* [tarantool-patches] [PATCH 0/3] A set of small SQL fixes @ 2018-11-19 13:47 Vladislav Shpilevoy 2018-11-19 13:47 ` [tarantool-patches] [PATCH 1/3] sql: EXPLAIN through net.box leads to SEGFAULT Vladislav Shpilevoy ` (3 more replies) 0 siblings, 4 replies; 18+ messages in thread From: Vladislav Shpilevoy @ 2018-11-19 13:47 UTC (permalink / raw) To: tarantool-patches; +Cc: korablev A set of small patches fixing some SQL assertions or incorrect behaviour, which appeared during working on 3505 - box.sql.execute() removal. Branch: http://github.com/tarantool/tarantool/tree/imeevma/small-patches Mergen Imeev (3): sql: EXPLAIN through net.box leads to SEGFAULT sql: SELECT from system spaces returns unpacked msgpack. sql: too many autogenerated ids leads to SEGFAULT src/box/execute.c | 44 ++++++++++++++++++++++++++-------------- src/box/lua/net_box.c | 15 +++++++------- src/box/sql/vdbe.c | 8 ++------ src/box/sql/vdbeaux.c | 6 ------ test/sql/iproto.result | 40 ++++++++++++++++++++++++++++++++++++ test/sql/iproto.test.lua | 24 +++++++++++++++++++++- 6 files changed, 102 insertions(+), 35 deletions(-) -- 2.17.2 (Apple Git-113) ^ permalink raw reply [flat|nested] 18+ messages in thread
* [tarantool-patches] [PATCH 1/3] sql: EXPLAIN through net.box leads to SEGFAULT 2018-11-19 13:47 [tarantool-patches] [PATCH 0/3] A set of small SQL fixes Vladislav Shpilevoy @ 2018-11-19 13:47 ` Vladislav Shpilevoy 2018-11-19 17:27 ` [tarantool-patches] " n.pettik 2018-11-19 13:47 ` [tarantool-patches] [PATCH 2/3] sql: SELECT from system spaces returns unpacked msgpack Vladislav Shpilevoy ` (2 subsequent siblings) 3 siblings, 1 reply; 18+ messages in thread From: Vladislav Shpilevoy @ 2018-11-19 13:47 UTC (permalink / raw) To: tarantool-patches; +Cc: korablev, Mergen Imeev From: Mergen Imeev <imeevma@gmail.com> EXPLAIN envokes SEGMENTATION FAULT when being executed through net.box. It happens due to column type of the result of this function being NULL. --- src/box/execute.c | 22 ++++++++++++++-------- src/box/lua/net_box.c | 15 ++++++++------- test/sql/iproto.result | 15 +++++++++++++++ test/sql/iproto.test.lua | 13 ++++++++++++- 4 files changed, 49 insertions(+), 16 deletions(-) diff --git a/src/box/execute.c b/src/box/execute.c index e45044488..5b747cf7f 100644 --- a/src/box/execute.c +++ b/src/box/execute.c @@ -529,9 +529,6 @@ sql_get_description(struct sqlite3_stmt *stmt, struct obuf *out, return -1; for (int i = 0; i < column_count; ++i) { - size_t size = mp_sizeof_map(2) + - mp_sizeof_uint(IPROTO_FIELD_NAME) + - mp_sizeof_uint(IPROTO_FIELD_TYPE); const char *name = sqlite3_column_name(stmt, i); const char *type = sqlite3_column_datatype(stmt, i); /* @@ -540,18 +537,27 @@ sql_get_description(struct sqlite3_stmt *stmt, struct obuf *out, * column_name simply returns them. */ assert(name != NULL); - size += mp_sizeof_str(strlen(name)); - size += mp_sizeof_str(strlen(type)); + size_t size = mp_sizeof_uint(IPROTO_FIELD_NAME) + + mp_sizeof_str(strlen(name)); + if (type != NULL) { + size += mp_sizeof_map(2) + + mp_sizeof_uint(IPROTO_FIELD_TYPE) + + mp_sizeof_str(strlen(type)); + } else { + size += mp_sizeof_map(1); + } char *pos = (char *) obuf_alloc(out, size); if (pos == NULL) { diag_set(OutOfMemory, size, "obuf_alloc", "pos"); return -1; } - pos = mp_encode_map(pos, 2); + pos = mp_encode_map(pos, 1 + (type != NULL)); pos = mp_encode_uint(pos, IPROTO_FIELD_NAME); pos = mp_encode_str(pos, name, strlen(name)); - pos = mp_encode_uint(pos, IPROTO_FIELD_TYPE); - pos = mp_encode_str(pos, type, strlen(type)); + if (type != NULL) { + pos = mp_encode_uint(pos, IPROTO_FIELD_TYPE); + pos = mp_encode_str(pos, type, strlen(type)); + } } return 0; } diff --git a/src/box/lua/net_box.c b/src/box/lua/net_box.c index c7063d9c8..342c6a768 100644 --- a/src/box/lua/net_box.c +++ b/src/box/lua/net_box.c @@ -644,8 +644,7 @@ netbox_decode_metadata(struct lua_State *L, const char **data) lua_createtable(L, count, 0); for (uint32_t i = 0; i < count; ++i) { uint32_t map_size = mp_decode_map(data); - assert(map_size == 2); - (void) map_size; + assert(map_size == 1 || map_size == 2); uint32_t key = mp_decode_uint(data); assert(key == IPROTO_FIELD_NAME); (void) key; @@ -654,11 +653,13 @@ netbox_decode_metadata(struct lua_State *L, const char **data) const char *str = mp_decode_str(data, &len); lua_pushlstring(L, str, len); lua_setfield(L, -2, "name"); - key = mp_decode_uint(data); - assert(key == IPROTO_FIELD_TYPE); - const char *type = mp_decode_str(data, &len); - lua_pushlstring(L, type, len); - lua_setfield(L, -2, "type"); + if (map_size == 2) { + key = mp_decode_uint(data); + assert(key == IPROTO_FIELD_TYPE); + const char *type = mp_decode_str(data, &len); + lua_pushlstring(L, type, len); + lua_setfield(L, -2, "type"); + } lua_rawseti(L, -2, i + 1); } } diff --git a/test/sql/iproto.result b/test/sql/iproto.result index d077ee861..31e5d2e75 100644 --- a/test/sql/iproto.result +++ b/test/sql/iproto.result @@ -773,6 +773,21 @@ cn:execute('drop table test') cn:close() --- ... +-- +-- EXPLAIN could lead to segfault because it does not send column +-- data type, but looks like DQL. Netbox had been trying to decode +-- type for any DQL. +-- +cn = remote.connect(box.cfg.listen) +--- +... +-- Segmentation fault when EXPLAIN executed using net.box. +_ = cn:execute("EXPLAIN SELECT 1;") +--- +... +cn:close() +--- +... box.schema.user.revoke('guest', 'read,write,execute', 'universe') --- ... diff --git a/test/sql/iproto.test.lua b/test/sql/iproto.test.lua index 1470edad7..a0f0f15ee 100644 --- a/test/sql/iproto.test.lua +++ b/test/sql/iproto.test.lua @@ -247,10 +247,21 @@ cn:execute('drop table test') cn:close() +-- +-- EXPLAIN could lead to segfault because it does not send column +-- data type, but looks like DQL. Netbox had been trying to decode +-- type for any DQL. +-- +cn = remote.connect(box.cfg.listen) + +-- Segmentation fault when EXPLAIN executed using net.box. +_ = cn:execute("EXPLAIN SELECT 1;") + +cn:close() + box.schema.user.revoke('guest', 'read,write,execute', 'universe') box.schema.user.revoke('guest', 'create', 'space') space = nil -- Cleanup xlog box.snapshot() - -- 2.17.2 (Apple Git-113) ^ permalink raw reply [flat|nested] 18+ messages in thread
* [tarantool-patches] Re: [PATCH 1/3] sql: EXPLAIN through net.box leads to SEGFAULT 2018-11-19 13:47 ` [tarantool-patches] [PATCH 1/3] sql: EXPLAIN through net.box leads to SEGFAULT Vladislav Shpilevoy @ 2018-11-19 17:27 ` n.pettik 2018-11-22 18:08 ` Imeev Mergen 0 siblings, 1 reply; 18+ messages in thread From: n.pettik @ 2018-11-19 17:27 UTC (permalink / raw) To: tarantool-patches; +Cc: Imeev Mergen, Vladislav Shpilevoy > EXPLAIN envokes SEGMENTATION FAULT when being executed through Typo: invokes. > net.box. It happens due to column type of the result of this > function being NULL. I’ve checked and not only EXPLAIN results, but also EXPLAIN QUERY PLAN, several pragmas (for instance, pragma table_info()) etc. So, initially problem was not only in EXPLAIN statement. Please exposed commit message and add tests on other cases. Also, why did you decide to avoid sending type at all, instead of sending UNKNOWN for example? ^ permalink raw reply [flat|nested] 18+ messages in thread
* [tarantool-patches] Re: [PATCH 1/3] sql: EXPLAIN through net.box leads to SEGFAULT 2018-11-19 17:27 ` [tarantool-patches] " n.pettik @ 2018-11-22 18:08 ` Imeev Mergen 2018-11-22 18:31 ` Vladislav Shpilevoy 0 siblings, 1 reply; 18+ messages in thread From: Imeev Mergen @ 2018-11-22 18:08 UTC (permalink / raw) To: n.pettik, tarantool-patches; +Cc: Vladislav Shpilevoy [-- Attachment #1: Type: text/plain, Size: 9885 bytes --] Hi! Thank you for review! Diff between versions and new patch below. On 11/19/18 8:27 PM, n.pettik wrote: >> EXPLAIN envokes SEGMENTATION FAULT when being executed through > Typo: invokes. > >> net.box. It happens due to column type of the result of this >> function being NULL. > I’ve checked and not only EXPLAIN results, but also EXPLAIN QUERY PLAN, > several pragmas (for instance, pragma table_info()) etc. So, initially problem > was not only in EXPLAIN statement. Please exposed commit message and > add tests on other cases. > > Also, why did you decide to avoid sending type at all, instead of sending > UNKNOWN for example? *Diff between versions:* diff --git a/src/box/execute.c b/src/box/execute.c index 5b747cf..cd809f8 100644 --- a/src/box/execute.c +++ b/src/box/execute.c @@ -529,6 +529,9 @@ sql_get_description(struct sqlite3_stmt *stmt, struct obuf *out, return -1; for (int i = 0; i < column_count; ++i) { + size_t size = mp_sizeof_map(2) + + mp_sizeof_uint(IPROTO_FIELD_NAME) + + mp_sizeof_uint(IPROTO_FIELD_TYPE); const char *name = sqlite3_column_name(stmt, i); const char *type = sqlite3_column_datatype(stmt, i); /* @@ -537,27 +540,20 @@ sql_get_description(struct sqlite3_stmt *stmt, struct obuf *out, * column_name simply returns them. */ assert(name != NULL); - size_t size = mp_sizeof_uint(IPROTO_FIELD_NAME) + - mp_sizeof_str(strlen(name)); - if (type != NULL) { - size += mp_sizeof_map(2) + - mp_sizeof_uint(IPROTO_FIELD_TYPE) + - mp_sizeof_str(strlen(type)); - } else { - size += mp_sizeof_map(1); - } + if (type == NULL) + type = "UNKNOWN"; + size += mp_sizeof_str(strlen(name)); + size += mp_sizeof_str(strlen(type)); char *pos = (char *) obuf_alloc(out, size); if (pos == NULL) { diag_set(OutOfMemory, size, "obuf_alloc", "pos"); return -1; } - pos = mp_encode_map(pos, 1 + (type != NULL)); + pos = mp_encode_map(pos, 2); pos = mp_encode_uint(pos, IPROTO_FIELD_NAME); pos = mp_encode_str(pos, name, strlen(name)); - if (type != NULL) { - pos = mp_encode_uint(pos, IPROTO_FIELD_TYPE); - pos = mp_encode_str(pos, type, strlen(type)); - } + pos = mp_encode_uint(pos, IPROTO_FIELD_TYPE); + pos = mp_encode_str(pos, type, strlen(type)); } return 0; } diff --git a/src/box/lua/net_box.c b/src/box/lua/net_box.c index 342c6a7..c7063d9 100644 --- a/src/box/lua/net_box.c +++ b/src/box/lua/net_box.c @@ -644,7 +644,8 @@ netbox_decode_metadata(struct lua_State *L, const char **data) lua_createtable(L, count, 0); for (uint32_t i = 0; i < count; ++i) { uint32_t map_size = mp_decode_map(data); - assert(map_size == 1 || map_size == 2); + assert(map_size == 2); + (void) map_size; uint32_t key = mp_decode_uint(data); assert(key == IPROTO_FIELD_NAME); (void) key; @@ -653,13 +654,11 @@ netbox_decode_metadata(struct lua_State *L, const char **data) const char *str = mp_decode_str(data, &len); lua_pushlstring(L, str, len); lua_setfield(L, -2, "name"); - if (map_size == 2) { - key = mp_decode_uint(data); - assert(key == IPROTO_FIELD_TYPE); - const char *type = mp_decode_str(data, &len); - lua_pushlstring(L, type, len); - lua_setfield(L, -2, "type"); - } + key = mp_decode_uint(data); + assert(key == IPROTO_FIELD_TYPE); + const char *type = mp_decode_str(data, &len); + lua_pushlstring(L, type, len); + lua_setfield(L, -2, "type"); lua_rawseti(L, -2, i + 1); } } diff --git a/test/sql/iproto.result b/test/sql/iproto.result index 31e5d2e..f229427 100644 --- a/test/sql/iproto.result +++ b/test/sql/iproto.result @@ -774,9 +774,9 @@ cn:close() --- ... -- --- EXPLAIN could lead to segfault because it does not send column --- data type, but looks like DQL. Netbox had been trying to decode --- type for any DQL. +-- Some commands, e.g. EXPLAIN, could lead to segfault because it +-- does not send column data type, but looks like DQL. Netbox had +-- been trying to decode type for any DQL. -- cn = remote.connect(box.cfg.listen) --- @@ -785,6 +785,32 @@ cn = remote.connect(box.cfg.listen) _ = cn:execute("EXPLAIN SELECT 1;") --- ... +-- Segmentation fault when PRAGMA TABLE_INFO() executed using +-- net.box. +box.sql.execute('CREATE TABLE test (id INT PRIMARY KEY)') +--- +... +cn:execute("PRAGMA TABLE_INFO(test);") +--- +- metadata: + - name: cid + type: UNKNOWN + - name: name + type: UNKNOWN + - name: type + type: UNKNOWN + - name: notnull + type: UNKNOWN + - name: dflt_value + type: UNKNOWN + - name: pk + type: UNKNOWN + rows: + - [0, 'ID', 'integer', 1, null, 1] +... +box.sql.execute('DROP TABLE test') +--- +... cn:close() --- ... diff --git a/test/sql/iproto.test.lua b/test/sql/iproto.test.lua index a0f0f15..9bcc7ef 100644 --- a/test/sql/iproto.test.lua +++ b/test/sql/iproto.test.lua @@ -248,15 +248,21 @@ cn:execute('drop table test') cn:close() -- --- EXPLAIN could lead to segfault because it does not send column --- data type, but looks like DQL. Netbox had been trying to decode --- type for any DQL. +-- Some commands, e.g. EXPLAIN, could lead to segfault because it +-- does not send column data type, but looks like DQL. Netbox had +-- been trying to decode type for any DQL. -- cn = remote.connect(box.cfg.listen) -- Segmentation fault when EXPLAIN executed using net.box. _ = cn:execute("EXPLAIN SELECT 1;") +-- Segmentation fault when PRAGMA TABLE_INFO() executed using +-- net.box. +box.sql.execute('CREATE TABLE test (id INT PRIMARY KEY)') +cn:execute("PRAGMA TABLE_INFO(test);") +box.sql.execute('DROP TABLE test') + cn:close() box.schema.user.revoke('guest', 'read,write,execute', 'universe') *New version:* commit 29dde0365922bfcec0d159b36c6454854adf34f7 Author: Mergen Imeev <imeevma@gmail.com> Date: Fri Nov 16 13:34:46 2018 +0300 sql: Print column type even if it is NULL Some commands, e.g. EXPLAIN, invokes SEGMENTATION FAULT when being executed through net.box. It happens due to column type of the result of this function being NULL. This patch adds checks for received column type. diff --git a/src/box/execute.c b/src/box/execute.c index e450444..cd809f8 100644 --- a/src/box/execute.c +++ b/src/box/execute.c @@ -540,6 +540,8 @@ sql_get_description(struct sqlite3_stmt *stmt, struct obuf *out, * column_name simply returns them. */ assert(name != NULL); + if (type == NULL) + type = "UNKNOWN"; size += mp_sizeof_str(strlen(name)); size += mp_sizeof_str(strlen(type)); char *pos = (char *) obuf_alloc(out, size); diff --git a/test/sql/iproto.result b/test/sql/iproto.result index d077ee8..f229427 100644 --- a/test/sql/iproto.result +++ b/test/sql/iproto.result @@ -773,6 +773,47 @@ cn:execute('drop table test') cn:close() --- ... +-- +-- Some commands, e.g. EXPLAIN, could lead to segfault because it +-- does not send column data type, but looks like DQL. Netbox had +-- been trying to decode type for any DQL. +-- +cn = remote.connect(box.cfg.listen) +--- +... +-- Segmentation fault when EXPLAIN executed using net.box. +_ = cn:execute("EXPLAIN SELECT 1;") +--- +... +-- Segmentation fault when PRAGMA TABLE_INFO() executed using +-- net.box. +box.sql.execute('CREATE TABLE test (id INT PRIMARY KEY)') +--- +... +cn:execute("PRAGMA TABLE_INFO(test);") +--- +- metadata: + - name: cid + type: UNKNOWN + - name: name + type: UNKNOWN + - name: type + type: UNKNOWN + - name: notnull + type: UNKNOWN + - name: dflt_value + type: UNKNOWN + - name: pk + type: UNKNOWN + rows: + - [0, 'ID', 'integer', 1, null, 1] +... +box.sql.execute('DROP TABLE test') +--- +... +cn:close() +--- +... box.schema.user.revoke('guest', 'read,write,execute', 'universe') --- ... diff --git a/test/sql/iproto.test.lua b/test/sql/iproto.test.lua index 1470eda..9bcc7ef 100644 --- a/test/sql/iproto.test.lua +++ b/test/sql/iproto.test.lua @@ -247,10 +247,27 @@ cn:execute('drop table test') cn:close() +-- +-- Some commands, e.g. EXPLAIN, could lead to segfault because it +-- does not send column data type, but looks like DQL. Netbox had +-- been trying to decode type for any DQL. +-- +cn = remote.connect(box.cfg.listen) + +-- Segmentation fault when EXPLAIN executed using net.box. +_ = cn:execute("EXPLAIN SELECT 1;") + +-- Segmentation fault when PRAGMA TABLE_INFO() executed using +-- net.box. +box.sql.execute('CREATE TABLE test (id INT PRIMARY KEY)') +cn:execute("PRAGMA TABLE_INFO(test);") +box.sql.execute('DROP TABLE test') + +cn:close() + box.schema.user.revoke('guest', 'read,write,execute', 'universe') box.schema.user.revoke('guest', 'create', 'space') space = nil -- Cleanup xlog box.snapshot() - [-- Attachment #2: Type: text/html, Size: 13100 bytes --] ^ permalink raw reply [flat|nested] 18+ messages in thread
