1. 11 Jan, 2019 1 commit
    • Sergei Petrunia's avatar
      Apply this patch from Percona Server: · b4ea1830
      Sergei Petrunia authored
      commit cd7201514fee78aaf7d3eb2b28d2573c76f53b84
      Author: Laurynas Biveinis <laurynas.biveinis@gmail.com>
      Date:   Tue Nov 14 06:34:19 2017 +0200
      
          Fix bug 1704195 / 87065 / TDB-83 (Stop ANALYZE TABLE from flushing table definition cache)
      
          Make ANALYZE TABLE stop flushing affected tables from the table
          definition cache, which has the effect of not blocking any subsequent
          new queries involving the table if there's a parallel long-running
          query:
      
          - new table flag HA_ONLINE_ANALYZE, return it for InnoDB and TokuDB
            tables;
          - in mysql_admin_table, if we are performing ANALYZE TABLE, and the
            table flag is set, do not remove the table from the table
            definition cache, do not invalidate query cache;
          - in partitioning handler, refresh the query optimizer statistics
            after ANALYZE if the underlying handler supports HA_ONLINE_ANALYZE;
          - new testcases main.percona_nonflushing_analyze_debug,
            parts.percona_nonflushing_abalyze_debug and a supporting debug sync
            point.
      
          For TokuDB, this change exposes bug TDB-83 (Index cardinality stats
          updated for handler::info(HA_STATUS_CONST), not often enough for
          tokudb_cardinality_scale_percent). TokuDB may return different
          rec_per_key values depending on dynamic variable
          tokudb_cardinality_scale_percent value. The server does not have a way
          of knowing that changing this variable invalidates the previous
          rec_per_key values in any opened table shares, and so does not call
          info(HA_STATUS_CONST) again. Fix by updating rec_per_key for both
          HA_STATUS_CONST and HA_STATUS_VARIABLE. This also forces a re-record
          of tokudb.bugs.db756_card_part_hash_1_pick, with the new output
          seeming to be more correct.
      b4ea1830
  2. 10 Jan, 2019 2 commits
  3. 09 Jan, 2019 2 commits
  4. 08 Jan, 2019 3 commits
  5. 07 Jan, 2019 1 commit
  6. 06 Jan, 2019 1 commit
  7. 04 Jan, 2019 7 commits
  8. 03 Jan, 2019 8 commits
    • Marko Mäkelä's avatar
      Fix a merge error in the parent commit · 23e4446a
      Marko Mäkelä authored
      Fix an inadvertently inverted condition that caused
      galera.galera_sst_mariabackup_table_options test failure.
      23e4446a
    • Marko Mäkelä's avatar
      Merge 10.2 into 10.3 · 94e22efb
      Marko Mäkelä authored
      94e22efb
    • Marko Mäkelä's avatar
      Merge 10.1 into 10.2 · b7392d14
      Marko Mäkelä authored
      b7392d14
    • Marko Mäkelä's avatar
      MDEV-18129 Backup fails for encrypted tables: mariabackup: Database page... · 7158edcb
      Marko Mäkelä authored
      MDEV-18129 Backup fails for encrypted tables: mariabackup: Database page corruption detected at page 1
      
      If an encrypted table is created during backup, then
      mariabackup --backup could wrongly fail.
      
      This caused a failure of the test mariabackup.huge_lsn once on buildbot.
      
      This is due to the way how InnoDB creates .ibd files. It would first
      write a dummy page 0 with no encryption information. Due to this,
      xb_fil_cur_open() could wrongly interpret that the table is not encrypted.
      Subsequently, page_is_corrupted() would compare the computed page
      checksum to the wrong checksum. (There are both "before" and "after"
      checksums for encrypted pages.)
      
      To work around this problem, we introduce a Boolean option
      --backup-encrypted that is enabled by default. With this option,
      Mariabackup will assume that a nonzero key_version implies that the
      page is encrypted. We need this option in order to be able to copy
      encrypted tables from MariaDB 10.1 or 10.2, because unencrypted pages
      that were originally created before MySQL 5.1.48 could contain nonzero
      garbage in the fields that were repurposed for encryption.
      
      Later, MDEV-18128 would clean up the way how .ibd files are created,
      to remove the need for this option.
      
      page_is_corrupted(): Add missing const qualifiers, and do not check
      space->crypt_data unless --skip-backup-encrypted has been specified.
      
      xb_fil_cur_read(): After a failed page read, output a page dump.
      7158edcb
    • Sergei Golubchik's avatar
      "fix" sequence.temporary test · 8cbb0bfa
      Sergei Golubchik authored
      8cbb0bfa
    • Sergei Golubchik's avatar
      Merge branch '10.2' into 10.3 · 6bb11efa
      Sergei Golubchik authored
      6bb11efa
    • Sergei Golubchik's avatar
      Merge branch '10.1' into 10.2 · 842402e4
      Sergei Golubchik authored
      842402e4
    • Sergei Golubchik's avatar
      Merge branch '10.0' into 10.1 · 3ba3f81a
      Sergei Golubchik authored
      3ba3f81a
  9. 02 Jan, 2019 9 commits
  10. 30 Dec, 2018 1 commit
  11. 29 Dec, 2018 5 commits