1. 06 Dec, 2023 1 commit
  2. 05 Dec, 2023 6 commits
  3. 04 Dec, 2023 1 commit
  4. 02 Dec, 2023 1 commit
    • Gulshan Kumar Prasad's avatar
      MDEV-32611: Test suite is missing dump option delete-master-logs. · d8e6bb00
      Gulshan Kumar Prasad authored
      Extending the rpl_mysqldump_slave.test to incorporate the
      delete-master-logs option, and this options is alias of
      get binlogs: show master status -> flush logs -> purge binary logs to <new_binlog>
      sequence and this test is derived using the same pattern.
      also we measure the pre and post log state
      on the master following the mysqldump process. Introducing
      assertions to validate the correct state.
      d8e6bb00
  5. 30 Nov, 2023 2 commits
  6. 29 Nov, 2023 4 commits
    • Marko Mäkelä's avatar
      MDEV-31441 BLOB corruption on UPDATE of PRIMARY KEY with FOREIGN KEY · cd79f102
      Marko Mäkelä authored
      row_upd_clust_rec_by_insert(): If we are resuming from a lock wait,
      reset the 'disowned' flag of the BLOB pointers in 'entry' that we
      copied from 'rec' on which we had invoked btr_cur_disown_inherited_fields()
      before the lock wait started. In this way, the inserted record with
      the updated PRIMARY KEY value will have the BLOB ownership associated
      with itself, like it is supposed to be.
      
      Note: If the lock wait had been aborted, then rollback would have
      invoked btr_cur_unmark_extern_fields() and no corruption would be possible.
      
      Reviewed by: Vladislav Lesin
      Tested by: Matthias Leich
      cd79f102
    • Thirunarayanan Balathandayuthapani's avatar
      MDEV-32897 main suite test case prints extra row for metadata_lock_info query · e996f77c
      Thirunarayanan Balathandayuthapani authored
      - Added the parameter stats_persistent=0 for InnoDB engine.
      - Before printing metadata_lock_info query, make sure that
      InnoDB does complete purging.
      
      Reviewed by: Marko Mäkelä
      e996f77c
    • Marko Mäkelä's avatar
      MDEV-32833 InnoDB wrong error message · 47fc64c1
      Marko Mäkelä authored
      trx_t::commit_in_memory(): Empty the detailed_error string, so that
      FOREIGN KEY error messages from an earlier transaction will not be
      wrongly reused in ha_innobase::get_error_message().
      
      Reviewed by: Thirunarayanan Balathandayuthapani
      47fc64c1
    • Daniel Black's avatar
      mallinfo2: include malloc header even if mallinfo undetected · 1fec5012
      Daniel Black authored
      It may be the case that for some reason, -Werror deprecated
      for instance, that mallinfo isn't detected. In this case the
      malloc.h headers won't be included which defined the mallinfo2
      function and its structure.
      
      Re-organise so that either function pulls in the header.
      1fec5012
  7. 28 Nov, 2023 9 commits
  8. 27 Nov, 2023 7 commits
    • Monty's avatar
      Improve reporting from sf_report_leaked_memory() · 83214c34
      Monty authored
      Other things:
      - Added DBUG_EXECUTE_IF("print_allocated_thread_memory") at end of query
        to easier find not freed memory allocated by THD
      - Removed free_root() from plugin_init() that did nothing.
      83214c34
    • Monty's avatar
      MDEV-28566 Assertion `!expr->is_fixed()' failed in bool virtual_column_info::fix_session_expr(THD*) · 06f7ed4d
      Monty authored
      The problem was that table->vcol_cleanup_expr() was not called in case
      of error in open_table().
      06f7ed4d
    • Monty's avatar
      Fixed memory leak introduces by a fix for MDEV-29932 · 08e6431c
      Monty authored
      The leaks are all 40 bytes and happens in this call stack when running
      mtr vcol.vcol_syntax:
      
      alloc_root()
      ...
      Virtual_column_info::fix_and_check_exp()
      ...
      Delayed_insert::get_local_table()
      
      The problem was that one copied a MEM_ROOT from THD to a TABLE without
      taking into account that new blocks would be allocated through the
      TABLE memroot (and would thus be leaked).
      In general, one should NEVER copy MEM_ROOT from one object to another
      without clearing the copied memroot!
      
      Fixed by, at end of get_local_table(), copy all new allocated objects
      to client_thd->mem_root.
      
      Other things:
      - Removed references to MEM_ROOT::total_alloc that was wrongly left
        after a previous commit
      08e6431c
    • Monty's avatar
      Backport my_addr_resolve from 10.6 to get latest bug fixes in. · 8e961191
      Monty authored
      This will enable safemalloc to resolve symbols when compiled with
      __PIE__
      8e961191
    • Monty's avatar
      Do not use MEM_ROOT in set_killed_no_mutex() · dc116541
      Monty authored
      The reason for this change are the following:
      - If we call set_killed() from one thread to kill another thread with
        a message, there may be concurrent usage of the MEM_ROOT which is
        not supported (this could cause memory corruption).
        We do not currently have code that does this, but the API allows this
        and it is better to be fix the issue before it happens.
      - The per thread memory tracking does not work if one thread uses
        another threads MEM_ROOT.
      - set_killed() can be called if a MEM_ROOT allocation fails.  In this case
        it is not good to try to allocate more memory from potentially the same
        MEM_ROOT.
      
      Fix is to use my_malloc() instead of mem_root for killed messages.
      dc116541
    • Monty's avatar
      MENT-1707 Crash at reload_acl_and_cache · 9e424b62
      Monty authored
      The stack function trace for this bug is:
      
      libc
      my_free
      free_root
      acl_reload
      
      The crash happens because acl_memroot gets corrupted.
      
      The issue was that during FLUSH PRIVILEGES we discard the old
      privileges and create new ones. We have protection in place that no
      one can accesses the privileges during this time.
      
      However one short piece of code called during login of a new user, or
      change password, was not properly protected, which could in some very
      rare circumstances case a memory overwrite of a MEMROOT object if
      at the same time another thread calls FLUSH PRIVILEGES.
      
      This it issue is fixed by adding protection around set_user_salt().
      I also added asserts to other code that is using the acl_memroot to
      ensure that it is properly proteced everywhere.
      9e424b62
    • Anel Husakovic's avatar
      MDEV-32168: slave_error_param condition is never checked from the wait_for_slave_param.inc · 18acf97d
      Anel Husakovic authored
      - Record unrecorded tests from `rpl` suite to `engines/funcs` suite
      (done by d8e448ba):
        1) Record test `rpl_row_until` from commit d95fa7e3
        2) Record test `rpl_slave_status` from commit a7d186a1
      
      - Stop only running threads for `engines/funcs.rpl_server_id1.test` that
      is not the same as `rpl.rpl_server_id1.test`
      
      - Reviewer:  <knielsen@knielsen-hq.org>
                   <andrei.elkin@mariadb.com>
      18acf97d
  9. 26 Nov, 2023 1 commit
  10. 25 Nov, 2023 6 commits
  11. 24 Nov, 2023 2 commits