Supreeth Venkatesh, Staff System Architect Arm Open System Firmware

Total Page:16

File Type:pdf, Size:1020Kb

Supreeth Venkatesh, Staff System Architect Arm Open System Firmware Open System Firmware Server Base Manageability Guide for SBSA Compliant Arm (AARCH64) Servers Supreeth Venkatesh, Staff System Architect Arm Agenda • Rationale • History • Introduction • Proof of Concept • Roadmap/Plan • Call to Action Rationale • Arm Ecosystem Partners value standardized common server manageability capabilities with scope for flexible customizations which add value to the end user. • Standardization is key to ensure that Arm Ecosystem does not get fragmented by point solutions that plague the industry today. • Leverage industry standard system management specifications including but not limited to Redfish, Platform Level Data Model (PLDM), Management Component Transport Protocol (MCTP) as defined by the Distributed Management Task Force (DMTF). • Leverage Hardware Management Specifications and designs as defined by Open Compute Group (OCP). History • Server Base System Architecture (SBSA) -Hardware system architecture for servers based on 64-bit ARM processors. -Standardizes processor element features and key aspects of system architecture. -http://infocenter.arm.com/help/topic/com.arm.doc.den0029b/Server_Base_System_Architecture_v5_0_ARM_DEN_0029B.pdf • Server Base Boot Requirements (SBBR) -Defines the Boot and Runtime Services expected by an enterprise platform Operating System or hypervisor, for an SBSA-compliant Arm AArch64 server. -Based on UEFI, SMBIOS and ACPI specifications. -http://infocenter.arm.com/help/topic/com.arm.doc.den0044c/Server_Base_Boot_Requirements_v1_1_Arm_DEN_0044C.pdf History • ARM Enterprise ACS -Architecture Compliance Suite tests SBSA and SBBR specifications. https://github.com/ARM-software/arm-enterprise-acs FWTS LuvOS SBBR SBSA SBSA SBBR PAL SCT UEFI TF-A FVP Arm Partner OSS Introduction • Server Base Manageability is a specification that is under development in conjunction with partners across the industry. • Together with SBSA and SBBR, the SBMG provides a standard based approach to building Arm servers, their firmware and their server management capabilities. • SBMG is developed within the Arm ServerAC community. • Engineering change request process similar to other standards bodies. • Anybody in the community can raise a request for a change. Public to community by sending a mail to [email protected] Or raising a public ticket on the mantis DB https://atg-mantis.arm.com/ Introduction – Compliance Levels • Defines several levels of manageability compliance (e.g., M0, M1, M2) BMC-Platform SoC-BMC Elements BMC Management BMC-IO Device Interfaces Interfaces Services Interfaces Host Interface Interface IMPLEMENTATION IMPLEMENTATION IMPLEMENTATION IMPLEMENTATION IMPLEMENTATION LEVEL M0 DEFINED DEFINED DEFINED DEFINED DEFINED IPMI based Host Interface and Redfish Host IMPLEMENTATION IMPLEMENTATION Interface IMPLEMENTATION LEVEL M1 DEFINED DEFINED Redfish and IPMI /MCTP Host Interface DEFINED IPMI based Host Interface and Redfish Host IMPLEMENTATION Interface LEVEL M2 DEFINED Redfish/PLDM/MCTP Redfish and IPMI /MCTP Host Interface NC-SI Introduction – Sub teams • To help guide the Arm server designers to provide common manageability functions to the end users. • To accelerate development of Server Base Manageability Guide (SBMG), three different teams within Arm ServerAC community with participation from several different Arm Ecosystem Partners have been formed. -Reliability, Availability, Serviceability (RAS) team. -Platform Monitoring and Control team. -Remote Debug team. Introduction – RAS • Define error record formats for RAS errors leveraging existing common platform error record (CPER) as specified in unified extensible firmware interface specification (UEFI). • Define the SOC - BMC manageability interface requirements for RAS errors including in-band and out-of-band interfaces. • Define fault notification signal. • Define the interface and mechanism for injecting RAS hardware errors. Satellite Application BMC Management Processor (SOC) Controller CPER/Async Event RAS Errror Event Generate/Store CPER EventMessageSupported(Version, TID) return(EventClass) RAS Event Supported? EventMessageBufferSize(CperSize) yes return(MaxBufferSize) MaxBufferSize < CperSize? Yes