AM67A Beagleboard.org BeagleY-AI
Introduction:
BeagleBoard.org BeagleY-AI is an easy to use, affordable open source hardware single board computer based on the Texas Instruments AM67A, which features a quad-core 64-bit Arm CPU subsystem, 2 general-purpose digital-signal-processors (DSP) and matrix-multiply-accelerators (MMA), GPU, vision and deep learning accelerators, and multiple Arm Cortex-R5 cores for low-power, low-latency GPIO control.
Further information can be found at:
Product Page: https://beagley-ai.org/
Hardware documentation: https://openbeagle.org/beagley-ai/beagley-ai
Boot Flow:
Below is the pictorial representation of boot flow:
Boot flow diagramOn this platform, ‘TI Foundational Security’ (TIFS) functions as the security enclave master while ‘Device Manager’ (DM), also known as the ‘TISCI server’ in "TI terminology", offers all the essential services. The A53 or R5F (Aux core) sends requests to TIFS/DM to accomplish these services, as illustrated in the diagram above.
Sources:
Das U-Boot
branch: masterTrusted Firmware-A (TF-A)
branch: masterOpen Portable Trusted Execution Environment (OP-TEE)
branch: masterTI Firmware (TIFS, DM, SYSFW)
branch: ti-linux-firmware
Note
The TI Firmwares required for functionality of the system are (see platform specific boot diagram for further information as to which component runs on which processor):
TIFS - TI Foundational Security Firmware - Consists of purely firmware meant to run on the security enclave.
DM - Device Management firmware also called TI System Control Interface server (TISCI Server) - This component purely plays the role of managing device resources such as power, clock, interrupts, dma etc. This firmware runs on a dedicated or multi-use microcontroller outside the security enclave.
TIFS Stub - The TIFS stub is a small piece of binary designed to help restore the required security context and resume the TIFS firmware when the system resumes from low-power modes such as suspend-to-RAM/Deep Sleep. This stub uses the same encryption and customer key signing model as TIFS and is loaded into the ATCM (Tightly Coupled Memory ‘A’ of the DM R5) during DM startup. Due to the independent certificate signing process, the stub is maintained separately from DM.
Build procedure:
Setup the environment variables:
S/w Component |
Env Variable |
Description |
|---|---|---|
All Software |
CC32 |
Cross compiler for ARMv7 (ARM 32bit), typically arm-linux-gnueabihf- |
All Software |
CC64 |
Cross compiler for ARMv8 (ARM 64bit), typically aarch64-linux-gnu- |
All Software |
LNX_FW_PATH |
Path to TI Linux firmware repository |
All Software |
TFA_PATH |
Path to source of Trusted Firmware-A |
All Software |
OPTEE_PATH |
Path to source of OP-TEE |
S/w Component |
Env Variable |
Description |
|---|---|---|
U-Boot |
UBOOT_CFG_CORTEXR |
Defconfig for Cortex-R (Boot processor). |
U-Boot |
UBOOT_CFG_CORTEXA |
Defconfig for Cortex-A (MPU processor). |
Trusted Firmware-A |
TFA_BOARD |
Platform name used for building TF-A for Cortex-A Processor. |
Trusted Firmware-A |
TFA_EXTRA_ARGS |
Any extra arguments used for building TF-A. |
OP-TEE |
OPTEE_PLATFORM |
Platform name used for building OP-TEE for Cortex-A Processor. |
OP-TEE |
OPTEE_EXTRA_ARGS |
Any extra arguments used for building OP-TEE. |
Set the variables corresponding to this platform:
exportCC32=arm-linux-gnueabihf- exportCC64=aarch64-linux-gnu- exportLNX_FW_PATH=path/to/ti-linux-firmware exportTFA_PATH=path/to/trusted-firmware-a exportOPTEE_PATH=path/to/optee_os
exportUBOOT_CFG_CORTEXR=am67a_beagley_ai_r5_defconfig exportUBOOT_CFG_CORTEXA=am67a_beagley_ai_a53_defconfig exportTFA_BOARD=lite # we dont use any extra TFA parameters unsetTFA_EXTRA_ARGS exportOPTEE_PLATFORM=k3-am62x
Trusted Firmware-A:
# inside trusted-firmware-a source makeCROSS_COMPILE=$CC64ARCH=aarch64PLAT=k3SPD=opteed$TFA_EXTRA_ARGS\ TARGET_BOARD=$TFA_BOARD
OP-TEE:
# inside optee_os source makeCROSS_COMPILE=$CC32CROSS_COMPILE64=$CC64CFG_ARM64_core=y$OPTEE_EXTRA_ARGS\ PLATFORM=$OPTEE_PLATFORM
U-Boot:
3.1 R5:
# inside u-boot source make$UBOOT_CFG_CORTEXR makeCROSS_COMPILE=$CC32BINMAN_INDIRS=$LNX_FW_PATH
3.2 A53:
# inside u-boot source make$UBOOT_CFG_CORTEXA makeCROSS_COMPILE=$CC64BINMAN_INDIRS=$LNX_FW_PATH\ BL31=$TFA_PATH/build/k3/$TFA_BOARD/release/bl31.bin\ TEE=$OPTEE_PATH/out/arm-plat-k3/core/tee-raw.bin
Note
It is also possible to pick up a custom DM binary by adding TI_DM argument pointing to the file. If not provided, it defaults to picking up the DM binary from BINMAN_INDIRS. This is only applicable to devices that utilize split firmware.
