2 * Copyright 2000, International Business Machines Corporation and others.
5 * This software has been released under the terms of the IBM Public
6 * License. For details, see the LICENSE file in the top-level source
7 * directory or online at http://www.openafs.org/dl/license10.html
10 #include <afsconfig.h>
11 #include <afs/param.h>
16 #include <sys/types.h>
20 #include <WINNT/afsevent.h>
22 #include <netinet/in.h>
25 #include <afs/procmgmt.h>
27 #include <afs/afsint.h>
29 #ifdef AFS_PTHREAD_ENV
32 #include <afs/assert.h>
34 #include <afs/prs_fs.h>
37 #include <afs/vlserver.h>
40 #include <afs/afsutil.h>
42 #include <rx/rx_globals.h>
45 #include <afs/cellconfig.h>
47 #include <afs/volser.h>
49 #include <afs/com_err.h>
52 #include <afs/tcdata.h>
53 #include <afs/bubasics.h>
55 #include "error_macros.h"
56 #include <afs/budb_errs.h>
59 #include "butc_xbsa.h"
61 #define N_SECURITY_OBJECTS 3
62 #define ERRCODE_RANGE 8 /* from error_table.h */
64 #define TE_PREFIX "TE"
65 #define TL_PREFIX "TL"
66 #define CFG_PREFIX "CFG"
68 struct ubik_client *cstruct;
69 extern void TC_ExecuteRequest();
70 extern int dbWatcher();
71 FILE *logIO, *ErrorlogIO, *centralLogIO, *lastLogIO;
72 char lFile[AFSDIR_PATH_MAX];
74 char ErrorlogFile[256];
75 char lastLogFile[256];
76 char eFile[AFSDIR_PATH_MAX];
77 char tapeConfigFile[AFSDIR_PATH_MAX];
78 char pFile[AFSDIR_PATH_MAX];
80 struct tapeConfig globalTapeConfig;
81 struct deviceSyncNode *deviceLatch;
82 char globalCellName[64];
83 char *whoami = "butc";
85 /* GLOBAL CONFIGURATION PARAMETERS */
101 #define MINGROUPID 0x1
102 #define MAXGROUPID 0x7FFFFFFF
103 afs_int32 statusSize;
105 #define MAXSTATUS 0x7fffffff
106 afs_int32 BufferSize; /* Size in B stored for data */
107 char *centralLogFile;
108 afs_int32 lastLog; /* Log last pass info */
111 #define ADDRSPERSITE 16 /* Same global is in rx/rx_user.c */
112 afs_uint32 SHostAddrs[ADDRSPERSITE];
114 /* dummy routine for the audit work. It should do nothing since audits */
115 /* occur at the server level and bos is not a server. */
122 SafeATOL(register char *anum)
124 register afs_int32 total;
129 if (tc < '0' || tc > '9')
139 * Convert a string into an afs_int32.
140 * Returned afs_int32 is in Bytes, Kb, Mb, Gb, or Tb. Based on crunit char.
141 * This routine only converts unsigned float values.
142 * The returned value is a whole number.
144 * numstring - text string to be converted.
145 * crunit - value returned in 'B', 'K', 'M', 'G', 'T'.
146 * ' ' or NULL ==> 'B' (bytes).
148 * number - returned value in requested crunit - rounded
149 * to nearest whole number.