PlatformEventMessage(RasPollEvent) return(PLDM_BASE_CODE) PollForPlatformEventMessage (GetFirstPart, 0x0000) Introduction return(nextDataHandle, Start=0x01, Ras PollEvent, – RAS EventDataSize, EventData ) PollForPlatformEventMessage (GetNextPart, 0xFFFF) return(nextDataHandle, Middle=0x02, Ras PollEvent, EventDataSize, EventData ) PollForPlatformEventMessage (GetNextPart, 0xFFFF) return(nextDataHandle, End=0x04, Ras PollEvent, EventDataSize, EventData, EventDataIntegrityChecksum ) PollForPlatformEventMessage (AcknowledgementOnly, 0xFFFF) return(nextDataHandle, StartAndE nd=0x05, EventID=0x0000 ) Introduction – Monitoring & Control • Define interfaces and protocol needed for BMC – SOC communication in the scope of Platform Monitoring leveraging Open Hardware Management Specification for Remote Machine Management defined by OCP. • List of use cases analyzed for Standardizing -BMC to Multiple SOC communication. -BMC assisted SOC power actions. -BMC to monitor critical health of SOC. -BMC to monitor SOC boot progress. -BMC watchdog use cases. Satellite BMC Management Controller RunInitAgent( RunInitAgent( PLDMTerminusOnline) SystemHardReset) GetPDRRepositoryInfo() return(PDRInfo) GetPDR(0x0000,..) return(nextRecordHandle) GetPDR( recordHandle,..) return(0x0000) Create Central Introduction PDR Repo – Monitor & Control GetSensorReading(SensorID, ...) return(presentReading, ...) Calculate Reading Reading Conversion formula: Y = (m * X + B) Where: Y = converted reading in Units X = reading from sensor m = resolution from PDR in Units B = offset from PDR in Units Units = sensor/effecter Units, based on the Units and auxUnits fields from the PDR for the numeric sensor Introduction – Remote Debug • Server Remote Debug is the act of gaining visibility of the hardware and software behaviors of an SoC, using a debugger which is not directly connected to the Server SoC. • Define protocols for communicating between the debugger and the BMC. • Define physical interfaces between BMC and SoC. • Define protocols for communicating between the BMC and the SoC. • Define mechanisms for ensuring only suitable debuggers can access the SoC. Introduction – Remote Debug Proof of Concept • OpenBMC is a Linux foundation project. It is a highly extensible framework for BMC software and implement for data-center computer systems. • OpenBMC implementation will be used as a medium to realize Server Base Manageability Guide. • Arm and Arm SiPs are participating in the OpenBMC development so that there will be an open source implementation to the SBMG requirements. • Arm has joined OpenBMC Technical Steering Committee (Arm, IBM, Intel, Facebook, Google & Microsoft). https://github.com/openbmc/docs/blob/master/README.md#technical-steering-committee Implementation libMCTP libMCTP libPLDM RAS Driver RAS App(BMC) libPLDM (BMC) (BMC) (Satellite MC) (Satellite MC) (Satellite MC) Daemon Driver Starts Starts mctp_init Init(Blocking/Non-Blocking) Init(Blocking/Non-Blocking) mctp_init return (InitCode) return (InitCode) mctp_binding_int() Success mctp_binding_int() return (BindInitCode) return (InitCode) return (BindInitCode) encode_pldm_cmd( PlatformEventMessage, RAS PollEvent) return (pldm_msg) mctp_message_tx( PldmRequest PldmRequest send_msg( mctp_eids , Binding Phys ical La yer msg, Notification Notification pldm_msg) Proof of len) Generate Concept – PLDM Res ponse RAS mctp_message_tx( send_msg( mctp_eids , PldmResponse msg, Binding Phys ical La yer return (pldm_response) pldm_msg) Notification len) decode_pldm_cmd( pldm_response, encode_pldm_cmd( ) PollforPlatformEventMessage, GetFirstPart) return (pldm_msg) mctp_message_tx( send_msg( mctp_eids , PldmRequest PldmRequest msg, Binding Phys ical La yer pldm_msg) Notification Notification len) Generate PLDM Res ponse Proof of Concept – Remote Debug • Proposed Design proposal is to integrate OpenOCD within OpenBMC stack. https://lists.ozlabs.org/pipermail/openbmc/2019-July/017122.html • OpenOCD is an open source on-chip debugging solution for JTAG connected processors. It enables source level debugging with GNU gdb. It can also integrate with and GDB aware IDE, such as eclipse. • Completed first phase of implementation which includes the demonstration of GDB connection on port 3333 to OpenOCD debug server daemon running on OpenBMC. • Next phase of implementation to utilize a wrapper which adds JTAG master core infrastructure by defining new