summaryrefslogtreecommitdiff
path: root/src/third_party/wiredtiger/test/checkpoint/checkpointer.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/third_party/wiredtiger/test/checkpoint/checkpointer.c')
-rw-r--r--src/third_party/wiredtiger/test/checkpoint/checkpointer.c389
1 files changed, 389 insertions, 0 deletions
diff --git a/src/third_party/wiredtiger/test/checkpoint/checkpointer.c b/src/third_party/wiredtiger/test/checkpoint/checkpointer.c
new file mode 100644
index 00000000000..ef49a9492ce
--- /dev/null
+++ b/src/third_party/wiredtiger/test/checkpoint/checkpointer.c
@@ -0,0 +1,389 @@
+/*-
+ * Public Domain 2014-2016 MongoDB, Inc.
+ * Public Domain 2008-2014 WiredTiger, Inc.
+ *
+ * This is free and unencumbered software released into the public domain.
+ *
+ * Anyone is free to copy, modify, publish, use, compile, sell, or
+ * distribute this software, either in source code form or as a compiled
+ * binary, for any purpose, commercial or non-commercial, and by any
+ * means.
+ *
+ * In jurisdictions that recognize copyright laws, the author or authors
+ * of this software dedicate any and all copyright interest in the
+ * software to the public domain. We make this dedication for the benefit
+ * of the public at large and to the detriment of our heirs and
+ * successors. We intend this dedication to be an overt act of
+ * relinquishment in perpetuity of all present and future rights to this
+ * software under copyright law.
+ *
+ * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
+ * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
+ * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
+ * IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR
+ * OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
+ * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
+ * OTHER DEALINGS IN THE SOFTWARE.
+ */
+
+#include "test_checkpoint.h"
+
+static void *checkpointer(void *);
+static int compare_cursors(
+ WT_CURSOR *, const char *, WT_CURSOR *, const char *);
+static int diagnose_key_error(WT_CURSOR *, int, WT_CURSOR *, int);
+static int real_checkpointer(void);
+static int verify_checkpoint(WT_SESSION *);
+
+/*
+ * start_checkpoints --
+ * Responsible for creating the checkpoint thread.
+ */
+int
+start_checkpoints(void)
+{
+ int ret;
+
+ if ((ret = pthread_create(
+ &g.checkpoint_thread, NULL, checkpointer, NULL)) != 0)
+ return (log_print_err("pthread_create", ret, 1));
+ return (0);
+}
+
+/*
+ * end_checkpoints --
+ * Responsible for cleanly shutting down the checkpoint thread.
+ */
+int
+end_checkpoints(void)
+{
+ void *thread_ret;
+
+ return (pthread_join(g.checkpoint_thread, &thread_ret));
+
+}
+
+/*
+ * checkpointer --
+ * Checkpoint thread start function.
+ */
+static void *
+checkpointer(void *arg)
+{
+ char tid[128];
+
+ WT_UNUSED(arg);
+
+ __wt_thread_id(tid, sizeof(tid));
+ printf("checkpointer thread starting: tid: %s\n", tid);
+
+ (void)real_checkpointer();
+ return (NULL);
+}
+
+/*
+ * real_checkpointer --
+ * Do the work of creating checkpoints and then verifying them. Also
+ * responsible for finishing in a timely fashion.
+ */
+static int
+real_checkpointer(void)
+{
+ WT_SESSION *session;
+ char *checkpoint_config, _buf[128];
+ int ret;
+
+ if (g.running == 0)
+ return (log_print_err(
+ "Checkpoint thread started stopped\n", EINVAL, 1));
+
+ while (g.ntables > g.ntables_created)
+ __wt_yield();
+
+ if ((ret = g.conn->open_session(g.conn, NULL, NULL, &session)) != 0)
+ return (log_print_err("conn.open_session", ret, 1));
+
+ if (strncmp(g.checkpoint_name,
+ "WiredTigerCheckpoint", strlen("WiredTigerCheckpoint")) == 0)
+ checkpoint_config = NULL;
+ else {
+ checkpoint_config = _buf;
+ snprintf(checkpoint_config, 128, "name=%s", g.checkpoint_name);
+ }
+ while (g.running) {
+ /* Execute a checkpoint */
+ if ((ret = session->checkpoint(
+ session, checkpoint_config)) != 0)
+ return (log_print_err("session.checkpoint", ret, 1));
+ printf("Finished a checkpoint\n");
+
+ if (!g.running)
+ goto done;
+
+ /* Verify the content of the checkpoint. */
+ if ((ret = verify_checkpoint(session)) != 0)
+ return (log_print_err("verify_checkpoint", ret, 1));
+ }
+
+done: if ((ret = session->close(session, NULL)) != 0)
+ return (log_print_err("session.close", ret, 1));
+
+ return (0);
+}
+
+/*
+ * verify_checkpoint --
+ * Open a cursor on each table at the last checkpoint and walk through
+ * the tables in parallel. The key/values should match across all tables.
