2 * Copyright (c) 2011 Chelsio Communications, Inc.
4 * Written by: Navdeep Parhar <np@FreeBSD.org>
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 #include <sys/cdefs.h>
29 __FBSDID("$FreeBSD$");
38 #include <sys/ioctl.h>
39 #include <sys/types.h>
40 #include <sys/socket.h>
41 #include <net/ethernet.h>
42 #include <netinet/in.h>
43 #include <arpa/inet.h>
47 #define ARRAY_SIZE(a) (sizeof(a) / sizeof((a)[0]))
49 static const char *progname, *nexus;
59 const struct reg_info *ri;
62 #include "reg_defs_t4.c"
63 #include "reg_defs_t4vf.c"
68 fprintf(fp, "Usage: %s <nexus> [operation]\n", progname);
70 "\tfilter <idx> [<param> <val>] ... set a filter\n"
71 "\tfilter <idx> delete|clear delete a filter\n"
72 "\tfilter list list all filters\n"
73 "\tfilter mode [<match>] ... get/set global filter mode\n"
74 "\treg <address>[=<val>] read/write register\n"
75 "\treg64 <address>[=<val>] read/write 64 bit register\n"
76 "\tregdump [<module>] ... dump registers\n"
77 "\tstdio interactive mode\n"
81 static inline unsigned int
82 get_card_vers(unsigned int version)
84 return (version & 0x3ff);
88 real_doit(unsigned long cmd, void *data, const char *cmdstr)
96 snprintf(buf, sizeof(buf), "/dev/%s", nexus);
97 if ((fd = open(buf, O_RDWR)) < 0) {
98 warn("open(%s)", nexus);
104 rc = ioctl(fd, cmd, data);
112 #define doit(x, y) real_doit(x, y, #x)
115 str_to_number(const char *s, long *val, long long *vall)
120 *vall = strtoll(s, &p, 0);
122 *val = strtol(s, &p, 0);
130 read_reg(long addr, int size, long long *val)
135 reg.addr = (uint32_t) addr;
136 reg.size = (uint32_t) size;
139 rc = doit(CHELSIO_T4_GETREG, ®);
147 write_reg(long addr, int size, long long val)
151 reg.addr = (uint32_t) addr;
152 reg.size = (uint32_t) size;
153 reg.val = (uint64_t) val;
155 return doit(CHELSIO_T4_SETREG, ®);
159 register_io(int argc, const char *argv[], int size)
167 /* <reg> OR <reg>=<value> */
169 p = str_to_number(argv[0], &addr, NULL);
172 warnx("invalid register \"%s\"", argv[0]);
178 p = str_to_number(v, NULL, &val);
181 warnx("invalid value \"%s\"", v);
186 } else if (argc == 2) {
191 p = str_to_number(argv[0], &addr, NULL);
193 warnx("invalid register \"%s\"", argv[0]);
197 p = str_to_number(argv[1], NULL, &val);
199 warnx("invalid value \"%s\"", argv[1]);
203 warnx("reg: invalid number of arguments (%d)", argc);
208 rc = write_reg(addr, size, val);
210 rc = read_reg(addr, size, &val);
212 printf("0x%llx [%llu]\n", val, val);
218 static inline uint32_t
219 xtract(uint32_t val, int shift, int len)
221 return (val >> shift) & ((1 << len) - 1);
225 dump_block_regs(const struct reg_info *reg_array, const uint32_t *regs)
227 uint32_t reg_val = 0;
229 for ( ; reg_array->name; ++reg_array)
230 if (!reg_array->len) {
231 reg_val = regs[reg_array->addr / 4];
232 printf("[%#7x] %-47s %#-10x %u\n", reg_array->addr,
233 reg_array->name, reg_val, reg_val);
235 uint32_t v = xtract(reg_val, reg_array->addr,
238 printf(" %*u:%u %-47s %#-10x %u\n",
239 reg_array->addr < 10 ? 3 : 2,
240 reg_array->addr + reg_array->len - 1,
241 reg_array->addr, reg_array->name, v, v);
248 dump_regs_table(int argc, const char *argv[], const uint32_t *regs,
249 const struct mod_regs *modtab, int nmodules)
253 for (i = 0; i < argc; i++) {
254 for (j = 0; j < nmodules; j++) {
255 if (!strcmp(argv[i], modtab[j].name))
260 warnx("invalid register block \"%s\"", argv[i]);
261 fprintf(stderr, "\nAvailable blocks:");
262 for ( ; nmodules; nmodules--, modtab++)
263 fprintf(stderr, " %s", modtab->name);
264 fprintf(stderr, "\n");
269 for ( ; nmodules; nmodules--, modtab++) {
271 match = argc == 0 ? 1 : 0;
272 for (i = 0; !match && i < argc; i++) {
273 if (!strcmp(argv[i], modtab->name))
278 dump_block_regs(modtab->ri, regs);
284 #define T4_MODREGS(name) { #name, t4_##name##_regs }
286 dump_regs_t4(int argc, const char *argv[], const uint32_t *regs)
288 static struct mod_regs t4_mod[] = {
290 { "pci", t4_pcie_regs },
294 { "edc0", t4_edc_0_regs },
295 { "edc1", t4_edc_1_regs },
300 { "pmrx", t4_pm_rx_regs },
301 { "pmtx", t4_pm_tx_regs },
303 { "cplsw", t4_cpl_switch_regs },
305 { "i2c", t4_i2cm_regs },
316 return dump_regs_table(argc, argv, regs, t4_mod, ARRAY_SIZE(t4_mod));
321 dump_regs_t4vf(int argc, const char *argv[], const uint32_t *regs)
323 static struct mod_regs t4vf_mod[] = {
324 { "sge", t4vf_sge_regs },
325 { "mps", t4vf_mps_regs },
326 { "pl", t4vf_pl_regs },
327 { "mbdata", t4vf_mbdata_regs },
328 { "cim", t4vf_cim_regs },
331 return dump_regs_table(argc, argv, regs, t4vf_mod,
332 ARRAY_SIZE(t4vf_mod));
336 dump_regs(int argc, const char *argv[])
338 int vers, revision, is_pcie, rc;
339 struct t4_regdump regs;
341 regs.data = calloc(1, T4_REGDUMP_SIZE);
342 if (regs.data == NULL) {
343 warnc(ENOMEM, "regdump");
347 regs.len = T4_REGDUMP_SIZE;
348 rc = doit(CHELSIO_T4_REGDUMP, ®s);
352 vers = get_card_vers(regs.version);
353 revision = (regs.version >> 10) & 0x3f;
354 is_pcie = (regs.version & 0x80000000) != 0;
357 if (revision == 0x3f)
358 rc = dump_regs_t4vf(argc, argv, regs.data);
360 rc = dump_regs_t4(argc, argv, regs.data);
362 warnx("%s (type %d, rev %d) is not a T4 card.",
363 nexus, vers, revision);
372 do_show_info_header(uint32_t mode)
376 printf ("%4s %8s", "Idx", "Hits");
377 for (i = T4_FILTER_FCoE; i <= T4_FILTER_IP_FRAGMENT; i <<= 1) {
387 case T4_FILTER_OVLAN:
388 printf (" vld:oVLAN");
391 case T4_FILTER_IVLAN:
392 printf (" vld:iVLAN");
395 case T4_FILTER_IP_TOS:
399 case T4_FILTER_IP_PROTO:
403 case T4_FILTER_ETH_TYPE:
407 case T4_FILTER_MAC_IDX:
411 case T4_FILTER_MPS_HIT_TYPE:
415 case T4_FILTER_IP_FRAGMENT:
420 /* compressed filter field not enabled */
424 printf(" %20s %20s %9s %9s %s\n",
425 "DIP", "SIP", "DPORT", "SPORT", "Action");
429 * Parse an argument sub-vector as a { <parameter name> <value>[:<mask>] }
430 * ordered tuple. If the parameter name in the argument sub-vector does not
431 * match the passed in parameter name, then a zero is returned for the
432 * function and no parsing is performed. If there is a match, then the value
433 * and optional mask are parsed and returned in the provided return value
434 * pointers. If no optional mask is specified, then a default mask of all 1s
437 * An error in parsing the value[:mask] will result in an error message and
438 * program termination.
441 parse_val_mask(const char *param, const char *args[], uint32_t *val,
446 if (strcmp(param, args[0]) != 0)
449 *val = strtoul(args[1], &p, 0);
456 if (p[0] == ':' && p[1] != 0) {
457 *mask = strtoul(p+1, &p, 0);
463 warnx("parameter \"%s\" has bad \"value[:mask]\" %s",
470 * Parse an argument sub-vector as a { <parameter name> <addr>[/<mask>] }
471 * ordered tuple. If the parameter name in the argument sub-vector does not
472 * match the passed in parameter name, then a zero is returned for the
473 * function and no parsing is performed. If there is a match, then the value
474 * and optional mask are parsed and returned in the provided return value
475 * pointers. If no optional mask is specified, then a default mask of all 1s
478 * The value return parameter "afp" is used to specify the expected address
479 * family -- IPv4 or IPv6 -- of the address[/mask] and return its actual
480 * format. A passed in value of AF_UNSPEC indicates that either IPv4 or IPv6
481 * is acceptable; AF_INET means that only IPv4 addresses are acceptable; and
482 * AF_INET6 means that only IPv6 are acceptable. AF_INET is returned for IPv4
483 * and AF_INET6 for IPv6 addresses, respectively. IPv4 address/mask pairs are
484 * returned in the first four bytes of the address and mask return values with
485 * the address A.B.C.D returned with { A, B, C, D } returned in addresses { 0,
486 * 1, 2, 3}, respectively.
488 * An error in parsing the value[:mask] will result in an error message and
489 * program termination.
492 parse_ipaddr(const char *param, const char *args[], int *afp, uint8_t addr[],
495 const char *colon, *afn;
499 unsigned int masksize;
502 * Is this our parameter?
504 if (strcmp(param, args[0]) != 0)
508 * Fundamental IPv4 versus IPv6 selection.
510 colon = strchr(args[1], ':');
520 if (*afp == AF_UNSPEC)
522 else if (*afp != af) {
523 warnx("address %s is not of expected family %s",
524 args[1], *afp == AF_INET ? "IP" : "IPv6");
529 * Parse address (temporarily stripping off any "/mask"
532 slash = strchr(args[1], '/');
535 ret = inet_pton(af, args[1], addr);
539 warnx("Cannot parse %s %s address %s", param, afn, args[1]);
544 * Parse optional mask specification.
548 unsigned int prefix = strtoul(slash + 1, &p, 10);
550 if (p == slash + 1) {
551 warnx("missing address prefix for %s", param);
555 warnx("%s is not a valid address prefix", slash + 1);
558 if (prefix > masksize) {
559 warnx("prefix %u is too long for an %s address",
563 memset(mask, 0, masksize / 8);
570 for (m = mask; masksize >= 8; m++, masksize -= 8)
573 *m = ~0 << (8 - masksize);
579 * Parse an argument sub-vector as a { <parameter name> <value> } ordered
580 * tuple. If the parameter name in the argument sub-vector does not match the
581 * passed in parameter name, then a zero is returned for the function and no
582 * parsing is performed. If there is a match, then the value is parsed and
583 * returned in the provided return value pointer.
586 parse_val(const char *param, const char *args[], uint32_t *val)
590 if (strcmp(param, args[0]) != 0)
593 *val = strtoul(args[1], &p, 0);
594 if (p > args[1] && p[0] == 0)
597 warnx("parameter \"%s\" has bad \"value\" %s", args[0], args[1]);
602 filters_show_ipaddr(int type, uint8_t *addr, uint8_t *addrm)
613 for (octet = 0; octet < noctets; octet++)
614 printf("%02x", addr[octet]);
616 for (octet = 0; octet < noctets; octet++)
617 printf("%02x", addrm[octet]);
621 do_show_one_filter_info(struct t4_filter *t, uint32_t mode)
625 printf("%4d", t->idx);
626 if (t->hits == UINT64_MAX)
629 printf(" %8ju", t->hits);
632 * Compressed header portion of filter.
634 for (i = T4_FILTER_FCoE; i <= T4_FILTER_IP_FRAGMENT; i <<= 1) {
637 printf(" %1d/%1d", t->fs.val.fcoe, t->fs.mask.fcoe);
641 printf(" %1d/%1d", t->fs.val.iport, t->fs.mask.iport);
644 case T4_FILTER_OVLAN:
645 printf(" %1d:%1x:%02x/%1d:%1x:%02x",
646 t->fs.val.ovlan_vld, (t->fs.val.ovlan >> 7) & 0x7,
647 t->fs.val.ovlan & 0x7f, t->fs.mask.ovlan_vld,
648 (t->fs.mask.ovlan >> 7) & 0x7,
649 t->fs.mask.ovlan & 0x7f);
652 case T4_FILTER_IVLAN:
653 printf(" %1d:%04x/%1d:%04x",
654 t->fs.val.ivlan_vld, t->fs.val.ivlan,
655 t->fs.mask.ivlan_vld, t->fs.mask.ivlan);
658 case T4_FILTER_IP_TOS:
659 printf(" %02x/%02x", t->fs.val.tos, t->fs.mask.tos);
662 case T4_FILTER_IP_PROTO:
663 printf(" %02x/%02x", t->fs.val.proto, t->fs.mask.proto);
666 case T4_FILTER_ETH_TYPE:
667 printf(" %04x/%04x", t->fs.val.ethtype,
671 case T4_FILTER_MAC_IDX:
672 printf(" %03x/%03x", t->fs.val.macidx,
676 case T4_FILTER_MPS_HIT_TYPE:
677 printf(" %1x/%1x", t->fs.val.matchtype,
678 t->fs.mask.matchtype);
681 case T4_FILTER_IP_FRAGMENT:
682 printf(" %1d/%1d", t->fs.val.frag, t->fs.mask.frag);
686 /* compressed filter field not enabled */
692 * Fixed portion of filter.
694 filters_show_ipaddr(t->fs.type, t->fs.val.dip, t->fs.mask.dip);
695 filters_show_ipaddr(t->fs.type, t->fs.val.sip, t->fs.mask.sip);
696 printf(" %04x/%04x %04x/%04x",
697 t->fs.val.dport, t->fs.mask.dport,
698 t->fs.val.sport, t->fs.mask.sport);
701 * Variable length filter action.
703 if (t->fs.action == FILTER_DROP)
705 else if (t->fs.action == FILTER_SWITCH) {
706 printf(" Switch: port=%d", t->fs.eport);
709 ", dmac=%02x:%02x:%02x:%02x:%02x:%02x "
711 t->fs.dmac[0], t->fs.dmac[1],
712 t->fs.dmac[2], t->fs.dmac[3],
713 t->fs.dmac[4], t->fs.dmac[5],
717 ", smac=%02x:%02x:%02x:%02x:%02x:%02x "
719 t->fs.smac[0], t->fs.smac[1],
720 t->fs.smac[2], t->fs.smac[3],
721 t->fs.smac[4], t->fs.smac[5],
723 if (t->fs.newvlan == VLAN_REMOVE)
724 printf(", vlan=none");
725 else if (t->fs.newvlan == VLAN_INSERT)
726 printf(", vlan=insert(%x)", t->fs.vlan);
727 else if (t->fs.newvlan == VLAN_REWRITE)
728 printf(", vlan=rewrite(%x)", t->fs.vlan);
731 if (t->fs.dirsteer == 0) {
734 printf("(TCB=hash)");
736 printf("%d", t->fs.iq);
737 if (t->fs.dirsteerhash == 0)
753 uint32_t mode = 0, header = 0;
757 /* Get the global filter mode first */
758 rc = doit(CHELSIO_T4_GET_FILTER_MODE, &mode);
763 for (t.idx = 0; ; t.idx++) {
764 rc = doit(CHELSIO_T4_GET_FILTER, &t);
765 if (rc != 0 || t.idx == 0xffffffff)
769 do_show_info_header(mode);
772 do_show_one_filter_info(&t, mode);
779 get_filter_mode(void)
784 rc = doit(CHELSIO_T4_GET_FILTER_MODE, &mode);
788 if (mode & T4_FILTER_IPv4)
791 if (mode & T4_FILTER_IPv6)
794 if (mode & T4_FILTER_IP_SADDR)
797 if (mode & T4_FILTER_IP_DADDR)
800 if (mode & T4_FILTER_IP_SPORT)
803 if (mode & T4_FILTER_IP_DPORT)
806 if (mode & T4_FILTER_MPS_HIT_TYPE)
807 printf("matchtype ");
809 if (mode & T4_FILTER_MAC_IDX)
812 if (mode & T4_FILTER_ETH_TYPE)
815 if (mode & T4_FILTER_IP_PROTO)
818 if (mode & T4_FILTER_IP_TOS)
821 if (mode & T4_FILTER_IVLAN)
824 if (mode & T4_FILTER_OVLAN)
827 if (mode & T4_FILTER_PORT)
830 if (mode & T4_FILTER_FCoE)
839 set_filter_mode(int argc, const char *argv[])
843 for (; argc; argc--, argv++) {
844 if (!strcmp(argv[0], "matchtype"))
845 mode |= T4_FILTER_MPS_HIT_TYPE;
847 if (!strcmp(argv[0], "macidx"))
848 mode |= T4_FILTER_MAC_IDX;
850 if (!strcmp(argv[0], "ethtype"))
851 mode |= T4_FILTER_ETH_TYPE;
853 if (!strcmp(argv[0], "proto"))
854 mode |= T4_FILTER_IP_PROTO;
856 if (!strcmp(argv[0], "tos"))
857 mode |= T4_FILTER_IP_TOS;
859 if (!strcmp(argv[0], "ivlan"))
860 mode |= T4_FILTER_IVLAN;
862 if (!strcmp(argv[0], "ovlan"))
863 mode |= T4_FILTER_OVLAN;
865 if (!strcmp(argv[0], "iport"))
866 mode |= T4_FILTER_PORT;
868 if (!strcmp(argv[0], "fcoe"))
869 mode |= T4_FILTER_FCoE;
872 return doit(CHELSIO_T4_SET_FILTER_MODE, &mode);
876 del_filter(uint32_t idx)
882 return doit(CHELSIO_T4_DEL_FILTER, &t);
886 set_filter(uint32_t idx, int argc, const char *argv[])
888 int af = AF_UNSPEC, start_arg = 0;
892 warnc(EINVAL, "%s", __func__);
895 bzero(&t, sizeof (t));
898 for (start_arg = 0; start_arg + 2 <= argc; start_arg += 2) {
899 const char **args = &argv[start_arg];
902 if (!strcmp(argv[start_arg], "type")) {
904 if (!strcasecmp(argv[start_arg + 1], "ipv4"))
906 else if (!strcasecmp(argv[start_arg + 1], "ipv6"))
909 warnx("invalid type \"%s\"; "
910 "must be one of \"ipv4\" or \"ipv6\"",
911 argv[start_arg + 1]);
915 if (af != AF_UNSPEC && af != newaf) {
916 warnx("conflicting IPv4/IPv6 specifications.");
920 } else if (!parse_val_mask("fcoe", args, &val, &mask)) {
922 t.fs.mask.fcoe = mask;
923 } else if (!parse_val_mask("iport", args, &val, &mask)) {
924 t.fs.val.iport = val;
925 t.fs.mask.iport = mask;
926 } else if (!parse_val_mask("ovlan", args, &val, &mask)) {
927 t.fs.val.ovlan = val;
928 t.fs.mask.ovlan = mask;
929 t.fs.val.ovlan_vld = 1;
930 t.fs.mask.ovlan_vld = 1;
931 } else if (!parse_val_mask("ivlan", args, &val, &mask)) {
932 t.fs.val.ivlan = val;
933 t.fs.mask.ivlan = mask;
934 t.fs.val.ivlan_vld = 1;
935 t.fs.mask.ivlan_vld = 1;
936 } else if (!parse_val_mask("tos", args, &val, &mask)) {
938 t.fs.mask.tos = mask;
939 } else if (!parse_val_mask("proto", args, &val, &mask)) {
940 t.fs.val.proto = val;
941 t.fs.mask.proto = mask;
942 } else if (!parse_val_mask("ethtype", args, &val, &mask)) {
943 t.fs.val.ethtype = val;
944 t.fs.mask.ethtype = mask;
945 } else if (!parse_val_mask("macidx", args, &val, &mask)) {
