2012-07-25 21:08:25 +00:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2012 Alexander Block. All rights reserved.
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public
|
|
|
|
* License v2 as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public
|
|
|
|
* License along with this program; if not, write to the
|
|
|
|
* Free Software Foundation, Inc., 59 Temple Place - Suite 330,
|
|
|
|
* Boston, MA 021110-1307, USA.
|
|
|
|
*/
|
|
|
|
|
2012-09-20 21:26:28 +00:00
|
|
|
#include "kerncompat.h"
|
2022-09-14 15:06:52 +00:00
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <sys/xattr.h>
|
|
|
|
#include <linux/fs.h>
|
2022-08-15 20:54:42 +00:00
|
|
|
#if HAVE_LINUX_FSVERITY_H
|
|
|
|
#include <linux/fsverity.h>
|
|
|
|
#endif
|
2012-07-25 21:08:25 +00:00
|
|
|
#include <unistd.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <fcntl.h>
|
2014-05-23 19:14:56 +00:00
|
|
|
#include <getopt.h>
|
2015-07-29 18:37:37 +00:00
|
|
|
#include <limits.h>
|
2022-03-17 17:25:48 +00:00
|
|
|
#include <errno.h>
|
2022-09-15 11:59:39 +00:00
|
|
|
#include <endian.h>
|
|
|
|
#include <stdbool.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
2012-07-25 21:08:25 +00:00
|
|
|
#include <uuid/uuid.h>
|
2022-03-17 17:25:49 +00:00
|
|
|
#include <zlib.h>
|
2022-06-20 23:30:23 +00:00
|
|
|
#if COMPRESSION_LZO
|
|
|
|
#include <lzo/lzoconf.h>
|
|
|
|
#include <lzo/lzo1x.h>
|
|
|
|
#endif
|
2022-06-20 23:53:05 +00:00
|
|
|
#if COMPRESSION_ZSTD
|
2022-03-17 17:25:49 +00:00
|
|
|
#include <zstd.h>
|
2022-06-20 23:30:23 +00:00
|
|
|
#endif
|
2020-08-18 13:56:04 +00:00
|
|
|
#include "kernel-shared/ctree.h"
|
2022-09-15 11:59:39 +00:00
|
|
|
#include "common/defs.h"
|
|
|
|
#include "common/messages.h"
|
2022-09-14 15:06:52 +00:00
|
|
|
#include "common/utils.h"
|
2020-08-18 13:56:04 +00:00
|
|
|
#include "common/send-stream.h"
|
2020-08-18 13:56:04 +00:00
|
|
|
#include "common/send-utils.h"
|
2019-06-19 23:46:21 +00:00
|
|
|
#include "common/help.h"
|
2019-07-01 18:54:39 +00:00
|
|
|
#include "common/path-utils.h"
|
2022-09-15 21:15:17 +00:00
|
|
|
#include "common/string-utils.h"
|
2022-09-14 15:06:52 +00:00
|
|
|
#include "cmds/commands.h"
|
|
|
|
#include "cmds/receive-dump.h"
|
|
|
|
#include "ioctl.h"
|
2012-07-25 21:08:25 +00:00
|
|
|
|
|
|
|
struct btrfs_receive
|
|
|
|
{
|
|
|
|
int mnt_fd;
|
2013-04-09 17:08:45 +00:00
|
|
|
int dest_dir_fd;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
|
|
|
int write_fd;
|
2015-06-16 13:28:44 +00:00
|
|
|
char write_path[PATH_MAX];
|
2012-07-25 21:08:25 +00:00
|
|
|
|
|
|
|
char *root_path;
|
2013-04-09 17:08:45 +00:00
|
|
|
char *dest_dir_path; /* relative to root_path */
|
2015-06-16 13:36:42 +00:00
|
|
|
char full_subvol_path[PATH_MAX];
|
2015-06-10 19:05:51 +00:00
|
|
|
char *full_root_path;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2015-06-12 13:40:07 +00:00
|
|
|
struct subvol_info cur_subvol;
|
2015-06-16 13:56:37 +00:00
|
|
|
/*
|
|
|
|
* Substitute for cur_subvol::path which is a pointer and we cannot
|
|
|
|
* change it to an array as it's a public API.
|
|
|
|
*/
|
|
|
|
char cur_subvol_path[PATH_MAX];
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2022-06-21 00:29:10 +00:00
|
|
|
bool dest_dir_chroot;
|
|
|
|
|
|
|
|
bool honor_end_cmd;
|
2022-03-17 17:25:49 +00:00
|
|
|
|
|
|
|
bool force_decompress;
|
|
|
|
|
2022-06-20 23:53:05 +00:00
|
|
|
#if COMPRESSION_ZSTD
|
2022-03-17 17:25:49 +00:00
|
|
|
/* Reuse stream objects for encoded_write decompression fallback */
|
|
|
|
ZSTD_DStream *zstd_dstream;
|
2022-06-20 23:30:23 +00:00
|
|
|
#endif
|
2022-03-17 17:25:49 +00:00
|
|
|
z_stream *zlib_stream;
|
2012-07-25 21:08:25 +00:00
|
|
|
};
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
static int finish_subvol(struct btrfs_receive *rctx)
|
2012-07-25 21:08:25 +00:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
int subvol_fd = -1;
|
|
|
|
struct btrfs_ioctl_received_subvol_args rs_args;
|
2013-12-10 17:17:10 +00:00
|
|
|
char uuid_str[BTRFS_UUID_UNPARSED_SIZE];
|
2012-07-25 21:08:25 +00:00
|
|
|
u64 flags;
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->cur_subvol_path[0] == 0)
|
2012-07-25 21:08:25 +00:00
|
|
|
return 0;
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
subvol_fd = openat(rctx->mnt_fd, rctx->cur_subvol_path,
|
|
|
|
O_RDONLY | O_NOATIME);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (subvol_fd < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("cannot open %s: %m", rctx->cur_subvol_path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&rs_args, 0, sizeof(rs_args));
|
2016-11-02 22:42:56 +00:00
|
|
|
memcpy(rs_args.uuid, rctx->cur_subvol.received_uuid, BTRFS_UUID_SIZE);
|
|
|
|
rs_args.stransid = rctx->cur_subvol.stransid;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 2) {
|
2012-07-25 21:08:25 +00:00
|
|
|
uuid_unparse((u8*)rs_args.uuid, uuid_str);
|
|
|
|
fprintf(stderr, "BTRFS_IOC_SET_RECEIVED_SUBVOL uuid=%s, "
|
|
|
|
"stransid=%llu\n", uuid_str, rs_args.stransid);
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = ioctl(subvol_fd, BTRFS_IOC_SET_RECEIVED_SUBVOL, &rs_args);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("ioctl BTRFS_IOC_SET_RECEIVED_SUBVOL failed: %m");
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->cur_subvol.rtransid = rs_args.rtransid;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
|
|
|
ret = ioctl(subvol_fd, BTRFS_IOC_SUBVOL_GETFLAGS, &flags);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("ioctl BTRFS_IOC_SUBVOL_GETFLAGS failed: %m");
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
flags |= BTRFS_SUBVOL_RDONLY;
|
|
|
|
|
|
|
|
ret = ioctl(subvol_fd, BTRFS_IOC_SUBVOL_SETFLAGS, &flags);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("failed to make subvolume read only: %m");
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
out:
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->cur_subvol_path[0]) {
|
|
|
|
rctx->cur_subvol_path[0] = 0;
|
2013-06-26 15:17:57 +00:00
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
if (subvol_fd != -1)
|
|
|
|
close(subvol_fd);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_subvol(const char *path, const u8 *uuid, u64 ctransid,
|
|
|
|
void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2012-07-25 21:08:25 +00:00
|
|
|
struct btrfs_ioctl_vol_args args_v1;
|
2013-12-10 17:17:10 +00:00
|
|
|
char uuid_str[BTRFS_UUID_UNPARSED_SIZE];
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = finish_subvol(rctx);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->cur_subvol.path) {
|
2016-09-06 11:08:29 +00:00
|
|
|
error("subvol: another one already started, path ptr: %s",
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->cur_subvol.path);
|
2016-09-06 11:08:29 +00:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->cur_subvol_path[0]) {
|
2016-09-06 11:08:29 +00:00
|
|
|
error("subvol: another one already started, path buf: %s",
