IBM Linux Technology Center
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Automated Analysis of Speculation Windows in Spectre Attacks
Barbara Gigerl Automated Analysis of Speculation Windows in Spectre Attacks MASTER'S THESIS to achieve the university degree of Diplom-Ingenieurin Master's degree programme: Software Engineering and Management submitted to Graz University of Technology Supervisor: Daniel Gruss Institute for Applied Information Processing and Communication Graz, May 2019 i AFFIDAVIT I declare that I have authored this thesis independently, that I have not used other than the declared sources/resources, and that I have explicitly indicated all material which has been quoted either literally or by content from the sources used. The text document uploaded to TUGRAZonline is identical to the present master's thesis. Date Signature EIDESSTATTLICHE ERKLARUNG¨ Ich erkl¨arean Eides statt, dass ich die vorliegende Arbeit selbstst¨andig verfasst, andere als die angegebenen Quellen/Hilfsmittel nicht benutzt, und die den benutzten Quellen w¨ortlich und inhaltlich entnommenen Stellen als solche kenntlich gemacht habe. Das in TUGRAZonline hochgeladene Textdokument ist mit der vorliegenden Masterarbeit identisch. Datum Unterschrift Abstract Speculative execution is a feature integrated into most modern CPUs. Although intro- duced as a way to enhance the performance of processors, the release of Spectre attacks showed that it is a significant security risk. Since CPUs from various vendors, includ- ing Intel, AMD, ARM, and IBM, implement speculative execution, all different kinds of devices are affected by Spectre attacks, for example, desktop PCs and smartphones. Spectre attacks exploit the branch prediction mechanisms of the CPU and then use a cache covert channel to leak secret data. Several attack variants have been discovered since the release, including Spectre-PHT which targets the Pattern History Table of the CPU. -
Red Hat Enterprise Linux 6 Developer Guide
Red Hat Enterprise Linux 6 Developer Guide An introduction to application development tools in Red Hat Enterprise Linux 6 Dave Brolley William Cohen Roland Grunberg Aldy Hernandez Karsten Hopp Jakub Jelinek Developer Guide Jeff Johnston Benjamin Kosnik Aleksander Kurtakov Chris Moller Phil Muldoon Andrew Overholt Charley Wang Kent Sebastian Red Hat Enterprise Linux 6 Developer Guide An introduction to application development tools in Red Hat Enterprise Linux 6 Edition 0 Author Dave Brolley [email protected] Author William Cohen [email protected] Author Roland Grunberg [email protected] Author Aldy Hernandez [email protected] Author Karsten Hopp [email protected] Author Jakub Jelinek [email protected] Author Jeff Johnston [email protected] Author Benjamin Kosnik [email protected] Author Aleksander Kurtakov [email protected] Author Chris Moller [email protected] Author Phil Muldoon [email protected] Author Andrew Overholt [email protected] Author Charley Wang [email protected] Author Kent Sebastian [email protected] Editor Don Domingo [email protected] Editor Jacquelynn East [email protected] Copyright © 2010 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. -
Defeating Invisible Enemies:Firmware Based
Defeating Invisible Enemies: Firmware Based Security in OpenPOWER Systems — Linux Security Summit 2017 — George Wilson IBM Linux Technology Center Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation Agenda Introduction The Case for Firmware Security What OpenPOWER Is Trusted Computing in OpenPOWER Secure Boot in OpenPOWER Current Status of Work Benefits of Open Source Software Conclusion Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 2 Introduction Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 3 Disclaimer These slides represent my views, not necessarily IBM’s All design points disclosed herein are subject to finalization and upstream acceptance The features described may not ultimately exist or take the described form in a product Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 4 Background The PowerPC CPU has been around since 1990 Introduced in the RS/6000 line Usage presently spans embedded to server IBM PowerPC servers traditionally shipped with the PowerVM hypervisor and ran AIX and, later, Linux in LPARs In 2013, IBM decided to open up the server architecture: OpenPOWER OpenPOWER runs open source firmware and the KVM hypervisor with Linux guests Firmware and software designed and developed by the IBM Linux Technology Center “OpenPOWER needs secure and trusted boot!” Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 5 The Case for Firmware Security Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 6 Leaks Wikileaks Vault 7 Year 0 Dump NSA ANT Catalog Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 7 Industry Surveys UEFI Firmware Rootkits: Myths and Reality – Matrosov Firmware Is the New Black – Analyzing Past Three Years of BIOS/UEFI Security Vulnerabilities – Branco et al. -
Steve French IBM – Linux Technology Center
IBM Server & Technology Group Linux Kernel Clients: A Year in Review “Man-Eating Seals of Antiquity” to “Sheep on Meth” Steve French IBM – Linux Technology Center Linux Technology Center © 2010 IBM Corporation SNIA SDC 2010 Legal Statement –This work represents the views of the author(s) and does not necessarily reflect the views of IBM Corporation –A full list of U.S. trademarks owned by IBM may be found at http://www.ibm.com/legal/copytrade.shtml. –Linux is a registered trademark of Linus Torvalds. –Other company, product, and service names may be trademarks or service marks of others. 2 IBM Linux Technology Center © 2010 IBM Corporation SNIA SDC 2010 Who am I? –Steve French ([email protected] or [email protected]) –Author and maintainer of Linux cifs vfs (for accessing Samba, Windows and various SMB/CIFS based NAS appliances) –Wrote initial SMB2 kernel client prototype –Member of the Samba team, coauthor of CIFS Technical Reference and former SNIA CIFS Working Group chair –Architect: Filesystems/NFS/Samba for IBM LTC IBM Linux Technology Center © 2010 IBM Corporation SNIA SDC 2010 • Last September Kernel version 2.6.31: • [Since 2.6.34] Now we have • “Man-Eating Seals of Antiquity” 2.6.36-rc4 – 2.6.31 came out on September 9th, 2009 • “Sheep on Meth” 4 IBM Linux Technology Center © 2010 IBM Corporation SNIA SDC 2010 Development on Linux kernel clients is very active • 187 kernel changesets for cifs since 2.6.31 (typical year) • But … improvements to related tools have accelerated dramatically: in a few month period early this year 100+ changesets in mount helper and related utilities were merged • And smb2 development accelerated … – A month after SambaXP last year, public git tree for smb2 development created on kernel.org – More than 130 kernel changesets for smb2 since January – SMB2 module now close to full function but 30% smaller (17188 lines of code, CIFS is now 24447 LOC). -
Technical Support Services for Linux from IBM Robust Linux Support Solutions from an Industry Leader
IBM Technical Support Services Technical Support Services for Linux from IBM Robust Linux support solutions from an industry leader IBM Technical Support Services (TSS) — Highlights Linux Support Summary • IBM’s Operational Support Services — Support Line for Linux is IBM Technical Support Services offers comprehensive, flexible support for Linux a remotely delivered support service designed to answer how-to and environments across all IBM hardware diagnostic questions. Services include: platforms as well as OEM Intel. – Assistance for Linux installation, configuration, usage, Business Impact technical questions, and code-related defects • Helps maximize the return on your Linux – Standard problem determination/resolution investment through increased reliability – Defect support and change team for emergency fixes • Designed to increase IT staff productivity with installation, configuration and – Call-back response from technicians in specialist area within how-to support 2 hours prime shift and 4 hours off shift • Leverage IBM skills and infrastructure to help – Per environment support based on total server count lower your overall Linux operational costs – Support for all IBM hardware platforms and OEM Intel IBM Value – Red Hat or SUSE Linux, IBM Director, VMware and US • Unmatched breadth, depth, reach Citizens support available • Unparalleled speed to resolution – Linux subscription options available • Access to relevant OEM vendors and IBM Linux Technology Center • Enhanced Services (i.e. Account Advocate, Enhanced Technical Support, -
IBM Energyscale for POWER8 Processor-Based Systems
IBM EnergyScale for POWER8 Processor-Based Systems November 2015 Martha Broyles Christopher J. Cain Todd Rosedahl Guillermo J. Silva Table of Contents Executive Overview...................................................................................................................................4 EnergyScale Features.................................................................................................................................5 Power Trending................................................................................................................................................................5 Thermal Reporting...........................................................................................................................................................5 Fixed Maximum Frequency Mode...................................................................................................................................6 Static Power Saver Mode.................................................................................................................................................6 Fixed Frequency Override...............................................................................................................................................6 Dynamic Power Saver Mode...........................................................................................................................................7 Power Management's Effect on System Performance................................................................................................7 -