152 * -1 - error in conversion
154 * should deal with signed numbers. Should signal error if no digits
158 atocl(char *numstring, char crunit, afs_int32 *number)
167 /* Determine which units to report in */
201 sscanf(numstring, "%f%c%s", &total, &cunit, rest);
202 if ((count > 2) || (count <= 0))
205 cunit = 'B'; /* bytes */
239 /* Go to correct unit */
240 for (; units < runits; units += 3)
242 for (; units > runits; units -= 3)
245 total += 0.5; /* Round up */
246 if ((total > 0x7fffffff) || (total < 0)) /* Don't go over 2G */
253 /* replace last two ocurrences of / by _ */
255 stringReplace(char *name)
260 pos = strrchr(name, '/');
263 pos = strrchr(name, '/');
265 strcat(name, buffer);
270 stringNowReplace(char *logFile, char *deviceName)
273 char storeDevice[256];
274 int mvFlag = 0, devPrefLen;
276 char devPrefix[] = "\\\\.";
278 char devPrefix[] = "/dev";
281 devPrefLen = strlen(devPrefix);
282 strcpy(storeDevice, deviceName);
283 if (strncmp(deviceName, devPrefix, devPrefLen) == 0) {
284 deviceName += devPrefLen;
287 while (pos = strchr(deviceName, devPrefix[0])) /* look for / or \ */
289 strcat(logFile, deviceName);
290 /* now put back deviceName to the way it was */
293 deviceName -= devPrefLen;
295 strcpy(deviceName, storeDevice);
302 * get the configuration information for a particular tape device
303 * as specified by the portoffset
305 * filename - full pathname of file containing the tape device
306 * configuration information
307 * config - for return results
308 * portOffset - for which configuration is required
310 * logging not available when this routine is called
311 * caller return value checks
313 * 0 => Found entry with same port, return info in config.
314 * -1 => Error encountered trying to read the file.
315 * 1 => Desired entry does not exist or file does not exist.
320 GetDeviceConfig(char *filename, struct tapeConfig *config, afs_int32 portOffset)
324 char devName[LINESIZE], tcapacity[LINESIZE], tfmsize[LINESIZE],
329 afs_int32 code = 0, count;
331 /* Initialize the config struct */
332 config->capacity = 0;
333 config->fileMarkSize = 0;
334 config->portOffset = portOffset;
335 strcpy(config->device, "");
337 devFile = fopen(filename, "r");
341 fprintf(stderr, "Error %d: Can't open %s\n", errno, filename);
345 while (fgets(line, LINESIZE - 1, devFile)) {
347 sscanf(line, "%s %s %s %u%s\n", tcapacity, tfmsize, devName,
350 if (count == 4 || count == 5) {
351 if (atocl(tcapacity, 'K', &capacity)) {
353 "tapeconfig: Tape capacity parse error in: %s\n",
357 if (atocl(tfmsize, 'B', &fmSize)) {
359 "tapeconfig: File-mark size parse error in: %s\n",
364 count = sscanf(line, "%s %u%s\n", devName, &aport, trest);
365 if (count == 2 || count == 3) {
366 capacity = 0x7fffffff;
369 fprintf(stderr, "tapeconfig: Parse error in: %s\n", line);
374 if ((aport < 0) || (aport > BC_MAXPORTOFFSET)) {
375 fprintf(stderr, "tapeconfig: Port offset parse error in: %s\n",
380 if (aport != portOffset)
384 fprintf(stderr, "Invalid file mark size, %d, in: %s\n", fmSize,
389 config->capacity = capacity;
390 config->fileMarkSize = fmSize;
391 config->portOffset = aport;
392 strncpy(config->device, devName, 100);
397 /* fprintf(stderr, "Can't find tapeconfig entry for port offset %d\n", portOffset); */
409 GetConfigParams(char *filename, afs_int32 port)
413 char line[LINESIZE], cmd[LINESIZE], value[LINESIZE];
417 /* DEFAULT SETTINGS FOR GLOBAL PARAMETERS */
418 dump_namecheck = 1; /* check tape name on dumps */
419 queryoperator = 1; /* can question operator */
420 autoQuery = 1; /* prompt for first tape */
421 isafile = 0; /* Do not dump to a file */
422 opencallout = NULL; /* open callout routine */
423 closecallout = NULL; /* close callout routine */
424 tapemounted = 0; /* tape is not mounted */
426 BufferSize = (CONF_XBSA ? XBSADFLTBUFFER : BUTM_BLOCKSIZE);
427 dumpRestAuthnLevel = rpc_c_protect_level_default;
428 xbsaObjectOwner = NULL; /* bsaObjectOwner */
429 appObjectOwner = NULL; /* appObjectOwner */
430 adsmServerName = NULL; /* TSM server name - same as ADSM */
431 xbsaSecToken = NULL; /* XBSA sercurity token */
432 xbsalGName = NULL; /* XBSA IGName */
434 BufferSize = BUTM_BLOCKSIZE;
436 centralLogFile = NULL; /* Log for all butcs */
437 centralLogIO = 0; /* Log for all butcs */
438 statusSize = 0; /* size before status message */
439 maxpass = PASSESDFLT; /* dump passes */
440 lastLog = 0; /* separate log for last pass */
441 lastLogIO = 0; /* separate log for last pass */
442 groupId = 0; /* Group id for multiple dumps */
444 /* Try opening the CFG_<port> file */
445 sprintf(paramFile, "%s_%d", filename, port);
446 devFile = fopen(paramFile, "r");
448 /* Set log names to TL_<port>, TL_<port>.lp and TE_<port> */
449 sprintf(logFile, "%s_%d", lFile, port);
450 sprintf(lastLogFile, "%s_%d.lp", lFile, port);
451 sprintf(ErrorlogFile, "%s_%d", eFile, port);
452 } else if (CONF_XBSA) {
453 /* If configured as XBSA, a configuration file CFG_<port> must exist */
454 printf("Cannot open configuration file %s", paramFile);
457 /* Try the CFG_<device> name as the device file */
458 strcpy(paramFile, filename);
459 stringNowReplace(paramFile, globalTapeConfig.device);
460 /* Set log names to TL_<device>, TL_<device> and TE_<device> */
461 strcpy(logFile, lFile);
462 stringNowReplace(logFile, globalTapeConfig.device);
463 strcpy(lastLogFile, lFile);
464 stringNowReplace(lastLogFile, globalTapeConfig.device);
465 strcat(lastLogFile, ".lp");
466 strcpy(ErrorlogFile, eFile);
467 stringNowReplace(ErrorlogFile, globalTapeConfig.device);
469 /* Now open the device file */
470 devFile = fopen(paramFile, "r");
472 ERROR_EXIT(0); /* CFG file doesn't exist for non-XBSA and that's ok */
475 /* Read each line of the Configuration file */
476 while (fgets(line, LINESIZE - 1, devFile)) {
477 cnt = sscanf(line, "%s %s", cmd, value);
480 printf("Bad line in %s: %s\n", paramFile, line);
484 for (cnt = 0; cnt < strlen(cmd); cnt++)
485 if (islower(cmd[cnt]))
486 cmd[cnt] = toupper(cmd[cnt]);
488 if (!strcmp(cmd, "NAME_CHECK")) {
491 ("Warning: The %s parameter is ignored with a Backup Service\n",
496 for (cnt = 0; cnt < strlen(value); cnt++)
497 if (islower(value[cnt]))
498 value[cnt] = toupper(value[cnt]);
500 if (!strcmp(value, "NO")) {
501 printf("Dump tape name check is disabled\n");
504 printf("Dump tape name check is enabled\n");
509 else if (!strcmp(cmd, "MOUNT")) {
512 ("Warning: The %s parameter is ignored with a Backup Service\n",
517 opencallout = (char *)malloc(strlen(value) + 1);
518 strcpy(opencallout, value);
519 printf("Tape mount callout routine is %s\n", opencallout);
522 else if (!strcmp(cmd, "UNMOUNT")) {
525 ("Warning: The %s parameter is ignored with a Backup Service\n",
530 closecallout = (char *)malloc(strlen(value) + 1);
531 strcpy(closecallout, value);
532 printf("Tape unmount callout routine is %s\n", closecallout);
535 else if (!strcmp(cmd, "ASK")) {
536 for (cnt = 0; cnt < strlen(value); cnt++)
537 if (islower(value[cnt]))
538 value[cnt] = toupper(value[cnt]);
540 if (!strcmp(value, "NO")) {
541 printf("Operator queries are disabled\n");
544 printf("Operator queries are enabled\n");
549 else if (!strcmp(cmd, "FILE")) {
552 ("Warning: The %s parameter is ignored with a Backup Service\n",
557 for (cnt = 0; cnt < strlen(value); cnt++)
558 if (islower(value[cnt]))
559 value[cnt] = toupper(value[cnt]);
561 if (!strcmp(value, "YES")) {
562 printf("Will dump to a file\n");
565 printf("Will not dump to a file\n");
570 else if (!strcmp(cmd, "AUTOQUERY")) {
573 ("Warning: The %s parameter is ignored with a Backup Service\n",
578 for (cnt = 0; cnt < strlen(value); cnt++)
579 if (islower(value[cnt]))
580 value[cnt] = toupper(value[cnt]);
582 if (!strcmp(value, "NO")) {
583 printf("Auto query is disabled\n");
586 printf("Auto query is enabled\n");
591 else if (!strcmp(cmd, "BUFFERSIZE")) {
593 afs_int32 tapeblocks;
596 if (atocl(value, 'K', &size)) {
597 fprintf(stderr, "BUFFERSIZE parse error\n");
601 /* A tapeblock is 16KB. Determine # of tapeblocks. Then
602 * determine BufferSize needed for that many tapeblocks.
