1 /* 2 * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved. 3 */ 4 5 /* 6 * BSD 3 Clause License 7 * 8 * Copyright (c) 2007, The Storage Networking Industry Association. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * - Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 16 * - Redistributions in binary form must reproduce the above copyright 17 * notice, this list of conditions and the following disclaimer in 18 * the documentation and/or other materials provided with the 19 * distribution. 20 * 21 * - Neither the name of The Storage Networking Industry Association (SNIA) 22 * nor the names of its contributors may be used to endorse or promote 23 * products derived from this software without specific prior written 24 * permission. 25 * 26 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 27 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 28 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 29 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE 30 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 31 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 32 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 33 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 34 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 35 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 36 * POSSIBILITY OF SUCH DAMAGE. 37 */ 38 /* Copyright (c) 2007, The Storage Networking Industry Association. */ 39 /* Copyright (c) 1996, 1997 PDC, Network Appliance. All Rights Reserved */ 40 /* Copyright 2014 Nexenta Systems, Inc. All rights reserved. */ 41 42 #include <sys/stat.h> 43 #include <sys/types.h> 44 #include <sys/time.h> 45 #include <ctype.h> 46 #include <sys/socket.h> 47 #include <sys/acl.h> 48 #include <netinet/in.h> 49 #include <arpa/inet.h> 50 #include <errno.h> 51 #include <stdio.h> 52 #include <string.h> 53 #include <time.h> 54 #include <cstack.h> 55 #include "ndmp.h" 56 #include "ndmpd.h" 57 #include <bitmap.h> 58 #include <traverse.h> 59 60 61 /* 62 * Maximum length of the string-representation of u_longlong_t type. 63 */ 64 #define QUAD_DECIMAL_LEN 20 65 66 67 /* Is Y=yes or T=true */ 68 #define IS_YORT(c) (strchr("YT", toupper(c))) 69 70 /* Is F=file format (vs D=node-dir format) */ 71 #define IS_F(c) (toupper(c) == 'F') 72 73 /* 74 * If path is defined. 75 */ 76 #define ISDEFINED(cp) ((cp) && *(cp)) 77 #define SHOULD_LBRBK(bpp) (!((bpp)->bp_opr & TLM_OP_CHOOSE_ARCHIVE)) 78 79 /* 80 * Component boundary means end of path or on a '/'. At this 81 * point both paths should be on component boundary. 82 */ 83 #define COMPBNDRY(p) (!*(p) || (*p) == '/') 84 85 typedef struct bk_param_v3 { 86 ndmpd_session_t *bp_session; 87 ndmp_lbr_params_t *bp_nlp; 88 tlm_job_stats_t *bp_js; 89 tlm_cmd_t *bp_lcmd; 90 tlm_commands_t *bp_cmds; 91 tlm_acls_t *bp_tlmacl; 92 int bp_opr; 93 char *bp_tmp; 94 char *bp_chkpnm; 95 char **bp_excls; 96 char *bp_unchkpnm; 97 } bk_param_v3_t; 98 99 100 /* 101 * Multiple destination restore mode 102 */ 103 #define MULTIPLE_DEST_DIRS 128 104 105 int multiple_dest_restore = 0; 106 107 /* 108 * Plug-in module ops 109 */ 110 ndmp_plugin_t *ndmp_pl; 111 112 /* 113 * NDMP exclusion list 114 */ 115 char **ndmp_excl_list = NULL; 116 117 /* 118 * split_env 119 * 120 * Splits the string into list of sections separated by the 121 * sep character. 122 * 123 * Parameters: 124 * envp (input) - the environment variable that should be broken 125 * sep (input) - the separator character 126 * 127 * Returns: 128 * Array of character pointers: On success. The array is allocated 129 * as well as all its entries. They all should be freed by the 130 * caller. 131 * NULL: on error 132 */ 133 static char ** 134 split_env(char *envp, char sep) 135 { 136 char *bp, *cp, *ep; 137 char *save; 138 char **cpp; 139 int n; 140 141 if (!envp) 142 return (NULL); 143 144 while (isspace(*envp)) 145 envp++; 146 147 if (!*envp) 148 return (NULL); 149 150 bp = save = strdup(envp); 151 if (!bp) 152 return (NULL); 153 154 /* 155 * Since the env variable is not empty, it contains at least one 156 * component 157 */ 158 n = 1; 159 while ((cp = strchr(bp, sep))) { 160 if (cp > save && *(cp-1) != '\\') 161 n++; 162 163 bp = cp + 1; 164 } 165 166 n++; /* for the terminating NULL pointer */ 167 cpp = ndmp_malloc(sizeof (char *) * n); 168 if (!cpp) { 169 free(save); 170 return (NULL); 171 } 172 173 (void) memset(cpp, 0, n * sizeof (char *)); 174 n = 0; 175 cp = bp = ep = save; 176 while (*cp) 177 if (*cp == sep) { 178 *ep = '\0'; 179 if (strlen(bp) > 0) { 180 cpp[n] = strdup(bp); 181 if (!cpp[n++]) { 182 tlm_release_list(cpp); 183 cpp = NULL; 184 break; 185 } 186 } 187 ep = bp = ++cp; 188 } else if (*cp == '\\') { 189 ++cp; 190 if (*cp == 'n') { /* "\n" */ 191 *ep++ = '\n'; 192 cp++; 193 } else if (*cp == 't') { /* "\t" */ 194 *ep++ = '\t'; 195 cp++; 196 } else 197 *ep++ = *cp++; 198 } else 199 *ep++ = *cp++; 200 201 *ep = '\0'; 202 if (cpp) { 203 if (strlen(bp) > 0) { 204 cpp[n] = strdup(bp); 205 if (!cpp[n++]) { 206 tlm_release_list(cpp); 207 cpp = NULL; 208 } else 209 cpp[n] = NULL; 210 } 211 212 if (n == 0 && cpp != NULL) { 213 tlm_release_list(cpp); 214 cpp = NULL; 215 } 216 } 217 218 free(save); 219 return (cpp); 220 } 221 222 223 /* 224 * prl 225 * 226 * Print the array of character pointers passed to it. This is 227 * used for debugging purpose. 228 * 229 * Parameters: 230 * lpp (input) - pointer to the array of strings 231 * 232 * Returns: 233 * void 234 */ 235 static void 236 prl(char **lpp) 237 { 238 if (!lpp) { 239 NDMP_LOG(LOG_DEBUG, "empty"); 240 return; 241 } 242 243 while (*lpp) 244 NDMP_LOG(LOG_DEBUG, "\"%s\"", *lpp++); 245 } 246 247 248 /* 249 * inlist 250 * 251 * Looks through all the strings of the array to see if the ent 252 * matches any of the strings. The strings are patterns. 253 * 254 * Parameters: 255 * lpp (input) - pointer to the array of strings 256 * ent (input) - the entry to be matched 257 * 258 * Returns: 259 * TRUE: if there is a match 260 * FALSE: invalid argument or no match 261 */ 262 static boolean_t 263 inlist(char **lpp, char *ent) 264 { 265 if (!lpp || !ent) { 266 NDMP_LOG(LOG_DEBUG, "empty list"); 267 return (FALSE); 268 } 269 270 while (*lpp) { 271 /* 272 * Fixing the sync_sort NDMPV3 problem, it sends the inclusion 273 * like "./" which we should skip the "./" 274 */ 275 char *pattern = *lpp; 276 if (strncmp(pattern, "./", 2) == 0) 277 pattern += 2; 278 279 NDMP_LOG(LOG_DEBUG, "pattern %s, ent %s", pattern, ent); 280 281 if (match(pattern, ent)) { 282 NDMP_LOG(LOG_DEBUG, "match(%s,%s)", pattern, ent); 283 return (TRUE); 284 } 285 lpp++; 286 } 287 288 NDMP_LOG(LOG_DEBUG, "no match"); 289 return (FALSE); 290 } 291 292 293 /* 294 * inexl 295 * 296 * Checks if the entry is in the list. This is used for exclusion 297 * list. If the exclusion list is empty, FALSE should be returned 298 * showing that nothing should be excluded by default. 299 * 300 * Parameters: 301 * lpp (input) - pointer to the array of strings 302 * ent (input) - the entry to be matched 303 * 304 * Returns: 305 * TRUE: if there is a match 306 * FALSE: invalid argument or no match 307 * 308 */ 309 static boolean_t 310 inexl(char **lpp, char *ent) 311 { 312 if (!lpp || !ent) 313 return (FALSE); 314 315 return (inlist(lpp, ent)); 316 } 317 318 319 /* 320 * ininc 321 * 322 * Checks if the entry is in the list. This is used for inclusion 323 * list. If the inclusion list is empty, TRUE should be returned 324 * showing that everything should be included by default. 325 * 326 * Parameters: 327 * lpp (input) - pointer to the array of strings 328 * ent (input) - the entry to be matched 329 * 330 * Returns: 331 * TRUE: if there is a match or the list is empty 332 * FALSE: no match 333 */ 334 static boolean_t 335 ininc(char **lpp, char *ent) 336 { 337 if (!lpp || !ent || !*ent) 338 return (TRUE); 339 340 return (inlist(lpp, ent)); 341 } 342 343 344 /* 345 * setupsels 346 * 347 * Set up the selection list for Local B/R functions. A new array of 348 * "char *" is created and the pointers point to the original paths of 349 * the Nlist. 350 * 351 * Parameters: 352 * session (input) - pointer to the session 353 * params (input) - pointer to the parameters structure 354 * nlp (input) - pointer to the nlp structure 355 * index(input) - If not zero is the DAR entry position 356 * 357 * Returns: 358 * list pointer: on success 359 * NULL: on error 360 */ 361 /*ARGSUSED*/ 362 char ** 363 setupsels(ndmpd_session_t *session, ndmpd_module_params_t *params, 364 ndmp_lbr_params_t *nlp, int index) 365 { 366 char **lpp, **save; 367 int i, n; 368 int len; 369 int start, end; 370 mem_ndmp_name_v3_t *ep; 371 372 n = session->ns_data.dd_nlist_len; 373 374 save = lpp = ndmp_malloc(sizeof (char *) * (n + 1)); 375 if (!lpp) { 376 MOD_LOGV3(params, NDMP_LOG_ERROR, "Insufficient memory.\n"); 377 return (NULL); 378 } 379 380 if (index) { /* DAR, just one entry */ 381 /* 382 * We have to setup a list of strings that will not match any 383 * file. One DAR entry will be added in the right position later 384 * in this function. 385 * When the match is called from tar_getdir the 386 * location of the selection that matches the entry is 387 * important 388 */ 389 for (i = 0; i < n; ++i) 390 *(lpp+i) = " "; 391 n = 1; 392 start = index-1; 393 end = start+1; 394 lpp += start; /* Next selection entry will be in lpp[start] */ 395 } else { 396 start = 0; 397 end = n; 398 } 399 400 for (i = start; i < end; i++) { 401 ep = (mem_ndmp_name_v3_t *)MOD_GETNAME(params, i); 402 if (!ep) 403 continue; 404 405 /* 406 * Check for clients that send original path as "."(like 407 * CA products). In this situation opath is something like 408 * "/v1/." and we should change it to "/v1/" 409 */ 410 len = strlen(ep->nm3_opath); 411 if (len > 1 && ep->nm3_opath[len-2] == '/' && 412 ep->nm3_opath[len-1] == '.') { 413 ep->nm3_opath[len-1] = '\0'; 414 NDMP_LOG(LOG_DEBUG, 415 "nm3_opath changed from %s. to %s", 416 ep->nm3_opath, ep->nm3_opath); 417 } 418 *lpp++ = ep->nm3_opath; 419 } 420 421 /* list termination indicator is a null pointer */ 422 *lpp = NULL; 423 424 return (save); 425 } 426 427 428 /* 429 * mkrsp 430 * 431 * Make Restore Path. 432 * It gets a path, a selection (with which the path has matched) a new 433 * name and makes a new name for the path. 434 * All the components of the path and the selection are skipped as long 435 * as they are the same. If either of the path or selection are not on 436 * a component boundary, the match was reported falsefully and no new name 437 * is generated(Except the situation in which both path and selection 438 * end with trailing '/' and selection is the prefix of the path). 439 * Otherwise, the remaining of the path is appended to the 440 * new name. The result is saved in the buffer passed. 441 * 442 * Parameters: 443 * bp (output) - pointer to the result buffer 444 * pp (input) - pointer to the path 445 * sp (input) - pointer to the selection 446 * np (input) - pointer to the new name 447 * 448 * Returns: 449 * pointer to the bp: on success 450 * NULL: otherwise 451 */ 452 char * 453 mkrsp(char *bp, char *pp, char *sp, char *np) 454 { 455 if (!bp || !pp) 456 return (NULL); 457 458 459 pp += strspn(pp, "/"); 460 if (sp) { 461 sp += strspn(sp, "/"); 462 463 /* skip as much as match */ 464 while (*sp && *pp && *sp == *pp) { 465 sp++; 466 pp++; 467 } 468 469 if (!COMPBNDRY(pp) || !COMPBNDRY(sp)) 470 /* An exception to the boundary rule */ 471 /* (!(!*sp && (*(pp - 1)) == '/')) */ 472 if (*sp || (*(pp - 1)) != '/') 473 return (NULL); 474 475 /* if pp shorter than sp, it should not be restored */ 476 if (!*pp && *sp) { 477 sp += strspn(sp, "/"); 478 if (strlen(sp) > 0) 479 return (NULL); 480 } 481 } 482 483 if (np) 484 np += strspn(np, "/"); 485 else 486 np = ""; 487 488 if (!tlm_cat_path(bp, np, pp)) { 489 NDMP_LOG(LOG_ERR, "Restore path too long %s/%s.", np, pp); 490 return (NULL); 491 } 492 493 return (bp); 494 } 495 496 497 /* 498 * mknewname 499 * 500 * This is used as callback for creating the restore path. This function 501 * can handle both single destination and multiple restore paths. 502 * 503 * Make up the restore destination path for a particular file/directory, path, 504 * based on nm3_opath and nm3_dpath. path should have matched nm3_opath 505 * in some way. 506 */ 507 char * 508 mknewname(struct rs_name_maker *rnp, char *buf, int idx, char *path) 509 { 510 char *rv; 511 ndmp_lbr_params_t *nlp; 512 mem_ndmp_name_v3_t *ep; 513 514 rv = NULL; 515 if (!buf) { 516 NDMP_LOG(LOG_DEBUG, "buf is NULL"); 517 } else if (!path) { 518 NDMP_LOG(LOG_DEBUG, "path is NULL"); 519 } else if ((nlp = rnp->rn_nlp) == 0) { 520 NDMP_LOG(LOG_DEBUG, "rnp->rn_nlp is NULL"); 521 } else if (!nlp->nlp_params) { 522 NDMP_LOG(LOG_DEBUG, "nlp->nlp_params is NULL"); 523 } else 524 if (!ndmp_full_restore_path) { 525 if (idx < 0 || idx >= (int)nlp->nlp_nfiles) { 526 NDMP_LOG(LOG_DEBUG, 527 "Invalid idx %d range (0, %d)", 528 idx, nlp->nlp_nfiles); 529 } else if (!(ep = (mem_ndmp_name_v3_t *)MOD_GETNAME( 530 nlp->nlp_params, idx))) { 531 NDMP_LOG(LOG_DEBUG, 532 "nlist entry %d is NULL", idx); 533 } else { 534 rv = mkrsp(buf, path, ep->nm3_opath, 535 ep->nm3_dpath); 536 537 NDMP_LOG(LOG_DEBUG, 538 "idx %d org \"%s\" dst \"%s\"", 539 idx, ep->nm3_opath, ep->nm3_dpath); 540 if (rv) { 541 NDMP_LOG(LOG_DEBUG, 542 "path \"%s\": \"%s\"", path, rv); 543 } else { 544 NDMP_LOG(LOG_DEBUG, 545 "path \"%s\": NULL", path); 546 } 547 } 548 } else { 549 if (!tlm_cat_path(buf, nlp->nlp_restore_path, path)) { 550 NDMP_LOG(LOG_ERR, "Path too long %s/%s.", 551 nlp->nlp_restore_path, path); 552 rv = NULL; 553 } else { 554 rv = buf; 555 NDMP_LOG(LOG_DEBUG, 556 "path \"%s\": \"%s\"", path, rv); 557 } 558 } 559 560 return (rv); 561 } 562 563 564 /* 565 * chopslash 566 * 567 * Remove the slash from the end of the given path 568 */ 569 static void 570 chopslash(char *cp) 571 { 572 int ln; 573 574 if (!cp || !