|
2019-06-17 07:59:36 +00:00
|
|
|
rctx->cur_subvol_path);
|
2016-09-06 11:08:29 +00:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
if (*rctx->dest_dir_path == 0) {
|
|
|
|
strncpy_null(rctx->cur_subvol_path, path);
|
2015-06-16 13:56:37 +00:00
|
|
|
} else {
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(rctx->cur_subvol_path, rctx->dest_dir_path,
|
|
|
|
path);
|
2015-06-16 13:56:37 +00:00
|
|
|
if (ret < 0) {
|
2016-10-28 16:47:35 +00:00
|
|
|
error("subvol: path invalid: %s", path);
|
2015-06-16 13:56:37 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat3_out(rctx->full_subvol_path, rctx->root_path,
|
|
|
|
rctx->dest_dir_path, path);
|
2015-06-16 13:36:42 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("subvol: path invalid: %s", path);
|
2015-06-16 13:36:42 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose > BTRFS_BCONF_QUIET)
|
2019-03-05 13:00:46 +00:00
|
|
|
fprintf(stderr, "At subvol %s\n", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
memcpy(rctx->cur_subvol.received_uuid, uuid, BTRFS_UUID_SIZE);
|
|
|
|
rctx->cur_subvol.stransid = ctransid;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 2) {
|
2016-11-02 22:42:56 +00:00
|
|
|
uuid_unparse((u8*)rctx->cur_subvol.received_uuid, uuid_str);
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "receiving subvol %s uuid=%s, stransid=%llu\n",
|
|
|
|
path, uuid_str,
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->cur_subvol.stransid);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
memset(&args_v1, 0, sizeof(args_v1));
|
2013-01-25 19:27:48 +00:00
|
|
|
strncpy_null(args_v1.name, path);
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = ioctl(rctx->dest_dir_fd, BTRFS_IOC_SUBVOL_CREATE, &args_v1);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("creating subvolume %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_snapshot(const char *path, const u8 *uuid, u64 ctransid,
|
|
|
|
const u8 *parent_uuid, u64 parent_ctransid,
|
|
|
|
void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2013-12-10 17:17:10 +00:00
|
|
|
char uuid_str[BTRFS_UUID_UNPARSED_SIZE];
|
2012-07-25 21:08:25 +00:00
|
|
|
struct btrfs_ioctl_vol_args_v2 args_v2;
|
2013-06-26 15:17:57 +00:00
|
|
|
struct subvol_info *parent_subvol = NULL;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = finish_subvol(rctx);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->cur_subvol.path) {
|
2016-09-06 11:08:29 +00:00
|
|
|
error("snapshot: another one already started, path ptr: %s",
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->cur_subvol.path);
|
2016-09-06 11:08:29 +00:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->cur_subvol_path[0]) {
|
2016-09-06 11:08:29 +00:00
|
|
|
error("snapshot: another one already started, path buf: %s",
|
2019-06-17 07:59:36 +00:00
|
|
|
rctx->cur_subvol_path);
|
2016-09-06 11:08:29 +00:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
if (*rctx->dest_dir_path == 0) {
|
|
|
|
strncpy_null(rctx->cur_subvol_path, path);
|
2015-06-16 13:56:37 +00:00
|
|
|
} else {
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(rctx->cur_subvol_path, rctx->dest_dir_path,
|
|
|
|
path);
|
2015-06-16 13:56:37 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("snapshot: path invalid: %s", path);
|
2015-06-16 13:56:37 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat3_out(rctx->full_subvol_path, rctx->root_path,
|
|
|
|
rctx->dest_dir_path, path);
|
2015-06-16 13:36:42 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("snapshot: path invalid: %s", path);
|
2015-06-16 13:36:42 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
pr_verbose(1, "At snapshot %s\n", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
memcpy(rctx->cur_subvol.received_uuid, uuid, BTRFS_UUID_SIZE);
|
|
|
|
rctx->cur_subvol.stransid = ctransid;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 2) {
|
2016-11-02 22:42:56 +00:00
|
|
|
uuid_unparse((u8*)rctx->cur_subvol.received_uuid, uuid_str);
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "receiving snapshot %s uuid=%s, "
|
|
|
|
"ctransid=%llu ", path, uuid_str,
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->cur_subvol.stransid);
|
2012-07-25 21:08:25 +00:00
|
|
|
uuid_unparse(parent_uuid, uuid_str);
|
|
|
|
fprintf(stderr, "parent_uuid=%s, parent_ctransid=%llu\n",
|
|
|
|
uuid_str, parent_ctransid);
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&args_v2, 0, sizeof(args_v2));
|
2013-01-25 19:27:48 +00:00
|
|
|
strncpy_null(args_v2.name, path);
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2021-09-30 18:06:50 +00:00
|
|
|
parent_subvol = subvol_uuid_search(rctx->mnt_fd, 0, parent_uuid,
|
2016-11-02 22:42:56 +00:00
|
|
|
parent_ctransid, NULL,
|
|
|
|
subvol_search_by_received_uuid);
|
2016-12-15 08:37:02 +00:00
|
|
|
if (IS_ERR_OR_NULL(parent_subvol)) {
|
2021-09-30 18:06:50 +00:00
|
|
|
parent_subvol = subvol_uuid_search(rctx->mnt_fd, 0, parent_uuid,
|
2016-11-02 22:42:56 +00:00
|
|
|
parent_ctransid, NULL,
|
|
|
|
subvol_search_by_uuid);
|
2013-11-13 09:25:46 +00:00
|
|
|
}
|
2016-12-15 08:37:02 +00:00
|
|
|
if (IS_ERR_OR_NULL(parent_subvol)) {
|
|
|
|
if (!parent_subvol)
|
|
|
|
ret = -ENOENT;
|
|
|
|
else
|
|
|
|
ret = PTR_ERR(parent_subvol);
|
2016-01-11 10:01:47 +00:00
|
|
|
error("cannot find parent subvolume");
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2015-06-10 19:05:51 +00:00
|
|
|
/*
|
|
|
|
* The path is resolved from the root subvol, but we could be in some
|
|
|
|
* subvolume under the root subvolume, so try and adjust the path to be
|
|
|
|
* relative to our root path.
|
|
|
|
*/
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->full_root_path) {
|
2015-06-10 19:05:51 +00:00
|
|
|
size_t root_len;
|
|
|
|
size_t sub_len;
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
root_len = strlen(rctx->full_root_path);
|
2015-06-10 19:05:51 +00:00
|
|
|
sub_len = strlen(parent_subvol->path);
|
|
|
|
|
|
|
|
/* First make sure the parent subvol is actually in our path */
|
2017-02-22 22:56:36 +00:00
|
|
|
if (strstr(parent_subvol->path, rctx->full_root_path) != parent_subvol->path ||
|
|
|
|
(sub_len > root_len && parent_subvol->path[root_len] != '/')) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error(
|
|
|
|
"parent subvol is not reachable from inside the root subvol");
|
2015-06-10 19:05:51 +00:00
|
|
|
ret = -ENOENT;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sub_len == root_len) {
|
2017-02-22 22:56:36 +00:00
|
|
|
parent_subvol->path[0] = '.';
|
2015-06-10 19:05:51 +00:00
|
|
|
parent_subvol->path[1] = '\0';
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* root path is foo/bar
|
|
|
|
* subvol path is foo/bar/baz
|
|
|
|
*
|
|
|
|
* we need to have baz be the path, so we need to move
|
|
|
|
* the bit after foo/bar/, so path + root_len + 1, and
|
|
|
|
* move the part we care about, so sub_len - root_len -
|
|
|
|
* 1.
