2 * Copyright (c) 2011-2012 The DragonFly Project. All rights reserved.
4 * This code is derived from software contributed to The DragonFly Project
5 * by Matthew Dillon <dillon@dragonflybsd.org>
6 * by Venkatesh Srinivas <vsrinivas@dragonflybsd.org>
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in
16 * the documentation and/or other materials provided with the
18 * 3. Neither the name of The DragonFly Project nor the names of its
19 * contributors may be used to endorse or promote products derived
20 * from this software without specific, prior written permission.
22 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
23 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
24 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
25 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
26 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
27 * INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING,
28 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
29 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
30 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
31 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
32 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
40 static void shell_msghandler(dmsg_msg_t
*msg
, int unmanaged
);
41 static void shell_ttymsg(dmsg_iocom_t
*iocom
);
43 /************************************************************************
45 ************************************************************************/
48 cmd_shell(const char *hostname
)
50 dmsg_master_service_info_t
*info
;
54 fd
= dmsg_connect(hostname
);
58 info
= malloc(sizeof(*info
));
59 bzero(info
, sizeof(*info
));
62 info
->usrmsg_callback
= shell_msghandler
;
63 info
->altmsg_callback
= shell_ttymsg
;
64 info
->label
= strdup("debug");
65 pthread_create(&thread
, NULL
, dmsg_master_service
, info
);
66 pthread_join(thread
, NULL
);
73 cmd_shell(const char *hostname
)
75 struct dmsg_iocom iocom
;
80 * Connect to the target
82 fd
= dmsg_connect(hostname
);
87 * Initialize the session and transmit an empty DMSG_DBG_SHELL
88 * to cause the remote end to generate a prompt.
90 dmsg_iocom_init(&iocom
, fd
, 0,
95 fcntl(0, F_SETFL
, O_NONBLOCK
);
96 printf("debug: connected\n");
98 msg
= dmsg_msg_alloc(&iocom
.state0
, 0, DMSG_DBG_SHELL
, NULL
, NULL
);
100 dmsg_iocom_core(&iocom
);
101 fprintf(stderr
, "debug: disconnected\n");
108 * Debug session front-end
110 * Callback from dmsg_iocom_core() when messages might be present
115 shell_msghandler(dmsg_msg_t
*msg
, int unmanaged
)
122 case DMSG_LNK_ERROR
| DMSGF_REPLY
:
124 * One-way non-transactional LNK_ERROR messages typically
125 * indicate a connection failure. Error code 0 is used by
126 * the debug shell to indicate no more results from last cmd.
128 if (msg
->any
.head
.error
) {
129 fprintf(stderr
, "Stream failure: %s\n",
132 write(1, "debug> ", 7);
135 case DMSG_LNK_ERROR
| DMSGF_DELETE
:
136 /* ignore termination of LNK_CONN */
141 * We send the commands, not accept them.
142 * (one-way message, not transactional)
145 dmsg_msg_reply(msg
, DMSG_ERR_NOSUPP
);
147 case DMSG_DBG_SHELL
| DMSGF_REPLY
:
149 * A reply from the remote is data we copy to stdout.
150 * (one-way message, not transactional)
153 msg
->aux_data
[msg
->aux_size
- 1] = 0;
154 write(1, msg
->aux_data
, strlen(msg
->aux_data
));
158 case DMSG_LNK_CONN
| DMSGF_CREATE
:
159 fprintf(stderr
, "Debug Shell received LNK_CONN\n");
160 nmsg
= dmsg_msg_alloc(&msg
->state
->iocom
->state0
, 0,
163 dmsg_msg_write(nmsg
);
164 dmsg_msg_reply(msg
, DMSG_ERR_NOSUPP
);
166 case DMSG_LNK_CONN
| DMSGF_DELETE
:
171 * Ignore any unknown messages, Terminate any unknown
172 * transactions with an error.
