mirror of
https://github.com/MariaDB/server.git
synced 2025-02-02 20:11:42 +01:00
62b5a56191
Analysis: There is race between drop table and encryption threads that could cause encryption thread to enter mutex that has been already released. Fix: When destroying crypt_data first enter the mutex and set crypt data unavailable, then release the memory and clean up the data. This should make the race more unprobable. Additionally, added big_test for create_or_replace as it could fail testcase timeout if you have slow I/O (tested that testcase passes with --mem). |
||
---|---|---|
.. | ||
fil0crypt.cc | ||
fil0fil.cc | ||
fil0pagecompress.cc |