mirror of
https://github.com/MariaDB/server.git
synced 2025-01-16 12:02:42 +01:00
22e793639a
- If USER is given, all threads for that user is signaled - If SOFT is used then the KILL will not be sent to the handler. This can be used to not interrupt critical things in the handler like 'REPAIR'. Internally added more kill signals. This gives us more information of why a query/connection was killed. - KILL_SERVER is used when server is going down. In this case the users gets ER_SHUTDOWN as the reason connection was killed. - Changed signals to number in correct order, which makes it easier to test how the signal should affect the code. - New error message ER_CONNECTION_KILLED if connection was killed by 'KILL CONNECTION'. Before we got error ER_SHUTDOWN. Changed names of not used parameters KILL_QUERY & KILL_CONNCTION to mysql_kill() to not conflict with defines in the server include/mysql.h.pp: Updated file include/mysql_com.h: Changed names of not used parameters KILL_QUERY & KILL_CONNCTION to mysql_kill() to not conflict with defines in the server mysql-test/r/kill.result: Added test of KILL USER mysql-test/suite/rpl/r/rpl_stm_000001.result: Updated error code mysql-test/suite/rpl/t/rpl_stm_000001.test: Updated error codes mysql-test/t/flush_read_lock_kill.test: Updated error codes mysql-test/t/kill.test: Added test of KILL USER plugin/handler_socket/handlersocket/database.cpp: Removed THD:: from KILL sql/debug_sync.cc: Removed THD:: from KILL sql/event_scheduler.cc: Removed THD:: from KILL sql/filesort.cc: Removed THD:: from KILL sql/ha_ndbcluster_binlog.cc: Removed THD:: from KILL sql/handler.cc: Removed THD:: from KILL Simplify code. sql/lex.h: Added new keywords HARD | SOFT sql/log.cc: Removed THD:: from KILL Added testing of new error ER_CONNECTION_KILLED sql/log_event.cc: Removed THD:: from KILL Added testing of new error ER_CONNECTION_KILLED sql/mysql_priv.h: Added new prototypes sql/mysqld.cc: Removed THD:: from KILL Use KILL_SERVER_HARD signal on shutdown. sql/scheduler.cc: Removed THD:: from KILL Simplify test if connection should be killed sql/share/errmsg.txt: New error message ER_CONNECTION_KILLED sql/slave.cc: Removed THD:: from KILL sql/sp_head.cc: Removed THD:: from KILL sql/sql_base.cc: Removed THD:: from KILL sql/sql_cache.cc: Removed THD:: from KILL sql/sql_class.cc: Removed THD:: from KILL Added killed_errno() Only signal kill to storage engine if HARD bit is set. sql/sql_class.h: Move KILL options out from THD to make them easier to use in sql_yacc.yy sql/sql_connect.cc: Removed THD:: from KILL sql/sql_delete.cc: Removed THD:: from KILL sql/sql_error.cc: Removed THD:: from KILL sql/sql_insert.cc: Removed THD:: from KILL Simplifed testing if thread is killed. sql/sql_lex.h: Added kill options to st_lex sql/sql_load.cc: Removed THD:: from KILL sql/sql_parse.cc: Added kill options to st_lex Simplifed and optimzed testing of thd->killed at end of query Added support for KILL USER Extended sql_kill() to allow use of more kill signals. sql/sql_repl.cc: Removed THD:: from KILL sql/sql_show.cc: Removed THD:: from KILL Simplied testing if query/connection was killed sql/sql_table.cc: Removed THD:: from KILL sql/sql_update.cc: Removed THD:: from KILL sql/sql_yacc.yy: Added support for new KILL syntax: KILL [HARD|SOFT] [CONNECTION|QUERY] [ID | USER user_name] storage/archive/ha_archive.cc: Simplify compilation storage/maria/ha_maria.cc: Removed THD:: from KILL
1207 lines
36 KiB
C++
1207 lines
36 KiB
C++
/* Copyright (C) 2007 MySQL AB
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; version 2 of the License.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */
|
|
|
|
|
|
/*
|
|
Functions to autenticate and handle reqests for a connection
|
|
*/
|
|
|
|
#include "mysql_priv.h"
|
|
|
|
HASH global_user_stats, global_client_stats, global_table_stats;
|
|
HASH global_index_stats;
|
|
/* Protects the above global stats */
|
|
extern pthread_mutex_t LOCK_global_user_client_stats;
|
|
extern pthread_mutex_t LOCK_global_table_stats;
|
|
extern pthread_mutex_t LOCK_global_index_stats;
|
|
|
|
#ifdef __WIN__
|
|
extern void win_install_sigabrt_handler();
|
|
#endif
|
|
|
|
/*
|
|
Get structure for logging connection data for the current user
|
|
*/
|
|
|
|
#ifndef NO_EMBEDDED_ACCESS_CHECKS
|
|
static HASH hash_user_connections;
|
|
|
|
int get_or_create_user_conn(THD *thd, const char *user,
|
|
const char *host,
|
|
USER_RESOURCES *mqh)
|
|
{
|
|
int return_val= 0;
|
|
size_t temp_len, user_len;
|
|
char temp_user[USER_HOST_BUFF_SIZE];
|
|
struct user_conn *uc;
|
|
|
|
DBUG_ASSERT(user != 0);
|
|
DBUG_ASSERT(host != 0);
|
|
DBUG_ASSERT(thd->user_connect == 0);
|
|
|
|
user_len= strlen(user);
|
|
temp_len= (strmov(strmov(temp_user, user)+1, host) - temp_user)+1;
|
|
(void) pthread_mutex_lock(&LOCK_user_conn);
|
|
if (!(uc = (struct user_conn *) hash_search(&hash_user_connections,
|
|
(uchar*) temp_user, temp_len)))
|
|
{
|
|
/* First connection for user; Create a user connection object */
|
|
if (!(uc= ((struct user_conn*)
|
|
my_malloc(sizeof(struct user_conn) + temp_len+1,
|
|
MYF(MY_WME)))))
|
|
{
|
|
/* MY_WME ensures an error is set in THD. */
|
|
return_val= 1;
|
|
goto end;
|
|
}
|
|
uc->user=(char*) (uc+1);
|
|
memcpy(uc->user,temp_user,temp_len+1);
|
|
uc->host= uc->user + user_len + 1;
|
|
uc->len= temp_len;
|
|
uc->connections= uc->questions= uc->updates= uc->conn_per_hour= 0;
|
|
uc->user_resources= *mqh;
|
|
uc->reset_utime= thd->thr_create_utime;
|
|
if (my_hash_insert(&hash_user_connections, (uchar*) uc))
|
|
{
|
|
/* The only possible error is out of memory, MY_WME sets an error. */
|
|
my_free((char*) uc,0);
|
|
return_val= 1;
|
|
goto end;
|
|
}
|
|
}
|
|
thd->user_connect=uc;
|
|
uc->connections++;
|
|
end:
|
|
(void) pthread_mutex_unlock(&LOCK_user_conn);
|
|
return return_val;
|
|
|
|
}
|
|
|
|
|
|
/*
|
|
check if user has already too many connections
|
|
|
|
SYNOPSIS
|
|
check_for_max_user_connections()
|
|
thd Thread handle
|
|
uc User connect object
|
|
|
|
NOTES
|
|
If check fails, we decrease user connection count, which means one
|
|
shouldn't call decrease_user_connections() after this function.
|
|
|
|
RETURN
|
|
0 ok
|
|
1 error
|
|
*/
|
|
|
|
int check_for_max_user_connections(THD *thd, USER_CONN *uc)
|
|
{
|
|
int error= 1;
|
|
DBUG_ENTER("check_for_max_user_connections");
|
|
|
|
(void) pthread_mutex_lock(&LOCK_user_conn);
|
|
if (max_user_connections && !uc->user_resources.user_conn &&
|
|
max_user_connections < (uint) uc->connections)
|
|
{
|
|
my_error(ER_TOO_MANY_USER_CONNECTIONS, MYF(0), uc->user);
|
|
goto end;
|
|
}
|
|
time_out_user_resource_limits(thd, uc);
|
|
if (uc->user_resources.user_conn &&
|
|
uc->user_resources.user_conn < uc->connections)
|
|
{
|
|
my_error(ER_USER_LIMIT_REACHED, MYF(0), uc->user,
|
|
"max_user_connections",
|
|
(long) uc->user_resources.user_conn);
|
|
goto end;
|
|
}
|
|
if (uc->user_resources.conn_per_hour &&
|
|
uc->user_resources.conn_per_hour <= uc->conn_per_hour)
|
|
{
|
|
my_error(ER_USER_LIMIT_REACHED, MYF(0), uc->user,
|
|
"max_connections_per_hour",
|
|
(long) uc->user_resources.conn_per_hour);
|
|
goto end;
|
|
}
|
|
uc->conn_per_hour++;
|
|
error= 0;
|
|
|
|
end:
|
|
if (error)
|
|
uc->connections--; // no need for decrease_user_connections() here
|
|
(void) pthread_mutex_unlock(&LOCK_user_conn);
|
|
DBUG_RETURN(error);
|
|
}
|
|
|
|
|
|
/*
|
|
Decrease user connection count
|
|
|
|
SYNOPSIS
|
|
decrease_user_connections()
|
|
uc User connection object
|
|
|
|
NOTES
|
|
If there is a n user connection object for a connection
|
|
(which only happens if 'max_user_connections' is defined or
|
|
if someone has created a resource grant for a user), then
|
|
the connection count is always incremented on connect.
|
|
|
|
The user connect object is not freed if some users has
|
|
'max connections per hour' defined as we need to be able to hold
|
|
count over the lifetime of the connection.
|
|
*/
|
|
|
|
void decrease_user_connections(USER_CONN *uc)
|
|
{
|
|
DBUG_ENTER("decrease_user_connections");
|
|
(void) pthread_mutex_lock(&LOCK_user_conn);
|
|
DBUG_ASSERT(uc->connections);
|
|
if (!--uc->connections && !mqh_used)
|
|
{
|
|
/* Last connection for user; Delete it */
|
|
(void) hash_delete(&hash_user_connections,(uchar*) uc);
|
|
}
|
|
(void) pthread_mutex_unlock(&LOCK_user_conn);
|
|
DBUG_VOID_RETURN;
|
|
}
|
|
|
|
|
|
/*
|
|
Reset per-hour user resource limits when it has been more than
|
|
an hour since they were last checked
|
|
|
|
SYNOPSIS:
|
|
time_out_user_resource_limits()
|
|
thd Thread handler
|
|
uc User connection details
|
|
|
|
NOTE:
|
|
This assumes that the LOCK_user_conn mutex has been acquired, so it is
|
|
safe to test and modify members of the USER_CONN structure.
|
|
*/
|
|
|
|
void time_out_user_resource_limits(THD *thd, USER_CONN *uc)
|
|
{
|
|
ulonglong check_time= thd->start_utime;
|
|
DBUG_ENTER("time_out_user_resource_limits");
|
|
|
|
/* If more than a hour since last check, reset resource checking */
|
|
if (check_time - uc->reset_utime >= LL(3600000000))
|
|
{
|
|
uc->questions=1;
|
|
uc->updates=0;
|
|
uc->conn_per_hour=0;
|
|
uc->reset_utime= check_time;
|
|
}
|
|
|
|
DBUG_VOID_RETURN;
|
|
}
|
|
|
|
/*
|
|
Check if maximum queries per hour limit has been reached
|
|
returns 0 if OK.
|
|
*/
|
|
|
|
bool check_mqh(THD *thd, uint check_command)
|
|
{
|
|
bool error= 0;
|
|
USER_CONN *uc=thd->user_connect;
|
|
DBUG_ENTER("check_mqh");
|
|
DBUG_ASSERT(uc != 0);
|
|
|
|
(void) pthread_mutex_lock(&LOCK_user_conn);
|
|
|
|
time_out_user_resource_limits(thd, uc);
|
|
|
|
/* Check that we have not done too many questions / hour */
|
|
if (uc->user_resources.questions &&
|
|
uc->questions++ >= uc->user_resources.questions)
|
|
{
|
|
my_error(ER_USER_LIMIT_REACHED, MYF(0), uc->user, "max_questions",
|
|
(long) uc->user_resources.questions);
|
|
error=1;
|
|
goto end;
|
|
}
|
|
if (check_command < (uint) SQLCOM_END)
|
|
{
|
|
/* Check that we have not done too many updates / hour */
|
|
if (uc->user_resources.updates &&
|
|
(sql_command_flags[check_command] & CF_CHANGES_DATA) &&
|
|
uc->updates++ >= uc->user_resources.updates)
|
|
{
|
|
my_error(ER_USER_LIMIT_REACHED, MYF(0), uc->user, "max_updates",
|
|
(long) uc->user_resources.updates);
|
|
error=1;
|
|
goto end;
|
|
}
|
|
}
|
|
end:
|
|
(void) pthread_mutex_unlock(&LOCK_user_conn);
|
|
DBUG_RETURN(error);
|
|
}
|
|
|
|
#endif /* NO_EMBEDDED_ACCESS_CHECKS */
|
|
|
|
|
|
/*
|
|
Check for maximum allowable user connections, if the mysqld server is
|
|
started with corresponding variable that is greater then 0.
|
|
*/
|
|
|
|
extern "C" uchar *get_key_conn(user_conn *buff, size_t *length,
|
|
my_bool not_used __attribute__((unused)))
|
|
{
|
|
*length= buff->len;
|
|
return (uchar*) buff->user;
|
|
}
|
|
|
|
|
|
extern "C" void free_user(struct user_conn *uc)
|
|
{
|
|
my_free((char*) uc,MYF(0));
|
|
}
|
|
|
|
|
|
void init_max_user_conn(void)
|
|
{
|
|
#ifndef NO_EMBEDDED_ACCESS_CHECKS
|
|
if (hash_init(&hash_user_connections,system_charset_info,max_connections,
|
|
0,0,
|
|
(hash_get_key) get_key_conn, (hash_free_key) free_user,
|
|
0))
|
|
{
|
|
sql_print_error("Initializing hash_user_connections failed.");
|
|
exit(1);
|
|
}
|
|
#endif
|
|
}
|
|
|
|
|
|
void free_max_user_conn(void)
|
|
{
|
|
#ifndef NO_EMBEDDED_ACCESS_CHECKS
|
|
hash_free(&hash_user_connections);
|
|
#endif /* NO_EMBEDDED_ACCESS_CHECKS */
|
|
}
|
|
|
|
|
|
void reset_mqh(LEX_USER *lu, bool get_them= 0)
|
|
{
|
|
#ifndef NO_EMBEDDED_ACCESS_CHECKS
|
|
(void) pthread_mutex_lock(&LOCK_user_conn);
|
|
if (lu) // for GRANT
|
|
{
|
|
USER_CONN *uc;
|
|
uint temp_len=lu->user.length+lu->host.length+2;
|
|
char temp_user[USER_HOST_BUFF_SIZE];
|
|
|
|
memcpy(temp_user,lu->user.str,lu->user.length);
|
|
memcpy(temp_user+lu->user.length+1,lu->host.str,lu->host.length);
|
|
temp_user[lu->user.length]='\0'; temp_user[temp_len-1]=0;
|
|
if ((uc = (struct user_conn *) hash_search(&hash_user_connections,
|
|
(uchar*) temp_user, temp_len)))
|
|
{
|
|
uc->questions=0;
|
|
get_mqh(temp_user,&temp_user[lu->user.length+1],uc);
|
|
uc->updates=0;
|
|
uc->conn_per_hour=0;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
/* for FLUSH PRIVILEGES and FLUSH USER_RESOURCES */
|
|
for (uint idx=0;idx < hash_user_connections.records; idx++)
|
|
{
|
|
USER_CONN *uc=(struct user_conn *) hash_element(&hash_user_connections,
|
|
idx);
|
|
if (get_them)
|
|
get_mqh(uc->user,uc->host,uc);
|
|
uc->questions=0;
|
|
uc->updates=0;
|
|
uc->conn_per_hour=0;
|
|
}
|
|
}
|
|
(void) pthread_mutex_unlock(&LOCK_user_conn);
|
|
#endif /* NO_EMBEDDED_ACCESS_CHECKS */
|
|
}
|
|
|
|
/*****************************************************************************
|
|
Handle users statistics
|
|
*****************************************************************************/
|
|
|
|
/* 'mysql_system_user' is used for when the user is not defined for a THD. */
|
|
static const char mysql_system_user[]= "#mysql_system#";
|
|
|
|
// Returns 'user' if it's not NULL. Returns 'mysql_system_user' otherwise.
|
|
static const char * get_valid_user_string(char* user)
|
|
{
|
|
return user ? user : mysql_system_user;
|
|
}
|
|
|
|
/*
|
|
Returns string as 'IP' for the client-side of the connection represented by
|
|
'client'. Does not allocate memory. May return "".
|
|
*/
|
|
|
|
static const char *get_client_host(THD *client)
|
|
{
|
|
return client->security_ctx->host_or_ip[0] ?