JTAG class and provide generic JTAG interface to allow hardware specific drivers to connect this interface. https://patchwork.ozlabs.org/cover/848652/ • This will enable all JTAG drivers to use the common interface part and will have separate drivers for hardware implementation. Roadmap/Plan . Management Console .Reference Implementation .Reference Implementation .Reference .Reference Implementation . Security Transport Protocol to demo Control and to demo Remote Firmware Implementation to demo to demo Remote Debug requirements/Root of Enablement. Monitor on board and on upgrade Capability on a BMC RAS Errors on a Capability on a chosen Trust. SOC sensors of a chosen chosen reference platform. chosen reference reference platform. reference platform. .Leverage existing UEFI platform. .JTAG Interface. .Reference PLDM capsule update and arm-tf .Leverage existing CPER enablement to send sensor update methods. records. data when requested by Host Firmware MC. Pick/Choose
Recommended publications
  • Bringing the Openbmc for Platform Manage- Ment System in Telco Cloud
    Rongqiang Zhang Bringing the OpenBMC for Platform Manage- ment System in Telco Cloud Helsinki Metropolia University of Applied Sciences Master of Engineering Information Technology Master’s Thesis 30 Apr 2019 Abstract Rongqiang Zhang Author(s) Bringing the OpenBMC for Platform Man-agement System in Title Telco Cloud Number of Pages 88 pages + 0 appendices Date 30 Apr 2019 Degree Master of Engineering Degree Programme Information Technology Specialisation option Networking and Services Ville Jääskeläinen, Head of Degree Program Instructor(s) Zinaida Grabovskaia, PhL, Senior Lecturer Antti Koivumäki, Senior Lecturer Ari Helminen, Business Manager The current platform management system in Telco cloud infrastructure is based on closed firmware stack. With the upcoming 5G, this closed firmware stack has created several tech- nology and business problems. The major problems are hardware-software vendor lock-in, long lead time for feature development and bug fixing, and security risks. The objective of this study is to evaluate the possibility to bring an Open Source software stack for platform management system and baseboard management controller in Telco cloud. The study was divided into 3 parts. First part is to analyse the current state and project specification. Second part is to introduce and evaluate the OpenBMC, an open source soft- ware stack for the objective of this study. Third part is Proof of Concept to run OpenBMC on Telco. Keywords BMC, 5G, NFV, Redfish, Security Table of Contents Abstract List of Abbreviations 1 Introduction
    [Show full text]
  • Server Base Manageability Requirements 1.0 Platform Design Document Non-Confidential
    Arm® Server Base Manageability Requirements 1.0 Platform Design Document Non-confidential Copyright © 2020 Arm Limited or its affiliates. All rights reserved. Document number: DEN0069B Server Base Manageability Requirements Server Base Manageability Requirements Copyright © 2020 Arm Limited or its affiliates. All rights reserved. Release inormation The Change History table lists the changes made to this document. Table 1-1 Change history Date Issue Confidentiality Change 30 January 2020 A Non-Confidential Initial release, SBMR 1.0 15 June 2020 B Non-Confidential License LES-PRE-21585 Page 2 of 45 Copyright © 2020 Arm Limited or its affiliates. All rights reserved. DEN0069B 1.0 Server Base Manageability Requirements Arm Non-Confidential Document Licence (“Licence”) This Licence is a legal agreement between you and Arm Limited (“Arm”) for the use of the document accompanying this Licence (“Document”). Arm is only willing to license the Document to you on condition that you agree to the terms of this Licence. By using or copying the Document you indicate that you agree to be bound by the terms of this Licence. If you do not agree to the terms of this Licence, Arm is unwilling to license this Document to you and you may not use or copy the Document. “Subsidiary” means any company the majority of whose voting shares is now or hereafter owner or controlled, directly or indirectly, by you. A company shall be a Subsidiary only for the period during which such control exists. This Document is NON-CONFIDENTIAL and any use by you and your Subsidiaries (“Licensee”) is subject to the terms of this Licence between you and Arm.
