SlideShare a Scribd company logo
Copyright © 2018 Arm Limited
Dong Wei
Linaro Connect HKG
March 2018
Arm ServerReady
Update
Confidential © Arm 2017
Server Architecture
3
Base System Architecture (BSA)
• Defines hardware requirements
Base Boot Requirements (BBR)
• Defines firmware requirements
These specifications require a minimum set of hardware and firmware
implementations that will ensure OS and firmware will interoperate
SBSA/SBBR are the BSA/BBR for the server systems
• Developed using feedback from vendors across the industry (Silicon vendors, OSVs, Hypervisor
vendors, BIOS vendors, OEMs and ODMs)
• SBBR defines the required, recommended and optional UEFI, ACPI and SMBIOS interfaces
SBSA and SBBR are now available at https://developer.arm.com/
• Current versions are SBSA v3.1 and SBBR v1.0. No click through license required.
• SBSA v5.0 and SBBR v1.1 will be available soon
Server Base Manageability Guide (SBMG)
• Defines guidance for server management standardization
• Work In Progress
Server Architecture
4
We have created an Engineering Change Request (ECR) process for SBSA / SBBR / SBMG
1. Partner submit the change requirement to Arm (armserverac-request@arm.com) using the template with
the following info: Summary of Change, Benefits of the Change (justifications), Impact of the Change.
2. Partner and Arm work together to understand the change requirement and brainstorm the solution that
meets the requirement . When the solution is defined, post it to an Arm Drop Zone for broader partners
review
3. External Mantis-based ECR tracking database Work In Progress
Logistics:
 Two discussion channels:
 Partner to Arm over armserverac-request@arm.com protected by NDA
 Anybody on the Arm server AC discussion group: armserverac-discuss@arm.com
• If you are on ArmServerAC, you are already on armserverac-discuss@arm.com, and if you are not then ask us
• Weekly phone conferences on the as-needed basis would be the most scalable solution, complemented by ftf
gathering
Formalizing how to request spec content updates
5
SBSA Status
Drafting SBSA v5.0 (BETA available on Dropzone)
Core / System:
• RAS requirements (AARCH-4638)
• ROP and JOB requirements for SBSA (AARCH-11320)
• SBSA and SVE (AARCH-11319)
• Nested virtualization (AARCH-12054)
• MPAM requirements for SBSA (AARCH-11323)
• Forced writeback (AARCH-11326)
• Add Activity Monitor Requirements to SBSA (AARCH-12044)
• Crypto Requirements to SBSA (AARCH-12058)
• 48bit mode (AARCH-12858)
• Ban non-standard interrupt controller (AARCH-11329)
• PPI assignments (AARCH-11753)
• Base frequency standardisation (AARCH-11324)
• Assign PPIs for new timers in v8.4 (AARCH-11321)
• Secure EL2 (AARCH-13144)
• TLBI-range (AARCH-12159)
• SVE heterogenity (AARCH-13132)
IO:
• PCIe clarifications (AARCH-12301)
• UART clarifications (AARCH-12701)
• PCIe requirements for assignable devices (AARCH-11610)
• PCIe Precision Time Measurement Root source (AARCH-
12571)
• PCIe Deadlock (AARCH-4698)
• ACS and Peer to Peer (AARCH-12303)
Security:
• TCG TPM (AARCH-12312)Some highlights
Cleanup:
• Deprecate old SBSA levels (AARCH-11330)
• Clean to point of persistence (AARCH-13385)*
6
PCIe improvements – SBSA
PCIe feature SBSA
revision
Clarifications, 4G and Non-Prefetchable BARs SBSA 5.0
PTM and system counter
Access control and Peer to Peer traffic
RCIE minimum requirements SBSA - next
Error logging and reporting minimal requirements
Vendor defined message handling
DPC minimal requirements
Memory ordering requirements
7
Additional work on PCIe
We want to improve testability of SBSA rules relating to PCIe
• Our current approach is based on modified drivers (SATA) and this limits coverage
• Very hard to use pre-silicon
• We are working with pre-silicon and post-silicon solutions to generate test IP
• Enables us to generate specific traffic patterns and increase coverage in areas such as coherency, deadlocks and
interrupts
We are also working on PCIe guidance ( as opposed to mandates ):
• PCIe integration guide - currently trying to nail topic list
• PCIe performance verification guide – alpha is in dropzone
8
SBBR Status
SBBR 1.1 (EAC available on Dropzone)
UEFI:
• UEFI PCI Root Bridge IO Protocol Address
Translation clarifications
• UEFI GOP implementation clarifications
• UEFI REST Protocol support
• UEFI Capsule Service clarification
• Native AArch64 image requirements for UEFI
applications and drivers
• UEFI RNG Protocol*
ACPI:
• ACPI Interrupt-signaled Events support
• ACPI Generic Event Devices support
• ACPI PCI IO Address Translation clarifications*
• IORT implementation guidelines
SMBIOS/Management:
• SMBIOS Processor Information
