• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 //
2 // Copyright (C) 2013 The Android Open Source Project
3 //
4 // Licensed under the Apache License, Version 2.0 (the "License");
5 // you may not use this file except in compliance with the License.
6 // You may obtain a copy of the License at
7 //
8 //      http://www.apache.org/licenses/LICENSE-2.0
9 //
10 // Unless required by applicable law or agreed to in writing, software
11 // distributed under the License is distributed on an "AS IS" BASIS,
12 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 // See the License for the specific language governing permissions and
14 // limitations under the License.
15 //
16 
17 // This provides access to timestamps with nanosecond resolution in
18 // struct stat, See NOTES in stat(2) for details.
19 #ifndef _BSD_SOURCE
20 #define _BSD_SOURCE
21 #endif
22 
23 #include "update_engine/p2p_manager.h"
24 
25 #include <errno.h>
26 #include <fcntl.h>
27 #include <linux/falloc.h>
28 #include <signal.h>
29 #include <string.h>
30 #include <sys/stat.h>
31 #include <sys/statvfs.h>
32 #include <sys/types.h>
33 #include <sys/xattr.h>
34 #include <unistd.h>
35 
36 #include <algorithm>
37 #include <map>
38 #include <memory>
39 #include <utility>
40 #include <vector>
41 
42 #include <base/bind.h>
43 #include <base/files/file_enumerator.h>
44 #include <base/files/file_path.h>
45 #include <base/format_macros.h>
46 #include <base/logging.h>
47 #include <base/strings/string_util.h>
48 #include <base/strings/stringprintf.h>
49 
50 #include "update_engine/common/subprocess.h"
51 #include "update_engine/common/utils.h"
52 #include "update_engine/update_manager/policy.h"
53 #include "update_engine/update_manager/update_manager.h"
54 
55 using base::Bind;
56 using base::Callback;
57 using base::FilePath;
58 using base::StringPrintf;
59 using base::Time;
60 using base::TimeDelta;
61 using brillo::MessageLoop;
62 using chromeos_update_manager::EvalStatus;
63 using chromeos_update_manager::Policy;
64 using chromeos_update_manager::UpdateManager;
65 using std::map;
66 using std::pair;
67 using std::string;
68 using std::unique_ptr;
69 using std::vector;
70 
71 namespace chromeos_update_engine {
72 
73 namespace {
74 
75 // The default p2p directory.
76 const char kDefaultP2PDir[] = "/var/cache/p2p";
77 
78 // The p2p xattr used for conveying the final size of a file - see the
79 // p2p ddoc for details.
80 const char kCrosP2PFileSizeXAttrName[] = "user.cros-p2p-filesize";
81 
82 }  // namespace
83 
84 // The default P2PManager::Configuration implementation.
85 class ConfigurationImpl : public P2PManager::Configuration {
86  public:
ConfigurationImpl()87   ConfigurationImpl() {}
88 
GetP2PDir()89   FilePath GetP2PDir() override {
90     return FilePath(kDefaultP2PDir);
91   }
92 
GetInitctlArgs(bool is_start)93   vector<string> GetInitctlArgs(bool is_start) override {
94     vector<string> args;
95     args.push_back("initctl");
96     args.push_back(is_start ? "start" : "stop");
97     args.push_back("p2p");
98     return args;
99   }
100 
GetP2PClientArgs(const string & file_id,size_t minimum_size)101   vector<string> GetP2PClientArgs(const string &file_id,
102                                   size_t minimum_size) override {
103     vector<string> args;
104     args.push_back("p2p-client");
105     args.push_back(string("--get-url=") + file_id);
106     args.push_back(StringPrintf("--minimum-size=%" PRIuS, minimum_size));
107     return args;
108   }
109 
110  private:
111   DISALLOW_COPY_AND_ASSIGN(ConfigurationImpl);
112 };
113 
114 // The default P2PManager implementation.
115 class P2PManagerImpl : public P2PManager {
116  public:
117   P2PManagerImpl(Configuration *configuration,
118                  ClockInterface *clock,
119                  UpdateManager* update_manager,
120                  const string& file_extension,
121                  const int num_files_to_keep,
122                  const TimeDelta& max_file_age);
123 
124   // P2PManager methods.
125   void SetDevicePolicy(const policy::DevicePolicy* device_policy) override;
126   bool IsP2PEnabled() override;
127   bool EnsureP2PRunning() override;
128   bool EnsureP2PNotRunning() override;
129   bool PerformHousekeeping() override;
130   void LookupUrlForFile(const string& file_id,
131                         size_t minimum_size,
132                         TimeDelta max_time_to_wait,
133                         LookupCallback callback) override;
134   bool FileShare(const string& file_id,
135                  size_t expected_size) override;
136   FilePath FileGetPath(const string& file_id) override;
137   ssize_t FileGetSize(const string& file_id) override;
138   ssize_t FileGetExpectedSize(const string& file_id) override;
139   bool FileGetVisible(const string& file_id,
140                       bool *out_result) override;
141   bool FileMakeVisible(const string& file_id) override;
142   int CountSharedFiles() override;
143 
144  private:
145   // Enumeration for specifying visibility.
146   enum Visibility {
147     kVisible,
148     kNonVisible
149   };
150 
151   // Returns "." + |file_extension_| + ".p2p" if |visibility| is
152   // |kVisible|. Returns the same concatenated with ".tmp" otherwise.
153   string GetExt(Visibility visibility);
154 
155   // Gets the on-disk path for |file_id| depending on if the file
156   // is visible or not.
157   FilePath GetPath(const string& file_id, Visibility visibility);
158 
159   // Utility function used by EnsureP2PRunning() and EnsureP2PNotRunning().
160   bool EnsureP2P(bool should_be_running);
161 
162   // Utility function to delete a file given by |path| and log the
163   // path as well as |reason|. Returns false on failure.
164   bool DeleteP2PFile(const FilePath& path, const string& reason);
165 
166   // Schedules an async request for tracking changes in P2P enabled status.
167   void ScheduleEnabledStatusChange();
168 
169   // An async callback used by the above.
170   void OnEnabledStatusChange(EvalStatus status, const bool& result);
171 
172   // The device policy being used or null if no policy is being used.
173   const policy::DevicePolicy* device_policy_ = nullptr;
174 
175   // Configuration object.
176   unique_ptr<Configuration> configuration_;
177 
178   // Object for telling the time.
179   ClockInterface* clock_;
180 
181   // A pointer to the global Update Manager.
182   UpdateManager* update_manager_;
183 
184   // A short string unique to the application (for example "cros_au")
185   // used to mark a file as being owned by a particular application.
186   const string file_extension_;
187 
188   // If non-zero, this number denotes how many files in /var/cache/p2p
189   // owned by the application (cf. |file_extension_|) to keep after
190   // performing housekeeping.
191   const int num_files_to_keep_;
192 
193   // If non-zero, files older than this will not be kept after
194   // performing housekeeping.
195   const TimeDelta max_file_age_;
196 
197   // The string ".p2p".
198   static const char kP2PExtension[];
199 
200   // The string ".tmp".
201   static const char kTmpExtension[];
202 
203   // Whether P2P service may be running; initially, we assume it may be.
204   bool may_be_running_ = true;
205 
206   // The current known enabled status of the P2P feature (initialized lazily),
207   // and whether an async status check has been scheduled.
208   bool is_enabled_;
209   bool waiting_for_enabled_status_change_ = false;
210 
211   DISALLOW_COPY_AND_ASSIGN(P2PManagerImpl);
212 };
213 
214 const char P2PManagerImpl::kP2PExtension[] = ".p2p";
215 
216 const char P2PManagerImpl::kTmpExtension[] = ".tmp";
217 
P2PManagerImpl(Configuration * configuration,ClockInterface * clock,UpdateManager * update_manager,const string & file_extension,const int num_files_to_keep,const TimeDelta & max_file_age)218 P2PManagerImpl::P2PManagerImpl(Configuration *configuration,
219                                ClockInterface *clock,
220                                UpdateManager* update_manager,
221                                const string& file_extension,
222                                const int num_files_to_keep,
223                                const TimeDelta& max_file_age)
224   : clock_(clock),
225     update_manager_(update_manager),
226     file_extension_(file_extension),
227     num_files_to_keep_(num_files_to_keep),
228     max_file_age_(max_file_age) {
229   configuration_.reset(configuration != nullptr ? configuration :
230                        new ConfigurationImpl());
231 }
232 
SetDevicePolicy(const policy::DevicePolicy * device_policy)233 void P2PManagerImpl::SetDevicePolicy(
234     const policy::DevicePolicy* device_policy) {
235   device_policy_ = device_policy;
236 }
237 
IsP2PEnabled()238 bool P2PManagerImpl::IsP2PEnabled() {
239   if (!waiting_for_enabled_status_change_) {
240     // Get and store an initial value.
241     if (update_manager_->PolicyRequest(&Policy::P2PEnabled, &is_enabled_) ==
242         EvalStatus::kFailed) {
243       is_enabled_ = false;
244       LOG(ERROR) << "Querying P2P enabled status failed, disabling.";
245     }
246 
247     // Track future changes (async).
248     ScheduleEnabledStatusChange();
249   }
250 
251   return is_enabled_;
252 }
253 
EnsureP2P(bool should_be_running)254 bool P2PManagerImpl::EnsureP2P(bool should_be_running) {
255   int return_code = 0;
256   string output;
257 
258   may_be_running_ = true;  // Unless successful, we must be conservative.
259 
260   vector<string> args = configuration_->GetInitctlArgs(should_be_running);
261   if (!Subprocess::SynchronousExec(args, &return_code, &output)) {
262     LOG(ERROR) << "Error spawning " << utils::StringVectorToString(args);
263     return false;
264   }
265 
266   // If initctl(8) does not exit normally (exit status other than zero), ensure
267   // that the error message is not benign by scanning stderr; this is a
268   // necessity because initctl does not offer actions such as "start if not
269   // running" or "stop if running".
270   // TODO(zeuthen,chromium:277051): Avoid doing this.
271   if (return_code != 0) {
272     const char *expected_error_message = should_be_running ?
273       "initctl: Job is already running: p2p\n" :
274       "initctl: Unknown instance \n";
275     if (output != expected_error_message)
276       return false;
277   }
278 
279   may_be_running_ = should_be_running;  // Successful after all.
280   return true;
281 }
282 
EnsureP2PRunning()283 bool P2PManagerImpl::EnsureP2PRunning() {
284   return EnsureP2P(true);
285 }
286 
EnsureP2PNotRunning()287 bool P2PManagerImpl::EnsureP2PNotRunning() {
288   return EnsureP2P(false);
289 }
290 
291 // Returns True if the timestamp in the first pair is greater than the
292 // timestamp in the latter. If used with std::sort() this will yield a
293 // sequence of elements where newer (high timestamps) elements precede
294 // older ones (low timestamps).
MatchCompareFunc(const pair<FilePath,Time> & a,const pair<FilePath,Time> & b)295 static bool MatchCompareFunc(const pair<FilePath, Time>& a,
296                              const pair<FilePath, Time>& b) {
297   return a.second > b.second;
298 }
299 
GetExt(Visibility visibility)300 string P2PManagerImpl::GetExt(Visibility visibility) {
301   string ext = string(".") + file_extension_ + kP2PExtension;
302   switch (visibility) {
303   case kVisible:
304     break;
305   case kNonVisible:
306     ext += kTmpExtension;
307     break;
308   // Don't add a default case to let the compiler warn about newly
309   // added enum values.
310   }
311   return ext;
312 }
313 
GetPath(const string & file_id,Visibility visibility)314 FilePath P2PManagerImpl::GetPath(const string& file_id, Visibility visibility) {
315   return configuration_->GetP2PDir().Append(file_id + GetExt(visibility));
316 }
317 
DeleteP2PFile(const FilePath & path,const string & reason)318 bool P2PManagerImpl::DeleteP2PFile(const FilePath& path,
319                                    const string& reason) {
320   LOG(INFO) << "Deleting p2p file " << path.value()
321             << " (reason: " << reason << ")";
322   if (unlink(path.value().c_str()) != 0) {
323     PLOG(ERROR) << "Error deleting p2p file " << path.value();
324     return false;
325   }
326   return true;
327 }
328 
329 
PerformHousekeeping()330 bool P2PManagerImpl::PerformHousekeeping() {
331   // Open p2p dir.
332   FilePath p2p_dir = configuration_->GetP2PDir();
333   const string ext_visible = GetExt(kVisible);
334   const string ext_non_visible = GetExt(kNonVisible);
335 
336   bool deletion_failed = false;
337   vector<pair<FilePath, Time>> matches;
338 
339   base::FileEnumerator dir(p2p_dir, false, base::FileEnumerator::FILES);
340   // Go through all files and collect their mtime.
341   for (FilePath name = dir.Next(); !name.empty(); name = dir.Next()) {
342     if (!(base::EndsWith(name.value(), ext_visible,
343                          base::CompareCase::SENSITIVE) ||
344           base::EndsWith(name.value(), ext_non_visible,
345                          base::CompareCase::SENSITIVE))) {
346       continue;
347     }
348 
349     Time time = dir.GetInfo().GetLastModifiedTime();
350 
351     // If instructed to keep only files younger than a given age
352     // (|max_file_age_| != 0), delete files satisfying this criteria
353     // right now. Otherwise add it to a list we'll consider for later.
354     if (clock_ != nullptr && max_file_age_ != TimeDelta() &&
355         clock_->GetWallclockTime() - time > max_file_age_) {
356       if (!DeleteP2PFile(name, "file too old"))
357         deletion_failed = true;
358     } else {
359       matches.push_back(std::make_pair(name, time));
360     }
361   }
362 
363   // If instructed to only keep N files (|max_files_to_keep_ != 0),
364   // sort list of matches, newest (biggest time) to oldest (lowest
365   // time). Then delete starting at element |num_files_to_keep_|.
366   if (num_files_to_keep_ > 0) {
367     std::sort(matches.begin(), matches.end(), MatchCompareFunc);
368     vector<pair<FilePath, Time>>::const_iterator i;
369     for (i = matches.begin() + num_files_to_keep_; i < matches.end(); ++i) {
370       if (!DeleteP2PFile(i->first, "too many files"))
371         deletion_failed = true;
372     }
373   }
374 
375   return !deletion_failed;
376 }
377 
378 // Helper class for implementing LookupUrlForFile().
379 class LookupData {
380  public:
LookupData(P2PManager::LookupCallback callback)381   explicit LookupData(P2PManager::LookupCallback callback)
382     : callback_(callback) {}
383 
~LookupData()384   ~LookupData() {
385     if (timeout_task_ != MessageLoop::kTaskIdNull)
386       MessageLoop::current()->CancelTask(timeout_task_);
387     if (child_pid_)
388       Subprocess::Get().KillExec(child_pid_);
389   }
390 
InitiateLookup(const vector<string> & cmd,TimeDelta timeout)391   void InitiateLookup(const vector<string>& cmd, TimeDelta timeout) {
392     // NOTE: if we fail early (i.e. in this method), we need to schedule
393     // an idle to report the error. This is because we guarantee that
394     // the callback is always called from the message loop (this
395     // guarantee is useful for testing).
396 
397     // We expect to run just "p2p-client" and find it in the path.
398     child_pid_ = Subprocess::Get().ExecFlags(
399         cmd, Subprocess::kSearchPath, {},
400         Bind(&LookupData::OnLookupDone, base::Unretained(this)));
401 
402     if (!child_pid_) {
403       LOG(ERROR) << "Error spawning " << utils::StringVectorToString(cmd);
404       ReportErrorAndDeleteInIdle();
405       return;
406     }
407 
408     if (timeout > TimeDelta()) {
409       timeout_task_ = MessageLoop::current()->PostDelayedTask(
410           FROM_HERE,
411           Bind(&LookupData::OnTimeout, base::Unretained(this)),
412           timeout);
413     }
414   }
415 
416  private:
ReportErrorAndDeleteInIdle()417   void ReportErrorAndDeleteInIdle() {
418     MessageLoop::current()->PostTask(FROM_HERE, Bind(
419         &LookupData::OnIdleForReportErrorAndDelete,
420         base::Unretained(this)));
421   }
422 
OnIdleForReportErrorAndDelete()423   void OnIdleForReportErrorAndDelete() {
424     ReportError();
425     delete this;
426   }
427 
IssueCallback(const string & url)428   void IssueCallback(const string& url) {
429     if (!callback_.is_null())
430       callback_.Run(url);
431   }
432 
ReportError()433   void ReportError() {
434     if (reported_)
435       return;
436     IssueCallback("");
437     reported_ = true;
438   }
439 
ReportSuccess(const string & output)440   void ReportSuccess(const string& output) {
441     if (reported_)
442       return;
443     string url = output;
444     size_t newline_pos = url.find('\n');
445     if (newline_pos != string::npos)
446       url.resize(newline_pos);
447 
448     // Since p2p-client(1) is constructing this URL itself strictly
449     // speaking there's no need to validate it... but, anyway, can't
450     // hurt.
451     if (url.compare(0, 7, "http://") == 0) {
452       IssueCallback(url);
453     } else {
454       LOG(ERROR) << "p2p URL '" << url << "' does not look right. Ignoring.";
455       ReportError();
456     }
457     reported_ = true;
458   }
459 
OnLookupDone(int return_code,const string & output)460   void OnLookupDone(int return_code, const string& output) {
461     child_pid_ = 0;
462     if (return_code != 0) {
463       LOG(INFO) << "Child exited with non-zero exit code "
464                 << return_code;
465       ReportError();
466     } else {
467       ReportSuccess(output);
468     }
469     delete this;
470   }
471 
OnTimeout()472   void OnTimeout() {
473     timeout_task_ = MessageLoop::kTaskIdNull;
474     ReportError();
475     delete this;
476   }
477 
478   P2PManager::LookupCallback callback_;
479 
480   // The Subprocess tag of the running process. A value of 0 means that the
481   // process is not running.
482   pid_t child_pid_{0};
483 
484   // The timeout task_id we are waiting on, if any.
485   MessageLoop::TaskId timeout_task_{MessageLoop::kTaskIdNull};
486 
487   bool reported_{false};
488 };
489 
LookupUrlForFile(const string & file_id,size_t minimum_size,TimeDelta max_time_to_wait,LookupCallback callback)490 void P2PManagerImpl::LookupUrlForFile(const string& file_id,
491                                       size_t minimum_size,
492                                       TimeDelta max_time_to_wait,
493                                       LookupCallback callback) {
494   LookupData *lookup_data = new LookupData(callback);
495   string file_id_with_ext = file_id + "." + file_extension_;
496   vector<string> args = configuration_->GetP2PClientArgs(file_id_with_ext,
497                                                          minimum_size);
498   lookup_data->InitiateLookup(args, max_time_to_wait);
499 }
500 
FileShare(const string & file_id,size_t expected_size)501 bool P2PManagerImpl::FileShare(const string& file_id,
502                                size_t expected_size) {
503   // Check if file already exist.
504   FilePath path = FileGetPath(file_id);
505   if (!path.empty()) {
506     // File exists - double check its expected size though.
507     ssize_t file_expected_size = FileGetExpectedSize(file_id);
508     if (file_expected_size == -1 ||
509         static_cast<size_t>(file_expected_size) != expected_size) {
510       LOG(ERROR) << "Existing p2p file " << path.value()
511                  << " with expected_size=" << file_expected_size
512                  << " does not match the passed in"
513                  << " expected_size=" << expected_size;
514       return false;
515     }
516     return true;
517   }
518 
519   // Before creating the file, bail if statvfs(3) indicates that at
520   // least twice the size is not available in P2P_DIR.
521   struct statvfs statvfsbuf;
522   FilePath p2p_dir = configuration_->GetP2PDir();
523   if (statvfs(p2p_dir.value().c_str(), &statvfsbuf) != 0) {
524     PLOG(ERROR) << "Error calling statvfs() for dir " << p2p_dir.value();
525     return false;
526   }
527   size_t free_bytes =
528       static_cast<size_t>(statvfsbuf.f_bsize) * statvfsbuf.f_bavail;
529   if (free_bytes < 2 * expected_size) {
530     // This can easily happen and is worth reporting.
531     LOG(INFO) << "Refusing to allocate p2p file of " << expected_size
532               << " bytes since the directory " << p2p_dir.value()
533               << " only has " << free_bytes
534               << " bytes available and this is less than twice the"
535               << " requested size.";
536     return false;
537   }
538 
539   // Okie-dokey looks like enough space is available - create the file.
540   path = GetPath(file_id, kNonVisible);
541   int fd = open(path.value().c_str(), O_CREAT | O_RDWR, 0644);
542   if (fd == -1) {
543     PLOG(ERROR) << "Error creating file with path " << path.value();
544     return false;
545   }
546   ScopedFdCloser fd_closer(&fd);
547 
548   // If the final size is known, allocate the file (e.g. reserve disk
549   // space) and set the user.cros-p2p-filesize xattr.
550   if (expected_size != 0) {
551     if (fallocate(fd,
552                   FALLOC_FL_KEEP_SIZE,  // Keep file size as 0.
553                   0,
554                   expected_size) != 0) {
555       if (errno == ENOSYS || errno == EOPNOTSUPP) {
556         // If the filesystem doesn't support the fallocate, keep
557         // going. This is helpful when running unit tests on build
558         // machines with ancient filesystems and/or OSes.
559         PLOG(WARNING) << "Ignoring fallocate(2) failure";
560       } else {
561         // ENOSPC can happen (funky race though, cf. the statvfs() check
562         // above), handle it gracefully, e.g. use logging level INFO.
563         PLOG(INFO) << "Error allocating " << expected_size
564                    << " bytes for file " << path.value();
565         if (unlink(path.value().c_str()) != 0) {
566           PLOG(ERROR) << "Error deleting file with path " << path.value();
567         }
568         return false;
569       }
570     }
571 
572     string decimal_size = std::to_string(expected_size);
573     if (fsetxattr(fd, kCrosP2PFileSizeXAttrName,
574                   decimal_size.c_str(), decimal_size.size(), 0) != 0) {
575       PLOG(ERROR) << "Error setting xattr " << path.value();
576       return false;
577     }
578   }
579 
580   return true;
581 }
582 
FileGetPath(const string & file_id)583 FilePath P2PManagerImpl::FileGetPath(const string& file_id) {
584   struct stat statbuf;
585   FilePath path;
586 
587   path = GetPath(file_id, kVisible);
588   if (stat(path.value().c_str(), &statbuf) == 0) {
589     return path;
590   }
591 
592   path = GetPath(file_id, kNonVisible);
593   if (stat(path.value().c_str(), &statbuf) == 0) {
594     return path;
595   }
596 
597   path.clear();
598   return path;
599 }
600 
FileGetVisible(const string & file_id,bool * out_result)601 bool P2PManagerImpl::FileGetVisible(const string& file_id,
602                                     bool *out_result) {
603   FilePath path = FileGetPath(file_id);
604   if (path.empty()) {
605     LOG(ERROR) << "No file for id " << file_id;
606     return false;
607   }
608   if (out_result != nullptr)
609     *out_result = path.MatchesExtension(kP2PExtension);
610   return true;
611 }
612 
FileMakeVisible(const string & file_id)613 bool P2PManagerImpl::FileMakeVisible(const string& file_id) {
614   FilePath path = FileGetPath(file_id);
615   if (path.empty()) {
616     LOG(ERROR) << "No file for id " << file_id;
617     return false;
618   }
619 
620   // Already visible?
621   if (path.MatchesExtension(kP2PExtension))
622     return true;
623 
624   LOG_ASSERT(path.MatchesExtension(kTmpExtension));
625   FilePath new_path = path.RemoveExtension();
626   LOG_ASSERT(new_path.MatchesExtension(kP2PExtension));
627   if (rename(path.value().c_str(), new_path.value().c_str()) != 0) {
628     PLOG(ERROR) << "Error renaming " << path.value()
629                 << " to " << new_path.value();
630     return false;
631   }
632 
633   return true;
634 }
635 
FileGetSize(const string & file_id)636 ssize_t P2PManagerImpl::FileGetSize(const string& file_id) {
637   FilePath path = FileGetPath(file_id);
638   if (path.empty())
639     return -1;
640 
641   return utils::FileSize(path.value());
642 }
643 
FileGetExpectedSize(const string & file_id)644 ssize_t P2PManagerImpl::FileGetExpectedSize(const string& file_id) {
645   FilePath path = FileGetPath(file_id);
646   if (path.empty())
647     return -1;
648 
649   char ea_value[64] = { 0 };
650   ssize_t ea_size;
651   ea_size = getxattr(path.value().c_str(), kCrosP2PFileSizeXAttrName,
652                      &ea_value, sizeof(ea_value) - 1);
653   if (ea_size == -1) {
654     PLOG(ERROR) << "Error calling getxattr() on file " << path.value();
655     return -1;
656   }
657 
658   char* endp = nullptr;
659   long long int val = strtoll(ea_value, &endp, 0);  // NOLINT(runtime/int)
660   if (*endp != '\0') {
661     LOG(ERROR) << "Error parsing the value '" << ea_value
662                << "' of the xattr " << kCrosP2PFileSizeXAttrName
663                << " as an integer";
664     return -1;
665   }
666 
667   return val;
668 }
669 
CountSharedFiles()670 int P2PManagerImpl::CountSharedFiles() {
671   int num_files = 0;
672 
673   FilePath p2p_dir = configuration_->GetP2PDir();
674   const string ext_visible = GetExt(kVisible);
675   const string ext_non_visible = GetExt(kNonVisible);
676 
677   base::FileEnumerator dir(p2p_dir, false, base::FileEnumerator::FILES);
678   for (FilePath name = dir.Next(); !name.empty(); name = dir.Next()) {
679     if (base::EndsWith(name.value(), ext_visible,
680                        base::CompareCase::SENSITIVE) ||
681         base::EndsWith(name.value(), ext_non_visible,
682                        base::CompareCase::SENSITIVE)) {
683       num_files += 1;
684     }
685   }
686 
687   return num_files;
688 }
689 
ScheduleEnabledStatusChange()690 void P2PManagerImpl::ScheduleEnabledStatusChange() {
691   if (waiting_for_enabled_status_change_)
692     return;
693 
694   Callback<void(EvalStatus, const bool&)> callback = Bind(
695       &P2PManagerImpl::OnEnabledStatusChange, base::Unretained(this));
696   update_manager_->AsyncPolicyRequest(callback, &Policy::P2PEnabledChanged,
697                                       is_enabled_);
698   waiting_for_enabled_status_change_ = true;
699 }
700 
OnEnabledStatusChange(EvalStatus status,const bool & result)701 void P2PManagerImpl::OnEnabledStatusChange(EvalStatus status,
702                                            const bool& result) {
703   waiting_for_enabled_status_change_ = false;
704 
705   if (status == EvalStatus::kSucceeded) {
706     if (result == is_enabled_) {
707       LOG(WARNING) << "P2P enabled status did not change, which means that it "
708                       "is permanent; not scheduling further checks.";
709       waiting_for_enabled_status_change_ = true;
710       return;
711     }
712 
713     is_enabled_ = result;
714 
715     // If P2P is running but shouldn't be, make sure it isn't.
716     if (may_be_running_ && !is_enabled_ && !EnsureP2PNotRunning()) {
717       LOG(WARNING) << "Failed to stop P2P service.";
718     }
719   } else {
720     LOG(WARNING)
721         << "P2P enabled tracking failed (possibly timed out); retrying.";
722   }
723 
724   ScheduleEnabledStatusChange();
725 }
726 
Construct(Configuration * configuration,ClockInterface * clock,UpdateManager * update_manager,const string & file_extension,const int num_files_to_keep,const TimeDelta & max_file_age)727 P2PManager* P2PManager::Construct(
728     Configuration *configuration,
729     ClockInterface *clock,
730     UpdateManager* update_manager,
731     const string& file_extension,
732     const int num_files_to_keep,
733     const TimeDelta& max_file_age) {
734   return new P2PManagerImpl(configuration,
735                             clock,
736                             update_manager,
737                             file_extension,
738                             num_files_to_keep,
739                             max_file_age);
740 }
741 
742 }  // namespace chromeos_update_engine
743