2015-04-01 11:50:21 +03:00
|
|
|
/*****************************************************************************
|
2015-06-05 08:41:10 +03:00
|
|
|
Copyright (C) 2013, 2015, Google Inc. All Rights Reserved.
|
MDEV-11638 Encryption causes race conditions in InnoDB shutdown
InnoDB shutdown failed to properly take fil_crypt_thread() into account.
The encryption threads were signalled to shut down together with other
non-critical tasks. This could be much too early in case of slow shutdown,
which could need minutes to complete the purge. Furthermore, InnoDB
failed to wait for the fil_crypt_thread() to actually exit before
proceeding to the final steps of shutdown, causing the race conditions.
Furthermore, the log_scrub_thread() was shut down way too early.
Also it should remain until the SRV_SHUTDOWN_FLUSH_PHASE.
fil_crypt_threads_end(): Remove. This would cause the threads to
be terminated way too early.
srv_buf_dump_thread_active, srv_dict_stats_thread_active,
lock_sys->timeout_thread_active, log_scrub_thread_active,
srv_monitor_active, srv_error_monitor_active: Remove a race condition
between startup and shutdown, by setting these in the startup thread
that creates threads, not in each created thread. In this way, once the
flag is cleared, it will remain cleared during shutdown.
srv_n_fil_crypt_threads_started, fil_crypt_threads_event: Declare in
global rather than static scope.
log_scrub_event, srv_log_scrub_thread_active, log_scrub_thread():
Declare in static rather than global scope. Let these be created by
log_init() and freed by log_shutdown().
rotate_thread_t::should_shutdown(): Do not shut down before the
SRV_SHUTDOWN_FLUSH_PHASE.
srv_any_background_threads_are_active(): Remove. These checks now
exist in logs_empty_and_mark_files_at_shutdown().
logs_empty_and_mark_files_at_shutdown(): Shut down the threads in
the proper order. Keep fil_crypt_thread() and log_scrub_thread() alive
until SRV_SHUTDOWN_FLUSH_PHASE, and check that they actually terminate.
2017-01-04 18:43:32 +02:00
|
|
|
Copyright (c) 2015, 2017, MariaDB Corporation.
|
2015-04-01 11:50:21 +03:00
|
|
|
|
|
|
|
This program is free software; you can redistribute it and/or modify it under
|
|
|
|
the terms of the GNU General Public License as published by the Free Software
|
|
|
|
Foundation; version 2 of the License.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful, but WITHOUT
|
|
|
|
ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
|
|
|
|
FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License along with
|
|
|
|
this program; if not, write to the Free Software Foundation, Inc.,
|
|
|
|
51 Franklin Street, Suite 500, Boston, MA 02110-1335 USA
|
|
|
|
|
|
|
|
*****************************************************************************/
|
|
|
|
|
|
|
|
/**************************************************//**
|
|
|
|
@file include/fil0crypt.h
|
|
|
|
The low-level file system encryption support functions
|
|
|
|
|
|
|
|
Created 04/01/2015 Jan Lindström
|
|
|
|
*******************************************************/
|
|
|
|
|
|
|
|
#ifndef fil0crypt_h
|
|
|
|
#define fil0crypt_h
|
|
|
|
|
2017-01-05 10:48:03 +02:00
|
|
|
#include "os0event.h"
|
2017-02-10 12:11:42 +02:00
|
|
|
#include "my_crypt.h"
|
MDEV-11638 Encryption causes race conditions in InnoDB shutdown
InnoDB shutdown failed to properly take fil_crypt_thread() into account.
The encryption threads were signalled to shut down together with other
non-critical tasks. This could be much too early in case of slow shutdown,
which could need minutes to complete the purge. Furthermore, InnoDB
failed to wait for the fil_crypt_thread() to actually exit before
proceeding to the final steps of shutdown, causing the race conditions.
Furthermore, the log_scrub_thread() was shut down way too early.
Also it should remain until the SRV_SHUTDOWN_FLUSH_PHASE.
fil_crypt_threads_end(): Remove. This would cause the threads to
be terminated way too early.
srv_buf_dump_thread_active, srv_dict_stats_thread_active,
lock_sys->timeout_thread_active, log_scrub_thread_active,
srv_monitor_active, srv_error_monitor_active: Remove a race condition
between startup and shutdown, by setting these in the startup thread
that creates threads, not in each created thread. In this way, once the
flag is cleared, it will remain cleared during shutdown.
srv_n_fil_crypt_threads_started, fil_crypt_threads_event: Declare in
global rather than static scope.
log_scrub_event, srv_log_scrub_thread_active, log_scrub_thread():
Declare in static rather than global scope. Let these be created by
log_init() and freed by log_shutdown().
rotate_thread_t::should_shutdown(): Do not shut down before the
SRV_SHUTDOWN_FLUSH_PHASE.
srv_any_background_threads_are_active(): Remove. These checks now
exist in logs_empty_and_mark_files_at_shutdown().
logs_empty_and_mark_files_at_shutdown(): Shut down the threads in
the proper order. Keep fil_crypt_thread() and log_scrub_thread() alive
until SRV_SHUTDOWN_FLUSH_PHASE, and check that they actually terminate.
2017-01-04 18:43:32 +02:00
|
|
|
|
2015-09-19 11:30:18 +03:00
|
|
|
/**
|
|
|
|
* Magic pattern in start of crypt data on page 0
|
|
|
|
*/
|
|
|
|
#define MAGIC_SZ 6
|
|
|
|
|
|
|
|
static const unsigned char CRYPT_MAGIC[MAGIC_SZ] = {
|
|
|
|
's', 0xE, 0xC, 'R', 'E', 't' };
|
|
|
|
|
2015-04-01 11:50:21 +03:00
|
|
|
/* This key will be used if nothing else is given */
|
2015-05-27 12:08:13 +02:00
|
|
|
#define FIL_DEFAULT_ENCRYPTION_KEY ENCRYPTION_KEY_SYSTEM_DATA
|
2015-04-01 11:50:21 +03:00
|
|
|
|
2015-04-01 19:37:00 +03:00
|
|
|
/** Enum values for encryption table option */
|
|
|
|
typedef enum {
|
|
|
|
FIL_SPACE_ENCRYPTION_DEFAULT = 0, /* Tablespace encrypted if
|
|
|
|
srv_encrypt_tables = ON */
|
|
|
|
FIL_SPACE_ENCRYPTION_ON = 1, /* Tablespace is encrypted always */
|
|
|
|
FIL_SPACE_ENCRYPTION_OFF = 2 /* Tablespace is not encrypted */
|
|
|
|
} fil_encryption_t;
|
|
|
|
|
MDEV-11638 Encryption causes race conditions in InnoDB shutdown
InnoDB shutdown failed to properly take fil_crypt_thread() into account.
The encryption threads were signalled to shut down together with other
non-critical tasks. This could be much too early in case of slow shutdown,
which could need minutes to complete the purge. Furthermore, InnoDB
failed to wait for the fil_crypt_thread() to actually exit before
proceeding to the final steps of shutdown, causing the race conditions.
Furthermore, the log_scrub_thread() was shut down way too early.
Also it should remain until the SRV_SHUTDOWN_FLUSH_PHASE.
fil_crypt_threads_end(): Remove. This would cause the threads to
be terminated way too early.
srv_buf_dump_thread_active, srv_dict_stats_thread_active,
lock_sys->timeout_thread_active, log_scrub_thread_active,
srv_monitor_active, srv_error_monitor_active: Remove a race condition
between startup and shutdown, by setting these in the startup thread
that creates threads, not in each created thread. In this way, once the
flag is cleared, it will remain cleared during shutdown.
srv_n_fil_crypt_threads_started, fil_crypt_threads_event: Declare in
global rather than static scope.
log_scrub_event, srv_log_scrub_thread_active, log_scrub_thread():
Declare in static rather than global scope. Let these be created by
log_init() and freed by log_shutdown().
rotate_thread_t::should_shutdown(): Do not shut down before the
SRV_SHUTDOWN_FLUSH_PHASE.
srv_any_background_threads_are_active(): Remove. These checks now
exist in logs_empty_and_mark_files_at_shutdown().
logs_empty_and_mark_files_at_shutdown(): Shut down the threads in
the proper order. Keep fil_crypt_thread() and log_scrub_thread() alive
until SRV_SHUTDOWN_FLUSH_PHASE, and check that they actually terminate.
2017-01-04 18:43:32 +02:00
|
|
|
extern os_event_t fil_crypt_threads_event;
|
|
|
|
|
2015-04-01 11:50:21 +03:00
|
|
|
/**
|
|
|
|
* CRYPT_SCHEME_UNENCRYPTED
|
|
|
|
*
|
|
|
|
* Used as intermediate state when convering a space from unencrypted
|
|
|
|
* to encrypted
|
|
|
|
*/
|
|
|
|
/**
|
|
|
|
* CRYPT_SCHEME_1
|
|
|
|
*
|
2015-04-09 19:27:40 +02:00
|
|
|
* xxx is AES_CTR or AES_CBC (or another block cypher with the same key and iv lengths)
|
2015-04-01 11:50:21 +03:00
|
|
|
* L = AES_ECB(KEY, IV)
|
2015-04-09 19:27:40 +02:00
|
|
|
* CRYPT(PAGE) = xxx(KEY=L, IV=C, PAGE)
|
2015-04-01 11:50:21 +03:00
|
|
|
*/
|
|
|
|
|
|
|
|
#define CRYPT_SCHEME_1 1
|
|
|
|
#define CRYPT_SCHEME_1_IV_LEN 16
|
|
|
|
#define CRYPT_SCHEME_UNENCRYPTED 0
|
|
|
|
|
|
|
|
/* Cached L or key for given key_version */
|
|
|
|
struct key_struct
|
|
|
|
{
|
2015-04-09 00:37:47 +02:00
|
|
|
uint key_version; /*!< Version of the key */
|
2015-04-01 11:50:21 +03:00
|
|
|
uint key_length; /*!< Key length */
|
2015-04-09 19:27:40 +02:00
|
|
|
unsigned char key[MY_AES_MAX_KEY_LENGTH]; /*!< Cached key
|
|
|
|
(that is L in CRYPT_SCHEME_1) */
|
2015-04-01 11:50:21 +03:00
|
|
|
};
|
|
|
|
|
2016-12-13 11:51:33 +02:00
|
|
|
/** is encryption enabled */
|
|
|
|
extern ulong srv_encrypt_tables;
|
|
|
|
|
|
|
|
/** Mutex helper for crypt_data->scheme
|
|
|
|
@param[in, out] schme encryption scheme
|
|
|
|
@param[in] exit should we exit or enter mutex ? */
|
|
|
|
void
|
|
|
|
crypt_data_scheme_locker(
|
|
|
|
st_encryption_scheme* scheme,
|
|
|
|
int exit);
|
|
|
|
|
2015-04-01 11:50:21 +03:00
|
|
|
struct fil_space_rotate_state_t
|
|
|
|
{
|
2015-08-14 11:09:06 +03:00
|
|
|
time_t start_time; /*!< time when rotation started */
|
|
|
|
ulint active_threads; /*!< active threads in space */
|
|
|
|
ulint next_offset; /*!< next "free" offset */
|
|
|
|
ulint max_offset; /*!< max offset needing to be rotated */
|
|
|
|
uint min_key_version_found; /*!< min key version found but not
|
|
|
|
rotated */
|
|
|
|
lsn_t end_lsn; /*!< max lsn created when rotating this
|
|
|
|
space */
|
|
|
|
bool starting; /*!< initial write of IV */
|
|
|
|
bool flushing; /*!< space is being flushed at end of rotate */
|
2015-04-01 11:50:21 +03:00
|
|
|
struct {
|
2015-08-14 11:09:06 +03:00
|
|
|
bool is_active; /*!< is scrubbing active in this space */
|
|
|
|
time_t last_scrub_completed; /*!< when was last scrub
|
|
|
|
completed */
|
2015-04-01 11:50:21 +03:00
|
|
|
} scrubbing;
|
|
|
|
};
|
|
|
|
|
2015-05-13 21:57:24 +02:00
|
|
|
struct fil_space_crypt_struct : st_encryption_scheme
|
2015-04-01 11:50:21 +03:00
|
|
|
{
|
2016-12-13 11:51:33 +02:00
|
|
|
public:
|
|
|
|
/** Constructor. Does not initialize the members!
|
|
|
|
The object is expected to be placed in a buffer that
|
|
|
|
has been zero-initialized. */
|
|
|
|
fil_space_crypt_struct(
|
|
|
|
ulint new_type,
|
|
|
|
uint new_min_key_version,
|
|
|
|
uint new_key_id,
|
|
|
|
ulint offset,
|
|
|
|
fil_encryption_t new_encryption)
|
|
|
|
: st_encryption_scheme(),
|
|
|
|
min_key_version(new_min_key_version),
|
|
|
|
page0_offset(offset),
|
|
|
|
encryption(new_encryption),
|
|
|
|
closing(false),
|
|
|
|
key_found(),
|
|
|
|
rotate_state()
|
|
|
|
{
|
|
|
|
key_found = new_min_key_version;
|
|
|
|
key_id = new_key_id;
|
|
|
|
my_random_bytes(iv, sizeof(iv));
|
2016-12-29 13:23:18 +01:00
|
|
|
mutex_create(LATCH_ID_FIL_CRYPT_DATA_MUTEX, &mutex);
|
2016-12-13 11:51:33 +02:00
|
|
|
locker = crypt_data_scheme_locker;
|
|
|
|
type = new_type;
|
|
|
|
|
|
|
|
if (new_encryption == FIL_SPACE_ENCRYPTION_OFF ||
|
|
|
|
(!srv_encrypt_tables &&
|
|
|
|
new_encryption == FIL_SPACE_ENCRYPTION_DEFAULT)) {
|
|
|
|
type = CRYPT_SCHEME_UNENCRYPTED;
|
|
|
|
} else {
|
|
|
|
type = CRYPT_SCHEME_1;
|
|
|
|
min_key_version = key_get_latest_version();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Destructor */
|
|
|
|
~fil_space_crypt_struct()
|
|
|
|
{
|
|
|
|
closing = true;
|
|
|
|
mutex_free(&mutex);
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Get latest key version from encryption plugin
|
|
|
|
@retval key_version or
|
|
|
|
@retval ENCRYPTION_KEY_VERSION_INVALID if used key_id
|
|
|
|
is not found from encryption plugin. */
|
|
|
|
uint key_get_latest_version(void);
|
|
|
|
|
|
|
|
/** Returns true if key was found from encryption plugin
|
|
|
|
and false if not. */
|
|
|
|
bool is_key_found() const {
|
|
|
|
return key_found != ENCRYPTION_KEY_VERSION_INVALID;
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Returns true if tablespace should be encrypted */
|
|
|
|
bool should_encrypt() const {
|
|
|
|
return ((encryption == FIL_SPACE_ENCRYPTION_ON) ||
|
|
|
|
(srv_encrypt_tables &&
|
|
|
|
encryption == FIL_SPACE_ENCRYPTION_DEFAULT));
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Return true if tablespace is encrypted. */
|
|
|
|
bool is_encrypted() const {
|
|
|
|
return (encryption != FIL_SPACE_ENCRYPTION_OFF);
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Return true if default tablespace encryption is used, */
|
|
|
|
bool is_default_encryption() const {
|
|
|
|
return (encryption == FIL_SPACE_ENCRYPTION_DEFAULT);
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Return true if tablespace is not encrypted. */
|
|
|
|
bool not_encrypted() const {
|
|
|
|
return (encryption == FIL_SPACE_ENCRYPTION_OFF);
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Is this tablespace closing. */
|
|
|
|
bool is_closing(bool is_fixed) {
|
|
|
|
bool closed;
|
|
|
|
if (!is_fixed) {
|
|
|
|
mutex_enter(&mutex);
|
|
|
|
}
|
|
|
|
closed = closing;
|
|
|
|
if (!is_fixed) {
|
|
|
|
mutex_exit(&mutex);
|
|
|
|
}
|
|
|
|
return closed;
|
|
|
|
}
|
|
|
|
|
2015-04-01 11:50:21 +03:00
|
|
|
uint min_key_version; // min key version for this space
|
|
|
|
ulint page0_offset; // byte offset on page 0 for crypt data
|
2015-04-01 19:37:00 +03:00
|
|
|
fil_encryption_t encryption; // Encryption setup
|
2015-04-01 11:50:21 +03:00
|
|
|
|
|
|
|
ib_mutex_t mutex; // mutex protecting following variables
|
|
|
|
bool closing; // is tablespace being closed
|
2016-12-13 11:51:33 +02:00
|
|
|
|
|
|
|
/** Return code from encryption_key_get_latest_version.