• SMBIOS structure data requirements clarification
• SMBIOS Redfish Host Interface support
• SPMI recommendation removal
Cleanup:
• Clarifications of SSDT being optional
• Clarifications on UEFI Load File and Load File 2
Protocols
• Updated referenced specifications to: UEFI 2.7,
ACPI 6.2, SMBIOS 3.1.1
• Secondary core boot standardization with PSCI
Security:
• Secure and Trusted Boot
• Secure Firmware Update
9
UEFI Option ROM Availability
Architecturally Arm requires the support of AArch64 native binary UEFI drivers
Arm testing room will be open at UEFI Plugfest next week to provide:
• Real HW Setup in which to test native AArch64 drivers
• Help and suggestions on how to get your driver recompiled for AArch64
Arm is creating a “getting started guide” and a list of off-the-shelf systems that can be
used for continuous testing
Arm is collecting a list of vendors/cards with AArch64 drivers:
• Contact us (uefi@arm.com) if you would like to be on it or if you’d like more
information
10
Secure Server Profile
What are included:
• Verified Boot (Reset - Arm TF - UEFI Secure Boot -OS)
• Measured Boot (TPM, TCG Trusted Boot)
• Secure Firmware Update
What else?
11
SBMG Status and Plans
Host (UEFI,
OS)
SoC
Elements
(e.g.
sensors)
On-chip
Management
BMC
Redfish
API
Redfish Host Interface
Redfish enabled
PLDM/MCTP
Redfish
enabled
PLDM/MCTP
Platform
Elements
MCTP compliant Transport: PCIe, or
I2C/SMBus (SMLink)
In-band
Out-of-band
SoC
NIC
LM0: current implementation
LM1: Redfish
LM2: Redfish enabled PLDM/MCTP
IPMI support: optional in addition
12
SBSA/SBBR roadmap
CY2018H1 CY2018H2 CY2019H1Available Future
SBSA 5.0 BETA
SBBR 1.1 BETA
SBSA 5.0 EAC
SBSA-next EAC
SBBR-next EACSpecs
Enterprise ACS
For ARM Server Ready 1.0
Arm Server Ready 2.0
FY2018H1 FY2018H2 FY2019H1Available Future Released
Development
Adv. Planning
Concept
Ongoing updates
SBSA/SBBR
Enterprise ACS 1.3
Compliance
test suites
SBBR 1.1 EAC
SBSA 5.0 REL
ECR Database
SBBR next
Alpha
SBSA next Alpha
- Next Arch revision
-Additional PCIe rules
Enterprise ACS
For ARM Server Ready 1.0
Enterprise ACS for Server Ready
2.0-Alpha
Supporting SBSA5.0/SBBR1.1
Enterprise ACS for Server Ready
2.0-Alpha
Supporting SBSA5.0/SBBR1.1
SBMG-1.0 Alpha
SBMG-1.0 Beta SBMG-1.0 EAC
PCIe perf verification
guide Alpha
PCIe perf verification
guide Beta
PCIe Integration
guide Alpha
PCIe perf verification
guide EAC
PCIe Integra
guide EAC
SBSA-next-next Alpha
Confidential © Arm 2018
14
Vision | Mission | Elevator Pitch
Vision
• Arm servers everywhere and easy to deploy
Mission
• We provide the tools to enable customers to deploy Arm servers
with confidence
Elevator
• ServerReady gives the confidence that your server works out of
the box.
15
SBSA test covers
• SBSA CPU properties
• SBSA defined system components
• SBSA rules for PCIe integration
– Based on the PCIe specification
– Based on standard OS drivers with no quirks enabled
SBBR test covers
• UEFI testing based on the UEFI SCT
• ACPI testing based on FWTS
• SMBIOS testing
V1.4 released! Apache v2 licensed
• https://github.com/ARM-software/sbsa-acs
• https://github.com/ARM-software/arm-enterprise-acs
SBSA and SBBR Architectural Compliance Suites
16
Server Ready testing
OEM/ODM/SiP/IBV
• runs the tests
Arch Team
• Develops tests
• Takes tests reports
and provides
certification
Support team
• Supports
ODM/OEM/Silicon
vendor or BIOS
vendor on running
the tests and fixing
issues
We are engaging with silicon vendors,
ODMs, OEMs and BIOS vendors to run the
tests
Tests are developed by our architecture
team, which also develops the
specifications
We have a support team that helps in
running of test, debugging etc
17
Inputs for certification
Certification request document (CRD) contains
• Board information table
• Enterprise ACS logs
• Explanation for fails and skips
• OS boot logs
• CentOS x.x (Kernel version y.y)
• Or RHEL x.x (Kernel version y.y)
• Suse Linux x.x (Kernel version y.y)
• Ubuntu x.x
Board Information table
ODM Name
Board Name
Silicon provider
Silicon version
Bios vendor
Target market
Is it a SKU of a previously
certified board? If yes, name
of the board.
18
Likely to Launch in Q4’2018
Call to Action
• Partners continue to work with Arm to evaluate the tests
• Partners invited to write guest blogs promoting the program
• Partners get ready to co-launch
Arm Server Ready Program Launch
1919
The trademarks featured in this
presentation are registered and/or
unregistered trademarks of Arm
Limited (or its subsidiaries) in the EU
and/or elsewhere. All rights
reserved. All other marks featured
may be trademarks of their
respective owners.
202020
Thank You!
Danke!
Merci!
谢谢!
ありがとう!
Gracias!
Kiitos!

