2012-07-26 05:08:25 +08:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2012 Alexander Block. All rights reserved.
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public
|
|
|
|
* License v2 as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public
|
|
|
|
* License along with this program; if not, write to the
|
|
|
|
* Free Software Foundation, Inc., 59 Temple Place - Suite 330,
|
|
|
|
* Boston, MA 021110-1307, USA.
|
|
|
|
*/
|
|
|
|
|
2012-09-21 05:26:28 +08:00
|
|
|
#include "kerncompat.h"
|
2022-09-14 23:06:52 +08:00
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <sys/xattr.h>
|
|
|
|
#include <linux/fs.h>
|
2022-08-16 04:54:42 +08:00
|
|
|
#if HAVE_LINUX_FSVERITY_H
|
|
|
|
#include <linux/fsverity.h>
|
|
|
|
#endif
|
2012-07-26 05:08:25 +08:00
|
|
|
#include <unistd.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <fcntl.h>
|
2014-05-24 03:14:56 +08:00
|
|
|
#include <getopt.h>
|
2015-07-30 02:37:37 +08:00
|
|
|
#include <limits.h>
|
2022-03-18 01:25:48 +08:00
|
|
|
#include <errno.h>
|
2022-09-15 19:59:39 +08:00
|
|
|
#include <endian.h>
|
|
|
|
#include <stdbool.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
2012-07-26 05:08:25 +08:00
|
|
|
#include <uuid/uuid.h>
|
2022-03-18 01:25:49 +08:00
|
|
|
#include <zlib.h>
|
2022-06-21 07:30:23 +08:00
|
|
|
#if COMPRESSION_LZO
|
|
|
|
#include <lzo/lzoconf.h>
|
|
|
|
#include <lzo/lzo1x.h>
|
|
|
|
#endif
|
2022-06-21 07:53:05 +08:00
|
|
|
#if COMPRESSION_ZSTD
|
2022-03-18 01:25:49 +08:00
|
|
|
#include <zstd.h>
|
2022-06-21 07:30:23 +08:00
|
|
|
#endif
|
2023-04-20 05:17:12 +08:00
|
|
|
#include "kernel-shared/uapi/btrfs.h"
|
2022-09-15 19:59:39 +08:00
|
|
|
#include "common/defs.h"
|
|
|
|
#include "common/messages.h"
|
2022-09-14 23:06:52 +08:00
|
|
|
#include "common/utils.h"
|
2020-08-18 21:56:04 +08:00
|
|
|
#include "common/send-stream.h"
|
2020-08-18 21:56:04 +08:00
|
|
|
#include "common/send-utils.h"
|
2019-06-20 07:46:21 +08:00
|
|
|
#include "common/help.h"
|
2019-07-02 02:54:39 +08:00
|
|
|
#include "common/path-utils.h"
|
2022-09-16 05:15:17 +08:00
|
|
|
#include "common/string-utils.h"
|
2022-09-14 23:06:52 +08:00
|
|
|
#include "cmds/commands.h"
|
|
|
|
#include "cmds/receive-dump.h"
|
2012-07-26 05:08:25 +08:00
|
|
|
|
|
|
|
struct btrfs_receive
|
|
|
|
{
|
|
|
|
int mnt_fd;
|
2013-04-10 01:08:45 +08:00
|
|
|
int dest_dir_fd;
|
2012-07-26 05:08:25 +08:00
|
|
|
|
|
|
|
int write_fd;
|
2015-06-16 21:28:44 +08:00
|
|
|
char write_path[PATH_MAX];
|
2012-07-26 05:08:25 +08:00
|
|
|
|
|
|
|
char *root_path;
|
2013-04-10 01:08:45 +08:00
|
|
|
char *dest_dir_path; /* relative to root_path */
|
2015-06-16 21:36:42 +08:00
|
|
|
char full_subvol_path[PATH_MAX];
|
2015-06-11 03:05:51 +08:00
|
|
|
char *full_root_path;
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2015-06-12 21:40:07 +08:00
|
|
|
struct subvol_info cur_subvol;
|
2015-06-16 21:56:37 +08:00
|
|
|
/*
|
|
|
|
* Substitute for cur_subvol::path which is a pointer and we cannot
|
|
|
|
* change it to an array as it's a public API.
|
|
|
|
*/
|
|
|
|
char cur_subvol_path[PATH_MAX];
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2022-06-21 08:29:10 +08:00
|
|
|
bool dest_dir_chroot;
|
|
|
|
|
|
|
|
bool honor_end_cmd;
|
2022-03-18 01:25:49 +08:00
|
|
|
|
|
|
|
bool force_decompress;
|
|
|
|
|
2022-06-21 07:53:05 +08:00
|
|
|
#if COMPRESSION_ZSTD
|
2022-03-18 01:25:49 +08:00
|
|
|
/* Reuse stream objects for encoded_write decompression fallback */
|
|
|
|
ZSTD_DStream *zstd_dstream;
|
2022-06-21 07:30:23 +08:00
|
|
|
#endif
|
2022-03-18 01:25:49 +08:00
|
|
|
z_stream *zlib_stream;
|
2012-07-26 05:08:25 +08:00
|
|
|
};
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
static int finish_subvol(struct btrfs_receive *rctx)
|
2012-07-26 05:08:25 +08:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
int subvol_fd = -1;
|
|
|
|
struct btrfs_ioctl_received_subvol_args rs_args;
|
2013-12-11 01:17:10 +08:00
|
|
|
char uuid_str[BTRFS_UUID_UNPARSED_SIZE];
|
2012-07-26 05:08:25 +08:00
|
|
|
u64 flags;
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
if (rctx->cur_subvol_path[0] == 0)
|
2012-07-26 05:08:25 +08:00
|
|
|
return 0;
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
subvol_fd = openat(rctx->mnt_fd, rctx->cur_subvol_path,
|
|
|
|
O_RDONLY | O_NOATIME);
|
2012-07-26 05:08:25 +08:00
|
|
|
if (subvol_fd < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("cannot open %s: %m", rctx->cur_subvol_path);
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&rs_args, 0, sizeof(rs_args));
|
2016-11-03 06:42:56 +08:00
|
|
|
memcpy(rs_args.uuid, rctx->cur_subvol.received_uuid, BTRFS_UUID_SIZE);
|
|
|
|
rs_args.stransid = rctx->cur_subvol.stransid;
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 2) {
|
2012-07-26 05:08:25 +08:00
|
|
|
uuid_unparse((u8*)rs_args.uuid, uuid_str);
|
|
|
|
fprintf(stderr, "BTRFS_IOC_SET_RECEIVED_SUBVOL uuid=%s, "
|
|
|
|
"stransid=%llu\n", uuid_str, rs_args.stransid);
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = ioctl(subvol_fd, BTRFS_IOC_SET_RECEIVED_SUBVOL, &rs_args);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("ioctl BTRFS_IOC_SET_RECEIVED_SUBVOL failed: %m");
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2016-11-03 06:42:56 +08:00
|
|
|
rctx->cur_subvol.rtransid = rs_args.rtransid;
|
2012-07-26 05:08:25 +08:00
|
|
|
|
|
|
|
ret = ioctl(subvol_fd, BTRFS_IOC_SUBVOL_GETFLAGS, &flags);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("ioctl BTRFS_IOC_SUBVOL_GETFLAGS failed: %m");
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
flags |= BTRFS_SUBVOL_RDONLY;
|
|
|
|
|
|
|
|
ret = ioctl(subvol_fd, BTRFS_IOC_SUBVOL_SETFLAGS, &flags);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("failed to make subvolume read only: %m");
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
out:
|
2016-11-03 06:42:56 +08:00
|
|
|
if (rctx->cur_subvol_path[0]) {
|
|
|
|
rctx->cur_subvol_path[0] = 0;
|
2013-06-26 23:17:57 +08:00
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
if (subvol_fd != -1)
|
|
|
|
close(subvol_fd);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_subvol(const char *path, const u8 *uuid, u64 ctransid,
|
|
|
|
void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2012-07-26 05:08:25 +08:00
|
|
|
struct btrfs_ioctl_vol_args args_v1;
|
2013-12-11 01:17:10 +08:00
|
|
|
char uuid_str[BTRFS_UUID_UNPARSED_SIZE];
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = finish_subvol(rctx);
|
2012-07-26 05:08:25 +08:00
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
if (rctx->cur_subvol.path) {
|
2016-09-06 19:08:29 +08:00
|
|
|
error("subvol: another one already started, path ptr: %s",
|
2016-11-03 06:42:56 +08:00
|
|
|
rctx->cur_subvol.path);
|
2016-09-06 19:08:29 +08:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
2016-11-03 06:42:56 +08:00
|
|
|
if (rctx->cur_subvol_path[0]) {
|
2016-09-06 19:08:29 +08:00
|
|
|
error("subvol: another one already started, path buf: %s",
|
2019-06-17 15:59:36 +08:00
|
|
|
rctx->cur_subvol_path);
|
2016-09-06 19:08:29 +08:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
if (*rctx->dest_dir_path == 0) {
|
2024-06-18 02:44:25 +08:00
|
|
|
strncpy_null(rctx->cur_subvol_path, path, sizeof(rctx->cur_subvol_path));
|
2015-06-16 21:56:37 +08:00
|
|
|
} else {
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(rctx->cur_subvol_path, rctx->dest_dir_path,
|
|
|
|
path);
|
2015-06-16 21:56:37 +08:00
|
|
|
if (ret < 0) {
|
2016-10-29 00:47:35 +08:00
|
|
|
error("subvol: path invalid: %s", path);
|
2015-06-16 21:56:37 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat3_out(rctx->full_subvol_path, rctx->root_path,
|
|
|
|
rctx->dest_dir_path, path);
|
2015-06-16 21:36:42 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("subvol: path invalid: %s", path);
|
2015-06-16 21:36:42 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose > BTRFS_BCONF_QUIET)
|
2019-03-05 21:00:46 +08:00
|
|
|
fprintf(stderr, "At subvol %s\n", path);
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
memcpy(rctx->cur_subvol.received_uuid, uuid, BTRFS_UUID_SIZE);
|
|
|
|
rctx->cur_subvol.stransid = ctransid;
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 2) {
|
2016-11-03 06:42:56 +08:00
|
|
|
uuid_unparse((u8*)rctx->cur_subvol.received_uuid, uuid_str);
|
2012-07-26 05:08:25 +08:00
|
|
|
fprintf(stderr, "receiving subvol %s uuid=%s, stransid=%llu\n",
|
|
|
|
path, uuid_str,
|
2016-11-03 06:42:56 +08:00
|
|
|
rctx->cur_subvol.stransid);
|
2012-07-26 05:08:25 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
memset(&args_v1, 0, sizeof(args_v1));
|
2024-06-18 02:44:25 +08:00
|
|
|
strncpy_null(args_v1.name, path, sizeof(args_v1.name));
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = ioctl(rctx->dest_dir_fd, BTRFS_IOC_SUBVOL_CREATE, &args_v1);
|
2012-07-26 05:08:25 +08:00
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("creating subvolume %s failed: %m", path);
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2023-06-18 08:05:30 +08:00
|
|
|
/*
|
|
|
|
* Search for the @subvol_uuid, try received_uuid and subvolume as a fallback
|
|
|
|
* if it's not found.
