1
0
mirror of https://git.yoctoproject.org/meta-ti synced 2026-02-09 07:10:19 +00:00

Compare commits

...

23 Commits

Author SHA1 Message Date
LCPD Automation Script
c79f7b833e CI/CD Auto-Merger: cicd.master-ltsprep.202602051800
Updated the value(s) for:
  atf: SRCREV_tfa:am62lxx
  u-boot-ti-staging_2026.01: SRCREV_uboot
  linux-ti-staging_6.18: PV,SRCREV

Changelogs:
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=0456d31970eeef8678fd20a6683d1acd9fc8da4a..7db1482473e9a9562061c6f89e6d3cd86a17e616
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=33b7bd36f11719837307a92818393608faafbc10..e36172c9eb8513198f33eee06b8cff28c6556e11

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-02-05 18:00:50 -06:00
LCPD Automation Script
721c33800f CI/CD Auto-Merger: cicd.master.202602031100
Updated the value(s) for:
  atf: SRCREV_tfa:am62lxx

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-02-03 11:00:57 -06:00
Ryan Eatmon
634a30e2c1 conf: am62p: Add ECDSA key signing
Use the new framework to add alternative key signing for the am62p
platform as an example.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-02 13:50:02 -06:00
Ryan Eatmon
507125eedd u-boot: Add alternative key signing
Provide framework for how to sign the uboot files with different keys
so that customers can see how it is done.  We have provided an ECDSA
key and follow on patches will show how to point to it.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-02-02 13:50:02 -06:00
LCPD Automation Script
22e889c205 CI/CD Auto-Merger: cicd.master-ltsprep.202602021018
Updated the value(s) for:
  u-boot-ti-staging_2025.01: SRCREV_uboot
  u-boot-ti-staging_2026.01: SRCREV_uboot
  linux-ti-staging-rt_6.12: SRCREV_ARM32
  linux-ti-staging_6.12: SRCREV
  linux-ti-staging_6.18: PV,SRCREV

Changelogs:
  u-boot-ti-staging_2025.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=42cf2abb5f42b4e8dca8b9df584b816d8a0da7fa..ef2eb76b650415637bd93b0eddfb1e31489117f9
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=127a42c7257a6ffbbd1575ed1cbaa8f5408a44b3..0456d31970eeef8678fd20a6683d1acd9fc8da4a
  linux-ti-staging-rt_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=2bae13c52d344e96fce42ab8209c068d1e67c944..a3bc6dc973a99822f0707b1c9ba06b56bf142076
  linux-ti-staging_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=8843c53f444321e22f1eaeec0478ffc0a6191203..da3c0f0a33ac00f7138c695a16d90301cf7ec02b
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=2d64b9f10d1d9e7cbd041d613b40222c11291f14..33b7bd36f11719837307a92818393608faafbc10

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-02-02 10:19:37 -06:00
LCPD Automation Script
8529512dd0 CI/CD Auto-Merger: cicd.master.202601292132
Updated the value(s) for:
  u-boot-ti-staging_2026.01: SRCREV_uboot

Changelogs:
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=c5e6d2ab7eba68cbfb600cdc131c0c375ced2ec9..127a42c7257a6ffbbd1575ed1cbaa8f5408a44b3

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-01-29 21:33:57 -06:00
Ryan Eatmon
6da7194248 Revert "CI/CD Auto-Merger: cicd.master-ltsprep.202601290100"
This reverts commit bb2c3dcb6c.

There is something wrong withour CICD scripts.  This should not have
been promoted.
2026-01-29 20:12:00 -06:00
LCPD Automation Script
bb2c3dcb6c CI/CD Auto-Merger: cicd.master-ltsprep.202601290100
Updated the value(s) for:
  u-boot-ti-staging_2026.01: SRCREV_uboot
  linux-ti-staging_6.18: PV,SRCREV

Changelogs:
  u-boot-ti-staging_2026.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=c5e6d2ab7eba68cbfb600cdc131c0c375ced2ec9..677076fc270788c97e15cd5fc47b32d8a6bda672
  linux-ti-staging_6.18: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=2d64b9f10d1d9e7cbd041d613b40222c11291f14..25e529b290fc89f777503b34100b2c8f5532b66b

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-01-29 09:03:40 -06:00
Ryan Eatmon
0614454216 optee-ftpm: Adapt to meta-arm change
meta-arm updated optee to 4.9.0 and added logic manage the
tag=xx;nobranch=1 vs branch=master in the SRC_URI for all of the optee
recipes except for optee-ftpm.  Set the new variable to the same logic
as the other optee recipes to fix an unpack error.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-29 09:03:23 -06:00
Ryan Eatmon
a546e95d0d linux-ti-staging: Update 6.18 SRCREV
It looks like the ti-linux-6.18.y was force pushed.  As we are still in
the process of getting the LTA up and running, we need to update the
SHA.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-27 16:05:12 -06:00
Ryan Eatmon
69deabbd85 conf: am65: Add usbdfu tie-test-builds config
Using the new UBOOT_CONFIG flow, enable a mode where additional uboot
configurations can be built along side the main config.  In this case,
turning on USBDFU for a board for testing purposes.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-23 10:15:24 -06:00
Ryan Eatmon
bd7a32b603 conf: am62: Add usbdfu tie-test-builds configs
Using the new UBOOT_CONFIG flow, enable a mode where additional uboot
configurations can be built along side the main config.  In this case,
turning on USBDFU for a board for testing purposes.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-23 10:15:24 -06:00
Ryan Eatmon
380d3e91b0 u-boot: Move ti-extras.inc into u-boot-ti.inc
Since the extras stuff should "theoretically" apply to all u-boot
versions, move the include out of each recipe and into the central
include file.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-23 10:15:24 -06:00
Antonios Christidis
5470b4f4d4 ti-gc320-driver: Port module for kernel 6.18
Port the kernel module for gc320 driver to build on linux kernel 6.18.

The overall version of the driver remains the same.

Signed-off-by: Antonios Christidis <a-christidis@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-23 10:15:24 -06:00
Ryan Eatmon
85c3cc60be u-boot: Adapt to upstream change to UBOOT_CONFIG flow
A recent change to the UBOOT_CONFIG flow in oe-core [1], introduced
support for UBOOT_FRAGMENTS.  We need to stop using our internal
UBOOT_CONFIG_FRAGMENTS and start using the new UBOOT_FRAGMENTS.

[1] https://git.openembedded.org/openembedded-core/commit/?id=cd9e7304481b24b27df61c03ad73496d18e4d47c

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-20 13:13:40 -06:00
LCPD Automation Script
fc26d5dc11 CI/CD Auto-Merger: cicd.master.202601171053
Updated the value(s) for:
  atf: SRCREV_tfa:am62lxx
  u-boot-ti-staging_2025.01: SRCREV_uboot
  linux-ti-staging-rt_6.12: SRCREV_ARM32
  linux-ti-staging_6.12: SRCREV

Changelogs:
  u-boot-ti-staging_2025.01: https://git.ti.com/cgit/ti-u-boot/ti-u-boot/log/?qt=range&q=df1fe238230433ba3e5b731356156e145aa90917..42cf2abb5f42b4e8dca8b9df584b816d8a0da7fa
  linux-ti-staging-rt_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=1379a8eb9786e78509f67ff8eac658bde5ddc66d..2bae13c52d344e96fce42ab8209c068d1e67c944
  linux-ti-staging_6.12: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/log/?qt=range&q=15b58b1dcd0e0a79d83740b81da1a1367f6f3f68..8843c53f444321e22f1eaeec0478ffc0a6191203

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2026-01-17 10:53:56 -06:00
Ryan Eatmon
48901ff242 j721e: Disable ti-vxe-vde-driver for 6.18
The ti-vxe-vxd-driver recipe is not building with the 6.18 kernel.
Once a new version that addresses this is available we can turn this
back on.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-17 10:48:11 -06:00
Brandon Brnich
4a36d60f3a ti-bsp: ti-img-encode-decode: Update SRCREV
V4L2 API has been updated to remove the flags parameter from
v4l2_m2m_buf_copy_metadata in the 6.19 stable kernel release. Driver has
been updated to reflect these changes. Update SRCREV to pull these
changes.

Signed-off-by: Brandon Brnich <b-brnich@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-17 10:48:11 -06:00
LCPD Automation Script
a051601c80 u-boot-ti-mainline: Update to version: v2026.01
Updated the value(s) for:
  u-boot-ti-mainline: PV,SRCREV_uboot

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-17 10:48:11 -06:00
Ryan Eatmon
bdcbe5d6bc trusted-firmware-a: Clean up bbappend guard variables
Rather than using shorthand variables for the guard, move to a longer
more explicit naming.  This is mostly a cosmetic change, but we might
make a rule for it in the future so that we can check for it.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-17 10:48:11 -06:00
Ryan Eatmon
ce6dccea3b conf: Add support for bsp-ti-6_18 to ti-core-initramfs
With the 6.18 we are moving to using an initramfs to provide non-default
modules for booting.  So add that override to the machines that need it.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-12 15:01:47 -06:00
Ryan Eatmon
54ce94f577 ti-core-initramfs: Shrink size of initramfs
It looks like we were modelling this initramfs off of the wrong example
from poky.  This setup produces a much smaller initramfs.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-12 15:01:47 -06:00
Ryan Eatmon
270b7b6445 u-boot-ti: Clean up config looping code
Cleanup a few incorrect issues with the current file naming under the
config looping code.

1) Since binman is creating the tiboot3 files and signing them, when we
   are trying to create the named version of the files, we do not want
   to link against the spl/uboot-spl.bin file.  We need to figure out
   what the tiboot3.bin is pointing at and make this named version point
   at the same thing.

2) When deploying the tiboot3 files, if we are deploying something that
   is a link, then we should point the deployed link to the same named
   target.  This should help with figuring out what all of the links
   actually point to from the build dir instead of running into .bin
   file that has lost the audit trail.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2026-01-12 15:01:47 -06:00
27 changed files with 162 additions and 72 deletions

View File

@@ -5,5 +5,13 @@
require conf/machine/include/k3r5.inc
UBOOT_MACHINE = "am62ax_evm_r5_defconfig"
UBOOT_MACHINE:tie-test-builds = ""
UBOOT_CONFIG_FRAGMENTS:ti-falcon = "k3_r5_falcon.config"
UBOOT_CONFIG = ""
UBOOT_CONFIG:tie-test-builds = "usbdfu main"
UBOOT_CONFIG[main] = "am62ax_evm_r5_defconfig"
UBOOT_CONFIG[usbdfu] = "am62ax_evm_r5_defconfig"
UBOOT_CONFIG_FRAGMENTS[usbdfu] = "am62x_r5_usbdfu.config"
UBOOT_FRAGMENTS:ti-falcon = "k3_r5_falcon.config"

View File

@@ -4,6 +4,22 @@
require conf/machine/include/k3r5.inc
UBOOT_MACHINE = "am62px_evm_r5_defconfig"
UBOOT_MACHINE = ""
UBOOT_CONFIG_FRAGMENTS:ti-falcon = "k3_r5_falcon.config"
UBOOT_ECDSA_SIGN_CONFIG ?= "ecdsa"
UBOOT_ECDSA_SIGN_CONFIG:bsp-ti-6_6 = ""
UBOOT_ECDSA_SIGN_CONFIG:bsp-next = ""
UBOOT_ECDSA_SIGN_CONFIG:bsp-mainline = ""
UBOOT_CONFIG = "${UBOOT_ECDSA_SIGN_CONFIG} main"
UBOOT_CONFIG:prepend:tie-test-builds = "usbdfu "
UBOOT_CONFIG[main] = "am62px_evm_r5_defconfig"
UBOOT_CONFIG[ecdsa] = "am62px_evm_r5_defconfig"
UBOOT_CONFIG[usbdfu] = "am62px_evm_r5_defconfig"
UBOOT_CONFIG_MAKE_OPTS[ecdsa] = "${TI_SIGN_WITH_ECDSA_KEY}"
UBOOT_CONFIG_FRAGMENTS[usbdfu] = "am62x_r5_usbdfu.config"
UBOOT_FRAGMENTS:ti-falcon = "k3_r5_falcon.config"

View File

@@ -23,11 +23,28 @@ KERNEL_DEVICETREE = " \
FIT_CONF_DEFAULT_DTB = "k3-am62p5-sk.dtb"
UBOOT_MACHINE = "am62px_evm_a53_defconfig"
UBOOT_ECDSA_SIGN_CONFIG ?= "ecdsa"
UBOOT_ECDSA_SIGN_CONFIG:bsp-ti-6_6 = ""
UBOOT_ECDSA_SIGN_CONFIG:bsp-next = ""
UBOOT_ECDSA_SIGN_CONFIG:bsp-mainline = ""
# UBOOT_CONFIG_FRAGMENTS holds the list of u-boot config fragments which has to be build
ECDSA_BOOT_FILES ?= "tiboot3.bin-ecdsa tiboot3-*-evm.bin-ecdsa tispl.bin-ecdsa u-boot.img-ecdsa"
ECDSA_BOOT_FILES:bsp-ti-6_6 = ""
ECDSA_BOOT_FILES:bsp-next = ""
ECDSA_BOOT_FILES:bsp-mainline = ""
UBOOT_MACHINE = ""
UBOOT_CONFIG = "${UBOOT_ECDSA_SIGN_CONFIG} main"
UBOOT_CONFIG[main] = "am62px_evm_a53_defconfig"
UBOOT_CONFIG[ecdsa] = "am62px_evm_a53_defconfig"
UBOOT_CONFIG_MAKE_OPTS[ecdsa] = "${TI_SIGN_WITH_ECDSA_KEY}"
IMAGE_BOOT_FILES += "${ECDSA_BOOT_FILES}"
# UBOOT_FRAGMENTS holds the list of u-boot config fragments which has to be build
# along with the base defconfig mentioned in UBOOT_MACHINE. Refer u-boot-mergeconfig.inc
# under meta-ti-bsp/recipes-bsp/u-boot/ for more details.
# For AM62P tisdk-display-cluster image, splash screen is handled by SBL.
# Hence, disable the A53 based splash screen using the am62x_evm_prune_splashscreen.config fragment present in ti-u-boot tree
UBOOT_CONFIG_FRAGMENTS = "${@oe.utils.conditional('DISPLAY_CLUSTER_ENABLE', '1', 'am62x_evm_prune_splashscreen.config', '', d)}"
UBOOT_FRAGMENTS = "${@oe.utils.conditional('DISPLAY_CLUSTER_ENABLE', '1', 'am62x_evm_prune_splashscreen.config', '', d)}"

View File

@@ -5,5 +5,13 @@
require conf/machine/include/k3r5.inc
UBOOT_MACHINE = "am62x_evm_r5_defconfig"
UBOOT_MACHINE:tie-test-builds = ""
UBOOT_CONFIG_FRAGMENTS:ti-falcon = "k3_r5_falcon.config"
UBOOT_CONFIG = ""
UBOOT_CONFIG:tie-test-builds = "usbdfu main"
UBOOT_CONFIG[main] = "am62x_evm_r5_defconfig"
UBOOT_CONFIG[usbdfu] = "am62x_evm_r5_defconfig"
UBOOT_CONFIG_FRAGMENTS[usbdfu] = "am62x_r5_usbdfu.config"
UBOOT_FRAGMENTS:ti-falcon = "k3_r5_falcon.config"

View File

@@ -5,5 +5,13 @@
require conf/machine/include/k3r5.inc
UBOOT_MACHINE = "am62x_lpsk_r5_defconfig"
UBOOT_MACHINE:tie-test-builds = ""
UBOOT_CONFIG_FRAGMENTS:ti-falcon = "k3_r5_falcon.config"
UBOOT_CONFIG = ""
UBOOT_CONFIG:tie-test-builds = "usbdfu main"
UBOOT_CONFIG[main] = "am62x_lpsk_r5_defconfig"
UBOOT_CONFIG[usbdfu] = "am62x_lpsk_r5_defconfig"
UBOOT_CONFIG_FRAGMENTS[usbdfu] = "am62x_r5_usbdfu.config"
UBOOT_FRAGMENTS:ti-falcon = "k3_r5_falcon.config"

View File

@@ -5,3 +5,9 @@
require conf/machine/include/k3r5.inc
UBOOT_MACHINE = "am65x_evm_r5_defconfig"
UBOOT_MACHINE:tie-test-builds = ""
UBOOT_CONFIG = ""
UBOOT_CONFIG:prepend:tie-test-builds = "usbdfu main"
UBOOT_CONFIG[main] = "am62x_evm_r5_defconfig"
UBOOT_CONFIG[usbdfu] = "am65x_evm_r5_usbdfu_defconfig"

View File

@@ -12,5 +12,6 @@ OPTEEMACHINE = "k3-am62x"
MACHINE_ESSENTIAL_EXTRA_RRECOMMENDS += "cnm-wave-fw"
TI_INITRAMFS_KERNEL_MODULES:append:bsp-mainline = " kernel-module-tps6594-i2c kernel-module-tps6594-regulator kernel-module-tps6594-core"
TI_INITRAMFS_KERNEL_MODULES:append:bsp-next = " kernel-module-tps6594-i2c kernel-module-tps6594-regulator kernel-module-tps6594-core"
TI_INITRAMFS_KERNEL_MODULES:append:bsp-ti-6_18 = " kernel-module-tps6594-i2c kernel-module-tps6594-regulator kernel-module-tps6594-core"
TI_INITRAMFS_KERNEL_MODULES:append:bsp-mainline = " kernel-module-tps6594-i2c kernel-module-tps6594-regulator kernel-module-tps6594-core"
TI_INITRAMFS_KERNEL_MODULES:append:bsp-next = " kernel-module-tps6594-i2c kernel-module-tps6594-regulator kernel-module-tps6594-core"

View File

@@ -17,8 +17,10 @@ OPTEEMACHINE = "k3-j721e"
TI_VXE_VXD_DRIVER = "ti-vxe-vxd-driver"
TI_VXE_VXD_DRIVER:bsp-ti-6_6 = ""
TI_VXE_VXD_DRIVER:bsp-ti-6_18 = ""
MACHINE_ESSENTIAL_EXTRA_RRECOMMENDS += "cadence-mhdp-fw vxd-dec-fw ti-eth-fw-j721e ${TI_VXE_VXD_DRIVER}"
TI_INITRAMFS_KERNEL_MODULES:append:bsp-ti-6_18 = " kernel-module-cdns-pltfrm kernel-module-ti-j721e-ufs"
TI_INITRAMFS_KERNEL_MODULES:append:bsp-mainline = " kernel-module-cdns-pltfrm kernel-module-ti-j721e-ufs"
TI_INITRAMFS_KERNEL_MODULES:append:bsp-next = " kernel-module-cdns-pltfrm kernel-module-ti-j721e-ufs"

View File

@@ -14,5 +14,6 @@ OPTEEMACHINE = "k3-j784s4"
MACHINE_ESSENTIAL_EXTRA_RRECOMMENDS += "cadence-mhdp-fw cnm-wave-fw ti-eth-fw-j784s4"
TI_INITRAMFS_KERNEL_MODULES:append:bsp-ti-6_18 = " kernel-module-cdns-pltfrm kernel-module-ti-j721e-ufs"
TI_INITRAMFS_KERNEL_MODULES:append:bsp-mainline = " kernel-module-cdns-pltfrm kernel-module-ti-j721e-ufs"
TI_INITRAMFS_KERNEL_MODULES:append:bsp-next = " kernel-module-cdns-pltfrm kernel-module-ti-j721e-ufs"

View File

@@ -33,14 +33,17 @@ BUILD_CORE_INITRAMFS_IMAGE = "ti-core-initramfs"
BUILD_CORE_INITRAMFS_IMAGE_FILE = "${BUILD_CORE_INITRAMFS_IMAGE}.cpio.xz"
BUILD_CORE_INITRAMFS_IMAGE_STEP ?= ""
BUILD_CORE_INITRAMFS_IMAGE_STEP:bsp-ti-6_18 = "${BUILD_CORE_INITRAMFS_IMAGE}:do_image_complete"
BUILD_CORE_INITRAMFS_IMAGE_STEP:bsp-mainline = "${BUILD_CORE_INITRAMFS_IMAGE}:do_image_complete"
BUILD_CORE_INITRAMFS_IMAGE_STEP:bsp-next = "${BUILD_CORE_INITRAMFS_IMAGE}:do_image_complete"
do_image_wic[depends] += "${BUILD_CORE_INITRAMFS_IMAGE_STEP}"
TI_WKS_INITRAMFS ?= ""
TI_WKS_INITRAMFS:bsp-ti-6_18 = ",initrd=${BUILD_CORE_INITRAMFS_IMAGE_FILE}"
TI_WKS_INITRAMFS:bsp-mainline = ",initrd=${BUILD_CORE_INITRAMFS_IMAGE_FILE}"
TI_WKS_INITRAMFS:bsp-next = ",initrd=${BUILD_CORE_INITRAMFS_IMAGE_FILE}"
IMAGE_BOOT_FILES:append:bsp-ti-6_18 = " ${BUILD_CORE_INITRAMFS_IMAGE_FILE}"
IMAGE_BOOT_FILES:append:bsp-mainline = " ${BUILD_CORE_INITRAMFS_IMAGE_FILE}"
IMAGE_BOOT_FILES:append:bsp-next = " ${BUILD_CORE_INITRAMFS_IMAGE_FILE}"

View File

@@ -8,9 +8,9 @@ inherit module features_check
REQUIRED_MACHINE_FEATURES = "gc320"
# Need to branch out with ${PV} var
BRANCH = "ti-${PV}-k6.12"
BRANCH = "ti-${PV}-k6.18"
SRCREV = "83afddf9dbf6a8458267b4dae21ee35bfb11f3d1"
SRCREV = "a7e9a51e89c97fbea974c7d674aa0a95d7c96403"
SRC_URI = "git://git.ti.com/git/graphics/ti-gc320-driver.git;protocol=https;branch=${BRANCH}"