More Related Content

What's hot

Cisco ios
Cisco iosCisco ios
Cisco ios
Teja Babu
 
0 foundation update__final - Mendy Furmanek
0 foundation update__final - Mendy Furmanek0 foundation update__final - Mendy Furmanek
0 foundation update__final - Mendy Furmanek
Yutaka Kawai
 
LF_OVS_17_IPSEC and OVS DPDK
LF_OVS_17_IPSEC and OVS DPDKLF_OVS_17_IPSEC and OVS DPDK
LF_OVS_17_IPSEC and OVS DPDK
LF_OpenvSwitch
 
Open Mic on Sametime9 Install -Best Practices
Open Mic on Sametime9 Install  -Best PracticesOpen Mic on Sametime9 Install  -Best Practices
Open Mic on Sametime9 Install -Best PracticesVinayak Tavargeri
 
ONIE / Cumulus Networks Webinar
ONIE / Cumulus Networks WebinarONIE / Cumulus Networks Webinar
ONIE / Cumulus Networks WebinarCumulus Networks
 
BKK16-312 Integrating and controlling embedded devices in LAVA
BKK16-312 Integrating and controlling embedded devices in LAVABKK16-312 Integrating and controlling embedded devices in LAVA
BKK16-312 Integrating and controlling embedded devices in LAVA
Linaro
 
LCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted FirmwareLCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted Firmware
Linaro
 
Внутренняя архитектура IOS-XE: средства траблшутинга предачи трафика на ASR1k...
Внутренняя архитектура IOS-XE: средства траблшутинга предачи трафика на ASR1k...Внутренняя архитектура IOS-XE: средства траблшутинга предачи трафика на ASR1k...
Внутренняя архитектура IOS-XE: средства траблшутинга предачи трафика на ASR1k...
Cisco Russia
 
Introduction to the IBM AS/400
Introduction to the IBM AS/400Introduction to the IBM AS/400
Introduction to the IBM AS/400tvlooy
 
FreeSWITCH Modules for Asterisk Developers
FreeSWITCH Modules for Asterisk DevelopersFreeSWITCH Modules for Asterisk Developers
FreeSWITCH Modules for Asterisk Developers
Moises Silva
 
Sparc t4 systems customer presentation
Sparc t4 systems customer presentationSparc t4 systems customer presentation
Sparc t4 systems customer presentation
solarisyougood
 
Sparc t4 2 system technical overview
Sparc t4 2 system technical overviewSparc t4 2 system technical overview
Sparc t4 2 system technical overview
solarisyougood
 
Project ACRN: SR-IOV implementation
Project ACRN: SR-IOV implementationProject ACRN: SR-IOV implementation
Project ACRN: SR-IOV implementation
Geoffroy Van Cutsem
 
LF_OVS_17_Riley: Pushing networking to the edge
LF_OVS_17_Riley: Pushing networking to the edgeLF_OVS_17_Riley: Pushing networking to the edge
LF_OVS_17_Riley: Pushing networking to the edge
LF_OpenvSwitch
 
IBM Lotusphere 2012 Show301: Leveraging the Sametime Proxy to support Mobile ...
IBM Lotusphere 2012 Show301: Leveraging the Sametime Proxy to support Mobile ...IBM Lotusphere 2012 Show301: Leveraging the Sametime Proxy to support Mobile ...
IBM Lotusphere 2012 Show301: Leveraging the Sametime Proxy to support Mobile ...
William Holmes
 
XPDS14 - Xen in EFI World - Daniel Kiper, Oracle
XPDS14 - Xen in EFI World - Daniel Kiper, OracleXPDS14 - Xen in EFI World - Daniel Kiper, Oracle
XPDS14 - Xen in EFI World - Daniel Kiper, Oracle
The Linux Foundation
 
Q2.12: Power Management Across OSs
Q2.12: Power Management Across OSsQ2.12: Power Management Across OSs
Q2.12: Power Management Across OSs
Linaro
 
Sparc t4 4 system technical overview
Sparc t4 4 system technical overviewSparc t4 4 system technical overview
Sparc t4 4 system technical overview
solarisyougood
 
XPDS14: Porting FreeRTOS to Xen on the ARM Cortex A15 - Jonathan Daugherty, G...
XPDS14: Porting FreeRTOS to Xen on the ARM Cortex A15 - Jonathan Daugherty, G...XPDS14: Porting FreeRTOS to Xen on the ARM Cortex A15 - Jonathan Daugherty, G...
XPDS14: Porting FreeRTOS to Xen on the ARM Cortex A15 - Jonathan Daugherty, G...
The Linux Foundation
 
LFCollab14: Xen vs Xen Automotive
LFCollab14: Xen vs Xen AutomotiveLFCollab14: Xen vs Xen Automotive
LFCollab14: Xen vs Xen Automotive
The Linux Foundation
 

What's hot (20)

Cisco ios
Cisco iosCisco ios
Cisco ios
 
0 foundation update__final - Mendy Furmanek
0 foundation update__final - Mendy Furmanek0 foundation update__final - Mendy Furmanek
0 foundation update__final - Mendy Furmanek
 
LF_OVS_17_IPSEC and OVS DPDK
LF_OVS_17_IPSEC and OVS DPDKLF_OVS_17_IPSEC and OVS DPDK
LF_OVS_17_IPSEC and OVS DPDK
 
Open Mic on Sametime9 Install -Best Practices
Open Mic on Sametime9 Install  -Best PracticesOpen Mic on Sametime9 Install  -Best Practices
Open Mic on Sametime9 Install -Best Practices
 
ONIE / Cumulus Networks Webinar
ONIE / Cumulus Networks WebinarONIE / Cumulus Networks Webinar
ONIE / Cumulus Networks Webinar
 
BKK16-312 Integrating and controlling embedded devices in LAVA
BKK16-312 Integrating and controlling embedded devices in LAVABKK16-312 Integrating and controlling embedded devices in LAVA
BKK16-312 Integrating and controlling embedded devices in LAVA
 
LCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted FirmwareLCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted Firmware
 
Внутренняя архитектура IOS-XE: средства траблшутинга предачи трафика на ASR1k...
Внутренняя архитектура IOS-XE: средства траблшутинга предачи трафика на ASR1k...Внутренняя архитектура IOS-XE: средства траблшутинга предачи трафика на ASR1k...
Внутренняя архитектура IOS-XE: средства траблшутинга предачи трафика на ASR1k...
 