|
|
|
|
*/
|
|
|
|
static struct subvol_info *search_source_subvol(int mnt_fd, const u8 *subvol_uuid,
|
|
|
|
u64 transid)
|
|
|
|
{
|
|
|
|
struct subvol_info *found;
|
|
|
|
|
|
|
|
found = subvol_uuid_search(mnt_fd, 0, subvol_uuid, transid, NULL,
|
|
|
|
subvol_search_by_received_uuid);
|
|
|
|
if (IS_ERR_OR_NULL(found)) {
|
|
|
|
found = subvol_uuid_search(mnt_fd, 0, subvol_uuid, transid,
|
|
|
|
NULL, subvol_search_by_uuid);
|
|
|
|
}
|
|
|
|
|
|
|
|
return found;
|
|
|
|
}
|
|
|
|
|
2012-07-26 05:08:25 +08:00
|
|
|
static int process_snapshot(const char *path, const u8 *uuid, u64 ctransid,
|
|
|
|
const u8 *parent_uuid, u64 parent_ctransid,
|
|
|
|
void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2013-12-11 01:17:10 +08:00
|
|
|
char uuid_str[BTRFS_UUID_UNPARSED_SIZE];
|
2012-07-26 05:08:25 +08:00
|
|
|
struct btrfs_ioctl_vol_args_v2 args_v2;
|
2013-06-26 23:17:57 +08:00
|
|
|
struct subvol_info *parent_subvol = NULL;
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = finish_subvol(rctx);
|
2012-07-26 05:08:25 +08:00
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
if (rctx->cur_subvol.path) {
|
2016-09-06 19:08:29 +08:00
|
|
|
error("snapshot: another one already started, path ptr: %s",
|
2016-11-03 06:42:56 +08:00
|
|
|
rctx->cur_subvol.path);
|
2016-09-06 19:08:29 +08:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
2016-11-03 06:42:56 +08:00
|
|
|
if (rctx->cur_subvol_path[0]) {
|
2016-09-06 19:08:29 +08:00
|
|
|
error("snapshot: another one already started, path buf: %s",
|
2019-06-17 15:59:36 +08:00
|
|
|
rctx->cur_subvol_path);
|
2016-09-06 19:08:29 +08:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
if (*rctx->dest_dir_path == 0) {
|
2024-06-18 02:44:25 +08:00
|
|
|
strncpy_null(rctx->cur_subvol_path, path, sizeof(rctx->cur_subvol_path));
|
2015-06-16 21:56:37 +08:00
|
|
|
} else {
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(rctx->cur_subvol_path, rctx->dest_dir_path,
|
|
|
|
path);
|
2015-06-16 21:56:37 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("snapshot: path invalid: %s", path);
|
2015-06-16 21:56:37 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat3_out(rctx->full_subvol_path, rctx->root_path,
|
|
|
|
rctx->dest_dir_path, path);
|
2015-06-16 21:36:42 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("snapshot: path invalid: %s", path);
|
2015-06-16 21:36:42 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
pr_verbose(1, "At snapshot %s\n", path);
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
memcpy(rctx->cur_subvol.received_uuid, uuid, BTRFS_UUID_SIZE);
|
|
|
|
rctx->cur_subvol.stransid = ctransid;
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 2) {
|
2016-11-03 06:42:56 +08:00
|
|
|
uuid_unparse((u8*)rctx->cur_subvol.received_uuid, uuid_str);
|
2012-07-26 05:08:25 +08:00
|
|
|
fprintf(stderr, "receiving snapshot %s uuid=%s, "
|
|
|
|
"ctransid=%llu ", path, uuid_str,
|
2016-11-03 06:42:56 +08:00
|
|
|
rctx->cur_subvol.stransid);
|
2012-07-26 05:08:25 +08:00
|
|
|
uuid_unparse(parent_uuid, uuid_str);
|
|
|
|
fprintf(stderr, "parent_uuid=%s, parent_ctransid=%llu\n",
|
|
|
|
uuid_str, parent_ctransid);
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&args_v2, 0, sizeof(args_v2));
|
2024-06-18 02:44:25 +08:00
|
|
|
strncpy_null(args_v2.name, path, sizeof(args_v2.name));
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2023-06-18 08:05:30 +08:00
|
|
|
parent_subvol = search_source_subvol(rctx->mnt_fd, parent_uuid,
|
|
|
|
parent_ctransid);
|
2016-12-15 16:37:02 +08:00
|
|
|
if (IS_ERR_OR_NULL(parent_subvol)) {
|
|
|
|
if (!parent_subvol)
|
|
|
|
ret = -ENOENT;
|
|
|
|
else
|
|
|
|
ret = PTR_ERR(parent_subvol);
|
2023-04-23 09:03:42 +08:00
|
|
|
uuid_unparse(parent_uuid, uuid_str);
|
|
|
|
error("snapshot: cannot find parent subvolume %s", uuid_str);
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2015-06-11 03:05:51 +08:00
|
|
|
/*
|
|
|
|
* The path is resolved from the root subvol, but we could be in some
|
|
|
|
* subvolume under the root subvolume, so try and adjust the path to be
|
|
|
|
* relative to our root path.
|
|
|
|
*/
|
2016-11-03 06:42:56 +08:00
|
|
|
if (rctx->full_root_path) {
|
2015-06-11 03:05:51 +08:00
|
|
|
size_t root_len;
|
|
|
|
size_t sub_len;
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
root_len = strlen(rctx->full_root_path);
|
2015-06-11 03:05:51 +08:00
|
|
|
sub_len = strlen(parent_subvol->path);
|
|
|
|
|
|
|
|
/* First make sure the parent subvol is actually in our path */
|
2017-02-23 06:56:36 +08:00
|
|
|
if (strstr(parent_subvol->path, rctx->full_root_path) != parent_subvol->path ||
|
|
|
|
(sub_len > root_len && parent_subvol->path[root_len] != '/')) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error(
|
|
|
|
"parent subvol is not reachable from inside the root subvol");
|
2015-06-11 03:05:51 +08:00
|
|
|
ret = -ENOENT;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sub_len == root_len) {
|
2017-02-23 06:56:36 +08:00
|
|
|
parent_subvol->path[0] = '.';
|
2015-06-11 03:05:51 +08:00
|
|
|
parent_subvol->path[1] = '\0';
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* root path is foo/bar
|
|
|
|
* subvol path is foo/bar/baz
|
|
|
|
*
|
|
|
|
* we need to have baz be the path, so we need to move
|
|
|
|
* the bit after foo/bar/, so path + root_len + 1, and
|
|
|
|
* move the part we care about, so sub_len - root_len -
|
|
|
|
* 1.
|
|
|
|
*/
|
|
|
|
memmove(parent_subvol->path,
|
|
|
|
parent_subvol->path + root_len + 1,
|
|
|
|
sub_len - root_len - 1);
|
|
|
|
parent_subvol->path[sub_len - root_len - 1] = '\0';
|
|
|
|
}
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2015-11-06 23:53:55 +08:00
|
|
|
if (*parent_subvol->path == 0)
|
2016-11-03 06:42:56 +08:00
|
|
|
args_v2.fd = dup(rctx->mnt_fd);
|
2015-06-11 03:05:51 +08:00
|
|
|
else
|
2016-11-03 06:42:56 +08:00
|
|
|
args_v2.fd = openat(rctx->mnt_fd, parent_subvol->path,
|
|
|
|
O_RDONLY | O_NOATIME);
|
2012-07-26 05:08:25 +08:00
|
|
|
if (args_v2.fd < 0) {
|
|
|
|
ret = -errno;
|
2013-12-18 17:56:33 +08:00
|
|
|
if (errno != ENOENT)
|
2018-10-25 20:10:54 +08:00
|
|
|
error("cannot open %s: %m", parent_subvol->path);
|
2013-12-18 17:56:33 +08:00
|
|
|
else
|
|
|
|
fprintf(stderr,
|
|
|
|
"It seems that you have changed your default "
|
|
|
|
"subvolume or you specify other subvolume to\n"
|
|
|
|
"mount btrfs, try to remount this btrfs filesystem "
|
|
|
|
"with fs tree, and run btrfs receive again!\n");
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = ioctl(rctx->dest_dir_fd, BTRFS_IOC_SNAP_CREATE_V2, &args_v2);
|
2012-07-26 05:08:25 +08:00
|
|
|
close(args_v2.fd);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("creating snapshot %s -> %s failed: %m",
|
|
|
|
parent_subvol->path, path);
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
2022-01-02 09:50:16 +08:00
|
|
|
if (!IS_ERR_OR_NULL(parent_subvol)) {
|
2013-06-26 23:17:57 +08:00
|
|
|
free(parent_subvol->path);
|
|
|
|
free(parent_subvol);
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_mkfile(const char *path, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-13 00:18:40 +08:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("mkfile: path invalid: %s", path);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-26 05:08:25 +08:00
|
|
|
fprintf(stderr, "mkfile %s\n", path);
|
|
|
|
|
|
|
|
ret = creat(full_path, 0600);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("mkfile %s failed: %m", path);
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
close(ret);
|
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_mkdir(const char *path, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-13 00:18:40 +08:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("mkdir: path invalid: %s", path);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-26 05:08:25 +08:00
|
|
|
fprintf(stderr, "mkdir %s\n", path);
|
|
|
|
|
|
|
|
ret = mkdir(full_path, 0700);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("mkdir %s failed: %m", path);
|
2012-07-26 05:08:25 +08:00
|
|
|
}
|
|
|
|
|
2015-06-13 00:18:40 +08:00
|
|
|
out:
|
2012-07-26 05:08:25 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_mknod(const char *path, u64 mode, u64 dev, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-13 00:18:40 +08:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("mknod: path invalid: %s", path);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-26 05:08:25 +08:00
|
|
|
fprintf(stderr, "mknod %s mode=%llu, dev=%llu\n",
|
|
|
|
path, mode, dev);
|
|
|
|
|
|
|
|
ret = mknod(full_path, mode & S_IFMT, dev);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("mknod %s failed: %m", path);
|
2012-07-26 05:08:25 +08:00
|
|
|
}
|
|
|
|
|
2015-06-13 00:18:40 +08:00
|
|
|
out:
|
2012-07-26 05:08:25 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_mkfifo(const char *path, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-13 00:18:40 +08:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("mkfifo: path invalid: %s", path);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-26 05:08:25 +08:00
|
|
|
fprintf(stderr, "mkfifo %s\n", path);
|
|
|
|
|
|
|
|
ret = mkfifo(full_path, 0600);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("mkfifo %s failed: %m", path);
|
2012-07-26 05:08:25 +08:00
|
|
|
}
|
|
|
|
|
2015-06-13 00:18:40 +08:00
|
|
|
out:
|
2012-07-26 05:08:25 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_mksock(const char *path, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-13 00:18:40 +08:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("mksock: path invalid: %s", path);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-26 05:08:25 +08:00
|
|
|
fprintf(stderr, "mksock %s\n", path);
|
|
|
|
|
|
|
|
ret = mknod(full_path, 0600 | S_IFSOCK, 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("mknod %s failed: %m", path);
|
2012-07-26 05:08:25 +08:00
|
|
|
}
|
|
|
|
|
2015-06-13 00:18:40 +08:00
|
|
|
out:
|
2012-07-26 05:08:25 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_symlink(const char *path, const char *lnk, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-13 00:18:40 +08:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("symlink: path invalid: %s", path);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-26 05:08:25 +08:00
|
|
|
fprintf(stderr, "symlink %s -> %s\n", path, lnk);
|
|
|
|
|
|
|
|
ret = symlink(lnk, full_path);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("symlink %s -> %s failed: %m", path, lnk);
|
2012-07-26 05:08:25 +08:00
|
|
|
}
|
|
|
|
|
2015-06-13 00:18:40 +08:00
|
|
|
out:
|
2012-07-26 05:08:25 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_rename(const char *from, const char *to, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-13 00:18:40 +08:00
|
|
|
char full_from[PATH_MAX];
|
|
|
|
char full_to[PATH_MAX];
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_from, rctx->full_subvol_path, from);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("rename: source path invalid: %s", from);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_to, rctx->full_subvol_path, to);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("rename: target path invalid: %s", to);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-26 05:08:25 +08:00
|
|
|
fprintf(stderr, "rename %s -> %s\n", from, to);
|
|
|
|
|
|
|
|
ret = rename(full_from, full_to);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("rename %s -> %s failed: %m", from, to);
|
2012-07-26 05:08:25 +08:00
|
|
|
}
|
|
|
|
|
2015-06-13 00:18:40 +08:00
|
|
|
out:
|
2012-07-26 05:08:25 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_link(const char *path, const char *lnk, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-13 00:18:40 +08:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
char full_link_path[PATH_MAX];
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("link: source path invalid: %s", full_path);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_link_path, rctx->full_subvol_path, lnk);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("link: target path invalid: %s", full_link_path);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-26 05:08:25 +08:00
|
|
|
fprintf(stderr, "link %s -> %s\n", path, lnk);
|
|
|
|
|
|
|
|
ret = link(full_link_path, full_path);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("link %s -> %s failed: %m", path, lnk);
|
2012-07-26 05:08:25 +08:00
|
|
|
}
|
|
|
|
|
2015-06-13 00:18:40 +08:00
|
|
|
out:
|
2012-07-26 05:08:25 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int process_unlink(const char *path, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-13 00:18:40 +08:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("unlink: path invalid: %s", path);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-26 05:08:25 +08:00
|
|
|
fprintf(stderr, "unlink %s\n", path);
|
|
|
|
|
|
|
|
ret = unlink(full_path);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("unlink %s failed: %m", path);
|
2012-07-26 05:08:25 +08:00
|
|
|
}
|
|
|
|
|
2015-06-13 00:18:40 +08:00
|
|
|
out:
|
2012-07-26 05:08:25 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_rmdir(const char *path, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-13 00:18:40 +08:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("rmdir: path invalid: %s", path);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-26 05:08:25 +08:00
|
|
|
fprintf(stderr, "rmdir %s\n", path);
|
|
|
|
|
|
|
|
ret = rmdir(full_path);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("rmdir %s failed: %m", path);
|
2012-07-26 05:08:25 +08:00
|
|
|
}
|
|
|
|
|
2015-06-13 00:18:40 +08:00
|
|
|
out:
|
2012-07-26 05:08:25 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
static int open_inode_for_write(struct btrfs_receive *rctx, const char *path)
|
2012-07-26 05:08:25 +08:00
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
if (rctx->write_fd != -1) {
|
|
|
|
if (strcmp(rctx->write_path, path) == 0)
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
2016-11-03 06:42:56 +08:00
|
|
|
close(rctx->write_fd);
|
|
|
|
rctx->write_fd = -1;
|
2012-07-26 05:08:25 +08:00
|
|
|
}
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
rctx->write_fd = open(path, O_RDWR);
|
|
|
|
if (rctx->write_fd < 0) {
|
2012-07-26 05:08:25 +08:00
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("cannot open %s: %m", path);
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2024-06-18 02:44:25 +08:00
|
|
|
strncpy_null(rctx->write_path, path, sizeof(rctx->write_path));
|
2012-07-26 05:08:25 +08:00
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
static void close_inode_for_write(struct btrfs_receive *rctx)
|
2012-07-26 05:08:25 +08:00
|
|
|
{
|
2016-11-03 06:42:56 +08:00
|
|
|
if(rctx->write_fd == -1)
|
2014-04-19 07:14:14 +08:00
|
|
|
return;
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
close(rctx->write_fd);
|
|
|
|
rctx->write_fd = -1;
|
|
|
|
rctx->write_path[0] = 0;
|
2012-07-26 05:08:25 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int process_write(const char *path, const void *data, u64 offset,
|
|
|
|
u64 len, void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-13 00:18:40 +08:00
|
|
|
char full_path[PATH_MAX];
|
2012-07-26 05:08:25 +08:00
|
|
|
u64 pos = 0;
|
|
|
|
int w;
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("write: path invalid: %s", path);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = open_inode_for_write(rctx, full_path);
|
2012-07-26 05:08:25 +08:00
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 2)
|
2019-03-30 03:35:26 +08:00
|
|
|
fprintf(stderr, "write %s - offset=%llu length=%llu\n",
|
|
|
|
path, offset, len);
|
|
|
|
|
2012-07-26 05:08:25 +08:00
|
|
|
while (pos < len) {
|
2016-11-03 06:42:56 +08:00
|
|
|
w = pwrite(rctx->write_fd, (char*)data + pos, len - pos,
|
2012-07-26 05:08:25 +08:00
|
|
|
offset + pos);
|
|
|
|
if (w < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("writing to %s failed: %m", path);
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
pos += w;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_clone(const char *path, u64 offset, u64 len,
|
|
|
|
const u8 *clone_uuid, u64 clone_ctransid,
|
|
|
|
const char *clone_path, u64 clone_offset,
|
|
|
|
void *user)
|
|
|
|
{
|
2013-06-26 23:17:57 +08:00
|
|
|
int ret;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2012-07-26 05:08:25 +08:00
|
|
|
struct btrfs_ioctl_clone_range_args clone_args;
|
|
|
|
struct subvol_info *si = NULL;
|
2015-06-13 00:18:40 +08:00
|
|
|
char full_path[PATH_MAX];
|
2019-07-23 03:15:03 +08:00
|
|
|
const char *subvol_path;
|
2015-06-13 00:18:40 +08:00
|
|
|
char full_clone_path[PATH_MAX];
|
2012-07-26 05:08:25 +08:00
|
|
|
int clone_fd = -1;
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("clone: source path invalid: %s", path);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = open_inode_for_write(rctx, full_path);
|
2012-07-26 05:08:25 +08:00
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
2020-03-11 16:17:10 +08:00
|
|
|
if (memcmp(clone_uuid, rctx->cur_subvol.received_uuid,
|
|
|
|
BTRFS_UUID_SIZE) == 0) {
|
|
|
|
subvol_path = rctx->cur_subvol_path;
|
|
|
|
} else {
|
2023-06-18 08:05:30 +08:00
|
|
|
si = search_source_subvol(rctx->mnt_fd, clone_uuid,
|
|
|
|
clone_ctransid);
|
2020-03-11 16:17:10 +08:00
|
|
|
if (IS_ERR_OR_NULL(si)) {
|
2023-04-23 09:03:42 +08:00
|
|
|
char uuid_str[BTRFS_UUID_UNPARSED_SIZE];
|
|
|
|
|
2016-12-15 16:37:02 +08:00
|
|
|
if (!si)
|
|
|
|
ret = -ENOENT;
|
|
|
|
else
|
|
|
|
ret = PTR_ERR(si);
|
2023-04-23 09:03:42 +08:00
|
|
|
uuid_unparse(clone_uuid, uuid_str);
|
|
|
|
error("clone: cannot find source subvol %s", uuid_str);
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2017-02-23 06:56:37 +08:00
|
|
|
/* strip the subvolume that we are receiving to from the start of subvol_path */
|
|
|
|
if (rctx->full_root_path) {
|
|
|
|
size_t root_len = strlen(rctx->full_root_path);
|
|
|
|
size_t sub_len = strlen(si->path);
|
|
|
|
|
|
|
|
if (sub_len > root_len &&
|
|
|
|
strstr(si->path, rctx->full_root_path) == si->path &&
|
|
|
|
si->path[root_len] == '/') {
|
2019-07-23 03:15:03 +08:00
|
|
|
subvol_path = si->path + root_len + 1;
|
2017-02-23 06:56:37 +08:00
|
|
|
} else {
|
|
|
|
error("clone: source subvol path %s unreachable from %s",
|
|
|
|
si->path, rctx->full_root_path);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
} else {
|
2019-07-23 03:15:03 +08:00
|
|
|
subvol_path = si->path;
|
2017-02-23 06:56:37 +08:00
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
}
|
|
|
|
|
2015-06-13 00:18:40 +08:00
|
|
|
ret = path_cat_out(full_clone_path, subvol_path, clone_path);
|
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("clone: target path invalid: %s", clone_path);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
clone_fd = openat(rctx->mnt_fd, full_clone_path, O_RDONLY | O_NOATIME);
|
2012-07-26 05:08:25 +08:00
|
|
|
if (clone_fd < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("cannot open %s: %m", full_clone_path);
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 2)
|
2019-03-30 03:35:26 +08:00
|
|
|
fprintf(stderr,
|
|
|
|
"clone %s - source=%s source offset=%llu offset=%llu length=%llu\n",
|
|
|
|
path, clone_path, clone_offset, offset, len);
|
|
|
|
|
2012-07-26 05:08:25 +08:00
|
|
|
clone_args.src_fd = clone_fd;
|
|
|
|
clone_args.src_offset = clone_offset;
|
|
|
|
clone_args.src_length = len;
|
|
|
|
clone_args.dest_offset = offset;
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = ioctl(rctx->write_fd, BTRFS_IOC_CLONE_RANGE, &clone_args);
|
2016-01-12 20:35:50 +08:00
|
|
|
if (ret < 0) {
|
2012-07-26 05:08:25 +08:00
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("failed to clone extents to %s: %m", path);
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
2022-09-03 00:13:27 +08:00
|
|
|
if (!IS_ERR_OR_NULL(si)) {
|
2013-06-26 23:17:57 +08:00
|
|
|
free(si->path);
|
|
|
|
free(si);
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
if (clone_fd != -1)
|
|
|
|
close(clone_fd);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int process_set_xattr(const char *path, const char *name,
|
|
|
|
const void *data, int len, void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-13 00:18:40 +08:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("set_xattr: path invalid: %s", path);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 3) {
|
2012-07-26 05:08:25 +08:00
|
|
|
fprintf(stderr, "set_xattr %s - name=%s data_len=%d "
|
|
|
|
"data=%.*s\n", path, name, len,
|
|
|
|
len, (char*)data);
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = lsetxattr(full_path, name, data, len, 0);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("lsetxattr %s %s=%.*s failed: %m",
|
|
|
|
path, name, len, (char*)data);
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_remove_xattr(const char *path, const char *name, void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-13 00:18:40 +08:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("remove_xattr: path invalid: %s", path);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 3) {
|
2012-07-26 05:08:25 +08:00
|
|
|
fprintf(stderr, "remove_xattr %s - name=%s\n",
|
|
|
|
path, name);
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = lremovexattr(full_path, name);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("lremovexattr %s %s failed: %m", path, name);
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_truncate(const char *path, u64 size, void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-13 00:18:40 +08:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("truncate: path invalid: %s", path);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-26 05:08:25 +08:00
|
|
|
fprintf(stderr, "truncate %s size=%llu\n", path, size);
|
|
|
|
|
|
|
|
ret = truncate(full_path, size);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("truncate %s failed: %m", path);
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_chmod(const char *path, u64 mode, void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-13 00:18:40 +08:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("chmod: path invalid: %s", path);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-26 05:08:25 +08:00
|
|
|
fprintf(stderr, "chmod %s - mode=0%o\n", path, (int)mode);
|
|
|
|
|
|
|
|
ret = chmod(full_path, mode);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("chmod %s failed: %m", path);
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_chown(const char *path, u64 uid, u64 gid, void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-13 00:18:40 +08:00
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("chown: path invalid: %s", path);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-26 05:08:25 +08:00
|
|
|
fprintf(stderr, "chown %s - uid=%llu, gid=%llu\n", path,
|
|
|
|
uid, gid);
|
|
|
|
|
2012-10-17 21:53:58 +08:00
|
|
|
ret = lchown(full_path, uid, gid);
|
2012-07-26 05:08:25 +08:00
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("chown %s failed: %m", path);
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int process_utimes(const char *path, struct timespec *at,
|
|
|
|
struct timespec *mt, struct timespec *ct,
|
|
|
|
void *user)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive *rctx = user;
|
2015-06-13 00:18:40 +08:00
|
|
|
char full_path[PATH_MAX];
|
2012-07-26 05:08:25 +08:00
|
|
|
struct timespec tv[2];
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
2015-06-13 00:18:40 +08:00
|
|
|
if (ret < 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("utimes: path invalid: %s", path);
|
2015-06-13 00:18:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 3)
|
2012-07-26 05:08:25 +08:00
|
|
|
fprintf(stderr, "utimes %s\n", path);
|
|
|
|
|
|
|
|
tv[0] = *at;
|
|
|
|
tv[1] = *mt;
|
2013-04-10 01:08:44 +08:00
|
|
|
ret = utimensat(AT_FDCWD, full_path, tv, AT_SYMLINK_NOFOLLOW);
|
2012-07-26 05:08:25 +08:00
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("utimes %s failed: %m", path);
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2015-06-12 01:31:01 +08:00
|
|
|
static int process_update_extent(const char *path, u64 offset, u64 len,
|
|
|
|
void *user)
|
|
|
|
{
|
2019-11-25 18:39:05 +08:00
|
|
|
if (bconf.verbose >= 3)
|
2015-06-12 01:31:01 +08:00
|
|
|
fprintf(stderr, "update_extent %s: offset=%llu, len=%llu\n",
|
2022-09-28 07:13:00 +08:00
|
|
|
path, offset, len);
|
2015-06-12 01:31:01 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Sent with BTRFS_SEND_FLAG_NO_FILE_DATA, nothing to do.
