source: MondoRescue/branches/3.1/mondo/src/common/libmondo-verify.c@ 3152

Last change on this file since 3152 was 3147, checked in by Bruno Cornec, 12 years ago
  • First pass on svn merge -r 2935:3146 ../3.0
  • Property svn:keywords set to Id
File size: 35.6 KB
RevLine 
[1]1/***************************************************************************
[2211]2$Id: libmondo-verify.c 3147 2013-06-19 06:34:46Z bruno $
[1]3***************************************************************************/
4
5
6/**
7 * @file
8 * Functions for verifying backups (booted from hard drive, not CD).
9 */
10
11#include "my-stuff.h"
[2211]12#include "mr_mem.h"
[1]13#include "mondostructures.h"
14#include "libmondo-verify.h"
[541]15#include "libmondo-gui-EXT.h"
[1]16#include "libmondo-files-EXT.h"
17#include "libmondo-fork-EXT.h"
18#include "libmondo-stream-EXT.h"
19#include "libmondo-string-EXT.h"
20#include "libmondo-devices-EXT.h"
21#include "libmondo-tools-EXT.h"
[541]22#include "lib-common-externs.h"
[1]23
24/*@unused@*/
[117]25//static char cvsid[] = "$Id: libmondo-verify.c 3147 2013-06-19 06:34:46Z bruno $";
[1]26
27/**
28 * The number of the most recently verified afioball.
29 * @ingroup globalGroup
30 */
31int g_last_afioball_number = -1;
32
[948]33extern char *g_getfacl;
34extern char *g_getfattr;
[1316]35extern char *MONDO_LOGFILE;
[1]36
[1645]37/* Reference to global bkpinfo */
38extern struct s_bkpinfo *bkpinfo;
39
[1648]40
[1]41/**
[1648]42 * Generate the filename of a tarball to verify.
43 * @param bkpinfo The backup information structure. @c bkpinfo->zip_suffix is the only field used.
44 * @param mountpoint The directory where the CD/DVD/ISO is mounted.
45 * @param setno The afioball number to get the location of.
46 * @return The absolute path to the afioball.
47 * @note The returned string points to static data that will be overwritten with each call.
48 * @ingroup stringGroup
49 */
50char *vfy_tball_fname(char *mountpoint, int setno)
51{
52 /*@ buffers ******************************************************* */
53 static char output[MAX_STR_LEN];
54
55 assert(bkpinfo != NULL);
56 assert_string_is_neither_NULL_nor_zerolength(mountpoint);
[2327]57 sprintf(output, "%s/archives/%d.star.%s", mountpoint, setno, bkpinfo->zip_suffix);
[1648]58 if (!does_file_exist(output)) {
[2327]59 sprintf(output, "%s/archives/%d.afio.%s", mountpoint, setno, bkpinfo->zip_suffix);
[1648]60 }
61 return (output);
62}
63
64
65/**
[1]66 * Generate a list of the files that have changed, based on @c afio @c -r
67 * messages.
68 * @param changedfiles_fname Filename of the place to put a list of afio's reported changed.
69 * @param ignorefiles_fname Filename of a list of files to ignore (use "" if none).
70 * @param stderr_fname File containing afio's stderr output.
71 * @return The number of differences found (0 for a perfect backup).
72 * @bug This function seems orphaned.
73 * @ingroup utilityGroup
74 */
75long
[128]76generate_list_of_changed_files(char *changedfiles_fname,
77 char *ignorefiles_fname, char *stderr_fname)
[1]78{
[128]79 /*@ buffer ********************************************************** */
[2276]80 char *command = NULL;
81 char *afio_found_changes = NULL;
[1]82
[128]83 /*@ int ************************************************************* */
84 int res = 0;
[1]85
[128]86 /*@ long ************************************************************ */
87 long afio_diffs = 0;
[1]88
[128]89 assert_string_is_neither_NULL_nor_zerolength(changedfiles_fname);
90 assert_string_is_neither_NULL_nor_zerolength(ignorefiles_fname);
91 assert_string_is_neither_NULL_nor_zerolength(stderr_fname);
[1]92
[2323]93 mr_asprintf(afio_found_changes, "%s.afio", ignorefiles_fname);
[2376]94 sync();
[128]95
96 log_msg(1, "Now scanning log file for 'afio: ' stuff");
[2323]97 mr_asprintf(command, "grep \"afio: \" %s | sed 's/afio: //' | grep -vE '^/dev/.*$' >> %s", stderr_fname, afio_found_changes);
[128]98 log_msg(2, command);
99 res = system(command);
[2276]100 mr_free(command);
101
[128]102 if (res) {
103 log_msg(2, "Warning - failed to think");
104 }
105
106 log_msg(1, "Now scanning log file for 'star: ' stuff");
[2323]107 mr_asprintf(command, "grep \"star: \" %s | sed 's/star: //' | grep -vE '^/dev/.*$' >> %s", stderr_fname, afio_found_changes);
[128]108 log_msg(2, command);
109 res = system(command);
[2276]110 mr_free(command);
111
[128]112 if (res) {
113 log_msg(2, "Warning - failed to think");
114 }
115 afio_diffs = count_lines_in_file(afio_found_changes);
[2323]116 mr_asprintf(command, "sort %s %s %s | uniq -c | awk '{ if ($1==\"2\") {print $2;};}' | grep -v \"incheckentry xwait()\" > %s", ignorefiles_fname, afio_found_changes, afio_found_changes, changedfiles_fname);
[2276]117 mr_free(afio_found_changes);
[128]118 log_msg(2, command);
119 paranoid_system(command);
[2276]120 mr_free(command);
[128]121 return (afio_diffs);
[1]122}
123
124
125/**
126 * @addtogroup LLverifyGroup
127 * @{
128 */
129/**
130 * Verify all afioballs stored on the inserted CD (or an ISO image).
131 * @param bkpinfo The backup information structure. @c bkpinfo->backup_media_type
132 * is used in this function, and the structure is also passed to verify_an_afioball_from_CD().
133 * @param mountpoint The location the CD/DVD/ISO is mounted on.
134 * @return The number of sets containing differences (0 for success).
135 */
[1645]136int verify_afioballs_on_CD(char *mountpoint)
[1]137{
138
[128]139 /*@ buffers ********************************************************* */
[2276]140 char *tmp = NULL;
[2242]141 char *mds = NULL;
[1]142
[128]143 /*@ int ************************************************************* */
144 int set_number = 0;
[1]145 int retval = 0;
146 int total_sets = 0;
147 int percentage = 0;
148
[128]149 assert_string_is_neither_NULL_nor_zerolength(mountpoint);
150 assert(bkpinfo != NULL);
151
152 for (set_number = 0;
153 set_number < 9999
154 &&
[1645]155 !does_file_exist(vfy_tball_fname(mountpoint, set_number));
[128]156 set_number++);
[1645]157 if (!does_file_exist(vfy_tball_fname(mountpoint, set_number))) {
[128]158 return (0);
[1]159 }
[128]160
161 if (g_last_afioball_number != set_number - 1) {
162 if (set_number == 0) {
163 log_msg(1,
164 "Weird error in verify_afioballs_on_CD() but it's really a cosmetic error, nothing more");
165 } else {
166 retval++;
[2324]167 log_to_screen("Warning - missing set(s) between %d and %d\n", g_last_afioball_number, set_number - 1);
[128]168 }
169 }
[2242]170 mds = media_descriptor_string(bkpinfo->backup_media_type);
[2323]171 mr_asprintf(tmp, "Verifying %s #%d's tarballs", mds, g_current_media_number);
[2242]172 mr_free(mds);
173
[128]174 open_evalcall_form(tmp);
[2276]175 mr_free(tmp);
[128]176
177 for (total_sets = set_number;
[1645]178 does_file_exist(vfy_tball_fname(mountpoint, total_sets));
[128]179 total_sets++) {
180 log_msg(1, "total_sets = %d", total_sets);
181 }
182 for (;
[1645]183 does_file_exist(vfy_tball_fname(mountpoint, set_number));
[128]184 set_number++) {
185 percentage =
186 (set_number - g_last_afioball_number) * 100 / (total_sets -
187 g_last_afioball_number);
188 update_evalcall_form(percentage);
189 log_msg(1, "set = %d", set_number);
190 retval +=
[1645]191 verify_an_afioball_from_CD(vfy_tball_fname(mountpoint, set_number));
[128]192 }
193 g_last_afioball_number = set_number - 1;
194 close_evalcall_form();
195 return (retval);
[1]196}
197
198/**
199 * Verify all slices stored on the inserted CD (or a mounted ISO image).
200 * @param bkpinfo The backup information structure. Fields used:
201 * - @c compression_level
202 * - @c restore_path
203 * - @c use_lzo
204 * - @c zip_suffix
205 * @param mtpt The mountpoint the CD/DVD/ISO is mounted on.
206 * @return The number of differences (0 for perfect biggiefiles).
207 */
[1645]208int verify_all_slices_on_CD(char *mtpt)
[1]209{
210
[128]211 /*@ buffer ********************************************************** */
[2276]212 char *tmp = NULL;
213 char *mountpoint = NULL;
214 char *command = NULL;
[2242]215 char *mds = NULL;
[2327]216 char *sz_exe = NULL;
[128]217 static char *bufblkA = NULL;
218 static char *bufblkB = NULL;
219 const long maxbufsize = 65536L;
220 long currsizA = 0;
221 long currsizB = 0;
222 long j;
[1]223
[128]224 /*@ long ************************************************************ */
225 long bigfile_num = 0;
226 long slice_num = -1;
227 int res;
[1]228
[128]229 static FILE *forig = NULL;
230 static struct s_filename_and_lstat_info biggiestruct;
231 static long last_bigfile_num = -1;
232 static long last_slice_num = -1;
233 FILE *pin;
234 FILE *fin;
235 int retval = 0;
[1]236
[128]237 if (!bufblkA) {
238 if (!(bufblkA = malloc(maxbufsize))) {
239 fatal_error("Cannot malloc bufblkA");
240 }
241 }
242 if (!bufblkB) {
243 if (!(bufblkB = malloc(maxbufsize))) {
244 fatal_error("Cannot malloc bufblkB");
245 }
246 }
[1]247
[128]248 assert(bkpinfo != NULL);
249 assert_string_is_neither_NULL_nor_zerolength(mtpt);
[1]250
[128]251 if (bkpinfo->compression_level > 0) {
252 if (bkpinfo->use_lzo) {
[2327]253 mr_asprintf(sz_exe, "lzop");
[1003]254 } else if (bkpinfo->use_gzip) {
[2327]255 mr_asprintf(sz_exe, "gzip");
[2338]256 } else if (bkpinfo->use_lzma) {
257 mr_asprintf(sz_exe, "lzma");
[128]258 } else {
[2327]259 mr_asprintf(sz_exe, "bzip2");
[128]260 }
261 }
[1]262
[2230]263 log_it("before vsbf");
[2242]264 mds = media_descriptor_string(bkpinfo->backup_media_type);
[2323]265 mr_asprintf(tmp, "Verifying %s#%d's big files", mds, g_current_media_number);
[2242]266 mr_free(mds);
267
[128]268 open_evalcall_form(tmp);
[2276]269 mr_free(tmp);
270
[2230]271 log_it("after vsbf");
[2323]272 mr_asprintf(mountpoint, "%s/archives", mtpt);
[128]273 if (last_bigfile_num == -1) {
274 bigfile_num = 0;
275 slice_num = 0;
276 } else if (slice_num == 0) {
277 bigfile_num = last_bigfile_num + 1;
278 slice_num = 0;
279 } else {
280 bigfile_num = last_bigfile_num;
281 slice_num = last_slice_num + 1;
282 }
[2276]283 while (does_file_exist(slice_fname(bigfile_num, slice_num, mountpoint, bkpinfo->zip_suffix))
[128]284 ||
[2276]285 does_file_exist(slice_fname(bigfile_num, slice_num, mountpoint, ""))) {
[1236]286 // handle slices until end of CD
[128]287 if (slice_num == 0) {
[2327]288 log_msg(2, "ISO=%d bigfile=%ld --START--", g_current_media_number, bigfile_num);
[2276]289 if (! (fin = fopen(slice_fname(bigfile_num, slice_num, mountpoint, ""), "r"))) {
[128]290 log_msg(2, "Cannot open bigfile's info file");
291 } else {
[2276]292 if (fread ((void *) &biggiestruct, 1, sizeof(biggiestruct), fin) < sizeof(biggiestruct)) {
[128]293 log_msg(2, "Unable to get biggiestruct");
294 }
295 paranoid_fclose(fin);
296 }
[2327]297 if (bkpinfo->restore_path) {
