Facebook Server Intel Motherboard V4.0 Project Tioga Pass Rev 0.30

Total Page:16

File Type:pdf, Size:1020Kb

Facebook Server Intel Motherboard V4.0 Project Tioga Pass Rev 0.30 Facebook Server Intel Motherboard V4.0 Project Tioga Pass Rev 0.30 Author: Whitney Zhao, Hardware Engineer, Facebook Jia Ning, Hardware Engineer, Facebook 1 Revision History Table 1-1 Date Name Description 6/3/2015 Jia Ning - Version 0.1 release 7/29/201 Whitney - Version 0.2 release 6 Zhao - Updated Figure and Tables References - Update contents 1/31/201 Whitney - Version 0.3 release for OCP summit 7 Zhao - Update contents - Minor corrections 2 January 2017 Open Compute Project Tioga Pass v4.0 © 2016 Facebook. As of July 26, 2016, the following persons or entities have made this Specification available under the Open Compute Project Hardware License (Permissive) Version 1.0 (OCPHL-P), which is available at http://www.opencompute.org/.../spec-submission-process/. Facebook, Inc. Your use of this Specification may be subject to other third party rights. THIS SPECIFICATION IS PROVIDED "AS IS." The contributors expressly disclaim any warranties (express, implied, or otherwise), including implied warranties of merchantability, non-infringement, fitness for a particular purpose, or title, related to the Specification. The Specification implementer and user assume the entire risk as to implementing or otherwise using the Specification. IN NO EVENT WILL ANY PARTY BE LIABLE TO ANY OTHER PARTY FOR LOST PROFITS OR ANY FORM OF INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER FROM ANY CAUSES OF ACTION OF ANY KIND WITH RESPECT TO THIS SPECIFICATION OR ITS GOVERNING AGREEMENT, WHETHER BASED ON BREACH OF CONTRACT, TORT (INCLUDING NEGLIGENCE), OR OTHERWISE, AND WHETHER OR NOT THE OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE." http://opencompute.org 3 2 Scope This specification describes Facebook dual sockets server Intel Motherboard v4.0 (Project name: Tioga Pass) design and design requirement to integrate Intel Motherboard v4.0 into Open Rack V21. 3 Contents 1 Revision History ......................................................................................................................... 2 2 Scope ......................................................................................................................................... 4 3 Contents .................................................................................................................................... 4 4 Overview.................................................................................................................................... 8 4.1 Overview ...................................................................................................................... 8 4.2 Open Rack Introduction ............................................................................................... 8 5 Physical Specifications ............................................................................................................... 9 5.1 Block Diagram ............................................................................................................... 9 5.2 Placement and Form Factor ......................................................................................... 9 5.3 CPU and Memory ....................................................................................................... 10 5.4 Platform Controller Hub (PCH) ................................................................................... 11 5.5 PCIe Usage .................................................................................................................. 12 5.6 PCB Stack‐Up .............................................................................................................. 12 6 BIOS ......................................................................................................................................... 16 6.1 BIOS Chip .................................................................................................................... 16 6.2 BIOS Source Code ....................................................................................................... 16 6.3 BIOS Feature Requirements ....................................................................................... 16 7 PCH Intel® SPS Firmware Plan of Record ................................................................................. 22 8 BMC ......................................................................................................................................... 23 8.1 Management Network Interface ................................................................................ 23 8.2 Local Serial Console and SOL ...................................................................................... 23 8.3 Graphic and GUI ......................................................................................................... 24 8.4 Remote Power Control and Power policy .................................................................. 24 8.5 Port 80 POST ............................................................................................................... 24 8.6 Power and System Identification LED ........................................................................ 24 1 http://files.opencompute.org/oc/public.php?service=files&t=348f3df2cc4ce573397fcc4424f68ca6&download 4 January 2017 Open Compute Project Tioga Pass v4.0 8.7 Platform Environment Control Interface (PECI) ......................................................... 25 8.8 Power and Thermal Monitoring and power limiting .................................................. 