blob: 3d229e4155e6e3fea41c7f2725e07be24ebef368 [file] [log] [blame]
rvargas@google.comb1ae3192013-11-28 10:31:31 +09001// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
rvargas@chromium.org12938d72013-12-04 09:46:32 +09005#include "base/files/file.h"
rvargas@google.comb1ae3192013-11-28 10:31:31 +09006
rvargas@google.comb1ae3192013-11-28 10:31:31 +09007#include <errno.h>
rvargas@chromium.org12938d72013-12-04 09:46:32 +09008#include <fcntl.h>
rvargas@google.comb1ae3192013-11-28 10:31:31 +09009#include <sys/stat.h>
10#include <unistd.h>
11
12#include "base/files/file_path.h"
13#include "base/logging.h"
14#include "base/metrics/sparse_histogram.h"
15#include "base/posix/eintr_wrapper.h"
16#include "base/strings/utf_string_conversions.h"
17#include "base/threading/thread_restrictions.h"
18
19#if defined(OS_ANDROID)
20#include "base/os_compat_android.h"
21#endif
22
23namespace base {
24
25// Make sure our Whence mappings match the system headers.
rvargas@chromium.org12938d72013-12-04 09:46:32 +090026COMPILE_ASSERT(File::FROM_BEGIN == SEEK_SET &&
27 File::FROM_CURRENT == SEEK_CUR &&
28 File::FROM_END == SEEK_END, whence_matches_system);
rvargas@google.comb1ae3192013-11-28 10:31:31 +090029
30namespace {
31
32#if defined(OS_BSD) || defined(OS_MACOSX) || defined(OS_NACL)
rvargas@google.comb1ae3192013-11-28 10:31:31 +090033static int CallFstat(int fd, stat_wrapper_t *sb) {
34 base::ThreadRestrictions::AssertIOAllowed();
35 return fstat(fd, sb);
36}
37#else
rvargas@google.comb1ae3192013-11-28 10:31:31 +090038static int CallFstat(int fd, stat_wrapper_t *sb) {
39 base::ThreadRestrictions::AssertIOAllowed();
40 return fstat64(fd, sb);
41}
42#endif
43
44// NaCl doesn't provide the following system calls, so either simulate them or
45// wrap them in order to minimize the number of #ifdef's in this file.
46#if !defined(OS_NACL)
47static bool IsOpenAppend(PlatformFile file) {
48 return (fcntl(file, F_GETFL) & O_APPEND) != 0;
49}
50
51static int CallFtruncate(PlatformFile file, int64 length) {
52 return HANDLE_EINTR(ftruncate(file, length));
53}
54
55static int CallFsync(PlatformFile file) {
56 return HANDLE_EINTR(fsync(file));
57}
58
59static int CallFutimes(PlatformFile file, const struct timeval times[2]) {
60#ifdef __USE_XOPEN2K8
61 // futimens should be available, but futimes might not be
62 // http://pubs.opengroup.org/onlinepubs/9699919799/
63
64 timespec ts_times[2];
65 ts_times[0].tv_sec = times[0].tv_sec;
66 ts_times[0].tv_nsec = times[0].tv_usec * 1000;
67 ts_times[1].tv_sec = times[1].tv_sec;
68 ts_times[1].tv_nsec = times[1].tv_usec * 1000;
69
70 return futimens(file, ts_times);
71#else
72 return futimes(file, times);
73#endif
74}
75
rvargas@chromium.org12938d72013-12-04 09:46:32 +090076static File::Error CallFctnlFlock(PlatformFile file, bool do_lock) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +090077 struct flock lock;
78 lock.l_type = F_WRLCK;
79 lock.l_whence = SEEK_SET;
80 lock.l_start = 0;
81 lock.l_len = 0; // Lock entire file.
82 if (HANDLE_EINTR(fcntl(file, do_lock ? F_SETLK : F_UNLCK, &lock)) == -1)
rvargas@chromium.org12938d72013-12-04 09:46:32 +090083 return File::OSErrorToFileError(errno);
84 return File::FILE_OK;
rvargas@google.comb1ae3192013-11-28 10:31:31 +090085}
86#else // defined(OS_NACL)
87
88static bool IsOpenAppend(PlatformFile file) {
89 // NaCl doesn't implement fcntl. Since NaCl's write conforms to the POSIX
90 // standard and always appends if the file is opened with O_APPEND, just
91 // return false here.
92 return false;
93}
94
95static int CallFtruncate(PlatformFile file, int64 length) {
96 NOTIMPLEMENTED(); // NaCl doesn't implement ftruncate.
97 return 0;
98}
99
100static int CallFsync(PlatformFile file) {
101 NOTIMPLEMENTED(); // NaCl doesn't implement fsync.
102 return 0;
103}
104
105static int CallFutimes(PlatformFile file, const struct timeval times[2]) {
106 NOTIMPLEMENTED(); // NaCl doesn't implement futimes.
107 return 0;
108}
109
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900110static File::Error CallFctnlFlock(PlatformFile file, bool do_lock) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900111 NOTIMPLEMENTED(); // NaCl doesn't implement flock struct.
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900112 return File::FILE_ERROR_INVALID_OPERATION;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900113}
114#endif // defined(OS_NACL)
115
116} // namespace
117
rvargas@chromium.org527ea312014-04-05 11:39:18 +0900118void File::Info::FromStat(const stat_wrapper_t& stat_info) {
119 is_directory = S_ISDIR(stat_info.st_mode);
120 is_symbolic_link = S_ISLNK(stat_info.st_mode);
121 size = stat_info.st_size;
122
123#if defined(OS_LINUX)
124 time_t last_modified_sec = stat_info.st_mtim.tv_sec;
125 int64 last_modified_nsec = stat_info.st_mtim.tv_nsec;
126 time_t last_accessed_sec = stat_info.st_atim.tv_sec;
127 int64 last_accessed_nsec = stat_info.st_atim.tv_nsec;
128 time_t creation_time_sec = stat_info.st_ctim.tv_sec;
129 int64 creation_time_nsec = stat_info.st_ctim.tv_nsec;
130#elif defined(OS_ANDROID)
131 time_t last_modified_sec = stat_info.st_mtime;
132 int64 last_modified_nsec = stat_info.st_mtime_nsec;
133 time_t last_accessed_sec = stat_info.st_atime;
134 int64 last_accessed_nsec = stat_info.st_atime_nsec;
135 time_t creation_time_sec = stat_info.st_ctime;
136 int64 creation_time_nsec = stat_info.st_ctime_nsec;
137#elif defined(OS_MACOSX) || defined(OS_IOS) || defined(OS_BSD)
138 time_t last_modified_sec = stat_info.st_mtimespec.tv_sec;
139 int64 last_modified_nsec = stat_info.st_mtimespec.tv_nsec;
140 time_t last_accessed_sec = stat_info.st_atimespec.tv_sec;
141 int64 last_accessed_nsec = stat_info.st_atimespec.tv_nsec;
142 time_t creation_time_sec = stat_info.st_ctimespec.tv_sec;
143 int64 creation_time_nsec = stat_info.st_ctimespec.tv_nsec;
144#else
145 time_t last_modified_sec = stat_info.st_mtime;
146 int64 last_modified_nsec = 0;
147 time_t last_accessed_sec = stat_info.st_atime;
148 int64 last_accessed_nsec = 0;
149 time_t creation_time_sec = stat_info.st_ctime;
150 int64 creation_time_nsec = 0;
151#endif
152
153 last_modified =
154 Time::FromTimeT(last_modified_sec) +
155 TimeDelta::FromMicroseconds(last_modified_nsec /
156 Time::kNanosecondsPerMicrosecond);
157
158 last_accessed =
159 Time::FromTimeT(last_accessed_sec) +
160 TimeDelta::FromMicroseconds(last_accessed_nsec /
161 Time::kNanosecondsPerMicrosecond);
162
163 creation_time =
164 Time::FromTimeT(creation_time_sec) +
165 TimeDelta::FromMicroseconds(creation_time_nsec /
166 Time::kNanosecondsPerMicrosecond);
167}
168
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900169// NaCl doesn't implement system calls to open files directly.
170#if !defined(OS_NACL)
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900171// TODO(erikkay): does it make sense to support FLAG_EXCLUSIVE_* here?
rvargas@chromium.orge207eae2014-01-04 07:14:15 +0900172void File::InitializeUnsafe(const FilePath& name, uint32 flags) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900173 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900174 DCHECK(!IsValid());
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900175
176 int open_flags = 0;
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900177 if (flags & FLAG_CREATE)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900178 open_flags = O_CREAT | O_EXCL;
179
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900180 created_ = false;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900181
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900182 if (flags & FLAG_CREATE_ALWAYS) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900183 DCHECK(!open_flags);
mdempsky@chromium.org6acba392014-06-11 03:37:56 +0900184 DCHECK(flags & FLAG_WRITE);
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900185 open_flags = O_CREAT | O_TRUNC;
186 }
187
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900188 if (flags & FLAG_OPEN_TRUNCATED) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900189 DCHECK(!open_flags);
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900190 DCHECK(flags & FLAG_WRITE);
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900191 open_flags = O_TRUNC;
192 }
193
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900194 if (!open_flags && !(flags & FLAG_OPEN) && !(flags & FLAG_OPEN_ALWAYS)) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900195 NOTREACHED();
196 errno = EOPNOTSUPP;
rvargas@chromium.org9cce0322014-01-09 07:30:21 +0900197 error_details_ = FILE_ERROR_FAILED;
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900198 return;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900199 }
200
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900201 if (flags & FLAG_WRITE && flags & FLAG_READ) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900202 open_flags |= O_RDWR;
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900203 } else if (flags & FLAG_WRITE) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900204 open_flags |= O_WRONLY;
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900205 } else if (!(flags & FLAG_READ) &&
206 !(flags & FLAG_WRITE_ATTRIBUTES) &&
207 !(flags & FLAG_APPEND) &&
208 !(flags & FLAG_OPEN_ALWAYS)) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900209 NOTREACHED();
210 }
211
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900212 if (flags & FLAG_TERMINAL_DEVICE)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900213 open_flags |= O_NOCTTY | O_NDELAY;
214
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900215 if (flags & FLAG_APPEND && flags & FLAG_READ)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900216 open_flags |= O_APPEND | O_RDWR;
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900217 else if (flags & FLAG_APPEND)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900218 open_flags |= O_APPEND | O_WRONLY;
219
220 COMPILE_ASSERT(O_RDONLY == 0, O_RDONLY_must_equal_zero);
221
222 int mode = S_IRUSR | S_IWUSR;
223#if defined(OS_CHROMEOS)
224 mode |= S_IRGRP | S_IROTH;
225#endif
226
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900227 int descriptor = HANDLE_EINTR(open(name.value().c_str(), open_flags, mode));
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900228
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900229 if (flags & FLAG_OPEN_ALWAYS) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900230 if (descriptor < 0) {
231 open_flags |= O_CREAT;
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900232 if (flags & FLAG_EXCLUSIVE_READ || flags & FLAG_EXCLUSIVE_WRITE)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900233 open_flags |= O_EXCL; // together with O_CREAT implies O_NOFOLLOW
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900234
235 descriptor = HANDLE_EINTR(open(name.value().c_str(), open_flags, mode));
236 if (descriptor >= 0)
237 created_ = true;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900238 }
239 }
240
rvargas@chromium.org799ba6c2014-03-21 09:41:15 +0900241 if (descriptor < 0) {
242 error_details_ = File::OSErrorToFileError(errno);
243 return;
244 }
245
246 if (flags & (FLAG_CREATE_ALWAYS | FLAG_CREATE))
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900247 created_ = true;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900248
rvargas@chromium.org799ba6c2014-03-21 09:41:15 +0900249 if (flags & FLAG_DELETE_ON_CLOSE)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900250 unlink(name.value().c_str());
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900251
rvargas@chromium.org799ba6c2014-03-21 09:41:15 +0900252 async_ = ((flags & FLAG_ASYNC) == FLAG_ASYNC);
253 error_details_ = FILE_OK;
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900254 file_.reset(descriptor);
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900255}
256#endif // !defined(OS_NACL)
257
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900258bool File::IsValid() const {
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900259 return file_.is_valid();
260}
261
262PlatformFile File::GetPlatformFile() const {
263 return file_.get();
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900264}
265
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900266PlatformFile File::TakePlatformFile() {
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900267 return file_.release();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900268}
269
270void File::Close() {
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900271 if (!IsValid())
272 return;
273
rvargas@chromium.orgd10db2d2014-02-22 02:25:53 +0900274 base::ThreadRestrictions::AssertIOAllowed();
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900275 file_.reset();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900276}
277
278int64 File::Seek(Whence whence, int64 offset) {
279 base::ThreadRestrictions::AssertIOAllowed();
280 DCHECK(IsValid());
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900281
rvargas@chromium.orgba1a9542014-06-21 08:30:18 +0900282#if defined(OS_ANDROID)
283 COMPILE_ASSERT(sizeof(int64) == sizeof(off64_t), off64_t_64_bit);
284 return lseek64(file_.get(), static_cast<off64_t>(offset),
285 static_cast<int>(whence));
286#else
287 COMPILE_ASSERT(sizeof(int64) == sizeof(off_t), off_t_64_bit);
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900288 return lseek(file_.get(), static_cast<off_t>(offset),
289 static_cast<int>(whence));
rvargas@chromium.orgba1a9542014-06-21 08:30:18 +0900290#endif
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900291}
292
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900293int File::Read(int64 offset, char* data, int size) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900294 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900295 DCHECK(IsValid());
296 if (size < 0)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900297 return -1;
298
299 int bytes_read = 0;
300 int rv;
301 do {
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900302 rv = HANDLE_EINTR(pread(file_.get(), data + bytes_read,
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900303 size - bytes_read, offset + bytes_read));
304 if (rv <= 0)
305 break;
306
307 bytes_read += rv;
308 } while (bytes_read < size);
309
310 return bytes_read ? bytes_read : rv;
311}
312
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900313int File::ReadAtCurrentPos(char* data, int size) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900314 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900315 DCHECK(IsValid());
316 if (size < 0)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900317 return -1;
318
319 int bytes_read = 0;
320 int rv;
321 do {
hashimoto@chromium.org94f5b7d2014-04-01 07:18:09 +0900322 rv = HANDLE_EINTR(read(file_.get(), data + bytes_read, size - bytes_read));
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900323 if (rv <= 0)
324 break;
325
326 bytes_read += rv;
327 } while (bytes_read < size);
328
329 return bytes_read ? bytes_read : rv;
330}
331
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900332int File::ReadNoBestEffort(int64 offset, char* data, int size) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900333 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900334 DCHECK(IsValid());
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900335
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900336 return HANDLE_EINTR(pread(file_.get(), data, size, offset));
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900337}
338
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900339int File::ReadAtCurrentPosNoBestEffort(char* data, int size) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900340 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900341 DCHECK(IsValid());
342 if (size < 0)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900343 return -1;
344
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900345 return HANDLE_EINTR(read(file_.get(), data, size));
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900346}
347
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900348int File::Write(int64 offset, const char* data, int size) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900349 base::ThreadRestrictions::AssertIOAllowed();
350
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900351 if (IsOpenAppend(file_.get()))
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900352 return WriteAtCurrentPos(data, size);
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900353
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900354 DCHECK(IsValid());
355 if (size < 0)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900356 return -1;
357
358 int bytes_written = 0;
359 int rv;
360 do {
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900361 rv = HANDLE_EINTR(pwrite(file_.get(), data + bytes_written,
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900362 size - bytes_written, offset + bytes_written));
363 if (rv <= 0)
364 break;
365
366 bytes_written += rv;
367 } while (bytes_written < size);
368
369 return bytes_written ? bytes_written : rv;
370}
371
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900372int File::WriteAtCurrentPos(const char* data, int size) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900373 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900374 DCHECK(IsValid());
375 if (size < 0)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900376 return -1;
377
378 int bytes_written = 0;
379 int rv;
380 do {
hashimoto@chromium.org94f5b7d2014-04-01 07:18:09 +0900381 rv = HANDLE_EINTR(write(file_.get(), data + bytes_written,
382 size - bytes_written));
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900383 if (rv <= 0)
384 break;
385
386 bytes_written += rv;
387 } while (bytes_written < size);
388
389 return bytes_written ? bytes_written : rv;
390}
391
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900392int File::WriteAtCurrentPosNoBestEffort(const char* data, int size) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900393 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900394 DCHECK(IsValid());
395 if (size < 0)
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900396 return -1;
397
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900398 return HANDLE_EINTR(write(file_.get(), data, size));
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900399}
400
rvargas@chromium.orge207eae2014-01-04 07:14:15 +0900401int64 File::GetLength() {
402 DCHECK(IsValid());
403
404 stat_wrapper_t file_info;
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900405 if (CallFstat(file_.get(), &file_info))
rvargas@chromium.orge207eae2014-01-04 07:14:15 +0900406 return false;
407
408 return file_info.st_size;
409}
410
411bool File::SetLength(int64 length) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900412 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900413 DCHECK(IsValid());
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900414 return !CallFtruncate(file_.get(), length);
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900415}
416
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900417bool File::Flush() {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900418 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900419 DCHECK(IsValid());
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900420 return !CallFsync(file_.get());
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900421}
422
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900423bool File::SetTimes(Time last_access_time, Time last_modified_time) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900424 base::ThreadRestrictions::AssertIOAllowed();
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900425 DCHECK(IsValid());
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900426
427 timeval times[2];
428 times[0] = last_access_time.ToTimeVal();
429 times[1] = last_modified_time.ToTimeVal();
430
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900431 return !CallFutimes(file_.get(), times);
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900432}
433
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900434bool File::GetInfo(Info* info) {
435 DCHECK(IsValid());
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900436
437 stat_wrapper_t file_info;
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900438 if (CallFstat(file_.get(), &file_info))
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900439 return false;
440
rvargas@chromium.org527ea312014-04-05 11:39:18 +0900441 info->FromStat(file_info);
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900442 return true;
443}
444
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900445File::Error File::Lock() {
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900446 return CallFctnlFlock(file_.get(), true);
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900447}
448
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900449File::Error File::Unlock() {
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900450 return CallFctnlFlock(file_.get(), false);
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900451}
452
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900453// Static.
454File::Error File::OSErrorToFileError(int saved_errno) {
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900455 switch (saved_errno) {
456 case EACCES:
457 case EISDIR:
458 case EROFS:
459 case EPERM:
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900460 return FILE_ERROR_ACCESS_DENIED;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900461#if !defined(OS_NACL) // ETXTBSY not defined by NaCl.
462 case ETXTBSY:
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900463 return FILE_ERROR_IN_USE;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900464#endif
465 case EEXIST:
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900466 return FILE_ERROR_EXISTS;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900467 case ENOENT:
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900468 return FILE_ERROR_NOT_FOUND;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900469 case EMFILE:
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900470 return FILE_ERROR_TOO_MANY_OPENED;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900471 case ENOMEM:
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900472 return FILE_ERROR_NO_MEMORY;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900473 case ENOSPC:
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900474 return FILE_ERROR_NO_SPACE;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900475 case ENOTDIR:
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900476 return FILE_ERROR_NOT_A_DIRECTORY;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900477 default:
478#if !defined(OS_NACL) // NaCl build has no metrics code.
479 UMA_HISTOGRAM_SPARSE_SLOWLY("PlatformFile.UnknownErrors.Posix",
480 saved_errno);
481#endif
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900482 return FILE_ERROR_FAILED;
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900483 }
484}
485
gavinpb7467662014-11-08 02:46:12 +0900486File::MemoryCheckingScopedFD::MemoryCheckingScopedFD() {
487 UpdateChecksum();
488}
489
490File::MemoryCheckingScopedFD::MemoryCheckingScopedFD(int fd) : file_(fd) {
491 UpdateChecksum();
492}
493
494File::MemoryCheckingScopedFD::~MemoryCheckingScopedFD() {}
495
496// static
497void File::MemoryCheckingScopedFD::ComputeMemoryChecksum(
498 unsigned int* out_checksum) const {
499 // Use a single iteration of a linear congruentional generator (lcg) to
500 // provide a cheap checksum unlikely to be accidentally matched by a random
501 // memory corruption.
502
503 // By choosing constants that satisfy the Hull-Duebell Theorem on lcg cycle
504 // length, we insure that each distinct fd value maps to a distinct checksum,
505 // which maximises the utility of our checksum.
506
507 // This code uses "unsigned int" throughout for its defined modular semantics,
508 // which implicitly gives us a divisor that is a power of two.
509
510 const unsigned int kMultiplier = 13035 * 4 + 1;
511 COMPILE_ASSERT(((kMultiplier - 1) & 3) == 0, pred_must_be_multiple_of_four);
512 const unsigned int kIncrement = 1595649551;
513 COMPILE_ASSERT(kIncrement & 1, must_be_coprime_to_powers_of_two);
514
515 *out_checksum =
516 static_cast<unsigned int>(file_.get()) * kMultiplier + kIncrement;
517}
518
519void File::MemoryCheckingScopedFD::Check() const {
520 unsigned int computed_checksum;
521 ComputeMemoryChecksum(&computed_checksum);
522 CHECK_EQ(file_memory_checksum_, computed_checksum) << "corrupted fd memory";
523}
524
525void File::MemoryCheckingScopedFD::UpdateChecksum() {
526 ComputeMemoryChecksum(&file_memory_checksum_);
527}
528
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900529void File::SetPlatformFile(PlatformFile file) {
zmo@chromium.org536b9a92014-03-18 11:39:03 +0900530 DCHECK(!file_.is_valid());
531 file_.reset(file);
rvargas@chromium.org12938d72013-12-04 09:46:32 +0900532}
533
rvargas@google.comb1ae3192013-11-28 10:31:31 +0900534} // namespace base