Narayan Kamath | d1c606f | 2014-06-09 16:50:19 +0100 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2011 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
| 17 | #include "scoped_flock.h" |
| 18 | |
| 19 | #include <sys/file.h> |
| 20 | #include <sys/stat.h> |
| 21 | |
Andreas Gampe | 5794381 | 2017-12-06 21:39:13 -0800 | [diff] [blame] | 22 | #include <android-base/logging.h> |
| 23 | #include <android-base/stringprintf.h> |
Andreas Gampe | 46ee31b | 2016-12-14 10:11:49 -0800 | [diff] [blame] | 24 | |
David Sehr | 1979c64 | 2018-04-26 14:41:18 -0700 | [diff] [blame] | 25 | #include "unix_file/fd_file.h" |
Narayan Kamath | d1c606f | 2014-06-09 16:50:19 +0100 | [diff] [blame] | 26 | |
| 27 | namespace art { |
| 28 | |
Andreas Gampe | 46ee31b | 2016-12-14 10:11:49 -0800 | [diff] [blame] | 29 | using android::base::StringPrintf; |
| 30 | |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 31 | /* static */ ScopedFlock LockedFile::Open(const char* filename, std::string* error_msg) { |
| 32 | return Open(filename, O_CREAT | O_RDWR, true, error_msg); |
Calin Juravle | 877fd96 | 2016-01-05 14:29:29 +0000 | [diff] [blame] | 33 | } |
| 34 | |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 35 | /* static */ ScopedFlock LockedFile::Open(const char* filename, int flags, bool block, |
| 36 | std::string* error_msg) { |
Narayan Kamath | d1c606f | 2014-06-09 16:50:19 +0100 | [diff] [blame] | 37 | while (true) { |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 38 | // NOTE: We don't check usage here because the ScopedFlock should *never* be |
| 39 | // responsible for flushing its underlying FD. Its only purpose should be |
| 40 | // to acquire a lock, and the unlock / close in the corresponding |
| 41 | // destructor. Callers should explicitly flush files they're writing to if |
| 42 | // that is the desired behaviour. |
Andreas Gampe | 0de385f | 2018-10-11 11:11:13 -0700 | [diff] [blame^] | 43 | std::unique_ptr<File> file(OS::OpenFileWithFlags(filename, flags, /* auto_flush= */ false)); |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 44 | if (file.get() == nullptr) { |
| 45 | *error_msg = StringPrintf("Failed to open file '%s': %s", filename, strerror(errno)); |
| 46 | return nullptr; |
Andreas Gampe | 4303ba9 | 2014-11-06 01:00:46 -0800 | [diff] [blame] | 47 | } |
Calin Juravle | df674c4 | 2017-04-27 19:30:16 -0700 | [diff] [blame] | 48 | |
Calin Juravle | 877fd96 | 2016-01-05 14:29:29 +0000 | [diff] [blame] | 49 | int operation = block ? LOCK_EX : (LOCK_EX | LOCK_NB); |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 50 | int flock_result = TEMP_FAILURE_RETRY(flock(file->Fd(), operation)); |
Calin Juravle | 877fd96 | 2016-01-05 14:29:29 +0000 | [diff] [blame] | 51 | if (flock_result == EWOULDBLOCK) { |
| 52 | // File is locked by someone else and we are required not to block; |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 53 | return nullptr; |
Calin Juravle | 877fd96 | 2016-01-05 14:29:29 +0000 | [diff] [blame] | 54 | } |
Narayan Kamath | d1c606f | 2014-06-09 16:50:19 +0100 | [diff] [blame] | 55 | if (flock_result != 0) { |
| 56 | *error_msg = StringPrintf("Failed to lock file '%s': %s", filename, strerror(errno)); |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 57 | return nullptr; |
Narayan Kamath | d1c606f | 2014-06-09 16:50:19 +0100 | [diff] [blame] | 58 | } |
| 59 | struct stat fstat_stat; |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 60 | int fstat_result = TEMP_FAILURE_RETRY(fstat(file->Fd(), &fstat_stat)); |
Narayan Kamath | d1c606f | 2014-06-09 16:50:19 +0100 | [diff] [blame] | 61 | if (fstat_result != 0) { |
| 62 | *error_msg = StringPrintf("Failed to fstat file '%s': %s", filename, strerror(errno)); |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 63 | return nullptr; |
Narayan Kamath | d1c606f | 2014-06-09 16:50:19 +0100 | [diff] [blame] | 64 | } |
| 65 | struct stat stat_stat; |
| 66 | int stat_result = TEMP_FAILURE_RETRY(stat(filename, &stat_stat)); |
| 67 | if (stat_result != 0) { |
| 68 | PLOG(WARNING) << "Failed to stat, will retry: " << filename; |
| 69 | // ENOENT can happen if someone racing with us unlinks the file we created so just retry. |
Calin Juravle | 877fd96 | 2016-01-05 14:29:29 +0000 | [diff] [blame] | 70 | if (block) { |
| 71 | continue; |
| 72 | } else { |
| 73 | // Note that in theory we could race with someone here for a long time and end up retrying |
| 74 | // over and over again. This potential behavior does not fit well in the non-blocking |
| 75 | // semantics. Thus, if we are not require to block return failure when racing. |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 76 | return nullptr; |
Calin Juravle | 877fd96 | 2016-01-05 14:29:29 +0000 | [diff] [blame] | 77 | } |
Narayan Kamath | d1c606f | 2014-06-09 16:50:19 +0100 | [diff] [blame] | 78 | } |
| 79 | if (fstat_stat.st_dev != stat_stat.st_dev || fstat_stat.st_ino != stat_stat.st_ino) { |
| 80 | LOG(WARNING) << "File changed while locking, will retry: " << filename; |
Calin Juravle | 877fd96 | 2016-01-05 14:29:29 +0000 | [diff] [blame] | 81 | if (block) { |
| 82 | continue; |
| 83 | } else { |
| 84 | // See comment above. |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 85 | return nullptr; |
Calin Juravle | 877fd96 | 2016-01-05 14:29:29 +0000 | [diff] [blame] | 86 | } |
Narayan Kamath | d1c606f | 2014-06-09 16:50:19 +0100 | [diff] [blame] | 87 | } |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 88 | |
| 89 | return ScopedFlock(new LockedFile(std::move((*file.get())))); |
Narayan Kamath | d1c606f | 2014-06-09 16:50:19 +0100 | [diff] [blame] | 90 | } |
| 91 | } |
| 92 | |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 93 | ScopedFlock LockedFile::DupOf(const int fd, const std::string& path, |
| 94 | const bool read_only_mode, std::string* error_msg) { |
| 95 | // NOTE: We don't check usage here because the ScopedFlock should *never* be |
| 96 | // responsible for flushing its underlying FD. Its only purpose should be |
| 97 | // to acquire a lock, and the unlock / close in the corresponding |
| 98 | // destructor. Callers should explicitly flush files they're writing to if |
| 99 | // that is the desired behaviour. |
| 100 | ScopedFlock locked_file( |
Andreas Gampe | 0de385f | 2018-10-11 11:11:13 -0700 | [diff] [blame^] | 101 | new LockedFile(dup(fd), path, /* check_usage= */ false, read_only_mode)); |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 102 | if (locked_file->Fd() == -1) { |
Alex Light | a59dd80 | 2014-07-02 16:28:08 -0700 | [diff] [blame] | 103 | *error_msg = StringPrintf("Failed to duplicate open file '%s': %s", |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 104 | locked_file->GetPath().c_str(), strerror(errno)); |
| 105 | return nullptr; |
Alex Light | a59dd80 | 2014-07-02 16:28:08 -0700 | [diff] [blame] | 106 | } |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 107 | if (0 != TEMP_FAILURE_RETRY(flock(locked_file->Fd(), LOCK_EX))) { |
Mathieu Chartier | 2cebb24 | 2015-04-21 16:50:40 -0700 | [diff] [blame] | 108 | *error_msg = StringPrintf( |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 109 | "Failed to lock file '%s': %s", locked_file->GetPath().c_str(), strerror(errno)); |
| 110 | return nullptr; |
Alex Light | a59dd80 | 2014-07-02 16:28:08 -0700 | [diff] [blame] | 111 | } |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 112 | |
| 113 | return locked_file; |
Alex Light | a59dd80 | 2014-07-02 16:28:08 -0700 | [diff] [blame] | 114 | } |
| 115 | |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 116 | void LockedFile::ReleaseLock() { |
| 117 | if (this->Fd() != -1) { |
| 118 | int flock_result = TEMP_FAILURE_RETRY(flock(this->Fd(), LOCK_UN)); |
Calin Juravle | f7ada95 | 2017-03-21 20:02:07 -0700 | [diff] [blame] | 119 | if (flock_result != 0) { |
Alex Light | 9c48ee5 | 2017-05-08 10:18:47 -0700 | [diff] [blame] | 120 | // Only printing a warning is okay since this is only used with either: |
| 121 | // 1) a non-blocking Init call, or |
| 122 | // 2) as a part of a seperate binary (eg dex2oat) which has it's own timeout logic to prevent |
| 123 | // deadlocks. |
| 124 | // This means we can be sure that the warning won't cause a deadlock. |
Narayan Kamath | a3d27eb | 2017-05-11 13:50:59 +0100 | [diff] [blame] | 125 | PLOG(WARNING) << "Unable to unlock file " << this->GetPath(); |
Andreas Gampe | 4303ba9 | 2014-11-06 01:00:46 -0800 | [diff] [blame] | 126 | } |
Narayan Kamath | d1c606f | 2014-06-09 16:50:19 +0100 | [diff] [blame] | 127 | } |
| 128 | } |
| 129 | |
| 130 | } // namespace art |