Commit 61096ff2 authored by Jan Lindström's avatar Jan Lindström

MDEV-13591: InnoDB: Database page corruption on disk or a failed file read and assertion failure

Problem is that page 0 and its possible enrryption information
is not read for undo tablespaces.

fil_crypt_get_latest_key_version(): Do not send event to
encryption threads if event does not yet exists. Seen
on regression testing.

fil_read_first_page: Add new parameter does page belong to
undo tablespace and if it does, we do not read FSP_HEADER.

srv_undo_tablespace_open : Read first page of the tablespace
to get crypt_data if it exists and pass it to fil_space_create.

Tested using innodb_encryption with combinations with
innodb-undo-tablespaces.
parent 882f4566
call mtr.add_suppression("InnoDB: New log files created");
call mtr.add_suppression("InnoDB: Creating foreign key constraint system tables.");
SET @start_global_value = @@global.innodb_encryption_threads; SET @start_global_value = @@global.innodb_encryption_threads;
SHOW VARIABLES LIKE 'innodb_encrypt%'; SHOW VARIABLES LIKE 'innodb_encrypt%';
Variable_name Value Variable_name Value
......
...@@ -3,10 +3,14 @@ ...@@ -3,10 +3,14 @@
# #
-- source include/have_innodb.inc -- source include/have_innodb.inc
-- source include/have_example_key_management_plugin.inc -- source include/have_example_key_management_plugin.inc
-- source include/innodb_undo_tablespaces.inc
# embedded does not support restart # embedded does not support restart
-- source include/not_embedded.inc -- source include/not_embedded.inc
call mtr.add_suppression("InnoDB: New log files created");
call mtr.add_suppression("InnoDB: Creating foreign key constraint system tables.");
SET @start_global_value = @@global.innodb_encryption_threads; SET @start_global_value = @@global.innodb_encryption_threads;
SHOW VARIABLES LIKE 'innodb_encrypt%'; SHOW VARIABLES LIKE 'innodb_encrypt%';
......
...@@ -191,9 +191,14 @@ fil_crypt_get_latest_key_version( ...@@ -191,9 +191,14 @@ fil_crypt_get_latest_key_version(
crypt_data->min_key_version, crypt_data->min_key_version,
key_version, key_version,
srv_fil_crypt_rotate_key_age)) { srv_fil_crypt_rotate_key_age)) {
/* Below event seen as NULL-pointer at startup
when new database was created and we create a
checkpoint. Only seen when debugging. */
if (fil_crypt_threads_inited) {
os_event_set(fil_crypt_threads_event); os_event_set(fil_crypt_threads_event);
} }
} }
}
return key_version; return key_version;
} }
......
...@@ -2322,8 +2322,10 @@ the first page of a first data file at database startup. ...@@ -2322,8 +2322,10 @@ the first page of a first data file at database startup.
data files data files
@param[out] flushed_lsn flushed lsn value @param[out] flushed_lsn flushed lsn value
@param[out] crypt_data encryption crypt data @param[out] crypt_data encryption crypt data
@retval NULL on success, or if innodb_force_recovery is set @param[in] check_first_page true if first page contents
@return pointer to an error message string */ should be checked
@return NULL on success, or if innodb_force_recovery is set
@retval pointer to an error message string */
UNIV_INTERN UNIV_INTERN
const char* const char*
fil_read_first_page( fil_read_first_page(
...@@ -2336,7 +2338,8 @@ fil_read_first_page( ...@@ -2336,7 +2338,8 @@ fil_read_first_page(
ulint* max_arch_log_no, ulint* max_arch_log_no,
#endif /* UNIV_LOG_ARCHIVE */ #endif /* UNIV_LOG_ARCHIVE */
lsn_t* flushed_lsn, lsn_t* flushed_lsn,
fil_space_crypt_t** crypt_data) fil_space_crypt_t** crypt_data,
bool check_first_page)
{ {
byte* buf; byte* buf;
byte* page; byte* page;
...@@ -2358,6 +2361,9 @@ fil_read_first_page( ...@@ -2358,6 +2361,9 @@ fil_read_first_page(
*flags and *space_id as they were read from the first file and *flags and *space_id as they were read from the first file and
do not validate the first page. */ do not validate the first page. */
if (!one_read_already) { if (!one_read_already) {
/* Undo tablespace does not contain correct FSP_HEADER,
and actually we really need to read only crypt_data. */
if (check_first_page) {
*space_id = fsp_header_get_space_id(page); *space_id = fsp_header_get_space_id(page);
*flags = fsp_header_get_flags(page); *flags = fsp_header_get_flags(page);
...@@ -2379,6 +2385,7 @@ fil_read_first_page( ...@@ -2379,6 +2385,7 @@ fil_read_first_page(
} }
check_msg = fil_check_first_page(page, *space_id, *flags); check_msg = fil_check_first_page(page, *space_id, *flags);
}
/* Possible encryption crypt data is also stored only to first page /* Possible encryption crypt data is also stored only to first page
of the first datafile. */ of the first datafile. */
......
...@@ -802,6 +802,8 @@ the first page of a first data file at database startup. ...@@ -802,6 +802,8 @@ the first page of a first data file at database startup.
data files data files
@param[out] flushed_lsn flushed lsn value @param[out] flushed_lsn flushed lsn value
@param[out] crypt_data encryption crypt data @param[out] crypt_data encryption crypt data
@param[in] check_first_page true if first page contents
should be checked
@retval NULL on success, or if innodb_force_recovery is set @retval NULL on success, or if innodb_force_recovery is set
@return pointer to an error message string */ @return pointer to an error message string */
UNIV_INTERN UNIV_INTERN
...@@ -816,7 +818,8 @@ fil_read_first_page( ...@@ -816,7 +818,8 @@ fil_read_first_page(
ulint* max_arch_log_no, ulint* max_arch_log_no,
#endif /* UNIV_LOG_ARCHIVE */ #endif /* UNIV_LOG_ARCHIVE */
lsn_t* flushed_lsn, lsn_t* flushed_lsn,
fil_space_crypt_t** crypt_data) fil_space_crypt_t** crypt_data,
bool check_first_page=true)
MY_ATTRIBUTE((warn_unused_result)); MY_ATTRIBUTE((warn_unused_result));
#endif /* !UNIV_HOTBACKUP */ #endif /* !UNIV_HOTBACKUP */
......
...@@ -850,7 +850,7 @@ open_or_create_data_files( ...@@ -850,7 +850,7 @@ open_or_create_data_files(
ibool one_created = FALSE; ibool one_created = FALSE;
os_offset_t size; os_offset_t size;
ulint flags; ulint flags;
ulint space; ulint space=0;
ulint rounded_size_pages; ulint rounded_size_pages;
char name[10000]; char name[10000];
fil_space_crypt_t* crypt_data=NULL; fil_space_crypt_t* crypt_data=NULL;
...@@ -1332,11 +1332,30 @@ srv_undo_tablespace_open( ...@@ -1332,11 +1332,30 @@ srv_undo_tablespace_open(
size = os_file_get_size(fh); size = os_file_get_size(fh);
ut_a(size != (os_offset_t) -1); ut_a(size != (os_offset_t) -1);
/* Load the tablespace into InnoDB's internal
data structures. */
const char* check_msg;
fil_space_crypt_t* crypt_data = NULL;
/* Set the compressed page size to 0 (non-compressed) */
flags = FSP_FLAGS_PAGE_SSIZE();
/* Read first page to find out does the crypt_info
exists on undo tablespace. */
check_msg = fil_read_first_page(
fh, FALSE, &flags, &space,
NULL, &crypt_data, false);
ret = os_file_close(fh); ret = os_file_close(fh);
ut_a(ret); ut_a(ret);
/* Load the tablespace into InnoDB's internal if (check_msg) {
data structures. */ ib_logf(IB_LOG_LEVEL_ERROR,
"%s in data file %s",
check_msg, name);
return (err);
}
/* We set the biggest space id to the undo tablespace /* We set the biggest space id to the undo tablespace
because InnoDB hasn't opened any other tablespace apart because InnoDB hasn't opened any other tablespace apart
...@@ -1344,10 +1363,8 @@ srv_undo_tablespace_open( ...@@ -1344,10 +1363,8 @@ srv_undo_tablespace_open(
fil_set_max_space_id_if_bigger(space); fil_set_max_space_id_if_bigger(space);
/* Set the compressed page size to 0 (non-compressed) */
flags = FSP_FLAGS_PAGE_SSIZE();
fil_space_create(name, space, flags, FIL_TABLESPACE, fil_space_create(name, space, flags, FIL_TABLESPACE,
NULL /* no encryption */, crypt_data,
true /* create */); true /* create */);
ut_a(fil_validate()); ut_a(fil_validate());
......
