| [34] | 1 | /* |
|---|
| 2 | Xen Store Daemon Test tool |
|---|
| 3 | Copyright (C) 2005 Rusty Russell IBM Corporation |
|---|
| 4 | |
|---|
| 5 | This program is free software; you can redistribute it and/or modify |
|---|
| 6 | it under the terms of the GNU General Public License as published by |
|---|
| 7 | the Free Software Foundation; either version 2 of the License, or |
|---|
| 8 | (at your option) any later version. |
|---|
| 9 | |
|---|
| 10 | This program is distributed in the hope that it will be useful, |
|---|
| 11 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
|---|
| 12 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|---|
| 13 | GNU General Public License for more details. |
|---|
| 14 | |
|---|
| 15 | You should have received a copy of the GNU General Public License |
|---|
| 16 | along with this program; if not, write to the Free Software |
|---|
| 17 | Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
|---|
| 18 | */ |
|---|
| 19 | |
|---|
| 20 | #define _GNU_SOURCE |
|---|
| 21 | #include <stdio.h> |
|---|
| 22 | #include <stdlib.h> |
|---|
| 23 | #include <sys/types.h> |
|---|
| 24 | #include <sys/wait.h> |
|---|
| 25 | #include <sys/stat.h> |
|---|
| 26 | #include <fcntl.h> |
|---|
| 27 | #include <signal.h> |
|---|
| 28 | #include <stdint.h> |
|---|
| 29 | #include <stdbool.h> |
|---|
| 30 | #include <stdlib.h> |
|---|
| 31 | #include <sys/mman.h> |
|---|
| 32 | #include <fnmatch.h> |
|---|
| 33 | #include <stdarg.h> |
|---|
| 34 | #include <string.h> |
|---|
| 35 | #include <getopt.h> |
|---|
| 36 | #include <ctype.h> |
|---|
| 37 | #include <sys/time.h> |
|---|
| 38 | #include "utils.h" |
|---|
| 39 | #include "xs_lib.h" |
|---|
| 40 | #include "xs.h" |
|---|
| 41 | #include "list.h" |
|---|
| 42 | |
|---|
| 43 | #define XSTEST |
|---|
| 44 | |
|---|
| 45 | static struct xs_handle *handles[10] = { NULL }; |
|---|
| 46 | static xs_transaction_t txh[10] = { XBT_NULL }; |
|---|
| 47 | |
|---|
| 48 | static unsigned int timeout_ms = 500; |
|---|
| 49 | static bool timeout_suppressed = true; |
|---|
| 50 | static bool readonly = false; |
|---|
| 51 | static bool print_input = false; |
|---|
| 52 | static unsigned int linenum = 0; |
|---|
| 53 | |
|---|
| 54 | static int daemon_pid; |
|---|
| 55 | static struct xenstore_domain_interface *interface; |
|---|
| 56 | |
|---|
| 57 | /* FIXME: Mark connection as broken (close it?) when this happens. */ |
|---|
| 58 | static bool check_indexes(XENSTORE_RING_IDX cons, XENSTORE_RING_IDX prod) |
|---|
| 59 | { |
|---|
| 60 | return ((prod - cons) <= XENSTORE_RING_SIZE); |
|---|
| 61 | } |
|---|
| 62 | |
|---|
| 63 | static void *get_output_chunk(XENSTORE_RING_IDX cons, |
|---|
| 64 | XENSTORE_RING_IDX prod, |
|---|
| 65 | char *buf, uint32_t *len) |
|---|
| 66 | { |
|---|
| 67 | *len = XENSTORE_RING_SIZE - MASK_XENSTORE_IDX(prod); |
|---|
| 68 | if ((XENSTORE_RING_SIZE - (prod - cons)) < *len) |
|---|
| 69 | *len = XENSTORE_RING_SIZE - (prod - cons); |
|---|
| 70 | return buf + MASK_XENSTORE_IDX(prod); |
|---|
| 71 | } |
|---|
| 72 | |
|---|
| 73 | static const void *get_input_chunk(XENSTORE_RING_IDX cons, |
|---|
| 74 | XENSTORE_RING_IDX prod, |
|---|
| 75 | const char *buf, uint32_t *len) |
|---|
| 76 | { |
|---|
| 77 | *len = XENSTORE_RING_SIZE - MASK_XENSTORE_IDX(cons); |
|---|
| 78 | if ((prod - cons) < *len) |
|---|
| 79 | *len = prod - cons; |
|---|
| 80 | return buf + MASK_XENSTORE_IDX(cons); |
|---|
| 81 | } |
|---|
| 82 | |
|---|
| 83 | /* FIXME: We spin, and we're sloppy. */ |
|---|
| 84 | static bool read_all_shmem(int fd __attribute__((unused)), |
|---|
| 85 | void *data, unsigned int len) |
|---|
| 86 | { |
|---|
| 87 | unsigned int avail; |
|---|
| 88 | struct xenstore_domain_interface *intf = interface; |
|---|
