📄 ipmi_msghandler.c
字号:
/* We were unable to find the sequence number, so just nuke the message. */ spin_lock_irqsave(&intf->counter_lock, flags); intf->unhandled_ipmb_responses++; spin_unlock_irqrestore(&intf->counter_lock, flags); return 0; } memcpy(recv_msg->msg_data, &(msg->rsp[9]), msg->rsp_size - 9); /* THe other fields matched, so no need to set them, except for netfn, which needs to be the response that was returned, not the request value. */ recv_msg->msg.netfn = msg->rsp[4] >> 2; recv_msg->msg.data = recv_msg->msg_data; recv_msg->msg.data_len = msg->rsp_size - 10; recv_msg->recv_type = IPMI_RESPONSE_RECV_TYPE; spin_lock_irqsave(&intf->counter_lock, flags); intf->handled_ipmb_responses++; spin_unlock_irqrestore(&intf->counter_lock, flags); deliver_response(recv_msg); return 0;}static int handle_ipmb_get_msg_cmd(ipmi_smi_t intf, struct ipmi_smi_msg *msg){ struct cmd_rcvr *rcvr; int rv = 0; unsigned char netfn; unsigned char cmd; ipmi_user_t user = NULL; struct ipmi_ipmb_addr *ipmb_addr; struct ipmi_recv_msg *recv_msg; unsigned long flags; if (msg->rsp_size < 10) { /* Message not big enough, just ignore it. */ spin_lock_irqsave(&intf->counter_lock, flags); intf->invalid_commands++; spin_unlock_irqrestore(&intf->counter_lock, flags); return 0; } if (msg->rsp[2] != 0) { /* An error getting the response, just ignore it. */ return 0; } netfn = msg->rsp[4] >> 2; cmd = msg->rsp[8]; read_lock(&(intf->cmd_rcvr_lock)); if (intf->all_cmd_rcvr) { user = intf->all_cmd_rcvr; } else { /* Find the command/netfn. */ list_for_each_entry(rcvr, &(intf->cmd_rcvrs), link) { if ((rcvr->netfn == netfn) && (rcvr->cmd == cmd)) { user = rcvr->user; break; } } } read_unlock(&(intf->cmd_rcvr_lock)); if (user == NULL) { /* We didn't find a user, deliver an error response. */ spin_lock_irqsave(&intf->counter_lock, flags); intf->unhandled_commands++; spin_unlock_irqrestore(&intf->counter_lock, flags); msg->data[0] = (IPMI_NETFN_APP_REQUEST << 2); msg->data[1] = IPMI_SEND_MSG_CMD; msg->data[2] = msg->rsp[3]; msg->data[3] = msg->rsp[6]; msg->data[4] = ((netfn + 1) << 2) | (msg->rsp[7] & 0x3); msg->data[5] = ipmb_checksum(&(msg->data[3]), 2); msg->data[6] = intf->my_address; /* rqseq/lun */ msg->data[7] = (msg->rsp[7] & 0xfc) | (msg->rsp[4] & 0x3); msg->data[8] = msg->rsp[8]; /* cmd */ msg->data[9] = IPMI_INVALID_CMD_COMPLETION_CODE; msg->data[10] = ipmb_checksum(&(msg->data[6]), 4); msg->data_size = 11;#ifdef DEBUG_MSGING { int m; printk("Invalid command:"); for (m=0; m<msg->data_size; m++) printk(" %2.2x", msg->data[m]); printk("\n"); }#endif intf->handlers->sender(intf->send_info, msg, 0); rv = -1; /* We used the message, so return the value that causes it to not be freed or queued. */ } else { /* Deliver the message to the user. */ spin_lock_irqsave(&intf->counter_lock, flags); intf->handled_commands++; spin_unlock_irqrestore(&intf->counter_lock, flags); recv_msg = ipmi_alloc_recv_msg(); if (! recv_msg) { /* We couldn't allocate memory for the message, so requeue it for handling later. */ rv = 1; } else { /* Extract the source address from the data. */ ipmb_addr = (struct ipmi_ipmb_addr *) &recv_msg->addr; ipmb_addr->addr_type = IPMI_IPMB_ADDR_TYPE; ipmb_addr->slave_addr = msg->rsp[6]; ipmb_addr->lun = msg->rsp[7] & 3; ipmb_addr->channel = msg->rsp[3] & 0xf; /* Extract the rest of the message information from the IPMB header.*/ recv_msg->user = user; recv_msg->recv_type = IPMI_CMD_RECV_TYPE; recv_msg->msgid = msg->rsp[7] >> 2; recv_msg->msg.netfn = msg->rsp[4] >> 2; recv_msg->msg.cmd = msg->rsp[8]; recv_msg->msg.data = recv_msg->msg_data; /* We chop off 10, not 9 bytes because the checksum at the end also needs to be removed. */ recv_msg->msg.data_len = msg->rsp_size - 10; memcpy(recv_msg->msg_data, &(msg->rsp[9]), msg->rsp_size - 10); deliver_response(recv_msg); } } return rv;}static int handle_lan_get_msg_rsp(ipmi_smi_t intf, struct ipmi_smi_msg *msg){ struct ipmi_lan_addr lan_addr; struct ipmi_recv_msg *recv_msg; unsigned long flags; /* This is 13, not 12, because the response must contain a * completion code. */ if (msg->rsp_size < 13) { /* Message not big enough, just ignore it. */ spin_lock_irqsave(&intf->counter_lock, flags); intf->invalid_lan_responses++; spin_unlock_irqrestore(&intf->counter_lock, flags); return 0; } if (msg->rsp[2] != 0) { /* An error getting the response, just ignore it. */ return 0; } lan_addr.addr_type = IPMI_LAN_ADDR_TYPE; lan_addr.session_handle = msg->rsp[4]; lan_addr.remote_SWID = msg->rsp[8]; lan_addr.local_SWID = msg->rsp[5]; lan_addr.channel = msg->rsp[3] & 0x0f; lan_addr.privilege = msg->rsp[3] >> 4; lan_addr.lun = msg->rsp[9] & 3; /* It's a response from a remote entity. Look up the sequence number and handle the response. */ if (intf_find_seq(intf, msg->rsp[9] >> 2, msg->rsp[3] & 0x0f, msg->rsp[10], (msg->rsp[6] >> 2) & (~1), (struct ipmi_addr *) &(lan_addr), &recv_msg)) { /* We were unable to find the sequence number, so just nuke the message. */ spin_lock_irqsave(&intf->counter_lock, flags); intf->unhandled_lan_responses++; spin_unlock_irqrestore(&intf->counter_lock, flags); return 0; } memcpy(recv_msg->msg_data, &(msg->rsp[11]), msg->rsp_size - 11); /* The other fields matched, so no need to set them, except for netfn, which needs to be the response that was returned, not the request value. */ recv_msg->msg.netfn = msg->rsp[6] >> 2; recv_msg->msg.data = recv_msg->msg_data; recv_msg->msg.data_len = msg->rsp_size - 12; recv_msg->recv_type = IPMI_RESPONSE_RECV_TYPE; spin_lock_irqsave(&intf->counter_lock, flags); intf->handled_lan_responses++; spin_unlock_irqrestore(&intf->counter_lock, flags); deliver_response(recv_msg); return 0;}static int handle_lan_get_msg_cmd(ipmi_smi_t intf, struct ipmi_smi_msg *msg){ struct cmd_rcvr *rcvr; int rv = 0; unsigned char netfn; unsigned char cmd; ipmi_user_t user = NULL; struct ipmi_lan_addr *lan_addr; struct ipmi_recv_msg *recv_msg; unsigned long flags; if (msg->rsp_size < 12) { /* Message not big enough, just ignore it. */ spin_lock_irqsave(&intf->counter_lock, flags); intf->invalid_commands++; spin_unlock_irqrestore(&intf->counter_lock, flags); return 0; } if (msg->rsp[2] != 0) { /* An error getting the response, just ignore it. */ return 0; } netfn = msg->rsp[6] >> 2; cmd = msg->rsp[10]; read_lock(&(intf->cmd_rcvr_lock)); if (intf->all_cmd_rcvr) { user = intf->all_cmd_rcvr; } else { /* Find the command/netfn. */ list_for_each_entry(rcvr, &(intf->cmd_rcvrs), link) { if ((rcvr->netfn == netfn) && (rcvr->cmd == cmd)) { user = rcvr->user; break; } } } read_unlock(&(intf->cmd_rcvr_lock)); if (user == NULL) { /* We didn't find a user, deliver an error response. */ spin_lock_irqsave(&intf->counter_lock, flags); intf->unhandled_commands++; spin_unlock_irqrestore(&intf->counter_lock, flags); rv = 0; /* Don't do anything with these messages, just allow them to be freed. */ } else { /* Deliver the message to the user. */ spin_lock_irqsave(&intf->counter_lock, flags); intf->handled_commands++; spin_unlock_irqrestore(&intf->counter_lock, flags); recv_msg = ipmi_alloc_recv_msg(); if (! recv_msg) { /* We couldn't allocate memory for the message, so requeue it for handling later. */ rv = 1; } else { /* Extract the source address from the data. */ lan_addr = (struct ipmi_lan_addr *) &recv_msg->addr; lan_addr->addr_type = IPMI_LAN_ADDR_TYPE; lan_addr->session_handle = msg->rsp[4]; lan_addr->remote_SWID = msg->rsp[8]; lan_addr->local_SWID = msg->rsp[5]; lan_addr->lun = msg->rsp[9] & 3; lan_addr->channel = msg->rsp[3] & 0xf; lan_addr->privilege = msg->rsp[3] >> 4; /* Extract the rest of the message information from the IPMB header.*/ recv_msg->user = user; recv_msg->recv_type = IPMI_CMD_RECV_TYPE; recv_msg->msgid = msg->rsp[9] >> 2; recv_msg->msg.netfn = msg->rsp[6] >> 2; recv_msg->msg.cmd = msg->rsp[10]; recv_msg->msg.data = recv_msg->msg_data; /* We chop off 12, not 11 bytes because the checksum at the end also needs to be removed. */ recv_msg->msg.data_len = msg->rsp_size - 12; memcpy(recv_msg->msg_data, &(msg->rsp[11]), msg->rsp_size - 12); deliver_response(recv_msg); } } return rv;}static void copy_event_into_recv_msg(struct ipmi_recv_msg *recv_msg, struct ipmi_smi_msg *msg){ struct ipmi_system_interface_addr *smi_addr; recv_msg->msgid = 0; smi_addr = (struct ipmi_system_interface_addr *) &(recv_msg->addr); smi_addr->addr_type = IPMI_SYSTEM_INTERFACE_ADDR_TYPE; smi_addr->channel = IPMI_BMC_CHANNEL; smi_addr->lun = msg->rsp[0] & 3; recv_msg->recv_type = IPMI_ASYNC_EVENT_RECV_TYPE; recv_msg->msg.netfn = msg->rsp[0] >> 2; recv_msg->msg.cmd = msg->rsp[1]; memcpy(recv_msg->msg_data, &(msg->rsp[3]), msg->rsp_size - 3); recv_msg->msg.data = recv_msg->msg_data; recv_msg->msg.data_len = msg->rsp_size - 3;}/* This will be called with the intf->users_lock read-locked, so no need to do that here. */static int handle_read_event_rsp(ipmi_smi_t intf, struct ipmi_smi_msg *msg){ struct ipmi_recv_msg *recv_msg, *recv_msg2; struct list_head msgs; ipmi_user_t user; int rv = 0; int deliver_count = 0; unsigned long flags; if (msg->rsp_size < 19) { /* Message is too small to be an IPMB event. */ spin_lock_irqsave(&intf->counter_lock, flags); intf->invalid_events++; spin_unlock_irqrestore(&intf->counter_lock, flags); return 0; } if (msg->rsp[2] != 0) { /* An error getting the event, just ignore it. */ return 0; } INIT_LIST_HEAD(&msgs); spin_lock_irqsave(&(intf->events_lock), flags); spin_lock(&intf->counter_lock); intf->events++; spin_unlock(&intf->counter_lock); /* Allocate and fill in one message for every user that is getting events. */ list_for_each_entry(user, &(intf->users), link) { if (! user->gets_events) continue; recv_msg = ipmi_alloc_recv_msg(); if (! recv_msg) { list_for_each_entry_safe(recv_msg, recv_msg2, &msgs, link) { list_del(&recv_msg->link); ipmi_free_recv_msg(recv_msg); } /* We couldn't allocate memory for the message, so requeue it for handling later. */ rv = 1; goto out; } deliver_count++; copy_event_into_recv_msg(recv_msg, msg); recv_msg->user = user; list_add_tail(&(recv_msg->link), &msgs); } if (deliver_count) { /* Now deliver all the messages. */ list_for_each_entry_safe(recv_msg, recv_msg2, &msgs, link) { list_del(&recv_msg->link); deliver_response(recv_msg); } } else if (intf->waiting_events_count < MAX_EVENTS_IN_QUEUE) { /* No one to receive the message, put it in queue if there's not already too many things in the queue. */ recv_msg = ipmi_alloc_recv_msg(); if (! recv_msg) { /* We couldn't allocate memory for the message, so requeue it for handling later. */ rv = 1; goto out; } copy_event_into_recv_msg(recv_msg, msg); list_add_tail(&(recv_msg->link), &(intf->waiting_events)); } else { /* There's too many things in the queue, discard this message. */ printk(KERN_WARNING PFX "Event queue full, discarding an" " incoming event\n"); } out: spin_unlock_irqrestore(&(intf->events_lock), flags); return rv;}static int handle_bmc_rsp(ipmi_smi_t intf, struct ipmi_smi_msg *msg){ struct ipmi_recv_msg *recv_msg; int found = 0; struct ipmi_user *user; unsigned long flags; recv_msg = (struct ipmi_recv_msg *) msg->user_data; /* Make sure the user still exists. */ list_for_each_entry(user, &(intf->users), link) { if (user == recv_msg->user) { /* Found it, so we can deliver it */ found = 1; break; } } if (!found) { /* Special handling for NULL users. */ if (!recv_msg->user && intf->null_user_handler){ intf->null_user_handler(intf, msg); spin_lock_irqsave(&intf->counter_lock, flags); intf->handled_local_responses++; spin_unlock_irqrestore(&intf->counter_lock, flags); }else{ /* The user for the message went away, so give up. */ spin_lock_irqsave(&intf->counter_lock, flags); intf->unhandled_local_responses++; spin_unlock_irqrestore(&intf->counter_lock, flags); } ipmi_free_recv_msg(recv_msg); } else { struct ipmi_system_interface_addr *smi_addr; spin_lock_irqsave(&intf->counter_lock, flags); intf->handled_local_responses++; spin_unlock_irqrestore(&intf->counter_lock, flags); recv_msg->recv_type = IPMI_RESPONSE_RECV_TYPE; recv_msg->msgid = msg->msgid; smi_addr = ((struct ipmi_system_interface_addr *) &(recv_msg->addr)); smi_addr->addr_type = IPMI_SYSTEM_INTERFACE_ADDR_TYPE; smi_addr->channel = IPMI_BMC_CHANNEL; smi_addr->lun = msg->rsp[0] & 3;
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -