]>
Commit | Line | Data |
---|---|---|
16d9d617 JH |
1 | #include "builtin.h" |
2 | #include "config.h" | |
3 | #include "parse-options.h" | |
4 | #include "fsmonitor.h" | |
5 | #include "fsmonitor-ipc.h" | |
12fd27df | 6 | #include "fsmonitor-path-utils.h" |
d0605550 | 7 | #include "compat/fsmonitor/fsm-health.h" |
9dcba0ba JH |
8 | #include "compat/fsmonitor/fsm-listen.h" |
9 | #include "fsmonitor--daemon.h" | |
16d9d617 JH |
10 | #include "simple-ipc.h" |
11 | #include "khash.h" | |
518a522f | 12 | #include "pkt-line.h" |
16d9d617 JH |
13 | |
14 | static const char * const builtin_fsmonitor__daemon_usage[] = { | |
c284e27b | 15 | N_("git fsmonitor--daemon start [<options>]"), |
9dcba0ba | 16 | N_("git fsmonitor--daemon run [<options>]"), |
02cb8b9e AH |
17 | "git fsmonitor--daemon stop", |
18 | "git fsmonitor--daemon status", | |
16d9d617 JH |
19 | NULL |
20 | }; | |
21 | ||
22 | #ifdef HAVE_FSMONITOR_DAEMON_BACKEND | |
9dcba0ba JH |
23 | /* |
24 | * Global state loaded from config. | |
25 | */ | |
26 | #define FSMONITOR__IPC_THREADS "fsmonitor.ipcthreads" | |
27 | static int fsmonitor__ipc_threads = 8; | |
28 | ||
c284e27b JH |
29 | #define FSMONITOR__START_TIMEOUT "fsmonitor.starttimeout" |
30 | static int fsmonitor__start_timeout_sec = 60; | |
31 | ||
9dcba0ba JH |
32 | #define FSMONITOR__ANNOUNCE_STARTUP "fsmonitor.announcestartup" |
33 | static int fsmonitor__announce_startup = 0; | |
34 | ||
35 | static int fsmonitor_config(const char *var, const char *value, void *cb) | |
36 | { | |
37 | if (!strcmp(var, FSMONITOR__IPC_THREADS)) { | |
38 | int i = git_config_int(var, value); | |
39 | if (i < 1) | |
40 | return error(_("value of '%s' out of range: %d"), | |
41 | FSMONITOR__IPC_THREADS, i); | |
42 | fsmonitor__ipc_threads = i; | |
43 | return 0; | |
44 | } | |
45 | ||
c284e27b JH |
46 | if (!strcmp(var, FSMONITOR__START_TIMEOUT)) { |
47 | int i = git_config_int(var, value); | |
48 | if (i < 0) | |
49 | return error(_("value of '%s' out of range: %d"), | |
50 | FSMONITOR__START_TIMEOUT, i); | |
51 | fsmonitor__start_timeout_sec = i; | |
52 | return 0; | |
53 | } | |
54 | ||
9dcba0ba JH |
55 | if (!strcmp(var, FSMONITOR__ANNOUNCE_STARTUP)) { |
56 | int is_bool; | |
57 | int i = git_config_bool_or_int(var, value, &is_bool); | |
58 | if (i < 0) | |
59 | return error(_("value of '%s' not bool or int: %d"), | |
60 | var, i); | |
61 | fsmonitor__announce_startup = i; | |
62 | return 0; | |
63 | } | |
64 | ||
65 | return git_default_config(var, value, cb); | |
66 | } | |
67 | ||
abc9dbc0 JH |
68 | /* |
69 | * Acting as a CLIENT. | |
70 | * | |
71 | * Send a "quit" command to the `git-fsmonitor--daemon` (if running) | |
72 | * and wait for it to shutdown. | |
73 | */ | |
74 | static int do_as_client__send_stop(void) | |
75 | { | |
76 | struct strbuf answer = STRBUF_INIT; | |
77 | int ret; | |
78 | ||
79 | ret = fsmonitor_ipc__send_command("quit", &answer); | |
80 | ||
81 | /* The quit command does not return any response data. */ | |
82 | strbuf_release(&answer); | |
83 | ||
84 | if (ret) | |
85 | return ret; | |
86 | ||
87 | trace2_region_enter("fsm_client", "polling-for-daemon-exit", NULL); | |
88 | while (fsmonitor_ipc__get_state() == IPC_STATE__LISTENING) | |
89 | sleep_millisec(50); | |
90 | trace2_region_leave("fsm_client", "polling-for-daemon-exit", NULL); | |
91 | ||
92 | return 0; | |
93 | } | |
94 | ||
95 | static int do_as_client__status(void) | |
96 | { | |
97 | enum ipc_active_state state = fsmonitor_ipc__get_state(); | |
98 | ||
99 | switch (state) { | |
100 | case IPC_STATE__LISTENING: | |
101 | printf(_("fsmonitor-daemon is watching '%s'\n"), | |
102 | the_repository->worktree); | |
103 | return 0; | |
104 | ||
105 | default: | |
106 | printf(_("fsmonitor-daemon is not watching '%s'\n"), | |
107 | the_repository->worktree); | |
108 | return 1; | |
109 | } | |
110 | } | |
16d9d617 | 111 | |
b05880d3 JH |
112 | enum fsmonitor_cookie_item_result { |
113 | FCIR_ERROR = -1, /* could not create cookie file ? */ | |
114 | FCIR_INIT, | |
115 | FCIR_SEEN, | |
116 | FCIR_ABORT, | |
117 | }; | |
118 | ||
119 | struct fsmonitor_cookie_item { | |
120 | struct hashmap_entry entry; | |
121 | char *name; | |
122 | enum fsmonitor_cookie_item_result result; | |
123 | }; | |
124 | ||
125 | static int cookies_cmp(const void *data, const struct hashmap_entry *he1, | |
126 | const struct hashmap_entry *he2, const void *keydata) | |
127 | { | |
128 | const struct fsmonitor_cookie_item *a = | |
129 | container_of(he1, const struct fsmonitor_cookie_item, entry); | |
130 | const struct fsmonitor_cookie_item *b = | |
131 | container_of(he2, const struct fsmonitor_cookie_item, entry); | |
132 | ||
133 | return strcmp(a->name, keydata ? keydata : b->name); | |
134 | } | |
135 | ||
136 | static enum fsmonitor_cookie_item_result with_lock__wait_for_cookie( | |
137 | struct fsmonitor_daemon_state *state) | |
138 | { | |
139 | /* assert current thread holding state->main_lock */ | |
140 | ||
141 | int fd; | |
142 | struct fsmonitor_cookie_item *cookie; | |
143 | struct strbuf cookie_pathname = STRBUF_INIT; | |
144 | struct strbuf cookie_filename = STRBUF_INIT; | |
145 | enum fsmonitor_cookie_item_result result; | |
146 | int my_cookie_seq; | |
147 | ||
148 | CALLOC_ARRAY(cookie, 1); | |
149 | ||
150 | my_cookie_seq = state->cookie_seq++; | |
151 | ||
152 | strbuf_addf(&cookie_filename, "%i-%i", getpid(), my_cookie_seq); | |
153 | ||
154 | strbuf_addbuf(&cookie_pathname, &state->path_cookie_prefix); | |
155 | strbuf_addbuf(&cookie_pathname, &cookie_filename); | |
156 | ||
157 | cookie->name = strbuf_detach(&cookie_filename, NULL); | |
158 | cookie->result = FCIR_INIT; | |
159 | hashmap_entry_init(&cookie->entry, strhash(cookie->name)); | |
160 | ||
161 | hashmap_add(&state->cookies, &cookie->entry); | |
162 | ||
163 | trace_printf_key(&trace_fsmonitor, "cookie-wait: '%s' '%s'", | |
164 | cookie->name, cookie_pathname.buf); | |
165 | ||
166 | /* | |
167 | * Create the cookie file on disk and then wait for a notification | |
168 | * that the listener thread has seen it. | |
169 | */ | |
170 | fd = open(cookie_pathname.buf, O_WRONLY | O_CREAT | O_EXCL, 0600); | |
171 | if (fd < 0) { | |
172 | error_errno(_("could not create fsmonitor cookie '%s'"), | |
173 | cookie->name); | |
174 | ||
175 | cookie->result = FCIR_ERROR; | |
176 | goto done; | |
177 | } | |
178 | ||
179 | /* | |
180 | * Technically, close() and unlink() can fail, but we don't | |
181 | * care here. We only created the file to trigger a watch | |
182 | * event from the FS to know that when we're up to date. | |
183 | */ | |
184 | close(fd); | |
185 | unlink(cookie_pathname.buf); | |
186 | ||
187 | /* | |
188 | * Technically, this is an infinite wait (well, unless another | |
189 | * thread sends us an abort). I'd like to change this to | |
190 | * use `pthread_cond_timedwait()` and return an error/timeout | |
191 | * and let the caller do the trivial response thing, but we | |
192 | * don't have that routine in our thread-utils. | |
193 | * | |
194 | * After extensive beta testing I'm not really worried about | |
195 | * this. Also note that the above open() and unlink() calls | |
196 | * will cause at least two FS events on that path, so the odds | |
197 | * of getting stuck are pretty slim. | |
198 | */ | |
199 | while (cookie->result == FCIR_INIT) | |
200 | pthread_cond_wait(&state->cookies_cond, | |
201 | &state->main_lock); | |
202 | ||
203 | done: | |
204 | hashmap_remove(&state->cookies, &cookie->entry, NULL); | |
205 | ||
206 | result = cookie->result; | |
207 | ||
208 | free(cookie->name); | |
209 | free(cookie); | |
210 | strbuf_release(&cookie_pathname); | |
211 | ||
212 | return result; | |
213 | } | |
214 | ||
215 | /* | |
216 | * Mark these cookies as _SEEN and wake up the corresponding client threads. | |
217 | */ | |
218 | static void with_lock__mark_cookies_seen(struct fsmonitor_daemon_state *state, | |
219 | const struct string_list *cookie_names) | |
220 | { | |
221 | /* assert current thread holding state->main_lock */ | |
222 | ||
223 | int k; | |
224 | int nr_seen = 0; | |
225 | ||
226 | for (k = 0; k < cookie_names->nr; k++) { | |
227 | struct fsmonitor_cookie_item key; | |
228 | struct fsmonitor_cookie_item *cookie; | |
229 | ||
230 | key.name = cookie_names->items[k].string; | |
231 | hashmap_entry_init(&key.entry, strhash(key.name)); | |
232 | ||
233 | cookie = hashmap_get_entry(&state->cookies, &key, entry, NULL); | |
234 | if (cookie) { | |
235 | trace_printf_key(&trace_fsmonitor, "cookie-seen: '%s'", | |
236 | cookie->name); | |
237 | cookie->result = FCIR_SEEN; | |
238 | nr_seen++; | |
239 | } | |
240 | } | |
241 | ||
242 | if (nr_seen) | |
243 | pthread_cond_broadcast(&state->cookies_cond); | |
244 | } | |
245 | ||
246 | /* | |
247 | * Set _ABORT on all pending cookies and wake up all client threads. | |
248 | */ | |
249 | static void with_lock__abort_all_cookies(struct fsmonitor_daemon_state *state) | |
250 | { | |
251 | /* assert current thread holding state->main_lock */ | |
252 | ||
253 | struct hashmap_iter iter; | |
254 | struct fsmonitor_cookie_item *cookie; | |
255 | int nr_aborted = 0; | |
256 | ||
257 | hashmap_for_each_entry(&state->cookies, &iter, cookie, entry) { | |
258 | trace_printf_key(&trace_fsmonitor, "cookie-abort: '%s'", | |
259 | cookie->name); | |
260 | cookie->result = FCIR_ABORT; | |
261 | nr_aborted++; | |
262 | } | |
263 | ||
264 | if (nr_aborted) | |
265 | pthread_cond_broadcast(&state->cookies_cond); | |
266 | } | |
267 | ||
aeef767a JH |
268 | /* |
269 | * Requests to and from a FSMonitor Protocol V2 provider use an opaque | |
270 | * "token" as a virtual timestamp. Clients can request a summary of all | |
271 | * created/deleted/modified files relative to a token. In the response, | |
272 | * clients receive a new token for the next (relative) request. | |
273 | * | |
274 | * | |
275 | * Token Format | |
276 | * ============ | |
277 | * | |
278 | * The contents of the token are private and provider-specific. | |
279 | * | |
280 | * For the built-in fsmonitor--daemon, we define a token as follows: | |
281 | * | |
282 | * "builtin" ":" <token_id> ":" <sequence_nr> | |
283 | * | |
284 | * The "builtin" prefix is used as a namespace to avoid conflicts | |
285 | * with other providers (such as Watchman). | |
286 | * | |
287 | * The <token_id> is an arbitrary OPAQUE string, such as a GUID, | |
288 | * UUID, or {timestamp,pid}. It is used to group all filesystem | |
289 | * events that happened while the daemon was monitoring (and in-sync | |
290 | * with the filesystem). | |
291 | * | |
292 | * Unlike FSMonitor Protocol V1, it is not defined as a timestamp | |
293 | * and does not define less-than/greater-than relationships. | |
294 | * (There are too many race conditions to rely on file system | |
295 | * event timestamps.) | |
296 | * | |
297 | * The <sequence_nr> is a simple integer incremented whenever the | |
298 | * daemon needs to make its state public. For example, if 1000 file | |
299 | * system events come in, but no clients have requested the data, | |
300 | * the daemon can continue to accumulate file changes in the same | |
301 | * bin and does not need to advance the sequence number. However, | |
302 | * as soon as a client does arrive, the daemon needs to start a new | |
303 | * bin and increment the sequence number. | |
304 | * | |
305 | * The sequence number serves as the boundary between 2 sets | |
306 | * of bins -- the older ones that the client has already seen | |
307 | * and the newer ones that it hasn't. | |
308 | * | |
309 | * When a new <token_id> is created, the <sequence_nr> is reset to | |
310 | * zero. | |
311 | * | |
312 | * | |
313 | * About Token Ids | |
314 | * =============== | |
315 | * | |
316 | * A new token_id is created: | |
317 | * | |
318 | * [1] each time the daemon is started. | |
319 | * | |
320 | * [2] any time that the daemon must re-sync with the filesystem | |
321 | * (such as when the kernel drops or we miss events on a very | |
322 | * active volume). | |
323 | * | |
324 | * [3] in response to a client "flush" command (for dropped event | |
325 | * testing). | |
326 | * | |
327 | * When a new token_id is created, the daemon is free to discard all | |
328 | * cached filesystem events associated with any previous token_ids. | |
329 | * Events associated with a non-current token_id will never be sent | |
330 | * to a client. A token_id change implicitly means that the daemon | |
331 | * has gap in its event history. | |
332 | * | |
333 | * Therefore, clients that present a token with a stale (non-current) | |
334 | * token_id will always be given a trivial response. | |
335 | */ | |
336 | struct fsmonitor_token_data { | |
337 | struct strbuf token_id; | |
338 | struct fsmonitor_batch *batch_head; | |
339 | struct fsmonitor_batch *batch_tail; | |
340 | uint64_t client_ref_count; | |
341 | }; | |
342 | ||
bec486b9 JH |
343 | struct fsmonitor_batch { |
344 | struct fsmonitor_batch *next; | |
345 | uint64_t batch_seq_nr; | |
346 | const char **interned_paths; | |
347 | size_t nr, alloc; | |
348 | time_t pinned_time; | |
349 | }; | |
350 | ||
aeef767a JH |
351 | static struct fsmonitor_token_data *fsmonitor_new_token_data(void) |
352 | { | |
353 | static int test_env_value = -1; | |
354 | static uint64_t flush_count = 0; | |
355 | struct fsmonitor_token_data *token; | |
bec486b9 | 356 | struct fsmonitor_batch *batch; |
aeef767a JH |
357 | |
358 | CALLOC_ARRAY(token, 1); | |
bec486b9 | 359 | batch = fsmonitor_batch__new(); |
aeef767a JH |
360 | |
361 | strbuf_init(&token->token_id, 0); | |
bec486b9 JH |
362 | token->batch_head = batch; |
363 | token->batch_tail = batch; | |
aeef767a JH |
364 | token->client_ref_count = 0; |
365 | ||
366 | if (test_env_value < 0) | |
367 | test_env_value = git_env_bool("GIT_TEST_FSMONITOR_TOKEN", 0); | |
368 | ||
369 | if (!test_env_value) { | |
370 | struct timeval tv; | |
371 | struct tm tm; | |
372 | time_t secs; | |
373 | ||
374 | gettimeofday(&tv, NULL); | |
375 | secs = tv.tv_sec; | |
376 | gmtime_r(&secs, &tm); | |
377 | ||
378 | strbuf_addf(&token->token_id, | |
379 | "%"PRIu64".%d.%4d%02d%02dT%02d%02d%02d.%06ldZ", | |
380 | flush_count++, | |
381 | getpid(), | |
382 | tm.tm_year + 1900, tm.tm_mon + 1, tm.tm_mday, | |
383 | tm.tm_hour, tm.tm_min, tm.tm_sec, | |
384 | (long)tv.tv_usec); | |
385 | } else { | |
386 | strbuf_addf(&token->token_id, "test_%08x", test_env_value++); | |
387 | } | |
388 | ||
bec486b9 JH |
389 | /* |
390 | * We created a new <token_id> and are starting a new series | |
391 | * of tokens with a zero <seq_nr>. | |
392 | * | |
393 | * Since clients cannot guess our new (non test) <token_id> | |
394 | * they will always receive a trivial response (because of the | |
395 | * mismatch on the <token_id>). The trivial response will | |
396 | * tell them our new <token_id> so that subsequent requests | |
397 | * will be relative to our new series. (And when sending that | |
398 | * response, we pin the current head of the batch list.) | |
399 | * | |
400 | * Even if the client correctly guesses the <token_id>, their | |
401 | * request of "builtin:<token_id>:0" asks for all changes MORE | |
402 | * RECENT than batch/bin 0. | |
403 | * | |
404 | * This implies that it is a waste to accumulate paths in the | |
405 | * initial batch/bin (because they will never be transmitted). | |
406 | * | |
407 | * So the daemon could be running for days and watching the | |
408 | * file system, but doesn't need to actually accumulate any | |
409 | * paths UNTIL we need to set a reference point for a later | |
410 | * relative request. | |
411 | * | |
412 | * However, it is very useful for testing to always have a | |
413 | * reference point set. Pin batch 0 to force early file system | |
414 | * events to accumulate. | |
415 | */ | |
416 | if (test_env_value) | |
417 | batch->pinned_time = time(NULL); | |
418 | ||
aeef767a JH |
419 | return token; |
420 | } | |
421 | ||
bec486b9 JH |
422 | struct fsmonitor_batch *fsmonitor_batch__new(void) |
423 | { | |
424 | struct fsmonitor_batch *batch; | |
425 | ||
426 | CALLOC_ARRAY(batch, 1); | |
427 | ||
428 | return batch; | |
429 | } | |
430 | ||
431 | void fsmonitor_batch__free_list(struct fsmonitor_batch *batch) | |
432 | { | |
433 | while (batch) { | |
434 | struct fsmonitor_batch *next = batch->next; | |
435 | ||
436 | /* | |
437 | * The actual strings within the array of this batch | |
438 | * are interned, so we don't own them. We only own | |
439 | * the array. | |
440 | */ | |
441 | free(batch->interned_paths); | |
442 | free(batch); | |
443 | ||
444 | batch = next; | |
445 | } | |
446 | } | |
447 | ||
448 | void fsmonitor_batch__add_path(struct fsmonitor_batch *batch, | |
449 | const char *path) | |
450 | { | |
451 | const char *interned_path = strintern(path); | |
452 | ||
453 | trace_printf_key(&trace_fsmonitor, "event: %s", interned_path); | |
454 | ||
455 | ALLOC_GROW(batch->interned_paths, batch->nr + 1, batch->alloc); | |
456 | batch->interned_paths[batch->nr++] = interned_path; | |
457 | } | |
458 | ||
459 | static void fsmonitor_batch__combine(struct fsmonitor_batch *batch_dest, | |
460 | const struct fsmonitor_batch *batch_src) | |
461 | { | |
462 | size_t k; | |
463 | ||
464 | ALLOC_GROW(batch_dest->interned_paths, | |
465 | batch_dest->nr + batch_src->nr + 1, | |
466 | batch_dest->alloc); | |
467 | ||
468 | for (k = 0; k < batch_src->nr; k++) | |
469 | batch_dest->interned_paths[batch_dest->nr++] = | |
470 | batch_src->interned_paths[k]; | |
471 | } | |
472 | ||
50c725d6 JH |
473 | /* |
474 | * To keep the batch list from growing unbounded in response to filesystem | |
475 | * activity, we try to truncate old batches from the end of the list as | |
476 | * they become irrelevant. | |
477 | * | |
478 | * We assume that the .git/index will be updated with the most recent token | |
479 | * any time the index is updated. And future commands will only ask for | |
480 | * recent changes *since* that new token. So as tokens advance into the | |
481 | * future, older batch items will never be requested/needed. So we can | |
482 | * truncate them without loss of functionality. | |
483 | * | |
484 | * However, multiple commands may be talking to the daemon concurrently | |
485 | * or perform a slow command, so a little "token skew" is possible. | |
486 | * Therefore, we want this to be a little bit lazy and have a generous | |
487 | * delay. | |
488 | * | |
489 | * The current reader thread walked backwards in time from `token->batch_head` | |
490 | * back to `batch_marker` somewhere in the middle of the batch list. | |
491 | * | |
492 | * Let's walk backwards in time from that marker an arbitrary delay | |
493 | * and truncate the list there. Note that these timestamps are completely | |
494 | * artificial (based on when we pinned the batch item) and not on any | |
495 | * filesystem activity. | |
496 | * | |
497 | * Return the obsolete portion of the list after we have removed it from | |
498 | * the official list so that the caller can free it after leaving the lock. | |
499 | */ | |
500 | #define MY_TIME_DELAY_SECONDS (5 * 60) /* seconds */ | |
501 | ||
502 | static struct fsmonitor_batch *with_lock__truncate_old_batches( | |
503 | struct fsmonitor_daemon_state *state, | |
504 | const struct fsmonitor_batch *batch_marker) | |
505 | { | |
506 | /* assert current thread holding state->main_lock */ | |
507 | ||
508 | const struct fsmonitor_batch *batch; | |
509 | struct fsmonitor_batch *remainder; | |
510 | ||
511 | if (!batch_marker) | |
512 | return NULL; | |
513 | ||
514 | trace_printf_key(&trace_fsmonitor, "Truncate: mark (%"PRIu64",%"PRIu64")", | |
515 | batch_marker->batch_seq_nr, | |
516 | (uint64_t)batch_marker->pinned_time); | |
517 | ||
518 | for (batch = batch_marker; batch; batch = batch->next) { | |
519 | time_t t; | |
520 | ||
521 | if (!batch->pinned_time) /* an overflow batch */ | |
522 | continue; | |
523 | ||
524 | t = batch->pinned_time + MY_TIME_DELAY_SECONDS; | |
525 | if (t > batch_marker->pinned_time) /* too close to marker */ | |
526 | continue; | |
527 | ||
528 | goto truncate_past_here; | |
529 | } | |
530 | ||
531 | return NULL; | |
532 | ||
533 | truncate_past_here: | |
534 | state->current_token_data->batch_tail = (struct fsmonitor_batch *)batch; | |
535 | ||
536 | remainder = ((struct fsmonitor_batch *)batch)->next; | |
537 | ((struct fsmonitor_batch *)batch)->next = NULL; | |
538 | ||
539 | return remainder; | |
540 | } | |
541 | ||
bec486b9 JH |
542 | static void fsmonitor_free_token_data(struct fsmonitor_token_data *token) |
543 | { | |
544 | if (!token) | |
545 | return; | |
546 | ||
547 | assert(token->client_ref_count == 0); | |
548 | ||
549 | strbuf_release(&token->token_id); | |
550 | ||
551 | fsmonitor_batch__free_list(token->batch_head); | |
552 | ||
553 | free(token); | |
554 | } | |
555 | ||
556 | /* | |
557 | * Flush all of our cached data about the filesystem. Call this if we | |
558 | * lose sync with the filesystem and miss some notification events. | |
559 | * | |
560 | * [1] If we are missing events, then we no longer have a complete | |
561 | * history of the directory (relative to our current start token). | |
562 | * We should create a new token and start fresh (as if we just | |
563 | * booted up). | |
564 | * | |
b05880d3 JH |
565 | * [2] Some of those lost events may have been for cookie files. We |
566 | * should assume the worst and abort them rather letting them starve. | |
567 | * | |
bec486b9 JH |
568 | * If there are no concurrent threads reading the current token data |
569 | * series, we can free it now. Otherwise, let the last reader free | |
570 | * it. | |
571 | * | |
572 | * Either way, the old token data series is no longer associated with | |
573 | * our state data. | |
574 | */ | |
575 | static void with_lock__do_force_resync(struct fsmonitor_daemon_state *state) | |
576 | { | |
577 | /* assert current thread holding state->main_lock */ | |
578 | ||
579 | struct fsmonitor_token_data *free_me = NULL; | |
580 | struct fsmonitor_token_data *new_one = NULL; | |
581 | ||
582 | new_one = fsmonitor_new_token_data(); | |
583 | ||
584 | if (state->current_token_data->client_ref_count == 0) | |
585 | free_me = state->current_token_data; | |
586 | state->current_token_data = new_one; | |
587 | ||
588 | fsmonitor_free_token_data(free_me); | |
b05880d3 JH |
589 | |
590 | with_lock__abort_all_cookies(state); | |
bec486b9 JH |
591 | } |
592 | ||
593 | void fsmonitor_force_resync(struct fsmonitor_daemon_state *state) | |
594 | { | |
595 | pthread_mutex_lock(&state->main_lock); | |
596 | with_lock__do_force_resync(state); | |
597 | pthread_mutex_unlock(&state->main_lock); | |
598 | } | |
599 | ||
518a522f JH |
600 | /* |
601 | * Format an opaque token string to send to the client. | |
602 | */ | |
603 | static void with_lock__format_response_token( | |
604 | struct strbuf *response_token, | |
605 | const struct strbuf *response_token_id, | |
606 | const struct fsmonitor_batch *batch) | |
607 | { | |
608 | /* assert current thread holding state->main_lock */ | |
609 | ||
610 | strbuf_reset(response_token); | |
611 | strbuf_addf(response_token, "builtin:%s:%"PRIu64, | |
612 | response_token_id->buf, batch->batch_seq_nr); | |
613 | } | |
614 | ||
615 | /* | |
616 | * Parse an opaque token from the client. | |
617 | * Returns -1 on error. | |
618 | */ | |
619 | static int fsmonitor_parse_client_token(const char *buf_token, | |
620 | struct strbuf *requested_token_id, | |
621 | uint64_t *seq_nr) | |
622 | { | |
623 | const char *p; | |
624 | char *p_end; | |
625 | ||
626 | strbuf_reset(requested_token_id); | |
627 | *seq_nr = 0; | |
628 | ||
629 | if (!skip_prefix(buf_token, "builtin:", &p)) | |
630 | return -1; | |
631 | ||
632 | while (*p && *p != ':') | |
633 | strbuf_addch(requested_token_id, *p++); | |
634 | if (!*p++) | |
635 | return -1; | |
636 | ||
637 | *seq_nr = (uint64_t)strtoumax(p, &p_end, 10); | |
638 | if (*p_end) | |
639 | return -1; | |
640 | ||
641 | return 0; | |
642 | } | |
643 | ||
644 | KHASH_INIT(str, const char *, int, 0, kh_str_hash_func, kh_str_hash_equal) | |
645 | ||
646 | static int do_handle_client(struct fsmonitor_daemon_state *state, | |
647 | const char *command, | |
648 | ipc_server_reply_cb *reply, | |
649 | struct ipc_server_reply_data *reply_data) | |
650 | { | |
651 | struct fsmonitor_token_data *token_data = NULL; | |
652 | struct strbuf response_token = STRBUF_INIT; | |
653 | struct strbuf requested_token_id = STRBUF_INIT; | |
654 | struct strbuf payload = STRBUF_INIT; | |
655 | uint64_t requested_oldest_seq_nr = 0; | |
656 | uint64_t total_response_len = 0; | |
657 | const char *p; | |
658 | const struct fsmonitor_batch *batch_head; | |
659 | const struct fsmonitor_batch *batch; | |
50c725d6 | 660 | struct fsmonitor_batch *remainder = NULL; |
518a522f JH |
661 | intmax_t count = 0, duplicates = 0; |
662 | kh_str_t *shown; | |
663 | int hash_ret; | |
664 | int do_trivial = 0; | |
665 | int do_flush = 0; | |
b05880d3 JH |
666 | int do_cookie = 0; |
667 | enum fsmonitor_cookie_item_result cookie_result; | |
518a522f JH |
668 | |
669 | /* | |
670 | * We expect `command` to be of the form: | |
671 | * | |
672 | * <command> := quit NUL | |
673 | * | flush NUL | |
674 | * | <V1-time-since-epoch-ns> NUL | |
675 | * | <V2-opaque-fsmonitor-token> NUL | |
676 | */ | |
677 | ||
678 | if (!strcmp(command, "quit")) { | |
679 | /* | |
680 | * A client has requested over the socket/pipe that the | |
681 | * daemon shutdown. | |
682 | * | |
683 | * Tell the IPC thread pool to shutdown (which completes | |
684 | * the await in the main thread (which can stop the | |
685 | * fsmonitor listener thread)). | |
686 | * | |
687 | * There is no reply to the client. | |
688 | */ | |
689 | return SIMPLE_IPC_QUIT; | |
690 | ||
691 | } else if (!strcmp(command, "flush")) { | |
692 | /* | |
693 | * Flush all of our cached data and generate a new token | |
694 | * just like if we lost sync with the filesystem. | |
695 | * | |
696 | * Then send a trivial response using the new token. | |
697 | */ | |
698 | do_flush = 1; | |
699 | do_trivial = 1; | |
700 | ||
701 | } else if (!skip_prefix(command, "builtin:", &p)) { | |
702 | /* assume V1 timestamp or garbage */ | |
703 | ||
704 | char *p_end; | |
705 | ||
706 | strtoumax(command, &p_end, 10); | |
707 | trace_printf_key(&trace_fsmonitor, | |
708 | ((*p_end) ? | |
709 | "fsmonitor: invalid command line '%s'" : | |
710 | "fsmonitor: unsupported V1 protocol '%s'"), | |
711 | command); | |
712 | do_trivial = 1; | |
6692d454 | 713 | do_cookie = 1; |
518a522f JH |
714 | |
715 | } else { | |
716 | /* We have "builtin:*" */ | |
717 | if (fsmonitor_parse_client_token(command, &requested_token_id, | |
718 | &requested_oldest_seq_nr)) { | |
719 | trace_printf_key(&trace_fsmonitor, | |
720 | "fsmonitor: invalid V2 protocol token '%s'", | |
721 | command); | |
722 | do_trivial = 1; | |
6692d454 | 723 | do_cookie = 1; |
518a522f JH |
724 | |
725 | } else { | |
726 | /* | |
727 | * We have a V2 valid token: | |
728 | * "builtin:<token_id>:<seq_nr>" | |
729 | */ | |
b05880d3 | 730 | do_cookie = 1; |
518a522f JH |
731 | } |
732 | } | |
733 | ||
734 | pthread_mutex_lock(&state->main_lock); | |
735 | ||
736 | if (!state->current_token_data) | |
737 | BUG("fsmonitor state does not have a current token"); | |
738 | ||
b05880d3 JH |
739 | /* |
740 | * Write a cookie file inside the directory being watched in | |
741 | * an effort to flush out existing filesystem events that we | |
742 | * actually care about. Suspend this client thread until we | |
743 | * see the filesystem events for this cookie file. | |
744 | * | |
745 | * Creating the cookie lets us guarantee that our FS listener | |
746 | * thread has drained the kernel queue and we are caught up | |
747 | * with the kernel. | |
748 | * | |
749 | * If we cannot create the cookie (or otherwise guarantee that | |
750 | * we are caught up), we send a trivial response. We have to | |
751 | * assume that there might be some very, very recent activity | |
752 | * on the FS still in flight. | |
753 | */ | |
754 | if (do_cookie) { | |
755 | cookie_result = with_lock__wait_for_cookie(state); | |
756 | if (cookie_result != FCIR_SEEN) { | |
757 | error(_("fsmonitor: cookie_result '%d' != SEEN"), | |
758 | cookie_result); | |
759 | do_trivial = 1; | |
760 | } | |
761 | } | |
762 | ||
518a522f JH |
763 | if (do_flush) |
764 | with_lock__do_force_resync(state); | |
765 | ||
766 | /* | |
767 | * We mark the current head of the batch list as "pinned" so | |
768 | * that the listener thread will treat this item as read-only | |
769 | * (and prevent any more paths from being added to it) from | |
770 | * now on. | |
771 | */ | |
772 | token_data = state->current_token_data; | |
773 | batch_head = token_data->batch_head; | |
774 | ((struct fsmonitor_batch *)batch_head)->pinned_time = time(NULL); | |
775 | ||
776 | /* | |
777 | * FSMonitor Protocol V2 requires that we send a response header | |
778 | * with a "new current token" and then all of the paths that changed | |
779 | * since the "requested token". We send the seq_nr of the just-pinned | |
780 | * head batch so that future requests from a client will be relative | |
781 | * to it. | |
782 | */ | |
783 | with_lock__format_response_token(&response_token, | |
784 | &token_data->token_id, batch_head); | |
785 | ||
786 | reply(reply_data, response_token.buf, response_token.len + 1); | |
787 | total_response_len += response_token.len + 1; | |
788 | ||
789 | trace2_data_string("fsmonitor", the_repository, "response/token", | |
790 | response_token.buf); | |
791 | trace_printf_key(&trace_fsmonitor, "response token: %s", | |
792 | response_token.buf); | |
793 | ||
794 | if (!do_trivial) { | |
795 | if (strcmp(requested_token_id.buf, token_data->token_id.buf)) { | |
796 | /* | |
797 | * The client last spoke to a different daemon | |
798 | * instance -OR- the daemon had to resync with | |
799 | * the filesystem (and lost events), so reject. | |
800 | */ | |
801 | trace2_data_string("fsmonitor", the_repository, | |
802 | "response/token", "different"); | |
803 | do_trivial = 1; | |
804 | ||
805 | } else if (requested_oldest_seq_nr < | |
806 | token_data->batch_tail->batch_seq_nr) { | |
807 | /* | |
808 | * The client wants older events than we have for | |
809 | * this token_id. This means that the end of our | |
810 | * batch list was truncated and we cannot give the | |
811 | * client a complete snapshot relative to their | |
812 | * request. | |
813 | */ | |
814 | trace_printf_key(&trace_fsmonitor, | |
815 | "client requested truncated data"); | |
816 | do_trivial = 1; | |
817 | } | |
818 | } | |
819 | ||
820 | if (do_trivial) { | |
821 | pthread_mutex_unlock(&state->main_lock); | |
822 | ||
823 | reply(reply_data, "/", 2); | |
824 | ||
825 | trace2_data_intmax("fsmonitor", the_repository, | |
826 | "response/trivial", 1); | |
827 | ||
828 | goto cleanup; | |
829 | } | |
830 | ||
831 | /* | |
832 | * We're going to hold onto a pointer to the current | |
833 | * token-data while we walk the list of batches of files. | |
834 | * During this time, we will NOT be under the lock. | |
835 | * So we ref-count it. | |
836 | * | |
837 | * This allows the listener thread to continue prepending | |
838 | * new batches of items to the token-data (which we'll ignore). | |
839 | * | |
840 | * AND it allows the listener thread to do a token-reset | |
841 | * (and install a new `current_token_data`). | |
842 | */ | |
843 | token_data->client_ref_count++; | |
844 | ||
845 | pthread_mutex_unlock(&state->main_lock); | |
846 | ||
847 | /* | |
848 | * The client request is relative to the token that they sent, | |
849 | * so walk the batch list backwards from the current head back | |
850 | * to the batch (sequence number) they named. | |
851 | * | |
852 | * We use khash to de-dup the list of pathnames. | |
853 | * | |
854 | * NEEDSWORK: each batch contains a list of interned strings, | |
855 | * so we only need to do pointer comparisons here to build the | |
856 | * hash table. Currently, we're still comparing the string | |
857 | * values. | |
858 | */ | |
859 | shown = kh_init_str(); | |
860 | for (batch = batch_head; | |
861 | batch && batch->batch_seq_nr > requested_oldest_seq_nr; | |
862 | batch = batch->next) { | |
863 | size_t k; | |
864 | ||
865 | for (k = 0; k < batch->nr; k++) { | |
866 | const char *s = batch->interned_paths[k]; | |
867 | size_t s_len; | |
868 | ||
869 | if (kh_get_str(shown, s) != kh_end(shown)) | |
870 | duplicates++; | |
871 | else { | |
872 | kh_put_str(shown, s, &hash_ret); | |
873 | ||
874 | trace_printf_key(&trace_fsmonitor, | |
875 | "send[%"PRIuMAX"]: %s", | |
876 | count, s); | |
877 | ||
878 | /* Each path gets written with a trailing NUL */ | |
879 | s_len = strlen(s) + 1; | |
880 | ||
881 | if (payload.len + s_len >= | |
882 | LARGE_PACKET_DATA_MAX) { | |
883 | reply(reply_data, payload.buf, | |
884 | payload.len); | |
885 | total_response_len += payload.len; | |
886 | strbuf_reset(&payload); | |
887 | } | |
888 | ||
889 | strbuf_add(&payload, s, s_len); | |
890 | count++; | |
891 | } | |
892 | } | |
893 | } | |
894 | ||
895 | if (payload.len) { | |
896 | reply(reply_data, payload.buf, payload.len); | |
897 | total_response_len += payload.len; | |
898 | } | |
899 | ||
900 | kh_release_str(shown); | |
901 | ||
902 | pthread_mutex_lock(&state->main_lock); | |
903 | ||
904 | if (token_data->client_ref_count > 0) | |
905 | token_data->client_ref_count--; | |
906 | ||
907 | if (token_data->client_ref_count == 0) { | |
908 | if (token_data != state->current_token_data) { | |
909 | /* | |
910 | * The listener thread did a token-reset while we were | |
911 | * walking the batch list. Therefore, this token is | |
912 | * stale and can be discarded completely. If we are | |
913 | * the last reader thread using this token, we own | |
914 | * that work. | |
915 | */ | |
916 | fsmonitor_free_token_data(token_data); | |
50c725d6 JH |
917 | } else if (batch) { |
918 | /* | |
919 | * We are holding the lock and are the only | |
920 | * reader of the ref-counted portion of the | |
921 | * list, so we get the honor of seeing if the | |
922 | * list can be truncated to save memory. | |
923 | * | |
924 | * The main loop did not walk to the end of the | |
925 | * list, so this batch is the first item in the | |
926 | * batch-list that is older than the requested | |
927 | * end-point sequence number. See if the tail | |
928 | * end of the list is obsolete. | |
929 | */ | |
930 | remainder = with_lock__truncate_old_batches(state, | |
931 | batch); | |
518a522f JH |
932 | } |
933 | } | |
934 | ||
935 | pthread_mutex_unlock(&state->main_lock); | |
936 | ||
50c725d6 JH |
937 | if (remainder) |
938 | fsmonitor_batch__free_list(remainder); | |
939 | ||
518a522f JH |
940 | trace2_data_intmax("fsmonitor", the_repository, "response/length", total_response_len); |
941 | trace2_data_intmax("fsmonitor", the_repository, "response/count/files", count); | |
942 | trace2_data_intmax("fsmonitor", the_repository, "response/count/duplicates", duplicates); | |
943 | ||
944 | cleanup: | |
945 | strbuf_release(&response_token); | |
946 | strbuf_release(&requested_token_id); | |
947 | strbuf_release(&payload); | |
948 | ||
949 | return 0; | |
950 | } | |
951 | ||
9dcba0ba JH |
952 | static ipc_server_application_cb handle_client; |
953 | ||
954 | static int handle_client(void *data, | |
955 | const char *command, size_t command_len, | |
956 | ipc_server_reply_cb *reply, | |
957 | struct ipc_server_reply_data *reply_data) | |
958 | { | |
518a522f | 959 | struct fsmonitor_daemon_state *state = data; |
9dcba0ba JH |
960 | int result; |
961 | ||
962 | /* | |
963 | * The Simple IPC API now supports {char*, len} arguments, but | |
964 | * FSMonitor always uses proper null-terminated strings, so | |
965 | * we can ignore the command_len argument. (Trust, but verify.) | |
966 | */ | |
967 | if (command_len != strlen(command)) | |
968 | BUG("FSMonitor assumes text messages"); | |
969 | ||
518a522f JH |
970 | trace_printf_key(&trace_fsmonitor, "requested token: %s", command); |
971 | ||
9dcba0ba JH |
972 | trace2_region_enter("fsmonitor", "handle_client", the_repository); |
973 | trace2_data_string("fsmonitor", the_repository, "request", command); | |
974 | ||
518a522f | 975 | result = do_handle_client(state, command, reply, reply_data); |
9dcba0ba JH |
976 | |
977 | trace2_region_leave("fsmonitor", "handle_client", the_repository); | |
978 | ||
979 | return result; | |
980 | } | |
981 | ||
b05880d3 JH |
982 | #define FSMONITOR_DIR "fsmonitor--daemon" |
983 | #define FSMONITOR_COOKIE_DIR "cookies" | |
984 | #define FSMONITOR_COOKIE_PREFIX (FSMONITOR_DIR "/" FSMONITOR_COOKIE_DIR "/") | |
0ae7a1d9 JH |
985 | |
986 | enum fsmonitor_path_type fsmonitor_classify_path_workdir_relative( | |
987 | const char *rel) | |
988 | { | |
989 | if (fspathncmp(rel, ".git", 4)) | |
990 | return IS_WORKDIR_PATH; | |
991 | rel += 4; | |
992 | ||
993 | if (!*rel) | |
994 | return IS_DOT_GIT; | |
995 | if (*rel != '/') | |
996 | return IS_WORKDIR_PATH; /* e.g. .gitignore */ | |
997 | rel++; | |
998 | ||
999 | if (!fspathncmp(rel, FSMONITOR_COOKIE_PREFIX, | |
1000 | strlen(FSMONITOR_COOKIE_PREFIX))) | |
1001 | return IS_INSIDE_DOT_GIT_WITH_COOKIE_PREFIX; | |
1002 | ||
1003 | return IS_INSIDE_DOT_GIT; | |
1004 | } | |
1005 | ||
1006 | enum fsmonitor_path_type fsmonitor_classify_path_gitdir_relative( | |
1007 | const char *rel) | |
1008 | { | |
1009 | if (!fspathncmp(rel, FSMONITOR_COOKIE_PREFIX, | |
1010 | strlen(FSMONITOR_COOKIE_PREFIX))) | |
1011 | return IS_INSIDE_GITDIR_WITH_COOKIE_PREFIX; | |
1012 | ||
1013 | return IS_INSIDE_GITDIR; | |
1014 | } | |
1015 | ||
1016 | static enum fsmonitor_path_type try_classify_workdir_abs_path( | |
1017 | struct fsmonitor_daemon_state *state, | |
1018 | const char *path) | |
1019 | { | |
1020 | const char *rel; | |
1021 | ||
1022 | if (fspathncmp(path, state->path_worktree_watch.buf, | |
1023 | state->path_worktree_watch.len)) | |
1024 | return IS_OUTSIDE_CONE; | |
1025 | ||
1026 | rel = path + state->path_worktree_watch.len; | |
1027 | ||
1028 | if (!*rel) | |
1029 | return IS_WORKDIR_PATH; /* it is the root dir exactly */ | |
1030 | if (*rel != '/') | |
1031 | return IS_OUTSIDE_CONE; | |
1032 | rel++; | |
1033 | ||
1034 | return fsmonitor_classify_path_workdir_relative(rel); | |
1035 | } | |
1036 | ||
1037 | enum fsmonitor_path_type fsmonitor_classify_path_absolute( | |
1038 | struct fsmonitor_daemon_state *state, | |
1039 | const char *path) | |
1040 | { | |
1041 | const char *rel; | |
1042 | enum fsmonitor_path_type t; | |
1043 | ||
1044 | t = try_classify_workdir_abs_path(state, path); | |
1045 | if (state->nr_paths_watching == 1) | |
1046 | return t; | |
1047 | if (t != IS_OUTSIDE_CONE) | |
1048 | return t; | |
1049 | ||
1050 | if (fspathncmp(path, state->path_gitdir_watch.buf, | |
1051 | state->path_gitdir_watch.len)) | |
1052 | return IS_OUTSIDE_CONE; | |
1053 | ||
1054 | rel = path + state->path_gitdir_watch.len; | |
1055 | ||
1056 | if (!*rel) | |
1057 | return IS_GITDIR; /* it is the <gitdir> exactly */ | |
1058 | if (*rel != '/') | |
1059 | return IS_OUTSIDE_CONE; | |
1060 | rel++; | |
1061 | ||
1062 | return fsmonitor_classify_path_gitdir_relative(rel); | |
1063 | } | |
1064 | ||
bec486b9 JH |
1065 | /* |
1066 | * We try to combine small batches at the front of the batch-list to avoid | |
1067 | * having a long list. This hopefully makes it a little easier when we want | |
1068 | * to truncate and maintain the list. However, we don't want the paths array | |
1069 | * to just keep growing and growing with realloc, so we insert an arbitrary | |
1070 | * limit. | |
1071 | */ | |
1072 | #define MY_COMBINE_LIMIT (1024) | |
1073 | ||
1074 | void fsmonitor_publish(struct fsmonitor_daemon_state *state, | |
1075 | struct fsmonitor_batch *batch, | |
1076 | const struct string_list *cookie_names) | |
1077 | { | |
1078 | if (!batch && !cookie_names->nr) | |
1079 | return; | |
1080 | ||
1081 | pthread_mutex_lock(&state->main_lock); | |
1082 | ||
1083 | if (batch) { | |
1084 | struct fsmonitor_batch *head; | |
1085 | ||
1086 | head = state->current_token_data->batch_head; | |
1087 | if (!head) { | |
1088 | BUG("token does not have batch"); | |
1089 | } else if (head->pinned_time) { | |
1090 | /* | |
1091 | * We cannot alter the current batch list | |
1092 | * because: | |
1093 | * | |
1094 | * [a] it is being transmitted to at least one | |
1095 | * client and the handle_client() thread has a | |
1096 | * ref-count, but not a lock on the batch list | |
1097 | * starting with this item. | |
1098 | * | |
1099 | * [b] it has been transmitted in the past to | |
1100 | * at least one client such that future | |
1101 | * requests are relative to this head batch. | |
1102 | * | |
1103 | * So, we can only prepend a new batch onto | |
1104 | * the front of the list. | |
1105 | */ | |
1106 | batch->batch_seq_nr = head->batch_seq_nr + 1; | |
1107 | batch->next = head; | |
1108 | state->current_token_data->batch_head = batch; | |
1109 | } else if (!head->batch_seq_nr) { | |
1110 | /* | |
1111 | * Batch 0 is unpinned. See the note in | |
1112 | * `fsmonitor_new_token_data()` about why we | |
1113 | * don't need to accumulate these paths. | |
1114 | */ | |
1115 | fsmonitor_batch__free_list(batch); | |
1116 | } else if (head->nr + batch->nr > MY_COMBINE_LIMIT) { | |
1117 | /* | |
1118 | * The head batch in the list has never been | |
1119 | * transmitted to a client, but folding the | |
1120 | * contents of the new batch onto it would | |
1121 | * exceed our arbitrary limit, so just prepend | |
1122 | * the new batch onto the list. | |
1123 | */ | |
1124 | batch->batch_seq_nr = head->batch_seq_nr + 1; | |
1125 | batch->next = head; | |
1126 | state->current_token_data->batch_head = batch; | |
1127 | } else { | |
1128 | /* | |
1129 | * We are free to add the paths in the given | |
1130 | * batch onto the end of the current head batch. | |
1131 | */ | |
1132 | fsmonitor_batch__combine(head, batch); | |
1133 | fsmonitor_batch__free_list(batch); | |
1134 | } | |
1135 | } | |
1136 | ||
b05880d3 JH |
1137 | if (cookie_names->nr) |
1138 | with_lock__mark_cookies_seen(state, cookie_names); | |
1139 | ||
bec486b9 JH |
1140 | pthread_mutex_unlock(&state->main_lock); |
1141 | } | |
1142 | ||
d0605550 JH |
1143 | static void *fsm_health__thread_proc(void *_state) |
1144 | { | |
1145 | struct fsmonitor_daemon_state *state = _state; | |
1146 | ||
1147 | trace2_thread_start("fsm-health"); | |
1148 | ||
1149 | fsm_health__loop(state); | |
1150 | ||
1151 | trace2_thread_exit(); | |
1152 | return NULL; | |
1153 | } | |
1154 | ||
9dcba0ba JH |
1155 | static void *fsm_listen__thread_proc(void *_state) |
1156 | { | |
1157 | struct fsmonitor_daemon_state *state = _state; | |
1158 | ||
1159 | trace2_thread_start("fsm-listen"); | |
1160 | ||
1161 | trace_printf_key(&trace_fsmonitor, "Watching: worktree '%s'", | |
1162 | state->path_worktree_watch.buf); | |
1163 | if (state->nr_paths_watching > 1) | |
1164 | trace_printf_key(&trace_fsmonitor, "Watching: gitdir '%s'", | |
1165 | state->path_gitdir_watch.buf); | |
1166 | ||
1167 | fsm_listen__loop(state); | |
1168 | ||
bec486b9 JH |
1169 | pthread_mutex_lock(&state->main_lock); |
1170 | if (state->current_token_data && | |
1171 | state->current_token_data->client_ref_count == 0) | |
1172 | fsmonitor_free_token_data(state->current_token_data); | |
1173 | state->current_token_data = NULL; | |
1174 | pthread_mutex_unlock(&state->main_lock); | |
1175 | ||
9dcba0ba JH |
1176 | trace2_thread_exit(); |
1177 | return NULL; | |
1178 | } | |
1179 | ||
1180 | static int fsmonitor_run_daemon_1(struct fsmonitor_daemon_state *state) | |
1181 | { | |
1182 | struct ipc_server_opts ipc_opts = { | |
1183 | .nr_threads = fsmonitor__ipc_threads, | |
1184 | ||
1185 | /* | |
1186 | * We know that there are no other active threads yet, | |
1187 | * so we can let the IPC layer temporarily chdir() if | |
1188 | * it needs to when creating the server side of the | |
1189 | * Unix domain socket. | |
1190 | */ | |
1191 | .uds_disallow_chdir = 0 | |
1192 | }; | |
d0605550 | 1193 | int health_started = 0; |
802aa318 JH |
1194 | int listener_started = 0; |
1195 | int err = 0; | |
9dcba0ba JH |
1196 | |
1197 | /* | |
1198 | * Start the IPC thread pool before the we've started the file | |
1199 | * system event listener thread so that we have the IPC handle | |
1200 | * before we need it. | |
1201 | */ | |
1202 | if (ipc_server_run_async(&state->ipc_server_data, | |
39664e93 | 1203 | state->path_ipc.buf, &ipc_opts, |
9dcba0ba JH |
1204 | handle_client, state)) |
1205 | return error_errno( | |
1206 | _("could not start IPC thread pool on '%s'"), | |
39664e93 | 1207 | state->path_ipc.buf); |
9dcba0ba JH |
1208 | |
1209 | /* | |
1210 | * Start the fsmonitor listener thread to collect filesystem | |
1211 | * events. | |
1212 | */ | |
1213 | if (pthread_create(&state->listener_thread, NULL, | |
786e6761 | 1214 | fsm_listen__thread_proc, state)) { |
9dcba0ba | 1215 | ipc_server_stop_async(state->ipc_server_data); |
802aa318 JH |
1216 | err = error(_("could not start fsmonitor listener thread")); |
1217 | goto cleanup; | |
9dcba0ba | 1218 | } |
802aa318 | 1219 | listener_started = 1; |
9dcba0ba | 1220 | |
d0605550 JH |
1221 | /* |
1222 | * Start the health thread to watch over our process. | |
1223 | */ | |
1224 | if (pthread_create(&state->health_thread, NULL, | |
786e6761 | 1225 | fsm_health__thread_proc, state)) { |
d0605550 JH |
1226 | ipc_server_stop_async(state->ipc_server_data); |
1227 | err = error(_("could not start fsmonitor health thread")); | |
1228 | goto cleanup; | |
1229 | } | |
1230 | health_started = 1; | |
1231 | ||
9dcba0ba JH |
1232 | /* |
1233 | * The daemon is now fully functional in background threads. | |
802aa318 JH |
1234 | * Our primary thread should now just wait while the threads |
1235 | * do all the work. | |
1236 | */ | |
1237 | cleanup: | |
1238 | /* | |
9dcba0ba | 1239 | * Wait for the IPC thread pool to shutdown (whether by client |
802aa318 | 1240 | * request, from filesystem activity, or an error). |
9dcba0ba JH |
1241 | */ |
1242 | ipc_server_await(state->ipc_server_data); | |
1243 | ||
1244 | /* | |
1245 | * The fsmonitor listener thread may have received a shutdown | |
1246 | * event from the IPC thread pool, but it doesn't hurt to tell | |
1247 | * it again. And wait for it to shutdown. | |
1248 | */ | |
802aa318 JH |
1249 | if (listener_started) { |
1250 | fsm_listen__stop_async(state); | |
1251 | pthread_join(state->listener_thread, NULL); | |
1252 | } | |
9dcba0ba | 1253 | |
d0605550 JH |
1254 | if (health_started) { |
1255 | fsm_health__stop_async(state); | |
1256 | pthread_join(state->health_thread, NULL); | |
1257 | } | |
1258 | ||
802aa318 JH |
1259 | if (err) |
1260 | return err; | |
207534e4 JH |
1261 | if (state->listen_error_code) |
1262 | return state->listen_error_code; | |
d0605550 JH |
1263 | if (state->health_error_code) |
1264 | return state->health_error_code; | |
802aa318 | 1265 | return 0; |
9dcba0ba JH |
1266 | } |
1267 | ||
1268 | static int fsmonitor_run_daemon(void) | |
1269 | { | |
1270 | struct fsmonitor_daemon_state state; | |
39664e93 | 1271 | const char *home; |
9dcba0ba JH |
1272 | int err; |
1273 | ||
1274 | memset(&state, 0, sizeof(state)); | |
1275 | ||
b05880d3 | 1276 | hashmap_init(&state.cookies, cookies_cmp, NULL, 0); |
9dcba0ba | 1277 | pthread_mutex_init(&state.main_lock, NULL); |
b05880d3 | 1278 | pthread_cond_init(&state.cookies_cond, NULL); |
207534e4 | 1279 | state.listen_error_code = 0; |
d0605550 | 1280 | state.health_error_code = 0; |
aeef767a | 1281 | state.current_token_data = fsmonitor_new_token_data(); |
9dcba0ba JH |
1282 | |
1283 | /* Prepare to (recursively) watch the <worktree-root> directory. */ | |
1284 | strbuf_init(&state.path_worktree_watch, 0); | |
1285 | strbuf_addstr(&state.path_worktree_watch, absolute_path(get_git_work_tree())); | |
1286 | state.nr_paths_watching = 1; | |
1287 | ||
12fd27df ED |
1288 | strbuf_init(&state.alias.alias, 0); |
1289 | strbuf_init(&state.alias.points_to, 0); | |
1290 | if ((err = fsmonitor__get_alias(state.path_worktree_watch.buf, &state.alias))) | |
1291 | goto done; | |
1292 | ||
9dcba0ba JH |
1293 | /* |
1294 | * We create and delete cookie files somewhere inside the .git | |
1295 | * directory to help us keep sync with the file system. If | |
1296 | * ".git" is not a directory, then <gitdir> is not inside the | |
1297 | * cone of <worktree-root>, so set up a second watch to watch | |
1298 | * the <gitdir> so that we get events for the cookie files. | |
1299 | */ | |
1300 | strbuf_init(&state.path_gitdir_watch, 0); | |
1301 | strbuf_addbuf(&state.path_gitdir_watch, &state.path_worktree_watch); | |
1302 | strbuf_addstr(&state.path_gitdir_watch, "/.git"); | |
1303 | if (!is_directory(state.path_gitdir_watch.buf)) { | |
1304 | strbuf_reset(&state.path_gitdir_watch); | |
1305 | strbuf_addstr(&state.path_gitdir_watch, absolute_path(get_git_dir())); | |
1306 | state.nr_paths_watching = 2; | |
1307 | } | |
1308 | ||
b05880d3 JH |
1309 | /* |
1310 | * We will write filesystem syncing cookie files into | |
1311 | * <gitdir>/<fsmonitor-dir>/<cookie-dir>/<pid>-<seq>. | |
1312 | * | |
1313 | * The extra layers of subdirectories here keep us from | |
1314 | * changing the mtime on ".git/" or ".git/foo/" when we create | |
1315 | * or delete cookie files. | |
1316 | * | |
1317 | * There have been problems with some IDEs that do a | |
1318 | * non-recursive watch of the ".git/" directory and run a | |
1319 | * series of commands any time something happens. | |
1320 | * | |
1321 | * For example, if we place our cookie files directly in | |
1322 | * ".git/" or ".git/foo/" then a `git status` (or similar | |
1323 | * command) from the IDE will cause a cookie file to be | |
1324 | * created in one of those dirs. This causes the mtime of | |
1325 | * those dirs to change. This triggers the IDE's watch | |
1326 | * notification. This triggers the IDE to run those commands | |
1327 | * again. And the process repeats and the machine never goes | |
1328 | * idle. | |
1329 | * | |
1330 | * Adding the extra layers of subdirectories prevents the | |
1331 | * mtime of ".git/" and ".git/foo" from changing when a | |
1332 | * cookie file is created. | |
1333 | */ | |
1334 | strbuf_init(&state.path_cookie_prefix, 0); | |
1335 | strbuf_addbuf(&state.path_cookie_prefix, &state.path_gitdir_watch); | |
1336 | ||
1337 | strbuf_addch(&state.path_cookie_prefix, '/'); | |
1338 | strbuf_addstr(&state.path_cookie_prefix, FSMONITOR_DIR); | |
1339 | mkdir(state.path_cookie_prefix.buf, 0777); | |
1340 | ||
1341 | strbuf_addch(&state.path_cookie_prefix, '/'); | |
1342 | strbuf_addstr(&state.path_cookie_prefix, FSMONITOR_COOKIE_DIR); | |
1343 | mkdir(state.path_cookie_prefix.buf, 0777); | |
1344 | ||
1345 | strbuf_addch(&state.path_cookie_prefix, '/'); | |
1346 | ||
39664e93 JH |
1347 | /* |
1348 | * We create a named-pipe or unix domain socket inside of the | |
1349 | * ".git" directory. (Well, on Windows, we base our named | |
1350 | * pipe in the NPFS on the absolute path of the git | |
1351 | * directory.) | |
1352 | */ | |
1353 | strbuf_init(&state.path_ipc, 0); | |
6beb2688 ED |
1354 | strbuf_addstr(&state.path_ipc, |
1355 | absolute_path(fsmonitor_ipc__get_path(the_repository))); | |
39664e93 | 1356 | |
9dcba0ba JH |
1357 | /* |
1358 | * Confirm that we can create platform-specific resources for the | |
1359 | * filesystem listener before we bother starting all the threads. | |
1360 | */ | |
1361 | if (fsm_listen__ctor(&state)) { | |
1362 | err = error(_("could not initialize listener thread")); | |
1363 | goto done; | |
1364 | } | |
1365 | ||
d0605550 JH |
1366 | if (fsm_health__ctor(&state)) { |
1367 | err = error(_("could not initialize health thread")); | |
1368 | goto done; | |
1369 | } | |
1370 | ||
39664e93 JH |
1371 | /* |
1372 | * CD out of the worktree root directory. | |
1373 | * | |
1374 | * The common Git startup mechanism causes our CWD to be the | |
1375 | * root of the worktree. On Windows, this causes our process | |
1376 | * to hold a locked handle on the CWD. This prevents the | |
1377 | * worktree from being moved or deleted while the daemon is | |
1378 | * running. | |
1379 | * | |
1380 | * We assume that our FS and IPC listener threads have either | |
1381 | * opened all of the handles that they need or will do | |
1382 | * everything using absolute paths. | |
1383 | */ | |
1384 | home = getenv("HOME"); | |
1385 | if (home && *home && chdir(home)) | |
1386 | die_errno(_("could not cd home '%s'"), home); | |
1387 | ||
9dcba0ba JH |
1388 | err = fsmonitor_run_daemon_1(&state); |
1389 | ||
1390 | done: | |
b05880d3 | 1391 | pthread_cond_destroy(&state.cookies_cond); |
9dcba0ba JH |
1392 | pthread_mutex_destroy(&state.main_lock); |
1393 | fsm_listen__dtor(&state); | |
d0605550 | 1394 | fsm_health__dtor(&state); |
9dcba0ba JH |
1395 | |
1396 | ipc_server_free(state.ipc_server_data); | |
1397 | ||
1398 | strbuf_release(&state.path_worktree_watch); | |
1399 | strbuf_release(&state.path_gitdir_watch); | |
b05880d3 | 1400 | strbuf_release(&state.path_cookie_prefix); |
39664e93 | 1401 | strbuf_release(&state.path_ipc); |
12fd27df ED |
1402 | strbuf_release(&state.alias.alias); |
1403 | strbuf_release(&state.alias.points_to); | |
9dcba0ba JH |
1404 | |
1405 | return err; | |
1406 | } | |
1407 | ||
c284e27b | 1408 | static int try_to_run_foreground_daemon(int detach_console) |
9dcba0ba JH |
1409 | { |
1410 | /* | |
1411 | * Technically, we don't need to probe for an existing daemon | |
1412 | * process, since we could just call `fsmonitor_run_daemon()` | |
1413 | * and let it fail if the pipe/socket is busy. | |
1414 | * | |
1415 | * However, this method gives us a nicer error message for a | |
1416 | * common error case. | |
1417 | */ | |
1418 | if (fsmonitor_ipc__get_state() == IPC_STATE__LISTENING) | |
1419 | die(_("fsmonitor--daemon is already running '%s'"), | |
1420 | the_repository->worktree); | |
1421 | ||
1422 | if (fsmonitor__announce_startup) { | |
1423 | fprintf(stderr, _("running fsmonitor-daemon in '%s'\n"), | |
1424 | the_repository->worktree); | |
1425 | fflush(stderr); | |
1426 | } | |
1427 | ||
c284e27b JH |
1428 | #ifdef GIT_WINDOWS_NATIVE |
1429 | if (detach_console) | |
1430 | FreeConsole(); | |
1431 | #endif | |
1432 | ||
9dcba0ba JH |
1433 | return !!fsmonitor_run_daemon(); |
1434 | } | |
1435 | ||
c284e27b JH |
1436 | static start_bg_wait_cb bg_wait_cb; |
1437 | ||
1438 | static int bg_wait_cb(const struct child_process *cp, void *cb_data) | |
1439 | { | |
1440 | enum ipc_active_state s = fsmonitor_ipc__get_state(); | |
1441 | ||
1442 | switch (s) { | |
1443 | case IPC_STATE__LISTENING: | |
1444 | /* child is "ready" */ | |
1445 | return 0; | |
1446 | ||
1447 | case IPC_STATE__NOT_LISTENING: | |
1448 | case IPC_STATE__PATH_NOT_FOUND: | |
1449 | /* give child more time */ | |
1450 | return 1; | |
1451 | ||
1452 | default: | |
1453 | case IPC_STATE__INVALID_PATH: | |
1454 | case IPC_STATE__OTHER_ERROR: | |
1455 | /* all the time in world won't help */ | |
1456 | return -1; | |
1457 | } | |
1458 | } | |
1459 | ||
1460 | static int try_to_start_background_daemon(void) | |
1461 | { | |
1462 | struct child_process cp = CHILD_PROCESS_INIT; | |
1463 | enum start_bg_result sbgr; | |
1464 | ||
1465 | /* | |
1466 | * Before we try to create a background daemon process, see | |
1467 | * if a daemon process is already listening. This makes it | |
1468 | * easier for us to report an already-listening error to the | |
1469 | * console, since our spawn/daemon can only report the success | |
1470 | * of creating the background process (and not whether it | |
1471 | * immediately exited). | |
1472 | */ | |
1473 | if (fsmonitor_ipc__get_state() == IPC_STATE__LISTENING) | |
1474 | die(_("fsmonitor--daemon is already running '%s'"), | |
1475 | the_repository->worktree); | |
1476 | ||
1477 | if (fsmonitor__announce_startup) { | |
1478 | fprintf(stderr, _("starting fsmonitor-daemon in '%s'\n"), | |
1479 | the_repository->worktree); | |
1480 | fflush(stderr); | |
1481 | } | |
1482 | ||
1483 | cp.git_cmd = 1; | |
1484 | ||
1485 | strvec_push(&cp.args, "fsmonitor--daemon"); | |
1486 | strvec_push(&cp.args, "run"); | |
1487 | strvec_push(&cp.args, "--detach"); | |
1488 | strvec_pushf(&cp.args, "--ipc-threads=%d", fsmonitor__ipc_threads); | |
1489 | ||
1490 | cp.no_stdin = 1; | |
1491 | cp.no_stdout = 1; | |
1492 | cp.no_stderr = 1; | |
1493 | ||
1494 | sbgr = start_bg_command(&cp, bg_wait_cb, NULL, | |
1495 | fsmonitor__start_timeout_sec); | |
1496 | ||
1497 | switch (sbgr) { | |
1498 | case SBGR_READY: | |
1499 | return 0; | |
1500 | ||
1501 | default: | |
1502 | case SBGR_ERROR: | |
1503 | case SBGR_CB_ERROR: | |
1504 | return error(_("daemon failed to start")); | |
1505 | ||
1506 | case SBGR_TIMEOUT: | |
1507 | return error(_("daemon not online yet")); | |
1508 | ||
1509 | case SBGR_DIED: | |
1510 | return error(_("daemon terminated")); | |
1511 | } | |
1512 | } | |
1513 | ||
16d9d617 JH |
1514 | int cmd_fsmonitor__daemon(int argc, const char **argv, const char *prefix) |
1515 | { | |
1516 | const char *subcmd; | |
62a62a28 | 1517 | enum fsmonitor_reason reason; |
c284e27b | 1518 | int detach_console = 0; |
16d9d617 JH |
1519 | |
1520 | struct option options[] = { | |
c284e27b | 1521 | OPT_BOOL(0, "detach", &detach_console, N_("detach from console")), |
9dcba0ba JH |
1522 | OPT_INTEGER(0, "ipc-threads", |
1523 | &fsmonitor__ipc_threads, | |
1524 | N_("use <n> ipc worker threads")), | |
c284e27b JH |
1525 | OPT_INTEGER(0, "start-timeout", |
1526 | &fsmonitor__start_timeout_sec, | |
1527 | N_("max seconds to wait for background daemon startup")), | |
1528 | ||
16d9d617 JH |
1529 | OPT_END() |
1530 | }; | |
1531 | ||
9dcba0ba | 1532 | git_config(fsmonitor_config, NULL); |
16d9d617 JH |
1533 | |
1534 | argc = parse_options(argc, argv, prefix, options, | |
1535 | builtin_fsmonitor__daemon_usage, 0); | |
1536 | if (argc != 1) | |
1537 | usage_with_options(builtin_fsmonitor__daemon_usage, options); | |
1538 | subcmd = argv[0]; | |
1539 | ||
9dcba0ba JH |
1540 | if (fsmonitor__ipc_threads < 1) |
1541 | die(_("invalid 'ipc-threads' value (%d)"), | |
1542 | fsmonitor__ipc_threads); | |
1543 | ||
62a62a28 JH |
1544 | prepare_repo_settings(the_repository); |
1545 | /* | |
1546 | * If the repo is fsmonitor-compatible, explicitly set IPC-mode | |
1547 | * (without bothering to load the `core.fsmonitor` config settings). | |
1548 | * | |
1549 | * If the repo is not compatible, the repo-settings will be set to | |
1550 | * incompatible rather than IPC, so we can use one of the __get | |
1551 | * routines to detect the discrepancy. | |
1552 | */ | |
1553 | fsm_settings__set_ipc(the_repository); | |
1554 | ||
1555 | reason = fsm_settings__get_reason(the_repository); | |
1556 | if (reason > FSMONITOR_REASON_OK) | |
1557 | die("%s", | |
1558 | fsm_settings__get_incompatible_msg(the_repository, | |
1559 | reason)); | |
1560 | ||
c284e27b JH |
1561 | if (!strcmp(subcmd, "start")) |
1562 | return !!try_to_start_background_daemon(); | |
1563 | ||
9dcba0ba | 1564 | if (!strcmp(subcmd, "run")) |
c284e27b | 1565 | return !!try_to_run_foreground_daemon(detach_console); |
9dcba0ba | 1566 | |
abc9dbc0 JH |
1567 | if (!strcmp(subcmd, "stop")) |
1568 | return !!do_as_client__send_stop(); | |
1569 | ||
1570 | if (!strcmp(subcmd, "status")) | |
1571 | return !!do_as_client__status(); | |
1572 | ||
16d9d617 JH |
1573 | die(_("Unhandled subcommand '%s'"), subcmd); |
1574 | } | |
1575 | ||
1576 | #else | |
1577 | int cmd_fsmonitor__daemon(int argc, const char **argv, const char *prefix) | |
1578 | { | |
1579 | struct option options[] = { | |
1580 | OPT_END() | |
1581 | }; | |
1582 | ||
1583 | if (argc == 2 && !strcmp(argv[1], "-h")) | |
1584 | usage_with_options(builtin_fsmonitor__daemon_usage, options); | |
1585 | ||
1586 | die(_("fsmonitor--daemon not supported on this platform")); | |
1587 | } | |
1588 | #endif |