Files
git-mirror/lockfile.c
Junio C Hamano 7e37fab8c0 Merge branch 'pc/lockfile-pid' into seen
Allow recording process ID of the process that holds the lock next
to a lockfile for diagnosis.

* pc/lockfile-pid:
  lockfile: add PID file for debugging stale locks
2025-12-23 12:19:57 +09:00

361 lines
9.4 KiB
C

/*
* Copyright (c) 2005, Junio C Hamano
*/
#include "git-compat-util.h"
#include "abspath.h"
#include "gettext.h"
#include "lockfile.h"
#include "parse.h"
#include "strbuf.h"
#include "wrapper.h"
/*
* path = absolute or relative path name
*
* Remove the last path name element from path (leaving the preceding
* "/", if any). If path is empty or the root directory ("/"), set
* path to the empty string.
*/
static void trim_last_path_component(struct strbuf *path)
{
int i = path->len;
/* back up past trailing slashes, if any */
while (i && is_dir_sep(path->buf[i - 1]))
i--;
/*
* then go backwards until a slash, or the beginning of the
* string
*/
while (i && !is_dir_sep(path->buf[i - 1]))
i--;
strbuf_setlen(path, i);
}
/* We allow "recursive" symbolic links. Only within reason, though */
#define MAXDEPTH 5
/*
* path contains a path that might be a symlink.
*
* If path is a symlink, attempt to overwrite it with a path to the
* real file or directory (which may or may not exist), following a
* chain of symlinks if necessary. Otherwise, leave path unmodified.
*
* This is a best-effort routine. If an error occurs, path will
* either be left unmodified or will name a different symlink in a
* symlink chain that started with the original path.
*/
static void resolve_symlink(struct strbuf *path)
{
int depth = MAXDEPTH;
static struct strbuf link = STRBUF_INIT;
while (depth--) {
if (strbuf_readlink(&link, path->buf, path->len) < 0)
break;
if (is_absolute_path(link.buf))
/* absolute path simply replaces p */
strbuf_reset(path);
else
/*
* link is a relative path, so replace the
* last element of p with it.
*/
trim_last_path_component(path);
strbuf_addbuf(path, &link);
}
strbuf_reset(&link);
}
/*
* Lock PID file functions - write PID to a foo-pid.lock file alongside
* the lock file for debugging stale locks. The PID file is registered
* as a tempfile so it gets cleaned up by signal/atexit handlers.
*
* Naming: For "foo.lock", the PID file is "foo-pid.lock" (not "foo.lock.pid").
* This avoids collision with the refs namespace.
*/
/* Global config variable, initialized from core.lockfilePid */
enum lockfile_pid_component lockfile_pid_components = LOCKFILE_PID_DEFAULT;
/*
* Path generation helpers.
* Given base path "foo", generate:
* - lock path: "foo.lock"
* - pid path: "foo-pid.lock"
*/
static void get_lock_path(struct strbuf *out, const char *path)
{
strbuf_addstr(out, path);
strbuf_addstr(out, LOCK_SUFFIX);
}
static void get_pid_path(struct strbuf *out, const char *path)
{
strbuf_addstr(out, path);
strbuf_addstr(out, LOCK_PID_INFIX);
strbuf_addstr(out, LOCK_SUFFIX);
}
static struct tempfile *create_lock_pid_file(const char *pid_path, int mode,
enum lockfile_pid_component component)
{
struct strbuf content = STRBUF_INIT;
struct tempfile *pid_tempfile = NULL;
int fd = -1;
if (!(lockfile_pid_components & component))
goto out;
fd = open(pid_path, O_WRONLY | O_CREAT | O_EXCL, mode);
if (fd < 0)
goto out;
strbuf_addf(&content, "pid %" PRIuMAX "\n", (uintmax_t)getpid());
if (write_in_full(fd, content.buf, content.len) < 0) {
warning_errno(_("could not write lock pid file '%s'"), pid_path);
goto out;
}
close(fd);
fd = -1;
pid_tempfile = register_tempfile(pid_path);
out:
if (fd >= 0)
close(fd);
strbuf_release(&content);
return pid_tempfile;
}
static int read_lock_pid(const char *pid_path, uintmax_t *pid_out)
{
struct strbuf content = STRBUF_INIT;
const char *val;
int ret = -1;
if (strbuf_read_file(&content, pid_path, LOCK_PID_MAXLEN) <= 0)
goto out;
strbuf_rtrim(&content);
if (skip_prefix(content.buf, "pid ", &val)) {
char *endptr;
*pid_out = strtoumax(val, &endptr, 10);
if (*pid_out > 0 && !*endptr)
ret = 0;
}
if (ret)
warning(_("malformed lock pid file '%s'"), pid_path);
out:
strbuf_release(&content);
return ret;
}
/* Make sure errno contains a meaningful value on error */
static int lock_file(struct lock_file *lk, const char *path, int flags,
int mode, enum lockfile_pid_component component)
{
struct strbuf base_path = STRBUF_INIT;
struct strbuf lock_path = STRBUF_INIT;
struct strbuf pid_path = STRBUF_INIT;
strbuf_addstr(&base_path, path);
if (!(flags & LOCK_NO_DEREF))
resolve_symlink(&base_path);
get_lock_path(&lock_path, base_path.buf);
get_pid_path(&pid_path, base_path.buf);
lk->tempfile = create_tempfile_mode(lock_path.buf, mode);
if (lk->tempfile)
lk->pid_tempfile = create_lock_pid_file(pid_path.buf, mode,
component);
strbuf_release(&base_path);
strbuf_release(&lock_path);
strbuf_release(&pid_path);
return lk->tempfile ? lk->tempfile->fd : -1;
}
/*
* Constants defining the gaps between attempts to lock a file. The
* first backoff period is approximately INITIAL_BACKOFF_MS
* milliseconds. The longest backoff period is approximately
* (BACKOFF_MAX_MULTIPLIER * INITIAL_BACKOFF_MS) milliseconds.
*/
#define INITIAL_BACKOFF_MS 1L
#define BACKOFF_MAX_MULTIPLIER 1000
/*
* Try locking path, retrying with quadratic backoff for at least
* timeout_ms milliseconds. If timeout_ms is 0, try locking the file
* exactly once. If timeout_ms is -1, try indefinitely.
*/
static int lock_file_timeout(struct lock_file *lk, const char *path,
int flags, long timeout_ms, int mode,
enum lockfile_pid_component component)
{
int n = 1;
int multiplier = 1;
long remaining_ms = 0;
static int random_initialized = 0;
if (timeout_ms == 0)
return lock_file(lk, path, flags, mode, component);
if (!random_initialized) {
srand((unsigned int)getpid());
random_initialized = 1;
}
if (timeout_ms > 0)
remaining_ms = timeout_ms;
while (1) {
long backoff_ms, wait_ms;
int fd;
fd = lock_file(lk, path, flags, mode, component);
if (fd >= 0)
return fd; /* success */
else if (errno != EEXIST)
return -1; /* failure other than lock held */
else if (timeout_ms > 0 && remaining_ms <= 0)
return -1; /* failure due to timeout */
backoff_ms = multiplier * INITIAL_BACKOFF_MS;
/* back off for between 0.75*backoff_ms and 1.25*backoff_ms */
wait_ms = (750 + rand() % 500) * backoff_ms / 1000;
sleep_millisec(wait_ms);
remaining_ms -= wait_ms;
/* Recursion: (n+1)^2 = n^2 + 2n + 1 */
multiplier += 2*n + 1;
if (multiplier > BACKOFF_MAX_MULTIPLIER)
multiplier = BACKOFF_MAX_MULTIPLIER;
else
n++;
}
}
void unable_to_lock_message(const char *path, int err, struct strbuf *buf)
{
if (err == EEXIST) {
const char *abs_path = absolute_path(path);
struct strbuf lock_path = STRBUF_INIT;
struct strbuf pid_path = STRBUF_INIT;
uintmax_t pid;
int pid_status = 0; /* 0 = unknown, 1 = running, -1 = stale */
get_lock_path(&lock_path, abs_path);
get_pid_path(&pid_path, abs_path);
strbuf_addf(buf, _("Unable to create '%s': %s.\n\n"),
lock_path.buf, strerror(err));
/*
* Try to read PID file unconditionally - it may exist if
* core.lockfilePid was enabled for this component.
*/
if (!read_lock_pid(pid_path.buf, &pid)) {
if (kill((pid_t)pid, 0) == 0 || errno == EPERM)
pid_status = 1; /* running (or no permission to signal) */
else if (errno == ESRCH)
pid_status = -1; /* no such process - stale lock */
}
if (pid_status == 1)
strbuf_addf(buf, _("Lock is held by process %" PRIuMAX ". "
"Wait for it to finish, or remove the lock file to continue"),
pid);
else if (pid_status == -1)
strbuf_addf(buf, _("Lock was held by process %" PRIuMAX ", "
"which is no longer running. Remove the stale lock file to continue"),
pid);
else
strbuf_addstr(buf, _("Another git process seems to be running in this repository. "
"Wait for it to finish, or remove the lock file to continue"));
strbuf_release(&lock_path);
strbuf_release(&pid_path);
} else {
strbuf_addf(buf, _("Unable to create '%s.lock': %s"),
absolute_path(path), strerror(err));
}
}
NORETURN void unable_to_lock_die(const char *path, int err)
{
struct strbuf buf = STRBUF_INIT;
unable_to_lock_message(path, err, &buf);
die("%s", buf.buf);
}
/* This should return a meaningful errno on failure */
int hold_lock_file_for_update_timeout_mode(struct lock_file *lk,
const char *path, int flags,
long timeout_ms, int mode,
enum lockfile_pid_component component)
{
int fd = lock_file_timeout(lk, path, flags, timeout_ms, mode, component);
if (fd < 0) {
if (flags & LOCK_DIE_ON_ERROR)
unable_to_lock_die(path, errno);
if (flags & LOCK_REPORT_ON_ERROR) {
struct strbuf buf = STRBUF_INIT;
unable_to_lock_message(path, errno, &buf);
error("%s", buf.buf);
strbuf_release(&buf);
}
}
return fd;
}
char *get_locked_file_path(struct lock_file *lk)
{
struct strbuf ret = STRBUF_INIT;
strbuf_addstr(&ret, get_tempfile_path(lk->tempfile));
if (ret.len <= LOCK_SUFFIX_LEN ||
strcmp(ret.buf + ret.len - LOCK_SUFFIX_LEN, LOCK_SUFFIX))
BUG("get_locked_file_path() called for malformed lock object");
/* remove ".lock": */
strbuf_setlen(&ret, ret.len - LOCK_SUFFIX_LEN);
return strbuf_detach(&ret, NULL);
}
int commit_lock_file(struct lock_file *lk)
{
char *result_path = get_locked_file_path(lk);
delete_tempfile(&lk->pid_tempfile);
if (commit_lock_file_to(lk, result_path)) {
int save_errno = errno;
free(result_path);
errno = save_errno;
return -1;
}
free(result_path);
return 0;
}
int rollback_lock_file(struct lock_file *lk)
{
delete_tempfile(&lk->pid_tempfile);
return delete_tempfile(&lk->tempfile);
}