An open source service processor — built on OpenBMC and housed in the OCP DC-SCM form factor — providing out-of-band hardware management, hardware error logging, secure boot enforcement, and remote power control for POWER-class systems.
Enterprise POWER servers include a dedicated service processor — a management controller that runs continuously and independently of the host OS, handling power sequencing, hardware error logging, secure boot enforcement, and out-of-band console access. This firmware executes at the highest trust level in the server, below any hypervisor or operating system, and is the component most directly subject to emerging firmware auditability requirements under DORA, NIS2, and FFIEC.
The OpenFSP project delivers an open source service processor implementation for OpenPOWER hardware: built on the Linux Foundation's OpenBMC project, in the standardized OCP DC-SCM (Data Center Secure Control Module) form factor. OpenFSP gives POWER-class server operators full source-level visibility into the firmware executing below their OS — critical for regulated industries where supply chain transparency is a compliance requirement.
OpenFSP builds on existing work: OpenBMC already runs on POWER8 and POWER9 OpenPOWER hardware, and Raptor Computing Systems' Talos II uses a production variant of this approach. This project formalizes, extends, and productizes that foundation for POWER10/POWER11-class hardware in the OCP DC-SCM standard form factor.
A POWER-class service processor is not a simple BMC. OpenFSP is scoped to provide the following enterprise management functions:
The OCP DC-SCM (Data Center Secure Control Module) v2.0 specification defines a standardized, pluggable form factor for the management controller in a server. Rather than integrating the BMC directly onto the motherboard (as in traditional server designs), DC-SCM places it on a standardized module that can be independently replaced, upgraded, or sourced from multiple vendors.
For OpenFSP, the DC-SCM form factor provides three strategic advantages:
Upstream OpenBMC with POWER10-class hardware support. Redfish API, IPMI, and SSH interfaces. Power control, sensor monitoring, KVM console.
Integration layer between OPAL runtime firmware error reporting and OpenBMC event logging. Hardware error translation and structured logging.
Open source equivalent to IBM's Error Log Analysis (ELA). Correlates low-level hardware errors into structured service events with actionable guidance.
Root of trust implementation: measured boot from power-on through skiboot/OPAL. TPM 2.0 integration. Policy enforcement and attestation.
Redfish API surface designed for consumption by the OpenHMC management console (Project 02). Hardware event forwarding and partition control interface.
CPU power capping, fan curve management, thermal event response. Implements POWER platform power management specifications.
OpenFSP is not a fork — it is a focused extension and productization of upstream work:
The FSP executes at a privilege level below everything else in the server — below the OS, below the hypervisor, below even OPAL. For regulated industries, this creates a specific and pressing audit challenge: demonstrating to examiners that the firmware with the highest privilege in their infrastructure has been validated. IBM's closed FSP firmware cannot satisfy this requirement.
OpenFSP addresses this through:
OpenBMC running on OCP DC-SCM v2.0 hardware with POWER10 host support. Boot, power control, basic sensor monitoring. Month 6.
Hardware error forwarding from OPAL runtime to OpenBMC event log. Structured error records with field replaceable unit callouts. Month 10.
Open source ELA equivalent: error correlation, service event generation, and remediation guidance. Month 16.
TPM 2.0 measured boot from power-on through OPAL. Attestation API for integration with enterprise key management. Month 18.
Full Redfish API surface consumed by OpenHMC. Hardware event forwarding, partition control interface, firmware update coordination. Month 20.
Production-ready release: all subsystems integrated, third-party security audit complete, SBOM published, DC-SCM reference hardware BOM. Month 28.