Update an Intel N3000 FPGA Image

The N3000 FPGA as shipped from the factory is expected to have production BMC and factory images. The following procedure describes how to update the N3000 FPGA user image on a StarlingX host.


StarlingX does not support the FPGA prestart CRI-O hook. FPGA programming must be performed manually.

Device Image Types

There are three types of device images, root-key, functional, and key-revocation.


The root-key image sets the main authentication key on the hardware.


The functional device image performs the desired work on behalf of the application. If a root-key device image has been written to the hardware, then the functional image will only be accepted if it has been signed by a CSK generated from the root key which has not been revoked.


The key-revocation device image will revoke a CSK. If a root-key device image has been written to the hardware, then the key-revocation device image will only be accepted if it has been signed by the root key.

Specifically for the N3000, the root-key image can only be set once, CSKs are revoked by specifying an integer CSK ID, and there are 128 CSK ID cancellation slots. In the Intel literature the root-key device image is known as the “root entry hash bitstream”, the functional device image is known as the “user image”, and the key-revocation device image is known as the “CSK ID cancellation bitstream”. For the N3000, a CSK is revoked by specifying an integer ID, and all CSKs with that ID will be revoked. Writing the root-key device image or a key-revocation device image is essentially permanent. Reverting to factory status requires physical access to the card and specialized equipment.



  1. Upload the device image.

    • To upload a root-key device image:

      ~(keystone_admin)$ system device-image-upload <imagefile> root-key <pci_vendor> <pci_device> --key-signature <key_signature> --name <imagename> --description <description> --image-version <version>
    • To upload a revocation key device image:

      ~(keystone_admin)$ system device-image-upload <imagefile> key-revocation <pci_vendor> <pci_device> --revoke-key-id <revoke_key_id> --name <imagename> --description <description> --image-version <version>
    • To upload a functional device image:

      ~(keystone_admin)$ system device-image-upload <imagefile> functional <pci_vendor> <pci_device> --bitstream-id <bitstream_id> --name <imagename> --description <description> --image-version <version>

    In the above device-image-upload commands, the following substitutions apply:


    The filepath of the binary device image file.


    The hexadecimal string identifying the PCI vendor ID of the device this image applies to.


    The hexadecimal string identifying the PCI device ID of the device this image applies to.


    A hexidecimal string identifying the root key device image.


    A decimal key ID for the key revocation device image.


    A hexidecimal string of the functional device image.


    The name of the device image (optional).


    Is the description of the device image (optional).


    The version of the device image (optional).

  2. Assign a device label to the device.

    Labels are key-value pairs that are assigned to host PCI devices and are used to specify attributes of the devices. Labels can be used to identify certain properties of the PCI devices where the same device image can be used.

    The command syntax is:

    system host-device-label-assign [--overwrite] <hostname_or_id> <pci_name_or_address> <name>=<value> [<name>=<value> ...]

    For example:

    ~(keystone_admin)$ system host-device-label-assign controller-0 0000:b3:00.0 key1=value1
    | Property    | Value                                |
    | uuid        | 789be75d-7ac3-472e-bbbc-6d62878aad4a |
    | label_key   | key1                                 |
    | label_value | value1                               |

    The label can be overwritten using the --overwrite option. This option is not allowed while the image update is in progress after running host-device-image-update.

    Once assigned, a device label can be referenced by multiple device-image-apply commands.

  3. Apply the device image on one or all supported devices.


    A device firmware update in progress alarm is raised once the first device image is applied.

    The system device-image-state-list will show the status of the device as pending.

    • Apply a device image to all supported devices:

      ~(keystone_admin)$ system device-image-apply <image_uuid>
    • Alternatively, apply a device image to devices with a specified label:

      ~(keystone_admin)$ system device-image-apply image_uuid <key1>=<value1>

    When applying functional device images device-image-apply will remove any existing pending or completed functional device image state entries for that device. Additionally, any in-progress device image updates will block the apply operation.

    For root-key device images, device-image-apply will be blocked if a root-key device image has already been applied.

  4. Write pending device images on the host to hardware.

    ~(keystone)admin)$ system host-device-image-update <hostname>


    This operation currently supports one pending device image at a time.

    Any previously-attempted device image writes for this host that are in a failed state will be reset to pending and retried.

    Root and revocation key updates can be expected to take 1-2 minutes. Functional image updates can take approximately 40 minutes for the N3000 FPGA.

    • Once a device update is complete, system device-image-state-list will show the status as completed for that device/image.

    • Once all pending device updates for the host are complete, system host-show <hostname> will again display an empty string for device_image_update.

  5. Lock and unlock the host.

    For example:

    ~(keystone_admin)$ system host-lock controller-0
    ~(keystone_admin)$ system host-unlock controller-0
  6. Upload, apply, and update any additional key-revocation device images or functional device images as needed.

    New device images can be uploaded as needed, and already-uploaded images can be applied with new labels. Devices can also have new labels applied to them and any device images with matching labels will be automatically applied.


    The N3000 supports a maximum of 128 code-signing key IDs.