Home | History | Annotate | Download | only in prefs
      1 /*
      2  * Copyright (C) 2014 The Android Open Source Project
      3  * Copyright (c) 2000, 2011, Oracle and/or its affiliates. All rights reserved.
      4  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
      5  *
      6  * This code is free software; you can redistribute it and/or modify it
      7  * under the terms of the GNU General Public License version 2 only, as
      8  * published by the Free Software Foundation.  Oracle designates this
      9  * particular file as subject to the "Classpath" exception as provided
     10  * by Oracle in the LICENSE file that accompanied this code.
     11  *
     12  * This code is distributed in the hope that it will be useful, but WITHOUT
     13  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
     14  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
     15  * version 2 for more details (a copy is included in the LICENSE file that
     16  * accompanied this code).
     17  *
     18  * You should have received a copy of the GNU General Public License version
     19  * 2 along with this work; if not, write to the Free Software Foundation,
     20  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
     21  *
     22  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
     23  * or visit www.oracle.com if you need additional information or have any
     24  * questions.
     25  */
     26 
     27 package java.util.prefs;
     28 import java.util.*;
     29 import java.io.*;
     30 import java.security.AccessController;
     31 import java.security.PrivilegedAction;
     32 import java.security.PrivilegedExceptionAction;
     33 import java.security.PrivilegedActionException;
     34 
     35 import sun.util.logging.PlatformLogger;
     36 
     37 /**
     38  * Preferences implementation for Unix.  Preferences are stored in the file
     39  * system, with one directory per preferences node.  All of the preferences
     40  * at each node are stored in a single file.  Atomic file system operations
     41  * (e.g. File.renameTo) are used to ensure integrity.  An in-memory cache of
     42  * the "explored" portion of the tree is maintained for performance, and
     43  * written back to the disk periodically.  File-locking is used to ensure
     44  * reasonable behavior when multiple VMs are running at the same time.
     45  * (The file lock is obtained only for sync(), flush() and removeNode().)
     46  *
     47  * @author  Josh Bloch
     48  * @see     Preferences
     49  * @since   1.4
     50  *
     51  * @hide
     52  */
     53 // Android-changed: @hide.
     54 public class FileSystemPreferences extends AbstractPreferences {
     55     /**
     56      * Returns logger for error messages. Backing store exceptions are logged at
     57      * WARNING level.
     58      */
     59     private static PlatformLogger getLogger() {
     60         return PlatformLogger.getLogger("java.util.prefs");
     61     }
     62 
     63     /**
     64      * Directory for system preferences.
     65      */
     66     private static File systemRootDir;
     67 
     68     /*
     69      * Flag, indicating whether systemRoot  directory is writable
     70      */
     71     private static boolean isSystemRootWritable;
     72 
     73     /**
     74      * Directory for user preferences.
     75      */
     76     private static File userRootDir;
     77 
     78     /*
     79      * Flag, indicating whether userRoot  directory is writable
     80      */
     81     private static boolean isUserRootWritable;
     82 
     83    /**
     84      * The user root.
     85      */
     86     static Preferences userRoot = null;
     87 
     88     static synchronized Preferences getUserRoot() {
     89         if (userRoot == null) {
     90             setupUserRoot();
     91             userRoot = new FileSystemPreferences(true);
     92         }
     93         return userRoot;
     94     }
     95 
     96     private static void setupUserRoot() {
     97         AccessController.doPrivileged(new PrivilegedAction<Void>() {
     98             public Void run() {
     99                 userRootDir =
    100                       new File(System.getProperty("java.util.prefs.userRoot",
    101                       System.getProperty("user.home")), ".java/.userPrefs");
    102                 // Attempt to create root dir if it does not yet exist.
    103                 if (!userRootDir.exists()) {
    104                     if (userRootDir.mkdirs()) {
    105                         try {
    106                             chmod(userRootDir.getCanonicalPath(), USER_RWX);
    107                         } catch (IOException e) {
    108                             getLogger().warning("Could not change permissions" +
    109                                 " on userRoot directory. ");
    110                         }
    111                         getLogger().info("Created user preferences directory.");
    112                     }
    113                     else
    114                         getLogger().warning("Couldn't create user preferences" +
    115                         " directory. User preferences are unusable.");
    116                 }
    117                 isUserRootWritable = userRootDir.canWrite();
    118                 String USER_NAME = System.getProperty("user.name");
    119                 userLockFile = new File (userRootDir,".user.lock." + USER_NAME);
    120                 userRootModFile = new File (userRootDir,
    121                                                ".userRootModFile." + USER_NAME);
    122                 if (!userRootModFile.exists())
    123                 try {
    124                     // create if does not exist.