Foundation Overview February 2014
OpenPOWER Overview May 2015 Keith Brown Director, IBM Systems Technical Strategy & Product Security [email protected] http://openpowerfoundation.org/ © 2015 OpenPOWER Foundation What is the OpenPOWER Ecosystem? Cloud Software Existing ISV community of 800+ Standard Operating Open Environment Source All major Linux distros (System Mgmt) Software Communities Operating Open sourced Power8 System / KVM firmware stack New OSS Firmware OpenPOWER Resources for porting and Firmware Community optimizing on Hardware OpenPOWER OpenPOWERFoundation.org Technology 2 © 2015 OpenPOWER Foundation A Fast Start for OpenPOWER! The year • Collaborative solutions, standards, and reference designs available • Independent members solutions and systems ahead • Sector growth in technical computing and cloud • Global growth with increasing depth in all layers • Broad adoption across hardware, software, and end users 3 © 2015 OpenPOWER Foundation Fueling an Open Development Community 4 © 2015 OpenPOWER Foundation Critical workloads run on Linux on Power Web, Java Apps and Infrastructure Analytics & Research HPC applications for Life Sciences • Highly threaded • Compute intensive • Throughput oriented • High memory bandwidth • Scale out capable • Floating point • High quality of service • High I/O rates Business Applications Database • High quality of service • Handle peak workloads • Scalability • Scalability • Flexible infrastructure • High quality of service • Large memory footprint • Resiliency and security 5 © 2015 OpenPOWER Foundation IBM, Mellanox, and NVIDIA -
IBM POWER8 High-Performance Computing Guide: IBM Power System S822LC (8335-GTB) Edition
Front cover IBM POWER8 High-Performance Computing Guide IBM Power System S822LC (8335-GTB) Edition Dino Quintero Joseph Apuzzo John Dunham Mauricio Faria de Oliveira Markus Hilger Desnes Augusto Nunes Rosario Wainer dos Santos Moschetta Alexander Pozdneev Redbooks International Technical Support Organization IBM POWER8 High-Performance Computing Guide: IBM Power System S822LC (8335-GTB) Edition May 2017 SG24-8371-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (May 2017) This edition applies to: IBM Platform LSF Standard 10.1.0.1 IBM XL Fortran v15.1.4 and v15.1.5 compilers IBM XLC/C++ v13.1.2 and v13.1.5 compilers IBM PE Developer Edition version 2.3 Red Hat Enterprise Linux (RHEL) 7.2 and 7.3 in little-endian mode © Copyright International Business Machines Corporation 2017. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x Preface . xi Authors. xi Now you can become a published author, too! . xiii Comments welcome. xiv Stay connected to IBM Redbooks . xiv Chapter 1. IBM Power System S822LC for HPC server overview . 1 1.1 IBM Power System S822LC for HPC server. 2 1.1.1 IBM POWER8 processor . 3 1.1.2 NVLink . 4 1.2 HPC system hardware components . 5 1.2.1 Login nodes . 6 1.2.2 Management nodes . 6 1.2.3 Compute nodes. 7 1.2.4 Compute racks . 7 1.2.5 High-performance interconnect. -
Blueprints: Installing Linux Distributions on Multipath Devices
Blueprints Installing Linux Distributions on Multipath Devices Blueprints Installing Linux Distributions on Multipath Devices Note Before using this information and the product it supports, read the information in Appendix D, “Notices,” on page 27. First Edition (August 2008) © Copyright International Business Machines Corporation 2008. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Preface . .v Appendix B. Additional multipath Introduction . .v configuration information for IBM storage . .23 Installing Linux Distributions on Multipathed Devices . .1 Appendix C. Related information . .25 What is Multipath Connectivity . .1 Hardware Setup for Test Environment . .2 Appendix D. Notices . .27 Multipath installation on Red Hat Enterprise Linux Trademarks . .28 5.2 . .2 Terms and conditions . .29 Multipath installation on SUSE Linux Enterprise Server 10 SP2 . .11 Appendix A. Troubleshooting tips . .21 © Copyright IBM Corp. 2008 iii iv Blueprints: Installing Linux Distributions on Multipath Devices Preface Introduction This blueprint provides step by step instructions for installing Red Hat Enterprise Linux 5.2 and SUSE Linux Enterprise Server 10 SP2 on a LUN in a multipath disk storage environment. The procedure demonstrated here is performed on a System x host connected to a DS6000 storage server through Fibre Channel Fabric, but it can be adapted for installing either of the Linux distribution onto other supported models of storage devices. Intended audience This document is intended to be used by Linux system administrators who have experience in installing Red Hat Enterprise Linux 5 or SUSE Linux Enterprise Server 10 and have a moderate level of knowledge in Device Mapper (DM) multipath. -
