2 * Amanda, The Advanced Maryland Automatic Network Disk Archiver
3 * Copyright (c) 1991-2000 University of Maryland at College Park
6 * Permission to use, copy, modify, distribute, and sell this software and its
7 * documentation for any purpose is hereby granted without fee, provided that
8 * the above copyright notice appear in all copies and that both that
9 * copyright notice and this permission notice appear in supporting
10 * documentation, and that the name of U.M. not be used in advertising or
11 * publicity pertaining to distribution of the software without specific,
12 * written prior permission. U.M. makes no representations about the
13 * suitability of this software for any purpose. It is provided "as is"
14 * without express or implied warranty.
16 * U.M. DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL
17 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL U.M.
18 * BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
19 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
20 * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
21 * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
23 * Authors: the Amanda Development Team. Its members are listed in a
24 * file named AUTHORS, in the root directory of this distribution.
27 * $Id: amcheck.c,v 1.149 2006/08/24 01:57:16 paddy_s Exp $
29 * checks for common problems in server and clients
46 #include "taperscan.h"
47 #include "server_util.h"
48 #include "pipespawn.h"
49 #include "amfeatures.h"
51 #define BUFFER_SIZE 32768
53 static time_t conf_ctimeout;
56 static disklist_t origq;
58 static uid_t uid_dumpuser;
63 pid_t start_client_checks(int fd);
64 pid_t start_server_check(int fd, int do_localchk, int do_tapechk);
65 int main(int argc, char **argv);
66 int test_server_pgm(FILE *outf, char *dir, char *pgm, int suid, uid_t dumpuid);
71 error("Usage: amcheck%s [-am] [-w] [-sclt] [-M <address>] <conf> [host [disk]* ]* [-o configoption]*", versionsuffix());
75 static unsigned long malloc_hist_1, malloc_size_1;
76 static unsigned long malloc_hist_2, malloc_size_2;
78 static am_feature_t *our_features = NULL;
79 static char *our_feature_string = NULL;
80 static char *displayunit;
81 static long int unitdivisor;
88 char buffer[BUFFER_SIZE];
90 char *mainfname = NULL;
91 char pid_str[NUM_STR_SIZE];
92 int do_clientchk, client_probs;
93 int do_localchk, do_tapechk, server_probs;
94 pid_t clientchk_pid, serverchk_pid;
95 int opt, tempfd, mainfd;
104 char *tempfname = NULL;
110 int new_argc, my_argc;
111 char **new_argv, **my_argv;
117 set_pname("amcheck");
119 /* Don't die when child closes pipe */
120 signal(SIGPIPE, SIG_IGN);
122 dbopen(DBG_SUBDIR_SERVER);
124 memset(buffer, 0, sizeof(buffer));
125 malloc_size_1 = malloc_inuse(&malloc_hist_1);
127 snprintf(pid_str, SIZEOF(pid_str), "%ld", (long)getpid());
129 erroutput_type = ERR_INTERACTIVE;
131 our_features = am_init_feature_set();
132 our_feature_string = am_feature_to_string(our_features);
139 alwaysmail = mailout = overwrite = 0;
140 do_localchk = do_tapechk = do_clientchk = 0;
141 server_probs = client_probs = 0;
142 tempfd = mainfd = -1;
144 parse_server_conf(argc, argv, &new_argc, &new_argv);
148 /* process arguments */
150 while((opt = getopt(my_argc, my_argv, "M:mawsclt")) != EOF) {
152 case 'M': mailto=stralloc(optarg);
153 if(!validate_mailto(mailto)){
154 printf("Invalid characters in mail address\n");
162 printf("You can't use -%c because configure didn't find a mailer.\n",
172 printf("You can't use -%c because configure didn't find a mailer.\n",
177 case 's': do_localchk = do_clientchk = do_tapechk = 1;
179 case 'c': do_clientchk = 1;
181 case 'l': do_localchk = 1;
183 case 'w': overwrite = 1;
185 case 't': do_tapechk = 1;
192 my_argc -= optind, my_argv += optind;
193 if(my_argc < 1) usage();
196 if ((do_localchk | do_clientchk | do_tapechk) == 0) {
197 /* Check everything if individual checks were not asked for */
198 do_localchk = do_clientchk = do_tapechk = 1;
204 config_name = stralloc(*my_argv);
206 config_dir = vstralloc(CONFIG_DIR, "/", config_name, "/", NULL);
207 conffile = stralloc2(config_dir, CONFFILE_NAME);
208 if(read_conffile(conffile)) {
209 error("errors processing config file \"%s\"", conffile);
213 dbrename(config_name, DBG_SUBDIR_SERVER);
215 report_bad_conf_arg();
218 if(mailout && !mailto &&
219 (getconf_seen(CNF_MAILTO)==0 || strlen(getconf_str(CNF_MAILTO)) == 0)) {
220 printf("\nNo mail address configured in amanda.conf\n");
222 printf("When using -a option please specify -Maddress also\n\n");
224 printf("Use -Maddress instead of -m\n\n");
227 if(mailout && !mailto)
229 if(getconf_seen(CNF_MAILTO) &&
230 strlen(getconf_str(CNF_MAILTO)) > 0) {
231 if(!validate_mailto(getconf_str(CNF_MAILTO))){
232 printf("\nMail address in amanda.conf has invalid characters");
233 printf("\nNo email will be sent\n");
238 printf("\nNo mail address configured in amanda.conf\n");
240 printf("When using -a option please specify -Maddress also\n\n");
242 printf("Use -Maddress instead of -m\n\n");
247 conf_ctimeout = getconf_time(CNF_CTIMEOUT);
249 conf_diskfile = getconf_str(CNF_DISKFILE);
250 if (*conf_diskfile == '/') {
251 conf_diskfile = stralloc(conf_diskfile);
253 conf_diskfile = stralloc2(config_dir, conf_diskfile);
255 if(read_diskfile(conf_diskfile, &origq) < 0) {
256 error("could not load disklist %s", conf_diskfile);
259 errstr = match_disklist(&origq, my_argc-1, my_argv+1);
264 amfree(conf_diskfile);
267 * Make sure we are running as the dump user.
269 dumpuser = getconf_str(CNF_DUMPUSER);
270 if ((pw = getpwnam(dumpuser)) == NULL) {
271 error("cannot look up dump user \"%s\"", dumpuser);
274 uid_dumpuser = pw->pw_uid;
275 if ((pw = getpwuid(uid_me)) == NULL) {
276 error("cannot look up my own uid (%ld)", (long)uid_me);
279 if (uid_me != uid_dumpuser) {
280 error("running as user \"%s\" instead of \"%s\"",
281 pw->pw_name, dumpuser);
285 displayunit = getconf_str(CNF_DISPLAYUNIT);
286 unitdivisor = getconf_unit_divisor();
289 * If both server and client side checks are being done, the server
290 * check output goes to the main output, while the client check output
291 * goes to a temporary file and is copied to the main output when done.
293 * If the output is to be mailed, the main output is also a disk file,
294 * otherwise it is stdout.
296 if(do_clientchk && (do_localchk || do_tapechk)) {
297 /* we need the temp file */
298 tempfname = vstralloc(AMANDA_TMPDIR, "/amcheck.temp.", pid_str, NULL);
299 if((tempfd = open(tempfname, O_RDWR|O_CREAT|O_TRUNC, 0600)) == -1) {
300 error("could not open %s: %s", tempfname, strerror(errno));
303 unlink(tempfname); /* so it goes away on close */
308 /* the main fd is a file too */
309 mainfname = vstralloc(AMANDA_TMPDIR, "/amcheck.main.", pid_str, NULL);
310 if((mainfd = open(mainfname, O_RDWR|O_CREAT|O_TRUNC, 0600)) == -1) {
311 error("could not open %s: %s", mainfname, strerror(errno));
314 unlink(mainfname); /* so it goes away on close */
318 /* just use stdout */
321 /* start server side checks */
323 if(do_localchk || do_tapechk)
324 serverchk_pid = start_server_check(mainfd, do_localchk, do_tapechk);
328 /* start client side checks */
331 clientchk_pid = start_client_checks((do_localchk || do_tapechk) ? tempfd : mainfd);
336 /* wait for child processes and note any problems */
339 if((pid = wait(&retstat)) == -1) {
340 if(errno == EINTR) continue;
342 } else if(pid == clientchk_pid) {
343 client_probs = WIFSIGNALED(retstat) || WEXITSTATUS(retstat);
345 } else if(pid == serverchk_pid) {
346 server_probs = WIFSIGNALED(retstat) || WEXITSTATUS(retstat);
349 char number[NUM_STR_SIZE];
350 char *wait_msg = NULL;
352 snprintf(number, SIZEOF(number), "%ld", (long)pid);
353 wait_msg = vstralloc("parent: reaped bogus pid ", number, "\n",
355 if (fullwrite(mainfd, wait_msg, strlen(wait_msg)) < 0) {
356 error("write main file: %s", strerror(errno));
363 /* copy temp output to main output and write tagline */
365 if(do_clientchk && (do_localchk || do_tapechk)) {
366 if(lseek(tempfd, (off_t)0, 0) == (off_t)-1) {
367 error("seek temp file: %s", strerror(errno));
371 while((size = fullread(tempfd, buffer, SIZEOF(buffer))) > 0) {
372 if (fullwrite(mainfd, buffer, (size_t)size) < 0) {
373 error("write main file: %s", strerror(errno));
378 error("read temp file: %s", strerror(errno));
384 version_string = vstralloc("\n",
385 "(brought to you by Amanda ", version(), ")\n",
387 if (fullwrite(mainfd, version_string, strlen(version_string)) < 0) {
388 error("write main file: %s", strerror(errno));
391 amfree(version_string);
394 amfree(our_feature_string);
395 am_release_feature_set(our_features);
398 malloc_size_2 = malloc_inuse(&malloc_hist_2);
400 if(malloc_size_1 != malloc_size_2) {
401 malloc_list(fileno(stderr), malloc_hist_1, malloc_hist_2);
404 /* send mail if requested, but only if there were problems */
407 #define MAILTO_LIMIT 10
409 if((server_probs || client_probs || alwaysmail) && mailout) {
420 char *extra_info = NULL;
425 char number[NUM_STR_SIZE];
428 if(lseek(mainfd, (off_t)0, SEEK_SET) == (off_t)-1) {
429 error("lseek main file: %s", strerror(errno));
432 if(alwaysmail && !(server_probs || client_probs)) {
433 subject = stralloc2(getconf_str(CNF_ORG),
434 " AMCHECK REPORT: NO PROBLEMS FOUND");
436 subject = stralloc2(getconf_str(CNF_ORG),
437 " AMANDA PROBLEM: FIX BEFORE RUN, IF POSSIBLE");
440 * Variable arg lists are hard to deal with when we do not know
441 * ourself how many args are involved. Split the address list
442 * and hope there are not more than 9 entries.
444 * Remember that split() returns the original input string in
445 * argv[0], so we have to skip over that.
447 a = (char **) alloc((MAILTO_LIMIT + 1) * SIZEOF(char *));
448 memset(a, 0, (MAILTO_LIMIT + 1) * SIZEOF(char *));
453 r = (ssize_t)split(getconf_str(CNF_MAILTO), a, MAILTO_LIMIT, " ");
456 if((nullfd = open("/dev/null", O_RDWR)) < 0) {
457 error("nullfd: /dev/null: %s", strerror(errno));
460 pipespawn(MAILER, STDIN_PIPE | STDERR_PIPE,
461 &mailfd, &nullfd, &errfd,
464 a[1], a[2], a[3], a[4],
465 a[5], a[6], a[7], a[8], a[9],
469 * There is the potential for a deadlock here since we are writing
470 * to the process and then reading stderr, but in the normal case,
471 * nothing should be coming back to us, and hopefully in error
472 * cases, the pipe will break and we will exit out of the loop.
474 signal(SIGPIPE, SIG_IGN);
475 while((r = fullread(mainfd, buffer, SIZEOF(buffer))) > 0) {
476 if((w = fullwrite(mailfd, buffer, (size_t)r)) != (ssize_t)r) {
477 if(w < 0 && errno == EPIPE) {
478 strappend(extra_info, "EPIPE writing to mail process\n");
481 error("mailfd write: %s", strerror(errno));
484 error("mailfd write: wrote %d instead of %d", w, r);
490 ferr = fdopen(errfd, "r");
492 error("Can't fdopen: %s", strerror(errno));
495 for(; (line = agets(ferr)) != NULL; free(line)) {
498 strappend(extra_info, line);
499 strappend(extra_info, "\n");
504 while (wait(&retstat) != -1) {
505 if (WIFSIGNALED(retstat)) {
507 rc = sig = WTERMSIG(retstat);
510 rc = ret = WEXITSTATUS(retstat);
514 strappend(err, "got signal ");
517 strappend(err, "returned ");
519 snprintf(number, SIZEOF(number), "%d", ret);
520 strappend(err, number);
525 fputs(extra_info, stderr);
528 error("error running mailer %s: %s", MAILER, err);
533 free_new_argv(new_argc, new_argv);
534 free_server_config();
537 return (server_probs || client_probs);
540 /* --------------------------------------------------- */
542 int nslots, backwards, found, got_match, tapedays;
544 char *first_match_label = NULL, *first_match = NULL, *found_device = NULL;
546 char *searchlabel, *labelstr;
562 pgm = vstralloc(dir, "/", pgm, versionsuffix(), NULL);
563 quoted = quote_string(pgm);
564 if(stat(pgm, &statbuf) == -1) {
565 fprintf(outf, "ERROR: program %s: does not exist\n",
568 } else if (!S_ISREG(statbuf.st_mode)) {
569 fprintf(outf, "ERROR: program %s: not a file\n",
572 } else if (access(pgm, X_OK) == -1) {
573 fprintf(outf, "ERROR: program %s: not executable\n",
578 && (statbuf.st_uid != 0 || (statbuf.st_mode & 04000) == 0)) {
579 fprintf(outf, "ERROR: program %s: not setuid-root\n",
595 generic_fs_stats_t fs;
599 int confbad = 0, tapebad = 0, disklow = 0, logbad = 0;
600 int userbad = 0, infobad = 0, indexbad = 0, pgmbad = 0;
601 int testtape = do_tapechk;
602 tapetype_t *tp = NULL;
605 switch(pid = fork()) {
607 error("could not fork server check: %s", strerror(errno));
620 set_pname("amcheck-server");
624 if((outf = fdopen(fd, "w")) == NULL) {
625 error("fdopen %d: %s", fd, strerror(errno));
630 fprintf(outf, "Amanda Tape Server Host Check\n");
631 fprintf(outf, "-----------------------------\n");
633 if (do_localchk || testtape) {
634 tp = lookup_tapetype(getconf_str(CNF_TAPETYPE));
638 * Check various server side config file settings.
645 ColumnSpec = getconf_str(CNF_COLUMNSPEC);
646 if(SetColumDataFromString(ColumnData, ColumnSpec, &errstr) < 0) {
647 fprintf(outf, "ERROR: %s\n", errstr);
651 lbl_templ = tapetype_get_lbl_templ(tp);
652 if(strcmp(lbl_templ, "") != 0) {
653 if(strchr(lbl_templ, '/') == NULL) {
654 lbl_templ = stralloc2(config_dir, lbl_templ);
656 lbl_templ = stralloc(lbl_templ);
658 if(access(lbl_templ, R_OK) == -1) {
660 "ERROR: cannot access lbl_templ file %s: %s\n",
666 fprintf(outf, "ERROR: lbl_templ set but no LPRCMD defined, you should reconfigure amanda\n and make sure it find a lpr or lp command.\n");
671 /* check that localhost is resolvable */
672 if ((gethostbyname("localhost")) == NULL) {
673 fprintf(outf, "ERROR: Cannot resolve `localhost'.\n");
678 * Look up the programs used on the server side.
682 * entreprise version will do planner/dumper suid check
684 if(access(libexecdir, X_OK) == -1) {
685 quoted = quote_string(libexecdir);
686 fprintf(outf, "ERROR: program dir %s: not accessible\n",
691 if(test_server_pgm(outf, libexecdir, "planner", 1, uid_dumpuser))
693 if(test_server_pgm(outf, libexecdir, "dumper", 1, uid_dumpuser))
695 if(test_server_pgm(outf, libexecdir, "driver", 0, uid_dumpuser))
697 if(test_server_pgm(outf, libexecdir, "taper", 0, uid_dumpuser))
699 if(test_server_pgm(outf, libexecdir, "amtrmidx", 0, uid_dumpuser))
701 if(test_server_pgm(outf, libexecdir, "amlogroll", 0, uid_dumpuser))
704 if(access(sbindir, X_OK) == -1) {
705 quoted = quote_string(sbindir);
706 fprintf(outf, "ERROR: program dir %s: not accessible\n",
711 if(test_server_pgm(outf, sbindir, "amgetconf", 0, uid_dumpuser))
713 if(test_server_pgm(outf, sbindir, "amcheck", 1, uid_dumpuser))
715 if(test_server_pgm(outf, sbindir, "amdump", 0, uid_dumpuser))
717 if(test_server_pgm(outf, sbindir, "amreport", 0, uid_dumpuser))
720 if(access(COMPRESS_PATH, X_OK) == -1) {
721 quoted = quote_string(COMPRESS_PATH);
722 fprintf(outf, "WARNING: %s is not executable, server-compression and indexing will not work\n",
729 * Check that the directory for the tapelist file is writable, as well
730 * as the tapelist file itself (if it already exists). Also, check for
731 * a "hold" file (just because it is convenient to do it here) and warn
732 * if tapedev is set to the null device.
735 if(do_localchk || do_tapechk) {
743 conf_tapelist=getconf_str(CNF_TAPELIST);
744 if (*conf_tapelist == '/') {
745 tapefile = stralloc(conf_tapelist);
747 tapefile = stralloc2(config_dir, conf_tapelist);
750 * XXX There Really Ought to be some error-checking here... dhw
752 tape_dir = stralloc(tapefile);
753 if ((lastslash = strrchr((const char *)tape_dir, '/')) != NULL) {
756 * else whine Really Loudly about a path with no slashes??!?
759 if(access(tape_dir, W_OK) == -1) {
760 quoted = quote_string(tape_dir);
761 fprintf(outf, "ERROR: tapelist dir %s: not writable.\n", quoted);
765 else if(stat(tapefile, &statbuf) == -1) {
766 quoted = quote_string(tape_dir);
767 fprintf(outf, "ERROR: tapefile %s (%s), "
768 "you must create an empty file.\n",
769 quoted, strerror(errno));
773 else if(!S_ISREG(statbuf.st_mode)) {
774 quoted = quote_string(tapefile);
775 fprintf(outf, "ERROR: tapefile %s: should be a regular file.\n",
780 else if(access(tapefile, F_OK) != 0) {
781 quoted = quote_string(tapefile);
782 fprintf(outf, "ERROR: can't access tape list %s\n", quoted);
785 } else if(access(tapefile, F_OK) == 0 && access(tapefile, W_OK) != 0) {
786 quoted = quote_string(tapefile);
787 fprintf(outf, "ERROR: tape list %s: not writable\n", quoted);
790 } else if(read_tapelist(tapefile)) {
791 quoted = quote_string(tapefile);
792 fprintf(outf, "ERROR: tape list %s: parse error\n", quoted);
796 holdfile = vstralloc(config_dir, "/", "hold", NULL);
797 if(access(holdfile, F_OK) != -1) {
798 quoted = quote_string(holdfile);
799 fprintf(outf, "WARNING: hold file %s exists\n", holdfile);
805 tapename = getconf_str(CNF_TAPEDEV);
806 if (strncmp(tapename, "null:", 5) == 0) {
808 "WARNING: tapedev is %s, dumps will be thrown away\n",
815 /* check available disk space */
818 for(hdp = holdingdisks; hdp != NULL; hdp = hdp->next) {
819 quoted = quote_string(holdingdisk_get_diskdir(hdp));
820 if(get_fs_stats(holdingdisk_get_diskdir(hdp), &fs) == -1) {
821 fprintf(outf, "ERROR: holding dir %s (%s), "
822 "you must create a directory.\n",
823 quoted, strerror(errno));
826 else if(access(holdingdisk_get_diskdir(hdp), W_OK) == -1) {
827 fprintf(outf, "ERROR: holding disk %s: not writable: %s.\n",
828 quoted, strerror(errno));
831 else if(access(holdingdisk_get_diskdir(hdp), X_OK) == -1) {
832 fprintf(outf, "ERROR: holding disk %s: not searcheable: %s.\n",
833 quoted, strerror(errno));
836 else if(fs.avail == (off_t)-1) {
838 "WARNING: holding disk %s: "
839 "available space unknown (" OFF_T_FMT" KB requested)\n",
840 quoted, (OFF_T_FMT_TYPE)holdingdisk_get_disksize(hdp));
843 else if(holdingdisk_get_disksize(hdp) > (off_t)0) {
844 if(fs.avail < holdingdisk_get_disksize(hdp)) {
846 "WARNING: holding disk %s: "
847 "only " OFF_T_FMT " %sB free ("
848 OFF_T_FMT " %sB requested)\n", quoted,
849 (OFF_T_FMT_TYPE)(fs.avail / (off_t)unitdivisor),
851 (OFF_T_FMT_TYPE)(holdingdisk_get_disksize(hdp)/(off_t)unitdivisor),
857 "Holding disk %s: " OFF_T_FMT
858 " %sB disk space available, that's plenty\n",
859 quoted, (OFF_T_FMT_TYPE)(fs.avail/(off_t)unitdivisor),
864 assert(holdingdisk_get_disksize(hdp) < (off_t)0);
865 if((fs.avail + holdingdisk_get_disksize(hdp)) <= (off_t)0) {
867 "WARNING: holding disk %s: "
868 "only " OFF_T_FMT " %sB free, using nothing\n",
869 quoted, (OFF_T_FMT_TYPE)(fs.avail/(off_t)unitdivisor),
876 OFF_T_FMT " %sB disk space available, using "
879 (OFF_T_FMT_TYPE)(fs.avail/(off_t)unitdivisor),
881 (OFF_T_FMT_TYPE)(fs.avail + holdingdisk_get_disksize(hdp) / (off_t)unitdivisor),
889 /* check that the log file is writable if it already exists */
895 struct stat stat_old;
898 conf_logdir = getconf_str(CNF_LOGDIR);
899 if (*conf_logdir == '/') {
900 conf_logdir = stralloc(conf_logdir);
902 conf_logdir = stralloc2(config_dir, conf_logdir);
904 logfile = vstralloc(conf_logdir, "/log", NULL);
906 quoted = quote_string(conf_logdir);
907 if(stat(conf_logdir, &statbuf) == -1) {
908 fprintf(outf, "ERROR: logdir %s (%s), you must create directory.\n",
909 quoted, strerror(errno));
912 else if(access(conf_logdir, W_OK) == -1) {
913 fprintf(outf, "ERROR: log dir %s: not writable\n", quoted);
918 if(access(logfile, F_OK) == 0) {
921 if(access(logfile, W_OK) != 0) {
922 quoted = quote_string(logfile);
923 fprintf(outf, "ERROR: log file %s: not writable\n", quoted);
928 olddir = vstralloc(conf_logdir, "/oldlog", NULL);
929 quoted = quote_string(olddir);
930 if (stat(olddir,&stat_old) == 0) { /* oldlog exist */
931 if(!(S_ISDIR(stat_old.st_mode))) {
932 fprintf(outf, "ERROR: oldlog directory %s is not a directory\n",
935 if(access(olddir, W_OK) == -1) {
936 fprintf(outf, "ERROR: oldlog dir %s: not writable\n", quoted);
939 else if(lstat(olddir,&stat_old) == 0) {
940 fprintf(outf, "ERROR: oldlog directory %s is not a directory\n",
946 logfile = newvstralloc(logfile, conf_logdir, "/amdump", NULL);
947 if (access(logfile, F_OK) == 0) {
959 /* check that the tape is a valid amanda tape */
962 tapedays = getconf_int(CNF_TAPECYCLE);
963 labelstr = getconf_str(CNF_LABELSTR);
964 tapename = getconf_str(CNF_TAPEDEV);
966 if (!getconf_seen(CNF_TPCHANGER) && getconf_int(CNF_RUNTAPES) != 1) {
968 "WARNING: if a tape changer is not available, runtapes must be set to 1\n");
971 tape_status = taper_scan(NULL, &label, &datestamp, &tapename,
972 FILE_taperscan_output_callback, outf);
973 if (tape_status < 0) {
974 tape_t *exptape = lookup_last_reusable_tape(0);
975 fprintf(outf, " (expecting ");
976 if(exptape != NULL) fprintf(outf, "tape %s or ", exptape->label);
977 fprintf(outf, "a new tape)\n");
981 char *wrlabel_status;
982 wrlabel_status = tape_wrlabel(tapename, "X", label,
983 (unsigned)(tapetype_get_blocksize(tp) * 1024));
984 if (wrlabel_status != NULL) {
985 if (tape_status == 3) {
987 "ERROR: Could not label brand new tape: %s\n",
991 "ERROR: tape %s label ok, but is not writable (%s)\n",
992 label, wrlabel_status);
996 if (tape_status != 3) {
997 fprintf(outf, "Tape %s is writable; rewrote label.\n", label);
999 fprintf(outf, "Wrote label %s to brand new tape.\n", label);
1003 fprintf(outf, "NOTE: skipping tape-writable test\n");
1004 if (tape_status == 3) {
1006 "Found a brand new tape, will label it %s.\n",
1009 fprintf(outf, "Tape %s label ok\n", label);
1014 } else if (do_tapechk) {
1015 fprintf(outf, "WARNING: skipping tape test because amdump or amflush seem to be running\n");
1016 fprintf(outf, "WARNING: if they are not, you must run amcleanup\n");
1018 fprintf(outf, "NOTE: skipping tape checks\n");
1022 * See if the information file and index directory for each client
1023 * and disk is OK. Since we may be seeing clients and/or disks for
1024 * the first time, these are just warnings, not errors.
1027 char *conf_infofile;
1028 char *conf_indexdir;
1029 char *hostinfodir = NULL;
1030 char *hostindexdir = NULL;
1031 char *diskdir = NULL;
1032 char *infofile = NULL;
1033 struct stat statbuf;
1036 int indexdir_checked = 0;
1037 int hostindexdir_checked = 0;
1040 int conf_tapecycle, conf_runspercycle;
1042 conf_tapecycle = getconf_int(CNF_TAPECYCLE);
1043 conf_runspercycle = getconf_int(CNF_RUNSPERCYCLE);
1045 if(conf_tapecycle <= conf_runspercycle) {
1046 fprintf(outf, "WARNING: tapecycle (%d) <= runspercycle (%d).\n",
1047 conf_tapecycle, conf_runspercycle);
1050 conf_infofile = getconf_str(CNF_INFOFILE);
1051 if (*conf_infofile == '/') {
1052 conf_infofile = stralloc(conf_infofile);
1054 conf_infofile = stralloc2(config_dir, conf_infofile);
1057 conf_indexdir = getconf_str(CNF_INDEXDIR);
1058 if (*conf_indexdir == '/') {
1059 conf_indexdir = stralloc(conf_indexdir);
1061 conf_indexdir = stralloc2(config_dir, conf_indexdir);
1065 quoted = quote_string(conf_infofile);
1066 if(stat(conf_infofile, &statbuf) == -1) {
1067 if (errno == ENOENT) {
1068 fprintf(outf, "NOTE: conf info dir %s does not exist\n",
1070 fprintf(outf, "NOTE: it will be created on the next run.\n");
1072 fprintf(outf, "ERROR: conf info dir %s (%s)\n",
1073 quoted, strerror(errno));
1075 amfree(conf_infofile);
1076 } else if (!S_ISDIR(statbuf.st_mode)) {
1077 fprintf(outf, "ERROR: info dir %s: not a directory\n", quoted);
1078 amfree(conf_infofile);
1080 } else if (access(conf_infofile, W_OK) == -1) {
1081 fprintf(outf, "ERROR: info dir %s: not writable\n", quoted);
1082 amfree(conf_infofile);
1085 strappend(conf_infofile, "/");
1090 while(!empty(origq)) {
1091 hostp = origq.head->host;
1092 host = sanitise_filename(hostp->hostname);
1095 hostinfodir = newstralloc2(hostinfodir, conf_infofile, host);
1096 quoted = quote_string(hostinfodir);
1097 if(stat(hostinfodir, &statbuf) == -1) {
1098 if (errno == ENOENT) {
1099 fprintf(outf, "NOTE: host info dir %s does not exist\n",
1102 "NOTE: it will be created on the next run.\n");
1104 fprintf(outf, "ERROR: host info dir %s (%s)\n",
1105 quoted, strerror(errno));
1107 amfree(hostinfodir);
1108 } else if (!S_ISDIR(statbuf.st_mode)) {
1109 fprintf(outf, "ERROR: info dir %s: not a directory\n",
1111 amfree(hostinfodir);
1113 } else if (access(hostinfodir, W_OK) == -1) {
1114 fprintf(outf, "ERROR: info dir %s: not writable\n", quoted);
1115 amfree(hostinfodir);
1118 strappend(hostinfodir, "/");
1123 for(dp = hostp->disks; dp != NULL; dp = dp->hostnext) {
1124 disk = sanitise_filename(dp->name);
1129 diskdir = newstralloc2(diskdir, hostinfodir, disk);
1130 infofile = vstralloc(diskdir, "/", "info", NULL);
1131 quoted = quote_string(diskdir);
1132 quotedif = quote_string(infofile);
1133 if(stat(diskdir, &statbuf) == -1) {
1134 if (errno == ENOENT) {
1135 fprintf(outf, "NOTE: info dir %s does not exist\n",
1138 "NOTE: it will be created on the next run.\n");
1140 fprintf(outf, "ERROR: info dir %s (%s)\n",
1141 quoted, strerror(errno));
1143 } else if (!S_ISDIR(statbuf.st_mode)) {
1144 fprintf(outf, "ERROR: info dir %s: not a directory\n",
1147 } else if (access(diskdir, W_OK) == -1) {
1148 fprintf(outf, "ERROR: info dir %s: not writable\n",
1151 } else if(stat(infofile, &statbuf) == -1) {
1152 if (errno == ENOENT) {
1153 fprintf(outf, "NOTE: info file %s does not exist\n",
1155 fprintf(outf, "NOTE: it will be created on the next run.\n");
1157 fprintf(outf, "ERROR: info dir %s (%s)\n",
1158 quoted, strerror(errno));
1160 } else if (!S_ISREG(statbuf.st_mode)) {
1161 fprintf(outf, "ERROR: info file %s: not a file\n",
1164 } else if (access(infofile, R_OK) == -1) {
1165 fprintf(outf, "ERROR: info file %s: not readable\n",
1175 if(! indexdir_checked) {
1176 quoted = quote_string(conf_indexdir);
1177 if(stat(conf_indexdir, &statbuf) == -1) {
1178 if (errno == ENOENT) {
1179 fprintf(outf, "NOTE: index dir %s does not exist\n",
1181 fprintf(outf, "NOTE: it will be created on the next run.\n");
1183 fprintf(outf, "ERROR: index dir %s (%s)\n",
1184 quoted, strerror(errno));
1186 amfree(conf_indexdir);
1187 } else if (!S_ISDIR(statbuf.st_mode)) {
1188 fprintf(outf, "ERROR: index dir %s: not a directory\n",
1190 amfree(conf_indexdir);
1192 } else if (access(conf_indexdir, W_OK) == -1) {
1193 fprintf(outf, "ERROR: index dir %s: not writable\n",
1195 amfree(conf_indexdir);
1198 strappend(conf_indexdir, "/");
1200 indexdir_checked = 1;
1204 if(! hostindexdir_checked) {
1205 hostindexdir = stralloc2(conf_indexdir, host);
1206 quoted = quote_string(hostindexdir);
1207 if(stat(hostindexdir, &statbuf) == -1) {
1208 if (errno == ENOENT) {
1209 fprintf(outf, "NOTE: index dir %s does not exist\n",
1211 fprintf(outf, "NOTE: it will be created on the next run.\n");
1213 fprintf(outf, "ERROR: index dir %s (%s)\n",
1214 quoted, strerror(errno));
1216 amfree(hostindexdir);
1217 } else if (!S_ISDIR(statbuf.st_mode)) {
1218 fprintf(outf, "ERROR: index dir %s: not a directory\n",
1220 amfree(hostindexdir);
1222 } else if (access(hostindexdir, W_OK) == -1) {
1223 fprintf(outf, "ERROR: index dir %s: not writable\n",
1225 amfree(hostindexdir);
1228 strappend(hostindexdir, "/");
1230 hostindexdir_checked = 1;
1234 diskdir = newstralloc2(diskdir, hostindexdir, disk);
1235 quoted = quote_string(diskdir);
1236 if(stat(diskdir, &statbuf) == -1) {
1237 if (errno == ENOENT) {
1238 fprintf(outf, "NOTE: index dir %s does not exist\n",
1240 fprintf(outf, "NOTE: it will be created on the next run.\n");
1242 fprintf(outf, "ERROR: index dir %s (%s)\n",
1243 quoted, strerror(errno));
1245 } else if (!S_ISDIR(statbuf.st_mode)) {
1246 fprintf(outf, "ERROR: index dir %s: not a directory\n",
1249 } else if (access(diskdir, W_OK) == -1) {
1250 fprintf(outf, "ERROR: index dir %s: is not writable\n",
1259 if ( dp->encrypt == ENCRYPT_SERV_CUST ) {
1260 if ( dp->srv_encrypt[0] == '\0' ) {
1261 fprintf(outf, "ERROR: server encryption program not specified\n");
1264 else if(access(dp->srv_encrypt, X_OK) == -1) {
1265 fprintf(outf, "ERROR: %s is not executable, server encryption will not work\n",
1270 if ( dp->compress == COMP_SERV_CUST ) {
1271 if ( dp->srvcompprog[0] == '\0' ) {
1272 fprintf(outf, "ERROR: server custom compression program not specified\n");
1275 else if(access(dp->srvcompprog, X_OK) == -1) {
1276 quoted = quote_string(dp->srvcompprog);
1278 fprintf(outf, "ERROR: %s is not executable, server custom compression will not work\n",
1286 remove_disk(&origq, dp);
1289 amfree(hostindexdir);
1290 hostindexdir_checked = 0;
1293 amfree(hostinfodir);
1294 amfree(conf_infofile);
1295 amfree(conf_indexdir);
1301 amfree(config_name);
1303 fprintf(outf, "Server check took %s seconds\n", walltime_str(curclock()));
1307 malloc_size_2 = malloc_inuse(&malloc_hist_2);
1309 if(malloc_size_1 != malloc_size_2) {
1310 malloc_list(fd, malloc_hist_1, malloc_hist_2);
1325 /* --------------------------------------------------- */
1330 static void handle_result(void *, pkt_t *, security_handle_t *);
1331 void start_host(am_host_t *hostp);
1333 #define HOST_READY ((void *)0) /* must be 0 */
1334 #define HOST_ACTIVE ((void *)1)
1335 #define HOST_DONE ((void *)2)
1337 #define DISK_READY ((void *)0) /* must be 0 */
1338 #define DISK_ACTIVE ((void *)1)
1339 #define DISK_DONE ((void *)2)
1349 const security_driver_t *secdrv;
1350 char number[NUM_STR_SIZE];
1352 if(hostp->up != HOST_READY) {
1356 if (strncmp (hostp->hostname,"localhost",9) == 0) {
1358 "WARNING: Usage of fully qualified hostname recommended for Client %s.\n",
1363 * The first time through here we send a "noop" request. This will
1364 * return the feature list from the client if it supports that.
