xref: /dragonfly/sbin/hammer2/main.c (revision 7bcb6caf)
1 /*
2  * Copyright (c) 2011-2012 The DragonFly Project.  All rights reserved.
3  *
4  * This code is derived from software contributed to The DragonFly Project
5  * by Matthew Dillon <dillon@dragonflybsd.org>
6  * by Venkatesh Srinivas <vsrinivas@dragonflybsd.org>
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  * 2. Redistributions in binary form must reproduce the above copyright
15  *    notice, this list of conditions and the following disclaimer in
16  *    the documentation and/or other materials provided with the
17  *    distribution.
18  * 3. Neither the name of The DragonFly Project nor the names of its
19  *    contributors may be used to endorse or promote products derived
20  *    from this software without specific, prior written permission.
21  *
22  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
23  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
24  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
25  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE
26  * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
27  * INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING,
28  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
29  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
30  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
31  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
32  * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  */
35 
36 #include "hammer2.h"
37 
38 int DebugOpt;
39 int VerboseOpt;
40 int QuietOpt;
41 int NormalExit = 1;	/* if set to 0 main() has to pthread_exit() */
42 int RecurseOpt;
43 int ForceOpt;
44 
45 static void usage(int code);
46 
47 int
48 main(int ac, char **av)
49 {
50 	const char *sel_path = NULL;
51 	const char *uuid_str = NULL;
52 	const char *arg;
53 	int pfs_type = HAMMER2_PFSTYPE_NONE;
54 	int all_opt = 0;
55 	int ecode = 0;
56 	int ch;
57 
58 	srandomdev();
59 	signal(SIGPIPE, SIG_IGN);
60 	dmsg_crypto_setup();
61 
62 	/*
63 	 * Core options
64 	 */
65 	while ((ch = getopt(ac, av, "adfrqs:t:u:v")) != -1) {
66 		switch(ch) {
67 		case 'a':
68 			all_opt = 1;
69 			break;
70 		case 'd':
71 			if (DebugOpt)
72 				++DMsgDebugOpt;
73 			DebugOpt = 1;
74 			break;
75 		case 'f':
76 			ForceOpt = 1;
77 			break;
78 		case 'r':
79 			RecurseOpt = 1;
80 			break;
81 		case 's':
82 			sel_path = optarg;
83 			break;
84 		case 't':
85 			/*
86 			 * set node type for mkpfs
87 			 */
88 			if (strcasecmp(optarg, "CACHE") == 0) {
89 				pfs_type = HAMMER2_PFSTYPE_CACHE;
90 			} else if (strcasecmp(optarg, "DUMMY") == 0) {
91 				pfs_type = HAMMER2_PFSTYPE_DUMMY;
92 			} else if (strcasecmp(optarg, "SLAVE") == 0) {
93 				pfs_type = HAMMER2_PFSTYPE_SLAVE;
94 			} else if (strcasecmp(optarg, "SOFT_SLAVE") == 0) {
95 				pfs_type = HAMMER2_PFSTYPE_SOFT_SLAVE;
96 			} else if (strcasecmp(optarg, "SOFT_MASTER") == 0) {
97 				pfs_type = HAMMER2_PFSTYPE_SOFT_MASTER;
98 			} else if (strcasecmp(optarg, "MASTER") == 0) {
99 				pfs_type = HAMMER2_PFSTYPE_MASTER;
100 			} else {
101 				fprintf(stderr, "-t: Unrecognized node type\n");
102 				usage(1);
103 			}
104 			break;
105 		case 'u':
106 			/*
107 			 * set uuid for mkpfs, else one will be generated
108 			 * (required for all except the MASTER node_type)
109 			 */
110 			uuid_str = optarg;
111 			break;
112 		case 'v':
113 			if (QuietOpt)
114 				--QuietOpt;
115 			else
116 				++VerboseOpt;
117 			break;
118 		case 'q':
119 			if (VerboseOpt)
120 				--VerboseOpt;
121 			else
122 				++QuietOpt;
123 			break;
124 		default:
125 			fprintf(stderr, "Unknown option: %c\n", ch);
126 			usage(1);
127 			/* not reached */
128 			break;
129 		}
130 	}
131 
132 	/*
133 	 * Adjust, then process the command
134 	 */
135 	ac -= optind;
136 	av += optind;
137 	if (ac < 1) {
138 		fprintf(stderr, "Missing command\n");
139 		usage(1);
140 		/* not reached */
141 	}
142 
143 	if (strcmp(av[0], "connect") == 0) {
144 		/*
145 		 * Add cluster connection
146 		 */
147 		if (ac < 2) {
148 			fprintf(stderr, "connect: missing argument\n");
149 			usage(1);
150 		}
151 		ecode = cmd_remote_connect(sel_path, av[1]);
152 	} else if (strcmp(av[0], "dumpchain") == 0) {
153 		if (ac < 2)
154 			ecode = cmd_dumpchain(".", (u_int)-1);
155 		else if (ac < 3)
156 			ecode = cmd_dumpchain(av[1], (u_int)-1);
157 		else
158 			ecode = cmd_dumpchain(av[1],
159 					      (u_int)strtoul(av[2], NULL, 0));
160 	} else if (strcmp(av[0], "debugspan") == 0) {
161 		/*
162 		 * Debug connection to the target hammer2 service and run
163 		 * the CONN/SPAN protocol.
164 		 */
165 		if (ac < 2) {
166 			fprintf(stderr, "debugspan: requires hostname\n");
167 			usage(1);
168 		}
169 		ecode = cmd_debugspan(av[1]);
170 	} else if (strcmp(av[0], "disconnect") == 0) {
171 		/*
172 		 * Remove cluster connection
173 		 */
174 		if (ac < 2) {
175 			fprintf(stderr, "disconnect: missing argument\n");
176 			usage(1);
177 		}
178 		ecode = cmd_remote_disconnect(sel_path, av[1]);
179 	} else if (strcmp(av[0], "destroy") == 0) {
180 		if (ac < 2) {
181 			fprintf(stderr,
182 				"Specify one or more paths to destroy\n");
183 		}
184 		ecode = cmd_destroy_path(ac - 1, (const char **)(void *)&av[1]);
185 	} else if (strcmp(av[0], "hash") == 0) {
186 		ecode = cmd_hash(ac - 1, (const char **)(void *)&av[1]);
187 	} else if (strcmp(av[0], "info") == 0) {
188 		ecode = cmd_info(ac - 1, (const char **)(void *)&av[1]);
189 	} else if (strcmp(av[0], "mountall") == 0) {
190 		ecode = cmd_mountall(ac - 1, (const char **)(void *)&av[1]);
191 	} else if (strcmp(av[0], "status") == 0) {
192 		/*
193 		 * Get status of PFS and its connections (-a for all PFSs)
194 		 */
195 		if (ac < 2) {
196 			ecode = cmd_remote_status(sel_path, all_opt);
197 		} else {
198 			int i;
199 
200 			for (i = 1; i < ac; ++i)
201 				ecode = cmd_remote_status(av[i], all_opt);
202 		}
203 	} else if (strcmp(av[0], "pfs-clid") == 0) {
204 		/*
205 		 * Print cluster id (uuid) for specific PFS
206 		 */
207 		if (ac < 2) {
208 			fprintf(stderr, "pfs-clid: requires name\n");
209 			usage(1);
210 		}
211 		ecode = cmd_pfs_getid(sel_path, av[1], 0);
212 	} else if (strcmp(av[0], "pfs-fsid") == 0) {
213 		/*
214 		 * Print private id (uuid) for specific PFS
215 		 */
216 		if (ac < 2) {
217 			fprintf(stderr, "pfs-fsid: requires name\n");
218 			usage(1);
219 		}
220 		ecode = cmd_pfs_getid(sel_path, av[1], 1);
221 	} else if (strcmp(av[0], "pfs-list") == 0) {
222 		/*
223 		 * List all PFSs
224 		 */
225 		if (ac >= 2) {
226 			ecode = cmd_pfs_list(ac - 1,
227 					     (const char **)(void *)&av[1]);
228 		} else {
229 			ecode = cmd_pfs_list(1, &sel_path);
230 		}
231 	} else if (strcmp(av[0], "pfs-create") == 0) {
232 		/*
233 		 * Create new PFS using pfs_type
234 		 */
235 		if (ac < 2) {
236 			fprintf(stderr, "pfs-create: requires name\n");
237 			usage(1);
238 		}
239 		ecode = cmd_pfs_create(sel_path, av[1], pfs_type, uuid_str);
240 	} else if (strcmp(av[0], "pfs-delete") == 0) {
241 		/*
242 		 * Delete a PFS by name
243 		 */
244 		if (ac < 2) {
245 			fprintf(stderr, "pfs-delete: requires name\n");
246 			usage(1);
247 		}
248 		ecode = cmd_pfs_delete(sel_path, av[1]);
249 	} else if (strcmp(av[0], "snapshot") == 0) {
250 		/*
251 		 * Create snapshot with optional pfs-type and optional
252 		 * label override.
253 		 */
254 		if (ac > 3) {
255 			fprintf(stderr, "pfs-snapshot: too many arguments\n");
256 			usage(1);
257 		}
258 		switch(ac) {
259 		case 1:
260 			ecode = cmd_pfs_snapshot(sel_path, NULL, NULL);
261 			break;
262 		case 2:
263 			ecode = cmd_pfs_snapshot(sel_path, av[1], NULL);
264 			break;
265 		case 3:
266 			ecode = cmd_pfs_snapshot(sel_path, av[1], av[2]);
267 			break;
268 		}
269 	} else if (strcmp(av[0], "service") == 0) {
270 		/*
271 		 * Start the service daemon.  This daemon accepts
272 		 * connections from local and remote clients, handles
273 		 * the security handshake, and manages the core messaging
274 		 * protocol.
275 		 */
276 		ecode = cmd_service();
277 	} else if (strcmp(av[0], "stat") == 0) {
278 		ecode = cmd_stat(ac - 1, (const char **)(void *)&av[1]);
279 	} else if (strcmp(av[0], "leaf") == 0) {
280 		/*
281 		 * Start the management daemon for a specific PFS.
282 		 *
283 		 * This will typically connect to the local master node
284 		 * daemon, register the PFS, and then pass its side of
285 		 * the socket descriptor to the kernel HAMMER2 VFS via an
286 		 * ioctl().  The process and/or thread context remains in the
287 		 * kernel until the PFS is unmounted or the connection is
288 		 * lost, then returns from the ioctl.
289 		 *
290 		 * It is possible to connect directly to a remote master node
291 		 * instead of the local master node in situations where
292 		 * encryption is not desired or no local master node is
293 		 * desired.  This is not recommended because it represents
294 		 * a single point of failure for the PFS's communications.
295 		 *
296 		 * Direct kernel<->kernel communication between HAMMER2 VFSs
297 		 * is theoretically possible for directly-connected
298 		 * registrations (i.e. where the spanning tree is degenerate),
299 		 * but not recommended.  We specifically try to reduce the
300 		 * complexity of the HAMMER2 VFS kernel code.
301 		 */
302 		ecode = cmd_leaf(sel_path);
303 	} else if (strcmp(av[0], "shell") == 0) {
304 		/*
305 		 * Connect to the command line monitor in the hammer2 master
306 		 * node for the machine using HAMMER2_DBG_SHELL messages.
307 		 */
308 		ecode = cmd_shell((ac < 2) ? NULL : av[1]);
309 	} else if (strcmp(av[0], "rsainit") == 0) {
310 		/*
311 		 * Initialize a RSA keypair.  If no target directory is
312 		 * specified we default to "/etc/hammer2".
313 		 */
314 		arg = (ac < 2) ? HAMMER2_DEFAULT_DIR : av[1];
315 		ecode = cmd_rsainit(arg);
316 	} else if (strcmp(av[0], "rsaenc") == 0) {
317 		/*
318 		 * Encrypt the input symmetrically by running it through
319 		 * the specified public and/or private key files.
320 		 *
321 		 * If no key files are specified data is encoded using
322 		 * "/etc/hammer2/rsa.pub".
323 		 *
324 		 * WARNING: no padding is added, data stream must contain
325 		 *	    random padding for this to be secure.
