1. 28 Sep, 2021 1 commit
  2. 27 Sep, 2021 1 commit
  3. 24 Sep, 2021 22 commits
    • Marko Mäkelä's avatar
      Merge 10.4 into 10.5 · 83c4523f
      Marko Mäkelä authored
      83c4523f
    • Marko Mäkelä's avatar
      Merge 10.3 into 10.4 · 69bd2c88
      Marko Mäkelä authored
      69bd2c88
    • Marko Mäkelä's avatar
      Merge 10.2 into 10.3 · d7aa81c8
      Marko Mäkelä authored
      d7aa81c8
    • Marko Mäkelä's avatar
      Revert MDEV-25114 · f59f5c4a
      Marko Mäkelä authored
      Revert 88a4be75 and
      9d97f92f, which had been
      prematurely pushed by accident.
      f59f5c4a
    • Vladislav Vaintroub's avatar
      Fixup "Windows, mysqltest : cleanup, remove dead code USE_CYGWIN" · a5df5aec
      Vladislav Vaintroub authored
      last commit  8221708e removed too much,
      mtr is failing
      a5df5aec
    • Marko Mäkelä's avatar
      Update libmariadb · cfe1a258
      Marko Mäkelä authored
      cfe1a258
    • Vladislav Vaintroub's avatar
      Merge branch '10.3' into 10.4 · 25a5ce36
      Vladislav Vaintroub authored
      25a5ce36
    • Vladislav Vaintroub's avatar
    • Vladislav Vaintroub's avatar
      MDEV-11499 mysqltest, Windows : improve diagnostics if server fails to shutdown · ca7046dc
      Vladislav Vaintroub authored
      Create minidump when server fails to shutdown. If process is being
      debugged, cause a debug break.
      
      Moves some code which is part of safe_kill into mysys, as both safe_kill,
      and mysqltest produce minidumps on different timeouts.
      
      Small cleanup in wait_until_dead() - replace inefficient loop with a single
      wait.
      ca7046dc
    • Julius Goryavsky's avatar
      MDEV-26360: Using hostnames breaks certificate validation · 77b11965
      Julius Goryavsky authored
      Fixed flaws with overly strict or, conversely,
      overly soft verification of certificates in some
      scenarios:
      
      1. Removed the check that the 'commonname' (CN) in the
         certificate matches the 'localhost' value on the side
         of the joiner node, which was performed earlier, even
         if the address was received by the script only as an
         argument (out of the exchange via the Galera protocol) -
         since for the joining node this argument always contains
         its own local address, not the address of the remote host,
         so it is always treated as 'localhost', which is not
         necessarily true (outside of mtr testing);
      2. Removed checking the domain name or IP-address of the
         peer node in the encrypt=2 mode;
      3. Fixed checking of compliance of certificates when
         rsync SST is used;
      4. Added the ability to specify CA not only as a file,
         but also as a path to the directory where the certificates
         are stored. To do this, the user just needs to specify the
         path to this directory as the value ssl-ca or tca parameter,
         ending with the '/' character.
      77b11965
    • Marko Mäkelä's avatar
      Merge 10.4 into 10.5 · 88f38661
      Marko Mäkelä authored
      88f38661
    • Marko Mäkelä's avatar
      Merge 10.3 into 10.4 · d5bd704f
      Marko Mäkelä authored
      d5bd704f
    • Marko Mäkelä's avatar
      MDEV-26672 innodb_undo_log_truncate may reset transaction ID sequence · 4bfdba2e
      Marko Mäkelä authored
      trx_rseg_header_create(): Add a parameter for the value that is
      to be written to TRX_RSEG_MAX_TRX_ID. If we omit this write, then
      the updated test innodb.undo_truncate will fail for the 4k, 8k, 16k
      page sizes. This was broken ever since
      commit 947efe17 (MDEV-15158)
      removed the writes of transaction identifiers to the TRX_SYS page.
      
      srv_do_purge(): Truncate undo tablespaces also during slow shutdown
      (innodb_fast_shutdown=0).
      
