709 lines
23 KiB
C
709 lines
23 KiB
C
/****************************************************************
|
|
* *
|
|
* Copyright 2001, 2011 Fidelity Information Services, Inc *
|
|
* *
|
|
* This source code contains the intellectual property *
|
|
* of its copyright holder(s), and is made available *
|
|
* under a license. If you do not know the terms of *
|
|
* the license, please stop and do not read further. *
|
|
* *
|
|
****************************************************************/
|
|
|
|
#include "mdef.h"
|
|
|
|
#include "gtm_fcntl.h"
|
|
#include "gtm_unistd.h"
|
|
#include "gtm_socket.h"
|
|
#include "gtm_inet.h"
|
|
#include "gtm_stdio.h"
|
|
#include "gtm_string.h"
|
|
|
|
#include <sys/wait.h>
|
|
#include <stddef.h>
|
|
#include <errno.h>
|
|
#ifdef __MVS__
|
|
#include <sys/time.h>
|
|
#include "gtm_zos_io.h"
|
|
#endif
|
|
|
|
#include "gdsroot.h"
|
|
#include "gtm_facility.h"
|
|
#include "fileinfo.h"
|
|
#include "gdsbt.h"
|
|
#include "gdsfhead.h"
|
|
#include "mupipbckup.h"
|
|
#include "murest.h"
|
|
#include "filestruct.h"
|
|
#include "gdsblk.h"
|
|
#include "gdsbml.h"
|
|
#include "cli.h"
|
|
#include "iosp.h"
|
|
#include "copy.h"
|
|
#include "iob.h"
|
|
#include "error.h"
|
|
#include "gtmio.h"
|
|
#include "iotimer.h"
|
|
#include "iotcpdef.h"
|
|
#include "iotcproutine.h"
|
|
#include "gtm_pipe.h"
|
|
#include "gt_timer.h"
|
|
#include "stp_parms.h"
|
|
#include "gtm_stat.h"
|
|
#include "eintr_wrappers.h"
|
|
#include "util.h"
|
|
#include "gtm_caseconv.h"
|
|
#include "io.h"
|
|
#include "is_proc_alive.h"
|
|
#include "mu_rndwn_file.h"
|
|
#include "mupip_exit.h"
|
|
#include "mu_outofband_setup.h"
|
|
#include "mu_gv_cur_reg_init.h"
|
|
#include "mupip_restore.h"
|
|
#include "gtmmsg.h"
|
|
#include "wcs_sleep.h"
|
|
#include "ftok_sems.h"
|
|
#include "gds_blk_downgrade.h"
|
|
#include "shmpool.h"
|
|
#include "min_max.h"
|
|
#include "gtmxc_types.h"
|
|
#include "gtmcrypt.h"
|
|
|
|
GBLDEF inc_list_struct in_files;
|
|
GBLREF uint4 pipe_child;
|
|
GBLREF tcp_library_struct tcp_routines;
|
|
GBLREF gd_region *gv_cur_region;
|
|
GBLREF uint4 restore_read_errno;
|
|
|
|
LITREF char *gtm_dbversion_table[];
|
|
|
|
error_def(ERR_BADTAG);
|
|
error_def(ERR_IOEOF);
|
|
error_def(ERR_MUPCLIERR);
|
|
error_def(ERR_MUPRESTERR);
|
|
error_def(ERR_TEXT);
|
|
|
|
#define COMMON_READ(S, BUFF, LEN, INBUF) \
|
|
{ \
|
|
assert(BACKUP_TEMPFILE_BUFF_SIZE >= LEN); \
|
|
(*common_read)(S, BUFF, LEN); \
|
|
if (0 != restore_read_errno) \
|
|
CLNUP_AND_EXIT(ERR_MUPRESTERR, INBUF); \
|
|
}
|
|
|
|
#define CLNUP_AND_EXIT(EXIT_STATUS, INBUF) \
|
|
{ \
|
|
DEBUG_ONLY(GBLREF gd_region *standalone_reg;) \
|
|
\
|
|
if (INBUF) \
|
|
free(INBUF); \
|
|
assert(standalone_reg == gv_cur_region); \
|
|
db_ipcs_reset(gv_cur_region); \
|
|
mu_gv_cur_reg_free(); \
|
|
mupip_exit(EXIT_STATUS); \
|
|
}
|
|
|
|
CONDITION_HANDLER(iob_io_error)
|
|
{
|
|
int dummy1, dummy2;
|
|
char s[80];
|
|
char *fgets_res;
|
|
|
|
START_CH;
|
|
if (SIGNAL == ERR_IOEOF)
|
|
{
|
|
PRINTF("End of media reached, please mount next volume and press Enter: ");
|
|
FGETS(s, 79, stdin, fgets_res);
|
|
util_out_print(0, 2, 0); /* clear error message */
|
|
CONTINUE;
|
|
}
|
|
PRN_ERROR;
|
|
UNWIND(dummy1, dummy2);
|
|
}
|
|
|
|
|
|
void mupip_restore(void)
|
|
{
|
|
static readonly char label[] = GDS_LABEL;
|
|
char db_name[MAX_FN_LEN + 1], *inbuf = NULL, *p, *blk_ptr;
|
|
inc_list_struct *ptr;
|
|
inc_header inhead;
|
|
sgmnt_data old_data;
|
|
short iosb[4];
|
|
unsigned short n_len;
|
|
int4 status, rsize, size, temp, save_errno, old_start_vbn;
|
|
uint4 rest_blks, totblks;
|
|
trans_num curr_tn;
|
|
uint4 ii;
|
|
block_id blk_num;
|
|
bool extend;
|
|
uint4 cli_status;
|
|
BFILE *in;
|
|
int i, db_fd;
|
|
uint4 old_blk_size, old_tot_blks, bplmap, old_bit_maps, new_bit_maps;
|
|
off_t new_eof, offset;
|
|
char buff[DISK_BLOCK_SIZE];
|
|
char msg_buffer[1024], *newmap, *newmap_bptr;
|
|
mstr msg_string;
|
|
char addr[SA_MAXLEN+1];
|
|
unsigned char tcp[5];
|
|
backup_type type;
|
|
unsigned short port;
|
|
int4 timeout, cut, match;
|
|
char debug_info[256];
|
|
void (*common_read)();
|
|
char *errptr;
|
|
pid_t waitpid_res;
|
|
muinc_blk_hdr_ptr_t sblkh_p;
|
|
int rc;
|
|
# ifdef GTM_CRYPT
|
|
char bkup_hash[GTMCRYPT_HASH_LEN];
|
|
int req_dec_blk_size, crypt_status;
|
|
gtmcrypt_key_t bkup_key_handle, target_key_handle;
|
|
boolean_t is_bkup_file_encrypted, is_same_hash = FALSE;
|
|
# endif
|
|
ZOS_ONLY(int realfiletag;)
|
|
|
|
extend = TRUE;
|
|
if (CLI_NEGATED == (cli_status = cli_present("EXTEND")))
|
|
extend = FALSE;
|
|
mu_outofband_setup();
|
|
mu_gv_cur_reg_init();
|
|
n_len = SIZEOF(db_name);
|
|
if (cli_get_str("DATABASE", db_name, &n_len) == FALSE)
|
|
mupip_exit(ERR_MUPCLIERR);
|
|
strcpy((char *)gv_cur_region->dyn.addr->fname, db_name);
|
|
gv_cur_region->dyn.addr->fname_len = n_len;
|
|
if (!STANDALONE(gv_cur_region))
|
|
{
|
|
util_out_print("Error securing stand alone access to output file !AD. Aborting restore.", TRUE, n_len, db_name);
|
|
mupip_exit(ERR_MUPRESTERR);
|
|
}
|
|
OPENFILE(db_name, O_RDWR, db_fd);
|
|
if (FD_INVALID == db_fd)
|
|
{
|
|
save_errno = errno;
|
|
util_out_print("Error accessing output file !AD. Aborting restore.", TRUE, n_len, db_name);
|
|
errptr = (char *)STRERROR(save_errno);
|
|
util_out_print("open : !AZ", TRUE, errptr);
|
|
CLNUP_AND_EXIT(save_errno, NULL);
|
|
}
|
|
#ifdef __MVS__
|
|
if (-1 == gtm_zos_tag_to_policy(db_fd, TAG_BINARY, &realfiletag))
|
|
TAG_POLICY_GTM_PUTMSG(db_name, realfiletag, TAG_BINARY, errno);
|
|
#endif
|
|
murgetlst();
|
|
LSEEKREAD(db_fd, 0, &old_data, SIZEOF(sgmnt_data), save_errno);
|
|
if (0 != save_errno)
|
|
{
|
|
util_out_print("Error accessing output file !AD. Aborting restore.", TRUE, n_len, db_name);
|
|
if (-1 != save_errno)
|
|
{
|
|
errptr = (char *)STRERROR(save_errno);
|
|
util_out_print("read : !AZ", TRUE, errptr);
|
|
CLNUP_AND_EXIT(save_errno, NULL);
|
|
} else
|
|
CLNUP_AND_EXIT(ERR_IOEOF, NULL);
|
|
}
|
|
if (memcmp(old_data.label, label, GDS_LABEL_SZ))
|
|
{
|
|
util_out_print("Output file !AD has an unrecognizable format", TRUE, n_len, db_name);
|
|
CLNUP_AND_EXIT(ERR_MUPRESTERR, NULL);
|
|
}
|
|
CHECK_DB_ENDIAN(&old_data, n_len, db_name);
|
|
|
|
curr_tn = old_data.trans_hist.curr_tn;
|
|
old_blk_size = old_data.blk_size;
|
|
old_tot_blks = old_data.trans_hist.total_blks;
|
|
old_start_vbn = old_data.start_vbn;
|
|
bplmap = old_data.bplmap;
|
|
old_bit_maps = DIVIDE_ROUND_DOWN(old_tot_blks, bplmap);
|
|
inbuf = (char *)malloc(BACKUP_TEMPFILE_BUFF_SIZE);
|
|
sblkh_p = (muinc_blk_hdr_ptr_t)inbuf;
|
|
|
|
msg_string.addr = msg_buffer;
|
|
msg_string.len = SIZEOF(msg_buffer);
|
|
|
|
memset(&inhead, 0, SIZEOF(inc_header));
|
|
rest_blks = 0;
|
|
|
|
for (ptr = in_files.next; ptr; ptr = ptr->next)
|
|
{ /* --- determine source type --- */
|
|
type = backup_to_file;
|
|
if (0 == ptr->input_file.len)
|
|
continue;
|
|
else if ('|' == *(ptr->input_file.addr + ptr->input_file.len - 1))
|
|
{
|
|
type = backup_to_exec;
|
|
ptr->input_file.len--;
|
|
*(ptr->input_file.addr + ptr->input_file.len) = '\0';
|
|
} else if (ptr->input_file.len > 5)
|
|
{
|
|
lower_to_upper(tcp, (uchar_ptr_t)ptr->input_file.addr, 5);
|
|
if (0 == memcmp(tcp, "TCP:/", 5))
|
|
{
|
|
type = backup_to_tcp;
|
|
cut = 5;
|
|
while ('/' == *(ptr->input_file.addr + cut))
|
|
cut++;
|
|
ptr->input_file.len -= cut;
|
|
p = ptr->input_file.addr;
|
|
while (p < ptr->input_file.addr + ptr->input_file.len)
|
|
{
|
|
*p = *(p + cut);
|
|
p++;
|
|
}
|
|
*p = '\0';
|
|
}
|
|
}
|
|
/* --- open the input stream --- */
|
|
restore_read_errno = 0;
|
|
switch(type)
|
|
{
|
|
case backup_to_file:
|
|
common_read = iob_read;
|
|
if ((in = iob_open_rd(ptr->input_file.addr, DISK_BLOCK_SIZE, BLOCKING_FACTOR)) == NULL)
|
|
{
|
|
save_errno = errno;
|
|
util_out_print("Error accessing input file !AD. Aborting restore.", TRUE,
|
|
ptr->input_file.len, ptr->input_file.addr);
|
|
errptr = (char *)STRERROR(save_errno);
|
|
util_out_print("open : !AZ", TRUE, errptr);
|
|
CLNUP_AND_EXIT(save_errno, inbuf);
|
|
}
|
|
ESTABLISH(iob_io_error);
|
|
break;
|
|
case backup_to_exec:
|
|
pipe_child = 0;
|
|
common_read = exec_read;
|
|
in = (BFILE *)malloc(SIZEOF(BFILE));
|
|
if (0 > (in->fd = gtm_pipe(ptr->input_file.addr, input_from_comm)))
|
|
{
|
|
util_out_print("Error creating input pipe from !AD.",
|
|
TRUE, ptr->input_file.len, ptr->input_file.addr);
|
|
CLNUP_AND_EXIT(ERR_MUPRESTERR, inbuf);
|
|
}
|
|
#ifdef DEBUG_ONLINE
|
|
PRINTF("file descriptor for the openned pipe is %d.\n", in->fd);
|
|
PRINTF("the command passed to gtm_pipe is %s.\n", ptr->input_file.addr);
|
|
#endif
|
|
break;
|
|
case backup_to_tcp:
|
|
common_read = tcp_read;
|
|
/* parse the input */
|
|
switch (match = SSCANF(ptr->input_file.addr, "%[^:]:%hu", addr, &port))
|
|
{
|
|
case 1 :
|
|
port = DEFAULT_BKRS_PORT;
|
|
case 2 :
|
|
break;
|
|
default :
|
|
util_out_print("Error : A hostname has to be specified.", TRUE);
|
|
CLNUP_AND_EXIT(ERR_MUPRESTERR, inbuf);
|
|
}
|
|
assert(SIZEOF(timeout) == SIZEOF(int));
|
|
if ((0 == cli_get_int("NETTIMEOUT", (int4 *)&timeout)) || (0 > timeout))
|
|
timeout = DEFAULT_BKRS_TIMEOUT;
|
|
in = (BFILE *)malloc(SIZEOF(BFILE));
|
|
iotcp_fillroutine();
|
|
if (0 > (in->fd = tcp_open(addr, port, timeout, TRUE)))
|
|
{
|
|
util_out_print("Error establishing TCP connection to !AD.",
|
|
TRUE, ptr->input_file.len, ptr->input_file.addr);
|
|
CLNUP_AND_EXIT(ERR_MUPRESTERR, inbuf);
|
|
}
|
|
break;
|
|
default:
|
|
util_out_print("Aborting restore!/", TRUE);
|
|
util_out_print("Unrecognized input format !AD", TRUE, ptr->input_file.len, ptr->input_file.addr);
|
|
CLNUP_AND_EXIT(ERR_MUPRESTERR, inbuf);
|
|
}
|
|
COMMON_READ(in, &inhead, SIZEOF(inc_header), inbuf);
|
|
if (memcmp(inhead.label, V5_INC_HEADER_LABEL, INC_HDR_LABEL_SZ) &&
|
|
(memcmp(inhead.label, INC_HEADER_LABEL, INC_HDR_LABEL_SZ)))
|
|
{
|
|
util_out_print("Input file !AD has an unrecognizable format", TRUE, ptr->input_file.len,
|
|
ptr->input_file.addr);
|
|
CLNUP_AND_EXIT(ERR_MUPRESTERR, inbuf);
|
|
}
|
|
# ifdef GTM_CRYPT
|
|
is_bkup_file_encrypted = FALSE;
|
|
if (inhead.is_encrypted)
|
|
{
|
|
COMMON_READ(in, bkup_hash, GTMCRYPT_HASH_LEN, inbuf);
|
|
is_bkup_file_encrypted = inhead.is_encrypted;
|
|
}
|
|
# endif
|
|
|
|
if (curr_tn != inhead.start_tn)
|
|
{
|
|
util_out_print("Transaction in input file !AD does not align with database TN.!/DB: !16@XQ!_"
|
|
"Input file: !16@XQ", TRUE, ptr->input_file.len, ptr->input_file.addr,
|
|
&curr_tn, &inhead.start_tn);
|
|
CLNUP_AND_EXIT(ERR_MUPRESTERR, inbuf);
|
|
}
|
|
if (old_blk_size != inhead.blk_size)
|
|
{
|
|
util_out_print("Incompatable block size. Output file !AD has block size !XL,", TRUE, n_len, db_name,
|
|
old_blk_size);
|
|
util_out_print("while input file !AD is from a database with block size !XL,", TRUE, ptr->input_file.len,
|
|
ptr->input_file.addr, inhead.blk_size);
|
|
CLNUP_AND_EXIT(ERR_MUPRESTERR, inbuf);
|
|
}
|
|
new_bit_maps = DIVIDE_ROUND_DOWN(inhead.db_total_blks, bplmap);
|
|
if (old_tot_blks != inhead.db_total_blks)
|
|
{
|
|
if (old_tot_blks > inhead.db_total_blks || !extend)
|
|
{
|
|
totblks = old_tot_blks - DIVIDE_ROUND_UP(old_tot_blks, DISK_BLOCK_SIZE);
|
|
util_out_print("Incompatable database sizes. Output file !AD has!/ !UL (!XL hex) total blocks,",
|
|
TRUE, n_len, db_name, totblks, totblks);
|
|
totblks = inhead.db_total_blks - DIVIDE_ROUND_UP(inhead.db_total_blks, DISK_BLOCK_SIZE);
|
|
util_out_print("while input file !AD is from a database with!/ !UL (!XL hex) total blocks",
|
|
TRUE, ptr->input_file.len, ptr->input_file.addr, totblks, totblks);
|
|
CLNUP_AND_EXIT(ERR_MUPRESTERR, inbuf);
|
|
} else
|
|
{ /* The db must be exteneded which we will do ourselves (to avoid jnl and other interferences
|
|
in gdsfilext). These local bit map blocks will be created in GDSVCURR format (always). The
|
|
reason for this is that we do not know at this time whether these blocks will be replaced
|
|
by blocks in the backup or not. If we are in compatibility mode, this is highly likely
|
|
even if before image journaling is on which creates bit maps with TN=0. In either case,
|
|
a GDSVCURR format block is the only one that can be added to the database without affecting
|
|
the blks_to_upgrd counter.
|
|
*/
|
|
new_eof = ((off_t)(old_start_vbn - 1) * DISK_BLOCK_SIZE)
|
|
+ ((off_t)inhead.db_total_blks * old_blk_size);
|
|
memset(buff, 0, DISK_BLOCK_SIZE);
|
|
LSEEKWRITE(db_fd, new_eof, buff, DISK_BLOCK_SIZE, status);
|
|
if (0 != status)
|
|
{
|
|
util_out_print("Aborting restore!/", TRUE);
|
|
util_out_print("lseek or write error : Unable to extend output file !AD!/",
|
|
TRUE, n_len, db_name);
|
|
util_out_print(" from !UL (!XL hex) total blocks to !UL (!XL hex) total blocks.!/",
|
|
TRUE, old_tot_blks, old_tot_blks, inhead.db_total_blks, inhead.db_total_blks);
|
|
util_out_print(" Current input file is !AD with !UL (!XL hex) total blocks!/",
|
|
TRUE, ptr->input_file.len, ptr->input_file.addr,
|
|
inhead.db_total_blks, inhead.db_total_blks);
|
|
gtm_putmsg(VARLSTCNT(1) status);
|
|
CLNUP_AND_EXIT(ERR_MUPRESTERR, inbuf);
|
|
}
|
|
/* --- initialize all new bitmaps, just in case they are not touched later --- */
|
|
if (new_bit_maps > old_bit_maps)
|
|
{ /* -- similar logic exist in bml_newmap.c, which need to pick up any new updates here -- */
|
|
newmap = (char *)malloc(old_blk_size);
|
|
((blk_hdr *)newmap)->bver = GDSVCURR;
|
|
((blk_hdr *)newmap)->bsiz = (unsigned int)(BM_SIZE(bplmap));
|
|
((blk_hdr *)newmap)->levl = LCL_MAP_LEVL;
|
|
((blk_hdr *)newmap)->tn = curr_tn;
|
|
newmap_bptr = newmap + SIZEOF(blk_hdr);
|
|
*newmap_bptr++ = THREE_BLKS_FREE;
|
|
memset(newmap_bptr, FOUR_BLKS_FREE, BM_SIZE(bplmap) - SIZEOF(blk_hdr) - 1);
|
|
for (ii = ROUND_UP(old_tot_blks, bplmap); ii < inhead.db_total_blks; ii += bplmap)
|
|
{
|
|
new_eof = (off_t)(old_start_vbn - 1) * DISK_BLOCK_SIZE + (off_t)ii * old_blk_size;
|
|
LSEEKWRITE(db_fd, new_eof, newmap, old_blk_size, status);
|
|
if (0 != status)
|
|
{
|
|
util_out_print("Aborting restore!/", TRUE);
|
|
util_out_print("Bitmap 0x!XL initialization error!", TRUE, ii);
|
|
gtm_putmsg(VARLSTCNT(1) status);
|
|
free(newmap);
|
|
CLNUP_AND_EXIT(ERR_MUPRESTERR, inbuf);
|
|
}
|
|
}
|
|
free(newmap);
|
|
}
|
|
old_tot_blks = inhead.db_total_blks;
|
|
}
|
|
}
|
|
rsize = SIZEOF(muinc_blk_hdr) + inhead.blk_size;
|
|
# ifdef GTM_CRYPT
|
|
if (is_bkup_file_encrypted || old_data.is_encrypted)
|
|
{
|
|
/* See if the backup file and the target file are going to have
|
|
* the same hash thereby speeding up the most common case. */
|
|
if (!memcmp(bkup_hash, old_data.encryption_hash, GTMCRYPT_HASH_LEN))
|
|
is_same_hash = TRUE;
|
|
if (!is_same_hash)
|
|
{
|
|
INIT_PROC_ENCRYPTION(crypt_status);
|
|
if (0 != crypt_status)
|
|
CLNUP_AND_EXIT(crypt_status, inbuf);
|
|
if (is_bkup_file_encrypted)
|
|
{
|
|
GTMCRYPT_GETKEY(bkup_hash, bkup_key_handle, crypt_status);
|
|
if (0 != crypt_status)
|
|
{
|
|
GC_GTM_PUTMSG(crypt_status, ptr->input_file.addr);
|
|
CLNUP_AND_EXIT(crypt_status, inbuf);
|
|
}
|
|
}
|
|
if (old_data.is_encrypted)
|
|
{
|
|
GTMCRYPT_GETKEY(old_data.encryption_hash, target_key_handle, crypt_status);
|
|
if (0 != crypt_status)
|
|
{
|
|
GC_GTM_PUTMSG(crypt_status, db_name);
|
|
CLNUP_AND_EXIT(crypt_status, inbuf);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
# endif
|
|
for ( ; ;)
|
|
{ /* All records are of fixed size so process until we get to a zeroed record marking the end */
|
|
COMMON_READ(in, inbuf, rsize, inbuf); /* Note rsize == sblkh_p */
|
|
if (0 == sblkh_p->blkid && FALSE == sblkh_p->valid_data)
|
|
{ /* This is supposed to be the end of list marker (null entry */
|
|
COMMON_READ(in, &rsize, SIZEOF(rsize), inbuf);
|
|
if (SIZEOF(END_MSG) + SIZEOF(int4) == rsize)
|
|
{ /* the length of our secondary check is correct .. now check substance */
|
|
COMMON_READ(in, inbuf, rsize - SIZEOF(int4), inbuf);
|
|
if (0 == MEMCMP_LIT(inbuf, END_MSG))
|
|
break; /* We are done */
|
|
}
|
|
util_out_print("Invalid information in restore file !AD. Aborting restore.",
|
|
TRUE, ptr->input_file.len,
|
|
ptr->input_file.addr);
|
|
assert(FALSE);
|
|
if (backup_to_file == type)
|
|
iob_close(in);
|
|
CLNUP_AND_EXIT(ERR_MUPRESTERR, inbuf);
|
|
}
|
|
rest_blks++;
|
|
blk_num = sblkh_p->blkid;
|
|
/* For blocks that were read during the main backup phase of stream backup, the blocks are
|
|
recorded without version (there may even be some garbage blocks in the stream of
|
|
indeterminate/invalid format if a bitmap was written out prior to the data blocks that
|
|
were recently allocated in it). For these blocks, we just write out what we have as a
|
|
full block. For blocks that were written out during the backup as part of the online
|
|
image processing, these are always recorded in V5 mode. We will rewrite these in the mode
|
|
they were oringally found on disk (potentially necessitating a downgrade of the block).
|
|
This allows us to exactly match the blks_to_upgrade counter in the saved file-header without
|
|
worrying about what blocks were converted (or not) in the interim.
|
|
*/
|
|
blk_ptr = inbuf + SIZEOF(muinc_blk_hdr);
|
|
size = old_blk_size;
|
|
if (GDSNOVER != sblkh_p->use.bkup.ondsk_blkver)
|
|
{ /* Specifically versioned blocks - Put them back in the version they were originally */
|
|
if (GDSV4 == sblkh_p->use.bkup.ondsk_blkver)
|
|
{
|
|
gds_blk_downgrade((v15_blk_hdr_ptr_t)blk_ptr, (blk_hdr_ptr_t)blk_ptr);
|
|
size = (((v15_blk_hdr_ptr_t)blk_ptr)->bsiz + 1) & ~1;
|
|
} else
|
|
size = (((blk_hdr_ptr_t)blk_ptr)->bsiz + 1) & ~1;
|
|
}
|
|
# ifdef GTM_CRYPT
|
|
assert((size <= old_blk_size) && (size >= SIZEOF(blk_hdr)));
|
|
req_dec_blk_size = MIN(old_blk_size, size) - SIZEOF(blk_hdr);
|
|
if (!is_same_hash && (BLOCK_REQUIRE_ENCRYPTION(is_bkup_file_encrypted, (((blk_hdr_ptr_t)blk_ptr)->levl),
|
|
req_dec_blk_size)))
|
|
{
|
|
GTMCRYPT_DECODE_FAST(bkup_key_handle,
|
|
blk_ptr + SIZEOF(blk_hdr),
|
|
req_dec_blk_size,
|
|
NULL,
|
|
crypt_status);
|
|
if (0 != crypt_status)
|
|
{
|
|
GC_GTM_PUTMSG(crypt_status, ptr->input_file.addr);
|
|
CLNUP_AND_EXIT(crypt_status, inbuf);
|
|
}
|
|
}
|
|
# endif
|
|
offset = (old_start_vbn - 1) * DISK_BLOCK_SIZE + ((off_t)old_blk_size * blk_num);
|
|
# ifdef GTM_CRYPT
|
|
if (!is_same_hash && (BLOCK_REQUIRE_ENCRYPTION(old_data.is_encrypted,
|
|
(((blk_hdr_ptr_t)blk_ptr)->levl), req_dec_blk_size)))
|
|
{
|
|
GTMCRYPT_ENCODE_FAST(target_key_handle,
|
|
blk_ptr + SIZEOF(blk_hdr),
|
|
req_dec_blk_size,
|
|
NULL,
|
|
crypt_status);
|
|
if (0 != crypt_status)
|
|
{
|
|
GC_GTM_PUTMSG(crypt_status, db_name);
|
|
CLNUP_AND_EXIT(crypt_status, inbuf);
|
|
}
|
|
}
|
|
# endif
|
|
LSEEKWRITE(db_fd, offset, blk_ptr, size, save_errno);
|
|
if (0 != save_errno)
|
|
{
|
|
util_out_print("Error accessing output file !AD. Aborting restore.",
|
|
TRUE, n_len, db_name);
|
|
errptr = (char *)STRERROR(save_errno);
|
|
util_out_print("write : !AZ", TRUE, errptr);
|
|
CLNUP_AND_EXIT(save_errno, inbuf);
|
|
}
|
|
}
|
|
/* Next section is the file header which we need to restore */
|
|
COMMON_READ(in, &rsize, SIZEOF(rsize), inbuf);
|
|
assert((SIZEOF(sgmnt_data) + SIZEOF(int4)) == rsize);
|
|
COMMON_READ(in, inbuf, rsize, inbuf);
|
|
((sgmnt_data_ptr_t)inbuf)->start_vbn = old_start_vbn;
|
|
((sgmnt_data_ptr_t)inbuf)->free_space = (uint4)(((old_start_vbn - 1) * DISK_BLOCK_SIZE) - SIZEOF_FILE_HDR(inbuf));
|
|
GTMCRYPT_ONLY(
|
|
memcpy(((sgmnt_data_ptr_t)inbuf)->encryption_hash, old_data.encryption_hash, GTMCRYPT_HASH_LEN);
|
|
((sgmnt_data_ptr_t)inbuf)->is_encrypted = old_data.is_encrypted;
|
|
)
|
|
LSEEKWRITE(db_fd, 0, inbuf, rsize - SIZEOF(int4), save_errno);
|
|
if (0 != save_errno)
|
|
{
|
|
util_out_print("Error accessing output file !AD. Aborting restore.",
|
|
TRUE, n_len, db_name);
|
|
errptr = (char *)STRERROR(save_errno);
|
|
util_out_print("write : !AZ", TRUE, errptr);
|
|
CLNUP_AND_EXIT(save_errno, inbuf);
|
|
}
|
|
GET_LONG(temp, (inbuf + rsize - SIZEOF(int4)));
|
|
rsize = temp;
|
|
COMMON_READ(in, inbuf, rsize, inbuf);
|
|
if (0 != MEMCMP_LIT(inbuf, HDR_MSG))
|
|
{
|
|
util_out_print("Unexpected backup format error restoring !AD. Aborting restore.",
|
|
TRUE, n_len, db_name);
|
|
errptr = (char *)STRERROR(save_errno);
|
|
util_out_print("write : !AZ", TRUE, errptr);
|
|
CLNUP_AND_EXIT(save_errno, inbuf);
|
|
}
|
|
|
|
GET_LONG(temp, (inbuf + rsize - SIZEOF(int4)));
|
|
rsize = temp;
|
|
offset = (MM_BLOCK - 1) * DISK_BLOCK_SIZE;
|
|
assert(SGMNT_HDR_LEN == offset); /* Still have contiguou master map for now */
|
|
for (i = 0; ; i++) /* Restore master map */
|
|
{
|
|
COMMON_READ(in, inbuf, rsize, inbuf);
|
|
if (!MEMCMP_LIT(inbuf, MAP_MSG))
|
|
break;
|
|
LSEEKWRITE(db_fd,
|
|
offset,
|
|
inbuf,
|
|
rsize - SIZEOF(int4),
|
|
save_errno);
|
|
if (0 != save_errno)
|
|
{
|
|
util_out_print("Error accessing output file !AD. Aborting restore.",
|
|
TRUE, n_len, db_name);
|
|
errptr = (char *)STRERROR(save_errno);
|
|
util_out_print("write : !AZ", TRUE, errptr);
|
|
CLNUP_AND_EXIT(save_errno, inbuf);
|
|
}
|
|
offset += rsize - SIZEOF(int4);
|
|
GET_LONG(temp, (inbuf + rsize - SIZEOF(int4)));
|
|
rsize = temp;
|
|
}
|
|
curr_tn = inhead.end_tn;
|
|
switch (type)
|
|
{
|
|
case backup_to_file:
|
|
REVERT;
|
|
iob_close(in);
|
|
break;
|
|
case backup_to_exec:
|
|
CLOSEFILE_RESET(in->fd, rc); /* resets "in->fd" to FD_INVALID */
|
|
if ((pipe_child > 0) && (FALSE != is_proc_alive(pipe_child, 0)))
|
|
WAITPID(pipe_child, (int *)&status, 0, waitpid_res);
|
|
break;
|
|
case backup_to_tcp:
|
|
break;
|
|
}
|
|
}
|
|
util_out_print("!/RESTORE COMPLETED", TRUE);
|
|
util_out_print("!UL blocks restored", TRUE, rest_blks);
|
|
CLNUP_AND_EXIT(SS_NORMAL, inbuf);
|
|
}
|
|
|
|
STATICFNDEF void exec_read(BFILE *bf, char *buf, int nbytes)
|
|
{
|
|
int needed, got;
|
|
int4 status;
|
|
char *curr;
|
|
pid_t waitpid_res;
|
|
int rc;
|
|
|
|
assert(nbytes > 0);
|
|
needed = nbytes;
|
|
curr = buf;
|
|
#ifdef DEBUG_ONLINE
|
|
PRINTF("file descriptor is %d and bytes needed is %d\n", bf->fd, needed);
|
|
#endif
|
|
while(0 != (got = (int)(read(bf->fd, curr, needed))))
|
|
{
|
|
if (got == needed)
|
|
break;
|
|
else if (got > 0)
|
|
{
|
|
needed -= got;
|
|
curr += got;
|
|
}
|
|
/* the check for EINTR below is valid and should not be converted to an EINTR
|
|
* wrapper macro, for an immediate retry is not attempted. Instead, wcs_sleep
|
|
* is called.
|
|
*/
|
|
else if ((EINTR != errno) && (EAGAIN != errno))
|
|
{
|
|
gtm_putmsg(VARLSTCNT(1) errno);
|
|
if ((pipe_child > 0) && (FALSE != is_proc_alive(pipe_child, 0)))
|
|
WAITPID(pipe_child, (int *)&status, 0, waitpid_res);
|
|
CLOSEFILE_RESET(bf->fd, rc); /* resets "bf->fd" to FD_INVALID */
|
|
restore_read_errno = errno;
|
|
break;
|
|
}
|
|
wcs_sleep(100);
|
|
}
|
|
return;
|
|
}
|
|
|
|
/* the logic here can be reused in iotcp_readfl.c and iosocket_readfl.c */
|
|
STATICFNDEF void tcp_read(BFILE *bf, char *buf, int nbytes)
|
|
{
|
|
int needed, status;
|
|
char *curr;
|
|
fd_set fs;
|
|
ABS_TIME save_nap, nap;
|
|
int rc;
|
|
|
|
needed = nbytes;
|
|
curr = buf;
|
|
|
|
nap.at_sec = 1;
|
|
nap.at_usec = 0;
|
|
|
|
while (1)
|
|
{
|
|
FD_ZERO(&fs);
|
|
FD_SET(bf->fd, &fs);
|
|
assert(0 != FD_ISSET(bf->fd, &fs));
|
|
/* Note: the check for EINTR from the select below should remain, as aa_select is a
|
|
* function, and not all callers of aa_select behave the same when EINTR is returned.
|
|
*/
|
|
save_nap = nap;
|
|
status = tcp_routines.aa_select(bf->fd + 1, (void *)(&fs), (void *)0, (void *)0, &nap);
|
|
nap = save_nap;
|
|
|
|
if (status > 0)
|
|
{
|
|
status = tcp_routines.aa_recv(bf->fd, curr, needed, 0);
|
|
if ((0 == status) || (needed == status)) /* lost connection or all set */
|
|
{
|
|
break;
|
|
} else if (status > 0)
|
|
{
|
|
needed -= status;
|
|
curr += status;
|
|
}
|
|
}
|
|
if ((status < 0) && (errno != EINTR))
|
|
{
|
|
gtm_putmsg(VARLSTCNT(1) errno);
|
|
CLOSEFILE_RESET(bf->fd, rc); /* resets "bf->fd" to FD_INVALID */
|
|
restore_read_errno = errno;
|
|
break;
|
|
}
|
|
}
|
|
return;
|
|
}
|