    [Show full text]
  • OCP's Rack Manager Controller Subproject (Openrmc)
    OSF-OpenRMC OCP's Rack Manager Controller subproject (OpenRMC) John Leung, Principle Engineer Intel Corporation Han Wang, Senior Architect Inspur OpenRMC Overview OpenRMC OPENRMC • Goals and Motivation • Logistics and meetings Specifications Status • Reviewed of existing rack management implementations Embedded • Specifying interface and requirements Software • Received Code Contributions RMC for openEdge Platform to DC The OpenRMC Goals manager Specify the Rack Manager Controller service RMC Client interfaces • Northbound interface to datacenter manager (spec) Redfish • Southbound interface requirements to OCP Northbound Interface platforms in the rack Rack Manager Controller Deliver a Rack Manager implementation Service • Available as open source Southbound Interface OCP compliant hardware designs I2C IPMI Redfish • Handled by other OCP projects to OCP platforms Motivation for OpenRMC RMC Rack Mgr Service Controller 1. System Firmware (BIOS) 3 In-band • OCP System Firmware project SW OS 2. BMC Firmware Agent Out-of-band • OpenBMC governed by Linux Foundation (Redfish) 3. Rack Manager Software/Firmware BIOS CPU NIC 1 • OCP OpenRMC NC-SI BMC FW BMC 2 • With OpenBMC, the industry unified the various repositories in 2018 device other • With rack manager, OCP will provide a device source repository and prevent splintering Server The RMC can be hosted in various locations OpenRACK EIA, OpenRACK Olympus (within power shelf) (within switch) (standalone) Switch RMC FW Switch w/ RMC FW Switch Power Shelf w/ RMC FW Server Server Server Server
    [Show full text]
  • Openbmc Overview
    Andrew Geissler [email protected] What is a BMC? ▶ BMC – Baseboard Management Controller ▶ Separate uproc (eg. AST 2500) with dedicated RAM and Flash ▶ Provides ▶ System Power/thermal control ▶ Out of Band management ▶ IPMI, REST, etc ▶ Data collection ▶ Debug ▶ GUI and Command line ▶ Interfaces to Host/OCC ▶ System error logging ▶ Based on OpenEmbedded technologies built via Yocto ▶ Embedded Linux stack ▶ Linux Kernel 4.10….4.18, Yocto 2.3…2.6, python, SSH ▶ Applications communicate via D-Bus ▶ Users communicate via REST, IPMI and GUI ▶ Reports externally to management entity ▶ No customer network functional interaction What is the OpenBMC Project Free open source software management Linux distribution designed for the embedded environment … OpenPOWER Eco-system Enablement Industry Collaboration Quality Solutions Reduce Redundant Effort Openness -- provides proof of security Part of Linux Foundation What is OpenBMC ▶ 100% compatible with OpenPOWER Hostboot/Opal/OCC ▶ Aka BIOS ▶ https://github.com/open-power/op-build ▶ Can simply be a reference implementation ▶ Currently runs on… ▶ Barreleye, S822LC, S822LC For HPC, P8 Reference ▶ Witherspoon -- P9 AC922LC Power AI and CORAL ▶ P9 reference boards ▶ AST2400 and AST2500 BMC hardware Core Infrastructure of the OpenBMC Project Control the Functions in your OpenBMC… ▶ Built on Yocto-Linux ▶ YAML/XML input for system configuration Infrastructure at the ready ▶ Process management Systemd ▶ IPC via D-Bus ▶ External Interfaces via REST, IPMI, GUI ▶ Journaling for Trace/debug ▶ Code update ▶ Code
    [Show full text]
  • Openbmc Update
