blob: 188db4a9ec9bef57c2be8ebdf6b24e819bb82ca5 [file] [log] [blame]
vishwabmcba0bd5f2015-09-30 16:50:23 +05301#ifndef __HOST_IPMID_IPMI_COMMON_H__
2#define __HOST_IPMID_IPMI_COMMON_H__
vishwabmcba0bd5f2015-09-30 16:50:23 +05303
Patrick Venture2edd0e62018-10-25 16:10:10 -07004#include <systemd/sd-bus.h>
Joel Stanleyc99350c2015-11-25 17:27:25 +10305
Patrick Venturee86e7852020-05-07 17:41:23 -07006#include <cstddef>
7
Tom05732372016-09-06 17:21:23 +05308/*
9 * Specifies the minimum privilege level required to execute the command
10 * This means the command can be executed at a given privilege level or higher
11 * privilege level. Those commands which can be executed via system interface
12 * only should use SYSTEM_INTERFACE
13 */
Patrick Venture0b02be92018-08-31 11:55:55 -070014enum CommandPrivilege
15{
16 PRIVILEGE_CALLBACK = 0x01,
17 PRIVILEGE_USER,
18 PRIVILEGE_OPERATOR,
19 PRIVILEGE_ADMIN,
20 PRIVILEGE_OEM,
21 SYSTEM_INTERFACE = 0xFF,
Tom05732372016-09-06 17:21:23 +053022};
23
vishwabmcba0bd5f2015-09-30 16:50:23 +053024// length of Completion Code and its ALWAYS _1_
25#define IPMI_CC_LEN 1
26
27// IPMI Net Function number as specified by IPMI V2.0 spec.
Gunnar Millsd8249ee2018-04-12 16:33:53 -050028// Example :
vishwabmcba0bd5f2015-09-30 16:50:23 +053029// NETFUN_APP = (0x06 << 2),
Patrick Venture0b02be92018-08-31 11:55:55 -070030typedef unsigned char ipmi_netfn_t;
vishwabmcba0bd5f2015-09-30 16:50:23 +053031
32// IPMI Command for a Net Function number as specified by IPMI V2.0 spec.
Patrick Venture0b02be92018-08-31 11:55:55 -070033typedef unsigned char ipmi_cmd_t;
vishwabmcba0bd5f2015-09-30 16:50:23 +053034
35// Buffer containing data from sender of netfn and command as part of request
Patrick Venture0b02be92018-08-31 11:55:55 -070036typedef void* ipmi_request_t;
vishwabmcba0bd5f2015-09-30 16:50:23 +053037
38// This is the response buffer that the provider of [netfn,cmd] will send back
39// to the caller. Provider will allocate the memory inside the handler and then
40// will do a memcpy to this response buffer and also will set the data size
41// parameter to the size of the buffer.
42// EXAMPLE :
43// unsigned char str[] = {0x00, 0x01, 0xFE, 0xFF, 0x0A, 0x01};
44// *data_len = 6;
45// memcpy(response, &str, *data_len);
Patrick Venture0b02be92018-08-31 11:55:55 -070046typedef void* ipmi_response_t;
vishwabmcba0bd5f2015-09-30 16:50:23 +053047
48// This buffer contains any *user specific* data that is of interest only to the
49// plugin. For a ipmi function router, this data is opaque. At the time of
50// registering the plugin handlers, plugin may optionally allocate a memory and
51// fill in whatever needed that will be of help during the actual handling of
52// command. IPMID will just pass the netfn, cmd and also this data to plugins
53// during the command handler invocation.
Patrick Venture0b02be92018-08-31 11:55:55 -070054typedef void* ipmi_context_t;
vishwabmcba0bd5f2015-09-30 16:50:23 +053055
56// Length of request / response buffer depending on whether the data is a
57// request or a response from a plugin handler.
Patrick Venturee86e7852020-05-07 17:41:23 -070058typedef std::size_t* ipmi_data_len_t;
vishwabmcba0bd5f2015-09-30 16:50:23 +053059
60// Plugin function return the status code
61typedef unsigned char ipmi_ret_t;
62
Tom05732372016-09-06 17:21:23 +053063typedef enum CommandPrivilege ipmi_cmd_privilege_t;
64
vishwabmcba0bd5f2015-09-30 16:50:23 +053065// This is the callback handler that the plugin registers with IPMID. IPMI
66// function router will then make a call to this callback handler with the
67// necessary arguments of netfn, cmd, request, response, size and context.
68typedef ipmi_ret_t (*ipmid_callback_t)(ipmi_netfn_t, ipmi_cmd_t, ipmi_request_t,
Patrick Venture0b02be92018-08-31 11:55:55 -070069 ipmi_response_t, ipmi_data_len_t,
70 ipmi_context_t);
vishwabmcba0bd5f2015-09-30 16:50:23 +053071
72// This is the constructor function that is called into by each plugin handlers.
73// When ipmi sets up the callback handlers, a call is made to this with
74// information of netfn, cmd, callback handler pointer and context data.
Patrick Venture0b02be92018-08-31 11:55:55 -070075void ipmi_register_callback(ipmi_netfn_t, ipmi_cmd_t, ipmi_context_t,
76 ipmid_callback_t, ipmi_cmd_privilege_t);
vishwabmcba0bd5f2015-09-30 16:50:23 +053077
Jason M. Bills13e67c82018-09-10 14:12:16 -070078unsigned short reserveSel(void);
79bool checkSELReservation(unsigned short id);
80void cancelSELReservation(void);
Nan Li36c0cb62016-03-31 11:16:08 +080081
vishwabmcba0bd5f2015-09-30 16:50:23 +053082// These are the command network functions, the response
83// network functions are the function + 1. So to determine
84// the proper network function which issued the command
85// associated with a response, subtract 1.
86// Note: these are also shifted left to make room for the LUN.
87enum ipmi_net_fns
88{
Patrick Venture0b02be92018-08-31 11:55:55 -070089 NETFUN_CHASSIS = 0x00,
90 NETFUN_BRIDGE = 0x02,
91 NETFUN_SENSOR = 0x04,
92 NETFUN_APP = 0x06,
93 NETFUN_FIRMWARE = 0x08,
94 NETFUN_STORAGE = 0x0a,
95 NETFUN_TRANSPORT = 0x0c,
96 NETFUN_GRPEXT = 0x2c,
97 NETFUN_OEM_GROUP = 0x2e,
98 NETFUN_NONE = 0x30,
99 NETFUN_OEM = 0x32,
100 NETFUN_IBM_OEM = 0x3A
vishwabmcba0bd5f2015-09-30 16:50:23 +0530101};
102
103// IPMI commands for net functions. Since this is to be used both by the ipmi
104// function router and also the callback handler registration function, its put
105// in this .H file.
106enum ipmi_netfn_wild_card_cmd
107{
Patrick Venture0b02be92018-08-31 11:55:55 -0700108 IPMI_CMD_WILDCARD = 0xFF,
vishwabmcba0bd5f2015-09-30 16:50:23 +0530109};
110
Adriana Kobylakd100ee52015-10-20 17:02:37 -0500111// Return (completion) codes from a IPMI operation as needed by IPMI V2.0 spec.
vishwabmcba0bd5f2015-09-30 16:50:23 +0530112enum ipmi_return_codes
113{
114 IPMI_CC_OK = 0x00,
Chris Austen1810bec2015-10-13 12:12:39 -0500115 IPMI_DCMI_CC_NO_ACTIVE_POWER_LIMIT = 0x80,
William A. Kennington III5325f2c2018-01-08 15:17:09 -0800116 IPMI_WDOG_CC_NOT_INIT = 0x80,
Xo Wangf542e8b2017-08-09 15:34:16 -0700117 IPMI_CC_SYSTEM_INFO_PARAMETER_NOT_SUPPORTED = 0x80,
118 IPMI_CC_SYSTEM_INFO_PARAMETER_SET_READ_ONLY = 0x82,
William A. Kennington III6ae3df32018-01-18 11:19:30 -0800119 IPMI_CC_BUSY = 0xC0,
Chris Austen8339f9d2015-10-21 20:07:31 -0500120 IPMI_CC_INVALID = 0xC1,
Patrick Venturead359eb2018-11-12 15:03:54 -0800121 IPMI_CC_TIMEOUT = 0xC3,
122 IPMI_CC_OUT_OF_SPACE = 0xC4,
Nan Li36c0cb62016-03-31 11:16:08 +0800123 IPMI_CC_INVALID_RESERVATION_ID = 0xC5,
Patrick Venturead359eb2018-11-12 15:03:54 -0800124 IPMI_CC_REQ_DATA_TRUNCATED = 0xC6,
Tom63a3db72016-09-23 18:20:52 +0530125 IPMI_CC_REQ_DATA_LEN_INVALID = 0xC7,
Chris Austenc2cd29d2016-02-05 20:02:29 -0600126 IPMI_CC_PARM_OUT_OF_RANGE = 0xC9,
Patrick Venturead359eb2018-11-12 15:03:54 -0800127 IPMI_CC_REQUESTED_TOO_MANY_BYTES = 0xCA,
Adriana Kobylakd100ee52015-10-20 17:02:37 -0500128 IPMI_CC_SENSOR_INVALID = 0xCB,
Tom Joseph50234ad2017-03-20 18:51:38 +0530129 IPMI_CC_INVALID_FIELD_REQUEST = 0xCC,
Jayanth Othayoth0922bde2018-04-02 07:59:34 -0500130 IPMI_CC_ILLEGAL_COMMAND = 0xCD,
Adriana Kobylakd100ee52015-10-20 17:02:37 -0500131 IPMI_CC_RESPONSE_ERROR = 0xCE,
Tom Joseph9a61b4f2016-07-11 06:56:11 -0500132 IPMI_CC_INSUFFICIENT_PRIVILEGE = 0xD4,
Adriana Kobylakd100ee52015-10-20 17:02:37 -0500133 IPMI_CC_UNSPECIFIED_ERROR = 0xFF,
vishwabmcba0bd5f2015-09-30 16:50:23 +0530134};
135
ssekarb8491102018-08-16 17:31:43 +0530136// Temp solution: To detect the request source channel.
137// There is no stright forward way to get the exact
138// channel so we are hardcoding it to KCS in case host-ipmid
139// and LAN1 for netipmid.
140// we can't differentiate between LAN1 & LAN2 for netipmid in this logic.
141// As our current design will not be able to support the same. This is done
142// so that in all the places where ever we need to use the self channel can be
143// be implemented properly and based on new architecture.this can be updated.
144typedef enum
145{
146 interfaceKCS = 0,
147 interfaceLAN1 = 1,
148 interfaceUnknown = 0xFF
149} EInterfaceIndex;
150
151EInterfaceIndex getInterfaceIndex(void);
152
Patrick Venture0b02be92018-08-31 11:55:55 -0700153sd_bus* ipmid_get_sd_bus_connection(void);
154sd_event* ipmid_get_sd_event_connection(void);
155sd_bus_slot* ipmid_get_sd_bus_slot(void);
Joel Stanleyc99350c2015-11-25 17:27:25 +1030156
Vernon Mauery392050f2019-04-01 14:53:19 -0700157// move this from ipmid.hpp, which is now gone
158// this should not be used. Use the channel API to get the channel size
159#define MAX_IPMI_BUFFER 64
160
vishwabmcba0bd5f2015-09-30 16:50:23 +0530161#endif