Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp2636085iog; Mon, 20 Jun 2022 01:05:41 -0700 (PDT) X-Google-Smtp-Source: AGRyM1udiOxWDTaYLms/v38WE7sC4O1OiKWps5ch56cmnSAWrVJVPXsfeJQrTsUf8EmBakvfNYJW X-Received: by 2002:a17:90b:164a:b0:1ec:b990:17bf with SMTP id il10-20020a17090b164a00b001ecb99017bfmr412258pjb.171.1655712341677; Mon, 20 Jun 2022 01:05:41 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1655712341; cv=pass; d=google.com; s=arc-20160816; b=QVnGGCixjAFvebWW8N9AYIwAEFZZj/JbmYbFJC8//Ei9UNjW0sT1Al6idOAWJEuHRq ipwuuG0VVAPQlL9tXcBm1QGn4WXanKtXQxeVbOqSuQjSJq6u/SmiamLTyUrZHqkQExpH xtBf1JtUwjeUABtVCf4dQPvDrHgw4pF/vkwH+4Q2OwUmT4lTvdmvateg8LQcxRBDa4tn I8ntJszU4ZX9whJL93mCFIhG9FHPaTNEFo8iD0YfwMXjFwhPQ1tq0wBpIldf31UtN10g +hcK7KMdjuxNLZe6P2MyrHfp3grZ90NSoWcvx3M3vVADN9bCHiLKyDTBWivLjtuPjkOU ZW0A== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:content-transfer-encoding :in-reply-to:content-language:references:cc:to:subject:from :user-agent:date:message-id:dkim-signature; bh=IZwkC7kA/tUpUwS5rJvJKFe60OD5aZg9iYCn/cY8HP0=; b=eNcqoARbG30WjfxKcd7EM2Kf3NZCw7Wvc6lSvHVJsMtZKWfC/CeSGqxkzgiBj0lTbN CCvCp3PJ2ek65tBJu5fqIy9uOa68ss505vSPB0kIV7QzlGAoAbnI+l6hP/OTcd2xzkOs Lw1sYw3zNCeHN3S1cEdk0KoRJZo1L074eGBeQRn8K73y5efkU+8tl5fRl1+O5miSSyy0 WHRMIg3/PlsWVRJ8Ux4YgdbniJWRm6KMZdiFa+5jpuEp+jXdBHd7SpSNJPEsf0rIVQVi GO8EftoBNLpXa8+ziZFhDSSHFiCZ32nGYCh1CYoPDpRdx6gE6ao+qKIltTllDOCkcljd s9wg== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@os.amperecomputing.com header.s=selector2 header.b=vPrtjTPs; arc=pass (i=1 spf=pass spfdomain=os.amperecomputing.com dkim=pass dkdomain=os.amperecomputing.com dmarc=pass fromdomain=os.amperecomputing.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amperecomputing.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z1-20020a637e01000000b003fe22d6bdc4si13826106pgc.802.2022.06.20.01.05.29; Mon, 20 Jun 2022 01:05:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@os.amperecomputing.com header.s=selector2 header.b=vPrtjTPs; arc=pass (i=1 spf=pass spfdomain=os.amperecomputing.com dkim=pass dkdomain=os.amperecomputing.com dmarc=pass fromdomain=os.amperecomputing.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amperecomputing.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239340AbiFTH2x (ORCPT + 99 others); Mon, 20 Jun 2022 03:28:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33226 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233620AbiFTH2v (ORCPT ); Mon, 20 Jun 2022 03:28:51 -0400 Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on2108.outbound.protection.outlook.com [40.107.236.108]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4C88F6394; Mon, 20 Jun 2022 00:28:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HnpChHFy9M6kKbD7wZLGDeEZr5tiqW7/sINxCP6dGnTuVUlCEGWOh2lVnPl9rGSd8SCYJdEZxPhqZlKvvni1vSxXfjBpXpdioDATRi/7zHA0xmEjTzRzwf/JuPsCKdxBHTMwHG5tR81xis/1uywXXLHZ4EGX7tVyfgzdDx364pqh5lIwvW/VQoKCwpKuxbSnSs9b+EuwjptWr8Hb8RiMN7kiAcGc1tTCUx/gFs01uZMquvWul5VcfCIiCW3vE7wP8HfOVleXFkMYgaeQqt3RBac0bYLN0mwboBuJ7UerZOJd0ivqYhdIQGP/icusr3Jw5gZxhmVpZQmJYN3Sq0q2cg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=IZwkC7kA/tUpUwS5rJvJKFe60OD5aZg9iYCn/cY8HP0=; b=kIzt9hDMHq8eE+/3c+JgnSRMC8LKa4WJEFc+c3X2YMu43KZ8GLfmFLkAEgVn+183Qc+TVh/YmnawSvXWSK6qKN73++DR9/gemWEIrO1Kz5gmA9Y49qv7rFlYPeNeqz5ijOgD+8tC5NqsnUbVqtFlgWB1jLlMU9lIvc4tS4pznaNWHI3yrw4NOml2EtPgEzESdzifM2L839FnXZRMaFghNy0bk160JYlIVrgAnLwflklowC3H4X4LyHIQU99eiAdf15tQAYUDjofmd7KRz2eSTg+v7Uko6ZHp4gCL7bDctp7dUJ5JKRIy5Fcr3QfgCProT8WdYJATWQvFs9Dz2nxVoA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=os.amperecomputing.com; dmarc=pass action=none header.from=os.amperecomputing.com; dkim=pass header.d=os.amperecomputing.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=os.amperecomputing.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=IZwkC7kA/tUpUwS5rJvJKFe60OD5aZg9iYCn/cY8HP0=; b=vPrtjTPshJI6kj2chrapmKmFQtbDWbE5hkQgQfMlaDoo/lp47gPts6SQpgN7jeCI6bfAOMEjc2idrSso0Ri9Jgzv+/6L/O9G7Nax57q59iauw9IrliJCqC1pwoCQMFr9+cZ840XEUbRPBhkxXSKtjt4ANmzyOvGYu1id2i68G98= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=os.amperecomputing.com; Received: from SJ0PR01MB7282.prod.exchangelabs.com (2603:10b6:a03:3f2::24) by DM5PR0101MB2891.prod.exchangelabs.com (2603:10b6:4:2d::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5353.19; Mon, 20 Jun 2022 07:28:43 +0000 Received: from SJ0PR01MB7282.prod.exchangelabs.com ([fe80::7535:773:f979:893e]) by SJ0PR01MB7282.prod.exchangelabs.com ([fe80::7535:773:f979:893e%7]) with mapi id 15.20.5353.021; Mon, 20 Jun 2022 07:28:43 +0000 Message-ID: <476224a8-16ec-d691-fb3b-68ac1f3b2fee@os.amperecomputing.com> Date: Mon, 20 Jun 2022 14:28:25 +0700 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0) Gecko/20100101 Thunderbird/91.10.0 From: Quan Nguyen Subject: Re: [PATCH v8 1/3] ipmi: ssif_bmc: Add SSIF BMC driver To: Ryan Chen , Corey Minyard , Rob Herring , Krzysztof Kozlowski , Brendan Higgins , Benjamin Herrenschmidt , Joel Stanley , Andrew Jeffery , Wolfram Sang , "openipmi-developer@lists.sourceforge.net" , "devicetree@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "linux-i2c@vger.kernel.org" , "openbmc@lists.ozlabs.org" , "linux-arm-kernel@lists.infradead.org" , "linux-aspeed@lists.ozlabs.org" Cc: Open Source Submission , "Thang Q . Nguyen" , Phong Vo References: <20220615090259.1121405-1-quan@os.amperecomputing.com> <20220615090259.1121405-2-quan@os.amperecomputing.com> Content-Language: en-US In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-ClientProxiedBy: SG2P153CA0022.APCP153.PROD.OUTLOOK.COM (2603:1096:4:c7::9) To SJ0PR01MB7282.prod.exchangelabs.com (2603:10b6:a03:3f2::24) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 8502b3cc-9dac-4fcd-4596-08da528e80c5 X-MS-TrafficTypeDiagnostic: DM5PR0101MB2891:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SJ0PR01MB7282.prod.exchangelabs.com;PTR:;CAT:NONE;SFS:(13230016)(4636009)(366004)(66476007)(30864003)(6486002)(7416002)(8936002)(4326008)(66556008)(31686004)(498600001)(6506007)(110136005)(54906003)(31696002)(5660300002)(86362001)(921005)(316002)(66946007)(966005)(8676002)(53546011)(2616005)(186003)(38350700002)(107886003)(6666004)(2906002)(38100700002)(52116002)(26005)(83380400001)(6512007)(43740500002);DIR:OUT;SFP:1102; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?SlpkSExEOFZJWmR5UjZXSzZib3Y3Z1l2c25ZSUk3aVJCSHVvUjMxWk15RG9j?= =?utf-8?B?bU1IeEdyYkUzS2VhQVBsQ0p3OFo2djU1YWVlRjA1WDZLdU1IRHJPQ3hlb3h0?= =?utf-8?B?VW00ZUl3cmYvL1FGK3FQemkvalZLSzZLMXMzRUR1dXdUTmRJL25RQWVVanNM?= =?utf-8?B?WW9RMlRVM25mWnpIcnFWWTVPSlgwT1VwZnlVOVNadm9TTTZzeDNQWWZQMlU1?= =?utf-8?B?TWNjUVZwckFvV1IxTkNVb3hnUE1sSkhkazE3eWZFKzBnaFVodVlsenJaUkRi?= =?utf-8?B?Tkxpa0pMcVhMZTdUaHhUbDRycjRWTjdIL2JDNnpBOWdZUjdmSHpSUXk2ZXFB?= =?utf-8?B?aHNzeHJZWHdkS3lOb1FkYWNxMEJCcnJ3ZDhwdDMrTGgvNFhIbGtxY1pXNTlH?= =?utf-8?B?b0JtQlUra2RUQ1ljNGZaeVRqMHRqeUhBOVpKdWc4T3RyazdMRXYwdzVoVkE1?= =?utf-8?B?Z2NmWlBnNmhKK3hWam9ZTERyVlJYZFp6Rzhic2NZcHczcFQ1dU83amZvb0po?= =?utf-8?B?MWVzcUxOR2NleXJJaURZYVovcnVKaDIyVkhCTTUwNFR5UE5xTktnVGpLT2ti?= =?utf-8?B?UnJsbDQxSzN5TG1Xc2tPRUY3YVQ4WUMxTllyUGNMUVVuOGtFQUlUSlpTZnJX?= =?utf-8?B?bkI2M1gwUXlyTDBDeDhrWXk3bmNiMnJNa0RzQmx6UUdlclZDZ3ArL1ZWMmtU?= =?utf-8?B?U0JLWUtuTmJVSzVWRk9MSWFkTXBEeE1IUzYycWNHd09hL1dsekFCMGVXaDRq?= =?utf-8?B?UWwwZkZDenVFT2pyVDNBczVDQi9NeWxRa3NtQVRSTGl3SWx3V0o2TS9XNWh6?= =?utf-8?B?SDRsZW9VQklWamVRVnlFazUxYnFoajVHMzRsOGxZMm1SdE9tVjR0enFobVdW?= =?utf-8?B?UllTeGZzTEMwNmRmcWtaUk5VNUdMai8ycTUzQStQbmFJcGt2Z1Q5eCsyczBK?= =?utf-8?B?MERVekpLeStBSkV0TWtJTHB5b0wxcUtyWEpKeXk3ZnRRc1R5UFdXcTZDbFJW?= =?utf-8?B?MjBwZ1ZIa0NqUnVwdEU4T1JLM3B3SEVaMEpYWE02SXEvcTRhVWF3ZGVxOHhO?= =?utf-8?B?UHg2djRiWVFVRFNRVkpDMHUwRWQ1S1dGUHVtT015eDloMnM5VDIwaVBraUNR?= =?utf-8?B?eVhkQ2Nva2t2YkhMcnhSQ29MMzBucVFXMExhOStIeFVPTzV6dEJ6V3ZZeDMw?= =?utf-8?B?OU43dkdIejRyWUtNU1c5c0NKTUo2KzZqZWREWGZ4RnFocXlySVR2ZGdhUU5C?= =?utf-8?B?RWFVVXExZEQ1SWM1ckRwU2V3TTZ3UGNjSjJaTXlyMHNmN3lQemdwTmkvcURr?= =?utf-8?B?Y0JDdEVJKzlXL0U1TTQrS0lkOWxrRzNiZS9SYm04d0gvbnY5Zlh5ZEY4amJr?= =?utf-8?B?SXZLbVpXMWtVdmNOZ0ZpNU9pY2FpSE5QaVpTMlI2bmhpL1p4L1dOb09iREdR?= =?utf-8?B?am1maTA5Mi9BNFN6dFlPYmFxV2Y1UnpERnl3czgvSjM5Zm5ZaXRzdUI0S29r?= =?utf-8?B?aW9BRjlhZEh0RG52MGpCVkxOM1NRaE5JYWlLeStvY3NoNnNUc3krWHRzWTEw?= =?utf-8?B?bzVFWEdTdkp1WWxKYVJBeUhOZEVNTEtFWWlsaXVPUVVKTHRMcEZwaTNEai8x?= =?utf-8?B?ZDhEZ1p4TmM0Q0pwbHVDcUd1czM4WmkyNU8vVlprU0NvWjZmeXFuYnZsWUNF?= =?utf-8?B?Yk9BWUIzVElnVmFjNGJ1ZDRjdkhKYThuaDJIV3NqejBybndYQXRnaVdlbVQy?= =?utf-8?B?NnloaHNUWThySUMwSWRTZnM0ei9kTitmRVNQMFZhci84UloyYW9KN21FOUdY?= =?utf-8?B?cDY5NStMcFU1Ry9XU2Yxa2c5a2dxWWREc2ZoSmIvaDdPc0QrbXlhV2RwZDBs?= =?utf-8?B?OThjMnVwRFdHaUgvV3FFc1hxR1dZN1Q1L215SjUzcUVENHNTMTFaK3NRNkNL?= =?utf-8?B?T1RFcDJjL2RVSWM2TlJOQmsyZEkzRTZTWk1hWmFDTFAreE42K3oxMGtqbmdK?= =?utf-8?B?MVdLNldFd3YveGtxakVrSkpXTXJxR2lNcjV5L0FEUGdCaHRoblh2WnNBaVF2?= =?utf-8?B?eG1QQWpuNnVHWG5qSGRZdlhsdTFDd0xLRHVHNjM2YUlIRVEzcjdsWkYyWlJh?= =?utf-8?B?aUl5L1hUUEFjbFJEODQ0YTd3Ny9LWEdCazBxZWxTVGIzdSt6QzNXQ05NY2VC?= =?utf-8?B?YWJpTTBIZXlrSmgvdG5vKy94MENxQkMxVTRhdGtIUjRkK2FFc3ZKdVhTOFpV?= =?utf-8?B?TXZLSWhyeGdIVTljd1FWMEdjSTB6U3gyT2RmbnhnRGhZbGV5NXVzcXhIcnoy?= =?utf-8?B?SjRmM2g5UFF5VEdCWG54WFVTd2N3SGhqSlQ0RDJZcHhsQ1FzbUhRS3dXTk1D?= =?utf-8?Q?tjfYz6ouKkwZj/yxz7jVGYrCMGT4ddtYvQa2Z?= X-OriginatorOrg: os.amperecomputing.com X-MS-Exchange-CrossTenant-Network-Message-Id: 8502b3cc-9dac-4fcd-4596-08da528e80c5 X-MS-Exchange-CrossTenant-AuthSource: SJ0PR01MB7282.prod.exchangelabs.