| // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 
 | // Use of this source code is governed by a BSD-style license that can be | 
 | // found in the LICENSE file. | 
 |  | 
 | #include "base/files/file.h" | 
 |  | 
 | #include <errno.h> | 
 | #include <fcntl.h> | 
 | #include <sys/stat.h> | 
 | #include <unistd.h> | 
 |  | 
 | #include "base/files/file_path.h" | 
 | #include "base/files/file_posix_hooks_internal.h" | 
 | #include "base/logging.h" | 
 | #include "base/metrics/sparse_histogram.h" | 
 | #include "base/posix/eintr_wrapper.h" | 
 | #include "base/strings/utf_string_conversions.h" | 
 | #include "base/threading/thread_restrictions.h" | 
 |  | 
 | #if defined(OS_ANDROID) | 
 | #include "base/os_compat_android.h" | 
 | #endif | 
 |  | 
 | namespace base { | 
 |  | 
 | // Make sure our Whence mappings match the system headers. | 
 | COMPILE_ASSERT(File::FROM_BEGIN   == SEEK_SET && | 
 |                File::FROM_CURRENT == SEEK_CUR && | 
 |                File::FROM_END     == SEEK_END, whence_matches_system); | 
 |  | 
 | namespace { | 
 |  | 
 | #if defined(OS_BSD) || defined(OS_MACOSX) || defined(OS_NACL) | 
 | static int CallFstat(int fd, stat_wrapper_t *sb) { | 
 |   base::ThreadRestrictions::AssertIOAllowed(); | 
 |   return fstat(fd, sb); | 
 | } | 
 | #else | 
 | static int CallFstat(int fd, stat_wrapper_t *sb) { | 
 |   base::ThreadRestrictions::AssertIOAllowed(); | 
 |   return fstat64(fd, sb); | 
 | } | 
 | #endif | 
 |  | 
 | // NaCl doesn't provide the following system calls, so either simulate them or | 
 | // wrap them in order to minimize the number of #ifdef's in this file. | 
 | #if !defined(OS_NACL) | 
 | static bool IsOpenAppend(PlatformFile file) { | 
 |   return (fcntl(file, F_GETFL) & O_APPEND) != 0; | 
 | } | 
 |  | 
 | static int CallFtruncate(PlatformFile file, int64 length) { | 
 |   return HANDLE_EINTR(ftruncate(file, length)); | 
 | } | 
 |  | 
 | static int CallFsync(PlatformFile file) { | 
 |   return HANDLE_EINTR(fsync(file)); | 
 | } | 
 |  | 
 | static int CallFutimes(PlatformFile file, const struct timeval times[2]) { | 
 | #ifdef __USE_XOPEN2K8 | 
 |   // futimens should be available, but futimes might not be | 
 |   // http://pubs.opengroup.org/onlinepubs/9699919799/ | 
 |  | 
 |   timespec ts_times[2]; | 
 |   ts_times[0].tv_sec  = times[0].tv_sec; | 
 |   ts_times[0].tv_nsec = times[0].tv_usec * 1000; | 
 |   ts_times[1].tv_sec  = times[1].tv_sec; | 
 |   ts_times[1].tv_nsec = times[1].tv_usec * 1000; | 
 |  | 
 |   return futimens(file, ts_times); | 
 | #else | 
 |   return futimes(file, times); | 
 | #endif | 
 | } | 
 |  | 
 | static File::Error CallFctnlFlock(PlatformFile file, bool do_lock) { | 
 |   struct flock lock; | 
 |   lock.l_type = F_WRLCK; | 
 |   lock.l_whence = SEEK_SET; | 
 |   lock.l_start = 0; | 
 |   lock.l_len = 0;  // Lock entire file. | 
 |   if (HANDLE_EINTR(fcntl(file, do_lock ? F_SETLK : F_UNLCK, &lock)) == -1) | 
 |     return File::OSErrorToFileError(errno); | 
 |   return File::FILE_OK; | 
 | } | 
 | #else  // defined(OS_NACL) | 
 |  | 
 | static bool IsOpenAppend(PlatformFile file) { | 
 |   // NaCl doesn't implement fcntl. Since NaCl's write conforms to the POSIX | 
 |   // standard and always appends if the file is opened with O_APPEND, just | 
 |   // return false here. | 
 |   return false; | 
 | } | 
 |  | 
 | static int CallFtruncate(PlatformFile file, int64 length) { | 
 |   NOTIMPLEMENTED();  // NaCl doesn't implement ftruncate. | 
 |   return 0; | 
 | } | 
 |  | 
 | static int CallFsync(PlatformFile file) { | 
 |   NOTIMPLEMENTED();  // NaCl doesn't implement fsync. | 
 |   return 0; | 
 | } | 
 |  | 
 | static int CallFutimes(PlatformFile file, const struct timeval times[2]) { | 
 |   NOTIMPLEMENTED();  // NaCl doesn't implement futimes. | 
 |   return 0; | 
 | } | 
 |  | 
 | static File::Error CallFctnlFlock(PlatformFile file, bool do_lock) { | 
 |   NOTIMPLEMENTED();  // NaCl doesn't implement flock struct. | 
 |   return File::FILE_ERROR_INVALID_OPERATION; | 
 | } | 
 | #endif  // defined(OS_NACL) | 
 |  | 
 | }  // namespace | 
 |  | 
 | void File::Info::FromStat(const stat_wrapper_t& stat_info) { | 
 |   is_directory = S_ISDIR(stat_info.st_mode); | 
 |   is_symbolic_link = S_ISLNK(stat_info.st_mode); | 
 |   size = stat_info.st_size; | 
 |  | 
 | #if defined(OS_LINUX) | 
 |   time_t last_modified_sec = stat_info.st_mtim.tv_sec; | 
 |   int64 last_modified_nsec = stat_info.st_mtim.tv_nsec; | 
 |   time_t last_accessed_sec = stat_info.st_atim.tv_sec; | 
 |   int64 last_accessed_nsec = stat_info.st_atim.tv_nsec; | 
 |   time_t creation_time_sec = stat_info.st_ctim.tv_sec; | 
 |   int64 creation_time_nsec = stat_info.st_ctim.tv_nsec; | 
 | #elif defined(OS_ANDROID) | 
 |   time_t last_modified_sec = stat_info.st_mtime; | 
 |   int64 last_modified_nsec = stat_info.st_mtime_nsec; | 
 |   time_t last_accessed_sec = stat_info.st_atime; | 
 |   int64 last_accessed_nsec = stat_info.st_atime_nsec; | 
 |   time_t creation_time_sec = stat_info.st_ctime; | 
 |   int64 creation_time_nsec = stat_info.st_ctime_nsec; | 
 | #elif defined(OS_MACOSX) || defined(OS_IOS) || defined(OS_BSD) | 
 |   time_t last_modified_sec = stat_info.st_mtimespec.tv_sec; | 
 |   int64 last_modified_nsec = stat_info.st_mtimespec.tv_nsec; | 
 |   time_t last_accessed_sec = stat_info.st_atimespec.tv_sec; | 
 |   int64 last_accessed_nsec = stat_info.st_atimespec.tv_nsec; | 
 |   time_t creation_time_sec = stat_info.st_ctimespec.tv_sec; | 
 |   int64 creation_time_nsec = stat_info.st_ctimespec.tv_nsec; | 
 | #else | 
 |   time_t last_modified_sec = stat_info.st_mtime; | 
 |   int64 last_modified_nsec = 0; | 
 |   time_t last_accessed_sec = stat_info.st_atime; | 
 |   int64 last_accessed_nsec = 0; | 
 |   time_t creation_time_sec = stat_info.st_ctime; | 
 |   int64 creation_time_nsec = 0; | 
 | #endif | 
 |  | 
 |   last_modified = | 
 |       Time::FromTimeT(last_modified_sec) + | 
 |       TimeDelta::FromMicroseconds(last_modified_nsec / | 
 |                                   Time::kNanosecondsPerMicrosecond); | 
 |  | 
 |   last_accessed = | 
 |       Time::FromTimeT(last_accessed_sec) + | 
 |       TimeDelta::FromMicroseconds(last_accessed_nsec / | 
 |                                   Time::kNanosecondsPerMicrosecond); | 
 |  | 
 |   creation_time = | 
 |       Time::FromTimeT(creation_time_sec) + | 
 |       TimeDelta::FromMicroseconds(creation_time_nsec / | 
 |                                   Time::kNanosecondsPerMicrosecond); | 
 | } | 
 |  | 
 | // Default implementations of Protect/Unprotect hooks defined as weak symbols | 
 | // where possible. | 
 | void ProtectFileDescriptor(int fd) { | 
 | } | 
 |  | 
 | void UnprotectFileDescriptor(int fd) { | 
 | } | 
 |  | 
 | // NaCl doesn't implement system calls to open files directly. | 
 | #if !defined(OS_NACL) | 
 | // TODO(erikkay): does it make sense to support FLAG_EXCLUSIVE_* here? | 
 | void File::InitializeUnsafe(const FilePath& name, uint32 flags) { | 
 |   base::ThreadRestrictions::AssertIOAllowed(); | 
 |   DCHECK(!IsValid()); | 
 |  | 
 |   int open_flags = 0; | 
 |   if (flags & FLAG_CREATE) | 
 |     open_flags = O_CREAT | O_EXCL; | 
 |  | 
 |   created_ = false; | 
 |  | 
 |   if (flags & FLAG_CREATE_ALWAYS) { | 
 |     DCHECK(!open_flags); | 
 |     DCHECK(flags & FLAG_WRITE); | 
 |     open_flags = O_CREAT | O_TRUNC; | 
 |   } | 
 |  | 
 |   if (flags & FLAG_OPEN_TRUNCATED) { | 
 |     DCHECK(!open_flags); | 
 |     DCHECK(flags & FLAG_WRITE); | 
 |     open_flags = O_TRUNC; | 
 |   } | 
 |  | 
 |   if (!open_flags && !(flags & FLAG_OPEN) && !(flags & FLAG_OPEN_ALWAYS)) { | 
 |     NOTREACHED(); | 
 |     errno = EOPNOTSUPP; | 
 |     error_details_ = FILE_ERROR_FAILED; | 
 |     return; | 
 |   } | 
 |  | 
 |   if (flags & FLAG_WRITE && flags & FLAG_READ) { | 
 |     open_flags |= O_RDWR; | 
 |   } else if (flags & FLAG_WRITE) { | 
 |     open_flags |= O_WRONLY; | 
 |   } else if (!(flags & FLAG_READ) && | 
 |              !(flags & FLAG_WRITE_ATTRIBUTES) && | 
 |              !(flags & FLAG_APPEND) && | 
 |              !(flags & FLAG_OPEN_ALWAYS)) { | 
 |     NOTREACHED(); | 
 |   } | 
 |  | 
 |   if (flags & FLAG_TERMINAL_DEVICE) | 
 |     open_flags |= O_NOCTTY | O_NDELAY; | 
 |  | 
 |   if (flags & FLAG_APPEND && flags & FLAG_READ) | 
 |     open_flags |= O_APPEND | O_RDWR; | 
 |   else if (flags & FLAG_APPEND) | 
 |     open_flags |= O_APPEND | O_WRONLY; | 
 |  | 
 |   COMPILE_ASSERT(O_RDONLY == 0, O_RDONLY_must_equal_zero); | 
 |  | 
 |   int mode = S_IRUSR | S_IWUSR; | 
 | #if defined(OS_CHROMEOS) | 
 |   mode |= S_IRGRP | S_IROTH; | 
 | #endif | 
 |  | 
 |   int descriptor = HANDLE_EINTR(open(name.value().c_str(), open_flags, mode)); | 
 |  | 
 |   if (flags & FLAG_OPEN_ALWAYS) { | 
 |     if (descriptor < 0) { | 
 |       open_flags |= O_CREAT; | 
 |       if (flags & FLAG_EXCLUSIVE_READ || flags & FLAG_EXCLUSIVE_WRITE) | 
 |         open_flags |= O_EXCL;   // together with O_CREAT implies O_NOFOLLOW | 
 |  | 
 |       descriptor = HANDLE_EINTR(open(name.value().c_str(), open_flags, mode)); | 
 |       if (descriptor >= 0) | 
 |         created_ = true; | 
 |     } | 
 |   } | 
 |  | 
 |   if (descriptor < 0) { | 
 |     error_details_ = File::OSErrorToFileError(errno); | 
 |     return; | 
 |   } | 
 |  | 
 |   if (flags & (FLAG_CREATE_ALWAYS | FLAG_CREATE)) | 
 |     created_ = true; | 
 |  | 
 |   if (flags & FLAG_DELETE_ON_CLOSE) | 
 |     unlink(name.value().c_str()); | 
 |  | 
 |   async_ = ((flags & FLAG_ASYNC) == FLAG_ASYNC); | 
 |   error_details_ = FILE_OK; | 
 |   file_.reset(descriptor); | 
 |   ProtectFileDescriptor(descriptor); | 
 | } | 
 | #endif  // !defined(OS_NACL) | 
 |  | 
 | bool File::IsValid() const { | 
 |   return file_.is_valid(); | 
 | } | 
 |  | 
 | PlatformFile File::GetPlatformFile() const { | 
 |   return file_.get(); | 
 | } | 
 |  | 
 | PlatformFile File::TakePlatformFile() { | 
 |   if (IsValid()) | 
 |     UnprotectFileDescriptor(GetPlatformFile()); | 
 |   return file_.release(); | 
 | } | 
 |  | 
 | void File::Close() { | 
 |   if (!IsValid()) | 
 |     return; | 
 |  | 
 |   base::ThreadRestrictions::AssertIOAllowed(); | 
 |   UnprotectFileDescriptor(GetPlatformFile()); | 
 |   file_.reset(); | 
 | } | 
 |  | 
 | int64 File::Seek(Whence whence, int64 offset) { | 
 |   base::ThreadRestrictions::AssertIOAllowed(); | 
 |   DCHECK(IsValid()); | 
 |  | 
 | #if defined(OS_ANDROID) | 
 |   COMPILE_ASSERT(sizeof(int64) == sizeof(off64_t), off64_t_64_bit); | 
 |   return lseek64(file_.get(), static_cast<off64_t>(offset), | 
 |                  static_cast<int>(whence)); | 
 | #else | 
 |   COMPILE_ASSERT(sizeof(int64) == sizeof(off_t), off_t_64_bit); | 
 |   return lseek(file_.get(), static_cast<off_t>(offset), | 
 |                static_cast<int>(whence)); | 
 | #endif | 
 | } | 
 |  | 
 | int File::Read(int64 offset, char* data, int size) { | 
 |   base::ThreadRestrictions::AssertIOAllowed(); | 
 |   DCHECK(IsValid()); | 
 |   if (size < 0) | 
 |     return -1; | 
 |  | 
 |   int bytes_read = 0; | 
 |   int rv; | 
 |   do { | 
 |     rv = HANDLE_EINTR(pread(file_.get(), data + bytes_read, | 
 |                             size - bytes_read, offset + bytes_read)); | 
 |     if (rv <= 0) | 
 |       break; | 
 |  | 
 |     bytes_read += rv; | 
 |   } while (bytes_read < size); | 
 |  | 
 |   return bytes_read ? bytes_read : rv; | 
 | } | 
 |  | 
 | int File::ReadAtCurrentPos(char* data, int size) { | 
 |   base::ThreadRestrictions::AssertIOAllowed(); | 
 |   DCHECK(IsValid()); | 
 |   if (size < 0) | 
 |     return -1; | 
 |  | 
 |   int bytes_read = 0; | 
 |   int rv; | 
 |   do { | 
 |     rv = HANDLE_EINTR(read(file_.get(), data + bytes_read, size - bytes_read)); | 
 |     if (rv <= 0) | 
 |       break; | 
 |  | 
 |     bytes_read += rv; | 
 |   } while (bytes_read < size); | 
 |  | 
 |   return bytes_read ? bytes_read : rv; | 
 | } | 
 |  | 
 | int File::ReadNoBestEffort(int64 offset, char* data, int size) { | 
 |   base::ThreadRestrictions::AssertIOAllowed(); | 
 |   DCHECK(IsValid()); | 
 |  | 
 |   return HANDLE_EINTR(pread(file_.get(), data, size, offset)); | 
 | } | 
 |  | 
 | int File::ReadAtCurrentPosNoBestEffort(char* data, int size) { | 
 |   base::ThreadRestrictions::AssertIOAllowed(); | 
 |   DCHECK(IsValid()); | 
 |   if (size < 0) | 
 |     return -1; | 
 |  | 
 |   return HANDLE_EINTR(read(file_.get(), data, size)); | 
 | } | 
 |  | 
 | int File::Write(int64 offset, const char* data, int size) { | 
 |   base::ThreadRestrictions::AssertIOAllowed(); | 
 |  | 
 |   if (IsOpenAppend(file_.get())) | 
 |     return WriteAtCurrentPos(data, size); | 
 |  | 
 |   DCHECK(IsValid()); | 
 |   if (size < 0) | 
 |     return -1; | 
 |  | 
 |   int bytes_written = 0; | 
 |   int rv; | 
 |   do { | 
 |     rv = HANDLE_EINTR(pwrite(file_.get(), data + bytes_written, | 
 |                              size - bytes_written, offset + bytes_written)); | 
 |     if (rv <= 0) | 
 |       break; | 
 |  | 
 |     bytes_written += rv; | 
 |   } while (bytes_written < size); | 
 |  | 
 |   return bytes_written ? bytes_written : rv; | 
 | } | 
 |  | 
 | int File::WriteAtCurrentPos(const char* data, int size) { | 
 |   base::ThreadRestrictions::AssertIOAllowed(); | 
 |   DCHECK(IsValid()); | 
 |   if (size < 0) | 
 |     return -1; | 
 |  | 
 |   int bytes_written = 0; | 
 |   int rv; | 
 |   do { | 
 |     rv = HANDLE_EINTR(write(file_.get(), data + bytes_written, | 
 |                             size - bytes_written)); | 
 |     if (rv <= 0) | 
 |       break; | 
 |  | 
 |     bytes_written += rv; | 
 |   } while (bytes_written < size); | 
 |  | 
 |   return bytes_written ? bytes_written : rv; | 
 | } | 
 |  | 
 | int File::WriteAtCurrentPosNoBestEffort(const char* data, int size) { | 
 |   base::ThreadRestrictions::AssertIOAllowed(); | 
 |   DCHECK(IsValid()); | 
 |   if (size < 0) | 
 |     return -1; | 
 |  | 
 |   return HANDLE_EINTR(write(file_.get(), data, size)); | 
 | } | 
 |  | 
 | int64 File::GetLength() { | 
 |   DCHECK(IsValid()); | 
 |  | 
 |   stat_wrapper_t file_info; | 
 |   if (CallFstat(file_.get(), &file_info)) | 
 |     return false; | 
 |  | 
 |   return file_info.st_size; | 
 | } | 
 |  | 
 | bool File::SetLength(int64 length) { | 
 |   base::ThreadRestrictions::AssertIOAllowed(); | 
 |   DCHECK(IsValid()); | 
 |   return !CallFtruncate(file_.get(), length); | 
 | } | 
 |  | 
 | bool File::Flush() { | 
 |   base::ThreadRestrictions::AssertIOAllowed(); | 
 |   DCHECK(IsValid()); | 
 |   return !CallFsync(file_.get()); | 
 | } | 
 |  | 
 | bool File::SetTimes(Time last_access_time, Time last_modified_time) { | 
 |   base::ThreadRestrictions::AssertIOAllowed(); | 
 |   DCHECK(IsValid()); | 
 |  | 
 |   timeval times[2]; | 
 |   times[0] = last_access_time.ToTimeVal(); | 
 |   times[1] = last_modified_time.ToTimeVal(); | 
 |  | 
 |   return !CallFutimes(file_.get(), times); | 
 | } | 
 |  | 
 | bool File::GetInfo(Info* info) { | 
 |   DCHECK(IsValid()); | 
 |  | 
 |   stat_wrapper_t file_info; | 
 |   if (CallFstat(file_.get(), &file_info)) | 
 |     return false; | 
 |  | 
 |   info->FromStat(file_info); | 
 |   return true; | 
 | } | 
 |  | 
 | File::Error File::Lock() { | 
 |   return CallFctnlFlock(file_.get(), true); | 
 | } | 
 |  | 
 | File::Error File::Unlock() { | 
 |   return CallFctnlFlock(file_.get(), false); | 
 | } | 
 |  | 
 | // Static. | 
 | File::Error File::OSErrorToFileError(int saved_errno) { | 
 |   switch (saved_errno) { | 
 |     case EACCES: | 
 |     case EISDIR: | 
 |     case EROFS: | 
 |     case EPERM: | 
 |       return FILE_ERROR_ACCESS_DENIED; | 
 | #if !defined(OS_NACL)  // ETXTBSY not defined by NaCl. | 
 |     case ETXTBSY: | 
 |       return FILE_ERROR_IN_USE; | 
 | #endif | 
 |     case EEXIST: | 
 |       return FILE_ERROR_EXISTS; | 
 |     case ENOENT: | 
 |       return FILE_ERROR_NOT_FOUND; | 
 |     case EMFILE: | 
 |       return FILE_ERROR_TOO_MANY_OPENED; | 
 |     case ENOMEM: | 
 |       return FILE_ERROR_NO_MEMORY; | 
 |     case ENOSPC: | 
 |       return FILE_ERROR_NO_SPACE; | 
 |     case ENOTDIR: | 
 |       return FILE_ERROR_NOT_A_DIRECTORY; | 
 |     default: | 
 | #if !defined(OS_NACL)  // NaCl build has no metrics code. | 
 |       UMA_HISTOGRAM_SPARSE_SLOWLY("PlatformFile.UnknownErrors.Posix", | 
 |                                   saved_errno); | 
 | #endif | 
 |       return FILE_ERROR_FAILED; | 
 |   } | 
 | } | 
 |  | 
 | File::MemoryCheckingScopedFD::MemoryCheckingScopedFD() { | 
 |   UpdateChecksum(); | 
 | } | 
 |  | 
 | File::MemoryCheckingScopedFD::MemoryCheckingScopedFD(int fd) : file_(fd) { | 
 |   UpdateChecksum(); | 
 | } | 
 |  | 
 | File::MemoryCheckingScopedFD::~MemoryCheckingScopedFD() {} | 
 |  | 
 | // static | 
 | void File::MemoryCheckingScopedFD::ComputeMemoryChecksum( | 
 |     unsigned int* out_checksum) const { | 
 |   // Use a single iteration of a linear congruentional generator (lcg) to | 
 |   // provide a cheap checksum unlikely to be accidentally matched by a random | 
 |   // memory corruption. | 
 |  | 
 |   // By choosing constants that satisfy the Hull-Duebell Theorem on lcg cycle | 
 |   // length, we insure that each distinct fd value maps to a distinct checksum, | 
 |   // which maximises the utility of our checksum. | 
 |  | 
 |   // This code uses "unsigned int" throughout for its defined modular semantics, | 
 |   // which implicitly gives us a divisor that is a power of two. | 
 |  | 
 |   const unsigned int kMultiplier = 13035 * 4 + 1; | 
 |   COMPILE_ASSERT(((kMultiplier - 1) & 3) == 0, pred_must_be_multiple_of_four); | 
 |   const unsigned int kIncrement = 1595649551; | 
 |   COMPILE_ASSERT(kIncrement & 1, must_be_coprime_to_powers_of_two); | 
 |  | 
 |   *out_checksum = | 
 |       static_cast<unsigned int>(file_.get()) * kMultiplier + kIncrement; | 
 | } | 
 |  | 
 | void File::MemoryCheckingScopedFD::Check() const { | 
 |   unsigned int computed_checksum; | 
 |   ComputeMemoryChecksum(&computed_checksum); | 
 |   CHECK_EQ(file_memory_checksum_, computed_checksum) << "corrupted fd memory"; | 
 | } | 
 |  | 
 | void File::MemoryCheckingScopedFD::UpdateChecksum() { | 
 |   ComputeMemoryChecksum(&file_memory_checksum_); | 
 | } | 
 |  | 
 | void File::SetPlatformFile(PlatformFile file) { | 
 |   CHECK(!file_.is_valid()); | 
 |   file_.reset(file); | 
 |   if (file_.is_valid()) | 
 |     ProtectFileDescriptor(GetPlatformFile()); | 
 | } | 
 |  | 
 | }  // namespace base |