604 tapeblocks = size / 16;
607 printf("BUFFERSIZE is %u KBytes\n", (tapeblocks * 16));
608 BufferSize = tapeblocks * BUTM_BLOCKSIZE;
611 if (atocl(value, 'B', &size)) {
612 fprintf(stderr, "BUFFERSIZE parse error\n");
615 if (size < XBSAMINBUFFER)
616 size = XBSAMINBUFFER;
617 if (size > XBSAMAXBUFFER)
618 size = XBSAMAXBUFFER;
619 printf("XBSA buffer size is %u Bytes\n", size);
625 /* All the xbsa spacific parameters */
626 else if (!strcmp(cmd, "TYPE") || !strcmp(cmd, "NODE")
627 || !strcmp(cmd, "SERVER") || !strcmp(cmd, "PASSWORD")
628 || !strcmp(cmd, "PASSFILE") || !strcmp(cmd, "MGMTCLASS")) {
629 printf("This binary does not have XBSA support\n");
633 else if (!strcmp(cmd, "TYPE")) { /* required for XBSA */
636 ("Warning: The %s parameter is ignored with a tape drive\n",
641 for (cnt = 0; (size_t) cnt < strlen(value); cnt++)
642 if (islower(value[cnt]))
643 value[cnt] = toupper(value[cnt]);
645 if (strcmp(value, "TSM") == 0) {
646 xbsaType = XBSA_SERVER_TYPE_ADSM; /* Known XBSA server type */
648 printf("Configuration file error, %s %s is not recognized\n",
650 xbsaType = XBSA_SERVER_TYPE_UNKNOWN;
652 printf("XBSA type is %s\n",
654 XBSA_SERVER_TYPE_UNKNOWN) ? "Unknown" : value));
657 else if (!strcmp(cmd, "NODE")) {
660 ("Warning: The %s parameter is ignored with a tape drive\n",
664 xbsaObjectOwner = malloc(strlen(value) + 1);
665 strcpy(xbsaObjectOwner, value);
666 printf("XBSA node is %s\n", xbsaObjectOwner);
669 else if (!strcmp(cmd, "SERVER")) { /* required for XBSA */
672 ("Warning: The %s parameter is ignored with a tape drive\n",
676 adsmServerName = malloc(strlen(value) + 1);
677 strcpy(adsmServerName, value);
678 printf("XBSA server is %s\n", adsmServerName);
681 else if (!strcmp(cmd, "PASSWORD")) { /* This or PASSFILE required for XBSA */
684 ("Warning: The %s parameter is ignored with a tape drive\n",
690 ("Warning: The %s parameter is ignored. Already read password\n",
695 xbsaSecToken = malloc(strlen(value) + 1);
696 strcpy(xbsaSecToken, value);
697 printf("XBSA Password has been read\n");
700 else if (!strcmp(cmd, "PASSFILE")) { /* This or PASSWORD required for XBSA */
704 ("Warning: The %s parameter is ignored with a tape drive\n",
710 ("Warning: The %s parameter is ignored. Already read password\n",
715 pwdFile = fopen(value, "r");
718 ("Configuration file error, cannot open password file %s\n",
722 xbsaSecToken = malloc(LINESIZE);
723 if (!fscanf(pwdFile, "%s", xbsaSecToken)) {
725 ("Configuration file error, cannot read password file %s\n",
729 printf("XBSA password retrieved from password file\n");
732 else if (!strcmp(cmd, "MGMTCLASS")) { /* XBSA */
735 ("Warning: The %s parameter is ignored with a tape drive\n",
739 xbsalGName = malloc(strlen(value) + 1);
740 strcpy(xbsalGName, value);
741 printf("XBSA management class is %s\n", xbsalGName);
745 else if (!strcmp(cmd, "MAXPASS")) {
746 maxpass = SafeATOL(value);
747 if (maxpass < PASSESMIN)
749 if (maxpass > PASSESMAX)
751 printf("MAXPASS is %d\n", maxpass);
754 else if (!strcmp(cmd, "GROUPID")) {
755 groupId = SafeATOL(value);
756 if ((groupId < MINGROUPID) || (groupId > MAXGROUPID)) {
757 printf("Configuration file error, %s %s is invalid\n", cmd,
761 printf("Group Id is %d\n", groupId);
764 else if (!strcmp(cmd, "LASTLOG")) {