*cp) 575 return; 576 577 ln = strlen(cp); 578 cp += ln - 1; /* end of the string */ 579 while (ln > 0 && *cp == '/') { 580 *cp-- = '\0'; 581 ln--; 582 } 583 } 584 585 586 /* 587 * joinpath 588 * 589 * Join two given paths 590 */ 591 static char * 592 joinpath(char *bp, char *pp, char *np) 593 { 594 if (pp && *pp) { 595 if (np && *np) 596 (void) tlm_cat_path(bp, pp, np); 597 else 598 (void) strlcpy(bp, pp, TLM_MAX_PATH_NAME); 599 } else { 600 if (np && *np) 601 (void) strlcpy(bp, np, TLM_MAX_PATH_NAME); 602 else 603 bp = NULL; 604 } 605 606 return (bp); 607 } 608 609 610 /* 611 * voliswr 612 * 613 * Is the volume writable? 614 */ 615 static int 616 voliswr(char *path) 617 { 618 int rv; 619 620 if (!path) 621 return (0); 622 623 rv = !fs_is_rdonly(path) && !fs_is_chkpntvol(path); 624 NDMP_LOG(LOG_DEBUG, "%d path \"%s\"", rv, path); 625 return (rv); 626 627 } 628 629 630 /* 631 * is_valid_backup_dir_v3 632 * 633 * Checks the validity of the backup path. Backup path should 634 * have the following characteristics to be valid: 635 * 1) It should be an absolute path. 636 * 2) It should be a directory. 637 * 3) It should not be checkpoint root directory 638 * 4) If the file system is read-only, the backup path 639 * should be a checkpointed path. Checkpoint cannot 640 * be created on a read-only file system. 641 * 642 * Parameters: 643 * params (input) - pointer to the parameters structure. 644 * bkpath (input) - the backup path 645 * 646 * Returns: 647 * TRUE: if everything's OK 648 * FALSE: otherwise. 649 */ 650 static boolean_t 651 is_valid_backup_dir_v3(ndmpd_module_params_t *params, char *bkpath) 652 { 653 char *msg; 654 struct stat64 st; 655 656 if (*bkpath != '/') { 657 MOD_LOGV3(params, NDMP_LOG_ERROR, 658 "Relative backup path not allowed \"%s\".\n", bkpath); 659 return (FALSE); 660 } 661 if (stat64(bkpath, &st) < 0) { 662 msg = strerror(errno); 663 MOD_LOGV3(params, NDMP_LOG_ERROR, "\"%s\" %s.\n", 664 bkpath, msg); 665 return (FALSE); 666 } 667 if (!S_ISDIR(st.st_mode)) { 668 /* only directories can be specified as the backup path */ 669 MOD_LOGV3(params, NDMP_LOG_ERROR, 670 "\"%s\" is not a directory.\n", bkpath); 671 return (FALSE); 672 } 673 if (fs_is_rdonly(bkpath) && !fs_is_chkpntvol(bkpath) && 674 fs_is_chkpnt_enabled(bkpath)) { 675 /* it is not a chkpnted path */ 676 MOD_LOGV3(params, NDMP_LOG_ERROR, 677 "\"%s\" is not a checkpointed path.\n", bkpath); 678 return (FALSE); 679 } 680 681 return (TRUE); 682 } 683 684 685 /* 686 * log_date_token_v3 687 * 688 * Log the token sequence number and also the date of the 689 * last backup for token-based backup in the system log 690 * and also send them as normal log to the client. 691 * 692 * Parameters: 693 * params (input) - pointer to the parameters structure 694 * nlp (input) - pointer to the nlp structure 695 * 696 * Returns: 697 * void 698 */ 699 static void 700 log_date_token_v3(ndmpd_module_params_t *params, ndmp_lbr_params_t *nlp) 701 { 702 MOD_LOGV3(params, NDMP_LOG_NORMAL, "Token sequence counter: %d.\n", 703 nlp->nlp_tokseq); 704 705 MOD_LOGV3(params, NDMP_LOG_NORMAL, "Date of the last backup: %s.\n", 706 cctime(&nlp->nlp_tokdate)); 707 708 if (nlp->nlp_dmpnm) { 709 MOD_LOGV3(params, NDMP_LOG_NORMAL, 710 "Backup date log file name: \"%s\".\n", nlp->nlp_dmpnm); 711 } 712 } 713 714 715 /* 716 * log_lbr_bk_v3 717 * 718 * Log the backup level and data of the backup for LBR-type 719 * backup in the system log and also send them as normal log 720 * to the client. 721 * 722 * Parameters: 723 * params (input) - pointer to the parameters structure 724 * nlp (input) - pointer to the nlp structure 725 * 726 * Returns: 727 * void 728 */ 729 static void 730 log_lbr_bk_v3(ndmpd_module_params_t *params, ndmp_lbr_params_t *nlp) 731 { 732 MOD_LOGV3(params, NDMP_LOG_NORMAL, 733 "Date of this level '%c': %s.\n", nlp->nlp_clevel, 734 cctime(&nlp->nlp_cdate)); 735 736 if (nlp->nlp_dmpnm) { 737 MOD_LOGV3(params, NDMP_LOG_NORMAL, 738 "Backup date log file name: \"%s\".\n", nlp->nlp_dmpnm); 739 } 740 } 741 742 743 /* 744 * log_level_v3 745 * 746 * Log the backup level and date of the last and the current 747 * backup for level-type backup in the system log and also 748 * send them as normal log to the client. 749 * 750 * Parameters: 751 * params (input) - pointer to the parameters structure 752 * nlp (input) - pointer to the nlp structure 753 * 754 * Returns: 755 * void 756 */ 757 static void 758 log_level_v3(ndmpd_module_params_t *params, ndmp_lbr_params_t *nlp) 759 { 760 MOD_LOGV3(params, NDMP_LOG_NORMAL, 761 "Date of the last level '%u': %s.\n", nlp->nlp_llevel, 762 cctime(&nlp->nlp_ldate)); 763 764 MOD_LOGV3(params, NDMP_LOG_NORMAL, 765 "Date of this level '%u': %s.\n", nlp->nlp_clevel, 766 cctime(&nlp->nlp_cdate)); 767 768 MOD_LOGV3(params, NDMP_LOG_NORMAL, "Update: %s.\n", 769 NDMP_TORF(NLP_ISSET(nlp, NLPF_UPDATE))); 770 } 771 772 773 /* 774 * log_bk_params_v3 775 * 776 * Dispatcher function which calls the appropriate function 777 * for logging the backup date and level in the system log 778 * and also send them as normal log message to the client. 779 * 780 * Parameters: 781 * session (input) - pointer to the session 782 * params (input) - pointer to the parameters structure 783 * nlp (input) - pointer to the nlp structure 784 * 785 * Returns: 786 * void 787 */ 788 static void 789 log_bk_params_v3(ndmpd_session_t *session, ndmpd_module_params_t *params, 790 ndmp_lbr_params_t *nlp) 791 { 792 MOD_LOGV3(params, NDMP_LOG_NORMAL, "Backing up \"%s\".\n", 793 nlp->nlp_backup_path); 794 795 if (session->ns_mover.md_data_addr.addr_type == NDMP_ADDR_LOCAL) 796 MOD_LOGV3(params, NDMP_LOG_NORMAL, 797 "Tape record size: %d.\n", 798 session->ns_mover.md_record_size); 799 800 MOD_LOGV3(params, NDMP_LOG_NORMAL, "File history: %c.\n", 801 NDMP_YORN(NLP_ISSET(nlp, NLPF_FH))); 802 803 if (NLP_ISSET(nlp, NLPF_TOKENBK)) 804 log_date_token_v3(params, nlp); 805 else if (NLP_ISSET(nlp, NLPF_LBRBK)) 806 log_lbr_bk_v3(params, nlp); 807 else if (NLP_ISSET(nlp, NLPF_LEVELBK)) 808 log_level_v3(params, nlp); 809 else { 810 MOD_LOGV3(params, NDMP_LOG_ERROR, 811 "Internal error: backup level not defined for \"%s\".\n", 812 nlp->nlp_backup_path); 813 } 814 } 815 816 817 /* 818 * get_update_env_v3 819 * 820 * Is the UPDATE environment variable specified? If it is 821 * the corresponding flag is set in the flags field of the 822 * nlp structure, otherwise the flag is cleared. 823 * 824 * Parameters: 825 * params (input) - pointer to the parameters structure 826 * nlp (input) - pointer to the nlp structure 827 * 828 * Returns: 829 * void 830 */ 831 static void 832 get_update_env_v3(ndmpd_module_params_t *params, ndmp_lbr_params_t *nlp) 833 { 834 char *envp; 835 836 envp = MOD_GETENV(params, "UPDATE"); 837 if (!envp) { 838 NLP_SET(nlp, NLPF_UPDATE); 839 NDMP_LOG(LOG_DEBUG, 840 "env(UPDATE) not defined, default to TRUE"); 841 } else { 842 NDMP_LOG(LOG_DEBUG, "env(UPDATE): \"%s\"", envp); 843 if (IS_YORT(*envp)) 844 NLP_SET(nlp, NLPF_UPDATE); 845 else 846 NLP_UNSET(nlp, NLPF_UPDATE); 847 } 848 } 849 850 851 /* 852 * get_hist_env_v3 853 * 854 * Is backup history requested? If it is, the corresponding 855 * flag is set in the flags field of the nlp structure, otherwise 856 * the flag is cleared. 857 * 858 * Parameters: 859 * params (input) - pointer to the parameters structure 860 * nlp (input) - pointer to the nlp structure 861 * 862 * Returns: 863 * void 864 */ 865 static void 866 get_hist_env_v3(ndmpd_module_params_t *params, ndmp_lbr_params_t *nlp) 867 { 868 char *envp; 869 870 envp = MOD_GETENV(params, "HIST"); 871 if (!envp) { 872 NDMP_LOG(LOG_DEBUG, "env(HIST) not defined"); 873 NLP_UNSET(nlp, NLPF_FH); 874 } else { 875 NDMP_LOG(LOG_DEBUG, "env(HIST): \"%s\"", envp); 876 if (IS_YORT(*envp) || IS_F(*envp)) 877 NLP_SET(nlp, NLPF_FH); 878 else 879 NLP_UNSET(nlp, NLPF_FH); 880 881 /* Force file format if specified */ 882 if (IS_F(*envp)) { 883 params->mp_file_history_path_func = 884 ndmpd_api_file_history_file_v3; 885 params->mp_file_history_dir_func = 0; 886 params->mp_file_history_node_func = 0; 887 } 888 } 889 } 890 891 892 /* 893 * get_exc_env_v3 894 * 895 * Gets the EXCLUDE environment variable and breaks it 896 * into strings. The separator of the EXCLUDE environment 897 * variable is the ',' character. 898 * 899 * Parameters: 900 * params (input) - pointer to the parameters structure 901 * nlp (input) - pointer to the nlp structure 902 * 903 * Returns: 904 * void 905 */ 906 static void 907 get_exc_env_v3(ndmpd_module_params_t *params, ndmp_lbr_params_t *nlp) 908 { 909 char *envp; 910 911 envp = MOD_GETENV(params, "EXCLUDE"); 912 if (!envp) { 913 NDMP_LOG(LOG_DEBUG, "env(EXCLUDE) not defined"); 914 nlp->nlp_exl = NULL; 915 } else { 916 NDMP_LOG(LOG_DEBUG, "env(EXCLUDE): \"%s\"", envp); 917 nlp->nlp_exl = split_env(envp, ','); 918 prl(nlp->nlp_exl); 919 } 920 } 921 922 923 /* 924 * get_inc_env_v3 925 * 926 * Gets the FILES environment variable that shows which files 927 * should be backed up, and breaks it into strings. The 928 * separator of the FILES environment variable is the space 929 * character. 930 * 931 * Parameters: 932 * params (input) - pointer to the parameters structure 933 * nlp (input) - pointer to the nlp structure 934 * 935 * Returns: 936 * void 937 */ 938 static void 939 get_inc_env_v3(ndmpd_module_params_t *params, ndmp_lbr_params_t *nlp) 940 { 941 char *envp; 942 943 envp = MOD_GETENV(params, "FILES"); 944 if (!envp) { 945 NDMP_LOG(LOG_DEBUG, "env(FILES) not defined"); 946 nlp->nlp_inc = NULL; 947 } else { 948 NDMP_LOG(LOG_DEBUG, "env(FILES): \"%s\"", envp); 949 nlp->nlp_inc = split_env(envp, ' '); 950 prl(nlp->nlp_inc); 951 } 952 } 953 954 955 /* 956 * get_direct_env_v3 957 * 958 * Gets the DIRECT environment variable that shows if the fh_info should 959 * be sent to the client or not. 960 * 961 * Parameters: 962 * params (input) - pointer to the parameters structure 963 * nlp (input) - pointer to the nlp structure 964 * 965 * Returns: 966 * void 967 */ 968 static void 969 get_direct_env_v3(ndmpd_module_params_t *params, ndmp_lbr_params_t *nlp) 970 { 971 char *envp; 972 973 /* 974 * We should send the fh_info to the DMA, unless it is specified 975 * in the request that we should not send fh_info. 976 * At the moment we do not support DAR on directories, so if the user 977 * needs to restore a directory they should disable the DAR. 978 */ 979 if (params->mp_operation == NDMP_DATA_OP_RECOVER && !ndmp_dar_support) { 980 NDMP_LOG(LOG_DEBUG, "Direct Access Restore Disabled"); 981 NLP_UNSET(nlp, NLPF_DIRECT); 982 MOD_LOGV3(params, NDMP_LOG_NORMAL, 983 "DAR is disabled. Running Restore without DAR"); 984 return; 985 } 986 987 /* 988 * Regardless of whether DIRECT is defined at backup time we send 989 * back the fh_info, for some clients do not use get_backup_attrs. 990 * If operation is restore we have to unset the DIRECT, for 991 * some clients do not set the MOVER window. 992 */ 993 if (params->mp_operation == NDMP_DATA_OP_BACKUP) { 994 NDMP_LOG(LOG_DEBUG, "backup default env(DIRECT): YES"); 995 NLP_SET(nlp, NLPF_DIRECT); 996 } else { 997 998 envp = MOD_GETENV(params, "DIRECT"); 999 if (!envp) { 1000 NDMP_LOG(LOG_DEBUG, "env(DIRECT) not defined"); 1001 NLP_UNSET(nlp, NLPF_DIRECT); 1002 } else { 1003 NDMP_LOG(LOG_DEBUG, "env(DIRECT): \"%s\"", envp); 1004 if (IS_YORT(*envp)) { 1005 NLP_SET(nlp, NLPF_DIRECT); 1006 NDMP_LOG(LOG_DEBUG, 1007 "Direct Access Restore Enabled"); 1008 } else { 1009 NLP_UNSET(nlp, NLPF_DIRECT); 1010 NDMP_LOG(LOG_DEBUG, 1011 "Direct Access Restore Disabled"); 1012 } 1013 } 1014 } 1015 1016 if (NLP_ISSET(nlp, NLPF_DIRECT)) { 1017 if (params->mp_operation == NDMP_DATA_OP_BACKUP) 1018 MOD_LOGV3(params, NDMP_LOG_NORMAL, 1019 "Direct Access Restore information is supported"); 1020 else 1021 MOD_LOGV3(params, NDMP_LOG_NORMAL, 1022 "Running Restore with Direct Access Restore"); 1023 } else { 1024 if (params->mp_operation == NDMP_DATA_OP_BACKUP) 1025 MOD_LOGV3(params, NDMP_LOG_NORMAL, 1026 "Direct Access Restore is not supported"); 1027 else 1028 MOD_LOGV3(params, NDMP_LOG_NORMAL, 1029 "Running Restore without Direct Access Restore"); 1030 } 1031 } 1032 1033 1034 /* 1035 * get_date_token_v3 1036 * 1037 * Parse the token passed as the argument. Evaluate it and 1038 * issue any warning or error if needed. Save the date and 1039 * token sequence in the nlp structure fields. The sequence 1040 * number in the token should be less than hard-limit. If 1041 * it's between soft and hard limit, a warning is issued. 1042 * There is a configurable limit which should be less than 1043 * the soft-limit saved in ndmp_max_tok_seq variable. 1044 * 1045 * The NLPF_TOKENBK flag is set in the nlp flags field to 1046 * show that the backup type is token-based. 1047 * 1048 * Parameters: 1049 * params (input) - pointer to the parameters structure 1050 * nlp (input) - pointer to the nlp structure 1051 * basedate (input) - the value of the BASE_DATE environment 1052 * variable. 1053 * 1054 * Returns: 1055 * NDMP_NO_ERR: on success 1056 * != NDMP_NO_ERR: Otherwise 1057 * 1058 */ 1059 static ndmp_error 1060 get_date_token_v3(ndmpd_module_params_t *params, ndmp_lbr_params_t *nlp, 1061 char *basedate) 1062 { 1063 char *endp; 1064 uint_t seq; 1065 ndmp_error rv; 1066 time_t tstamp; 1067 u_longlong_t tok; 1068 1069 if (!params || !nlp || !basedate || !