Server IP : 172.67.216.182 / Your IP : 104.23.175.151 Web Server : Apache System : Linux krdc-ubuntu-s-2vcpu-4gb-amd-blr1-01.localdomain 5.15.0-142-generic #152-Ubuntu SMP Mon May 19 10:54:31 UTC 2025 x86_64 User : www ( 1000) PHP Version : 7.4.33 Disable Function : passthru,exec,system,putenv,chroot,chgrp,chown,shell_exec,popen,proc_open,pcntl_exec,ini_alter,ini_restore,dl,openlog,syslog,readlink,symlink,popepassthru,pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,imap_open,apache_setenv MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /www/server/mysql/src/mysql-test/suite/binlog/t/ |
Upload File : |
# # === Name === # # binlog_write_error.test # # === Description === # # This test case check if the error of writing binlog file is properly # reported and handled when executing statements. # # === Related Bugs === # # BUG#37148 # source include/have_log_bin.inc; source include/have_debug.inc; source include/have_binlog_format_mixed_or_statement.inc; CALL mtr.add_suppression("The content of the statement cache is corrupted " "while writing a rollback record of the transaction " "to the binary log. An incident event has been " "written to the binary log which will stop the " "slaves."); --echo # --echo # Initialization --echo # disable_warnings; DROP TABLE IF EXISTS t1, t2; DROP FUNCTION IF EXISTS f1; DROP FUNCTION IF EXISTS f2; DROP PROCEDURE IF EXISTS p1; DROP PROCEDURE IF EXISTS p2; DROP TRIGGER IF EXISTS tr1; DROP TRIGGER IF EXISTS tr2; DROP VIEW IF EXISTS v1, v2; enable_warnings; --echo # --echo # Test injecting binlog write error when executing queries --echo # let $query= CREATE TABLE t1 (a INT); source include/binlog_inject_error.inc; INSERT INTO t1 VALUES (1),(2),(3); let $query= INSERT INTO t1 VALUES (4),(5),(6); source include/binlog_inject_error.inc; let $query= UPDATE t1 set a=a+1; source include/binlog_inject_error.inc; let $query= DELETE FROM t1; source include/binlog_inject_error.inc; let $query= CREATE TRIGGER tr1 AFTER INSERT ON t1 FOR EACH ROW INSERT INTO t1 VALUES (new.a + 100); source include/binlog_inject_error.inc; let $query= DROP TRIGGER tr1; source include/binlog_inject_error.inc; let $query= ALTER TABLE t1 ADD (b INT); source include/binlog_inject_error.inc; let $query= CREATE VIEW v1 AS SELECT a FROM t1; source include/binlog_inject_error.inc; let $query= DROP VIEW v1; source include/binlog_inject_error.inc; let $query= CREATE PROCEDURE p1(OUT rows INT) SELECT count(*) INTO rows FROM t1; source include/binlog_inject_error.inc; let $query= DROP PROCEDURE p1; source include/binlog_inject_error.inc; let $query= DROP TABLE t1; source include/binlog_inject_error.inc; let $query= CREATE FUNCTION f1() RETURNS INT return 1; source include/binlog_inject_error.inc; let $query= DROP FUNCTION f1; source include/binlog_inject_error.inc; let $query= CREATE USER user1; source include/binlog_inject_error.inc; let $query= REVOKE ALL PRIVILEGES, GRANT OPTION FROM user1; source include/binlog_inject_error.inc; let $query= DROP USER user1; source include/binlog_inject_error.inc; --echo # --echo # Cleanup --echo # disable_warnings; DROP TABLE IF EXISTS t1, t2; DROP FUNCTION IF EXISTS f1; DROP PROCEDURE IF EXISTS p1; DROP TRIGGER IF EXISTS tr1; DROP VIEW IF EXISTS v1, v2; enable_warnings;