blob: 663f099f11fa9c7a5770e1ba488793246cef7dd9 [file] [log] [blame]
rvargas@google.comb1ae3192013-11-28 10:31:31 +09001// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
rvargas@chromium.org12938d72013-12-04 09:46:32 +09005#include "base/files/file.h"
rvargas@google.comb1ae3192013-11-28 10:31:31 +09006
rvargas@google.comb1ae3192013-11-28 10:31:31 +09007#include <errno.h>
rvargas@chromium.org12938d72013-12-04 09:46:32 +09008#include <fcntl.h>
rvargas@google.comb1ae3192013-11-28 10:31:31 +09009#include <sys/stat.h>
10#include <unistd.h>
11
12#include "base/files/file_path.h"
pasko63cb6792014-11-18 22:31:36 +090013#include "base/files/file_posix_hooks_internal.h"
rvargas@google.comb1ae3192013-11-28 10:31:31 +090014#include "base/logging.h"
15#include "base/metrics/sparse_histogram.h"
16#include "base/posix/eintr_wrapper.h"
17#include "base/strings/utf_string_conversions.h"
18#include "base/threading/thread_restrictions.h"
19
20#if defined(OS_ANDROID)
21#include "base/os_compat_android.h"
22#endif
23
24namespace base {
25
26// Make sure our Whence mappings match the system headers.
rvargas@chromium.org12938d72013-12-04 09:46:32 +090027COMPILE_ASSERT(File::FROM_BEGIN == SEEK_SET &&
28 File::FROM_CURRENT == SEEK_CUR &&
29 File::FROM_END == SEEK_END, whence_matches_system);
rvargas@google.comb1ae3192013-11-28 10:31:31 +090030
31namespace {
32
33#if defined(OS_BSD) || defined(OS_MACOSX) || defined(OS_NACL)
rvargas@google.comb1ae3192013-11-28 10:31:31 +090034static int CallFstat(int fd, stat_wrapper_t *sb) {
35 base::ThreadRestrictions::AssertIOAllowed();
36 return fstat(fd, sb);
37}
38#else
rvargas@google.comb1ae3192013-11-28 10:31:31 +090039static int CallFstat(int fd, stat_wrapper_t *sb) {
40 base::ThreadRestrictions::AssertIOAllowed();
41 return fstat64(fd, sb);
42}
43#endif
44
45// NaCl doesn't provide the following system calls, so either simulate them or
46// wrap them in order to minimize the number of #ifdef's in this file.
47#if !defined(OS_NACL)
48static bool IsOpenAppend(PlatformFile file) {
49 return (fcntl(file, F_GETFL) & O_APPEND) != 0;
50}
51
52static int CallFtruncate(PlatformFile file, int64 length) {
53 return HANDLE_EINTR(ftruncate(file, length));
54}
55
56static int CallFsync(PlatformFile file) {
57 return HANDLE_EINTR(fsync(file));
58}
59
60static int CallFutimes(PlatformFile file, const struct timeval times[2]) {
61#ifdef __USE_XOPEN2K8
62 // futimens should be available, but futimes might not be
63 // http://pubs.opengroup.org/onlinepubs/9699919799/
64
65 timespec ts_times[2];
66 ts_times[0].tv_sec = times[0].tv_sec;
67 ts_times[0].tv_nsec = times[0].tv_usec * 1000;
68 ts_times[1].tv_sec = times[1].tv_sec;
69 ts_times[1].tv_nsec = times[1].tv_usec * 1000;
70
71 return futimens(file, ts_times);
72#else
73 return futimes(file, times);
74#endif
75}
76
rvargas@chromium.org12938d72013-12-04 09:46:32 +090077static File::Error CallFctnlFlock(PlatformFile file, bool do_lock) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +090078 struct flock lock;
79 lock.l_type = F_WRLCK;
80 lock.l_whence = SEEK_SET;
81 lock.l_start = 0;
82 lock.l_len = 0; // Lock entire file.
83 if (HANDLE_EINTR(fcntl(file, do_lock ? F_SETLK : F_UNLCK, &lock)) == -1)
rvargas@chromium.org12938d72013-12-04 09:46:32 +090084 return File::OSErrorToFileError(errno);
85 return File::FILE_OK;
rvargas@google.comb1ae3192013-11-28 10:31:31 +090086}
87#else // defined(OS_NACL)
88
89static bool IsOpenAppend(PlatformFile file) {
90 // NaCl doesn't implement fcntl. Since NaCl's write conforms to the POSIX
91 // standard and always appends if the file is opened with O_APPEND, just
92 // return false here.
93 return false;
94}
95
96static int CallFtruncate(PlatformFile file, int64 length) {
97 NOTIMPLEMENTED(); // NaCl doesn't implement ftruncate.
98 return 0;
99}
100
101static int CallFsync(PlatformFile file) {
102 NOTIMPLEMENTED(); // NaCl doesn't implement fsync.
103 return 0;
104}
105
106static int CallFutimes(PlatformFile file, const struct timeval times[2]) {
107 NOTIMPLEMENTED(); // NaCl doesn't implement futimes.
108 return 0;
109}
110
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900111static File::Error CallFctnlFlock(PlatformFile file, bool do_lock) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900112 NOTIMPLEMENTED(); // NaCl doesn't implement flock struct.
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900113 return File::FILE_ERROR_INVALID_OPERATION;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900114}
115#endif // defined(OS_NACL)
116
117} // namespace
118
rvargas@chromium.org527ea312014-04-05 11:39:18 +0900119void File::Info::FromStat(const stat_wrapper_t& stat_info) {
120 is_directory = S_ISDIR(stat_info.st_mode);
121 is_symbolic_link = S_ISLNK(stat_info.st_mode);
122 size = stat_info.st_size;
123
124#if defined(OS_LINUX)
125 time_t last_modified_sec = stat_info.st_mtim.tv_sec;
126 int64 last_modified_nsec = stat_info.st_mtim.tv_nsec;
127 time_t last_accessed_sec = stat_info.st_atim.tv_sec;
128 int64 last_accessed_nsec = stat_info.st_atim.tv_nsec;
129 time_t creation_time_sec = stat_info.st_ctim.tv_sec;
130 int64 creation_time_nsec = stat_info.st_ctim.tv_nsec;
131#elif defined(OS_ANDROID)
132 time_t last_modified_sec = stat_info.st_mtime;
133 int64 last_modified_nsec = stat_info.st_mtime_nsec;
134 time_t last_accessed_sec = stat_info.st_atime;
135 int64 last_accessed_nsec = stat_info.st_atime_nsec;
136 time_t creation_time_sec = stat_info.st_ctime;
137 int64 creation_time_nsec = stat_info.st_ctime_nsec;
138#elif defined(OS_MACOSX) || defined(OS_IOS) || defined(OS_BSD)
139 time_t last_modified_sec = stat_info.st_mtimespec.tv_sec;
140 int64 last_modified_nsec = stat_info.st_mtimespec.tv_nsec;
141 time_t last_accessed_sec = stat_info.st_atimespec.tv_sec;
142 int64 last_accessed_nsec = stat_info.st_atimespec.tv_nsec;
143 time_t creation_time_sec = stat_info.st_ctimespec.tv_sec;
144 int64 creation_time_nsec = stat_info.st_ctimespec.tv_nsec;
145#else
146 time_t last_modified_sec = stat_info.st_mtime;
147 int64 last_modified_nsec = 0;
148 time_t last_accessed_sec = stat_info.st_atime;
149 int64 last_accessed_nsec = 0;
150 time_t creation_time_sec = stat_info.st_ctime;
151 int64 creation_time_nsec = 0;
152#endif
153
154 last_modified =
155 Time::FromTimeT(last_modified_sec) +
156 TimeDelta::FromMicroseconds(last_modified_nsec /
157 Time::kNanosecondsPerMicrosecond);
158
159 last_accessed =
160 Time::FromTimeT(last_accessed_sec) +
161 TimeDelta::FromMicroseconds(last_accessed_nsec /
162 Time::kNanosecondsPerMicrosecond);
163
164 creation_time =
165 Time::FromTimeT(creation_time_sec) +
166 TimeDelta::FromMicroseconds(creation_time_nsec /
167 Time::kNanosecondsPerMicrosecond);
168}
169
pasko63cb6792014-11-18 22:31:36 +0900170// Default implementations of Protect/Unprotect hooks defined as weak symbols
171// where possible.
172void ProtectFileDescriptor(int fd) {
173}
174
175void UnprotectFileDescriptor(int fd) {
176}
177
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900178// NaCl doesn't implement system calls to open files directly.
179#if !defined(OS_NACL)
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900180// TODO(erikkay): does it make sense to support FLAG_EXCLUSIVE_* here?
rvargas@chromium.orge207eae2014-01-04 07:14:15 +0900181void File::InitializeUnsafe(const FilePath& name, uint32 flags) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900182 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900183 DCHECK(!IsValid());
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900184
185 int open_flags = 0;
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900186 if (flags & FLAG_CREATE)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900187 open_flags = O_CREAT | O_EXCL;
188
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900189 created_ = false;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900190
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900191 if (flags & FLAG_CREATE_ALWAYS) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900192 DCHECK(!open_flags);
mdempsky@chromium.org6acba392014-06-11 03:37:56 +0900193 DCHECK(flags & FLAG_WRITE);
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900194 open_flags = O_CREAT | O_TRUNC;
195 }
196
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900197 if (flags & FLAG_OPEN_TRUNCATED) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900198 DCHECK(!open_flags);
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900199 DCHECK(flags & FLAG_WRITE);
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900200 open_flags = O_TRUNC;
201 }
202
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900203 if (!open_flags && !(flags & FLAG_OPEN) && !(flags & FLAG_OPEN_ALWAYS)) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900204 NOTREACHED();
205 errno = EOPNOTSUPP;
rvargas@chromium.org9cce0322014-01-09 07:30:21 +0900206 error_details_ = FILE_ERROR_FAILED;
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900207 return;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900208 }
209
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900210 if (flags & FLAG_WRITE && flags & FLAG_READ) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900211 open_flags |= O_RDWR;
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900212 } else if (flags & FLAG_WRITE) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900213 open_flags |= O_WRONLY;
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900214 } else if (!(flags & FLAG_READ) &&
215 !(flags & FLAG_WRITE_ATTRIBUTES) &&
216 !(flags & FLAG_APPEND) &&
217 !(flags & FLAG_OPEN_ALWAYS)) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900218 NOTREACHED();
219 }
220
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900221 if (flags & FLAG_TERMINAL_DEVICE)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900222 open_flags |= O_NOCTTY | O_NDELAY;
223
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900224 if (flags & FLAG_APPEND && flags & FLAG_READ)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900225 open_flags |= O_APPEND | O_RDWR;
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900226 else if (flags & FLAG_APPEND)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900227 open_flags |= O_APPEND | O_WRONLY;
228
229 COMPILE_ASSERT(O_RDONLY == 0, O_RDONLY_must_equal_zero);
230
231 int mode = S_IRUSR | S_IWUSR;
232#if defined(OS_CHROMEOS)
233 mode |= S_IRGRP | S_IROTH;
234#endif
235
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900236 int descriptor = HANDLE_EINTR(open(name.value().c_str(), open_flags, mode));
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900237
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900238 if (flags & FLAG_OPEN_ALWAYS) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900239 if (descriptor < 0) {
240 open_flags |= O_CREAT;
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900241 if (flags & FLAG_EXCLUSIVE_READ || flags & FLAG_EXCLUSIVE_WRITE)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900242 open_flags |= O_EXCL; // together with O_CREAT implies O_NOFOLLOW
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900243
244 descriptor = HANDLE_EINTR(open(name.value().c_str(), open_flags, mode));
245 if (descriptor >= 0)
246 created_ = true;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900247 }
248 }
249
rvargas@chromium.org799ba6c2014-03-21 09:41:15 +0900250 if (descriptor < 0) {
251 error_details_ = File::OSErrorToFileError(errno);
252 return;
253 }
254
255 if (flags & (FLAG_CREATE_ALWAYS | FLAG_CREATE))
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900256 created_ = true;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900257
rvargas@chromium.org799ba6c2014-03-21 09:41:15 +0900258 if (flags & FLAG_DELETE_ON_CLOSE)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900259 unlink(name.value().c_str());
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900260
rvargas@chromium.org799ba6c2014-03-21 09:41:15 +0900261 async_ = ((flags & FLAG_ASYNC) == FLAG_ASYNC);
262 error_details_ = FILE_OK;
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900263 file_.reset(descriptor);
pasko63cb6792014-11-18 22:31:36 +0900264 ProtectFileDescriptor(descriptor);
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900265}
266#endif // !defined(OS_NACL)
267
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900268bool File::IsValid() const {
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900269 return file_.is_valid();
270}
271
272PlatformFile File::GetPlatformFile() const {
273 return file_.get();
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900274}
275
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900276PlatformFile File::TakePlatformFile() {
pasko63cb6792014-11-18 22:31:36 +0900277 if (IsValid())
278 UnprotectFileDescriptor(GetPlatformFile());
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900279 return file_.release();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900280}
281
282void File::Close() {
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900283 if (!IsValid())
284 return;
285
rvargas@chromium.orgd10db2d2014-02-22 02:25:53 +0900286 base::ThreadRestrictions::AssertIOAllowed();
pasko63cb6792014-11-18 22:31:36 +0900287 UnprotectFileDescriptor(GetPlatformFile());
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900288 file_.reset();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900289}
290
291int64 File::Seek(Whence whence, int64 offset) {
292 base::ThreadRestrictions::AssertIOAllowed();
293 DCHECK(IsValid());
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900294
rvargas@chromium.orgba1a9542014-06-21 08:30:18 +0900295#if defined(OS_ANDROID)
296 COMPILE_ASSERT(sizeof(int64) == sizeof(off64_t), off64_t_64_bit);
297 return lseek64(file_.get(), static_cast<off64_t>(offset),
298 static_cast<int>(whence));
299#else
300 COMPILE_ASSERT(sizeof(int64) == sizeof(off_t), off_t_64_bit);
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900301 return lseek(file_.get(), static_cast<off_t>(offset),
302 static_cast<int>(whence));
rvargas@chromium.orgba1a9542014-06-21 08:30:18 +0900303#endif
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900304}
305
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900306int File::Read(int64 offset, char* data, int size) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900307 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900308 DCHECK(IsValid());
309 if (size < 0)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900310 return -1;
311
312 int bytes_read = 0;
313 int rv;
314 do {
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900315 rv = HANDLE_EINTR(pread(file_.get(), data + bytes_read,
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900316 size - bytes_read, offset + bytes_read));
317 if (rv <= 0)
318 break;
319
320 bytes_read += rv;
321 } while (bytes_read < size);
322
323 return bytes_read ? bytes_read : rv;
324}
325
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900326int File::ReadAtCurrentPos(char* data, int size) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900327 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900328 DCHECK(IsValid());
329 if (size < 0)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900330 return -1;
331
332 int bytes_read = 0;
333 int rv;
334 do {
hashimoto@chromium.org94f5b7d2014-04-01 07:18:09 +0900335 rv = HANDLE_EINTR(read(file_.get(), data + bytes_read, size - bytes_read));
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900336 if (rv <= 0)
337 break;
338
339 bytes_read += rv;
340 } while (bytes_read < size);
341
342 return bytes_read ? bytes_read : rv;
343}
344
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900345int File::ReadNoBestEffort(int64 offset, char* data, int size) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900346 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900347 DCHECK(IsValid());
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900348
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900349 return HANDLE_EINTR(pread(file_.get(), data, size, offset));
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900350}
351
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900352int File::ReadAtCurrentPosNoBestEffort(char* data, int size) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900353 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900354 DCHECK(IsValid());
355 if (size < 0)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900356 return -1;
357
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900358 return HANDLE_EINTR(read(file_.get(), data, size));
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900359}
360
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900361int File::Write(int64 offset, const char* data, int size) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900362 base::ThreadRestrictions::AssertIOAllowed();
363
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900364 if (IsOpenAppend(file_.get()))
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900365 return WriteAtCurrentPos(data, size);
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900366
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900367 DCHECK(IsValid());
368 if (size < 0)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900369 return -1;
370
371 int bytes_written = 0;
372 int rv;
373 do {
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900374 rv = HANDLE_EINTR(pwrite(file_.get(), data + bytes_written,
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900375 size - bytes_written, offset + bytes_written));
376 if (rv <= 0)
377 break;
378
379 bytes_written += rv;
380 } while (bytes_written < size);
381
382 return bytes_written ? bytes_written : rv;
383}
384
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900385int File::WriteAtCurrentPos(const char* data, int size) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900386 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900387 DCHECK(IsValid());
388 if (size < 0)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900389 return -1;
390
391 int bytes_written = 0;
392 int rv;
393 do {
hashimoto@chromium.org94f5b7d2014-04-01 07:18:09 +0900394 rv = HANDLE_EINTR(write(file_.get(), data + bytes_written,
395 size - bytes_written));
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900396 if (rv <= 0)
397 break;
398
399 bytes_written += rv;
400 } while (bytes_written < size);
401
402 return bytes_written ? bytes_written : rv;
403}
404
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900405int File::WriteAtCurrentPosNoBestEffort(const char* data, int size) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900406 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900407 DCHECK(IsValid());
408 if (size < 0)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900409 return -1;
410
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900411 return HANDLE_EINTR(write(file_.get(), data, size));
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900412}
413
rvargas@chromium.orge207eae2014-01-04 07:14:15 +0900414int64 File::GetLength() {
415 DCHECK(IsValid());
416
417 stat_wrapper_t file_info;
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900418 if (CallFstat(file_.get(), &file_info))
rvargas@chromium.orge207eae2014-01-04 07:14:15 +0900419 return false;
420
421 return file_info.st_size;
422}
423
424bool File::SetLength(int64 length) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900425 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900426 DCHECK(IsValid());
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900427 return !CallFtruncate(file_.get(), length);
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900428}
429
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900430bool File::Flush() {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900431 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900432 DCHECK(IsValid());
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900433 return !CallFsync(file_.get());
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900434}
435
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900436bool File::SetTimes(Time last_access_time, Time last_modified_time) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900437 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900438 DCHECK(IsValid());
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900439
440 timeval times[2];
441 times[0] = last_access_time.ToTimeVal();
442 times[1] = last_modified_time.ToTimeVal();
443
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900444 return !CallFutimes(file_.get(), times);
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900445}
446
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900447bool File::GetInfo(Info* info) {
448 DCHECK(IsValid());
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900449
450 stat_wrapper_t file_info;
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900451 if (CallFstat(file_.get(), &file_info))
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900452 return false;
453
rvargas@chromium.org527ea312014-04-05 11:39:18 +0900454 info->FromStat(file_info);
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900455 return true;
456}
457
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900458File::Error File::Lock() {
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900459 return CallFctnlFlock(file_.get(), true);
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900460}
461
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900462File::Error File::Unlock() {
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900463 return CallFctnlFlock(file_.get(), false);
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900464}
465
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900466// Static.
467File::Error File::OSErrorToFileError(int saved_errno) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900468 switch (saved_errno) {
469 case EACCES:
470 case EISDIR:
471 case EROFS:
472 case EPERM:
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900473 return FILE_ERROR_ACCESS_DENIED;
cmumford2eb66922015-03-14 04:35:02 +0900474 case EBUSY:
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900475#if !defined(OS_NACL) // ETXTBSY not defined by NaCl.
476 case ETXTBSY:
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900477#endif
cmumford2eb66922015-03-14 04:35:02 +0900478 return FILE_ERROR_IN_USE;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900479 case EEXIST:
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900480 return FILE_ERROR_EXISTS;
cmumford2eb66922015-03-14 04:35:02 +0900481 case EIO:
482 return FILE_ERROR_IO;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900483 case ENOENT:
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900484 return FILE_ERROR_NOT_FOUND;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900485 case EMFILE:
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900486 return FILE_ERROR_TOO_MANY_OPENED;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900487 case ENOMEM:
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900488 return FILE_ERROR_NO_MEMORY;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900489 case ENOSPC:
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900490 return FILE_ERROR_NO_SPACE;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900491 case ENOTDIR:
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900492 return FILE_ERROR_NOT_A_DIRECTORY;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900493 default:
494#if !defined(OS_NACL) // NaCl build has no metrics code.
495 UMA_HISTOGRAM_SPARSE_SLOWLY("PlatformFile.UnknownErrors.Posix",
496 saved_errno);
497#endif
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900498 return FILE_ERROR_FAILED;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900499 }
500}
501
gavinpb7467662014-11-08 02:46:12 +0900502File::MemoryCheckingScopedFD::MemoryCheckingScopedFD() {
503 UpdateChecksum();
504}
505
506File::MemoryCheckingScopedFD::MemoryCheckingScopedFD(int fd) : file_(fd) {
507 UpdateChecksum();
508}
509
510File::MemoryCheckingScopedFD::~MemoryCheckingScopedFD() {}
511
512// static
513void File::MemoryCheckingScopedFD::ComputeMemoryChecksum(
514 unsigned int* out_checksum) const {
515 // Use a single iteration of a linear congruentional generator (lcg) to
516 // provide a cheap checksum unlikely to be accidentally matched by a random
517 // memory corruption.
518
519 // By choosing constants that satisfy the Hull-Duebell Theorem on lcg cycle
520 // length, we insure that each distinct fd value maps to a distinct checksum,
521 // which maximises the utility of our checksum.
522
523 // This code uses "unsigned int" throughout for its defined modular semantics,
524 // which implicitly gives us a divisor that is a power of two.
525
526 const unsigned int kMultiplier = 13035 * 4 + 1;
527 COMPILE_ASSERT(((kMultiplier - 1) & 3) == 0, pred_must_be_multiple_of_four);
528 const unsigned int kIncrement = 1595649551;
529 COMPILE_ASSERT(kIncrement & 1, must_be_coprime_to_powers_of_two);
530
531 *out_checksum =
532 static_cast<unsigned int>(file_.get()) * kMultiplier + kIncrement;
533}
534
535void File::MemoryCheckingScopedFD::Check() const {
536 unsigned int computed_checksum;
537 ComputeMemoryChecksum(&computed_checksum);
538 CHECK_EQ(file_memory_checksum_, computed_checksum) << "corrupted fd memory";
539}
540
541void File::MemoryCheckingScopedFD::UpdateChecksum() {
542 ComputeMemoryChecksum(&file_memory_checksum_);
543}
544
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900545void File::SetPlatformFile(PlatformFile file) {
pasko63cb6792014-11-18 22:31:36 +0900546 CHECK(!file_.is_valid());
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900547 file_.reset(file);
pasko63cb6792014-11-18 22:31:36 +0900548 if (file_.is_valid())
549 ProtectFileDescriptor(GetPlatformFile());
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900550}
551
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900552} // namespace base