326 		 *
327 		 * Used for debugging only
328 		 */
329 		if (ac == 1) {
330 			const char *rsapath = HAMMER2_DEFAULT_DIR "/rsa.pub";
331 			ecode = cmd_rsaenc(&rsapath, 1);
332 		} else {
333 			ecode = cmd_rsaenc((const char **)(void *)&av[1],
334 					   ac - 1);
335 		}
336 	} else if (strcmp(av[0], "rsadec") == 0) {
337 		/*
338 		 * Decrypt the input symmetrically by running it through
339 		 * the specified public and/or private key files.
340 		 *
341 		 * If no key files are specified data is decoded using
342 		 * "/etc/hammer2/rsa.prv".
343 		 *
344 		 * WARNING: no padding is added, data stream must contain
345 		 *	    random padding for this to be secure.
346 		 *
347 		 * Used for debugging only
348 		 */
349 		if (ac == 1) {
350 			const char *rsapath = HAMMER2_DEFAULT_DIR "/rsa.prv";
351 			ecode = cmd_rsadec(&rsapath, 1);
352 		} else {
353 			ecode = cmd_rsadec((const char **)(void *)&av[1],
354 					   ac - 1);
355 		}
356 	} else if (strcmp(av[0], "show") == 0) {
357 		/*
358 		 * Raw dump of filesystem.  Use -v to check all crc's, and
359 		 * -vv to dump bulk file data.
360 		 */
361 		if (ac != 2) {
362 			fprintf(stderr, "show: requires device path\n");
363 			usage(1);
364 		} else {
365 			cmd_show(av[1], 0);
366 		}
367 	} else if (strcmp(av[0], "freemap") == 0) {
368 		/*
369 		 * Raw dump of freemap.  Use -v to check all crc's, and
370 		 * -vv to dump bulk file data.
371 		 */
372 		if (ac != 2) {
373 			fprintf(stderr, "freemap: requires device path\n");
374 			usage(1);
375 		} else {
376 			cmd_show(av[1], 1);
377 		}
378 	} else if (strcmp(av[0], "setcomp") == 0) {
379 		if (ac < 3) {
380 			/*
381 			 * Missing compression method and at least one
382 			 * path.
383 			 */
384 			fprintf(stderr,
385 				"setcomp: requires compression method and"
386 				"directory/file path\n");
387 			usage(1);
388 		} else {
389 			/*
390 			 * Multiple paths may be specified
391 			 */
392 			ecode = cmd_setcomp(av[1], &av[2]);
393 		}
394 	} else if (strcmp(av[0], "setcheck") == 0) {
395 		if (ac < 3) {
396 			/*
397 			 * Missing compression method and at least one
398 			 * path.
399 			 */
400 			fprintf(stderr,
401 				"setcheck: requires check code method and"
402 				"directory/file path\n");
403 			usage(1);
404 		} else {
405 			/*
406 			 * Multiple paths may be specified
407 			 */
408 			ecode = cmd_setcheck(av[1], &av[2]);
409 		}
410 	} else if (strcmp(av[0], "clrcheck") == 0) {
411 		ecode = cmd_setcheck("none", &av[1]);
412 	} else if (strcmp(av[0], "setcrc32") == 0) {
413 		ecode = cmd_setcheck("crc32", &av[1]);
414 	} else if (strcmp(av[0], "setxxhash64") == 0) {
415 		ecode = cmd_setcheck("xxhash64", &av[1]);
416 	} else if (strcmp(av[0], "setsha192") == 0) {
417 		ecode = cmd_setcheck("sha192", &av[1]);
418 	} else if (strcmp(av[0], "printinode") == 0) {
419 		if (ac != 2) {
420 			fprintf(stderr,
421 				"printinode: requires directory/file path\n");
422 			usage(1);
423 		} else {
424 			print_inode(av[1]);
425 		}
426 	} else if (strcmp(av[0], "bulkfree") == 0) {
427 		if (ac != 2) {
428 			fprintf(stderr,
429 				"bulkfree: requires path to mount\n");
430 			usage(1);
431 		} else {
432 			ecode = cmd_bulkfree(av[1]);
433 		}
434 #if 0
435 	} else if (strcmp(av[0], "bulkfree-async") == 0) {
436 		if (ac != 2) {
437 			fprintf(stderr,
438 				"bulkfree-async: requires path to mount\n");
439 			usage(1);
440 		} else {
441 			ecode = cmd_bulkfree_async(av[1]);
442 		}
443 #endif
444 	} else if (strcmp(av[0], "cleanup") == 0) {
445 		ecode = cmd_cleanup(av[1]);	/* can be NULL */
446 	} else {
447 		fprintf(stderr, "Unrecognized command: %s\n", av[0]);
448 		usage(1);
449 	}
450 
451 	/*
452 	 * In DebugMode we may wind up starting several pthreads in the
453 	 * original process, in which case we have to let them run and
454 	 * not actually exit.
455 	 */
456 	if (NormalExit) {
457 		return (ecode);
458 	} else {
459 		pthread_exit(NULL);
460 		_exit(2);	/* NOT REACHED */
461 	}
462 }
463 
464 static
465 void
466 usage(int code)
467 {
468 	fprintf(stderr,
469 		"hammer2 [options] command...\n"
470 		"    -s path            Select filesystem\n"
471 		"    -t type            PFS type for pfs-create\n"
472 		"    -u uuid            uuid for pfs-create\n"
473 		"\n"
474 		"    cleanup [<path>...]          "
475 			"Run cleanup passes\n"
476 		"    connect <target>             "
477 			"Add cluster link\n"
478 		"    debugspan <target>           "
479 			"Debug spanning tree\n"
480 		"    dumpchain <path> [chnflags]  "
481 			"Dump in-memory chain topo from\n"
482 			"NOTE: ONFLUSH flag is 0x200\n"
483 		"    destroy <path>*              "
484 			"Destroy a directory entry (only use if inode bad)\n"
485 		"    disconnect <target>          "
486 			"Del cluster link\n"
487 		"    hash filename*               "
488 			"Print directory hash\n"
489 		"    info [devpath...]            "
490 			"Info on all offline or online H2 partitions\n"
491 		"    mountall [devpath...]        "
492 			"Mount @LOCAL for all H2 partitions\n"
493 		"    status [<path>...]           "
494 			"Report active cluster status\n"
495 		"    pfs-list [<path>...]         "
496 			"List PFSs\n"
497 		"    pfs-clid <label>             "
498 			"Print cluster id for specific PFS\n"
499 		"    pfs-fsid <label>             "
500 			"Print private id for specific PFS\n"
501 		"    pfs-create <label>           "
502 			"Create a PFS\n"
503 		"    pfs-delete <label>           "
504 			"Destroy a PFS\n"
505 		"    snapshot <path> [<label>]    "
506 			"Snapshot a PFS or directory\n"
507 		"    service                      "
508 			"Start service daemon\n"
509 		"    stat [<path>]                "
510 			"Return inode quota & config\n"
511 		"    leaf                         "
512 			"Start pfs leaf daemon\n"
513 		"    shell [<host>]               "
514 			"Connect to debug shell\n"
515 		"    debugspan <target>           "
516 			"Connect to target, run CONN/SPAN\n"
517 		"    rsainit                      "
518 			"Initialize rsa fields\n"
519 		"    show devpath                 "
520 			"Raw hammer2 media dump\n"
521 		"    freemap devpath              "
522 			"Raw hammer2 media dump\n"
523 		"    setcomp comp[:level] path... "
524 			"Set comp algo {none, autozero, lz4, zlib} & level\n"
525 		"    setcheck check path...       "
526 			"Set check algo {none, crc32, xxhash64, sha192}\n"
527 		"    clrcheck path...             "
528 			"Clear check code override\n"
529 		"    setcrc32 path...             "
530 			"Set check algo to crc32\n"
531 		"    setxxhash64 path...          "
532 			"Set check algo to xxhash64\n"
533 		"    setsha192 path...            "
534 			"Set check algo to sha192\n"
535 		"    bulkfree path...             "
536 			"Run bulkfree pass\n"
537 #if 0
538 		"    bulkfree-async path...       "
539 			"Run bulkfree pass asynchronously\n"
540 #endif
541 	);
542 	exit(code);
543 }
544