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Jun 2022 07:28:42.9810 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3bc2b170-fd94-476d-b0ce-4229bdc904a7 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: wNsju7zBTbXICScYCuIwfUTi6mtorma8HZo7zvlc++Ks1V9sa4D3TMEnutItKSyzdg5a+Yvz0B1SJ752IgoLIeJjq8OcOhxo9MQfcTz9oik= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR0101MB2891 X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,NICE_REPLY_A,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 16/06/2022 17:47, Ryan Chen wrote: > Hello Nquyen, > >> -----Original Message----- >> From: Linux-aspeed >> On >> Behalf Of Quan Nguyen >> Sent: Wednesday, June 15, 2022 5:03 PM >> To: Quan Nguyen ; Corey Minyard >> ; Rob Herring ; Krzysztof Kozlowski >> ; Brendan Higgins >> ; Benjamin Herrenschmidt >> ; Joel Stanley ; Andrew Jeffery >> ; Wolfram Sang ; >> openipmi-developer@lists.sourceforge.net; devicetree@vger.kernel.org; >> linux-kernel@vger.kernel.org; linux-i2c@vger.kernel.org; >> openbmc@lists.ozlabs.org; linux-arm-kernel@lists.infradead.org; >> linux-aspeed@lists.ozlabs.org >> Cc: Open Source Submission ; Thang Q . >> Nguyen ; Phong Vo >> >> Subject: [PATCH v8 1/3] ipmi: ssif_bmc: Add SSIF BMC driver >> >> The SMBus system interface (SSIF) IPMI BMC driver can be used to perform >> in-band IPMI communication with their host in management (BMC) side. >> >> Thanks Dan for the copy_from_user() fix in the link below. >> >> Link: >> https://lore.kernel.org/linux-arm-kernel/20220310114119.13736-4-quan@os.a >> mperecomputing.com/ >> Signed-off-by: Quan Nguyen >> --- >> v8: >> + Dropped ssif_bmc.h file and move its content to ssif_bmc.c [Corey] >> + Add struct ipmi_ssif_msg to include/uapi/linux/ipmi_ssif_bmc.h >> header file >> [Corey] >> + Use unsigned int for len field in struct ipmi_ssif_msg [Corey] >> + Avoid using packed structure >> [Corey] >> + Add comment to clarify the logic flow [Corey] >> + Fix multipart read end with len=0 issue [Corey] >> + Refactor code handle the too big request message [Corey] >> + Fix code indentation issue >> [Corey] >> + Clean buffer before receiving request to avoid garbage [Quan] >> + Fix the license to SPDX-License-Identifier: GPL-2.0-only [Quan] >> >> v7: >> + Remove unneccessary del_timer() in response_timeout() [Corey] >> + Change compatible string from "ampere,ssif-bmc" to "ssif-bmc" [Jae] >> + Add MODULE_DEVICE_TABLE(of, ssif_bmc_match), fix blank line [Jae] >> + Dropped the use of ssif_msg_len() macro, use the len directly [Quan] >> + Solve possible issue if both response timer and ssif_bmc_write() >> occurred at the same time >> [Corey] >> + Fix wrong return type of ssif_bmc_poll() [kernel robot test] >> + Refactor and introduce ssif_part_buffer struct to replace the >> response_buf to manage each send/receive part of ssif [Quan] >> + Change SSIF_BAD_SMBUS state to SSIF_ABORTING state >> [Corey] >> + Support abort feature to skip the current bad request/response and >> wait until next new request >> [Corey] >> + Refactor the PEC calculation to avoid the re-calculate the PEC on >> each I2C_SLAVE_WRITE_RECEIVED event >> [Quan] >> + Fix the use of error-proned idx [Corey] >> + Defer the test for valid SMBus command until the read/write part >> is determined >> [Quan] >> + Change/split unsupported_smbus_cmd() to >> supported_[write|read]_cmd() >> [Corey] >> + Abort the request if somehow its size exceeded 255 bytes [Quan] >> >> v6: >> + Drop the use of slave_enable() >> [Wolfram] >> + Make i2c-aspeed to issue RxCmdLast command on all >> I2C_SLAVE_WRITE_REQUESTED event to assert NAK when slave busy >> [Quan] >> + Make i2c slave to return -EBUSY when it's busy [Quan] >> + Drop the aborting feature as return Completion Code 0xFF may stop >> host to retry and make ipmi_ssif.so fails to load [Quan] >> + Add timer to recover slave from busy state when no response [Quan] >> + Clean request/response buffer appropriately [Quan] >> + Add some minor change on error and warning messages >> [Quan] >> >> v5: >> + None >> >> v4: >> + Send response with Completion code 0xFF when aborting >> [Quan] >> + Added bounding check on SMBus writes and the whole request [Dan] >> + Moved buffer to end of struct ssif_bmc_ctx to avoid context >> corruption if somehow buffer is written past the end [Dan] >> + Return -EINVAL if userspace buffer too small, dont >> silence truncate [Corey, >> Joel] >> + Not necessary to check NONBLOCK in lock >> [Corey] >> + Enforce one user at a time >> [Joel] >> + Reject write with invalid response length from userspace [Corey] >> + Add state machines for better ssif bmc state handling [Quan] >> + Drop ssif_bmc_aspeed.c and make ssif_bmc.c is generic >> SSIF BMC driver >> [Quan] >> + Change compatible string "aspeed,ast2500-ssif-bmc" to >> "ampere,ssif-bmc" >> [Quan] >> + Abort current request with invalid SMBus write or >> invalid command >> [Quan] >> + Abort all request if there is pending response [Quan] >> + Changed validate_pec() to validate_request() [Quan] >> + Add unsupported_smbus_cmd() to handle unknown SMBus command >> [Quan] >> + Print internal state string for ease investigating issue [Quan] >> + Move to READY state on SLAVE_STOP event >> [Quan] >> + Change initilize_transfer() to process_smbus_cmd() [Quan] >> + Introduce functions for each slave event [Quan] >> >> v3: >> + Removed redundant license info >> [Joel] >> + Switched to use traditional if-else [Joel] >> + Removed unused ssif_bmc_ioctl() >> [Joel] >> + Made handle_request()/complete_response() to return void [Joel] >> + Refactored send_ssif_bmc_response() and >> receive_ssif_bmc_request() >> [Corey] >> + Removed mutex >> [Corey] >> + Use spin_lock/unlock_irqsave/restore in callback [Corey] >> + Removed the unnecessary memset >> [Corey] >> + Switch to use dev_err() >> [Corey] >> >> v2: >> + Fixed compiling error with COMPILE_TEST for arc >> >> drivers/char/ipmi/Kconfig | 11 + >> drivers/char/ipmi/Makefile | 1 + >> drivers/char/ipmi/ssif_bmc.c | 880 >> +++++++++++++++++++++++++++++ >> include/uapi/linux/ipmi_ssif_bmc.h | 16 + >> 4 files changed, 908 insertions(+) >> create mode 100644 drivers/char/ipmi/ssif_bmc.c create mode 100644 >> include/uapi/linux/ipmi_ssif_bmc.h >> >> diff --git a/drivers/char/ipmi/Kconfig b/drivers/char/ipmi/Kconfig index >> b061e6b513ed..18a89093d64e 100644 >> --- a/drivers/char/ipmi/Kconfig >> +++ b/drivers/char/ipmi/Kconfig >> @@ -169,6 +169,17 @@ config ASPEED_BT_IPMI_BMC >> found on Aspeed SOCs (AST2400 and AST2500). The driver >> implements the BMC side of the BT interface. >> >> +config SSIF_IPMI_BMC >> + tristate "SSIF IPMI BMC driver" >> + select I2C >> + select I2C_SLAVE >> + help >> + This enables the IPMI SMBus system interface (SSIF) at the >> + management (BMC) side. >> + >> + The driver implements the BMC side of the SMBus system >> + interface (SSIF). >> + >> config IPMB_DEVICE_INTERFACE >> tristate 'IPMB Interface handler' >> depends on I2C >> diff --git a/drivers/char/ipmi/Makefile b/drivers/char/ipmi/Makefile index >> 7ce790efad92..cb6138b8ded9 100644 >> --- a/drivers/char/ipmi/Makefile >> +++ b/drivers/char/ipmi/Makefile >> @@ -30,3 +30,4 @@ obj-$(CONFIG_ASPEED_BT_IPMI_BMC) += bt-bmc.o >> obj-$(CONFIG_ASPEED_KCS_IPMI_BMC) += kcs_bmc_aspeed.o >> obj-$(CONFIG_NPCM7XX_KCS_IPMI_BMC) += kcs_bmc_npcm7xx.o >> obj-$(CONFIG_IPMB_DEVICE_INTERFACE) += ipmb_dev_int.o >> +obj-$(CONFIG_SSIF_IPMI_BMC) += ssif_bmc.o >> diff --git a/drivers/char/ipmi/ssif_bmc.c b/drivers/char/ipmi/ssif_bmc.c new >> file mode 100644 index 000000000000..0bfd4b9bbaf1 >> --- /dev/null >> +++ b/drivers/char/ipmi/ssif_bmc.c >> @@ -0,0 +1,880 @@ >> +// SPDX-License-Identifier: GPL-2.0-only >> +/* >> + * The driver for BMC side of SSIF interface >> + * >> + * Copyright (c) 2022, Ampere Computing LLC >> + * >> + */ >> + >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> + >> +#define DEVICE_NAME "ipmi-ssif-host" >> + >> +#define GET_8BIT_ADDR(addr_7bit) (((addr_7bit) << 1) & >> 0xff) >> + >> +/* A standard SMBus Transaction is limited to 32 data bytes */ >> +#define MAX_PAYLOAD_PER_TRANSACTION 32 >> +/* Transaction includes the address, the command, the length and the PEC >> byte */ >> +#define MAX_TRANSACTION >> (MAX_PAYLOAD_PER_TRANSACTION + 4) >> + >> +#define MAX_IPMI_DATA_PER_START_TRANSACTION 30 >> +#define MAX_IPMI_DATA_PER_MIDDLE_TRANSACTION 31 >> + >> +#define SSIF_IPMI_SINGLEPART_WRITE 0x2 >> +#define SSIF_IPMI_SINGLEPART_READ 0x3 >> +#define SSIF_IPMI_MULTIPART_WRITE_START 0x6 >> +#define SSIF_IPMI_MULTIPART_WRITE_MIDDLE 0x7 >> +#define SSIF_IPMI_MULTIPART_WRITE_END 0x8 >> +#define SSIF_IPMI_MULTIPART_READ_START 0x3 >> +#define SSIF_IPMI_MULTIPART_READ_MIDDLE 0x9 >> + >> +/* >> + * IPMI 2.0 Spec, section 12.7 SSIF Timing, >> + * Request-to-Response Time is T6max(250ms) - T1max(20ms) - 3ms = 227ms >> + * Recover ssif_bmc from busy state if it takes up to 500ms */ >> +#define RESPONSE_TIMEOUT 500 /* ms */ >> + >> +struct ssif_part_buffer { >> + u8 address; >> + u8 smbus_cmd; >> + u8 length; >> + u8 payload[MAX_PAYLOAD_PER_TRANSACTION]; >> + u8 pec; >> + u8 index; >> +}; >> + >> +/* >> + * SSIF internal states: >> + * SSIF_READY 0x00 : Ready state >> + * SSIF_START 0x01 : Start smbus transaction >> + * SSIF_SMBUS_CMD 0x02 : Received SMBus command >> + * SSIF_REQ_RECVING 0x03 : Receiving request >> + * SSIF_RES_SENDING 0x04 : Sending response >> + * SSIF_BAD_SMBUS 0x05 : Bad SMbus transaction >> + */ >> +enum ssif_state { >> + SSIF_READY, >> + SSIF_START, >> + SSIF_SMBUS_CMD, >> + SSIF_REQ_RECVING, >> + SSIF_RES_SENDING, >> + SSIF_ABORTING, >> + SSIF_STATE_MAX >> +}; >> + >> +struct ssif_bmc_ctx { >> + struct i2c_client *client; >> + struct miscdevice miscdev; >> + int msg_idx; >> + bool pec_support; >> + /* ssif bmc spinlock */ >> + spinlock_t lock; >> + wait_queue_head_t wait_queue; >> + u8 running; >> + enum ssif_state state; >> + /* Timeout waiting for response */ >> + struct timer_list response_timer; >> + bool response_timer_inited; >> + /* Flag to identify a Multi-part Read Transaction */ >> + bool is_singlepart_read; >> + u8 nbytes_processed; >> + u8 remain_len; >> + u8 recv_len; >> + /* Block Number of a Multi-part Read Transaction */ >> + u8 block_num; >> + bool request_available; >> + bool response_in_progress; >> + bool busy; >> + bool aborting; >> + /* Buffer for SSIF Transaction part*/ >> + struct ssif_part_buffer part_buf; >> + struct ipmi_ssif_msg response; >> + struct ipmi_ssif_msg request; >> +}; >> + >> +static inline struct ssif_bmc_ctx *to_ssif_bmc(struct file *file) { >> + return container_of(file->private_data, struct ssif_bmc_ctx, miscdev); >> +} >> + >> +static const char *state_to_string(enum ssif_state state) { >> + switch (state) { >> + case SSIF_READY: >> + return "SSIF_READY"; >> + case SSIF_START: >> + return "SSIF_START"; >> + case SSIF_SMBUS_CMD: >> + return "SSIF_SMBUS_CMD"; >> + case SSIF_REQ_RECVING: >> + return "SSIF_REQ_RECVING"; >> + case SSIF_RES_SENDING: >> + return "SSIF_RES_SENDING"; >> + case SSIF_ABORTING: >> + return "SSIF_ABORTING"; >> + default: >> + return "SSIF_STATE_UNKNOWN"; >> + } >> +} >> + >> +/* Handle SSIF message that will be sent to user */ static ssize_t >> +ssif_bmc_read(struct file *file, char __user *buf, size_t count, loff_t >> +*ppos) { >> + struct ssif_bmc_ctx *ssif_bmc = to_ssif_bmc(file); >> + struct ipmi_ssif_msg msg; >> + unsigned long flags; >> + ssize_t ret; >> + >> + spin_lock_irqsave(&ssif_bmc->lock, flags); >> + while (!ssif_bmc->request_available) { >> + spin_unlock_irqrestore(&ssif_bmc->lock, flags); >> + if (file->f_flags & O_NONBLOCK) >> + return -EAGAIN; >> + ret = wait_event_interruptible(ssif_bmc->wait_queue, >> + ssif_bmc->request_available); >> + if (ret) >> + return ret; >> + spin_lock_irqsave(&ssif_bmc->lock, flags); >> + } >> + >> + if (count < min_t(ssize_t, >> + sizeof_field(struct ipmi_ssif_msg, len) + >> ssif_bmc->request.len, >> + sizeof(struct ipmi_ssif_msg))) { >> + spin_unlock_irqrestore(&ssif_bmc->lock, flags); >> + ret = -EINVAL; >> + } else { >> + count = min_t(ssize_t, >> + sizeof_field(struct ipmi_ssif_msg, len) + >> ssif_bmc->request.len, >> + sizeof(struct ipmi_ssif_msg)); >> + memcpy(&msg, &ssif_bmc->request, count); >> + ssif_bmc->request_available = false; >> + spin_unlock_irqrestore(&ssif_bmc->lock, flags); >> + >> + ret = copy_to_user(buf, &msg, count); >> + } >> + >> + return (ret < 0) ? ret : count; >> +} >> + >> +/* Handle SSIF message that is written by user */ static ssize_t >> +ssif_bmc_write(struct file *file, const char __user *buf, size_t count, >> + loff_t *ppos) >> +{ >> + struct ssif_bmc_ctx *ssif_bmc = to_ssif_bmc(file); >> + struct ipmi_ssif_msg msg; >> + unsigned long flags; >> + ssize_t ret; >> + >> + if (count > sizeof(struct ipmi_ssif_msg)) >> + return -EINVAL; >> + >> + if (copy_from_user(&msg, buf, count)) >> + return -EFAULT; >> + >> + if (!msg.len || count < sizeof_field(struct ipmi_ssif_msg, len) + msg.len) >> + return -EINVAL; >> + >> + spin_lock_irqsave(&ssif_bmc->lock, flags); >> + while (ssif_bmc->response_in_progress) { >> + spin_unlock_irqrestore(&ssif_bmc->lock, flags); >> + if (file->f_flags & O_NONBLOCK) >> + return -EAGAIN; >> + ret = wait_event_interruptible(ssif_bmc->wait_queue, >> + !ssif_bmc->response_in_progress); >> + if (ret) >> + return ret; >> + spin_lock_irqsave(&ssif_bmc->lock, flags); >> + } >> + >> + /* >> + * The write must complete before the response timeout fired, otherwise >> + * the response is aborted and wait for next request >> + * Return -EINVAL if the response is aborted >> + */ >> + ret = (ssif_bmc->response_timer_inited) ? 0 : -EINVAL; >> + if (ret) >> + goto exit; >> + >> + del_timer(&ssif_bmc->response_timer); >> + ssif_bmc->response_timer_inited = false; >> + >> + memcpy(&ssif_bmc->response, &msg, count); >> + ssif_bmc->is_singlepart_read = (msg.len <= >> +MAX_PAYLOAD_PER_TRANSACTION); >> + >> + ssif_bmc->response_in_progress = true; >> + >> + /* ssif_bmc not busy */ >> + ssif_bmc->busy = false; >> + >> + /* Clean old request buffer */ >> + memset(&ssif_bmc->request, 0, sizeof(struct ipmi_ssif_msg)); >> +exit: >> + spin_unlock_irqrestore(&ssif_bmc->lock, flags); >> + >> + return (ret < 0) ? ret : count; >> +} >> + >> +static int ssif_bmc_open(struct inode *inode, struct file *file) { >> + struct ssif_bmc_ctx *ssif_bmc = to_ssif_bmc(file); >> + int ret = 0; >> + >> + spin_lock_irq(&ssif_bmc->lock); >> + if (!ssif_bmc->running) >> + ssif_bmc->running = 1; >> + else >> + ret = -EBUSY; >> + spin_unlock_irq(&ssif_bmc->lock); >> + >> + return ret; >> +} >> + >> +static __poll_t ssif_bmc_poll(struct file *file, poll_table *wait) { >> + struct ssif_bmc_ctx *ssif_bmc = to_ssif_bmc(file); >> + __poll_t mask = 0; >> + >> + poll_wait(file, &ssif_bmc->wait_queue, wait); >> + >> + spin_lock_irq(&ssif_bmc->lock); >> + /* The request is available, userspace application can get the request */ >> + if (ssif_bmc->request_available) >> + mask |= POLLIN; >> + >> + spin_unlock_irq(&ssif_bmc->lock); >> + >> + return mask; >> +} >> + >> +static int ssif_bmc_release(struct inode *inode, struct file *file) { >> + struct ssif_bmc_ctx *ssif_bmc = to_ssif_bmc(file); >> + >> + spin_lock_irq(&ssif_bmc->lock); >> + ssif_bmc->running = 0; >> + spin_unlock_irq(&ssif_bmc->lock); >> + >> + return 0; >> +} >> + >> +/* >> + * System calls to device interface for user apps */ static const >> +struct file_operations ssif_bmc_fops = { >> + .owner = THIS_MODULE, >> + .open = ssif_bmc_open, >> + .read = ssif_bmc_read, >> + .write = ssif_bmc_write, >> + .release = ssif_bmc_release, >> + .poll = ssif_bmc_poll, >> +}; >> + >> +/* Called with ssif_bmc->lock held. */ >> +static void complete_response(struct ssif_bmc_ctx *ssif_bmc) { >> + /* Invalidate response in buffer to denote it having been sent. */ >> + ssif_bmc->response.len = 0; >> + ssif_bmc->response_in_progress = false; >> + ssif_bmc->nbytes_processed = 0; >> + ssif_bmc->remain_len = 0; >> + ssif_bmc->busy = false; >> + memset(&ssif_bmc->part_buf, 0, sizeof(struct ssif_part_buffer)); >> + wake_up_all(&ssif_bmc->wait_queue); >> +} >> + >> +static void response_timeout(struct timer_list *t) { >> + struct ssif_bmc_ctx *ssif_bmc = from_timer(ssif_bmc, t, response_timer); >> + unsigned long flags; >> + >> + spin_lock_irqsave(&ssif_bmc->lock, flags); >> + >> + /* Do nothing if the response is in progress */ >> + if (!ssif_bmc->response_in_progress) { >> + /* Recover ssif_bmc from busy */ >> + ssif_bmc->busy = false; >> + ssif_bmc->response_timer_inited = false; >> + /* Set aborting flag */ >> + ssif_bmc->aborting = true; >> + } >> + >> + spin_unlock_irqrestore(&ssif_bmc->lock, flags); } >> + >> +/* Called with ssif_bmc->lock held. */ >> +static void handle_request(struct ssif_bmc_ctx *ssif_bmc) { >> + /* set ssif_bmc to busy waiting for response */ >> + ssif_bmc->busy = true; >> + /* Request message is available to process */ >> + ssif_bmc->request_available = true; >> + /* Clean old response buffer */ >> + memset(&ssif_bmc->response, 0, sizeof(struct ipmi_ssif_msg)); >> + /* This is the new READ request.*/ >> + wake_up_all(&ssif_bmc->wait_queue); >> + >> + /* Armed timer to recover slave from busy state in case of no response */ >> + if (!ssif_bmc->response_timer_inited) { >> + timer_setup(&ssif_bmc->response_timer, response_timeout, 0); >> + ssif_bmc->response_timer_inited = true; >> + } >> + mod_timer(&ssif_bmc->response_timer, jiffies + >> +msecs_to_jiffies(RESPONSE_TIMEOUT)); >> +} >> + >> +static void calculate_response_part_pec(struct ssif_part_buffer *part) >> +{ >> + u8 addr = part->address; >> + >> + /* PEC - Start Read Address */ >> + part->pec = i2c_smbus_pec(0, &addr, 1); >> + /* PEC - SSIF Command */ >> + part->pec = i2c_smbus_pec(part->pec, &part->smbus_cmd, 1); >> + /* PEC - Restart Write Address */ >> + addr = addr | 0x01; >> + part->pec = i2c_smbus_pec(part->pec, &addr, 1); >> + part->pec = i2c_smbus_pec(part->pec, &part->length, 1); >> + if (part->length) >> + part->pec = i2c_smbus_pec(part->pec, part->payload, >> part->length); } >> + >> +static void set_singlepart_response_buffer(struct ssif_bmc_ctx >> +*ssif_bmc) { >> + struct ssif_part_buffer *part = &ssif_bmc->part_buf; >> + >> + part->address = GET_8BIT_ADDR(ssif_bmc->client->addr); >> + part->length = (u8)ssif_bmc->response.len; >> + >> + /* Clear the rest to 0 */ >> + memset(part->payload + part->length, 0, >> MAX_PAYLOAD_PER_TRANSACTION - part->length); >> + memcpy(&part->payload[0], &ssif_bmc->response.payload[0], >> +part->length); } >> + >> +static void set_multipart_response_buffer(struct ssif_bmc_ctx >> +*ssif_bmc) { >> + struct ssif_part_buffer *part = &ssif_bmc->part_buf; >> + u8 part_len = 0; >> + >> + part->address = GET_8BIT_ADDR(ssif_bmc->client->addr); >> + switch (part->smbus_cmd) { >> + case SSIF_IPMI_MULTIPART_READ_START: >> + /* >> + * Read Start length is 32 bytes. >> + * Read Start transfer first 30 bytes of IPMI response >> + * and 2 special code 0x00, 0x01. >> + */ >> + ssif_bmc->nbytes_processed = 0; >> + ssif_bmc->block_num = 0; >> + part->length = MAX_PAYLOAD_PER_TRANSACTION; >> + part_len = MAX_IPMI_DATA_PER_START_TRANSACTION; >> + ssif_bmc->remain_len = ssif_bmc->response.len - part_len; >> + >> + part->payload[0] = 0x00; /* Start Flag */ >> + part->payload[1] = 0x01; /* Start Flag */ >> + >> + memcpy(&part->payload[2], &ssif_bmc->response.payload[0], >> part_len); >> + break; >> + >> + case SSIF_IPMI_MULTIPART_READ_MIDDLE: >> + /* >> + * IPMI READ Middle or READ End messages can carry up to 31 >> bytes >> + * IPMI data plus block number byte. >> + */ >> + if (ssif_bmc->remain_len <= >> MAX_IPMI_DATA_PER_MIDDLE_TRANSACTION) { >> + /* >> + * This is READ End message >> + * Return length is the remaining response data length >> + * plus block number >> + * Block number 0xFF is to indicate this is last message >> + * >> + */ >> + /* Clean the buffer */ >> + memset(&part->payload[0], 0, >> MAX_PAYLOAD_PER_TRANSACTION); >> + part->length = ssif_bmc->remain_len + 1; >> + part_len = ssif_bmc->remain_len; >> + ssif_bmc->block_num = 0xFF; >> + part->payload[0] = ssif_bmc->block_num; >> + } else { >> + /* >> + * This is READ Middle message >> + * Response length is the maximum SMBUS transfer length >> + * Block number byte is incremented >> + * Return length is maximum SMBUS transfer length >> + */ >> + part->length = MAX_PAYLOAD_PER_TRANSACTION; >> + part_len = MAX_IPMI_DATA_PER_MIDDLE_TRANSACTION; >> + part->payload[0] = ssif_bmc->block_num; >> + ssif_bmc->block_num++; >> + } >> + >> + ssif_bmc->remain_len -= part_len; >> + memcpy(&part->payload[1], ssif_bmc->response.payload + >> ssif_bmc->nbytes_processed, >> + part_len); >> + break; >> + >> + default: >> + /* Do not expect to go to this case */ >> + dev_err(&ssif_bmc->client->dev, "%s: Unexpected SMBus command >> 0x%x\n", >> + __func__, part->smbus_cmd); >> + break; >> + } >> + >> + ssif_bmc->nbytes_processed += part_len; } >> + >> +static bool supported_read_cmd(u8 cmd) >> +{ >> + if (cmd == SSIF_IPMI_SINGLEPART_READ || >> + cmd == SSIF_IPMI_MULTIPART_READ_START || >> + cmd == SSIF_IPMI_MULTIPART_READ_MIDDLE) >> + return true; >> + >> + return false; >> +} >> + >> +static bool supported_write_cmd(u8 cmd) { >> + if (cmd == SSIF_IPMI_SINGLEPART_WRITE || >> + cmd == SSIF_IPMI_MULTIPART_WRITE_START || >> + cmd == SSIF_IPMI_MULTIPART_WRITE_MIDDLE || >> + cmd == SSIF_IPMI_MULTIPART_WRITE_END) >> + return true; >> + >> + return false; >> +} >> + >> +/* Process the IPMI response that will be read by master */ static void >> +handle_read_processed(struct ssif_bmc_ctx *ssif_bmc, u8 *val) { >> + struct ssif_part_buffer *part = &ssif_bmc->part_buf; >> + >> + /* msg_idx start from 0 */ >> + if (part->index < part->length) >> + *val = part->payload[part->index]; >> + else if (part->index == part->length && ssif_bmc->pec_support) >> + *val = part->pec; >> + else >> + *val = 0; >> + >> + part->index++; >> +} >> + >> +static void handle_write_received(struct ssif_bmc_ctx *ssif_bmc, u8 >> +*val) { >> + /* >> + * The msg_idx must be 1 when first enter SSIF_REQ_RECVING state >> + * And it would never exceeded 36 bytes included the 32 bytes max >> payload + >> + * the address + the command + the len and the PEC. >> + */ >> + if (ssif_bmc->msg_idx < 1 || ssif_bmc->msg_idx > MAX_TRANSACTION) >> + return; >> + >> + if (ssif_bmc->msg_idx == 1) { >> + ssif_bmc->part_buf.length = *val; >> + ssif_bmc->part_buf.index = 0; >> + } else { >> + ssif_bmc->part_buf.payload[ssif_bmc->part_buf.index++] = *val; >> + } >> + >> + ssif_bmc->msg_idx++; >> +} >> + >> +static bool validate_request_part(struct ssif_bmc_ctx *ssif_bmc) { >> + struct ssif_part_buffer *part = &ssif_bmc->part_buf; >> + bool ret = true; >> + u8 cpec; >> + u8 addr; >> + >> + if (part->index == part->length) { >> + /* PEC is not included */ >> + ssif_bmc->pec_support = false; >> + ret = true; >> + goto exit; >> + } >> + >> + if (part->index != part->length + 1) { >> + ret = false; >> + goto exit; >> + } >> + >> + /* PEC is included */ >> + ssif_bmc->pec_support = true; >> + part->pec = part->payload[part->length]; >> + addr = GET_8BIT_ADDR(ssif_bmc->client->addr); >> + cpec = i2c_smbus_pec(0, &addr, 1); >> + cpec = i2c_smbus_pec(cpec, &part->smbus_cmd, 1); >> + cpec = i2c_smbus_pec(cpec, &part->length, 1); >> + /* >> + * As SMBus specification does not allow the length >> + * (byte count) in the Write-Block protocol to be zero. >> + * Therefore, it is illegal to have the last Middle >> + * transaction in the sequence carry 32-byte and have >> + * a length of ‘0’ in the End transaction. >> + * But some users may try to use this way and we should >> + * prevent ssif_bmc driver broken in this case. >> + */ >> + if (part->length) >> + cpec = i2c_smbus_pec(cpec, part->payload, part->length); >> + >> + if (cpec != part->pec) >> + ret = false; >> + >> +exit: >> + return ret; >> +} >> + >> +static void process_request_part(struct ssif_bmc_ctx *ssif_bmc) { >> + struct ssif_part_buffer *part = &ssif_bmc->part_buf; >> + unsigned int len; >> + >> + switch (part->smbus_cmd) { >> + case SSIF_IPMI_SINGLEPART_WRITE: >> + /* save the whole part to request*/ >> + ssif_bmc->request.len = part->length; >> + memcpy(ssif_bmc->request.payload, part->payload, part->length); >> + >> + break; >> + case SSIF_IPMI_MULTIPART_WRITE_START: >> + ssif_bmc->request.len = 0; >> + >> + fallthrough; >> + case SSIF_IPMI_MULTIPART_WRITE_MIDDLE: >> + case SSIF_IPMI_MULTIPART_WRITE_END: >> + len = ssif_bmc->request.len + part->length; >> + /* Do the bound check here, not allow the request len exceed 254 >> bytes */ >> + if (len > IPMI_SSIF_PAYLOAD_MAX) { >> + dev_warn(&ssif_bmc->client->dev, >> + "Warn: Request exceeded 254 bytes, aborting"); >> + /* Request too long, aborting */ >> + ssif_bmc->aborting = true; >> + } else { >> + memcpy(ssif_bmc->request.payload + ssif_bmc->request.len, >> + part->payload, part->length); >> + ssif_bmc->request.len += part->length; >> + } >> + break; >> + default: >> + /* Do not expect to go to this case */ >> + dev_err(&ssif_bmc->client->dev, "%s: Unexpected SMBus command >> 0x%x\n", >> + __func__, part->smbus_cmd); >> + break; >> + } >> +} >> + >> +static void process_smbus_cmd(struct ssif_bmc_ctx *ssif_bmc, u8 *val) { >> + /* SMBUS command can vary (single or multi-part) */ >> + ssif_bmc->part_buf.smbus_cmd = *val; >> + ssif_bmc->msg_idx = 1; >> + memset(&ssif_bmc->part_buf.payload[0], 0, >> +MAX_PAYLOAD_PER_TRANSACTION); >> + >> + if (*val == SSIF_IPMI_SINGLEPART_WRITE || *val == >> SSIF_IPMI_MULTIPART_WRITE_START) { >> + /* >> + * The response maybe not come in-time, causing host SSIF driver >> + * to timeout and resend a new request. In such case check for >> + * pending response and clear it >> + */ >> + if (ssif_bmc->response_in_progress) >> + complete_response(ssif_bmc); >> + >> + /* This is new request, flip aborting flag if set */ >> + if (ssif_bmc->aborting) >> + ssif_bmc->aborting = false; >> + } >> +} >> + >> +static void on_read_requested_event(struct ssif_bmc_ctx *ssif_bmc, u8 >> +*val) { >> + if (ssif_bmc->state == SSIF_READY || >> + ssif_bmc->state == SSIF_START || >> + ssif_bmc->state == SSIF_REQ_RECVING || >> + ssif_bmc->state == SSIF_RES_SENDING) { >> + dev_warn(&ssif_bmc->client->dev, >> + "Warn: %s unexpected READ REQUESTED in state=%s\n", >> + __func__, state_to_string(ssif_bmc->state)); >> + ssif_bmc->state = SSIF_ABORTING; >> + *val = 0; >> + return; >> + >> + } else if (ssif_bmc->state == SSIF_SMBUS_CMD) { >> + if (!supported_read_cmd(ssif_bmc->part_buf.smbus_cmd)) { >> + dev_warn(&ssif_bmc->client->dev, "Warn: Unknown SMBus >> read command=0x%x", >> + ssif_bmc->part_buf.smbus_cmd); >> + ssif_bmc->aborting = true; >> + } >> + >> + if (ssif_bmc->aborting) >> + ssif_bmc->state = SSIF_ABORTING; >> + else >> + ssif_bmc->state = SSIF_RES_SENDING; >> + } >> + >> + ssif_bmc->msg_idx = 0; >> + >> + /* Send 0 if there is nothing to send */ >> + if (!ssif_bmc->response_in_progress || ssif_bmc->state == >> SSIF_ABORTING) { >> + *val = 0; >> + return; >> + } >> + >> + if (ssif_bmc->is_singlepart_read) >> + set_singlepart_response_buffer(ssif_bmc); >> + else >> + set_multipart_response_buffer(ssif_bmc); >> + >> + calculate_response_part_pec(&ssif_bmc->part_buf); >> + ssif_bmc->part_buf.index = 0; >> + *val = ssif_bmc->part_buf.length; >> +} >> + >> +static void on_read_processed_event(struct ssif_bmc_ctx *ssif_bmc, u8 >> +*val) { >> + if (ssif_bmc->state == SSIF_READY || >> + ssif_bmc->state == SSIF_START || >> + ssif_bmc->state == SSIF_REQ_RECVING || >> + ssif_bmc->state == SSIF_SMBUS_CMD) { >> + dev_warn(&ssif_bmc->client->dev, >> + "Warn: %s unexpected READ PROCESSED in state=%s\n", >> + __func__, state_to_string(ssif_bmc->state)); >> + ssif_bmc->state = SSIF_ABORTING; >> + *val = 0; >> + return; >> + } >> + >> + /* Send 0 if there is nothing to send */ >> + if (!ssif_bmc->response_in_progress || ssif_bmc->state == >> SSIF_ABORTING) { >> + *val = 0; >> + return; >> + } >> + >> + handle_read_processed(ssif_bmc, val); >> +} >> + >> +static void on_write_requested_event(struct ssif_bmc_ctx *ssif_bmc, u8 >> +*val) { >> + if (ssif_bmc->state == SSIF_READY || ssif_bmc->state == >> SSIF_SMBUS_CMD) { >> + ssif_bmc->state = SSIF_START; >> + >> + } else if (ssif_bmc->state == SSIF_START || >> + ssif_bmc->state == SSIF_REQ_RECVING || >> + ssif_bmc->state == SSIF_RES_SENDING) { >> + dev_warn(&ssif_bmc->client->dev, >> + "Warn: %s unexpected WRITE REQUEST in state=%s\n", >> + __func__, state_to_string(ssif_bmc->state)); >> + ssif_bmc->state = SSIF_ABORTING; >> + return; > > When master read here just return. > In i2c slave device driver will not handle this. > It may return a value to notify slave nack. > Thanks Ryan for the review, In this current implementation, Slave ignores the current transaction until there is new valid incoming request. My concern is that if Slave responses with nack would make host to retry and keep waiting response for the current request instead of resend a new request. Hope to see more comments about the idea. Thanks, - Quan