| 89 | XENSTORE_RING_IDX cons, prod; |
|---|
| 90 | const void *src; |
|---|
| 91 | |
|---|
| 92 | while (len) { |
|---|
| 93 | cons = intf->rsp_cons; |
|---|
| 94 | prod = intf->rsp_prod; |
|---|
| 95 | if (!check_indexes(cons, prod)) |
|---|
| 96 | barf("Corrupt buffer"); |
|---|
| 97 | |
|---|
| 98 | src = get_input_chunk(cons, prod, intf->rsp, &avail); |
|---|
| 99 | if (avail > len) |
|---|
| 100 | avail = len; |
|---|
| 101 | memcpy(data, src, avail); |
|---|
| 102 | data += avail; |
|---|
| 103 | len -= avail; |
|---|
| 104 | intf->rsp_cons += avail; |
|---|
| 105 | } |
|---|
| 106 | |
|---|
| 107 | /* Tell other end we read something. */ |
|---|
| 108 | kill(daemon_pid, SIGUSR2); |
|---|
| 109 | |
|---|
| 110 | return true; |
|---|
| 111 | } |
|---|
| 112 | |
|---|
| 113 | static bool write_all_shmem(int fd __attribute__((unused)), |
|---|
| 114 | const void *data, unsigned int len) |
|---|
| 115 | { |
|---|
| 116 | uint32_t avail; |
|---|
| 117 | struct xenstore_domain_interface *intf = interface; |
|---|
| 118 | XENSTORE_RING_IDX cons, prod; |
|---|
| 119 | void *dst; |
|---|
| 120 | |
|---|
| 121 | while (len) { |
|---|
| 122 | cons = intf->req_cons; |
|---|
| 123 | prod = intf->req_prod; |
|---|
| 124 | if (!check_indexes(cons, prod)) |
|---|
| 125 | barf("Corrupt buffer"); |
|---|
| 126 | |
|---|
| 127 | dst = get_output_chunk(cons, prod, intf->req, &avail); |
|---|
| 128 | if (avail > len) |
|---|
| 129 | avail = len; |
|---|
| 130 | memcpy(dst, data, avail); |
|---|
| 131 | data += avail; |
|---|
| 132 | len -= avail; |
|---|
| 133 | intf->req_prod += avail; |
|---|
| 134 | } |
|---|
| 135 | |
|---|
| 136 | /* Tell other end we wrote something. */ |
|---|
| 137 | kill(daemon_pid, SIGUSR2); |
|---|
| 138 | |
|---|
| 139 | return true; |
|---|
| 140 | } |
|---|
| 141 | |
|---|
| 142 | static bool read_all(int fd, void *data, unsigned int len); |
|---|
| 143 | static bool read_all_choice(int fd, void *data, unsigned int len) |
|---|
| 144 | { |
|---|
| 145 | if (fd == -2) |
|---|
| 146 | return read_all_shmem(fd, data, len); |
|---|
| 147 | return read_all(fd, data, len); |
|---|
| 148 | } |
|---|
| 149 | |
|---|
| 150 | static bool write_all_choice(int fd, const void *data, unsigned int len) |
|---|
| 151 | { |
|---|
| 152 | if (fd == -2) |
|---|
| 153 | return write_all_shmem(fd, data, len); |
|---|
| 154 | return xs_write_all(fd, data, len); |
|---|
| 155 | } |
|---|
| 156 | |
|---|
| 157 | /* We want access to internal functions. */ |
|---|
| 158 | #include "xs.c" |
|---|
| 159 | |
|---|
| 160 | static void __attribute__((noreturn)) usage(void) |
|---|
| 161 | { |
|---|
| 162 | barf("Usage:\n" |
|---|
| 163 | " xs_test [--readonly] [--no-timeout] [-x]\n" |
|---|
| 164 | "Reads commands from stdin, one per line:" |
|---|
| 165 | " dir <path>\n" |
|---|
| 166 | " read <path>\n" |
|---|
| 167 | " write <path> <value>...\n" |
|---|
| 168 | " setid <id>\n" |
|---|
| 169 | " mkdir <path>\n" |
|---|
| 170 | " rm <path>\n" |
|---|
| 171 | " getperm <path>\n" |
|---|
| 172 | " setperm <path> <id> <flags> ...\n" |
|---|
| 173 | " watch <path> <token>\n" |
|---|
| 174 | " watchnoack <path> <token>\n" |
|---|
| 175 | " waitwatch\n" |
|---|
| 176 | " unwatch <path> <token>\n" |
|---|
| 177 | " close\n" |
|---|
| 178 | " start <node>\n" |
|---|
| 179 | " abort\n" |
|---|
| 180 | " introduce <domid> <mfn> <eventchn> <path>\n" |
|---|
| 181 | " commit\n" |
|---|
| 182 | " sleep <milliseconds>\n" |
|---|
| 183 | " expect <pattern>\n" |
|---|
| 184 | " notimeout\n" |
|---|
| 185 | " readonly\n" |
|---|
| 186 | " readwrite\n" |
|---|
| 187 | " dump\n"); |
|---|
| 188 | } |
|---|
| 189 | |
|---|
| 190 | static int argpos(const char *line, unsigned int num) |
|---|
| 191 | { |
|---|
| 192 | unsigned int i, len = 0, off = 0; |