765 for (cnt = 0; (size_t) cnt < strlen(value); cnt++)
766 if (islower(value[cnt]))
767 value[cnt] = toupper(value[cnt]);
769 lastLog = (strcmp(value, "YES") == 0);
770 printf("Will %sgenerate a last log\n", (lastLog ? "" : "not "));
773 else if (!strcmp(cmd, "CENTRALLOG")) {
774 centralLogFile = malloc(strlen(value) + 1);
775 strcpy(centralLogFile, value);
776 printf("Central log file is %s\n", centralLogFile);
779 else if (!strcmp(cmd, "STATUS")) {
780 if (atocl(value, 'B', &statusSize)) {
781 fprintf(stderr, "STATUS parse error\n");
784 if (statusSize < MINSTATUS)
785 statusSize = MINSTATUS;
786 if (statusSize > MAXSTATUS)
787 statusSize = MAXSTATUS;
791 printf("Warning: Unrecognized configuration parameter: %s", line);
796 /* Statussize is in bytes and requires that BufferSize be set first */
797 statusSize *= BufferSize;
799 statusSize = 0x7fffffff; /*max size */
800 printf("Status every %ld Bytes\n", statusSize);
807 /* If the butc is configured as XBSA, check for required parameters */
809 if (!code && CONF_XBSA) {
810 if (xbsaType == XBSA_SERVER_TYPE_UNKNOWN) {
812 ("Configuration file error, the TYPE parameter must be specified, or\n");
813 printf("an entry must exist in %s for port %d\n", tapeConfigFile,
817 if (!adsmServerName) {
819 ("Configuration file error, the SERVER parameter must be specified\n");
824 ("Configuration file error, the PASSWORD or PASSFILE parameter must be specified\n");
833 WorkerBee(struct cmd_syndesc *as, char *arock)
835 register afs_int32 code;
836 struct rx_securityClass *(securityObjects[3]);
837 struct rx_service *service;
838 struct ktc_token ttoken;
841 /*process arguments */
842 afs_int32 portOffset = 0;
843 #ifdef AFS_PTHREAD_ENV
844 pthread_t dbWatcherPid;
845 pthread_attr_t tattr;
848 PROCESS dbWatcherPid;
851 afs_uint32 host = htonl(INADDR_ANY);
855 /*initialize the error tables */
856 initialize_KA_error_table();
857 initialize_RXK_error_table();
858 initialize_KTC_error_table();
859 initialize_ACFG_error_table();
860 initialize_CMD_error_table();
861 initialize_VL_error_table();
862 initialize_BUTM_error_table();
863 initialize_BUTC_error_table();
865 initialize_BUTX_error_table();
867 initialize_VOLS_error_table();
868 initialize_BUDB_error_table();
869 initialize_BUCD_error_table();
871 if (as->parms[0].items) {
872 portOffset = SafeATOL(as->parms[0].items->data);
873 if (portOffset == -1) {
874 fprintf(stderr, "Illegal port offset '%s'\n",
875 as->parms[0].items->data);
877 } else if (portOffset > BC_MAXPORTOFFSET) {
878 fprintf(stderr, "%u exceeds max port offset %u\n", portOffset,
884 xbsaType = XBSA_SERVER_TYPE_NONE; /* default */
885 if (as->parms[3].items) { /* -device */
886 globalTapeConfig.capacity = 0x7fffffff; /* 2T for max tape capacity */
887 globalTapeConfig.fileMarkSize = 0;
888 globalTapeConfig.portOffset = portOffset;
889 strncpy(globalTapeConfig.device, as->parms[3].items->data, 100);
890 xbsaType = XBSA_SERVER_TYPE_NONE; /* Not XBSA */
892 /* Search for an entry in tapeconfig file */
893 code = GetDeviceConfig(tapeConfigFile, &globalTapeConfig, portOffset);
895 fprintf(stderr, "Problem in reading config file %s\n",
899 /* Set xbsaType. If code == 1, no entry was found in the tapeconfig file so
900 * it's an XBSA server. Don't know if its ADSM or not so its unknown.
