Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp3756251pxb; Wed, 13 Oct 2021 12:16:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxSrB0HgqWumKwA8i8VG/hESapMK9MjpZJ1EFZDI0mUBbAcxw8hRrvwkHAgRugizigeDMdq X-Received: by 2002:a17:906:1456:: with SMTP id q22mr1212910ejc.291.1634152596664; Wed, 13 Oct 2021 12:16:36 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1634152596; cv=pass; d=google.com; s=arc-20160816; b=MfobWhImVdZtZNSy/M+22P1gxZ6UAqRTcVNTu/LyTSqbxRdq9WrpBm+8uSwPQZljEF UFYafZNaZvuJ+z8w9D+zbCvoni7uIzZ3KBPzJ2KbBfzBMN1QyPG+nz0nvnViEnXdcVNK o+ceaTSvvtlfbV0vTVGTHXmRfgmVtEDjSjF2u+s4UTIgVb5EWiKSZ+h7b6MrRuoHuWJq XFHpm2qZ/R7gCB4aUclUdfreTnty4DqClJ0Je0icCg2ZZyKSF8UD28V2KfpJhdZgCKVh wufpT80nqzEn3CQxuE5H1yYRvF854JZO0GE/2QFLvG8feCPrCBkEKIEG4MjBQ7gk8BuT L/qw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-language:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:envelope-to:dkim-signature; bh=xuMHPCsZrZZSD0bPSvsTPdvjdLxpeK5+1xHPl0DN4Hs=; b=FklpEOzdItq6/P5DkXlZxpSfuMCBhhsGzDnoTvMoiniZFHn3fuWkK4bMvIzVSA+BQm 2+psASgF6aI1W1cRhpD5iW7U+hCBiFrJAh3FegssNtum6d7PRtRcLHSNFGvXh1iQc2DF Y5S/jCKAnnNLuQON+7ymjeOLpg+9nnq7Y54iEz9IxYfurHT3Ub7u7uNCjzp0KGgs0xza K/sWbVRCDr8ydlQ2GlXd05IRm5kRsejAbu2Uk8wSQTPF7S/41JmMiiggIogEBvzEyQFP 9Zfhrutn77U3UMf5YBiR+4ZaE6yR0d0YgCW8AWKJWvNwpL3cjN0oFiRV2IX38ZUT+a5j VrjA== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@xilinx.onmicrosoft.com header.s=selector2-xilinx-onmicrosoft-com header.b=tUANoD41; arc=pass (i=1 spf=pass spfdomain=xilinx.com dmarc=pass fromdomain=xilinx.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xilinx.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dm9si343240edb.491.2021.10.13.12.16.12; Wed, 13 Oct 2021 12:16:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@xilinx.onmicrosoft.com header.s=selector2-xilinx-onmicrosoft-com header.b=tUANoD41; arc=pass (i=1 spf=pass spfdomain=xilinx.com dmarc=pass fromdomain=xilinx.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xilinx.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231938AbhJMTP2 (ORCPT + 99 others); Wed, 13 Oct 2021 15:15:28 -0400 Received: from mail-bn8nam12on2088.outbound.protection.outlook.com ([40.107.237.88]:10976 "EHLO NAM12-BN8-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S231246AbhJMTP0 (ORCPT ); Wed, 13 Oct 2021 15:15:26 -0400 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EKQi8fDyvWTZ2JvCL66sp5Z2OSvkbLsuCSUlQhJUqyTpHj1eqFN4Oh46NMeJZSV9j1nrrJt/Mrzec+7mFiP1QFWR4e5o0blgboLZdRVbA1b7y2Gri+7XtPkARPu1DbROEn3RoQm8q/ZVoG1lzRGm9CCZsXJcWAVSUDr1QnTfZLKAEi9LscBT9bzm5xBIqEmlJkc+OLtrsIX8j6UFB+6jbSQvqR8W5eB4Up6azFAsXbOjT0ozSX1Mc+vse4olZPIuUsWTKbm7JnaZzpReXA607AwPSre1K55T6ZQvy/0GQrlE6oKGW2E3m+simFnlEUH9E+ofD9ghlfuGFP+JbRAikQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=xuMHPCsZrZZSD0bPSvsTPdvjdLxpeK5+1xHPl0DN4Hs=; b=hqFcKrupIbYwNNLbqWGFMslcsJR/ZE2s6TQITKrBK5x5/Jlk7UqHW/jgwA7UJVf8xN+rzeFIsp+KY6f2bYM/1Gz/v95rf9HTTaUqLAqPiEoyI/VDkr8NO0jOm1xMVvaaIaH2+pw+Q5yDc8msjebmqm3mAfnY1RbErGjp9Y8e018dm56Txiyn9Ys1F/IwM9+jNdml40BUFfXBkFXNup5xR1E9t/u8rG+UTKQKFqOFt3OShOKCS3U8wFmm63Haezu12c3nJLxZOBRawq4ExJ7yFkUPqUQU4lhzJWOXCIaTUDr1/X8UgvVhSVv1qaqeG67IW3A3kGvdLNzg9ys8YCE0pg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 149.199.62.198) smtp.rcpttodomain=kernel.org smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=xilinx.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=xuMHPCsZrZZSD0bPSvsTPdvjdLxpeK5+1xHPl0DN4Hs=; b=tUANoD41m96IXFpg+UlDIV9OWFFzFSQVOnRltKd4HHQvJtA/Y1eH1K0/GK+Lz8UdCJc0KXfZWKMnvGHza6gy29ZapNHR/8KQvU2VE5dSE8TV96htAoScByyLazV9lBHrBCsiQI2xCYn1KRxyqU85YNFhQy6cv5o+vRP+0RHNuZg= Received: from DS7PR06CA0031.namprd06.prod.outlook.com (2603:10b6:8:54::11) by BYAPR02MB4280.namprd02.prod.outlook.com (2603:10b6:a03:5a::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4587.20; Wed, 13 Oct 2021 19:13:19 +0000 Received: from DM3NAM02FT059.eop-nam02.prod.protection.outlook.com (2603:10b6:8:54:cafe::7d) by DS7PR06CA0031.outlook.office365.com (2603:10b6:8:54::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4608.15 via Frontend Transport; Wed, 13 Oct 2021 19:13:19 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.62.198) smtp.mailfrom=xilinx.com; kernel.org; dkim=none (message not signed) header.d=none;kernel.org; dmarc=pass action=none header.from=xilinx.com; Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates 149.199.62.198 as permitted sender) receiver=protection.outlook.com; client-ip=149.199.62.198; helo=xsj-pvapexch01.xlnx.xilinx.com; Received: from xsj-pvapexch01.xlnx.xilinx.com (149.199.62.198) by DM3NAM02FT059.mail.protection.outlook.com (10.13.4.97) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.4608.15 via Frontend Transport; Wed, 13 Oct 2021 19:13:18 +0000 Received: from xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) by xsj-pvapexch01.xlnx.xilinx.com (172.19.86.40) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.14; Wed, 13 Oct 2021 12:13:11 -0700 Received: from smtp.xilinx.com (172.19.127.95) by xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server