| 1 | /*------------------------------------------------------------------------- |
| 2 | * |
| 3 | * fd.c |
| 4 | * Virtual file descriptor code. |
| 5 | * |
| 6 | * Portions Copyright (c) 1996-2019, PostgreSQL Global Development Group |
| 7 | * Portions Copyright (c) 1994, Regents of the University of California |
| 8 | * |
| 9 | * IDENTIFICATION |
| 10 | * src/backend/storage/file/fd.c |
| 11 | * |
| 12 | * NOTES: |
| 13 | * |
| 14 | * This code manages a cache of 'virtual' file descriptors (VFDs). |
| 15 | * The server opens many file descriptors for a variety of reasons, |
| 16 | * including base tables, scratch files (e.g., sort and hash spool |
| 17 | * files), and random calls to C library routines like system(3); it |
| 18 | * is quite easy to exceed system limits on the number of open files a |
| 19 | * single process can have. (This is around 1024 on many modern |
| 20 | * operating systems, but may be lower on others.) |
| 21 | * |
| 22 | * VFDs are managed as an LRU pool, with actual OS file descriptors |
| 23 | * being opened and closed as needed. Obviously, if a routine is |
| 24 | * opened using these interfaces, all subsequent operations must also |
| 25 | * be through these interfaces (the File type is not a real file |
| 26 | * descriptor). |
| 27 | * |
| 28 | * For this scheme to work, most (if not all) routines throughout the |
| 29 | * server should use these interfaces instead of calling the C library |
| 30 | * routines (e.g., open(2) and fopen(3)) themselves. Otherwise, we |
| 31 | * may find ourselves short of real file descriptors anyway. |
| 32 | * |
| 33 | * INTERFACE ROUTINES |
| 34 | * |
| 35 | * PathNameOpenFile and OpenTemporaryFile are used to open virtual files. |
| 36 | * A File opened with OpenTemporaryFile is automatically deleted when the |
| 37 | * File is closed, either explicitly or implicitly at end of transaction or |
| 38 | * process exit. PathNameOpenFile is intended for files that are held open |
| 39 | * for a long time, like relation files. It is the caller's responsibility |
| 40 | * to close them, there is no automatic mechanism in fd.c for that. |
| 41 | * |
| 42 | * PathName(Create|Open|Delete)Temporary(File|Dir) are used to manage |
| 43 | * temporary files that have names so that they can be shared between |
| 44 | * backends. Such files are automatically closed and count against the |
| 45 | * temporary file limit of the backend that creates them, but unlike anonymous |
| 46 | * files they are not automatically deleted. See sharedfileset.c for a shared |
| 47 | * ownership mechanism that provides automatic cleanup for shared files when |
| 48 | * the last of a group of backends detaches. |
| 49 | * |
| 50 | * AllocateFile, AllocateDir, OpenPipeStream and OpenTransientFile are |
| 51 | * wrappers around fopen(3), opendir(3), popen(3) and open(2), respectively. |
| 52 | * They behave like the corresponding native functions, except that the handle |
| 53 | * is registered with the current subtransaction, and will be automatically |
| 54 | * closed at abort. These are intended mainly for short operations like |
| 55 | * reading a configuration file; there is a limit on the number of files that |
| 56 | * can be opened using these functions at any one time. |
| 57 | * |
| 58 | * Finally, BasicOpenFile is just a thin wrapper around open() that can |
| 59 | * release file descriptors in use by the virtual file descriptors if |
| 60 | * necessary. There is no automatic cleanup of file descriptors returned by |
| 61 | * BasicOpenFile, it is solely the caller's responsibility to close the file |
| 62 | * descriptor by calling close(2). |
| 63 | * |
| 64 | *------------------------------------------------------------------------- |
| 65 | */ |
| 66 | |
| 67 | #include "postgres.h" |
| 68 | |
| 69 | #include <sys/file.h> |
| 70 | #include <sys/param.h> |
| 71 | #include <sys/stat.h> |
| 72 | #ifndef WIN32 |
| 73 | #include <sys/mman.h> |
| 74 | #endif |
| 75 | #include <limits.h> |
| 76 | #include <unistd.h> |
| 77 | #include <fcntl.h> |
| 78 | #ifdef HAVE_SYS_RESOURCE_H |
| 79 | #include <sys/resource.h> /* for getrlimit */ |
| 80 | #endif |
| 81 | |
| 82 | #include "miscadmin.h" |
| 83 | #include "access/xact.h" |
| 84 | #include "access/xlog.h" |
| 85 | #include "catalog/pg_tablespace.h" |
| 86 | #include "common/file_perm.h" |
| 87 | #include "pgstat.h" |
| 88 | #include "portability/mem.h" |
| 89 | #include "storage/fd.h" |
| 90 | #include "storage/ipc.h" |
| 91 | #include "utils/guc.h" |
| 92 | #include "utils/resowner_private.h" |
| 93 | |
| 94 | |
| 95 | /* Define PG_FLUSH_DATA_WORKS if we have an implementation for pg_flush_data */ |
| 96 | #if defined(HAVE_SYNC_FILE_RANGE) |
| 97 | #define PG_FLUSH_DATA_WORKS 1 |
| 98 | #elif !defined(WIN32) && defined(MS_ASYNC) |
| 99 | #define PG_FLUSH_DATA_WORKS 1 |
| 100 | #elif defined(USE_POSIX_FADVISE) && defined(POSIX_FADV_DONTNEED) |
| 101 | #define PG_FLUSH_DATA_WORKS 1 |
| 102 | #endif |
| 103 | |
| 104 | /* |
| 105 | * We must leave some file descriptors free for system(), the dynamic loader, |
| 106 | * and other code that tries to open files without consulting fd.c. This |
| 107 | * is the number left free. (While we can be pretty sure we won't get |
| 108 | * EMFILE, there's never any guarantee that we won't get ENFILE due to |
| 109 | * other processes chewing up FDs. So it's a bad idea to try to open files |
| 110 | * without consulting fd.c. Nonetheless we cannot control all code.) |
| 111 | * |
| 112 | * Because this is just a fixed setting, we are effectively assuming that |
| 113 | * no such code will leave FDs open over the long term; otherwise the slop |
| 114 | * is likely to be insufficient. Note in particular that we expect that |
| 115 | * loading a shared library does not result in any permanent increase in |
| 116 | * the number of open files. (This appears to be true on most if not |
| 117 | * all platforms as of Feb 2004.) |
| 118 | */ |
| 119 | #define NUM_RESERVED_FDS 10 |
| 120 | |
| 121 | /* |
| 122 | * If we have fewer than this many usable FDs after allowing for the reserved |
| 123 | * ones, choke. |
| 124 | */ |
| 125 | #define FD_MINFREE 10 |
| 126 | |
| 127 | /* |
| 128 | * A number of platforms allow individual processes to open many more files |
| 129 | * than they can really support when *many* processes do the same thing. |
| 130 | * This GUC parameter lets the DBA limit max_safe_fds to something less than |
| 131 | * what the postmaster's initial probe suggests will work. |
| 132 | */ |
| 133 | int max_files_per_process = 1000; |
| 134 | |
| 135 | /* |
| 136 | * Maximum number of file descriptors to open for either VFD entries or |
| 137 | * AllocateFile/AllocateDir/OpenTransientFile operations. This is initialized |
| 138 | * to a conservative value, and remains that way indefinitely in bootstrap or |
| 139 | * standalone-backend cases. In normal postmaster operation, the postmaster |
| 140 | * calls set_max_safe_fds() late in initialization to update the value, and |
| 141 | * that value is then inherited by forked subprocesses. |
| 142 | * |
| 143 | * Note: the value of max_files_per_process is taken into account while |
| 144 | * setting this variable, and so need not be tested separately. |
| 145 | */ |
| 146 | int max_safe_fds = 32; /* default if not changed */ |
| 147 | |
| 148 | /* Whether it is safe to continue running after fsync() fails. */ |
| 149 | bool data_sync_retry = false; |
| 150 | |
| 151 | /* Debugging.... */ |
| 152 | |
| 153 | #ifdef FDDEBUG |
| 154 | #define DO_DB(A) \ |
| 155 | do { \ |
| 156 | int _do_db_save_errno = errno; \ |
| 157 | A; \ |
| 158 | errno = _do_db_save_errno; \ |
| 159 | } while (0) |
| 160 | #else |
| 161 | #define DO_DB(A) \ |
| 162 | ((void) 0) |
| 163 | #endif |
| 164 | |
| 165 | #define VFD_CLOSED (-1) |
| 166 | |
| 167 | #define FileIsValid(file) \ |
| 168 | ((file) > 0 && (file) < (int) SizeVfdCache && VfdCache[file].fileName != NULL) |
| 169 | |
| 170 | #define FileIsNotOpen(file) (VfdCache[file].fd == VFD_CLOSED) |
| 171 | |
| 172 | /* these are the assigned bits in fdstate below: */ |
| 173 | #define FD_DELETE_AT_CLOSE (1 << 0) /* T = delete when closed */ |
| 174 | #define FD_CLOSE_AT_EOXACT (1 << 1) /* T = close at eoXact */ |
| 175 | #define FD_TEMP_FILE_LIMIT (1 << 2) /* T = respect temp_file_limit */ |
| 176 | |
| 177 | typedef struct vfd |
| 178 | { |
| 179 | int fd; /* current FD, or VFD_CLOSED if none */ |
| 180 | unsigned short fdstate; /* bitflags for VFD's state */ |
| 181 | ResourceOwner resowner; /* owner, for automatic cleanup */ |
| 182 | File nextFree; /* link to next free VFD, if in freelist */ |
| 183 | File lruMoreRecently; /* doubly linked recency-of-use list */ |
| 184 | File lruLessRecently; |
| 185 | off_t fileSize; /* current size of file (0 if not temporary) */ |
| 186 | char *fileName; /* name of file, or NULL for unused VFD */ |
| 187 | /* NB: fileName is malloc'd, and must be free'd when closing the VFD */ |
| 188 | int fileFlags; /* open(2) flags for (re)opening the file */ |
| 189 | mode_t fileMode; /* mode to pass to open(2) */ |
| 190 | } Vfd; |
| 191 | |
| 192 | /* |
| 193 | * Virtual File Descriptor array pointer and size. This grows as |
| 194 | * needed. 'File' values are indexes into this array. |
| 195 | * Note that VfdCache[0] is not a usable VFD, just a list header. |
| 196 | */ |
| 197 | static Vfd *VfdCache; |
| 198 | static Size SizeVfdCache = 0; |
| 199 | |
| 200 | /* |
| 201 | * Number of file descriptors known to be in use by VFD entries. |
| 202 | */ |
| 203 | static int nfile = 0; |
| 204 | |
| 205 | /* |
| 206 | * Flag to tell whether it's worth scanning VfdCache looking for temp files |
| 207 | * to close |
| 208 | */ |
| 209 | static bool have_xact_temporary_files = false; |
| 210 | |
| 211 | /* |
| 212 | * Tracks the total size of all temporary files. Note: when temp_file_limit |
| 213 | * is being enforced, this cannot overflow since the limit cannot be more |
| 214 | * than INT_MAX kilobytes. When not enforcing, it could theoretically |
| 215 | * overflow, but we don't care. |
| 216 | */ |
| 217 | static uint64 temporary_files_size = 0; |
| 218 | |
| 219 | /* |
| 220 | * List of OS handles opened with AllocateFile, AllocateDir and |
| 221 | * OpenTransientFile. |
| 222 | */ |
| 223 | typedef enum |
| 224 | { |
| 225 | AllocateDescFile, |
| 226 | AllocateDescPipe, |
| 227 | AllocateDescDir, |
| 228 | AllocateDescRawFD |
| 229 | } AllocateDescKind; |
| 230 | |
| 231 | typedef struct |
| 232 | { |
| 233 | AllocateDescKind kind; |
| 234 | SubTransactionId create_subid; |
| 235 | union |
| 236 | { |
| 237 | FILE *file; |
| 238 | DIR *dir; |
| 239 | int fd; |
| 240 | } desc; |
| 241 | } AllocateDesc; |
| 242 | |
| 243 | static int numAllocatedDescs = 0; |
| 244 | static int maxAllocatedDescs = 0; |
| 245 | static AllocateDesc *allocatedDescs = NULL; |
| 246 | |
| 247 | /* |
| 248 | * Number of temporary files opened during the current session; |
| 249 | * this is used in generation of tempfile names. |
| 250 | */ |
| 251 | static long tempFileCounter = 0; |
| 252 | |
| 253 | /* |
| 254 | * Array of OIDs of temp tablespaces. When numTempTableSpaces is -1, |
| 255 | * this has not been set in the current transaction. |
| 256 | */ |
| 257 | static Oid *tempTableSpaces = NULL; |
| 258 | static int numTempTableSpaces = -1; |
| 259 | static int nextTempTableSpace = 0; |
| 260 | |
| 261 | |
| 262 | /*-------------------- |
| 263 | * |
| 264 | * Private Routines |
| 265 | * |
| 266 | * Delete - delete a file from the Lru ring |
| 267 | * LruDelete - remove a file from the Lru ring and close its FD |
| 268 | * Insert - put a file at the front of the Lru ring |
| 269 | * LruInsert - put a file at the front of the Lru ring and open it |
| 270 | * ReleaseLruFile - Release an fd by closing the last entry in the Lru ring |
| 271 | * ReleaseLruFiles - Release fd(s) until we're under the max_safe_fds limit |
| 272 | * AllocateVfd - grab a free (or new) file record (from VfdArray) |
| 273 | * FreeVfd - free a file record |
| 274 | * |
| 275 | * The Least Recently Used ring is a doubly linked list that begins and |
| 276 | * ends on element zero. Element zero is special -- it doesn't represent |
| 277 | * a file and its "fd" field always == VFD_CLOSED. Element zero is just an |
| 278 | * anchor that shows us the beginning/end of the ring. |
| 279 | * Only VFD elements that are currently really open (have an FD assigned) are |
| 280 | * in the Lru ring. Elements that are "virtually" open can be recognized |
| 281 | * by having a non-null fileName field. |
| 282 | * |
| 283 | * example: |
| 284 | * |
| 285 | * /--less----\ /---------\ |
| 286 | * v \ v \ |
| 287 | * #0 --more---> LeastRecentlyUsed --more-\ \ |
| 288 | * ^\ | | |
| 289 | * \\less--> MostRecentlyUsedFile <---/ | |
| 290 | * \more---/ \--less--/ |
| 291 | * |
| 292 | *-------------------- |
| 293 | */ |
| 294 | static void Delete(File file); |
| 295 | static void LruDelete(File file); |
| 296 | static void Insert(File file); |
| 297 | static int LruInsert(File file); |
| 298 | static bool ReleaseLruFile(void); |
| 299 | static void ReleaseLruFiles(void); |
| 300 | static File AllocateVfd(void); |
| 301 | static void FreeVfd(File file); |
| 302 | |
| 303 | static int FileAccess(File file); |
| 304 | static File OpenTemporaryFileInTablespace(Oid tblspcOid, bool rejectError); |
| 305 | static bool reserveAllocatedDesc(void); |
| 306 | static int FreeDesc(AllocateDesc *desc); |
| 307 | |
| 308 | static void AtProcExit_Files(int code, Datum arg); |
| 309 | static void CleanupTempFiles(bool isCommit, bool isProcExit); |
| 310 | static void RemovePgTempFilesInDir(const char *tmpdirname, bool missing_ok, |
| 311 | bool unlink_all); |
| 312 | static void RemovePgTempRelationFiles(const char *tsdirname); |
| 313 | static void RemovePgTempRelationFilesInDbspace(const char *dbspacedirname); |
| 314 | |
| 315 | static void walkdir(const char *path, |
| 316 | void (*action) (const char *fname, bool isdir, int elevel), |
| 317 | bool process_symlinks, |
| 318 | int elevel); |
| 319 | #ifdef PG_FLUSH_DATA_WORKS |
| 320 | static void pre_sync_fname(const char *fname, bool isdir, int elevel); |
| 321 | #endif |
| 322 | static void datadir_fsync_fname(const char *fname, bool isdir, int elevel); |
| 323 | static void unlink_if_exists_fname(const char *fname, bool isdir, int elevel); |
| 324 | |
| 325 | static int fsync_fname_ext(const char *fname, bool isdir, bool ignore_perm, int elevel); |
| 326 | static int fsync_parent_path(const char *fname, int elevel); |
| 327 | |
| 328 | |
| 329 | /* |
| 330 | * pg_fsync --- do fsync with or without writethrough |
| 331 | */ |
| 332 | int |
| 333 | pg_fsync(int fd) |
| 334 | { |
| 335 | /* #if is to skip the sync_method test if there's no need for it */ |
| 336 | #if defined(HAVE_FSYNC_WRITETHROUGH) && !defined(FSYNC_WRITETHROUGH_IS_FSYNC) |
| 337 | if (sync_method == SYNC_METHOD_FSYNC_WRITETHROUGH) |
| 338 | return pg_fsync_writethrough(fd); |
| 339 | else |
| 340 | #endif |
| 341 | return pg_fsync_no_writethrough(fd); |
| 342 | } |
| 343 | |
| 344 | |
| 345 | /* |
| 346 | * pg_fsync_no_writethrough --- same as fsync except does nothing if |
| 347 | * enableFsync is off |
| 348 | */ |
| 349 | int |
| 350 | pg_fsync_no_writethrough(int fd) |
| 351 | { |
| 352 | if (enableFsync) |
| 353 | return fsync(fd); |
| 354 | else |
| 355 | return 0; |
| 356 | } |
| 357 | |
| 358 | /* |
| 359 | * pg_fsync_writethrough |
| 360 | */ |
| 361 | int |
| 362 | pg_fsync_writethrough(int fd) |
| 363 | { |
| 364 | if (enableFsync) |
| 365 | { |
| 366 | #ifdef WIN32 |
| 367 | return _commit(fd); |
| 368 | #elif defined(F_FULLFSYNC) |
| 369 | return (fcntl(fd, F_FULLFSYNC, 0) == -1) ? -1 : 0; |
| 370 | #else |
| 371 | errno = ENOSYS; |
| 372 | return -1; |
| 373 | #endif |
| 374 | } |
| 375 | else |
| 376 | return 0; |
| 377 | } |
| 378 | |
| 379 | /* |
| 380 | * pg_fdatasync --- same as fdatasync except does nothing if enableFsync is off |
| 381 | * |
| 382 | * Not all platforms have fdatasync; treat as fsync if not available. |
| 383 | */ |
| 384 | int |
| 385 | pg_fdatasync(int fd) |
| 386 | { |
| 387 | if (enableFsync) |
| 388 | { |
| 389 | #ifdef HAVE_FDATASYNC |
| 390 | return fdatasync(fd); |
| 391 | #else |
| 392 | return fsync(fd); |
| 393 | #endif |
| 394 | } |
| 395 | else |
| 396 | return 0; |
| 397 | } |
| 398 | |
| 399 | /* |
| 400 | * pg_flush_data --- advise OS that the described dirty data should be flushed |
| 401 | * |
| 402 | * offset of 0 with nbytes 0 means that the entire file should be flushed |
| 403 | */ |
| 404 | void |
| 405 | pg_flush_data(int fd, off_t offset, off_t nbytes) |
| 406 | { |
| 407 | /* |
| 408 | * Right now file flushing is primarily used to avoid making later |
| 409 | * fsync()/fdatasync() calls have less impact. Thus don't trigger flushes |
| 410 | * if fsyncs are disabled - that's a decision we might want to make |
| 411 | * configurable at some point. |
| 412 | */ |
| 413 | if (!enableFsync) |
| 414 | return; |
| 415 | |
| 416 | /* |
| 417 | * We compile all alternatives that are supported on the current platform, |
| 418 | * to find portability problems more easily. |
| 419 | */ |
| 420 | #if defined(HAVE_SYNC_FILE_RANGE) |
| 421 | { |
| 422 | int rc; |
| 423 | static bool not_implemented_by_kernel = false; |
| 424 | |
| 425 | if (not_implemented_by_kernel) |
| 426 | return; |
| 427 | |
| 428 | /* |
| 429 | * sync_file_range(SYNC_FILE_RANGE_WRITE), currently linux specific, |
| 430 | * tells the OS that writeback for the specified blocks should be |
| 431 | * started, but that we don't want to wait for completion. Note that |
| 432 | * this call might block if too much dirty data exists in the range. |
| 433 | * This is the preferable method on OSs supporting it, as it works |
| 434 | * reliably when available (contrast to msync()) and doesn't flush out |
| 435 | * clean data (like FADV_DONTNEED). |
| 436 | */ |
| 437 | rc = sync_file_range(fd, offset, nbytes, |
| 438 | SYNC_FILE_RANGE_WRITE); |
| 439 | if (rc != 0) |
| 440 | { |
| 441 | int elevel; |
| 442 | |
| 443 | /* |
| 444 | * For systems that don't have an implementation of |
| 445 | * sync_file_range() such as Windows WSL, generate only one |
| 446 | * warning and then suppress all further attempts by this process. |
| 447 | */ |
| 448 | if (errno == ENOSYS) |
| 449 | { |
| 450 | elevel = WARNING; |
| 451 | not_implemented_by_kernel = true; |
| 452 | } |
| 453 | else |
| 454 | elevel = data_sync_elevel(WARNING); |
| 455 | |
| 456 | ereport(elevel, |
| 457 | (errcode_for_file_access(), |
| 458 | errmsg("could not flush dirty data: %m" ))); |
| 459 | } |
| 460 | |
| 461 | return; |
| 462 | } |
| 463 | #endif |
| 464 | #if !defined(WIN32) && defined(MS_ASYNC) |
| 465 | { |
| 466 | void *p; |
| 467 | static int pagesize = 0; |
| 468 | |
| 469 | /* |
| 470 | * On several OSs msync(MS_ASYNC) on a mmap'ed file triggers |
| 471 | * writeback. On linux it only does so if MS_SYNC is specified, but |
| 472 | * then it does the writeback synchronously. Luckily all common linux |
| 473 | * systems have sync_file_range(). This is preferable over |
| 474 | * FADV_DONTNEED because it doesn't flush out clean data. |
| 475 | * |
| 476 | * We map the file (mmap()), tell the kernel to sync back the contents |
| 477 | * (msync()), and then remove the mapping again (munmap()). |
| 478 | */ |
| 479 | |
| 480 | /* mmap() needs actual length if we want to map whole file */ |
| 481 | if (offset == 0 && nbytes == 0) |
| 482 | { |
| 483 | nbytes = lseek(fd, 0, SEEK_END); |
| 484 | if (nbytes < 0) |
| 485 | { |
| 486 | ereport(WARNING, |
| 487 | (errcode_for_file_access(), |
| 488 | errmsg("could not determine dirty data size: %m" ))); |
| 489 | return; |
| 490 | } |
| 491 | } |
| 492 | |
| 493 | /* |
| 494 | * Some platforms reject partial-page mmap() attempts. To deal with |
| 495 | * that, just truncate the request to a page boundary. If any extra |
| 496 | * bytes don't get flushed, well, it's only a hint anyway. |
| 497 | */ |
| 498 | |
| 499 | /* fetch pagesize only once */ |
| 500 | if (pagesize == 0) |
| 501 | pagesize = sysconf(_SC_PAGESIZE); |
| 502 | |
| 503 | /* align length to pagesize, dropping any fractional page */ |
| 504 | if (pagesize > 0) |
| 505 | nbytes = (nbytes / pagesize) * pagesize; |
| 506 | |
| 507 | /* fractional-page request is a no-op */ |
| 508 | if (nbytes <= 0) |
| 509 | return; |
| 510 | |
| 511 | /* |
| 512 | * mmap could well fail, particularly on 32-bit platforms where there |
| 513 | * may simply not be enough address space. If so, silently fall |
| 514 | * through to the next implementation. |
| 515 | */ |
| 516 | if (nbytes <= (off_t) SSIZE_MAX) |
| 517 | p = mmap(NULL, nbytes, PROT_READ, MAP_SHARED, fd, offset); |
| 518 | else |
| 519 | p = MAP_FAILED; |
| 520 | |
| 521 | if (p != MAP_FAILED) |
| 522 | { |
| 523 | int rc; |
| 524 | |
| 525 | rc = msync(p, (size_t) nbytes, MS_ASYNC); |
| 526 | if (rc != 0) |
| 527 | { |
| 528 | ereport(data_sync_elevel(WARNING), |
| 529 | (errcode_for_file_access(), |
| 530 | errmsg("could not flush dirty data: %m" ))); |
| 531 | /* NB: need to fall through to munmap()! */ |
| 532 | } |
| 533 | |
| 534 | rc = munmap(p, (size_t) nbytes); |
| 535 | if (rc != 0) |
| 536 | { |
| 537 | /* FATAL error because mapping would remain */ |
| 538 | ereport(FATAL, |
| 539 | (errcode_for_file_access(), |
| 540 | errmsg("could not munmap() while flushing data: %m" ))); |
| 541 | } |
| 542 | |
| 543 | return; |
| 544 | } |
| 545 | } |
| 546 | #endif |
| 547 | #if defined(USE_POSIX_FADVISE) && defined(POSIX_FADV_DONTNEED) |
| 548 | { |
| 549 | int rc; |
| 550 | |
| 551 | /* |
| 552 | * Signal the kernel that the passed in range should not be cached |
| 553 | * anymore. This has the, desired, side effect of writing out dirty |
| 554 | * data, and the, undesired, side effect of likely discarding useful |
| 555 | * clean cached blocks. For the latter reason this is the least |
| 556 | * preferable method. |
| 557 | */ |
| 558 | |
| 559 | rc = posix_fadvise(fd, offset, nbytes, POSIX_FADV_DONTNEED); |
| 560 | |
| 561 | if (rc != 0) |
| 562 | { |
| 563 | /* don't error out, this is just a performance optimization */ |
| 564 | ereport(WARNING, |
| 565 | (errcode_for_file_access(), |
| 566 | errmsg("could not flush dirty data: %m" ))); |
| 567 | } |
| 568 | |
| 569 | return; |
| 570 | } |
| 571 | #endif |
| 572 | } |
| 573 | |
| 574 | |
| 575 | /* |
| 576 | * fsync_fname -- fsync a file or directory, handling errors properly |
| 577 | * |
| 578 | * Try to fsync a file or directory. When doing the latter, ignore errors that |
| 579 | * indicate the OS just doesn't allow/require fsyncing directories. |
| 580 | */ |
| 581 | void |
| 582 | fsync_fname(const char *fname, bool isdir) |
| 583 | { |
| 584 | fsync_fname_ext(fname, isdir, false, data_sync_elevel(ERROR)); |
| 585 | } |
| 586 | |
| 587 | /* |
| 588 | * durable_rename -- rename(2) wrapper, issuing fsyncs required for durability |
| 589 | * |
| 590 | * This routine ensures that, after returning, the effect of renaming file |
| 591 | * persists in case of a crash. A crash while this routine is running will |
| 592 | * leave you with either the pre-existing or the moved file in place of the |
| 593 | * new file; no mixed state or truncated files are possible. |
| 594 | * |
| 595 | * It does so by using fsync on the old filename and the possibly existing |
| 596 | * target filename before the rename, and the target file and directory after. |
| 597 | * |
| 598 | * Note that rename() cannot be used across arbitrary directories, as they |
| 599 | * might not be on the same filesystem. Therefore this routine does not |
| 600 | * support renaming across directories. |
| 601 | * |
| 602 | * Log errors with the caller specified severity. |
| 603 | * |
| 604 | * Returns 0 if the operation succeeded, -1 otherwise. Note that errno is not |
| 605 | * valid upon return. |
| 606 | */ |
| 607 | int |
| 608 | durable_rename(const char *oldfile, const char *newfile, int elevel) |
| 609 | { |
| 610 | int fd; |
| 611 | |
| 612 | /* |
| 613 | * First fsync the old and target path (if it exists), to ensure that they |
| 614 | * are properly persistent on disk. Syncing the target file is not |
| 615 | * strictly necessary, but it makes it easier to reason about crashes; |
| 616 | * because it's then guaranteed that either source or target file exists |
| 617 | * after a crash. |
| 618 | */ |
| 619 | if (fsync_fname_ext(oldfile, false, false, elevel) != 0) |
| 620 | return -1; |
| 621 | |
| 622 | fd = OpenTransientFile(newfile, PG_BINARY | O_RDWR); |
| 623 | if (fd < 0) |
| 624 | { |
| 625 | if (errno != ENOENT) |
| 626 | { |
| 627 | ereport(elevel, |
| 628 | (errcode_for_file_access(), |
| 629 | errmsg("could not open file \"%s\": %m" , newfile))); |
| 630 | return -1; |
| 631 | } |
| 632 | } |
| 633 | else |
| 634 | { |
| 635 | if (pg_fsync(fd) != 0) |
| 636 | { |
| 637 | int save_errno; |
| 638 | |
| 639 | /* close file upon error, might not be in transaction context */ |
| 640 | save_errno = errno; |
| 641 | CloseTransientFile(fd); |
| 642 | errno = save_errno; |
| 643 | |
| 644 | ereport(elevel, |
| 645 | (errcode_for_file_access(), |
| 646 | errmsg("could not fsync file \"%s\": %m" , newfile))); |
| 647 | return -1; |
| 648 | } |
| 649 | |
| 650 | if (CloseTransientFile(fd)) |
| 651 | { |
| 652 | ereport(elevel, |
| 653 | (errcode_for_file_access(), |
| 654 | errmsg("could not close file \"%s\": %m" , newfile))); |
| 655 | return -1; |
| 656 | } |
| 657 | } |
| 658 | |
| 659 | /* Time to do the real deal... */ |
| 660 | if (rename(oldfile, newfile) < 0) |
| 661 | { |
| 662 | ereport(elevel, |
| 663 | (errcode_for_file_access(), |
| 664 | errmsg("could not rename file \"%s\" to \"%s\": %m" , |
| 665 | oldfile, newfile))); |
| 666 | return -1; |
| 667 | } |
| 668 | |
| 669 | /* |
| 670 | * To guarantee renaming the file is persistent, fsync the file with its |
| 671 | * new name, and its containing directory. |
| 672 | */ |
| 673 | if (fsync_fname_ext(newfile, false, false, elevel) != 0) |
| 674 | return -1; |
| 675 | |
| 676 | if (fsync_parent_path(newfile, elevel) != 0) |
| 677 | return -1; |
| 678 | |
| 679 | return 0; |
| 680 | } |
| 681 | |
| 682 | /* |
| 683 | * durable_unlink -- remove a file in a durable manner |
| 684 | * |
| 685 | * This routine ensures that, after returning, the effect of removing file |
| 686 | * persists in case of a crash. A crash while this routine is running will |
| 687 | * leave the system in no mixed state. |
| 688 | * |
| 689 | * It does so by using fsync on the parent directory of the file after the |
| 690 | * actual removal is done. |
| 691 | * |
| 692 | * Log errors with the severity specified by caller. |
| 693 | * |
| 694 | * Returns 0 if the operation succeeded, -1 otherwise. Note that errno is not |
| 695 | * valid upon return. |
| 696 | */ |
| 697 | int |
| 698 | durable_unlink(const char *fname, int elevel) |
| 699 | { |
| 700 | if (unlink(fname) < 0) |
| 701 | { |
| 702 | ereport(elevel, |
| 703 | (errcode_for_file_access(), |
| 704 | errmsg("could not remove file \"%s\": %m" , |
| 705 | fname))); |
| 706 | return -1; |
| 707 | } |
| 708 | |
| 709 | /* |
| 710 | * To guarantee that the removal of the file is persistent, fsync its |
| 711 | * parent directory. |
| 712 | */ |
| 713 | if (fsync_parent_path(fname, elevel) != 0) |
| 714 | return -1; |
| 715 | |
| 716 | return 0; |
| 717 | } |
| 718 | |
| 719 | /* |
| 720 | * durable_link_or_rename -- rename a file in a durable manner. |
| 721 | * |
| 722 | * Similar to durable_rename(), except that this routine tries (but does not |
| 723 | * guarantee) not to overwrite the target file. |
| 724 | * |
| 725 | * Note that a crash in an unfortunate moment can leave you with two links to |
| 726 | * the target file. |
| 727 | * |
| 728 | * Log errors with the caller specified severity. |
| 729 | * |
| 730 | * Returns 0 if the operation succeeded, -1 otherwise. Note that errno is not |
| 731 | * valid upon return. |
| 732 | */ |
| 733 | int |
| 734 | durable_link_or_rename(const char *oldfile, const char *newfile, int elevel) |
| 735 | { |
| 736 | /* |
| 737 | * Ensure that, if we crash directly after the rename/link, a file with |
| 738 | * valid contents is moved into place. |
| 739 | */ |
| 740 | if (fsync_fname_ext(oldfile, false, false, elevel) != 0) |
| 741 | return -1; |
| 742 | |
| 743 | #if HAVE_WORKING_LINK |
| 744 | if (link(oldfile, newfile) < 0) |
| 745 | { |
| 746 | ereport(elevel, |
| 747 | (errcode_for_file_access(), |
| 748 | errmsg("could not link file \"%s\" to \"%s\": %m" , |
| 749 | oldfile, newfile))); |
| 750 | return -1; |
| 751 | } |
| 752 | unlink(oldfile); |
| 753 | #else |
| 754 | /* XXX: Add racy file existence check? */ |
| 755 | if (rename(oldfile, newfile) < 0) |
| 756 | { |
| 757 | ereport(elevel, |
| 758 | (errcode_for_file_access(), |
| 759 | errmsg("could not rename file \"%s\" to \"%s\": %m" , |
| 760 | oldfile, newfile))); |
| 761 | return -1; |
| 762 | } |
| 763 | #endif |
| 764 | |
| 765 | /* |
| 766 | * Make change persistent in case of an OS crash, both the new entry and |
| 767 | * its parent directory need to be flushed. |
| 768 | */ |
| 769 | if (fsync_fname_ext(newfile, false, false, elevel) != 0) |
| 770 | return -1; |
| 771 | |
| 772 | /* Same for parent directory */ |
| 773 | if (fsync_parent_path(newfile, elevel) != 0) |
| 774 | return -1; |
| 775 | |
| 776 | return 0; |
| 777 | } |
| 778 | |
| 779 | /* |
| 780 | * InitFileAccess --- initialize this module during backend startup |
| 781 | * |
| 782 | * This is called during either normal or standalone backend start. |
| 783 | * It is *not* called in the postmaster. |
| 784 | */ |
| 785 | void |
| 786 | InitFileAccess(void) |
| 787 | { |
| 788 | Assert(SizeVfdCache == 0); /* call me only once */ |
| 789 | |
| 790 | /* initialize cache header entry */ |
| 791 | VfdCache = (Vfd *) malloc(sizeof(Vfd)); |
| 792 | if (VfdCache == NULL) |
| 793 | ereport(FATAL, |
| 794 | (errcode(ERRCODE_OUT_OF_MEMORY), |
| 795 | errmsg("out of memory" ))); |
| 796 | |
| 797 | MemSet((char *) &(VfdCache[0]), 0, sizeof(Vfd)); |
| 798 | VfdCache->fd = VFD_CLOSED; |
| 799 | |
| 800 | SizeVfdCache = 1; |
| 801 | |
| 802 | /* register proc-exit hook to ensure temp files are dropped at exit */ |
| 803 | on_proc_exit(AtProcExit_Files, 0); |
| 804 | } |
| 805 | |
| 806 | /* |
| 807 | * count_usable_fds --- count how many FDs the system will let us open, |
| 808 | * and estimate how many are already open. |
| 809 | * |
| 810 | * We stop counting if usable_fds reaches max_to_probe. Note: a small |
| 811 | * value of max_to_probe might result in an underestimate of already_open; |
| 812 | * we must fill in any "gaps" in the set of used FDs before the calculation |
| 813 | * of already_open will give the right answer. In practice, max_to_probe |
| 814 | * of a couple of dozen should be enough to ensure good results. |
| 815 | * |
| 816 | * We assume stdin (FD 0) is available for dup'ing |
| 817 | */ |
| 818 | static void |
| 819 | count_usable_fds(int max_to_probe, int *usable_fds, int *already_open) |
| 820 | { |
| 821 | int *fd; |