* [tarantool-patches] Re: [PATCH 1/3] sql: EXPLAIN through net.box leads to SEGFAULT 2018-11-22 18:08 ` Imeev Mergen @ 2018-11-22 18:31 ` Vladislav Shpilevoy 2018-11-22 20:55 ` [tarantool-patches] Re[2]: " Мерген Имеев 0 siblings, 1 reply; 18+ messages in thread From: Vladislav Shpilevoy @ 2018-11-22 18:31 UTC (permalink / raw) To: Imeev Mergen, n.pettik, tarantool-patches It was just a question, "why did you decide to do not send type". It was not necessary to start sending UNKNOWN. I think, that unknown type should be sent never. On 22/11/2018 21:08, Imeev Mergen wrote: > Hi! Thank you for review! Diff between versions and new patch > below. > > On 11/19/18 8:27 PM, n.pettik wrote: > >>> EXPLAIN envokes SEGMENTATION FAULT when being executed through >> Typo: invokes. >> >>> net.box. It happens due to column type of the result of this >>> function being NULL. >> I’ve checked and not only EXPLAIN results, but also EXPLAIN QUERY PLAN, >> several pragmas (for instance, pragma table_info()) etc. So, initially problem >> was not only in EXPLAIN statement. Please exposed commit message and >> add tests on other cases. >> >> Also, why did you decide to avoid sending type at all, instead of sending >> UNKNOWN for example? > > *Diff between versions:* > > diff --git a/src/box/execute.c b/src/box/execute.c > index 5b747cf..cd809f8 100644 > --- a/src/box/execute.c > +++ b/src/box/execute.c > @@ -529,6 +529,9 @@ sql_get_description(struct sqlite3_stmt *stmt, struct obuf *out, > return -1; > > for (int i = 0; i < column_count; ++i) { > + size_t size = mp_sizeof_map(2) + > + mp_sizeof_uint(IPROTO_FIELD_NAME) + > + mp_sizeof_uint(IPROTO_FIELD_TYPE); > const char *name = sqlite3_column_name(stmt, i); > const char *type = sqlite3_column_datatype(stmt, i); > /* > @@ -537,27 +540,20 @@ sql_get_description(struct sqlite3_stmt *stmt, struct obuf *out, > * column_name simply returns them. > */ > assert(name != NULL); > - size_t size = mp_sizeof_uint(IPROTO_FIELD_NAME) + > - mp_sizeof_str(strlen(name)); > - if (type != NULL) { > - size += mp_sizeof_map(2) + > - mp_sizeof_uint(IPROTO_FIELD_TYPE) + > - mp_sizeof_str(strlen(type)); > - } else { > - size += mp_sizeof_map(1); > - } > + if (type == NULL) > + type = "UNKNOWN"; > + size += mp_sizeof_str(strlen(name)); > + size += mp_sizeof_str(strlen(type)); > char *pos = (char *) obuf_alloc(out, size); > if (pos == NULL) { > diag_set(OutOfMemory, size, "obuf_alloc", "pos"); > return -1; > } > - pos = mp_encode_map(pos, 1 + (type != NULL)); > + pos = mp_encode_map(pos, 2); > pos = mp_encode_uint(pos, IPROTO_FIELD_NAME); > pos = mp_encode_str(pos, name, strlen(name)); > - if (type != NULL) { > - pos = mp_encode_uint(pos, IPROTO_FIELD_TYPE); > - pos = mp_encode_str(pos, type, strlen(type)); > - } > + pos = mp_encode_uint(pos, IPROTO_FIELD_TYPE); > + pos = mp_encode_str(pos, type, strlen(type)); > } > return 0; > } > diff --git a/src/box/lua/net_box.c b/src/box/lua/net_box.c > index 342c6a7..c7063d9 100644 > --- a/src/box/lua/net_box.c > +++ b/src/box/lua/net_box.c > @@ -644,7 +644,8 @@ netbox_decode_metadata(struct lua_State *L, const char **data) > lua_createtable(L, count, 0); > for (uint32_t i = 0; i < count; ++i) { > uint32_t map_size = mp_decode_map(data); > - assert(map_size == 1 || map_size == 2); > + assert(map_size == 2); > + (void) map_size; > uint32_t key = mp_decode_uint(data); > assert(key == IPROTO_FIELD_NAME); > (void) key; > @@ -653,13 +654,11 @@ netbox_decode_metadata(struct lua_State *L, const char **data) > const char *str = mp_decode_str(data, &len); > lua_pushlstring(L, str, len); > lua_setfield(L, -2, "name"); > - if (map_size == 2) { > - key = mp_decode_uint(data); > - assert(key == IPROTO_FIELD_TYPE); > - const char *type = mp_decode_str(data, &len); > - lua_pushlstring(L, type, len); > - lua_setfield(L, -2, "type"); > - } > + key = mp_decode_uint(data); > + assert(key == IPROTO_FIELD_TYPE); > + const char *type = mp_decode_str(data, &len); > + lua_pushlstring(L, type, len); > + lua_setfield(L, -2, "type"); > lua_rawseti(L, -2, i + 1); > } > } > diff --git a/test/sql/iproto.result b/test/sql/iproto.result > index 31e5d2e..f229427 100644 > --- a/test/sql/iproto.result > +++ b/test/sql/iproto.result > @@ -774,9 +774,9 @@ cn:close() > --- > ... > -- > --- EXPLAIN could lead to segfault because it does not send column > --- data type, but looks like DQL. Netbox had been trying to decode > --- type for any DQL. > +-- Some commands, e.g. EXPLAIN, could lead to segfault because it > +-- does not send column data type, but looks like DQL. Netbox had > +-- been trying to decode type for any DQL. > -- > cn = remote.connect(box.cfg.listen) > --- > @@ -785,6 +785,32 @@ cn = remote.connect(box.cfg.listen) > _ = cn:execute("EXPLAIN SELECT 1;") > --- > ... > +-- Segmentation fault when PRAGMA TABLE_INFO() executed using > +-- net.box. > +box.sql.execute('CREATE TABLE test (id INT PRIMARY KEY)') > +--- > +... > +cn:execute("PRAGMA TABLE_INFO(test);") > +--- > +- metadata: > + - name: cid > + type: UNKNOWN > + - name: name > + type: UNKNOWN > + - name: type > + type: UNKNOWN > + - name: notnull > + type: UNKNOWN > + - name: dflt_value > + type: UNKNOWN > + - name: pk > + type: UNKNOWN > + rows: > + - [0, 'ID', 'integer', 1, null, 1] > +... > +box.sql.execute('DROP TABLE test') > +--- > +... > cn:close() > --- > ... > diff --git a/test/sql/iproto.test.lua b/test/sql/iproto.test.lua > index a0f0f15..9bcc7ef 100644 > --- a/test/sql/iproto.test.lua > +++ b/test/sql/iproto.test.lua > @@ -248,15 +248,21 @@ cn:execute('drop table test') > cn:close() > > -- > --- EXPLAIN could lead to segfault because it does not send column > --- data type, but looks like DQL. Netbox had been trying to decode > --- type for any DQL. > +-- Some commands, e.g. EXPLAIN, could lead to segfault because it > +-- does not send column data type, but looks like DQL. Netbox had > +-- been trying to decode type for any DQL. > -- > cn = remote.connect(box.cfg.listen) > > -- Segmentation fault when EXPLAIN executed using net.box. > _ = cn:execute("EXPLAIN SELECT 1;") > > +-- Segmentation fault when PRAGMA TABLE_INFO() executed using > +-- net.box. > +box.sql.execute('CREATE TABLE test (id INT PRIMARY KEY)') > +cn:execute("PRAGMA TABLE_INFO(test);") > +box.sql.execute('DROP TABLE test') > + > cn:close() > > box.schema.user.revoke('guest', 'read,write,execute', 'universe') > > > *New version:* > > commit 29dde0365922bfcec0d159b36c6454854adf34f7 > Author: Mergen Imeev <imeevma@gmail.com> > Date: Fri Nov 16 13:34:46 2018 +0300 > > sql: Print column type even if it is NULL > > Some commands, e.g. EXPLAIN, invokes SEGMENTATION FAULT when being > executed through net.box. It happens due to column type of the > result of this function being NULL. This patch adds checks for > received column type. > > diff --git a/src/box/execute.c b/src/box/execute.c > index e450444..cd809f8 100644 > --- a/src/box/execute.c > +++ b/src/box/execute.c > @@ -540,6 +540,8 @@ sql_get_description(struct sqlite3_stmt *stmt, struct obuf *out, > * column_name simply returns them. > */ > assert(name != NULL); > + if (type == NULL) > + type = "UNKNOWN"; > size += mp_sizeof_str(strlen(name)); > size += mp_sizeof_str(strlen(type)); > char *pos = (char *) obuf_alloc(out, size); > diff --git a/test/sql/iproto.result b/test/sql/iproto.result > index d077ee8..f229427 100644 > --- a/test/sql/iproto.result > +++ b/test/sql/iproto.result > @@ -773,6 +773,47 @@ cn:execute('drop table test') > cn:close() > --- > ... > +-- > +-- Some commands, e.g. EXPLAIN, could lead to segfault because it > +-- does not send column data type, but looks like DQL. Netbox had > +-- been trying to decode type