id 15.1.2176.14 via Frontend Transport; Wed, 13 Oct 2021 12:13:11 -0700 Envelope-to: robh@kernel.org, mdf@kernel.org, trix@redhat.com, devicetree@vger.kernel.org, linux-fpga@vger.kernel.org, linux-kernel@vger.kernel.org, yilun.xu@intel.com Received: from [10.17.2.60] (port=36268) by smtp.xilinx.com with esmtp (Exim 4.90) (envelope-from ) id 1majgc-00007b-VI; Wed, 13 Oct 2021 12:13:10 -0700 Subject: Re: [PATCH V9 XRT Alveo 01/14] Documentation: fpga: Add a document describing XRT Alveo drivers To: Xu Yilun , Lizhi Hou CC: , , , , , , , , , , , Max Zhen References: <20210802160521.331031-1-lizhi.hou@xilinx.com> <20210802160521.331031-2-lizhi.hou@xilinx.com> <20211012050931.GA95330@yilunxu-OptiPlex-7050> From: Lizhi Hou Message-ID: <8d8f6c08-6e68-a4b8-4cfd-1dd547f3fe28@xilinx.com> Date: Wed, 13 Oct 2021 12:13:10 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.9.1 MIME-Version: 1.0 In-Reply-To: <20211012050931.GA95330@yilunxu-OptiPlex-7050> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: dcc72056-3d0a-484e-124a-08d98e7d843b X-MS-TrafficTypeDiagnostic: BYAPR02MB4280: X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:8882; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch01.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(46966006)(36840700001)(70206006)(36756003)(336012)(26005)(83380400001)(36906005)(31696002)(8676002)(47076005)(9786002)(110136005)(966005)(54906003)(4326008)(426003)(30864003)(70586007)(2616005)(316002)(8936002)(31686004)(36860700001)(5660300002)(356005)(53546011)(44832011)(186003)(2906002)(82310400003)(107886003)(508600001)(7636003)(45080400002)(50156003)(43740500002)(579004);DIR:OUT;SFP:1101; X-OriginatorOrg: xilinx.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 13 Oct 2021 19:13:18.8936 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: dcc72056-3d0a-484e-124a-08d98e7d843b X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch01.xlnx.xilinx.com] X-MS-Exchange-CrossTenant-AuthSource: DM3NAM02FT059.eop-nam02.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR02MB4280 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/11/21 10:09 PM, Xu Yilun wrote: > CAUTION: This message has originated from an External Source. Please use proper judgment and caution when opening attachments, clicking links, or responding to this email. > > > On Mon, Aug 02, 2021 at 09:05:08AM -0700, Lizhi Hou wrote: >> Describe XRT driver architecture and provide basic overview of >> Xilinx Alveo platform. >> >> Signed-off-by: Sonal Santan >> Signed-off-by: Max Zhen >> Signed-off-by: Lizhi Hou >> Reviewed-by: Tom Rix >> --- >> Documentation/fpga/index.rst | 1 + >> Documentation/fpga/xrt.rst | 870 +++++++++++++++++++++++++++++++++++ >> MAINTAINERS | 11 + >> 3 files changed, 882 insertions(+) >> create mode 100644 Documentation/fpga/xrt.rst >> >> diff --git a/Documentation/fpga/index.rst b/Documentation/fpga/index.rst >> index f80f95667ca2..30134357b70d 100644 >> --- a/Documentation/fpga/index.rst >> +++ b/Documentation/fpga/index.rst >> @@ -8,6 +8,7 @@ fpga >> :maxdepth: 1 >> >> dfl >> + xrt >> >> .. only:: subproject and html >> >> diff --git a/Documentation/fpga/xrt.rst b/Documentation/fpga/xrt.rst >> new file mode 100644 >> index 000000000000..84eb41be9ac1 >> --- /dev/null >> +++ b/Documentation/fpga/xrt.rst >> @@ -0,0 +1,870 @@ >> +.. SPDX-License-Identifier: GPL-2.0 >> + >> +================================== >> +XRTV2 Linux Kernel Driver Overview >> +================================== >> + >> +Authors: >> + >> +* Sonal Santan >> +* Max Zhen >> +* Lizhi Hou >> + >> +XRTV2 drivers are second generation `XRT `_ >> +drivers which support `Alveo `_ >> +PCIe platforms from Xilinx. >> + >> +XRTV2 drivers support *subsystem* style data driven platforms where driver's >> +configuration and behavior are determined by metadata provided by the platform >> +(in *device tree* format). Primary management physical function (MPF) driver >> +is called **xrt-mgmt**. Primary user physical function (UPF) driver is called >> +**xrt-user** and is under development. xrt_driver framework and HW subsystem >> +drivers are packaged into a library module called **xrt-lib**, which is shared >> +by **xrt-mgmt** and **xrt-user** (under development). The xrt_driver framework >> +implements a ``bus_type`` called **xrt_bus_type** which is used to discover HW >> +subsystems and facilitate inter HW subsystem interaction. >> + >> +Driver Modules >> +============== >> + >> +xrt-lib.ko >> +---------- >> + >> +xrt-lib is the repository of all subsystem drivers and pure software modules that >> +can potentially be shared between xrt-mgmt and xrt-user. All these drivers are >> +structured as **xrt_driver** and are instantiated by xrt-mgmt (or xrt-user under >> +development) based on the metadata associated with the hardware. The metadata is >> +in the form of a device tree as mentioned before. Each xrt_driver statically >> +defines a subsystem node array by using a node name or a string in its ``.endpoints`` >> +property. And this array