25 8.9 SMBUS Diagram ......................................................................................................... 25 8.10 Sensors/Events ........................................................................................................... 25 8.11 SEL .............................................................................................................................. 33 8.12 FSC in BMC.................................................................................................................. 34 8.13 OEM commands ......................................................................................................... 35 8.14 BMC FW chip and Firmware Update .......................................................................... 37 8.15 BMC Update Dual PCH flash ....................................................................................... 37 8.16 BMC Update and Access CPLD ................................................................................... 39 8.17 BMC Time Sync ........................................................................................................... 39 8.18 PCIe and Mezzanine card Thermal monitoring .......................................................... 39 8.19 BMC PPIN Implementation ........................................................................................ 40 8.20 BMC Average Power Reporting .................................................................................. 40 8.21 BMC Access and Update VR Firmware ....................................................................... 40 8.22 BMC MSR Dump from OOB ........................................................................................ 40 8.23 BMC Network Status .................................................................................................. 41 8.24 BMC Secure boot ........................................................................................................ 41 9 Thermal Design Requirements ................................................................................................ 43 9.1 Data Center Environmental Conditions ..................................................................... 43 9.2 Server operational condition ...................................................................................... 43 9.3 Thermal Kit Requirements.......................................................................................... 45 10 I/O System ............................................................................................................................... 47 10.1 PCIe x32 Slot/Riser Card ............................................................................................. 47 10.2 DIMM Sockets ............................................................................................................ 54 10.3 Mezzanine Card .......................................................................................................... 54 10.4 Network ...................................................................................................................... 59 10.5 USB ............................................................................................................................. 60 10.6 SATA ........................................................................................................................... 61 10.7 M.2 ............................................................................................................................. 61 10.8 Debug Header ............................................................................................................. 62 10.9 Switches and LEDs ...................................................................................................... 66 10.10 Fan connector ............................................................................................................. 67 http://opencompute.org 5 10.11 TPM Connector and Module .....................................................................................
Recommended publications
  • How to Hack a Turned-Off Computer Or Running Unsigned
    HOW TO HACK A TURNED-OFF COMPUTER, OR RUNNING UNSIGNED CODE IN INTEL ME Contents Contents ................................................................................................................................ 2 1. Introduction ...................................................................................................................... 3 1.1. Intel Management Engine 11 overview ............................................................................. 4 1.2. Published vulnerabilities in Intel ME .................................................................................. 5 1.2.1. Ring-3 rootkits.......................................................................................................... 5 1.2.2. Zero-Touch Provisioning ........................................................................................... 5 1.2.3. Silent Bob is Silent .................................................................................................... 5 2. Potential attack vectors ...................................................................................................... 6 2.1. HECI ............................................................................................................................... 6 2.2. Network (vPro only)......................................................................................................... 6 2.3. Hardware attack on SPI interface ..................................................................................... 6 2.4. Internal file system .........................................................................................................
    [Show full text]
  • Intel X86 Considered Harmful
    Intel x86 considered harmful Joanna Rutkowska October 2015 Intel x86 considered harmful Version: 1.0 1 Contents 1 Introduction5 Trusted, Trustworthy, Secure?......................6 2 The BIOS and boot security8 BIOS as the root of trust. For everything................8 Bad SMM vs. Tails...........................9 How can the BIOS become malicious?.................9 Write-Protecting the flash chip..................... 10 Measuring the firmware: TPM and Static Root of Trust........ 11 A forgotten element: an immutable CRTM............... 12 Intel Boot Guard............................. 13 Problems maintaining long chains of trust............... 14 UEFI Secure Boot?........................... 15 Intel TXT to the rescue!......................... 15 The broken promise of Intel TXT.................... 16 Rescuing TXT: SMM sandboxing with STM.............. 18 The broken promise of an STM?.................... 19 Intel SGX: a next generation TXT?................... 20 Summary of x86 boot (in)security.................... 21 2 Intel x86 considered harmful Contents 3 The peripherals 23 Networking devices & subsystem as attack vectors........... 23 Networking devices as leaking apparatus................ 24 Sandboxing the networking devices................... 24 Keeping networking devices outside of the TCB............ 25 Preventing networking from leaking out data.............. 25 The USB as an attack vector...................... 26 The graphics subsystem......................... 29 The disk controller and storage subsystem............... 30 The audio
    [Show full text]
  • Thinkcentre M58p with Intel AMT White Paper
    ThinkCentre M58p with Intel Active Management Technology First Edition (October 2008) Contents About this document . .v Intel ME configuration. .10 Intel AMT setup and configuration . .13 Driver description . .18 Chapter 1. Introduction to Intel vPro and Intel AMT technology . .1 Chapter 6. Web user interface . .19 Acronyms . .1 Access the Web user interface . .19 Provision the Intel AMT system . .19 Chapter 2. Lenovo ThinkCentre Logging onto the client system . .19 computer equipped with Intel AMT Function in Web user interface . .20 technology . .3 Appendix A. Two examples of Intel Chapter 3. ISV solution introduction . .5 AMT setup and configuration: SMB mode and enterprise mode . .23 Chapter 4. Main features of computers Intel AMT setup and configuration steps - SMB built with Intel AMT . .7 mode . .23 Intel AMT setup and configuration steps - Enterprise mode . .23 Chapter 5. Intel AMT setup and configuration based on Lenovo Appendix B. Default configuration ThinkCentre M58p . .9 values for Intel MEBx . .25 Associated Intel AMT setup and configuration in BIOS . .9 Intel MEBx setup and configuration . .10 Appendix C. Notices . .27 Entering MEBx configuration user interface. .10 Trademarks . .28 Changing Intel ME password . .10 iii iv ThinkCentre M58p with Intel AMT White Paper About this document ® This document provides information about the application of the Intel Active ® ® Management Technology (Intel AMT) for Lenovo ThinkCentre M58p desktop computers. It provides a step-by-step approach to successfully use the Intel AMT technology. This document is intended for trained IT professionals, or those responsible for deploying new computers throughout their organizations. The readers should have basic knowledge of network and computer technology, and be familiar with these terms: TCP/IP, DHCP, IDE, DNS, Subnet Mask, Default Gateway, and Domain Name.
    [Show full text]
  • APS Networks® Launches Three TIP Openbng Programmable Switches to Boost the Disaggregated Telco Broadband Market
    APS Networks® launches three TIP OpenBNG programmable switches to boost the disaggregated telco broadband market. Operators gain further product alternatives right down to the chip level, supporting multi-sourcing strategies for Broadband Network Gateway (BNG) and hybrid use case requirements. The APS Networks® OpenBNG devices are based on Intel Tofino P4-programmable Ethernet switch ASICs, Stratix 10 MX FPGAs and Intel Xeon D Scalable processors. Stuttgart, Germany – June 16th, 2021 – APS Networks® launches three BNG switches which aim to comply with the Telecom Infra Project’s (TIP) OpenBNG requirements, enabling customers to choose between the TIP standard configurations (SC) SC-1, SC-2 and SC-3 leaf designs that best address end user demands. This provides operators flexible deployment options covering full-functionality deployments and service-only BNG deployments and leaf-spine configuration alternatives. TIP OpenBNG is an initiative within the Open Optical & Packet Transport (OOPT) Project Group’s Disaggregated Open Routers (DOR) sub-group. The participating operators in the Project Group are currently preparing a joint Request for Information (RFI) for OpenBNG, leading to test and validation activities and the awarding of TIP badges later in the year for compliant solutions. The OpenBNG initiative is backed by leading operators such as BT, Deutsche Telekom, Telecom Italia, Telefónica and Vodafone Group. Disaggregated and open BNGs allow operators a choice of different hardware platforms and types of network operating system (NOS) and control plane applications they want to use. This agility results in a lower total cost of ownership, ultimately leading to a lower cost per broadband subscriber and reduces dependencies on individual monolithic suppliers.