Introduction to the IBM AS/400
Introduction to the IBM AS/400Introduction to the IBM AS/400
Introduction to the IBM AS/400
 
FreeSWITCH Modules for Asterisk Developers
FreeSWITCH Modules for Asterisk DevelopersFreeSWITCH Modules for Asterisk Developers
FreeSWITCH Modules for Asterisk Developers
 
Sparc t4 systems customer presentation
Sparc t4 systems customer presentationSparc t4 systems customer presentation
Sparc t4 systems customer presentation
 
Sparc t4 2 system technical overview
Sparc t4 2 system technical overviewSparc t4 2 system technical overview
Sparc t4 2 system technical overview
 
Project ACRN: SR-IOV implementation
Project ACRN: SR-IOV implementationProject ACRN: SR-IOV implementation
Project ACRN: SR-IOV implementation
 
LF_OVS_17_Riley: Pushing networking to the edge
LF_OVS_17_Riley: Pushing networking to the edgeLF_OVS_17_Riley: Pushing networking to the edge
LF_OVS_17_Riley: Pushing networking to the edge
 
IBM Lotusphere 2012 Show301: Leveraging the Sametime Proxy to support Mobile ...
IBM Lotusphere 2012 Show301: Leveraging the Sametime Proxy to support Mobile ...IBM Lotusphere 2012 Show301: Leveraging the Sametime Proxy to support Mobile ...
IBM Lotusphere 2012 Show301: Leveraging the Sametime Proxy to support Mobile ...
 
XPDS14 - Xen in EFI World - Daniel Kiper, Oracle
XPDS14 - Xen in EFI World - Daniel Kiper, OracleXPDS14 - Xen in EFI World - Daniel Kiper, Oracle
XPDS14 - Xen in EFI World - Daniel Kiper, Oracle
 
Q2.12: Power Management Across OSs
Q2.12: Power Management Across OSsQ2.12: Power Management Across OSs
Q2.12: Power Management Across OSs
 
Sparc t4 4 system technical overview
Sparc t4 4 system technical overviewSparc t4 4 system technical overview
Sparc t4 4 system technical overview
 
XPDS14: Porting FreeRTOS to Xen on the ARM Cortex A15 - Jonathan Daugherty, G...
XPDS14: Porting FreeRTOS to Xen on the ARM Cortex A15 - Jonathan Daugherty, G...XPDS14: Porting FreeRTOS to Xen on the ARM Cortex A15 - Jonathan Daugherty, G...
XPDS14: Porting FreeRTOS to Xen on the ARM Cortex A15 - Jonathan Daugherty, G...
 
LFCollab14: Xen vs Xen Automotive
LFCollab14: Xen vs Xen AutomotiveLFCollab14: Xen vs Xen Automotive
LFCollab14: Xen vs Xen Automotive
 

Similar to HKG18-317 - Arm Server Ready Program

Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdfBuilding PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
Paul Yang
 
The Open Power ISA: A Summary of Architecture Compliancy Options and the Late...
The Open Power ISA: A Summary of Architecture Compliancy Options and the Late...The Open Power ISA: A Summary of Architecture Compliancy Options and the Late...
The Open Power ISA: A Summary of Architecture Compliancy Options and the Late...
Ganesan Narayanasamy
 
OSDC 2014 ONIE by Nat Morris
OSDC 2014 ONIE by Nat MorrisOSDC 2014 ONIE by Nat Morris
OSDC 2014 ONIE by Nat Morris
Cumulus Networks
 
04_Bolen-and-Ballard_PCIe-Hot-Plug-and-Error-Handling-for-NVMe_Final-3.13-apb...
04_Bolen-and-Ballard_PCIe-Hot-Plug-and-Error-Handling-for-NVMe_Final-3.13-apb...04_Bolen-and-Ballard_PCIe-Hot-Plug-and-Error-Handling-for-NVMe_Final-3.13-apb...
04_Bolen-and-Ballard_PCIe-Hot-Plug-and-Error-Handling-for-NVMe_Final-3.13-apb...
ssuser1c8ca21
 
ONIE: Open Network Install Environment @ OSDC 2014 Netways, Berlin
ONIE: Open Network Install Environment @ OSDC 2014 Netways, BerlinONIE: Open Network Install Environment @ OSDC 2014 Netways, Berlin
ONIE: Open Network Install Environment @ OSDC 2014 Netways, Berlin
Nat Morris
 
Building a Router
Building a RouterBuilding a Router
Building a Router
Hannes Gredler
 
OPNFV: Platform Performance Acceleration
OPNFV: Platform Performance AccelerationOPNFV: Platform Performance Acceleration
OPNFV: Platform Performance Acceleration
OPNFV
 
VMworld 2013: Failsafe at PCIe Level: Enabling PCIe Hot Swap
VMworld 2013: Failsafe at PCIe Level: Enabling PCIe Hot Swap VMworld 2013: Failsafe at PCIe Level: Enabling PCIe Hot Swap
VMworld 2013: Failsafe at PCIe Level: Enabling PCIe Hot Swap
VMworld
 
The future of RISC-V Supervisor Binary Interface(SBI)
The future of RISC-V Supervisor Binary Interface(SBI)The future of RISC-V Supervisor Binary Interface(SBI)
The future of RISC-V Supervisor Binary Interface(SBI)
Atish Patra
 
Open Hardware and Future Computing
Open Hardware and Future ComputingOpen Hardware and Future Computing
Open Hardware and Future Computing
Ganesan Narayanasamy
 
Sneak Peek into the New ChangeMan ZMF Release
Sneak Peek into the New ChangeMan ZMF ReleaseSneak Peek into the New ChangeMan ZMF Release
Sneak Peek into the New ChangeMan ZMF Release
Serena Software
 
