1. 28 Feb, 2023 4 commits
  2. 27 Feb, 2023 1 commit
  3. 26 Feb, 2023 1 commit
    • Monty's avatar
      Fixed (non crtitial) memory segment overrun · 3b9e8dfa
      Monty authored
      This was discovered as part of adding a protected memory area between
      each area allocated by multi_alloc().
      
      The patch that adds the protection will be pushed in 10.5.
      This patch adds fixes that are unique for 10.10
      3b9e8dfa
  4. 24 Feb, 2023 1 commit
    • Marko Mäkelä's avatar
      MDEV-30671 InnoDB undo log truncation fails to wait for purge of history · 0de3be8c
      Marko Mäkelä authored
      It is not safe to invoke trx_purge_free_segment() or execute
      innodb_undo_log_truncate=ON before all undo log records in
      the rollback segment has been processed.
      
      A prominent failure that would occur due to premature freeing of
      undo log pages is that trx_undo_get_undo_rec() would crash when
      trying to copy an undo log record to fetch the previous version
      of a record.
      
      If trx_undo_get_undo_rec() was not invoked in the unlucky time frame,
      then the symptom would be that some committed transaction history is
      never removed. This would be detected by CHECK TABLE...EXTENDED that
      was impleented in commit ab019010.
      Such a garbage collection leak should be possible even when using
      innodb_undo_log_truncate=OFF, just involving trx_purge_free_segment().
      
      trx_rseg_t::needs_purge: Change the type from Boolean to a transaction
      identifier, noting the most recent non-purged transaction, or 0 if
      everything has been purged. On transaction start, we initialize this
      to 1 more than the transaction start ID. On recovery, the field may be
      adjusted to the transaction end ID (TRX_UNDO_TRX_NO) if it is larger.
      
      The field TRX_UNDO_NEEDS_PURGE becomes write-only; only some debug
      assertions that would validate the value. The field reflects the old
      inaccurate Boolean field trx_rseg_t::needs_purge.
      
      trx_undo_mem_create_at_db_start(), trx_undo_lists_init(),
      trx_rseg_mem_restore(): Remove the parameter max_trx_id.
      Instead, store the maximum in trx_rseg_t::needs_purge,
      where trx_rseg_array_init() will find it.
      
      trx_purge_free_segment(): Contiguously hold a lock on
      trx_rseg_t to prevent any concurrent allocation of undo log.
      
      trx_purge_truncate_rseg_history(): Only invoke trx_purge_free_segment()
      if the rollback segment is empty and there are no pending transactions
      associated with it.
      
      trx_purge_truncate_history(): Only proceed with innodb_undo_log_truncate=ON
      if trx_rseg_t::needs_purge indicates that all history has been purged.
      
      Tested by: Matthias Leich
      0de3be8c
  5. 23 Feb, 2023 1 commit
  6. 22 Feb, 2023 2 commits
  7. 21 Feb, 2023 3 commits
    • Thirunarayanan Balathandayuthapani's avatar
      MDEV-29871 innodb_fts.fulltext_misc unexpectedly reports a result · df9f9ba1
      Thirunarayanan Balathandayuthapani authored
      - match()+0 returns the floating result and converts into integer value
      and it leads to sporadic failure.
      df9f9ba1
    • Alexander Barkov's avatar
      MDEV-30695 Refactor case folding data types in Asian collations · 33f8f92b
      Alexander Barkov authored
      This is a non-functional change and should not change the server behavior.
      
      Casefolding information is now stored in items of a new data type MY_CASEFOLD_CHARACTER:
      
      typedef struct casefold_info_char_t
      {
        uint32 toupper;
        uint32 tolower;
      } MY_CASEFOLD_CHARACTER;
      
      Before this change, casefolding tables for Asian collations were stored in:
      
      typedef struct unicase_info_char_st
      {
        uint32 toupper;
        uint32 tolower;
        uint32 sort;
      } MY_UNICASE_CHARACTER;
      
      The "sort" member was not used in the code handling Asian collations,
      it only wasted space.
      (it's only used by Unicode _general_ci and _general_mysql500_ci collations).
      
      Unicode collations (at least UCA and _bin) should also be refactored later,
      but under terms of a separate task.
      33f8f92b
    • Alexander Barkov's avatar
      MDEV-30692 conf_to_src is not up to date · 7e341cc7
      Alexander Barkov authored
      Fixing conf_to_src.c according to changes made by
       a206658b
      
      Re-generating ctype-extra.c at once, to fix the indentation
      from manually edited to automatic.
      7e341cc7
  8. 20 Feb, 2023 1 commit
    • Vlad Lesin's avatar
      MDEV-27701 Race on trx->lock.wait_lock between lock_rec_move() and lock_sys_t::cancel() · a474e327
      Vlad Lesin authored
      The initial issue was in assertion failure, which checked the equality
      of lock to cancel with trx->lock.wait_lock in lock_sys_t::cancel().
      
      If we analyze lock_sys_t::cancel() code from the perspective of
      trx->lock.wait_lock racing, we won't find the error there, except the
      cases when we need to reload it after the corresponding latches
      acquiring.
      
      So the fix is just to remove the assertion and reload
      trx->lock.wait_lock after acquiring necessary latches.
      
      Reviewed by: Marko Mäkelä <marko.makela@mariadb.com>
      a474e327
  9. 17 Feb, 2023 1 commit
    • Alexander Barkov's avatar
      MDEV-30661 UPPER() returns an empty string for U+0251 in uca1400 collations for utf8 · 7f6b648d
      Alexander Barkov authored
      String length growth during upper/lower conversion
      in Unicode collations depends only on the underlying MY_UNICASE_INFO
      used in the collation.
      
      Maintaining a separate member CHARSET_INFO::caseup_multiply and
      CHARSET_INFO::casedn_multiply duplicated this information
      and caused bugs like this (when MY_UNICASE_INFO and case??_multiply
      when out of sync because of incomplete CHARSET_INFO initialization).
      
      Fix:
      
      Changing CHARSET_INFO::caseup_multiply and CHARSET_INFO::casedn_multiply
      from members to virtual functions.
      The virtual functions in Unicode collations calculate case conversion
      growth factors from the MY_UNICASE_INFO. This guarantees that the growth
      factors are always in sync with the MY_UNICASE_INFO.
      7f6b648d
  10. 16 Feb, 2023 14 commits
    • Daniel Bartholomew's avatar
      bump the VERSION · 8460eb25
      Daniel Bartholomew authored
      8460eb25
    • Marko Mäkelä's avatar
      Merge 10.10 into 10.11 · 1fd00998
      Marko Mäkelä authored
      1fd00998
    • Marko Mäkelä's avatar
      Merge 10.9 into 10.10 · 345356b8
      Marko Mäkelä authored
      345356b8
    • Marko Mäkelä's avatar
      Merge 10.8 into 10.9 · 0d55914d
      Marko Mäkelä authored
      0d55914d
    • Marko Mäkelä's avatar
      Merge 10.6 into 10.8 · b12cd88c
      Marko Mäkelä authored
      b12cd88c
    • Marko Mäkelä's avatar
      Merge 10.5 into 10.6 · 67a6ad0a
      Marko Mäkelä authored
      67a6ad0a
    • Marko Mäkelä's avatar
      d3f35aa4
    • Marko Mäkelä's avatar
      Fix clang -Winconsistent-missing-override · 0c79ae94
      Marko Mäkelä authored
      0c79ae94
    • Marko Mäkelä's avatar
      MDEV-27774 fixup: Correct a comment · 34f0433c
      Marko Mäkelä authored
      34f0433c
    • Marko Mäkelä's avatar
      Merge 10.6 into 10.8 · 5abbe092
      Marko Mäkelä authored
      5abbe092
    • Marko Mäkelä's avatar
      MDEV-30638 Deadlock between INSERT and InnoDB non-persistent statistics update · 201cfc33
      Marko Mäkelä authored
      This is a partial revert of
      commit 8b6a308e (MDEV-29883)
      and a follow-up to the
      merge commit 394fc71f (MDEV-24569).
      
      The latching order related to any operation that accesses the allocation
      metadata of an InnoDB index tree is as follows:
      
      1. Acquire dict_index_t::lock in non-shared mode.
      2. Acquire the index root page latch in non-shared mode.
      3. Possibly acquire further index page latches. Unless an exclusive
      dict_index_t::lock is held, this must follow the root-to-leaf,
      left-to-right order.
      4. Acquire a *non-shared* fil_space_t::latch.
      5. Acquire latches on the allocation metadata pages.
      6. Possibly allocate and write some pages, or free some pages.
      
      btr_get_size_and_reserved(), dict_stats_update_transient_for_index(),
      dict_stats_analyze_index(): Acquire an exclusive fil_space_t::latch
      in order to avoid a deadlock in fseg_n_reserved_pages() in case of
      concurrent access to multiple indexes sharing the same "inode page".
      
      fseg_page_is_allocated(): Acquire an exclusive fil_space_t::latch
      in order to avoid deadlocks. All callers are holding latches
      on a buffer pool page, or an index, or both.
      Before commit edbde4a1 (MDEV-24167)
      a third mode was available that would not conflict with the shared
      fil_space_t::latch acquired by ha_innobase::info_low(),
      i_s_sys_tablespaces_fill_table(),
      or i_s_tablespaces_encryption_fill_table().
      Because those calls should be rather rare, it makes sense to use
      the simple rw_lock with only shared and exclusive modes.
      
      fil_crypt_get_page_throttle(): Avoid invoking fseg_page_is_allocated()
      on an allocation bitmap page (which can never be freed), to avoid
      acquiring a shared latch on top of an exclusive one.
      
      mtr_t::s_lock_space(), MTR_MEMO_SPACE_S_LOCK: Remove.
      201cfc33
    • Marko Mäkelä's avatar
      MDEV-30134 Assertion failed in buf_page_t::unfix() in buf_pool_t::watch_unset() · 54c0ac72
      Marko Mäkelä authored
      buf_pool_t::watch_set(): Always buffer-fix a block if one was found,
      no matter if it is a watch sentinel or a buffer page. The type of
      the block descriptor will be rechecked in buf_page_t::watch_unset().
      Do not expect the caller to acquire the page hash latch. Starting with
      commit bd5a6403 it is safe to release
      buf_pool.mutex before acquiring a buf_pool.page_hash latch.
      
      buf_page_get_low(): Adjust to the changed buf_pool_t::watch_set().
      
      This simplifies the logic and fixes a bug that was reproduced when
      using debug builds and the setting innodb_change_buffering_debug=1.
      54c0ac72
    • Marko Mäkelä's avatar
      MDEV-30397: MariaDB crash due to DB_FAIL reported for a corrupted page · 9c157994
      Marko Mäkelä authored
      buf_read_page_low(): Map the buf_page_t::read_complete() return
      value DB_FAIL to DB_PAGE_CORRUPTED. The purpose of the DB_FAIL
      return value is to avoid error log noise when read-ahead brings
      in an unused page that is typically filled with NUL bytes.
      
      If a synchronous read is bringing in a corrupted page where the
      page frame does not contain the expected tablespace identifier and
      page number, that must be treated as an attempt to read a corrupted
      page. The correct error code for this is DB_PAGE_CORRUPTED.
      The error code DB_FAIL is not handled by row_mysql_handle_errors().
      
      This was missed in commit 0b47c126
      (MDEV-13542).
      9c157994
    • Marko Mäkelä's avatar
      Merge 10.5 into 10.6 · cc27e5fd
      Marko Mäkelä authored
      cc27e5fd
  11. 15 Feb, 2023 5 commits
    • Marko Mäkelä's avatar
      MDEV-30657 InnoDB: Not applying UNDO_APPEND due to corruption · 5300c0fb
      Marko Mäkelä authored
      This almost completely reverts
      commit acd23da4 and
      retains a safe optimization:
      
      recv_sys_t::parse(): Remove any old redo log records for the
      truncated tablespace, to free up memory earlier.
      If recovery consists of multiple batches, then recv_sys_t::apply()
      will must invoke recv_sys_t::trim() again to avoid wrongly
      applying old log records to an already truncated undo tablespace.
      5300c0fb
    • Vicențiu Ciorbaru's avatar
      MDEV-30324: Wrong result upon SELECT DISTINCT ... WITH TIES · 4afa3b64
      Vicențiu Ciorbaru authored
      WITH TIES would not take effect if SELECT DISTINCT was used in a
      context where an INDEX is used to resolve the ORDER BY clause.
      
      WITH TIES relies on the `JOIN::order` to contain the non-constant
      fields to test the equality of ORDER BY fiels required for WITH TIES.
      
      The cause of the problem was a premature removal of the `JOIN::order`
      member during a DISTINCT optimization. This lead to WITH TIES code assuming
      ORDER BY only contained "constant" elements.
      
      Disable this optimization when WITH TIES is in effect.
      
      (side-note: the order by removal does not impact any current tests, thus
      it will be removed in a future version)
      
      Reviewed by: monty@mariadb.org
      4afa3b64
    • Vicențiu Ciorbaru's avatar
      Whitespace fix · d2b773d9
      Vicențiu Ciorbaru authored
      d2b773d9
    • Vicențiu Ciorbaru's avatar
    • Monty's avatar
      MDEV-30333 Wrong result with not_null_range_scan and LEFT JOIN with empty table · 192427e3
      Monty authored
      There was a bug in JOIN::make_notnull_conds_for_range_scans() when
      clearing TABLE->tmp_set, which was used to mark fields that could not be
      null.
      
      This function was only used if 'not_null_range_scan=on' is set.
      
      The effect was that tmp_set contained a 'random value' and this caused
      the optimizer to think that some fields could not be null.
      FLUSH TABLES clears tmp_set and because of this things worked temporarily.
      
      Fixed by clearing tmp_set properly.
      192427e3
  12. 14 Feb, 2023 6 commits