AM62Px Platforms

The AM62Px is an extension of the existing Sitara AM62x low-cost family of application processors built for Automotive and Linux Application development. Scalable Arm Cortex-A53 performance and embedded features, such as: multi high-definition display support, 3D-graphics acceleration, 4K video acceleration, and extensive peripherals make the AM62Px well-suited for a broad range of automation and industrial application, including automotive digital instrumentation, automotive displays, industrial HMI, and more.

Some highlights of AM62P SoC are:

  • Quad-Cortex-A53s (running up to 1.4GHz) in a single cluster. Dual/Single core variants are provided in the same package to allow HW compatible designs.

  • One Device manager Cortex-R5F for system power and resource management, and one Cortex-R5F for Functional Safety or general-purpose usage.

  • One 3D GPU up to 50 GLFOPS

  • H.264/H.265 Video Encode/Decode.

  • Display support: 3x display support over OLDI/LVDS (1x OLDI-DL, 1x or 2x OLDI-SL), DSI, or DPI. Up to 3840x1080 @ 60fps resolution

  • Integrated Giga-bit Ethernet switch supporting up to a total of two external ports (TSN capable).

  • 9xUARTs, 5xSPI, 6xI2C, 2xUSB2, 3xCAN-FD, 3xMMC and SD, GPMC for NAND/FPGA connection, OSPI memory controller, 3xMcASP for audio, 1xCSI-RX-4L for Camera, eCAP/eQEP, ePWM, among other peripherals.

  • Dedicated Centralized Hardware Security Module with support for secure boot, debug security and crypto acceleration and trusted execution environment.

  • One 32-bit DDR Subsystem that supports LPDDR4, DDR4 memory types.

  • Multiple low power modes support, ex: Deep sleep, Standby, MCU-only, enabling battery powered system design.

For those interested, more details about this SoC can be found in the Technical Reference Manual here: https://www.ti.com/lit/pdf/spruj83

Boot Flow:

The bootflow is exactly the same as all SoCs in the am62xxx extended SoC family. Below is the pictorial representation:

Boot flow diagram
  • Here TIFS acts as master and provides all the critical services. R5/A53 requests TIFS to get these services done as shown in the above diagram.

Sources:

Note

The TI Firmwares required for functionality of the system are (see platform specific boot diagram for further information as to which component runs on which processor):

  • TIFS - TI Foundational Security Firmware - Consists of purely firmware meant to run on the security enclave.

  • DM - Device Management firmware also called TI System Control Interface server (TISCI Server) - This component purely plays the role of managing device resources such as power, clock, interrupts, dma etc. This firmware runs on a dedicated or multi-use microcontroller outside the security enclave.

  • TIFS Stub - The TIFS stub is a small piece of binary designed to help restore the required security context and resume the TIFS firmware when the system resumes from low-power modes such as suspend-to-RAM/Deep Sleep. This stub uses the same encryption and customer key signing model as TIFS and is loaded into the ATCM (Tightly Coupled Memory ‘A’ of the DM R5) during DM startup. Due to the independent certificate signing process, the stub is maintained separately from DM.

Build procedure:

  1. Setup the environment variables:

Generic environment variables

S/w Component

Env Variable

Description

All Software

CC32

Cross compiler for ARMv7 (ARM 32bit), typically arm-linux-gnueabihf-

All Software

CC64

Cross compiler for ARMv8 (ARM 64bit), typically aarch64-linux-gnu-

All Software

LNX_FW_PATH

Path to TI Linux firmware repository

All Software

TFA_PATH

Path to source of Trusted Firmware-A

All Software

OPTEE_PATH

Path to source of OP-TEE

Board specific environment variables

S/w Component

Env Variable

Description

U-Boot

UBOOT_CFG_CORTEXR

Defconfig for Cortex-R (Boot processor).

U-Boot

UBOOT_CFG_CORTEXA

Defconfig for Cortex-A (MPU processor).

Trusted Firmware-A

TFA_BOARD

Platform name used for building TF-A for Cortex-A Processor.

Trusted Firmware-A

TFA_EXTRA_ARGS

Any extra arguments used for building TF-A.

OP-TEE

OPTEE_PLATFORM

Platform name used for building OP-TEE for Cortex-A Processor.

OP-TEE

OPTEE_EXTRA_ARGS

Any extra arguments used for building OP-TEE.

Set the variables corresponding to this platform:

export CC32=arm-linux-gnueabihf-
export CC64=aarch64-linux-gnu-
export LNX_FW_PATH=path/to/ti-linux-firmware
export TFA_PATH=path/to/trusted-firmware-a
export OPTEE_PATH=path/to/optee_os
export UBOOT_CFG_CORTEXR=am62px_evm_r5_defconfig
export UBOOT_CFG_CORTEXA=am62px_evm_a53_defconfig
export TFA_BOARD=lite
# we dont use any extra TFA parameters
unset TFA_EXTRA_ARGS
export OPTEE_PLATFORM=k3-am62x
export OPTEE_EXTRA_ARGS="CFG_WITH_SOFTWARE_PRNG=y"
  1. Trusted Firmware-A:

# inside trusted-firmware-a source
make CROSS_COMPILE=$CC64 ARCH=aarch64 PLAT=k3 SPD=opteed $TFA_EXTRA_ARGS \
     TARGET_BOARD=$TFA_BOARD
  1. OP-TEE:

# inside optee_os source
make CROSS_COMPILE=$CC32 CROSS_COMPILE64=$CC64 CFG_ARM64_core=y $OPTEE_EXTRA_ARGS \
      PLATFORM=$OPTEE_PLATFORM
  1. U-Boot:

  • 3.1 R5:

# inside u-boot source
make $UBOOT_CFG_CORTEXR
make CROSS_COMPILE=$CC32 BINMAN_INDIRS=$LNX_FW_PATH
  • 3.2 A53:

# inside u-boot source
make $UBOOT_CFG_CORTEXA
make CROSS_COMPILE=$CC64 BINMAN_INDIRS=$LNX_FW_PATH \
       BL31=$TFA_PATH/build/k3/$TFA_BOARD/release/bl31.bin \
       TEE=$OPTEE_PATH/out/arm-plat-k3/core/tee-raw.bin

Note

It is also possible to pick up a custom DM binary by adding TI_DM argument pointing to the file. If not provided, it defaults to picking up the DM binary from BINMAN_INDIRS. This is only applicable to devices that utilize split firmware.

Target Images

In order to boot we need tiboot3.bin, tispl.bin and u-boot.img. Each SoC variant (HS-FS, HS-SE) requires a different source for these files.

  • HS-FS

    • tiboot3-am62px-hs-fs-evm.bin from step 3.1

    • tispl.bin, u-boot.img from step 3.2

  • HS-SE

    • tiboot3-am62px-hs-evm.bin from step 3.1

    • tispl.bin, u-boot.img from step 3.2

Image formats:

  • tiboot3.bin

tiboot3.bin image format
  • tispl.bin

tispl.bin image format

OSPI:

ROM supports booting from OSPI from offset 0x0.

Flashing images to OSPI:

Below commands can be used to download tiboot3.bin, tispl.bin, and u-boot.img, over tftp and then flash those to OSPI at their respective addresses.

sf probe
tftp ${loadaddr} tiboot3.bin
sf update $loadaddr 0x0 $filesize
tftp ${loadaddr} tispl.bin
sf update $loadaddr 0x80000 $filesize
tftp ${loadaddr} u-boot.img
sf update $loadaddr 0x280000 $filesize

Flash layout for OSPI:

OSPI flash partition layout

A53 SPL DDR Memory Layout

This provides an overview memory usage in A53 SPL stage.

Region

Start Address

End Address

EMPTY

0x80000000

0x80080000

TEXT BASE

0x80080000

0x800d8000

EMPTY

0x800d8000

0x80200000

BMP IMAGE

0x80200000

0x80b77660

STACK

0x80b77660

0x80b77e60

GD

0x80b77e60

0x80b78000

MALLOC

0x80b78000

0x80b80000

EMPTY

0x80b80000

0x80c80000

BSS

0x80c80000

0x80d00000

BLOBS

0x80d00000

0x80d00400

EMPTY

0x80d00400

0x81000000

Switch Setting for Boot Mode

Boot Mode pins provide means to select the boot mode and options before the device is powered up. After every POR, they are the main source to populate the Boot Parameter Tables.

The following table shows some common boot modes used on AM62Px platforms. More details can be found in the Technical Reference Manual: https://www.ti.com/lit/pdf/spruj83 under the Boot Mode Pins section.

Note

This device is very new. Currently only UART boot is available while we continue to add support for the other bootmodes.

Boot Modes

Switch Label

SW2: 12345678

SW3: 12345678

SD

01000000

11000010

OSPI

00000000

11001110

EMMC

00000000

11010010

UART

00000000

11011100

USB DFU

00000000

11001010

For SW2 and SW1, the switch state in the “ON” position = 1.

Falcon Mode

Falcon Mode on AM62px platforms bypasses the A53 SPL and U-Boot with the overall boot flow as below:

Normal boot flow:

         | tiboot3.bin |         tispl.bin          | u-boot.img |  Image  |
         |-------------+----------------------------+------------+---------|
R5 Core  |    SPL      |                            |            |         |
---------|       \     |                            |            |         |
A53 Core |        ------> TFA -> OP-TEE -> A53 SPL -->  U-Boot  --> Kernel |

With falcon mode:

         | tiboot3.bin |   tifalcon.bin   | fitImage |
         |-------------+------------------+----------|
R5 Core  |    SPL      |                  |          |
---------|       \     |                  |          |
A53 Core |        ------> TFA -> OP-TEE  -->  Kernel |

Build Process

Enabling falcon mode requires re-building TFA, U-Boot and the kernel fitImage as follows:

0. Setup environment variables:

Refer to the build procedure above for setting up the environment variables.

1. Trusted Firmware-A:

The R5 SPL in falcon mode loads the kernel at 0x82000000 and the corresponding DTB at 0x88000000. Therefore TFA needs to be rebuild with changes to the respective addresses.

# Change load addresses for the kernel and DTB
export TFA_EXTRA_ARGS="PRELOADED_BL33_BASE=0x82000000 K3_HW_CONFIG_BASE=0x88000000"
# inside trusted-firmware-a source
make CROSS_COMPILE=$CC64 ARCH=aarch64 PLAT=k3 SPD=opteed $TFA_EXTRA_ARGS \
     TARGET_BOARD=$TFA_BOARD

2. U-Boot:

  • 2.1 R5:

# use the common falcon config fragment for all K3 platforms
export $UBOOT_FALCON_CFG_FRAGMENTR="k3_r5_falcon.config"
export UBOOT_CFG_CORTEXR="${UBOOT_CFG_CORTEXR} ${UBOOT_FALCON_CFG_FRAGMENTR}"
# inside u-boot source
make $UBOOT_CFG_CORTEXR
make CROSS_COMPILE=$CC32 BINMAN_INDIRS=$LNX_FW_PATH
  • 2.2 A53:

After rebuilding TFA, the binary needs to be repackaged inside the tispl binaries:

# inside u-boot source
make $UBOOT_CFG_CORTEXA
make CROSS_COMPILE=$CC64 BINMAN_INDIRS=$LNX_FW_PATH \
       BL31=$TFA_PATH/build/k3/$TFA_BOARD/release/bl31.bin \
       TEE=$OPTEE_PATH/out/arm-plat-k3/core/tee-raw.bin

Note

It is also possible to pick up a custom DM binary by adding TI_DM argument pointing to the file. If not provided, it defaults to picking up the DM binary from BINMAN_INDIRS. This is only applicable to devices that utilize split firmware.

3. fitImage:

Warning

The fitImage available by default under boot/fitImage in rootfs of the standard SDK release is not compatible with falcon mode.

For authenticated boot in falcon mode, the compute heavy authentication required for the fitImage is offloaded from the slower R5 core to TIFS. This requires fitImage to package the necessary binaries (kernel and dtb) with a pre-signed x509 certificate.

fitImage for falcon mode:

fitImage for falcon boot image format

Follow the steps below to create a falcon compatible fitImage:

3.1 Environment setup

export DTB=path/to/dtb
export IMAGE=path/to/kernel-image

3.2 fitImage creation

An Image tree source (its) file describes the structure and contents of the final image produced by the mkimage tool.

To create the fitImage for falcon mode, create a file fitImage.its with the following contents inside the core-secdev-k3 source directory,:

/dts-v1/;

/ {
    description = "Kernel fitImage";
    #address-cells = <1>;

    images {
        kernel-sec {
            description = "Linux kernel";
            data = /incbin/("Image.sec");
            type = "kernel";
            arch = "arm64";
            os = "linux";
            compression = "none";
            load = <0x82000000>;
            entry = <0x82000000>;
        };

        fdt-sec {
            description = "Flattened Device Tree blob";
            data = /incbin/("falcon.dtb.sec");
            type = "flat_dt";
            arch = "arm64";
            compression = "none";
            load = <0x88000000>;
            entry = <0x88000000>;
        };
    };

    configurations {
        default = "conf-falcon";
        conf-falcon {
            description = "Pre-signed Linux kernel, FDT blob";
            kernel = "kernel-sec";
            fdt = "fdt-sec";
        };
    };
};

Sign the kernel and dtb using secure-binary-image.sh and create the fitImage using mkimage:

# inside core-secdev-k3 source
cp $IMAGE Image
cp $DTB falcon.dtb
./scripts/secure-binary-image.sh Image Image.sec
./scripts/secure-binary-image.sh falcon.dtb falcon.dtb.sec
mkimage -f fitImage.its fitImage

Usage

Falcon Mode makes use of a cut down variant of the tispl binary called tifalcon.bin with lacks the Cortex-A SPL and it’s DTBs. This file should be present alongside the existing tispl.bin after building U-Boot for the Cortex-A core.

  • tifalcon.bin

tifalcon.bin image format

The R5 SPL requires both tifalcon.bin and the fitImage (created in previous steps) to be present in the second partition of the MMC device specified by the mmcdev environment variable. By default, mmcdev is set to 1, which implies that the SD card is the boot media. Additionally, the bootpart environment variable, which defaults to 1:2, specifies that the second partition of the SD card should be used as the root file system for the kernel.

To use eMMC instead of SD as the boot media, rebuild the R5 SPL with the following diff:

diff --git a/board/ti/<soc>/<soc>.env b/board/ti/<soc>/<soc>.env
index 82b9f0741bb..73d59ac425c 100644
--- a/board/ti/<soc>/<soc>.env
+++ b/board/ti/<soc>/<soc>.env
@@ -17,8 +17,8 @@ run_kern=booti ${loadaddr} ${rd_spec} ${fdtaddr}

 boot_targets=mmc1 mmc0 usb pxe dhcp
 boot=mmc
-mmcdev=1
-bootpart=1:2
+mmcdev=0
+bootpart=0:1
 bootdir=/boot
 rd_spec=-

List of files required on SD/eMMC for Falcon Mode:

File

Copy path on SD/eMMC

Partition

Description

tifalcon.bin

/boot/tifalcon.bin

rootfs (ext4)

tispl binary without SPL for the A core and DTB

fitImage

/boot/fitImage

rootfs (ext4)

kernel and dtb fitImage with pre-signed binaries

Note

Falcon mode requires the boot binaries to be present in the root file system of either eMMC or SD, even when using raw eMMC boot mode to load tiboot3.bin.

R5 SPL Memory Map

Standard Boot:

0x80000000 +===============================+ Start of DDR
  512KiB   |   TFA reserved memory space   | CONFIG_K3_ATF_LOAD_ADDR
           |                               |
0x80080000 +-------------------------------+ PRELOADED_BL33_BASE in TFA
 29.5MiB   |         A53 SPL + DTB +       | CONFIG_SPL_LOAD_FIT_ADDRESS
           | Download region for FIT in DFU|
0x81e00000 +-------------------------------+
           |  R5 U-Boot SPL Stack + Heap   |
    2MiB   |       (size defined by        |
           | SPL_STACK_R_MALLOC_SIMPLE_LEN)|
0x82000000 +-------------------------------+ CONFIG_SPL_STACK_R_ADDR
  112MiB   |            Unused             |
0x89000000 +-------------------------------+
  331MiB   | Device Manager (DM) Load Addr |
0x9db00000 +-------------------------------+
   12MiB   |          DM Reserved          |
0x9e700000 +-------------------------------+
    1MiB   |            Unused             |
0x9e800000 +-------------------------------+ BL32_BASE in TFA
   24MiB   |             OPTEE             |
0xa0000000 +===============================+ End of DDR (512MiB)

Falcon Mode:

0x80000000 +===============================+ Start of DDR
  512KiB   |   TFA reserved memory space   | CONFIG_K3_ATF_LOAD_ADDR
0x80080000 +-------------------------------+
 31.5MiB   |            Unused             |
0x82000000 +-------------------------------+ PRELOADED_BL33_BASE in TFA
           |                               | CONFIG_SYS_LOAD_ADDR
   57MiB   |   Kernel + initramfs Image    | CONFIG_SPL_LOAD_FIT_ADDRESS
           |                               |
0x85900000 +-------------------------------+
           |                               |
           |  R5 U-Boot SPL Stack + Heap   |
   39MiB   |       (size defined by        |
           | SPL_STACK_R_MALLOC_SIMPLE_LEN)|
           |                               |
0x88000000 +-------------------------------+ CONFIG_SPL_STACK_R_ADDR
           |                               | K3_HW_CONFIG_BASE in TFA
   16MiB   |          Kernel DTB           | CONFIG_SPL_PAYLOAD_ARGS_ADDR
           |                               |
0x89000000 +-------------------------------+
  331MiB   | Device Manager (DM) Load Addr |
0x9db00000 +-------------------------------+
   12MiB   |          DM Reserved          |
0x9e700000 +-------------------------------+
    1MiB   |            Unused             |
0x9e800000 +-------------------------------+ BL32_BASE in TFA
   24MiB   |             OPTEE             |
0xa0000000 +===============================+ End of DDR (512MiB)

Debugging U-Boot

See Common Debugging environment - OpenOCD: for detailed setup information.

Warning

OpenOCD support after: v0.12.0

While support for the entire K3 generation including the am62xxx extended family was added before v0.12.0, the tcl scripts for the am62px have been accepted and will be available in the next release of OpenOCD. It may be necessary to build OpenOCD from source depending on the version your distribution has packaged.

Integrated JTAG adapter/dongle: The board has a micro-USB connector labelled XDS110 USB or JTAG. Connect a USB cable to the board to the mentioned port.

Note

There are multiple USB ports on a typical board, So, ensure you have read the user guide for the board and confirmed the silk screen label to ensure connecting to the correct port.

To start OpenOCD and connect to the board

openocd -f board/ti_am62pevm.cfg