mirror of
https://github.com/MariaDB/server.git
synced 2025-01-22 14:54:20 +01:00
61d34063ab
git-svn-id: file:///svn/toku/tokudb@43731 c7de825b-a66e-492c-adef-691d508d4ae1
638 lines
22 KiB
C
638 lines
22 KiB
C
/* -*- mode: C; c-basic-offset: 4; indent-tabs-mode: nil -*- */
|
|
// vim: expandtab:ts=8:sw=4:softtabstop=4:
|
|
#ident "$Id$"
|
|
#ident "Copyright (c) 2007-2010 Tokutek Inc. All rights reserved."
|
|
#ident "The technology is licensed by the Massachusetts Institute of Technology, Rutgers State University of New Jersey, and the Research Foundation of State University of New York at Stony Brook under United States of America Serial No. 11/760379 and to the patents and/or patent applications resulting from it."
|
|
|
|
/* rollback and rollforward routines. */
|
|
|
|
#include "includes.h"
|
|
#include "xids.h"
|
|
|
|
// functionality provided by roll.c is exposed by an autogenerated
|
|
// header file, logheader.h
|
|
//
|
|
// this (poorly) explains the absense of "roll.h"
|
|
|
|
// these flags control whether or not we send commit messages for
|
|
// various operations
|
|
|
|
// When a transaction is committed, should we send a FT_COMMIT message
|
|
// for each FT_INSERT message sent earlier by the transaction?
|
|
#define TOKU_DO_COMMIT_CMD_INSERT 0
|
|
|
|
// When a transaction is committed, should we send a FT_COMMIT message
|
|
// for each FT_DELETE_ANY message sent earlier by the transaction?
|
|
#define TOKU_DO_COMMIT_CMD_DELETE 1
|
|
|
|
int
|
|
toku_commit_fdelete (u_int8_t file_was_open,
|
|
FILENUM filenum, // valid if file_was_open
|
|
BYTESTRING bs_fname, // cwd/iname
|
|
TOKUTXN txn,
|
|
YIELDF UU(yield),
|
|
void *UU(yield_v),
|
|
LSN UU(oplsn)) //oplsn is the lsn of the commit
|
|
{
|
|
//TODO: #2037 verify the file is (user) closed
|
|
//Remove reference to the fd in the cachetable
|
|
CACHEFILE cf;
|
|
int r;
|
|
if (file_was_open) { // file was open when toku_ft_remove_on_commit() was called
|
|
r = toku_cachefile_of_filenum(txn->logger->ct, filenum, &cf);
|
|
if (r==ENOENT) { //Missing file on recovered transaction is not an error
|
|
assert(txn->recovered_from_checkpoint);
|
|
r = 0;
|
|
goto done;
|
|
}
|
|
// file must be open now if it was open when the fdelete was logged,
|
|
// because the txn that created it opened it and noted it.
|
|
// XXX this does not look true "must still be open (toku_ft_remove_on_commit() incremented refcount)"
|
|
assert(r == 0);
|
|
{
|
|
(void)toku_cachefile_get_and_pin_fd(cf);
|
|
assert(!toku_cachefile_is_dev_null_unlocked(cf));
|
|
FT h = toku_cachefile_get_userdata(cf);
|
|
DICTIONARY_ID dict_id = h->dict_id;
|
|
toku_logger_call_remove_finalize_callback(txn->logger, dict_id);
|
|
toku_cachefile_unpin_fd(cf);
|
|
}
|
|
r = toku_cachefile_redirect_nullfd(cf);
|
|
assert(r==0);
|
|
}
|
|
{
|
|
char *fname_in_env = fixup_fname(&bs_fname);
|
|
char *fname_in_cwd = toku_cachetable_get_fname_in_cwd(txn->logger->ct, fname_in_env);
|
|
|
|
// bug fix for #4718
|
|
// bug was introduced in with fix for #3590
|
|
// Before Maxwell (and fix for #3590),
|
|
// the recovery log was fsynced after the xcommit was loged but
|
|
// before we processed rollback entries and before we released
|
|
// the row locks (in the lock tree). Due to performance concerns,
|
|
// the fsync was moved to after the release of row locks, which comes
|
|
// after processing rollback entries. As a result, we may be unlinking a file
|
|
// here as part of a transactoin that may abort if we do not fsync the log.
|
|
// So, we fsync the log here.
|
|
//
|
|
// Because committing fdeletes should be a rare operation, we do not bother
|
|
// yielding the ydb lock before performing the fsync.
|
|
if (txn->logger) {
|
|
r = toku_logger_fsync_if_lsn_not_fsynced(txn->logger, txn->do_fsync_lsn);
|
|
assert_zero(r);
|
|
}
|
|
|
|
r = unlink(fname_in_cwd);
|
|
assert(r==0 || errno==ENOENT);
|
|
toku_free(fname_in_env);
|
|
toku_free(fname_in_cwd);
|
|
}
|
|
done:
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
toku_rollback_fdelete (u_int8_t UU(file_was_open),
|
|
FILENUM UU(filenum),
|
|
BYTESTRING UU(bs_fname),
|
|
TOKUTXN UU(txn),
|
|
YIELDF UU(yield),
|
|
void* UU(yield_v),
|
|
LSN UU(oplsn)) //oplsn is the lsn of the abort
|
|
{
|
|
//Rolling back an fdelete is an no-op.
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
toku_commit_fcreate (FILENUM UU(filenum),
|
|
BYTESTRING UU(bs_fname),
|
|
TOKUTXN UU(txn),
|
|
YIELDF UU(yield),
|
|
void *UU(yield_v),
|
|
LSN UU(oplsn))
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
toku_rollback_fcreate (FILENUM filenum,
|
|
BYTESTRING bs_fname, // cwd/iname
|
|
TOKUTXN txn,
|
|
YIELDF UU(yield),
|
|
void* UU(yield_v),
|
|
LSN UU(oplsn))
|
|
{
|
|
//TODO: #2037 verify the file is (user) closed
|
|
|
|
//Remove reference to the fd in the cachetable
|
|
CACHEFILE cf = NULL;
|
|
int r = toku_cachefile_of_filenum(txn->logger->ct, filenum, &cf);
|
|
if (r==ENOENT) { //Missing file on recovered transaction is not an error
|
|
assert(txn->recovered_from_checkpoint);
|
|
r = 0;
|
|
goto done;
|
|
}
|
|
// file must be open, because the txn that created it opened it and
|
|
// noted it,
|
|
assert(r == 0);
|
|
{
|
|
(void)toku_cachefile_get_and_pin_fd(cf);
|
|
assert(!toku_cachefile_is_dev_null_unlocked(cf));
|
|
FT h = toku_cachefile_get_userdata(cf);
|
|
DICTIONARY_ID dict_id = h->dict_id;
|
|
toku_logger_call_remove_finalize_callback(txn->logger, dict_id);
|
|
toku_cachefile_unpin_fd(cf);
|
|
}
|
|
r = toku_cachefile_redirect_nullfd(cf);
|
|
assert(r==0);
|
|
|
|
{
|
|
char *fname_in_env = fixup_fname(&bs_fname);
|
|
char *fname_in_cwd = toku_cachetable_get_fname_in_cwd(txn->logger->ct, fname_in_env);
|
|
|
|
r = unlink(fname_in_cwd);
|
|
assert(r==0 || errno==ENOENT);
|
|
toku_free(fname_in_env);
|
|
toku_free(fname_in_cwd);
|
|
}
|
|
done:
|
|
return 0;
|
|
}
|
|
|
|
static int find_ft_from_filenum (OMTVALUE v, void *filenumvp) {
|
|
FILENUM *filenump=filenumvp;
|
|
FT h = v;
|
|
FILENUM thisfnum = toku_cachefile_filenum(h->cf);
|
|
if (thisfnum.fileid<filenump->fileid) return -1;
|
|
if (thisfnum.fileid>filenump->fileid) return +1;
|
|
return 0;
|
|
}
|
|
|
|
|
|
// Input arg reset_root_xid_that_created TRUE means that this operation has changed the definition of this dictionary.
|
|
// (Example use is for schema change committed with txn that inserted cmdupdatebroadcast message.)
|
|
// The oplsn argument is ZERO_LSN for normal operation. When this function is called for recovery, it has the LSN of
|
|
// the operation (insert, delete, update, etc).
|
|
static int do_insertion (enum ft_msg_type type, FILENUM filenum, BYTESTRING key, BYTESTRING *data, TOKUTXN txn, LSN oplsn,
|
|
BOOL reset_root_xid_that_created) {
|
|
CACHEFILE cf;
|
|
// 2954 - ignore messages for aborted hot-index
|
|
int r = toku_txn_ignore_contains(txn, filenum);
|
|
if ( r != ENOENT ) goto done; // ENOENT => filenum not in ignore list
|
|
//printf("%s:%d committing insert %s %s\n", __FILE__, __LINE__, key.data, data.data);
|
|
r = toku_cachefile_of_filenum(txn->logger->ct, filenum, &cf);
|
|
if (r==ENOENT) { //Missing file on recovered transaction is not an error
|
|
assert(txn->recovered_from_checkpoint);
|
|
r = 0;
|
|
goto done;
|
|
}
|
|
assert(r==0);
|
|
|
|
(void)toku_cachefile_get_and_pin_fd(cf);
|
|
if (!toku_cachefile_is_dev_null_unlocked(cf)) {
|
|
OMTVALUE hv=NULL;
|
|
r = toku_omt_find_zero(txn->open_fts, find_ft_from_filenum, &filenum, &hv, NULL);
|
|
assert(r==0);
|
|
FT h = hv;
|
|
|
|
if (oplsn.lsn != 0) { // if we are executing the recovery algorithm
|
|
LSN treelsn = toku_ft_checkpoint_lsn(h);
|
|
if (oplsn.lsn <= treelsn.lsn) { // if operation was already applied to tree ...
|
|
r = 0; // ... do not apply it again.
|
|
goto cleanup;
|
|
}
|
|
}
|
|
|
|
DBT key_dbt,data_dbt;
|
|
XIDS xids = toku_txn_get_xids(txn);
|
|
FT_MSG_S ftcmd = { type, ZERO_MSN, xids,
|
|
.u.id={(key.len > 0)
|
|
? toku_fill_dbt(&key_dbt, key.data, key.len)
|
|
: toku_init_dbt(&key_dbt),
|
|
data
|
|
? toku_fill_dbt(&data_dbt, data->data, data->len)
|
|
: toku_init_dbt(&data_dbt) }};
|
|
|
|
r = toku_ft_root_put_cmd(h, &ftcmd);
|
|
if (r == 0 && reset_root_xid_that_created) {
|
|
TXNID new_root_xid_that_created = xids_get_outermost_xid(xids);
|
|
toku_reset_root_xid_that_created(h, new_root_xid_that_created);
|
|
}
|
|
}
|
|
cleanup:
|
|
toku_cachefile_unpin_fd(cf);
|
|
done:
|
|
return r;
|
|
}
|
|
|
|
|
|
static int do_nothing_with_filenum(TOKUTXN UU(txn), FILENUM UU(filenum)) {
|
|
return 0;
|
|
}
|
|
|
|
|
|
int toku_commit_cmdinsert (FILENUM filenum, BYTESTRING UU(key), TOKUTXN txn, YIELDF UU(yield), void *UU(yieldv), LSN UU(oplsn)) {
|
|
#if TOKU_DO_COMMIT_CMD_INSERT
|
|
return do_insertion (FT_COMMIT_ANY, filenum, key, 0, txn, oplsn, FALSE);
|
|
#else
|
|
return do_nothing_with_filenum(txn, filenum);
|
|
#endif
|
|
}
|
|
|
|
int
|
|
toku_rollback_cmdinsert (FILENUM filenum,
|
|
BYTESTRING key,
|
|
TOKUTXN txn,
|
|
YIELDF UU(yield),
|
|
void * UU(yieldv),
|
|
LSN oplsn)
|
|
{
|
|
return do_insertion (FT_ABORT_ANY, filenum, key, 0, txn, oplsn, FALSE);
|
|
}
|
|
|
|
int
|
|
