MongoDB code uses the following types of assertions that are available for use:
uassert
andiassert
- Checks for per-operation user errors. Operation-fatal.
tassert
- Like uassert in that it checks for per-operation user errors, but inhibits clean shutdown in tests. Operation-fatal, but process-fatal in testing environments during shutdown.
massert
- Checks per-operation invariants. Operation-fatal.
fassert
- Checks fatal process invariants. Process-fatal. Use to detect unexpected situations (such as a system function returning an unexpected error status).
invariant
- Checks process invariant. Process-fatal. Use to detect code logic errors ("pointer should never be null", "we should always be locked").
Note: Calling C function assert
is not allowed. Use one of the above instead.
The following types of assertions are deprecated:
MONGO_verify
- Checks per-operation invariants. A synonym for massert but doesn't require an error code. Process fatal in debug mode. Do not use for new code; use invariant or fassert instead.
dassert
- Calls
invariant
but only in debug mode. Do not use!
- Calls
MongoDB uses a series of ErrorCodes
(defined in mongo/base/error_codes.yml) to
identify and categorize error conditions. ErrorCodes
are defined in a YAML file and converted to
C++ files using MongoDB's IDL parser at compile time. We also use error codes to create
Status
objects, which convey the success or failure of function invocations across the code base.
Status
objects are also used internally by DBException
, MongoDB's primary exception class, and
its children (e.g., AssertionException
) as a means of maintaining metadata for exceptions. The
proper usage of these constructs is described below.
Some assertions will increment an assertion counter. The serverStatus
command will generate an
"asserts" section including these counters:
regular
- Incremented by
MONGO_verify
.
- Incremented by
warning
- Always 0. Nothing increments this anymore.
msg
- Incremented by
massert
.
- Incremented by
user
- Incremented by
uassert
.
- Incremented by
tripwire
- Incremented by
tassert
.
- Incremented by
rollovers
- When any counter reaches a value of
1 << 30
, all of the counters are reset and the "rollovers" counter is incremented.
- When any counter reaches a value of
When per-operation invariant checks fail, the current operation fails, but the process and
connection persist. This means that massert
, uassert
, iassert
and MONGO_verify
only
terminate the current operation, not the whole process. Be careful not to corrupt process state by
mistakenly using these assertions midway through mutating process state.
fassert
failures will terminate the entire process; this is used for low-level checks where
continuing might lead to corrupt data or loss of data on disk. Additionally, fassert
will log
the assertion message with fatal severity and add a breakpoint before terminating.
tassert
will fail the operation like uassert
, but also triggers a "deferred-fatality tripwire
flag". In testing environments, if the tripwire flag is set during shutdown, the process will
invoke the tripwire fatal assertion. In non-testing environments, there will only be a warning
during shutdown that tripwire assertions have failed.
tassert
presents more diagnostics than uassert
. tassert
will log the assertion as an error,
log scoped debug info (for more info, see ScopedDebugInfoStack defined in
mongo/util/assert_util.h), print the stack trace, and add a breakpoint.
The purpose of tassert
is to ensure that operation failures will cause a test suite to fail
without resorting to different behavior during testing. tassert
should only be used to check
for unexpected values produced by defined behavior.
Both massert
and uassert
take error codes, so that all assertions have codes associated with
them. Currently, programmers are free to provide the error code by either using a unique location
number or choosing a named code from ErrorCodes
. Unique location
numbers have no meaning other than a way to associate a log message with a line of code.
massert
will log the assertion message as an error, while uassert
will log the message with
debug level of 1 (for more info about log debug level, see docs/logging.md).
iassert
provides similar functionality to uassert
, but it logs at a debug level of 3 and
does not increment user assertion counters. We should always choose iassert
over uassert
when we expect a failure, a failure might be recoverable, or failure accounting is not interesting.
The current convention for choosing a unique location number is to use the 5 or 6 digit SERVER ticket number for the ticket being addressed when the assertion is added, followed by a two digit counter to distinguish between codes added as part of the same ticket. For example, if you're working on SERVER-12345, the first error code would be 1234500, the second would be 1234501, etc. This convention can also be used for LOGV2 logging id numbers.
The only real constraint for unique location numbers is that they must be unique across the codebase. This is verified at compile time with a python script.
A failed operation-fatal assertion throws an AssertionException
or a child of that.
The inheritance hierarchy resembles:
std::exception
mongo::DBException
mongo::AssertionException
mongo::UserException
mongo::MsgAssertionException
See util/assert_util.h.
Generally, code in the server should be able to tolerate (e.g., catch) a DBException
. Server
functions must be structured with exception safety in mind, such that DBException
can propagate
upwards harmlessly. The code should also expect, and properly handle, UserException
. We use
Resource Acquisition Is Initialization heavily.
MongoDB uses ErrorCodes
both internally and externally: a subset of error codes (e.g.,
BadValue
) are used externally to pass errors over the wire and to clients. These error codes are
the means for MongoDB processes (e.g., mongod and mongo) to communicate errors, and are visible
to client applications. Other error codes are used internally to indicate the underlying reason for
a failed operation. For instance, PeriodicJobIsStopped
is an internal error code that is passed
to callback functions running inside a PeriodicRunner
once the runner is
stopped. The internal error codes are for internal use only and must never be returned to clients
(i.e., in a network response).
Zero or more error categories can be assigned to ErrorCodes
, which allows a single handler to
serve a group of ErrorCodes
. RetriableError
, for instance, is an ErrorCategory
that includes
all retriable ErrorCodes
(e.g., HostUnreachable
and HostNotFound
). This implies that an
operation that fails with any error code in this category can be safely retried. We can use
ErrorCodes::isA<${category}>(${error})
to check if error
belongs to category
. Alternatively,
we can use ErrorCodes::is${category}(${error})
to check error categories. Both methods provide
similar functionality.
To represent the status of an executed operation (e.g., a command or a function invocation), we
use Status
objects, which represent an error state or the absence thereof. A Status
uses the
standardized ErrorCodes
to determine the underlying cause of an error. It also allows assigning
a textual description, as well as code-specific extra info, to the error code for further
clarification. The extra info is a subclass of ErrorExtraInfo
and specific to ErrorCodes
. Look
for extra
in here for reference.
MongoDB provides StatusWith
to enable functions to return an error code or a value without
requiring them to have multiple outputs. This makes exception-free code cleaner by avoiding
functions with multiple out parameters. We can either pass an error code or an actual value to a
StatusWith
object, indicating failure or success of the operation. For examples of the proper
usage of StatusWith
, see mongo/base/status_with.h and
mongo/base/status_with_test.cpp. It is highly recommended to use uassert
or iassert
over StatusWith
, and catch exceptions instead of checking Status
objects
returned from functions. Using StatusWith
to indicate exceptions, instead of throwing via
uassert
and iassert
, makes it very difficult to identify that an error has occurred, and
could lead to the wrong error being propagated.
Server code should generally be written to be exception safe. Historically,
we've had bugs due to code being overzealously marked noexcept
. In such
contexts, throwing an exception crashes the server, which can compromise
availability. However, just removing noexcept
from such code is not a viable
solution - exception unsafe code may need to crash in order to avoid causing
an even worse failure. We want to work towards ensuring that functions that
ought to be are in fact exception safe, and remove noexcept
usage where it's
not warranted. Here, we outline guidelines for doing so.
Noexcept is a runtime check that terminates the process rather than allowing
the function to exit because of a throw. Noexcept may be used when it can be
thought of as a bug for any uncaught exception to be thrown. There is no
compile-time check that exceptions will not be thrown within a noexcept
function. Instead, putting noexcept
on a function may be thought of as similar
to using invariant in the following way:
// Example noexcept code.
void func() noexcept {
...
}
// Similar alternative pseudocode.
void func() try {
...
} catch (...) {
invariant(!"unexpected exception");
}
As with invariant, be very careful when putting noexcept
on a function that
interacts with untrusted input. This has caused bugs, such as
SERVER-94316, where an error
parsing untrusted input was able to cause an exception to reach a noexcept
boundary.
When considering removing noexcept
from a function, the author of that change
must ensure that the function’s implementation and its callsites are not
relying on the function not throwing for correctness. Because of this, be
careful putting noexcept
on a function if there’s a chance it may need to be
removed later. noexcept
generally should not be used solely for reasons of
performance optimization. Aside from the cases listed in the next section, it
should not be assumed to improve performance without solid evidence.
If a part of the implementation would benefit from relying on not throwing, but
noexcept
is not meant to be a part of the function’s contract, it is acceptable
to use a try/catch/invariant construction similar to the example above or an
internal noexcept
helper function.
When adding or removing noexcept
, also consider what types of exceptions are
possible in that context and in our codebase. Refer to the “Where Exceptions
are Possible” section for more details.
If you are uncertain about adding or removing noexcept
in a given situation,
reach out to #server-programmability on slack.
This list is not exhaustive and there are cases not enumerated here that are
valid uses of noexcept
.
Using noexcept
with move operations allows operations to skip generating
exception handling code. If a type’s move operation will not throw exceptions,
it is strictly worse not to use noexcept
. For instance, std::vector<T> can
use optimized versions of certain operations when T has noexcept
move
operations. In these cases, noexcept
can be considered a requirement. Of
course, if a move operation genuinely needs to throw exceptions, then don’t
mark it noexcept
. This should be very rare – moves should be non-throwing in
almost all cases.
Allows callers to optimize for an exception-free pathway. Swap operations
should follow the same noexcept
guidelines as move operations.
Allows some hashing library types to optimize for an exception-free pathway.
This can even affect the behavior, performance, and even layout of certain
container types (such as libstdc++’s
unordered_map).
Hash functions should follow the noexcept
guidelines as move operations.
Destructors are generally implicitly noexcept
, and are encouraged to remain
implicitly noexcept
- that is, by not marking them with noexcept(false)
.
Functions where “destructor safety” is a core part of their functionality may
be marked noexcept
. This is not a requirement – destructors are allowed to
call potentially-throwing functions. It is also not a blanket recommendation to
consider noexcept
for all functions called from destructors. When calling a
potentially-throwing function from a destructor, think about whether or not it
can indeed throw in that context, and if exceptions need to be handled. If it
can indeed throw in that context, exceptions almost certainly need to be
handled - otherwise the server will crash.
The lambda passed to ON_BLOCK_EXIT()
and ScopeGuard()
should be treated
similarly to destructors: it is executed in a noexcept
context (a destructor)
and marking it as such is discouraged as being noisy. But code intended to be
called from them can be.
In our codebase, generally DBException is the only type of exception that should be crossing API boundaries. If an exception other than a DBException does cross an API boundary, it should be considered a bug. Whichever component throws the exception should handle it locally, even if only by translating it to a DBException. Generally any caller you would consider to be an external caller should be able to rely on DBException being the only exception type your function will throw.
Allocations using the global new allocator or std::allocator in our codebase do not throw, instead terminating the process directly when OOM conditions are encountered. As such, there is no need to handle exceptions from these sources.
Gotchas to watch out for:
- Generally, do not throw an
AssertionException
directly. Functions likeuasserted()
do work beyond just that. In particular, it makes sure that thegetLastError
structures are set up properly. - Think about the location of your asserts in constructors, as the destructor would not be
called. But at a minimum, use
wassert
a lot therein, we want to know if something is wrong. - Do not throw in destructors or allow exceptions to leak out (if you call a function that may throw).