    OpenBMC Update Gunnar Mills IBM OpenBMC Overview OpenBMC Today Release Content Agenda Redfish on OpenBMC Community Forums Get Involved • Open Source Baseboard Management Controller (BMC) firmware • Linux Foundation Project • Companies with layers include: Arm, Aspeed, Facebook, Google, OpenBMC IBM, Intel, Inspur, Lenovo, Mellanox, Microsoft, Nuvoton, Qualcomm, Yado • Underlying technologies • Yocto Project • D-Bus • Systemd • 2014 - Out of a Facebook hackathon an open BMC firmware stack named OpenBMC History • 2015 - IBM collaborates with Rackspace on an open BMC firmware stack also named OpenBMC • These projects were similar in name and concept only • March 2018 - OpenBMC becomes a Linux Foundation Project converging • Technical steering committee formed to guide the project • Agreed upon path to a unified OpenBMC community Project Charter and Linux Foundation • Lightweight, flexible charter (five pages) • Apache 2.0 license for code contributions (with clause for exceptions) • CC BY 4.0 license for documentation • Requires execution of corporate or individual contributor license agreement to contribute • https://www.openbmc.org/wp- content/uploads/sites/62/2018/03/charter_op enbmc_02142018.pdf • Linux Foundation owns project trademarks, DNS registrant, and GitHub organization owner • Members • Brad Bishop (IBM) • Sai Dasari (Facebook) • Sagar Dharia (Microsoft) • James Mihm (Intel) Technical Steering • Supreeth Venkatesh (Arm) Committee • Nancy Yuen (Google) • Community contributions drive project direction • Provide resolution at last
    [Show full text]
  • Flatbed Design Specification DRAFT Revision 0.07 Author: Scott Mccauley (​[email protected]​) Author: Nate Klein (​Nxk@G
    Flatbed Design Specification DRAFT Revision 0.07 Author: Scott McCauley ([email protected]) ​ ​ Author: Nate Klein ([email protected]) ​ ​ Author: Bill Barry ([email protected]) ​ ​ Open Compute Project Flatbed Design Specification DRAFT ​•​ ​ 1. License Contributions to this Specification are made under the terms and conditions set forth in Open Web Foundation Contributor License Agreement (“OWF CLA 1.0”) by: Google, Inc. ​ You can review the signed copies of the applicable Contributor License(s) for this Specification on the OCP website at http://www.opencompute.org/products/specsanddesign ​ ​ Usage of this Specification is governed by the terms and conditions set forth in Open Web Foundation Final Specification Agreement (“OWFa 1.0”). You can review the applicable Specification License(s) executed by the above referenced contributors to this Specification on the OCP website at http://www.opencompute.org/participate/legal-documents/ Note: The following clarifications, which distinguish technology licensed in the Contribution License ​ and/or Specification License from those technologies merely referenced (but not licensed), were accepted by the Incubation Committee of the OCP: CONTRIBUTORS AND LICENSORS OF THIS SPECIFICATION MAY HAVE MENTIONED CERTAIN TECHNOLOGIES THAT ARE MERELY REFERENCED WITHIN THIS SPECIFICATION AND NOT LICENSED UNDER THE OWF CLA OR OWFa. THE FOLLOWING IS A LIST OF MERELY REFERENCED TECHNOLOGY: INTELLIGENT PLATFORM MANAGEMENT INTERFACE (IPMI) I2C TRADEMARK OF PHILLIPS SEMICONDUCTOR. SMBus OpenBMC REST API NC-SI ATX EPS12V MAX31790 (Maxim IC) TM4C129 (Texas Instruments) ISO1540 (Texas Instruments) PCA9548 (Texas Instruments, Phillips Semiconductor) TCA9555 (Texas Instruments, Phillips Semiconductor) LTC4316 (Linear Technology) ADUM1250 (Analog Devices) 24C04 EEPROM Molex Minifit Molex Microfit Tyco Connectivity 5499910-1 Molex 90130-1210 Samtec HW-TH series IMPLEMENTATION OF THESE TECHNOLOGIES MAY BE SUBJECT TO THEIR OWN LEGAL TERMS.
