blob: 6dadbfc5efc958ad69316af4813e4333d960bc78 [file] [log] [blame]
Tom Josephe6361a22016-08-10 06:56:25 -05001#include "message_handler.hpp"
2
Vernon Mauery9e801a22018-10-12 13:20:49 -07003#include "command_table.hpp"
4#include "main.hpp"
5#include "message.hpp"
6#include "message_parsers.hpp"
7#include "sessions_manager.hpp"
8
Tom Josephe6361a22016-08-10 06:56:25 -05009#include <sys/socket.h>
10
Tom Josephe6361a22016-08-10 06:56:25 -050011#include <memory>
Vernon Maueryfc37e592018-12-19 14:55:15 -080012#include <phosphor-logging/log.hpp>
Tom Josephe6361a22016-08-10 06:56:25 -050013#include <string>
14#include <vector>
15
Vernon Maueryfc37e592018-12-19 14:55:15 -080016using namespace phosphor::logging;
17
Tom Josephe6361a22016-08-10 06:56:25 -050018namespace message
19{
Vernon Mauery8d6f2002018-11-07 09:55:53 -080020using namespace phosphor::logging;
Tom Josephe6361a22016-08-10 06:56:25 -050021
Vernon Mauery8d6f2002018-11-07 09:55:53 -080022bool Handler::receive()
Tom Josephe6361a22016-08-10 06:56:25 -050023{
24 std::vector<uint8_t> packet;
25 auto readStatus = 0;
26
27 // Read the packet
28 std::tie(readStatus, packet) = channel->read();
29
30 // Read of the packet failed
31 if (readStatus < 0)
32 {
Vernon Maueryfc37e592018-12-19 14:55:15 -080033 log<level::ERR>("Error in Read", entry("STATUS=%x", readStatus));
Vernon Mauery8d6f2002018-11-07 09:55:53 -080034 return false;
Tom Josephe6361a22016-08-10 06:56:25 -050035 }
36
37 // Unflatten the packet
Vernon Mauery8d6f2002018-11-07 09:55:53 -080038 std::tie(inMessage, sessionHeader) = parser::unflatten(packet);
Tom Josephe6361a22016-08-10 06:56:25 -050039
Kirill Pakhomovde7dd5c2021-02-27 18:45:22 +030040 return true;
41}
42
43void Handler::updSessionData(std::shared_ptr<Message>& inMessage)
44{
Vernon Maueryae1fda42018-10-15 12:55:34 -070045 auto session = std::get<session::Manager&>(singletonPool)
Vernon Mauery8d6f2002018-11-07 09:55:53 -080046 .getSession(inMessage->bmcSessionID);
Tom Josephe6361a22016-08-10 06:56:25 -050047
Vernon Mauery8d6f2002018-11-07 09:55:53 -080048 sessionID = inMessage->bmcSessionID;
49 inMessage->rcSessionID = session->getRCSessionID();
Tom Josephe6361a22016-08-10 06:56:25 -050050 session->updateLastTransactionTime();
Suryakanth Sekarf8a34fc2019-06-12 20:59:18 +053051 session->channelPtr = channel;
52 session->remotePort(channel->getPort());
Rajashekar Gade Reddy9979e992020-02-07 19:18:34 +053053 uint32_t ipAddr = 0;
54 channel->getRemoteAddress(ipAddr);
55 session->remoteIPAddr(ipAddr);
Tom Josephe6361a22016-08-10 06:56:25 -050056}
57
Vernon Mauery8d6f2002018-11-07 09:55:53 -080058Handler::~Handler()
59{
Kirill Pakhomovde7dd5c2021-02-27 18:45:22 +030060 try
Vernon Mauery8d6f2002018-11-07 09:55:53 -080061 {
Kirill Pakhomovde7dd5c2021-02-27 18:45:22 +030062#ifdef RMCP_PING
63 if (ClassOfMsg::ASF == inMessage->rmcpMsgClass)
Vernon Mauery8d6f2002018-11-07 09:55:53 -080064 {
Kirill Pakhomovde7dd5c2021-02-27 18:45:22 +030065 sendASF();
Vernon Mauery8d6f2002018-11-07 09:55:53 -080066 }
Kirill Pakhomovde7dd5c2021-02-27 18:45:22 +030067 else
68#endif // RMCP_PING
Vernon Mauery8d6f2002018-11-07 09:55:53 -080069 {
Kirill Pakhomovde7dd5c2021-02-27 18:45:22 +030070 if (outPayload)
71 {
72 std::shared_ptr<Message> outMessage =
73 inMessage->createResponse(*outPayload);
74 if (!outMessage)
75 {
76 return;
77 }
78 send(outMessage);
79 }
Vernon Mauery8d6f2002018-11-07 09:55:53 -080080 }
Kirill Pakhomovde7dd5c2021-02-27 18:45:22 +030081 }
82 catch (const std::exception& e)
83 {
84 // send failed, most likely due to a session closure
85 log<level::INFO>("Async RMCP+ reply failed",
86 entry("EXCEPTION=%s", e.what()));
Vernon Mauery8d6f2002018-11-07 09:55:53 -080087 }
88}
89
90void Handler::processIncoming()
91{
92 // Read the incoming IPMI packet
93 if (!receive())
94 {
95 return;
96 }
97
Kirill Pakhomovde7dd5c2021-02-27 18:45:22 +030098#ifdef RMCP_PING
Vernon Mauery8d6f2002018-11-07 09:55:53 -080099 // Execute the Command, possibly asynchronously
Kirill Pakhomovde7dd5c2021-02-27 18:45:22 +0300100 if (ClassOfMsg::ASF != inMessage->rmcpMsgClass)
101#endif // RMCP_PING
102 {
103 updSessionData(inMessage);
104 executeCommand();
105 }
Vernon Mauery8d6f2002018-11-07 09:55:53 -0800106
107 // send happens during the destructor if a payload was set
108}
109
110void Handler::executeCommand()
Tom Josephe6361a22016-08-10 06:56:25 -0500111{
Kirill Pakhomovde7dd5c2021-02-27 18:45:22 +0300112
Tom Josephe6361a22016-08-10 06:56:25 -0500113 // Get the CommandID to map into the command table
Vernon Mauery7f268e42018-10-26 10:26:01 -0700114 auto command = inMessage->getCommand();
Vernon Maueryd999ffc2018-10-25 09:16:05 -0700115 if (inMessage->payloadType == PayloadType::IPMI)
Tom Josephe6361a22016-08-10 06:56:25 -0500116 {
Richard Marian Thomaiyar8af90eb2019-03-03 15:13:33 +0530117 auto session =
118 std::get<session::Manager&>(singletonPool).getSession(sessionID);
119 // Process PayloadType::IPMI only if ipmi is enabled or for sessionless
120 // or for session establisbment command
Suryakanth Sekarf8a34fc2019-06-12 20:59:18 +0530121 if (this->sessionID == session::sessionZero ||
Richard Marian Thomaiyar8af90eb2019-03-03 15:13:33 +0530122 session->sessionUserPrivAccess.ipmiEnabled)
Tom Josephe6361a22016-08-10 06:56:25 -0500123 {
Richard Marian Thomaiyar8af90eb2019-03-03 15:13:33 +0530124 if (inMessage->payload.size() <
125 (sizeof(LAN::header::Request) + sizeof(LAN::trailer::Request)))
126 {
127 return;
128 }
Tom Josephe6361a22016-08-10 06:56:25 -0500129
Richard Marian Thomaiyar8af90eb2019-03-03 15:13:33 +0530130 auto start =
131 inMessage->payload.begin() + sizeof(LAN::header::Request);
132 auto end = inMessage->payload.end() - sizeof(LAN::trailer::Request);
133 std::vector<uint8_t> inPayload(start, end);
134 std::get<command::Table&>(singletonPool)
