From patchwork Tue Sep 25 04:06:25 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Andrew Jeffery X-Patchwork-Id: 974207 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from lists.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 42K7100nkjz9s3x for ; Tue, 25 Sep 2018 14:11:16 +1000 (AEST) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=aj.id.au Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=aj.id.au header.i=@aj.id.au header.b="dULbQdM2"; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=messagingengine.com header.i=@messagingengine.com header.b="cA70kNp1"; dkim-atps=neutral Received: from bilbo.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3]) by lists.ozlabs.org (Postfix) with ESMTP id 42K70z6RFPzF3KD for ; Tue, 25 Sep 2018 14:11:15 +1000 (AEST) Authentication-Results: lists.ozlabs.org; dmarc=none (p=none dis=none) header.from=aj.id.au Authentication-Results: lists.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=aj.id.au header.i=@aj.id.au header.b="dULbQdM2"; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=messagingengine.com header.i=@messagingengine.com header.b="cA70kNp1"; dkim-atps=neutral X-Original-To: skiboot@lists.ozlabs.org Delivered-To: skiboot@lists.ozlabs.org Authentication-Results: lists.ozlabs.org; spf=pass (mailfrom) smtp.mailfrom=aj.id.au (client-ip=64.147.123.25; helo=wout2-smtp.messagingengine.com; envelope-from=andrew@aj.id.au; receiver=) Authentication-Results: lists.ozlabs.org; dmarc=none (p=none dis=none) header.from=aj.id.au Authentication-Results: lists.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=aj.id.au header.i=@aj.id.au header.b="dULbQdM2"; dkim=pass (2048-bit key; unprotected) header.d=messagingengine.com header.i=@messagingengine.com header.b="cA70kNp1"; dkim-atps=neutral Received: from wout2-smtp.messagingengine.com (wout2-smtp.messagingengine.com [64.147.123.25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 42K6wG12mXzF3K7 for ; Tue, 25 Sep 2018 14:07:09 +1000 (AEST) Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailout.west.internal (Postfix) with ESMTP id 70386523; Tue, 25 Sep 2018 00:07:07 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute4.internal (MEProxy); Tue, 25 Sep 2018 00:07:07 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=aj.id.au; h=cc :date:from:in-reply-to:message-id:references:subject:to :x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=DJUvCVYCboiVWOI35 UCMpS0PJwVnFng506h8NRDZTh4=; b=dULbQdM2I7FFt5LumZeW4E1pmOBgU5LOO NyifCKKSP3KSHKVF5kHlbdKN8j39R/FIDLbfB7xNyS4JAynnq6XizkZpzmhwAv7W sKeWpsadXdauHulzFN8i9HhDd4Rm130WSg9qHTIMK45X2wjCjjMdY/AffWxGpYQG EPNadRuOWqk1L6EzLj53woDovnSU/uMQIY9OvUFjNFfI3gMkw/u1KZZl2nmYYef1 tXE8w1JKa+qc6KOOGHp1mnBSEkKxlGl912Gz2rn9fdd+8Mxoziodbz0+HGRW2Exs dk52VDQORkgdpB+SCQAmoyOg1MDRpNqKloMjfdZNcuAwPBg4EQjRA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:date:from:in-reply-to:message-id :references:subject:to:x-me-sender:x-me-sender:x-sasl-enc; s= fm3; bh=DJUvCVYCboiVWOI35UCMpS0PJwVnFng506h8NRDZTh4=; b=cA70kNp1 1jlMq8vn8BT5Wdf8GK1xKjSDOm2wkn35sLOZsy1mpHyDAuyOvMOLNUWonfykfMx7 lQXq7DSdPX9pBWQphxa3xHYSXjNBaOR59IKfEOuT6ivj/IorrhnajzH0GXXQ8dlj RLbjT/kvMRMpqDFCZCl4nv5NRFskh/4VgCUQGxY247swOqHT96lggCzDok9xVppT jIH2d6NVq0AdJsh/yripi8MOkRhIC/0/yRFJwL0XohBIEA7qz/VYUHMA3f1RQ8vK e63AVvRjhnpjallsstydNwCMNYGNN5pVSP+RQuR0BVizsba+c/sVuBPtExGcHa9/ RZ9eemfZdY61eQ== X-ME-Proxy: X-ME-Sender: Received: from dave.ibm.com (unknown [118.211.19.207]) by mail.messagingengine.com (Postfix) with ESMTPA id 0FAFBE467D; Tue, 25 Sep 2018 00:07:03 -0400 (EDT) From: Andrew Jeffery To: skiboot@lists.ozlabs.org Date: Tue, 25 Sep 2018 13:36:25 +0930 Message-Id: <20180925040635.5233-2-andrew@aj.id.au> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20180925040635.5233-1-andrew@aj.id.au> References: <20180925040635.5233-1-andrew@aj.id.au> Subject: [Skiboot] [PATCH v2 01/11] ipmi: Introduce registration for SEL command handlers X-BeenThere: skiboot@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Mailing list for skiboot development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: dkodihal@in.ibm.com, Andrew Jeffery , anoo@linux.ibm.com MIME-Version: 1.0 Errors-To: skiboot-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org Sender: "Skiboot" Signed-off-by: Andrew Jeffery --- hw/ipmi/ipmi-sel.c | 118 ++++++++++++++++++++++++++++++++++----------- include/ipmi.h | 5 ++ 2 files changed, 94 insertions(+), 29 deletions(-) diff --git a/hw/ipmi/ipmi-sel.c b/hw/ipmi/ipmi-sel.c index eb63147bdc52..cfcd1d424596 100644 --- a/hw/ipmi/ipmi-sel.c +++ b/hw/ipmi/ipmi-sel.c @@ -15,6 +15,10 @@ */ #define pr_fmt(fmt) "IPMI: " fmt +#include +#include +#include +#include #include #include #include @@ -37,10 +41,14 @@ #define SEL_NETFN_IBM 0x3a /* OEM SEL Commands */ +/* TODO: Move these to their respective source files */ #define CMD_AMI_POWER 0x04 #define CMD_AMI_PNOR_ACCESS 0x07 #define CMD_AMI_OCC_RESET 0x0e +/* XXX: Listed here for completeness, registered in libflash/ipmi-flash.c */ +#define CMD_OP_HIOMAP_EVENT 0x0f + #define SOFT_OFF 0x00 #define SOFT_REBOOT 0x01 @@ -137,21 +145,11 @@ struct ipmi_sel_panic_msg { }; static struct ipmi_sel_panic_msg ipmi_sel_panic_msg; +static LIST_HEAD(sel_handlers); + /* Forward declaration */ static void ipmi_elog_poll(struct ipmi_msg *msg); -void ipmi_sel_init(void) -{ - /* Already done */ - if (ipmi_sel_panic_msg.msg != NULL) - return; - - memset(&ipmi_sel_panic_msg, 0, sizeof(struct ipmi_sel_panic_msg)); - ipmi_sel_panic_msg.msg = ipmi_mkmsg(IPMI_DEFAULT_INTERFACE, - IPMI_RESERVE_SEL, ipmi_elog_poll, - NULL, NULL, IPMI_MAX_REQ_SIZE, 2); -} - /* * Allocate IPMI message: * For normal event, allocate memory using ipmi_mkmsg and for PANIC @@ -458,7 +456,7 @@ int ipmi_elog_commit(struct errorlog *elog_buf) #define ACCESS_DENIED 0x00 #define ACCESS_GRANTED 0x01 -static void sel_pnor(uint8_t access) +static void sel_pnor(uint8_t access, void *context __unused) { struct ipmi_msg *msg; uint8_t granted = ACCESS_GRANTED; @@ -501,7 +499,7 @@ static void sel_pnor(uint8_t access) } } -static void sel_power(uint8_t power) +static void sel_power(uint8_t power, void *context __unused) { switch (power) { case SOFT_OFF: @@ -562,7 +560,7 @@ static uint32_t occ_sensor_id_to_chip(uint8_t sensor, uint32_t *chip) return 0; } -static void sel_occ_reset(uint8_t sensor) +static void sel_occ_reset(uint8_t sensor, void *context __unused) { uint32_t chip; int rc; @@ -581,8 +579,77 @@ static void sel_occ_reset(uint8_t sensor) prd_occ_reset(chip); } +struct ipmi_sel_handler { + uint8_t oem_cmd; + void (*fn)(uint8_t data, void *context); + void *context; + struct list_node node; +}; + +int ipmi_sel_register(uint8_t oem_cmd, + void (*fn)(uint8_t data, void *context), + void *context) +{ + struct ipmi_sel_handler *handler; + + list_for_each(&sel_handlers, handler, node) { + if (handler->oem_cmd == oem_cmd) { + prerror("Handler for SEL command 0x%02x already registered\n", + oem_cmd); + return -EINVAL; + } + } + + handler = malloc(sizeof(*handler)); + if (!handler) + return -ENOMEM; + + handler->oem_cmd = oem_cmd; + handler->fn = fn; + handler->context = context; + + list_add(&sel_handlers, &handler->node); + + return 0; +} + +void ipmi_sel_init(void) +{ + int rc; + + /* Already done */ + if (ipmi_sel_panic_msg.msg != NULL) + return; + + memset(&ipmi_sel_panic_msg, 0, sizeof(struct ipmi_sel_panic_msg)); + ipmi_sel_panic_msg.msg = ipmi_mkmsg(IPMI_DEFAULT_INTERFACE, + IPMI_RESERVE_SEL, ipmi_elog_poll, + NULL, NULL, IPMI_MAX_REQ_SIZE, 2); + + /* Hackishly register these old-style handlers here for now */ + /* TODO: Move them to their appropriate source files */ + rc = ipmi_sel_register(CMD_AMI_POWER, sel_power, NULL); + if (rc < 0) { + prerror("Failed to register SEL handler for %s", + stringify(CMD_AMI_POWER)); + } + + rc = ipmi_sel_register(CMD_AMI_OCC_RESET, sel_occ_reset, NULL); + if (rc < 0) { + prerror("Failed to register SEL handler for %s", + stringify(CMD_AMI_OCC_RESET)); + } + + rc = ipmi_sel_register(CMD_AMI_PNOR_ACCESS, sel_pnor, NULL); + if (rc < 0) { + prerror("Failed to register SEL handler for %s", + stringify(CMD_AMI_PNOR_ACCESS)); + } +} + void ipmi_parse_sel(struct ipmi_msg *msg) { + struct ipmi_sel_handler *handler; struct oem_sel sel; assert(msg->resp_size <= 16); @@ -606,19 +673,12 @@ void ipmi_parse_sel(struct ipmi_msg *msg) return; } - switch (sel.cmd) { - case CMD_AMI_POWER: - sel_power(sel.data[0]); - break; - case CMD_AMI_OCC_RESET: - sel_occ_reset(sel.data[0]); - break; - case CMD_AMI_PNOR_ACCESS: - sel_pnor(sel.data[0]); - break; - default: - prlog(PR_WARNING, - "unknown OEM SEL command %02x received\n", - sel.cmd); + list_for_each(&sel_handlers, handler, node) { + if (handler->oem_cmd == sel.cmd) { + handler->fn(sel.data[0], handler->context); + return; + } } + + prlog(PR_WARNING, "unknown OEM SEL command %02x received\n", sel.cmd); } diff --git a/include/ipmi.h b/include/ipmi.h index 0acfbf563ca5..a2735f16b551 100644 --- a/include/ipmi.h +++ b/include/ipmi.h @@ -241,6 +241,11 @@ void ipmi_register_backend(struct ipmi_backend *backend); /* Allocate IPMI SEL panic message */ void ipmi_sel_init(void); +/* Register SEL handler with IPMI core */ +int ipmi_sel_register(uint8_t oem_cmd, + void (*handler)(uint8_t data, void *context), + void *context); + /* Register rtc ipmi commands with as opal callbacks. */ void ipmi_rtc_init(void);