More backup improvements:
[rsync/rsync.git] / main.c
CommitLineData
0f78b815
WD
1/*
2 * The startup routines, including main(), for rsync.
3 *
4 * Copyright (C) 1996-2001 Andrew Tridgell <tridge@samba.org>
5 * Copyright (C) 1996 Paul Mackerras
6 * Copyright (C) 2001, 2002 Martin Pool <mbp@samba.org>
b3bf9b9d 7 * Copyright (C) 2003-2009 Wayne Davison
0f78b815
WD
8 *
9 * This program is free software; you can redistribute it and/or modify
8e41b68e
WD
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 3 of the License, or
12 * (at your option) any later version.
0f78b815
WD
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
e7c67065 19 * You should have received a copy of the GNU General Public License along
4fd842f9 20 * with this program; if not, visit the http://fsf.org website.
0f78b815 21 */
c627d613
AT
22
23#include "rsync.h"
5dd14f0c 24#include "inums.h"
a72ba0cf 25#include "io.h"
d9401514
WD
26#if defined CONFIG_LOCALE && defined HAVE_LOCALE_H
27#include <locale.h>
28#endif
c627d613 29
50839b4b
WD
30extern int dry_run;
31extern int list_only;
32eda096 32extern int am_root;
d9c7edf6
WD
33extern int am_server;
34extern int am_sender;
35extern int am_daemon;
3ea6e0e7 36extern int inc_recurse;
32eda096 37extern int blocking_io;
886df221 38extern int always_checksum;
47c11975 39extern int remove_source_files;
951e826b 40extern int output_needs_newline;
bf26aa22 41extern int need_messages_from_generator;
051182cb 42extern int kluge_around_eof;
3f0211b6 43extern int got_xfer_error;
eabc85ef 44extern int msgs2stderr;
32eda096 45extern int module_id;
bb6721dc 46extern int copy_links;
a695b379 47extern int copy_dirlinks;
01103e18 48extern int copy_unsafe_links;
83926d3c 49extern int keep_dirlinks;
32eda096 50extern int preserve_hard_links;
d04e9c51 51extern int protocol_version;
f3d6d480 52extern int file_total;
32eda096 53extern int recurse;
26bbb6aa 54extern int xfer_dirs;
f7e5068d 55extern int protect_args;
32eda096 56extern int relative_paths;
7c58c991 57extern int sanitize_paths;
c2a2147a 58extern int curr_dir_depth;
615a5415 59extern int curr_dir_len;
7c58c991 60extern int module_id;
32eda096 61extern int rsync_port;
b1df18d7 62extern int whole_file;
32eda096
WD
63extern int read_batch;
64extern int write_batch;
b9f592fb 65extern int batch_fd;
32eda096 66extern int filesfrom_fd;
ba22c9e2 67extern int connect_timeout;
32eda096 68extern pid_t cleanup_child_pid;
a1018691 69extern unsigned int module_dirlen;
50839b4b 70extern struct stats stats;
886df221
WD
71extern char *stdout_format;
72extern char *logfile_format;
860236bf 73extern char *filesfrom_host;
c2c8db91 74extern char *partial_dir;
ce27f36d 75extern char *dest_option;
32eda096
WD
76extern char *rsync_path;
77extern char *shell_cmd;
9b3318b0 78extern char *batch_name;
a39da29a 79extern char *password_file;
3696674b 80extern char *backup_dir;
615a5415 81extern char curr_dir[MAXPATHLEN];
3696674b 82extern char backup_dir_buf[MAXPATHLEN];
b791d680 83extern char *basis_dir[MAX_BASIS_DIRS+1];
da131912 84extern struct file_list *first_flist;
819bfe45 85extern struct filter_list_struct daemon_filter_list;
57dee64e 86
19284e2e 87uid_t our_uid;
93465f51 88int am_generator = 0;
57dee64e 89int local_server = 0;
e208631a 90int daemon_over_rsh = 0;
05278935 91mode_t orig_umask = 0;
f3d6d480 92int batch_gen_fd = -1;
886df221 93int sender_keeps_checksum = 0;
c627d613 94
91c5833b
WD
95/* There's probably never more than at most 2 outstanding child processes,
96 * but set it higher, just in case. */
84e6d6fd 97#define MAXCHILDPROCS 7
ee7118a8 98
8261af74
WD
99#ifdef HAVE_SIGACTION
100# ifdef HAVE_SIGPROCMASK
101# define SIGACTMASK(n,h) SIGACTION(n,h), sigaddset(&sigmask,(n))
102# else
103# define SIGACTMASK(n,h) SIGACTION(n,h)
104# endif
60ee01f5
WD
105static struct sigaction sigact;
106#endif
107
ee7118a8
DD
108struct pid_status {
109 pid_t pid;
84e6d6fd 110 int status;
ee7118a8
DD
111} pid_stat_table[MAXCHILDPROCS];
112
33c4b445
WD
113static time_t starttime, endtime;
114static int64 total_read, total_written;
115
e5a2b854 116static void show_malloc_stats(void);
82980a23 117
97d8e709 118/* Works like waitpid(), but if we already harvested the child pid in our
6d59ac19 119 * remember_children(), we succeed instead of returning an error. */
97d8e709 120pid_t wait_process(pid_t pid, int *status_ptr, int flags)
82980a23 121{
d365e229
WD
122 pid_t waited_pid;
123
124 do {
125 waited_pid = waitpid(pid, status_ptr, flags);
126 } while (waited_pid == -1 && errno == EINTR);
d9c7edf6 127
6fb812f7 128 if (waited_pid == -1 && errno == ECHILD) {
97d8e709 129 /* Status of requested child no longer available: check to
6d59ac19 130 * see if it was processed by remember_children(). */
97d8e709 131 int cnt;
84e6d6fd 132 for (cnt = 0; cnt < MAXCHILDPROCS; cnt++) {
ee7118a8 133 if (pid == pid_stat_table[cnt].pid) {
97d8e709 134 *status_ptr = pid_stat_table[cnt].status;
ee7118a8 135 pid_stat_table[cnt].pid = 0;
97d8e709 136 return pid;
ee7118a8
DD
137 }
138 }
139 }
140
97d8e709
WD
141 return waited_pid;
142}
143
144/* Wait for a process to exit, calling io_flush while waiting. */
84e6d6fd 145static void wait_process_with_flush(pid_t pid, int *exit_code_ptr)
97d8e709
WD
146{
147 pid_t waited_pid;
148 int status;
149
150 while ((waited_pid = wait_process(pid, &status, WNOHANG)) == 0) {
151 msleep(20);
152 io_flush(FULL_FLUSH);
153 }
154
d9c7edf6
WD
155 /* TODO: If the child exited on a signal, then log an
156 * appropriate error message. Perhaps we should also accept a
157 * message describing the purpose of the child. Also indicate
dbefb6b4 158 * this to the caller so that they know something went wrong. */
84e6d6fd
WD
159 if (waited_pid < 0) {
160 rsyserr(FERROR, errno, "waitpid");
161 *exit_code_ptr = RERR_WAITCHILD;
162 } else if (!WIFEXITED(status)) {
40e6752f 163#ifdef WCOREDUMP
dbefb6b4 164 if (WCOREDUMP(status))
84e6d6fd 165 *exit_code_ptr = RERR_CRASHED;
40e6752f
WD
166 else
167#endif
168 if (WIFSIGNALED(status))
84e6d6fd 169 *exit_code_ptr = RERR_TERMINATED;
dbefb6b4 170 else
84e6d6fd 171 *exit_code_ptr = RERR_WAITCHILD;
dbefb6b4 172 } else
84e6d6fd 173 *exit_code_ptr = WEXITSTATUS(status);
82980a23
AT
174}
175
e366e530
WD
176void write_del_stats(int f)
177{
bc40a305
WD
178 if (read_batch)
179 write_int(f, NDX_DEL_STATS);
180 else
181 send_msg(MSG_DEL_STATS, "", 0, 0);
e366e530
WD
182 write_varint(f, stats.deleted_files - stats.deleted_dirs
183 - stats.deleted_symlinks - stats.deleted_devices
184 - stats.deleted_specials);
185 write_varint(f, stats.deleted_dirs);
186 write_varint(f, stats.deleted_symlinks);
187 write_varint(f, stats.deleted_devices);
188 write_varint(f, stats.deleted_specials);
189}
190
191void read_del_stats(int f)
192{
e366e530
WD
193 stats.deleted_files = read_varint(f);
194 stats.deleted_files += stats.deleted_dirs = read_varint(f);
195 stats.deleted_files += stats.deleted_symlinks = read_varint(f);
196 stats.deleted_files += stats.deleted_devices = read_varint(f);
197 stats.deleted_files += stats.deleted_specials = read_varint(f);
198}
199
b9f592fb
WD
200/* This function gets called from all 3 processes. We want the client side
201 * to actually output the text, but the sender is the only process that has
202 * all the stats we need. So, if we're a client sender, we do the report.
203 * If we're a server sender, we write the stats on the supplied fd. If
204 * we're the client receiver we read the stats from the supplied fd and do
205 * the report. All processes might also generate a set of debug stats, if
206 * the verbose level is high enough (this is the only thing that the
207 * generator process and the server receiver ever do here). */
33c4b445 208static void handle_stats(int f)
c627d613 209{
33c4b445
WD
210 endtime = time(NULL);
211
b9f592fb 212 /* Cache two stats because the read/write code can change it. */
33c4b445
WD
213 total_read = stats.total_read;
214 total_written = stats.total_written;
7a6421fa 215
951e826b 216 if (INFO_GTE(STATS, 3)) {
5c15e29f 217 /* These come out from every process */
7bb7058e 218 show_malloc_stats();
86943126 219 show_flist_stats();
5c15e29f
MP
220 }
221
e5fbaa71
S
222 if (am_generator)
223 return;
224
248fbb8c 225 if (am_daemon) {
83926d3c
WD
226 if (f == -1 || !am_sender)
227 return;
248fbb8c
AT
228 }
229
e19452a9 230 if (am_server) {
3e491682 231 if (am_sender) {
a72ba0cf
WD
232 write_varlong30(f, total_read, 3);
233 write_varlong30(f, total_written, 3);
234 write_varlong30(f, stats.total_size, 3);
f0f7e760 235 if (protocol_version >= 29) {
a72ba0cf
WD
236 write_varlong30(f, stats.flist_buildtime, 3);
237 write_varlong30(f, stats.flist_xfertime, 3);
f0f7e760 238 }
e19452a9 239 }
7a6421fa
AT
240 return;
241 }
e19452a9
DD
242
243 /* this is the client */
d9c7edf6 244
9d19f8a5 245 if (f < 0 && !am_sender) /* e.g. when we got an empty file list. */
0f78b815 246 ;
9d19f8a5 247 else if (!am_sender) {
58c5c245
WD
248 /* Read the first two in opposite order because the meaning of
249 * read/write swaps when switching from sender to receiver. */
a72ba0cf
WD
250 total_written = read_varlong30(f, 3);
251 total_read = read_varlong30(f, 3);
252 stats.total_size = read_varlong30(f, 3);
f0f7e760 253 if (protocol_version >= 29) {
a72ba0cf
WD
254 stats.flist_buildtime = read_varlong30(f, 3);
255 stats.flist_xfertime = read_varlong30(f, 3);
f0f7e760 256 }
e4676bb5 257 } else if (write_batch) {
b9f592fb
WD
258 /* The --read-batch process is going to be a client
259 * receiver, so we need to give it the stats. */
a72ba0cf
WD
260 write_varlong30(batch_fd, total_read, 3);
261 write_varlong30(batch_fd, total_written, 3);
262 write_varlong30(batch_fd, stats.total_size, 3);
f0f7e760 263 if (protocol_version >= 29) {
a72ba0cf
WD
264 write_varlong30(batch_fd, stats.flist_buildtime, 3);
265 write_varlong30(batch_fd, stats.flist_xfertime, 3);
f0f7e760 266 }
e366e530
WD
267 }
268}
269
270static void output_itemized_counts(const char *prefix, int *counts)
271{
272 static char *labels[] = { "reg", "dir", "link", "dev", "special" };
273 char buf[1024], *pre = " (";
274 int j, len = 0;
275 int total = counts[0];
276 if (total) {
277 counts[0] -= counts[1] + counts[2] + counts[3] + counts[4];
278 for (j = 0; j < 5; j++) {
279 if (counts[j]) {
280 len += snprintf(buf+len, sizeof buf - len - 2,
281 "%s%s: %s",
282 pre, labels[j], comma_num(counts[j]));
283 pre = ", ";
284 }
285 }
286 buf[len++] = ')';
a800434a 287 }
e366e530
WD
288 buf[len] = '\0';
289 rprintf(FINFO, "%s: %s%s\n", prefix, comma_num(total), buf);
e4676bb5 290}
a800434a 291
e4676bb5
WD
292static void output_summary(void)
293{
951e826b 294 if (INFO_GTE(STATS, 2)) {
b64ee91a 295 rprintf(FCLIENT, "\n");
e366e530
WD
296 output_itemized_counts("Number of files", &stats.num_files);
297 if (protocol_version >= 29)
298 output_itemized_counts("Number of created files", &stats.created_files);
299 if (protocol_version >= 31)
300 output_itemized_counts("Number of deleted files", &stats.deleted_files);
301 rprintf(FINFO,"Number of regular files transferred: %s\n",
302 comma_num(stats.xferred_files));
60613dc8 303 rprintf(FINFO,"Total file size: %s bytes\n",
adc2476f 304 human_num(stats.total_size));
60613dc8 305 rprintf(FINFO,"Total transferred file size: %s bytes\n",
adc2476f 306 human_num(stats.total_transferred_size));
60613dc8 307 rprintf(FINFO,"Literal data: %s bytes\n",
adc2476f 308 human_num(stats.literal_data));
60613dc8 309 rprintf(FINFO,"Matched data: %s bytes\n",
adc2476f 310 human_num(stats.matched_data));
eb0144d7 311 rprintf(FINFO,"File list size: %s\n",
adc2476f 312 human_num(stats.flist_size));
f0f7e760
WD
313 if (stats.flist_buildtime) {
314 rprintf(FINFO,
adc2476f
WD
315 "File list generation time: %s seconds\n",
316 comma_dnum((double)stats.flist_buildtime / 1000, 3));
f0f7e760 317 rprintf(FINFO,
adc2476f
WD
318 "File list transfer time: %s seconds\n",
319 comma_dnum((double)stats.flist_xfertime / 1000, 3));
f0f7e760 320 }
60613dc8 321 rprintf(FINFO,"Total bytes sent: %s\n",
adc2476f 322 human_num(total_written));
60613dc8 323 rprintf(FINFO,"Total bytes received: %s\n",
adc2476f 324 human_num(total_read));
7a6421fa 325 }
d9c7edf6 326
951e826b 327 if (INFO_GTE(STATS, 1)) {
b64ee91a 328 rprintf(FCLIENT, "\n");
b9f592fb 329 rprintf(FINFO,
b64ee91a 330 "sent %s bytes received %s bytes %s bytes/sec\n",
adc2476f 331 human_num(total_written), human_num(total_read),
60613dc8 332 human_dnum((total_written + total_read)/(0.5 + (endtime - starttime)), 2));
adc2476f
WD
333 rprintf(FINFO, "total size is %s speedup is %s%s\n",
334 human_num(stats.total_size),
335 comma_dnum((double)stats.total_size / (total_written+total_read), 2),
641dc0c5 336 write_batch < 0 ? " (BATCH ONLY)" : dry_run ? " (DRY RUN)" : "");
e19452a9 337 }
fc8a6b97
AT
338
339 fflush(stdout);
340 fflush(stderr);
c627d613
AT
341}
342
343
e5a2b854
MP
344/**
345 * If our C library can get malloc statistics, then show them to FINFO
346 **/
347static void show_malloc_stats(void)
348{
4f5b0756 349#ifdef HAVE_MALLINFO
e5a2b854
MP
350 struct mallinfo mi;
351
352 mi = mallinfo();
353
b64ee91a
WD
354 rprintf(FCLIENT, "\n");
355 rprintf(FINFO, RSYNC_NAME "[%d] (%s%s%s) heap statistics:\n",
f846a9bf
WD
356 getpid(), am_server ? "server " : "",
357 am_daemon ? "daemon " : "", who_am_i());
358 rprintf(FINFO, " arena: %10ld (bytes from sbrk)\n",
359 (long)mi.arena);
360 rprintf(FINFO, " ordblks: %10ld (chunks not in use)\n",
361 (long)mi.ordblks);
362 rprintf(FINFO, " smblks: %10ld\n",
363 (long)mi.smblks);
364 rprintf(FINFO, " hblks: %10ld (chunks from mmap)\n",
365 (long)mi.hblks);
366 rprintf(FINFO, " hblkhd: %10ld (bytes from mmap)\n",
367 (long)mi.hblkhd);
368 rprintf(FINFO, " allmem: %10ld (bytes from sbrk + mmap)\n",
369 (long)mi.arena + mi.hblkhd);
370 rprintf(FINFO, " usmblks: %10ld\n",
371 (long)mi.usmblks);
372 rprintf(FINFO, " fsmblks: %10ld\n",
373 (long)mi.fsmblks);
374 rprintf(FINFO, " uordblks: %10ld (bytes used)\n",
375 (long)mi.uordblks);
376 rprintf(FINFO, " fordblks: %10ld (bytes free)\n",
377 (long)mi.fordblks);
378 rprintf(FINFO, " keepcost: %10ld (bytes in releasable chunk)\n",
379 (long)mi.keepcost);
e5a2b854
MP
380#endif /* HAVE_MALLINFO */
381}
382
383
0882faa2 384/* Start the remote shell. cmd may be NULL to use the default. */
f7e5068d
WD
385static pid_t do_cmd(char *cmd, char *machine, char *user, char **remote_argv, int remote_argc,
386 int *f_in_p, int *f_out_p)
c627d613 387{
6c2e5b56 388 int i, argc = 0;
887e553f 389 char *args[MAX_ARGS];
53936ef9 390 pid_t pid;
bb4aa89c 391 int dash_l_set = 0;
366345fe 392
088aac85 393 if (!read_batch && !local_server) {
82f0c63e 394 char *t, *f, in_quote = '\0';
9af87151 395 char *rsh_env = getenv(RSYNC_RSH_ENV);
