +20,13 @@ LAYERDEPENDS_meta-ti-bsp = " \
LAYERRECOMMENDS_meta-ti-bsp = " \
openembedded-layer \
tpm-layer \
"
BBFILES_DYNAMIC += " \
openembedded-layer:${LAYERDIR}/dynamic-layers/openembedded-layer/recipes*/*/*.bbappend \
tpm-layer:${LAYERDIR}/dynamic-layers/tpm-layer/recipes*/*/*.bb \
tpm-layer:${LAYERDIR}/dynamic-layers/tpm-layer/recipes*/*/*.bbappend \
"
SIGGEN_EXCLUDERECIPES_ABISAFE += " \
@@ -36,3 +39,8 @@ TI_COMMON_DEPLOY ?= "${TOPDIR}/deploy-ti"
DEPLOY_DIR_IMAGE:ti-soc = "${TI_COMMON_DEPLOY}/images/${MACHINE}"
SDK_DEPLOY:ti-soc = "${TI_COMMON_DEPLOY}/sdk"
PSEUDO_IGNORE_PATHS:append:ti-soc = ",${TI_COMMON_DEPLOY}"
MIRRORS += " \
git://git.ti.com/.* git://github.com/TexasInstruments/BASENAME;protocol=https \
gitsm://git.ti.com/.* gitsm://github.com/TexasInstruments/BASENAME;protocol=https \
"

View File

@@ -22,7 +22,7 @@ SERIAL_CONSOLES = "115200;ttyS0 115200;ttyS3"
# UBI: logical eraseblock size: 126976 bytes
# from ubiattach stdout:
# UBI device number 0, total 1988 LEBs
MKUBIFS_ARGS ?= "-F -m 2048 -e 126976 -c 16000"
MKUBIFS_ARGS ?= "-F -m 2048 -e 126976 -c 18000"
# do ubiattach /dev/ubi_ctrl -m 7 -O 2048
# from dmesg:

View File

@@ -21,7 +21,7 @@ SERIAL_CONSOLES = "115200;ttyS0"
# UBI: logical eraseblock size: 253952 bytes
# from ubiattach stdout:
# UBI device number 0, total 994 LEBs
MKUBIFS_ARGS = "-F -m 4096 -e 253952 -c 8000"
MKUBIFS_ARGS = "-F -m 4096 -e 253952 -c 10000"
# do ubiattach /dev/ubi_ctrl -m 11 -O 4096
# from dmesg:

View File

@@ -4,10 +4,14 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "am62ax"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs-fs"
UBOOT_MACHINE = "am62ax_evm_r5_defconfig"
UBOOT_MACHINE:tie-test-builds = ""
UBOOT_CONFIG_FRAGMENTS:ti-falcon = "k3_r5_falcon.config"
UBOOT_CONFIG = ""
UBOOT_CONFIG:tie-test-builds = "usbdfu main"
UBOOT_CONFIG[main] = "am62ax_evm_r5_defconfig"
UBOOT_CONFIG[usbdfu] = "am62ax_evm_r5_defconfig"
UBOOT_CONFIG_FRAGMENTS[usbdfu] = "am62x_r5_usbdfu.config"
UBOOT_FRAGMENTS:ti-falcon = "k3_r5_falcon.config"

View File

@@ -6,7 +6,13 @@ require conf/machine/include/am62axx.inc
KERNEL_DEVICETREE_PREFIX = " \
ti/k3-am62a7 \
ti/k3-am62x-sk \
ti/k3-am62x-sk-csi2 \
ti/k3-am62x-sk-ecap-capture \
ti/k3-am62x-sk-eqep \
ti/k3-am62x-sk-hdmi \
ti/k3-am62x-sk-lpm \
ti/k3-am62x-sk-mcspi-loopback \
ti/k3-am62x-sk-pwm \
ti/k3-fpdlink \
ti/k3-v3link \
"

View File

@@ -4,8 +4,4 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "am62dx"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs-fs"
UBOOT_MACHINE = "am62dx_evm_r5_defconfig"

View File

@@ -7,6 +7,9 @@ require conf/machine/include/am62dxx.inc
KERNEL_DEVICETREE_PREFIX = " \
ti/k3-am62d2 \
ti/k3-am62a7-sk-edgeai \
ti/k3-am62x-sk \
ti/k3-am62a7-sk-rpi-hdr-ehrpwm \
ti/k3-am62a7-sk-e3-max-opp \
"
KERNEL_DEVICETREE = ""
@@ -15,4 +18,4 @@ FIT_CONF_DEFAULT_DTB = "k3-am62d2-evm.dtb"
UBOOT_MACHINE = "am62dx_evm_a53_defconfig"
MACHINE_ESSENTIAL_EXTRA_RRECOMMENDS += "ti-dac-fw"
MACHINE_ESSENTIAL_EXTRA_RRECOMMENDS += "ti-adc-fw"

View File

@@ -6,7 +6,7 @@ require conf/machine/include/am62lxx.inc
IMAGE_FSTYPES += "ubifs ubi"
MKUBIFS_ARGS ?= "-F -m 4096 -e 258048 -c 8500"
MKUBIFS_ARGS ?= "-F -m 4096 -e 258048 -c 12000"
UBINIZE_ARGS ?= "-m 4096 -p 256KiB -s 1024 -O 1024"
@@ -17,3 +17,10 @@ KERNEL_DEVICETREE_PREFIX = " \
KERNEL_DEVICETREE = ""
UBOOT_MACHINE = "am62lx_evm_defconfig"
FIT_CONF_DEFAULT_DTB = "k3-am62l3-evm.dtb"
UBOOT_LOADADDRESS = "0x82400000"
UBOOT_ENTRYPOINT = "0x82400000"
UBOOT_RD_LOADADDRESS = "0x84000000"
UBOOT_RD_ENTRYPOINT = "0x84000000"
UBOOT_DTB_LOADADDRESS = "0x84f00000"
UBOOT_DTBO_LOADADDRESS = "0x84f80000"

View File

@@ -4,10 +4,22 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "am62px"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs-fs"
UBOOT_MACHINE = ""
UBOOT_MACHINE = "am62px_evm_r5_defconfig"
UBOOT_ECDSA_SIGN_CONFIG ?= "ecdsa"
UBOOT_ECDSA_SIGN_CONFIG:bsp-ti-6_6 = ""
UBOOT_ECDSA_SIGN_CONFIG:bsp-next = ""
UBOOT_ECDSA_SIGN_CONFIG:bsp-mainline = ""
UBOOT_CONFIG_FRAGMENTS:ti-falcon = "k3_r5_falcon.config"
UBOOT_CONFIG = "${UBOOT_ECDSA_SIGN_CONFIG} main"
UBOOT_CONFIG:prepend:tie-test-builds = "usbdfu "
UBOOT_CONFIG[main] = "am62px_evm_r5_defconfig"
UBOOT_CONFIG[ecdsa] = "am62px_evm_r5_defconfig"
UBOOT_CONFIG[usbdfu] = "am62px_evm_r5_defconfig"
UBOOT_CONFIG_MAKE_OPTS[ecdsa] = "${TI_SIGN_WITH_ECDSA_KEY}"
UBOOT_CONFIG_FRAGMENTS[usbdfu] = "am62x_r5_usbdfu.config"
UBOOT_FRAGMENTS:ti-falcon = "k3_r5_falcon.config"

View File

@@ -9,6 +9,7 @@ KERNEL_DEVICETREE_PREFIX = " \
ti/k3-am62x-sk-csi2 \
ti/k3-am62x-sk-hdmi \
ti/k3-am62x-sk-lpm \
ti/k3-am62x-sk-mcspi-loopback \
ti/k3-v3link \
"
@@ -22,11 +23,28 @@ KERNEL_DEVICETREE = " \
FIT_CONF_DEFAULT_DTB = "k3-am62p5-sk.dtb"
UBOOT_MACHINE = "am62px_evm_a53_defconfig"
UBOOT_ECDSA_SIGN_CONFIG ?= "ecdsa"
UBOOT_ECDSA_SIGN_CONFIG:bsp-ti-6_6 = ""
UBOOT_ECDSA_SIGN_CONFIG:bsp-next = ""
UBOOT_ECDSA_SIGN_CONFIG:bsp-mainline = ""
# UBOOT_CONFIG_FRAGMENTS holds the list of u-boot config fragments which has to be build
ECDSA_BOOT_FILES ?= "tiboot3.bin-ecdsa tiboot3-*-evm.bin-ecdsa tispl.bin-ecdsa u-boot.img-ecdsa"
ECDSA_BOOT_FILES:bsp-ti-6_6 = ""
ECDSA_BOOT_FILES:bsp-next = ""
ECDSA_BOOT_FILES:bsp-mainline = ""
UBOOT_MACHINE = ""
UBOOT_CONFIG = "${UBOOT_ECDSA_SIGN_CONFIG} main"
UBOOT_CONFIG[main] = "am62px_evm_a53_defconfig"
UBOOT_CONFIG[ecdsa] = "am62px_evm_a53_defconfig"
UBOOT_CONFIG_MAKE_OPTS[ecdsa] = "${TI_SIGN_WITH_ECDSA_KEY}"
IMAGE_BOOT_FILES += "${ECDSA_BOOT_FILES}"
# UBOOT_FRAGMENTS holds the list of u-boot config fragments which has to be build
# along with the base defconfig mentioned in UBOOT_MACHINE. Refer u-boot-mergeconfig.inc
# under meta-ti-bsp/recipes-bsp/u-boot/ for more details.
# For AM62P tisdk-display-cluster image, splash screen is handled by SBL.
# Hence, disable the A53 based splash screen using the am62x_evm_prune_splashscreen.config fragment present in ti-u-boot tree
UBOOT_CONFIG_FRAGMENTS = "${@oe.utils.conditional('DISPLAY_CLUSTER_ENABLE', '1', 'am62x_evm_prune_splashscreen.config', '', d)}"
UBOOT_FRAGMENTS = "${@oe.utils.conditional('DISPLAY_CLUSTER_ENABLE', '1', 'am62x_evm_prune_splashscreen.config', '', d)}"

