2 * Copyright (c) 2011-2012 The DragonFly Project. All rights reserved.
4 * This code is derived from software contributed to The DragonFly Project
5 * by Matthew Dillon <dillon@dragonflybsd.org>
6 * by Venkatesh Srinivas <vsrinivas@dragonflybsd.org>
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in
16 * the documentation and/or other materials provided with the
18 * 3. Neither the name of The DragonFly Project nor the names of its
19 * contributors may be used to endorse or promote products derived
20 * from this software without specific, prior written permission.
22 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
23 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
24 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
25 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
26 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
27 * INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING,
28 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
29 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
30 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
31 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
32 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
40 static void shell_recv(hammer2_iocom_t *iocom);
41 static void shell_send(hammer2_iocom_t *iocom);
42 static void shell_tty(hammer2_iocom_t *iocom);
43 static void hammer2_shell_parse(hammer2_iocom_t *iocom, hammer2_msg_t *msg);
45 /************************************************************************
47 ************************************************************************/
50 cmd_shell(const char *hostname)
52 struct sockaddr_in lsin;
53 struct hammer2_iocom iocom;
59 * Acquire socket and set options
61 if ((fd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
62 fprintf(stderr, "cmd_debug: socket(): %s\n",
68 * Connect to the target
70 bzero(&lsin, sizeof(lsin));
71 lsin.sin_family = AF_INET;
72 lsin.sin_addr.s_addr = 0;
73 lsin.sin_port = htons(HAMMER2_LISTEN_PORT);
76 hen = gethostbyname2(hostname, AF_INET);
78 if (inet_pton(AF_INET, hostname, &lsin.sin_addr) != 1) {
80 "Cannot resolve %s\n", hostname);
84 bcopy(hen->h_addr, &lsin.sin_addr, hen->h_length);
87 if (connect(fd, (struct sockaddr *)&lsin, sizeof(lsin)) < 0) {
89 fprintf(stderr, "debug: connect failed: %s\n",
95 * Run the session. The remote end transmits our prompt.
97 hammer2_iocom_init(&iocom, fd, 0);
98 printf("debug: connected\n");
100 msg = hammer2_msg_alloc(&iocom, 0, HAMMER2_DBG_SHELL);
101 hammer2_msg_write(&iocom, msg, NULL, NULL, NULL);
103 hammer2_iocom_core(&iocom, shell_recv, shell_send, shell_tty);
104 fprintf(stderr, "debug: disconnected\n");
110 * Callback from hammer2_iocom_core() when messages might be present
115 shell_recv(hammer2_iocom_t *iocom)
119 while ((iocom->flags & HAMMER2_IOCOMF_EOF) == 0 &&
120 (msg = hammer2_ioq_read(iocom)) != NULL) {
122 switch(msg->any.head.cmd & HAMMER2_MSGF_CMDSWMASK) {
123 case HAMMER2_LNK_ERROR:
124 case HAMMER2_LNK_ERROR | HAMMER2_MSGF_REPLY:
125 if (msg->any.head.error) {
128 msg->any.head.error);
130 write(1, "debug> ", 7);
133 case HAMMER2_DBG_SHELL:
135 * We send the commands, not accept them.
137 hammer2_msg_reply(iocom, msg, HAMMER2_MSG_ERR_UNKNOWN);
139 case HAMMER2_DBG_SHELL | HAMMER2_MSGF_REPLY:
141 * A reply from the remote is data we copy to stdout.
144 msg->aux_data[msg->aux_size - 1] = 0;
145 write(1, msg->aux_data, strlen(msg->aux_data));
149 fprintf(stderr, "Unknown message: %08x\n",
151 assert((msg->any.head.cmd & HAMMER2_MSGF_REPLY) == 0);
152 hammer2_msg_reply(iocom, msg, HAMMER2_MSG_ERR_UNKNOWN);
155 hammer2_state_cleanuprx(iocom, msg);
157 if (iocom->ioq_rx.error) {
158 fprintf(stderr, "node_master_recv: comm error %d\n",
159 iocom->ioq_rx.error);
164 * Callback from hammer2_iocom_core() when messages might be transmittable
169 shell_send(hammer2_iocom_t *iocom)
171 hammer2_iocom_flush1(iocom);
176 shell_tty(hammer2_iocom_t *iocom)
182 if (fgets(buf, sizeof(buf), stdin) != NULL) {
184 if (len && buf[len - 1] == '\n')
187 msg = hammer2_msg_alloc(iocom, len, HAMMER2_DBG_SHELL);
188 bcopy(buf, msg->aux_data, len);
189 hammer2_msg_write(iocom, msg, NULL, NULL, NULL);
192 * Set EOF flag without setting any error code for normal
195 iocom->flags |= HAMMER2_IOCOMF_EOF;
200 * This is called from the master node to process a received debug
201 * shell command. We process the command, outputting the results,
202 * then finish up by outputting another prompt.
205 hammer2_msg_dbg(hammer2_iocom_t *iocom, hammer2_msg_t *msg)
207 switch(msg->any.head.cmd & HAMMER2_MSGF_CMDSWMASK) {
208 case HAMMER2_DBG_SHELL:
210 * This is a command which we must process.
211 * When we are finished we generate a final reply.
214 msg->aux_data[msg->aux_size - 1] = 0;
215 hammer2_shell_parse(iocom, msg);
216 hammer2_msg_reply(iocom, msg, 0);
218 case HAMMER2_DBG_SHELL | HAMMER2_MSGF_REPLY:
220 * A reply just prints out the string. No newline is added
221 * (it is expected to be embedded if desired).
224 msg->aux_data[msg->aux_size - 1] = 0;
226 write(2, msg->aux_data, strlen(msg->aux_data));
229 hammer2_msg_reply(iocom, msg, HAMMER2_MSG_ERR_UNKNOWN);
235 hammer2_shell_parse(hammer2_iocom_t *iocom, hammer2_msg_t *msg)
237 char *cmdbuf = msg->aux_data;
238 char *cmd = strsep(&cmdbuf, " \t");
240 if (cmd == NULL || *cmd == 0) {
242 } else if (strcmp(cmd, "help") == 0 || strcmp(cmd, "?") == 0) {
243 iocom_printf(iocom, 0, "help Command help\n");
245 iocom_printf(iocom, 0, "Unrecognized command: %s\n", cmd);
250 * Returns text debug output to the original defined by (msg). (msg) is
251 * not modified and stays intact. We use a one-way message with REPLY set
252 * to distinguish between a debug command and debug terminal output.
254 * To prevent loops iocom_printf() can filter the message (cmd) related
255 * to the iocom_printf(). We filter out DBG messages.
258 iocom_printf(hammer2_iocom_t *iocom, uint32_t cmd, const char *ctl, ...)
265 if ((cmd & HAMMER2_MSGF_PROTOS) == HAMMER2_MSG_PROTO_DBG)
269 vsnprintf(buf, sizeof(buf), ctl, va);
271 len = strlen(buf) + 1;
273 rmsg = hammer2_msg_alloc(iocom, len, HAMMER2_DBG_SHELL |
275 bcopy(buf, rmsg->aux_data, len);
277 hammer2_msg_write(iocom, rmsg, NULL, NULL, NULL);
280 /************************************************************************
282 ************************************************************************/
284 static void show_bref(int fd, int tab, int bi, hammer2_blockref_t *bref);
285 static void tabprintf(int tab, const char *ctl, ...);
288 cmd_show(const char *devpath)
290 hammer2_blockref_t broot;
293 fd = open(devpath, O_RDONLY);
298 bzero(&broot, sizeof(broot));
299 broot.type = HAMMER2_BREF_TYPE_VOLUME;
300 broot.data_off = 0 | HAMMER2_PBUFRADIX;
301 show_bref(fd, 0, 0, &broot);
308 show_bref(int fd, int tab, int bi, hammer2_blockref_t *bref)
310 hammer2_media_data_t media;
311 hammer2_blockref_t *bscan;
318 const char *type_str;
322 case HAMMER2_BREF_TYPE_EMPTY:
325 case HAMMER2_BREF_TYPE_INODE:
328 case HAMMER2_BREF_TYPE_INDIRECT:
331 case HAMMER2_BREF_TYPE_DATA:
334 case HAMMER2_BREF_TYPE_VOLUME:
338 type_str = "unknown";
343 tabprintf(tab, "%s.%-3d %016jx %016jx/%-2d mir=%016jx mod=%016jx ",
344 type_str, bi, (intmax_t)bref->data_off,
345 (intmax_t)bref->key, (intmax_t)bref->keybits,
346 (intmax_t)bref->mirror_tid, (intmax_t)bref->modify_tid);
349 bytes = (size_t)1 << (bref->data_off & HAMMER2_OFF_MASK_RADIX);
350 if (bytes < HAMMER2_MINIOSIZE || bytes > sizeof(media)) {
351 printf("(bad block size %zd)\n", bytes);
354 if (bref->type != HAMMER2_BREF_TYPE_DATA || VerboseOpt >= 1) {
355 lseek(fd, bref->data_off & ~HAMMER2_OFF_MASK_RADIX, 0);
356 if (read(fd, &media, bytes) != (ssize_t)bytes) {
357 printf("(media read failed)\n");
367 case HAMMER2_BREF_TYPE_EMPTY:
370 case HAMMER2_BREF_TYPE_INODE:
372 if (media.ipdata.op_flags & HAMMER2_OPFLAG_DIRECTDATA) {
375 bscan = &media.ipdata.u.blockset.blockref[0];
376 bcount = HAMMER2_SET_COUNT;
378 namelen = media.ipdata.name_len;
379 if (namelen > HAMMER2_INODE_MAXNAME)
381 tabprintf(tab, "filename \"%*.*s\"\n",
382 namelen, namelen, media.ipdata.filename);
383 tabprintf(tab, "version %d\n", media.ipdata.version);
384 tabprintf(tab, "uflags 0x%08x\n",
385 media.ipdata.uflags);
386 if (media.ipdata.rmajor || media.ipdata.rminor) {
387 tabprintf(tab, "rmajor %d\n",
388 media.ipdata.rmajor);
389 tabprintf(tab, "rminor %d\n",
390 media.ipdata.rminor);
392 tabprintf(tab, "ctime %s\n",
393 hammer2_time64_to_str(media.ipdata.ctime, &str));
394 tabprintf(tab, "mtime %s\n",
395 hammer2_time64_to_str(media.ipdata.mtime, &str));
396 tabprintf(tab, "atime %s\n",
397 hammer2_time64_to_str(media.ipdata.atime, &str));
398 tabprintf(tab, "btime %s\n",
399 hammer2_time64_to_str(media.ipdata.btime, &str));
400 tabprintf(tab, "uid %s\n",
401 hammer2_uuid_to_str(&media.ipdata.uid, &str));
402 tabprintf(tab, "gid %s\n",
403 hammer2_uuid_to_str(&media.ipdata.gid, &str));
404 tabprintf(tab, "type %s\n",
405 hammer2_iptype_to_str(media.ipdata.type));
406 tabprintf(tab, "opflgs 0x%02x\n",
407 media.ipdata.op_flags);
408 tabprintf(tab, "capflgs 0x%04x\n",
409 media.ipdata.cap_flags);
410 tabprintf(tab, "mode %-7o\n",
412 tabprintf(tab, "inum 0x%016jx\n",
414 tabprintf(tab, "size %ju\n",
415 (uintmax_t)media.ipdata.size);
416 tabprintf(tab, "nlinks %ju\n",
417 (uintmax_t)media.ipdata.nlinks);
418 tabprintf(tab, "iparent 0x%016jx\n",
419 (uintmax_t)media.ipdata.iparent);
420 tabprintf(tab, "name_key 0x%016jx\n",
421 (uintmax_t)media.ipdata.name_key);
422 tabprintf(tab, "name_len %u\n",
423 media.ipdata.name_len);
424 tabprintf(tab, "ncopies %u\n",
425 media.ipdata.ncopies);
426 tabprintf(tab, "compalg %u\n",
427 media.ipdata.comp_algo);
428 if (media.ipdata.op_flags & HAMMER2_OPFLAG_PFSROOT) {
429 tabprintf(tab, "pfs_type %u (%s)\n",
430 media.ipdata.pfs_type,
431 hammer2_pfstype_to_str(media.ipdata.pfs_type));
432 tabprintf(tab, "pfs_inum 0x%016jx\n",
433 (uintmax_t)media.ipdata.pfs_inum);
434 tabprintf(tab, "pfs_clid %s\n",
435 hammer2_uuid_to_str(&media.ipdata.pfs_clid,
437 tabprintf(tab, "pfs_fsid %s\n",
438 hammer2_uuid_to_str(&media.ipdata.pfs_fsid,
441 tabprintf(tab, "data_quota %ju\n",
442 (uintmax_t)media.ipdata.data_quota);
443 tabprintf(tab, "data_count %ju\n",
444 (uintmax_t)media.ipdata.data_count);
445 tabprintf(tab, "inode_quota %ju\n",
446 (uintmax_t)media.ipdata.inode_quota);
447 tabprintf(tab, "inode_count %ju\n",
448 (uintmax_t)media.ipdata.inode_count);
449 tabprintf(tab, "attr_tid 0x%016jx\n",
450 (uintmax_t)media.ipdata.attr_tid);
451 if (media.ipdata.type == HAMMER2_OBJTYPE_DIRECTORY) {
452 tabprintf(tab, "dirent_tid %016jx\n",
453 (uintmax_t)media.ipdata.dirent_tid);
456 case HAMMER2_BREF_TYPE_INDIRECT:
457 bscan = &media.npdata.blockref[0];
458 bcount = bytes / sizeof(hammer2_blockref_t);
462 case HAMMER2_BREF_TYPE_DATA:
463 if (VerboseOpt >= 2) {
470 case HAMMER2_BREF_TYPE_VOLUME:
471 bscan = &media.voldata.sroot_blockset.blockref[0];
472 bcount = HAMMER2_SET_COUNT;
480 for (i = 0; i < bcount; ++i) {
481 if (bscan[i].type != HAMMER2_BREF_TYPE_EMPTY) {
486 show_bref(fd, tab, i, &bscan[i]);
491 if (bref->type == HAMMER2_BREF_TYPE_INODE)
492 tabprintf(tab, "} (%s.%d, \"%s\")\n",
493 type_str, bi, media.ipdata.filename);
495 tabprintf(tab, "} (%s.%d)\n", type_str,bi);
501 tabprintf(int tab, const char *ctl, ...)
505 printf("%*.*s", tab, tab, "");