1/* 2 * Copyright (c) 1997-2006 Erez Zadok 3 * Copyright (c) 1989 Jan-Simon Pendry 4 * Copyright (c) 1989 Imperial College of Science, Technology & Medicine 5 * Copyright (c) 1989 The Regents of the University of California. 6 * All rights reserved. 7 * 8 * This code is derived from software contributed to Berkeley by 9 * Jan-Simon Pendry at Imperial College, London. 10 * 11 * Redistribution and use in source and binary forms, with or without 12 * modification, are permitted provided that the following conditions 13 * are met: 14 * 1. Redistributions of source code must retain the above copyright 15 * notice, this list of conditions and the following disclaimer. 16 * 2. Redistributions in binary form must reproduce the above copyright 17 * notice, this list of conditions and the following disclaimer in the 18 * documentation and/or other materials provided with the distribution. 19 * 3. All advertising materials mentioning features or use of this software 20 * must display the following acknowledgment: 21 * This product includes software developed by the University of 22 * California, Berkeley and its contributors. 23 * 4. Neither the name of the University nor the names of its contributors 24 * may be used to endorse or promote products derived from this software 25 * without specific prior written permission. 26 * 27 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 28 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 29 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 30 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 31 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 32 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 33 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 34 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 35 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 36 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 37 * SUCH DAMAGE. 38 * 39 * 40 * File: am-utils/fsinfo/wr_dumpset.c 41 * 42 */ 43 44#ifdef HAVE_CONFIG_H 45# include <config.h> 46#endif /* HAVE_CONFIG_H */ 47#include <am_defs.h> 48#include <fsi_data.h> 49#include <fsinfo.h> 50 51 52static int 53write_dumpset_info(FILE *ef, qelem *q) 54{ 55 int errors = 0; 56 disk_fs *dp; 57 58 ITER(dp, disk_fs, q) { 59 if (dp->d_dumpset) { 60 fprintf(ef, "%s\t%s:%-30s\t# %s\n", 61 dp->d_dumpset, 62 dp->d_host->h_lochost ? 63 dp->d_host->h_lochost : 64 dp->d_host->h_hostname, 65 dp->d_mountpt, 66 dp->d_dev); 67 } 68 } 69 return errors; 70} 71 72 73int 74write_dumpset(qelem *q) 75{ 76 int errors = 0; 77 78 if (dumpset_pref) { 79 FILE *ef = pref_open(dumpset_pref, "dumpsets", info_hdr, "exabyte dumpset"); 80 if (ef) { 81 host *hp; 82 83 ITER(hp, host, q) { 84 if (hp->h_disk_fs) { 85 errors += write_dumpset_info(ef, hp->h_disk_fs); 86 } 87 } 88 errors += pref_close(ef); 89 } else { 90 errors++; 91 } 92 } 93 94 return errors; 95} 96