for any DQL. > +-- > +cn = remote.connect(box.cfg.listen) > +--- > +... > +-- Segmentation fault when EXPLAIN executed using net.box. > +_ = cn:execute("EXPLAIN SELECT 1;") > +--- > +... > +-- Segmentation fault when PRAGMA TABLE_INFO() executed using > +-- net.box. > +box.sql.execute('CREATE TABLE test (id INT PRIMARY KEY)') > +--- > +... > +cn:execute("PRAGMA TABLE_INFO(test);") > +--- > +- metadata: > + - name: cid > + type: UNKNOWN > + - name: name > + type: UNKNOWN > + - name: type > + type: UNKNOWN > + - name: notnull > + type: UNKNOWN > + - name: dflt_value > + type: UNKNOWN > + - name: pk > + type: UNKNOWN > + rows: > + - [0, 'ID', 'integer', 1, null, 1] > +... > +box.sql.execute('DROP TABLE test') > +--- > +... > +cn:close() > +--- > +... > box.schema.user.revoke('guest', 'read,write,execute', 'universe') > --- > ... > diff --git a/test/sql/iproto.test.lua b/test/sql/iproto.test.lua > index 1470eda..9bcc7ef 100644 > --- a/test/sql/iproto.test.lua > +++ b/test/sql/iproto.test.lua > @@ -247,10 +247,27 @@ cn:execute('drop table test') > > cn:close() > > +-- > +-- Some commands, e.g. EXPLAIN, could lead to segfault because it > +-- does not send column data type, but looks like DQL. Netbox had > +-- been trying to decode type for any DQL. > +-- > +cn = remote.connect(box.cfg.listen) > + > +-- Segmentation fault when EXPLAIN executed using net.box. > +_ = cn:execute("EXPLAIN SELECT 1;") > + > +-- Segmentation fault when PRAGMA TABLE_INFO() executed using > +-- net.box. > +box.sql.execute('CREATE TABLE test (id INT PRIMARY KEY)') > +cn:execute("PRAGMA TABLE_INFO(test);") > +box.sql.execute('DROP TABLE test') > + > +cn:close() > + > box.schema.user.revoke('guest', 'read,write,execute', 'universe') > box.schema.user.revoke('guest', 'create', 'space') > space = nil > > -- Cleanup xlog > box.snapshot() > - > ^ permalink raw reply [flat|nested] 18+ messages in thread
* [tarantool-patches] Re[2]: [tarantool-patches] Re: [PATCH 1/3] sql: EXPLAIN through net.box leads to SEGFAULT 2018-11-22 18:31 ` Vladislav Shpilevoy @ 2018-11-22 20:55 ` Мерген Имеев 2018-11-23 6:04 ` [tarantool-patches] Re: Re[2]: " Kirill Yukhin 2018-11-28 12:36 ` [tarantool-patches] " n.pettik 0 siblings, 2 replies; 18+ messages in thread From: Мерген Имеев @ 2018-11-22 20:55 UTC (permalink / raw) To: Vladislav Shpilevoy; +Cc: n.pettik, tarantool-patches [-- Attachment #1: Type: text/plain, Size: 11493 bytes --] After discussion we decided that this patch will serve us part of patch-set that should close newly filed bug: https://github.com/tarantool/tarantool/issues/3832 The main Idea behind this ticket is that any statement should return column type for when it returns column name. And this ticket allow us to find an error without falling into SEGMENTATION FAULT or returning less metadata. Четверг, 22 ноября 2018, 21:31 +03:00 от Vladislav Shpilevoy <v.shpilevoy@tarantool.org>: > >It was just a question, "why did you decide to do not >send type". It was not necessary to start sending UNKNOWN. I >think, that unknown type should be sent never. > >On 22/11/2018 21:08, Imeev Mergen wrote: >> Hi! Thank you for review! Diff between versions and new patch >> below. >> >> On 11/19/18 8:27 PM, n.pettik wrote: >> >>>> EXPLAIN envokes SEGMENTATION FAULT when being executed through >>> Typo: invokes. >>> >>>> net.box. It happens due to column type of the result of this >>>> function being NULL. >>> I’ve checked and not only EXPLAIN results, but also EXPLAIN QUERY PLAN, >>> several pragmas (for instance, pragma table_info()) etc. So, initially problem >>> was not only in EXPLAIN statement. Please exposed commit message and >>> add tests on other cases. >>> >>> Also, why did you decide to avoid sending type at all, instead of sending >>> UNKNOWN for example? >> >> *Diff between versions:* >> >> diff --git a/src/box/execute.c b/src/box/execute.c >> index 5b747cf..cd809f8 100644 >> --- a/src/box/execute.c >> +++ b/src/box/execute.c >> @@ -529,6 +529,9 @@ sql_get_description(struct sqlite3_stmt *stmt, struct obuf *out, >> return -1; >> >> for (int i = 0; i < column_count; ++i) { >> + size_t size = mp_sizeof_map(2) + >> + mp_sizeof_uint(IPROTO_FIELD_NAME) + >> + mp_sizeof_uint(IPROTO_FIELD_TYPE); >> const char *name = sqlite3_column_name(stmt, i); >> const char *type = sqlite3_column_datatype(stmt, i); >> /* >> @@ -537,27 +540,20 @@ sql_get_description(struct sqlite3_stmt *stmt, struct obuf *out, >> * column_name simply returns them. >> */ >> assert(name != NULL); >> - size_t size = mp_sizeof_uint(IPROTO_FIELD_NAME) + >> - mp_sizeof_str(strlen(name)); >> - if (type != NULL) { >> - size += mp_sizeof_map(2) + >> - mp_sizeof_uint(IPROTO_FIELD_TYPE) + >> - mp_sizeof_str(strlen(type)); >> - } else { >> - size += mp_sizeof_map(1); >> - } >> + if (type == NULL) >> + type = "UNKNOWN"; >> + size += mp_sizeof_str(strlen(name)); >> + size += mp_sizeof_str(strlen(type)); >> char *pos = (char *) obuf_alloc(out, size); >> if (pos == NULL) { >> diag_set(OutOfMemory, size, "obuf_alloc", "pos"); >> return -1; >> } >> - pos = mp_encode_map(pos, 1 + (type != NULL)); >> + pos = mp_encode_map(pos, 2); >> pos = mp_encode_uint(pos, IPROTO_FIELD_NAME); >> pos = mp_encode_str(pos, name, strlen(name)); >> - if (type != NULL) { >> - pos = mp_encode_uint(pos, IPROTO_FIELD_TYPE); >> - pos = mp_encode_str(pos, type, strlen(type)); >> - } >> + pos = mp_encode_uint(pos, IPROTO_FIELD_TYPE); >> + pos = mp_encode_str(pos, type, strlen(type)); >> } >> return 0; >> } >> diff --git a/src/box/lua/net_box.c b/src/box/lua/net_box.c >> index 342c6a7..c7063d9 100644 >> --- a/src/box/lua/net_box.c >> +++ b/src/box/lua/net_box.c >> @@ -644,7 +644,8 @@ netbox_decode_metadata(struct lua_State *L, const char **data) >> lua_createtable(L, count, 0); >> for (uint32_t i = 0; i < count; ++i) { >> uint32_t map_size = mp_decode_map(data); >> - assert(map_size == 1 || map_size == 2); >> + assert(map_size == 2); >> + (void) map_size; >> uint32_t key = mp_decode_uint(data); >> assert(key == IPROTO_FIELD_NAME); >> (void) key; >> @@ -653,13 +654,11 @@ netbox_decode_metadata(struct lua_State *L, const char **data) >> const char *str = mp_decode_str(data, &len); >> lua_pushlstring(L, str, len); >> lua_setfield(L, -2, "name"); >> - if (map_size == 2) { >> - key = mp_decode_uint(data); >> - assert(key == IPROTO_FIELD_TYPE); >> - const char *type = mp_decode_str(data, &len); >> - lua_pushlstring(L, type, len); >> - lua_setfield(L, -2, "type"); >> - } >> + key = mp_decode_uint(data); >> + assert(key == IPROTO_FIELD_TYPE); >> + const char *type = mp_decode_str(data, &len); >> + lua_pushlstring(L, type, len); >> + lua_setfield(L, -2, "type"); >> lua_rawseti(L, -2, i + 1); >> } >> } >> diff --git a/test/sql/iproto.result b/test/sql/iproto.result >> index 31e5d2e..f229427 100644 >> --- a/test/sql/iproto.result >> +++ b/test/sql/iproto.result >> @@ -774,9 +774,9 @@ cn:close() >> --- >> ... >> -- >> --- EXPLAIN could lead to segfault because it does not send column >> --- data type, but looks like DQL. Netbox had been trying to decode >> --- type for any DQL. >> +-- Some commands, e.g. EXPLAIN, could lead to segfault because it >> +-- does not send column data type, but looks like DQL. Netbox had >> +-- been trying to decode type for any DQL. >> -- >> cn = remote.connect(box.cfg.listen) >> --- >> @@ -785,6 +785,32 @@ cn = remote.connect(box.cfg.listen) >> _ = cn:execute("EXPLAIN SELECT 1;") >> --- >> ... >> +-- Segmentation fault when PRAGMA TABLE_INFO() executed using >> +-- net.box. >> +box.sql.execute('CREATE TABLE test (id INT PRIMARY KEY)') >> +--- >> +... >> +cn:execute("PRAGMA TABLE_INFO(test);") >> +--- >> +- metadata: >> + - name: cid >> + type: UNKNOWN >> + - name: name >> + type: UNKNOWN >> + - name: type >> + type: UNKNOWN >> + - name: notnull >> + type: UNKNOWN >> + - name: dflt_value >> + type: UNKNOWN >> + - name: pk >> + type: UNKNOWN >> + rows: >> + - [0, 'ID', 'integer', 1, null, 1] >> +... >> +box.sql.execute('DROP TABLE test') >> +--- >> +... >> cn:close() >> --- >> ... >> diff --git a/test/sql/iproto.test.lua b/test/sql/iproto.test.lua >> index a0f0f15..9bcc7ef 100644 >> --- a/test/sql/iproto.test.lua >> +++ b/test/sql/iproto.test.lua >> @@ -248,15 +248,21 @@ cn:execute('drop table test') >> cn:close() >> >> -- >> --- EXPLAIN could lead to segfault because it does not send column >> --- data type, but looks like DQL. Netbox had been trying to decode >> --- type for any DQL. >> +-- Some commands, e.g. EXPLAIN, could lead to segfault because it >> +-- does not send column data type, but looks like DQL. Netbox had >> +-- been trying to decode type for any DQL. >> -- >> cn = remote.connect(box.cfg.listen) >> >> -- Segmentation fault when EXPLAIN executed using net.box. >> _ = cn:execute("EXPLAIN SELECT 1;") >> >> +-- Segmentation fault when PRAGMA TABLE_INFO() executed using >> +-- net.box. >> +box.sql.execute('CREATE TABLE test (id INT PRIMARY KEY)') >> +cn:execute("PRAGMA TABLE_INFO(test);") >> +box.sql.execute('DROP TABLE test') >> + >> cn:close() >> >> box.schema.user.revoke('guest', 'read,write,execute', 'universe') >> >> >> *New version:* >> >> commit 29dde0365922bfcec0d159b36c6454854adf34f7 >> Author: Mergen Imeev < imeevma@gmail.com > >> Date: Fri Nov 16 13:34:46 2018 +0300 >> >> sql: Print column type even if it is NULL >> >> Some commands, e.g. EXPLAIN, invokes SEGMENTATION FAULT when being >> executed through net.box. It happens due to column type of the >> result of this function being NULL. This patch adds checks for >> received column type. >> >> diff --git a/src/box/execute.c b/src/box/execute.c >> index e450444..cd809f8 100644 >> --- a/src/box/execute.c >> +++ b/src/box/execute.c >> @@ -540,6 +540,8 @@ sql_get_description(struct sqlite3_stmt *stmt, struct obuf *out, >> * column_name simply returns them. >> */ >> assert(name != NULL); >> + if (type == NULL) >> + type = "UNKNOWN"; >> size += mp_sizeof_str(strlen(name)); >> size += mp_sizeof_str(strlen(type)); >> char *pos = (char *) obuf_alloc(out, size); >> diff --git a/test/sql/iproto.result b/test/sql/iproto.result >> index d077ee8..f229427 100644 >> --- a/test/sql/iproto.result >> +++ b/test/sql/iproto.result >> @@ -773,6 +773,47 @@ cn:execute('drop table test') >> cn:close() >> --- >> ... >> +-- >> +-- Some commands, e.g. EXPLAIN, could lead to segfault because it >> +-- does not send column data type, but looks like DQL. Netbox had >> +-- been trying to decode type for any DQL. >> +-- >> +cn = remote.connect(box.cfg.listen) >> +--- >> +... >> +-- Segmentation fault when EXPLAIN executed using net.box. >> +_ = cn:execute("EXPLAIN SELECT 1;") >> +--- >> +... >> +-- Segmentation fault when PRAGMA TABLE_INFO() executed using >> +-- net.box. >> +box.sql.execute('CREATE TABLE test (id INT PRIMARY KEY)') >> +--- >> +... >> +cn:execute("PRAGMA TABLE_INFO(test);") >> +--- >> +- metadata: >> + - name: cid >> + type: UNKNOWN >> + - name: name >> + type: UNKNOWN >> + - name: type >> + type: UNKNOWN >> + - name: notnull >> + type: UNKNOWN >> + - name: dflt_value >> + type: UNKNOWN >> + - name: pk >> + type: UNKNOWN >> + rows: >> + - [0, 'ID', 'integer', 1, null, 1] >> +... >> +box.sql.execute('DROP TABLE test') >> +--- >> +... >> +cn:close() >> +--- >> +... >> box.schema.user.revoke('guest', 'read,write,execute', 'universe') >> --- >> ... >> diff --git a/test/sql/iproto.test.lua b/test/sql/iproto.test.lua >> index 1470eda..9bcc7ef 100644 >> --- a/test/sql/iproto.test.lua >> +++ b/test/sql/iproto.test.lua >> @@ -247,10 +247,27 @@ cn:execute('drop table test') >> >> cn:close() >> >> +-- >> +-- Some commands, e.g. EXPLAIN, could lead to segfault because it >> +-- does not send column data type, but looks like DQL. Netbox had >> +-- been trying to decode type for any DQL. >> +-- >> +cn = remote.connect(box.cfg.listen) >> + >> +-- Segmentation fault when EXPLAIN executed using net.box. >> +_ = cn:execute("EXPLAIN SELECT 1;") >> + >> +-- Segmentation fault when PRAGMA TABLE_INFO() executed using >> +-- net.box. >> +box.sql.execute('CREATE TABLE test (id INT PRIMARY KEY)') >> +cn:execute("PRAGMA TABLE_INFO(test);") >> +box.sql.execute('DROP TABLE test') >> + >> +cn:close() >> + >> box.schema.user.revoke('guest', 'read,write,execute', 'universe') >> box.schema.user.revoke('guest', 'create', 'space') >> space = nil >> >> -- Cleanup xlog >> box.snapshot() >> - >> -- <br/>Мерген Имеев [-- Attachment #2: Type: text/html, Size: 16463 bytes --] ^ permalink raw reply [flat|nested] 18+ messages in thread
* [tarantool-patches] Re: Re[2]: Re: [PATCH 1/3] sql: EXPLAIN through net.box leads to SEGFAULT 2018-11-22 20:55 ` [tarantool-patches] Re[2]: " Мерген Имеев @ 2018-11-23 6:04 ` Kirill Yukhin 2018-11-28 12:36 ` [tarantool-patches] " n.pettik 1 sibling, 0 replies; 18+ messages in thread From: Kirill Yukhin @ 2018-11-23 6:04 UTC (permalink / raw) To: tarantool-patches; +Cc: Vladislav Shpilevoy, n.pettik Hello, On 22 Nov 23:55, Мерген Имеев wrote: > After discussion we decided that this patch will serve us > part of patch-set that should close newly filed bug: > https://github.com/tarantool/tarantool/issues/3832 But we still need other two patches of the patch set. Please, do not abandon them. -- Regards, Kirill Yukhin ^ permalink raw reply [flat|nested] 18+ messages in thread
* [tarantool-patches] Re: [PATCH 1/3] sql: EXPLAIN through net.box leads to SEGFAULT 2018-11-22 20:55 ` [tarantool-patches] Re[2]: " Мерген Имеев 2018-11-23 6:04 ` [tarantool-patches] Re: Re[2]: " Kirill Yukhin @ 2018-11-28 12:36 ` n.pettik 2018-11-29 14:58 ` Konstantin Osipov 1 sibling, 1 reply; 18+ messages in thread From: n.pettik @ 2018-11-28 12:36 UTC (permalink / raw) To: tarantool-patches; +Cc: Imeev Mergen, Vladislav Shpilevoy That’s why I don’t like any verbal agreements… My point is if result-set features column names, then those columns must have type. I fail to come up with example where resulting set features column names, but columns don’t have types. On the other hand, mb it is worth to send type ANY instead of UNKNOWN, it makes sense to a greater or lesser extent. > On 22 Nov 2018, at 23:55, Мерген Имеев <imeevma@tarantool.org> wrote: > > After discussion we decided that this patch will serve us > part of patch-set that should close newly filed bug: > https://github.com/tarantool/tarantool/issues/3832 > > The main Idea behind this ticket is that any statement > should return column type for when it returns column name. > And this ticket allow us to find an error without falling > into SEGMENTATION FAULT or returning less metadata. > > Четверг, 22 ноября 2018, 21:31 +03:00 от Vladislav Shpilevoy <v.shpilevoy@tarantool.org>: > > It was just a question, "why did you decide to do not > send type". It was not necessary to start sending UNKNOWN. I > think, that unknown type should be sent never. ^ permalink raw reply [flat|nested] 18+ messages in thread
* [tarantool-patches] Re: [PATCH 1/3] sql: EXPLAIN through net.box leads to SEGFAULT 2018-11-28 12:36 ` [tarantool-patches] " n.pettik @ 2018-11-29 14:58 ` Konstantin Osipov 0 siblings, 0 replies; 18+ messages in thread From: Konstantin Osipov @ 2018-11-29 14:58 UTC (permalink / raw) To: tarantool-patches; +Cc: Imeev Mergen, Vladislav Shpilevoy * n.pettik <korablev@tarantool.org> [18/11/28 15:51]: > That’s why I don’t like any verbal agreements… > > My point is if result-set features column names, > then those columns must have type. I fail to come up with > example where resulting set features column names, > but columns don’t have types. > On the other hand, mb it is worth to send type ANY instead of > UNKNOWN, it makes sense to a greater or lesser extent. It would make sense if there was ANY type in SQL. Until there is no support for ANY in SQL it's better to convert all results to use only supported types - integer and string. -- Konstantin Osipov, Moscow, Russia, +7 903 626 22 32 http://tarantool.io - www.twitter.com/kostja_osipov ^ permalink raw reply [flat|nested] 18+ messages in thread
