Merge tag 'linux_kselftest-next-6.8-rc1' of git://git.kernel.org/pub/scm/linux/kernel...
[linux-block.git] / drivers / char / ipmi / ipmi_si_intf.c
CommitLineData
243ac210 1// SPDX-License-Identifier: GPL-2.0+
1da177e4
LT
2/*
3 * ipmi_si.c
4 *
5 * The interface to the IPMI driver for the system interfaces (KCS, SMIC,
6 * BT).
7 *
8 * Author: MontaVista Software, Inc.
9 * Corey Minyard <minyard@mvista.com>
10 * source@mvista.com
11 *
12 * Copyright 2002 MontaVista Software Inc.
dba9b4f6 13 * Copyright 2006 IBM Corp., Christian Krafft <krafft@de.ibm.com>
1da177e4
LT
14 */
15
16/*
17 * This file holds the "policy" for the interface to the SMI state
18 * machine. It does the configuration, handles timers and interrupts,
19 * and drives the real SMI state machine.
20 */
21
25880f7d
JP
22#define pr_fmt(fmt) "ipmi_si: " fmt
23
1da177e4
LT
24#include <linux/module.h>
25#include <linux/moduleparam.h>
1da177e4 26#include <linux/sched.h>
07412736 27#include <linux/seq_file.h>
1da177e4
LT
28#include <linux/timer.h>
29#include <linux/errno.h>
30#include <linux/spinlock.h>
31#include <linux/slab.h>
32#include <linux/delay.h>
33#include <linux/list.h>
ea94027b 34#include <linux/notifier.h>
b0defcdb 35#include <linux/mutex.h>
e9a705a0 36#include <linux/kthread.h>
1da177e4 37#include <asm/irq.h>
1da177e4
LT
38#include <linux/interrupt.h>
39#include <linux/rcupdate.h>
16f4232c 40#include <linux/ipmi.h>
1da177e4 41#include <linux/ipmi_smi.h>
1e89a499 42#include "ipmi_si.h"
104fb25f 43#include "ipmi_si_sm.h"
b361e27b
CM
44#include <linux/string.h>
45#include <linux/ctype.h>
dba9b4f6 46
1da177e4
LT
47/* Measure times between events in the driver. */
48#undef DEBUG_TIMING
49
50/* Call every 10 ms. */
51#define SI_TIMEOUT_TIME_USEC 10000
52#define SI_USEC_PER_JIFFY (1000000/HZ)
53#define SI_TIMEOUT_JIFFIES (SI_TIMEOUT_TIME_USEC/SI_USEC_PER_JIFFY)
54#define SI_SHORT_TIMEOUT_USEC 250 /* .25ms when the SM request a
c305e3d3 55 short timeout */
1da177e4
LT
56
57enum si_intf_state {
58 SI_NORMAL,
59 SI_GETTING_FLAGS,
60 SI_GETTING_EVENTS,
61 SI_CLEARING_FLAGS,
1da177e4 62 SI_GETTING_MESSAGES,
d9b7e4f7
CM
63 SI_CHECKING_ENABLES,
64 SI_SETTING_ENABLES
1da177e4
LT
65 /* FIXME - add watchdog stuff. */
66};
67
9dbf68f9
CM
68/* Some BT-specific defines we need here. */
69#define IPMI_BT_INTMASK_REG 2
70#define IPMI_BT_INTMASK_CLEAR_IRQ_BIT 2
71#define IPMI_BT_INTMASK_ENABLE_IRQ_BIT 1
72
59cdb2e7
AS
73/* 'invalid' to allow a firmware-specified interface to be disabled */
74const char *const si_to_str[] = { "invalid", "kcs", "smic", "bt", NULL };
1da177e4 75
dd7450ca 76static bool initialized;
bb398a4c 77
64959e2d
CM
78/*
79 * Indexes into stats[] in smi_info below.
80 */
ba8ff1c6
CM
81enum si_stat_indexes {
82 /*
83 * Number of times the driver requested a timer while an operation
84 * was in progress.
85 */
86 SI_STAT_short_timeouts = 0,
87
88 /*
89 * Number of times the driver requested a timer while nothing was in
90 * progress.
91 */
92 SI_STAT_long_timeouts,
93
94 /* Number of times the interface was idle while being polled. */
95 SI_STAT_idles,
96
97 /* Number of interrupts the driver handled. */
98 SI_STAT_interrupts,
99
100 /* Number of time the driver got an ATTN from the hardware. */
101 SI_STAT_attentions,
64959e2d 102
ba8ff1c6
CM
103 /* Number of times the driver requested flags from the hardware. */
104 SI_STAT_flag_fetches,
105
106 /* Number of times the hardware didn't follow the state machine. */
107 SI_STAT_hosed_count,
108
109 /* Number of completed messages. */
110 SI_STAT_complete_transactions,
111
112 /* Number of IPMI events received from the hardware. */
113 SI_STAT_events,
114
115 /* Number of watchdog pretimeouts. */
116 SI_STAT_watchdog_pretimeouts,
117
b3834be5 118 /* Number of asynchronous messages received. */
ba8ff1c6
CM
119 SI_STAT_incoming_messages,
120
121
122 /* This *must* remain last, add new values above this. */
123 SI_NUM_STATS
124};
64959e2d 125
c305e3d3 126struct smi_info {
57bccb4e 127 int si_num;
a567b623 128 struct ipmi_smi *intf;
1da177e4 129 struct si_sm_data *si_sm;
81d02b7f 130 const struct si_sm_handlers *handlers;
1da177e4 131 spinlock_t si_lock;
b874b985 132 struct ipmi_smi_msg *waiting_msg;
1da177e4
LT
133 struct ipmi_smi_msg *curr_msg;
134 enum si_intf_state si_state;
135
c305e3d3
CM
136 /*
137 * Used to handle the various types of I/O that can occur with
138 * IPMI
139 */
1da177e4 140 struct si_sm_io io;
1da177e4 141
c305e3d3
CM
142 /*
143 * Per-OEM handler, called from handle_flags(). Returns 1
144 * when handle_flags() needs to be re-run or 0 indicating it
145 * set si_state itself.
146 */
3ae0e0f9
CM
147 int (*oem_data_avail_handler)(struct smi_info *smi_info);
148
c305e3d3
CM
149 /*
150 * Flags from the last GET_MSG_FLAGS command, used when an ATTN
151 * is set to hold the flags until we are done handling everything
152 * from the flags.
153 */
1da177e4
LT
154#define RECEIVE_MSG_AVAIL 0x01
155#define EVENT_MSG_BUFFER_FULL 0x02
156#define WDT_PRE_TIMEOUT_INT 0x08
3ae0e0f9
CM
157#define OEM0_DATA_AVAIL 0x20
158#define OEM1_DATA_AVAIL 0x40
159#define OEM2_DATA_AVAIL 0x80
160#define OEM_DATA_AVAIL (OEM0_DATA_AVAIL | \
c305e3d3
CM
161 OEM1_DATA_AVAIL | \
162 OEM2_DATA_AVAIL)
1da177e4
LT
163 unsigned char msg_flags;
164
40112ae7 165 /* Does the BMC have an event buffer? */
7aefac26 166 bool has_event_buffer;
40112ae7 167
c305e3d3
CM
168 /*
169 * If set to true, this will request events the next time the
170 * state machine is idle.
171 */
1da177e4
LT
172 atomic_t req_events;
173
c305e3d3
CM
174 /*
175 * If true, run the state machine to completion on every send
176 * call. Generally used after a panic to make sure stuff goes
177 * out.
178 */
7aefac26 179 bool run_to_completion;
1da177e4 180
1da177e4
LT
181 /* The timer for this si. */
182 struct timer_list si_timer;
183
4f7f5551
MY
184 /* This flag is set, if the timer can be set */
185 bool timer_can_start;
186
48e8ac29
BS
187 /* This flag is set, if the timer is running (timer_pending() isn't enough) */
188 bool timer_running;
189
1da177e4
LT
190 /* The time (in jiffies) the last timeout occurred at. */
191 unsigned long last_timeout_jiffies;
192
89986496
CM
193 /* Are we waiting for the events, pretimeouts, received msgs? */
194 atomic_t need_watch;
195
c305e3d3
CM
196 /*
197 * The driver will disable interrupts when it gets into a
198 * situation where it cannot handle messages due to lack of
199 * memory. Once that situation clears up, it will re-enable
200 * interrupts.
201 */
7aefac26 202 bool interrupt_disabled;
1da177e4 203
d9b7e4f7
CM
204 /*
205 * Does the BMC support events?
206 */
207 bool supports_event_msg_buff;
208
1e7d6a45 209 /*
d0882897
CM
210 * Can we disable interrupts the global enables receive irq
211 * bit? There are currently two forms of brokenness, some
212 * systems cannot disable the bit (which is technically within
213 * the spec but a bad idea) and some systems have the bit
214 * forced to zero even though interrupts work (which is
215 * clearly outside the spec). The next bool tells which form
216 * of brokenness is present.
1e7d6a45 217 */
d0882897
CM
218 bool cannot_disable_irq;
219
220 /*
221 * Some systems are broken and cannot set the irq enable
222 * bit, even if they support interrupts.
223 */
224 bool irq_enable_broken;
1e7d6a45 225
340ff31a
CM
226 /* Is the driver in maintenance mode? */
227 bool in_maintenance_mode;
228
a8df150c
CM
229 /*
230 * Did we get an attention that we did not handle?
231 */
232 bool got_attn;
233
50c812b2 234 /* From the get device id response... */
3ae0e0f9 235 struct ipmi_device_id device_id;
1da177e4 236
cc095f0a
CM
237 /* Have we added the device group to the device? */
238 bool dev_group_added;
239
1da177e4 240 /* Counters and things for the proc filesystem. */
64959e2d 241 atomic_t stats[SI_NUM_STATS];
a9a2c44f 242
c305e3d3 243 struct task_struct *thread;
b0defcdb
CM
244
245 struct list_head link;
1da177e4
LT
246};
247
64959e2d
CM
248#define smi_inc_stat(smi, stat) \
249 atomic_inc(&(smi)->stats[SI_STAT_ ## stat])
250#define smi_get_stat(smi, stat) \
251 ((unsigned int) atomic_read(&(smi)->stats[SI_STAT_ ## stat]))
252
7a453308
CM
253#define IPMI_MAX_INTFS 4
254static int force_kipmid[IPMI_MAX_INTFS];
a51f4a81
CM
255static int num_force_kipmid;
256
7a453308 257static unsigned int kipmid_max_busy_us[IPMI_MAX_INTFS];
ae74e823
MW
258static int num_max_busy_us;
259
7aefac26 260static bool unload_when_empty = true;
b361e27b 261
b0defcdb 262static int try_smi_init(struct smi_info *smi);
71404a2f 263static void cleanup_one_si(struct smi_info *smi_info);
d2478521 264static void cleanup_ipmi_si(void);
b0defcdb 265
f93aae9f 266#ifdef DEBUG_TIMING
be850359 267void debug_timestamp(struct smi_info *smi_info, char *msg)
f93aae9f 268{
8d73b2ae 269 struct timespec64 t;
f93aae9f 270
8d73b2ae 271 ktime_get_ts64(&t);
be850359
CM
272 dev_dbg(smi_info->io.dev, "**%s: %lld.%9.9ld\n",
273 msg, t.tv_sec, t.tv_nsec);
f93aae9f
JS
274}
275#else
be850359 276#define debug_timestamp(smi_info, x)
f93aae9f
JS
277#endif
278
e041c683 279static ATOMIC_NOTIFIER_HEAD(xaction_notifier_list);
c305e3d3 280static int register_xaction_notifier(struct notifier_block *nb)
ea94027b 281{
e041c683 282 return atomic_notifier_chain_register(&xaction_notifier_list, nb);
ea94027b
CM
283}
284
1da177e4
LT
285static void deliver_recv_msg(struct smi_info *smi_info,
286 struct ipmi_smi_msg *msg)
287{
7adf579c 288 /* Deliver the message to the upper layer. */
0fbecb4f 289 ipmi_smi_msg_received(smi_info->intf, msg);
1da177e4
LT
290}
291
4d7cbac7 292static void return_hosed_msg(struct smi_info *smi_info, int cCode)
1da177e4
LT
293{
294 struct ipmi_smi_msg *msg = smi_info->curr_msg;
295
4d7cbac7
CM
296 if (cCode < 0 || cCode > IPMI_ERR_UNSPECIFIED)
297 cCode = IPMI_ERR_UNSPECIFIED;
298 /* else use it as is */
299
25985edc 300 /* Make it a response */
1da177e4
LT
301 msg->rsp[0] = msg->data[0] | 4;
302 msg->rsp[1] = msg->data[1];
4d7cbac7 303 msg->rsp[2] = cCode;
1da177e4
LT
304 msg->rsp_size = 3;
305
306 smi_info->curr_msg = NULL;
307 deliver_recv_msg(smi_info, msg);
308}
309
310static enum si_sm_result start_next_msg(struct smi_info *smi_info)
311{
312 int rv;
1da177e4 313
b874b985 314 if (!smi_info->waiting_msg) {
1da177e4
LT
315 smi_info->curr_msg = NULL;
316 rv = SI_SM_IDLE;
317 } else {
318 int err;
319
b874b985
CM
320 smi_info->curr_msg = smi_info->waiting_msg;
321 smi_info->waiting_msg = NULL;
be850359 322 debug_timestamp(smi_info, "Start2");
e041c683
AS
323 err = atomic_notifier_call_chain(&xaction_notifier_list,
324 0, smi_info);
ea94027b
CM
325 if (err & NOTIFY_STOP_MASK) {
326 rv = SI_SM_CALL_WITHOUT_DELAY;
327 goto out;
328 }
1da177e4
LT
329 err = smi_info->handlers->start_transaction(
330 smi_info->si_sm,
331 smi_info->curr_msg->data,
332 smi_info->curr_msg->data_size);
c305e3d3 333 if (err)
4d7cbac7 334 return_hosed_msg(smi_info, err);
1da177e4
LT
335
336 rv = SI_SM_CALL_WITHOUT_DELAY;
337 }
76824852 338out:
1da177e4
LT
339 return rv;
340}
341
0cfec916
CM
342static void smi_mod_timer(struct smi_info *smi_info, unsigned long new_val)
343{
4f7f5551
MY
344 if (!smi_info->timer_can_start)
345 return;
0cfec916
CM
346 smi_info->last_timeout_jiffies = jiffies;
347 mod_timer(&smi_info->si_timer, new_val);
348 smi_info->timer_running = true;
349}
350
351/*
352 * Start a new message and (re)start the timer and thread.
353 */
354static void start_new_msg(struct smi_info *smi_info, unsigned char *msg,
355 unsigned int size)
356{
357 smi_mod_timer(smi_info, jiffies + SI_TIMEOUT_JIFFIES);
358
359 if (smi_info->thread)
360 wake_up_process(smi_info->thread);
361
362 smi_info->handlers->start_transaction(smi_info->si_sm, msg, size);
363}
364
4f7f5551 365static void start_check_enables(struct smi_info *smi_info)
ee6cd5f8
CM
366{
367 unsigned char msg[2];
368
369 msg[0] = (IPMI_NETFN_APP_REQUEST << 2);
370 msg[1] = IPMI_GET_BMC_GLOBAL_ENABLES_CMD;
371
4f7f5551 372 start_new_msg(smi_info, msg, 2);
d9b7e4f7 373 smi_info->si_state = SI_CHECKING_ENABLES;
ee6cd5f8
CM
374}
375
4f7f5551 376static void start_clear_flags(struct smi_info *smi_info)
1da177e4
LT
377{
378 unsigned char msg[3];
379
380 /* Make sure the watchdog pre-timeout flag is not set at startup. */
381 msg[0] = (IPMI_NETFN_APP_REQUEST << 2);
382 msg[1] = IPMI_CLEAR_MSG_FLAGS_CMD;
383 msg[2] = WDT_PRE_TIMEOUT_INT;
384
4f7f5551 385 start_new_msg(smi_info, msg, 3);
1da177e4
LT
386 smi_info->si_state = SI_CLEARING_FLAGS;
387}
388
968bf7cc
CM
389static void start_getting_msg_queue(struct smi_info *smi_info)
390{
391 smi_info->curr_msg->data[0] = (IPMI_NETFN_APP_REQUEST << 2);
392 smi_info->curr_msg->data[1] = IPMI_GET_MSG_CMD;
393 smi_info->curr_msg->data_size = 2;
394
0cfec916
CM
395 start_new_msg(smi_info, smi_info->curr_msg->data,
396 smi_info->curr_msg->data_size);
968bf7cc
CM
397 smi_info->si_state = SI_GETTING_MESSAGES;
398}
399
400static void start_getting_events(struct smi_info *smi_info)
401{
402 smi_info->curr_msg->data[0] = (IPMI_NETFN_APP_REQUEST << 2);
403 smi_info->curr_msg->data[1] = IPMI_READ_EVENT_MSG_BUFFER_CMD;
404 smi_info->curr_msg->data_size = 2;
405
0cfec916
CM
406 start_new_msg(smi_info, smi_info->curr_msg->data,
407 smi_info->curr_msg->data_size);
968bf7cc
CM
408 smi_info->si_state = SI_GETTING_EVENTS;
409}
410
c305e3d3
CM
411/*
412 * When we have a situtaion where we run out of memory and cannot
413 * allocate messages, we just leave them in the BMC and run the system
414 * polled until we can allocate some memory. Once we have some
415 * memory, we will re-enable the interrupt.
1e7d6a45
CM
416 *
417 * Note that we cannot just use disable_irq(), since the interrupt may
418 * be shared.
c305e3d3 419 */
4f7f5551 420static inline bool disable_si_irq(struct smi_info *smi_info)
1da177e4 421{
910840f2 422 if ((smi_info->io.irq) && (!smi_info->interrupt_disabled)) {
7aefac26 423 smi_info->interrupt_disabled = true;
4f7f5551 424 start_check_enables(smi_info);
968bf7cc 425 return true;
1da177e4 426 }
968bf7cc 427 return false;
1da177e4
LT
428}
429
968bf7cc 430static inline bool enable_si_irq(struct smi_info *smi_info)
1da177e4 431{
910840f2 432 if ((smi_info->io.irq) && (smi_info->interrupt_disabled)) {
7aefac26 433 smi_info->interrupt_disabled = false;
4f7f5551 434 start_check_enables(smi_info);
968bf7cc
CM
435 return true;
436 }
437 return false;
438}
439
440/*
441 * Allocate a message. If unable to allocate, start the interrupt
442 * disable process and return NULL. If able to allocate but
443 * interrupts are disabled, free the message and return NULL after
444 * starting the interrupt enable process.
445 */
446static struct ipmi_smi_msg *alloc_msg_handle_irq(struct smi_info *smi_info)
447{
448 struct ipmi_smi_msg *msg;
449
450 msg = ipmi_alloc_smi_msg();
451 if (!msg) {
4f7f5551 452 if (!disable_si_irq(smi_info))
968bf7cc
CM
453 smi_info->si_state = SI_NORMAL;
454 } else if (enable_si_irq(smi_info)) {
455 ipmi_free_smi_msg(msg);
456 msg = NULL;
1da177e4 457 }
968bf7cc 458 return msg;
1da177e4
LT
459}
460
461static void handle_flags(struct smi_info *smi_info)
462{
76824852 463retry:
1da177e4
LT
464 if (smi_info->msg_flags & WDT_PRE_TIMEOUT_INT) {
465 /* Watchdog pre-timeout */
64959e2d 466 smi_inc_stat(smi_info, watchdog_pretimeouts);
1da177e4 467
4f7f5551 468 start_clear_flags(smi_info);
1da177e4 469 smi_info->msg_flags &= ~WDT_PRE_TIMEOUT_INT;
0fbecb4f 470 ipmi_smi_watchdog_pretimeout(smi_info->intf);
1da177e4
LT
471 } else if (smi_info->msg_flags & RECEIVE_MSG_AVAIL) {
472 /* Messages available. */
968bf7cc
CM
473 smi_info->curr_msg = alloc_msg_handle_irq(smi_info);
474 if (!smi_info->curr_msg)
1da177e4 475 return;
1da177e4 476
968bf7cc 477 start_getting_msg_queue(smi_info);
1da177e4
LT
478 } else if (smi_info->msg_flags & EVENT_MSG_BUFFER_FULL) {
479 /* Events available. */
968bf7cc
CM
480 smi_info->curr_msg = alloc_msg_handle_irq(smi_info);
481 if (!smi_info->curr_msg)
1da177e4 482 return;
1da177e4 483
968bf7cc 484 start_getting_events(smi_info);
4064d5ef 485 } else if (smi_info->msg_flags & OEM_DATA_AVAIL &&
c305e3d3 486 smi_info->oem_data_avail_handler) {
4064d5ef
CM
487 if (smi_info->oem_data_avail_handler(smi_info))
488 goto retry;
c305e3d3 489 } else
1da177e4 490 smi_info->si_state = SI_NORMAL;
1da177e4
LT
491}
492
d9b7e4f7
CM
493/*
494 * Global enables we care about.
495 */
496#define GLOBAL_ENABLES_MASK (IPMI_BMC_EVT_MSG_BUFF | IPMI_BMC_RCV_MSG_INTR | \
497 IPMI_BMC_EVT_MSG_INTR)
498
95c97b59
CM
499static u8 current_global_enables(struct smi_info *smi_info, u8 base,
500 bool *irq_on)
d9b7e4f7
CM
501{
502 u8 enables = 0;
503
504 if (smi_info->supports_event_msg_buff)
505 enables |= IPMI_BMC_EVT_MSG_BUFF;
d9b7e4f7 506
910840f2 507 if (((smi_info->io.irq && !smi_info->interrupt_disabled) ||
d0882897
CM
508 smi_info->cannot_disable_irq) &&
509 !smi_info->irq_enable_broken)
d9b7e4f7 510 enables |= IPMI_BMC_RCV_MSG_INTR;
d9b7e4f7
CM
511
512 if (smi_info->supports_event_msg_buff &&
910840f2 513 smi_info->io.irq && !smi_info->interrupt_disabled &&
d0882897 514 !smi_info->irq_enable_broken)
d9b7e4f7 515 enables |= IPMI_BMC_EVT_MSG_INTR;
d9b7e4f7 516
95c97b59
CM
517 *irq_on = enables & (IPMI_BMC_EVT_MSG_INTR | IPMI_BMC_RCV_MSG_INTR);
518
d9b7e4f7
CM
519 return enables;
520}
521
95c97b59
CM
522static void check_bt_irq(struct smi_info *smi_info, bool irq_on)
523{
524 u8 irqstate = smi_info->io.inputb(&smi_info->io, IPMI_BT_INTMASK_REG);
525
526 irqstate &= IPMI_BT_INTMASK_ENABLE_IRQ_BIT;
527
528 if ((bool)irqstate == irq_on)
529 return;
530
531 if (irq_on)
532 smi_info->io.outputb(&smi_info->io, IPMI_BT_INTMASK_REG,
533 IPMI_BT_INTMASK_ENABLE_IRQ_BIT);
534 else
535 smi_info->io.outputb(&smi_info->io, IPMI_BT_INTMASK_REG, 0);
536}
537
1da177e4
LT
538static void handle_transaction_done(struct smi_info *smi_info)
539{
540 struct ipmi_smi_msg *msg;
1da177e4 541
be850359 542 debug_timestamp(smi_info, "Done");
1da177e4
LT
543 switch (smi_info->si_state) {
544 case SI_NORMAL:
b0defcdb 545 if (!smi_info->curr_msg)
1da177e4
LT
546 break;
547
548 smi_info->curr_msg->rsp_size
549 = smi_info->handlers->get_result(
550 smi_info->si_sm,
551 smi_info->curr_msg->rsp,
552 IPMI_MAX_MSG_LENGTH);
553
c305e3d3
CM
554 /*
555 * Do this here becase deliver_recv_msg() releases the
556 * lock, and a new message can be put in during the
557 * time the lock is released.
558 */
1da177e4
LT
559 msg = smi_info->curr_msg;
560 smi_info->curr_msg = NULL;
561 deliver_recv_msg(smi_info, msg);
562 break;
563
564 case SI_GETTING_FLAGS:
565 {
566 unsigned char msg[4];
567 unsigned int len;
568
569 /* We got the flags from the SMI, now handle them. */
570 len = smi_info->handlers->get_result(smi_info->si_sm, msg, 4);
571 if (msg[2] != 0) {
c305e3d3 572 /* Error fetching flags, just give up for now. */
1da177e4
LT
573 smi_info->si_state = SI_NORMAL;
574 } else if (len < 4) {
c305e3d3
CM
575 /*
576 * Hmm, no flags. That's technically illegal, but
577 * don't use uninitialized data.
578 */
1da177e4
LT
579 smi_info->si_state = SI_NORMAL;
580 } else {
581 smi_info->msg_flags = msg[3];
582 handle_flags(smi_info);
583 }
584 break;
585 }
586
587 case SI_CLEARING_FLAGS:
1da177e4
LT
588 {
589 unsigned char msg[3];
590
591 /* We cleared the flags. */
592 smi_info->handlers->get_result(smi_info->si_sm, msg, 3);
593 if (msg[2] != 0) {
594 /* Error clearing flags */
ca8c1c53 595 dev_warn_ratelimited(smi_info->io.dev,
279fbd0c 596 "Error clearing flags: %2.2x\n", msg[2]);
1da177e4 597 }
d9b7e4f7 598 smi_info->si_state = SI_NORMAL;
1da177e4
LT
599 break;
600 }
601
602 case SI_GETTING_EVENTS:
603 {
604 smi_info->curr_msg->rsp_size
605 = smi_info->handlers->get_result(
606 smi_info->si_sm,
607 smi_info->curr_msg->rsp,
608 IPMI_MAX_MSG_LENGTH);
609
c305e3d3
CM
610 /*
611 * Do this here becase deliver_recv_msg() releases the
612 * lock, and a new message can be put in during the
613 * time the lock is released.
614 */
1da177e4
LT
615 msg = smi_info->curr_msg;
616 smi_info->curr_msg = NULL;
617 if (msg->rsp[2] != 0) {
618 /* Error getting event, probably done. */
619 msg->done(msg);
620
621 /* Take off the event flag. */
622 smi_info->msg_flags &= ~EVENT_MSG_BUFFER_FULL;
623 handle_flags(smi_info);
624 } else {
64959e2d 625 smi_inc_stat(smi_info, events);
1da177e4 626
c305e3d3
CM
627 /*
628 * Do this before we deliver the message
629 * because delivering the message releases the
630 * lock and something else can mess with the
631 * state.
632 */
1da177e4
LT
633 handle_flags(smi_info);
634
635 deliver_recv_msg(smi_info, msg);
636 }
637 break;
638 }
639
640 case SI_GETTING_MESSAGES:
641 {
642 smi_info->curr_msg->rsp_size
643 = smi_info->handlers->get_result(
644 smi_info->si_sm,
645 smi_info->curr_msg->rsp,
646 IPMI_MAX_MSG_LENGTH);
647
c305e3d3
CM
648 /*
649 * Do this here becase deliver_recv_msg() releases the
650 * lock, and a new message can be put in during the
651 * time the lock is released.
652 */
1da177e4
LT
653 msg = smi_info->curr_msg;
654 smi_info->curr_msg = NULL;
655 if (msg->rsp[2] != 0) {
656 /* Error getting event, probably done. */
657 msg->done(msg);
658
659 /* Take off the msg flag. */
660 smi_info->msg_flags &= ~RECEIVE_MSG_AVAIL;
661 handle_flags(smi_info);
662 } else {
64959e2d 663 smi_inc_stat(smi_info, incoming_messages);
1da177e4 664
c305e3d3
CM
665 /*
666 * Do this before we deliver the message
667 * because delivering the message releases the
668 * lock and something else can mess with the
669 * state.
670 */
1da177e4
LT
671 handle_flags(smi_info);
672
673 deliver_recv_msg(smi_info, msg);
674 }
675 break;
676 }
677
d9b7e4f7 678 case SI_CHECKING_ENABLES:
1da177e4
LT
679 {
680 unsigned char msg[4];
d9b7e4f7 681 u8 enables;
95c97b59 682 bool irq_on;
1da177e4
LT
683
684 /* We got the flags from the SMI, now handle them. */
685 smi_info->handlers->get_result(smi_info->si_sm, msg, 4);
686 if (msg[2] != 0) {
ca8c1c53
WY
687 dev_warn_ratelimited(smi_info->io.dev,
688 "Couldn't get irq info: %x,\n"
689 "Maybe ok, but ipmi might run very slowly.\n",
690 msg[2]);
1da177e4 691 smi_info->si_state = SI_NORMAL;
d9b7e4f7
CM
692 break;
693 }
95c97b59 694 enables = current_global_enables(smi_info, 0, &irq_on);
910840f2 695 if (smi_info->io.si_type == SI_BT)
95c97b59
CM
696 /* BT has its own interrupt enable bit. */
697 check_bt_irq(smi_info, irq_on);
d9b7e4f7
CM
698 if (enables != (msg[3] & GLOBAL_ENABLES_MASK)) {
699 /* Enables are not correct, fix them. */
1da177e4
LT
700 msg[0] = (IPMI_NETFN_APP_REQUEST << 2);
701 msg[1] = IPMI_SET_BMC_GLOBAL_ENABLES_CMD;
d9b7e4f7 702 msg[2] = enables | (msg[3] & ~GLOBAL_ENABLES_MASK);
1da177e4
LT
703 smi_info->handlers->start_transaction(
704 smi_info->si_sm, msg, 3);
d9b7e4f7
CM
705 smi_info->si_state = SI_SETTING_ENABLES;
706 } else if (smi_info->supports_event_msg_buff) {
707 smi_info->curr_msg = ipmi_alloc_smi_msg();
708 if (!smi_info->curr_msg) {
709 smi_info->si_state = SI_NORMAL;
710 break;
711 }
5ac7b2fc 712 start_getting_events(smi_info);
d9b7e4f7
CM
713 } else {
714 smi_info->si_state = SI_NORMAL;
1da177e4
LT
715 }
716 break;
717 }
718
d9b7e4f7 719 case SI_SETTING_ENABLES:
1da177e4
LT
720 {
721 unsigned char msg[4];
722
1da177e4 723 smi_info->handlers->get_result(smi_info->si_sm, msg, 4);
d9b7e4f7 724 if (msg[2] != 0)
ca8c1c53 725 dev_warn_ratelimited(smi_info->io.dev,
d9b7e4f7
CM
726 "Could not set the global enables: 0x%x.\n",
727 msg[2]);
728
729 if (smi_info->supports_event_msg_buff) {
730 smi_info->curr_msg = ipmi_alloc_smi_msg();
731 if (!smi_info->curr_msg) {
732 smi_info->si_state = SI_NORMAL;
733 break;
734 }
5ac7b2fc 735 start_getting_events(smi_info);
ee6cd5f8 736 } else {
d9b7e4f7 737 smi_info->si_state = SI_NORMAL;
ee6cd5f8 738 }
ee6cd5f8
CM
739 break;
740 }
1da177e4
LT
741 }
742}
743
c305e3d3
CM
744/*
745 * Called on timeouts and events. Timeouts should pass the elapsed
746 * time, interrupts should pass in zero. Must be called with
747 * si_lock held and interrupts disabled.
748 */
1da177e4
LT
749static enum si_sm_result smi_event_handler(struct smi_info *smi_info,
750 int time)
751{
752 enum si_sm_result si_sm_result;
753
76824852 754restart:
c305e3d3
CM
755 /*
756 * There used to be a loop here that waited a little while
757 * (around 25us) before giving up. That turned out to be
758 * pointless, the minimum delays I was seeing were in the 300us
759 * range, which is far too long to wait in an interrupt. So
760 * we just run until the state machine tells us something
761 * happened or it needs a delay.
762 */
1da177e4
LT
763 si_sm_result = smi_info->handlers->event(smi_info->si_sm, time);
764 time = 0;
765 while (si_sm_result == SI_SM_CALL_WITHOUT_DELAY)
1da177e4 766 si_sm_result = smi_info->handlers->event(smi_info->si_sm, 0);
1da177e4 767
c305e3d3 768 if (si_sm_result == SI_SM_TRANSACTION_COMPLETE) {
64959e2d 769 smi_inc_stat(smi_info, complete_transactions);
1da177e4
LT
770
771 handle_transaction_done(smi_info);
d9dffd2a 772 goto restart;
c305e3d3 773 } else if (si_sm_result == SI_SM_HOSED) {
64959e2d 774 smi_inc_stat(smi_info, hosed_count);
1da177e4 775
c305e3d3
CM
776 /*
777 * Do the before return_hosed_msg, because that
778 * releases the lock.
779 */
1da177e4
LT
780 smi_info->si_state = SI_NORMAL;
781 if (smi_info->curr_msg != NULL) {
c305e3d3
CM
782 /*
783 * If we were handling a user message, format
784 * a response to send to the upper layer to
785 * tell it about the error.
786 */
4d7cbac7 787 return_hosed_msg(smi_info, IPMI_ERR_UNSPECIFIED);
1da177e4 788 }
d9dffd2a 789 goto restart;
1da177e4
LT
790 }
791
4ea18425
CM
792 /*
793 * We prefer handling attn over new messages. But don't do
794 * this if there is not yet an upper layer to handle anything.
795 */
0fbecb4f 796 if (si_sm_result == SI_SM_ATTN || smi_info->got_attn) {
1da177e4
LT
797 unsigned char msg[2];
798
a8df150c
CM
799 if (smi_info->si_state != SI_NORMAL) {
800 /*
801 * We got an ATTN, but we are doing something else.
802 * Handle the ATTN later.
803 */
804 smi_info->got_attn = true;
805 } else {
806 smi_info->got_attn = false;
807 smi_inc_stat(smi_info, attentions);
1da177e4 808
a8df150c
CM
809 /*
810 * Got a attn, send down a get message flags to see
811 * what's causing it. It would be better to handle
812 * this in the upper layer, but due to the way
813 * interrupts work with the SMI, that's not really
814 * possible.
815 */
816 msg[0] = (IPMI_NETFN_APP_REQUEST << 2);
817 msg[1] = IPMI_GET_MSG_FLAGS_CMD;
1da177e4 818
0cfec916 819 start_new_msg(smi_info, msg, 2);
a8df150c
CM
820 smi_info->si_state = SI_GETTING_FLAGS;
821 goto restart;
822 }
1da177e4
LT
823 }
824
825 /* If we are currently idle, try to start the next message. */
826 if (si_sm_result == SI_SM_IDLE) {
64959e2d 827 smi_inc_stat(smi_info, idles);
1da177e4
LT
828
829 si_sm_result = start_next_msg(smi_info);
830 if (si_sm_result != SI_SM_IDLE)
831 goto restart;
c305e3d3 832 }
1da177e4
LT
833
834 if ((si_sm_result == SI_SM_IDLE)
c305e3d3
CM
835 && (atomic_read(&smi_info->req_events))) {
836 /*
837 * We are idle and the upper layer requested that I fetch
838 * events, so do so.
839 */
55162fb1 840 atomic_set(&smi_info->req_events, 0);
1da177e4 841
d9b7e4f7
CM
842 /*
843 * Take this opportunity to check the interrupt and
844 * message enable state for the BMC. The BMC can be
845 * asynchronously reset, and may thus get interrupts
846 * disable and messages disabled.
847 */
910840f2 848 if (smi_info->supports_event_msg_buff || smi_info->io.irq) {
4f7f5551 849 start_check_enables(smi_info);
d9b7e4f7
CM
850 } else {
851 smi_info->curr_msg = alloc_msg_handle_irq(smi_info);
852 if (!smi_info->curr_msg)
853 goto out;
1da177e4 854
d9b7e4f7
CM
855 start_getting_events(smi_info);
856 }
1da177e4
LT
857 goto restart;
858 }
314ef52f
CM
859
860 if (si_sm_result == SI_SM_IDLE && smi_info->timer_running) {
861 /* Ok it if fails, the timer will just go off. */
862 if (del_timer(&smi_info->si_timer))
863 smi_info->timer_running = false;
864 }
865
76824852 866out:
1da177e4
LT
867 return si_sm_result;
868}
869
89986496
CM
870static void check_start_timer_thread(struct smi_info *smi_info)
871{
872 if (smi_info->si_state == SI_NORMAL && smi_info->curr_msg == NULL) {
873 smi_mod_timer(smi_info, jiffies + SI_TIMEOUT_JIFFIES);
874
875 if (smi_info->thread)
876 wake_up_process(smi_info->thread);
877
878 start_next_msg(smi_info);
879 smi_event_handler(smi_info, 0);
880 }
881}
882
82802f96 883static void flush_messages(void *send_info)
e45361d7 884{
82802f96 885 struct smi_info *smi_info = send_info;
e45361d7
HK
886 enum si_sm_result result;
887
888 /*
889 * Currently, this function is called only in run-to-completion
890 * mode. This means we are single-threaded, no need for locks.
891 */
892 result = smi_event_handler(smi_info, 0);
893 while (result != SI_SM_IDLE) {
894 udelay(SI_SHORT_TIMEOUT_USEC);
895 result = smi_event_handler(smi_info, SI_SHORT_TIMEOUT_USEC);
896 }
897}
898
1da177e4 899static void sender(void *send_info,
99ab32f3 900 struct ipmi_smi_msg *msg)
1da177e4
LT
901{
902 struct smi_info *smi_info = send_info;
1da177e4 903 unsigned long flags;
1da177e4 904
be850359 905 debug_timestamp(smi_info, "Enqueue");
1da177e4
LT
906
907 if (smi_info->run_to_completion) {
bda4c30a 908 /*
82802f96
HK
909 * If we are running to completion, start it. Upper
910 * layer will call flush_messages to clear it out.
bda4c30a 911 */
9f812704 912 smi_info->waiting_msg = msg;
1da177e4 913 return;
1da177e4 914 }
1da177e4 915
f60adf42 916 spin_lock_irqsave(&smi_info->si_lock, flags);
1d86e29b
CM
917 /*
918 * The following two lines don't need to be under the lock for
919 * the lock's sake, but they do need SMP memory barriers to
920 * avoid getting things out of order. We are already claiming
921 * the lock, anyway, so just do it under the lock to avoid the
922 * ordering problem.
