1 //! *pxar* format encoder.
3 //! This module contain the code to generate *pxar* archive files.
6 use endian_trait
::Endian
;
7 use std
::collections
::HashMap
;
9 use super::format_definition
::*;
10 use super::binary_search_tree
::*;
11 use crate::tools
::xattr
;
14 use std
::os
::unix
::io
::AsRawFd
;
15 use std
::os
::unix
::ffi
::OsStrExt
;
16 use std
::os
::unix
::io
::RawFd
;
17 use std
::path
::{Path, PathBuf}
;
22 use nix
::fcntl
::OFlag
;
23 use nix
::sys
::stat
::Mode
;
24 use nix
::errno
::Errno
;
25 use nix
::sys
::stat
::FileStat
;
27 use crate::tools
::vec
;
29 /// The format requires to build sorted directory lookup tables in
30 /// memory, so we restrict the number of allowed entries to limit
31 /// maximum memory usage.
32 pub const MAX_DIRECTORY_ENTRIES
: usize = 256*1024;
34 #[derive(Eq, PartialEq, Hash)]
40 pub struct Encoder
<'a
, W
: Write
> {
42 relative_path
: PathBuf
,
46 file_copy_buffer
: Vec
<u8>,
47 all_file_systems
: bool
,
51 hardlinks
: HashMap
<HardLinkInfo
, (PathBuf
, u64)>,
54 impl <'a
, W
: Write
> Encoder
<'a
, W
> {
56 // used for error reporting
57 fn full_path(&self) -> PathBuf
{
58 self.base_path
.join(&self.relative_path
)
63 dir
: &mut nix
::dir
::Dir
,
65 all_file_systems
: bool
,
69 ) -> Result
<(), Error
> {
71 const FILE_COPY_BUFFER_SIZE
: usize = 1024*1024;
73 let mut file_copy_buffer
= Vec
::with_capacity(FILE_COPY_BUFFER_SIZE
);
74 unsafe { file_copy_buffer.set_len(FILE_COPY_BUFFER_SIZE); }
77 // todo: use scandirat??
79 let dir_fd
= dir
.as_raw_fd();
80 let stat
= match nix
::sys
::stat
::fstat(dir_fd
) {
82 Err(err
) => bail
!("fstat {:?} failed - {}", path
, err
),
85 if (stat
.st_mode
& libc
::S_IFMT
) != libc
::S_IFDIR
{
86 bail
!("got unexpected file type {:?} (not a directory)", path
);
89 let magic
= detect_fs_type(dir_fd
)?
;
91 if is_virtual_file_system(magic
) {
92 bail
!("backup virtual file systems is disabled!");
94 let mut feature_flags
= CA_FORMAT_DEFAULT
;
96 feature_flags ^
= CA_FORMAT_WITH_XATTRS
;
99 feature_flags ^
= CA_FORMAT_WITH_FCAPS
;
104 relative_path
: PathBuf
::new(),
110 root_st_dev
: stat
.st_dev
,
113 hardlinks
: HashMap
::new(),
116 if verbose { println!("{:?}
", me.full_path()); }
118 me.encode_dir(dir, &stat, magic)?;
123 fn write(&mut self, buf: &[u8]) -> Result<(), Error> {
124 self.writer.write_all(buf)?;
125 self.writer_pos += buf.len();
129 fn write_item<T: Endian>(&mut self, item: T) -> Result<(), Error> {
131 let data = item.to_le();
133 let buffer = unsafe { std::slice::from_raw_parts(
134 &data as *const T as *const u8,
135 std::mem::size_of::<T>()
143 fn flush_copy_buffer(&mut self, size: usize) -> Result<(), Error> {
144 self.writer.write_all(&self.file_copy_buffer[..size])?;
145 self.writer_pos += size;
149 fn write_header(&mut self, htype: u64, size: u64) -> Result<(), Error> {
151 let size = size + (std::mem::size_of::<CaFormatHeader>() as u64);
152 self.write_item(CaFormatHeader { size, htype })?;
157 fn write_filename(&mut self, name: &CStr) -> Result<(), Error> {
159 let buffer = name.to_bytes_with_nul();
160 self.write_header(CA_FORMAT_FILENAME, buffer.len() as u64)?;
166 fn create_entry(&self, stat: &FileStat) -> Result<CaFormatEntry, Error> {
168 let mode = if (stat.st_mode & libc::S_IFMT) == libc::S_IFLNK {
169 (libc::S_IFLNK | 0o777) as u64
171 (stat.st_mode & (libc::S_IFMT | 0o7777)) as u64
174 let mtime = stat.st_mtime * 1_000_000_000 + stat.st_mtime_nsec;
176 bail!("got strange
mtime ({}
) from fstat
for {:?}
.", mtime, self.full_path());
180 let entry = CaFormatEntry {
183 uid: stat.st_uid as u64,
184 gid: stat.st_gid as u64,
191 fn read_chattr(&self, fd: RawFd, entry: &mut CaFormatEntry) -> Result<(), Error> {
193 let mut attr: usize = 0;
195 let res = unsafe { read_attr_fd(fd, &mut attr)};
196 if let Err(err) = res {
197 if let nix::Error::Sys(errno) = err {
198 if errno_is_unsupported(errno) { return Ok(()) };
200 bail!("read_attr_fd failed
for {:?}
- {}
", self.full_path(), err);
203 let flags = ca_feature_flags_from_chattr(attr as u32);
204 entry.flags = entry.flags | flags;
209 fn read_fat_attr(&self, fd: RawFd, magic: i64, entry: &mut CaFormatEntry) -> Result<(), Error> {
211 if magic != MSDOS_SUPER_MAGIC && magic != FUSE_SUPER_MAGIC { return Ok(()); }
213 let mut attr: u32 = 0;
215 let res = unsafe { read_fat_attr_fd(fd, &mut attr)};
216 if let Err(err) = res {
217 if let nix::Error::Sys(errno) = err {
218 if errno_is_unsupported(errno) { return Ok(()) };
220 bail!("read_fat_attr_fd failed
for {:?}
- {}
", self.full_path(), err);
223 let flags = ca_feature_flags_from_fat_attr(attr);
224 entry.flags = entry.flags | flags;
229 fn has_features(&self, feature_flags: u64) -> bool {
230 (self.feature_flags & feature_flags) == feature_flags
233 fn read_xattrs(&self, fd: RawFd, stat: &FileStat) -> Result<(Vec<CaFormatXAttr>, Option<CaFormatFCaps>), Error> {
234 let mut xattrs = Vec::new();
235 let mut fcaps = None;
237 let flags = CA_FORMAT_WITH_XATTRS | CA_FORMAT_WITH_FCAPS;
238 if !self.has_features(flags) {
239 return Ok((xattrs, fcaps));
241 // Should never be called on symlinks, just in case check anyway
242 if (stat.st_mode & libc::S_IFMT) == libc::S_IFLNK {
243 return Ok((xattrs, fcaps));
246 let xattr_names = match xattr::flistxattr(fd) {
248 Err(err) => bail!("read_xattrs failed
for {:?}
- {}
", self.full_path(), err),
251 for name in xattr_names.split(|c| *c == b'\0') {
252 // Only extract the relevant extended attributes
253 if !xattr::is_valid_xattr_name(&name) {
257 let value = match xattr::fgetxattr(fd, name) {
259 // Vanished between flistattr and getxattr, this is ok, silently ignore
260 Err(Errno::ENODATA) => continue,
261 Err(err) => bail!("read_xattrs failed
for {:?}
- {}
", self.full_path(), err),
264 if xattr::is_security_capability(&name) {
265 // fcaps are stored in own format within the archive
266 fcaps = Some(CaFormatFCaps {
270 xattrs.push(CaFormatXAttr {
281 fn write_entry(&mut self, entry: CaFormatEntry) -> Result<(), Error> {
283 self.write_header(CA_FORMAT_ENTRY, std::mem::size_of::<CaFormatEntry>() as u64)?;
284 self.write_item(entry)?;
289 fn write_xattr(&mut self, xattr: CaFormatXAttr) -> Result<(), Error> {
290 let size = xattr.name.len() + xattr.value.len() + 1; // +1 for '\0' separating name and value
291 self.write_header(CA_FORMAT_XATTR, size as u64)?;
292 self.write(xattr.name.as_slice())?;
294 self.write(xattr.value.as_slice())?;
299 fn write_fcaps(&mut self, fcaps: Option<CaFormatFCaps>) -> Result<(), Error> {
300 if let Some(fcaps) = fcaps {
301 let size = fcaps.data.len();
302 self.write_header(CA_FORMAT_FCAPS, size as u64)?;
303 self.write(fcaps.data.as_slice())?;
309 fn write_goodbye_table(&mut self, goodbye_offset: usize, goodbye_items: &mut [CaFormatGoodbyeItem]) -> Result<(), Error> {
311 goodbye_items.sort_unstable_by(|a, b| a.hash.cmp(&b.hash));
313 let item_count = goodbye_items.len();
315 let goodbye_table_size = (item_count + 1)*std::mem::size_of::<CaFormatGoodbyeItem>();
317 self.write_header(CA_FORMAT_GOODBYE, goodbye_table_size as u64)?;
319 if self.file_copy_buffer.len() < goodbye_table_size {
320 let need = goodbye_table_size - self.file_copy_buffer.len();
321 self.file_copy_buffer.reserve(need);
322 unsafe { self.file_copy_buffer.set_len(self.file_copy_buffer.capacity()); }
325 let buffer = &mut self.file_copy_buffer;
327 copy_binary_search_tree(item_count, |s, d| {
328 let item = &goodbye_items[s];
329 let offset = d*std::mem::size_of::<CaFormatGoodbyeItem>();
330 let dest = crate::tools::map_struct_mut::<CaFormatGoodbyeItem>(&mut buffer[offset..]).unwrap();
331 dest.offset = u64::to_le(item.offset);
332 dest.size = u64::to_le(item.size);
333 dest.hash = u64::to_le(item.hash);
336 // append CaFormatGoodbyeTail as last item
337 let offset = item_count*std::mem::size_of::<CaFormatGoodbyeItem>();
338 let dest = crate::tools::map_struct_mut::<CaFormatGoodbyeItem>(&mut buffer[offset..]).unwrap();
339 dest.offset = u64::to_le(goodbye_offset as u64);
340 dest.size = u64::to_le((goodbye_table_size + std::mem::size_of::<CaFormatHeader>()) as u64);
341 dest.hash = u64::to_le(CA_FORMAT_GOODBYE_TAIL_MARKER);
343 self.flush_copy_buffer(goodbye_table_size)?;
348 fn encode_dir(&mut self, dir: &mut nix::dir::Dir, dir_stat: &FileStat, magic: i64) -> Result<(), Error> {
350 //println!("encode_dir
: {:?} start {}
", self.full_path(), self.writer_pos);
352 let mut name_list = vec![];
354 let rawfd = dir.as_raw_fd();
356 let dir_start_pos = self.writer_pos;
358 let mut dir_entry = self.create_entry(&dir_stat)?;
360 self.read_chattr(rawfd, &mut dir_entry)?;
361 self.read_fat_attr(rawfd, magic, &mut dir_entry)?;
362 let (xattrs, fcaps) = self.read_xattrs(rawfd, &dir_stat)?;
364 self.write_entry(dir_entry)?;
365 for xattr in xattrs {
366 self.write_xattr(xattr)?;
368 self.write_fcaps(fcaps)?;
370 let mut dir_count = 0;
372 let include_children;
373 if is_virtual_file_system(magic) {
374 include_children = false;
376 include_children = (self.root_st_dev == dir_stat.st_dev) || self.all_file_systems;
379 if include_children {
380 for entry in dir.iter() {
382 if dir_count > MAX_DIRECTORY_ENTRIES {
383 bail!("too many directory items
in {:?}
(> {}
)",
384 self.full_path(), MAX_DIRECTORY_ENTRIES);
387 let entry = match entry {
389 Err(err) => bail!("readir {:?} failed
- {}
", self.full_path(), err),
391 let filename = entry.file_name().to_owned();
393 let name = filename.to_bytes_with_nul();
394 let name_len = name.len();
395 if name_len == 2 && name[0] == b'.' && name[1] == 0u8 { continue; }
396 if name_len == 3 && name[0] == b'.' && name[1] == b'.' && name[2] == 0u8 { continue; }
398 name_list.push(filename);
401 eprintln!("skip mount point
: {:?}
", self.full_path());
404 name_list.sort_unstable_by(|a, b| a.cmp(&b));
406 let mut goodbye_items = vec![];
408 for filename in &name_list {
409 self.relative_path.push(std::ffi::OsStr::from_bytes(filename.as_bytes()));
411 if self.verbose { println!("{:?}", self.full_path()); }
413 let stat
= match nix
::sys
::stat
::fstatat(rawfd
, filename
.as_ref(), nix
::fcntl
::AtFlags
::AT_SYMLINK_NOFOLLOW
) {
415 Err(nix
::Error
::Sys(Errno
::ENOENT
)) => {
416 self.report_vanished_file(&self.full_path())?
;
419 Err(err
) => bail
!("fstat {:?} failed - {}", self.full_path(), err
),
422 let start_pos
= self.writer_pos
;
424 let ifmt
= stat
.st_mode
& libc
::S_IFMT
;
426 if ifmt
== libc
::S_IFDIR
{
428 let mut dir
= match nix
::dir
::Dir
::openat(rawfd
, filename
.as_ref(), OFlag
::O_DIRECTORY
|OFlag
::O_NOFOLLOW
, Mode
::empty()) {
430 Err(nix
::Error
::Sys(Errno
::ENOENT
)) => {
431 self.report_vanished_file(&self.full_path())?
;
434 Err(err
) => bail
!("open dir {:?} failed - {}", self.full_path(), err
),
437 let child_magic
= if dir_stat
.st_dev
!= stat
.st_dev
{
438 detect_fs_type(dir
.as_raw_fd())?
443 self.write_filename(&filename
)?
;
444 self.encode_dir(&mut dir
, &stat
, child_magic
)?
;
446 } else if ifmt
== libc
::S_IFREG
{
448 let mut hardlink_target
= None
;
450 if stat
.st_nlink
> 1 {
451 let link_info
= HardLinkInfo { st_dev: stat.st_dev, st_ino: stat.st_ino }
;
452 hardlink_target
= self.hardlinks
.get(&link_info
).map(|(v
, offset
)| {
453 let mut target
= v
.clone().into_os_string();
454 target
.push("\0"); // add Nul byte
455 (target
, (start_pos
as u64) - offset
)
457 if hardlink_target
== None
{
458 self.hardlinks
.insert(link_info
, (self.relative_path
.clone(), start_pos
as u64));
462 if let Some((target
, offset
)) = hardlink_target
{
464 self.write_filename(&filename
)?
;
465 self.encode_hardlink(target
.as_bytes(), offset
)?
;
469 let filefd
= match nix
::fcntl
::openat(rawfd
, filename
.as_ref(), OFlag
::O_NOFOLLOW
, Mode
::empty()) {
470 Ok(filefd
) => filefd
,
471 Err(nix
::Error
::Sys(Errno
::ENOENT
)) => {
472 self.report_vanished_file(&self.full_path())?
;
475 Err(err
) => bail
!("open file {:?} failed - {}", self.full_path(), err
),
478 let child_magic
= if dir_stat
.st_dev
!= stat
.st_dev
{
479 detect_fs_type(filefd
)?
484 self.write_filename(&filename
)?
;
485 let res
= self.encode_file(filefd
, &stat
, child_magic
);
486 let _
= nix
::unistd
::close(filefd
); // ignore close errors
490 } else if ifmt
== libc
::S_IFLNK
{
491 let mut buffer
= vec
::undefined(libc
::PATH_MAX
as usize);
493 let res
= filename
.with_nix_path(|cstr
| {
494 unsafe { libc::readlinkat(rawfd, cstr.as_ptr(), buffer.as_mut_ptr() as *mut libc::c_char, buffer.len()-1) }
497 match Errno
::result(res
) {
499 buffer
[len
as usize] = 0u8; // add Nul byte
500 self.write_filename(&filename
)?
;
501 self.encode_symlink(&buffer
[..((len
+1) as usize)], &stat
)?
503 Err(nix
::Error
::Sys(Errno
::ENOENT
)) => {
504 self.report_vanished_file(&self.full_path())?
;
507 Err(err
) => bail
!("readlink {:?} failed - {}", self.full_path(), err
),
509 } else if (ifmt
== libc
::S_IFBLK
) || (ifmt
== libc
::S_IFCHR
) {
510 self.write_filename(&filename
)?
;
511 self.encode_device(&stat
)?
;
512 } else if (ifmt
== libc
::S_IFIFO
) || (ifmt
== libc
::S_IFSOCK
) {
513 self.write_filename(&filename
)?
;
514 self.encode_special(&stat
)?
;
516 bail
!("unsupported file type (mode {:o} {:?})", stat
.st_mode
, self.full_path());
519 let end_pos
= self.writer_pos
;
521 goodbye_items
.push(CaFormatGoodbyeItem
{
522 offset
: start_pos
as u64,
523 size
: (end_pos
- start_pos
) as u64,
524 hash
: compute_goodbye_hash(filename
.to_bytes()),
527 self.relative_path
.pop();
530 //println!("encode_dir: {:?} end {}", self.full_path(), self.writer_pos);
532 // fixup goodby item offsets
533 let goodbye_start
= self.writer_pos
as u64;
534 for item
in &mut goodbye_items
{
535 item
.offset
= goodbye_start
- item
.offset
;
538 let goodbye_offset
= self.writer_pos
- dir_start_pos
;
540 self.write_goodbye_table(goodbye_offset
, &mut goodbye_items
)?
;
542 //println!("encode_dir: {:?} end1 {}", self.full_path(), self.writer_pos);
546 fn encode_file(&mut self, filefd
: RawFd
, stat
: &FileStat
, magic
: i64) -> Result
<(), Error
> {
548 //println!("encode_file: {:?}", self.full_path());
550 let mut entry
= self.create_entry(&stat
)?
;
552 self.read_chattr(filefd
, &mut entry
)?
;
553 self.read_fat_attr(filefd
, magic
, &mut entry
)?
;
554 let (xattrs
, fcaps
) = self.read_xattrs(filefd
, &stat
)?
;
556 self.write_entry(entry
)?
;
557 for xattr
in xattrs
{
558 self.write_xattr(xattr
)?
;
560 self.write_fcaps(fcaps
)?
;
563 if is_virtual_file_system(magic
) {
564 include_payload
= false;
566 include_payload
= (stat
.st_dev
== self.root_st_dev
) || self.all_file_systems
;
569 if !include_payload
{
570 eprintln
!("skip content: {:?}", self.full_path());
571 self.write_header(CA_FORMAT_PAYLOAD
, 0)?
;
575 let size
= stat
.st_size
as u64;
577 self.write_header(CA_FORMAT_PAYLOAD
, size
)?
;
579 let mut pos
: u64 = 0;
581 let n
= match nix
::unistd
::read(filefd
, &mut self.file_copy_buffer
) {
583 Err(nix
::Error
::Sys(Errno
::EINTR
)) => continue /* try again */,
584 Err(err
) => bail
!("read {:?} failed - {}", self.full_path(), err
),
588 // Note:: casync format cannot handle that
589 bail
!("detected shrinked file {:?} ({} < {})", self.full_path(), pos
, size
);
594 let mut next
= pos
+ (n
as u64);
596 if next
> size { next = size; }
598 let count
= (next
- pos
) as usize;
600 self.flush_copy_buffer(count
)?
;
604 if pos
>= size { break; }
610 fn encode_device(&mut self, stat
: &FileStat
) -> Result
<(), Error
> {
612 let entry
= self.create_entry(&stat
)?
;
614 self.write_entry(entry
)?
;
616 let major
= unsafe { libc::major(stat.st_rdev) }
as u64;
617 let minor
= unsafe { libc::minor(stat.st_rdev) }
as u64;
619 //println!("encode_device: {:?} {} {} {}", self.full_path(), stat.st_rdev, major, minor);
621 self.write_header(CA_FORMAT_DEVICE
, std
::mem
::size_of
::<CaFormatDevice
>() as u64)?
;
622 self.write_item(CaFormatDevice { major, minor }
)?
;
628 fn encode_special(&mut self, stat
: &FileStat
) -> Result
<(), Error
> {
630 let entry
= self.create_entry(&stat
)?
;
632 self.write_entry(entry
)?
;
637 fn encode_symlink(&mut self, target
: &[u8], stat
: &FileStat
) -> Result
<(), Error
> {
639 //println!("encode_symlink: {:?} -> {:?}", self.full_path(), target);
641 let entry
= self.create_entry(&stat
)?
;
642 self.write_entry(entry
)?
;
644 self.write_header(CA_FORMAT_SYMLINK
, target
.len() as u64)?
;
650 fn encode_hardlink(&mut self, target
: &[u8], offset
: u64) -> Result
<(), Error
> {
652 //println!("encode_hardlink: {:?} -> {:?}", self.full_path(), target);
654 // Note: HARDLINK replaces an ENTRY.
655 self.write_header(PXAR_FORMAT_HARDLINK
, (target
.len() as u64) + 8)?
;
656 self.write_item(offset
)?
;
662 // the report_XXX method may raise and error - depending on encoder configuration
664 fn report_vanished_file(&self, path
: &Path
) -> Result
<(), Error
> {
666 eprintln
!("WARNING: detected vanished file {:?}", path
);
672 fn errno_is_unsupported(errno
: Errno
) -> bool
{
675 Errno
::ENOTTY
| Errno
::ENOSYS
| Errno
::EBADF
| Errno
::EOPNOTSUPP
| Errno
::EINVAL
=> {
682 fn detect_fs_type(fd
: RawFd
) -> Result
<i64, Error
> {
683 let mut fs_stat
: libc
::statfs
= unsafe { std::mem::uninitialized() }
;
684 let res
= unsafe { libc::fstatfs(fd, &mut fs_stat) }
;
690 use nix
::{convert_ioctl_res, request_code_read, ioc}
;
692 // /usr/include/linux/fs.h: #define FS_IOC_GETFLAGS _IOR('f', 1, long)
693 /// read Linux file system attributes (see man chattr)
694 nix
::ioctl_read
!(read_attr_fd
, b'f'
, 1, usize);
696 // /usr/include/linux/msdos_fs.h: #define FAT_IOCTL_GET_ATTRIBUTES _IOR('r', 0x10, __u32)
697 // read FAT file system attributes
698 nix
::ioctl_read
!(read_fat_attr_fd
, b'r'
, 0x10, u32);
701 // from /usr/include/linux/magic.h
702 // and from casync util.h
703 pub const BINFMTFS_MAGIC
: i64 = 0x42494e4d;
704 pub const CGROUP2_SUPER_MAGIC
: i64 = 0x63677270;
705 pub const CGROUP_SUPER_MAGIC
: i64 = 0x0027e0eb;
706 pub const CONFIGFS_MAGIC
: i64 = 0x62656570;
707 pub const DEBUGFS_MAGIC
: i64 = 0x64626720;
708 pub const DEVPTS_SUPER_MAGIC
: i64 = 0x00001cd1;
709 pub const EFIVARFS_MAGIC
: i64 = 0xde5e81e4;
710 pub const FUSE_CTL_SUPER_MAGIC
: i64 = 0x65735543;
711 pub const HUGETLBFS_MAGIC
: i64 = 0x958458f6;
712 pub const MQUEUE_MAGIC
: i64 = 0x19800202;
713 pub const NFSD_MAGIC
: i64 = 0x6e667364;
714 pub const PROC_SUPER_MAGIC
: i64 = 0x00009fa0;
715 pub const PSTOREFS_MAGIC
: i64 = 0x6165676C;
716 pub const RPCAUTH_GSSMAGIC
: i64 = 0x67596969;
717 pub const SECURITYFS_MAGIC
: i64 = 0x73636673;
718 pub const SELINUX_MAGIC
: i64 = 0xf97cff8c;
719 pub const SMACK_MAGIC
: i64 = 0x43415d53;
720 pub const RAMFS_MAGIC
: i64 = 0x858458f6;
721 pub const TMPFS_MAGIC
: i64 = 0x01021994;
722 pub const SYSFS_MAGIC
: i64 = 0x62656572;
723 pub const MSDOS_SUPER_MAGIC
: i64 = 0x00004d44;
724 pub const FUSE_SUPER_MAGIC
: i64 = 0x65735546;
728 pub fn is_temporary_file_system(magic
: i64) -> bool
{
729 magic
== RAMFS_MAGIC
|| magic
== TMPFS_MAGIC
732 pub fn is_virtual_file_system(magic
: i64) -> bool
{
736 CGROUP2_SUPER_MAGIC
|
742 FUSE_CTL_SUPER_MAGIC
|