blob: 2a964ef38a58825797080b450da0ba8d57f2939a [file] [log] [blame]
Tom Joseph07181f52016-08-08 08:17:08 -05001#include "command_table.hpp"
2
Richard Marian Thomaiyar472a37b2018-09-06 07:11:07 +05303#include "main.hpp"
Tom Joseph07181f52016-08-08 08:17:08 -05004#include "message_handler.hpp"
Tom Joseph1efcb492017-01-31 16:56:47 +05305#include "message_parsers.hpp"
Tom Joseph07181f52016-08-08 08:17:08 -05006#include "sessions_manager.hpp"
Nagaraju Goruganti1d9d4162018-03-22 01:27:37 -05007
Vernon Mauery9e801a22018-10-12 13:20:49 -07008#include <iomanip>
Vernon Mauery66501642018-07-30 09:07:10 -07009#include <main.hpp>
Vernon Mauery9e801a22018-10-12 13:20:49 -070010#include <phosphor-logging/elog-errors.hpp>
11#include <phosphor-logging/log.hpp>
Vernon Mauery66501642018-07-30 09:07:10 -070012#include <user_channel/user_layer.hpp>
Vernon Maueryf41a5542018-10-15 16:04:17 -070013#include <xyz/openbmc_project/Common/error.hpp>
Vernon Mauery9e801a22018-10-12 13:20:49 -070014
Vernon Mauery66501642018-07-30 09:07:10 -070015using namespace sdbusplus::xyz::openbmc_project::Common::Error;
Nagaraju Goruganti1d9d4162018-03-22 01:27:37 -050016using namespace phosphor::logging;
Tom Joseph07181f52016-08-08 08:17:08 -050017
Vernon Mauery66501642018-07-30 09:07:10 -070018namespace ipmi
19{
20using Value = sdbusplus::message::variant<bool, uint8_t, int16_t, uint16_t,
21 int32_t, uint32_t, int64_t, uint64_t,
22 double, std::string>;
23
24} // namespace ipmi
25
Tom Joseph07181f52016-08-08 08:17:08 -050026namespace command
27{
28
29void Table::registerCommand(CommandID inCommand, std::unique_ptr<Entry>&& entry)
30{
Feist, Jamesbd45aae2017-10-26 15:06:13 -070031 auto& command = commandTable[inCommand.command];
32
33 if (command)
34 {
Vernon Mauery9e801a22018-10-12 13:20:49 -070035 log<level::DEBUG>(
36 "Already Registered",
Vernon Mauery66501642018-07-30 09:07:10 -070037 phosphor::logging::entry("SKIPPED_ENTRY=0x%x", inCommand.command));
Feist, Jamesbd45aae2017-10-26 15:06:13 -070038 return;
39 }
40
Feist, Jamesbd45aae2017-10-26 15:06:13 -070041 command = std::move(entry);
Tom Joseph07181f52016-08-08 08:17:08 -050042}
43
Vernon Mauery8d6f2002018-11-07 09:55:53 -080044void Table::executeCommand(uint32_t inCommand,
45 std::vector<uint8_t>& commandData,
46 std::shared_ptr<message::Handler> handler)
Tom Joseph07181f52016-08-08 08:17:08 -050047{
48 using namespace std::chrono_literals;
49
Tom Joseph07181f52016-08-08 08:17:08 -050050 auto iterator = commandTable.find(inCommand);
51
52 if (iterator == commandTable.end())
53 {
Vernon Mauery66501642018-07-30 09:07:10 -070054 CommandID command(inCommand);
55
56 auto bus = getSdBus();
57 // forward the request onto the main ipmi queue
Vernon Mauery8d6f2002018-11-07 09:55:53 -080058 using IpmiDbusRspType = std::tuple<uint8_t, uint8_t, uint8_t, uint8_t,
59 std::vector<uint8_t>>;
Vernon Mauery66501642018-07-30 09:07:10 -070060 uint8_t lun = command.lun();
61 uint8_t netFn = command.netFn();
62 uint8_t cmd = command.cmd();
63 std::shared_ptr<session::Session> session =
64 std::get<session::Manager&>(singletonPool)
Vernon Mauery8d6f2002018-11-07 09:55:53 -080065 .getSession(handler->sessionID);
Vernon Mauery66501642018-07-30 09:07:10 -070066 std::map<std::string, ipmi::Value> options = {
Vernon Maueryd92bc322019-03-15 15:24:30 -070067 {"userId", ipmi::Value(static_cast<int>(
68 ipmi::ipmiUserGetUserId(session->userName)))},
Suryakanth Sekarf8a34fc2019-06-12 20:59:18 +053069 {"privilege",
70 ipmi::Value(static_cast<int>(session->currentPrivilege()))},
Rajashekar Gade Reddy49a94b22019-11-13 16:46:32 +053071 {"currentSessionId",
72 ipmi::Value(static_cast<uint32_t>(session->getBMCSessionID()))},
Vernon Mauery66501642018-07-30 09:07:10 -070073 };
Vernon Mauery8d6f2002018-11-07 09:55:53 -080074 bus->async_method_call(
75 [handler, this](const boost::system::error_code& ec,
76 const IpmiDbusRspType& response) {
77 if (!ec)
78 {
79 const uint8_t& cc = std::get<3>(response);
80 const std::vector<uint8_t>& responseData =
81 std::get<4>(response);
82 std::vector<uint8_t> payload;
83 payload.reserve(1 + responseData.size());
84 payload.push_back(cc);
85 payload.insert(payload.end(), responseData.begin(),
86 responseData.end());
87 handler->outPayload = std::move(payload);
88 }
89 else
90 {
91 std::vector<uint8_t> payload;
92 payload.push_back(IPMI_CC_UNSPECIFIED_ERROR);
93 handler->outPayload = std::move(payload);
94 }
95 },
96 "xyz.openbmc_project.Ipmi.Host", "/xyz/openbmc_project/Ipmi",
97 "xyz.openbmc_project.Ipmi.Server", "execute", netFn, lun, cmd,
98 commandData, options);
Tom Joseph07181f52016-08-08 08:17:08 -050099 }
100 else
101 {
102 auto start = std::chrono::steady_clock::now();
103
Vernon Mauery8d6f2002018-11-07 09:55:53 -0800104 handler->outPayload =
105 iterator->second->executeCommand(commandData, handler);
Tom Joseph07181f52016-08-08 08:17:08 -0500106
107 auto end = std::chrono::steady_clock::now();
108
Yong Li899cf5a2020-01-19 13:32:20 +0800109 std::chrono::duration<size_t> elapsedSeconds =
Vernon Mauery9e801a22018-10-12 13:20:49 -0700110 std::chrono::duration_cast<std::chrono::seconds>(end - start);
Tom Joseph07181f52016-08-08 08:17:08 -0500111
112 // If command time execution time exceeds 2 seconds, log a time
113 // exceeded message
114 if (elapsedSeconds > 2s)
115 {
Vernon Maueryfc37e592018-12-19 14:55:15 -0800116 log<level::ERR>("IPMI command timed out",
Yong Li899cf5a2020-01-19 13:32:20 +0800117 entry("DELAY=%zu", elapsedSeconds.count()));
Tom Joseph07181f52016-08-08 08:17:08 -0500118 }
119 }
Tom Joseph07181f52016-08-08 08:17:08 -0500120}
121
Vernon Mauery9e801a22018-10-12 13:20:49 -0700122std::vector<uint8_t>
123 NetIpmidEntry::executeCommand(std::vector<uint8_t>& commandData,
Vernon Mauery8d6f2002018-11-07 09:55:53 -0800124 std::shared_ptr<message::Handler> handler)
Tom Joseph07181f52016-08-08 08:17:08 -0500125{
126 std::vector<uint8_t> errResponse;
127
128 // Check if the command qualifies to be run prior to establishing a session
Suryakanth Sekarf8a34fc2019-06-12 20:59:18 +0530129 if (!sessionless && (handler->sessionID == session::sessionZero))
Tom Joseph07181f52016-08-08 08:17:08 -0500130 {
131 errResponse.resize(1);
132 errResponse[0] = IPMI_CC_INSUFFICIENT_PRIVILEGE;
Vernon Maueryfc37e592018-12-19 14:55:15 -0800133 log<level::INFO>("Table: Insufficient privilege for command",
Vernon Mauery66501642018-07-30 09:07:10 -0700134 entry("LUN=%x", command.lun()),
135 entry("NETFN=%x", command.netFn()),
136 entry("CMD=%x", command.cmd()));
Tom Joseph07181f52016-08-08 08:17:08 -0500137 return errResponse;
138 }
139
Vernon Mauery8d6f2002018-11-07 09:55:53 -0800140 return functor(commandData, *handler);
Tom Joseph07181f52016-08-08 08:17:08 -0500141}
142
Tom Joseph07181f52016-08-08 08:17:08 -0500143} // namespace command