174 fprintf(stderr
, "Unknown message: %s\n", dmsg_msg_str(msg
));
176 if (msg
->any
.head
.cmd
& DMSGF_CREATE
)
177 dmsg_msg_reply(msg
, DMSG_ERR_NOSUPP
);
178 if (msg
->any
.head
.cmd
& DMSGF_DELETE
)
179 dmsg_msg_reply(msg
, DMSG_ERR_NOSUPP
);
186 * Debug session front-end
190 shell_ttymsg(dmsg_iocom_t
*iocom
)
192 dmsg_state_t
*pstate
;
198 if (fgets(buf
, sizeof(buf
), stdin
) != NULL
) {
200 pstate
= dmsg_findspan(strtok(buf
+ 1, " \t\n"));
201 cmd
= strtok(NULL
, "\n");
203 pstate
= &iocom
->state0
;
204 cmd
= strtok(buf
, "\n");
207 len
= strlen(cmd
) + 1;
208 msg
= dmsg_msg_alloc(pstate
, len
, DMSG_DBG_SHELL
,
210 bcopy(cmd
, msg
->aux_data
, len
);
213 fprintf(stderr
, "@msgid not found\n");
216 * This should cause the remote end to generate
217 * a debug> prompt (and thus shows that there is
220 msg
= dmsg_msg_alloc(pstate
, 0, DMSG_DBG_SHELL
,
224 } else if (feof(stdin
)) {
226 * Set EOF flag without setting any error code for normal
229 iocom
->flags
|= DMSG_IOCOMF_EOF
;
236 * Debug session back-end (on remote side)
238 static void shell_span(dmsg_msg_t
*msg
, char *cmdbuf
);
239 static void shell_ping(dmsg_msg_t
*msg
, char *cmdbuf
);
242 hammer2_shell_parse(dmsg_msg_t
*msg
, int unmanaged
)
244 dmsg_iocom_t
*iocom
= msg
->state
->iocom
;
250 * Filter on debug shell commands and ping responses only
252 cmd
= msg
->any
.head
.cmd
;
253 if ((cmd
& DMSGF_CMDSWMASK
) == (DMSG_LNK_PING
| DMSGF_REPLY
)) {
254 dmsg_printf(iocom
, "ping reply\n");
258 if ((cmd
& DMSGF_PROTOS
) != DMSG_PROTO_DBG
) {
260 dmsg_msg_reply(msg
, DMSG_ERR_NOSUPP
);
263 if ((cmd
& DMSGF_CMDSWMASK
) != DMSG_DBG_SHELL
) {
265 dmsg_msg_reply(msg
, DMSG_ERR_NOSUPP
);
270 * Debug shell command
272 cmdbuf
= msg
->aux_data
;
273 cmdp
= strsep(&cmdbuf
, " \t");
275 if (cmdp
== NULL
|| *cmdp
== 0) {
277 } else if (strcmp(cmdp
, "ping") == 0) {
278 shell_ping(msg
, cmdbuf
);
279 } else if (strcmp(cmdp
, "span") == 0) {
280 shell_span(msg
, cmdbuf
);
281 } else if (strcmp(cmdp
, "tree") == 0) {
282 dmsg_shell_tree(iocom
, cmdbuf
); /* dump spanning tree */
283 } else if (strcmp(cmdp
, "help") == 0 || strcmp(cmdp
, "?") == 0) {
284 dmsg_printf(iocom
, "help Command help\n");
285 dmsg_printf(iocom
, "span <host> Span to target host\n");
286 dmsg_printf(iocom
, "tree Dump spanning tree\n");
287 dmsg_printf(iocom
, "@span <cmd> Issue via circuit\n");
289 dmsg_printf(iocom
, "Unrecognized command: %s\n", cmdp
);
291 dmsg_printf(iocom
, "debug> ");
295 shell_ping(dmsg_msg_t
*msg
, char *cmdbuf __unused
)
297 dmsg_iocom_t
*iocom
= msg
->state
->iocom
;
300 dmsg_printf(iocom
, "sending ping\n");
301 m2
= dmsg_msg_alloc(msg
->state
, 0, DMSG_LNK_PING
, NULL
, NULL
);
306 shell_span(dmsg_msg_t
*msg
, char *cmdbuf
)
308 dmsg_iocom_t
*iocom
= msg
->state
->iocom
;
309 dmsg_master_service_info_t
*info
;
310 const char *hostname
= strsep(&cmdbuf
, " \t");
315 * Connect to the target
317 if (hostname
== NULL
) {
320 fd
= dmsg_connect(hostname
);
324 * Start master service
327 dmsg_printf(iocom
, "Connection to %s failed\n", hostname
);
329 dmsg_printf(iocom
, "Connected to %s\n", hostname
);
331 info
= malloc(sizeof(*info
));
332 bzero(info
, sizeof(*info
));
335 info
->usrmsg_callback
= hammer2_shell_parse
;
336 info
->label
= strdup("client");
338 pthread_create(&thread
, NULL
, dmsg_master_service
, info
);
339 /*pthread_join(thread, &res);*/
343 /************************************************************************
345 ************************************************************************
347 * Connect to the target manually (not via the cluster list embedded in
348 * a hammer2 filesystem) and initiate the SPAN protocol.
351 cmd_debugspan(const char *hostname
)
358 * Connect to the target
360 fd
= dmsg_connect(hostname
);
364 printf("debugspan: connected to %s, starting CONN/SPAN\n", hostname
);
365 pthread_create(&thread
, NULL
,
366 dmsg_master_service
, (void *)(intptr_t)fd
);
367 pthread_join(thread
, &res
);
371 /************************************************************************
373 ************************************************************************/
375 static void show_bref(int fd
, int tab
, int bi
, hammer2_blockref_t
*bref
,
377 static void tabprintf(int tab
, const char *ctl
, ...);
380 cmd_show(const char *devpath
, int dofreemap
)
382 hammer2_blockref_t broot
;
383 hammer2_blockref_t best
;
384 hammer2_media_data_t media
;
389 fd
= open(devpath
, O_RDONLY
);
396 * Show the tree using the best volume header.
397 * -vvv will show the tree for all four volume headers.
400 bzero(&best
, sizeof(best
));
401 for (i
= 0; i
< 4; ++i
) {
402 bzero(&broot
, sizeof(broot
));
403 broot
.type
= HAMMER2_BREF_TYPE_VOLUME
;
404 broot
.data_off
= (i
* HAMMER2_ZONE_BYTES64
) |
406 lseek(fd
, broot
.data_off
& ~HAMMER2_OFF_MASK_RADIX
, 0);
407 if (read(fd
, &media
, HAMMER2_PBUFSIZE
) ==
408 (ssize_t
)HAMMER2_PBUFSIZE
) {
409 broot
.mirror_tid
= media
.voldata
.mirror_tid
;
410 if (best_i
< 0 || best
.mirror_tid
< broot
.mirror_tid
) {
415 show_bref(fd
, 0, i
, &broot
, dofreemap
);
419 show_bref(fd
, 0, best_i
, &best
, dofreemap
);
425 extern uint32_t iscsi_crc32(const void *buf
, size_t size
);
427 show_bref(int fd
, int tab
, int bi
, hammer2_blockref_t
*bref
, int dofreemap
)
429 hammer2_media_data_t media
;
430 hammer2_blockref_t
*bscan
;
437 const char *type_str
;
443 case HAMMER2_BREF_TYPE_EMPTY
:
446 case HAMMER2_BREF_TYPE_INODE
:
449 case HAMMER2_BREF_TYPE_INDIRECT
:
452 case HAMMER2_BREF_TYPE_DATA
:
455 case HAMMER2_BREF_TYPE_VOLUME
:
458 case HAMMER2_BREF_TYPE_FREEMAP
:
459 type_str
= "freemap";
461 case HAMMER2_BREF_TYPE_FREEMAP_NODE
:
462 type_str
= "fmapnode";
464 case HAMMER2_BREF_TYPE_FREEMAP_LEAF
:
465 type_str
= "fbitmap";
468 type_str
= "unknown";
472 tabprintf(tab
, "%s.%-3d %016jx %016jx/%-2d mir=%016jx mod=%016jx ",
473 type_str
, bi
, (intmax_t)bref
->data_off
,
474 (intmax_t)bref
->key
, (intmax_t)bref
->keybits
,
475 (intmax_t)bref
->mirror_tid
, (intmax_t)bref
->modify_tid
);
478 printf("flags=%02x ", bref
->flags
);
480 bytes
= (size_t)1 << (bref
->data_off
& HAMMER2_OFF_MASK_RADIX
);
483 hammer2_off_t io_off
;
484 hammer2_off_t io_base
;
488 io_off
= bref
->data_off
& ~HAMMER2_OFF_MASK_RADIX
;
489 io_base
= io_off
& ~(hammer2_off_t
)(HAMMER2_MINIOSIZE
- 1);
491 boff
= io_off
- io_base
;
493 io_bytes
= HAMMER2_MINIOSIZE
;
494 while (io_bytes
+ boff
< bytes
)
497 if (io_bytes
> sizeof(media
)) {
498 printf("(bad block size %zd)\n", bytes
);
501 if (bref
->type
!= HAMMER2_BREF_TYPE_DATA
|| VerboseOpt
>= 1) {
502 lseek(fd
, io_base
, 0);
503 if (read(fd
, &media
, io_bytes
) != (ssize_t
)io_bytes
) {
504 printf("(media read failed)\n");
508 bcopy((char *)&media
+ boff
, &media
, bytes
);
518 * Check data integrity in verbose mode, otherwise we are just doing
519 * a quick meta-data scan. Meta-data integrity is always checked.
520 * (Also see the check above that ensures the media data is loaded,
521 * otherwise there's no data to check!).
523 if (bref
->type
!= HAMMER2_BREF_TYPE_DATA
|| VerboseOpt
>= 1) {
524 switch(HAMMER2_DEC_CHECK(bref
->methods
)) {
525 case HAMMER2_CHECK_NONE
:
526 printf("(meth %02x) ", bref
->methods
);
528 case HAMMER2_CHECK_DISABLED
:
529 printf("(meth %02x) ", bref
->methods
);
531 case HAMMER2_CHECK_ISCSI32
:
532 cv
= hammer2_icrc32(&media
, bytes
);
533 if (bref
->check
.iscsi32
.value
!= cv
) {
534 printf("(icrc %02x:%08x/%08x failed) ",
536 bref
->check
.iscsi32
.value
,
539 printf("(meth %02x, iscsi32=%08x) ",
543 case HAMMER2_CHECK_XXHASH64
:
544 cv64
= XXH64(&media
, bytes
, XXH_HAMMER2_SEED
);
545 if (bref
->check
.xxhash64
.value
!= cv64
) {
546 printf("(xxhash64 %02x:%016jx/%016jx failed) ",
548 bref
->check
.xxhash64
.value
,
551 printf("(meth %02x, xxh=%016jx) ",
552 bref
->methods
, cv64
);
555 case HAMMER2_CHECK_SHA192
:
556 printf("(meth %02x) ", bref
->methods
);
558 case HAMMER2_CHECK_FREEMAP
:
559 cv
= hammer2_icrc32(&media
, bytes
);
560 if (bref
->check
.freemap
.icrc32
!= cv
) {
561 printf("(fcrc %02x:%08x/%08x failed) ",
563 bref
->check
.freemap
.icrc32
,
566 printf("(meth %02x, fcrc=%08x) ",
574 case HAMMER2_BREF_TYPE_EMPTY
:
577 case HAMMER2_BREF_TYPE_INODE
:
579 if (media
.ipdata
.meta
.op_flags
& HAMMER2_OPFLAG_DIRECTDATA
) {
582 bscan
= &media
.ipdata
.u
.blockset
.blockref
[0];
583 bcount
= HAMMER2_SET_COUNT
;
585 namelen
= media
.ipdata
.meta
.name_len
;
586 if (namelen
> HAMMER2_INODE_MAXNAME
)
588 tabprintf(tab
, "filename \"%*.*s\"\n",
589 namelen
, namelen
, media
.ipdata
.filename
);
590 tabprintf(tab
, "version %d\n", media
.ipdata
.meta
.version
);
591 tabprintf(tab
, "uflags 0x%08x\n",
592 media
.ipdata
.meta
.uflags
);
593 if (media
.ipdata
.meta
.rmajor
|| media
.ipdata
.meta
.rminor
) {
594 tabprintf(tab
, "rmajor %d\n",
595 media
.ipdata
.meta
.rmajor
);
596 tabprintf(tab
, "rminor %d\n",
597 media
.ipdata
.meta
.rminor
);
599 tabprintf(tab
, "ctime %s\n",
600 hammer2_time64_to_str(media
.ipdata
.meta
.ctime
, &str
));
601 tabprintf(tab
, "mtime %s\n",
602 hammer2_time64_to_str(media
.ipdata
.meta
.mtime
, &str
));
603 tabprintf(tab
, "atime %s\n",
604 hammer2_time64_to_str(media
.ipdata
.meta
.atime
, &str
));
605 tabprintf(tab
, "btime %s\n",
606 hammer2_time64_to_str(media
.ipdata
.meta
.btime
, &str
));
607 tabprintf(tab
, "uid %s\n",
608 hammer2_uuid_to_str(&media
.ipdata
.meta
.uid
, &str
));
609 tabprintf(tab
, "gid %s\n",
610 hammer2_uuid_to_str(&media
.ipdata
.meta
.gid
, &str
));
611 if (media
.ipdata
.meta
.type
== HAMMER2_OBJTYPE_HARDLINK
)
612 tabprintf(tab
, "type %s (%s)\n",
613 hammer2_iptype_to_str(media
.ipdata
.meta
.type
),
614 hammer2_iptype_to_str(media
.ipdata
.meta
.target_type
));
616 tabprintf(tab
, "type %s\n",
617 hammer2_iptype_to_str(media
.ipdata
.meta
.type
));
618 tabprintf(tab
, "opflgs 0x%02x\n",
619 media
.ipdata
.meta
.op_flags
);
620 tabprintf(tab
, "capflgs 0x%04x\n",
621 media
.ipdata
.meta
.cap_flags
);
622 tabprintf(tab
, "mode %-7o\n",
623 media
.ipdata
.meta
.mode
);
624 tabprintf(tab
, "inum 0x%016jx\n",
625 media
.ipdata
.meta
.inum
);
626 tabprintf(tab
, "size %ju\n",
627 (uintmax_t)media
.ipdata
.meta
.size
);
628 tabprintf(tab
, "nlinks %ju\n",
629 (uintmax_t)media
.ipdata
.meta
.nlinks
);
630 tabprintf(tab
, "iparent 0x%016jx\n",
631 (uintmax_t)media
.ipdata
.meta
.iparent
);
632 tabprintf(tab
, "name_key 0x%016jx\n",
633 (uintmax_t)media
.ipdata
.meta
.name_key
);
634 tabprintf(tab
, "name_len %u\n",
635 media
.ipdata
.meta
.name_len
);
636 tabprintf(tab
, "ncopies %u\n",
637 media
.ipdata
.meta
.ncopies
);
638 tabprintf(tab
, "compalg %u\n",
639 media
.ipdata
.meta
.comp_algo
);
640 tabprintf(tab
, "checkalg %u\n",
641 media
.ipdata
.meta
.check_algo
);
642 if ((media
.ipdata
.meta
.op_flags
& HAMMER2_OPFLAG_PFSROOT
) ||
643 media
.ipdata
.meta
.pfs_type
== HAMMER2_PFSTYPE_SUPROOT
) {
644 tabprintf(tab
, "pfs_type %u (%s)\n",
645 media
.ipdata
.meta
.pfs_type
,
646 hammer2_pfstype_to_str(media
.ipdata
.meta
.pfs_type
));
647 tabprintf(tab
, "pfs_inum 0x%016jx\n",
648 (uintmax_t)media
.ipdata
.meta
.pfs_inum
);
649 tabprintf(tab
, "pfs_clid %s\n",
650 hammer2_uuid_to_str(&media
.ipdata
.meta
.pfs_clid
,
652 tabprintf(tab
, "pfs_fsid %s\n",
653 hammer2_uuid_to_str(&media
.ipdata
.meta
.pfs_fsid
,
655 tabprintf(tab
, "pfs_lsnap_tid 0x%016jx\n",
656 (uintmax_t)media
.ipdata
.meta