View File

@@ -4,10 +4,14 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "am62x"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs-fs"
UBOOT_MACHINE = "am62x_evm_r5_defconfig"
UBOOT_MACHINE:tie-test-builds = ""
UBOOT_CONFIG_FRAGMENTS:ti-falcon = "k3_r5_falcon.config"
UBOOT_CONFIG = ""
UBOOT_CONFIG:tie-test-builds = "usbdfu main"
UBOOT_CONFIG[main] = "am62x_evm_r5_defconfig"
UBOOT_CONFIG[usbdfu] = "am62x_evm_r5_defconfig"
UBOOT_CONFIG_FRAGMENTS[usbdfu] = "am62x_r5_usbdfu.config"
UBOOT_FRAGMENTS:ti-falcon = "k3_r5_falcon.config"

View File

@@ -4,10 +4,14 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "am62x"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs-fs"
UBOOT_MACHINE = "am62x_lpsk_r5_defconfig"
UBOOT_MACHINE:tie-test-builds = ""
UBOOT_CONFIG_FRAGMENTS:ti-falcon = "k3_r5_falcon.config"
UBOOT_CONFIG = ""
UBOOT_CONFIG:tie-test-builds = "usbdfu main"
UBOOT_CONFIG[main] = "am62x_lpsk_r5_defconfig"
UBOOT_CONFIG[usbdfu] = "am62x_lpsk_r5_defconfig"
UBOOT_CONFIG_FRAGMENTS[usbdfu] = "am62x_r5_usbdfu.config"
UBOOT_FRAGMENTS:ti-falcon = "k3_r5_falcon.config"

View File

@@ -8,10 +8,12 @@ KERNEL_DEVICETREE_PREFIX = " \
ti/k3-am62-lp \
ti/k3-am625-sk \
ti/k3-am62x-sk-dmtimer-pwm \
ti/k3-am62x-sk-ecap-capture \
ti/k3-am62x-sk-eqep \
ti/k3-am62x-sk-hdmi \
ti/k3-am62x-sk-lpm \
ti/k3-am62x-sk-mcan \
ti/k3-am62x-sk-mcspi-loopback \
ti/k3-am62x-sk-pwm \
"

View File

@@ -4,9 +4,6 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "am62x"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs-fs"
UBOOT_MACHINE = "am6254xxl_evm_r5_defconfig"
UBOOT_MACHINE:bsp-ti-6_6 = "am62xsip_evm_r5_defconfig"
UBOOT_MACHINE:bsp-ti-6_18 = "am6254atl_evm_r5_defconfig"

View File

@@ -24,6 +24,8 @@ KERNEL_DEVICETREE = " \
FIT_CONF_DEFAULT_DTB = "k3-am6254xxl-sk.dtb"
FIT_CONF_DEFAULT_DTB:bsp-ti-6_6 = "k3-am625-sk.dtb"
FIT_CONF_DEFAULT_DTB:bsp-ti-6_18 = "k3-am6254atl-sk.dtb"
UBOOT_MACHINE = "am6254xxl_evm_a53_defconfig"
UBOOT_MACHINE:bsp-ti-6_6 = "am62xsip_evm_a53_defconfig"
UBOOT_MACHINE:bsp-ti-6_18 = "am6254atl_evm_a53_defconfig"

View File

@@ -4,8 +4,16 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "am64x_sr2"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs-fs"
UBOOT_MACHINE = ""
UBOOT_MACHINE = "am64x_evm_r5_defconfig"
UBOOT_ECDSA_SIGN_CONFIG ?= "ecdsa"
UBOOT_ECDSA_SIGN_CONFIG:bsp-ti-6_6 = ""
UBOOT_ECDSA_SIGN_CONFIG:bsp-next = ""
UBOOT_ECDSA_SIGN_CONFIG:bsp-mainline = ""
UBOOT_CONFIG = "${UBOOT_ECDSA_SIGN_CONFIG} main"
UBOOT_CONFIG[main] = "am64x_evm_r5_defconfig"
UBOOT_CONFIG[ecdsa] = "am64x_evm_r5_defconfig"
UBOOT_CONFIG_MAKE_OPTS[ecdsa] = "${TI_SIGN_WITH_ECDSA_KEY}"

View File

@@ -4,4 +4,21 @@
require conf/machine/include/am64xx.inc
UBOOT_MACHINE = "am64x_evm_a53_defconfig"
UBOOT_ECDSA_SIGN_CONFIG ?= "ecdsa"
UBOOT_ECDSA_SIGN_CONFIG:bsp-ti-6_6 = ""
UBOOT_ECDSA_SIGN_CONFIG:bsp-next = ""
UBOOT_ECDSA_SIGN_CONFIG:bsp-mainline = ""
ECDSA_BOOT_FILES ?= "tiboot3.bin-ecdsa tiboot3-*-evm.bin-ecdsa tispl.bin-ecdsa u-boot.img-ecdsa"
ECDSA_BOOT_FILES:bsp-ti-6_6 = ""
ECDSA_BOOT_FILES:bsp-next = ""
ECDSA_BOOT_FILES:bsp-mainline = ""
UBOOT_MACHINE = ""
UBOOT_CONFIG = "${UBOOT_ECDSA_SIGN_CONFIG} main"
UBOOT_CONFIG[main] = "am64x_evm_a53_defconfig"
UBOOT_CONFIG[ecdsa] = "am64x_evm_a53_defconfig"
UBOOT_CONFIG_MAKE_OPTS[ecdsa] = "${TI_SIGN_WITH_ECDSA_KEY}"
IMAGE_BOOT_FILES += "${ECDSA_BOOT_FILES}"

View File

@@ -4,8 +4,10 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "am65x_sr2"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "gp"
UBOOT_MACHINE = "am65x_evm_r5_defconfig"
UBOOT_MACHINE:tie-test-builds = ""
UBOOT_CONFIG = ""
UBOOT_CONFIG:prepend:tie-test-builds = "usbdfu main"
UBOOT_CONFIG[main] = "am65x_evm_r5_defconfig"
UBOOT_CONFIG[usbdfu] = "am65x_evm_r5_usbdfu_defconfig"

View File

@@ -1,11 +0,0 @@
#@TYPE: Machine
#@NAME: AM65xx HS EVM (R5F)
#@DESCRIPTION: Machine configuration for the TI AM65xx HS EVM (R5F core)
require conf/machine/include/k3r5.inc
SYSFW_SOC = "am65x_sr2"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs"
UBOOT_MACHINE = "am65x_evm_r5_defconfig"

View File

@@ -1,7 +0,0 @@
#@TYPE: Machine
#@NAME: AM65xx HS EVM
#@DESCRIPTION: Machine configuration for the TI AM65xx HS EVM
require conf/machine/include/am65xx.inc
UBOOT_MACHINE = "am65x_evm_a53_defconfig"

View File

@@ -4,8 +4,4 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "j721s2"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs-fs"
UBOOT_MACHINE = "am68_sk_r5_defconfig"

View File

@@ -4,8 +4,4 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "j784s4"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs-fs"
UBOOT_MACHINE = "am69_sk_r5_defconfig"

View File

@@ -2,7 +2,7 @@
#@NAME: DRA7xx EVM
#@DESCRIPTION: Machine configuration for the TI DRA7xx EVM
require conf/machine/include/dra7xx.inc
require conf/machine/include/am57xx.inc
MACHINE_FEATURES += "touchscreen"

View File

@@ -1,7 +1,50 @@
require conf/machine/include/omap-a15.inc
SOC_FAMILY:append = ":dra7xx"
require conf/machine/include/ti-soc.inc
SOC_FAMILY:append = ":am57xx"
MACHINE_FEATURES += "pci"
DEFAULTTUNE ?= "armv7athf-neon"
require conf/machine/include/arm/armv7a/tune-cortexa15.inc
MACHINE_ESSENTIAL_EXTRA_RRECOMMENDS += "prueth-fw prusw-fw pruhsr-fw pruprp-fw"
require conf/machine/include/ti-bsp.inc
# Graphics providers and variables
require conf/machine/include/mesa-pvr.inc
PREFERRED_PROVIDER_virtual/gpudriver ?= "${BSP_SGX_DRIVER_PROVIDER}"
KERNEL_IMAGETYPE = "zImage"
KERNEL_IMAGETYPES = "zImage uImage"
KERNEL_CLASSES += "kernel-uimage"
UBOOT_ARCH = "arm"
UBOOT_ENTRYPOINT = "0x80008000"
UBOOT_LOADADDRESS = "0x80008000"
# Generate an extlinux.conf file
UBOOT_EXTLINUX = "1"
UBOOT_EXTLINUX_ROOT = "root=PARTUUID=${uuid}"
UBOOT_EXTLINUX_BOOT_FILES = " \
extlinux.conf;extlinux/extlinux.conf \
${KERNEL_IMAGETYPE} \
${DEVICETREE_FILES} \
"
SPL_BINARY = "MLO"
UBOOT_SUFFIX = "img"
EXTRA_IMAGEDEPENDS += "virtual/bootloader"
MACHINE_ESSENTIAL_EXTRA_RDEPENDS += "kernel-image-zimage"
MACHINE_ESSENTIAL_EXTRA_RRECOMMENDS += "vpdma-fw goodix-fw prueth-fw prusw-fw pruhsr-fw pruprp-fw"
# Use the expected value of the ubifs filesystem's volume name in the kernel
# and u-boot.
UBI_VOLNAME = "rootfs"
# List common SoC features, may need to add touchscreen for specific machines
MACHINE_FEATURES = "apm usbgadget usbhost vfat ext2 screen alsa mmip dsp gc320 pci"
IMAGE_FSTYPES += "tar.xz wic.xz wic.bmap"
WKS_FILE ?= "sdimage-2part.wks"
IMAGE_BOOT_FILES += "${SPL_BINARY} u-boot.${UBOOT_SUFFIX} ${UBOOT_EXTLINUX_BOOT_FILES} ipc/dra7-ipu1-fw.xem4;dra7-ipu1-fw.xem4"
do_image_wic[depends] += "virtual/bootloader:do_deploy"
do_image_wic[depends] += "ti-rtos-messageq-test-fw:do_deploy"

View File

@@ -12,5 +12,6 @@ OPTEEMACHINE = "k3-am62x"
MACHINE_ESSENTIAL_EXTRA_RRECOMMENDS += "cnm-wave-fw"
TI_INITRAMFS_KERNEL_MODULES:append:bsp-mainline = "kernel-module-tps6594-i2c"
TI_INITRAMFS_KERNEL_MODULES:append:bsp-next = "kernel-module-tps6594-i2c"
TI_CORE_INITRAMFS_KERNEL_MODULES = "kernel-module-tps6594-i2c kernel-module-tps6594-regulator kernel-module-tps6594-core"
TI_CORE_INITRAMFS_KERNEL_MODULES:bsp-ti-6_6 = ""
TI_CORE_INITRAMFS_KERNEL_MODULES:bsp-ti-6_12 = ""

View File

@@ -3,7 +3,8 @@ SOC_FAMILY:append = ":am62lxx"
MACHINE_FEATURES += "screen"
TFA_BOARD = "am62l"
TFA_BOARD = "am62lx"
TFA_K3_SYSTEM_SUSPEND = "1"
TFA_PLATFORM = "k3low"
OPTEEMACHINE = "k3-am62lx"

View File

@@ -30,4 +30,4 @@ OPTEEMACHINE = "k3-am64x"
MACHINE_ESSENTIAL_EXTRA_RRECOMMENDS += "prueth-fw pruhsr-fw prusw-fw pruprp-fw"
TI_WKS_BOOTLOADER_APPEND = "console=ttyS2,115200n8"
SERIAL_CONSOLES = "115200;ttyS2"

View File

@@ -1,4 +0,0 @@
require conf/machine/include/omap-a15.inc
SOC_FAMILY:append = ":dra7xx"
MACHINE_FEATURES += "pci"

View File

@@ -17,8 +17,10 @@ OPTEEMACHINE = "k3-j721e"
TI_VXE_VXD_DRIVER = "ti-vxe-vxd-driver"
TI_VXE_VXD_DRIVER:bsp-ti-6_6 = ""
TI_VXE_VXD_DRIVER:bsp-ti-6_18 = ""
MACHINE_ESSENTIAL_EXTRA_RRECOMMENDS += "cadence-mhdp-fw vxd-dec-fw ti-eth-fw-j721e ${TI_VXE_VXD_DRIVER}"
TI_INITRAMFS_KERNEL_MODULES:append:bsp-mainline = " kernel-module-cdns-pltfrm kernel-module-ti-j721e-ufs"
TI_INITRAMFS_KERNEL_MODULES:append:bsp-next = " kernel-module-cdns-pltfrm kernel-module-ti-j721e-ufs"
TI_CORE_INITRAMFS_KERNEL_MODULES = "kernel-module-cdns-pltfrm kernel-module-ti-j721e-ufs"
TI_CORE_INITRAMFS_KERNEL_MODULES:bsp-ti-6_6 = ""
TI_CORE_INITRAMFS_KERNEL_MODULES:bsp-ti-6_12 = ""

View File

@@ -12,7 +12,8 @@ TFA_BOARD = "j784s4"
OPTEEMACHINE = "k3-j784s4"
MACHINE_ESSENTIAL_EXTRA_RRECOMMENDS += "cadence-mhdp-fw cnm-wave-fw ti-eth-fw-j784s4"
MACHINE_ESSENTIAL_EXTRA_RRECOMMENDS += "cadence-mhdp-fw cnm-wave-fw"
TI_INITRAMFS_KERNEL_MODULES:append:bsp-mainline = " kernel-module-cdns-pltfrm kernel-module-ti-j721e-ufs"
TI_INITRAMFS_KERNEL_MODULES:append:bsp-next = " kernel-module-cdns-pltfrm kernel-module-ti-j721e-ufs"
TI_CORE_INITRAMFS_KERNEL_MODULES = "kernel-module-cdns-pltfrm kernel-module-ti-j721e-ufs"
TI_CORE_INITRAMFS_KERNEL_MODULES:bsp-ti-6_6 = ""
TI_CORE_INITRAMFS_KERNEL_MODULES:bsp-ti-6_12 = ""

View File

@@ -20,10 +20,10 @@ SPL_BINARY = "tispl.bin"
SPL_BINARYNAME = "tispl.bin"
UBOOT_SUFFIX = "img"
UBOOT_SIGN_ENABLE = "1"
FIT_KERNEL_SIGN_ENABLE = "1"
FIT_KERNEL_SIGN_KEYNAME ?= "custMpk"
FIT_KERNEL_SIGN_KEYDIR ?= "${TI_SECURE_DEV_PKG}/keys"
UBOOT_MKIMAGE_DTCOPTS = "-I dts -O dtb"
UBOOT_SIGN_KEYNAME ?= "custMpk"
UBOOT_SIGN_KEYDIR ?= "${TI_SECURE_DEV_PKG}/keys"
FIT_HASH_ALG ?= "sha512"
FIT_SIGN_ALG ?= "rsa4096"
@@ -43,7 +43,7 @@ MACHINE_ESSENTIAL_EXTRA_RRECOMMENDS += "ti-pka-fw"
IMAGE_FSTYPES += "tar.xz wic.xz wic.bmap"
IMAGE_BOOT_FILES ?= "${SPL_BINARYNAME} u-boot.${UBOOT_SUFFIX} tiboot3.bin tiboot3-*-evm.bin"
IMAGE_BOOT_FILES += "${SPL_BINARYNAME} u-boot.${UBOOT_SUFFIX} tiboot3.bin tiboot3-*-evm.bin"
IMAGE_EFI_BOOT_FILES ?= "${IMAGE_BOOT_FILES}"
EFI_PROVIDER ?= "grub-efi"
@@ -51,11 +51,11 @@ MACHINE_FEATURES += "efi"
WKS_FILE ?= "${@bb.utils.contains("MACHINE_FEATURES", "efi", "sdimage-2part-efi.wks.in", "sdimage-2part.wks", d)}"
TI_WKS_BOOTLOADER_APPEND ?= ""
TI_WKS_BOOTLOADER_APPEND ?= "console=${KERNEL_CONSOLE}"
do_image_wic[depends] += "virtual/bootloader:do_deploy"
SERIAL_CONSOLES = "115200;ttyS0 115200;ttyS2"
SERIAL_CONSOLES = "115200;ttyS2 115200;ttyS0"
FALCON_INCLUDE = ""
FALCON_INCLUDE:ti-falcon = "conf/machine/include/ti-falcon.inc"

View File

@@ -15,13 +15,8 @@ require conf/machine/include/arm/armv7a/tune-cortexa8.inc
require conf/machine/include/ti-bsp.inc
PREFERRED_PROVIDER_virtual/kernel = "linux-dummy"
SPL_SUFFIX = "bin"
SPL_BINARY = "tiboot3-${SYSFW_SOC}-${SYSFW_SUFFIX}-${SYSFW_CONFIG}.${SPL_SUFFIX}"
SPL_SYMLINK = "tiboot3.${SPL_SUFFIX}"
UBOOT_SUFFIX = "bin"
UBOOT_BINARY = "u-boot-r5spl.${UBOOT_SUFFIX}"
UBOOT_IMAGE = "u-boot-r5spl-${MAINMACHINE}-${PV}-${PR}.${UBOOT_SUFFIX}"
UBOOT_SYMLINK = "u-boot-r5spl-${MAINMACHINE}.${UBOOT_SUFFIX}"
UBOOT_BINARY = "tiboot3.${UBOOT_SUFFIX}"
PACKAGECONFIG:pn-u-boot-ti-staging = ""
PACKAGECONFIG:pn-u-boot-ti-mainline = ""

View File

@@ -1,50 +0,0 @@
require conf/machine/include/ti-soc.inc
SOC_FAMILY:append = ":omap-a15"
DEFAULTTUNE ?= "armv7athf-neon"
require conf/machine/include/arm/armv7a/tune-cortexa15.inc
require conf/machine/include/ti-bsp.inc
# Graphics providers and variables
require conf/machine/include/mesa-pvr.inc
PREFERRED_PROVIDER_virtual/gpudriver ?= "${BSP_SGX_DRIVER_PROVIDER}"
KERNEL_IMAGETYPE = "zImage"
KERNEL_IMAGETYPES = "zImage uImage"
KERNEL_CLASSES += "kernel-uimage"
UBOOT_ARCH = "arm"
UBOOT_ENTRYPOINT = "0x80008000"
UBOOT_LOADADDRESS = "0x80008000"
# Generate an extlinux.conf file
UBOOT_EXTLINUX = "1"
UBOOT_EXTLINUX_ROOT = "root=PARTUUID=${uuid}"
UBOOT_EXTLINUX_BOOT_FILES = " \
extlinux.conf;extlinux/extlinux.conf \
${KERNEL_IMAGETYPE} \
${DEVICETREE_FILES} \
"
SPL_BINARY = "MLO"
UBOOT_SUFFIX = "img"
EXTRA_IMAGEDEPENDS += "virtual/bootloader"
MACHINE_ESSENTIAL_EXTRA_RDEPENDS += "kernel-image-zimage"
MACHINE_ESSENTIAL_EXTRA_RRECOMMENDS += "vpdma-fw goodix-fw"
# Use the expected value of the ubifs filesystem's volume name in the kernel
# and u-boot.
UBI_VOLNAME = "rootfs"
# List common SoC features, may need to add touchscreen for specific machines
MACHINE_FEATURES = "apm usbgadget usbhost vfat ext2 screen alsa mmip dsp gc320"
IMAGE_FSTYPES += "tar.xz wic.xz wic.bmap"
WKS_FILE ?= "sdimage-2part.wks"
IMAGE_BOOT_FILES ?= "${SPL_BINARY} u-boot.${UBOOT_SUFFIX} ${UBOOT_EXTLINUX_BOOT_FILES} ipc/dra7-ipu1-fw.xem4;dra7-ipu1-fw.xem4"
do_image_wic[depends] += "virtual/bootloader:do_deploy"
do_image_wic[depends] += "ti-rtos-messageq-test-fw:do_deploy"

View File

@@ -3,8 +3,8 @@
# preferences for kernel, bootloader and graphics components, as
# well as a dedicated machine override.
# Supported options are: mainline, next, ti-6_12, ti-6_6
TI_PREFERRED_BSP ??= "ti-6_12"
# Supported options are: mainline, next, ti-6_18, ti-6_12, ti-6_6
TI_PREFERRED_BSP ??= "ti-6_18"
# Use bsp-* namespace for overrides
MACHINEOVERRIDES =. "bsp-${TI_PREFERRED_BSP}:"
@@ -33,6 +33,19 @@ BSP_BOOTLOADER_VERSION:bsp-next = "%"
# GC320 support requires out-of-tree drivers not yet available in next
MACHINE_FEATURES:remove:bsp-next = "gc320"
# ==========
# ti-6_18
# TI staging kernel 6.18, u-boot 2026.01
# ==========
BSP_KERNEL_PROVIDER:bsp-ti-6_18 = "linux-ti-staging"
BSP_KERNEL_VERSION:bsp-ti-6_18 = "6.18%"
BSP_BOOTLOADER_PROVIDER:bsp-ti-6_18 = "u-boot-ti-staging"
BSP_BOOTLOADER_VERSION:bsp-ti-6_18 = "2026.01%"
BSP_ROGUE_DRIVER_PROVIDER:bsp-ti-6_18 = "ti-img-rogue-driver"
BSP_ROGUE_DRIVER_VERSION:bsp-ti-6_18 = "25%"
BSP_MESA_PVR_VERSION:bsp-ti-6_18 = "24%"
# ==========
# ti-6_12
# TI staging kernel 6.12, u-boot 2025.01
@@ -45,7 +58,7 @@ BSP_BOOTLOADER_VERSION:bsp-ti-6_12 = "2025.01%"
BSP_SGX_DRIVER_PROVIDER:bsp-ti-6_12 = "ti-sgx-ddk-km"
BSP_SGX_DRIVER_VERSION:bsp-ti-6_12 = "1.17%"
BSP_ROGUE_DRIVER_PROVIDER:bsp-ti-6_12 = "ti-img-rogue-driver"
BSP_ROGUE_DRIVER_VERSION:bsp-ti-6_12 = "24%"
BSP_ROGUE_DRIVER_VERSION:bsp-ti-6_12 = "25%"
BSP_MESA_PVR_VERSION:bsp-ti-6_12 = "24%"
# ==========
@@ -60,7 +73,7 @@ BSP_BOOTLOADER_VERSION:bsp-ti-6_6 = "2024.04%"
BSP_SGX_DRIVER_PROVIDER:bsp-ti-6_6 = "ti-sgx-ddk-km"
BSP_SGX_DRIVER_VERSION:bsp-ti-6_6 = "1.17%"
BSP_ROGUE_DRIVER_PROVIDER:bsp-ti-6_6 = "ti-img-rogue-driver"
BSP_ROGUE_DRIVER_VERSION:bsp-ti-6_6 = "24%"
BSP_ROGUE_DRIVER_VERSION:bsp-ti-6_6 = "25%"
BSP_MESA_PVR_VERSION:bsp-ti-6_6 = "24%"
# GC320 support requires out-of-tree drivers not yet available in 6.6

View File

@@ -0,0 +1,23 @@
#------------------------------------------------------------------------------
#
# To turn off the ti-core-initramfs.cpio creation just set:
#
# TI_CORE_INITRAMFS_ENABLED = "0"
#
#------------------------------------------------------------------------------
TI_CORE_INITRAMFS_ENABLED ?= "${@ '1' if d.getVar('TI_CORE_INITRAMFS_KERNEL_MODULES') or d.getVar('TI_CORE_INITRAMFS_EXTRA_INSTALL') or bb.utils.contains('DISTRO_FEATURES', 'luks', True, False, d) else '0'}"
TI_CORE_INITRAMFS_KERNEL_MODULES ?= ""
TI_CORE_INITRAMFS_EXTRA_INSTALL ?= ""
TI_CORE_INITRAMFS_IMAGE = "ti-core-initramfs"
TI_CORE_INITRAMFS_IMAGE_FILE = "${TI_CORE_INITRAMFS_IMAGE}.cpio.xz"
#------------------------------------------------------------------------------
# Apply all of the needed changes to create/use the initramfs (if enabled).
#------------------------------------------------------------------------------
do_image_wic[depends] += "${@ '${TI_CORE_INITRAMFS_IMAGE}:do_image_complete' if d.getVar('TI_CORE_INITRAMFS_ENABLED') == "1" else ''}"
TI_WKS_INITRAMFS ?= "${@ ',initrd=${TI_CORE_INITRAMFS_IMAGE_FILE}' if d.getVar('TI_CORE_INITRAMFS_ENABLED') == "1" else ''}"
IMAGE_BOOT_FILES += "${@ '${TI_CORE_INITRAMFS_IMAGE_FILE}' if d.getVar('TI_CORE_INITRAMFS_ENABLED') == "1" else ''}"

View File

@@ -3,6 +3,7 @@
SOC_FAMILY = "ti-soc"
require conf/machine/include/soc-family.inc
require conf/machine/include/ti-extras.inc
require conf/machine/include/ti-core-initramfs.inc
# kernel, initrd load addresses for the fitImage in all TI platforms
UBOOT_ENTRYPOINT = "0x82000000"
@@ -28,21 +29,3 @@ CLASS_DEVICETREE_PREFIX = "${@ 'ti-devicetree-prefix' if d.getVar('KERNEL_DEVICE
KERNEL_CLASSES += "${CLASS_DEVICETREE_PREFIX}"
IMAGE_CLASSES += "${CLASS_DEVICETREE_PREFIX}"
TI_INITRAMFS_KERNEL_MODULES ?= ""
BUILD_CORE_INITRAMFS_IMAGE = "ti-core-initramfs"
BUILD_CORE_INITRAMFS_IMAGE_FILE = "${BUILD_CORE_INITRAMFS_IMAGE}.cpio.xz"
BUILD_CORE_INITRAMFS_IMAGE_STEP ?= ""
BUILD_CORE_INITRAMFS_IMAGE_STEP:bsp-mainline = "${BUILD_CORE_INITRAMFS_IMAGE}:do_image_complete"
BUILD_CORE_INITRAMFS_IMAGE_STEP:bsp-next = "${BUILD_CORE_INITRAMFS_IMAGE}:do_image_complete"
do_image_wic[depends] += "${BUILD_CORE_INITRAMFS_IMAGE_STEP}"
TI_WKS_INITRAMFS ?= ""
TI_WKS_INITRAMFS:bsp-mainline = ",initrd=${BUILD_CORE_INITRAMFS_IMAGE_FILE}"
TI_WKS_INITRAMFS:bsp-next = ",initrd=${BUILD_CORE_INITRAMFS_IMAGE_FILE}"
IMAGE_BOOT_FILES:append:bsp-mainline = " ${BUILD_CORE_INITRAMFS_IMAGE_FILE}"
IMAGE_BOOT_FILES:append:bsp-next = " ${BUILD_CORE_INITRAMFS_IMAGE_FILE}"

View File

@@ -91,5 +91,5 @@ MACHINE_FEATURES = "apm usbgadget usbhost vfat ext2 alsa"
IMAGE_FSTYPES += "tar.xz wic.xz wic.bmap"
WKS_FILE ?= "sdimage-2part.wks"
IMAGE_BOOT_FILES ?= "${SPL_BINARY} u-boot.${UBOOT_SUFFIX} ${UBOOT_EXTLINUX_BOOT_FILES}"
IMAGE_BOOT_FILES += "${SPL_BINARY} u-boot.${UBOOT_SUFFIX} ${UBOOT_EXTLINUX_BOOT_FILES}"
do_image_wic[depends] += "virtual/bootloader:do_deploy"

View File

@@ -63,5 +63,5 @@ MACHINE_FEATURES = "apm usbgadget usbhost vfat ext2 screen alsa"
IMAGE_FSTYPES += "tar.xz wic.xz wic.bmap"
WKS_FILE ?= "sdimage-2part.wks"
IMAGE_BOOT_FILES ?= "${SPL_BINARY} u-boot.${UBOOT_SUFFIX} ${UBOOT_EXTLINUX_BOOT_FILES}"
IMAGE_BOOT_FILES += "${SPL_BINARY} u-boot.${UBOOT_SUFFIX} ${UBOOT_EXTLINUX_BOOT_FILES}"
do_image_wic[depends] += "virtual/bootloader:do_deploy"

View File

@@ -4,8 +4,4 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "j7200"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "gp"
UBOOT_MACHINE = "j7200_evm_r5_defconfig"

View File

@@ -1,11 +0,0 @@
#@TYPE: Machine
#@NAME: J7200 HS EVM (R5F)
#@DESCRIPTION: Machine configuration for the TI J7200 HS EVM (R5F core)
require conf/machine/include/k3r5.inc
SYSFW_SOC = "j7200_sr2"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs"
UBOOT_MACHINE = "j7200_evm_r5_defconfig"

View File

@@ -1,7 +0,0 @@
#@TYPE: Machine
#@NAME: J7200 HS EVM
#@DESCRIPTION: Machine configuration for the TI J7200 HS EVM
require conf/machine/j7200-evm.conf
UBOOT_MACHINE = "j7200_evm_a72_defconfig"

View File

@@ -4,8 +4,4 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "j721e"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "gp"
UBOOT_MACHINE = "j721e_evm_r5_defconfig"

View File

@@ -1,11 +0,0 @@
#@TYPE: Machine
#@NAME: J721e HS EVM (R5F)
#@DESCRIPTION: Machine configuration for the TI J721e HS EVM (R5F core)
require conf/machine/include/k3r5.inc
SYSFW_SOC = "j721e_sr1_1"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs"
UBOOT_MACHINE = "j721e_evm_r5_defconfig"

View File

@@ -1,7 +0,0 @@
#@TYPE: Machine
#@NAME: J721e HS EVM
#@DESCRIPTION: Machine configuration for the TI J721e HS EVM
require conf/machine/j721e-evm.conf
UBOOT_MACHINE = "j721e_evm_a72_defconfig"

View File

@@ -4,8 +4,4 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "j721e"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "gp"
UBOOT_MACHINE = "j721e_sk_r5_defconfig"

View File

@@ -4,8 +4,4 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "j721s2"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "gp"
UBOOT_MACHINE = "j721s2_evm_r5_defconfig"

View File

@@ -1,11 +0,0 @@
#@TYPE: Machine
#@NAME: J721S2 HS EVM (R5F)
#@DESCRIPTION: Machine configuration for the TI J721S2 HS EVM (R5F core)
require conf/machine/include/k3r5.inc
SYSFW_SOC = "j721s2"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs"
UBOOT_MACHINE = "j721s2_evm_r5_defconfig"

View File

@@ -1,5 +0,0 @@
#@TYPE: Machine
#@NAME: J721S2 HS EVM
#@DESCRIPTION: Machine configuration for the TI J721S2 HS EVM
require conf/machine/j721s2-evm.conf

View File

@@ -4,8 +4,12 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "j722s"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs-fs"
UBOOT_MACHINE = "j722s_evm_r5_defconfig"
UBOOT_MACHINE:tie-test-builds = ""
UBOOT_CONFIG = "main"
UBOOT_CONFIG:prepend:tie-test-builds = "usbdfu "
UBOOT_CONFIG[main] = "j722s_evm_r5_defconfig"
UBOOT_CONFIG[usbdfu] = "j722s_evm_r5_defconfig"
UBOOT_CONFIG_FRAGMENTS[usbdfu] = "am62x_r5_usbdfu.config"

View File

@@ -7,7 +7,7 @@ require conf/machine/include/j722s.inc
KERNEL_DEVICETREE_PREFIX = " \
ti/k3-j722s \
ti/k3-fpdlink \
ti/k3-am625-sk-mcspi-loopback \
ti/k3-am62x-sk-mcspi-loopback \
ti/k3-v3link \
"

View File

@@ -4,8 +4,4 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "j742s2"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs-fs"
UBOOT_MACHINE = "j742s2_evm_r5_defconfig"

View File

@@ -4,8 +4,4 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "j784s4"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "gp"
UBOOT_MACHINE = "j784s4_evm_r5_defconfig"

View File

@@ -27,3 +27,5 @@ KERNEL_DEVICETREE = " \
"
UBOOT_MACHINE = "j784s4_evm_a72_defconfig"
MACHINE_ESSENTIAL_EXTRA_RRECOMMENDS += "ti-eth-fw-j784s4"

View File

@@ -1,11 +0,0 @@
#@TYPE: Machine
#@NAME: J784S4 HS EVM (R5F)
#@DESCRIPTION: Machine configuration for the TI J784S4 HS EVM (R5F core)
require conf/machine/include/k3r5.inc
SYSFW_SOC = "j784s4"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs"
UBOOT_MACHINE = "j784s4_evm_r5_defconfig"

View File

@@ -1,5 +0,0 @@
#@TYPE: Machine
#@NAME: J784S4 HS EVM
#@DESCRIPTION: Machine configuration for the TI J784S4 HS EVM
require conf/machine/j784s4-evm.conf

View File

@@ -6,7 +6,6 @@ require conf/machine/include/omapl138.inc
UBOOT_MACHINE = "omapl138_lcdk_config"
UBOOT_SUFFIX = "ais"
SPL_BINARY = ""
UBOOT_ENTRYPOINT = "0xc0008000"
UBOOT_LOADADDRESS = "0xc0008000"

View File

@@ -0,0 +1,3 @@
RDEPENDS:${PN} += "\
cifs-utils \
"

View File

@@ -0,0 +1,341 @@
#!/bin/sh
# initramfs-framework module for LUKS encryption with fTPM support
# Configuration
BOOT_DEV="/dev/mmcblk1p1" # Boot partition (FAT, unencrypted)
ROOT_DEV="/dev/mmcblk1p2" # Root partition (will be encrypted)
CRYPT_NAME="root_crypt"
CRYPT_DEV="/dev/mapper/${CRYPT_NAME}"
BOOT_MNT="/boot_part"
TPM_PRIMARY_CTX="/tmp/tpm_primary.ctx"
TPM_KEY_PRIV="/tmp/tpm_key.priv"
TPM_KEY_PUB="/tmp/tpm_key.pub"
TPM_KEY_CTX="/tmp/tpm_key.ctx"
TPM2_HANDLE="0x81080001" # TPM persistent handle for LUKS key
ENCRYPTION_MARKER="${BOOT_MNT}/.encryption_in_progress"
# Wait for MMC device to appear
wait_for_device() {
local device="$1"
local timeout="${2:-10}"
msg "Waiting for storage device ${device}..."
for i in $(seq 1 ${timeout}); do
if [ -b "${device}" ]; then
return 0
fi
sleep 1
done
return 1
}
# Initialize fTPM and check availability
init_ftpm() {
msg "Initializing secure hardware (fTPM)..."
# Start TEE supplicant (required for fTPM TA to work)
if [ -x /usr/sbin/tee-supplicant ]; then
/usr/sbin/tee-supplicant -d &
TEE_SUPPLICANT_PID=$!
sleep 5
else
info "Warning: Trusted execution environment not available"
return 1
fi
# Load fTPM kernel module
if ! /sbin/modprobe tpm_ftpm_tee; then
info "Warning: TPM module failed to load"
return 1
fi
# Wait for TPM device
for i in $(seq 1 10); do
if [ -c /dev/tpmrm0 ]; then
export TPM2TOOLS_TCTI="device:/dev/tpmrm0"
return 0
fi
sleep 1
done
info "Warning: fTPM not available - encryption will be skipped"
return 1
}
# Generate 32-byte random key using TPM RNG
generate_random_key() {
/usr/bin/tpm2_getrandom --hex 32
}
# Seal data with TPM and store in persistent handle
tpm_seal_key() {
local KEY_DATA="$1"
# Create primary key in owner hierarchy
/usr/bin/tpm2_createprimary -C o -c "${TPM_PRIMARY_CTX}" -Q || return 1
# Create sealed object
echo -n "${KEY_DATA}" | \
/usr/bin/tpm2_create -C "${TPM_PRIMARY_CTX}" \
-u "${TPM_KEY_PUB}" -r "${TPM_KEY_PRIV}" \
-i- -Q || return 1
# Load sealed object into TPM
/usr/bin/tpm2_load -C "${TPM_PRIMARY_CTX}" \
-u "${TPM_KEY_PUB}" -r "${TPM_KEY_PRIV}" \
-c "${TPM_KEY_CTX}" -Q || return 1
# Make key persistent at handle (stored in TPM NV RAM - RPMB)
/usr/bin/tpm2_evictcontrol -C o -c "${TPM_KEY_CTX}" "${TPM2_HANDLE}" || return 1
return 0
}
# Unseal data from TPM persistent handle
tpm_unseal_key() {
# Check if persistent handle exists
if ! /usr/bin/tpm2_getcap handles-persistent | grep -q "${TPM2_HANDLE}"; then
debug "ERROR: TPM persistent handle not found"
return 1
fi
# Unseal key directly from persistent handle
/usr/bin/tpm2_unseal -c "${TPM2_HANDLE}" || return 1
return 0
}
# Perform in-place LUKS encryption (first boot)
encrypt_root_filesystem() {
msg "=========================================="
msg "First boot: Encrypting root filesystem"
msg "=========================================="
# Set marker to track encryption progress
touch "${ENCRYPTION_MARKER}"
sync
# Generate random encryption key using TPM RNG
msg "Generating encryption key..."
LUKS_KEY=$(generate_random_key)
if [ -z "${LUKS_KEY}" ]; then
msg "ERROR: Failed to generate encryption key"
rm -f "${ENCRYPTION_MARKER}"
return 1
fi
# Seal key with TPM before encryption starts
msg "Securing key with TPM..."
if ! tpm_seal_key "${LUKS_KEY}"; then
msg "ERROR: Failed to secure key"
rm -f "${ENCRYPTION_MARKER}"
return 1
fi
# Filesystem check before encryption
msg "Checking filesystem integrity..."
/usr/sbin/e2fsck -f -y "${ROOT_DEV}"
E2FSCK_RET=$?
if [ ${E2FSCK_RET} -ge 4 ]; then
msg "ERROR: Filesystem check failed"
rm -f "${ENCRYPTION_MARKER}"
return 1
fi
# Shrink filesystem before encryption to leave room for LUKS header
msg "Preparing filesystem for encryption..."
/usr/sbin/resize2fs -M "${ROOT_DEV}" || {
msg "ERROR: Failed to prepare filesystem"
rm -f "${ENCRYPTION_MARKER}"
return 1
}
# Verify partition has sufficient space for LUKS header
msg "Verifying space for encryption..."
MIN_BLOCKS=$(/usr/sbin/resize2fs -P "${ROOT_DEV}" 2>&1 | awk '/[Mm]inimum.*:/ {print $NF}')
# Get filesystem block size and device size
BLOCK_SIZE=$(/usr/sbin/tune2fs -l "${ROOT_DEV}" 2>/dev/null | awk '/^Block size:/ {print $NF}')
DEV_NAME=$(basename "${ROOT_DEV}")
PART_SECTORS=$(cat /sys/class/block/"${DEV_NAME}"/size 2>/dev/null)
if [ -z "${MIN_BLOCKS}" ] || [ -z "${BLOCK_SIZE}" ] || [ -z "${PART_SECTORS}" ]; then
msg "ERROR: Unable to determine partition geometry"
rm -f "${ENCRYPTION_MARKER}"
return 1
fi
# Convert filesystem blocks to 512-byte sectors
MIN_SECTORS=$((MIN_BLOCKS * BLOCK_SIZE / 512))
LUKS_SECTORS=65536 # 32MB in 512-byte sectors
if [ $((PART_SECTORS - MIN_SECTORS)) -lt ${LUKS_SECTORS} ]; then
msg "ERROR: Insufficient space for LUKS header (need 32MB free)"
rm -f "${ENCRYPTION_MARKER}"
return 1
fi
# Perform in-place encryption
msg "=========================================="
msg "Encrypting filesystem..."
msg "This will take several minutes."
msg "DO NOT POWER OFF THE DEVICE!"
msg "=========================================="
echo -n "${LUKS_KEY}" | \
/usr/sbin/cryptsetup reencrypt --encrypt \
--type luks2 \
--cipher aes-xts-plain64 \
--key-size 256 \
--hash sha256 \
--reduce-device-size 32M \
--key-file - \
"${ROOT_DEV}" || {
msg "ERROR: Encryption failed"
rm -f "${ENCRYPTION_MARKER}"
return 1
}
msg "=========================================="
msg "Encryption completed successfully!"
msg "=========================================="
# Remove encryption marker
rm -f "${ENCRYPTION_MARKER}"
sync
# Unlock the newly encrypted device
msg "Activating encrypted filesystem..."
echo -n "${LUKS_KEY}" | \
/usr/sbin/cryptsetup luksOpen "${ROOT_DEV}" "${CRYPT_NAME}" --key-file - || {
msg "ERROR: Failed to activate encrypted filesystem"
return 1
}
# Resize filesystem to fit the encrypted device
msg "Optimizing filesystem..."
/usr/sbin/resize2fs -f "${CRYPT_DEV}" || {
msg "ERROR: Failed to optimize filesystem"
return 1
}
# Verify filesystem after resize
/usr/sbin/e2fsck -f -y "${CRYPT_DEV}" || {
info "WARNING: Filesystem verification had issues, but continuing"
}
return 0
}
# Unlock encrypted root filesystem (subsequent boots)
unlock_encrypted_root() {
msg "Unlocking encrypted filesystem..."
# Unseal key from TPM persistent handle
LUKS_KEY=$(tpm_unseal_key)
if [ -z "${LUKS_KEY}" ]; then
msg "ERROR: Failed to retrieve encryption key from TPM"
msg "Attempting passphrase fallback..."
# Try to unlock with passphrase (interactive)
/usr/sbin/cryptsetup luksOpen "${ROOT_DEV}" "${CRYPT_NAME}" || {
fatal "ERROR: Failed to unlock encrypted filesystem"
}
else
# Unlock with unsealed key
echo -n "${LUKS_KEY}" | \
/usr/sbin/cryptsetup luksOpen "${ROOT_DEV}" "${CRYPT_NAME}" --key-file - || {
fatal "ERROR: Failed to unlock with TPM key"
}
fi
msg "Encrypted filesystem unlocked"
}
# Module enabled check
luksftpm_enabled() {
# Always run this module - it handles both encrypted and unencrypted cases
return 0
}
# Module main function
luksftpm_run() {
# Wait for storage device
if ! wait_for_device "${ROOT_DEV}" 10; then
info "Storage device not found, skipping encryption module"
return 0
fi
# Mount boot partition
msg "Mounting boot partition..."
mkdir -p "${BOOT_MNT}"
if ! mount "${BOOT_DEV}" "${BOOT_MNT}"; then
info "ERROR: Failed to mount boot partition, attempting standard boot..."
mkdir -p ${ROOTFS_DIR}
mount "${ROOT_DEV}" ${ROOTFS_DIR}
return 0
fi
# Initialize fTPM
TPM_AVAILABLE=0
if init_ftpm; then
TPM_AVAILABLE=1
fi
# Check filesystem encryption status
msg "Checking filesystem encryption status..."
MOUNT_DEV="${ROOT_DEV}"
if /usr/sbin/cryptsetup isLuks "${ROOT_DEV}"; then
msg "Filesystem is encrypted"
unlock_encrypted_root
MOUNT_DEV="${CRYPT_DEV}"
else
msg "Filesystem is not encrypted"
# Check if encryption is enabled and TPM is available
if [ $TPM_AVAILABLE -eq 1 ]; then
# Check for encryption marker (resume interrupted encryption)
if [ -f "${ENCRYPTION_MARKER}" ]; then
msg "Resuming interrupted encryption..."
if ! encrypt_root_filesystem; then
msg "ERROR: Failed to resume encryption"
msg "Booting without encryption..."
MOUNT_DEV="${ROOT_DEV}"
else
MOUNT_DEV="${CRYPT_DEV}"
fi
else
# First boot - perform encryption
if encrypt_root_filesystem; then
MOUNT_DEV="${CRYPT_DEV}"
else
msg "ERROR: Encryption failed - booting without encryption"
MOUNT_DEV="${ROOT_DEV}"
fi
fi
else
msg "TPM not available - skipping encryption"
MOUNT_DEV="${ROOT_DEV}"
fi
fi
# Unmount boot partition before switching root
umount "${BOOT_MNT}"
# Mount root filesystem to $ROOTFS_DIR (framework expects this)
msg "Mounting root filesystem..."
mkdir -p ${ROOTFS_DIR}
mount "${MOUNT_DEV}" ${ROOTFS_DIR} || {
fatal "ERROR: Failed to mount root filesystem!"
}
# Clean up tmpfs and sensitive variables
rm -f "${TPM_PRIMARY_CTX}" "${TPM_KEY_PUB}" "${TPM_KEY_PRIV}" "${TPM_KEY_CTX}"
unset LUKS_KEY TPM_AVAILABLE MOUNT_DEV TEE_SUPPLICANT_PID
msg "Boot complete"
}

View File

@@ -0,0 +1,43 @@
SUMMARY = "initramfs support for LUKS encryption with fTPM"
DESCRIPTION = "Provides LUKS2 full disk encryption using firmware TPM (fTPM) for key management on TI K3 platforms"
LICENSE = "MIT"
LIC_FILES_CHKSUM = "file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420"
# Only build for platforms with optee-ftpm support
COMPATIBLE_MACHINE = "null"
COMPATIBLE_MACHINE:k3 = "${@bb.utils.contains('MACHINE_FEATURES', 'optee-ftpm', '.*', 'null', d)}"
FILESEXTRAPATHS:prepend := "${THISDIR}/${PN}:"
SRC_URI = "file://luksftpm"
S = "${UNPACKDIR}"
do_install() {
install -d ${D}/init.d
# Install as 85-luksftpm (runs after udev at 01, before rootfs at 90)
install -m 0755 ${UNPACKDIR}/luksftpm ${D}/init.d/85-luksftpm
}
FILES:${PN} = "/init.d/85-luksftpm"
# Runtime dependencies
RDEPENDS:${PN} = "\
initramfs-framework-base \
busybox \
kmod \
cryptsetup \
tpm2-tools \
tpm2-tss \
libtss2-tcti-device \
optee-client \
optee-ftpm \
e2fsprogs-e2fsck \
e2fsprogs-resize2fs \
e2fsprogs-tune2fs \
util-linux-blkid \
kernel-module-tpm-ftpm-tee \
"
PACKAGE_ARCH = "${MACHINE_ARCH}"

View File

@@ -0,0 +1,3 @@
LUKS_ENCRYPTION ?= "${@bb.utils.contains('MACHINE_FEATURES', 'optee-ftpm', 'initramfs-module-luks-ftpm', '', d)}"
RDEPENDS:${PN}:append = " ${@bb.utils.contains('DISTRO_FEATURES', 'luks', '${LUKS_ENCRYPTION}', '', d)}"

View File

@@ -0,0 +1 @@
INITRAMFS_MAXSIZE = "200000"

View File

@@ -8,9 +8,9 @@ inherit module features_check
REQUIRED_MACHINE_FEATURES = "gc320"
# Need to branch out with ${PV} var
BRANCH = "ti-${PV}-k6.12"
BRANCH = "ti-${PV}-k6.18"
SRCREV = "83afddf9dbf6a8458267b4dae21ee35bfb11f3d1"
SRCREV = "a7e9a51e89c97fbea974c7d674aa0a95d7c96403"
SRC_URI = "git://git.ti.com/git/graphics/ti-gc320-driver.git;protocol=https;branch=${BRANCH}"

View File

@@ -8,7 +8,7 @@ LIC_FILES_CHKSUM = "file://LICENCE.Spectrum-GT9271;md5=2a6de6be7af1fe46370c684da
PV = "${GOODIX_FW_VERSION}"
PR = "${INC_PR}.0"
COMPATIBLE_MACHINE = "dra7xx"
COMPATIBLE_MACHINE = "am57xx"
ORIGIN = "DRA71x-RevA-GT9271_SpecDig_Config.bin"
TARGET = "goodix_9271_cfg.bin"

View File

@@ -13,11 +13,12 @@ COMPATIBLE_MACHINE = "j721e|j721s2|j784s4|j742s2|am62xx|am62pxx|j722s"
DEPENDS = "virtual/kernel"
BRANCH = "linuxws/scarthgap/k6.12/${PV}"
BRANCH = "linuxws/scarthgap/k6.18/${PV}"
SRC_URI = "git://git.ti.com/git/graphics/ti-img-rogue-driver.git;protocol=https;branch=${BRANCH}"
SRCREV = "8eaff654a8871118c08cfafe53795f57e3b6b396"
SRCREV = "d241b0d5df404c60b80233bb5116b596039062e6"
TARGET_PRODUCT:j721e = "j721e_linux"
TARGET_PRODUCT:j721s2 = "j721s2_linux"
@@ -29,7 +30,12 @@ TARGET_PRODUCT:j722s = "j722s_linux"
PVR_BUILD = "release"
PVR_WS = "lws-generic"
EXTRA_OEMAKE += 'KERNELDIR="${STAGING_KERNEL_DIR}" BUILD=${PVR_BUILD} PVR_BUILD_DIR=${TARGET_PRODUCT} WINDOW_SYSTEM=${PVR_WS}'
EXTRA_OEMAKE += 'KERNELDIR="${KBUILD_OUTPUT}" BUILD=${PVR_BUILD} PVR_BUILD_DIR=${TARGET_PRODUCT} WINDOW_SYSTEM=${PVR_WS}'
do_compile(){
unset CC
oe_runmake
}
do_install() {
make -C ${STAGING_KERNEL_DIR} M=${B}/binary_${TARGET_PRODUCT}_${PVR_WS}_${PVR_BUILD}/target_aarch64/kbuild INSTALL_MOD_PATH=${D}${root_prefix} PREFIX=${STAGING_DIR_HOST} modules_install

View File

@@ -7,7 +7,7 @@ inherit module
PROVIDES = "virtual/gpudriver"
COMPATIBLE_MACHINE = "ti33x|ti43x|omap-a15|am65xx"
COMPATIBLE_MACHINE = "ti33x|ti43x|am57xx|am65xx"
PACKAGE_ARCH = "${MACHINE_ARCH}"
@@ -19,9 +19,9 @@ SRC_URI = "git://git.ti.com/git/graphics/omap5-sgx-ddk-linux.git;protocol=https;
SRCREV = "9ae0fa4998b1c624408945e062bf8fb0ea7efb9d"
TARGET_PRODUCT:omap-a15 = "ti572x_linux"
TARGET_PRODUCT:ti33x = "ti335x_linux"
TARGET_PRODUCT:ti43x = "ti437x_linux"
TARGET_PRODUCT:am57xx = "ti572x_linux"
TARGET_PRODUCT:am65xx = "ti654x_linux"
PVR_BUILD = "release"
PVR_WS = "lws-generic"

View File

@@ -0,0 +1,15 @@
DESCRIPTION = "TI ADC PCM6240 config prebuild binary firmware"
require recipes-bsp/ti-linux-fw/ti-linux-fw.inc
PV = "${PCM6240_FW_VERSION}"
PR = "${INC_PR}.0"
COMPATIBLE_MACHINE = "am62dxx"
PCM6240_2DEV = "pcm6240-2dev-reg.bin"
do_install() {
install -d ${D}${nonarch_base_libdir}/firmware
install -m 0644 ${S}/ti/pcm6240/${PCM6240_2DEV} ${D}${nonarch_base_libdir}/firmware/
}

View File

@@ -1,17 +0,0 @@
DESCRIPTION = "TI DAC TAD5212 config prebuild binary firmware"
require recipes-bsp/ti-linux-fw/ti-linux-fw.inc
PV = "${TAD5212_FW_VERSION}"
PR = "${INC_PR}.0"
COMPATIBLE_MACHINE = "am62dxx"
TAD5212_1DEV = "tad5212_01.bin"
TAD5212_4DEV = "tad5212_04.bin"
do_install() {
install -d ${D}${nonarch_base_libdir}/firmware
install -m 0644 ${S}/ti/tad5212/${TAD5212_1DEV} ${D}${nonarch_base_libdir}/firmware/
install -m 0644 ${S}/ti/tad5212/${TAD5212_4DEV} ${D}${nonarch_base_libdir}/firmware/
}