IBM Power System S824L Technical Overview and Introduction
Front cover IBM Power System S824L Technical Overview and Introduction Linux server built on OpenPOWER technologies Ready for scientific, Java, and Big Data & Analytics workloads Dual NVIDIA GPU accelerators supported Alexandre Bicas Caldeira YoungHoon Cho James Cruickshank Bartłomiej Grabowski Volker Haug Andrew Laidlaw Seulgi Yoppy Sung ibm.com/redbooks Redpaper International Technical Support Organization IBM Power System S824L Technical Overview and Introduction December 2014 REDP-5139-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (December 2014) This edition applies to IBM Power System S824L (8247-42L) servers. © Copyright International Business Machines Corporation 2014. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix Authors. ix Now you can become a published author, too! . .x Comments welcome. xi Stay connected to IBM Redbooks . xi Chapter 1. General description . 1 1.1 Power S824L server . 2 1.2 NVIDIA Tesla GPU Accelerators. 3 1.2.1 NVIDIA CUDA. 5 1.3 Operating environment . 5 1.4 Physical package . 6 1.5 Server features . 7 1.5.1 Server features for a Power S824L with a NVIDIA GPU. 7 1.5.2 Server features for a Power S824L without a GPU. 8 1.5.3 Minimum features . 8 1.5.4 Power supply features . 8 1.5.5 Processor module features . 9 1.5.6 Memory features . 9 1.6 PCIe slots . 10 1.7 Disk and media features . -
Open OVF Proposal
Linux Technology Center Open OVF Proposal . Open-source library and tools to support the OVF – http://xml.coverpages.org/ni2007-09-11-a.html . IBM will be donating code and invites all to form an open community around OVF . Eclipse Public License – http://www.eclipse.org/legal/eplfaq.php . Contact: – Mike D. Day <[email protected]> 1 IBM Open Virtualization © 2008 IBM Corporation Linux Technology Center Open Virtual Appliance Format (OVF) ● DMTF Standard, Open Packaging format for Virtual Appliances ● Meta-data, configuration, file systems, disk images, memory images ● XML-encoded ● Security and licensing features ● Enables cross-hypervisor Appliance portability ● Enables a neutral Appliance Ecosystem OVF Container App App App Middleware Middleware OS Hypervisor BIOS/EFI © 2008 IBM Corporation Linux Technology Center Why open-ovf? . Leverage development resources by cooperating on common plumbing – Finish the plumbing faster, keep more resources focused on the higher-value solution stack . Build out the cross-hypervisor components of OVF – Prevent fragmentation of the OVF across the industry – Provide a reference architecture . Establish conventions in OVF usage that promote transportability of virtual machines . Promote the usage of OVF and its adoption as a standard VM Appliance format 3 IBM Open Virtualization © 2008 IBM Corporation Linux Technology Center OVF Characteristics . Tar file with following contents: – .ovf descriptor • xml-encoded, basic schema, appliance meta-data • Contains URI references to other files – disk images, iso, cpio archives, etc. • Contains virtual hardware resource descriptions – Memory, network interfaces, storage devices, etc. – .mf manifest file • Digest of sha-1 hashes of referenced files – .cert certificate • Signature of the manifest © 2008 IBM Corporation Linux Technology Center Missing from OVF: Linkage to an actual Hypervisor "The OVF format supports portable, efficient, and secure distribution of virtual machine templates and virtual appliances. -
Working with the Linux Community
Working with the Linux Community A Guest Lecture for CS 378 class at the University of Texas at Austin Khoa Huynh, Ph.D. IBM Linux Technology Center Austin, TX Linux Technology Center TopicsTopics Open source software development Open source licences Common risks Working with the Linux community General advices & tips Submitting your work to Linux kernel community Source code control Bug tracking Submitting your work to Linux distributors Linux debug tools Linux Technology Center OpenOpen SourceSource SoftwareSoftware (OSS)(OSS) Freely available software in source code format Often distributed via Internet or CD (e.g., Red Hat) Redistribution cannot be prohibited or royalty imposed Often developed in a collaborative community effort OSS community very sensitive about meaning & use of term "open source" For the current definition, see: http://www.opensource.org/osd/ Not "Public Domain" Copyright law gives author rights author determines appropriate uses of a work e.g. you can't reproduce or modify a work without author's permission author may grant permission via a license which can impose obligations Linux Technology Center OpenOpen SourceSource LicensesLicenses There are many open source licenses e.g. GPL, LGPL, CPL, IPL, BSD, Apache, etc. Some common features Governs use, modification and distribution of code Grant of rights (e.g. modification, redistribution, etc.) Obligations (e.g. attribution, redistribution, etc.) Different licenses have different objectives GPL = "General Public License" LGPL = "Lesser/Library Public License" CPL/IPL