2 * Bacula File Daemon Job processing
4 * Kern Sibbald, October MM
10 Copyright (C) 2000-2005 Kern Sibbald
12 This program is free software; you can redistribute it and/or
13 modify it under the terms of the GNU General Public License as
14 published by the Free Software Foundation; either version 2 of
15 the License, or (at your option) any later version.
17 This program is distributed in the hope that it will be useful,
18 but WITHOUT ANY WARRANTY; without even the implied warranty of
19 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
20 General Public License for more details.
22 You should have received a copy of the GNU General Public
23 License along with this program; if not, write to the Free
24 Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
32 extern char my_name[];
33 extern CLIENT *me; /* our client resource */
35 /* Imported functions */
36 extern int status_cmd(JCR *jcr);
37 extern int qstatus_cmd(JCR *jcr);
39 /* Forward referenced functions */
40 static int backup_cmd(JCR *jcr);
41 static int bootstrap_cmd(JCR *jcr);
42 static int cancel_cmd(JCR *jcr);
43 static int setdebug_cmd(JCR *jcr);
44 static int estimate_cmd(JCR *jcr);
45 static int hello_cmd(JCR *jcr);
46 static int job_cmd(JCR *jcr);
47 static int fileset_cmd(JCR *jcr);
48 static int level_cmd(JCR *jcr);
49 static int verify_cmd(JCR *jcr);
50 static int restore_cmd(JCR *jcr);
51 static int storage_cmd(JCR *jcr);
52 static int session_cmd(JCR *jcr);
53 static int response(JCR *jcr, BSOCK *sd, char *resp, const char *cmd);
54 static void filed_free_jcr(JCR *jcr);
55 static int open_sd_read_session(JCR *jcr);
56 static int send_bootstrap_file(JCR *jcr);
57 static int runbefore_cmd(JCR *jcr);
58 static int runafter_cmd(JCR *jcr);
59 static bool run_cmd(JCR *jcr, char *cmd, const char *name);
60 static void set_options(findFOPTS *fo, const char *opts);
63 /* Exported functions */
68 int monitoraccess; /* specify if monitors have access to this function */
72 * The following are the recognized commands from the Director.
74 static struct s_cmds cmds[] = {
75 {"backup", backup_cmd, 0},
76 {"cancel", cancel_cmd, 0},
77 {"setdebug=", setdebug_cmd, 0},
78 {"estimate", estimate_cmd, 0},
79 {"Hello", hello_cmd, 1},
80 {"fileset", fileset_cmd, 0},
81 {"JobId=", job_cmd, 0},
82 {"level = ", level_cmd, 0},
83 {"restore", restore_cmd, 0},
84 {"session", session_cmd, 0},
85 {"status", status_cmd, 1},
86 {".status", qstatus_cmd, 1},
87 {"storage ", storage_cmd, 0},
88 {"verify", verify_cmd, 0},
89 {"bootstrap", bootstrap_cmd, 0},
90 {"RunBeforeJob", runbefore_cmd, 0},
91 {"RunAfterJob", runafter_cmd, 0},
92 {NULL, NULL} /* list terminator */
95 /* Commands received from director that need scanning */
96 static char jobcmd[] = "JobId=%d Job=%127s SDid=%d SDtime=%d Authorization=%100s";
97 static char storaddr[] = "storage address=%s port=%d ssl=%d\n";
98 static char sessioncmd[] = "session %127s %ld %ld %ld %ld %ld %ld\n";
99 static char restorecmd[] = "restore replace=%c prelinks=%d where=%s\n";
100 static char restorecmd1[] = "restore replace=%c prelinks=%d where=\n";
101 static char verifycmd[] = "verify level=%30s\n";
102 static char estimatecmd[] = "estimate listing=%d\n";
103 static char runbefore[] = "RunBeforeJob %s\n";
104 static char runafter[] = "RunAfterJob %s\n";
106 /* Responses sent to Director */
107 static char errmsg[] = "2999 Invalid command\n";
108 static char no_auth[] = "2998 No Authorization\n";
109 static char illegal_cmd[] = "2997 Illegal command for a Director with Monitor directive enabled\n";
110 static char OKinc[] = "2000 OK include\n";
111 static char OKest[] = "2000 OK estimate files=%u bytes=%s\n";
112 static char OKlevel[] = "2000 OK level\n";
113 static char OKbackup[] = "2000 OK backup\n";
114 static char OKbootstrap[] = "2000 OK bootstrap\n";
115 static char OKverify[] = "2000 OK verify\n";
116 static char OKrestore[] = "2000 OK restore\n";
117 static char OKsession[] = "2000 OK session\n";
118 static char OKstore[] = "2000 OK storage\n";
119 static char OKjob[] = "2000 OK Job %s,%s,%s";
120 static char OKsetdebug[] = "2000 OK setdebug=%d\n";
121 static char BADjob[] = "2901 Bad Job\n";
122 static char EndJob[] = "2800 End Job TermCode=%d JobFiles=%u ReadBytes=%s JobBytes=%s Errors=%u\n";
123 static char OKRunBefore[] = "2000 OK RunBefore\n";
124 static char OKRunAfter[] = "2000 OK RunAfter\n";
126 /* Responses received from Storage Daemon */
127 static char OK_end[] = "3000 OK end\n";
128 static char OK_close[] = "3000 OK close Status = %d\n";
129 static char OK_open[] = "3000 OK open ticket = %d\n";
130 static char OK_data[] = "3000 OK data\n";
131 static char OK_append[] = "3000 OK append data\n";
132 static char OKSDbootstrap[] = "3000 OK bootstrap\n";
135 /* Commands sent to Storage Daemon */
136 static char append_open[] = "append open session\n";
137 static char append_data[] = "append data %d\n";
138 static char append_end[] = "append end session %d\n";
139 static char append_close[] = "append close session %d\n";
140 static char read_open[] = "read open session = %s %ld %ld %ld %ld %ld %ld\n";
141 static char read_data[] = "read data %d\n";
142 static char read_close[] = "read close session %d\n";
145 * Accept requests from a Director
147 * NOTE! We are running as a separate thread
149 * Send output one line
150 * at a time followed by a zero length transmission.
152 * Return when the connection is terminated or there
155 * Basic task here is:
156 * Authenticate Director (during Hello command).
157 * Accept commands one at a time from the Director
161 void *handle_client_request(void *dirp)
166 BSOCK *dir = (BSOCK *)dirp;
168 jcr = new_jcr(sizeof(JCR), filed_free_jcr); /* create JCR */
169 jcr->dir_bsock = dir;
170 jcr->ff = init_find_files();
171 jcr->start_time = time(NULL);
172 jcr->last_fname = get_pool_memory(PM_FNAME);
173 jcr->last_fname[0] = 0;
174 jcr->client_name = get_memory(strlen(my_name) + 1);
175 pm_strcpy(jcr->client_name, my_name);
177 enable_backup_privileges(NULL, 1 /* ignore_errors */);
179 /**********FIXME******* add command handler error code */
181 for (quit=false; !quit;) {
184 if (bnet_recv(dir) < 0) {
185 break; /* connection terminated */
187 dir->msg[dir->msglen] = 0;
188 Dmsg1(100, "<dird: %s", dir->msg);
190 for (i=0; cmds[i].cmd; i++) {
191 if (strncmp(cmds[i].cmd, dir->msg, strlen(cmds[i].cmd)) == 0) {
192 found = true; /* indicate command found */
193 if (!jcr->authenticated && cmds[i].func != hello_cmd) {
194 bnet_fsend(dir, no_auth);
195 bnet_sig(dir, BNET_EOD);
198 if ((jcr->authenticated) && (!cmds[i].monitoraccess) && (jcr->director->monitor)) {
199 Dmsg1(100, "Command %s illegal.\n", cmds[i].cmd);
200 bnet_fsend(dir, illegal_cmd);
201 bnet_sig(dir, BNET_EOD);
204 Dmsg1(100, "Executing %s command.\n", cmds[i].cmd);
205 if (!cmds[i].func(jcr)) { /* do command */
206 quit = true; /* error or fully terminated, get out */
207 Dmsg1(20, "Quit command loop. Canceled=%d\n", job_canceled(jcr));
212 if (!found) { /* command not found */
213 bnet_fsend(dir, errmsg);
219 /* Inform Storage daemon that we are done */
220 if (jcr->store_bsock) {
221 bnet_sig(jcr->store_bsock, BNET_TERMINATE);
224 if (jcr->RunAfterJob && !job_canceled(jcr)) {
225 run_cmd(jcr, jcr->RunAfterJob, "ClientRunAfterJob");
227 generate_daemon_event(jcr, "JobEnd");
229 dequeue_messages(jcr); /* send any queued messages */
231 /* Inform Director that we are done */
232 bnet_sig(dir, BNET_TERMINATE);
234 /* Clean up fileset */
235 FF_PKT *ff = (FF_PKT *)jcr->ff;
236 findFILESET *fileset = ff->fileset;
239 /* Delete FileSet Include lists */
240 for (i=0; i<fileset->include_list.size(); i++) {
241 findINCEXE *incexe = (findINCEXE *)fileset->include_list.get(i);
242 for (j=0; j<incexe->opts_list.size(); j++) {
243 findFOPTS *fo = (findFOPTS *)incexe->opts_list.get(j);
244 for (k=0; k<fo->regex.size(); k++) {
245 regfree((regex_t *)fo->regex.get(k));
248 fo->regexdir.destroy();
249 fo->regexfile.destroy();
251 fo->wilddir.destroy();
252 fo->wildfile.destroy();
254 fo->fstype.destroy();
262 incexe->opts_list.destroy();
263 incexe->name_list.destroy();
265 fileset->include_list.destroy();
267 /* Delete FileSet Exclude lists */
268 for (i=0; i<fileset->exclude_list.size(); i++) {
269 findINCEXE *incexe = (findINCEXE *)fileset->exclude_list.get(i);
270 for (j=0; j<incexe->opts_list.size(); j++) {
271 findFOPTS *fo = (findFOPTS *)incexe->opts_list.get(j);
273 fo->regexdir.destroy();
274 fo->regexfile.destroy();
276 fo->wilddir.destroy();
277 fo->wildfile.destroy();
279 fo->fstype.destroy();
281 incexe->opts_list.destroy();
282 incexe->name_list.destroy();
284 fileset->exclude_list.destroy();
288 Dmsg0(100, "Calling term_find_files\n");
289 term_find_files((FF_PKT *)jcr->ff);
291 Dmsg0(100, "Done with term_find_files\n");
292 free_jcr(jcr); /* destroy JCR record */
293 Dmsg0(100, "Done with free_jcr\n");
298 * Hello from Director he must identify himself and provide his
301 static int hello_cmd(JCR *jcr)
303 Dmsg0(120, "Calling Authenticate\n");
304 if (!authenticate_director(jcr)) {
307 Dmsg0(120, "OK Authenticate\n");
308 jcr->authenticated = true;
315 static int cancel_cmd(JCR *jcr)
317 BSOCK *dir = jcr->dir_bsock;
318 char Job[MAX_NAME_LENGTH];
321 if (sscanf(dir->msg, "cancel Job=%127s", Job) == 1) {
322 if (!(cjcr=get_jcr_by_full_name(Job))) {
323 bnet_fsend(dir, "2901 Job %s not found.\n", Job);
325 if (cjcr->store_bsock) {
327 cjcr->store_bsock->timed_out = 1;
328 cjcr->store_bsock->terminated = 1;
330 * #if !defined(HAVE_CYGWIN) && !defined(HAVE_WIN32)
332 #if !defined(HAVE_CYGWIN)
333 pthread_kill(cjcr->my_thread_id, TIMEOUT_SIGNAL);
337 set_jcr_job_status(cjcr, JS_Canceled);
339 bnet_fsend(dir, _("2001 Job %s marked to be canceled.\n"), Job);
342 bnet_fsend(dir, _("2902 Error scanning cancel command.\n"));
344 bnet_sig(dir, BNET_EOD);
350 * Set debug level as requested by the Director
353 static int setdebug_cmd(JCR *jcr)
355 BSOCK *dir = jcr->dir_bsock;
356 int level, trace_flag;
358 Dmsg1(110, "setdebug_cmd: %s", dir->msg);
359 if (sscanf(dir->msg, "setdebug=%d trace=%d", &level, &trace_flag) != 2 || level < 0) {
360 pm_strcpy(jcr->errmsg, dir->msg);
361 bnet_fsend(dir, "2991 Bad setdebug command: %s\n", jcr->errmsg);
365 set_trace(trace_flag);
366 return bnet_fsend(dir, OKsetdebug, level);
370 static int estimate_cmd(JCR *jcr)
372 BSOCK *dir = jcr->dir_bsock;
375 if (sscanf(dir->msg, estimatecmd, &jcr->listing) != 1) {
376 pm_strcpy(jcr->errmsg, dir->msg);
377 Jmsg(jcr, M_FATAL, 0, _("Bad estimate command: %s"), jcr->errmsg);
378 bnet_fsend(dir, "2992 Bad estimate command.\n");
382 bnet_fsend(dir, OKest, jcr->num_files_examined,
383 edit_uint64_with_commas(jcr->JobBytes, ed2));
384 bnet_sig(dir, BNET_EOD);
389 * Get JobId and Storage Daemon Authorization key from Director
391 static int job_cmd(JCR *jcr)
393 BSOCK *dir = jcr->dir_bsock;
394 POOLMEM *sd_auth_key;
396 sd_auth_key = get_memory(dir->msglen);
397 if (sscanf(dir->msg, jobcmd, &jcr->JobId, jcr->Job,
398 &jcr->VolSessionId, &jcr->VolSessionTime,
400 pm_strcpy(jcr->errmsg, dir->msg);
401 Jmsg(jcr, M_FATAL, 0, _("Bad Job Command: %s"), jcr->errmsg);
402 bnet_fsend(dir, BADjob);
403 free_pool_memory(sd_auth_key);
406 jcr->sd_auth_key = bstrdup(sd_auth_key);
407 free_pool_memory(sd_auth_key);
408 Dmsg2(120, "JobId=%d Auth=%s\n", jcr->JobId, jcr->sd_auth_key);
409 return bnet_fsend(dir, OKjob, HOST_OS, DISTNAME, DISTVER);
412 static int runbefore_cmd(JCR *jcr)
415 BSOCK *dir = jcr->dir_bsock;
416 POOLMEM *cmd = get_memory(dir->msglen+1);
418 Dmsg1(100, "runbefore_cmd: %s", dir->msg);
419 if (sscanf(dir->msg, runbefore, cmd) != 1) {
420 pm_strcpy(jcr->errmsg, dir->msg);
421 Jmsg1(jcr, M_FATAL, 0, _("Bad RunBeforeJob command: %s\n"), jcr->errmsg);
422 bnet_fsend(dir, "2905 Bad RunBeforeJob command.\n");
428 /* Run the command now */
429 ok = run_cmd(jcr, cmd, "ClientRunBeforeJob");
432 bnet_fsend(dir, OKRunBefore);
435 bnet_fsend(dir, "2905 Bad RunBeforeJob command.\n");
440 static int runafter_cmd(JCR *jcr)
442 BSOCK *dir = jcr->dir_bsock;
443 POOLMEM *msg = get_memory(dir->msglen+1);
445 Dmsg1(100, "runafter_cmd: %s", dir->msg);
446 if (sscanf(dir->msg, runafter, msg) != 1) {
447 pm_strcpy(jcr->errmsg, dir->msg);
448 Jmsg1(jcr, M_FATAL, 0, _("Bad RunAfter command: %s\n"), jcr->errmsg);
449 bnet_fsend(dir, "2905 Bad RunAfterJob command.\n");
454 if (jcr->RunAfterJob) {
455 free_pool_memory(jcr->RunAfterJob);
457 jcr->RunAfterJob = get_pool_memory(PM_FNAME);
458 pm_strcpy(jcr->RunAfterJob, msg);
459 free_pool_memory(msg);
460 return bnet_fsend(dir, OKRunAfter);
463 static bool run_cmd(JCR *jcr, char *cmd, const char *name)
465 POOLMEM *ecmd = get_pool_memory(PM_FNAME);
468 char line[MAXSTRING];
470 ecmd = edit_job_codes(jcr, ecmd, cmd, "");
471 bpipe = open_bpipe(ecmd, 0, "r");
472 free_pool_memory(ecmd);
475 Jmsg(jcr, M_FATAL, 0, _("%s could not execute. ERR=%s\n"), name,
479 while (fgets(line, sizeof(line), bpipe->rfd)) {
480 int len = strlen(line);
481 if (len > 0 && line[len-1] == '\n') {
484 Jmsg(jcr, M_INFO, 0, _("%s: %s\n"), name, line);
486 status = close_bpipe(bpipe);
489 Jmsg(jcr, M_FATAL, 0, _("%s returned non-zero status=%d. ERR=%s\n"), name,
490 status, be.strerror(status));
496 static bool init_fileset(JCR *jcr)
499 findFILESET *fileset;
504 ff = (FF_PKT *)jcr->ff;
508 fileset = (findFILESET *)malloc(sizeof(findFILESET));
509 memset(fileset, 0, sizeof(findFILESET));
510 ff->fileset = fileset;
511 fileset->state = state_none;
512 fileset->include_list.init(1, true);
513 fileset->exclude_list.init(1, true);
517 static findFOPTS *start_options(FF_PKT *ff)
519 int state = ff->fileset->state;
520 findINCEXE *incexe = ff->fileset->incexe;
522 if (state != state_options) {
523 ff->fileset->state = state_options;
524 findFOPTS *fo = (findFOPTS *)malloc(sizeof(findFOPTS));
525 memset(fo, 0, sizeof(findFOPTS));
526 fo->regex.init(1, true);
527 fo->regexdir.init(1, true);
528 fo->regexfile.init(1, true);
529 fo->wild.init(1, true);
530 fo->wilddir.init(1, true);
531 fo->wildfile.init(1, true);
532 fo->base.init(1, true);
533 fo->fstype.init(1, true);
534 incexe->current_opts = fo;
535 incexe->opts_list.append(fo);
537 return incexe->current_opts;
542 * Add fname to include/exclude fileset list. First check for
543 * | and < and if necessary perform command.
545 static void add_file_to_fileset(JCR *jcr, const char *fname, findFILESET *fileset)
559 p++; /* skip over | */
560 fn = get_pool_memory(PM_FNAME);
561 fn = edit_job_codes(jcr, fn, p, "");
562 bpipe = open_bpipe(fn, 0, "r");
563 free_pool_memory(fn);
565 Jmsg(jcr, M_FATAL, 0, _("Cannot run program: %s. ERR=%s\n"),
569 while (fgets(buf, sizeof(buf), bpipe->rfd)) {
570 strip_trailing_junk(buf);
571 fileset->incexe->name_list.append(bstrdup(buf));
573 if ((stat=close_bpipe(bpipe)) != 0) {
574 Jmsg(jcr, M_FATAL, 0, _("Error running program: %s. RtnStat=%d ERR=%s\n"),
575 p, stat, strerror(errno));
580 Dmsg0(100, "Doing < include on client.\n");
581 p++; /* skip over < */
582 if ((ffd = fopen(p, "r")) == NULL) {
584 Jmsg(jcr, M_FATAL, 0, _("Cannot open FileSet input file: %s. ERR=%s\n"),
588 while (fgets(buf, sizeof(buf), ffd)) {
589 strip_trailing_junk(buf);
590 Dmsg1(100, "%s\n", buf);
591 fileset->incexe->name_list.append(bstrdup(buf));
596 fileset->incexe->name_list.append(bstrdup(fname));
602 static void add_fileset(JCR *jcr, const char *item)
604 FF_PKT *ff = (FF_PKT *)jcr->ff;
605 findFILESET *fileset = ff->fileset;
606 int state = fileset->state;
607 findFOPTS *current_opts;
609 /* Get code, optional subcode, and position item past the dividing space */
610 Dmsg1(100, "%s\n", item);
615 int subcode = ' '; /* A space is always a valid subcode */
616 if (item[0] != '\0' && item[0] != ' ') {
624 /* Skip all lines we receive after an error */
625 if (state == state_error) {
630 * The switch tests the code for validity.
631 * The subcode is always good if it is a space, otherwise we must confirm.
632 * We set state to state_error first assuming the subcode is invalid,
633 * requiring state to be set in cases below that handle subcodes.
635 if (subcode != ' ') {
641 fileset->incexe = (findINCEXE *)malloc(sizeof(findINCEXE));
642 memset(fileset->incexe, 0, sizeof(findINCEXE));
643 fileset->incexe->opts_list.init(1, true);
644 fileset->incexe->name_list.init(1, true);
645 fileset->include_list.append(fileset->incexe);
649 fileset->incexe = (findINCEXE *)malloc(sizeof(findINCEXE));
650 memset(fileset->incexe, 0, sizeof(findINCEXE));
651 fileset->incexe->opts_list.init(1, true);
652 fileset->incexe->name_list.init(1, true);
653 fileset->exclude_list.append(fileset->incexe);
659 /* File item to either include/include list */
660 state = state_include;
661 add_file_to_fileset(jcr, item, fileset);
664 current_opts = start_options(ff);
668 preg = (regex_t *)malloc(sizeof(regex_t));
669 if (current_opts->flags & FO_IGNORECASE) {
670 rc = regcomp(preg, item, REG_EXTENDED|REG_ICASE);
672 rc = regcomp(preg, item, REG_EXTENDED);
675 regerror(rc, preg, prbuf, sizeof(prbuf));
678 Jmsg(jcr, M_FATAL, 0, "REGEX %s compile error. ERR=%s\n", item, prbuf);
682 state = state_options;
683 if (subcode == ' ') {
684 current_opts->regex.append(preg);
685 } else if (subcode == 'D') {
686 current_opts->regexdir.append(preg);
687 } else if (subcode == 'F') {
688 current_opts->regexfile.append(preg);
694 current_opts = start_options(ff);
695 current_opts->base.append(bstrdup(item));
696 state = state_options;
699 current_opts = start_options(ff);
700 current_opts->fstype.append(bstrdup(item));
701 state = state_options;
704 current_opts = start_options(ff);
705 state = state_options;
706 if (subcode == ' ') {
707 current_opts->wild.append(bstrdup(item));
708 } else if (subcode == 'D') {
709 current_opts->wilddir.append(bstrdup(item));
710 } else if (subcode == 'F') {
711 current_opts->wildfile.append(bstrdup(item));
717 current_opts = start_options(ff);
718 set_options(current_opts, item);
719 state = state_options;
722 current_opts = start_options(ff);
723 current_opts->reader = bstrdup(item);
724 state = state_options;
727 current_opts = start_options(ff);
728 current_opts->writer = bstrdup(item);
729 state = state_options;
732 Jmsg(jcr, M_FATAL, 0, "Invalid FileSet command: %s\n", item);
736 ff->fileset->state = state;
739 static bool term_fileset(JCR *jcr)
741 FF_PKT *ff = (FF_PKT *)jcr->ff;
742 findFILESET *fileset = ff->fileset;
745 for (i=0; i<fileset->include_list.size(); i++) {
746 findINCEXE *incexe = (findINCEXE *)fileset->include_list.get(i);
748 for (j=0; j<incexe->opts_list.size(); j++) {
749 findFOPTS *fo = (findFOPTS *)incexe->opts_list.get(j);
750 for (k=0; k<fo->regex.size(); k++) {
751 Dmsg1(400, "R %s\n", (char *)fo->regex.get(k));
753 for (k=0; k<fo->regexdir.size(); k++) {
754 Dmsg1(400, "RD %s\n", (char *)fo->regexdir.get(k));
756 for (k=0; k<fo->regexfile.size(); k++) {
757 Dmsg1(400, "RF %s\n", (char *)fo->regexfile.get(k));
759 for (k=0; k<fo->wild.size(); k++) {
760 Dmsg1(400, "W %s\n", (char *)fo->wild.get(k));
762 for (k=0; k<fo->wilddir.size(); k++) {
763 Dmsg1(400, "WD %s\n", (char *)fo->wilddir.get(k));
765 for (k=0; k<fo->wildfile.size(); k++) {
766 Dmsg1(400, "WF %s\n", (char *)fo->wildfile.get(k));
768 for (k=0; k<fo->base.size(); k++) {
769 Dmsg1(400, "B %s\n", (char *)fo->base.get(k));
771 for (k=0; k<fo->fstype.size(); k++) {
772 Dmsg1(400, "X %s\n", (char *)fo->fstype.get(k));
775 Dmsg1(400, "D %s\n", fo->reader);
778 Dmsg1(400, "T %s\n", fo->writer);
781 for (j=0; j<incexe->name_list.size(); j++) {
782 Dmsg1(400, "F %s\n", (char *)incexe->name_list.get(j));
785 for (i=0; i<fileset->exclude_list.size(); i++) {
786 findINCEXE *incexe = (findINCEXE *)fileset->exclude_list.get(i);
788 for (j=0; j<incexe->opts_list.size(); j++) {
789 findFOPTS *fo = (findFOPTS *)incexe->opts_list.get(j);
790 for (k=0; k<fo->regex.size(); k++) {
791 Dmsg1(400, "R %s\n", (char *)fo->regex.get(k));
793 for (k=0; k<fo->regexdir.size(); k++) {
794 Dmsg1(400, "RD %s\n", (char *)fo->regexdir.get(k));
796 for (k=0; k<fo->regexfile.size(); k++) {
797 Dmsg1(400, "RF %s\n", (char *)fo->regexfile.get(k));
799 for (k=0; k<fo->wild.size(); k++) {
800 Dmsg1(400, "W %s\n", (char *)fo->wild.get(k));
802 for (k=0; k<fo->wilddir.size(); k++) {
803 Dmsg1(400, "WD %s\n", (char *)fo->wilddir.get(k));
805 for (k=0; k<fo->wildfile.size(); k++) {
806 Dmsg1(400, "WF %s\n", (char *)fo->wildfile.get(k));
808 for (k=0; k<fo->base.size(); k++) {
809 Dmsg1(400, "B %s\n", (char *)fo->base.get(k));
811 for (k=0; k<fo->fstype.size(); k++) {
812 Dmsg1(400, "X %s\n", (char *)fo->fstype.get(k));
815 for (j=0; j<incexe->name_list.size(); j++) {
816 Dmsg1(400, "F %s\n", (char *)incexe->name_list.get(j));
819 return ff->fileset->state != state_error;
824 * As an optimization, we should do this during
825 * "compile" time in filed/job.c, and keep only a bit mask
826 * and the Verify options.
828 static void set_options(findFOPTS *fo, const char *opts)
833 for (p=opts; *p; p++) {
835 case 'a': /* alway replace */
836 case '0': /* no option */
839 fo->flags |= FO_EXCLUDE;
842 fo->flags |= FO_MULTIFS;
844 case 'h': /* no recursion */
845 fo->flags |= FO_NO_RECURSION;
847 case 'H': /* no hard link handling */
848 fo->flags |= FO_NO_HARDLINK;
851 fo->flags |= FO_IGNORECASE;
857 fo->flags |= FO_NOREPLACE;
859 case 'p': /* use portable data format */
860 fo->flags |= FO_PORTABLE;
862 case 'R': /* Resource forks and Finder Info */
863 fo->flags |= FO_HFSPLUS;
864 case 'r': /* read fifo */
865 fo->flags |= FO_READFIFO;
868 fo->flags |= FO_SHA1;
871 fo->flags |= FO_SPARSE;
874 fo->flags |= FO_MTIMEONLY;
877 fo->flags |= FO_KEEPATIME;
882 case 'V': /* verify options */
883 /* Copy Verify Options */
884 for (j=0; *p && *p != ':'; p++) {
885 fo->VerifyOpts[j] = *p;
886 if (j < (int)sizeof(fo->VerifyOpts) - 1) {
890 fo->VerifyOpts[j] = 0;
893 fo->flags |= FO_IF_NEWER;
895 case 'Z': /* gzip compression */
896 fo->flags |= FO_GZIP;
897 fo->GZIP_level = *++p - '0';
898 Dmsg1(200, "Compression level=%d\n", fo->GZIP_level);
901 Emsg1(M_ERROR, 0, "Unknown include/exclude option: %c\n", *p);
909 * Director is passing his Fileset
911 static int fileset_cmd(JCR *jcr)
913 BSOCK *dir = jcr->dir_bsock;
915 if (!init_fileset(jcr)) {
918 while (bnet_recv(dir) >= 0) {
919 strip_trailing_junk(dir->msg);
920 Dmsg1(400, "Fileset: %s\n", dir->msg);
921 add_fileset(jcr, dir->msg);
923 if (!term_fileset(jcr)) {
926 return bnet_fsend(dir, OKinc);
931 * The Director sends us the bootstrap file, which
932 * we will in turn pass to the SD.
934 static int bootstrap_cmd(JCR *jcr)
936 BSOCK *dir = jcr->dir_bsock;
937 POOLMEM *fname = get_pool_memory(PM_FNAME);
940 if (jcr->RestoreBootstrap) {
941 unlink(jcr->RestoreBootstrap);
942 free_pool_memory(jcr->RestoreBootstrap);
944 Mmsg(fname, "%s/%s.%s.bootstrap", me->working_directory, me->hdr.name,
946 Dmsg1(400, "bootstrap=%s\n", fname);
947 jcr->RestoreBootstrap = fname;
948 bs = fopen(fname, "a+"); /* create file */
952 * Suck up what he is sending to us so that he will then
953 * read our error message.
955 while (bnet_recv(dir) >= 0)
958 Jmsg(jcr, M_FATAL, 0, _("Could not create bootstrap file %s: ERR=%s\n"),
959 jcr->RestoreBootstrap, be.strerror());
960 free_pool_memory(jcr->RestoreBootstrap);
961 jcr->RestoreBootstrap = NULL;
962 set_jcr_job_status(jcr, JS_ErrorTerminated);
966 while (bnet_recv(dir) >= 0) {
967 Dmsg1(200, "filed<dird: bootstrap file %s\n", dir->msg);
972 return bnet_fsend(dir, OKbootstrap);
977 * Get backup level from Director
980 static int level_cmd(JCR *jcr)
982 BSOCK *dir = jcr->dir_bsock;
983 POOLMEM *level, *buf = NULL;
986 level = get_memory(dir->msglen+1);
987 Dmsg1(110, "level_cmd: %s", dir->msg);
988 if (sscanf(dir->msg, "level = %s ", level) != 1) {
991 /* Base backup requested? */
992 if (strcmp(level, "base") == 0) {
993 jcr->JobLevel = L_BASE;
994 /* Full backup requested? */
995 } else if (strcmp(level, "full") == 0) {
996 jcr->JobLevel = L_FULL;
997 } else if (strcmp(level, "differential") == 0) {
998 jcr->JobLevel = L_DIFFERENTIAL;
1001 } else if (strcmp(level, "incremental") == 0) {
1002 jcr->JobLevel = L_INCREMENTAL;
1006 * We get his UTC since time, then sync the clocks and correct it
1007 * to agree with our clock.
1009 } else if (strcmp(level, "since_utime") == 0) {
1010 buf = get_memory(dir->msglen+1);
1011 utime_t since_time, adj;
1012 btime_t his_time, bt_start, rt=0, bt_adj=0;
1013 if (jcr->JobLevel == L_NONE) {
1014 jcr->JobLevel = L_SINCE; /* if no other job level set, do it now */
1016 if (sscanf(dir->msg, "level = since_utime %s mtime_only=%d",
1017 buf, &mtime_only) != 2) {
1020 since_time = str_to_uint64(buf); /* this is the since time */
1021 char ed1[50], ed2[50];
1023 * Sync clocks by polling him for the time. We take
1024 * 10 samples of his time throwing out the first two.
1026 for (int i=0; i<10; i++) {
1027 bt_start = get_current_btime();
1028 bnet_sig(dir, BNET_BTIME); /* poll for time */
1029 if (bnet_recv(dir) <= 0) { /* get response */
1032 if (sscanf(dir->msg, "btime %s", buf) != 1) {
1035 if (i < 2) { /* toss first two results */
1038 his_time = str_to_uint64(buf);
1039 rt = get_current_btime() - bt_start; /* compute round trip time */
1040 bt_adj -= his_time - bt_start - rt/2;
1041 Dmsg2(200, "rt=%s adj=%s\n", edit_uint64(rt, ed1), edit_uint64(bt_adj, ed2));
1044 bt_adj = bt_adj / 8; /* compute average time */
1045 Dmsg2(100, "rt=%s adj=%s\n", edit_uint64(rt, ed1), edit_uint64(bt_adj, ed2));
1046 adj = btime_to_utime(bt_adj);
1047 since_time += adj; /* adjust for clock difference */
1049 Jmsg(jcr, M_INFO, 0, _("DIR and FD clocks differ by %d seconds, FD automatically adjusting.\n"), adj);
1051 bnet_sig(dir, BNET_EOD);
1053 Dmsg2(100, "adj = %d since_time=%d\n", (int)adj, (int)since_time);
1054 jcr->incremental = 1; /* set incremental or decremental backup */
1055 jcr->mtime = (time_t)since_time; /* set since time */
1057 Jmsg1(jcr, M_FATAL, 0, "Unknown backup level: %s\n", level);
1065 return bnet_fsend(dir, OKlevel);
1068 pm_strcpy(jcr->errmsg, dir->msg);
1069 Jmsg1(jcr, M_FATAL, 0, _("Bad level command: %s\n"), jcr->errmsg);
1078 * Get session parameters from Director -- this is for a Restore command
1080 static int session_cmd(JCR *jcr)
1082 BSOCK *dir = jcr->dir_bsock;
1084 Dmsg1(100, "SessionCmd: %s", dir->msg);
1085 if (sscanf(dir->msg, sessioncmd, jcr->VolumeName,
1086 &jcr->VolSessionId, &jcr->VolSessionTime,
1087 &jcr->StartFile, &jcr->EndFile,
1088 &jcr->StartBlock, &jcr->EndBlock) != 7) {
1089 pm_strcpy(jcr->errmsg, dir->msg);
1090 Jmsg(jcr, M_FATAL, 0, "Bad session command: %s", jcr->errmsg);
1094 return bnet_fsend(dir, OKsession);
1098 * Get address of storage daemon from Director
1101 static int storage_cmd(JCR *jcr)
1103 int stored_port; /* storage daemon port */
1104 int enable_ssl; /* enable ssl to sd */
1105 BSOCK *dir = jcr->dir_bsock;
1106 BSOCK *sd; /* storage daemon bsock */
1108 Dmsg1(100, "StorageCmd: %s", dir->msg);
1109 if (sscanf(dir->msg, storaddr, &jcr->stored_addr, &stored_port, &enable_ssl) != 3) {
1110 pm_strcpy(jcr->errmsg, dir->msg);
1111 Jmsg(jcr, M_FATAL, 0, _("Bad storage command: %s"), jcr->errmsg);
1114 Dmsg3(110, "Open storage: %s:%d ssl=%d\n", jcr->stored_addr, stored_port, enable_ssl);
1115 /* Open command communications with Storage daemon */
1116 /* Try to connect for 1 hour at 10 second intervals */
1117 sd = bnet_connect(jcr, 10, (int)me->SDConnectTimeout, _("Storage daemon"),
1118 jcr->stored_addr, NULL, stored_port, 1);
1120 Jmsg(jcr, M_FATAL, 0, _("Failed to connect to Storage daemon: %s:%d\n"),
1121 jcr->stored_addr, stored_port);
1122 Dmsg2(100, "Failed to connect to Storage daemon: %s:%d\n",
1123 jcr->stored_addr, stored_port);
1126 Dmsg0(110, "Connection OK to SD.\n");
1128 jcr->store_bsock = sd;
1130 bnet_fsend(sd, "Hello Start Job %s\n", jcr->Job);
1131 if (!authenticate_storagedaemon(jcr)) {
1132 Jmsg(jcr, M_FATAL, 0, _("Failed to authenticate Storage daemon.\n"));
1135 Dmsg0(110, "Authenticated with SD.\n");
1137 /* Send OK to Director */
1138 return bnet_fsend(dir, OKstore);
1143 * Do a backup. For now, we handle only Full and Incremental.
