Details
-
Bug
-
Status: Closed (View Workflow)
-
Critical
-
Resolution: Fixed
-
10.1(EOL), 10.2(EOL), 10.3(EOL)
Description
The fix for MDEV-10368 and MDEV-11587 introduced innodb_encryption_rotate_key_age=0 as a special value that disables key rotation entirely. This can help performance, since the key rotation checks seem to require a lot of CPU resources.
Unfortunately, when innodb_encryption_rotate_key_age=0 is set, it also seems to prevent the server from encrypting unencrypted tablespaces in the background.
To reproduce, do the following:
1.) Initialize a datadir without encryption enabled. You can ensure that the tablespaces are not encrypted by querying INFORMATION_SCHEMA.INNODB_TABLESPACES_ENCRYPTION and confirming that there are 0 rows.
MariaDB [(none)]> SELECT * FROM INFORMATION_SCHEMA.INNODB_TABLESPACES_ENCRYPTION\G
|
Empty set (0.01 sec)
|
2.) Then change the configuration to enable encryption. Be sure to set innodb_encryption_rotate_key_age=0. I used the following configuration:
plugin-load-add=file_key_management
|
file-key-management
|
file_key_management_encryption_algorithm=aes_cbc
|
file_key_management_filename = /etc/my.cnf.d//keys.enc
|
file_key_management_filekey = secret
|
innodb-encrypt-tables
|
innodb-encrypt-log
|
innodb-encryption-threads=4
|
encrypt-tmp-disk-tables=1
|
encrypt-tmp-files=1
|
encrypt-binlog=1
|
innodb_encryption_rotate_key_age = 0
|
3.) Restart the server.
4.) Check whether the tablespaces are encrypted. They still are not:
MariaDB [(none)]> SELECT * FROM INFORMATION_SCHEMA.INNODB_TABLESPACES_ENCRYPTION\G
|
Empty set (0.00 sec)
|
5.) Change the configuration so that innodb_encryption_rotate_key_age=0 is commented out.
6.) Restart the server.
7.) Check whether the tablespaces are encrypted. They are:
MariaDB [(none)]> SELECT * FROM INFORMATION_SCHEMA.INNODB_TABLESPACES_ENCRYPTION\G
|
*************************** 1. row ***************************
|
SPACE: 1
|
NAME: mysql/innodb_table_stats
|
ENCRYPTION_SCHEME: 1
|
KEYSERVER_REQUESTS: 1
|
MIN_KEY_VERSION: 1
|
CURRENT_KEY_VERSION: 1
|
KEY_ROTATION_PAGE_NUMBER: NULL
|
KEY_ROTATION_MAX_PAGE_NUMBER: NULL
|
CURRENT_KEY_ID: 1
|
ROTATING_OR_FLUSHING: 0
|
*************************** 2. row ***************************
|
SPACE: 2
|
NAME: mysql/innodb_index_stats
|
ENCRYPTION_SCHEME: 1
|
KEYSERVER_REQUESTS: 1
|
MIN_KEY_VERSION: 1
|
CURRENT_KEY_VERSION: 1
|
KEY_ROTATION_PAGE_NUMBER: NULL
|
KEY_ROTATION_MAX_PAGE_NUMBER: NULL
|
CURRENT_KEY_ID: 1
|
ROTATING_OR_FLUSHING: 0
|
*************************** 3. row ***************************
|
SPACE: 3
|
NAME: mysql/gtid_slave_pos
|
ENCRYPTION_SCHEME: 1
|
KEYSERVER_REQUESTS: 1
|
MIN_KEY_VERSION: 1
|
CURRENT_KEY_VERSION: 1
|
KEY_ROTATION_PAGE_NUMBER: NULL
|
KEY_ROTATION_MAX_PAGE_NUMBER: NULL
|
CURRENT_KEY_ID: 1
|
ROTATING_OR_FLUSHING: 0
|
*************************** 4. row ***************************
|
SPACE: 0
|
NAME: innodb_system
|
ENCRYPTION_SCHEME: 1
|
KEYSERVER_REQUESTS: 1
|
MIN_KEY_VERSION: 1
|
CURRENT_KEY_VERSION: 1
|
KEY_ROTATION_PAGE_NUMBER: NULL
|
KEY_ROTATION_MAX_PAGE_NUMBER: NULL
|
CURRENT_KEY_ID: 1
|
ROTATING_OR_FLUSHING: 0
|
4 rows in set (0.00 sec)
|
Attachments
Issue Links
- causes
-
MDEV-25998 InnoDB removes the tablespace from default encrypt list early
-
- Closed
-
- relates to
-
MDEV-11657 Cross-engine transaction metadata
-
- Open
-
-
MDEV-14157 Improve documentation of data at rest encryption
-
- Closed
-
-
MDEV-14571 mysql_install_db does not encrypt system tablespace when innodb_encrypt_tables is set
-
- Closed
-
-
MDEV-18128 Simplify .ibd file creation
-
- Closed
-
-
MDEV-18518 Implement atomic multi-table (or multi-partition) CREATE TABLE for InnoDB
-
- Closed
-
-
MDEV-19910 Background encryption of InnoDB system tablespace is broken
-
- Closed
-
-
MDEV-10368 get_latest_version() called too often
-
- Closed
-
-
MDEV-11581 Mariadb starts innodb encryption threads when key has not changed or data scrubbing turned off
-
- Closed
-
-
MDEV-11587 Add new configuration variable to disable encryption key rotation
-
- Closed
-
-
MDEV-14180 Automatically disable key rotation checks for file_key_management plugin
-
- Closed
-
-
MDEV-14610 Add syntax to manually encrypt/decrypt InnoDB's system tablespace
-
- Closed
-
-
MDEV-19509 InnoDB skips the tablespace in rotation list
-
- Closed
-
I pushed one more change that avoids releasing and re-acquiring fil_system.mutex in low-level code, and tries to update the DICT_HDR page at the higher level where appropriate.
