Ming-Wei Aeva Black [He/Him] [They/Them] Software Open Source Engineer Program Manager

Total Page:16

File Type:pdf, Size:1020Kb

Ming-Wei Aeva Black [He/Him] [They/Them] Software Open Source Engineer Program Manager Ming-Wei Aeva Black [he/him] [they/them] Software Open Source Engineer Program Manager https://github.com/mingweishih @aevavoom aevaonline The Confidential Computing Consortium › Community focused on open source licensed projects securing data in use and accelerating the adoption of confidential computing through open collaboration › Announced the intent to form in August at the Open Source Summit North America in San Diego, formally launched on 17 October 2019 with governance in place Please visit https://confidentialcomputing.io Associate General Premier Introduction to Open Enclave SDK Ming-Wei Shih, Microsoft github.com/openenclave/openenclave Confidential Computing Consortium Webinar 2021 Confidential Computing 101 Enclave SSL/TLS Data in transit Data in use Hardware-based Trusted Execution Environment (TEE) Hacker, System admin, Cloud provider… Disk Encryption Data at rest Requirements for Developing Enclave Programs Instantiation Runtime Attestation Load a binary into an enclave Support high-level language Allow remote parties to verify from the untrusted host features inside the enclave the identity of the enclave Requirement: TEE-specific Requirement: conforming Requirement: supporting loaders TEE’s security model attestation primitives - Interact with TEE hardware - Host memory is untrusted - Evidence generation and drivers - Only the enclave can send - Evidence verification data to the host Open Enclave SDK: An Open-source C/C++ SDK for Enclave Programs Instantiation Runtime Attestation Multi-TEE Loader Support: Multi-OS Support: Attestation Plugin APIs: Intel SGX Linux, Windows SGX Plugins ARM TrustZone (preview) Ported C POSIX Library (musl) Other 3rd party Libraries: LLVM libc++, Mbed TLS, OpenSSL Architecture Host (untrusted) Enclave Host Program Enclave Program Open Enclave OE Attestation Plugins Software Stack LLVM libc++ OpenSSL Mbed TLS Open Enclave Host Libraries Open Enclave Trusted boundary musl libc Open Enclave Runtime Libraries TEE Components Intel SGX Libraries OP-TEE Intel SGX ARM TrustZone Programming Model Host Program Enclave Program Input: signed binary The enclave program takes the form in ELF for both Linux and Windows Load the binary Enclave creation Tool to sign an ELF binary Invoke an enclave function (ECALL) APIs to create and terminate an enclave Invoke a host function (OCALL) Return to the enclave Tool to generate edge routines that handle parameters passing for ECALLs, OCALLs Return to the host Enclave termination Minimal Project: Helloworld helloworld ├── host │ ├── host.c │ ├── Makefile │ ├── helloworld_u.c, helloworld_u.h ├── enclave Build-time generated │ ├── enclave.c files for edge routines │ ├── enclave.conf │ ├── Makefile │ ├── helloworld_t.c, helloworld_t.h ├── helloworld.edl ├── Makefile Example of Edge Routine Generations helloworld.edl enclave { ECALLs/OCALLs are defined via an EDL file from "openenclave/edl/syscall.edl" import *; from "openenclave/edl/sgx/platform.edl" import *; The oeedger8r tool generates the boundary code in C for both the host and enclave trusted { - Host public void enclave_helloworld(); $oeedger8r --untrusted }; helloworld.edl –-search-path ECALL /opt/openenclave/include untrusted { - Enclave void host_helloworld(); $oeedger8r --trusted }; helloworld.edl –-search-path }; OCALL /opt/openenclave/include Learn more at: github.com/openenclave/oeedger8r-cpp Host and Enclave Programs host.c enclave.c int main(int argc, const char* argv[]) void enclave_helloworld() { { oe_enclave_t* enclave = NULL; printf(“Hello world from the enclave\n”); oe_create_helloworld_enclave( ECALL arg[1], OE_ENCLAVE_TYPE_AUTO, host_helloworld(); 1, NULL, 0, &enclave); } enclave_helloworld(enclave); OCALL Sign oe_terminate_enclave(enclave); $oesign sign –e enclave \ return 0; –c enclave.conf –k key.pem } void host_helloworld() Run { $./host enclave.signed printf(“Hello world from the host\n”); Hello world from the enclave } Hello world from the host