|
|
|
|
If ENCRYPTION_KEY_VERSION_INVALID encryption plugin
|
|
|
|
could not find the key and there is no need to call
|
|
|
|
get_latest_key_version again as keys are read only
|
|
|
|
at startup. */
|
|
|
|
uint key_found;
|
|
|
|
|
2015-04-01 11:50:21 +03:00
|
|
|
fil_space_rotate_state_t rotate_state;
|
|
|
|
};
|
|
|
|
|
|
|
|
/* structure containing encryption specification */
|
|
|
|
typedef struct fil_space_crypt_struct fil_space_crypt_t;
|
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Init global resources needed for tablespace encryption/decryption */
|
|
|
|
UNIV_INTERN
|
|
|
|
void
|
|
|
|
fil_space_crypt_init();
|
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Cleanup global resources needed for tablespace encryption/decryption */
|
|
|
|
UNIV_INTERN
|
|
|
|
void
|
|
|
|
fil_space_crypt_cleanup();
|
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Create crypt data, i.e data that is used for a single tablespace */
|
|
|
|
UNIV_INTERN
|
|
|
|
fil_space_crypt_t *
|
2015-05-13 11:41:22 +03:00
|
|
|
fil_space_create_crypt_data(
|
|
|
|
/*========================*/
|
|
|
|
fil_encryption_t encrypt_mode, /*!< in: encryption mode */
|
2016-08-12 11:17:45 +03:00
|
|
|
uint key_id) /*!< in: encryption key id */
|
|
|
|
__attribute__((warn_unused_result));
|
2015-04-01 11:50:21 +03:00
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Destroy crypt data */
|
|
|
|
UNIV_INTERN
|
|
|
|
void
|
|
|
|
fil_space_destroy_crypt_data(
|
|
|
|
/*=========================*/
|
|
|
|
fil_space_crypt_t **crypt_data); /*!< in/out: crypt data */
|
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Get crypt data for a space*/
|
|
|
|
UNIV_INTERN
|
|
|
|
fil_space_crypt_t *
|
|
|
|
fil_space_get_crypt_data(
|
2015-05-17 14:14:16 +03:00
|
|
|
/*=====================*/
|
2015-04-01 11:50:21 +03:00
|
|
|
ulint space); /*!< in: tablespace id */
|
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Set crypt data for a space*/
|
|
|
|
UNIV_INTERN
|
2015-05-20 13:35:51 +03:00
|
|
|
fil_space_crypt_t*
|
2015-04-01 11:50:21 +03:00
|
|
|
fil_space_set_crypt_data(
|
2015-05-17 14:14:16 +03:00
|
|
|
/*=====================*/
|
2015-04-01 11:50:21 +03:00
|
|
|
ulint space, /*!< in: tablespace id */
|
2015-04-02 13:49:50 +03:00
|
|
|
fil_space_crypt_t* crypt_data); /*!< in: crypt data to set */
|
2015-04-01 11:50:21 +03:00
|
|
|
|
|
|
|
/*********************************************************************
|
2015-05-15 09:54:41 +02:00
|
|
|
Merge crypt data */
|
2015-05-17 14:14:16 +03:00
|
|
|
UNIV_INTERN
|
2015-05-15 09:54:41 +02:00
|
|
|
void
|
|
|
|
fil_space_merge_crypt_data(
|
2015-05-17 14:14:16 +03:00
|
|
|
/*=======================*/
|
2015-05-15 09:54:41 +02:00
|
|
|
fil_space_crypt_t* dst_crypt_data, /*!< in: crypt_data */
|
|
|
|
const fil_space_crypt_t* src_crypt_data); /*!< in: crypt data */
|
2015-04-01 11:50:21 +03:00
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Read crypt data from buffer page */
|
|
|
|
UNIV_INTERN
|
|
|
|
fil_space_crypt_t *
|
|
|
|
fil_space_read_crypt_data(
|
|
|
|
/*======================*/
|
|
|
|
ulint space, /*!< in: tablespace id */
|
|
|
|
const byte* page, /*!< in: buffer page */
|
|
|
|
ulint offset); /*!< in: offset where crypt data is stored */
|
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Write crypt data to buffer page */
|
|
|
|
UNIV_INTERN
|
|
|
|
void
|
|
|
|
fil_space_write_crypt_data(
|
|
|
|
/*=======================*/
|
|
|
|
ulint space, /*!< in: tablespace id */
|
|
|
|
byte* page, /*!< in: buffer page */
|
|
|
|
ulint offset, /*!< in: offset where to store data */
|
|
|