135 .executeCommand(command, inPayload, shared_from_this());
136 }
137 else
138 {
139 std::vector<uint8_t> payload{IPMI_CC_INSUFFICIENT_PRIVILEGE};
140 outPayload = std::move(payload);
141 }
Tom Josephe6361a22016-08-10 06:56:25 -0500142 }
143 else
144 {
Vernon Mauery8d6f2002018-11-07 09:55:53 -0800145 std::get<command::Table&>(singletonPool)
146 .executeCommand(command, inMessage->payload, shared_from_this());
Tom Josephe6361a22016-08-10 06:56:25 -0500147 }
Tom Josephe6361a22016-08-10 06:56:25 -0500148}
149
Kirill Pakhomovde7dd5c2021-02-27 18:45:22 +0300150void Handler::writeData(const std::vector<uint8_t>& packet)
151{
152 auto writeStatus = channel->write(packet);
153 if (writeStatus < 0)
154 {
155 throw std::runtime_error("Error in writing to socket");
156 }
157}
158
159#ifdef RMCP_PING
160void Handler::sendASF()
161{
162 // Flatten the packet
163 auto packet = asfparser::flatten(inMessage->asfMsgTag);
164
165 // Write the packet
166 writeData(packet);
167}
168#endif // RMCP_PING
169
Vernon Maueryd999ffc2018-10-25 09:16:05 -0700170void Handler::send(std::shared_ptr<Message> outMessage)
Tom Josephe6361a22016-08-10 06:56:25 -0500171{
Vernon Mauery9e801a22018-10-12 13:20:49 -0700172 auto session =
Vernon Maueryae1fda42018-10-15 12:55:34 -0700173 std::get<session::Manager&>(singletonPool).getSession(sessionID);
Tom Josephe6361a22016-08-10 06:56:25 -0500174
175 // Flatten the packet
Vernon Mauery224f36a2018-10-25 08:52:23 -0700176 auto packet = parser::flatten(outMessage, sessionHeader, session);
Tom Josephe6361a22016-08-10 06:56:25 -0500177
Tom Joseph04b30382017-04-03 01:06:51 +0530178 // Write the packet
Kirill Pakhomovde7dd5c2021-02-27 18:45:22 +0300179 writeData(packet);
Tom Josephe6361a22016-08-10 06:56:25 -0500180}
181
Tom Josephff848492017-03-31 10:43:48 +0530182void Handler::setChannelInSession() const
183{
Vernon Mauery9e801a22018-10-12 13:20:49 -0700184 auto session =
Vernon Maueryae1fda42018-10-15 12:55:34 -0700185 std::get<session::Manager&>(singletonPool).getSession(sessionID);
Tom Josephff848492017-03-31 10:43:48 +0530186
187 session->channelPtr = channel;
188}
189
Vernon Mauery70fd29c2017-11-30 13:11:43 -0800190void Handler::sendSOLPayload(const std::vector<uint8_t>& input)
Tom Joseph22596f22017-03-31 10:52:27 +0530191{
Vernon Mauery9e801a22018-10-12 13:20:49 -0700192 auto session =
Vernon Maueryae1fda42018-10-15 12:55:34 -0700193 std::get<session::Manager&>(singletonPool).getSession(sessionID);
Tom Joseph22596f22017-03-31 10:52:27 +0530194
Vernon Maueryd999ffc2018-10-25 09:16:05 -0700195 auto outMessage = std::make_shared<Message>();
196 outMessage->payloadType = PayloadType::SOL;
197 outMessage->payload = input;
198 outMessage->isPacketEncrypted = session->isCryptAlgoEnabled();
199 outMessage->isPacketAuthenticated = session->isIntegrityAlgoEnabled();
200 outMessage->rcSessionID = session->getRCSessionID();
