2006-09-04 23:06:23 +02:00
|
|
|
#include "pathlocks.hh"
|
|
|
|
#include "util.hh"
|
|
|
|
|
2003-09-11 10:31:29 +02:00
|
|
|
#include <cerrno>
|
|
|
|
|
2003-10-14 17:33:00 +02:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
2003-08-01 16:11:19 +02:00
|
|
|
#include <fcntl.h>
|
|
|
|
|
2006-06-19 16:43:13 +02:00
|
|
|
#ifdef __CYGWIN__
|
|
|
|
#include <windows.h>
|
|
|
|
#include <sys/cygwin.h>
|
|
|
|
#endif
|
|
|
|
|
2003-08-01 16:11:19 +02:00
|
|
|
|
2006-09-04 23:06:23 +02:00
|
|
|
namespace nix {
|
|
|
|
|
|
|
|
|
2006-06-20 19:48:10 +02:00
|
|
|
int openLockFile(const Path & path, bool create)
|
|
|
|
{
|
|
|
|
AutoCloseFD fd;
|
|
|
|
|
|
|
|
#ifdef __CYGWIN__
|
|
|
|
/* On Cygwin we have to open the lock file without "DELETE"
|
|
|
|
sharing mode; otherwise Windows will allow open lock files to
|
|
|
|
be deleted (which is almost but not quite what Unix does). */
|
|
|
|
char win32Path[MAX_PATH + 1];
|
|
|
|
cygwin_conv_to_full_win32_path(path.c_str(), win32Path);
|
|
|
|
|
|
|
|
SECURITY_ATTRIBUTES sa; /* required, otherwise inexplicably bad shit happens */
|
|
|
|
sa.nLength = sizeof sa;
|
|
|
|
sa.lpSecurityDescriptor = 0;
|
|
|
|
sa.bInheritHandle = TRUE;
|
|
|
|
HANDLE h = CreateFile(win32Path, GENERIC_READ | GENERIC_WRITE,
|
|
|
|
FILE_SHARE_READ | FILE_SHARE_WRITE, &sa,
|
|
|
|
(create ? OPEN_ALWAYS : OPEN_EXISTING),
|
|
|
|
FILE_ATTRIBUTE_NORMAL, 0);
|
|
|
|
if (h == INVALID_HANDLE_VALUE) {
|
|
|
|
if (create || GetLastError() != ERROR_FILE_NOT_FOUND)
|
|
|
|
throw Error(format("opening lock file `%1%'") % path);
|
|
|
|
fd = -1;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
fd = cygwin_attach_handle_to_fd((char *) path.c_str(), -1, h, 1, O_RDWR);
|
|
|
|
#else
|
|
|
|
fd = open(path.c_str(), O_RDWR | (create ? O_CREAT : 0), 0666);
|
|
|
|
if (fd == -1 && (create || errno != ENOENT))
|
|
|
|
throw SysError(format("opening lock file `%1%'") % path);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return fd.borrow();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void deleteLockFilePreClose(const Path & path, int fd)
|
|
|
|
{
|
|
|
|
#ifndef __CYGWIN__
|
|
|
|
/* Get rid of the lock file. Have to be careful not to introduce
|
|
|
|
races. */
|
|
|
|
/* On Unix, write a (meaningless) token to the file to indicate to
|
|
|
|
other processes waiting on this lock that the lock is stale
|
|
|
|
(deleted). */
|
|
|
|
unlink(path.c_str());
|
|
|
|
writeFull(fd, (const unsigned char *) "d", 1);
|
|
|
|
/* Note that the result of unlink() is ignored; removing the lock
|
|
|
|
file is an optimisation, not a necessity. */
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void deleteLockFilePostClose(const Path & path)
|
|
|
|
{
|
|
|
|
#ifdef __CYGWIN__
|
|
|
|
/* On Windows, just try to delete the lock file. This will fail
|
|
|
|
if anybody still has the file open. We cannot use unlink()
|
|
|
|
here, because Cygwin emulates Unix semantics of allowing an
|
|
|
|
open file to be deleted (but fakes it - the file isn't actually
|
|
|
|
deleted until later, so a file with the same name cannot be
|
|
|
|
created in the meantime). */
|
|
|
|
char win32Path[MAX_PATH + 1];
|
|
|
|
cygwin_conv_to_full_win32_path(path.c_str(), win32Path);
|
|
|
|
if (DeleteFile(win32Path))
|
|
|
|
debug(format("delete of `%1%' succeeded") % path.c_str());
|
|
|
|
else
|
|
|
|
/* Not an error: probably means that the lock is still opened
|
|
|
|
by someone else. */
|
|
|
|
debug(format("delete of `%1%' failed: %2%") % path.c_str() % GetLastError());
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-14 17:33:00 +02:00
|
|
|
bool lockFile(int fd, LockType lockType, bool wait)
|
|
|
|
{
|
|
|
|
struct flock lock;
|
|
|
|
if (lockType == ltRead) lock.l_type = F_RDLCK;
|
|
|
|
else if (lockType == ltWrite) lock.l_type = F_WRLCK;
|
|
|
|
else if (lockType == ltNone) lock.l_type = F_UNLCK;
|
|
|
|
else abort();
|
|
|
|
lock.l_whence = SEEK_SET;
|
|
|
|
lock.l_start = 0;
|
|
|
|
lock.l_len = 0; /* entire file */
|
|
|
|
|
|
|
|
if (wait) {
|
2004-01-15 21:23:55 +01:00
|
|
|
while (fcntl(fd, F_SETLKW, &lock) != 0) {
|
|
|
|
checkInterrupt();
|
2003-10-14 17:33:00 +02:00
|
|
|
if (errno != EINTR)
|
|
|
|
throw SysError(format("acquiring/releasing lock"));
|
2004-01-15 21:23:55 +01:00
|
|
|
}
|
2003-10-14 17:33:00 +02:00
|
|
|
} else {
|
|
|
|
while (fcntl(fd, F_SETLK, &lock) != 0) {
|
2004-01-15 21:23:55 +01:00
|
|
|
checkInterrupt();
|
2003-10-14 17:33:00 +02:00
|
|
|
if (errno == EACCES || errno == EAGAIN) return false;
|
|
|
|
if (errno != EINTR)
|
|
|
|
throw SysError(format("acquiring/releasing lock"));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-08-01 17:06:23 +02:00
|
|
|
/* This enables us to check whether are not already holding a lock on
|
|
|
|
a file ourselves. POSIX locks (fcntl) suck in this respect: if we
|
|
|
|
close a descriptor, the previous lock will be closed as well. And
|
|
|
|
there is no way to query whether we already have a lock (F_GETLK
|
|
|
|
only works on locks held by other processes). */
|
|
|
|
static StringSet lockedPaths; /* !!! not thread-safe */
|
|
|
|
|
|
|
|
|
2004-05-11 20:05:44 +02:00
|
|
|
PathLocks::PathLocks()
|
2003-11-21 17:05:19 +01:00
|
|
|
: deletePaths(false)
|
2003-08-01 16:11:19 +02:00
|
|
|
{
|
2004-05-11 20:05:44 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-06-15 13:56:49 +02:00
|
|
|
PathLocks::PathLocks(const PathSet & paths, const string & waitMsg)
|
2004-05-11 20:05:44 +02:00
|
|
|
: deletePaths(false)
|
|
|
|
{
|
2006-06-15 13:56:49 +02:00
|
|
|
lockPaths(paths, waitMsg);
|
2004-05-11 20:05:44 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-06-15 13:56:49 +02:00
|
|
|
void PathLocks::lockPaths(const PathSet & _paths, const string & waitMsg)
|
2004-05-11 20:05:44 +02:00
|
|
|
{
|
|
|
|
/* May be called only once! */
|
2005-01-27 13:19:25 +01:00
|
|
|
assert(fds.empty());
|
2004-05-11 20:05:44 +02:00
|
|
|
|
2003-08-01 16:11:19 +02:00
|
|
|
/* Note that `fds' is built incrementally so that the destructor
|
|
|
|
will only release those locks that we have already acquired. */
|
|
|
|
|
|
|
|
/* Sort the paths. This assures that locks are always acquired in
|
|
|
|
the same order, thus preventing deadlocks. */
|
2003-10-08 17:06:59 +02:00
|
|
|
Paths paths(_paths.begin(), _paths.end());
|
2003-08-01 16:11:19 +02:00
|
|
|
paths.sort();
|
|
|
|
|
|
|
|
/* Acquire the lock for each path. */
|
2003-10-08 17:06:59 +02:00
|
|
|
for (Paths::iterator i = paths.begin(); i != paths.end(); i++) {
|
2004-01-15 21:23:55 +01:00
|
|
|
checkInterrupt();
|
2003-10-08 17:06:59 +02:00
|
|
|
Path path = *i;
|
|
|
|
Path lockPath = path + ".lock";
|
2003-08-01 16:11:19 +02:00
|
|
|
|
|
|
|
debug(format("locking path `%1%'") % path);
|
2003-08-01 17:06:23 +02:00
|
|
|
|
2007-08-28 11:39:03 +02:00
|
|
|
if (lockedPaths.find(lockPath) != lockedPaths.end())
|
|
|
|
throw Error("deadlock: trying to re-acquire self-held lock");
|
2003-08-01 17:06:23 +02:00
|
|
|
|
2005-01-27 13:19:25 +01:00
|
|
|
AutoCloseFD fd;
|
|
|
|
|
|
|
|
while (1) {
|
2006-06-19 16:43:13 +02:00
|
|
|
|
2005-01-27 13:19:25 +01:00
|
|
|
/* Open/create the lock file. */
|
2006-06-20 19:48:10 +02:00
|
|
|
fd = openLockFile(lockPath, true);
|
2005-01-27 13:19:25 +01:00
|
|
|
|
|
|
|
/* Acquire an exclusive lock. */
|
2006-06-15 13:56:49 +02:00
|
|
|
if (!lockFile(fd, ltWrite, false)) {
|
|
|
|
if (waitMsg != "") printMsg(lvlError, waitMsg);
|
|
|
|
lockFile(fd, ltWrite, true);
|
|
|
|
}
|
2005-01-27 13:19:25 +01:00
|
|
|
|
|
|
|
debug(format("lock acquired on `%1%'") % lockPath);
|
|
|
|
|
|
|
|
/* Check that the lock file hasn't become stale (i.e.,
|
|
|
|
hasn't been unlinked). */
|
|
|
|
struct stat st;
|
|
|
|
if (fstat(fd, &st) == -1)
|
|
|
|
throw SysError(format("statting lock file `%1%'") % lockPath);
|
|
|
|
if (st.st_size != 0)
|
|
|
|
/* This lock file has been unlinked, so we're holding
|
|
|
|
a lock on a deleted file. This means that other
|
|
|
|
processes may create and acquire a lock on
|
|
|
|
`lockPath', and proceed. So we must retry. */
|
|
|
|
debug(format("open lock file `%1%' has become stale") % lockPath);
|
|
|
|
else
|
|
|
|
break;
|
|
|
|
}
|
2004-05-11 20:05:44 +02:00
|
|
|
|
2005-01-27 13:19:25 +01:00
|
|
|
/* Use borrow so that the descriptor isn't closed. */
|
|
|
|
fds.push_back(FDPair(fd.borrow(), lockPath));
|
2003-08-01 17:06:23 +02:00
|
|
|
lockedPaths.insert(lockPath);
|
2003-08-01 16:11:19 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
PathLocks::~PathLocks()
|
|
|
|
{
|
2005-01-27 13:19:25 +01:00
|
|
|
for (list<FDPair>::iterator i = fds.begin(); i != fds.end(); i++) {
|
2006-06-20 19:48:10 +02:00
|
|
|
if (deletePaths) deleteLockFilePreClose(i->second, i->first);
|
|
|
|
|
2005-01-27 13:19:25 +01:00
|
|
|
lockedPaths.erase(i->second);
|
|
|
|
if (close(i->first) == -1)
|
|
|
|
printMsg(lvlError,
|
|
|
|
format("error (ignored): cannot close lock file on `%1%'") % i->second);
|
2006-06-20 19:48:10 +02:00
|
|
|
|
|
|
|
if (deletePaths) deleteLockFilePostClose(i->second);
|
|
|
|
|
2005-01-27 13:19:25 +01:00
|
|
|
debug(format("lock released on `%1%'") % i->second);
|
2003-11-21 17:05:19 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void PathLocks::setDeletion(bool deletePaths)
|
|
|
|
{
|
|
|
|
this->deletePaths = deletePaths;
|
2003-08-01 16:11:19 +02:00
|
|
|
}
|
2006-09-04 23:06:23 +02:00
|
|
|
|
2007-08-28 13:36:17 +02:00
|
|
|
|
|
|
|
bool pathIsLockedByMe(const Path & path)
|
|
|
|
{
|
|
|
|
Path lockPath = path + ".lock";
|
|
|
|
return lockedPaths.find(lockPath) != lockedPaths.end();
|
|
|
|
}
|
|
|
|
|
2006-09-04 23:06:23 +02:00
|
|
|
|
|
|
|
}
|