*basedate) 1070 return (NDMP_ILLEGAL_ARGS_ERR); 1071 1072 if (MOD_GETENV(params, "LEVEL")) { 1073 MOD_LOGV3(params, NDMP_LOG_WARNING, 1074 "Both BASE_DATE and LEVEL environment variables " 1075 "defined.\n"); 1076 MOD_LOGCONTV3(params, NDMP_LOG_WARNING, 1077 "BASE_DATE is being used for this backup.\n"); 1078 } 1079 1080 tok = strtoll(basedate, &endp, 10); 1081 if (endp == basedate) { 1082 MOD_LOGV3(params, NDMP_LOG_ERROR, 1083 "Invalid BASE_DATE environment variable: \"%s\".\n", 1084 basedate); 1085 return (NDMP_ILLEGAL_ARGS_ERR); 1086 } 1087 1088 tstamp = tok & 0xffffffff; 1089 seq = (tok >> 32) & 0xffffffff; 1090 NDMP_LOG(LOG_DEBUG, "basedate \"%s\" %lld seq %u tstamp %u", 1091 basedate, tok, seq, tstamp); 1092 1093 if ((int)seq > ndmp_get_max_tok_seq()) { 1094 rv = NDMP_ILLEGAL_ARGS_ERR; 1095 MOD_LOGV3(params, NDMP_LOG_ERROR, 1096 "The sequence counter of the token exceeds the " 1097 "maximum permitted value.\n"); 1098 MOD_LOGCONTV3(params, NDMP_LOG_ERROR, 1099 "Token sequence: %u, maxiumum value: %u.\n", 1100 seq, ndmp_get_max_tok_seq()); 1101 } else if (seq >= NDMP_TOKSEQ_HLIMIT) { 1102 rv = NDMP_ILLEGAL_ARGS_ERR; 1103 MOD_LOGV3(params, NDMP_LOG_ERROR, 1104 "The sequence counter the of token exceeds the " 1105 "hard-limit.\n"); 1106 MOD_LOGCONTV3(params, NDMP_LOG_ERROR, 1107 "Token sequence: %u, hard-limit: %u.\n", 1108 seq, NDMP_TOKSEQ_HLIMIT); 1109 } else { 1110 rv = NDMP_NO_ERR; 1111 /* 1112 * Issue a warning if the seq is equal to the maximum 1113 * permitted seq number or equal to the soft-limit. 1114 */ 1115 if (seq == NDMP_TOKSEQ_SLIMIT) { 1116 MOD_LOGV3(params, NDMP_LOG_WARNING, 1117 "The sequence counter of the token has reached " 1118 "the soft-limit.\n"); 1119 MOD_LOGCONTV3(params, NDMP_LOG_WARNING, 1120 "Token sequence: %u, soft-limit: %u.\n", 1121 seq, NDMP_TOKSEQ_SLIMIT); 1122 } else if ((int)seq == ndmp_get_max_tok_seq()) { 1123 MOD_LOGV3(params, NDMP_LOG_WARNING, 1124 "The sequence counter of the token has reached " 1125 "the maximum permitted value.\n"); 1126 MOD_LOGCONTV3(params, NDMP_LOG_WARNING, 1127 "Token sequence: %u, maxiumum value: %u.\n", 1128 seq, ndmp_get_max_tok_seq()); 1129 } 1130 1131 /* 1132 * The current seq is equal to the seq field of the 1133 * token. It will be increased after successful backup 1134 * before setting the DUMP_DATE environment variable. 1135 */ 1136 nlp->nlp_dmpnm = MOD_GETENV(params, "DMP_NAME"); 1137 NLP_SET(nlp, NLPF_TOKENBK); 1138 NLP_UNSET(nlp, NLPF_LEVELBK); 1139 NLP_UNSET(nlp, NLPF_LBRBK); 1140 nlp->nlp_tokseq = seq; 1141 nlp->nlp_tokdate = tstamp; 1142 /* 1143 * The value of nlp_cdate will be set to the checkpoint 1144 * creation time after it is created. 1145 */ 1146 } 1147 1148 return (rv); 1149 } 1150 1151 1152 /* 1153 * get_lbr_bk_v3 1154 * 1155 * Sets the level fields of the nlp structures for 1156 * LBR-type backup. The NLPF_LBRBK flag of the 1157 * nlp flags is also set to show the backup type. 1158 * 1159 * Parameters: 1160 * params (input) - pointer to the parameters structure 1161 * nlp (input) - pointer to the nlp structure 1162 * type (input) - the backup level: 'F', 'A', 'I', 'D' or 1163 * their lower-case values. 1164 * 1165 * Returns: 1166 * NDMP_NO_ERR: on success 1167 * != NDMP_NO_ERR: Otherwise 1168 */ 1169 static ndmp_error 1170 get_lbr_bk_v3(ndmpd_module_params_t *params, ndmp_lbr_params_t *nlp, char *type) 1171 { 1172 if (!params || !nlp || !type || !*type) 1173 return (NDMP_ILLEGAL_ARGS_ERR); 1174 1175 NLP_SET(nlp, NLPF_LBRBK); 1176 NLP_UNSET(nlp, NLPF_TOKENBK); 1177 NLP_UNSET(nlp, NLPF_LEVELBK); 1178 nlp->nlp_dmpnm = MOD_GETENV(params, "DMP_NAME"); 1179 nlp->nlp_llevel = toupper(*type); 1180 nlp->nlp_ldate = (time_t)0; 1181 nlp->nlp_clevel = nlp->nlp_llevel; 1182 (void) time(&nlp->nlp_cdate); 1183 1184 return (NDMP_NO_ERR); 1185 } 1186 1187 1188 /* 1189 * get_backup_level_v3 1190 * 1191 * Gets the backup level from the environment variables. If 1192 * BASE_DATE is specified, it will be used, otherwise LEVEL 1193 * will be used. If neither is specified, LEVEL = '0' is 1194 * assumed. 1195 * 1196 * Parameters: 1197 * params (input) - pointer to the parameters structure 1198 * nlp (input) - pointer to the nlp structure 1199 * 1200 * Returns: 1201 * NDMP_NO_ERR: on success 1202 * != NDMP_NO_ERR: Otherwise 1203 */ 1204 static ndmp_error 1205 get_backup_level_v3(ndmpd_module_params_t *params, ndmp_lbr_params_t *nlp) 1206 { 1207 char *envp; 1208 ndmp_error rv; 1209 1210 /* 1211 * If the BASE_DATE env variable is specified use it, otherwise 1212 * look to see if LEVEL is specified. If LEVEL is not 1213 * specified either, backup level '0' must be made. Level backup 1214 * does not clear the archive bit. 1215 * 1216 * If LEVEL environment varaible is specified, values for 1217 * 'F', 'D', 'I' and 'A' (for 'Full', 'Differential', 1218 * 'Incremental', and 'Archive' is checked first. Then 1219 * level '0' to '9' will be checked. 1220 * 1221 * LEVEL environment variable can hold only one character. 1222 * If its length is longer than 1, an error is returned. 1223 */ 1224 envp = MOD_GETENV(params, "BASE_DATE"); 1225 if (envp) 1226 return (get_date_token_v3(params, nlp, envp)); 1227 1228 1229 envp = MOD_GETENV(params, "LEVEL"); 1230 if (!envp) { 1231 NDMP_LOG(LOG_DEBUG, "env(LEVEL) not defined, default to 0"); 1232 NLP_SET(nlp, NLPF_LEVELBK); 1233 NLP_UNSET(nlp, NLPF_LBRBK); 1234 NLP_UNSET(nlp, NLPF_TOKENBK); 1235 nlp->nlp_llevel = 0; 1236 nlp->nlp_ldate = 0; 1237 nlp->nlp_clevel = 0; 1238 /* 1239 * The value of nlp_cdate will be set to the checkpoint 1240 * creation time after it is created. 1241 */ 1242 return (NDMP_NO_ERR); 1243 } 1244 1245 if (*(envp+1) != '\0') { 1246 MOD_LOGV3(params, NDMP_LOG_ERROR, 1247 "Invalid backup level \"%s\".\n", envp); 1248 return (NDMP_ILLEGAL_ARGS_ERR); 1249 } 1250 1251 if (IS_LBR_BKTYPE(*envp)) 1252 return (get_lbr_bk_v3(params, nlp, envp)); 1253 1254 if (!isdigit(*envp)) { 1255 MOD_LOGV3(params, NDMP_LOG_ERROR, 1256 "Invalid backup level \"%s\".\n", envp); 1257 return (NDMP_ILLEGAL_ARGS_ERR); 1258 } 1259 1260 NLP_SET(nlp, NLPF_LEVELBK); 1261 NLP_UNSET(nlp, NLPF_LBRBK); 1262 NLP_UNSET(nlp, NLPF_TOKENBK); 1263 nlp->nlp_llevel = *envp - '0'; 1264 nlp->nlp_ldate = 0; 1265 nlp->nlp_clevel = nlp->nlp_llevel; 1266 /* 1267 * The value of nlp_cdate will be set to the checkpoint 1268 * creation time after it is created. 1269 */ 1270 if (ndmpd_get_dumptime(nlp->nlp_backup_path, &nlp->nlp_llevel, 1271 &nlp->nlp_ldate) < 0) { 1272 MOD_LOGV3(params, NDMP_LOG_ERROR, 1273 "Getting dumpdates for %s level '%c'.\n", 1274 nlp->nlp_backup_path, *envp); 1275 return (NDMP_NO_MEM_ERR); 1276 } else { 1277 get_update_env_v3(params, nlp); 1278 rv = NDMP_NO_ERR; 1279 } 1280 1281 return (rv); 1282 } 1283 1284 1285 /* 1286 * save_date_token_v3 1287 * 1288 * Make the value of DUMP_DATE env variable and append the values 1289 * of the current backup in the file specified with the DMP_NAME 1290 * env variable if any file is specified. The file will be 1291 * relative name in the backup directory path. 1292 * 1293 * Parameters: 1294 * params (input) - pointer to the parameters structure 1295 * nlp (input) - pointer to the nlp structure 1296 * 1297 * Returns: 1298 * void 1299 */ 1300 static void 1301 save_date_token_v3(ndmpd_module_params_t *params, ndmp_lbr_params_t *nlp) 1302 { 1303 char val[QUAD_DECIMAL_LEN]; 1304 u_longlong_t tok; 1305 1306 if (!params || !nlp) 1307 return; 1308 1309 nlp->nlp_tokseq++; 1310 tok = ((u_longlong_t)nlp->nlp_tokseq << 32) | nlp->nlp_cdate; 1311 (void) snprintf(val, sizeof (val), "%llu", tok); 1312 1313 NDMP_LOG(LOG_DEBUG, "tok: %lld %s", tok, val); 1314 1315 if (MOD_SETENV(params, "DUMP_DATE", val) != 0) { 1316 MOD_LOGV3(params, NDMP_LOG_ERROR, 1317 "Could not set DUMP_DATE to %s", val); 1318 } else if (!nlp->nlp_dmpnm) { 1319 NDMP_LOG(LOG_DEBUG, "No log file defined"); 1320 } else if (ndmpd_append_dumptime(nlp->nlp_dmpnm, nlp->nlp_backup_path, 1321 nlp->nlp_tokseq, nlp->nlp_tokdate) < 0) { 1322 MOD_LOGV3(params, NDMP_LOG_ERROR, 1323 "Saving backup date for \"%s\" in \"%s\".\n", 1324 nlp->nlp_backup_path, nlp->nlp_dmpnm); 1325 } 1326 } 1327 1328 1329 /* 1330 * save_lbr_bk_v3 1331 * 1332 * Append the backup type and date in the DMP_NAME file for 1333 * LBR-type backup if any file is specified. 1334 * 1335 * Parameters: 1336 * params (input) - pointer to the parameters structure 1337 * nlp (input) - pointer to the nlp structure 1338 * 1339 * Returns: 1340 * void 1341 */ 1342 static void 1343 save_lbr_bk_v3(ndmpd_module_params_t *params, ndmp_lbr_params_t *nlp) 1344 { 1345 if (!params || !nlp) 1346 return; 1347 1348 if (!nlp->nlp_dmpnm) { 1349 NDMP_LOG(LOG_DEBUG, "No log file defined"); 1350 } else if (ndmpd_append_dumptime(nlp->nlp_dmpnm, nlp->nlp_backup_path, 1351 nlp->nlp_clevel, nlp->nlp_cdate) < 0) { 1352 MOD_LOGV3(params, NDMP_LOG_ERROR, 1353 "Saving backup date for \"%s\" in \"%s\".\n", 1354 nlp->nlp_backup_path, nlp->nlp_dmpnm); 1355 } 1356 } 1357 1358 1359 /* 1360 * save_level_v3 1361 * 1362 * Save the date and level of the current backup in the dumpdates 1363 * file. 1364 * 1365 * Parameters: 1366 * params (input) - pointer to the parameters structure 1367 * nlp (input) - pointer to the nlp structure 1368 * 1369 * Returns: 1370 * void 1371 */ 1372 static void 1373 save_level_v3(ndmpd_module_params_t *params, ndmp_lbr_params_t *nlp) 1374 { 1375 if (!params || !nlp) 1376 return; 1377 1378 if (!NLP_SHOULD_UPDATE(nlp)) { 1379 NDMP_LOG(LOG_DEBUG, "update not requested"); 1380 } else if (ndmpd_put_dumptime(nlp->nlp_backup_path, nlp->nlp_clevel, 1381 nlp->nlp_cdate) < 0) { 1382 MOD_LOGV3(params, NDMP_LOG_ERROR, "Logging backup date.\n"); 1383 } 1384 } 1385 1386 1387 /* 1388 * save_backup_date_v3 1389 * 1390 * A dispatcher function to call the corresponding save function 1391 * based on the backup type. 1392 * 1393 * Parameters: 1394 * params (input) - pointer to the parameters structure 1395 * nlp (input) - pointer to the nlp structure 1396 * 1397 * Returns: 1398 * void 1399 */ 1400 static void 1401 save_backup_date_v3(ndmpd_module_params_t *params, ndmp_lbr_params_t *nlp) 1402 { 1403 if (!params || !nlp) 1404 return; 1405 1406 if (NLP_ISSET(nlp, NLPF_TOKENBK)) 1407 save_date_token_v3(params, nlp); 1408 else if (NLP_ISSET(nlp, NLPF_LBRBK)) 1409 save_lbr_bk_v3(params, nlp); 1410 else if (NLP_ISSET(nlp, NLPF_LEVELBK)) 1411 save_level_v3(params, nlp); 1412 else { 1413 MOD_LOGV3(params, NDMP_LOG_ERROR, 1414 "Internal error: lost backup level type for \"%s\".\n", 1415 nlp->nlp_backup_path); 1416 } 1417 } 1418 1419 1420 /* 1421 * backup_alloc_structs_v3 1422 * 1423 * Create the structures for V3 backup. This includes: 1424 * Job stats 1425 * Reader writer IPC 1426 * File history callback structure 1427 * 1428 * Parameters: 1429 * session (input) - pointer to the session 1430 * jname (input) - name assigned to the current backup for 1431 * job stats strucure 1432 * 1433 * Returns: 1434 * 0: on success 1435 * -1: otherwise 1436 */ 1437 static int 1438 backup_alloc_structs_v3(ndmpd_session_t *session, char *jname) 1439 { 1440 int n; 1441 long xfer_size; 1442 ndmp_lbr_params_t *nlp; 1443 tlm_commands_t *cmds; 1444 1445 nlp = ndmp_get_nlp(session); 1446 if (!nlp) { 1447 NDMP_LOG(LOG_DEBUG, "nlp == NULL"); 1448 return (-1); 1449 } 1450 1451 nlp->nlp_jstat = tlm_new_job_stats(jname); 1452 if (!nlp->nlp_jstat) { 1453 NDMP_LOG(LOG_DEBUG, "Creating job stats"); 1454 return (-1); 1455 } 1456 1457 cmds = &nlp->nlp_cmds; 1458 (void) memset(cmds, 0, sizeof (*cmds)); 1459 1460 xfer_size = ndmp_buffer_get_size(session); 1461 if (xfer_size < 512*KILOBYTE) { 1462 /* 1463 * Read multiple of mover_record_size near to 512K. This 1464 * will prevent the data being copied in the mover buffer 1465 * when we write the data. 1466 */ 1467 n = 512 * KILOBYTE / xfer_size; 1468 if (n <= 0) 1469 n = 1; 1470 xfer_size *= n; 1471 NDMP_LOG(LOG_DEBUG, "Adjusted read size: %d", 1472 xfer_size); 1473 } 1474 1475 cmds->tcs_command = tlm_create_reader_writer_ipc(TRUE, xfer_size); 1476 if (!cmds->tcs_command) { 1477 tlm_un_ref_job_stats(jname); 1478 return (-1); 1479 } 1480 1481 nlp->nlp_logcallbacks = lbrlog_callbacks_init(session, 1482 ndmpd_fhpath_v3_cb, ndmpd_fhdir_v3_cb, ndmpd_fhnode_v3_cb); 1483 if (!nlp->nlp_logcallbacks) { 1484 tlm_release_reader_writer_ipc(cmds->tcs_command); 1485 tlm_un_ref_job_stats(jname); 1486 return (-1); 1487 } 1488 nlp->nlp_jstat->js_callbacks = (void *)(nlp->nlp_logcallbacks); 1489 nlp->nlp_restored = NULL; 1490 1491 return (0); 1492 } 1493 1494 1495 /* 1496 * restore_alloc_structs_v3 1497 * 1498 * Create the structures for V3 Restore. This includes: 1499 * Job stats 1500 * Reader writer IPC 1501 * File recovery callback structure 1502 * 1503 * Parameters: 1504 * session (input) - pointer to the session 1505 * jname (input) - name assigned to the current backup for 1506 * job stats strucure 1507 * 1508 * Returns: 1509 * 0: on success 1510 * -1: otherwise 1511 */ 1512 int 1513 restore_alloc_structs_v3(ndmpd_session_t *session, char *jname) 1514 { 1515 long xfer_size; 1516 ndmp_lbr_params_t *nlp; 1517 tlm_commands_t *cmds; 1518 1519 nlp = ndmp_get_nlp(session); 1520 if (!nlp) { 1521 NDMP_LOG(LOG_DEBUG, "nlp == NULL"); 1522 return (-1); 1523 } 1524 1525 /* this is used in ndmpd_path_restored_v3() */ 1526 nlp->nlp_lastidx = -1; 1527 1528 nlp->nlp_jstat = tlm_new_job_stats(jname); 1529 if (!nlp->nlp_jstat) { 1530 NDMP_LOG(LOG_DEBUG, "Creating job stats"); 1531 return (-1); 1532 } 1533 1534 cmds = &nlp->nlp_cmds; 1535 (void) memset(cmds, 0, sizeof (*cmds)); 1536 1537 xfer_size = ndmp_buffer_get_size(session); 1538 cmds->tcs_command = tlm_create_reader_writer_ipc(FALSE, xfer_size); 1539 if (!cmds->tcs_command) { 1540 tlm_un_ref_job_stats(jname); 1541 return (-1); 1542 } 1543 1544 nlp->nlp_logcallbacks = lbrlog_callbacks_init(session, 1545 ndmpd_path_restored_v3, NULL, NULL); 1546 if (!nlp->nlp_logcallbacks) { 1547 tlm_release_reader_writer_ipc(cmds->tcs_command); 1548 tlm_un_ref_job_stats(jname); 1549 return (-1); 1550 } 1551 nlp->nlp_jstat->js_callbacks = (void *)(nlp->nlp_logcallbacks); 1552 1553 nlp->nlp_rsbm = bm_alloc(nlp->nlp_nfiles, 0); 1554 if (nlp->nlp_rsbm < 0) { 1555 NDMP_LOG(LOG_ERR, "Out of memory."); 1556 lbrlog_callbacks_done(nlp->nlp_logcallbacks); 1557 tlm_release_reader_writer_ipc(cmds->tcs_command); 1558 tlm_un_ref_job_stats(jname); 1559 return (-1); 1560 } 1561 1562 return (0); 1563 } 1564 1565 1566 /* 1567 * free_structs_v3 1568 * 1569 * Release the resources allocated by backup_alloc_structs_v3 1570 * function. 