/* Unix SMB/CIFS implementation. generic testing tool - version with SMB2 support Copyright (C) Andrew Tridgell 2003-2008 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ #include "includes.h" #include "lib/cmdline/popt_common.h" #include "lib/events/events.h" #include "system/time.h" #include "system/filesys.h" #include "libcli/raw/request.h" #include "libcli/libcli.h" #include "libcli/raw/libcliraw.h" #include "libcli/smb2/smb2.h" #include "libcli/smb2/smb2_calls.h" #include "librpc/gen_ndr/security.h" #include "auth/credentials/credentials.h" #include "libcli/resolve/resolve.h" #include "auth/gensec/gensec.h" #include "param/param.h" #include "dynconfig.h" #define NSERVERS 2 #define NINSTANCES 2 /* global options */ static struct gentest_options { int showall; int analyze; int analyze_always; int analyze_continuous; uint_t max_open_handles; uint_t seed; uint_t numops; int use_oplocks; char **ignore_patterns; const char *seeds_file; int use_preset_seeds; int fast_reconnect; int mask_indexing; int no_eas; int skip_cleanup; } options; /* mapping between open handles on the server and local handles */ static struct { bool active; uint_t instance; struct smb2_handle server_handle[NSERVERS]; const char *name; } *open_handles; static uint_t num_open_handles; /* state information for the servers. We open NINSTANCES connections to each server */ static struct { struct smb2_tree *tree[NINSTANCES]; char *server_name; char *share_name; struct cli_credentials *credentials; } servers[NSERVERS]; /* the seeds and flags for each operation */ static struct { uint_t seed; bool disabled; } *op_parms; /* oplock break info */ static struct { bool got_break; struct smb2_handle server_handle; uint16_t handle; uint8_t level; bool do_close; } oplocks[NSERVERS][NINSTANCES]; /* change notify reply info */ static struct { int notify_count; NTSTATUS status; union smb_notify notify; } notifies[NSERVERS][NINSTANCES]; /* info relevant to the current operation */ static struct { const char *name; uint_t seed; NTSTATUS status; uint_t opnum; TALLOC_CTX *mem_ctx; } current_op; static struct smb2_handle bad_smb2_handle; #define BAD_HANDLE 0xFFFE static bool oplock_handler(struct smb2_transport *transport, const struct smb2_handle *handle, uint8_t level, void *private_data); static void idle_func(struct smb2_transport *transport, void *private); /* check if a string should be ignored. This is used as the basis for all error ignore settings */ static bool ignore_pattern(const char *str) { int i; if (!options.ignore_patterns) return false; for (i=0;options.ignore_patterns[i];i++) { if (strcmp(options.ignore_patterns[i], str) == 0 || gen_fnmatch(options.ignore_patterns[i], str) == 0) { DEBUG(2,("Ignoring '%s'\n", str)); return true; } } return false; } /***************************************************** connect to the servers *******************************************************/ static bool connect_servers_fast(void) { int h, i; /* close all open files */ for (h=0;husername, j); cli_credentials_set_workstation(servers[i].credentials, "gentest", CRED_SPECIFIED); status = smb2_connect(NULL, servers[i].server_name, servers[i].share_name, lp_resolve_context(lp_ctx), servers[i].credentials, &servers[i].tree[j], ev); if (!NT_STATUS_IS_OK(status)) { printf("Failed to connect to \\\\%s\\%s - %s\n", servers[i].server_name, servers[i].share_name, nt_errstr(status)); return false; } servers[i].tree[j]->session->transport->oplock.handler = oplock_handler; servers[i].tree[j]->session->transport->oplock.private_data = (void *)(uintptr_t)((i<<8)|j); smb2_transport_idle_handler(servers[i].tree[j]->session->transport, idle_func, 50000, NULL); } } return true; } /* work out the time skew between the servers - be conservative */ static uint_t time_skew(void) { uint_t ret; ret = labs(servers[0].tree[0]->session->transport->negotiate.system_time - servers[1].tree[0]->session->transport->negotiate.system_time); return ret + 300; } static bool smb2_handle_equal(const struct smb2_handle *h1, const struct smb2_handle *h2) { return memcmp(h1, h2, sizeof(struct smb2_handle)) == 0; } /* turn a server handle into a local handle */ static uint_t fnum_to_handle(int server, int instance, struct smb2_handle server_handle) { uint_t i; for (i=0;i 0 && count++ < 10*options.max_open_handles) { h = random() % options.max_open_handles; if (open_handles[h].active && open_handles[h].instance == instance) { return h; } } return BAD_HANDLE; } /* return a file handle, but skewed so we don't close the last couple of handles too readily */ static uint16_t gen_fnum_close(int instance) { if (num_open_handles < 5) { if (gen_chance(90)) return BAD_HANDLE; } return gen_fnum(instance); } /* generate an integer in a specified range */ static int gen_int_range(uint64_t min, uint64_t max) { uint_t r = random(); return min + (r % (1+max-min)); } /* return a fnum for use as a root fid be careful to call GEN_SET_FNUM() when you use this! */ static uint16_t gen_root_fid(int instance) { if (gen_chance(5)) return gen_fnum(instance); return 0; } /* generate a file offset */ static int gen_offset(void) { if (gen_chance(20)) return 0; // if (gen_chance(5)) return gen_int_range(0, 0xFFFFFFFF); return gen_int_range(0, 1024*1024); } /* generate a io count */ static int gen_io_count(void) { if (gen_chance(20)) return 0; // if (gen_chance(5)) return gen_int_range(0, 0xFFFFFFFF); return gen_int_range(0, 4096); } /* generate a filename */ static const char *gen_fname(void) { const char *names[] = {"gentest\\gentest.dat", "gentest\\foo", "gentest\\foo2.sym", "gentest\\foo3.dll", "gentest\\foo4", "gentest\\foo4:teststream1", "gentest\\foo4:teststream2", "gentest\\foo5.exe", "gentest\\foo5.exe:teststream3", "gentest\\foo5.exe:teststream4", "gentest\\foo6.com", "gentest\\blah", "gentest\\blah\\blergh.txt", "gentest\\blah\\blergh2", "gentest\\blah\\blergh3.txt", "gentest\\blah\\blergh4", "gentest\\blah\\blergh5.txt", "gentest\\blah\\blergh5", "gentest\\blah\\.", #if 0 /* this causes problem with w2k3 */ "gentest\\blah\\..", #endif "gentest\\a_very_long_name.bin", "gentest\\x.y", "gentest\\blah"}; int i; do { i = gen_int_range(0, ARRAY_SIZE(names)-1); } while (ignore_pattern(names[i])); return names[i]; } /* generate a filename with a higher chance of choosing an already open file */ static const char *gen_fname_open(int instance) { uint16_t h; h = gen_fnum(instance); if (h == BAD_HANDLE) { return gen_fname(); } return open_handles[h].name; } /* generate a wildcard pattern */ static const char *gen_pattern(void) { int i; const char *names[] = {"gentest\\*.dat", "gentest\\*", "gentest\\*.*", "gentest\\blah\\*.*", "gentest\\blah\\*", "gentest\\?"}; if (gen_chance(50)) return gen_fname(); do { i = gen_int_range(0, ARRAY_SIZE(names)-1); } while (ignore_pattern(names[i])); return names[i]; } static uint32_t gen_bits_levels(int nlevels, ...) { va_list ap; uint32_t pct; uint32_t mask; int i; va_start(ap, nlevels); for (i=0;iasync.fn = oplock_handler_ack_callback; req->async.private_data = NULL; return true; } /* the oplock handler will either ack the break or close the file */ static bool oplock_handler(struct smb2_transport *transport, const struct smb2_handle *handle, uint8_t level, void *private_data) { struct smb2_close io; unsigned i, j; bool do_close; struct smb2_tree *tree = NULL; struct smb2_request *req; srandom(current_op.seed); do_close = gen_chance(50); i = ((uintptr_t)private_data) >> 8; j = ((uintptr_t)private_data) & 0xFF; if (i >= NSERVERS || j >= NINSTANCES) { printf("Bad private_data in oplock_handler\n"); return false; } oplocks[i][j].got_break = true; oplocks[i][j].server_handle = *handle; oplocks[i][j].handle = fnum_to_handle(i, j, *handle); oplocks[i][j].level = level; oplocks[i][j].do_close = do_close; tree = talloc_get_type(servers[i].tree[j], struct smb2_tree); if (!tree) { printf("Oplock break not for one of our trees!?\n"); return false; } if (!do_close) { printf("oplock ack handle=%d\n", oplocks[i][j].handle); return send_oplock_ack(tree, *handle, level); } printf("oplock close fnum=%d\n", oplocks[i][j].handle); ZERO_STRUCT(io); io.in.file.handle = *handle; io.in.flags = 0; req = smb2_close_send(tree, &io); if (req == NULL) { printf("WARNING: close failed in oplock_handler_close\n"); return false; } req->async.fn = oplock_handler_close_recv; req->async.private_data = NULL; return true; } /* the idle function tries to cope with getting an oplock break on a connection, and an operation on another connection blocking until that break is acked we check for operations on all transports in the idle function */ static void idle_func(struct smb2_transport *transport, void *private) { int i, j; for (i=0;isession->transport) { // smb2_transport_process(servers[i].tree[j]->session->transport); } } } } /* compare NTSTATUS, using checking ignored patterns */ static bool compare_status(NTSTATUS status1, NTSTATUS status2) { if (NT_STATUS_EQUAL(status1, status2)) return true; /* one code being an error and the other OK is always an error */ if (NT_STATUS_IS_OK(status1) || NT_STATUS_IS_OK(status2)) return false; /* if we are ignoring one of the status codes then consider this a match */ if (ignore_pattern(nt_errstr(status1)) || ignore_pattern(nt_errstr(status2))) { return true; } return false; } #if 0 /* check for pending packets on all connections */ static void check_pending(void) { int i, j; msleep(20); for (j=0;jsession->transport); } } } #endif /* check that the same oplock breaks have been received by all instances */ static bool check_oplocks(const char *call) { #if 0 int i, j; int tries = 0; again: check_pending(); for (j=0;j time_skew() && \ !ignore_pattern(#field)) { \ printf("Mismatch in %s - 0x%x 0x%x\n", #field, \ (int)nt_time_to_unix(parm[0].field), \ (int)nt_time_to_unix(parm[1].field)); \ return false; \ } \ } while(0) /* generate ntcreatex operations */ static bool handler_create(int instance) { struct smb2_create parm[NSERVERS]; NTSTATUS status[NSERVERS]; ZERO_STRUCT(parm[0]); parm[0].in.security_flags = gen_bits_levels(3, 90, 0x0, 70, 0x3, 100, 0xFF); parm[0].in.oplock_level = gen_bits_levels(3, 90, 0x0, 70, 0x9, 100, 0xFF); parm[0].in.impersonation_level = gen_bits_levels(3, 90, 0x0, 70, 0x3, 100, 0xFFFFFFFF); parm[0].in.create_flags = gen_bits_levels(2, 90, 0x0, 100, 0xFFFFFFFF); if (gen_chance(2)) { parm[0].in.create_flags |= gen_bits_mask(0xFFFFFFFF); } parm[0].in.reserved = gen_reserved64(); parm[0].in.desired_access = gen_access_mask(); parm[0].in.file_attributes = gen_attrib(); parm[0].in.share_access = gen_bits_mask2(0x7, 0xFFFFFFFF); parm[0].in.create_disposition = gen_open_disp(); parm[0].in.create_options = gen_create_options(); parm[0].in.fname = gen_fname_open(instance); parm[0].in.eas = gen_ea_list(); if (!options.use_oplocks) { /* mask out oplocks */ parm[0].in.oplock_level = 0; } GEN_COPY_PARM; GEN_CALL(smb2_create(tree, current_op.mem_ctx, &parm[i])); CHECK_EQUAL(out.oplock_level); CHECK_EQUAL(out.reserved); CHECK_EQUAL(out.create_action); CHECK_NTTIMES_EQUAL(out.create_time); CHECK_NTTIMES_EQUAL(out.access_time); CHECK_NTTIMES_EQUAL(out.write_time); CHECK_NTTIMES_EQUAL(out.change_time); CHECK_EQUAL(out.alloc_size); CHECK_EQUAL(out.size); CHECK_ATTRIB(out.file_attr); CHECK_EQUAL(out.reserved2); /* ntcreatex creates a new file handle */ ADD_HANDLE(parm[0].in.fname, out.file.handle); return true; } /* generate close operations */ static bool handler_close(int instance) { struct smb2_close parm[NSERVERS]; NTSTATUS status[NSERVERS]; ZERO_STRUCT(parm[0]); parm[0].in.file.handle.data[0] = gen_fnum_close(instance); parm[0].in.flags = gen_bits_mask2(0x1, 0xFFFF); GEN_COPY_PARM; GEN_SET_FNUM(in.file.handle); GEN_CALL(smb2_close(tree, &parm[i])); CHECK_EQUAL(out.flags); CHECK_EQUAL(out._pad); CHECK_NTTIMES_EQUAL(out.create_time); CHECK_NTTIMES_EQUAL(out.access_time); CHECK_NTTIMES_EQUAL(out.write_time); CHECK_NTTIMES_EQUAL(out.change_time); CHECK_EQUAL(out.alloc_size); CHECK_EQUAL(out.size); CHECK_ATTRIB(out.file_attr); REMOVE_HANDLE(in.file.handle); return true; } /* generate read operations */ static bool handler_read(int instance) { struct smb2_read parm[NSERVERS]; NTSTATUS status[NSERVERS]; parm[0].in.file.handle.data[0] = gen_fnum(instance); parm[0].in.reserved = gen_reserved8(); parm[0].in.length = gen_io_count(); parm[0].in.offset = gen_offset(); parm[0].in.min_count = gen_io_count(); parm[0].in.channel = gen_bits_mask2(0x0, 0xFFFFFFFF); parm[0].in.remaining = gen_bits_mask2(0x0, 0xFFFFFFFF); parm[0].in.channel_offset = gen_bits_mask2(0x0, 0xFFFF); parm[0].in.channel_length = gen_bits_mask2(0x0, 0xFFFF); GEN_COPY_PARM; GEN_SET_FNUM(in.file.handle); GEN_CALL(smb2_read(tree, current_op.mem_ctx, &parm[i])); CHECK_EQUAL(out.remaining); CHECK_EQUAL(out.reserved); CHECK_EQUAL(out.data.length); return true; } /* generate write operations */ static bool handler_write(int instance) { struct smb2_write parm[NSERVERS]; NTSTATUS status[NSERVERS]; parm[0].in.file.handle.data[0] = gen_fnum(instance); parm[0].in.offset = gen_offset(); parm[0].in.unknown1 = gen_bits_mask2(0, 0xFFFFFFFF); parm[0].in.unknown2 = gen_bits_mask2(0, 0xFFFFFFFF); parm[0].in.data = data_blob_talloc(current_op.mem_ctx, NULL, gen_io_count()); GEN_COPY_PARM; GEN_SET_FNUM(in.file.handle); GEN_CALL(smb2_write(tree, &parm[i])); CHECK_EQUAL(out._pad); CHECK_EQUAL(out.nwritten); CHECK_EQUAL(out.unknown1); return true; } /* generate lockingx operations */ static bool handler_lock(int instance) { struct smb2_lock parm[NSERVERS]; NTSTATUS status[NSERVERS]; int n; parm[0].level = RAW_LOCK_LOCKX; parm[0].in.file.handle.data[0] = gen_fnum(instance); parm[0].in.lock_count = gen_lock_count(); parm[0].in.reserved = gen_reserved32(); parm[0].in.locks = talloc_array(current_op.mem_ctx, struct smb2_lock_element, parm[0].in.lock_count); for (n=0;nsession->transport)); return true; } /* generate a fileinfo query structure */ static void gen_fileinfo(int instance, union smb_fileinfo *info) { int i; #define LVL(v) {RAW_FILEINFO_ ## v, "RAW_FILEINFO_" #v} struct { enum smb_fileinfo_level level; const char *name; } levels[] = { LVL(BASIC_INFORMATION), LVL(STANDARD_INFORMATION), LVL(INTERNAL_INFORMATION), LVL(EA_INFORMATION), LVL(ACCESS_INFORMATION), LVL(NAME_INFORMATION), LVL(POSITION_INFORMATION), LVL(MODE_INFORMATION), LVL(ALIGNMENT_INFORMATION), LVL(SMB2_ALL_INFORMATION), LVL(ALT_NAME_INFORMATION), LVL(STREAM_INFORMATION), LVL(COMPRESSION_INFORMATION), LVL(NETWORK_OPEN_INFORMATION), LVL(ATTRIBUTE_TAG_INFORMATION), LVL(SMB2_ALL_EAS), LVL(SMB2_ALL_INFORMATION), }; do { i = gen_int_range(0, ARRAY_SIZE(levels)-1); } while (ignore_pattern(levels[i].name)); info->generic.level = levels[i].level; } /* compare returned fileinfo structures */ static bool cmp_fileinfo(int instance, union smb_fileinfo parm[NSERVERS], NTSTATUS status[NSERVERS]) { int i; switch (parm[0].generic.level) { case RAW_FILEINFO_GENERIC: return false; /* SMB1 specific values */ case RAW_FILEINFO_GETATTR: case RAW_FILEINFO_GETATTRE: case RAW_FILEINFO_STANDARD: case RAW_FILEINFO_EA_SIZE: case RAW_FILEINFO_ALL_EAS: case RAW_FILEINFO_IS_NAME_VALID: case RAW_FILEINFO_BASIC_INFO: case RAW_FILEINFO_STANDARD_INFO: case RAW_FILEINFO_EA_INFO: case RAW_FILEINFO_NAME_INFO: case RAW_FILEINFO_ALL_INFO: case RAW_FILEINFO_ALT_NAME_INFO: case RAW_FILEINFO_STREAM_INFO: case RAW_FILEINFO_COMPRESSION_INFO: return false; case RAW_FILEINFO_BASIC_INFORMATION: CHECK_NTTIMES_EQUAL(basic_info.out.create_time); CHECK_NTTIMES_EQUAL(basic_info.out.access_time); CHECK_NTTIMES_EQUAL(basic_info.out.write_time); CHECK_NTTIMES_EQUAL(basic_info.out.change_time); CHECK_ATTRIB(basic_info.out.attrib); break; case RAW_FILEINFO_STANDARD_INFORMATION: CHECK_EQUAL(standard_info.out.alloc_size); CHECK_EQUAL(standard_info.out.size); CHECK_EQUAL(standard_info.out.nlink); CHECK_EQUAL(standard_info.out.delete_pending); CHECK_EQUAL(standard_info.out.directory); break; case RAW_FILEINFO_EA_INFORMATION: CHECK_EQUAL(ea_info.out.ea_size); break; case RAW_FILEINFO_NAME_INFORMATION: CHECK_WSTR_EQUAL(name_info.out.fname); break; case RAW_FILEINFO_ALT_NAME_INFORMATION: CHECK_WSTR_EQUAL(alt_name_info.out.fname); break; case RAW_FILEINFO_STREAM_INFORMATION: CHECK_EQUAL(stream_info.out.num_streams); for (i=0;igeneric.level = levels[i].level; switch (info->generic.level) { case RAW_SFILEINFO_SETATTR: case RAW_SFILEINFO_SETATTRE: case RAW_SFILEINFO_STANDARD: case RAW_SFILEINFO_EA_SET: case RAW_SFILEINFO_BASIC_INFO: case RAW_SFILEINFO_DISPOSITION_INFO: case RAW_SFILEINFO_END_OF_FILE_INFO: case RAW_SFILEINFO_ALLOCATION_INFO: break; case RAW_SFILEINFO_BASIC_INFORMATION: info->basic_info.in.create_time = gen_nttime(); info->basic_info.in.access_time = gen_nttime(); info->basic_info.in.write_time = gen_nttime(); info->basic_info.in.change_time = gen_nttime(); info->basic_info.in.attrib = gen_attrib(); break; case RAW_SFILEINFO_DISPOSITION_INFORMATION: info->disposition_info.in.delete_on_close = gen_bool(); break; case RAW_SFILEINFO_ALLOCATION_INFORMATION: info->allocation_info.in.alloc_size = gen_alloc_size(); break; case RAW_SFILEINFO_END_OF_FILE_INFORMATION: info->end_of_file_info.in.size = gen_offset(); break; case RAW_SFILEINFO_RENAME_INFORMATION: case RAW_SFILEINFO_RENAME_INFORMATION_SMB2: info->rename_information.in.overwrite = gen_bool(); info->rename_information.in.root_fid = gen_root_fid(instance); info->rename_information.in.new_name = gen_fname_open(instance); break; case RAW_SFILEINFO_POSITION_INFORMATION: info->position_information.in.position = gen_offset(); break; case RAW_SFILEINFO_MODE_INFORMATION: info->mode_information.in.mode = gen_bits_mask(0xFFFFFFFF); break; case RAW_SFILEINFO_GENERIC: case RAW_SFILEINFO_SEC_DESC: case RAW_SFILEINFO_1023: case RAW_SFILEINFO_1025: case RAW_SFILEINFO_1029: case RAW_SFILEINFO_1032: case RAW_SFILEINFO_1039: case RAW_SFILEINFO_1040: case RAW_SFILEINFO_UNIX_BASIC: case RAW_SFILEINFO_UNIX_INFO2: case RAW_SFILEINFO_UNIX_LINK: case RAW_SFILEINFO_UNIX_HLINK: /* Untested */ break; } } /* generate setfileinfo operations */ static bool handler_sfileinfo(int instance) { union smb_setfileinfo parm[NSERVERS]; NTSTATUS status[NSERVERS]; parm[0].generic.in.file.fnum = gen_fnum(instance); gen_setfileinfo(instance, &parm[0]); GEN_COPY_PARM; GEN_SET_FNUM(generic.in.file.handle); GEN_CALL(smb2_setinfo_file(tree, &parm[i])); return true; } /* wipe any relevant files */ static void wipe_files(void) { int i; NTSTATUS status; if (options.skip_cleanup) { return; } for (i=0;i 0) { printf("Deleted %d files on server %d\n", n, i); } } } /* dump the current seeds - useful for continuing a backtrack */ static void dump_seeds(void) { int i; FILE *f; if (!options.seeds_file) { return; } f = fopen("seeds.tmp", "w"); if (!f) return; for (i=0;i 0 && base+chunk < options.numops && options.numops > 1; ) { int i, max; chunk = MIN(chunk, options.numops / 2); /* mark this range as disabled */ max = MIN(options.numops, base+chunk); for (i=base;i 0); printf("Reduced to %d ops\n", options.numops); ret = run_test(ev, lp_ctx); if (ret != options.numops - 1) { printf("Inconsistent result? ret=%d numops=%d\n", ret, options.numops); } } /* start the main gentest process */ static bool start_gentest(struct event_context *ev, struct loadparm_context *lp_ctx) { int op; int ret; /* allocate the open_handles array */ open_handles = calloc(options.max_open_handles, sizeof(open_handles[0])); srandom(options.seed); op_parms = calloc(options.numops, sizeof(op_parms[0])); /* generate the seeds - after this everything is deterministic */ if (options.use_preset_seeds) { int numops; char **preset = file_lines_load(options.seeds_file, &numops, NULL); if (!preset) { printf("Failed to load %s - %s\n", options.seeds_file, strerror(errno)); exit(1); } if (numops < options.numops) { options.numops = numops; } for (op=0;op "); lp_ctx = cmdline_lp_ctx; servers[0].credentials = cli_credentials_init(talloc_autofree_context()); servers[1].credentials = cli_credentials_init(talloc_autofree_context()); cli_credentials_guess(servers[0].credentials, lp_ctx); cli_credentials_guess(servers[1].credentials, lp_ctx); while((opt = poptGetNextOpt(pc)) != -1) { switch (opt) { case OPT_UNCLIST: lp_set_cmdline(cmdline_lp_ctx, "torture:unclist", poptGetOptArg(pc)); break; case 'U': if (username_count == 2) { usage(pc); exit(1); } cli_credentials_parse_string(servers[username_count].credentials, poptGetOptArg(pc), CRED_SPECIFIED); username_count++; break; } } if (ignore_file) { options.ignore_patterns = file_lines_load(ignore_file, NULL, NULL); } argv_new = discard_const_p(char *, poptGetArgs(pc)); argc_new = argc; for (i=0; i= 3)) { usage(pc); exit(1); } setlinebuf(stdout); setup_logging("gentest", DEBUG_STDOUT); if (argc < 3 || argv[1][0] == '-') { usage(pc); exit(1); } setup_logging(argv[0], DEBUG_STDOUT); for (i=0;i