LargoLasskhyfv a year ago

Many larger FPGA-development kits. NVME for storage maybe not right now, but as an add-on via 'Mezzanine' card atop the dev-kit.

Basically some dual- to quad-core arm embedded into the fpga, various amounts of memory, sometimes expandable via SODIMM, and so on.

NOT cheap!

https://www.xilinx.com/products/design-tools/embedded-softwa... would be cybertrash from Xilinx as offer to run on the ARM-Cores.

edit: Former Altera, now Intel-FPGA isn't really better.

Prepare for a world of hurt, if doing anything with FPGAs, and their proprietary tool chains. Prepare for another world of hurt, if thinking they would be supported by open-source tool chains in a sufficient way, or that the the few alternative solutions which are fully supported by them would be enough.

I'll show myself out now...(rambling)

LinuxBender a year ago

Does anything like this exist?

They do but many are closed source. Dell and HP have their own ilo/drac cards that run Linux but they have since locked them down. A while back someone here linked an unrestricted ilo card, I will see if I still have the link.

[Edit] I believe this [1] is what someone linked here a while ago. In the embeded video, he talks about some other more inclusive options.

[1] - https://hackaday.com/2022/09/20/raspberry-pi-grants-remote-a...

floatinglotus a year ago

You want a smartNIC/DPU, and you should probably run SONiC on it! (DASH)

btgeekboy a year ago

Have a look at the CCR2004-1G-2XS-PCIe from MikroTik. It’s a router on a PCIe card, with its own OS.

What’s your usecase? Might be able to get better recommendations if you can tell us what you’re trying to do.

  • snoopy_telex a year ago

    I'd like to offload a required security software to a stand-alone device that exposes the software endpoints directly to the host via PCIe. The goal would be to ensure that if an attacker gets into the host, they are unable to modify the security software or limit its functionality.

    Ideally the card would have a TPM module and supports some sort of signed boot/firmware validation.

    I know I'm being a bit coy, but hopefully that helps you understand the requirements a bit better?

wmf a year ago

I recommend the SolidRun SolidNET or Mellanox Bluefield. FPGAs cost a fortune and Mikrotik looks janky.