OSDC 2014: Nat Morris - Open Network Install Environment
OSDC 2014: Nat Morris - Open Network Install EnvironmentOSDC 2014: Nat Morris - Open Network Install Environment
OSDC 2014: Nat Morris - Open Network Install Environment
NETWAYS
 
RISC-V NOEL-V - A new high performance RISC-V Processor Family
RISC-V NOEL-V - A new high performance RISC-V Processor FamilyRISC-V NOEL-V - A new high performance RISC-V Processor Family
RISC-V NOEL-V - A new high performance RISC-V Processor Family
RISC-V International
 
Application hosting in the Intelligent WAN
Application hosting in the Intelligent WANApplication hosting in the Intelligent WAN
Application hosting in the Intelligent WAN
Cisco DevNet
 
Presentation oracle rac on vsphere 5
Presentation   oracle rac on vsphere 5Presentation   oracle rac on vsphere 5
Presentation oracle rac on vsphere 5solarisyourep
 
IBM Power Systems E850C and S824
IBM Power Systems E850C and S824IBM Power Systems E850C and S824
IBM Power Systems E850C and S824
David Spurway
 
Codasip application class RISC-V processor solutions
Codasip application class RISC-V processor solutionsCodasip application class RISC-V processor solutions
Codasip application class RISC-V processor solutions
RISC-V International
 
An introduction into Oracle VM V3.x
An introduction into Oracle VM V3.xAn introduction into Oracle VM V3.x
An introduction into Oracle VM V3.x
Marco Gralike
 
Spectra OE Webcast July 2010
Spectra OE Webcast July 2010Spectra OE Webcast July 2010
Spectra OE Webcast July 2010
ADLINK Technology IoT
 
SAP on Azure Web Dispatcher High Availability
SAP on Azure Web Dispatcher High AvailabilitySAP on Azure Web Dispatcher High Availability
SAP on Azure Web Dispatcher High Availability
Gary Jackson MBCS
 

Similar to HKG18-317 - Arm Server Ready Program (20)

Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdfBuilding PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
 
The Open Power ISA: A Summary of Architecture Compliancy Options and the Late...
The Open Power ISA: A Summary of Architecture Compliancy Options and the Late...The Open Power ISA: A Summary of Architecture Compliancy Options and the Late...
The Open Power ISA: A Summary of Architecture Compliancy Options and the Late...
 
OSDC 2014 ONIE by Nat Morris
OSDC 2014 ONIE by Nat MorrisOSDC 2014 ONIE by Nat Morris
OSDC 2014 ONIE by Nat Morris
 
04_Bolen-and-Ballard_PCIe-Hot-Plug-and-Error-Handling-for-NVMe_Final-3.13-apb...
04_Bolen-and-Ballard_PCIe-Hot-Plug-and-Error-Handling-for-NVMe_Final-3.13-apb...04_Bolen-and-Ballard_PCIe-Hot-Plug-and-Error-Handling-for-NVMe_Final-3.13-apb...
04_Bolen-and-Ballard_PCIe-Hot-Plug-and-Error-Handling-for-NVMe_Final-3.13-apb...
 
ONIE: Open Network Install Environment @ OSDC 2014 Netways, Berlin
ONIE: Open Network Install Environment @ OSDC 2014 Netways, BerlinONIE: Open Network Install Environment @ OSDC 2014 Netways, Berlin
ONIE: Open Network Install Environment @ OSDC 2014 Netways, Berlin
 
Building a Router
Building a RouterBuilding a Router
Building a Router
 
OPNFV: Platform Performance Acceleration
OPNFV: Platform Performance AccelerationOPNFV: Platform Performance Acceleration
OPNFV: Platform Performance Acceleration
 
VMworld 2013: Failsafe at PCIe Level: Enabling PCIe Hot Swap
VMworld 2013: Failsafe at PCIe Level: Enabling PCIe Hot Swap VMworld 2013: Failsafe at PCIe Level: Enabling PCIe Hot Swap
VMworld 2013: Failsafe at PCIe Level: Enabling PCIe Hot Swap
 
The future of RISC-V Supervisor Binary Interface(SBI)
The future of RISC-V Supervisor Binary Interface(SBI)The future of RISC-V Supervisor Binary Interface(SBI)
The future of RISC-V Supervisor Binary Interface(SBI)
 
Open Hardware and Future Computing
Open Hardware and Future ComputingOpen Hardware and Future Computing
Open Hardware and Future Computing
 
Sneak Peek into the New ChangeMan ZMF Release
Sneak Peek into the New ChangeMan ZMF ReleaseSneak Peek into the New ChangeMan ZMF Release
Sneak Peek into the New ChangeMan ZMF Release
 
OSDC 2014: Nat Morris - Open Network Install Environment
OSDC 2014: Nat Morris - Open Network Install EnvironmentOSDC 2014: Nat Morris - Open Network Install Environment
OSDC 2014: Nat Morris - Open Network Install Environment
 
RISC-V NOEL-V - A new high performance RISC-V Processor Family
RISC-V NOEL-V - A new high performance RISC-V Processor FamilyRISC-V NOEL-V - A new high performance RISC-V Processor Family
RISC-V NOEL-V - A new high performance RISC-V Processor Family
 
Application hosting in the Intelligent WAN
Application hosting in the Intelligent WANApplication hosting in the Intelligent WAN
Application hosting in the Intelligent WAN
 
Presentation oracle rac on vsphere 5
Presentation   oracle rac on vsphere 5Presentation   oracle rac on vsphere 5
Presentation oracle rac on vsphere 5
 
IBM Power Systems E850C and S824
IBM Power Systems E850C and S824IBM Power Systems E850C and S824
IBM Power Systems E850C and S824
 
Codasip application class RISC-V processor solutions
Codasip application class RISC-V processor solutionsCodasip application class RISC-V processor solutions
Codasip application class RISC-V processor solutions
 
An introduction into Oracle VM V3.x
An introduction into Oracle VM V3.xAn introduction into Oracle VM V3.x
An introduction into Oracle VM V3.x
 
Spectra OE Webcast July 2010
Spectra OE Webcast July 2010Spectra OE Webcast July 2010
Spectra OE Webcast July 2010
 
SAP on Azure Web Dispatcher High Availability
SAP on Azure Web Dispatcher High AvailabilitySAP on Azure Web Dispatcher High Availability
SAP on Azure Web Dispatcher High Availability
 

More from Linaro

Deep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Deep Learning Neural Network Acceleration at the Edge - Andrea GalloDeep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Deep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Linaro
 
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta Vekaria
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta VekariaArm Architecture HPC Workshop Santa Clara 2018 - Kanta Vekaria
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta Vekaria
Linaro
 
Huawei’s requirements for the ARM based HPC solution readiness - Joshua Mora
Huawei’s requirements for the ARM based HPC solution readiness - Joshua MoraHuawei’s requirements for the ARM based HPC solution readiness - Joshua Mora
Huawei’s requirements for the ARM based HPC solution readiness - Joshua Mora
Linaro
 
Bud17 113: distribution ci using qemu and open qa
Bud17 113: distribution ci using qemu and open qaBud17 113: distribution ci using qemu and open qa
Bud17 113: distribution ci using qemu and open qa
Linaro
 
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018
Linaro
 
HPC network stack on ARM - Linaro HPC Workshop 2018
HPC network stack on ARM - Linaro HPC Workshop 2018HPC network stack on ARM - Linaro HPC Workshop 2018
HPC network stack on ARM - Linaro HPC Workshop 2018
Linaro
 
It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...
It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...
It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...
Linaro
 
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
Linaro
 
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
Linaro
 
Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...
Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...
Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...
Linaro
 
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainlineHKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
Linaro
 
HKG18-100K1 - George Grey: Opening Keynote
HKG18-100K1 - George Grey: Opening KeynoteHKG18-100K1 - George Grey: Opening Keynote
HKG18-100K1 - George Grey: Opening Keynote
Linaro
 
HKG18-318 - OpenAMP Workshop
HKG18-318 - OpenAMP WorkshopHKG18-318 - OpenAMP Workshop
HKG18-318 - OpenAMP Workshop
Linaro
 
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainlineHKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
Linaro
 
HKG18-315 - Why the ecosystem is a wonderful thing, warts and all
HKG18-315 - Why the ecosystem is a wonderful thing, warts and allHKG18-315 - Why the ecosystem is a wonderful thing, warts and all
HKG18-315 - Why the ecosystem is a wonderful thing, warts and all
Linaro
 
HKG18- 115 - Partitioning ARM Systems with the Jailhouse Hypervisor
HKG18- 115 - Partitioning ARM Systems with the Jailhouse HypervisorHKG18- 115 - Partitioning ARM Systems with the Jailhouse Hypervisor
HKG18- 115 - Partitioning ARM Systems with the Jailhouse Hypervisor
Linaro
 
HKG18-TR08 - Upstreaming SVE in QEMU
HKG18-TR08 - Upstreaming SVE in QEMUHKG18-TR08 - Upstreaming SVE in QEMU
HKG18-TR08 - Upstreaming SVE in QEMU
Linaro
 
HKG18-113- Secure Data Path work with i.MX8M
HKG18-113- Secure Data Path work with i.MX8MHKG18-113- Secure Data Path work with i.MX8M
HKG18-113- Secure Data Path work with i.MX8M
Linaro
 
HKG18-120 - Devicetree Schema Documentation and Validation
HKG18-120 - Devicetree Schema Documentation and Validation HKG18-120 - Devicetree Schema Documentation and Validation
HKG18-120 - Devicetree Schema Documentation and Validation
Linaro
 
HKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted bootHKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted boot
Linaro
 

More from Linaro (20)

Deep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Deep Learning Neural Network Acceleration at the Edge - Andrea GalloDeep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Deep Learning Neural Network Acceleration at the Edge - Andrea Gallo
 
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta Vekaria
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta VekariaArm Architecture HPC Workshop Santa Clara 2018 - Kanta Vekaria
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta Vekaria
 
Huawei’s requirements for the ARM based HPC solution readiness - Joshua Mora
Huawei’s requirements for the ARM based HPC solution readiness - Joshua MoraHuawei’s requirements for the ARM based HPC solution readiness - Joshua Mora
Huawei’s requirements for the ARM based HPC solution readiness - Joshua Mora
 
Bud17 113: distribution ci using qemu and open qa
Bud17 113: distribution ci using qemu and open qaBud17 113: distribution ci using qemu and open qa
Bud17 113: distribution ci using qemu and open qa
 
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018
 
HPC network stack on ARM - Linaro HPC Workshop 2018
HPC network stack on ARM - Linaro HPC Workshop 2018HPC network stack on ARM - Linaro HPC Workshop 2018
HPC network stack on ARM - Linaro HPC Workshop 2018
 
It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...
It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...
It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...
 
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
 
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
 
Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...
Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...
Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...
 
