11:45 – ScaleMark: Understanding Performance Results for Servers in the Data Center Speaker: Markus Levy, EEMBC President and CEO Abstract; Workloads for the Cloud and associated data centers are putting unique demands on the SoCs and other system-level hardware that are being integrated into these scale-out servers. Traditional benchmarks, such as EEMBC® CoreMark®, SPECInt® 2006 and SPECFP® 2006, and others, address the compute complexity of different workloads and the suitability of processors for different tasks. However, when looking at the system level (which is required for comprehending the performance of servers in data centers), many factors contribute to the performance of the system as a whole – memory, disks, operating system, network interfaces, network stack, and more. In addition, the manner in which workloads are generated can significantly affect the results. In this session, using a case study from Cavium’s Arm based Thunder X system and the EEMBC ScaleMark (a cloud and server benchmark suite), results will be presented that demonstrate how subtle variations in the test environment can obfuscate benchmark results and how a properly designed benchmark suite can overcome these obstacles
SF015 304 Server Ecosystem Day Part 2b
BKK19-111 - DRM HW Composer for Beagle X15 BoardTuesday, April 16, 2019
Describing the process of adaptation AOSP DRM HWC to be used on Beagle X15 Board (4.14 kernel).
This can be used as an example of launching the external/drm_hwc on a board: a simple "How to" with the minimun steps required to get the drm_hwc functional.
SAN19-413 - TEE based Trusted Keys in LinuxFriday, October 4, 2019
Protecting key confidentiality is essential for many kernel security use-cases such as disk encryption, file encryption and protecting the integrity of file metadata. Trusted and encrypted keys provides a mechanism to export keys to user-space for storage as an encrypted blob and for the user-space to later reload them onto Linux keyring without the user-space knowing the encryption key. The existing Trusted Keys implementation relied on a TPM device but what if you are working on a system without one?
This session will introduce a Trusted Keys implementation which relies on a much simpler trusted application running in a Trusted Execution Environment (TEE) for sealing and unsealing of Trusted Keys using a hardware unique key provided by the TEE.