|
ulint maxsize, /*!< in: max space available to store crypt data in */
|
|
|
|
mtr_t * mtr); /*!< in: mini-transaction */
|
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Clear crypt data from page 0 (used for import tablespace) */
|
|
|
|
UNIV_INTERN
|
|
|
|
void
|
|
|
|
fil_space_clear_crypt_data(
|
2015-05-17 14:14:16 +03:00
|
|
|
/*=======================*/
|
2015-04-01 11:50:21 +03:00
|
|
|
byte* page, /*!< in: buffer page */
|
|
|
|
ulint offset); /*!< in: offset where crypt data is stored */
|
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Parse crypt data log record */
|
|
|
|
UNIV_INTERN
|
|
|
|
byte*
|
|
|
|
fil_parse_write_crypt_data(
|
|
|
|
/*=======================*/
|
|
|
|
byte* ptr, /*!< in: start of log record */
|
|
|
|
byte* end_ptr, /*!< in: end of log record */
|
|
|
|
buf_block_t*); /*!< in: buffer page to apply record to */
|
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Check if extra buffer shall be allocated for decrypting after read */
|
|
|
|
UNIV_INTERN
|
|
|
|
bool
|
|
|
|
fil_space_check_encryption_read(
|
2015-05-17 14:14:16 +03:00
|
|
|
/*============================*/
|
2016-08-12 11:17:45 +03:00
|
|
|
ulint space) /*!< in: tablespace id */
|
|
|
|
__attribute__((warn_unused_result));
|
2016-02-17 12:32:07 +02:00
|
|
|
|
2015-06-05 08:41:10 +03:00
|
|
|
/******************************************************************
|
|
|
|
Decrypt a page
|
|
|
|
@return true if page is decrypted, false if not. */
|
2015-04-01 11:50:21 +03:00
|
|
|
UNIV_INTERN
|
2015-06-05 08:41:10 +03:00
|
|
|
bool
|
|
|
|
fil_space_decrypt(
|
2015-05-17 14:14:16 +03:00
|
|
|
/*==============*/
|
2015-06-05 08:41:10 +03:00
|
|
|
fil_space_crypt_t* crypt_data, /*!< in: crypt data */
|
|
|
|
byte* tmp_frame, /*!< in: temporary buffer */
|
2016-08-12 11:17:45 +03:00
|
|
|
const page_size_t& page_size, /*!< in: page size */
|
2015-09-14 14:11:23 +03:00
|
|
|
byte* src_frame, /*!< in:out: page buffer */
|
2016-08-12 11:17:45 +03:00
|
|
|
dberr_t* err) /*!< in: out: DB_SUCCESS or
|
2015-09-14 14:11:23 +03:00
|
|
|
error code */
|
2016-08-12 11:17:45 +03:00
|
|
|
__attribute__((warn_unused_result));
|
2015-09-14 14:11:23 +03:00
|
|
|
|
2015-04-01 11:50:21 +03:00
|
|
|
/*********************************************************************
|
2015-06-05 08:41:10 +03:00
|
|
|
Encrypt buffer page
|
|
|
|
@return encrypted page, or original not encrypted page if encrypt
|
|
|
|
is not needed. */
|
2015-04-01 11:50:21 +03:00
|
|
|
UNIV_INTERN
|
2015-06-05 08:41:10 +03:00
|
|
|
byte*
|
|
|
|
fil_space_encrypt(
|
2015-05-17 14:14:16 +03:00
|
|
|
/*==============*/
|
2015-06-05 08:41:10 +03:00
|
|
|
ulint space, /*!< in: tablespace id */
|
|
|
|
ulint offset, /*!< in: page no */
|
|
|
|
lsn_t lsn, /*!< in: page lsn */
|
|
|
|
byte* src_frame, /*!< in: page frame */
|
2016-08-12 11:17:45 +03:00
|
|
|
const page_size_t& page_size, /*!< in: page size */
|
|
|
|
byte* dst_frame) /*!< in: where to encrypt to */
|
|
|
|
__attribute__((warn_unused_result));
|
2015-04-01 11:50:21 +03:00
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Decrypt buffer page
|
2015-06-05 08:41:10 +03:00
|
|
|
@return decrypted page, or original not encrypted page if decrypt is
|
|
|
|
not needed.*/
|
2015-04-01 11:50:21 +03:00
|
|
|
UNIV_INTERN
|
2015-06-05 08:41:10 +03:00
|
|
|
byte*
|
2015-04-01 11:50:21 +03:00
|
|
|
fil_space_decrypt(
|
2015-05-17 14:14:16 +03:00
|
|
|
/*==============*/
|
2016-08-12 11:17:45 +03:00
|
|
|
ulint space, /*!< in: tablespace id */
|
|
|
|
byte* src_frame, /*!< in: page frame */
|
|
|
|
const page_size_t& page_size, /*!< in: page size */
|
|
|
|
byte* dst_frame) /*!< in: where to decrypt to */
|
2016-02-17 12:32:07 +02:00
|
|
|
__attribute__((warn_unused_result));
|
2015-04-01 11:50:21 +03:00
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
fil_space_verify_crypt_checksum
|
|
|
|
NOTE: currently this function can only be run in single threaded mode
|
|
|
|
as it modifies srv_checksum_algorithm (temporarily)
|
|
|
|
@return true if page is encrypted AND OK, false otherwise */
|
|
|
|
UNIV_INTERN
|
|
|
|
bool
|
|
|
|
fil_space_verify_crypt_checksum(
|
2015-05-17 14:14:16 +03:00
|
|
|
/*============================*/
|
2016-08-12 11:17:45 +03:00
|
|
|
const byte* src_frame,/*!< in: page frame */
|
|
|
|
const page_size_t& page_size) /*!< in: page size */
|
|
|
|
__attribute__((warn_unused_result));
|
2015-04-01 11:50:21 +03:00
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Init threads for key rotation */
|
|
|
|
UNIV_INTERN
|
|
|
|
void
|
|
|
|
fil_crypt_threads_init();
|
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Set thread count (e.g start or stops threads) used for key rotation */
|
|
|
|
UNIV_INTERN
|
|
|
|
void
|
|
|
|
fil_crypt_set_thread_cnt(
|
|
|
|
/*=====================*/
|
|
|
|
uint new_cnt); /*!< in: requested #threads */
|
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Cleanup resources for threads for key rotation */
|
|
|
|
UNIV_INTERN
|
|
|
|
void
|
|
|
|
fil_crypt_threads_cleanup();
|
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Set rotate key age */
|
|
|
|
UNIV_INTERN
|
|
|
|
void
|
|
|
|
fil_crypt_set_rotate_key_age(
|
2015-05-17 14:14:16 +03:00
|
|
|
/*=========================*/
|
2015-04-01 11:50:21 +03:00
|
|
|
uint rotate_age); /*!< in: requested rotate age */
|
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Set rotation threads iops */
|
|
|
|
UNIV_INTERN
|
|
|
|
void
|
|
|
|
fil_crypt_set_rotation_iops(
|
2015-05-17 14:14:16 +03:00
|
|
|
/*========================*/
|
2015-04-01 11:50:21 +03:00
|
|
|
uint iops); /*!< in: requested iops */
|
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Mark a space as closing */
|
|
|
|
UNIV_INTERN
|
|
|
|
void
|
|
|
|
fil_space_crypt_mark_space_closing(
|
2015-05-17 14:14:16 +03:00
|
|
|
/*===============================*/
|
2016-09-22 16:32:26 +03:00
|
|
|
ulint space, /*!< in: tablespace id */
|
|
|
|
fil_space_crypt_t* crypt_data); /*!< in: crypt_data or NULL */
|
2015-04-01 11:50:21 +03:00
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Wait for crypt threads to stop accessing space */
|
|
|
|
UNIV_INTERN
|
|
|
|
void
|
|
|
|
fil_space_crypt_close_tablespace(
|
2015-05-17 14:14:16 +03:00
|
|
|
/*=============================*/
|
2015-04-01 11:50:21 +03:00
|
|
|
ulint space); /*!< in: tablespace id */
|
|
|
|
|
|
|
|
/** Struct for retreiving info about encryption */
|
|
|
|
struct fil_space_crypt_status_t {
|
|
|
|
ulint space; /*!< tablespace id */
|
|
|
|
ulint scheme; /*!< encryption scheme */
|
|
|
|
uint min_key_version; /*!< min key version */
|
|
|
|
uint current_key_version;/*!< current key version */
|
|
|
|
uint keyserver_requests;/*!< no of key requests to key server */
|
2016-03-18 11:48:49 +02:00
|
|
|
ulint key_id; /*!< current key_id */
|
2015-04-01 11:50:21 +03:00
|
|
|
bool rotating; /*!< is key rotation ongoing */
|
|
|
|
bool flushing; /*!< is flush at end of rotation ongoing */
|
|
|
|
ulint rotate_next_page_number; /*!< next page if key rotating */
|
|
|
|
ulint rotate_max_page_number; /*!< max page if key rotating */
|
|
|
|
};
|
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Get crypt status for a space
|
|
|
|
