sql_repl.cc 97.3 KB
Newer Older
Sergei Golubchik's avatar
Sergei Golubchik committed
1
/* Copyright (c) 2000, 2012, Oracle and/or its affiliates.
Sergei Golubchik's avatar
Sergei Golubchik committed
2
   Copyright (c) 2008, 2012, Monty Program Ab
3 4 5

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
unknown's avatar
unknown committed
6
   the Free Software Foundation; version 2 of the License.
7 8 9 10 11 12 13 14

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to the Free Software
15
   Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301  USA */
16

17 18
#include "sql_priv.h"
#include "unireg.h"
19
#include "sql_base.h"
20
#include "sql_parse.h"                          // check_access
unknown's avatar
SCRUM  
unknown committed
21 22
#ifdef HAVE_REPLICATION

23
#include "rpl_mi.h"
24
#include "rpl_rli.h"
25
#include "sql_repl.h"
26
#include "sql_acl.h"                            // SUPER_ACL
27
#include "log_event.h"
unknown's avatar
unknown committed
28
#include "rpl_filter.h"
unknown's avatar
unknown committed
29
#include <my_dir.h>
He Zhenxing's avatar
He Zhenxing committed
30
#include "rpl_handler.h"
31
#include "debug_sync.h"
32

33
int max_binlog_dump_events = 0; // unlimited
34
my_bool opt_sporadic_binlog_dump_fail = 0;
unknown's avatar
unknown committed
35
#ifndef DBUG_OFF
36
static int binlog_dump_count = 0;
unknown's avatar
unknown committed
37
#endif
unknown's avatar
unknown committed
38

Sergei Golubchik's avatar
Sergei Golubchik committed
39
extern TYPELIB binlog_checksum_typelib;
40

41
/*
42 43 44 45
    fake_rotate_event() builds a fake (=which does not exist physically in any
    binlog) Rotate event, which contains the name of the binlog we are going to
    send to the slave (because the slave may not know it if it just asked for
    MASTER_LOG_FILE='', MASTER_LOG_POS=4).
46 47
    < 4.0.14, fake_rotate_event() was called only if the requested pos was 4.
    After this version we always call it, so that a 3.23.58 slave can rely on
48 49 50 51 52
    it to detect if the master is 4.0 (and stop) (the _fake_ Rotate event has
    zeros in the good positions which, by chance, make it possible for the 3.23
    slave to detect that this event is unexpected) (this is luck which happens
    because the master and slave disagree on the size of the header of
    Log_event).
53 54 55 56

    Relying on the event length of the Rotate event instead of these
    well-placed zeros was not possible as Rotate events have a variable-length
    part.
57 58
*/

unknown's avatar
unknown committed
59
static int fake_rotate_event(NET* net, String* packet, char* log_file_name,
60 61
                             ulonglong position, const char** errmsg,
                             uint8 checksum_alg_arg)
unknown's avatar
unknown committed
62
{
63
  DBUG_ENTER("fake_rotate_event");
64
  char header[LOG_EVENT_HEADER_LEN], buf[ROTATE_HEADER_LEN+100];
65 66 67 68 69 70 71 72 73 74

  /*
    this Rotate is to be sent with checksum if and only if
    slave's get_master_version_and_clock time handshake value 
    of master's @@global.binlog_checksum was TRUE
  */

  my_bool do_checksum= checksum_alg_arg != BINLOG_CHECKSUM_ALG_OFF &&
    checksum_alg_arg != BINLOG_CHECKSUM_ALG_UNDEF;

75 76 77 78 79
  /*
    'when' (the timestamp) is set to 0 so that slave could distinguish between
    real and fake Rotate events (if necessary)
  */
  memset(header, 0, 4);
unknown's avatar
unknown committed
80 81
  header[EVENT_TYPE_OFFSET] = ROTATE_EVENT;

82
  char* p = log_file_name+dirname_length(log_file_name);
unknown's avatar
unknown committed
83
  uint ident_len = (uint) strlen(p);
84 85
  ulong event_len = ident_len + LOG_EVENT_HEADER_LEN + ROTATE_HEADER_LEN +
    (do_checksum ? BINLOG_CHECKSUM_LEN : 0);
86
  int4store(header + SERVER_ID_OFFSET, global_system_variables.server_id);
unknown's avatar
unknown committed
87
  int4store(header + EVENT_LEN_OFFSET, event_len);
88
  int2store(header + FLAGS_OFFSET, LOG_EVENT_ARTIFICIAL_F);
89

90 91
  // TODO: check what problems this may cause and fix them
  int4store(header + LOG_POS_OFFSET, 0);
92

unknown's avatar
unknown committed
93
  packet->append(header, sizeof(header));
94
  int8store(buf+R_POS_OFFSET,position);
95
  packet->append(buf, ROTATE_HEADER_LEN);
96 97 98 99 100 101 102 103 104 105 106 107 108
  packet->append(p, ident_len);

  if (do_checksum)
  {
    char b[BINLOG_CHECKSUM_LEN];
    ha_checksum crc= my_checksum(0L, NULL, 0);
    crc= my_checksum(crc, (uchar*)header, sizeof(header));
    crc= my_checksum(crc, (uchar*)buf, ROTATE_HEADER_LEN);
    crc= my_checksum(crc, (uchar*)p, ident_len);
    int4store(b, crc);
    packet->append(b, sizeof(b));
  }

109
  if (my_net_write(net, (uchar*) packet->ptr(), packet->length()))
110 111
  {
    *errmsg = "failed on my_net_write()";
112
    DBUG_RETURN(-1);
113
  }
114
  DBUG_RETURN(0);
unknown's avatar
unknown committed
115 116
}

He Zhenxing's avatar
He Zhenxing committed
117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142
/*
  Reset thread transmit packet buffer for event sending

  This function allocates header bytes for event transmission, and
  should be called before store the event data to the packet buffer.
*/
static int reset_transmit_packet(THD *thd, ushort flags,
                                 ulong *ev_offset, const char **errmsg)
{
  int ret= 0;
  String *packet= &thd->packet;

  /* reserve and set default header */
  packet->length(0);
  packet->set("\0", 1, &my_charset_bin);

  if (RUN_HOOK(binlog_transmit, reserve_header, (thd, flags, packet)))
  {
    *errmsg= "Failed to run hook 'reserve_header'";
    my_errno= ER_UNKNOWN_ERROR;
    ret= 1;
  }
  *ev_offset= packet->length();
  return ret;
}

143 144 145
static int send_file(THD *thd)
{
  NET* net = &thd->net;
146 147
  int fd = -1, error = 1;
  size_t bytes;
148 149
  char fname[FN_REFLEN+1];
  const char *errmsg = 0;
unknown's avatar
unknown committed
150
  int old_timeout;
unknown's avatar
unknown committed
151
  unsigned long packet_len;
152
  uchar buf[IO_SIZE];				// It's safe to alloc this
153 154
  DBUG_ENTER("send_file");

unknown's avatar
unknown committed
155 156 157 158
  /*
    The client might be slow loading the data, give him wait_timeout to do
    the job
  */
159
  old_timeout= net->read_timeout;
160
  my_net_set_read_timeout(net, thd->variables.net_wait_timeout);
unknown's avatar
unknown committed
161 162 163 164 165

  /*
    We need net_flush here because the client will not know it needs to send
    us the file name until it has processed the load event entry
  */
unknown's avatar
unknown committed
166
  if (net_flush(net) || (packet_len = my_net_read(net)) == packet_error)
167
  {
168
    errmsg = "while reading file name";
169 170 171
    goto err;
  }

172 173 174
  // terminate with \0 for fn_format
  *((char*)net->read_pos +  packet_len) = 0;
  fn_format(fname, (char*) net->read_pos + 1, "", "", 4);
175 176 177 178
  // this is needed to make replicate-ignore-db
  if (!strcmp(fname,"/dev/null"))
    goto end;

Marc Alff's avatar
Marc Alff committed
179 180
  if ((fd= mysql_file_open(key_file_send_file,
                           fname, O_RDONLY, MYF(0))) < 0)
181
  {
182
    errmsg = "on open of file";
183 184 185
    goto err;
  }

Marc Alff's avatar
Marc Alff committed
186
  while ((long) (bytes= mysql_file_read(fd, buf, IO_SIZE, MYF(0))) > 0)
187 188 189
  {
    if (my_net_write(net, buf, bytes))
    {
190
      errmsg = "while writing data to client";
191 192 193 194 195
      goto err;
    }
  }

 end:
196
  if (my_net_write(net, (uchar*) "", 0) || net_flush(net) ||
197 198
      (my_net_read(net) == packet_error))
  {
199
    errmsg = "while negotiating file transfer close";
200 201 202 203 204
    goto err;
  }
  error = 0;

 err:
205
  my_net_set_read_timeout(net, old_timeout);
206
  if (fd >= 0)
Marc Alff's avatar
Marc Alff committed
207
    mysql_file_close(fd, MYF(0));
208 209
  if (errmsg)
  {
210
    sql_print_error("Failed in send_file() %s", errmsg);
Staale Smedseng's avatar
Staale Smedseng committed
211
    DBUG_PRINT("error", ("%s", errmsg));
212 213 214 215
  }
  DBUG_RETURN(error);
}

216

217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296
/**
   Internal to mysql_binlog_send() routine that recalculates checksum for
   a FD event (asserted) that needs additional arranment prior sending to slave.
*/
inline void fix_checksum(String *packet, ulong ev_offset)
{
  /* recalculate the crc for this event */
  uint data_len = uint4korr(packet->ptr() + ev_offset + EVENT_LEN_OFFSET);
  ha_checksum crc= my_checksum(0L, NULL, 0);
  DBUG_ASSERT(data_len == 
              LOG_EVENT_MINIMAL_HEADER_LEN + FORMAT_DESCRIPTION_HEADER_LEN +
              BINLOG_CHECKSUM_ALG_DESC_LEN + BINLOG_CHECKSUM_LEN);
  crc= my_checksum(crc, (uchar *)packet->ptr() + ev_offset, data_len -
                   BINLOG_CHECKSUM_LEN);
  int4store(packet->ptr() + ev_offset + data_len - BINLOG_CHECKSUM_LEN, crc);
}


static user_var_entry * get_binlog_checksum_uservar(THD * thd)
{
  LEX_STRING name=  { C_STRING_WITH_LEN("master_binlog_checksum")};
  user_var_entry *entry= 
    (user_var_entry*) my_hash_search(&thd->user_vars, (uchar*) name.str,
                                  name.length);
  return entry;
}

/**
  Function for calling in mysql_binlog_send
  to check if slave initiated checksum-handshake.

  @param[in]    thd  THD to access a user variable

  @return        TRUE if handshake took place, FALSE otherwise
*/

static bool is_slave_checksum_aware(THD * thd)
{
  DBUG_ENTER("is_slave_checksum_aware");
  user_var_entry *entry= get_binlog_checksum_uservar(thd);
  DBUG_RETURN(entry? true  : false);
}

/**
  Function for calling in mysql_binlog_send
  to get the value of @@binlog_checksum of the master at
  time of checksum-handshake.

  The value tells the master whether to compute or not, and the slave
  to verify or not the first artificial Rotate event's checksum.

  @param[in]    thd  THD to access a user variable

  @return       value of @@binlog_checksum alg according to
                @c enum enum_binlog_checksum_alg
*/

static uint8 get_binlog_checksum_value_at_connect(THD * thd)
{
  uint8 ret;

  DBUG_ENTER("get_binlog_checksum_value_at_connect");
  user_var_entry *entry= get_binlog_checksum_uservar(thd);
  if (!entry)
  {
    ret= BINLOG_CHECKSUM_ALG_UNDEF;
  }
  else
  {
    DBUG_ASSERT(entry->type == STRING_RESULT);
    String str;
    uint dummy_errors;
    str.copy(entry->value, entry->length, &my_charset_bin, &my_charset_bin,
             &dummy_errors);
    ret= (uint8) find_type ((char*) str.ptr(), &binlog_checksum_typelib, 1) - 1;
    DBUG_ASSERT(ret <= BINLOG_CHECKSUM_ALG_CRC32); // while it's just on CRC32 alg
  }
  DBUG_RETURN(ret);
}

297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317
/*
  Adjust the position pointer in the binary log file for all running slaves

  SYNOPSIS
    adjust_linfo_offsets()
    purge_offset	Number of bytes removed from start of log index file

  NOTES
    - This is called when doing a PURGE when we delete lines from the
      index log file

  REQUIREMENTS
    - Before calling this function, we have to ensure that no threads are
      using any binary log file before purge_offset.a

  TODO
    - Inform the slave threads that they should sync the position
      in the binary log file with flush_relay_log_info.
      Now they sync is done for next read.
*/

unknown's avatar
unknown committed
318 319 320
void adjust_linfo_offsets(my_off_t purge_offset)
{
  THD *tmp;
321

Marc Alff's avatar
Marc Alff committed
322
  mysql_mutex_lock(&LOCK_thread_count);
unknown's avatar
unknown committed
323 324
  I_List_iterator<THD> it(threads);

325 326 327 328 329
  while ((tmp=it++))
  {
    LOG_INFO* linfo;
    if ((linfo = tmp->current_linfo))
    {
Marc Alff's avatar
Marc Alff committed
330
      mysql_mutex_lock(&linfo->lock);
331 332 333 334
      /*
	Index file offset can be less that purge offset only if
	we just started reading the index file. In that case
	we have nothing to adjust
335
      */
336 337 338 339
      if (linfo->index_file_offset < purge_offset)
	linfo->fatal = (linfo->index_file_offset != 0);
      else
	linfo->index_file_offset -= purge_offset;
Marc Alff's avatar
Marc Alff committed
340
      mysql_mutex_unlock(&linfo->lock);
341 342
    }
  }
Marc Alff's avatar
Marc Alff committed
343
  mysql_mutex_unlock(&LOCK_thread_count);
unknown's avatar
unknown committed
344 345
}

unknown's avatar
merge  
unknown committed
346

unknown's avatar
unknown committed
347 348
bool log_in_use(const char* log_name)
{
349
  size_t log_name_len = strlen(log_name) + 1;
unknown's avatar
unknown committed
350 351
  THD *tmp;
  bool result = 0;
352

Marc Alff's avatar
Marc Alff committed
353
  mysql_mutex_lock(&LOCK_thread_count);
unknown's avatar
unknown committed
354
  I_List_iterator<THD> it(threads);
355 356 357 358 359

  while ((tmp=it++))
  {
    LOG_INFO* linfo;
    if ((linfo = tmp->current_linfo))
unknown's avatar
unknown committed
360
    {
Marc Alff's avatar
Marc Alff committed
361
      mysql_mutex_lock(&linfo->lock);
362
      result = !memcmp(log_name, linfo->log_file_name, log_name_len);
Marc Alff's avatar
Marc Alff committed
363
      mysql_mutex_unlock(&linfo->lock);
364 365
      if (result)
	break;
366 367
    }
  }
unknown's avatar
unknown committed
368

Marc Alff's avatar
Marc Alff committed
369
  mysql_mutex_unlock(&LOCK_thread_count);
unknown's avatar
unknown committed
370 371 372
  return result;
}

unknown's avatar
unknown committed
373
bool purge_error_message(THD* thd, int res)
unknown's avatar
unknown committed
374
{
375
  uint errcode;
376

377
  if ((errcode= purge_log_get_error_code(res)) != 0)
378
  {
379
    my_message(errcode, ER(errcode), MYF(0));
unknown's avatar
unknown committed
380
    return TRUE;
381
  }
382
  my_ok(thd);
unknown's avatar
unknown committed
383
  return FALSE;
unknown's avatar
unknown committed
384 385
}

unknown's avatar
unknown committed
386

387 388 389 390 391 392 393 394 395 396 397
/**
  Execute a PURGE BINARY LOGS TO <log> command.

  @param thd Pointer to THD object for the client thread executing the
  statement.

  @param to_log Name of the last log to purge.

  @retval FALSE success
  @retval TRUE failure
*/
unknown's avatar
unknown committed
398
bool purge_master_logs(THD* thd, const char* to_log)
399 400
{
  char search_file_name[FN_REFLEN];
unknown's avatar
unknown committed
401 402
  if (!mysql_bin_log.is_open())
  {
403
    my_ok(thd);
unknown's avatar
unknown committed
404
    return FALSE;
unknown's avatar
unknown committed
405
  }
406 407

  mysql_bin_log.make_log_name(search_file_name, to_log);
unknown's avatar
unknown committed
408 409
  return purge_error_message(thd,
			     mysql_bin_log.purge_logs(search_file_name, 0, 1,
unknown's avatar
unknown committed
410
						      1, NULL));
411 412 413
}


414 415 416 417 418 419 420 421 422 423 424
/**
  Execute a PURGE BINARY LOGS BEFORE <date> command.

  @param thd Pointer to THD object for the client thread executing the
  statement.

  @param purge_time Date before which logs should be purged.

  @retval FALSE success
  @retval TRUE failure
*/
unknown's avatar
unknown committed
425
bool purge_master_logs_before_date(THD* thd, time_t purge_time)
426
{
427 428
  if (!mysql_bin_log.is_open())
  {
429
    my_ok(thd);
430 431 432 433
    return 0;
  }
  return purge_error_message(thd,
                             mysql_bin_log.purge_logs_before_date(purge_time));
434 435
}

436
int test_for_non_eof_log_read_errors(int error, const char **errmsg)
437
{
438
  if (error == LOG_READ_EOF)
439 440 441 442
    return 0;
  my_errno= ER_MASTER_FATAL_ERROR_READING_BINLOG;
  switch (error) {
  case LOG_READ_BOGUS:
443
    *errmsg = "bogus data in log event";
444 445
    break;
  case LOG_READ_TOO_LARGE:
446
    *errmsg = "log event entry exceeded max_allowed_packet; \
447 448 449
Increase max_allowed_packet on master";
    break;
  case LOG_READ_IO:
450
    *errmsg = "I/O error reading log event";
451 452
    break;
  case LOG_READ_MEM:
453
    *errmsg = "memory allocation failed reading log event";
454 455
    break;
  case LOG_READ_TRUNC:
456
    *errmsg = "binlog truncated in the middle of event; consider out of disk space on master";
457
    break;
458 459 460
  case LOG_READ_CHECKSUM_FAILURE:
    *errmsg = "event read from binlog did not pass crc check";
    break;
461
  default:
462
    *errmsg = "unknown error reading log event on the master";
463 464 465 466 467 468
    break;
  }
  return error;
}


Andrei Elkin's avatar
Andrei Elkin committed
469 470 471 472 473 474 475 476 477 478 479
/**
  An auxiliary function for calling in mysql_binlog_send
  to initialize the heartbeat timeout in waiting for a binlogged event.

  @param[in]    thd  THD to access a user variable

  @return        heartbeat period an ulonglong of nanoseconds
                 or zero if heartbeat was not demanded by slave
*/ 
static ulonglong get_heartbeat_period(THD * thd)
{
480
  bool null_value;
Andrei Elkin's avatar
Andrei Elkin committed
481 482
  LEX_STRING name=  { C_STRING_WITH_LEN("master_heartbeat_period")};
  user_var_entry *entry= 
483
    (user_var_entry*) my_hash_search(&thd->user_vars, (uchar*) name.str,
Andrei Elkin's avatar
Andrei Elkin committed
484 485 486 487
                                  name.length);
  return entry? entry->val_int(&null_value) : 0;
}

488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508
/*
  Lookup the capabilities of the slave, which it announces by setting a value
  MARIA_SLAVE_CAPABILITY_XXX in @mariadb_slave_capability.

  Older MariaDB slaves, and other MySQL slaves, do not set
  @mariadb_slave_capability, corresponding to a capability of
  MARIA_SLAVE_CAPABILITY_UNKNOWN (0).
*/
static int
get_mariadb_slave_capability(THD *thd)
{
  bool null_value;
  const LEX_STRING name= { C_STRING_WITH_LEN("mariadb_slave_capability") };
  const user_var_entry *entry=
    (user_var_entry*) my_hash_search(&thd->user_vars, (uchar*) name.str,
                                  name.length);
  return entry ?
    (int)(entry->val_int(&null_value)) : MARIA_SLAVE_CAPABILITY_UNKNOWN;
}


509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528
/*
  Get the value of the @slave_connect_state user variable into the supplied
  String (this is the GTID connect state requested by the connecting slave).

  Returns false if error (ie. slave did not set the variable and does not
  want to use GTID to set start position), true if success.
*/
static bool
get_slave_connect_state(THD *thd, String *out_str)
{
  bool null_value;

  const LEX_STRING name= { C_STRING_WITH_LEN("slave_connect_state") };
  user_var_entry *entry=
    (user_var_entry*) my_hash_search(&thd->user_vars, (uchar*) name.str,
                                  name.length);
  return entry && entry->val_str(&null_value, out_str, 0) && !null_value;
}


Andrei Elkin's avatar
Andrei Elkin committed
529 530 531 532 533 534 535 536 537 538 539 540 541 542 543
/*
  Function prepares and sends repliation heartbeat event.

  @param net                net object of THD
  @param packet             buffer to store the heartbeat instance
  @param event_coordinates  binlog file name and position of the last
                            real event master sent from binlog

  @note 
    Among three essential pieces of heartbeat data Log_event::when
    is computed locally.
    The  error to send is serious and should force terminating
    the dump thread.
*/
static int send_heartbeat_event(NET* net, String* packet,
unknown's avatar
unknown committed
544 545
                                const struct event_coordinates *coord,
                                uint8 checksum_alg_arg)
Andrei Elkin's avatar
Andrei Elkin committed
546 547 548
{
  DBUG_ENTER("send_heartbeat_event");
  char header[LOG_EVENT_HEADER_LEN];
unknown's avatar
unknown committed
549 550
  my_bool do_checksum= checksum_alg_arg != BINLOG_CHECKSUM_ALG_OFF &&
    checksum_alg_arg != BINLOG_CHECKSUM_ALG_UNDEF;
Andrei Elkin's avatar
Andrei Elkin committed
551 552 553 554 555 556 557 558 559 560 561
  /*
    'when' (the timestamp) is set to 0 so that slave could distinguish between
    real and fake Rotate events (if necessary)
  */
  memset(header, 0, 4);  // when

  header[EVENT_TYPE_OFFSET] = HEARTBEAT_LOG_EVENT;

  char* p= coord->file_name + dirname_length(coord->file_name);

  uint ident_len = strlen(p);
unknown's avatar
unknown committed
562 563
  ulong event_len = ident_len + LOG_EVENT_HEADER_LEN +
    (do_checksum ? BINLOG_CHECKSUM_LEN : 0);
564
  int4store(header + SERVER_ID_OFFSET, global_system_variables.server_id);
Andrei Elkin's avatar
Andrei Elkin committed
565 566 567 568 569 570 571 572
  int4store(header + EVENT_LEN_OFFSET, event_len);
  int2store(header + FLAGS_OFFSET, 0);

  int4store(header + LOG_POS_OFFSET, coord->pos);  // log_pos

  packet->append(header, sizeof(header));
  packet->append(p, ident_len);             // log_file_name

unknown's avatar
unknown committed
573 574 575 576 577 578 579 580 581 582
  if (do_checksum)
  {
    char b[BINLOG_CHECKSUM_LEN];
    ha_checksum crc= my_checksum(0L, NULL, 0);
    crc= my_checksum(crc, (uchar*) header, sizeof(header));
    crc= my_checksum(crc, (uchar*) p, ident_len);
    int4store(b, crc);
    packet->append(b, sizeof(b));
  }

Andrei Elkin's avatar
Andrei Elkin committed
583 584 585 586 587 588 589 590
  if (my_net_write(net, (uchar*) packet->ptr(), packet->length()) ||
      net_flush(net))
  {
    DBUG_RETURN(-1);
  }
  DBUG_RETURN(0);
}

591

592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658
struct binlog_file_entry
{
  binlog_file_entry *next;
  char *name;
};

static binlog_file_entry *
get_binlog_list(MEM_ROOT *memroot)
{
  IO_CACHE *index_file;
  char fname[FN_REFLEN];
  size_t length;
  binlog_file_entry *current_list= NULL, *e;
  DBUG_ENTER("get_binlog_list");

  if (!mysql_bin_log.is_open())
  {
    my_error(ER_NO_BINARY_LOGGING, MYF(0));
    DBUG_RETURN(NULL);
  }

  mysql_bin_log.lock_index();
  index_file=mysql_bin_log.get_index_file();
  reinit_io_cache(index_file, READ_CACHE, (my_off_t) 0, 0, 0);

  /* The file ends with EOF or empty line */
  while ((length=my_b_gets(index_file, fname, sizeof(fname))) > 1)
  {
    --length;                                   /* Remove the newline */
    if (!(e= (binlog_file_entry *)alloc_root(memroot, sizeof(*e))) ||
        !(e->name= strmake_root(memroot, fname, length)))
    {
      mysql_bin_log.unlock_index();
      my_error(ER_OUTOFMEMORY, MYF(0), length + 1 + sizeof(*e));
      DBUG_RETURN(NULL);
    }
    e->next= current_list;
    current_list= e;
  }
  mysql_bin_log.unlock_index();

  DBUG_RETURN(current_list);
}

/*
  Find the Gtid_list_log_event at the start of a binlog.

  NULL for ok, non-NULL error message for error.

  If ok, then the event is returned in *out_gtid_list. This can be NULL if we
  get back to binlogs written by old server version without GTID support. If
  so, it means we have reached the point to start from, as no GTID events can
  exist in earlier binlogs.
*/
static const char *
get_gtid_list_event(IO_CACHE *cache, Gtid_list_log_event **out_gtid_list)
{
  Format_description_log_event init_fdle(BINLOG_VERSION);
  Format_description_log_event *fdle;
  Log_event *ev;
  const char *errormsg = NULL;

  *out_gtid_list= NULL;

  if (!(ev= Log_event::read_log_event(cache, 0, &init_fdle,
                                      opt_master_verify_checksum)) ||
      ev->get_type_code() != FORMAT_DESCRIPTION_EVENT)
unknown's avatar
unknown committed
659 660 661
  {
    if (ev)
      delete ev;
662 663
    return "Could not read format description log event while looking for "
      "GTID position in binlog";
unknown's avatar
unknown committed
664
  }
665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681

  fdle= static_cast<Format_description_log_event *>(ev);

  for (;;)
  {
    Log_event_type typ;

    ev= Log_event::read_log_event(cache, 0, fdle, opt_master_verify_checksum);
    if (!ev)
    {
      errormsg= "Could not read GTID list event while looking for GTID "
        "position in binlog";
      break;
    }
    typ= ev->get_type_code();
    if (typ == GTID_LIST_EVENT)
      break;                                    /* Done, found it */
682
    delete ev;
683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802
    if (typ == ROTATE_EVENT || typ == STOP_EVENT ||
        typ == FORMAT_DESCRIPTION_EVENT)
      continue;                                 /* Continue looking */

    /* We did not find any Gtid_list_log_event, must be old binlog. */
    ev= NULL;
    break;
  }

  delete fdle;
  *out_gtid_list= static_cast<Gtid_list_log_event *>(ev);
  return errormsg;
}


/*
  Check if every GTID requested by the slave is contained in this (or a later)
  binlog file. Return true if so, false if not.
*/
static bool
contains_all_slave_gtid(slave_connection_state *st, Gtid_list_log_event *glev)
{
  uint32 i;

  for (i= 0; i < glev->count; ++i)
  {
    const rpl_gtid *gtid= st->find(glev->list[i].domain_id);
    if (gtid != NULL &&
        gtid->server_id == glev->list[i].server_id &&
        gtid->seq_no <= glev->list[i].seq_no)
    {
      /*
        The slave needs to receive gtid, but it is contained in an earlier
        binlog file. So we need to serch back further.
      */
      return false;
    }
  }
  return true;
}


/*
  Find the name of the binlog file to start reading for a slave that connects
  using GTID state.

  Returns the file name in out_name, which must be of size at least FN_REFLEN.

  Returns NULL on ok, error message on error.
*/
static const char *
gtid_find_binlog_file(slave_connection_state *state, char *out_name)
{
  MEM_ROOT memroot;
  binlog_file_entry *list;
  Gtid_list_log_event *glev;
  const char *errormsg= NULL;
  IO_CACHE cache;
  File file = (File)-1;
  char buf[FN_REFLEN];

  bzero((char*) &cache, sizeof(cache));
  init_alloc_root(&memroot, 10*(FN_REFLEN+sizeof(binlog_file_entry)), 0);
  if (!(list= get_binlog_list(&memroot)))
  {
    errormsg= "Out of memory while looking for GTID position in binlog";
    goto end;
  }

  while (list)
  {
    if (!list->next)
    {
      /*
        It should be safe to read the currently used binlog, as we will only
        read the header part that is already written.

        But if that does not work on windows, then we will need to cache the
        event somewhere in memory I suppose - that could work too.
      */
    }
    /*
      Read the Gtid_list_log_event at the start of the binlog file to
      get the binlog state.
    */
    if (normalize_binlog_name(buf, list->name, false))
    {
      errormsg= "Failed to determine binlog file name while looking for "
        "GTID position in binlog";
      goto end;
    }
    if ((file= open_binlog(&cache, buf, &errormsg)) == (File)-1 ||
        (errormsg= get_gtid_list_event(&cache, &glev)))
      goto end;

    if (!glev || contains_all_slave_gtid(state, glev))
    {
      strmake(out_name, buf, FN_REFLEN);
      goto end;
    }
    list= list->next;
  }

  /* We reached the end without finding anything. */
  errormsg= "Could not find GTID state requested by slave in any binlog "
    "files. Probably the slave state is too old and required binlog files "
    "have been purged.";

end:
  if (file != (File)-1)
  {
    end_io_cache(&cache);
    mysql_file_close(file, MYF(MY_WME));
  }

  free_root(&memroot, MYF(0));
  return errormsg;
}


unknown's avatar
unknown committed
803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960
/*
  Given an old-style binlog position with file name and file offset, find the
  corresponding gtid position. If the offset is not at an event boundary, give
  an error.

  Return NULL on ok, error message string on error.

  ToDo: Improve the performance of this by using binlog index files.
*/
static const char *
gtid_state_from_pos(const char *name, uint32 offset,
                    slave_connection_state *gtid_state)
{
  IO_CACHE cache;
  File file;
  const char *errormsg= NULL;
  bool found_gtid_list_event= false;
  bool found_format_description_event= false;
  bool valid_pos= false;
  uint8 current_checksum_alg= BINLOG_CHECKSUM_ALG_UNDEF;
  int err;
  String packet;

  if (gtid_state->load((const rpl_gtid *)NULL, 0))
  {
    errormsg= "Internal error (out of memory?) initializing slave state "
      "while scanning binlog to find start position";
    return errormsg;
  }

  if ((file= open_binlog(&cache, name, &errormsg)) == (File)-1)
    return errormsg;

  /*
    First we need to find the initial GTID_LIST_EVENT. We need this even
    if the offset is at the very start of the binlog file.

    But if we do not find any GTID_LIST_EVENT, then this is an old binlog
    with no GTID information, so we return empty GTID state.
  */
  for (;;)
  {
    Log_event_type typ;
    uint32 cur_pos;

    cur_pos= (uint32)my_b_tell(&cache);
    if (cur_pos == offset)
      valid_pos= true;
    if (found_format_description_event && found_gtid_list_event &&
        cur_pos >= offset)
      break;

    packet.length(0);
    err= Log_event::read_log_event(&cache, &packet, NULL,
                                   current_checksum_alg);
    if (err)
    {
      errormsg= "Could not read binlog while searching for slave start "
        "position on master";
      goto end;
    }
    /*
      The cast to uchar is needed to avoid a signed char being converted to a
      negative number.
    */
    typ= (Log_event_type)(uchar)packet[EVENT_TYPE_OFFSET];
    if (typ == FORMAT_DESCRIPTION_EVENT)
    {
      if (found_format_description_event)
      {
        errormsg= "Duplicate format description log event found while "
          "searching for old-style position in binlog";
        goto end;
      }

      current_checksum_alg= get_checksum_alg(packet.ptr(), packet.length());
      found_format_description_event= true;
    }
    else if (typ != FORMAT_DESCRIPTION_EVENT && !found_format_description_event)
    {
      errormsg= "Did not find format description log event while searching "
        "for old-style position in binlog";
      goto end;
    }
    else if (typ == ROTATE_EVENT || typ == STOP_EVENT ||
             typ == BINLOG_CHECKPOINT_EVENT)
      continue;                                 /* Continue looking */
    else if (typ == GTID_LIST_EVENT)
    {
      rpl_gtid *gtid_list;
      bool status;
      uint32 list_len;

      if (found_gtid_list_event)
      {
        errormsg= "Found duplicate Gtid_list_log_event while scanning binlog "
          "to find slave start position";
        goto end;
      }
      status= Gtid_list_log_event::peek(packet.ptr(), packet.length(),
                                        &gtid_list, &list_len);
      if (status)
      {
        errormsg= "Error reading Gtid_list_log_event while searching "
          "for old-style position in binlog";
        goto end;
      }
      err= gtid_state->load(gtid_list, list_len);
      my_free(gtid_list);
      if (err)
      {
        errormsg= "Internal error (out of memory?) initialising slave state "
          "while scanning binlog to find start position";
        goto end;
      }
      found_gtid_list_event= true;
    }
    else if (!found_gtid_list_event)
    {
      /* We did not find any Gtid_list_log_event, must be old binlog. */
      goto end;
    }
    else if (typ == GTID_EVENT)
    {
      rpl_gtid gtid;
      uchar flags2;
      if (Gtid_log_event::peek(packet.ptr(), packet.length(), &gtid.domain_id,
                               &gtid.server_id, &gtid.seq_no, &flags2))
      {
        errormsg= "Corrupt gtid_log_event found while scanning binlog to find "
          "initial slave position";
        goto end;
      }
      if (gtid_state->update(&gtid))
      {
        errormsg= "Internal error (out of memory?) updating slave state while "
          "scanning binlog to find start position";
        goto end;
      }
    }
  }

  if (!valid_pos)
  {
    errormsg= "Slave requested incorrect position in master binlog. "
      "Requested position %u in file '%s', but this position does not "
      "correspond to the location of any binlog event.";
  }

end:
  end_io_cache(&cache);
  mysql_file_close(file, MYF(MY_WME));

  return errormsg;
}


int
unknown's avatar
unknown committed
961
gtid_state_from_binlog_pos(const char *in_name, uint32 pos, String *out_str)
unknown's avatar
unknown committed
962 963
{
  slave_connection_state gtid_state;
unknown's avatar
unknown committed
964 965 966 967 968 969 970 971 972 973 974 975 976 977
  const char *lookup_name;
  char name_buf[FN_REFLEN];
  LOG_INFO linfo;

  if (in_name && in_name[0])
  {
    mysql_bin_log.make_log_name(name_buf, in_name);
    lookup_name= name_buf;
  }
  else
    lookup_name= NULL;
  linfo.index_file_offset= 0;
  if (mysql_bin_log.find_log_pos(&linfo, lookup_name, 1))
    return 1;
unknown's avatar
unknown committed
978 979 980

  if (pos < 4)
    pos= 4;
unknown's avatar
unknown committed
981 982

  if (gtid_state_from_pos(linfo.log_file_name, pos, &gtid_state) ||
unknown's avatar
unknown committed
983 984 985 986 987 988
      gtid_state.to_string(out_str))
    return 1;
  return 0;
}


989 990 991 992
enum enum_gtid_skip_type {
  GTID_SKIP_NOT, GTID_SKIP_STANDALONE, GTID_SKIP_TRANSACTION
};

993
/*
994 995 996 997
  Helper function for mysql_binlog_send() to write an event down the slave
  connection.

  Returns NULL on success, error message string on error.
998
*/
999
static const char *
1000 1001
send_event_to_slave(THD *thd, NET *net, String* const packet, ushort flags,
                    Log_event_type event_type, char *log_file_name,
1002
                    IO_CACHE *log, int mariadb_slave_capability,
1003 1004 1005
                    ulong ev_offset, uint8 current_checksum_alg,
                    bool using_gtid_state, slave_connection_state *gtid_state,
                    enum_gtid_skip_type *gtid_skip_group)
1006
{
1007 1008
  my_off_t pos;

1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061
  /* Skip GTID event groups until we reach slave position within a domain_id. */
  if (event_type == GTID_EVENT && using_gtid_state && gtid_state->count() > 0)
  {
    uint32 server_id, domain_id;
    uint64 seq_no;
    uchar flags2;
    rpl_gtid *gtid;
    size_t len= packet->length();

    if (ev_offset > len ||
        Gtid_log_event::peek(packet->ptr()+ev_offset, len - ev_offset,
                             &domain_id, &server_id, &seq_no, &flags2))
      return "Failed to read Gtid_log_event: corrupt binlog";
    gtid= gtid_state->find(domain_id);
    if (gtid != NULL)
    {
      /* Skip this event group if we have not yet reached slave start pos. */
      if (server_id != gtid->server_id || seq_no <= gtid->seq_no)
        *gtid_skip_group = (flags2 & Gtid_log_event::FL_STANDALONE ?
                            GTID_SKIP_STANDALONE : GTID_SKIP_TRANSACTION);
      /*
        Delete this entry if we have reached slave start position (so we will
        not skip subsequent events and won't have to look them up and check).
      */
      if (server_id == gtid->server_id && seq_no >= gtid->seq_no)
        gtid_state->remove(gtid);
    }
  }

  /*
    Skip event group if we have not yet reached the correct slave GTID position.

    Note that slave that understands GTID can also tolerate holes, so there is
    no need to supply dummy event.
  */
  switch (*gtid_skip_group)
  {
  case GTID_SKIP_STANDALONE:
    if (event_type != INTVAR_EVENT &&
        event_type != RAND_EVENT &&
        event_type != USER_VAR_EVENT &&
        event_type != TABLE_MAP_EVENT &&
        event_type != ANNOTATE_ROWS_EVENT)
      *gtid_skip_group= GTID_SKIP_NOT;
    return NULL;
  case GTID_SKIP_TRANSACTION:
    if (event_type == XID_EVENT /* ToDo || is_COMMIT_query_event() */)
      *gtid_skip_group= GTID_SKIP_NOT;
    return NULL;
  case GTID_SKIP_NOT:
    break;
  }

1062
  /* Do not send annotate_rows events unless slave requested it. */
1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094
  if (event_type == ANNOTATE_ROWS_EVENT && !(flags & BINLOG_SEND_ANNOTATE_ROWS_EVENT))
  {
    if (mariadb_slave_capability >= MARIA_SLAVE_CAPABILITY_TOLERATE_HOLES)
    {
      /* This slave can tolerate events omitted from the binlog stream. */
      return NULL;
    }
    else if (mariadb_slave_capability >= MARIA_SLAVE_CAPABILITY_ANNOTATE)
    {
      /*
        The slave did not request ANNOTATE_ROWS_EVENT (it does not need them as
        it will not log them in its own binary log). However, it understands the
        event and will just ignore it, and it would break if we omitted it,
        leaving a hole in the binlog stream. So just send the event as-is.
      */
    }
    else
    {
      /*
        The slave does not understand ANNOTATE_ROWS_EVENT.

        Older MariaDB slaves (and MySQL slaves) will break replication if there
        are holes in the binlog stream (they will miscompute the binlog offset
        and request the wrong position when reconnecting).

        So replace the event with a dummy event of the same size that will be
        a no-operation on the slave.
      */
      if (Query_log_event::dummy_event(packet, ev_offset, current_checksum_alg))
        return "Failed to replace row annotate event with dummy: too small event.";
    }
  }
1095

1096
  /*
1097 1098 1099 1100
    Replace GTID events with old-style BEGIN events for slaves that do not
    understand global transaction IDs. For stand-alone events, where there is
    no terminating COMMIT query event, omit the GTID event or replace it with
    a dummy event, as appropriate.
1101
  */
1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124
  if (event_type == GTID_EVENT &&
      mariadb_slave_capability < MARIA_SLAVE_CAPABILITY_GTID)
  {
    bool need_dummy=
      mariadb_slave_capability < MARIA_SLAVE_CAPABILITY_TOLERATE_HOLES;
    bool err= Gtid_log_event::make_compatible_event(packet, &need_dummy,
                                                    ev_offset,
                                                    current_checksum_alg);
    if (err)
      return "Failed to replace GTID event with backwards-compatible event: "
             "currupt event.";
    if (!need_dummy)
      return NULL;
  }

  /*
    Do not send binlog checkpoint or gtid list events to a slave that does not
    understand it.
  */
  if ((unlikely(event_type == BINLOG_CHECKPOINT_EVENT) &&
       mariadb_slave_capability < MARIA_SLAVE_CAPABILITY_BINLOG_CHECKPOINT) ||
      (unlikely(event_type == GTID_LIST_EVENT) &&
       mariadb_slave_capability < MARIA_SLAVE_CAPABILITY_GTID))
1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138
  {
    if (mariadb_slave_capability >= MARIA_SLAVE_CAPABILITY_TOLERATE_HOLES)
    {
      /* This slave can tolerate events omitted from the binlog stream. */
      return NULL;
    }
    else
    {
      /*
        The slave does not understand BINLOG_CHECKPOINT_EVENT. Send a dummy
        event instead, with same length so slave does not get confused about
        binlog positions.
      */
      if (Query_log_event::dummy_event(packet, ev_offset, current_checksum_alg))
unknown's avatar
unknown committed
1139 1140
        return "Failed to replace binlog checkpoint or gtid list event with "
               "dummy: too small event.";
1141 1142 1143
    }
  }

1144
  /*
1145
    Skip events with the @@skip_replication flag set, if slave requested
1146 1147
    skipping of such events.
  */
1148
  if (thd->variables.option_bits & OPTION_SKIP_REPLICATION)
1149
  {
1150 1151 1152 1153
    /*
      The first byte of the packet is a '\0' to distinguish it from an error
      packet. So the actual event starts at offset +1.
    */
1154 1155
    uint16 event_flags= uint2korr(&((*packet)[FLAGS_OFFSET+1]));
    if (event_flags & LOG_EVENT_SKIP_REPLICATION_F)
1156 1157 1158
      return NULL;
  }

1159 1160 1161 1162 1163 1164 1165
  thd_proc_info(thd, "Sending binlog event to slave");

  pos= my_b_tell(log);
  if (RUN_HOOK(binlog_transmit, before_send_event,
               (thd, flags, packet, log_file_name, pos)))
    return "run 'before_send_event' hook failed";

1166 1167 1168 1169
  if (my_net_write(net, (uchar*) packet->ptr(), packet->length()))
    return "Failed on my_net_write()";

  DBUG_PRINT("info", ("log event code %d", (*packet)[LOG_EVENT_OFFSET+1] ));
1170
  if (event_type == LOAD_EVENT)
1171 1172 1173 1174 1175
  {
    if (send_file(thd))
      return "failed in send_file()";
  }

1176 1177 1178
  if (RUN_HOOK(binlog_transmit, after_send_event, (thd, flags, packet)))
    return "Failed to run hook 'after_send_event'";

1179 1180
  return NULL;    /* Success */
}
unknown's avatar
merge  
unknown committed
1181

1182 1183
void mysql_binlog_send(THD* thd, char* log_ident, my_off_t pos,
		       ushort flags)
1184 1185 1186
{
  LOG_INFO linfo;
  char *log_file_name = linfo.log_file_name;
1187
  char search_file_name[FN_REFLEN], *name;
He Zhenxing's avatar
He Zhenxing committed
1188 1189 1190

  ulong ev_offset;

1191 1192
  IO_CACHE log;
  File file = -1;
1193
  String* const packet = &thd->packet;
1194
  int error;
1195
  const char *errmsg = "Unknown error", *tmp_msg;
1196
  char error_text[MAX_SLAVE_ERRMSG]; // to be send to slave via my_message()
1197
  NET* net = &thd->net;
Marc Alff's avatar
Marc Alff committed
1198
  mysql_mutex_t *log_lock;
1199
  mysql_cond_t *log_cond;
1200
  int mariadb_slave_capability;
1201 1202 1203
  char str_buf[256];
  String connect_gtid_state(str_buf, sizeof(str_buf), system_charset_info);
  bool using_gtid_state;
unknown's avatar
unknown committed
1204
  slave_connection_state gtid_state, return_gtid_state;
1205
  enum_gtid_skip_type gtid_skip_group= GTID_SKIP_NOT;
1206

1207
  uint8 current_checksum_alg= BINLOG_CHECKSUM_ALG_UNDEF;
Michael Widenius's avatar
Michael Widenius committed
1208
  int old_max_allowed_packet= thd->variables.max_allowed_packet;
1209 1210
#ifndef DBUG_OFF
  int left_events = max_binlog_dump_events;
1211
#endif
1212
  DBUG_ENTER("mysql_binlog_send");
1213 1214
  DBUG_PRINT("enter",("log_ident: '%s'  pos: %ld", log_ident, (long) pos));

1215
  bzero((char*) &log,sizeof(log));
Andrei Elkin's avatar
Andrei Elkin committed
1216 1217 1218 1219 1220 1221
  /* 
     heartbeat_period from @master_heartbeat_period user variable
  */
  ulonglong heartbeat_period= get_heartbeat_period(thd);
  struct timespec heartbeat_buf;
  struct timespec *heartbeat_ts= NULL;
1222 1223 1224 1225
  const LOG_POS_COORD start_coord= { log_ident, pos },
    *p_start_coord= &start_coord;
  LOG_POS_COORD coord_buf= { log_file_name, BIN_LOG_HEADER_SIZE },
    *p_coord= &coord_buf;
Andrei Elkin's avatar
Andrei Elkin committed
1226 1227 1228 1229 1230
  if (heartbeat_period != LL(0))
  {
    heartbeat_ts= &heartbeat_buf;
    set_timespec_nsec(*heartbeat_ts, 0);
  }
1231
  mariadb_slave_capability= get_mariadb_slave_capability(thd);
1232 1233 1234 1235

  connect_gtid_state.length(0);
  using_gtid_state= get_slave_connect_state(thd, &connect_gtid_state);

1236 1237
  if (global_system_variables.log_warnings > 1)
    sql_print_information("Start binlog_dump to slave_server(%d), pos(%s, %lu)",
1238
                          (int)thd->variables.server_id, log_ident, (ulong)pos);
He Zhenxing's avatar
He Zhenxing committed
1239 1240 1241 1242 1243 1244
  if (RUN_HOOK(binlog_transmit, transmit_start, (thd, flags, log_ident, pos)))
  {
    errmsg= "Failed to run hook 'transmit_start'";
    my_errno= ER_UNKNOWN_ERROR;
    goto err;
  }
1245

unknown's avatar
unknown committed
1246
#ifndef DBUG_OFF
1247 1248 1249
  if (opt_sporadic_binlog_dump_fail && (binlog_dump_count++ % 2))
  {
    errmsg = "Master failed COM_BINLOG_DUMP to test if slave can recover";
1250
    my_errno= ER_UNKNOWN_ERROR;
1251 1252
    goto err;
  }
1253
#endif
1254

1255
  if (!mysql_bin_log.is_open())
1256 1257
  {
    errmsg = "Binary log is not open";
1258
    my_errno= ER_MASTER_FATAL_ERROR_READING_BINLOG;
1259 1260
    goto err;
  }
1261 1262 1263
  if (!server_id_supplied)
  {
    errmsg = "Misconfigured master - server id was not set";
1264
    my_errno= ER_MASTER_FATAL_ERROR_READING_BINLOG;
1265 1266 1267
    goto err;
  }

1268
  name=search_file_name;
1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285
  if (using_gtid_state)
  {
    if (gtid_state.load(connect_gtid_state.c_ptr_quick(),
                        connect_gtid_state.length()))
    {
      errmsg= "Out of memory or malformed slave request when obtaining start "
        "position from GTID state";
      my_errno= ER_UNKNOWN_ERROR;
      goto err;
    }
    if ((errmsg= gtid_find_binlog_file(&gtid_state, search_file_name)))
    {
      my_errno= ER_UNKNOWN_ERROR;
      goto err;
    }
    pos= 4;
  }
1286
  else
1287 1288 1289 1290 1291 1292
  {
    if (log_ident[0])
      mysql_bin_log.make_log_name(search_file_name, log_ident);
    else
      name=0;					// Find first log
  }
1293

unknown's avatar
unknown committed
1294
  linfo.index_file_offset = 0;
1295

1296
  if (mysql_bin_log.find_log_pos(&linfo, name, 1))
1297
  {
1298
    errmsg = "Could not find first log file name in binary log index file";
1299
    my_errno= ER_MASTER_FATAL_ERROR_READING_BINLOG;
1300 1301
    goto err;
  }
1302

Marc Alff's avatar
Marc Alff committed
1303
  mysql_mutex_lock(&LOCK_thread_count);
1304
  thd->current_linfo = &linfo;
Marc Alff's avatar
Marc Alff committed
1305
  mysql_mutex_unlock(&LOCK_thread_count);
1306

1307
  if ((file=open_binlog(&log, log_file_name, &errmsg)) < 0)
1308 1309
  {
    my_errno= ER_MASTER_FATAL_ERROR_READING_BINLOG;
1310
    goto err;
1311 1312
  }
  if (pos < BIN_LOG_HEADER_SIZE || pos > my_b_filelength(&log))
1313
  {
1314
    errmsg= "Client requested master to start replication from \
unknown's avatar
unknown committed
1315
impossible position";
1316
    my_errno= ER_MASTER_FATAL_ERROR_READING_BINLOG;
1317 1318
    goto err;
  }
1319

He Zhenxing's avatar
He Zhenxing committed
1320 1321 1322
  /* reset transmit packet for the fake rotate event below */
  if (reset_transmit_packet(thd, flags, &ev_offset, &errmsg))
    goto err;
1323

1324
  /*
1325
    Tell the client about the log name with a fake Rotate event;
1326 1327 1328 1329 1330 1331 1332 1333 1334
    this is needed even if we also send a Format_description_log_event
    just after, because that event does not contain the binlog's name.
    Note that as this Rotate event is sent before
    Format_description_log_event, the slave cannot have any info to
    understand this event's format, so the header len of
    Rotate_log_event is FROZEN (so in 5.0 it will have a header shorter
    than other events except FORMAT_DESCRIPTION_EVENT).
    Before 4.0.14 we called fake_rotate_event below only if (pos ==
    BIN_LOG_HEADER_SIZE), because if this is false then the slave
1335
    already knows the binlog's name.
1336 1337 1338 1339 1340 1341 1342
    Since, we always call fake_rotate_event; if the slave already knew
    the log's name (ex: CHANGE MASTER TO MASTER_LOG_FILE=...) this is
    useless but does not harm much. It is nice for 3.23 (>=.58) slaves
    which test Rotate events to see if the master is 4.0 (then they
    choose to stop because they can't replicate 4.0); by always calling
    fake_rotate_event we are sure that 3.23.58 and newer will detect the
    problem as soon as replication starts (BUG#198).
1343
    Always calling fake_rotate_event makes sending of normal
1344 1345 1346 1347 1348 1349 1350
    (=from-binlog) Rotate events a priori unneeded, but it is not so
    simple: the 2 Rotate events are not equivalent, the normal one is
    before the Stop event, the fake one is after. If we don't send the
    normal one, then the Stop event will be interpreted (by existing 4.0
    slaves) as "the master stopped", which is wrong. So for safety,
    given that we want minimum modification of 4.0, we send the normal
    and fake Rotates.
1351
  */
1352
  if (fake_rotate_event(net, packet, log_file_name, pos, &errmsg,
Michael Widenius's avatar
Michael Widenius committed
1353
                        get_binlog_checksum_value_at_connect(thd)))
unknown's avatar
unknown committed
1354
  {
1355 1356 1357 1358
    /*
       This error code is not perfect, as fake_rotate_event() does not
       read anything from the binlog; if it fails it's because of an
       error in my_net_write(), fortunately it will say so in errmsg.
1359
    */
1360 1361
    my_errno= ER_MASTER_FATAL_ERROR_READING_BINLOG;
    goto err;
unknown's avatar
unknown committed
1362
  }
He Zhenxing's avatar
He Zhenxing committed
1363

