// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "base/files/file.h" #include #include #include #include #include "base/files/file_path.h" #include "base/files/file_posix_hooks_internal.h" #include "base/logging.h" #include "base/metrics/sparse_histogram.h" #include "base/posix/eintr_wrapper.h" #include "base/strings/utf_string_conversions.h" #include "base/threading/thread_restrictions.h" #if defined(OS_ANDROID) #include "base/os_compat_android.h" #endif namespace base { // Make sure our Whence mappings match the system headers. COMPILE_ASSERT(File::FROM_BEGIN == SEEK_SET && File::FROM_CURRENT == SEEK_CUR && File::FROM_END == SEEK_END, whence_matches_system); namespace { #if defined(OS_BSD) || defined(OS_MACOSX) || defined(OS_NACL) static int CallFstat(int fd, stat_wrapper_t *sb) { base::ThreadRestrictions::AssertIOAllowed(); return fstat(fd, sb); } #else static int CallFstat(int fd, stat_wrapper_t *sb) { base::ThreadRestrictions::AssertIOAllowed(); return fstat64(fd, sb); } #endif // NaCl doesn't provide the following system calls, so either simulate them or // wrap them in order to minimize the number of #ifdef's in this file. #if !defined(OS_NACL) static bool IsOpenAppend(PlatformFile file) { return (fcntl(file, F_GETFL) & O_APPEND) != 0; } static int CallFtruncate(PlatformFile file, int64 length) { return HANDLE_EINTR(ftruncate(file, length)); } static int CallFutimes(PlatformFile file, const struct timeval times[2]) { #ifdef __USE_XOPEN2K8 // futimens should be available, but futimes might not be // http://pubs.opengroup.org/onlinepubs/9699919799/ timespec ts_times[2]; ts_times[0].tv_sec = times[0].tv_sec; ts_times[0].tv_nsec = times[0].tv_usec * 1000; ts_times[1].tv_sec = times[1].tv_sec; ts_times[1].tv_nsec = times[1].tv_usec * 1000; return futimens(file, ts_times); #else return futimes(file, times); #endif } static File::Error CallFctnlFlock(PlatformFile file, bool do_lock) { struct flock lock; lock.l_type = F_WRLCK; lock.l_whence = SEEK_SET; lock.l_start = 0; lock.l_len = 0; // Lock entire file. if (HANDLE_EINTR(fcntl(file, do_lock ? F_SETLK : F_UNLCK, &lock)) == -1) return File::OSErrorToFileError(errno); return File::FILE_OK; } #else // defined(OS_NACL) static bool IsOpenAppend(PlatformFile file) { // NaCl doesn't implement fcntl. Since NaCl's write conforms to the POSIX // standard and always appends if the file is opened with O_APPEND, just // return false here. return false; } static int CallFtruncate(PlatformFile file, int64 length) { NOTIMPLEMENTED(); // NaCl doesn't implement ftruncate. return 0; } static int CallFutimes(PlatformFile file, const struct timeval times[2]) { NOTIMPLEMENTED(); // NaCl doesn't implement futimes. return 0; } static File::Error CallFctnlFlock(PlatformFile file, bool do_lock) { NOTIMPLEMENTED(); // NaCl doesn't implement flock struct. return File::FILE_ERROR_INVALID_OPERATION; } #endif // defined(OS_NACL) } // namespace void File::Info::FromStat(const stat_wrapper_t& stat_info) { is_directory = S_ISDIR(stat_info.st_mode); is_symbolic_link = S_ISLNK(stat_info.st_mode); size = stat_info.st_size; #if defined(OS_LINUX) time_t last_modified_sec = stat_info.st_mtim.tv_sec; int64 last_modified_nsec = stat_info.st_mtim.tv_nsec; time_t last_accessed_sec = stat_info.st_atim.tv_sec; int64 last_accessed_nsec = stat_info.st_atim.tv_nsec; time_t creation_time_sec = stat_info.st_ctim.tv_sec; int64 creation_time_nsec = stat_info.st_ctim.tv_nsec; #elif defined(OS_ANDROID) time_t last_modified_sec = stat_info.st_mtime; int64 