Fact-checked by Grok 2 weeks ago

OpenBMC

OpenBMC is an open-source serving as a stack for baseboard controllers (BMCs), enabling remote monitoring, configuration, and control of systems such as servers, switches, and storage devices across heterogeneous environments including enterprise data centers, (HPC), , and cloud infrastructure. Developed initially by engineers during a 2014 hackathon, OpenBMC was rapidly prototyped as a basic BMC image and deployed in production on 's "Wedge" hardware within eight months, before being publicly released on on March 10, 2015, to foster an ecosystem for customizable system software. In 2018, OpenBMC transitioned to a Linux Foundation-hosted project, bringing together founding contributors including (now ), , , , and to standardize and expand the BMC firmware stack for broader and in open-source hardware management. This collaboration has driven ongoing development, with the project now supporting modern standards such as for API-based management and enabling custom extensions for power state monitoring and security in production deployments by organizations like (HPE) and . As of release 2.18 (May 2025), OpenBMC continues to evolve through community contributions, providing a flexible alternative to proprietary BMC solutions and promoting transparency in .

Background and Overview

Definition and Purpose

A baseboard management controller (BMC) is a specialized embedded on a server's that enables remote monitoring, management, and control of the hardware, providing access independent of the host CPU's operating system. This allows administrators to perform tasks such as , sensor readings for temperature and voltage, and updates even when the main system is powered off or unresponsive. OpenBMC is an open-source specifically designed as for BMCs in servers and related hardware, aiming to deliver a standardized and customizable software stack. Its primary purpose is to facilitate remote management across diverse environments, including servers, (HPC) clusters, , and cloud-scale data centers, by abstracting hardware differences through modular components. At its core, OpenBMC embodies principles of openness as a Foundation-hosted project, utilizing the for building tailored distributions that promote vendor-neutral without reliance on solutions. This approach addresses limitations of traditional BMC , such as restricted and interoperability issues, by enabling community-driven development for devices like servers, top-of-rack switches, and RAID appliances. The project's modularity supports layers, allowing easy adaptation to various platforms while maintaining a consistent management interface.

Role in Baseboard Management Controllers

OpenBMC functions as an open-source firmware stack specifically designed for Baseboard Management Controllers (BMCs), which are dedicated microcontrollers on motherboards responsible for hardware management. In this role, it manages critical BMC operations independently of the host CPU and operating system, including and control, real-time sensor monitoring for parameters like , voltage, and speeds, to capture system faults and alerts, and remote updates to maintain security and functionality. These capabilities are accessible via secure remote interfaces, ensuring administrators can oversee health without physical access or host involvement. Relative to proprietary BMC firmware, OpenBMC provides key advantages such as substantial cost reductions through software reusability across multiple hardware generations and vendors, thereby minimizing development expenses and timelines for original manufacturers. It also accelerates by leveraging community-driven contributions from diverse stakeholders, including providers and integrators, which enable rapid enhancements and bug resolutions. Furthermore, its promotes by aligning with industry standards for management protocols, allowing seamless integration in multi-vendor environments like data centers and clusters. OpenBMC supports dual-host configurations, where the BMC runs on its own processor alongside the primary host CPU, facilitating continuous management tasks even during host downtime or OS failures. This setup enables reliable remote access methods, such as , for tasks like diagnostics and control without requiring the host operating system to be operational, thus enhancing system availability in enterprise and cloud infrastructures. A core aspect of OpenBMC's BMC integration is its use of layers that decouple application logic from hardware-specific drivers, permitting the to adapt efficiently to varied silicon ecosystems. For instance, it accommodates baseboard controllers from vendors like ASPEED, with its AST2500 series providing extensive GPIO and I2C interfaces for monitoring, as well as NXP, ensuring broad compatibility across server designs without extensive custom coding. This modular approach supports heterogeneous deployments in sectors ranging from telecommunications to .

