HKG18-317 - Arm Server Ready Program

Linaro
LinaroLinaro
Copyright © 2018 Arm Limited
Dong Wei
Linaro Connect HKG
March 2018
Arm ServerReady
Update
Confidential © Arm 2017
Server Architecture
3
Base System Architecture (BSA)
• Defines hardware requirements
Base Boot Requirements (BBR)
• Defines firmware requirements
These specifications require a minimum set of hardware and firmware
implementations that will ensure OS and firmware will interoperate
SBSA/SBBR are the BSA/BBR for the server systems
• Developed using feedback from vendors across the industry (Silicon vendors, OSVs, Hypervisor
vendors, BIOS vendors, OEMs and ODMs)
• SBBR defines the required, recommended and optional UEFI, ACPI and SMBIOS interfaces
SBSA and SBBR are now available at https://developer.arm.com/
• Current versions are SBSA v3.1 and SBBR v1.0. No click through license required.
• SBSA v5.0 and SBBR v1.1 will be available soon
Server Base Manageability Guide (SBMG)
• Defines guidance for server management standardization
• Work In Progress
Server Architecture
4
We have created an Engineering Change Request (ECR) process for SBSA / SBBR / SBMG
1. Partner submit the change requirement to Arm (armserverac-request@arm.com) using the template with
the following info: Summary of Change, Benefits of the Change (justifications), Impact of the Change.
2. Partner and Arm work together to understand the change requirement and brainstorm the solution that
meets the requirement . When the solution is defined, post it to an Arm Drop Zone for broader partners
review
3. External Mantis-based ECR tracking database Work In Progress
Logistics:
 Two discussion channels:
 Partner to Arm over armserverac-request@arm.com protected by NDA
 Anybody on the Arm server AC discussion group: armserverac-discuss@arm.com
• If you are on ArmServerAC, you are already on armserverac-discuss@arm.com, and if you are not then ask us
• Weekly phone conferences on the as-needed basis would be the most scalable solution, complemented by ftf
gathering
Formalizing how to request spec content updates
5
SBSA Status
Drafting SBSA v5.0 (BETA available on Dropzone)
Core / System:
• RAS requirements (AARCH-4638)
• ROP and JOB requirements for SBSA (AARCH-11320)
• SBSA and SVE (AARCH-11319)
• Nested virtualization (AARCH-12054)
• MPAM requirements for SBSA (AARCH-11323)
• Forced writeback (AARCH-11326)
• Add Activity Monitor Requirements to SBSA (AARCH-12044)
• Crypto Requirements to SBSA (AARCH-12058)
• 48bit mode (AARCH-12858)
• Ban non-standard interrupt controller (AARCH-11329)
• PPI assignments (AARCH-11753)
• Base frequency standardisation (AARCH-11324)
• Assign PPIs for new timers in v8.4 (AARCH-11321)
• Secure EL2 (AARCH-13144)
• TLBI-range (AARCH-12159)
• SVE heterogenity (AARCH-13132)
IO:
• PCIe clarifications (AARCH-12301)
• UART clarifications (AARCH-12701)
• PCIe requirements for assignable devices (AARCH-11610)
• PCIe Precision Time Measurement Root source (AARCH-
12571)
• PCIe Deadlock (AARCH-4698)
• ACS and Peer to Peer (AARCH-12303)
Security:
• TCG TPM (AARCH-12312)Some highlights
Cleanup:
• Deprecate old SBSA levels (AARCH-11330)
• Clean to point of persistence (AARCH-13385)*
6
PCIe improvements – SBSA
PCIe feature SBSA
revision
Clarifications, 4G and Non-Prefetchable BARs SBSA 5.0
PTM and system counter
Access control and Peer to Peer traffic
RCIE minimum requirements SBSA - next
Error logging and reporting minimal requirements
Vendor defined message handling
DPC minimal requirements
Memory ordering requirements
7
Additional work on PCIe
We want to improve testability of SBSA rules relating to PCIe
• Our current approach is based on modified drivers (SATA) and this limits coverage
• Very hard to use pre-silicon
• We are working with pre-silicon and post-silicon solutions to generate test IP
• Enables us to generate specific traffic patterns and increase coverage in areas such as coherency, deadlocks and
interrupts
We are also working on PCIe guidance ( as opposed to mandates ):
• PCIe integration guide - currently trying to nail topic list
• PCIe performance verification guide – alpha is in dropzone
8
SBBR Status
SBBR 1.1 (EAC available on Dropzone)
UEFI:
• UEFI PCI Root Bridge IO Protocol Address
Translation clarifications
• UEFI GOP implementation clarifications
• UEFI REST Protocol support
• UEFI Capsule Service clarification
• Native AArch64 image requirements for UEFI
applications and drivers
• UEFI RNG Protocol*
ACPI:
• ACPI Interrupt-signaled Events support
• ACPI Generic Event Devices support
• ACPI PCI IO Address Translation clarifications*
• IORT implementation guidelines
SMBIOS/Management:
• SMBIOS Processor Information