1145 static int backup_cmd(JCR *jcr)
1147 BSOCK *dir = jcr->dir_bsock;
1148 BSOCK *sd = jcr->store_bsock;
1151 char ed1[50], ed2[50];
1153 set_jcr_job_status(jcr, JS_Blocked);
1154 jcr->JobType = JT_BACKUP;
1155 Dmsg1(100, "begin backup ff=%p\n", (FF_PKT *)jcr->ff);
1158 Jmsg(jcr, M_FATAL, 0, _("Cannot contact Storage daemon\n"));
1162 bnet_fsend(dir, OKbackup);
1163 Dmsg1(110, "bfiled>dird: %s", dir->msg);
1166 * Send Append Open Session to Storage daemon
1168 bnet_fsend(sd, append_open);
1169 Dmsg1(110, ">stored: %s", sd->msg);
1171 * Expect to receive back the Ticket number
1173 if (bget_msg(sd) >= 0) {
1174 Dmsg1(110, "<stored: %s", sd->msg);
1175 if (sscanf(sd->msg, OK_open, &jcr->Ticket) != 1) {
1176 Jmsg(jcr, M_FATAL, 0, _("Bad response to append open: %s\n"), sd->msg);
1179 Dmsg1(110, "Got Ticket=%d\n", jcr->Ticket);
1181 Jmsg(jcr, M_FATAL, 0, _("Bad response from stored to open command\n"));
1186 * Send Append data command to Storage daemon
1188 bnet_fsend(sd, append_data, jcr->Ticket);
1189 Dmsg1(110, ">stored: %s", sd->msg);
1192 * Expect to get OK data
1194 Dmsg1(110, "<stored: %s", sd->msg);
1195 if (!response(jcr, sd, OK_data, "Append Data")) {
1199 generate_daemon_event(jcr, "JobStart");
1202 * Send Files to Storage daemon
1204 Dmsg1(110, "begin blast ff=%p\n", (FF_PKT *)jcr->ff);
1205 if (!blast_data_to_storage_daemon(jcr, NULL)) {
1206 set_jcr_job_status(jcr, JS_ErrorTerminated);
1207 bnet_suppress_error_messages(sd, 1);
1208 bget_msg(sd); /* Read final response from append_data */
1209 Dmsg0(110, "Error in blast_data.\n");
1211 set_jcr_job_status(jcr, JS_Terminated);
1212 if (jcr->JobStatus != JS_Terminated) {
1213 bnet_suppress_error_messages(sd, 1);
1214 goto cleanup; /* bail out now */
1217 * Expect to get response to append_data from Storage daemon
1219 if (!response(jcr, sd, OK_append, "Append Data")) {
1220 set_jcr_job_status(jcr, JS_ErrorTerminated);
1225 * Send Append End Data to Storage daemon
1227 bnet_fsend(sd, append_end, jcr->Ticket);
1229 if (!response(jcr, sd, OK_end, "Append End")) {
1230 set_jcr_job_status(jcr, JS_ErrorTerminated);
1235 * Send Append Close to Storage daemon
1237 bnet_fsend(sd, append_close, jcr->Ticket);
1238 while (bget_msg(sd) >= 0) { /* stop on signal or error */
1239 if (sscanf(sd->msg, OK_close, &SDJobStatus) == 1) {
1241 Dmsg2(200, "SDJobStatus = %d %c\n", SDJobStatus, (char)SDJobStatus);
1245 Jmsg(jcr, M_FATAL, 0, _("Append Close with SD failed.\n"));
1248 if (SDJobStatus != JS_Terminated) {
1249 Jmsg(jcr, M_FATAL, 0, _("Bad status %d returned from Storage Daemon.\n"),
1255 bnet_fsend(dir, EndJob, jcr->JobStatus, jcr->JobFiles,
1256 edit_uint64(jcr->ReadBytes, ed1),
1257 edit_uint64(jcr->JobBytes, ed2), jcr->Errors);
1258 Dmsg1(110, "End FD msg: %s\n", dir->msg);
1260 return 0; /* return and stop command loop */
1264 * Do a Verify for Director
1267 static int verify_cmd(JCR *jcr)
1269 BSOCK *dir = jcr->dir_bsock;
1270 BSOCK *sd = jcr->store_bsock;
1271 char level[100], ed1[50], ed2[50];
1273 jcr->JobType = JT_VERIFY;
1274 if (sscanf(dir->msg, verifycmd, level) != 1) {
1275 bnet_fsend(dir, "2994 Bad verify command: %s\n", dir->msg);
1279 if (strcasecmp(level, "init") == 0) {
1280 jcr->JobLevel = L_VERIFY_INIT;
1281 } else if (strcasecmp(level, "catalog") == 0){
1282 jcr->JobLevel = L_VERIFY_CATALOG;
1283 } else if (strcasecmp(level, "volume") == 0){
1284 jcr->JobLevel = L_VERIFY_VOLUME_TO_CATALOG;
1285 } else if (strcasecmp(level, "data") == 0){
1286 jcr->JobLevel = L_VERIFY_DATA;
1287 } else if (strcasecmp(level, "disk_to_catalog") == 0) {
1288 jcr->JobLevel = L_VERIFY_DISK_TO_CATALOG;
1290 bnet_fsend(dir, "2994 Bad verify level: %s\n", dir->msg);
1294 bnet_fsend(dir, OKverify);
1296 generate_daemon_event(jcr, "JobStart");
1298 Dmsg1(110, "bfiled>dird: %s", dir->msg);
1300 switch (jcr->JobLevel) {
1302 case L_VERIFY_CATALOG:
1305 case L_VERIFY_VOLUME_TO_CATALOG:
1306 if (!open_sd_read_session(jcr)) {
1309 start_dir_heartbeat(jcr);
1310 do_verify_volume(jcr);
1311 stop_dir_heartbeat(jcr);
1313 * Send Close session command to Storage daemon
1315 bnet_fsend(sd, read_close, jcr->Ticket);
1316 Dmsg1(130, "bfiled>stored: %s", sd->msg);
1318 /* ****FIXME**** check response */
1319 bget_msg(sd); /* get OK */
1321 /* Inform Storage daemon that we are done */
1322 bnet_sig(sd, BNET_TERMINATE);
1325 case L_VERIFY_DISK_TO_CATALOG:
1329 bnet_fsend(dir, "2994 Bad verify level: %s\n", dir->msg);
1333 bnet_sig(dir, BNET_EOD);
1335 /* Send termination status back to Dir */
1336 bnet_fsend(dir, EndJob, jcr->JobStatus, jcr->JobFiles,
1337 edit_uint64(jcr->ReadBytes, ed1),
1338 edit_uint64(jcr->JobBytes, ed2), jcr->Errors);
1340 /* Inform Director that we are done */
1341 bnet_sig(dir, BNET_TERMINATE);
1342 return 0; /* return and terminate command loop */
1346 * Do a Restore for Director
1349 static int restore_cmd(JCR *jcr)
1351 BSOCK *dir = jcr->dir_bsock;
1352 BSOCK *sd = jcr->store_bsock;
1356 char ed1[50], ed2[50];
1359 * Scan WHERE (base directory for restore) from command
1361 Dmsg0(150, "restore command\n");
1362 /* Pickup where string */
1363 where = get_memory(dir->msglen+1);
1366 if (sscanf(dir->msg, restorecmd, &replace, &prefix_links, where) != 3) {
1367 if (sscanf(dir->msg, restorecmd1, &replace, &prefix_links) != 2) {
1368 pm_strcpy(jcr->errmsg, dir->msg);
1369 Jmsg(jcr, M_FATAL, 0, _("Bad replace command. CMD=%s\n"), jcr->errmsg);
1374 /* Turn / into nothing */
1375 if (where[0] == '/' && where[1] == 0) {
1379 Dmsg2(150, "Got replace %c, where=%s\n", replace, where);
1380 unbash_spaces(where);
1381 jcr->where = bstrdup(where);
1382 free_pool_memory(where);
1383 jcr->replace = replace;
1384 jcr->prefix_links = prefix_links;
1386 bnet_fsend(dir, OKrestore);
1387 Dmsg1(110, "bfiled>dird: %s", dir->msg);
1389 jcr->JobType = JT_RESTORE;
1391 set_jcr_job_status(jcr, JS_Blocked);
1393 if (!open_sd_read_session(jcr)) {
1394 set_jcr_job_status(jcr, JS_ErrorTerminated);
1398 set_jcr_job_status(jcr, JS_Running);
1401 * Do restore of files and data
1403 start_dir_heartbeat(jcr);
1404 generate_daemon_event(jcr, "JobStart");
1406 stop_dir_heartbeat(jcr);
1408 set_jcr_job_status(jcr, JS_Terminated);
1409 if (jcr->JobStatus != JS_Terminated) {
1410 bnet_suppress_error_messages(sd, 1);
1414 * Send Close session command to Storage daemon
1416 bnet_fsend(sd, read_close, jcr->Ticket);
1417 Dmsg1(130, "bfiled>stored: %s", sd->msg);
1419 bget_msg(sd); /* get OK */
1421 /* Inform Storage daemon that we are done */
1422 bnet_sig(sd, BNET_TERMINATE);
1427 set_jcr_job_status(jcr, JS_ErrorTerminated);
1429 /* Send termination status back to Dir */
1430 bnet_fsend(dir, EndJob, jcr->JobStatus, jcr->JobFiles,
1431 edit_uint64(jcr->ReadBytes, ed1),
1432 edit_uint64(jcr->JobBytes, ed2), jcr->Errors);
1434 /* Inform Director that we are done */
1435 bnet_sig(dir, BNET_TERMINATE);
1437 Dmsg0(130, "Done in job.c\n");
1438 return 0; /* return and terminate command loop */
1441 static int open_sd_read_session(JCR *jcr)
1443 BSOCK *sd = jcr->store_bsock;
1446 Jmsg(jcr, M_FATAL, 0, _("Improper calling sequence.\n"));
1449 Dmsg4(120, "VolSessId=%ld VolsessT=%ld SF=%ld EF=%ld\n",
1450 jcr->VolSessionId, jcr->VolSessionTime, jcr->StartFile, jcr->EndFile);
1451 Dmsg2(120, "JobId=%d vol=%s\n", jcr->JobId, "DummyVolume");
1453 * Open Read Session with Storage daemon
1455 bnet_fsend(sd, read_open, jcr->VolumeName,
1456 jcr->VolSessionId, jcr->VolSessionTime, jcr->StartFile, jcr->EndFile,
1457 jcr->StartBlock, jcr->EndBlock);
1458 Dmsg1(110, ">stored: %s", sd->msg);
1463 if (bget_msg(sd) >= 0) {
1464 Dmsg1(110, "bfiled<stored: %s", sd->msg);
1465 if (sscanf(sd->msg, OK_open, &jcr->Ticket) != 1) {
1466 Jmsg(jcr, M_FATAL, 0, _("Bad response to SD read open: %s\n"), sd->msg);
1469 Dmsg1(110, "bfiled: got Ticket=%d\n", jcr->Ticket);
1471 Jmsg(jcr, M_FATAL, 0, _("Bad response from stored to read open command\n"));
1475 if (!send_bootstrap_file(jcr)) {
1480 * Start read of data with Storage daemon
1482 bnet_fsend(sd, read_data, jcr->Ticket);
1483 Dmsg1(110, ">stored: %s", sd->msg);
1488 if (!response(jcr, sd, OK_data, "Read Data")) {
1495 * Destroy the Job Control Record and associated
1496 * resources (sockets).
1498 static void filed_free_jcr(JCR *jcr)
1500 if (jcr->store_bsock) {
1501 bnet_close(jcr->store_bsock);
1503 if (jcr->RestoreBootstrap) {
1504 unlink(jcr->RestoreBootstrap);
1505 free_pool_memory(jcr->RestoreBootstrap);
1506 jcr->RestoreBootstrap = NULL;
1508 if (jcr->last_fname) {
1509 free_pool_memory(jcr->last_fname);
1511 if (jcr->RunAfterJob) {
1512 free_pool_memory(jcr->RunAfterJob);
1520 * Get response from Storage daemon to a command we
1521 * sent. Check that the response is OK.
1523 * Returns: 0 on failure
1526 int response(JCR *jcr, BSOCK *sd, char *resp, const char *cmd)
1531 if (bget_msg(sd) > 0) {
1532 Dmsg0(110, sd->msg);
1533 if (strcmp(sd->msg, resp) == 0) {
1537 if (job_canceled(jcr)) {
1538 return 0; /* if canceled avoid useless error messages */
1540 if (is_bnet_error(sd)) {
1541 Jmsg2(jcr, M_FATAL, 0, _("Comm error with SD. bad response to %s. ERR=%s\n"),
1542 cmd, bnet_strerror(sd));
1544 Jmsg3(jcr, M_FATAL, 0, _("Bad response to %s command. Wanted %s, got %s\n"),
1545 cmd, resp, sd->msg);
1550 static int send_bootstrap_file(JCR *jcr)
1554 BSOCK *sd = jcr->store_bsock;
1555 const char *bootstrap = "bootstrap\n";
1558 Dmsg1(400, "send_bootstrap_file: %s\n", jcr->RestoreBootstrap);
1559 if (!jcr->RestoreBootstrap) {
1562 bs = fopen(jcr->RestoreBootstrap, "r");
1565 Jmsg(jcr, M_FATAL, 0, _("Could not open bootstrap file %s: ERR=%s\n"),
1566 jcr->RestoreBootstrap, be.strerror());
1567 set_jcr_job_status(jcr, JS_ErrorTerminated);
1570 sd->msglen = pm_strcpy(sd->msg, bootstrap);
1572 while (fgets(buf, sizeof(buf), bs)) {
1573 sd->msglen = Mmsg(sd->msg, "%s", buf);
1576 bnet_sig(sd, BNET_EOD);
1578 if (!response(jcr, sd, OKSDbootstrap, "Bootstrap")) {
1579 set_jcr_job_status(jcr, JS_ErrorTerminated);
1585 if (jcr->RestoreBootstrap) {
1586 unlink(jcr->RestoreBootstrap);
1587 free_pool_memory(jcr->RestoreBootstrap);
1588 jcr->RestoreBootstrap = NULL;