|---|
| 193 | |
|---|
| 194 | for (i = 0; i <= num; i++) { |
|---|
| 195 | off += len; |
|---|
| 196 | off += strspn(line + off, " \t\n"); |
|---|
| 197 | len = strcspn(line + off, " \t\n"); |
|---|
| 198 | if (!len) |
|---|
| 199 | return off; |
|---|
| 200 | } |
|---|
| 201 | return off; |
|---|
| 202 | } |
|---|
| 203 | |
|---|
| 204 | static char *arg(const char *line, unsigned int num) |
|---|
| 205 | { |
|---|
| 206 | static char *args[10]; |
|---|
| 207 | unsigned int off, len; |
|---|
| 208 | |
|---|
| 209 | off = argpos(line, num); |
|---|
| 210 | len = strcspn(line + off, " \t\n"); |
|---|
| 211 | |
|---|
| 212 | if (!len) |
|---|
| 213 | barf("Can't get arg %u", num); |
|---|
| 214 | |
|---|
| 215 | free(args[num]); |
|---|
| 216 | args[num] = malloc(len + 1); |
|---|
| 217 | memcpy(args[num], line+off, len); |
|---|
| 218 | args[num][len] = '\0'; |
|---|
| 219 | return args[num]; |
|---|
| 220 | } |
|---|
| 221 | |
|---|
| 222 | struct expect |
|---|
| 223 | { |
|---|
| 224 | struct list_head list; |
|---|
| 225 | char *pattern; |
|---|
| 226 | }; |
|---|
| 227 | static LIST_HEAD(expects); |
|---|
| 228 | |
|---|
| 229 | static char *command; |
|---|
| 230 | |
|---|
| 231 | /* Trim leading and trailing whitespace */ |
|---|
| 232 | static void trim(char *str) |
|---|
| 233 | { |
|---|
| 234 | while (isspace(str[0])) |
|---|
| 235 | memmove(str, str+1, strlen(str)); |
|---|
| 236 | |
|---|
| 237 | while (strlen(str) && isspace(str[strlen(str)-1])) |
|---|
| 238 | str[strlen(str)-1] = '\0'; |
|---|
| 239 | } |
|---|
| 240 | |
|---|
| 241 | static void output(const char *fmt, ...) |
|---|
| 242 | { |
|---|
| 243 | char *str; |
|---|
| 244 | struct expect *i; |
|---|
| 245 | va_list arglist; |
|---|
| 246 | |
|---|
| 247 | va_start(arglist, fmt); |
|---|
| 248 | vasprintf(&str, fmt, arglist); |
|---|
| 249 | va_end(arglist); |
|---|
| 250 | |
|---|
| 251 | printf("%s", str); |
|---|
| 252 | fflush(stdout); |
|---|
| 253 | trim(str); |
|---|
| 254 | list_for_each_entry(i, &expects, list) { |
|---|
| 255 | if (fnmatch(i->pattern, str, 0) == 0) { |
|---|
| 256 | list_del(&i->list); |
|---|
| 257 | free(i); |
|---|
| 258 | return; |
|---|
| 259 | } |
|---|
| 260 | } |
|---|
| 261 | barf("Unexpected output %s\n", str); |
|---|
| 262 | } |
|---|
| 263 | |
|---|
| 264 | static void failed(int handle) |
|---|
| 265 | { |
|---|
| 266 | if (handle) |
|---|
| 267 | output("%i: %s failed: %s\n", |
|---|
| 268 | handle, command, strerror(errno)); |
|---|
| 269 | else |
|---|
| 270 | output("%s failed: %s\n", command, strerror(errno)); |
|---|
| 271 | } |
|---|
| 272 | |
|---|
| 273 | static void expect(const char *line) |
|---|
| 274 | { |
|---|
| 275 | struct expect *e = malloc(sizeof(*e)); |
|---|
| 276 | |
|---|
| 277 | e->pattern = strdup(line + argpos(line, 1)); |
|---|
| 278 | trim(e->pattern); |
|---|
| 279 | list_add(&e->list, &expects); |
|---|
| 280 | } |
|---|
| 281 | |
|---|
| 282 | static void do_dir(unsigned int handle, char *path) |
|---|
| 283 | { |
|---|
| 284 | char **entries; |
|---|
| 285 | unsigned int i, num; |
|---|
| 286 | |
|---|
| 287 | entries = xs_directory(handles[handle], txh[handle], path, &num); |
|---|
| 288 | if (!entries) { |
|---|
| 289 | failed(handle); |
|---|
| 290 | return; |
|---|
| 291 | } |
|---|
| 292 | |
|---|
| 293 | for (i = 0; i < num; i++) |
|---|
| 294 | if (handle) |
|---|
| 295 | output("%i:%s\n", handle, entries[i]); |
|---|
| 296 | else |
|---|
| 297 | output("%s\n", entries[i]); |
|---|
| 298 | free(entries); |
|---|
| 299 | } |
|---|
| 300 | |
|---|
| 301 | static void do_read(unsigned int handle, char *path) |
|---|
| 302 | { |
|---|
| 303 | char *value; |
|---|
| 304 | unsigned int len; |
|---|
| 305 | |
|---|
| 306 | value = xs_read(handles[handle], txh[handle], path, &len); |
|---|
| 307 | if (!value) { |
|---|
| 308 | failed(handle); |
|---|
| 309 | return; |
|---|
| 310 | } |
|---|
| 311 | |
|---|
| 312 | /* It's supposed to nul terminate for us. */ |
|---|
| 313 | assert(value[len] == '\0'); |
|---|
| 314 | if (handle) |
|---|
| 315 | output("%i:%.*s\n", handle, len, value); |
|---|
| 316 | else |
|---|
| 317 | output("%.*s\n", len, value); |
|---|
| 318 | } |
|---|
| 319 | |
|---|
| 320 | static void do_write(unsigned int handle, char *path, char *data) |
|---|
| 321 | { |
|---|
| 322 | if (!xs_write(handles[handle], txh[handle], path, data, strlen(data))) |
|---|
| 323 | failed(handle); |
|---|
| 324 | } |
|---|
| 325 | |
|---|
| 326 | static void do_setid(unsigned int handle, char *id) |
|---|
| 327 | { |
|---|
| 328 | if (!xs_bool(xs_debug_command(handles[handle], "setid", id, |
|---|
| 329 | strlen(id)+1))) |
|---|
| 330 | failed(handle); |
|---|
| 331 | } |
|---|
| 332 | |
|---|
| 333 | static void do_mkdir(unsigned int handle, char *path) |
|---|
| 334 | { |
|---|
| 335 | if (!xs_mkdir(handles[handle], txh[handle], path)) |
|---|
| 336 | failed(handle); |
|---|
| 337 | } |
|---|
| 338 | |
|---|
| 339 | static void do_rm(unsigned int handle, char *path) |
|---|
| 340 | { |
|---|
| 341 | if (!xs_rm(handles[handle], txh[handle], path)) |
|---|
| 342 | failed(handle); |
|---|
| 343 | } |
|---|
| 344 | |
|---|
| 345 | static void do_getperm(unsigned int handle, char *path) |
|---|
| 346 | { |
|---|
| 347 | unsigned int i, num; |
|---|
| 348 | struct xs_permissions *perms; |
|---|
| 349 | |
|---|
| 350 | perms = xs_get_permissions(handles[handle], txh[handle], path, &num); |
|---|
| 351 | if (!perms) { |
|---|
| 352 | failed(handle); |
|---|
| 353 | return; |
|---|
| 354 | } |
|---|
| 355 | |
|---|
| 356 | for (i = 0; i < num; i++) { |
|---|
| 357 | char *permstring; |
|---|
| 358 | |
|---|
| 359 | switch (perms[i].perms) { |
|---|
| 360 | case XS_PERM_NONE: |
|---|
| 361 | permstring = "NONE"; |
|---|
| 362 | break; |
|---|
| 363 | case XS_PERM_WRITE: |
|---|
| 364 | permstring = "WRITE"; |
|---|
| 365 | break; |
|---|
| 366 | case XS_PERM_READ: |
|---|
| 367 | permstring = "READ"; |
|---|
| 368 | break; |
|---|
| 369 | case XS_PERM_READ|XS_PERM_WRITE: |
|---|
| 370 | permstring = "READ/WRITE"; |
|---|
| 371 | break; |
|---|
| 372 | default: |
|---|
| 373 | barf("bad perm value %i", perms[i].perms); |
|---|
| 374 | } |
|---|
| 375 | |
|---|
| 376 | if (handle) |
|---|
| 377 | output("%i:%i %s\n", handle, perms[i].id, permstring); |
|---|
| 378 | else |
|---|
| 379 | output("%i %s\n", perms[i].id, permstring); |
|---|
| 380 | } |
|---|
| 381 | free(perms); |
|---|
| 382 | } |
|---|
| 383 | |
|---|
| 384 | static void do_setperm(unsigned int handle, char *path, char *line) |
|---|
| 385 | { |
|---|
| 386 | unsigned int i; |
|---|
| 387 | struct xs_permissions perms[100]; |
|---|
| 388 | |
|---|
| 389 | strtok(line, " \t\n"); |
|---|
| 390 | strtok(NULL, " \t\n"); |
|---|
| 391 | for (i = 0; ; i++) { |
|---|
| 392 | char *arg = strtok(NULL, " \t\n"); |
|---|
| 393 | if (!arg) |
|---|
| 394 | break; |
|---|
| 395 | perms[i].id = atoi(arg); |
|---|
| 396 | arg = strtok(NULL, " \t\n"); |
|---|
| 397 | if (!arg) |
|---|
| 398 | break; |
|---|
| 399 | if (streq(arg, "WRITE")) |
|---|
| 400 | perms[i].perms = XS_PERM_WRITE; |
|---|
| 401 | else if (streq(arg, "READ")) |
|---|
| 402 | perms[i].perms = XS_PERM_READ; |
|---|
| 403 | else if (streq(arg, "READ/WRITE")) |
|---|
| 404 | perms[i].perms = XS_PERM_READ|XS_PERM_WRITE; |
|---|
| 405 | else if (streq(arg, "NONE")) |
|---|
| 406 | perms[i].perms = XS_PERM_NONE; |
|---|
| 407 | else |
|---|
| 408 | barf("bad flags %s\n", arg); |
|---|
| 409 | } |
|---|
| 410 | |
|---|
| 411 | if (!xs_set_permissions(handles[handle], txh[handle], path, perms, i)) |
|---|
| 412 | failed(handle); |
|---|
| 413 | } |
|---|
| 414 | |
|---|
| 415 | static void do_watch(unsigned int handle, const char *node, const char *token, |
|---|
| 416 | bool swallow_event) |
|---|
| 417 | { |
|---|
| 418 | if (!xs_watch(handles[handle], node, token)) |
|---|
| 419 | failed(handle); |
|---|
| 420 | |
|---|
| 421 | /* Convenient for testing... */ |
|---|
| 422 | if (swallow_event) { |
|---|
| 423 | unsigned int num; |
|---|
| 424 | char **vec = xs_read_watch(handles[handle], &num); |
|---|
| 425 | if (!vec || |
|---|
| 426 | !streq(vec[XS_WATCH_PATH], node) || |
|---|
| 427 | !streq(vec[XS_WATCH_TOKEN], token)) |
|---|
| 428 | failed(handle); |
|---|
| 429 | } |
|---|
| 430 | } |
|---|
| 431 | |
|---|
| 432 | static void set_timeout(void) |
|---|
| 433 | { |
|---|
| 434 | struct itimerval timeout; |
|---|
| 435 | |
|---|
| 436 | timeout.it_value.tv_sec = timeout_ms / 1000; |
|---|
| 437 | timeout.it_value.tv_usec = (timeout_ms * 1000) % 1000000; |
|---|
| 438 | timeout.it_interval.tv_sec = timeout.it_interval.tv_usec = 0; |
|---|
| 439 | setitimer(ITIMER_REAL, &timeout, NULL); |
|---|
| 440 | } |
|---|
| 441 | |
|---|
| 442 | static void disarm_timeout(void) |
|---|
| 443 | { |
|---|
| 444 | struct itimerval timeout; |
|---|
| 445 | |
|---|
| 446 | timeout.it_value.tv_sec = 0; |
|---|
| 447 | timeout.it_value.tv_usec = 0; |
|---|
| 448 | setitimer(ITIMER_REAL, &timeout, NULL); |
|---|
| 449 | } |
|---|
| 450 | |
|---|
| 451 | static void do_waitwatch(unsigned int handle) |
|---|
| 452 | { |
|---|
| 453 | char **vec; |
|---|
| 454 | struct timeval tv = {.tv_sec = timeout_ms/1000, |
|---|
| 455 | .tv_usec = (timeout_ms*1000)%1000000 }; |
|---|
| 456 | fd_set set; |
|---|
| 457 | unsigned int num; |
|---|
| 458 | |
|---|
| 459 | if (xs_fileno(handles[handle]) != -2) { |
|---|
| 460 | /* Manually select here so we can time out gracefully. */ |
|---|
| 461 | FD_ZERO(&set); |
|---|
| 462 | FD_SET(xs_fileno(handles[handle]), &set); |
|---|
| 463 | disarm_timeout(); |
|---|
| 464 | if (select(xs_fileno(handles[handle])+1, &set, |
|---|
| 465 | NULL, NULL, &tv) == 0) { |
|---|
| 466 | errno = ETIMEDOUT; |
|---|
| 467 | failed(handle); |
|---|
| 468 | return; |
|---|
| 469 | } |
|---|
| 470 | set_timeout(); |
|---|
| 471 | } |
|---|
| 472 | |
|---|
| 473 | vec = xs_read_watch(handles[handle], &num); |
|---|
| 474 | if (!vec) { |
|---|
| 475 | failed(handle); |
|---|
| 476 | return; |
|---|
| 477 | } |
|---|
| 478 | |
|---|
| 479 | if (handle) |
|---|
| 480 | output("%i:%s:%s\n", handle, |
|---|
| 481 | vec[XS_WATCH_PATH], vec[XS_WATCH_TOKEN]); |
|---|
| 482 | else |
|---|
| 483 | output("%s:%s\n", vec[XS_WATCH_PATH], vec[XS_WATCH_TOKEN]); |
|---|
| 484 | free(vec); |
|---|
| 485 | } |
|---|
| 486 | |
|---|
| 487 | static void do_unwatch(unsigned int handle, const char *node, const char *token) |
|---|
| 488 | { |
|---|
| 489 | if (!xs_unwatch(handles[handle], node, token)) |
|---|
| 490 | failed(handle); |
|---|
| 491 | } |
|---|
| 492 | |
|---|
| 493 | static void do_start(unsigned int handle) |
|---|
| 494 | { |
|---|
| 495 | txh[handle] = xs_transaction_start(handles[handle]); |
|---|
| 496 | if (txh[handle] == XBT_NULL) |
|---|
| 497 | failed(handle); |
|---|
| 498 | } |
|---|
| 499 | |
|---|
| 500 | static void do_end(unsigned int handle, bool abort) |
|---|
| 501 | { |
|---|
| 502 | if (!xs_transaction_end(handles[handle], txh[handle], abort)) |
|---|
| 503 | failed(handle); |
|---|
| 504 | txh[handle] = XBT_NULL; |
|---|
| 505 | } |
|---|
| 506 | |
|---|
| 507 | static void do_introduce(unsigned int handle, |
|---|
| 508 | const char *domid, |
|---|
| 509 | const char *mfn, |
|---|
| 510 | const char *eventchn, |
|---|
| 511 | const char *path) |
|---|
| 512 | { |
|---|
| 513 | unsigned int i; |
|---|
| 514 | int fd; |
|---|
| 515 | |
|---|
| 516 | /* This mechanism is v. slow w. valgrind running. */ |
|---|
| 517 | timeout_ms = 5000; |
|---|
| 518 | |
|---|
| 519 | /* We poll, so ignore signal */ |
|---|
| 520 | signal(SIGUSR2, SIG_IGN); |
|---|
| 521 | for (i = 0; i < ARRAY_SIZE(handles); i++) |
|---|
| 522 | if (!handles[i]) |
|---|
| 523 | break; |
|---|
| 524 | |
|---|
| 525 | fd = open("/tmp/xcmap", O_RDWR); |
|---|
| 526 | /* Set shared comms page. */ |
|---|
| 527 | interface = mmap(NULL, getpagesize(), PROT_WRITE|PROT_READ, |
|---|
| 528 | MAP_SHARED,fd,0); |
|---|
| 529 | if (interface == MAP_FAILED) |
|---|
| 530 | barf_perror("Failed to map /tmp/xcmap page"); |
|---|
| 531 | close(fd); |
|---|
| 532 | |
|---|
| 533 | /* Tell them the event channel and our PID. */ |
|---|
| 534 | *(int *)((void *)interface + 32) = getpid(); |
|---|
| 535 | *(uint16_t *)((void *)interface + 36) = atoi(eventchn); |
|---|
| 536 | |
|---|
| 537 | if (!xs_introduce_domain(handles[handle], atoi(domid), |
|---|
| 538 | atol(mfn), atoi(eventchn))) { |
|---|
| 539 | failed(handle); |
|---|
| 540 | munmap(interface, getpagesize()); |
|---|
| 541 | return; |
|---|
| 542 | } |
|---|
| 543 | output("handle is %i\n", i); |
|---|
| 544 | |
|---|
| 545 | /* Create new handle. */ |
|---|
| 546 | handles[i] = new(struct xs_handle); |
|---|
| 547 | handles[i]->fd = -2; |
|---|
| 548 | |
|---|
| 549 | /* Read in daemon pid. */ |
|---|
| 550 | daemon_pid = *(int *)((void *)interface + 32); |
|---|
| 551 | } |
|---|
| 552 | |
|---|
| 553 | static void do_release(unsigned int handle, const char *domid) |
|---|
| 554 | { |
|---|
| 555 | if (!xs_release_domain(handles[handle], atoi(domid))) |
|---|
| 556 | failed(handle); |
|---|
| 557 | } |
|---|
| 558 | |
|---|
| 559 | static int strptrcmp(const void *a, const void *b) |
|---|
| 560 | { |
|---|
| 561 | return strcmp(*(char **)a, *(char **)b); |
|---|
| 562 | } |
|---|
| 563 | |
|---|
| 564 | static void sort_dir(char **dir, unsigned int num) |
|---|
| 565 | { |
|---|
| 566 | qsort(dir, num, sizeof(char *), strptrcmp); |
|---|
| 567 | } |
|---|
| 568 | |
|---|
| 569 | static void dump_dir(unsigned int handle, |
|---|
| 570 | const char *node, |
|---|
| 571 | char **dir, |
|---|
| 572 | unsigned int numdirs, |
|---|
| 573 | unsigned int depth) |
|---|
| 574 | { |
|---|
| 575 | unsigned int i; |
|---|
| 576 | char spacing[depth+1]; |
|---|
| 577 | |
|---|
| 578 | memset(spacing, ' ', depth); |
|---|
| 579 | spacing[depth] = '\0'; |
|---|
| 580 | |
|---|
| 581 | sort_dir(dir, numdirs); |
|---|
| 582 | |
|---|
| 583 | for (i = 0; i < numdirs; i++) { |
|---|
| 584 | struct xs_permissions *perms; |
|---|
| 585 | unsigned int j, numperms; |
|---|
| 586 | unsigned int len; |
|---|
| 587 | char *contents; |
|---|
| 588 | unsigned int subnum; |
|---|
| 589 | char **subdirs; |
|---|
| 590 | char subnode[strlen(node) + 1 + strlen(dir[i]) + 1]; |
|---|
| 591 | |
|---|
| 592 | sprintf(subnode, "%s/%s", node, dir[i]); |
|---|
| 593 | |
|---|
| 594 | perms = xs_get_permissions(handles[handle], txh[handle], |
|---|
| 595 | subnode,&numperms); |
|---|
| 596 | if (!perms) { |
|---|
| 597 | failed(handle); |
|---|
| 598 | return; |
|---|
| 599 | } |
|---|
| 600 | |
|---|
| 601 | output("%s%s: ", spacing, dir[i]); |
|---|
| 602 | for (j = 0; j < numperms; j++) { |
|---|
| 603 | char buffer[100]; |
|---|
| 604 | if (!xs_perm_to_string(&perms[j], buffer)) |
|---|
| 605 | barf("perm to string"); |
|---|
| 606 | output("%s ", buffer); |
|---|
| 607 | } |
|---|
| 608 | free(perms); |
|---|
| 609 | output("\n"); |
|---|
| 610 | |
|---|
| 611 | /* Even directories can have contents. */ |
|---|
| 612 | contents = xs_read(handles[handle], txh[handle], |
|---|
| 613 | subnode, &len); |
|---|
