commit | 0408e79e58cbd8144510383b40e690c5e553c239 | [log] [tgz] |
---|---|---|
author | Zhikui Ren <zhikui.ren@intel.com> | Tue Jun 07 21:03:33 2022 -0700 |
committer | Zhikui Ren <zhikui.ren@intel.com> | Wed Jun 15 22:10:35 2022 +0000 |
tree | 4c5c0dd039969cd8fc6723047fac0a7576fdb373 | |
parent | 939f36073b81a15d8e46e3839a60beb002f3e558 [diff] |
Detect Write Protect when programming MAC address When Write Protect is enabled, write to eeprom chips from different vendors fail differently. For ATMEL chip, write returns success, read and verify is needed to detect write failure. For STMicroelectronics, write return error, add read attempt to detect if Write Protect is enabled. Tested: No regression in MAC programing commands. Fake write error and verified read is tried through debug print. Signed-off-by: Zhikui Ren <zhikui.ren@intel.com> Change-Id: I8d9a851d9fde7a0bd6b0a681d13c5be55f43f6cc
This component is intended to provide Intel-specific IPMI[3]
command handlers for OpenBMC. These handlers are intended to integrate BMC with servers based on Intel architecture.
intel-ipmi-oem
serves as an extension[1]
to OpenBMC IPMI daemon[2]
. It is compiled as a shared library and intended to both:
Related features provided by the library are grouped in separate source files. Main extensions to vanilla OpenBMC IPMI stack are the following:
[4]