History and Development

Origins and Founding

OpenBMC originated from a 2014 at , where engineers Kevin Lahey, Sai Dasari, Aaron Miller, Adam Simpkins, and Tian Fang developed a prototype open-source baseboard management controller (BMC) stack in just 24 hours. This effort addressed the limitations of proprietary prevalent in hyperscale data centers, which often locked users into vendor-specific solutions like IPMI, hindering scalability, security, and customization. By creating an open alternative, the initiative aimed to enable faster development cycles, improved reliability, and reduced costs through a shared, modular Linux-based framework. The project was publicly announced and open-sourced by Facebook in March 2015 as a complete Linux distribution built on the Yocto Project, initially deployed in production with the company's Wedge top-of-rack switch just eight months after the hackathon. Early development focused on layering—common packages, SoC-specific support (e.g., from Aspeed for AST2300/AST2400), and board-specific configurations—to support heterogeneous hardware while treating the BMC as a standard server. Hosted initially under the Open Compute Project (OCP) as part of Facebook's contributions to open data center designs, OpenBMC emphasized interoperability and community-driven evolution. In , Facebook released OpenBMC version 1.0, incorporating initial code contributions for the Wedge100 BMC, which extended the Yocto-based distribution to support the newer 100GbE switch design accepted into that year. This milestone solidified the project's foundation for broader hardware applicability in large-scale environments. By 2018, to foster wider and collaboration, OpenBMC transitioned to a full project, initiated by Facebook (now ), , , , and , with contributing its codebase as the base stack. The move aimed to break down proprietary silos in BMC , promoting a unified open-source alternative for hyperscale operators seeking scalable management without .

Key Milestones and Releases

OpenBMC's development began with initial tagged releases in late 2015, marking the project's early efforts to establish a Linux-based stack for management controllers (BMCs). The first release, tagged v0.2 on December 4, 2015, introduced basic features such as CPU thermal sensors and controls. Subsequent releases through 2016, including v1.0 on June 20, 2016, focused on stabilizing core functionalities like IPMI enhancements, host boot options, and kernel updates to version 4.4.12. In 2017, OpenBMC achieved its first stable release milestone with incremental improvements in inventory management and network stability, building toward broader vendor integration. By 2018, following its transition to a project, adoption expanded among vendors, with presentations at the OCP Regional Summit highlighting implementations in infrastructure like Yahoo! JAPAN's systems and contributions from multiple hardware providers. In 2020, the project enhanced support, including updated schemas for managers and security policies in the bmcweb component. The release cycle formalized with stable branches commencing in the 2.6 version on February 4, 2019, establishing biannual updates aligned with timelines and introducing features like GUI enhancements, , and partial compliance. This structure continued, with version 2.7 in August 2019 adding KVM over IP and NVMe-MI support. By 2022, a key security milestone was achieved with the implementation of measured boot compliant with Trusted Computing Group (TCG) standards for the Server Management Domain Firmware Protocol, enabling TPM-based integrity verification during BMC . In 2024, updates to the bmcweb webserver improved Redfish scalability, incorporating over 515 commits in September alone to bolster schema compliance and performance for large-scale deployments. The latest stable release, 2.18.0 in May 2025, enhanced security features including refined access controls and expanded ARM64 architecture support, alongside contributions for additional motherboard ports from vendors like AMD, Intel, and Ampere. In October 2025, American Megatrends Inc. (AMI) announced an expansion of OpenBMC support for Open Compute Project (OCP) platforms, synchronizing the codebase with OCP-accepted hardware to accelerate open-source adoption in data centers. By early 2025, the OpenBMC repository reflected significant community growth, with over 900 forks and contributions from more than 72 companies, underscoring its evolution into a collaborative for BMC . As of November 2025, no further major releases have been announced, with ongoing community contributions continuing to drive development.

