[34] | 1 | /* |
---|
| 2 | Xen Store Daemon Test tool |
---|
| 3 | Copyright (C) 2005 Rusty Russell IBM Corporation |
---|
| 4 | |
---|
| 5 | This program is free software; you can redistribute it and/or modify |
---|
| 6 | it under the terms of the GNU General Public License as published by |
---|
| 7 | the Free Software Foundation; either version 2 of the License, or |
---|
| 8 | (at your option) any later version. |
---|
| 9 | |
---|
| 10 | This program is distributed in the hope that it will be useful, |
---|
| 11 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
---|
| 12 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
---|
| 13 | GNU General Public License for more details. |
---|
| 14 | |
---|
| 15 | You should have received a copy of the GNU General Public License |
---|
| 16 | along with this program; if not, write to the Free Software |
---|
| 17 | Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
---|
| 18 | */ |
---|
| 19 | |
---|
| 20 | #define _GNU_SOURCE |
---|
| 21 | #include <stdio.h> |
---|
| 22 | #include <stdlib.h> |
---|
| 23 | #include <sys/types.h> |
---|
| 24 | #include <sys/wait.h> |
---|
| 25 | #include <sys/stat.h> |
---|
| 26 | #include <fcntl.h> |
---|
| 27 | #include <signal.h> |
---|
| 28 | #include <stdint.h> |
---|
| 29 | #include <stdbool.h> |
---|
| 30 | #include <stdlib.h> |
---|
| 31 | #include <sys/mman.h> |
---|
| 32 | #include <fnmatch.h> |
---|
| 33 | #include <stdarg.h> |
---|
| 34 | #include <string.h> |
---|
| 35 | #include <getopt.h> |
---|
| 36 | #include <ctype.h> |
---|
| 37 | #include <sys/time.h> |
---|
| 38 | #include "utils.h" |
---|
| 39 | #include "xs_lib.h" |
---|
| 40 | #include "xs.h" |
---|
| 41 | #include "list.h" |
---|
| 42 | |
---|
| 43 | #define XSTEST |
---|
| 44 | |
---|
| 45 | static struct xs_handle *handles[10] = { NULL }; |
---|
| 46 | static xs_transaction_t txh[10] = { XBT_NULL }; |
---|
| 47 | |
---|
| 48 | static unsigned int timeout_ms = 500; |
---|
| 49 | static bool timeout_suppressed = true; |
---|
| 50 | static bool readonly = false; |
---|
| 51 | static bool print_input = false; |
---|
| 52 | static unsigned int linenum = 0; |
---|
| 53 | |
---|
| 54 | static int daemon_pid; |
---|
| 55 | static struct xenstore_domain_interface *interface; |
---|
| 56 | |
---|
| 57 | /* FIXME: Mark connection as broken (close it?) when this happens. */ |
---|
| 58 | static bool check_indexes(XENSTORE_RING_IDX cons, XENSTORE_RING_IDX prod) |
---|
| 59 | { |
---|
| 60 | return ((prod - cons) <= XENSTORE_RING_SIZE); |
---|
| 61 | } |
---|
| 62 | |
---|
| 63 | static void *get_output_chunk(XENSTORE_RING_IDX cons, |
---|
| 64 | XENSTORE_RING_IDX prod, |
---|
| 65 | char *buf, uint32_t *len) |
---|
| 66 | { |
---|
| 67 | *len = XENSTORE_RING_SIZE - MASK_XENSTORE_IDX(prod); |
---|
| 68 | if ((XENSTORE_RING_SIZE - (prod - cons)) < *len) |
---|
| 69 | *len = XENSTORE_RING_SIZE - (prod - cons); |
---|
| 70 | return buf + MASK_XENSTORE_IDX(prod); |
---|
| 71 | } |
---|
| 72 | |
---|
| 73 | static const void *get_input_chunk(XENSTORE_RING_IDX cons, |
---|
| 74 | XENSTORE_RING_IDX prod, |
---|
| 75 | const char *buf, uint32_t *len) |
---|
| 76 | { |
---|
| 77 | *len = XENSTORE_RING_SIZE - MASK_XENSTORE_IDX(cons); |
---|
| 78 | if ((prod - cons) < *len) |
---|
| 79 | *len = prod - cons; |
---|
| 80 | return buf + MASK_XENSTORE_IDX(cons); |
---|
| 81 | } |
---|
| 82 | |
---|
| 83 | /* FIXME: We spin, and we're sloppy. */ |
---|
| 84 | static bool read_all_shmem(int fd __attribute__((unused)), |
---|
| 85 | void *data, unsigned int len) |
---|
| 86 | { |
---|
| 87 | unsigned int avail; |
---|
| 88 | struct xenstore_domain_interface *intf = interface; |
---|