toku_commit_cmdupdate(FILENUM filenum,
|
|
BYTESTRING key,
|
|
TOKUTXN txn,
|
|
YIELDF UU(yield),
|
|
void * UU(yieldv),
|
|
LSN oplsn)
|
|
{
|
|
return do_insertion(FT_COMMIT_ANY, filenum, key, 0, txn, oplsn, FALSE);
|
|
}
|
|
|
|
int
|
|
toku_rollback_cmdupdate(FILENUM filenum,
|
|
BYTESTRING key,
|
|
TOKUTXN txn,
|
|
YIELDF UU(yield),
|
|
void * UU(yieldv),
|
|
LSN oplsn)
|
|
{
|
|
return do_insertion(FT_ABORT_ANY, filenum, key, 0, txn, oplsn, FALSE);
|
|
}
|
|
|
|
int
|
|
toku_commit_cmdupdatebroadcast(FILENUM filenum,
|
|
BOOL is_resetting_op,
|
|
TOKUTXN txn,
|
|
YIELDF UU(yield),
|
|
void * UU(yieldv),
|
|
LSN oplsn)
|
|
{
|
|
// if is_resetting_op, reset root_xid_that_created in
|
|
// relevant ft.
|
|
BOOL reset_root_xid_that_created = (is_resetting_op ? TRUE : FALSE);
|
|
const enum ft_msg_type msg_type = (is_resetting_op
|
|
? FT_COMMIT_BROADCAST_ALL
|
|
: FT_COMMIT_BROADCAST_TXN);
|
|
BYTESTRING nullkey = { 0, NULL };
|
|
return do_insertion(msg_type, filenum, nullkey, 0, txn, oplsn, reset_root_xid_that_created);
|
|
}
|
|
|
|
int
|
|
toku_rollback_cmdupdatebroadcast(FILENUM filenum,
|
|
BOOL UU(is_resetting_op),
|
|
TOKUTXN txn,
|
|
YIELDF UU(yield),
|
|
void * UU(yieldv),
|
|
LSN oplsn)
|
|
{
|
|
BYTESTRING nullkey = { 0, NULL };
|
|
return do_insertion(FT_ABORT_BROADCAST_TXN, filenum, nullkey, 0, txn, oplsn, FALSE);
|
|
}
|
|
|
|
int
|
|
toku_commit_cmddelete (FILENUM filenum,
|
|
BYTESTRING key,
|
|
TOKUTXN txn,
|
|
YIELDF UU(yield),
|
|
void * UU(yieldv),
|
|
LSN oplsn)
|
|
{
|
|
#if TOKU_DO_COMMIT_CMD_DELETE
|
|
return do_insertion (FT_COMMIT_ANY, filenum, key, 0, txn, oplsn, FALSE);
|
|
#else
|
|
key = key; oplsn = oplsn;
|
|
return do_nothing_with_filenum(txn, filenum);
|
|
#endif
|
|
}
|
|
|
|
int
|
|
toku_rollback_cmddelete (FILENUM filenum,
|
|
BYTESTRING key,
|
|
TOKUTXN txn,
|
|
YIELDF UU(yield),
|
|
void * UU(yieldv),
|
|
LSN oplsn)
|
|
{
|
|
return do_insertion (FT_ABORT_ANY, filenum, key, 0, txn, oplsn, FALSE);
|
|
}
|
|
|
|
static int
|
|
toku_apply_rollinclude (TXNID xid,
|
|
uint64_t num_nodes,
|
|
BLOCKNUM spilled_head,
|
|
uint32_t spilled_head_hash __attribute__((__unused__)),
|
|
BLOCKNUM spilled_tail,
|
|
uint32_t spilled_tail_hash,
|
|
TOKUTXN txn,
|
|
YIELDF yield,
|
|
void * yieldv,
|
|
LSN oplsn,
|
|
apply_rollback_item func) {
|
|
int r = 0;
|
|
struct roll_entry *item;
|
|
int count=0;
|
|
|
|
BLOCKNUM next_log = spilled_tail;
|
|
uint32_t next_log_hash = spilled_tail_hash;
|
|
uint64_t last_sequence = num_nodes;
|
|
|
|
BOOL found_head = FALSE;
|
|
assert(next_log.b != ROLLBACK_NONE.b);
|
|
while (next_log.b != ROLLBACK_NONE.b) {
|
|
//pin log
|
|
ROLLBACK_LOG_NODE log;
|
|
toku_get_and_pin_rollback_log(txn, next_log, next_log_hash, &log);
|
|
toku_rollback_verify_contents(log, xid, last_sequence - 1);
|
|
last_sequence = log->sequence;
|
|
|
|
toku_maybe_prefetch_previous_rollback_log(txn, log);
|
|
|
|
while ((item=log->newest_logentry)) {
|
|
log->newest_logentry = item->prev;
|
|
r = func(txn, item, yield, yieldv, oplsn);
|
|
if (r!=0) return r;
|
|
count++;
|
|
if (count%2 == 0) yield(NULL, NULL, yieldv);
|
|
}
|
|
if (next_log.b == spilled_head.b) {
|
|
assert(!found_head);
|
|
found_head = TRUE;
|
|
assert(log->sequence == 0);
|
|
}
|
|
next_log = log->previous;
|
|
next_log_hash = log->previous_hash;
|
|
{
|
|
//Clean up transaction structure to prevent
|
|
//toku_txn_close from double-freeing
|
|
spilled_tail = next_log;
|
|
spilled_tail_hash = next_log_hash;
|
|
if (found_head) {
|
|
assert(next_log.b == ROLLBACK_NONE.b);
|
|
spilled_head = next_log;
|
|
spilled_head_hash = next_log_hash;
|
|
}
|
|
}
|
|
toku_rollback_log_unpin_and_remove(txn, log);
|
|
}
|
|
return r;
|
|
}
|
|
|
|
int
|
|
toku_commit_rollinclude (TXNID xid,
|
|
uint64_t num_nodes,
|
|
BLOCKNUM spilled_head,
|
|
uint32_t spilled_head_hash,
|
|
BLOCKNUM spilled_tail,
|
|
uint32_t spilled_tail_hash,
|
|
TOKUTXN txn,
|
|
YIELDF yield,
|
|
void * yieldv,
|
|
LSN oplsn) {
|
|
int r;
|
|
r = toku_apply_rollinclude(xid, num_nodes,
|
|
spilled_head, spilled_head_hash,
|
|
spilled_tail, spilled_tail_hash,
|
|
txn, yield, yieldv, oplsn,
|
|
toku_commit_rollback_item);
|
|
return r;
|
|
}
|
|
|
|
int
|
|
toku_rollback_rollinclude (TXNID xid,
|
|
uint64_t num_nodes,
|
|
BLOCKNUM spilled_head,
|
|
uint32_t spilled_head_hash,
|
|
BLOCKNUM spilled_tail,
|
|
uint32_t spilled_tail_hash,
|
|
TOKUTXN txn,
|
|
YIELDF yield,
|
|
void * yieldv,
|
|
LSN oplsn) {
|
|
int r;
|
|
r = toku_apply_rollinclude(xid, num_nodes,
|
|
spilled_head, spilled_head_hash,
|
|
spilled_tail, spilled_tail_hash,
|
|
txn, yield, yieldv, oplsn,
|
|
toku_abort_rollback_item);
|
|
return r;
|
|
}
|
|
|
|
int
|
|
toku_commit_load (BYTESTRING old_iname,
|
|
BYTESTRING UU(new_iname),
|
|
TOKUTXN txn,
|
|
YIELDF UU(yield),
|
|
void *UU(yield_v),
|
|
LSN UU(oplsn))
|
|
{
|
|
CACHEFILE cf;
|
|
int r;
|
|
char *fname_in_env = fixup_fname(&old_iname); //Delete old file
|
|
r = toku_cachefile_of_iname_in_env(txn->logger->ct, fname_in_env, &cf);
|
|
if (r==0) {
|
|
r = toku_cachefile_redirect_nullfd(cf);
|
|
assert(r==0);
|
|
}
|
|
else {
|
|
assert(r==ENOENT);
|
|
}
|
|
|
|
// bug fix for #4718
|
|
// bug was introduced in with fix for #3590
|
|
// Before Maxwell (and fix for #3590),
|
|
// the recovery log was fsynced after the xcommit was loged but
|
|
// before we processed rollback entries and before we released
|
|
// the row locks (in the lock tree). Due to performance concerns,
|
|
// the fsync was moved to after the release of row locks, which comes
|
|
// after processing rollback entries. As a result, we may be unlinking a file
|
|
// here as part of a transactoin that may abort if we do not fsync the log.
|
|
// So, we fsync the log here.
|
|
//
|
|
// Because committing fdeletes should be a rare operation, we do not bother
|
|
// yielding the ydb lock before performing the fsync.
|
|
if (txn->logger) {
|
|
r = toku_logger_fsync_if_lsn_not_fsynced(txn->logger, txn->do_fsync_lsn);
|
|
assert_zero(r);
|
|
}
|
|
|
|
char *fname_in_cwd = toku_cachetable_get_fname_in_cwd(txn->logger->ct, fname_in_env);
|
|
r = unlink(fname_in_cwd);
|
|
assert(r==0 || errno==ENOENT);
|
|
toku_free(fname_in_env);
|
|
toku_free(fname_in_cwd);
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
toku_rollback_load (BYTESTRING UU(old_iname),
|
|
BYTESTRING new_iname,
|
|
TOKUTXN txn,
|
|
YIELDF UU(yield),
|
|
void *UU(yield_v),
|
|
LSN UU(oplsn))
|
|
{
|
|
CACHEFILE cf;
|
|
int r;
|
|
char *fname_in_env = fixup_fname(&new_iname); //Delete new file
|
|
r = toku_cachefile_of_iname_in_env(txn->logger->ct, fname_in_env, &cf);
|
|
if (r==0) {
|
|
r = toku_cachefile_redirect_nullfd(cf);
|
|
assert(r==0);
|
|
}
|
|
else {
|
|
assert(r==ENOENT);
|
|
}
|
|
char *fname_in_cwd = toku_cachetable_get_fname_in_cwd(txn->logger->ct, fname_in_env);
|
|
r = unlink(fname_in_cwd);
|
|
assert(r==0 || errno==ENOENT);
|
|
toku_free(fname_in_env);
|
|
toku_free(fname_in_cwd);
|
|
return 0;
|
|
}
|
|
|
|
//2954
|
|
int
|
|
toku_commit_hot_index (FILENUMS UU(hot_index_filenums),
|
|
TOKUTXN UU(txn),
|
|
YIELDF UU(yield),
|
|
void * UU(yield_v),
|
|
LSN UU(oplsn))
|
|
{
|
|
// nothing
|
|
return 0;
|
|
}
|
|
|
|
//2954
|
|
// function called by toku_omt_iterate to add hot_index filenums to
|
|
// each live txn's ignore list when a hot index is aborted
|
|
static int
|
|
live_txn_ignore(OMTVALUE vtxn, u_int32_t UU(idx) , void *vfn) {
|
|
TOKUTXN txn = vtxn;
|
|
FILENUMS *hot_index_filenums = vfn;
|
|
int r;
|
|
for (uint32_t i=0; i<hot_index_filenums->num;i++) {
|
|
r = toku_txn_ignore_add(txn, hot_index_filenums->filenums[i]);
|
|
invariant(r==0);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
toku_rollback_hot_index (FILENUMS UU(hot_index_filenums),
|
|
TOKUTXN UU(txn),
|
|
YIELDF UU(yield),
|
|
void * UU(yield_v),
|
|
LSN UU(oplsn))
|
|
{
|
|
int r = toku_omt_iterate(txn->logger->live_txns, live_txn_ignore, &hot_index_filenums);
|
|
return r;
|
|
}
|
|
|
|
int
|
|
toku_commit_dictionary_redirect (FILENUM UU(old_filenum),
|
|
FILENUM UU(new_filenum),
|
|
TOKUTXN UU(txn),
|
|
YIELDF UU(yield),
|
|
void * UU(yield_v),
|
|
LSN UU(oplsn)) //oplsn is the lsn of the commit
|
|
{
|
|
//Redirect only has meaning during normal operation (NOT during recovery).
|
|
if (!txn->recovered_from_checkpoint) {
|
|
//NO-OP
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
toku_rollback_dictionary_redirect (FILENUM old_filenum,
|
|
FILENUM new_filenum,
|
|
TOKUTXN txn,
|
|
YIELDF UU(yield),
|
|
void * UU(yield_v),
|
|
LSN UU(oplsn)) //oplsn is the lsn of the abort
|
|
{
|
|
int r = 0;
|
|
//Redirect only has meaning during normal operation (NOT during recovery).
|
|
if (!txn->recovered_from_checkpoint) {
|
|
CACHEFILE new_cf = NULL;
|
|
r = toku_cachefile_of_filenum(txn->logger->ct, new_filenum, &new_cf);
|
|
assert(r == 0);
|
|
FT new_h = toku_cachefile_get_userdata(new_cf);
|
|
|
|
CACHEFILE old_cf = NULL;
|
|
r = toku_cachefile_of_filenum(txn->logger->ct, old_filenum, &old_cf);
|
|
assert(r == 0);
|
|
FT old_h = toku_cachefile_get_userdata(old_cf);
|
|
|
|
//Redirect back from new to old.
|
|
r = toku_dictionary_redirect_abort(old_h, new_h, txn);
|
|
assert(r==0);
|
|
}
|
|
return r;
|
|
}
|
|
|
|
int
|
|
toku_commit_change_fdescriptor(FILENUM filenum,
|
|
BYTESTRING UU(old_descriptor),
|
|
TOKUTXN txn,
|
|
YIELDF UU(yield),
|
|
void * UU(yieldv),
|
|
LSN UU(oplsn))
|
|
{
|
|
return do_nothing_with_filenum(txn, filenum);
|
|
}
|
|
|
|
int
|
|
toku_rollback_change_fdescriptor(FILENUM filenum,
|
|
BYTESTRING old_descriptor,
|
|
TOKUTXN txn,
|
|
YIELDF UU(yield),
|
|
void * UU(yieldv),
|
|
LSN UU(oplsn))
|
|
{
|
|
CACHEFILE cf;
|
|
int r;
|
|
int fd;
|
|
r = toku_cachefile_of_filenum(txn->logger->ct, filenum, &cf);
|
|
if (r==ENOENT) { //Missing file on recovered transaction is not an error
|
|
assert(txn->recovered_from_checkpoint);
|
|
r = 0;
|
|
goto done;
|
|
}
|
|
// file must be open, because the txn that created it opened it and
|
|
// noted it,
|
|
assert(r==0);
|
|
|
|
fd = toku_cachefile_get_and_pin_fd(cf);
|
|
if (!toku_cachefile_is_dev_null_unlocked(cf)) {
|
|
OMTVALUE hv=NULL;
|
|
r = toku_omt_find_zero(txn->open_fts, find_ft_from_filenum, &filenum, &hv, NULL);
|
|
assert(r==0);
|
|
FT h = hv;
|
|
DESCRIPTOR_S d;
|
|
|
|
toku_fill_dbt(&d.dbt, old_descriptor.data, old_descriptor.len);
|
|
r = toku_update_descriptor(h, &d, fd);
|
|
assert(r == 0);
|
|
}
|
|
toku_cachefile_unpin_fd(cf);
|
|
done:
|
|
return r;
|
|
}
|
|
|
|
|
|
|