⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ipmi_msghandler.c

📁 h内核
💻 C
📖 第 1 页 / 共 5 页
字号:
		/* We were unable to find the sequence number,		   so just nuke the message. */		spin_lock_irqsave(&intf->counter_lock, flags);		intf->unhandled_ipmb_responses++;		spin_unlock_irqrestore(&intf->counter_lock, flags);		return 0;	}	memcpy(recv_msg->msg_data,	       &(msg->rsp[9]),	       msg->rsp_size - 9);	/* THe other fields matched, so no need to set them, except           for netfn, which needs to be the response that was           returned, not the request value. */	recv_msg->msg.netfn = msg->rsp[4] >> 2;	recv_msg->msg.data = recv_msg->msg_data;	recv_msg->msg.data_len = msg->rsp_size - 10;	recv_msg->recv_type = IPMI_RESPONSE_RECV_TYPE;	spin_lock_irqsave(&intf->counter_lock, flags);	intf->handled_ipmb_responses++;	spin_unlock_irqrestore(&intf->counter_lock, flags);	deliver_response(recv_msg);	return 0;}static int handle_ipmb_get_msg_cmd(ipmi_smi_t          intf,				   struct ipmi_smi_msg *msg){	struct cmd_rcvr       *rcvr;	int                   rv = 0;	unsigned char         netfn;	unsigned char         cmd;	ipmi_user_t           user = NULL;	struct ipmi_ipmb_addr *ipmb_addr;	struct ipmi_recv_msg  *recv_msg;	unsigned long         flags;	if (msg->rsp_size < 10) {		/* Message not big enough, just ignore it. */		spin_lock_irqsave(&intf->counter_lock, flags);		intf->invalid_commands++;		spin_unlock_irqrestore(&intf->counter_lock, flags);		return 0;	}	if (msg->rsp[2] != 0) {		/* An error getting the response, just ignore it. */		return 0;	}	netfn = msg->rsp[4] >> 2;	cmd = msg->rsp[8];	read_lock(&(intf->cmd_rcvr_lock));		if (intf->all_cmd_rcvr) {		user = intf->all_cmd_rcvr;	} else {		/* Find the command/netfn. */		list_for_each_entry(rcvr, &(intf->cmd_rcvrs), link) {			if ((rcvr->netfn == netfn) && (rcvr->cmd == cmd)) {				user = rcvr->user;				break;			}		}	}	read_unlock(&(intf->cmd_rcvr_lock));	if (user == NULL) {		/* We didn't find a user, deliver an error response. */		spin_lock_irqsave(&intf->counter_lock, flags);		intf->unhandled_commands++;		spin_unlock_irqrestore(&intf->counter_lock, flags);		msg->data[0] = (IPMI_NETFN_APP_REQUEST << 2);		msg->data[1] = IPMI_SEND_MSG_CMD;		msg->data[2] = msg->rsp[3];		msg->data[3] = msg->rsp[6];                msg->data[4] = ((netfn + 1) << 2) | (msg->rsp[7] & 0x3);		msg->data[5] = ipmb_checksum(&(msg->data[3]), 2);		msg->data[6] = intf->my_address;                /* rqseq/lun */                msg->data[7] = (msg->rsp[7] & 0xfc) | (msg->rsp[4] & 0x3);		msg->data[8] = msg->rsp[8]; /* cmd */		msg->data[9] = IPMI_INVALID_CMD_COMPLETION_CODE;		msg->data[10] = ipmb_checksum(&(msg->data[6]), 4);		msg->data_size = 11;#ifdef DEBUG_MSGING	{		int m;		printk("Invalid command:");		for (m=0; m<msg->data_size; m++)			printk(" %2.2x", msg->data[m]);		printk("\n");	}#endif		intf->handlers->sender(intf->send_info, msg, 0);		rv = -1; /* We used the message, so return the value that			    causes it to not be freed or queued. */	} else {		/* Deliver the message to the user. */		spin_lock_irqsave(&intf->counter_lock, flags);		intf->handled_commands++;		spin_unlock_irqrestore(&intf->counter_lock, flags);		recv_msg = ipmi_alloc_recv_msg();		if (! recv_msg) {			/* We couldn't allocate memory for the                           message, so requeue it for handling                           later. */			rv = 1;		} else {			/* Extract the source address from the data. */			ipmb_addr = (struct ipmi_ipmb_addr *) &recv_msg->addr;			ipmb_addr->addr_type = IPMI_IPMB_ADDR_TYPE;			ipmb_addr->slave_addr = msg->rsp[6];			ipmb_addr->lun = msg->rsp[7] & 3;			ipmb_addr->channel = msg->rsp[3] & 0xf;			/* Extract the rest of the message information			   from the IPMB header.*/			recv_msg->user = user;			recv_msg->recv_type = IPMI_CMD_RECV_TYPE;			recv_msg->msgid = msg->rsp[7] >> 2;			recv_msg->msg.netfn = msg->rsp[4] >> 2;			recv_msg->msg.cmd = msg->rsp[8];			recv_msg->msg.data = recv_msg->msg_data;			/* We chop off 10, not 9 bytes because the checksum			   at the end also needs to be removed. */			recv_msg->msg.data_len = msg->rsp_size - 10;			memcpy(recv_msg->msg_data,			       &(msg->rsp[9]),			       msg->rsp_size - 10);			deliver_response(recv_msg);		}	}	return rv;}static int handle_lan_get_msg_rsp(ipmi_smi_t          intf,				  struct ipmi_smi_msg *msg){	struct ipmi_lan_addr  lan_addr;	struct ipmi_recv_msg  *recv_msg;	unsigned long         flags;	/* This is 13, not 12, because the response must contain a	 * completion code. */	if (msg->rsp_size < 13) {		/* Message not big enough, just ignore it. */		spin_lock_irqsave(&intf->counter_lock, flags);		intf->invalid_lan_responses++;		spin_unlock_irqrestore(&intf->counter_lock, flags);		return 0;	}	if (msg->rsp[2] != 0) {		/* An error getting the response, just ignore it. */		return 0;	}	lan_addr.addr_type = IPMI_LAN_ADDR_TYPE;	lan_addr.session_handle = msg->rsp[4];	lan_addr.remote_SWID = msg->rsp[8];	lan_addr.local_SWID = msg->rsp[5];	lan_addr.channel = msg->rsp[3] & 0x0f;	lan_addr.privilege = msg->rsp[3] >> 4;	lan_addr.lun = msg->rsp[9] & 3;	/* It's a response from a remote entity.  Look up the sequence	   number and handle the response. */	if (intf_find_seq(intf,			  msg->rsp[9] >> 2,			  msg->rsp[3] & 0x0f,			  msg->rsp[10],			  (msg->rsp[6] >> 2) & (~1),			  (struct ipmi_addr *) &(lan_addr),			  &recv_msg))	{		/* We were unable to find the sequence number,		   so just nuke the message. */		spin_lock_irqsave(&intf->counter_lock, flags);		intf->unhandled_lan_responses++;		spin_unlock_irqrestore(&intf->counter_lock, flags);		return 0;	}	memcpy(recv_msg->msg_data,	       &(msg->rsp[11]),	       msg->rsp_size - 11);	/* The other fields matched, so no need to set them, except           for netfn, which needs to be the response that was           returned, not the request value. */	recv_msg->msg.netfn = msg->rsp[6] >> 2;	recv_msg->msg.data = recv_msg->msg_data;	recv_msg->msg.data_len = msg->rsp_size - 12;	recv_msg->recv_type = IPMI_RESPONSE_RECV_TYPE;	spin_lock_irqsave(&intf->counter_lock, flags);	intf->handled_lan_responses++;	spin_unlock_irqrestore(&intf->counter_lock, flags);	deliver_response(recv_msg);	return 0;}static int handle_lan_get_msg_cmd(ipmi_smi_t          intf,				  struct ipmi_smi_msg *msg){	struct cmd_rcvr       *rcvr;	int                   rv = 0;	unsigned char         netfn;	unsigned char         cmd;	ipmi_user_t           user = NULL;	struct ipmi_lan_addr  *lan_addr;	struct ipmi_recv_msg  *recv_msg;	unsigned long         flags;	if (msg->rsp_size < 12) {		/* Message not big enough, just ignore it. */		spin_lock_irqsave(&intf->counter_lock, flags);		intf->invalid_commands++;		spin_unlock_irqrestore(&intf->counter_lock, flags);		return 0;	}	if (msg->rsp[2] != 0) {		/* An error getting the response, just ignore it. */		return 0;	}	netfn = msg->rsp[6] >> 2;	cmd = msg->rsp[10];	read_lock(&(intf->cmd_rcvr_lock));	if (intf->all_cmd_rcvr) {		user = intf->all_cmd_rcvr;	} else {		/* Find the command/netfn. */		list_for_each_entry(rcvr, &(intf->cmd_rcvrs), link) {			if ((rcvr->netfn == netfn) && (rcvr->cmd == cmd)) {				user = rcvr->user;				break;			}		}	}	read_unlock(&(intf->cmd_rcvr_lock));	if (user == NULL) {		/* We didn't find a user, deliver an error response. */		spin_lock_irqsave(&intf->counter_lock, flags);		intf->unhandled_commands++;		spin_unlock_irqrestore(&intf->counter_lock, flags);		rv = 0; /* Don't do anything with these messages, just			   allow them to be freed. */	} else {		/* Deliver the message to the user. */		spin_lock_irqsave(&intf->counter_lock, flags);		intf->handled_commands++;		spin_unlock_irqrestore(&intf->counter_lock, flags);		recv_msg = ipmi_alloc_recv_msg();		if (! recv_msg) {			/* We couldn't allocate memory for the                           message, so requeue it for handling                           later. */			rv = 1;		} else {			/* Extract the source address from the data. */			lan_addr = (struct ipmi_lan_addr *) &recv_msg->addr;			lan_addr->addr_type = IPMI_LAN_ADDR_TYPE;			lan_addr->session_handle = msg->rsp[4];			lan_addr->remote_SWID = msg->rsp[8];			lan_addr->local_SWID = msg->rsp[5];			lan_addr->lun = msg->rsp[9] & 3;			lan_addr->channel = msg->rsp[3] & 0xf;			lan_addr->privilege = msg->rsp[3] >> 4;			/* Extract the rest of the message information			   from the IPMB header.*/			recv_msg->user = user;			recv_msg->recv_type = IPMI_CMD_RECV_TYPE;			recv_msg->msgid = msg->rsp[9] >> 2;			recv_msg->msg.netfn = msg->rsp[6] >> 2;			recv_msg->msg.cmd = msg->rsp[10];			recv_msg->msg.data = recv_msg->msg_data;			/* We chop off 12, not 11 bytes because the checksum			   at the end also needs to be removed. */			recv_msg->msg.data_len = msg->rsp_size - 12;			memcpy(recv_msg->msg_data,			       &(msg->rsp[11]),			       msg->rsp_size - 12);			deliver_response(recv_msg);		}	}	return rv;}static void copy_event_into_recv_msg(struct ipmi_recv_msg *recv_msg,				     struct ipmi_smi_msg  *msg){	struct ipmi_system_interface_addr *smi_addr;		recv_msg->msgid = 0;	smi_addr = (struct ipmi_system_interface_addr *) &(recv_msg->addr);	smi_addr->addr_type = IPMI_SYSTEM_INTERFACE_ADDR_TYPE;	smi_addr->channel = IPMI_BMC_CHANNEL;	smi_addr->lun = msg->rsp[0] & 3;	recv_msg->recv_type = IPMI_ASYNC_EVENT_RECV_TYPE;	recv_msg->msg.netfn = msg->rsp[0] >> 2;	recv_msg->msg.cmd = msg->rsp[1];	memcpy(recv_msg->msg_data, &(msg->rsp[3]), msg->rsp_size - 3);	recv_msg->msg.data = recv_msg->msg_data;	recv_msg->msg.data_len = msg->rsp_size - 3;}/* This will be called with the intf->users_lock read-locked, so no need   to do that here. */static int handle_read_event_rsp(ipmi_smi_t          intf,				 struct ipmi_smi_msg *msg){	struct ipmi_recv_msg *recv_msg, *recv_msg2;	struct list_head     msgs;	ipmi_user_t          user;	int                  rv = 0;	int                  deliver_count = 0;	unsigned long        flags;	if (msg->rsp_size < 19) {		/* Message is too small to be an IPMB event. */		spin_lock_irqsave(&intf->counter_lock, flags);		intf->invalid_events++;		spin_unlock_irqrestore(&intf->counter_lock, flags);		return 0;	}	if (msg->rsp[2] != 0) {		/* An error getting the event, just ignore it. */		return 0;	}	INIT_LIST_HEAD(&msgs);	spin_lock_irqsave(&(intf->events_lock), flags);	spin_lock(&intf->counter_lock);	intf->events++;	spin_unlock(&intf->counter_lock);	/* Allocate and fill in one message for every user that is getting	   events. */	list_for_each_entry(user, &(intf->users), link) {		if (! user->gets_events)			continue;		recv_msg = ipmi_alloc_recv_msg();		if (! recv_msg) {			list_for_each_entry_safe(recv_msg, recv_msg2, &msgs, link) {				list_del(&recv_msg->link);				ipmi_free_recv_msg(recv_msg);			}			/* We couldn't allocate memory for the                           message, so requeue it for handling                           later. */			rv = 1;			goto out;		}		deliver_count++;		copy_event_into_recv_msg(recv_msg, msg);		recv_msg->user = user;		list_add_tail(&(recv_msg->link), &msgs);	}	if (deliver_count) {		/* Now deliver all the messages. */		list_for_each_entry_safe(recv_msg, recv_msg2, &msgs, link) {			list_del(&recv_msg->link);			deliver_response(recv_msg);		}	} else if (intf->waiting_events_count < MAX_EVENTS_IN_QUEUE) {		/* No one to receive the message, put it in queue if there's		   not already too many things in the queue. */		recv_msg = ipmi_alloc_recv_msg();		if (! recv_msg) {			/* We couldn't allocate memory for the                           message, so requeue it for handling                           later. */			rv = 1;			goto out;		}		copy_event_into_recv_msg(recv_msg, msg);		list_add_tail(&(recv_msg->link), &(intf->waiting_events));	} else {		/* There's too many things in the queue, discard this		   message. */		printk(KERN_WARNING PFX "Event queue full, discarding an"		       " incoming event\n");	} out:	spin_unlock_irqrestore(&(intf->events_lock), flags);	return rv;}static int handle_bmc_rsp(ipmi_smi_t          intf,			  struct ipmi_smi_msg *msg){	struct ipmi_recv_msg *recv_msg;	int                  found = 0;	struct ipmi_user     *user;	unsigned long        flags;	recv_msg = (struct ipmi_recv_msg *) msg->user_data;	/* Make sure the user still exists. */	list_for_each_entry(user, &(intf->users), link) {		if (user == recv_msg->user) {			/* Found it, so we can deliver it */			found = 1;			break;		}	}	if (!found) {		/* Special handling for NULL users. */		if (!recv_msg->user && intf->null_user_handler){			intf->null_user_handler(intf, msg);			spin_lock_irqsave(&intf->counter_lock, flags);			intf->handled_local_responses++;			spin_unlock_irqrestore(&intf->counter_lock, flags);		}else{			/* The user for the message went away, so give up. */			spin_lock_irqsave(&intf->counter_lock, flags);			intf->unhandled_local_responses++;			spin_unlock_irqrestore(&intf->counter_lock, flags);		}		ipmi_free_recv_msg(recv_msg);	} else {		struct ipmi_system_interface_addr *smi_addr;		spin_lock_irqsave(&intf->counter_lock, flags);		intf->handled_local_responses++;		spin_unlock_irqrestore(&intf->counter_lock, flags);		recv_msg->recv_type = IPMI_RESPONSE_RECV_TYPE;		recv_msg->msgid = msg->msgid;		smi_addr = ((struct ipmi_system_interface_addr *)			    &(recv_msg->addr));		smi_addr->addr_type = IPMI_SYSTEM_INTERFACE_ADDR_TYPE;		smi_addr->channel = IPMI_BMC_CHANNEL;		smi_addr->lun = msg->rsp[0] & 3;		

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -