1 /* 2 * Copyright (c) 2011-2012 The DragonFly Project. All rights reserved. 3 * 4 * This code is derived from software contributed to The DragonFly Project 5 * by Matthew Dillon <dillon@dragonflybsd.org> 6 * by Venkatesh Srinivas <vsrinivas@dragonflybsd.org> 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in 16 * the documentation and/or other materials provided with the 17 * distribution. 18 * 3. Neither the name of The DragonFly Project nor the names of its 19 * contributors may be used to endorse or promote products derived 20 * from this software without specific, prior written permission. 21 * 22 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 23 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 24 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 25 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE 26 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 27 * INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING, 28 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 29 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 30 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 31 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT 32 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33 * SUCH DAMAGE. 34 */ 35 36 #include "hammer2.h" 37 38 #define SHOW_TAB 2 39 40 static void shell_msghandler(dmsg_msg_t *msg, int unmanaged); 41 static void shell_ttymsg(dmsg_iocom_t *iocom); 42 43 /************************************************************************ 44 * SHELL * 45 ************************************************************************/ 46 47 int 48 cmd_shell(const char *hostname) 49 { 50 dmsg_master_service_info_t *info; 51 pthread_t thread; 52 int fd; 53 54 fd = dmsg_connect(hostname); 55 if (fd < 0) 56 return 1; 57 58 info = malloc(sizeof(*info)); 59 bzero(info, sizeof(*info)); 60 info->fd = fd; 61 info->detachme = 0; 62 info->usrmsg_callback = shell_msghandler; 63 info->altmsg_callback = shell_ttymsg; 64 info->label = strdup("debug"); 65 pthread_create(&thread, NULL, dmsg_master_service, info); 66 pthread_join(thread, NULL); 67 68 return 0; 69 } 70 71 #if 0 72 int 73 cmd_shell(const char *hostname) 74 { 75 struct dmsg_iocom iocom; 76 dmsg_msg_t *msg; 77 int fd; 78 79 /* 80 * Connect to the target 81 */ 82 fd = dmsg_connect(hostname); 83 if (fd < 0) 84 return 1; 85 86 /* 87 * Initialize the session and transmit an empty DMSG_DBG_SHELL 88 * to cause the remote end to generate a prompt. 89 */ 90 dmsg_iocom_init(&iocom, fd, 0, 91 NULL, 92 shell_rcvmsg, 93 hammer2_shell_parse, 94 shell_ttymsg); 95 fcntl(0, F_SETFL, O_NONBLOCK); 96 printf("debug: connected\n"); 97 98 msg = dmsg_msg_alloc(&iocom.state0, 0, DMSG_DBG_SHELL, NULL, NULL); 99 dmsg_msg_write(msg); 100 dmsg_iocom_core(&iocom); 101 fprintf(stderr, "debug: disconnected\n"); 102 close(fd); 103 return 0; 104 } 105 #endif 106 107 /* 108 * Debug session front-end 109 * 110 * Callback from dmsg_iocom_core() when messages might be present 111 * on the socket. 112 */ 113 static 114 void 115 shell_msghandler(dmsg_msg_t *msg, int unmanaged) 116 { 117 dmsg_msg_t *nmsg; 118 119 switch(msg->tcmd) { 120 #if 0 121 case DMSG_LNK_ERROR: 122 case DMSG_LNK_ERROR | DMSGF_REPLY: 123 /* 124 * One-way non-transactional LNK_ERROR messages typically 125 * indicate a connection failure. Error code 0 is used by 126 * the debug shell to indicate no more results from last cmd. 127 */ 128 if (msg->any.head.error) { 129 fprintf(stderr, "Stream failure: %s\n", 130 dmsg_msg_str(msg)); 131 } else { 132 write(1, "debug> ", 7); 133 } 134 break; 135 case DMSG_LNK_ERROR | DMSGF_DELETE: 136 /* ignore termination of LNK_CONN */ 137 break; 138 #endif 139 case DMSG_DBG_SHELL: 140 /* 141 * We send the commands, not accept them. 142 * (one-way message, not transactional) 143 */ 144 if (unmanaged) 145 dmsg_msg_reply(msg, DMSG_ERR_NOSUPP); 146 break; 147 case DMSG_DBG_SHELL | DMSGF_REPLY: 148 /* 149 * A reply from the remote is data we copy to stdout. 150 * (one-way message, not transactional) 151 */ 152 if (msg->aux_size) { 153 msg->aux_data[msg->aux_size - 1] = 0; 154 write(1, msg->aux_data, strlen(msg->aux_data)); 155 } 156 break; 157 #if 1 158 case DMSG_LNK_CONN | DMSGF_CREATE: 159 fprintf(stderr, "Debug Shell received LNK_CONN\n"); 160 nmsg = dmsg_msg_alloc(&msg->state->iocom->state0, 0, 161 DMSG_DBG_SHELL, 162 NULL, NULL); 163 dmsg_msg_write(nmsg); 164 dmsg_msg_reply(msg, DMSG_ERR_NOSUPP); 165 break; 166 case DMSG_LNK_CONN | DMSGF_DELETE: 167 break; 168 #endif 169 default: 170 /* 171 * Ignore any unknown messages, Terminate any unknown 172 * transactions with an error. 173 */ 174 fprintf(stderr, "Unknown message: %s\n", dmsg_msg_str(msg)); 175 if (unmanaged) { 176 if (msg->any.head.cmd & DMSGF_CREATE) 177 dmsg_msg_reply(msg, DMSG_ERR_NOSUPP); 178 if (msg->any.head.cmd & DMSGF_DELETE) 179 dmsg_msg_reply(msg, DMSG_ERR_NOSUPP); 180 } 181 break; 182 } 183 } 184 185 /* 186 * Debug session front-end 187 */ 188 static 189 void 190 shell_ttymsg(dmsg_iocom_t *iocom) 191 { 192 dmsg_state_t *pstate; 193 dmsg_msg_t *msg; 194 char buf[256]; 195 char *cmd; 196 size_t len; 197 198 if (fgets(buf, sizeof(buf), stdin) != NULL) { 199 if (buf[0] == '@') { 200 pstate = dmsg_findspan(strtok(buf + 1, " \t\n")); 201 cmd = strtok(NULL, "\n"); 202 } else { 203 pstate = &iocom->state0; 204 cmd = strtok(buf, "\n"); 205 } 206 if (cmd && pstate) { 207 len = strlen(cmd) + 1; 208 msg = dmsg_msg_alloc(pstate, len, DMSG_DBG_SHELL, 209 NULL, NULL); 210 bcopy(cmd, msg->aux_data, len); 211 dmsg_msg_write(msg); 212 } else if (cmd) { 213 fprintf(stderr, "@msgid not found\n"); 214 } else { 215 /* 216 * This should cause the remote end to generate 217 * a debug> prompt (and thus shows that there is 218 * connectivity). 