    [Show full text]
  • Intel Management Engine Deep Dive
    Intel Management Engine Deep Dive Peter Bosch About me Peter Bosch ● CS / Astronomy student at Leiden University ● Email : [email protected] ● Twitter: @peterbjornx ● GitHub: peterbjornx ● https://pbx.sh/ About me Previous work: ● CVE-2019-11098: Intel Boot Guard bypass through TOCTOU attack on the SPI bus (Co-discovered by @qrs) Outline 1. Introduction to the Management Engine Operating System 2. The Management Engine as part of the boot process 3. Possibilities for opening up development and security research on the ME Additional materials will be uploaded to https://pbx.sh/ in the days following the talk. About the ME About ME ● Full-featured embedded system within the PCH ○ 80486-derived core ○ 1.5MB SRAM ○ 128K mask ROM ○ Hardware cryptographic engine ○ Multiple sets of fuses. ○ Bus bridges to PCH global fabric ○ Access to host DRAM ○ Access to Ethernet, WLAN ● Responsible for ○ System bringup ○ Manageability ■ KVM ○ Security / DRM ■ Boot Guard ■ fTPM ■ Secure enclave About ME ● Only runs Intel signed firmware ● Sophisticated , custom OS ○ Stored mostly in SPI flash ○ Microkernel ○ Higher level code largely from MINIX ○ Custom filesystems ○ Custom binary format ● Configurable ○ Factory programmed fuses ○ Field programmable fuses ○ SPI Flash ● Extensible ○ Native modules ○ JVM (DAL) Scope of this talk Intel ME version 11 , specifically looking at version 11.0.0.1205 Platforms: ● Sunrise Point (Core 6th, 7th generation SoC, Intel 100, 200 series chipset) ● Lewisburg ( Intel C62x chipsets ) Disclaimer ● I am in no way affiliated with Intel Corporation. ● All information presented here was obtained from public documentation or by reverse engineering firmware extracted from hardware found “in the wild”. ● Because this presentation covers a very broad and scarcely documented subject I can not guarantee accuracy of the contents.
    [Show full text]
  • Ownership and Control of Firmware in Open Compute Project Devices
    Ownership and Control of Firmware in Open Compute Project Devices Elaine Palmer ([email protected]), Tamas Visegrady ([email protected]), and Michael Osborne ([email protected]), IBM Research Division 9 November 2018 1 Introduction The information herein is based on the authors’ A country music song made famous by Garth decades of work in designing and implementing Brooks in 1990 declares, “I’ve got friends in low ownership in a broad range of security devices, places,” noting that one can always rely on from smart card chips to servers. ordinary people to help a friend in need. Firmware is the friend in the “low places” of data 3 The parties involved centers. It runs in servers, memory subsystems, Consider a simple example of a data center that storage systems, cooling units, communications procures and deploys a thousand identical new controllers, power management systems, and devices. The devices arrive with firmware that is other devices. These systems and subsystems functional, but outdated. After first installing the rely on firmware to verify the soundness of the devices, the data center staff must update the hardware, to transfer control to subsequent firmware, and continue to update it, as new software, and, in many cases, to operate the versions of the firmware are released, throughout hardware directly. Firmware typically has full the life of the device. When the device is access to the resources of a system, such as ultimately taken out of service, it is sent to a volatile and non-volatile memory, processors, reclamation center, where it is stripped of useful coprocessors, voltage regulators and fans.
