lix/src/libstore/optimise-store.cc

256 lines
8 KiB
C++
Raw Normal View History

2012-08-01 22:09:47 +02:00
#include "config.h"
#include "util.hh"
#include "local-store.hh"
#include "globals.hh"
2014-12-09 12:16:27 +01:00
#include <stdlib.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <unistd.h>
#include <errno.h>
2009-09-24 09:39:55 +02:00
#include <stdio.h>
namespace nix {
static void makeWritable(const Path & path)
{
struct stat st;
if (lstat(path.c_str(), &st))
2014-08-20 17:00:17 +02:00
throw SysError(format("getting attributes of path %1%") % path);
if (chmod(path.c_str(), st.st_mode | S_IWUSR) == -1)
2014-08-20 17:00:17 +02:00
throw SysError(format("changing writability of %1%") % path);
}
struct MakeReadOnly
{
Path path;
MakeReadOnly(const Path & path) : path(path) { }
~MakeReadOnly()
{
try {
/* This will make the path read-only. */
if (path != "") canonicaliseTimestampAndPermissions(path);
} catch (...) {
ignoreException();
}
}
};
LocalStore::InodeHash LocalStore::loadInodeHash()
{
printMsg(lvlDebug, "loading hash inodes in memory");
InodeHash inodeHash;
AutoCloseDir dir = opendir(linksDir.c_str());
2014-08-20 17:00:17 +02:00
if (!dir) throw SysError(format("opening directory %1%") % linksDir);
struct dirent * dirent;
while (errno = 0, dirent = readdir(dir)) { /* sic */
checkInterrupt();
// We don't care if we hit non-hash files, anything goes
inodeHash.insert(dirent->d_ino);
}
2014-08-20 17:00:17 +02:00
if (errno) throw SysError(format("reading directory %1%") % linksDir);
2014-05-15 11:37:44 +02:00
printMsg(lvlTalkative, format("loaded %1% hash inodes") % inodeHash.size());
return inodeHash;
}
Strings LocalStore::readDirectoryIgnoringInodes(const Path & path, const InodeHash & inodeHash)
{
Strings names;
AutoCloseDir dir = opendir(path.c_str());
2014-08-20 17:00:17 +02:00
if (!dir) throw SysError(format("opening directory %1%") % path);
struct dirent * dirent;
while (errno = 0, dirent = readdir(dir)) { /* sic */
checkInterrupt();
if (inodeHash.count(dirent->d_ino)) {
2014-08-20 17:00:17 +02:00
printMsg(lvlDebug, format("%1% is already linked") % dirent->d_name);
continue;
}
string name = dirent->d_name;
if (name == "." || name == "..") continue;
names.push_back(name);
}
2014-08-20 17:00:17 +02:00
if (errno) throw SysError(format("reading directory %1%") % path);
return names;
}
void LocalStore::optimisePath_(OptimiseStats & stats, const Path & path, InodeHash & inodeHash)
{
checkInterrupt();
2014-05-15 11:19:16 +02:00
struct stat st;
if (lstat(path.c_str(), &st))
2014-08-20 17:00:17 +02:00
throw SysError(format("getting attributes of path %1%") % path);
if (S_ISDIR(st.st_mode)) {
Strings names = readDirectoryIgnoringInodes(path, inodeHash);
foreach (Strings::iterator, i, names)
optimisePath_(stats, path + "/" + *i, inodeHash);
return;
}
/* We can hard link regular files and maybe symlinks. */
if (!S_ISREG(st.st_mode)
#if CAN_LINK_SYMLINK
&& !S_ISLNK(st.st_mode)
#endif
) return;
/* Sometimes SNAFUs can cause files in the Nix store to be
modified, in particular when running programs as root under
NixOS (example: $fontconfig/var/cache being modified). Skip
those files. FIXME: check the modification time. */
if (S_ISREG(st.st_mode) && (st.st_mode & S_IWUSR)) {
2014-08-20 17:00:17 +02:00
printMsg(lvlError, format("skipping suspicious writable file %1%") % path);
return;
}
/* This can still happen on top-level files */
if (st.st_nlink > 1 && inodeHash.count(st.st_ino)) {
2014-08-20 17:00:17 +02:00
printMsg(lvlDebug, format("%1% is already linked, with %2% other file(s).") % path % (st.st_nlink - 2));
return;
}
/* Hash the file. Note that hashPath() returns the hash over the
NAR serialisation, which includes the execute bit on the file.
Thus, executable and non-executable files with the same
contents *won't* be linked (which is good because otherwise the
permissions would be screwed up).
Also note that if `path' is a symlink, then we're hashing the
contents of the symlink (i.e. the result of readlink()), not
the contents of the target (which may not even exist). */
Hash hash = hashPath(htSHA256, path).first;
2014-08-20 17:00:17 +02:00
printMsg(lvlDebug, format("%1% has hash %2%") % path % printHash(hash));
/* Check if this is a known hash. */
Path linkPath = linksDir + "/" + printHash32(hash);
if (!pathExists(linkPath)) {
/* Nope, create a hard link in the links directory. */
if (link(path.c_str(), linkPath.c_str()) == 0) {
inodeHash.insert(st.st_ino);
return;
2014-05-15 11:19:16 +02:00
}
if (errno != EEXIST)
2014-08-20 17:00:17 +02:00
throw SysError(format("cannot link %1% to %2%") % linkPath % path);
/* Fall through if another process created linkPath before
we did. */
}
/* Yes! We've seen a file with the same contents. Replace the
current file with a hard link to that file. */
struct stat stLink;
if (lstat(linkPath.c_str(), &stLink))
2014-08-20 17:00:17 +02:00
throw SysError(format("getting attributes of path %1%") % linkPath);
if (st.st_ino == stLink.st_ino) {
2014-08-20 17:00:17 +02:00
printMsg(lvlDebug, format("%1% is already linked to %2%") % path % linkPath);
return;
}
2014-08-20 17:00:17 +02:00
printMsg(lvlTalkative, format("linking %1% to %2%") % path % linkPath);
/* Make the containing directory writable, but only if it's not
the store itself (we don't want or need to mess with its
permissions). */
bool mustToggle = !isStorePath(path);
if (mustToggle) makeWritable(dirOf(path));
/* When we're done, make the directory read-only again and reset
its timestamp back to 0. */
MakeReadOnly makeReadOnly(mustToggle ? dirOf(path) : "");
Path tempLink = (format("%1%/.tmp-link-%2%-%3%")
% settings.nixStore % getpid() % rand()).str();
if (link(linkPath.c_str(), tempLink.c_str()) == -1) {
if (errno == EMLINK) {
/* Too many links to the same file (>= 32000 on most file
systems). This is likely to happen with empty files.
Just shrug and ignore. */
if (st.st_size)
2014-08-20 17:00:17 +02:00
printMsg(lvlInfo, format("%1% has maximum number of links") % linkPath);
return;
}
2014-08-20 17:00:17 +02:00
throw SysError(format("cannot link %1% to %2%") % tempLink % linkPath);
}
/* Atomically replace the old file with the new hard link. */
if (rename(tempLink.c_str(), path.c_str()) == -1) {
if (unlink(tempLink.c_str()) == -1)
2014-08-20 17:00:17 +02:00
printMsg(lvlError, format("unable to unlink %1%") % tempLink);
if (errno == EMLINK) {
/* Some filesystems generate too many links on the rename,
rather than on the original link. (Probably it
temporarily increases the st_nlink field before
decreasing it again.) */
if (st.st_size)
2014-08-20 17:00:17 +02:00
printMsg(lvlInfo, format("%1% has maximum number of links") % linkPath);
return;
}
2014-08-20 17:00:17 +02:00
throw SysError(format("cannot rename %1% to %2%") % tempLink % path);
}
stats.filesLinked++;
stats.bytesFreed += st.st_size;
stats.blocksFreed += st.st_blocks;
}
void LocalStore::optimiseStore(OptimiseStats & stats)
{
PathSet paths = queryAllValidPaths();
InodeHash inodeHash = loadInodeHash();
2009-04-21 13:52:16 +02:00
foreach (PathSet::iterator, i, paths) {
addTempRoot(*i);
if (!isValidPath(*i)) continue; /* path was GC'ed, probably */
2014-08-20 17:00:17 +02:00
startNest(nest, lvlChatty, format("hashing files in %1%") % *i);
optimisePath_(stats, *i, inodeHash);
}
}
static string showBytes(unsigned long long bytes)
{
return (format("%.2f MiB") % (bytes / (1024.0 * 1024.0))).str();
}
void LocalStore::optimiseStore()
{
OptimiseStats stats;
optimiseStore(stats);
printMsg(lvlError,
format("%1% freed by hard-linking %2% files")
% showBytes(stats.bytesFreed)
% stats.filesLinked);
}
void LocalStore::optimisePath(const Path & path)
{
OptimiseStats stats;
InodeHash inodeHash;
if (settings.autoOptimiseStore) optimisePath_(stats, path, inodeHash);
}
}