last_modified_nsec = stat_info.st_mtime_nsec; time_t last_accessed_sec = stat_info.st_atime; int64 last_accessed_nsec = stat_info.st_atime_nsec; time_t creation_time_sec = stat_info.st_ctime; int64 creation_time_nsec = stat_info.st_ctime_nsec; #elif defined(OS_MACOSX) || defined(OS_IOS) || defined(OS_BSD) time_t last_modified_sec = stat_info.st_mtimespec.tv_sec; int64 last_modified_nsec = stat_info.st_mtimespec.tv_nsec; time_t last_accessed_sec = stat_info.st_atimespec.tv_sec; int64 last_accessed_nsec = stat_info.st_atimespec.tv_nsec; time_t creation_time_sec = stat_info.st_ctimespec.tv_sec; int64 creation_time_nsec = stat_info.st_ctimespec.tv_nsec; #else time_t last_modified_sec = stat_info.st_mtime; int64 last_modified_nsec = 0; time_t last_accessed_sec = stat_info.st_atime; int64 last_accessed_nsec = 0; time_t creation_time_sec = stat_info.st_ctime; int64 creation_time_nsec = 0; #endif last_modified = Time::FromTimeT(last_modified_sec) + TimeDelta::FromMicroseconds(last_modified_nsec / Time::kNanosecondsPerMicrosecond); last_accessed = Time::FromTimeT(last_accessed_sec) + TimeDelta::FromMicroseconds(last_accessed_nsec / Time::kNanosecondsPerMicrosecond); creation_time = Time::FromTimeT(creation_time_sec) + TimeDelta::FromMicroseconds(creation_time_nsec / Time::kNanosecondsPerMicrosecond); } // Default implementations of Protect/Unprotect hooks defined as weak symbols // where possible. void ProtectFileDescriptor(int fd) { } void UnprotectFileDescriptor(int fd) { } // NaCl doesn't implement system calls to open files directly. #if !defined(OS_NACL) // TODO(erikkay): does it make sense to support FLAG_EXCLUSIVE_* here? void File::InitializeUnsafe(const FilePath& name, uint32 flags) { base::ThreadRestrictions::AssertIOAllowed(); DCHECK(!IsValid()); int open_flags = 0; if (flags & FLAG_CREATE) open_flags = O_CREAT | O_EXCL; created_ = false; if (flags & FLAG_CREATE_ALWAYS) { DCHECK(!open_flags); DCHECK(flags & FLAG_WRITE); open_flags = O_CREAT | O_TRUNC; } if (flags & FLAG_OPEN_TRUNCATED) { DCHECK(!open_flags); DCHECK(flags & FLAG_WRITE); open_flags = O_TRUNC; } if (!open_flags && !(flags & FLAG_OPEN) && !(flags & FLAG_OPEN_ALWAYS)) { NOTREACHED(); errno = EOPNOTSUPP; error_details_ = FILE_ERROR_FAILED; return; } if (flags & FLAG_WRITE && flags & FLAG_READ) { open_flags |= O_RDWR; } else if (flags & FLAG_WRITE) { open_flags |= O_WRONLY; } else if (!(flags & FLAG_READ) && !(flags & FLAG_WRITE_ATTRIBUTES) && !(flags & FLAG_APPEND) && !(flags & FLAG_OPEN_ALWAYS)) { NOTREACHED(); } if (flags & FLAG_TERMINAL_DEVICE) open_flags |= O_NOCTTY | O_NDELAY; if (flags & FLAG_APPEND && flags & FLAG_READ) open_flags |= O_APPEND | O_RDWR; else if (flags & FLAG_APPEND) open_flags |= O_APPEND | O_WRONLY; COMPILE_ASSERT(O_RDONLY == 0, O_RDONLY_must_equal_zero); int mode = S_IRUSR | S_IWUSR; #if defined(OS_CHROMEOS) mode |= S_IRGRP | S_IROTH; #endif int descriptor = HANDLE_EINTR(open(name.value().c_str(), open_flags, mode)); if (flags & FLAG_OPEN_ALWAYS) { if (descriptor < 0) { open_flags |= O_CREAT; if (flags & FLAG_EXCLUSIVE_READ || flags & FLAG_EXCLUSIVE_WRITE) open_flags |= O_EXCL; // together with O_CREAT implies O_NOFOLLOW descriptor = HANDLE_EINTR(open(name.value().c_str(), open_flags, mode)); if (descriptor >= 0) created_ = true; } } if (descriptor < 0) { error_details_ = File::OSErrorToFileError(errno); return; } if (flags & (FLAG_CREATE_ALWAYS | FLAG_CREATE)) created_ = true; if (flags & FLAG_DELETE_ON_CLOSE) unlink(name.value().c_str()); async_ = ((flags & FLAG_ASYNC) == FLAG_ASYNC); error_details_ = FILE_OK; file_.reset(descriptor); ProtectFileDescriptor(descriptor); } #endif // !defined(OS_NACL) bool File::IsValid() const { return file_.is_valid(); } PlatformFile File::GetPlatformFile() const { return file_.get(); } PlatformFile File::TakePlatformFile() { if (IsValid()) UnprotectFileDescriptor(GetPlatformFile()); return file_.release(); } void File::Close() { if (!IsValid()) return; base::ThreadRestrictions::AssertIOAllowed(); UnprotectFileDescriptor(GetPlatformFile()); file_.reset(); } int64 File::Seek(Whence whence, int64 offset) { base::ThreadRestrictions::AssertIOAllowed(); DCHECK(IsValid()); #if defined(OS_ANDROID) COMPILE_ASSERT(sizeof(int64) == sizeof(off64_t), off64_t_64_bit); return lseek64(file_.get(), static_cast(offset), static_cast(whence)); #else COMPILE_ASSERT(sizeof(int64) == sizeof(off_t), off_t_64_bit); return lseek(file_.get(), static_cast(offset), static_cast(whence)); #endif } int File::Read(int64 offset, char* data, int size) { base::ThreadRestrictions::AssertIOAllowed(); DCHECK(IsValid()); if (size < 0) return -1; int bytes_read = 0; int rv; do { rv = HANDLE_EINTR(pread(file_.get(), data + bytes_read, size - bytes_read, offset + bytes_read)); if (rv <= 0) break; bytes_read += rv; } while (bytes_read < size); return bytes_read ? bytes_read : rv; } int File::ReadAtCurrentPos(char* data, int size) { base::ThreadRestrictions::AssertIOAllowed(); DCHECK(IsValid()); if (size < 0) return -1; int bytes_read = 0; int rv; do { rv = HANDLE_EINTR(read(file_.get(), data + bytes_read, size - bytes_read)); if (rv <= 0) break; bytes_read += rv; } while (bytes_read < size); return bytes_read ? bytes_read : rv; } int File::ReadNoBestEffort(int64 offset, char* data, int size) { base::ThreadRestrictions::AssertIOAllowed(); DCHECK(IsValid()); return HANDLE_EINTR(pread(file_.get(), data, size, offset)); } int File::ReadAtCurrentPosNoBestEffort(char* data, int size) { base::ThreadRestrictions::AssertIOAllowed(); DCHECK(IsValid()); if (size < 0) return -1; return HANDLE_EINTR(read(file_.get(), data, size)); } int File::Write(int64 offset, const char* data, int size) { base::ThreadRestrictions::AssertIOAllowed(); if (IsOpenAppend(file_.get())) return WriteAtCurrentPos(data, size); DCHECK(IsValid()); if (size < 0) return -1; int bytes_written = 0; int rv; do { rv = HANDLE_EINTR(pwrite(file_.get(), data + bytes_written, size - bytes_written, offset + bytes_written)); if (rv <= 0) break; bytes_written += rv; } while (bytes_written < size); return bytes_written ? bytes_written : rv; } int File::WriteAtCurrentPos(const char* data, int size) { base::ThreadRestrictions::AssertIOAllowed(); DCHECK(IsValid()); if (size < 0) return -1; int bytes_written = 0; int rv; do { rv = HANDLE_EINTR(write(file_.get(), data + bytes_written, size - bytes_written)); if (rv <= 0) break; bytes_written += rv; } while (bytes_written < size); return bytes_written ? bytes_written : rv; } int File::WriteAtCurrentPosNoBestEffort(const char* data, int size) { base::ThreadRestrictions::AssertIOAllowed(); DCHECK(IsValid()); if (size < 0) return -1; return HANDLE_EINTR(write(file_.get(), data, size)); } int64 File::GetLength() { DCHECK(IsValid()); stat_wrapper_t file_info; if (CallFstat(file_.get(), &file_info)) return false; return file_info.st_size; } bool File::SetLength(int64 length) { base::ThreadRestrictions::AssertIOAllowed(); DCHECK(IsValid()); return !CallFtruncate(file_.get(), length); } bool File::SetTimes(Time last_access_time, Time last_modified_time) { base::ThreadRestrictions::AssertIOAllowed(); DCHECK(IsValid()); timeval times[2]; times[0] = last_access_time.ToTimeVal(); times[1] = last_modified_time.ToTimeVal(); return !CallFutimes(file_.get(), times); } bool File::GetInfo(Info* info) { DCHECK(IsValid()); stat_wrapper_t file_info; if (CallFstat(file_.get(), &file_info)) return false; info->FromStat(file_info); return true; } File::Error File::Lock() { return CallFctnlFlock(file_.get(), true); } File::Error File::Unlock() { return CallFctnlFlock(file_.get(), false); } File File::Duplicate() { if (!IsValid()) return File(); PlatformFile other_fd = dup(GetPlatformFile()); if (other_fd == -1) return File(OSErrorToFileError(errno)); File other(other_fd); if (async()) other.async_ = true; return other.Pass(); } // Static. File::Error File::OSErrorToFileError(int saved_errno) { switch (saved_errno) { case EACCES: case EISDIR: case EROFS: case EPERM: return FILE_ERROR_ACCESS_DENIED; case EBUSY: #if !defined(OS_NACL) // ETXTBSY not defined by NaCl. case ETXTBSY: #endif return FILE_ERROR_IN_USE; case EEXIST: return FILE_ERROR_EXISTS; case EIO: return FILE_ERROR_IO; case ENOENT: return FILE_ERROR_NOT_FOUND; case EMFILE: return FILE_ERROR_TOO_MANY_OPENED; case ENOMEM: return FILE_ERROR_NO_MEMORY; case ENOSPC: return FILE_ERROR_NO_SPACE; case ENOTDIR: return FILE_ERROR_NOT_A_DIRECTORY; default: #if !defined(OS_NACL) // NaCl build has no metrics code. UMA_HISTOGRAM_SPARSE_SLOWLY("PlatformFile.UnknownErrors.Posix", saved_errno); #endif return FILE_ERROR_FAILED; } } File::MemoryCheckingScopedFD::MemoryCheckingScopedFD() { UpdateChecksum(); } File::MemoryCheckingScopedFD::MemoryCheckingScopedFD(int fd) : file_(fd) { UpdateChecksum(); } File::MemoryCheckingScopedFD::~MemoryCheckingScopedFD() {} // static void File::MemoryCheckingScopedFD::ComputeMemoryChecksum( unsigned int* out_checksum) const { // Use a single iteration of a linear congruentional generator (lcg) to // provide a cheap checksum unlikely to be accidentally matched by a random // memory corruption. // By choosing constants that satisfy the Hull-Duebell Theorem on lcg cycle // length, we insure that each distinct fd value maps to a distinct checksum, // which maximises the utility of our checksum. // This code uses "unsigned int" throughout for its defined modular semantics, // which implicitly gives us a divisor that is a power of two. const unsigned int kMultiplier = 13035 * 4 + 1; COMPILE_ASSERT(((kMultiplier - 1) & 3) == 0, pred_must_be_multiple_of_four); const unsigned int kIncrement = 1595649551; COMPILE_ASSERT(kIncrement & 1, must_be_coprime_to_powers_of_two); *out_checksum = static_cast(file_.get()) * kMultiplier + kIncrement; } void File::MemoryCheckingScopedFD::Check() const { unsigned int computed_checksum; ComputeMemoryChecksum(&computed_checksum); CHECK_EQ(file_memory_checksum_, computed_checksum) << "corrupted fd memory"; } void File::MemoryCheckingScopedFD::UpdateChecksum() { ComputeMemoryChecksum(&file_memory_checksum_); } bool File::DoFlush() { base::ThreadRestrictions::AssertIOAllowed(); DCHECK(IsValid()); #if defined(OS_NACL) NOTIMPLEMENTED(); // NaCl doesn't implement fsync. return true; #elif defined(OS_LINUX) || defined(OS_ANDROID) return !HANDLE_EINTR(fdatasync(file_.get())); #else return !HANDLE_EINTR(fsync(file_.get())); #endif } void File::SetPlatformFile(PlatformFile file) { CHECK(!file_.is_valid()); file_.reset(file); if (file_.is_valid()) ProtectFileDescriptor(GetPlatformFile()); } } // namespace base