1. 11 Apr, 2021 3 commits
  2. 09 Apr, 2021 2 commits
  3. 08 Apr, 2021 1 commit
  4. 07 Apr, 2021 1 commit
  5. 06 Apr, 2021 2 commits
  6. 03 Apr, 2021 1 commit
  7. 01 Apr, 2021 3 commits
    • Julius Goryavsky's avatar
      MDEV-25321: mariabackup failed if password is passed via environment variable · fb9d1519
      Julius Goryavsky authored
      The mariabackup interface currently supports passing a password
      through an explicit command line variable, but does not support
      passing a password through the MYSQL_PWD environment variable.
      At the same time, the Galera SST script for mariabackup uses
      the environment variable to pass the password, which leads
      (in some cases) to an unsuccessful launch of mariabackup and
      to the inability to start the cluster. This patch fixes this
      issue. It does not need a separate test, as the problem is
      visible in general testing on buildbot.
      fb9d1519
    • Srinidhi Kaushik's avatar
      MDEV-24197: Add "innodb_force_recovery" for "mariabackup --prepare" · 5bc5ecce
      Srinidhi Kaushik authored
      During the prepare phase of restoring backups, "mariabackup" does
      not seem to allow (or recognize) the option "innodb_force_recovery"
      for the embedded InnoDB server instance that it starts.
      
      If page corruption observed during page recovery, the prepare step
      fails. While this is indeed the correct behavior ideally, allowing
      this option to be set in case of emergencies might be useful when
      the current backup is the only copy available. Some error messages
      during "--prepare" suggest to set "innodb_force_recovery" to 1:
      
        [ERROR] InnoDB: Set innodb_force_recovery=1 to ignore corruption.
      
      For backwards compatibility, "mariabackup --innobackupex --apply-log"
      should also have this option.
      Signed-off-by: default avatarSrinidhi Kaushik <shrinidhi.kaushik@gmail.com>
      5bc5ecce
    • mkaruza's avatar
      MDEV-25047: SIGSEGV in mach_read_from_n_little_endian · f93e087d
      mkaruza authored
      Virtual column fields are not found in prebuilt data type, so we should
      match InnoDB fields with `get_innobase_type_from_mysql_type` method.
      Reviewed-by: default avatarJan Lindström <jan.lindstrom@mariadb.com>
      f93e087d
  8. 31 Mar, 2021 3 commits
  9. 30 Mar, 2021 11 commits
    • David CARLIER's avatar
      99945d77
    • Thirunarayanan Balathandayuthapani's avatar
      MDEV-25200 Index count mismatch due to aborted FULLTEXT INDEX · b771ab24
      Thirunarayanan Balathandayuthapani authored
      - Aborting of fulltext index creation fails to remove the
      index from sys indexes table. When we try to reload the
      table definition, InnoDB fails with index count mismatch
      error. InnoDB should remove the index from sys indexes while
      rollbacking the secondary index creation.
      b771ab24
    • Thirunarayanan Balathandayuthapani's avatar
      MDEV-15527 page_compressed compressed page partially during import tablespace · 108ba4c3
      Thirunarayanan Balathandayuthapani authored
      - Post push to address 32-bit build failure.
      108ba4c3
    • Marko Mäkelä's avatar
      Add missing have_perfschema.inc · 7c423c26
      Marko Mäkelä authored
      7c423c26
    • Thirunarayanan Balathandayuthapani's avatar
      MDEV-15527 page_compressed compressed page partially during import tablespace · c468d5cb
      Thirunarayanan Balathandayuthapani authored
      - Importing table operation fails to punch the hole in
      the filesystem when page compressed table is involved.
      To achieve that, InnoDB firstly punches the hole for
      the IOBuffer size(1MB). After that, InnoDB should write
      page by page when page compression is involved.
      c468d5cb
    • Jan Lindström's avatar
      Add supression for warning. · dfda1c92
      Jan Lindström authored
      dfda1c92
    • Jan Lindström's avatar
      MDEV-24923 : Port selected Galera conflict resolution changes from 10.6 · d217a925
      Jan Lindström authored
      Add condition on trx->state == TRX_STATE_COMMITTED_IN_MEMORY in order to
      avoid unnecessary work. If a transaction has already been committed or
      rolled back, it will release its locks in lock_release() and let
      the waiting thread(s) continue execution.
      
      Let BF wait on lock_rec_has_to_wait and if necessary other BF
      is replayed.
      
      wsrep_trx_order_before
        If BF is not even replicated yet then they are ordered
        correctly.
      
      bg_wsrep_kill_trx
        Make sure victim_trx is found and check also its state. If
        state is TRX_STATE_COMMITTED_IN_MEMORY transaction is
        already committed or rolled back and will release it locks
        soon.
      
      wsrep_assert_no_bf_bf_wait
        Transaction requesting new record lock should be TRX_STATE_ACTIVE
        Conflicting transaction can be in states TRX_STATE_ACTIVE,
        TRX_STATE_COMMITTED_IN_MEMORY or in TRX_STATE_PREPARED.
        If conflicting transaction is already committed in memory or
        prepared we should wait. When transaction is committed in memory we
        held trx mutex, but not lock_sys->mutex. Therefore, we
        could end here before transaction has time to do lock_release()
        that is protected with lock_sys->mutex.
      
      lock_rec_has_to_wait
        We very well can let bf to wait normally as other BF will be
        replayed in case of conflict. For debug builds we will do
        additional sanity checks to catch unsupported bf wait if any.
      
      wsrep_kill_victim
        Check is victim already in TRX_STATE_COMMITTED_IN_MEMORY state and
        if it is we can return.
      
      lock_rec_dequeue_from_page
      lock_rec_unlock
        Remove unnecessary wsrep_assert_no_bf_bf_wait function calls.
        We can very well let BF wait here.
      d217a925
    • Daniel Black's avatar
      remove broken tests/grant.pl · c4427332
      Daniel Black authored
      c4427332
    • Daniel Black's avatar
      mallinfo2: whitespace fix · fb3b2eb5
      Daniel Black authored
      fb3b2eb5
    • Vladislav Vaintroub's avatar
    • Daniel Black's avatar
      MDEV-24586: remove mysql_to_mariadb.sql · 85b6a818
      Daniel Black authored
      This script is unused and unmaintained.
      
      The logic is implemented in scripts/mysql_system_tables_fix.sql that forms part of mysql_upgrade
      
      Its components:
      
        alter table mysql.user drop column `password_last_changed`, drop column `password_lifetime`, drop column `account_locked`;
      
      has a friendlier migration path coming MDEV-24122
      
        alter table mysql.user change column `authentication_string` `auth_string` text COLLATE utf8_bin NOT NULL;
      
      Already part of scripts/mysql_system_tables_fix.sql
      
        alter table mysql.user add column  `Password` char(41) CHARACTER SET latin1 COLLATE latin1_bin NOT NULL DEFAULT '' after `user`, add column  `is_role` enum('N','Y') CHARACTER SET utf8 NOT NULL DEFAULT 'N' after `auth_string`;
      
        alter table mysql.user add column `default_role` char(80) COLLATE utf8_bin NOT NULL DEFAULT '', add column `max_statement_time` decimal(12,6) NOT NULL DEFAULT '0.000000';
      
      corrected in MDEV-23201 to be in the right order.
      
        update mysql.user set `password`=`auth_string`, plugin='' where plugin="mysql_native_password";
      
      Is handled in server in the function acl_load.
      85b6a818
  10. 29 Mar, 2021 3 commits
  11. 27 Mar, 2021 3 commits
  12. 26 Mar, 2021 4 commits
    • Michael Okoko's avatar
      Replace mallinfo with mallinfo2 on supported systems · 48141f3c
      Michael Okoko authored
      `mallinfo` is deprecated since glibc 2.33 and has been replaced by mallinfo2.
      The deprecation causes building the server to fail if glibc version is > 2.33.
      
      Check if mallinfo2 exist on the system and use it instead.
      48141f3c
    • Eugene Kosov's avatar
    • Eugene Kosov's avatar
      MDEV-25238 add support for -fsanitize-address-use-after-scope · dfae51de
      Eugene Kosov authored
      Use like this: cmake -DWITH_ASAN=ON -DWITH_ASAN_SCOPE=ON
      dfae51de
    • Marko Mäkelä's avatar
      MDEV-24786: row_upd_clust_step() skips mtr_t::commit() on virtual column error · a6d66fe7
      Marko Mäkelä authored
      The function row_upd_clust_step() is invoking several static functions,
      some of which used to commit the mini-transaction in some cases.
      If innobase_get_computed_value() would fail due to some reason,
      we would fail to invoke mtr_t::commit() and release buffer pool
      page latches. This would likely lead to a hanging server later.
      
      This regression was introduced in
      commit 97db6c15 (MDEV-20618).
      
      row_upd_index_is_referenced(), row_upd_sec_index_entry(),
      row_upd_sec_index_entry(): Cleanup: Replace some ibool with bool.
      
      row_upd_clust_rec_by_insert(), row_upd_clust_rec(): Guarantee that
      the mini-transaction will always remain in active state.
      
      row_upd_del_mark_clust_rec(): Guarantee that
      the mini-transaction will always remain in active state.
      This fixes one "leak" of mini-transaction on DB_COMPUTE_VALUE_FAILED.
      
      row_upd_clust_step(): Use only one return path, which will always
      invoke mtr.commit(). After a failed row_upd_store_row() call, we
      will no longer "leak" the mini-transaction.
      
      This fix was verified by RQG on 10.6 (depending on MDEV-371 that
      was introduced in 10.4). Unfortunately, it is challenging to
      create a regression test for this, and a test case could soon become
      invalid as more bugs in virtual column evaluation are fixed.
      a6d66fe7
  13. 25 Mar, 2021 1 commit
  14. 24 Mar, 2021 2 commits