blob: ba9c7303386d779fb173d236f96992d431485d6a [file] [log] [blame]
Dhruvaraj Subhashchandran4bd40332020-11-04 22:50:02 -06001description: >
2 Implement this to add Resource dump management.
3
Patrick Williamsa1347412022-12-06 10:56:22 -06004 The resource dumps are special types of dumps generated by host hypervisor.
5 The dump is generated based on the resource selector. Hyperviosr needs a
6 password to validate the request before creating the dump.
Dhruvaraj Subhashchandran4bd40332020-11-04 22:50:02 -06007
8properties:
9 - name: SourceDumpId
10 type: uint32
11 description: >
Patrick Williamsa1347412022-12-06 10:56:22 -060012 The dump id provided by the source of the dump. There are dumps which
13 get generated outside the BMC, like a resource dump which gets
14 generated and stored in the host memory. All dumps will have a unique
15 id but when communicating to the source of the dump the SourceDumpId
16 will be used.
Dhruvaraj Subhashchandran4bd40332020-11-04 22:50:02 -060017 - name: VSPString
18 type: string
19 description: >
20 The resource selector for generating the dump.
Dhruvaraj Subhashchandranb3563c12024-05-06 00:21:44 -050021 - name: UserChallenge
Dhruvaraj Subhashchandran4bd40332020-11-04 22:50:02 -060022 type: string
23 description: >
Dhruvaraj Subhashchandranb3563c12024-05-06 00:21:44 -050024 On some host implementations a user-challenge need to be provided by
25 the user and it flows through BMC and up to the host as a part of the
26 dump request. Non-disruptive dumps consume significant host resources
27 and involve the collection of host memory data. To safeguard these
28 operations and ensure they are initiated only by authorized personnel,
29 the provided passphrase is employed. In some systems, an Access
30 Control List (ACL) file, provided through the Platform Level Data
31 Model (PLDM), is used. The host validates the provided user-challenge
32 against this ACL. If the user-challenge doesn't match any entry in the
33 ACL, the host will reject the dump request. This field is needed so
34 the host can check that only authorized users are allowed to perform
35 certain dump operations.
Dhruvaraj Subhashchandran27afd1f2023-07-08 13:07:21 -050036 - name: Token
37 type: uint32
38 description: >
39 A token exchanged with an external firmware subsystem when creating a
40 dump outside of the BMC. This token can be used to identify the dump
41 entry once the collection is completed.
Dhruvaraj Subhashchandran980fb7b2022-02-10 00:08:39 -060042 - name: DumpRequestStatus
43 type: enum[self.HostResponse]
44 description: >
45 The host will send a response code for each request to create a
46 resource dump to indicate whether the request is successful or there
47 is an error.
48 default: Requested
49
50enumerations:
51 - name: HostResponse
52 description: >
53 These are the possible response codes from the host after sending a
54 resource dump request.
55 values:
56 - name: Requested
57 description: >
58 Requested for resource dump and awaiting the host response
59 - name: Success
60 description: >
61 Resource dump parameters and ACF data are successfully validated
62 - name: ACFFileInvalid
63 description: >
64 Invalid ACF file
65 - name: UserChallengeInvalid
66 description: >
67 User challenge provided is not valid
68 - name: PermissionDenied
69 descVSPtion: >
70 Caller does not have enough privileges to execute the requested
71 VSP string
72 - name: ResourceSelectorInvalid
73 description: >
74 Resource selector(VSP String) provided is not valid