201 outMessage->bmcSessionID = sessionID;
Tom Joseph22596f22017-03-31 10:52:27 +0530202
203 send(outMessage);
204}
205
Vernon Mauery9e801a22018-10-12 13:20:49 -0700206void Handler::sendUnsolicitedIPMIPayload(uint8_t netfn, uint8_t cmd,
Tom Joseph63d3e492017-03-31 11:01:08 +0530207 const std::vector<uint8_t>& output)
208{
Vernon Mauery9e801a22018-10-12 13:20:49 -0700209 auto session =
Vernon Maueryae1fda42018-10-15 12:55:34 -0700210 std::get<session::Manager&>(singletonPool).getSession(sessionID);
Tom Joseph63d3e492017-03-31 11:01:08 +0530211
Vernon Maueryd999ffc2018-10-25 09:16:05 -0700212 auto outMessage = std::make_shared<Message>();
213 outMessage->payloadType = PayloadType::IPMI;
214 outMessage->isPacketEncrypted = session->isCryptAlgoEnabled();
215 outMessage->isPacketAuthenticated = session->isIntegrityAlgoEnabled();
216 outMessage->rcSessionID = session->getRCSessionID();
217 outMessage->bmcSessionID = sessionID;
Tom Joseph63d3e492017-03-31 11:01:08 +0530218
Vernon Maueryd999ffc2018-10-25 09:16:05 -0700219 outMessage->payload.resize(sizeof(LAN::header::Request) + output.size() +
220 sizeof(LAN::trailer::Request));
Tom Joseph63d3e492017-03-31 11:01:08 +0530221
Vernon Mauery9e801a22018-10-12 13:20:49 -0700222 auto respHeader =
Vernon Maueryd999ffc2018-10-25 09:16:05 -0700223 reinterpret_cast<LAN::header::Request*>(outMessage->payload.data());
Tom Joseph63d3e492017-03-31 11:01:08 +0530224
225 // Add IPMI LAN Message Request Header
226 respHeader->rsaddr = LAN::requesterBMCAddress;
Vernon Mauery9e801a22018-10-12 13:20:49 -0700227 respHeader->netfn = (netfn << 0x02);
228 respHeader->cs = crc8bit(&(respHeader->rsaddr), 2);
Tom Joseph63d3e492017-03-31 11:01:08 +0530229 respHeader->rqaddr = LAN::responderBMCAddress;
Vernon Mauery9e801a22018-10-12 13:20:49 -0700230 respHeader->rqseq = 0;
231 respHeader->cmd = cmd;
Tom Joseph63d3e492017-03-31 11:01:08 +0530232
233 auto assembledSize = sizeof(LAN::header::Request);
234
235 // Copy the output by the execution of the command
Vernon Mauery9e801a22018-10-12 13:20:49 -0700236 std::copy(output.begin(), output.end(),
Vernon Maueryd999ffc2018-10-25 09:16:05 -0700237 outMessage->payload.begin() + assembledSize);
Tom Joseph63d3e492017-03-31 11:01:08 +0530238 assembledSize += output.size();
239
240 // Add the IPMI LAN Message Trailer
Vernon Mauery9e801a22018-10-12 13:20:49 -0700241 auto trailer = reinterpret_cast<LAN::trailer::Request*>(
Vernon Maueryd999ffc2018-10-25 09:16:05 -0700242 outMessage->payload.data() + assembledSize);
Tom Joseph63d3e492017-03-31 11:01:08 +0530243
244 // Calculate the checksum for the field rqaddr in the header to the
245 // command data, 3 corresponds to size of the fields before rqaddr( rsaddr,
246 // netfn, cs).
247 trailer->checksum = crc8bit(&respHeader->rqaddr, assembledSize - 3);
248
249 send(outMessage);
250}
251
Vernon Mauery9e801a22018-10-12 13:20:49 -0700252} // namespace message