1571 * 1572 * Parameters: 1573 * session (input) - pointer to the session 1574 * jname (input) - name assigned to the current backup for 1575 * job stats strucure 1576 * 1577 * Returns: 1578 * void 1579 */ 1580 /*ARGSUSED*/ 1581 static void 1582 free_structs_v3(ndmpd_session_t *session, char *jname) 1583 { 1584 ndmp_lbr_params_t *nlp; 1585 tlm_commands_t *cmds; 1586 1587 nlp = ndmp_get_nlp(session); 1588 if (!nlp) { 1589 NDMP_LOG(LOG_DEBUG, "nlp == NULL"); 1590 return; 1591 } 1592 cmds = &nlp->nlp_cmds; 1593 if (!cmds) { 1594 NDMP_LOG(LOG_DEBUG, "cmds == NULL"); 1595 return; 1596 } 1597 1598 if (nlp->nlp_logcallbacks) { 1599 lbrlog_callbacks_done(nlp->nlp_logcallbacks); 1600 nlp->nlp_logcallbacks = NULL; 1601 } else 1602 NDMP_LOG(LOG_DEBUG, "FH CALLBACKS == NULL"); 1603 1604 if (cmds->tcs_command) { 1605 if (cmds->tcs_command->tc_buffers != NULL) 1606 tlm_release_reader_writer_ipc(cmds->tcs_command); 1607 else 1608 NDMP_LOG(LOG_DEBUG, "BUFFERS == NULL"); 1609 cmds->tcs_command = NULL; 1610 } else 1611 NDMP_LOG(LOG_DEBUG, "COMMAND == NULL"); 1612 1613 if (nlp->nlp_bkmap >= 0) { 1614 (void) dbm_free(nlp->nlp_bkmap); 1615 nlp->nlp_bkmap = -1; 1616 } 1617 1618 if (session->ns_data.dd_operation == NDMP_DATA_OP_RECOVER) { 1619 if (nlp->nlp_rsbm < 0) { 1620 NDMP_LOG(LOG_DEBUG, "nlp_rsbm < 0 %d", nlp->nlp_rsbm); 1621 } else { 1622 (void) bm_free(nlp->nlp_rsbm); 1623 nlp->nlp_rsbm = -1; 1624 } 1625 } 1626 } 1627 1628 1629 /* 1630 * backup_dirv3 1631 * 1632 * Backup a directory and update the bytes processed field of the 1633 * data server. 1634 * 1635 * Parameters: 1636 * bpp (input) - pointer to the backup parameters structure 1637 * pnp (input) - pointer to the path node 1638 * enp (input) - pointer to the entry node 1639 * 1640 * Returns: 1641 * 0: on success 1642 * != 0: otherwise 1643 */ 1644 static int 1645 backup_dirv3(bk_param_v3_t *bpp, fst_node_t *pnp, 1646 fst_node_t *enp) 1647 { 1648 longlong_t apos, bpos; 1649 acl_t *aclp = NULL; 1650 char *acltp; 1651 struct stat64 st; 1652 char fullpath[TLM_MAX_PATH_NAME]; 1653 char *p; 1654 1655 if (!bpp || !pnp || !enp) { 1656 NDMP_LOG(LOG_DEBUG, "Invalid argument"); 1657 return (-1); 1658 } 1659 1660 NDMP_LOG(LOG_DEBUG, "d(%s)", bpp->bp_tmp); 1661 1662 if (lstat64(bpp->bp_tmp, &st) != 0) 1663 return (0); 1664 1665 if (acl_get(bpp->bp_tmp, ACL_NO_TRIVIAL, &aclp) != 0) { 1666 NDMP_LOG(LOG_DEBUG, "acl_get error errno=%d", errno); 1667 return (-1); 1668 } 1669 if (aclp && (acltp = acl_totext(aclp, 1670 ACL_APPEND_ID | ACL_SID_FMT | ACL_COMPACT_FMT)) != NULL) { 1671 (void) strlcpy(bpp->bp_tlmacl->acl_info.attr_info, 1672 acltp, TLM_MAX_ACL_TXT); 1673 acl_free(aclp); 1674 free(acltp); 1675 } else { 1676 *bpp->bp_tlmacl->acl_info.attr_info = '\0'; 1677 } 1678 1679 bpos = tlm_get_data_offset(bpp->bp_lcmd); 1680 1681 p = bpp->bp_tmp + strlen(bpp->bp_chkpnm); 1682 if (*p == '/') 1683 (void) snprintf(fullpath, TLM_MAX_PATH_NAME, "%s%s", 1684 bpp->bp_unchkpnm, p); 1685 else 1686 (void) snprintf(fullpath, TLM_MAX_PATH_NAME, "%s/%s", 1687 bpp->bp_unchkpnm, p); 1688 1689 if (tm_tar_ops.tm_putdir != NULL) 1690 (void) (tm_tar_ops.tm_putdir)(fullpath, bpp->bp_tlmacl, 1691 bpp->bp_lcmd, bpp->bp_js); 1692 1693 apos = tlm_get_data_offset(bpp->bp_lcmd); 1694 bpp->bp_session->ns_data.dd_module.dm_stats.ms_bytes_processed += 1695 apos - bpos; 1696 1697 return (0); 1698 } 1699 1700 1701 /* 1702 * backup_filev3 1703 * 1704 * Backup a file and update the bytes processed field of the 1705 * data server. 1706 * 1707 * Parameters: 1708 * bpp (input) - pointer to the backup parameters structure 1709 * pnp (input) - pointer to the path node 1710 * enp (input) - pointer to the entry node 1711 * 1712 * Returns: 1713 * 0: on success 1714 * != 0: otherwise 1715 */ 1716 static int 1717 backup_filev3(bk_param_v3_t *bpp, fst_node_t *pnp, 1718 fst_node_t *enp) 1719 { 1720 char *ent; 1721 longlong_t rv; 1722 longlong_t apos, bpos; 1723 acl_t *aclp = NULL; 1724 char *acltp; 1725 struct stat64 st; 1726 char fullpath[TLM_MAX_PATH_NAME]; 1727 char *p; 1728 1729 if (!bpp || !pnp || !enp) { 1730 NDMP_LOG(LOG_DEBUG, "Invalid argument"); 1731 return (-1); 1732 } 1733 1734 NDMP_LOG(LOG_DEBUG, "f(%s)", bpp->bp_tmp); 1735 1736 if (lstat64(bpp->bp_tmp, &st) != 0) 1737 return (0); 1738 1739 if (!S_ISLNK(bpp->bp_tlmacl->acl_attr.st_mode)) { 1740 if (acl_get(bpp->bp_tmp, ACL_NO_TRIVIAL, &aclp) != 0) { 1741 NDMP_LOG(LOG_DEBUG, "acl_get error"); 1742 return (-1); 1743 } 1744 1745 if (aclp && 1746 (acltp = acl_totext(aclp, 1747 ACL_APPEND_ID | ACL_SID_FMT | ACL_COMPACT_FMT)) != NULL) { 1748 (void) strlcpy(bpp->bp_tlmacl->acl_info.attr_info, 1749 acltp, TLM_MAX_ACL_TXT); 1750 acl_free(aclp); 1751 free(acltp); 1752 } else { 1753 *bpp->bp_tlmacl->acl_info.attr_info = '\0'; 1754 } 1755 } 1756 1757 bpos = tlm_get_data_offset(bpp->bp_lcmd); 1758 ent = enp->tn_path ? enp->tn_path : ""; 1759 1760 p = pnp->tn_path + strlen(bpp->bp_chkpnm); 1761 if (*p == '/') 1762 (void) snprintf(fullpath, TLM_MAX_PATH_NAME, "%s%s", 1763 bpp->bp_unchkpnm, p); 1764 else 1765 (void) snprintf(fullpath, TLM_MAX_PATH_NAME, "%s/%s", 1766 bpp->bp_unchkpnm, p); 1767 1768 if (tm_tar_ops.tm_putfile != NULL) 1769 rv = (tm_tar_ops.tm_putfile)(fullpath, ent, pnp->tn_path, 1770 bpp->bp_tlmacl, bpp->bp_cmds, bpp->bp_lcmd, bpp->bp_js, 1771 bpp->bp_session->hardlink_q); 1772 1773 apos = tlm_get_data_offset(bpp->bp_lcmd); 1774 bpp->bp_session->ns_data.dd_module.dm_stats.ms_bytes_processed += 1775 apos - bpos; 1776 1777 return (rv < 0 ? rv : 0); 1778 } 1779 1780 1781 /* 1782 * check_bk_args 1783 * 1784 * Check the argument of the bpp. This is shared function between 1785 * timebk_v3 and lbrbk_v3 functions. The checks include: 1786 * - The bpp itself. 1787 * - If the session pointer of the bpp is valid. 1788 * - If the session connection to the DMA is closed. 1789 * - If the nlp pointer of the bpp is valid. 1790 * - If the backup is aborted. 1791 * 1792 * Parameters: 1793 * bpp (input) - pointer to the backup parameters structure 1794 * 1795 * Returns: 1796 * 0: if everything's OK 1797 * != 0: otherwise 1798 */ 1799 static int 1800 check_bk_args(bk_param_v3_t *bpp) 1801 { 1802 int rv; 1803 1804 if (!bpp) { 1805 rv = -1; 1806 NDMP_LOG(LOG_DEBUG, "Lost bpp"); 1807 } else if (!bpp->bp_session) { 1808 rv = -1; 1809 NDMP_LOG(LOG_DEBUG, "Session is NULL"); 1810 } else if (bpp->bp_session->ns_eof) { 1811 rv = -1; 1812 NDMP_LOG(LOG_INFO, 1813 "Connection client is closed for backup \"%s\"", 1814 bpp->bp_nlp->nlp_backup_path); 1815 } else if (!bpp->bp_nlp) { 1816 NDMP_LOG(LOG_DEBUG, "Lost nlp"); 1817 return (-1); 1818 } else if (bpp->bp_session->ns_data.dd_abort) { 1819 rv = -1; 1820 NDMP_LOG(LOG_INFO, "Backup aborted \"%s\"", 1821 bpp->bp_nlp->nlp_backup_path); 1822 } else 1823 rv = 0; 1824 1825 return (rv); 1826 } 1827 1828 1829 /* 1830 * shouldskip 1831 * 1832 * Determines if the current entry should be skipped or it 1833 * should be backed up. 1834 * 1835 * Parameters: 1836 * bpp (input) - pointer to the backup parameters structure 1837 * pnp (input) - pointer to the path node 1838 * enp (input) - pointer to the entry node 1839 * errp (output) - pointer to the error value that should be 1840 * returned by the caller 1841 * 1842 * Returns: 1843 * TRUE: if the entry should not be backed up 1844 * FALSE: otherwise 1845 */ 1846 static boolean_t 1847 shouldskip(bk_param_v3_t *bpp, fst_node_t *pnp, 1848 fst_node_t *enp, int *errp) 1849 { 1850 char *ent; 1851 boolean_t rv; 1852 struct stat64 *estp; 1853 1854 if (!bpp || !pnp || !enp || !errp) { 1855 NDMP_LOG(LOG_DEBUG, "Invalid argument"); 1856 return (TRUE); 1857 } 1858 1859 if (!enp->tn_path) { 1860 ent = ""; 1861 estp = pnp->tn_st; 1862 } else { 1863 ent = enp->tn_path; 1864 estp = enp->tn_st; 1865 } 1866 1867 /* 1868 * When excluding or skipping entries, FST_SKIP should be 1869 * returned, otherwise, 0 should be returned to 1870 * get other entries in the directory of this entry. 1871 */ 1872 if (!dbm_getone(bpp->bp_nlp->nlp_bkmap, (u_longlong_t)estp->st_ino)) { 1873 rv = TRUE; 1874 *errp = S_ISDIR(estp->st_mode) ? FST_SKIP : 0; 1875 NDMP_LOG(LOG_DEBUG, "Skipping %d %s/%s", 1876 *errp, pnp->tn_path, ent); 1877 } else if (tlm_is_excluded(pnp->tn_path, ent, bpp->bp_excls)) { 1878 rv = TRUE; 1879 *errp = S_ISDIR(estp->st_mode) ? FST_SKIP : 0; 1880 NDMP_LOG(LOG_DEBUG, "excl %d \"%s/%s\"", 1881 *errp, pnp->tn_path, ent); 1882 } else if (inexl(bpp->bp_nlp->nlp_exl, ent)) { 1883 rv = TRUE; 1884 *errp = S_ISDIR(estp->st_mode) ? FST_SKIP : 0; 1885 NDMP_LOG(LOG_DEBUG, "out %d \"%s/%s\"", 1886 *errp, pnp->tn_path, ent); 1887 } else if (!S_ISDIR(estp->st_mode) && 1888 !ininc(bpp->bp_nlp->nlp_inc, ent)) { 1889 rv = TRUE; 1890 *errp = 0; 1891 NDMP_LOG(LOG_DEBUG, "!in \"%s/%s\"", pnp->tn_path, ent); 1892 } else 1893 rv = FALSE; 1894 1895 return (rv); 1896 } 1897 1898 1899 /* 1900 * ischngd 1901 * 1902 * Check if the object specified should be backed up or not. 1903 * If stp belongs to a directory and if it is marked in the 1904 * bitmap vector, it shows that either the directory itself is 1905 * modified or there is something below it that will be backed 1906 * up. 1907 * 1908 * By setting ndmp_force_bk_dirs global variable to a non-zero 1909 * value, directories are backed up anyways. 1910 * 1911 * Backing up the directories unconditionally helps 1912 * restoring the metadata of directories as well, when one 1913 * of the objects below them are being restored. 1914 * 1915 * For non-directory objects, if the modification or change 1916 * time of the object is after the date specified by the 1917 * bk_selector_t, the the object must be backed up. 1918 */ 1919 static boolean_t 1920 ischngd(struct stat64 *stp, time_t t, ndmp_lbr_params_t *nlp) 1921 { 1922 boolean_t rv; 1923 1924 if (!stp) { 1925 rv = FALSE; 1926 NDMP_LOG(LOG_DEBUG, "stp is NULL"); 1927 } else if (!nlp) { 1928 rv = FALSE; 1929 NDMP_LOG(LOG_DEBUG, "nlp is NULL"); 1930 } else if (t == 0) { 1931 /* 1932 * if we are doing base backup then we do not need to 1933 * check the time, for we should backup everything. 1934 */ 1935 rv = TRUE; 1936 NDMP_LOG(LOG_DEBUG, "Base Backup"); 1937 } else if (S_ISDIR(stp->st_mode) && ndmp_force_bk_dirs) { 1938 rv = TRUE; 1939 NDMP_LOG(LOG_DEBUG, "d(%lu)", (uint_t)stp->st_ino); 1940 } else if (S_ISDIR(stp->st_mode) && 1941 dbm_getone(nlp->nlp_bkmap, (u_longlong_t)stp->st_ino) && 1942 ((NLP_ISDUMP(nlp) && ndmp_dump_path_node) || 1943 (NLP_ISTAR(nlp) && ndmp_tar_path_node))) { 1944 /* 1945 * If the object is a directory and it leads to a modified 1946 * object (that should be backed up) and for that type of 1947 * backup the path nodes should be backed up, then return 1948 * TRUE. 1949 * 1950 * This is required by some DMAs like Backup Express, which 1951 * needs to receive ADD_NODE (for dump) or ADD_PATH (for tar) 1952 * for the intermediate directories of a modified object. 1953 * Other DMAs, like net_backup and net_worker, do not have such 1954 * requirement. This requirement makes sense for dump format 1955 * but for 'tar' format, it does not. In provision to the 1956 * NDMP-v4 spec, for 'tar' format the intermediate directories 1957 * need not to be reported. 1958 */ 1959 rv = TRUE; 1960 NDMP_LOG(LOG_DEBUG, "p(%lu)", (u_longlong_t)stp->st_ino); 1961 } else if (stp->st_mtime > t) { 1962 rv = TRUE; 1963 NDMP_LOG(LOG_DEBUG, "m(%lu): %lu > %lu", 1964 (uint_t)stp->st_ino, (uint_t)stp->st_mtime, (uint_t)t); 1965 } else if (stp->st_ctime > t) { 1966 if (NLP_IGNCTIME(nlp)) { 1967 rv = FALSE; 1968 NDMP_LOG(LOG_DEBUG, "ign c(%lu): %lu > %lu", 1969 (uint_t)stp->st_ino, (uint_t)stp->st_ctime, 1970 (uint_t)t); 1971 } else { 1972 rv = TRUE; 1973 NDMP_LOG(LOG_DEBUG, "c(%lu): %lu > %lu", 1974 (uint_t)stp->st_ino, (uint_t)stp->st_ctime, 1975 (uint_t)t); 1976 } 1977 } else { 1978 rv = FALSE; 1979 NDMP_LOG(LOG_DEBUG, "mc(%lu): (%lu,%lu) < %lu", 1980 (uint_t)stp->st_ino, (uint_t)stp->st_mtime, 1981 (uint_t)stp->st_ctime, (uint_t)t); 1982 } 1983 1984 return (rv); 1985 } 1986 1987 1988 /* 1989 * iscreated 1990 * 1991 * This function is used to check last mtime (currently inside the ACL 1992 * structure) instead of ctime for checking if the file is to be backed up 1993 * or not. See option "inc.lmtime" for more details 1994 */ 1995 /*ARGSUSED*/ 1996 int iscreated(ndmp_lbr_params_t *nlp, char *name, tlm_acls_t *tacl, 1997 time_t t) 1998 { 1999 int ret; 2000 acl_t *aclp = NULL; 2001 char *acltp; 2002 2003 NDMP_LOG(LOG_DEBUG, "flags %x", nlp->nlp_flags); 2004 if (NLP_INCLMTIME(nlp) == FALSE) 2005 return (0); 2006 2007 ret = acl_get(name, ACL_NO_TRIVIAL, &aclp); 2008 if (ret != 0) { 2009 NDMP_LOG(LOG_DEBUG, 2010 "Error getting the acl information: err %d", ret); 2011 return (0); 2012 } 2013 if (aclp && (acltp = acl_totext(aclp, 2014 ACL_APPEND_ID | ACL_SID_FMT | ACL_COMPACT_FMT)) != NULL) { 2015 (void) strlcpy(tacl->acl_info.attr_info, acltp, 2016 TLM_MAX_ACL_TXT); 2017 acl_free(aclp); 2018 free(acltp); 2019 } 2020 2021 /* Need to add support for last mtime */ 2022 2023 return (0); 2024 } 2025 2026 /* 2027 * size_cb 2028 * 2029 * The callback function for calculating the size of 2030 * the backup path. This is used to get an estimate 2031 * of the progress of backup during NDMP backup 2032 */ 2033 static int 2034 size_cb(void *arg, fst_node_t *pnp, fst_node_t *enp) 2035 { 2036 struct stat64 *stp; 2037 2038 stp = enp->tn_path ? enp->tn_st : pnp->tn_st; 2039 *((u_longlong_t *)arg) += stp->st_size; 2040 2041 return (0); 2042 } 2043 2044 /* 2045 * timebk_v3 2046 * 2047 * The callback function for backing up objects based on 2048 * their time stamp. This is shared between token-based 2049 * and level-based backup, which look at the time stamps 2050 * of the objects to determine if they should be backed 2051 * up. 2052 * 2053 * Parameters: 2054 * arg (input) - pointer to the backup parameters structure 2055 * pnp (input) - pointer to the path node 2056 * enp (input) - pointer to the entry node 2057 * 2058 * Returns: 2059 * 0: if backup should continue 2060 * -1: if the backup should be stopped 2061 * FST_SKIP: if backing up the current directory is enough 2062 */ 2063 static int 2064 timebk_v3(void *arg, fst_node_t *pnp, fst_node_t *enp) 2065 { 2066 char *ent; 2067 int rv; 2068 time_t t; 2069 bk_param_v3_t *bpp; 2070 struct stat64 *stp; 2071 fs_fhandle_t *fhp; 2072 2073 bpp = (bk_param_v3_t *)arg; 2074 2075 rv = check_bk_args(bpp); 2076 if (rv != 0) 2077 return (rv); 2078 2079 stp = enp->tn_path ? enp->tn_st : pnp->tn_st; 2080 if (shouldskip(bpp, pnp, enp, &rv)) 2081 return (rv); 2082 2083 if (enp->tn_path) { 2084 ent = enp->tn_path; 2085 stp = enp->tn_st; 2086 fhp = enp->tn_fh; 2087 } else { 2088 ent = ""; 2089 stp = pnp->tn_st; 2090 fhp = pnp->tn_fh; 2091 } 2092 2093 2094 if (!tlm_cat_path(bpp->bp_tmp, pnp->tn_path, ent)) { 2095 NDMP_LOG(LOG_ERR, "Path too long %s/%s.", pnp->tn_path, ent); 2096 return (FST_SKIP); 2097 } 2098 if (NLP_ISSET(bpp->bp_nlp, NLPF_TOKENBK)) 2099 t = bpp->bp_nlp->nlp_tokdate; 2100 else if (NLP_ISSET(bpp->bp_nlp, NLPF_LEVELBK)) { 2101 t = bpp->bp_nlp->nlp_ldate; 2102 } else { 2103 NDMP_LOG(LOG_DEBUG, "Unknown backup type on \"%s/%s\"", 2104 pnp->tn_path, ent); 2105 return (-1); 2106 } 2107 2108 if (S_ISDIR(stp->st_mode)) { 2109 bpp->bp_tlmacl->acl_dir_fh = *fhp; 2110 (void) ndmpd_fhdir_v3_cb(bpp->bp_nlp->nlp_logcallbacks, 2111 bpp->bp_tmp, stp); 2112 2113 if (ischngd(stp, t, bpp->bp_nlp)) { 2114 (void) memcpy(&bpp->bp_tlmacl->acl_attr, stp, 2115 sizeof (struct stat64)); 2116 rv = backup_dirv3(bpp, pnp, enp); 2117 } 2118 } else { 2119 if (ischngd(stp, t, bpp->bp_nlp) || 2120 iscreated(bpp->bp_nlp, bpp->bp_tmp, bpp->bp_tlmacl, t)) { 2121 rv = 0; 2122 (void) memcpy(&bpp->bp_tlmacl->acl_attr, stp, 2123 sizeof (struct stat64)); 2124 bpp->bp_tlmacl->acl_fil_fh = *fhp; 2125 (void) backup_filev3(bpp, pnp, enp); 2126 } 2127 } 2128 2129 return (rv); 2130 } 2131 2132 2133 /* 2134 * lbrbk_v3 2135 * 2136 * The callback function for backing up objects based on 2137 * their archive directory bit. This is used in LBR-type 2138 * backup. In which the objects are backed up if their 2139 * archive bit is set. 2140 * 2141 * Parameters: 2142 * arg (input) - pointer to the backup parameters structure 2143 * pnp (input) - pointer to the path node 2144 * enp (input) - pointer to the entry node 2145 * 2146 * Returns: 2147 * 0: if backup should continue 2148 * -1: if the backup should be stopped 2149 * FST_SKIP: if backing up the current directory is enough 2150 */ 2151 static int 2152 lbrbk_v3(void *arg, fst_node_t *pnp, fst_node_t *enp) 2153 { 2154 char *ent; 2155 int rv; 2156 bk_param_v3_t *bpp; 2157 struct stat64 *stp; 2158 fs_fhandle_t *fhp; 2159 2160 bpp = (bk_param_v3_t *)arg; 2161 rv = check_bk_args(bpp); 2162 if (rv != 0) 2163 return (rv); 2164 2165 stp = enp->tn_path ? enp->tn_st : pnp->tn_st; 2166 if (shouldskip(bpp, pnp, enp, &rv)) 2167 return (rv); 2168 2169 if (enp->tn_path) { 2170 ent = enp->tn_path; 2171 stp = enp->tn_st; 2172 fhp = enp->tn_fh; 2173 } else { 2174 ent = ""; 2175 stp = pnp->tn_st; 2176 fhp = pnp->tn_fh; 2177 } 2178 2179 if (!tlm_cat_path(bpp->bp_tmp, pnp->tn_path, ent)) { 2180 NDMP_LOG(LOG_ERR, "Path too long %s/%s.", pnp->tn_path, ent); 2181 return (FST_SKIP); 2182 } 2183 if (!NLP_ISSET(bpp->bp_nlp, NLPF_LBRBK)) { 2184 NDMP_LOG(LOG_DEBUG, "!NLPF_LBRBK"); 2185 return (-1); 2186 } 2187 2188 if (S_ISDIR(stp->st_mode)) { 2189 bpp->bp_tlmacl->acl_dir_fh = *fhp; 2190 (void) ndmpd_fhdir_v3_cb(bpp->bp_nlp->nlp_logcallbacks, 2191 bpp->bp_tmp, stp); 2192 2193 if (SHOULD_LBRBK(bpp)) { 2194 bpp->bp_tlmacl->acl_attr = *stp; 2195 rv = backup_dirv3(bpp, pnp, enp); 2196 } 2197 } else if (SHOULD_LBRBK(bpp)) { 2198 rv = 0; 2199 bpp->bp_tlmacl->acl_attr = *stp; 2200 bpp->bp_tlmacl->acl_fil_fh = *fhp; 2201 (void) backup_filev3(bpp, pnp, enp); 2202 } 2203 2204 return (rv); 2205 } 2206 2207 2208 /* 2209 * backup_reader_v3 2210 * 2211 * The reader thread for the backup. It sets up the callback 2212 * parameters and traverses the backup hierarchy in level-order 2213 * way. 2214 * 2215 * Parameters: 2216 * jname (input) - name assigned to the current backup for 2217 * job stats strucure 2218 * nlp (input) - pointer to the nlp structure 2219 * cmds (input) - pointer to the tlm_commands_t structure 2220 * 2221 * Returns: 2222 * 0: on success 2223 * != 0: otherwise 2224 */ 2225 static int 2226 backup_reader_v3(backup_reader_arg_t *argp) 2227 { 2228 int rv; 2229 tlm_cmd_t *lcmd; 2230 tlm_acls_t tlm_acls; 2231 longlong_t bpos, n; 2232 bk_param_v3_t bp; 2233 fs_traverse_t ft; 2234 char *jname; 2235 ndmp_lbr_params_t *nlp; 2236 tlm_commands_t *cmds; 2237 2238 if (!argp) 2239 return (-1); 2240 2241 jname = argp->br_jname; 2242 nlp = argp->br_nlp; 2243 cmds = argp->br_cmds; 2244 2245 rv = 0; 2246 lcmd = cmds->tcs_command; 2247 lcmd->tc_ref++; 2248 cmds->tcs_reader_count++; 2249 2250 (void) memset(&tlm_acls, 0, sizeof (tlm_acls)); 2251 2252 /* NDMP parameters */ 2253 bp.bp_session = nlp->nlp_session; 2254 bp.bp_nlp = nlp; 2255 2256 /* LBR-related parameters */ 2257 bp.bp_js = tlm_ref_job_stats(jname); 2258 bp.bp_cmds = cmds; 2259 bp.bp_lcmd = lcmd; 2260 bp.bp_tlmacl = &tlm_acls; 2261 bp.bp_opr = 0; 2262 2263 /* release the parent thread, after referencing the job stats */ 2264 (void) pthread_barrier_wait(&argp->br_barrier); 2265 2266 bp.bp_tmp = ndmp_malloc(sizeof (char) * TLM_MAX_PATH_NAME); 2267 if (!bp.bp_tmp) 2268 return (-1); 2269 2270 /* 2271 * Make the checkpointed paths for traversing the 2272 * backup hierarchy, if we make the checkpoint. 2273 */ 2274 bp.bp_unchkpnm = nlp->nlp_backup_path; 2275 if (!NLP_ISCHKPNTED(nlp)) { 2276 tlm_acls.acl_checkpointed = TRUE; 2277 bp.bp_chkpnm = ndmp_malloc(sizeof (char) * TLM_MAX_PATH_NAME); 2278 if (!bp.bp_chkpnm) { 2279 NDMP_FREE(bp.bp_tmp); 2280 return (-1); 2281 } 2282 (void) tlm_build_snapshot_name(nlp->nlp_backup_path, 2283 bp.bp_chkpnm, nlp->nlp_jstat->js_job_name); 2284 } else { 2285 tlm_acls.acl_checkpointed = FALSE; 2286 bp.bp_chkpnm = nlp->nlp_backup_path; 2287 } 2288 bp.bp_excls = ndmpd_make_exc_list(); 2289 2290 /* set traversing arguments */ 2291 ft.ft_path = nlp->nlp_backup_path; 2292 ft.ft_lpath = bp.bp_chkpnm; 2293 2294 NDMP_LOG(LOG_DEBUG, "path %s lpath %s", ft.ft_path, ft.ft_lpath); 2295 if (NLP_ISSET(nlp, NLPF_TOKENBK) || NLP_ISSET(nlp, NLPF_LEVELBK)) { 2296 ft.ft_callbk = timebk_v3; 2297 tlm_acls.acl_clear_archive = FALSE; 2298 } else if (NLP_ISSET(nlp, NLPF_LBRBK)) { 2299 ft.ft_callbk = lbrbk_v3; 2300 tlm_acls.acl_clear_archive = FALSE; 2301 2302 NDMP_LOG(LOG_DEBUG, "bp_opr %x clr_arc %c", 2303 bp.bp_opr, NDMP_YORN(tlm_acls.acl_clear_archive)); 2304 } else { 2305 rv = -1; 2306 MOD_LOGV3(nlp->nlp_params, NDMP_LOG_ERROR, 2307 "Unknow backup type.\n"); 2308 } 2309 ft.ft_arg = &bp; 2310 ft.ft_logfp = (ft_log_t)ndmp_log; 2311 ft.ft_flags = FST_VERBOSE | FST_STOP_ONERR; 2312 2313 /* take into account the header written to the stream so far */ 2314 n = tlm_get_data_offset(lcmd); 2315 nlp->nlp_session->ns_data.dd_module.dm_stats.ms_bytes_processed = n; 2316 2317 if (rv == 0) { 2318 /* start traversing the hierarchy and actual backup */ 2319 rv = traverse_level(&ft); 2320 if (rv == 0) { 2321 /* write the trailer and update the bytes processed */ 2322 bpos = tlm_get_data_offset(lcmd); 2323 (void) write_tar_eof(lcmd); 2324 n = tlm_get_data_offset(lcmd) - bpos; 2325 nlp->nlp_session-> 2326 ns_data.dd_module.dm_stats.ms_bytes_processed += n; 2327 } else { 2328 MOD_LOGV3(nlp->nlp_params, NDMP_LOG_ERROR, 2329 "Filesystem traverse error.\n"); 2330 ndmpd_data_error(nlp->nlp_session, 2331 NDMP_DATA_HALT_INTERNAL_ERROR); 2332 } 2333 } 2334 2335 if (!NLP_ISCHKPNTED(nlp)) 2336 NDMP_FREE(bp.bp_chkpnm); 2337 NDMP_FREE(bp.bp_tmp); 2338 NDMP_FREE(bp.bp_excls); 2339 2340 cmds->tcs_reader_count--; 2341 lcmd->tc_writer = TLM_STOP; 2342 tlm_release_reader_writer_ipc(lcmd); 2343 tlm_un_ref_job_stats(jname); 2344 return (rv); 2345 2346 } 2347 2348 2349 /* 2350 * tar_backup_v3 2351 * 2352 * Traverse the backup hierarchy if needed and make the bitmap. 2353 * Then launch reader and writer threads to do the actual backup. 2354 * 2355 * Parameters: 2356 * session (input) - pointer to the session 2357 * params (input) - pointer to the parameters structure 2358 * nlp (input) - pointer to the nlp structure 2359 * jname (input) - job name 2360 * 2361 * Returns: 2362 * 0: on success 2363 * != 0: otherwise 2364 */ 2365 static int 2366 tar_backup_v3(ndmpd_session_t *session, ndmpd_module_params_t *params, 2367 ndmp_lbr_params_t *nlp, char *jname) 2368 { 2369 tlm_commands_t *cmds; 2370 backup_reader_arg_t arg; 2371 pthread_t rdtp; 2372 char info[256]; 2373 int result; 2374 ndmp_context_t nctx; 2375 int err; 2376 2377 if (ndmp_get_bk_dir_ino(nlp)) 2378 return (-1); 2379 2380 result = err = 0; 2381 2382 /* exit as if there was an internal error */ 2383 if (session->ns_eof) 2384 return (-1); 2385 2386 if (!session->ns_data.dd_abort) { 2387 if (backup_alloc_structs_v3(session, jname) < 0) { 2388 nlp->nlp_bkmap = -1; 2389 return (-1); 2390 } 2391 2392 if (ndmpd_mark_inodes_v3(session, nlp) != 0) { 2393 if (nlp->nlp_bkmap != -1) { 2394 (void) dbm_free(nlp->nlp_bkmap); 2395 nlp->nlp_bkmap = -1; 2396 } 2397 free_structs_v3(session, jname); 2398 return (-1); 2399 } 2400 2401 nlp->nlp_jstat->js_start_ltime = time(NULL); 2402 nlp->nlp_jstat->js_start_time = nlp->nlp_jstat->js_start_ltime; 2403 nlp->nlp_jstat->js_chkpnt_time = nlp->nlp_cdate; 2404 2405 cmds = &nlp->nlp_cmds; 2406 cmds->tcs_reader = cmds->tcs_writer = TLM_BACKUP_RUN; 2407 cmds->tcs_command->tc_reader = TLM_BACKUP_RUN; 2408 cmds->tcs_command->tc_writer = TLM_BACKUP_RUN; 2409 2410 if (ndmp_write_utf8magic(cmds->tcs_command) < 0) { 2411 free_structs_v3(session, jname); 2412 return (-1); 2413 } 2414 2415 NDMP_LOG(LOG_DEBUG, 2416 "Backing up \"%s\" started.", nlp->nlp_backup_path); 2417 2418 /* Plug-in module */ 2419 if (ndmp_pl != NULL && 2420 ndmp_pl->np_pre_backup != NULL) { 2421 (void) memset(&nctx, 0, sizeof (ndmp_context_t)); 2422 nctx.nc_plversion = ndmp_pl->np_plversion; 2423 nctx.nc_plname = ndmpd_get_prop(NDMP_PLUGIN_PATH); 2424 nctx.nc_cmds = cmds; 2425 nctx.nc_params = params; 2426 nctx.nc_ddata = (void *) session; 2427 if ((err = ndmp_pl->np_pre_backup(ndmp_pl, &nctx, 2428 nlp->nlp_backup_path)) != 0) { 2429 NDMP_LOG(LOG_ERR, "Pre-backup plug-in: %m"); 2430 goto backup_out; 2431 } 2432 } 2433 2434 (void) memset(&arg, 0, sizeof (backup_reader_arg_t)); 2435 arg.br_jname = jname; 2436 arg.br_nlp = nlp; 2437 arg.br_cmds = cmds; 2438 2439 (void) pthread_barrier_init(&arg.br_barrier, 0, 2); 2440 2441 err = pthread_create(&rdtp, NULL, (funct_t)backup_reader_v3, 2442 (void *)&arg); 2443 if (err == 0) { 2444 (void) pthread_barrier_wait(&arg.br_barrier); 2445 (void) pthread_barrier_destroy(&arg.br_barrier); 2446 } else { 2447 (void) pthread_barrier_destroy(&arg.br_barrier); 2448 free_structs_v3(session, jname); 2449 NDMP_LOG(LOG_DEBUG, "Launch backup_reader_v3: %m"); 2450 return (-1); 2451 } 2452 2453 if ((err = ndmp_tar_writer(session, params, cmds)) != 0) 2454 result = EIO; 2455 2456 nlp->nlp_jstat->js_stop_time = time(NULL); 2457 2458 (void) snprintf(info, sizeof (info), 2459 "Runtime [%s] %llu bytes (%llu): %d seconds\n", 2460 nlp->nlp_backup_path, 2461 session->ns_data.dd_module.dm_stats.ms_bytes_processed, 2462 session->ns_data.dd_module.dm_stats.ms_bytes_processed, 2463 nlp->nlp_jstat->js_stop_time - 2464 nlp->nlp_jstat->js_start_ltime); 2465 MOD_LOGV3(params, NDMP_LOG_NORMAL, info); 2466 2467 ndmp_wait_for_reader(cmds); 2468 (void) pthread_join(rdtp, NULL); 2469 2470 /* exit as if there was an internal error */ 2471 if (session->ns_eof) { 2472 result = EPIPE; 2473 err = -1; 2474 } 2475 if (!session->ns_data.dd_abort) { 2476 ndmpd_audit_backup(session->ns_connection, 2477 nlp->nlp_backup_path, 2478 session->ns_data.dd_data_addr.addr_type, 2479 session->ns_tape.td_adapter_name, result); 2480 NDMP_LOG(LOG_DEBUG, "Backing up \"%s\" Finished.", 2481 nlp->nlp_backup_path); 2482 } 2483 } 2484 2485 if (session->ns_data.dd_abort) { 2486 ndmpd_audit_backup(session->ns_connection, 2487 nlp->nlp_backup_path, 2488 session->ns_data.dd_data_addr.addr_type, 2489 session->ns_tape.td_adapter_name, EINTR); 2490 NDMP_LOG(LOG_DEBUG, 2491 "Backing up \"%s\" aborted.", nlp->nlp_backup_path); 2492 err = -1; 2493 } else { 2494 2495 backup_out: 2496 /* Plug-in module */ 2497 if (ndmp_pl != NULL && 2498 ndmp_pl->np_post_backup != NULL && 2499 ndmp_pl->np_post_backup(ndmp_pl, &nctx, err) == -1) { 2500 NDMP_LOG(LOG_DEBUG, "Post-backup plug-in: %m"); 2501 return (-1); 2502 } 2503 } 2504 2505 free_structs_v3(session, jname); 2506 return (err); 2507 } 2508 2509 /* 2510 * get_backup_size 2511 * 2512 * Find the estimate of backup size. This is used to get an estimate 2513 * of the progress of backup during NDMP backup. 2514 */ 2515 void 2516 get_backup_size(ndmp_bkup_size_arg_t *sarg) 2517 { 2518 fs_traverse_t ft; 2519 u_longlong_t bk_size; 2520 char spath[PATH_MAX]; 2521 int rv; 2522 2523 bk_size = 0; 2524 if (fs_is_chkpntvol(sarg->bs_path)) { 2525 ft.ft_path = sarg->bs_path; 2526 } else { 2527 (void) tlm_build_snapshot_name(sarg->bs_path, 2528 spath, sarg->bs_jname); 2529 ft.ft_path = spath; 2530 } 2531 2532 ft.ft_lpath = ft.ft_path; 2533 ft.ft_callbk = size_cb; 2534 ft.ft_arg = &bk_size; 2535 ft.ft_logfp = (ft_log_t)ndmp_log; 2536 ft.ft_flags = FST_VERBOSE; 2537 2538 if ((rv = traverse_level(&ft)) != 0) { 2539 NDMP_LOG(LOG_DEBUG, "bksize err=%d", rv); 2540 bk_size = 0; 2541 } else { 2542 NDMP_LOG(LOG_DEBUG, "bksize %lld, %lldKB, %lldMB\n", 2543 bk_size, bk_size / 1024, bk_size /(1024 * 1024)); 2544 } 2545 sarg->bs_session->ns_data.dd_data_size = bk_size; 2546 } 2547 2548 /* 2549 * get_rs_path_v3 2550 * 2551 * Find the restore path 2552 */ 2553 ndmp_error 2554 get_rs_path_v3(ndmpd_module_params_t *params, ndmp_lbr_params_t *nlp) 2555 { 2556 char *dp; 2557 ndmp_error rv; 2558 mem_ndmp_name_v3_t *ep; 2559 int i, nm_cnt; 2560 char *nm_dpath_list[MULTIPLE_DEST_DIRS]; 2561 static char mdest_buf[256]; 2562 2563 *mdest_buf = 0; 2564 *nm_dpath_list = ""; 2565 for (i = 0, nm_cnt = 0; i < (int)nlp->nlp_nfiles; i++) { 2566 ep = (mem_ndmp_name_v3_t *)MOD_GETNAME(params, i); 2567 if (!ep) { 2568 NDMP_LOG(LOG_DEBUG, "Can't get Nlist[%d]", i); 2569 return (NDMP_ILLEGAL_ARGS_ERR); 2570 } 2571 if (strcmp(nm_dpath_list[nm_cnt], ep->nm3_dpath) != 0 && 2572 nm_cnt < MULTIPLE_DEST_DIRS - 1) 2573 nm_dpath_list[++nm_cnt] = ep->nm3_dpath; 2574 } 2575 2576 multiple_dest_restore = (nm_cnt > 1); 2577 nlp->nlp_restore_path = mdest_buf; 2578 2579 for (i = 1; i < nm_cnt + 1; i++) { 2580 if (ISDEFINED(nm_dpath_list[i])) 2581 dp = nm_dpath_list[i]; 2582 else 2583 /* the default destination path is backup directory */ 2584 dp = nlp->nlp_backup_path; 2585 2586 /* check the destination directory exists and is writable */ 2587 if (!fs_volexist(dp)) { 2588 rv = NDMP_ILLEGAL_ARGS_ERR; 2589 MOD_LOGV3(params, NDMP_LOG_ERROR, 2590 "Invalid destination path volume \"%s\".\n", dp); 2591 } else if (!voliswr(dp)) { 2592 rv = NDMP_ILLEGAL_ARGS_ERR; 2593 MOD_LOGV3(params, NDMP_LOG_ERROR, 2594 "The destination path volume" 2595 " is not writable \"%s\".\n", dp); 2596 } else { 2597 rv = NDMP_NO_ERR; 2598 (void) strlcat(nlp->nlp_restore_path, dp, 2599 sizeof (mdest_buf)); 2600 NDMP_LOG(LOG_DEBUG, "rspath: \"%s\"", dp); 2601 } 2602 2603 /* 2604 * Exit if there is an error or it is not a multiple 2605 * destination restore mode 2606 */ 2607 if (rv != NDMP_NO_ERR || !multiple_dest_restore) 2608 break; 2609 2610 if (i < nm_cnt) 2611 (void) strlcat(nlp->nlp_restore_path, ", ", 2612 sizeof (mdest_buf)); 2613 } 2614 2615 return (rv); 2616 } 2617 2618 2619 /* 2620 * fix_nlist_v3 2621 * 2622 * Check if the recovery list is valid and fix it if there are some 2623 * unspecified entries in it. It checks for original, destination 2624 * and new path for all NDMP names provided inside the list. 2625 * 2626 * V3: dpath is the destination directory. If newnm is not NULL, the 2627 * destination path is dpath/newnm. Otherwise the destination path is 2628 * dpath/opath_last_node, where opath_last_node is the last node in opath. 2629 * 2630 * V4: If newnm is not NULL, dpath is the destination directory, and 2631 * dpath/newnm is the destination path. If newnm is NULL, dpath is 2632 * the destination path (opath is not involved in forming destination path). 2633 */ 2634 ndmp_error 2635 fix_nlist_v3(ndmpd_session_t *session, ndmpd_module_params_t *params, 2636 ndmp_lbr_params_t *nlp) 2637 { 2638 char *cp, *buf, *bp; 2639 int i, n; 2640 int iswrbk; 2641 int bvexists; 2642 ndmp_error rv; 2643 mem_ndmp_name_v3_t *ep; 2644 char *dp; 2645 char *nm; 2646 int existsvol; 2647 int isrwdst; 2648 2649 buf = ndmp_malloc(TLM_MAX_PATH_NAME); 2650 if (!buf) { 2651 MOD_LOGV3(params, NDMP_LOG_ERROR, "Insufficient memory.\n"); 2652 return (NDMP_NO_MEM_ERR); 2653 } 2654 2655 bvexists = fs_volexist(nlp->nlp_backup_path); 2656 iswrbk = voliswr(nlp->nlp_backup_path); 2657 2658 rv = NDMP_NO_ERR; 2659 n = session->ns_data.dd_nlist_len; 2660 for (i = 0; i < n; i++) { 2661 ep = (mem_ndmp_name_v3_t *)MOD_GETNAME(params, i); 2662 if (!ep) 2663 continue; 2664 2665 /* chop off the trailing slashes */ 2666 chopslash(ep->nm3_opath); 2667 2668 chopslash(ep->nm3_dpath); 2669 chopslash(ep->nm3_newnm); 2670 2671 /* existing and non-empty destination path */ 2672 if (ISDEFINED(ep->nm3_dpath)) { 2673 dp = ep->nm3_dpath; 2674 existsvol = fs_volexist(dp); 2675 isrwdst = voliswr(dp); 2676 } else { 2677 /* the default destination path is backup directory */ 2678 dp = nlp->nlp_backup_path; 2679 existsvol = bvexists; 2680 isrwdst = iswrbk; 2681 } 2682 2683 /* check the destination directory exists and is writable */ 2684 if (!existsvol) { 2685 rv = NDMP_ILLEGAL_ARGS_ERR; 2686 MOD_LOGV3(params, NDMP_LOG_ERROR, 2687 "Invalid destination path volume " 2688 "\"%s\".\n", dp); 2689 break; 2690 } 2691 if (!isrwdst) { 2692 rv = NDMP_ILLEGAL_ARGS_ERR; 2693 MOD_LOGV3(params, NDMP_LOG_ERROR, 2694 "The destination path volume is not " 2695 "writable \"%s\".\n", dp); 2696 break; 2697 } 2698 2699 /* 2700 * If new name is not specified, the default new name is 2701 * the last component of the original path, if any 2702 * (except in V4). 2703 */ 2704 if (ISDEFINED(ep->nm3_newnm)) { 2705 nm = ep->nm3_newnm; 2706 } else { 2707 char *p, *q; 2708 2709 /* 2710 * Find the last component of nm3_opath. 2711 * nm3_opath has no trailing '/'. 2712 */ 2713 p = strrchr(ep->nm3_opath, '/'); 2714 nm = p ? p + 1 : ep->nm3_opath; 2715 2716 /* 2717 * In DDAR the last component could 2718 * be repeated in nm3_dpath 2719 */ 2720 q = strrchr(ep->nm3_dpath, '/'); 2721 q = q ? q + 1 : ep->nm3_dpath; 2722 if (strcmp(nm, q) == 0) 2723 nm = NULL; 2724 2725 } 2726 2727 bp = joinpath(buf, dp, nm); 2728 if (!bp) { 2729 /* 2730 * Note: What should be done with this entry? 2731 * We leave it untouched for now, hence no path in 2732 * the backup image matches with this entry and will 2733 * be reported as not found. 2734 */ 2735 MOD_LOGV3(params, NDMP_LOG_ERROR, 2736 "Destination path too long(%s/%s)", dp, nm); 2737 continue; 2738 } 2739 cp = strdup(bp); 2740 if (!cp) { 2741 MOD_LOGV3(params, NDMP_LOG_ERROR, 2742 "Insufficient memory.\n"); 2743 rv = NDMP_NO_MEM_ERR; 2744 break; 2745 } 2746 free(ep->nm3_dpath); 2747 ep->nm3_dpath = cp; 2748 NDMP_FREE(ep->nm3_newnm); 2749 2750 bp = joinpath(buf, nlp->nlp_backup_path, ep->nm3_opath); 2751 if (!bp) { 2752 /* 2753 * Note: The same problem of above with long path. 2754 */ 2755 MOD_LOGV3(params, NDMP_LOG_ERROR, 2756 "Path too long(%s/%s)", 2757 nlp->nlp_backup_path, ep->nm3_opath); 2758 continue; 2759 } 2760 cp = strdup(bp); 2761 if (!cp) { 2762 MOD_LOGV3(params, NDMP_LOG_ERROR, 2763 "Insufficient memory.\n"); 2764 rv = NDMP_NO_MEM_ERR; 2765 break; 2766 } 2767 NDMP_FREE(ep->nm3_opath); 2768 ep->nm3_opath = cp; 2769 2770 NDMP_LOG(LOG_DEBUG, "orig[%d]: \"%s\"", i, ep->nm3_opath); 2771 if (ep->nm3_dpath) { 2772 NDMP_LOG(LOG_DEBUG, 2773 "dest[%d]: \"%s\"", i, ep->nm3_dpath); 2774 } else { 2775 NDMP_LOG(LOG_DEBUG, "dest[%d]: \"%s\"", i, "NULL"); 2776 } 2777 } 2778 2779 free(buf); 2780 2781 return (rv); 2782 } 2783 2784 2785 /* 2786 * allvalidfh 2787 * 2788 * Run a sanity check on the file history info. The file history 2789 * info is the offset of the record starting the entry on the tape 2790 * and is used in DAR (direct access restore mode). 2791 */ 2792 static boolean_t 2793 allvalidfh(ndmpd_session_t *session, ndmpd_module_params_t *params) 2794 { 2795 int i, n; 2796 boolean_t rv; 2797 mem_ndmp_name_v3_t *ep; 2798 2799 rv = TRUE; 2800 n = session->ns_data.dd_nlist_len; 2801 for (i = 0; i < n; i++) { 2802 ep = (mem_ndmp_name_v3_t *)MOD_GETNAME(params, i); 2803 if (!ep) 2804 continue; 2805 /* 2806 * The fh_info's sent from the client are multiples 2807 * of RECORDSIZE which is 512 bytes. 2808 * 2809 * All our fh_info's are at the RECORDSIZE boundary. If there 2810 * is any fh_info that is less than RECORDSIZE (this covers 0 2811 * and -1 values too), then the result is that DAR cannot be 2812 * done. 2813 */ 2814 if (ep->nm3_fh_info < RECORDSIZE || 2815 ep->nm3_fh_info % RECORDSIZE != 0) { 2816 rv = FALSE; 2817 break; 2818 } 2819 } 2820 2821 return (rv); 2822 } 2823 2824 2825 /* 2826 * log_rs_params_v3 2827 * 2828 * Log a copy of all values of the restore parameters 2829 */ 2830 void 2831 log_rs_params_v3(ndmpd_session_t *session, ndmpd_module_params_t *params, 2832 ndmp_lbr_params_t *nlp) 2833 { 2834 MOD_LOGV3(params, NDMP_LOG_NORMAL, "Restoring to \"%s\".\n", 2835 (nlp->nlp_restore_path) ? nlp->nlp_restore_path : "NULL"); 2836 2837 if (session->ns_data.dd_data_addr.addr_type == NDMP_ADDR_LOCAL) { 2838 MOD_LOGV3(params, NDMP_LOG_NORMAL, "Tape server: local.\n"); 2839 MOD_LOGV3(params, NDMP_LOG_NORMAL, 2840 "Tape record size: %d.\n", 2841 session->ns_mover.md_record_size); 2842 } else if (session->ns_data.dd_data_addr.addr_type == NDMP_ADDR_TCP) 2843 MOD_LOGV3(params, NDMP_LOG_NORMAL, 2844 "Tape server: remote at %s:%d.\n", 2845 inet_ntoa(IN_ADDR(session->ns_data.dd_data_addr.tcp_ip_v3)), 2846 session->ns_data.dd_data_addr.tcp_port_v3); 2847 else 2848 MOD_LOGV3(params, NDMP_LOG_ERROR, 2849 "Unknown tape server address type.\n"); 2850 2851 if (NLP_ISSET(nlp, NLPF_DIRECT)) 2852 MOD_LOGV3(params, NDMP_LOG_NORMAL, 2853 "Direct Access Restore.\n"); 2854 } 2855 2856 2857 /* 2858 * send_unrecovered_list_v3 2859 * 2860 * Create the list of files that were in restore list but 2861 * not recovered due to some errors. 2862 */ 2863 int 2864 send_unrecovered_list_v3(ndmpd_module_params_t *params, ndmp_lbr_params_t *nlp) 2865 { 2866 int i, rv; 2867 int err; 2868 2869 if (!params) { 2870 NDMP_LOG(LOG_DEBUG, "params == NULL"); 2871 return (-1); 2872 } 2873 if (!nlp) { 2874 NDMP_LOG(LOG_DEBUG, "nlp == NULL"); 2875 return (-1); 2876 } 2877 2878 if (nlp->nlp_lastidx != -1) { 2879 if (!bm_getone(nlp->nlp_rsbm, (u_longlong_t)nlp->nlp_lastidx)) 2880 err = ENOENT; 2881 else 2882 err = 0; 2883 (void) ndmp_send_recovery_stat_v3(params, nlp, 2884 nlp->nlp_lastidx, err); 2885 nlp->nlp_lastidx = -1; 2886 } 2887 2888 rv = 0; 2889 for (i = 0; i < (int)nlp->nlp_nfiles; i++) { 2890 if (!bm_getone(nlp->nlp_rsbm, (u_longlong_t)i)) { 2891 rv = ndmp_send_recovery_stat_v3(params, nlp, i, ENOENT); 2892 if (rv < 0) 2893 break; 2894 } 2895 } 2896 2897 return (rv); 2898 } 2899 2900 2901 2902 /* 2903 * restore_dar_alloc_structs_v3 2904 * 2905 * Allocates the necessary structures for running DAR restore. 2906 * It just creates the reader writer IPC. 2907 * This function is called for each entry in the restore entry list. 2908 * 2909 * Parameters: 2910 * session (input) - pointer to the session 2911 * jname (input) - Job name 2912 * 2913 * Returns: 2914 * 0: on success 2915 * -1: on error 2916 */ 2917 int 2918 restore_dar_alloc_structs_v3(ndmpd_session_t *session, char *jname) 2919 { 2920 long xfer_size; 2921 ndmp_lbr_params_t *nlp; 2922 tlm_commands_t *cmds; 2923 2924 nlp = ndmp_get_nlp(session); 2925 if (!nlp) { 2926 NDMP_LOG(LOG_DEBUG, "nlp == NULL"); 2927 return (-1); 2928 } 2929 2930 cmds = &nlp->nlp_cmds; 2931 (void) memset(cmds, 0, sizeof (*cmds)); 2932 2933 xfer_size = ndmp_buffer_get_size(session); 2934 cmds->tcs_command = tlm_create_reader_writer_ipc(FALSE, xfer_size); 2935 if (!cmds->tcs_command) { 2936 tlm_un_ref_job_stats(jname); 2937 return (-1); 2938 } 2939 2940 return (0); 2941 } 2942 2943 2944 /* 2945 * free_dar_structs_v3 2946 * 2947 * To free the structures were created by restore_dar_alloc_structs_v3. 2948 * This funnction is called for each entry in restore entry list. 2949 * 2950 * Parameters: 2951 * session (input) - pointer to the session 2952 * jname (input) - job name 2953 * 2954 * Returns: 2955 * NONE 2956 */ 2957 /*ARGSUSED*/ 2958 static void 2959 free_dar_structs_v3(ndmpd_session_t *session, char *jname) 2960 { 2961 ndmp_lbr_params_t *nlp; 2962 tlm_commands_t *cmds; 2963 2964 nlp = ndmp_get_nlp(session); 2965 if (!nlp) { 2966 NDMP_LOG(LOG_DEBUG, "nlp == NULL"); 2967 return; 2968 } 2969 cmds = &nlp->nlp_cmds; 2970 if (!cmds) { 2971 NDMP_LOG(LOG_DEBUG, "cmds == NULL"); 2972 return; 2973 } 2974 2975 if (cmds->tcs_command) { 2976 if (cmds->tcs_command->tc_buffers != NULL) 2977 tlm_release_reader_writer_ipc(cmds->tcs_command); 2978 else 2979 NDMP_LOG(LOG_DEBUG, "BUFFERS == NULL"); 2980 cmds->tcs_command = NULL; 2981 } else 2982 NDMP_LOG(LOG_DEBUG, "COMMAND == NULL"); 2983 } 2984 2985 2986 /* 2987 * ndmp_dar_tar_init_v3 2988 * 2989 * Constructor for the DAR restore. Creates job name, allocates structures 2990 * needed for keeping the statistics, and reports the start of restore action. 2991 * It is called once for each DAR restore request. 2992 * 2993 * Parameters: 2994 * session (input) - pointer to the session 2995 * nlp (input) - pointer to the nlp structure 2996 * 2997 * Returns: 2998 * char pointer: on success 2999 * NULL: on error 3000 */ 3001 static char *ndmpd_dar_tar_init_v3(ndmpd_session_t *session, 3002 ndmp_lbr_params_t *nlp) 3003 { 3004 char *jname; 3005 3006 jname = ndmp_malloc(TLM_MAX_BACKUP_JOB_NAME); 3007 3008 if (!jname) 3009 return (NULL); 3010 3011 (void) ndmp_new_job_name(jname); 3012 3013 if (!nlp) { 3014 free(jname); 3015 NDMP_LOG(LOG_DEBUG, "nlp == NULL"); 3016 return (NULL); 3017 } 3018 3019 nlp->nlp_jstat = tlm_new_job_stats(jname); 3020 if (!nlp->nlp_jstat) { 3021 free(jname); 3022 NDMP_LOG(LOG_DEBUG, "Creating job stats"); 3023 return (NULL); 3024 } 3025 3026 nlp->nlp_jstat->js_start_ltime = time(NULL); 3027 nlp->nlp_jstat->js_start_time = nlp->nlp_jstat->js_start_ltime; 3028 3029 nlp->nlp_logcallbacks = lbrlog_callbacks_init(session, 3030 ndmpd_path_restored_v3, NULL, NULL); 3031 if (!nlp->nlp_logcallbacks) { 3032 tlm_un_ref_job_stats(jname); 3033 free(jname); 3034 return (NULL); 3035 } 3036 nlp->nlp_jstat->js_callbacks = (void *)(nlp->nlp_logcallbacks); 3037 3038 nlp->nlp_rsbm = bm_alloc(nlp->nlp_nfiles, 0); 3039 if (nlp->nlp_rsbm < 0) { 3040 NDMP_LOG(LOG_ERR, "Out of memory."); 3041 lbrlog_callbacks_done(nlp->nlp_logcallbacks); 3042 tlm_un_ref_job_stats(jname); 3043 free(jname); 3044 return (NULL); 3045 } 3046 3047 /* this is used in ndmpd_path_restored_v3() */ 3048 nlp->nlp_lastidx = -1; 3049 3050 NDMP_LOG(LOG_DEBUG, "Restoring from %s tape(s).", 3051 ndmp_data_get_mover_mode(session)); 3052 3053 return (jname); 3054 } 3055 3056 /* 3057 * ndmpd_dar_tar_end_v3 3058 * 3059 * Deconstructor for the DAR restore. This function is called once per 3060 * DAR request. It deallocates memories allocated by ndmpd_dar_tar_init_v3. 3061 * 3062 * Parameters: 3063 * session (input) - pointer to the session 3064 * params (input) - pointer to the parameters structure 3065 * nlp (input) - pointer to the nlp structure 3066 * jname(input) - job name 3067 * 3068 * Returns: 3069 * 0: on success 3070 * -1: on error 3071 */ 3072 static int ndmpd_dar_tar_end_v3(ndmpd_session_t *session, 3073 ndmpd_module_params_t *params, ndmp_lbr_params_t *nlp, char *jname) 3074 { 3075 int err = 0; 3076 3077 3078 NDMP_LOG(LOG_DEBUG, "lastidx %d", nlp->nlp_lastidx); 3079 3080 /* nothing restored. */ 3081 (void) send_unrecovered_list_v3(params, nlp); 3082 3083 if (nlp->nlp_jstat) { 3084 nlp->nlp_bytes_total = 3085 (u_longlong_t)nlp->nlp_jstat->js_bytes_total; 3086 tlm_un_ref_job_stats(jname); 3087 nlp->nlp_jstat = NULL; 3088 } else { 3089 NDMP_LOG(LOG_DEBUG, "JSTAT == NULL"); 3090 } 3091 3092 if (nlp->nlp_logcallbacks) { 3093 lbrlog_callbacks_done(nlp->nlp_logcallbacks); 3094 nlp->nlp_logcallbacks = NULL; 3095 } else { 3096 NDMP_LOG(LOG_DEBUG, "FH CALLBACKS == NULL"); 3097 } 3098 3099 if (session->ns_data.dd_abort) { 3100 NDMP_LOG(LOG_DEBUG, "Restoring to \"%s\" aborted.", 3101 (nlp->nlp_restore_path) ? nlp->nlp_restore_path : "NULL"); 3102 err = EINTR; 3103 } else { 3104 NDMP_LOG(LOG_DEBUG, "Restoring to \"%s\" finished. (%d)", 3105 (nlp->nlp_restore_path) ? nlp->nlp_restore_path : 3106 "NULL", err); 3107 } 3108 3109 if (session->ns_data.dd_operation == NDMP_DATA_OP_RECOVER) { 3110 if (nlp->nlp_rsbm < 0) { 3111 NDMP_LOG(LOG_DEBUG, "nlp_rsbm < 0 %d", nlp->nlp_rsbm); 3112 } else { 3113 (void) bm_free(nlp->nlp_rsbm); 3114 nlp->nlp_rsbm = -1; 3115 } 3116 } 3117 3118 free(jname); 3119 3120 return (err); 3121 } 3122 3123 3124 /* 3125 * ndmpd_dar_tar_v3 3126 * 3127 * This function is called for each entry in DAR entry list. The window 3128 * is already located and we should be in the right position to read 3129 * the data from the tape. 3130 * For each entry we setup selection list; so that, if the file name from 3131 * tape is not as the name client asked for, error be returned. 3132 * 3133 * Parameters: 3134 * session (input) - pointer to the session 3135 * params (input) - pointer to the parameters structure 3136 * nlp (input) - pointer to the nlp structure 3137 * jname (input) - job name 3138 * dar_index(input) - Index of this entry in the restore list 3139 * 3140 * Returns: 3141 * 0: on success 3142 * -1: on error 3143 */ 3144 static int 3145 ndmpd_dar_tar_v3(ndmpd_session_t *session, ndmpd_module_params_t *params, 3146 ndmp_lbr_params_t *nlp, char *jname, int dar_index) 3147 { 3148 char *excl; 3149 char **sels; 3150 int flags; 3151 int err; 3152 tlm_commands_t *cmds; 3153 struct rs_name_maker rn; 3154 int data_addr_type = session->ns_data.dd_data_addr.addr_type; 3155 ndmp_tar_reader_arg_t arg; 3156 pthread_t rdtp; 3157 ndmp_context_t nctx; 3158 mem_ndmp_name_v3_t *ep; 3159 3160 err = 0; 3161 3162 /* 3163 * We have to allocate and deallocate buffers every time we 3164 * run the restore, for we need to flush the buffers. 3165 */ 3166 if (restore_dar_alloc_structs_v3(session, jname) < 0) 3167 return (-1); 3168 3169 sels = setupsels(session, params, nlp, dar_index); 3170 if (!sels) { 3171 free_dar_structs_v3(session, jname); 3172 return (-1); 3173 } 3174 excl = NULL; 3175 flags = RSFLG_OVR_ALWAYS; 3176 rn.rn_nlp = nlp; 3177 rn.rn_fp = mknewname; 3178 3179 if (!session->ns_data.dd_abort) { 3180 cmds = &nlp->nlp_cmds; 3181 cmds->tcs_reader = cmds->tcs_writer = TLM_RESTORE_RUN; 3182 cmds->tcs_command->tc_reader = TLM_RESTORE_RUN; 3183 cmds->tcs_command->tc_writer = TLM_RESTORE_RUN; 3184 3185 arg.tr_session = session; 3186 arg.tr_mod_params = params; 3187 arg.tr_cmds = cmds; 3188 3189 err = pthread_create(&rdtp, NULL, (funct_t)ndmp_tar_reader, 3190 (void *)&arg); 3191 if (err == 0) { 3192 tlm_cmd_wait(cmds->tcs_command, TLM_TAR_READER); 3193 } else { 3194 NDMP_LOG(LOG_DEBUG, "launch ndmp_tar_reader: %m"); 3195 return (-1); 3196 } 3197 3198 cmds->tcs_command->tc_ref++; 3199 cmds->tcs_writer_count++; 3200 3201 /* Plug-in module */ 3202 if (ndmp_pl != NULL && 3203 ndmp_pl->np_pre_restore != NULL) { 3204 (void) memset(&nctx, 0, sizeof (ndmp_context_t)); 3205 nctx.nc_cmds = cmds; 3206 nctx.nc_params = params; 3207 nctx.nc_ddata = (void *) session; 3208 ep = (mem_ndmp_name_v3_t *)MOD_GETNAME(params, 3209 dar_index - 1); 3210 3211 if ((err = ndmp_pl->np_pre_restore(ndmp_pl, &nctx, 3212 ep->nm3_opath, ep->nm3_dpath)) 3213 != 0) { 3214 NDMP_LOG(LOG_ERR, "Pre-restore plug-in: %m"); 3215 ndmp_stop_local_reader(session, cmds); 3216 ndmp_wait_for_reader(cmds); 3217 (void) pthread_join(rdtp, NULL); 3218 ndmp_stop_remote_reader(session); 3219 goto restore_out; 3220 } 3221 } 3222 3223 if (tm_tar_ops.tm_getdir != NULL) { 3224 char errbuf[256]; 3225 3226 err = (tm_tar_ops.tm_getdir)(cmds, cmds->tcs_command, 3227 nlp->nlp_jstat, &rn, 1, 1, sels, &excl, flags, 3228 dar_index, nlp->nlp_backup_path, 3229 session->hardlink_q); 3230 /* 3231 * If the fatal error from tm_getdir looks like an 3232 * errno code, we send the error description to DMA. 3233 */ 3234 if (err > 0 && strerror_r(err, errbuf, 3235 sizeof (errbuf)) == 0) { 3236 MOD_LOGV3(params, NDMP_LOG_ERROR, 3237 "Fatal error during the restore: %s\n", 3238 errbuf); 3239 } 3240 } 3241 3242 cmds->tcs_writer_count--; 3243 cmds->tcs_command->tc_ref--; 3244 NDMP_LOG(LOG_DEBUG, "stop local reader."); 3245 ndmp_stop_local_reader(session, cmds); 3246 3247 ndmp_wait_for_reader(cmds); 3248 (void) pthread_join(rdtp, NULL); 3249 3250 /* 3251 * If this is the last DAR entry and it is a three-way 3252 * restore then we should close the connection. 3253 */ 3254 if ((data_addr_type == NDMP_ADDR_TCP) && 3255 (dar_index == (int)session->ns_data.dd_nlist_len)) { 3256 NDMP_LOG(LOG_DEBUG, "stop remote reader."); 3257 ndmp_stop_remote_reader(session); 3258 } 3259 3260 /* exit as if there was an internal error */ 3261 if (session->ns_eof) 3262 err = -1; 3263 restore_out: 3264 /* Plug-in module */ 3265 if (ndmp_pl != NULL && 3266 ndmp_pl->np_post_restore != NULL && 3267 ndmp_pl->np_post_restore(ndmp_pl, &nctx, err) == -1) { 3268 NDMP_LOG(LOG_DEBUG, "Post-restore plug-in: %m"); 3269 err = -1; 3270 } 3271 } 3272 3273 NDMP_FREE(sels); 3274 3275 free_dar_structs_v3(session, jname); 3276 3277 return (err); 3278 } 3279 3280 /* 3281 * ndmpd_dar_locate_windwos_v3 3282 * 3283 * Locating the right window in which the requested file is backed up. 3284 * We should go through windows to find the exact location, for the 3285 * file can be located in for example 10th window after the current window. 3286 * 3287 * Parameters: 3288 * session (input) - pointer to the session 3289 * params (input) - pointer to the parameters structure 3290 * fh_info (input) - index from the beginning of the backup stream 3291 * len (input) - Length of the mover window 3292 * 3293 * Returns: 3294 * 0: on success 3295 * -1: on error 3296 */ 3297 static int 3298 ndmpd_dar_locate_window_v3(ndmpd_session_t *session, 3299 ndmpd_module_params_t *params, u_longlong_t fh_info, u_longlong_t len) 3300 { 3301 int ret = 0; 3302 3303 3304 for (; ; ) { 3305 ret = (*params->mp_seek_func)(session, fh_info, len); 3306 3307 NDMP_LOG(LOG_DEBUG, "ret %d", ret); 3308 if (ret == 0) /* Seek was done successfully */ 3309 break; 3310 else if (ret < 0) { 3311 NDMP_LOG(LOG_DEBUG, "Seek error"); 3312 break; 3313 } 3314 3315 /* 3316 * DMA moved to a new window. 3317 * If we are reading the remainig of the file from 3318 * new window, seek is handled by ndmpd_local_read_v3. 3319 * Here we should continue the seek inside the new 3320 * window. 3321 */ 3322 continue; 3323 } 3324 return (ret); 3325 } 3326 3327 /* 3328 * ndmpd_rs_dar_tar_v3 3329 * 3330 * Main DAR function. It calls the constructor, then for each entry it 3331 * calls the locate_window_v3 to find the exact position of the file. Then 3332 * it restores the file. 3333 * When all restore requests are done it calls the deconstructor to clean 3334 * everything up. 3335 * 3336 * Parameters: 3337 * session (input) - pointer to the session 3338 * params (input) - pointer to the parameters structure 3339 * nlp (input) - pointer to the nlp structure 3340 * 3341 * Returns: 3342 * 0: on success 3343 * -1: on error 3344 */ 3345 static int 3346 ndmpd_rs_dar_tar_v3(ndmpd_session_t *session, ndmpd_module_params_t *params, 3347 ndmp_lbr_params_t *nlp) 3348 { 3349 mem_ndmp_name_v3_t *ep; 3350 u_longlong_t len; 3351 char *jname; 3352 int n = session->ns_data.dd_nlist_len; 3353 int i, ret = 0; 3354 int result = 0; 3355 3356 jname = ndmpd_dar_tar_init_v3(session, nlp); 3357 3358 if (!jname) 3359 return (-1); 3360 3361 /* 3362 * We set the length = sizeof (tlm_tar_hdr_t) 3363 * This is important for three-way DAR restore, for we should 3364 * read the header first (If we ask for more data then we have 3365 * to read and discard the remaining data in the socket) 3366 */ 3367 len = tlm_tarhdr_size(); 3368 3369 for (i = 0; i < n; ++i) { 3370 ep = (mem_ndmp_name_v3_t *)MOD_GETNAME(params, i); 3371 if (!ep) { 3372 NDMP_LOG(LOG_DEBUG, "ep NULL, i %d", i); 3373 continue; 3374 } 3375 NDMP_LOG(LOG_DEBUG, 3376 "restoring opath %s, dpath %s, fh_info %lld", 3377 ep->nm3_opath ? ep->nm3_opath : "NULL", 3378 ep->nm3_dpath ? ep->nm3_dpath : "NULL", 3379 ep->nm3_fh_info); 3380 3381 /* 3382 * We should seek till finding the window in which file 3383 * is located. 3384 */ 3385 ret = ndmpd_dar_locate_window_v3(session, params, 3386 ep->nm3_fh_info, len); 3387 3388 if (ret < 0) /* If seek fails, restore should be aborted */ 3389 break; 3390 /* 3391 * We are inside the target window. 3392 * for each restore we will use one entry as selection list 3393 */ 3394 if ((ret = ndmpd_dar_tar_v3(session, params, nlp, jname, i+1)) 3395 != 0) 3396 result = EIO; 3397 ndmpd_audit_restore(session->ns_connection, 3398 ep->nm3_opath ? ep->nm3_opath : "NULL", 3399 session->ns_data.dd_data_addr.addr_type, 3400 session->ns_tape.td_adapter_name, result); 3401 } 3402 3403 NDMP_LOG(LOG_DEBUG, "End of restore list"); 3404 3405 (void) ndmpd_dar_tar_end_v3(session, params, nlp, jname); 3406 3407 return (ret); 3408 } 3409 3410 /* 3411 * ndmp_plugin_pre_restore 3412 * 3413 * Wrapper for pre-restore callback with multiple path 3414 */ 3415 static int 3416 ndmp_plugin_pre_restore(ndmp_context_t *ctxp, ndmpd_module_params_t *params, 3417 int ncount) 3418 { 3419 mem_ndmp_name_v3_t *ep; 3420 int err; 3421 int i; 3422 3423 for (i = 0; i < ncount; i++) { 3424 if (!(ep = (mem_ndmp_name_v3_t *)MOD_GETNAME(params, i))) 3425 continue; 3426 if ((err = ndmp_pl->np_pre_restore(ndmp_pl, ctxp, 3427 ep->nm3_opath, ep->nm3_dpath)) != 0) 3428 return (err); 3429 } 3430 3431 return (0); 3432 } 3433 3434 /* 3435 * get_absolute_path 3436 * 3437 * Get resolved path name which does not involve ".", ".." or extra 3438 * "/" or symbolic links. 3439 * 3440 * e.g. 3441 * 3442 * /backup/path/ -> /backup/path 3443 * /backup/path/. -> /backup/path 3444 * /backup/path/../path/ -> /backup/path 3445 * /link-to-backup-path -> /backup/path 3446 * 3447 * Returns: 3448 * Pointer to the new path (allocated) 3449 * NULL if the path doesnt exist 3450 */ 3451 static char * 3452 get_absolute_path(const char *bkpath) 3453 { 3454 char *pbuf; 3455 char *rv; 3456 3457 if (!(pbuf = ndmp_malloc(TLM_MAX_PATH_NAME))) 3458 return (NULL); 3459 3460 if ((rv = realpath(bkpath, pbuf)) == NULL) { 3461 NDMP_LOG(LOG_DEBUG, "Invalid path [%s] err=%d", 3462 bkpath, errno); 3463 } 3464 return (rv); 3465 } 3466 3467 /* 3468 * Expands the format string and logs the resulting message to the 3469 * remote DMA 3470 */ 3471 void 3472 ndmp_log_dma(ndmp_context_t *nctx, ndmp_log_dma_type_t lt, const char *fmt, ...) 3473 { 3474 va_list ap; 3475 char buf[256]; 3476 ndmpd_module_params_t *params; 3477 3478 if (nctx == NULL || 3479 (params = (ndmpd_module_params_t *)nctx->nc_params) == NULL) 3480 return; 3481 3482 va_start(ap, fmt); 3483 (void) vsnprintf(buf, sizeof (buf), fmt, ap); 3484 va_end(ap); 3485 3486 MOD_LOGV3(params, (ndmp_log_type)lt, "%s", buf); 3487 } 3488 3489 3490 /* 3491 * ndmpd_rs_sar_tar_v3 3492 * 3493 * Main non-DAR restore function. It will try to restore all the entries 3494 * that have been backed up. 3495 * 3496 * Parameters: 3497 * session (input) - pointer to the session 3498 * params (input) - pointer to the parameters structure 3499 * nlp (input) - pointer to the nlp structure 3500 * 3501 * Returns: 3502 * 0: on success 3503 * -1: on error 3504 */ 3505 static int 3506 ndmpd_rs_sar_tar_v3(ndmpd_session_t *session, ndmpd_module_params_t *params, 3507 ndmp_lbr_params_t *nlp) 3508 { 3509 char jname[TLM_MAX_BACKUP_JOB_NAME]; 3510 char *excl; 3511 char **sels; 3512 int flags; 3513 int err; 3514 tlm_commands_t *cmds; 3515 struct rs_name_maker rn; 3516 ndmp_tar_reader_arg_t arg; 3517 pthread_t rdtp; 3518 int result; 3519 ndmp_context_t nctx; 3520 3521 result = err = 0; 3522 (void) ndmp_new_job_name(jname); 3523 if (restore_alloc_structs_v3(session, jname) < 0) 3524 return (-1); 3525 3526 sels = setupsels(session, params, nlp, 0); 3527 if (!sels) { 3528 free_structs_v3(session, jname); 3529 return (-1); 3530 } 3531 excl = NULL; 3532 flags = RSFLG_OVR_ALWAYS; 3533 rn.rn_nlp = nlp; 3534 rn.rn_fp = mknewname; 3535 3536 nlp->nlp_jstat->js_start_ltime = time(NULL); 3537 nlp->nlp_jstat->js_start_time = nlp->nlp_jstat->js_start_ltime; 3538 3539 if (!session->ns_data.dd_abort && !session->ns_data.dd_abort) { 3540 cmds = &nlp->nlp_cmds; 3541 cmds->tcs_reader = cmds->tcs_writer = TLM_RESTORE_RUN; 3542 cmds->tcs_command->tc_reader = TLM_RESTORE_RUN; 3543 cmds->tcs_command->tc_writer = TLM_RESTORE_RUN; 3544 3545 NDMP_LOG(LOG_DEBUG, "Restoring to \"%s\" started.", 3546 (nlp->nlp_restore_path) ? nlp->nlp_restore_path : "NULL"); 3547 3548 arg.tr_session = session; 3549 arg.tr_mod_params = params; 3550 arg.tr_cmds = cmds; 3551 err = pthread_create(&rdtp, NULL, (funct_t)ndmp_tar_reader, 3552 (void *)&arg); 3553 if (err == 0) { 3554 tlm_cmd_wait(cmds->tcs_command, TLM_TAR_READER); 3555 } else { 3556 NDMP_LOG(LOG_DEBUG, "Launch ndmp_tar_reader: %m"); 3557 free_structs_v3(session, jname); 3558 return (-1); 3559 } 3560 3561 if (!ndmp_check_utf8magic(cmds->tcs_command)) { 3562 NDMP_LOG(LOG_DEBUG, "UTF8Magic not found!"); 3563 } else { 3564 NDMP_LOG(LOG_DEBUG, "UTF8Magic found"); 3565 } 3566 3567 /* Plug-in module */ 3568 if (ndmp_pl != NULL && 3569 ndmp_pl->np_pre_restore != NULL) { 3570 (void) memset(&nctx, 0, sizeof (ndmp_context_t)); 3571 nctx.nc_cmds = cmds; 3572 nctx.nc_params = params; 3573 nctx.nc_ddata = (void *) session; 3574 if ((err = ndmp_plugin_pre_restore(&nctx, params, 3575 nlp->nlp_nfiles)) 3576 != 0) { 3577 NDMP_LOG(LOG_ERR, "Pre-restore plug-in: %m"); 3578 ndmp_stop_local_reader(session, cmds); 3579 ndmp_wait_for_reader(cmds); 3580 (void) pthread_join(rdtp, NULL); 3581 ndmp_stop_remote_reader(session); 3582 goto restore_out; 3583 } 3584 } 3585 3586 cmds->tcs_command->tc_ref++; 3587 cmds->tcs_writer_count++; 3588 3589 if (tm_tar_ops.tm_getdir != NULL) { 3590 char errbuf[256]; 3591 3592 err = (tm_tar_ops.tm_getdir)(cmds, cmds->tcs_command, 3593 nlp->nlp_jstat, &rn, 1, 1, sels, &excl, flags, 0, 3594 nlp->nlp_backup_path, session->hardlink_q); 3595 /* 3596 * If the fatal error from tm_getdir looks like an 3597 * errno code, we send the error description to DMA. 3598 */ 3599 if (err > 0 && strerror_r(err, errbuf, 3600 sizeof (errbuf)) == 0) { 3601 MOD_LOGV3(params, NDMP_LOG_ERROR, 3602 "Fatal error during the restore: %s\n", 3603 errbuf); 3604 } 3605 } 3606 3607 cmds->tcs_writer_count--; 3608 cmds->tcs_command->tc_ref--; 3609 nlp->nlp_jstat->js_stop_time = time(NULL); 3610 3611 /* Send the list of un-recovered files/dirs to the client. */ 3612 (void) send_unrecovered_list_v3(params, nlp); 3613 3614 ndmp_stop_local_reader(session, cmds); 3615 ndmp_wait_for_reader(cmds); 3616 (void) pthread_join(rdtp, NULL); 3617 3618 ndmp_stop_remote_reader(session); 3619 3620 /* exit as if there was an internal error */ 3621 if (session->ns_eof) 3622 err = -1; 3623 if (err == -1) 3624 result = EIO; 3625 } 3626 3627 (void) send_unrecovered_list_v3(params, nlp); /* nothing restored. */ 3628 if (session->ns_data.dd_abort) { 3629 NDMP_LOG(LOG_DEBUG, "Restoring to \"%s\" aborted.", 3630 (nlp->nlp_restore_path) ? nlp->nlp_restore_path : "NULL"); 3631 result = EINTR; 3632 ndmpd_audit_restore(session->ns_connection, 3633 nlp->nlp_restore_path, 3634 session->ns_data.dd_data_addr.addr_type, 3635 session->ns_tape.td_adapter_name, result); 3636 err = -1; 3637 } else { 3638 NDMP_LOG(LOG_DEBUG, "Restoring to \"%s\" finished. (%d)", 3639 (nlp->nlp_restore_path) ? nlp->nlp_restore_path : "NULL", 3640 err); 3641 ndmpd_audit_restore(session->ns_connection, 3642 nlp->nlp_restore_path, 3643 session->ns_data.dd_data_addr.addr_type, 3644 session->ns_tape.td_adapter_name, result); 3645 3646 restore_out: 3647 /* Plug-in module */ 3648 if (ndmp_pl != NULL && 3649 ndmp_pl->np_post_restore != NULL && 3650 ndmp_pl->np_post_restore(ndmp_pl, &nctx, err) == -1) { 3651 NDMP_LOG(LOG_DEBUG, "Post-restore plug-in: %m"); 3652 err = -1; 3653 } 3654 } 3655 3656 NDMP_FREE(sels); 3657 free_structs_v3(session, jname); 3658 3659 return (err); 3660 } 3661 3662 3663 /* 3664 * ndmp_backup_get_params_v3 3665 * 3666 * Get the backup parameters from the NDMP env variables 3667 * and log them in the system log and as normal messages 3668 * to the DMA. 3669 * 3670 * Parameters: 3671 * session (input) - pointer to the session 3672 * params (input) - pointer to the parameters structure 3673 * 3674 * Returns: 3675 * NDMP_NO_ERR: on success 3676 * != NDMP_NO_ERR: otherwise 3677 */ 3678 ndmp_error 3679 ndmp_backup_get_params_v3(ndmpd_session_t *session, 3680 ndmpd_module_params_t *params) 3681 { 3682 ndmp_lbr_params_t *nlp; 3683 3684 if (!session || !params) 3685 return (NDMP_ILLEGAL_ARGS_ERR); 3686 3687 nlp = ndmp_get_nlp(session); 3688 if (!nlp) { 3689 MOD_LOGV3(params, NDMP_LOG_ERROR, 3690 "Internal error: NULL nlp.\n"); 3691 return (NDMP_ILLEGAL_ARGS_ERR); 3692 } else { 3693 if (!(nlp->nlp_backup_path = get_backup_path_v3(params)) || 3694 !is_valid_backup_dir_v3(params, nlp->nlp_backup_path)) 3695 return (NDMP_ILLEGAL_ARGS_ERR); 3696 } 3697 3698 nlp->nlp_backup_path = get_absolute_path(nlp->nlp_backup_path); 3699 if (!nlp->nlp_backup_path) 3700 return (NDMP_ILLEGAL_ARGS_ERR); 3701 3702 if (fs_is_chkpntvol(nlp->nlp_backup_path) || 3703 fs_is_rdonly(nlp->nlp_backup_path) || 3704 !fs_is_chkpnt_enabled(nlp->nlp_backup_path)) 3705 NLP_SET(nlp, NLPF_CHKPNTED_PATH); 3706 else 3707 NLP_UNSET(nlp, NLPF_CHKPNTED_PATH); 3708 3709 /* Should the st_ctime be ignored when backing up? */ 3710 if (ndmp_ignore_ctime) { 3711 NDMP_LOG(LOG_DEBUG, "ignoring st_ctime"); 3712 NLP_SET(nlp, NLPF_IGNCTIME); 3713 } else { 3714 NLP_UNSET(nlp, NLPF_IGNCTIME); 3715 } 3716 3717 if (ndmp_include_lmtime == TRUE) { 3718 NDMP_LOG(LOG_DEBUG, "including st_lmtime"); 3719 NLP_SET(nlp, NLPF_INCLMTIME); 3720 } else { 3721 NLP_UNSET(nlp, NLPF_INCLMTIME); 3722 } 3723 3724 NDMP_LOG(LOG_DEBUG, "flags %x", nlp->nlp_flags); 3725 3726 get_hist_env_v3(params, nlp); 3727 get_exc_env_v3(params, nlp); 3728 get_inc_env_v3(params, nlp); 3729 get_direct_env_v3(params, nlp); 3730 return (get_backup_level_v3(params, nlp)); 3731 } 3732 3733 3734 /* 3735 * ndmpd_tar_backup_starter_v3 3736 * 3737 * Create the checkpoint for the backup and do the backup, 3738 * then remove the backup checkpoint if we created it. 3739 * Save the backup time information based on the backup 3740 * type and stop the data server. 3741 * 3742 * Parameters: 3743 * params (input) - pointer to the parameters structure 3744 * 3745 * Returns: 3746 * 0: on success 3747 * != 0: otherwise 3748 */ 3749 int 3750 ndmpd_tar_backup_starter_v3(void *arg) 3751 { 3752 ndmpd_module_params_t *params = arg; 3753 int err; 3754 ndmpd_session_t *session; 3755 ndmp_lbr_params_t *nlp; 3756 char jname[TLM_MAX_BACKUP_JOB_NAME]; 3757 ndmp_bkup_size_arg_t sarg; 3758 pthread_t tid; 3759 3760 session = (ndmpd_session_t *)(params->mp_daemon_cookie); 3761 *(params->mp_module_cookie) = nlp = ndmp_get_nlp(session); 3762 ndmp_session_ref(session); 3763 (void) ndmp_new_job_name(jname); 3764 3765 err = 0; 3766 if (!NLP_ISCHKPNTED(nlp) && 3767 ndmp_create_snapshot(nlp->nlp_backup_path, jname) < 0) { 3768 MOD_LOGV3(params, NDMP_LOG_ERROR, 3769 "Creating checkpoint on \"%s\".\n", 3770 nlp->nlp_backup_path); 3771 err = -1; 3772 } 3773 3774 NDMP_LOG(LOG_DEBUG, "err %d, chkpnted %c", 3775 err, NDMP_YORN(NLP_ISCHKPNTED(nlp))); 3776 3777 if (err == 0) { 3778 sarg.bs_session = session; 3779 sarg.bs_jname = jname; 3780 sarg.bs_path = nlp->nlp_backup_path; 3781 3782 /* Get an estimate of the data size */ 3783 if (pthread_create(&tid, NULL, (funct_t)get_backup_size, 3784 (void *)&sarg) == 0) 3785 (void) pthread_detach(tid); 3786 3787 err = ndmp_get_cur_bk_time(nlp, &nlp->nlp_cdate, jname); 3788 if (err != 0) { 3789 NDMP_LOG(LOG_DEBUG, "err %d", err); 3790 } else { 3791 log_bk_params_v3(session, params, nlp); 3792 err = tar_backup_v3(session, params, nlp, jname); 3793 } 3794 } 3795 3796 if (!NLP_ISCHKPNTED(nlp)) 3797 (void) ndmp_remove_snapshot(nlp->nlp_backup_path, jname); 3798 3799 NDMP_LOG(LOG_DEBUG, "err %d, update %c", 3800 err, NDMP_YORN(NLP_SHOULD_UPDATE(nlp))); 3801 3802 if (err == 0) 3803 save_backup_date_v3(params, nlp); 3804 3805 MOD_DONE(params, err); 3806 3807 /* nlp_params is allocated in start_backup_v3() */ 3808 NDMP_FREE(nlp->nlp_params); 3809 NDMP_FREE(nlp->nlp_backup_path); 3810 3811 NS_DEC(nbk); 3812 ndmp_session_unref(session); 3813 return (err); 3814 3815 } 3816 3817 3818 /* 3819 * ndmpd_tar_backup_abort_v3 3820 * 3821 * Abort the backup operation and stop the reader thread. 3822 * 3823 * Parameters: 3824 * module_cookie (input) - pointer to the nlp structure 3825 * 3826 * Returns: 3827 * 0: always 3828 */ 3829 int 3830 ndmpd_tar_backup_abort_v3(void *module_cookie) 3831 { 3832 ndmp_lbr_params_t *nlp; 3833 3834 nlp = (ndmp_lbr_params_t *)module_cookie; 3835 if (nlp && nlp->nlp_session) { 3836 if (nlp->nlp_session->ns_data.dd_data_addr.addr_type == 3837 NDMP_ADDR_TCP && 3838 nlp->nlp_session->ns_data.dd_sock != -1) { 3839 (void) close(nlp->nlp_session->ns_data.dd_sock); 3840 nlp->nlp_session->ns_data.dd_sock = -1; 3841 } 3842 ndmp_stop_reader_thread(nlp->nlp_session); 3843 } 3844 3845 return (0); 3846 } 3847 3848 3849 /* 3850 * ndmp_restore_get_params_v3 3851 * 3852 * Get the parameters specified for recovery such as restore path, type 3853 * of restore (DAR, non-DAR) etc 3854 * 3855 * Parameters: 3856 * session (input) - pointer to the session 3857 * params (input) - pointer to the parameters structure 3858 * 3859 * Returns: 3860 * NDMP_NO_ERR: on success 3861 * != NDMP_NO_ERR: otherwise 3862 */ 3863 ndmp_error 3864 ndmp_restore_get_params_v3(ndmpd_session_t *session, 3865 ndmpd_module_params_t *params) 3866 { 3867 ndmp_error rv; 3868 ndmp_lbr_params_t *nlp; 3869 3870 if (!(nlp = ndmp_get_nlp(session))) { 3871 NDMP_LOG(LOG_DEBUG, "nlp is NULL"); 3872 rv = NDMP_ILLEGAL_ARGS_ERR; 3873 } else if (!(nlp->nlp_backup_path = get_backup_path_v3(params))) 3874 rv = NDMP_ILLEGAL_ARGS_ERR; 3875 else if ((nlp->nlp_nfiles = session->ns_data.dd_nlist_len) == 0) { 3876 NDMP_LOG(LOG_DEBUG, "nfiles: %d", nlp->nlp_nfiles); 3877 rv = NDMP_ILLEGAL_ARGS_ERR; 3878 } else if (get_rs_path_v3(params, nlp) != NDMP_NO_ERR) { 3879 rv = NDMP_ILLEGAL_ARGS_ERR; 3880 } else if ((rv = fix_nlist_v3(session, params, nlp)) != NDMP_NO_ERR) { 3881 NDMP_LOG(LOG_DEBUG, "fix_nlist_v3: %d", rv); 3882 } else { 3883 rv = NDMP_NO_ERR; 3884 get_direct_env_v3(params, nlp); 3885 if (NLP_ISSET(nlp, NLPF_DIRECT)) { 3886 if (NLP_ISSET(nlp, NLPF_RECURSIVE)) { 3887 /* Currently we dont support DAR on directory */ 3888 NDMP_LOG(LOG_DEBUG, 3889 "Can't have RECURSIVE and DIRECT together"); 3890 rv = NDMP_ILLEGAL_ARGS_ERR; 3891 return (rv); 3892 } 3893 3894 /* 3895 * DAR can be done if all the fh_info's are valid. 3896 */ 3897 if (allvalidfh(session, params)) { 3898 ndmp_sort_nlist_v3(session); 3899 } else { 3900 MOD_LOGV3(params, NDMP_LOG_WARNING, 3901 "Cannot do direct access recovery. " 3902 "Some 'fh_info'es are not valid.\n"); 3903 NLP_UNSET(nlp, NLPF_DIRECT); 3904 } 3905 } 3906 3907 log_rs_params_v3(session, params, nlp); 3908 } 3909 3910 return (rv); 3911 } 3912 3913 3914 /* 3915 * ndmpd_tar_restore_starter_v3 3916 * 3917 * The main restore starter function. It will start a DAR or 3918 * non-DAR recovery based on the parameters. (V3 and V4 only) 3919 * 3920 * Parameters: 3921 * params (input) - pointer to the parameters structure 3922 * 3923 * Returns: 3924 * NDMP_NO_ERR: on success 3925 * != NDMP_NO_ERR: otherwise 3926 */ 3927 int 3928 ndmpd_tar_restore_starter_v3(void *arg) 3929 { 3930 ndmpd_module_params_t *params = arg; 3931 int err; 3932 ndmpd_session_t *session; 3933 ndmp_lbr_params_t *nlp; 3934 3935 3936 session = (ndmpd_session_t *)(params->mp_daemon_cookie); 3937 *(params->mp_module_cookie) = nlp = ndmp_get_nlp(session); 3938 ndmp_session_ref(session); 3939 3940 if (NLP_ISSET(nlp, NLPF_DIRECT)) 3941 err = ndmpd_rs_dar_tar_v3(session, params, nlp); 3942 else 3943 err = ndmpd_rs_sar_tar_v3(session, params, nlp); 3944 3945 MOD_DONE(params, err); 3946 3947 NS_DEC(nrs); 3948 /* nlp_params is allocated in start_recover() */ 3949 NDMP_FREE(nlp->nlp_params); 3950 ndmp_session_unref(session); 3951 return (err); 3952 3953 } 3954 3955 /* 3956 * ndmp_tar_restore_abort_v3 3957 * 3958 * Restore abort function (V3 and V4 only) 3959 * 3960 * Parameters: 3961 * module_cookie (input) - pointer to nlp 3962 * 3963 * Returns: 3964 * 0 3965 */ 3966 int 3967 ndmpd_tar_restore_abort_v3(void *module_cookie) 3968 { 3969 ndmp_lbr_params_t *nlp; 3970 3971 nlp = (ndmp_lbr_params_t *)module_cookie; 3972 if (nlp != NULL && nlp->nlp_session != NULL) { 3973 if (nlp->nlp_session->ns_data.dd_mover.addr_type == 3974 NDMP_ADDR_TCP && 3975 nlp->nlp_session->ns_data.dd_sock != -1) { 3976 (void) close(nlp->nlp_session->ns_data.dd_sock); 3977 nlp->nlp_session->ns_data.dd_sock = -1; 3978 } 3979 ndmp_stop_writer_thread(nlp->nlp_session); 3980 } 3981 3982 return (0); 3983 } 3984