| 89 | XENSTORE_RING_IDX cons, prod; |
---|
| 90 | const void *src; |
---|
| 91 | |
---|
| 92 | while (len) { |
---|
| 93 | cons = intf->rsp_cons; |
---|
| 94 | prod = intf->rsp_prod; |
---|
| 95 | if (!check_indexes(cons, prod)) |
---|
| 96 | barf("Corrupt buffer"); |
---|
| 97 | |
---|
| 98 | src = get_input_chunk(cons, prod, intf->rsp, &avail); |
---|
| 99 | if (avail > len) |
---|
| 100 | avail = len; |
---|
| 101 | memcpy(data, src, avail); |
---|
| 102 | data += avail; |
---|
| 103 | len -= avail; |
---|
| 104 | intf->rsp_cons += avail; |
---|
| 105 | } |
---|
| 106 | |
---|
| 107 | /* Tell other end we read something. */ |
---|
| 108 | kill(daemon_pid, SIGUSR2); |
---|
| 109 | |
---|
| 110 | return true; |
---|
| 111 | } |
---|
| 112 | |
---|
| 113 | static bool write_all_shmem(int fd __attribute__((unused)), |
---|
| 114 | const void *data, unsigned int len) |
---|
| 115 | { |
---|
| 116 | uint32_t avail; |
---|
| 117 | struct xenstore_domain_interface *intf = interface; |
---|
| 118 | XENSTORE_RING_IDX cons, prod; |
---|
| 119 | void *dst; |
---|
| 120 | |
---|
| 121 | while (len) { |
---|
| 122 | cons = intf->req_cons; |
---|
| 123 | prod = intf->req_prod; |
---|
| 124 | if (!check_indexes(cons, prod)) |
---|
| 125 | barf("Corrupt buffer"); |
---|
| 126 | |
---|
| 127 | dst = get_output_chunk(cons, prod, intf->req, &avail); |
---|
| 128 | if (avail > len) |
---|
| 129 | avail = len; |
---|
| 130 | memcpy(dst, data, avail); |
---|
| 131 | data += avail; |
---|
| 132 | len -= avail; |
---|
| 133 | intf->req_prod += avail; |
---|
| 134 | } |
---|
| 135 | |
---|
| 136 | /* Tell other end we wrote something. */ |
---|
| 137 | kill(daemon_pid, SIGUSR2); |
---|
| 138 | |
---|
| 139 | return true; |
---|
| 140 | } |
---|
| 141 | |
---|
| 142 | static bool read_all(int fd, void *data, unsigned int len); |
---|
| 143 | static bool read_all_choice(int fd, void *data, unsigned int len) |
---|
| 144 | { |
---|
| 145 | if (fd == -2) |
---|
| 146 | return read_all_shmem(fd, data, len); |
---|
| 147 | return read_all(fd, data, len); |
---|
| 148 | } |
---|
| 149 | |
---|
| 150 | static bool write_all_choice(int fd, const void *data, unsigned int len) |
---|
| 151 | { |
---|
| 152 | if (fd == -2) |
---|
| 153 | return write_all_shmem(fd, data, len); |
---|
| 154 | return xs_write_all(fd, data, len); |
---|
| 155 | } |
---|
| 156 | |
---|
| 157 | /* We want access to internal functions. */ |
---|
| 158 | #include "xs.c" |
---|
| 159 | |
---|
| 160 | static void __attribute__((noreturn)) usage(void) |
---|
| 161 | { |
---|
| 162 | barf("Usage:\n" |
---|
| 163 | " xs_test [--readonly] [--no-timeout] [-x]\n" |
---|
| 164 | "Reads commands from stdin, one per line:" |
---|
| 165 | " dir <path>\n" |
---|
| 166 | " read <path>\n" |
---|
| 167 | " write <path> <value>...\n" |
---|
| 168 | " setid <id>\n" |
---|
| 169 | " mkdir <path>\n" |
---|
| 170 | " rm <path>\n" |
---|
| 171 | " getperm <path>\n" |
---|
| 172 | " setperm <path> <id> <flags> ...\n" |
---|
| 173 | " watch <path> <token>\n" |
---|
| 174 | " watchnoack <path> <token>\n" |
---|
| 175 | " waitwatch\n" |
---|
| 176 | " unwatch <path> <token>\n" |
---|
| 177 | " close\n" |
---|
| 178 | " start <node>\n" |
---|
| 179 | " abort\n" |
---|
| 180 | " introduce <domid> <mfn> <eventchn> <path>\n" |
---|
| 181 | " commit\n" |
---|
| 182 | " sleep <milliseconds>\n" |
---|
| 183 | " expect <pattern>\n" |
---|
| 184 | " notimeout\n" |
---|
| 185 | " readonly\n" |
---|
| 186 | " readwrite\n" |
---|
| 187 | " dump\n"); |
---|
| 188 | } |
---|
| 189 | |
---|
| 190 | static int argpos(const char *line, unsigned int num) |
---|
| 191 | { |
---|
| 192 | unsigned int i, len = 0, off = 0; |