Technical Architecture

Core Components and Stack

OpenBMC is built as a Linux-based tailored for baseboard management controllers (BMCs), utilizing the and build system to enable recipe-based construction of customized firmware images. The core of this distribution incorporates a from the 6.x series, providing essential drivers for hardware interfaces such as I2C, GPIO, and sensors, while ensuring compatibility with embedded constraints like limited memory and processing power. This foundation allows OpenBMC to manage low-level system operations efficiently, with the kernel configured through layered recipes that support board-specific adaptations without altering upstream code. At the heart of OpenBMC's runtime stack lies the project, which delivers a suite of D-Bus-based services for and system management. Key elements include the entity-manager, responsible for runtime discovery and inventory of hardware components via JSON-driven configuration files that map physical devices to objects. Complementing this, the settings component ensures configuration persistence across BMC reboots by managing user-defined parameters, such as network or service states, through dedicated interfaces. These services form a cohesive framework that abstracts hardware interactions, enabling modular extensions for diverse BMC use cases. The architecture emphasizes through a layered design, primarily via the meta-phosphor layer, which houses OpenBMC-specific recipes for services, kernel modules, and utilities. Board support is handled by meta-openbmc-bsp, providing packages like phosphor-hw for GPIO, fan control, and sensor monitoring tailored to specific SoCs such as Aspeed AST2500. This separation allows developers to override or extend components without rebuilding the entire stack, fostering reusability across heterogeneous systems. Service orchestration in OpenBMC relies on , which manages startup sequences, dependencies, and targets—such as [email protected] for coordinating power-on events—ensuring reliable initialization of services and hardware drivers. Networking is designed with -native support to align with modern requirements, integrating D-Bus-based configuration for interfaces and routing via the network manager. This focus on facilitates scalable, secure connectivity in large-scale deployments.

Build System and Customization

OpenBMC employs the as its primary build system, enabling the creation of customized distributions for baseboard management controllers (BMCs). The provides templates, tools, and methods to facilitate system development, with OpenBMC leveraging its modular structure to integrate hardware-specific components. BitBake serves as the task executor within this framework, parsing recipes and dependencies to compile software packages, such as running bitbake -c cleansstate ${PACKAGE} to manage build caches or bitbake -g obmc-phosphor-image for generating dependency graphs. The build process begins with cloning the meta-openbmc repositories from , which house the core layers like meta-phosphor and meta-openbmc-bsp. Developers then select a , such as those for the ASPEED AST2500 in conf/machine/*.conf, to target specific platforms like or . The primary build command, bitbake obmc-phosphor-image, assembles the image, incorporating layers for the , , and management services; this process requires substantial resources, including at least 100 GB of disk space and high CPU/memory, with initial builds taking several hours but subsequent ones benefiting from cached artifacts. Customization is achieved through Yocto's layer-based modularity, allowing developers to extend functionality without altering core components. For instance, new meta-layers can be created to include drivers by copying existing structures like meta-ibm/meta-romulus and appending kernel configurations via .bbappend files, such as linux-aspeed_%.bbappend for device-specific tweaks. Custom recipes for hardware elements, like sensors on I2C buses, are added in directories such as recipes-phosphor/sensors, often referencing device tree overlays (e.g., aspeed-bmc-opp-romulus.dts) to define peripherals. Image signing for secure boot is supported by generating signed firmware images with private keys, burning public keys into BMC OTP memory, and enabling secure jumpers to verify integrity during updates. Third-party IPMI tools can be integrated by implementing custom command handlers in the phosphor-ipmi-flash layer, extending platform management capabilities. OpenBMC supports cross-compilation for architectures including (e.g., via arm-openbmc-linux-gnueabi-gcc) and PowerPC, aligning with common BMC hardware like ASPEED chips and OpenPOWER systems. The Yocto toolchain includes , a web-based for configuring and monitoring builds, streamlining layer management and recipe testing without command-line dependency. As of OpenBMC release 2.18 in May 2025, the project continues to incorporate recent advancements for improved hardware support and security.

