3 * Bacula Director -- verify.c -- responsible for running file verification
5 * Kern Sibbald, October MM
7 * Basic tasks done here:
9 * Open connection with File daemon and pass him commands
11 * When the File daemon sends the attributes, compare them to
18 Copyright (C) 2000-2003 Kern Sibbald and John Walker
20 This program is free software; you can redistribute it and/or
21 modify it under the terms of the GNU General Public License as
22 published by the Free Software Foundation; either version 2 of
23 the License, or (at your option) any later version.
25 This program is distributed in the hope that it will be useful,
26 but WITHOUT ANY WARRANTY; without even the implied warranty of
27 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
28 General Public License for more details.
30 You should have received a copy of the GNU General Public
31 License along with this program; if not, write to the Free
32 Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
39 #include "findlib/find.h"
41 /* Imported Global Variables */
42 extern int debug_level;
44 /* Commands sent to File daemon */
45 static char verifycmd[] = "verify level=%s\n";
46 static char storaddr[] = "storage address=%s port=%d ssl=0\n";
47 static char sessioncmd[] = "session %s %ld %ld %ld %ld %ld %ld\n";
49 /* Responses received from File daemon */
50 static char OKverify[] = "2000 OK verify\n";
51 static char OKstore[] = "2000 OK storage\n";
52 static char OKsession[] = "2000 OK session\n";
54 /* Forward referenced functions */
55 static void verify_cleanup(JCR *jcr, int TermCode);
56 static void prt_fname(JCR *jcr);
57 static int missing_handler(void *ctx, int num_fields, char **row);
60 * Do a verification of the specified files against the Catlaog
62 * Returns: 0 on failure
65 int do_verify(JCR *jcr)
73 if (!get_or_create_client_record(jcr)) {
77 Dmsg1(9, "bdird: created client %s record\n", jcr->client->hdr.name);
79 /* If we are doing a verify from the catalog,
80 * we must look up the time and date of the
83 if (jcr->JobLevel == L_VERIFY_CATALOG ||
84 jcr->JobLevel == L_VERIFY_VOLUME_TO_CATALOG) {
85 memcpy(&jr, &jcr->jr, sizeof(jr));
86 if (!db_find_last_jobid(jcr, jcr->db, &jr)) {
87 if (jcr->JobLevel == L_VERIFY_CATALOG) {
88 Jmsg(jcr, M_FATAL, 0, _(
89 "Unable to find JobId of previous InitCatalog Job.\n"
90 "Please run a Verify with Level=InitCatalog before\n"
91 "running the current Job.\n"));
93 Jmsg(jcr, M_FATAL, 0, _(
94 "Unable to find JobId of previous Job for this client.\n"));
99 Dmsg1(20, "Last full id=%d\n", JobId);
102 jcr->jr.JobId = jcr->JobId;
103 jcr->jr.StartTime = jcr->start_time;
104 jcr->jr.Level = jcr->JobLevel;
105 if (!db_update_job_start_record(jcr, jcr->db, &jcr->jr)) {
106 Jmsg(jcr, M_FATAL, 0, "%s", db_strerror(jcr->db));
111 jcr->fname = get_pool_memory(PM_FNAME);
114 jcr->jr.JobId = JobId; /* save target JobId */
116 /* Print Job Start message */
117 Jmsg(jcr, M_INFO, 0, _("Start Verify JobId %d Job=%s\n"),
118 jcr->JobId, jcr->Job);
120 if (jcr->JobLevel == L_VERIFY_CATALOG ||
121 jcr->JobLevel == L_VERIFY_VOLUME_TO_CATALOG) {
122 memset(&jr, 0, sizeof(jr));
124 if (!db_get_job_record(jcr, jcr->db, &jr)) {
125 Jmsg(jcr, M_FATAL, 0, _("Could not get job record for previous Job. ERR=%s"),
126 db_strerror(jcr->db));
129 if (jr.JobStatus != 'T') {
130 Jmsg(jcr, M_FATAL, 0, _("Last Job %d did not terminate normally. JobStatus=%c\n"),
131 JobId, jr.JobStatus);
134 Jmsg(jcr, M_INFO, 0, _("Verifying against JobId=%d Job=%s\n"),
139 * If we are verifying a Volume, we need the Storage
140 * daemon, so open a connection, otherwise, just
141 * create a dummy authorization key (passed to
142 * File daemon but not used).
144 if (jcr->JobLevel == L_VERIFY_VOLUME_TO_CATALOG) {
145 RBSR *bsr = new_bsr();
147 bsr->JobId = jr.JobId;
148 ua = new_ua_context(jcr);
149 complete_bsr(ua, bsr);
150 bsr->fi = new_findex();
152 bsr->fi->findex2 = jr.JobFiles;
153 if (!write_bsr_file(ua, bsr)) {
160 if (jcr->RestoreBootstrap) {
161 free(jcr->RestoreBootstrap);
163 POOLMEM *fname = get_pool_memory(PM_MESSAGE);
164 Mmsg(&fname, "%s/restore.bsr", working_directory);
165 jcr->RestoreBootstrap = bstrdup(fname);
166 free_pool_memory(fname);
169 * Start conversation with Storage daemon
171 set_jcr_job_status(jcr, JS_Blocked);
172 if (!connect_to_storage_daemon(jcr, 10, SDConnectTimeout, 1)) {
176 * Now start a job with the Storage daemon
178 if (!start_storage_daemon_job(jcr)) {
182 * Now start a Storage daemon message thread
184 if (!start_storage_daemon_message_thread(jcr)) {
187 Dmsg0(50, "Storage daemon connection OK\n");
189 jcr->sd_auth_key = bstrdup("dummy"); /* dummy Storage daemon key */
192 * OK, now connect to the File daemon
193 * and ask him for the files.
195 set_jcr_job_status(jcr, JS_Blocked);
196 if (!connect_to_file_daemon(jcr, 10, FDConnectTimeout, 1)) {
200 set_jcr_job_status(jcr, JS_Running);
201 fd = jcr->file_bsock;
203 Dmsg0(30, ">filed: Send include list\n");
204 if (!send_include_list(jcr)) {
208 Dmsg0(30, ">filed: Send exclude list\n");
209 if (!send_exclude_list(jcr)) {
214 * Send Level command to File daemon, as well
215 * as the Storage address if appropriate.
217 switch (jcr->JobLevel) {
221 case L_VERIFY_CATALOG:
224 case L_VERIFY_VOLUME_TO_CATALOG:
226 * send Storage daemon address to the File daemon
228 if (jcr->store->SDDport == 0) {
229 jcr->store->SDDport = jcr->store->SDport;
231 bnet_fsend(fd, storaddr, jcr->store->address, jcr->store->SDDport);
232 if (!response(jcr, fd, OKstore, "Storage", DISPLAY_ERROR)) {
237 * Send the bootstrap file -- what Volumes/files to restore
239 if (!send_bootstrap_file(jcr)) {
244 * The following code is deprecated
246 if (!jcr->RestoreBootstrap) {
248 * Pass the VolSessionId, VolSessionTime, Start and
249 * end File and Blocks on the session command.
251 bnet_fsend(fd, sessioncmd,
253 jr.VolSessionId, jr.VolSessionTime,
254 jr.StartFile, jr.EndFile, jr.StartBlock,
256 if (!response(jcr, fd, OKsession, "Session", DISPLAY_ERROR)) {
266 Jmsg1(jcr, M_FATAL, 0, _("Unimplemented save level %d\n"), jcr->JobLevel);
271 * Send verify command/level to File daemon
273 bnet_fsend(fd, verifycmd, level);
274 if (!response(jcr, fd, OKverify, "Verify", DISPLAY_ERROR)) {
279 * Now get data back from File daemon and
280 * compare it to the catalog or store it in the
281 * catalog depending on the run type.
283 /* Compare to catalog */
284 switch (jcr->JobLevel) {
285 case L_VERIFY_CATALOG:
286 Dmsg0(10, "Verify level=catalog\n");
287 jcr->sd_msg_thread_done = true; /* no SD msg thread, so it is done */
288 jcr->SDJobStatus = JS_Terminated;
289 get_attributes_and_compare_to_catalog(jcr, JobId);
292 case L_VERIFY_VOLUME_TO_CATALOG:
293 Dmsg0(10, "Verify level=volume\n");
294 get_attributes_and_compare_to_catalog(jcr, JobId);
299 Dmsg0(10, "Verify level=init\n");
300 jcr->sd_msg_thread_done = true; /* no SD msg thread, so it is done */
301 jcr->SDJobStatus = JS_Terminated;
302 get_attributes_and_put_in_catalog(jcr);
306 Jmsg1(jcr, M_FATAL, 0, _("Unimplemented verify level %d\n"), jcr->JobLevel);
310 stat = wait_for_job_termination(jcr);
312 verify_cleanup(jcr, stat);
316 verify_cleanup(jcr, JS_ErrorTerminated);
321 * Release resources allocated during backup.