---|
| 193 | |
---|
| 194 | for (i = 0; i <= num; i++) { |
---|
| 195 | off += len; |
---|
| 196 | off += strspn(line + off, " \t\n"); |
---|
| 197 | len = strcspn(line + off, " \t\n"); |
---|
| 198 | if (!len) |
---|
| 199 | return off; |
---|
| 200 | } |
---|
| 201 | return off; |
---|
| 202 | } |
---|
| 203 | |
---|
| 204 | static char *arg(const char *line, unsigned int num) |
---|
| 205 | { |
---|
| 206 | static char *args[10]; |
---|
| 207 | unsigned int off, len; |
---|
| 208 | |
---|
| 209 | off = argpos(line, num); |
---|
| 210 | len = strcspn(line + off, " \t\n"); |
---|
| 211 | |
---|
| 212 | if (!len) |
---|
| 213 | barf("Can't get arg %u", num); |
---|
| 214 | |
---|
| 215 | free(args[num]); |
---|
| 216 | args[num] = malloc(len + 1); |
---|
| 217 | memcpy(args[num], line+off, len); |
---|
| 218 | args[num][len] = '\0'; |
---|
| 219 | return args[num]; |
---|
| 220 | } |
---|
| 221 | |
---|
| 222 | struct expect |
---|
| 223 | { |
---|
| 224 | struct list_head list; |
---|
| 225 | char *pattern; |
---|
| 226 | }; |
---|
| 227 | static LIST_HEAD(expects); |
---|
| 228 | |
---|
| 229 | static char *command; |
---|
| 230 | |
---|
| 231 | /* Trim leading and trailing whitespace */ |
---|
| 232 | static void trim(char *str) |
---|
| 233 | { |
---|
| 234 | while (isspace(str[0])) |
---|
| 235 | memmove(str, str+1, strlen(str)); |
---|
| 236 | |
---|
| 237 | while (strlen(str) && isspace(str[strlen(str)-1])) |
---|
| 238 | str[strlen(str)-1] = '\0'; |
---|
| 239 | } |
---|
| 240 | |
---|
| 241 | static void output(const char *fmt, ...) |
---|
| 242 | { |
---|
| 243 | char *str; |
---|
| 244 | struct expect *i; |
---|
| 245 | va_list arglist; |
---|
| 246 | |
---|
| 247 | va_start(arglist, fmt); |
---|
| 248 | vasprintf(&str, fmt, arglist); |
---|
| 249 | va_end(arglist); |
---|
| 250 | |
---|
| 251 | printf("%s", str); |
---|
| 252 | fflush(stdout); |
---|
| 253 | trim(str); |
---|
| 254 | list_for_each_entry(i, &expects, list) { |
---|
| 255 | if (fnmatch(i->pattern, str, 0) == 0) { |
---|
| 256 | list_del(&i->list); |
---|
| 257 | free(i); |
---|
| 258 | return; |
---|
| 259 | } |
---|
| 260 | } |
---|
| 261 | barf("Unexpected output %s\n", str); |
---|
| 262 | } |
---|
| 263 | |
---|
| 264 | static void failed(int handle) |
---|
| 265 | { |
---|
| 266 | if (handle) |
---|
| 267 | output("%i: %s failed: %s\n", |
---|
| 268 | handle, command, strerror(errno)); |
---|
| 269 | else |
---|
| 270 | output("%s failed: %s\n", command, strerror(errno)); |
---|
| 271 | } |
---|
| 272 | |
---|
| 273 | static void expect(const char *line) |
---|
| 274 | { |
---|
| 275 | struct expect *e = malloc(sizeof(*e)); |
---|
| 276 | |
---|
| 277 | e->pattern = strdup(line + argpos(line, 1)); |
---|
| 278 | trim(e->pattern); |
---|
| 279 | list_add(&e->list, &expects); |
---|
| 280 | } |
---|
| 281 | |
---|
| 282 | static void do_dir(unsigned int handle, char *path) |
---|
| 283 | { |
---|
| 284 | char **entries; |
---|
| 285 | unsigned int i, num; |
---|
| 286 | |
---|
| 287 | entries = xs_directory(handles[handle], txh[handle], path, &num); |
---|
| 288 | if (!entries) { |
---|
| 289 | failed(handle); |
---|
| 290 | return; |
---|
| 291 | } |
---|
| 292 | |
---|
| 293 | for (i = 0; i < num; i++) |
---|
| 294 | if (handle) |
---|
| 295 | output("%i:%s\n", handle, entries[i]); |
---|
| 296 | else |
---|
| 297 | output("%s\n", entries[i]); |
---|
| 298 | free(entries); |
---|
| 299 | } |
---|
| 300 | |
---|
| 301 | static void do_read(unsigned int handle, char *path) |
---|
| 302 | { |
---|
| 303 | char *value; |
---|
| 304 | unsigned int len; |
---|
| 305 | |
---|
| 306 | value = xs_read(handles[handle], txh[handle], path, &len); |