|
|
client->security_ctx->host_or_ip :
|
|
client->security_ctx->host ? client->security_ctx->host : "";
|
|
}
|
|
|
|
extern "C" uchar *get_key_user_stats(USER_STATS *user_stats, size_t *length,
|
|
my_bool not_used __attribute__((unused)))
|
|
{
|
|
*length= user_stats->user_name_length;
|
|
return (uchar*) user_stats->user;
|
|
}
|
|
|
|
void free_user_stats(USER_STATS* user_stats)
|
|
{
|
|
my_free(user_stats, MYF(0));
|
|
}
|
|
|
|
void init_user_stats(USER_STATS *user_stats,
|
|
const char *user,
|
|
size_t user_length,
|
|
const char *priv_user,
|
|
uint total_connections,
|
|
uint concurrent_connections,
|
|
time_t connected_time,
|
|
double busy_time,
|
|
double cpu_time,
|
|
ulonglong bytes_received,
|
|
ulonglong bytes_sent,
|
|
ulonglong binlog_bytes_written,
|
|
ha_rows rows_sent,
|
|
ha_rows rows_read,
|
|
ha_rows rows_inserted,
|
|
ha_rows rows_deleted,
|
|
ha_rows rows_updated,
|
|
ulonglong select_commands,
|
|
ulonglong update_commands,
|
|
ulonglong other_commands,
|
|
ulonglong commit_trans,
|
|
ulonglong rollback_trans,
|
|
ulonglong denied_connections,
|
|
ulonglong lost_connections,
|
|
ulonglong access_denied_errors,
|
|
ulonglong empty_queries)
|
|
{
|
|
DBUG_ENTER("init_user_stats");
|
|
DBUG_PRINT("enter", ("user: %s priv_user: %s", user, priv_user));
|
|
|
|
user_length= min(user_length, sizeof(user_stats->user)-1);
|
|
memcpy(user_stats->user, user, user_length);
|
|
user_stats->user[user_length]= 0;
|
|
user_stats->user_name_length= user_length;
|
|
strmake(user_stats->priv_user, priv_user, sizeof(user_stats->priv_user)-1);
|
|
|
|
user_stats->total_connections= total_connections;
|
|
user_stats->concurrent_connections= concurrent_connections;
|
|
user_stats->connected_time= connected_time;
|
|
user_stats->busy_time= busy_time;
|
|
user_stats->cpu_time= cpu_time;
|
|
user_stats->bytes_received= bytes_received;
|
|
user_stats->bytes_sent= bytes_sent;
|
|
user_stats->binlog_bytes_written= binlog_bytes_written;
|
|
user_stats->rows_sent= rows_sent;
|
|
user_stats->rows_updated= rows_updated;
|
|
user_stats->rows_read= rows_read;
|
|
user_stats->select_commands= select_commands;
|
|
user_stats->update_commands= update_commands;
|
|
user_stats->other_commands= other_commands;
|
|
user_stats->commit_trans= commit_trans;
|
|
user_stats->rollback_trans= rollback_trans;
|
|
user_stats->denied_connections= denied_connections;
|
|
user_stats->lost_connections= lost_connections;
|
|
user_stats->access_denied_errors= access_denied_errors;
|
|
user_stats->empty_queries= empty_queries;
|
|
DBUG_VOID_RETURN;
|
|
}
|
|
|
|
|
|
#ifdef COMPLEAT_PATCH_NOT_ADDED_YET
|
|
|
|
void add_user_stats(USER_STATS *user_stats,
|
|
uint total_connections,
|
|
uint concurrent_connections,
|
|
time_t connected_time,
|
|
double busy_time,
|
|
double cpu_time,
|
|
ulonglong bytes_received,
|
|
ulonglong bytes_sent,
|
|
ulonglong binlog_bytes_written,
|
|
ha_rows rows_sent,
|
|
ha_rows rows_read,
|
|
ha_rows rows_inserted,
|
|
ha_rows rows_deleted,
|
|
ha_rows rows_updated,
|
|
ulonglong select_commands,
|
|
ulonglong update_commands,
|
|
ulonglong other_commands,
|
|
ulonglong commit_trans,
|
|
ulonglong rollback_trans,
|
|
ulonglong denied_connections,
|
|
ulonglong lost_connections,
|
|
ulonglong access_denied_errors,
|
|
ulonglong empty_queries)
|
|
{
|
|
user_stats->total_connections+= total_connections;
|
|
user_stats->concurrent_connections+= concurrent_connections;
|
|
user_stats->connected_time+= connected_time;
|
|
user_stats->busy_time+= busy_time;
|
|
user_stats->cpu_time+= cpu_time;
|
|
user_stats->bytes_received+= bytes_received;
|
|
user_stats->bytes_sent+= bytes_sent;
|
|
user_stats->binlog_bytes_written+= binlog_bytes_written;
|
|
user_stats->rows_sent+= rows_sent;
|
|
user_stats->rows_inserted+= rows_inserted;
|
|
user_stats->rows_deleted+= rows_deleted;
|
|
user_stats->rows_updated+= rows_updated;
|
|
user_stats->rows_read+= rows_read;
|
|
user_stats->select_commands+= select_commands;
|
|
user_stats->update_commands+= update_commands;
|
|
user_stats->other_commands+= other_commands;
|
|
user_stats->commit_trans+= commit_trans;
|
|
user_stats->rollback_trans+= rollback_trans;
|
|
user_stats->denied_connections+= denied_connections;
|
|
user_stats->lost_connections+= lost_connections;
|
|
user_stats->access_denied_errors+= access_denied_errors;
|
|
user_stats->empty_queries+= empty_queries;
|
|
}
|
|
#endif
|
|
|
|
|
|
void init_global_user_stats(void)
|
|
{
|
|
if (hash_init(&global_user_stats, system_charset_info, max_connections,
|
|
0, 0, (hash_get_key) get_key_user_stats,
|
|
(hash_free_key)free_user_stats, 0))
|
|
{
|
|
sql_print_error("Initializing global_user_stats failed.");
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
void init_global_client_stats(void)
|
|
{
|
|
if (hash_init(&global_client_stats, system_charset_info, max_connections,
|
|
0, 0, (hash_get_key) get_key_user_stats,
|
|
(hash_free_key)free_user_stats, 0))
|
|
{
|
|
sql_print_error("Initializing global_client_stats failed.");
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
extern "C" uchar *get_key_table_stats(TABLE_STATS *table_stats, size_t *length,
|
|
my_bool not_used __attribute__((unused)))
|
|
{
|
|
*length= table_stats->table_name_length;
|
|
return (uchar*) table_stats->table;
|
|
}
|
|
|
|
extern "C" void free_table_stats(TABLE_STATS* table_stats)
|
|
{
|
|
my_free(table_stats, MYF(0));
|
|
}
|
|
|
|
void init_global_table_stats(void)
|
|
{
|
|
if (hash_init(&global_table_stats, system_charset_info, max_connections,
|
|
0, 0, (hash_get_key) get_key_table_stats,
|
|
(hash_free_key)free_table_stats, 0)) {
|
|
sql_print_error("Initializing global_table_stats failed.");
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
extern "C" uchar *get_key_index_stats(INDEX_STATS *index_stats, size_t *length,
|
|
my_bool not_used __attribute__((unused)))
|
|
{
|
|
*length= index_stats->index_name_length;
|
|
return (uchar*) index_stats->index;
|
|
}
|
|
|
|
extern "C" void free_index_stats(INDEX_STATS* index_stats)
|
|
{
|
|
my_free(index_stats, MYF(0));
|
|
}
|
|
|
|
void init_global_index_stats(void)
|
|
{
|
|
if (hash_init(&global_index_stats, system_charset_info, max_connections,
|
|
0, 0, (hash_get_key) get_key_index_stats,
|
|
(hash_free_key)free_index_stats, 0))
|
|
{
|
|
sql_print_error("Initializing global_index_stats failed.");
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
|
|
void free_global_user_stats(void)
|
|
{
|
|
hash_free(&global_user_stats);
|
|
}
|
|
|
|
void free_global_table_stats(void)
|
|
{
|
|
hash_free(&global_table_stats);
|
|
}
|
|
|
|
void free_global_index_stats(void)
|
|
{
|
|
hash_free(&global_index_stats);
|
|
}
|
|
|
|
void free_global_client_stats(void)
|
|
{
|
|
hash_free(&global_client_stats);
|
|
}
|
|
|
|
/*
|
|
Increments the global stats connection count for an entry from
|
|
global_client_stats or global_user_stats. Returns 0 on success
|
|
and 1 on error.
|
|
*/
|
|
|
|
static bool increment_count_by_name(const char *name, size_t name_length,
|
|
const char *role_name,
|
|
HASH *users_or_clients, THD *thd)
|
|
{
|
|
USER_STATS *user_stats;
|
|
|
|
if (!(user_stats= (USER_STATS*) hash_search(users_or_clients, (uchar*) name,
|
|
name_length)))
|
|
{
|
|
/* First connection for this user or client */
|
|
if (!(user_stats= ((USER_STATS*)
|
|
my_malloc(sizeof(USER_STATS),
|
|
MYF(MY_WME | MY_ZEROFILL)))))
|
|
return TRUE; // Out of memory
|
|
|
|
init_user_stats(user_stats, name, name_length, role_name,
|
|
0, 0, // connections
|
|
0, 0, 0, // time
|
|
0, 0, 0, // bytes sent, received and written
|
|
0, 0, // Rows sent and read
|
|
0, 0, 0, // rows inserted, deleted and updated
|
|
0, 0, 0, // select, update and other commands
|
|
0, 0, // commit and rollback trans
|
|
thd->status_var.access_denied_errors,
|
|
0, // lost connections
|
|
0, // access denied errors
|
|
0); // empty queries
|
|
|
|
if (my_hash_insert(users_or_clients, (uchar*)user_stats))
|
|
{
|
|
my_free(user_stats, 0);
|
|
return TRUE; // Out of memory
|
|
}
|
|
}
|
|
user_stats->total_connections++;
|
|
return FALSE;
|
|
}
|
|
|
|
|
|
/*
|
|
Increments the global user and client stats connection count.
|
|
|
|
@param use_lock if true, LOCK_global_user_client_stats will be locked
|
|
|
|
@retval 0 ok
|
|
@retval 1 error.
|
|
*/
|
|
|
|
#ifndef EMBEDDED_LIBRARY
|
|
static bool increment_connection_count(THD* thd, bool use_lock)
|
|
{
|
|
const char *user_string= get_valid_user_string(thd->main_security_ctx.user);
|
|
const char *client_string= get_client_host(thd);
|
|
bool return_value= FALSE;
|
|
|
|
if (!thd->userstat_running)
|
|
return FALSE;
|
|
|
|
if (use_lock)
|
|
pthread_mutex_lock(&LOCK_global_user_client_stats);
|
|
|
|
if (increment_count_by_name(user_string, strlen(user_string), user_string,
|
|
&global_user_stats, thd))
|
|
{
|
|
return_value= TRUE;
|
|
goto end;
|
|
}
|
|
if (increment_count_by_name(client_string, strlen(client_string),
|
|
user_string, &global_client_stats, thd))
|
|
{
|
|
return_value= TRUE;
|
|
goto end;
|
|
}
|
|
|
|
end:
|
|
if (use_lock)
|
|
pthread_mutex_unlock(&LOCK_global_user_client_stats);
|
|
return return_value;
|
|
}
|
|
#endif
|
|
|
|
/*
|
|
Used to update the global user and client stats
|
|
*/
|
|
|
|
static void update_global_user_stats_with_user(THD *thd,
|
|
USER_STATS *user_stats,
|
|
time_t now)
|
|
{
|
|
DBUG_ASSERT(thd->userstat_running);
|
|
|
|
user_stats->connected_time+= now - thd->last_global_update_time;
|
|
user_stats->busy_time+= (thd->status_var.busy_time -
|
|
thd->org_status_var.busy_time);
|
|
user_stats->cpu_time+= (thd->status_var.cpu_time -
|
|
thd->org_status_var.cpu_time);
|
|
/*
|
|
This is handle specially as bytes_recieved is incremented BEFORE
|
|
org_status_var is copied.
|
|
*/
|
|
user_stats->bytes_received+= (thd->org_status_var.bytes_received-
|
|
thd->start_bytes_received);
|
|
user_stats->bytes_sent+= (thd->status_var.bytes_sent -
|
|
thd->org_status_var.bytes_sent);
|
|
user_stats->binlog_bytes_written+=
|
|
(thd->status_var.binlog_bytes_written -
|
|
thd->org_status_var.binlog_bytes_written);
|
|
/* We are not counting rows in internal temporary tables here ! */
|
|
user_stats->rows_read+= (thd->status_var.rows_read -
|
|
thd->org_status_var.rows_read);
|
|
user_stats->rows_sent+= (thd->status_var.rows_sent -
|
|
thd->org_status_var.rows_sent);
|
|
user_stats->rows_inserted+= (thd->status_var.ha_write_count -
|
|
thd->org_status_var.ha_write_count);
|
|
user_stats->rows_deleted+= (thd->status_var.ha_delete_count -
|
|
thd->org_status_var.ha_delete_count);
|
|
user_stats->rows_updated+= (thd->status_var.ha_update_count -
|
|
thd->org_status_var.ha_update_count);
|
|
user_stats->select_commands+= thd->select_commands;
|
|
user_stats->update_commands+= thd->update_commands;
|
|
user_stats->other_commands+= thd->other_commands;
|
|
user_stats->commit_trans+= (thd->status_var.ha_commit_count -
|
|
thd->org_status_var.ha_commit_count);
|
|
user_stats->rollback_trans+= (thd->status_var.ha_rollback_count +
|
|
thd->status_var.ha_savepoint_rollback_count -
|
|
thd->org_status_var.ha_rollback_count -
|
|
thd->org_status_var.
|
|
ha_savepoint_rollback_count);
|
|
user_stats->access_denied_errors+=
|
|
(thd->status_var.access_denied_errors -
|
|
thd->org_status_var.access_denied_errors);
|
|
user_stats->empty_queries+= (thd->status_var.empty_queries -
|
|
thd->org_status_var.empty_queries);
|
|
|
|
/* The following can only contain 0 or 1 and then connection ends */
|
|
user_stats->denied_connections+= thd->status_var.access_denied_errors;
|
|
user_stats->lost_connections+= thd->status_var.lost_connections;
|
|
}
|
|
|
|
|
|
/* Updates the global stats of a user or client */
|
|
void update_global_user_stats(THD *thd, bool create_user, time_t now)
|
|
{
|
|
const char *user_string, *client_string;
|
|
USER_STATS *user_stats;
|
|
size_t user_string_length, client_string_length;
|
|
DBUG_ASSERT(thd->userstat_running);
|
|
|
|
user_string= get_valid_user_string(thd->main_security_ctx.user);
|
|
user_string_length= strlen(user_string);
|
|
client_string= get_client_host(thd);
|
|
client_string_length= strlen(client_string);
|
|
|
|
pthread_mutex_lock(&LOCK_global_user_client_stats);
|
|
|
|
// Update by user name
|
|
if ((user_stats= (USER_STATS*) hash_search(&global_user_stats,
|
|
(uchar*) user_string,
|
|
user_string_length)))
|
|
{
|
|
/* Found user. */
|
|
update_global_user_stats_with_user(thd, user_stats, now);
|
|
}
|
|
else
|
|
{
|
|
/* Create the entry */
|
|
if (create_user)
|
|
{
|
|
increment_count_by_name(user_string, user_string_length, user_string,
|
|
&global_user_stats, thd);
|
|
}
|
|
}
|
|
|
|
/* Update by client IP */
|
|
if ((user_stats= (USER_STATS*)hash_search(&global_client_stats,
|
|
(uchar*) client_string,
|
|
client_string_length)))
|
|
{
|
|
// Found by client IP
|
|
update_global_user_stats_with_user(thd, user_stats, now);
|
|
}
|
|
else
|
|
{
|
|
// Create the entry
|
|
if (create_user)
|
|
{
|
|
increment_count_by_name(client_string, client_string_length,
|
|
user_string, &global_client_stats, thd);
|
|
}
|
|
}
|
|
/* Reset variables only used for counting */
|
|
thd->select_commands= thd->update_commands= thd->other_commands= 0;
|
|
thd->last_global_update_time= now;
|
|
|
|
pthread_mutex_unlock(&LOCK_global_user_client_stats);
|
|
}
|
|
|
|
|
|
/**
|
|
Set thread character set variables from the given ID
|
|
|
|
@param thd thread handle
|
|
@param cs_number character set and collation ID
|
|
|
|
@retval 0 OK; character_set_client, collation_connection and
|
|
character_set_results are set to the new value,
|
|
or to the default global values.
|
|
|
|
@retval 1 error, e.g. the given ID is not supported by parser.
|
|
Corresponding SQL error is sent.
|
|
*/
|
|
|
|
bool thd_init_client_charset(THD *thd, uint cs_number)
|
|
{
|
|
CHARSET_INFO *cs;
|
|
/*
|
|
Use server character set and collation if
|
|
- opt_character_set_client_handshake is not set
|
|
- client has not specified a character set
|
|
- client character set is the same as the servers
|
|
- client character set doesn't exists in server
|
|
*/
|
|
if (!opt_character_set_client_handshake ||
|
|
!(cs= get_charset(cs_number, MYF(0))) ||
|
|
!my_strcasecmp(&my_charset_latin1,
|
|
global_system_variables.character_set_client->name,
|
|
cs->name))
|
|
{
|
|
thd->variables.character_set_client=
|
|
global_system_variables.character_set_client;
|
|
thd->variables.collation_connection=
|
|
global_system_variables.collation_connection;
|
|
thd->variables.character_set_results=
|
|
global_system_variables.character_set_results;
|
|
}
|
|
else
|
|
{
|
|
if (!is_supported_parser_charset(cs))
|
|
{
|
|
/* Disallow non-supported parser character sets: UCS2, UTF16, UTF32 */
|
|
my_error(ER_WRONG_VALUE_FOR_VAR, MYF(0), "character_set_client",
|
|
cs->csname);
|
|
return true;
|
|
}
|
|
thd->variables.character_set_results=
|
|
thd->variables.collation_connection=
|
|
thd->variables.character_set_client= cs;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
|
|
/*
|
|
Initialize connection threads
|
|
*/
|
|
|
|
bool init_new_connection_handler_thread()
|
|
{
|
|
pthread_detach_this_thread();
|
|
#if defined(__WIN__)
|
|
win_install_sigabrt_handler();
|
|
#else
|
|
/* Win32 calls this in pthread_create */
|
|
if (my_thread_init())
|
|
return 1;
|
|
#endif /* __WIN__ */
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
Perform handshake, authorize client and update thd ACL variables.
|
|
|
|
SYNOPSIS
|
|
check_connection()
|
|
thd thread handle
|
|
|
|
RETURN
|
|
0 success, thd is updated.