View File

@@ -14,7 +14,7 @@ BRANCH = "scarthgap/k${PV}"
SRC_URI = "git://git.ti.com/git/multimedia/img-vxe-vxd.git;protocol=https;branch=${BRANCH}"
SRCREV = "0bcbb20af32ea13275b452f0e84f5a49966d0bf6"
SRCREV = "9453ad8ebdd42a5e5a384c21cd5f6bc2c86aa6d8"
TARGET_PRODUCT:j721e = "j721e_linux"

View File

@@ -10,7 +10,7 @@ SRC_URI_TRUSTED_FIRMWARE_A = "git://git.trustedfirmware.org/TF-A/trusted-firmwar
SRCBRANCH = "master"
LIC_FILES_CHKSUM:am62lxx = "file://docs/license.rst;md5=1118e32884721c0be33267bd7ae11130"
SRCREV_tfa:am62lxx = "2efbddd1caaa8c2126261225fdfe333be03c22f1"
SRCREV_tfa:am62lxx = "d071d093b94852473ae6ae26336f125e107a964f"
SRC_URI_TRUSTED_FIRMWARE_A:am62lxx = "git://github.com/TexasInstruments/arm-trusted-firmware.git;protocol=https"
SRCBRANCH:am62lxx = "ti-master"

View File

@@ -1,4 +1,4 @@
TFA_TI = ""
TFA_TI:k3 = "trusted-firmware-a-ti.inc"
TRUSTED_FIRMWARE_A_TI = ""
TRUSTED_FIRMWARE_A_TI:ti-soc = "trusted-firmware-a-ti.inc"
require ${TFA_TI}
require ${TRUSTED_FIRMWARE_A_TI}

View File

@@ -0,0 +1,6 @@
-----BEGIN EC PRIVATE KEY-----
MIGkAgEBBDBDO9fzBU2LoKaYgji4m3ZCHKUBF9CTVnU6ClfNPJsTo0SKZpCsmyr0
TKUNkk16vwGgBwYFK4EEACKhZANiAATCv6ftwnJW91fP5wpLpLAxt3u732oNnKr8
pLbZUzi/s8/e7QiISJ8QKYGaWMnjORW82cM3UJKlCw8GOrb3ZrEXYWRKxkPWql0+
BOhDQA5b21GtL9HQPvuCPz471ZaxGYA=
-----END EC PRIVATE KEY-----

View File

@@ -1,7 +0,0 @@
do_configure:append () {
if [ -n "${UBOOT_CONFIG_FRAGMENTS}" ] && [ -n "${UBOOT_MACHINE}" ]
then
oe_runmake -C ${S} O=${B} ${UBOOT_MACHINE} ${UBOOT_CONFIG_FRAGMENTS}
oe_runmake -C ${S} O=${B} olddefconfig
fi
}

View File

@@ -2,8 +2,8 @@ require u-boot-ti.inc
SUMMARY = "Mainline U-Boot for TI devices"
PV = "2025.10"
PV = "2026.01"
UBOOT_GIT_URI = "git://source.denx.de/u-boot/u-boot.git"
SRCREV_uboot = "e50b1e8715011def8aff1588081a2649a2c6cd47"
SRCREV_uboot = "127a42c7257a6ffbbd1575ed1cbaa8f5408a44b3"

View File

@@ -1,7 +1,5 @@
require u-boot-ti.inc
include ${@ 'recipes-bsp/u-boot/ti-extras.inc' if d.getVar('TI_EXTRAS') else ''}
PR = "r0"
BRANCH = "ti-u-boot-2024.04"

View File

@@ -1,9 +1,7 @@
require u-boot-ti.inc
include ${@ 'recipes-bsp/u-boot/ti-extras.inc' if d.getVar('TI_EXTRAS') else ''}
PR = "r0"
BRANCH = "ti-u-boot-2025.01"
SRCREV_uboot = "df1fe238230433ba3e5b731356156e145aa90917"
SRCREV_uboot = "ef2eb76b650415637bd93b0eddfb1e31489117f9"

View File

@@ -4,6 +4,6 @@ PR = "r0"
BRANCH = "ti-u-boot-2026.01"
SRCREV_uboot = "c5e6d2ab7eba68cbfb600cdc131c0c375ced2ec9"
SRCREV_uboot = "7db1482473e9a9562061c6f89e6d3cd86a17e616"
DEFAULT_PREFERENCE = "-1"

