1. 25 Oct, 2021 2 commits
    • Anel Husakovic's avatar
      MDEV-22552: mytop packaging · 395a0332
      Anel Husakovic authored
      `mytop` and `my_print_defaults` for RPM
      
      - Add `mytop` to client package
      - Add man page of `my_print_defaults` to client package
      - Add dependencies for RPMs
      - Remove old comment
      - Remove dead link
      
      Reviewed by: serg@mariadb.com
      395a0332
    • Bernard Spil's avatar
      MDEV-22552: mytop packaging · 2011fcf8
      Bernard Spil authored
      Make `my_print_defaults` a client app (required by `mytop`).
      
      Closes #1566
      
      Reviewed by: serg@mariadb.com, anel@mariadb.org
      2011fcf8
  2. 21 Oct, 2021 18 commits
  3. 20 Oct, 2021 8 commits
    • Marko Mäkelä's avatar
    • Nikita Malyavin's avatar
      MDEV-20131 Assertion `!pk->has_virtual()' failed · d10c42b4
      Nikita Malyavin authored
      Assertion `!pk->has_virtual()' failed in dict_index_build_internal_clust
      while creating PRIMARY key longer than possible to store in the page.
      
      This happened because the key was wrongly deduced as Long UNIQUE supported,
      however PRIMARY KEY cannot be of that type. The main reason is that
      only 8 bytes are used to store the hash, see HA_HASH_FIELD_LENGTH.
      
      This is also why HA_NOSAME flag is removed (and caused the assertion in
      turn) in open_table_from_share:
            if (key_info->algorithm == HA_KEY_ALG_LONG_HASH)
            {
              key_part_end++;
              key_info->flags&= ~HA_NOSAME;
            }
      
      To make it unique, the additional check is done by
      check_duplicate_long_entries call from ha_write_row, and similar one from
      ha_update_row.
      
      PRIMARY key is already forbidden, which is checked by the first test in
      main.long_unique, however is_hash_field_needed was wrongly deduced to true
      in mysql_prepare_create_table in this particular case.
      
      FIX:
      
      * Improve the check for Key::PRIMARY type
      * Simplify is_hash_field_needed deduction for a more neat reading
      d10c42b4
    • Marko Mäkelä's avatar
      Update libmariadb · 69b3de83
      Marko Mäkelä authored
      69b3de83
    • Marko Mäkelä's avatar
      MDEV-22627 Failing assertion: dict_tf2_is_valid(flags, flags2) · b06e8167
      Marko Mäkelä authored
      create_table_info_t::innobase_table_flags(): Refuse to create
      a PAGE_COMPRESSED table with PAGE_COMPRESSION_LEVEL=0 if also
      innodb_compression_level=0.
      
      The parameter value innodb_compression_level=0 was only somewhat
      meaningful for testing or debugging ROW_FORMAT=COMPRESSED tables.
      For the page_compressed format, it never made any sense, and the
      check in dict_tf_is_valid_not_redundant() that was added in
      72378a25 (MDEV-12873) would cause
      the server to crash.
      b06e8167
    • Nikita Malyavin's avatar
      MDEV-22445 Crash on HANDLER READ NEXT after XA PREPARE · caebe151
      Nikita Malyavin authored
      The assertion is absolutely correct since no data access is possible after
      XA PREPARE.
      
      The check is added in mysql_ha_read.
      caebe151
    • Nikita Malyavin's avatar
      MDEV-26262 frm is corrupted after ER_EXPRESSION_REFERS_TO_UNINIT_FIELD · 1811fd51
      Nikita Malyavin authored
      This is a duplicate of MDEV-18278 89936f11, but I will add an
      additional assertion
      
      Description:
      
      The frm corruption should not be reported during CREATE TABLE. Normally
      it doesn't, and the data to fill TABLE is taken by open_table_from_share
      call. However, the vcol data is stored as SQL string in
      table->s->vcol_defs.str and is anyway parsed on each table open.
      It is impossible [or hard] to avoid, because it's hard to clone the
      expression tree in general (it's easier to parse).
      
      Normally parse_vcol_defs should only fail on semantic errors. If so,
      error_reported is set to true. Any other failure is not expected during
      table creation. There is either unhandled/unacknowledged error, or
      something went really wrong, like memory reject. This all should be
      asserted anyway.
      
      Solution:
      * Set *error_reported=true for the forward references check;
      * Assert for every unacknowledged error during table creation.
      1811fd51
    • Nikita Malyavin's avatar
    • Daniel Black's avatar
      MDEV-26363 Passwords incorrectly expiring after MySQL5.7 -> MariaDB10.3 -> 10.4+ upgrades · 4590f8b4
      Daniel Black authored
      MySQL-5.7 mysql.user tables have a last_password_changed field.
      
      Because before MariaDB-10.4 remained oblivious to this, the act of creating
      users or otherwise changing a users row left the last_password_field with 0.
      
      Running a MariaDB-10.4 instance on this would work correctly, until mysql_upgrade
      is run, when this 0 value immediately translates to password expired
      state.
      
      MySQL-5.7 relied on the password_expired enum to indicate password
      expiry so we aren't going to activate password that were expired in
      MySQL-5.7.
      
      Thanks Hans Borresen for the bug report and review of the fix.
      4590f8b4
  4. 19 Oct, 2021 7 commits
  5. 18 Oct, 2021 5 commits
    • Oleksandr Byelkin's avatar
      MDEV-26299: Some views force server (and mysqldump) to generate invalid SQL for their definitions · 27bf57fd
      Oleksandr Byelkin authored
      Do not print illegal table field names for non-top-level SELECT list,
      they will not be refered in any case but create problem for parsing
      of printed result.
      27bf57fd
    • Brandon Nesterenko's avatar
      MDEV-25284: Assertion `info->type == READ_CACHE || info->type == WRITE_CACHE' failed · 2291f8ef
      Brandon Nesterenko authored
      Problem:
      ========
      This patch addresses two issues.
      
      First, if a CHANGE MASTER command is issued and an error happens
      while locating the replica’s relay logs, the logs can be put into an
      invalid state where future updates fail and future CHANGE MASTER
      calls crash the server. More specifically, right before a replica
      purges the relay logs (part of the `CHANGE MASTER TO` logic), the
      relay log is temporarily closed with state LOG_TO_BE_OPENED. If the
      server errors in-between the temporary log closure and purge, i.e.
      during the function find_log_pos, the log should be closed.
      MDEV-25284 reveals the log is not properly closed.
      
      Second, upon issuing a RESET SLAVE ALL command, a slave’s GTID
      filters are not cleared (DO_DOMAIN_IDS, IGNORE_DOMIAN_IDS,
      IGNORE_SERVER_IDS). MySQL had a similar bug report, Bug #18816897,
      which fixed this issue to clear IGNORE_SERVER_IDS after issuing
      RESET SLAVE ALL in version 5.7.
      
      Solution:
      =========
      
      To fix the first problem, the CHANGE MASTER error handling logic was
      extended to transition the relay log state to LOG_CLOSED from
      LOG_TO_BE_OPENED.
      
      To fix the second problem, the RESET SLAVE ALL logic is extended to
      clear the domain_id filter and ignore_server_ids.
      
      Reviewed By:
      ============
      Andrei Elkin <andrei.elkin@mariadb.com>
      2291f8ef
    • Nayuta Yanagisawa's avatar
      MDEV-26582 SIGSEGV in spider_db_bulk_insert and spider_db_connect and... · edde9084
      Nayuta Yanagisawa authored
      MDEV-26582 SIGSEGV in spider_db_bulk_insert and spider_db_connect and spider_db_before_query, and hang in "End of update loop" / "Reset for next command" query states
      
      Spider accesses a freed connection in ha_spider::end_bulk_insert()
      and results in SIGSEGV.
      
      The cause of the bug is that ha_spider::is_bulk_insert_exec_period()
      wrongly returns TRUE when the bulk insertion has not yet started.
      
      Spider decides whether it is during the bulk insertion or not by
      the value of insert_pos, but the variable is not reset in a case,
      and this result in the bug.
      edde9084
    • Oleksandr Byelkin's avatar
      MDEV-26650: Failed ALTER USER/GRANT statement removes the password from the cache · c9a9ae65
      Oleksandr Byelkin authored
      Starting from 10.4 AUTH is not part of ACL_USER so changes have to be done
      over a copy, and bring in the cache only in case of success.
      c9a9ae65
    • Marko Mäkelä's avatar
      MDEV-26682 Replication timeouts with XA PREPARE · 18eab4a8
      Marko Mäkelä authored
      The purpose of non-exclusive locks in a transaction is to guarantee
      that the records covered by those locks must remain in that way until
      the transaction is committed. (The purpose of gap locks is to ensure
      that a record that was nonexistent will remain that way.)
      
      Once a transaction has reached the XA PREPARE state, the only allowed
      further actions are XA ROLLBACK or XA COMMIT. Therefore, it can be
      argued that only the exclusive locks that the XA PREPARE transaction
      is holding are essential.
      
      Furthermore, InnoDB never preserved explicit locks across server restart.
      For XA PREPARE transations, we will only recover implicit exclusive locks
      for records that had been modified.
      
      Because of the fact that XA PREPARE followed by a server restart will
      cause some locks to be lost, we might as well always release all
      non-exclusive locks during the execution of an XA PREPARE statement.
      
      lock_release_on_prepare(): Release non-exclusive locks on XA PREPARE.
      
      trx_prepare(): Invoke lock_release_on_prepare() unless the
      isolation level is SERIALIZABLE or this is an internal distributed
      transaction with the binlog (not actual XA PREPARE statement).
      
      This has been discussed with Sergei Golubchik and Andrei Elkin.
      
      Reviewed by: Sergei Golubchik
      18eab4a8