• SMBIOS structure data requirements clarification
• SMBIOS Redfish Host Interface support
• SPMI recommendation removal
Cleanup:
• Clarifications of SSDT being optional
• Clarifications on UEFI Load File and Load File 2
Protocols
• Updated referenced specifications to: UEFI 2.7,
ACPI 6.2, SMBIOS 3.1.1
• Secondary core boot standardization with PSCI
Security:
• Secure and Trusted Boot
• Secure Firmware Update
9
UEFI Option ROM Availability
Architecturally Arm requires the support of AArch64 native binary UEFI drivers
Arm testing room will be open at UEFI Plugfest next week to provide:
• Real HW Setup in which to test native AArch64 drivers
• Help and suggestions on how to get your driver recompiled for AArch64
Arm is creating a “getting started guide” and a list of off-the-shelf systems that can be
used for continuous testing
Arm is collecting a list of vendors/cards with AArch64 drivers:
• Contact us (uefi@arm.com) if you would like to be on it or if you’d like more
information
10
Secure Server Profile
What are included:
• Verified Boot (Reset - Arm TF - UEFI Secure Boot -OS)
• Measured Boot (TPM, TCG Trusted Boot)
• Secure Firmware Update
What else?
11
SBMG Status and Plans
Host (UEFI,
OS)
SoC
Elements
(e.g.
sensors)
On-chip
Management
BMC
Redfish
API
Redfish Host Interface
Redfish enabled
PLDM/MCTP
Redfish
enabled
PLDM/MCTP
Platform
Elements
MCTP compliant Transport: PCIe, or
I2C/SMBus (SMLink)
In-band
Out-of-band
SoC
NIC
LM0: current implementation
LM1: Redfish
LM2: Redfish enabled PLDM/MCTP
IPMI support: optional in addition
12
SBSA/SBBR roadmap
CY2018H1 CY2018H2 CY2019H1Available Future
SBSA 5.0 BETA
SBBR 1.1 BETA
SBSA 5.0 EAC
SBSA-next EAC
SBBR-next EACSpecs
Enterprise ACS
For ARM Server Ready 1.0
Arm Server Ready 2.0
FY2018H1 FY2018H2 FY2019H1Available Future Released
Development
Adv. Planning
Concept
Ongoing updates
SBSA/SBBR
Enterprise ACS 1.3
Compliance
test suites
SBBR 1.1 EAC
SBSA 5.0 REL
ECR Database
SBBR next
Alpha
SBSA next Alpha
- Next Arch revision
-Additional PCIe rules
Enterprise ACS
For ARM Server Ready 1.0
Enterprise ACS for Server Ready
2.0-Alpha
Supporting SBSA5.0/SBBR1.1
Enterprise ACS for Server Ready
2.0-Alpha
Supporting SBSA5.0/SBBR1.1
SBMG-1.0 Alpha
SBMG-1.0 Beta SBMG-1.0 EAC
PCIe perf verification
guide Alpha
PCIe perf verification
guide Beta
PCIe Integration
guide Alpha
PCIe perf verification
guide EAC
PCIe Integra
guide EAC
SBSA-next-next Alpha
Confidential © Arm 2018
14
Vision | Mission | Elevator Pitch
Vision
• Arm servers everywhere and easy to deploy
Mission
• We provide the tools to enable customers to deploy Arm servers
with confidence
Elevator
• ServerReady gives the confidence that your server works out of
the box.
15
SBSA test covers
• SBSA CPU properties
• SBSA defined system components
• SBSA rules for PCIe integration
– Based on the PCIe specification
– Based on standard OS drivers with no quirks enabled
SBBR test covers
• UEFI testing based on the UEFI SCT
• ACPI testing based on FWTS
• SMBIOS testing
V1.4 released! Apache v2 licensed
• https://github.com/ARM-software/sbsa-acs
• https://github.com/ARM-software/arm-enterprise-acs
SBSA and SBBR Architectural Compliance Suites
16
Server Ready testing
OEM/ODM/SiP/IBV
• runs the tests
Arch Team
• Develops tests
• Takes tests reports
and provides
certification
Support team
• Supports
ODM/OEM/Silicon
vendor or BIOS
vendor on running
the tests and fixing
issues
We are engaging with silicon vendors,
ODMs, OEMs and BIOS vendors to run the
tests
Tests are developed by our architecture
team, which also develops the
specifications
We have a support team that helps in
running of test, debugging etc
17
Inputs for certification
Certification request document (CRD) contains
• Board information table
• Enterprise ACS logs
• Explanation for fails and skips
• OS boot logs
• CentOS x.x (Kernel version y.y)
• Or RHEL x.x (Kernel version y.y)
• Suse Linux x.x (Kernel version y.y)
• Ubuntu x.x
Board Information table
ODM Name
Board Name
Silicon provider
Silicon version
Bios vendor
Target market
Is it a SKU of a previously
certified board? If yes, name
of the board.
18
Likely to Launch in Q4’2018
Call to Action
• Partners continue to work with Arm to evaluate the tests
• Partners invited to write guest blogs promoting the program
• Partners get ready to co-launch
Arm Server Ready Program Launch
1919
The trademarks featured in this
presentation are registered and/or
unregistered trademarks of Arm
Limited (or its subsidiaries) in the EU
and/or elsewhere. All rights
reserved. All other marks featured
may be trademarks of their
respective owners.
202020
Thank You!
Danke!
Merci!
谢谢!
ありがとう!
Gracias!
Kiitos!
1 sur 20

