mirror of
https://github.com/MariaDB/server.git
synced 2025-01-18 13:02:28 +01:00
3e55ef26d4
Make sure that when we publish the crypt_data we access the memory cache of the tablespace crypt_data. Make sure that crypt_data is stored whenever it is really needed. All this is not yet enough in my opinion because: sql/encryption.cc has DBUG_ASSERT(scheme->type == 1) i.e. crypt_data->type == CRYPT_SCHEME_1 However, for InnoDB point of view we have global crypt_data for every tablespace. When we change variables on crypt_data we take mutex. However, when we use crypt_data for encryption/decryption we use pointer to this global structure and no mutex to protect against changes on crypt_data. Tablespace encryption starts in fil_crypt_start_encrypting_space from crypt_data that has crypt_data->type = CRYPT_SCHEME_UNENCRYPTED and later we write page 0 CRYPT_SCHEME_1 and finally whe publish that to memory cache. |
||
---|---|---|
.. | ||
archive | ||
binlog | ||
csv | ||
encryption | ||
engines | ||
federated | ||
funcs_1 | ||
funcs_2 | ||
galera | ||
handler | ||
heap | ||
innodb | ||
innodb_fts | ||
innodb_zip | ||
jp | ||
large_tests | ||
manual | ||
maria | ||
mtr/t | ||
mtr2 | ||
multi_source | ||
optimizer_unfixed_bugs | ||
parts | ||
percona | ||
perfschema | ||
perfschema_stress | ||
plugins | ||
roles | ||
rpl | ||
storage_engine | ||
stress | ||
sys_vars | ||
unit | ||
vcol | ||
wsrep |