| 822 | int size; |
| 823 | int used = 0; |
| 824 | int highestfd = 0; |
| 825 | int j; |
| 826 | |
| 827 | #ifdef HAVE_GETRLIMIT |
| 828 | struct rlimit rlim; |
| 829 | int getrlimit_status; |
| 830 | #endif |
| 831 | |
| 832 | size = 1024; |
| 833 | fd = (int *) palloc(size * sizeof(int)); |
| 834 | |
| 835 | #ifdef HAVE_GETRLIMIT |
| 836 | #ifdef RLIMIT_NOFILE /* most platforms use RLIMIT_NOFILE */ |
| 837 | getrlimit_status = getrlimit(RLIMIT_NOFILE, &rlim); |
| 838 | #else /* but BSD doesn't ... */ |
| 839 | getrlimit_status = getrlimit(RLIMIT_OFILE, &rlim); |
| 840 | #endif /* RLIMIT_NOFILE */ |
| 841 | if (getrlimit_status != 0) |
| 842 | ereport(WARNING, (errmsg("getrlimit failed: %m" ))); |
| 843 | #endif /* HAVE_GETRLIMIT */ |
| 844 | |
| 845 | /* dup until failure or probe limit reached */ |
| 846 | for (;;) |
| 847 | { |
| 848 | int thisfd; |
| 849 | |
| 850 | #ifdef HAVE_GETRLIMIT |
| 851 | |
| 852 | /* |
| 853 | * don't go beyond RLIMIT_NOFILE; causes irritating kernel logs on |
| 854 | * some platforms |
| 855 | */ |
| 856 | if (getrlimit_status == 0 && highestfd >= rlim.rlim_cur - 1) |
| 857 | break; |
| 858 | #endif |
| 859 | |
| 860 | thisfd = dup(0); |
| 861 | if (thisfd < 0) |
| 862 | { |
| 863 | /* Expect EMFILE or ENFILE, else it's fishy */ |
| 864 | if (errno != EMFILE && errno != ENFILE) |
| 865 | elog(WARNING, "dup(0) failed after %d successes: %m" , used); |
| 866 | break; |
| 867 | } |
| 868 | |
| 869 | if (used >= size) |
| 870 | { |
| 871 | size *= 2; |
| 872 | fd = (int *) repalloc(fd, size * sizeof(int)); |
| 873 | } |
| 874 | fd[used++] = thisfd; |
| 875 | |
| 876 | if (highestfd < thisfd) |
| 877 | highestfd = thisfd; |
| 878 | |
| 879 | if (used >= max_to_probe) |
| 880 | break; |
| 881 | } |
| 882 | |
| 883 | /* release the files we opened */ |
| 884 | for (j = 0; j < used; j++) |
| 885 | close(fd[j]); |
| 886 | |
| 887 | pfree(fd); |
| 888 | |
| 889 | /* |
| 890 | * Return results. usable_fds is just the number of successful dups. We |
| 891 | * assume that the system limit is highestfd+1 (remember 0 is a legal FD |
| 892 | * number) and so already_open is highestfd+1 - usable_fds. |
| 893 | */ |
| 894 | *usable_fds = used; |
| 895 | *already_open = highestfd + 1 - used; |
| 896 | } |
| 897 | |
| 898 | /* |
| 899 | * set_max_safe_fds |
| 900 | * Determine number of filedescriptors that fd.c is allowed to use |
| 901 | */ |
| 902 | void |
| 903 | set_max_safe_fds(void) |
| 904 | { |
| 905 | int usable_fds; |
| 906 | int already_open; |
| 907 | |
| 908 | /*---------- |
| 909 | * We want to set max_safe_fds to |
| 910 | * MIN(usable_fds, max_files_per_process - already_open) |
| 911 | * less the slop factor for files that are opened without consulting |
| 912 | * fd.c. This ensures that we won't exceed either max_files_per_process |
| 913 | * or the experimentally-determined EMFILE limit. |
| 914 | *---------- |
| 915 | */ |
| 916 | count_usable_fds(max_files_per_process, |
| 917 | &usable_fds, &already_open); |
| 918 | |
| 919 | max_safe_fds = Min(usable_fds, max_files_per_process - already_open); |
| 920 | |
| 921 | /* |
| 922 | * Take off the FDs reserved for system() etc. |
| 923 | */ |
| 924 | max_safe_fds -= NUM_RESERVED_FDS; |
| 925 | |
| 926 | /* |
| 927 | * Make sure we still have enough to get by. |
| 928 | */ |
| 929 | if (max_safe_fds < FD_MINFREE) |
| 930 | ereport(FATAL, |
| 931 | (errcode(ERRCODE_INSUFFICIENT_RESOURCES), |
| 932 | errmsg("insufficient file descriptors available to start server process" ), |
| 933 | errdetail("System allows %d, we need at least %d." , |
| 934 | max_safe_fds + NUM_RESERVED_FDS, |
| 935 | FD_MINFREE + NUM_RESERVED_FDS))); |
| 936 | |
| 937 | elog(DEBUG2, "max_safe_fds = %d, usable_fds = %d, already_open = %d" , |
| 938 | max_safe_fds, usable_fds, already_open); |
| 939 | } |
| 940 | |
| 941 | /* |
| 942 | * Open a file with BasicOpenFilePerm() and pass default file mode for the |
| 943 | * fileMode parameter. |
| 944 | */ |
| 945 | int |
| 946 | BasicOpenFile(const char *fileName, int fileFlags) |
| 947 | { |
| 948 | return BasicOpenFilePerm(fileName, fileFlags, pg_file_create_mode); |
| 949 | } |
| 950 | |
| 951 | /* |
| 952 | * BasicOpenFilePerm --- same as open(2) except can free other FDs if needed |
| 953 | * |
| 954 | * This is exported for use by places that really want a plain kernel FD, |
| 955 | * but need to be proof against running out of FDs. Once an FD has been |
| 956 | * successfully returned, it is the caller's responsibility to ensure that |
| 957 | * it will not be leaked on ereport()! Most users should *not* call this |
| 958 | * routine directly, but instead use the VFD abstraction level, which |
| 959 | * provides protection against descriptor leaks as well as management of |
| 960 | * files that need to be open for more than a short period of time. |
| 961 | * |
| 962 | * Ideally this should be the *only* direct call of open() in the backend. |
| 963 | * In practice, the postmaster calls open() directly, and there are some |
| 964 | * direct open() calls done early in backend startup. Those are OK since |
| 965 | * this module wouldn't have any open files to close at that point anyway. |
| 966 | */ |
| 967 | int |
| 968 | BasicOpenFilePerm(const char *fileName, int fileFlags, mode_t fileMode) |
| 969 | { |
| 970 | int fd; |
| 971 | |
| 972 | tryAgain: |
| 973 | fd = open(fileName, fileFlags, fileMode); |
| 974 | |
| 975 | if (fd >= 0) |
| 976 | return fd; /* success! */ |
| 977 | |
| 978 | if (errno == EMFILE || errno == ENFILE) |
| 979 | { |
| 980 | int save_errno = errno; |
| 981 | |
| 982 | ereport(LOG, |
| 983 | (errcode(ERRCODE_INSUFFICIENT_RESOURCES), |
| 984 | errmsg("out of file descriptors: %m; release and retry" ))); |
| 985 | errno = 0; |
| 986 | if (ReleaseLruFile()) |
| 987 | goto tryAgain; |
| 988 | errno = save_errno; |
| 989 | } |
| 990 | |
| 991 | return -1; /* failure */ |
| 992 | } |
| 993 | |
| 994 | #if defined(FDDEBUG) |
| 995 | |
| 996 | static void |
| 997 | _dump_lru(void) |
| 998 | { |
| 999 | int mru = VfdCache[0].lruLessRecently; |
| 1000 | Vfd *vfdP = &VfdCache[mru]; |
| 1001 | char buf[2048]; |
| 1002 | |
| 1003 | snprintf(buf, sizeof(buf), "LRU: MOST %d " , mru); |
| 1004 | while (mru != 0) |
| 1005 | { |
| 1006 | mru = vfdP->lruLessRecently; |
| 1007 | vfdP = &VfdCache[mru]; |
| 1008 | snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf), "%d " , mru); |
| 1009 | } |
| 1010 | snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf), "LEAST" ); |
| 1011 | elog(LOG, "%s" , buf); |
| 1012 | } |
| 1013 | #endif /* FDDEBUG */ |
| 1014 | |
| 1015 | static void |
| 1016 | Delete(File file) |
| 1017 | { |
| 1018 | Vfd *vfdP; |
| 1019 | |
| 1020 | Assert(file != 0); |
| 1021 | |
| 1022 | DO_DB(elog(LOG, "Delete %d (%s)" , |
| 1023 | file, VfdCache[file].fileName)); |
| 1024 | DO_DB(_dump_lru()); |
| 1025 | |
| 1026 | vfdP = &VfdCache[file]; |
| 1027 | |
| 1028 | VfdCache[vfdP->lruLessRecently].lruMoreRecently = vfdP->lruMoreRecently; |
| 1029 | VfdCache[vfdP->lruMoreRecently].lruLessRecently = vfdP->lruLessRecently; |
| 1030 | |
| 1031 | DO_DB(_dump_lru()); |
| 1032 | } |
| 1033 | |
| 1034 | static void |
| 1035 | LruDelete(File file) |
| 1036 | { |
| 1037 | Vfd *vfdP; |
| 1038 | |
| 1039 | Assert(file != 0); |
| 1040 | |
| 1041 | DO_DB(elog(LOG, "LruDelete %d (%s)" , |
| 1042 | file, VfdCache[file].fileName)); |
| 1043 | |
| 1044 | vfdP = &VfdCache[file]; |
| 1045 | |
| 1046 | /* |
| 1047 | * Close the file. We aren't expecting this to fail; if it does, better |
| 1048 | * to leak the FD than to mess up our internal state. |
| 1049 | */ |
| 1050 | if (close(vfdP->fd)) |
| 1051 | elog(vfdP->fdstate & FD_TEMP_FILE_LIMIT ? LOG : data_sync_elevel(LOG), |
| 1052 | "could not close file \"%s\": %m" , vfdP->fileName); |
| 1053 | vfdP->fd = VFD_CLOSED; |
| 1054 | --nfile; |
| 1055 | |
| 1056 | /* delete the vfd record from the LRU ring */ |
| 1057 | Delete(file); |
| 1058 | } |
| 1059 | |
| 1060 | static void |
| 1061 | Insert(File file) |
| 1062 | { |
| 1063 | Vfd *vfdP; |
| 1064 | |
| 1065 | Assert(file != 0); |
| 1066 | |
| 1067 | DO_DB(elog(LOG, "Insert %d (%s)" , |
| 1068 | file, VfdCache[file].fileName)); |
| 1069 | DO_DB(_dump_lru()); |
| 1070 | |
| 1071 | vfdP = &VfdCache[file]; |
| 1072 | |
| 1073 | vfdP->lruMoreRecently = 0; |
| 1074 | vfdP->lruLessRecently = VfdCache[0].lruLessRecently; |
| 1075 | VfdCache[0].lruLessRecently = file; |
| 1076 | VfdCache[vfdP->lruLessRecently].lruMoreRecently = file; |
| 1077 | |
| 1078 | DO_DB(_dump_lru()); |
| 1079 | } |
| 1080 | |
| 1081 | /* returns 0 on success, -1 on re-open failure (with errno set) */ |
| 1082 | static int |
| 1083 | LruInsert(File file) |
| 1084 | { |
| 1085 | Vfd *vfdP; |
| 1086 | |
| 1087 | Assert(file != 0); |
| 1088 | |
| 1089 | DO_DB(elog(LOG, "LruInsert %d (%s)" , |
| 1090 | file, VfdCache[file].fileName)); |
| 1091 | |
| 1092 | vfdP = &VfdCache[file]; |
| 1093 | |
| 1094 | if (FileIsNotOpen(file)) |
| 1095 | { |
| 1096 | /* Close excess kernel FDs. */ |
| 1097 | ReleaseLruFiles(); |
| 1098 | |
| 1099 | /* |
| 1100 | * The open could still fail for lack of file descriptors, eg due to |
| 1101 | * overall system file table being full. So, be prepared to release |
| 1102 | * another FD if necessary... |
| 1103 | */ |
| 1104 | vfdP->fd = BasicOpenFilePerm(vfdP->fileName, vfdP->fileFlags, |
| 1105 | vfdP->fileMode); |
| 1106 | if (vfdP->fd < 0) |
| 1107 | { |
| 1108 | DO_DB(elog(LOG, "re-open failed: %m" )); |
| 1109 | return -1; |
| 1110 | } |
| 1111 | else |
| 1112 | { |
| 1113 | ++nfile; |
| 1114 | } |
| 1115 | } |
| 1116 | |
| 1117 | /* |
| 1118 | * put it at the head of the Lru ring |
| 1119 | */ |
| 1120 | |
| 1121 | Insert(file); |
| 1122 | |
| 1123 | return 0; |
| 1124 | } |
| 1125 | |
| 1126 | /* |
| 1127 | * Release one kernel FD by closing the least-recently-used VFD. |
| 1128 | */ |
| 1129 | static bool |
| 1130 | ReleaseLruFile(void) |
| 1131 | { |
| 1132 | DO_DB(elog(LOG, "ReleaseLruFile. Opened %d" , nfile)); |
| 1133 | |
| 1134 | if (nfile > 0) |
| 1135 | { |
| 1136 | /* |
| 1137 | * There are opened files and so there should be at least one used vfd |
| 1138 | * in the ring. |
| 1139 | */ |
| 1140 | Assert(VfdCache[0].lruMoreRecently != 0); |
| 1141 | LruDelete(VfdCache[0].lruMoreRecently); |
| 1142 | return true; /* freed a file */ |
| 1143 | } |
| 1144 | return false; /* no files available to free */ |
| 1145 | } |
| 1146 | |
| 1147 | /* |
| 1148 | * Release kernel FDs as needed to get under the max_safe_fds limit. |
| 1149 | * After calling this, it's OK to try to open another file. |
| 1150 | */ |
| 1151 | static void |
| 1152 | ReleaseLruFiles(void) |
| 1153 | { |
| 1154 | while (nfile + numAllocatedDescs >= max_safe_fds) |
| 1155 | { |
| 1156 | if (!ReleaseLruFile()) |
| 1157 | break; |
| 1158 | } |
| 1159 | } |
| 1160 | |
| 1161 | static File |
| 1162 | AllocateVfd(void) |
| 1163 | { |
| 1164 | Index i; |
| 1165 | File file; |
| 1166 | |
| 1167 | DO_DB(elog(LOG, "AllocateVfd. Size %zu" , SizeVfdCache)); |
| 1168 | |
| 1169 | Assert(SizeVfdCache > 0); /* InitFileAccess not called? */ |
| 1170 | |
| 1171 | if (VfdCache[0].nextFree == 0) |
| 1172 | { |
| 1173 | /* |
| 1174 | * The free list is empty so it is time to increase the size of the |
| 1175 | * array. We choose to double it each time this happens. However, |
| 1176 | * there's not much point in starting *real* small. |
| 1177 | */ |
| 1178 | Size newCacheSize = SizeVfdCache * 2; |
| 1179 | Vfd *newVfdCache; |
| 1180 | |
| 1181 | if (newCacheSize < 32) |
| 1182 | newCacheSize = 32; |
| 1183 | |
| 1184 | /* |
| 1185 | * Be careful not to clobber VfdCache ptr if realloc fails. |
| 1186 | */ |
| 1187 | newVfdCache = (Vfd *) realloc(VfdCache, sizeof(Vfd) * newCacheSize); |
| 1188 | if (newVfdCache == NULL) |
| 1189 | ereport(ERROR, |
| 1190 | (errcode(ERRCODE_OUT_OF_MEMORY), |
| 1191 | errmsg("out of memory" ))); |
| 1192 | VfdCache = newVfdCache; |
| 1193 | |
| 1194 | /* |
| 1195 | * Initialize the new entries and link them into the free list. |
| 1196 | */ |
| 1197 | for (i = SizeVfdCache; i < newCacheSize; i++) |
| 1198 | { |
| 1199 | MemSet((char *) &(VfdCache[i]), 0, sizeof(Vfd)); |
| 1200 | VfdCache[i].nextFree = i + 1; |
| 1201 | VfdCache[i].fd = VFD_CLOSED; |
| 1202 | } |
| 1203 | VfdCache[newCacheSize - 1].nextFree = 0; |
| 1204 | VfdCache[0].nextFree = SizeVfdCache; |
| 1205 | |
| 1206 | /* |
| 1207 | * Record the new size |
| 1208 | */ |
| 1209 | SizeVfdCache = newCacheSize; |
| 1210 | } |
| 1211 | |
| 1212 | file = VfdCache[0].nextFree; |
| 1213 | |
| 1214 | VfdCache[0].nextFree = VfdCache[file].nextFree; |
| 1215 | |
| 1216 | return file; |
| 1217 | } |
| 1218 | |
| 1219 | static void |
| 1220 | FreeVfd(File file) |
| 1221 | { |
| 1222 | Vfd *vfdP = &VfdCache[file]; |
| 1223 | |
| 1224 | DO_DB(elog(LOG, "FreeVfd: %d (%s)" , |
| 1225 | file, vfdP->fileName ? vfdP->fileName : "" )); |
| 1226 | |
| 1227 | if (vfdP->fileName != NULL) |
| 1228 | { |
| 1229 | free(vfdP->fileName); |
| 1230 | vfdP->fileName = NULL; |
| 1231 | } |
| 1232 | vfdP->fdstate = 0x0; |
| 1233 | |
| 1234 | vfdP->nextFree = VfdCache[0].nextFree; |
| 1235 | VfdCache[0].nextFree = file; |
| 1236 | } |
| 1237 | |
| 1238 | /* returns 0 on success, -1 on re-open failure (with errno set) */ |
| 1239 | static int |
| 1240 | FileAccess(File file) |
| 1241 | { |
| 1242 | int returnValue; |
| 1243 | |
| 1244 | DO_DB(elog(LOG, "FileAccess %d (%s)" , |
| 1245 | file, VfdCache[file].fileName)); |
| 1246 | |
| 1247 | /* |
| 1248 | * Is the file open? If not, open it and put it at the head of the LRU |
| 1249 | * ring (possibly closing the least recently used file to get an FD). |
| 1250 | */ |
| 1251 | |
| 1252 | if (FileIsNotOpen(file)) |
| 1253 | { |
| 1254 | returnValue = LruInsert(file); |
| 1255 | if (returnValue != 0) |
| 1256 | return returnValue; |
| 1257 | } |
| 1258 | else if (VfdCache[0].lruLessRecently != file) |
| 1259 | { |
| 1260 | /* |
| 1261 | * We now know that the file is open and that it is not the last one |
| 1262 | * accessed, so we need to move it to the head of the Lru ring. |
| 1263 | */ |
| 1264 | |
| 1265 | Delete(file); |
| 1266 | Insert(file); |
| 1267 | } |
| 1268 | |
| 1269 | return 0; |
| 1270 | } |
| 1271 | |
| 1272 | /* |
| 1273 | * Called whenever a temporary file is deleted to report its size. |
| 1274 | */ |
| 1275 | static void |
| 1276 | ReportTemporaryFileUsage(const char *path, off_t size) |
| 1277 | { |
| 1278 | pgstat_report_tempfile(size); |
| 1279 | |
| 1280 | if (log_temp_files >= 0) |
| 1281 | { |
| 1282 | if ((size / 1024) >= log_temp_files) |
| 1283 | ereport(LOG, |
| 1284 | (errmsg("temporary file: path \"%s\", size %lu" , |
| 1285 | path, (unsigned long) size))); |
| 1286 | } |
| 1287 | } |
| 1288 | |
| 1289 | /* |
| 1290 | * Called to register a temporary file for automatic close. |
| 1291 | * ResourceOwnerEnlargeFiles(CurrentResourceOwner) must have been called |
| 1292 | * before the file was opened. |
| 1293 | */ |
| 1294 | static void |
| 1295 | RegisterTemporaryFile(File file) |
| 1296 | { |
| 1297 | ResourceOwnerRememberFile(CurrentResourceOwner, file); |
| 1298 | VfdCache[file].resowner = CurrentResourceOwner; |
| 1299 | |
| 1300 | /* Backup mechanism for closing at end of xact. */ |
| 1301 | VfdCache[file].fdstate |= FD_CLOSE_AT_EOXACT; |
| 1302 | have_xact_temporary_files = true; |
| 1303 | } |
| 1304 | |
| 1305 | /* |
| 1306 | * Called when we get a shared invalidation message on some relation. |
| 1307 | */ |
| 1308 | #ifdef NOT_USED |
| 1309 | void |
| 1310 | FileInvalidate(File file) |
| 1311 | { |
| 1312 | Assert(FileIsValid(file)); |
| 1313 | if (!FileIsNotOpen(file)) |
| 1314 | LruDelete(file); |
| 1315 | } |
| 1316 | #endif |
| 1317 | |
| 1318 | /* |
| 1319 | * Open a file with PathNameOpenFilePerm() and pass default file mode for the |
| 1320 | * fileMode parameter. |
| 1321 | */ |
| 1322 | File |
| 1323 | PathNameOpenFile(const char *fileName, int fileFlags) |
| 1324 | { |
| 1325 | return PathNameOpenFilePerm(fileName, fileFlags, pg_file_create_mode); |
| 1326 | } |
| 1327 | |
| 1328 | /* |
| 1329 | * open a file in an arbitrary directory |
| 1330 | * |
| 1331 | * NB: if the passed pathname is relative (which it usually is), |
| 1332 | * it will be interpreted relative to the process' working directory |
| 1333 | * (which should always be $PGDATA when this code is running). |
| 1334 | */ |
| 1335 | File |
| 1336 | PathNameOpenFilePerm(const char *fileName, int fileFlags, mode_t fileMode) |
| 1337 | { |
| 1338 | char *fnamecopy; |
| 1339 | File file; |
| 1340 | Vfd *vfdP; |
| 1341 | |
| 1342 | DO_DB(elog(LOG, "PathNameOpenFilePerm: %s %x %o" , |
| 1343 | fileName, fileFlags, fileMode)); |
| 1344 | |
| 1345 | /* |
| 1346 | * We need a malloc'd copy of the file name; fail cleanly if no room. |
| 1347 | */ |
| 1348 | fnamecopy = strdup(fileName); |
| 1349 | if (fnamecopy == NULL) |
| 1350 | ereport(ERROR, |
| 1351 | (errcode(ERRCODE_OUT_OF_MEMORY), |
| 1352 | errmsg("out of memory" ))); |
| 1353 | |
| 1354 | file = AllocateVfd(); |
| 1355 | vfdP = &VfdCache[file]; |
| 1356 | |
| 1357 | /* Close excess kernel FDs. */ |
| 1358 | ReleaseLruFiles(); |
| 1359 | |
| 1360 | vfdP->fd = BasicOpenFilePerm(fileName, fileFlags, fileMode); |
| 1361 | |
| 1362 | if (vfdP->fd < 0) |
| 1363 | { |
| 1364 | int save_errno = errno; |
| 1365 | |
| 1366 | FreeVfd(file); |
| 1367 | free(fnamecopy); |
| 1368 | errno = save_errno; |
| 1369 | return -1; |
| 1370 | } |
| 1371 | ++nfile; |
| 1372 | DO_DB(elog(LOG, "PathNameOpenFile: success %d" , |
| 1373 | vfdP->fd)); |
| 1374 | |
| 1375 | Insert(file); |
| 1376 | |
| 1377 | vfdP->fileName = fnamecopy; |
| 1378 | /* Saved flags are adjusted to be OK for re-opening file */ |
| 1379 | vfdP->fileFlags = fileFlags & ~(O_CREAT | O_TRUNC | O_EXCL); |
| 1380 | vfdP->fileMode = fileMode; |
| 1381 | vfdP->fileSize = 0; |
| 1382 | vfdP->fdstate = 0x0; |
| 1383 | vfdP->resowner = NULL; |
| 1384 | |
| 1385 | return file; |
| 1386 | } |
| 1387 | |
| 1388 | /* |
| 1389 | * Create directory 'directory'. If necessary, create 'basedir', which must |
| 1390 | * be the directory above it. This is designed for creating the top-level |
| 1391 | * temporary directory on demand before creating a directory underneath it. |
| 1392 | * Do nothing if the directory already exists. |
| 1393 | * |
| 1394 | * Directories created within the top-level temporary directory should begin |
| 1395 | * with PG_TEMP_FILE_PREFIX, so that they can be identified as temporary and |
| 1396 | * deleted at startup by RemovePgTempFiles(). Further subdirectories below |
| 1397 | * that do not need any particular prefix. |
| 1398 | */ |
| 1399 | void |
| 1400 | PathNameCreateTemporaryDir(const char *basedir, const char *directory) |
| 1401 | { |
| 1402 | if (MakePGDirectory(directory) < 0) |
| 1403 | { |
| 1404 | if (errno == EEXIST) |
| 1405 | return; |
| 1406 | |
| 1407 | /* |
| 1408 | * Failed. Try to create basedir first in case it's missing. Tolerate |
| 1409 | * EEXIST to close a race against another process following the same |
| 1410 | * algorithm. |
| 1411 | */ |
| 1412 | if (MakePGDirectory(basedir) < 0 && errno != EEXIST) |
| 1413 | ereport(ERROR, |
| 1414 | (errcode_for_file_access(), |
| 1415 | errmsg("cannot create temporary directory \"%s\": %m" , |
| 1416 | basedir))); |
| 1417 | |
| 1418 | /* Try again. */ |
| 1419 | if (MakePGDirectory(directory) < 0 && errno != EEXIST) |
| 1420 | ereport(ERROR, |
| 1421 | (errcode_for_file_access(), |
| 1422 | errmsg("cannot create temporary subdirectory \"%s\": %m" , |
| 1423 | directory))); |
| 1424 | } |
| 1425 | } |
| 1426 | |
| 1427 | /* |
| 1428 | * Delete a directory and everything in it, if it exists. |
| 1429 | */ |
| 1430 | void |
| 1431 | PathNameDeleteTemporaryDir(const char *dirname) |
| 1432 | { |
| 1433 | struct stat statbuf; |
| 1434 | |
| 1435 | /* Silently ignore missing directory. */ |
| 1436 | if (stat(dirname, &statbuf) != 0 && errno == ENOENT) |
| 1437 | return; |
| 1438 | |
| 1439 | /* |
| 1440 | * Currently, walkdir doesn't offer a way for our passed in function to |
| 1441 | * maintain state. Perhaps it should, so that we could tell the caller |
| 1442 | * whether this operation succeeded or failed. Since this operation is |
| 1443 | * used in a cleanup path, we wouldn't actually behave differently: we'll |
| 1444 | * just log failures. |
| 1445 | */ |
| 1446 | walkdir(dirname, unlink_if_exists_fname, false, LOG); |
| 1447 | } |
| 1448 | |
| 1449 | /* |
| 1450 | * Open a temporary file that will disappear when we close it. |
| 1451 | * |
| 1452 | * This routine takes care of generating an appropriate tempfile name. |
| 1453 | * There's no need to pass in fileFlags or fileMode either, since only |
| 1454 | * one setting makes any sense for a temp file. |
| 1455 | * |
| 1456 | * Unless interXact is true, the file is remembered by CurrentResourceOwner |
| 1457 | * to ensure it's closed and deleted when it's no longer needed, typically at |
| 1458 | * the end-of-transaction. In most cases, you don't want temporary files to |
| 1459 | * outlive the transaction that created them, so this should be false -- but |
| 1460 | * if you need "somewhat" temporary storage, this might be useful. In either |
| 1461 | * case, the file is removed when the File is explicitly closed. |
| 1462 | */ |
| 1463 | File |
| 1464 | OpenTemporaryFile(bool interXact) |
| 1465 | { |
| 1466 | File file = 0; |
| 1467 | |
| 1468 | /* |
| 1469 | * Make sure the current resource owner has space for this File before we |
| 1470 | * open it, if we'll be registering it below. |
| 1471 | */ |
| 1472 | if (!interXact) |
| 1473 | ResourceOwnerEnlargeFiles(CurrentResourceOwner); |
| 1474 | |
| 1475 | /* |
| 1476 | * If some temp tablespace(s) have been given to us, try to use the next |
| 1477 | * one. If a given tablespace can't be found, we silently fall back to |
| 1478 | * the database's default tablespace. |
| 1479 | * |
| 1480 | * BUT: if the temp file is slated to outlive the current transaction, |
| 1481 | * force it into the database's default tablespace, so that it will not |
| 1482 | * pose a threat to possible tablespace drop attempts. |
| 1483 | */ |
| 1484 | if (numTempTableSpaces > 0 && !interXact) |
| 1485 | { |
| 1486 | Oid tblspcOid = GetNextTempTableSpace(); |
| 1487 | |
| 1488 | if (OidIsValid(tblspcOid)) |
| 1489 | file = OpenTemporaryFileInTablespace(tblspcOid, false); |
| 1490 | } |
| 1491 | |
| 1492 | /* |
| 1493 | * If not, or if tablespace is bad, create in database's default |
| 1494 | * tablespace. MyDatabaseTableSpace should normally be set before we get |
| 1495 | * here, but just in case it isn't, fall back to pg_default tablespace. |
| 1496 | */ |
| 1497 | if (file <= 0) |
| 1498 | file = OpenTemporaryFileInTablespace(MyDatabaseTableSpace ? |
| 1499 | MyDatabaseTableSpace : |
| 1500 | DEFAULTTABLESPACE_OID, |
| 1501 | true); |
| 1502 | |
| 1503 | /* Mark it for deletion at close and temporary file size limit */ |
| 1504 | VfdCache[file].fdstate |= FD_DELETE_AT_CLOSE | FD_TEMP_FILE_LIMIT; |
| 1505 | |
| 1506 | /* Register it with the current resource owner */ |
| 1507 | if (!interXact) |
| 1508 | RegisterTemporaryFile(file); |
| 1509 | |
| 1510 | return file; |
| 1511 | } |
| 1512 | |
| 1513 | /* |
| 1514 | * Return the path of the temp directory in a given tablespace. |
| 1515 | */ |
| 1516 | void |
| 1517 | TempTablespacePath(char *path, Oid tablespace) |
| 1518 | { |
| 1519 | /* |
| 1520 | * Identify the tempfile directory for this tablespace. |
| 1521 | * |
| 1522 | * If someone tries to specify pg_global, use pg_default instead. |
| 1523 | */ |
| 1524 | if (tablespace == InvalidOid || |
| 1525 | tablespace == DEFAULTTABLESPACE_OID || |
| 1526 | tablespace == GLOBALTABLESPACE_OID) |
| 1527 | snprintf(path, MAXPGPATH, "base/%s" , PG_TEMP_FILES_DIR); |
| 1528 | else |
| 1529 | { |
| 1530 | /* All other tablespaces are accessed via symlinks */ |
| 1531 | snprintf(path, MAXPGPATH, "pg_tblspc/%u/%s/%s" , |
| 1532 | tablespace, TABLESPACE_VERSION_DIRECTORY, |
| 1533 | PG_TEMP_FILES_DIR); |
| 1534 | } |
| 1535 | } |
| 1536 | |
| 1537 | /* |
| 1538 | * Open a temporary file in a specific tablespace. |
| 1539 | * Subroutine for OpenTemporaryFile, which see for details. |
| 1540 | */ |
| 1541 | static File |
| 1542 | OpenTemporaryFileInTablespace(Oid tblspcOid, bool rejectError) |
| 1543 | { |
| 1544 | char tempdirpath[MAXPGPATH]; |
| 1545 | char tempfilepath[MAXPGPATH]; |
| 1546 | File file; |
| 1547 | |
| 1548 | TempTablespacePath(tempdirpath, tblspcOid); |
| 1549 | |
| 1550 | /* |
| 1551 | * Generate a tempfile name that should be unique within the current |
| 1552 | * database instance. |
| 1553 | */ |
| 1554 | snprintf(tempfilepath, sizeof(tempfilepath), "%s/%s%d.%ld" , |
| 1555 | tempdirpath, PG_TEMP_FILE_PREFIX, MyProcPid, tempFileCounter++); |
| 1556 | |
| 1557 | /* |
| 1558 | * Open the file. Note: we don't use O_EXCL, in case there is an orphaned |
| 1559 | * temp file that can be reused. |
| 1560 | */ |
| 1561 | file = PathNameOpenFile(tempfilepath, |
| 1562 | O_RDWR | O_CREAT | O_TRUNC | PG_BINARY); |
| 1563 | if (file <= 0) |
| 1564 | { |
| 1565 | /* |
| 1566 | * We might need to create the tablespace's tempfile directory, if no |
| 1567 | * one has yet done so. |
| 1568 | * |
| 1569 | * Don't check for an error from MakePGDirectory; it could fail if |
| 1570 | * someone else just did the same thing. If it doesn't work then |
| 1571 | * we'll bomb out on the second create attempt, instead. |
| 1572 | */ |
| 1573 | (void) MakePGDirectory(tempdirpath); |
| 1574 | |
| 1575 | file = PathNameOpenFile(tempfilepath, |
| 1576 | O_RDWR | O_CREAT | O_TRUNC | PG_BINARY); |
| 1577 | if (file <= 0 && rejectError) |
| 1578 | elog(ERROR, "could not create temporary file \"%s\": %m" , |
| 1579 | tempfilepath); |
| 1580 | } |
| 1581 | |
| 1582 | return file; |
| 1583 | } |
| 1584 | |
| 1585 | |
| 1586 | /* |
| 1587 | * Create a new file. The directory containing it must already exist. Files |
| 1588 | * created this way are subject to temp_file_limit and are automatically |
| 1589 | * closed at end of transaction, but are not automatically deleted on close |
| 1590 | * because they are intended to be shared between cooperating backends. |
| 1591 | * |
| 1592 | * If the file is inside the top-level temporary directory, its name should |
| 1593 | * begin with PG_TEMP_FILE_PREFIX so that it can be identified as temporary |
| 1594 | * and deleted at startup by RemovePgTempFiles(). Alternatively, it can be |
| 1595 | * inside a directory created with PathNameCreateTemporaryDir(), in which case |
| 1596 | * the prefix isn't needed. |
| 1597 | */ |
| 1598 | File |
| 1599 | PathNameCreateTemporaryFile(const char *path, bool error_on_failure) |
| 1600 | { |
| 1601 | File file; |
| 1602 | |
| 1603 | ResourceOwnerEnlargeFiles(CurrentResourceOwner); |
| 1604 | |
| 1605 | /* |
| 1606 | * Open the file. Note: we don't use O_EXCL, in case there is an orphaned |
| 1607 | * temp file that can be reused. |
| 1608 | */ |
| 1609 | file = PathNameOpenFile(path, O_RDWR | O_CREAT | O_TRUNC | PG_BINARY); |
| 1610 | if (file <= 0) |
| 1611 | { |
| 1612 | if (error_on_failure) |
| 1613 | ereport(ERROR, |
| 1614 | (errcode_for_file_access(), |
| 1615 | errmsg("could not create temporary file \"%s\": %m" , |
| 1616 | path))); |
| 1617 | else |
| 1618 | return file; |
| 1619 | } |
| 1620 | |
| 1621 | /* Mark it for temp_file_limit accounting. */ |
| 1622 | VfdCache[file].fdstate |= FD_TEMP_FILE_LIMIT; |
| 1623 | |
| 1624 | /* Register it for automatic close. */ |
| 1625 | RegisterTemporaryFile(file); |
| 1626 | |
| 1627 | return file; |
| 1628 | } |
| 1629 | |
| 1630 | /* |
| 1631 | * Open a file that was created with PathNameCreateTemporaryFile, possibly in |
| 1632 | * another backend. Files opened this way don't count against the |
| 1633 | * temp_file_limit of the caller, are read-only and are automatically closed |
| 1634 | * at the end of the transaction but are not deleted on close. |
| 1635 | */ |
| 1636 | File |
| 1637 | PathNameOpenTemporaryFile(const char *path) |
| 1638 | { |
| 1639 | File file; |
| 1640 | |
| 1641 | ResourceOwnerEnlargeFiles(CurrentResourceOwner); |
| 1642 | |
| 1643 | /* We open the file read-only. */ |
| 1644 | file = PathNameOpenFile(path, O_RDONLY | PG_BINARY); |
| 1645 | |
| 1646 | /* If no such file, then we don't raise an error. */ |
| 1647 | if (file <= 0 && errno != ENOENT) |
| 1648 | ereport(ERROR, |
| 1649 | (errcode_for_file_access(), |
| 1650 | errmsg("could not open temporary file \"%s\": %m" , |
| 1651 | path))); |
| 1652 | |
| 1653 | if (file > 0) |
| 1654 | { |
| 1655 | /* Register it for automatic close. */ |
| 1656 | RegisterTemporaryFile(file); |
| 1657 | } |
| 1658 | |
| 1659 | return file; |
| 1660 | } |
| 1661 | |
| 1662 | /* |
| 1663 | * Delete a file by pathname. Return true if the file existed, false if |
| 1664 | * didn't. |
| 1665 | */ |
| 1666 | bool |
| 1667 | PathNameDeleteTemporaryFile(const char *path, bool error_on_failure) |
| 1668 | { |
| 1669 | struct stat filestats; |
| 1670 | int stat_errno; |
| 1671 | |
| 1672 | /* Get the final size for pgstat reporting. */ |
| 1673 | if (stat(path, &filestats) != 0) |
| 1674 | stat_errno = errno; |
| 1675 | else |
| 1676 | stat_errno = 0; |
| 1677 | |
| 1678 | /* |
| 1679 | * Unlike FileClose's automatic file deletion code, we tolerate |
| 1680 | * non-existence to support BufFileDeleteShared which doesn't know how |
| 1681 | * many segments it has to delete until it runs out. |
| 1682 | */ |
| 1683 | if (stat_errno == ENOENT) |
| 1684 | return false; |
| 1685 | |
| 1686 | if (unlink(path) < 0) |
| 1687 | { |
| 1688 | if (errno != ENOENT) |
| 1689 | ereport(error_on_failure ? ERROR : LOG, |
| 1690 | (errcode_for_file_access(), |
| 1691 | errmsg("could not unlink temporary file \"%s\": %m" , |
| 1692 | path))); |
| 1693 | return false; |
| 1694 | } |
| 1695 | |
| 1696 | if (stat_errno == 0) |
| 1697 | ReportTemporaryFileUsage(path, filestats.st_size); |
| 1698 | else |
| 1699 | { |
| 1700 | errno = stat_errno; |
| 1701 | ereport(LOG, |
| 1702 | (errcode_for_file_access(), |
| 1703 | errmsg("could not stat file \"%s\": %m" , path))); |
| 1704 | } |
| 1705 | |
| 1706 | return true; |
| 1707 | } |
| 1708 | |
| 1709 | /* |
| 1710 | * close a file when done with it |
| 1711 | */ |
| 1712 | void |
| 1713 | FileClose(File file) |
| 1714 | { |
| 1715 | Vfd *vfdP; |
| 1716 | |
| 1717 | Assert(FileIsValid(file)); |
| 1718 | |
| 1719 | DO_DB(elog(LOG, "FileClose: %d (%s)" , |
| 1720 | file, VfdCache[file].fileName)); |
| 1721 | |
| 1722 | vfdP = &VfdCache[file]; |
| 1723 | |
| 1724 | if (!FileIsNotOpen(file)) |
| 1725 | { |
| 1726 | /* close the file */ |
| 1727 | if (close(vfdP->fd)) |
| 1728 | { |
| 1729 | /* |
| 1730 | * We may need to panic on failure to close non-temporary files; |
| 1731 | * see LruDelete. |
| 1732 | */ |
| 1733 | elog(vfdP->fdstate & FD_TEMP_FILE_LIMIT ? LOG : data_sync_elevel(LOG), |
| 1734 | "could not close file \"%s\": %m" , vfdP->fileName); |
| 1735 | } |
| 1736 | |
| 1737 | --nfile; |
| 1738 | vfdP->fd = VFD_CLOSED; |
| 1739 | |
| 1740 | /* remove the file from the lru ring */ |
| 1741 | Delete(file); |
| 1742 | } |