Recommandé

Critical overview of HMC IBM i FSP and firmware par
Critical overview of HMC IBM i FSP and firmwareCritical overview of HMC IBM i FSP and firmware
Critical overview of HMC IBM i FSP and firmwareCOMMON Europe
5.3K vues92 diapositives
How to Upgrade to IBM i 7.2 par
How to Upgrade to IBM i 7.2 How to Upgrade to IBM i 7.2
How to Upgrade to IBM i 7.2 HelpSystems
21.9K vues104 diapositives
What you-need-to-know-to-do successful-upgrades par
What you-need-to-know-to-do successful-upgradesWhat you-need-to-know-to-do successful-upgrades
What you-need-to-know-to-do successful-upgradesCOMMON Europe
7.1K vues123 diapositives
HelpSystems - How to Upgrade to IBM i 7.3 par
HelpSystems - How to Upgrade to IBM i 7.3HelpSystems - How to Upgrade to IBM i 7.3
HelpSystems - How to Upgrade to IBM i 7.3HelpSystems
1.5K vues22 diapositives
Switch configuration par
Switch configurationSwitch configuration
Switch configurationMuuluu
1.3K vues61 diapositives
Sneak Peek into the New ChangeMan ZMF Release par
Sneak Peek into the New ChangeMan ZMF ReleaseSneak Peek into the New ChangeMan ZMF Release
Sneak Peek into the New ChangeMan ZMF ReleaseNavita Sood
194 vues35 diapositives

Contenu connexe

Tendances

Cisco ios par
Cisco iosCisco ios
Cisco iosTeja Babu
1.9K vues8 diapositives
0 foundation update__final - Mendy Furmanek par
0 foundation update__final - Mendy Furmanek0 foundation update__final - Mendy Furmanek
0 foundation update__final - Mendy FurmanekYutaka Kawai
96 vues16 diapositives
LF_OVS_17_IPSEC and OVS DPDK par
LF_OVS_17_IPSEC and OVS DPDKLF_OVS_17_IPSEC and OVS DPDK
LF_OVS_17_IPSEC and OVS DPDKLF_OpenvSwitch
1.4K vues17 diapositives
Open Mic on Sametime9 Install -Best Practices par
Open Mic on Sametime9 Install  -Best PracticesOpen Mic on Sametime9 Install  -Best Practices
Open Mic on Sametime9 Install -Best PracticesVinayak Tavargeri
7.2K vues63 diapositives
ONIE / Cumulus Networks Webinar par
ONIE / Cumulus Networks WebinarONIE / Cumulus Networks Webinar
ONIE / Cumulus Networks WebinarCumulus Networks
2.1K vues29 diapositives
BKK16-312 Integrating and controlling embedded devices in LAVA par
BKK16-312 Integrating and controlling embedded devices in LAVABKK16-312 Integrating and controlling embedded devices in LAVA
BKK16-312 Integrating and controlling embedded devices in LAVALinaro
837 vues42 diapositives

Tendances(20)

