Versal ACAP System Software Developers Guide

Total Page:16

File Type:pdf, Size:1020Kb

Versal ACAP System Software Developers Guide See all versions of this document Versal ACAP System Software Developers Guide UG1304 (v2020.2) March 1, 2021 Revision History Revision History The following table shows the revision history for this document. Section Revision Summary 03/01/2021 Version 2020.2 Chapter 3: Development Tools Added AI Engine Development Environment. Chapter 6: Software Design Paradigms Updated Virtualization with Hypervisor and Use of Hypervisors. 11/24/2020 Version 2020.2 PLM Boot and Configuration Updated JTAG information and added more PLM error codes. Added PLM Watch Dog Timer details for PLM Interface (XilPLMI). Updated Deferred Image Loading and Deferred Image Handoff details for XilLoader. Updated PLM Build Flags and Memory and Registers Reserved for PLM in PLM Usage. Chapter 9: Security Updated details of ECDSA-RSA hardware accelerator and AES-GCM hardware Crypto block. Chapter 10: Versal ACAP Platform Management Updated XPm_DevIoctl EEMI API. 07/16/2020 Version 2020.1 Initial release. N/A UG1304 (v2020.2) March 1, 2021Send Feedback www.xilinx.com Versal ACAP System Software Developers Guide 2 Table of Contents Revision History...............................................................................................................2 Chapter 1: Overview......................................................................................................6 Introduction to Versal ACAP.......................................................................................................6 Navigating Content by Design Process.................................................................................... 7 About This Guide......................................................................................................................... 8 Chapter 2: Programming View of Versal ACAP.............................................. 9 Hardware Overview.................................................................................................................. 10 Chapter 3: Development Tools.............................................................................. 19 Vivado Design Suite.................................................................................................................. 19 Vitis Software Platform............................................................................................................. 20 PetaLinux Tools..........................................................................................................................24 Device Tree Generator..............................................................................................................25 Open Source.............................................................................................................................. 26 Linux Software Development Using Yocto.............................................................................27 QEMU..........................................................................................................................................29 AI Engine Development Environment.................................................................................... 32 Chapter 4: Software Stack....................................................................................... 35 Bare-Metal Software Stack.......................................................................................................35 Linux Software Stack.................................................................................................................38 Third-Party Software Stack.......................................................................................................40 Chapter 5: Software Development Flow.......................................................... 41 Bare-Metal Application Development in the Vitis Environment .........................................42 Linux Application Development Using PetaLinux Tools.......................................................43 Linux Application Development Using the Vitis Software Platform....................................44 Chapter 6: Software Design Paradigms........................................................... 47 Frameworks for Multiprocessor Development......................................................................47 Symmetric Multiprocessing..................................................................................................... 48 UG1304 (v2020.2) March 1, 2021Send Feedback www.xilinx.com Versal ACAP System Software Developers Guide 3 Asymmetric Multiprocessing .................................................................................................. 50 Chapter 7: Boot and Configuration.................................................................... 55 Versal ACAP Boot Process........................................................................................................ 55 Boot Flow....................................................................................................................................61 Secondary Boot Process and Device Choices........................................................................ 64 Fallback Boot and MultiBoot....................................................................................................65 Programmable Device Image..................................................................................................67 Configuration Data Object....................................................................................................... 68 Boot Image (PDI) Creation.......................................................................................................68 Chapter 8: Platform Loader and Manager .................................................... 71 PLM Boot and Configuration................................................................................................... 71 PLM Software Details................................................................................................................75 PLM Interface (XilPLMI)............................................................................................................ 85 XilLoader.....................................................................................................................................95 XilPM........................................................................................................................................... 98 XilSecure..................................................................................................................................... 99 XilSEM....................................................................................................................................... 100 PLM Usage............................................................................................................................... 100 Services Flow............................................................................................................................103 Exception Handling.................................................................................................................103 Chapter 9: Security.....................................................................................................104 Security Features.....................................................................................................................104 Asymmetric Hardware Root-of-Trust (A-HWRoT) (Authentication Required)................. 107 Encryption................................................................................................................................ 108 Symmetric Hardware Root-of-Trust (S-HWRot) Boot Mode (Encryption Required)....... 109 Chapter 10: Versal ACAP Platform Management......................................110 Versal ACAP Platform Management Overview.................................................................... 111 Versal ACAP Power Domains................................................................................................. 111 Versal ACAP Platform Management Software Architecture.............................................. 114 Chapter 11: Target Development Platforms................................................161 Boards and Kits........................................................................................................................161 Appendix A: Libraries............................................................................................... 162 Appendix B: Additional Resources and Legal Notices........................... 163 UG1304 (v2020.2) March 1, 2021Send Feedback www.xilinx.com Versal ACAP System Software Developers Guide 4 Xilinx Resources.......................................................................................................................163 Documentation Navigator and Design Hubs...................................................................... 163 References................................................................................................................................163 Please Read: Important Legal Notices................................................................................. 165 UG1304 (v2020.2) March 1, 2021Send Feedback www.xilinx.com Versal ACAP System Software Developers Guide 5 Chapter 1: Overview Chapter 1 Overview Introduction to Versal ACAP Versal™ adaptive compute acceleration platforms (ACAPs) combine Scalar Engines, Adaptable Engines, and Intelligent Engines with leading-edge memory and interfacing technologies
Recommended publications
  • Q.20 One Online Training Topic That Would Be Most Useful System
    Q.20 One online training topic that would be most useful system administration system configuration/infrastructure management Maybe something on operating system design. No idea, online training is a little odd, I'm not sure if I get full benefit from it. File and storage technologies security best practices Linux administration best practices / theory of system administration in-depth implementation of security techniques I guess New tools/languages: python, map reduce, Ajax, whatever web 2.0 is running on these days... intermediate security-related courses Mac - Windows integration issues Computer Security Better and more organized content is more important than topic Hard to say right now given the nature of my current position. Security Web 2.0 programming Virtualization dealing with management & other problems in large organizations programming Security and Networked Systems Secure Development Managing multiple systems with Puppet. Advanced Iptables configuration and security related items. Performance tuning for various system architectures Security clustering VM UNIX kernel performance monitoring and tuning. large system patch management methodologies Unix Internals. Deploying virtual infrastructure. Compilers or computer languages. Maybe something based around this book: Types and Programming Languages Benjamin C. Pierce New technologies system clustering Integration of Unix/Linux with Microsoft systems. Security Security 1 hrm. split between project management for sysadmins and documentation for sysadmins. Multiplatform configuration management distributed computing Virtualization storage Linux kernel Storage Networking integrated systems administration j2ee performance tuning Linux programming Web development and/or OO system software Professional development Security operating systems research Network Technology, such as CCNA/CCNP Unix<->Windows integration OS and networking research topics covered at LISA New storage technologies and new programming languages.
    [Show full text]
  • Mining Software Repositories to Determine the Impact of Team Factors on the Structural Attributes of Software
    Mining Software Repositories to Determine the Impact of Team Factors on the Structural Attributes of Software Ahmmad Youssef Supervisors: Dr. Andrea Capiluppi Prof. Tracy Hall Department of Computer Science Brunel University, London This dissertation is submitted for the degree of Doctor of Philosophy June 2019 Declaration I hereby declare that, except where specific reference is made to the work of others, the con- tents of this thesis is original and has not been submitted in whole or in part for consideration for any other degree or qualification in this, or any other, University. This thesis is theresult of my own work and includes nothing which is the outcome of work done in collaboration, except where specifically indicated in the text. Ahmmad Youssef June 2019 Acknowledgements I would first like to express my immense gratitude and appreciation to Dr. Andrea Cappiluppi for his unwavering patience, encouragement, and commitment while supervising this work. I have grown as a researcher, a professional, and as a person and that is due to his mentorship over the past decade. I would also like to thank Prof. Tracy Hall and Prof. Cornelia Boldyreff for their invaluable input that has made this research undoubtedly more robust and, in the process, enhanced my skills as a researcher. My thanks are also due to my examiners, Prof. Steve Counsell and Dr. Michel Wermelinger for their diligent and constructive feedback and for making my thesis defense a truly enjoyable process. Last but certainly not least, a great debt of gratitude is due to my family. My grandmother and my parents were tireless in their support of this work and my loving wife made personal sacrifices to allow me the platform to take this research to its successful conclusion.
    [Show full text]
  • Gordon Tetlow San Diego, CA (858) 673-7176 [email protected]
    Gordon Tetlow San Diego, CA (858) 673-7176 [email protected] Highly skilled systems engineer turned technical manager. Seven years management experience of both Technical Operations and Security Engineering teams. 15+ years experience administering multiple UNIX variants. 10+ years working in large-scale infrastructure (5000+ hosts). Comprehensive systems and security architecture experience. Understanding of business issues and able to interpret into actionable items. Experience with everything from systems, security, and networking to compliance, vendor and people management. Experience ServiceNow, Inc. San Diego, CA Sr. Manager, Security Engineering May 2012 - Present Management Responsibilities and Accomplishments: ● Responsible for security program for all production and IT assets. ● Led the technical team responsible for achieving concurrent compliance goals for ISO27001, SSAE16 Type II, and FISMA Moderate. All of these goals were achieved in 9 months. ● Key implementation owner to achieve FedRAMP Moderate certification through FedRAMP JAB. ● Ground floor manager in Security organization as headcount increased from 6 to over 85 employees. ● Acted as an incubator environment for new teams during build up of Security organization. Successfully built and spun out the following teams to become sister groups: Product Security, Security Operations, and Identity and Access Management. ● Re-established vendor relationships that had been dropped due to management turnover. Leveraged renewed vendor relationships to effectively implement security solutions. ● Established budgetary numbers for Security Engineering team. ● Establish relationships with peer groups in the organization to advocate Security throughout the organization. ● Directly interfaced with customers to identify, understand, mitigate and remediate potential issues during both pre- and post-sale phase. ● Wrote and trained on the initial Security Incident Response Process.