903 ((code == 1) ? XBSA_SERVER_TYPE_UNKNOWN : XBSA_SERVER_TYPE_NONE);
906 if (as->parms[6].items) { /* -restoretofile */
907 int s = strlen(as->parms[6].items->data);
908 restoretofile = malloc(s + 1);
909 strncpy(restoretofile, as->parms[6].items->data, s + 1);
910 printf("Restore to file '%s'\n", restoretofile);
913 /* Go and read the config file: CFG_<device> or CFG_<port>. We will also set
914 * the exact xbsaType within the call (won't be unknown) - double check.
916 code = GetConfigParams(pFile, portOffset);
920 if (xbsaType == XBSA_SERVER_TYPE_UNKNOWN) {
922 ("\nConfiguration file error, the TYPE parameter must be specified, or\n");
923 printf("an entry must exist in %s for port %d\n", tapeConfigFile,
928 /* Not compiled for XBSA code so we can't support it */
930 printf("\nNo entry found in %s for port %d\n", tapeConfigFile,
932 printf("This binary does not have XBSA support\n");
937 /* Open the log files. The pathnames were set in GetConfigParams() */
938 logIO = fopen(logFile, "a");
940 fprintf(stderr, "Failed to open %s\n", logFile);
943 ErrorlogIO = fopen(ErrorlogFile, "a");
945 fprintf(stderr, "Failed to open %s\n", ErrorlogFile);
949 lastLogIO = fopen(lastLogFile, "a");
951 fprintf(stderr, "Failed to open %s\n", lastLogFile);
955 if (centralLogFile) {
959 char path[AFSDIR_PATH_MAX];
962 statcode = stat(centralLogFile, &sbuf);
963 centralLogIO = fopen(centralLogFile, "a");
965 fprintf(stderr, "Failed to open %s; error %d\n", centralLogFile,
970 /* Make sure it is not in AFS, has to have been created first */
971 if (!realpath(centralLogFile, path)) {
973 "Warning: can't determine real path of '%s' (%d)\n",
974 centralLogFile, errno);
976 if (strncmp(path, "/afs/", 5) == 0) {
977 fprintf(stderr, "The central log '%s' should not be in AFS\n",
984 /* Write header if created it */
987 "TASK START DATE/TIME END DATE/TIME ELAPSED VOLUMESET\n";
989 "----- ------------------- ------------------- -------- ---------\n";
990 /* File didn't exist before so write the header lines */
991 fwrite(h1, strlen(h1), 1, centralLogIO);
992 fwrite(h2, strlen(h2), 1, centralLogIO);
993 fflush(centralLogIO);
997 if (as->parms[1].items) {
998 debugLevel = SafeATOL(as->parms[1].items->data);
999 if (debugLevel == -1) {
1000 TLog(0, "Illegal debug level '%s'\n", as->parms[1].items->data);
1005 /* Setup XBSA library interface */
1008 rc = xbsa_MountLibrary(&butxInfo, xbsaType);
1009 if (rc != XBSA_SUCCESS) {
1010 TapeLog(0, 0, rc, 0, "Unable to mount the XBSA library\n");
1014 forcemultiple = (as->parms[7].items ? 1 : 0);/*-xbsaforcemultiple */
1016 printf("Force XBSA multiple server support\n");
1018 rc = InitToServer(0 /*taskid */ , &butxInfo, adsmServerName);
1019 if (rc != XBSA_SUCCESS)
1025 if (as->parms[2].items)
1026 strncpy(cellName, as->parms[2].items->data, sizeof(cellName));
1030 if (as->parms[4].items)
1033 localauth = (as->parms[5].items ? 1 : 0);
1034 rxBind = (as->parms[8].items ? 1 : 0);
1038 #ifndef AFS_NT40_ENV
1039 if (AFSDIR_SERVER_NETRESTRICT_FILEPATH ||
1040 AFSDIR_SERVER_NETINFO_FILEPATH) {
1042 ccode = parseNetFiles(SHostAddrs, NULL, NULL,
1043 ADDRSPERSITE, reason,
1044 AFSDIR_SERVER_NETINFO_FILEPATH,
1045 AFSDIR_SERVER_NETRESTRICT_FILEPATH);
1049 ccode = rx_getAllAddr(SHostAddrs, ADDRSPERSITE);
1052 host = SHostAddrs[0];
1055 code = rx_InitHost(host, htons(BC_TAPEPORT + portOffset));
1057 TapeLog(0, 0, code, 0, "rx init failed on port %u\n",
1058 BC_TAPEPORT + portOffset);
1061 rx_SetRxDeadTime(150);
1063 /* Establish connection with the vldb server */
1064 code = vldbClientInit(0, localauth, cellName, &cstruct, &ttoken);
1066 TapeLog(0, 0, code, 0, "Can't access vldb\n");
1070 strcpy(globalCellName, cellName);
1072 /*initialize the dumpNode list */
1073 InitNodeList(portOffset);
1076 (struct deviceSyncNode *)(malloc(sizeof(struct deviceSyncNode)));
1077 Lock_Init(&(deviceLatch->lock));
1078 deviceLatch->flags = 0;
1080 /* initialize database support, volume support, and logs */
1082 /* Create a single security object, in this case the null security
1083 * object, for unauthenticated connections, which will be used to control
1084 * security on connections made to this server
1087 securityObjects[0] = rxnull_NewServerSecurityObject();
1088 securityObjects[1] = (struct rx_securityClass *)0; /* don't bother with rxvab */
1089 if (!securityObjects[0]) {
1090 TLog(0, "rxnull_NewServerSecurityObject");
1095 rx_NewServiceHost(host, 0, 1, "BUTC", securityObjects, 3, TC_ExecuteRequest);
1097 TLog(0, "rx_NewService");
1100 rx_SetMaxProcs(service, 4);
1102 /* Establish connection to the backup database */
1103 code = udbClientInit(0, localauth, cellName);
1105 TapeLog(0, 0, code, 0, "Can't access backup database\n");
1108 /* This call is here to verify that we are authentiated.
1109 * The call does nothing and will return BUDB_NOTPERMITTED
1110 * if we don't belong.
1112 code = bcdb_deleteDump(0, 0, 0, 0);
1113 if (code == BUDB_NOTPERMITTED) {
1114 TapeLog(0, 0, code, 0, "Can't access backup database\n");
1119 #ifdef AFS_PTHREAD_ENV
1120 code = pthread_attr_init(&tattr);
1122 TapeLog(0, 0, code, 0,
1123 "Can't pthread_attr_init database monitor task");
1126 code = pthread_attr_setdetachstate(&tattr, PTHREAD_CREATE_DETACHED);
1128 TapeLog(0, 0, code, 0,
1129 "Can't pthread_attr_setdetachstate database monitor task");
1133 code = pthread_create(&dbWatcherPid, &tattr, dbWatcher, (void *)2);
1134 AFS_SIGSET_RESTORE();
1137 LWP_CreateProcess(dbWatcher, 20480, LWP_NORMAL_PRIORITY, (void *)2,
1138 "dbWatcher", &dbWatcherPid);
1141 TapeLog(0, 0, code, 0, "Can't create database monitor task");
1145 TLog(0, "Starting Tape Coordinator: Port offset %u Debug level %u\n",
1146 portOffset, debugLevel);
1148 TLog(0, "Token expires: %s\n", cTIME(&t));
1150 rx_StartServer(1); /* Donate this process to the server process pool */
1151 TLog(0, "Error: StartServer returned");
1155 #ifndef AFS_NT40_ENV
1156 #include "AFS_component_version_number.c"
1160 main(int argc, char **argv)
1162 register struct cmd_syndesc *ts;
1163 register struct cmd_item *ti;
1165 #ifdef AFS_AIX32_ENV
1167 * The following signal action for AIX is necessary so that in case of a
1168 * crash (i.e. core is generated) we can include the user's data section
1169 * in the core dump. Unfortunately, by default, only a partial core is
1170 * generated which, in many cases, isn't too useful.