298 mr_asprintf(tmp, "%s/%s", bkpinfo->restore_path, biggiestruct.filename);
299 log_msg(2, "Opening biggiefile #%ld - '%s'", bigfile_num, tmp);
300 forig = fopen(tmp, "r");
[2276]301 mr_free(tmp);
[2327]302
303 if (!forig) {
304 log_msg(2, "Failed to open bigfile. Darn.");
305 log_to_screen("%s/%s not found on live filesystem", bkpinfo->restore_path, biggiestruct.filename);
306 mr_asprintf(tmp, "echo \"%s/%s not found\" >> %s/biggies.changed", bkpinfo->restore_path, biggiestruct.filename, bkpinfo->tmpdir);
307 system(tmp);
308 mr_free(tmp);
[1236]309
[2327]310 bigfile_num++;
311 slice_num = 0;
312 retval++;
313 } else {
314 slice_num++;
315 }
[1236]316 } else {
[2327]317 log_it("Unable to open bigfile as restore_path is NULL");
[128]318 }
[1236]319 } else if (does_file_exist(slice_fname(bigfile_num, slice_num, mountpoint, "")) &&
320 (length_of_file(slice_fname(bigfile_num, slice_num, mountpoint, "")) == 0)) {
[128]321 log_msg(2, "ISO=%d bigfile=%ld ---END---",
322 g_current_media_number, bigfile_num);
323 bigfile_num++;
324 paranoid_fclose(forig);
325 slice_num = 0;
326 } else {
[2327]327 log_msg(2, "ISO=%d bigfile=%ld slice=%ld", g_current_media_number, bigfile_num, slice_num);
328 if ((!does_file_exist(slice_fname(bigfile_num, slice_num, mountpoint, ""))) && (sz_exe != NULL)) {
[2323]329 mr_asprintf(command, "%s -dc %s 2>> %s", sz_exe, slice_fname(bigfile_num, slice_num, mountpoint, bkpinfo->zip_suffix), MONDO_LOGFILE);
[128]330 } else {
[2323]331 mr_asprintf(command, "cat %s 2>> %s", slice_fname(bigfile_num, slice_num, mountpoint, ""), MONDO_LOGFILE);
[128]332 }
[2276]333 pin = popen(command, "r");
334 mr_free(command);
335 if (pin) {
[128]336 res = 0;
337 while (!feof(pin)) {
338 currsizA = fread(bufblkA, 1, maxbufsize, pin);
339 if (currsizA <= 0) {
340 break;
341 }
342 currsizB = fread(bufblkB, 1, currsizA, forig);
343 if (currsizA != currsizB) {
344 res++;
345 } else {
346 for (j = 0;
347 j < currsizA && bufblkA[j] == bufblkB[j];
348 j++);
349 if (j < currsizA) {
350 res++;
351 }
352 }
353 }
354 paranoid_pclose(pin);
[1236]355 if (res && !strncmp(biggiestruct.filename, "/dev/", 5)) {
[128]356 log_msg(3,
[296]357 "Ignoring differences between %s and live filesystem because it's a device and therefore the archives are stored via ntfsclone, not dd.",
[128]358 biggiestruct.filename);
359 log_msg(3,
360 "If you really want verification for %s, please contact the devteam and offer an incentive.",
361 biggiestruct.filename);
362 res = 0;
363 }
364 if (res) {
365 log_msg(0,
366 "afio: \"%s\": Corrupt biggie file, says libmondo-archive.c",
367 biggiestruct.filename);
368 retval++;
369 }
370 }
371 slice_num++;
372 }
[1]373 }
[2276]374 mr_free(mountpoint);
[2327]375 mr_free(sz_exe);
376
[128]377 last_bigfile_num = bigfile_num;
378 last_slice_num = slice_num - 1;
379 if (last_slice_num < 0) {
380 last_bigfile_num--;
[1]381 }
[128]382 close_evalcall_form();
383 if (bufblkA) {
384 paranoid_free(bufblkA);
[1]385 }
[128]386 if (bufblkB) {
387 paranoid_free(bufblkB);
388 }
389 return (0);
[1]390}
391
392
393
394
395
396
397/**
398 * Verify one afioball from the CD.
399 * You should be changed to the root directory (/) for this to work.
400 * @param bkpinfo The backup information structure. Fields used:
401 * - @c bkpinfo->use_lzo
402 * - @c bkpinfo->tmpdir
403 * - @c bkpinfo->zip_exe
404 * - @c bkpinfo->zip_suffix
405 * @param tarball_fname The filename of the afioball to verify.
406 * @return 0, always.
407 */
[1645]408int verify_a_tarball(char *tarball_fname)
[1]409{
[128]410 /*@ buffers ********************************************************* */
[2276]411 char *command = NULL;
412 char *outlog = NULL;
[2357]413 char *tmp = NULL;
[3147]414 char *p = NULL;
[1]415
[128]416 /*@ pointers ******************************************************* */
417 FILE *pin;
[1]418
[128]419 /*@ long *********************************************************** */
420 long diffs = 0;
421 /* getcwd(old_pwd,MAX_STR_LEN-1); */
[1]422
423
[128]424 assert(bkpinfo != NULL);
425 assert_string_is_neither_NULL_nor_zerolength(tarball_fname);
[1]426
[128]427 log_it("Verifying fileset '%s'", tarball_fname);
[2323]428 mr_asprintf(outlog, "%s/afio.log", bkpinfo->tmpdir);
[2276]429 /* if programmer forgot to say which compression thingy to use then find out */
[2326]430 if (strstr(tarball_fname, ".lzo") && strcmp(bkpinfo->zip_suffix, "lzo")) {
[128]431 log_msg(2, "OK, I'm going to start using lzop.");
[2326]432 mr_free(bkpinfo->zip_exe);
433 mr_asprintf(bkpinfo->zip_exe, "lzop");
[2327]434 mr_free(bkpinfo->zip_suffix);
435 mr_asprintf(bkpinfo->zip_suffix, "lzo");
[128]436 bkpinfo->use_lzo = TRUE;
[998]437 bkpinfo->use_gzip = FALSE;
[2338]438 bkpinfo->use_lzma = FALSE;
[128]439 }
[2326]440 if (strstr(tarball_fname, ".gz") && strcmp(bkpinfo->zip_suffix, "gz")) {
[998]441 log_msg(2, "OK, I'm going to start using gzip.");
[2326]442 mr_free(bkpinfo->zip_exe);
443 mr_asprintf(bkpinfo->zip_exe, "gzip");
[2327]444 mr_free(bkpinfo->zip_suffix);
445 mr_asprintf(bkpinfo->zip_suffix, "gz");
[998]446 bkpinfo->use_lzo = FALSE;
447 bkpinfo->use_gzip = TRUE;
[2338]448 bkpinfo->use_lzma = FALSE;
[998]449 }
[2326]450 if (strstr(tarball_fname, ".bz2") && strcmp(bkpinfo->zip_suffix, "bz2")) {
[128]451 log_msg(2, "OK, I'm going to start using bzip2.");
[2326]452 mr_free(bkpinfo->zip_exe);
453 mr_asprintf(bkpinfo->zip_exe, "bzip2");
[2327]454 mr_free(bkpinfo->zip_suffix);
455 mr_asprintf(bkpinfo->zip_suffix, "bz2");
[128]456 bkpinfo->use_lzo = FALSE;
[998]457 bkpinfo->use_gzip = FALSE;
[2338]458 bkpinfo->use_lzma = FALSE;
[128]459 }
[2338]460 if (strstr(tarball_fname, ".lzma") && strcmp(bkpinfo->zip_suffix, "lzma")) {
461 log_msg(2, "OK, I'm going to start using lzma.");
462 mr_free(bkpinfo->zip_exe);
463 mr_asprintf(bkpinfo->zip_exe, "lzma");
464 mr_free(bkpinfo->zip_suffix);
465 mr_asprintf(bkpinfo->zip_suffix, "lzma");
466 bkpinfo->use_lzo = FALSE;
467 bkpinfo->use_gzip = FALSE;
468 bkpinfo->use_lzma = TRUE;
469 }
[2327]470 if (bkpinfo->zip_exe == NULL) {
471 mr_asprintf(bkpinfo->zip_exe, "none");
472 }
473 if (bkpinfo->zip_suffix == NULL) {
474 mr_asprintf(bkpinfo->zip_suffix, "");
475 }
[128]476 unlink(outlog);
477 if (strstr(tarball_fname, ".star")) {
478 bkpinfo->use_star = TRUE;
479 if (strstr(tarball_fname, ".bz2"))
[3147]480 mr_asprintf(command, "star -sparse -diff diffopts=mode,size,data file=%s %s >> %s 2>> %s", tarball_fname, (strstr(tarball_fname, ".bz2")) ? "-bz" : " ", outlog, outlog);
[128]481 } else {
482 bkpinfo->use_star = FALSE;
[2326]483 /* Here we suppose that there is always a compression program called */
484 if (bkpinfo->zip_exe) {
485 mr_asprintf(command, "afio -r -P %s -Z %s >> %s 2>> %s", bkpinfo->zip_exe, tarball_fname, outlog, outlog);
486 } else {
487 mr_asprintf(command, "afio -r -Z %s >> %s 2>> %s", tarball_fname, outlog, outlog);
488 }
[128]489 }
490 log_msg(6, "command=%s", command);
491 paranoid_system(command);
[2276]492 mr_free(command);
493
[128]494 if (length_of_file(outlog) < 10) {
[2323]495 mr_asprintf(command, "cat %s >> %s", outlog, MONDO_LOGFILE);
[128]496 } else {
[2323]497 mr_asprintf(command, "cut -d: -f%d %s | sort -u", (bkpinfo->use_star) ? 1 : 2, outlog);
[128]498 pin = popen(command, "r");
499 if (pin) {
[2357]500 for (mr_getline(tmp, pin); !feof(pin); mr_getline(tmp, pin)) {
[128]501 if (bkpinfo->use_star) {
502 if (!strstr(tmp, "diffopts=")) {
[2357]503 while (strlen(tmp) > 0 && tmp[strlen(tmp) - 1] < 32) {
[128]504 tmp[strlen(tmp) - 1] = '\0';
505 }
506 if (strchr(tmp, '/')) {
507 if (!diffs) {
[2357]508 log_msg(0, "'%s' - differences found", tarball_fname);
[128]509 }
[2357]510 log_msg(0, "star: /%s", strip_afio_output_line(tmp));
[128]511 diffs++;
512 }
513 }
514 } else {
515 if (!diffs) {
[2357]516 log_msg(0, "'%s' - differences found", tarball_fname);
[128]517 }
518 log_msg(0, "afio: /%s", strip_afio_output_line(tmp));
519 diffs++;
520 }
[2357]521 mr_free(tmp);
[1]522 }
[2357]523 mr_free(tmp);
[128]524 paranoid_pclose(pin);
525 } else {
526 log_OS_error(command);
527 }
528 }
[2276]529 mr_free(command);
530 mr_free(outlog);
[128]531 return (0);
[1]532}
533
534
535
536
537
538
539/**
540 * Verify one afioball from the CD.
541 * Checks for existence (calls fatal_error() if it does not exist) and
542 * then calls verify_an_afioball().
543 * @param bkpinfo The backup information structure. Passed to verify_an_afioball().
544 * @param tarball_fname The filename of the afioball to verify.
545 * @return The return value of verify_an_afioball().
546 * @see verify_an_afioball
547 */
548int
[1645]549verify_an_afioball_from_CD(char *tarball_fname)
[1]550{
551
[128]552 /*@ int ************************************************************* */
553 int res = 0;
[1]554
[128]555 assert_string_is_neither_NULL_nor_zerolength(tarball_fname);
[1]556
[128]557 log_msg(1, "Verifying %s", tarball_fname);
558 if (!does_file_exist(tarball_fname)) {
559 fatal_error("Cannot verify nonexistent afioball");
560 }
[1645]561 res = verify_a_tarball(tarball_fname);
[128]562 return (res);
[1]563}
564
565
566/**
567 * Verify one afioball from the opened tape/CD stream.
568 * Copies the file from tape to tmpdir and then calls verify_an_afioball().
569 * @param bkpinfo The backup information structure. Passed to verify_an_afioball().
570 * @param orig_fname The original filename of the afioball to verify.
571 * @param size The size of the afioball to verify.
572 * @return The return value of verify_an_afioball().
573 * @see verify_an_afioball
574 */
575int
[1645]576verify_an_afioball_from_stream(char *orig_fname, long long size)
[1]577{
578
[128]579 /*@ int ************************************************************** */
580 int retval = 0;
[1]581 int res = 0;
582
[128]583 /*@ buffers ********************************************************** */
[2276]584 char *tmp = NULL;
585 char *tarball_fname = NULL;
[1]586
[128]587 /*@ pointers ********************************************************* */
588 char *p;
[1]589
[128]590 assert(bkpinfo != NULL);
591 assert_string_is_neither_NULL_nor_zerolength(orig_fname);
[1]592
[128]593 p = strrchr(orig_fname, '/');
594 if (!p) {
595 p = orig_fname;
596 } else {
597 p++;
598 }
[2323]599 mr_asprintf(tmp, "mkdir -p %s/tmpfs", bkpinfo->tmpdir);
[128]600 paranoid_system(tmp);
[2276]601 mr_free(tmp);
602
[2323]603 mr_asprintf(tarball_fname, "%s/tmpfs/temporary-%s", bkpinfo->tmpdir, p);
[1645]604 read_file_from_stream_to_file(tarball_fname, size);
605 res = verify_a_tarball(tarball_fname);
[128]606 if (res) {
[2276]607 log_msg(0, "Afioball '%s' no longer matches your live filesystem", p);
[128]608 retval++;
609 }
610 unlink(tarball_fname);
[2276]611 mr_free(tarball_fname);
[128]612 return (retval);
[1]613}
614
615
616/**
617 * Verify one biggiefile form the opened tape/CD stream.
618 * @param bkpinfo The backup information structure. @c bkpinfo->tmpdir is the only field used.
619 * @param biggie_fname The filename of the biggiefile to verify.
620 * @param size The size in bytes of said biggiefile.
621 * @return 0 for success (even if the file doesn't match); nonzero for a tape error.
622 */
623int
[1645]624verify_a_biggiefile_from_stream(char *biggie_fname, long long size)
[1]625{
626
[128]627 /*@ int ************************************************************* */
628 int retval = 0;
[1]629 int res = 0;
630 int current_slice_number = 0;
631 int ctrl_chr = '\0';
632
[128]633 /*@ char ************************************************************ */
[2276]634 char *test_file = NULL;
[2334]635 char *biggie_cksum = NULL;
636 char *orig_cksum = NULL;
[2276]637 char *tmp = NULL;
[1]638 char *slice_fnam;
[128]639
640 /*@ pointers ******************************************************** */
[1]641 char *p;
642
[128]643 /*@ long long ******************************************************* */
644 long long slice_siz;
[1]645
[128]646 malloc_string(slice_fnam);
647 assert(bkpinfo != NULL);
648 assert_string_is_neither_NULL_nor_zerolength(biggie_fname);
[1]649
[128]650 p = strrchr(biggie_fname, '/');
651 if (!p) {
652 p = biggie_fname;
653 } else {
654 p++;
655 }
[2323]656 mr_asprintf(test_file, "%s/temporary-%s", bkpinfo->tmpdir, p);
[128]657 for (res =
658 read_header_block_from_stream(&slice_siz, slice_fnam, &ctrl_chr);
659 ctrl_chr != BLK_STOP_A_BIGGIE;
660 res =
[2334]661 read_header_block_from_stream(&slice_siz, slice_fnam, &ctrl_chr)) {
[128]662 if (ctrl_chr != BLK_START_AN_AFIO_OR_SLICE) {
663 wrong_marker(BLK_START_AN_AFIO_OR_SLICE, ctrl_chr);
664 }
[1645]665 res = read_file_from_stream_to_file(test_file, slice_siz);
[128]666 unlink(test_file);
667 res =
[2334]668 read_header_block_from_stream(&slice_siz, slice_fnam, &ctrl_chr);
[128]669 if (ctrl_chr != BLK_STOP_AN_AFIO_OR_SLICE) {
670 log_msg(2, "test_file = %s", test_file);
671 wrong_marker(BLK_STOP_AN_AFIO_OR_SLICE, ctrl_chr);
672 }
673 current_slice_number++;
674 retval += res;
[1]675 }
[2334]676 mr_asprintf(biggie_cksum, "%s", slice_fnam);
[128]677 if (biggie_cksum[0] != '\0') {
[2357]678 orig_cksum = calc_checksum_of_file(biggie_fname);
[128]679 if (strcmp(biggie_cksum, orig_cksum)) {
[2276]680 log_msg(2, "orig cksum=%s; curr cksum=%s", biggie_cksum, orig_cksum);
[2324]681 log_to_screen("%s has changed on live filesystem", biggie_fname);
[2276]682
[2323]683 mr_asprintf(tmp, "echo \"%s\" >> %s/biggies.changed", biggie_fname, bkpinfo->tmpdir);
[3147]684 paranoid_system(tmp);
[2276]685 mr_free(tmp);
[128]686 }
[2357]687 mr_free(orig_cksum);
[1]688 }
[2334]689 mr_free(biggie_cksum);
[2276]690 mr_free(test_file);
[128]691 paranoid_free(slice_fnam);
692 return (retval);
[1]693}
694
695
696/**
697 * Verify all afioballs from the opened tape/CD stream.
698 * @param bkpinfo The backup information structure. Fields used:
699 * - @c bkpinfo->tmpdir
700 *
701 * @return 0 for success (even if there are differences); nonzero for a tape error.
702 */
[1645]703int verify_afioballs_from_stream()
[1]704{
[128]705 /*@ int ********************************************************** */
706 int retval = 0;
[1]707 int res = 0;
708 long current_afioball_number = 0;
709 int ctrl_chr = 0;
710 int total_afioballs = 0;
711
[128]712 /*@ buffers ***************************************************** */
[2276]713 char *tmp = NULL;
[1]714 char *fname;
[2276]715 char *curr_xattr_list_fname = NULL;
716 char *curr_acl_list_fname = NULL;
[1]717
[128]718 /*@ long long *************************************************** */
719 long long size = 0;
[1]720
[128]721 assert(bkpinfo != NULL);
722 malloc_string(fname);
[1]723
[948]724 if (g_getfattr) {
[2323]725 mr_asprintf(curr_xattr_list_fname, XATTR_BIGGLST_FNAME_RAW_SZ, bkpinfo->tmpdir);
[948]726 }
727 if (g_getfacl) {
[2323]728 mr_asprintf(curr_acl_list_fname, ACL_BIGGLST_FNAME_RAW_SZ, bkpinfo->tmpdir);
[948]729 }
[541]730 log_to_screen("Verifying regular archives on tape");
[1645]731 total_afioballs = get_last_filelist_number() + 1;
[541]732 open_progress_form("Verifying filesystem",
733 "I am verifying archives against your live filesystem now.",
734 "Please wait. This may take a couple of hours.", "",
[128]735 total_afioballs);
736 res = read_header_block_from_stream(&size, fname, &ctrl_chr);
737 if (ctrl_chr != BLK_START_AFIOBALLS) {
[2230]738 log_it("YOU SHOULD NOT GET HERE");
739 log_it("Grabbing the EXAT files");
[128]740 if (ctrl_chr == BLK_START_EXTENDED_ATTRIBUTES) {
[3147]741 res = read_EXAT_files_from_tape(&size, fname, &ctrl_chr,
[128]742 curr_xattr_list_fname,
743 curr_acl_list_fname);
744 }
[1]745 }
[128]746 if (ctrl_chr != BLK_START_AFIOBALLS) {
747 wrong_marker(BLK_START_AFIOBALLS, ctrl_chr);
[1]748 }
[2276]749 if (g_getfattr) {
750 mr_free(curr_xattr_list_fname);
751 }
752 if (g_getfacl) {
753 mr_free(curr_acl_list_fname);
754 }
[128]755
756 for (res = read_header_block_from_stream(&size, fname, &ctrl_chr);
757 ctrl_chr != BLK_STOP_AFIOBALLS;
758 res = read_header_block_from_stream(&size, fname, &ctrl_chr)) {
[948]759 if (g_getfattr) {
[2323]760 mr_asprintf(curr_xattr_list_fname, XATTR_LIST_FNAME_RAW_SZ, bkpinfo->tmpdir, current_afioball_number);
[948]761 }
762 if (g_getfacl) {
[2323]763 mr_asprintf(curr_acl_list_fname, ACL_LIST_FNAME_RAW_SZ, bkpinfo->tmpdir, current_afioball_number);
[948]764 }
[128]765 if (ctrl_chr == BLK_START_EXTENDED_ATTRIBUTES) {
[2230]766 log_it("Reading EXAT files from tape");
[3147]767 res = read_EXAT_files_from_tape(&size, fname, &ctrl_chr,
[128]768 curr_xattr_list_fname,
769 curr_acl_list_fname);
770 }
[2276]771 if (g_getfattr) {
772 mr_free(curr_xattr_list_fname);
773 }
774 if (g_getfacl) {
775 mr_free(curr_acl_list_fname);
776 }
[128]777 if (ctrl_chr != BLK_START_AN_AFIO_OR_SLICE) {
778 wrong_marker(BLK_START_AN_AFIO_OR_SLICE, ctrl_chr);
779 }
[2323]780 mr_asprintf(tmp, "Verifying fileset #%ld", current_afioball_number);
[128]781 update_progress_form(tmp);
[2276]782 mr_free(tmp);
783
[1645]784 res = verify_an_afioball_from_stream(fname, size);
[128]785 if (res) {
[2324]786 log_to_screen("Afioball %ld differs from live filesystem", current_afioball_number);
[128]787 }
788 retval += res;
789 current_afioball_number++;
790 g_current_progress++;
791 res = read_header_block_from_stream(&size, fname, &ctrl_chr);
792 if (ctrl_chr != BLK_STOP_AN_AFIO_OR_SLICE) {
793 wrong_marker(BLK_STOP_AN_AFIO_OR_SLICE, ctrl_chr);
794 }
[1]795 }
[128]796 log_msg(1, "All done with afioballs");
797 close_progress_form();
798 paranoid_free(fname);
799 return (retval);
[1]800}
801
802/**
803 * Verify all biggiefiles on the opened CD/tape stream.
804 * @param bkpinfo The backup information structure. Fields used:
805 * - @c bkpinfo->restore_path
806 * - @c bkpinfo->tmpdir
807 *
808 * @return 0 for success (even if there are differences); nonzero for a tape error.
809 */
[1645]810int verify_biggiefiles_from_stream()
[1]811{
812
[128]813 /*@ int ************************************************************ */
814 int retval = 0;
[1]815 int res = 0;
816 int ctrl_chr = 0;
817
[128]818 /*@ long *********************************************************** */
819 long noof_biggiefiles = 0;
[1]820 long current_biggiefile_number = 0;
821
[128]822 /*@ buffers ******************************************************** */
[2276]823 char *orig_fname;
824 char *logical_fname = NULL;
825 char *comment = NULL;
826 char *curr_xattr_list_fname = NULL;
827 char *curr_acl_list_fname = NULL;
[128]828 /*@ pointers ******************************************************* */
[1]829 char *p;
830
[128]831 /*@ long long size ************************************************* */
832 long long size = 0;
[1]833
[128]834 assert(bkpinfo != NULL);
835 malloc_string(orig_fname);
[1]836
[948]837 if (g_getfattr) {
[2323]838 mr_asprintf(curr_xattr_list_fname, XATTR_BIGGLST_FNAME_RAW_SZ, bkpinfo->tmpdir);
[948]839 }
840 if (g_getfacl) {
[2323]841 mr_asprintf(curr_acl_list_fname, ACL_BIGGLST_FNAME_RAW_SZ, bkpinfo->tmpdir);
[948]842 }
[2323]843 mr_asprintf(comment, "Verifying all bigfiles.");
[128]844 log_to_screen(comment);
845 res = read_header_block_from_stream(&size, orig_fname, &ctrl_chr);
846 if (ctrl_chr != BLK_START_BIGGIEFILES) {
847 if (ctrl_chr == BLK_START_EXTENDED_ATTRIBUTES) {
[2230]848 log_it("Grabbing the EXAT biggiefiles");
[3147]849 res = read_EXAT_files_from_tape(&size, orig_fname,
[128]850 &ctrl_chr, curr_xattr_list_fname,
851 curr_acl_list_fname);
852 }
[1]853 }
[2276]854 if (g_getfattr) {
855 mr_free(curr_xattr_list_fname);
856 }
857 if (g_getfacl) {
858 mr_free(curr_acl_list_fname);
859 }
860
[128]861 if (ctrl_chr != BLK_START_BIGGIEFILES) {
862 wrong_marker(BLK_START_BIGGIEFILES, ctrl_chr);
[1]863 }
[128]864 noof_biggiefiles = (long) size;
865 log_msg(1, "noof_biggiefiles = %ld", noof_biggiefiles);
[541]866 open_progress_form("Verifying big files", comment,
867 "Please wait. This may take some time.", "",
[128]868 noof_biggiefiles);
[2276]869 mr_free(comment);
870
[128]871 for (res = read_header_block_from_stream(&size, orig_fname, &ctrl_chr);
872 ctrl_chr != BLK_STOP_BIGGIEFILES;
873 res = read_header_block_from_stream(&size, orig_fname, &ctrl_chr))
[1]874 {
[128]875 if (ctrl_chr != BLK_START_A_NORMBIGGIE
876 && ctrl_chr != BLK_START_A_PIHBIGGIE) {
877 wrong_marker(BLK_START_A_NORMBIGGIE, ctrl_chr);
878 }
879 p = strrchr(orig_fname, '/');
880 if (!p) {
881 p = orig_fname;
882 } else {
883 p++;
884 }
[2323]885 mr_asprintf(comment, "Verifying bigfile #%ld (%ld K)", current_biggiefile_number, (long) size >> 10);
[128]886 update_progress_form(comment);
[2276]887 mr_free(comment);
888
[2327]889 if (bkpinfo->restore_path) {
890 mr_asprintf(logical_fname, "%s/%s", bkpinfo->restore_path, orig_fname);
891 res = verify_a_biggiefile_from_stream(logical_fname, size);
892 mr_free(logical_fname);
893 retval += res;
894 } else {
895 log_it("Unable to verify bigfile as restore_path is NULL");
896 }
[2276]897
[128]898 current_biggiefile_number++;
899 g_current_progress++;
[1]900 }
[128]901 close_progress_form();
902 paranoid_free(orig_fname);
903 return (retval);
[1]904}
905
906/* @} - end of LLverifyGroup */
907
908
909/**
[1709]910 * Verify the USB device
911 * @param bkpinfo The backup information structure. Fields used:
912 * - @c bkpinfo->media_device
913 * - @c bkpinfo->tmpdir
914 * - @c bkpinfo->verify_data
915 *
916 * @return 0 for success (even if differences are found), nonzero for failure.
917 * @ingroup verifyGroup
918 */
919int verify_usb_image()
920{
921
922 /*@ int ************************************************************ */
923 int retval = 0;
924
925 /*@ buffers ******************************************************** */
926 char *mountpoint = NULL;
927 char *tmp = NULL;
928 char *tmp1 = NULL;
929 char *fname = NULL;
[1711]930 int ret = 0;
[1709]931#ifdef __FreeBSD__
932 char mdd[32];
933 char *mddevice = mdd;
934 int vndev = 2;
935#else
936//skip
937#endif
938
939 assert(bkpinfo != NULL);
940
[2325]941 if (bkpinfo->media_device == NULL) {
942 return(1);
943 }
944
[2323]945 mr_asprintf(fname, "%s1", bkpinfo->media_device);
[1709]946 if (is_this_device_mounted(fname)) {
947 log_msg(1, "USB device mounted. Remounting it at the right place");
[2323]948 mr_asprintf(tmp, "umount %s", fname);
[1709]949 run_program_and_log_output(tmp, FALSE);
950 paranoid_free(tmp);
951 }
952 paranoid_free(fname);
953
954 log_msg(1, "Mounting USB device.");
[2323]955 mr_asprintf(mountpoint, "%s/usb", bkpinfo->tmpdir);
956 mr_asprintf(tmp, "mkdir -p %s", mountpoint);
[1709]957 run_program_and_log_output(tmp, FALSE);
958 paranoid_free(tmp);
959 /* Mindi always create one single parition on the USB dev */
[2323]960 mr_asprintf(tmp, "mount %s1 %s", bkpinfo->media_device, mountpoint);
[1709]961 ret = run_program_and_log_output(tmp, FALSE);
962 paranoid_free(tmp);
963 if (ret) {
964 paranoid_free(mountpoint);
965 return(ret);
966 }
967
968 sync();
969 log_msg(2, "OK, I've mounted the USB Disk/Key\n");
[2323]970 mr_asprintf(tmp, "%s/archives/NOT-THE-LAST", mountpoint);
[1709]971 if (!does_file_exist(tmp)) {
972 log_msg
973 (2,
974 "This is the last USB device. I am therefore setting bkpinfo->verify_data to FALSE.");
975 bkpinfo->verify_data = FALSE;
976/*
977 (a) It's an easy way to tell the calling subroutine that we've finished &
978 there are no more device to be verified; (b) It stops the post-backup verifier
979 from running after the per-device verifier has run too.
980*/
981 }
982 paranoid_free(tmp);
983 verify_afioballs_on_CD(mountpoint);
[2230]984 log_it("before verify_all_slices");
[1709]985 verify_all_slices_on_CD(mountpoint);
986
[2937]987 mr_asprintf(tmp1, "umount -d %s", mountpoint);
[1709]988#ifdef __FreeBSD__
989 ret += system(tmp1);
990 ret += kick_vn(mddevice);
991 if (ret)
992#else
993 if (system(tmp1))
994#endif
995 {
[2324]996 log_to_screen("%s failed; unable to unmount USB device\n", tmp1);
[1709]997 retval++;
998 } else {
999 log_msg(2, "OK, I've unmounted the USB device\n");
1000 }
[2324]1001 mr_free(tmp1);
1002 mr_free(mountpoint);
[1709]1003 return (retval);
1004}
1005
1006
1007/**
[1]1008 * Verify the CD indicated by @c g_current_media_number.
1009 * @param bkpinfo The backup information structure. Fields used:
1010 * - @c bkpinfo->isodir
[20]1011 * - @c bkpinfo->prefix
[1]1012 * - @c bkpinfo->manual_cd_tray
1013 * - @c bkpinfo->media_device
[2382]1014 * - @c bkpinfo->netfs_remote_dir
[1]1015 * - @c bkpinfo->tmpdir
1016 * - @c bkpinfo->verify_data
1017 *
1018 * @return 0 for success (even if differences are found), nonzero for failure.
1019 * @ingroup verifyGroup
1020 */
[1645]1021int verify_cd_image()
[1]1022{
1023
[128]1024 /*@ int ************************************************************ */
1025 int retval = 0;
[1]1026
[128]1027 /*@ buffers ******************************************************** */
[2276]1028 char *mountpoint = NULL;
1029 char *command = NULL;
1030 char *tmp = NULL;
1031 char *fname = NULL;
[1]1032#ifdef __FreeBSD__
[128]1033 char mdd[32];
[1]1034 char *mddevice = mdd;
[128]1035 int ret = 0;
1036 int vndev = 2;
[1]1037#else
1038//skip
1039#endif
1040
[128]1041 assert(bkpinfo != NULL);
[1]1042
[2325]1043 if (bkpinfo->media_device == NULL) {
1044 return(1);
1045 }
1046
[2323]1047 mr_asprintf(mountpoint, "%s/cdrom", bkpinfo->tmpdir);
[2382]1048 if (((bkpinfo->isodir == NULL) && (bkpinfo->netfs_remote_dir == NULL)) || (bkpinfo->prefix == NULL)) {
[2325]1049 fatal_error("No iso filename preparation possible");
1050 }
[2382]1051 if (bkpinfo->netfs_remote_dir) {
1052 // NETFS
1053 mr_asprintf(fname, "%s/%s/%s-%d.iso", bkpinfo->isodir, bkpinfo->netfs_remote_dir, bkpinfo->prefix, g_current_media_number);
[2325]1054 } else {
1055 // ISO
1056 mr_asprintf(fname, "%s/%s-%d.iso", bkpinfo->isodir, bkpinfo->prefix, g_current_media_number);
1057 }
[128]1058
1059 mkdir(mountpoint, 1777);
1060 sync();
1061 if (!does_file_exist(fname)) {
[2276]1062 log_msg(2, "%s not found; assuming you backed up to CD; verifying CD...", fname);
[128]1063 if (bkpinfo->manual_cd_tray) {
[541]1064 popup_and_OK("Please push CD tray closed.");
[128]1065 }
[1645]1066 if (find_and_mount_actual_cd(mountpoint)) {
[541]1067 log_to_screen("failed to mount actual CD");
[2276]1068 mr_free(mountpoint);
1069 mr_free(fname);
[128]1070 return (1);
1071 }
1072 } else {
[2276]1073 log_msg(2, "%s found; verifying ISO...", fname);
[1]1074#ifdef __FreeBSD__
[128]1075 ret = 0;
1076 vndev = 2;
1077 mddevice = make_vn(fname);
1078 if (ret) {
[2324]1079 log_to_screen("make_vn of %s failed; unable to verify ISO\n", fname);
[2276]1080 mr_free(mountpoint);
1081 mr_free(fname);
[128]1082 return (1);
1083 }
[2323]1084 mr_asprintf(command, "mount_cd9660 %s %s", mddevice, mountpoint);
[1]1085#else
[2323]1086 mr_asprintf(command, "mount -o loop,ro -t iso9660 %s %s", fname, mountpoint);
[1]1087#endif
[128]1088 if (run_program_and_log_output(command, FALSE)) {
[2324]1089 log_to_screen("%s failed; unable to mount ISO image\n", command);
[2276]1090 mr_free(mountpoint);
1091 mr_free(command);
1092 mr_free(fname);
[128]1093 return (1);
1094 }
[2276]1095 mr_free(command);
[1]1096 }
[128]1097 log_msg(2, "OK, I've mounted the ISO/CD\n");
[2323]1098 mr_asprintf(tmp, "%s/archives/NOT-THE-LAST", mountpoint);
[128]1099 if (!does_file_exist(tmp)) {
1100 log_msg
1101 (2,
1102 "This is the last CD. I am therefore setting bkpinfo->verify_data to FALSE.");
1103 bkpinfo->verify_data = FALSE;
[1]1104/*
1105 (a) It's an easy way to tell the calling subroutine that we've finished &
1106 there are no more CD's to be verified; (b) It stops the post-backup verifier
1107 from running after the per-CD verifier has run too.
1108*/
[128]1109 }
[2276]1110 mr_free(tmp);
1111
[1645]1112 verify_afioballs_on_CD(mountpoint);
[2230]1113 log_it("before verify_all_slices");
[1645]1114 verify_all_slices_on_CD(mountpoint);
[1]1115
1116#ifdef __FreeBSD__
[128]1117 ret = 0;
[2937]1118 mr_asprintf(command, "umount -d %s", mountpoint);
[128]1119 ret += system(command);
1120 ret += kick_vn(mddevice);
[2324]1121 if (ret) {
[1]1122#else
[2937]1123 mr_asprintf(command, "umount -d %s", mountpoint);
[2324]1124 if (system(command)) {
[1]1125#endif
[2324]1126 log_to_screen("%s failed; unable to unmount ISO image\n", command);
[2276]1127
[128]1128 retval++;
1129 } else {
1130 log_msg(2, "OK, I've unmounted the ISO file\n");
[1]1131 }
[2276]1132 mr_free(mountpoint);
1133 mr_free(command);
1134
[128]1135 if (!does_file_exist(fname)) {
[2937]1136 mr_asprintf(command, "umount -d %s", bkpinfo->media_device);
[128]1137 run_program_and_log_output(command, 2);
[2276]1138 mr_free(command);
1139
[2325]1140 if (!bkpinfo->please_dont_eject && eject_device(bkpinfo->media_device)) {
[128]1141 log_msg(2, "Failed to eject CD-ROM drive");
1142 }
1143 }
[2276]1144 mr_free(fname);
[128]1145 return (retval);
[1]1146}
1147
1148/**
1149 * Verify all backups on tape.
1150 * This should be done after the backup process has already closed the tape.
1151 * @param bkpinfo The backup information structure. Passed to various helper functions.
1152 * @return 0 for success (even if thee were differences), nonzero for failure.
1153 * @ingroup verifyGroup
1154 */
[1645]1155int verify_tape_backups()
[1]1156{
1157
[128]1158 /*@ int ************************************************************ */
1159 int retval = 0;
[1]1160
[128]1161 /*@ buffers ******************************************************** */
[2276]1162 char *tmp = NULL;
1163 char *changed_files_fname = NULL;
[1]1164
[128]1165 /*@ long *********************************************************** */
1166 long diffs = 0;
[1]1167
[128]1168 assert(bkpinfo != NULL);
[1]1169
[128]1170 log_msg(3, "verify_tape_backups --- starting");
[541]1171 log_to_screen("Verifying backups");
[1645]1172 openin_tape();
[1]1173/* verify archives themselves */
[1645]1174 retval += verify_afioballs_from_stream();
1175 retval += verify_biggiefiles_from_stream();
[1]1176/* find the final blocks */
[2376]1177 sync();
[128]1178 sleep(2);
[1645]1179 closein_tape();
[1]1180/* close tape; exit */
1181// fclose(g_tape_stream); <-- not needed; is handled by closein_tape()
[2323]1182 mr_asprintf(tmp, "rm -f %s/biggies.changed %s/changed.files 2> /dev/null", bkpinfo->tmpdir, bkpinfo->tmpdir);
[1644]1183 paranoid_system(tmp);
[2276]1184 mr_free(tmp);
1185
[2323]1186 mr_asprintf(changed_files_fname, "%s/changed.files", bkpinfo->tmpdir);
1187 mr_asprintf(tmp, "grep -E '^%s:.*$' %s | cut -d'\"' -f2 | sort -u | awk '{print \"/\"$0;};' | tr -s '/' '/' | grep -v \"(total of\" | grep -v \"incheckentry.*xwait\" | grep -vE '^/afio:.*$' | grep -vE '^dev/.*$' > %s", (bkpinfo->use_star) ? "star" : "afio", MONDO_LOGFILE, changed_files_fname);
[128]1188 log_msg(2, "Running command to derive list of changed files");
1189 log_msg(2, tmp);
1190 if (system(tmp)) {
[2276]1191 if (does_file_exist(changed_files_fname) && length_of_file(changed_files_fname) > 2) {
1192 log_to_screen("Warning - unable to check logfile to derive list of changed files");
[128]1193 } else {
[2276]1194 log_to_screen("No differences found. Therefore, no 'changed.files' text file.");
[128]1195 }
1196 }
[2276]1197 mr_free(tmp);
1198
[2323]1199 mr_asprintf(tmp, "cat %s/biggies.changed >> %s", bkpinfo->tmpdir, changed_files_fname);
[128]1200 paranoid_system(tmp);
[2276]1201 mr_free(tmp);
[1]1202
[128]1203 diffs = count_lines_in_file(changed_files_fname);
1204 if (diffs > 0) {
[2323]1205 mr_asprintf(tmp, "cp -f %s %s/changed.files", changed_files_fname, MONDO_CACHE);
[128]1206 run_program_and_log_output(tmp, FALSE);
[2276]1207 mr_free(tmp);
1208
1209 log_msg(0, "%ld files differed from live filesystem; type less %s or less %s/changed.files to see", diffs, changed_files_fname, MONDO_CACHE);
[1747]1210 log_to_screen("See "MONDO_CACHE"/changed.files for a list of nonmatching files.");
[1644]1211 log_to_screen("The files probably changed on filesystem, not on backup media.");
[128]1212 }
[2276]1213 mr_free(changed_files_fname);
[128]1214 return (retval);
[1]1215}
1216
1217
1218
Note: See TracBrowser for help on using the repository browser.