923 */
924 BUG_ON(smi_info->waiting_msg);
925 smi_info->waiting_msg = msg;
89986496 926 check_start_timer_thread(smi_info);
bda4c30a 927 spin_unlock_irqrestore(&smi_info->si_lock, flags);
1da177e4
LT
928}
929
7aefac26 930static void set_run_to_completion(void *send_info, bool i_run_to_completion)
1da177e4
LT
931{
932 struct smi_info *smi_info = send_info;
1da177e4
LT
933
934 smi_info->run_to_completion = i_run_to_completion;
e45361d7
HK
935 if (i_run_to_completion)
936 flush_messages(smi_info);
1da177e4
LT
937}
938
ae74e823 939/*
8d73b2ae
AB
940 * Use -1 as a special constant to tell that we are spinning in kipmid
941 * looking for something and not delaying between checks
ae74e823 942 */
8d73b2ae 943#define IPMI_TIME_NOT_BUSY ns_to_ktime(-1ull)
cbb19cb1
CM
944static inline bool ipmi_thread_busy_wait(enum si_sm_result smi_result,
945 const struct smi_info *smi_info,
8d73b2ae 946 ktime_t *busy_until)
ae74e823
MW
947{
948 unsigned int max_busy_us = 0;
949
57bccb4e
CM
950 if (smi_info->si_num < num_max_busy_us)
951 max_busy_us = kipmid_max_busy_us[smi_info->si_num];
ae74e823 952 if (max_busy_us == 0 || smi_result != SI_SM_CALL_WITH_DELAY)
8d73b2ae
AB
953 *busy_until = IPMI_TIME_NOT_BUSY;
954 else if (*busy_until == IPMI_TIME_NOT_BUSY) {
955 *busy_until = ktime_get() + max_busy_us * NSEC_PER_USEC;
ae74e823 956 } else {
8d73b2ae
AB
957 if (unlikely(ktime_get() > *busy_until)) {
958 *busy_until = IPMI_TIME_NOT_BUSY;
cbb19cb1 959 return false;
ae74e823
MW
960 }
961 }
cbb19cb1 962 return true;
ae74e823
MW
963}
964
965
966/*
967 * A busy-waiting loop for speeding up IPMI operation.
968 *
969 * Lousy hardware makes this hard. This is only enabled for systems
970 * that are not BT and do not have interrupts. It starts spinning
971 * when an operation is complete or until max_busy tells it to stop
972 * (if that is enabled). See the paragraph on kimid_max_busy_us in
283b69bf 973 * Documentation/driver-api/ipmi.rst for details.
ae74e823 974 */
a9a2c44f
CM
975static int ipmi_thread(void *data)
976{
977 struct smi_info *smi_info = data;
e9a705a0 978 unsigned long flags;
a9a2c44f 979 enum si_sm_result smi_result;
8d73b2ae 980 ktime_t busy_until = IPMI_TIME_NOT_BUSY;
a9a2c44f 981
8698a745 982 set_user_nice(current, MAX_NICE);
e9a705a0 983 while (!kthread_should_stop()) {
ae74e823
MW
984 int busy_wait;
985
a9a2c44f 986 spin_lock_irqsave(&(smi_info->si_lock), flags);
8a3628d5 987 smi_result = smi_event_handler(smi_info, 0);
48e8ac29
BS
988
989 /*
990 * If the driver is doing something, there is a possible
991 * race with the timer. If the timer handler see idle,
992 * and the thread here sees something else, the timer
993 * handler won't restart the timer even though it is
994 * required. So start it here if necessary.
995 */
996 if (smi_result != SI_SM_IDLE && !smi_info->timer_running)
997 smi_mod_timer(smi_info, jiffies + SI_TIMEOUT_JIFFIES);
998
a9a2c44f 999 spin_unlock_irqrestore(&(smi_info->si_lock), flags);
ae74e823
MW
1000 busy_wait = ipmi_thread_busy_wait(smi_result, smi_info,
1001 &busy_until);
340ff31a 1002 if (smi_result == SI_SM_CALL_WITHOUT_DELAY) {
c305e3d3 1003 ; /* do nothing */
340ff31a
CM
1004 } else if (smi_result == SI_SM_CALL_WITH_DELAY && busy_wait) {
1005 /*
1006 * In maintenance mode we run as fast as
1007 * possible to allow firmware updates to
1008 * complete as fast as possible, but normally
1009 * don't bang on the scheduler.
1010 */
1011 if (smi_info->in_maintenance_mode)
1012 schedule();
1013 else
1014 usleep_range(100, 200);
1015 } else if (smi_result == SI_SM_IDLE) {
89986496
CM
1016 if (atomic_read(&smi_info->need_watch)) {
1017 schedule_timeout_interruptible(100);
1018 } else {
1019 /* Wait to be woken up when we are needed. */
1020 __set_current_state(TASK_INTERRUPTIBLE);
1021 schedule();
1022 }
340ff31a 1023 } else {
8d1f66dc 1024 schedule_timeout_interruptible(1);
340ff31a 1025 }
a9a2c44f 1026 }
a9a2c44f
CM
1027 return 0;
1028}
1029
1030
1da177e4
LT
1031static void poll(void *send_info)
1032{
1033 struct smi_info *smi_info = send_info;
f60adf42 1034 unsigned long flags = 0;
7aefac26 1035 bool run_to_completion = smi_info->run_to_completion;
1da177e4 1036
15c62e10
CM
1037 /*
1038 * Make sure there is some delay in the poll loop so we can
1039 * drive time forward and timeout things.
1040 */
1041 udelay(10);
f60adf42
CM
1042 if (!run_to_completion)
1043 spin_lock_irqsave(&smi_info->si_lock, flags);
15c62e10 1044 smi_event_handler(smi_info, 10);
f60adf42
CM
1045 if (!run_to_completion)
1046 spin_unlock_irqrestore(&smi_info->si_lock, flags);
1da177e4
LT
1047}
1048
1049static void request_events(void *send_info)
1050{
1051 struct smi_info *smi_info = send_info;
1052
b874b985 1053 if (!smi_info->has_event_buffer)
b361e27b
CM
1054 return;
1055
1da177e4
LT
1056 atomic_set(&smi_info->req_events, 1);
1057}
1058
c65ea996 1059static void set_need_watch(void *send_info, unsigned int watch_mask)
89986496
CM
1060{
1061 struct smi_info *smi_info = send_info;
1062 unsigned long flags;
c65ea996
CM
1063 int enable;
1064
e1891cff 1065 enable = !!watch_mask;
89986496
CM
1066
1067 atomic_set(&smi_info->need_watch, enable);
1068 spin_lock_irqsave(&smi_info->si_lock, flags);
1069 check_start_timer_thread(smi_info);
1070 spin_unlock_irqrestore(&smi_info->si_lock, flags);
1071}
1072
e99e88a9 1073static void smi_timeout(struct timer_list *t)
1da177e4 1074{
e99e88a9 1075 struct smi_info *smi_info = from_timer(smi_info, t, si_timer);
1da177e4
LT
1076 enum si_sm_result smi_result;
1077 unsigned long flags;
1078 unsigned long jiffies_now;
c4edff1c 1079 long time_diff;
3326f4f2 1080 long timeout;
1da177e4 1081
1da177e4 1082 spin_lock_irqsave(&(smi_info->si_lock), flags);
be850359 1083 debug_timestamp(smi_info, "Timer");
f93aae9f 1084
1da177e4 1085 jiffies_now = jiffies;
c4edff1c 1086 time_diff = (((long)jiffies_now - (long)smi_info->last_timeout_jiffies)
1da177e4
LT
1087 * SI_USEC_PER_JIFFY);
1088 smi_result = smi_event_handler(smi_info, time_diff);
1089
910840f2 1090 if ((smi_info->io.irq) && (!smi_info->interrupt_disabled)) {
1da177e4 1091 /* Running with interrupts, only do long timeouts. */
3326f4f2 1092 timeout = jiffies + SI_TIMEOUT_JIFFIES;
64959e2d 1093 smi_inc_stat(smi_info, long_timeouts);
3326f4f2 1094 goto do_mod_timer;
1da177e4
LT
1095 }
1096
c305e3d3
CM
1097 /*
1098 * If the state machine asks for a short delay, then shorten
1099 * the timer timeout.
1100 */
1da177e4 1101 if (smi_result == SI_SM_CALL_WITH_DELAY) {
64959e2d 1102 smi_inc_stat(smi_info, short_timeouts);
3326f4f2 1103 timeout = jiffies + 1;
1da177e4 1104 } else {
64959e2d 1105 smi_inc_stat(smi_info, long_timeouts);
3326f4f2 1106 timeout = jiffies + SI_TIMEOUT_JIFFIES;
1da177e4
LT
1107 }
1108
76824852 1109do_mod_timer:
3326f4f2 1110 if (smi_result != SI_SM_IDLE)
48e8ac29
BS
1111 smi_mod_timer(smi_info, timeout);
1112 else
1113 smi_info->timer_running = false;
1114 spin_unlock_irqrestore(&(smi_info->si_lock), flags);
1da177e4
LT
1115}
1116
4f3e8199 1117irqreturn_t ipmi_si_irq_handler(int irq, void *data)
1da177e4
LT
1118{
1119 struct smi_info *smi_info = data;
1120 unsigned long flags;
1da177e4 1121
4f3e8199
CM
1122 if (smi_info->io.si_type == SI_BT)
1123 /* We need to clear the IRQ flag for the BT interface. */
1124 smi_info->io.outputb(&smi_info->io, IPMI_BT_INTMASK_REG,
1125 IPMI_BT_INTMASK_CLEAR_IRQ_BIT
1126 | IPMI_BT_INTMASK_ENABLE_IRQ_BIT);
1127
1da177e4
LT
1128 spin_lock_irqsave(&(smi_info->si_lock), flags);
1129
64959e2d 1130 smi_inc_stat(smi_info, interrupts);
1da177e4 1131
be850359 1132 debug_timestamp(smi_info, "Interrupt");
f93aae9f 1133
1da177e4 1134 smi_event_handler(smi_info, 0);
1da177e4
LT
1135 spin_unlock_irqrestore(&(smi_info->si_lock), flags);
1136 return IRQ_HANDLED;
1137}
1138
a567b623
CM
1139static int smi_start_processing(void *send_info,
1140 struct ipmi_smi *intf)
453823ba
CM
1141{
1142 struct smi_info *new_smi = send_info;
a51f4a81 1143 int enable = 0;
453823ba
CM
1144
1145 new_smi->intf = intf;
1146
1147 /* Set up the timer that drives the interface. */
e99e88a9 1148 timer_setup(&new_smi->si_timer, smi_timeout, 0);
4f7f5551 1149 new_smi->timer_can_start = true;
48e8ac29 1150 smi_mod_timer(new_smi, jiffies + SI_TIMEOUT_JIFFIES);
453823ba 1151
27f972d3 1152 /* Try to claim any interrupts. */
4f3e8199
CM
1153 if (new_smi->io.irq_setup) {
1154 new_smi->io.irq_handler_data = new_smi;
1155 new_smi->io.irq_setup(&new_smi->io);
1156 }
27f972d3 1157
a51f4a81
CM
1158 /*
1159 * Check if the user forcefully enabled the daemon.
1160 */
57bccb4e
CM
1161 if (new_smi->si_num < num_force_kipmid)
1162 enable = force_kipmid[new_smi->si_num];
df3fe8de
CM
1163 /*
1164 * The BT interface is efficient enough to not need a thread,
1165 * and there is no need for a thread if we have interrupts.
1166 */
910840f2 1167 else if ((new_smi->io.si_type != SI_BT) && (!new_smi->io.irq))
a51f4a81
CM
1168 enable = 1;
1169
1170 if (enable) {
453823ba 1171 new_smi->thread = kthread_run(ipmi_thread, new_smi,
57bccb4e 1172 "kipmi%d", new_smi->si_num);
453823ba 1173 if (IS_ERR(new_smi->thread)) {
07cbd87b
AS
1174 dev_notice(new_smi->io.dev,
1175 "Could not start kernel thread due to error %ld, only using timers to drive the interface\n",
279fbd0c 1176 PTR_ERR(new_smi->thread));
453823ba
CM
1177 new_smi->thread = NULL;
1178 }
1179 }
1180
1181 return 0;
1182}
9dbf68f9 1183
16f4232c
ZY
1184static int get_smi_info(void *send_info, struct ipmi_smi_info *data)
1185{
1186 struct smi_info *smi = send_info;
1187
910840f2
CM
1188 data->addr_src = smi->io.addr_source;
1189 data->dev = smi->io.dev;
bb398a4c 1190 data->addr_info = smi->io.addr_info;
910840f2 1191 get_device(smi->io.dev);
16f4232c
ZY
1192
1193 return 0;
1194}
1195
7aefac26 1196static void set_maintenance_mode(void *send_info, bool enable)
b9675136
CM
1197{
1198 struct smi_info *smi_info = send_info;
1199
1200 if (!enable)
1201 atomic_set(&smi_info->req_events, 0);
340ff31a 1202 smi_info->in_maintenance_mode = enable;
b9675136
CM
1203}
1204
7960f18a 1205static void shutdown_smi(void *send_info);
81d02b7f 1206static const struct ipmi_smi_handlers handlers = {
1da177e4 1207 .owner = THIS_MODULE,
453823ba 1208 .start_processing = smi_start_processing,
7960f18a 1209 .shutdown = shutdown_smi,
16f4232c 1210 .get_smi_info = get_smi_info,
1da177e4
LT
1211 .sender = sender,
1212 .request_events = request_events,
89986496 1213 .set_need_watch = set_need_watch,
b9675136 1214 .set_maintenance_mode = set_maintenance_mode,
1da177e4 1215 .set_run_to_completion = set_run_to_completion,
82802f96 1216 .flush_messages = flush_messages,
1da177e4
LT
1217 .poll = poll,
1218};
1219
b0defcdb 1220static LIST_HEAD(smi_infos);
d6dfd131 1221static DEFINE_MUTEX(smi_infos_lock);
b0defcdb 1222static int smi_num; /* Used to sequence the SMIs */
1da177e4 1223
99ee6735 1224static const char * const addr_space_to_str[] = { "i/o", "mem" };
b361e27b 1225
a51f4a81 1226module_param_array(force_kipmid, int, &num_force_kipmid, 0);
07cbd87b
AS
1227MODULE_PARM_DESC(force_kipmid,
1228 "Force the kipmi daemon to be enabled (1) or disabled(0). Normally the IPMI driver auto-detects this, but the value may be overridden by this parm.");
7aefac26 1229module_param(unload_when_empty, bool, 0);
07cbd87b
AS
1230MODULE_PARM_DESC(unload_when_empty,
1231 "Unload the module if no interfaces are specified or found, default is 1. Setting to 0 is useful for hot add of devices using hotmod.");
ae74e823
MW
1232module_param_array(kipmid_max_busy_us, uint, &num_max_busy_us, 0644);
1233MODULE_PARM_DESC(kipmid_max_busy_us,
07cbd87b 1234 "Max time (in microseconds) to busy-wait for IPMI data before sleeping. 0 (default) means to wait forever. Set to 100-500 if kipmid is using up a lot of CPU time.");
1da177e4 1235
4f3e8199
CM
1236void ipmi_irq_finish_setup(struct si_sm_io *io)
1237{
1238 if (io->si_type == SI_BT)
1239 /* Enable the interrupt in the BT interface. */
1240 io->outputb(io, IPMI_BT_INTMASK_REG,
1241 IPMI_BT_INTMASK_ENABLE_IRQ_BIT);
1242}
1da177e4 1243
4f3e8199 1244void ipmi_irq_start_cleanup(struct si_sm_io *io)
1da177e4 1245{
4f3e8199 1246 if (io->si_type == SI_BT)
b0defcdb 1247 /* Disable the interrupt in the BT interface. */
4f3e8199
CM
1248 io->outputb(io, IPMI_BT_INTMASK_REG, 0);
1249}
1250
1251static void std_irq_cleanup(struct si_sm_io *io)
1252{
1253 ipmi_irq_start_cleanup(io);
1254 free_irq(io->irq, io->irq_handler_data);
1da177e4 1255}
1da177e4 1256
4f3e8199 1257int ipmi_std_irq_setup(struct si_sm_io *io)
1da177e4
LT
1258{
1259 int rv;
1260
4f3e8199 1261 if (!io->irq)
1da177e4
LT
1262 return 0;
1263
4f3e8199
CM
1264 rv = request_irq(io->irq,
1265 ipmi_si_irq_handler,
1266 IRQF_SHARED,
104fb25f 1267 SI_DEVICE_NAME,
4f3e8199 1268 io->irq_handler_data);
1da177e4 1269 if (rv) {
07cbd87b 1270 dev_warn(io->dev, "%s unable to claim interrupt %d, running polled\n",
104fb25f 1271 SI_DEVICE_NAME, io->irq);
4f3e8199 1272 io->irq = 0;
1da177e4 1273 } else {
4f3e8199
CM
1274 io->irq_cleanup = std_irq_cleanup;
1275 ipmi_irq_finish_setup(io);
1276 dev_info(io->dev, "Using irq %d\n", io->irq);
1da177e4
LT
1277 }
1278
1279 return rv;
1280}
1281
40112ae7 1282static int wait_for_msg_done(struct smi_info *smi_info)
1da177e4 1283{
50c812b2 1284 enum si_sm_result smi_result;
1da177e4
LT
1285
1286 smi_result = smi_info->handlers->event(smi_info->si_sm, 0);
c305e3d3 1287 for (;;) {
c3e7e791
CM
1288 if (smi_result == SI_SM_CALL_WITH_DELAY ||
1289 smi_result == SI_SM_CALL_WITH_TICK_DELAY) {
da4cd8df 1290 schedule_timeout_uninterruptible(1);
1da177e4 1291 smi_result = smi_info->handlers->event(
e21404dc 1292 smi_info->si_sm, jiffies_to_usecs(1));
c305e3d3 1293 } else if (smi_result == SI_SM_CALL_WITHOUT_DELAY) {
1da177e4
LT
1294 smi_result = smi_info->handlers->event(
1295 smi_info->si_sm, 0);
c305e3d3 1296 } else
1da177e4
LT
1297 break;
1298 }
40112ae7 1299 if (smi_result == SI_SM_HOSED)
c305e3d3
CM
1300 /*
1301 * We couldn't get the state machine to run, so whatever's at
1302 * the port is probably not an IPMI SMI interface.
1303 */
40112ae7
CM
1304 return -ENODEV;
1305
1306 return 0;
1307}
1308
1309static int try_get_dev_id(struct smi_info *smi_info)
1310{
1311 unsigned char msg[2];
1312 unsigned char *resp;
1313 unsigned long resp_len;
1314 int rv = 0;
42d8a346 1315 unsigned int retry_count = 0;
40112ae7
CM
1316
1317 resp = kmalloc(IPMI_MAX_MSG_LENGTH, GFP_KERNEL);
1318 if (!resp)
1319 return -ENOMEM;
1320
1321 /*
1322 * Do a Get Device ID command, since it comes back with some
1323 * useful info.
1324 */
1325 msg[0] = IPMI_NETFN_APP_REQUEST << 2;
1326 msg[1] = IPMI_GET_DEVICE_ID_CMD;
42d8a346
XT
1327
1328retry:
40112ae7
CM
1329 smi_info->handlers->start_transaction(smi_info->si_sm, msg, 2);
1330
1331 rv = wait_for_msg_done(smi_info);
1332 if (rv)
1da177e4 1333 goto out;
1da177e4 1334
1da177e4
LT
1335 resp_len = smi_info->handlers->get_result(smi_info->si_sm,
1336 resp, IPMI_MAX_MSG_LENGTH);
1da177e4 1337
d8c98618 1338 /* Check and record info from the get device id, in case we need it. */
c468f911
JK
1339 rv = ipmi_demangle_device_id(resp[0] >> 2, resp[1],
1340 resp + 2, resp_len - 2, &smi_info->device_id);
42d8a346
XT
1341 if (rv) {
1342 /* record completion code */
c011410d 1343 unsigned char cc = *(resp + 2);
42d8a346 1344
c6ddd5f1
TD
1345 if (cc != IPMI_CC_NO_ERROR &&
1346 ++retry_count <= GET_DEVICE_ID_MAX_RETRY) {
ca8c1c53 1347 dev_warn_ratelimited(smi_info->io.dev,
42d8a346
XT
1348 "BMC returned 0x%2.2x, retry get bmc device id\n",
1349 cc);
1350 goto retry;
1351 }
1352 }
1da177e4 1353
76824852 1354out:
1da177e4
LT
1355 kfree(resp);
1356 return rv;
1357}
1358
d0882897 1359static int get_global_enables(struct smi_info *smi_info, u8 *enables)
1e7d6a45
CM
1360{
1361 unsigned char msg[3];
1362 unsigned char *resp;
1363 unsigned long resp_len;
1364 int rv;
1365
1366 resp = kmalloc(IPMI_MAX_MSG_LENGTH, GFP_KERNEL);
d0882897
CM
1367 if (!resp)
1368 return -ENOMEM;
1e7d6a45
CM
1369
1370 msg[0] = IPMI_NETFN_APP_REQUEST << 2;
1371 msg[1] = IPMI_GET_BMC_GLOBAL_ENABLES_CMD;
1372 smi_info->handlers->start_transaction(smi_info->si_sm, msg, 2);
1373
1374 rv = wait_for_msg_done(smi_info);
1375 if (rv) {
910840f2 1376 dev_warn(smi_info->io.dev,
d0882897
CM
1377 "Error getting response from get global enables command: %d\n",
1378 rv);
1e7d6a45
CM
1379 goto out;
1380 }
1381
1382 resp_len = smi_info->handlers->get_result(smi_info->si_sm,
1383 resp, IPMI_MAX_MSG_LENGTH);
1384
1385 if (resp_len < 4 ||
1386 resp[0] != (IPMI_NETFN_APP_REQUEST | 1) << 2 ||
1387 resp[1] != IPMI_GET_BMC_GLOBAL_ENABLES_CMD ||
1388 resp[2] != 0) {
910840f2 1389 dev_warn(smi_info->io.dev,
d0882897
CM
1390 "Invalid return from get global enables command: %ld %x %x %x\n",
1391 resp_len, resp[0], resp[1], resp[2]);
1e7d6a45
CM
1392 rv = -EINVAL;
1393 goto out;
d0882897
CM
1394 } else {
1395 *enables = resp[3];
1e7d6a45
CM
1396 }
1397
d0882897
CM
1398out:
1399 kfree(resp);
1400 return rv;
1401}
1402
1403/*
1404 * Returns 1 if it gets an error from the command.
1405 */
1406static int set_global_enables(struct smi_info *smi_info, u8 enables)
1407{
1408 unsigned char msg[3];
1409 unsigned char *resp;
1410 unsigned long resp_len;
1411 int rv;
1412
1413 resp = kmalloc(IPMI_MAX_MSG_LENGTH, GFP_KERNEL);
1414 if (!resp)
1415 return -ENOMEM;
1e7d6a45
CM
1416
1417 msg[0] = IPMI_NETFN_APP_REQUEST << 2;
1418 msg[1] = IPMI_SET_BMC_GLOBAL_ENABLES_CMD;
d0882897 1419 msg[2] = enables;
1e7d6a45
CM
1420 smi_info->handlers->start_transaction(smi_info->si_sm, msg, 3);
1421
1422 rv = wait_for_msg_done(smi_info);
1423 if (rv) {
910840f2 1424 dev_warn(smi_info->io.dev,
d0882897
CM
1425 "Error getting response from set global enables command: %d\n",
1426 rv);
1e7d6a45
CM
1427 goto out;
1428 }
1429
1430 resp_len = smi_info->handlers->get_result(smi_info->si_sm,
1431 resp, IPMI_MAX_MSG_LENGTH);
1432
1433 if (resp_len < 3 ||
1434 resp[0] != (IPMI_NETFN_APP_REQUEST | 1) << 2 ||
1435 resp[1] != IPMI_SET_BMC_GLOBAL_ENABLES_CMD) {
910840f2 1436 dev_warn(smi_info->io.dev,
d0882897
CM
1437 "Invalid return from set global enables command: %ld %x %x\n",
1438 resp_len, resp[0], resp[1]);
1e7d6a45
CM
1439 rv = -EINVAL;
1440 goto out;
1441 }
1442
d0882897
CM
1443 if (resp[2] != 0)
1444 rv = 1;
1445
1446out:
1447 kfree(resp);
1448 return rv;
1449}
1450
1451/*
1452 * Some BMCs do not support clearing the receive irq bit in the global
1453 * enables (even if they don't support interrupts on the BMC). Check
1454 * for this and handle it properly.
1455 */
1456static void check_clr_rcv_irq(struct smi_info *smi_info)
1457{
1458 u8 enables = 0;
1459 int rv;
1460
1461 rv = get_global_enables(smi_info, &enables);
1462 if (!rv) {
1463 if ((enables & IPMI_BMC_RCV_MSG_INTR) == 0)
1464 /* Already clear, should work ok. */
1465 return;
1466
1467 enables &= ~IPMI_BMC_RCV_MSG_INTR;
1468 rv = set_global_enables(smi_info, enables);
1469 }
1470
1471 if (rv < 0) {
910840f2 1472 dev_err(smi_info->io.dev,
d0882897
CM
1473 "Cannot check clearing the rcv irq: %d\n", rv);
1474 return;
1475 }
1476
1477 if (rv) {
1e7d6a45
CM
1478 /*
1479 * An error when setting the event buffer bit means
1480 * clearing the bit is not supported.
1481 */
910840f2 1482 dev_warn(smi_info->io.dev,
d0882897
CM
1483 "The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed.\n");
1484 smi_info->cannot_disable_irq = true;
1485 }
1486}
1487
1488/*
1489 * Some BMCs do not support setting the interrupt bits in the global
1490 * enables even if they support interrupts. Clearly bad, but we can
1491 * compensate.
1492 */
1493static void check_set_rcv_irq(struct smi_info *smi_info)
1494{
1495 u8 enables = 0;
1496 int rv;
1497
910840f2 1498 if (!smi_info->io.irq)
d0882897
CM
1499 return;
1500
1501 rv = get_global_enables(smi_info, &enables);
1502 if (!rv) {
1503 enables |= IPMI_BMC_RCV_MSG_INTR;
1504 rv = set_global_enables(smi_info, enables);
1505 }
1506
1507 if (rv < 0) {
910840f2 1508 dev_err(smi_info->io.dev,
d0882897
CM
1509 "Cannot check setting the rcv irq: %d\n", rv);
1510 return;
1511 }
1512
1513 if (rv) {
1514 /*
1515 * An error when setting the event buffer bit means
1516 * setting the bit is not supported.
1517 */
910840f2 1518 dev_warn(smi_info->io.dev,
d0882897
CM
1519 "The BMC does not support setting the recv irq bit, compensating, but the BMC needs to be fixed.\n");
1520 smi_info->cannot_disable_irq = true;
1521 smi_info->irq_enable_broken = true;
1e7d6a45 1522 }
1e7d6a45
CM
1523}
1524
40112ae7
CM
1525static int try_enable_event_buffer(struct smi_info *smi_info)
1526{
1527 unsigned char msg[3];
1528 unsigned char *resp;
1529 unsigned long resp_len;
1530 int rv = 0;
1531
1532 resp = kmalloc(IPMI_MAX_MSG_LENGTH, GFP_KERNEL);
1533 if (!resp)
1534 return -ENOMEM;
1535
1536 msg[0] = IPMI_NETFN_APP_REQUEST << 2;
1537 msg[1] = IPMI_GET_BMC_GLOBAL_ENABLES_CMD;
1538 smi_info->handlers->start_transaction(smi_info->si_sm, msg, 2);
1539
1540 rv = wait_for_msg_done(smi_info);
1541 if (rv) {
25880f7d 1542 pr_warn("Error getting response from get global enables command, the event buffer is not enabled\n");
40112ae7
CM
1543 goto out;
1544 }
1545
1546 resp_len = smi_info->handlers->get_result(smi_info->si_sm,
1547 resp, IPMI_MAX_MSG_LENGTH);
1548
1549 if (resp_len < 4 ||
1550 resp[0] != (IPMI_NETFN_APP_REQUEST | 1) << 2 ||
1551 resp[1] != IPMI_GET_BMC_GLOBAL_ENABLES_CMD ||
1552 resp[2] != 0) {
25880f7d 1553 pr_warn("Invalid return from get global enables command, cannot enable the event buffer\n");
40112ae7
CM
1554 rv = -EINVAL;
1555 goto out;
1556 }
1557
d9b7e4f7 1558 if (resp[3] & IPMI_BMC_EVT_MSG_BUFF) {
40112ae7 1559 /* buffer is already enabled, nothing to do. */
d9b7e4f7 1560 smi_info->supports_event_msg_buff = true;
40112ae7 1561 goto out;
d9b7e4f7 1562 }
40112ae7
CM
1563
1564 msg[0] = IPMI_NETFN_APP_REQUEST << 2;
1565 msg[1] = IPMI_SET_BMC_GLOBAL_ENABLES_CMD;
1566 msg[2] = resp[3] | IPMI_BMC_EVT_MSG_BUFF;
1567 smi_info->handlers->start_transaction(smi_info->si_sm, msg, 3);
1568
1569 rv = wait_for_msg_done(smi_info);
1570 if (rv) {
25880f7d 1571 pr_warn("Error getting response from set global, enables command, the event buffer is not enabled\n");
40112ae7
CM
1572 goto out;
1573 }
1574
1575 resp_len = smi_info->handlers->get_result(smi_info->si_sm,
1576 resp, IPMI_MAX_MSG_LENGTH);
1577
1578 if (resp_len < 3 ||
1579 resp[0] != (IPMI_NETFN_APP_REQUEST | 1) << 2 ||
1580 resp[1] != IPMI_SET_BMC_GLOBAL_ENABLES_CMD) {
25880f7d 1581 pr_warn("Invalid return from get global, enables command, not enable the event buffer\n");
40112ae7
CM
1582 rv = -EINVAL;
1583 goto out;
1584 }
1585
1586 if (resp[2] != 0)
1587 /*
1588 * An error when setting the event buffer bit means
1589 * that the event buffer is not supported.
1590 */
1591 rv = -ENOENT;
d9b7e4f7
CM
1592 else
1593 smi_info->supports_event_msg_buff = true;
1594
76824852 1595out:
40112ae7
CM
1596 kfree(resp);
1597 return rv;
1598}
1599
3dd377b5 1600#define IPMI_SI_ATTR(name) \
93b6984b
CM
1601static ssize_t name##_show(struct device *dev, \
1602 struct device_attribute *attr, \
1603 char *buf) \
3dd377b5
CM
1604{ \
1605 struct smi_info *smi_info = dev_get_drvdata(dev); \
1606 \
fc4e7848 1607 return sysfs_emit(buf, "%u\n", smi_get_stat(smi_info, name)); \
3dd377b5 1608} \
bf064c7b 1609static DEVICE_ATTR_RO(name)
3dd377b5 1610
93b6984b
CM
1611static ssize_t type_show(struct device *dev,
1612 struct device_attribute *attr,
1613 char *buf)
3dd377b5
CM
1614{
1615 struct smi_info *smi_info = dev_get_drvdata(dev);
1616
fc4e7848 1617 return sysfs_emit(buf, "%s\n", si_to_str[smi_info->io.si_type]);
3dd377b5 1618}
bf064c7b 1619static DEVICE_ATTR_RO(type);
3dd377b5 1620
93b6984b
CM
1621static ssize_t interrupts_enabled_show(struct device *dev,
1622 struct device_attribute *attr,
1623 char *buf)
3dd377b5
CM
1624{
1625 struct smi_info *smi_info = dev_get_drvdata(dev);
1626 int enabled = smi_info->io.irq && !smi_info->interrupt_disabled;
1627
fc4e7848 1628 return sysfs_emit(buf, "%d\n", enabled);
3dd377b5 1629}
bf064c7b 1630static DEVICE_ATTR_RO(interrupts_enabled);
3dd377b5
CM
1631
1632IPMI_SI_ATTR(short_timeouts);
1633IPMI_SI_ATTR(long_timeouts);
1634IPMI_SI_ATTR(idles);
1635IPMI_SI_ATTR(interrupts);
1636IPMI_SI_ATTR(attentions);
1637IPMI_SI_ATTR(flag_fetches);
1638IPMI_SI_ATTR(hosed_count);
1639IPMI_SI_ATTR(complete_transactions);
1640IPMI_SI_ATTR(events);
1641IPMI_SI_ATTR(watchdog_pretimeouts);
1642IPMI_SI_ATTR(incoming_messages);
1643
93b6984b
CM
1644static ssize_t params_show(struct device *dev,
1645 struct device_attribute *attr,
1646 char *buf)
3dd377b5
CM
1647{
1648 struct smi_info *smi_info = dev_get_drvdata(dev);
1649
fc4e7848 1650 return sysfs_emit(buf,
3dd377b5
CM
1651 "%s,%s,0x%lx,rsp=%d,rsi=%d,rsh=%d,irq=%d,ipmb=%d\n",
1652 si_to_str[smi_info->io.si_type],
f6296bdc 1653 addr_space_to_str[smi_info->io.addr_space],
3dd377b5
CM
1654 smi_info->io.addr_data,
1655 smi_info->io.regspacing,
1656 smi_info->io.regsize,
1657 smi_info->io.regshift,
1658 smi_info->io.irq,
1659 smi_info->io.slave_addr);
1660}
bf064c7b 1661static DEVICE_ATTR_RO(params);
3dd377b5
CM
1662
1663static struct attribute *ipmi_si_dev_attrs[] = {
1664 &dev_attr_type.attr,
1665 &dev_attr_interrupts_enabled.attr,
1666 &dev_attr_short_timeouts.attr,
1667 &dev_attr_long_timeouts.attr,
1668 &dev_attr_idles.attr,
1669 &dev_attr_interrupts.attr,
1670 &dev_attr_attentions.attr,
1671 &dev_attr_flag_fetches.attr,
1672 &dev_attr_hosed_count.attr,
1673 &dev_attr_complete_transactions.attr,
1674 &dev_attr_events.attr,
1675 &dev_attr_watchdog_pretimeouts.attr,
1676 &dev_attr_incoming_messages.attr,
1677 &dev_attr_params.attr,
1678 NULL
1679};
1680
1681static const struct attribute_group ipmi_si_dev_attr_group = {
1682 .attrs = ipmi_si_dev_attrs,
1683};
1684
3ae0e0f9
CM
1685/*
1686 * oem_data_avail_to_receive_msg_avail
1687 * @info - smi_info structure with msg_flags set
1688 *
1689 * Converts flags from OEM_DATA_AVAIL to RECEIVE_MSG_AVAIL
1690 * Returns 1 indicating need to re-run handle_flags().
1691 */
1692static int oem_data_avail_to_receive_msg_avail(struct smi_info *smi_info)
1693{
e8b33617 1694 smi_info->msg_flags = ((smi_info->msg_flags & ~OEM_DATA_AVAIL) |
c305e3d3 1695 RECEIVE_MSG_AVAIL);
3ae0e0f9
CM
1696 return 1;
1697}
1698
1699/*
1700 * setup_dell_poweredge_oem_data_handler
1701 * @info - smi_info.device_id must be populated
1702 *
1703 * Systems that match, but have firmware version < 1.40 may assert
1704 * OEM0_DATA_AVAIL on their own, without being told via Set Flags that
1705 * it's safe to do so. Such systems will de-assert OEM1_DATA_AVAIL
1706 * upon receipt of IPMI_GET_MSG_CMD, so we should treat these flags
1707 * as RECEIVE_MSG_AVAIL instead.
1708 *
1709 * As Dell has no plans to release IPMI 1.5 firmware that *ever*
1710 * assert the OEM[012] bits, and if it did, the driver would have to
1711 * change to handle that properly, we don't actually check for the
1712 * firmware version.
1713 * Device ID = 0x20 BMC on PowerEdge 8G servers
1714 * Device Revision = 0x80
1715 * Firmware Revision1 = 0x01 BMC version 1.40
1716 * Firmware Revision2 = 0x40 BCD encoded
1717 * IPMI Version = 0x51 IPMI 1.5
1718 * Manufacturer ID = A2 02 00 Dell IANA
1719 *
d5a2b89a
CM
1720 * Additionally, PowerEdge systems with IPMI < 1.5 may also assert
1721 * OEM0_DATA_AVAIL and needs to be treated as RECEIVE_MSG_AVAIL.
1722 *
3ae0e0f9
CM
1723 */
1724#define DELL_POWEREDGE_8G_BMC_DEVICE_ID 0x20
1725#define DELL_POWEREDGE_8G_BMC_DEVICE_REV 0x80
1726#define DELL_POWEREDGE_8G_BMC_IPMI_VERSION 0x51
50c812b2 1727#define DELL_IANA_MFR_ID 0x0002a2
3ae0e0f9
CM
1728static void setup_dell_poweredge_oem_data_handler(struct smi_info *smi_info)
1729{
1730 struct ipmi_device_id *id = &smi_info->device_id;
50c812b2 1731 if (id->manufacturer_id == DELL_IANA_MFR_ID) {
d5a2b89a
CM
1732 if (id->device_id == DELL_POWEREDGE_8G_BMC_DEVICE_ID &&
1733 id->device_revision == DELL_POWEREDGE_8G_BMC_DEVICE_REV &&
50c812b2 1734 id->ipmi_version == DELL_POWEREDGE_8G_BMC_IPMI_VERSION) {
d5a2b89a
CM
1735 smi_info->oem_data_avail_handler =
1736 oem_data_avail_to_receive_msg_avail;
c305e3d3
CM
1737 } else if (ipmi_version_major(id) < 1 ||
1738 (ipmi_version_major(id) == 1 &&
1739 ipmi_version_minor(id) < 5)) {
d5a2b89a
CM
1740 smi_info->oem_data_avail_handler =
1741 oem_data_avail_to_receive_msg_avail;
1742 }
3ae0e0f9
CM
1743 }
1744}
1745
ea94027b
CM
1746#define CANNOT_RETURN_REQUESTED_LENGTH 0xCA
1747static void return_hosed_msg_badsize(struct smi_info *smi_info)
1748{
1749 struct ipmi_smi_msg *msg = smi_info->curr_msg;
1750
25985edc 1751 /* Make it a response */
ea94027b
CM
1752 msg->rsp[0] = msg->data[0] | 4;
1753 msg->rsp[1] = msg->data[1];
1754 msg->rsp[2] = CANNOT_RETURN_REQUESTED_LENGTH;
1755 msg->rsp_size = 3;
1756 smi_info->curr_msg = NULL;
1757 deliver_recv_msg(smi_info, msg);
1758}
1759
1760/*
1761 * dell_poweredge_bt_xaction_handler
1762 * @info - smi_info.device_id must be populated
1763 *
1764 * Dell PowerEdge servers with the BT interface (x6xx and 1750) will
1765 * not respond to a Get SDR command if the length of the data
1766 * requested is exactly 0x3A, which leads to command timeouts and no
1767 * data returned. This intercepts such commands, and causes userspace
1768 * callers to try again with a different-sized buffer, which succeeds.
1769 */
1770
1771#define STORAGE_NETFN 0x0A
1772#define STORAGE_CMD_GET_SDR 0x23
1773static int dell_poweredge_bt_xaction_handler(struct notifier_block *self,
1774 unsigned long unused,
1775 void *in)
1776{
1777 struct smi_info *smi_info = in;
1778 unsigned char *data = smi_info->curr_msg->data;
1779 unsigned int size = smi_info->curr_msg->data_size;
1780 if (size >= 8 &&
1781 (data[0]>>2) == STORAGE_NETFN &&
1782 data[1] == STORAGE_CMD_GET_SDR &&
1783 data[7] == 0x3A) {
1784 return_hosed_msg_badsize(smi_info);
1785 return NOTIFY_STOP;
1786 }
1787 return NOTIFY_DONE;
1788}
1789
1790static struct notifier_block dell_poweredge_bt_xaction_notifier = {
1791 .notifier_call = dell_poweredge_bt_xaction_handler,
1792};
1793
1794/*
1795 * setup_dell_poweredge_bt_xaction_handler
1796 * @info - smi_info.device_id must be filled in already
1797 *
1798 * Fills in smi_info.device_id.start_transaction_pre_hook
1799 * when we know what function to use there.
1800 */
1801static void
1802setup_dell_poweredge_bt_xaction_handler(struct smi_info *smi_info)
1803{
1804 struct ipmi_device_id *id = &smi_info->device_id;
50c812b2 1805 if (id->manufacturer_id == DELL_IANA_MFR_ID &&
910840f2 1806 smi_info->io.si_type == SI_BT)
ea94027b
CM
1807 register_xaction_notifier(&dell_poweredge_bt_xaction_notifier);
1808}
1809
3ae0e0f9
CM
1810/*
1811 * setup_oem_data_handler
1812 * @info - smi_info.device_id must be filled in already
1813 *
1814 * Fills in smi_info.device_id.oem_data_available_handler
1815 * when we know what function to use there.
1816 */
1817
1818static void setup_oem_data_handler(struct smi_info *smi_info)
1819{
1820 setup_dell_poweredge_oem_data_handler(smi_info);
1821}
1822
ea94027b
CM
1823static void setup_xaction_handlers(struct smi_info *smi_info)
1824{
1825 setup_dell_poweredge_bt_xaction_handler(smi_info);
1826}
1827
d0882897
CM
1828static void check_for_broken_irqs(struct smi_info *smi_info)
1829{
1830 check_clr_rcv_irq(smi_info);
1831 check_set_rcv_irq(smi_info);
1832}
1833
4f7f5551 1834static inline void stop_timer_and_thread(struct smi_info *smi_info)
a9a2c44f 1835{
bd1c06a4 1836 if (smi_info->thread != NULL) {
b874b985 1837 kthread_stop(smi_info->thread);
bd1c06a4
MY
1838 smi_info->thread = NULL;
1839 }
4f7f5551
MY
1840
1841 smi_info->timer_can_start = false;
c9acc3c4 1842 del_timer_sync(&smi_info->si_timer);
a9a2c44f
CM
1843}
1844
7e030d6d 1845static struct smi_info *find_dup_si(struct smi_info *info)
1da177e4 1846{
b0defcdb 1847 struct smi_info *e;
1da177e4 1848
b0defcdb 1849 list_for_each_entry(e, &smi_infos, link) {
f6296bdc 1850 if (e->io.addr_space != info->io.addr_space)
b0defcdb 1851 continue;
94671710
CM
1852 if (e->io.addr_data == info->io.addr_data) {
1853 /*
1854 * This is a cheap hack, ACPI doesn't have a defined
1855 * slave address but SMBIOS does. Pick it up from
1856 * any source that has it available.
1857 */
910840f2
CM
1858 if (info->io.slave_addr && !e->io.slave_addr)
1859 e->io.slave_addr = info->io.slave_addr;
7e030d6d 1860 return e;
94671710 1861 }
b0defcdb 1862 }
1da177e4 1863
7e030d6d 1864 return NULL;
b0defcdb 1865}
1da177e4 1866
bb398a4c 1867int ipmi_si_add_smi(struct si_sm_io *io)
b0defcdb 1868{
2407d77a 1869 int rv = 0;
bb398a4c 1870 struct smi_info *new_smi, *dup;
b0defcdb 1871
41b766d6
CM
1872 /*
1873 * If the user gave us a hard-coded device at the same
1874 * address, they presumably want us to use it and not what is
1875 * in the firmware.
1876 */
3bb8ea40 1877 if (io->addr_source != SI_HARDCODED && io->addr_source != SI_HOTMOD &&
f6296bdc 1878 ipmi_si_hardcode_match(io->addr_space, io->addr_data)) {
41b766d6
CM
1879 dev_info(io->dev,
1880 "Hard-coded device at this address already exists");
1881 return -ENODEV;
1882 }
1883
bb398a4c 1884 if (!io->io_setup) {
f6296bdc 1885 if (io->addr_space == IPMI_IO_ADDR_SPACE) {
58e27635 1886 io->io_setup = ipmi_si_port_setup;
f6296bdc 1887 } else if (io->addr_space == IPMI_MEM_ADDR_SPACE) {
58e27635 1888 io->io_setup = ipmi_si_mem_setup;
e1eeb7f8
CM
1889 } else {
1890 return -EINVAL;
1891 }
1892 }
1893
67f4fb02 1894 new_smi = kzalloc(sizeof(*new_smi), GFP_KERNEL);
bb398a4c
CM
1895 if (!new_smi)
1896 return -ENOMEM;
67f4fb02 1897 spin_lock_init(&new_smi->si_lock);
bb398a4c
CM
1898
1899 new_smi->io = *io;
1900
d6dfd131 1901 mutex_lock(&smi_infos_lock);
7e030d6d
CM
1902 dup = find_dup_si(new_smi);
1903 if (dup) {
910840f2
CM
1904 if (new_smi->io.addr_source == SI_ACPI &&
1905 dup->io.addr_source == SI_SMBIOS) {
7e030d6d 1906 /* We prefer ACPI over SMBIOS. */
910840f2 1907 dev_info(dup->io.dev,
7e030d6d 1908 "Removing SMBIOS-specified %s state machine in favor of ACPI\n",
910840f2 1909 si_to_str[new_smi->io.si_type]);
7e030d6d
CM
1910 cleanup_one_si(dup);
1911 } else {
910840f2 1912 dev_info(new_smi->io.dev,
7e030d6d 1913 "%s-specified %s state machine: duplicate\n",
910840f2
CM
1914 ipmi_addr_src_to_str(new_smi->io.addr_source),
1915 si_to_str[new_smi->io.si_type]);
7e030d6d 1916 rv = -EBUSY;
c0a32fe1 1917 kfree(new_smi);
7e030d6d
CM
1918 goto out_err;
1919 }
b0defcdb 1920 }
1da177e4 1921
25880f7d 1922 pr_info("Adding %s-specified %s state machine\n",
910840f2
CM
1923 ipmi_addr_src_to_str(new_smi->io.addr_source),
1924 si_to_str[new_smi->io.si_type]);
2407d77a 1925
2407d77a
MG
1926 list_add_tail(&new_smi->link, &smi_infos);
1927
93c303d2 1928 if (initialized)
bb398a4c 1929 rv = try_smi_init(new_smi);
2407d77a
MG
1930out_err:
1931 mutex_unlock(&smi_infos_lock);
1932 return rv;
1933}
1934
3f724c40
TC
1935/*
1936 * Try to start up an interface. Must be called with smi_infos_lock
1937 * held, primarily to keep smi_num consistent, we only one to do these
1938 * one at a time.
1939 */
2407d77a
MG
1940static int try_smi_init(struct smi_info *new_smi)
1941{
1942 int rv = 0;
1943 int i;
1944
25880f7d 1945 pr_info("Trying %s-specified %s state machine at %s address 0x%lx, slave address 0x%x, irq %d\n",
910840f2
CM
1946 ipmi_addr_src_to_str(new_smi->io.addr_source),
1947 si_to_str[new_smi->io.si_type],
f6296bdc 1948 addr_space_to_str[new_smi->io.addr_space],
bb2a08c0 1949 new_smi->io.addr_data,
910840f2 1950 new_smi->io.slave_addr, new_smi->io.irq);
2407d77a 1951
910840f2 1952 switch (new_smi->io.si_type) {
b0defcdb 1953 case SI_KCS:
1da177e4 1954 new_smi->handlers = &kcs_smi_handlers;
b0defcdb
CM
1955 break;
1956
1957 case SI_SMIC:
1da177e4 1958 new_smi->handlers = &smic_smi_handlers;
b0defcdb
CM
1959 break;
1960
1961 case SI_BT:
1da177e4 1962 new_smi->handlers = &bt_smi_handlers;
b0defcdb
CM
1963 break;
1964
1965 default:
1da177e4
LT
1966 /* No support for anything else yet. */
1967 rv = -EIO;
1968 goto out_err;
1969 }
1970
57bccb4e 1971 new_smi->si_num = smi_num;
3f724c40 1972
1abf71ee 1973 /* Do this early so it's available for logs. */
910840f2 1974 if (!new_smi->io.dev) {
90b2d4f1 1975 pr_err("IPMI interface added with no device\n");
8fe7990c 1976 rv = -EIO;
90b2d4f1 1977 goto out_err;
1abf71ee
CM
1978 }
1979
1da177e4
LT
1980 /* Allocate the state machine's data and initialize it. */
1981 new_smi->si_sm = kmalloc(new_smi->handlers->size(), GFP_KERNEL);
b0defcdb 1982 if (!new_smi->si_sm) {
1da177e4
LT
1983 rv = -ENOMEM;
1984 goto out_err;
1985 }
e1eeb7f8
CM
1986 new_smi->io.io_size = new_smi->handlers->init_data(new_smi->si_sm,
1987 &new_smi->io);
1da177e4
LT
1988
1989 /* Now that we know the I/O size, we can set up the I/O. */
e1eeb7f8 1990 rv = new_smi->io.io_setup(&new_smi->io);
1da177e4 1991 if (rv) {
910840f2 1992 dev_err(new_smi->io.dev, "Could not set up I/O space\n");
1da177e4
LT
1993 goto out_err;
1994 }
1995
1da177e4
LT
1996 /* Do low-level detection first. */
1997 if (new_smi->handlers->detect(new_smi->si_sm)) {
910840f2
CM
1998 if (new_smi->io.addr_source)
1999 dev_err(new_smi->io.dev,
2000 "Interface detection failed\n");
1da177e4
LT
2001 rv = -ENODEV;
2002 goto out_err;
2003 }
2004
c305e3d3
CM
2005 /*
2006 * Attempt a get device id command. If it fails, we probably
2007 * don't have a BMC here.
