IBM's Journey with Open Source
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Automated Analysis of Speculation Windows in Spectre Attacks
Barbara Gigerl Automated Analysis of Speculation Windows in Spectre Attacks MASTER'S THESIS to achieve the university degree of Diplom-Ingenieurin Master's degree programme: Software Engineering and Management submitted to Graz University of Technology Supervisor: Daniel Gruss Institute for Applied Information Processing and Communication Graz, May 2019 i AFFIDAVIT I declare that I have authored this thesis independently, that I have not used other than the declared sources/resources, and that I have explicitly indicated all material which has been quoted either literally or by content from the sources used. The text document uploaded to TUGRAZonline is identical to the present master's thesis. Date Signature EIDESSTATTLICHE ERKLARUNG¨ Ich erkl¨arean Eides statt, dass ich die vorliegende Arbeit selbstst¨andig verfasst, andere als die angegebenen Quellen/Hilfsmittel nicht benutzt, und die den benutzten Quellen w¨ortlich und inhaltlich entnommenen Stellen als solche kenntlich gemacht habe. Das in TUGRAZonline hochgeladene Textdokument ist mit der vorliegenden Masterarbeit identisch. Datum Unterschrift Abstract Speculative execution is a feature integrated into most modern CPUs. Although intro- duced as a way to enhance the performance of processors, the release of Spectre attacks showed that it is a significant security risk. Since CPUs from various vendors, includ- ing Intel, AMD, ARM, and IBM, implement speculative execution, all different kinds of devices are affected by Spectre attacks, for example, desktop PCs and smartphones. Spectre attacks exploit the branch prediction mechanisms of the CPU and then use a cache covert channel to leak secret data. Several attack variants have been discovered since the release, including Spectre-PHT which targets the Pattern History Table of the CPU. -
Fortran Reference Guide
FORTRAN REFERENCE GUIDE Version 2018 TABLE OF CONTENTS Preface............................................................................................................ xv Audience Description......................................................................................... xv Compatibility and Conformance to Standards............................................................ xv Organization................................................................................................... xvi Hardware and Software Constraints...................................................................... xvii Conventions................................................................................................... xvii Related Publications........................................................................................ xviii Chapter 1. Language Overview............................................................................... 1 1.1. Elements of a Fortran Program Unit.................................................................. 1 1.1.1. Fortran Statements................................................................................. 1 1.1.2. Free and Fixed Source............................................................................. 2 1.1.3. Statement Ordering................................................................................. 2 1.2. The Fortran Character Set.............................................................................. 3 1.3. Free Form Formatting.................................................................................. -
Introduction to Linux on System Z
IBM Linux and Technology Center Introduction to Linux on System z Mario Held IBM Lab Boeblingen, Germany © 2009 IBM Corporation IBM Linux and Technology Center Trademarks The following are trademarks of the International Business Machines Corporation in the United States, other countries, or both. Not all common law marks used by IBM are listed on this page. Failure of a mark to appear does not mean that IBM does not use the mark nor does it mean that the product is not actively marketed or is not significant within its relevant market. Those trademarks followed by ® are registered trademarks of IBM in the United States; all others are trademarks or common law marks of IBM in the United States. For a complete list of IBM Trademarks, see www.ibm.com/legal/copytrade.shtml: *, AS/400®, e business(logo)®, DBE, ESCO, eServer, FICON, IBM®, IBM (logo)®, iSeries®, MVS, OS/390®, pSeries®, RS/6000®, S/30, VM/ESA®, VSE/ESA, WebSphere®, xSeries®, z/OS®, zSeries®, z/VM®, System i, System i5, System p, System p5, System x, System z, System z9®, BladeCenter® The following are trademarks or registered trademarks of other companies. Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. -
AIX Migration to Cloud with IBM Power Virtual Server