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainlineHKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
 
HKG18-100K1 - George Grey: Opening Keynote
HKG18-100K1 - George Grey: Opening KeynoteHKG18-100K1 - George Grey: Opening Keynote
HKG18-100K1 - George Grey: Opening Keynote
 
HKG18-318 - OpenAMP Workshop
HKG18-318 - OpenAMP WorkshopHKG18-318 - OpenAMP Workshop
HKG18-318 - OpenAMP Workshop
 
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainlineHKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
 
HKG18-315 - Why the ecosystem is a wonderful thing, warts and all
HKG18-315 - Why the ecosystem is a wonderful thing, warts and allHKG18-315 - Why the ecosystem is a wonderful thing, warts and all
HKG18-315 - Why the ecosystem is a wonderful thing, warts and all
 
HKG18- 115 - Partitioning ARM Systems with the Jailhouse Hypervisor
HKG18- 115 - Partitioning ARM Systems with the Jailhouse HypervisorHKG18- 115 - Partitioning ARM Systems with the Jailhouse Hypervisor
HKG18- 115 - Partitioning ARM Systems with the Jailhouse Hypervisor
 
HKG18-TR08 - Upstreaming SVE in QEMU
HKG18-TR08 - Upstreaming SVE in QEMUHKG18-TR08 - Upstreaming SVE in QEMU
HKG18-TR08 - Upstreaming SVE in QEMU
 
HKG18-113- Secure Data Path work with i.MX8M
HKG18-113- Secure Data Path work with i.MX8MHKG18-113- Secure Data Path work with i.MX8M
HKG18-113- Secure Data Path work with i.MX8M
 
HKG18-120 - Devicetree Schema Documentation and Validation
HKG18-120 - Devicetree Schema Documentation and Validation HKG18-120 - Devicetree Schema Documentation and Validation
HKG18-120 - Devicetree Schema Documentation and Validation
 
HKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted bootHKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted boot
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