|
|
1 error
|
|
*/
|
|
|
|
#ifndef EMBEDDED_LIBRARY
|
|
static int check_connection(THD *thd)
|
|
{
|
|
uint connect_errors= 0;
|
|
NET *net= &thd->net;
|
|
|
|
DBUG_PRINT("info",
|
|
("New connection received on %s", vio_description(net->vio)));
|
|
#ifdef SIGNAL_WITH_VIO_CLOSE
|
|
thd->set_active_vio(net->vio);
|
|
#endif
|
|
|
|
if (!thd->main_security_ctx.host) // If TCP/IP connection
|
|
{
|
|
char ip[30];
|
|
|
|
if (vio_peer_addr(net->vio, ip, &thd->peer_port))
|
|
{
|
|
my_error(ER_BAD_HOST_ERROR, MYF(0), thd->main_security_ctx.host_or_ip);
|
|
return 1;
|
|
}
|
|
if (!(thd->main_security_ctx.ip= my_strdup(ip,MYF(MY_WME))))
|
|
return 1; /* The error is set by my_strdup(). */
|
|
thd->main_security_ctx.host_or_ip= thd->main_security_ctx.ip;
|
|
vio_in_addr(net->vio,&thd->remote.sin_addr);
|
|
if (!(specialflag & SPECIAL_NO_RESOLVE))
|
|
{
|
|
vio_in_addr(net->vio,&thd->remote.sin_addr);
|
|
thd->main_security_ctx.host=
|
|
ip_to_hostname(&thd->remote.sin_addr, &connect_errors);
|
|
/* Cut very long hostnames to avoid possible overflows */
|
|
if (thd->main_security_ctx.host)
|
|
{
|
|
if (thd->main_security_ctx.host != my_localhost)
|
|
thd->main_security_ctx.host[min(strlen(thd->main_security_ctx.host),
|
|
HOSTNAME_LENGTH)]= 0;
|
|
thd->main_security_ctx.host_or_ip= thd->main_security_ctx.host;
|
|
}
|
|
if (connect_errors > max_connect_errors)
|
|
{
|
|
my_error(ER_HOST_IS_BLOCKED, MYF(0), thd->main_security_ctx.host_or_ip);
|
|
return 1;
|
|
}
|
|
}
|
|
DBUG_PRINT("info",("Host: %s ip: %s",
|
|
(thd->main_security_ctx.host ?
|
|
thd->main_security_ctx.host : "unknown host"),
|
|
(thd->main_security_ctx.ip ?
|
|
thd->main_security_ctx.ip : "unknown ip")));
|
|
if (acl_check_host(thd->main_security_ctx.host, thd->main_security_ctx.ip))
|
|
{
|
|
my_error(ER_HOST_NOT_PRIVILEGED, MYF(0),
|
|
thd->main_security_ctx.host_or_ip);
|
|
return 1;
|
|
}
|
|
}
|
|
else /* Hostname given means that the connection was on a socket */
|
|
{
|
|
DBUG_PRINT("info",("Host: %s", thd->main_security_ctx.host));
|
|
thd->main_security_ctx.host_or_ip= thd->main_security_ctx.host;
|
|
thd->main_security_ctx.ip= 0;
|
|
/* Reset sin_addr */
|
|
bzero((char*) &thd->remote, sizeof(thd->remote));
|
|
}
|
|
vio_keepalive(net->vio, TRUE);
|
|
|
|
if (thd->packet.alloc(thd->variables.net_buffer_length))
|
|
return 1; /* The error is set by alloc(). */
|
|
|
|
return acl_authenticate(thd, connect_errors, 0);
|
|
}
|
|
|
|
|
|
/*
|
|
Setup thread to be used with the current thread
|
|
|
|
SYNOPSIS
|
|
bool setup_connection_thread_globals()
|
|
thd Thread/connection handler
|
|
|
|
RETURN
|
|
0 ok
|
|
1 Error (out of memory)
|
|
In this case we will close the connection and increment status
|
|
*/
|
|
|
|
bool setup_connection_thread_globals(THD *thd)
|
|
{
|
|
if (thd->store_globals())
|
|
{
|
|
close_connection(thd, ER_OUT_OF_RESOURCES, 1);
|
|
statistic_increment(aborted_connects,&LOCK_status);
|
|
thd->scheduler->end_thread(thd, 0);
|
|
return 1; // Error
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
/*
|
|
Autenticate user, with error reporting
|
|
|
|
SYNOPSIS
|
|
login_connection()
|
|
thd Thread handler
|
|
|
|
NOTES
|
|
Connection is not closed in case of errors
|
|
|
|
RETURN
|
|
0 ok
|
|
1 error
|
|
*/
|
|
|
|
bool login_connection(THD *thd)
|
|
{
|
|
NET *net= &thd->net;
|
|
int error;
|
|
DBUG_ENTER("login_connection");
|
|
DBUG_PRINT("info", ("login_connection called by thread %lu",
|
|
thd->thread_id));
|
|
|
|
/* Use "connect_timeout" value during connection phase */
|
|
my_net_set_read_timeout(net, connect_timeout);
|
|
my_net_set_write_timeout(net, connect_timeout);
|
|
|
|
error= check_connection(thd);
|
|
net_end_statement(thd);
|
|
|
|
if (error)
|
|
{ // Wrong permissions
|
|
#ifdef __NT__
|
|
if (vio_type(net->vio) == VIO_TYPE_NAMEDPIPE)
|
|
my_sleep(1000); /* must wait after eof() */
|
|
#endif
|
|
statistic_increment(aborted_connects,&LOCK_status);
|
|
DBUG_RETURN(1);
|
|
}
|
|
/* Connect completed, set read/write timeouts back to default */
|
|
my_net_set_read_timeout(net, thd->variables.net_read_timeout);
|
|
my_net_set_write_timeout(net, thd->variables.net_write_timeout);
|
|
|
|
/* Updates global user connection stats. */
|
|
if (increment_connection_count(thd, TRUE))
|
|
{
|
|
net_send_error(thd, ER_OUTOFMEMORY); // Out of memory
|
|
DBUG_RETURN(1);
|
|
}
|
|
|
|
DBUG_RETURN(0);
|
|
}
|
|
|
|
|
|
/*
|
|
Close an established connection
|
|
|
|
NOTES
|
|
This mainly updates status variables
|
|
*/
|
|
|
|
void end_connection(THD *thd)
|
|
{
|
|
NET *net= &thd->net;
|
|
plugin_thdvar_cleanup(thd);
|
|
|
|
if (thd->user_connect)
|
|
{
|
|
/*
|
|
We decrease this variable early to make it easy to log again quickly.
|
|
This code is not critical as we will in any case do this test
|
|
again in thd->cleanup()
|
|
*/
|
|
decrease_user_connections(thd->user_connect);
|
|
thd->user_connect= 0;
|
|
}
|
|
|
|
if (thd->killed || (net->error && net->vio != 0))
|
|
{
|
|
statistic_increment(aborted_threads,&LOCK_status);
|
|
status_var_increment(thd->status_var.lost_connections);
|
|
}
|
|
|
|
if (net->error && net->vio != 0)
|
|
{
|
|
if (!thd->killed && thd->variables.log_warnings > 1)
|
|
{
|
|
Security_context *sctx= thd->security_ctx;
|
|
|
|
sql_print_warning(ER(ER_NEW_ABORTING_CONNECTION),
|
|
thd->thread_id,(thd->db ? thd->db : "unconnected"),
|
|
sctx->user ? sctx->user : "unauthenticated",
|
|
sctx->host_or_ip,
|
|
(thd->main_da.is_error() ? thd->main_da.message() :
|
|
ER(ER_UNKNOWN_ERROR)));
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
Initialize THD to handle queries
|
|
*/
|
|
|
|
void prepare_new_connection_state(THD* thd)
|
|
{
|
|
Security_context *sctx= thd->security_ctx;
|
|
|
|
#ifdef __NETWARE__
|
|
netware_reg_user(sctx->ip, sctx->user, "MySQL");
|
|
#endif
|
|
|
|
if (thd->variables.max_join_size == HA_POS_ERROR)
|
|
thd->options |= OPTION_BIG_SELECTS;
|
|
if (thd->client_capabilities & CLIENT_COMPRESS)
|
|
thd->net.compress=1; // Use compression
|
|
|
|
/*
|
|
Much of this is duplicated in create_embedded_thd() for the
|
|
embedded server library.
|
|
TODO: refactor this to avoid code duplication there
|
|
*/
|
|
thd->version= refresh_version;
|
|
thd->proc_info= 0;
|
|
thd->command= COM_SLEEP;
|
|
thd->set_time();
|
|
thd->init_for_queries();
|
|
|
|
if (sys_init_connect.value_length && !(sctx->master_access & SUPER_ACL))
|
|
{
|
|
execute_init_command(thd, &sys_init_connect, &LOCK_sys_init_connect);
|
|
if (thd->is_error())
|
|
{
|
|
thd->killed= KILL_CONNECTION;
|
|
sql_print_warning(ER(ER_NEW_ABORTING_CONNECTION),
|
|
thd->thread_id,(thd->db ? thd->db : "unconnected"),
|
|
sctx->user ? sctx->user : "unauthenticated",
|
|
sctx->host_or_ip, "init_connect command failed");
|
|
sql_print_warning("%s", thd->main_da.message());
|
|
}
|
|
thd->proc_info=0;
|
|
thd->set_time();
|
|
thd->init_for_queries();
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
Thread handler for a connection
|
|
|
|
SYNOPSIS
|
|
handle_one_connection()
|
|
arg Connection object (THD)
|
|
|
|
IMPLEMENTATION
|
|
This function (normally) does the following:
|
|
- Initialize thread
|
|
- Initialize THD to be used with this thread
|
|
- Authenticate user
|
|
- Execute all queries sent on the connection
|
|
- Take connection down
|
|
- End thread / Handle next connection using thread from thread cache
|
|
*/
|
|
|
|
pthread_handler_t handle_one_connection(void *arg)
|
|
{
|
|
THD *thd= (THD*) arg;
|
|
|
|
thd->thr_create_utime= microsecond_interval_timer();
|
|
|
|
if (thread_scheduler.init_new_connection_thread())
|
|
{
|
|
close_connection(thd, ER_OUT_OF_RESOURCES, 1);
|
|
statistic_increment(aborted_connects,&LOCK_status);
|
|
thd->scheduler->end_thread(thd,0);
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
If a thread was created to handle this connection:
|
|
increment slow_launch_threads counter if it took more than
|
|
slow_launch_time seconds to create the thread.
|
|
*/
|
|
if (thd->prior_thr_create_utime)
|
|
{
|
|
ulong launch_time= (ulong) (thd->thr_create_utime -
|
|
thd->prior_thr_create_utime);
|
|
if (launch_time >= slow_launch_time*1000000L)
|
|
statistic_increment(slow_launch_threads, &LOCK_status);
|
|
thd->prior_thr_create_utime= 0;
|
|
}
|
|
|
|
/*
|
|
handle_one_connection() is normally the only way a thread would
|
|
start and would always be on the very high end of the stack ,
|
|
therefore, the thread stack always starts at the address of the
|
|
first local variable of handle_one_connection, which is thd. We
|
|
need to know the start of the stack so that we could check for
|
|
stack overruns.
|
|
*/
|
|
thd->thread_stack= (char*) &thd;
|
|
if (setup_connection_thread_globals(thd))
|
|
return 0;
|
|
|
|
for (;;)
|
|
{
|
|
NET *net= &thd->net;
|
|
bool create_user= TRUE;
|
|
|
|
lex_start(thd);
|
|
if (login_connection(thd))
|
|
{
|
|
create_user= FALSE;
|
|
goto end_thread;
|
|
}
|
|
|
|
prepare_new_connection_state(thd);
|
|
|
|
while (!net->error && net->vio != 0 &&
|
|
thd->killed < KILL_CONNECTION)
|
|
{
|
|
if (do_command(thd))
|
|
break;
|
|
}
|
|
end_connection(thd);
|
|
|
|
end_thread:
|
|
close_connection(thd, 0, 1);
|
|
if (thd->userstat_running)
|
|
update_global_user_stats(thd, create_user, time(NULL));
|
|
|
|
if (thd->scheduler->end_thread(thd,1))
|
|
return 0; // Probably no-threads
|
|
|
|
/*
|
|
If end_thread() returns, this thread has been schedule to
|
|
handle the next connection.
|
|
*/
|
|
thd= current_thd;
|
|
thd->thread_stack= (char*) &thd;
|
|
}
|
|
}
|
|
#endif /* EMBEDDED_LIBRARY */
|