|
|
|
|
*/
|
|
|
|
memmove(parent_subvol->path,
|
|
|
|
parent_subvol->path + root_len + 1,
|
|
|
|
sub_len - root_len - 1);
|
|
|
|
parent_subvol->path[sub_len - root_len - 1] = '\0';
|
|
|
|
}
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2015-11-06 15:53:55 +00:00
|
|
|
if (*parent_subvol->path == 0)
|
2016-11-02 22:42:56 +00:00
|
|
|
args_v2.fd = dup(rctx->mnt_fd);
|
2015-06-10 19:05:51 +00:00
|
|
|
else
|
2016-11-02 22:42:56 +00:00
|
|
|
args_v2.fd = openat(rctx->mnt_fd, parent_subvol->path,
|
|
|
|
O_RDONLY | O_NOATIME);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (args_v2.fd < 0) {
|
|
|
|
ret = -errno;
|
2013-12-18 09:56:33 +00:00
|
|
|
if (errno != ENOENT)
|
2018-10-25 12:10:54 +00:00
|
|
|
error("cannot open %s: %m", parent_subvol->path);
|
2013-12-18 09:56:33 +00:00
|
|
|
else
|
|
|
|
fprintf(stderr,
|
|
|
|
"It seems that you have changed your default "
|
|
|
|
"subvolume or you specify other subvolume to\n"
|
|
|
|
"mount btrfs, try to remount this btrfs filesystem "
|
|
|
|
"with fs tree, and run btrfs receive again!\n");
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = ioctl(rctx->dest_dir_fd, BTRFS_IOC_SNAP_CREATE_V2, &args_v2);
|
2012-07-25 21:08:25 +00:00
|
|
|
close(args_v2.fd);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("creating snapshot %s -> %s failed: %m",
|
|
|
|
parent_subvol->path, path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
2022-01-02 01:50:16 +00:00
|
|
|
if (!IS_ERR_OR_NULL(parent_subvol)) {
|
2013-06-26 15:17:57 +00:00
|
|
|
free(parent_subvol->path);
|
|
|
|
free(parent_subvol);
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_mkfile(const char *path, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("mkfile: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "mkfile %s\n", path);
|
|
|
|
|
|
|
|
ret = creat(full_path, 0600);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("mkfile %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
close(ret);
|
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_mkdir(const char *path, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("mkdir: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "mkdir %s\n", path);
|
|
|
|
|
|
|
|
ret = mkdir(full_path, 0700);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("mkdir %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
out:
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_mknod(const char *path, u64 mode, u64 dev, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("mknod: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "mknod %s mode=%llu, dev=%llu\n",
|
|
|
|
path, mode, dev);
|
|
|
|
|
|
|
|
ret = mknod(full_path, mode & S_IFMT, dev);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("mknod %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
out:
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_mkfifo(const char *path, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("mkfifo: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "mkfifo %s\n", path);
|
|
|
|
|
|
|
|
ret = mkfifo(full_path, 0600);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("mkfifo %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
out:
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_mksock(const char *path, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("mksock: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "mksock %s\n", path);
|
|
|
|
|
|
|
|
ret = mknod(full_path, 0600 | S_IFSOCK, 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("mknod %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
out:
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_symlink(const char *path, const char *lnk, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("symlink: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "symlink %s -> %s\n", path, lnk);
|
|
|
|
|
|
|
|
ret = symlink(lnk, full_path);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("symlink %s -> %s failed: %m", path, lnk);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
out:
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_rename(const char *from, const char *to, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_from[PATH_MAX];
|
|
|
|
char full_to[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_from, rctx->full_subvol_path, from);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("rename: source path invalid: %s", from);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_to, rctx->full_subvol_path, to);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("rename: target path invalid: %s", to);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "rename %s -> %s\n", from, to);
|
|
|
|
|
|
|
|
ret = rename(full_from, full_to);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("rename %s -> %s failed: %m", from, to);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
out:
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_link(const char *path, const char *lnk, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
char full_link_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("link: source path invalid: %s", full_path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_link_path, rctx->full_subvol_path, lnk);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("link: target path invalid: %s", full_link_path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "link %s -> %s\n", path, lnk);
|
|
|
|
|
|
|
|
ret = link(full_link_path, full_path);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("link %s -> %s failed: %m", path, lnk);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
out:
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int process_unlink(const char *path, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("unlink: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "unlink %s\n", path);
|
|
|
|
|
|
|
|
ret = unlink(full_path);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("unlink %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
out:
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_rmdir(const char *path, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("rmdir: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "rmdir %s\n", path);
|
|
|
|
|
|
|
|
ret = rmdir(full_path);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("rmdir %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
out:
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
static int open_inode_for_write(struct btrfs_receive *rctx, const char *path)
|
2012-07-25 21:08:25 +00:00
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->write_fd != -1) {
|
|
|
|
if (strcmp(rctx->write_path, path) == 0)
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
2016-11-02 22:42:56 +00:00
|
|
|
close(rctx->write_fd);
|
|
|
|
rctx->write_fd = -1;
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->write_fd = open(path, O_RDWR);
|
|
|
|
if (rctx->write_fd < 0) {
|
2012-07-25 21:08:25 +00:00
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("cannot open %s: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2016-11-02 22:42:56 +00:00
|
|
|
strncpy_null(rctx->write_path, path);
|
2012-07-25 21:08:25 +00:00
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
static void close_inode_for_write(struct btrfs_receive *rctx)
|
2012-07-25 21:08:25 +00:00
|
|
|
{
|
2016-11-02 22:42:56 +00:00
|
|
|
if(rctx->write_fd == -1)
|
2014-04-18 23:14:14 +00:00
|
|
|
return;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
close(rctx->write_fd);
|
|
|
|
rctx->write_fd = -1;
|
|
|
|
rctx->write_path[0] = 0;
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int process_write(const char *path, const void *data, u64 offset,
|
|
|
|
u64 len, void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
2012-07-25 21:08:25 +00:00
|
|
|
u64 pos = 0;
|
|
|
|
int w;
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("write: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = open_inode_for_write(rctx, full_path);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 2)
|
2019-03-29 19:35:26 +00:00
|
|
|
fprintf(stderr, "write %s - offset=%llu length=%llu\n",
|
|
|
|
path, offset, len);
|
|
|
|
|
2012-07-25 21:08:25 +00:00
|
|
|
while (pos < len) {
|
2016-11-02 22:42:56 +00:00
|
|
|
w = pwrite(rctx->write_fd, (char*)data + pos, len - pos,
|
2012-07-25 21:08:25 +00:00
|
|
|
offset + pos);
|
|
|
|
if (w < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("writing to %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
pos += w;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_clone(const char *path, u64 offset, u64 len,
|
|
|
|
const u8 *clone_uuid, u64 clone_ctransid,
|
|
|
|
const char *clone_path, u64 clone_offset,
|
|
|
|
void *user)
|
|
|
|
{
|
2013-06-26 15:17:57 +00:00
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2012-07-25 21:08:25 +00:00
|
|
|
struct btrfs_ioctl_clone_range_args clone_args;
|
|
|
|
struct subvol_info *si = NULL;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
2019-07-22 19:15:03 +00:00
|
|
|
const char *subvol_path;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_clone_path[PATH_MAX];
|
2012-07-25 21:08:25 +00:00
|
|
|
int clone_fd = -1;
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("clone: source path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = open_inode_for_write(rctx, full_path);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
2020-03-11 08:17:10 +00:00
|
|
|
if (memcmp(clone_uuid, rctx->cur_subvol.received_uuid,
|
|
|
|
BTRFS_UUID_SIZE) == 0) {
|
|
|
|
subvol_path = rctx->cur_subvol_path;
|
|
|
|
} else {
|
2021-09-30 18:06:50 +00:00
|
|
|
si = subvol_uuid_search(rctx->mnt_fd, 0, clone_uuid, clone_ctransid,
|
2020-03-11 08:17:10 +00:00
|
|
|
NULL,
|
|
|
|
subvol_search_by_received_uuid);
|
|
|
|
if (IS_ERR_OR_NULL(si)) {
|
2016-12-15 08:37:02 +00:00
|
|
|
if (!si)
|
|
|
|
ret = -ENOENT;
|
|
|
|
else
|
|
|
|
ret = PTR_ERR(si);
|
2016-01-11 10:01:47 +00:00
|
|
|
error("clone: did not find source subvol");
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2017-02-22 22:56:37 +00:00
|
|
|
/* strip the subvolume that we are receiving to from the start of subvol_path */
|
|
|
|
if (rctx->full_root_path) {
|
|
|
|
size_t root_len = strlen(rctx->full_root_path);
|
|
|
|
size_t sub_len = strlen(si->path);
|
|
|
|
|
|
|
|
if (sub_len > root_len &&
|
|
|
|
strstr(si->path, rctx->full_root_path) == si->path &&
|
|
|
|
si->path[root_len] == '/') {
|
2019-07-22 19:15:03 +00:00
|
|
|
subvol_path = si->path + root_len + 1;
|
2017-02-22 22:56:37 +00:00
|
|
|
} else {
|
|
|
|
error("clone: source subvol path %s unreachable from %s",
|
|
|
|
si->path, rctx->full_root_path);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
} else {
|
2019-07-22 19:15:03 +00:00
|
|
|
subvol_path = si->path;
|
2017-02-22 22:56:37 +00:00
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
ret = path_cat_out(full_clone_path, subvol_path, clone_path);
|
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("clone: target path invalid: %s", clone_path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
clone_fd = openat(rctx->mnt_fd, full_clone_path, O_RDONLY | O_NOATIME);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (clone_fd < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("cannot open %s: %m", full_clone_path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 2)
|
2019-03-29 19:35:26 +00:00
|
|
|
fprintf(stderr,
|
|
|
|
"clone %s - source=%s source offset=%llu offset=%llu length=%llu\n",
|
|
|
|
path, clone_path, clone_offset, offset, len);
|
|
|
|
|
2012-07-25 21:08:25 +00:00
|
|
|
clone_args.src_fd = clone_fd;
|
|
|
|
clone_args.src_offset = clone_offset;
|
|
|
|
clone_args.src_length = len;
|
|
|
|
clone_args.dest_offset = offset;
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = ioctl(rctx->write_fd, BTRFS_IOC_CLONE_RANGE, &clone_args);
|
2016-01-12 12:35:50 +00:00
|
|
|
if (ret < 0) {
|
2012-07-25 21:08:25 +00:00
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("failed to clone extents to %s: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
2022-09-02 16:13:27 +00:00
|
|
|
if (!IS_ERR_OR_NULL(si)) {
|
2013-06-26 15:17:57 +00:00
|
|
|
free(si->path);
|
|
|
|
free(si);
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
if (clone_fd != -1)
|
|
|
|
close(clone_fd);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int process_set_xattr(const char *path, const char *name,
|
|
|
|
const void *data, int len, void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("set_xattr: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3) {
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "set_xattr %s - name=%s data_len=%d "
|
|
|
|
"data=%.*s\n", path, name, len,
|
|
|
|
len, (char*)data);
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = lsetxattr(full_path, name, data, len, 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("lsetxattr %s %s=%.*s failed: %m",
|
|
|
|
path, name, len, (char*)data);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_remove_xattr(const char *path, const char *name, void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("remove_xattr: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3) {
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "remove_xattr %s - name=%s\n",
|
|
|
|
path, name);
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = lremovexattr(full_path, name);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("lremovexattr %s %s failed: %m", path, name);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_truncate(const char *path, u64 size, void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("truncate: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "truncate %s size=%llu\n", path, size);
|
|
|
|
|
|
|
|
ret = truncate(full_path, size);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("truncate %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_chmod(const char *path, u64 mode, void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("chmod: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "chmod %s - mode=0%o\n", path, (int)mode);
|
|
|
|
|
|
|
|
ret = chmod(full_path, mode);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("chmod %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_chown(const char *path, u64 uid, u64 gid, void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("chown: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "chown %s - uid=%llu, gid=%llu\n", path,
|
|
|
|
uid, gid);
|
|
|
|
|
2012-10-17 13:53:58 +00:00
|
|
|
ret = lchown(full_path, uid, gid);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("chown %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_utimes(const char *path, struct timespec *at,
|
|
|
|
struct timespec *mt, struct timespec *ct,
|
|
|
|
void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
2012-07-25 21:08:25 +00:00
|
|
|
struct timespec tv[2];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("utimes: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "utimes %s\n", path);
|
|
|
|
|
|
|
|
tv[0] = *at;
|
|
|
|
tv[1] = *mt;
|
2013-04-09 17:08:44 +00:00
|
|
|
ret = utimensat(AT_FDCWD, full_path, tv, AT_SYMLINK_NOFOLLOW);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("utimes %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2015-06-11 17:31:01 +00:00
|
|
|
static int process_update_extent(const char *path, u64 offset, u64 len,
|
|
|
|
void *user)
|
|
|
|
{
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2015-06-11 17:31:01 +00:00
|
|
|
fprintf(stderr, "update_extent %s: offset=%llu, len=%llu\n",
|
2022-09-27 23:13:00 +00:00
|
|
|
path, offset, len);
|
2015-06-11 17:31:01 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Sent with BTRFS_SEND_FLAG_NO_FILE_DATA, nothing to do.