1365 * If it does not, handle_result() will set the feature list to an
1366 * empty structure. In either case, we do the disks on the second
1367 * (and subsequent) pass(es).
1370 if(hostp->features != NULL) { /* selfcheck service */
1371 int has_features = am_has_feature(hostp->features,
1372 fe_req_options_features);
1373 int has_hostname = am_has_feature(hostp->features,
1374 fe_req_options_hostname);
1375 int has_maxdumps = am_has_feature(hostp->features,
1376 fe_req_options_maxdumps);
1377 int has_config = am_has_feature(hostp->features,
1378 fe_req_options_config);
1380 if(!am_has_feature(hostp->features, fe_selfcheck_req) &&
1381 !am_has_feature(hostp->features, fe_selfcheck_req_device)) {
1383 "ERROR: Client %s does not support selfcheck REQ packet.\n",
1386 if(!am_has_feature(hostp->features, fe_selfcheck_rep)) {
1388 "ERROR: Client %s does not support selfcheck REP packet.\n",
1391 if(!am_has_feature(hostp->features, fe_sendsize_req_options) &&
1392 !am_has_feature(hostp->features, fe_sendsize_req_no_options) &&
1393 !am_has_feature(hostp->features, fe_sendsize_req_device)) {
1395 "ERROR: Client %s does not support sendsize REQ packet.\n",
1398 if(!am_has_feature(hostp->features, fe_sendsize_rep)) {
1400 "ERROR: Client %s does not support sendsize REP packet.\n",
1403 if(!am_has_feature(hostp->features, fe_sendbackup_req) &&
1404 !am_has_feature(hostp->features, fe_sendbackup_req_device)) {
1406 "ERROR: Client %s does not support sendbackup REQ packet.\n",
1409 if(!am_has_feature(hostp->features, fe_sendbackup_rep)) {
1411 "ERROR: Client %s does not support sendbackup REP packet.\n",
1415 snprintf(number, SIZEOF(number), "%d", hostp->maxdumps);
1416 req = vstralloc("SERVICE ", "selfcheck", "\n",
1418 has_features ? "features=" : "",
1419 has_features ? our_feature_string : "",
1420 has_features ? ";" : "",
1421 has_maxdumps ? "maxdumps=" : "",
1422 has_maxdumps ? number : "",
1423 has_maxdumps ? ";" : "",
1424 has_hostname ? "hostname=" : "",
1425 has_hostname ? hostp->hostname : "",
1426 has_hostname ? ";" : "",
1427 has_config ? "config=" : "",
1428 has_config ? config_name : "",
1429 has_config ? ";" : "",
1433 req_len = strlen(req);
1434 req_len += 128; /* room for SECURITY ... */
1435 req_len += 256; /* room for non-disk answers */
1436 for(dp = hostp->disks; dp != NULL; dp = dp->hostnext) {
1444 if(dp->up != DISK_READY || dp->todo != 1) {
1447 o = optionstr(dp, hostp->features, outf);
1452 qname = quote_string(dp->name);
1453 qdevice = quote_string(dp->device);
1454 if ((dp->name && qname[0] == '"') ||
1455 (dp->device && qdevice[0] == '"')) {
1456 if(!am_has_feature(hostp->features, fe_interface_quoted_text)) {
1458 "WARNING: %s:%s:%s host does not support quoted text\n",
1459 hostp->hostname, qname, qdevice);
1464 if(!am_has_feature(hostp->features, fe_selfcheck_req_device)) {
1466 "ERROR: %s:%s (%s): selfcheck does not support device.\n",
1467 hostp->hostname, qname, dp->device);
1469 if(!am_has_feature(hostp->features, fe_sendsize_req_device)) {
1471 "ERROR: %s:%s (%s): sendsize does not support device.\n",
1472 hostp->hostname, qname, dp->device);
1474 if(!am_has_feature(hostp->features, fe_sendbackup_req_device)) {
1476 "ERROR: %s:%s (%s): sendbackup does not support device.\n",
1477 hostp->hostname, qname, dp->device);
1480 if(strncmp(dp->program,"DUMP",4) == 0 ||
1481 strncmp(dp->program,"GNUTAR",6) == 0) {
1482 if(strcmp(dp->program, "DUMP") == 0 &&
1483 !am_has_feature(hostp->features, fe_program_dump)) {
1484 fprintf(outf, "ERROR: %s:%s does not support DUMP.\n",
1485 hostp->hostname, qname);
1487 if(strcmp(dp->program, "GNUTAR") == 0 &&
1488 !am_has_feature(hostp->features, fe_program_gnutar)) {
1489 fprintf(outf, "ERROR: %s:%s does not support GNUTAR.\n",
1490 hostp->hostname, qname);
1492 if(dp->estimate == ES_CALCSIZE &&
1493 !am_has_feature(hostp->features, fe_calcsize_estimate)) {
1494 fprintf(outf, "ERROR: %s:%s does not support CALCSIZE for estimate, using CLIENT.\n",
1495 hostp->hostname, qname);
1496 dp->estimate = ES_CLIENT;
1498 if(dp->estimate == ES_CALCSIZE &&
1499 am_has_feature(hostp->features, fe_selfcheck_calcsize))
1500 calcsize = "CALCSIZE ";
1504 if(dp->compress == COMP_CUST &&
1505 !am_has_feature(hostp->features, fe_options_compress_cust)) {
1507 "ERROR: Client %s does not support custom compression.\n",
1510 if(dp->encrypt == ENCRYPT_CUST ) {
1511 if ( !am_has_feature(hostp->features, fe_options_encrypt_cust)) {
1513 "ERROR: Client %s does not support data encryption.\n",
1516 } else if ( dp->compress == COMP_SERV_FAST ||
1517 dp->compress == COMP_SERV_BEST ||
1518 dp->compress == COMP_SERV_CUST ) {
1520 "ERROR: %s: Client encryption with server compression is not supported. See amanda.conf(5) for detail.\n", hostp->hostname);
1525 l = vstralloc(calcsize,
1535 l = vstralloc(calcsize,
1544 if(!am_has_feature(hostp->features, fe_program_dumper_api)) {
1545 fprintf(outf, "ERROR: %s:%s does not support DUMPER-API.\n",
1546 hostp->hostname, qname);
1548 l = vstralloc("DUMPER ",
1567 dp->up = DISK_ACTIVE;
1571 else { /* noop service */
1572 req = vstralloc("SERVICE ", "noop", "\n",
1574 "features=", our_feature_string, ";",
1577 for(dp = hostp->disks; dp != NULL; dp = dp->hostnext) {
1578 if(dp->up != DISK_READY || dp->todo != 1) {
1585 if(disk_count == 0) {
1587 hostp->up = HOST_DONE;
1591 secdrv = security_getdriver(hostp->disks->security_driver);
1592 if (secdrv == NULL) {
1593 error("could not find security driver '%s' for host '%s'",
1594 hostp->disks->security_driver, hostp->hostname);
1597 protocol_sendreq(hostp->hostname, secdrv, amhost_get_security_conf,
1598 req, conf_ctimeout, handle_result, hostp);
1602 hostp->up = HOST_ACTIVE;
1606 start_client_checks(
1615 switch(pid = fork()) {
1617 error("could not fork client check: %s", strerror(errno));
1630 set_pname("amcheck-clients");
1634 if((outf = fdopen(fd, "w")) == NULL) {
1635 error("fdopen %d: %s", fd, strerror(errno));
1640 fprintf(outf, "\nAmanda Backup Client Hosts Check\n");
1641 fprintf(outf, "--------------------------------\n");
1645 hostcount = remote_errors = 0;
1647 for(dp = origq.head; dp != NULL; dp = dp->next) {
1649 if(hostp->up == HOST_READY && dp->todo == 1) {
1659 "Client check: %d host%s checked in %s seconds, %d problem%s found\n",
1660 hostcount, (hostcount == 1) ? "" : "s",
1661 walltime_str(curclock()),
1662 remote_errors, (remote_errors == 1) ? "" : "s");
1666 amfree(config_name);
1668 malloc_size_2 = malloc_inuse(&malloc_hist_2);
1670 if(malloc_size_1 != malloc_size_2) {
1671 malloc_list(fd, malloc_hist_1, malloc_hist_2);
1674 exit(userbad || remote_errors > 0);
1683 security_handle_t * sech)
1693 hostp = (am_host_t *)datap;
1694 hostp->up = HOST_READY;
1698 "WARNING: %s: selfcheck request failed: %s\n", hostp->hostname,
1699 security_geterror(sech));
1701 hostp->up = HOST_DONE;
1706 fprintf(errf, "got response from %s:\n----\n%s----\n\n",
1707 hostp->hostname, pkt->body);
1714 skip_quoted_line(s, ch);
1715 if (s[-2] == '\n') {
1719 #define sc "OPTIONS "
1720 if(strncmp(line, sc, SIZEOF(sc)-1) == 0) {
1723 #define sc "features="
1724 t = strstr(line, sc);
1725 if(t != NULL && (isspace((int)t[-1]) || t[-1] == ';')) {
1728 am_release_feature_set(hostp->features);
1729 if((hostp->features = am_string_to_feature(t)) == NULL) {
1730 fprintf(outf, "ERROR: %s: bad features value: %s\n",
1731 hostp->hostname, line);
1739 if(strncmp(line, sc, SIZEOF(sc)-1) == 0) {
1745 if(strncmp(line, sc, SIZEOF(sc)-1) == 0) {
1746 t = line + SIZEOF(sc) - 1;
1750 skip_whitespace(t, tch);
1752 * If the "error" is that the "noop" service is unknown, it
1753 * just means the client is "old" (does not support the service).
1754 * We can ignore this.
1756 if(!((hostp->features == NULL) && (pkt->type == P_NAK)
1757 && ((strcmp(t - 1, "unknown service: noop") == 0)
1758 || (strcmp(t - 1, "noop: invalid service") == 0)))) {
1759 fprintf(outf, "ERROR: %s%s: %s\n",
1760 (pkt->type == P_NAK) ? "NAK " : "",
1764 hostp->up = HOST_DONE;
1769 fprintf(outf, "ERROR: %s: unknown response: %s\n",
1770 hostp->hostname, line);
1772 hostp->up = HOST_DONE;
1774 if(hostp->up == HOST_READY && hostp->features == NULL) {
1776 * The client does not support the features list, so give it an
1779 dbprintf(("%s: no feature set from host %s\n",
1780 debug_prefix_time(NULL), hostp->hostname));
1781 hostp->features = am_set_default_feature_set();
1783 for(dp = hostp->disks; dp != NULL; dp = dp->hostnext) {
1784 if(dp->up == DISK_ACTIVE) {
1789 if(hostp->up == HOST_DONE)
1790 security_close_connection(sech, hostp->hostname);