---|
| 307 | if (!value) { |
---|
| 308 | failed(handle); |
---|
| 309 | return; |
---|
| 310 | } |
---|
| 311 | |
---|
| 312 | /* It's supposed to nul terminate for us. */ |
---|
| 313 | assert(value[len] == '\0'); |
---|
| 314 | if (handle) |
---|
| 315 | output("%i:%.*s\n", handle, len, value); |
---|
| 316 | else |
---|
| 317 | output("%.*s\n", len, value); |
---|
| 318 | } |
---|
| 319 | |
---|
| 320 | static void do_write(unsigned int handle, char *path, char *data) |
---|
| 321 | { |
---|
| 322 | if (!xs_write(handles[handle], txh[handle], path, data, strlen(data))) |
---|
| 323 | failed(handle); |
---|
| 324 | } |
---|
| 325 | |
---|
| 326 | static void do_setid(unsigned int handle, char *id) |
---|
| 327 | { |
---|
| 328 | if (!xs_bool(xs_debug_command(handles[handle], "setid", id, |
---|
| 329 | strlen(id)+1))) |
---|
| 330 | failed(handle); |
---|
| 331 | } |
---|
| 332 | |
---|
| 333 | static void do_mkdir(unsigned int handle, char *path) |
---|
| 334 | { |
---|
| 335 | if (!xs_mkdir(handles[handle], txh[handle], path)) |
---|
| 336 | failed(handle); |
---|
| 337 | } |
---|
| 338 | |
---|
| 339 | static void do_rm(unsigned int handle, char *path) |
---|
| 340 | { |
---|
| 341 | if (!xs_rm(handles[handle], txh[handle], path)) |
---|
| 342 | failed(handle); |
---|
| 343 | } |
---|
| 344 | |
---|
| 345 | static void do_getperm(unsigned int handle, char *path) |
---|
| 346 | { |
---|
| 347 | unsigned int i, num; |
---|
| 348 | struct xs_permissions *perms; |
---|
| 349 | |
---|
| 350 | perms = xs_get_permissions(handles[handle], txh[handle], path, &num); |
---|
| 351 | if (!perms) { |
---|
| 352 | failed(handle); |
---|
| 353 | return; |
---|
| 354 | } |
---|
| 355 | |
---|
| 356 | for (i = 0; i < num; i++) { |
---|
| 357 | char *permstring; |
---|
| 358 | |
---|
| 359 | switch (perms[i].perms) { |
---|
| 360 | case XS_PERM_NONE: |
---|
| 361 | permstring = "NONE"; |
---|
| 362 | break; |
---|
| 363 | case XS_PERM_WRITE: |
---|
| 364 | permstring = "WRITE"; |
---|
| 365 | break; |
---|
| 366 | case XS_PERM_READ: |
---|
| 367 | permstring = "READ"; |
---|
| 368 | break; |
---|
| 369 | case XS_PERM_READ|XS_PERM_WRITE: |
---|
| 370 | permstring = "READ/WRITE"; |
---|
| 371 | break; |
---|
| 372 | default: |
---|
| 373 | barf("bad perm value %i", perms[i].perms); |
---|
| 374 | } |
---|
| 375 | |
---|
| 376 | if (handle) |
---|
| 377 | output("%i:%i %s\n", handle, perms[i].id, permstring); |
---|
| 378 | else |
---|
| 379 | output("%i %s\n", perms[i].id, permstring); |
---|
| 380 | } |
---|
| 381 | free(perms); |
---|
| 382 | } |
---|
| 383 | |
---|
| 384 | static void do_setperm(unsigned int handle, char *path, char *line) |
---|
| 385 | { |
---|
| 386 | unsigned int i; |
---|
| 387 | struct xs_permissions perms[100]; |
---|
| 388 | |
---|
| 389 | strtok(line, " \t\n"); |
---|
| 390 | strtok(NULL, " \t\n"); |
---|
| 391 | for (i = 0; ; i++) { |
---|
| 392 | char *arg = strtok(NULL, " \t\n"); |
---|
| 393 | if (!arg) |
---|
| 394 | break; |
---|
| 395 | perms[i].id = atoi(arg); |
---|
| 396 | arg = strtok(NULL, " \t\n"); |
---|
| 397 | if (!arg) |
---|
| 398 | break; |
---|
| 399 | if (streq(arg, "WRITE")) |
---|
| 400 | perms[i].perms = XS_PERM_WRITE; |
---|
| 401 | else if (streq(arg, "READ")) |
---|
| 402 | perms[i].perms = XS_PERM_READ; |
---|
| 403 | else if (streq(arg, "READ/WRITE")) |
---|
| 404 | perms[i].perms = XS_PERM_READ|XS_PERM_WRITE; |
---|
| 405 | else if (streq(arg, "NONE")) |
---|
| 406 | perms[i].perms = XS_PERM_NONE; |
---|
| 407 | else |
---|
| 408 | barf("bad flags %s\n", arg); |
---|
| 409 | } |
---|
| 410 | |
---|
| 411 | if (!xs_set_permissions(handles[handle], txh[handle], path, perms, i)) |
