MsgHndlrTask.c 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808
  1. /*
  2. * Brief: Receive message from Interface and send response to original interface.
  3. Process all IPMI standard command and oem command.
  4. * Author: Jimbo_Zhang@outlook.com
  5. * Date: 2019-9-13, the Mid-autumn Festival;
  6. */
  7. #include <stdio.h>
  8. #include <sys/stat.h>
  9. #include <sys/socket.h>
  10. #include <sys/un.h>
  11. #include <sys/prctl.h>
  12. #include <errno.h>
  13. #include <fcntl.h>
  14. #include <stdio.h>
  15. #include <stdlib.h>
  16. #include <unistd.h>
  17. #include <string.h>
  18. #include <pthread.h>
  19. #include "MsgHndlr.h"
  20. #include "PDKCmds.h"
  21. #include "App.h"
  22. #include "PICMG.h"
  23. #include "Bridge.h"
  24. #include "SensorEvent.h"
  25. #include "Chassis.h"
  26. #include "Storage.h"
  27. #include "cmdselect.h"
  28. #include "com_IPMI_App.h"
  29. #include "com_IPMI_Storage.h"
  30. #include "com_IPMI_SDR.h"
  31. #include "DeviceConfig.h"
  32. //#include "main.h"
  33. #include <string.h>
  34. #include "main.h"
  35. static void ProcessIPMIReq (MsgPkt_T* pReq, MsgPkt_T* pRes);
  36. static void PendingBridgeResTimerTask (void);
  37. static void PendingSeqNoTimerTask (void);
  38. MsgHndlrTbl_T m_MsgHndlrTbl [] = //notice!
  39. {
  40. { NETFN_APP, g_App_CmdHndlr },
  41. { NETFN_CHASSIS, g_Chassis_CmdHndlr },
  42. { NETFN_BRIDGE, g_Bridge_CmdHndlr },
  43. { NETFN_SENSOR, g_SensorEvent_CmdHndlr },
  44. { NETFN_STORAGE, g_Storage_CmdHndlr },
  45. { NETFN_TRANSPORT, g_Config_CmdHndlr },
  46. // { NETFN_AMI, (CmdHndlrMap_T*)g_AMI_CmdHndlr },
  47. { 0, 0 },
  48. };
  49. GroupExtnMsgHndlrTbl_T m_GroupExtnMsgHndlrTbl [] = //jimbo add
  50. {
  51. {0, 0},
  52. };
  53. TimerTaskTbl_T m_TimerTaskTbl [20] =
  54. {
  55. // { 1, PEFTimerTask },
  56. // { 1, PETAckTimerTask },
  57. // { 1, PEFStartDlyTimerTask },
  58. { 1, SessionTimerTask },
  59. // { 1, PendingBridgeResTimerTask },
  60. // { 1, PendingSeqNoTimerTask },
  61. // { 1, FlashTimerTask },
  62. // #if FRB_SUPPORT == 1
  63. // { 1, FRB3TimerTask },
  64. // #endif /* #if FRB_SUPPORT == 1 */
  65. //
  66. // #if SERIAL_MODEM_CONNECTION_ACTIVITY != UNIMPLEMENTED
  67. // { 2, SerialModemPingTask },
  68. // #endif /* SERIAL_MODEM_CONNECTION_ACTIVITY */
  69. //
  70. // { 1, MonitorPassword },
  71. { 1, UDSSessionTimerTask },
  72. };
  73. //PendingBridgedResTbl_T m_PendingBridgedResTbl[MAX_PENDING_BRIDGE_RES];
  74. PendingBridgedResTbl_T m_PendingBridgedResTbl[MAX_PENDING_BRIDGE_TBL][MAX_PENDING_BRIDGE_RES];
  75. PendingSeqNoTbl_T m_PendingSeqNoTbl[16][MAX_PENDING_SEQ_NO];
  76. KCSBridgeResInfo_T m_KCSBridgeResInfo;
  77. int gFd_MsgHndlrIfc;
  78. TLS_T g_tls;
  79. /*!
  80. \brief Message handler Task. Process all standard and oem ipmi message form interface, and send response back.
  81. \param[in] none
  82. \param[out] none
  83. \retval none
  84. */
  85. void *MsgHndlrTask( void *pArg )
  86. {
  87. MsgPkt_T reqMsgPkt;
  88. MsgPkt_T resMsgPkt;
  89. uint8_t channelinit = 0xF;
  90. printf("MsgHndlrTask start...\r\n");
  91. prctl(PR_SET_NAME,__FUNCTION__,0,0,0);
  92. //create
  93. if(-1 != access(MSG_HNDLR_Q, F_OK))
  94. {
  95. remove(MSG_HNDLR_Q);
  96. }
  97. if(0 != mkfifo (MSG_HNDLR_Q, 0777))
  98. {
  99. printf("%s: Create %s fifo failed! %s\n", __FUNCTION__, MSG_HNDLR_Q, strerror(errno));
  100. return (void*)-1;
  101. }
  102. gFd_MsgHndlrIfc = open (MSG_HNDLR_Q, O_RDWR);
  103. if(-1 == gFd_MsgHndlrIfc)
  104. {
  105. printf("%s: Open %s fifo failed! %s\n", __FUNCTION__, MSG_HNDLR_Q, strerror(errno));
  106. return (void*)-1;
  107. }
  108. pthread_key_create(&g_tls.CurSessionID,NULL);
  109. pthread_key_create(&g_tls.CurPrivLevel,NULL);
  110. pthread_key_create(&g_tls.CurChannel,NULL);
  111. pthread_key_create(&g_tls.CurKCSIfcNum,NULL);
  112. pthread_key_create(&g_tls.CurSessionType,NULL);
  113. pthread_key_create(&g_tls.OwnerLUN,NULL);
  114. pthread_setspecific(g_tls.CurChannel,&channelinit);
  115. while(1)
  116. {
  117. while(GetMsg(gFd_MsgHndlrIfc, &reqMsgPkt, WAIT_INFINITE) != 0);
  118. // printf("Mrx: ");
  119. // int i;
  120. // for(i=0;i<reqMsgPkt.Size;i++)
  121. // printf("%#x ", reqMsgPkt.Data[i]);
  122. // printf("\n");
  123. pthread_setspecific(g_tls.CurChannel,&reqMsgPkt.Channel);
  124. pthread_setspecific(g_tls.CurPrivLevel,&reqMsgPkt.Privilege);
  125. pthread_setspecific(g_tls.CurSessionID,&reqMsgPkt.SessionID);
  126. pthread_setspecific(g_tls.CurSessionType,&reqMsgPkt.SessionType);
  127. pthread_setspecific(g_tls.OwnerLUN,&reqMsgPkt.NetFnLUN);
  128. ProcessIPMIReq(&reqMsgPkt, &resMsgPkt);
  129. //update checksum2
  130. resMsgPkt.Data[resMsgPkt.Size-1] = CalculateCheckSum2(resMsgPkt.Data, resMsgPkt.Size-1);
  131. if(g_BMCInfo.IpmiConfig.UDSIfcSupport == 0x01 && (reqMsgPkt.SrcQ == gFdUdsRes))
  132. {
  133. if (resMsgPkt.Size == sizeof(IPMIUDSMsg_T) && (NORMAL_RESPONSE == resMsgPkt.Param) )
  134. {
  135. continue;
  136. }
  137. resMsgPkt.Size = resMsgPkt.Size+1;
  138. SwapUDSIPMIMsg(&reqMsgPkt,&resMsgPkt);
  139. resMsgPkt.Data[resMsgPkt.Size] = 0;
  140. }
  141. if(SYS_IFC_CHANNEL == reqMsgPkt.Channel)
  142. {
  143. /* Skip current request if no response from Command Handler */
  144. if (!resMsgPkt.Size && (NO_RESPONSE == resMsgPkt.Param) )
  145. {
  146. continue;
  147. }
  148. resMsgPkt.SessionID = reqMsgPkt.SessionID;
  149. }
  150. // printf("Mtx: ");
  151. // for(i=0;i<resMsgPkt.Size;i++)
  152. // printf("%#x ", resMsgPkt.Data[i]);
  153. // printf("\n");
  154. //send response pkt to source queue.
  155. PostMsg(resMsgPkt.SrcQ, &resMsgPkt);
  156. }
  157. }
  158. /**
  159. *@fn ProcessIPMIReq
  160. *@brief Processes the requested IPMI command
  161. *@param pReq Request of the command
  162. *@param pRes Response for the requested command
  163. *@return none
  164. */
  165. static void
  166. ProcessIPMIReq (MsgPkt_T* pReq, MsgPkt_T* pRes)
  167. {
  168. CmdHndlrMap_T * pCmdHndlrMap;
  169. uint32_t HdrOffset = 0;
  170. uint8_t CmdOverride = 1;
  171. int8_t MsgHndlrMapGot=0;
  172. uint8_t PBTbl = PRIMARY_PB_TBL;
  173. // msgHndlr_dbg_printf ("Processing IPMI Packet.\r\n");
  174. /* Set the Cmd and Net function in response packet */
  175. pRes->Cmd = pReq->Cmd;
  176. pRes->NetFnLUN = pReq->NetFnLUN;
  177. pRes->Channel = pReq->Channel;
  178. pRes->SrcQ = pReq->SrcQ;
  179. /* Normal IPMI Command response */
  180. pRes->Param = PARAM_NORMAL_RESPONSE;
  181. if ((SYS_IFC_CHANNEL != pReq->Channel) && (USB_CHANNEL != pReq->Channel) && (UDS_CHANNEL != pReq->Channel))
  182. {
  183. //printf("log 1, pReq->Channel: %#x\n", pReq->Channel);
  184. HdrOffset = sizeof (IPMIMsgHdr_T);
  185. pReq->Size = pReq->Size - HdrOffset - 1;
  186. }
  187. if(UDS_CHANNEL == pReq->Channel)
  188. {
  189. //printf("log 2, pReq->Size: %d, HdrOffset: %d\n", pReq->Size, HdrOffset);
  190. HdrOffset = sizeof(IPMIUDSMsg_T);
  191. pReq->Size = pReq->Size -HdrOffset - 1;
  192. }
  193. SwapIPMIMsgHdr((IPMIMsgHdr_T*)pReq->Data, (IPMIMsgHdr_T*)pRes->Data);
  194. pRes->Size = HdrOffset + sizeof(uint8_t);
  195. pthread_setspecific(g_tls.CurSessionID,&pReq->SessionID);
  196. if(IsCommandEnabled(NET_FN(pReq->NetFnLUN), &pReq->Data[HdrOffset], pReq->Cmd) != 0)
  197. {
  198. pRes->Data [HdrOffset] = CC_INV_CMD;
  199. printf ("Invalid Net Function 0x%x or Invalid Command 0x%x\n",NET_FN(pReq->NetFnLUN), pReq->Cmd);
  200. pRes->Size += 2;
  201. return;
  202. }
  203. //Get oem command map
  204. MsgHndlrMapGot = PDKGetOEMMsgHndlrMap(NET_FN(pReq->NetFnLUN),&pCmdHndlrMap);
  205. if(MsgHndlrMapGot == 0)
  206. {
  207. CmdOverride = GetCmdHndlr(pReq,pRes,pCmdHndlrMap,HdrOffset,CmdOverride,&pCmdHndlrMap);
  208. }
  209. //get standard ipmi command map
  210. if((CmdOverride == 0 || MsgHndlrMapGot == -1) ) //OEM commands have no command map.
  211. {
  212. if (0 != GetMsgHndlrMap (NET_FN (pReq->NetFnLUN), &pCmdHndlrMap))
  213. {
  214. // if(pBMCInfo->IpmiConfig.GrpExtnSupport == 1)
  215. // {
  216. if (0 != GroupExtnGetMsgHndlrMap (NET_FN (pReq->NetFnLUN), pReq->Data [HdrOffset], &pCmdHndlrMap) )
  217. {
  218. pRes->Data [HdrOffset] = CC_INV_CMD;
  219. printf ("MsgHndlr.c : Invalid Net Function 0x%x or Invalid Command 0x%x\n",NET_FN(pReq->NetFnLUN), pReq->Cmd);
  220. pRes->Size += 2;
  221. return;
  222. }
  223. // }
  224. // else
  225. // {
  226. // pRes->Data [HdrOffset] = CC_INV_CMD;
  227. // printf ("MsgHndlr.c : Invalid Net Function 0x%x\n",NET_FN(pReq->NetFnLUN));
  228. // pRes->Size += 2;
  229. // return;
  230. // }
  231. }
  232. if(GetCmdHndlr(pReq,pRes,pCmdHndlrMap,HdrOffset,CmdOverride,&pCmdHndlrMap) == FALSE)
  233. {
  234. pRes->Data [HdrOffset] = CC_INV_CMD;
  235. pRes->Size += 2;
  236. //printf("log 3\n");
  237. return;
  238. }
  239. }
  240. /* Check for the request size */
  241. if (0xff != pCmdHndlrMap->ReqLen)
  242. {
  243. /* Check for invalid request size */
  244. if (pCmdHndlrMap->ReqLen != pReq->Size)
  245. {
  246. printf("Warning: Request data len error, require %d\n", pCmdHndlrMap->ReqLen);
  247. pRes->Data [HdrOffset] = CC_REQ_INV_LEN;
  248. pRes->Size += 2;
  249. return;
  250. }
  251. }
  252. pRes->Size = pCmdHndlrMap->CmdHndlr (&pReq->Data [HdrOffset], pReq->Size, &pRes->Data [HdrOffset]) + HdrOffset + 1;
  253. // //send message command
  254. // if( (CMD_SEND_MSG == pReq->Cmd) && (NETFN_APP == pReq->NetFnLUN >> 2))
  255. // {
  256. // printf("log 4\n");
  257. // int Offset = 0;
  258. // uint8_t SeqNum = g_BMCInfo.SendMsgSeqNum;
  259. // if ((0 == pRes->Size) &&
  260. // ((g_BMCInfo.IpmiConfig.PrimaryIPMBSupport == 0x01 && PRIMARY_IPMB_CHANNEL == pRes->Channel) ||
  261. // (g_BMCInfo.IpmiConfig.SecondaryIPMBSupport == 0x01 && SECONDARY_IPMB_CHANNEL == pRes->Channel)) )
  262. // {
  263. // pRes->Param = PARAM_NO_RESPONSE;
  264. // Offset = HdrOffset + 2;
  265. // }
  266. // else if (HdrOffset == pRes->Size)
  267. // {
  268. // Offset = HdrOffset + 1;
  269. // }
  270. // PBTbl = ( ((pReq->Data[sizeof (IPMIMsgHdr_T)] & 0x0F) == SECONDARY_IPMB_CHANNEL) ? SECONDARY_PB_TBL : PRIMARY_PB_TBL );
  271. // while(TRUE)
  272. // {
  273. // if ( (TRUE == m_PendingBridgedResTbl[PBTbl][SeqNum].Used) &&
  274. // (0 == memcmp (&m_PendingBridgedResTbl[PBTbl][SeqNum].ReqMsgHdr, &pReq->Data[Offset], sizeof (IPMIMsgHdr_T))) )
  275. // {
  276. // printf("---> log 4.1\n");
  277. // memcpy (&m_PendingBridgedResTbl[PBTbl][SeqNum].ResMsgHdr, pRes->Data, sizeof (IPMIMsgHdr_T));
  278. // break;
  279. // }
  280. // else
  281. // {
  282. // SeqNum = (SeqNum - 1) & 0x3F;
  283. // if(SeqNum == g_BMCInfo.SendMsgSeqNum)
  284. // {
  285. // break;
  286. // }
  287. // }
  288. // }
  289. // }
  290. // printf("log 5\n");
  291. return;
  292. }
  293. /**
  294. *@fn CalculateChecksum2
  295. *@brief Calculates the checksum
  296. *@param Pkt Pointer to the data for the checksum to be calculated
  297. *@param Len Size of data for checksum calculation
  298. *@return Returns the checksum value
  299. */
  300. uint8_t CalculateCheckSum2 (uint8_t* Pkt, uint32_t Len)
  301. {
  302. uint8_t Sum;
  303. uint32_t i;
  304. /* Get Checksum 2 */
  305. Sum = 0;
  306. for (i = 3; i < Len; i++)
  307. {
  308. Sum += Pkt [i];
  309. }
  310. return (uint8_t)(0xFF & (0x100 - Sum));
  311. }
  312. /**
  313. *@fn GetMsgHndlrMap
  314. *@brief Gets the exact command Handler by comparing NetFn
  315. *@param Netfn -NetFunction of the Cmd to execute
  316. *@param pCmdHndlrMap Pointer to the Command Handler
  317. *@return Returns 0 on success
  318. * Returns -1 on failure
  319. */
  320. int
  321. GetMsgHndlrMap (uint8_t NetFn, CmdHndlrMap_T ** pCmdHndlrMap)
  322. {
  323. int i;
  324. /* Get the command handler corresponding to the net function */
  325. for (i = 0; i < sizeof(m_MsgHndlrTbl)/sizeof(m_MsgHndlrTbl[0]); i++) //pBMCInfo->MsgHndlrTblSize
  326. {
  327. if (m_MsgHndlrTbl [i].NetFn == NetFn) { break; }
  328. }
  329. /* Check if we have not found our net function */
  330. if (i == sizeof(m_MsgHndlrTbl)/sizeof(m_MsgHndlrTbl[0]) )
  331. {
  332. return -1;
  333. }
  334. /* Get the handler corresponding to the command */
  335. *pCmdHndlrMap = (CmdHndlrMap_T*)m_MsgHndlrTbl [i].CmdHndlrMap;
  336. return 0;
  337. }
  338. /**
  339. *@fn GetCmdHndlr
  340. *@brief Picks up the exact command to execute by comparing Cmd no.
  341. *@param pReq Request buffer for the command
  342. *@param pRes Response buffer for the command
  343. *@param pCmdHndlrMap
  344. *@param HdrOffset
  345. *@param CmdOverride
  346. *@param CmdHndlr
  347. *@return Returns TRUE on success
  348. * Returns FALSE on failure
  349. */
  350. int GetCmdHndlr(MsgPkt_T* pReq,MsgPkt_T* pRes,CmdHndlrMap_T* pCmdHndlrMap,
  351. uint32_t HdrOffset,uint8_t CmdOverride,CmdHndlrMap_T** CmdHndrl )
  352. {
  353. int i=0;
  354. while (1)
  355. {
  356. /**
  357. * If we reached the end of the Command Handler map - invalid command
  358. **/
  359. if (0 == pCmdHndlrMap->CmdHndlr)
  360. {
  361. if(CmdOverride == FALSE)
  362. {
  363. pRes->Data [HdrOffset] = CC_INV_CMD;
  364. printf( "Warning: MsgHndlr.c : Invalid Command %#x\r\n", pReq->Cmd );
  365. }
  366. return FALSE;
  367. }
  368. if (pCmdHndlrMap->Cmd == pReq->Cmd)
  369. {
  370. break;
  371. }
  372. i++;
  373. pCmdHndlrMap++;
  374. }
  375. *CmdHndrl = pCmdHndlrMap;
  376. return TRUE;
  377. }
  378. /**
  379. *@fn GroupExtnGetMsgHndlrMap
  380. *@brief Gets the exact command Handler by comparing NetFn
  381. *@param Netfn -NetFunction of the Cmd to execute
  382. *@GroupExtnCode - Group Extension code
  383. *@param pCmdHndlrMap Pointer to the Command Handler
  384. *@return Returns 0 on success
  385. * Returns -1 on failure
  386. */
  387. int
  388. GroupExtnGetMsgHndlrMap (uint8_t NetFn, uint8_t GroupExtnCode, CmdHndlrMap_T ** pCmdHndlrMap)
  389. {
  390. int i;
  391. /* Get the command handler corresponding to the net function */
  392. for (i = 0; i < sizeof (m_GroupExtnMsgHndlrTbl) / sizeof (m_GroupExtnMsgHndlrTbl [0]); i++)
  393. {
  394. if ((m_GroupExtnMsgHndlrTbl [i].NetFn == NetFn) && (m_GroupExtnMsgHndlrTbl [i].GroupExtnCode == GroupExtnCode))
  395. {
  396. break;
  397. }
  398. }
  399. /* Check if we have not found our net function */
  400. if (i == sizeof (m_GroupExtnMsgHndlrTbl) / sizeof (m_GroupExtnMsgHndlrTbl[0]))
  401. {
  402. return -1;
  403. }
  404. // printf("---> GroupExtnGetMsgHndlrMap successful, i=%d\n",i);
  405. /* Get the handler corresponding to the command */
  406. *pCmdHndlrMap = (CmdHndlrMap_T*)m_GroupExtnMsgHndlrTbl [i].CmdHndlrMap;
  407. return 0;
  408. }
  409. /*------------------------------------------------------------------
  410. *@fn RespondSendMessage
  411. *@brief Frames the Response packet when a IPMB destination is
  412. * unavialable
  413. *
  414. *@param pReq: Request Message Packet address
  415. *@param Status Status of SendIPMBPkt method
  416. *@param BMCInst: BMC Instance Number
  417. *
  418. *@return none
  419. *-----------------------------------------------------------------*/
  420. void RespondSendMessage ( MsgPkt_T* pReq, uint8_t Status)
  421. {
  422. uint8_t PBTbl = PRIMARY_PB_TBL;
  423. MsgPkt_T ResPkt;
  424. IPMIMsgHdr_T* pIPMIResHdr = ( IPMIMsgHdr_T*)ResPkt.Data;
  425. IPMIMsgHdr_T* pIPMIReqHdr = ( IPMIMsgHdr_T*)pReq->Data;
  426. uint8_t SeqNum = NET_FN(pIPMIReqHdr->RqSeqLUN);
  427. int QueueFd;
  428. /* Check for pending responses */
  429. PBTbl = ( (pReq->Channel == SECONDARY_IPMB_CHANNEL) ? SECONDARY_PB_TBL : PRIMARY_PB_TBL );
  430. if ( (TRUE == m_PendingBridgedResTbl[PBTbl][SeqNum].Used) &&
  431. (NET_FN(pIPMIReqHdr->RqSeqLUN) == SeqNum) &&
  432. (NET_FN(pIPMIReqHdr->NetFnLUN) == NET_FN(m_PendingBridgedResTbl[PBTbl][SeqNum].ReqMsgHdr.NetFnLUN )) &&
  433. (pIPMIReqHdr->Cmd == m_PendingBridgedResTbl[PBTbl][SeqNum].ReqMsgHdr.Cmd) &&
  434. (pIPMIReqHdr->ResAddr == m_PendingBridgedResTbl[PBTbl][SeqNum].ReqMsgHdr.ResAddr) )
  435. {
  436. memcpy (pIPMIResHdr, &m_PendingBridgedResTbl[PBTbl][SeqNum].ResMsgHdr.IPMIMsgHdr, sizeof (IPMIMsgHdr_T));
  437. if (STATUS_OK == Status)
  438. {
  439. if ( ( m_PendingBridgedResTbl[PBTbl][SeqNum].DestQ == gFd_PrimaryIpmbIfcQ) ||
  440. (m_PendingBridgedResTbl[PBTbl][SeqNum].DestQ == gFd_SecondaryIpmbIfcQ) ||
  441. (ORIGIN_SENDMSG != m_PendingBridgedResTbl[PBTbl][SeqNum].OriginSrc) )
  442. {
  443. return;
  444. }
  445. ResPkt.Data [sizeof(IPMIMsgHdr_T)] = CC_NORMAL;
  446. }
  447. else if (STATUS_FAIL == Status)
  448. {
  449. ResPkt.Data [sizeof(IPMIMsgHdr_T)] = CC_NO_ACK_FROM_SLAVE;
  450. }
  451. else
  452. {
  453. ResPkt.Data [sizeof(IPMIMsgHdr_T)] = CC_UNSPECIFIED_ERR;
  454. }
  455. ResPkt.Size = sizeof (IPMIMsgHdr_T) + 1 + 1; // IPMI Header + Completion Code + Second Checksum
  456. ResPkt.Cmd = pIPMIResHdr->Cmd;
  457. ResPkt.NetFnLUN = pIPMIReqHdr->NetFnLUN;
  458. ResPkt.Channel = pReq->Channel;
  459. /* Calculate the Second CheckSum */
  460. ResPkt.Data[ResPkt.Size - 1] = CalculateCheckSum2 (ResPkt.Data, ResPkt.Size-1);
  461. ResPkt.Param = BRIDGING_REQUEST;
  462. if (m_PendingBridgedResTbl[PBTbl][SeqNum].DestQ == gFd_LanIfcQ)
  463. {
  464. QueueFd = gFd_LanResQ;
  465. }
  466. // else if (0 == strcmp ((char *)m_PendingBridgedResTbl[PBTbl][SeqNum].DestQ, SerialQueueName))
  467. // {
  468. // //ResPkt.SessionID = m_PendingBridgedResTbl[i].ResMsgHdr.RqSeqLUN;
  469. // strcpy (QueueName, SERIAL_RES_Q);
  470. // }
  471. else if ( (m_PendingBridgedResTbl[PBTbl][SeqNum].DestQ == gFd_PrimaryIpmbIfcQ) ||
  472. (m_PendingBridgedResTbl[PBTbl][SeqNum].DestQ == gFd_SecondaryIpmbIfcQ) )
  473. {
  474. QueueFd = m_PendingBridgedResTbl[PBTbl][SeqNum].DestQ;
  475. }
  476. else
  477. {
  478. /* PDK Hook to format Pending Bridge Response Packet for other destinations */
  479. // if(g_PDKHandle[PDK_FORMATBRIDGERESPKT] != NULL)
  480. {
  481. SwapIPMIMsgHdr ( pIPMIReqHdr, pIPMIResHdr);
  482. // ( (void (*)(MsgPkt_T *, int) ) g_PDKHandle[PDK_FORMATBRIDGERESPKT]) ( &ResPkt, BMCInst);
  483. }
  484. QueueFd = m_PendingBridgedResTbl[PBTbl][SeqNum].DestQ;
  485. }
  486. if (STATUS_OK != Status)
  487. {
  488. m_PendingBridgedResTbl[PBTbl][SeqNum].Used = FALSE;
  489. }
  490. /* Post the data to Destination Interface queue */
  491. PostMsg (QueueFd, &ResPkt);
  492. }
  493. }
  494. /**
  495. *@fn PendingBridgeResTimerTask
  496. *@brief Sends the timeout message to response queue
  497. * if the message does not turn out within send message timeout
  498. *@return none
  499. */
  500. static void
  501. PendingBridgeResTimerTask (void)
  502. {
  503. uint8_t i;
  504. uint8_t PBTbl = PRIMARY_PB_TBL;
  505. int QueueFd = 0;
  506. printf("-> PendingBridgeResTimerTask\n");
  507. /* Check for any pending responses */
  508. for( PBTbl=0; PBTbl < MAX_PENDING_BRIDGE_TBL; PBTbl++)
  509. {
  510. for (i = 0; i < sizeof (m_PendingBridgedResTbl[0])/sizeof (m_PendingBridgedResTbl[0][0]); i++)
  511. {
  512. if (TRUE == m_PendingBridgedResTbl[PBTbl][i].Used)
  513. {
  514. m_PendingBridgedResTbl[PBTbl][i].TimeOut--;
  515. if (0 == m_PendingBridgedResTbl[PBTbl][i].TimeOut)
  516. {
  517. MsgPkt_T Timeout;
  518. IPMIMsgHdr_T* pIPMIMsgHdr = (IPMIMsgHdr_T*) Timeout.Data;
  519. /* Fill the response packet */
  520. SwapIPMIMsgHdr (&m_PendingBridgedResTbl[PBTbl][i].ReqMsgHdr, pIPMIMsgHdr);
  521. // slog(LANQueueName,"%s%d",LAN_IFC_Q,BMCInst);
  522. // sprintf(PrimaryIPMBQueueName,"%s%d",IPMB_PRIMARY_IFC_Q,BMCInst);
  523. // sprintf(SecondaryIPMBQueueName,"%s%d",IPMB_SECONDARY_IFC_Q,BMCInst);
  524. // sprintf(SerialQueueName,"%s%d",SERIAL_IFC_Q,BMCInst);
  525. if(PBTbl == PRIMARY_PB_TBL)
  526. {
  527. pIPMIMsgHdr->ReqAddr = g_BMCInfo.IpmiConfig.PrimaryIPMBAddr;
  528. }
  529. else if(PBTbl == SECONDARY_PB_TBL)
  530. {
  531. pIPMIMsgHdr->ReqAddr = g_BMCInfo.IpmiConfig.SecondaryIPMBAddr;
  532. }
  533. else
  534. {
  535. printf("Invalid PBTbl\n");;//pIPMIMsgHdr->ReqAddr = pBMCInfo->IpmiConfig.BMCSlaveAddr;
  536. }
  537. Timeout.Data [sizeof(IPMIMsgHdr_T)] = CC_TIMEOUT;
  538. Timeout.Size = sizeof (IPMIMsgHdr_T) + 1 + 1; // IPMI Header + Completion Code + Second Checksum
  539. /* Calculate the Second CheckSum */
  540. Timeout.Data[Timeout.Size - 1] = CalculateCheckSum2 (Timeout.Data, Timeout.Size-1);
  541. Timeout.Param = BRIDGING_REQUEST;
  542. if (m_PendingBridgedResTbl[PBTbl][i].DestQ == gFd_LanIfcQ)
  543. {
  544. int j;
  545. for (j = Timeout.Size - 1; j >= 0; --j)
  546. {
  547. Timeout.Data [j+1] = Timeout.Data [j];
  548. }
  549. Timeout.Data[0] = m_PendingBridgedResTbl[PBTbl][i].SrcSessionHandle;
  550. Timeout.Size++;
  551. Timeout.Cmd = PAYLOAD_IPMI_MSG;
  552. QueueFd = gFd_LanIfcQ;
  553. }
  554. // else if (0 == strcmp ((char *)m_PendingBridgedResTbl[PBTbl][i].DestQ, SerialQueueName))
  555. // {
  556. // int j;
  557. // for (j = Timeout.Size - 1; j >= 0; --j)
  558. // {
  559. // Timeout.Data [j+1] = Timeout.Data [j];
  560. // }
  561. // Timeout.Data[0] = m_PendingBridgedResTbl[PBTbl][i].SrcSessionHandle;
  562. // Timeout.Size++;
  563. // Timeout.Cmd = PAYLOAD_IPMI_MSG;
  564. // strcpy(QueueName, SERIAL_IFC_Q);
  565. // }
  566. else if (g_BMCInfo.IpmiConfig.PrimaryIPMBSupport == 1 && m_PendingBridgedResTbl[PBTbl][i].DestQ == gFd_PrimaryIpmbIfcQ)
  567. {
  568. int j;
  569. for (j = Timeout.Size - 1; j >= 0; --j)
  570. {
  571. Timeout.Data [j + sizeof (IPMIMsgHdr_T) + 1] = Timeout.Data [j];
  572. }
  573. memcpy (Timeout.Data, &m_PendingBridgedResTbl[PBTbl][i].ResMsgHdr, sizeof (IPMIMsgHdr_T));
  574. Timeout.Data[sizeof (IPMIMsgHdr_T)] = CC_NORMAL;
  575. Timeout.Size++;
  576. QueueFd = gFd_PrimaryIpmbIfcQ;
  577. }
  578. else if (g_BMCInfo.IpmiConfig.SecondaryIPMBSupport == 1 && m_PendingBridgedResTbl[PBTbl][i].DestQ == gFd_SecondaryIpmbIfcQ)
  579. {
  580. int j;
  581. for (j = Timeout.Size - 1; j >= 0; --j)
  582. {
  583. Timeout.Data [j + sizeof (IPMIMsgHdr_T) + 1] = Timeout.Data [j];
  584. }
  585. memcpy (Timeout.Data, &m_PendingBridgedResTbl[PBTbl][i].ResMsgHdr.IPMIMsgHdr, sizeof (IPMIMsgHdr_T));
  586. Timeout.Data[sizeof (IPMIMsgHdr_T)] = CC_NORMAL;
  587. Timeout.Size++;
  588. QueueFd = gFd_SecondaryIpmbIfcQ;
  589. }
  590. else if (m_PendingBridgedResTbl[PBTbl][i].DestQ = gFdUdsIfc)
  591. {
  592. int j;
  593. UDSSessionTbl_T *pUDSSessionInfo = NULL;
  594. for (j = sizeof (IPMIMsgHdr_T); j < Timeout.Size ;j++)
  595. {
  596. Timeout.Data [j + sizeof (IPMIUDSMsg_T)-sizeof (IPMIMsgHdr_T)] = Timeout.Data [j];
  597. }
  598. Timeout.Size = Timeout.Size + sizeof (IPMIUDSMsg_T)- sizeof (IPMIMsgHdr_T);
  599. m_PendingBridgedResTbl[PBTbl][i].ResMsgHdr.UDSMsgHdr.IPMIMsgLen = Timeout.Size;
  600. memcpy (Timeout.Data, &m_PendingBridgedResTbl[PBTbl][i].ResMsgHdr.UDSMsgHdr, sizeof (IPMIUDSMsg_T));
  601. Timeout.NetFnLUN = m_PendingBridgedResTbl[PBTbl][i].ResMsgHdr.UDSMsgHdr.NetFnLUN;
  602. Timeout.SessionID = m_PendingBridgedResTbl[PBTbl][i].ResMsgHdr.UDSMsgHdr.SessionID;
  603. Timeout.Cmd = m_PendingBridgedResTbl[PBTbl][i].ResMsgHdr.UDSMsgHdr.Cmd;
  604. pUDSSessionInfo = GetUDSSessionInfo (UDS_SESSION_ID_INFO,&Timeout.SessionID);
  605. if(pUDSSessionInfo != NULL)
  606. {
  607. Timeout.Socket = pUDSSessionInfo->UDSSocket;
  608. }
  609. QueueFd = m_PendingBridgedResTbl[PBTbl][i].DestQ;
  610. }
  611. else
  612. {
  613. int j;
  614. for (j = Timeout.Size - 1; j >= 0; --j)
  615. {
  616. Timeout.Data [j + sizeof (IPMIMsgHdr_T) + 1] = Timeout.Data [j];
  617. }
  618. memcpy (Timeout.Data, &m_PendingBridgedResTbl[PBTbl][i].ResMsgHdr.IPMIMsgHdr, sizeof (IPMIMsgHdr_T));
  619. Timeout.Data[sizeof (IPMIMsgHdr_T)] = CC_TIMEOUT;
  620. QueueFd = m_PendingBridgedResTbl[PBTbl][i].DestQ;
  621. }
  622. /* Post the data to Destination Interface queue */
  623. PostMsg (QueueFd, &Timeout);
  624. m_PendingBridgedResTbl[PBTbl][i].Used = FALSE;
  625. printf( "MsgHndlr: clean pending index = %d.\n", i );
  626. }
  627. }
  628. }
  629. }
  630. }
  631. /**
  632. *@fn PendingSeqNoTimerTask
  633. *@brief Timertask which helpful in IPMB sequence number validation
  634. *@return none
  635. */
  636. static void
  637. PendingSeqNoTimerTask (void)
  638. {
  639. uint8_t i,j;
  640. printf("-> PendingSeqNoTimerTask\n");
  641. /* Check for any Sequence Number expiraied */
  642. for (i = 0; i < sizeof (m_PendingSeqNoTbl)/sizeof (m_PendingSeqNoTbl[0]); i++)
  643. {
  644. for (j = 0; j < sizeof (m_PendingSeqNoTbl[0])/sizeof (m_PendingSeqNoTbl[0][0]); j++)
  645. {
  646. if (TRUE == m_PendingSeqNoTbl[i][j].Used)
  647. {
  648. m_PendingSeqNoTbl[i][j].TimeOut--;
  649. if (0 == m_PendingSeqNoTbl[i][j].TimeOut)
  650. {
  651. m_PendingSeqNoTbl[i][j].Used = FALSE;
  652. }
  653. }
  654. }
  655. }
  656. }
  657. /**
  658. *@fn SwapIPMIMsgHdr
  659. *@brief Swaps the header and copies into response
  660. *@param pIPMIMsgReq Header of the Request
  661. *@param pIPMIMsgRes Header of the response
  662. *@return none
  663. */
  664. void
  665. SwapIPMIMsgHdr (IPMIMsgHdr_T* pIPMIMsgReq, IPMIMsgHdr_T* pIPMIMsgRes)
  666. {
  667. pIPMIMsgRes->ResAddr = pIPMIMsgReq->ReqAddr;
  668. pIPMIMsgRes->NetFnLUN = (pIPMIMsgReq->NetFnLUN & 0xFC) + 0x04;
  669. pIPMIMsgRes->NetFnLUN |= pIPMIMsgReq->RqSeqLUN & 0x03;
  670. /* Calculate the Checksum for above two bytes */
  671. pIPMIMsgRes->ChkSum = (~(pIPMIMsgRes->ResAddr + pIPMIMsgRes->NetFnLUN) + 1);
  672. pIPMIMsgRes->ReqAddr = pIPMIMsgReq->ResAddr;
  673. pIPMIMsgRes->RqSeqLUN = (pIPMIMsgReq->RqSeqLUN & 0xFC);
  674. pIPMIMsgRes->RqSeqLUN |= (pIPMIMsgReq->NetFnLUN & 0x03);
  675. pIPMIMsgRes->Cmd = pIPMIMsgReq->Cmd;
  676. return;
  677. }
  678. /**
  679. * *@fn Swap UDSIPMIMsg
  680. * *@brief Swaps the header and copies into response
  681. * *@param pIPMIMsgReq Header of the Request
  682. * *@param pIPMIMsgRes Header of the response
  683. * *@return none
  684. * */
  685. void
  686. SwapUDSIPMIMsg ( MsgPkt_T* pIPMIMsgReq, MsgPkt_T* pIPMIMsgRes)
  687. {
  688. IPMIUDSMsg_T *pIPMIUDSMsgRes = (IPMIUDSMsg_T *)&pIPMIMsgRes->Data[0];
  689. IPMIUDSMsg_T *pIPMIUDSMsgReq = (IPMIUDSMsg_T *)&pIPMIMsgReq->Data[0];
  690. pIPMIMsgRes->NetFnLUN = pIPMIMsgReq->NetFnLUN;
  691. // pIPMIMsgRes->Privilege = pIPMIMsgReq->Privilege;
  692. pIPMIMsgRes->Cmd = pIPMIMsgReq->Cmd;
  693. pIPMIMsgRes->Channel = pIPMIMsgReq->Channel;
  694. pIPMIMsgRes->SessionID = pIPMIMsgReq->SessionID;
  695. pIPMIMsgRes->Socket = pIPMIMsgReq->Socket;
  696. pIPMIUDSMsgRes->NetFnLUN = pIPMIMsgReq->NetFnLUN;
  697. // pIPMIUDSMsgRes->Privilege = pIPMIMsgReq->Privilege;
  698. pIPMIUDSMsgRes->Cmd = pIPMIMsgReq->Cmd;
  699. pIPMIUDSMsgRes->ChannelNum = pIPMIMsgReq->Channel;
  700. pIPMIUDSMsgRes->SessionID = pIPMIMsgReq->SessionID;
  701. //pIPMIUDSMsgRes->AuthFlag = pIPMIUDSMsgReq->AuthFlag;
  702. pIPMIUDSMsgRes->IPMIMsgLen = pIPMIMsgRes->Size;
  703. // strcpy( (char *)pIPMIUDSMsgRes->UserName, (char *)pIPMIUDSMsgReq->UserName);
  704. // memcpy(pIPMIUDSMsgRes->IPAddr, pIPMIUDSMsgReq->IPAddr, 16);
  705. return;
  706. }