366345fe 396 if (!cmd)
9af87151 397 cmd = rsh_env;
366345fe
AT
398 if (!cmd)
399 cmd = RSYNC_RSH;
aa0e6b99 400 cmd = strdup(cmd); /* MEMORY LEAK */
d9c7edf6 401 if (!cmd)
366345fe
AT
402 goto oom;
403
82f0c63e
WD
404 for (t = f = cmd; *f; f++) {
405 if (*f == ' ')
406 continue;
e7a392c7 407 /* Comparison leaves rooms for server_options(). */
f7e5068d
WD
408 if (argc >= MAX_ARGS - MAX_SERVER_ARGS)
409 goto arg_overflow;
82f0c63e
WD
410 args[argc++] = t;
411 while (*f != ' ' || in_quote) {
412 if (!*f) {
413 if (in_quote) {
414 rprintf(FERROR,
415 "Missing trailing-%c in remote-shell command.\n",
416 in_quote);
417 exit_cleanup(RERR_SYNTAX);
418 }
419 f--;
420 break;
421 }
422 if (*f == '\'' || *f == '"') {
423 if (!in_quote) {
424 in_quote = *f++;
425 continue;
426 }
427 if (*f == in_quote && *++f != in_quote) {
428 in_quote = '\0';
429 continue;
430 }
431 }
432 *t++ = *f++;
433 }
434 *t++ = '\0';
887e553f 435 }
c627d613 436
d9c7edf6 437 /* check to see if we've already been given '-l user' in
9af87151 438 * the remote-shell command */
bb4aa89c
WD
439 for (i = 0; i < argc-1; i++) {
440 if (!strcmp(args[i], "-l") && args[i+1][0] != '-')
441 dash_l_set = 1;
442 }
443
4f5b0756 444#ifdef HAVE_REMSH
366345fe
AT
445 /* remsh (on HPUX) takes the arguments the other way around */
446 args[argc++] = machine;
bb4aa89c 447 if (user && !(daemon_over_rsh && dash_l_set)) {
366345fe
AT
448 args[argc++] = "-l";
449 args[argc++] = user;
450 }
7b8356d0 451#else
bb4aa89c 452 if (user && !(daemon_over_rsh && dash_l_set)) {
366345fe
AT
453 args[argc++] = "-l";
454 args[argc++] = user;
455 }
456 args[argc++] = machine;
7b8356d0 457#endif
c627d613 458
366345fe 459 args[argc++] = rsync_path;
c627d613 460
9af87151 461 if (blocking_io < 0) {
90e22f4b
WD
462 char *cp;
463 if ((cp = strrchr(cmd, '/')) != NULL)
464 cp++;
465 else
466 cp = cmd;
467 if (strcmp(cp, "rsh") == 0 || strcmp(cp, "remsh") == 0)
468 blocking_io = 1;
66b71163 469 }
e384bfbd 470
93689aa5 471 server_options(args,&argc);
e7a392c7 472
f7e5068d
WD
473 if (argc >= MAX_ARGS - 2)
474 goto arg_overflow;
366345fe 475 }
c627d613 476
366345fe 477 args[argc++] = ".";
76076c4b 478
f7e5068d
WD
479 if (!daemon_over_rsh) {
480 while (remote_argc > 0) {
481 if (argc >= MAX_ARGS - 1) {
482 arg_overflow:
483 rprintf(FERROR, "internal: args[] overflowed in do_cmd()\n");
484 exit_cleanup(RERR_SYNTAX);
485 }
486 args[argc++] = *remote_argv++;
487 remote_argc--;
488 }
489 }
c627d613 490
366345fe 491 args[argc] = NULL;
c627d613 492
951e826b 493 if (DEBUG_GTE(CMD, 2)) {
e7a392c7 494 for (i = 0; i < argc; i++)
b64ee91a
WD
495 rprintf(FCLIENT, "cmd[%d]=%s ", i, args[i]);
496 rprintf(FCLIENT, "\n");
366345fe
AT
497 }
498
c0d8e84c
WD
499 if (read_batch) {
500 int from_gen_pipe[2];
ea4e8cf8 501 set_allow_inc_recurse();
c0d8e84c
WD
502 if (fd_pair(from_gen_pipe) < 0) {
503 rsyserr(FERROR, errno, "pipe");
504 exit_cleanup(RERR_IPC);
505 }
506 batch_gen_fd = from_gen_pipe[0];
f7e5068d
WD
507 *f_out_p = from_gen_pipe[1];
508 *f_in_p = batch_fd;
53936ef9 509 pid = (pid_t)-1; /* no child pid */
44c4492a 510#ifdef ICONV_CONST
b61665d5 511 setup_iconv();
44c4492a 512#endif
c0d8e84c 513 } else if (local_server) {
b1df18d7
WD
514 /* If the user didn't request --[no-]whole-file, force
515 * it on, but only if we're not batch processing. */
c0d8e84c 516 if (whole_file < 0 && !write_batch)
b1df18d7 517 whole_file = 1;
ea4e8cf8 518 set_allow_inc_recurse();
53936ef9 519 pid = local_child(argc, args, f_in_p, f_out_p, child_main);
44c4492a 520#ifdef ICONV_CONST
b61665d5 521 setup_iconv();
44c4492a 522#endif
f7e5068d 523 } else {
53936ef9 524 pid = piped_child(args, f_in_p, f_out_p);
44c4492a 525#ifdef ICONV_CONST
b61665d5 526 setup_iconv();
44c4492a 527#endif
d8e8ef32 528 if (protect_args && !daemon_over_rsh)
53936ef9 529 send_protected_args(*f_out_p, args);
f7e5068d 530 }
c627d613 531
53936ef9 532 return pid;
c627d613 533
acee11fc 534 oom:
366345fe
AT
535 out_of_memory("do_cmd");
536 return 0; /* not reached */
c627d613
AT
537}
538
eb598fac
WD
539/* The receiving side operates in one of two modes:
540 *
cc8c5057
WD
541 * 1. it receives any number of files into a destination directory,
542 * placing them according to their names in the file-list.
eb598fac
WD
543 *
544 * 2. it receives a single file and saves it using the name in the
545 * destination path instead of its file-list name. This requires a
546 * "local name" for writing out the destination file.
547 *
a7d461fc
WD
548 * So, our task is to figure out what mode/local-name we need.
549 * For mode 1, we change into the destination directory and return NULL.
550 * For mode 2, we change into the directory containing the destination
551 * file (if we aren't already there) and return the local-name. */
eb598fac 552static char *get_local_name(struct file_list *flist, char *dest_path)
c627d613 553{
7a6421fa 554 STRUCT_STAT st;
a7d461fc 555 int statret;
eb598fac 556 char *cp;
c627d613 557
951e826b 558 if (DEBUG_GTE(RECV, 1)) {
eb598fac 559 rprintf(FINFO, "get_local_name count=%d %s\n",
f3d6d480 560 file_total, NS(dest_path));
eb598fac 561 }
1f0610ef 562
ee8e2b15 563 if (!dest_path || list_only)
1f0610ef 564 return NULL;
c95da96a 565
311676ed
WD
566 if (daemon_filter_list.head) {
567 char *slash = strrchr(dest_path, '/');
164cb66a 568 if (slash && (slash[1] == '\0' || (slash[1] == '.' && slash[2] == '\0')))
311676ed
WD
569 *slash = '\0';
570 else
571 slash = NULL;
164cb66a
WD
572 if ((*dest_path != '.' || dest_path[1] != '\0')
573 && (check_filter(&daemon_filter_list, FLOG, dest_path, 0) < 0
574 || check_filter(&daemon_filter_list, FLOG, dest_path, 1) < 0)) {
311676ed
WD
575 rprintf(FERROR, "skipping daemon-excluded destination \"%s\"\n",
576 dest_path);
577 exit_cleanup(RERR_FILESELECT);
578 }
579 if (slash)
580 *slash = '/';
99c3e591
WD
581 }
582
a7d461fc 583 /* See what currently exists at the destination. */
1a7f3d99 584 if ((statret = do_stat(dest_path, &st)) == 0) {
a7d461fc 585 /* If the destination is a dir, enter it and use mode 1. */
1ff5450d 586 if (S_ISDIR(st.st_mode)) {
29a89172
WD
587 if (!change_dir(dest_path, CD_NORMAL)) {
588 rsyserr(FERROR, errno, "change_dir#1 %s failed",
eb598fac 589 full_fname(dest_path));
65417579 590 exit_cleanup(RERR_FILESELECT);
1ff5450d
AT
591 }
592 return NULL;
593 }
f3d6d480 594 if (file_total > 1) {
eb598fac
WD
595 rprintf(FERROR,
596 "ERROR: destination must be a directory when"
597 " copying more than 1 file\n");
65417579 598 exit_cleanup(RERR_FILESELECT);
1ff5450d 599 }
f3d6d480 600 if (file_total == 1 && S_ISDIR(flist->files[0]->mode)) {
44c26bf2
WD
601 rprintf(FERROR,
602 "ERROR: cannot overwrite non-directory"
603 " with a directory\n");
604 exit_cleanup(RERR_FILESELECT);
605 }
cc8c5057 606 } else if (errno != ENOENT) {
a7d461fc
WD
607 /* If we don't know what's at the destination, fail. */
608 rsyserr(FERROR, errno, "ERROR: cannot stat destination %s",
cc8c5057
WD
609 full_fname(dest_path));
610 exit_cleanup(RERR_FILESELECT);
1ff5450d
AT
611 }
612
eb598fac
WD
613 cp = strrchr(dest_path, '/');
614
a7d461fc
WD
615 /* If we need a destination directory because the transfer is not
616 * of a single non-directory or the user has requested one via a
617 * destination path ending in a slash, create one and use mode 1. */
f3d6d480 618 if (file_total > 1 || (cp && !cp[1])) {
eb598fac
WD
619 /* Lop off the final slash (if any). */
620 if (cp && !cp[1])
621 *cp = '\0';
622
a7d461fc
WD
623 if (statret == 0) {
624 rprintf(FERROR,
625 "ERROR: destination path is not a directory\n");
626 exit_cleanup(RERR_SYNTAX);
627 }
628
05278935 629 if (mkdir_defmode(dest_path) != 0) {
eb598fac
WD
630 rsyserr(FERROR, errno, "mkdir %s failed",
631 full_fname(dest_path));
632 exit_cleanup(RERR_FILEIO);
633 }
1ff5450d 634
7341ee2d
WD
635 if (flist->high >= flist->low
636 && strcmp(flist->files[flist->low]->basename, ".") == 0)
288b12ee 637 flist->files[0]->flags |= FLAG_DIR_CREATED;
2a94207a 638
951e826b 639 if (INFO_GTE(NAME, 1))
eb598fac
WD
640 rprintf(FINFO, "created directory %s\n", dest_path);
641
642 if (dry_run) {
615a5415 643 /* Indicate that dest dir doesn't really exist. */
eb598fac 644 dry_run++;
eb598fac
WD
645 }
646
29a89172
WD
647 if (!change_dir(dest_path, dry_run > 1 ? CD_SKIP_CHDIR : CD_NORMAL)) {
648 rsyserr(FERROR, errno, "change_dir#2 %s failed",
eb598fac
WD
649 full_fname(dest_path));
650 exit_cleanup(RERR_FILESELECT);
651 }
e5a96f0f 652
e5a96f0f 653 return NULL;
1ff5450d
AT
654 }
655
eb598fac
WD
656 /* Otherwise, we are writing a single file, possibly on top of an
657 * existing non-directory. Change to the item's parent directory
658 * (if it has a path component), return the basename of the
659 * destination file as the local name, and use mode 2. */
660 if (!cp)
661 return dest_path;
662
663 if (cp == dest_path)
664 dest_path = "/";
665
666 *cp = '\0';
29a89172
WD
667 if (!change_dir(dest_path, CD_NORMAL)) {
668 rsyserr(FERROR, errno, "change_dir#3 %s failed",
eb598fac 669 full_fname(dest_path));
65417579 670 exit_cleanup(RERR_FILESELECT);
1ff5450d 671 }
eb598fac 672 *cp = '/';
1ff5450d 673
eb598fac 674 return cp + 1;
c627d613
AT
675}
676
ce27f36d
WD
677/* This function checks on our alternate-basis directories. If we're in
678 * dry-run mode and the destination dir does not yet exist, we'll try to
679 * tweak any dest-relative paths to make them work for a dry-run (the
680 * destination dir must be in curr_dir[] when this function is called).
42a28d9d 681 * We also warn about any arg that is non-existent or not a directory. */
ce27f36d 682static void check_alt_basis_dirs(void)
615a5415 683{
ce27f36d
WD
684 STRUCT_STAT st;
685 char **dir_p, *slash = strrchr(curr_dir, '/');
686
687 for (dir_p = basis_dir; *dir_p; dir_p++) {
688 if (dry_run > 1 && **dir_p != '/') {
689 int len = curr_dir_len + 1 + strlen(*dir_p) + 1;
690 char *new = new_array(char, len);
691 if (!new)
692 out_of_memory("check_alt_basis_dirs");
693 if (slash && strncmp(*dir_p, "../", 3) == 0) {
694 /* We want to remove only one leading "../" prefix for
695 * the directory we couldn't create in dry-run mode:
696 * this ensures that any other ".." references get
697 * evaluated the same as they would for a live copy. */
698 *slash = '\0';
699 pathjoin(new, len, curr_dir, *dir_p + 3);
700 *slash = '/';
701 } else
702 pathjoin(new, len, curr_dir, *dir_p);
703 *dir_p = new;
704 }
705 if (do_stat(*dir_p, &st) < 0) {
706 rprintf(FWARNING, "%s arg does not exist: %s\n",
707 dest_option, *dir_p);
708 } else if (!S_ISDIR(st.st_mode)) {
709 rprintf(FWARNING, "%s arg is not a dir: %s\n",
710 dest_option, *dir_p);
711 }
615a5415
WD
712 }
713}
c627d613 714
1a8e5c97 715/* This is only called by the sender. */
bc40a305 716static void read_final_goodbye(int f_in, int f_out)
4e0fcd85 717{
f3d6d480
WD
718 int i, iflags, xlen;
719 uchar fnamecmp_type;
720 char xname[MAXPATHLEN];
1a8e5c97
WD
721
722 if (protocol_version < 29)
723 i = read_int(f_in);
724 else {
bc40a305
WD
725 i = read_ndx_and_attrs(f_in, &iflags, &fnamecmp_type, xname, &xlen);
726 if (protocol_version >= 31 && i == NDX_DONE) {
727 if (am_sender)
728 write_ndx(f_out, NDX_DONE);
729 else {
730 if (batch_gen_fd >= 0) {
731 while (read_int(batch_gen_fd) != NDX_DEL_STATS) {}
732 read_del_stats(batch_gen_fd);
733 }
734 send_msg(MSG_DONE, "", 0, 0);
735 }
736 i = read_ndx_and_attrs(f_in, &iflags, &fnamecmp_type, xname, &xlen);
737 }
4e0fcd85
WD
738 }
739
82ad07c4 740 if (i != NDX_DONE) {
c7791b8c
WD
741 rprintf(FERROR, "Invalid packet at end of run (%d) [%s]\n",
742 i, who_am_i());
1a8e5c97 743 exit_cleanup(RERR_PROTOCOL);
4e0fcd85
WD
744 }
745}
746
eb598fac 747static void do_server_sender(int f_in, int f_out, int argc, char *argv[])
c627d613 748{
7a6421fa
AT
749 struct file_list *flist;
750 char *dir = argv[0];
c627d613 751
951e826b 752 if (DEBUG_GTE(SEND, 1)) {
45e08edb
WD
753 rprintf(FINFO, "server_sender starting pid=%ld\n",
754 (long)getpid());
755 }
d9c7edf6 756
2adbcdc7 757 if (am_daemon && lp_write_only(module_id)) {
7a92ded3
WD
758 rprintf(FERROR, "ERROR: module is write only\n");
759 exit_cleanup(RERR_SYNTAX);
760 return;
761 }
47c11975 762 if (am_daemon && lp_read_only(module_id) && remove_source_files) {
bf26aa22 763 rprintf(FERROR,
044ccbaa 764 "ERROR: --remove-%s-files cannot be used with a read-only module\n",
47c11975 765 remove_source_files == 1 ? "source" : "sent");
bf26aa22
WD
766 exit_cleanup(RERR_SYNTAX);
767 return;
768 }
7a92ded3 769
582c1589 770 if (!relative_paths) {
29a89172
WD
771 if (!change_dir(dir, CD_NORMAL)) {
772 rsyserr(FERROR, errno, "change_dir#3 %s failed",
582c1589
WD
773 full_fname(dir));
774 exit_cleanup(RERR_FILESELECT);
775 }
7a6421fa
AT
776 }
777 argc--;
778 argv++;
d9c7edf6 779
e844a4a8 780 if (argc == 0 && (recurse || xfer_dirs || list_only)) {
e1f67417 781 argc = 1;
7a6421fa
AT
782 argv--;
783 argv[0] = ".";
784 }
d9c7edf6 785
7a6421fa 786 flist = send_file_list(f_out,argc,argv);
9decb4d2 787 if (!flist || flist->used == 0)
8d9dc9f9 788 exit_cleanup(0);
8d9dc9f9 789
f3d6d480 790 io_start_buffering_in(f_in);
da3478b2 791
f3d6d480 792 send_files(f_in, f_out);
f1e3656e 793 io_flush(FULL_FLUSH);
33c4b445 794 handle_stats(f_out);
4e0fcd85 795 if (protocol_version >= 24)
bc40a305 796 read_final_goodbye(f_in, f_out);
f1e3656e 797 io_flush(FULL_FLUSH);
7a6421fa 798 exit_cleanup(0);
c627d613
AT
799}
800
801
f3d6d480 802static int do_recv(int f_in, int f_out, char *local_name)
dc5ddbcc 803{
d186eb1a 804 int pid;
84e6d6fd 805 int exit_code = 0;
c70e07d9 806 int error_pipe[2];
dc5ddbcc 807
bb6721dc
WD
808 /* The receiving side mustn't obey this, or an existing symlink that
809 * points to an identical file won't be replaced by the referent. */
01103e18 810 copy_links = copy_dirlinks = copy_unsafe_links = 0;
bb6721dc 811
1e1ca253 812#ifdef SUPPORT_HARD_LINKS
d4d6646a 813 if (preserve_hard_links && !inc_recurse)
da131912 814 match_hard_links(first_flist);
1e1ca253 815#endif
dc5ddbcc 816
c70e07d9 817 if (fd_pair(error_pipe) < 0) {
ab759cd2 818 rsyserr(FERROR, errno, "pipe failed in do_recv");
c8f2f857 819 exit_cleanup(RERR_IPC);
554e0a8d 820 }
d9c7edf6 821
3696674b
WD
822 if (backup_dir) {
823 int ret = make_path(backup_dir_buf, MKP_DROP_NAME); /* drops trailing slash */
824 if (ret < 0)
825 exit_cleanup(RERR_SYNTAX);
826 if (ret)
827 rprintf(FINFO, "Created backup_dir %s\n", backup_dir_buf);
828 else if (INFO_GTE(BACKUP, 1)) {
829 char *dir = *backup_dir_buf ? backup_dir_buf : ".";
830 rprintf(FINFO, "backup_dir is %s\n", dir);
831 }
832 }
833
f1e3656e 834 io_flush(NORMAL_FLUSH);
c6e7fcb4 835
ba449e44 836 if ((pid = do_fork()) == -1) {
c8f2f857 837 rsyserr(FERROR, errno, "fork failed in do_recv");
ba449e44
WD
838 exit_cleanup(RERR_IPC);
839 }
840
841 if (pid == 0) {
