blob: 5d8ea7f3fe67f958d4d7c8215965355fb44e0307 [file] [log] [blame]
danielk197704103022009-02-03 16:51:24 +00001/*
2** 2009 January 28
3**
4** The author disclaims copyright to this source code. In place of
5** a legal notice, here is a blessing:
6**
7** May you do good and not evil.
8** May you find forgiveness for yourself and forgive others.
9** May you share freely, never taking more than you give.
10**
11*************************************************************************
12** This file contains the implementation of the sqlite3_backup_XXX()
13** API functions and the related features.
danielk197704103022009-02-03 16:51:24 +000014*/
15#include "sqliteInt.h"
16#include "btreeInt.h"
17
18/* Macro to find the minimum of two numeric values.
19*/
20#ifndef MIN
21# define MIN(x,y) ((x)<(y)?(x):(y))
22#endif
23
24/*
25** Structure allocated for each backup operation.
26*/
27struct sqlite3_backup {
28 sqlite3* pDestDb; /* Destination database handle */
29 Btree *pDest; /* Destination b-tree file */
30 u32 iDestSchema; /* Original schema cookie in destination */
31 int bDestLocked; /* True once a write-transaction is open on pDest */
32
33 Pgno iNext; /* Page number of the next source page to copy */
34 sqlite3* pSrcDb; /* Source database handle */
35 Btree *pSrc; /* Source b-tree file */
36
37 int rc; /* Backup process error code */
38
39 /* These two variables are set by every call to backup_step(). They are
40 ** read by calls to backup_remaining() and backup_pagecount().
41 */
42 Pgno nRemaining; /* Number of pages left to copy */
43 Pgno nPagecount; /* Total number of pages to copy */
44
danielk1977e70f4f62009-05-13 07:52:06 +000045 int isAttached; /* True once backup has been registered with pager */
danielk197704103022009-02-03 16:51:24 +000046 sqlite3_backup *pNext; /* Next backup associated with source pager */
47};
48
49/*
50** THREAD SAFETY NOTES:
51**
52** Once it has been created using backup_init(), a single sqlite3_backup
53** structure may be accessed via two groups of thread-safe entry points:
54**
55** * Via the sqlite3_backup_XXX() API function backup_step() and
56** backup_finish(). Both these functions obtain the source database
57** handle mutex and the mutex associated with the source BtShared
58** structure, in that order.
59**
60** * Via the BackupUpdate() and BackupRestart() functions, which are
61** invoked by the pager layer to report various state changes in
62** the page cache associated with the source database. The mutex
63** associated with the source database BtShared structure will always
64** be held when either of these functions are invoked.
65**
66** The other sqlite3_backup_XXX() API functions, backup_remaining() and
67** backup_pagecount() are not thread-safe functions. If they are called
68** while some other thread is calling backup_step() or backup_finish(),
69** the values returned may be invalid. There is no way for a call to
70** BackupUpdate() or BackupRestart() to interfere with backup_remaining()
71** or backup_pagecount().
72**
73** Depending on the SQLite configuration, the database handles and/or
74** the Btree objects may have their own mutexes that require locking.
75** Non-sharable Btrees (in-memory databases for example), do not have
76** associated mutexes.
77*/
78
79/*
80** Return a pointer corresponding to database zDb (i.e. "main", "temp")
81** in connection handle pDb. If such a database cannot be found, return
82** a NULL pointer and write an error message to pErrorDb.
83**
84** If the "temp" database is requested, it may need to be opened by this
85** function. If an error occurs while doing so, return 0 and write an
86** error message to pErrorDb.
87*/
88static Btree *findBtree(sqlite3 *pErrorDb, sqlite3 *pDb, const char *zDb){
89 int i = sqlite3FindDbName(pDb, zDb);
90
91 if( i==1 ){
drhe98c9042009-06-02 21:31:38 +000092 Parse *pParse;
93 int rc = 0;
94 pParse = sqlite3StackAllocZero(pErrorDb, sizeof(*pParse));
95 if( pParse==0 ){
96 sqlite3Error(pErrorDb, SQLITE_NOMEM, "out of memory");
97 rc = SQLITE_NOMEM;
98 }else{
99 pParse->db = pDb;
100 if( sqlite3OpenTempDatabase(pParse) ){
drhe98c9042009-06-02 21:31:38 +0000101 sqlite3Error(pErrorDb, pParse->rc, "%s", pParse->zErrMsg);
102 rc = SQLITE_ERROR;
103 }
drha7564662010-02-22 19:32:31 +0000104 sqlite3DbFree(pErrorDb, pParse->zErrMsg);
drhe98c9042009-06-02 21:31:38 +0000105 sqlite3StackFree(pErrorDb, pParse);
106 }
107 if( rc ){
danielk197704103022009-02-03 16:51:24 +0000108 return 0;
109 }
danielk197704103022009-02-03 16:51:24 +0000110 }
111
112 if( i<0 ){
113 sqlite3Error(pErrorDb, SQLITE_ERROR, "unknown database %s", zDb);
114 return 0;
115 }
116
117 return pDb->aDb[i].pBt;
118}
119
120/*
drhca94d8b2011-01-11 17:38:03 +0000121** Attempt to set the page size of the destination to match the page size
122** of the source.
123*/
124static int setDestPgsz(sqlite3_backup *p){
125 int rc;
126 rc = sqlite3BtreeSetPageSize(p->pDest,sqlite3BtreeGetPageSize(p->pSrc),-1,0);
127 return rc;
128}
129
130/*
danielk197704103022009-02-03 16:51:24 +0000131** Create an sqlite3_backup process to copy the contents of zSrcDb from
132** connection handle pSrcDb to zDestDb in pDestDb. If successful, return
133** a pointer to the new sqlite3_backup object.
134**
135** If an error occurs, NULL is returned and an error code and error message
136** stored in database handle pDestDb.
137*/
138sqlite3_backup *sqlite3_backup_init(
139 sqlite3* pDestDb, /* Database to write to */
140 const char *zDestDb, /* Name of database within pDestDb */
141 sqlite3* pSrcDb, /* Database connection to read from */
142 const char *zSrcDb /* Name of database within pSrcDb */
143){
144 sqlite3_backup *p; /* Value to return */
145
146 /* Lock the source database handle. The destination database
drh662c58c2009-02-03 21:13:07 +0000147 ** handle is not locked in this routine, but it is locked in
148 ** sqlite3_backup_step(). The user is required to ensure that no
danielk197704103022009-02-03 16:51:24 +0000149 ** other thread accesses the destination handle for the duration
drh662c58c2009-02-03 21:13:07 +0000150 ** of the backup operation. Any attempt to use the destination
151 ** database connection while a backup is in progress may cause
152 ** a malfunction or a deadlock.
danielk197704103022009-02-03 16:51:24 +0000153 */
154 sqlite3_mutex_enter(pSrcDb->mutex);
drheef1eb02009-02-04 16:56:19 +0000155 sqlite3_mutex_enter(pDestDb->mutex);
danielk197704103022009-02-03 16:51:24 +0000156
157 if( pSrcDb==pDestDb ){
158 sqlite3Error(
drhb309bec2009-02-04 17:40:57 +0000159 pDestDb, SQLITE_ERROR, "source and destination must be distinct"
danielk197704103022009-02-03 16:51:24 +0000160 );
161 p = 0;
162 }else {
drh9f129f42010-08-31 15:27:32 +0000163 /* Allocate space for a new sqlite3_backup object...
164 ** EVIDENCE-OF: R-64852-21591 The sqlite3_backup object is created by a
165 ** call to sqlite3_backup_init() and is destroyed by a call to
166 ** sqlite3_backup_finish(). */
danielk197704103022009-02-03 16:51:24 +0000167 p = (sqlite3_backup *)sqlite3_malloc(sizeof(sqlite3_backup));
168 if( !p ){
169 sqlite3Error(pDestDb, SQLITE_NOMEM, 0);
170 }
171 }
172
173 /* If the allocation succeeded, populate the new object. */
174 if( p ){
175 memset(p, 0, sizeof(sqlite3_backup));
176 p->pSrc = findBtree(pDestDb, pSrcDb, zSrcDb);
177 p->pDest = findBtree(pDestDb, pDestDb, zDestDb);
178 p->pDestDb = pDestDb;
179 p->pSrcDb = pSrcDb;
180 p->iNext = 1;
danielk1977e70f4f62009-05-13 07:52:06 +0000181 p->isAttached = 0;
danielk197704103022009-02-03 16:51:24 +0000182
drhca94d8b2011-01-11 17:38:03 +0000183 if( 0==p->pSrc || 0==p->pDest || setDestPgsz(p)==SQLITE_NOMEM ){
184 /* One (or both) of the named databases did not exist or an OOM
185 ** error was hit. The error has already been written into the
186 ** pDestDb handle. All that is left to do here is free the
187 ** sqlite3_backup structure.
danielk197704103022009-02-03 16:51:24 +0000188 */
189 sqlite3_free(p);
190 p = 0;
191 }
192 }
danielk197704103022009-02-03 16:51:24 +0000193 if( p ){
danielk197704103022009-02-03 16:51:24 +0000194 p->pSrc->nBackup++;
195 }
196
drheef1eb02009-02-04 16:56:19 +0000197 sqlite3_mutex_leave(pDestDb->mutex);
danielk197704103022009-02-03 16:51:24 +0000198 sqlite3_mutex_leave(pSrcDb->mutex);
199 return p;
200}
201
202/*
danielk197703ab0352009-02-06 05:59:44 +0000203** Argument rc is an SQLite error code. Return true if this error is
204** considered fatal if encountered during a backup operation. All errors
205** are considered fatal except for SQLITE_BUSY and SQLITE_LOCKED.
206*/
207static int isFatalError(int rc){
drhdcd7db52009-05-14 19:26:51 +0000208 return (rc!=SQLITE_OK && rc!=SQLITE_BUSY && ALWAYS(rc!=SQLITE_LOCKED));
danielk197703ab0352009-02-06 05:59:44 +0000209}
210
211/*
danielk197704103022009-02-03 16:51:24 +0000212** Parameter zSrcData points to a buffer containing the data for
213** page iSrcPg from the source database. Copy this data into the
214** destination database.
215*/
216static int backupOnePage(sqlite3_backup *p, Pgno iSrcPg, const u8 *zSrcData){
217 Pager * const pDestPager = sqlite3BtreePager(p->pDest);
218 const int nSrcPgsz = sqlite3BtreeGetPageSize(p->pSrc);
219 int nDestPgsz = sqlite3BtreeGetPageSize(p->pDest);
220 const int nCopy = MIN(nSrcPgsz, nDestPgsz);
221 const i64 iEnd = (i64)iSrcPg*(i64)nSrcPgsz;
222
223 int rc = SQLITE_OK;
224 i64 iOff;
225
226 assert( p->bDestLocked );
danielk197703ab0352009-02-06 05:59:44 +0000227 assert( !isFatalError(p->rc) );
danielk197704103022009-02-03 16:51:24 +0000228 assert( iSrcPg!=PENDING_BYTE_PAGE(p->pSrc->pBt) );
229 assert( zSrcData );
230
231 /* Catch the case where the destination is an in-memory database and the
232 ** page sizes of the source and destination differ.
233 */
drh3289c5e2010-05-05 16:23:26 +0000234 if( nSrcPgsz!=nDestPgsz && sqlite3PagerIsMemdb(pDestPager) ){
danielk197704103022009-02-03 16:51:24 +0000235 rc = SQLITE_READONLY;
236 }
237
drh871919b2010-08-20 15:32:21 +0000238#ifdef SQLITE_HAS_CODEC
239 /* Backup is not possible if the page size of the destination is changing
240 ** a a codec is in use.
241 */
242 if( nSrcPgsz!=nDestPgsz && sqlite3PagerGetCodec(pDestPager)!=0 ){
243 rc = SQLITE_READONLY;
244 }
245#endif
246
danielk197704103022009-02-03 16:51:24 +0000247 /* This loop runs once for each destination page spanned by the source
248 ** page. For each iteration, variable iOff is set to the byte offset
249 ** of the destination page.
250 */
251 for(iOff=iEnd-(i64)nSrcPgsz; rc==SQLITE_OK && iOff<iEnd; iOff+=nDestPgsz){
252 DbPage *pDestPg = 0;
253 Pgno iDest = (Pgno)(iOff/nDestPgsz)+1;
254 if( iDest==PENDING_BYTE_PAGE(p->pDest->pBt) ) continue;
255 if( SQLITE_OK==(rc = sqlite3PagerGet(pDestPager, iDest, &pDestPg))
256 && SQLITE_OK==(rc = sqlite3PagerWrite(pDestPg))
257 ){
258 const u8 *zIn = &zSrcData[iOff%nSrcPgsz];
259 u8 *zDestData = sqlite3PagerGetData(pDestPg);
260 u8 *zOut = &zDestData[iOff%nDestPgsz];
261
262 /* Copy the data from the source page into the destination page.
263 ** Then clear the Btree layer MemPage.isInit flag. Both this module
264 ** and the pager code use this trick (clearing the first byte
265 ** of the page 'extra' space to invalidate the Btree layers
266 ** cached parse of the page). MemPage.isInit is marked
267 ** "MUST BE FIRST" for this purpose.
268 */
269 memcpy(zOut, zIn, nCopy);
270 ((u8 *)sqlite3PagerGetExtra(pDestPg))[0] = 0;
271 }
272 sqlite3PagerUnref(pDestPg);
273 }
274
275 return rc;
276}
277
278/*
danielk19773d0cbc32009-02-09 18:55:45 +0000279** If pFile is currently larger than iSize bytes, then truncate it to
280** exactly iSize bytes. If pFile is not larger than iSize bytes, then
281** this function is a no-op.
282**
283** Return SQLITE_OK if everything is successful, or an SQLite error
284** code if an error occurs.
285*/
286static int backupTruncateFile(sqlite3_file *pFile, i64 iSize){
287 i64 iCurrent;
288 int rc = sqlite3OsFileSize(pFile, &iCurrent);
289 if( rc==SQLITE_OK && iCurrent>iSize ){
290 rc = sqlite3OsTruncate(pFile, iSize);
291 }
292 return rc;
293}
294
295/*
danielk1977e70f4f62009-05-13 07:52:06 +0000296** Register this backup object with the associated source pager for
297** callbacks when pages are changed or the cache invalidated.
298*/
299static void attachBackupObject(sqlite3_backup *p){
300 sqlite3_backup **pp;
301 assert( sqlite3BtreeHoldsMutex(p->pSrc) );
302 pp = sqlite3PagerBackupPtr(sqlite3BtreePager(p->pSrc));
303 p->pNext = *pp;
304 *pp = p;
305 p->isAttached = 1;
306}
307
308/*
danielk197704103022009-02-03 16:51:24 +0000309** Copy nPage pages from the source b-tree to the destination.
310*/
311int sqlite3_backup_step(sqlite3_backup *p, int nPage){
312 int rc;
drh3289c5e2010-05-05 16:23:26 +0000313 int destMode; /* Destination journal mode */
drh5c10f772010-05-05 18:46:44 +0000314 int pgszSrc = 0; /* Source page size */
315 int pgszDest = 0; /* Destination page size */
danielk197704103022009-02-03 16:51:24 +0000316
317 sqlite3_mutex_enter(p->pSrcDb->mutex);
318 sqlite3BtreeEnter(p->pSrc);
drhd3a5c502009-02-03 22:51:06 +0000319 if( p->pDestDb ){
320 sqlite3_mutex_enter(p->pDestDb->mutex);
321 }
danielk197704103022009-02-03 16:51:24 +0000322
drh5c10f772010-05-05 18:46:44 +0000323 rc = p->rc;
danielk197703ab0352009-02-06 05:59:44 +0000324 if( !isFatalError(rc) ){
danielk197704103022009-02-03 16:51:24 +0000325 Pager * const pSrcPager = sqlite3BtreePager(p->pSrc); /* Source pager */
326 Pager * const pDestPager = sqlite3BtreePager(p->pDest); /* Dest pager */
327 int ii; /* Iterator variable */
shane63207ab2009-02-04 01:49:30 +0000328 int nSrcPage = -1; /* Size of source db in pages */
danielk197704103022009-02-03 16:51:24 +0000329 int bCloseTrans = 0; /* True if src db requires unlocking */
330
331 /* If the source pager is currently in a write-transaction, return
danielk1977404ca072009-03-16 13:19:36 +0000332 ** SQLITE_BUSY immediately.
danielk197704103022009-02-03 16:51:24 +0000333 */
334 if( p->pDestDb && p->pSrc->pBt->inTransaction==TRANS_WRITE ){
danielk1977404ca072009-03-16 13:19:36 +0000335 rc = SQLITE_BUSY;
danielk197703ab0352009-02-06 05:59:44 +0000336 }else{
337 rc = SQLITE_OK;
danielk197704103022009-02-03 16:51:24 +0000338 }
339
340 /* Lock the destination database, if it is not locked already. */
341 if( SQLITE_OK==rc && p->bDestLocked==0
342 && SQLITE_OK==(rc = sqlite3BtreeBeginTrans(p->pDest, 2))
343 ){
344 p->bDestLocked = 1;
danielk1977602b4662009-07-02 07:47:33 +0000345 sqlite3BtreeGetMeta(p->pDest, BTREE_SCHEMA_VERSION, &p->iDestSchema);
danielk197704103022009-02-03 16:51:24 +0000346 }
347
348 /* If there is no open read-transaction on the source database, open
349 ** one now. If a transaction is opened here, then it will be closed
350 ** before this function exits.
351 */
352 if( rc==SQLITE_OK && 0==sqlite3BtreeIsInReadTrans(p->pSrc) ){
353 rc = sqlite3BtreeBeginTrans(p->pSrc, 0);
354 bCloseTrans = 1;
355 }
drh5c10f772010-05-05 18:46:44 +0000356
357 /* Do not allow backup if the destination database is in WAL mode
358 ** and the page sizes are different between source and destination */
359 pgszSrc = sqlite3BtreeGetPageSize(p->pSrc);
360 pgszDest = sqlite3BtreeGetPageSize(p->pDest);
drh0b9b4302010-06-11 17:01:24 +0000361 destMode = sqlite3PagerGetJournalMode(sqlite3BtreePager(p->pDest));
drh5c10f772010-05-05 18:46:44 +0000362 if( SQLITE_OK==rc && destMode==PAGER_JOURNALMODE_WAL && pgszSrc!=pgszDest ){
363 rc = SQLITE_READONLY;
364 }
danielk197704103022009-02-03 16:51:24 +0000365
366 /* Now that there is a read-lock on the source database, query the
367 ** source pager for the number of pages in the database.
368 */
drhb1299152010-03-30 22:58:33 +0000369 nSrcPage = (int)sqlite3BtreeLastPage(p->pSrc);
370 assert( nSrcPage>=0 );
danielk197703ab0352009-02-06 05:59:44 +0000371 for(ii=0; (nPage<0 || ii<nPage) && p->iNext<=(Pgno)nSrcPage && !rc; ii++){
danielk197704103022009-02-03 16:51:24 +0000372 const Pgno iSrcPg = p->iNext; /* Source page number */
373 if( iSrcPg!=PENDING_BYTE_PAGE(p->pSrc->pBt) ){
374 DbPage *pSrcPg; /* Source page object */
375 rc = sqlite3PagerGet(pSrcPager, iSrcPg, &pSrcPg);
376 if( rc==SQLITE_OK ){
377 rc = backupOnePage(p, iSrcPg, sqlite3PagerGetData(pSrcPg));
378 sqlite3PagerUnref(pSrcPg);
379 }
380 }
381 p->iNext++;
382 }
383 if( rc==SQLITE_OK ){
384 p->nPagecount = nSrcPage;
385 p->nRemaining = nSrcPage+1-p->iNext;
shane63207ab2009-02-04 01:49:30 +0000386 if( p->iNext>(Pgno)nSrcPage ){
danielk197704103022009-02-03 16:51:24 +0000387 rc = SQLITE_DONE;
danielk1977e70f4f62009-05-13 07:52:06 +0000388 }else if( !p->isAttached ){
389 attachBackupObject(p);
danielk197704103022009-02-03 16:51:24 +0000390 }
391 }
392
drhf25cd712009-07-06 19:03:12 +0000393 /* Update the schema version field in the destination database. This
394 ** is to make sure that the schema-version really does change in
395 ** the case where the source and destination databases have the
396 ** same schema version.
397 */
398 if( rc==SQLITE_DONE
399 && (rc = sqlite3BtreeUpdateMeta(p->pDest,1,p->iDestSchema+1))==SQLITE_OK
400 ){
danielk197704103022009-02-03 16:51:24 +0000401 int nDestTruncate;
danielk197704103022009-02-03 16:51:24 +0000402
drhd3a5c502009-02-03 22:51:06 +0000403 if( p->pDestDb ){
404 sqlite3ResetInternalSchema(p->pDestDb, 0);
405 }
danielk197704103022009-02-03 16:51:24 +0000406
407 /* Set nDestTruncate to the final number of pages in the destination
408 ** database. The complication here is that the destination page
409 ** size may be different to the source page size.
410 **
411 ** If the source page size is smaller than the destination page size,
412 ** round up. In this case the call to sqlite3OsTruncate() below will
413 ** fix the size of the file. However it is important to call
414 ** sqlite3PagerTruncateImage() here so that any pages in the
415 ** destination file that lie beyond the nDestTruncate page mark are
416 ** journalled by PagerCommitPhaseOne() before they are destroyed
417 ** by the file truncation.
418 */
drh3289c5e2010-05-05 16:23:26 +0000419 assert( pgszSrc==sqlite3BtreeGetPageSize(p->pSrc) );
420 assert( pgszDest==sqlite3BtreeGetPageSize(p->pDest) );
421 if( pgszSrc<pgszDest ){
422 int ratio = pgszDest/pgszSrc;
danielk197704103022009-02-03 16:51:24 +0000423 nDestTruncate = (nSrcPage+ratio-1)/ratio;
drh38aec8d2009-02-16 16:23:09 +0000424 if( nDestTruncate==(int)PENDING_BYTE_PAGE(p->pDest->pBt) ){
danielk1977f2a79f22009-02-12 17:01:49 +0000425 nDestTruncate--;
426 }
danielk197704103022009-02-03 16:51:24 +0000427 }else{
drh3289c5e2010-05-05 16:23:26 +0000428 nDestTruncate = nSrcPage * (pgszSrc/pgszDest);
danielk197704103022009-02-03 16:51:24 +0000429 }
430 sqlite3PagerTruncateImage(pDestPager, nDestTruncate);
431
drh3289c5e2010-05-05 16:23:26 +0000432 if( pgszSrc<pgszDest ){
danielk197704103022009-02-03 16:51:24 +0000433 /* If the source page-size is smaller than the destination page-size,
434 ** two extra things may need to happen:
435 **
436 ** * The destination may need to be truncated, and
437 **
438 ** * Data stored on the pages immediately following the
439 ** pending-byte page in the source database may need to be
440 ** copied into the destination database.
441 */
drh3289c5e2010-05-05 16:23:26 +0000442 const i64 iSize = (i64)pgszSrc * (i64)nSrcPage;
danielk19773d0cbc32009-02-09 18:55:45 +0000443 sqlite3_file * const pFile = sqlite3PagerFile(pDestPager);
drhc6aed542011-01-16 22:37:09 +0000444 i64 iOff;
445 i64 iEnd;
danielk19773d0cbc32009-02-09 18:55:45 +0000446
danielk197704103022009-02-03 16:51:24 +0000447 assert( pFile );
drh3289c5e2010-05-05 16:23:26 +0000448 assert( (i64)nDestTruncate*(i64)pgszDest >= iSize || (
shane65ad7d22009-02-16 17:55:47 +0000449 nDestTruncate==(int)(PENDING_BYTE_PAGE(p->pDest->pBt)-1)
drh3289c5e2010-05-05 16:23:26 +0000450 && iSize>=PENDING_BYTE && iSize<=PENDING_BYTE+pgszDest
danielk1977f2a79f22009-02-12 17:01:49 +0000451 ));
dan4d26d582011-01-25 18:19:24 +0000452
453 /* This call ensures that all data required to recreate the original
454 ** database has been stored in the journal for pDestPager and the
455 ** journal synced to disk. So at this point we may safely modify
456 ** the database file in any way, knowing that if a power failure
457 ** occurs, the original database will be reconstructed from the
458 ** journal file. */
459 rc = sqlite3PagerCommitPhaseOne(pDestPager, 0, 1);
460
461 /* Write the extra pages and truncate the database file as required. */
drhc6aed542011-01-16 22:37:09 +0000462 iEnd = MIN(PENDING_BYTE + pgszDest, iSize);
463 for(
464 iOff=PENDING_BYTE+pgszSrc;
465 rc==SQLITE_OK && iOff<iEnd;
466 iOff+=pgszSrc
danielk197704103022009-02-03 16:51:24 +0000467 ){
drhc6aed542011-01-16 22:37:09 +0000468 PgHdr *pSrcPg = 0;
469 const Pgno iSrcPg = (Pgno)((iOff/pgszSrc)+1);
470 rc = sqlite3PagerGet(pSrcPager, iSrcPg, &pSrcPg);
471 if( rc==SQLITE_OK ){
472 u8 *zData = sqlite3PagerGetData(pSrcPg);
473 rc = sqlite3OsWrite(pFile, zData, pgszSrc, iOff);
474 }
475 sqlite3PagerUnref(pSrcPg);
476 }
477 if( rc==SQLITE_OK ){
dan4d26d582011-01-25 18:19:24 +0000478 rc = backupTruncateFile(pFile, iSize);
479 }
480
481 /* Sync the database file to disk. */
482 if( rc==SQLITE_OK ){
483 rc = sqlite3PagerSync(pDestPager);
danielk197704103022009-02-03 16:51:24 +0000484 }
485 }else{
486 rc = sqlite3PagerCommitPhaseOne(pDestPager, 0, 0);
487 }
488
489 /* Finish committing the transaction to the destination database. */
490 if( SQLITE_OK==rc
491 && SQLITE_OK==(rc = sqlite3BtreeCommitPhaseTwo(p->pDest))
492 ){
493 rc = SQLITE_DONE;
494 }
495 }
496
497 /* If bCloseTrans is true, then this function opened a read transaction
498 ** on the source database. Close the read transaction here. There is
499 ** no need to check the return values of the btree methods here, as
500 ** "committing" a read-only transaction cannot fail.
501 */
502 if( bCloseTrans ){
503 TESTONLY( int rc2 );
504 TESTONLY( rc2 = ) sqlite3BtreeCommitPhaseOne(p->pSrc, 0);
505 TESTONLY( rc2 |= ) sqlite3BtreeCommitPhaseTwo(p->pSrc);
506 assert( rc2==SQLITE_OK );
507 }
508
danba3cbf32010-06-30 04:29:03 +0000509 if( rc==SQLITE_IOERR_NOMEM ){
510 rc = SQLITE_NOMEM;
511 }
danielk197703ab0352009-02-06 05:59:44 +0000512 p->rc = rc;
danielk197704103022009-02-03 16:51:24 +0000513 }
drhd3a5c502009-02-03 22:51:06 +0000514 if( p->pDestDb ){
515 sqlite3_mutex_leave(p->pDestDb->mutex);
516 }
danielk197704103022009-02-03 16:51:24 +0000517 sqlite3BtreeLeave(p->pSrc);
518 sqlite3_mutex_leave(p->pSrcDb->mutex);
519 return rc;
520}
521
522/*
523** Release all resources associated with an sqlite3_backup* handle.
524*/
525int sqlite3_backup_finish(sqlite3_backup *p){
526 sqlite3_backup **pp; /* Ptr to head of pagers backup list */
527 sqlite3_mutex *mutex; /* Mutex to protect source database */
528 int rc; /* Value to return */
529
530 /* Enter the mutexes */
drhdcd7db52009-05-14 19:26:51 +0000531 if( p==0 ) return SQLITE_OK;
danielk197704103022009-02-03 16:51:24 +0000532 sqlite3_mutex_enter(p->pSrcDb->mutex);
533 sqlite3BtreeEnter(p->pSrc);
534 mutex = p->pSrcDb->mutex;
drhd3a5c502009-02-03 22:51:06 +0000535 if( p->pDestDb ){
536 sqlite3_mutex_enter(p->pDestDb->mutex);
537 }
danielk197704103022009-02-03 16:51:24 +0000538
539 /* Detach this backup from the source pager. */
540 if( p->pDestDb ){
danielk1977e70f4f62009-05-13 07:52:06 +0000541 p->pSrc->nBackup--;
542 }
543 if( p->isAttached ){
danielk197704103022009-02-03 16:51:24 +0000544 pp = sqlite3PagerBackupPtr(sqlite3BtreePager(p->pSrc));
545 while( *pp!=p ){
546 pp = &(*pp)->pNext;
547 }
548 *pp = p->pNext;
danielk197704103022009-02-03 16:51:24 +0000549 }
550
551 /* If a transaction is still open on the Btree, roll it back. */
552 sqlite3BtreeRollback(p->pDest);
553
554 /* Set the error code of the destination database handle. */
555 rc = (p->rc==SQLITE_DONE) ? SQLITE_OK : p->rc;
556 sqlite3Error(p->pDestDb, rc, 0);
557
558 /* Exit the mutexes and free the backup context structure. */
drhd3a5c502009-02-03 22:51:06 +0000559 if( p->pDestDb ){
560 sqlite3_mutex_leave(p->pDestDb->mutex);
561 }
danielk197704103022009-02-03 16:51:24 +0000562 sqlite3BtreeLeave(p->pSrc);
563 if( p->pDestDb ){
drh9f129f42010-08-31 15:27:32 +0000564 /* EVIDENCE-OF: R-64852-21591 The sqlite3_backup object is created by a
565 ** call to sqlite3_backup_init() and is destroyed by a call to
566 ** sqlite3_backup_finish(). */
danielk197704103022009-02-03 16:51:24 +0000567 sqlite3_free(p);
568 }
569 sqlite3_mutex_leave(mutex);
570 return rc;
571}
572
573/*
574** Return the number of pages still to be backed up as of the most recent
575** call to sqlite3_backup_step().
576*/
577int sqlite3_backup_remaining(sqlite3_backup *p){
578 return p->nRemaining;
579}
580
581/*
582** Return the total number of pages in the source database as of the most
583** recent call to sqlite3_backup_step().
584*/
585int sqlite3_backup_pagecount(sqlite3_backup *p){
586 return p->nPagecount;
587}
588
589/*
590** This function is called after the contents of page iPage of the
591** source database have been modified. If page iPage has already been
592** copied into the destination database, then the data written to the
593** destination is now invalidated. The destination copy of iPage needs
594** to be updated with the new data before the backup operation is
595** complete.
596**
597** It is assumed that the mutex associated with the BtShared object
598** corresponding to the source database is held when this function is
599** called.
600*/
601void sqlite3BackupUpdate(sqlite3_backup *pBackup, Pgno iPage, const u8 *aData){
602 sqlite3_backup *p; /* Iterator variable */
603 for(p=pBackup; p; p=p->pNext){
604 assert( sqlite3_mutex_held(p->pSrc->pBt->mutex) );
danielk197703ab0352009-02-06 05:59:44 +0000605 if( !isFatalError(p->rc) && iPage<p->iNext ){
danielk197704103022009-02-03 16:51:24 +0000606 /* The backup process p has already copied page iPage. But now it
607 ** has been modified by a transaction on the source pager. Copy
608 ** the new data into the backup.
609 */
610 int rc = backupOnePage(p, iPage, aData);
danielk197703ab0352009-02-06 05:59:44 +0000611 assert( rc!=SQLITE_BUSY && rc!=SQLITE_LOCKED );
danielk197704103022009-02-03 16:51:24 +0000612 if( rc!=SQLITE_OK ){
613 p->rc = rc;
614 }
615 }
616 }
617}
618
619/*
620** Restart the backup process. This is called when the pager layer
621** detects that the database has been modified by an external database
622** connection. In this case there is no way of knowing which of the
623** pages that have been copied into the destination database are still
624** valid and which are not, so the entire process needs to be restarted.
625**
626** It is assumed that the mutex associated with the BtShared object
627** corresponding to the source database is held when this function is
628** called.
629*/
630void sqlite3BackupRestart(sqlite3_backup *pBackup){
631 sqlite3_backup *p; /* Iterator variable */
632 for(p=pBackup; p; p=p->pNext){
633 assert( sqlite3_mutex_held(p->pSrc->pBt->mutex) );
634 p->iNext = 1;
635 }
636}
637
638#ifndef SQLITE_OMIT_VACUUM
639/*
640** Copy the complete content of pBtFrom into pBtTo. A transaction
641** must be active for both files.
642**
643** The size of file pTo may be reduced by this operation. If anything
644** goes wrong, the transaction on pTo is rolled back. If successful, the
645** transaction is committed before returning.
646*/
647int sqlite3BtreeCopyFile(Btree *pTo, Btree *pFrom){
648 int rc;
649 sqlite3_backup b;
650 sqlite3BtreeEnter(pTo);
651 sqlite3BtreeEnter(pFrom);
652
653 /* Set up an sqlite3_backup object. sqlite3_backup.pDestDb must be set
654 ** to 0. This is used by the implementations of sqlite3_backup_step()
655 ** and sqlite3_backup_finish() to detect that they are being called
656 ** from this function, not directly by the user.
657 */
658 memset(&b, 0, sizeof(b));
659 b.pSrcDb = pFrom->db;
660 b.pSrc = pFrom;
661 b.pDest = pTo;
662 b.iNext = 1;
663
664 /* 0x7FFFFFFF is the hard limit for the number of pages in a database
665 ** file. By passing this as the number of pages to copy to
666 ** sqlite3_backup_step(), we can guarantee that the copy finishes
667 ** within a single call (unless an error occurs). The assert() statement
668 ** checks this assumption - (p->rc) should be set to either SQLITE_DONE
669 ** or an error code.
670 */
671 sqlite3_backup_step(&b, 0x7FFFFFFF);
672 assert( b.rc!=SQLITE_OK );
673 rc = sqlite3_backup_finish(&b);
674 if( rc==SQLITE_OK ){
675 pTo->pBt->pageSizeFixed = 0;
676 }
677
678 sqlite3BtreeLeave(pFrom);
679 sqlite3BtreeLeave(pTo);
680 return rc;
681}
682#endif /* SQLITE_OMIT_VACUUM */