After that, I was thinking that the global encryption status should also change if we remove the last tablespace of its kind (encrypted or unencrypted). The following patch attempts to do that, but additional tests would start to fail if I actually enable the logic (see below):
diff --git a/storage/innobase/include/fil0fil.h b/storage/innobase/include/fil0fil.h
index fd9cc91d574..4015b39982c 100644
--- a/storage/innobase/include/fil0fil.h
+++ b/storage/innobase/include/fil0fil.h
@@ -644,12 +644,13 @@ struct fil_system_t {
void close();
/**
- Set the encryption status of all tablespaces after a tablespace
- has been added to unencrypted_spaces or encrypted_spaces.
+ Set the encryption status of all tablespaces after
+ unencrypted_spaces or encrypted_spaces has been changed.
@param[in] encrypted whether the tablespace is encrypted
+ @param[in] remove whether the tablespace is being removed
@return whether dict_hdr_crypt_status_update() must be called */
- inline bool crypt_enlist(bool encrypted);
+ inline bool crypt_update(bool encrypted, bool remove);
private:
bool m_initialised;
diff --git a/storage/innobase/fil/fil0fil.cc b/storage/innobase/fil/fil0fil.cc
index 68e684b69d4..3f07a37bc17 100644
--- a/storage/innobase/fil/fil0fil.cc
+++ b/storage/innobase/fil/fil0fil.cc
@@ -5098,7 +5098,7 @@ fil_space_set_punch_hole(
node->space->punch_hole = val;
}
-inline bool fil_system_t::crypt_enlist(bool encrypted)
+inline bool fil_system_t::crypt_update(bool encrypted, bool remove)
{
ut_ad(is_initialised());
ut_ad(this == &fil_system);
@@ -5114,12 +5114,12 @@ inline bool fil_system_t::crypt_enlist(bool encrypted)
switch (status) {
case CRYPT_ENCRYPTED:
- if (!encrypted) {
+ if (!remove && !encrypted) {
status = CRYPT_MIXED;
}
break;
case CRYPT_DECRYPTED:
- if (encrypted) {
+ if (!remove && encrypted) {
status = CRYPT_MIXED;
}
break;
@@ -5158,12 +5158,12 @@ bool fil_space_t::crypt_enlist()
if (!crypt_data || !crypt_data->min_key_version) {
if (add_if_not_in_unencrypted_spaces()) {
remove_if_in_encrypted_spaces();
- return fil_system.crypt_enlist(false);
+ return fil_system.crypt_update(false, false);
}
} else {
if (add_if_not_in_encrypted_spaces()) {
remove_if_in_unencrypted_spaces();
- return fil_system.crypt_enlist(true);
+ return fil_system.crypt_update(true, false);
}
}
@@ -5178,9 +5178,18 @@ inline bool fil_space_t::crypt_delist()
return false;
}
- if (remove_if_in_encrypted_spaces()
- || remove_if_in_unencrypted_spaces()) {
- return true;
+ if (remove_if_in_encrypted_spaces()) {
+ ut_ad(!is_in_unencrypted_spaces());
+ ut_ad(true || fil_system.crypt_status
+ != fil_system_t::CRYPT_DECRYPTED);
+ return true || fil_system.crypt_update(true, true);
+ }
+
+ if (remove_if_in_unencrypted_spaces()) {
+ ut_ad(!is_in_unencrypted_spaces());
+ ut_ad(true || fil_system.crypt_status
+ != fil_system_t::CRYPT_ENCRYPTED);
+ return true || fil_system.crypt_update(false, true);
}
If you apply the patch and remove the 4 occurrences of true || at the end of the patch, then the following tests will fail (in addition to the 3 already failing tests):
thiru, please investigate and fix this.
Also, while working on the patch, I noticed that MLOG_FILE_CREATE2 is not being written (and flushed) ahead of the file creation, but behind it. That would be fixed in the course of
MDEV-18128orMDEV-18518.