Features and Capabilities

Management Interfaces

OpenBMC provides a range of management interfaces to enable of baseboard management controllers (BMCs), emphasizing interoperability through standardized protocols. The primary interface is the API, a RESTful developed by the DMTF for BMC management, implemented via the bmcweb . This supports querying and controlling resources such as chassis, systems, and managers using payloads over on port 443. OpenBMC incorporates schema extensions for platform-specific resources, including fan control via the resource (e.g., members with Reading and thresholds properties) and power capping through the Power resource (e.g., PowerControl with PowerConsumedWatts metrics). For legacy compatibility, OpenBMC supports IPMI 2.0, facilitated by the OpenIPMI kernel driver and user-space components like phosphor-net-ipmid for network access over port 623 using RMCP+ and phosphor-host-ipmid for in-band host communication. This allows traditional IPMI commands for tasks like sensor monitoring and power control, bridging older management tools with modern systems. Web-based access is handled by the bmcweb server, which serves a graphical user interface (GUI), endpoints, KVM over IP, and virtual media redirection over (port 443), with HTTP (port 80) disabled by default for security. Authentication for bmcweb includes support for LDAP integration with or servers, as well as OAuth 2.0 via external account providers defined in the AccountService schema. Additional protocols enhance remote console and network management capabilities. SSH access is provided via the Dropbear server on port 22 for sessions and port 2200 for host console redirection. SNMP support, through the phosphor-snmp project, enables trap notifications to configured managers for event reporting, with subagent integration to net-snmp for querying resources like sensors and inventory. (SOL) is available via IPMI over port 623 or SSH on port 2200, allowing remote serial console access to the host. All interfaces are managed as services, permitting selective enabling or disabling.

Monitoring and Security Features

OpenBMC provides robust monitoring capabilities through its sensor framework, which enables the collection of metrics such as temperature, voltage levels, and fan RPM. The phosphor-hwmon component interfaces with sensors to periodically read and update these values via , ensuring real-time tracking of system health parameters. Complementing this, the phosphor-fan-presence application specifically handles fan monitoring and control, detecting presence and adjusting speeds based on thermal needs. Event logging in OpenBMC is managed by the phosphor-logging libraries, which facilitate structured logging of system events to the systemd-journald service. These logs can be filtered and created using YAML-defined event schemas, with interfaces exposed over for querying and management. Integration with syslog is achieved through , allowing logs to be forwarded to remote servers for centralized analysis and archival. For alerting, OpenBMC supports threshold-based notifications through event services, where subscribers can receive updates on sensor exceedances or system faults. This includes integration with SNMP traps via the EventDestination resource, enabling configuration of SNMP managers to receive alerts on events like hardware errors. On the security front, OpenBMC implements measured boot to verify integrity during startup, achieving compliance with the Trusted Computing Group (TCG) Server Management Domain Profile Specification since the 2022 design implementation. This process uses a TPM 2.0 module, connected via or I2C, to measure and store boot components—such as U-Boot SPL, U-Boot, and the —into Platform Configuration Registers (PCRs) for tamper detection. attestation is supported through these measurements, allowing remote verification of the boot chain's authenticity. Role-based access control (RBAC) is enforced in the bmcweb component, which handles API requests and assigns privileges such as "Operator" to restrict actions like network configuration based on user roles. Secure update mechanisms further protect the system by requiring signature validation of images before flashing, using tools in phosphor-ipmi-flash to verify and prevent unauthorized modifications.

