1 /* 2 * Copyright (c) 2011-2012 The DragonFly Project. All rights reserved. 3 * 4 * This code is derived from software contributed to The DragonFly Project 5 * by Matthew Dillon <dillon@dragonflybsd.org> 6 * by Venkatesh Srinivas <vsrinivas@dragonflybsd.org> 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in 16 * the documentation and/or other materials provided with the 17 * distribution. 18 * 3. Neither the name of The DragonFly Project nor the names of its 19 * contributors may be used to endorse or promote products derived 20 * from this software without specific, prior written permission. 21 * 22 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 23 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 24 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 25 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE 26 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 27 * INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING, 28 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 29 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 30 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 31 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT 32 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33 * SUCH DAMAGE. 34 */ 35 36 #include "hammer2.h" 37 38 #define SHOW_TAB 2 39 40 static void shell_msghandler(dmsg_msg_t *msg, int unmanaged); 41 static void shell_ttymsg(dmsg_iocom_t *iocom); 42 43 /************************************************************************ 44 * SHELL * 45 ************************************************************************/ 46 47 int 48 cmd_shell(const char *hostname) 49 { 50 dmsg_master_service_info_t *info; 51 pthread_t thread; 52 int fd; 53 54 fd = dmsg_connect(hostname); 55 if (fd < 0) 56 return 1; 57 58 info = malloc(sizeof(*info)); 59 bzero(info, sizeof(*info)); 60 info->fd = fd; 61 info->detachme = 0; 62 info->usrmsg_callback = shell_msghandler; 63 info->altmsg_callback = shell_ttymsg; 64 info->label = strdup("debug"); 65 pthread_create(&thread, NULL, dmsg_master_service, info); 66 pthread_join(thread, NULL); 67 68 return 0; 69 } 70 71 #if 0 72 int 73 cmd_shell(const char *hostname) 74 { 75 struct dmsg_iocom iocom; 76 dmsg_msg_t *msg; 77 int fd; 78 79 /* 80 * Connect to the target 81 */ 82 fd = dmsg_connect(hostname); 83 if (fd < 0) 84 return 1; 85 86 /* 87 * Initialize the session and transmit an empty DMSG_DBG_SHELL 88 * to cause the remote end to generate a prompt. 89 */ 90 dmsg_iocom_init(&iocom, fd, 0, 91 NULL, 92 shell_rcvmsg, 93 hammer2_shell_parse, 94 shell_ttymsg); 95 fcntl(0, F_SETFL, O_NONBLOCK); 96 printf("debug: connected\n"); 97 98 msg = dmsg_msg_alloc(&iocom.state0, 0, DMSG_DBG_SHELL, NULL, NULL); 99 dmsg_msg_write(msg); 100 dmsg_iocom_core(&iocom); 101 fprintf(stderr, "debug: disconnected\n"); 102 close(fd); 103 return 0; 104 } 105 #endif 106 107 /* 108 * Debug session front-end 109 * 110 * Callback from dmsg_iocom_core() when messages might be present 111 * on the socket. 112 */ 113 static 114 void 115 shell_msghandler(dmsg_msg_t *msg, int unmanaged) 116 { 117 dmsg_msg_t *nmsg; 118 119 switch(msg->tcmd) { 120 #if 0 121 case DMSG_LNK_ERROR: 122 case DMSG_LNK_ERROR | DMSGF_REPLY: 123 /* 124 * One-way non-transactional LNK_ERROR messages typically 125 * indicate a connection failure. Error code 0 is used by 126 * the debug shell to indicate no more results from last cmd. 127 */ 128 if (msg->any.head.error) { 129 fprintf(stderr, "Stream failure: %s\n", 130 dmsg_msg_str(msg)); 131 } else { 132 write(1, "debug> ", 7); 133 } 134 break; 135 case DMSG_LNK_ERROR | DMSGF_DELETE: 136 /* ignore termination of LNK_CONN */ 137 break; 138 #endif 139 case DMSG_DBG_SHELL: 140 /* 141 * We send the commands, not accept them. 142 * (one-way message, not transactional) 143 */ 144 if (unmanaged) 145 dmsg_msg_reply(msg, DMSG_ERR_NOSUPP); 146 break; 147 case DMSG_DBG_SHELL | DMSGF_REPLY: 148 /* 149 * A reply from the remote is data we copy to stdout. 150 * (one-way message, not transactional) 151 */ 152 if (msg->aux_size) { 153 msg->aux_data[msg->aux_size - 1] = 0; 154 write(1, msg->aux_data, strlen(msg->aux_data)); 155 } 156 break; 157 #if 1 158 case DMSG_LNK_CONN | DMSGF_CREATE: 159 fprintf(stderr, "Debug Shell received LNK_CONN\n"); 160 nmsg = dmsg_msg_alloc(&msg->state->iocom->state0, 0, 161 DMSG_DBG_SHELL, 162 NULL, NULL); 163 dmsg_msg_write(nmsg); 164 dmsg_msg_reply(msg, DMSG_ERR_NOSUPP); 165 break; 166 case DMSG_LNK_CONN | DMSGF_DELETE: 167 break; 168 #endif 169 default: 170 /* 171 * Ignore any unknown messages, Terminate any unknown 172 * transactions with an error. 173 */ 174 fprintf(stderr, "Unknown message: %s\n", dmsg_msg_str(msg)); 175 if (unmanaged) { 176 if (msg->any.head.cmd & DMSGF_CREATE) 177 dmsg_msg_reply(msg, DMSG_ERR_NOSUPP); 178 if (msg->any.head.cmd & DMSGF_DELETE) 179 dmsg_msg_reply(msg, DMSG_ERR_NOSUPP); 180 } 181 break; 182 } 183 } 184 185 /* 186 * Debug session front-end 187 */ 188 static 189 void 190 shell_ttymsg(dmsg_iocom_t *iocom) 191 { 192 dmsg_state_t *pstate; 193 dmsg_msg_t *msg; 194 char buf[256]; 195 char *cmd; 196 size_t len; 197 198 if (fgets(buf, sizeof(buf), stdin) != NULL) { 199 if (buf[0] == '@') { 200 pstate = dmsg_findspan(strtok(buf + 1, " \t\n")); 201 cmd = strtok(NULL, "\n"); 202 } else { 203 pstate = &iocom->state0; 204 cmd = strtok(buf, "\n"); 205 } 206 if (cmd && pstate) { 207 len = strlen(cmd) + 1; 208 msg = dmsg_msg_alloc(pstate, len, DMSG_DBG_SHELL, 209 NULL, NULL); 210 bcopy(cmd, msg->aux_data, len); 211 dmsg_msg_write(msg); 212 } else if (cmd) { 213 fprintf(stderr, "@msgid not found\n"); 214 } else { 215 /* 216 * This should cause the remote end to generate 217 * a debug> prompt (and thus shows that there is 218 * connectivity). 219 */ 220 msg = dmsg_msg_alloc(pstate, 0, DMSG_DBG_SHELL, 221 NULL, NULL); 222 dmsg_msg_write(msg); 223 } 224 } else if (feof(stdin)) { 225 /* 226 * Set EOF flag without setting any error code for normal 227 * EOF. 228 */ 229 iocom->flags |= DMSG_IOCOMF_EOF; 230 } else { 231 clearerr(stdin); 232 } 233 } 234 235 /* 236 * Debug session back-end (on remote side) 237 */ 238 static void shell_span(dmsg_msg_t *msg, char *cmdbuf); 239 static void shell_ping(dmsg_msg_t *msg, char *cmdbuf); 240 241 void 242 hammer2_shell_parse(dmsg_msg_t *msg, int unmanaged) 243 { 244 dmsg_iocom_t *iocom = msg->state->iocom; 245 char *cmdbuf; 246 char *cmdp; 247 uint32_t cmd; 248 249 /* 250 * Filter on debug shell commands and ping responses only 251 */ 252 cmd = msg->any.head.cmd; 253 if ((cmd & DMSGF_CMDSWMASK) == (DMSG_LNK_PING | DMSGF_REPLY)) { 254 dmsg_printf(iocom, "ping reply\n"); 255 return; 256 } 257 258 if ((cmd & DMSGF_PROTOS) != DMSG_PROTO_DBG) { 259 if (unmanaged) 260 dmsg_msg_reply(msg, DMSG_ERR_NOSUPP); 261 return; 262 } 263 if ((cmd & DMSGF_CMDSWMASK) != DMSG_DBG_SHELL) { 264 if (unmanaged) 265 dmsg_msg_reply(msg, DMSG_ERR_NOSUPP); 266 return; 267 } 268 269 /* 270 * Debug shell command 271 */ 272 cmdbuf = msg->aux_data; 273 cmdp = strsep(&cmdbuf, " \t"); 274 275 if (cmdp == NULL || *cmdp == 0) { 276 ; 277 } else if (strcmp(cmdp, "ping") == 0) { 278 shell_ping(msg, cmdbuf); 279 } else if (strcmp(cmdp, "span") == 0) { 280 shell_span(msg, cmdbuf); 281 } else if (strcmp(cmdp, "tree") == 0) { 282 dmsg_shell_tree(iocom, cmdbuf); /* dump spanning tree */ 283 } else if (strcmp(cmdp, "help") == 0 || strcmp(cmdp, "?") == 0) { 284 dmsg_printf(iocom, "help Command help\n"); 285 dmsg_printf(iocom, "span <host> Span to target host\n"); 286 dmsg_printf(iocom, "tree Dump spanning tree\n"); 287 dmsg_printf(iocom, "@span <cmd> Issue via circuit\n"); 288 } else { 289 dmsg_printf(iocom, "Unrecognized command: %s\n", cmdp); 290 } 291 dmsg_printf(iocom, "debug> "); 292 } 293 294 static void 295 shell_ping(dmsg_msg_t *msg, char *cmdbuf __unused) 296 { 297 dmsg_iocom_t *iocom = msg->state->iocom; 298 dmsg_msg_t *m2; 299 300 dmsg_printf(iocom, "sending ping\n"); 301 m2 = dmsg_msg_alloc(msg->state, 0, DMSG_LNK_PING, NULL, NULL); 302 dmsg_msg_write(m2); 303 } 304 305 static void 306 shell_span(dmsg_msg_t *msg, char *cmdbuf) 307 { 308 dmsg_iocom_t *iocom = msg->state->iocom; 309 dmsg_master_service_info_t *info; 310 const char *hostname = strsep(&cmdbuf, " \t"); 311 pthread_t thread; 312 int fd; 313 314 /* 315 * Connect to the target 316 */ 317 if (hostname == NULL) { 318 fd = -1; 319 } else { 320 fd = dmsg_connect(hostname); 321 } 322 323 /* 324 * Start master service 325 */ 326 if (fd < 0) { 327 dmsg_printf(iocom, "Connection to %s failed\n", hostname); 328 } else { 329 dmsg_printf(iocom, "Connected to %s\n", hostname); 330 331 info = malloc(sizeof(*info)); 332 bzero(info, sizeof(*info)); 333 info->fd = fd; 334 info->detachme = 1; 335 info->usrmsg_callback = hammer2_shell_parse; 336 info->label = strdup("client"); 337 338 pthread_create(&thread, NULL, dmsg_master_service, info); 339 /*pthread_join(thread, &res);*/ 340 } 341 } 342 343 /************************************************************************ 344 * DEBUGSPAN * 345 ************************************************************************ 346 * 347 * Connect to the target manually (not via the cluster list embedded in 348 * a hammer2 filesystem) and initiate the SPAN protocol. 349 */ 350 int 351 cmd_debugspan(const char *hostname) 352 { 353 pthread_t thread; 354 int fd; 355 void *res; 356 357 /* 358 * Connect to the target 359 */ 360 fd = dmsg_connect(hostname); 361 if (fd < 0) 362 return 1; 363 364 printf("debugspan: connected to %s, starting CONN/SPAN\n", hostname); 365 pthread_create(&thread, NULL, 366 dmsg_master_service, (void *)(intptr_t)fd); 367 pthread_join(thread, &res); 368 return(0); 369 } 370 371 /************************************************************************ 372 * SHOW * 373 ************************************************************************/ 374 375 static void show_bref(int fd, int tab, int bi, hammer2_blockref_t *bref, 376 int dofreemap); 377 static void tabprintf(int tab, const char *ctl, ...); 378 379 int 380 cmd_show(const char *devpath, int dofreemap) 381 { 382 hammer2_blockref_t broot; 383 hammer2_blockref_t best; 384 hammer2_media_data_t media; 385 int fd; 386 int i; 387 int best_i; 388 389 fd = open(devpath, O_RDONLY); 390 if (fd < 0) { 391 perror("open"); 392 return 1; 393 } 394 395 /* 396 * Show the tree using the best volume header. 397 * -vvv will show the tree for all four volume headers. 398 */ 399 best_i = -1; 400 bzero(&best, sizeof(best)); 401 for (i = 0; i < 4; ++i) { 402 bzero(&broot, sizeof(broot)); 403 broot.type = HAMMER2_BREF_TYPE_VOLUME; 404 broot.data_off = (i * HAMMER2_ZONE_BYTES64) | 405 HAMMER2_PBUFRADIX; 406 lseek(fd, broot.data_off & ~HAMMER2_OFF_MASK_RADIX, 0); 407 if (read(fd, &media, HAMMER2_PBUFSIZE) == 408 (ssize_t)HAMMER2_PBUFSIZE) { 409 broot.mirror_tid = media.voldata.mirror_tid; 410 if (best_i < 0 || best.mirror_tid < broot.mirror_tid) { 411 best_i = i; 412 best = broot; 413 } 414 if (VerboseOpt >= 3) 415 show_bref(fd, 0, i, &broot, dofreemap); 416 } 417 } 418 if (VerboseOpt < 3) 419 show_bref(fd, 0, best_i, &best, dofreemap); 420 close(fd); 421 422 return 0; 423 } 424 425 extern uint32_t iscsi_crc32(const void *buf, size_t size); 426 static void 427 show_bref(int fd, int tab, int bi, hammer2_blockref_t *bref, int dofreemap) 428 { 429 hammer2_media_data_t media; 430 hammer2_blockref_t *bscan; 431 int bcount; 432 int i; 433 int didnl; 434 int namelen; 435 int obrace = 1; 436 size_t bytes; 437 const char *type_str; 438 char *str = NULL; 439 uint32_t cv; 440 441 switch(bref->type) { 442 case HAMMER2_BREF_TYPE_EMPTY: 443 type_str = "empty"; 444 break; 445 case HAMMER2_BREF_TYPE_INODE: 446 type_str = "inode"; 447 break; 448 case HAMMER2_BREF_TYPE_INDIRECT: 449 type_str = "indblk"; 450 break; 451 case HAMMER2_BREF_TYPE_DATA: 452 type_str = "data"; 453 break; 454 case HAMMER2_BREF_TYPE_VOLUME: 455 type_str = "volume"; 456 break; 457 case HAMMER2_BREF_TYPE_FREEMAP: 458 type_str = "freemap"; 459 break; 460 case HAMMER2_BREF_TYPE_FREEMAP_NODE: 461 type_str = "fmapnode"; 462 break; 463 case HAMMER2_BREF_TYPE_FREEMAP_LEAF: 464 type_str = "fbitmap"; 465 break; 466 default: 467 type_str = "unknown"; 468 break; 469 } 470 471 tabprintf(tab, "%s.%-3d %016jx %016jx/%-2d mir=%016jx mod=%016jx ", 472 type_str, bi, (intmax_t)bref->data_off, 473 (intmax_t)bref->key, (intmax_t)bref->keybits, 474 (intmax_t)bref->mirror_tid, (intmax_t)bref->modify_tid); 475 tab += SHOW_TAB; 476 if (bref->flags) 477 printf("flags=%02x ", bref->flags); 478 479 bytes = (size_t)1 << (bref->data_off & HAMMER2_OFF_MASK_RADIX); 480 481 { 482 hammer2_off_t io_off; 483 hammer2_off_t io_base; 484 size_t io_bytes; 485 size_t boff; 486 487 io_off = bref->data_off & ~HAMMER2_OFF_MASK_RADIX; 488 io_base = io_off & ~(hammer2_off_t)(HAMMER2_MINIOSIZE - 1); 489 io_bytes = bytes; 490 boff = io_off - io_base; 491 492 io_bytes = HAMMER2_MINIOSIZE; 493 while (io_bytes + boff < bytes) 494 io_bytes <<= 1; 495 496 if (io_bytes > sizeof(media)) { 497 printf("(bad block size %zd)\n", bytes); 498 return; 499 } 500 if (bref->type != HAMMER2_BREF_TYPE_DATA || VerboseOpt >= 1) { 501 lseek(fd, io_base, 0); 502 if (read(fd, &media, io_bytes) != (ssize_t)io_bytes) { 503 printf("(media read failed)\n"); 504 return; 505 } 506 if (boff) 507 bcopy((char *)&media + boff, &media, bytes); 508 } 509 } 510 511 bscan = NULL; 512 bcount = 0; 513 didnl = 1; 514 namelen = 0; 515 516 /* 517 * Check data integrity in verbose mode, otherwise we are just doing 518 * a quick meta-data scan. Meta-data integrity is always checked. 519 * (Also see the check above that ensures the media data is loaded, 520 * otherwise there's no data to check!). 521 */ 522 if (bref->type != HAMMER2_BREF_TYPE_DATA || VerboseOpt >= 1) { 523 switch(HAMMER2_DEC_CHECK(bref->methods)) { 524 case HAMMER2_CHECK_NONE: 525 printf("(meth %02x) ", bref->methods); 526 break; 527 case HAMMER2_CHECK_DISABLED: 528 printf("(meth %02x) ", bref->methods); 529 break; 530 case HAMMER2_CHECK_ISCSI32: 531 cv = hammer2_icrc32(&media, bytes); 532 if (bref->check.iscsi32.value != cv) { 533 printf("(icrc %02x:%08x/%08x) ", 534 bref->methods, 535 bref->check.iscsi32.value, 536 cv); 537 } else { 538 printf("(meth %02x) ", bref->methods); 539 } 540 break; 541 case HAMMER2_CHECK_CRC64: 542 printf("(meth %02x) ", bref->methods); 543 break; 544 case HAMMER2_CHECK_SHA192: 545 printf("(meth %02x) ", bref->methods); 546 break; 547 case HAMMER2_CHECK_FREEMAP: 548 cv = hammer2_icrc32(&media, bytes); 549 if (bref->check.freemap.icrc32 != cv) { 550 printf("(fcrc %02x:%08x/%08x) ", 551 bref->methods, 552 bref->check.freemap.icrc32, 553 cv); 554 } else { 555 printf("(meth %02x) ", bref->methods); 556 } 557 break; 558 } 559 } 560 561 switch(bref->type) { 562 case HAMMER2_BREF_TYPE_EMPTY: 563 obrace = 0; 564 break; 565 case HAMMER2_BREF_TYPE_INODE: 566 printf("{\n"); 567 if (media.ipdata.meta.op_flags & HAMMER2_OPFLAG_DIRECTDATA) { 568 /* no blockrefs */ 569 } else { 570 bscan = &media.ipdata.u.blockset.blockref[0]; 571 bcount = HAMMER2_SET_COUNT; 572 } 573 namelen = media.ipdata.meta.name_len; 574 if (namelen > HAMMER2_INODE_MAXNAME) 575 namelen = 0; 576 tabprintf(tab, "filename \"%*.*s\"\n", 577 namelen, namelen, media.ipdata.filename); 578 tabprintf(tab, "version %d\n", media.ipdata.meta.version); 579 tabprintf(tab, "uflags 0x%08x\n", 580 media.ipdata.meta.uflags); 581 if (media.ipdata.meta.rmajor || media.ipdata.meta.rminor) { 582 tabprintf(tab, "rmajor %d\n", 583 media.ipdata.meta.rmajor); 584 tabprintf(tab, "rminor %d\n", 585 media.ipdata.meta.rminor); 586 } 587 tabprintf(tab, "ctime %s\n", 588 hammer2_time64_to_str(media.ipdata.meta.ctime, &str)); 589 tabprintf(tab, "mtime %s\n", 590 hammer2_time64_to_str(media.ipdata.meta.mtime, &str)); 591 tabprintf(tab, "atime %s\n", 592 hammer2_time64_to_str(media.ipdata.meta.atime, &str)); 593 tabprintf(tab, "btime %s\n", 594 hammer2_time64_to_str(media.ipdata.meta.btime, &str)); 595 tabprintf(tab, "uid %s\n", 596 hammer2_uuid_to_str(&media.ipdata.meta.uid, &str)); 597 tabprintf(tab, "gid %s\n", 598 hammer2_uuid_to_str(&media.ipdata.meta.gid, &str)); 599 if (media.ipdata.meta.type == HAMMER2_OBJTYPE_HARDLINK) 600 tabprintf(tab, "type %s (%s)\n", 601 hammer2_iptype_to_str(media.ipdata.meta.type), 602 hammer2_iptype_to_str(media.ipdata.meta.target_type)); 603 else 604 tabprintf(tab, "type %s\n", 605 hammer2_iptype_to_str(media.ipdata.meta.type)); 606 tabprintf(tab, "opflgs 0x%02x\n", 607 media.ipdata.meta.op_flags); 608 tabprintf(tab, "capflgs 0x%04x\n", 609 media.ipdata.meta.cap_flags); 610 tabprintf(tab, "mode %-7o\n", 611 media.ipdata.meta.mode); 612 tabprintf(tab, "inum 0x%016jx\n", 613 media.ipdata.meta.inum); 614 tabprintf(tab, "size %ju\n", 615 (uintmax_t)media.ipdata.meta.size); 616 tabprintf(tab, "nlinks %ju\n", 617 (uintmax_t)media.ipdata.meta.nlinks); 618 tabprintf(tab, "iparent 0x%016jx\n", 619 (uintmax_t)media.ipdata.meta.iparent); 620 tabprintf(tab, "name_key 0x%016jx\n", 621 (uintmax_t)media.ipdata.meta.name_key); 622 tabprintf(tab, "name_len %u\n", 623 media.ipdata.meta.name_len); 624 tabprintf(tab, "ncopies %u\n", 625 media.ipdata.meta.ncopies); 626 tabprintf(tab, "compalg %u\n", 627 media.ipdata.meta.comp_algo); 628 tabprintf(tab, "checkalg %u\n", 629 media.ipdata.meta.check_algo); 630 if ((media.ipdata.meta.op_flags & HAMMER2_OPFLAG_PFSROOT) || 631 media.ipdata.meta.pfs_type == HAMMER2_PFSTYPE_SUPROOT) { 632 tabprintf(tab, "pfs_type %u (%s)\n", 633 media.ipdata.meta.pfs_type, 634 hammer2_pfstype_to_str(media.ipdata.meta.pfs_type)); 635 tabprintf(tab, "pfs_inum 0x%016jx\n", 636 (uintmax_t)media.ipdata.meta.pfs_inum); 637 tabprintf(tab, "pfs_clid %s\n", 638 hammer2_uuid_to_str(&media.ipdata.meta.pfs_clid, 639 &str)); 640 tabprintf(tab, "pfs_fsid %s\n", 641 hammer2_uuid_to_str(&media.ipdata.meta.pfs_fsid, 642 &str)); 643 } 644 tabprintf(tab, "data_quota %ju\n", 645 (uintmax_t)media.ipdata.meta.data_quota); 646 tabprintf(tab, "data_count %ju\n", 647 (uintmax_t)bref->data_count); 648 tabprintf(tab, "inode_quota %ju\n", 649 (uintmax_t)media.ipdata.meta.inode_quota); 650 tabprintf(tab, "inode_count %ju\n", 651 (uintmax_t)bref->inode_count); 652 tabprintf(tab, "attr_tid 0x%016jx\n", 653 (uintmax_t)media.ipdata.meta.attr_tid); 654 if (media.ipdata.meta.type == HAMMER2_OBJTYPE_DIRECTORY) { 655 tabprintf(tab, "dirent_tid %016jx\n", 656 (uintmax_t)media.ipdata.meta.dirent_tid); 657 } 658 break; 659 case HAMMER2_BREF_TYPE_INDIRECT: 660 bscan = &media.npdata[0]; 661 bcount = bytes / sizeof(hammer2_blockref_t); 662 didnl = 1; 663 printf("{\n"); 664 break; 665 case HAMMER2_BREF_TYPE_DATA: 666 #if 0 667 if (VerboseOpt >= 2) { 668 printf("{\n"); 669 } else 670 #endif 671 { 672 printf("\n"); 673 obrace = 0; 674 } 675 break; 676 case HAMMER2_BREF_TYPE_VOLUME: 677 printf("mirror_tid=%016jx freemap_tid=%016jx ", 678 media.voldata.mirror_tid, 679 media.voldata.freemap_tid); 680 if (dofreemap) { 681 bscan = &media.voldata.freemap_blockset.blockref[0]; 682 bcount = HAMMER2_SET_COUNT; 683 } else { 684 bscan = &media.voldata.sroot_blockset.blockref[0]; 685 bcount = HAMMER2_SET_COUNT; 686 } 687 printf("{\n"); 688 break; 689 case HAMMER2_BREF_TYPE_FREEMAP_LEAF: 690 printf("{\n"); 691 for (i = 0; i < HAMMER2_FREEMAP_COUNT; ++i) { 692 if (media.bmdata[i].class == 0 && 693 media.bmdata[i].avail == 0) { 694 continue; 695 } 696 #if HAMMER2_BMAP_ELEMENTS != 8 697 #error "cmd_debug.c: HAMMER2_BMAP_ELEMENTS expected to be 8" 698 #endif 699 700 tabprintf(tab + 4, "%04d.%04x (avail=%7d) " 701 "%016jx %016jx %016jx %016jx " 702 "%016jx %016jx %016jx %016jx\n", 703 i, media.bmdata[i].class, 704 media.bmdata[i].avail, 705 media.bmdata[i].bitmapq[0], 706 media.bmdata[i].bitmapq[1], 707 media.bmdata[i].bitmapq[2], 708 media.bmdata[i].bitmapq[3], 709 media.bmdata[i].bitmapq[4], 710 media.bmdata[i].bitmapq[5], 711 media.bmdata[i].bitmapq[6], 712 media.bmdata[i].bitmapq[7]); 713 } 714 tabprintf(tab, "}\n"); 715 break; 716 case HAMMER2_BREF_TYPE_FREEMAP_NODE: 717 printf("{\n"); 718 bscan = &media.npdata[0]; 719 bcount = bytes / sizeof(hammer2_blockref_t); 720 break; 721 default: 722 printf("\n"); 723 obrace = 0; 724 break; 725 } 726 if (str) 727 free(str); 728 for (i = 0; i < bcount; ++i) { 729 if (bscan[i].type != HAMMER2_BREF_TYPE_EMPTY) { 730 if (didnl == 0) { 731 printf("\n"); 732 didnl = 1; 733 } 734 show_bref(fd, tab, i, &bscan[i], dofreemap); 735 } 736 } 737 tab -= SHOW_TAB; 738 if (obrace) { 739 if (bref->type == HAMMER2_BREF_TYPE_INODE) 740 tabprintf(tab, "} (%s.%d, \"%*.*s\")\n", 741 type_str, bi, 742 namelen, namelen, media.ipdata.filename); 743 else 744 tabprintf(tab, "} (%s.%d)\n", type_str,bi); 745 } 746 } 747 748 int 749 cmd_hash(int ac, const char **av) 750 { 751 int i; 752 753 for (i = 0; i < ac; ++i) { 754 printf("%016jx %s\n", dirhash(av[i], strlen(av[i])), av[i]); 755 } 756 return(0); 757 } 758 759 int 760 cmd_chaindump(const char *path) 761 { 762 int dummy = 0; 763 int fd; 764 765 fd = open(path, O_RDONLY); 766 if (fd >= 0) { 767 ioctl(fd, HAMMER2IOC_DEBUG_DUMP, &dummy); 768 close(fd); 769 } else { 770 fprintf(stderr, "unable to open %s\n", path); 771 } 772 return 0; 773 } 774 775 776 static 777 void 778 tabprintf(int tab, const char *ctl, ...) 779 { 780 va_list va; 781 782 printf("%*.*s", tab, tab, ""); 783 va_start(va, ctl); 784 vprintf(ctl, va); 785 va_end(va); 786 } 787