324 static void verify_cleanup(JCR *jcr, int TermCode)
326 char sdt[50], edt[50];
328 char term_code[100], fd_term_msg[100], sd_term_msg[100];
333 // Dmsg1(000, "Enter verify_cleanup() TermCod=%d\n", TermCode);
335 JobId = jcr->jr.JobId;
336 set_jcr_job_status(jcr, TermCode);
338 update_job_end_record(jcr);
340 msg_type = M_INFO; /* by default INFO message */
343 term_msg = _("Verify OK");
345 case JS_ErrorTerminated:
346 term_msg = _("*** Verify Error ***");
347 msg_type = M_ERROR; /* Generate error message */
350 term_msg = _("Verify Canceled");
353 term_msg = _("Verify Differences");
356 term_msg = term_code;
357 sprintf(term_code, _("Inappropriate term code: %c\n"), TermCode);
360 bstrftime(sdt, sizeof(sdt), jcr->jr.StartTime);
361 bstrftime(edt, sizeof(edt), jcr->jr.EndTime);
363 jobstatus_to_ascii(jcr->FDJobStatus, fd_term_msg, sizeof(fd_term_msg));
364 if (jcr->JobLevel == L_VERIFY_VOLUME_TO_CATALOG) {
365 jobstatus_to_ascii(jcr->SDJobStatus, sd_term_msg, sizeof(sd_term_msg));
366 Jmsg(jcr, msg_type, 0, _("Bacula " VERSION " (" LSMDATE "): %s\n\
374 Files Examined: %s\n\
375 Non-fatal FD errors: %d\n\
376 FD termination status: %s\n\
377 SD termination status: %s\n\
378 Termination: %s\n\n"),
382 jcr->fileset->hdr.name,
383 level_to_str(jcr->JobLevel),
384 jcr->client->hdr.name,
387 edit_uint64_with_commas(jcr->JobFiles, ec1),
393 Jmsg(jcr, msg_type, 0, _("Bacula " VERSION " (" LSMDATE "): %s\n\
401 Files Examined: %s\n\
402 Non-fatal FD errors: %d\n\
403 FD termination status: %s\n\
404 Termination: %s\n\n"),
408 jcr->fileset->hdr.name,
409 level_to_str(jcr->JobLevel),
410 jcr->client->hdr.name,
413 edit_uint64_with_commas(jcr->JobFiles, ec1),
418 Dmsg0(100, "Leave verify_cleanup()\n");
420 free_memory(jcr->fname);
426 * This routine is called only during a Verify
428 int get_attributes_and_compare_to_catalog(JCR *jcr, JobId_t JobId)
433 struct stat statf; /* file stat */
434 struct stat statc; /* catalog stat */
435 int stat = JS_Terminated;
437 POOLMEM *fname = get_pool_memory(PM_MESSAGE);
441 memset(&fdbr, 0, sizeof(FILE_DBR));
442 fd = jcr->file_bsock;
446 Dmsg0(20, "bdird: waiting to receive file attributes\n");
448 * Get Attributes and Signature from File daemon
452 * Options or SIG (MD5/SHA1)
457 while ((n=bget_dirmsg(fd)) >= 0 && !job_canceled(jcr)) {
460 char Opts_SIG[MAXSTRING]; /* Verify Opts or MD5/SHA1 signature */
462 fname = check_pool_memory_size(fname, fd->msglen);
463 jcr->fname = check_pool_memory_size(jcr->fname, fd->msglen);
464 Dmsg1(400, "Atts+SIG=%s\n", fd->msg);
465 if ((len = sscanf(fd->msg, "%ld %d %100s", &file_index, &stream,
467 Jmsg3(jcr, M_FATAL, 0, _("bird<filed: bad attributes, expected 3 fields got %d\n\
468 mslen=%d msg=%s\n"), len, fd->msglen, fd->msg);
472 * We read the Options or Signature into fname
473 * to prevent overrun, now copy it to proper location.
475 bstrncpy(Opts_SIG, fname, sizeof(Opts_SIG));
477 skip_nonspaces(&p); /* skip FileIndex */
479 skip_nonspaces(&p); /* skip Stream */
481 skip_nonspaces(&p); /* skip Opts_SIG */
482 p++; /* skip space */
485 *fn++ = *p++; /* copy filename */
487 *fn = *p++; /* term filename and point to attribs */
490 * Got attributes stream, decode it
492 if (stream == STREAM_UNIX_ATTRIBUTES || stream == STREAM_UNIX_ATTRIBUTES_EX) {
493 uint32_t LinkFIf, LinkFIc;
494 Dmsg2(400, "file_index=%d attr=%s\n", file_index, attr);
496 jcr->FileIndex = file_index; /* remember attribute file_index */
497 decode_stat(attr, &statf, &LinkFIf); /* decode file stat packet */
499 jcr->fn_printed = FALSE;
500 strcpy(jcr->fname, fname); /* move filename into JCR */
502 Dmsg2(040, "dird<filed: stream=%d %s\n", stream, jcr->fname);
503 Dmsg1(020, "dird<filed: attr=%s\n", attr);
506 * Find equivalent record in the database
509 if (!db_get_file_attributes_record(jcr, jcr->db, jcr->fname, &fdbr)) {
510 Jmsg(jcr, M_INFO, 0, _("New file: %s\n"), jcr->fname);
511 Dmsg1(020, _("File not in catalog: %s\n"), jcr->fname);
512 stat = JS_Differences;
516 * mark file record as visited by stuffing the
517 * current JobId, which is unique, into the MarkId field.
519 db_mark_file_record(jcr, jcr->db, fdbr.FileId, jcr->JobId);
522 Dmsg3(400, "Found %s in catalog. inx=%d Opts=%s\n", jcr->fname,
523 file_index, Opts_SIG);
524 decode_stat(fdbr.LStat, &statc, &LinkFIc); /* decode catalog stat */
526 * Loop over options supplied by user and verify the
527 * fields he requests.
529 for (p=Opts_SIG; *p; p++) {
530 char ed1[30], ed2[30];
532 case 'i': /* compare INODEs */
533 if (statc.st_ino != statf.st_ino) {
535 Jmsg(jcr, M_INFO, 0, _(" st_ino differ. Cat: %s File: %s\n"),
536 edit_uint64((uint64_t)statc.st_ino, ed1),
537 edit_uint64((uint64_t)statf.st_ino, ed2));
538 stat = JS_Differences;
541 case 'p': /* permissions bits */
542 if (statc.st_mode != statf.st_mode) {
544 Jmsg(jcr, M_INFO, 0, _(" st_mode differ. Cat: %x File: %x\n"),
545 (uint32_t)statc.st_mode, (uint32_t)statf.st_mode);
546 stat = JS_Differences;
549 case 'n': /* number of links */
550 if (statc.st_nlink != statf.st_nlink) {
552 Jmsg(jcr, M_INFO, 0, _(" st_nlink differ. Cat: %d File: %d\n"),
553 (uint32_t)statc.st_nlink, (uint32_t)statf.st_nlink);
554 stat = JS_Differences;
557 case 'u': /* user id */
558 if (statc.st_uid != statf.st_uid) {
560 Jmsg(jcr, M_INFO, 0, _(" st_uid differ. Cat: %u File: %u\n"),
561 (uint32_t)statc.st_uid, (uint32_t)statf.st_uid);
562 stat = JS_Differences;
565 case 'g': /* group id */
566 if (statc.st_gid != statf.st_gid) {
568 Jmsg(jcr, M_INFO, 0, _(" st_gid differ. Cat: %u File: %u\n"),
569 (uint32_t)statc.st_gid, (uint32_t)statf.st_gid);
570 stat = JS_Differences;
574 if (statc.st_size != statf.st_size) {
576 Jmsg(jcr, M_INFO, 0, _(" st_size differ. Cat: %s File: %s\n"),
577 edit_uint64((uint64_t)statc.st_size, ed1),
578 edit_uint64((uint64_t)statf.st_size, ed2));
579 stat = JS_Differences;
582 case 'a': /* access time */
583 if (statc.st_atime != statf.st_atime) {
585 Jmsg(jcr, M_INFO, 0, _(" st_atime differs\n"));
586 stat = JS_Differences;
590 if (statc.st_mtime != statf.st_mtime) {
592 Jmsg(jcr, M_INFO, 0, _(" st_mtime differs\n"));
593 stat = JS_Differences;
596 case 'c': /* ctime */
597 if (statc.st_ctime != statf.st_ctime) {
599 Jmsg(jcr, M_INFO, 0, _(" st_ctime differs\n"));
600 stat = JS_Differences;
603 case 'd': /* file size decrease */
604 if (statc.st_size > statf.st_size) {
606 Jmsg(jcr, M_INFO, 0, _(" st_size decrease. Cat: %s File: %s\n"),
607 edit_uint64((uint64_t)statc.st_size, ed1),
608 edit_uint64((uint64_t)statf.st_size, ed2));
609 stat = JS_Differences;
612 case '5': /* compare MD5 */
613 Dmsg1(500, "set Do_MD5 for %s\n", jcr->fname);
616 case '1': /* compare SHA1 */
626 * Got SIG Signature from Storage daemon
627 * It came across in the Opts_SIG field.
629 } else if (stream == STREAM_MD5_SIGNATURE || stream == STREAM_SHA1_SIGNATURE) {
630 Dmsg2(400, "stream=SIG inx=%d SIG=%s\n", file_index, Opts_SIG);
632 * When ever we get a signature is MUST have been
633 * preceded by an attributes record, which sets attr_file_index
635 if (jcr->FileIndex != (uint32_t)file_index) {
636 Jmsg2(jcr, M_FATAL, 0, _("MD5/SHA1 index %d not same as attributes %d\n"),
637 file_index, jcr->FileIndex);
641 db_escape_string(buf, Opts_SIG, strlen(Opts_SIG));
642 if (strcmp(buf, fdbr.SIG) != 0) {
644 if (debug_level >= 10) {
645 Jmsg(jcr, M_INFO, 0, _(" %s not same. File=%s Cat=%s\n"),
646 stream==STREAM_MD5_SIGNATURE?"MD5":"SHA1", buf, fdbr.SIG);
648 Jmsg(jcr, M_INFO, 0, _(" %s differs.\n"),
649 stream==STREAM_MD5_SIGNATURE?"MD5":"SHA1");
651 stat = JS_Differences;
656 jcr->JobFiles = file_index;
658 if (is_bnet_error(fd)) {
659 Jmsg2(jcr, M_FATAL, 0, _("bdird<filed: bad attributes from filed n=%d : %s\n"),
664 /* Now find all the files that are missing -- i.e. all files in
665 * the database where the MarkedId != current JobId
667 jcr->fn_printed = FALSE;
669 "SELECT Path.Path,Filename.Name FROM File,Path,Filename "
670 "WHERE File.JobId=%d "
671 "AND File.MarkedId!=%d AND File.PathId=Path.PathId "
672 "AND File.FilenameId=Filename.FilenameId",
674 /* missing_handler is called for each file found */
675 db_sql_query(jcr->db, buf, missing_handler, (void *)jcr);
676 if (jcr->fn_printed) {
677 stat = JS_Differences;
679 free_pool_memory(fname);
680 set_jcr_job_status(jcr, stat);
684 free_pool_memory(fname);
685 set_jcr_job_status(jcr, JS_ErrorTerminated);
690 * We are called here for each record that matches the above
691 * SQL query -- that is for each file contained in the Catalog
692 * that was not marked earlier. This means that the file in
693 * question is a missing file (in the Catalog but on on Disk).
695 static int missing_handler(void *ctx, int num_fields, char **row)
697 JCR *jcr = (JCR *)ctx;
699 if (!jcr->fn_printed) {
700 Jmsg(jcr, M_INFO, 0, "\n");
701 Jmsg(jcr, M_INFO, 0, _("The following files are missing:\n"));
702 jcr->fn_printed = TRUE;
704 Jmsg(jcr, M_INFO, 0, " %s%s\n", row[0]?row[0]:"", row[1]?row[1]:"");
710 * Print filename for verify
712 static void prt_fname(JCR *jcr)
714 if (!jcr->fn_printed) {
715 Jmsg(jcr, M_INFO, 0, _("File: %s\n"), jcr->fname);
716 jcr->fn_printed = TRUE;