@return 0 if crypt data found */
|
|
|
|
UNIV_INTERN
|
|
|
|
int
|
|
|
|
fil_space_crypt_get_status(
|
2015-05-17 14:14:16 +03:00
|
|
|
/*=======================*/
|
2015-04-01 11:50:21 +03:00
|
|
|
ulint id, /*!< in: space id */
|
|
|
|
struct fil_space_crypt_status_t * status); /*!< out: status */
|
|
|
|
|
|
|
|
/** Struct for retreiving statistics about encryption key rotation */
|
|
|
|
struct fil_crypt_stat_t {
|
|
|
|
ulint pages_read_from_cache;
|
|
|
|
ulint pages_read_from_disk;
|
|
|
|
ulint pages_modified;
|
|
|
|
ulint pages_flushed;
|
|
|
|
ulint estimated_iops;
|
|
|
|
};
|
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Get crypt rotation statistics */
|
|
|
|
UNIV_INTERN
|
|
|
|
void
|
|
|
|
fil_crypt_total_stat(
|
|
|
|
/*==================*/
|
|
|
|
fil_crypt_stat_t* stat); /*!< out: crypt stat */
|
|
|
|
|
|
|
|
/** Struct for retreiving info about scrubbing */
|
|
|
|
struct fil_space_scrub_status_t {
|
|
|
|
ulint space; /*!< tablespace id */
|
|
|
|
bool compressed; /*!< is space compressed */
|
|
|
|
time_t last_scrub_completed; /*!< when was last scrub completed */
|
|
|
|
bool scrubbing; /*!< is scrubbing ongoing */
|
|
|
|
time_t current_scrub_started; /*!< when started current scrubbing */
|
|
|
|
ulint current_scrub_active_threads; /*!< current scrub active threads */
|
|
|
|
ulint current_scrub_page_number; /*!< current scrub page no */
|
|
|
|
ulint current_scrub_max_page_number; /*!< current scrub max page no */
|
|
|
|
};
|
|
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Get scrub status for a space
|
|
|
|
@return 0 if no scrub info found */
|
|
|
|
UNIV_INTERN
|
|
|
|
int
|
|
|
|
fil_space_get_scrub_status(
|
2015-05-17 14:14:16 +03:00
|
|
|
/*=======================*/
|
2015-04-01 11:50:21 +03:00
|
|
|
ulint id, /*!< in: space id */
|
|
|
|
struct fil_space_scrub_status_t * status); /*!< out: status */
|
|
|
|
|
2015-05-17 14:14:16 +03:00
|
|
|
/*********************************************************************
|
|
|
|
Adjust encrypt tables */
|
|
|
|
UNIV_INTERN
|
|
|
|
void
|
|
|
|
fil_crypt_set_encrypt_tables(
|
|
|
|
/*=========================*/
|
|
|
|
uint val); /*!< in: New srv_encrypt_tables setting */
|
|
|
|
|
2015-09-04 15:54:20 +03:00
|
|
|
/******************************************************************
|
|
|
|
Encrypt a buffer */
|
|
|
|
UNIV_INTERN
|
|
|
|
byte*
|
|
|
|
fil_encrypt_buf(
|
|
|
|
/*============*/
|
|
|
|
fil_space_crypt_t* crypt_data, /*!< in: crypt data */
|
|
|
|
ulint space, /*!< in: Space id */
|
|
|
|
ulint offset, /*!< in: Page offset */
|
|
|
|
lsn_t lsn, /*!< in: lsn */
|
|
|
|
byte* src_frame, /*!< in: Source page to be encrypted */
|
2016-08-12 11:17:45 +03:00
|
|
|
const page_size_t& page_size, /*!< in: page size */
|
|
|
|
byte* dst_frame) /*!< in: outbut buffer */
|
|
|
|
__attribute__((warn_unused_result));
|
2015-05-17 14:14:16 +03:00
|
|
|
|
2015-08-31 19:47:14 +03:00
|
|
|
/******************************************************************
|
|
|
|
Calculate post encryption checksum
|
|
|
|
@return page checksum or BUF_NO_CHECKSUM_MAGIC
|
|
|
|
not needed. */
|
|
|
|
UNIV_INTERN
|
|
|
|
ulint
|
|
|
|
fil_crypt_calculate_checksum(
|
|
|
|
/*=========================*/
|
2016-08-12 11:17:45 +03:00
|
|
|
const page_size_t& page_size, /*!< in: page size */
|
|
|
|
byte* dst_frame) /*!< in: page where to calculate */
|
|
|
|
__attribute__((warn_unused_result));
|
2015-08-31 19:47:14 +03:00
|
|
|
|
2015-04-01 11:50:21 +03:00
|
|
|
#ifndef UNIV_NONINL
|
|
|
|
#include "fil0crypt.ic"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#endif /* fil0crypt_h */
|