      Thanks to Krunal Bauskar for noticing this problem.
      4bfdba2e
    • Alexey Bychko's avatar
      MDEV-26612 Two different ways to start MariaDB service can cause data corruption · 467011bc
      Alexey Bychko authored
      RedHat systems have both files for lsb and init functions.
      Old code was written as if/else, so second file (RedHat-specific) was not processed.
      So, systemd redirect didn't work, because its logic is described in
      RedHat-specific functions file
      467011bc
    • Jan Lindström's avatar
      Revert "MDEV-24978 : SIGABRT in __libc_message" · 47ba5523
      Jan Lindström authored
      This reverts commit 30dea459.
      47ba5523
    • sjaakola's avatar
      MDEV-25114 Crash: WSREP: invalid state ROLLED_BACK (FATAL) · 88a4be75
      sjaakola authored
      This patch is the plan D variant for fixing potetial mutex locking
      order exercised by BF aborting and KILL command execution.
      
      In this approach, KILL command is replicated as TOI operation.
      This guarantees total isolation for the KILL command execution
      in the first node: there is no concurrent replication applying
      and no concurrent DDL executing. Therefore there is no risk of
      BF aborting to happen in parallel with KILL command execution
      either. Potential mutex deadlocks between the different mutex
      access paths with KILL command execution and BF aborting cannot
      therefore happen.
      
      TOI replication is used, in this approach,  purely as means
      to provide isolated KILL command execution in the first node.
      KILL command should not (and must not) be applied in secondary
      nodes. In this patch, we make this sure by skipping KILL
      execution in secondary nodes, in applying phase, where we
      bail out if applier thread is trying to execute KILL command.
      This is effective, but skipping the applying of KILL command
      could happen much earlier as well.
      
      This patch also fixes mutex locking order and unprotected
      THD member accesses on bf aborting case. We try to hold
      THD::LOCK_thd_data during bf aborting. Only case where it
      is not possible is at wsrep_abort_transaction before
      call wsrep_innobase_kill_one_trx where we take InnoDB
      mutexes first and then THD::LOCK_thd_data.
      
      This will also fix possible race condition during
      close_connection and while wsrep is disconnecting
      connections.
      
      Added wsrep_bf_kill_debug test case
      Reviewed-by: default avatarJan Lindström <jan.lindstrom@mariadb.com>
      88a4be75
    • Jan Lindström's avatar
      Revert "MDEV-23328 Server hang due to Galera lock conflict resolution" and · 9d97f92f
      Jan Lindström authored
      Revert "MDEV-24873 galera.galera_as_slave_ctas MTR failed:..."
      
      This reverts commit 29bbcac0 and
      later commit 5ecaf52d.
      9d97f92f
    • Marko Mäkelä's avatar
      Merge 10.4 into 10.5 · 7e2b4232
      Marko Mäkelä authored
      7e2b4232
    • Marko Mäkelä's avatar
      MDEV-26445 innodb_undo_log_truncate is unnecessarily slow · f5794e1d
      Marko Mäkelä authored
      trx_purge_truncate_history(): Do not force a write of the undo tablespace
      that is being truncated. Instead, prevent page writes by acquiring
      an exclusive latch on all dirty pages of the tablespace.
      
      fseg_create(): Relax an assertion that could fail if a dirty undo page
      is being initialized during undo tablespace truncation (and
      trx_purge_truncate_history() already acquired an exclusive latch on it).
      
      fsp_page_create(): If we are truncating a tablespace, try to reuse
      a page that we may have already latched exclusively (because it was
      in buf_pool.flush_list). To some extent, this helps the test
      innodb.undo_truncate,16k to avoid running out of buffer pool.
      
      mtr_t::commit_shrink(): Mark as clean all pages that are outside the
      new bounds of the tablespace, and only add the newly reinitialized pages
      to the buf_pool.flush_list.
      
      buf_page_create(): Do not unnecessarily invoke change buffer merge on
      undo tablespaces.
      
      buf_page_t::clear_oldest_modification(bool temporary): Move some
      assertions to the caller buf_page_write_complete().
      
      innodb.undo_truncate: Use a bigger innodb_buffer_pool_size=24M.
      On my system, it would otherwise hang 1 out of 1547 attempts
      (on the 40th repeat of innodb.undo_truncate,16k).
      Other page sizes were not affected.
      f5794e1d
    • Marko Mäkelä's avatar
      MDEV-26450: Corruption due to innodb_undo_log_truncate · f5fddae3
      Marko Mäkelä authored
      At least since commit 055a3334
      (MDEV-13564) the undo log truncation in InnoDB did not work correctly.
      
      The main issue is that during the execution of
      trx_purge_truncate_history() some pages of the newly truncated
      undo tablespace could be discarded.
      
      This is improved from commit 1cb218c3
      which was applied to earlier-version branches.
      
      fsp_try_extend_data_file(): Apply the peculiar rounding of
      fil_space_t::size_in_header only to the system tablespace,
      whose size can be expressed in megabytes in a configuration parameter.
      Other files may freely grow by a number of pages.
      
      fseg_alloc_free_page_low(): Do allow the extension of undo tablespaces,
      and mention the file name in the error message.
      
      mtr_t::commit_shrink(): Implement crash-safe shrinking of a tablespace:
      (1) durably write the log
      (2) release the page latches of the rebuilt tablespace
      (3) release the mutexes
      (4) truncate the file
      (5) release the tablespace latch
      This is refactored from trx_purge_truncate_history().
      
      log_write_and_flush_prepare(), log_write_and_flush(): New functions
      to durably write log during mtr_t::commit_shrink().
      f5fddae3
    • Marko Mäkelä's avatar
      MDEV-26626 fixup: Do not advance checkpoint during startup · 15efb7ed
      Marko Mäkelä authored
      While the redo log is being resized in srv_start(),
      we must not write checkpoint information to the old log.
      
      Thanks to Matthias Leich for noticing this.
      15efb7ed
    • Jan Lindström's avatar
      Update wsrep-lib submodule · 9c2d9236
      Jan Lindström authored
      9c2d9236
  4. 23 Sep, 2021 2 commits
  5. 22 Sep, 2021 6 commits
    • Marko Mäkelä's avatar
      Merge 10.3 into 10.4 · 9024498e
      Marko Mäkelä authored
      9024498e
    • Marko Mäkelä's avatar
      Merge 10.2 into 10.3 · b46cf33a
      Marko Mäkelä authored
      b46cf33a
    • Marko Mäkelä's avatar
      MDEV-26450: Corruption due to innodb_undo_log_truncate · 1cb218c3
      Marko Mäkelä authored
      At least since commit 055a3334
      (MDEV-13564) the undo log truncation in InnoDB did not work correctly.
      
      The main issue is that during the execution of
      trx_purge_truncate_history() some pages of the newly truncated
      undo tablespace could be discarded.
      
      fsp_try_extend_data_file(): Apply the peculiar rounding of
      fil_space_t::size_in_header only to the system tablespace,
      whose size can be expressed in megabytes in a configuration parameter.
      Other files may freely grow by a number of pages.
      
      fseg_alloc_free_page_low(): Do allow the extension of undo tablespaces,
      and mention the file name in the error message.
      
      mtr_t::commit_shrink(): Implement crash-safe shrinking of a tablespace
      file. First, durably write the log, then shrink the file, and finally
      release the page latches of the rebuilt tablespace. Refactored from
      trx_purge_truncate_history().
      
      log_write_and_flush_prepare(), log_write_and_flush(): New functions
      to durably write log during mtr_t::commit_shrink().
      1cb218c3
    • Marko Mäkelä's avatar
      21d19ed4
    • Daniel Ye's avatar
      MDEV-26545 Spider does not correctly handle UDF and stored function in where conds · 9fc1ef93
      Daniel Ye authored
      - Handle stored function conditions correctly, with the same logic as with UDFs.
      - When running queries on Spider SE, by default, we do not push down WHERE conditions containing usage of UDFs/stored functions to remote data nodes, unless the user demands (by setting spider_use_pushdown_udf).
      - Disable direct update/delete when a udf condition is skipped.
      9fc1ef93
    • Daniel Ye's avatar
      MDEV-26545 Spider does not correctly handle UDF and stored function in where conds · ac1c6738
      Daniel Ye authored
      - Handle stored function conditions correctly, with the same logic as with UDFs.
      - When running queries on Spider SE, by default, we do not push down WHERE conditions containing usage of UDFs/stored functions to remote data nodes, unless the user demands (by setting spider_use_pushdown_udf).
      ac1c6738
  6. 21 Sep, 2021 2 commits
  7. 22 Sep, 2021 2 commits
  8. 21 Sep, 2021 4 commits