    [Show full text]
  • Redfish on Openbmc
    Redfish on OpenBMC Gunnar Mills IBM What is Redfish Getting Started with Redfish OpenBMC’s Redfish Implementation Agenda OpenBMC Releases Redfish Data Model Redfish Sessions Redfish Major Collections • Open industry standard specification for hardware management • Definition community-driven • Distributed Management Task Force (DMTF) • History • Redfish Forum created in 2014 • First Redfish specification Aug 2015 • Latest 2019.2 (3Q 2019) • 30 companies • Broadcom Inc., Cisco, Dell Inc., Ericsson AB, Hewlett Packard Enterprise, Intel Corporation, Lenovo, Supermicro, Vertiv, VMware Inc. What is • American Megatrends, Inc., ARM, Inc, Artesyn Embedded Technologies, Atosm, Cray, Inc., Eaton, Fujitsu, Google LLC, Huawei, IBM, Insyde Software Corp., Mellanox Technologies, Microchip Technology Inc., NetApp, New H3C Technologies Co., OSIsoft, LLC, Quanta Computer Inc, Solarflare Redfish? Communications, Toshiba Memory Corporation, Western Digital Corporation • First release focused on Servers • Intended to meet OCP Remote Machine Management requirement • Full server category: Rackmount, Blades, HPC, Racks, Etc • Replacement for IPMI-over-LAN • New specification every 4 months • Working with SNIA to cover more advanced Storage (Swordfish) • Working with The Green Grid & ASHRAE to cover Facilities (Power/Cooling) • Working with the IETF to cover some level of Ethernet Switching Redfish • RESTful API, HTTPS, JSON • Don’t invent anything new if robust solutions exist • Schema-backed but human-readable • OData (Open Data Protocol) • Usable by Apps,
    [Show full text]
  • Open Source Firmware @ Facebook
    Open Source Firmware @ Facebook David Hendricks: Firmware Engineer Andrea Barberio: Production Engineer • Open source initiatives • Problem statement Agenda • How we're using LinuxBoot at Facebook • systemboot and provisioning • Collaborations and partnerships Open Source @ Facebook • Facebook promotes open source • Systems Software: Kernel, CentOS, chef, systemd, etc. • Hardware: Open Compute Project, Telecom Infrastructure Project • Lots more: https://github.com/facebook and https://github.com/facebookincubator ...but there is a missing piece Any guesses? Open Source Firmware @ Facebook OpenBMC initially released in 2015 and is quickly becoming standard on OCP hardware System firmware is the next logical step Why open source firmware? Open Source Firmware @ Facebook Scoping out the problem That's a lot of servers (and switches, too!) ...and we're not just working on datacenters. Booting is hard • Ever-increasing amount of hardware • Many local/removable storage media and networking devices • Complex setup, complex protocols • Firmware has become an operating system • More demands for firmware security • Verified/secure boot, measured/trusted boot, attestation • Secure network protocols, crypto • Provisioning is hard Problems with closed firmware • Archaic, complex, often quite buggy • Even open firmwares are often unfamiliar and difficult to extend • Reactive instead of Proactive debugging • Hard to maintain, can't forward/backport features and fixes • Vendor-specific tools • "Dimensions" of supporting firmware at scale • Robustness, flexibility, debugging, build and deployment... Sustaining Operations • Firmware has impact across product lifecycle • Design, build, test, deploy, sustain, decommission • What we want: • Support many generations of equipment • Feature parity • Unified, adaptable toolkit • Must support many different use cases • Familiar / low barrier to entry How we're addressing the problem Why LinuxBoot • We use Linux..
    [Show full text]
  • Book Are Increasing by an Order of Magnitude Annually in Some Cases
    Contents A great conference for a great year! 2 Sponsors 3 A conference with a history 4 Keynote 6 Session 1 8 Session 2 14 Session 3 19 Session 4 26 ORNL staff form first-of-its-kind regional computing association 32 Dinner and a show 34 Data Challenge brings joy of discovery to participants, new insights to ORNL researchers 36 SMC presenter bios 38 SMC data challenges 44 1 A great conference for a great year! 2018 was a remarkable year for computing at Oak Ridge National Laboratory. Our Leadership Computing Facility celebrated its 25th anniversary and launched Summit, an IBM system that is currently the world’s fastest and most AI-compatible computer, marking the third time that ORNL has claimed the number one spot on the coveted TOP500 list; we acquired a vendor for our first exascale machine, Frontier, to be delivered in 2021; and we once again hosted the best and brightest from the computing and data worlds at the 2018 Smoky Mountains Conference in Gatlinburg, Tennessee. 2018’s theme, “the integration of experiment, data analytics, and modeling and simulation into instruments for discoveries in science and engineering,” proved a fertile one for discussion as our esteemed lineup of speakers brought us up to speed on the states of the art in both computing and big data. With more than 180 people registered, 15 great sponsors, and more Data Challenge participants than we have ever had, 2018 marked the biggest SMC on record. The conference has come a long way since its humble beginnings in 2003, when 45 participants descended on Fall Creek Falls in Pikeville, Tennessee.
    [Show full text]
  • Versatile Configuration and Control Framework for Real Time Data Acquisition Systems
    Versatile Configuration and Control Framework for Real Time Data Acquisition Systems N. Karcher, R. Gebauer, R. Bauknecht, R. Illichmann, O. Sander Abstract—Modern physics experiments often utilize FPGA- and calibration tasks can be handled in software. Quicker based systems for real-time data acquisition. Integrated analog implementation time and features such as advanced arithmetic electronics demand for complex calibration routines. Further- support with hardware division or floating-point calculations more, versatile configuration and control of the whole system is a key requirement. Beside low-level register interface to the FPGA, come in handy for these tasks. Also, remote monitoring also access to I2C and SPI buses is often needed to configure the and control access to DAQ systems is mandatory for larger complete system. Calibration through an FPGA is inflexible and experiments that can contain dozens of such platforms and yields a complex hardware implementation. On the contrary, measure over a longer time period. calibration through a remote system is possible but considerably We designed and implemented a versatile control framework slower due to repetitive network accesses. By using SoC-FPGA solutions with a microprocessor, more sophisticated configuration for DAQ systems based on heterogeneous MPSoCs. Our devel- and calibration solutions, as well as standard remote access opment primarily targets the application domains concerning protocols, can be efficiently integrated in software. the readout of superconducting sensors and quantum bits. Based on Xilinx Zynq US+ SoC-FPGAs, we implemented a Both fields need highly customized FPGA processing due versatile control framework. This software framework offers a to performance and latency requirements. At the same time, convenient access to the hardware and a flexible abstraction via remote-procedure calls (RPCs).
    [Show full text]
  • Bridging The
    VERTIV WHITEPAPER Bridging the Gap From OpenBMC to Commercial Embedded Management Technology The IT industry is experiencing a major shift in platform State of OpenBMC management technology. Over the past decade, IT device manufacturers and service providers have struggled with the OpenBMC is built on a standard Linux distribution that challenges of managing datacenters with non-standard, simplifies integration and porting to different offerings. Many proprietary Baseboard Management Controller (BMC) firmware. modular components are available that allow developers to Customers who rely on these assets to run their business were build a BMC solution and create advanced management often left frustrated because they had insufficient control over features. With support for OpenBMC coming largely from their datacenters. With BMC failures being one of the largest Facebook, Microsoft, Google, and IBM, the solution in the factors in datacenter reliability, customers had to rely community addresses the requirements for cloud-scale server completely on third-party BMC firmware providers. This often management. However, today’s embedded management resulted in poor reliability, costly schedules, lack of landscape spans across the entire IT infrastructure, across customization, slow issue resolution, and feeling vulnerable to multiple CPU architectures, and has a range of custom security threats at any given time. Furthermore, businesses features tailored to various customer segments. As the who wanted standardize methods of managing IT platforms OpenBMC community evolves, we will see its usability were relegated to inconsistent and non-standard vendor expanded across a broad range of platforms and segments. implementations of Intelligent Platform Management Interface Supporters of OpenBMC understand the limitations of (IPMI) which did little to address external security concerns.
    [Show full text]
  • FOSDEM 2020 Schedule
    FOSDEM 2020 - Saturday 2020-02-01 (1/15) Janson K.1.105 (La H.2215 (Ferrer) H.1302 (Depage) H.1308 (Rolin) H.1309 (Van Rijn) H.2213 H.2214 Fontaine)… 09:30 Welcome to FOSDEM 2020 09:45 10:00 The Linux Kernel: We How FOSS could have to finish this thing revolutionize municipal one day ;) government 10:15 10:30 State of OpenJDK Fundamental DNS Devroom Opening Designing and Welcome to the MySQL, Technologies We Need DNS Management in Producing Open Source MariaDB & Friends D… to Work on for Cloud- OpenStack Hardware with MySQL 8 vs MariaDB Native Networking FOSS/OSHW tools 10:45 10.4 LibrePCB Status Update 11:00 LibreOffice turns ten The Selfish Contributor and what's next Explained Skydive HashDNS and MyRocks in the Wild 11:15 FQDNDHCP Wild West! Project Loom: Advanced Open-source design concurrency for fun and ecosystems around 11:30 profit Do you really see what’s FreeCAD happening on your NFV infrastructure? How Safe is 11:45 State of djbdnscurve6 Asynchronous Master- TornadoVM: A Virtual Master Setup? Machine for Exploiting ngspice open source High-Performance 12:00 Over Twenty Years Of The Ethics Behind Your Civil society needs Free circuit simulator Heterogeneous Automation IoT Software hackers Execution of Java Programs Endless Network Testing DoH and DoT The consequences of 12:15 Programming − An servers, compliance and sync_binlog != 1 Update from eBPF Land performance A tool for Community ByteBuffers are dead, Towards CadQuery 2.0 Supported Agriculture long live ByteBuffers! ↴ 12:30 (CSA) management, … Replacing iptables with eBPF
    [Show full text]