From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from smtp61.i.mail.ru (smtp61.i.mail.ru [217.69.128.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dev.tarantool.org (Postfix) with ESMTPS id D20404765E0 for ; Thu, 24 Dec 2020 01:38:54 +0300 (MSK) References: <6cfd03daba88f817af007598141a84bace2d2a83.1608159414.git.lvasiliev@tarantool.org> From: Leonid Vasiliev Message-ID: <47748402-05ed-e4c3-cf38-67e148fb36e9@tarantool.org> Date: Thu, 24 Dec 2020 01:38:49 +0300 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Subject: Re: [Tarantool-patches] [PATCH v3 2/2] sql: add panic() call in sql_execute() on complete failure List-Id: Tarantool development patches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Vladislav Shpilevoy , tarantool-patches@dev.tarantool.org, imeevma@tarantool.org, korablev@tarantool.org, sergos@tarantool.org Hi! Thank you for the review. On 20.12.2020 19:02, Vladislav Shpilevoy wrote: > Thanks for the patch! > > On 17.12.2020 00:09, Leonid Vasiliev via Tarantool-patches wrote: >> In SQL, on failure sometimes an error sets to the diag, sometimes not. >> And this can dived to situation as in #5537(SEGFAULT). > > dived -> lead. > >> So, let's call `panic()` in that case, because something is very wrong, >> and it is not safe to continue execution. >> >> Follow-up #5537 Updated: In SQL, on failure sometimes an error sets to the diag, sometimes not. And this can lead to situation as in #5537(SEGFAULT). So, let's call `panic()` in that case, because something is very wrong, and it is not safe to continue execution. Follow-up #5537