Server Base Manageability Requirements 1.0 Platform Design Document Non-Confidential
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Powering AI and Automotive Applications with the MIPI Camera Interface Agenda
Hyoung-Bae Choi Synopsys Powering AI and Automotive Applications with the MIPI Camera Interface Agenda Adoption of MIPI CSI-2℠ Image sensors beyond mobile AI and automotive examples CSI-2 interface overview Meeting reliability requirements of automotive applications Supporting artificial intelligence (AI) applications Summary © 2018 MIPI Alliance, Inc. 2 MIPI Specifications in New Applications Automotive, IoT / Wearables, Virtual / Augmented Reality © 2018 MIPI Alliance, Inc. 3 Industrial & Surveillance Applications Using MIPI CSI-2 Image Sensors © 2018 MIPI Alliance, Inc. 4 Example of MIPI in an Automotive Application MIPI CSI-2 Image Sensors & DSI Display MIPI CSI-2 Image Sensors Front Camera Module Vbat Power Supply Front Camera Left Camera MIPI DSI Right Display Module Camera Display Proprietary, LVDS or Right Camera MPU Left Ethernet Switch Module Camera CAN Interface Rear Camera Module Flash LVDS or Rear Camera DRAM Memory Ethernet Link Other Camera Module Other Camera Module © 2018 MIPI Alliance, Inc. 5 Safety-Critical ADAS Applications Require ISO 26262 Functional Safety Compliance and ASIL Certification Electronics failure can have hazardous impact Emergency braking Pedestrian detection Collision avoidance ≠ © 2018 MIPI Alliance, Inc. 6 MIPI Specs for Automotive Applications Infotainment Vehicle Networks & V2X • Real time video & data network • Gateways • Navigation • Telematics • Audio/Video • V2V • Entertainment • V2I • Security Driver Information Driver Assistance • Parking assist • Instrument clusters • Lane departure warning -
UEFI Firmware Fuzzing with Simics Virtual Platform
UEFI Firmware Fuzzing with Simics Virtual Platform Zhenkun Yang, Yuriy Viktorov, Jin Yang, Jiewen Yao and Vincent Zimmer Intel Corporation fzhenkun.yang, yuriy.viktorov, jin.yang, jiewen.yao, [email protected] Abstract—This paper presents a fuzzing framework for Unified write everything on the platform, while being invisible to OS Extensible Firmware Interface (UEFI) BIOS with the Simics vir- and anti-virus software. tual platform. Firmware has increasingly become an attack target Software community has common practices and great tools as operating systems are getting more and more secure. Due to its special execution environment and the extensive interaction available for quality assurance. For example, debugging and with hardware, UEFI firmware is difficult to test compared to profiling tools are widely used for software development. More user-level applications running on operating systems. Fortunately, advanced techniques such as fuzzing, symbolic execution virtual platforms are widely used to enable early software and and static analysis are becoming popular. However, firmware firmware development by modeling the target hardware platform development and validation community faces numerous chal- in its virtual environment before silicon arrives. Virtual platforms play a critical role in left shifting UEFI firmware validation lenges applying those tools due to the special execution to pre-silicon phase. We integrated the fuzzing capability into environments firmware is running on. The execution regime of Simics virtual platform to allow users to fuzz UEFI firmware boot firmware does not resemble any known operating system code with high-fidelity hardware models provided by Simics. runtime, such as Linux or Windows, thus requiring custom, We demonstrated the ability to automatically detect previously bespoke solutions. -
HP Client Management Solutions Overview
HP Client Management Solutions Overview Introduction ................................................................................................................................... 3 HP Client Management software solutions........................................................................................... 3 HP OpenView PC Configuration Management solution...................................................................... 3 HP OpenView Client Configuration Manager................................................................................... 4 HP Client Foundation Suite and HP Client Premium Suite.................................................................... 4 HP Client Manager .................................................................................................................. 4 Altiris Local Recovery Pro .......................................................................................................... 5 Altiris Connector for HP Systems Insight Manager.......................................................................... 5 Altiris Connector for HP OpenView............................................................................................. 6 Altiris Connector Solution.......................................................................................................... 6 Altiris Migration Suite............................................................................................................... 6 Altiris Client Management Suite Level 1...................................................................................... -
OCP DC-SCM Specification
Datacenter Secure Control Module Specification Authors: Priya Raghu, Senior Hardware Engineer, Microsoft Mark A. Shaw, Principal Hardware Engineering Manager, Microsoft Prakash Chauhan, Server Architect, Google Siamak Tavallaei, Chief Systems Architect, Google Mike Branch, Server Architect, Google Mason Possing, Hardware Engineer, Microsoft Open Compute Project • DC-SCM Specification Revision History Version Date Notes 0.8 Nov 9th 2020 Initial public review. 0.95 Dec 2nd 2020 Feedback Implemented Removed ESPI_CS1_N and replaced with RSVD3, Table 22:SPARE[0:1] desc, 1.0 March 11th Fig 22: Updated to initiator/Responder, Table 27: I3C pull-up updated to 2021 STBY/MAIN, Sec 6: Platform interop wording edit, Sec 2.2.3- Typo( FFF> HFF), Fig 3,4,5,6 updated, Table 3 updated http://opencompute.org ii Open Compute Project • DC-SCM Specification Contributions to this Specification are made under the terms and conditions set forth in Open Web Foundation Contributor License Agreement (“OWF CLA 1.0”) (“Contribution License”) by: Microsoft Corporation, Google LLC Usage of this Specification is governed by the terms and conditions set forth in the Open Web Foundation Final Specification Agreement (“OWFa 1.0”). Note: The following clarifications, which distinguish technology licensed in the Contribution License and/or Specification License from those technologies merely referenced (but not licensed), were accepted by the Incubation Committee of the OCP: INTELLIGENT PLATFORM MANAGEMENT INTERFACE (IPMI) I2C TRADEMARK OF PHILLIPS SEMICONDUCTOR I3C TRADEMARK OF MIPI ALLIANCE, INC USB TRADEMARK OF USB IMPLEMENTORS FORUM, INC PCIE TRADEMARK OF PCI-SIG ESPI TRADEMARK OF INTEL CORP NOTWITHSTANDING THE FOREGOING LICENSES, THIS SPECIFICATION IS PROVIDED BY OCP "AS IS" AND OCP EXPRESSLY DISCLAIMS ANY WARRANTIES (EXPRESS, IMPLIED, OR OTHERWISE), INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT, FITNESS FOR A PARTICULAR PURPOSE, OR TITLE, RELATED TO THE SPECIFICATION. -
Bringing the Openbmc for Platform Manage- Ment System in Telco Cloud
Rongqiang Zhang Bringing the OpenBMC for Platform Manage- ment System in Telco Cloud Helsinki Metropolia University of Applied Sciences Master of Engineering Information Technology Master’s Thesis 30 Apr 2019 Abstract Rongqiang Zhang Author(s) Bringing the OpenBMC for Platform Man-agement System in Title Telco Cloud Number of Pages 88 pages + 0 appendices Date 30 Apr 2019 Degree Master of Engineering Degree Programme Information Technology Specialisation option Networking and Services Ville Jääskeläinen, Head of Degree Program Instructor(s) Zinaida Grabovskaia, PhL, Senior Lecturer Antti Koivumäki, Senior Lecturer Ari Helminen, Business Manager The current platform management system in Telco cloud infrastructure is based on closed firmware stack. With the upcoming 5G, this closed firmware stack has created several tech- nology and business problems. The major problems are hardware-software vendor lock-in, long lead time for feature development and bug fixing, and security risks. The objective of this study is to evaluate the possibility to bring an Open Source software stack for platform management system and baseboard management controller in Telco cloud. The study was divided into 3 parts. First part is to analyse the current state and project specification. Second part is to introduce and evaluate the OpenBMC, an open source soft- ware stack for the objective of this study. Third part is Proof of Concept to run OpenBMC on Telco. Keywords BMC, 5G, NFV, Redfish, Security Table of Contents Abstract List of Abbreviations 1 Introduction -
System Management BIOS (SMBIOS) Reference 6 Specification
1 2 Document Number: DSP0134 3 Date: 2011-01-26 4 Version: 2.7.1 5 System Management BIOS (SMBIOS) Reference 6 Specification 7 Document Type: Specification 8 Document Status: DMTF Standard 9 Document Language: en-US 10 System Management BIOS (SMBIOS) Reference Specification DSP0134 11 Copyright Notice 12 Copyright © 2000, 2002, 2004–2011 Distributed Management Task Force, Inc. (DMTF). All rights 13 reserved. 14 DMTF is a not-for-profit association of industry members dedicated to promoting enterprise and systems 15 management and interoperability. Members and non-members may reproduce DMTF specifications and 16 documents, provided that correct attribution is given. As DMTF specifications may be revised from time to 17 time, the particular version and release date should always be noted. 18 Implementation of certain elements of this standard or proposed standard may be subject to third party 19 patent rights, including provisional patent rights (herein "patent rights"). DMTF makes no representations 20 to users of the standard as to the existence of such rights, and is not responsible to recognize, disclose, 21 or identify any or all such third party patent right, owners or claimants, nor for any incomplete or 22 inaccurate identification or disclosure of such rights, owners or claimants. DMTF shall have no liability to 23 any party, in any manner or circumstance, under any legal theory whatsoever, for failure to recognize, 24 disclose, or identify any such third party patent rights, or for such party’s reliance on the standard or 25 incorporation -
Rack Card Front Oct 2020 Online
An Industry Standards Organization www.dmtf.org Led by innovative, industry-leading companies, DMTF has a global presence WHO with members from around the world. DMTF standards support diverse emerging and traditional IT infrastructures including cloud, virtualization, network, servers and WHAT storage. A complete list of standards is available at dmtf.org/standards. Nationally and internationally recognized by ANSI and ISO, DMTF standards enable WHY a more integrated and cost-effective approach to management through interoperable solutions. Simultaneous development of Open Source and Open Standards is made HOW possible by DMTF, which has the support, tools, and infrastructure for efficient development and collaboration. Join DMTF Membership offers opportunity to impact the industry by participating in the process of defining standards and programs. DMTF maintains itself as the ideal forum for industry leading companies to come together in a collegial and established environment to collaborate on relevant interoperable management standards. Join DMTF by visiting our website at dmtf.org/join. Contact Us [email protected] or visit www.dmtf.org 503.220.1655 Latest Standards CADF - Cloud Auditing Data Federation CIMI - Cloud Infrastructure Management Interface CIM - Common Information Model DASH - Desktop & Mobile Architecture for System Hardware MCTP - Management Component Transport Protocol Including bindings for NVMe-MI™, I2C/SMBus and PCIe® NC-SI - Network Controller Sideband Interface OVF - Open Virtualization Format PLDM - Platform Level Data Model Including Firmware Update, Redfish Device Enablement (RDE) Redfish® Including Protocols, Schema, Host Interface, Profiles SMASH - Systems Management Architecture for Server Hardware SMBIOS - System Management BIOS SPDM - Security Protocol and Data Model For a complete list of standards and initiatives, visit www.dmtf.org/standards. -
Microcontroller Serial Interfaces
Microcontroller Serial Interfaces Dr. Francesco Conti [email protected] Microcontroller System Architecture Each MCU (micro-controller unit) is characterized by: • Microprocessor • 8,16,32 bit architecture • Usually “simple” in-order microarchitecture, no FPU Example: STM32F101 MCU Microcontroller System Architecture Each MCU (micro-controller unit) is characterized by: • Microprocessor • 8,16,32 bit architecture • Usually “simple” in-order microarchitecture, no FPU • Memory • RAM (from 512B to 256kB) • FLASH (from 512B to 1MB) Example: STM32F101 MCU Microcontroller System Architecture Each MCU (micro-controller unit) is characterized by: • Microprocessor • 8,16,32 bit architecture • Usually “simple” in-order microarchitecture, no FPU • Memory • RAM (from 512B to 256kB) • FLASH (from 512B to 1MB) • Peripherals • DMA • Timer • Interfaces • Digital Interfaces • Analog Timer DMAs Example: STM32F101 MCU Microcontroller System Architecture Each MCU (micro-controller unit) is characterized by: • Microprocessor • 8,16,32 bit architecture • Usually “simple” in-order microarchitecture, no FPU • Memory • RAM (from 512B to 256kB) • FLASH (from 512B to 1MB) • Peripherals • DMA • Timer • Interfaces • Digital • Analog • Interconnect Example: STM32F101 MCU • AHB system bus (ARM-based MCUs) • APB peripheral bus (ARM-based MCUs) Microcontroller System Architecture Each MCU (micro-controller unit) is characterized by: • Microprocessor • 8,16,32 bit architecture • Usually “simple” in-order microarchitecture, no FPU • Memory • RAM (from 512B to 256kB) • FLASH -
Defending Against Out-Of-Band Management BMC Attacks
Defending Against Out-of-Band Management BMC Attacks Lee Fisher April 2019 LinuxFest NorthWest "Imagine trying to secure a computer with a small but powerful parasitic server on its motherboard; a bloodsucking leech that can't be turned off and has no documentation; you can't login, patch, or fix problems on it; server-based defensive, audit, or anti-malware software can’t be used for protection; its design is secret, implementation old, and it can fully control the computer's hardware and software; and it shares passwords with a bunch of other important servers, stores them in clear text for attackers to access. Not to mention it was designed for full control, remote management and monitoring, and it’s pretty damn good at it." --Dan Farmer, 2013 Agenda ● BMC/LOM concepts ● MC/SP (Intel ME/AMT, AMD PSP, Apple T2, ...) ● IPMI ● Intel SMM ● WS-MAN ● SMASH and DASH ● OpenBMC ● Redfish ● “IPMI++” (HP iLO, Dell iDRAC, ….) Credits ● All security guidance in this talk comes from existing BMC security research from: ● Dan Farmer, HD Moore, Matias Soler, Nicolas Waisman, Fabien Périgaud, Alexandre Gazet, Joffrey Czarny, Adrien Guinet, Jesse Michael, Mickey Shkatov, Oleksandr Bazhaniuk, ...and others that I am forgetting (sorry) CPU (and SMM) ● In early systems, the CPU was in charge of everything. Via the CPU, the firmware and OS code talked to the registers, RAM, and I/O busses. The CPU was in charge of system security. – This is the traditional model that attackers use, OS/app-level malware. ● On modern Intel (and AMD) systems, in addition to normal CPU mode, the CPU has a new mode, SMM (Systems Management Mode). -
I3C Master IP Core - Lattice Radiant Software
I3C Master IP Core - Lattice Radiant Software User Guide FPGA-IPUG-02082-1.0 December 2019 I3C Master IP Core - Lattice Radiant Software User Guide Disclaimers Lattice makes no warranty, representation, or guarantee regarding the accuracy of information contained in this document or the suitability of its products for any particular purpose. All information herein is provided AS IS and with all faults, and all risk associated with such information is entirely with Buyer. Buyer shall not rely on any data and performance specifications or parameters provided herein. Products sold by Lattice have been subject to limited testing and it is the Buyer's responsibility to independently determine the suitability of any products and to test and verify the same. No Lattice products should be used in conjunction with mission- or safety-critical or any other application in which the failure of Lattice’s product could create a situation where personal injury, death, severe property or environmental damage may occur. The information provided in this document is proprietary to Lattice Semiconductor, and Lattice reserves the right to make any changes to the information in this document or to any products at any time without notice. © 2019 Lattice Semiconductor Corp. All Lattice trademarks, registered trademarks, patents, and disclaimers are as listed at www.latticesemi.com/legal. All other brand or product names are trademarks or registered trademarks of their respective holders. The specifications and information herein are subject to change without notice. 2 FPGA-IPUG-02082-1.0 I3C Master IP Core - Lattice Radiant Software User Guide Contents Acronyms in This Document ................................................................................................................................................ -
OCP's Rack Manager Controller Subproject (Openrmc)
OSF-OpenRMC OCP's Rack Manager Controller subproject (OpenRMC) John Leung, Principle Engineer Intel Corporation Han Wang, Senior Architect Inspur OpenRMC Overview OpenRMC OPENRMC • Goals and Motivation • Logistics and meetings Specifications Status • Reviewed of existing rack management implementations Embedded • Specifying interface and requirements Software • Received Code Contributions RMC for openEdge Platform to DC The OpenRMC Goals manager Specify the Rack Manager Controller service RMC Client interfaces • Northbound interface to datacenter manager (spec) Redfish • Southbound interface requirements to OCP Northbound Interface platforms in the rack Rack Manager Controller Deliver a Rack Manager implementation Service • Available as open source Southbound Interface OCP compliant hardware designs I2C IPMI Redfish • Handled by other OCP projects to OCP platforms Motivation for OpenRMC RMC Rack Mgr Service Controller 1. System Firmware (BIOS) 3 In-band • OCP System Firmware project SW OS 2. BMC Firmware Agent Out-of-band • OpenBMC governed by Linux Foundation (Redfish) 3. Rack Manager Software/Firmware BIOS CPU NIC 1 • OCP OpenRMC NC-SI BMC FW BMC 2 • With OpenBMC, the industry unified the various repositories in 2018 device other • With rack manager, OCP will provide a device source repository and prevent splintering Server The RMC can be hosted in various locations OpenRACK EIA, OpenRACK Olympus (within power shelf) (within switch) (standalone) Switch RMC FW Switch w/ RMC FW Switch Power Shelf w/ RMC FW Server Server Server Server -
Openbmc Overview
Andrew Geissler [email protected] What is a BMC? ▶ BMC – Baseboard Management Controller ▶ Separate uproc (eg. AST 2500) with dedicated RAM and Flash ▶ Provides ▶ System Power/thermal control ▶ Out of Band management ▶ IPMI, REST, etc ▶ Data collection ▶ Debug ▶ GUI and Command line ▶ Interfaces to Host/OCC ▶ System error logging ▶ Based on OpenEmbedded technologies built via Yocto ▶ Embedded Linux stack ▶ Linux Kernel 4.10….4.18, Yocto 2.3…2.6, python, SSH ▶ Applications communicate via D-Bus ▶ Users communicate via REST, IPMI and GUI ▶ Reports externally to management entity ▶ No customer network functional interaction What is the OpenBMC Project Free open source software management Linux distribution designed for the embedded environment … OpenPOWER Eco-system Enablement Industry Collaboration Quality Solutions Reduce Redundant Effort Openness -- provides proof of security Part of Linux Foundation What is OpenBMC ▶ 100% compatible with OpenPOWER Hostboot/Opal/OCC ▶ Aka BIOS ▶ https://github.com/open-power/op-build ▶ Can simply be a reference implementation ▶ Currently runs on… ▶ Barreleye, S822LC, S822LC For HPC, P8 Reference ▶ Witherspoon -- P9 AC922LC Power AI and CORAL ▶ P9 reference boards ▶ AST2400 and AST2500 BMC hardware Core Infrastructure of the OpenBMC Project Control the Functions in your OpenBMC… ▶ Built on Yocto-Linux ▶ YAML/XML input for system configuration Infrastructure at the ready ▶ Process management Systemd ▶ IPC via D-Bus ▶ External Interfaces via REST, IPMI, GUI ▶ Journaling for Trace/debug ▶ Code update ▶ Code