Blame lib/ipmi_pef.c

Packit Service ed0f68
/*
Packit Service ed0f68
 * Copyright (c) 2004 Dell Computers.  All Rights Reserved.
Packit Service ed0f68
 * 
Packit Service ed0f68
 * Redistribution and use in source and binary forms, with or without
Packit Service ed0f68
 * modification, are permitted provided that the following conditions
Packit Service ed0f68
 * are met:
Packit Service ed0f68
 * 
Packit Service ed0f68
 * Redistribution of source code must retain the above copyright
Packit Service ed0f68
 * notice, this list of conditions and the following disclaimer.
Packit Service ed0f68
 * 
Packit Service ed0f68
 * Redistribution in binary form must reproduce the above copyright
Packit Service ed0f68
 * notice, this list of conditions and the following disclaimer in the
Packit Service ed0f68
 * documentation and/or other materials provided with the distribution.
Packit Service ed0f68
 * 
Packit Service ed0f68
 * Neither the name of Dell Computers, or the names of
Packit Service ed0f68
 * contributors may be used to endorse or promote products derived
Packit Service ed0f68
 * from this software without specific prior written permission.
Packit Service ed0f68
 * 
Packit Service ed0f68
 * This software is provided "AS IS," without a warranty of any kind.
Packit Service ed0f68
 * ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES,
Packit Service ed0f68
 * INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A
Packit Service ed0f68
 * PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE HEREBY EXCLUDED.
Packit Service ed0f68
 * DELL COMPUTERS ("DELL") AND ITS LICENSORS SHALL NOT BE LIABLE
Packit Service ed0f68
 * FOR ANY DAMAGES SUFFERED BY LICENSEE AS A RESULT OF USING, MODIFYING
Packit Service ed0f68
 * OR DISTRIBUTING THIS SOFTWARE OR ITS DERIVATIVES.  IN NO EVENT WILL
Packit Service ed0f68
 * DELL OR ITS LICENSORS BE LIABLE FOR ANY LOST REVENUE, PROFIT OR DATA,
Packit Service ed0f68
 * OR FOR DIRECT, INDIRECT, SPECIAL, CONSEQUENTIAL, INCIDENTAL OR
Packit Service ed0f68
 * PUNITIVE DAMAGES, HOWEVER CAUSED AND REGARDLESS OF THE THEORY OF
Packit Service ed0f68
 * LIABILITY, ARISING OUT OF THE USE OF OR INABILITY TO USE THIS SOFTWARE,
Packit Service ed0f68
 * EVEN IF DELL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Packit Service ed0f68
 */
Packit Service ed0f68
Packit Service ed0f68
#include <string.h>
Packit Service ed0f68
#include <math.h>
Packit Service ed0f68
#include <time.h>
Packit Service ed0f68
Packit Service ed0f68
#include <ipmitool/bswap.h>
Packit Service ed0f68
#include <ipmitool/helper.h>
Packit Service ed0f68
#include <ipmitool/ipmi.h>
Packit Service ed0f68
#include <ipmitool/ipmi_channel.h>
Packit Service ed0f68
#include <ipmitool/ipmi_intf.h>
Packit Service ed0f68
#include <ipmitool/ipmi_mc.h>
Packit Service ed0f68
#include <ipmitool/ipmi_pef.h>
Packit Service ed0f68
#include <ipmitool/ipmi_sel.h>
Packit Service ed0f68
#include <ipmitool/log.h>
Packit Service ed0f68
Packit Service ed0f68
extern int verbose;
Packit Service ed0f68
/*
Packit Service ed0f68
// common kywd/value printf() templates
Packit Service ed0f68
*/
Packit Service ed0f68
static const char * pef_fld_fmts[][2] = {
Packit Service ed0f68
	{"%-*s : %u\n",          " | %u"},			/* F_DEC: unsigned value */
Packit Service ed0f68
	{"%-*s : %d\n",          " | %d"},			/* F_INT: signed value   */
Packit Service ed0f68
	{"%-*s : %s\n",          " | %s"},			/* F_STR: string value   */
Packit Service ed0f68
	{"%-*s : 0x%x\n",        " | 0x%x"},		/* F_HEX: "N hex digits" */
Packit Service ed0f68
	{"%-*s : 0x%04x\n",      " | 0x%04x"},		/* F_2XD: "2 hex digits" */
Packit Service ed0f68
	{"%-*s : 0x%02x\n",      " | 0x%02x"},		/* F_1XD: "1 hex digit"  */
Packit Service ed0f68
	{"%-*s : %02x%02x%02x%02x-%02x%02x-%02x%02x-%02x%02x-%02x%02x%02x%02x%02x%02x\n",
Packit Service ed0f68
	     " | %02x%02x%02x%02x-%02x%02x-%02x%02x-%02x%02x-%02x%02x%02x%02x%02x%02x"},
Packit Service ed0f68
};
Packit Service ed0f68
typedef enum {
Packit Service ed0f68
	F_DEC,
Packit Service ed0f68
	F_INT,
Packit Service ed0f68
	F_STR,
Packit Service ed0f68
	F_HEX,
Packit Service ed0f68
	F_2XD,
Packit Service ed0f68
	F_1XD,
Packit Service ed0f68
	F_UID,
Packit Service ed0f68
} fmt_e;
Packit Service ed0f68
#define KYWD_LENGTH 24
Packit Service ed0f68
static int first_field = 1;
Packit Service ed0f68
Packit Service ed0f68
static const char * pef_flag_fmts[][3] = {
Packit Service ed0f68
	{"",          "false",  "true"},
Packit Service ed0f68
	{"supported", "un",         ""},
Packit Service ed0f68
	{"active",    "in",         ""},
Packit Service ed0f68
	{"abled",     "dis",      "en"},
Packit Service ed0f68
};
Packit Service ed0f68
static const char * listitem[] =	{" | %s", ",%s", "%s"};
Packit Service ed0f68
Packit Service ed0f68
static int ipmi_pef2_list_filters(struct ipmi_intf *);
Packit Service ed0f68
Packit Service ed0f68
const char * 
Packit Service ed0f68
ipmi_pef_bit_desc(struct bit_desc_map * map, uint32_t value)
Packit Service ed0f68
{	/*
Packit Service ed0f68
	// return description/text label(s) for the given value.
Packit Service ed0f68
	//  NB: uses a static buffer
Packit Service ed0f68
	*/
Packit Service ed0f68
	static char buf[128];
Packit Service ed0f68
	char * p;
Packit Service ed0f68
	struct desc_map * pmap;
Packit Service ed0f68
	uint32_t match, index;
Packit Service ed0f68
	
Packit Service ed0f68
	*(p = buf) = '\0';
Packit Service ed0f68
	index = 2;
Packit Service ed0f68
	for (pmap=map->desc_maps; pmap && pmap->desc; pmap++) {
Packit Service ed0f68
		if (map->desc_map_type == BIT_DESC_MAP_LIST)
Packit Service ed0f68
			match = (value == pmap->mask);
Packit Service ed0f68
		else
Packit Service ed0f68
			match = ((value & pmap->mask) == pmap->mask);
Packit Service ed0f68
Packit Service ed0f68
		if (match) {
Packit Service ed0f68
			sprintf(p, listitem[index], pmap->desc);
Packit Service ed0f68
			p = strchr(p, '\0');
Packit Service ed0f68
			if (map->desc_map_type != BIT_DESC_MAP_ALL)
Packit Service ed0f68
				break;
Packit Service ed0f68
			index = 1;
Packit Service ed0f68
		}
Packit Service ed0f68
	}
Packit Service ed0f68
	if (p == buf)
Packit Service ed0f68
		return("None");
Packit Service ed0f68
Packit Service ed0f68
	return((const char *)buf);
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
void
Packit Service ed0f68
ipmi_pef_print_flags(struct bit_desc_map * map, flg_e type, uint32_t val)
Packit Service ed0f68
{	/*
Packit Service ed0f68
	// print features/flags, using val (a bitmask), according to map.
Packit Service ed0f68
	// observe the verbose flag, and print any labels, etc. based on type
Packit Service ed0f68
	*/
Packit Service ed0f68
	struct desc_map * pmap;
Packit Service ed0f68
	uint32_t maskval, index;
Packit Service ed0f68
Packit Service ed0f68
	index = 0;
Packit Service ed0f68
	for (pmap=map->desc_maps; pmap && pmap->desc; pmap++) {
Packit Service ed0f68
		maskval = (val & pmap->mask);
Packit Service ed0f68
		if (verbose)
Packit Service ed0f68
			printf("%-*s : %s%s\n", KYWD_LENGTH, 
Packit Service ed0f68
				ipmi_pef_bit_desc(map, pmap->mask),
Packit Service ed0f68
				pef_flag_fmts[type][1 + (maskval != 0)],
Packit Service ed0f68
				pef_flag_fmts[type][0]);
Packit Service ed0f68
		else if (maskval != 0) {
Packit Service ed0f68
			printf(listitem[index], ipmi_pef_bit_desc(map, maskval));
Packit Service ed0f68
			index = 1;
Packit Service ed0f68
		}
Packit Service ed0f68
	}
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
static void
Packit Service ed0f68
ipmi_pef_print_field(const char * fmt[2], const char * label, unsigned long val)
Packit Service ed0f68
{	/*
Packit Service ed0f68
	// print a 'field' (observes 'verbose' flag)
Packit Service ed0f68
	*/
Packit Service ed0f68
	if (verbose)
Packit Service ed0f68
		printf(fmt[0], KYWD_LENGTH, label, val);
Packit Service ed0f68
	else if (first_field)
Packit Service ed0f68
		printf(&fmt[1][2], val);	/* skip field separator */
Packit Service ed0f68
	else
Packit Service ed0f68
		printf(fmt[1], val);
Packit Service ed0f68
Packit Service ed0f68
	first_field = 0;
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
void
Packit Service ed0f68
ipmi_pef_print_dec(const char * text, uint32_t val)
Packit Service ed0f68
{	/* unsigned */
Packit Service ed0f68
	ipmi_pef_print_field(pef_fld_fmts[F_DEC], text, val);
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
void
Packit Service ed0f68
ipmi_pef_print_int(const char * text, uint32_t val)
Packit Service ed0f68
{	/* signed */
Packit Service ed0f68
	ipmi_pef_print_field(pef_fld_fmts[F_INT], text, val);
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
void
Packit Service ed0f68
ipmi_pef_print_hex(const char * text, uint32_t val)
Packit Service ed0f68
{	/* hex */
Packit Service ed0f68
	ipmi_pef_print_field(pef_fld_fmts[F_HEX], text, val);
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
void 
Packit Service ed0f68
ipmi_pef_print_str(const char * text, const char * val)
Packit Service ed0f68
{	/* string */
Packit Service ed0f68
	ipmi_pef_print_field(pef_fld_fmts[F_STR], text, (unsigned long)val);
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
void 
Packit Service ed0f68
ipmi_pef_print_2xd(const char * text, uint8_t u1, uint8_t u2)
Packit Service ed0f68
{	/* 2 hex digits */
Packit Service ed0f68
	uint32_t val = ((u1 << 8) + u2) & 0xffff;
Packit Service ed0f68
	ipmi_pef_print_field(pef_fld_fmts[F_2XD], text, val);
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
void 
Packit Service ed0f68
ipmi_pef_print_1xd(const char * text, uint32_t val)
Packit Service ed0f68
{	/* 1 hex digit */
Packit Service ed0f68
	ipmi_pef_print_field(pef_fld_fmts[F_1XD], text, val);
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* ipmi_pef_print_guid - print-out GUID. */
Packit Service ed0f68
static int
Packit Service ed0f68
ipmi_pef_print_guid(uint8_t *guid)
Packit Service ed0f68
{
Packit Service ed0f68
	if (guid == NULL) {
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	if (verbose) {
Packit Service ed0f68
		printf("%-*s : %02x%02x%02x%02x-%02x%02x-%02x%02x-%02x%02x-%02x%02x%02x%02x%02x%02x\n",
Packit Service ed0f68
				KYWD_LENGTH, "System GUID",
Packit Service ed0f68
				guid[0], guid[1], guid[2], guid[3], guid[4],
Packit Service ed0f68
				guid[5], guid[6], guid[7], guid[8], guid[9],
Packit Service ed0f68
				guid[10],guid[11], guid[12], guid[13], guid[14],
Packit Service ed0f68
				guid[15]);
Packit Service ed0f68
	} else {
Packit Service ed0f68
		printf(" | %02x%02x%02x%02x-%02x%02x-%02x%02x-%02x%02x-%02x%02x%02x%02x%02x%02x",
Packit Service ed0f68
				guid[0], guid[1], guid[2], guid[3], guid[4],
Packit Service ed0f68
				guid[5], guid[6], guid[7], guid[8], guid[9],
Packit Service ed0f68
				guid[10], guid[11], guid[12], guid[13], guid[14],
Packit Service ed0f68
				guid[15]);
Packit Service ed0f68
	}
Packit Service ed0f68
	return 0;
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
static struct ipmi_rs * 
Packit Service ed0f68
ipmi_pef_msg_exchange(struct ipmi_intf * intf, struct ipmi_rq * req, char * txt)
Packit Service ed0f68
{	/*
Packit Service ed0f68
	// common IPMItool rqst/resp handling
Packit Service ed0f68
	*/
Packit Service ed0f68
	struct ipmi_rs * rsp = intf->sendrecv(intf, req);
Packit Service ed0f68
	if (!rsp) {
Packit Service ed0f68
		return(NULL);
Packit Service ed0f68
	} else if (rsp->ccode == 0x80)	{
Packit Service ed0f68
		return(NULL);   /* Do not output error, just unsupported parameters */
Packit Service ed0f68
	} else if (rsp->ccode) {
Packit Service ed0f68
		lprintf(LOG_ERR, " **Error %x in '%s' command", rsp->ccode, txt);
Packit Service ed0f68
		return(NULL);
Packit Service ed0f68
	}
Packit Service ed0f68
	if (verbose > 2) {
Packit Service ed0f68
		printbuf(rsp->data, rsp->data_len, txt);
Packit Service ed0f68
	}
Packit Service ed0f68
	return(rsp);
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* _ipmi_get_pef_capabilities - Requests and returns result of (30.1) Get PEF
Packit Service ed0f68
 * Capabilities.
Packit Service ed0f68
 *
Packit Service ed0f68
 * @pcap - pointer where to store results.
Packit Service ed0f68
 *
Packit Service ed0f68
 * returns - negative number means error, positive is a ccode.
Packit Service ed0f68
 */
Packit Service ed0f68
int
Packit Service ed0f68
_ipmi_get_pef_capabilities(struct ipmi_intf *intf,
Packit Service ed0f68
		struct pef_capabilities *pcap)
Packit Service ed0f68
{
Packit Service ed0f68
	struct ipmi_rs *rsp;
Packit Service ed0f68
	struct ipmi_rq req;
Packit Service ed0f68
	if (pcap == NULL) {
Packit Service ed0f68
		return (-3);
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	memset(pcap, 0, sizeof(struct pef_capabilities));
Packit Service ed0f68
	memset(&req, 0, sizeof(req));
Packit Service ed0f68
	req.msg.netfn = IPMI_NETFN_SE;
Packit Service ed0f68
	req.msg.cmd = IPMI_CMD_GET_PEF_CAPABILITIES;
Packit Service ed0f68
Packit Service ed0f68
	rsp = intf->sendrecv(intf, &req;;
Packit Service ed0f68
	if (rsp == NULL) {
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	} else if (rsp->ccode != 0) {
Packit Service ed0f68
		return rsp->ccode;
Packit Service ed0f68
	} else if (rsp->data_len != 3) {
Packit Service ed0f68
		return (-2);
Packit Service ed0f68
	}
Packit Service ed0f68
	pcap->version = rsp->data[0];
Packit Service ed0f68
	pcap->actions = rsp->data[1];
Packit Service ed0f68
	pcap->event_filter_count = rsp->data[2];
Packit Service ed0f68
	return 0;
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* _ipmi_get_pef_filter_entry - Fetches one Entry from Event Filter Table
Packit Service ed0f68
 * identified by Filter ID.
Packit Service ed0f68
 *
Packit Service ed0f68
 * @filter_id - Filter ID of Entry in Event Filter Table.
Packit Service ed0f68
 * @filter_entry - Pointer where to copy Filter Entry data.
Packit Service ed0f68
 *
Packit Service ed0f68
 * returns - negative number means error, positive is a ccode.
Packit Service ed0f68
 */
Packit Service ed0f68
static int
Packit Service ed0f68
_ipmi_get_pef_filter_entry(struct ipmi_intf *intf, uint8_t filter_id,
Packit Service ed0f68
		struct pef_cfgparm_filter_table_entry *filter_entry)
Packit Service ed0f68
{
Packit Service ed0f68
	struct ipmi_rs *rsp;
Packit Service ed0f68
	struct ipmi_rq req;
Packit Service ed0f68
	uint8_t data[3];
Packit Service ed0f68
	uint8_t data_len = 3 * sizeof(uint8_t);
Packit Service ed0f68
	int dest_size;
Packit Service ed0f68
	if (filter_entry == NULL) {
Packit Service ed0f68
		return (-3);
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	dest_size = (int)sizeof(struct pef_cfgparm_filter_table_entry);
Packit Service ed0f68
	memset(filter_entry, 0, dest_size);
Packit Service ed0f68
	memset(&data, 0, data_len);
Packit Service ed0f68
	data[0] = PEF_CFGPARM_ID_PEF_FILTER_TABLE_ENTRY;
Packit Service ed0f68
	data[1] = filter_id;
Packit Service ed0f68
Packit Service ed0f68
	memset(&req, 0, sizeof(req));
Packit Service ed0f68
	req.msg.netfn = IPMI_NETFN_SE;
Packit Service ed0f68
	req.msg.cmd = IPMI_CMD_GET_PEF_CONFIG_PARMS;
Packit Service ed0f68
	req.msg.data = (uint8_t *)&dat;;
Packit Service ed0f68
	req.msg.data_len = data_len;
Packit Service ed0f68
	rsp = intf->sendrecv(intf, &req;;
Packit Service ed0f68
	if (rsp == NULL) {
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	} else if (rsp->ccode != 0) {
Packit Service ed0f68
		return rsp->ccode;
Packit Service ed0f68
	} else if (rsp->data_len != 22 || (rsp->data_len - 1) != dest_size) {
Packit Service ed0f68
		return (-2);
Packit Service ed0f68
	}
Packit Service ed0f68
	memcpy(filter_entry, &rsp->data[1], dest_size);
Packit Service ed0f68
	return 0;
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* _ipmi_get_pef_filter_entry_cfg - Fetches configuration of one Entry from
Packit Service ed0f68
 * Event Filter Table identified by Filter ID.
Packit Service ed0f68
 *
Packit Service ed0f68
 * @filter_id - Filter ID of Entry in Event Filter Table.
Packit Service ed0f68
 * @filter_entry_cfg - Pointer where to copy Filter Entry configuration.
Packit Service ed0f68
 *
Packit Service ed0f68
 * returns - negative number means error, positive is a ccode.
Packit Service ed0f68
 */
Packit Service ed0f68
int
Packit Service ed0f68
_ipmi_get_pef_filter_entry_cfg(struct ipmi_intf *intf, uint8_t filter_id,
Packit Service ed0f68
		struct pef_cfgparm_filter_table_data_1 *filter_cfg)
Packit Service ed0f68
{
Packit Service ed0f68
	struct ipmi_rs *rsp;
Packit Service ed0f68
	struct ipmi_rq req;
Packit Service ed0f68
	uint8_t data[3];
Packit Service ed0f68
	uint8_t data_len = 3 * sizeof(uint8_t);
Packit Service ed0f68
	int dest_size;
Packit Service ed0f68
	if (filter_cfg == NULL) {
Packit Service ed0f68
		return (-3);
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	dest_size = (int)sizeof(struct pef_cfgparm_filter_table_data_1);
Packit Service ed0f68
	memset(filter_cfg, 0, dest_size);
Packit Service ed0f68
	memset(&data, 0, data_len);
Packit Service ed0f68
	data[0] = PEF_CFGPARM_ID_PEF_FILTER_TABLE_DATA_1;
Packit Service ed0f68
	data[1] = filter_id;
Packit Service ed0f68
Packit Service ed0f68
	memset(&req, 0, sizeof(req));
Packit Service ed0f68
	req.msg.netfn = IPMI_NETFN_SE;
Packit Service ed0f68
	req.msg.cmd = IPMI_CMD_GET_PEF_CONFIG_PARMS;
Packit Service ed0f68
	req.msg.data = (uint8_t *)&dat;;
Packit Service ed0f68
	req.msg.data_len = data_len;
Packit Service ed0f68
	rsp = intf->sendrecv(intf, &req;;
Packit Service ed0f68
	if (rsp == NULL) {
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	} else if (rsp->ccode != 0) {
Packit Service ed0f68
		return rsp->ccode;
Packit Service ed0f68
	} else if (rsp->data_len != 3 || (rsp->data_len - 1) != dest_size) {
Packit Service ed0f68
		return (-2);
Packit Service ed0f68
	}
Packit Service ed0f68
	memcpy(filter_cfg, &rsp->data[1], dest_size);
Packit Service ed0f68
	return 0;
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* _ipmi_get_pef_policy_entry - Fetches one Entry from Alert Policy Table
Packit Service ed0f68
 * identified by Policy ID.
Packit Service ed0f68
 *
Packit Service ed0f68
 * @policy_id - Policy ID of Entry in Alert Policy Table.
Packit Service ed0f68
 * @policy_entry - Pointer where to copy Policy Entry data.
Packit Service ed0f68
 *
Packit Service ed0f68
 * returns - negative number means error, positive is a ccode.
Packit Service ed0f68
 */
Packit Service ed0f68
static int
Packit Service ed0f68
_ipmi_get_pef_policy_entry(struct ipmi_intf *intf, uint8_t policy_id,
Packit Service ed0f68
		struct pef_cfgparm_policy_table_entry *policy_entry)
Packit Service ed0f68
{
Packit Service ed0f68
	struct ipmi_rs *rsp;
Packit Service ed0f68
	struct ipmi_rq req;
Packit Service ed0f68
	uint8_t data[3];
Packit Service ed0f68
	uint8_t data_len = 3 * sizeof(uint8_t);
Packit Service ed0f68
	int dest_size;
Packit Service ed0f68
	if (policy_entry == NULL) {
Packit Service ed0f68
		return (-3);
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	dest_size = (int)sizeof(struct pef_cfgparm_policy_table_entry);
Packit Service ed0f68
	memset(policy_entry, 0, dest_size);
Packit Service ed0f68
	memset(&data, 0, data_len);
Packit Service ed0f68
	data[0] = PEF_CFGPARM_ID_PEF_ALERT_POLICY_TABLE_ENTRY;
Packit Service ed0f68
	data[1] = policy_id & PEF_POLICY_TABLE_ID_MASK;
Packit Service ed0f68
Packit Service ed0f68
	memset(&req, 0, sizeof(req));
Packit Service ed0f68
	req.msg.netfn = IPMI_NETFN_SE;
Packit Service ed0f68
	req.msg.cmd = IPMI_CMD_GET_PEF_CONFIG_PARMS;
Packit Service ed0f68
	req.msg.data = (uint8_t *)&dat;;
Packit Service ed0f68
	req.msg.data_len = data_len;
Packit Service ed0f68
	rsp = intf->sendrecv(intf, &req;;
Packit Service ed0f68
	if (rsp == NULL) {
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	} else if (rsp->ccode != 0) {
Packit Service ed0f68
		return rsp->ccode;
Packit Service ed0f68
	} else if (rsp->data_len != 5 || (rsp->data_len - 1) != dest_size) {
Packit Service ed0f68
		return (-2);
Packit Service ed0f68
	}
Packit Service ed0f68
	memcpy(policy_entry, &rsp->data[1], dest_size);
Packit Service ed0f68
	return 0;
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* _ipmi_get_pef_filter_table_size - Fetch the Number of Event Filter Entries.
Packit Service ed0f68
 * If the number is 0, it means feature is not supported.
Packit Service ed0f68
 *
Packit Service ed0f68
 * @table_size - ptr to where to store number of entries.
Packit Service ed0f68
 *
Packit Service ed0f68
 * returns - negative number means error, positive is a ccode.
Packit Service ed0f68
 */
Packit Service ed0f68
static int
Packit Service ed0f68
_ipmi_get_pef_filter_table_size(struct ipmi_intf *intf, uint8_t *table_size)
Packit Service ed0f68
{
Packit Service ed0f68
	struct ipmi_rs *rsp;
Packit Service ed0f68
	struct ipmi_rq req;
Packit Service ed0f68
	struct pef_cfgparm_selector psel;
Packit Service ed0f68
Packit Service ed0f68
	if (table_size == NULL) {
Packit Service ed0f68
		return (-3);
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	*table_size = 0;
Packit Service ed0f68
	memset(&psel, 0, sizeof(psel));
Packit Service ed0f68
	psel.id = PEF_CFGPARM_ID_PEF_FILTER_TABLE_SIZE;
Packit Service ed0f68
	memset(&req, 0, sizeof(req));
Packit Service ed0f68
Packit Service ed0f68
	req.msg.netfn = IPMI_NETFN_SE;
Packit Service ed0f68
	req.msg.cmd = IPMI_CMD_GET_PEF_CONFIG_PARMS;
Packit Service ed0f68
	req.msg.data = (uint8_t *)&pse;;
Packit Service ed0f68
	req.msg.data_len = sizeof(psel);
Packit Service ed0f68
	rsp = intf->sendrecv(intf, &req;;
Packit Service ed0f68
	if (rsp == NULL) {
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	} else if (rsp->ccode != 0) {
Packit Service ed0f68
		return rsp->ccode;
Packit Service ed0f68
	} else if (rsp->data_len != 2) {
Packit Service ed0f68
		return (-2);
Packit Service ed0f68
	}
Packit Service ed0f68
	*table_size = rsp->data[1] & 0x7F;
Packit Service ed0f68
	return 0;
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* _ipmi_get_pef_policy_table_size - Fetch the Number of Alert Policy Entries. If the
Packit Service ed0f68
 * number is 0, it means feature is not supported.
Packit Service ed0f68
 *
Packit Service ed0f68
 * @table_size - ptr to where to store number of entries.
Packit Service ed0f68
 *
Packit Service ed0f68
 * returns - negative number means error, positive is a ccode.
Packit Service ed0f68
 */
Packit Service ed0f68
static int
Packit Service ed0f68
_ipmi_get_pef_policy_table_size(struct ipmi_intf *intf, uint8_t *table_size)
Packit Service ed0f68
{
Packit Service ed0f68
	struct ipmi_rs *rsp;
Packit Service ed0f68
	struct ipmi_rq req;
Packit Service ed0f68
	struct pef_cfgparm_selector psel;
Packit Service ed0f68
Packit Service ed0f68
	if (table_size == NULL) {
Packit Service ed0f68
		return (-3);
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	*table_size = 0;
Packit Service ed0f68
	memset(&psel, 0, sizeof(psel));
Packit Service ed0f68
	psel.id = PEF_CFGPARM_ID_PEF_ALERT_POLICY_TABLE_SIZE;
Packit Service ed0f68
	memset(&req, 0, sizeof(req));
Packit Service ed0f68
Packit Service ed0f68
	req.msg.netfn = IPMI_NETFN_SE;
Packit Service ed0f68
	req.msg.cmd = IPMI_CMD_GET_PEF_CONFIG_PARMS;
Packit Service ed0f68
	req.msg.data = (uint8_t *)&pse;;
Packit Service ed0f68
	req.msg.data_len = sizeof(psel);
Packit Service ed0f68
	rsp = intf->sendrecv(intf, &req;;
Packit Service ed0f68
	if (rsp == NULL) {
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	} else if (rsp->ccode != 0) {
Packit Service ed0f68
		return rsp->ccode;
Packit Service ed0f68
	} else if (rsp->data_len != 2) {
Packit Service ed0f68
		return (-2);
Packit Service ed0f68
	}
Packit Service ed0f68
	*table_size = rsp->data[1] & 0x7F;
Packit Service ed0f68
	return 0;
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* _ipmi_get_pef_system_guid - Fetches System GUID from PEF. This configuration
Packit Service ed0f68
 * parameter is optional. If data1 is 0x0, then this GUID is ignored by BMC.
Packit Service ed0f68
 *
Packit Service ed0f68
 * @system_guid - pointer where to store received data.
Packit Service ed0f68
 *
Packit Service ed0f68
 * returns - negative number means error, positive is a ccode.
Packit Service ed0f68
 */
Packit Service ed0f68
int
Packit Service ed0f68
_ipmi_get_pef_system_guid(struct ipmi_intf *intf,
Packit Service ed0f68
		struct pef_cfgparm_system_guid *system_guid)
Packit Service ed0f68
{
Packit Service ed0f68
	struct ipmi_rs *rsp;
Packit Service ed0f68
	struct ipmi_rq req;
Packit Service ed0f68
	struct pef_cfgparm_selector psel;
Packit Service ed0f68
	if (system_guid == NULL) {
Packit Service ed0f68
		return (-3);
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	memset(system_guid, 0, sizeof(struct pef_cfgparm_system_guid));
Packit Service ed0f68
	memset(&psel, 0, sizeof(psel));
Packit Service ed0f68
	psel.id = PEF_CFGPARM_ID_SYSTEM_GUID;
Packit Service ed0f68
	memset(&req, 0, sizeof(req));
Packit Service ed0f68
	req.msg.netfn = IPMI_NETFN_SE;
Packit Service ed0f68
	req.msg.cmd = IPMI_CMD_GET_PEF_CONFIG_PARMS;
Packit Service ed0f68
	req.msg.data = (uint8_t *)&pse;;
Packit Service ed0f68
	req.msg.data_len = sizeof(psel);
Packit Service ed0f68
Packit Service ed0f68
	rsp = intf->sendrecv(intf, &req;;
Packit Service ed0f68
	if (rsp == NULL) {
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	} else if (rsp->ccode != 0) {
Packit Service ed0f68
		return rsp->ccode;
Packit Service ed0f68
	} else if (rsp->data_len != 18
Packit Service ed0f68
			|| (rsp->data_len - 2) != sizeof(system_guid->guid)) {
Packit Service ed0f68
		return (-2);
Packit Service ed0f68
	}
Packit Service ed0f68
	system_guid->data1 = rsp->data[1] & 0x1;
Packit Service ed0f68
	memcpy(system_guid->guid, &rsp->data[2], sizeof(system_guid->guid));
Packit Service ed0f68
	return 0;
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* _ipmi_set_pef_filter_entry_cfg - Sets/updates configuration of Entry in Event
Packit Service ed0f68
 * Filter Table identified by Filter ID.
Packit Service ed0f68
 *
Packit Service ed0f68
 * @filter_id - ID of Entry in Event Filter Table to be updated
Packit Service ed0f68
 * @filter_cfg - Pointer to configuration data.
Packit Service ed0f68
 *
Packit Service ed0f68
 * returns - negative number means error, positive is a ccode.
Packit Service ed0f68
 */
Packit Service ed0f68
static int
Packit Service ed0f68
_ipmi_set_pef_filter_entry_cfg(struct ipmi_intf *intf, uint8_t filter_id,
Packit Service ed0f68
		struct pef_cfgparm_filter_table_data_1 *filter_cfg)
Packit Service ed0f68
{
Packit Service ed0f68
	struct ipmi_rs *rsp;
Packit Service ed0f68
	struct ipmi_rq req;
Packit Service ed0f68
	uint8_t data[3];
Packit Service ed0f68
	uint8_t data_len = 3 * sizeof(uint8_t);
Packit Service ed0f68
	if (filter_cfg == NULL) {
Packit Service ed0f68
		return (-3);
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	memset(&req, 0, sizeof(req));
Packit Service ed0f68
	req.msg.netfn = IPMI_NETFN_SE;
Packit Service ed0f68
	req.msg.cmd = IPMI_CMD_SET_PEF_CONFIG_PARMS;
Packit Service ed0f68
	req.msg.data = (uint8_t *)&dat;;
Packit Service ed0f68
	req.msg.data_len = data_len;
Packit Service ed0f68
Packit Service ed0f68
	memset(&data, 0, data_len);
Packit Service ed0f68
	data[0] = PEF_CFGPARM_ID_PEF_FILTER_TABLE_DATA_1;
Packit Service ed0f68
	data[1] = filter_id;
Packit Service ed0f68
	data[2] = filter_cfg->cfg;
Packit Service ed0f68
Packit Service ed0f68
	rsp = intf->sendrecv(intf, &req;;
Packit Service ed0f68
	if (rsp == NULL) {
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	} else if (rsp->ccode != 0) {
Packit Service ed0f68
		return rsp->ccode;
Packit Service ed0f68
	}
Packit Service ed0f68
	return 0;
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* _ipmi_set_pef_policy_entry - Sets/updates Entry in Alert Policy Table identified by
Packit Service ed0f68
 * Policy ID.
Packit Service ed0f68
 *
Packit Service ed0f68
 * @policy_id - Policy ID of Entry in Alert Policy Table to be updated
Packit Service ed0f68
 * @policy_entry - Pointer to data.
Packit Service ed0f68
 *
Packit Service ed0f68
 * returns - negative number means error, positive is a ccode.
Packit Service ed0f68
 */
Packit Service ed0f68
static int
Packit Service ed0f68
_ipmi_set_pef_policy_entry(struct ipmi_intf *intf, uint8_t policy_id,
Packit Service ed0f68
		struct pef_cfgparm_policy_table_entry *policy_entry)
Packit Service ed0f68
{
Packit Service ed0f68
	struct ipmi_rs *rsp;
Packit Service ed0f68
	struct ipmi_rq req;
Packit Service ed0f68
	struct pef_cfgparm_set_policy_table_entry payload;
Packit Service ed0f68
	if (policy_entry == NULL) {
Packit Service ed0f68
		return (-3);
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	memset(&req, 0, sizeof(req));
Packit Service ed0f68
	req.msg.netfn = IPMI_NETFN_SE;
Packit Service ed0f68
	req.msg.cmd = IPMI_CMD_SET_PEF_CONFIG_PARMS;
Packit Service ed0f68
	req.msg.data = (uint8_t *)&payload;
Packit Service ed0f68
	req.msg.data_len = sizeof(payload);
Packit Service ed0f68
Packit Service ed0f68
	memset(&payload, 0, sizeof(payload));
Packit Service ed0f68
	payload.param_selector = PEF_CFGPARM_ID_PEF_ALERT_POLICY_TABLE_ENTRY;
Packit Service ed0f68
	payload.policy_id = policy_id & PEF_POLICY_TABLE_ID_MASK;
Packit Service ed0f68
	memcpy(&payload.entry, &policy_entry->entry,
Packit Service ed0f68
			sizeof(policy_entry->entry));
Packit Service ed0f68
Packit Service ed0f68
	rsp = intf->sendrecv(intf, &req;;
Packit Service ed0f68
	if (rsp == NULL) {
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	} else if (rsp->ccode != 0) {
Packit Service ed0f68
		return rsp->ccode;
Packit Service ed0f68
	}
Packit Service ed0f68
	return 0;
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
static void
Packit Service ed0f68
ipmi_pef_print_oem_lan_dest(struct ipmi_intf *intf, uint8_t ch, uint8_t dest)
Packit Service ed0f68
{
Packit Service ed0f68
	char address[128];
Packit Service ed0f68
	int len;
Packit Service ed0f68
	int rc;
Packit Service ed0f68
	int rlen;
Packit Service ed0f68
	int set;
Packit Service ed0f68
	uint8_t data[32];
Packit Service ed0f68
Packit Service ed0f68
	if (ipmi_get_oem(intf) != IPMI_OEM_DELL) {
Packit Service ed0f68
		return;
Packit Service ed0f68
	}
Packit Service ed0f68
	/* Get # of IPV6 trap destinations */
Packit Service ed0f68
	rc = ipmi_mc_getsysinfo(intf, IPMI_SYSINFO_DELL_IPV6_COUNT, 0x00, 0x00, 4, data);
Packit Service ed0f68
	if (rc != 0 || dest > data[0]) {
Packit Service ed0f68
		return;
Packit Service ed0f68
	}
Packit Service ed0f68
	ipmi_pef_print_str("Alert destination type", "xxx");
Packit Service ed0f68
	ipmi_pef_print_str("PET Community", "xxx");
Packit Service ed0f68
	ipmi_pef_print_dec("ACK timeout/retry (secs)", 0);
Packit Service ed0f68
	ipmi_pef_print_dec("Retries", 0);
Packit Service ed0f68
Packit Service ed0f68
	/* Get IPv6 destination string (may be in multiple sets) */
Packit Service ed0f68
	memset(address, 0, sizeof(address));
Packit Service ed0f68
	memset(data, 0, sizeof(data));
Packit Service ed0f68
	rc = ipmi_mc_getsysinfo(intf, IPMI_SYSINFO_DELL_IPV6_DESTADDR, 0x00, dest, 19, data);
Packit Service ed0f68
	if (rc != 0) {
Packit Service ed0f68
		return;
Packit Service ed0f68
	}
Packit Service ed0f68
	/* Total length of IPv6 string */
Packit Service ed0f68
	len = data[4];
Packit Service ed0f68
	if ((rlen = len) > (IPMI_SYSINFO_SET0_SIZE-3)) {
Packit Service ed0f68
		/* First set has 11 bytes */
Packit Service ed0f68
		rlen = IPMI_SYSINFO_SET0_SIZE - 3;
Packit Service ed0f68
	}
Packit Service ed0f68
	memcpy(address, data + 8, rlen);
Packit Service ed0f68
	for (set = 1; len > 11; set++) {
Packit Service ed0f68
		rc = ipmi_mc_getsysinfo(intf, IPMI_SYSINFO_DELL_IPV6_DESTADDR, set, dest, 19, data);
Packit Service ed0f68
		if ((rlen = len - 11) >= (IPMI_SYSINFO_SETN_SIZE - 2)) {
Packit Service ed0f68
			/* Remaining sets have 14 bytes */
Packit Service ed0f68
			rlen = IPMI_SYSINFO_SETN_SIZE - 2;
Packit Service ed0f68
		}
Packit Service ed0f68
		memcpy(address + (set * 11), data + 3, rlen);
Packit Service ed0f68
		len -= rlen+3;
Packit Service ed0f68
	}
Packit Service ed0f68
	ipmi_pef_print_str("IPv6 Address", address);
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* TODO - rewrite */
Packit Service ed0f68
static void
Packit Service ed0f68
ipmi_pef_print_lan_dest(struct ipmi_intf * intf, uint8_t ch, uint8_t dest)
Packit Service ed0f68
{	/*
Packit Service ed0f68
	// print LAN alert destination info
Packit Service ed0f68
	*/
Packit Service ed0f68
	struct ipmi_rs * rsp;
Packit Service ed0f68
	struct ipmi_rq req;
Packit Service ed0f68
	struct pef_lan_cfgparm_selector lsel;
Packit Service ed0f68
	struct pef_lan_cfgparm_dest_type * ptype;
Packit Service ed0f68
	struct pef_lan_cfgparm_dest_info * pinfo;
Packit Service ed0f68
	char buf[32];
Packit Service ed0f68
	uint8_t dsttype, timeout, retries;
Packit Service ed0f68
Packit Service ed0f68
	memset(&lsel, 0, sizeof(lsel));
Packit Service ed0f68
	lsel.id = PEF_LAN_CFGPARM_ID_DEST_COUNT;
Packit Service ed0f68
	lsel.ch = ch;
Packit Service ed0f68
	memset(&req, 0, sizeof(req));
Packit Service ed0f68
	req.msg.netfn = IPMI_NETFN_TRANSPORT;
Packit Service ed0f68
	req.msg.cmd = IPMI_CMD_LAN_GET_CONFIG;
Packit Service ed0f68
	req.msg.data = (uint8_t *)&lse;;
Packit Service ed0f68
	req.msg.data_len = sizeof(lsel);
Packit Service ed0f68
	rsp = ipmi_pef_msg_exchange(intf, &req, "Alert destination count");
Packit Service ed0f68
	if (!rsp) {
Packit Service ed0f68
		lprintf(LOG_ERR, " **Error retrieving %s",
Packit Service ed0f68
			"Alert destination count");
Packit Service ed0f68
		return;
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	lsel.id = PEF_LAN_CFGPARM_ID_DESTTYPE;
Packit Service ed0f68
	lsel.set = dest;
Packit Service ed0f68
	rsp = ipmi_pef_msg_exchange(intf, &req, "Alert destination type");
Packit Service ed0f68
	if (!rsp || rsp->data[1] != lsel.set) {
Packit Service ed0f68
		lprintf(LOG_ERR, " **Error retrieving %s",
Packit Service ed0f68
			"Alert destination type");
Packit Service ed0f68
		return;
Packit Service ed0f68
	}
Packit Service ed0f68
	ptype = (struct pef_lan_cfgparm_dest_type *)&rsp->data[1];
Packit Service ed0f68
	dsttype = (ptype->dest_type & PEF_LAN_DEST_TYPE_MASK);
Packit Service ed0f68
	timeout = ptype->alert_timeout;
Packit Service ed0f68
	retries = (ptype->retries & PEF_LAN_RETRIES_MASK);
Packit Service ed0f68
	ipmi_pef_print_str("Alert destination type", 
Packit Service ed0f68
				ipmi_pef_bit_desc(&pef_b2s_lan_desttype, dsttype));
Packit Service ed0f68
	if (dsttype == PEF_LAN_DEST_TYPE_PET) {
Packit Service ed0f68
		lsel.id = PEF_LAN_CFGPARM_ID_PET_COMMUNITY;
Packit Service ed0f68
		lsel.set = 0;
Packit Service ed0f68
		rsp = ipmi_pef_msg_exchange(intf, &req, "PET community");
Packit Service ed0f68
		if (!rsp)
Packit Service ed0f68
			lprintf(LOG_ERR, " **Error retrieving %s",
Packit Service ed0f68
				"PET community");
Packit Service ed0f68
		else {
Packit Service ed0f68
			rsp->data[19] = '\0';
Packit Service ed0f68
			ipmi_pef_print_str("PET Community", (const char *)&rsp->data[1]);
Packit Service ed0f68
		}
Packit Service ed0f68
	}
Packit Service ed0f68
	ipmi_pef_print_dec("ACK timeout/retry (secs)", timeout);
Packit Service ed0f68
	ipmi_pef_print_dec("Retries", retries);
Packit Service ed0f68
Packit Service ed0f68
	lsel.id = PEF_LAN_CFGPARM_ID_DESTADDR;
Packit Service ed0f68
	lsel.set = dest;
Packit Service ed0f68
	rsp = ipmi_pef_msg_exchange(intf, &req, "Alert destination info");
Packit Service ed0f68
	if (!rsp || rsp->data[1] != lsel.set)
Packit Service ed0f68
		lprintf(LOG_ERR, " **Error retrieving %s",
Packit Service ed0f68
			"Alert destination info");
Packit Service ed0f68
	else {
Packit Service ed0f68
		pinfo = (struct pef_lan_cfgparm_dest_info *)&rsp->data[1];
Packit Service ed0f68
		sprintf(buf, "%u.%u.%u.%u", 
Packit Service ed0f68
					pinfo->ip[0], pinfo->ip[1], pinfo->ip[2], pinfo->ip[3]);
Packit Service ed0f68
		ipmi_pef_print_str("IP address", buf);
Packit Service ed0f68
Packit Service ed0f68
		ipmi_pef_print_str("MAC address", mac2str(pinfo->mac));
Packit Service ed0f68
	}
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
static void
Packit Service ed0f68
ipmi_pef_print_serial_dest_dial(struct ipmi_intf *intf, char *label,
Packit Service ed0f68
		struct pef_serial_cfgparm_selector *ssel)
Packit Service ed0f68
{	/*
Packit Service ed0f68
	// print a dial string
Packit Service ed0f68
	*/
Packit Service ed0f68
#define BLOCK_SIZE 16
Packit Service ed0f68
	struct ipmi_rs * rsp;
Packit Service ed0f68
	struct ipmi_rq req;
Packit Service ed0f68
	struct pef_serial_cfgparm_selector tmp;
Packit Service ed0f68
	char * p, strval[(6 * BLOCK_SIZE) + 1];
Packit Service ed0f68
Packit Service ed0f68
	memset(&tmp, 0, sizeof(tmp));
Packit Service ed0f68
	tmp.id = PEF_SERIAL_CFGPARM_ID_DEST_DIAL_STRING_COUNT;
Packit Service ed0f68
	memset(&req, 0, sizeof(req));
Packit Service ed0f68
	req.msg.netfn = IPMI_NETFN_TRANSPORT;
Packit Service ed0f68
	req.msg.cmd = IPMI_CMD_SERIAL_GET_CONFIG;
Packit Service ed0f68
	req.msg.data = (uint8_t *)&tm;;
Packit Service ed0f68
	req.msg.data_len = sizeof(tmp);
Packit Service ed0f68
	rsp = ipmi_pef_msg_exchange(intf, &req, "Dial string count");
Packit Service ed0f68
	if (!rsp || (rsp->data[1] & PEF_SERIAL_DIAL_STRING_COUNT_MASK) == 0)
Packit Service ed0f68
		return;	/* sssh, not supported */
Packit Service ed0f68
Packit Service ed0f68
	memcpy(&tmp, ssel, sizeof(tmp));
Packit Service ed0f68
	tmp.id = PEF_SERIAL_CFGPARM_ID_DEST_DIAL_STRING;
Packit Service ed0f68
	tmp.block = 1;
Packit Service ed0f68
	memset(strval, 0, sizeof(strval));
Packit Service ed0f68
	p = strval;
Packit Service ed0f68
	for (;;) {
Packit Service ed0f68
		rsp = ipmi_pef_msg_exchange(intf, &req, label);
Packit Service ed0f68
		if (!rsp
Packit Service ed0f68
		|| (rsp->data[1] != ssel->id)
Packit Service ed0f68
		|| (rsp->data[2] != tmp.block)) {
Packit Service ed0f68
			lprintf(LOG_ERR, " **Error retrieving %s", label);
Packit Service ed0f68
			return;
Packit Service ed0f68
		}
Packit Service ed0f68
		memcpy(p, &rsp->data[3], BLOCK_SIZE);
Packit Service ed0f68
		if (strchr(p, '\0') <= (p + BLOCK_SIZE))
Packit Service ed0f68
			break;
Packit Service ed0f68
		if ((p += BLOCK_SIZE) >= &strval[sizeof(strval)-1])
Packit Service ed0f68
			break;
Packit Service ed0f68
		tmp.block++;
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	ipmi_pef_print_str(label, strval);
Packit Service ed0f68
#undef BLOCK_SIZE
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
static void
Packit Service ed0f68
ipmi_pef_print_serial_dest_tap(struct ipmi_intf *intf,
Packit Service ed0f68
		struct pef_serial_cfgparm_selector *ssel)
Packit Service ed0f68
{	/*
Packit Service ed0f68
	// print TAP destination info
Packit Service ed0f68
	*/
Packit Service ed0f68
	struct ipmi_rs * rsp;
Packit Service ed0f68
	struct ipmi_rq req;
Packit Service ed0f68
	struct pef_serial_cfgparm_selector tmp;
Packit Service ed0f68
	struct pef_serial_cfgparm_tap_svc_settings * pset;
Packit Service ed0f68
	uint8_t dialstr_id, setting_id;
Packit Service ed0f68
Packit Service ed0f68
	memset(&tmp, 0, sizeof(tmp));
Packit Service ed0f68
	tmp.id = PEF_SERIAL_CFGPARM_ID_TAP_ACCT_COUNT;
Packit Service ed0f68
	memset(&req, 0, sizeof(req));
Packit Service ed0f68
	req.msg.netfn = IPMI_NETFN_TRANSPORT;
Packit Service ed0f68
	req.msg.cmd = IPMI_CMD_SERIAL_GET_CONFIG;
Packit Service ed0f68
	req.msg.data = (uint8_t *)&tm;;
Packit Service ed0f68
	req.msg.data_len = sizeof(tmp);
Packit Service ed0f68
	rsp = ipmi_pef_msg_exchange(intf, &req, "Number of TAP accounts");
Packit Service ed0f68
	if (!rsp || (rsp->data[1] & PEF_SERIAL_TAP_ACCT_COUNT_MASK) == 0)
Packit Service ed0f68
		return;	/* sssh, not supported */
Packit Service ed0f68
Packit Service ed0f68
	memcpy(&tmp, ssel, sizeof(tmp));
Packit Service ed0f68
	tmp.id = PEF_SERIAL_CFGPARM_ID_TAP_ACCT_INFO;
Packit Service ed0f68
	rsp = ipmi_pef_msg_exchange(intf, &req, "TAP account info");
Packit Service ed0f68
	if (!rsp || (rsp->data[1] != tmp.set)) {
Packit Service ed0f68
		lprintf(LOG_ERR, " **Error retrieving %s",
Packit Service ed0f68
			"TAP account info");
Packit Service ed0f68
		return;
Packit Service ed0f68
	}
Packit Service ed0f68
	dialstr_id = (rsp->data[2] & PEF_SERIAL_TAP_ACCT_INFO_DIAL_STRING_ID_MASK);
Packit Service ed0f68
	dialstr_id >>= PEF_SERIAL_TAP_ACCT_INFO_DIAL_STRING_ID_SHIFT;
Packit Service ed0f68
	setting_id = (rsp->data[2] & PEF_SERIAL_TAP_ACCT_INFO_SVC_SETTINGS_ID_MASK);
Packit Service ed0f68
	tmp.set = dialstr_id;
Packit Service ed0f68
	ipmi_pef_print_serial_dest_dial(intf, "TAP Dial string", &tmp);
Packit Service ed0f68
Packit Service ed0f68
	tmp.set = setting_id;
Packit Service ed0f68
	rsp = ipmi_pef_msg_exchange(intf, &req, "TAP service settings");
Packit Service ed0f68
	if (!rsp || (rsp->data[1] != tmp.set)) {
Packit Service ed0f68
		lprintf(LOG_ERR, " **Error retrieving %s",
Packit Service ed0f68
			"TAP service settings");
Packit Service ed0f68
		return;
Packit Service ed0f68
	}
Packit Service ed0f68
	pset = (struct pef_serial_cfgparm_tap_svc_settings *)&rsp->data[1];
Packit Service ed0f68
	ipmi_pef_print_str("TAP confirmation",  
Packit Service ed0f68
		ipmi_pef_bit_desc(&pef_b2s_tap_svc_confirm, pset->confirmation_flags));
Packit Service ed0f68
Packit Service ed0f68
	/* TODO : additional TAP settings? */
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/*
Packit Service ed0f68
static void
Packit Service ed0f68
ipmi_pef_print_serial_dest_ppp(struct ipmi_intf *intf,
Packit Service ed0f68
		struct pef_serial_cfgparm_selector *ssel)
Packit Service ed0f68
{
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
static void
Packit Service ed0f68
ipmi_pef_print_serial_dest_callback(struct ipmi_intf *intf,
Packit Service ed0f68
		struct pef_serial_cfgparm_selector *ssel)
Packit Service ed0f68
}
Packit Service ed0f68
*/
Packit Service ed0f68
Packit Service ed0f68
static void
Packit Service ed0f68
ipmi_pef_print_serial_dest(struct ipmi_intf *intf, uint8_t ch, uint8_t dest)
Packit Service ed0f68
{	/*
Packit Service ed0f68
	// print Serial/PPP alert destination info
Packit Service ed0f68
	*/
Packit Service ed0f68
	struct ipmi_rs * rsp;
Packit Service ed0f68
	struct ipmi_rq req;
Packit Service ed0f68
	struct pef_serial_cfgparm_selector ssel;
Packit Service ed0f68
	uint8_t tbl_size, wrk;
Packit Service ed0f68
	struct pef_serial_cfgparm_dest_info * pinfo;
Packit Service ed0f68
Packit Service ed0f68
	memset(&ssel, 0, sizeof(ssel));
Packit Service ed0f68
	ssel.id = PEF_SERIAL_CFGPARM_ID_DEST_COUNT;
Packit Service ed0f68
	ssel.ch = ch;
Packit Service ed0f68
	memset(&req, 0, sizeof(req));
Packit Service ed0f68
	req.msg.netfn = IPMI_NETFN_TRANSPORT;
Packit Service ed0f68
	req.msg.cmd = IPMI_CMD_SERIAL_GET_CONFIG;
Packit Service ed0f68
	req.msg.data = (uint8_t *)&ssel;
Packit Service ed0f68
	req.msg.data_len = sizeof(ssel);
Packit Service ed0f68
	rsp = ipmi_pef_msg_exchange(intf, &req, "Alert destination count");
Packit Service ed0f68
	if (!rsp) {
Packit Service ed0f68
		lprintf(LOG_ERR, " **Error retrieving %s",
Packit Service ed0f68
			"Alert destination count");
Packit Service ed0f68
		return;
Packit Service ed0f68
	}
Packit Service ed0f68
	tbl_size = (rsp->data[1] & PEF_SERIAL_DEST_TABLE_SIZE_MASK);
Packit Service ed0f68
	if (!dest || tbl_size == 0)	/* Page alerting not supported */
Packit Service ed0f68
		return;
Packit Service ed0f68
	if (dest > tbl_size) {
Packit Service ed0f68
		ipmi_pef_print_oem_lan_dest(intf, ch, dest - tbl_size);
Packit Service ed0f68
		return;
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	ssel.id = PEF_SERIAL_CFGPARM_ID_DESTINFO;
Packit Service ed0f68
	ssel.set = dest;
Packit Service ed0f68
	rsp = ipmi_pef_msg_exchange(intf, &req, "Alert destination info");
Packit Service ed0f68
	if (!rsp || rsp->data[1] != ssel.set)
Packit Service ed0f68
		lprintf(LOG_ERR, " **Error retrieving %s",
Packit Service ed0f68
			"Alert destination info");
Packit Service ed0f68
	else {
Packit Service ed0f68
		pinfo = (struct pef_serial_cfgparm_dest_info *)rsp->data;
Packit Service ed0f68
		wrk = (pinfo->dest_type & PEF_SERIAL_DEST_TYPE_MASK);
Packit Service ed0f68
		ipmi_pef_print_str("Alert destination type", 
Packit Service ed0f68
					ipmi_pef_bit_desc(&pef_b2s_serial_desttype, wrk));
Packit Service ed0f68
		ipmi_pef_print_dec("ACK timeout (secs)",
Packit Service ed0f68
					pinfo->alert_timeout);
Packit Service ed0f68
		ipmi_pef_print_dec("Retries",
Packit Service ed0f68
					(pinfo->retries & PEF_SERIAL_RETRIES_MASK));
Packit Service ed0f68
		switch (wrk) {
Packit Service ed0f68
			case PEF_SERIAL_DEST_TYPE_DIAL:
Packit Service ed0f68
				ipmi_pef_print_serial_dest_dial(intf, "Serial dial string", &ssel;;
Packit Service ed0f68
				break;
Packit Service ed0f68
			case PEF_SERIAL_DEST_TYPE_TAP:
Packit Service ed0f68
				ipmi_pef_print_serial_dest_tap(intf, &ssel;;
Packit Service ed0f68
				break;
Packit Service ed0f68
			case PEF_SERIAL_DEST_TYPE_PPP:
Packit Service ed0f68
				/* ipmi_pef_print_serial_dest_ppp(intf, &ssel;; */
Packit Service ed0f68
				break;
Packit Service ed0f68
			case PEF_SERIAL_DEST_TYPE_BASIC_CALLBACK:
Packit Service ed0f68
			case PEF_SERIAL_DEST_TYPE_PPP_CALLBACK:
Packit Service ed0f68
				/* ipmi_pef_print_serial_dest_callback(intf, &ssel;; */
Packit Service ed0f68
				break;
Packit Service ed0f68
		}
Packit Service ed0f68
	}
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
static void
Packit Service ed0f68
ipmi_pef_print_dest(struct ipmi_intf * intf, uint8_t ch, uint8_t dest)
Packit Service ed0f68
{	/*
Packit Service ed0f68
	// print generic alert destination info
Packit Service ed0f68
	*/
Packit Service ed0f68
	ipmi_pef_print_dec("Destination ID", dest);
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
void
Packit Service ed0f68
ipmi_pef_print_event_info(struct pef_cfgparm_filter_table_entry * pef, char * buf)
Packit Service ed0f68
{	/*
Packit Service ed0f68
	//  print PEF entry Event info: class, severity, trigger, etc.
Packit Service ed0f68
	*/
Packit Service ed0f68
	static char * classes[] = {"Discrete", "Threshold", "OEM"};
Packit Service ed0f68
	uint16_t offmask;
Packit Service ed0f68
	char * p;
Packit Service ed0f68
	unsigned int i;
Packit Service ed0f68
	uint8_t t;
Packit Service ed0f68
Packit Service ed0f68
	ipmi_pef_print_str("Event severity", 
Packit Service ed0f68
				ipmi_pef_bit_desc(&pef_b2s_severities, pef->entry.severity));
Packit Service ed0f68
Packit Service ed0f68
	t = pef->entry.event_trigger;
Packit Service ed0f68
	if (t == PEF_EVENT_TRIGGER_THRESHOLD)
Packit Service ed0f68
		i = 1;
Packit Service ed0f68
	else if (t > PEF_EVENT_TRIGGER_SENSOR_SPECIFIC)
Packit Service ed0f68
		i = 2;
Packit Service ed0f68
	else
Packit Service ed0f68
		i = 0;
Packit Service ed0f68
	ipmi_pef_print_str("Event class", classes[i]);
Packit Service ed0f68
Packit Service ed0f68
	offmask = ((pef->entry.event_data_1_offset_mask[1] << 8)
Packit Service ed0f68
	          + pef->entry.event_data_1_offset_mask[0]);
Packit Service ed0f68
Packit Service ed0f68
	if (offmask == 0xffff || t == PEF_EVENT_TRIGGER_MATCH_ANY)
Packit Service ed0f68
		strcpy(buf, "Any");
Packit Service ed0f68
	else if (t == PEF_EVENT_TRIGGER_UNSPECIFIED)
Packit Service ed0f68
		strcpy(buf, "Unspecified");
Packit Service ed0f68
	else if (t == PEF_EVENT_TRIGGER_SENSOR_SPECIFIC)
Packit Service ed0f68
		strcpy(buf, "Sensor-specific");
Packit Service ed0f68
	else if (t > PEF_EVENT_TRIGGER_SENSOR_SPECIFIC)
Packit Service ed0f68
		strcpy(buf, "OEM");
Packit Service ed0f68
	else {
Packit Service ed0f68
		sprintf(buf, "(0x%02x/0x%04x)", t, offmask);
Packit Service ed0f68
		p = strchr(buf, '\0');
Packit Service ed0f68
		for (i=0; i
Packit Service ed0f68
			if (offmask & 1) {
Packit Service ed0f68
				if ((t-1) >= PEF_B2S_GENERIC_ER_ENTRIES) {
Packit Service ed0f68
					sprintf(p, ", Unrecognized event trigger");
Packit Service ed0f68
				} else {
Packit Service ed0f68
					sprintf(p, ",%s", ipmi_pef_bit_desc(pef_b2s_generic_ER[t-1], i));
Packit Service ed0f68
				}
Packit Service ed0f68
				p = strchr(p, '\0');
Packit Service ed0f68
			}
Packit Service ed0f68
			offmask >>= 1;
Packit Service ed0f68
		}
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	ipmi_pef_print_str("Event trigger(s)", buf);
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* ipmi_pef_print_filter_entry - Print-out Entry of Event Filter Table. */
Packit Service ed0f68
static void
Packit Service ed0f68
ipmi_pef_print_filter_entry(struct pef_cfgparm_filter_table_entry *filter_entry)
Packit Service ed0f68
{
Packit Service ed0f68
	char buf[128];
Packit Service ed0f68
	uint8_t filter_enabled;
Packit Service ed0f68
	uint8_t set;
Packit Service ed0f68
Packit Service ed0f68
	ipmi_pef_print_dec("PEF Filter Table entry", filter_entry->data1);
Packit Service ed0f68
Packit Service ed0f68
	filter_enabled = filter_entry->entry.config & PEF_CONFIG_ENABLED;
Packit Service ed0f68
	sprintf(buf, "%sabled", (filter_enabled ? "en" : "dis"));
Packit Service ed0f68
Packit Service ed0f68
	switch (filter_entry->entry.config & 0x60) {
Packit Service ed0f68
	case 0x40:
Packit Service ed0f68
		strcat(buf, ", pre-configured");
Packit Service ed0f68
		break;
Packit Service ed0f68
	case 0x00:
Packit Service ed0f68
		strcat(buf, ", configurable");
Packit Service ed0f68
		break;
Packit Service ed0f68
	default:
Packit Service ed0f68
		/* Covers 0x60 and 0x20 which are reserved */
Packit Service ed0f68
		strcat(buf, ", reserved");
Packit Service ed0f68
		break;
Packit Service ed0f68
	}
Packit Service ed0f68
	ipmi_pef_print_str("Status", buf);
Packit Service ed0f68
Packit Service ed0f68
	if (!filter_enabled) {
Packit Service ed0f68
		return;
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	ipmi_pef_print_str("Sensor type",
Packit Service ed0f68
				ipmi_pef_bit_desc(&pef_b2s_sensortypes,
Packit Service ed0f68
					filter_entry->entry.sensor_type));
Packit Service ed0f68
Packit Service ed0f68
	if (filter_entry->entry.sensor_number == PEF_SENSOR_NUMBER_MATCH_ANY) {
Packit Service ed0f68
		ipmi_pef_print_str("Sensor number", "Any");
Packit Service ed0f68
	} else {
Packit Service ed0f68
		ipmi_pef_print_dec("Sensor number",
Packit Service ed0f68
				filter_entry->entry.sensor_number);
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	ipmi_pef_print_event_info(filter_entry, buf);
Packit Service ed0f68
	ipmi_pef_print_str("Action",
Packit Service ed0f68
				ipmi_pef_bit_desc(&pef_b2s_actions,
Packit Service ed0f68
					filter_entry->entry.action));
Packit Service ed0f68
Packit Service ed0f68
	if (filter_entry->entry.action & PEF_ACTION_ALERT) {
Packit Service ed0f68
		set = (filter_entry->entry.policy_number & PEF_POLICY_NUMBER_MASK);
Packit Service ed0f68
		ipmi_pef_print_int("Policy set", set);
Packit Service ed0f68
	}
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* ipmi_pef2_filter_enable - Enable/Disable specific PEF Event Filter.
Packit Service ed0f68
 *
Packit Service ed0f68
 * @enable - enable(1) or disable(0) PEF Event Filter.
Packit Service ed0f68
 * @filter_id - Filter ID of Entry in Event Filter Table.
Packit Service ed0f68
 *
Packit Service ed0f68
 * returns - 0 on success, any other value means error.
Packit Service ed0f68
 */
Packit Service ed0f68
static int
Packit Service ed0f68
ipmi_pef2_filter_enable(struct ipmi_intf *intf, uint8_t enable, uint8_t filter_id)
Packit Service ed0f68
{
Packit Service ed0f68
	struct pef_cfgparm_filter_table_data_1 filter_cfg;
Packit Service ed0f68
	int rc;
Packit Service ed0f68
	uint8_t filter_table_size;
Packit Service ed0f68
Packit Service ed0f68
	rc = _ipmi_get_pef_filter_table_size(intf, &filter_table_size);
Packit Service ed0f68
	if (eval_ccode(rc) != 0) {
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	} else if (filter_table_size == 0) {
Packit Service ed0f68
		lprintf(LOG_ERR, "PEF Filter isn't supported.");
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	} else if (filter_id > filter_table_size) {
Packit Service ed0f68
		lprintf(LOG_ERR,
Packit Service ed0f68
				"PEF Filter ID out of range. Valid range is (1..%d).",
Packit Service ed0f68
				filter_table_size);
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	memset(&filter_cfg, 0, sizeof(filter_cfg));
Packit Service ed0f68
	rc = _ipmi_set_pef_filter_entry_cfg(intf, filter_id, &filter_cfg);
Packit Service ed0f68
	if (eval_ccode(rc) != 0) {
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	if (enable != 0) {
Packit Service ed0f68
		/* Enable */
Packit Service ed0f68
		filter_cfg.cfg |= PEF_FILTER_ENABLED;
Packit Service ed0f68
	} else {
Packit Service ed0f68
		/* Disable */
Packit Service ed0f68
		filter_cfg.cfg &= PEF_FILTER_DISABLED;
Packit Service ed0f68
	}
Packit Service ed0f68
	rc = _ipmi_set_pef_filter_entry_cfg(intf, filter_id, &filter_cfg);
Packit Service ed0f68
	if (eval_ccode(rc) != 0) {
Packit Service ed0f68
		lprintf(LOG_ERR, "Failed to %s PEF Filter ID %d.",
Packit Service ed0f68
				enable ? "enable" : "disable",
Packit Service ed0f68
				filter_id);
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	}
Packit Service ed0f68
	printf("PEF Filter ID %" PRIu8 " is %s now.\n", filter_id,
Packit Service ed0f68
			enable ? "enabled" : "disabled");
Packit Service ed0f68
	return rc;
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
void
Packit Service ed0f68
ipmi_pef2_filter_help(void)
Packit Service ed0f68
{
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"usage: pef filter help");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"	pef filter list");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef filter enable <id = 1..n>");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef filter disable <id = 1..n>");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef filter create <id = 1..n> <params>");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef filter delete <id = 1..n>");
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* ipmi_pef2_filter - Handle processing of "filter" CLI args. */
Packit Service ed0f68
int
Packit Service ed0f68
ipmi_pef2_filter(struct ipmi_intf *intf, int argc, char **argv)
Packit Service ed0f68
{
Packit Service ed0f68
	int rc = 0;
Packit Service ed0f68
Packit Service ed0f68
	if (argc < 1) {
Packit Service ed0f68
		lprintf(LOG_ERR, "Not enough parameters given.");
Packit Service ed0f68
		ipmi_pef2_filter_help();
Packit Service ed0f68
		rc = (-1);
Packit Service ed0f68
	} else if (!strncmp(argv[0], "help\0", 5)) {
Packit Service ed0f68
		ipmi_pef2_filter_help();
Packit Service ed0f68
		rc = 0;
Packit Service ed0f68
	} else if (!strncmp(argv[0], "list\0", 5)) {
Packit Service ed0f68
		rc = ipmi_pef2_list_filters(intf);
Packit Service ed0f68
	} else if (!strncmp(argv[0], "enable\0", 7)
Packit Service ed0f68
			||(!strncmp(argv[0], "disable\0", 8))) {
Packit Service ed0f68
		uint8_t enable;
Packit Service ed0f68
		uint8_t filter_id;
Packit Service ed0f68
		if (argc != 2) {
Packit Service ed0f68
			lprintf(LOG_ERR, "Not enough arguments given.");
Packit Service ed0f68
			ipmi_pef2_filter_help();
Packit Service ed0f68
			return (-1);
Packit Service ed0f68
		}
Packit Service ed0f68
		if (str2uchar(argv[1], &filter_id) != 0) {
Packit Service ed0f68
			lprintf(LOG_ERR, "Invalid PEF Event Filter ID given: %s", argv[1]);
Packit Service ed0f68
			return (-1);
Packit Service ed0f68
		} else if (filter_id < 1) {
Packit Service ed0f68
			lprintf(LOG_ERR, "PEF Event Filter ID out of range. "
Packit Service ed0f68
					"Valid range is <1..255>.");
Packit Service ed0f68
			return (-1);
Packit Service ed0f68
		}
Packit Service ed0f68
		if (!strncmp(argv[0], "enable\0", 7)) {
Packit Service ed0f68
			enable = 1;
Packit Service ed0f68
		} else {
Packit Service ed0f68
			enable = 0;
Packit Service ed0f68
		}
Packit Service ed0f68
		rc = ipmi_pef2_filter_enable(intf, enable, filter_id);
Packit Service ed0f68
	} else if (!strncmp(argv[0], "create\0", 7)) {
Packit Service ed0f68
		lprintf(LOG_ERR, "Not implemented.");
Packit Service ed0f68
		rc = 1;
Packit Service ed0f68
	} else if (!strncmp(argv[0], "delete\0", 7)) {
Packit Service ed0f68
		lprintf(LOG_ERR, "Not implemented.");
Packit Service ed0f68
		rc = 1;
Packit Service ed0f68
	} else {
Packit Service ed0f68
		lprintf(LOG_ERR, "Invalid PEF Filter command: %s", argv[0]);
Packit Service ed0f68
		ipmi_pef2_filter_help();
Packit Service ed0f68
		rc = 1;
Packit Service ed0f68
	}
Packit Service ed0f68
	return rc;
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* ipmi_pef2_get_info - Reports PEF capabilities + System GUID */
Packit Service ed0f68
static int
Packit Service ed0f68
ipmi_pef2_get_info(struct ipmi_intf *intf)
Packit Service ed0f68
{
Packit Service ed0f68
	struct pef_capabilities pcap;
Packit Service ed0f68
	struct pef_cfgparm_system_guid psys_guid;
Packit Service ed0f68
	struct ipmi_guid_t guid;
Packit Service ed0f68
	int rc;
Packit Service ed0f68
	uint8_t *guid_ptr = NULL;
Packit Service ed0f68
	uint8_t policy_table_size;
Packit Service ed0f68
Packit Service ed0f68
	rc = _ipmi_get_pef_policy_table_size(intf, &policy_table_size);
Packit Service ed0f68
	if (eval_ccode(rc) != 0) {
Packit Service ed0f68
		lprintf(LOG_WARN, "Failed to get size of PEF Policy Table.");
Packit Service ed0f68
		policy_table_size = 0;
Packit Service ed0f68
	}
Packit Service ed0f68
	rc = _ipmi_get_pef_capabilities(intf, &pcap);
Packit Service ed0f68
	if (eval_ccode(rc) != 0) {
Packit Service ed0f68
		lprintf(LOG_ERR, "Failed to get PEF Capabilities.");
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	ipmi_pef_print_1xd("Version", pcap.version);
Packit Service ed0f68
	ipmi_pef_print_dec("PEF Event Filter count",
Packit Service ed0f68
			pcap.event_filter_count);
Packit Service ed0f68
	ipmi_pef_print_dec("PEF Alert Policy Table size",
Packit Service ed0f68
			policy_table_size);
Packit Service ed0f68
Packit Service ed0f68
	rc = _ipmi_get_pef_system_guid(intf, &psys_guid);
Packit Service ed0f68
	if (rc != 0x80 && eval_ccode(rc) != 0) {
Packit Service ed0f68
		lprintf(LOG_ERR, "Failed to get PEF System GUID. %i", rc);
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	} else if (psys_guid.data1 == 0x1) {
Packit Service ed0f68
		/* IPMI_CMD_GET_SYSTEM_GUID */
Packit Service ed0f68
		guid_ptr = &psys_guid.guid[0];
Packit Service ed0f68
	} else {
Packit Service ed0f68
		rc = _ipmi_mc_get_guid(intf, &guid);
Packit Service ed0f68
		if (rc == 0) {
Packit Service ed0f68
			guid_ptr = (uint8_t *)&guid;
Packit Service ed0f68
		}
Packit Service ed0f68
	}
Packit Service ed0f68
	/* Got GUID? */
Packit Service ed0f68
	if (guid_ptr) {
Packit Service ed0f68
		ipmi_pef_print_guid(guid_ptr);
Packit Service ed0f68
	}
Packit Service ed0f68
	ipmi_pef_print_flags(&pef_b2s_actions, P_SUPP, pcap.actions);
Packit Service ed0f68
	return 0;
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* ipmi_pef2_get_status - TODO rewrite - report the PEF status */
Packit Service ed0f68
static int
Packit Service ed0f68
ipmi_pef2_get_status(struct ipmi_intf *intf)
Packit Service ed0f68
{
Packit Service ed0f68
	struct ipmi_rs *rsp;
Packit Service ed0f68
	struct ipmi_rq req;
Packit Service ed0f68
	struct pef_cfgparm_selector psel;
Packit Service ed0f68
	char tbuf[40];
Packit Service ed0f68
	uint32_t timei;
Packit Service ed0f68
	time_t ts;
Packit Service ed0f68
Packit Service ed0f68
	memset(&req, 0, sizeof(req));
Packit Service ed0f68
	req.msg.netfn = IPMI_NETFN_SE;
Packit Service ed0f68
	req.msg.cmd = IPMI_CMD_GET_LAST_PROCESSED_EVT_ID;
Packit Service ed0f68
	rsp = ipmi_pef_msg_exchange(intf, &req, "Last S/W processed ID");
Packit Service ed0f68
	if (!rsp) {
Packit Service ed0f68
		lprintf(LOG_ERR, " **Error retrieving %s",
Packit Service ed0f68
			"Last S/W processed ID");
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	}
Packit Service ed0f68
	memcpy(&timei, rsp->data, sizeof(timei));
Packit Service ed0f68
#if WORDS_BIGENDIAN
Packit Service ed0f68
	timei = BSWAP_32(timei);
Packit Service ed0f68
#endif
Packit Service ed0f68
	ts = (time_t)timei;
Packit Service ed0f68
Packit Service ed0f68
	strftime(tbuf, sizeof(tbuf), "%m/%d/%Y %H:%M:%S", gmtime(&ts);;
Packit Service ed0f68
Packit Service ed0f68
	ipmi_pef_print_str("Last SEL addition", tbuf);
Packit Service ed0f68
	ipmi_pef_print_2xd("Last SEL record ID", rsp->data[5], rsp->data[4]);
Packit Service ed0f68
	ipmi_pef_print_2xd("Last S/W processed ID", rsp->data[7], rsp->data[6]);
Packit Service ed0f68
	ipmi_pef_print_2xd("Last BMC processed ID", rsp->data[9], rsp->data[8]);
Packit Service ed0f68
Packit Service ed0f68
	memset(&psel, 0, sizeof(psel));
Packit Service ed0f68
	psel.id = PEF_CFGPARM_ID_PEF_CONTROL;
Packit Service ed0f68
	memset(&req, 0, sizeof(req));
Packit Service ed0f68
	req.msg.netfn = IPMI_NETFN_SE;
Packit Service ed0f68
	req.msg.cmd = IPMI_CMD_GET_PEF_CONFIG_PARMS;
Packit Service ed0f68
	req.msg.data = (uint8_t *)&pse;;
Packit Service ed0f68
	req.msg.data_len = sizeof(psel);
Packit Service ed0f68
	rsp = ipmi_pef_msg_exchange(intf, &req, "PEF control");
Packit Service ed0f68
	if (!rsp) {
Packit Service ed0f68
		lprintf(LOG_ERR, " **Error retrieving %s",
Packit Service ed0f68
			"PEF control");
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	}
Packit Service ed0f68
	ipmi_pef_print_flags(&pef_b2s_control, P_ABLE, rsp->data[1]);
Packit Service ed0f68
Packit Service ed0f68
	psel.id = PEF_CFGPARM_ID_PEF_ACTION;
Packit Service ed0f68
	rsp = ipmi_pef_msg_exchange(intf, &req, "PEF action");
Packit Service ed0f68
	if (!rsp) {
Packit Service ed0f68
		lprintf(LOG_ERR, " **Error retrieving %s",
Packit Service ed0f68
			"PEF action");
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	}
Packit Service ed0f68
	ipmi_pef_print_flags(&pef_b2s_actions, P_ACTV, rsp->data[1]);
Packit Service ed0f68
	return 0;
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* ipmi_pef2_list_filters - List all entries in PEF Event Filter Table. */
Packit Service ed0f68
static int
Packit Service ed0f68
ipmi_pef2_list_filters(struct ipmi_intf *intf)
Packit Service ed0f68
{
Packit Service ed0f68
	struct pef_capabilities pcap;
Packit Service ed0f68
	struct pef_cfgparm_filter_table_entry filter_entry;
Packit Service ed0f68
	int rc;
Packit Service ed0f68
	uint8_t i;
Packit Service ed0f68
Packit Service ed0f68
	rc = _ipmi_get_pef_capabilities(intf, &pcap);
Packit Service ed0f68
	if (eval_ccode(rc) != 0) {
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	} else if (pcap.event_filter_count == 0) {
Packit Service ed0f68
		lprintf(LOG_ERR, "PEF Event Filtering isn't supported.");
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	for (i = 1; i <= pcap.event_filter_count; i++) {
Packit Service ed0f68
		first_field = 1;
Packit Service ed0f68
		rc = _ipmi_get_pef_filter_entry(intf, i, &filter_entry);
Packit Service ed0f68
		if (eval_ccode(rc) != 0) {
Packit Service ed0f68
			lprintf(LOG_ERR, "Failed to get PEF Event Filter Entry %i.",
Packit Service ed0f68
					i);
Packit Service ed0f68
			continue;
Packit Service ed0f68
		}
Packit Service ed0f68
		ipmi_pef_print_filter_entry(&filter_entry);
Packit Service ed0f68
		printf("\n");
Packit Service ed0f68
	}
Packit Service ed0f68
	return 0;
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* ipmi_pef2_list_policies - List Entries in PEF Alert Policy Table. */
Packit Service ed0f68
static int
Packit Service ed0f68
ipmi_pef2_list_policies(struct ipmi_intf *intf)
Packit Service ed0f68
{
Packit Service ed0f68
	struct channel_info_t channel_info;
Packit Service ed0f68
	struct pef_cfgparm_policy_table_entry entry;
Packit Service ed0f68
	int rc;
Packit Service ed0f68
	uint8_t dest;
Packit Service ed0f68
	uint8_t i;
Packit Service ed0f68
	uint8_t policy_table_size;
Packit Service ed0f68
Packit Service ed0f68
	rc = _ipmi_get_pef_policy_table_size(intf, &policy_table_size);
Packit Service ed0f68
	if (eval_ccode(rc) != 0) {
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	} else if (policy_table_size == 0) {
Packit Service ed0f68
		lprintf(LOG_ERR, "PEF Alert Policy isn't supported.");
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	for (i = 1; i <= policy_table_size; i++) {
Packit Service ed0f68
		first_field = 1;
Packit Service ed0f68
		rc = _ipmi_get_pef_policy_entry(intf, i, &entry);
Packit Service ed0f68
		if (eval_ccode(rc) != 0) {
Packit Service ed0f68
			continue;
Packit Service ed0f68
		}
Packit Service ed0f68
Packit Service ed0f68
		ipmi_pef_print_dec("Alert policy table entry",
Packit Service ed0f68
				   (entry.data1 & PEF_POLICY_TABLE_ID_MASK));
Packit Service ed0f68
		ipmi_pef_print_dec("Policy set",
Packit Service ed0f68
				   (entry.entry.policy & PEF_POLICY_ID_MASK) >> PEF_POLICY_ID_SHIFT);
Packit Service ed0f68
		ipmi_pef_print_str("State",
Packit Service ed0f68
				   entry.entry.policy & PEF_POLICY_ENABLED ? "enabled" : "disabled");
Packit Service ed0f68
		ipmi_pef_print_str("Policy entry rule",
Packit Service ed0f68
				   ipmi_pef_bit_desc(&pef_b2s_policies,
Packit Service ed0f68
					   (entry.entry.policy & PEF_POLICY_FLAGS_MASK)));
Packit Service ed0f68
Packit Service ed0f68
		if (entry.entry.alert_string_key & PEF_POLICY_EVENT_SPECIFIC) {
Packit Service ed0f68
			ipmi_pef_print_str("Event-specific", "true");
Packit Service ed0f68
		}
Packit Service ed0f68
		channel_info.channel = ((entry.entry.chan_dest &
Packit Service ed0f68
					PEF_POLICY_CHANNEL_MASK) >>
Packit Service ed0f68
					PEF_POLICY_CHANNEL_SHIFT);
Packit Service ed0f68
		rc = _ipmi_get_channel_info(intf, &channel_info);
Packit Service ed0f68
		if (eval_ccode(rc) != 0) {
Packit Service ed0f68
			continue;
Packit Service ed0f68
		}
Packit Service ed0f68
		ipmi_pef_print_dec("Channel number", channel_info.channel);
Packit Service ed0f68
		ipmi_pef_print_str("Channel medium",
Packit Service ed0f68
				   ipmi_pef_bit_desc(&pef_b2s_ch_medium,
Packit Service ed0f68
					   channel_info.medium));
Packit Service ed0f68
		dest = entry.entry.chan_dest & PEF_POLICY_DESTINATION_MASK;
Packit Service ed0f68
		switch (channel_info.medium) {
Packit Service ed0f68
		case PEF_CH_MEDIUM_TYPE_LAN:
Packit Service ed0f68
			ipmi_pef_print_lan_dest(intf, channel_info.channel,
Packit Service ed0f68
					dest);
Packit Service ed0f68
			break;
Packit Service ed0f68
		case PEF_CH_MEDIUM_TYPE_SERIAL:
Packit Service ed0f68
			ipmi_pef_print_serial_dest(intf, channel_info.channel,
Packit Service ed0f68
					dest);
Packit Service ed0f68
			break;
Packit Service ed0f68
		default:
Packit Service ed0f68
			ipmi_pef_print_dest(intf, channel_info.channel, dest);
Packit Service ed0f68
			break;
Packit Service ed0f68
		}
Packit Service ed0f68
		printf("\n");
Packit Service ed0f68
	}
Packit Service ed0f68
	return 0;
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
void
Packit Service ed0f68
ipmi_pef2_policy_help(void)
Packit Service ed0f68
{
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"usage: pef policy help");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef policy list");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef policy enable <id = 1..n>");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef policy disable <id = 1..n>");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef policy create <id = 1..n> <params>");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef policy delete <id = 1..n>");
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* ipmi_pef2_policy_enable - Enable/Disable specific PEF policy
Packit Service ed0f68
 *
Packit Service ed0f68
 * @enable - enable(1) or disable(0) PEF Alert Policy
Packit Service ed0f68
 * @policy_id - Policy ID of Entry in Alert Policy Table.
Packit Service ed0f68
 *
Packit Service ed0f68
 * returns - 0 on success, any other value means error.
Packit Service ed0f68
 */
Packit Service ed0f68
static int
Packit Service ed0f68
ipmi_pef2_policy_enable(struct ipmi_intf *intf, int enable, uint8_t policy_id)
Packit Service ed0f68
{
Packit Service ed0f68
	struct pef_cfgparm_policy_table_entry policy_entry;
Packit Service ed0f68
	int rc;
Packit Service ed0f68
	uint8_t policy_table_size;
Packit Service ed0f68
Packit Service ed0f68
	rc = _ipmi_get_pef_policy_table_size(intf, &policy_table_size);
Packit Service ed0f68
	if (eval_ccode(rc) != 0) {
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	} else if (policy_table_size == 0) {
Packit Service ed0f68
		lprintf(LOG_ERR, "PEF Policy isn't supported.");
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	} else if (policy_id > policy_table_size) {
Packit Service ed0f68
		lprintf(LOG_ERR,
Packit Service ed0f68
				"PEF Policy ID out of range. Valid range is (1..%d).",
Packit Service ed0f68
				policy_table_size);
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	memset(&policy_entry, 0, sizeof(policy_entry));
Packit Service ed0f68
	rc = _ipmi_get_pef_policy_entry(intf, policy_id, &policy_entry);
Packit Service ed0f68
	if (eval_ccode(rc) != 0) {
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	}
Packit Service ed0f68
Packit Service ed0f68
	if (enable != 0) {
Packit Service ed0f68
		/* Enable */
Packit Service ed0f68
		policy_entry.entry.policy |= PEF_POLICY_ENABLED;
Packit Service ed0f68
	} else {
Packit Service ed0f68
		/* Disable */
Packit Service ed0f68
		policy_entry.entry.policy &= PEF_POLICY_DISABLED;
Packit Service ed0f68
	}
Packit Service ed0f68
	rc = _ipmi_set_pef_policy_entry(intf, policy_id, &policy_entry);
Packit Service ed0f68
	if (eval_ccode(rc) != 0) {
Packit Service ed0f68
		lprintf(LOG_ERR, "Failed to %s PEF Policy ID %d.",
Packit Service ed0f68
				enable ? "enable" : "disable",
Packit Service ed0f68
				policy_id);
Packit Service ed0f68
		return (-1);
Packit Service ed0f68
	}
Packit Service ed0f68
	printf("PEF Policy ID %" PRIu8 " is %s now.\n", policy_id,
Packit Service ed0f68
			enable ? "enabled" : "disabled");
Packit Service ed0f68
	return rc;
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* ipmi_pef2_policy - Handle processing of "policy" CLI args. */
Packit Service ed0f68
int
Packit Service ed0f68
ipmi_pef2_policy(struct ipmi_intf *intf, int argc, char **argv)
Packit Service ed0f68
{
Packit Service ed0f68
	int rc = 0;
Packit Service ed0f68
Packit Service ed0f68
	if (argc < 1) {
Packit Service ed0f68
		lprintf(LOG_ERR, "Not enough parameters given.");
Packit Service ed0f68
		ipmi_pef2_policy_help();
Packit Service ed0f68
		rc = (-1);
Packit Service ed0f68
	} else if (!strncmp(argv[0], "help\0", 5)) {
Packit Service ed0f68
		ipmi_pef2_policy_help();
Packit Service ed0f68
		rc = 0;
Packit Service ed0f68
	} else if (!strncmp(argv[0], "list\0", 5)) {
Packit Service ed0f68
		rc = ipmi_pef2_list_policies(intf);
Packit Service ed0f68
	} else if (!strncmp(argv[0], "enable\0", 7)
Packit Service ed0f68
			|| !strncmp(argv[0], "disable\0", 8)) {
Packit Service ed0f68
		uint8_t enable;
Packit Service ed0f68
		uint8_t policy_id;
Packit Service ed0f68
		if (argc != 2) {
Packit Service ed0f68
			lprintf(LOG_ERR, "Not enough arguments given.");
Packit Service ed0f68
			ipmi_pef2_policy_help();
Packit Service ed0f68
			return (-1);
Packit Service ed0f68
		}
Packit Service ed0f68
		if (str2uchar(argv[1], &policy_id) != 0) {
Packit Service ed0f68
			lprintf(LOG_ERR, "Invalid PEF Policy ID given: %s", argv[1]);
Packit Service ed0f68
			return (-1);
Packit Service ed0f68
		} else if (policy_id < 1 || policy_id > 127) {
Packit Service ed0f68
			lprintf(LOG_ERR, "PEF Policy ID out of range. Valid range is <1..127>.");
Packit Service ed0f68
			return (-1);
Packit Service ed0f68
		}
Packit Service ed0f68
		if (!strncmp(argv[0], "enable\0", 7)) {
Packit Service ed0f68
			enable = 1;
Packit Service ed0f68
		} else {
Packit Service ed0f68
			enable = 0;
Packit Service ed0f68
		}
Packit Service ed0f68
		rc = ipmi_pef2_policy_enable(intf, enable, policy_id);
Packit Service ed0f68
	} else if (!strncmp(argv[0], "create\0", 7)) {
Packit Service ed0f68
		lprintf(LOG_ERR, "Not implemented.");
Packit Service ed0f68
		rc = 1;
Packit Service ed0f68
	} else if (!strncmp(argv[0], "delete\0", 7)) {
Packit Service ed0f68
		lprintf(LOG_ERR, "Not implemented.");
Packit Service ed0f68
		rc = 1;
Packit Service ed0f68
	} else {
Packit Service ed0f68
		lprintf(LOG_ERR, "Invalid PEF Policy command: %s", argv[0]);
Packit Service ed0f68
		ipmi_pef2_policy_help();
Packit Service ed0f68
		rc = 1;
Packit Service ed0f68
	}
Packit Service ed0f68
	return rc;
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
/* ipmi_pef2_help - print-out help text. */
Packit Service ed0f68
void
Packit Service ed0f68
ipmi_pef2_help(void)
Packit Service ed0f68
{
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"usage: pef help");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef capabilities");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef event <params>");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef filter list");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef filter enable <id = 1..n>");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef filter disable <id = 1..n>");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef filter create <id = 1..n> <params>");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef filter delete <id = 1..n>");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef info");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef policy list");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef policy enable <id = 1..n>");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef policy disable <id = 1..n>");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef policy create <id = 1..n> <params>");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef policy delete <id = 1..n>");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef pet ack <params>");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef status");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef timer get");
Packit Service ed0f68
	lprintf(LOG_NOTICE,
Packit Service ed0f68
"       pef timer set <0x00-0xFF>");
Packit Service ed0f68
}
Packit Service ed0f68
Packit Service ed0f68
int ipmi_pef_main(struct ipmi_intf *intf, int argc, char **argv)
Packit Service ed0f68
{
Packit Service ed0f68
	int rc = 0;
Packit Service ed0f68
Packit Service ed0f68
	if (argc < 1) {
Packit Service ed0f68
		lprintf(LOG_ERR, "Not enough parameters given.");
Packit Service ed0f68
		ipmi_pef2_help();
Packit Service ed0f68
		rc = (-1);
Packit Service ed0f68
	} else if (!strncmp(argv[0], "help\0", 5)) {
Packit Service ed0f68
		ipmi_pef2_help();
Packit Service ed0f68
		rc = 0;
Packit Service ed0f68
	} else if (!strncmp(argv[0], "capabilities\0", 13)) {
Packit Service ed0f68
		/* rc = ipmi_pef2_get_capabilities(intf); */
Packit Service ed0f68
		lprintf(LOG_ERR, "Not implemented.");
Packit Service ed0f68
		rc = 1;
Packit Service ed0f68
	} else if (!strncmp(argv[0], "event\0", 6)) {
Packit Service ed0f68
		/* rc = ipmi_pef2_event(intf, (argc - 1), ++argv); */
Packit Service ed0f68
		lprintf(LOG_ERR, "Not implemented.");
Packit Service ed0f68
		rc = 1;
Packit Service ed0f68
	} else if (!strncmp(argv[0], "filter\0", 7)) {
Packit Service ed0f68
		rc = ipmi_pef2_filter(intf, (argc - 1), ++argv);
Packit Service ed0f68
	} else if (!strncmp(argv[0], "info\0", 5)) {
Packit Service ed0f68
		rc = ipmi_pef2_get_info(intf);
Packit Service ed0f68
	} else if (!strncmp(argv[0], "pet\0", 4)) {
Packit Service ed0f68
		/* rc = ipmi_pef2_pet(intf, (argc - 1), ++argv); */
Packit Service ed0f68
		lprintf(LOG_ERR, "Not implemented.");
Packit Service ed0f68
		rc = 1;
Packit Service ed0f68
	} else if (!strncmp(argv[0], "policy\0", 7)) {
Packit Service ed0f68
		rc = ipmi_pef2_policy(intf, (argc - 1), ++argv);
Packit Service ed0f68
	} else if (!strncmp(argv[0], "status\0", 7)) {
Packit Service ed0f68
		rc = ipmi_pef2_get_status(intf);
Packit Service ed0f68
	} else if (!strncmp(argv[0], "timer\0", 6)) {
Packit Service ed0f68
		/* rc = ipmi_pef2_timer(intf, (argc - 1), ++argv); */
Packit Service ed0f68
		lprintf(LOG_ERR, "Not implemented.");
Packit Service ed0f68
		rc = 1;
Packit Service ed0f68
	} else {
Packit Service ed0f68
		lprintf(LOG_ERR, "Invalid PEF command: '%s'\n", argv[0]);
Packit Service ed0f68
		rc = (-1);
Packit Service ed0f68
	}
Packit Service ed0f68
	return rc;
Packit Service ed0f68
}