---|
| 412 | failed(handle); |
---|
| 413 | } |
---|
| 414 | |
---|
| 415 | static void do_watch(unsigned int handle, const char *node, const char *token, |
---|
| 416 | bool swallow_event) |
---|
| 417 | { |
---|
| 418 | if (!xs_watch(handles[handle], node, token)) |
---|
| 419 | failed(handle); |
---|
| 420 | |
---|
| 421 | /* Convenient for testing... */ |
---|
| 422 | if (swallow_event) { |
---|
| 423 | unsigned int num; |
---|
| 424 | char **vec = xs_read_watch(handles[handle], &num); |
---|
| 425 | if (!vec || |
---|
| 426 | !streq(vec[XS_WATCH_PATH], node) || |
---|
| 427 | !streq(vec[XS_WATCH_TOKEN], token)) |
---|
| 428 | failed(handle); |
---|
| 429 | } |
---|
| 430 | } |
---|
| 431 | |
---|
| 432 | static void set_timeout(void) |
---|
| 433 | { |
---|
| 434 | struct itimerval timeout; |
---|
| 435 | |
---|
| 436 | timeout.it_value.tv_sec = timeout_ms / 1000; |
---|
| 437 | timeout.it_value.tv_usec = (timeout_ms * 1000) % 1000000; |
---|
| 438 | timeout.it_interval.tv_sec = timeout.it_interval.tv_usec = 0; |
---|
| 439 | setitimer(ITIMER_REAL, &timeout, NULL); |
---|
| 440 | } |
---|
| 441 | |
---|
| 442 | static void disarm_timeout(void) |
---|
| 443 | { |
---|
| 444 | struct itimerval timeout; |
---|
| 445 | |
---|
| 446 | timeout.it_value.tv_sec = 0; |
---|
| 447 | timeout.it_value.tv_usec = 0; |
---|
| 448 | setitimer(ITIMER_REAL, &timeout, NULL); |
---|
| 449 | } |
---|
| 450 | |
---|
| 451 | static void do_waitwatch(unsigned int handle) |
---|
| 452 | { |
---|
| 453 | char **vec; |
---|
| 454 | struct timeval tv = {.tv_sec = timeout_ms/1000, |
---|
| 455 | .tv_usec = (timeout_ms*1000)%1000000 }; |
---|
| 456 | fd_set set; |
---|
| 457 | unsigned int num; |
---|
| 458 | |
---|
| 459 | if (xs_fileno(handles[handle]) != -2) { |
---|
| 460 | /* Manually select here so we can time out gracefully. */ |
---|
| 461 | FD_ZERO(&set); |
---|
| 462 | FD_SET(xs_fileno(handles[handle]), &set); |
---|
| 463 | disarm_timeout(); |
---|
| 464 | if (select(xs_fileno(handles[handle])+1, &set, |
---|
| 465 | NULL, NULL, &tv) == 0) { |
---|
| 466 | errno = ETIMEDOUT; |
---|
| 467 | failed(handle); |
---|
| 468 | return; |
---|
| 469 | } |
---|
| 470 | set_timeout(); |
---|
| 471 | } |
---|
| 472 | |
---|
| 473 | vec = xs_read_watch(handles[handle], &num); |
---|
| 474 | if (!vec) { |
---|
| 475 | failed(handle); |
---|
| 476 | return; |
---|
| 477 | } |
---|
| 478 | |
---|
| 479 | if (handle) |
---|
| 480 | output("%i:%s:%s\n", handle, |
---|
| 481 | vec[XS_WATCH_PATH], vec[XS_WATCH_TOKEN]); |
---|
| 482 | else |
---|
| 483 | output("%s:%s\n", vec[XS_WATCH_PATH], vec[XS_WATCH_TOKEN]); |
---|
| 484 | free(vec); |
---|
| 485 | } |
---|
| 486 | |
---|
| 487 | static void do_unwatch(unsigned int handle, const char *node, const char *token) |
---|
| 488 | { |
---|
| 489 | if (!xs_unwatch(handles[handle], node, token)) |
---|
| 490 | failed(handle); |
---|
| 491 | } |
---|
| 492 | |
---|
| 493 | static void do_start(unsigned int handle) |
---|
| 494 | { |
---|
| 495 | txh[handle] = xs_transaction_start(handles[handle]); |
---|
| 496 | if (txh[handle] == XBT_NULL) |
---|
| 497 | failed(handle); |
---|
| 498 | } |
---|
| 499 | |
---|
| 500 | static void do_end(unsigned int handle, bool abort) |
---|
| 501 | { |
---|
| 502 | if (!xs_transaction_end(handles[handle], txh[handle], abort)) |
---|
| 503 | failed(handle); |
---|
| 504 | txh[handle] = XBT_NULL; |
---|
| 505 | } |
---|
| 506 | |
---|
| 507 | static void do_introduce(unsigned int handle, |
---|
| 508 | const char *domid, |
---|
| 509 | const char *mfn, |
---|
| 510 | const char *eventchn, |
---|
| 511 | const char *path) |
---|
| 512 | { |
---|
| 513 | unsigned int i; |
---|
| 514 | int fd; |
---|
| 515 | |
---|
| 516 | /* This mechanism is v. slow w. valgrind running. */ |
---|
| 517 | timeout_ms = 5000; |
---|
| 518 | |
---|
| 519 | /* We poll, so ignore signal */ |
---|
| 520 | signal(SIGUSR2, SIG_IGN); |
---|
| 521 | for (i = 0; i < ARRAY_SIZE(handles); i++) |
---|
| 522 | if (!handles[i]) |
---|
| 523 | break; |
---|
| 524 | |
---|
| 525 | fd = open("/tmp/xcmap", O_RDWR); |
---|
| 526 | /* Set shared comms page. */ |
---|
| 527 | interface = mmap(NULL, getpagesize(), PROT_WRITE|PROT_READ, |
---|
| 528 | MAP_SHARED,fd,0); |
---|
| 529 | if (interface == MAP_FAILED) |
---|
| 530 | barf_perror("Failed to map /tmp/xcmap page"); |
---|
| 531 | close(fd); |
---|
| 532 | |
---|
| 533 | /* Tell them the event channel and our PID. */ |
---|
| 534 | *(int *)((void *)interface + 32) = getpid(); |
---|
| 535 | *(uint16_t *)((void *)interface + 36) = atoi(eventchn); |
---|
| 536 | |
---|
| 537 | if (!xs_introduce_domain(handles[handle], atoi(domid), |
---|
| 538 | atol(mfn), atoi(eventchn))) { |
---|
| 539 | failed(handle); |
---|
| 540 | munmap(interface, getpagesize()); |
---|
| 541 | return; |
---|
| 542 | } |
---|
| 543 | output("handle is %i\n", i); |
---|
| 544 | |
---|
| 545 | /* Create new handle. */ |
---|
| 546 | handles[i] = new(struct xs_handle); |
---|
| 547 | handles[i]->fd = -2; |
---|
| 548 | |
---|
| 549 | /* Read in daemon pid. */ |
---|
| 550 | daemon_pid = *(int *)((void *)interface + 32); |
---|
| 551 | } |
---|
| 552 | |
---|
| 553 | static void do_release(unsigned int handle, const char *domid) |
---|
| 554 | { |
---|
| 555 | if (!xs_release_domain(handles[handle], atoi(domid))) |
---|
| 556 | failed(handle); |
---|
| 557 | } |
---|
| 558 | |
---|
| 559 | static int strptrcmp(const void *a, const void *b) |
---|
| 560 | { |
---|
| 561 | return strcmp(*(char **)a, *(char **)b); |
---|
| 562 | } |
---|
| 563 | |
---|
| 564 | static void sort_dir(char **dir, unsigned int num) |
---|
| 565 | { |
---|
| 566 | qsort(dir, num, sizeof(char *), strptrcmp); |
---|
| 567 | } |
---|
| 568 | |
---|
| 569 | static void dump_dir(unsigned int handle, |
---|
| 570 | const char *node, |
---|
| 571 | char **dir, |
---|
| 572 | unsigned int numdirs, |
---|
| 573 | unsigned int depth) |
---|
| 574 | { |
---|
| 575 | unsigned int i; |
---|
| 576 | char spacing[depth+1]; |
---|
| 577 | |
---|
| 578 | memset(spacing, ' ', depth); |
---|
| 579 | spacing[depth] = '\0'; |
---|
| 580 | |
---|
| 581 | sort_dir(dir, numdirs); |
---|
| 582 | |
---|
| 583 | for (i = 0; i < numdirs; i++) { |
---|
| 584 | struct xs_permissions *perms; |
---|
| 585 | unsigned int j, numperms; |
---|
| 586 | unsigned int len; |
---|
| 587 | char *contents; |
---|
| 588 | unsigned int subnum; |
---|
| 589 | char **subdirs; |
---|
| 590 | char subnode[strlen(node) + 1 + strlen(dir[i]) + 1]; |
---|
| 591 | |
---|
| 592 | sprintf(subnode, "%s/%s", node, dir[i]); |
---|
| 593 | |
---|
| 594 | perms = xs_get_permissions(handles[handle], txh[handle], |
---|
| 595 | subnode,&numperms); |
---|
| 596 | if (!perms) { |
---|
| 597 | failed(handle); |
---|
| 598 | return; |
---|
| 599 | } |
---|
| 600 | |
---|
| 601 | output("%s%s: ", spacing, dir[i]); |
---|
| 602 | for (j = 0; j < numperms; j++) { |
---|
| 603 | char buffer[100]; |
---|
| 604 | if (!xs_perm_to_string(&perms[j], buffer)) |
---|
| 605 | barf("perm to string"); |
---|
| 606 | output("%s ", buffer); |
---|
| 607 | } |
---|
| 608 | free(perms); |
---|
| 609 | output("\n"); |
---|
| 610 | |
---|
| 611 | /* Even directories can have contents. */ |
---|
| 612 | contents = xs_read(handles[handle], txh[handle], |
---|
| 613 | subnode, &len); |
---|
| 614 | if (!contents) { |
---|
| 615 | if (errno != EISDIR) |
---|
| 616 | failed(handle); |
---|
| 617 | } else { |
---|
| 618 | output(" %s(%.*s)\n", spacing, len, contents); |
---|
| 619 | free(contents); |
---|
| 620 | } |
---|
| 621 | |
---|
| 622 | /* Every node is a directory. */ |
---|
| 623 | subdirs = xs_directory(handles[handle], txh[handle], |
---|
| 624 | subnode, &subnum); |
---|
| 625 | if (!subdirs) { |
---|
| 626 | failed(handle); |
---|
| 627 | return; |
---|
| 628 | } |
---|
| 629 | dump_dir(handle, subnode, subdirs, subnum, depth+1); |
---|
| 630 | free(subdirs); |
---|
| 631 | } |
---|
| 632 | } |
---|
| 633 | |
---|
| 634 | static void dump(int handle) |
---|
| 635 | { |
---|
| 636 | char **subdirs; |
---|
| 637 | unsigned int subnum; |
---|
| 638 | |
---|
| 639 | subdirs = xs_directory(handles[handle], txh[handle], "/", &subnum); |
---|
| 640 | if (!subdirs) { |
---|
| 641 | failed(handle); |
---|
| 642 | return; |
---|
| 643 | } |
---|
| 644 | |
---|
| 645 | dump_dir(handle, "", subdirs, subnum, 0); |
---|
| 646 | free(subdirs); |
---|
| 647 | } |
---|
| 648 | |
---|
| 649 | static int handle; |
---|
| 650 | |
---|
| 651 | static void alarmed(int sig __attribute__((unused))) |
---|
| 652 | { |
---|
| 653 | if (handle) { |
---|
| 654 | char handlename[10]; |
---|
| 655 | sprintf(handlename, "%u:", handle); |
---|
| 656 | write(STDOUT_FILENO, handlename, strlen(handlename)); |
---|
| 657 | } |
---|
| 658 | write(STDOUT_FILENO, command, strlen(command)); |
---|
| 659 | write(STDOUT_FILENO, " timeout\n", strlen(" timeout\n")); |
---|
| 660 | exit(1); |
---|
| 661 | } |
---|
| 662 | |
---|
| 663 | static void do_command(unsigned int default_handle, char *line) |
---|
| 664 | { |
---|
| 665 | char *endp; |
---|
| 666 | |
---|
| 667 | if (print_input) |
---|
| 668 | printf("%i> %s", ++linenum, line); |
---|
| 669 | |
---|
| 670 | if (strspn(line, " \n") == strlen(line)) |
---|
| 671 | return; |
---|
| 672 | if (strstarts(line, "#")) |
---|
| 673 | return; |
---|
| 674 | |
---|
| 675 | handle = strtoul(line, &endp, 10); |
---|
| 676 | if (endp != line) |
---|
| 677 | memmove(line, endp+1, strlen(endp)); |
---|
| 678 | else |
---|
| 679 | handle = default_handle; |
---|
| 680 | |
---|
| 681 | command = arg(line, 0); |
---|
| 682 | if (!handles[handle]) { |
---|
| 683 | if (readonly) |
---|
| 684 | handles[handle] = xs_daemon_open_readonly(); |
---|
| 685 | else |
---|
| 686 | handles[handle] = xs_daemon_open(); |
---|
| 687 | if (!handles[handle]) |
---|
| 688 | barf_perror("Opening connection to daemon"); |
---|
| 689 | } |
---|
| 690 | |
---|
| 691 | if (!timeout_suppressed) |
---|
| 692 | set_timeout(); |
---|
| 693 | timeout_suppressed = false; |
---|
| 694 | |
---|
| 695 | if (streq(command, "dir")) |
---|
| 696 | do_dir(handle, arg(line, 1)); |
---|
| 697 | else if (streq(command, "read")) |
---|
| 698 | do_read(handle, arg(line, 1)); |
---|
| 699 | else if (streq(command, "write")) |
---|
| 700 | do_write(handle, arg(line, 1), arg(line, 2)); |
---|
| 701 | else if (streq(command, "setid")) |
---|
| 702 | do_setid(handle, arg(line, 1)); |
---|
| 703 | else if (streq(command, "mkdir")) |
---|
| 704 | do_mkdir(handle, arg(line, 1)); |
---|
| 705 | else if (streq(command, "rm")) |
---|
| 706 | do_rm(handle, arg(line, 1)); |
---|
| 707 | else if (streq(command, "getperm")) |
---|
| 708 | do_getperm(handle, arg(line, 1)); |
---|
| 709 | else if (streq(command, "setperm")) |
---|
| 710 | do_setperm(handle, arg(line, 1), line); |
---|
| 711 | else if (streq(command, "watch")) |
---|
| 712 | do_watch(handle, arg(line, 1), arg(line, 2), true); |
---|
| 713 | else if (streq(command, "watchnoack")) |
---|