+ */
+static int
+verify_checkpoint(WT_SESSION *session)
+{
+ WT_CURSOR **cursors;
+ const char *type0, *typei;
+ char next_uri[128], ckpt[128];
+ int i, ret, t_ret;
+ uint64_t key_count;
+
+ ret = t_ret = 0;
+ key_count = 0;
+ snprintf(ckpt, 128, "checkpoint=%s", g.checkpoint_name);
+ cursors = calloc((size_t)g.ntables, sizeof(*cursors));
+ if (cursors == NULL)
+ return (log_print_err("verify_checkpoint", ENOMEM, 1));
+
+ for (i = 0; i < g.ntables; i++) {
+ /*
+ * TODO: LSM doesn't currently support reading from
+ * checkpoints.
+ */
+ if (g.cookies[i].type == LSM)
+ continue;
+ snprintf(next_uri, 128, "table:__wt%04d", i);
+ if ((ret = session->open_cursor(
+ session, next_uri, NULL, ckpt, &cursors[i])) != 0) {
+ (void)log_print_err(
+ "verify_checkpoint:session.open_cursor", ret, 1);
+ goto err;
+ }
+ }
+
+ /* There's no way to verify LSM-only runs. */
+ if (cursors[0] == NULL) {
+ printf("LSM-only, skipping checkpoint verification\n");
+ goto err;
+ }
+
+ while (ret == 0) {
+ ret = cursors[0]->next(cursors[0]);
+ if (ret == 0)
+ ++key_count;
+ else if (ret != WT_NOTFOUND) {
+ (void)log_print_err("cursor->next", ret, 1);
+ goto err;
+ }
+ /*
+ * Check to see that all remaining cursors have the
+ * same key/value pair.
+ */
+ for (i = 1; i < g.ntables; i++) {
+ /*
+ * TODO: LSM doesn't currently support reading from
+ * checkpoints.
+ */
+ if (g.cookies[i].type == LSM)
+ continue;
+ t_ret = cursors[i]->next(cursors[i]);
+ if (t_ret != 0 && t_ret != WT_NOTFOUND) {
+ (void)log_print_err("cursor->next", t_ret, 1);
+ goto err;
+ }
+
+ if (ret == WT_NOTFOUND && t_ret == WT_NOTFOUND)
+ continue;
+ else if (ret == WT_NOTFOUND || t_ret == WT_NOTFOUND) {
+ (void)log_print_err(
+ "verify_checkpoint tables with different"
+ " amount of data", EFAULT, 1);
+ goto err;
+ }
+
+ type0 = type_to_string(g.cookies[0].type);
+ typei = type_to_string(g.cookies[i].type);
+ if ((ret = compare_cursors(
+ cursors[0], type0, cursors[i], typei)) != 0) {
+ (void)diagnose_key_error(
+ cursors[0], 0, cursors[i], i);
+ (void)log_print_err(
+ "verify_checkpoint - mismatching data",
+ EFAULT, 1);
+ goto err;
+ }
+ }
+ }
+ printf("Finished verifying a checkpoint with %d tables and %" PRIu64
+ " keys\n", g.ntables, key_count);
+
+err: for (i = 0; i < g.ntables; i++) {
+ if (cursors[i] != NULL &&
+ (ret = cursors[i]->close(cursors[i])) != 0)
+ (void)log_print_err(
+ "verify_checkpoint:cursor close", ret, 1);
+ }
+ free(cursors);
+ return (ret);
+}
+
+/*
+ * compare_cursors --
+ * Compare the key/value pairs from two cursors.
+ */
+static int
+compare_cursors(
+ WT_CURSOR *cursor1, const char *type1,
+ WT_CURSOR *cursor2, const char *type2)
+{
+ uint64_t key1, key2;
+ char *val1, *val2, buf[128];
+ int ret;
+
+ ret = 0;
+ memset(buf, 0, 128);
+
+ if (cursor1->get_key(cursor1, &key1) != 0 ||
+ cursor2->get_key(cursor2, &key2) != 0)
+ return (log_print_err("Error getting keys", EINVAL, 1));
+
+ if (cursor1->get_value(cursor1, &val1) != 0 ||
+ cursor2->get_value(cursor2, &val2) != 0)
+ return (log_print_err("Error getting values", EINVAL, 1));
+
+ if (g.logfp != NULL)
+ fprintf(g.logfp, "k1: %" PRIu64 " k2: %" PRIu64
+ " val1: %s val2: %s \n", key1, key2, val1, val2);
+
+ if (key1 != key2)
+ ret = ERR_KEY_MISMATCH;
+ else if (strlen(val1) != strlen(val2) || strcmp(val1, val2) != 0)
+ ret = ERR_DATA_MISMATCH;
+ else
+ return (0);
+
+ printf("Key/value mismatch: %" PRIu64 "/%s from a %s table is not %"
+ PRIu64 "/%s from a %s table\n",
+ key1, val1, type1, key2, val2, type2);
+
+ return (ret);
+}
+
+/*
+ * diagnose_key_error --
+ * Dig a bit deeper on failure. Continue after some failures here to
+ * extract as much information as we can.
+ */
+static int
+diagnose_key_error(
+ WT_CURSOR *cursor1, int index1,
+ WT_CURSOR *cursor2, int index2)
+{
+ WT_CURSOR *c;
+ WT_SESSION *session;
+ uint64_t key1, key1_orig, key2, key2_orig;
+ char next_uri[128], ckpt[128];
+ int ret;
+
+ /* Hack to avoid passing session as parameter. */
+ session = cursor1->session;
+ key1_orig = key2_orig = 0;
+
+ snprintf(ckpt, 128, "checkpoint=%s", g.checkpoint_name);
+
+ /* Save the failed keys. */
+ if (cursor1->get_key(cursor1, &key1_orig) != 0 ||
+ cursor2->get_key(cursor2, &key2_orig) != 0) {
+ (void)log_print_err("Error retrieving key.", EINVAL, 0);
+ goto live_check;
+ }
+
+ if (key1_orig == key2_orig)
+ goto live_check;
+
+ /* See if previous values are still valid. */
+ if (cursor1->prev(cursor1) != 0 || cursor2->prev(cursor2) != 0)
+ return (1);
+ if (cursor1->get_key(cursor1, &key1) != 0 ||
+ cursor2->get_key(cursor2, &key2) != 0)
+ (void)log_print_err("Error decoding key", EINVAL, 1);
+ else if (key1 != key2)
+ (void)log_print_err("Now previous keys don't match", EINVAL, 0);
+
+ if (cursor1->next(cursor1) != 0 || cursor2->next(cursor2) != 0)
+ return (1);
+ if (cursor1->get_key(cursor1, &key1) != 0 ||
+ cursor2->get_key(cursor2, &key2) != 0)
+ (void)log_print_err("Error decoding key", EINVAL, 1);
+ else if (key1 == key2)
+ (void)log_print_err("After prev/next keys match", EINVAL, 0);
+
+ if (cursor1->next(cursor1) != 0 || cursor2->next(cursor2) != 0)
+ return (1);
+ if (cursor1->get_key(cursor1, &key1) != 0 ||
+ cursor2->get_key(cursor2, &key2) != 0)
+ (void)log_print_err("Error decoding key", EINVAL, 1);
+ else if (key1 == key2)
+ (void)log_print_err(
+ "After prev/next/next keys match", EINVAL, 0);
+
+ /*
+ * Now try opening new cursors on the checkpoints and see if we
+ * get the same missing key via searching.
+ */
+ snprintf(next_uri, 128, "table:__wt%04d", index1);
+ if (session->open_cursor(session, next_uri, NULL, ckpt, &c) != 0)
+ return (1);
+ c->set_key(c, key1_orig);
+ if ((ret = c->search(c)) != 0)
+ (void)log_print_err("1st cursor didn't find 1st key", ret, 0);
+ c->set_key(c, key2_orig);
+ if ((ret = c->search(c)) != 0)
+ (void)log_print_err("1st cursor didn't find 2nd key", ret, 0);
+ if (c->close(c) != 0)
+ return (1);
+
+ snprintf(next_uri, 128, "table:__wt%04d", index2);
+ if (session->open_cursor(session, next_uri, NULL, ckpt, &c) != 0)
+ return (1);
+ c->set_key(c, key1_orig);
+ if ((ret = c->search(c)) != 0)
+ (void)log_print_err("2nd cursor didn't find 1st key", ret, 0);
+ c->set_key(c, key2_orig);
+ if ((ret = c->search(c)) != 0)
+ (void)log_print_err("2nd cursor didn't find 2nd key", ret, 0);
+ if (c->close(c) != 0)
+ return (1);
+
+live_check:
+ /*
+ * Now try opening cursors on the live checkpoint to see if we get the
+ * same missing key via searching.
+ */
+ snprintf(next_uri, 128, "table:__wt%04d", index1);
+ if (session->open_cursor(session, next_uri, NULL, NULL, &c) != 0)
+ return (1);
+ c->set_key(c, key1_orig);
+ if ((ret = c->search(c)) != 0)
+ (void)log_print_err("1st cursor didn't find 1st key", ret, 0);
+ if (c->close(c) != 0)
+ return (1);
+
+ snprintf(next_uri, 128, "table:__wt%04d", index2);
+ if (session->open_cursor(session, next_uri, NULL, NULL, &c) != 0)
+ return (1);
+ c->set_key(c, key2_orig);
+ if ((ret = c->search(c)) != 0)
+ (void)log_print_err("2nd cursor didn't find 2nd key", ret, 0);
+ if (c->close(c) != 0)
+ return (1);
+
+ return (0);
+}