View File

@@ -29,7 +29,7 @@ PLAT_SFX:am65xx = "am65xx"
PLAT_SFX:am64xx = "am64xx"
PLAT_SFX:am62xx = "am62xx"
PLAT_SFX:am62axx = "am62axx"
PLAT_SFX:am62dxx = "am62axx"
PLAT_SFX:am62dxx = "am62dxx"
PLAT_SFX:am62lxx = "am62lxx"
PLAT_SFX:am62pxx = "am62pxx"
@@ -87,7 +87,7 @@ do_deploy() {
ALTERNATIVE:${PN}:am62xx = "am62-main-r5f0_0-fw"
ALTERNATIVE:${PN}:am62pxx = "am62p-main-r5f0_0-fw"
ALTERNATIVE:${PN}:am62axx = "am62a-main-r5f0_0-fw"
ALTERNATIVE:${PN}:am62dxx = "am62a-main-r5f0_0-fw"
ALTERNATIVE:${PN}:am62dxx = "am62d-main-r5f0_0-fw"
ALTERNATIVE:${PN}:j721e = "j7-mcu-r5f0_0-fw"
ALTERNATIVE:${PN}:j7200 = "j7200-mcu-r5f0_0-fw"
ALTERNATIVE:${PN}:j721s2 = "j721s2-mcu-r5f0_0-fw"
@@ -99,6 +99,7 @@ ALTERNATIVE:${PN}:j742s2 = "j742s2-mcu-r5f0_0-fw"
ALTERNATIVE_LINK_NAME[am62-main-r5f0_0-fw] = "${nonarch_base_libdir}/firmware/am62-main-r5f0_0-fw"
ALTERNATIVE_LINK_NAME[am62p-main-r5f0_0-fw] = "${nonarch_base_libdir}/firmware/am62p-main-r5f0_0-fw"
ALTERNATIVE_LINK_NAME[am62a-main-r5f0_0-fw] = "${nonarch_base_libdir}/firmware/am62a-main-r5f0_0-fw"
ALTERNATIVE_LINK_NAME[am62d-main-r5f0_0-fw] = "${nonarch_base_libdir}/firmware/am62d-main-r5f0_0-fw"
ALTERNATIVE_LINK_NAME[j7-mcu-r5f0_0-fw] = "${nonarch_base_libdir}/firmware/j7-mcu-r5f0_0-fw"
ALTERNATIVE_LINK_NAME[j7200-mcu-r5f0_0-fw] = "${nonarch_base_libdir}/firmware/j7200-mcu-r5f0_0-fw"
ALTERNATIVE_LINK_NAME[j721s2-mcu-r5f0_0-fw] = "${nonarch_base_libdir}/firmware/j721s2-mcu-r5f0_0-fw"
@@ -110,6 +111,7 @@ ALTERNATIVE_LINK_NAME[j742s2-mcu-r5f0_0-fw] = "${nonarch_base_libdir}/firmware/j
ALTERNATIVE_TARGET[am62-main-r5f0_0-fw] = "${INSTALL_DM_FW_DIR}/${DM_FIRMWARE}"
ALTERNATIVE_TARGET[am62p-main-r5f0_0-fw] = "${INSTALL_DM_FW_DIR}/${DM_FIRMWARE}"
ALTERNATIVE_TARGET[am62a-main-r5f0_0-fw] = "${INSTALL_DM_FW_DIR}/${DM_FIRMWARE}"
ALTERNATIVE_TARGET[am62d-main-r5f0_0-fw] = "${INSTALL_DM_FW_DIR}/${DM_FIRMWARE}"
ALTERNATIVE_TARGET[j7-mcu-r5f0_0-fw] = "${INSTALL_DM_FW_DIR}/${DM_FIRMWARE}"
ALTERNATIVE_TARGET[j7200-mcu-r5f0_0-fw] = "${INSTALL_DM_FW_DIR}/${DM_FIRMWARE}"
ALTERNATIVE_TARGET[j721s2-mcu-r5f0_0-fw] = "${INSTALL_DM_FW_DIR}/${DM_FIRMWARE}"

View File

@@ -14,7 +14,7 @@ BRANCH = "scarthgap/k${PV}"
SRC_URI = "git://git.ti.com/git/multimedia/img-vxe-vxd.git;protocol=https;branch=${BRANCH}"
SRCREV = "0bcbb20af32ea13275b452f0e84f5a49966d0bf6"
SRCREV = "9453ad8ebdd42a5e5a384c21cd5f6bc2c86aa6d8"
TARGET_PRODUCT:j721e = "j721e_linux"

View File

@@ -9,19 +9,19 @@ INC_PR = "r4"
# Firmware versions
CORESDK_RTOS_VERSION = "08.02.00.04"
PRUETH_FW_AM65X_VERSION = "08.00.00.20"
PRUETH_FW_AM65X_SR2_VERSION = "02.02.15.04"
PRUETH_FW_AM65X_SR2_VERSION = "02.02.16.00"
GOODIX_FW_VERSION = "1.0.0.0"
CADENCE_MHDP_FW_VERSION = "2.1.0"
IMG_DEC_FW_VERSION = "1.0"
CNM_WAVE521_FW_VERSION = "1.0.8"
TI_DM_FW_VERSION = "11.01.09"
TI_SYSFW_VERSION = "11.02.00"
TI_DM_FW_VERSION = "11.02.07"
TI_SYSFW_VERSION = "12.00.02"
TI_HSM_DEMO_FW_VERSION = "11.00.09"
TAD5212_FW_VERSION = "1.0.0.0"
TI_PKA_FW_VERSION = "2.1.0"
TI_IPC_EXAMPLES_FW_VERSION = "3.52.00.01"
PCM6240_FW_VERSION = "1.0.0.0"
TI_LINUX_FW_SRCREV ?= "237071793594723bf1c2e9eef8ff836ffa3b09df"
TI_LINUX_FW_SRCREV ?= "9e9d50ff563f83db86d36b72cd7fb4f487d6b414"
SRCREV = "${TI_LINUX_FW_SRCREV}"
BRANCH ?= "ti-linux-firmware"

View File

@@ -1,16 +1,18 @@
# NOTE: This .inc file with customizations only gets included for K3 platforms
PV = "2.13+git"
FILESEXTRAPATHS:prepend := "${THISDIR}/trusted-firmware-a:"
PV = "2.14+git"
LIC_FILES_CHKSUM = "file://docs/license.rst;md5=6ed7bace7b0bc63021c6eba7b524039e"
SRCREV_tfa = "e0c4d3903b382bf34f552af53e6d955fae5283ab"
SRCREV_tfa = "76500ceaeefcda967d8a1f4e30bb04f9fe0425a2"
SRC_URI_TRUSTED_FIRMWARE_A = "git://git.trustedfirmware.org/TF-A/trusted-firmware-a.git;protocol=https"
SRCBRANCH = "master"
LIC_FILES_CHKSUM:am62lxx = "file://docs/license.rst;md5=1118e32884721c0be33267bd7ae11130"
SRCREV_tfa:am62lxx = "8a4829a62a4c6b04de5055f78b9481da40c76ce3"
LIC_FILES_CHKSUM:am62lxx = "file://docs/license.rst;md5=6ed7bace7b0bc63021c6eba7b524039e"
SRCREV_tfa:am62lxx = "17d2997c0e7d4549720a5d176916f5ea0f63b009"
SRC_URI_TRUSTED_FIRMWARE_A:am62lxx = "git://github.com/TexasInstruments/arm-trusted-firmware.git;protocol=https"
SRCBRANCH:am62lxx = "ti-master"
SRCBRANCH:am62lxx = "ti-tfa-2.14.y"
SRC_URI = "${SRC_URI_TRUSTED_FIRMWARE_A};name=tfa;branch=${SRCBRANCH}"

View File

@@ -1,4 +1,4 @@
TFA_TI = ""
TFA_TI:k3 = "trusted-firmware-a-ti.inc"
TRUSTED_FIRMWARE_A_TI = ""
TRUSTED_FIRMWARE_A_TI:ti-soc = "trusted-firmware-a-ti.inc"
require ${TFA_TI}
require ${TRUSTED_FIRMWARE_A_TI}

View File

@@ -0,0 +1,6 @@
-----BEGIN EC PRIVATE KEY-----
MIGkAgEBBDBDO9fzBU2LoKaYgji4m3ZCHKUBF9CTVnU6ClfNPJsTo0SKZpCsmyr0
TKUNkk16vwGgBwYFK4EEACKhZANiAATCv6ftwnJW91fP5wpLpLAxt3u732oNnKr8
pLbZUzi/s8/e7QiISJ8QKYGaWMnjORW82cM3UJKlCw8GOrb3ZrEXYWRKxkPWql0+
BOhDQA5b21GtL9HQPvuCPz471ZaxGYA=
-----END EC PRIVATE KEY-----

View File

@@ -4,7 +4,9 @@
COMPATIBLE_MACHINE:tie-jailhouse = "am62xx|am62pxx|am62lxx"
BRANCH:tie-jailhouse:bsp-ti-6_12 = "ti-u-boot-2025.01-jailhouse"
BRANCH:tie-jailhouse:bsp-ti-6_18 = "ti-u-boot-2026.01-jailhouse"
SRCREV_uboot:tie-jailhouse:bsp-ti-6_12 = "e718bbcec3ebf663c021839753034a224be4cc53"
SRCREV_uboot:tie-jailhouse:bsp-ti-6_18 = "53a287d24610f0747ae4e35cff2afa3af23a48e3"
UBOOT_GIT_URI:tie-jailhouse = "git://git.ti.com/git/processor-sdk/u-boot.git"

View File

@@ -1,7 +0,0 @@
do_configure:append () {
if [ -n "${UBOOT_CONFIG_FRAGMENTS}" ] && [ -n "${UBOOT_MACHINE}" ]
then
oe_runmake -C ${S} O=${B} ${UBOOT_MACHINE} ${UBOOT_CONFIG_FRAGMENTS}
oe_runmake -C ${S} O=${B} olddefconfig
fi
}

View File

@@ -2,8 +2,8 @@ require u-boot-ti.inc
SUMMARY = "Mainline U-Boot for TI devices"
PV = "2025.10"
PV = "2026.04"
UBOOT_GIT_URI = "git://source.denx.de/u-boot/u-boot.git"
SRCREV_uboot = "e50b1e8715011def8aff1588081a2649a2c6cd47"
SRCREV_uboot = "88dc2788777babfd6322fa655df549a019aa1e69"

View File

@@ -1,7 +1,5 @@
require u-boot-ti.inc
include ${@ 'recipes-bsp/u-boot/ti-extras.inc' if d.getVar('TI_EXTRAS') else ''}
PR = "r0"
BRANCH = "ti-u-boot-2024.04"

Some files were not shown because too many files have changed in this diff Show More