phosphor-host-ipmid and phosphor-net-ipmid architecture
brendanhiggins at google.com
brendanhiggins at google.com
Thu Oct 19 15:08:14 AEDT 2017
> Hey Vernon,
>
> 1) There are few reasons for a different approach for net-ipmid
>
> The primary design direction when developing net-ipmid was to reuse
> the provider libraries
> for the commands that are common across the interfaces. It was a
> conscious decision
> to have two processes for network & BT, keeping in mind to have
> small applications
> rather than having monolithic ones.
>
> The network handler would not be minimal like btbridge or KCSbridge,
> since there are net-ipmid
> specific functionalities like session setup, serial over LAN..etc.
Unfortunately there is more common functionality than just handlers. For
example, Firmware Firewall is to be applied to all interfaces. Another example,
bridging allows messages to be taken from one interface, like the LAN Interface,
and applied on some other interface, like the System Interface.
I talked about this extensively with Corey Minyard (see discussion under [RFC v1
1/4] ipmi_bmc: framework for BT IPMI on BMCs). I was trying to create a common
interface that the userland could get IPMI messages from as well as a common way
to handle IPMI messages in the kernel. Unfortunately, the various concepts in
IPMI are just really too tightly coupled.
> The only difference i see in your
> idea is we would relay the common commands on the dbus so that ipmid
> would handle.
>
> 2) The phosphor-host-ipmid was developed as part of the prototyping done
> for Barreleye. So i agree that
> we have quite a number of shortcomings, that it is not in alignment
> with the modern C++ practices.
> We have added more code and haven't got to refactor that. We have a
> story to refactor phosphor-host-ipmid.
> The plan was to handle so some of these suggestions as part of that.
>
> The support is in place to register each command's privilege. The
> support would be completed once the
> IPMI user account management changes are in place. The command's
> privilege would matter only on
> the LAN interface which is session based. In net-ipmid every command
> would be checked against the
> session's privilege, so that a session with USER privilege would be
> restricted from running a command
> that needs ADMIN privilege. Since KCS and BT are sessionless and
> unauthenticated, this would not matter.
Not quite true, see above.
>
> Similarly System interface commands are compiled into a separate
> library which is not loaded in the
> net-ipmid.
>
> 3) This is something we wanted to do, we can discuss what is the best
> possible approach. This would help with
> command like Get/Set System Boot Configuration where each
> implementer would get the flexibility
> to implement the OEM parameters.
>
> Are you working on a OEM provider library?
We have written some in the past. I proposed one about a year ago. I think there
was another one as well. Might be time to revisit that.
>
> Regards,
> Tom
>
>
>
>
> On Thursday 12 October 2017 03:35 AM, Vernon Mauery wrote:
> > I am working on an ipmi provider library and had a few questions and
> > observations.
> >
> > 1) Why are there separate ipmi message queues for the host and network?
> > It seems awkward that for the host, the ipmi request comes from a
> > different process (btbridge, or in our case kcsbridge), while for the
> > network (RMCP+), the messages are handled directly in the same
> > process.
> >
> > It seems that the network handler could just as easily package the
> > command up and send it to ipmid the same way that btbridge does.
> >
> > 2) Can we modify the signature of the handlers so that they can behave
> > in a more intelligent manner? It would be nice if they were handed a
> > gsl::span<uint8_t> instead of a void* and a length. This allows for
> > a no-copy, bounds-checked way of passing buffers.
> >
> > It would be nice to know what channel something came in on. We might
> > want to be able to change behavior based on the incoming channel (as
> > some channels are more secure than others).
> >
> > It would be nice to know what IPMI privilege the command came in
> > with (ADMIN for session-less commands) so that the command handler
> > can behave appropriately based on the user.
> >
> > 3) When registering commands, it would be nice of the list also
> > maintained a priority so that commands could be easily overridden.
> > Currently the only way to override a command is to make sure that
> > your library gets loaded first (and this is done via the library
> > name). If we had default ipmi commands loaded at DEFAULT_PRIO and
> > then had some higher priorities such as MFR_PRIO, and OEM_PRIO, or
> > something like that, we could have integrators further on down the
> > line able to easily add a new provider library and piecemeal override
> > individual command. An alternate (or addition) might be the addition
> > of a unregister command method to remove an existing command so it
> > could be replaced with a new one (or just straight up removed).
> >
> >
> > I am happy to work on changes that I would like to see and submit
> > patches for review, but I wanted to know if there was some sort of
> > historical or other reason that would prevent my work from getting
> > rejected before I actually do the work.
> >
> > --Vernon
> >
Cheers
More information about the openbmc
mailing list