is eventually translated to IOMEM resources in the >> +instantiated **xrt_device**. >> + >> +The xrt-lib infrastructure provides hooks to xrt_drivers for device node >> +management, user file operations and ioctl callbacks. The core infrastructure also >> +provides a bus functionality called **xrt_bus_type** for xrt_driver registration, >> +discovery and inter xrt_driver calls. xrt-lib does not have any dependency on PCIe >> +subsystem. >> + >> +.. note:: >> + See code in ``include/xleaf.h`` and ``include/xdevice.h`` >> + >> + >> +xrt-mgmt.ko >> +------------ >> + >> +The xrt-mgmt driver is a PCIe device driver driving MPF found on Xilinx's Alveo >> +PCIe device. It consists of one *root* driver, one or more *group* drivers >> +and one or more *xleaf* drivers. The group and xleaf drivers are instantiations >> +of the xrt_driver but are called group and xleaf to symbolize the logical operation >> +performed by them. >> + >> +The root driver manages the life cycle of multiple group drivers, which, in turn, >> +manages multiple xleaf drivers. This flexibility allows xrt-mgmt.ko and xrt-lib.ko >> +to support various HW subsystems exposed by different Alveo shells. The differences >> +among these Alveo shells is handled in xleaf drivers. The root and group >> +drivers are part of the infrastructure which provide common services to xleaf >> +drivers found on various Alveo shells. See :ref:`alveo_platform_overview`. >> + >> +The instantiation of specific group driver or xleaf drivers is completely data >> +driven based on metadata (mostly in device tree format) found through VSEC >> +capability and inside the firmware files, such as platform xsabin or user xclbin >> +file. >> + >> + >> +Driver Object Model >> +=================== >> + >> +The driver object model looks like the following:: >> + >> + +-----------+ >> + | xroot | >> + +-----+-----+ >> + | >> + +-----------+-----------+ >> + | | >> + v v >> + +-----------+ +-----------+ >> + | group | ... | group | >> + +-----+-----+ +------+----+ >> + | | >> + | | >> + +-----+----+ +-----+----+ >> + | | | | >> + v v v v >> + +-------+ +-------+ +-------+ +-------+ >> + | xleaf |..| xleaf | | xleaf |..| xleaf | >> + +-------+ +-------+ +-------+ +-------+ >> + >> +As an example, for Xilinx Alveo U50 before user xclbin download, the tree >> +looks like the following:: >> + >> + +-----------+ >> + | xrt-mgmt | >> + +-----+-----+ >> + | >> + +-------------------------+--------------------+ >> + | | | >> + v v v >> + +--------+ +--------+ +--------+ >> + | group0 | | group1 | | group2 | >> + +----+---+ +----+---+ +---+----+ >> + | | | >> + | | | >> + +-----+-----+ +----+-----+---+ +-----+-----+----+--------+ >> + | | | | | | | | | >> + v v | v v | v v | >> + +------------+ +------+ | +------+ +------+ | +------+ +-----------+ | >> + | xmgmt_main | | VSEC | | | GPIO | | QSPI | | | CMC | | AXI-GATE0 | | >> + +------------+ +------+ | +------+ +------+ | +------+ +-----------+ | >> + | +---------+ | +------+ +-----------+ | >> + +>| MAILBOX | +->| ICAP | | AXI-GATE1 |<+ >> + +---------+ | +------+ +-----------+ >> + | +-------+ >> + +->| CALIB | >> + +-------+ >> + >> +After a xclbin is downloaded, group3 will be added and the tree looks like the >> +following:: >> + >> + +-----------+ >> + | xrt-mgmt | >> + +-----+-----+ >> + | >> + +-------------------------+--------------------+-----------------+ >> + | | | | >> + v v v | >> + +--------+ +--------+ +--------+ | >> + | group0 | | group1 | | group2 | | >> + +----+---+ +----+---+ +---+----+ | >> + | | | | >> + | | | | >> + +-----+-----+ +-----+-----+---+ +-----+-----+----+--------+ | >> + | | | | | | | | | | >> + v v | v v | v v | | >> + +------------+ +------+ | +------+ +------+ | +------+ +-----------+ | | >> + | xmgmt_main | | VSEC | | | GPIO | | QSPI | | | CMC | | AXI-GATE0 | | | >> + +------------+ +------+ | +------+ +------+ | +------+ +-----------+ | | >> + | +---------+ | +------+ +-----------+ | | >> + +>| MAILBOX | +->| ICAP | | AXI-GATE1 |<+ | >> + +---------+ | +------+ +-----------+ | >> + | +-------+ | >> + +->| CALIB | | >> + +-------+ | >> + +---+----+ | >> + | group3 |<--------------------------------------------+ >> + +--------+ >> + | >> + | >> + +-------+--------+---+--+--------+------+-------+ >> + | | | | | | | >> + v | v | v | v >> + +--------+ | +--------+ | +--------+ | +-----+ >> + | CLOCK0 | | | CLOCK1 | | | CLOCK2 | | | UCS | >> + +--------+ v +--------+ v +--------+ v +-----+ >> + +-------------+ +-------------+ +-------------+ >> + | CLOCK-FREQ0 | | CLOCK-FREQ1 | | CLOCK-FREQ2 | >> + +-------------+ +-------------+ +-------------+ >> + >> + >> +root >> +---- >> + >> +The root driver is a PCIe device driver attached to MPF. It's part of the >> +infrastructure of the MPF driver and resides in xrt-mgmt.ko. This driver >> + >> +* manages one or more group drivers >> +* provides access to functionalities that requires pci_dev, such as PCIE config >> + space access, to other xleaf drivers through root calls >> +* facilities inter xleaf driver calls for other xleaf drivers >> +* facilities event callbacks for other xleaf drivers >> + >> +When the root driver starts, it will explicitly create an initial group instance, >> +which contains xleaf drivers that will trigger the creation of other group >> +instances. The root driver will wait for all group and xleaf drivers to be >> +created before it returns from its probe routine and claim success of the >> +initialization of the entire xrt-mgmt driver. If any xleaf fails to initialize >> +the xrt-mgmt driver will still come online but with limited functionality. >> + >> +.. note:: >> + See code in ``lib/xroot.c`` and ``mgmt/root.c`` >> + >> + >> +group >> +----- >> + >> +The group driver represents a pseudo device whose life cycle is managed by >> +root and does not have real IO mem or IRQ resources. It's part of the >> +infrastructure of the MPF driver and resides in xrt-lib.ko. This driver >> + >> +* manages one or more xleaf drivers >> +* provides access to root from xleaf drivers, so that root calls, event >> + notifications and inter xleaf calls can happen >> + >> +In xrt-mgmt, an initial group driver instance will be created by the root. This >> +instance contains xleaf drivers that will trigger group instances to be created >> +to manage groups of xleaf drivers found on different partitions of hardware, >> +such as VSEC, Shell, and User. >> + >> +Every *fpga_region* has a group driver associated with it. The group driver is >> +created when a xclbin image is loaded on the fpga_region. The existing group >> +is destroyed when a new xclbin image is loaded. The fpga_region persists >> +across xclbin downloads. >> + >> +.. note:: >> + See code in ``lib/group.c`` >> + >> + >> +xleaf >> +----- >> + >> +The xleaf driver is a xrt_driver whose life cycle is managed by >> +a group driver and may or may not have real IO mem or IRQ resources. They >> +manage HW subsystems they are attached to. >> + >> +A xleaf driver without real hardware resources manages in-memory states for >> +xrt-mgmt. These states are shareable by other xleaf drivers. >> + >> +Xleaf drivers assigned to specific hardware resources drive a specific subsystem >> +in the device. To manipulate the subsystem or carry out a task, a xleaf driver >> +may ask for help from the root via root calls and/or from other leaves via >> +inter xleaf calls. >> + >> +A xleaf can also broadcast events through infrastructure code for other leaves >> +to process. It can also receive event notification from infrastructure about >> +certain events, such as post-creation or pre-exit of a particular xleaf. >> + >> +.. note:: >> + See code in ``lib/xleaf/*.c`` >> + >> + >> +xrt_bus_type >> +------------ >> + >> +xrt_bus_type defines a virtual bus which handles xrt_driver probe, remove and match >> +operations. All xrt_drivers register with xrt_bus_type as part of xrt-lib driver >> +``module_init`` and un-register as part of xrt-lib driver ``module_exit``. >> + >> +.. note:: >> + See code in ``lib/lib-drv.c`` >> + >> +FPGA Manager Interaction >> +======================== >> + >> +fpga_manager >> +------------ >> + >> +An instance of fpga_manager is created by xmgmt_main and is used for xclbin >> +image download. fpga_manager requires the full xclbin image before it can >> +start programming the FPGA configuration engine via Internal Configuration >> +Access Port (ICAP) xrt_driver. >> + >> +fpga_region >> +----------- >> + >> +For every interface exposed by the currently loaded xclbin/xsabin in the >> +*parent* fpga_region a new instance of fpga_region is created like a *child* >> +fpga_region. The device tree of the *parent* fpga_region defines the >> +resources for a new instance of fpga_bridge which isolates the parent from >> +child fpga_region. This new instance of fpga_bridge will be used when a >> +xclbin image is loaded on the child fpga_region. After the xclbin image is >> +downloaded to the fpga_region, an instance of a group is created for the >> +fpga_region using the device tree obtained as part of the xclbin. If this >> +device tree defines any child interfaces, it can trigger the creation of >> +fpga_bridge and fpga_region for the next region in the chain. >> + >> +fpga_bridge >> +----------- >> + >> +Like the fpga_region, an fpga_bridge is created by walking the device tree >> +of the parent group. The bridge is used for isolation between a parent and >> +its child. >> + >> +Driver Interfaces >> +================= >> + >> +xrt-mgmt Driver Ioctls >> +---------------------- >> + >> +Ioctls exposed by the xrt-mgmt driver to user space are enumerated in the >> +following table: >> + >> +== ===================== ============================ ========================== >> +# Functionality ioctl request code data format >> +== ===================== ============================ ========================== >> +1 FPGA image download XMGMT_IOCICAPDOWNLOAD_AXLF xmgmt_ioc_bitstream_axlf >> +== ===================== ============================ ========================== >> + >> +A user xclbin can be downloaded by using the xbmgmt tool from the XRT open source >> +suite. See example usage below:: >> + >> + xbmgmt partition --program --path /lib/firmware/xilinx/862c7020a250293e32036f19956669e5/test/verify.xclbin --force >> + >> +xrt-mgmt Driver Sysfs >> +---------------------- >> + >> +The xrt-mgmt driver exposes a rich set of sysfs interfaces. Subsystem xrt >> +drivers export sysfs node for every platform instance. >> + >> +Every partition also exports its UUIDs. See below for examples:: >> + >> + /sys/bus/pci/devices/0000:06:00.0/xmgmt_main.0/interface_uuids >> + /sys/bus/pci/devices/0000:06:00.0/xmgmt_main.0/logic_uuids >> + >> + >> +hwmon >> +----- >> + >> +The xrt-mgmt driver exposes standard hwmon interface to report voltage, current, >> +temperature, power, etc. These can easily be viewed using *sensors* command line >> +utility. >> + >> +.. _alveo_platform_overview: >> + >> +Alveo Platform Overview >> +======================= >> + >> +Alveo platforms are architected as two physical FPGA partitions: *Shell* and >> +*User*. The Shell provides basic infrastructure for the Alveo platform like >> +PCIe connectivity, board management, Dynamic Function Exchange (DFX), sensors, >> +clocking, reset, and security. DFX, partial reconfiguration, is responsible for >> +loading the user compiled FPGA binary. >> + >> +For DFX to work properly, physical partitions require strict HW compatibility >> +with each other. Every physical partition has two interface UUIDs: the *parent* >> +UUID and the *child* UUID. For simple single stage platforms, Shell → User forms >> +the parent child relationship. >> + >> +.. note:: >> + Partition compatibility matching is a key design component of the Alveo platforms >> + and XRT. Partitions have child and parent relationship. A loaded partition >> + exposes child partition UUID to advertise its compatibility requirement. When >> + loading a child partition, the xrt-mgmt driver matches the parent >> + UUID of the child partition against the child UUID exported by the parent. >> + The parent and child partition UUIDs are stored in the *xclbin* (for the user) >> + and the *xsabin* (for the shell). Except for the root UUID exported by VSEC, >> + the hardware itself does not know about the UUIDs. The UUIDs are stored in >> + xsabin and xclbin. The image format has a special node called Partition UUIDs >> + which define the compatibility UUIDs. See :ref:`partition_uuids`. >> + >> + >> +The physical partitions and their loading are illustrated below:: >> + >> + SHELL USER >> + +-----------+ +-------------------+ >> + | | | | >> + | VSEC UUID | CHILD PARENT | LOGIC UUID | >> + | o------->|<--------o | >> + | | UUID UUID | | >> + +-----+-----+ +--------+----------+ >> + | | >> + . . >> + | | >> + +---+---+ +------+--------+ >> + | POR | | USER COMPILED | >> + | FLASH | | XCLBIN | >> + +-------+ +---------------+ >> + >> + >> +Loading Sequence >> +---------------- >> + >> +The Shell partition is loaded from flash at system boot time. It establishes the >> +PCIe link and exposes two physical functions to the BIOS. After the OS boots, >> +the xrt-mgmt driver attaches to the PCIe physical function 0 exposed by the Shell >> +and then looks for VSEC in the PCIe extended configuration space. Using VSEC, it >> +determines the logic UUID of the Shell and uses the UUID to load matching *xsabin* >> +file from Linux firmware directory. The xsabin file contains the metadata to >> +discover the peripherals that are part of the Shell and the firmware for any >> +embedded soft processors in the Shell. The xsabin file also contains Partition >> +UUIDs as described here :ref:`partition_uuids`. >> + >> +The Shell exports a child interface UUID which is used for the compatibility >> +check when loading the user compiled xclbin over the User partition as part of DFX. >> +When a user requests loading of a specific xclbin, the xrt-mgmt driver reads >> +the parent interface UUID specified in the xclbin and matches it with the child >> +interface UUID exported by the Shell to determine if the xclbin is compatible with >> +the Shell. If the match fails, loading of xclbin is denied. >> + >> +xclbin loading is requested using the ICAP_DOWNLOAD_AXLF ioctl command. When loading >> +a xclbin, the xrt-mgmt driver performs the following *logical* operations: >> + >> +1. Copy xclbin from user to kernel memory >> +2. Sanity check the xclbin contents >> +3. Isolate the User partition >> +4. Download the bitstream using the FPGA config engine (ICAP) >> +5. De-isolate the User partition >> +6. Program the clocks (ClockWiz) driving the User partition >> +7. Wait for the memory controller (MIG) calibration >> +8. Return the loading status back to the caller >> + >> +`Platform Loading Overview `_ >> +provides more detailed information on platform loading. >> + >> + >> +xsabin >> +------ >> + >> +Each Alveo platform comes packaged with its own xsabin. The xsabin is a trusted >> +component of the platform. For format