| #include "command_table.hpp" |
| |
| #include <iomanip> |
| #include <iostream> |
| |
| #include "message_handler.hpp" |
| #include "message_parsers.hpp" |
| #include "sessions_manager.hpp" |
| #include <phosphor-logging/log.hpp> |
| #include <phosphor-logging/elog-errors.hpp> |
| #include "xyz/openbmc_project/Common/error.hpp" |
| |
| using namespace phosphor::logging; |
| |
| namespace command |
| { |
| |
| void Table::registerCommand(CommandID inCommand, std::unique_ptr<Entry>&& entry) |
| { |
| auto& command = commandTable[inCommand.command]; |
| |
| if (command) |
| { |
| log<level::DEBUG>("Already Registered", phosphor::logging::entry( |
| "SKIPPED_ENTRY=0x%x", uint32_t(inCommand.command))); |
| return; |
| } |
| |
| command = std::move(entry); |
| } |
| |
| std::vector<uint8_t> Table::executeCommand(uint32_t inCommand, |
| std::vector<uint8_t>& commandData, |
| const message::Handler& handler) |
| { |
| using namespace std::chrono_literals; |
| |
| std::vector<uint8_t> response; |
| |
| auto iterator = commandTable.find(inCommand); |
| |
| if (iterator == commandTable.end()) |
| { |
| response.resize(1); |
| response[0] = IPMI_CC_INVALID; |
| } |
| else |
| { |
| auto start = std::chrono::steady_clock::now(); |
| |
| response = iterator->second->executeCommand(commandData, handler); |
| |
| auto end = std::chrono::steady_clock::now(); |
| |
| auto elapsedSeconds = std::chrono::duration_cast<std::chrono::seconds> |
| (end - start); |
| |
| // If command time execution time exceeds 2 seconds, log a time |
| // exceeded message |
| if (elapsedSeconds > 2s) |
| { |
| std::cerr << "E> IPMI command timed out:Elapsed time = " |
| << elapsedSeconds.count() << "s" << "\n"; |
| } |
| } |
| return response; |
| } |
| |
| std::vector<uint8_t> NetIpmidEntry::executeCommand( |
| std::vector<uint8_t>& commandData, |
| const message::Handler& handler) |
| { |
| std::vector<uint8_t> errResponse; |
| |
| // Check if the command qualifies to be run prior to establishing a session |
| if (!sessionless && (handler.sessionID == session::SESSION_ZERO)) |
| { |
| errResponse.resize(1); |
| errResponse[0] = IPMI_CC_INSUFFICIENT_PRIVILEGE; |
| std::cerr << "E> Table::Not enough privileges for command 0x" |
| << std::hex << command.command << "\n"; |
| return errResponse; |
| } |
| |
| return functor(commandData, handler); |
| } |
| |
| std::vector<uint8_t> ProviderIpmidEntry::executeCommand( |
| std::vector<uint8_t>& commandData, |
| const message::Handler& handler) |
| { |
| std::vector<uint8_t> response(message::parser::MAX_PAYLOAD_SIZE - 1); |
| size_t respSize = commandData.size(); |
| ipmi_ret_t ipmiRC = IPMI_CC_UNSPECIFIED_ERROR; |
| try |
| { |
| ipmiRC = functor(0, 0, reinterpret_cast<void*>(commandData.data()), |
| reinterpret_cast<void*>(response.data() + 1), |
| &respSize, NULL); |
| } |
| // IPMI command handlers can throw unhandled exceptions, catch those |
| // and return sane error code. |
| catch (const std::exception& e) |
| { |
| std::cerr << "E> Unspecified error for command 0x" << std::hex |
| << command.command << " - " << e.what() << "\n"; |
| respSize = 0; |
| // fall through |
| } |
| /* |
| * respSize gets you the size of the response data for the IPMI command. The |
| * first byte in a response to the IPMI command is the Completion Code. |
| * So we are inserting completion code as the first byte and incrementing |
| * the response payload size by the size of the completion code. |
| */ |
| response[0] = ipmiRC; |
| response.resize(respSize + sizeof(ipmi_ret_t)); |
| |
| return response; |
| } |
| |
| } // namespace command |