SlideShare a Scribd company logo
I have come to bury the
BIOS, not to open it
The need for holistic systems
Bryan Cantrill
Oxide Computer Company
OXIDE
In the beginning…
• In the beginning, computing systems were holistic: hardware and
software were designed together, to work with one another
• System software was delivered with the computer – but often had to be
newly developed for a new machine
• Requiring new software for new hardware created schedule delays, viz.
OS/360 and The Mythical Man Month
• With the advent of Unix, system software became portable – it could be
ported rather than developed de novo for each new computer…
OXIDE
Unix spreads – and feuds
• The portability of Unix accelerated the minicomputer and workstation
revolutions, with each manufacturer having its own variants
• The systems of this era remained broadly holistic: the hardware and
software were (broadly) designed with the other in mind
• …but despite the original ethos of Unix, the variants themselves
remained entirely proprietary – and the differences between them ignited
the Unix Wars of the 1980s and 1990s
OXIDE
Elsewhere, homebrew computing
• With the rise of the microcomputer, computing became much more
broadly available in the 1970s – but nearly absurd variety with respect to
hardware made software standardization challenging
• The hardware-specific half of CP/M – the dominant microcomputer OS
of the 1970 – was the Basic Input Output System, and could be
delivered separately
• This gave rise to hardware vendors delivering ROMs that contained
platform enablement code roughly standardized as a “System BIOS”
OXIDE
The IBM PC era
• With the emergence of the IBM PC – and its de facto standardization by
Compaq – the system software/BIOS split became irreconcilable
• Essential hardware enabling-software was driven into the BIOS
• The BIOS interface became what system software bound to – it became
the definition of “compatibility”
• Worse, the software components on both sides of the BIOS/OS divide
were nearly exclusively proprietary, serving to harden the boundary
OXIDE
It gets worse: SMM
• In order to be able implement system software functionality delivered by
the hardware – e.g., laptop suspend and resume – system management
mode was invented
• SMM allows effectively arbitrary, hidden code execution at arbitrary time
without even allowing system software awareness
• This is the opposite of a holistic system: it is one that has been
deliberately and perniciously divided!
OXIDE
EFI/UEFI
• All of this might have been fine had x86 remained relegated to personal
computing…
• …but Intel and AMD out-executed the RISC vendors in the 2000s,
forcing PC constructs into the server space
• Starting with (ill-fated) Itanium, Intel introduced EFI in an attempt to
modernize…
OXIDE
UEFI: What might have been
Source: Beyond BIOS: Developing with the Unified Extensible Firmware Interface
OXIDE
UEFI: What happened instead
• While its goals were laudable, UEFI was overconstrained
• In particular, the need for legacy and Windows compatibility required
UEFI to support all past abstractions
• UEFI has become the worst of all worlds: complicated, proprietary
software that remains at once isolated from – yet also still entirely
entangled with! – system software
• UEFI has become so entangled with lowest-level platform enablement
that non-UEFI platforms are effectively impossible
OXIDE
It gets worse, again: Hidden cores
• A dividend of Moore’s Law: formerly discrete components were
increasingly pulled first into large ASICs – and then pulled on-die into a
system-on-a-chip
• Especially as I/O was brought directly into the die, CPUs developed an
increasing numbers of non-architectural cores to manage it
• But these cores are hidden to system software – the operating system
is being confined to an increasingly narrow slice of the true hardware
capabilities of the system…
OXIDE
…which is not lost on everyone!
Timothy Roscoe, OSDI 2021 Keynote, It's Time for Operating Systems to Rediscover Hardware
OXIDE
The battle for non-architectural cores
• Roscoe (rightfully) calls this a “security catastrophe”
• The non-architectural cores are – on x86 CPUs anyway – entirely
proprietary, with all of its concomitant problems; that the system is
“open source” is increasingly a myth