    [Show full text]
  • Telecom Infra Project (TIP)
    2017 Aid for Trade - Case Story Template SurveyMonkey #146 COMPLETE Collector: Web Link 1 (Web Link) Started: Wednesday, February 08, 2017 10:41:31 AM Last Modified: Wednesday, February 08, 2017 11:08:01 AM Time Spent: 00:26:30 IP Address: 192.91.247.212 PAGE 3: B. ABOUT YOU Q1: Respondent details Name Flavia Alves Organization Facebook Email Address [email protected] Phone Number +1202 330-3990 Q2: Country or Customs territory UNITED STATES Q3: Organization Private sector PAGE 4: C. ABOUT YOUR CASE STORY Q4: Title of case story Telecom Infra Project (TIP) Q5: Case story focus Infrastructure upgrading and the development of related services markets, including through support for investment climate reforms. Q6: Case story abstract TIP is an engineering-focused initiative that is bringing operators, infrastructure providers, system integrators, and other technology companies together to collaborate on the development of new technologies and reimagine traditional approaches to building and deploying telecom network infrastructure. Q7: Who provided funding? Private sector Q8: Project/Programme type Multi-country 1 / 2 2017 Aid for Trade - Case Story Template SurveyMonkey Q9: Your text case story Telecom Infra Project (TIP) is an engineering-focused initiative that is bringing operators, infrastructure providers, system integrators, and other technology companies together to collaborate on the development of new technologies and reimagine traditional approaches to building and deploying telecom network infrastructure. Every day, more people and more devices around the world are coming online, and it’s becoming easier to share data- intensive experiences like video and virtual reality. Scaling traditional telecom infrastructure to meet this global data challenge is not moving as fast as people need it to.
    [Show full text]
  • AMT Implementation on a UTC RETAIL 3170 POS
    VICTOR , NY – CLEVELAND , OH – SCOTTSDALE , AZ AMT Implementation on a UTC RETAIL 3170 POS Controlling POS systems using Intel AMT Features UTC RETAIL 1 November 19, 2012 11823029A VICTOR , NY – CLEVELAND , OH – SCOTTSDALE , AZ Scope The document was written for use by UTC RETAIL 3170 POS customers to enable the AMT feature in the 3170 hardware. It includes step-by-step instructions to configure a 3170 system allowing AMT to be examined and exercised. Background AMT is a feature of the Intel® vPro™ Technology. From the Intel website: “Intel® vPro™ technology is a set of security and manageability capabilities built into the 3rd generation Intel Core vPro processor family, the Intel Xeon processor E3-1200 product family, Intel® chipsets, and network adapters.” Also, vPro: “Uses Intel® Active Management Technology (Intel® AMT) to facilitate remote management of platform applications, even when the platform is turned off, as long as the platform is connected to a power line and network.” A discussion of vPro is beyond the scope and purpose of this document. Full vPro implementation requires a CPU upgrade from the CPU included in a base 3170 and an IT staff that has the resources to dedicate itself to implementation and use. Every 3170 has the Standard AMT . The security features enabled by AMT require a certain level of Intel CPU, an Intel AMT enabled chipset and an Intel network interface IC. These components all exist in the 3170. To use the Standard AMT , the 3170 must have its power cord plugged into an active power plug, must be connected to an active network and its AMT system must be configured.
    [Show full text]
  • Podcast Script – Why Create a Social Network and Why Use of Ning
    Podcast script – Why Create a Social Network and Why Use of Ning This short podcast will provide an overview of why we decided to create a social network and why we decided to use ning. I have long used social forums and tools for interacting with people ever since I engaged with the internet at University. This started off by using simple newsgroups to meet likeminded people interested in similar things to me. As the internet grew and got more sophisticated I started to use bulletin boards as the use of things like newsgroups declined. Whilst pregnant I found an online community which enabled me to manage a significant life transition (becoming a mother) very effectively. I found a supportive community who were able to answer any questions I had, allowed me to develop friendships and supported me. I wanted to somehow replicate this amazing support network for new students when they arrived at University and offer them the same opportunities to see that everyone else was feeling the same as them, that no one had all the answers and that they could make friends easily. Our first attempts to establish an online community were relatively limited. In 2007 we installed Moodle and created a series of discussion forums for students to post queries and for other students and staff to support them. Students were able to self register on the Moodle site. However in order to see what posts had been made they needed to be logged in with an account. Even though this activity was fairly straightforward it appeared to have put a lot of people off and the engagement with the discussion forums was limited.