HKG18-317 - Arm Server Ready Program

  • 1. Copyright © 2018 Arm Limited Dong Wei Linaro Connect HKG March 2018 Arm ServerReady Update
  • 2. Confidential © Arm 2017 Server Architecture
  • 3. 3 Base System Architecture (BSA) • Defines hardware requirements Base Boot Requirements (BBR) • Defines firmware requirements These specifications require a minimum set of hardware and firmware implementations that will ensure OS and firmware will interoperate SBSA/SBBR are the BSA/BBR for the server systems • Developed using feedback from vendors across the industry (Silicon vendors, OSVs, Hypervisor vendors, BIOS vendors, OEMs and ODMs) • SBBR defines the required, recommended and optional UEFI, ACPI and SMBIOS interfaces SBSA and SBBR are now available at https://developer.arm.com/ • Current versions are SBSA v3.1 and SBBR v1.0. No click through license required. • SBSA v5.0 and SBBR v1.1 will be available soon Server Base Manageability Guide (SBMG) • Defines guidance for server management standardization • Work In Progress Server Architecture
  • 4. 4 We have created an Engineering Change Request (ECR) process for SBSA / SBBR / SBMG 1. Partner submit the change requirement to Arm (armserverac-request@arm.com) using the template with the following info: Summary of Change, Benefits of the Change (justifications), Impact of the Change. 2. Partner and Arm work together to understand the change requirement and brainstorm the solution that meets the requirement . When the solution is defined, post it to an Arm Drop Zone for broader partners review 3. External Mantis-based ECR tracking database Work In Progress Logistics:  Two discussion channels:  Partner to Arm over armserverac-request@arm.com protected by NDA  Anybody on the Arm server AC discussion group: armserverac-discuss@arm.com • If you are on ArmServerAC, you are already on armserverac-discuss@arm.com, and if you are not then ask us • Weekly phone conferences on the as-needed basis would be the most scalable solution, complemented by ftf gathering Formalizing how to request spec content updates
  • 5. 5 SBSA Status Drafting SBSA v5.0 (BETA available on Dropzone) Core / System: • RAS requirements (AARCH-4638) • ROP and JOB requirements for SBSA (AARCH-11320) • SBSA and SVE (AARCH-11319) • Nested virtualization (AARCH-12054) • MPAM requirements for SBSA (AARCH-11323) • Forced writeback (AARCH-11326) • Add Activity Monitor Requirements to SBSA (AARCH-12044) • Crypto Requirements to SBSA (AARCH-12058) • 48bit mode (AARCH-12858) • Ban non-standard interrupt controller (AARCH-11329) • PPI assignments (AARCH-11753) • Base frequency standardisation (AARCH-11324) • Assign PPIs for new timers in v8.4 (AARCH-11321) • Secure EL2 (AARCH-13144) • TLBI-range (AARCH-12159) • SVE heterogenity (AARCH-13132) IO: • PCIe clarifications (AARCH-12301) • UART clarifications (AARCH-12701) • PCIe requirements for assignable devices (AARCH-11610) • PCIe Precision Time Measurement Root source (AARCH- 12571) • PCIe Deadlock (AARCH-4698) • ACS and Peer to Peer (AARCH-12303) Security: • TCG TPM (AARCH-12312)Some highlights Cleanup: • Deprecate old SBSA levels (AARCH-11330) • Clean to point of persistence (AARCH-13385)*
  • 6. 6 PCIe improvements – SBSA PCIe feature SBSA revision Clarifications, 4G and Non-Prefetchable BARs SBSA 5.0 PTM and system counter Access control and Peer to Peer traffic RCIE minimum requirements SBSA - next Error logging and reporting minimal requirements Vendor defined message handling DPC minimal requirements Memory ordering requirements
  • 7. 7 Additional work on PCIe We want to improve testability of SBSA rules relating to PCIe • Our current approach is based on modified drivers (SATA) and this limits coverage • Very hard to use pre-silicon • We are working with pre-silicon and post-silicon solutions to generate test IP • Enables us to generate specific traffic patterns and increase coverage in areas such as coherency, deadlocks and interrupts We are also working on PCIe guidance ( as opposed to mandates ): • PCIe integration guide - currently trying to nail topic list • PCIe performance verification guide – alpha is in dropzone
  • 8. 8 SBBR Status SBBR 1.1 (EAC available on Dropzone) UEFI: • UEFI PCI Root Bridge IO Protocol Address Translation clarifications • UEFI GOP implementation clarifications • UEFI REST Protocol support • UEFI Capsule Service clarification • Native AArch64 image requirements for UEFI applications and drivers • UEFI RNG Protocol* ACPI: • ACPI Interrupt-signaled Events support • ACPI Generic Event Devices support • ACPI PCI IO Address Translation clarifications* • IORT implementation guidelines SMBIOS/Management: • SMBIOS Processor Information • SMBIOS structure data requirements clarification • SMBIOS Redfish Host Interface support • SPMI recommendation removal Cleanup: • Clarifications of SSDT being optional • Clarifications on UEFI Load File and Load File 2 Protocols • Updated referenced specifications to: UEFI 2.7, ACPI 6.2, SMBIOS 3.1.1 • Secondary core boot standardization with PSCI Security: • Secure and Trusted Boot • Secure Firmware Update
  • 9. 9 UEFI Option ROM Availability Architecturally Arm requires the support of AArch64 native binary UEFI drivers Arm testing room will be open at UEFI Plugfest next week to provide: • Real HW Setup in which to test native AArch64 drivers • Help and suggestions on how to get your driver recompiled for AArch64 Arm is creating a “getting started guide” and a list of off-the-shelf systems that can be used for continuous testing Arm is collecting a list of vendors/cards with AArch64 drivers: • Contact us (uefi@arm.com) if you would like to be on it or if you’d like more information
  • 10. 10 Secure Server Profile What are included: • Verified Boot (Reset - Arm TF - UEFI Secure Boot -OS) • Measured Boot (TPM, TCG Trusted Boot) • Secure Firmware Update What else?
  • 11. 11 SBMG Status and Plans Host (UEFI, OS) SoC Elements (e.g. sensors) On-chip Management BMC Redfish API Redfish Host Interface Redfish enabled PLDM/MCTP Redfish enabled PLDM/MCTP Platform Elements MCTP compliant Transport: PCIe, or I2C/SMBus (SMLink) In-band Out-of-band SoC NIC LM0: current implementation LM1: Redfish LM2: Redfish enabled PLDM/MCTP IPMI support: optional in addition
  • 12. 12 SBSA/SBBR roadmap CY2018H1 CY2018H2 CY2019H1Available Future SBSA 5.0 BETA SBBR 1.1 BETA SBSA 5.0 EAC SBSA-next EAC SBBR-next EACSpecs Enterprise ACS For ARM Server Ready 1.0 Arm Server Ready 2.0 FY2018H1 FY2018H2 FY2019H1Available Future Released Development Adv. Planning Concept Ongoing updates SBSA/SBBR Enterprise ACS 1.3 Compliance test suites SBBR 1.1 EAC SBSA 5.0 REL ECR Database SBBR next Alpha SBSA next Alpha - Next Arch revision -Additional PCIe rules Enterprise ACS For ARM Server Ready 1.0 Enterprise ACS for Server Ready 2.0-Alpha Supporting SBSA5.0/SBBR1.1 Enterprise ACS for Server Ready 2.0-Alpha Supporting SBSA5.0/SBBR1.1 SBMG-1.0 Alpha SBMG-1.0 Beta SBMG-1.0 EAC PCIe perf verification guide Alpha PCIe perf verification guide Beta PCIe Integration guide Alpha PCIe perf verification guide EAC PCIe Integra guide EAC SBSA-next-next Alpha
  • 14. 14 Vision | Mission | Elevator Pitch Vision • Arm servers everywhere and easy to deploy Mission • We provide the tools to enable customers to deploy Arm servers with confidence Elevator • ServerReady gives the confidence that your server works out of the box.
  • 15. 15 SBSA test covers • SBSA CPU properties • SBSA defined system components • SBSA rules for PCIe integration – Based on the PCIe specification – Based on standard OS drivers with no quirks enabled SBBR test covers • UEFI testing based on the UEFI SCT • ACPI testing based on FWTS • SMBIOS testing V1.4 released! Apache v2 licensed • https://github.com/ARM-software/sbsa-acs • https://github.com/ARM-software/arm-enterprise-acs SBSA and SBBR Architectural Compliance Suites
  • 16. 16 Server Ready testing OEM/ODM/SiP/IBV • runs the tests Arch Team • Develops tests • Takes tests reports and provides certification Support team • Supports ODM/OEM/Silicon vendor or BIOS vendor on running the tests and fixing issues We are engaging with silicon vendors, ODMs, OEMs and BIOS vendors to run the tests Tests are developed by our architecture team, which also develops the specifications We have a support team that helps in running of test, debugging etc
  • 17. 17 Inputs for certification Certification request document (CRD) contains • Board information table • Enterprise ACS logs • Explanation for fails and skips • OS boot logs • CentOS x.x (Kernel version y.y) • Or RHEL x.x (Kernel version y.y) • Suse Linux x.x (Kernel version y.y) • Ubuntu x.x Board Information table ODM Name Board Name Silicon provider Silicon version Bios vendor Target market Is it a SKU of a previously certified board? If yes, name of the board.
  • 18. 18 Likely to Launch in Q4’2018 Call to Action • Partners continue to work with Arm to evaluate the tests • Partners invited to write guest blogs promoting the program • Partners get ready to co-launch Arm Server Ready Program Launch
  • 19. 1919 The trademarks featured in this presentation are registered and/or unregistered trademarks of Arm Limited (or its subsidiaries) in the EU and/or elsewhere. All rights reserved. All other marks featured may be trademarks of their respective owners.