AIX Migration to Cloud with IBM Power Virtual Server An IBM Systems Lab Services Tutorial Aaron Bolding Berjis Patel Vess Natchev [email protected] TABLE OF CONTENTS CHAPTER 1: SOLUTION OVERVIEW............................. 1 Introduction ................................................................................ 1 Use Cases .................................................................................. 1 Migration via PowerVC OVA ..................................................... 1 Transfer System Backup Using the Public Internet ..................... 2 Transfer System Backup Using Cloud Object Storage ................. 2 Solution Components and Requirements ........................................ 2 Components .......................................................................... 2 Migration via PowerVC OVA ..................................................... 2 Transfer System Backup Using the Public Internet ..................... 2 Transfer System Backup Using Cloud Object Storage ................. 2 Requirements ........................................................................ 3 Solution Diagrams ....................................................................... 3 Transfer System Backup Using the Public Internet ..................... 3 Transfer System Backup Using Cloud Object Storage ................. 4 CHAPTER 2: IMPLEMENTATION .................................. 5 Migration via PowerVC OVA .......................................................... 5 Procedure to Configure IBM Cloud Object Storage ..................... -
Defeating Invisible Enemies:Firmware Based
Defeating Invisible Enemies: Firmware Based Security in OpenPOWER Systems — Linux Security Summit 2017 — George Wilson IBM Linux Technology Center Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation Agenda Introduction The Case for Firmware Security What OpenPOWER Is Trusted Computing in OpenPOWER Secure Boot in OpenPOWER Current Status of Work Benefits of Open Source Software Conclusion Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 2 Introduction Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 3 Disclaimer These slides represent my views, not necessarily IBM’s All design points disclosed herein are subject to finalization and upstream acceptance The features described may not ultimately exist or take the described form in a product Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 4 Background The PowerPC CPU has been around since 1990 Introduced in the RS/6000 line Usage presently spans embedded to server IBM PowerPC servers traditionally shipped with the PowerVM hypervisor and ran AIX and, later, Linux in LPARs In 2013, IBM decided to open up the server architecture: OpenPOWER OpenPOWER runs open source firmware and the KVM hypervisor with Linux guests Firmware and software designed and developed by the IBM Linux Technology Center “OpenPOWER needs secure and trusted boot!” Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 5 The Case for Firmware Security Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 6 Leaks Wikileaks Vault 7 Year 0 Dump NSA ANT Catalog Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 7 Industry Surveys UEFI Firmware Rootkits: Myths and Reality – Matrosov Firmware Is the New Black – Analyzing Past Three Years of BIOS/UEFI Security Vulnerabilities – Branco et al. -
Steve French IBM – Linux Technology Center
IBM Server & Technology Group Linux Kernel Clients: A Year in Review “Man-Eating Seals of Antiquity” to “Sheep on Meth” Steve French IBM – Linux Technology Center Linux Technology Center © 2010 IBM Corporation SNIA SDC 2010 Legal Statement –This work represents the views of the author(s) and does not necessarily reflect the views of IBM Corporation –A full list of U.S. trademarks owned by IBM may be found at http://www.ibm.com/legal/copytrade.shtml. –Linux is a registered trademark of Linus Torvalds. –Other company, product, and service names may be trademarks or service marks of others. 2 IBM Linux Technology Center © 2010 IBM Corporation SNIA SDC 2010 Who am I? –Steve French ([email protected] or [email protected]) –Author and maintainer of Linux cifs vfs (for accessing Samba, Windows and various SMB/CIFS based NAS appliances) –Wrote initial SMB2 kernel client prototype –Member of the Samba team, coauthor of CIFS Technical Reference and former SNIA CIFS Working Group chair –Architect: Filesystems/NFS/Samba for IBM LTC IBM Linux Technology Center © 2010 IBM Corporation SNIA SDC 2010 • Last September Kernel version 2.6.31: • [Since 2.6.34] Now we have • “Man-Eating Seals of Antiquity” 2.6.36-rc4 – 2.6.31 came out on September 9th, 2009 • “Sheep on Meth” 4 IBM Linux Technology Center © 2010 IBM Corporation SNIA SDC 2010 Development on Linux kernel clients is very active • 187 kernel changesets for cifs since 2.6.31 (typical year) • But … improvements to related tools have accelerated dramatically: in a few month period early this year 100+ changesets in mount helper and related utilities were merged • And smb2 development accelerated … – A month after SambaXP last year, public git tree for smb2 development created on kernel.org – More than 130 kernel changesets for smb2 since January – SMB2 module now close to full function but 30% smaller (17188 lines of code, CIFS is now 24447 LOC). -
RACF Command Tips