Adoption and

Supported Systems and Hardware

OpenBMC has been adopted across a diverse array of hardware platforms, primarily in hyperscale data centers, (HPC), and enterprise servers, with support for numerous board-specific configurations. As of the OpenBMC 2.18 release in May 2025, the project upstreamed ports for additional reference motherboards from vendors including , , and , alongside various server platforms, expanding its compatibility to over 70 distinct machine targets documented in the project's metadata layers. Prominent early adopters include (formerly ), which developed OpenBMC for its Wedge series of top-of-rack switches and related OCP-compliant designs such as Yosemite V3, , and Minipack platforms; these systems leverage OpenBMC for flexible BMC firmware in disaggregated . deploys OpenBMC in custom HPC nodes and server platforms, integrating it with in-band management functions for thermal, power, and debug capabilities in large-scale cloud environments. incorporates OpenBMC as the standard BMC firmware for its Power Systems servers, including models like Witherspoon, , and , enabling system service management, monitoring, and control on and later architectures. Hardware vendor support centers on common BMC system-on-chips (SoCs), with robust integration for ASPEED's AST26xx series, including the AST2500 and AST2600 evaluation boards (EVBs) as well as production deployments in servers like those using the qcom-bmc-ast2600 configuration; these SoCs provide the embedded /A35 processors essential for OpenBMC's Linux-based stack. NXP's Layerscape processors, particularly in i.MX-based BMC solutions from partners like SolidRun, enable OpenBMC on ARM64 platforms for secure boot and in industrial and edge devices. In 2025, Inc. (AMI) accelerated OpenBMC adoption through its MegaRAC Community Edition, providing pre-integrated firmware for OCP-accepted servers, which facilitates faster time-to-market for open hardware solutions via the . This ecosystem spans more than 70 core variants, encompassing rackmount servers, edge AI appliances, and storage systems, primarily on ARM64 architectures with emerging x86 support for broader compatibility. OpenBMC powers baseboard management controllers (BMCs) in numerous (OCP) reference designs, such as Mt. Olympus and Yosemite series, ensuring interoperability through certifications for DMTF standards like for RESTful management interfaces. These implementations allow for tailored board support packages (BSPs) that can be customized for specific hardware constraints, as detailed in the project's build system documentation.

Contributors and Community Involvement

OpenBMC operates under the auspices of the , which provides overarching governance and support for the project as a collaborative open-source initiative. The Technical Steering Committee (TSC) holds primary responsibility for technical oversight, including directing project development, approving sub-projects, and establishing community workflows and norms to foster consensus-based decision-making. Voting membership on the TSC is drawn from active committers, with current representatives including Benjamin Fair from , Patrick Williams from , Roxanne Clarke from , Sagar Dharia from , Samer El-Haj-Mahmoud from , and Terry Duncan from . The OpenBMC community encompasses contributions from numerous companies, reflecting broad industry participation that builds on the project's founding by , (now ), , , and . Prominent ongoing contributors include , , , , and , while recent 2025 developments have seen expanded involvement from AMI, which accelerated its OpenBMC adoption through open-source solutions via the Marketplace, and Eclypsium, which has advanced security practices through vulnerability research and best-practices guidance for BMC implementations. Community roles are clearly defined to promote inclusivity, with maintainers leading specific repositories and ensuring code quality, reviewers offering feedback on proposed changes via the OWNERS files, and committers submitting patches for integration. Contributions are primarily managed through repositories and the Gerrit code review system, where developers push changes for atomic, well-documented patches that include sign-offs and testing notes. New participants can engage via accessible entry points such as "bitesize" issues labeled for beginners, s on Gerrit, and discussions on the OpenBMC server or mailing lists to collaborate on enhancements. The project encourages diverse involvement beyond coding, including documentation improvements and testing, with community gatherings at summits providing opportunities for workshops, knowledge sharing, and strategic planning.