    [Show full text]
  • FILE HOSE: Macos App -- Accelerated File Transfer
    FILE HOSE: LIC™ MacOS App MacOS™ based high speed, highly secure file transfer application designed to bring professional quality file transfer capabilities to small to midsize users who do not wish to engage with high end service providers. This application is available to be run on sets of computers that are secured behind firewalls and have reliable internet connections. This application is available for both end users and OEMs who wish to integrate this Overview capability into their daily data center activities. Large file transfers between data centers or servers via the internet are essential tasks performed by all organizations Features with some anxiety. Most of the time transfers are successful but evidence is there that as the data sets being transferred 1000x faster than standard FTP transfer get larger the likelihood of failure increases. Such data sets Our patented DOZER™ technology are invaluable to the organization and must be sent via completely encrypted connections between the two eliminates the bottlenecks of TCP and computers. Reliability, security, and speed are essential delivers maximum transfer speed functions to this type of activity. regardless of internet conditions There are several large multinational firms that specialize in Utilizes watch folder to move files providing this as a service. DVEO on the other hand wishes to disrupt this market by offering the capability as an Automatic retry and resumes if affordable application to be installed and used on any two connection is interrupted computers that can connect via the internet. We assume that both computers are secure and reside behind corporate Creates an UDP encrypted one way firewalls.
    [Show full text]
  • Exercises: Post Freebsd Install: Pacnog I Workshop
    Exercises: Post FreeBSD Install: PacNOG I Workshop June 20, 2005 Please do not change the root password on your machine for any reason! Your instructor may indicate some updates or changes to these exercises. The initial exercises are to finalize our machine configurations for use later today, Tuesday and Wednesday, as well as to highlight some areas that are different from Linux - particularly methods by which you can install software. During these exercises we reference the machine named "noc". This is the classroom server box. It's fully qualified name for this workshop is noc.pacnog.school.fj, but just "noc" should work as well. Exercises Final Configuration 1. Use pw to create a new userid that you will use instead of root 2. Use /stand/sysinstall and pkg_add to install lynx, bash, sudo and joe 3. Installing two more packages (gmake, unzip) 4. Installation of software using ports 5. Setup sudo for privileged commands 6. Installing/configuring X11 (Xorg), Gnome and gdm Some Differences from Linux 7. Process startup and the RC system 8. Disk partitions: how to view your disk 9. Getting help using manpages, docs, and the FreeBSD Handbook 10. Shutdown and reboot your system For Those who Want More Practice 11. Initial login, virtual terminals, command line manipulation 12. General job control (ctrl-c, ctrl-z, bg) 13. Processes and stopping them 14. Use top to see the state of your system 15. Create a file and use vi to edit the file 16. Using vipw to edit a user entry 17. Practice with basic filesystem commands 18.
    [Show full text]
  • Exercises: Post Freebsd Install: IP Services Workshop SANOG 9
    Exercises: Post FreeBSD Install: IP Services Workshop SANOG 9 January 14, 2007 Please do not change the root password on your machine for any reason! PLEASE: Read everything on this sheet to properly complete these exercises Your instructor may indicate some updates or changes to these exercises. The initial exercises are to finalize our machine configurations for use later today, and throughout the week, as well as to highlight some areas that are different from Linux - particularly methods by which you can install software. Exercises To Be Done by Everyone: Final Configuration 1. Edit /etc/make.conf and /etc/hosts 2. Use sysinstall and pkg_add to install lynx, bash, sudo and joe 3. Installing two more packages (gmake, unzip) 4. Installation of software using ports 5. Use pw to create a new userids that you will use instead of root 6. Setup sudo for privileged commands 7. Start a Caching Nameserver 8. Installing/configuring X11 (Xorg), Gnome and gdm Some Differences from Linux 9. FreeBSD package (pkg) and ports Systems Revisited (Recommended) 10. Process startup and the RC system 11. Disk partitions: how to view your disk 12. Getting help using manpages, docs, and the FreeBSD Handbook 13. Shutdown and reboot your system 14. Initial login, virtual terminals, command line manipulation For Those who Want More Practice 15. Additional exercises (Ask your instructor for these if you are using paper handouts) Notes (CRITICAL) 1. The "#" and "$" characters before commands represents your system prompt and is not part of the command itself. "#" indicates a command issued as root while "$" indicates a command issued as a normal user.
    [Show full text]
  • Multi-Version Software Quality Analysis Through Mining Software Repositories
    Master Thesis Project Multi-version software quality analysis through mining software repositories Author: Illia Kriukov Supervisor: Welf Löwe Examiner: Shiyan Hu Reader: Shiyan Hu Semester: HT 2017 Course Code: 4DV50E Subject: Computer Science Abstract The main objective of this thesis is to identify how the software repository features influence software quality during software evolution. To do that the mining software repository area was used. This field analyzes the rich data from software repositories to extract interesting and actionable information about software systems, projects and software engineering. The ability to measure code quality and analyze the impact of software repository features on software quality allows us to better understand project history, project quality state, development processes and conduct future project analysis. Existing work in the area of software quality describes software quality analysis without a connection to the software repository features. Thus they lose important information that can be used for preventing bugs, decision-making and optimizing development processes. To conduct the analysis specific tool was developed, which cover quality measurement and repository features extraction. During the research general procedure of the software quality analysis was defined, described and applied in practice. It was found that there is no most influential repository feature and the correlation between software quality and software repository features exist, but it is too small to make a real influence. Keywords: software quality analysis, mining software repositories, software repository features, quality measurement, quality metrics. 2 Abbreviations MSR – Mining software repositories. KPI – Key performance indicator. VCS – Version control system. SCM – Source code management. CVS – Concurrent Versions System. SVN – Apache Subversion.
    [Show full text]
  • Linux System Administrator Resume
    Linux System Administrator Resume triennially.Gregorio is Frank adulterating retime hisand thingumajigs constipating albumenisesdispersedly as locally pedagoguish or leastways Dana after reveals Simmonds soporiferously double-stops and westernize and glozed tirelesslyfrowningly, and stormiest languorously, and overriding. how interradial If capsulate is Osbourn? or uncropped Saxe usually dines his Midgard evoking prissily or vernalize Companies and system linux administrator sets clear and linux Knowledge of VDI technologies. Are you an Employer? If your GPA was particularly high, network security, which an ATS scans for and prioritizes. That email is too long. Science in Computer Information and desirous of becoming Senior Systems Administrator for Edgemont Technologies, Ansible, Qatar professionally satisfying growth challenging. Microsoft Security Patch Management, NIS, data management and management. Shows the Silver Award. Even include your GPA if you desire. Find your industry and use an existing template, this can invigorate and enrich my skills to the maximum. Include the name of the university you attended, Apache Server. IP, netstat and nmon. Be prepared to talk salary. Solaris, software, so you must understand how they work. Installed software, such as Red Hat Satellite, configure and operate but also system. Windows System Administrator Resume Sample One is one of three resumes for this position that you may review or download. Having the proven temperament to engage. Nowdays, send a system administrator resume PDF unless the job ad says not to. Tested and applied new software and programs. IT system, supporting users in solving their problems. Of Science in information Technology expertise, verifying the integrity and availability of all hardware, etc. Engaged system administrator looking for new job with room for advancement.
    [Show full text]
  • Contributors to Freebsd Revision: 751E8bc383
    Contributors to FreeBSD Revision: 751e8bc383 FreeBSD is a registered trademark of the FreeBSD Foundation. Sun, Sun Microsystems, Java, Java Virtual Machine, JDK, JRE, JSP, JVM, Netra, OpenJDK, Solaris, StarOffice, SunOS and VirtualBox are trademarks or registered trademarks of Sun Microsys- tems, Inc. in the United States and other countries. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the “™” or the “®” symbol. 2021-01-17 11:53:26 +0100 by Lutz Donnerhacke. Abstract This article lists individuals and organizations who have made a contribution to FreeBSD. Table of Contents 1. Donors Gallery ........................................................................................................................ 1 2. The FreeBSD Developers ............................................................................................................ 3 3. Core Team Alumni .................................................................................................................. 16 4. Development Team Alumni ....................................................................................................... 18 5. Ports Management Team Alumni ............................................................................................... 33 6. Development Team: In Memoriam .............................................................................................
    [Show full text]
  • NOCPS Manual
    NOC-PS manual Copyright © Maxnet 2009-2015 All rights reserved Page 1/45 NOC-PS Manuel – EN – version 1.3 Table of contents Installation..................................................................................................................................................3 System requirements.............................................................................................................................3 Network setup........................................................................................................................................5 Installation under Vmware Vsphere......................................................................................................8 Installation under Citrix Xenserver.....................................................................................................10 Initial configuration.............................................................................................................................12 Overview of web interface.......................................................................................................................13 Overview of the available menu options:............................................................................................14 Adding new servers..................................................................................................................................15 Automated server installations (provisioning).........................................................................................18
    [Show full text]