View File

@@ -7,7 +7,8 @@ do_compile:prepend () {
require ${COREBASE}/meta/recipes-bsp/u-boot/u-boot-common.inc
require ${COREBASE}/meta/recipes-bsp/u-boot/u-boot.inc
require u-boot-mergeconfig.inc
include ${@ 'recipes-bsp/u-boot/ti-extras.inc' if d.getVar('TI_EXTRAS') else ''}
FILESEXTRAPATHS:prepend := "${THISDIR}/u-boot:"
@@ -150,13 +151,17 @@ uboot_compile_config_copy_binary:k3r5 () {
builddir="${builddir}"
if ! [ -L ${B}/${builddir}/${UBOOT_BINARYNAME}-${type}.${UBOOT_SUFFIX} ] && ! [ -f ${B}/${builddir}/${UBOOT_BINARYNAME}-${type}.${UBOOT_SUFFIX} ]; then
ln -s ${B}/${builddir}/spl/u-boot-spl.${UBOOT_SUFFIX} ${B}/${builddir}/${UBOOT_BINARYNAME}-${type}.${UBOOT_SUFFIX}
fi
if ! [ -L ${B}/${builddir}/${binary} ] && ! [ -f ${B}/${builddir}/${binary} ]; then
ln -s ${B}/${builddir}/spl/u-boot-spl.${UBOOT_SUFFIX} ${B}/${builddir}/${binary}
fi
if ! [ -L ${B}/${builddir}/${UBOOT_BINARYNAME}-${type}.${UBOOT_SUFFIX} ] && ! [ -f ${B}/${builddir}/${UBOOT_BINARYNAME}-${type}.${UBOOT_SUFFIX} ]; then
tgt="${B}/${builddir}/${binary}"
if [ -L ${B}/${builddir}/${binary} ]; then
tgt=$(realpath ${B}/${builddir}/${binary})
fi
ln -s ${tgt} ${B}/${builddir}/${UBOOT_BINARYNAME}-${type}.${UBOOT_SUFFIX}
fi
}
uboot_install_config:append () {
@@ -230,18 +235,34 @@ do_deploy:append:k3r5 () {
uboot_deploy_config:append:k3r5 () {
for f in ${B}/${builddir}/tiboot3-*.bin; do
if [ -f "$f" ]; then
if [ -L "$f" ]; then
f_base=$(basename $f)
install -m 644 $f ${DEPLOYDIR}/${f_base}-${type}
ln -sf ${f_base}-${type} ${DEPLOYDIR}/${f_base}
tgt=$(realpath $f)
tgt_base=$(basename $tgt)
ln -sf ${tgt_base}-${type} ${DEPLOYDIR}/${f_base}-${type}
ln -sf ${tgt_base}-${type} ${DEPLOYDIR}/${f_base}
else
if [ -f "$f" ]; then
f_base=$(basename $f)
install -m 644 $f ${DEPLOYDIR}/${f_base}-${type}
ln -sf ${f_base}-${type} ${DEPLOYDIR}/${f_base}
fi
fi
done
for f in ${B}/${builddir}/sysfw*.itb; do
if [ -f "$f" ]; then
if [ -L "$f" ]; then
f_base=$(basename $f)
install -m 644 $f ${DEPLOYDIR}/${f_base}-${type}
ln -sf ${f_base}-${type} ${DEPLOYDIR}/${f_base}
tgt=$(realpath $f)
tgt_base=$(basename $tgt)
ln -sf ${tgt_base}-${type} ${DEPLOYDIR}/${f_base}-${type}
ln -sf ${tgt_base}-${type} ${DEPLOYDIR}/${f_base}
else
if [ -f "$f" ]; then
f_base=$(basename $f)
install -m 644 $f ${DEPLOYDIR}/${f_base}-${type}
ln -sf ${f_base}-${type} ${DEPLOYDIR}/${f_base}
fi
fi
done
}
@@ -259,13 +280,15 @@ uboot_deploy_config:append:am62lxx () {
uboot_deploy:append:k3r5 () {
for f in ${B}/tiboot3-*.bin; do
if [ -f "$f" ]; then
install -m 644 $f ${DEPLOYDIR}/
f_base=$(basename $f)
install -m 644 $f ${DEPLOYDIR}/${f_base}
fi
done
for f in ${B}/sysfw*.itb; do
if [ -f "$f" ]; then
install -m 644 $f ${DEPLOYDIR}/
f_base=$(basename $f)
install -m 644 $f ${DEPLOYDIR}/${f_base}
fi
done
}
@@ -393,3 +416,5 @@ PACKAGES:prepend:am62pxx-evm = "${FALCON_PKG} "
PACKAGES:prepend:am62xx-lp-evm = "${FALCON_PKG} "
TOOLCHAIN = "gcc"
TI_SIGN_WITH_ECDSA_KEY ?= "KEY_PATH=${THISDIR}/files/custMpk_ecdsa.key"