| 1743 | |
| 1744 | if (vfdP->fdstate & FD_TEMP_FILE_LIMIT) |
| 1745 | { |
| 1746 | /* Subtract its size from current usage (do first in case of error) */ |
| 1747 | temporary_files_size -= vfdP->fileSize; |
| 1748 | vfdP->fileSize = 0; |
| 1749 | } |
| 1750 | |
| 1751 | /* |
| 1752 | * Delete the file if it was temporary, and make a log entry if wanted |
| 1753 | */ |
| 1754 | if (vfdP->fdstate & FD_DELETE_AT_CLOSE) |
| 1755 | { |
| 1756 | struct stat filestats; |
| 1757 | int stat_errno; |
| 1758 | |
| 1759 | /* |
| 1760 | * If we get an error, as could happen within the ereport/elog calls, |
| 1761 | * we'll come right back here during transaction abort. Reset the |
| 1762 | * flag to ensure that we can't get into an infinite loop. This code |
| 1763 | * is arranged to ensure that the worst-case consequence is failing to |
| 1764 | * emit log message(s), not failing to attempt the unlink. |
| 1765 | */ |
| 1766 | vfdP->fdstate &= ~FD_DELETE_AT_CLOSE; |
| 1767 | |
| 1768 | |
| 1769 | /* first try the stat() */ |
| 1770 | if (stat(vfdP->fileName, &filestats)) |
| 1771 | stat_errno = errno; |
| 1772 | else |
| 1773 | stat_errno = 0; |
| 1774 | |
| 1775 | /* in any case do the unlink */ |
| 1776 | if (unlink(vfdP->fileName)) |
| 1777 | elog(LOG, "could not unlink file \"%s\": %m" , vfdP->fileName); |
| 1778 | |
| 1779 | /* and last report the stat results */ |
| 1780 | if (stat_errno == 0) |
| 1781 | ReportTemporaryFileUsage(vfdP->fileName, filestats.st_size); |
| 1782 | else |
| 1783 | { |
| 1784 | errno = stat_errno; |
| 1785 | elog(LOG, "could not stat file \"%s\": %m" , vfdP->fileName); |
| 1786 | } |
| 1787 | } |
| 1788 | |
| 1789 | /* Unregister it from the resource owner */ |
| 1790 | if (vfdP->resowner) |
| 1791 | ResourceOwnerForgetFile(vfdP->resowner, file); |
| 1792 | |
| 1793 | /* |
| 1794 | * Return the Vfd slot to the free list |
| 1795 | */ |
| 1796 | FreeVfd(file); |
| 1797 | } |
| 1798 | |
| 1799 | /* |
| 1800 | * FilePrefetch - initiate asynchronous read of a given range of the file. |
| 1801 | * |
| 1802 | * Currently the only implementation of this function is using posix_fadvise |
| 1803 | * which is the simplest standardized interface that accomplishes this. |
| 1804 | * We could add an implementation using libaio in the future; but note that |
| 1805 | * this API is inappropriate for libaio, which wants to have a buffer provided |
| 1806 | * to read into. |
| 1807 | */ |
| 1808 | int |
| 1809 | FilePrefetch(File file, off_t offset, int amount, uint32 wait_event_info) |
| 1810 | { |
| 1811 | #if defined(USE_POSIX_FADVISE) && defined(POSIX_FADV_WILLNEED) |
| 1812 | int returnCode; |
| 1813 | |
| 1814 | Assert(FileIsValid(file)); |
| 1815 | |
| 1816 | DO_DB(elog(LOG, "FilePrefetch: %d (%s) " INT64_FORMAT " %d" , |
| 1817 | file, VfdCache[file].fileName, |
| 1818 | (int64) offset, amount)); |
| 1819 | |
| 1820 | returnCode = FileAccess(file); |
| 1821 | if (returnCode < 0) |
| 1822 | return returnCode; |
| 1823 | |
| 1824 | pgstat_report_wait_start(wait_event_info); |
| 1825 | returnCode = posix_fadvise(VfdCache[file].fd, offset, amount, |
| 1826 | POSIX_FADV_WILLNEED); |
| 1827 | pgstat_report_wait_end(); |
| 1828 | |
| 1829 | return returnCode; |
| 1830 | #else |
| 1831 | Assert(FileIsValid(file)); |
| 1832 | return 0; |
| 1833 | #endif |
| 1834 | } |
| 1835 | |
| 1836 | void |
| 1837 | FileWriteback(File file, off_t offset, off_t nbytes, uint32 wait_event_info) |
| 1838 | { |
| 1839 | int returnCode; |
| 1840 | |
| 1841 | Assert(FileIsValid(file)); |
| 1842 | |
| 1843 | DO_DB(elog(LOG, "FileWriteback: %d (%s) " INT64_FORMAT " " INT64_FORMAT, |
| 1844 | file, VfdCache[file].fileName, |
| 1845 | (int64) offset, (int64) nbytes)); |
| 1846 | |
| 1847 | if (nbytes <= 0) |
| 1848 | return; |
| 1849 | |
| 1850 | returnCode = FileAccess(file); |
| 1851 | if (returnCode < 0) |
| 1852 | return; |
| 1853 | |
| 1854 | pgstat_report_wait_start(wait_event_info); |
| 1855 | pg_flush_data(VfdCache[file].fd, offset, nbytes); |
| 1856 | pgstat_report_wait_end(); |
| 1857 | } |
| 1858 | |
| 1859 | int |
| 1860 | FileRead(File file, char *buffer, int amount, off_t offset, |
| 1861 | uint32 wait_event_info) |
| 1862 | { |
| 1863 | int returnCode; |
| 1864 | Vfd *vfdP; |
| 1865 | |
| 1866 | Assert(FileIsValid(file)); |
| 1867 | |
| 1868 | DO_DB(elog(LOG, "FileRead: %d (%s) " INT64_FORMAT " %d %p" , |
| 1869 | file, VfdCache[file].fileName, |
| 1870 | (int64) offset, |
| 1871 | amount, buffer)); |
| 1872 | |
| 1873 | returnCode = FileAccess(file); |
| 1874 | if (returnCode < 0) |
| 1875 | return returnCode; |
| 1876 | |
| 1877 | vfdP = &VfdCache[file]; |
| 1878 | |
| 1879 | retry: |
| 1880 | pgstat_report_wait_start(wait_event_info); |
| 1881 | returnCode = pg_pread(vfdP->fd, buffer, amount, offset); |
| 1882 | pgstat_report_wait_end(); |
| 1883 | |
| 1884 | if (returnCode < 0) |
| 1885 | { |
| 1886 | /* |
| 1887 | * Windows may run out of kernel buffers and return "Insufficient |
| 1888 | * system resources" error. Wait a bit and retry to solve it. |
| 1889 | * |
| 1890 | * It is rumored that EINTR is also possible on some Unix filesystems, |
| 1891 | * in which case immediate retry is indicated. |
| 1892 | */ |
| 1893 | #ifdef WIN32 |
| 1894 | DWORD error = GetLastError(); |
| 1895 | |
| 1896 | switch (error) |
| 1897 | { |
| 1898 | case ERROR_NO_SYSTEM_RESOURCES: |
| 1899 | pg_usleep(1000L); |
| 1900 | errno = EINTR; |
| 1901 | break; |
| 1902 | default: |
| 1903 | _dosmaperr(error); |
| 1904 | break; |
| 1905 | } |
| 1906 | #endif |
| 1907 | /* OK to retry if interrupted */ |
| 1908 | if (errno == EINTR) |
| 1909 | goto retry; |
| 1910 | } |
| 1911 | |
| 1912 | return returnCode; |
| 1913 | } |
| 1914 | |
| 1915 | int |
| 1916 | FileWrite(File file, char *buffer, int amount, off_t offset, |
| 1917 | uint32 wait_event_info) |
| 1918 | { |
| 1919 | int returnCode; |
| 1920 | Vfd *vfdP; |
| 1921 | |
| 1922 | Assert(FileIsValid(file)); |
| 1923 | |
| 1924 | DO_DB(elog(LOG, "FileWrite: %d (%s) " INT64_FORMAT " %d %p" , |
| 1925 | file, VfdCache[file].fileName, |
| 1926 | (int64) offset, |
| 1927 | amount, buffer)); |
| 1928 | |
| 1929 | returnCode = FileAccess(file); |
| 1930 | if (returnCode < 0) |
| 1931 | return returnCode; |
| 1932 | |
| 1933 | vfdP = &VfdCache[file]; |
| 1934 | |
| 1935 | /* |
| 1936 | * If enforcing temp_file_limit and it's a temp file, check to see if the |
| 1937 | * write would overrun temp_file_limit, and throw error if so. Note: it's |
| 1938 | * really a modularity violation to throw error here; we should set errno |
| 1939 | * and return -1. However, there's no way to report a suitable error |
| 1940 | * message if we do that. All current callers would just throw error |
| 1941 | * immediately anyway, so this is safe at present. |
| 1942 | */ |
| 1943 | if (temp_file_limit >= 0 && (vfdP->fdstate & FD_TEMP_FILE_LIMIT)) |
| 1944 | { |
| 1945 | off_t past_write = offset + amount; |
| 1946 | |
| 1947 | if (past_write > vfdP->fileSize) |
| 1948 | { |
| 1949 | uint64 newTotal = temporary_files_size; |
| 1950 | |
| 1951 | newTotal += past_write - vfdP->fileSize; |
| 1952 | if (newTotal > (uint64) temp_file_limit * (uint64) 1024) |
| 1953 | ereport(ERROR, |
| 1954 | (errcode(ERRCODE_CONFIGURATION_LIMIT_EXCEEDED), |
| 1955 | errmsg("temporary file size exceeds temp_file_limit (%dkB)" , |
| 1956 | temp_file_limit))); |
| 1957 | } |
| 1958 | } |
| 1959 | |
| 1960 | retry: |
| 1961 | errno = 0; |
| 1962 | pgstat_report_wait_start(wait_event_info); |
| 1963 | returnCode = pg_pwrite(VfdCache[file].fd, buffer, amount, offset); |
| 1964 | pgstat_report_wait_end(); |
| 1965 | |
| 1966 | /* if write didn't set errno, assume problem is no disk space */ |
| 1967 | if (returnCode != amount && errno == 0) |
| 1968 | errno = ENOSPC; |
| 1969 | |
| 1970 | if (returnCode >= 0) |
| 1971 | { |
| 1972 | /* |
| 1973 | * Maintain fileSize and temporary_files_size if it's a temp file. |
| 1974 | * |
| 1975 | * If seekPos is -1 (unknown), this will do nothing; but we could only |
| 1976 | * get here in that state if we're not enforcing temporary_files_size, |
| 1977 | * so we don't care. |
| 1978 | */ |
| 1979 | if (vfdP->fdstate & FD_TEMP_FILE_LIMIT) |
| 1980 | { |
| 1981 | off_t past_write = offset + amount; |
| 1982 | |
| 1983 | if (past_write > vfdP->fileSize) |
| 1984 | { |
| 1985 | temporary_files_size += past_write - vfdP->fileSize; |
| 1986 | vfdP->fileSize = past_write; |
| 1987 | } |
| 1988 | } |
| 1989 | } |
| 1990 | else |
| 1991 | { |
| 1992 | /* |
| 1993 | * See comments in FileRead() |
| 1994 | */ |
| 1995 | #ifdef WIN32 |
| 1996 | DWORD error = GetLastError(); |
| 1997 | |
| 1998 | switch (error) |
| 1999 | { |
| 2000 | case ERROR_NO_SYSTEM_RESOURCES: |
| 2001 | pg_usleep(1000L); |
| 2002 | errno = EINTR; |
| 2003 | break; |
| 2004 | default: |
| 2005 | _dosmaperr(error); |
| 2006 | break; |
| 2007 | } |
| 2008 | #endif |
| 2009 | /* OK to retry if interrupted */ |
| 2010 | if (errno == EINTR) |
| 2011 | goto retry; |
| 2012 | } |
| 2013 | |
| 2014 | return returnCode; |
| 2015 | } |
| 2016 | |
| 2017 | int |
| 2018 | FileSync(File file, uint32 wait_event_info) |
| 2019 | { |
| 2020 | int returnCode; |
| 2021 | |
| 2022 | Assert(FileIsValid(file)); |
| 2023 | |
| 2024 | DO_DB(elog(LOG, "FileSync: %d (%s)" , |
| 2025 | file, VfdCache[file].fileName)); |
| 2026 | |
| 2027 | returnCode = FileAccess(file); |
| 2028 | if (returnCode < 0) |
| 2029 | return returnCode; |
| 2030 | |
| 2031 | pgstat_report_wait_start(wait_event_info); |
| 2032 | returnCode = pg_fsync(VfdCache[file].fd); |
| 2033 | pgstat_report_wait_end(); |
| 2034 | |
| 2035 | return returnCode; |
| 2036 | } |
| 2037 | |
| 2038 | off_t |
| 2039 | FileSize(File file) |
| 2040 | { |
| 2041 | Assert(FileIsValid(file)); |
| 2042 | |
| 2043 | DO_DB(elog(LOG, "FileSize %d (%s)" , |
| 2044 | file, VfdCache[file].fileName)); |
| 2045 | |
| 2046 | if (FileIsNotOpen(file)) |
| 2047 | { |
| 2048 | if (FileAccess(file) < 0) |
| 2049 | return (off_t) -1; |
| 2050 | } |
| 2051 | |
| 2052 | return lseek(VfdCache[file].fd, 0, SEEK_END); |
| 2053 | } |
| 2054 | |
| 2055 | int |
| 2056 | FileTruncate(File file, off_t offset, uint32 wait_event_info) |
| 2057 | { |
| 2058 | int returnCode; |
| 2059 | |
| 2060 | Assert(FileIsValid(file)); |
| 2061 | |
| 2062 | DO_DB(elog(LOG, "FileTruncate %d (%s)" , |
| 2063 | file, VfdCache[file].fileName)); |
| 2064 | |
| 2065 | returnCode = FileAccess(file); |
| 2066 | if (returnCode < 0) |
| 2067 | return returnCode; |
| 2068 | |
| 2069 | pgstat_report_wait_start(wait_event_info); |
| 2070 | returnCode = ftruncate(VfdCache[file].fd, offset); |
| 2071 | pgstat_report_wait_end(); |
| 2072 | |
| 2073 | if (returnCode == 0 && VfdCache[file].fileSize > offset) |
| 2074 | { |
| 2075 | /* adjust our state for truncation of a temp file */ |
| 2076 | Assert(VfdCache[file].fdstate & FD_TEMP_FILE_LIMIT); |
| 2077 | temporary_files_size -= VfdCache[file].fileSize - offset; |
| 2078 | VfdCache[file].fileSize = offset; |
| 2079 | } |
| 2080 | |
| 2081 | return returnCode; |
| 2082 | } |
| 2083 | |
| 2084 | /* |
| 2085 | * Return the pathname associated with an open file. |
| 2086 | * |
| 2087 | * The returned string points to an internal buffer, which is valid until |
| 2088 | * the file is closed. |
| 2089 | */ |
| 2090 | char * |
| 2091 | FilePathName(File file) |
| 2092 | { |
| 2093 | Assert(FileIsValid(file)); |
| 2094 | |
| 2095 | return VfdCache[file].fileName; |
| 2096 | } |
| 2097 | |
| 2098 | /* |
| 2099 | * Return the raw file descriptor of an opened file. |
| 2100 | * |
| 2101 | * The returned file descriptor will be valid until the file is closed, but |
| 2102 | * there are a lot of things that can make that happen. So the caller should |
| 2103 | * be careful not to do much of anything else before it finishes using the |
| 2104 | * returned file descriptor. |
| 2105 | */ |
| 2106 | int |
| 2107 | FileGetRawDesc(File file) |
| 2108 | { |
| 2109 | Assert(FileIsValid(file)); |
| 2110 | return VfdCache[file].fd; |
| 2111 | } |
| 2112 | |
| 2113 | /* |
| 2114 | * FileGetRawFlags - returns the file flags on open(2) |
| 2115 | */ |
| 2116 | int |
| 2117 | FileGetRawFlags(File file) |
| 2118 | { |
| 2119 | Assert(FileIsValid(file)); |
| 2120 | return VfdCache[file].fileFlags; |
| 2121 | } |
| 2122 | |
| 2123 | /* |
| 2124 | * FileGetRawMode - returns the mode bitmask passed to open(2) |
| 2125 | */ |
| 2126 | mode_t |
| 2127 | FileGetRawMode(File file) |
| 2128 | { |
| 2129 | Assert(FileIsValid(file)); |
| 2130 | return VfdCache[file].fileMode; |
| 2131 | } |
| 2132 | |
| 2133 | /* |
| 2134 | * Make room for another allocatedDescs[] array entry if needed and possible. |
| 2135 | * Returns true if an array element is available. |
| 2136 | */ |
| 2137 | static bool |
| 2138 | reserveAllocatedDesc(void) |
| 2139 | { |
| 2140 | AllocateDesc *newDescs; |
| 2141 | int newMax; |
| 2142 | |
| 2143 | /* Quick out if array already has a free slot. */ |
| 2144 | if (numAllocatedDescs < maxAllocatedDescs) |
| 2145 | return true; |
| 2146 | |
| 2147 | /* |
| 2148 | * If the array hasn't yet been created in the current process, initialize |
| 2149 | * it with FD_MINFREE / 2 elements. In many scenarios this is as many as |
| 2150 | * we will ever need, anyway. We don't want to look at max_safe_fds |
| 2151 | * immediately because set_max_safe_fds() may not have run yet. |
| 2152 | */ |
| 2153 | if (allocatedDescs == NULL) |
| 2154 | { |
| 2155 | newMax = FD_MINFREE / 2; |
| 2156 | newDescs = (AllocateDesc *) malloc(newMax * sizeof(AllocateDesc)); |
| 2157 | /* Out of memory already? Treat as fatal error. */ |
| 2158 | if (newDescs == NULL) |
| 2159 | ereport(ERROR, |
| 2160 | (errcode(ERRCODE_OUT_OF_MEMORY), |
| 2161 | errmsg("out of memory" ))); |
| 2162 | allocatedDescs = newDescs; |
| 2163 | maxAllocatedDescs = newMax; |
| 2164 | return true; |
| 2165 | } |
| 2166 | |
| 2167 | /* |
| 2168 | * Consider enlarging the array beyond the initial allocation used above. |
| 2169 | * By the time this happens, max_safe_fds should be known accurately. |
| 2170 | * |
| 2171 | * We mustn't let allocated descriptors hog all the available FDs, and in |
| 2172 | * practice we'd better leave a reasonable number of FDs for VFD use. So |
| 2173 | * set the maximum to max_safe_fds / 2. (This should certainly be at |
| 2174 | * least as large as the initial size, FD_MINFREE / 2.) |
| 2175 | */ |
| 2176 | newMax = max_safe_fds / 2; |
| 2177 | if (newMax > maxAllocatedDescs) |
| 2178 | { |
| 2179 | newDescs = (AllocateDesc *) realloc(allocatedDescs, |
| 2180 | newMax * sizeof(AllocateDesc)); |
| 2181 | /* Treat out-of-memory as a non-fatal error. */ |
| 2182 | if (newDescs == NULL) |
| 2183 | return false; |
| 2184 | allocatedDescs = newDescs; |
| 2185 | maxAllocatedDescs = newMax; |
| 2186 | return true; |
| 2187 | } |
| 2188 | |
| 2189 | /* Can't enlarge allocatedDescs[] any more. */ |
| 2190 | return false; |
| 2191 | } |
| 2192 | |
| 2193 | /* |
| 2194 | * Routines that want to use stdio (ie, FILE*) should use AllocateFile |
| 2195 | * rather than plain fopen(). This lets fd.c deal with freeing FDs if |
| 2196 | * necessary to open the file. When done, call FreeFile rather than fclose. |
| 2197 | * |
| 2198 | * Note that files that will be open for any significant length of time |
| 2199 | * should NOT be handled this way, since they cannot share kernel file |
| 2200 | * descriptors with other files; there is grave risk of running out of FDs |
| 2201 | * if anyone locks down too many FDs. Most callers of this routine are |
| 2202 | * simply reading a config file that they will read and close immediately. |
| 2203 | * |
| 2204 | * fd.c will automatically close all files opened with AllocateFile at |
| 2205 | * transaction commit or abort; this prevents FD leakage if a routine |
| 2206 | * that calls AllocateFile is terminated prematurely by ereport(ERROR). |
| 2207 | * |
| 2208 | * Ideally this should be the *only* direct call of fopen() in the backend. |
| 2209 | */ |
| 2210 | FILE * |
| 2211 | AllocateFile(const char *name, const char *mode) |
| 2212 | { |
| 2213 | FILE *file; |
| 2214 | |
| 2215 | DO_DB(elog(LOG, "AllocateFile: Allocated %d (%s)" , |
| 2216 | numAllocatedDescs, name)); |
| 2217 | |
| 2218 | /* Can we allocate another non-virtual FD? */ |
| 2219 | if (!reserveAllocatedDesc()) |
| 2220 | ereport(ERROR, |
| 2221 | (errcode(ERRCODE_INSUFFICIENT_RESOURCES), |
| 2222 | errmsg("exceeded maxAllocatedDescs (%d) while trying to open file \"%s\"" , |
| 2223 | maxAllocatedDescs, name))); |
| 2224 | |
| 2225 | /* Close excess kernel FDs. */ |
| 2226 | ReleaseLruFiles(); |
| 2227 | |
| 2228 | TryAgain: |
| 2229 | if ((file = fopen(name, mode)) != NULL) |
| 2230 | { |
| 2231 | AllocateDesc *desc = &allocatedDescs[numAllocatedDescs]; |
| 2232 | |
| 2233 | desc->kind = AllocateDescFile; |
| 2234 | desc->desc.file = file; |
| 2235 | desc->create_subid = GetCurrentSubTransactionId(); |
| 2236 | numAllocatedDescs++; |
| 2237 | return desc->desc.file; |
| 2238 | } |
| 2239 | |
| 2240 | if (errno == EMFILE || errno == ENFILE) |
| 2241 | { |
| 2242 | int save_errno = errno; |
| 2243 | |
| 2244 | ereport(LOG, |
| 2245 | (errcode(ERRCODE_INSUFFICIENT_RESOURCES), |
| 2246 | errmsg("out of file descriptors: %m; release and retry" ))); |
| 2247 | errno = 0; |
| 2248 | if (ReleaseLruFile()) |
| 2249 | goto TryAgain; |
| 2250 | errno = save_errno; |
| 2251 | } |
| 2252 | |
| 2253 | return NULL; |
| 2254 | } |
| 2255 | |
| 2256 | /* |
| 2257 | * Open a file with OpenTransientFilePerm() and pass default file mode for |
| 2258 | * the fileMode parameter. |
| 2259 | */ |
| 2260 | int |
| 2261 | OpenTransientFile(const char *fileName, int fileFlags) |
| 2262 | { |
| 2263 | return OpenTransientFilePerm(fileName, fileFlags, pg_file_create_mode); |
| 2264 | } |
| 2265 | |
| 2266 | /* |
| 2267 | * Like AllocateFile, but returns an unbuffered fd like open(2) |
| 2268 | */ |
| 2269 | int |
| 2270 | OpenTransientFilePerm(const char *fileName, int fileFlags, mode_t fileMode) |
| 2271 | { |
| 2272 | int fd; |
| 2273 | |
| 2274 | DO_DB(elog(LOG, "OpenTransientFile: Allocated %d (%s)" , |
| 2275 | numAllocatedDescs, fileName)); |
| 2276 | |
| 2277 | /* Can we allocate another non-virtual FD? */ |
| 2278 | if (!reserveAllocatedDesc()) |
| 2279 | ereport(ERROR, |
| 2280 | (errcode(ERRCODE_INSUFFICIENT_RESOURCES), |
| 2281 | errmsg("exceeded maxAllocatedDescs (%d) while trying to open file \"%s\"" , |
| 2282 | maxAllocatedDescs, fileName))); |
| 2283 | |
| 2284 | /* Close excess kernel FDs. */ |
| 2285 | ReleaseLruFiles(); |
| 2286 | |
| 2287 | fd = BasicOpenFilePerm(fileName, fileFlags, fileMode); |
| 2288 | |
| 2289 | if (fd >= 0) |
| 2290 | { |
| 2291 | AllocateDesc *desc = &allocatedDescs[numAllocatedDescs]; |
| 2292 | |
| 2293 | desc->kind = AllocateDescRawFD; |
| 2294 | desc->desc.fd = fd; |
| 2295 | desc->create_subid = GetCurrentSubTransactionId(); |
| 2296 | numAllocatedDescs++; |
| 2297 | |
| 2298 | return fd; |
| 2299 | } |
| 2300 | |
| 2301 | return -1; /* failure */ |
| 2302 | } |
| 2303 | |
| 2304 | /* |
| 2305 | * Routines that want to initiate a pipe stream should use OpenPipeStream |
| 2306 | * rather than plain popen(). This lets fd.c deal with freeing FDs if |
| 2307 | * necessary. When done, call ClosePipeStream rather than pclose. |
| 2308 | * |
| 2309 | * This function also ensures that the popen'd program is run with default |
| 2310 | * SIGPIPE processing, rather than the SIG_IGN setting the backend normally |
| 2311 | * uses. This ensures desirable response to, eg, closing a read pipe early. |
| 2312 | */ |
| 2313 | FILE * |
| 2314 | OpenPipeStream(const char *command, const char *mode) |
| 2315 | { |
| 2316 | FILE *file; |
| 2317 | int save_errno; |
| 2318 | |
| 2319 | DO_DB(elog(LOG, "OpenPipeStream: Allocated %d (%s)" , |
| 2320 | numAllocatedDescs, command)); |
| 2321 | |
| 2322 | /* Can we allocate another non-virtual FD? */ |
| 2323 | if (!reserveAllocatedDesc()) |
| 2324 | ereport(ERROR, |
| 2325 | (errcode(ERRCODE_INSUFFICIENT_RESOURCES), |
| 2326 | errmsg("exceeded maxAllocatedDescs (%d) while trying to execute command \"%s\"" , |
| 2327 | maxAllocatedDescs, command))); |
| 2328 | |
| 2329 | /* Close excess kernel FDs. */ |
| 2330 | ReleaseLruFiles(); |
| 2331 | |
| 2332 | TryAgain: |
| 2333 | fflush(stdout); |
| 2334 | fflush(stderr); |
| 2335 | pqsignal(SIGPIPE, SIG_DFL); |
| 2336 | errno = 0; |
| 2337 | file = popen(command, mode); |
| 2338 | save_errno = errno; |
| 2339 | pqsignal(SIGPIPE, SIG_IGN); |
| 2340 | errno = save_errno; |
| 2341 | if (file != NULL) |
| 2342 | { |
| 2343 | AllocateDesc *desc = &allocatedDescs[numAllocatedDescs]; |
| 2344 | |
| 2345 | desc->kind = AllocateDescPipe; |
| 2346 | desc->desc.file = file; |
| 2347 | desc->create_subid = GetCurrentSubTransactionId(); |
| 2348 | numAllocatedDescs++; |
| 2349 | return desc->desc.file; |
| 2350 | } |
| 2351 | |
| 2352 | if (errno == EMFILE || errno == ENFILE) |
| 2353 | { |
| 2354 | ereport(LOG, |
| 2355 | (errcode(ERRCODE_INSUFFICIENT_RESOURCES), |
| 2356 | errmsg("out of file descriptors: %m; release and retry" ))); |
| 2357 | if (ReleaseLruFile()) |
| 2358 | goto TryAgain; |
| 2359 | errno = save_errno; |
| 2360 | } |
| 2361 | |
| 2362 | return NULL; |
| 2363 | } |
| 2364 | |
| 2365 | /* |
| 2366 | * Free an AllocateDesc of any type. |
| 2367 | * |
| 2368 | * The argument *must* point into the allocatedDescs[] array. |
| 2369 | */ |
| 2370 | static int |
| 2371 | FreeDesc(AllocateDesc *desc) |
| 2372 | { |
| 2373 | int result; |
| 2374 | |
| 2375 | /* Close the underlying object */ |
| 2376 | switch (desc->kind) |
| 2377 | { |
| 2378 | case AllocateDescFile: |
| 2379 | result = fclose(desc->desc.file); |
| 2380 | break; |
| 2381 | case AllocateDescPipe: |
| 2382 | result = pclose(desc->desc.file); |
| 2383 | break; |
| 2384 | case AllocateDescDir: |
| 2385 | result = closedir(desc->desc.dir); |
| 2386 | break; |
| 2387 | case AllocateDescRawFD: |
| 2388 | result = close(desc->desc.fd); |
| 2389 | break; |
| 2390 | default: |
| 2391 | elog(ERROR, "AllocateDesc kind not recognized" ); |
| 2392 | result = 0; /* keep compiler quiet */ |
| 2393 | break; |
| 2394 | } |
| 2395 | |
| 2396 | /* Compact storage in the allocatedDescs array */ |
| 2397 | numAllocatedDescs--; |
| 2398 | *desc = allocatedDescs[numAllocatedDescs]; |
| 2399 | |
| 2400 | return result; |
| 2401 | } |
| 2402 | |
| 2403 | /* |
| 2404 | * Close a file returned by AllocateFile. |
| 2405 | * |
| 2406 | * Note we do not check fclose's return value --- it is up to the caller |
| 2407 | * to handle close errors. |
| 2408 | */ |
| 2409 | int |
| 2410 | FreeFile(FILE *file) |
| 2411 | { |
| 2412 | int i; |
| 2413 | |
| 2414 | DO_DB(elog(LOG, "FreeFile: Allocated %d" , numAllocatedDescs)); |
| 2415 | |
| 2416 | /* Remove file from list of allocated files, if it's present */ |
| 2417 | for (i = numAllocatedDescs; --i >= 0;) |
| 2418 | { |
| 2419 | AllocateDesc *desc = &allocatedDescs[i]; |
| 2420 | |
| 2421 | if (desc->kind == AllocateDescFile && desc->desc.file == file) |
| 2422 | return FreeDesc(desc); |
| 2423 | } |
| 2424 | |
| 2425 | /* Only get here if someone passes us a file not in allocatedDescs */ |
| 2426 | elog(WARNING, "file passed to FreeFile was not obtained from AllocateFile" ); |
| 2427 | |
| 2428 | return fclose(file); |
| 2429 | } |
| 2430 | |
| 2431 | /* |
| 2432 | * Close a file returned by OpenTransientFile. |
| 2433 | * |
| 2434 | * Note we do not check close's return value --- it is up to the caller |
| 2435 | * to handle close errors. |
| 2436 | */ |
| 2437 | int |
| 2438 | CloseTransientFile(int fd) |
| 2439 | { |
| 2440 | int i; |
| 2441 | |
| 2442 | DO_DB(elog(LOG, "CloseTransientFile: Allocated %d" , numAllocatedDescs)); |
| 2443 | |
| 2444 | /* Remove fd from list of allocated files, if it's present */ |
| 2445 | for (i = numAllocatedDescs; --i >= 0;) |
| 2446 | { |
| 2447 | AllocateDesc *desc = &allocatedDescs[i]; |
| 2448 | |
| 2449 | if (desc->kind == AllocateDescRawFD && desc->desc.fd == fd) |
| 2450 | return FreeDesc(desc); |
| 2451 | } |
| 2452 | |
| 2453 | /* Only get here if someone passes us a file not in allocatedDescs */ |
| 2454 | elog(WARNING, "fd passed to CloseTransientFile was not obtained from OpenTransientFile" ); |
| 2455 | |
| 2456 | return close(fd); |
| 2457 | } |
| 2458 | |
| 2459 | /* |
| 2460 | * Routines that want to use <dirent.h> (ie, DIR*) should use AllocateDir |
| 2461 | * rather than plain opendir(). This lets fd.c deal with freeing FDs if |
| 2462 | * necessary to open the directory, and with closing it after an elog. |
| 2463 | * When done, call FreeDir rather than closedir. |
| 2464 | * |
| 2465 | * Returns NULL, with errno set, on failure. Note that failure detection |
| 2466 | * is commonly left to the following call of ReadDir or ReadDirExtended; |
| 2467 | * see the comments for ReadDir. |
| 2468 | * |
| 2469 | * Ideally this should be the *only* direct call of opendir() in the backend. |
| 2470 | */ |
| 2471 | DIR * |
| 2472 | AllocateDir(const char *dirname) |
| 2473 | { |
| 2474 | DIR *dir; |
| 2475 | |
| 2476 | DO_DB(elog(LOG, "AllocateDir: Allocated %d (%s)" , |
| 2477 | numAllocatedDescs, dirname)); |
| 2478 | |
| 2479 | /* Can we allocate another non-virtual FD? */ |
| 2480 | if (!reserveAllocatedDesc()) |
| 2481 | ereport(ERROR, |
| 2482 | (errcode(ERRCODE_INSUFFICIENT_RESOURCES), |
| 2483 | errmsg("exceeded maxAllocatedDescs (%d) while trying to open directory \"%s\"" , |
| 2484 | maxAllocatedDescs, dirname))); |
| 2485 | |
| 2486 | /* Close excess kernel FDs. */ |
| 2487 | ReleaseLruFiles(); |
| 2488 | |
| 2489 | TryAgain: |
| 2490 | if ((dir = opendir(dirname)) != NULL) |
| 2491 | { |
| 2492 | AllocateDesc *desc = &allocatedDescs[numAllocatedDescs]; |
| 2493 | |
| 2494 | desc->kind = AllocateDescDir; |
| 2495 | desc->desc.dir = dir; |
| 2496 | desc->create_subid = GetCurrentSubTransactionId(); |
| 2497 | numAllocatedDescs++; |
| 2498 | return desc->desc.dir; |
| 2499 | } |
| 2500 | |
| 2501 | if (errno == EMFILE || errno == ENFILE) |
| 2502 | { |
| 2503 | int save_errno = errno; |
| 2504 | |
| 2505 | ereport(LOG, |
| 2506 | (errcode(ERRCODE_INSUFFICIENT_RESOURCES), |
| 2507 | errmsg("out of file descriptors: %m; release and retry" ))); |
| 2508 | errno = 0; |
| 2509 | if (ReleaseLruFile()) |
| 2510 | goto TryAgain; |
| 2511 | errno = save_errno; |
| 2512 | } |
| 2513 | |
| 2514 | return NULL; |
| 2515 | } |
| 2516 | |
| 2517 | /* |
| 2518 | * Read a directory opened with AllocateDir, ereport'ing any error. |
| 2519 | * |
| 2520 | * This is easier to use than raw readdir() since it takes care of some |
| 2521 | * otherwise rather tedious and error-prone manipulation of errno. Also, |
| 2522 | * if you are happy with a generic error message for AllocateDir failure, |
| 2523 | * you can just do |
| 2524 | * |
| 2525 | * dir = AllocateDir(path); |
| 2526 | * while ((dirent = ReadDir(dir, path)) != NULL) |
| 2527 | * process dirent; |
| 2528 | * FreeDir(dir); |
| 2529 | * |
| 2530 | * since a NULL dir parameter is taken as indicating AllocateDir failed. |
| 2531 | * (Make sure errno isn't changed between AllocateDir and ReadDir if you |
| 2532 | * use this shortcut.) |
| 2533 | * |
| 2534 | * The pathname passed to AllocateDir must be passed to this routine too, |
| 2535 | * but it is only used for error reporting. |
| 2536 | */ |
| 2537 | struct dirent * |
| 2538 | ReadDir(DIR *dir, const char *dirname) |
| 2539 | { |
| 2540 | return ReadDirExtended(dir, dirname, ERROR); |
| 2541 | } |
| 2542 | |
| 2543 | /* |
| 2544 | * Alternate version of ReadDir that allows caller to specify the elevel |
| 2545 | * for any error report (whether it's reporting an initial failure of |
| 2546 | * AllocateDir or a subsequent directory read failure). |
| 2547 | * |
| 2548 | * If elevel < ERROR, returns NULL after any error. With the normal coding |
| 2549 | * pattern, this will result in falling out of the loop immediately as |
| 2550 | * though the directory contained no (more) entries. |
| 2551 | */ |
| 2552 | struct dirent * |
| 2553 | ReadDirExtended(DIR *dir, const char *dirname, int elevel) |
| 2554 | { |
| 2555 | struct dirent *dent; |
| 2556 | |
| 2557 | /* Give a generic message for AllocateDir failure, if caller didn't */ |
| 2558 | if (dir == NULL) |
| 2559 | { |
| 2560 | ereport(elevel, |
| 2561 | (errcode_for_file_access(), |
| 2562 | errmsg("could not open directory \"%s\": %m" , |
| 2563 | dirname))); |
| 2564 | return NULL; |
| 2565 | } |
| 2566 | |
| 2567 | errno = 0; |
| 2568 | if ((dent = readdir(dir)) != NULL) |
| 2569 | return dent; |
| 2570 | |
| 2571 | if (errno) |
| 2572 | ereport(elevel, |
| 2573 | (errcode_for_file_access(), |
| 2574 | errmsg("could not read directory \"%s\": %m" , |
| 2575 | dirname))); |
| 2576 | return NULL; |
| 2577 | } |
| 2578 | |
| 2579 | /* |
| 2580 | * Close a directory opened with AllocateDir. |
| 2581 | * |
| 2582 | * Returns closedir's return value (with errno set if it's not 0). |
| 2583 | * Note we do not check the return value --- it is up to the caller |
| 2584 | * to handle close errors if wanted. |
| 2585 | * |
| 2586 | * Does nothing if dir == NULL; we assume that directory open failure was |
| 2587 | * already reported if desired. |
| 2588 | */ |
| 2589 | int |
| 2590 | FreeDir(DIR *dir) |
| 2591 | { |
| 2592 | int i; |
| 2593 | |
| 2594 | /* Nothing to do if AllocateDir failed */ |
| 2595 | if (dir == NULL) |
| 2596 | return 0; |
| 2597 | |
| 2598 | DO_DB(elog(LOG, "FreeDir: Allocated %d" , numAllocatedDescs)); |
| 2599 | |
| 2600 | /* Remove dir from list of allocated dirs, if it's present */ |
| 2601 | for (i = numAllocatedDescs; --i >= 0;) |
| 2602 | { |
| 2603 | AllocateDesc *desc = &allocatedDescs[i]; |
| 2604 | |
| 2605 | if (desc->kind == AllocateDescDir && desc->desc.dir == dir) |
| 2606 | return FreeDesc(desc); |
| 2607 | } |
| 2608 | |
| 2609 | /* Only get here if someone passes us a dir not in allocatedDescs */ |
| 2610 | elog(WARNING, "dir passed to FreeDir was not obtained from AllocateDir" ); |
| 2611 | |
| 2612 | return closedir(dir); |
| 2613 | } |
| 2614 | |
| 2615 | |
| 2616 | /* |
| 2617 | * Close a pipe stream returned by OpenPipeStream. |
| 2618 | */ |
| 2619 | int |
| 2620 | ClosePipeStream(FILE *file) |
| 2621 | { |
| 2622 | int i; |
| 2623 | |
| 2624 | DO_DB(elog(LOG, "ClosePipeStream: Allocated %d" , numAllocatedDescs)); |
| 2625 | |
| 2626 | /* Remove file from list of allocated files, if it's present */ |
| 2627 | for (i = numAllocatedDescs; --i >= 0;) |
| 2628 | { |
| 2629 | AllocateDesc *desc = &allocatedDescs[i]; |
| 2630 | |
| 2631 | if (desc->kind == AllocateDescPipe && desc->desc.file == file) |
| 2632 | return FreeDesc(desc); |
| 2633 | } |
| 2634 | |
| 2635 | /* Only get here if someone passes us a file not in allocatedDescs */ |
| 2636 | elog(WARNING, "file passed to ClosePipeStream was not obtained from OpenPipeStream" ); |
| 2637 | |
| 2638 | return pclose(file); |
| 2639 | } |
| 2640 | |
| 2641 | /* |
| 2642 | * closeAllVfds |
| 2643 | * |
| 2644 | * Force all VFDs into the physically-closed state, so that the fewest |
| 2645 | * possible number of kernel file descriptors are in use. There is no |
| 2646 | * change in the logical state of the VFDs. |
| 2647 | */ |
| 2648 | void |
| 2649 | closeAllVfds(void) |
| 2650 | { |
| 2651 | Index i; |
| 2652 | |
| 2653 | if (SizeVfdCache > 0) |
| 2654 | { |
| 2655 | Assert(FileIsNotOpen(0)); /* Make sure ring not corrupted */ |
| 2656 | for (i = 1; i < SizeVfdCache; i++) |
| 2657 | { |
| 2658 | if (!FileIsNotOpen(i)) |
| 2659 | LruDelete(i); |
| 2660 | } |
| 2661 | } |
| 2662 | } |
| 2663 | |
| 2664 | |
| 2665 | /* |
| 2666 | * SetTempTablespaces |
| 2667 | * |
| 2668 | * Define a list (actually an array) of OIDs of tablespaces to use for |
| 2669 | * temporary files. This list will be used until end of transaction, |
| 2670 | * unless this function is called again before then. It is caller's |
| 2671 | * responsibility that the passed-in array has adequate lifespan (typically |
| 2672 | * it'd be allocated in TopTransactionContext). |
| 2673 | */ |
| 2674 | void |
| 2675 | SetTempTablespaces(Oid *tableSpaces, int numSpaces) |
| 2676 | { |
| 2677 | Assert(numSpaces >= 0); |
| 2678 | tempTableSpaces = tableSpaces; |
| 2679 | numTempTableSpaces = numSpaces; |
| 2680 | |
| 2681 | /* |
| 2682 | * Select a random starting point in the list. This is to minimize |
| 2683 | * conflicts between backends that are most likely sharing the same list |
| 2684 | * of temp tablespaces. Note that if we create multiple temp files in the |
| 2685 | * same transaction, we'll advance circularly through the list --- this |
| 2686 | * ensures that large temporary sort files are nicely spread across all |
| 2687 | * available tablespaces. |
| 2688 | */ |
| 2689 | if (numSpaces > 1) |
| 2690 | nextTempTableSpace = random() % numSpaces; |
| 2691 | else |
| 2692 | nextTempTableSpace = 0; |
| 2693 | } |
| 2694 | |
| 2695 | /* |
| 2696 | * TempTablespacesAreSet |
| 2697 | * |
| 2698 | * Returns true if SetTempTablespaces has been called in current transaction. |
| 2699 | * (This is just so that tablespaces.c doesn't need its own per-transaction |
| 2700 | * state.) |
| 2701 | */ |
| 2702 | bool |
| 2703 | TempTablespacesAreSet(void) |
| 2704 | { |
| 2705 | return (numTempTableSpaces >= 0); |
| 2706 | } |
| 2707 | |
| 2708 | /* |
| 2709 | * GetTempTablespaces |
| 2710 | * |
| 2711 | * Populate an array with the OIDs of the tablespaces that should be used for |
| 2712 | * temporary files. Return the number that were copied into the output array. |
| 2713 | */ |
| 2714 | int |
| 2715 | GetTempTablespaces(Oid *tableSpaces, int numSpaces) |
| 2716 | { |
| 2717 | int i; |
| 2718 | |
| 2719 | Assert(TempTablespacesAreSet()); |
| 2720 | for (i = 0; i < numTempTableSpaces && i < numSpaces; ++i) |
| 2721 | tableSpaces[i] = tempTableSpaces[i]; |
| 2722 | |
| 2723 | return i; |
| 2724 | } |
| 2725 | |
| 2726 | /* |
| 2727 | * GetNextTempTableSpace |
| 2728 | * |
| 2729 | * Select the next temp tablespace to use. A result of InvalidOid means |
| 2730 | * to use the current database's default tablespace. |
| 2731 | */ |
| 2732 | Oid |
| 2733 | GetNextTempTableSpace(void) |
| 2734 | { |
| 2735 | if (numTempTableSpaces > 0) |
| 2736 | { |
| 2737 | /* Advance nextTempTableSpace counter with wraparound */ |
| 2738 | if (++nextTempTableSpace >= numTempTableSpaces) |
| 2739 | nextTempTableSpace = 0; |
| 2740 | return tempTableSpaces[nextTempTableSpace]; |
| 2741 | } |
| 2742 | return InvalidOid; |
| 2743 | } |
| 2744 | |
| 2745 | |
| 2746 | /* |
| 2747 | * AtEOSubXact_Files |
| 2748 | * |
| 2749 | * Take care of subtransaction commit/abort. At abort, we close temp files |
| 2750 | * that the subtransaction may have opened. At commit, we reassign the |
| 2751 | * files that were opened to the parent subtransaction. |
| 2752 | */ |
| 2753 | void |
| 2754 | AtEOSubXact_Files(bool isCommit, SubTransactionId mySubid, |
| 2755 | SubTransactionId parentSubid) |
| 2756 | { |
| 2757 | Index i; |
| 2758 | |
| 2759 | for (i = 0; i < numAllocatedDescs; i++) |
| 2760 | { |
| 2761 | if (allocatedDescs[i].create_subid == mySubid) |
| 2762 | { |
| 2763 | if (isCommit) |
| 2764 | allocatedDescs[i].create_subid = parentSubid; |
| 2765 | else |
| 2766 | { |
| 2767 | /* have to recheck the item after FreeDesc (ugly) */ |
| 2768 | FreeDesc(&allocatedDescs[i--]); |
| 2769 | } |
| 2770 | } |
| 2771 | } |
| 2772 | } |
| 2773 | |
| 2774 | /* |
| 2775 | * AtEOXact_Files |
| 2776 | * |
| 2777 | * This routine is called during transaction commit or abort. All still-open |
| 2778 | * per-transaction temporary file VFDs are closed, which also causes the |
| 2779 | * underlying files to be deleted (although they should've been closed already |
| 2780 | * by the ResourceOwner cleanup). Furthermore, all "allocated" stdio files are |
| 2781 | * closed. We also forget any transaction-local temp tablespace list. |
| 2782 | * |
| 2783 | * The isCommit flag is used only to decide whether to emit warnings about |
| 2784 | * unclosed files. |
| 2785 | */ |
| 2786 | void |
| 2787 | AtEOXact_Files(bool isCommit) |
| 2788 | { |
| 2789 | CleanupTempFiles(isCommit, false); |
| 2790 | tempTableSpaces = NULL; |
| 2791 | numTempTableSpaces = -1; |
| 2792 | } |
| 2793 | |
| 2794 | /* |
| 2795 | * AtProcExit_Files |
| 2796 | * |
| 2797 | * on_proc_exit hook to clean up temp files during backend shutdown. |
| 2798 | * Here, we want to clean up *all* temp files including interXact ones. |
| 2799 | */ |
| 2800 | static void |
| 2801 | AtProcExit_Files(int code, Datum arg) |
| 2802 | { |
| 2803 | CleanupTempFiles(false, true); |
| 2804 | } |
| 2805 | |
| 2806 | /* |
| 2807 | * Close temporary files and delete their underlying files. |
| 2808 | * |
| 2809 | * isCommit: if true, this is normal transaction commit, and we don't |
| 2810 | * expect any remaining files; warn if there are some. |
| 2811 | * |
| 2812 | * isProcExit: if true, this is being called as the backend process is |
| 2813 | * exiting. If that's the case, we should remove all temporary files; if |
| 2814 | * that's not the case, we are being called for transaction commit/abort |
| 2815 | * and should only remove transaction-local temp files. In either case, |
| 2816 | * also clean up "allocated" stdio files, dirs and fds. |
| 2817 | */ |
| 2818 | static void |
| 2819 | CleanupTempFiles(bool isCommit, bool isProcExit) |
| 2820 | { |
| 2821 | Index i; |
| 2822 | |
| 2823 | /* |
| 2824 | * Careful here: at proc_exit we need extra cleanup, not just |
| 2825 | * xact_temporary files. |
| 2826 | */ |
| 2827 | if (isProcExit || have_xact_temporary_files) |
| 2828 | { |
| 2829 | Assert(FileIsNotOpen(0)); /* Make sure ring not corrupted */ |
| 2830 | for (i = 1; i < SizeVfdCache; i++) |
| 2831 | { |
| 2832 | unsigned short fdstate = VfdCache[i].fdstate; |
| 2833 | |
| 2834 | if (((fdstate & FD_DELETE_AT_CLOSE) || (fdstate & FD_CLOSE_AT_EOXACT)) && |
| 2835 | VfdCache[i].fileName != NULL) |
| 2836 | { |
| 2837 | /* |
| 2838 | * If we're in the process of exiting a backend process, close |
| 2839 | * all temporary files. Otherwise, only close temporary files |
| 2840 | * local to the current transaction. They should be closed by |
| 2841 | * the ResourceOwner mechanism already, so this is just a |
| 2842 | * debugging cross-check. |
| 2843 | */ |
| 2844 | if (isProcExit) |
| 2845 | FileClose(i); |
| 2846 | else if (fdstate & FD_CLOSE_AT_EOXACT) |
| 2847 | { |
| 2848 | elog(WARNING, |
| 2849 | "temporary file %s not closed at end-of-transaction" , |
| 2850 | VfdCache[i].fileName); |
| 2851 | FileClose(i); |
| 2852 | } |
| 2853 | } |
| 2854 | } |
| 2855 | |
| 2856 | have_xact_temporary_files = false; |
| 2857 | } |
| 2858 | |
| 2859 | /* Complain if any allocated files remain open at commit. */ |
| 2860 | if (isCommit && numAllocatedDescs > 0) |
| 2861 | elog(WARNING, "%d temporary files and directories not closed at end-of-transaction" , |
| 2862 | numAllocatedDescs); |
| 2863 | |
| 2864 | /* Clean up "allocated" stdio files, dirs and fds. */ |
| 2865 | while (numAllocatedDescs > 0) |
| 2866 | FreeDesc(&allocatedDescs[0]); |
| 2867 | } |
| 2868 | |
| 2869 | |
| 2870 | /* |
| 2871 | * Remove temporary and temporary relation files left over from a prior |
| 2872 | * postmaster session |
| 2873 | * |
| 2874 | * This should be called during postmaster startup. It will forcibly |
| 2875 | * remove any leftover files created by OpenTemporaryFile and any leftover |
| 2876 | * temporary relation files created by mdcreate. |
| 2877 | * |
| 2878 | * NOTE: we could, but don't, call this during a post-backend-crash restart |
| 2879 | * cycle. The argument for not doing it is that someone might want to examine |
| 2880 | * the temp files for debugging purposes. This does however mean that |
| 2881 | * OpenTemporaryFile had better allow for collision with an existing temp |
| 2882 | * file name. |
| 2883 | * |
| 2884 | * NOTE: this function and its subroutines generally report syscall failures |
| 2885 | * with ereport(LOG) and keep going. Removing temp files is not so critical |
| 2886 | * that we should fail to start the database when we can't do it. |
| 2887 | */ |
| 2888 | void |
| 2889 | RemovePgTempFiles(void) |
| 2890 | { |
| 2891 | char temp_path[MAXPGPATH + 10 + sizeof(TABLESPACE_VERSION_DIRECTORY) + sizeof(PG_TEMP_FILES_DIR)]; |
| 2892 | DIR *spc_dir; |
| 2893 | struct dirent *spc_de; |
| 2894 | |
| 2895 | /* |
| 2896 | * First process temp files in pg_default ($PGDATA/base) |
| 2897 | */ |
| 2898 | snprintf(temp_path, sizeof(temp_path), "base/%s" , PG_TEMP_FILES_DIR); |
| 2899 | RemovePgTempFilesInDir(temp_path, true, false); |
| 2900 | RemovePgTempRelationFiles("base" ); |
| 2901 | |
| 2902 | /* |
| 2903 | * Cycle through temp directories for all non-default tablespaces. |
| 2904 | */ |
| 2905 | spc_dir = AllocateDir("pg_tblspc" ); |
| 2906 | |
| 2907 | while ((spc_de = ReadDirExtended(spc_dir, "pg_tblspc" , LOG)) != NULL) |
| 2908 | { |
| 2909 | if (strcmp(spc_de->d_name, "." ) == 0 || |
| 2910 | strcmp(spc_de->d_name, ".." ) == 0) |
| 2911 | continue; |
| 2912 | |
| 2913 | snprintf(temp_path, sizeof(temp_path), "pg_tblspc/%s/%s/%s" , |
| 2914 | spc_de->d_name, TABLESPACE_VERSION_DIRECTORY, PG_TEMP_FILES_DIR); |
| 2915 | RemovePgTempFilesInDir(temp_path, true, false); |
| 2916 | |
| 2917 | snprintf(temp_path, sizeof(temp_path), "pg_tblspc/%s/%s" , |
| 2918 | spc_de->d_name, TABLESPACE_VERSION_DIRECTORY); |
| 2919 | RemovePgTempRelationFiles(temp_path); |
| 2920 | } |
| 2921 | |
| 2922 | FreeDir(spc_dir); |
| 2923 | |
| 2924 | /* |
| 2925 | * In EXEC_BACKEND case there is a pgsql_tmp directory at the top level of |
| 2926 | * DataDir as well. |
| 2927 | */ |
| 2928 | #ifdef EXEC_BACKEND |
| 2929 | RemovePgTempFilesInDir(PG_TEMP_FILES_DIR, true, false); |
| 2930 | #endif |
| 2931 | } |
| 2932 | |
| 2933 | /* |
| 2934 | * Process one pgsql_tmp directory for RemovePgTempFiles. |
| 2935 | * |
| 2936 | * If missing_ok is true, it's all right for the named directory to not exist. |
| 2937 | * Any other problem results in a LOG message. (missing_ok should be true at |
| 2938 | * the top level, since pgsql_tmp directories are not created until needed.) |
| 2939 | * |
| 2940 | * At the top level, this should be called with unlink_all = false, so that |
| 2941 | * only files matching the temporary name prefix will be unlinked. When |
| 2942 | * recursing it will be called with unlink_all = true to unlink everything |
| 2943 | * under a top-level temporary directory. |
| 2944 | * |
| 2945 | * (These two flags could be replaced by one, but it seems clearer to keep |
| 2946 | * them separate.) |
| 2947 | */ |
| 2948 | static void |
| 2949 | RemovePgTempFilesInDir(const char *tmpdirname, bool missing_ok, bool unlink_all) |
| 2950 | { |
| 2951 | DIR *temp_dir; |
| 2952 | struct dirent *temp_de; |
| 2953 | char rm_path[MAXPGPATH * 2]; |
| 2954 | |
| 2955 | temp_dir = AllocateDir(tmpdirname); |
| 2956 | |
| 2957 | if (temp_dir == NULL && errno == ENOENT && missing_ok) |
| 2958 | return; |
| 2959 | |
| 2960 | while ((temp_de = ReadDirExtended(temp_dir, tmpdirname, LOG)) != NULL) |
| 2961 | { |
| 2962 | if (strcmp(temp_de->d_name, "." ) == 0 || |
| 2963 | strcmp(temp_de->d_name, ".." ) == 0) |
| 2964 | continue; |
| 2965 | |
| 2966 | snprintf(rm_path, sizeof(rm_path), "%s/%s" , |
| 2967 | tmpdirname, temp_de->d_name); |
| 2968 | |
| 2969 | if (unlink_all || |
| 2970 | strncmp(temp_de->d_name, |
| 2971 | PG_TEMP_FILE_PREFIX, |
| 2972 | strlen(PG_TEMP_FILE_PREFIX)) == 0) |
| 2973 | { |
| 2974 | struct stat statbuf; |
| 2975 | |
| 2976 | if (lstat(rm_path, &statbuf) < 0) |
| 2977 | { |
| 2978 | ereport(LOG, |
| 2979 | (errcode_for_file_access(), |
| 2980 | errmsg("could not stat file \"%s\": %m" , rm_path))); |
| 2981 | continue; |
| 2982 | } |
| 2983 | |
| 2984 | if (S_ISDIR(statbuf.st_mode)) |
| 2985 | { |
| 2986 | /* recursively remove contents, then directory itself */ |
| 2987 | RemovePgTempFilesInDir(rm_path, false, true); |
| 2988 | |
| 2989 | if (rmdir(rm_path) < 0) |
| 2990 | ereport(LOG, |
| 2991 | (errcode_for_file_access(), |
| 2992 | errmsg("could not remove directory \"%s\": %m" , |
| 2993 | rm_path))); |
| 2994 | } |
| 2995 | else |
| 2996 | { |
| 2997 | if (unlink(rm_path) < 0) |
| 2998 | ereport(LOG, |
| 2999 | (errcode_for_file_access(), |
| 3000 | errmsg("could not remove file \"%s\": %m" , |
| 3001 | rm_path))); |
| 3002 | } |
| 3003 | } |
| 3004 | else |
| 3005 | ereport(LOG, |
| 3006 | (errmsg("unexpected file found in temporary-files directory: \"%s\"" , |
| 3007 | rm_path))); |
| 3008 | } |
| 3009 | |
| 3010 | FreeDir(temp_dir); |
| 3011 | } |
| 3012 | |
| 3013 | /* Process one tablespace directory, look for per-DB subdirectories */ |
| 3014 | static void |
| 3015 | RemovePgTempRelationFiles(const char *tsdirname) |
| 3016 | { |
| 3017 | DIR *ts_dir; |
| 3018 | struct dirent *de; |
| 3019 | char dbspace_path[MAXPGPATH * 2]; |
| 3020 | |
| 3021 | ts_dir = AllocateDir(tsdirname); |
| 3022 | |
| 3023 | while ((de = ReadDirExtended(ts_dir, tsdirname, LOG)) != NULL) |
| 3024 | { |
| 3025 | /* |
| 3026 | * We're only interested in the per-database directories, which have |
| 3027 | * numeric names. Note that this code will also (properly) ignore "." |
| 3028 | * and "..". |
| 3029 | */ |
| 3030 | if (strspn(de->d_name, "0123456789" ) != strlen(de->d_name)) |
| 3031 | continue; |
| 3032 | |
| 3033 | snprintf(dbspace_path, sizeof(dbspace_path), "%s/%s" , |
| 3034 | tsdirname, de->d_name); |
| 3035 | RemovePgTempRelationFilesInDbspace(dbspace_path); |
| 3036 | } |
| 3037 | |
| 3038 | FreeDir(ts_dir); |
| 3039 | } |
| 3040 | |
| 3041 | /* Process one per-dbspace directory for RemovePgTempRelationFiles */ |
| 3042 | static void |
| 3043 | RemovePgTempRelationFilesInDbspace(const char *dbspacedirname) |
| 3044 | { |
| 3045 | DIR *dbspace_dir; |
| 3046 | struct dirent *de; |
| 3047 | char rm_path[MAXPGPATH * 2]; |
| 3048 | |
| 3049 | dbspace_dir = AllocateDir(dbspacedirname); |
| 3050 | |
| 3051 | while ((de = ReadDirExtended(dbspace_dir, dbspacedirname, LOG)) != NULL) |
| 3052 | { |
| 3053 | if (!looks_like_temp_rel_name(de->d_name)) |
| 3054 | continue; |
| 3055 | |
| 3056 | snprintf(rm_path, sizeof(rm_path), "%s/%s" , |
| 3057 | dbspacedirname, de->d_name); |
| 3058 | |
| 3059 | if (unlink(rm_path) < 0) |
| 3060 | ereport(LOG, |
| 3061 | (errcode_for_file_access(), |
| 3062 | errmsg("could not remove file \"%s\": %m" , |
| 3063 | rm_path))); |
| 3064 | } |
| 3065 | |
| 3066 | FreeDir(dbspace_dir); |
| 3067 | } |
| 3068 | |
| 3069 | /* t<digits>_<digits>, or t<digits>_<digits>_<forkname> */ |
| 3070 | bool |
| 3071 | looks_like_temp_rel_name(const char *name) |
| 3072 | { |
| 3073 | int pos; |
| 3074 | int savepos; |