0 foundation update__final - Mendy Furmanek par Yutaka Kawai
0 foundation update__final - Mendy Furmanek0 foundation update__final - Mendy Furmanek
0 foundation update__final - Mendy Furmanek
Yutaka Kawai96 vues
Open Mic on Sametime9 Install -Best Practices par Vinayak Tavargeri
Open Mic on Sametime9 Install  -Best PracticesOpen Mic on Sametime9 Install  -Best Practices
Open Mic on Sametime9 Install -Best Practices
Vinayak Tavargeri7.2K vues
BKK16-312 Integrating and controlling embedded devices in LAVA par Linaro
BKK16-312 Integrating and controlling embedded devices in LAVABKK16-312 Integrating and controlling embedded devices in LAVA
BKK16-312 Integrating and controlling embedded devices in LAVA
Linaro837 vues
LCU13: An Introduction to ARM Trusted Firmware par Linaro
LCU13: An Introduction to ARM Trusted FirmwareLCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted Firmware
Linaro30.4K vues
Внутренняя архитектура IOS-XE: средства траблшутинга предачи трафика на ASR1k... par Cisco Russia
Внутренняя архитектура IOS-XE: средства траблшутинга предачи трафика на ASR1k...Внутренняя архитектура IOS-XE: средства траблшутинга предачи трафика на ASR1k...
Внутренняя архитектура IOS-XE: средства траблшутинга предачи трафика на ASR1k...
Cisco Russia 4.6K vues
Introduction to the IBM AS/400 par tvlooy
Introduction to the IBM AS/400Introduction to the IBM AS/400
Introduction to the IBM AS/400
tvlooy24K vues
FreeSWITCH Modules for Asterisk Developers par Moises Silva
FreeSWITCH Modules for Asterisk DevelopersFreeSWITCH Modules for Asterisk Developers
FreeSWITCH Modules for Asterisk Developers
Moises Silva3.9K vues
Sparc t4 systems customer presentation par solarisyougood
Sparc t4 systems customer presentationSparc t4 systems customer presentation
Sparc t4 systems customer presentation
solarisyougood936 vues
Sparc t4 2 system technical overview par solarisyougood
Sparc t4 2 system technical overviewSparc t4 2 system technical overview
Sparc t4 2 system technical overview
solarisyougood2.5K vues
LF_OVS_17_Riley: Pushing networking to the edge par LF_OpenvSwitch
LF_OVS_17_Riley: Pushing networking to the edgeLF_OVS_17_Riley: Pushing networking to the edge
LF_OVS_17_Riley: Pushing networking to the edge
LF_OpenvSwitch744 vues
IBM Lotusphere 2012 Show301: Leveraging the Sametime Proxy to support Mobile ... par William Holmes
IBM Lotusphere 2012 Show301: Leveraging the Sametime Proxy to support Mobile ...IBM Lotusphere 2012 Show301: Leveraging the Sametime Proxy to support Mobile ...
IBM Lotusphere 2012 Show301: Leveraging the Sametime Proxy to support Mobile ...
William Holmes1.2K vues
Q2.12: Power Management Across OSs par Linaro
Q2.12: Power Management Across OSsQ2.12: Power Management Across OSs
Q2.12: Power Management Across OSs
Linaro1.5K vues
Sparc t4 4 system technical overview par solarisyougood
Sparc t4 4 system technical overviewSparc t4 4 system technical overview
Sparc t4 4 system technical overview
solarisyougood2.5K vues
XPDS14: Porting FreeRTOS to Xen on the ARM Cortex A15 - Jonathan Daugherty, G... par The Linux Foundation
XPDS14: Porting FreeRTOS to Xen on the ARM Cortex A15 - Jonathan Daugherty, G...XPDS14: Porting FreeRTOS to Xen on the ARM Cortex A15 - Jonathan Daugherty, G...
XPDS14: Porting FreeRTOS to Xen on the ARM Cortex A15 - Jonathan Daugherty, G...

Similaire à HKG18-317 - Arm Server Ready Program

Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdf par
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdfBuilding PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdfPaul Yang
43 vues31 diapositives
The Open Power ISA: A Summary of Architecture Compliancy Options and the Late... par
The Open Power ISA: A Summary of Architecture Compliancy Options and the Late...The Open Power ISA: A Summary of Architecture Compliancy Options and the Late...
The Open Power ISA: A Summary of Architecture Compliancy Options and the Late...Ganesan Narayanasamy
816 vues14 diapositives
OSDC 2014 ONIE by Nat Morris par
OSDC 2014 ONIE by Nat MorrisOSDC 2014 ONIE by Nat Morris
OSDC 2014 ONIE by Nat MorrisCumulus Networks
2.8K vues31 diapositives
04_Bolen-and-Ballard_PCIe-Hot-Plug-and-Error-Handling-for-NVMe_Final-3.13-apb... par
04_Bolen-and-Ballard_PCIe-Hot-Plug-and-Error-Handling-for-NVMe_Final-3.13-apb...04_Bolen-and-Ballard_PCIe-Hot-Plug-and-Error-Handling-for-NVMe_Final-3.13-apb...
04_Bolen-and-Ballard_PCIe-Hot-Plug-and-Error-Handling-for-NVMe_Final-3.13-apb...ssuser1c8ca21
3 vues25 diapositives
ONIE: Open Network Install Environment @ OSDC 2014 Netways, Berlin par
ONIE: Open Network Install Environment @ OSDC 2014 Netways, BerlinONIE: Open Network Install Environment @ OSDC 2014 Netways, Berlin
ONIE: Open Network Install Environment @ OSDC 2014 Netways, BerlinNat Morris
2.2K vues31 diapositives
Building a Router par
Building a RouterBuilding a Router
Building a RouterHannes Gredler
20.4K vues26 diapositives

Similaire à HKG18-317 - Arm Server Ready Program(20)

Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdf par Paul Yang
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdfBuilding PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
Paul Yang43 vues
The Open Power ISA: A Summary of Architecture Compliancy Options and the Late... par Ganesan Narayanasamy
The Open Power ISA: A Summary of Architecture Compliancy Options and the Late...The Open Power ISA: A Summary of Architecture Compliancy Options and the Late...
The Open Power ISA: A Summary of Architecture Compliancy Options and the Late...
04_Bolen-and-Ballard_PCIe-Hot-Plug-and-Error-Handling-for-NVMe_Final-3.13-apb... par ssuser1c8ca21
04_Bolen-and-Ballard_PCIe-Hot-Plug-and-Error-Handling-for-NVMe_Final-3.13-apb...04_Bolen-and-Ballard_PCIe-Hot-Plug-and-Error-Handling-for-NVMe_Final-3.13-apb...
04_Bolen-and-Ballard_PCIe-Hot-Plug-and-Error-Handling-for-NVMe_Final-3.13-apb...
ssuser1c8ca213 vues
ONIE: Open Network Install Environment @ OSDC 2014 Netways, Berlin par Nat Morris
ONIE: Open Network Install Environment @ OSDC 2014 Netways, BerlinONIE: Open Network Install Environment @ OSDC 2014 Netways, Berlin
ONIE: Open Network Install Environment @ OSDC 2014 Netways, Berlin
Nat Morris2.2K vues
OPNFV: Platform Performance Acceleration par OPNFV
OPNFV: Platform Performance AccelerationOPNFV: Platform Performance Acceleration
OPNFV: Platform Performance Acceleration
OPNFV1.2K vues
VMworld 2013: Failsafe at PCIe Level: Enabling PCIe Hot Swap par VMworld
VMworld 2013: Failsafe at PCIe Level: Enabling PCIe Hot Swap VMworld 2013: Failsafe at PCIe Level: Enabling PCIe Hot Swap
VMworld 2013: Failsafe at PCIe Level: Enabling PCIe Hot Swap
VMworld876 vues
The future of RISC-V Supervisor Binary Interface(SBI) par Atish Patra
The future of RISC-V Supervisor Binary Interface(SBI)The future of RISC-V Supervisor Binary Interface(SBI)
The future of RISC-V Supervisor Binary Interface(SBI)
Atish Patra275 vues
Sneak Peek into the New ChangeMan ZMF Release par Serena Software
Sneak Peek into the New ChangeMan ZMF ReleaseSneak Peek into the New ChangeMan ZMF Release
Sneak Peek into the New ChangeMan ZMF Release
Serena Software840 vues
OSDC 2014: Nat Morris - Open Network Install Environment par NETWAYS
OSDC 2014: Nat Morris - Open Network Install EnvironmentOSDC 2014: Nat Morris - Open Network Install Environment
OSDC 2014: Nat Morris - Open Network Install Environment
NETWAYS501 vues
RISC-V NOEL-V - A new high performance RISC-V Processor Family par RISC-V International
RISC-V NOEL-V - A new high performance RISC-V Processor FamilyRISC-V NOEL-V - A new high performance RISC-V Processor Family
RISC-V NOEL-V - A new high performance RISC-V Processor Family
Application hosting in the Intelligent WAN par Cisco DevNet
Application hosting in the Intelligent WANApplication hosting in the Intelligent WAN
Application hosting in the Intelligent WAN
Cisco DevNet890 vues
Presentation oracle rac on vsphere 5 par solarisyourep
Presentation   oracle rac on vsphere 5Presentation   oracle rac on vsphere 5
Presentation oracle rac on vsphere 5
solarisyourep552 vues
IBM Power Systems E850C and S824 par David Spurway
IBM Power Systems E850C and S824IBM Power Systems E850C and S824
IBM Power Systems E850C and S824
David Spurway1.5K vues
An introduction into Oracle VM V3.x par Marco Gralike
An introduction into Oracle VM V3.xAn introduction into Oracle VM V3.x
An introduction into Oracle VM V3.x
Marco Gralike3.9K vues
SAP on Azure Web Dispatcher High Availability par Gary Jackson MBCS
SAP on Azure Web Dispatcher High AvailabilitySAP on Azure Web Dispatcher High Availability
SAP on Azure Web Dispatcher High Availability
Gary Jackson MBCS3.7K vues

Plus de Linaro

Deep Learning Neural Network Acceleration at the Edge - Andrea Gallo par
Deep Learning Neural Network Acceleration at the Edge - Andrea GalloDeep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Deep Learning Neural Network Acceleration at the Edge - Andrea GalloLinaro
7K vues54 diapositives
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta Vekaria par
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta VekariaArm Architecture HPC Workshop Santa Clara 2018 - Kanta Vekaria
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta VekariaLinaro
3K vues8 diapositives
Huawei’s requirements for the ARM based HPC solution readiness - Joshua Mora par
Huawei’s requirements for the ARM based HPC solution readiness - Joshua MoraHuawei’s requirements for the ARM based HPC solution readiness - Joshua Mora
Huawei’s requirements for the ARM based HPC solution readiness - Joshua MoraLinaro
3.7K vues20 diapositives
Bud17 113: distribution ci using qemu and open qa par
Bud17 113: distribution ci using qemu and open qaBud17 113: distribution ci using qemu and open qa
Bud17 113: distribution ci using qemu and open qaLinaro
662 vues63 diapositives
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018 par
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018Linaro
2.3K vues16 diapositives
HPC network stack on ARM - Linaro HPC Workshop 2018 par
HPC network stack on ARM - Linaro HPC Workshop 2018HPC network stack on ARM - Linaro HPC Workshop 2018
HPC network stack on ARM - Linaro HPC Workshop 2018Linaro
2.6K vues21 diapositives

Plus de Linaro(20)

Deep Learning Neural Network Acceleration at the Edge - Andrea Gallo par Linaro
Deep Learning Neural Network Acceleration at the Edge - Andrea GalloDeep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Deep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Linaro7K vues
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta Vekaria par Linaro
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta VekariaArm Architecture HPC Workshop Santa Clara 2018 - Kanta Vekaria
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta Vekaria
Linaro3K vues
Huawei’s requirements for the ARM based HPC solution readiness - Joshua Mora par Linaro
Huawei’s requirements for the ARM based HPC solution readiness - Joshua MoraHuawei’s requirements for the ARM based HPC solution readiness - Joshua Mora
Huawei’s requirements for the ARM based HPC solution readiness - Joshua Mora
Linaro3.7K vues
Bud17 113: distribution ci using qemu and open qa par Linaro
Bud17 113: distribution ci using qemu and open qaBud17 113: distribution ci using qemu and open qa
Bud17 113: distribution ci using qemu and open qa
Linaro662 vues
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018 par Linaro
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018
Linaro2.3K vues
HPC network stack on ARM - Linaro HPC Workshop 2018 par Linaro
HPC network stack on ARM - Linaro HPC Workshop 2018HPC network stack on ARM - Linaro HPC Workshop 2018
HPC network stack on ARM - Linaro HPC Workshop 2018
Linaro2.6K vues
It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ... par Linaro
It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...
It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...
Linaro1.9K vues
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ... par Linaro
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
Linaro2.4K vues
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant... par Linaro
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
Linaro2.4K vues
Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su... par Linaro
Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...
Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...
Linaro2.7K vues
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline par Linaro
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainlineHKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
Linaro4.4K vues
HKG18-100K1 - George Grey: Opening Keynote par Linaro
HKG18-100K1 - George Grey: Opening KeynoteHKG18-100K1 - George Grey: Opening Keynote
HKG18-100K1 - George Grey: Opening Keynote
Linaro839 vues
HKG18-318 - OpenAMP Workshop par Linaro
HKG18-318 - OpenAMP WorkshopHKG18-318 - OpenAMP Workshop
HKG18-318 - OpenAMP Workshop
Linaro608 vues
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline par Linaro
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainlineHKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
Linaro866 vues
HKG18-315 - Why the ecosystem is a wonderful thing, warts and all par Linaro
HKG18-315 - Why the ecosystem is a wonderful thing, warts and allHKG18-315 - Why the ecosystem is a wonderful thing, warts and all
HKG18-315 - Why the ecosystem is a wonderful thing, warts and all
Linaro219 vues
HKG18- 115 - Partitioning ARM Systems with the Jailhouse Hypervisor par Linaro
HKG18- 115 - Partitioning ARM Systems with the Jailhouse HypervisorHKG18- 115 - Partitioning ARM Systems with the Jailhouse Hypervisor
HKG18- 115 - Partitioning ARM Systems with the Jailhouse Hypervisor
Linaro1.5K vues
HKG18-TR08 - Upstreaming SVE in QEMU par Linaro
HKG18-TR08 - Upstreaming SVE in QEMUHKG18-TR08 - Upstreaming SVE in QEMU
HKG18-TR08 - Upstreaming SVE in QEMU
Linaro476 vues
HKG18-113- Secure Data Path work with i.MX8M par Linaro
HKG18-113- Secure Data Path work with i.MX8MHKG18-113- Secure Data Path work with i.MX8M
HKG18-113- Secure Data Path work with i.MX8M
Linaro1.4K vues
HKG18-120 - Devicetree Schema Documentation and Validation par Linaro
HKG18-120 - Devicetree Schema Documentation and Validation HKG18-120 - Devicetree Schema Documentation and Validation
HKG18-120 - Devicetree Schema Documentation and Validation
Linaro1.3K vues
HKG18-223 - Trusted FirmwareM: Trusted boot par Linaro
HKG18-223 - Trusted FirmwareM: Trusted bootHKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted boot
Linaro1.4K vues

Dernier

Why and How CloudStack at weSystems - Stephan Bienek - weSystems par
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsShapeBlue
197 vues13 diapositives
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue par
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueShapeBlue
222 vues23 diapositives
Ransomware is Knocking your Door_Final.pdf par
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
90 vues46 diapositives
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue par
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueShapeBlue
176 vues20 diapositives
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... par
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...ShapeBlue
101 vues17 diapositives
Uni Systems for Power Platform.pptx par
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
61 vues21 diapositives

Dernier(20)

Why and How CloudStack at weSystems - Stephan Bienek - weSystems par ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue197 vues
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue par ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue222 vues
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue par ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
ShapeBlue176 vues
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... par ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue101 vues
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... par ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue85 vues
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue par ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue163 vues
Digital Personal Data Protection (DPDP) Practical Approach For CISOs par Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash153 vues
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue par ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue93 vues
State of the Union - Rohit Yadav - Apache CloudStack par ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue253 vues
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T par ShapeBlue
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
ShapeBlue112 vues
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue par ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue103 vues
"Surviving highload with Node.js", Andrii Shumada par Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays53 vues
Igniting Next Level Productivity with AI-Infused Data Integration Workflows par Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software385 vues
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... par ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue146 vues
Business Analyst Series 2023 - Week 4 Session 7 par DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10126 vues
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive par Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... par ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue144 vues