1172 struct sigaction nsa;
1174 sigemptyset(&nsa.sa_mask);
1175 nsa.sa_handler = SIG_DFL;
1176 nsa.sa_flags = SA_FULLDUMP;
1177 sigaction(SIGSEGV, &nsa, NULL);
1178 sigaction(SIGABRT, &nsa, NULL);
1183 ts = cmd_CreateSyntax(NULL, WorkerBee, NULL, "tape coordinator");
1184 cmd_AddParm(ts, "-port", CMD_SINGLE, CMD_OPTIONAL, "port offset");
1185 cmd_AddParm(ts, "-debuglevel", CMD_SINGLE, CMD_OPTIONAL, "0 | 1 | 2");
1186 cmd_AddParm(ts, "-cell", CMD_SINGLE, CMD_OPTIONAL, "cell name");
1187 cmd_AddParm(ts, "-device", CMD_SINGLE, (CMD_OPTIONAL | CMD_HIDE),
1188 "tape device path");
1189 cmd_AddParm(ts, "-noautoquery", CMD_FLAG, CMD_OPTIONAL,
1190 "do not query operator for first tape");
1191 cmd_AddParm(ts, "-localauth", CMD_FLAG, CMD_OPTIONAL,
1192 "create tickets from KeyFile");
1193 cmd_AddParm(ts, "-restoretofile", CMD_SINGLE, (CMD_OPTIONAL | CMD_HIDE),
1194 "file to restore to");
1195 cmd_AddParm(ts, "-xbsaforcemultiple", CMD_FLAG, (CMD_OPTIONAL | CMD_HIDE),
1196 "Force multiple XBSA server support");
1197 cmd_AddParm(ts, "-rxbind", CMD_FLAG, CMD_OPTIONAL,
1200 /* Initialize dirpaths */
1201 if (!(initAFSDirPath() & AFSDIR_SERVER_PATHS_OK)) {
1203 ReportErrorEventAlt(AFSEVT_SVR_NO_INSTALL_DIR, 0, argv[0], 0);
1205 fprintf(stderr, "Unable to obtain AFS server directory.\n");
1209 /* setup the file paths */
1210 strcompose(eFile, AFSDIR_PATH_MAX, AFSDIR_SERVER_BACKUP_DIRPATH, "/",
1212 strcompose(lFile, AFSDIR_PATH_MAX, AFSDIR_SERVER_BACKUP_DIRPATH, "/",
1214 strcompose(pFile, AFSDIR_PATH_MAX, AFSDIR_SERVER_BACKUP_DIRPATH, "/",
1216 strcpy(tapeConfigFile, AFSDIR_SERVER_TAPECONFIG_FILEPATH);
1218 /* special case "no args" case since cmd_dispatch gives help message
1222 ts = (struct cmd_syndesc *)malloc(sizeof(struct cmd_syndesc));
1223 memset(ts, 0, sizeof(*ts));
1225 ti = (struct cmd_item *)malloc(sizeof(struct cmd_item));
1228 ts->parms[0].items = ti;
1229 ti = (struct cmd_item *)malloc(sizeof(struct cmd_item));
1232 ts->parms[1].items = ti;
1233 ts->parms[2].items = (struct cmd_item *)NULL;
1234 ts->parms[3].items = (struct cmd_item *)NULL;
1235 ts->parms[4].items = (struct cmd_item *)NULL;
1236 ts->parms[5].items = (struct cmd_item *)NULL;
1237 return WorkerBee(ts, NULL);
1239 return cmd_Dispatch(argc, argv);