| 3075 | |
| 3076 | /* Must start with "t". */ |
| 3077 | if (name[0] != 't') |
| 3078 | return false; |
| 3079 | |
| 3080 | /* Followed by a non-empty string of digits and then an underscore. */ |
| 3081 | for (pos = 1; isdigit((unsigned char) name[pos]); ++pos) |
| 3082 | ; |
| 3083 | if (pos == 1 || name[pos] != '_') |
| 3084 | return false; |
| 3085 | |
| 3086 | /* Followed by another nonempty string of digits. */ |
| 3087 | for (savepos = ++pos; isdigit((unsigned char) name[pos]); ++pos) |
| 3088 | ; |
| 3089 | if (savepos == pos) |
| 3090 | return false; |
| 3091 | |
| 3092 | /* We might have _forkname or .segment or both. */ |
| 3093 | if (name[pos] == '_') |
| 3094 | { |
| 3095 | int forkchar = forkname_chars(&name[pos + 1], NULL); |
| 3096 | |
| 3097 | if (forkchar <= 0) |
| 3098 | return false; |
| 3099 | pos += forkchar + 1; |
| 3100 | } |
| 3101 | if (name[pos] == '.') |
| 3102 | { |
| 3103 | int segchar; |
| 3104 | |
| 3105 | for (segchar = 1; isdigit((unsigned char) name[pos + segchar]); ++segchar) |
| 3106 | ; |
| 3107 | if (segchar <= 1) |
| 3108 | return false; |
| 3109 | pos += segchar; |
| 3110 | } |
| 3111 | |
| 3112 | /* Now we should be at the end. */ |
| 3113 | if (name[pos] != '\0') |
| 3114 | return false; |
| 3115 | return true; |
| 3116 | } |
| 3117 | |
| 3118 | |
| 3119 | /* |
| 3120 | * Issue fsync recursively on PGDATA and all its contents. |
| 3121 | * |
| 3122 | * We fsync regular files and directories wherever they are, but we |
| 3123 | * follow symlinks only for pg_wal and immediately under pg_tblspc. |
| 3124 | * Other symlinks are presumed to point at files we're not responsible |
| 3125 | * for fsyncing, and might not have privileges to write at all. |
| 3126 | * |
| 3127 | * Errors are logged but not considered fatal; that's because this is used |
| 3128 | * only during database startup, to deal with the possibility that there are |
| 3129 | * issued-but-unsynced writes pending against the data directory. We want to |
| 3130 | * ensure that such writes reach disk before anything that's done in the new |
| 3131 | * run. However, aborting on error would result in failure to start for |
| 3132 | * harmless cases such as read-only files in the data directory, and that's |
| 3133 | * not good either. |
| 3134 | * |
| 3135 | * Note that if we previously crashed due to a PANIC on fsync(), we'll be |
| 3136 | * rewriting all changes again during recovery. |
| 3137 | * |
| 3138 | * Note we assume we're chdir'd into PGDATA to begin with. |
| 3139 | */ |
| 3140 | void |
| 3141 | SyncDataDirectory(void) |
| 3142 | { |
| 3143 | bool xlog_is_symlink; |
| 3144 | |
| 3145 | /* We can skip this whole thing if fsync is disabled. */ |
| 3146 | if (!enableFsync) |
| 3147 | return; |
| 3148 | |
| 3149 | /* |
| 3150 | * If pg_wal is a symlink, we'll need to recurse into it separately, |
| 3151 | * because the first walkdir below will ignore it. |
| 3152 | */ |
| 3153 | xlog_is_symlink = false; |
| 3154 | |
| 3155 | #ifndef WIN32 |
| 3156 | { |
| 3157 | struct stat st; |
| 3158 | |
| 3159 | if (lstat("pg_wal" , &st) < 0) |
| 3160 | ereport(LOG, |
| 3161 | (errcode_for_file_access(), |
| 3162 | errmsg("could not stat file \"%s\": %m" , |
| 3163 | "pg_wal" ))); |
| 3164 | else if (S_ISLNK(st.st_mode)) |
| 3165 | xlog_is_symlink = true; |
| 3166 | } |
| 3167 | #else |
| 3168 | if (pgwin32_is_junction("pg_wal" )) |
| 3169 | xlog_is_symlink = true; |
| 3170 | #endif |
| 3171 | |
| 3172 | /* |
| 3173 | * If possible, hint to the kernel that we're soon going to fsync the data |
| 3174 | * directory and its contents. Errors in this step are even less |
| 3175 | * interesting than normal, so log them only at DEBUG1. |
| 3176 | */ |
| 3177 | #ifdef PG_FLUSH_DATA_WORKS |
| 3178 | walkdir("." , pre_sync_fname, false, DEBUG1); |
| 3179 | if (xlog_is_symlink) |
| 3180 | walkdir("pg_wal" , pre_sync_fname, false, DEBUG1); |
| 3181 | walkdir("pg_tblspc" , pre_sync_fname, true, DEBUG1); |
| 3182 | #endif |
| 3183 | |
| 3184 | /* |
| 3185 | * Now we do the fsync()s in the same order. |
| 3186 | * |
| 3187 | * The main call ignores symlinks, so in addition to specially processing |
| 3188 | * pg_wal if it's a symlink, pg_tblspc has to be visited separately with |
| 3189 | * process_symlinks = true. Note that if there are any plain directories |
| 3190 | * in pg_tblspc, they'll get fsync'd twice. That's not an expected case |
| 3191 | * so we don't worry about optimizing it. |
| 3192 | */ |
| 3193 | walkdir("." , datadir_fsync_fname, false, LOG); |
| 3194 | if (xlog_is_symlink) |
| 3195 | walkdir("pg_wal" , datadir_fsync_fname, false, LOG); |
| 3196 | walkdir("pg_tblspc" , datadir_fsync_fname, true, LOG); |
| 3197 | } |
| 3198 | |
| 3199 | /* |
| 3200 | * walkdir: recursively walk a directory, applying the action to each |
| 3201 | * regular file and directory (including the named directory itself). |
| 3202 | * |
| 3203 | * If process_symlinks is true, the action and recursion are also applied |
| 3204 | * to regular files and directories that are pointed to by symlinks in the |
| 3205 | * given directory; otherwise symlinks are ignored. Symlinks are always |
| 3206 | * ignored in subdirectories, ie we intentionally don't pass down the |
| 3207 | * process_symlinks flag to recursive calls. |
| 3208 | * |
| 3209 | * Errors are reported at level elevel, which might be ERROR or less. |
| 3210 | * |
| 3211 | * See also walkdir in initdb.c, which is a frontend version of this logic. |
| 3212 | */ |
| 3213 | static void |
| 3214 | walkdir(const char *path, |
| 3215 | void (*action) (const char *fname, bool isdir, int elevel), |
| 3216 | bool process_symlinks, |
| 3217 | int elevel) |
| 3218 | { |
| 3219 | DIR *dir; |
| 3220 | struct dirent *de; |
| 3221 | |
| 3222 | dir = AllocateDir(path); |
| 3223 | |
| 3224 | while ((de = ReadDirExtended(dir, path, elevel)) != NULL) |
| 3225 | { |
| 3226 | char subpath[MAXPGPATH * 2]; |
| 3227 | struct stat fst; |
| 3228 | int sret; |
| 3229 | |
| 3230 | CHECK_FOR_INTERRUPTS(); |
| 3231 | |
| 3232 | if (strcmp(de->d_name, "." ) == 0 || |
| 3233 | strcmp(de->d_name, ".." ) == 0) |
| 3234 | continue; |
| 3235 | |
| 3236 | snprintf(subpath, sizeof(subpath), "%s/%s" , path, de->d_name); |
| 3237 | |
| 3238 | if (process_symlinks) |
| 3239 | sret = stat(subpath, &fst); |
| 3240 | else |
| 3241 | sret = lstat(subpath, &fst); |
| 3242 | |
| 3243 | if (sret < 0) |
| 3244 | { |
| 3245 | ereport(elevel, |
| 3246 | (errcode_for_file_access(), |
| 3247 | errmsg("could not stat file \"%s\": %m" , subpath))); |
| 3248 | continue; |
| 3249 | } |
| 3250 | |
| 3251 | if (S_ISREG(fst.st_mode)) |
| 3252 | (*action) (subpath, false, elevel); |
| 3253 | else if (S_ISDIR(fst.st_mode)) |
| 3254 | walkdir(subpath, action, false, elevel); |
| 3255 | } |
| 3256 | |
| 3257 | FreeDir(dir); /* we ignore any error here */ |
| 3258 | |
| 3259 | /* |
| 3260 | * It's important to fsync the destination directory itself as individual |
| 3261 | * file fsyncs don't guarantee that the directory entry for the file is |
| 3262 | * synced. However, skip this if AllocateDir failed; the action function |
| 3263 | * might not be robust against that. |
| 3264 | */ |
| 3265 | if (dir) |
| 3266 | (*action) (path, true, elevel); |
| 3267 | } |
| 3268 | |
| 3269 | |
| 3270 | /* |
| 3271 | * Hint to the OS that it should get ready to fsync() this file. |
| 3272 | * |
| 3273 | * Ignores errors trying to open unreadable files, and logs other errors at a |
| 3274 | * caller-specified level. |
| 3275 | */ |
| 3276 | #ifdef PG_FLUSH_DATA_WORKS |
| 3277 | |
| 3278 | static void |
| 3279 | pre_sync_fname(const char *fname, bool isdir, int elevel) |
| 3280 | { |
| 3281 | int fd; |
| 3282 | |
| 3283 | /* Don't try to flush directories, it'll likely just fail */ |
| 3284 | if (isdir) |
| 3285 | return; |
| 3286 | |
| 3287 | fd = OpenTransientFile(fname, O_RDONLY | PG_BINARY); |
| 3288 | |
| 3289 | if (fd < 0) |
| 3290 | { |
| 3291 | if (errno == EACCES) |
| 3292 | return; |
| 3293 | ereport(elevel, |
| 3294 | (errcode_for_file_access(), |
| 3295 | errmsg("could not open file \"%s\": %m" , fname))); |
| 3296 | return; |
| 3297 | } |
| 3298 | |
| 3299 | /* |
| 3300 | * pg_flush_data() ignores errors, which is ok because this is only a |
| 3301 | * hint. |
| 3302 | */ |
| 3303 | pg_flush_data(fd, 0, 0); |
| 3304 | |
| 3305 | if (CloseTransientFile(fd)) |
| 3306 | ereport(elevel, |
| 3307 | (errcode_for_file_access(), |
| 3308 | errmsg("could not close file \"%s\": %m" , fname))); |
| 3309 | } |
| 3310 | |
| 3311 | #endif /* PG_FLUSH_DATA_WORKS */ |
| 3312 | |
| 3313 | static void |
| 3314 | datadir_fsync_fname(const char *fname, bool isdir, int elevel) |
| 3315 | { |
| 3316 | /* |
| 3317 | * We want to silently ignoring errors about unreadable files. Pass that |
| 3318 | * desire on to fsync_fname_ext(). |
| 3319 | */ |
| 3320 | fsync_fname_ext(fname, isdir, true, elevel); |
| 3321 | } |
| 3322 | |
| 3323 | static void |
| 3324 | unlink_if_exists_fname(const char *fname, bool isdir, int elevel) |
| 3325 | { |
| 3326 | if (isdir) |
| 3327 | { |
| 3328 | if (rmdir(fname) != 0 && errno != ENOENT) |
| 3329 | ereport(elevel, |
| 3330 | (errcode_for_file_access(), |
| 3331 | errmsg("could not remove directory \"%s\": %m" , fname))); |
| 3332 | } |
| 3333 | else |
| 3334 | { |
| 3335 | /* Use PathNameDeleteTemporaryFile to report filesize */ |
| 3336 | PathNameDeleteTemporaryFile(fname, false); |
| 3337 | } |
| 3338 | } |
| 3339 | |
| 3340 | /* |
| 3341 | * fsync_fname_ext -- Try to fsync a file or directory |
| 3342 | * |
| 3343 | * If ignore_perm is true, ignore errors upon trying to open unreadable |
| 3344 | * files. Logs other errors at a caller-specified level. |
| 3345 | * |
| 3346 | * Returns 0 if the operation succeeded, -1 otherwise. |
| 3347 | */ |
| 3348 | static int |
| 3349 | fsync_fname_ext(const char *fname, bool isdir, bool ignore_perm, int elevel) |
| 3350 | { |
| 3351 | int fd; |
| 3352 | int flags; |
| 3353 | int returncode; |
| 3354 | |
| 3355 | /* |
| 3356 | * Some OSs require directories to be opened read-only whereas other |
| 3357 | * systems don't allow us to fsync files opened read-only; so we need both |
| 3358 | * cases here. Using O_RDWR will cause us to fail to fsync files that are |
| 3359 | * not writable by our userid, but we assume that's OK. |
| 3360 | */ |
| 3361 | flags = PG_BINARY; |
| 3362 | if (!isdir) |
| 3363 | flags |= O_RDWR; |
| 3364 | else |
| 3365 | flags |= O_RDONLY; |
| 3366 | |
| 3367 | fd = OpenTransientFile(fname, flags); |
| 3368 | |
| 3369 | /* |
| 3370 | * Some OSs don't allow us to open directories at all (Windows returns |
| 3371 | * EACCES), just ignore the error in that case. If desired also silently |
| 3372 | * ignoring errors about unreadable files. Log others. |
| 3373 | */ |
| 3374 | if (fd < 0 && isdir && (errno == EISDIR || errno == EACCES)) |
| 3375 | return 0; |
| 3376 | else if (fd < 0 && ignore_perm && errno == EACCES) |
| 3377 | return 0; |
| 3378 | else if (fd < 0) |
| 3379 | { |
| 3380 | ereport(elevel, |
| 3381 | (errcode_for_file_access(), |
| 3382 | errmsg("could not open file \"%s\": %m" , fname))); |
| 3383 | return -1; |
| 3384 | } |
| 3385 | |
| 3386 | returncode = pg_fsync(fd); |
| 3387 | |
| 3388 | /* |
| 3389 | * Some OSes don't allow us to fsync directories at all, so we can ignore |
| 3390 | * those errors. Anything else needs to be logged. |
| 3391 | */ |
| 3392 | if (returncode != 0 && !(isdir && (errno == EBADF || errno == EINVAL))) |
| 3393 | { |
| 3394 | int save_errno; |
| 3395 | |
| 3396 | /* close file upon error, might not be in transaction context */ |
| 3397 | save_errno = errno; |
| 3398 | (void) CloseTransientFile(fd); |
| 3399 | errno = save_errno; |
| 3400 | |
| 3401 | ereport(elevel, |
| 3402 | (errcode_for_file_access(), |
| 3403 | errmsg("could not fsync file \"%s\": %m" , fname))); |
| 3404 | return -1; |
| 3405 | } |
| 3406 | |
| 3407 | if (CloseTransientFile(fd)) |
| 3408 | { |
| 3409 | ereport(elevel, |
| 3410 | (errcode_for_file_access(), |
| 3411 | errmsg("could not close file \"%s\": %m" , fname))); |
| 3412 | return -1; |
| 3413 | } |
| 3414 | |
| 3415 | return 0; |
| 3416 | } |
| 3417 | |
| 3418 | /* |
| 3419 | * fsync_parent_path -- fsync the parent path of a file or directory |
| 3420 | * |
| 3421 | * This is aimed at making file operations persistent on disk in case of |
| 3422 | * an OS crash or power failure. |
| 3423 | */ |
| 3424 | static int |
| 3425 | fsync_parent_path(const char *fname, int elevel) |
| 3426 | { |
| 3427 | char parentpath[MAXPGPATH]; |
| 3428 | |
| 3429 | strlcpy(parentpath, fname, MAXPGPATH); |
| 3430 | get_parent_directory(parentpath); |
| 3431 | |
| 3432 | /* |
| 3433 | * get_parent_directory() returns an empty string if the input argument is |
| 3434 | * just a file name (see comments in path.c), so handle that as being the |
| 3435 | * current directory. |
| 3436 | */ |
| 3437 | if (strlen(parentpath) == 0) |
| 3438 | strlcpy(parentpath, "." , MAXPGPATH); |
| 3439 | |
| 3440 | if (fsync_fname_ext(parentpath, true, false, elevel) != 0) |
| 3441 | return -1; |
| 3442 | |
| 3443 | return 0; |
| 3444 | } |
| 3445 | |
| 3446 | /* |
| 3447 | * Create a PostgreSQL data sub-directory |
| 3448 | * |
| 3449 | * The data directory itself, and most of its sub-directories, are created at |
| 3450 | * initdb time, but we do have some occasions when we create directories in |
| 3451 | * the backend (CREATE TABLESPACE, for example). In those cases, we want to |
| 3452 | * make sure that those directories are created consistently. Today, that means |
| 3453 | * making sure that the created directory has the correct permissions, which is |
| 3454 | * what pg_dir_create_mode tracks for us. |
| 3455 | * |
| 3456 | * Note that we also set the umask() based on what we understand the correct |
| 3457 | * permissions to be (see file_perm.c). |
| 3458 | * |
| 3459 | * For permissions other than the default, mkdir() can be used directly, but |
| 3460 | * be sure to consider carefully such cases -- a sub-directory with incorrect |
| 3461 | * permissions in a PostgreSQL data directory could cause backups and other |
| 3462 | * processes to fail. |
| 3463 | */ |
| 3464 | int |
| 3465 | MakePGDirectory(const char *directoryName) |
| 3466 | { |
| 3467 | return mkdir(directoryName, pg_dir_create_mode); |
| 3468 | } |
| 3469 | |
| 3470 | /* |
| 3471 | * Return the passed-in error level, or PANIC if data_sync_retry is off. |
| 3472 | * |
| 3473 | * Failure to fsync any data file is cause for immediate panic, unless |
| 3474 | * data_sync_retry is enabled. Data may have been written to the operating |
| 3475 | * system and removed from our buffer pool already, and if we are running on |
| 3476 | * an operating system that forgets dirty data on write-back failure, there |
| 3477 | * may be only one copy of the data remaining: in the WAL. A later attempt to |
| 3478 | * fsync again might falsely report success. Therefore we must not allow any |
| 3479 | * further checkpoints to be attempted. data_sync_retry can in theory be |
| 3480 | * enabled on systems known not to drop dirty buffered data on write-back |
| 3481 | * failure (with the likely outcome that checkpoints will continue to fail |
| 3482 | * until the underlying problem is fixed). |
| 3483 | * |
| 3484 | * Any code that reports a failure from fsync() or related functions should |
| 3485 | * filter the error level with this function. |
| 3486 | */ |
| 3487 | int |
| 3488 | data_sync_elevel(int elevel) |
| 3489 | { |
| 3490 | return data_sync_retry ? elevel : PANIC; |
| 3491 | } |
| 3492 | |