.pfs_lsnap_tid
);
658 tabprintf(tab
, "data_quota %ju\n",
659 (uintmax_t)media
.ipdata
.meta
.data_quota
);
660 tabprintf(tab
, "data_count %ju\n",
661 (uintmax_t)bref
->data_count
);
662 tabprintf(tab
, "inode_quota %ju\n",
663 (uintmax_t)media
.ipdata
.meta
.inode_quota
);
664 tabprintf(tab
, "inode_count %ju\n",
665 (uintmax_t)bref
->inode_count
);
667 case HAMMER2_BREF_TYPE_INDIRECT
:
668 bscan
= &media
.npdata
[0];
669 bcount
= bytes
/ sizeof(hammer2_blockref_t
);
673 case HAMMER2_BREF_TYPE_DATA
:
675 if (VerboseOpt
>= 2) {
684 case HAMMER2_BREF_TYPE_VOLUME
:
685 printf("mirror_tid=%016jx freemap_tid=%016jx ",
686 media
.voldata
.mirror_tid
,
687 media
.voldata
.freemap_tid
);
689 bscan
= &media
.voldata
.freemap_blockset
.blockref
[0];
690 bcount
= HAMMER2_SET_COUNT
;
692 bscan
= &media
.voldata
.sroot_blockset
.blockref
[0];
693 bcount
= HAMMER2_SET_COUNT
;
697 case HAMMER2_BREF_TYPE_FREEMAP_LEAF
:
699 for (i
= 0; i
< HAMMER2_FREEMAP_COUNT
; ++i
) {
701 if (media.bmdata[i].class == 0 &&
702 media.bmdata[i].avail == 0) {
706 #if HAMMER2_BMAP_ELEMENTS != 8
707 #error "cmd_debug.c: HAMMER2_BMAP_ELEMENTS expected to be 8"
710 tabprintf(tab
+ 4, "%016jx %04d.%04x (avail=%7d) "
711 "%016jx %016jx %016jx %016jx "
712 "%016jx %016jx %016jx %016jx\n",
714 i
* 256 * HAMMER2_FREEMAP_BLOCK_SIZE
,
715 i
, media
.bmdata
[i
].class,
716 media
.bmdata
[i
].avail
,
717 media
.bmdata
[i
].bitmapq
[0],
718 media
.bmdata
[i
].bitmapq
[1],
719 media
.bmdata
[i
].bitmapq
[2],
720 media
.bmdata
[i
].bitmapq
[3],
721 media
.bmdata
[i
].bitmapq
[4],
722 media
.bmdata
[i
].bitmapq
[5],
723 media
.bmdata
[i
].bitmapq
[6],
724 media
.bmdata
[i
].bitmapq
[7]);
726 tabprintf(tab
, "}\n");
728 case HAMMER2_BREF_TYPE_FREEMAP_NODE
:
730 bscan
= &media
.npdata
[0];
731 bcount
= bytes
/ sizeof(hammer2_blockref_t
);
740 for (i
= 0; i
< bcount
; ++i
) {
741 if (bscan
[i
].type
!= HAMMER2_BREF_TYPE_EMPTY
) {
746 show_bref(fd
, tab
, i
, &bscan
[i
], dofreemap
);
751 if (bref
->type
== HAMMER2_BREF_TYPE_INODE
)
752 tabprintf(tab
, "} (%s.%d, \"%*.*s\")\n",
754 namelen
, namelen
, media
.ipdata
.filename
);
756 tabprintf(tab
, "} (%s.%d)\n", type_str
,bi
);
761 cmd_hash(int ac
, const char **av
)
765 for (i
= 0; i
< ac
; ++i
) {
766 printf("%016jx %s\n", dirhash(av
[i
], strlen(av
[i
])), av
[i
]);
772 cmd_chaindump(const char *path
)
777 fd
= open(path
, O_RDONLY
);
779 ioctl(fd
, HAMMER2IOC_DEBUG_DUMP
, &dummy
);
782 fprintf(stderr
, "unable to open %s\n", path
);
790 tabprintf(int tab
, const char *ctl
, ...)
794 printf("%*.*s", tab
, tab
, "");