View File

@@ -10,7 +10,7 @@ BRANCH_ARM64 = "ti-linux-6.12.y"
BRANCH = "${BRANCH_ARM64}"
BRANCH_ARM32 = "ti-rt-linux-6.12.y-arm32"
SRCREV_ARM32 = "1379a8eb9786e78509f67ff8eac658bde5ddc66d"
SRCREV_ARM32 = "a3bc6dc973a99822f0707b1c9ba06b56bf142076"
PV_ARM32 = "6.12.57+git"
BRANCH:ti33x = "${BRANCH_ARM32}"

View File

@@ -21,7 +21,7 @@ S = "${UNPACKDIR}/${BB_GIT_DEFAULT_DESTSUFFIX}"
BRANCH ?= "ti-linux-6.12.y"
SRCREV ?= "15b58b1dcd0e0a79d83740b81da1a1367f6f3f68"
SRCREV ?= "da3c0f0a33ac00f7138c695a16d90301cf7ec02b"
PV = "6.12.57+git"
KERNEL_REPRODUCIBILITY_PATCHES = " \

View File

@@ -22,8 +22,8 @@ S = "${UNPACKDIR}/${BB_GIT_DEFAULT_DESTSUFFIX}"
BRANCH ?= "ti-linux-6.18.y"
SRCREV ?= "75433f843c99d1ab544808749a46a6e2f0151a56"
PV = "6.18.0+git"
SRCREV ?= "e36172c9eb8513198f33eee06b8cff28c6556e11"
PV = "6.18.8+git"
KERNEL_REPRODUCIBILITY_PATCHES = " \
file://0001-perf-python-Fix-compile-for-32bit-platforms.patch \

View File

@@ -1,2 +1,3 @@
PV = "4.7.0+git"
OPTEE_TA_GIT_TAG = "${@'branch=master' if d.getVar('PV') == 'git' or d.getVar('PV').endswith('+git') else 'tag=%s;nobranch=1' % d.getVar('PV')}"
SRCREV_optee-ta = "ce33372ab772e879826361a1ca91126260bd9be1"

View File

@@ -1,16 +1,18 @@
SUMMARY = "Minimal initramfs for boot requirements"
require recipes-core/packagegroups/packagegroup-core-boot.bb
LICENSE = "MIT"
PACKAGE_ARCH = "${MACHINE_ARCH}"
inherit packagegroup
TI_INITRAMFS_KERNEL_MODULES ?= ""
RDEPENDS:${PN} += "\
${TI_INITRAMFS_KERNEL_MODULES} \
${VIRTUAL-RUNTIME_base-utils} \
base-passwd \
initramfs-framework-base \
initramfs-module-udev \
initramfs-module-nfsrootfs \
nfs-utils \
nfs-utils-client \
"
RDEPENDS:${PN}:remove = "grub-efi kernel"

View File

@@ -7,29 +7,26 @@ DESCRIPTION = "Image meant to probe boot essential modules\
LICENSE = "MIT"
inherit core-image
INITRAMFS_FSTYPES = "cpio cpio.xz"
INITRAMFS_MAXSIZE = "65536"
IMAGE_NAME = "ti-core-initramfs"
IMAGE_NAME_SUFFIX = ""
IMAGE_FEATURES:remove = "package-management"
INITRAMFS_FSTYPES = "cpio cpio.xz"
IMAGE_FSTYPES = "${INITRAMFS_FSTYPES}"
export IMAGE_BASENAME = "${IMAGE_NAME}"
PACKAGE_INSTALL = "packagegroup-ti-core-initramfs"
export IMAGE_BASENAME = "${IMAGE_NAME}"
# Ensure the initramfs only contains the bare minimum
IMAGE_FEATURES = ""
IMAGE_LINGUAS = ""
IMAGE_OVERHEAD_FACTOR = "1.1"
# on the kernel image.
PACKAGE_EXCLUDE = "kernel-image-*"
# To further reduce the size of the rootfs, remove the /boot directory from
# the final image this is usually done by adding RDEPENDS_kernel-base = ""
# in the configuration file. In our case we can't use this method. Instead we
# just wipe out the content of "/boot" before creating the image.
ROOTFS_POSTPROCESS_COMMAND += "empty_boot_dir; "
empty_boot_dir () {
rm -rf ${IMAGE_ROOTFS}/boot/*
}
IMAGE_FSTYPES = "${INITRAMFS_FSTYPES}"
IMAGE_NAME_SUFFIX ?= ""
IMAGE_ROOTFS_SIZE = "8192"
IMAGE_ROOTFS_EXTRA_SPACE = "0"
inherit image