946 t.fs.val.macidx = val;
947 t.fs.mask.macidx = mask;
948 } else if (!parse_val_mask("matchtype", args, &val, &mask)) {
949 t.fs.val.matchtype = val;
950 t.fs.mask.matchtype = mask;
951 } else if (!parse_val_mask("frag", args, &val, &mask)) {
953 t.fs.mask.frag = mask;
954 } else if (!parse_val_mask("dport", args, &val, &mask)) {
955 t.fs.val.dport = val;
956 t.fs.mask.dport = mask;
957 } else if (!parse_val_mask("sport", args, &val, &mask)) {
958 t.fs.val.sport = val;
959 t.fs.mask.sport = mask;
960 } else if (!parse_ipaddr("dip", args, &af, t.fs.val.dip,
963 } else if (!parse_ipaddr("sip", args, &af, t.fs.val.sip,
966 } else if (!strcmp(argv[start_arg], "action")) {
967 if (!strcmp(argv[start_arg + 1], "pass"))
968 t.fs.action = FILTER_PASS;
969 else if (!strcmp(argv[start_arg + 1], "drop"))
970 t.fs.action = FILTER_DROP;
971 else if (!strcmp(argv[start_arg + 1], "switch"))
972 t.fs.action = FILTER_SWITCH;
974 warnx("invalid action \"%s\"; must be one of"
975 " \"pass\", \"drop\" or \"switch\"",
976 argv[start_arg + 1]);
979 } else if (!parse_val("hitcnts", args, &val)) {
981 } else if (!parse_val("prio", args, &val)) {
983 } else if (!parse_val("rpttid", args, &val)) {
985 } else if (!parse_val("queue", args, &val)) {
988 } else if (!parse_val("tcbhash", args, &val)) {
990 t.fs.dirsteerhash = 1;
991 } else if (!parse_val("eport", args, &val)) {
993 } else if (!strcmp(argv[start_arg], "dmac")) {
994 struct ether_addr *daddr;
996 daddr = ether_aton(argv[start_arg + 1]);
998 warnx("invalid dmac address \"%s\"",
999 argv[start_arg + 1]);
1002 memcpy(t.fs.dmac, daddr, ETHER_ADDR_LEN);
1004 } else if (!strcmp(argv[start_arg], "smac")) {
1005 struct ether_addr *saddr;
1007 saddr = ether_aton(argv[start_arg + 1]);
1008 if (saddr == NULL) {
1009 warnx("invalid smac address \"%s\"",
1010 argv[start_arg + 1]);
1013 memcpy(t.fs.smac, saddr, ETHER_ADDR_LEN);
1015 } else if (!strcmp(argv[start_arg], "vlan")) {
1017 if (!strcmp(argv[start_arg + 1], "none")) {
1018 t.fs.newvlan = VLAN_REMOVE;
1019 } else if (argv[start_arg + 1][0] == '=') {
1020 t.fs.newvlan = VLAN_REWRITE;
1021 } else if (argv[start_arg + 1][0] == '+') {
1022 t.fs.newvlan = VLAN_INSERT;
1024 warnx("unknown vlan parameter \"%s\"; must"
1025 " be one of \"none\", \"=<vlan>\" or"
1026 " \"+<vlan>\"", argv[start_arg + 1]);
1029 if (t.fs.newvlan == VLAN_REWRITE ||
1030 t.fs.newvlan == VLAN_INSERT) {
1031 t.fs.vlan = strtoul(argv[start_arg + 1] + 1,
1033 if (p == argv[start_arg + 1] + 1 || p[0] != 0) {
1034 warnx("invalid vlan \"%s\"",
1035 argv[start_arg + 1]);
1040 warnx("invalid parameter \"%s\"", argv[start_arg]);
1044 if (start_arg != argc) {
1045 warnx("no value for \"%s\"", argv[start_arg]);
1050 * Check basic sanity of option combinations.
1052 if (t.fs.action != FILTER_SWITCH &&
1053 (t.fs.eport || t.fs.newdmac || t.fs.newsmac || t.fs.newvlan)) {
1054 warnx("prio, port dmac, smac and vlan only make sense with"
1055 " \"action switch\"");
1058 if (t.fs.action != FILTER_PASS &&
1059 (t.fs.rpttid || t.fs.dirsteer || t.fs.maskhash)) {
1060 warnx("rpttid, queue and tcbhash don't make sense with"
1061 " action \"drop\" or \"switch\"");
1065 t.fs.type = (af == AF_INET6 ? 1 : 0); /* default IPv4 */
1066 return doit(CHELSIO_T4_SET_FILTER, &t);
1070 filter_cmd(int argc, const char *argv[])
1077 warnx("filter: no arguments.");
1082 if (strcmp(argv[0], "list") == 0) {
1084 warnx("trailing arguments after \"list\" ignored.");
1086 return show_filters();
1090 if (argc == 1 && strcmp(argv[0], "mode") == 0)
1091 return get_filter_mode();
1094 if (strcmp(argv[0], "mode") == 0)
1095 return set_filter_mode(argc - 1, argv + 1);
1098 s = str_to_number(argv[0], NULL, &val);
1099 if (*s || val > 0xffffffffU) {
1100 warnx("\"%s\" is neither an index nor a filter subcommand.",
1104 idx = (uint32_t) val;
1106 /* <idx> delete|clear */
1108 (strcmp(argv[1], "delete") == 0 || strcmp(argv[1], "clear") == 0)) {
1109 return del_filter(idx);
1112 /* <idx> [<param> <val>] ... */
1113 return set_filter(idx, argc - 1, argv + 1);
1117 run_cmd(int argc, const char *argv[])
1120 const char *cmd = argv[0];
1126 if (!strcmp(cmd, "reg") || !strcmp(cmd, "reg32"))
1127 rc = register_io(argc, argv, 4);
1128 else if (!strcmp(cmd, "reg64"))
1129 rc = register_io(argc, argv, 8);
1130 else if (!strcmp(cmd, "regdump"))
1131 rc = dump_regs(argc, argv);
1132 else if (!strcmp(cmd, "filter"))
1133 rc = filter_cmd(argc, argv);
1136 warnx("invalid command \"%s\"", cmd);
1147 char buffer[128], *buf;
1148 const char *args[MAX_ARGS + 1];
1151 * Simple loop: displays a "> " prompt and processes any input as a
1152 * cxgbetool command. You're supposed to enter only the part after
1153 * "cxgbetool t4nexX". Use "quit" or "exit" to exit.
1156 fprintf(stdout, "> ");
1158 buf = fgets(buffer, sizeof(buffer), stdin);
1160 if (ferror(stdin)) {
1161 warn("stdin error");
1162 rc = errno; /* errno from fgets */
1168 while ((args[i] = strsep(&buf, " \t\n")) != NULL) {
1169 if (args[i][0] != 0 && ++i == MAX_ARGS)
1175 continue; /* skip empty line */
1177 if (!strcmp(args[0], "quit") || !strcmp(args[0], "exit"))
1180 rc = run_cmd(i, args);
1183 /* rc normally comes from the last command (not including quit/exit) */
1188 main(int argc, const char *argv[])
1195 if (!strcmp(argv[1], "-h") || !strcmp(argv[1], "--help")) {
1208 /* progname and nexus */
1212 if (argc == 1 && !strcmp(argv[0], "stdio"))
1213 rc = run_cmd_loop();
1215 rc = run_cmd(argc, argv);