details refer to :ref:`xsabin_xclbin_container_format` >> +below. xsabin contains basic information like UUIDs, platform name and metadata in the >> +form of device tree. See :ref:`device_tree_usage` below for details and example. >> + >> +xclbin >> +------ >> + >> +xclbin is compiled by end user using >> +`Vitis `_ >> +tool set from Xilinx. The xclbin contains sections describing user compiled >> +acceleration engines/kernels, memory subsystems, clocking information etc. It also >> +contains an FPGA bitstream for the user partition, UUIDs, platform name, etc. >> + >> + >> +.. _xsabin_xclbin_container_format: >> + >> +xsabin/xclbin Container Format >> +------------------------------ >> + >> +xclbin/xsabin is ELF-like binary container format. It is structured as series of >> +sections. There is a file header followed by several section headers which is >> +followed by sections. A section header points to an actual section. There is an >> +optional signature at the end. The format is defined by the header file ``xclbin.h``. >> +The following figure illustrates a typical xclbin:: >> + >> + >> + +---------------------+ >> + | | >> + | HEADER | >> + +---------------------+ >> + | SECTION HEADER | >> + | | >> + +---------------------+ >> + | ... | >> + | | >> + +---------------------+ >> + | SECTION HEADER | >> + | | >> + +---------------------+ >> + | SECTION | >> + | | >> + +---------------------+ >> + | ... | >> + | | >> + +---------------------+ >> + | SECTION | >> + | | >> + +---------------------+ >> + | SIGNATURE | >> + | (OPTIONAL) | >> + +---------------------+ >> + >> + >> +xclbin/xsabin files can be packaged, un-packaged and inspected using an XRT >> +utility called **xclbinutil**. xclbinutil is part of the XRT open source >> +software stack. The source code for xclbinutil can be found at >> +https://github.com/Xilinx/XRT/tree/master/src/runtime_src/tools/xclbinutil >> + >> +For example, to enumerate the contents of a xclbin/xsabin use the *--info* switch >> +as shown below:: >> + >> + >> + xclbinutil --info --input /opt/xilinx/firmware/u50/gen3x16-xdma/blp/test/bandwidth.xclbin >> + xclbinutil --info --input /lib/firmware/xilinx/862c7020a250293e32036f19956669e5/partition.xsabin >> + >> + >> +.. _device_tree_usage: >> + >> +Device Tree Usage >> +----------------- >> + >> +The xsabin file stores metadata which advertise HW subsystems present in a >> +partition. The metadata is stored in device tree format with a well defined >> +schema. XRT management driver uses this information to bind *xrt_drivers* to >> +the subsystem instantiations. The xrt_drivers are found in **xrt-lib.ko** kernel >> +module. > I'm still catching up the patchset from the very beginning, and just > finished the Documentation part. So far, I see the DT usage concern > which may impact the architecure a lot, so I should raise it ASAP. > > The concern raised by the DT maintainer: > https://lore.kernel.org/linux-fpga/CAL_JsqLod6FBGFhu7WXtMrB_z7wj8-up0EetM1QS9M3gjm8d7Q@mail.gmail.com/ > > First of all, directly parsing FDT in device drivers is not a normal usage of DT > in linux. It is out of the current DT usage model. So it should be agreed by DT > maintainers. Thanks for reviewing XRT document and providing feedback. Here is the reply from Sonal for Rob’s question: https://lore.kernel.org/linux-fpga/BY5PR02MB62604B87C66A1AD139A6F153BBF40@BY5PR02MB6260.namprd02.prod.outlook.com/ Overall, libfdt is used by XRT driver to parse the metadata which comes with an Alveo board. When XRT driver discovers an Alveo board, it will read a fdt blob from board firmware file resident on the host. By parsing the fdt blob, XRT driver gets information about this Alveo board, such as version, uuid, IPs exposed to PCI BAR, interrupt binding etc. So libfdt is used simply as Alveo metadata parser here. XRT drivers do not interact with system wide DT or present the Alveo device tree to host. For many systems like x86_64, system wide DT is not present but libfdt parsing services will still be needed. > > Current FPGA framework modifies kernel's live tree by DT overlay, when FPGA is > dynamically reprogrammed and new HW devices appear. See > Documentation/devicetree/bindings/fpga/fpga-region.txt. > > Then something less important: > > 1. The bindings should be documented in Documentation/devicetree/bindings/. > 2. Are all the example DT usage conform to the exsiting bindings? I > didn't go through all device classes, but remember like the > interrupt-controller should have a "interrupt-controller" property, and > the PCI properties are also different from PCI bindings. The fdt properties are defined for Alveo firmware files. XRT driver is the only consumer of this data. I am wondering if Documentation/devicetree/bindings is the right place for Alveo/XRT private format or should it be documented as part of XRT driver documentation? Looking for guidance here. Thanks, Lizhi > > Thanks, > Yilun > >> + >> +Logic UUID >> +^^^^^^^^^^ >> +A partition is identified uniquely through ``logic_uuid`` property:: >> + >> + /dts-v1/; >> + / { >> + logic_uuid = "0123456789abcdef0123456789abcdef"; >> + ... >> + } >> + >> +Schema Version >> +^^^^^^^^^^^^^^ >> +Schema version is defined through the ``schema_version`` node. It contains >> +``major`` and ``minor`` properties as below:: >> + >> + /dts-v1/; >> + / { >> + schema_version { >> + major = <0x01>; >> + minor = <0x00>; >> + }; >> + ... >> + } >> + >> +.. _partition_uuids: >> + >> +Partition UUIDs >> +^^^^^^^^^^^^^^^ >> +Each partition may have parent and child UUIDs. These UUIDs are >> +defined by ``interfaces`` node and ``interface_uuid`` property:: >> + >> + /dts-v1/; >> + / { >> + interfaces { >> + @0 { >> + interface_uuid = "0123456789abcdef0123456789abcdef"; >> + }; >> + @1 { >> + interface_uuid = "fedcba9876543210fedcba9876543210"; >> + }; >> + ... >> + }; >> + ... >> + } >> + >> + >> +Subsystem Instantiations >> +^^^^^^^^^^^^^^^^^^^^^^^^ >> +Subsystem instantiations are captured as children of ``addressable_endpoints`` >> +node:: >> + >> + /dts-v1/; >> + / { >> + addressable_endpoints { >> + abc { >> + ... >> + }; >> + def { >> + ... >> + }; >> + ... >> + } >> + } >> + >> +Subnode 'abc' and 'def' are the name of subsystem nodes >> + >> +Subsystem Node >> +^^^^^^^^^^^^^^ >> +Each subsystem node and its properties define a hardware instance:: >> + >> + >> + addressable_endpoints { >> + abc { >> + reg = <0x00 0x1f05000 0x00 0x1000>> >> + pcie_physical_function = <0x0>; >> + pcie_bar_mapping = <0x2>; >> + compatible = "abc def"; >> + interrupts = <0x09 0x0c>; >> + firmware { >> + firmware_product_name = "abc" >> + firmware_branch_name = "def" >> + firmware_version_major = <1> >> + firmware_version_minor = <2> >> + }; >> + } >> + ... >> + } >> + >> +:reg: >> + Property defines an address range. `<0x00 0x1f05000 0x00 0x1000>` indicates >> + *0x00 0x1f05000* as BAR offset and *0x00 0x1000* as address length. >> +:pcie_physical_function: >> + Property specifies which PCIe physical function the subsystem node resides. >> + `<0x0>` implies physical function 0. >> +:pcie_bar_mapping: >> + Property specifies which PCIe BAR the subsystem node resides. `<0x2>` implies >> + BAR 2. A value of 0 means the property is not defined. >> +:compatible: >> + Property is a list of strings. The first string in the list specifies the exact >> + subsystem node. The following strings represent other devices that the device >> + is compatible with. >> +:interrupts: >> + Property specifies start and end interrupts for this subsystem node. >> + `<0x09 0x0c>` implies interrupts 9 to 13 are used by this subsystem. >> +:firmware: >> + Subnode defines the firmware required by this subsystem node. >> + >> +Alveo U50 Platform Example >> +^^^^^^^^^^^^^^^^^^^^^^^^^^ >> +:: >> + >> + /dts-v1/; >> + >> + /{ >> + logic_uuid = "f465b0a3ae8c64f619bc150384ace69b"; >> + >> + schema_version { >> + major = <0x01>; >> + minor = <0x00>; >> + }; >> + >> + interfaces { >> + >> + @0 { >> + interface_uuid = "862c7020a250293e32036f19956669e5"; >> + }; >> + }; >> + >> + addressable_endpoints { >> + >> + ep_blp_rom_00 { >> + reg = <0x00 0x1f04000 0x00 0x1000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-axi_bram_ctrl-1.0\0axi_bram_ctrl"; >> + }; >> + >> + ep_card_flash_program_00 { >> + reg = <0x00 0x1f06000 0x00 0x1000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-axi_quad_spi-1.0\0axi_quad_spi"; >> + interrupts = <0x03 0x03>; >> + }; >> + >> + ep_cmc_firmware_mem_00 { >> + reg = <0x00 0x1e20000 0x00 0x20000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-axi_bram_ctrl-1.0\0axi_bram_ctrl"; >> + >> + firmware { >> + firmware_product_name = "cmc"; >> + firmware_branch_name = "u50"; >> + firmware_version_major = <0x01>; >> + firmware_version_minor = <0x00>; >> + }; >> + }; >> + >> + ep_cmc_intc_00 { >> + reg = <0x00 0x1e03000 0x00 0x1000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-axi_intc-1.0\0axi_intc"; >> + interrupts = <0x04 0x04>; >> + }; >> + >> + ep_cmc_mutex_00 { >> + reg = <0x00 0x1e02000 0x00 0x1000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-axi_gpio-1.0\0axi_gpio"; >> + }; >> + >> + ep_cmc_regmap_00 { >> + reg = <0x00 0x1e08000 0x00 0x2000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-axi_bram_ctrl-1.0\0axi_bram_ctrl"; >> + >> + firmware { >> + firmware_product_name = "sc-fw"; >> + firmware_branch_name = "u50"; >> + firmware_version_major = <0x05>; >> + }; >> + }; >> + >> + ep_cmc_reset_00 { >> + reg = <0x00 0x1e01000 0x00 0x1000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-axi_gpio-1.0\0axi_gpio"; >> + }; >> + >> + ep_ddr_mem_calib_00 { >> + reg = <0x00 0x63000 0x00 0x1000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-axi_gpio-1.0\0axi_gpio"; >> + }; >> + >> + ep_debug_bscan_mgmt_00 { >> + reg = <0x00 0x1e90000 0x00 0x10000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-debug_bridge-1.0\0debug_bridge"; >> + }; >> + >> + ep_ert_base_address_00 { >> + reg = <0x00 0x21000 0x00 0x1000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-axi_gpio-1.0\0axi_gpio"; >> + }; >> + >> + ep_ert_command_queue_mgmt_00 { >> + reg = <0x00 0x40000 0x00 0x10000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-ert_command_queue-1.0\0ert_command_queue"; >> + }; >> + >> + ep_ert_command_queue_user_00 { >> + reg = <0x00 0x40000 0x00 0x10000>; >> + pcie_physical_function = <0x01>; >> + compatible = "xilinx.com,reg_abs-ert_command_queue-1.0\0ert_command_queue"; >> + }; >> + >> + ep_ert_firmware_mem_00 { >> + reg = <0x00 0x30000 0x00 0x8000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-axi_bram_ctrl-1.0\0axi_bram_ctrl"; >> + >> + firmware { >> + firmware_product_name = "ert"; >> + firmware_branch_name = "v20"; >> + firmware_version_major = <0x01>; >> + }; >> + }; >> + >> + ep_ert_intc_00 { >> + reg = <0x00 0x23000 0x00 0x1000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-axi_intc-1.0\0axi_intc"; >> + interrupts = <0x05 0x05>; >> + }; >> + >> + ep_ert_reset_00 { >> + reg = <0x00 0x22000 0x00 0x1000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-axi_gpio-1.0\0axi_gpio"; >> + }; >> + >> + ep_ert_sched_00 { >> + reg = <0x00 0x50000 0x00 0x1000>; >> + pcie_physical_function = <0x01>; >> + compatible = "xilinx.com,reg_abs-ert_sched-1.0\0ert_sched"; >> + interrupts = <0x09 0x0c>; >> + }; >> + >> + ep_fpga_configuration_00 { >> + reg = <0x00 0x1e88000 0x00 0x8000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-axi_hwicap-1.0\0axi_hwicap"; >> + interrupts = <0x02 0x02>; >> + }; >> + >> + ep_icap_reset_00 { >> + reg = <0x00 0x1f07000 0x00 0x1000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-axi_gpio-1.0\0axi_gpio"; >> + }; >> + >> + ep_msix_00 { >> + reg = <0x00 0x00 0x00 0x20000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-msix-1.0\0msix"; >> + pcie_bar_mapping = <0x02>; >> + }; >> + >> + ep_pcie_link_mon_00 { >> + reg = <0x00 0x1f05000 0x00 0x1000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-axi_gpio-1.0\0axi_gpio"; >> + }; >> + >> + ep_pr_isolate_plp_00 { >> + reg = <0x00 0x1f01000 0x00 0x1000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-axi_gpio-1.0\0axi_gpio"; >> + }; >> + >> + ep_pr_isolate_ulp_00 { >> + reg = <0x00 0x1000 0x00 0x1000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-axi_gpio-1.0\0axi_gpio"; >> + }; >> + >> + ep_uuid_rom_00 { >> + reg = <0x00 0x64000 0x00 0x1000>; >> + pcie_physical_function = <0x00>; >> + compatible = "xilinx.com,reg_abs-axi_bram_ctrl-1.0\0axi_bram_ctrl"; >> + }; >> + >> + ep_xdma_00 { >> + reg = <0x00 0x00 0x00 0x10000>; >> + pcie_physical_function = <0x01>; >> + compatible = "xilinx.com,reg_abs-xdma-1.0\0xdma"; >> + pcie_bar_mapping = <0x02>; >> + }; >> + }; >> + >> + } >> + >> + >> + >> +Deployment Models >> +================= >> + >> +Baremetal >> +--------- >> + >> +In bare-metal deployments, both MPF and UPF are visible and accessible. The >> +xrt-mgmt driver binds to MPF. The xrt-mgmt driver operations are privileged and >> +available to system administrator. The full stack is illustrated below:: >> + >> + HOST >> + >> + [XRT-MGMT] [XRT-USER] >> + | | >> + | | >> + +-----+ +-----+ >> + | MPF | | UPF | >> + | | | | >> + | PF0 | | PF1 | >> + +--+--+ +--+--+ >> + ......... ^................. ^.......... >> + | | >> + | PCIe DEVICE | >> + | | >> + +--+------------------+--+ >> + | SHELL | >> + | | >> + +------------------------+ >> + | USER | >> + | | >> + | | >> + | | >> + | | >> + +------------------------+ >> + >> + >> + >> +Virtualized >> +----------- >> + >> +In virtualized deployments, the privileged MPF is assigned to the host but the >> +unprivileged UPF is assigned to a guest VM via PCIe pass-through. The xrt-mgmt >> +driver in host binds to MPF. The xrt-mgmt driver operations are privileged and >> +only accessible to the MPF. The full stack is illustrated below:: >> + >> + >> + .............. >> + HOST . VM . >> + . . >> + [XRT-MGMT] . [XRT-USER] . >> + | . | . >> + | . | . >> + +-----+ . +-----+ . >> + | MPF | . | UPF | . >> + | | . | | . >> + | PF0 | . | PF1 | . >> + +--+--+ . +--+--+ . >> + ......... ^................. ^.......... >> + | | >> + | PCIe DEVICE | >> + | | >> + +--+------------------+--+ >> + | SHELL | >> + | | >> + +------------------------+ >> + | USER | >> + | | >> + | | >> + | | >> + | | >> + +------------------------+ >> + >> + >> + >> + >> + >> +Platform Security Considerations >> +================================ >> + >> +`Security of Alveo Platform `_ >> +discusses the deployment options and security implications in great detail. >> diff --git a/MAINTAINERS b/MAINTAINERS >> index 056966c9aac9..beeaf0257364 100644 >> --- a/MAINTAINERS >> +++ b/MAINTAINERS >> @@ -7274,6 +7274,17 @@ F: Documentation/fpga/ >> F: drivers/fpga/ >> F: include/linux/fpga/ >> >> +FPGA XRT DRIVERS >> +M: Lizhi Hou >> +R: Max Zhen >> +R: Sonal Santan >> +L: linux-fpga@vger.kernel.org >> +S: Supported >> +W: https://github.com/Xilinx/XRT >> +F: Documentation/fpga/xrt.rst >> +F: drivers/fpga/xrt/ >> +F: include/uapi/linux/xrt/ >> + >> FPU EMULATOR >> M: Bill Metzenthen >> S: Maintained >> -- >> 2.27.0