| 614 | if (!contents) { |
|---|
| 615 | if (errno != EISDIR) |
|---|
| 616 | failed(handle); |
|---|
| 617 | } else { |
|---|
| 618 | output(" %s(%.*s)\n", spacing, len, contents); |
|---|
| 619 | free(contents); |
|---|
| 620 | } |
|---|
| 621 | |
|---|
| 622 | /* Every node is a directory. */ |
|---|
| 623 | subdirs = xs_directory(handles[handle], txh[handle], |
|---|
| 624 | subnode, &subnum); |
|---|
| 625 | if (!subdirs) { |
|---|
| 626 | failed(handle); |
|---|
| 627 | return; |
|---|
| 628 | } |
|---|
| 629 | dump_dir(handle, subnode, subdirs, subnum, depth+1); |
|---|
| 630 | free(subdirs); |
|---|
| 631 | } |
|---|
| 632 | } |
|---|
| 633 | |
|---|
| 634 | static void dump(int handle) |
|---|
| 635 | { |
|---|
| 636 | char **subdirs; |
|---|
| 637 | unsigned int subnum; |
|---|
| 638 | |
|---|
| 639 | subdirs = xs_directory(handles[handle], txh[handle], "/", &subnum); |
|---|
| 640 | if (!subdirs) { |
|---|
| 641 | failed(handle); |
|---|
| 642 | return; |
|---|
| 643 | } |
|---|
| 644 | |
|---|
| 645 | dump_dir(handle, "", subdirs, subnum, 0); |
|---|
| 646 | free(subdirs); |
|---|
| 647 | } |
|---|
| 648 | |
|---|
| 649 | static int handle; |
|---|
| 650 | |
|---|
| 651 | static void alarmed(int sig __attribute__((unused))) |
|---|
| 652 | { |
|---|
| 653 | if (handle) { |
|---|
| 654 | char handlename[10]; |
|---|
| 655 | sprintf(handlename, "%u:", handle); |
|---|
| 656 | write(STDOUT_FILENO, handlename, strlen(handlename)); |
|---|
| 657 | } |
|---|
| 658 | write(STDOUT_FILENO, command, strlen(command)); |
|---|
| 659 | write(STDOUT_FILENO, " timeout\n", strlen(" timeout\n")); |
|---|
| 660 | exit(1); |
|---|
| 661 | } |
|---|
| 662 | |
|---|
| 663 | static void do_command(unsigned int default_handle, char *line) |
|---|
| 664 | { |
|---|
| 665 | char *endp; |
|---|
| 666 | |
|---|
| 667 | if (print_input) |
|---|
| 668 | printf("%i> %s", ++linenum, line); |
|---|
| 669 | |
|---|
| 670 | if (strspn(line, " \n") == strlen(line)) |
|---|
| 671 | return; |
|---|
| 672 | if (strstarts(line, "#")) |
|---|
| 673 | return; |
|---|
| 674 | |
|---|
| 675 | handle = strtoul(line, &endp, 10); |
|---|
| 676 | if (endp != line) |
|---|
| 677 | memmove(line, endp+1, strlen(endp)); |
|---|
| 678 | else |
|---|
| 679 | handle = default_handle; |
|---|
| 680 | |
|---|
| 681 | command = arg(line, 0); |
|---|
| 682 | if (!handles[handle]) { |
|---|
| 683 | if (readonly) |
|---|
| 684 | handles[handle] = xs_daemon_open_readonly(); |
|---|
| 685 | else |
|---|
| 686 | handles[handle] = xs_daemon_open(); |
|---|
| 687 | if (!handles[handle]) |
|---|
| 688 | barf_perror("Opening connection to daemon"); |
|---|
| 689 | } |
|---|
| 690 | |
|---|
| 691 | if (!timeout_suppressed) |
|---|
| 692 | set_timeout(); |
|---|
| 693 | timeout_suppressed = false; |
|---|
| 694 | |
|---|
| 695 | if (streq(command, "dir")) |
|---|
| 696 | do_dir(handle, arg(line, 1)); |
|---|
| 697 | else if (streq(command, "read")) |
|---|
| 698 | do_read(handle, arg(line, 1)); |
|---|
| 699 | else if (streq(command, "write")) |
|---|
| 700 | do_write(handle, arg(line, 1), arg(line, 2)); |
|---|
| 701 | else if (streq(command, "setid")) |
|---|
| 702 | do_setid(handle, arg(line, 1)); |
|---|
| 703 | else if (streq(command, "mkdir")) |
|---|
| 704 | do_mkdir(handle, arg(line, 1)); |
|---|
| 705 | else if (streq(command, "rm")) |
|---|
| 706 | do_rm(handle, arg(line, 1)); |
|---|
| 707 | else if (streq(command, "getperm")) |
|---|
| 708 | do_getperm(handle, arg(line, 1)); |
|---|
| 709 | else if (streq(command, "setperm")) |
|---|
| 710 | do_setperm(handle, arg(line, 1), line); |
|---|
| 711 | else if (streq(command, "watch")) |
|---|
| 712 | do_watch(handle, arg(line, 1), arg(line, 2), true); |
|---|
| 713 | else if (streq(command, "watchnoack")) |
|---|
| 714 | do_watch(handle, arg(line, 1), arg(line, 2), false); |
|---|
| 715 | else if (streq(command, "waitwatch")) |
|---|
| 716 | do_waitwatch(handle); |
|---|
| 717 | else if (streq(command, "unwatch")) |
|---|
| 718 | do_unwatch(handle, arg(line, 1), arg(line, 2)); |
|---|
| 719 | else if (streq(command, "close")) { |
|---|
| 720 | xs_daemon_close(handles[handle]); |
|---|
| 721 | handles[handle] = NULL; |
|---|
| 722 | txh[handle] = XBT_NULL; |
|---|
| 723 | } else if (streq(command, "start")) |
|---|
| 724 | do_start(handle); |
|---|
| 725 | else if (streq(command, "commit")) |
|---|
| 726 | do_end(handle, false); |
|---|
| 727 | else if (streq(command, "abort")) |
|---|
| 728 | do_end(handle, true); |
|---|
| 729 | else if (streq(command, "introduce")) |
|---|
| 730 | do_introduce(handle, arg(line, 1), arg(line, 2), |
|---|
| 731 | arg(line, 3), arg(line, 4)); |
|---|
| 732 | else if (streq(command, "release")) |
|---|
| 733 | do_release(handle, arg(line, 1)); |
|---|
| 734 | else if (streq(command, "dump")) |
|---|
| 735 | dump(handle); |
|---|
| 736 | else if (streq(command, "sleep")) { |
|---|
| 737 | disarm_timeout(); |
|---|
| 738 | usleep(atoi(arg(line, 1)) * 1000); |
|---|
| 739 | } else if (streq(command, "expect")) |
|---|
| 740 | expect(line); |
|---|
| 741 | else if (streq(command, "notimeout")) |
|---|
| 742 | timeout_suppressed = true; |
|---|
| 743 | else if (streq(command, "readonly")) { |
|---|
| 744 | readonly = true; |
|---|
| 745 | xs_daemon_close(handles[handle]); |
|---|
| 746 | handles[handle] = NULL; |
|---|
| 747 | } else if (streq(command, "readwrite")) { |
|---|
| 748 | readonly = false; |
|---|
| 749 | xs_daemon_close(handles[handle]); |
|---|
| 750 | handles[handle] = NULL; |
|---|
| 751 | } else |
|---|
| 752 | barf("Unknown command %s", command); |
|---|
| 753 | fflush(stdout); |
|---|
| 754 | disarm_timeout(); |
|---|
| 755 | |
|---|
| 756 | /* Check expectations. */ |
|---|
| 757 | if (!streq(command, "expect")) { |
|---|
| 758 | struct expect *i = list_top(&expects, struct expect, list); |
|---|
| 759 | |
|---|
| 760 | if (i) |
|---|
| 761 | barf("Expected '%s', didn't happen\n", i->pattern); |
|---|
| 762 | } |
|---|
| 763 | } |
|---|
| 764 | |
|---|
| 765 | static struct option options[] = { { "readonly", 0, NULL, 'r' }, |
|---|
| 766 | { "no-timeout", 0, NULL, 't' }, |
|---|
| 767 | { NULL, 0, NULL, 0 } }; |
|---|
| 768 | |
|---|
| 769 | int main(int argc, char *argv[]) |
|---|
| 770 | { |
|---|
| 771 | int opt; |
|---|
| 772 | char line[1024]; |
|---|
| 773 | |
|---|
| 774 | while ((opt = getopt_long(argc, argv, "xrt", options, NULL)) != -1) { |
|---|
| 775 | switch (opt) { |
|---|
| 776 | case 'r': |
|---|
| 777 | readonly = true; |
|---|
| 778 | break; |
|---|
| 779 | case 't': |
|---|
| 780 | timeout_ms = 0; |
|---|
| 781 | break; |
|---|
| 782 | case 'x': |
|---|
| 783 | print_input = true; |
|---|
| 784 | break; |
|---|
| 785 | } |
|---|
| 786 | } |
|---|
| 787 | |
|---|
| 788 | if (optind + 1 == argc) { |
|---|
| 789 | int fd = open(argv[optind], O_RDONLY); |
|---|
| 790 | if (!fd) |
|---|
| 791 | barf_perror("Opening %s", argv[optind]); |
|---|
| 792 | dup2(fd, STDIN_FILENO); |
|---|
| 793 | } else if (optind != argc) |
|---|
| 794 | usage(); |
|---|
| 795 | |
|---|
| 796 | |
|---|
| 797 | signal(SIGALRM, alarmed); |
|---|
| 798 | while (fgets(line, sizeof(line), stdin)) |
|---|
| 799 | do_command(0, line); |
|---|
| 800 | |
|---|
| 801 | return 0; |
|---|
| 802 | } |
|---|
| 803 | |
|---|
| 804 | /* |
|---|
| 805 | * Local variables: |
|---|
| 806 | * c-file-style: "linux" |
|---|
| 807 | * indent-tabs-mode: t |
|---|
| 808 | * c-indent-level: 8 |
|---|
| 809 | * c-basic-offset: 8 |
|---|
| 810 | * tab-width: 8 |
|---|
| 811 | * End: |
|---|
| 812 | */ |
|---|