• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2014 The Android Open Source Project
3  * Copyright (c) 2000, 2011, Oracle and/or its affiliates. All rights reserved.
4  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
5  *
6  * This code is free software; you can redistribute it and/or modify it
7  * under the terms of the GNU General Public License version 2 only, as
8  * published by the Free Software Foundation.  Oracle designates this
9  * particular file as subject to the "Classpath" exception as provided
10  * by Oracle in the LICENSE file that accompanied this code.
11  *
12  * This code is distributed in the hope that it will be useful, but WITHOUT
13  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
14  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
15  * version 2 for more details (a copy is included in the LICENSE file that
16  * accompanied this code).
17  *
18  * You should have received a copy of the GNU General Public License version
19  * 2 along with this work; if not, write to the Free Software Foundation,
20  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
21  *
22  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
23  * or visit www.oracle.com if you need additional information or have any
24  * questions.
25  */
26 
27 package java.util.prefs;
28 import java.util.*;
29 import java.io.*;
30 import java.security.AccessController;
31 import java.security.PrivilegedAction;
32 import java.security.PrivilegedExceptionAction;
33 import java.security.PrivilegedActionException;
34 
35 import sun.util.logging.PlatformLogger;
36 
37 /**
38  * Preferences implementation for Unix.  Preferences are stored in the file
39  * system, with one directory per preferences node.  All of the preferences
40  * at each node are stored in a single file.  Atomic file system operations
41  * (e.g. File.renameTo) are used to ensure integrity.  An in-memory cache of
42  * the "explored" portion of the tree is maintained for performance, and
43  * written back to the disk periodically.  File-locking is used to ensure
44  * reasonable behavior when multiple VMs are running at the same time.
45  * (The file lock is obtained only for sync(), flush() and removeNode().)
46  *
47  * @author  Josh Bloch
48  * @see     Preferences
49  * @since   1.4
50  *
51  * @hide
52  */
53 // Android changed: @hide.
54 public class FileSystemPreferences extends AbstractPreferences {
55     /**
56      * Returns logger for error messages. Backing store exceptions are logged at
57      * WARNING level.
58      */
getLogger()59     private static PlatformLogger getLogger() {
60         return PlatformLogger.getLogger("java.util.prefs");
61     }
62 
63     /**
64      * Directory for system preferences.
65      */
66     private static File systemRootDir;
67 
68     /*
69      * Flag, indicating whether systemRoot  directory is writable
70      */
71     private static boolean isSystemRootWritable;
72 
73     /**
74      * Directory for user preferences.
75      */
76     private static File userRootDir;
77 
78     /*
79      * Flag, indicating whether userRoot  directory is writable
80      */
81     private static boolean isUserRootWritable;
82 
83    /**
84      * The user root.
85      */
86     static Preferences userRoot = null;
87 
getUserRoot()88     static synchronized Preferences getUserRoot() {
89         if (userRoot == null) {
90             setupUserRoot();
91             userRoot = new FileSystemPreferences(true);
92         }
93         return userRoot;
94     }
95 
setupUserRoot()96     private static void setupUserRoot() {
97         AccessController.doPrivileged(new PrivilegedAction<Void>() {
98             public Void run() {
99                 userRootDir =
100                       new File(System.getProperty("java.util.prefs.userRoot",
101                       System.getProperty("user.home")), ".java/.userPrefs");
102                 // Attempt to create root dir if it does not yet exist.
103                 if (!userRootDir.exists()) {
104                     if (userRootDir.mkdirs()) {
105                         try {
106                             chmod(userRootDir.getCanonicalPath(), USER_RWX);
107                         } catch (IOException e) {
108                             getLogger().warning("Could not change permissions" +
109                                 " on userRoot directory. ");
110                         }
111                         getLogger().info("Created user preferences directory.");
112                     }
113                     else
114                         getLogger().warning("Couldn't create user preferences" +
115                         " directory. User preferences are unusable.");
116                 }
117                 isUserRootWritable = userRootDir.canWrite();
118                 String USER_NAME = System.getProperty("user.name");
119                 userLockFile = new File (userRootDir,".user.lock." + USER_NAME);
120                 userRootModFile = new File (userRootDir,
121                                                ".userRootModFile." + USER_NAME);
122                 if (!userRootModFile.exists())
123                 try {
124                     // create if does not exist.
125                     userRootModFile.createNewFile();
126                     // Only user can read/write userRootModFile.
127                     int result = chmod(userRootModFile.getCanonicalPath(),
128                                                                USER_READ_WRITE);
129                     if (result !=0)
130                         getLogger().warning("Problem creating userRoot " +
131                             "mod file. Chmod failed on " +
132                              userRootModFile.getCanonicalPath() +
133                              " Unix error code " + result);
134                 } catch (IOException e) {
135                     getLogger().warning(e.toString());
136                 }
137                 userRootModTime = userRootModFile.lastModified();
138                 return null;
139             }
140         });
141     }
142 
143 
144     /**
145      * The system root.
146      */
147     static Preferences systemRoot;
148 
getSystemRoot()149     static synchronized Preferences getSystemRoot() {
150         if (systemRoot == null) {
151             setupSystemRoot();
152             systemRoot = new FileSystemPreferences(false);
153         }
154         return systemRoot;
155     }
156 
setupSystemRoot()157     private static void setupSystemRoot() {
158         AccessController.doPrivileged(new PrivilegedAction<Void>() {
159             public Void run() {
160                 String systemPrefsDirName =
161                   System.getProperty("java.util.prefs.systemRoot","/etc/.java");
162                 systemRootDir =
163                      new File(systemPrefsDirName, ".systemPrefs");
164                 // Attempt to create root dir if it does not yet exist.
165                 if (!systemRootDir.exists()) {
166                     // system root does not exist in /etc/.java
167                     // Switching  to java.home
168                     systemRootDir =
169                                   new File(System.getProperty("java.home"),
170                                                             ".systemPrefs");
171                     if (!systemRootDir.exists()) {
172                         if (systemRootDir.mkdirs()) {
173                             getLogger().info(
174                                 "Created system preferences directory "
175                                 + "in java.home.");
176                             try {
177                                 chmod(systemRootDir.getCanonicalPath(),
178                                                           USER_RWX_ALL_RX);
179                             } catch (IOException e) {
180                             }
181                         } else {
182                             getLogger().warning("Could not create "
183                                 + "system preferences directory. System "
184                                 + "preferences are unusable.");
185                         }
186                     }
187                 }
188                 isSystemRootWritable = systemRootDir.canWrite();
189                 systemLockFile = new File(systemRootDir, ".system.lock");
190                 systemRootModFile =
191                                new File (systemRootDir,".systemRootModFile");
192                 if (!systemRootModFile.exists() && isSystemRootWritable)
193                 try {
194                     // create if does not exist.
195                     systemRootModFile.createNewFile();
196                     int result = chmod(systemRootModFile.getCanonicalPath(),
197                                                           USER_RW_ALL_READ);
198                     if (result !=0)
199                         getLogger().warning("Chmod failed on " +
200                                systemRootModFile.getCanonicalPath() +
201                               " Unix error code " + result);
202                 } catch (IOException e) { getLogger().warning(e.toString());
203                 }
204                 systemRootModTime = systemRootModFile.lastModified();
205                 return null;
206             }
207         });
208     }
209 
210 
211     /**
212      * Unix user write/read permission
213      */
214     private static final int USER_READ_WRITE = 0600;
215 
216     private static final int USER_RW_ALL_READ = 0644;
217 
218 
219     private static final int USER_RWX_ALL_RX = 0755;
220 
221     private static final int USER_RWX = 0700;
222 
223     /**
224      * The lock file for the user tree.
225      */
226     static File userLockFile;
227 
228 
229 
230     /**
231      * The lock file for the system tree.
232      */
233     static File systemLockFile;
234 
235     /**
236      * Unix lock handle for userRoot.
237      * Zero, if unlocked.
238      */
239 
240     private static int userRootLockHandle = 0;
241 
242     /**
243      * Unix lock handle for systemRoot.
244      * Zero, if unlocked.
245      */
246 
247     private static int systemRootLockHandle = 0;
248 
249     /**
250      * The directory representing this preference node.  There is no guarantee
251      * that this directory exits, as another VM can delete it at any time
252      * that it (the other VM) holds the file-lock.  While the root node cannot
253      * be deleted, it may not yet have been created, or the underlying
254      * directory could have been deleted accidentally.
255      */
256     private final File dir;
257 
258     /**
259      * The file representing this preference node's preferences.
260      * The file format is undocumented, and subject to change
261      * from release to release, but I'm sure that you can figure
262      * it out if you try real hard.
263      */
264     private final File prefsFile;
265 
266     /**
267      * A temporary file used for saving changes to preferences.  As part of
268      * the sync operation, changes are first saved into this file, and then
269      * atomically renamed to prefsFile.  This results in an atomic state
270      * change from one valid set of preferences to another.  The
271      * the file-lock is held for the duration of this transformation.
272      */
273     private final File tmpFile;
274 
275     /**
276      * File, which keeps track of global modifications of userRoot.
277      */
278     private static  File userRootModFile;
279 
280     /**
281      * Flag, which indicated whether userRoot was modified by another VM
282      */
283     private static boolean isUserRootModified = false;
284 
285     /**
286      * Keeps track of userRoot modification time. This time is reset to
287      * zero after UNIX reboot, and is increased by 1 second each time
288      * userRoot is modified.
289      */
290     private static long userRootModTime;
291 
292 
293     /*
294      * File, which keeps track of global modifications of systemRoot
295      */
296     private static File systemRootModFile;
297     /*
298      * Flag, which indicates whether systemRoot was modified by another VM
299      */
300     private static boolean isSystemRootModified = false;
301 
302     /**
303      * Keeps track of systemRoot modification time. This time is reset to
304      * zero after system reboot, and is increased by 1 second each time
305      * systemRoot is modified.
306      */
307     private static long systemRootModTime;
308 
309     /**
310      * Locally cached preferences for this node (includes uncommitted
311      * changes).  This map is initialized with from disk when the first get or
312      * put operation occurs on this node.  It is synchronized with the
313      * corresponding disk file (prefsFile) by the sync operation.  The initial
314      * value is read *without* acquiring the file-lock.
315      */
316     private Map<String, String> prefsCache = null;
317 
318     /**
319      * The last modification time of the file backing this node at the time
320      * that prefCache was last synchronized (or initially read).  This
321      * value is set *before* reading the file, so it's conservative; the
322      * actual timestamp could be (slightly) higher.  A value of zero indicates
323      * that we were unable to initialize prefsCache from the disk, or
324      * have not yet attempted to do so.  (If prefsCache is non-null, it
325      * indicates the former; if it's null, the latter.)
326      */
327     private long lastSyncTime = 0;
328 
329    /**
330     * Unix error code for locked file.
331     */
332     private static final int EAGAIN = 11;
333 
334    /**
335     * Unix error code for denied access.
336     */
337     private static final int EACCES = 13;
338 
339     /* Used to interpret results of native functions */
340     private static final int LOCK_HANDLE = 0;
341     private static final int ERROR_CODE = 1;
342 
343     /**
344      * A list of all uncommitted preference changes.  The elements in this
345      * list are of type PrefChange.  If this node is concurrently modified on
346      * disk by another VM, the two sets of changes are merged when this node
347      * is sync'ed by overwriting our prefsCache with the preference map last
348      * written out to disk (by the other VM), and then replaying this change
349      * log against that map.  The resulting map is then written back
350      * to the disk.
351      */
352     final List<Change> changeLog = new ArrayList<>();
353 
354     /**
355      * Represents a change to a preference.
356      */
357     private abstract class Change {
358         /**
359          * Reapplies the change to prefsCache.
360          */
replay()361         abstract void replay();
362     };
363 
364     /**
365      * Represents a preference put.
366      */
367     private class Put extends Change {
368         String key, value;
369 
Put(String key, String value)370         Put(String key, String value) {
371             this.key = key;
372             this.value = value;
373         }
374 
replay()375         void replay() {
376             prefsCache.put(key, value);
377         }
378     }
379 
380     /**
381      * Represents a preference remove.
382      */
383     private class Remove extends Change {
384         String key;
385 
Remove(String key)386         Remove(String key) {
387             this.key = key;
388         }
389 
replay()390         void replay() {
391             prefsCache.remove(key);
392         }
393     }
394 
395     /**
396      * Represents the creation of this node.
397      */
398     private class NodeCreate extends Change {
399         /**
400          * Performs no action, but the presence of this object in changeLog
401          * will force the node and its ancestors to be made permanent at the
402          * next sync.
403          */
replay()404         void replay() {
405         }
406     }
407 
408     /**
409      * NodeCreate object for this node.
410      */
411     NodeCreate nodeCreate = null;
412 
413     /**
414      * Replay changeLog against prefsCache.
415      */
replayChanges()416     private void replayChanges() {
417         for (int i = 0, n = changeLog.size(); i<n; i++)
418             changeLog.get(i).replay();
419     }
420 
421     static {
422         // Add shutdown hook to flush cached prefs on normal termination
423         Runtime.getRuntime().addShutdownHook(new Thread() {
424             public void run() {
425                 syncWorld();
426             }
427         });
428     }
429 
syncWorld()430     private static void syncWorld() {
431         /*
432          * Synchronization necessary because userRoot and systemRoot are
433          * lazily initialized.
434          */
435         Preferences userRt;
436         Preferences systemRt;
437         synchronized(FileSystemPreferences.class) {
438             userRt   = userRoot;
439             systemRt = systemRoot;
440         }
441 
442         try {
443             if (userRt != null)
444                 userRt.flush();
445         } catch(BackingStoreException e) {
446             getLogger().warning("Couldn't flush user prefs: " + e);
447         }
448 
449         try {
450             if (systemRt != null)
451                 systemRt.flush();
452         } catch(BackingStoreException e) {
453             getLogger().warning("Couldn't flush system prefs: " + e);
454         }
455     }
456 
457     private final boolean isUserNode;
458 
459     /**
460      * Special constructor for roots (both user and system).  This constructor
461      * will only be called twice, by the static initializer.
462      */
FileSystemPreferences(boolean user)463     private FileSystemPreferences(boolean user) {
464         super(null, "");
465         isUserNode = user;
466         dir = (user ? userRootDir: systemRootDir);
467         prefsFile = new File(dir, "prefs.xml");
468         tmpFile   = new File(dir, "prefs.tmp");
469     }
470 
471     /** @hide for unit testing only */
472     // Android added constructor for testing.
FileSystemPreferences(String path, File lockFile, boolean isUserNode)473     public FileSystemPreferences(String path, File lockFile, boolean isUserNode) {
474         super(null, "");
475         this.isUserNode = isUserNode;
476         this.dir = new File(path);
477         prefsFile = new File(dir, "prefs.xml");
478         tmpFile = new File(dir, "prefs.tmp");
479         newNode = !dir.exists();
480         if (newNode) {
481             // These 2 things guarantee node will get wrtten at next flush/sync
482             prefsCache = new TreeMap<>();
483             nodeCreate = new NodeCreate();
484             changeLog.add(nodeCreate);
485         }
486 
487         if (isUserNode) {
488             userLockFile = lockFile;
489             userRootModFile = new File(lockFile.getParentFile(), lockFile.getName() + ".rootmod");
490         } else {
491             systemLockFile = lockFile;
492             systemRootModFile = new File(lockFile.getParentFile(), lockFile.getName() + ".rootmod");
493         }
494     }
495 
496     /**
497      * Construct a new FileSystemPreferences instance with the specified
498      * parent node and name.  This constructor, called from childSpi,
499      * is used to make every node except for the two //roots.
500      */
FileSystemPreferences(FileSystemPreferences parent, String name)501     private FileSystemPreferences(FileSystemPreferences parent, String name) {
502         super(parent, name);
503         isUserNode = parent.isUserNode;
504         dir  = new File(parent.dir, dirName(name));
505         prefsFile = new File(dir, "prefs.xml");
506         tmpFile  = new File(dir, "prefs.tmp");
507         AccessController.doPrivileged(new PrivilegedAction<Void>() {
508             public Void run() {
509                 newNode = !dir.exists();
510                 return null;
511             }
512         });
513         if (newNode) {
514             // These 2 things guarantee node will get wrtten at next flush/sync
515             prefsCache = new TreeMap<>();
516             nodeCreate = new NodeCreate();
517             changeLog.add(nodeCreate);
518         }
519     }
520 
isUserNode()521     public boolean isUserNode() {
522         return isUserNode;
523     }
524 
putSpi(String key, String value)525     protected void putSpi(String key, String value) {
526         initCacheIfNecessary();
527         changeLog.add(new Put(key, value));
528         prefsCache.put(key, value);
529     }
530 
getSpi(String key)531     protected String getSpi(String key) {
532         initCacheIfNecessary();
533         return prefsCache.get(key);
534     }
535 
removeSpi(String key)536     protected void removeSpi(String key) {
537         initCacheIfNecessary();
538         changeLog.add(new Remove(key));
539         prefsCache.remove(key);
540     }
541 
542     /**
543      * Initialize prefsCache if it has yet to be initialized.  When this method
544      * returns, prefsCache will be non-null.  If the data was successfully
545      * read from the file, lastSyncTime will be updated.  If prefsCache was
546      * null, but it was impossible to read the file (because it didn't
547      * exist or for any other reason) prefsCache will be initialized to an
548      * empty, modifiable Map, and lastSyncTime remain zero.
549      */
initCacheIfNecessary()550     private void initCacheIfNecessary() {
551         if (prefsCache != null)
552             return;
553 
554         try {
555             loadCache();
556         } catch(Exception e) {
557             // assert lastSyncTime == 0;
558             prefsCache = new TreeMap<>();
559         }
560     }
561 
562     /**
563      * Attempt to load prefsCache from the backing store.  If the attempt
564      * succeeds, lastSyncTime will be updated (the new value will typically
565      * correspond to the data loaded into the map, but it may be less,
566      * if another VM is updating this node concurrently).  If the attempt
567      * fails, a BackingStoreException is thrown and both prefsCache and
568      * lastSyncTime are unaffected by the call.
569      */
loadCache()570     private void loadCache() throws BackingStoreException {
571         Map<String, String> m = new TreeMap<>();
572         long newLastSyncTime = 0;
573         try {
574             newLastSyncTime = prefsFile.lastModified();
575             try (FileInputStream fis = new FileInputStream(prefsFile)) {
576                 XmlSupport.importMap(fis, m);
577             }
578         } catch(Exception e) {
579             if (e instanceof InvalidPreferencesFormatException) {
580                 getLogger().warning("Invalid preferences format in "
581                                     +  prefsFile.getPath());
582                 prefsFile.renameTo( new File(
583                                              prefsFile.getParentFile(),
584                                              "IncorrectFormatPrefs.xml"));
585                 m = new TreeMap<>();
586             } else if (e instanceof FileNotFoundException) {
587                 getLogger().warning("Prefs file removed in background "
588                                     + prefsFile.getPath());
589             } else {
590                 // Android added: This exception may be ignored by some callers,
591                 // added a logger entry to prevent omitting it completely.
592                 getLogger().warning("Exception while reading cache: "
593                                     + e.getMessage());
594                 throw new BackingStoreException(e);
595             }
596         }
597         // Attempt succeeded; update state
598         prefsCache = m;
599         lastSyncTime = newLastSyncTime;
600     }
601 
602     /**
603      * Attempt to write back prefsCache to the backing store.  If the attempt
604      * succeeds, lastSyncTime will be updated (the new value will correspond
605      * exactly to the data thust written back, as we hold the file lock, which
606      * prevents a concurrent write.  If the attempt fails, a
607      * BackingStoreException is thrown and both the backing store (prefsFile)
608      * and lastSyncTime will be unaffected by this call.  This call will
609      * NEVER leave prefsFile in a corrupt state.
610      */
writeBackCache()611     private void writeBackCache() throws BackingStoreException {
612         try {
613             AccessController.doPrivileged(
614                 new PrivilegedExceptionAction<Void>() {
615                 public Void run() throws BackingStoreException {
616                     try {
617                         if (!dir.exists() && !dir.mkdirs())
618                             throw new BackingStoreException(dir +
619                                                              " create failed.");
620                         try (FileOutputStream fos = new FileOutputStream(tmpFile)) {
621                             XmlSupport.exportMap(fos, prefsCache);
622                         }
623                         if (!tmpFile.renameTo(prefsFile))
624                             throw new BackingStoreException("Can't rename " +
625                             tmpFile + " to " + prefsFile);
626                     } catch(Exception e) {
627                         if (e instanceof BackingStoreException)
628                             throw (BackingStoreException)e;
629                         throw new BackingStoreException(e);
630                     }
631                     return null;
632                 }
633             });
634         } catch (PrivilegedActionException e) {
635             throw (BackingStoreException) e.getException();
636         }
637     }
638 
keysSpi()639     protected String[] keysSpi() {
640         initCacheIfNecessary();
641         return prefsCache.keySet().toArray(new String[prefsCache.size()]);
642     }
643 
childrenNamesSpi()644     protected String[] childrenNamesSpi() {
645         return AccessController.doPrivileged(
646             new PrivilegedAction<String[]>() {
647                 public String[] run() {
648                     List<String> result = new ArrayList<>();
649                     File[] dirContents = dir.listFiles();
650                     if (dirContents != null) {
651                         for (int i = 0; i < dirContents.length; i++)
652                             if (dirContents[i].isDirectory())
653                                 result.add(nodeName(dirContents[i].getName()));
654                     }
655                     return result.toArray(EMPTY_STRING_ARRAY);
656                }
657             });
658     }
659 
660     private static final String[] EMPTY_STRING_ARRAY = new String[0];
661 
662     protected AbstractPreferences childSpi(String name) {
663         return new FileSystemPreferences(this, name);
664     }
665 
666     public void removeNode() throws BackingStoreException {
667         synchronized (isUserNode()? userLockFile: systemLockFile) {
668             // to remove a node we need an exclusive lock
669             if (!lockFile(false))
670                 throw(new BackingStoreException("Couldn't get file lock."));
671            try {
672                 super.removeNode();
673            } finally {
674                 unlockFile();
675            }
676         }
677     }
678 
679     /**
680      * Called with file lock held (in addition to node locks).
681      */
682     protected void removeNodeSpi() throws BackingStoreException {
683         try {
684             AccessController.doPrivileged(
685                 new PrivilegedExceptionAction<Void>() {
686                 public Void run() throws BackingStoreException {
687                     if (changeLog.contains(nodeCreate)) {
688                         changeLog.remove(nodeCreate);
689                         nodeCreate = null;
690                         return null;
691                     }
692                     if (!dir.exists())
693                         return null;
694                     prefsFile.delete();
695                     tmpFile.delete();
696                     // dir should be empty now.  If it's not, empty it
697                     File[] junk = dir.listFiles();
698                     if (junk.length != 0) {
699                         getLogger().warning(
700                            "Found extraneous files when removing node: "
701                             + Arrays.asList(junk));
702                         for (int i=0; i<junk.length; i++)
703                             junk[i].delete();
704                     }
705                     if (!dir.delete())
706                         throw new BackingStoreException("Couldn't delete dir: "
707                                                                          + dir);
708                     return null;
709                 }
710             });
711         } catch (PrivilegedActionException e) {
712             throw (BackingStoreException) e.getException();
713         }
714     }
715 
716     public synchronized void sync() throws BackingStoreException {
717         boolean userNode = isUserNode();
718         boolean shared;
719 
720         if (userNode) {
721             shared = false; /* use exclusive lock for user prefs */
722         } else {
723             /* if can write to system root, use exclusive lock.
724                otherwise use shared lock. */
725             shared = !isSystemRootWritable;
726         }
727         synchronized (isUserNode()? userLockFile:systemLockFile) {
728            if (!lockFile(shared))
729                throw(new BackingStoreException("Couldn't get file lock."));
730            final Long newModTime =
731                 AccessController.doPrivileged(
732                     new PrivilegedAction<Long>() {
733                public Long run() {
734                    long nmt;
735                    if (isUserNode()) {
736                        nmt = userRootModFile.lastModified();
737                        isUserRootModified = userRootModTime == nmt;
738                    } else {
739                        nmt = systemRootModFile.lastModified();
740                        isSystemRootModified = systemRootModTime == nmt;
741                    }
742                    return new Long(nmt);
743                }
744            });
745            try {
746                super.sync();
747                AccessController.doPrivileged(new PrivilegedAction<Void>() {
748                    public Void run() {
749                    if (isUserNode()) {
750                        userRootModTime = newModTime.longValue() + 1000;
751                        userRootModFile.setLastModified(userRootModTime);
752                    } else {
753                        systemRootModTime = newModTime.longValue() + 1000;
754                        systemRootModFile.setLastModified(systemRootModTime);
755                    }
756                    return null;
757                    }
758                });
759            } finally {
760                 unlockFile();
761            }
762         }
763     }
764 
765     protected void syncSpi() throws BackingStoreException {
766         syncSpiPrivileged();
767     }
768 
769     private void syncSpiPrivileged() throws BackingStoreException {
770         if (isRemoved())
771             throw new IllegalStateException("Node has been removed");
772         if (prefsCache == null)
773             return;  // We've never been used, don't bother syncing
774         long lastModifiedTime;
775         if ((isUserNode() ? isUserRootModified : isSystemRootModified)) {
776             lastModifiedTime = prefsFile.lastModified();
777             if (lastModifiedTime  != lastSyncTime) {
778                 // Prefs at this node were externally modified; read in node and
779                 // playback any local mods since last sync
780                 loadCache();
781                 replayChanges();
782                 lastSyncTime = lastModifiedTime;
783             }
784         } else if (lastSyncTime != 0 && !dir.exists()) {
785             // This node was removed in the background.  Playback any changes
786             // against a virgin (empty) Map.
787             prefsCache = new TreeMap<>();
788             replayChanges();
789         }
790         if (!changeLog.isEmpty()) {
791             writeBackCache();  // Creates directory & file if necessary
792            /*
793             * Attempt succeeded; it's barely possible that the call to
794             * lastModified might fail (i.e., return 0), but this would not
795             * be a disaster, as lastSyncTime is allowed to lag.
796             */
797             lastModifiedTime = prefsFile.lastModified();
798             /* If lastSyncTime did not change, or went back
799              * increment by 1 second. Since we hold the lock
800              * lastSyncTime always monotonically encreases in the
801              * atomic sense.
802              */
803             if (lastSyncTime <= lastModifiedTime) {
804                 lastSyncTime = lastModifiedTime + 1000;
805                 prefsFile.setLastModified(lastSyncTime);
806             }
807             changeLog.clear();
808         }
809     }
810 
811     public void flush() throws BackingStoreException {
812         if (isRemoved())
813             return;
814         sync();
815     }
816 
817     protected void flushSpi() throws BackingStoreException {
818         // assert false;
819     }
820 
821     /**
822      * Returns true if the specified character is appropriate for use in
823      * Unix directory names.  A character is appropriate if it's a printable
824      * ASCII character (> 0x1f && < 0x7f) and unequal to slash ('/', 0x2f),
825      * dot ('.', 0x2e), or underscore ('_', 0x5f).
826      */
827     private static boolean isDirChar(char ch) {
828         return ch > 0x1f && ch < 0x7f && ch != '/' && ch != '.' && ch != '_';
829     }
830 
831     /**
832      * Returns the directory name corresponding to the specified node name.
833      * Generally, this is just the node name.  If the node name includes
834      * inappropriate characters (as per isDirChar) it is translated to Base64.
835      * with the underscore  character ('_', 0x5f) prepended.
836      */
837     private static String dirName(String nodeName) {
838         for (int i=0, n=nodeName.length(); i < n; i++)
839             if (!isDirChar(nodeName.charAt(i)))
840                 return "_" + Base64.byteArrayToAltBase64(byteArray(nodeName));
841         return nodeName;
842     }
843 
844     /**
845      * Translate a string into a byte array by translating each character
846      * into two bytes, high-byte first ("big-endian").
847      */
848     private static byte[] byteArray(String s) {
849         int len = s.length();
850         byte[] result = new byte[2*len];
851         for (int i=0, j=0; i<len; i++) {
852             char c = s.charAt(i);
853             result[j++] = (byte) (c>>8);
854             result[j++] = (byte) c;
855         }
856         return result;
857     }
858 
859     /**
860      * Returns the node name corresponding to the specified directory name.
861  * (Inverts the transformation of dirName(String).
862      */
863     private static String nodeName(String dirName) {
864         if (dirName.charAt(0) != '_')
865             return dirName;
866         byte a[] = Base64.altBase64ToByteArray(dirName.substring(1));
867         StringBuffer result = new StringBuffer(a.length/2);
868         for (int i = 0; i < a.length; ) {
869             int highByte = a[i++] & 0xff;
870             int lowByte =  a[i++] & 0xff;
871             result.append((char) ((highByte << 8) | lowByte));
872         }
873         return result.toString();
874     }
875 
876     /**
877      * Try to acquire the appropriate file lock (user or system).  If
878      * the initial attempt fails, several more attempts are made using
879      * an exponential backoff strategy.  If all attempts fail, this method
880      * returns false.
881      * @throws SecurityException if file access denied.
882      */
883     private boolean lockFile(boolean shared) throws SecurityException{
884         boolean usernode = isUserNode();
885         int[] result;
886         int errorCode = 0;
887         File lockFile = (usernode ? userLockFile : systemLockFile);
888         long sleepTime = INIT_SLEEP_TIME;
889         for (int i = 0; i < MAX_ATTEMPTS; i++) {
890             try {
891                   int perm = (usernode? USER_READ_WRITE: USER_RW_ALL_READ);
892                   result = lockFile0(lockFile.getCanonicalPath(), perm, shared);
893 
894                   errorCode = result[ERROR_CODE];
895                   if (result[LOCK_HANDLE] != 0) {
896                      if (usernode) {
897                          userRootLockHandle = result[LOCK_HANDLE];
898                      } else {
899                          systemRootLockHandle = result[LOCK_HANDLE];
900                      }
901                      return true;
902                   }
903             } catch(IOException e) {
904 //                // If at first, you don't succeed...
905             }
906 
907             try {
908                 Thread.sleep(sleepTime);
909             } catch(InterruptedException e) {
910                 checkLockFile0ErrorCode(errorCode);
911                 return false;
912             }
913             sleepTime *= 2;
914         }
915         checkLockFile0ErrorCode(errorCode);
916         return false;
917     }
918 
919     /**
920      * Checks if unlockFile0() returned an error. Throws a SecurityException,
921      * if access denied. Logs a warning otherwise.
922      */
923     private void checkLockFile0ErrorCode (int errorCode)
924                                                       throws SecurityException {
925         if (errorCode == EACCES)
926             throw new SecurityException("Could not lock " +
927             (isUserNode()? "User prefs." : "System prefs.") +
928              " Lock file access denied.");
929         if (errorCode != EAGAIN)
930             getLogger().warning("Could not lock " +
931                              (isUserNode()? "User prefs. " : "System prefs.") +
932                              " Unix error code " + errorCode + ".");
933     }
934 
935     /**
936      * Locks file using UNIX file locking.
937      * @param fileName Absolute file name of the lock file.
938      * @return Returns a lock handle, used to unlock the file.
939      */
940     private static native int[]
941             lockFile0(String fileName, int permission, boolean shared);
942 
943     /**
944      * Unlocks file previously locked by lockFile0().
945      * @param lockHandle Handle to the file lock.
946      * @return Returns zero if OK, UNIX error code if failure.
947      */
948     private  static native int unlockFile0(int lockHandle);
949 
950     /**
951      * Changes UNIX file permissions.
952      */
953     private static native int chmod(String fileName, int permission);
954 
955     /**
956      * Initial time between lock attempts, in ms.  The time is doubled
957      * after each failing attempt (except the first).
958      */
959     private static int INIT_SLEEP_TIME = 50;
960 
961     /**
962      * Maximum number of lock attempts.
963      */
964     private static int MAX_ATTEMPTS = 5;
965 
966     /**
967      * Release the the appropriate file lock (user or system).
968      * @throws SecurityException if file access denied.
969      */
970     private void unlockFile() {
971         int result;
972         boolean usernode = isUserNode();
973         File lockFile = (usernode ? userLockFile : systemLockFile);
974         int lockHandle = ( usernode ? userRootLockHandle:systemRootLockHandle);
975         if (lockHandle == 0) {
976             getLogger().warning("Unlock: zero lockHandle for " +
977                            (usernode ? "user":"system") + " preferences.)");
978             return;
979         }
980         result = unlockFile0(lockHandle);
981         if (result != 0) {
982             getLogger().warning("Could not drop file-lock on " +
983             (isUserNode() ? "user" : "system") + " preferences." +
984             " Unix error code " + result + ".");
985             if (result == EACCES)
986                 throw new SecurityException("Could not unlock" +
987                 (isUserNode()? "User prefs." : "System prefs.") +
988                 " Lock file access denied.");
989         }
990         if (isUserNode()) {
991             userRootLockHandle = 0;
992         } else {
993             systemRootLockHandle = 0;
994         }
995     }
996 }
997