The OpenBMC project can be described as a Linux distribution for embedded devices that have a BMC; typically, but not limited to, things like servers, top of rack switches or RAID appliances. The OpenBMC stack uses technologies such as Yocto, OpenEmbedded, systemd, and D-Bus to allow easy customization for your server platform.
Setting up your OpenBMC project
- Ubuntu 14.04
sudo apt-get install -y git build-essential libsdl1.2-dev texinfo gawk chrpath diffstat
- Fedora 28
sudo dnf install -y git patch diffstat texinfo chrpath SDL-devel bitbake \ rpcgen perl-Thread-Queue perl-bignum perl-Crypt-OpenSSL-Bignum sudo dnf groupinstall "C Development Tools and Libraries"
2) Download the source
git clone firstname.lastname@example.org:openbmc/openbmc.git cd openbmc
3) Target your hardware
Any build requires an environment variable known as
TEMPLATECONF to be set
to a hardware target.
You can see all of the known targets with
find meta-* -name local.conf.sample. Choose the hardware target and
then move to the next step. Additional examples can be found in the
As an example target Palmetto
. openbmc-env bitbake obmc-phosphor-image
Additional details can be found in the docs repository.
Build Validation and Testing
Commits submitted by members of the OpenBMC GitHub community are compiled and
tested via our Jenkins server. Commits are run
through two levels of testing. At the repository level the makefile
make check directive is run. At the system level, the commit is built into a
firmware image and run with an arm-softmmu QEMU model against a barrage of
Commits submitted by non-members do not automatically proceed through CI testing. After visual inspection of the commit, a CI run can be manually performed by the reviewer.
Support of additional hardware and software packages is always welcome. Please follow the contributing guidelines when making a submission. It is expected that contributions contain test cases.
Issues are managed on GitHub. It is recommended you search through the issues before opening a new one.
Features of OpenBMC
- Host management: Power, Cooling, LEDs, Inventory, Events, Watchdog
- Full IPMI 2.0 Compliance with DCMI
- Code Update Support for multiple BMC/BIOS images
- Web-based user interface
- REST interfaces
- D-Bus based interfaces
- SSH based SOL
- Remote KVM
- Hardware Simulation
- Automated Testing
Features In Progress
- OpenCompute Redfish Compliance
- User management
- Virtual media
- Verified Boot
Features Requested but need help
- OpenBMC performance monitoring
Finding out more
Dive deeper into OpenBMC by opening the docs repository.