2008 */
1da177e4 2009 rv = try_get_dev_id(new_smi);
b0defcdb 2010 if (rv) {
910840f2
CM
2011 if (new_smi->io.addr_source)
2012 dev_err(new_smi->io.dev,
2013 "There appears to be no BMC at this location\n");
1da177e4 2014 goto out_err;
b0defcdb 2015 }
1da177e4 2016
3ae0e0f9 2017 setup_oem_data_handler(new_smi);
ea94027b 2018 setup_xaction_handlers(new_smi);
d0882897 2019 check_for_broken_irqs(new_smi);
3ae0e0f9 2020
b874b985 2021 new_smi->waiting_msg = NULL;
1da177e4
LT
2022 new_smi->curr_msg = NULL;
2023 atomic_set(&new_smi->req_events, 0);
7aefac26 2024 new_smi->run_to_completion = false;
64959e2d
CM
2025 for (i = 0; i < SI_NUM_STATS; i++)
2026 atomic_set(&new_smi->stats[i], 0);
1da177e4 2027
7aefac26 2028 new_smi->interrupt_disabled = true;
89986496 2029 atomic_set(&new_smi->need_watch, 0);
1da177e4 2030
40112ae7
CM
2031 rv = try_enable_event_buffer(new_smi);
2032 if (rv == 0)
7aefac26 2033 new_smi->has_event_buffer = true;
40112ae7 2034
c305e3d3
CM
2035 /*
2036 * Start clearing the flags before we enable interrupts or the
2037 * timer to avoid racing with the timer.
2038 */
4f7f5551 2039 start_clear_flags(new_smi);
d9b7e4f7
CM
2040
2041 /*
2042 * IRQ is defined to be set when non-zero. req_events will
2043 * cause a global flags check that will enable interrupts.
2044 */
910840f2 2045 if (new_smi->io.irq) {
d9b7e4f7
CM
2046 new_smi->interrupt_disabled = false;
2047 atomic_set(&new_smi->req_events, 1);
2048 }
1da177e4 2049
3dd377b5
CM
2050 dev_set_drvdata(new_smi->io.dev, new_smi);
2051 rv = device_add_group(new_smi->io.dev, &ipmi_si_dev_attr_group);
2052 if (rv) {
2053 dev_err(new_smi->io.dev,
2054 "Unable to add device attributes: error %d\n",
2055 rv);
71404a2f 2056 goto out_err;
3dd377b5 2057 }
cc095f0a 2058 new_smi->dev_group_added = true;
3dd377b5 2059
1da177e4
LT
2060 rv = ipmi_register_smi(&handlers,
2061 new_smi,
910840f2
CM
2062 new_smi->io.dev,
2063 new_smi->io.slave_addr);
1da177e4 2064 if (rv) {
910840f2
CM
2065 dev_err(new_smi->io.dev,
2066 "Unable to register device: error %d\n",
279fbd0c 2067 rv);
71404a2f 2068 goto out_err;
1da177e4
LT
2069 }
2070
3f724c40
TC
2071 /* Don't increment till we know we have succeeded. */
2072 smi_num++;
2073
910840f2
CM
2074 dev_info(new_smi->io.dev, "IPMI %s interface initialized\n",
2075 si_to_str[new_smi->io.si_type]);
1da177e4 2076
910840f2 2077 WARN_ON(new_smi->io.dev->init_name != NULL);
b0defcdb 2078
2512e40e 2079 out_err:
401e7e88
YY
2080 if (rv && new_smi->io.io_cleanup) {
2081 new_smi->io.io_cleanup(&new_smi->io);
2082 new_smi->io.io_cleanup = NULL;
2083 }
2084
6cf1a126
YY
2085 if (rv && new_smi->si_sm) {
2086 kfree(new_smi->si_sm);
2087 new_smi->si_sm = NULL;
2088 }
2089
1da177e4
LT
2090 return rv;
2091}
2092
41b766d6 2093static int __init init_ipmi_si(void)
1da177e4 2094{
2407d77a 2095 struct smi_info *e;
06ee4594 2096 enum ipmi_addr_src type = SI_INVALID;
1da177e4
LT
2097
2098 if (initialized)
2099 return 0;
1da177e4 2100
41b766d6 2101 ipmi_hardcode_init();
1da177e4 2102
41b766d6 2103 pr_info("IPMI System Interface driver\n");
d8cc5267 2104
9d70029e
CM
2105 ipmi_si_platform_init();
2106
13d0b35c 2107 ipmi_si_pci_init();
b0defcdb 2108
c6f85a75 2109 ipmi_si_parisc_init();
fdbeb7de 2110
06ee4594
MG
2111 /* We prefer devices with interrupts, but in the case of a machine
2112 with multiple BMCs we assume that there will be several instances
2113 of a given type so if we succeed in registering a type then also
2114 try to register everything else of the same type */
2407d77a
MG
2115 mutex_lock(&smi_infos_lock);
2116 list_for_each_entry(e, &smi_infos, link) {
06ee4594
MG
2117 /* Try to register a device if it has an IRQ and we either
2118 haven't successfully registered a device yet or this
2119 device has the same type as one we successfully registered */
910840f2 2120 if (e->io.irq && (!type || e->io.addr_source == type)) {
d8cc5267 2121 if (!try_smi_init(e)) {
910840f2 2122 type = e->io.addr_source;
d8cc5267
MG
2123 }
2124 }
2125 }
2126
06ee4594 2127 /* type will only have been set if we successfully registered an si */
bb398a4c
CM
2128 if (type)
2129 goto skip_fallback_noirq;
06ee4594 2130
d8cc5267
MG
2131 /* Fall back to the preferred device */
2132
2133 list_for_each_entry(e, &smi_infos, link) {
910840f2 2134 if (!e->io.irq && (!type || e->io.addr_source == type)) {
d8cc5267 2135 if (!try_smi_init(e)) {
910840f2 2136 type = e->io.addr_source;
d8cc5267
MG
2137 }
2138 }
2407d77a 2139 }
bb398a4c
CM
2140
2141skip_fallback_noirq:
dd7450ca 2142 initialized = true;
2407d77a
MG
2143 mutex_unlock(&smi_infos_lock);
2144
06ee4594
MG
2145 if (type)
2146 return 0;
2147
d6dfd131 2148 mutex_lock(&smi_infos_lock);
b361e27b 2149 if (unload_when_empty && list_empty(&smi_infos)) {
d6dfd131 2150 mutex_unlock(&smi_infos_lock);
d2478521 2151 cleanup_ipmi_si();
25880f7d 2152 pr_warn("Unable to find any System Interface(s)\n");
1da177e4 2153 return -ENODEV;
b0defcdb 2154 } else {
d6dfd131 2155 mutex_unlock(&smi_infos_lock);
b0defcdb 2156 return 0;
1da177e4 2157 }
1da177e4
LT
2158}
2159module_init(init_ipmi_si);
2160
f6f1234d
ZY
2161static void wait_msg_processed(struct smi_info *smi_info)
2162{
2163 unsigned long jiffies_now;
2164 long time_diff;
2165
2166 while (smi_info->curr_msg || (smi_info->si_state != SI_NORMAL)) {
2167 jiffies_now = jiffies;
2168 time_diff = (((long)jiffies_now - (long)smi_info->last_timeout_jiffies)
2169 * SI_USEC_PER_JIFFY);
2170 smi_event_handler(smi_info, time_diff);
2171 schedule_timeout_uninterruptible(1);
2172 }
2173}
2174
7960f18a 2175static void shutdown_smi(void *send_info)
1da177e4 2176{
7960f18a 2177 struct smi_info *smi_info = send_info;
b874b985 2178
71404a2f
CM
2179 if (smi_info->dev_group_added) {
2180 device_remove_group(smi_info->io.dev, &ipmi_si_dev_attr_group);
2181 smi_info->dev_group_added = false;
2182 }
2183 if (smi_info->io.dev)
2184 dev_set_drvdata(smi_info->io.dev, NULL);
b0defcdb 2185
c305e3d3 2186 /*
b874b985
CM
2187 * Make sure that interrupts, the timer and the thread are
2188 * stopped and will not run again.
c305e3d3 2189 */
71404a2f
CM
2190 smi_info->interrupt_disabled = true;
2191 if (smi_info->io.irq_cleanup) {
2192 smi_info->io.irq_cleanup(&smi_info->io);
2193 smi_info->io.irq_cleanup = NULL;
2194 }
2195 stop_timer_and_thread(smi_info);
2196
2197 /*
2198 * Wait until we know that we are out of any interrupt
2199 * handlers might have been running before we freed the
2200 * interrupt.
2201 */
17c0eb74 2202 synchronize_rcu();
1da177e4 2203
c305e3d3
CM
2204 /*
2205 * Timeouts are stopped, now make sure the interrupts are off
b874b985
CM
2206 * in the BMC. Note that timers and CPU interrupts are off,
2207 * so no need for locks.
c305e3d3 2208 */
f6f1234d
ZY
2209 wait_msg_processed(smi_info);
2210
71404a2f
CM
2211 if (smi_info->handlers)
2212 disable_si_irq(smi_info);
f6f1234d
ZY
2213
2214 wait_msg_processed(smi_info);
2215
71404a2f
CM
2216 if (smi_info->handlers)
2217 smi_info->handlers->cleanup(smi_info->si_sm);
2218
71404a2f
CM
2219 if (smi_info->io.io_cleanup) {
2220 smi_info->io.io_cleanup(&smi_info->io);
2221 smi_info->io.io_cleanup = NULL;
2222 }
1da177e4 2223
71404a2f
CM
2224 kfree(smi_info->si_sm);
2225 smi_info->si_sm = NULL;
2512e40e
CM
2226
2227 smi_info->intf = NULL;
71404a2f
CM
2228}
2229
93c303d2
CM
2230/*
2231 * Must be called with smi_infos_lock held, to serialize the
2232 * smi_info->intf check.
2233 */
71404a2f
CM
2234static void cleanup_one_si(struct smi_info *smi_info)
2235{
2236 if (!smi_info)
2237 return;
1da177e4 2238
71404a2f 2239 list_del(&smi_info->link);
9cc3aac4 2240 ipmi_unregister_smi(smi_info->intf);
71404a2f 2241 kfree(smi_info);
1da177e4
LT
2242}
2243
87875c10 2244void ipmi_si_remove_by_dev(struct device *dev)
bb398a4c
CM
2245{
2246 struct smi_info *e;
bb398a4c
CM
2247
2248 mutex_lock(&smi_infos_lock);
2249 list_for_each_entry(e, &smi_infos, link) {
2250 if (e->io.dev == dev) {
2251 cleanup_one_si(e);
bb398a4c
CM
2252 break;
2253 }
2254 }
2255 mutex_unlock(&smi_infos_lock);
bb398a4c
CM
2256}
2257
bdb57b7b
CM
2258struct device *ipmi_si_remove_by_data(int addr_space, enum si_type si_type,
2259 unsigned long addr)
44814ec9
CM
2260{
2261 /* remove */
2262 struct smi_info *e, *tmp_e;
bdb57b7b 2263 struct device *dev = NULL;
44814ec9
CM
2264
2265 mutex_lock(&smi_infos_lock);
2266 list_for_each_entry_safe(e, tmp_e, &smi_infos, link) {
f6296bdc 2267 if (e->io.addr_space != addr_space)
44814ec9
CM
2268 continue;
2269 if (e->io.si_type != si_type)
2270 continue;
bdb57b7b
CM
2271 if (e->io.addr_data == addr) {
2272 dev = get_device(e->io.dev);
44814ec9 2273 cleanup_one_si(e);
bdb57b7b 2274 }
44814ec9
CM
2275 }
2276 mutex_unlock(&smi_infos_lock);
bdb57b7b
CM
2277
2278 return dev;
44814ec9
CM
2279}
2280
0dcf334c 2281static void cleanup_ipmi_si(void)
1da177e4 2282{
b0defcdb 2283 struct smi_info *e, *tmp_e;
1da177e4 2284
b0defcdb 2285 if (!initialized)
1da177e4
LT
2286 return;
2287
13d0b35c 2288 ipmi_si_pci_shutdown();
c6f85a75
CM
2289
2290 ipmi_si_parisc_shutdown();
b0defcdb 2291
9d70029e 2292 ipmi_si_platform_shutdown();
dba9b4f6 2293
d6dfd131 2294 mutex_lock(&smi_infos_lock);
b0defcdb
CM
2295 list_for_each_entry_safe(e, tmp_e, &smi_infos, link)
2296 cleanup_one_si(e);
d6dfd131 2297 mutex_unlock(&smi_infos_lock);
41b766d6
CM
2298
2299 ipmi_si_hardcode_exit();
bdb57b7b 2300 ipmi_si_hotmod_exit();
1da177e4
LT
2301}
2302module_exit(cleanup_ipmi_si);
2303
0944d889 2304MODULE_ALIAS("platform:dmi-ipmi-si");
1da177e4 2305MODULE_LICENSE("GPL");
1fdd75bd 2306MODULE_AUTHOR("Corey Minyard <minyard@mvista.com>");
07cbd87b 2307MODULE_DESCRIPTION("Interface to the IPMI driver for the KCS, SMIC, and BT system interfaces.");