|
|
|
|
*/
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2022-03-17 17:25:49 +00:00
|
|
|
static int decompress_zlib(struct btrfs_receive *rctx, const char *encoded_data,
|
|
|
|
u64 encoded_len, char *unencoded_data,
|
|
|
|
u64 unencoded_len)
|
|
|
|
{
|
|
|
|
bool init = false;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!rctx->zlib_stream) {
|
|
|
|
init = true;
|
|
|
|
rctx->zlib_stream = malloc(sizeof(z_stream));
|
|
|
|
if (!rctx->zlib_stream) {
|
2022-09-30 07:12:06 +00:00
|
|
|
error_msg(ERROR_MSG_MEMORY, "zlib stream: %m");
|
2022-03-17 17:25:49 +00:00
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
rctx->zlib_stream->next_in = (void *)encoded_data;
|
|
|
|
rctx->zlib_stream->avail_in = encoded_len;
|
|
|
|
rctx->zlib_stream->next_out = (void *)unencoded_data;
|
|
|
|
rctx->zlib_stream->avail_out = unencoded_len;
|
|
|
|
|
|
|
|
if (init) {
|
|
|
|
rctx->zlib_stream->zalloc = Z_NULL;
|
|
|
|
rctx->zlib_stream->zfree = Z_NULL;
|
|
|
|
rctx->zlib_stream->opaque = Z_NULL;
|
|
|
|
ret = inflateInit(rctx->zlib_stream);
|
|
|
|
} else {
|
|
|
|
ret = inflateReset(rctx->zlib_stream);
|
|
|
|
}
|
|
|
|
if (ret != Z_OK) {
|
|
|
|
error("zlib inflate init failed: %d", ret);
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
while (rctx->zlib_stream->avail_in > 0 &&
|
|
|
|
rctx->zlib_stream->avail_out > 0) {
|
|
|
|
ret = inflate(rctx->zlib_stream, Z_FINISH);
|
|
|
|
if (ret == Z_STREAM_END) {
|
|
|
|
break;
|
|
|
|
} else if (ret != Z_OK) {
|
|
|
|
error("zlib inflate failed: %d", ret);
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-06-20 23:53:05 +00:00
|
|
|
#if COMPRESSION_ZSTD
|
2022-03-17 17:25:49 +00:00
|
|
|
static int decompress_zstd(struct btrfs_receive *rctx, const char *encoded_buf,
|
|
|
|
u64 encoded_len, char *unencoded_buf,
|
|
|
|
u64 unencoded_len)
|
|
|
|
{
|
|
|
|
ZSTD_inBuffer in_buf = {
|
|
|
|
.src = encoded_buf,
|
|
|
|
.size = encoded_len
|
|
|
|
};
|
|
|
|
ZSTD_outBuffer out_buf = {
|
|
|
|
.dst = unencoded_buf,
|
|
|
|
.size = unencoded_len
|
|
|
|
};
|
|
|
|
size_t ret;
|
|
|
|
|
|
|
|
if (!rctx->zstd_dstream) {
|
|
|
|
rctx->zstd_dstream = ZSTD_createDStream();
|
|
|
|
if (!rctx->zstd_dstream) {
|
|
|
|
error("failed to create zstd dstream");
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ret = ZSTD_initDStream(rctx->zstd_dstream);
|
|
|
|
if (ZSTD_isError(ret)) {
|
|
|
|
error("failed to init zstd stream: %s", ZSTD_getErrorName(ret));
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
while (in_buf.pos < in_buf.size && out_buf.pos < out_buf.size) {
|
|
|
|
ret = ZSTD_decompressStream(rctx->zstd_dstream, &out_buf, &in_buf);
|
|
|
|
if (ret == 0) {
|
|
|
|
break;
|
|
|
|
} else if (ZSTD_isError(ret)) {
|
|
|
|
error("failed to decompress zstd stream: %s",
|
|
|
|
ZSTD_getErrorName(ret));
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2022-06-20 23:30:23 +00:00
|
|
|
#endif
|
2022-03-17 17:25:49 +00:00
|
|
|
|
2022-06-20 23:53:05 +00:00
|
|
|
#if COMPRESSION_LZO
|
2022-03-17 17:25:49 +00:00
|
|
|
static int decompress_lzo(const char *encoded_data, u64 encoded_len,
|
|
|
|
char *unencoded_data, u64 unencoded_len,
|
|
|
|
unsigned int sector_size)
|
|
|
|
{
|
|
|
|
uint32_t total_len;
|
|
|
|
size_t in_pos, out_pos;
|
|
|
|
|
|
|
|
if (encoded_len < 4) {
|
|
|
|
error("lzo header is truncated");
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
memcpy(&total_len, encoded_data, 4);
|
|
|
|
total_len = le32toh(total_len);
|
|
|
|
if (total_len > encoded_len) {
|
|
|
|
error("lzo header is invalid");
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
in_pos = 4;
|
|
|
|
out_pos = 0;
|
|
|
|
while (in_pos < total_len && out_pos < unencoded_len) {
|
|
|
|
size_t sector_remaining;
|
|
|
|
uint32_t src_len;
|
|
|
|
lzo_uint dst_len;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
sector_remaining = -in_pos % sector_size;
|
|
|
|
if (sector_remaining < 4) {
|
|
|
|
if (total_len - in_pos <= sector_remaining)
|
|
|
|
break;
|
|
|
|
in_pos += sector_remaining;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (total_len - in_pos < 4) {
|
|
|
|
error("lzo segment header is truncated");
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(&src_len, encoded_data + in_pos, 4);
|
|
|
|
src_len = le32toh(src_len);
|
|
|
|
in_pos += 4;
|
|
|
|
if (src_len > total_len - in_pos) {
|
|
|
|
error("lzo segment header is invalid");
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
dst_len = sector_size;
|
|
|
|
ret = lzo1x_decompress_safe((void *)(encoded_data + in_pos),
|
|
|
|
src_len,
|
|
|
|
(void *)(unencoded_data + out_pos),
|
|
|
|
&dst_len, NULL);
|
|
|
|
if (ret != LZO_E_OK) {
|
|
|
|
error("lzo1x_decompress_safe failed: %d", ret);
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
in_pos += src_len;
|
|
|
|
out_pos += dst_len;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2022-06-20 23:30:23 +00:00
|
|
|
#endif
|
2022-03-17 17:25:49 +00:00
|
|
|
|
|
|
|
static int decompress_and_write(struct btrfs_receive *rctx,
|
|
|
|
const char *encoded_data, u64 offset,
|
|
|
|
u64 encoded_len, u64 unencoded_file_len,
|
|
|
|
u64 unencoded_len, u64 unencoded_offset,
|
|
|
|
u32 compression)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
size_t pos;
|
|
|
|
ssize_t w;
|
|
|
|
char *unencoded_data;
|
2022-06-20 23:30:23 +00:00
|
|
|
int sector_shift = 0;
|
2022-03-17 17:25:49 +00:00
|
|
|
|
|
|
|
unencoded_data = calloc(unencoded_len, 1);
|
|
|
|
if (!unencoded_data) {
|
2022-09-30 07:12:06 +00:00
|
|
|
error_msg(ERROR_MSG_MEMORY, "unencoded data: %m");
|
2022-03-17 17:25:49 +00:00
|
|
|
return -errno;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (compression) {
|
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_ZLIB:
|
|
|
|
ret = decompress_zlib(rctx, encoded_data, encoded_len,
|
|
|
|
unencoded_data, unencoded_len);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
break;
|
2022-06-20 23:53:05 +00:00
|
|
|
#if COMPRESSION_ZSTD
|
2022-03-17 17:25:49 +00:00
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_ZSTD:
|
|
|
|
ret = decompress_zstd(rctx, encoded_data, encoded_len,
|
|
|
|
unencoded_data, unencoded_len);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
break;
|
2022-06-20 23:30:23 +00:00
|
|
|
#else
|
|
|
|
error("ZSTD compression for stream not compiled in");
|
|
|
|
ret = -EOPNOTSUPP;
|
|
|
|
goto out;
|
|
|
|
#endif
|
2022-03-17 17:25:49 +00:00
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_LZO_4K:
|
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_LZO_8K:
|
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_LZO_16K:
|
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_LZO_32K:
|
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_LZO_64K:
|
2022-06-20 23:53:05 +00:00
|
|
|
#if COMPRESSION_LZO
|
2022-03-17 17:25:49 +00:00
|
|
|
sector_shift =
|
|
|
|
compression - BTRFS_ENCODED_IO_COMPRESSION_LZO_4K + 12;
|
|
|
|
ret = decompress_lzo(encoded_data, encoded_len, unencoded_data,
|
|
|
|
unencoded_len, 1U << sector_shift);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
break;
|
2022-06-20 23:30:23 +00:00
|
|
|
#else
|
|
|
|
error("LZO compression for stream not compiled in");
|
|
|
|
ret = -EOPNOTSUPP;
|
|
|
|
goto out;
|
|
|
|
#endif
|
2022-03-17 17:25:49 +00:00
|
|
|
default:
|
|
|
|
error("unknown compression: %d", compression);
|
|
|
|
ret = -EOPNOTSUPP;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
pos = unencoded_offset;
|
|
|
|
while (pos < unencoded_file_len) {
|
|
|
|
w = pwrite(rctx->write_fd, unencoded_data + pos,
|
|
|
|
unencoded_file_len - pos, offset);
|
|
|
|
if (w < 0) {
|
|
|
|
ret = -errno;
|
|
|
|
error("writing unencoded data failed: %m");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
pos += w;
|
|
|
|
offset += w;
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
free(unencoded_data);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2022-03-17 17:25:48 +00:00
|
|
|
static int process_encoded_write(const char *path, const void *data, u64 offset,
|
|
|
|
u64 len, u64 unencoded_file_len,
|
|
|
|
u64 unencoded_len, u64 unencoded_offset,
|
|
|
|
u32 compression, u32 encryption, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
struct btrfs_receive *rctx = user;
|
|
|
|
char full_path[PATH_MAX];
|
|
|
|
struct iovec iov = { (char *)data, len };
|
|
|
|
struct btrfs_ioctl_encoded_io_args encoded = {
|
|
|
|
.iov = &iov,
|
|
|
|
.iovcnt = 1,
|
|
|
|
.offset = offset,
|
|
|
|
.len = unencoded_file_len,
|
|
|
|
.unencoded_len = unencoded_len,
|
|
|
|
.unencoded_offset = unencoded_offset,
|
|
|
|
.compression = compression,
|
|
|
|
.encryption = encryption,
|
|
|
|
};
|
|
|
|
|
btrfs-progs: receive: add debug messages when processing encoded writes
Unlike for commands from the v1 stream, we have no debug messages logged
when processing encoded write commands, which makes it harder to debug
issues.
So add log messages, when the log verbosity level is >= 3, for encoded
write commands, mentioning the value of all fields and also log when we
fallback from an encoded write to the decompress and write approach.
The log messages look like this:
encoded_write f3 - offset=33792, len=4096, unencoded_offset=33792, unencoded_file_len=31744, unencoded_len=65536, compression=1, encryption=0
encoded_write f3 - falling back to decompress and write due to errno 22 ("Invalid argument")
Reviewed-by: Boris Burkov <boris@bur.io>
Signed-off-by: Filipe Manana <fdmanana@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
2022-11-15 16:25:24 +00:00
|
|
|
if (bconf.verbose >= 3)
|
|
|
|
fprintf(stderr,
|
|
|
|
"encoded_write %s - offset=%llu, len=%llu, unencoded_offset=%llu, unencoded_file_len=%llu, unencoded_len=%llu, compression=%u, encryption=%u\n",
|
|
|
|
path, offset, len, unencoded_offset, unencoded_file_len,
|
|
|
|
unencoded_len, compression, encryption);
|
|
|
|
|
2022-03-17 17:25:48 +00:00
|
|
|
if (encryption) {
|
|
|
|
error("encoded_write: encryption not supported");
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
|
|
|
if (ret < 0) {
|
|
|
|
error("encoded_write: path invalid: %s", path);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = open_inode_for_write(rctx, full_path);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
|
2022-03-17 17:25:49 +00:00
|
|
|
if (!rctx->force_decompress) {
|
|
|
|
ret = ioctl(rctx->write_fd, BTRFS_IOC_ENCODED_WRITE, &encoded);
|
|
|
|
if (ret >= 0)
|
|
|
|
return 0;
|
|
|
|
/* Fall back for these errors, fail hard for anything else. */
|
|
|
|
if (errno != ENOSPC && errno != ENOTTY && errno != EINVAL) {
|
|
|
|
ret = -errno;
|
|
|
|
error("encoded_write: writing to %s failed: %m", path);
|
|
|
|
return ret;
|
|
|
|
}
|
btrfs-progs: receive: add debug messages when processing encoded writes
Unlike for commands from the v1 stream, we have no debug messages logged
when processing encoded write commands, which makes it harder to debug
issues.
So add log messages, when the log verbosity level is >= 3, for encoded
write commands, mentioning the value of all fields and also log when we
fallback from an encoded write to the decompress and write approach.
The log messages look like this:
encoded_write f3 - offset=33792, len=4096, unencoded_offset=33792, unencoded_file_len=31744, unencoded_len=65536, compression=1, encryption=0
encoded_write f3 - falling back to decompress and write due to errno 22 ("Invalid argument")
Reviewed-by: Boris Burkov <boris@bur.io>
Signed-off-by: Filipe Manana <fdmanana@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
2022-11-15 16:25:24 +00:00
|
|
|
if (bconf.verbose >= 3)
|
|
|
|
fprintf(stderr,
|
|
|
|
"encoded_write %s - falling back to decompress and write due to errno %d (\"%m\")\n",
|
|
|
|
path, errno);
|
2022-03-17 17:25:48 +00:00
|
|
|
}
|
2022-03-17 17:25:49 +00:00
|
|
|
|
|
|
|
return decompress_and_write(rctx, data, offset, len, unencoded_file_len,
|
|
|
|
unencoded_len, unencoded_offset,
|
|
|
|
compression);
|
2022-03-17 17:25:48 +00:00
|
|
|
}
|
|
|
|
|
2022-03-17 17:25:50 +00:00
|
|
|
static int process_fallocate(const char *path, int mode, u64 offset, u64 len,
|
|
|
|
void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
struct btrfs_receive *rctx = user;
|
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
|
|
|
if (ret < 0) {
|
|
|
|
error("fallocate: path invalid: %s", path);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
ret = open_inode_for_write(rctx, full_path);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
ret = fallocate(rctx->write_fd, mode, offset, len);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
|
|
|
error("fallocate: fallocate on %s failed: %m", path);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-06-21 15:35:03 +00:00
|
|
|
static int process_fileattr(const char *path, u64 attr, void *user)
|
2022-03-17 17:25:51 +00:00
|
|
|
{
|
btrfs-progs: receive: work around failure of fileattr commands
Currently fileattr commands, introduced in the send stream v2, always
fail, since we have commented the FS_IOC_SETFLAGS ioctl() call and set
'ret' to -EOPNOTSUPP, which is then overwritten to -errno, which may
have a random value since it was not initialized before. This results
in a failure like this:
ERROR: fileattr: set file attributes on p0/f1 failed: Invalid argument
The error reason may be something else, since errno is undefined at
this point.
Unfortunately we don't have a way yet to apply attributes, since the
attributes value we get from the kernel is what we store in flags field
of the inode item. This means that for example we can not just call
FS_IOC_SETFLAGS with the values we got, since they need to be converted
from BTRFS_INODE_* flags to FS_* flags
Besides that we'll have to reorder how we apply certain attributes like
FS_NOCOW_FL for example, which must happen always on an empty file and
right now we run write commands before attempting to change attributes,
as that's the order the kernel sends the operations.
So for now comment all the code, so that anyone using the v2 stream will
not have a receive failure but will get a behaviour like the v1 stream:
file attributes are ignored. This will have to be fixed later, but right
now people can't use a send stream v2 for the purpose of getting better
performance by avoid decompressing extents at the source and compression
of the data at the destination.
