• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 //
2 // Copyright (C) 2013 The Android Open Source Project
3 //
4 // Licensed under the Apache License, Version 2.0 (the "License");
5 // you may not use this file except in compliance with the License.
6 // You may obtain a copy of the License at
7 //
8 //      http://www.apache.org/licenses/LICENSE-2.0
9 //
10 // Unless required by applicable law or agreed to in writing, software
11 // distributed under the License is distributed on an "AS IS" BASIS,
12 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 // See the License for the specific language governing permissions and
14 // limitations under the License.
15 //
16 
17 // This provides access to timestamps with nanosecond resolution in
18 // struct stat, See NOTES in stat(2) for details.
19 #ifndef _DEFAULT_SOURCE
20 #define _DEFAULT_SOURCE
21 #endif
22 #ifndef _BSD_SOURCE
23 #define _BSD_SOURCE
24 #endif
25 
26 #include "update_engine/p2p_manager.h"
27 
28 #include <errno.h>
29 #include <fcntl.h>
30 #include <linux/falloc.h>
31 #include <signal.h>
32 #include <string.h>
33 #include <sys/stat.h>
34 #include <sys/statvfs.h>
35 #include <sys/types.h>
36 #include <sys/xattr.h>
37 #include <unistd.h>
38 
39 #include <algorithm>
40 #include <map>
41 #include <memory>
42 #include <utility>
43 #include <vector>
44 
45 #include <base/bind.h>
46 #include <base/files/file_enumerator.h>
47 #include <base/files/file_path.h>
48 #include <base/format_macros.h>
49 #include <base/logging.h>
50 #include <base/strings/string_util.h>
51 #include <base/strings/stringprintf.h>
52 
53 #include "update_engine/common/subprocess.h"
54 #include "update_engine/common/utils.h"
55 #include "update_engine/update_manager/policy.h"
56 #include "update_engine/update_manager/update_manager.h"
57 
58 using base::Bind;
59 using base::Callback;
60 using base::FilePath;
61 using base::StringPrintf;
62 using base::Time;
63 using base::TimeDelta;
64 using brillo::MessageLoop;
65 using chromeos_update_manager::EvalStatus;
66 using chromeos_update_manager::Policy;
67 using chromeos_update_manager::UpdateManager;
68 using std::map;
69 using std::pair;
70 using std::string;
71 using std::unique_ptr;
72 using std::vector;
73 
74 namespace chromeos_update_engine {
75 
76 namespace {
77 
78 // The default p2p directory.
79 const char kDefaultP2PDir[] = "/var/cache/p2p";
80 
81 // The p2p xattr used for conveying the final size of a file - see the
82 // p2p ddoc for details.
83 const char kCrosP2PFileSizeXAttrName[] = "user.cros-p2p-filesize";
84 
85 }  // namespace
86 
87 // The default P2PManager::Configuration implementation.
88 class ConfigurationImpl : public P2PManager::Configuration {
89  public:
ConfigurationImpl()90   ConfigurationImpl() {}
91 
GetP2PDir()92   FilePath GetP2PDir() override {
93     return FilePath(kDefaultP2PDir);
94   }
95 
GetInitctlArgs(bool is_start)96   vector<string> GetInitctlArgs(bool is_start) override {
97     vector<string> args;
98     args.push_back("initctl");
99     args.push_back(is_start ? "start" : "stop");
100     args.push_back("p2p");
101     return args;
102   }
103 
GetP2PClientArgs(const string & file_id,size_t minimum_size)104   vector<string> GetP2PClientArgs(const string &file_id,
105                                   size_t minimum_size) override {
106     vector<string> args;
107     args.push_back("p2p-client");
108     args.push_back(string("--get-url=") + file_id);
109     args.push_back(StringPrintf("--minimum-size=%" PRIuS, minimum_size));
110     return args;
111   }
112 
113  private:
114   DISALLOW_COPY_AND_ASSIGN(ConfigurationImpl);
115 };
116 
117 // The default P2PManager implementation.
118 class P2PManagerImpl : public P2PManager {
119  public:
120   P2PManagerImpl(Configuration *configuration,
121                  ClockInterface *clock,
122                  UpdateManager* update_manager,
123                  const string& file_extension,
124                  const int num_files_to_keep,
125                  const TimeDelta& max_file_age);
126 
127   // P2PManager methods.
