- 15 Jun, 2007 3 commits
-
-
ramil/ram@ramil.myoffice.izhnet.ru authored
into mysql.com:/home/ram/work/mysql-5.1-maint
-
mysql-test/include/wait_for_slave_io_to_stop.inc mysql-test/include/wait_for_slave_sql_to_stop.inc mysql-test/include/wait_for_slave_to_start.inc mysql-test/include/wait_for_slave_to_stop.inc from 5.1
-
dkatz@damien-katzs-computer.local authored
into damien-katzs-computer.local:/Users/dkatz/51_win
-
- 13 Jun, 2007 13 commits
-
-
dkatz@damien-katzs-computer.local authored
Removed the ability to cache queries with UUID() and UUID_SHORT().
-
dkatz@damien-katzs-computer.local authored
into damien-katzs-computer.local:/Users/dkatz/mysql51
-
dkatz@damien-katzs-computer.local authored
Fixed where the slave code would try to update the Lex->sphead which is NULL on an "alter table" commands.
-
dkatz@damien-katzs-computer.local authored
into damien-katzs-computer.local:/Users/dkatz/50_win
-
dkatz@damien-katzs-computer.local authored
Removed the ability to cache queries containing "UUID()".
-
Updated to use new tool(s):Missed on call, resubmitting
-
jmiller/ndbdev@ndb08.mysql.com authored
into mysql.com:/data2/mysql-5.1-maint
-
Updated to use new tool(s)
-
-
ramil/ram@ramil.myoffice.izhnet.ru authored
into mysql.com:/home/ram/work/b28748/b28748.5.0
-
ramil/ram@ramil.myoffice.izhnet.ru authored
into mysql.com:/home/ram/work/b28748/b28748.5.1
-
jmiller/ndbdev@ndb08.mysql.com authored
into mysql.com:/data2/mysql-5.1-maint
-
-
- 12 Jun, 2007 8 commits
-
-
cmiller@zippy.cornsilk.net authored
into zippy.cornsilk.net:/home/cmiller/work/mysql/mysql-5.0-maint-2
-
cmiller@zippy.cornsilk.net authored
into zippy.cornsilk.net:/home/cmiller/work/mysql/mysql-5.1-maint
-
cmiller@zippy.cornsilk.net authored
into zippy.cornsilk.net:/home/cmiller/work/mysql/mysql-5.1-maint
-
cmiller@zippy.cornsilk.net authored
into zippy.cornsilk.net:/home/cmiller/work/mysql/mysql-5.0-maint-2
-
cmiller@zippy.cornsilk.net authored
protocol Fixed duplicated code, same as last commit. One could send a malformed packet that caused the server to SEGV. In recent versions of the password protocol, the client tells the server what length the ciphertext is (almost always 20). If that length was large enough to overflow a signed char, then the number would jump to very large after being casted to unsigned int. Instead, cast the *passwd char to uchar.
-
kaa@polly.local authored
into polly.local:/home/kaa/src/maint/mysql-5.1-maint
-
kaa@polly.local authored
into polly.local:/home/kaa/src/maint/mysql-5.0-maint
-
kaa@polly.local authored
into polly.local:/home/kaa/src/maint/bug28895/my51-bug28895
-
- 11 Jun, 2007 3 commits
-
-
cmiller@zippy.cornsilk.net authored
protocol Update for function moved to new file in 5.1. One could send a malformed packet that caused the server to SEGV. In recent versions of the password protocol, the client tells the server what length the ciphertext is (almost always 20). If that length was large enough to overflow a signed char, then the number would jump to very large after being casted to unsigned int. Instead, cast the *passwd char to uchar.
-
cmiller@zippy.cornsilk.net authored
into zippy.cornsilk.net:/home/cmiller/work/mysql/mysql-5.1-maint
-
kaa@polly.local authored
In create_tmp_table() don't set full table path as a table name. Other code assumes table names to not exceed NAME_LEN bytes.
-
- 09 Jun, 2007 1 commit
-
-
Problem: we may get unexpected results comparing [u]longlong values as doubles. Fix: adjust the test to use integer comparators. Note: it's not a real fix, we have to implement some new comparators to completely solve the original problem (see my comment in the bug report).
-
- 08 Jun, 2007 12 commits
-
-
cmiller@zippy.cornsilk.net authored
into zippy.cornsilk.net:/home/cmiller/work/mysql/mysql-5.1-maint
-
cmiller@zippy.cornsilk.net authored
into zippy.cornsilk.net:/home/cmiller/work/mysql/mysql-5.0-maint-2
-
cmiller@zippy.cornsilk.net authored
into zippy.cornsilk.net:/home/cmiller/work/mysql/mysql-4.1-maint
-
cmiller@zippy.cornsilk.net authored
protocol One could send a malformed packet that caused the server to SEGV. In recent versions of the password protocol, the client tells the server what length the ciphertext is (almost always 20). If that length was large enough to overflow a signed char, then the number would jump to very large after being casted to unsigned int. Instead, cast the *passwd char to uchar.
-
msvensson@pilot.(none) authored
into pilot.(none):/data/msvensson/mysql/mysql-5.1-new-maint
-
msvensson@pilot.(none) authored
-
msvensson@pilot.(none) authored
into pilot.(none):/data/msvensson/mysql/mysql-5.1-new-maint
-
msvensson@pilot.(none) authored
- Backport include/show_binlog_events.inc from 5.1 and use it to make the test output consistent results
-
msvensson@pilot.(none) authored
into pilot.(none):/data/msvensson/mysql/mysql-5.1-new-maint
-
msvensson@pilot.(none) authored
into pilot.(none):/data/msvensson/mysql/mysql-5.1-new-maint
-
msvensson@pilot.(none) authored
to crrectly filter tests to run
-
msvensson@pilot.(none) authored
-