HKG18-317 - Arm Server Ready Program

  • 1. Copyright © 2018 Arm Limited Dong Wei Linaro Connect HKG March 2018 Arm ServerReady Update
  • 2. Confidential © Arm 2017 Server Architecture
  • 3. 3 Base System Architecture (BSA) • Defines hardware requirements Base Boot Requirements (BBR) • Defines firmware requirements These specifications require a minimum set of hardware and firmware implementations that will ensure OS and firmware will interoperate SBSA/SBBR are the BSA/BBR for the server systems • Developed using feedback from vendors across the industry (Silicon vendors, OSVs, Hypervisor vendors, BIOS vendors, OEMs and ODMs) • SBBR defines the required, recommended and optional UEFI, ACPI and SMBIOS interfaces SBSA and SBBR are now available at https://developer.arm.com/ • Current versions are SBSA v3.1 and SBBR v1.0. No click through license required. • SBSA v5.0 and SBBR v1.1 will be available soon Server Base Manageability Guide (SBMG) • Defines guidance for server management standardization • Work In Progress Server Architecture
  • 4. 4 We have created an Engineering Change Request (ECR) process for SBSA / SBBR / SBMG 1. Partner submit the change requirement to Arm (armserverac-request@arm.com) using the template with the following info: Summary of Change, Benefits of the Change (justifications), Impact of the Change. 2. Partner and Arm work together to understand the change requirement and brainstorm the solution that meets the requirement . When the solution is defined, post it to an Arm Drop Zone for broader partners review 3. External Mantis-based ECR tracking database Work In Progress Logistics:  Two discussion channels:  Partner to Arm over armserverac-request@arm.com protected by NDA  Anybody on the Arm server AC discussion group: armserverac-discuss@arm.com • If you are on ArmServerAC, you are already on armserverac-discuss@arm.com, and if you are not then ask us • Weekly phone conferences on the as-needed basis would be the most scalable solution, complemented by ftf gathering Formalizing how to request spec content updates
  • 5. 5 SBSA Status Drafting SBSA v5.0 (BETA available on Dropzone) Core / System: • RAS requirements (AARCH-4638) • ROP and JOB requirements for SBSA (AARCH-11320) • SBSA and SVE (AARCH-11319) • Nested virtualization (AARCH-12054) • MPAM requirements for SBSA (AARCH-11323) • Forced writeback (AARCH-11326) • Add Activity Monitor Requirements to SBSA (AARCH-12044) • Crypto Requirements to SBSA (AARCH-12058) • 48bit mode (AARCH-12858) • Ban non-standard interrupt controller (AARCH-11329) • PPI assignments (AARCH-11753) • Base frequency standardisation (AARCH-11324) • Assign PPIs for new timers in v8.4 (AARCH-11321) • Secure EL2 (AARCH-13144) • TLBI-range (AARCH-12159) • SVE heterogenity (AARCH-13132) IO: • PCIe clarifications (AARCH-12301) • UART clarifications (AARCH-12701) • PCIe requirements for assignable devices (AARCH-11610) • PCIe Precision Time Measurement Root source (AARCH- 12571) • PCIe Deadlock (AARCH-4698) • ACS and Peer to Peer (AARCH-12303) Security: • TCG TPM (AARCH-12312)Some highlights Cleanup: • Deprecate old SBSA levels (AARCH-11330) • Clean to point of persistence (AARCH-13385)*
  • 6. 6 PCIe improvements – SBSA PCIe feature SBSA revision Clarifications, 4G and Non-Prefetchable BARs SBSA 5.0 PTM and system counter Access control and Peer to Peer traffic RCIE minimum requirements SBSA - next Error logging and reporting minimal requirements Vendor defined message handling DPC minimal requirements Memory ordering requirements
  • 7. 7 Additional work on PCIe We want to improve testability of SBSA rules relating to PCIe • Our current approach is based on modified drivers (SATA) and this limits coverage • Very hard to use pre-silicon • We are working with pre-silicon and post-silicon solutions to generate test IP • Enables us to generate specific traffic patterns and increase coverage in areas such as coherency, deadlocks and interrupts We are also working on PCIe guidance ( as opposed to mandates ): • PCIe integration guide - currently trying to nail topic list • PCIe performance verification guide – alpha is in dropzone
  • 8. 8 SBBR Status SBBR 1.1 (EAC available on Dropzone) UEFI: • UEFI PCI Root Bridge IO Protocol Address Translation clarifications • UEFI GOP implementation clarifications • UEFI REST Protocol support • UEFI Capsule Service clarification • Native AArch64 image requirements for UEFI applications and drivers • UEFI RNG Protocol* ACPI: • ACPI Interrupt-signaled Events support • ACPI Generic Event Devices support • ACPI PCI IO Address Translation clarifications* • IORT implementation guidelines SMBIOS/Management: • SMBIOS Processor Information • SMBIOS structure data requirements clarification • SMBIOS Redfish Host Interface support • SPMI recommendation removal Cleanup: • Clarifications of SSDT being optional • Clarifications on UEFI Load File and Load File 2 Protocols • Updated referenced specifications to: UEFI 2.7, ACPI 6.2, SMBIOS 3.1.1 • Secondary core boot standardization with PSCI Security: • Secure and Trusted Boot • Secure Firmware Update
  • 9. 9 UEFI Option ROM Availability Architecturally Arm requires the support of AArch64 native binary UEFI drivers Arm testing room will be open at UEFI Plugfest next week to provide: • Real HW Setup in which to test native AArch64 drivers • Help and suggestions on how to get your driver recompiled for AArch64 Arm is creating a “getting started guide” and a list of off-the-shelf systems that can be used for continuous testing Arm is collecting a list of vendors/cards with AArch64 drivers: • Contact us (uefi@arm.com) if you would like to be on it or if you’d like more information
  • 10. 10 Secure Server Profile What are included: • Verified Boot (Reset - Arm TF - UEFI Secure Boot -OS) • Measured Boot (TPM, TCG Trusted Boot) • Secure Firmware Update What else?
  • 11. 11 SBMG Status and Plans Host (UEFI, OS) SoC Elements (e.g. sensors) On-chip Management BMC Redfish API Redfish Host Interface Redfish enabled PLDM/MCTP Redfish enabled PLDM/MCTP Platform Elements MCTP compliant Transport: PCIe, or I2C/SMBus (SMLink) In-band Out-of-band SoC NIC LM0: current implementation LM1: Redfish LM2: Redfish enabled PLDM/MCTP IPMI support: optional in addition
  • 12. 12 SBSA/SBBR roadmap CY2018H1 CY2018H2 CY2019H1Available Future SBSA 5.0 BETA SBBR 1.1 BETA SBSA 5.0 EAC SBSA-next EAC SBBR-next EACSpecs Enterprise ACS For ARM Server Ready 1.0 Arm Server Ready 2.0 FY2018H1 FY2018H2 FY2019H1Available Future Released Development Adv. Planning Concept Ongoing updates SBSA/SBBR Enterprise ACS 1.3 Compliance test suites SBBR 1.1 EAC SBSA 5.0 REL ECR Database SBBR next Alpha SBSA next Alpha - Next Arch revision -Additional PCIe rules Enterprise ACS For ARM Server Ready 1.0 Enterprise ACS for Server Ready 2.0-Alpha Supporting SBSA5.0/SBBR1.1 Enterprise ACS for Server Ready 2.0-Alpha Supporting SBSA5.0/SBBR1.1 SBMG-1.0 Alpha SBMG-1.0 Beta SBMG-1.0 EAC PCIe perf verification guide Alpha PCIe perf verification guide Beta PCIe Integration guide Alpha PCIe perf verification guide EAC PCIe Integra guide EAC SBSA-next-next Alpha
  • 14. 14 Vision | Mission | Elevator Pitch Vision • Arm servers everywhere and easy to deploy Mission • We provide the tools to enable customers to deploy Arm servers with confidence Elevator • ServerReady gives the confidence that your server works out of the box.
  • 15. 15 SBSA test covers • SBSA CPU properties • SBSA defined system components • SBSA rules for PCIe integration – Based on the PCIe specification – Based on standard OS drivers with no quirks enabled SBBR test covers • UEFI testing based on the UEFI SCT • ACPI testing based on FWTS • SMBIOS testing V1.4 released! Apache v2 licensed • https://github.com/ARM-software/sbsa-acs • https://github.com/ARM-software/arm-enterprise-acs SBSA and SBBR Architectural Compliance Suites
  • 16. 16 Server Ready testing OEM/ODM/SiP/IBV • runs the tests Arch Team • Develops tests • Takes tests reports and provides certification Support team • Supports ODM/OEM/Silicon vendor or BIOS vendor on running the tests and fixing issues We are engaging with silicon vendors, ODMs, OEMs and BIOS vendors to run the tests Tests are developed by our architecture team, which also develops the specifications We have a support team that helps in running of test, debugging etc
  • 17. 17 Inputs for certification Certification request document (CRD) contains • Board information table • Enterprise ACS logs • Explanation for fails and skips • OS boot logs • CentOS x.x (Kernel version y.y) • Or RHEL x.x (Kernel version y.y) • Suse Linux x.x (Kernel version y.y) • Ubuntu x.x Board Information table ODM Name Board Name Silicon provider Silicon version Bios vendor Target market Is it a SKU of a previously certified board? If yes, name of the board.
  • 18. 18 Likely to Launch in Q4’2018 Call to Action • Partners continue to work with Arm to evaluate the tests • Partners invited to write guest blogs promoting the program • Partners get ready to co-launch Arm Server Ready Program Launch
  • 19. 1919 The trademarks featured in this presentation are registered and/or unregistered trademarks of Arm Limited (or its subsidiaries) in the EU and/or elsewhere. All rights reserved. All other marks featured may be trademarks of their respective owners.