Target Images
Copy these images to an SD card and boot:
tiboot3-j722s-hs-fs-evm.bin from Cortex-R5 build as tiboot3.bin.
tispl.bin and u-boot.img from Cortex-A build.
Image formats
tiboot3.bin
tispl.bin
Additional hardware for U-Boot development
Serial Console is critical for U-Boot development on BeagleY-AI. See BeagleY-AI serial console documentation.
The only onboard storage option is uSD.
(optionally) JTAG is useful when working with very early stages of boot.
Flash to uSD card or how to deal with "bricked" Board
The only storage option on the platform is uSD card. However, if you choose to hand format your own bootable uSD card, be aware that it can be difficult. The following information may be helpful, but remember that it is only sometimes reliable, and partition options can cause issues. These can potentially help:
https://git.ti.com/cgit/arago-project/tisdk-setup-scripts/tree/create-sdcard.sh
https://elinux.org/Beagleboard:Expanding_File_System_Partition_On_A_microSD
Or manually as follows (may not take into distro needs such as EFI or swap):
# Create image with partition table parted--script<SDCARDDEVICE>\ mklabelmsdos\ mkpartprimaryfat164MiB20MiB\ mkpartprimaryext420MiB100%\ set1booton\ set1bls_bootoff\ set1lbaon # Create boot partition mkfs.vfat<SDCARDDEVICE>1 # Create root partition mkfs.ext4<SDCARDDEVICE>2
The simplest option is to start with a standard distribution image like those in BeagleBoard.org Distros Page and download a disk image for BeagleY-AI. Pick a 16GB+ uSD card to be on the safer side.
With an SD/MMC Card reader and Balena Etcher, having a functional setup in minutes is a trivial matter, and it works on almost all Host Operating Systems. Yes Windows users, Windows Subsystem for Linux(WSL) based development with U-Boot and update uSD card is practical.
Updating U-Boot is a matter of copying the tiboot3.bin, tispl.bin and u-boot.img to the "BOOT" partition of the uSD card. Remember to sync and unmount (or Eject - depending on the Operating System) the uSD card prior to physically removing from SD card reader.
Note
Great news! If the board has not been damaged physically, there’s no need to worry about it being "bricked" on this platform. You only have to flash an uSD card, plug it in. This means that even if you make a mistake, you can quickly fix it and rest easy.
If you are frequently working with uSD cards, you might find the following useful:
LED patterns during boot
LED Color |
Indicates |
|---|---|
Only RED at startup |
Boot failure or R5 image not started up |
Steady Green |
A53 U-boot has started up |
Red/Orange |
OS boot process has been initiated |
Steady Green |
OS boot process failed and drops to U-Boot shell |
Warning
If the "red" power LED is not glowing, the system power supply is not functional. Please refer to BeagleY-AI documentation for further information.
A53 SPL DDR Memory Layout
This provides an overview memory usage in A53 SPL stage.
Region |
Start Address |
End Address |
|---|---|---|
EMPTY |
0x80000000 |
0x80080000 |
TEXT BASE |
0x80080000 |
0x800d8000 |
EMPTY |
0x800d8000 |
0x80477660 |
STACK |
0x80477660 |
0x80477e60 |
GD |
0x80477e60 |
0x80478000 |
MALLOC |
0x80478000 |
0x80480000 |
EMPTY |
0x80480000 |
0x80a00000 |
BSS |
0x80a00000 |
0x80a80000 |
BLOBS |
0x80a80000 |
0x80d00400 |
EMPTY |
0x80d00400 |
0x81000000 |
Debugging U-Boot
See Common Debugging environment - OpenOCD: for detailed setup and debugging information.
Warning
OpenOCD support since: commit 33749a7fbeb5
If the default package version of OpenOCD in your development environment’s distribution needs to be updated, it might be necessary to build OpenOCD from the source.
Tag-Connect: Tag-Connect pads on the boards which require special cable. Please check the documentation to identify if "legged" or "no-leg" version of the cable is appropriate for the board.
To debug on these boards, you will need:
Tag-Connect cable appropriate to the board such as TC2050-IDC-NL
In case of no-leg, version, a retaining clip
Tag-Connect to ARM20 adapter
Note
You can optionally use a 3d printed solution such as Protective cap or clip to replace the retaining clip.
Warning
With the Tag-Connect to ARM20 adapter, Please solder the "Trst" signal for connection to work.
External JTAG adapter/interface: In other cases, where an adapter/dongle is used, a simple cfg file can be created to integrate the SoC and adapter information. See supported TI K3 SoCs to decide if the SoC is supported or not.
openocd-fopenocd_connect.cfg
For example, with BeagleY-AI (J722S/AM67A platform), the openocd_connect.cfg:
# TUMPA example: # http://www.tiaowiki.com/w/TIAO_USB_Multi_Protocol_Adapter_User's_Manual source[findinterface/ftdi/tumpa.cfg] transportselectjtag # default JTAG configuration has only SRST and no TRST reset_configsrst_onlysrst_push_pull # delay after SRST goes inactive adaptersrstdelay20 if{![infoexistsSOC]}{ # Set the SoC of interest setSOCj722s } source[findtarget/ti_k3.cfg] ftditdo_sample_edgefalling # Speeds for FT2232H are in multiples of 2, and 32MHz is tops # max speed we seem to achieve is ~20MHz.. so we pick 16MHz adapterspeed16000