References

  1. [1]
    OpenBMC: Home
    The OpenBMC Project community is supporting an open source BMC firmware stack that will work across heterogeneous systems.
  2. [2]
    OpenBMC Distribution - GitHub
    OpenBMC is a Linux distribution for management controllers used in devices such as servers, top of rack switches or RAID appliances.OpenBMC · Openbmc/docs · Openbmc-test-automation · OpenBMC version 2.18.0
  3. [3]
    Introducing “OpenBMC”: an open software framework for next ...
    Mar 10, 2015 · OpenBMC is designed as a complete Linux distribution, with flexibility to be customized to support different BMC SoC or boards.
  4. [4]
    Linux Foundation Announces OpenBMC Project To Create Open ...
    Mar 19, 2018 · Michael Larabel is the principal author of Phoronix.com and founded the site in 2004 with a focus on enriching the Linux hardware experience.
  5. [5]
    [PDF] OpenBMC: State of Development - Open Compute Project
    ○ https://github.com/openbmc. ○ OpenBMC has a project charter. ○ OpenBMC is now a Linux Foundation project. ○ OpenBMC has a Technical Steering Committee.Missing: founding | Show results with:founding
  6. [6]
    OpenBMC enablement on HPE ProLiant servers | HPE
    Take control of compute security and manageability with industry-leading HPE ProLiant servers and OpenBMC implementation, designed with service providers ...
  7. [7]
    Is this thing on? Using OpenBMC and ACPI power states for reliable ...
    Oct 22, 2024 · In this blog post, we are going to describe how we customized and extended the OpenBMC firmware to better monitor our servers' boot-up processes.
  8. [8]
  9. [9]
    What is a baseboard management controller (BMC)? - TechTarget
    Jan 11, 2024 · A baseboard management controller (BMC) is a specialized service processor that remotely monitors the physical state of a host system.
  10. [10]
    Opening up the Baseboard Management Controller - ACM Queue
    Jan 6, 2020 · If the CPU is the brain of the board, the BMC is the brain stem. It monitors and manages the physical state of a computer or hardware device.
  11. [11]
    OpenBMC, a distribution for baseboard management controllers
    Apr 12, 2016 · OpenBMC, a Linux distribution designed to replace proprietary IPMI implementations with an open-source alternative built around standard facilities like SSH.
  12. [12]
    Growing the Wedge/Wedge 100 community - Engineering at Meta
    Jun 16, 2016 · We see a huge opportunity for developers in this open and disaggregated networking ecosystem. And specifically, we can see it growing on Wedge and Wedge 100.
  13. [13]
  14. [14]
    OpenBMC Release Notes
    ### OpenBMC Release Summary
  15. [15]
    2018 OCP Regional Summit - Open Compute Project
    Oct 1, 2018 · Adoption of OCP Solutions in Yahoo! JAPAN's Infrastructure, Kazuhide ... OpenBMC Status Update, James Mihm; Sai Dasari, Video · Slides.
  16. [16]
    Violations: /redfish/v1/Managers/bmc/Truststore/Certificates #119
    Feb 21, 2020 · But SecurityPolicy is introduced in Manager v1.16+, now bmcweb is still using Manager v1.14, a schema verison bump is needed.
  17. [17]
    OpenBMC 2.18 Released With Many More Motherboard Ports ...
    OpenBMC 2.18 released on Friday as the newest version of this Linux Foundation project providing an open-source baseboard management controller (BMC) firmware ...Missing: 2.18.0 security ARM64
  18. [18]
    AMI Expands Support to Open-source Ecosystem and Accelerates ...
    Oct 13, 2025 · AMI Expands Support to Open-source Ecosystem and Accelerates OpenBMC Adoption October 13, 2025; MegaRAC OneTree Community Edition 2.1 Achieves ...
  19. [19]
    [PDF] OpenBMC Security in Practice | Eclypsium
    Utilizing a vendor's version of OpenBMC allows for easier update management as it offloads a degree of asset management when it comes to the SBOMs associated ...
  20. [20]
    OpenBMC overview - IBM Developer
    Jun 15, 2020 · OpenBMC is a free open source software management Linux distribution that is designed for the embedded environment.
  21. [21]
  22. [22]
    openbmc/phosphor-dbus-interfaces: YAML descriptors of ... - GitHub
    Before defining a new D-Bus interface or modifying an existing one, please read through the documented set of the common requirements and expectations. Building.
  23. [23]
    openbmc/entity-manager: Run-time JSON driven system ... - GitHub
    Entity manager shall support the dynamic discovery of hardware at runtime, using inventory interfaces. The types of devices include, but are not limited to ...
  24. [24]
    Yocto in OpenBMC
    ### Summary of Yocto Integration in OpenBMC
  25. [25]
    Add a New System to OpenBMC
    ### Summary of Building OpenBMC and Related Configurations
  26. [26]
  27. [27]
    Customize IPMI commands in OpenBMC - Arm Learning Paths
    With the host console accessible through OpenBMC, you can extend platform management by implementing a custom IPMI command handler. The Intelligent Platform ...Missing: signing | Show results with:signing
  28. [28]
    Toaster User Manual - the Yocto Project Documentation
    Toaster is a web interface to the Yocto Project's OpenEmbedded build system. The interface enables you to configure and run your builds.
  29. [29]
    OpenBMC interfaces
    ### Summary of OpenBMC's Use of Phosphor, D-Bus-based Services, Entity-Manager, Settings, Modularity
  30. [30]
    Redfish
    ### Summary of Supported Redfish Schemas, Versions, and Extensions in OpenBMC (as of 2025)
  31. [31]
  32. [32]
    9. User management — BMC User Guide - Graphcore Documents
    OpenBMC supports LDAP integration to both OpenLDAP and Active Directory servers. You can set the LDAP configuration by using the busctl commands described in ...
  33. [33]
    Provides presence detection, monitoring, and control of physical fans.
    The phosphor-fan-presence repository provides a set of thermal related applications that control and monitor the cooling of a system using fans.
  34. [34]
  35. [35]
  36. [36]
    Redfish: Implement SNMP Trap (38599) - Gerrit Code Review
    Redfish: Implement SNMP Trap Implement SNMPTrap in EventDestination of Redfish. We can use this Redfish interface to add/get/delete the SNMPTrap port and ...
  37. [37]
    Redfish: Implement SNMP Alerts/Traps - ibm-openbmc/dev - GitHub
    Dec 13, 2018 · EventDestination = Allow destinations to receive events via SNMP trap. I believe this is how we will add a SNMP Manager. ManagerAccount ...
  38. [38]
    Measured boot of BMC
    ### Summary of OpenBMC Measured Boot Design
  39. [39]
    Operator" Privilege Role Allowed to Configure Network Settings #284
    Jul 23, 2024 · Bug Description. The "operator" privilege role is currently allowed to configure network settings. This behavior is unexpected as network ...
  40. [40]
    None
    ### Extracted List of Supported Machines and Platforms
  41. [41]
    [PDF] Facebook OpenBMC Updates - Open Compute Project
    Updating OpenBMC. • Improved resilience and speed. • Improved unit test coverage. • More prerequisite checks. • More nohup. • Less back-and-forth over SSH.Missing: Lighthouse | Show results with:Lighthouse
  42. [42]
    [PDF] OpenBMC in Google Platforms - Open Compute Project
    Move some management functions off to a small microcontroller: ○ in-band telemetry: thermal, power. ○ In-band debug functions.
  43. [43]
    openbmc/meta-ibm - GitHub
    Mar 31, 2022 · OpenEmbedded/Yocto/OpenBMC BSP layer for IBM systems. This layer provides support for the BMC firmware on IBM POWER systems server products.
  44. [44]
    AST2600 - ASPEED Technology
    AST2600 is ASPEED's 7th generation Server Management Processor, and also the world's first BMC SoC adopting 28nm advanced process technology.AST2700 · AST2620 · 遠端伺服器管理晶片Missing: NXP Layerscape
  45. [45]
    OpenBMC Solutions : i.MX 8 & i.MX 9 Series SOCs - SolidRun
    Utilizing NXP Semiconductor's SoCs allows SolidRun's BMC solutions to support Secure Boot (a feature of NXP's applications processors) and makes it possible ...
  46. [46]
    AMI Expands Support to Open-source Ecosystem and Accelerates ...
    Oct 8, 2025 · “AMI's enablement of a consistent OpenBMC foundation directly supports OCP's mission and our Community to deliver fast TTM Hardware Solutions ...
  47. [47]
    [PDF] OpenBMC Support for Redfish - DMTF
    Nov 4, 2024 · • Open-source project founded in 2014/2015. • 2018 became a Linux Foundation project. • Linux distribution for management controllers such as ...
  48. [48]
    [PDF] Technical Charter (the “Charter”) for OpenBMC Project a Series of ...
    Feb 14, 2018 · Technical Steering Committee a. The Technical Steering Committee (the “TSC”) will be responsible for all oversight of the open source Project.Missing: governance | Show results with:governance
  49. [49]
    Contributing to OpenBMC
    ### Contribution Process, Roles, and Getting Involved in OpenBMC