* [tarantool-patches] [PATCH 2/3] sql: SELECT from system spaces returns unpacked msgpack. 2018-11-19 13:47 [tarantool-patches] [PATCH 0/3] A set of small SQL fixes Vladislav Shpilevoy 2018-11-19 13:47 ` [tarantool-patches] [PATCH 1/3] sql: EXPLAIN through net.box leads to SEGFAULT Vladislav Shpilevoy @ 2018-11-19 13:47 ` Vladislav Shpilevoy 2018-11-19 17:27 ` [tarantool-patches] " n.pettik 2018-11-19 13:47 ` [tarantool-patches] [PATCH 3/3] sql: too many autogenerated ids leads to SEGFAULT Vladislav Shpilevoy 2018-11-27 10:09 ` [tarantool-patches] Re: [PATCH 0/3] A set of small SQL fixes Kirill Yukhin 3 siblings, 1 reply; 18+ messages in thread From: Vladislav Shpilevoy @ 2018-11-19 13:47 UTC (permalink / raw) To: tarantool-patches; +Cc: korablev, Mergen Imeev From: Mergen Imeev <imeevma@gmail.com> SELECT executed through net.box returns unpacked msgpask. Fixed in this patch. --- src/box/execute.c | 22 +++++++++++++++------- test/sql/iproto.result | 9 +++++++++ test/sql/iproto.test.lua | 4 ++++ 3 files changed, 28 insertions(+), 7 deletions(-) diff --git a/src/box/execute.c b/src/box/execute.c index 5b747cf7f..2a0302703 100644 --- a/src/box/execute.c +++ b/src/box/execute.c @@ -351,13 +351,21 @@ sql_column_to_messagepack(struct sqlite3_stmt *stmt, int i, } case SQLITE_BLOB: { uint32_t len = sqlite3_column_bytes(stmt, i); - size = mp_sizeof_bin(len); - char *pos = (char *) region_alloc(region, size); - if (pos == NULL) - goto oom; - const char *s; - s = (const char *)sqlite3_column_blob(stmt, i); - mp_encode_bin(pos, s, len); + const char *s = + (const char *)sqlite3_column_blob(stmt, i); + if (sql_column_subtype(stmt, i) == SQL_SUBTYPE_MSGPACK) { + size = len; + char *pos = (char *)region_alloc(region, size); + if (pos == NULL) + goto oom; + memcpy(pos, s, len); + } else { + size = mp_sizeof_bin(len); + char *pos = (char *)region_alloc(region, size); + if (pos == NULL) + goto oom; + mp_encode_bin(pos, s, len); + } break; } case SQLITE_NULL: { diff --git a/test/sql/iproto.result b/test/sql/iproto.result index 31e5d2e75..b1313e10e 100644 --- a/test/sql/iproto.result +++ b/test/sql/iproto.result @@ -785,6 +785,15 @@ cn = remote.connect(box.cfg.listen) _ = cn:execute("EXPLAIN SELECT 1;") --- ... +-- SELECT from system spaces returns unpacked msgpack. +res = cn:execute('select "format" from "_space" limit 1;') +--- +... +res.rows +--- +- - [[{'name': 'space_id', 'type': 'unsigned'}, {'name': 'lsn', 'type': 'unsigned'}, + {'name': 'tuple', 'type': 'array'}]] +... cn:close() --- ... diff --git a/test/sql/iproto.test.lua b/test/sql/iproto.test.lua index a0f0f15ee..5c90cba52 100644 --- a/test/sql/iproto.test.lua +++ b/test/sql/iproto.test.lua @@ -257,6 +257,10 @@ cn = remote.connect(box.cfg.listen) -- Segmentation fault when EXPLAIN executed using net.box. _ = cn:execute("EXPLAIN SELECT 1;") +-- SELECT from system spaces returns unpacked msgpack. +res = cn:execute('select "format" from "_space" limit 1;') +res.rows + cn:close() box.schema.user.revoke('guest', 'read,write,execute', 'universe') -- 2.17.2 (Apple Git-113) ^ permalink raw reply [flat|nested] 18+ messages in thread
* [tarantool-patches] Re: [PATCH 2/3] sql: SELECT from system spaces returns unpacked msgpack. 2018-11-19 13:47 ` [tarantool-patches] [PATCH 2/3] sql: SELECT from system spaces returns unpacked msgpack Vladislav Shpilevoy @ 2018-11-19 17:27 ` n.pettik 2018-11-22 18:09 ` Imeev Mergen 0 siblings, 1 reply; 18+ messages in thread From: n.pettik @ 2018-11-19 17:27 UTC (permalink / raw) To: tarantool-patches; +Cc: Imeev Mergen, Vladislav Shpilevoy Please, don’t state problem in commit message. Instead, it would be better to indicate fix of the problem. I would call it like: sql: decode mgspack after SELECT from system spaces Otherwise it looks like you are introducing new bug :) Also, your patch affects not only system spaces. For example: box.schema.space.create('t’) box.space.t:format({{name = 'id', type = 'integer'}, {name = 'x', type = 'any'}}) box.space.t:create_index('i1', {parts = {1, 'int'}}) box.space.t:insert({1, {1,2,3}}) box.space.t:insert({2, {a = 3}}) Before your patch: tarantool> cn:execute('select * from \"t\"') --- - metadata: - name: id type: UNKNOWN - name: x type: UNKNOWN rows: - [1, !!binary kwECAw==] - [2, !!binary gaFhAw==] ... After: tarantool> cn:execute('select * from \"t\"') --- - metadata: - name: id type: UNKNOWN - name: x type: UNKNOWN rows: - [1, [1, 2, 3]] - [2, {'a': 3}] … I guess more precise to say sort of: sql: decode ARRAY and MAP types after SELECT Patch itself is OK, but I would rework test in order to avoid using system spaces. It is up to you. ^ permalink raw reply [flat|nested] 18+ messages in thread
* [tarantool-patches] Re: [PATCH 2/3] sql: SELECT from system spaces returns unpacked msgpack. 2018-11-19 17:27 ` [tarantool-patches] " n.pettik @ 2018-11-22 18:09 ` Imeev Mergen 2018-11-27 8:51 ` n.pettik 0 siblings, 1 reply; 18+ messages in thread From: Imeev Mergen @ 2018-11-22 18:09 UTC (permalink / raw) To: n.pettik, tarantool-patches; +Cc: Vladislav Shpilevoy [-- Attachment #1: Type: text/plain, Size: 6460 bytes --] Hi! Thank you for review! Diff between versions and new patch below. On 11/19/18 8:27 PM, n.pettik wrote: > Please, don’t state problem in commit message. Instead, it would be > better to indicate fix of the problem. I would call it like: > > sql: decode mgspack after SELECT from system spaces > > Otherwise it looks like you are introducing new bug :) > > Also, your patch affects not only system spaces. > For example: > > box.schema.space.create('t’) > box.space.t:format({{name = 'id', type = 'integer'}, {name = 'x', type = 'any'}}) > box.space.t:create_index('i1', {parts = {1, 'int'}}) > box.space.t:insert({1, {1,2,3}}) > box.space.t:insert({2, {a = 3}}) > > Before your patch: > > tarantool> cn:execute('select * from \"t\"') > --- > - metadata: > - name: id > type: UNKNOWN > - name: x > type: UNKNOWN > rows: > - [1, !!binary kwECAw==] > - [2, !!binary gaFhAw==] > ... > > After: > > tarantool> cn:execute('select * from \"t\"') > --- > - metadata: > - name: id > type: UNKNOWN > - name: x > type: UNKNOWN > rows: > - [1, [1, 2, 3]] > - [2, {'a': 3}] > … > > I guess more precise to say sort of: > > sql: decode ARRAY and MAP types after SELECT > > Patch itself is OK, but I would rework test in order to avoid > using system spaces. It is up to you. > *Diff between versions:* diff --git a/test/sql/iproto.result b/test/sql/iproto.result index b866140..6c50781 100644 --- a/test/sql/iproto.result +++ b/test/sql/iproto.result @@ -811,14 +811,37 @@ cn:execute("PRAGMA TABLE_INFO(test);") box.sql.execute('DROP TABLE test') --- ... --- SELECT from system spaces returns unpacked msgpack. -res = cn:execute('select "format" from "_space" limit 1;') +-- SELECT returns unpacked msgpack. +format = {{name = 'id', type = 'integer'}, {name = 'x', type = 'any'}} --- ... -res.rows +s = box.schema.space.create('test', {format=format}) +--- +... +i1 = s:create_index('i1', {parts = {1, 'int'}}) +--- +... +s:insert({1, {1,2,3}}) +--- +- [1, [1, 2, 3]] +... +s:insert({2, {a = 3}}) +--- +- [2, {'a': 3}] +... +cn:execute('select * from "test"') +--- +- metadata: + - name: id + type: UNKNOWN + - name: x + type: UNKNOWN + rows: + - [1, [1, 2, 3]] + - [2, {'a': 3}] +... +s:drop() --- -- - [[{'name': 'space_id', 'type': 'unsigned'}, {'name': 'lsn', 'type': 'unsigned'}, - {'name': 'tuple', 'type': 'array'}]] ... cn:close() --- diff --git a/test/sql/iproto.test.lua b/test/sql/iproto.test.lua index 6299814..e12decd 100644 --- a/test/sql/iproto.test.lua +++ b/test/sql/iproto.test.lua @@ -263,9 +263,14 @@ box.sql.execute('CREATE TABLE test (id INT PRIMARY KEY)') cn:execute("PRAGMA TABLE_INFO(test);") box.sql.execute('DROP TABLE test') --- SELECT from system spaces returns unpacked msgpack. -res = cn:execute('select "format" from "_space" limit 1;') -res.rows +-- SELECT returns unpacked msgpack. +format = {{name = 'id', type = 'integer'}, {name = 'x', type = 'any'}} +s = box.schema.space.create('test', {format=format}) +i1 = s:create_index('i1', {parts = {1, 'int'}}) +s:insert({1, {1,2,3}}) +s:insert({2, {a = 3}}) +cn:execute('select * from "test"') +s:drop() cn:close() *New patch:* commit 8482e0c0bc1fa44faa6abf7b7b8a27b77e91db92 Author: Mergen Imeev <imeevma@gmail.com> Date: Fri Nov 16 14:23:39 2018 +0300 sql: decode ARRAY and MAP types after SELECT Before this patch MSGPACK received using SELECT statement through net.box was unpacked. Fixed in this patch. diff --git a/src/box/execute.c b/src/box/execute.c index cd809f8..fb3e08b 100644 --- a/src/box/execute.c +++ b/src/box/execute.c @@ -351,13 +351,21 @@ sql_column_to_messagepack(struct sqlite3_stmt *stmt, int i, } case SQLITE_BLOB: { uint32_t len = sqlite3_column_bytes(stmt, i); - size = mp_sizeof_bin(len); - char *pos = (char *) region_alloc(region, size); - if (pos == NULL) - goto oom; - const char *s; - s = (const char *)sqlite3_column_blob(stmt, i); - mp_encode_bin(pos, s, len); + const char *s = + (const char *)sqlite3_column_blob(stmt, i); + if (sql_column_subtype(stmt, i) == SQL_SUBTYPE_MSGPACK) { + size = len; + char *pos = (char *)region_alloc(region, size); + if (pos == NULL) + goto oom; + memcpy(pos, s, len); + } else { + size = mp_sizeof_bin(len); + char *pos = (char *)region_alloc(region, size); + if (pos == NULL) + goto oom; + mp_encode_bin(pos, s, len); + } break; } case SQLITE_NULL: { diff --git a/test/sql/iproto.result b/test/sql/iproto.result index f229427..6c50781 100644 --- a/test/sql/iproto.result +++ b/test/sql/iproto.result @@ -811,6 +811,38 @@ cn:execute("PRAGMA TABLE_INFO(test);") box.sql.execute('DROP TABLE test') --- ... +-- SELECT returns unpacked msgpack. +format = {{name = 'id', type = 'integer'}, {name = 'x', type = 'any'}} +--- +... +s = box.schema.space.create('test', {format=format}) +--- +... +i1 = s:create_index('i1', {parts = {1, 'int'}}) +--- +... +s:insert({1, {1,2,3}}) +--- +- [1, [1, 2, 3]] +... +s:insert({2, {a = 3}}) +--- +- [2, {'a': 3}] +... +cn:execute('select * from "test"') +--- +- metadata: + - name: id + type: UNKNOWN + - name: x + type: UNKNOWN + rows: + - [1, [1, 2, 3]] + - [2, {'a': 3}] +... +s:drop() +--- +... cn:close() --- ... diff --git a/test/sql/iproto.test.lua b/test/sql/iproto.test.lua index 9bcc7ef..e12decd 100644 --- a/test/sql/iproto.test.lua +++ b/test/sql/iproto.test.lua @@ -263,6 +263,15 @@ box.sql.execute('CREATE TABLE test (id INT PRIMARY KEY)') cn:execute("PRAGMA TABLE_INFO(test);") box.sql.execute('DROP TABLE test') +-- SELECT returns unpacked msgpack. +format = {{name = 'id', type = 'integer'}, {name = 'x', type = 'any'}} +s = box.schema.space.create('test', {format=format}) +i1 = s:create_index('i1', {parts = {1, 'int'}}) +s:insert({1, {1,2,3}}) +s:insert({2, {a = 3}}) +cn:execute('select * from "test"') +s:drop() + cn:close() box.schema.user.revoke('guest', 'read,write,execute', 'universe') [-- Attachment #2: Type: text/html, Size: 8661 bytes --] ^ permalink raw reply [flat|nested] 18+ messages in thread
* [tarantool-patches] Re: [PATCH 2/3] sql: SELECT from system spaces returns unpacked msgpack. 2018-11-22 18:09 ` Imeev Mergen @ 2018-11-27 8:51 ` n.pettik 0 siblings, 0 replies; 18+ messages in thread From: n.pettik @ 2018-11-27 8:51 UTC (permalink / raw) To: tarantool-patches; +Cc: Imeev Mergen, Vladislav Shpilevoy LGTM. ^ permalink raw reply [flat|nested] 18+ messages in thread
* [tarantool-patches] [PATCH 3/3] sql: too many autogenerated ids leads to SEGFAULT 2018-11-19 13:47 [tarantool-patches] [PATCH 0/3] A set of small SQL fixes Vladislav Shpilevoy 2018-11-19 13:47 ` [tarantool-patches] [PATCH 1/3] sql: EXPLAIN through net.box leads to SEGFAULT Vladislav Shpilevoy 2018-11-19 13:47 ` [tarantool-patches] [PATCH 2/3] sql: SELECT from system spaces returns unpacked msgpack Vladislav Shpilevoy @ 2018-11-19 13:47 ` Vladislav Shpilevoy 2018-11-19 17:27 ` [tarantool-patches] " n.pettik 2018-11-27 10:09 ` [tarantool-patches] Re: [PATCH 0/3] A set of small SQL fixes Kirill Yukhin 3 siblings, 1 reply; 18+ messages in thread From: Vladislav Shpilevoy @ 2018-11-19 13:47 UTC (permalink / raw) To: tarantool-patches; +Cc: korablev, Mergen Imeev From: Mergen Imeev <imeevma@gmail.com> This probleam appeared because region was cleaned twice: once in sqlite3VdbeHalt() and once in sqlite3VdbeDelete() which was executed during sqlite3_finalize(). Autogenerated ids that were saved there, were fetched after sqlite3VdbeHalt() and before sqlite3_finalize(). In this patch region cleaning in sqlite3VdbeHalt() were removed. Follow up #2618 Follow up #3199 --- src/box/sql/vdbe.c | 8 ++------ src/box/sql/vdbeaux.c | 6 ------ test/sql/iproto.result | 16 ++++++++++++++++ test/sql/iproto.test.lua | 7 +++++++ 4 files changed, 25 insertions(+), 12 deletions(-) diff --git a/src/box/sql/vdbe.c b/src/box/sql/vdbe.c index b6afe9184..cc340e942 100644 --- a/src/box/sql/vdbe.c +++ b/src/box/sql/vdbe.c @@ -2911,12 +2911,8 @@ case OP_MakeRecord: { * memory shouldn't be reused until it is written into WAL. * * However, if memory for ephemeral space is allocated - * on region, it will be freed only in vdbeHalt() routine. - * It is the only way to free this region memory, - * since ephemeral spaces don't have nothing in common - * with txn routine and region memory won't be released - * after txn_commit() or txn_rollback() as it happens - * with ordinary spaces. + * on region, it will be freed only in sqlite3_finalize() + * routine. */ if (bIsEphemeral) { rc = sqlite3VdbeMemClearAndResize(pOut, nByte); diff --git a/src/box/sql/vdbeaux.c b/src/box/sql/vdbeaux.c index 615a0f064..f2faad862 100644 --- a/src/box/sql/vdbeaux.c +++ b/src/box/sql/vdbeaux.c @@ -2498,12 +2498,6 @@ sqlite3VdbeHalt(Vdbe * p) p->rc = SQLITE_NOMEM_BKPT; } - /* Release all region memory which was allocated - * to hold tuples to be inserted into ephemeral spaces. - */ - if (!box_txn()) - fiber_gc(); - assert(db->nVdbeActive > 0 || box_txn() || p->anonymous_savepoint == NULL); return (p->rc == SQLITE_BUSY ? SQLITE_BUSY : SQLITE_OK); diff --git a/test/sql/iproto.result b/test/sql/iproto.result index b1313e10e..b2a1e42cc 100644 --- a/test/sql/iproto.result +++ b/test/sql/iproto.result @@ -794,6 +794,22 @@ res.rows - - [[{'name': 'space_id', 'type': 'unsigned'}, {'name': 'lsn', 'type': 'unsigned'}, {'name': 'tuple', 'type': 'array'}]] ... +-- Too many autogenerated ids leads to SEGFAULT. +cn = remote.connect(box.cfg.listen) +--- +... +box.sql.execute('CREATE TABLE t1(id INTEGER PRIMARY KEY AUTOINCREMENT)') +--- +... +for i = 0, 1000 do cn:execute("INSERT INTO t1 VALUES (null)") end +--- +... +_ = cn:execute("INSERT INTO t1 SELECT NULL from t1") +--- +... +box.sql.execute('DROP TABLE t1') +--- +... cn:close() --- ... diff --git a/test/sql/iproto.test.lua b/test/sql/iproto.test.lua index 5c90cba52..da52d631e 100644 --- a/test/sql/iproto.test.lua +++ b/test/sql/iproto.test.lua @@ -261,6 +261,13 @@ _ = cn:execute("EXPLAIN SELECT 1;") res = cn:execute('select "format" from "_space" limit 1;') res.rows +-- Too many autogenerated ids leads to SEGFAULT. +cn = remote.connect(box.cfg.listen) +box.sql.execute('CREATE TABLE t1(id INTEGER PRIMARY KEY AUTOINCREMENT)') +for i = 0, 1000 do cn:execute("INSERT INTO t1 VALUES (null)") end +_ = cn:execute("INSERT INTO t1 SELECT NULL from t1") +box.sql.execute('DROP TABLE t1') + cn:close() box.schema.user.revoke('guest', 'read,write,execute', 'universe') -- 2.17.2 (Apple Git-113) ^ permalink raw reply [flat|nested] 18+ messages in thread
* [tarantool-patches] Re: [PATCH 3/3] sql: too many autogenerated ids leads to SEGFAULT 2018-11-19 13:47 ` [tarantool-patches] [PATCH 3/3] sql: too many autogenerated ids leads to SEGFAULT Vladislav Shpilevoy @ 2018-11-19 17:27 ` n.pettik 2018-11-22 18:09 ` Imeev Mergen 0 siblings, 1 reply; 18+ messages in thread From: n.pettik @ 2018-11-19 17:27 UTC (permalink / raw) To: tarantool-patches; +Cc: Imeev Mergen, Vladislav Shpilevoy > This probleam appeared because region was cleaned twice: once in Typo: problem > sqlite3VdbeHalt() and once in sqlite3VdbeDelete() which was > executed during sqlite3_finalize(). Autogenerated ids that were > saved there, were fetched after sqlite3VdbeHalt() and before > sqlite3_finalize(). In this patch region cleaning in > sqlite3VdbeHalt() were removed. Typo: was (or better - has been removed). Again, IMHO I would rephrase commit subject: sql: remove region_truncate() from sqlite3VdbeHalt() And explain in commit message why it was removed. Patch itself is OK. ^ permalink raw reply [flat|nested] 18+ messages in thread
* [tarantool-patches] Re: [PATCH 3/3] sql: too many autogenerated ids leads to SEGFAULT 2018-11-19 17:27 ` [tarantool-patches] " n.pettik @ 2018-11-22 18:09 ` Imeev Mergen 2018-11-27 8:50 ` n.pettik 0 siblings, 1 reply; 18+ messages in thread From: Imeev Mergen @ 2018-11-22 18:09 UTC (permalink / raw) To: n.pettik, tarantool-patches; +Cc: Vladislav Shpilevoy [-- Attachment #1: Type: text/plain, Size: 4172 bytes --] Hi! Thank you for review! New patch below. On 11/19/18 8:27 PM, n.pettik wrote: >> This probleam appeared because region was cleaned twice: once in > Typo: problem > >> sqlite3VdbeHalt() and once in sqlite3VdbeDelete() which was >> executed during sqlite3_finalize(). Autogenerated ids that were >> saved there, were fetched after sqlite3VdbeHalt() and before >> sqlite3_finalize(). In this patch region cleaning in >> sqlite3VdbeHalt() were removed. > Typo: was (or better - has been removed). > > Again, IMHO I would rephrase commit subject: > > sql: remove region_truncate() from sqlite3VdbeHalt() > > And explain in commit message why it was removed. > > Patch itself is OK. Fixed commit-message. *New patch:** * commit dd5b3aaa63b9fe2312a6fb30f3ba87bf8329b222 Author: Mergen Imeev <imeevma@gmail.com> Date: Sat Nov 17 13:05:55 2018 +0300 sql: remove fiber_gc() from sqlite3VdbeHalt() Too many autogenerated ids leads to SEGFAULT. This problem appeared because region was cleaned twice: once in sqlite3VdbeHalt() and once in sqlite3VdbeDelete() which was executed during sqlite3_finalize(). Autogenerated ids that were saved there, were fetched after sqlite3VdbeHalt() and before sqlite3_finalize(). In this patch region cleaning in sqlite3VdbeHalt() has been removed. Follow up #2618 Follow up #3199 diff --git a/src/box/sql/vdbe.c b/src/box/sql/vdbe.c index b6afe91..cc340e9 100644 --- a/src/box/sql/vdbe.c +++ b/src/box/sql/vdbe.c @@ -2911,12 +2911,8 @@ case OP_MakeRecord: { * memory shouldn't be reused until it is written into WAL. * * However, if memory for ephemeral space is allocated - * on region, it will be freed only in vdbeHalt() routine. - * It is the only way to free this region memory, - * since ephemeral spaces don't have nothing in common - * with txn routine and region memory won't be released - * after txn_commit() or txn_rollback() as it happens - * with ordinary spaces. + * on region, it will be freed only in sqlite3_finalize() + * routine. */ if (bIsEphemeral) { rc = sqlite3VdbeMemClearAndResize(pOut, nByte); diff --git a/src/box/sql/vdbeaux.c b/src/box/sql/vdbeaux.c index 615a0f0..f2faad8 100644 --- a/src/box/sql/vdbeaux.c +++ b/src/box/sql/vdbeaux.c @@ -2498,12 +2498,6 @@ sqlite3VdbeHalt(Vdbe * p) p->rc = SQLITE_NOMEM_BKPT; } - /* Release all region memory which was allocated - * to hold tuples to be inserted into ephemeral spaces. - */ - if (!box_txn()) - fiber_gc(); - assert(db->nVdbeActive > 0 || box_txn() || p->anonymous_savepoint == NULL); return (p->rc == SQLITE_BUSY ? SQLITE_BUSY : SQLITE_OK); diff --git a/test/sql/iproto.result b/test/sql/iproto.result index 6c50781..000b359 100644 --- a/test/sql/iproto.result +++ b/test/sql/iproto.result @@ -843,6 +843,22 @@ cn:execute('select * from "test"') s:drop() --- ... +-- Too many autogenerated ids leads to SEGFAULT. +cn = remote.connect(box.cfg.listen) +--- +... +box.sql.execute('CREATE TABLE t1(id INTEGER PRIMARY KEY AUTOINCREMENT)') +--- +... +for i = 0, 1000 do cn:execute("INSERT INTO t1 VALUES (null)") end +--- +... +_ = cn:execute("INSERT INTO t1 SELECT NULL from t1") +--- +... +box.sql.execute('DROP TABLE t1') +--- +... cn:close() --- ... diff --git a/test/sql/iproto.test.lua b/test/sql/iproto.test.lua index e12decd..2501393 100644 --- a/test/sql/iproto.test.lua +++ b/test/sql/iproto.test.lua @@ -272,6 +272,13 @@ s:insert({2, {a = 3}}) cn:execute('select * from "test"') s:drop() +-- Too many autogenerated ids leads to SEGFAULT. +cn = remote.connect(box.cfg.listen) +box.sql.execute('CREATE TABLE t1(id INTEGER PRIMARY KEY AUTOINCREMENT)') +for i = 0, 1000 do cn:execute("INSERT INTO t1 VALUES (null)") end +_ = cn:execute("INSERT INTO t1 SELECT NULL from t1") +box.sql.execute('DROP TABLE t1') + cn:close() box.schema.user.revoke('guest', 'read,write,execute', 'universe') [-- Attachment #2: Type: text/html, Size: 5699 bytes --] ^ permalink raw reply [flat|nested] 18+ messages in thread
* [tarantool-patches] Re: [PATCH 3/3] sql: too many autogenerated ids leads to SEGFAULT 2018-11-22 18:09 ` Imeev Mergen @ 2018-11-27 8:50 ` n.pettik 0 siblings, 0 replies; 18+ messages in thread From: n.pettik @ 2018-11-27 8:50 UTC (permalink / raw) To: tarantool-patches; +Cc: Vladislav Shpilevoy, Imeev Mergen LGTM. ^ permalink raw reply [flat|nested] 18+ messages in thread
* [tarantool-patches] Re: [PATCH 0/3] A set of small SQL fixes 2018-11-19 13:47 [tarantool-patches] [PATCH 0/3] A set of small SQL fixes Vladislav Shpilevoy ` (2 preceding siblings ...) 2018-11-19 13:47 ` [tarantool-patches] [PATCH 3/3] sql: too many autogenerated ids leads to SEGFAULT Vladislav Shpilevoy @ 2018-11-27 10:09 ` Kirill Yukhin 3 siblings, 0 replies; 18+ messages in thread From: Kirill Yukhin @ 2018-11-27 10:09 UTC (permalink / raw) To: tarantool-patches; +Cc: korablev Hello, On 19 Nov 16:47, Vladislav Shpilevoy wrote: > A set of small patches fixing some SQL assertions or incorrect behaviour, > which appeared during working on 3505 - box.sql.execute() removal. > > Branch: http://github.com/tarantool/tarantool/tree/imeevma/small-patches > > Mergen Imeev (3): > sql: EXPLAIN through net.box leads to SEGFAULT > sql: SELECT from system spaces returns unpacked msgpack. > sql: too many autogenerated ids leads to SEGFAULT I've cherry-picked [2/3] and [2/3] patches to 2.1 branch. 1/3 won't be checked in. So, consider this thread closed. -- Regards, Kirill Yukhin ^ permalink raw reply [flat|nested] 18+ messages in thread
end of thread, other threads:[~2018-11-29 14:58 UTC | newest] Thread overview: 18+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- 2018-11-19 13:47 [tarantool-patches] [PATCH 0/3] A set of small SQL fixes Vladislav Shpilevoy 2018-11-19 13:47 ` [tarantool-patches] [PATCH 1/3] sql: EXPLAIN through net.box leads to SEGFAULT Vladislav Shpilevoy 2018-11-19 17:27 ` [tarantool-patches] " n.pettik 2018-11-22 18:08 ` Imeev Mergen 2018-11-22 18:31 ` Vladislav Shpilevoy 2018-11-22 20:55 ` [tarantool-patches] Re[2]: " Мерген Имеев 2018-11-23 6:04 ` [tarantool-patches] Re: Re[2]: " Kirill Yukhin 2018-11-28 12:36 ` [tarantool-patches] " n.pettik 2018-11-29 14:58 ` Konstantin Osipov 2018-11-19 13:47 ` [tarantool-patches] [PATCH 2/3] sql: SELECT from system spaces returns unpacked msgpack Vladislav Shpilevoy 2018-11-19 17:27 ` [tarantool-patches] " n.pettik 2018-11-22 18:09 ` Imeev Mergen 2018-11-27 8:51 ` n.pettik 2018-11-19 13:47 ` [tarantool-patches] [PATCH 3/3] sql: too many autogenerated ids leads to SEGFAULT Vladislav Shpilevoy 2018-11-19 17:27 ` [tarantool-patches] " n.pettik 2018-11-22 18:09 ` Imeev Mergen 2018-11-27 8:50 ` n.pettik 2018-11-27 10:09 ` [tarantool-patches] Re: [PATCH 0/3] A set of small SQL fixes Kirill Yukhin
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox