1 #include "config.h"
2
3 #include "oemhandler.hpp"
4
5 #include "elog-errors.hpp"
6
7 #include <endian.h>
8 #include <ipmid/api.h>
9 #include <stdio.h>
10 #include <string.h>
11 #include <systemd/sd-bus.h>
12
13 #include <host-interface.hpp>
14 #include <ipmid-host/cmd.hpp>
15 #include <org/open_power/Host/error.hpp>
16 #include <org/open_power/OCC/Metrics/error.hpp>
17 #include <sdbusplus/bus.hpp>
18 #include <sdbusplus/exception.hpp>
19
20 #include <fstream>
21 #include <functional>
22 #include <memory>
23
24 void register_netfn_ibm_oem_commands() __attribute__((constructor));
25
26 const char* g_esel_path = "/tmp/esel";
27 uint16_t g_record_id = 0x0001;
28 using namespace phosphor::logging;
29 constexpr auto occMetricsType = 0xDD;
30
31 extern const ObjectIDMap invSensors;
32 const std::map<uint8_t, Entry::Level> severityMap{
33 {0x10, Entry::Level::Warning}, // Recoverable error
34 {0x20, Entry::Level::Warning}, // Predictive error
35 {0x40, Entry::Level::Error}, // Unrecoverable error
36 {0x50, Entry::Level::Error}, // Critical error
37 {0x60, Entry::Level::Error}, // Error from a diagnostic test
38 {0x70, Entry::Level::Warning}, // Recoverable symptom
39 {0xFF, Entry::Level::Error}, // Unknown error
40 };
41
mapSeverity(const std::string & eSELData)42 Entry::Level mapSeverity(const std::string& eSELData)
43 {
44 constexpr size_t severityOffset = 0x4A;
45
46 if (eSELData.size() > severityOffset)
47 {
48 // Dive in to the IBM log to find the severity
49 uint8_t sev = 0xF0 & eSELData[severityOffset];
50
51 auto find = severityMap.find(sev);
52 if (find != severityMap.end())
53 {
54 return find->second;
55 }
56 }
57
58 // Default to Entry::Level::Error if a matching is not found.
59 return Entry::Level::Error;
60 }
61
mapCalloutAssociation(const std::string & eSELData)62 std::string mapCalloutAssociation(const std::string& eSELData)
63 {
64 auto rec = reinterpret_cast<const SELEventRecord*>(&eSELData[0]);
65 uint8_t sensor = rec->sensorNum;
66
67 /*
68 * Search the sensor number to inventory path mapping to figure out the
69 * inventory associated with the ESEL.
70 */
71 auto found = std::find_if(invSensors.begin(), invSensors.end(),
72 [&sensor](const auto& iter) {
73 return (iter.second.sensorID == sensor);
74 });
75 if (found != invSensors.end())
76 {
77 return found->first;
78 }
79
80 return {};
81 }
82
getService(sdbusplus::bus_t & bus,const std::string & path,const std::string & interface)83 std::string getService(sdbusplus::bus_t& bus, const std::string& path,
84 const std::string& interface)
85 {
86 auto method = bus.new_method_call(MAPPER_BUS_NAME, MAPPER_OBJ, MAPPER_IFACE,
87 "GetObject");
88
89 method.append(path);
90 method.append(std::vector<std::string>({interface}));
91
92 std::map<std::string, std::vector<std::string>> response;
93
94 try
95 {
96 auto reply = bus.call(method);
97
98 reply.read(response);
99 if (response.empty())
100 {
101 log<level::ERR>("Error in mapper response for getting service name",
102 entry("PATH=%s", path.c_str()),
103 entry("INTERFACE=%s", interface.c_str()));
104 return std::string{};
105 }
106 }
107 catch (const sdbusplus::exception_t& e)
108 {
109 log<level::ERR>("Error in mapper method call",
110 entry("ERROR=%s", e.what()));
111 return std::string{};
112 }
113
114 return response.begin()->first;
115 }
116
readESEL(const char * fileName)117 std::string readESEL(const char* fileName)
118 {
119 std::string content{};
120
121 std::ifstream handle(fileName);
122
123 if (handle.fail())
124 {
125 log<level::ERR>("Failed to open eSEL", entry("FILENAME=%s", fileName));
126 return content;
127 }
128
129 handle.seekg(0, std::ios::end);
130 content.resize(handle.tellg());
131 handle.seekg(0, std::ios::beg);
132 handle.read(&content[0], content.size());
133 handle.close();
134
135 return content;
136 }
137
createOCCLogEntry(const std::string & eSELData)138 void createOCCLogEntry(const std::string& eSELData)
139 {
140 // Each byte in eSEL is formatted as %02x with a space between bytes and
141 // insert '/0' at the end of the character array.
142 constexpr auto byteSeperator = 3;
143
144 std::unique_ptr<char[]> data(
145 new char[(eSELData.size() * byteSeperator) + 1]());
146
147 for (size_t i = 0; i < eSELData.size(); i++)
148 {
149 sprintf(&data[i * byteSeperator], "%02x ", eSELData[i]);
150 }
151 data[eSELData.size() * byteSeperator] = '\0';
152
153 using error = sdbusplus::org::open_power::OCC::Metrics::Error::Event;
154 using metadata = org::open_power::OCC::Metrics::Event;
155
156 report<error>(metadata::ESEL(data.get()));
157 }
158
createHostEntry(const std::string & eSELData)159 void createHostEntry(const std::string& eSELData)
160 {
161 // Each byte in eSEL is formatted as %02x with a space between bytes and
162 // insert '/0' at the end of the character array.
163 constexpr auto byteSeperator = 3;
164
165 auto sev = mapSeverity(eSELData);
166 auto inventoryPath = mapCalloutAssociation(eSELData);
167
168 if (!inventoryPath.empty())
169 {
170 std::unique_ptr<char[]> data(
171 new char[(eSELData.size() * byteSeperator) + 1]());
172
173 for (size_t i = 0; i < eSELData.size(); i++)
174 {
175 sprintf(&data[i * byteSeperator], "%02x ", eSELData[i]);
176 }
177 data[eSELData.size() * byteSeperator] = '\0';
178
179 using hosterror = sdbusplus::org::open_power::Host::Error::Event;
180 using hostmetadata = org::open_power::Host::Event;
181
182 report<hosterror>(
183 sev, hostmetadata::ESEL(data.get()),
184 hostmetadata::CALLOUT_INVENTORY_PATH(inventoryPath.c_str()));
185 }
186 }
187
188 /** @brief Helper function to do a graceful restart (reboot) of the BMC.
189 @return 0 on success, -1 on error
190 */
rebootBMC()191 int rebootBMC()
192 {
193 sdbusplus::bus_t bus{ipmid_get_sd_bus_connection()};
194 auto service = getService(bus, stateBmcPath, stateBmcIntf);
195 if (service.empty())
196 {
197 log<level::ERR>("Error getting the service name to reboot the BMC.");
198 return -1;
199 }
200 std::variant<std::string> reboot =
201 "xyz.openbmc_project.State.BMC.Transition.Reboot";
202 auto method = bus.new_method_call(service.c_str(), stateBmcPath,
203 propertiesIntf, "Set");
204 method.append(stateBmcIntf, "RequestedBMCTransition", reboot);
205 try
206 {
207 bus.call_noreply(method);
208 }
209 catch (const sdbusplus::exception_t& e)
210 {
211 log<level::ERR>("Error calling to reboot the BMC.",
212 entry("ERROR=%s", e.what()));
213 return -1;
214 }
215 return 0;
216 }
217
218 ///////////////////////////////////////////////////////////////////////////////
219 // For the First partial add eSEL the SEL Record ID and offset
220 // value should be 0x0000. The extended data needs to be in
221 // the form of an IPMI SEL Event Record, with Event sensor type
222 // of 0xDF and Event Message format of 0x04. The returned
223 // Record ID should be used for all partial eSEL adds.
224 //
225 // This function creates a /tmp/esel file to store the
226 // incoming partial esel. It is the role of some other
227 // function to commit the error log in to long term
228 // storage. Likely via the ipmi add_sel command.
229 ///////////////////////////////////////////////////////////////////////////////
ipmi_ibm_oem_partial_esel(ipmi_netfn_t netfn,ipmi_cmd_t cmd,ipmi_request_t request,ipmi_response_t response,ipmi_data_len_t data_len,ipmi_context_t context)230 ipmi_ret_t ipmi_ibm_oem_partial_esel(
231 ipmi_netfn_t netfn, ipmi_cmd_t cmd, ipmi_request_t request,
232 ipmi_response_t response, ipmi_data_len_t data_len, ipmi_context_t context)
233 {
234 uint8_t* reqptr = (uint8_t*)request;
235 esel_request_t esel_req;
236 FILE* fp;
237 int r = 0;
238 uint8_t rlen;
239 ipmi_ret_t rc = IPMI_CC_OK;
240 const char* pio;
241
242 esel_req.resid = le16toh((((uint16_t)reqptr[1]) << 8) + reqptr[0]);
243 esel_req.selrecord = le16toh((((uint16_t)reqptr[3]) << 8) + reqptr[2]);
244 esel_req.offset = le16toh((((uint16_t)reqptr[5]) << 8) + reqptr[4]);
245 esel_req.progress = reqptr[6];
246
247 // According to IPMI spec, Reservation ID must be checked.
248 if (!checkSELReservation(esel_req.resid))
249 {
250 // 0xc5 means Reservation Cancelled or Invalid Reservation ID.
251 printf("Used Reservation ID = %d\n", esel_req.resid);
252 rc = IPMI_CC_INVALID_RESERVATION_ID;
253
254 // clean g_esel_path.
255 r = remove(g_esel_path);
256 if (r < 0)
257 fprintf(stderr, "Error deleting %s\n", g_esel_path);
258
259 return rc;
260 }
261
262 // OpenPOWER Host Interface spec says if RecordID and Offset are
263 // 0 then then this is a new request
264 if (!esel_req.selrecord && !esel_req.offset)
265 pio = "wb";
266 else
267 pio = "rb+";
268
269 rlen = (*data_len) - (uint8_t)(sizeof(esel_request_t));
270
271 if ((fp = fopen(g_esel_path, pio)) != NULL)
272 {
273 fseek(fp, esel_req.offset, SEEK_SET);
274 fwrite(reqptr + (uint8_t)(sizeof(esel_request_t)), rlen, 1, fp);
275 fclose(fp);
276
277 *data_len = sizeof(g_record_id);
278 memcpy(response, &g_record_id, *data_len);
279 }
280 else
281 {
282 fprintf(stderr, "Error trying to perform %s for esel%s\n", pio,
283 g_esel_path);
284 rc = IPMI_CC_INVALID;
285 *data_len = 0;
286 }
287
288 // The first bit presents that this is the last partial packet
289 // coming down. If that is the case advance the record id so we
290 // don't overlap logs. This allows anyone to establish a log
291 // directory system.
292 if (esel_req.progress & 1)
293 {
294 g_record_id++;
295
296 auto eSELData = readESEL(g_esel_path);
297
298 if (eSELData.empty())
299 {
300 return IPMI_CC_UNSPECIFIED_ERROR;
301 }
302
303 // If the eSEL record type is OCC metrics, then create the OCC log
304 // entry.
305 if (eSELData[2] == occMetricsType)
306 {
307 createOCCLogEntry(eSELData);
308 }
309 else
310 {
311 createHostEntry(eSELData);
312 }
313 }
314
315 return rc;
316 }
317
318 // Prepare for FW Update.
319 // Execute needed commands to prepare the system for a fw update from the host.
ipmi_ibm_oem_prep_fw_update(ipmi_netfn_t netfn,ipmi_cmd_t cmd,ipmi_request_t request,ipmi_response_t response,ipmi_data_len_t data_len,ipmi_context_t context)320 ipmi_ret_t ipmi_ibm_oem_prep_fw_update(
321 ipmi_netfn_t netfn, ipmi_cmd_t cmd, ipmi_request_t request,
322 ipmi_response_t response, ipmi_data_len_t data_len, ipmi_context_t context)
323 {
324 ipmi_ret_t ipmi_rc = IPMI_CC_OK;
325 *data_len = 0;
326
327 int rc = 0;
328 std::ofstream rwfs_file;
329
330 // Set one time flag
331 rc = system(
332 "fw_setenv openbmconce copy-files-to-ram copy-base-filesystem-to-ram");
333 rc = WEXITSTATUS(rc);
334 if (rc != 0)
335 {
336 fprintf(stderr, "fw_setenv openbmconce failed with rc=%d\n", rc);
337 return IPMI_CC_UNSPECIFIED_ERROR;
338 }
339
340 // Touch the image-rwfs file to perform an empty update to force the save
341 // in case we're already in ram and the flash is the same causing the ram
342 // files to not be copied back to flash
343 rwfs_file.open("/run/initramfs/image-rwfs",
344 std::ofstream::out | std::ofstream::app);
345 rwfs_file.close();
346
347 // Reboot the BMC for settings to take effect
348 rc = rebootBMC();
349 if (rc < 0)
350 {
351 fprintf(stderr, "Failed to reset BMC: %s\n", strerror(-rc));
352 return -1;
353 }
354 printf("Warning: BMC is going down for reboot!\n");
355
356 return ipmi_rc;
357 }
358
ipmi_ibm_oem_bmc_factory_reset(ipmi_netfn_t netfn,ipmi_cmd_t cmd,ipmi_request_t request,ipmi_response_t response,ipmi_data_len_t data_len,ipmi_context_t context)359 ipmi_ret_t ipmi_ibm_oem_bmc_factory_reset(
360 ipmi_netfn_t netfn, ipmi_cmd_t cmd, ipmi_request_t request,
361 ipmi_response_t response, ipmi_data_len_t data_len, ipmi_context_t context)
362 {
363 sdbusplus::bus_t bus{ipmid_get_sd_bus_connection()};
364
365 // Since this is a one way command (i.e. the host is requesting a power
366 // off of itself and a reboot of the BMC) we can exceed the 5 second
367 // IPMI timeout. Testing has shown that the power off can take up to
368 // 10 seconds so give it at least 15
369 constexpr auto powerOffWait = std::chrono::seconds(15);
370 constexpr auto setFactoryWait = std::chrono::seconds(3);
371
372 // Power Off Chassis
373 auto service = getService(bus, stateChassisPath, stateChassisIntf);
374 if (service.empty())
375 {
376 return IPMI_CC_UNSPECIFIED_ERROR;
377 }
378 std::variant<std::string> off =
379 "xyz.openbmc_project.State.Chassis.Transition.Off";
380 auto method = bus.new_method_call(service.c_str(), stateChassisPath,
381 propertiesIntf, "Set");
382 method.append(stateChassisIntf, "RequestedPowerTransition", off);
383 try
384 {
385 bus.call_noreply(method);
386 }
387 catch (const sdbusplus::exception_t& e)
388 {
389 log<level::ERR>("Error powering off the chassis",
390 entry("ERROR=%s", e.what()));
391 return IPMI_CC_UNSPECIFIED_ERROR;
392 }
393
394 // Wait a few seconds for the chassis to power off
395 std::this_thread::sleep_for(powerOffWait);
396
397 // Set Factory Reset
398 method = bus.new_method_call(bmcUpdaterServiceName, softwarePath,
399 factoryResetIntf, "Reset");
400 try
401 {
402 bus.call_noreply(method);
403 }
404 catch (const sdbusplus::exception_t& e)
405 {
406 log<level::ERR>("Error setting factory reset",
407 entry("ERROR=%s", e.what()));
408 return IPMI_CC_UNSPECIFIED_ERROR;
409 }
410
411 // Wait a few seconds for service that sets the reset env variable to
412 // complete before the BMC is rebooted
413 std::this_thread::sleep_for(setFactoryWait);
414
415 // Reboot BMC
416 auto rc = rebootBMC();
417 if (rc < 0)
418 {
419 log<level::ALERT>("The BMC needs to be manually rebooted to complete "
420 "the factory reset.");
421 return IPMI_CC_UNSPECIFIED_ERROR;
422 }
423
424 return IPMI_CC_OK;
425 }
426
427 namespace
428 {
429 // Storage to keep the object alive during process life
430 std::unique_ptr<open_power::host::command::Host> opHost
431 __attribute__((init_priority(101)));
432 std::unique_ptr<sdbusplus::server::manager_t> objManager
433 __attribute__((init_priority(101)));
434 } // namespace
435
register_netfn_ibm_oem_commands()436 void register_netfn_ibm_oem_commands()
437 {
438 printf("Registering NetFn:[0x%X], Cmd:[0x%X]\n", NETFUN_IBM_OEM,
439 IPMI_CMD_PESEL);
440 ipmi_register_callback(NETFUN_IBM_OEM, IPMI_CMD_PESEL, NULL,
441 ipmi_ibm_oem_partial_esel, SYSTEM_INTERFACE);
442
443 printf("Registering NetFn:[0x%X], Cmd:[0x%X]\n", NETFUN_OEM,
444 IPMI_CMD_PREP_FW_UPDATE);
445 ipmi_register_callback(NETFUN_OEM, IPMI_CMD_PREP_FW_UPDATE, NULL,
446 ipmi_ibm_oem_prep_fw_update, SYSTEM_INTERFACE);
447
448 ipmi_register_callback(NETFUN_IBM_OEM, IPMI_CMD_BMC_FACTORY_RESET, NULL,
449 ipmi_ibm_oem_bmc_factory_reset, SYSTEM_INTERFACE);
450
451 // Create new object on the bus
452 auto objPath = std::string{CONTROL_HOST_OBJ_MGR} + '/' + HOST_NAME + '0';
453
454 // Add sdbusplus ObjectManager.
455 auto& sdbusPlusHandler = ipmid_get_sdbus_plus_handler();
456 objManager = std::make_unique<sdbusplus::server::manager_t>(
457 *sdbusPlusHandler, CONTROL_HOST_OBJ_MGR);
458
459 opHost = std::make_unique<open_power::host::command::Host>(
460 *sdbusPlusHandler, objPath.c_str());
461
462 // Service for this is provided by phosphor layer systemcmdintf
463 // and this will be as part of that.
464 return;
465 }
466