|
|
|
|
*/
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2022-03-18 01:25:49 +08:00
|
|
|
static int decompress_zlib(struct btrfs_receive *rctx, const char *encoded_data,
|
|
|
|
u64 encoded_len, char *unencoded_data,
|
|
|
|
u64 unencoded_len)
|
|
|
|
{
|
|
|
|
bool init = false;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!rctx->zlib_stream) {
|
|
|
|
init = true;
|
|
|
|
rctx->zlib_stream = malloc(sizeof(z_stream));
|
|
|
|
if (!rctx->zlib_stream) {
|
2022-09-30 15:12:06 +08:00
|
|
|
error_msg(ERROR_MSG_MEMORY, "zlib stream: %m");
|
2022-03-18 01:25:49 +08:00
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
rctx->zlib_stream->next_in = (void *)encoded_data;
|
|
|
|
rctx->zlib_stream->avail_in = encoded_len;
|
|
|
|
rctx->zlib_stream->next_out = (void *)unencoded_data;
|
|
|
|
rctx->zlib_stream->avail_out = unencoded_len;
|
|
|
|
|
|
|
|
if (init) {
|
|
|
|
rctx->zlib_stream->zalloc = Z_NULL;
|
|
|
|
rctx->zlib_stream->zfree = Z_NULL;
|
|
|
|
rctx->zlib_stream->opaque = Z_NULL;
|
|
|
|
ret = inflateInit(rctx->zlib_stream);
|
|
|
|
} else {
|
|
|
|
ret = inflateReset(rctx->zlib_stream);
|
|
|
|
}
|
|
|
|
if (ret != Z_OK) {
|
|
|
|
error("zlib inflate init failed: %d", ret);
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
while (rctx->zlib_stream->avail_in > 0 &&
|
|
|
|
rctx->zlib_stream->avail_out > 0) {
|
|
|
|
ret = inflate(rctx->zlib_stream, Z_FINISH);
|
|
|
|
if (ret == Z_STREAM_END) {
|
|
|
|
break;
|
|
|
|
} else if (ret != Z_OK) {
|
|
|
|
error("zlib inflate failed: %d", ret);
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-06-21 07:53:05 +08:00
|
|
|
#if COMPRESSION_ZSTD
|
2022-03-18 01:25:49 +08:00
|
|
|
static int decompress_zstd(struct btrfs_receive *rctx, const char *encoded_buf,
|
|
|
|
u64 encoded_len, char *unencoded_buf,
|
|
|
|
u64 unencoded_len)
|
|
|
|
{
|
|
|
|
ZSTD_inBuffer in_buf = {
|
|
|
|
.src = encoded_buf,
|
|
|
|
.size = encoded_len
|
|
|
|
};
|
|
|
|
ZSTD_outBuffer out_buf = {
|
|
|
|
.dst = unencoded_buf,
|
|
|
|
.size = unencoded_len
|
|
|
|
};
|
|
|
|
size_t ret;
|
|
|
|
|
|
|
|
if (!rctx->zstd_dstream) {
|
|
|
|
rctx->zstd_dstream = ZSTD_createDStream();
|
|
|
|
if (!rctx->zstd_dstream) {
|
|
|
|
error("failed to create zstd dstream");
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ret = ZSTD_initDStream(rctx->zstd_dstream);
|
|
|
|
if (ZSTD_isError(ret)) {
|
|
|
|
error("failed to init zstd stream: %s", ZSTD_getErrorName(ret));
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
while (in_buf.pos < in_buf.size && out_buf.pos < out_buf.size) {
|
|
|
|
ret = ZSTD_decompressStream(rctx->zstd_dstream, &out_buf, &in_buf);
|
|
|
|
if (ret == 0) {
|
|
|
|
break;
|
|
|
|
} else if (ZSTD_isError(ret)) {
|
|
|
|
error("failed to decompress zstd stream: %s",
|
|
|
|
ZSTD_getErrorName(ret));
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
}
|
btrfs-progs: receive: fix a corruption when decompressing zstd extents
Before decompressing, we zero out the content of the entire output buffer,
so that we don't get any garbage after the last byte of data. We do this
for all compression algorithms. However zstd, at least with libzstd 1.5.2
on Debian (version 1.5.2+dfsg-1), the decompression routine can end up
touching the content of the output buffer beyond the last valid byte of
decompressed data, resulting in a corruption.
Example reproducer:
$ cat test.sh
#!/bin/bash
DEV=/dev/sdj
MNT=/mnt/sdj
rm -f /tmp/send.stream
umount $DEV &> /dev/null
mkfs.btrfs -f $DEV &> /dev/null || echo "MKFS failed!"
mount -o compress=zstd $DEV $MNT
# File foo is not sector size aligned, 127K.
xfs_io -f -c "pwrite -S 0xab 0 3" \
-c "pwrite -S 0xcd 3 130042" \
-c "pwrite -S 0xef 130045 3" $MNT/foo
# Now do an fallocate that increases the size of foo from 127K to 128K.
xfs_io -c "falloc 0 128K " $MNT/foo
btrfs subvolume snapshot -r $MNT $MNT/snap
btrfs send --compressed-data -f /tmp/send.stream $MNT/snap
echo -e "\nFile data in the original filesystem:\n"
od -A d -t x1 $MNT/snap/foo
umount $MNT
mkfs.btrfs -f $DEV &> /dev/null || echo "MKFS failed!"
mount $DEV $MNT
btrfs receive --force-decompress -f /tmp/send.stream $MNT
echo -e "\nFile data in the new filesystem:\n"
od -A d -t x1 $MNT/snap/foo
umount $MNT
Running the reproducer gives:
$ ./test.sh
(...)
File data in the original filesystem:
0000000 ab ab ab cd cd cd cd cd cd cd cd cd cd cd cd cd
0000016 cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd
*
0130032 cd cd cd cd cd cd cd cd cd cd cd cd cd ef ef ef
0130048 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
*
0131072
At subvol snap
File data in the new filesystem:
0000000 ab ab ab cd cd cd cd cd cd cd cd cd cd cd cd cd
0000016 cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd
*
0130032 cd cd cd cd cd cd cd cd cd cd cd cd cd ef ef ef
0130048 cd cd cd cd 00 00 00 00 00 00 00 00 00 00 00 00
0130064 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
*
0131072
The are 4 bytes with a value of 0xcd instead of 0x00, at file offset
127K (130048).
Fix this by explicitly zeroing out the part of the output buffer that was
not used after decompressing with zstd.
The decompression of compressed extents, sent when using the send v2
stream, happens in the following cases:
1) By explicitly passing --force-decompress to the receive command, as in
the reproducer above;
2) Calling the BTRFS_IOC_ENCODED_WRITE ioctl failed with -ENOTTY, meaning
the kernel on the receiving side is old and does not implement that
ioctl;
3) Calling the BTRFS_IOC_ENCODED_WRITE ioctl failed with -ENOSPC;
4) Calling the BTRFS_IOC_ENCODED_WRITE ioctl failed with -EINVAL.
Reviewed-by: Qu Wenruo <wqu@suse.com>
Signed-off-by: Filipe Manana <fdmanana@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
2023-02-02 23:59:01 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Zero out the unused part of the output buffer.
|
|
|
|
* At least with zstd 1.5.2, the decompression can leave some garbage
|
|
|
|
* at/beyond the offset out_buf.pos.
|
|
|
|
*/
|
|
|
|
if (out_buf.pos < out_buf.size)
|
|
|
|
memset(unencoded_buf + out_buf.pos, 0, out_buf.size - out_buf.pos);
|
|
|
|
|
2022-03-18 01:25:49 +08:00
|
|
|
return 0;
|
|
|
|
}
|
2022-06-21 07:30:23 +08:00
|
|
|
#endif
|
2022-03-18 01:25:49 +08:00
|
|
|
|
2022-06-21 07:53:05 +08:00
|
|
|
#if COMPRESSION_LZO
|
2022-03-18 01:25:49 +08:00
|
|
|
static int decompress_lzo(const char *encoded_data, u64 encoded_len,
|
|
|
|
char *unencoded_data, u64 unencoded_len,
|
|
|
|
unsigned int sector_size)
|
|
|
|
{
|
|
|
|
uint32_t total_len;
|
|
|
|
size_t in_pos, out_pos;
|
|
|
|
|
|
|
|
if (encoded_len < 4) {
|
|
|
|
error("lzo header is truncated");
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
memcpy(&total_len, encoded_data, 4);
|
|
|
|
total_len = le32toh(total_len);
|
|
|
|
if (total_len > encoded_len) {
|
|
|
|
error("lzo header is invalid");
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
in_pos = 4;
|
|
|
|
out_pos = 0;
|
|
|
|
while (in_pos < total_len && out_pos < unencoded_len) {
|
|
|
|
size_t sector_remaining;
|
|
|
|
uint32_t src_len;
|
|
|
|
lzo_uint dst_len;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
sector_remaining = -in_pos % sector_size;
|
|
|
|
if (sector_remaining < 4) {
|
|
|
|
if (total_len - in_pos <= sector_remaining)
|
|
|
|
break;
|
|
|
|
in_pos += sector_remaining;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (total_len - in_pos < 4) {
|
|
|
|
error("lzo segment header is truncated");
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(&src_len, encoded_data + in_pos, 4);
|
|
|
|
src_len = le32toh(src_len);
|
|
|
|
in_pos += 4;
|
|
|
|
if (src_len > total_len - in_pos) {
|
|
|
|
error("lzo segment header is invalid");
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
dst_len = sector_size;
|
|
|
|
ret = lzo1x_decompress_safe((void *)(encoded_data + in_pos),
|
|
|
|
src_len,
|
|
|
|
(void *)(unencoded_data + out_pos),
|
|
|
|
&dst_len, NULL);
|
|
|
|
if (ret != LZO_E_OK) {
|
|
|
|
error("lzo1x_decompress_safe failed: %d", ret);
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
in_pos += src_len;
|
|
|
|
out_pos += dst_len;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2022-06-21 07:30:23 +08:00
|
|
|
#endif
|
2022-03-18 01:25:49 +08:00
|
|
|
|
|
|
|
static int decompress_and_write(struct btrfs_receive *rctx,
|
|
|
|
const char *encoded_data, u64 offset,
|
|
|
|
u64 encoded_len, u64 unencoded_file_len,
|
|
|
|
u64 unencoded_len, u64 unencoded_offset,
|
|
|
|
u32 compression)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
char *unencoded_data;
|
2022-06-21 07:30:23 +08:00
|
|
|
int sector_shift = 0;
|
btrfs-progs: receive: fix silent data loss after fall back from encoded write
When attempting an encoded write, if it fails for some specific reason
like -EINVAL (when an offset is not sector size aligned) or -ENOSPC, we
then fallback into decompressing the data and writing it using regular
buffered IO. This logic however is not correct, one of the reasons is
that it assumes the encoded offset is smaller than the unencoded file
length and that they can be compared, but one is an offset and the other
is a length, not an end offset, so they can't be compared to get correct
results. This bad logic will often result in not copying all data, or even
no data at all, resulting in a silent data loss. This is easily seen in
with the following reproducer:
$ cat test.sh
#!/bin/bash
DEV=/dev/sdj
MNT=/mnt/sdj
umount $DEV &> /dev/null
mkfs.btrfs -f $DEV > /dev/null
mount -o compress $DEV $MNT
# File foo has a size of 33K, not aligned to the sector size.
xfs_io -f -c "pwrite -S 0xab 0 33K" $MNT/foo
xfs_io -f -c "pwrite -S 0xcd 0 64K" $MNT/bar
# Now clone the first 32K of file bar into foo at offset 0.
xfs_io -c "reflink $MNT/bar 0 0 32K" $MNT/foo
# Snapshot the default subvolume and create a full send stream (v2).
btrfs subvolume snapshot -r $MNT $MNT/snap
btrfs send --compressed-data -f /tmp/test.send $MNT/snap
echo -e "\nFile bar in the original filesystem:"
od -A d -t x1 $MNT/snap/bar
umount $MNT
mkfs.btrfs -f $DEV > /dev/null
mount $DEV $MNT
echo -e "\nReceiving stream in a new filesystem..."
btrfs receive -f /tmp/test.send $MNT
echo -e "\nFile bar in the new filesystem:"
od -A d -t x1 $MNT/snap/bar
umount $MNT
Running the test without this patch:
$ ./test.sh
(...)
File bar in the original filesystem:
0000000 cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd
*
0065536
Receiving stream in a new filesystem...
At subvol snap
File bar in the new filesystem:
0000000 cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd
*
0033792
We end up with file bar having less data, and a smaller size, than in the
original filesystem.
This happens because when processing file bar, send issues the following
commands:
clone bar - source=foo source offset=0 offset=0 length=32768
write bar - offset=32768 length=1024
encoded_write bar - offset=33792, len=4096, unencoded_offset=33792, unencoded_file_len=31744, unencoded_len=65536, compression=1, encryption=0
The first 32K are cloned from file foo, as that file ranged is shared
between the files.
Then there's a regular write operation for the file range [32K, 33K),
since file foo has different data from bar for that file range.
Finally for the remainder of file bar, the send side issues an encoded
write since the extent is compressed in the source filesystem, for the
file offset 33792 (33K), remaining 31K of data. The receiver will try the
encoded write, but that fails with -EINVAL since the offset 33K is not
sector size aligned, so it will fallback to decompressing the data and
writing it using regular buffered writes. However that results in doing
no writes at decompress_and_write() because 'pos' is initialized to the
value of 33K (unencoded_offset) and unencoded_file_len is 31K, so the
while loop has no iterations.
Another case where we can fallback to decompression plus regular buffered
writes is when the destination filesystem has a sector size larger then
the sector size of the source filesystem (for example when the source
filesystem is on x86_64 with a 4K sector size and the destination
filesystem is PowerPC with a 64K sector size). In that scenario encoded
write attempts will fail with -EINVAL due to offsets not being aligned
with the sector size of the destination filesystem, and the receive will
attempt the fallback of decompressing the buffer and writing the
decompressed using regular buffered IO.
Fix this by tracking the number of written bytes instead, and increment
it, and the unencoded offset, after each write.
Fixes: d20e759fc917 ("btrfs-progs: receive: encoded_write fallback to explicit decode and write")
Reviewed-by: Boris Burkov <boris@bur.io>
Signed-off-by: Filipe Manana <fdmanana@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
2022-11-16 00:25:26 +08:00
|
|
|
u64 written = 0;
|
2022-03-18 01:25:49 +08:00
|
|
|
|
|
|
|
unencoded_data = calloc(unencoded_len, 1);
|
|
|
|
if (!unencoded_data) {
|
2022-09-30 15:12:06 +08:00
|
|
|
error_msg(ERROR_MSG_MEMORY, "unencoded data: %m");
|
2022-03-18 01:25:49 +08:00
|
|
|
return -errno;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (compression) {
|
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_ZLIB:
|
|
|
|
ret = decompress_zlib(rctx, encoded_data, encoded_len,
|
|
|
|
unencoded_data, unencoded_len);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
break;
|
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_ZSTD:
|
2023-12-07 21:29:54 +08:00
|
|
|
#if COMPRESSION_ZSTD
|
2022-03-18 01:25:49 +08:00
|
|
|
ret = decompress_zstd(rctx, encoded_data, encoded_len,
|
|
|
|
unencoded_data, unencoded_len);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
break;
|
2022-06-21 07:30:23 +08:00
|
|
|
#else
|
|
|
|
error("ZSTD compression for stream not compiled in");
|
|
|
|
ret = -EOPNOTSUPP;
|
|
|
|
goto out;
|
|
|
|
#endif
|
2022-03-18 01:25:49 +08:00
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_LZO_4K:
|
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_LZO_8K:
|
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_LZO_16K:
|
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_LZO_32K:
|
|
|
|
case BTRFS_ENCODED_IO_COMPRESSION_LZO_64K:
|
2022-06-21 07:53:05 +08:00
|
|
|
#if COMPRESSION_LZO
|
2022-03-18 01:25:49 +08:00
|
|
|
sector_shift =
|
|
|
|
compression - BTRFS_ENCODED_IO_COMPRESSION_LZO_4K + 12;
|
|
|
|
ret = decompress_lzo(encoded_data, encoded_len, unencoded_data,
|
|
|
|
unencoded_len, 1U << sector_shift);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
break;
|
2022-06-21 07:30:23 +08:00
|
|
|
#else
|
|
|
|
error("LZO compression for stream not compiled in");
|
|
|
|
ret = -EOPNOTSUPP;
|
|
|
|
goto out;
|
|
|
|
#endif
|
2022-03-18 01:25:49 +08:00
|
|
|
default:
|
|
|
|
error("unknown compression: %d", compression);
|
|
|
|
ret = -EOPNOTSUPP;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
btrfs-progs: receive: fix silent data loss after fall back from encoded write
When attempting an encoded write, if it fails for some specific reason
like -EINVAL (when an offset is not sector size aligned) or -ENOSPC, we
then fallback into decompressing the data and writing it using regular
buffered IO. This logic however is not correct, one of the reasons is
that it assumes the encoded offset is smaller than the unencoded file
length and that they can be compared, but one is an offset and the other
is a length, not an end offset, so they can't be compared to get correct
results. This bad logic will often result in not copying all data, or even
no data at all, resulting in a silent data loss. This is easily seen in
with the following reproducer:
$ cat test.sh
#!/bin/bash
DEV=/dev/sdj
MNT=/mnt/sdj
umount $DEV &> /dev/null
mkfs.btrfs -f $DEV > /dev/null
mount -o compress $DEV $MNT
# File foo has a size of 33K, not aligned to the sector size.
xfs_io -f -c "pwrite -S 0xab 0 33K" $MNT/foo
xfs_io -f -c "pwrite -S 0xcd 0 64K" $MNT/bar
# Now clone the first 32K of file bar into foo at offset 0.
xfs_io -c "reflink $MNT/bar 0 0 32K" $MNT/foo
# Snapshot the default subvolume and create a full send stream (v2).
btrfs subvolume snapshot -r $MNT $MNT/snap
btrfs send --compressed-data -f /tmp/test.send $MNT/snap
echo -e "\nFile bar in the original filesystem:"
od -A d -t x1 $MNT/snap/bar
umount $MNT
mkfs.btrfs -f $DEV > /dev/null
mount $DEV $MNT
echo -e "\nReceiving stream in a new filesystem..."
btrfs receive -f /tmp/test.send $MNT
echo -e "\nFile bar in the new filesystem:"
od -A d -t x1 $MNT/snap/bar
umount $MNT
Running the test without this patch:
$ ./test.sh
(...)
File bar in the original filesystem:
0000000 cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd
*
0065536
Receiving stream in a new filesystem...
At subvol snap
File bar in the new filesystem:
0000000 cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd
*
0033792
We end up with file bar having less data, and a smaller size, than in the
original filesystem.
This happens because when processing file bar, send issues the following
commands:
clone bar - source=foo source offset=0 offset=0 length=32768
write bar - offset=32768 length=1024
encoded_write bar - offset=33792, len=4096, unencoded_offset=33792, unencoded_file_len=31744, unencoded_len=65536, compression=1, encryption=0
The first 32K are cloned from file foo, as that file ranged is shared
between the files.
Then there's a regular write operation for the file range [32K, 33K),
since file foo has different data from bar for that file range.
Finally for the remainder of file bar, the send side issues an encoded
write since the extent is compressed in the source filesystem, for the
file offset 33792 (33K), remaining 31K of data. The receiver will try the
encoded write, but that fails with -EINVAL since the offset 33K is not
sector size aligned, so it will fallback to decompressing the data and
writing it using regular buffered writes. However that results in doing
no writes at decompress_and_write() because 'pos' is initialized to the
value of 33K (unencoded_offset) and unencoded_file_len is 31K, so the
while loop has no iterations.
Another case where we can fallback to decompression plus regular buffered
writes is when the destination filesystem has a sector size larger then
the sector size of the source filesystem (for example when the source
filesystem is on x86_64 with a 4K sector size and the destination
filesystem is PowerPC with a 64K sector size). In that scenario encoded
write attempts will fail with -EINVAL due to offsets not being aligned
with the sector size of the destination filesystem, and the receive will
attempt the fallback of decompressing the buffer and writing the
decompressed using regular buffered IO.
Fix this by tracking the number of written bytes instead, and increment
it, and the unencoded offset, after each write.
Fixes: d20e759fc917 ("btrfs-progs: receive: encoded_write fallback to explicit decode and write")
Reviewed-by: Boris Burkov <boris@bur.io>
Signed-off-by: Filipe Manana <fdmanana@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
2022-11-16 00:25:26 +08:00
|
|
|
while (written < unencoded_file_len) {
|
|
|
|
ssize_t w;
|
|
|
|
|
|
|
|
w = pwrite(rctx->write_fd, unencoded_data + unencoded_offset,
|
|
|
|
unencoded_file_len - written, offset);
|
2022-03-18 01:25:49 +08:00
|
|
|
if (w < 0) {
|
|
|
|
ret = -errno;
|
|
|
|
error("writing unencoded data failed: %m");
|
|
|
|
goto out;
|
|
|
|
}
|
btrfs-progs: receive: fix silent data loss after fall back from encoded write
When attempting an encoded write, if it fails for some specific reason
like -EINVAL (when an offset is not sector size aligned) or -ENOSPC, we
then fallback into decompressing the data and writing it using regular
buffered IO. This logic however is not correct, one of the reasons is
that it assumes the encoded offset is smaller than the unencoded file
length and that they can be compared, but one is an offset and the other
is a length, not an end offset, so they can't be compared to get correct
results. This bad logic will often result in not copying all data, or even
no data at all, resulting in a silent data loss. This is easily seen in
with the following reproducer:
$ cat test.sh
#!/bin/bash
DEV=/dev/sdj
MNT=/mnt/sdj
umount $DEV &> /dev/null
mkfs.btrfs -f $DEV > /dev/null
mount -o compress $DEV $MNT
# File foo has a size of 33K, not aligned to the sector size.
xfs_io -f -c "pwrite -S 0xab 0 33K" $MNT/foo
xfs_io -f -c "pwrite -S 0xcd 0 64K" $MNT/bar
# Now clone the first 32K of file bar into foo at offset 0.
xfs_io -c "reflink $MNT/bar 0 0 32K" $MNT/foo
# Snapshot the default subvolume and create a full send stream (v2).
btrfs subvolume snapshot -r $MNT $MNT/snap
btrfs send --compressed-data -f /tmp/test.send $MNT/snap
echo -e "\nFile bar in the original filesystem:"
od -A d -t x1 $MNT/snap/bar
umount $MNT
mkfs.btrfs -f $DEV > /dev/null
mount $DEV $MNT
echo -e "\nReceiving stream in a new filesystem..."
btrfs receive -f /tmp/test.send $MNT
echo -e "\nFile bar in the new filesystem:"
od -A d -t x1 $MNT/snap/bar
umount $MNT
Running the test without this patch:
$ ./test.sh
(...)
File bar in the original filesystem:
0000000 cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd
*
0065536
Receiving stream in a new filesystem...
At subvol snap
File bar in the new filesystem:
0000000 cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd
*
0033792
We end up with file bar having less data, and a smaller size, than in the
original filesystem.
This happens because when processing file bar, send issues the following
commands:
clone bar - source=foo source offset=0 offset=0 length=32768
write bar - offset=32768 length=1024
encoded_write bar - offset=33792, len=4096, unencoded_offset=33792, unencoded_file_len=31744, unencoded_len=65536, compression=1, encryption=0
The first 32K are cloned from file foo, as that file ranged is shared
between the files.
Then there's a regular write operation for the file range [32K, 33K),
since file foo has different data from bar for that file range.
Finally for the remainder of file bar, the send side issues an encoded
write since the extent is compressed in the source filesystem, for the
file offset 33792 (33K), remaining 31K of data. The receiver will try the
encoded write, but that fails with -EINVAL since the offset 33K is not
sector size aligned, so it will fallback to decompressing the data and
writing it using regular buffered writes. However that results in doing
no writes at decompress_and_write() because 'pos' is initialized to the
value of 33K (unencoded_offset) and unencoded_file_len is 31K, so the
while loop has no iterations.
Another case where we can fallback to decompression plus regular buffered
writes is when the destination filesystem has a sector size larger then
the sector size of the source filesystem (for example when the source
filesystem is on x86_64 with a 4K sector size and the destination
filesystem is PowerPC with a 64K sector size). In that scenario encoded
write attempts will fail with -EINVAL due to offsets not being aligned
with the sector size of the destination filesystem, and the receive will
attempt the fallback of decompressing the buffer and writing the
decompressed using regular buffered IO.
Fix this by tracking the number of written bytes instead, and increment
it, and the unencoded offset, after each write.
Fixes: d20e759fc917 ("btrfs-progs: receive: encoded_write fallback to explicit decode and write")
Reviewed-by: Boris Burkov <boris@bur.io>
Signed-off-by: Filipe Manana <fdmanana@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
2022-11-16 00:25:26 +08:00
|
|
|
written += w;
|
2022-03-18 01:25:49 +08:00
|
|
|
offset += w;
|
btrfs-progs: receive: fix silent data loss after fall back from encoded write
When attempting an encoded write, if it fails for some specific reason
like -EINVAL (when an offset is not sector size aligned) or -ENOSPC, we
then fallback into decompressing the data and writing it using regular
buffered IO. This logic however is not correct, one of the reasons is
that it assumes the encoded offset is smaller than the unencoded file
length and that they can be compared, but one is an offset and the other
is a length, not an end offset, so they can't be compared to get correct
results. This bad logic will often result in not copying all data, or even
no data at all, resulting in a silent data loss. This is easily seen in
with the following reproducer:
$ cat test.sh
#!/bin/bash
DEV=/dev/sdj
MNT=/mnt/sdj
umount $DEV &> /dev/null
mkfs.btrfs -f $DEV > /dev/null
mount -o compress $DEV $MNT
# File foo has a size of 33K, not aligned to the sector size.
xfs_io -f -c "pwrite -S 0xab 0 33K" $MNT/foo
xfs_io -f -c "pwrite -S 0xcd 0 64K" $MNT/bar
# Now clone the first 32K of file bar into foo at offset 0.
xfs_io -c "reflink $MNT/bar 0 0 32K" $MNT/foo
# Snapshot the default subvolume and create a full send stream (v2).
btrfs subvolume snapshot -r $MNT $MNT/snap
btrfs send --compressed-data -f /tmp/test.send $MNT/snap
echo -e "\nFile bar in the original filesystem:"
od -A d -t x1 $MNT/snap/bar
umount $MNT
mkfs.btrfs -f $DEV > /dev/null
mount $DEV $MNT
echo -e "\nReceiving stream in a new filesystem..."
btrfs receive -f /tmp/test.send $MNT
echo -e "\nFile bar in the new filesystem:"
od -A d -t x1 $MNT/snap/bar
umount $MNT
Running the test without this patch:
$ ./test.sh
(...)
File bar in the original filesystem:
0000000 cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd
*
0065536
Receiving stream in a new filesystem...
At subvol snap
File bar in the new filesystem:
0000000 cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd
*
0033792
We end up with file bar having less data, and a smaller size, than in the
original filesystem.
This happens because when processing file bar, send issues the following
commands:
clone bar - source=foo source offset=0 offset=0 length=32768
write bar - offset=32768 length=1024
encoded_write bar - offset=33792, len=4096, unencoded_offset=33792, unencoded_file_len=31744, unencoded_len=65536, compression=1, encryption=0
The first 32K are cloned from file foo, as that file ranged is shared
between the files.
Then there's a regular write operation for the file range [32K, 33K),
since file foo has different data from bar for that file range.
Finally for the remainder of file bar, the send side issues an encoded
write since the extent is compressed in the source filesystem, for the
file offset 33792 (33K), remaining 31K of data. The receiver will try the
encoded write, but that fails with -EINVAL since the offset 33K is not
sector size aligned, so it will fallback to decompressing the data and
writing it using regular buffered writes. However that results in doing
no writes at decompress_and_write() because 'pos' is initialized to the
value of 33K (unencoded_offset) and unencoded_file_len is 31K, so the
while loop has no iterations.
Another case where we can fallback to decompression plus regular buffered
writes is when the destination filesystem has a sector size larger then
the sector size of the source filesystem (for example when the source
filesystem is on x86_64 with a 4K sector size and the destination
filesystem is PowerPC with a 64K sector size). In that scenario encoded
write attempts will fail with -EINVAL due to offsets not being aligned
with the sector size of the destination filesystem, and the receive will
attempt the fallback of decompressing the buffer and writing the
decompressed using regular buffered IO.
Fix this by tracking the number of written bytes instead, and increment
it, and the unencoded offset, after each write.
Fixes: d20e759fc917 ("btrfs-progs: receive: encoded_write fallback to explicit decode and write")
Reviewed-by: Boris Burkov <boris@bur.io>
Signed-off-by: Filipe Manana <fdmanana@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
2022-11-16 00:25:26 +08:00
|
|
|
unencoded_offset += w;
|
2022-03-18 01:25:49 +08:00
|
|
|
}
|
|
|
|
out:
|
|
|
|
free(unencoded_data);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2022-03-18 01:25:48 +08:00
|
|
|
static int process_encoded_write(const char *path, const void *data, u64 offset,
|
|
|
|
u64 len, u64 unencoded_file_len,
|
|
|
|
u64 unencoded_len, u64 unencoded_offset,
|
|
|
|
u32 compression, u32 encryption, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
struct btrfs_receive *rctx = user;
|
|
|
|
char full_path[PATH_MAX];
|
|
|
|
struct iovec iov = { (char *)data, len };
|
|
|
|
struct btrfs_ioctl_encoded_io_args encoded = {
|
|
|
|
.iov = &iov,
|
|
|
|
.iovcnt = 1,
|
|
|
|
.offset = offset,
|
|
|
|
.len = unencoded_file_len,
|
|
|
|
.unencoded_len = unencoded_len,
|
|
|
|
.unencoded_offset = unencoded_offset,
|
|
|
|
.compression = compression,
|
|
|
|
.encryption = encryption,
|
|
|
|
};
|
|
|
|
|
btrfs-progs: receive: add debug messages when processing encoded writes
Unlike for commands from the v1 stream, we have no debug messages logged
when processing encoded write commands, which makes it harder to debug
issues.
So add log messages, when the log verbosity level is >= 3, for encoded
write commands, mentioning the value of all fields and also log when we
fallback from an encoded write to the decompress and write approach.
The log messages look like this:
encoded_write f3 - offset=33792, len=4096, unencoded_offset=33792, unencoded_file_len=31744, unencoded_len=65536, compression=1, encryption=0
encoded_write f3 - falling back to decompress and write due to errno 22 ("Invalid argument")
Reviewed-by: Boris Burkov <boris@bur.io>
Signed-off-by: Filipe Manana <fdmanana@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
2022-11-16 00:25:24 +08:00
|
|
|
if (bconf.verbose >= 3)
|
|
|
|
fprintf(stderr,
|
|
|
|
"encoded_write %s - offset=%llu, len=%llu, unencoded_offset=%llu, unencoded_file_len=%llu, unencoded_len=%llu, compression=%u, encryption=%u\n",
|
|
|
|
path, offset, len, unencoded_offset, unencoded_file_len,
|
|
|
|
unencoded_len, compression, encryption);
|
|
|
|
|
2022-03-18 01:25:48 +08:00
|
|
|
if (encryption) {
|
|
|
|
error("encoded_write: encryption not supported");
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
|
|
|
if (ret < 0) {
|
|
|
|
error("encoded_write: path invalid: %s", path);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = open_inode_for_write(rctx, full_path);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
|
2022-03-18 01:25:49 +08:00
|
|
|
if (!rctx->force_decompress) {
|
|
|
|
ret = ioctl(rctx->write_fd, BTRFS_IOC_ENCODED_WRITE, &encoded);
|
|
|
|
if (ret >= 0)
|
|
|
|
return 0;
|
|
|
|
/* Fall back for these errors, fail hard for anything else. */
|
|
|
|
if (errno != ENOSPC && errno != ENOTTY && errno != EINVAL) {
|
|
|
|
ret = -errno;
|
|
|
|
error("encoded_write: writing to %s failed: %m", path);
|
|
|
|
return ret;
|
|
|
|
}
|
btrfs-progs: receive: add debug messages when processing encoded writes
Unlike for commands from the v1 stream, we have no debug messages logged
when processing encoded write commands, which makes it harder to debug
issues.
So add log messages, when the log verbosity level is >= 3, for encoded
write commands, mentioning the value of all fields and also log when we
fallback from an encoded write to the decompress and write approach.
The log messages look like this:
encoded_write f3 - offset=33792, len=4096, unencoded_offset=33792, unencoded_file_len=31744, unencoded_len=65536, compression=1, encryption=0
encoded_write f3 - falling back to decompress and write due to errno 22 ("Invalid argument")
Reviewed-by: Boris Burkov <boris@bur.io>
Signed-off-by: Filipe Manana <fdmanana@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
2022-11-16 00:25:24 +08:00
|
|
|
if (bconf.verbose >= 3)
|
|
|
|
fprintf(stderr,
|
|
|
|
"encoded_write %s - falling back to decompress and write due to errno %d (\"%m\")\n",
|
|
|
|
path, errno);
|
2022-03-18 01:25:48 +08:00
|
|
|
}
|
2022-03-18 01:25:49 +08:00
|
|
|
|
|
|
|
return decompress_and_write(rctx, data, offset, len, unencoded_file_len,
|
|
|
|
unencoded_len, unencoded_offset,
|
|
|
|
compression);
|
2022-03-18 01:25:48 +08:00
|
|
|
}
|
|
|
|
|
2022-03-18 01:25:50 +08:00
|
|
|
static int process_fallocate(const char *path, int mode, u64 offset, u64 len,
|
|
|
|
void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
struct btrfs_receive *rctx = user;
|
|
|
|
char full_path[PATH_MAX];
|
|
|
|
|
2022-11-16 00:25:25 +08:00
|
|
|
if (bconf.verbose >= 3)
|
|
|
|
fprintf(stderr,
|
|
|
|
"fallocate %s - offset=%llu, len=%llu, mode=%d\n",
|
|
|
|
path, offset, len, mode);
|
|
|
|
|
2022-03-18 01:25:50 +08:00
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
|
|
|
if (ret < 0) {
|
|
|
|
error("fallocate: path invalid: %s", path);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
ret = open_inode_for_write(rctx, full_path);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
ret = fallocate(rctx->write_fd, mode, offset, len);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
|
|
|
error("fallocate: fallocate on %s failed: %m", path);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-06-21 23:35:03 +08:00
|
|
|
static int process_fileattr(const char *path, u64 attr, void *user)
|
2022-03-18 01:25:51 +08:00
|
|
|
{
|
btrfs-progs: receive: work around failure of fileattr commands
Currently fileattr commands, introduced in the send stream v2, always
fail, since we have commented the FS_IOC_SETFLAGS ioctl() call and set
'ret' to -EOPNOTSUPP, which is then overwritten to -errno, which may
have a random value since it was not initialized before. This results
in a failure like this:
ERROR: fileattr: set file attributes on p0/f1 failed: Invalid argument
The error reason may be something else, since errno is undefined at
this point.
Unfortunately we don't have a way yet to apply attributes, since the
attributes value we get from the kernel is what we store in flags field
of the inode item. This means that for example we can not just call
FS_IOC_SETFLAGS with the values we got, since they need to be converted
from BTRFS_INODE_* flags to FS_* flags
Besides that we'll have to reorder how we apply certain attributes like
FS_NOCOW_FL for example, which must happen always on an empty file and
right now we run write commands before attempting to change attributes,
as that's the order the kernel sends the operations.
So for now comment all the code, so that anyone using the v2 stream will
not have a receive failure but will get a behaviour like the v1 stream:
file attributes are ignored. This will have to be fixed later, but right
now people can't use a send stream v2 for the purpose of getting better
performance by avoid decompressing extents at the source and compression
of the data at the destination.
Link: https://lore.kernel.org/linux-btrfs/6cb11fa5-c60d-e65b-0295-301a694e66ad@inbox.ru/
Fixes: 8356c423e619 ("btrfs-progs: receive: implement FILEATTR command")
Signed-off-by: Filipe Manana <fdmanana@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
2022-11-04 00:53:27 +08:00
|
|
|
/*
|
|
|
|
* Not yet supported, ignored for now, just like in send stream v1.
|
|
|
|
* The content of 'attr' matches the flags in the btrfs inode item,
|
|
|
|
* we can't apply them directly with FS_IOC_SETFLAGS, as we need to
|
|
|
|
* convert them from BTRFS_INODE_* flags to FS_* flags. Plus some
|
|
|
|
* flags are special and must be applied in a special way.
|
|
|
|
* The commented code below therefore does not work.
|
|
|
|
*/
|
2022-03-18 01:25:51 +08:00
|
|
|
|
btrfs-progs: receive: work around failure of fileattr commands
Currently fileattr commands, introduced in the send stream v2, always
fail, since we have commented the FS_IOC_SETFLAGS ioctl() call and set
'ret' to -EOPNOTSUPP, which is then overwritten to -errno, which may
have a random value since it was not initialized before. This results
in a failure like this:
ERROR: fileattr: set file attributes on p0/f1 failed: Invalid argument
The error reason may be something else, since errno is undefined at
this point.
Unfortunately we don't have a way yet to apply attributes, since the
attributes value we get from the kernel is what we store in flags field
of the inode item. This means that for example we can not just call
FS_IOC_SETFLAGS with the values we got, since they need to be converted
from BTRFS_INODE_* flags to FS_* flags
Besides that we'll have to reorder how we apply certain attributes like
FS_NOCOW_FL for example, which must happen always on an empty file and
right now we run write commands before attempting to change attributes,
as that's the order the kernel sends the operations.
So for now comment all the code, so that anyone using the v2 stream will
not have a receive failure but will get a behaviour like the v1 stream:
file attributes are ignored. This will have to be fixed later, but right
now people can't use a send stream v2 for the purpose of getting better
performance by avoid decompressing extents at the source and compression
of the data at the destination.
Link: https://lore.kernel.org/linux-btrfs/6cb11fa5-c60d-e65b-0295-301a694e66ad@inbox.ru/
Fixes: 8356c423e619 ("btrfs-progs: receive: implement FILEATTR command")
Signed-off-by: Filipe Manana <fdmanana@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
2022-11-04 00:53:27 +08:00
|
|
|
/* int ret; */
|
|
|
|
/* struct btrfs_receive *rctx = user; */
|
|
|
|
/* char full_path[PATH_MAX]; */
|
|
|
|
|
|
|
|
/* ret = path_cat_out(full_path, rctx->full_subvol_path, path); */
|
|
|
|
/* if (ret < 0) { */
|
|
|
|
/* error("fileattr: path invalid: %s", path); */
|
|
|
|
/* return ret; */
|
|
|
|
/* } */
|
|
|
|
/* ret = open_inode_for_write(rctx, full_path); */
|
|
|
|
/* if (ret < 0) */
|
|
|
|
/* return ret; */
|
|
|
|
/* ret = ioctl(rctx->write_fd, FS_IOC_SETFLAGS, &attr); */
|
|
|
|
/* if (ret < 0) { */
|
|
|
|
/* ret = -errno; */
|
|
|
|
/* error("fileattr: set file attributes on %s failed: %m", path); */
|
|
|
|
/* return ret; */
|
|
|
|
/* } */
|
2022-03-18 01:25:51 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-08-16 04:54:42 +08:00
|
|
|
#if HAVE_LINUX_FSVERITY_H
|
|
|
|
static int process_enable_verity(const char *path, u8 algorithm, u32 block_size,
|
|
|
|
int salt_len, char *salt,
|
|
|
|
int sig_len, char *sig, void *user)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
int ioctl_fd;
|
|
|
|
struct btrfs_receive *rctx = user;
|
|
|
|
char full_path[PATH_MAX];
|
|
|
|
struct fsverity_enable_arg verity_args = {
|
|
|
|
.version = 1,
|
|
|
|
.hash_algorithm = algorithm,
|
|
|
|
.block_size = block_size,
|
|
|
|
};
|
|
|
|
|
|
|
|
if (salt_len) {
|
|
|
|
verity_args.salt_size = salt_len;
|
|
|
|
verity_args.salt_ptr = (__u64)(uintptr_t)salt;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sig_len) {
|
|
|
|
verity_args.sig_size = sig_len;
|
|
|
|
verity_args.sig_ptr = (__u64)(uintptr_t)sig;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = path_cat_out(full_path, rctx->full_subvol_path, path);
|
|
|
|
if (ret < 0) {
|
|
|
|
error("write: path invalid: %s", path);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ioctl_fd = open(full_path, O_RDONLY);
|
|
|
|
if (ioctl_fd < 0) {
|
|
|
|
ret = -errno;
|
|
|
|
error("cannot open %s for verity ioctl: %m", full_path);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Enabling verity denies write access, so it cannot be done with an
|
|
|
|
* open writeable file descriptor.
|
|
|
|
*/
|
|
|
|
close_inode_for_write(rctx);
|
|
|
|
ret = ioctl(ioctl_fd, FS_IOC_ENABLE_VERITY, &verity_args);
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -errno;
|
|
|
|
error("failed to enable verity on %s: %d", full_path, ret);
|
|
|
|
}
|
|
|
|
|
|
|
|
close(ioctl_fd);
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
#else
|
|
|
|
|
|
|
|
static int process_enable_verity(const char *path, u8 algorithm, u32 block_size,
|
|
|
|
int salt_len, char *salt,
|
|
|
|
int sig_len, char *sig, void *user)
|
|
|
|
{
|
|
|
|
error("fs-verity for stream not compiled in");
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2013-08-10 04:20:47 +08:00
|
|
|
static struct btrfs_send_ops send_ops = {
|
2012-07-26 05:08:25 +08:00
|
|
|
.subvol = process_subvol,
|
|
|
|
.snapshot = process_snapshot,
|
|
|
|
.mkfile = process_mkfile,
|
|
|
|
.mkdir = process_mkdir,
|
|
|
|
.mknod = process_mknod,
|
|
|
|
.mkfifo = process_mkfifo,
|
|
|
|
.mksock = process_mksock,
|
|
|
|
.symlink = process_symlink,
|
|
|
|
.rename = process_rename,
|
|
|
|
.link = process_link,
|
|
|
|
.unlink = process_unlink,
|
|
|
|
.rmdir = process_rmdir,
|
|
|
|
.write = process_write,
|
|
|
|
.clone = process_clone,
|
|
|
|
.set_xattr = process_set_xattr,
|
|
|
|
.remove_xattr = process_remove_xattr,
|
|
|
|
.truncate = process_truncate,
|
|
|
|
.chmod = process_chmod,
|
|
|
|
.chown = process_chown,
|
|
|
|
.utimes = process_utimes,
|
2015-06-12 01:31:01 +08:00
|
|
|
.update_extent = process_update_extent,
|
2022-03-18 01:25:48 +08:00
|
|
|
.encoded_write = process_encoded_write,
|
2022-03-18 01:25:50 +08:00
|
|
|
.fallocate = process_fallocate,
|
2022-06-21 23:35:03 +08:00
|
|
|
.fileattr = process_fileattr,
|
2022-08-16 04:54:42 +08:00
|
|
|
.enable_verity = process_enable_verity,
|
2012-07-26 05:08:25 +08:00
|
|
|
};
|
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
static int do_receive(struct btrfs_receive *rctx, const char *tomnt,
|
2015-05-28 01:51:29 +08:00
|
|
|
char *realmnt, int r_fd, u64 max_errors)
|
2012-07-26 05:08:25 +08:00
|
|
|
{
|
2015-06-11 03:05:51 +08:00
|
|
|
u64 subvol_id;
|
2012-07-26 05:08:25 +08:00
|
|
|
int ret;
|
2013-04-10 01:08:45 +08:00
|
|
|
char *dest_dir_full_path;
|
2015-06-16 21:15:51 +08:00
|
|
|
char root_subvol_path[PATH_MAX];
|
2022-10-06 02:02:13 +08:00
|
|
|
bool end = false;
|
2017-04-30 05:54:05 +08:00
|
|
|
int iterations = 0;
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2013-04-10 01:08:45 +08:00
|
|
|
dest_dir_full_path = realpath(tomnt, NULL);
|
|
|
|
if (!dest_dir_full_path) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("realpath(%s) failed: %m", tomnt);
|
2013-04-10 01:08:45 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2016-11-03 06:42:56 +08:00
|
|
|
rctx->dest_dir_fd = open(dest_dir_full_path, O_RDONLY | O_NOATIME);
|
|
|
|
if (rctx->dest_dir_fd < 0) {
|
2013-04-10 01:08:45 +08:00
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("cannot open destination directory %s: %m",
|
|
|
|
dest_dir_full_path);
|
2013-04-10 01:08:45 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2015-06-12 21:58:55 +08:00
|
|
|
if (realmnt[0]) {
|
2016-11-03 06:42:56 +08:00
|
|
|
rctx->root_path = realmnt;
|
2015-05-28 01:51:29 +08:00
|
|
|
} else {
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = find_mount_root(dest_dir_full_path, &rctx->root_path);
|
2015-05-28 01:51:29 +08:00
|
|
|
if (ret < 0) {
|
2018-10-25 20:10:54 +08:00
|
|
|
errno = -ret;
|
|
|
|
error("failed to determine mount point for %s: %m",
|
|
|
|
dest_dir_full_path);
|
2015-05-28 01:51:29 +08:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (ret > 0) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("%s doesn't belong to btrfs mount point",
|
|
|
|
dest_dir_full_path);
|
2015-05-28 01:51:29 +08:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
2014-07-23 13:47:35 +08:00
|
|
|
}
|
2016-11-03 06:42:56 +08:00
|
|
|
rctx->mnt_fd = open(rctx->root_path, O_RDONLY | O_NOATIME);
|
|
|
|
if (rctx->mnt_fd < 0) {
|
2012-07-26 05:08:25 +08:00
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("cannot open %s: %m", rctx->root_path);
|
2012-07-26 05:08:25 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2015-06-11 03:05:51 +08:00
|
|
|
/*
|
|
|
|
* If we use -m or a default subvol we want to resolve the path to the
|
|
|
|
* subvolume we're sitting in so that we can adjust the paths of any
|
|
|
|
* subvols we want to receive in.
|
|
|
|
*/
|
2021-09-08 17:16:43 +08:00
|
|
|
ret = lookup_path_rootid(rctx->mnt_fd, &subvol_id);
|
|
|
|
if (ret) {
|
|
|
|
errno = -ret;
|
|
|
|
error("cannot resolve rootid for path: %m");
|
2015-06-11 03:05:51 +08:00
|
|
|
goto out;
|
2021-09-08 17:16:43 +08:00
|
|
|
}
|
2015-06-11 03:05:51 +08:00
|
|
|
|
2015-06-16 21:15:51 +08:00
|
|
|
root_subvol_path[0] = 0;
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = btrfs_subvolid_resolve(rctx->mnt_fd, root_subvol_path,
|
2015-06-12 19:18:44 +08:00
|
|
|
PATH_MAX, subvol_id);
|
2015-06-11 03:05:51 +08:00
|
|
|
if (ret) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("cannot resolve our subvol path");
|
2015-06-11 03:05:51 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Ok we're inside of a subvol off of the root subvol, we need to
|
|
|
|
* actually set full_root_path.
|
|
|
|
*/
|
2015-11-06 23:53:55 +08:00
|
|
|
if (*root_subvol_path)
|
2016-11-03 06:42:56 +08:00
|
|
|
rctx->full_root_path = root_subvol_path;
|
2015-06-11 03:05:51 +08:00
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
if (rctx->dest_dir_chroot) {
|
2015-04-19 19:46:28 +08:00
|
|
|
if (chroot(dest_dir_full_path)) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("failed to chroot to %s: %m", dest_dir_full_path);
|
2015-04-19 19:46:28 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (chdir("/")) {
|
|
|
|
ret = -errno;
|
2018-10-25 20:10:54 +08:00
|
|
|
error("failed to chdir to / after chroot: %m");
|
2015-04-19 19:46:28 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2015-04-25 00:01:32 +08:00
|
|
|
fprintf(stderr, "Chroot to %s\n", dest_dir_full_path);
|
2016-11-03 06:42:56 +08:00
|
|
|
rctx->root_path = strdup("/");
|
|
|
|
rctx->dest_dir_path = rctx->root_path;
|
2015-04-19 19:46:28 +08:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* find_mount_root returns a root_path that is a subpath of
|
|
|
|
* dest_dir_full_path. Now get the other part of root_path,
|
|
|
|
* which is the destination dir relative to root_path.
|
|
|
|
*/
|
2016-11-03 06:42:56 +08:00
|
|
|
rctx->dest_dir_path = dest_dir_full_path + strlen(rctx->root_path);
|
|
|
|
while (rctx->dest_dir_path[0] == '/')
|
|
|
|
rctx->dest_dir_path++;
|
2015-04-19 19:46:28 +08:00
|
|
|
}
|
2013-04-10 01:08:45 +08:00
|
|
|
|
2012-07-26 05:08:25 +08:00
|
|
|
while (!end) {
|
2016-11-03 06:42:56 +08:00
|
|
|
ret = btrfs_read_and_process_send_stream(r_fd, &send_ops,
|
|
|
|
rctx,
|
|
|
|
rctx->honor_end_cmd,
|
2014-05-24 03:14:56 +08:00
|
|
|
max_errors);
|
2017-04-30 05:54:05 +08:00
|
|
|
if (ret < 0) {
|
|
|
|
if (ret != -ENODATA)
|
|
|
|
goto out;
|
|
|
|
|
2017-04-04 04:21:07 +08:00
|
|
|
/* Empty stream is invalid */
|
2017-04-30 05:54:05 +08:00
|
|
|
if (iterations == 0) {
|
|
|
|
error("empty stream is not considered valid");
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 1;
|
2016-11-29 23:07:19 +08:00
|
|
|
}
|
2017-04-04 04:21:07 +08:00
|
|
|
if (ret > 0)
|
2022-10-06 02:02:13 +08:00
|
|
|
end = true;
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
close_inode_for_write(rctx);
|
|
|
|
ret = finish_subvol(rctx);
|
2012-07-26 05:08:25 +08:00
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
2017-04-30 05:54:05 +08:00
|
|
|
|
|
|
|
iterations++;
|
2012-07-26 05:08:25 +08:00
|
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
out:
|
2016-11-03 06:42:56 +08:00
|
|
|
if (rctx->write_fd != -1) {
|
|
|
|
close(rctx->write_fd);
|
|
|
|
rctx->write_fd = -1;
|
2013-04-10 01:08:35 +08:00
|
|
|
}
|
2015-12-04 02:45:44 +08:00
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
if (rctx->root_path != realmnt)
|
|
|
|
free(rctx->root_path);
|
|
|
|
rctx->root_path = NULL;
|
|
|
|
rctx->dest_dir_path = NULL;
|
2013-04-10 01:08:45 +08:00
|
|
|
free(dest_dir_full_path);
|
2016-11-03 06:42:56 +08:00
|
|
|
if (rctx->mnt_fd != -1) {
|
|
|
|
close(rctx->mnt_fd);
|
|
|
|
rctx->mnt_fd = -1;
|
2013-04-10 01:08:35 +08:00
|
|
|
}
|
2016-11-03 06:42:56 +08:00
|
|
|
if (rctx->dest_dir_fd != -1) {
|
|
|
|
close(rctx->dest_dir_fd);
|
|
|
|
rctx->dest_dir_fd = -1;
|
2013-04-10 01:08:45 +08:00
|
|
|
}
|
2022-06-21 07:53:05 +08:00
|
|
|
#if COMPRESSION_ZSTD
|
2022-03-18 01:25:49 +08:00
|
|
|
if (rctx->zstd_dstream)
|
|
|
|
ZSTD_freeDStream(rctx->zstd_dstream);
|
2022-06-21 07:30:23 +08:00
|
|
|
#endif
|
2022-03-18 01:25:49 +08:00
|
|
|
if (rctx->zlib_stream) {
|
|
|
|
inflateEnd(rctx->zlib_stream);
|
|
|
|
free(rctx->zlib_stream);
|
|
|
|
}
|
2015-06-16 21:15:51 +08:00
|
|
|
|
2012-07-26 05:08:25 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-03-07 10:07:03 +08:00
|
|
|
static const char * const cmd_receive_usage[] = {
|
2018-03-07 10:04:15 +08:00
|
|
|
"btrfs receive [options] <mount>\n"
|
|
|
|
"btrfs receive --dump [options]",
|
|
|
|
"Receive subvolumes from a stream",
|
|
|
|
"Receives one or more subvolumes that were previously",
|
|
|
|
"sent with btrfs send. The received subvolumes are stored",
|
|
|
|
"into MOUNT.",
|
|
|
|
"The receive will fail in case the receiving subvolume",
|
|
|
|
"already exists. It will also fail in case a previously",
|
|
|
|
"received subvolume has been changed after it was received.",
|
|
|
|
"After receiving a subvolume, it is immediately set to",
|
|
|
|
"read-only.",
|
|
|
|
"",
|
2023-02-22 08:37:18 +08:00
|
|
|
OPTLINE("-q|--quiet", "suppress all messages, except errors"),
|
|
|
|
OPTLINE("-f FILE", "read the stream from FILE instead of stdin"),
|
|
|
|
OPTLINE("-e", "terminate after receiving an <end cmd> marker in the stream. "
|
|
|
|
"Without this option the receiver side terminates only in case "
|
|
|
|
"of an error on end of file."),
|
|
|
|
OPTLINE("-C|--chroot", "confine the process to <mount> using chroot"),
|
|
|
|
OPTLINE("-E|--max-errors NERR", "terminate as soon as NERR errors occur while "
|
|
|
|
"stream processing commands from the stream. "
|
|
|
|
"Default value is 1. A value of 0 means no limit."),
|
|
|
|
OPTLINE("-m ROOTMOUNT", "the root mount point of the destination filesystem. "
|
|
|
|
"If /proc is not accessible, use this to tell us where "
|
|
|
|
"this file system is mounted."),
|
|
|
|
OPTLINE("--force-decompress", "if the stream contains compressed data, always "
|
|
|
|
"decompress it instead of writing it with encoded I/O"),
|
|
|
|
OPTLINE("--dump", "dump stream metadata, one line per operation, "
|
|
|
|
"does not require the MOUNT parameter"),
|
|
|
|
OPTLINE("-v", "deprecated, alias for global -v option"),
|
2019-11-25 18:39:05 +08:00
|
|
|
HELPINFO_INSERT_GLOBALS,
|
|
|
|
HELPINFO_INSERT_VERBOSE,
|
|
|
|
HELPINFO_INSERT_QUIET,
|
2022-06-21 07:30:23 +08:00
|
|
|
"",
|
|
|
|
"Compression support: zlib"
|
2022-06-21 07:53:05 +08:00
|
|
|
#if COMPRESSION_LZO
|
2022-06-21 07:30:23 +08:00
|
|
|
", lzo"
|
|
|
|
#endif
|
2022-06-21 07:53:05 +08:00
|
|
|
#if COMPRESSION_ZSTD
|
2022-06-21 07:30:23 +08:00
|
|
|
", zstd"
|
2022-08-16 04:54:42 +08:00
|
|
|
#endif
|
|
|
|
,
|
|
|
|
"Feature support:"
|
|
|
|
#if HAVE_LINUX_FSVERITY_H
|
|
|
|
" fsverity"
|
2022-06-21 07:30:23 +08:00
|
|
|
#endif
|
|
|
|
,
|
2018-03-07 10:04:15 +08:00
|
|
|
NULL
|
|
|
|
};
|
|
|
|
|
2018-03-07 10:24:46 +08:00
|
|
|
static int cmd_receive(const struct cmd_struct *cmd, int argc, char **argv)
|
2012-07-26 05:08:25 +08:00
|
|
|
{
|
|
|
|
char *tomnt = NULL;
|
2015-06-12 22:37:31 +08:00
|
|
|
char fromfile[PATH_MAX];
|
2015-06-12 21:58:55 +08:00
|
|
|
char realmnt[PATH_MAX];
|
2016-11-03 06:42:56 +08:00
|
|
|
struct btrfs_receive rctx;
|
2012-07-26 05:08:25 +08:00
|
|
|
int receive_fd = fileno(stdin);
|
2014-05-24 03:14:56 +08:00
|
|
|
u64 max_errors = 1;
|
2022-10-06 02:02:13 +08:00
|
|
|
bool dump = false;
|
2015-06-09 20:58:43 +08:00
|
|
|
int ret = 0;
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2016-11-03 06:42:56 +08:00
|
|
|
memset(&rctx, 0, sizeof(rctx));
|
|
|
|
rctx.mnt_fd = -1;
|
|
|
|
rctx.write_fd = -1;
|
|
|
|
rctx.dest_dir_fd = -1;
|
2022-06-21 08:29:10 +08:00
|
|
|
rctx.dest_dir_chroot = false;
|
2015-06-12 21:58:55 +08:00
|
|
|
realmnt[0] = 0;
|
2015-06-12 22:37:31 +08:00
|
|
|
fromfile[0] = 0;
|
2012-07-26 05:08:25 +08:00
|
|
|
|
2019-11-25 18:39:05 +08:00
|
|
|
/*
|
|
|
|
* Init global verbose to default, if it is unset.
|
|
|
|
* Default is 1 for historical reasons, changing may break scripts that
|
|
|
|
* expect the 'At subvol' message.
|
|
|
|
* As default is 1, which means the effective verbose for receive is 2
|
|
|
|
* which global verbose is unaware. So adjust global verbose value here.
|
|
|
|
*/
|
|
|
|
if (bconf.verbose == BTRFS_BCONF_UNSET)
|
|
|
|
bconf.verbose = 1;
|
|
|
|
else if (bconf.verbose > BTRFS_BCONF_QUIET)
|
|
|
|
bconf.verbose++;
|
|
|
|
|
2018-06-20 08:38:38 +08:00
|
|
|
optind = 0;
|
2015-01-19 20:30:06 +08:00
|
|
|
while (1) {
|
|
|
|
int c;
|
2022-03-18 01:25:49 +08:00
|
|
|
enum {
|
2022-06-21 08:20:21 +08:00
|
|
|
GETOPT_VAL_DUMP = GETOPT_VAL_FIRST,
|
2022-03-18 01:25:49 +08:00
|
|
|
GETOPT_VAL_FORCE_DECOMPRESS,
|
|
|
|
};
|
2015-01-19 20:30:06 +08:00
|
|
|
static const struct option long_opts[] = {
|
2015-04-08 23:39:51 +08:00
|
|
|
{ "max-errors", required_argument, NULL, 'E' },
|
2015-04-19 19:46:28 +08:00
|
|
|
{ "chroot", no_argument, NULL, 'C' },
|
2016-09-07 08:29:34 +08:00
|
|
|
{ "dump", no_argument, NULL, GETOPT_VAL_DUMP },
|
2019-03-05 21:00:46 +08:00
|
|
|
{ "quiet", no_argument, NULL, 'q' },
|
2022-03-18 01:25:49 +08:00
|
|
|
{ "force-decompress", no_argument, NULL, GETOPT_VAL_FORCE_DECOMPRESS },
|
2015-01-19 20:30:06 +08:00
|
|
|
{ NULL, 0, NULL, 0 }
|
|
|
|
};
|
|
|
|
|
2019-03-05 21:00:46 +08:00
|
|
|
c = getopt_long(argc, argv, "Cevqf:m:E:", long_opts, NULL);
|
2015-01-19 20:30:06 +08:00
|
|
|
if (c < 0)
|
|
|
|
break;
|
|
|
|
|
2012-07-26 05:08:25 +08:00
|
|
|
switch (c) {
|
|
|
|
case 'v':
|
2019-11-25 18:39:05 +08:00
|
|
|
bconf_be_verbose();
|
2012-07-26 05:08:25 +08:00
|
|
|
break;
|
2019-03-05 21:00:46 +08:00
|
|
|
case 'q':
|
2019-11-25 18:39:05 +08:00
|
|
|
bconf_be_quiet();
|
2019-03-05 21:00:46 +08:00
|
|
|
break;
|
2012-07-26 05:08:25 +08:00
|
|
|
case 'f':
|
2015-06-12 22:37:31 +08:00
|
|
|
if (arg_copy_path(fromfile, optarg, sizeof(fromfile))) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("input file path too long (%zu)",
|
|
|
|
strlen(optarg));
|
2015-06-12 22:37:31 +08:00
|
|
|
ret = 1;
|
|
|
|
goto out;
|
|
|
|
}
|
2012-07-26 05:08:25 +08:00
|
|
|
break;
|
2013-04-10 01:08:40 +08:00
|
|
|
case 'e':
|
2022-06-21 08:29:10 +08:00
|
|
|
rctx.honor_end_cmd = true;
|
2013-04-10 01:08:40 +08:00
|
|
|
break;
|
2015-04-19 19:46:28 +08:00
|
|
|
case 'C':
|
2022-06-21 08:29:10 +08:00
|
|
|
rctx.dest_dir_chroot = true;
|
2015-04-19 19:46:28 +08:00
|
|
|
break;
|
2014-05-24 03:14:56 +08:00
|
|
|
case 'E':
|
|
|
|
max_errors = arg_strtou64(optarg);
|
|
|
|
break;
|
2015-05-28 01:51:29 +08:00
|
|
|
case 'm':
|
2015-06-12 21:58:55 +08:00
|
|
|
if (arg_copy_path(realmnt, optarg, sizeof(realmnt))) {
|
2016-01-11 18:01:47 +08:00
|
|
|
error("mount point path too long (%zu)",
|
|
|
|
strlen(optarg));
|
2015-06-12 21:58:55 +08:00
|
|
|
ret = 1;
|
2015-06-09 20:58:43 +08:00
|
|
|
goto out;
|
2015-05-28 01:51:29 +08:00
|
|
|
}
|
|
|
|
break;
|
2016-09-07 08:29:34 +08:00
|
|
|
case GETOPT_VAL_DUMP:
|
2022-10-06 02:02:13 +08:00
|
|
|
dump = true;
|
2016-09-07 08:29:34 +08:00
|
|
|
break;
|
2022-03-18 01:25:49 +08:00
|
|
|
case GETOPT_VAL_FORCE_DECOMPRESS:
|
|
|
|
rctx.force_decompress = true;
|
|
|
|
break;
|
2012-07-26 05:08:25 +08:00
|
|
|
default:
|
2018-03-07 10:54:38 +08:00
|
|
|
usage_unknown_option(cmd, argv);
|
2012-07-26 05:08:25 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-09-07 08:29:34 +08:00
|
|
|
if (dump && check_argc_exact(argc - optind, 0))
|
2023-02-13 13:26:32 +08:00
|
|
|
usage(cmd, 1);
|
2016-09-07 08:29:34 +08:00
|
|
|
if (!dump && check_argc_exact(argc - optind, 1))
|
2023-02-13 13:26:32 +08:00
|
|
|
usage(cmd, 1);
|
2012-07-26 05:08:25 +08:00
|
|
|
|
|
|
|
tomnt = argv[optind];
|
|
|
|
|
2015-06-12 22:37:31 +08:00
|
|
|
if (fromfile[0]) {
|
2012-07-26 05:08:25 +08:00
|
|
|
receive_fd = open(fromfile, O_RDONLY | O_NOATIME);
|
|
|
|
if (receive_fd < 0) {
|
2018-01-08 05:54:21 +08:00
|
|
|
error("cannot open %s: %m", fromfile);
|
2015-06-09 20:58:43 +08:00
|
|
|
goto out;
|
2012-07-26 05:08:25 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-09-07 08:29:34 +08:00
|
|
|
if (dump) {
|
|
|
|
struct btrfs_dump_send_args dump_args;
|
|
|
|
|
|
|
|
dump_args.root_path[0] = '.';
|
|
|
|
dump_args.root_path[1] = '\0';
|
|
|
|
dump_args.full_subvol_path[0] = '.';
|
|
|
|
dump_args.full_subvol_path[1] = '\0';
|
|
|
|
ret = btrfs_read_and_process_send_stream(receive_fd,
|
2018-10-15 21:02:11 +08:00
|
|
|
&btrfs_print_send_ops, &dump_args, 0, max_errors);
|
2018-10-25 20:10:54 +08:00
|
|
|
if (ret < 0) {
|
|
|
|
errno = -ret;
|
|
|
|
error("failed to dump the send stream: %m");
|
|
|
|
}
|
2016-09-07 08:29:34 +08:00
|
|
|
} else {
|
|
|
|
ret = do_receive(&rctx, tomnt, realmnt, receive_fd, max_errors);
|
|
|
|
}
|
|
|
|
|
2016-01-14 16:40:24 +08:00
|
|
|
if (receive_fd != fileno(stdin))
|
|
|
|
close(receive_fd);
|
2015-06-09 20:58:43 +08:00
|
|
|
out:
|
|
|
|
|
2013-09-04 23:22:27 +08:00
|
|
|
return !!ret;
|
2012-07-26 05:08:25 +08:00
|
|
|
}
|
2018-03-07 10:07:03 +08:00
|
|
|
DEFINE_SIMPLE_COMMAND(receive, "receive");
|