| 714 | do_watch(handle, arg(line, 1), arg(line, 2), false); |
---|
| 715 | else if (streq(command, "waitwatch")) |
---|
| 716 | do_waitwatch(handle); |
---|
| 717 | else if (streq(command, "unwatch")) |
---|
| 718 | do_unwatch(handle, arg(line, 1), arg(line, 2)); |
---|
| 719 | else if (streq(command, "close")) { |
---|
| 720 | xs_daemon_close(handles[handle]); |
---|
| 721 | handles[handle] = NULL; |
---|
| 722 | txh[handle] = XBT_NULL; |
---|
| 723 | } else if (streq(command, "start")) |
---|
| 724 | do_start(handle); |
---|
| 725 | else if (streq(command, "commit")) |
---|
| 726 | do_end(handle, false); |
---|
| 727 | else if (streq(command, "abort")) |
---|
| 728 | do_end(handle, true); |
---|
| 729 | else if (streq(command, "introduce")) |
---|
| 730 | do_introduce(handle, arg(line, 1), arg(line, 2), |
---|
| 731 | arg(line, 3), arg(line, 4)); |
---|
| 732 | else if (streq(command, "release")) |
---|
| 733 | do_release(handle, arg(line, 1)); |
---|
| 734 | else if (streq(command, "dump")) |
---|
| 735 | dump(handle); |
---|
| 736 | else if (streq(command, "sleep")) { |
---|
| 737 | disarm_timeout(); |
---|
| 738 | usleep(atoi(arg(line, 1)) * 1000); |
---|
| 739 | } else if (streq(command, "expect")) |
---|
| 740 | expect(line); |
---|
| 741 | else if (streq(command, "notimeout")) |
---|
| 742 | timeout_suppressed = true; |
---|
| 743 | else if (streq(command, "readonly")) { |
---|
| 744 | readonly = true; |
---|
| 745 | xs_daemon_close(handles[handle]); |
---|
| 746 | handles[handle] = NULL; |
---|
| 747 | } else if (streq(command, "readwrite")) { |
---|
| 748 | readonly = false; |
---|
| 749 | xs_daemon_close(handles[handle]); |
---|
| 750 | handles[handle] = NULL; |
---|
| 751 | } else |
---|
| 752 | barf("Unknown command %s", command); |
---|
| 753 | fflush(stdout); |
---|
| 754 | disarm_timeout(); |
---|
| 755 | |
---|
| 756 | /* Check expectations. */ |
---|
| 757 | if (!streq(command, "expect")) { |
---|
| 758 | struct expect *i = list_top(&expects, struct expect, list); |
---|
| 759 | |
---|
| 760 | if (i) |
---|
| 761 | barf("Expected '%s', didn't happen\n", i->pattern); |
---|
| 762 | } |
---|
| 763 | } |
---|
| 764 | |
---|
| 765 | static struct option options[] = { { "readonly", 0, NULL, 'r' }, |
---|
| 766 | { "no-timeout", 0, NULL, 't' }, |
---|
| 767 | { NULL, 0, NULL, 0 } }; |
---|
| 768 | |
---|
| 769 | int main(int argc, char *argv[]) |
---|
| 770 | { |
---|
| 771 | int opt; |
---|
| 772 | char line[1024]; |
---|
| 773 | |
---|
| 774 | while ((opt = getopt_long(argc, argv, "xrt", options, NULL)) != -1) { |
---|
| 775 | switch (opt) { |
---|
| 776 | case 'r': |
---|
| 777 | readonly = true; |
---|
| 778 | break; |
---|
| 779 | case 't': |
---|
| 780 | timeout_ms = 0; |
---|
| 781 | break; |
---|
| 782 | case 'x': |
---|
| 783 | print_input = true; |
---|
| 784 | break; |
---|
| 785 | } |
---|
| 786 | } |
---|
| 787 | |
---|
| 788 | if (optind + 1 == argc) { |
---|
| 789 | int fd = open(argv[optind], O_RDONLY); |
---|
| 790 | if (!fd) |
---|
| 791 | barf_perror("Opening %s", argv[optind]); |
---|
| 792 | dup2(fd, STDIN_FILENO); |
---|
| 793 | } else if (optind != argc) |
---|
| 794 | usage(); |
---|
| 795 | |
---|
| 796 | |
---|
| 797 | signal(SIGALRM, alarmed); |
---|
| 798 | while (fgets(line, sizeof(line), stdin)) |
---|
| 799 | do_command(0, line); |
---|
| 800 | |
---|
| 801 | return 0; |
---|
| 802 | } |
---|
| 803 | |
---|
| 804 | /* |
---|
| 805 | * Local variables: |
---|
| 806 | * c-file-style: "linux" |
---|
| 807 | * indent-tabs-mode: t |
---|
| 808 | * c-indent-level: 8 |
---|
| 809 | * c-basic-offset: 8 |
---|
| 810 | * tab-width: 8 |
---|
| 811 | * End: |
---|
| 812 | */ |
---|