219 */ 220 msg = dmsg_msg_alloc(pstate, 0, DMSG_DBG_SHELL, 221 NULL, NULL); 222 dmsg_msg_write(msg); 223 } 224 } else if (feof(stdin)) { 225 /* 226 * Set EOF flag without setting any error code for normal 227 * EOF. 228 */ 229 iocom->flags |= DMSG_IOCOMF_EOF; 230 } else { 231 clearerr(stdin); 232 } 233 } 234 235 /* 236 * Debug session back-end (on remote side) 237 */ 238 static void shell_span(dmsg_msg_t *msg, char *cmdbuf); 239 static void shell_ping(dmsg_msg_t *msg, char *cmdbuf); 240 241 void 242 hammer2_shell_parse(dmsg_msg_t *msg, int unmanaged) 243 { 244 dmsg_iocom_t *iocom = msg->state->iocom; 245 char *cmdbuf; 246 char *cmdp; 247 uint32_t cmd; 248 249 /* 250 * Filter on debug shell commands and ping responses only 251 */ 252 cmd = msg->any.head.cmd; 253 if ((cmd & DMSGF_CMDSWMASK) == (DMSG_LNK_PING | DMSGF_REPLY)) { 254 dmsg_printf(iocom, "ping reply\n"); 255 return; 256 } 257 258 if ((cmd & DMSGF_PROTOS) != DMSG_PROTO_DBG) { 259 if (unmanaged) 260 dmsg_msg_reply(msg, DMSG_ERR_NOSUPP); 261 return; 262 } 263 if ((cmd & DMSGF_CMDSWMASK) != DMSG_DBG_SHELL) { 264 if (unmanaged) 265 dmsg_msg_reply(msg, DMSG_ERR_NOSUPP); 266 return; 267 } 268 269 /* 270 * Debug shell command 271 */ 272 cmdbuf = msg->aux_data; 273 cmdp = strsep(&cmdbuf, " \t"); 274 275 if (cmdp == NULL || *cmdp == 0) { 276 ; 277 } else if (strcmp(cmdp, "ping") == 0) { 278 shell_ping(msg, cmdbuf); 279 } else if (strcmp(cmdp, "span") == 0) { 280 shell_span(msg, cmdbuf); 281 } else if (strcmp(cmdp, "tree") == 0) { 282 dmsg_shell_tree(iocom, cmdbuf); /* dump spanning tree */ 283 } else if (strcmp(cmdp, "help") == 0 || strcmp(cmdp, "?") == 0) { 284 dmsg_printf(iocom, "help Command help\n"); 285 dmsg_printf(iocom, "span <host> Span to target host\n"); 286 dmsg_printf(iocom, "tree Dump spanning tree\n"); 287 dmsg_printf(iocom, "@span <cmd> Issue via circuit\n"); 288 } else { 289 dmsg_printf(iocom, "Unrecognized command: %s\n", cmdp); 290 } 291 dmsg_printf(iocom, "debug> "); 292 } 293 294 static void 295 shell_ping(dmsg_msg_t *msg, char *cmdbuf __unused) 296 { 297 dmsg_iocom_t *iocom = msg->state->iocom; 298 dmsg_msg_t *m2; 299 300 dmsg_printf(iocom, "sending ping\n"); 301 m2 = dmsg_msg_alloc(msg->state, 0, DMSG_LNK_PING, NULL, NULL); 302 dmsg_msg_write(m2); 303 } 304 305 static void 306 shell_span(dmsg_msg_t *msg, char *cmdbuf) 307 { 308 dmsg_iocom_t *iocom = msg->state->iocom; 309 dmsg_master_service_info_t *info; 310 const char *hostname = strsep(&cmdbuf, " \t"); 311 pthread_t thread; 312 int fd; 313 314 /* 315 * Connect to the target 316 */ 317 if (hostname == NULL) { 318 fd = -1; 319 } else { 320 fd = dmsg_connect(hostname); 321 } 322 323 /* 324 * Start master service 325 */ 326 if (fd < 0) { 327 dmsg_printf(iocom, "Connection to %s failed\n", hostname); 328 } else { 329 dmsg_printf(iocom, "Connected to %s\n", hostname); 330 331 info = malloc(sizeof(*info)); 332 bzero(info, sizeof(*info)); 333 info->fd = fd; 334 info->detachme = 1; 335 info->usrmsg_callback = hammer2_shell_parse; 336 info->label = strdup("client"); 337 338 pthread_create(&thread, NULL, dmsg_master_service, info); 339 /*pthread_join(thread, &res);*/ 340 } 341 } 342 343 /************************************************************************ 344 * DEBUGSPAN * 345 ************************************************************************ 346 * 347 * Connect to the target manually (not via the cluster list embedded in 348 * a hammer2 filesystem) and initiate the SPAN protocol. 349 */ 350 int 351 cmd_debugspan(const char *hostname) 352 { 353 pthread_t thread; 354 int fd; 355 void *res; 356 357 /* 358 * Connect to the target 359 */ 360 fd = dmsg_connect(hostname); 361 if (fd < 0) 362 return 1; 363 364 printf("debugspan: connected to %s, starting CONN/SPAN\n", hostname); 365 pthread_create(&thread, NULL, 366 dmsg_master_service, (void *)(intptr_t)fd); 367 pthread_join(thread, &res); 368 return(0); 369 } 370 371 /************************************************************************ 372 * SHOW * 373 ************************************************************************/ 374 375 static void show_bref(int fd, int tab, int bi, hammer2_blockref_t *bref, 376 int dofreemap); 377 static void tabprintf(int tab, const char *ctl, ...); 378 379 int 380 cmd_show(const char *devpath, int dofreemap) 381 { 382 hammer2_blockref_t broot; 383 hammer2_blockref_t best; 384 hammer2_media_data_t media; 385 int fd; 386 int i; 387 int best_i; 388 389 fd = open(devpath, O_RDONLY); 390 if (fd < 0) { 391 perror("open"); 392 return 1; 393 } 394 395 /* 396 * Show the tree using the best volume header. 397 * -vvv will show the tree for all four volume headers. 398 */ 399 best_i = -1; 400 bzero(&best, sizeof(best)); 401 for (i = 0; i < 4; ++i) { 402 bzero(&broot, sizeof(broot)); 403 broot.type = HAMMER2_BREF_TYPE_VOLUME; 404 broot.data_off = (i * HAMMER2_ZONE_BYTES64) | 405 HAMMER2_PBUFRADIX; 406 lseek(fd, broot.data_off & ~HAMMER2_OFF_MASK_RADIX, 0); 407 if (read(fd, &media, HAMMER2_PBUFSIZE) == 408 (ssize_t)HAMMER2_PBUFSIZE) { 409 broot.mirror_tid = media.voldata.mirror_tid; 410 if (best_i < 0 || best.mirror_tid < broot.mirror_tid) { 411 best_i = i; 412 best = broot; 413 } 414 if (VerboseOpt >= 3) 415 show_bref(fd, 0, i, &broot, dofreemap); 416 } 417 } 418 if (VerboseOpt < 3) 419 show_bref(fd, 0, best_i, &best, dofreemap); 420 close(fd); 421 422 return 0; 423 } 424 425 extern uint32_t iscsi_crc32(const void *buf, size_t size); 426 static void 427 show_bref(int fd, int tab, int bi, hammer2_blockref_t *bref, int dofreemap) 428 { 429 hammer2_media_data_t media; 430 hammer2_blockref_t *bscan; 431 int bcount; 432 int i; 433 int didnl; 434 int namelen; 435 int obrace = 1; 436 size_t bytes; 437 const char *type_str; 438 char *str = NULL; 439 uint32_t cv; 440 uint64_t cv64; 441 442 switch(bref->type) { 443 case HAMMER2_BREF_TYPE_EMPTY: 444 type_str = "empty"; 445 break; 446 case HAMMER2_BREF_TYPE_INODE: 447 type_str = "inode"; 448 break; 449 case HAMMER2_BREF_TYPE_INDIRECT: 450 type_str = "indblk"; 451 break; 452 case HAMMER2_BREF_TYPE_DATA: 453 type_str = "data"; 454 break; 455 case HAMMER2_BREF_TYPE_VOLUME: 456 type_str = "volume"; 457 break; 458 case HAMMER2_BREF_TYPE_FREEMAP: 459 type_str = "freemap"; 460 break; 461 case HAMMER2_BREF_TYPE_FREEMAP_NODE: 462 type_str = "fmapnode"; 463 break; 464 case HAMMER2_BREF_TYPE_FREEMAP_LEAF: 465 type_str = "fbitmap"; 466 break; 467 default: 468 type_str = "unknown"; 469 break; 470 } 471 472 tabprintf(tab, "%s.%-3d %016jx %016jx/%-2d mir=%016jx mod=%016jx ", 473 type_str, bi, (intmax_t)bref->data_off, 474 (intmax_t)bref->key, (intmax_t)bref->keybits, 475 (intmax_t)bref->mirror_tid, (intmax_t)bref->modify_tid); 476 tab += SHOW_TAB; 477 if (bref->flags) 478 printf("flags=%02x ", bref->flags); 479 480 bytes = (size_t)1 << (bref->data_off & HAMMER2_OFF_MASK_RADIX); 481 482 { 483 hammer2_off_t io_off; 484 hammer2_off_t io_base; 485 size_t io_bytes; 486 size_t boff; 487 488 io_off = bref->data_off & ~HAMMER2_OFF_MASK_RADIX; 489 io_base = io_off & ~(hammer2_off_t)(HAMMER2_MINIOSIZE - 1); 490 io_bytes = bytes; 491 boff = io_off - io_base; 492 493 io_bytes = HAMMER2_MINIOSIZE; 494 while (io_bytes + boff < bytes) 495 io_bytes <<= 1; 496 497 if (io_bytes > sizeof(media)) { 498 printf("(bad block size %zd)\n", bytes); 499 return; 500 } 501 if (bref->type != HAMMER2_BREF_TYPE_DATA || VerboseOpt >= 1) { 502 lseek(fd, io_base, 0); 503 if (read(fd, &media, io_bytes) != (ssize_t)io_bytes) { 504 printf("(media read failed)\n"); 505 return; 506 } 507 if (boff) 508 bcopy((char *)&media + boff, &media, bytes); 509 } 510 } 511 512 bscan = NULL; 513 bcount = 0; 514 didnl = 1; 515 namelen = 0; 516 517 /* 518 * Check data integrity in verbose mode, otherwise we are just doing 519 * a quick meta-data scan. Meta-data integrity is always checked. 520 * (Also see the check above that ensures the media data is loaded, 521 * otherwise there's no data to check!). 522 */ 523 if (bref->type != HAMMER2_BREF_TYPE_DATA || VerboseOpt >= 1) { 524 switch(HAMMER2_DEC_CHECK(bref->methods)) { 525 case HAMMER2_CHECK_NONE: 526 printf("(meth %02x) ", bref->methods); 527 break; 528 case HAMMER2_CHECK_DISABLED: 529 printf("(meth %02x) ", bref->methods); 530 break; 531 case HAMMER2_CHECK_ISCSI32: 532 cv = hammer2_icrc32(&media, bytes); 533 if (bref->check.iscsi32.value != cv) { 534 printf("(icrc %02x:%08x/%08x failed) ", 535 bref->methods, 536 bref->check.iscsi32.value, 537 cv); 538 } else { 539 printf("(meth %02x, iscsi32=%08x) ", 540 bref->methods, cv); 541 } 542 break; 543 case HAMMER2_CHECK_XXHASH64: 544 cv64 = XXH64(&media, bytes, XXH_HAMMER2_SEED); 545 if (bref->check.xxhash64.value != cv64) { 546 printf("(xxhash64 %02x:%016jx/%016jx failed) ", 547 bref->methods, 548 bref->check.xxhash64.value, 549 cv64); 550 } else { 551 printf("(meth %02x, xxh=%016jx) ", 552 bref->methods, cv64); 553 } 554 break; 555 case HAMMER2_CHECK_SHA192: 556 printf("(meth %02x) ", bref->methods); 557 break; 558 case HAMMER2_CHECK_FREEMAP: 559 cv = hammer2_icrc32(&media, bytes); 560 if (bref->check.freemap.icrc32 != cv) { 561 printf("(fcrc %02x:%08x/%08x failed) ", 562 bref->methods, 563 bref->check.freemap.icrc32, 564 cv); 565 } else { 566 printf("(meth %02x, fcrc=%08x) ", 567 bref->methods, cv); 568 } 569 break; 570 } 571 } 572 573 switch(bref->type) { 574 case HAMMER2_BREF_TYPE_EMPTY: 575 obrace = 0; 576 break; 577 case HAMMER2_BREF_TYPE_INODE: 578 printf("{\n"); 579 if (media.ipdata.meta.op_flags & HAMMER2_OPFLAG_DIRECTDATA) { 580 /* no blockrefs */ 581 } else { 582 bscan = &media.ipdata.u.blockset.blockref[0]; 583 bcount = HAMMER2_SET_COUNT; 584 } 585 namelen = media.ipdata.meta.name_len; 586 if (namelen > HAMMER2_INODE_MAXNAME) 587 namelen = 0; 588 tabprintf(tab, "filename \"%*.*s\"\n", 589 namelen, namelen, media.ipdata.filename); 590 tabprintf(tab, "version %d\n", media.ipdata.meta.version); 591 tabprintf(tab, "uflags 0x%08x\n", 592 media.ipdata.meta.uflags); 593 if (media.ipdata.meta.rmajor || media.ipdata.meta.rminor) { 594 tabprintf(tab, "rmajor %d\n", 595 media.ipdata.meta.rmajor); 596 tabprintf(tab, "rminor %d\n", 597 media.ipdata.meta.rminor); 598 } 599 tabprintf(tab, "ctime %s\n", 600 hammer2_time64_to_str(media.ipdata.meta.ctime, &str)); 601 tabprintf(tab, "mtime %s\n", 602 hammer2_time64_to_str(media.ipdata.meta.mtime, &str)); 603 tabprintf(tab, "atime %s\n", 604 hammer2_time64_to_str(media.ipdata.meta.atime, &str)); 605 tabprintf(tab, "btime %s\n", 606 hammer2_time64_to_str(media.ipdata.meta.btime, &str)); 607 tabprintf(tab, "uid %s\n", 608 hammer2_uuid_to_str(&media.ipdata.meta.uid, &str)); 609 tabprintf(tab, "gid %s\n", 610 hammer2_uuid_to_str(&media.ipdata.meta.gid, &str)); 611 if (media.ipdata.meta.type == HAMMER2_OBJTYPE_HARDLINK) 612 tabprintf(tab, "type %s (%s)\n", 613 hammer2_iptype_to_str(media.ipdata.meta.type), 614 hammer2_iptype_to_str(media.ipdata.meta.target_type)); 615 else 616 tabprintf(tab, "type %s\n", 617 hammer2_iptype_to_str(media.ipdata.meta.type)); 618 tabprintf(tab, "opflgs 0x%02x\n", 619 media.ipdata.meta.op_flags); 620 tabprintf(tab, "capflgs 0x%04x\n", 621 media.ipdata.meta.cap_flags); 622 tabprintf(tab, "mode %-7o\n", 623 media.ipdata.meta.mode); 624 tabprintf(tab, "inum 0x%016jx\n", 625 media.ipdata.meta.inum); 626 tabprintf(tab, "size %ju\n", 627 (uintmax_t)media.ipdata.meta.size); 628 tabprintf(tab, "nlinks %ju\n", 629 (uintmax_t)media.ipdata.meta.nlinks); 630 tabprintf(tab, "iparent 0x%016jx\n", 631 (uintmax_t)media.ipdata.meta.iparent); 632 tabprintf(tab, "name_key 0x%016jx\n", 633 (uintmax_t)media.ipdata.meta.name_key); 634 tabprintf(tab, "name_len %u\n", 635 media.ipdata.meta.name_len); 636 tabprintf(tab, "ncopies %u\n", 637 media.ipdata.meta.ncopies); 638 tabprintf(tab, "compalg %u\n", 639 media.ipdata.meta.comp_algo); 640 tabprintf(tab, "checkalg %u\n", 641 media.ipdata.meta.check_algo); 642 if ((media.ipdata.meta.op_flags & HAMMER2_OPFLAG_PFSROOT) || 643 media.ipdata.meta.pfs_type == HAMMER2_PFSTYPE_SUPROOT) { 644 tabprintf(tab, "pfs_type %u (%s)\n", 645 media.ipdata.meta.pfs_type, 646 hammer2_pfstype_to_str(media.ipdata.meta.pfs_type)); 647 tabprintf(tab, "pfs_inum 0x%016jx\n", 648 (uintmax_t)media.ipdata.meta.pfs_inum); 649 tabprintf(tab, "pfs_clid %s\n", 650 hammer2_uuid_to_str(&media.ipdata.meta.pfs_clid, 651 &str)); 652 tabprintf(tab, "pfs_fsid %s\n", 653 hammer2_uuid_to_str(&media.ipdata.meta.pfs_fsid, 654 &str)); 655 tabprintf(tab, "pfs_lsnap_tid 0x%016jx\n", 656 (uintmax_t)media.ipdata.meta.pfs_lsnap_tid); 657 } 658 tabprintf(tab, "data_quota %ju\n", 659 (uintmax_t)media.ipdata.meta.data_quota); 660 tabprintf(tab, "data_count %ju\n", 661 (uintmax_t)bref->data_count); 662 tabprintf(tab, "inode_quota %ju\n", 663 (uintmax_t)media.ipdata.meta.inode_quota); 664 tabprintf(tab, "inode_count %ju\n", 665 (uintmax_t)bref->inode_count); 666 break; 667 case HAMMER2_BREF_TYPE_INDIRECT: 668 bscan = &media.npdata[0]; 669 bcount = bytes / sizeof(hammer2_blockref_t); 670 didnl = 1; 671 printf("{\n"); 672 break; 673 case HAMMER2_BREF_TYPE_DATA: 674 #if 0 675 if (VerboseOpt >= 2) { 676 printf("{\n"); 677 } else 678 #endif 679 { 680 printf("\n"); 681 obrace = 0; 682 } 683 break; 684 case HAMMER2_BREF_TYPE_VOLUME: 685 printf("mirror_tid=%016jx freemap_tid=%016jx ", 686 media.voldata.mirror_tid, 687 media.voldata.freemap_tid); 688 if (dofreemap) { 689 bscan = &media.voldata.freemap_blockset.blockref[0]; 690 bcount = HAMMER2_SET_COUNT; 691 } else { 692 bscan = &media.voldata.sroot_blockset.blockref[0]; 693 bcount = HAMMER2_SET_COUNT; 694 } 695 printf("{\n"); 696 break; 697 case HAMMER2_BREF_TYPE_FREEMAP_LEAF: 698 printf("{\n"); 699 for (i = 0; i < HAMMER2_FREEMAP_COUNT; ++i) { 700 /* 701 if (media.bmdata[i].class == 0 && 702 media.bmdata[i].avail == 0) { 703 continue; 704 } 705 */ 706 #if HAMMER2_BMAP_ELEMENTS != 8 707 #error "cmd_debug.c: HAMMER2_BMAP_ELEMENTS expected to be 8" 708 #endif 709 710 tabprintf(tab + 4, "%016jx %04d.%04x (avail=%7d) " 711 "%016jx %016jx %016jx %016jx " 712 "%016jx %016jx %016jx %016jx\n", 713 bref->key + 714 i * 256 * HAMMER2_FREEMAP_BLOCK_SIZE, 715 i, media.bmdata[i].class, 716 media.bmdata[i].avail, 717 media.bmdata[i].bitmapq[0], 718 media.bmdata[i].bitmapq[1], 719 media.bmdata[i].bitmapq[2], 720 media.bmdata[i].bitmapq[3], 721 media.bmdata[i].bitmapq[4], 722 media.bmdata[i].bitmapq[5], 723 media.bmdata[i].bitmapq[6], 724 media.bmdata[i].bitmapq[7]); 725 } 726 tabprintf(tab, "}\n"); 727 break; 728 case HAMMER2_BREF_TYPE_FREEMAP_NODE: 729 printf("{\n"); 730 bscan = &media.npdata[0]; 731 bcount = bytes / sizeof(hammer2_blockref_t); 732 break; 733 default: 734 printf("\n"); 735 obrace = 0; 736 break; 737 } 738 if (str) 739 free(str); 740 for (i = 0; i < bcount; ++i) { 741 if (bscan[i].type != HAMMER2_BREF_TYPE_EMPTY) { 742 if (didnl == 0) { 743 printf("\n"); 744 didnl = 1; 745 } 746 show_bref(fd, tab, i, &bscan[i], dofreemap); 747 } 748 } 749 tab -= SHOW_TAB; 750 if (obrace) { 751 if (bref->type == HAMMER2_BREF_TYPE_INODE) 752 tabprintf(tab, "} (%s.%d, \"%*.*s\")\n", 753 type_str, bi, 754 namelen, namelen, media.ipdata.filename); 755 else 756 tabprintf(tab, "} (%s.%d)\n", type_str,bi); 757 } 758 } 759 760 int 761 cmd_hash(int ac, const char **av) 762 { 763 int i; 764 765 for (i = 0; i < ac; ++i) { 766 printf("%016jx %s\n", dirhash(av[i], strlen(av[i])), av[i]); 767 } 768 return(0); 769 } 770 771 int 772 cmd_chaindump(const char *path) 773 { 774 int dummy = 0; 775 int fd; 776 777 fd = open(path, O_RDONLY); 778 if (fd >= 0) { 779 ioctl(fd, HAMMER2IOC_DEBUG_DUMP, &dummy); 780 close(fd); 781 } else { 782 fprintf(stderr, "unable to open %s\n", path); 783 } 784 return 0; 785 } 786 787 788 static 789 void 790 tabprintf(int tab, const char *ctl, ...) 791 { 792 va_list va; 793 794 printf("%*.*s", tab, tab, ""); 795 va_start(va, ctl); 796 vprintf(ctl, va); 797 va_end(va); 798 } 799