...@@ -191,9 +191,14 @@ fil_crypt_get_latest_key_version( ...@@ -191,9 +191,14 @@ fil_crypt_get_latest_key_version(
crypt_data->min_key_version, crypt_data->min_key_version,
key_version, key_version,
srv_fil_crypt_rotate_key_age)) { srv_fil_crypt_rotate_key_age)) {
/* Below event seen as NULL-pointer at startup
when new database was created and we create a
checkpoint. Only seen when debugging. */
if (fil_crypt_threads_inited) {
os_event_set(fil_crypt_threads_event); os_event_set(fil_crypt_threads_event);
} }
} }
}
return key_version; return key_version;
} }
......
...@@ -2372,8 +2372,10 @@ the first page of a first data file at database startup. ...@@ -2372,8 +2372,10 @@ the first page of a first data file at database startup.
@param[out] space_id tablepspace ID @param[out] space_id tablepspace ID
@param[out] flushed_lsn flushed lsn value @param[out] flushed_lsn flushed lsn value
@param[out] crypt_data encryption crypt data @param[out] crypt_data encryption crypt data
@retval NULL on success, or if innodb_force_recovery is set @param[in] check_first_page true if first page contents
@return pointer to an error message string */ should be checked
@return NULL on success, or if innodb_force_recovery is set
@retval pointer to an error message string */
UNIV_INTERN UNIV_INTERN
const char* const char*
fil_read_first_page( fil_read_first_page(
...@@ -2382,7 +2384,8 @@ fil_read_first_page( ...@@ -2382,7 +2384,8 @@ fil_read_first_page(
ulint* flags, ulint* flags,
ulint* space_id, ulint* space_id,
lsn_t* flushed_lsn, lsn_t* flushed_lsn,
fil_space_crypt_t** crypt_data) fil_space_crypt_t** crypt_data,
bool check_first_page)
{ {
byte* buf; byte* buf;
byte* page; byte* page;
...@@ -2418,6 +2421,9 @@ fil_read_first_page( ...@@ -2418,6 +2421,9 @@ fil_read_first_page(
*flags and *space_id as they were read from the first file and *flags and *space_id as they were read from the first file and
do not validate the first page. */ do not validate the first page. */
if (!one_read_already) { if (!one_read_already) {
/* Undo tablespace does not contain correct FSP_HEADER,
and actually we really need to read only crypt_data. */
if (check_first_page) {
*space_id = fsp_header_get_space_id(page); *space_id = fsp_header_get_space_id(page);
*flags = fsp_header_get_flags(page); *flags = fsp_header_get_flags(page);
...@@ -2441,6 +2447,7 @@ fil_read_first_page( ...@@ -2441,6 +2447,7 @@ fil_read_first_page(
if (!(IS_XTRABACKUP() && srv_backup_mode)) { if (!(IS_XTRABACKUP() && srv_backup_mode)) {
check_msg = fil_check_first_page(page, *space_id, *flags); check_msg = fil_check_first_page(page, *space_id, *flags);
} }
}
/* Possible encryption crypt data is also stored only to first page /* Possible encryption crypt data is also stored only to first page
of the first datafile. */ of the first datafile. */
......
...@@ -804,8 +804,10 @@ the first page of a first data file at database startup. ...@@ -804,8 +804,10 @@ the first page of a first data file at database startup.
@param[out] space_id tablepspace ID @param[out] space_id tablepspace ID
@param[out] flushed_lsn flushed lsn value @param[out] flushed_lsn flushed lsn value
@param[out] crypt_data encryption crypt data @param[out] crypt_data encryption crypt data
@retval NULL on success, or if innodb_force_recovery is set @param[in] check_first_page true if first page contents
@return pointer to an error message string */ should be checked
@return NULL on success, or if innodb_force_recovery is set
@retval pointer to an error message string */
UNIV_INTERN UNIV_INTERN
const char* const char*
fil_read_first_page( fil_read_first_page(
...@@ -814,7 +816,8 @@ fil_read_first_page( ...@@ -814,7 +816,8 @@ fil_read_first_page(
ulint* flags, ulint* flags,
ulint* space_id, ulint* space_id,
lsn_t* flushed_lsn, lsn_t* flushed_lsn,
fil_space_crypt_t** crypt_data) fil_space_crypt_t** crypt_data,
bool check_first_page=true)
MY_ATTRIBUTE((warn_unused_result)); MY_ATTRIBUTE((warn_unused_result));
#endif /* !UNIV_HOTBACKUP */ #endif /* !UNIV_HOTBACKUP */
......
...@@ -891,7 +891,7 @@ open_or_create_data_files( ...@@ -891,7 +891,7 @@ open_or_create_data_files(
bool one_created = false; bool one_created = false;
os_offset_t size; os_offset_t size;
ulint flags; ulint flags;
ulint space; ulint space = 0;
ulint rounded_size_pages; ulint rounded_size_pages;
char name[10000]; char name[10000];
fil_space_crypt_t* crypt_data=NULL; fil_space_crypt_t* crypt_data=NULL;
...@@ -1369,11 +1369,30 @@ srv_undo_tablespace_open( ...@@ -1369,11 +1369,30 @@ srv_undo_tablespace_open(
size = os_file_get_size(fh); size = os_file_get_size(fh);
ut_a(size != (os_offset_t) -1); ut_a(size != (os_offset_t) -1);
/* Load the tablespace into InnoDB's internal
data structures. */
const char* check_msg;
fil_space_crypt_t* crypt_data = NULL;
/* Set the compressed page size to 0 (non-compressed) */
flags = FSP_FLAGS_PAGE_SSIZE();
/* Read first page to find out does the crypt_info
exists on undo tablespace. */
check_msg = fil_read_first_page(
fh, FALSE, &flags, &space,
NULL, &crypt_data, false);
ret = os_file_close(fh); ret = os_file_close(fh);
ut_a(ret); ut_a(ret);
/* Load the tablespace into InnoDB's internal if (check_msg) {
data structures. */ ib_logf(IB_LOG_LEVEL_ERROR,
"%s in data file %s",
check_msg, name);
return (err);
}
/* We set the biggest space id to the undo tablespace /* We set the biggest space id to the undo tablespace
because InnoDB hasn't opened any other tablespace apart because InnoDB hasn't opened any other tablespace apart
...@@ -1381,10 +1400,8 @@ srv_undo_tablespace_open( ...@@ -1381,10 +1400,8 @@ srv_undo_tablespace_open(
fil_set_max_space_id_if_bigger(space); fil_set_max_space_id_if_bigger(space);
/* Set the compressed page size to 0 (non-compressed) */
flags = FSP_FLAGS_PAGE_SSIZE();
fil_space_create(name, space, flags, FIL_TABLESPACE, fil_space_create(name, space, flags, FIL_TABLESPACE,
NULL /* no encryption */, crypt_data,
true /* create */); true /* create */);
ut_a(fil_validate()); ut_a(fil_validate());
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment