From da1e4fdfb54e0a69dd145180cae1eb7a0afd1b26 Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Thu, 14 Sep 2017 14:38:36 +0200 Subject: nix-store -q --roots / --gc --print-roots: Print temporary / in-memory roots For example, $ nix-store -q --roots /nix/store/7phd2sav7068nivgvmj2vpm3v47fd27l-patchelf-0.8pre845_0315148 {temp:1} denotes that the path is only being kept alive by a temporary root (i.e. /nix/var/nix/temproots/). Similarly, $ nix-store --gc --print-roots ... {memory:9} -> /nix/store/094gpjn9f15ip17wzxhma4r51nvsj17p-curl-7.53.1 shows that curl is being used by some process. --- src/libstore/gc.cc | 57 +++++++++++++++++++++++++++++---------------- src/libstore/local-store.hh | 6 +++-- 2 files changed, 41 insertions(+), 22 deletions(-) (limited to 'src') diff --git a/src/libstore/gc.cc b/src/libstore/gc.cc index 45f28c328a5e..fbc96f583efc 100644 --- a/src/libstore/gc.cc +++ b/src/libstore/gc.cc @@ -196,8 +196,10 @@ void LocalStore::addTempRoot(const Path & path) } -void LocalStore::readTempRoots(PathSet & tempRoots, FDs & fds) +PathSet LocalStore::readTempRoots(FDs & fds) { + PathSet tempRoots; + /* Read the `temproots' directory for per-process temporary root files. */ DirEntries tempRootFiles = readDirectory(tempRootsDir); @@ -253,6 +255,8 @@ void LocalStore::readTempRoots(PathSet & tempRoots, FDs & fds) fds.push_back(fd); /* keep open */ } + + return tempRoots; } @@ -316,7 +320,7 @@ void LocalStore::findRoots(const Path & path, unsigned char type, Roots & roots) } -Roots LocalStore::findRoots() +Roots LocalStore::findRootsNoTemp() { Roots roots; @@ -326,6 +330,27 @@ Roots LocalStore::findRoots() findRoots(stateDir + "/manifests", DT_UNKNOWN, roots); findRoots(stateDir + "/profiles", DT_UNKNOWN, roots); + /* Add additional roots returned by the program specified by the + NIX_ROOT_FINDER environment variable. This is typically used + to add running programs to the set of roots (to prevent them + from being garbage collected). */ + size_t n = 0; + for (auto & root : findRuntimeRoots()) + roots[fmt("{memory:%d}", n++)] = root; + + return roots; +} + + +Roots LocalStore::findRoots() +{ + Roots roots = findRootsNoTemp(); + + FDs fds; + size_t n = 0; + for (auto & root : readTempRoots(fds)) + roots[fmt("{temp:%d}", n++)] = root; + return roots; } @@ -369,8 +394,9 @@ static void readFileRoots(const char * path, StringSet & paths) } } -void LocalStore::findRuntimeRoots(PathSet & roots) +PathSet LocalStore::findRuntimeRoots() { + PathSet roots; StringSet paths; auto procDir = AutoCloseDir{opendir("/proc")}; if (procDir) { @@ -454,6 +480,8 @@ void LocalStore::findRuntimeRoots(PathSet & roots) roots.insert(path); } } + + return roots; } @@ -554,17 +582,13 @@ void LocalStore::deletePathRecursive(GCState & state, const Path & path) bool LocalStore::canReachRoot(GCState & state, PathSet & visited, const Path & path) { - if (visited.find(path) != visited.end()) return false; + if (visited.count(path)) return false; - if (state.alive.find(path) != state.alive.end()) { - return true; - } + if (state.alive.count(path)) return true; - if (state.dead.find(path) != state.dead.end()) { - return false; - } + if (state.dead.count(path)) return false; - if (state.roots.find(path) != state.roots.end()) { + if (state.roots.count(path)) { debug(format("cannot delete '%1%' because it's a root") % path); state.alive.insert(path); return true; @@ -724,22 +748,15 @@ void LocalStore::collectGarbage(const GCOptions & options, GCResults & results) /* Find the roots. Since we've grabbed the GC lock, the set of permanent roots cannot increase now. */ printError(format("finding garbage collector roots...")); - Roots rootMap = options.ignoreLiveness ? Roots() : findRoots(); + Roots rootMap = options.ignoreLiveness ? Roots() : findRootsNoTemp(); for (auto & i : rootMap) state.roots.insert(i.second); - /* Add additional roots returned by the program specified by the - NIX_ROOT_FINDER environment variable. This is typically used - to add running programs to the set of roots (to prevent them - from being garbage collected). */ - if (!options.ignoreLiveness) - findRuntimeRoots(state.roots); - /* Read the temporary roots. This acquires read locks on all per-process temporary root files. So after this point no paths can be added to the set of temporary roots. */ FDs fds; - readTempRoots(state.tempRoots, fds); + state.tempRoots = readTempRoots(fds); state.roots.insert(state.tempRoots.begin(), state.tempRoots.end()); /* After this point the set of roots or temporary roots cannot diff --git a/src/libstore/local-store.hh b/src/libstore/local-store.hh index 4973bd9a9849..62a11a94a5e4 100644 --- a/src/libstore/local-store.hh +++ b/src/libstore/local-store.hh @@ -176,7 +176,7 @@ private: typedef std::shared_ptr FDPtr; typedef list FDs; - void readTempRoots(PathSet & tempRoots, FDs & fds); + PathSet readTempRoots(FDs & fds); public: @@ -261,7 +261,9 @@ private: void findRoots(const Path & path, unsigned char type, Roots & roots); - void findRuntimeRoots(PathSet & roots); + Roots findRootsNoTemp(); + + PathSet findRuntimeRoots(); void removeUnusedLinks(const GCState & state); -- cgit 1.4.1