ECALL Behind the Scene Host Program Enclave Program enclave_helloworld(enclave); void enclave_helloworld() { printf(“Hello world from the enclave\n”); host_helloworld(); } Host-side ECALL routine Enclave-side ECALL routine Serialize arguments into buffers Copy the host buffers into enclave memory Transfer execution to the enclave Unserialize and sanitize the arguments Unserialize the return values from host buffers Invoke enclave_helloworld() Return to the invocation of the ECALL Serialize return values into buffers Copy the buffers into host buffers Transfer execution back to the host OCALL Behind the Scene Host Program Enclave Program void host_helloworld() void enclave_helloworld() { { printf(“Hello world from the host\n”); printf(“Hello world from the enclave\n”); } host_helloworld(); } Host-side OCALL routine Enclave-side OCALL routine Unserialize and sanitize the arguments Serialize arguments into buffers Invoke host_helloworld() Copy the buffers into host memory Serialize return values into buffers Transfer execution to the host Transfer execution back to the enclave Unserialize and copy the return values from host buffers Return to the invocation of the OCALL Remote Attestation Plugins Design to support TEE-specific attestation - SGX plugins Attestation Service (Microsoft Attestation Service) Enclave Program APIs to generate and verify quotes - oe_get_evidence() - oe_verify_evidence() oe_verify_evidence() oe_get_evidence() TEE Components (Intel SGX DCAP libraries) Additional Features Features Tools More (planned or unplanned) • Logging callback APIs • Debuggers • FIPS Module Loading • Sealing APIs • GDB • Improve syscall/libc Support • Deep-copy for ECALLs/OCALLs • WinDbg • High-level Language Binding • Pluggable Allocators • IDE Extensions (e.g., Rust) • Debug Malloc • Visual Studio • Simulation Mode • VS Code • Package Manager • apkman (experimental) apkman: Package Manager for OE SDK Typical workflow to add a 3rd party library to enclaves git clone https://github.com/protocolbuffers/protobuf.git → (….. Manual porting …..) → Build the library Use the library in an enclave program Ideal workflow on Linux #include <google/protobuf/util/json_util.h> sudo apt install libprotobuf-dev … google::protobuf::util::MessageToJsonString(…) Workflow with apkman apkman add libprotobuf-dev Link clang -o enclave enclave.o libprotobuf.a … (*) apkman is a bash script, created by the OE-SDK dev team. Learn more at: github.com/anakrish/apkman apkman Design Based on the apk tool: the package Alpine Linux Packages manager for Alpine Linux The libraries built for Alpine Linux is based on musl libc apk → Compatible with OE Enclave protobuf lua Enclave program sqlite curl zlib apkman libprotobuf.a PRoot alpine-fs Open Enclave libs Linux Host apkman add libprotobuf-dev Demo: apkman Position in the Ecosystem Write an enclave program from the ground-up Foundation for building a high-level framework with the lower TCB - Confidential Consortium Framework (CCF) - Azure cloud services - EdgelessRT - SGX-LKL - Mysitkos Unmodified Rust Go Blockchain App App App App Host Enclave High-Level Framework for Normal Code Security-Critical Code Confidential Computing Apps Open Enclave (TEE Abstraction) TEE Use Case: Mystikos Application (rootfs) libc calls* C runtime (libmyst-crt.so) system calls* trusted execution User-mode kernel (libsmyst-kernel.so) MIT license target calls* Targets Open Enclave (SGX) Linux host calls* Host OS Mystikos * most calls terminate in trusted code Learn more at: github.com/deislabs/mystikos Demo: Mystikos How to Get Involved • Open Enclave on Github github.com/openenclave/openenclave • Follow the Docs to write your own enclave programs! • Contribute • Use github issues to report bugs, ask questions, and provide feedbacks • Search issues with the good first issue label • Submit pull requests • Weekly open meetings: lists.confidentialcomputing.io/g/oesdk/calendar • Triage meeting: Monday 10 AM PST • SIG Architecture meeting: Tuesday 11 AM PST • SIG Attestation meeting: Wednesday 10 AM PST Questions? Open Enclave SDK github.com/openenclave/openenclave Ming-Wei Shih, @mingweishih Microsoft Azure Confidential Compute.
Recommended publications
  • Concurrent Cilk: Lazy Promotion from Tasks to Threads in C/C++
    Concurrent Cilk: Lazy Promotion from Tasks to Threads in C/C++ Christopher S. Zakian, Timothy A. K. Zakian Abhishek Kulkarni, Buddhika Chamith, and Ryan R. Newton Indiana University - Bloomington, fczakian, tzakian, adkulkar, budkahaw, [email protected] Abstract. Library and language support for scheduling non-blocking tasks has greatly improved, as have lightweight (user) threading packages. How- ever, there is a significant gap between the two developments. In previous work|and in today's software packages|lightweight thread creation incurs much larger overheads than tasking libraries, even on tasks that end up never blocking. This limitation can be removed. To that end, we describe an extension to the Intel Cilk Plus runtime system, Concurrent Cilk, where tasks are lazily promoted to threads. Concurrent Cilk removes the overhead of thread creation on threads which end up calling no blocking operations, and is the first system to do so for C/C++ with legacy support (standard calling conventions and stack representations). We demonstrate that Concurrent Cilk adds negligible overhead to existing Cilk programs, while its promoted threads remain more efficient than OS threads in terms of context-switch overhead and blocking communication. Further, it enables development of blocking data structures that create non-fork-join dependence graphs|which can expose more parallelism, and better supports data-driven computations waiting on results from remote devices. 1 Introduction Both task-parallelism [1, 11, 13, 15] and lightweight threading [20] libraries have become popular for different kinds of applications. The key difference between a task and a thread is that threads may block|for example when performing IO|and then resume again.
    [Show full text]
  • User's Manual
    rBOX610 Linux Software User’s Manual Disclaimers This manual has been carefully checked and believed to contain accurate information. Axiomtek Co., Ltd. assumes no responsibility for any infringements of patents or any third party’s rights, and any liability arising from such use. Axiomtek does not warrant or assume any legal liability or responsibility for the accuracy, completeness or usefulness of any information in this document. Axiomtek does not make any commitment to update the information in this manual. Axiomtek reserves the right to change or revise this document and/or product at any time without notice. No part of this document may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of Axiomtek Co., Ltd. Trademarks Acknowledgments Axiomtek is a trademark of Axiomtek Co., Ltd. ® Windows is a trademark of Microsoft Corporation. Other brand names and trademarks are the properties and registered brands of their respective owners. Copyright 2014 Axiomtek Co., Ltd. All Rights Reserved February 2014, Version A2 Printed in Taiwan ii Table of Contents Disclaimers ..................................................................................................... ii Chapter 1 Introduction ............................................. 1 1.1 Specifications ...................................................................................... 2 Chapter 2 Getting Started ......................................
    [Show full text]
  • Cg 2015 Huong Vu Thanh
    c 2015 Huong Vu Thanh Luu OPTIMIZING I/O PERFORMANCE FOR HIGH PERFORMANCE COMPUTING APPLICATIONS: FROM AUTO-TUNING TO A FEEDBACK-DRIVEN APPROACH BY HUONG VU THANH LUU DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate College of the University of Illinois at Urbana-Champaign, 2015 Urbana, Illinois Doctoral Committee: Professor Marianne Winslett, Chair Professor William Gropp, Director of Research Professor Marc Snir Dr Robert Ross, Argonne National Laboratory ABSTRACT The 2014 TOP500 supercomputer list includes over 40 deployed petascale systems, and the high performance computing (HPC) community is working toward developing the first exaflop system by 2023. Scientific applications on such large-scale computers often read and write a lot of data. With such rapid growth in computing power and data intensity, I/O continues to be a challenging factor in determining the overall performance of HPC applications. We address the problem of optimizing I/O performance for HPC applica- tions by firstly examining the I/O behavior of thousands of supercomputing applications. We analyzed the high-level I/O logs of over a million jobs rep- resenting a combined total of six years of I/O behavior across three leading high-performance computing platforms. Our analysis provides a broad por- trait of the state of HPC I/O usage. We proposed a simple and e↵ective analysis and visualization procedure to help scientists who do not have I/O expertise to quickly locate the bottlenecks and inefficiencies in their I/O ap- proach. We proposed several filtering criteria for system administrators to find application candidates that are consuming system I/O resources ineffi- ciently.
    [Show full text]
  • Shared Memory Programming
    Outline •" Parallel Programming with Threads Shared Memory Programming: •" Parallel Programming with OpenMP •" See parlab.eecs.berkeley.edu/2012bootcampagenda •" 2 OpenMP lectures (slides and video) by Tim Mattson Threads and OpenMP •" openmp.org/wp/resources/ •" computing.llnl.gov/tutorials/openMP/ •" portal.xsede.org/online-training Lecture 6 •" www.nersc.gov/assets/Uploads/XE62011OpenMP.pdf •" Slides on OpenMP derived from: U.Wisconsin tutorial, which in turn were from LLNL, NERSC, U. Minn, and OpenMP.org James "Demmel •" See tutorial by Tim Mattson and Larry Meadows presented at www.cs.berkeley.edu/~demmel/cs267_Spr16/! SC08, at OpenMP.org; includes programming exercises ! •" (There are other Shared Memory Models: CILK, TBB…) •" Performance comparison •" Summary CS267 Lecture 6! 1! 02/04/2016 CS267 Lecture 6! 2! Recall Programming Model 1: Shared Memory •" Program is a collection of threads of control. •" Can be created dynamically, mid-execution, in some languages •" Each thread has a set of private variables, e.g., local stack variables •" Also a set of shared variables, e.g., static variables, shared common Parallel Programming blocks, or global heap. with Threads" •" Threads communicate implicitly by writing and reading shared variables. •" Threads coordinate by synchronizing on shared variables Shared memory s s = ... y = ..s ... i: 2 i: 5 Private i: 8 memory P0 P1 Pn CS267 Lecture 6! 3! 02/04/2016 CS267 Lecture 6! 4! CS267 Lecture 2 1 Shared Memory Programming Common Notions of Thread Creation Several Thread Libraries/systems
    [Show full text]
  • Embedded Multicore: an Introduction
    Embedded Multicore: An Introduction EMBMCRM Rev. 0 07/2009 How to Reach Us: Home Page: www.freescale.com Web Support: http://www.freescale.com/support Information in this document is provided solely to enable system and software USA/Europe or Locations Not Listed: implementers to use Freescale Semiconductor products. There are no express or Freescale Semiconductor, Inc. implied copyright licenses granted hereunder to design or fabricate any integrated Technical Information Center, EL516 circuits or integrated circuits based on the information in this document. 2100 East Elliot Road Tempe, Arizona 85284 Freescale Semiconductor reserves the right to make changes without further notice to +1-800-521-6274 or any products herein. Freescale Semiconductor makes no warranty, representation or +1-480-768-2130 www.freescale.com/support guarantee regarding the suitability of its products for any particular purpose, nor does Freescale Semiconductor assume any liability arising out of the application or use of Europe, Middle East, and Africa: Freescale Halbleiter Deutschland GmbH any product or circuit, and specifically disclaims any and all liability, including without Technical Information Center limitation consequential or incidental damages. “Typical” parameters which may be Schatzbogen 7 provided in Freescale Semiconductor data sheets and/or specifications can and do 81829 Muenchen, Germany vary in different applications and actual performance may vary over time. All operating +44 1296 380 456 (English) +46 8 52200080 (English) parameters, including “Typicals” must be validated for each customer application by +49 89 92103 559 (German) customer’s technical experts. Freescale Semiconductor does not convey any license +33 1 69 35 48 48 (French) under its patent rights nor the rights of others.
    [Show full text]
  • LTIB Build Host Setup
    LTIB Build Host Setup Setting up a Linux host for LTIB builds We support building using Ubuntu 9.04 (Jaunty) installed from the 32 or 64 bit Desktop Ubuntu install cd. Other versions of Ubuntu are not currently supported and may have build issues. Sudoers Run 'sudo visudo' so you can edit the sudoer's file. Add the following line to the end of the sudoers file. This is needed for people to be able to use LTIB. This assumes that all your developers have administrator priviledges on this host. If that is not the case, a similar line can be added for each user. %admin ALL = NOPASSWD: /usr/bin/rpm, /opt/freescale/ltib/usr/bin/rpm Update to the latest packages Open up System -> Administration -> Update Manager Click on Settings Open the Updates Tab Set 'Release upgrade' to 'Never'. That makes the option to upgrade to Karmic go away. Close the settings dialog box. Click on 'Check' to check for upgraded packages. It will look for packages that are upgraded from the version that is installed on your box. Choose to install the upgrades. This will take a while on a freshly installed box. Install host packages needed by LTIB This document assumes you are using Ubuntu. Not a requirement, but the packages may be named differently and the method of installing them may be different. sudo aptitude -y install gettext libgtk2.0-dev rpm bison m4 libfreetype6-dev sudo aptitude -y install libdbus-glib-1-dev liborbit2-dev intltool sudo aptitude -y install ccache ncurses-dev zlib1g zlib1g-dev gcc g++ libtool sudo aptitude -y install uuid-dev liblzo2-dev sudo aptitude -y install tcl Packages required for 64-bit Ubuntu If you don't know whether you have 64-bit Ubuntu installed, do "uname -a" and see if the word "x86_64" shows up.
    [Show full text]
  • Scala Native Documentation Release 0.3.2
    Scala Native Documentation Release 0.3.2 Denys Shabalin Aug 08, 2017 Contents 1 Community 3 2 Documentation 5 2.1 User’s Guide...............................................5 2.2 Libraries................................................. 15 2.3 Contributor’s Guide........................................... 31 2.4 Changelog................................................ 48 2.5 FAQ.................................................... 49 i ii Scala Native Documentation, Release 0.3.2 Scala Native is an optimizing ahead-of-time compiler and lightweight managed runtime designed specifically for Scala. It features: • Low-level primitives. type Vec = CStruct3[Double, Double, Double] val vec = stackalloc[Vec] // allocate c struct on stack !vec._1 = 10.0 // initialize fields !vec._2 = 20.0 !vec._3 = 30.0 length(vec) // pass by reference Pointers, structs, you name it. Low-level primitives let you hand-tune your application to make it work exactly as you want it to. You’re in control. • Seamless interop with native code. @extern object stdlib { def malloc(size: CSize): Ptr[Byte] = extern } val ptr = stdlib.malloc(32) Calling C code has never been easier. With the help of extern objects you can seamlessly call native code without any runtime overhead. • Instant startup time. > time hello-native hello, native! real 0m0.005s user 0m0.002s sys 0m0.002s Scala Native is compiled ahead-of-time via LLVM. This means that there is no sluggish warm-up phase that’s common for just-in-time compilers. Your code is immediately fast and ready for action. Contents 1 Scala Native Documentation, Release 0.3.2 2 Contents CHAPTER 1 Community • Want to follow project updates? Follow us on twitter. • Want to chat? Join our Gitter chat channel.
    [Show full text]
  • PLAN 9 from BELL LABS PROGRAMMER's MANUAL
    PLAN 9 from BELL LABS PROGRAMMER’S MANUAL First Edition Computing Science Research Center AT&T Bell Laboratories Murray Hill, New Jersey -- Copyright © 1993 AT&T Unpublished and not for publication All Rights Reserved PostScript and ThinkJet are registered trademarks. PERMUTED INDEX Manual pages for all sections are accessible on line through m a n(1). To save space, neighboring references to the same page have been collapsed into a single reference. This should cause no difficulty in cases like ‘atan’ and ‘atan2’, but is somewhat obscure in the case of ‘strcat’ and ‘strchr’. Disclabel – / . home, 40meg, 80meg, 100meg, newkernel, personalize, update, . home(8) floyd, halftone, hysteresis – create 1-bit images by dithering . floyd(9.1) hp – emulate an HP 2621 terminal . hp(1) 2a, 6a, 8a, ka, va, za – assemblers . 2a(1) 2c, 6c, 8c, kc, vc, zc – C compilers . 2c(1) 2l, 6l, 8l, kl, vl, zl – loaders . 2l(1) c++/2c, c++/kc, c++/vc, c++/8c, c++/zc, c++/ 2l, c++/kl, c++/vl, c++/8l, c++/zl – C++/ . c++(1) picture color compression . 3to1, mcut, improve, quantize, dither – . quantize(9.1) update, Disclabel – administration for/ . home, 40meg, 80meg, 100meg, newkernel, personalize, . home(8) smiley, life, fsim, clock, catclock,/ . 4s, 5s, ana, gnuchess, juggle, mandel, plumb, quiz, . games(1) 2a, 6a, 8a, ka, va, za – assemblers . 2a(1) 2c, 6c, 8c, kc, vc, zc – C compilers . 2c(1) 2l, 6l, 8l, kl, vl, zl – loaders . 2l(1) 8½ – window system files . 8½(4) 8½, label, window, wloc – window system . 8½(1) Disclabel – administration for/ . home, 40meg, 80meg, 100meg, newkernel, personalize, update, .
    [Show full text]
  • ELC 2008 Agenda
    Embedded Linux Conference, 2008 Program Agenda Mountain View, California, April 15-17 Table of Contents Agenda...............................................................................................................................2 Tuesday...........................................................................................................................2 Wednesday......................................................................................................................3 Thursday.........................................................................................................................4 Keynote List........................................................................................................................5 Keynote Descriptions.........................................................................................................5 Session List........................................................................................................................7 Session Descriptions..........................................................................................................9 BOF List............................................................................................................................30 BOF Descriptions.............................................................................................................30 Agenda Tuesday Session Schedule - Tuesday, April 15 Time Room A - Hahn Room B - Boole Room C - Noyce 8:00 - 900 Registration 9:00 - 9:50 Keynote:
    [Show full text]
  • VAB-800 Linux BSP 1.4
    DEVELOPMENT GUIDE VAB-800 Linux BSP 1.4 1.4-09222014-165700 Copyright Copyright © 2014-VIA Technologies Incorporated. All rights reserved. No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise without the prior written permission of VIA Technologies, Incorporated. Trademarks All brands, product names, company names, trademarks and service marks are the property of their respective holders. Disclaimer VIA Technologies makes no warranties, implied or otherwise, in regard to this document and to the products described in this document. The information provided in this document is believed to be accurate and reliable as of the publication date of this document. However, VIA Technologies assumes no responsibility for the use or misuse of the information in this document and for any patent infringements that may arise from the use of this document. The information and product specifications within this document are subject to change at any time, without notice and without obligation to notify any person of such change. VIA Technologies, Inc. reserves the right the make changes to the products described in this manual at any time without prior notice. VABVAB----8080808000 Linux BSP V1.V1.4444 Development Guide Revision History Version DateDateDate Remarks 1.0 12/24/2012 Initial external release 1.1 4/2/2013 Added the eMMC evaluation kit process in Appendix A Modified Micro SD/eMMC partition method in Chapter 4 1.2 4/19/2013 Added the ADI ADV7511W in Step 10 of 3.2.2 Run Ltib to build VAB-800 BSP 1.3 8/14/2014 Modified the necessary packages and patch of Ltib for Ubuntu 12.04 64bit host development PC 1.4 9/17/2014 Added Xrandr dual display setting in Appendix.E iii VABVAB----8080808000 Linux BSP V1.V1.4444 Development Guide Table of Contents 1.1.1.
    [Show full text]
  • In the Beginning
    The Embedded Linux Quick Start Guide In the Beginning... Chris Simmonds Embedded Linux Conference Europe 2010 Copyright © 2010, 2net Limited Embedded Linux Quick Start Guide 1 In the beginning Overview ● Genesis of a Linux project ● The four elements ● Tool chain; boot loader; kernel; user space ● Element 1: Tool chain ● Element 2: Boot loader Embedded Linux Quick Start Guide 2 In the beginning “I've just had this great idea...” ● “…our next product will run Linux” ● This workshop will take a look at ● Board bring-up ● Development environment ● Deployment Embedded Linux Quick Start Guide 3 In the beginning The four elements Toolchain (air) Boot loader (earth) Kernel (fire) User space (water) Embedded Linux Quick Start Guide 4 In the beginning First element: the toolchain ● You can't do anything until you can produce code for your platform ● A tool chain consists of at least ● binutils: GNU assembler, linker, etc. ● gcc: GNU C compiler ● C library (libc): the interface to the operating system ● gdb: debugger Embedded Linux Quick Start Guide 5 In the beginning Types of toolchain ● Native: run compiler on target board ● If your target board is not fast enough or doesn't have enough memory or storage, use an emulator e.g. qemu ● Cross: compile on one machine, run on another ● Most common option Embedded Linux Quick Start Guide 6 In the beginning The C library ● Gcc is built along side the C library ● Hence, the C library is part of the tool chain ● Main options are ● GNU glibc – big but fully functional ● GNU eglibc – glibc but more configurable; embedded-friendly ● uClibc – small, lacking up-to-date threads library and other POSIX functions Embedded Linux Quick Start Guide 7 In the beginning Criteria for selecting a toolchain ● Good support for your processor ● e.g.
    [Show full text]
  • Embedded.Linux.Syste
    Embedded Linux system development Embedded Linux system development Free Electrons Gr´egory Cl´ement,Michael Opdenacker, Maxime Ripard, Thomas Petazzoni Embedded Linux Free Electrons Developers c Copyright 2004-2012, Free Electrons. Creative Commons BY-SA 3.0 license. Latest update: October 8, 2012. Document updates and sources: http://free-electrons.com/doc/training/embedded-linux Corrections, suggestions, contributions and translations are welcome! Free Electrons. Kernel, drivers and embedded Linux development, consulting, training and support. http://free-electrons.com 1/528 Rights to copy c Copyright 2004-2012, Free Electrons License: Creative Commons Attribution - Share Alike 3.0 http://creativecommons.org/licenses/by-sa/3.0/legalcode You are free: I to copy, distribute, display, and perform the work I to make derivative works I to make commercial use of the work Under the following conditions: I Attribution. You must give the original author credit. I Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical to this one. I For any reuse or distribution, you must make clear to others the license terms of this work. I Any of these conditions can be waived if you get permission from the copyright holder. Your fair use and other rights are in no way affected by the above. Free Electrons. Kernel, drivers and embedded Linux development, consulting, training and support. http://free-electrons.com 2/528 Electronic copies of these documents I Electronic copies of your particular version of the materials are available on: http://free-electrons.com/doc/training/embedded- linux I Open the corresponding documents and use them throughout the course to find explanations given earlier by the instructor.
    [Show full text]