    125                     userRootModFile.createNewFile();
    126                     // Only user can read/write userRootModFile.
    127                     int result = chmod(userRootModFile.getCanonicalPath(),
    128                                                                USER_READ_WRITE);
    129                     if (result !=0)
    130                         getLogger().warning("Problem creating userRoot " +
    131                             "mod file. Chmod failed on " +
    132                              userRootModFile.getCanonicalPath() +
    133                              " Unix error code " + result);
    134                 } catch (IOException e) {
    135                     getLogger().warning(e.toString());
    136                 }
    137                 userRootModTime = userRootModFile.lastModified();
    138                 return null;
    139             }
    140         });
    141     }
    142 
    143 
    144     /**
    145      * The system root.
    146      */
    147     static Preferences systemRoot;
    148 
    149     static synchronized Preferences getSystemRoot() {
    150         if (systemRoot == null) {
    151             setupSystemRoot();
    152             systemRoot = new FileSystemPreferences(false);
    153         }
    154         return systemRoot;
    155     }
    156 
    157     private static void setupSystemRoot() {
    158         AccessController.doPrivileged(new PrivilegedAction<Void>() {
    159             public Void run() {
    160                 String systemPrefsDirName =
    161                   System.getProperty("java.util.prefs.systemRoot","/etc/.java");
    162                 systemRootDir =
    163                      new File(systemPrefsDirName, ".systemPrefs");
    164                 // Attempt to create root dir if it does not yet exist.
    165                 if (!systemRootDir.exists()) {
    166                     // system root does not exist in /etc/.java
    167                     // Switching  to java.home
    168                     systemRootDir =
    169                                   new File(System.getProperty("java.home"),
    170                                                             ".systemPrefs");
    171                     if (!systemRootDir.exists()) {
    172                         if (systemRootDir.mkdirs()) {
    173                             getLogger().info(
    174                                 "Created system preferences directory "
    175                                 + "in java.home.");
    176                             try {
    177                                 chmod(systemRootDir.getCanonicalPath(),
    178                                                           USER_RWX_ALL_RX);
    179                             } catch (IOException e) {
    180                             }
    181                         } else {
    182                             getLogger().warning("Could not create "
    183                                 + "system preferences directory. System "
    184                                 + "preferences are unusable.");
    185                         }
    186                     }
    187                 }
    188                 isSystemRootWritable = systemRootDir.canWrite();
    189                 systemLockFile = new File(systemRootDir, ".system.lock");
    190                 systemRootModFile =
    191                                new File (systemRootDir,".systemRootModFile");
    192                 if (!systemRootModFile.exists() && isSystemRootWritable)
    193                 try {
    194                     // create if does not exist.
    195                     systemRootModFile.createNewFile();
    196                     int result = chmod(systemRootModFile.getCanonicalPath(),
    197                                                           USER_RW_ALL_READ);
    198                     if (result !=0)
    199                         getLogger().warning("Chmod failed on " +
    200                                systemRootModFile.getCanonicalPath() +
    201                               " Unix error code " + result);
    202                 } catch (IOException e) { getLogger().warning(e.toString());
    203                 }
    204                 systemRootModTime = systemRootModFile.lastModified();
    205                 return null;
    206             }
    207         });
    208     }
    209 
    210 
    211     /**
    212      * Unix user write/read permission
    213      */
    214     private static final int USER_READ_WRITE = 0600;
    215 
    216     private static final int USER_RW_ALL_READ = 0644;
    217 
    218 
    219     private static final int USER_RWX_ALL_RX = 0755;
    220 
    221     private static final int USER_RWX = 0700;
    222 
    223     /**
    224      * The lock file for the user tree.
    225      */
    226     static File userLockFile;
    227 
    228 
    229 
    230     /**
    231      * The lock file for the system tree.
    232      */
    233     static File systemLockFile;
    234 
    235     /**
    236      * Unix lock handle for userRoot.
    237      * Zero, if unlocked.
    238      */
    239 
    240     private static int userRootLockHandle = 0;
    241 
    242     /**
    243      * Unix lock handle for systemRoot.
    244      * Zero, if unlocked.
    245      */
    246 
    247     private static int systemRootLockHandle = 0;
    248 
    249     /**
    250      * The directory representing this preference node.  There is no guarantee
    251      * that this directory exits, as another VM can delete it at any time
    252      * that it (the other VM) holds the file-lock.  While the root node cannot
    253      * be deleted, it may not yet have been created, or the underlying
    254      * directory could have been deleted accidentally.
    255      */
    256     private final File dir;
    257 
    258     /**
    259      * The file representing this preference node's preferences.
    260      * The file format is undocumented, and subject to change
    261      * from release to release, but I'm sure that you can figure
    262      * it out if you try real hard.
    263      */
    264     private final File prefsFile;
    265 
    266     /**
    267      * A temporary file used for saving changes to preferences.  As part of
    268      * the sync operation, changes are first saved into this file, and then
    269      * atomically renamed to prefsFile.  This results in an atomic state
    270      * change from one valid set of preferences to another.  The
    271      * the file-lock is held for the duration of this transformation.
    272      */
    273     private final File tmpFile;
    274 
    275     /**
    276      * File, which keeps track of global modifications of userRoot.
    277      */
    278     private static  File userRootModFile;
    279 
    280     /**
    281      * Flag, which indicated whether userRoot was modified by another VM
    282      */
    283     private static boolean isUserRootModified = false;
    284 
    285     /**
    286      * Keeps track of userRoot modification time. This time is reset to
    287      * zero after UNIX reboot, and is increased by 1 second each time
    288      * userRoot is modified.
    289      */
    290     private static long userRootModTime;
    291 
    292 
    293     /*
    294      * File, which keeps track of global modifications of systemRoot
    295      */
    296     private static File systemRootModFile;
    297     /*
    298      * Flag, which indicates whether systemRoot was modified by another VM
    299      */
    300     private static boolean isSystemRootModified = false;
    301 
    302     /**
    303      * Keeps track of systemRoot modification time. This time is reset to
    304      * zero after system reboot, and is increased by 1 second each time
    305      * systemRoot is modified.
    306      */
    307     private static long systemRootModTime;
    308 
    309     /**
    310      * Locally cached preferences for this node (includes uncommitted
    311      * changes).  This map is initialized with from disk when the first get or
    312      * put operation occurs on this node.  It is synchronized with the
    313      * corresponding disk file (prefsFile) by the sync operation.  The initial
    314      * value is read *without* acquiring the file-lock.
    315      */
    316     private Map<String, String> prefsCache = null;
    317 
    318     /**
    319      * The last modification time of the file backing this node at the time
    320      * that prefCache was last synchronized (or initially read).  This
    321      * value is set *before* reading the file, so it's conservative; the
    322      * actual timestamp could be (slightly) higher.  A value of zero indicates
    323      * that we were unable to initialize prefsCache from the disk, or
    324      * have not yet attempted to do so.  (If prefsCache is non-null, it
    325      * indicates the former; if it's null, the latter.)
    326      */
    327     private long lastSyncTime = 0;
    328 
    329    /**
    330     * Unix error code for locked file.
    331     */
    332     private static final int EAGAIN = 11;
    333 
    334    /**
    335     * Unix error code for denied access.
    336     */
    337     private static final int EACCES = 13;
    338 
    339     /* Used to interpret results of native functions */
    340     private static final int LOCK_HANDLE = 0;
    341     private static final int ERROR_CODE = 1;
    342 
    343     /**
    344      * A list of all uncommitted preference changes.  The elements in this
    345      * list are of type PrefChange.  If this node is concurrently modified on
    346      * disk by another VM, the two sets of changes are merged when this node
    347      * is sync'ed by overwriting our prefsCache with the preference map last
    348      * written out to disk (by the other VM), and then replaying this change
    349      * log against that map.  The resulting map is then written back
    350      * to the disk.
    351      */
    352     final List<Change> changeLog = new ArrayList<>();
    353 
    354     /**
    355      * Represents a change to a preference.
    356      */
    357     private abstract class Change {
    358         /**
    359          * Reapplies the change to prefsCache.
    360          */
    361         abstract void replay();
    362     };
    363 
    364     /**
    365      * Represents a preference put.
    366      */
    367     private class Put extends Change {
    368         String key, value;
    369 
    370         Put(String key, String value) {
    371             this.key = key;
    372             this.value = value;
    373         }
    374 
    375         void replay() {
    376             prefsCache.put(key, value);
    377         }
    378     }
    379 
    380     /**
    381      * Represents a preference remove.
    382      */
    383     private class Remove extends Change {
    384         String key;
    385 
    386         Remove(String key) {
    387             this.key = key;
    388         }
    389 
    390         void replay() {
    391             prefsCache.remove(key);
    392         }
    393     }
    394 
    395     /**
    396      * Represents the creation of this node.
    397      */
    398     private class NodeCreate extends Change {
    399         /**
    400          * Performs no action, but the presence of this object in changeLog
    401          * will force the node and its ancestors to be made permanent at the
    402          * next sync.
    403          */
    404         void replay() {
    405         }
    406     }
    407 
    408     /**
    409      * NodeCreate object for this node.
    410      */
    411     NodeCreate nodeCreate = null;
    412 
    413     /**
    414      * Replay changeLog against prefsCache.
    415      */
    416     private void replayChanges() {
    417         for (int i = 0, n = changeLog.size(); i<n; i++)
    418             changeLog.get(i).replay();
    419     }
    420 
    421     static {
    422         // Add shutdown hook to flush cached prefs on normal termination
    423         Runtime.getRuntime().addShutdownHook(new Thread() {
    424             public void run() {
    425                 syncWorld();
    426             }
    427         });
    428     }
    429 
    430     private static void syncWorld() {
    431         /*
    432          * Synchronization necessary because userRoot and systemRoot are
    433          * lazily initialized.
    434          */
    435         Preferences userRt;
    436         Preferences systemRt;
    437         synchronized(FileSystemPreferences.class) {
    438             userRt   = userRoot;
    439             systemRt = systemRoot;
    440         }
    441 
    442         try {
    443             if (userRt != null)
    444                 userRt.flush();
    445         } catch(BackingStoreException e) {
    446             getLogger().warning("Couldn't flush user prefs: " + e);
    447         }
    448 
    449         try {
    450             if (systemRt != null)
    451                 systemRt.flush();
    452         } catch(BackingStoreException e) {
    453             getLogger().warning("Couldn't flush system prefs: " + e);
    454         }
    455     }
    456 
    457     private final boolean isUserNode;
    458 
    459     /**
    460      * Special constructor for roots (both user and system).  This constructor
    461      * will only be called twice, by the static initializer.
    462      */
    463     private FileSystemPreferences(boolean user) {
    464         super(null, "");
    465         isUserNode = user;
    466         dir = (user ? userRootDir: systemRootDir);
    467         prefsFile = new File(dir, "prefs.xml");
    468         tmpFile   = new File(dir, "prefs.tmp");
    469     }
    470 
    471     /** @hide for unit testing only */
    472     // Android-added constructor for testing.
    473     public FileSystemPreferences(String path, File lockFile, boolean isUserNode) {
    474         super(null, "");
    475         this.isUserNode = isUserNode;
    476         this.dir = new File(path);
    477         prefsFile = new File(dir, "prefs.xml");
    478         tmpFile = new File(dir, "prefs.tmp");
    479         newNode = !dir.exists();
    480         if (newNode) {
    481             // These 2 things guarantee node will get wrtten at next flush/sync
    482             prefsCache = new TreeMap<>();
    483             nodeCreate = new NodeCreate();
    484             changeLog.add(nodeCreate);
    485         }
    486 
    487         if (isUserNode) {
    488             userLockFile = lockFile;
    489             userRootModFile = new File(lockFile.getParentFile(), lockFile.getName() + ".rootmod");
    490         } else {
    491             systemLockFile = lockFile;
    492             systemRootModFile = new File(lockFile.getParentFile(), lockFile.getName() + ".rootmod");
    493         }
    494     }
    495 
    496     /**
    497      * Construct a new FileSystemPreferences instance with the specified
    498      * parent node and name.  This constructor, called from childSpi,
    499      * is used to make every node except for the two //roots.
    500      */
    501     private FileSystemPreferences(FileSystemPreferences parent, String name) {
    502         super(parent, name);
    503         isUserNode = parent.isUserNode;
    504         dir  = new File(parent.dir, dirName(name));
    505         prefsFile = new File(dir, "prefs.xml");
    506         tmpFile  = new File(dir, "prefs.tmp");
    507         AccessController.doPrivileged(new PrivilegedAction<Void>() {
    508             public Void run() {
    509                 newNode = !dir.exists();
    510                 return null;
    511             }
    512         });
    513         if (newNode) {
    514             // These 2 things guarantee node will get wrtten at next flush/sync
    515             prefsCache = new TreeMap<>();
    516             nodeCreate = new NodeCreate();
    517             changeLog.add(nodeCreate);
    518         }
    519     }
    520 
    521     public boolean isUserNode() {
    522         return isUserNode;
    523     }
    524 
    525     protected void putSpi(String key, String value) {
    526         initCacheIfNecessary();
    527         changeLog.add(new Put(key, value));
    528         prefsCache.put(key, value);
    529     }
    530 
    531     protected String getSpi(String key) {
    532         initCacheIfNecessary();
    533         return prefsCache.get(key);
    534     }
    535 
    536     protected void removeSpi(String key) {
    537         initCacheIfNecessary();
    538         changeLog.add(new Remove(key));
    539         prefsCache.remove(key);
    540     }
    541 
    542     /**
    543      * Initialize prefsCache if it has yet to be initialized.  When this method
    544      * returns, prefsCache will be non-null.  If the data was successfully
    545      * read from the file, lastSyncTime will be updated.  If prefsCache was
    546      * null, but it was impossible to read the file (because it didn't
    547      * exist or for any other reason) prefsCache will be initialized to an
    548      * empty, modifiable Map, and lastSyncTime remain zero.
    549      */
    550     private void initCacheIfNecessary() {
    551         if (prefsCache != null)
    552             return;
    553 
    554         try {
    555             loadCache();
    556         } catch(Exception e) {
    557             // assert lastSyncTime == 0;
    558             prefsCache = new TreeMap<>();
    559         }
    560     }
    561 
    562     /**
    563      * Attempt to load prefsCache from the backing store.  If the attempt
    564      * succeeds, lastSyncTime will be updated (the new value will typically
    565      * correspond to the data loaded into the map, but it may be less,
    566      * if another VM is updating this node concurrently).  If the attempt
    567      * fails, a BackingStoreException is thrown and both prefsCache and
    568      * lastSyncTime are unaffected by the call.
    569      */
    570     private void loadCache() throws BackingStoreException {
    571         Map<String, String> m = new TreeMap<>();
    572         long newLastSyncTime = 0;
    573         try {
    574             newLastSyncTime = prefsFile.lastModified();
    575             try (FileInputStream fis = new FileInputStream(prefsFile)) {
    576                 XmlSupport.importMap(fis, m);
    577             }
    578         } catch(Exception e) {
    579             if (e instanceof InvalidPreferencesFormatException) {
    580                 getLogger().warning("Invalid preferences format in "
    581                                     +  prefsFile.getPath());
    582                 prefsFile.renameTo( new File(
    583                                              prefsFile.getParentFile(),
    584                                              "IncorrectFormatPrefs.xml"));
    585                 m = new TreeMap<>();
    586             } else if (e instanceof FileNotFoundException) {
    587                 getLogger().warning("Prefs file removed in background "
    588                                     + prefsFile.getPath());
    589             } else {
    590                 // Android-added: This exception may be ignored by some callers,
    591                 // added a logger entry to prevent omitting it completely.
    592                 getLogger().warning("Exception while reading cache: "
    593                                     + e.getMessage());
    594                 throw new BackingStoreException(e);
    595             }
    596         }
    597         // Attempt succeeded; update state
    598         prefsCache = m;
    599         lastSyncTime = newLastSyncTime;
    600     }
    601 
    602     /**
    603      * Attempt to write back prefsCache to the backing store.  If the attempt
    604      * succeeds, lastSyncTime will be updated (the new value will correspond
    605      * exactly to the data thust written back, as we hold the file lock, which
    606      * prevents a concurrent write.  If the attempt fails, a
    607      * BackingStoreException is thrown and both the backing store (prefsFile)
    608      * and lastSyncTime will be unaffected by this call.  This call will
    609      * NEVER leave prefsFile in a corrupt state.
    610      */
    611     private void writeBackCache() throws BackingStoreException {
    612         try {
    613             AccessController.doPrivileged(
    614                 new PrivilegedExceptionAction<Void>() {
    615                 public Void run() throws BackingStoreException {
    616                     try {
    617                         if (!dir.exists() && !dir.mkdirs())
    618                             throw new BackingStoreException(dir +
    619                                                              " create failed.");
    620                         try (FileOutputStream fos = new FileOutputStream(tmpFile)) {
    621                             XmlSupport.exportMap(fos, prefsCache);
    622                         }
    623                         if (!tmpFile.renameTo(prefsFile))
    624                             throw new BackingStoreException("Can't rename " +
    625                             tmpFile + " to " + prefsFile);
    626                     } catch(Exception e) {
    627                         if (e instanceof BackingStoreException)
    628                             throw (BackingStoreException)e;
    629                         throw new BackingStoreException(e);
    630                     }
    631                     return null;
    632                 }
    633             });
    634         } catch (PrivilegedActionException e) {
    635             throw (BackingStoreException) e.getException();
    636         }
    637     }
    638 
    639     protected String[] keysSpi() {
    640         initCacheIfNecessary();
    641         return prefsCache.keySet().toArray(new String[prefsCache.size()]);
    642     }
    643 
    644     protected String[] childrenNamesSpi() {
    645         return AccessController.doPrivileged(
    646             new PrivilegedAction<String[]>() {
    647                 public String[] run() {
    648                     List<String> result = new ArrayList<>();
    649                     File[] dirContents = dir.listFiles();
    650                     if (dirContents != null) {
    651                         for (int i = 0; i < dirContents.length; i++)
    652                             if (dirContents[i].isDirectory())
    653                                 result.add(nodeName(dirContents[i].getName()));
    654                     }
    655                     return result.toArray(EMPTY_STRING_ARRAY);
    656                }
    657             });
    658     }
    659 
    660     private static final String[] EMPTY_STRING_ARRAY = new String[0];
    661 
    662     protected AbstractPreferences childSpi(String name) {
    663         return new FileSystemPreferences(this, name);
    664     }
    665 
    666     public void removeNode() throws BackingStoreException {
    667         synchronized (isUserNode()? userLockFile: systemLockFile) {
    668             // to remove a node we need an exclusive lock
    669             if (!lockFile(false))
    670                 throw(new BackingStoreException("Couldn't get file lock."));
    671            try {
    672                 super.removeNode();
    673            } finally {
    674                 unlockFile();
    675            }
    676         }
    677     }
    678 
    679     /**
    680      * Called with file lock held (in addition to node locks).
    681      */
    682     protected void removeNodeSpi() throws BackingStoreException {
    683         try {
    684             AccessController.doPrivileged(
    685                 new PrivilegedExceptionAction<Void>() {
    686                 public Void run() throws BackingStoreException {
    687                     if (changeLog.contains(nodeCreate)) {
    688                         changeLog.remove(nodeCreate);
    689                         nodeCreate = null;
    690                         return null;
    691                     }
    692                     if (!dir.exists())
    693                         return null;
    694                     prefsFile.delete();
    695                     tmpFile.delete();
    696                     // dir should be empty now.  If it's not, empty it
    697                     File[] junk = dir.listFiles();
    698                     if (junk.length != 0) {
    699                         getLogger().warning(
    700                            "Found extraneous files when removing node: "
    701                             + Arrays.asList(junk));
    702                         for (int i=0; i<junk.length; i++)
    703                             junk[i].delete();
    704                     }
    705                     if (!dir.delete())
    706                         throw new BackingStoreException("Couldn't delete dir: "
    707                                                                          + dir);
    708                     return null;
    709                 }
    710             });
    711         } catch (PrivilegedActionException e) {
    712             throw (BackingStoreException) e.getException();
    713         }
    714     }
    715 
    716     public synchronized void sync() throws BackingStoreException {
    717         boolean userNode = isUserNode();
    718         boolean shared;
    719 
    720         if (userNode) {
    721             shared = false; /* use exclusive lock for user prefs */
    722         } else {
    723             /* if can write to system root, use exclusive lock.
    724                otherwise use shared lock. */
    725             shared = !isSystemRootWritable;
    726         }
    727         synchronized (isUserNode()? userLockFile:systemLockFile) {
    728            if (!lockFile(shared))
    729                throw(new BackingStoreException("Couldn't get file lock."));
    730            final Long newModTime =
    731                 AccessController.doPrivileged(
    732                     new PrivilegedAction<Long>() {
    733                public Long run() {
    734                    long nmt;
    735                    if (isUserNode()) {
    736                        nmt = userRootModFile.lastModified();
    737                        isUserRootModified = userRootModTime == nmt;
    738                    } else {
    739                        nmt = systemRootModFile.lastModified();
    740                        isSystemRootModified = systemRootModTime == nmt;
    741                    }
    742                    return new Long(nmt);
    743                }
    744            });
    745            try {
    746                super.sync();
    747                AccessController.doPrivileged(new PrivilegedAction<Void>() {
    748                    public Void run() {
    749                    if (isUserNode()) {
    750                        userRootModTime = newModTime.longValue() + 1000;
    751                        userRootModFile.setLastModified(userRootModTime);
    752                    } else {
    753                        systemRootModTime = newModTime.longValue() + 1000;
    754                        systemRootModFile.setLastModified(systemRootModTime);
    755                    }
    756                    return null;
    757                    }
    758                });
    759            } finally {
    760                 unlockFile();
    761            }
    762         }
    763     }
    764 
    765     protected void syncSpi() throws BackingStoreException {
    766         syncSpiPrivileged();
    767     }
    768 
    769     private void syncSpiPrivileged() throws BackingStoreException {
    770         if (isRemoved())
    771             throw new IllegalStateException("Node has been removed");
    772         if (prefsCache == null)
    773             return;  // We've never been used, don't bother syncing
    774         long lastModifiedTime;
    775         if ((isUserNode() ? isUserRootModified : isSystemRootModified)) {
    776             lastModifiedTime = prefsFile.lastModified();
    777             if (lastModifiedTime  != lastSyncTime) {
    778                 // Prefs at this node were externally modified; read in node and
    779                 // playback any local mods since last sync
    780                 loadCache();
    781                 replayChanges();
    782                 lastSyncTime = lastModifiedTime;
    783             }
    784         } else if (lastSyncTime != 0 && !dir.exists()) {
    785             // This node was removed in the background.  Playback any changes
    786             // against a virgin (empty) Map.
    787             prefsCache = new TreeMap<>();
    788             replayChanges();
    789         }
    790         if (!changeLog.isEmpty()) {
    791             writeBackCache();  // Creates directory & file if necessary
    792            /*
    793             * Attempt succeeded; it's barely possible that the call to
    794             * lastModified might fail (i.e., return 0), but this would not
    795             * be a disaster, as lastSyncTime is allowed to lag.
    796             */
    797             lastModifiedTime = prefsFile.lastModified();
    798             /* If lastSyncTime did not change, or went back
    799              * increment by 1 second. Since we hold the lock
    800              * lastSyncTime always monotonically encreases in the
    801              * atomic sense.
    802              */
    803             if (lastSyncTime <= lastModifiedTime) {
    804                 lastSyncTime = lastModifiedTime + 1000;
    805                 prefsFile.setLastModified(lastSyncTime);
    806             }
    807             changeLog.clear();
    808         }
    809     }
    810 
    811     public void flush() throws BackingStoreException {
    812         if (isRemoved())
    813             return;
    814         sync();
    815     }
    816 
    817     protected void flushSpi() throws BackingStoreException {
    818         // assert false;
    819     }
    820 
    821     /**
    822      * Returns true if the specified character is appropriate for use in
    823      * Unix directory names.  A character is appropriate if it's a printable
    824      * ASCII character (> 0x1f && < 0x7f) and unequal to slash ('/', 0x2f),
    825      * dot ('.', 0x2e), or underscore ('_', 0x5f).
    826      */
    827     private static boolean isDirChar(char ch) {
    828         return ch > 0x1f && ch < 0x7f && ch != '/' && ch != '.' && ch != '_';
    829     }
    830 
    831     /**
    832      * Returns the directory name corresponding to the specified node name.
    833      * Generally, this is just the node name.  If the node name includes
    834      * inappropriate characters (as per isDirChar) it is translated to Base64.
    835      * with the underscore  character ('_', 0x5f) prepended.
    836      */
    837     private static String dirName(String nodeName) {
    838         for (int i=0, n=nodeName.length(); i < n; i++)
    839             if (!isDirChar(nodeName.charAt(i)))
    840                 return "_" + Base64.byteArrayToAltBase64(byteArray(nodeName));
    841         return nodeName;
    842     }
    843 
    844     /**
    845      * Translate a string into a byte array by translating each character
    846      * into two bytes, high-byte first ("big-endian").
    847      */
    848     private static byte[] byteArray(String s) {
    849         int len = s.length();
    850         byte[] result = new byte[2*len];
    851         for (int i=0, j=0; i<len; i++) {
    852             char c = s.charAt(i);
    853             result[j++] = (byte) (c>>8);
    854             result[j++] = (byte) c;
    855         }
    856         return result;
    857     }
    858 
    859     /**
    860      * Returns the node name corresponding to the specified directory name.
    861  * (Inverts the transformation of dirName(String).
    862      */
    863     private static String nodeName(String dirName) {
    864         if (dirName.charAt(0) != '_')
    865             return dirName;
    866         byte a[] = Base64.altBase64ToByteArray(dirName.substring(1));
    867         StringBuffer result = new StringBuffer(a.length/2);
    868         for (int i = 0; i < a.length; ) {
    869             int highByte = a[i++] & 0xff;
    870             int lowByte =  a[i++] & 0xff;
    871             result.append((char) ((highByte << 8) | lowByte));
    872         }
    873         return result.toString();
    874     }
    875 
    876     /**
    877      * Try to acquire the appropriate file lock (user or system).  If
    878      * the initial attempt fails, several more attempts are made using
    879      * an exponential backoff strategy.  If all attempts fail, this method
    880      * returns false.
    881      * @throws SecurityException if file access denied.
    882      */
    883     private boolean lockFile(boolean shared) throws SecurityException{
    884         boolean usernode = isUserNode();
    885         int[] result;
    886         int errorCode = 0;
    887         File lockFile = (usernode ? userLockFile : systemLockFile);
    888         long sleepTime = INIT_SLEEP_TIME;
    889         for (int i = 0; i < MAX_ATTEMPTS; i++) {
    890             try {
    891                   int perm = (usernode? USER_READ_WRITE: USER_RW_ALL_READ);
    892                   result = lockFile0(lockFile.getCanonicalPath(), perm, shared);
    893 
    894                   errorCode = result[ERROR_CODE];
    895                   if (result[LOCK_HANDLE] != 0) {
    896                      if (usernode) {
    897                          userRootLockHandle = result[LOCK_HANDLE];
    898                      } else {
    899                          systemRootLockHandle = result[LOCK_HANDLE];
    900                      }
    901                      return true;
    902                   }
    903             } catch(IOException e) {
    904 //                // If at first, you don't succeed...
    905             }
    906 
    907             try {
    908                 Thread.sleep(sleepTime);
    909             } catch(InterruptedException e) {
    910                 checkLockFile0ErrorCode(errorCode);
    911                 return false;
    912             }
    913             sleepTime *= 2;
    914         }
    915         checkLockFile0ErrorCode(errorCode);
    916         return false;
    917     }
    918 
    919     /**
    920      * Checks if unlockFile0() returned an error. Throws a SecurityException,
    921      * if access denied. Logs a warning otherwise.
    922      */
    923     private void checkLockFile0ErrorCode (int errorCode)
    924                                                       throws SecurityException {
    925         if (errorCode == EACCES)
    926             throw new SecurityException("Could not lock " +
    927             (isUserNode()? "User prefs." : "System prefs.") +
    928              " Lock file access denied.");
    929         if (errorCode != EAGAIN)
    930             getLogger().warning("Could not lock " +
    931                              (isUserNode()? "User prefs. " : "System prefs.") +
    932                              " Unix error code " + errorCode + ".");
    933     }
    934 
    935     /**
    936      * Locks file using UNIX file locking.
    937      * @param fileName Absolute file name of the lock file.
    938      * @return Returns a lock handle, used to unlock the file.
    939      */
    940     private static native int[]
    941             lockFile0(String fileName, int permission, boolean shared);
    942 
    943     /**
    944      * Unlocks file previously locked by lockFile0().
    945      * @param lockHandle Handle to the file lock.
    946      * @return Returns zero if OK, UNIX error code if failure.
    947      */
    948     private  static native int unlockFile0(int lockHandle);
    949 
    950     /**
    951      * Changes UNIX file permissions.
    952      */
    953     private static native int chmod(String fileName, int permission);
    954 
    955     /**
    956      * Initial time between lock attempts, in ms.  The time is doubled
    957      * after each failing attempt (except the first).
    958      */
    959     private static int INIT_SLEEP_TIME = 50;
    960 
    961     /**
    962      * Maximum number of lock attempts.
    963      */
    964     private static int MAX_ATTEMPTS = 5;
    965 
    966     /**
    967      * Release the the appropriate file lock (user or system).
    968      * @throws SecurityException if file access denied.
    969      */
    970     private void unlockFile() {
    971         int result;
    972         boolean usernode = isUserNode();
    973         File lockFile = (usernode ? userLockFile : systemLockFile);
    974         int lockHandle = ( usernode ? userRootLockHandle:systemRootLockHandle);
    975         if (lockHandle == 0) {
    976             getLogger().warning("Unlock: zero lockHandle for " +
    977                            (usernode ? "user":"system") + " preferences.)");
    978             return;
    979         }
    980         result = unlockFile0(lockHandle);
    981         if (result != 0) {
    982             getLogger().warning("Could not drop file-lock on " +
    983             (isUserNode() ? "user" : "system") + " preferences." +
    984             " Unix error code " + result + ".");
    985             if (result == EACCES)
    986                 throw new SecurityException("Could not unlock" +
    987                 (isUserNode()? "User prefs." : "System prefs.") +
    988                 " Lock file access denied.");
    989         }
    990         if (isUserNode()) {
    991             userRootLockHandle = 0;
    992         } else {
    993             systemRootLockHandle = 0;
    994         }
    995     }
    996 }
    997