1364 1365 1366 1367 1368
  /*
    Adding MAX_LOG_EVENT_HEADER_LEN, since a binlog event can become
    this larger than the corresponding packet (query) sent 
    from client to master.
  */
1369
  thd->variables.max_allowed_packet= MAX_MAX_ALLOWED_PACKET;
unknown's avatar
unknown committed
1370

1371
  /*
1372 1373 1374
    We can set log_lock now, it does not move (it's a member of
    mysql_bin_log, and it's already inited, and it will be destroyed
    only at shutdown).
1375
  */
1376
  p_coord->pos= pos; // the first hb matches the slave's last seen value
1377 1378
  log_lock= mysql_bin_log.get_log_lock();
  log_cond= mysql_bin_log.get_log_cond();
1379
  if (pos > BIN_LOG_HEADER_SIZE)
1380
  {
He Zhenxing's avatar
He Zhenxing committed
1381 1382 1383 1384 1385
    /* reset transmit packet for the event read from binary log
       file */
    if (reset_transmit_packet(thd, flags, &ev_offset, &errmsg))
      goto err;

1386 1387 1388 1389
     /*
       Try to find a Format_description_log_event at the beginning of
       the binlog
     */
1390 1391
    if (!(error = Log_event::read_log_event(&log, packet, log_lock, 0)))
    { 
1392
       /*
He Zhenxing's avatar
He Zhenxing committed
1393 1394 1395
         The packet has offsets equal to the normal offsets in a
         binlog event + ev_offset (the first ev_offset characters are
         the header (default \0)).
1396 1397 1398
       */
       DBUG_PRINT("info",
                  ("Looked for a Format_description_log_event, found event type %d",
He Zhenxing's avatar
He Zhenxing committed
1399 1400
                   (*packet)[EVENT_TYPE_OFFSET+ev_offset]));
       if ((*packet)[EVENT_TYPE_OFFSET+ev_offset] == FORMAT_DESCRIPTION_EVENT)
1401
       {
Sergei Golubchik's avatar
Sergei Golubchik committed
1402 1403
         current_checksum_alg= get_checksum_alg(packet->ptr() + ev_offset,
                                                packet->length() - ev_offset);
1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418
         DBUG_ASSERT(current_checksum_alg == BINLOG_CHECKSUM_ALG_OFF ||
                     current_checksum_alg == BINLOG_CHECKSUM_ALG_UNDEF ||
                     current_checksum_alg == BINLOG_CHECKSUM_ALG_CRC32);
         if (!is_slave_checksum_aware(thd) &&
             current_checksum_alg != BINLOG_CHECKSUM_ALG_OFF &&
             current_checksum_alg != BINLOG_CHECKSUM_ALG_UNDEF)
         {
           my_errno= ER_MASTER_FATAL_ERROR_READING_BINLOG;
           errmsg= "Slave can not handle replication events with the checksum "
             "that master is configured to log";
           sql_print_warning("Master is configured to log replication events "
                             "with checksum, but will not send such events to "
                             "slaves that cannot process them");
           goto err;
         }
He Zhenxing's avatar
He Zhenxing committed
1419
         (*packet)[FLAGS_OFFSET+ev_offset] &= ~LOG_EVENT_BINLOG_IN_USE_F;
1420 1421 1422 1423 1424
         /*
           mark that this event with "log_pos=0", so the slave
           should not increment master's binlog position
           (rli->group_master_log_pos)
         */
He Zhenxing's avatar
He Zhenxing committed
1425
         int4store((char*) packet->ptr()+LOG_POS_OFFSET+ev_offset, 0);
1426 1427 1428 1429 1430
         /*
           if reconnect master sends FD event with `created' as 0
           to avoid destroying temp tables.
          */
         int4store((char*) packet->ptr()+LOG_EVENT_MINIMAL_HEADER_LEN+
He Zhenxing's avatar
He Zhenxing committed
1431
                   ST_CREATED_OFFSET+ev_offset, (ulong) 0);
1432 1433 1434 1435

	 /* fix the checksum due to latest changes in header */
	 if (current_checksum_alg != BINLOG_CHECKSUM_ALG_OFF &&
             current_checksum_alg != BINLOG_CHECKSUM_ALG_UNDEF)
Sergei Golubchik's avatar
Sergei Golubchik committed
1436
           fix_checksum(packet, ev_offset);
1437

1438
         /* send it */
1439
         if (my_net_write(net, (uchar*) packet->ptr(), packet->length()))
1440 1441 1442 1443 1444
         {
           errmsg = "Failed on my_net_write()";
           my_errno= ER_UNKNOWN_ERROR;
           goto err;
         }
unknown's avatar
unknown committed
1445

1446
         /*
1447 1448 1449 1450
           No need to save this event. We are only doing simple reads
           (no real parsing of the events) so we don't need it. And so
           we don't need the artificial Format_description_log_event of
           3.23&4.x.
1451 1452 1453 1454
         */
       }
     }
     else
1455
     {
1456
       if (test_for_non_eof_log_read_errors(error, &errmsg))
1457
         goto err;
1458 1459 1460 1461 1462 1463 1464 1465 1466 1467
       /*
         It's EOF, nothing to do, go on reading next events, the
         Format_description_log_event will be found naturally if it is written.
       */
     }
  } /* end of if (pos > BIN_LOG_HEADER_SIZE); */
  else
  {
    /* The Format_description_log_event event will be found naturally. */
  }
1468

1469 1470 1471
  /* seek to the requested position, to start the requested dump */
  my_b_seek(&log, pos);			// Seek will done on next read

unknown's avatar
unknown committed
1472
  while (!net->error && net->vio != 0 && !thd->killed)
1473
  {
He Zhenxing's avatar
He Zhenxing committed
1474 1475 1476 1477 1478 1479
    Log_event_type event_type= UNKNOWN_EVENT;

    /* reset the transmit packet for the event read from binary log
       file */
    if (reset_transmit_packet(thd, flags, &ev_offset, &errmsg))
      goto err;
1480

1481 1482
    while (!(error = Log_event::read_log_event(&log, packet, log_lock,
                                               current_checksum_alg)))
1483
    {
1484
#ifndef DBUG_OFF
1485
      if (max_binlog_dump_events && !left_events--)
1486 1487 1488
      {
	net_flush(net);
	errmsg = "Debugging binlog dump abort";
1489
	my_errno= ER_UNKNOWN_ERROR;
1490 1491
	goto err;
      }
1492
#endif
Andrei Elkin's avatar
Andrei Elkin committed
1493 1494 1495
      /*
        log's filename does not change while it's active
      */
1496
      p_coord->pos= uint4korr(packet->ptr() + ev_offset + LOG_POS_OFFSET);
1497

Sergei Golubchik's avatar
Sergei Golubchik committed
1498 1499
      event_type=
        (Log_event_type)((uchar)(*packet)[LOG_EVENT_OFFSET+ev_offset]);
1500 1501
      DBUG_EXECUTE_IF("dump_thread_wait_before_send_xid",
                      {
Libing Song's avatar
Libing Song committed
1502
                        if (event_type == XID_EVENT)
1503 1504 1505 1506 1507
                        {
                          net_flush(net);
                          const char act[]=
                            "now "
                            "wait_for signal.continue";
1508
                          DBUG_ASSERT(debug_sync_service);
Michael Widenius's avatar
Michael Widenius committed
1509
                          DBUG_ASSERT(!debug_sync_set_action(thd,
1510
                                                             STRING_WITH_LEN(act)));
1511 1512 1513 1514 1515
                          const char act2[]=
                            "now "
                            "signal signal.continued";
                          DBUG_ASSERT(!debug_sync_set_action(current_thd,
                                                             STRING_WITH_LEN(act2)));
1516 1517
                        }
                      });
He Zhenxing's avatar
He Zhenxing committed
1518
      if (event_type == FORMAT_DESCRIPTION_EVENT)
unknown's avatar
unknown committed
1519
      {
Sergei Golubchik's avatar
Sergei Golubchik committed
1520 1521
        current_checksum_alg= get_checksum_alg(packet->ptr() + ev_offset,
                                               packet->length() - ev_offset);
1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536
        DBUG_ASSERT(current_checksum_alg == BINLOG_CHECKSUM_ALG_OFF ||
                    current_checksum_alg == BINLOG_CHECKSUM_ALG_UNDEF ||
                    current_checksum_alg == BINLOG_CHECKSUM_ALG_CRC32);
        if (!is_slave_checksum_aware(thd) &&
            current_checksum_alg != BINLOG_CHECKSUM_ALG_OFF &&
            current_checksum_alg != BINLOG_CHECKSUM_ALG_UNDEF)
        {
          my_errno= ER_MASTER_FATAL_ERROR_READING_BINLOG;
          errmsg= "Slave can not handle replication events with the checksum "
            "that master is configured to log";
          sql_print_warning("Master is configured to log replication events "
                            "with checksum, but will not send such events to "
                            "slaves that cannot process them");
          goto err;
        }
Sergei Golubchik's avatar
Sergei Golubchik committed
1537

He Zhenxing's avatar
He Zhenxing committed
1538
        (*packet)[FLAGS_OFFSET+ev_offset] &= ~LOG_EVENT_BINLOG_IN_USE_F;
unknown's avatar
unknown committed
1539
      }
1540

1541
      if ((tmp_msg= send_event_to_slave(thd, net, packet, flags, event_type,
1542 1543
                                        log_file_name, &log,
                                        mariadb_slave_capability, ev_offset,
1544 1545
                                        current_checksum_alg, using_gtid_state,
                                        &gtid_state, &gtid_skip_group)))
He Zhenxing's avatar
He Zhenxing committed
1546
      {
1547 1548 1549
        errmsg= tmp_msg;
        my_errno= ER_UNKNOWN_ERROR;
        goto err;
1550
      }
unknown's avatar
unknown committed
1551

1552 1553
      DBUG_EXECUTE_IF("dump_thread_wait_before_send_xid",
                      {
1554
                        if (event_type == XID_EVENT)
1555 1556 1557 1558
                        {
                          net_flush(net);
                        }
                      });
He Zhenxing's avatar
He Zhenxing committed
1559 1560 1561 1562

      /* reset transmit packet for next loop */
      if (reset_transmit_packet(thd, flags, &ev_offset, &errmsg))
        goto err;
1563
    }
1564

1565 1566
    /*
      TODO: now that we are logging the offset, check to make sure
1567
      the recorded offset and the actual match.
1568 1569 1570
      Guilhem 2003-06: this is not true if this master is a slave
      <4.0.15 running with --log-slave-updates, because then log_pos may
      be the offset in the-master-of-this-master's binlog.
1571
    */
1572
    if (test_for_non_eof_log_read_errors(error, &errmsg))
1573
      goto err;
1574

1575
    if (!(flags & BINLOG_DUMP_NON_BLOCK) &&
1576
        mysql_bin_log.is_active(log_file_name))
1577
    {
1578 1579 1580
      /*
	Block until there is more data in the log
      */
1581
      if (net_flush(net))
1582 1583
      {
	errmsg = "failed on net_flush()";
1584
	my_errno= ER_UNKNOWN_ERROR;
1585 1586
	goto err;
      }
1587

1588 1589 1590 1591 1592 1593
      /*
	We may have missed the update broadcast from the log
	that has just happened, let's try to catch it if it did.
	If we did not miss anything, we just wait for other threads
	to signal us.
      */
1594 1595
      {
	log.error=0;
1596
	bool read_packet = 0;
1597

1598
#ifndef DBUG_OFF
1599
	if (max_binlog_dump_events && !left_events--)
1600 1601
	{
	  errmsg = "Debugging binlog dump abort";
1602
	  my_errno= ER_UNKNOWN_ERROR;
1603 1604
	  goto err;
	}
1605
#endif
1606

He Zhenxing's avatar
He Zhenxing committed
1607 1608 1609 1610 1611
        /* reset the transmit packet for the event read from binary log
           file */
        if (reset_transmit_packet(thd, flags, &ev_offset, &errmsg))
          goto err;
        
1612 1613 1614 1615
	/*
	  No one will update the log while we are reading
	  now, but we'll be quick and just read one record

1616
	  TODO:
1617 1618 1619
          Add an counter that is incremented for each time we update the
          binary log.  We can avoid the following read if the counter
          has not been updated since last read.
1620
	*/
1621

Marc Alff's avatar
Marc Alff committed
1622
        mysql_mutex_lock(log_lock);
Sergei Golubchik's avatar
Sergei Golubchik committed
1623
        switch (error= Log_event::read_log_event(&log, packet, (mysql_mutex_t*) 0,
1624
                                                 current_checksum_alg)) {
1625
	case 0:
1626
	  /* we read successfully, so we'll need to send it to the slave */
Marc Alff's avatar
Marc Alff committed
1627
          mysql_mutex_unlock(log_lock);
1628
	  read_packet = 1;
1629
          p_coord->pos= uint4korr(packet->ptr() + ev_offset + LOG_POS_OFFSET);
He Zhenxing's avatar
He Zhenxing committed
1630
          event_type= (Log_event_type)((*packet)[LOG_EVENT_OFFSET+ev_offset]);
1631
	  break;
1632

1633
	case LOG_READ_EOF:
Andrei Elkin's avatar
Andrei Elkin committed
1634 1635 1636
        {
          int ret;
          ulong signal_cnt;
1637
	  DBUG_PRINT("wait",("waiting for data in binary log"));
1638 1639
          /* For mysqlbinlog (mysqlbinlog.server_id==0). */
	  if (thd->variables.server_id==0)
unknown's avatar
unknown committed
1640
	  {
Marc Alff's avatar
Marc Alff committed
1641
            mysql_mutex_unlock(log_lock);
unknown's avatar
unknown committed
1642 1643
	    goto end;
	  }
1644

Andrei Elkin's avatar
Andrei Elkin committed
1645 1646 1647
#ifndef DBUG_OFF
          ulong hb_info_counter= 0;
#endif
1648
          const char* old_msg= thd->proc_info;
Andrei Elkin's avatar
Andrei Elkin committed
1649 1650 1651
          signal_cnt= mysql_bin_log.signal_cnt;
          do 
          {
1652
            if (heartbeat_period != 0)
Andrei Elkin's avatar
Andrei Elkin committed
1653
            {
1654
              DBUG_ASSERT(heartbeat_ts);
Andrei Elkin's avatar
Andrei Elkin committed
1655 1656
              set_timespec_nsec(*heartbeat_ts, heartbeat_period);
            }
1657 1658 1659
            thd->enter_cond(log_cond, log_lock,
                            "Master has sent all binlog to slave; "
                            "waiting for binlog to be updated");
Andrei Elkin's avatar
Andrei Elkin committed
1660
            ret= mysql_bin_log.wait_for_update_bin_log(thd, heartbeat_ts);
1661
            DBUG_ASSERT(ret == 0 || (heartbeat_period != 0));
Andrei Elkin's avatar
Andrei Elkin committed
1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672
            if (ret == ETIMEDOUT || ret == ETIME)
            {
#ifndef DBUG_OFF
              if (hb_info_counter < 3)
              {
                sql_print_information("master sends heartbeat message");
                hb_info_counter++;
                if (hb_info_counter == 3)
                  sql_print_information("the rest of heartbeat info skipped ...");
              }
#endif
1673 1674
              /* reset transmit packet for the heartbeat event */
              if (reset_transmit_packet(thd, flags, &ev_offset, &errmsg))
1675 1676
              {
                thd->exit_cond(old_msg);
1677
                goto err;
1678
              }
Sergei Golubchik's avatar
Sergei Golubchik committed
1679
              if (send_heartbeat_event(net, packet, p_coord, current_checksum_alg))
Andrei Elkin's avatar
Andrei Elkin committed
1680 1681 1682
              {
                errmsg = "Failed on my_net_write()";
                my_errno= ER_UNKNOWN_ERROR;
1683
                thd->exit_cond(old_msg);
Andrei Elkin's avatar
Andrei Elkin committed
1684 1685 1686 1687 1688
                goto err;
              }
            }
            else
            {
1689
              DBUG_PRINT("wait",("binary log received update or a broadcast signal caught"));
Andrei Elkin's avatar
Andrei Elkin committed
1690 1691
            }
          } while (signal_cnt == mysql_bin_log.signal_cnt && !thd->killed);
1692
          thd->exit_cond(old_msg);
Andrei Elkin's avatar
Andrei Elkin committed
1693 1694 1695 1696
        }
        break;
            
        default:
Marc Alff's avatar
Marc Alff committed
1697
          mysql_mutex_unlock(log_lock);
1698 1699
          test_for_non_eof_log_read_errors(error, &errmsg);
          goto err;
1700
	}
1701

1702 1703
        if (read_packet &&
            (tmp_msg= send_event_to_slave(thd, net, packet, flags, event_type,
1704 1705
                                          log_file_name, &log,
                                          mariadb_slave_capability, ev_offset,
1706 1707 1708
                                          current_checksum_alg,
                                          using_gtid_state, &gtid_state,
                                          &gtid_skip_group)))
He Zhenxing's avatar
He Zhenxing committed
1709
        {
1710 1711 1712
          errmsg= tmp_msg;
          my_errno= ER_UNKNOWN_ERROR;
          goto err;
1713
	}
1714 1715 1716

	log.error=0;
      }
1717
    }
1718 1719 1720
    else
    {
      bool loop_breaker = 0;
1721
      /* need this to break out of the for loop from switch */
1722

1723
      thd_proc_info(thd, "Finished reading one binlog; switching to next binlog");
1724
      switch (mysql_bin_log.find_next_log(&linfo, 1)) {
1725 1726
      case 0:
	break;
1727 1728 1729 1730 1731 1732
      case LOG_INFO_EOF:
        if (mysql_bin_log.is_active(log_file_name))
        {
          loop_breaker = (flags & BINLOG_DUMP_NON_BLOCK);
          break;
        }
1733 1734
      default:
	errmsg = "could not find next log";
1735
	my_errno= ER_MASTER_FATAL_ERROR_READING_BINLOG;
1736 1737 1738
	goto err;
      }

1739 1740
      if (loop_breaker)
        break;
unknown's avatar
foo1  
unknown committed
1741

1742
      end_io_cache(&log);
Marc Alff's avatar
Marc Alff committed
1743
      mysql_file_close(file, MYF(MY_WME));
1744

He Zhenxing's avatar
He Zhenxing committed
1745 1746 1747 1748
      /* reset transmit packet for the possible fake rotate event */
      if (reset_transmit_packet(thd, flags, &ev_offset, &errmsg))
        goto err;
      
1749
      /*
1750 1751 1752 1753 1754 1755 1756
        Call fake_rotate_event() in case the previous log (the one which
        we have just finished reading) did not contain a Rotate event
        (for example (I don't know any other example) the previous log
        was the last one before the master was shutdown & restarted).
        This way we tell the slave about the new log's name and
        position.  If the binlog is 5.0, the next event we are going to
        read and send is Format_description_log_event.
1757
      */
1758
      if ((file=open_binlog(&log, log_file_name, &errmsg)) < 0 ||
1759
	  fake_rotate_event(net, packet, log_file_name, BIN_LOG_HEADER_SIZE,
1760
                            &errmsg, current_checksum_alg))
1761 1762
      {
	my_errno= ER_MASTER_FATAL_ERROR_READING_BINLOG;
unknown's avatar
unknown committed
1763
	goto err;
1764
      }
unknown's avatar
unknown committed
1765

1766
      p_coord->file_name= log_file_name; // reset to the next
1767
    }
1768
  }
1769

unknown's avatar
unknown committed
1770
end:
1771
  end_io_cache(&log);
Marc Alff's avatar
Marc Alff committed
1772
  mysql_file_close(file, MYF(MY_WME));
1773

He Zhenxing's avatar
He Zhenxing committed
1774
  RUN_HOOK(binlog_transmit, transmit_stop, (thd, flags));
1775
  my_eof(thd);
1776
  thd_proc_info(thd, "Waiting to finalize termination");
Marc Alff's avatar
Marc Alff committed
1777
  mysql_mutex_lock(&LOCK_thread_count);
unknown's avatar
unknown committed
1778
  thd->current_linfo = 0;
Marc Alff's avatar
Marc Alff committed
1779
  mysql_mutex_unlock(&LOCK_thread_count);
1780
  thd->variables.max_allowed_packet= old_max_allowed_packet;
1781
  DBUG_VOID_RETURN;
1782

unknown's avatar
unknown committed
1783
err:
1784
  thd_proc_info(thd, "Waiting to finalize termination");
1785
  if (my_errno == ER_MASTER_FATAL_ERROR_READING_BINLOG && my_b_inited(&log))
1786
  {
1787 1788 1789 1790
    /* 
       detailing the fatal error message with coordinates 
       of the last position read.
    */
Andrei Elkin's avatar
Andrei Elkin committed
1791 1792 1793 1794 1795
    my_snprintf(error_text, sizeof(error_text),
                "%s; the first event '%s' at %lld, "
                "the last event read from '%s' at %lld, "
                "the last byte read from '%s' at %lld.",
                errmsg,
Sergei Golubchik's avatar
Sergei Golubchik committed
1796 1797 1798
                my_basename(p_start_coord->file_name), p_start_coord->pos,
                my_basename(p_coord->file_name), p_coord->pos,
                my_basename(log_file_name), my_b_tell(&log));
1799
  }
1800 1801
  else
    strcpy(error_text, errmsg);
1802
  end_io_cache(&log);
He Zhenxing's avatar
He Zhenxing committed
1803
  RUN_HOOK(binlog_transmit, transmit_stop, (thd, flags));
unknown's avatar
unknown committed
1804 1805 1806 1807 1808 1809 1810
  /*
    Exclude  iteration through thread list
    this is needed for purge_logs() - it will iterate through
    thread list and update thd->current_linfo->index_file_offset
    this mutex will make sure that it never tried to update our linfo
    after we return from this stack frame
  */
Marc Alff's avatar
Marc Alff committed
1811
  mysql_mutex_lock(&LOCK_thread_count);
unknown's avatar
unknown committed
1812
  thd->current_linfo = 0;
Marc Alff's avatar
Marc Alff committed
1813
  mysql_mutex_unlock(&LOCK_thread_count);
1814
  if (file >= 0)
Marc Alff's avatar
Marc Alff committed
1815
    mysql_file_close(file, MYF(MY_WME));
1816
  thd->variables.max_allowed_packet= old_max_allowed_packet;
1817

1818
  my_message(my_errno, error_text, MYF(0));
1819 1820 1821
  DBUG_VOID_RETURN;
}

1822 1823 1824 1825 1826 1827 1828 1829 1830

/**
  Execute a START SLAVE statement.

  @param thd Pointer to THD object for the client thread executing the
  statement.

  @param mi Pointer to Master_info object for the slave's IO thread.

Marc Alff's avatar
Marc Alff committed
1831
  @param net_report If true, saves the exit status into thd->stmt_da.
1832 1833 1834

  @retval 0 success
  @retval 1 error
1835
  @retval -1 fatal error
1836
*/
1837

1838
int start_slave(THD* thd , Master_info* mi,  bool net_report)
1839
{
1840
  int slave_errno= 0;
1841
  int thread_mask;
1842 1843
  char master_info_file_tmp[FN_REFLEN];
  char relay_log_info_file_tmp[FN_REFLEN];
1844
  DBUG_ENTER("start_slave");
1845

Marc Alff's avatar
Marc Alff committed
1846
  if (check_access(thd, SUPER_ACL, any_db, NULL, NULL, 0, 0))
1847 1848 1849 1850 1851 1852 1853 1854 1855 1856
    DBUG_RETURN(-1);

  create_logfile_name_with_suffix(master_info_file_tmp,
                                  sizeof(master_info_file_tmp),
                                  master_info_file, 0, &mi->connection_name);
  create_logfile_name_with_suffix(relay_log_info_file_tmp,
                                  sizeof(relay_log_info_file_tmp),
                                  relay_log_info_file, 0,
                                  &mi->connection_name);

1857
  lock_slave_threads(mi);  // this allows us to cleanly read slave_running
1858
  // Get a mask of _stopped_ threads
1859
  init_thread_mask(&thread_mask,mi,1 /* inverse */);
1860
  /*
1861 1862 1863 1864
    Below we will start all stopped threads.  But if the user wants to
    start only one thread, do as if the other thread was running (as we
    don't wan't to touch the other thread), so set the bit to 0 for the
    other thread
1865
  */
unknown's avatar
unknown committed
1866
  if (thd->lex->slave_thd_opt)
1867
    thread_mask&= thd->lex->slave_thd_opt;
1868
  if (thread_mask) //some threads are stopped, start them
1869
  {
1870
    if (init_master_info(mi,master_info_file_tmp,relay_log_info_file_tmp, 0,
1871
			 thread_mask))
1872 1873
      slave_errno=ER_MASTER_INFO;
    else if (server_id_supplied && *mi->host)
1874
    {
1875
      /*
1876 1877 1878
        If we will start SQL thread we will care about UNTIL options If
        not and they are specified we will ignore them and warn user
        about this fact.
1879 1880 1881
      */
      if (thread_mask & SLAVE_SQL)
      {
Marc Alff's avatar
Marc Alff committed
1882
        mysql_mutex_lock(&mi->rli.data_lock);
1883

unknown's avatar
unknown committed
1884
        if (thd->lex->mi.pos)
1885
        {
1886
          mi->rli.until_condition= Relay_log_info::UNTIL_MASTER_POS;
unknown's avatar
unknown committed
1887
          mi->rli.until_log_pos= thd->lex->mi.pos;
1888 1889
          /*
             We don't check thd->lex->mi.log_file_name for NULL here
1890 1891
             since it is checked in sql_yacc.yy
          */
unknown's avatar
unknown committed
1892
          strmake(mi->rli.until_log_name, thd->lex->mi.log_file_name,
1893
                  sizeof(mi->rli.until_log_name)-1);
1894
        }
unknown's avatar
unknown committed
1895
        else if (thd->lex->mi.relay_log_pos)
1896
        {
1897
          mi->rli.until_condition= Relay_log_info::UNTIL_RELAY_POS;
unknown's avatar
unknown committed
1898 1899
          mi->rli.until_log_pos= thd->lex->mi.relay_log_pos;
          strmake(mi->rli.until_log_name, thd->lex->mi.relay_log_name,
1900
                  sizeof(mi->rli.until_log_name)-1);
1901 1902
        }
        else
1903
          mi->rli.clear_until_condition();
1904

1905
        if (mi->rli.until_condition != Relay_log_info::UNTIL_NONE)
1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917
        {
          /* Preparing members for effective until condition checking */
          const char *p= fn_ext(mi->rli.until_log_name);
          char *p_end;
          if (*p)
          {
            //p points to '.'
            mi->rli.until_log_name_extension= strtoul(++p,&p_end, 10);
            /*
              p_end points to the first invalid character. If it equals
              to p, no digits were found, error. If it contains '\0' it
              means  conversion went ok.
1918
            */
unknown's avatar
unknown committed
1919
            if (p_end==p || *p_end)
1920 1921 1922 1923
              slave_errno=ER_BAD_SLAVE_UNTIL_COND;
          }
          else
            slave_errno=ER_BAD_SLAVE_UNTIL_COND;
1924

1925
          /* mark the cached result of the UNTIL comparison as "undefined" */
1926
          mi->rli.until_log_names_cmp_result=
1927
            Relay_log_info::UNTIL_LOG_NAMES_CMP_UNKNOWN;
1928 1929 1930

          /* Issuing warning then started without --skip-slave-start */
          if (!opt_skip_slave_start)
1931
            push_warning(thd, MYSQL_ERROR::WARN_LEVEL_NOTE,
unknown's avatar
foo1  
unknown committed
1932
                         ER_MISSING_SKIP_SLAVE,
1933 1934
                         ER(ER_MISSING_SKIP_SLAVE));
        }
1935

Marc Alff's avatar
Marc Alff committed
1936
        mysql_mutex_unlock(&mi->rli.data_lock);
1937
      }
unknown's avatar
unknown committed
1938
      else if (thd->lex->mi.pos || thd->lex->mi.relay_log_pos)
1939
        push_warning(thd, MYSQL_ERROR::WARN_LEVEL_NOTE, ER_UNTIL_COND_IGNORED,
1940
                     ER(ER_UNTIL_COND_IGNORED));
1941

unknown's avatar
unknown committed
1942
      if (!slave_errno)
1943
        slave_errno = start_slave_threads(0 /*no mutex */,
1944 1945 1946 1947 1948
                                          1 /* wait for start */,
                                          mi,
                                          master_info_file_tmp,
                                          relay_log_info_file_tmp,
                                          thread_mask);
1949
    }
1950 1951 1952
    else
      slave_errno = ER_BAD_SLAVE;
  }
1953
  else
1954 1955
  {
    /* no error if all threads are already started, only a warning */
1956 1957
    push_warning(thd, MYSQL_ERROR::WARN_LEVEL_NOTE, ER_SLAVE_WAS_RUNNING,
                 ER(ER_SLAVE_WAS_RUNNING));
1958
  }
unknown's avatar
foo1  
unknown committed
1959

1960
  unlock_slave_threads(mi);
1961

1962 1963
  if (slave_errno)
  {
1964
    if (net_report)
1965 1966 1967
      my_error(slave_errno, MYF(0),
               (int) mi->connection_name.length,
               mi->connection_name.str);
1968
    DBUG_RETURN(slave_errno == ER_BAD_SLAVE ? -1 : 1);
1969
  }
1970

1971
  DBUG_RETURN(0);
1972 1973
}

1974

1975 1976 1977 1978 1979 1980 1981 1982
/**
  Execute a STOP SLAVE statement.

  @param thd Pointer to THD object for the client thread executing the
  statement.

  @param mi Pointer to Master_info object for the slave's IO thread.

Marc Alff's avatar
Marc Alff committed
1983
  @param net_report If true, saves the exit status into thd->stmt_da.
1984 1985 1986

  @retval 0 success
  @retval 1 error
1987
  @retval -1 error
1988
*/
1989

1990
int stop_slave(THD* thd, Master_info* mi, bool net_report )
1991
{
1992
  int slave_errno;
1993 1994
  DBUG_ENTER("stop_slave");
  DBUG_PRINT("enter",("Connection: %s", mi->connection_name.str));
1995

Marc Alff's avatar
Marc Alff committed
1996
  if (check_access(thd, SUPER_ACL, any_db, NULL, NULL, 0, 0))
1997
    DBUG_RETURN(-1);
1998
  thd_proc_info(thd, "Killing slave");
1999 2000
  int thread_mask;
  lock_slave_threads(mi);
2001
  // Get a mask of _running_ threads
2002
  init_thread_mask(&thread_mask,mi,0 /* not inverse*/);
2003 2004 2005 2006 2007 2008
  /*
    Below we will stop all running threads.
    But if the user wants to stop only one thread, do as if the other thread
    was stopped (as we don't wan't to touch the other thread), so set the
    bit to 0 for the other thread
  */
unknown's avatar
unknown committed
2009 2010
  if (thd->lex->slave_thd_opt)
    thread_mask &= thd->lex->slave_thd_opt;
2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023

  if (thread_mask)
  {
    slave_errno= terminate_slave_threads(mi,thread_mask,
                                         1 /*skip lock */);
  }
  else
  {
    //no error if both threads are already stopped, only a warning
    slave_errno= 0;
    push_warning(thd, MYSQL_ERROR::WARN_LEVEL_NOTE, ER_SLAVE_WAS_NOT_RUNNING,
                 ER(ER_SLAVE_WAS_NOT_RUNNING));
  }
2024
  unlock_slave_threads(mi);
2025
  thd_proc_info(thd, 0);
2026

2027 2028 2029
  if (slave_errno)
  {
    if (net_report)
unknown's avatar
unknown committed
2030
      my_message(slave_errno, ER(slave_errno), MYF(0));
2031
    DBUG_RETURN(1);
2032
  }
2033

2034
  DBUG_RETURN(0);
2035 2036
}

2037

2038 2039
/**
  Execute a RESET SLAVE statement.
2040

2041 2042
  @param thd Pointer to THD object of the client thread executing the
  statement.
2043

2044
  @param mi Pointer to Master_info object for the slave.
2045

2046 2047 2048
  @retval 0 success
  @retval 1 error
*/
2049
int reset_slave(THD *thd, Master_info* mi)
2050 2051 2052
{
  MY_STAT stat_area;
  char fname[FN_REFLEN];
2053
  int thread_mask= 0, error= 0;
He Zhenxing's avatar
He Zhenxing committed
2054 2055
  uint sql_errno=ER_UNKNOWN_ERROR;
  const char* errmsg= "Unknown error occured while reseting slave";
2056 2057
  char master_info_file_tmp[FN_REFLEN];
  char relay_log_info_file_tmp[FN_REFLEN];
unknown's avatar
unknown committed
2058 2059
  DBUG_ENTER("reset_slave");

2060
  lock_slave_threads(mi);
2061 2062 2063
  init_thread_mask(&thread_mask,mi,0 /* not inverse */);
  if (thread_mask) // We refuse if any slave thread is running
  {
2064 2065 2066 2067
    unlock_slave_threads(mi);
    my_error(ER_SLAVE_MUST_STOP, MYF(0), (int) mi->connection_name.length,
             mi->connection_name.str);
    DBUG_RETURN(ER_SLAVE_MUST_STOP);
2068
  }
unknown's avatar
unknown committed
2069 2070 2071

  ha_reset_slave(thd);

2072
  // delete relay logs, clear relay log coordinates
2073 2074 2075
  if ((error= purge_relay_logs(&mi->rli, thd,
			       1 /* just reset */,
			       &errmsg)))
2076 2077
  {
    sql_errno= ER_RELAY_LOG_FAIL;
2078
    goto err;
2079
  }
2080

2081 2082 2083
  /* Clear master's log coordinates and associated information */
  mi->clear_in_memory_info(thd->lex->reset_slave_info.all);

2084
  /*
2085
     Reset errors (the idea is that we forget about the
unknown's avatar
unknown committed
2086 2087
     old master).
  */
2088
  mi->clear_error();
2089
  mi->rli.clear_error();
2090
  mi->rli.clear_until_condition();
2091

2092
  // close master_info_file, relay_log_info_file, set mi->inited=rli->inited=0
2093
  end_master_info(mi);
2094

2095
  // and delete these two files
2096
  create_logfile_name_with_suffix(master_info_file_tmp,
2097
                          sizeof(master_info_file_tmp),
2098
                          master_info_file, 0, &mi->connection_name);
2099
  create_logfile_name_with_suffix(relay_log_info_file_tmp,
2100
                          sizeof(relay_log_info_file_tmp),
2101
                          relay_log_info_file, 0, &mi->connection_name);
2102 2103

  fn_format(fname, master_info_file_tmp, mysql_data_home, "", 4+32);
Marc Alff's avatar
Marc Alff committed
2104 2105
  if (mysql_file_stat(key_file_master_info, fname, &stat_area, MYF(0)) &&
      mysql_file_delete(key_file_master_info, fname, MYF(MY_WME)))
2106
  {
2107 2108
    error=1;
    goto err;
2109
  }
2110 2111 2112
  else if (global_system_variables.log_warnings > 1)
    sql_print_information("Deleted Master_info file '%s'.", fname);

2113
  // delete relay_log_info_file
2114
  fn_format(fname, relay_log_info_file_tmp, mysql_data_home, "", 4+32);
Marc Alff's avatar
Marc Alff committed
2115 2116
  if (mysql_file_stat(key_file_relay_log_info, fname, &stat_area, MYF(0)) &&
      mysql_file_delete(key_file_relay_log_info, fname, MYF(MY_WME)))
2117 2118 2119 2120
  {
    error=1;
    goto err;
  }
2121 2122
  else if (global_system_variables.log_warnings > 1)
    sql_print_information("Deleted Master_info file '%s'.", fname);
2123

He Zhenxing's avatar
He Zhenxing committed
2124
  RUN_HOOK(binlog_relay_io, after_reset_slave, (thd, mi));
2125 2126
err:
  unlock_slave_threads(mi);
unknown's avatar
unknown committed
2127
  if (error)
2128
    my_error(sql_errno, MYF(0), errmsg);
unknown's avatar
unknown committed
2129
  DBUG_RETURN(error);
2130 2131
}

2132 2133 2134 2135
/*

  Kill all Binlog_dump threads which previously talked to the same slave
  ("same" means with the same server id). Indeed, if the slave stops, if the
Marc Alff's avatar
Marc Alff committed
2136
  Binlog_dump thread is waiting (mysql_cond_wait) for binlog update, then it
2137 2138 2139 2140
  will keep existing until a query is written to the binlog. If the master is
  idle, then this could last long, and if the slave reconnects, we could have 2
  Binlog_dump threads in SHOW PROCESSLIST, until a query is written to the
  binlog. To avoid this, when the slave reconnects and sends COM_BINLOG_DUMP,
2141 2142 2143
  the master kills any existing thread with the slave's server id (if this id
  is not zero; it will be true for real slaves, but false for mysqlbinlog when
  it sends COM_BINLOG_DUMP to get a remote binlog dump).
2144 2145 2146 2147 2148 2149

  SYNOPSIS
    kill_zombie_dump_threads()
    slave_server_id     the slave's server id

*/
unknown's avatar
foo1  
unknown committed
2150

2151

2152 2153
void kill_zombie_dump_threads(uint32 slave_server_id)
{
Marc Alff's avatar
Marc Alff committed
2154
  mysql_mutex_lock(&LOCK_thread_count);
2155 2156 2157
  I_List_iterator<THD> it(threads);
  THD *tmp;

2158 2159 2160
  while ((tmp=it++))
  {
    if (tmp->command == COM_BINLOG_DUMP &&
2161
       tmp->variables.server_id == slave_server_id)
2162
    {
Marc Alff's avatar
Marc Alff committed
2163
      mysql_mutex_lock(&tmp->LOCK_thd_data);    // Lock from delete
2164
      break;
2165 2166
    }
  }
Marc Alff's avatar
Marc Alff committed
2167
  mysql_mutex_unlock(&LOCK_thread_count);
2168 2169 2170 2171 2172 2173 2174
  if (tmp)
  {
    /*
      Here we do not call kill_one_thread() as
      it will be slow because it will iterate through the list
      again. We just to do kill the thread ourselves.
    */
2175
    tmp->awake(KILL_QUERY);
Marc Alff's avatar
Marc Alff committed
2176
    mysql_mutex_unlock(&tmp->LOCK_thd_data);
2177
  }
2178 2179
}

2180 2181 2182 2183 2184 2185 2186 2187 2188 2189 2190 2191 2192 2193 2194 2195 2196 2197 2198 2199 2200 2201 2202 2203 2204
/**
   Get value for a string parameter with error checking

   Note that in case of error the original string should not be updated!

   @ret 0 ok
   @ret 1 error
*/

static bool get_string_parameter(char *to, const char *from, size_t length,
                                 const char *name)
{
  if (from)                                     // Empty paramaters allowed
  {
    size_t from_length;
    if ((from_length= strlen(from)) > length)
    {
      my_error(ER_WRONG_STRING_LENGTH, MYF(0), from, name, (int) length);
      return 1;
    }
    memcpy(to, from, from_length+1);
  }
  return 0;
}

2205

2206 2207 2208 2209 2210 2211 2212 2213 2214
/**
  Execute a CHANGE MASTER statement.

  @param thd Pointer to THD object for the client thread executing the
  statement.

  @param mi Pointer to Master_info object belonging to the slave's IO
  thread.

2215 2216 2217 2218
  @param master_info_added Out parameter saying if the Master_info *mi was
  added to the global list of masters. This is useful in error conditions
  to know if caller should free Master_info *mi.

2219 2220 2221
  @retval FALSE success
  @retval TRUE error
*/
2222
bool change_master(THD* thd, Master_info* mi, bool *master_info_added)
2223
{
2224
  int thread_mask;
unknown's avatar
unknown committed
2225 2226
  const char* errmsg= 0;
  bool need_relay_log_purge= 1;
Andrei Elkin's avatar
Andrei Elkin committed
2227
  bool ret= FALSE;
2228 2229 2230
  char saved_host[HOSTNAME_LENGTH + 1];
  uint saved_port;
  char saved_log_name[FN_REFLEN];
2231 2232
  char master_info_file_tmp[FN_REFLEN];
  char relay_log_info_file_tmp[FN_REFLEN];
2233
  my_off_t saved_log_pos;
2234
  LEX_MASTER_INFO* lex_mi= &thd->lex->mi;
unknown's avatar
unknown committed
2235
  slave_connection_state tmp_slave_state;
2236 2237
  DBUG_ENTER("change_master");

2238
  *master_info_added= false;
2239 2240 2241 2242 2243 2244 2245 2246 2247 2248 2249 2250 2251 2252 2253 2254 2255
  /* 
    We need to check if there is an empty master_host. Otherwise
    change master succeeds, a master.info file is created containing 
    empty master_host string and when issuing: start slave; an error
    is thrown stating that the server is not configured as slave.
    (See BUG#28796).
  */
  if (lex_mi->host && !*lex_mi->host) 
  {
    my_error(ER_WRONG_ARGUMENTS, MYF(0), "MASTER_HOST");
    DBUG_RETURN(TRUE);
  }
  if (master_info_index->check_duplicate_master_info(&lex_mi->connection_name,
                                                     lex_mi->host,
                                                     lex_mi->port))
    DBUG_RETURN(TRUE);

2256
  lock_slave_threads(mi);
2257 2258
  init_thread_mask(&thread_mask,mi,0 /*not inverse*/);
  if (thread_mask) // We refuse if any slave thread is running
2259
  {
2260 2261
    my_error(ER_SLAVE_MUST_STOP, MYF(0), (int) mi->connection_name.length,
             mi->connection_name.str);
Andrei Elkin's avatar
Andrei Elkin committed
2262 2263
    ret= TRUE;
    goto err;
2264
  }
2265

unknown's avatar
unknown committed
2266 2267 2268 2269 2270 2271 2272 2273 2274 2275 2276 2277 2278 2279 2280 2281 2282 2283 2284 2285 2286
  if (lex_mi->gtid_pos_str.str)
  {
    if (master_info_index->give_error_if_slave_running())
    {
      ret= TRUE;
      goto err;
    }
    /*
      First load it into a dummy object, to check for parse errors.
      We do not want to wipe the previous state if there is an error
      in the syntax of the new state!
    */
    if (tmp_slave_state.load(lex_mi->gtid_pos_str.str,
                             lex_mi->gtid_pos_str.length))
    {
      my_error(ER_INCORRECT_GTID_STATE, MYF(0));
      ret= TRUE;
      goto err;
    }
  }

2287
  thd_proc_info(thd, "Changing master");
2288

2289
  create_logfile_name_with_suffix(master_info_file_tmp,
2290
                          sizeof(master_info_file_tmp),
2291
                          master_info_file, 0, &mi->connection_name);
2292
  create_logfile_name_with_suffix(relay_log_info_file_tmp,
2293
                          sizeof(relay_log_info_file_tmp),
2294
                          relay_log_info_file, 0, &mi->connection_name);
2295 2296 2297 2298

  /* if new Master_info doesn't exists, add it */
  if (!master_info_index->get_master_info(&mi->connection_name,
                                          MYSQL_ERROR::WARN_LEVEL_NOTE))
2299
  {
2300 2301 2302 2303 2304 2305 2306 2307
    if (master_info_index->add_master_info(mi, TRUE))
    {
      my_error(ER_MASTER_INFO, MYF(0),
               (int) lex_mi->connection_name.length,
               lex_mi->connection_name.str);
      ret= TRUE;
      goto err;
    }
2308
    *master_info_added= true;
2309
  }
2310 2311 2312 2313 2314 2315 2316 2317
  if (global_system_variables.log_warnings > 1)
    sql_print_information("Master: '%.*s'  Master_info_file: '%s'  "
                          "Relay_info_file: '%s'",
                          (int) mi->connection_name.length,
                          mi->connection_name.str,
                          master_info_file_tmp, relay_log_info_file_tmp);

  if (init_master_info(mi, master_info_file_tmp, relay_log_info_file_tmp, 0,
2318
		       thread_mask))
2319
  {
2320 2321 2322
    my_error(ER_MASTER_INFO, MYF(0),
             (int) lex_mi->connection_name.length,
             lex_mi->connection_name.str);
Andrei Elkin's avatar
Andrei Elkin committed
2323 2324
    ret= TRUE;
    goto err;
2325 2326
  }

2327 2328 2329 2330
  /*
    Data lock not needed since we have already stopped the running threads,
    and we have the hold on the run locks which will keep all threads that
    could possibly modify the data structures from running
2331
  */
2332

2333 2334 2335
  /*
    Before processing the command, save the previous state.
  */
2336
  strmake(saved_host, mi->host, HOSTNAME_LENGTH);
2337
  saved_port= mi->port;
2338
  strmake(saved_log_name, mi->master_log_name, FN_REFLEN - 1);
2339 2340
  saved_log_pos= mi->master_log_pos;

2341
  /*
unknown's avatar
foo1  
unknown committed
2342
    If the user specified host or port without binlog or position,
2343
    reset binlog's name to FIRST and position to 4.
unknown's avatar
foo1  
unknown committed
2344
  */
2345

2346 2347
  if ((lex_mi->host || lex_mi->port) && !lex_mi->log_file_name && !lex_mi->pos)
  {
2348
    mi->master_log_name[0] = 0;
2349
    mi->master_log_pos= BIN_LOG_HEADER_SIZE;
2350
  }
2351

2352
  if (lex_mi->log_file_name)
2353
    strmake(mi->master_log_name, lex_mi->log_file_name,
2354
	    sizeof(mi->master_log_name)-1);
2355
  if (lex_mi->pos)
unknown's avatar
unknown committed
2356
  {
2357
    mi->master_log_pos= lex_mi->pos;
unknown's avatar
unknown committed
2358
  }
unknown's avatar
unknown committed
2359
  DBUG_PRINT("info", ("master_log_pos: %lu", (ulong) mi->master_log_pos));
2360

2361 2362 2363 2364 2365 2366 2367 2368 2369 2370 2371
  if (get_string_parameter(mi->host, lex_mi->host, sizeof(mi->host)-1,
                           "MASTER_HOST") ||
      get_string_parameter(mi->user, lex_mi->user, sizeof(mi->user)-1,
                           "MASTER_USER") ||
      get_string_parameter(mi->password, lex_mi->password,
                           sizeof(mi->password)-1, "MASTER_PASSWORD"))
  {
    ret= TRUE;
    goto err;
  }

2372
  if (lex_mi->port)
2373
    mi->port = lex_mi->port;
2374
  if (lex_mi->connect_retry)
2375
    mi->connect_retry = lex_mi->connect_retry;
Andrei Elkin's avatar
Andrei Elkin committed
2376 2377 2378 2379 2380 2381
  if (lex_mi->heartbeat_opt != LEX_MASTER_INFO::LEX_MI_UNCHANGED)
    mi->heartbeat_period = lex_mi->heartbeat_period;
  else
    mi->heartbeat_period= (float) min(SLAVE_MAX_HEARTBEAT_PERIOD,
                                      (slave_net_timeout/2.0));
  mi->received_heartbeats= LL(0); // counter lives until master is CHANGEd
Andrei Elkin's avatar
Andrei Elkin committed
2382 2383 2384 2385 2386 2387 2388 2389 2390 2391
  /*
    reset the last time server_id list if the current CHANGE MASTER 
    is mentioning IGNORE_SERVER_IDS= (...)
  */
  if (lex_mi->repl_ignore_server_ids_opt == LEX_MASTER_INFO::LEX_MI_ENABLE)
    reset_dynamic(&mi->ignore_server_ids);
  for (uint i= 0; i < lex_mi->repl_ignore_server_ids.elements; i++)
  {
    ulong s_id;
    get_dynamic(&lex_mi->repl_ignore_server_ids, (uchar*) &s_id, i);
2392
    if (s_id == global_system_variables.server_id && replicate_same_server_id)
Andrei Elkin's avatar
Andrei Elkin committed
2393
    {
Guilhem Bichot's avatar
Guilhem Bichot committed
2394
      my_error(ER_SLAVE_IGNORE_SERVER_IDS, MYF(0), static_cast<int>(s_id));
Andrei Elkin's avatar
Andrei Elkin committed
2395 2396 2397 2398 2399 2400 2401 2402 2403 2404 2405 2406 2407 2408
      ret= TRUE;
      goto err;
    }
    else
    {
      if (bsearch((const ulong *) &s_id,
                  mi->ignore_server_ids.buffer,
                  mi->ignore_server_ids.elements, sizeof(ulong),
                  (int (*) (const void*, const void*))
                  change_master_server_id_cmp) == NULL)
        insert_dynamic(&mi->ignore_server_ids, (uchar*) &s_id);
    }
  }
  sort_dynamic(&mi->ignore_server_ids, (qsort_cmp) change_master_server_id_cmp);
unknown's avatar
foo1  
unknown committed
2409

Andrei Elkin's avatar
Andrei Elkin committed
2410 2411
  if (lex_mi->ssl != LEX_MASTER_INFO::LEX_MI_UNCHANGED)
    mi->ssl= (lex_mi->ssl == LEX_MASTER_INFO::LEX_MI_ENABLE);
2412

Andrei Elkin's avatar
Andrei Elkin committed
2413
  if (lex_mi->ssl_verify_server_cert != LEX_MASTER_INFO::LEX_MI_UNCHANGED)
2414
    mi->ssl_verify_server_cert=
Andrei Elkin's avatar
Andrei Elkin committed
2415
      (lex_mi->ssl_verify_server_cert == LEX_MASTER_INFO::LEX_MI_ENABLE);
2416

unknown's avatar
unknown committed
2417 2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428
  if (lex_mi->ssl_ca)
    strmake(mi->ssl_ca, lex_mi->ssl_ca, sizeof(mi->ssl_ca)-1);
  if (lex_mi->ssl_capath)
    strmake(mi->ssl_capath, lex_mi->ssl_capath, sizeof(mi->ssl_capath)-1);
  if (lex_mi->ssl_cert)
    strmake(mi->ssl_cert, lex_mi->ssl_cert, sizeof(mi->ssl_cert)-1);
  if (lex_mi->ssl_cipher)
    strmake(mi->ssl_cipher, lex_mi->ssl_cipher, sizeof(mi->ssl_cipher)-1);
  if (lex_mi->ssl_key)
    strmake(mi->ssl_key, lex_mi->ssl_key, sizeof(mi->ssl_key)-1);
#ifndef HAVE_OPENSSL
  if (lex_mi->ssl || lex_mi->ssl_ca || lex_mi->ssl_capath ||
2429 2430
      lex_mi->ssl_cert || lex_mi->ssl_cipher || lex_mi->ssl_key ||
      lex_mi->ssl_verify_server_cert )
unknown's avatar
foo1  
unknown committed
2431
    push_warning(thd, MYSQL_ERROR::WARN_LEVEL_NOTE,
unknown's avatar
unknown committed
2432 2433
                 ER_SLAVE_IGNORED_SSL_PARAMS, ER(ER_SLAVE_IGNORED_SSL_PARAMS));
#endif
2434

2435 2436
  if (lex_mi->relay_log_name)
  {
2437
    need_relay_log_purge= 0;
2438 2439 2440
    char relay_log_name[FN_REFLEN];
    mi->rli.relay_log.make_log_name(relay_log_name, lex_mi->relay_log_name);
    strmake(mi->rli.group_relay_log_name, relay_log_name,
2441
	    sizeof(mi->rli.group_relay_log_name)-1);
2442
    strmake(mi->rli.event_relay_log_name, relay_log_name,
2443
	    sizeof(mi->rli.event_relay_log_name)-1);
2444 2445 2446 2447
  }

  if (lex_mi->relay_log_pos)
  {
2448
    need_relay_log_purge= 0;
2449
    mi->rli.group_relay_log_pos= mi->rli.event_relay_log_pos= lex_mi->relay_log_pos;
2450 2451
  }

unknown's avatar
unknown committed
2452
  if (lex_mi->gtid_pos_auto || lex_mi->gtid_pos_str.str)
unknown's avatar
unknown committed
2453 2454 2455 2456 2457 2458
    mi->gtid_pos_auto= true;
  else if (lex_mi->gtid_pos_str.str ||
           lex_mi->log_file_name || lex_mi->pos ||
           lex_mi->relay_log_name || lex_mi->relay_log_pos)
    mi->gtid_pos_auto= false;

unknown's avatar
unknown committed
2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476 2477 2478 2479 2480 2481 2482 2483
  /*
    If user did specify neither host nor port nor any log name nor any log
    pos, i.e. he specified only user/password/master_connect_retry, he probably
    wants replication to resume from where it had left, i.e. from the
    coordinates of the **SQL** thread (imagine the case where the I/O is ahead
    of the SQL; restarting from the coordinates of the I/O would lose some
    events which is probably unwanted when you are just doing minor changes
    like changing master_connect_retry).
    A side-effect is that if only the I/O thread was started, this thread may
    restart from ''/4 after the CHANGE MASTER. That's a minor problem (it is a
    much more unlikely situation than the one we are fixing here).
    Note: coordinates of the SQL thread must be read here, before the
    'if (need_relay_log_purge)' block which resets them.
  */
  if (!lex_mi->host && !lex_mi->port &&
      !lex_mi->log_file_name && !lex_mi->pos &&
      need_relay_log_purge)
   {
     /*
       Sometimes mi->rli.master_log_pos == 0 (it happens when the SQL thread is
       not initialized), so we use a max().
       What happens to mi->rli.master_log_pos during the initialization stages
       of replication is not 100% clear, so we guard against problems using
       max().
      */
unknown's avatar
unknown committed
2484 2485 2486
     mi->master_log_pos = max(BIN_LOG_HEADER_SIZE,
			      mi->rli.group_master_log_pos);
     strmake(mi->master_log_name, mi->rli.group_master_log_name,
unknown's avatar
unknown committed
2487 2488
             sizeof(mi->master_log_name)-1);
  }
unknown's avatar
unknown committed
2489 2490 2491 2492 2493 2494 2495 2496 2497 2498 2499 2500

  if (lex_mi->gtid_pos_str.str)
  {
    if (rpl_global_gtid_slave_state.load(thd, lex_mi->gtid_pos_str.str,
                                         lex_mi->gtid_pos_str.length, true))
    {
      my_error(ER_FAILED_GTID_STATE_INIT, MYF(0));
      ret= TRUE;
      goto err;
    }
  }

unknown's avatar
unknown committed
2501 2502 2503 2504
  /*
    Relay log's IO_CACHE may not be inited, if rli->inited==0 (server was never
    a slave before).
  */
2505
  if (flush_master_info(mi, FALSE, FALSE))
2506 2507
  {
    my_error(ER_RELAY_LOG_INIT, MYF(0), "Failed to flush master info file");
Andrei Elkin's avatar
Andrei Elkin committed
2508 2509
    ret= TRUE;
    goto err;
2510
  }
2511
  if (need_relay_log_purge)
2512
  {
2513
    relay_log_purge= 1;
2514
    thd_proc_info(thd, "Purging old relay logs");
2515 2516
    if (purge_relay_logs(&mi->rli, thd,
			 0 /* not only reset, but also reinit */,
2517 2518
			 &errmsg))
    {
2519
      my_error(ER_RELAY_LOG_FAIL, MYF(0), errmsg);
Andrei Elkin's avatar
Andrei Elkin committed
2520 2521
      ret= TRUE;
      goto err;
2522 2523 2524 2525 2526
    }
  }
  else
  {
    const char* msg;
2527
    relay_log_purge= 0;
2528 2529
    /* Relay log is already initialized */
    if (init_relay_log_pos(&mi->rli,
2530 2531
			   mi->rli.group_relay_log_name,
			   mi->rli.group_relay_log_pos,
2532
			   0 /*no data lock*/,
2533
			   &msg, 0))
2534
    {
2535
      my_error(ER_RELAY_LOG_INIT, MYF(0), msg);
Andrei Elkin's avatar
Andrei Elkin committed
2536 2537
      ret= TRUE;
      goto err;
2538
    }
2539
  }
unknown's avatar
unknown committed
2540 2541 2542 2543 2544 2545 2546 2547 2548 2549
  /*
    Coordinates in rli were spoilt by the 'if (need_relay_log_purge)' block,
    so restore them to good values. If we left them to ''/0, that would work;
    but that would fail in the case of 2 successive CHANGE MASTER (without a
    START SLAVE in between): because first one would set the coords in mi to
    the good values of those in rli, the set those in rli to ''/0, then
    second CHANGE MASTER would set the coords in mi to those of rli, i.e. to
    ''/0: we have lost all copies of the original good coordinates.
    That's why we always save good coords in rli.
  */
unknown's avatar
unknown committed
2550
  mi->rli.group_master_log_pos= mi->master_log_pos;
2551
  DBUG_PRINT("info", ("master_log_pos: %lu", (ulong) mi->master_log_pos));
2552 2553
  strmake(mi->rli.group_master_log_name,mi->master_log_name,
	  sizeof(mi->rli.group_master_log_name)-1);
unknown's avatar
unknown committed
2554

2555 2556
  if (!mi->rli.group_master_log_name[0]) // uninitialized case
    mi->rli.group_master_log_pos=0;
2557

Marc Alff's avatar
Marc Alff committed
2558
  mysql_mutex_lock(&mi->rli.data_lock);
2559
  mi->rli.abort_pos_wait++; /* for MASTER_POS_WAIT() to abort */
2560
  /* Clear the errors, for a clean start */
2561
  mi->rli.clear_error();
2562
  mi->rli.clear_until_condition();
2563 2564 2565 2566 2567 2568 2569 2570 2571

  sql_print_information("'CHANGE MASTER TO executed'. "
    "Previous state master_host='%s', master_port='%u', master_log_file='%s', "
    "master_log_pos='%ld'. "
    "New state master_host='%s', master_port='%u', master_log_file='%s', "
    "master_log_pos='%ld'.", saved_host, saved_port, saved_log_name,
    (ulong) saved_log_pos, mi->host, mi->port, mi->master_log_name,
    (ulong) mi->master_log_pos);

unknown's avatar
unknown committed
2572 2573 2574 2575 2576 2577
  /*
    If we don't write new coordinates to disk now, then old will remain in
    relay-log.info until START SLAVE is issued; but if mysqld is shutdown
    before START SLAVE, then old will remain in relay-log.info, and will be the
    in-memory value at restart (thus causing errors, as the old relay log does
    not exist anymore).
2578
  */
unknown's avatar
unknown committed
2579
  flush_relay_log_info(&mi->rli);
Marc Alff's avatar
Marc Alff committed
2580 2581
  mysql_cond_broadcast(&mi->data_cond);
  mysql_mutex_unlock(&mi->rli.data_lock);
2582

Andrei Elkin's avatar
Andrei Elkin committed
2583
err:
2584
  unlock_slave_threads(mi);
2585
  thd_proc_info(thd, 0);
Andrei Elkin's avatar
Andrei Elkin committed
2586 2587 2588
  if (ret == FALSE)
    my_ok(thd);
  DBUG_RETURN(ret);
2589 2590
}

2591 2592 2593 2594 2595 2596 2597 2598 2599 2600

/**
  Execute a RESET MASTER statement.

  @param thd Pointer to THD object of the client thread executing the
  statement.

  @retval 0 success
  @retval 1 error
*/
2601
int reset_master(THD* thd)
2602
{
2603
  if (!mysql_bin_log.is_open())
2604
  {
unknown's avatar
unknown committed
2605 2606
    my_message(ER_FLUSH_MASTER_BINLOG_CLOSED,
               ER(ER_FLUSH_MASTER_BINLOG_CLOSED), MYF(ME_BELL+ME_WAITTANG));
2607
    return 1;
2608
  }
He Zhenxing's avatar
He Zhenxing committed
2609

2610
  if (mysql_bin_log.reset_logs(thd, 1))
He Zhenxing's avatar
He Zhenxing committed
2611 2612 2613
    return 1;
  RUN_HOOK(binlog_transmit, after_reset_master, (thd, 0 /* flags */));
  return 0;
2614 2615
}

unknown's avatar
unknown committed
2616

2617 2618 2619 2620 2621 2622 2623 2624 2625
/**
  Execute a SHOW BINLOG EVENTS statement.

  @param thd Pointer to THD object for the client thread executing the
  statement.

  @retval FALSE success
  @retval TRUE failure
*/
2626
bool mysql_show_binlog_events(THD* thd)
unknown's avatar
unknown committed
2627
{
2628
  Protocol *protocol= thd->protocol;
unknown's avatar
unknown committed
2629
  List<Item> field_list;
2630
  const char *errmsg = 0;
2631
  bool ret = TRUE;
unknown's avatar
unknown committed
2632 2633
  IO_CACHE log;
  File file = -1;
2634
  MYSQL_BIN_LOG *binary_log= NULL;
2635
  int old_max_allowed_packet= thd->variables.max_allowed_packet;
2636
  Master_info *mi= 0;
2637 2638
  LOG_INFO linfo;

2639
  DBUG_ENTER("mysql_show_binlog_events");
2640 2641

  Log_event::init_show_field_list(&field_list);
2642
  if (protocol->send_result_set_metadata(&field_list,
2643
                            Protocol::SEND_NUM_ROWS | Protocol::SEND_EOF))
unknown's avatar
unknown committed
2644
    DBUG_RETURN(TRUE);
2645

2646 2647 2648
  Format_description_log_event *description_event= new
    Format_description_log_event(3); /* MySQL 4.0 by default */

2649 2650
  DBUG_ASSERT(thd->lex->sql_command == SQLCOM_SHOW_BINLOG_EVENTS ||
              thd->lex->sql_command == SQLCOM_SHOW_RELAYLOG_EVENTS);
unknown's avatar
unknown committed
2651

2652 2653 2654 2655 2656 2657 2658 2659 2660 2661 2662 2663 2664 2665
  /* select wich binary log to use: binlog or relay */
  if ( thd->lex->sql_command == SQLCOM_SHOW_BINLOG_EVENTS )
  {
    /*
      Wait for handlers to insert any pending information
      into the binlog.  For e.g. ndb which updates the binlog asynchronously
      this is needed so that the uses sees all its own commands in the binlog
    */
    ha_binlog_wait(thd);

    binary_log= &mysql_bin_log;
  }
  else  /* showing relay log contents */
  {
2666 2667 2668 2669 2670 2671
    mysql_mutex_lock(&LOCK_active_mi);
    if (!(mi= master_info_index->
          get_master_info(&thd->variables.default_master_connection,
                          MYSQL_ERROR::WARN_LEVEL_ERROR)))
    {
      mysql_mutex_unlock(&LOCK_active_mi);
2672
      DBUG_RETURN(TRUE);
2673 2674
    }
    binary_log= &(mi->rli.relay_log);
2675
  }
unknown's avatar
unknown committed
2676

2677
  if (binary_log->is_open())
unknown's avatar
unknown committed
2678
  {
2679
    LEX_MASTER_INFO *lex_mi= &thd->lex->mi;
2680
    SELECT_LEX_UNIT *unit= &thd->lex->unit;
2681
    ha_rows event_count, limit_start, limit_end;
2682
    my_off_t pos = max(BIN_LOG_HEADER_SIZE, lex_mi->pos); // user-friendly
2683 2684
    char search_file_name[FN_REFLEN], *name;
    const char *log_file_name = lex_mi->log_file_name;
Marc Alff's avatar
Marc Alff committed
2685
    mysql_mutex_t *log_lock = binary_log->get_log_lock();
2686
    Log_event* ev;
2687

2688 2689 2690 2691 2692 2693 2694
    if (mi)
    {
      /* We can unlock the mutex as we have a lock on the file */
      mysql_mutex_unlock(&LOCK_active_mi);
      mi= 0;
    }

2695 2696 2697
    unit->set_limit(thd->lex->current_select);
    limit_start= unit->offset_limit_cnt;
    limit_end= unit->select_limit_cnt;
unknown's avatar
unknown committed
2698

2699
    name= search_file_name;
unknown's avatar
unknown committed
2700
    if (log_file_name)
2701
      binary_log->make_log_name(search_file_name, log_file_name);
unknown's avatar
unknown committed
2702
    else
2703
      name=0;					// Find first log
unknown's avatar
unknown committed
2704 2705

    linfo.index_file_offset = 0;
2706

2707
    if (binary_log->find_log_pos(&linfo, name, 1))
unknown's avatar
unknown committed
2708 2709 2710 2711 2712
    {
      errmsg = "Could not find target log";
      goto err;
    }

Marc Alff's avatar
Marc Alff committed
2713
    mysql_mutex_lock(&LOCK_thread_count);
2714
    thd->current_linfo = &linfo;
Marc Alff's avatar
Marc Alff committed
2715
    mysql_mutex_unlock(&LOCK_thread_count);
2716

unknown's avatar
unknown committed
2717 2718 2719
    if ((file=open_binlog(&log, linfo.log_file_name, &errmsg)) < 0)
      goto err;

2720 2721 2722 2723 2724
    /*
      to account binlog event header size
    */
    thd->variables.max_allowed_packet += MAX_LOG_EVENT_HEADER;

Marc Alff's avatar
Marc Alff committed
2725
    mysql_mutex_lock(log_lock);
2726

2727
    /*
2728 2729 2730 2731 2732 2733
      open_binlog() sought to position 4.
      Read the first event in case it's a Format_description_log_event, to
      know the format. If there's no such event, we are 3.23 or 4.x. This
      code, like before, can't read 3.23 binlogs.
      This code will fail on a mixed relay log (one which has Format_desc then
      Rotate then Format_desc).
2734
    */
Sergei Golubchik's avatar
Sergei Golubchik committed
2735
    ev= Log_event::read_log_event(&log, (mysql_mutex_t*)0, description_event,
2736
                                   opt_master_verify_checksum);
2737 2738 2739
    if (ev)
    {
      if (ev->get_type_code() == FORMAT_DESCRIPTION_EVENT)
2740 2741
      {
        delete description_event;
2742
        description_event= (Format_description_log_event*) ev;
2743
      }
2744 2745 2746 2747
      else
        delete ev;
    }

unknown's avatar
unknown committed
2748 2749
    my_b_seek(&log, pos);

2750 2751 2752 2753 2754
    if (!description_event->is_valid())
    {
      errmsg="Invalid Format_description event; could be out of memory";
      goto err;
    }
2755

2756
    for (event_count = 0;
Marc Alff's avatar
Marc Alff committed
2757
         (ev = Log_event::read_log_event(&log, (mysql_mutex_t*) 0,
2758 2759
                                         description_event,
                                         opt_master_verify_checksum)); )
unknown's avatar
unknown committed
2760
    {
2761 2762 2763
      if (ev->get_type_code() == FORMAT_DESCRIPTION_EVENT)
        description_event->checksum_alg= ev->checksum_alg;

unknown's avatar
unknown committed
2764
      if (event_count >= limit_start &&
unknown's avatar
unknown committed
2765
	  ev->net_send(thd, protocol, linfo.log_file_name, pos))
2766 2767 2768
      {
	errmsg = "Net error";
	delete ev;
Marc Alff's avatar
Marc Alff committed
2769
        mysql_mutex_unlock(log_lock);
2770 2771 2772 2773
	goto err;
      }

      pos = my_b_tell(&log);
unknown's avatar
unknown committed
2774 2775 2776 2777 2778 2779 2780 2781 2782
      delete ev;

      if (++event_count >= limit_end)
	break;
    }

    if (event_count < limit_end && log.error)
    {
      errmsg = "Wrong offset or I/O error";
Marc Alff's avatar
Marc Alff committed
2783
      mysql_mutex_unlock(log_lock);
unknown's avatar
unknown committed
2784 2785
      goto err;
    }
2786

Marc Alff's avatar
Marc Alff committed
2787
    mysql_mutex_unlock(log_lock);
unknown's avatar
unknown committed
2788
  }
2789 2790 2791
  else if (mi)
    mysql_mutex_unlock(&LOCK_active_mi);

2792 2793
  // Check that linfo is still on the function scope.
  DEBUG_SYNC(thd, "after_show_binlog_events");
unknown's avatar
unknown committed
2794

2795 2796
  ret= FALSE;

unknown's avatar
unknown committed
2797
err:
2798
  delete description_event;
unknown's avatar
unknown committed
2799 2800 2801
  if (file >= 0)
  {
    end_io_cache(&log);
Marc Alff's avatar
Marc Alff committed
2802
    mysql_file_close(file, MYF(MY_WME));
unknown's avatar
unknown committed
2803
  }
2804

unknown's avatar
unknown committed
2805
  if (errmsg)
2806 2807
    my_error(ER_ERROR_WHEN_EXECUTING_COMMAND, MYF(0),
             "SHOW BINLOG EVENTS", errmsg);
2808
  else
2809
    my_eof(thd);
unknown's avatar
unknown committed
2810

Marc Alff's avatar
Marc Alff committed
2811
  mysql_mutex_lock(&LOCK_thread_count);
2812
  thd->current_linfo = 0;
Marc Alff's avatar
Marc Alff committed
2813
  mysql_mutex_unlock(&LOCK_thread_count);
2814
  thd->variables.max_allowed_packet= old_max_allowed_packet;
2815
  DBUG_RETURN(ret);
unknown's avatar
unknown committed
2816 2817
}

unknown's avatar
unknown committed
2818

2819 2820 2821 2822 2823 2824 2825 2826 2827
/**
  Execute a SHOW MASTER STATUS statement.

  @param thd Pointer to THD object for the client thread executing the
  statement.

  @retval FALSE success
  @retval TRUE failure
*/
unknown's avatar
unknown committed
2828
bool show_binlog_info(THD* thd)
2829
{
2830
  Protocol *protocol= thd->protocol;
2831 2832 2833
  DBUG_ENTER("show_binlog_info");
  List<Item> field_list;
  field_list.push_back(new Item_empty_string("File", FN_REFLEN));
2834 2835
  field_list.push_back(new Item_return_int("Position",20,
					   MYSQL_TYPE_LONGLONG));
2836 2837
  field_list.push_back(new Item_empty_string("Binlog_Do_DB",255));
  field_list.push_back(new Item_empty_string("Binlog_Ignore_DB",255));
2838

2839
  if (protocol->send_result_set_metadata(&field_list,
2840
                            Protocol::SEND_NUM_ROWS | Protocol::SEND_EOF))
unknown's avatar
unknown committed
2841
    DBUG_RETURN(TRUE);
2842 2843
  protocol->prepare_for_resend();

2844 2845 2846 2847 2848
  if (mysql_bin_log.is_open())
  {
    LOG_INFO li;
    mysql_bin_log.get_current_log(&li);
    int dir_len = dirname_length(li.log_file_name);
2849
    protocol->store(li.log_file_name + dir_len, &my_charset_bin);
2850
    protocol->store((ulonglong) li.pos);
2851 2852
    protocol->store(binlog_filter->get_do_db());
    protocol->store(binlog_filter->get_ignore_db());
2853
    if (protocol->write())
unknown's avatar
unknown committed
2854
      DBUG_RETURN(TRUE);
2855
  }
2856
  my_eof(thd);
unknown's avatar
unknown committed
2857
  DBUG_RETURN(FALSE);
2858
}
unknown's avatar
unknown committed
2859

2860

2861 2862
/**
  Execute a SHOW BINARY LOGS statement.
2863

2864 2865
  @param thd Pointer to THD object for the client thread executing the
  statement.
2866

2867 2868
  @retval FALSE success
  @retval TRUE failure
2869
*/
unknown's avatar
unknown committed
2870
bool show_binlogs(THD* thd)
unknown's avatar
unknown committed
2871
{
2872
  IO_CACHE *index_file;
2873 2874
  LOG_INFO cur;
  File file;
unknown's avatar
unknown committed
2875 2876
  char fname[FN_REFLEN];
  List<Item> field_list;
2877
  uint length;
unknown's avatar
unknown committed
2878
  int cur_dir_len;
2879 2880
  Protocol *protocol= thd->protocol;
  DBUG_ENTER("show_binlogs");
2881 2882

  if (!mysql_bin_log.is_open())
2883
  {
Luis Soares's avatar
Luis Soares committed
2884
    my_error(ER_NO_BINARY_LOGGING, MYF(0));
2885
    DBUG_RETURN(TRUE);
2886
  }
unknown's avatar
unknown committed
2887

2888
  field_list.push_back(new Item_empty_string("Log_name", 255));
unknown's avatar
foo1  
unknown committed
2889
  field_list.push_back(new Item_return_int("File_size", 20,
2890
                                           MYSQL_TYPE_LONGLONG));
2891
  if (protocol->send_result_set_metadata(&field_list,
2892
                            Protocol::SEND_NUM_ROWS | Protocol::SEND_EOF))
unknown's avatar
unknown committed
2893
    DBUG_RETURN(TRUE);
unknown's avatar
unknown committed
2894
  
Marc Alff's avatar
Marc Alff committed
2895
  mysql_mutex_lock(mysql_bin_log.get_log_lock());
unknown's avatar
unknown committed
2896
  mysql_bin_log.lock_index();
2897
  index_file=mysql_bin_log.get_index_file();
unknown's avatar
unknown committed
2898 2899
  
  mysql_bin_log.raw_get_current_log(&cur); // dont take mutex
Marc Alff's avatar
Marc Alff committed
2900
  mysql_mutex_unlock(mysql_bin_log.get_log_lock()); // lockdep, OK
unknown's avatar
unknown committed
2901
  
unknown's avatar
unknown committed
2902
  cur_dir_len= dirname_length(cur.log_file_name);
2903

2904 2905 2906 2907
  reinit_io_cache(index_file, READ_CACHE, (my_off_t) 0, 0, 0);

  /* The file ends with EOF or empty line */
  while ((length=my_b_gets(index_file, fname, sizeof(fname))) > 1)
2908
  {
unknown's avatar
unknown committed
2909 2910 2911
    int dir_len;
    ulonglong file_length= 0;                   // Length if open fails
    fname[--length] = '\0';                     // remove the newline
2912

2913
    protocol->prepare_for_resend();
unknown's avatar
unknown committed
2914 2915 2916 2917 2918 2919 2920
    dir_len= dirname_length(fname);
    length-= dir_len;
    protocol->store(fname + dir_len, length, &my_charset_bin);

    if (!(strncmp(fname+dir_len, cur.log_file_name+cur_dir_len, length)))
      file_length= cur.pos;  /* The active log, use the active position */
    else
2921 2922
    {
      /* this is an old log, open it and find the size */
Marc Alff's avatar
Marc Alff committed
2923 2924 2925
      if ((file= mysql_file_open(key_file_binlog,
                                 fname, O_RDONLY | O_SHARE | O_BINARY,
                                 MYF(0))) >= 0)
2926
      {
Marc Alff's avatar
Marc Alff committed
2927 2928
        file_length= (ulonglong) mysql_file_seek(file, 0L, MY_SEEK_END, MYF(0));
        mysql_file_close(file, MYF(0));
2929 2930
      }
    }
unknown's avatar
unknown committed
2931
    protocol->store(file_length);
2932
    if (protocol->write())
2933
      goto err;
2934
  }
unknown's avatar
unknown committed
2935
  mysql_bin_log.unlock_index();
2936
  my_eof(thd);
unknown's avatar
unknown committed
2937
  DBUG_RETURN(FALSE);
2938

2939 2940
err:
  mysql_bin_log.unlock_index();
unknown's avatar
unknown committed
2941
  DBUG_RETURN(TRUE);
unknown's avatar
unknown committed
2942 2943
}

2944 2945 2946 2947 2948 2949 2950
/**
   Load data's io cache specific hook to be executed
   before a chunk of data is being read into the cache's buffer
   The fuction instantianates and writes into the binlog
   replication events along LOAD DATA processing.
   
   @param file  pointer to io-cache
He Zhenxing's avatar
He Zhenxing committed
2951 2952
   @retval 0 success
   @retval 1 failure
2953
*/
2954 2955
int log_loaded_block(IO_CACHE* file)
{
2956
  DBUG_ENTER("log_loaded_block");
2957
  LOAD_FILE_INFO *lf_info;
2958 2959
  uint block_len;
  /* buffer contains position where we started last read */
2960
  uchar* buffer= (uchar*) my_b_get_buffer_start(file);
2961 2962
  uint max_event_size= current_thd->variables.max_allowed_packet;
  lf_info= (LOAD_FILE_INFO*) file->arg;
2963
  if (lf_info->thd->is_current_stmt_binlog_format_row())
2964
    DBUG_RETURN(0);
2965
  if (lf_info->last_pos_in_file != HA_POS_ERROR &&
2966
      lf_info->last_pos_in_file >= my_b_get_pos_in_file(file))
2967
    DBUG_RETURN(0);
2968
  
2969
  for (block_len= (uint) (my_b_get_bytes_in_buffer(file)); block_len > 0;
2970 2971
       buffer += min(block_len, max_event_size),
       block_len -= min(block_len, max_event_size))
2972
  {
2973 2974 2975 2976 2977 2978
    lf_info->last_pos_in_file= my_b_get_pos_in_file(file);
    if (lf_info->wrote_create_file)
    {
      Append_block_log_event a(lf_info->thd, lf_info->thd->db, buffer,
                               min(block_len, max_event_size),
                               lf_info->log_delayed);
He Zhenxing's avatar
He Zhenxing committed
2979 2980
      if (mysql_bin_log.write(&a))
        DBUG_RETURN(1);
2981 2982 2983 2984 2985 2986 2987
    }
    else
    {
      Begin_load_query_log_event b(lf_info->thd, lf_info->thd->db,
                                   buffer,
                                   min(block_len, max_event_size),
                                   lf_info->log_delayed);
He Zhenxing's avatar
He Zhenxing committed
2988 2989
      if (mysql_bin_log.write(&b))
        DBUG_RETURN(1);
2990 2991
      lf_info->wrote_create_file= 1;
    }
2992
  }
2993
  DBUG_RETURN(0);
2994
}
2995

2996 2997 2998 2999 3000 3001 3002 3003 3004 3005 3006 3007 3008 3009 3010 3011 3012 3013 3014 3015 3016 3017 3018 3019 3020 3021 3022 3023 3024 3025 3026 3027 3028 3029 3030 3031 3032 3033 3034 3035 3036 3037 3038

/**
   Initialise the slave replication state from the mysql.rpl_slave_state table.

   This is called each time an SQL thread starts, but the data is only actually
   loaded on the first call.

   The slave state is the last GTID applied on the slave within each
   replication domain.

   To avoid row lock contention, there are multiple rows for each domain_id.
   The one containing the current slave state is the one with the maximal
   sub_id value, within each domain_id.

    CREATE TABLE mysql.rpl_slave_state (
      domain_id INT UNSIGNED NOT NULL,
      sub_id BIGINT UNSIGNED NOT NULL,
      server_id INT UNSIGNED NOT NULL,
      seq_no BIGINT UNSIGNED NOT NULL,
      PRIMARY KEY (domain_id, sub_id))
*/

void
rpl_init_gtid_slave_state()
{
  rpl_global_gtid_slave_state.init();
}


void
rpl_deinit_gtid_slave_state()
{
  rpl_global_gtid_slave_state.deinit();
}


int
rpl_load_gtid_slave_state(THD *thd)
{
  TABLE_LIST tlist;
  TABLE *table;
  bool table_opened= false;
  bool table_scanned= false;
unknown's avatar
unknown committed
3039 3040 3041 3042 3043
  struct local_element { uint64 sub_id; rpl_gtid gtid; };
  struct local_element *entry;
  HASH hash;
  int err= 0;
  uint32 i;
3044 3045
  DBUG_ENTER("rpl_load_gtid_slave_state");

unknown's avatar
unknown committed
3046 3047 3048 3049
  my_hash_init(&hash, &my_charset_bin, 32,
               offsetof(local_element, gtid) + offsetof(rpl_gtid, domain_id),
               sizeof(uint32), NULL, my_free, HASH_UNIQUE);

3050
  rpl_global_gtid_slave_state.lock();
unknown's avatar
unknown committed
3051 3052 3053
  bool loaded= rpl_global_gtid_slave_state.loaded;
  rpl_global_gtid_slave_state.unlock();
  if (loaded)
3054 3055 3056 3057 3058 3059 3060 3061 3062 3063 3064 3065
    goto end;

  mysql_reset_thd_for_next_command(thd, 0);

  tlist.init_one_table(STRING_WITH_LEN("mysql"),
                       rpl_gtid_slave_state_table_name.str,
                       rpl_gtid_slave_state_table_name.length,
                       NULL, TL_READ);
  if ((err= open_and_lock_tables(thd, &tlist, FALSE, 0)))
    goto end;
  table_opened= true;
  table= tlist.table;
3066
  table->no_replicate= 1;
3067 3068 3069 3070 3071 3072 3073 3074 3075 3076 3077 3078 3079 3080 3081 3082 3083

  /*
    ToDo: Check the table definition, error if not as expected.
    We need the correct first 4 columns with correct type, and the primary key.
  */

  bitmap_set_bit(table->read_set, table->field[0]->field_index);
  bitmap_set_bit(table->read_set, table->field[1]->field_index);
  bitmap_set_bit(table->read_set, table->field[2]->field_index);
  bitmap_set_bit(table->read_set, table->field[3]->field_index);
  if ((err= table->file->ha_rnd_init_with_error(1)))
    goto end;
  table_scanned= true;
  for (;;)
  {
    uint32 domain_id, server_id;
    uint64 sub_id, seq_no;
unknown's avatar
unknown committed
3084 3085
    uchar *rec;

3086 3087 3088 3089 3090 3091 3092 3093 3094 3095 3096 3097 3098 3099 3100 3101
    if ((err= table->file->ha_rnd_next(table->record[0])))
    {
      if (err == HA_ERR_RECORD_DELETED)
        continue;
      else if (err == HA_ERR_END_OF_FILE)
        break;
      else
        goto end;
    }
    domain_id= (ulonglong)table->field[0]->val_int();
    sub_id= (ulonglong)table->field[1]->val_int();
    server_id= (ulonglong)table->field[2]->val_int();
    seq_no= (ulonglong)table->field[3]->val_int();
    DBUG_PRINT("info", ("Read slave state row: %u:%u-%lu sub_id=%lu\n",
                        (unsigned)domain_id, (unsigned)server_id,
                        (ulong)seq_no, (ulong)sub_id));
unknown's avatar
unknown committed
3102 3103 3104 3105 3106 3107 3108 3109 3110 3111 3112 3113 3114 3115 3116 3117 3118 3119 3120 3121 3122 3123 3124 3125 3126
    if ((rec= my_hash_search(&hash, (const uchar *)&domain_id, 0)))
    {
      entry= (struct local_element *)rec;
      if (entry->sub_id >= sub_id)
        continue;
    }
    else
    {
      if (!(entry= (struct local_element *)my_malloc(sizeof(*entry),
                                                     MYF(MY_WME))))
      {
        err= 1;
        goto end;
      }
      if ((err= my_hash_insert(&hash, (uchar *)entry)))
      {
        my_free(entry);
        goto end;
      }
    }

    entry->sub_id= sub_id;
    entry->gtid.domain_id= domain_id;
    entry->gtid.server_id= server_id;
    entry->gtid.seq_no= seq_no;
3127 3128
  }

unknown's avatar
unknown committed
3129 3130 3131 3132 3133 3134 3135 3136 3137 3138 3139 3140 3141
  rpl_global_gtid_slave_state.lock();
  for (i= 0; i < hash.records; ++i)
  {
    entry= (struct local_element *)my_hash_element(&hash, i);
    if ((err= rpl_global_gtid_slave_state.update(entry->gtid.domain_id,
                                                 entry->gtid.server_id,
                                                 entry->sub_id,
                                                 entry->gtid.seq_no)))
    {
      rpl_global_gtid_slave_state.unlock();
      goto end;
    }
  }
3142
  rpl_global_gtid_slave_state.loaded= true;
unknown's avatar
unknown committed
3143 3144 3145
  rpl_global_gtid_slave_state.unlock();

  err= 0;                                       /* Clear HA_ERR_END_OF_FILE */
3146 3147 3148 3149 3150 3151 3152 3153 3154 3155

end:
  if (table_scanned)
  {
    table->file->ha_index_or_rnd_end();
    ha_commit_trans(thd, FALSE);
    ha_commit_trans(thd, TRUE);
  }
  if (table_opened)
    close_thread_tables(thd);
unknown's avatar
unknown committed
3156
  my_hash_free(&hash);
3157 3158 3159
  DBUG_RETURN(err);
}

unknown's avatar
SCRUM  
unknown committed
3160
#endif /* HAVE_REPLICATION */