|author||Andrew Geissler <firstname.lastname@example.org>||Fri Jan 27 16:03:57 2023 -0600|
|committer||Andrew Geissler <email@example.com>||Fri Jan 27 16:17:23 2023 -0600|
subtree updates:raspberrypi:arm:security: Jan 27 2023 meta-raspberrypi: 896566aa92..6c57b92708: Martin Jansa (2): pi-bluetooth: fix typo in Upstream-Status gstreamer1.0-omx: fix Upstream-Status format meta-arm: 5c42f084f7..3d51e1117d: Abdellatif El Khlifi (1): arm-bsp/u-boot: Corstone1000: bump to v2022.10 Anton Antonov (1): arm/kernel: Update ARM-FFA kernel drivers Daniel Díaz (1): arm-bsp/firmware-image-juno: Fix deployment of compressed Image Jon Mason (8): arm-bsp/juno: move to compressed initramfs image arm-bsp/juno: Update kernel patches to the latest arm-bsp/trusted-firmware-m: corstone1000: TFM file clean-ups arm/trusted-firmware-m: disable fatal warnings arm-toolchain: update Arm GCC to 12.2 external-arm-toolchain: Enable 12.2.rel1 support arm-bsp: add u-boot v2022.10 support arm-bsp: add u-boot v2022.10 support Peter Hoyes (8): arm/scp-firmware: Ensure CMAKE_BUILD_TYPE is capitalized arm/scp-firmware: Disable cppcheck arm: Add addpylib declaration arm/lib: Add XAUTHORITY to runfvp environment classes: Define FVP_ENV_PASSTHROUGH variable dependencies classes: Prevent passing None to the runfvp environment classes: Set ARMLMD_LICENSE_FILE in the runfvp environment arm: Use SRC* variables consistently Qi Feng (1): arm-bsp/fvp-baser-aemv8r64: Rebase u-boot patches onto v2022.10 Ross Burton (9): meta-*: mark layers as compatible with mickledore only arm-toolchain: remove obsolete oe_import CI: switch back to master CI: remove obsolete linux-yocto workarounds Revert "CI: revert a meta-clang change which breaks pixman (thus, xserver)" arm-bsp/fvp-base*: no need to remove rng-tools from openssh CI: pass --update and --force-checkout to kas in pending-updates job CI: use 'kas dump' instead of manually catting files CI: remove obsolete install Rui Miguel Silva (1): arm-bsp/u-boot: corstone500: bump to 2022.10 Theodore A. Roth (1): arm/optee-os: Fix FILESEXTRAPATHS meta-security: f991b20f56..3d9dab6d14: Chen Qi (1): openscap: add libpcre DEPEDNS to fix do_configure failure Markus Volk (1): bubblewrap: remove recipe Martin Jansa (1): layer.conf: update LAYERSERIES_COMPAT for mickledore Signed-off-by: Andrew Geissler <firstname.lastname@example.org> Change-Id: I5abd2487fbf395b33b1934ff90bd6d97c7953e6c
OpenBMC is a Linux distribution for management controllers used in devices such as servers, top of rack switches or RAID appliances. It uses Yocto, OpenEmbedded, systemd, and D-Bus to allow easy customization for your platform.
See the Yocto documentation for the latest requirements
sudo apt install git python3-distutils gcc g++ make file wget \ gawk diffstat bzip2 cpio chrpath zstd lz4 bzip2
sudo dnf install git python3 gcc g++ gawk which bzip2 chrpath cpio \ hostname file diffutils diffstat lz4 wget zstd rpcgen patch
git clone https://github.com/openbmc/openbmc cd openbmc
Any build requires an environment set up according to your hardware target. There is a special script in the root of this repository that can be used to configure the environment as needed. The script is called
setup and takes the name of your hardware target as an argument.
The script needs to be sourced while in the top directory of the OpenBMC repository clone, and, if run without arguments, will display the list of supported hardware targets, see the following example:
$ . setup <machine> [build_dir] Target machine must be specified. Use one of: bletchley mori s8036 dl360poc mtjade swift e3c246d4i mtmitchell tatlin-archive-x86 ethanolx nicole tiogapass evb-ast2500 olympus-nuvoton transformers evb-ast2600 on5263m5 vegman-n110 evb-npcm750 p10bmc vegman-rx20 f0b palmetto vegman-sx20 fp5280g2 qcom-dc-scm-v1 witherspoon g220a quanta-q71l witherspoon-tacoma gbs romed8hm3 x11spi greatlakes romulus yosemitev2 gsj s2600wf zaius kudo s6q lannister s7106
Once you know the target (e.g. romulus), source the
setup script as follows:
. setup romulus
Additional details can be found in the docs repository.
The OpenBMC community maintains a set of tutorials new users can go through to get up to speed on OpenBMC development out here
Commits submitted by members of the OpenBMC GitHub community are compiled and tested via our Jenkins server. Commits are run through two levels of testing. At the repository level the makefile
make check directive is run. At the system level, the commit is built into a firmware image and run with an arm-softmmu QEMU model against a barrage of CI tests.
Commits submitted by non-members do not automatically proceed through CI testing. After visual inspection of the commit, a CI run can be manually performed by the reviewer.
Support of additional hardware and software packages is always welcome. Please follow the contributing guidelines when making a submission. It is expected that contributions contain test cases.
Issues are managed on GitHub. It is recommended you search through the issues before opening a new one.
First, please do a search on the internet. There's a good chance your question has already been asked.
For technical discussions, please see contact info below for Discord and mailing list information. Please don't file an issue to ask a question. You'll get faster results by using the mailing list or Discord.
Dive deeper into OpenBMC by opening the docs repository.
The Technical Steering Committee (TSC) guides the project. Members are: