2012-07-25 21:08:25 +00:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2012 Alexander Block. All rights reserved.
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public
|
|
|
|
* License v2 as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public
|
|
|
|
* License along with this program; if not, write to the
|
|
|
|
* Free Software Foundation, Inc., 59 Temple Place - Suite 330,
|
|
|
|
* Boston, MA 021110-1307, USA.
|
|
|
|
*/
|
|
|
|
|
2012-09-20 21:26:28 +00:00
|
|
|
#include "kerncompat.h"
|
2022-09-14 15:06:52 +00:00
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <sys/xattr.h>
|
|
|
|
#include <linux/fs.h>
|
2022-08-15 20:54:42 +00:00
|
|
|
#if HAVE_LINUX_FSVERITY_H
|
|
|
|
#include <linux/fsverity.h>
|
|
|
|
#endif
|
2012-07-25 21:08:25 +00:00
|
|
|
#include <unistd.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <fcntl.h>
|
2014-05-23 19:14:56 +00:00
|
|
|
#include <getopt.h>
|
2015-07-29 18:37:37 +00:00
|
|
|
#include <limits.h>
|
2022-03-17 17:25:48 +00:00
|
|
|
#include <errno.h>
|
2022-09-15 11:59:39 +00:00
|
|
|
#include <endian.h>
|
|
|
|
#include <stdbool.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
2012-07-25 21:08:25 +00:00
|
|
|
#include <uuid/uuid.h>
|
2022-03-17 17:25:49 +00:00
|
|
|
#include <zlib.h>
|
2022-06-20 23:30:23 +00:00
|
|
|
#if COMPRESSION_LZO
|
|
|
|
#include <lzo/lzoconf.h>
|
|
|
|
#include <lzo/lzo1x.h>
|
|
|
|
#endif
|
2022-06-20 23:53:05 +00:00
|
|
|
#if COMPRESSION_ZSTD
|
2022-03-17 17:25:49 +00:00
|
|
|
#include <zstd.h>
|
2022-06-20 23:30:23 +00:00
|
|
|
#endif
|
2020-08-18 13:56:04 +00:00
|
|
|
#include "kernel-shared/ctree.h"
|
2022-09-15 11:59:39 +00:00
|
|
|
#include "common/defs.h"
|
|
|
|
#include "common/messages.h"
|
2022-09-14 15:06:52 +00:00
|
|
|
#include "common/utils.h"
|
2020-08-18 13:56:04 +00:00
|
|
|
#include "common/send-stream.h"
|
2020-08-18 13:56:04 +00:00
|
|
|
#include "common/send-utils.h"
|
2019-06-19 23:46:21 +00:00
|
|
|
#include "common/help.h"
|
2019-07-01 18:54:39 +00:00
|
|
|
#include "common/path-utils.h"
|
2022-09-15 21:15:17 +00:00
|
|
|
#include "common/string-utils.h"
|
2022-09-14 15:06:52 +00:00
|
|
|
#include "cmds/commands.h"
|
|
|
|
#include "cmds/receive-dump.h"
|
|
|
|
#include "ioctl.h"
|
2012-07-25 21:08:25 +00:00
|
|
|
|
|
|
|
struct btrfs_receive
|
|
|
|
{
|
|
|
|
int mnt_fd;
|
2013-04-09 17:08:45 +00:00
|
|
|
int dest_dir_fd;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
|
|
|
int write_fd;
|
2015-06-16 13:28:44 +00:00
|
|
|
char write_path[PATH_MAX];
|
2012-07-25 21:08:25 +00:00
|
|
|
|
|
|
|
char *root_path;
|
2013-04-09 17:08:45 +00:00
|
|
|
char *dest_dir_path; /* relative to root_path */
|
2015-06-16 13:36:42 +00:00
|
|
|
char full_subvol_path[PATH_MAX];
|
2015-06-10 19:05:51 +00:00
|
|
|
char *full_root_path;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2015-06-12 13:40:07 +00:00
|
|
|
struct subvol_info cur_subvol;
|
2015-06-16 13:56:37 +00:00
|
|
|
/*
|
|
|
|
* Substitute for cur_subvol::path which is a pointer and we cannot
|
|
|
|
* change it to an array as it's a public API.
|
|
|
|
*/
|
|
|
|
char cur_subvol_path[PATH_MAX];
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2022-06-21 00:29:10 +00:00
|
|
|
bool dest_dir_chroot;
|
|
|
|
|
|
|
|
bool honor_end_cmd;
|
2022-03-17 17:25:49 +00:00
|
|
|
|
|
|
|
bool force_decompress;
|
|
|
|
|
2022-06-20 23:53:05 +00:00
|
|
|
#if COMPRESSION_ZSTD
|
2022-03-17 17:25:49 +00:00
|
|
|
/* Reuse stream objects for encoded_write decompression fallback */
|
|
|
|
ZSTD_DStream *zstd_dstream;
|
2022-06-20 23:30:23 +00:00
|
|
|
#endif
|
2022-03-17 17:25:49 +00:00
|
|
|
z_stream *zlib_stream;
|
2012-07-25 21:08:25 +00:00
|
|
|
};
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
static int finish_subvol(struct btrfs_receive *rctx)
|
2012-07-25 21:08:25 +00:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
int subvol_fd = -1;
|
|
|
|
struct btrfs_ioctl_received_subvol_args rs_args;
|
2013-12-10 17:17:10 +00:00
|
|
|
char uuid_str[BTRFS_UUID_UNPARSED_SIZE];
|
2012-07-25 21:08:25 +00:00
|
|
|
u64 flags;
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->cur_subvol_path[0] == 0)
|
2012-07-25 21:08:25 +00:00
|
|
|
return 0;
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
subvol_fd = openat(rctx->mnt_fd, rctx->cur_subvol_path,
|
|
|
|
O_RDONLY | O_NOATIME);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (subvol_fd < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("cannot open %s: %m", rctx->cur_subvol_path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&rs_args, 0, sizeof(rs_args));
|
2016-11-02 22:42:56 +00:00
|
|
|
memcpy(rs_args.uuid, rctx->cur_subvol.received_uuid, BTRFS_UUID_SIZE);
|
|
|
|
rs_args.stransid = rctx->cur_subvol.stransid;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 2) {
|
2012-07-25 21:08:25 +00:00
|
|
|
uuid_unparse((u8*)rs_args.uuid, uuid_str);
|
|
|
|
fprintf(stderr, "BTRFS_IOC_SET_RECEIVED_SUBVOL uuid=%s, "
|
|
|
|
"stransid=%llu\n", uuid_str, rs_args.stransid);
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = ioctl(subvol_fd, BTRFS_IOC_SET_RECEIVED_SUBVOL, &rs_args);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("ioctl BTRFS_IOC_SET_RECEIVED_SUBVOL failed: %m");
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->cur_subvol.rtransid = rs_args.rtransid;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
|
|
|
ret = ioctl(subvol_fd, BTRFS_IOC_SUBVOL_GETFLAGS, &flags);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("ioctl BTRFS_IOC_SUBVOL_GETFLAGS failed: %m");
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
flags |= BTRFS_SUBVOL_RDONLY;
|
|
|
|
|
|
|
|
ret = ioctl(subvol_fd, BTRFS_IOC_SUBVOL_SETFLAGS, &flags);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("failed to make subvolume read only: %m");
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
out:
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->cur_subvol_path[0]) {
|
|
|
|
rctx->cur_subvol_path[0] = 0;
|
2013-06-26 15:17:57 +00:00
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
if (subvol_fd != -1)
|
|
|
|
close(subvol_fd);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_subvol(const char *path, const u8 *uuid, u64 ctransid,
|
|
|
|
void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2012-07-25 21:08:25 +00:00
|
|
|
struct btrfs_ioctl_vol_args args_v1;
|
2013-12-10 17:17:10 +00:00
|
|
|
char uuid_str[BTRFS_UUID_UNPARSED_SIZE];
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = finish_subvol(rctx);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->cur_subvol.path) {
|
2016-09-06 11:08:29 +00:00
|
|
|
error("subvol: another one already started, path ptr: %s",
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->cur_subvol.path);
|
2016-09-06 11:08:29 +00:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->cur_subvol_path[0]) {
|
2016-09-06 11:08:29 +00:00
|
|
|
error("subvol: another one already started, path buf: %s",
|
2019-06-17 07:59:36 +00:00
|
|
|
rctx->cur_subvol_path);
|
2016-09-06 11:08:29 +00:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
if (*rctx->dest_dir_path == 0) {
|
|
|
|
strncpy_null(rctx->cur_subvol_path, path);
|
2015-06-16 13:56:37 +00:00
|
|
|
} else {
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(rctx->cur_subvol_path, rctx->dest_dir_path,
|
|
|
|
path);
|
2015-06-16 13:56:37 +00:00
|
|
|
if (ret < 0) {
|
2016-10-28 16:47:35 +00:00
|
|
|
error("subvol: path invalid: %s", path);
|
2015-06-16 13:56:37 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat3_out(rctx->full_subvol_path, rctx->root_path,
|
|
|
|
rctx->dest_dir_path, path);
|
2015-06-16 13:36:42 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("subvol: path invalid: %s", path);
|
2015-06-16 13:36:42 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose > BTRFS_BCONF_QUIET)
|
2019-03-05 13:00:46 +00:00
|
|
|
fprintf(stderr, "At subvol %s\n", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
memcpy(rctx->cur_subvol.received_uuid, uuid, BTRFS_UUID_SIZE);
|
|
|
|
rctx->cur_subvol.stransid = ctransid;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 2) {
|
2016-11-02 22:42:56 +00:00
|
|
|
uuid_unparse((u8*)rctx->cur_subvol.received_uuid, uuid_str);
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "receiving subvol %s uuid=%s, stransid=%llu\n",
|
|
|
|
path, uuid_str,
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->cur_subvol.stransid);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
memset(&args_v1, 0, sizeof(args_v1));
|
2013-01-25 19:27:48 +00:00
|
|
|
strncpy_null(args_v1.name, path);
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = ioctl(rctx->dest_dir_fd, BTRFS_IOC_SUBVOL_CREATE, &args_v1);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("creating subvolume %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_snapshot(const char *path, const u8 *uuid, u64 ctransid,
|
|
|
|
const u8 *parent_uuid, u64 parent_ctransid,
|
|
|
|
void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2013-12-10 17:17:10 +00:00
|
|
|
char uuid_str[BTRFS_UUID_UNPARSED_SIZE];
|
2012-07-25 21:08:25 +00:00
|
|
|
struct btrfs_ioctl_vol_args_v2 args_v2;
|
2013-06-26 15:17:57 +00:00
|
|
|
struct subvol_info *parent_subvol = NULL;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = finish_subvol(rctx);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->cur_subvol.path) {
|
2016-09-06 11:08:29 +00:00
|
|
|
error("snapshot: another one already started, path ptr: %s",
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->cur_subvol.path);
|
2016-09-06 11:08:29 +00:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->cur_subvol_path[0]) {
|
2016-09-06 11:08:29 +00:00
|
|
|
error("snapshot: another one already started, path buf: %s",
|
2019-06-17 07:59:36 +00:00
|
|
|
rctx->cur_subvol_path);
|
2016-09-06 11:08:29 +00:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
if (*rctx->dest_dir_path == 0) {
|
|
|
|
strncpy_null(rctx->cur_subvol_path, path);
|
2015-06-16 13:56:37 +00:00
|
|
|
} else {
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(rctx->cur_subvol_path, rctx->dest_dir_path,
|
|
|
|
path);
|
2015-06-16 13:56:37 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("snapshot: path invalid: %s", path);
|
2015-06-16 13:56:37 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat3_out(rctx->full_subvol_path, rctx->root_path,
|
|
|
|
rctx->dest_dir_path, path);
|
2015-06-16 13:36:42 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("snapshot: path invalid: %s", path);
|
2015-06-16 13:36:42 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
pr_verbose(1, "At snapshot %s\n", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
memcpy(rctx->cur_subvol.received_uuid, uuid, BTRFS_UUID_SIZE);
|
|
|
|
rctx->cur_subvol.stransid = ctransid;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 2) {
|
2016-11-02 22:42:56 +00:00
|
|
|
uuid_unparse((u8*)rctx->cur_subvol.received_uuid, uuid_str);
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "receiving snapshot %s uuid=%s, "
|
|
|
|
"ctransid=%llu ", path, uuid_str,
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->cur_subvol.stransid);
|
2012-07-25 21:08:25 +00:00
|
|
|
uuid_unparse(parent_uuid, uuid_str);
|
|
|
|
fprintf(stderr, "parent_uuid=%s, parent_ctransid=%llu\n",
|
|
|
|
uuid_str, parent_ctransid);
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&args_v2, 0, sizeof(args_v2));
|
2013-01-25 19:27:48 +00:00
|
|
|
strncpy_null(args_v2.name, path);
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2021-09-30 18:06:50 +00:00
|
|
|
parent_subvol = subvol_uuid_search(rctx->mnt_fd, 0, parent_uuid,
|
2016-11-02 22:42:56 +00:00
|
|
|
parent_ctransid, NULL,
|
|
|
|
subvol_search_by_received_uuid);
|
2016-12-15 08:37:02 +00:00
|
|
|
if (IS_ERR_OR_NULL(parent_subvol)) {
|
2021-09-30 18:06:50 +00:00
|
|
|
parent_subvol = subvol_uuid_search(rctx->mnt_fd, 0, parent_uuid,
|
2016-11-02 22:42:56 +00:00
|
|
|
parent_ctransid, NULL,
|
|
|
|
subvol_search_by_uuid);
|
2013-11-13 09:25:46 +00:00
|
|
|
}
|
2016-12-15 08:37:02 +00:00
|
|
|
if (IS_ERR_OR_NULL(parent_subvol)) {
|
|
|
|
if (!parent_subvol)
|
|
|
|
ret = -ENOENT;
|
|
|
|
else
|
|
|
|
ret = PTR_ERR(parent_subvol);
|
2016-01-11 10:01:47 +00:00
|
|
|
error("cannot find parent subvolume");
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2015-06-10 19:05:51 +00:00
|
|
|
/*
|
|
|
|
* The path is resolved from the root subvol, but we could be in some
|
|
|
|
* subvolume under the root subvolume, so try and adjust the path to be
|
|
|
|
* relative to our root path.
|
|
|
|
*/
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->full_root_path) {
|
2015-06-10 19:05:51 +00:00
|
|
|
size_t root_len;
|
|
|
|
size_t sub_len;
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
root_len = strlen(rctx->full_root_path);
|
2015-06-10 19:05:51 +00:00
|
|
|
sub_len = strlen(parent_subvol->path);
|
|
|
|
|
|
|
|
/* First make sure the parent subvol is actually in our path */
|
2017-02-22 22:56:36 +00:00
|
|
|
if (strstr(parent_subvol->path, rctx->full_root_path) != parent_subvol->path ||
|
|
|
|
(sub_len > root_len && parent_subvol->path[root_len] != '/')) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error(
|
|
|
|
"parent subvol is not reachable from inside the root subvol");
|
2015-06-10 19:05:51 +00:00
|
|
|
ret = -ENOENT;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sub_len == root_len) {
|
2017-02-22 22:56:36 +00:00
|
|
|
parent_subvol->path[0] = '.';
|
2015-06-10 19:05:51 +00:00
|
|
|
parent_subvol->path[1] = '\0';
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* root path is foo/bar
|
|
|
|
* subvol path is foo/bar/baz
|
|
|
|
*
|
|
|
|
* we need to have baz be the path, so we need to move
|
|
|
|
* the bit after foo/bar/, so path + root_len + 1, and
|
|
|
|
* move the part we care about, so sub_len - root_len -
|
|
|
|
* 1.
|
|
|
|
*/
|
|
|
|
memmove(parent_subvol->path,
|
|
|
|
parent_subvol->path + root_len + 1,
|
|
|
|
sub_len - root_len - 1);
|
|
|
|
parent_subvol->path[sub_len - root_len - 1] = '\0';
|
|
|
|
}
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2015-11-06 15:53:55 +00:00
|
|
|
if (*parent_subvol->path == 0)
|
2016-11-02 22:42:56 +00:00
|
|
|
args_v2.fd = dup(rctx->mnt_fd);
|
2015-06-10 19:05:51 +00:00
|
|
|
else
|
2016-11-02 22:42:56 +00:00
|
|
|
args_v2.fd = openat(rctx->mnt_fd, parent_subvol->path,
|
|
|
|
O_RDONLY | O_NOATIME);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (args_v2.fd < 0) {
|
|
|
|
ret = -errno;
|
2013-12-18 09:56:33 +00:00
|
|
|
if (errno != ENOENT)
|
2018-10-25 12:10:54 +00:00
|
|
|
error("cannot open %s: %m", parent_subvol->path);
|
2013-12-18 09:56:33 +00:00
|
|
|
else
|
|
|
|
fprintf(stderr,
|
|
|
|
"It seems that you have changed your default "
|
|
|
|
"subvolume or you specify other subvolume to\n"
|
|
|
|
"mount btrfs, try to remount this btrfs filesystem "
|
|
|
|
"with fs tree, and run btrfs receive again!\n");
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = ioctl(rctx->dest_dir_fd, BTRFS_IOC_SNAP_CREATE_V2, &args_v2);
|
2012-07-25 21:08:25 +00:00
|
|
|
close(args_v2.fd);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("creating snapshot %s -> %s failed: %m",
|
|
|
|
parent_subvol->path, path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
2022-01-02 01:50:16 +00:00
|
|
|
if (!IS_ERR_OR_NULL(parent_subvol)) {
|
2013-06-26 15:17:57 +00:00
|
|
|
free(parent_subvol->path);
|
|
|
|
free(parent_subvol);
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_mkfile(const char *path, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("mkfile: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "mkfile %s\n", path);
|
|
|
|
|
|
|
|
ret = creat(full_path, 0600);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("mkfile %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
close(ret);
|
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_mkdir(const char *path, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("mkdir: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "mkdir %s\n", path);
|
|
|
|
|
|
|
|
ret = mkdir(full_path, 0700);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("mkdir %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
out:
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_mknod(const char *path, u64 mode, u64 dev, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("mknod: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "mknod %s mode=%llu, dev=%llu\n",
|
|
|
|
path, mode, dev);
|
|
|
|
|
|
|
|
ret = mknod(full_path, mode & S_IFMT, dev);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("mknod %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
out:
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_mkfifo(const char *path, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("mkfifo: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "mkfifo %s\n", path);
|
|
|
|
|
|
|
|
ret = mkfifo(full_path, 0600);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("mkfifo %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
out:
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_mksock(const char *path, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("mksock: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "mksock %s\n", path);
|
|
|
|
|
|
|
|
ret = mknod(full_path, 0600 | S_IFSOCK, 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("mknod %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
out:
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_symlink(const char *path, const char *lnk, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("symlink: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "symlink %s -> %s\n", path, lnk);
|
|
|
|
|
|
|
|
ret = symlink(lnk, full_path);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("symlink %s -> %s failed: %m", path, lnk);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
out:
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_rename(const char *from, const char *to, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_from[PATH_MAX];
|
|
|
|
char full_to[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_from, rctx->full_subvol_path, from);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("rename: source path invalid: %s", from);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_to, rctx->full_subvol_path, to);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("rename: target path invalid: %s", to);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "rename %s -> %s\n", from, to);
|
|
|
|
|
|
|
|
ret = rename(full_from, full_to);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("rename %s -> %s failed: %m", from, to);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
out:
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_link(const char *path, const char *lnk, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
char full_link_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("link: source path invalid: %s", full_path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_link_path, rctx->full_subvol_path, lnk);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("link: target path invalid: %s", full_link_path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "link %s -> %s\n", path, lnk);
|
|
|
|
|
|
|
|
ret = link(full_link_path, full_path);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("link %s -> %s failed: %m", path, lnk);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
out:
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int process_unlink(const char *path, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("unlink: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "unlink %s\n", path);
|
|
|
|
|
|
|
|
ret = unlink(full_path);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("unlink %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
out:
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_rmdir(const char *path, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("rmdir: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "rmdir %s\n", path);
|
|
|
|
|
|
|
|
ret = rmdir(full_path);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("rmdir %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
out:
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
static int open_inode_for_write(struct btrfs_receive *rctx, const char *path)
|
2012-07-25 21:08:25 +00:00
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->write_fd != -1) {
|
|
|
|
if (strcmp(rctx->write_path, path) == 0)
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
2016-11-02 22:42:56 +00:00
|
|
|
close(rctx->write_fd);
|
|
|
|
rctx->write_fd = -1;
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->write_fd = open(path, O_RDWR);
|
|
|
|
if (rctx->write_fd < 0) {
|
2012-07-25 21:08:25 +00:00
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("cannot open %s: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2016-11-02 22:42:56 +00:00
|
|
|
strncpy_null(rctx->write_path, path);
|
2012-07-25 21:08:25 +00:00
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
static void close_inode_for_write(struct btrfs_receive *rctx)
|
2012-07-25 21:08:25 +00:00
|
|
|
{
|
2016-11-02 22:42:56 +00:00
|
|
|
if(rctx->write_fd == -1)
|
2014-04-18 23:14:14 +00:00
|
|
|
return;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
close(rctx->write_fd);
|
|
|
|
rctx->write_fd = -1;
|
|
|
|
rctx->write_path[0] = 0;
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int process_write(const char *path, const void *data, u64 offset,
|
|
|
|
u64 len, void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
2012-07-25 21:08:25 +00:00
|
|
|
u64 pos = 0;
|
|
|
|
int w;
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("write: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = open_inode_for_write(rctx, full_path);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 2)
|
2019-03-29 19:35:26 +00:00
|
|
|
fprintf(stderr, "write %s - offset=%llu length=%llu\n",
|
|
|
|
path, offset, len);
|
|
|
|
|
2012-07-25 21:08:25 +00:00
|
|
|
while (pos < len) {
|
2016-11-02 22:42:56 +00:00
|
|
|
w = pwrite(rctx->write_fd, (char*)data + pos, len - pos,
|
2012-07-25 21:08:25 +00:00
|
|
|
offset + pos);
|
|
|
|
if (w < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("writing to %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
pos += w;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_clone(const char *path, u64 offset, u64 len,
|
|
|
|
const u8 *clone_uuid, u64 clone_ctransid,
|
|
|
|
const char *clone_path, u64 clone_offset,
|
|
|
|
void *user)
|
|
|
|
{
|
2013-06-26 15:17:57 +00:00
|
|
|
int ret;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2012-07-25 21:08:25 +00:00
|
|
|
struct btrfs_ioctl_clone_range_args clone_args;
|
|
|
|
struct subvol_info *si = NULL;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
2019-07-22 19:15:03 +00:00
|
|
|
const char *subvol_path;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_clone_path[PATH_MAX];
|
2012-07-25 21:08:25 +00:00
|
|
|
int clone_fd = -1;
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("clone: source path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = open_inode_for_write(rctx, full_path);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
2020-03-11 08:17:10 +00:00
|
|
|
if (memcmp(clone_uuid, rctx->cur_subvol.received_uuid,
|
|
|
|
BTRFS_UUID_SIZE) == 0) {
|
|
|
|
subvol_path = rctx->cur_subvol_path;
|
|
|
|
} else {
|
2021-09-30 18:06:50 +00:00
|
|
|
si = subvol_uuid_search(rctx->mnt_fd, 0, clone_uuid, clone_ctransid,
|
2020-03-11 08:17:10 +00:00
|
|
|
NULL,
|
|
|
|
subvol_search_by_received_uuid);
|
|
|
|
if (IS_ERR_OR_NULL(si)) {
|
2016-12-15 08:37:02 +00:00
|
|
|
if (!si)
|
|
|
|
ret = -ENOENT;
|
|
|
|
else
|
|
|
|
ret = PTR_ERR(si);
|
2016-01-11 10:01:47 +00:00
|
|
|
error("clone: did not find source subvol");
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2017-02-22 22:56:37 +00:00
|
|
|
/* strip the subvolume that we are receiving to from the start of subvol_path */
|
|
|
|
if (rctx->full_root_path) {
|
|
|
|
size_t root_len = strlen(rctx->full_root_path);
|
|
|
|
size_t sub_len = strlen(si->path);
|
|
|
|
|
|
|
|
if (sub_len > root_len &&
|
|
|
|
strstr(si->path, rctx->full_root_path) == si->path &&
|
|
|
|
si->path[root_len] == '/') {
|
2019-07-22 19:15:03 +00:00
|
|
|
subvol_path = si->path + root_len + 1;
|
2017-02-22 22:56:37 +00:00
|
|
|
} else {
|
|
|
|
error("clone: source subvol path %s unreachable from %s",
|
|
|
|
si->path, rctx->full_root_path);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
} else {
|
2019-07-22 19:15:03 +00:00
|
|
|
subvol_path = si->path;
|
2017-02-22 22:56:37 +00:00
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:18:40 +00:00
|
|
|
ret = path_cat_out(full_clone_path, subvol_path, clone_path);
|
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("clone: target path invalid: %s", clone_path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
clone_fd = openat(rctx->mnt_fd, full_clone_path, O_RDONLY | O_NOATIME);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (clone_fd < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("cannot open %s: %m", full_clone_path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 2)
|
2019-03-29 19:35:26 +00:00
|
|
|
fprintf(stderr,
|
|
|
|
"clone %s - source=%s source offset=%llu offset=%llu length=%llu\n",
|
|
|
|
path, clone_path, clone_offset, offset, len);
|
|
|
|
|
2012-07-25 21:08:25 +00:00
|
|
|
clone_args.src_fd = clone_fd;
|
|
|
|
clone_args.src_offset = clone_offset;
|
|
|
|
clone_args.src_length = len;
|
|
|
|
clone_args.dest_offset = offset;
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = ioctl(rctx->write_fd, BTRFS_IOC_CLONE_RANGE, &clone_args);
|
2016-01-12 12:35:50 +00:00
|
|
|
if (ret < 0) {
|
2012-07-25 21:08:25 +00:00
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("failed to clone extents to %s: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
2022-09-02 16:13:27 +00:00
|
|
|
if (!IS_ERR_OR_NULL(si)) {
|
2013-06-26 15:17:57 +00:00
|
|
|
free(si->path);
|
|
|
|
free(si);
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
if (clone_fd != -1)
|
|
|
|
close(clone_fd);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int process_set_xattr(const char *path, const char *name,
|
|
|
|
const void *data, int len, void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("set_xattr: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3) {
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "set_xattr %s - name=%s data_len=%d "
|
|
|
|
"data=%.*s\n", path, name, len,
|
|
|
|
len, (char*)data);
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = lsetxattr(full_path, name, data, len, 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("lsetxattr %s %s=%.*s failed: %m",
|
|
|
|
path, name, len, (char*)data);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_remove_xattr(const char *path, const char *name, void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("remove_xattr: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3) {
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "remove_xattr %s - name=%s\n",
|
|
|
|
path, name);
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = lremovexattr(full_path, name);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("lremovexattr %s %s failed: %m", path, name);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_truncate(const char *path, u64 size, void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("truncate: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "truncate %s size=%llu\n", path, size);
|
|
|
|
|
|
|
|
ret = truncate(full_path, size);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("truncate %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_chmod(const char *path, u64 mode, void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("chmod: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "chmod %s - mode=0%o\n", path, (int)mode);
|
|
|
|
|
|
|
|
ret = chmod(full_path, mode);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("chmod %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_chown(const char *path, u64 uid, u64 gid, void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("chown: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "chown %s - uid=%llu, gid=%llu\n", path,
|
|
|
|
uid, gid);
|
|
|
|
|
2012-10-17 13:53:58 +00:00
|
|
|
ret = lchown(full_path, uid, gid);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("chown %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_utimes(const char *path, struct timespec *at,
|
|
|
|
struct timespec *mt, struct timespec *ct,
|
|
|
|
void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-12 16:18:40 +00:00
|
|
|
char full_path[PATH_MAX];
|
2012-07-25 21:08:25 +00:00
|
|
|
struct timespec tv[2];
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-12 16:18:40 +00:00
|
|
|
if (ret < 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("utimes: path invalid: %s", path);
|
2015-06-12 16:18:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-25 21:08:25 +00:00
|
|
|
fprintf(stderr, "utimes %s\n", path);
|
|
|
|
|
|
|
|
tv[0] = *at;
|
|
|
|
tv[1] = *mt;
|
2013-04-09 17:08:44 +00:00
|
|
|
ret = utimensat(AT_FDCWD, full_path, tv, AT_SYMLINK_NOFOLLOW);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("utimes %s failed: %m", path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2015-06-11 17:31:01 +00:00
|
|
|
static int process_update_extent(const char *path, u64 offset, u64 len,
|
|
|
|
void *user)
|
|
|
|
{
|
2019-11-25 10:39:05 +00:00
|
|
|
if (bconf.verbose >= 3)
|
2015-06-11 17:31:01 +00:00
|
|
|
fprintf(stderr, "update_extent %s: offset=%llu, len=%llu\n",
|
2022-09-27 23:13:00 +00:00
|
|
|
path, offset, len);
|
2015-06-11 17:31:01 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Sent with BTRFS_SEND_FLAG_NO_FILE_DATA, nothing to do.
|
|
|
|
*/
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2022-03-17 17:25:49 +00:00
|
|
|
static int decompress_zlib(struct btrfs_receive *rctx, const char *encoded_data,
|
|
|
|
u64 encoded_len, char *unencoded_data,
|
|
|
|
u64 unencoded_len)
|
|
|
|
{
|
|
|
|
bool init = false;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!rctx->zlib_stream) {
|
|
|
|
init = true;
|
|
|
|
rctx->zlib_stream = malloc(sizeof(z_stream));
|
|
|
|
if (!rctx->zlib_stream) {
|
2022-09-30 07:12:06 +00:00
|
|
|
error_msg(ERROR_MSG_MEMORY, "zlib stream: %m");
|
2022-03-17 17:25:49 +00:00
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
rctx->zlib_stream->next_in = (void *)encoded_data;
|
|
|
|
rctx->zlib_stream->avail_in = encoded_len;
|
|
|
|
rctx->zlib_stream->next_out = (void *)unencoded_data;
|
|
|
|
rctx->zlib_stream->avail_out = unencoded_len;
|
|
|
|
|
|
|
|
if (init) {
|
|
|
|
rctx->zlib_stream->zalloc = Z_NULL;
|
|
|
|
rctx->zlib_stream->zfree = Z_NULL;
|
|
|
|
rctx->zlib_stream->opaque = Z_NULL;
|
|
|
|
ret = inflateInit(rctx->zlib_stream);
|
|
|
|
} else {
|
|
|
|
ret = inflateReset(rctx->zlib_stream);
|
|
|
|
}
|
|
|
|
if (ret != Z_OK) {
|
|
|
|
error("zlib inflate init failed: %d", ret);
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
while (rctx->zlib_stream->avail_in > 0 &&
|
|
|
|
rctx->zlib_stream->avail_out > 0) {
|
|
|
|
ret = inflate(rctx->zlib_stream, Z_FINISH);
|
|
|
|
if (ret == Z_STREAM_END) {
|
|
|
|
break;
|
|
|
|
} else if (ret != Z_OK) {
|
|
|
|
error("zlib inflate failed: %d", ret);
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-06-20 23:53:05 +00:00
|
|
|
#if COMPRESSION_ZSTD
|
2022-03-17 17:25:49 +00:00
|
|
|
static int decompress_zstd(struct btrfs_receive *rctx, const char *encoded_buf,
|
|
|
|
u64 encoded_len, char *unencoded_buf,
|
|
|
|
u64 unencoded_len)
|
|
|
|
{
|
|
|
|
ZSTD_inBuffer in_buf = {
|
|
|
|
.src = encoded_buf,
|
|
|
|
.size = encoded_len
|
|
|
|
};
|
|
|
|
ZSTD_outBuffer out_buf = {
|
|
|
|
.dst = unencoded_buf,
|
|
|
|
.size = unencoded_len
|
|
|
|
};
|
|
|
|
size_t ret;
|
|
|
|
|
|
|
|
if (!rctx->zstd_dstream) {
|
|
|
|
rctx->zstd_dstream = ZSTD_createDStream();
|
|
|
|
if (!rctx->zstd_dstream) {
|
|
|
|
error("failed to create zstd dstream");
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ret = ZSTD_initDStream(rctx->zstd_dstream);
|
|
|
|
if (ZSTD_isError(ret)) {
|
|
|
|
error("failed to init zstd stream: %s", ZSTD_getErrorName(ret));
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
while (in_buf.pos < in_buf.size && out_buf.pos < out_buf.size) {
|
|
|
|
ret = ZSTD_decompressStream(rctx->zstd_dstream, &out_buf, &in_buf);
|
|
|
|
if (ret == 0) {
|
|
|
|
break;
|
|
|
|
} else if (ZSTD_isError(ret)) {
|
|
|
|
error("failed to decompress zstd stream: %s",
|
|
|
|
ZSTD_getErrorName(ret));
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2022-06-20 23:30:23 +00:00
|
|
|
#endif
|
2022-03-17 17:25:49 +00:00
|
|
|
|
2022-06-20 23:53:05 +00:00
|
|
|
#if COMPRESSION_LZO
|
2022-03-17 17:25:49 +00:00
|
|
|
static int decompress_lzo(const char *encoded_data, u64 encoded_len,
|
|
|
|
char *unencoded_data, u64 unencoded_len,
|
|
|
|
unsigned int sector_size)
|
|
|
|
{
|
|
|
|
uint32_t total_len;
|
|
|
|
size_t in_pos, out_pos;
|
|
|
|
|
|
|
|
if (encoded_len < 4) {
|
|
|
|
error("lzo header is truncated");
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
memcpy(&total_len, encoded_data, 4);
|
|
|
|
total_len = le32toh(total_len);
|
|
|
|
if (total_len > encoded_len) {
|
|
|
|
error("lzo header is invalid");
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
in_pos = 4;
|
|
|
|
out_pos = 0;
|
|
|
|
while (in_pos < total_len && out_pos < unencoded_len) {
|
|
|
|
size_t sector_remaining;
|
|
|
|
uint32_t src_len;
|
|
|
|
lzo_uint dst_len;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
sector_remaining = -in_pos % sector_size;
|
|
|
|
if (sector_remaining < 4) {
|
|
|
|
if (total_len - in_pos <= sector_remaining)
|
|
|
|
break;
|
|
|
|
in_pos += sector_remaining;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (total_len - in_pos < 4) {
|
|
|
|
error("lzo segment header is truncated");
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(&src_len, encoded_data + in_pos, 4);
|
|
|
|
src_len = le32toh(src_len);
|
|
|
|
in_pos += 4;
|
|
|
|
if (src_len > total_len - in_pos) {
|
|
|
|
error("lzo segment header is invalid");
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
dst_len = sector_size;
|
|
|
|
ret = lzo1x_decompress_safe((void *)(encoded_data + in_pos),
|
|
|
|
src_len,
|
|
|
|
(void *)(unencoded_data + out_pos),
|
|
|
|
&dst_len, NULL);
|
|
|
|
if (ret != LZO_E_OK) {
|
|
|
|
error("lzo1x_decompress_safe failed: %d", ret);
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
in_pos += src_len;
|
|
|
|
out_pos += dst_len;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2022-06-20 23:30:23 +00:00
|
|
|
#endif
|
2022-03-17 17:25:49 +00:00
|
|
|
|
|
|
|
static int decompress_and_write(struct btrfs_receive *rctx,
|
|
|
|
const char *encoded_data, u64 offset,
|
|
|
|
u64 encoded_len, u64 unencoded_file_len,
|
|
|
|
u64 unencoded_len, u64 unencoded_offset,
|
|
|
|
u32 compression)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
size_t pos;
|
|
|
|
ssize_t w;
|
|
|
|
char *unencoded_data;
|
2022-06-20 23:30:23 +00:00
|
|
|
int sector_shift = 0;
|
2022-03-17 17:25:49 +00:00
|
|
|
|
|
|
|
unencoded_data = calloc(unencoded_len, 1);
|
|
|
|
if (!unencoded_data) {
|
2022-09-30 07:12:06 +00:00
|
|
|
error_msg(ERROR_MSG_MEMORY, "unencoded data: %m");
|
2022-03-17 17:25:49 +00:00
|
|
|
return -errno;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (compression) {
|
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_ZLIB:
|
|
|
|
ret = decompress_zlib(rctx, encoded_data, encoded_len,
|
|
|
|
unencoded_data, unencoded_len);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
break;
|
2022-06-20 23:53:05 +00:00
|
|
|
#if COMPRESSION_ZSTD
|
2022-03-17 17:25:49 +00:00
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_ZSTD:
|
|
|
|
ret = decompress_zstd(rctx, encoded_data, encoded_len,
|
|
|
|
unencoded_data, unencoded_len);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
break;
|
2022-06-20 23:30:23 +00:00
|
|
|
#else
|
|
|
|
error("ZSTD compression for stream not compiled in");
|
|
|
|
ret = -EOPNOTSUPP;
|
|
|
|
goto out;
|
|
|
|
#endif
|
2022-03-17 17:25:49 +00:00
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_LZO_4K:
|
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_LZO_8K:
|
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_LZO_16K:
|
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_LZO_32K:
|
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_LZO_64K:
|
2022-06-20 23:53:05 +00:00
|
|
|
#if COMPRESSION_LZO
|
2022-03-17 17:25:49 +00:00
|
|
|
sector_shift =
|
|
|
|
compression - BTRFS_ENCODED_IO_COMPRESSION_LZO_4K + 12;
|
|
|
|
ret = decompress_lzo(encoded_data, encoded_len, unencoded_data,
|
|
|
|
unencoded_len, 1U << sector_shift);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
break;
|
2022-06-20 23:30:23 +00:00
|
|
|
#else
|
|
|
|
error("LZO compression for stream not compiled in");
|
|
|
|
ret = -EOPNOTSUPP;
|
|
|
|
goto out;
|
|
|
|
#endif
|
2022-03-17 17:25:49 +00:00
|
|
|
default:
|
|
|
|
error("unknown compression: %d", compression);
|
|
|
|
ret = -EOPNOTSUPP;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
pos = unencoded_offset;
|
|
|
|
while (pos < unencoded_file_len) {
|
|
|
|
w = pwrite(rctx->write_fd, unencoded_data + pos,
|
|
|
|
unencoded_file_len - pos, offset);
|
|
|
|
if (w < 0) {
|
|
|
|
ret = -errno;
|
|
|
|
error("writing unencoded data failed: %m");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
pos += w;
|
|
|
|
offset += w;
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
free(unencoded_data);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2022-03-17 17:25:48 +00:00
|
|
|
static int process_encoded_write(const char *path, const void *data, u64 offset,
|
|
|
|
u64 len, u64 unencoded_file_len,
|
|
|
|
u64 unencoded_len, u64 unencoded_offset,
|
|
|
|
u32 compression, u32 encryption, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
struct btrfs_receive *rctx = user;
|
|
|
|
char full_path[PATH_MAX];
|
|
|
|
struct iovec iov = { (char *)data, len };
|
|
|
|
struct btrfs_ioctl_encoded_io_args encoded = {
|
|
|
|
.iov = &iov,
|
|
|
|
.iovcnt = 1,
|
|
|
|
.offset = offset,
|
|
|
|
.len = unencoded_file_len,
|
|
|
|
.unencoded_len = unencoded_len,
|
|
|
|
.unencoded_offset = unencoded_offset,
|
|
|
|
.compression = compression,
|
|
|
|
.encryption = encryption,
|
|
|
|
};
|
|
|
|
|
|
|
|
if (encryption) {
|
|
|
|
error("encoded_write: encryption not supported");
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
|
|
|
if (ret < 0) {
|
|
|
|
error("encoded_write: path invalid: %s", path);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = open_inode_for_write(rctx, full_path);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
|
2022-03-17 17:25:49 +00:00
|
|
|
if (!rctx->force_decompress) {
|
|
|
|
ret = ioctl(rctx->write_fd, BTRFS_IOC_ENCODED_WRITE, &encoded);
|
|
|
|
if (ret >= 0)
|
|
|
|
return 0;
|
|
|
|
/* Fall back for these errors, fail hard for anything else. */
|
|
|
|
if (errno != ENOSPC && errno != ENOTTY && errno != EINVAL) {
|
|
|
|
ret = -errno;
|
|
|
|
error("encoded_write: writing to %s failed: %m", path);
|
|
|
|
return ret;
|
|
|
|
}
|
2022-03-17 17:25:48 +00:00
|
|
|
}
|
2022-03-17 17:25:49 +00:00
|
|
|
|
|
|
|
return decompress_and_write(rctx, data, offset, len, unencoded_file_len,
|
|
|
|
unencoded_len, unencoded_offset,
|
|
|
|
compression);
|
2022-03-17 17:25:48 +00:00
|
|
|
}
|
|
|
|
|
2022-03-17 17:25:50 +00:00
|
|
|
static int process_fallocate(const char *path, int mode, u64 offset, u64 len,
|
|
|
|
void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
struct btrfs_receive *rctx = user;
|
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
|
|
|
if (ret < 0) {
|
|
|
|
error("fallocate: path invalid: %s", path);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
ret = open_inode_for_write(rctx, full_path);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
ret = fallocate(rctx->write_fd, mode, offset, len);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
|
|
|
error("fallocate: fallocate on %s failed: %m", path);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-06-21 15:35:03 +00:00
|
|
|
static int process_fileattr(const char *path, u64 attr, void *user)
|
2022-03-17 17:25:51 +00:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
struct btrfs_receive *rctx = user;
|
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
|
|
|
if (ret < 0) {
|
2022-06-21 15:35:03 +00:00
|
|
|
error("fileattr: path invalid: %s", path);
|
2022-03-17 17:25:51 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
ret = open_inode_for_write(rctx, full_path);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
2022-06-21 15:35:03 +00:00
|
|
|
ret = -EOPNOTSUPP;
|
|
|
|
/* ret = ioctl(rctx->write_fd, FS_IOC_SETFLAGS, &flags); */
|
2022-03-17 17:25:51 +00:00
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2022-06-21 15:35:03 +00:00
|
|
|
error("fileattr: set file attributes on %s failed: %m", path);
|
2022-03-17 17:25:51 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-08-15 20:54:42 +00:00
|
|
|
#if HAVE_LINUX_FSVERITY_H
|
|
|
|
static int process_enable_verity(const char *path, u8 algorithm, u32 block_size,
|
|
|
|
int salt_len, char *salt,
|
|
|
|
int sig_len, char *sig, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
int ioctl_fd;
|
|
|
|
struct btrfs_receive *rctx = user;
|
|
|
|
char full_path[PATH_MAX];
|
|
|
|
struct fsverity_enable_arg verity_args = {
|
|
|
|
.version = 1,
|
|
|
|
.hash_algorithm = algorithm,
|
|
|
|
.block_size = block_size,
|
|
|
|
};
|
|
|
|
|
|
|
|
if (salt_len) {
|
|
|
|
verity_args.salt_size = salt_len;
|
|
|
|
verity_args.salt_ptr = (__u64)(uintptr_t)salt;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sig_len) {
|
|
|
|
verity_args.sig_size = sig_len;
|
|
|
|
verity_args.sig_ptr = (__u64)(uintptr_t)sig;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
|
|
|
if (ret < 0) {
|
|
|
|
error("write: path invalid: %s", path);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ioctl_fd = open(full_path, O_RDONLY);
|
|
|
|
if (ioctl_fd < 0) {
|
|
|
|
ret = -errno;
|
|
|
|
error("cannot open %s for verity ioctl: %m", full_path);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Enabling verity denies write access, so it cannot be done with an
|
|
|
|
* open writeable file descriptor.
|
|
|
|
*/
|
|
|
|
close_inode_for_write(rctx);
|
|
|
|
ret = ioctl(ioctl_fd, FS_IOC_ENABLE_VERITY, &verity_args);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
|
|
|
error("failed to enable verity on %s: %d", full_path, ret);
|
|
|
|
}
|
|
|
|
|
|
|
|
close(ioctl_fd);
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
#else
|
|
|
|
|
|
|
|
static int process_enable_verity(const char *path, u8 algorithm, u32 block_size,
|
|
|
|
int salt_len, char *salt,
|
|
|
|
int sig_len, char *sig, void *user)
|
|
|
|
{
|
|
|
|
error("fs-verity for stream not compiled in");
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2013-08-09 20:20:47 +00:00
|
|
|
static struct btrfs_send_ops send_ops = {
|
2012-07-25 21:08:25 +00:00
|
|
|
.subvol = process_subvol,
|
|
|
|
.snapshot = process_snapshot,
|
|
|
|
.mkfile = process_mkfile,
|
|
|
|
.mkdir = process_mkdir,
|
|
|
|
.mknod = process_mknod,
|
|
|
|
.mkfifo = process_mkfifo,
|
|
|
|
.mksock = process_mksock,
|
|
|
|
.symlink = process_symlink,
|
|
|
|
.rename = process_rename,
|
|
|
|
.link = process_link,
|
|
|
|
.unlink = process_unlink,
|
|
|
|
.rmdir = process_rmdir,
|
|
|
|
.write = process_write,
|
|
|
|
.clone = process_clone,
|
|
|
|
.set_xattr = process_set_xattr,
|
|
|
|
.remove_xattr = process_remove_xattr,
|
|
|
|
.truncate = process_truncate,
|
|
|
|
.chmod = process_chmod,
|
|
|
|
.chown = process_chown,
|
|
|
|
.utimes = process_utimes,
|
2015-06-11 17:31:01 +00:00
|
|
|
.update_extent = process_update_extent,
|
2022-03-17 17:25:48 +00:00
|
|
|
.encoded_write = process_encoded_write,
|
2022-03-17 17:25:50 +00:00
|
|
|
.fallocate = process_fallocate,
|
2022-06-21 15:35:03 +00:00
|
|
|
.fileattr = process_fileattr,
|
2022-08-15 20:54:42 +00:00
|
|
|
.enable_verity = process_enable_verity,
|
2012-07-25 21:08:25 +00:00
|
|
|
};
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
static int do_receive(struct btrfs_receive *rctx, const char *tomnt,
|
2015-05-27 17:51:29 +00:00
|
|
|
char *realmnt, int r_fd, u64 max_errors)
|
2012-07-25 21:08:25 +00:00
|
|
|
{
|
2015-06-10 19:05:51 +00:00
|
|
|
u64 subvol_id;
|
2012-07-25 21:08:25 +00:00
|
|
|
int ret;
|
2013-04-09 17:08:45 +00:00
|
|
|
char *dest_dir_full_path;
|
2015-06-16 13:15:51 +00:00
|
|
|
char root_subvol_path[PATH_MAX];
|
2012-07-25 21:08:25 +00:00
|
|
|
int end = 0;
|
2017-04-29 21:54:05 +00:00
|
|
|
int iterations = 0;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2013-04-09 17:08:45 +00:00
|
|
|
dest_dir_full_path = realpath(tomnt, NULL);
|
|
|
|
if (!dest_dir_full_path) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("realpath(%s) failed: %m", tomnt);
|
2013-04-09 17:08:45 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->dest_dir_fd = open(dest_dir_full_path, O_RDONLY | O_NOATIME);
|
|
|
|
if (rctx->dest_dir_fd < 0) {
|
2013-04-09 17:08:45 +00:00
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("cannot open destination directory %s: %m",
|
|
|
|
dest_dir_full_path);
|
2013-04-09 17:08:45 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2015-06-12 13:58:55 +00:00
|
|
|
if (realmnt[0]) {
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->root_path = realmnt;
|
2015-05-27 17:51:29 +00:00
|
|
|
} else {
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = find_mount_root(dest_dir_full_path, &rctx->root_path);
|
2015-05-27 17:51:29 +00:00
|
|
|
if (ret < 0) {
|
2018-10-25 12:10:54 +00:00
|
|
|
errno = -ret;
|
|
|
|
error("failed to determine mount point for %s: %m",
|
|
|
|
dest_dir_full_path);
|
2015-05-27 17:51:29 +00:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (ret > 0) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("%s doesn't belong to btrfs mount point",
|
|
|
|
dest_dir_full_path);
|
2015-05-27 17:51:29 +00:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
2014-07-23 05:47:35 +00:00
|
|
|
}
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->mnt_fd = open(rctx->root_path, O_RDONLY | O_NOATIME);
|
|
|
|
if (rctx->mnt_fd < 0) {
|
2012-07-25 21:08:25 +00:00
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("cannot open %s: %m", rctx->root_path);
|
2012-07-25 21:08:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2015-06-10 19:05:51 +00:00
|
|
|
/*
|
|
|
|
* If we use -m or a default subvol we want to resolve the path to the
|
|
|
|
* subvolume we're sitting in so that we can adjust the paths of any
|
|
|
|
* subvols we want to receive in.
|
|
|
|
*/
|
2021-09-08 09:16:43 +00:00
|
|
|
ret = lookup_path_rootid(rctx->mnt_fd, &subvol_id);
|
|
|
|
if (ret) {
|
|
|
|
errno = -ret;
|
|
|
|
error("cannot resolve rootid for path: %m");
|
2015-06-10 19:05:51 +00:00
|
|
|
goto out;
|
2021-09-08 09:16:43 +00:00
|
|
|
}
|
2015-06-10 19:05:51 +00:00
|
|
|
|
2015-06-16 13:15:51 +00:00
|
|
|
root_subvol_path[0] = 0;
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = btrfs_subvolid_resolve(rctx->mnt_fd, root_subvol_path,
|
2015-06-12 11:18:44 +00:00
|
|
|
PATH_MAX, subvol_id);
|
2015-06-10 19:05:51 +00:00
|
|
|
if (ret) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("cannot resolve our subvol path");
|
2015-06-10 19:05:51 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Ok we're inside of a subvol off of the root subvol, we need to
|
|
|
|
* actually set full_root_path.
|
|
|
|
*/
|
2015-11-06 15:53:55 +00:00
|
|
|
if (*root_subvol_path)
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->full_root_path = root_subvol_path;
|
2015-06-10 19:05:51 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->dest_dir_chroot) {
|
2015-04-19 11:46:28 +00:00
|
|
|
if (chroot(dest_dir_full_path)) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("failed to chroot to %s: %m", dest_dir_full_path);
|
2015-04-19 11:46:28 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (chdir("/")) {
|
|
|
|
ret = -errno;
|
2018-10-25 12:10:54 +00:00
|
|
|
error("failed to chdir to / after chroot: %m");
|
2015-04-19 11:46:28 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2015-04-24 16:01:32 +00:00
|
|
|
fprintf(stderr, "Chroot to %s\n", dest_dir_full_path);
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->root_path = strdup("/");
|
|
|
|
rctx->dest_dir_path = rctx->root_path;
|
2015-04-19 11:46:28 +00:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* find_mount_root returns a root_path that is a subpath of
|
|
|
|
* dest_dir_full_path. Now get the other part of root_path,
|
|
|
|
* which is the destination dir relative to root_path.
|
|
|
|
*/
|
2016-11-02 22:42:56 +00:00
|
|
|
rctx->dest_dir_path = dest_dir_full_path + strlen(rctx->root_path);
|
|
|
|
while (rctx->dest_dir_path[0] == '/')
|
|
|
|
rctx->dest_dir_path++;
|
2015-04-19 11:46:28 +00:00
|
|
|
}
|
2013-04-09 17:08:45 +00:00
|
|
|
|
2012-07-25 21:08:25 +00:00
|
|
|
while (!end) {
|
2016-11-02 22:42:56 +00:00
|
|
|
ret = btrfs_read_and_process_send_stream(r_fd, &send_ops,
|
|
|
|
rctx,
|
|
|
|
rctx->honor_end_cmd,
|
2014-05-23 19:14:56 +00:00
|
|
|
max_errors);
|
2017-04-29 21:54:05 +00:00
|
|
|
if (ret < 0) {
|
|
|
|
if (ret != -ENODATA)
|
|
|
|
goto out;
|
|
|
|
|
2017-04-03 20:21:07 +00:00
|
|
|
/* Empty stream is invalid */
|
2017-04-29 21:54:05 +00:00
|
|
|
if (iterations == 0) {
|
|
|
|
error("empty stream is not considered valid");
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 1;
|
2016-11-29 15:07:19 +00:00
|
|
|
}
|
2017-04-03 20:21:07 +00:00
|
|
|
if (ret > 0)
|
2012-07-25 21:08:25 +00:00
|
|
|
end = 1;
|
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
close_inode_for_write(rctx);
|
|
|
|
ret = finish_subvol(rctx);
|
2012-07-25 21:08:25 +00:00
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
2017-04-29 21:54:05 +00:00
|
|
|
|
|
|
|
iterations++;
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
out:
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->write_fd != -1) {
|
|
|
|
close(rctx->write_fd);
|
|
|
|
rctx->write_fd = -1;
|
2013-04-09 17:08:35 +00:00
|
|
|
}
|
2015-12-03 18:45:44 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->root_path != realmnt)
|
|
|
|
free(rctx->root_path);
|
|
|
|
rctx->root_path = NULL;
|
|
|
|
rctx->dest_dir_path = NULL;
|
2013-04-09 17:08:45 +00:00
|
|
|
free(dest_dir_full_path);
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->mnt_fd != -1) {
|
|
|
|
close(rctx->mnt_fd);
|
|
|
|
rctx->mnt_fd = -1;
|
2013-04-09 17:08:35 +00:00
|
|
|
}
|
2016-11-02 22:42:56 +00:00
|
|
|
if (rctx->dest_dir_fd != -1) {
|
|
|
|
close(rctx->dest_dir_fd);
|
|
|
|
rctx->dest_dir_fd = -1;
|
2013-04-09 17:08:45 +00:00
|
|
|
}
|
2022-06-20 23:53:05 +00:00
|
|
|
#if COMPRESSION_ZSTD
|
2022-03-17 17:25:49 +00:00
|
|
|
if (rctx->zstd_dstream)
|
|
|
|
ZSTD_freeDStream(rctx->zstd_dstream);
|
2022-06-20 23:30:23 +00:00
|
|
|
#endif
|
2022-03-17 17:25:49 +00:00
|
|
|
if (rctx->zlib_stream) {
|
|
|
|
inflateEnd(rctx->zlib_stream);
|
|
|
|
free(rctx->zlib_stream);
|
|
|
|
}
|
2015-06-16 13:15:51 +00:00
|
|
|
|
2012-07-25 21:08:25 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-03-07 02:07:03 +00:00
|
|
|
static const char * const cmd_receive_usage[] = {
|
2018-03-07 02:04:15 +00:00
|
|
|
"btrfs receive [options] <mount>\n"
|
|
|
|
"btrfs receive --dump [options]",
|
|
|
|
"Receive subvolumes from a stream",
|
|
|
|
"Receives one or more subvolumes that were previously",
|
|
|
|
"sent with btrfs send. The received subvolumes are stored",
|
|
|
|
"into MOUNT.",
|
|
|
|
"The receive will fail in case the receiving subvolume",
|
|
|
|
"already exists. It will also fail in case a previously",
|
|
|
|
"received subvolume has been changed after it was received.",
|
|
|
|
"After receiving a subvolume, it is immediately set to",
|
|
|
|
"read-only.",
|
|
|
|
"",
|
|
|
|
"-q|--quiet suppress all messages, except errors",
|
|
|
|
"-f FILE read the stream from FILE instead of stdin",
|
|
|
|
"-e terminate after receiving an <end cmd> marker in the stream.",
|
|
|
|
" Without this option the receiver side terminates only in case",
|
|
|
|
" of an error on end of file.",
|
|
|
|
"-C|--chroot confine the process to <mount> using chroot",
|
|
|
|
"-E|--max-errors NERR",
|
|
|
|
" terminate as soon as NERR errors occur while",
|
|
|
|
" stream processing commands from the stream.",
|
|
|
|
" Default value is 1. A value of 0 means no limit.",
|
|
|
|
"-m ROOTMOUNT the root mount point of the destination filesystem.",
|
|
|
|
" If /proc is not accessible, use this to tell us where",
|
|
|
|
" this file system is mounted.",
|
2022-03-17 17:25:49 +00:00
|
|
|
"--force-decompress",
|
|
|
|
" if the stream contains compressed data, always",
|
|
|
|
" decompress it instead of writing it with encoded I/O",
|
2018-03-07 02:04:15 +00:00
|
|
|
"--dump dump stream metadata, one line per operation,",
|
|
|
|
" does not require the MOUNT parameter",
|
2020-06-26 20:20:56 +00:00
|
|
|
"-v deprecated, alias for global -v option",
|
2019-11-25 10:39:05 +00:00
|
|
|
HELPINFO_INSERT_GLOBALS,
|
|
|
|
HELPINFO_INSERT_VERBOSE,
|
|
|
|
HELPINFO_INSERT_QUIET,
|
2022-06-20 23:30:23 +00:00
|
|
|
"",
|
|
|
|
"Compression support: zlib"
|
2022-06-20 23:53:05 +00:00
|
|
|
#if COMPRESSION_LZO
|
2022-06-20 23:30:23 +00:00
|
|
|
", lzo"
|
|
|
|
#endif
|
2022-06-20 23:53:05 +00:00
|
|
|
#if COMPRESSION_ZSTD
|
2022-06-20 23:30:23 +00:00
|
|
|
", zstd"
|
2022-08-15 20:54:42 +00:00
|
|
|
#endif
|
|
|
|
,
|
|
|
|
"Feature support:"
|
|
|
|
#if HAVE_LINUX_FSVERITY_H
|
|
|
|
" fsverity"
|
2022-06-20 23:30:23 +00:00
|
|
|
#endif
|
|
|
|
,
|
2018-03-07 02:04:15 +00:00
|
|
|
NULL
|
|
|
|
};
|
|
|
|
|
2018-03-07 02:24:46 +00:00
|
|
|
static int cmd_receive(const struct cmd_struct *cmd, int argc, char **argv)
|
2012-07-25 21:08:25 +00:00
|
|
|
{
|
|
|
|
char *tomnt = NULL;
|
2015-06-12 14:37:31 +00:00
|
|
|
char fromfile[PATH_MAX];
|
2015-06-12 13:58:55 +00:00
|
|
|
char realmnt[PATH_MAX];
|
2016-11-02 22:42:56 +00:00
|
|
|
struct btrfs_receive rctx;
|
2012-07-25 21:08:25 +00:00
|
|
|
int receive_fd = fileno(stdin);
|
2014-05-23 19:14:56 +00:00
|
|
|
u64 max_errors = 1;
|
2016-09-07 00:29:34 +00:00
|
|
|
int dump = 0;
|
2015-06-09 12:58:43 +00:00
|
|
|
int ret = 0;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2016-11-02 22:42:56 +00:00
|
|
|
memset(&rctx, 0, sizeof(rctx));
|
|
|
|
rctx.mnt_fd = -1;
|
|
|
|
rctx.write_fd = -1;
|
|
|
|
rctx.dest_dir_fd = -1;
|
2022-06-21 00:29:10 +00:00
|
|
|
rctx.dest_dir_chroot = false;
|
2015-06-12 13:58:55 +00:00
|
|
|
realmnt[0] = 0;
|
2015-06-12 14:37:31 +00:00
|
|
|
fromfile[0] = 0;
|
2012-07-25 21:08:25 +00:00
|
|
|
|
2019-11-25 10:39:05 +00:00
|
|
|
/*
|
|
|
|
* Init global verbose to default, if it is unset.
|
|
|
|
* Default is 1 for historical reasons, changing may break scripts that
|
|
|
|
* expect the 'At subvol' message.
|
|
|
|
* As default is 1, which means the effective verbose for receive is 2
|
|
|
|
* which global verbose is unaware. So adjust global verbose value here.
|
|
|
|
*/
|
|
|
|
if (bconf.verbose == BTRFS_BCONF_UNSET)
|
|
|
|
bconf.verbose = 1;
|
|
|
|
else if (bconf.verbose > BTRFS_BCONF_QUIET)
|
|
|
|
bconf.verbose++;
|
|
|
|
|
2018-06-20 00:38:38 +00:00
|
|
|
optind = 0;
|
2015-01-19 12:30:06 +00:00
|
|
|
while (1) {
|
|
|
|
int c;
|
2022-03-17 17:25:49 +00:00
|
|
|
enum {
|
2022-06-21 00:20:21 +00:00
|
|
|
GETOPT_VAL_DUMP = GETOPT_VAL_FIRST,
|
2022-03-17 17:25:49 +00:00
|
|
|
GETOPT_VAL_FORCE_DECOMPRESS,
|
|
|
|
};
|
2015-01-19 12:30:06 +00:00
|
|
|
static const struct option long_opts[] = {
|
2015-04-08 15:39:51 +00:00
|
|
|
{ "max-errors", required_argument, NULL, 'E' },
|
2015-04-19 11:46:28 +00:00
|
|
|
{ "chroot", no_argument, NULL, 'C' },
|
2016-09-07 00:29:34 +00:00
|
|
|
{ "dump", no_argument, NULL, GETOPT_VAL_DUMP },
|
2019-03-05 13:00:46 +00:00
|
|
|
{ "quiet", no_argument, NULL, 'q' },
|
2022-03-17 17:25:49 +00:00
|
|
|
{ "force-decompress", no_argument, NULL, GETOPT_VAL_FORCE_DECOMPRESS },
|
2015-01-19 12:30:06 +00:00
|
|
|
{ NULL, 0, NULL, 0 }
|
|
|
|
};
|
|
|
|
|
2019-03-05 13:00:46 +00:00
|
|
|
c = getopt_long(argc, argv, "Cevqf:m:E:", long_opts, NULL);
|
2015-01-19 12:30:06 +00:00
|
|
|
if (c < 0)
|
|
|
|
break;
|
|
|
|
|
2012-07-25 21:08:25 +00:00
|
|
|
switch (c) {
|
|
|
|
case 'v':
|
2019-11-25 10:39:05 +00:00
|
|
|
bconf_be_verbose();
|
2012-07-25 21:08:25 +00:00
|
|
|
break;
|
2019-03-05 13:00:46 +00:00
|
|
|
case 'q':
|
2019-11-25 10:39:05 +00:00
|
|
|
bconf_be_quiet();
|
2019-03-05 13:00:46 +00:00
|
|
|
break;
|
2012-07-25 21:08:25 +00:00
|
|
|
case 'f':
|
2015-06-12 14:37:31 +00:00
|
|
|
if (arg_copy_path(fromfile, optarg, sizeof(fromfile))) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("input file path too long (%zu)",
|
|
|
|
strlen(optarg));
|
2015-06-12 14:37:31 +00:00
|
|
|
ret = 1;
|
|
|
|
goto out;
|
|
|
|
}
|
2012-07-25 21:08:25 +00:00
|
|
|
break;
|
2013-04-09 17:08:40 +00:00
|
|
|
case 'e':
|
2022-06-21 00:29:10 +00:00
|
|
|
rctx.honor_end_cmd = true;
|
2013-04-09 17:08:40 +00:00
|
|
|
break;
|
2015-04-19 11:46:28 +00:00
|
|
|
case 'C':
|
2022-06-21 00:29:10 +00:00
|
|
|
rctx.dest_dir_chroot = true;
|
2015-04-19 11:46:28 +00:00
|
|
|
break;
|
2014-05-23 19:14:56 +00:00
|
|
|
case 'E':
|
|
|
|
max_errors = arg_strtou64(optarg);
|
|
|
|
break;
|
2015-05-27 17:51:29 +00:00
|
|
|
case 'm':
|
2015-06-12 13:58:55 +00:00
|
|
|
if (arg_copy_path(realmnt, optarg, sizeof(realmnt))) {
|
2016-01-11 10:01:47 +00:00
|
|
|
error("mount point path too long (%zu)",
|
|
|
|
strlen(optarg));
|
2015-06-12 13:58:55 +00:00
|
|
|
ret = 1;
|
2015-06-09 12:58:43 +00:00
|
|
|
goto out;
|
2015-05-27 17:51:29 +00:00
|
|
|
}
|
|
|
|
break;
|
2016-09-07 00:29:34 +00:00
|
|
|
case GETOPT_VAL_DUMP:
|
|
|
|
dump = 1;
|
|
|
|
break;
|
2022-03-17 17:25:49 +00:00
|
|
|
case GETOPT_VAL_FORCE_DECOMPRESS:
|
|
|
|
rctx.force_decompress = true;
|
|
|
|
break;
|
2012-07-25 21:08:25 +00:00
|
|
|
default:
|
2018-03-07 02:54:38 +00:00
|
|
|
usage_unknown_option(cmd, argv);
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-09-07 00:29:34 +00:00
|
|
|
if (dump && check_argc_exact(argc - optind, 0))
|
2018-03-07 02:54:38 +00:00
|
|
|
usage(cmd);
|
2016-09-07 00:29:34 +00:00
|
|
|
if (!dump && check_argc_exact(argc - optind, 1))
|
2018-03-07 02:54:38 +00:00
|
|
|
usage(cmd);
|
2012-07-25 21:08:25 +00:00
|
|
|
|
|
|
|
tomnt = argv[optind];
|
|
|
|
|
2015-06-12 14:37:31 +00:00
|
|
|
if (fromfile[0]) {
|
2012-07-25 21:08:25 +00:00
|
|
|
receive_fd = open(fromfile, O_RDONLY | O_NOATIME);
|
|
|
|
if (receive_fd < 0) {
|
2018-01-07 21:54:21 +00:00
|
|
|
error("cannot open %s: %m", fromfile);
|
2015-06-09 12:58:43 +00:00
|
|
|
goto out;
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-09-07 00:29:34 +00:00
|
|
|
if (dump) {
|
|
|
|
struct btrfs_dump_send_args dump_args;
|
|
|
|
|
|
|
|
dump_args.root_path[0] = '.';
|
|
|
|
dump_args.root_path[1] = '\0';
|
|
|
|
dump_args.full_subvol_path[0] = '.';
|
|
|
|
dump_args.full_subvol_path[1] = '\0';
|
|
|
|
ret = btrfs_read_and_process_send_stream(receive_fd,
|
2018-10-15 13:02:11 +00:00
|
|
|
&btrfs_print_send_ops, &dump_args, 0, max_errors);
|
2018-10-25 12:10:54 +00:00
|
|
|
if (ret < 0) {
|
|
|
|
errno = -ret;
|
|
|
|
error("failed to dump the send stream: %m");
|
|
|
|
}
|
2016-09-07 00:29:34 +00:00
|
|
|
} else {
|
|
|
|
ret = do_receive(&rctx, tomnt, realmnt, receive_fd, max_errors);
|
|
|
|
}
|
|
|
|
|
2016-01-14 08:40:24 +00:00
|
|
|
if (receive_fd != fileno(stdin))
|
|
|
|
close(receive_fd);
|
2015-06-09 12:58:43 +00:00
|
|
|
out:
|
|
|
|
|
2013-09-04 15:22:27 +00:00
|
|
|
return !!ret;
|
2012-07-25 21:08:25 +00:00
|
|
|
}
|
2018-03-07 02:07:03 +00:00
|
|
|
DEFINE_SIMPLE_COMMAND(receive, "receive");
|