RACF Command Tips SHARE ‐ March 2015 Session 18875 RSH Consulting ‐ Robert S. Hansel RSH Consulting, Inc. is an IT security professional services firm established in 1992 and dedicated to helping clients strengthen their IBM z/OS mainframe access controls by fully exploiting all the capabilities and latest innovations in RACF. RSH's services include RACF security reviews and audits, initial implementation of new controls, enhancement and remediation of existing controls, and training. • www.rshconsulting.com • 617‐969‐9050 Robert S. Hansel is Lead RACF Specialist and founder of RSH Consulting, Inc. He began working with RACF in 1986 and has been a RACF administrator, manager, auditor, instructor, developer, and consultant. Mr. Hansel is especially skilled at redesigning and refining large‐scale implementations of RACF using role‐based access control concepts. He is a leading expert in securing z/OS Unix using RACF. Mr. Hansel has created elaborate automated tools to assist clients with RACF administration, database merging, identity management, and quality assurance. • 617‐969‐8211 • [email protected] • www.linkedin.com/in/roberthansel • http://twitter.com/RSH_RACF RACF Command Tips SHARE 2 © 2016 RSH Consulting, Inc. All Rights Reserved. March 2016 Topics . User Commands . Group Commands . Dataset Command . General Resource Commands . PERMIT Command . Generic Profile Refresh . List Commands . SEARCH Command . Console Command Entry . Building Commands with Microsoft Excel RACF and z/OS are Trademarks of the International Business Machines Corporation RACF Command Tips SHARE 3 © 2016 RSH Consulting, Inc. All Rights Reserved. March 2016 User Commands . ADDUSER Defaults: • OWNER ‐ Creator's ID • DFLTGRP ‐ Creator's Current Connect Group • PASSWORD ‐ Pre‐z/OS 2.2: Default Group z/OS 2.2: NOPASSWORD • Always specify when creating new ID . -
Implementing Nfsv4 in the Enterprise: Planning and Migration Strategies
Front cover Implementing NFSv4 in the Enterprise: Planning and Migration Strategies Planning and implementation examples for AFS and DFS migrations NFSv3 to NFSv4 migration examples NFSv4 updates in AIX 5L Version 5.3 with 5300-03 Recommended Maintenance Package Gene Curylo Richard Joltes Trishali Nayar Bob Oesterlin Aniket Patel ibm.com/redbooks International Technical Support Organization Implementing NFSv4 in the Enterprise: Planning and Migration Strategies December 2005 SG24-6657-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. First Edition (December 2005) This edition applies to Version 5, Release 3, of IBM AIX 5L (product number 5765-G03). © Copyright International Business Machines Corporation 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xi Trademarks . xii Preface . xiii The team that wrote this redbook. xiv Acknowledgments . xv Become a published author . xvi Comments welcome. xvii Part 1. Introduction . 1 Chapter 1. Introduction. 3 1.1 Overview of enterprise file systems. 4 1.2 The migration landscape today . 5 1.3 Strategic and business context . 6 1.4 Why NFSv4? . 7 1.5 The rest of this book . 8 Chapter 2. Shared file system concepts and history. 11 2.1 Characteristics of enterprise file systems . 12 2.1.1 Replication . 12 2.1.2 Migration . 12 2.1.3 Federated namespace . 13 2.1.4 Caching . 13 2.2 Enterprise file system technologies. 13 2.2.1 Sun Network File System (NFS) . 13 2.2.2 Andrew File System (AFS) . -
Technical Support Services for Linux from IBM Robust Linux Support Solutions from an Industry Leader
IBM Technical Support Services Technical Support Services for Linux from IBM Robust Linux support solutions from an industry leader IBM Technical Support Services (TSS) — Highlights Linux Support Summary • IBM’s Operational Support Services — Support Line for Linux is IBM Technical Support Services offers comprehensive, flexible support for Linux a remotely delivered support service designed to answer how-to and environments across all IBM hardware diagnostic questions. Services include: platforms as well as OEM Intel. – Assistance for Linux installation, configuration, usage, Business Impact technical questions, and code-related defects • Helps maximize the return on your Linux – Standard problem determination/resolution investment through increased reliability – Defect support and change team for emergency fixes • Designed to increase IT staff productivity with installation, configuration and – Call-back response from technicians in specialist area within how-to support 2 hours prime shift and 4 hours off shift • Leverage IBM skills and infrastructure to help – Per environment support based on total server count lower your overall Linux operational costs – Support for all IBM hardware platforms and OEM Intel IBM Value – Red Hat or SUSE Linux, IBM Director, VMware and US • Unmatched breadth, depth, reach Citizens support available • Unparalleled speed to resolution – Linux subscription options available • Access to relevant OEM vendors and IBM Linux Technology Center • Enhanced Services (i.e. Account Advocate, Enhanced Technical Support, -
Foundation Overview February 2014
OpenPOWER Overview May 2015 Keith Brown Director, IBM Systems Technical Strategy & Product Security [email protected] http://openpowerfoundation.org/ © 2015 OpenPOWER Foundation What is the OpenPOWER Ecosystem? Cloud Software Existing ISV community of 800+ Standard Operating Open Environment Source All major Linux distros (System Mgmt) Software Communities Operating Open sourced Power8 System / KVM firmware stack New OSS Firmware OpenPOWER Resources for porting and Firmware Community optimizing on Hardware OpenPOWER OpenPOWERFoundation.org Technology 2 © 2015 OpenPOWER Foundation A Fast Start for OpenPOWER! The year • Collaborative solutions, standards, and reference designs available • Independent members solutions and systems ahead • Sector growth in technical computing and cloud • Global growth with increasing depth in all layers • Broad adoption across hardware, software, and end users 3 © 2015 OpenPOWER Foundation Fueling an Open Development Community 4 © 2015 OpenPOWER Foundation Critical workloads run on Linux on Power Web, Java Apps and Infrastructure Analytics & Research HPC applications for Life Sciences • Highly threaded • Compute intensive • Throughput oriented • High memory bandwidth • Scale out capable • Floating point • High quality of service • High I/O rates Business Applications Database • High quality of service • Handle peak workloads • Scalability • Scalability • Flexible infrastructure • High quality of service • Large memory footprint • Resiliency and security 5 © 2015 OpenPOWER Foundation IBM, Mellanox, and NVIDIA -
Blueprints: Installing Linux Distributions on Multipath Devices
Blueprints Installing Linux Distributions on Multipath Devices Blueprints Installing Linux Distributions on Multipath Devices Note Before using this information and the product it supports, read the information in Appendix D, “Notices,” on page 27. First Edition (August 2008) © Copyright International Business Machines Corporation 2008. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Preface . .v Appendix B. Additional multipath Introduction . .v configuration information for IBM storage . .23 Installing Linux Distributions on Multipathed Devices . .1 Appendix C. Related information . .25 What is Multipath Connectivity . .1 Hardware Setup for Test Environment . .2 Appendix D. Notices . .27 Multipath installation on Red Hat Enterprise Linux Trademarks . .28 5.2 . .2 Terms and conditions . .29 Multipath installation on SUSE Linux Enterprise Server 10 SP2 . .11 Appendix A. Troubleshooting tips . .21 © Copyright IBM Corp. 2008 iii iv Blueprints: Installing Linux Distributions on Multipath Devices Preface Introduction This blueprint provides step by step instructions for installing Red Hat Enterprise Linux 5.2 and SUSE Linux Enterprise Server 10 SP2 on a LUN in a multipath disk storage environment. The procedure demonstrated here is performed on a System x host connected to a DS6000 storage server through Fibre Channel Fabric, but it can be adapted for installing either of the Linux distribution onto other supported models of storage devices. Intended audience This document is intended to be used by Linux system administrators who have experience in installing Red Hat Enterprise Linux 5 or SUSE Linux Enterprise Server 10 and have a moderate level of knowledge in Device Mapper (DM) multipath. -
Open OVF Proposal
Linux Technology Center Open OVF Proposal . Open-source library and tools to support the OVF – http://xml.coverpages.org/ni2007-09-11-a.html . IBM will be donating code and invites all to form an open community around OVF . Eclipse Public License – http://www.eclipse.org/legal/eplfaq.php . Contact: – Mike D. Day <[email protected]> 1 IBM Open Virtualization © 2008 IBM Corporation Linux Technology Center Open Virtual Appliance Format (OVF) ● DMTF Standard, Open Packaging format for Virtual Appliances ● Meta-data, configuration, file systems, disk images, memory images ● XML-encoded ● Security and licensing features ● Enables cross-hypervisor Appliance portability ● Enables a neutral Appliance Ecosystem OVF Container App App App Middleware Middleware OS Hypervisor BIOS/EFI © 2008 IBM Corporation Linux Technology Center Why open-ovf? . Leverage development resources by cooperating on common plumbing – Finish the plumbing faster, keep more resources focused on the higher-value solution stack . Build out the cross-hypervisor components of OVF – Prevent fragmentation of the OVF across the industry – Provide a reference architecture . Establish conventions in OVF usage that promote transportability of virtual machines . Promote the usage of OVF and its adoption as a standard VM Appliance format 3 IBM Open Virtualization © 2008 IBM Corporation Linux Technology Center OVF Characteristics . Tar file with following contents: – .ovf descriptor • xml-encoded, basic schema, appliance meta-data • Contains URI references to other files – disk images, iso, cpio archives, etc. • Contains virtual hardware resource descriptions – Memory, network interfaces, storage devices, etc. – .mf manifest file • Digest of sha-1 hashes of referenced files – .cert certificate • Signature of the manifest © 2008 IBM Corporation Linux Technology Center Missing from OVF: Linkage to an actual Hypervisor "The OVF format supports portable, efficient, and secure distribution of virtual machine templates and virtual appliances.