    [Show full text]
  • Ning Podcast Hello and Welcome to Teaching Online
    Podcast: On Ning Podcast Hello and welcome to Teaching Online. In this cast I will discuss Nings and how you can use this social network for educational purposes. But before I begin let me tell Three: you a little bit about social networking! Ning A social network is a community of people who share interest or activities or who are interested in meeting others that share these interest or activities. So let’s take this to the Internet and you can create a virtual network of people who communicate via a website. Some of the most common or popular sites are My Space, FaceBook and Twitter. So how does a Ning play into this mix? 1) What is it? A Ning is an online website where anyone can create their own social network. What makes a Ning different from those popular social networks, like FaceBook, is that anyone can create their own social network for a particular topic or need and they can cater to a specific membership base. An example would be an instructor setting up a Ning just for their class to discuss the subject they are studying. With a Ning, you can determine the site’s appearance and functionality, as well as whether the site is public or private. Nings can include features such as photos or videos, lists of network members and events, groups within the network, and communication tools such as forums or blogs. Best part of the Ning, it is free and easy to set up and navigate. No technical skill is required to set up a social network.
    [Show full text]
  • {Download PDF} Social Network Analysis
    SOCIAL NETWORK ANALYSIS - COMMUNITY DETECTION AND EVOLUTION PDF, EPUB, EBOOK Rokia Missaoui | 272 pages | 14 Apr 2015 | Springer International Publishing AG | 9783319121871 | English | Cham, Switzerland Social Network Analysis - Community Detection and Evolution PDF Book Social Bookmarking Sites Bookmarking is the practice of saving a link to a Web site in your Web browser. When you find a kindred spirit, add his blog to your list of friends. You can always leave and try something else. Get Off Social Media Bummed out by the Internet and how much more fun everyone else seems to be having? It can be a great tool for companionship and interaction. AI could soon streamline your dating life. A lot of kids even admit to using Snapchat the most, suggesting that it could be the future of where social networking is headed. Self-made networks are called informal networks, while those imposed by an outside source -- like the bureaucracies and hierarchies in large companies -- are called formal networks. Most users love it for its short message limit now characters and unfiltered feed that showed them absolutely everything in the form of tweets. When multiple people comment on a single post, it's called a thread. Path: Perhaps the best-known private social network is Path. Campos also looks outside his industry for ideas. Without an airplane , a car , a telephone or an e-mail account, people formed relationships primarily with the people who lived in their towns or villages. There's a lot of live-streaming going on lately. Job postings are an important part of any information technology social network.
    [Show full text]
  • Social Networking and Use of Other Electronic Media Employees In
    Social Networking and Use of Other Electronic Media Employees in a public school system are responsible for modeling and teaching high standards of decency and civic values. District employees must model the character they are expected to teach, both on and off the work site. This applies to material which is posted on personal web sites (including blogs), and social networking sites, such as Facebook or Twitter, or which is transmitted through personal email accounts or by use of portable electronic devices including, but not limited to smart phones, Internet-enabled devices, etc. An employee’s online behavior should reflect the same standards of honesty, respect, and consideration that he/she uses face-to- face. Employees must comply with federal and state law, board policy, and the Code of Ethics and Standard Practices for Texas Educators. Failure to comply with this policy could result in disciplinary action, up to and including termination from employment. Social media is defined as any form of online publication or presence that allows interactive communication among people in which they create, share, and exchange information and ideas in virtual communities and networks. Examples of social media include, but are not limited to, Facebook, Twitter, YouTube, Google+, LinkedIn, Tumblr, Instagram, Ning, Second Life, and Flickr. Employees shall be held to the same professional standards in his or her public use of social media as for any other public conduct. If an employee posts messages or pictures which diminish the employee’s professionalism or discredit the employee’s capacity to maintain the respect of students and parents, the employee’s ability to perform effectively his or her job may be impaired.
    [Show full text]