Developer Guide

  • 2021.1
  • 11/03/2021
  • Public

Install on Target

The recommended way of setting up the target OS is by creating a Yocto Project-based image using the platform BSP with the Intel® TCC Tools dependencies layer and then deploy Intel® TCC Tools onto the target system. In addition, you may want to add the Intel® VTune™ Profiler layer to your image to experience the full capabilities of Intel® VTune™ Profiler when profiling applications on your target system.
Building an image is time-consuming and requires substantial compute resources. You should ensure your host system is capable of doing it. The host system used for building the image can be different from the host system for development with Intel® TCC Tools. Consider using a dedicated server system to build the image and then share the image among developers.
  1. To build an image, see the Get Started Guide, Step 1.
  2. To deploy Intel® TCC Tools onto the target OS, see Get Started Guide, Step 4.
    If the setup script (
    ) finds an existing version, the script will ask you whether to proceed with removing the old version and installing the new one. If you agree, the script will attempt to remove the old version. If it fails to remove the old version, the script will print a command for manual removal. You should remove the old version manually using the provided command and rerun the script in the install mode again.
  3. (Optional) Two tools – data streams optimizer and cache configurator – need to be able to automatically connect the host system to the target system via SSH. If you would like your target system to be password-protected, Intel recommends creating a public SSH key and installing it on the target system. Otherwise, you will need to enter the password into a plaintext file when using these tools.
    To create a public SSH key and install it on the target system:
    1. On the host system
      , generate an SSH key:
      ssh-keygen -t rsa -b 4096
    2. Copy the SSH key to the target system. Replace
      with the IP address or hostname of the target system.
      ssh-copy-id root@<target>
    3. Test the installed key:
      ssh root@<target> ls

Product and Performance Information


Performance varies by use, configuration and other factors. Learn more at