commit | 9347dd4efc156c93b1d9beaeb32e9b719ad6a3d2 | [log] [tgz] |
---|---|---|
author | Andrew Geissler <geissonator@yahoo.com> | Fri Mar 03 12:38:41 2023 -0600 |
committer | Patrick Williams <patrick@stwcx.xyz> | Thu Mar 16 22:00:33 2023 +0000 |
tree | 00c3e91a451670569716e087a5df52de1e838c21 | |
parent | a2acbee53923f9aa6d5f914b6d7cc7a80da2cea9 [diff] |
subtree updates: raspberrypi security arm meta-raspberrypi: e43af1e3a6..e15b876155: Florian Frank (1): linux-firmware-rpidistro: Fix wireless on model 3B and Zero W Khem Raj (1): linux-raspberrypi_5.15.bb: Upgrade to 5.15.92 Martin Jansa (1): gstreamer1.0-plugins-good: rename bbappend, drop version meta-arm: dc10b73cc5..eb9c47a4e1: Gowtham Suresh Kumar (6): arm/edk2-basetools: Add edk2 base tool native recipe arm-bsp/uefi_capsule: Add UEFI capsule generation class arm-bsp/corstone1000-image: Generate UEFI capsule for corstone1000 platform arm/edk2-basetools: Convert edk2 basetools recipes to native only arm-bsp/uefi_capsule: Use json file to pass capsule config arm/uefi_capsule: Move UEFI capsule to IMGDEPLOYDIR Jon Mason (5): arm/boot-wrapper-aarch64: update to a newer SHA arm/gn: update to a more recent SHA arm/opencsd: update to v1.4.0 arm/trusted-firmware-a: update version and relocate fiptool arm/sbsa-acs: update to v6.1.0 Mohamed Omar Asaker (5): arm-bsp/trusted-services: corstone1000:Align psa crypto client with TF-Mv1.7 arm-bsp/trusted-services:corstone1000: disable obsolete algorithms for crypto arm-bsp/trusted-services: corstone1000: Disable SHA512/384 arm-bsp/trusted-firmware-m:corstone1000: Increase number of assets arm-bsp/trusted-firmware-m:corstone1000: Set SPM backend to IPC Peter Hoyes (11): arm,arm-bsp/classes: Move wic_nopt to meta-arm arm-bsp/classes: Use :append to add to IMAGE_TYPES in wic_nopt CI: Factor out CACHE_DIR to improve mirror configurability CI: Collect testimage logs on failure arm/trusted-firmware-m: Synchronize with 1.7.0 release arm/classes: Factor out image signing arguments in tfm_image_sign arm/trusted-firmware-m: Create common inc file for src definitions arm/trusted-firmware-m: Create inc file for common config arm/trusted-firmware-m-scripts: Create inc file for common config arm/classes: Add sstate support to tfm_sign_images CI: Add BUILD_ENABLE_REGEX option to conditionally enable builds Ross Burton (8): arm-bsp/external-system: fix the gen_module race, again arm-bsp/linux-yocto: add 5.19 kernel recipe for N1SDP arm/linux-yocto: remove obsolete 5.19 bbappend arm/trusted-firmware-m: Do not use release branches arm/boot-wrapper-aarch64: tell upgrade checker to look for new SHAs CI/machine-summary: add missing recipes arm-toolchain/gcc-arm: add missing Signed-off-by tag arm/optee-os: add missing patch header meta-security: 3529cfb43e..c06b9a18a6: Maciej Borzęcki (1): dm-verity-img.bbclass: add squashfs images Petr Gotthard (4): tpm2-tss: upgrade 3.2.0 -> 4.0.1 tpm2-tools: upgrade 5.3 -> 5.5 tpm2-pkcs11: upgrade 1.8.0 -> 1.9.0 tpm2-abrmd: upgrade 2.4.1 -> 3.0.0 Signed-off-by: Andrew Geissler <geissonator@yahoo.com> Change-Id: I0e1629b2f70ad1e5f7b97f5ae6d768bde101cc6f
OpenBMC is a Linux distribution for management controllers used in devices such as servers, top of rack switches or RAID appliances. It uses Yocto, OpenEmbedded, systemd, and D-Bus to allow easy customization for your platform.
See the Yocto documentation for the latest requirements
sudo apt install git python3-distutils gcc g++ make file wget \ gawk diffstat bzip2 cpio chrpath zstd lz4 bzip2
sudo dnf install git python3 gcc g++ gawk which bzip2 chrpath cpio \ hostname file diffutils diffstat lz4 wget zstd rpcgen patch
git clone https://github.com/openbmc/openbmc cd openbmc
Any build requires an environment set up according to your hardware target. There is a special script in the root of this repository that can be used to configure the environment as needed. The script is called setup
and takes the name of your hardware target as an argument.
The script needs to be sourced while in the top directory of the OpenBMC repository clone, and, if run without arguments, will display the list of supported hardware targets, see the following example:
$ . setup <machine> [build_dir] Target machine must be specified. Use one of: bletchley mori s8036 dl360poc mtjade swift e3c246d4i mtmitchell tatlin-archive-x86 ethanolx nicole tiogapass evb-ast2500 olympus-nuvoton transformers evb-ast2600 on5263m5 vegman-n110 evb-npcm750 p10bmc vegman-rx20 f0b palmetto vegman-sx20 fp5280g2 qcom-dc-scm-v1 witherspoon g220a quanta-q71l witherspoon-tacoma gbs romed8hm3 x11spi greatlakes romulus yosemitev2 gsj s2600wf zaius kudo s6q lannister s7106
Once you know the target (e.g. romulus), source the setup
script as follows:
. setup romulus
bitbake obmc-phosphor-image
Additional details can be found in the docs repository.
The OpenBMC community maintains a set of tutorials new users can go through to get up to speed on OpenBMC development out here
Commits submitted by members of the OpenBMC GitHub community are compiled and tested via our Jenkins server. Commits are run through two levels of testing. At the repository level the makefile make check
directive is run. At the system level, the commit is built into a firmware image and run with an arm-softmmu QEMU model against a barrage of CI tests.
Commits submitted by non-members do not automatically proceed through CI testing. After visual inspection of the commit, a CI run can be manually performed by the reviewer.
Automated testing against the QEMU model along with supported systems are performed. The OpenBMC project uses the Robot Framework for all automation. Our complete test repository can be found here.
Support of additional hardware and software packages is always welcome. Please follow the contributing guidelines when making a submission. It is expected that contributions contain test cases.
Issues are managed on GitHub. It is recommended you search through the issues before opening a new one.
First, please do a search on the internet. There's a good chance your question has already been asked.
For general questions, please use the openbmc tag on Stack Overflow. Please review the discussion on Stack Overflow licensing before posting any code.
For technical discussions, please see contact info below for Discord and mailing list information. Please don't file an issue to ask a question. You'll get faster results by using the mailing list or Discord.
This is a common question, particularly regarding boards from popular COTS (commercial off-the-shelf) vendors such as Supermicro and ASRock. You can see the list of supported boards by running . setup
(with no further arguments) in the root of the OpenBMC source tree. Most of the platforms supported by OpenBMC are specialized servers operated by companies running large datacenters, but some more generic COTS servers are supported to varying degrees.
If your motherboard is not listed in the output of . setup
it is not currently supported. Porting OpenBMC to a new platform is a non-trivial undertaking, ideally done with the assistance of schematics and other documentation from the manufacturer (it is not completely infeasible to take on a porting effort without documentation via reverse engineering, but it is considerably more difficult, and probably involves a greater risk of hardware damage).
However, even if your motherboard is among those listed in the output of . setup
, there are two significant caveats to bear in mind. First, not all ports are equally mature -- some platforms are better supported than others, and functionality on some "supported" boards may be fairly limited. Second, support for a motherboard is not the same as support for a complete system -- in particular, fan control is critically dependent on not just the motherboard but also the fans connected to it and the chassis that the board and fans are housed in, both of which can vary dramatically between systems using the same board model. So while you may be able to compile and install an OpenBMC build on your system and get some basic functionality, rough edges (such as your cooling fans running continuously at full throttle) are likely.
Dive deeper into OpenBMC by opening the docs repository.
The Technical Steering Committee (TSC) guides the project. Members are: