1 #include "config.h"
2 
3 #include "oemhandler.hpp"
4 
5 #include "elog-errors.hpp"
6 
7 #include <endian.h>
8 #include <ipmid/api.h>
9 #include <stdio.h>
10 #include <string.h>
11 #include <systemd/sd-bus.h>
12 
13 #include <fstream>
14 #include <functional>
15 #include <host-interface.hpp>
16 #include <ipmid-host/cmd.hpp>
17 #include <memory>
18 #include <org/open_power/Host/error.hpp>
19 #include <org/open_power/OCC/Metrics/error.hpp>
20 #include <sdbusplus/bus.hpp>
21 #include <sdbusplus/exception.hpp>
22 
23 void register_netfn_ibm_oem_commands() __attribute__((constructor));
24 
25 const char* g_esel_path = "/tmp/esel";
26 uint16_t g_record_id = 0x0001;
27 using namespace phosphor::logging;
28 constexpr auto occMetricsType = 0xDD;
29 
30 extern const ObjectIDMap invSensors;
31 const std::map<uint8_t, Entry::Level> severityMap{
32     {0x10, Entry::Level::Warning}, // Recoverable error
33     {0x20, Entry::Level::Warning}, // Predictive error
34     {0x40, Entry::Level::Error},   // Unrecoverable error
35     {0x50, Entry::Level::Error},   // Critical error
36     {0x60, Entry::Level::Error},   // Error from a diagnostic test
37     {0x70, Entry::Level::Warning}, // Recoverable symptom
38     {0xFF, Entry::Level::Error},   // Unknown error
39 };
40 
41 Entry::Level mapSeverity(const std::string& eSELData)
42 {
43     constexpr size_t severityOffset = 0x4A;
44 
45     if (eSELData.size() > severityOffset)
46     {
47         // Dive in to the IBM log to find the severity
48         uint8_t sev = 0xF0 & eSELData[severityOffset];
49 
50         auto find = severityMap.find(sev);
51         if (find != severityMap.end())
52         {
53             return find->second;
54         }
55     }
56 
57     // Default to Entry::Level::Error if a matching is not found.
58     return Entry::Level::Error;
59 }
60 
61 std::string mapCalloutAssociation(const std::string& eSELData)
62 {
63     auto rec = reinterpret_cast<const SELEventRecord*>(&eSELData[0]);
64     uint8_t sensor = rec->sensorNum;
65 
66     /*
67      * Search the sensor number to inventory path mapping to figure out the
68      * inventory associated with the ESEL.
69      */
70     auto found = std::find_if(invSensors.begin(), invSensors.end(),
71                               [&sensor](const auto& iter) {
72                                   return (iter.second.sensorID == sensor);
73                               });
74     if (found != invSensors.end())
75     {
76         return found->first;
77     }
78 
79     return {};
80 }
81 
82 std::string getService(sdbusplus::bus_t& bus, const std::string& path,
83                        const std::string& interface)
84 {
85     auto method = bus.new_method_call(MAPPER_BUS_NAME, MAPPER_OBJ, MAPPER_IFACE,
86                                       "GetObject");
87 
88     method.append(path);
89     method.append(std::vector<std::string>({interface}));
90 
91     std::map<std::string, std::vector<std::string>> response;
92 
93     try
94     {
95         auto reply = bus.call(method);
96 
97         reply.read(response);
98         if (response.empty())
99         {
100             log<level::ERR>("Error in mapper response for getting service name",
101                             entry("PATH=%s", path.c_str()),
102                             entry("INTERFACE=%s", interface.c_str()));
103             return std::string{};
104         }
105     }
106     catch (const sdbusplus::exception_t& e)
107     {
108         log<level::ERR>("Error in mapper method call",
109                         entry("ERROR=%s", e.what()));
110         return std::string{};
111     }
112 
113     return response.begin()->first;
114 }
115 
116 std::string readESEL(const char* fileName)
117 {
118     std::string content{};
119 
120     std::ifstream handle(fileName);
121 
122     if (handle.fail())
123     {
124         log<level::ERR>("Failed to open eSEL", entry("FILENAME=%s", fileName));
125         return content;
126     }
127 
128     handle.seekg(0, std::ios::end);
129     content.resize(handle.tellg());
130     handle.seekg(0, std::ios::beg);
131     handle.read(&content[0], content.size());
132     handle.close();
133 
134     return content;
135 }
136 
137 void createOCCLogEntry(const std::string& eSELData)
138 {
139     // Each byte in eSEL is formatted as %02x with a space between bytes and
140     // insert '/0' at the end of the character array.
141     constexpr auto byteSeperator = 3;
142 
143     std::unique_ptr<char[]> data(
144         new char[(eSELData.size() * byteSeperator) + 1]());
145 
146     for (size_t i = 0; i < eSELData.size(); i++)
147     {
148         sprintf(&data[i * byteSeperator], "%02x ", eSELData[i]);
149     }
150     data[eSELData.size() * byteSeperator] = '\0';
151 
152     using error = sdbusplus::org::open_power::OCC::Metrics::Error::Event;
153     using metadata = org::open_power::OCC::Metrics::Event;
154 
155     report<error>(metadata::ESEL(data.get()));
156 }
157 
158 void createHostEntry(const std::string& eSELData)
159 {
160     // Each byte in eSEL is formatted as %02x with a space between bytes and
161     // insert '/0' at the end of the character array.
162     constexpr auto byteSeperator = 3;
163 
164     auto sev = mapSeverity(eSELData);
165     auto inventoryPath = mapCalloutAssociation(eSELData);
166 
167     if (!inventoryPath.empty())
168     {
169         std::unique_ptr<char[]> data(
170             new char[(eSELData.size() * byteSeperator) + 1]());
171 
172         for (size_t i = 0; i < eSELData.size(); i++)
173         {
174             sprintf(&data[i * byteSeperator], "%02x ", eSELData[i]);
175         }
176         data[eSELData.size() * byteSeperator] = '\0';
177 
178         using hosterror = sdbusplus::org::open_power::Host::Error::Event;
179         using hostmetadata = org::open_power::Host::Event;
180 
181         report<hosterror>(
182             sev, hostmetadata::ESEL(data.get()),
183             hostmetadata::CALLOUT_INVENTORY_PATH(inventoryPath.c_str()));
184     }
185 }
186 
187 /** @brief Helper function to do a graceful restart (reboot) of the BMC.
188     @return 0 on success, -1 on error
189  */
190 int rebootBMC()
191 {
192     sdbusplus::bus::bus bus{ipmid_get_sd_bus_connection()};
193     auto service = getService(bus, stateBmcPath, stateBmcIntf);
194     if (service.empty())
195     {
196         log<level::ERR>("Error getting the service name to reboot the BMC.");
197         return -1;
198     }
199     std::variant<std::string> reboot =
200         "xyz.openbmc_project.State.BMC.Transition.Reboot";
201     auto method = bus.new_method_call(service.c_str(), stateBmcPath,
202                                       propertiesIntf, "Set");
203     method.append(stateBmcIntf, "RequestedBMCTransition", reboot);
204     try
205     {
206         bus.call_noreply(method);
207     }
208     catch (const sdbusplus::exception_t& e)
209     {
210         log<level::ERR>("Error calling to reboot the BMC.",
211                         entry("ERROR=%s", e.what()));
212         return -1;
213     }
214     return 0;
215 }
216 
217 ///////////////////////////////////////////////////////////////////////////////
218 // For the First partial add eSEL the SEL Record ID and offset
219 // value should be 0x0000. The extended data needs to be in
220 // the form of an IPMI SEL Event Record, with Event sensor type
221 // of 0xDF and Event Message format of 0x04. The returned
222 // Record ID should be used for all partial eSEL adds.
223 //
224 // This function creates a /tmp/esel file to store the
225 // incoming partial esel.  It is the role of some other
226 // function to commit the error log in to long term
227 // storage.  Likely via the ipmi add_sel command.
228 ///////////////////////////////////////////////////////////////////////////////
229 ipmi_ret_t ipmi_ibm_oem_partial_esel(ipmi_netfn_t netfn, ipmi_cmd_t cmd,
230                                      ipmi_request_t request,
231                                      ipmi_response_t response,
232                                      ipmi_data_len_t data_len,
233                                      ipmi_context_t context)
234 {
235     uint8_t* reqptr = (uint8_t*)request;
236     esel_request_t esel_req;
237     FILE* fp;
238     int r = 0;
239     uint8_t rlen;
240     ipmi_ret_t rc = IPMI_CC_OK;
241     const char* pio;
242 
243     esel_req.resid = le16toh((((uint16_t)reqptr[1]) << 8) + reqptr[0]);
244     esel_req.selrecord = le16toh((((uint16_t)reqptr[3]) << 8) + reqptr[2]);
245     esel_req.offset = le16toh((((uint16_t)reqptr[5]) << 8) + reqptr[4]);
246     esel_req.progress = reqptr[6];
247 
248     // According to IPMI spec, Reservation ID must be checked.
249     if (!checkSELReservation(esel_req.resid))
250     {
251         // 0xc5 means Reservation Cancelled or Invalid Reservation ID.
252         printf("Used Reservation ID = %d\n", esel_req.resid);
253         rc = IPMI_CC_INVALID_RESERVATION_ID;
254 
255         // clean g_esel_path.
256         r = remove(g_esel_path);
257         if (r < 0)
258             fprintf(stderr, "Error deleting %s\n", g_esel_path);
259 
260         return rc;
261     }
262 
263     // OpenPOWER Host Interface spec says if RecordID and Offset are
264     // 0 then then this is a new request
265     if (!esel_req.selrecord && !esel_req.offset)
266         pio = "wb";
267     else
268         pio = "rb+";
269 
270     rlen = (*data_len) - (uint8_t)(sizeof(esel_request_t));
271 
272     if ((fp = fopen(g_esel_path, pio)) != NULL)
273     {
274         fseek(fp, esel_req.offset, SEEK_SET);
275         fwrite(reqptr + (uint8_t)(sizeof(esel_request_t)), rlen, 1, fp);
276         fclose(fp);
277 
278         *data_len = sizeof(g_record_id);
279         memcpy(response, &g_record_id, *data_len);
280     }
281     else
282     {
283         fprintf(stderr, "Error trying to perform %s for esel%s\n", pio,
284                 g_esel_path);
285         rc = IPMI_CC_INVALID;
286         *data_len = 0;
287     }
288 
289     // The first bit presents that this is the last partial packet
290     // coming down.  If that is the case advance the record id so we
291     // don't overlap logs.  This allows anyone to establish a log
292     // directory system.
293     if (esel_req.progress & 1)
294     {
295         g_record_id++;
296 
297         auto eSELData = readESEL(g_esel_path);
298 
299         if (eSELData.empty())
300         {
301             return IPMI_CC_UNSPECIFIED_ERROR;
302         }
303 
304         // If the eSEL record type is OCC metrics, then create the OCC log
305         // entry.
306         if (eSELData[2] == occMetricsType)
307         {
308             createOCCLogEntry(eSELData);
309         }
310         else
311         {
312             createHostEntry(eSELData);
313         }
314     }
315 
316     return rc;
317 }
318 
319 // Prepare for FW Update.
320 // Execute needed commands to prepare the system for a fw update from the host.
321 ipmi_ret_t ipmi_ibm_oem_prep_fw_update(ipmi_netfn_t netfn, ipmi_cmd_t cmd,
322                                        ipmi_request_t request,
323                                        ipmi_response_t response,
324                                        ipmi_data_len_t data_len,
325                                        ipmi_context_t context)
326 {
327     ipmi_ret_t ipmi_rc = IPMI_CC_OK;
328     *data_len = 0;
329 
330     int rc = 0;
331     std::ofstream rwfs_file;
332 
333     // Set one time flag
334     rc = system(
335         "fw_setenv openbmconce copy-files-to-ram copy-base-filesystem-to-ram");
336     rc = WEXITSTATUS(rc);
337     if (rc != 0)
338     {
339         fprintf(stderr, "fw_setenv openbmconce failed with rc=%d\n", rc);
340         return IPMI_CC_UNSPECIFIED_ERROR;
341     }
342 
343     // Touch the image-rwfs file to perform an empty update to force the save
344     // in case we're already in ram and the flash is the same causing the ram
345     // files to not be copied back to flash
346     rwfs_file.open("/run/initramfs/image-rwfs",
347                    std::ofstream::out | std::ofstream::app);
348     rwfs_file.close();
349 
350     // Reboot the BMC for settings to take effect
351     rc = rebootBMC();
352     if (rc < 0)
353     {
354         fprintf(stderr, "Failed to reset BMC: %s\n", strerror(-rc));
355         return -1;
356     }
357     printf("Warning: BMC is going down for reboot!\n");
358 
359     return ipmi_rc;
360 }
361 
362 ipmi_ret_t ipmi_ibm_oem_bmc_factory_reset(ipmi_netfn_t netfn, ipmi_cmd_t cmd,
363                                           ipmi_request_t request,
364                                           ipmi_response_t response,
365                                           ipmi_data_len_t data_len,
366                                           ipmi_context_t context)
367 {
368     sdbusplus::bus_t bus{ipmid_get_sd_bus_connection()};
369 
370     // Since this is a one way command (i.e. the host is requesting a power
371     // off of itself and a reboot of the BMC) we can exceed the 5 second
372     // IPMI timeout. Testing has shown that the power off can take up to
373     // 10 seconds so give it at least 15
374     constexpr auto powerOffWait = std::chrono::seconds(15);
375     constexpr auto setFactoryWait = std::chrono::seconds(3);
376 
377     // Power Off Chassis
378     auto service = getService(bus, stateChassisPath, stateChassisIntf);
379     if (service.empty())
380     {
381         return IPMI_CC_UNSPECIFIED_ERROR;
382     }
383     std::variant<std::string> off =
384         "xyz.openbmc_project.State.Chassis.Transition.Off";
385     auto method = bus.new_method_call(service.c_str(), stateChassisPath,
386                                       propertiesIntf, "Set");
387     method.append(stateChassisIntf, "RequestedPowerTransition", off);
388     try
389     {
390         bus.call_noreply(method);
391     }
392     catch (const sdbusplus::exception_t& e)
393     {
394         log<level::ERR>("Error powering off the chassis",
395                         entry("ERROR=%s", e.what()));
396         return IPMI_CC_UNSPECIFIED_ERROR;
397     }
398 
399     // Wait a few seconds for the chassis to power off
400     std::this_thread::sleep_for(powerOffWait);
401 
402     // Set Factory Reset
403     method = bus.new_method_call(bmcUpdaterServiceName, softwarePath,
404                                  factoryResetIntf, "Reset");
405     try
406     {
407         bus.call_noreply(method);
408     }
409     catch (const sdbusplus::exception_t& e)
410     {
411         log<level::ERR>("Error setting factory reset",
412                         entry("ERROR=%s", e.what()));
413         return IPMI_CC_UNSPECIFIED_ERROR;
414     }
415 
416     // Wait a few seconds for service that sets the reset env variable to
417     // complete before the BMC is rebooted
418     std::this_thread::sleep_for(setFactoryWait);
419 
420     // Reboot BMC
421     auto rc = rebootBMC();
422     if (rc < 0)
423     {
424         log<level::ALERT>("The BMC needs to be manually rebooted to complete "
425                           "the factory reset.");
426         return IPMI_CC_UNSPECIFIED_ERROR;
427     }
428 
429     return IPMI_CC_OK;
430 }
431 
432 namespace
433 {
434 // Storage to keep the object alive during process life
435 std::unique_ptr<open_power::host::command::Host> opHost
436     __attribute__((init_priority(101)));
437 std::unique_ptr<sdbusplus::server::manager_t> objManager
438     __attribute__((init_priority(101)));
439 } // namespace
440 
441 void register_netfn_ibm_oem_commands()
442 {
443     printf("Registering NetFn:[0x%X], Cmd:[0x%X]\n", NETFUN_IBM_OEM,
444            IPMI_CMD_PESEL);
445     ipmi_register_callback(NETFUN_IBM_OEM, IPMI_CMD_PESEL, NULL,
446                            ipmi_ibm_oem_partial_esel, SYSTEM_INTERFACE);
447 
448     printf("Registering NetFn:[0x%X], Cmd:[0x%X]\n", NETFUN_OEM,
449            IPMI_CMD_PREP_FW_UPDATE);
450     ipmi_register_callback(NETFUN_OEM, IPMI_CMD_PREP_FW_UPDATE, NULL,
451                            ipmi_ibm_oem_prep_fw_update, SYSTEM_INTERFACE);
452 
453     ipmi_register_callback(NETFUN_IBM_OEM, IPMI_CMD_BMC_FACTORY_RESET, NULL,
454                            ipmi_ibm_oem_bmc_factory_reset, SYSTEM_INTERFACE);
455 
456     // Create new object on the bus
457     auto objPath = std::string{CONTROL_HOST_OBJ_MGR} + '/' + HOST_NAME + '0';
458 
459     // Add sdbusplus ObjectManager.
460     auto& sdbusPlusHandler = ipmid_get_sdbus_plus_handler();
461     objManager = std::make_unique<sdbusplus::server::manager_t>(
462         *sdbusPlusHandler, CONTROL_HOST_OBJ_MGR);
463 
464     opHost = std::make_unique<open_power::host::command::Host>(
465         *sdbusPlusHandler, objPath.c_str());
466 
467     // Service for this is provided by phosphor layer systemcmdintf
468     // and this will be as part of that.
469     return;
470 }
471