• Roscoe correctly identifies the problem, but understates the severity:
this isn’t a retreat of Linux – it is a resurgence of proprietary operating
systems, wrapping themselves in firmware
OXIDE
Is an open source BIOS the answer?
• An open source BIOS is certainly valuable and laudable – but if history is
any guide, it is also not sustainable
• The problem is not (merely) the proprietary BIOS – it is the ubiquity of the
abstraction that splits our stack into open and proprietary halves
• The presence of a deeply proprietary platform enablement layer allows
for wildly complicated SoCs to have vast, undocumented elements – the
implementation of the firmware has become the documentation!
• We need a different model
OXIDE
The need for (a to return to) holistic systems
• The platform enablement boundary as we know it today is largely
vestigial – it serves to create abstractions that are broadly unnecessary
• We need systems that obliterate these boundaries – that are rather
holistic systems in which software and hardware are co-designed
• Resetting system state over the course of booting is not holistic!
• Holistic systems require us to be willing to take up Roscoe’s challenge
and adopt SoC specificity in our operating systems
OXIDE
Oxide’s approach
• At Oxide, we are taking a from-scratch, rack-scale approach to
server-side computing, with AMD Milan-based sleds of our own design
• We do not have a traditional BMC, but rather a fit-to-purpose service
processor (an STM32H753) and RoT (LP55S28), both running our own
(Rust-based, open source) OS, Hubris (see Cliff Biffle’s OSFC 2021 talk!)
• Our approach is holistic but open
• Could we develop a truly holistic system on x86?
OXIDE
Aside: AMD Details
• On AMD, the Platform Security Processor (PSP) is a non-architectural
core that executes proprietary software to perform system initialization –
including DRAM training
• System management controller (SP in our case) puts the PSP payload
into SPI flash and brings the CPU out of reset
• The PSP will perform its initialization and eventually vector into host
software executing on the bootstrap core (BSC)
• Historically, post-PSP initialization done by AMD’s AGESA firmware –
which makes a holistic system impossible
OXIDE
Challenge #1: Initialization
• To implement holistic boot, system software must perform the activities
historically done by AGESA
• Modern CPUs are very complicated! Post-PSP initialization includes
configuring I/O interconnects, core complexes, etc.
• For AMD Milan, this specifically includes DXIO engine configuration,
NBIO PCIe strapping, hotplug configuration
• The software that has implemented this level of initialization has
historically been done by the CPU vendor; these interfaces are not
always documented thoroughly – if at all!
OXIDE
Challenge #2: Boot Phasing
• Payload that boots from PSP is size-constrained to ~13MB
• Stage-based approaches (e.g., oreboot + LinuxBoot) use Linux drivers
to load (and execute) a production kernel
• This necessitates a pseudo-reset of the system – as well as the creation
or emulation of an interface (e.g., ACPI) to pass system state to later
stages
• We instead adopt a phase-based approach whereby part of the
system is loaded from SPI NOR and is able to load the remainder from
SSDs – but the system is never discarded
OXIDE
Holistic booting!
• Helios is our illumos derivative that includes the Oxide bhyve-based
hypervisor – and runs our rack-wide control plane
• We have holistic Helios booting on our EVT compute sleds, including all
necessary functionality for platform initialization (I/O, SMP, etc.)
• Phased boot has enough in SPI to be able to import ZFS pools from M.2
devices
• Helios – along with all Oxide-authored software – will be open source
when we ship our first racks at the end of the year!
OXIDE
Towards holistic systems
• Holistic systems have clear advantages in terms of reliability, security,
observability, manageability, sustainability, etc.
• Based on our experience to date, holistic systems are challenging to
implement but emphatically attainable
• Documentation from microprocessor vendors is essential; they
have much to gain by encouraging more software on their platforms!
• Oxide may represent the first open, holistic server-side system in the
post-PC x86 era – but unlikely to be the last!

More Related Content

PDF
Towards Holistic Systems
PPTX
Rancher MasterClass - Avoiding-configuration-drift.pptx
PDF
Best Practices with PostgreSQL on Solaris
PDF
Rolling upgrade OpenStack
PDF
Log Structured Merge Tree
PDF
MyRocks Deep Dive
PDF
Ceph as software define storage
PPSX
Getting the-best-out-of-d3 d12
Towards Holistic Systems
Rancher MasterClass - Avoiding-configuration-drift.pptx
Best Practices with PostgreSQL on Solaris
Rolling upgrade OpenStack
Log Structured Merge Tree
MyRocks Deep Dive
Ceph as software define storage
Getting the-best-out-of-d3 d12

What's hot (20)

PDF
Cloud Native Applications on OpenShift
PPTX
Android Binder: Deep Dive
PDF
Platform Engineering: Manage your infrastructure using Kubernetes and Crossplane
PDF
Our answer to Uber
PPTX
Docker introduction
PPTX
Code Coverage
PDF
CERN Data Centre Evolution
PPTX
Control Kubernetes Ingress and Egress Together with NGINX
PPTX
How to Move from Monitoring to Observability, On-Premises and in a Multi-Clou...
PDF
Percona Xtrabackup - Highly Efficient Backups
PDF
Oracle Clusterware Node Management and Voting Disks
PDF
Zynq ultrascale
PDF
Docker in real life
PPTX
Cassandra Data Modeling - Practical Considerations @ Netflix
PDF
Problems with PostgreSQL on Multi-core Systems with MultiTerabyte Data
PPTX
Ext4 write barrier
PDF
Kernel Recipes 2019 - Faster IO through io_uring
PDF
Marcel Hild - Spryker (e)commerce framework als Alternative zu traditioneller...
PDF
DevExForPlatformEngineers, introducing Kratix
PPTX
Autosar software component
Cloud Native Applications on OpenShift
Android Binder: Deep Dive
Platform Engineering: Manage your infrastructure using Kubernetes and Crossplane
Our answer to Uber
Docker introduction
Code Coverage
CERN Data Centre Evolution
Control Kubernetes Ingress and Egress Together with NGINX
How to Move from Monitoring to Observability, On-Premises and in a Multi-Clou...
Percona Xtrabackup - Highly Efficient Backups
Oracle Clusterware Node Management and Voting Disks
Zynq ultrascale
Docker in real life
Cassandra Data Modeling - Practical Considerations @ Netflix
Problems with PostgreSQL on Multi-core Systems with MultiTerabyte Data
Ext4 write barrier
Kernel Recipes 2019 - Faster IO through io_uring
Marcel Hild - Spryker (e)commerce framework als Alternative zu traditioneller...
DevExForPlatformEngineers, introducing Kratix
Autosar software component
Ad

Similar to I have come to bury the BIOS, not to open it: The need for holistic systems (20)

PDF
Prepare yourself to switch computing to Open Hardware Power Architecture
PDF
Beyond BIOS Developing with the Unified Extensible Firmware Interface Third E...
PDF
The Coming Firmware Revolution
PDF
Predicting the Present
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
A Reimplementation of NetBSD Based on a Microkernel by Andrew S. Tanenbaum
PDF
SFScon 21 - Roberto Innocenti - PPC64 Open Hardware Notebook prototype around...
PDF
Develop Your Own Operating Systems using Cheap ARM Boards
PDF
SFSCON24 - Roberto Innocenti - 2025 scenario on OpenISA OpenPower Open Hardwa...
PDF
Quick Boot A Guide for Embedded Firmware Developers 2nd edition Pete Dice
PPT
Developing a Windows CE OAL.ppt
PDF
Build an Open Hardware GNU/Linux PowerPC Notebook
PPT
Os concepts
PDF
Quick Boot A Guide for Embedded Firmware Developers 2nd Edition Pete Dice
PDF
Quick Boot A Guide for Embedded Firmware Developers 2nd Edition Pete Dice
PDF
Quick Boot A Guide for Embedded Firmware Developers 2nd Edition TEXT searchab...
PDF
The role of_open_source_firmware_in_risc-v
PDF
Beyond Bios Implementing the Unified Extensible Firmware Interface with Intel...
PDF
Making more informed Linux hardware Choices - Phoronix
PDF
OpenPOWER Acceleration of HPCC Systems
Prepare yourself to switch computing to Open Hardware Power Architecture
Beyond BIOS Developing with the Unified Extensible Firmware Interface Third E...
The Coming Firmware Revolution
Predicting the Present
Operating System & Kernel Study Guide-1 - converted.pdf
A Reimplementation of NetBSD Based on a Microkernel by Andrew S. Tanenbaum
SFScon 21 - Roberto Innocenti - PPC64 Open Hardware Notebook prototype around...
Develop Your Own Operating Systems using Cheap ARM Boards
SFSCON24 - Roberto Innocenti - 2025 scenario on OpenISA OpenPower Open Hardwa...
Quick Boot A Guide for Embedded Firmware Developers 2nd edition Pete Dice
Developing a Windows CE OAL.ppt
Build an Open Hardware GNU/Linux PowerPC Notebook
Os concepts
Quick Boot A Guide for Embedded Firmware Developers 2nd Edition Pete Dice
Quick Boot A Guide for Embedded Firmware Developers 2nd Edition Pete Dice
Quick Boot A Guide for Embedded Firmware Developers 2nd Edition TEXT searchab...
The role of_open_source_firmware_in_risc-v
Beyond Bios Implementing the Unified Extensible Firmware Interface with Intel...
Making more informed Linux hardware Choices - Phoronix
OpenPOWER Acceleration of HPCC Systems
Ad

More from bcantrill (20)

PDF
Sharpening the Axe: The Primacy of Toolmaking
PDF
Coming of Age: Developing young technologists without robbing them of their y...
PDF
Hardware/software Co-design: The Coming Golden Age
PDF
Tockilator: Deducing Tock execution flows from Ibex Verilator traces
PDF
No Moore Left to Give: Enterprise Computing After Moore's Law
PDF
Andreessen's Corollary: Ethical Dilemmas in Software Engineering
PDF
Visualizing Systems with Statemaps
PDF
Platform values, Rust, and the implications for system software
PDF
Is it time to rewrite the operating system in Rust?
PDF
dtrace.conf(16): DTrace state of the union
PDF
The Hurricane's Butterfly: Debugging pathologically performing systems
PDF
Papers We Love: ARC after dark
PDF
Principles of Technology Leadership
PDF
Zebras all the way down: The engineering challenges of the data path
PDF
Platform as reflection of values: Joyent, node.js, and beyond
PDF
Debugging under fire: Keeping your head when systems have lost their mind
PDF
Down Memory Lane: Two Decades with the Slab Allocator
PDF
The State of Cloud 2016: The whirlwind of creative destruction
PDF
Oral tradition in software engineering: Passing the craft across generations
PDF
The Container Revolution: Reflections after the first decade
Sharpening the Axe: The Primacy of Toolmaking
Coming of Age: Developing young technologists without robbing them of their y...
Hardware/software Co-design: The Coming Golden Age
Tockilator: Deducing Tock execution flows from Ibex Verilator traces
No Moore Left to Give: Enterprise Computing After Moore's Law
Andreessen's Corollary: Ethical Dilemmas in Software Engineering
Visualizing Systems with Statemaps
Platform values, Rust, and the implications for system software
Is it time to rewrite the operating system in Rust?
dtrace.conf(16): DTrace state of the union
The Hurricane's Butterfly: Debugging pathologically performing systems
Papers We Love: ARC after dark
Principles of Technology Leadership
Zebras all the way down: The engineering challenges of the data path
Platform as reflection of values: Joyent, node.js, and beyond
Debugging under fire: Keeping your head when systems have lost their mind
Down Memory Lane: Two Decades with the Slab Allocator
The State of Cloud 2016: The whirlwind of creative destruction
Oral tradition in software engineering: Passing the craft across generations
The Container Revolution: Reflections after the first decade

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Machine learning based COVID-19 study performance prediction
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Big Data Technologies - Introduction.pptx
Encapsulation theory and applications.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Weekly Chronicles - August'25 Week I
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Building Integrated photovoltaic BIPV_UPV.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Electronic commerce courselecture one. Pdf
Encapsulation_ Review paper, used for researhc scholars
Machine learning based COVID-19 study performance prediction
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Chapter 3 Spatial Domain Image Processing.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Review of recent advances in non-invasive hemoglobin estimation
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Digital-Transformation-Roadmap-for-Companies.pptx

I have come to bury the BIOS, not to open it: The need for holistic systems

  • 1. I have come to bury the BIOS, not to open it The need for holistic systems Bryan Cantrill Oxide Computer Company
  • 2. OXIDE In the beginning… • In the beginning, computing systems were holistic: hardware and software were designed together, to work with one another • System software was delivered with the computer – but often had to be newly developed for a new machine • Requiring new software for new hardware created schedule delays, viz. OS/360 and The Mythical Man Month • With the advent of Unix, system software became portable – it could be ported rather than developed de novo for each new computer…
  • 3. OXIDE Unix spreads – and feuds • The portability of Unix accelerated the minicomputer and workstation revolutions, with each manufacturer having its own variants • The systems of this era remained broadly holistic: the hardware and software were (broadly) designed with the other in mind • …but despite the original ethos of Unix, the variants themselves remained entirely proprietary – and the differences between them ignited the Unix Wars of the 1980s and 1990s
  • 4. OXIDE Elsewhere, homebrew computing • With the rise of the microcomputer, computing became much more broadly available in the 1970s – but nearly absurd variety with respect to hardware made software standardization challenging • The hardware-specific half of CP/M – the dominant microcomputer OS of the 1970 – was the Basic Input Output System, and could be delivered separately • This gave rise to hardware vendors delivering ROMs that contained platform enablement code roughly standardized as a “System BIOS”
  • 5. OXIDE The IBM PC era • With the emergence of the IBM PC – and its de facto standardization by Compaq – the system software/BIOS split became irreconcilable • Essential hardware enabling-software was driven into the BIOS • The BIOS interface became what system software bound to – it became the definition of “compatibility” • Worse, the software components on both sides of the BIOS/OS divide were nearly exclusively proprietary, serving to harden the boundary
  • 6. OXIDE It gets worse: SMM • In order to be able implement system software functionality delivered by the hardware – e.g., laptop suspend and resume – system management mode was invented • SMM allows effectively arbitrary, hidden code execution at arbitrary time without even allowing system software awareness • This is the opposite of a holistic system: it is one that has been deliberately and perniciously divided!
  • 7. OXIDE EFI/UEFI • All of this might have been fine had x86 remained relegated to personal computing… • …but Intel and AMD out-executed the RISC vendors in the 2000s, forcing PC constructs into the server space • Starting with (ill-fated) Itanium, Intel introduced EFI in an attempt to modernize…
  • 8. OXIDE UEFI: What might have been Source: Beyond BIOS: Developing with the Unified Extensible Firmware Interface
  • 9. OXIDE UEFI: What happened instead • While its goals were laudable, UEFI was overconstrained • In particular, the need for legacy and Windows compatibility required UEFI to support all past abstractions • UEFI has become the worst of all worlds: complicated, proprietary software that remains at once isolated from – yet also still entirely entangled with! – system software • UEFI has become so entangled with lowest-level platform enablement that non-UEFI platforms are effectively impossible
  • 10. OXIDE It gets worse, again: Hidden cores • A dividend of Moore’s Law: formerly discrete components were increasingly pulled first into large ASICs – and then pulled on-die into a system-on-a-chip • Especially as I/O was brought directly into the die, CPUs developed an increasing numbers of non-architectural cores to manage it • But these cores are hidden to system software – the operating system is being confined to an increasingly narrow slice of the true hardware capabilities of the system…
  • 11. OXIDE …which is not lost on everyone! Timothy Roscoe, OSDI 2021 Keynote, It's Time for Operating Systems to Rediscover Hardware
  • 12. OXIDE The battle for non-architectural cores • Roscoe (rightfully) calls this a “security catastrophe” • The non-architectural cores are – on x86 CPUs anyway – entirely proprietary, with all of its concomitant problems; that the system is “open source” is increasingly a myth • Roscoe correctly identifies the problem, but understates the severity: this isn’t a retreat of Linux – it is a resurgence of proprietary operating systems, wrapping themselves in firmware
  • 13. OXIDE Is an open source BIOS the answer? • An open source BIOS is certainly valuable and laudable – but if history is any guide, it is also not sustainable • The problem is not (merely) the proprietary BIOS – it is the ubiquity of the abstraction that splits our stack into open and proprietary halves • The presence of a deeply proprietary platform enablement layer allows for wildly complicated SoCs to have vast, undocumented elements – the implementation of the firmware has become the documentation! • We need a different model
  • 14. OXIDE The need for (a to return to) holistic systems • The platform enablement boundary as we know it today is largely vestigial – it serves to create abstractions that are broadly unnecessary • We need systems that obliterate these boundaries – that are rather holistic systems in which software and hardware are co-designed • Resetting system state over the course of booting is not holistic! • Holistic systems require us to be willing to take up Roscoe’s challenge and adopt SoC specificity in our operating systems
  • 15. OXIDE Oxide’s approach • At Oxide, we are taking a from-scratch, rack-scale approach to server-side computing, with AMD Milan-based sleds of our own design • We do not have a traditional BMC, but rather a fit-to-purpose service processor (an STM32H753) and RoT (LP55S28), both running our own (Rust-based, open source) OS, Hubris (see Cliff Biffle’s OSFC 2021 talk!) • Our approach is holistic but open • Could we develop a truly holistic system on x86?
  • 16. OXIDE Aside: AMD Details • On AMD, the Platform Security Processor (PSP) is a non-architectural core that executes proprietary software to perform system initialization – including DRAM training • System management controller (SP in our case) puts the PSP payload into SPI flash and brings the CPU out of reset • The PSP will perform its initialization and eventually vector into host software executing on the bootstrap core (BSC) • Historically, post-PSP initialization done by AMD’s AGESA firmware – which makes a holistic system impossible
  • 17. OXIDE Challenge #1: Initialization • To implement holistic boot, system software must perform the activities historically done by AGESA • Modern CPUs are very complicated! Post-PSP initialization includes configuring I/O interconnects, core complexes, etc. • For AMD Milan, this specifically includes DXIO engine configuration, NBIO PCIe strapping, hotplug configuration • The software that has implemented this level of initialization has historically been done by the CPU vendor; these interfaces are not always documented thoroughly – if at all!
  • 18. OXIDE Challenge #2: Boot Phasing • Payload that boots from PSP is size-constrained to ~13MB • Stage-based approaches (e.g., oreboot + LinuxBoot) use Linux drivers to load (and execute) a production kernel • This necessitates a pseudo-reset of the system – as well as the creation or emulation of an interface (e.g., ACPI) to pass system state to later stages • We instead adopt a phase-based approach whereby part of the system is loaded from SPI NOR and is able to load the remainder from SSDs – but the system is never discarded
  • 19. OXIDE Holistic booting! • Helios is our illumos derivative that includes the Oxide bhyve-based hypervisor – and runs our rack-wide control plane • We have holistic Helios booting on our EVT compute sleds, including all necessary functionality for platform initialization (I/O, SMP, etc.) • Phased boot has enough in SPI to be able to import ZFS pools from M.2 devices • Helios – along with all Oxide-authored software – will be open source when we ship our first racks at the end of the year!
  • 20. OXIDE Towards holistic systems • Holistic systems have clear advantages in terms of reliability, security, observability, manageability, sustainability, etc. • Based on our experience to date, holistic systems are challenging to implement but emphatically attainable • Documentation from microprocessor vendors is essential; they have much to gain by encouraging more software on their platforms! • Oxide may represent the first open, holistic server-side system in the post-PC x86 era – but unlikely to be the last!