Link: https://lore.kernel.org/linux-btrfs/6cb11fa5-c60d-e65b-0295-301a694e66ad@inbox.ru/
Fixes: 8356c423e619 ("btrfs-progs: receive: implement FILEATTR command")
Signed-off-by: Filipe Manana <fdmanana@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
2022-11-03 16:53:27 +00:00
|
|
|
/*
|
|
|
|
* Not yet supported, ignored for now, just like in send stream v1.
|
|
|
|
* The content of 'attr' matches the flags in the btrfs inode item,
|
|
|
|
* we can't apply them directly with FS_IOC_SETFLAGS, as we need to
|
|
|
|
* convert them from BTRFS_INODE_* flags to FS_* flags. Plus some
|
|
|
|
* flags are special and must be applied in a special way.
|
|
|
|
* The commented code below therefore does not work.
|
|
|
|
*/
|
2022-03-17 17:25:51 +00:00
|
|
|
|
btrfs-progs: receive: work around failure of fileattr commands
Currently fileattr commands, introduced in the send stream v2, always
fail, since we have commented the FS_IOC_SETFLAGS ioctl() call and set
'ret' to -EOPNOTSUPP, which is then overwritten to -errno, which may
have a random value since it was not initialized before. This results
in a failure like this:
ERROR: fileattr: set file attributes on p0/f1 failed: Invalid argument
The error reason may be something else, since errno is undefined at
this point.
Unfortunately we don't have a way yet to apply attributes, since the
attributes value we get from the kernel is what we store in flags field
of the inode item. This means that for example we can not just call
FS_IOC_SETFLAGS with the values we got, since they need to be converted
from BTRFS_INODE_* flags to FS_* flags
Besides that we'll have to reorder how we apply certain attributes like
FS_NOCOW_FL for example, which must happen always on an empty file and
right now we run write commands before attempting to change attributes,
as that's the order the kernel sends the operations.
So for now comment all the code, so that anyone using the v2 stream will
not have a receive failure but will get a behaviour like the v1 stream:
file attributes are ignored. This will have to be fixed later, but right
now people can't use a send stream v2 for the purpose of getting better
performance by avoid decompressing extents at the source and compression
of the data at the destination.
Link: https://lore.kernel.org/linux-btrfs/6cb11fa5-c60d-e65b-0295-301a694e66ad@inbox.ru/
Fixes: 8356c423e619 ("btrfs-progs: receive: implement FILEATTR command")
Signed-off-by: Filipe Manana <fdmanana@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
2022-11-03 16:53:27 +00:00
|
|
|
/* int ret; */
|
|
|
|
/* struct btrfs_receive *rctx = user; */
|
|
|
|
/* char full_path[PATH_MAX]; */
|
|
|
|
|
|
|
|
/* ret = path_cat_out(full_path, rctx->full_subvol_path, path); */
|
|
|
|
/* if (ret < 0) { */
|
|
|
|
/* error("fileattr: path invalid: %s", path); */
|
|
|
|
/* return ret; */
|
|
|
|
/* } */
|
|
|
|
/* ret = open_inode_for_write(rctx, full_path); */
|
|
|
|
/* if (ret < 0) */
|
|
|
|
/* return ret; */
|
|
|
|
/* ret = ioctl(rctx->write_fd, FS_IOC_SETFLAGS, &attr); */
|
|
|
|
/* if (ret < 0) { */
|
|
|
|
/* ret = -errno; */
|
|
|
|
/* error("fileattr: set file attributes on %s failed: %m", path); */
|
|
|
|
/* return ret; */
|
|
|
|
/* } */
|
2022-03-17 17:25:51 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-08-15 20:54:42 +00:00
|
|
|
#if HAVE_LINUX_FSVERITY_H
|
|
|
|
static int process_enable_verity(const char *path, u8 algorithm, u32 block_size,
|
|
|
|
int salt_len, char *salt,
|
|
|
|
int sig_len, char *sig, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
int ioctl_fd;
|
|
|
|
struct btrfs_receive *rctx = user;
|
|
|
|
char full_path[PATH_MAX];
|
|
|
|
struct fsverity_enable_arg verity_args = {
|
|
|
|
.version = 1,
|
|
|
|
.hash_algorithm = algorithm,
|
|
|
|
.block_size = block_size,
|
|
|
|
};
|
|
|
|
|
|
|
|
if (salt_len) {
|
|
|
|
verity_args.salt_size = salt_len;
|
|
|
|
verity_args.salt_ptr = (__u64)(uintptr_t)salt;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sig_len) {
|
|
|
|
verity_args.sig_size = sig_len;
|
|
|
|
verity_args.sig_ptr = (__u64)(uintptr_t)sig;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
|
|
|
if (ret < 0) {
|
|
|
|
error("write: path invalid: %s", path);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ioctl_fd = open(full_path, O_RDONLY);
|
|
|
|
if (ioctl_fd < 0) {
|
|
|
|
ret = -errno;
|
|
|
|
error("cannot open %s for verity ioctl: %m", full_path);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Enabling verity denies write access, so it cannot be done with an
|
|
|
|
* open writeable file descriptor.
|
|
|
|
*/
|
|
|
|
close_inode_for_write(rctx);
|
|
|
|
ret = ioctl(ioctl_fd, FS_IOC_ENABLE_VERITY, &verity_args);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
|
|
|
error("failed to enable verity on %s: %d", full_path, ret);
|
|
|
|
}
|
|
|
|
|
|
|
|
close(ioctl_fd);
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
#else
|
|
|
|
|
|
|
|
static int process_enable_verity(const char *path, u8 algorithm, u32 block_size,
|
|
|
|
int salt_len, char *salt,
|
|
|
|
int sig_len, char *sig, void *user)
|
|
|
|
{
|
|
|
|
error("fs-verity for stream not compiled in");
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2013-08-09 20:20:47 +00:00
|
|
|
static struct btrfs_send_ops send_ops = {
|
2012-07-25 21:08:25 +00:00
|
|
|
.subvol = process_subvol,
|
|
|
|
.snapshot = process_snapshot,
|
|
|
|
.mkfile = process_mkfile,
|
|
|
|
.mkdir = process_mkdir,
|
|
|
|
.mknod = process_mknod,
|
|
|
|
.mkfifo = process_mkfifo,
|
|
|
|
.mksock = process_mksock,
|
|
|
|
.symlink = process_symlink,
|
|
|
|
.rename = process_rename,
|
|
|
|
.link = process_link,
|
|
|
|
.unlink = process_unlink,
|
|
|
|
.rmdir = process_rmdir,
|
|
|
|
.write = process_write,
|
|
|
|
.clone = process_clone,
|
|
|
|
.set_xattr = process_set_xattr,
|
|
|
|
.remove_xattr = process_remove_xattr,
|
|
|
|
.truncate = process_truncate,
|
|
|
|
.chmod = process_chmod,
|
|
|
|
.chown = process_chown,
|
|
|
|
.utimes = process_utimes,
|
2015-06-11 17:31:01 +00:00
|
|
|
.update_extent = process_update_extent,
|
2022-03-17 17:25:48 +00:00
|
|
|
.encoded_write = process_encoded_write,
|
2022-03-17 17:25:50 +00:00
|
|
|
.fallocate = process_fallocate,
|
2022-06-21 15:35:03 +00:00
|
|
|
.fileattr = process_fileattr,
|
2022-08-15 20:54:42 +00:00
|
|
|
.enable_verity = process_enable_verity,
|
2012-07-25 21:08:25 +00:00
|
|
|
};
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
static int do_receive(struct btrfs_receive *rctx, const char *tomnt,
|
2015-05-27 17:51:29 +00:00
|
|
|
char *realmnt, int r_fd, u64 max_errors)
|
2012-07-25 21:08:25 +00:00
|
|
|
{
|
2015-06-10 19:05:51 +00:00
|
|
|
u64 subvol_id;
|
2012-07-25 21:08:25 +00:00
|
|
|
int ret;
|
2013-04-09 17:08:45 +00:00
|
|
|
char *dest_dir_full_path;
|
2015-06-16 13:15:51 +00:00
|
|
|
char root_subvol_path[PATH_MAX];
|
2022-10-05 18:02:13 +00:00
|
|
|
bool end = false;
|
2017-04-29 21:54:05 +00:00
|
|
|
int iterations = 0;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2013-04-09 17:08:45 +00:00
|
|
|
dest_dir_full_path = realpath(tomnt, NULL);
|
|
|
|
if (!dest_dir_full_path) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("realpath(%s) failed: %m", tomnt);
|
2013-04-09 17:08:45 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->dest_dir_fd = open(dest_dir_full_path, O_RDONLY | O_NOATIME);
|
|
|
|
if (rctx->dest_dir_fd < 0) {
|
2013-04-09 17:08:45 +00:00
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("cannot open destination directory %s: %m",
|
|
|
|
dest_dir_full_path);
|
2013-04-09 17:08:45 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2015-06-12 13:58:55 +00:00
|
|
|
if (realmnt[0]) {
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->root_path = realmnt;
|
2015-05-27 17:51:29 +00:00
|
|
|
} else {
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = find_mount_root(dest_dir_full_path, &rctx->root_path);
|
2015-05-27 17:51:29 +00:00
|
|
|
if (ret < 0) {
|
2018-10-25 12:10:54 +00:00
|
|
|
errno = -ret;
|
|
|
|
error("failed to determine mount point for %s: %m",
|
|
|
|
dest_dir_full_path);
|
2015-05-27 17:51:29 +00:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (ret > 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("%s doesn't belong to btrfs mount point",
|
|
|
|
dest_dir_full_path);
|
2015-05-27 17:51:29 +00:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
2014-07-23 05:47:35 +00:00
|
|
|
}
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->mnt_fd = open(rctx->root_path, O_RDONLY | O_NOATIME);
|
|
|
|
if (rctx->mnt_fd < 0) {
|
2012-07-25 21:08:25 +00:00
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("cannot open %s: %m", rctx->root_path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2015-06-10 19:05:51 +00:00
|
|
|
/*
|
|
|
|
* If we use -m or a default subvol we want to resolve the path to the
|
|
|
|
* subvolume we're sitting in so that we can adjust the paths of any
|
|
|
|
* subvols we want to receive in.
|
|
|
|
*/
|
2021-09-08 09:16:43 +00:00
|
|
|
ret = lookup_path_rootid(rctx->mnt_fd, &subvol_id);
|
|
|
|
if (ret) {
|
|
|
|
errno = -ret;
|
|
|
|
error("cannot resolve rootid for path: %m");
|
2015-06-10 19:05:51 +00:00
|
|
|
goto out;
|
2021-09-08 09:16:43 +00:00
|
|
|
}
|
2015-06-10 19:05:51 +00:00
|
|
|
|
2015-06-16 13:15:51 +00:00
|
|
|
root_subvol_path[0] = 0;
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = btrfs_subvolid_resolve(rctx->mnt_fd, root_subvol_path,
|
2015-06-12 11:18:44 +00:00
|
|
|
PATH_MAX, subvol_id);
|
2015-06-10 19:05:51 +00:00
|
|
|
if (ret) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("cannot resolve our subvol path");
|
2015-06-10 19:05:51 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Ok we're inside of a subvol off of the root subvol, we need to
|
|
|
|
* actually set full_root_path.
|
|
|
|
*/
|
2015-11-06 15:53:55 +00:00
|
|
|
if (*root_subvol_path)
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->full_root_path = root_subvol_path;
|
2015-06-10 19:05:51 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->dest_dir_chroot) {
|
2015-04-19 11:46:28 +00:00
|
|
|
if (chroot(dest_dir_full_path)) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("failed to chroot to %s: %m", dest_dir_full_path);
|
2015-04-19 11:46:28 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (chdir("/")) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("failed to chdir to / after chroot: %m");
|
2015-04-19 11:46:28 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2015-04-24 16:01:32 +00:00
|
|
|
fprintf(stderr, "Chroot to %s\n", dest_dir_full_path);
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->root_path = strdup("/");
|
|
|
|
rctx->dest_dir_path = rctx->root_path;
|
2015-04-19 11:46:28 +00:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* find_mount_root returns a root_path that is a subpath of
|
|
|
|
* dest_dir_full_path. Now get the other part of root_path,
|
|
|
|
* which is the destination dir relative to root_path.
|
|
|
|
*/
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->dest_dir_path = dest_dir_full_path + strlen(rctx->root_path);
|
|
|
|
while (rctx->dest_dir_path[0] == '/')
|
|
|
|
rctx->dest_dir_path++;
|
2015-04-19 11:46:28 +00:00
|
|
|
}
|
2013-04-09 17:08:45 +00:00
|
|
|
|
2012-07-25 21:08:25 +00:00
|
|
|
while (!end) {
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = btrfs_read_and_process_send_stream(r_fd, &send_ops,
|
|
|
|
rctx,
|
|
|
|
rctx->honor_end_cmd,
|
2014-05-23 19:14:56 +00:00
|
|
|
max_errors);
|
2017-04-29 21:54:05 +00:00
|
|
|
if (ret < 0) {
|
|
|
|
if (ret != -ENODATA)
|
|
|
|
goto out;
|
|
|
|
|
2017-04-03 20:21:07 +00:00
|
|
|
/* Empty stream is invalid */
|
2017-04-29 21:54:05 +00:00
|
|
|
if (iterations == 0) {
|
|
|
|
error("empty stream is not considered valid");
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 1;
|
2016-11-29 15:07:19 +00:00
|
|
|
}
|
2017-04-03 20:21:07 +00:00
|
|
|
if (ret > 0)
|
2022-10-05 18:02:13 +00:00
|
|
|
end = true;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
close_inode_for_write(rctx);
|
|
|
|
ret = finish_subvol(rctx);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
2017-04-29 21:54:05 +00:00
|
|
|
|
|
|
|
iterations++;
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
out:
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->write_fd != -1) {
|
|
|
|
close(rctx->write_fd);
|
|
|
|
rctx->write_fd = -1;
|
2013-04-09 17:08:35 +00:00
|
|
|
}
|
2015-12-03 18:45:44 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->root_path != realmnt)
|
|
|
|
free(rctx->root_path);
|
|
|
|
rctx->root_path = NULL;
|
|
|
|
rctx->dest_dir_path = NULL;
|
2013-04-09 17:08:45 +00:00
|
|
|
free(dest_dir_full_path);
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->mnt_fd != -1) {
|
|
|
|
close(rctx->mnt_fd);
|
|
|
|
rctx->mnt_fd = -1;
|
2013-04-09 17:08:35 +00:00
|
|
|
}
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->dest_dir_fd != -1) {
|
|
|
|
close(rctx->dest_dir_fd);
|
|
|
|
rctx->dest_dir_fd = -1;
|
2013-04-09 17:08:45 +00:00
|
|
|
}
|
2022-06-20 23:53:05 +00:00
|
|
|
#if COMPRESSION_ZSTD
|
2022-03-17 17:25:49 +00:00
|
|
|
if (rctx->zstd_dstream)
|
|
|
|
ZSTD_freeDStream(rctx->zstd_dstream);
|
2022-06-20 23:30:23 +00:00
|
|
|
#endif
|
2022-03-17 17:25:49 +00:00
|
|
|
if (rctx->zlib_stream) {
|
|
|
|
inflateEnd(rctx->zlib_stream);
|
|
|
|
free(rctx->zlib_stream);
|
|
|
|
}
|
2015-06-16 13:15:51 +00:00
|
|
|
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-03-07 02:07:03 +00:00
|
|
|
static const char * const cmd_receive_usage[] = {
|
2018-03-07 02:04:15 +00:00
|
|
|
"btrfs receive [options] <mount>\n"
|
|
|
|
"btrfs receive --dump [options]",
|
|
|
|
"Receive subvolumes from a stream",
|
|
|
|
"Receives one or more subvolumes that were previously",
|
|
|
|
"sent with btrfs send. The received subvolumes are stored",
|
|
|
|
"into MOUNT.",
|
|
|
|
"The receive will fail in case the receiving subvolume",
|
|
|
|
"already exists. It will also fail in case a previously",
|
|
|
|
"received subvolume has been changed after it was received.",
|
|
|
|
"After receiving a subvolume, it is immediately set to",
|
|
|
|
"read-only.",
|
|
|
|
"",
|
|
|
|
"-q|--quiet suppress all messages, except errors",
|
|
|
|
"-f FILE read the stream from FILE instead of stdin",
|
|
|
|
"-e terminate after receiving an <end cmd> marker in the stream.",
|
|
|
|
" Without this option the receiver side terminates only in case",
|
|
|
|
" of an error on end of file.",
|
|
|
|
"-C|--chroot confine the process to <mount> using chroot",
|
|
|
|
"-E|--max-errors NERR",
|
|
|
|
" terminate as soon as NERR errors occur while",
|
|
|
|
" stream processing commands from the stream.",
|
|
|
|
" Default value is 1. A value of 0 means no limit.",
|
|
|
|
"-m ROOTMOUNT the root mount point of the destination filesystem.",
|
|
|
|
" If /proc is not accessible, use this to tell us where",
|
|
|
|
" this file system is mounted.",
|
2022-03-17 17:25:49 +00:00
|
|
|
"--force-decompress",
|
|
|
|
" if the stream contains compressed data, always",
|
|
|
|
" decompress it instead of writing it with encoded I/O",
|
2018-03-07 02:04:15 +00:00
|
|
|
"--dump dump stream metadata, one line per operation,",
|
|
|
|
" does not require the MOUNT parameter",
|
2020-06-26 20:20:56 +00:00
|
|
|
"-v deprecated, alias for global -v option",
|
2019-11-25 10:39:05 +00:00
|
|
|
HELPINFO_INSERT_GLOBALS,
|
|
|
|
HELPINFO_INSERT_VERBOSE,
|
|
|
|
HELPINFO_INSERT_QUIET,
|
2022-06-20 23:30:23 +00:00
|
|
|
"",
|
|
|
|
"Compression support: zlib"
|
2022-06-20 23:53:05 +00:00
|
|
|
#if COMPRESSION_LZO
|
2022-06-20 23:30:23 +00:00
|
|
|
", lzo"
|
|
|
|
#endif
|
2022-06-20 23:53:05 +00:00
|
|
|
#if COMPRESSION_ZSTD
|
2022-06-20 23:30:23 +00:00
|
|
|
", zstd"
|
2022-08-15 20:54:42 +00:00
|
|
|
#endif
|
|
|
|
,
|
|
|
|
"Feature support:"
|
|
|
|
#if HAVE_LINUX_FSVERITY_H
|
|
|
|
" fsverity"
|
2022-06-20 23:30:23 +00:00
|
|
|
#endif
|
|
|
|
,
|
2018-03-07 02:04:15 +00:00
|
|
|
NULL
|
|
|
|
};
|
|
|
|
|
2018-03-07 02:24:46 +00:00
|
|
|
static int cmd_receive(const struct cmd_struct *cmd, int argc, char **argv)
|
2012-07-25 21:08:25 +00:00
|
|
|
{
|
|
|
|
char *tomnt = NULL;
|
2015-06-12 14:37:31 +00:00
|
|
|
char fromfile[PATH_MAX];
|
2015-06-12 13:58:55 +00:00
|
|
|
char realmnt[PATH_MAX];
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive rctx;
|
2012-07-25 21:08:25 +00:00
|
|
|
int receive_fd = fileno(stdin);
|
2014-05-23 19:14:56 +00:00
|
|
|
u64 max_errors = 1;
|
2022-10-05 18:02:13 +00:00
|
|
|
bool dump = false;
|
2015-06-09 12:58:43 +00:00
|
|
|
int ret = 0;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
memset(&rctx, 0, sizeof(rctx));
|
|
|
|
rctx.mnt_fd = -1;
|
|
|
|
rctx.write_fd = -1;
|
|
|
|
rctx.dest_dir_fd = -1;
|
2022-06-21 00:29:10 +00:00
|
|
|
rctx.dest_dir_chroot = false;
|
2015-06-12 13:58:55 +00:00
|
|
|
realmnt[0] = 0;
|
2015-06-12 14:37:31 +00:00
|
|
|
fromfile[0] = 0;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
/*
|
|
|
|
* Init global verbose to default, if it is unset.
|
|
|
|
* Default is 1 for historical reasons, changing may break scripts that
|
|
|
|
* expect the 'At subvol' message.
|
|
|
|
* As default is 1, which means the effective verbose for receive is 2
|
|
|
|
* which global verbose is unaware. So adjust global verbose value here.
|
|
|
|
*/
|
|
|
|
if (bconf.verbose == BTRFS_BCONF_UNSET)
|
|
|
|
bconf.verbose = 1;
|
|
|
|
else if (bconf.verbose > BTRFS_BCONF_QUIET)
|
|
|
|
bconf.verbose++;
|
|
|
|
|
2018-06-20 00:38:38 +00:00
|
|
|
optind = 0;
|
2015-01-19 12:30:06 +00:00
|
|
|
while (1) {
|
|
|
|
int c;
|
2022-03-17 17:25:49 +00:00
|
|
|
enum {
|
2022-06-21 00:20:21 +00:00
|
|
|
GETOPT_VAL_DUMP = GETOPT_VAL_FIRST,
|
2022-03-17 17:25:49 +00:00
|
|
|
GETOPT_VAL_FORCE_DECOMPRESS,
|
|
|
|
};
|
2015-01-19 12:30:06 +00:00
|
|
|
static const struct option long_opts[] = {
|
2015-04-08 15:39:51 +00:00
|
|
|
{ "max-errors", required_argument, NULL, 'E' },
|
2015-04-19 11:46:28 +00:00
|
|
|
{ "chroot", no_argument, NULL, 'C' },
|
2016-09-07 00:29:34 +00:00
|
|
|
{ "dump", no_argument, NULL, GETOPT_VAL_DUMP },
|
2019-03-05 13:00:46 +00:00
|
|
|
{ "quiet", no_argument, NULL, 'q' },
|
2022-03-17 17:25:49 +00:00
|
|
|
{ "force-decompress", no_argument, NULL, GETOPT_VAL_FORCE_DECOMPRESS },
|
2015-01-19 12:30:06 +00:00
|
|
|
{ NULL, 0, NULL, 0 }
|
|
|
|
};
|
|
|
|
|
2019-03-05 13:00:46 +00:00
|
|
|
c = getopt_long(argc, argv, "Cevqf:m:E:", long_opts, NULL);
|
2015-01-19 12:30:06 +00:00
|
|
|
if (c < 0)
|
|
|
|
break;
|
|
|
|
|
2012-07-25 21:08:25 +00:00
|
|
|
switch (c) {
|
|
|
|
case 'v':
|
2019-11-25 10:39:05 +00:00
|
|
|
bconf_be_verbose();
|
2012-07-25 21:08:25 +00:00
|
|
|
break;
|
2019-03-05 13:00:46 +00:00
|
|
|
case 'q':
|
2019-11-25 10:39:05 +00:00
|
|
|
bconf_be_quiet();
|
2019-03-05 13:00:46 +00:00
|
|
|
break;
|
2012-07-25 21:08:25 +00:00
|
|
|
case 'f':
|
2015-06-12 14:37:31 +00:00
|
|
|
if (arg_copy_path(fromfile, optarg, sizeof(fromfile))) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("input file path too long (%zu)",
|
|
|
|
strlen(optarg));
|
2015-06-12 14:37:31 +00:00
|
|
|
ret = 1;
|
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
break;
|
2013-04-09 17:08:40 +00:00
|
|
|
case 'e':
|
2022-06-21 00:29:10 +00:00
|
|
|
rctx.honor_end_cmd = true;
|
2013-04-09 17:08:40 +00:00
|
|
|
break;
|
2015-04-19 11:46:28 +00:00
|
|
|
case 'C':
|
2022-06-21 00:29:10 +00:00
|
|
|
rctx.dest_dir_chroot = true;
|
2015-04-19 11:46:28 +00:00
|
|
|
break;
|
2014-05-23 19:14:56 +00:00
|
|
|
case 'E':
|
|
|
|
max_errors = arg_strtou64(optarg);
|
|
|
|
break;
|
2015-05-27 17:51:29 +00:00
|
|
|
case 'm':
|
2015-06-12 13:58:55 +00:00
|
|
|
if (arg_copy_path(realmnt, optarg, sizeof(realmnt))) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("mount point path too long (%zu)",
|
|
|
|
strlen(optarg));
|
2015-06-12 13:58:55 +00:00
|
|
|
ret = 1;
|
2015-06-09 12:58:43 +00:00
|
|
|
goto out;
|
2015-05-27 17:51:29 +00:00
|
|
|
}
|
|
|
|
break;
|
2016-09-07 00:29:34 +00:00
|
|
|
case GETOPT_VAL_DUMP:
|
2022-10-05 18:02:13 +00:00
|
|
|
dump = true;
|
2016-09-07 00:29:34 +00:00
|
|
|
break;
|
2022-03-17 17:25:49 +00:00
|
|
|
case GETOPT_VAL_FORCE_DECOMPRESS:
|
|
|
|
rctx.force_decompress = true;
|
|
|
|
break;
|
2012-07-25 21:08:25 +00:00
|
|
|
default:
|
2018-03-07 02:54:38 +00:00
|
|
|
usage_unknown_option(cmd, argv);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-09-07 00:29:34 +00:00
|
|
|
if (dump && check_argc_exact(argc - optind, 0))
|
2018-03-07 02:54:38 +00:00
|
|
|
usage(cmd);
|
2016-09-07 00:29:34 +00:00
|
|
|
if (!dump && check_argc_exact(argc - optind, 1))
|
2018-03-07 02:54:38 +00:00
|
|
|
usage(cmd);
|
2012-07-25 21:08:25 +00:00
|
|
|
|
|
|
|
tomnt = argv[optind];
|
|
|
|
|
2015-06-12 14:37:31 +00:00
|
|
|
if (fromfile[0]) {
|
2012-07-25 21:08:25 +00:00
|
|
|
receive_fd = open(fromfile, O_RDONLY | O_NOATIME);
|
|
|
|
if (receive_fd < 0) {
|
2018-01-07 21:54:21 +00:00
|
|
|
error("cannot open %s: %m", fromfile);
|
2015-06-09 12:58:43 +00:00
|
|
|
goto out;
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-09-07 00:29:34 +00:00
|
|
|
if (dump) {
|
|
|
|
struct btrfs_dump_send_args dump_args;
|
|
|
|
|
|
|
|
dump_args.root_path[0] = '.';
|
|
|
|
dump_args.root_path[1] = '\0';
|
|
|
|
dump_args.full_subvol_path[0] = '.';
|
|
|
|
dump_args.full_subvol_path[1] = '\0';
|
|
|
|
ret = btrfs_read_and_process_send_stream(receive_fd,
|
2018-10-15 13:02:11 +00:00
|
|
|
&btrfs_print_send_ops, &dump_args, 0, max_errors);
|
2018-10-25 12:10:54 +00:00
|
|
|
if (ret < 0) {
|
|
|
|
errno = -ret;
|
|
|
|
error("failed to dump the send stream: %m");
|
|
|
|
}
|
2016-09-07 00:29:34 +00:00
|
|
|
} else {
|
|
|
|
ret = do_receive(&rctx, tomnt, realmnt, receive_fd, max_errors);
|
|
|
|
}
|
|
|
|
|
2016-01-14 08:40:24 +00:00
|
|
|
if (receive_fd != fileno(stdin))
|
|
|
|
close(receive_fd);
|
2015-06-09 12:58:43 +00:00
|
|
|
out:
|
|
|
|
|
2013-09-04 15:22:27 +00:00
|
|
|
return !!ret;
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
2018-03-07 02:07:03 +00:00
|
|
|
DEFINE_SIMPLE_COMMAND(receive, "receive");
|