128   void SetDevicePolicy(const policy::DevicePolicy* device_policy) override;
129   bool IsP2PEnabled() override;
130   bool EnsureP2PRunning() override;
131   bool EnsureP2PNotRunning() override;
132   bool PerformHousekeeping() override;
133   void LookupUrlForFile(const string& file_id,
134                         size_t minimum_size,
135                         TimeDelta max_time_to_wait,
136                         LookupCallback callback) override;
137   bool FileShare(const string& file_id,
138                  size_t expected_size) override;
139   FilePath FileGetPath(const string& file_id) override;
140   ssize_t FileGetSize(const string& file_id) override;
141   ssize_t FileGetExpectedSize(const string& file_id) override;
142   bool FileGetVisible(const string& file_id,
143                       bool *out_result) override;
144   bool FileMakeVisible(const string& file_id) override;
145   int CountSharedFiles() override;
146 
147  private:
148   // Enumeration for specifying visibility.
149   enum Visibility {
150     kVisible,
151     kNonVisible
152   };
153 
154   // Returns "." + |file_extension_| + ".p2p" if |visibility| is
155   // |kVisible|. Returns the same concatenated with ".tmp" otherwise.
156   string GetExt(Visibility visibility);
157 
158   // Gets the on-disk path for |file_id| depending on if the file
159   // is visible or not.
160   FilePath GetPath(const string& file_id, Visibility visibility);
161 
162   // Utility function used by EnsureP2PRunning() and EnsureP2PNotRunning().
163   bool EnsureP2P(bool should_be_running);
164 
165   // Utility function to delete a file given by |path| and log the
166   // path as well as |reason|. Returns false on failure.
167   bool DeleteP2PFile(const FilePath& path, const string& reason);
168 
169   // Schedules an async request for tracking changes in P2P enabled status.
170   void ScheduleEnabledStatusChange();
171 
172   // An async callback used by the above.
173   void OnEnabledStatusChange(EvalStatus status, const bool& result);
174 
175   // The device policy being used or null if no policy is being used.
176   const policy::DevicePolicy* device_policy_ = nullptr;
177 
178   // Configuration object.
179   unique_ptr<Configuration> configuration_;
180 
181   // Object for telling the time.
182   ClockInterface* clock_;
183 
184   // A pointer to the global Update Manager.
185   UpdateManager* update_manager_;
186 
187   // A short string unique to the application (for example "cros_au")
188   // used to mark a file as being owned by a particular application.
189   const string file_extension_;
190 
191   // If non-zero, this number denotes how many files in /var/cache/p2p
192   // owned by the application (cf. |file_extension_|) to keep after
193   // performing housekeeping.
194   const int num_files_to_keep_;
195 
196   // If non-zero, files older than this will not be kept after
197   // performing housekeeping.
198   const TimeDelta max_file_age_;
199 
200   // The string ".p2p".
201   static const char kP2PExtension[];
202 
203   // The string ".tmp".
204   static const char kTmpExtension[];
205 
206   // Whether P2P service may be running; initially, we assume it may be.
207   bool may_be_running_ = true;
208 
209   // The current known enabled status of the P2P feature (initialized lazily),
210   // and whether an async status check has been scheduled.
211   bool is_enabled_;
212   bool waiting_for_enabled_status_change_ = false;
213 
214   DISALLOW_COPY_AND_ASSIGN(P2PManagerImpl);
215 };
216 
217 const char P2PManagerImpl::kP2PExtension[] = ".p2p";
218 
219 const char P2PManagerImpl::kTmpExtension[] = ".tmp";
220 
P2PManagerImpl(Configuration * configuration,ClockInterface * clock,UpdateManager * update_manager,const string & file_extension,const int num_files_to_keep,const TimeDelta & max_file_age)221 P2PManagerImpl::P2PManagerImpl(Configuration *configuration,
222                                ClockInterface *clock,
223                                UpdateManager* update_manager,
224                                const string& file_extension,
225                                const int num_files_to_keep,
226                                const TimeDelta& max_file_age)
227   : clock_(clock),
228     update_manager_(update_manager),
229     file_extension_(file_extension),
230     num_files_to_keep_(num_files_to_keep),
231     max_file_age_(max_file_age) {
232   configuration_.reset(configuration != nullptr ? configuration :
233                        new ConfigurationImpl());
234 }
235 
SetDevicePolicy(const policy::DevicePolicy * device_policy)236 void P2PManagerImpl::SetDevicePolicy(
237     const policy::DevicePolicy* device_policy) {
238   device_policy_ = device_policy;
239 }
240 
IsP2PEnabled()241 bool P2PManagerImpl::IsP2PEnabled() {
242   if (!waiting_for_enabled_status_change_) {
243     // Get and store an initial value.
244     if (update_manager_->PolicyRequest(&Policy::P2PEnabled, &is_enabled_) ==
245         EvalStatus::kFailed) {
246       is_enabled_ = false;
247       LOG(ERROR) << "Querying P2P enabled status failed, disabling.";
248     }
249 
250     // Track future changes (async).
251     ScheduleEnabledStatusChange();
252   }
253 
254   return is_enabled_;
255 }
256 
EnsureP2P(bool should_be_running)257 bool P2PManagerImpl::EnsureP2P(bool should_be_running) {
258   int return_code = 0;
259   string output;
260 
261   may_be_running_ = true;  // Unless successful, we must be conservative.
262 
263   vector<string> args = configuration_->GetInitctlArgs(should_be_running);
264   if (!Subprocess::SynchronousExec(args, &return_code, &output)) {
265     LOG(ERROR) << "Error spawning " << utils::StringVectorToString(args);
266     return false;
267   }
268 
269   // If initctl(8) does not exit normally (exit status other than zero), ensure
270   // that the error message is not benign by scanning stderr; this is a
271   // necessity because initctl does not offer actions such as "start if not
272   // running" or "stop if running".
273   // TODO(zeuthen,chromium:277051): Avoid doing this.
274   if (return_code != 0) {
275     const char *expected_error_message = should_be_running ?
276       "initctl: Job is already running: p2p\n" :
277       "initctl: Unknown instance \n";
278     if (output != expected_error_message)
279       return false;
280   }
281 
282   may_be_running_ = should_be_running;  // Successful after all.
283   return true;
284 }
285 
EnsureP2PRunning()286 bool P2PManagerImpl::EnsureP2PRunning() {
287   return EnsureP2P(true);
288 }
289 
EnsureP2PNotRunning()290 bool P2PManagerImpl::EnsureP2PNotRunning() {
291   return EnsureP2P(false);
292 }
293 
294 // Returns True if the timestamp in the first pair is greater than the
295 // timestamp in the latter. If used with std::sort() this will yield a
296 // sequence of elements where newer (high timestamps) elements precede
297 // older ones (low timestamps).
MatchCompareFunc(const pair<FilePath,Time> & a,const pair<FilePath,Time> & b)298 static bool MatchCompareFunc(const pair<FilePath, Time>& a,
299                              const pair<FilePath, Time>& b) {
300   return a.second > b.second;
301 }
302 
GetExt(Visibility visibility)303 string P2PManagerImpl::GetExt(Visibility visibility) {
304   string ext = string(".") + file_extension_ + kP2PExtension;
305   switch (visibility) {
306   case kVisible:
307     break;
308   case kNonVisible:
309     ext += kTmpExtension;
310     break;
311   // Don't add a default case to let the compiler warn about newly
312   // added enum values.
313   }
314   return ext;
315 }
316 
GetPath(const string & file_id,Visibility visibility)317 FilePath P2PManagerImpl::GetPath(const string& file_id, Visibility visibility) {
318   return configuration_->GetP2PDir().Append(file_id + GetExt(visibility));
319 }
320 
DeleteP2PFile(const FilePath & path,const string & reason)321 bool P2PManagerImpl::DeleteP2PFile(const FilePath& path,
322                                    const string& reason) {
323   LOG(INFO) << "Deleting p2p file " << path.value()
324             << " (reason: " << reason << ")";
325   if (unlink(path.value().c_str()) != 0) {
326     PLOG(ERROR) << "Error deleting p2p file " << path.value();
327     return false;
328   }
329   return true;
330 }
331 
332 
PerformHousekeeping()333 bool P2PManagerImpl::PerformHousekeeping() {
334   // Open p2p dir.
335   FilePath p2p_dir = configuration_->GetP2PDir();
336   const string ext_visible = GetExt(kVisible);
337   const string ext_non_visible = GetExt(kNonVisible);
338 
339   bool deletion_failed = false;
340   vector<pair<FilePath, Time>> matches;
341 
342   base::FileEnumerator dir(p2p_dir, false, base::FileEnumerator::FILES);
343   // Go through all files and collect their mtime.
344   for (FilePath name = dir.Next(); !name.empty(); name = dir.Next()) {
345     if (!(base::EndsWith(name.value(), ext_visible,
346                          base::CompareCase::SENSITIVE) ||
347           base::EndsWith(name.value(), ext_non_visible,
348                          base::CompareCase::SENSITIVE))) {
349       continue;
350     }
351 
352     Time time = dir.GetInfo().GetLastModifiedTime();
353 
354     // If instructed to keep only files younger than a given age
355     // (|max_file_age_| != 0), delete files satisfying this criteria
356     // right now. Otherwise add it to a list we'll consider for later.
357     if (clock_ != nullptr && max_file_age_ != TimeDelta() &&
358         clock_->GetWallclockTime() - time > max_file_age_) {
359       if (!DeleteP2PFile(name, "file too old"))
360         deletion_failed = true;
361     } else {
362       matches.push_back(std::make_pair(name, time));
363     }
364   }
365 
366   // If instructed to only keep N files (|max_files_to_keep_ != 0),
367   // sort list of matches, newest (biggest time) to oldest (lowest
368   // time). Then delete starting at element |num_files_to_keep_|.
369   if (num_files_to_keep_ > 0) {
370     std::sort(matches.begin(), matches.end(), MatchCompareFunc);
371     vector<pair<FilePath, Time>>::const_iterator i;
372     for (i = matches.begin() + num_files_to_keep_; i < matches.end(); ++i) {
373       if (!DeleteP2PFile(i->first, "too many files"))
374         deletion_failed = true;
375     }
376   }
377 
378   return !deletion_failed;
379 }
380 
381 // Helper class for implementing LookupUrlForFile().
382 class LookupData {
383  public:
LookupData(P2PManager::LookupCallback callback)384   explicit LookupData(P2PManager::LookupCallback callback)
385     : callback_(callback) {}
386 
~LookupData()387   ~LookupData() {
388     if (timeout_task_ != MessageLoop::kTaskIdNull)
389       MessageLoop::current()->CancelTask(timeout_task_);
390     if (child_pid_)
391       Subprocess::Get().KillExec(child_pid_);
392   }
393 
InitiateLookup(const vector<string> & cmd,TimeDelta timeout)394   void InitiateLookup(const vector<string>& cmd, TimeDelta timeout) {
395     // NOTE: if we fail early (i.e. in this method), we need to schedule
396     // an idle to report the error. This is because we guarantee that
397     // the callback is always called from the message loop (this
398     // guarantee is useful for testing).
399 
400     // We expect to run just "p2p-client" and find it in the path.
401     child_pid_ = Subprocess::Get().ExecFlags(
402         cmd, Subprocess::kSearchPath, {},
403         Bind(&LookupData::OnLookupDone, base::Unretained(this)));
404 
405     if (!child_pid_) {
406       LOG(ERROR) << "Error spawning " << utils::StringVectorToString(cmd);
407       ReportErrorAndDeleteInIdle();
408       return;
409     }
410 
411     if (timeout > TimeDelta()) {
412       timeout_task_ = MessageLoop::current()->PostDelayedTask(
413           FROM_HERE,
414           Bind(&LookupData::OnTimeout, base::Unretained(this)),
415           timeout);
416     }
417   }
418 
419  private:
ReportErrorAndDeleteInIdle()420   void ReportErrorAndDeleteInIdle() {
421     MessageLoop::current()->PostTask(FROM_HERE, Bind(
422         &LookupData::OnIdleForReportErrorAndDelete,
423         base::Unretained(this)));
424   }
425 
OnIdleForReportErrorAndDelete()426   void OnIdleForReportErrorAndDelete() {
427     ReportError();
428     delete this;
429   }
430 
IssueCallback(const string & url)431   void IssueCallback(const string& url) {
432     if (!callback_.is_null())
433       callback_.Run(url);
434   }
435 
ReportError()436   void ReportError() {
437     if (reported_)
438       return;
439     IssueCallback("");
440     reported_ = true;
441   }
442 
ReportSuccess(const string & output)443   void ReportSuccess(const string& output) {
444     if (reported_)
445       return;
446     string url = output;
447     size_t newline_pos = url.find('\n');
448     if (newline_pos != string::npos)
449       url.resize(newline_pos);
450 
451     // Since p2p-client(1) is constructing this URL itself strictly
452     // speaking there's no need to validate it... but, anyway, can't
453     // hurt.
454     if (url.compare(0, 7, "http://") == 0) {
455       IssueCallback(url);
456     } else {
457       LOG(ERROR) << "p2p URL '" << url << "' does not look right. Ignoring.";
458       ReportError();
459     }
460     reported_ = true;
461   }
462 
OnLookupDone(int return_code,const string & output)463   void OnLookupDone(int return_code, const string& output) {
464     child_pid_ = 0;
465     if (return_code != 0) {
466       LOG(INFO) << "Child exited with non-zero exit code "
467                 << return_code;
468       ReportError();
469     } else {
470       ReportSuccess(output);
471     }
472     delete this;
473   }
474 
OnTimeout()475   void OnTimeout() {
476     timeout_task_ = MessageLoop::kTaskIdNull;
477     ReportError();
478     delete this;
479   }
480 
481   P2PManager::LookupCallback callback_;
482 
483   // The Subprocess tag of the running process. A value of 0 means that the
484   // process is not running.
485   pid_t child_pid_{0};
486 
487   // The timeout task_id we are waiting on, if any.
488   MessageLoop::TaskId timeout_task_{MessageLoop::kTaskIdNull};
489 
490   bool reported_{false};
491 };
492 
LookupUrlForFile(const string & file_id,size_t minimum_size,TimeDelta max_time_to_wait,LookupCallback callback)493 void P2PManagerImpl::LookupUrlForFile(const string& file_id,
494                                       size_t minimum_size,
495                                       TimeDelta max_time_to_wait,
496                                       LookupCallback callback) {
497   LookupData *lookup_data = new LookupData(callback);
498   string file_id_with_ext = file_id + "." + file_extension_;
499   vector<string> args = configuration_->GetP2PClientArgs(file_id_with_ext,
500                                                          minimum_size);
501   lookup_data->InitiateLookup(args, max_time_to_wait);
502 }
503 
FileShare(const string & file_id,size_t expected_size)504 bool P2PManagerImpl::FileShare(const string& file_id,
505                                size_t expected_size) {
506   // Check if file already exist.
507   FilePath path = FileGetPath(file_id);
508   if (!path.empty()) {
509     // File exists - double check its expected size though.
510     ssize_t file_expected_size = FileGetExpectedSize(file_id);
511     if (file_expected_size == -1 ||
512         static_cast<size_t>(file_expected_size) != expected_size) {
513       LOG(ERROR) << "Existing p2p file " << path.value()
514                  << " with expected_size=" << file_expected_size
515                  << " does not match the passed in"
516                  << " expected_size=" << expected_size;
517       return false;
518     }
519     return true;
520   }
521 
522   // Before creating the file, bail if statvfs(3) indicates that at
523   // least twice the size is not available in P2P_DIR.
524   struct statvfs statvfsbuf;
525   FilePath p2p_dir = configuration_->GetP2PDir();
526   if (statvfs(p2p_dir.value().c_str(), &statvfsbuf) != 0) {
527     PLOG(ERROR) << "Error calling statvfs() for dir " << p2p_dir.value();
528     return false;
529   }
530   size_t free_bytes =
531       static_cast<size_t>(statvfsbuf.f_bsize) * statvfsbuf.f_bavail;
532   if (free_bytes < 2 * expected_size) {
533     // This can easily happen and is worth reporting.
534     LOG(INFO) << "Refusing to allocate p2p file of " << expected_size
535               << " bytes since the directory " << p2p_dir.value()
536               << " only has " << free_bytes
537               << " bytes available and this is less than twice the"
538               << " requested size.";
539     return false;
540   }
541 
542   // Okie-dokey looks like enough space is available - create the file.
543   path = GetPath(file_id, kNonVisible);
544   int fd = open(path.value().c_str(), O_CREAT | O_RDWR, 0644);
545   if (fd == -1) {
546     PLOG(ERROR) << "Error creating file with path " << path.value();
547     return false;
548   }
549   ScopedFdCloser fd_closer(&fd);
550 
551   // If the final size is known, allocate the file (e.g. reserve disk
552   // space) and set the user.cros-p2p-filesize xattr.
553   if (expected_size != 0) {
554     if (fallocate(fd,
555                   FALLOC_FL_KEEP_SIZE,  // Keep file size as 0.
556                   0,
557                   expected_size) != 0) {
558       if (errno == ENOSYS || errno == EOPNOTSUPP) {
559         // If the filesystem doesn't support the fallocate, keep
560         // going. This is helpful when running unit tests on build
561         // machines with ancient filesystems and/or OSes.
562         PLOG(WARNING) << "Ignoring fallocate(2) failure";
563       } else {
564         // ENOSPC can happen (funky race though, cf. the statvfs() check
565         // above), handle it gracefully, e.g. use logging level INFO.
566         PLOG(INFO) << "Error allocating " << expected_size
567                    << " bytes for file " << path.value();
568         if (unlink(path.value().c_str()) != 0) {
569           PLOG(ERROR) << "Error deleting file with path " << path.value();
570         }
571         return false;
572       }
573     }
574 
575     string decimal_size = std::to_string(expected_size);
576     if (fsetxattr(fd, kCrosP2PFileSizeXAttrName,
577                   decimal_size.c_str(), decimal_size.size(), 0) != 0) {
578       PLOG(ERROR) << "Error setting xattr " << path.value();
579       return false;
580     }
581   }
582 
583   return true;
584 }
585 
FileGetPath(const string & file_id)586 FilePath P2PManagerImpl::FileGetPath(const string& file_id) {
587   struct stat statbuf;
588   FilePath path;
589 
590   path = GetPath(file_id, kVisible);
591   if (stat(path.value().c_str(), &statbuf) == 0) {
592     return path;
593   }
594 
595   path = GetPath(file_id, kNonVisible);
596   if (stat(path.value().c_str(), &statbuf) == 0) {
597     return path;
598   }
599 
600   path.clear();
601   return path;
602 }
603 
FileGetVisible(const string & file_id,bool * out_result)604 bool P2PManagerImpl::FileGetVisible(const string& file_id,
605                                     bool *out_result) {
606   FilePath path = FileGetPath(file_id);
607   if (path.empty()) {
608     LOG(ERROR) << "No file for id " << file_id;
609     return false;
610   }
611   if (out_result != nullptr)
612     *out_result = path.MatchesExtension(kP2PExtension);
613   return true;
614 }
615 
FileMakeVisible(const string & file_id)616 bool P2PManagerImpl::FileMakeVisible(const string& file_id) {
617   FilePath path = FileGetPath(file_id);
618   if (path.empty()) {
619     LOG(ERROR) << "No file for id " << file_id;
620     return false;
621   }
622 
623   // Already visible?
624   if (path.MatchesExtension(kP2PExtension))
625     return true;
626 
627   LOG_ASSERT(path.MatchesExtension(kTmpExtension));
628   FilePath new_path = path.RemoveExtension();
629   LOG_ASSERT(new_path.MatchesExtension(kP2PExtension));
630   if (rename(path.value().c_str(), new_path.value().c_str()) != 0) {
631     PLOG(ERROR) << "Error renaming " << path.value()
632                 << " to " << new_path.value();
633     return false;
634   }
635 
636   return true;
637 }
638 
FileGetSize(const string & file_id)639 ssize_t P2PManagerImpl::FileGetSize(const string& file_id) {
640   FilePath path = FileGetPath(file_id);
641   if (path.empty())
642     return -1;
643 
644   return utils::FileSize(path.value());
645 }
646 
FileGetExpectedSize(const string & file_id)647 ssize_t P2PManagerImpl::FileGetExpectedSize(const string& file_id) {
648   FilePath path = FileGetPath(file_id);
649   if (path.empty())
650     return -1;
651 
652   char ea_value[64] = { 0 };
653   ssize_t ea_size;
654   ea_size = getxattr(path.value().c_str(), kCrosP2PFileSizeXAttrName,
655                      &ea_value, sizeof(ea_value) - 1);
656   if (ea_size == -1) {
657     PLOG(ERROR) << "Error calling getxattr() on file " << path.value();
658     return -1;
659   }
660 
661   char* endp = nullptr;
662   long long int val = strtoll(ea_value, &endp, 0);  // NOLINT(runtime/int)
663   if (*endp != '\0') {
664     LOG(ERROR) << "Error parsing the value '" << ea_value
665                << "' of the xattr " << kCrosP2PFileSizeXAttrName
666                << " as an integer";
667     return -1;
668   }
669 
670   return val;
671 }
672 
CountSharedFiles()673 int P2PManagerImpl::CountSharedFiles() {
674   int num_files = 0;
675 
676   FilePath p2p_dir = configuration_->GetP2PDir();
677   const string ext_visible = GetExt(kVisible);
678   const string ext_non_visible = GetExt(kNonVisible);
679 
680   base::FileEnumerator dir(p2p_dir, false, base::FileEnumerator::FILES);
681   for (FilePath name = dir.Next(); !name.empty(); name = dir.Next()) {
682     if (base::EndsWith(name.value(), ext_visible,
683                        base::CompareCase::SENSITIVE) ||
684         base::EndsWith(name.value(), ext_non_visible,
685                        base::CompareCase::SENSITIVE)) {
686       num_files += 1;
687     }
688   }
689 
690   return num_files;
691 }
692 
ScheduleEnabledStatusChange()693 void P2PManagerImpl::ScheduleEnabledStatusChange() {
694   if (waiting_for_enabled_status_change_)
695     return;
696 
697   Callback<void(EvalStatus, const bool&)> callback = Bind(
698       &P2PManagerImpl::OnEnabledStatusChange, base::Unretained(this));
699   update_manager_->AsyncPolicyRequest(callback, &Policy::P2PEnabledChanged,
700                                       is_enabled_);
701   waiting_for_enabled_status_change_ = true;
702 }
703 
OnEnabledStatusChange(EvalStatus status,const bool & result)704 void P2PManagerImpl::OnEnabledStatusChange(EvalStatus status,
705                                            const bool& result) {
706   waiting_for_enabled_status_change_ = false;
707 
708   if (status == EvalStatus::kSucceeded) {
709     if (result == is_enabled_) {
710       LOG(WARNING) << "P2P enabled status did not change, which means that it "
711                       "is permanent; not scheduling further checks.";
712       waiting_for_enabled_status_change_ = true;
713       return;
714     }
715 
716     is_enabled_ = result;
717 
718     // If P2P is running but shouldn't be, make sure it isn't.
719     if (may_be_running_ && !is_enabled_ && !EnsureP2PNotRunning()) {
720       LOG(WARNING) << "Failed to stop P2P service.";
721     }
722   } else {
723     LOG(WARNING)
724         << "P2P enabled tracking failed (possibly timed out); retrying.";
725   }
726 
727   ScheduleEnabledStatusChange();
728 }
729 
Construct(Configuration * configuration,ClockInterface * clock,UpdateManager * update_manager,const string & file_extension,const int num_files_to_keep,const TimeDelta & max_file_age)730 P2PManager* P2PManager::Construct(
731     Configuration *configuration,
732     ClockInterface *clock,
733     UpdateManager* update_manager,
734     const string& file_extension,
735     const int num_files_to_keep,
736     const TimeDelta& max_file_age) {
737   return new P2PManagerImpl(configuration,
738                             clock,
739                             update_manager,
740                             file_extension,
741                             num_files_to_keep,
742                             max_file_age);
743 }
744 
745 }  // namespace chromeos_update_engine
746