554e0a8d 842 close(error_pipe[0]);
3a69fad0
WD
843 if (f_in != f_out)
844 close(f_out);
e08c9610 845
554e0a8d 846 /* we can't let two processes write to the socket at one time */
f3d6d480 847 io_end_multiplex_out();
554e0a8d
AT
848
849 /* set place to send errors */
f1e3656e 850 set_msg_fd_out(error_pipe[1]);
f3d6d480 851 io_start_buffering_out(error_pipe[1]);
554e0a8d 852
f3d6d480 853 recv_files(f_in, local_name);
f1e3656e 854 io_flush(FULL_FLUSH);
33c4b445 855 handle_stats(f_in);
e08c9610 856
951e826b
WD
857 if (output_needs_newline) {
858 fputc('\n', stdout);
859 output_needs_newline = 0;
860 }
861
332cf6df 862 send_msg(MSG_DONE, "", 1, 0);
a72ba0cf 863 write_varlong(error_pipe[1], stats.total_read, 3);
f1e3656e 864 io_flush(FULL_FLUSH);
4e0fcd85 865
40df65fd
WD
866 /* Handle any keep-alive packets from the post-processing work
867 * that the generator does. */
4e0fcd85 868 if (protocol_version >= 29) {
051182cb 869 kluge_around_eof = -1;
1a8e5c97
WD
870
871 /* This should only get stopped via a USR2 signal. */
bc40a305 872 read_final_goodbye(f_in, f_out);
1a8e5c97 873
3485ae83
WD
874 rprintf(FERROR, "Invalid packet at end of run [%s]\n",
875 who_am_i());
1a8e5c97 876 exit_cleanup(RERR_PROTOCOL);
4e0fcd85
WD
877 }
878
9e0582f9
WD
879 /* Finally, we go to sleep until our parent kills us with a
880 * USR2 signal. We sleep for a short time, as on some OSes
881 * a signal won't interrupt a sleep! */
f1e3656e
WD
882 while (1)
883 msleep(20);
d186eb1a 884 }
dc5ddbcc 885
b695f242 886 am_generator = 1;
f3d6d480
WD
887
888 io_end_multiplex_in();
e8a96e27 889 if (write_batch && !am_server)
b9f592fb 890 stop_write_batch();
b695f242 891
554e0a8d 892 close(error_pipe[1]);
3a69fad0
WD
893 if (f_in != f_out)
894 close(f_in);
e1b3d5c4 895
f3d6d480 896 io_start_buffering_out(f_out);
b3e10ed7 897
f1e3656e 898 set_msg_fd_in(error_pipe[0]);
f3d6d480 899 io_start_buffering_in(error_pipe[0]);
554e0a8d 900
da131912
WD
901#ifdef SUPPORT_HARD_LINKS
902 if (preserve_hard_links && inc_recurse) {
903 struct file_list *flist;
904 for (flist = first_flist; flist; flist = flist->next)
905 match_hard_links(flist);
906 }
907#endif
908
f3d6d480 909 generate_files(f_out, local_name);
8d9dc9f9 910
33c4b445 911 handle_stats(-1);
f1e3656e 912 io_flush(FULL_FLUSH);
d04e9c51 913 if (protocol_version >= 24) {
8ada7518 914 /* send a final goodbye message */
9ae7a2cd 915 write_ndx(f_out, NDX_DONE);
8ada7518 916 }
f1e3656e 917 io_flush(FULL_FLUSH);
8ada7518 918
f1e3656e 919 set_msg_fd_in(-1);
089a2435 920 kill(pid, SIGUSR2);
84e6d6fd
WD
921 wait_process_with_flush(pid, &exit_code);
922 return exit_code;
dc5ddbcc
AT
923}
924
f3d6d480 925static void do_server_recv(int f_in, int f_out, int argc, char *argv[])
c627d613 926{
84e6d6fd 927 int exit_code;
7a6421fa 928 struct file_list *flist;
6c2e5b56 929 char *local_name = NULL;
951e826b 930 int negated_levels;
07bff66f 931
eabc85ef 932 if (filesfrom_fd >= 0 && !msgs2stderr) {
07bff66f 933 /* We can't mix messages with files-from data on the socket,
951e826b
WD
934 * so temporarily turn off info/debug messages. */
935 negate_output_levels();
936 negated_levels = 1;
937 } else
938 negated_levels = 0;
f0fca04e 939
951e826b 940 if (DEBUG_GTE(RECV, 1)) {
45e08edb
WD
941 rprintf(FINFO, "server_recv(%d) starting pid=%ld\n",
942 argc, (long)getpid());
943 }
09b7f5db 944
2adbcdc7 945 if (am_daemon && lp_read_only(module_id)) {
09b7f5db
AT
946 rprintf(FERROR,"ERROR: module is read only\n");
947 exit_cleanup(RERR_SYNTAX);
948 return;
949 }
950
7a6421fa 951 if (argc > 0) {
a1018691 952 char *dir = argv[0];
7a6421fa
AT
953 argc--;
954 argv++;
29a89172
WD
955 if (!am_daemon && !change_dir(dir, CD_NORMAL)) {
956 rsyserr(FERROR, errno, "change_dir#4 %s failed",
982e05bb 957 full_fname(dir));
65417579 958 exit_cleanup(RERR_FILESELECT);
d9c7edf6 959 }
7a6421fa 960 }
c627d613 961
f3d6d480
WD
962 if (protocol_version >= 30)
963 io_start_multiplex_in();
964 else
965 io_start_buffering_in(f_in);
57dee64e 966 recv_filter_list(f_in);
c627d613 967
7c2a9e76 968 if (filesfrom_fd >= 0) {
07bff66f
WD
969 /* We need to send the files-from names to the sender at the
970 * same time that we receive the file-list from them, so we
971 * need the IO routines to automatically write out the names
972 * onto our f_out socket as we read the file-list. This
973 * avoids both deadlock and extra delays/buffers. */
7c2a9e76
WD
974 io_set_filesfrom_fds(filesfrom_fd, f_out);
975 filesfrom_fd = -1;
976 }
977
b9f592fb 978 flist = recv_file_list(f_in);
4c36a13e
AT
979 if (!flist) {
980 rprintf(FERROR,"server_recv: recv_file_list error\n");
65417579 981 exit_cleanup(RERR_FILESELECT);
7a6421fa 982 }
3ea6e0e7 983 if (inc_recurse && file_total == 1)
f3d6d480 984 recv_additional_file_list(f_in);
951e826b
WD
985
986 if (negated_levels)
987 negate_output_levels();
d9c7edf6 988
29fad7a3 989 if (argc > 0)
7a6421fa 990 local_name = get_local_name(flist,argv[0]);
c627d613 991
7c58c991
WD
992 /* Now that we know what our destination directory turned out to be,
993 * we can sanitize the --link-/copy-/compare-dest args correctly. */
994 if (sanitize_paths) {
ce27f36d
WD
995 char **dir_p;
996 for (dir_p = basis_dir; *dir_p; dir_p++)
d48810ba 997 *dir_p = sanitize_path(NULL, *dir_p, NULL, curr_dir_depth, SP_DEFAULT);
ce27f36d 998 if (partial_dir)
d48810ba 999 partial_dir = sanitize_path(NULL, partial_dir, NULL, curr_dir_depth, SP_DEFAULT);
c2c8db91 1000 }
ce27f36d 1001 check_alt_basis_dirs();
615a5415 1002
819bfe45 1003 if (daemon_filter_list.head) {
a1018691 1004 char **dir_p;
819bfe45 1005 struct filter_list_struct *elp = &daemon_filter_list;
c2c8db91 1006
a1018691
WD
1007 for (dir_p = basis_dir; *dir_p; dir_p++) {
1008 char *dir = *dir_p;
1009 if (*dir == '/')
1010 dir += module_dirlen;
1df02d13 1011 if (check_filter(elp, FLOG, dir, 1) < 0)
c2c8db91
WD
1012 goto options_rejected;
1013 }
1014 if (partial_dir && *partial_dir == '/'
1df02d13 1015 && check_filter(elp, FLOG, partial_dir + module_dirlen, 1) < 0) {
c2c8db91
WD
1016 options_rejected:
1017 rprintf(FERROR,
1018 "Your options have been rejected by the server.\n");
1019 exit_cleanup(RERR_SYNTAX);
1020 }
7c58c991
WD
1021 }
1022
f3d6d480 1023 exit_code = do_recv(f_in, f_out, local_name);
84e6d6fd 1024 exit_cleanup(exit_code);
c627d613
AT
1025}
1026
1027
734a94a2 1028int child_main(int argc, char *argv[])
25d34a5c
MP
1029{
1030 start_server(STDIN_FILENO, STDOUT_FILENO, argc, argv);
734a94a2 1031 return 0;
25d34a5c
MP
1032}
1033
1034
9486289c 1035void start_server(int f_in, int f_out, int argc, char *argv[])
366345fe 1036{
f0359dd0
AT
1037 set_nonblocking(f_in);
1038 set_nonblocking(f_out);
1039
da3478b2
WD
1040 io_set_sock_fds(f_in, f_out);
1041 setup_protocol(f_out, f_in);
1042
d04e9c51 1043 if (protocol_version >= 23)
da3478b2 1044 io_start_multiplex_out();
7a6421fa 1045
7a6421fa 1046 if (am_sender) {
83926d3c 1047 keep_dirlinks = 0; /* Must be disabled on the sender. */
bf26aa22
WD
1048 if (need_messages_from_generator)
1049 io_start_multiplex_in();
7842418b 1050 recv_filter_list(f_in);
7a6421fa 1051 do_server_sender(f_in, f_out, argc, argv);
07613def 1052 } else
7a6421fa 1053 do_server_recv(f_in, f_out, argc, argv);
7a6421fa 1054 exit_cleanup(0);
366345fe
AT
1055}
1056
0ba48136
MP
1057
1058/*
1059 * This is called once the connection has been negotiated. It is used
1060 * for rsyncd, remote-shell, and local connections.
1061 */
19b27a48 1062int client_run(int f_in, int f_out, pid_t pid, int argc, char *argv[])
9486289c 1063{
088aac85 1064 struct file_list *flist = NULL;
84e6d6fd 1065 int exit_code = 0, exit_code2 = 0;
9486289c 1066 char *local_name = NULL;
19b27a48
AT
1067
1068 cleanup_child_pid = pid;
67a28eb2 1069 if (!read_batch) {
b9f592fb
WD
1070 set_nonblocking(f_in);
1071 set_nonblocking(f_out);
1072 }
f0359dd0 1073
da3478b2 1074 io_set_sock_fds(f_in, f_out);
6d7b6081
AT
1075 setup_protocol(f_out,f_in);
1076
18882701
WD
1077 /* We set our stderr file handle to blocking because ssh might have
1078 * set it to non-blocking. This can be particularly troublesome if
1079 * stderr is a clone of stdout, because ssh would have set our stdout
1080 * to non-blocking at the same time (which can easily cause us to lose
1081 * output from our print statements). This kluge shouldn't cause ssh
1082 * any problems for how we use it. Note also that we delayed setting
1083 * this until after the above protocol setup so that we know for sure
1084 * that ssh is done twiddling its file descriptors. */
1085 set_blocking(STDERR_FILENO);
1086
9486289c 1087 if (am_sender) {
83926d3c 1088 keep_dirlinks = 0; /* Must be disabled on the sender. */
886df221
WD
1089
1090 if (always_checksum
1091 && (log_format_has(stdout_format, 'C')
1092 || log_format_has(logfile_format, 'C')))
1093 sender_keeps_checksum = 1;
1094
f3d6d480
WD
1095 if (protocol_version >= 30)
1096 io_start_multiplex_out();
1097 else
1098 io_start_buffering_out(f_out);
860236bf 1099 if (!filesfrom_host)
a0a33ee5 1100 set_msg_fd_in(f_in);
57dee64e 1101 send_filter_list(f_out);
860236bf 1102 if (filesfrom_host)
7c2a9e76 1103 filesfrom_fd = f_in;
b9f592fb 1104
e8a96e27 1105 if (write_batch && !am_server)
b9f592fb 1106 start_write_batch(f_out);
a00628b3 1107 flist = send_file_list(f_out, argc, argv);
951e826b 1108 if (DEBUG_GTE(FLIST, 3))
9486289c 1109 rprintf(FINFO,"file list sent\n");
f3d6d480
WD
1110
1111 if (protocol_version >= 23)
1112 io_start_multiplex_in();
e1b3d5c4 1113
f1e3656e 1114 io_flush(NORMAL_FLUSH);
f3d6d480 1115 send_files(f_in, f_out);
f1e3656e 1116 io_flush(FULL_FLUSH);
33c4b445 1117 handle_stats(-1);
4e0fcd85 1118 if (protocol_version >= 24)
bc40a305 1119 read_final_goodbye(f_in, f_out);
9486289c 1120 if (pid != -1) {
951e826b 1121 if (DEBUG_GTE(EXIT, 2))
08a740ff 1122 rprintf(FINFO,"client_run waiting on %d\n", (int) pid);
f1e3656e 1123 io_flush(FULL_FLUSH);
84e6d6fd 1124 wait_process_with_flush(pid, &exit_code);
9486289c 1125 }
33c4b445 1126 output_summary();
c87ae64a 1127 io_flush(FULL_FLUSH);
84e6d6fd 1128 exit_cleanup(exit_code);
9486289c 1129 }
f7632fc6 1130
f3d6d480
WD
1131 if (!read_batch) {
1132 if (protocol_version >= 23)
1133 io_start_multiplex_in();
1134 if (need_messages_from_generator)
1135 io_start_multiplex_out();
1136 }
bf26aa22 1137
57dee64e 1138 send_filter_list(read_batch ? -1 : f_out);
d9c7edf6 1139
7c2a9e76
WD
1140 if (filesfrom_fd >= 0) {
1141 io_set_filesfrom_fds(filesfrom_fd, f_out);
1142 filesfrom_fd = -1;
1143 }
1144
e8a96e27 1145 if (write_batch && !am_server)
b9f592fb 1146 start_write_batch(f_in);
9486289c 1147 flist = recv_file_list(f_in);
3ea6e0e7 1148 if (inc_recurse && file_total == 1)
f3d6d480 1149 recv_additional_file_list(f_in);
d9c7edf6 1150
9decb4d2 1151 if (flist && flist->used > 0) {
9d19f8a5 1152 local_name = get_local_name(flist, argv[0]);
d9c7edf6 1153
ce27f36d 1154 check_alt_basis_dirs();
615a5415 1155
f3d6d480 1156 exit_code2 = do_recv(f_in, f_out, local_name);
9d19f8a5
WD
1157 } else {
1158 handle_stats(-1);
1159 output_summary();
1160 }
d9c7edf6 1161
9486289c 1162 if (pid != -1) {
951e826b 1163 if (DEBUG_GTE(RECV, 1))
08a740ff 1164 rprintf(FINFO,"client_run2 waiting on %d\n", (int) pid);
f1e3656e 1165 io_flush(FULL_FLUSH);
84e6d6fd 1166 wait_process_with_flush(pid, &exit_code);
9486289c 1167 }
d9c7edf6 1168
84e6d6fd 1169 return MAX(exit_code, exit_code2);
9486289c
AT
1170}
1171
07613def 1172static int copy_argv(char *argv[])
7169bb4a
MP
1173{
1174 int i;
1175
1176 for (i = 0; argv[i]; i++) {
1177 if (!(argv[i] = strdup(argv[i]))) {
1178 rprintf (FERROR, "out of memory at %s(%d)\n",
1179 __FILE__, __LINE__);
1180 return RERR_MALLOC;
1181 }
1182 }
1183
1184 return 0;
1185}
1186
1187
c1a04ecb 1188/**
0ba48136
MP
1189 * Start a client for either type of remote connection. Work out
1190 * whether the arguments request a remote shell or rsyncd connection,
1191 * and call the appropriate connection function, then run_client.
0b4af330
MP
1192 *
1193 * Calls either start_socket_client (for sockets) or do_cmd and
1194 * client_run (for ssh).
c1a04ecb 1195 **/
fc8a6b97 1196static int start_client(int argc, char *argv[])
5d6bcd44 1197{
f7e5068d
WD
1198 char *p, *shell_machine = NULL, *shell_user = NULL;
1199 char **remote_argv;
1200 int remote_argc;
1201 int f_in, f_out;
19b27a48
AT
1202 int ret;
1203 pid_t pid;
7169bb4a
MP
1204
1205 /* Don't clobber argv[] so that ps(1) can still show the right
d9c7edf6 1206 * command line. */
f7e5068d
WD
1207 if ((ret = copy_argv(argv)) != 0)
1208 return ret;
5d6bcd44 1209
d16c245f 1210 if (!read_batch) { /* for read_batch, NO source is specified */
f7e5068d
WD
1211 char *path = check_for_hostspec(argv[0], &shell_machine, &rsync_port);
1212 if (path) { /* source is remote */
a960239f
WD
1213 char *dummy_host;
1214 int dummy_port = 0;
f7e5068d
WD
1215 *argv = path;
1216 remote_argv = argv;
1217 remote_argc = argc;
1218 argv += argc - 1;
1219 if (argc == 1 || **argv == ':')
1220 argc = 0; /* no dest arg */
a960239f 1221 else if (check_for_hostspec(*argv, &dummy_host, &dummy_port)) {
9425918d
WD
1222 rprintf(FERROR,
1223 "The source and destination cannot both be remote.\n");
1224 exit_cleanup(RERR_SYNTAX);
f7e5068d
WD
1225 } else {
1226 remote_argc--; /* don't count dest */
1227 argc = 1;
9425918d 1228 }
860236bf
WD
1229 if (filesfrom_host && *filesfrom_host
1230 && strcmp(filesfrom_host, shell_machine) != 0) {
7c2a9e76 1231 rprintf(FERROR,
50b31539 1232 "--files-from hostname is not the same as the transfer hostname\n");
7c2a9e76
WD
1233 exit_cleanup(RERR_SYNTAX);
1234 }
42ccb4c0 1235 am_sender = 0;
e208631a
WD
1236 if (rsync_port)
1237 daemon_over_rsh = shell_cmd ? 1 : -1;
42ccb4c0
WD
1238 } else { /* source is local, check dest arg */
1239 am_sender = 1;
1240
f7e5068d 1241 if (argc > 1) {
ee8e2b15 1242 p = argv[--argc];
f7e5068d
WD
1243 remote_argv = argv + argc;
1244 } else {
1245 static char *dotarg[1] = { "." };
1246 p = dotarg[0];
1247 remote_argv = dotarg;
d9c7edf6 1248 }
f7e5068d 1249 remote_argc = 1;
a125c82a 1250
f7e5068d
WD
1251 path = check_for_hostspec(p, &shell_machine, &rsync_port);
1252 if (path && filesfrom_host && *filesfrom_host
860236bf 1253 && strcmp(filesfrom_host, shell_machine) != 0) {
7c2a9e76 1254 rprintf(FERROR,
50b31539 1255 "--files-from hostname is not the same as the transfer hostname\n");
7c2a9e76
WD
1256 exit_cleanup(RERR_SYNTAX);
1257 }
f7e5068d 1258 if (!path) { /* no hostspec found, so src & dest are local */
d9c7edf6 1259 local_server = 1;
860236bf 1260 if (filesfrom_host) {
7c2a9e76 1261 rprintf(FERROR,
50b31539 1262 "--files-from cannot be remote when the transfer is local\n");
7c2a9e76
WD
1263 exit_cleanup(RERR_SYNTAX);
1264 }
860236bf 1265 shell_machine = NULL;
f7e5068d
WD
1266 } else { /* hostspec was found, so dest is remote */
1267 argv[argc] = path;
1268 if (rsync_port)
1269 daemon_over_rsh = shell_cmd ? 1 : -1;
1270 }
5d6bcd44 1271 }
d16c245f 1272 } else { /* read_batch */
d9c7edf6 1273 local_server = 1;
f7e5068d 1274 if (check_for_hostspec(argv[argc-1], &shell_machine, &rsync_port)) {
b9f592fb
WD
1275 rprintf(FERROR, "remote destination is not allowed with --read-batch\n");
1276 exit_cleanup(RERR_SYNTAX);
1277 }
0a23e336
WD
1278 remote_argv = argv += argc - 1;
1279 remote_argc = argc = 1;
6902ed17
MP
1280 }
1281
f7e5068d 1282 if (am_sender) {
a960239f
WD
1283 char *dummy_host;
1284 int dummy_port = rsync_port;
f7e5068d
WD
1285 int i;
1286 /* For local source, extra source args must not have hostspec. */
1287 for (i = 1; i < argc; i++) {
a960239f 1288 if (check_for_hostspec(argv[i], &dummy_host, &dummy_port)) {
f7e5068d
WD
1289 rprintf(FERROR, "Unexpected remote arg: %s\n", argv[i]);
1290 exit_cleanup(RERR_SYNTAX);
1291 }
1292 }
1293 } else {
a960239f
WD
1294 char *dummy_host;
1295 int dummy_port = rsync_port;
f7e5068d 1296 int i;
a960239f
WD
1297 /* For remote source, any extra source args must have either
1298 * the same hostname or an empty hostname. */
f7e5068d 1299 for (i = 1; i < remote_argc; i++) {
a960239f
WD
1300 char *arg = check_for_hostspec(remote_argv[i], &dummy_host, &dummy_port);
1301 if (!arg) {
f7e5068d
WD
1302 rprintf(FERROR, "Unexpected local arg: %s\n", remote_argv[i]);
1303 rprintf(FERROR, "If arg is a remote file/dir, prefix it with a colon (:).\n");
1304 exit_cleanup(RERR_SYNTAX);
1305 }
a960239f
WD
1306 if (*dummy_host && strcmp(dummy_host, shell_machine) != 0) {
1307 rprintf(FERROR, "All source args must come from the same machine.\n");
1308 exit_cleanup(RERR_SYNTAX);
1309 }
1310 if (rsync_port != dummy_port) {
1311 if (!rsync_port || !dummy_port)
1312 rprintf(FERROR, "All source args must use the same hostspec format.\n");
1313 else
1314 rprintf(FERROR, "All source args must use the same port number.\n");
1315 exit_cleanup(RERR_SYNTAX);
1316 }
1317 remote_argv[i] = arg;
f7e5068d 1318 }
e208631a
WD
1319 }
1320
1321 if (daemon_over_rsh < 0)
f7e5068d 1322 return start_socket_client(shell_machine, remote_argc, remote_argv, argc, argv);
e208631a 1323
a39da29a 1324 if (password_file && !daemon_over_rsh) {
327c559a
WD
1325 rprintf(FERROR, "The --password-file option may only be "
1326 "used when accessing an rsync daemon.\n");
a39da29a
WD
1327 exit_cleanup(RERR_SYNTAX);
1328 }
1329
ba22c9e2
WD
1330 if (connect_timeout) {
1331 rprintf(FERROR, "The --contimeout option may only be "
1332 "used when connecting to an rsync daemon.\n");
1333 exit_cleanup(RERR_SYNTAX);
1334 }
1335
5d6bcd44 1336 if (shell_machine) {
6fc048f4 1337 p = strrchr(shell_machine,'@');
5d6bcd44
AT
1338 if (p) {
1339 *p = 0;
1340 shell_user = shell_machine;
1341 shell_machine = p+1;
1342 }
1343 }
1344
951e826b 1345 if (DEBUG_GTE(CMD, 2)) {
9486289c 1346 rprintf(FINFO,"cmd=%s machine=%s user=%s path=%s\n",
f7e5068d
WD
1347 NS(shell_cmd), NS(shell_machine), NS(shell_user),
1348 remote_argv ? NS(remote_argv[0]) : "");
5d6bcd44 1349 }
d9c7edf6 1350
f7e5068d
WD
1351 pid = do_cmd(shell_cmd, shell_machine, shell_user, remote_argv, remote_argc,
1352 &f_in, &f_out);
75aeac44
WD
1353
1354 /* if we're running an rsync server on the remote host over a
9af87151 1355 * remote shell command, we need to do the RSYNCD protocol first */
75aeac44
WD
1356 if (daemon_over_rsh) {
1357 int tmpret;
f7e5068d 1358 tmpret = start_inband_exchange(f_in, f_out, shell_user, remote_argc, remote_argv);
75aeac44
WD
1359 if (tmpret < 0)
1360 return tmpret;
1361 }
1362
fc8a6b97
AT
1363 ret = client_run(f_in, f_out, pid, argc, argv);
1364
1365 fflush(stdout);
1366 fflush(stderr);
1367
1368 return ret;
5d6bcd44
AT
1369}
1370
366345fe 1371
067669da
WD
1372static RETSIGTYPE sigusr1_handler(UNUSED(int val))
1373{
6bf32edb 1374 exit_cleanup(RERR_SIGNAL1);
82306bf6
AT
1375}
1376
067669da
WD
1377static RETSIGTYPE sigusr2_handler(UNUSED(int val))
1378{
33c4b445
WD
1379 if (!am_server)
1380 output_summary();
40df65fd 1381 close_all();
3f0211b6 1382 if (got_xfer_error)
33c4b445 1383 _exit(RERR_PARTIAL);
8b35435f
AT
1384 _exit(0);
1385}
1386
6d59ac19 1387RETSIGTYPE remember_children(UNUSED(int val))
067669da 1388{
029c1713 1389#ifdef WNOHANG
ee7118a8
DD
1390 int cnt, status;
1391 pid_t pid;
1392 /* An empty waitpid() loop was put here by Tridge and we could never
d9c7edf6 1393 * get him to explain why he put it in, so rather than taking it
ee7118a8
DD
1394 * out we're instead saving the child exit statuses for later use.
1395 * The waitpid() loop presumably eliminates all possibility of leaving
97d8e709 1396 * zombie children, maybe that's why he did it. */
ee7118a8 1397 while ((pid = waitpid(-1, &status, WNOHANG)) > 0) {
9af87151
WD
1398 /* save the child's exit status */
1399 for (cnt = 0; cnt < MAXCHILDPROCS; cnt++) {
1400 if (pid_stat_table[cnt].pid == 0) {
1401 pid_stat_table[cnt].pid = pid;
1402 pid_stat_table[cnt].status = status;
1403 break;
1404 }
1405 }
ee7118a8 1406 }
029c1713 1407#endif
8261af74 1408#ifndef HAVE_SIGACTION
6d59ac19 1409 signal(SIGCHLD, remember_children);
60ee01f5 1410#endif
19b27a48
AT
1411}
1412
c0531332
MP
1413
1414/**
1415 * This routine catches signals and tries to send them to gdb.
1416 *
1417 * Because it's called from inside a signal handler it ought not to
1418 * use too many library routines.
1419 *
1420 * @todo Perhaps use "screen -X" instead/as well, to help people
1421 * debugging without easy access to X. Perhaps use an environment
1422 * variable, or just call a script?
1423 *
1424 * @todo The /proc/ magic probably only works on Linux (and
1425 * Solaris?) Can we be more portable?
1426 **/
1427#ifdef MAINTAINER_MODE
4fdc39dd
MP
1428const char *get_panic_action(void)
1429{
1430 const char *cmd_fmt = getenv("RSYNC_PANIC_ACTION");
1431
1432 if (cmd_fmt)
1433 return cmd_fmt;
1434 else
1435 return "xterm -display :0 -T Panic -n Panic "
1436 "-e gdb /proc/%d/exe %d";
1437}
1438
1439
9fb3f7a9
MP
1440/**
1441 * Handle a fatal signal by launching a debugger, controlled by $RSYNC_PANIC_ACTION.
1442 *
1443 * This signal handler is only installed if we were configured with
1444 * --enable-maintainer-mode. Perhaps it should always be on and we
1445 * should just look at the environment variable, but I'm a bit leery
1446 * of a signal sending us into a busy loop.
1447 **/
067669da 1448static RETSIGTYPE rsync_panic_handler(UNUSED(int whatsig))
c0531332
MP
1449{
1450 char cmd_buf[300];
1451 int ret;
4fdc39dd 1452
83078af5
WD
1453 snprintf(cmd_buf, sizeof cmd_buf, get_panic_action(),
1454 getpid(), getpid());
c0531332
MP
1455
1456 /* Unless we failed to execute gdb, we allow the process to
1457 * continue. I'm not sure if that's right. */
1458 ret = system(cmd_buf);
1459 if (ret)
1460 _exit(ret);
1461}
1462#endif
1463
1464
5d6bcd44 1465int main(int argc,char *argv[])
d9c7edf6 1466{
ff81e809 1467 int ret;
66a9dc96
WD
1468 int orig_argc = argc;
1469 char **orig_argv = argv;
8261af74
WD
1470#ifdef HAVE_SIGACTION
1471# ifdef HAVE_SIGPROCMASK
60ee01f5 1472 sigset_t sigmask;
5d6bcd44 1473
60ee01f5 1474 sigemptyset(&sigmask);
8261af74 1475# endif
60ee01f5
WD
1476 sigact.sa_flags = SA_NOCLDSTOP;
1477#endif
1478 SIGACTMASK(SIGUSR1, sigusr1_handler);
1479 SIGACTMASK(SIGUSR2, sigusr2_handler);
6d59ac19 1480 SIGACTMASK(SIGCHLD, remember_children);
c0531332 1481#ifdef MAINTAINER_MODE
60ee01f5
WD
1482 SIGACTMASK(SIGSEGV, rsync_panic_handler);
1483 SIGACTMASK(SIGFPE, rsync_panic_handler);
1484 SIGACTMASK(SIGABRT, rsync_panic_handler);
1485 SIGACTMASK(SIGBUS, rsync_panic_handler);
1486#endif
5d6bcd44 1487
7a6421fa 1488 starttime = time(NULL);
19284e2e
WD
1489 our_uid = MY_UID();
1490 am_root = our_uid == 0;
c627d613 1491
a800434a
AT
1492 memset(&stats, 0, sizeof(stats));
1493
df5e03da
AT
1494 if (argc < 2) {
1495 usage(FERROR);
65417579 1496 exit_cleanup(RERR_SYNTAX);
df5e03da
AT
1497 }
1498
7a6421fa 1499 /* we set a 0 umask so that correct file permissions can be
9af87151 1500 * carried across */
05278935 1501 orig_umask = umask(0);
5d6bcd44 1502
eb598fac
WD
1503#if defined CONFIG_LOCALE && defined HAVE_SETLOCALE
1504 setlocale(LC_CTYPE, "");
1505#endif
1506
53936ef9 1507 if (!parse_arguments(&argc, (const char ***) &argv)) {
d9c7edf6
WD
1508 /* FIXME: We ought to call the same error-handling
1509 * code here, rather than relying on getopt. */
50135767 1510 option_error();
65417579 1511 exit_cleanup(RERR_SYNTAX);
b11ed3b1 1512 }
5d6bcd44 1513
60ee01f5
WD
1514 SIGACTMASK(SIGINT, sig_int);
1515 SIGACTMASK(SIGHUP, sig_int);
1516 SIGACTMASK(SIGTERM, sig_int);
1517#if defined HAVE_SIGACTION && HAVE_SIGPROCMASK
1518 sigprocmask(SIG_UNBLOCK, &sigmask, NULL);
1519#endif
6b83141d 1520
34758d5c
MP
1521 /* Ignore SIGPIPE; we consistently check error codes and will
1522 * see the EPIPE. */
60ee01f5 1523 SIGACTION(SIGPIPE, SIG_IGN);
55e54e46
WD
1524#ifdef SIGXFSZ
1525 SIGACTION(SIGXFSZ, SIG_IGN);
1526#endif
34758d5c 1527
29a89172 1528 /* Initialize change_dir() here because on some old systems getcwd
9af87151
WD
1529 * (implemented by forking "pwd" and reading its output) doesn't
1530 * work when there are other child processes. Also, on all systems
1531 * that implement getcwd that way "pwd" can't be found after chroot. */
29a89172 1532 change_dir(NULL, CD_NORMAL);
c226b7c2 1533
44e9e221
WD
1534 init_flist();
1535
e8a96e27 1536 if ((write_batch || read_batch) && !am_server) {
b9f592fb 1537 if (write_batch)
66a9dc96 1538 write_batch_shell_file(orig_argc, orig_argv, argc);
b9f592fb 1539
dbbab0c4
WD
1540 if (read_batch && strcmp(batch_name, "-") == 0)
1541 batch_fd = STDIN_FILENO;
1542 else {
1543 batch_fd = do_open(batch_name,
b9f592fb
WD
1544 write_batch ? O_WRONLY | O_CREAT | O_TRUNC
1545 : O_RDONLY, S_IRUSR | S_IWUSR);
dbbab0c4 1546 }
b9f592fb
WD
1547 if (batch_fd < 0) {
1548 rsyserr(FERROR, errno, "Batch file %s open error",
71903f60 1549 full_fname(batch_name));
b9f592fb
WD
1550 exit_cleanup(RERR_FILEIO);
1551 }
9459290a
WD
1552 if (read_batch)
1553 read_stream_flags(batch_fd);
e10664c5
WD
1554 else
1555 write_stream_flags(batch_fd);
6902ed17 1556 }
e8a96e27
WD
1557 if (write_batch < 0)
1558 dry_run = 1;
6902ed17 1559
44c4492a
WD
1560 if (am_server) {
1561#ifdef ICONV_CONST
b61665d5 1562 setup_iconv();
44c4492a
WD
1563#endif
1564 } else if (am_daemon)
7a6421fa 1565 return daemon_main();
f0fca04e 1566
f7e5068d
WD
1567 if (am_server && protect_args) {
1568 char buf[MAXPATHLEN];
71605b0f 1569 protect_args = 2;
f7e5068d 1570 read_args(STDIN_FILENO, NULL, buf, sizeof buf, 1, &argv, &argc, NULL);
53936ef9 1571 if (!parse_arguments(&argc, (const char ***) &argv)) {
f7e5068d
WD
1572 option_error();
1573 exit_cleanup(RERR_SYNTAX);
1574 }
1575 }
1576
08ac228f
AT
1577 if (argc < 1) {
1578 usage(FERROR);
65417579 1579 exit_cleanup(RERR_SYNTAX);
08ac228f
AT
1580 }
1581
7a6421fa 1582 if (am_server) {
f0359dd0
AT
1583 set_nonblocking(STDIN_FILENO);
1584 set_nonblocking(STDOUT_FILENO);
75aeac44
WD
1585 if (am_daemon)
1586 return start_daemon(STDIN_FILENO, STDOUT_FILENO);
7a6421fa
AT
1587 start_server(STDIN_FILENO, STDOUT_FILENO, argc, argv);
1588 }
c627d613 1589
ff81e809 1590 ret = start_client(argc, argv);
d9c7edf6 1591 if (ret == -1)
9098bbf3 1592 exit_cleanup(RERR_STARTCLIENT);
088aac85 1593 else
9098bbf3
MP
1594 exit_cleanup(ret);
1595
0f5a04e3 1596 return ret;
c627d613 1597}