summaryrefslogtreecommitdiff
path: root/extra
diff options
context:
space:
mode:
authorMarko Mäkelä <marko.makela@mariadb.com>2018-12-21 09:43:35 +0200
committerMarko Mäkelä <marko.makela@mariadb.com>2018-12-21 09:43:35 +0200
commitb7a9563b2140f105e6451559f5985a9c3f03a70e (patch)
tree29f448368895b68dc74ac64f3662b13f73d96082 /extra
parente631ea4a7c597557f2be6b9cd1118f4f3a71dccd (diff)
parent40a094e4a8fdea2f07231faa0d5911ed023a320b (diff)
downloadmariadb-git-b7a9563b2140f105e6451559f5985a9c3f03a70e.tar.gz
Merge 10.1 into 10.2
Diffstat (limited to 'extra')
-rw-r--r--extra/mariabackup/fil_cur.cc206
-rw-r--r--extra/mariabackup/xtrabackup.cc10
-rw-r--r--extra/mariabackup/xtrabackup.h1
3 files changed, 121 insertions, 96 deletions
diff --git a/extra/mariabackup/fil_cur.cc b/extra/mariabackup/fil_cur.cc
index a080f7e5420..44d1b788436 100644
--- a/extra/mariabackup/fil_cur.cc
+++ b/extra/mariabackup/fil_cur.cc
@@ -272,6 +272,96 @@ xb_fil_cur_open(
return(XB_FIL_CUR_SUCCESS);
}
+static bool page_is_corrupted(byte *page, ulint page_no, xb_fil_cur_t *cursor,
+ fil_space_t *space)
+{
+ byte tmp_frame[UNIV_PAGE_SIZE_MAX];
+ byte tmp_page[UNIV_PAGE_SIZE_MAX];
+ const ulint page_size = cursor->page_size.physical();
+ ulint page_type = mach_read_from_2(page + FIL_PAGE_TYPE);
+
+ /* We ignore the doublewrite buffer pages.*/
+ if (cursor->space_id == TRX_SYS_SPACE
+ && page_no >= FSP_EXTENT_SIZE
+ && page_no < FSP_EXTENT_SIZE * 3) {
+ return false;
+ }
+
+ /* Validate page number. */
+ if (mach_read_from_4(page + FIL_PAGE_OFFSET) != page_no
+ && cursor->space_id != TRX_SYS_SPACE) {
+ /* On pages that are not all zero, the
+ page number must match.
+
+ There may be a mismatch on tablespace ID,
+ because files may be renamed during backup.
+ We disable the page number check
+ on the system tablespace, because it may consist
+ of multiple files, and here we count the pages
+ from the start of each file.)
+
+ The first 38 and last 8 bytes are never encrypted. */
+ const ulint* p = reinterpret_cast<ulint*>(page);
+ const ulint* const end = reinterpret_cast<ulint*>(
+ page + page_size);
+ do {
+ if (*p++) {
+ return true;
+ }
+ } while (p != end);
+
+ /* Whole zero page is valid. */
+ return false;
+ }
+
+ /* Validate encrypted pages. */
+ if (mach_read_from_4(page + FIL_PAGE_FILE_FLUSH_LSN_OR_KEY_VERSION)
+ && (space->crypt_data
+ && space->crypt_data->type != CRYPT_SCHEME_UNENCRYPTED)) {
+
+ if (!fil_space_verify_crypt_checksum(page, cursor->page_size))
+ return true;
+
+ /* Compressed encrypted need to be decrypted
+ and decompressed for verification. */
+ if (page_type != FIL_PAGE_PAGE_COMPRESSED_ENCRYPTED
+ && !opt_extended_validation)
+ return false;
+
+ memcpy(tmp_page, page, page_size);
+
+ bool decrypted = false;
+ if (!fil_space_decrypt(space, tmp_frame, tmp_page, &decrypted)) {
+ return true;
+ }
+
+ if (page_type != FIL_PAGE_PAGE_COMPRESSED_ENCRYPTED) {
+ return buf_page_is_corrupted(true, tmp_page,
+ cursor->page_size, space);
+ }
+ }
+
+ if (page_type == FIL_PAGE_PAGE_COMPRESSED) {
+ memcpy(tmp_page, page, page_size);
+ }
+
+ if (page_type == FIL_PAGE_PAGE_COMPRESSED
+ || page_type == FIL_PAGE_PAGE_COMPRESSED_ENCRYPTED) {
+ ulint decomp = fil_page_decompress(tmp_frame, tmp_page);
+ page_type = mach_read_from_2(tmp_page + FIL_PAGE_TYPE);
+
+ return (!decomp
+ || (decomp != srv_page_size
+ && cursor->page_size.is_compressed())
+ || page_type == FIL_PAGE_PAGE_COMPRESSED
+ || page_type == FIL_PAGE_PAGE_COMPRESSED_ENCRYPTED
+ || buf_page_is_corrupted(true, tmp_page,
+ cursor->page_size, space));
+ }
+
+ return buf_page_is_corrupted(true, page, cursor->page_size, space);
+}
+
/************************************************************************
Reads and verifies the next block of pages from the source
file. Positions the cursor after the last read non-corrupted page.
@@ -290,8 +380,6 @@ xb_fil_cur_read(
xb_fil_cur_result_t ret;
ib_int64_t offset;
ib_int64_t to_read;
- byte tmp_frame[UNIV_PAGE_SIZE_MAX];
- byte tmp_page[UNIV_PAGE_SIZE_MAX];
const ulint page_size = cursor->page_size.physical();
xb_ad(!cursor->is_system() || page_size == UNIV_PAGE_SIZE);
@@ -358,103 +446,29 @@ read_retry:
for (page = cursor->buf, i = 0; i < npages;
page += page_size, i++) {
ulint page_no = cursor->buf_page_no + i;
- ulint page_type = mach_read_from_2(page + FIL_PAGE_TYPE);
-
- if (cursor->space_id == TRX_SYS_SPACE
- && page_no >= FSP_EXTENT_SIZE
- && page_no < FSP_EXTENT_SIZE * 3) {
- /* We ignore the doublewrite buffer pages */
- } else if (mach_read_from_4(page + FIL_PAGE_OFFSET) != page_no
- && space->id != TRX_SYS_SPACE) {
- /* On pages that are not all zero, the
- page number must match.
-
- There may be a mismatch on tablespace ID,
- because files may be renamed during backup.
- We disable the page number check
- on the system tablespace, because it may consist
- of multiple files, and here we count the pages
- from the start of each file.)
-
- The first 38 and last 8 bytes are never encrypted. */
- const ulint* p = reinterpret_cast<ulint*>(page);
- const ulint* const end = reinterpret_cast<ulint*>(
- page + page_size);
- do {
- if (*p++) {
- goto corrupted;
- }
- } while (p != end);
- } else if (mach_read_from_4(
- page
- + FIL_PAGE_FILE_FLUSH_LSN_OR_KEY_VERSION)
- && space->crypt_data
- && space->crypt_data->type
- != CRYPT_SCHEME_UNENCRYPTED
- && fil_space_verify_crypt_checksum(
- page, cursor->page_size)) {
- bool decrypted = false;
-
- memcpy(tmp_page, page, page_size);
-
- if (!fil_space_decrypt(space, tmp_frame,
- tmp_page, &decrypted)) {
- goto corrupted;
- }
-
- if (page_type == FIL_PAGE_PAGE_COMPRESSED_ENCRYPTED) {
- goto page_decomp;
- }
- if (buf_page_is_corrupted(true, tmp_page,
- cursor->page_size, space)) {
- goto corrupted;
- }
- } else if (page_type == FIL_PAGE_PAGE_COMPRESSED) {
- memcpy(tmp_page, page, page_size);
-page_decomp:
- ulint decomp = fil_page_decompress(tmp_frame, tmp_page);
- page_type = mach_read_from_2(tmp_page + FIL_PAGE_TYPE);
-
- if (!decomp
- || (decomp != srv_page_size
- && cursor->page_size.is_compressed())
- || page_type == FIL_PAGE_PAGE_COMPRESSED
- || page_type == FIL_PAGE_PAGE_COMPRESSED_ENCRYPTED
- || buf_page_is_corrupted(true, tmp_page,
- cursor->page_size,
- space)) {
- goto corrupted;
+ if (page_is_corrupted(page, page_no, cursor, space)){
+ retry_count--;
+
+ if (retry_count == 0) {
+ msg("[%02u] mariabackup: "
+ "Error: failed to read page after "
+ "10 retries. File %s seems to be "
+ "corrupted.\n", cursor->thread_n,
+ cursor->abs_path);
+ ret = XB_FIL_CUR_ERROR;
+ break;
}
+ msg("[%02u] mariabackup: "
+ "Database page corruption detected at page "
+ ULINTPF ", retrying...\n", cursor->thread_n,
+ page_no);
- } else if (page_type == FIL_PAGE_PAGE_COMPRESSED_ENCRYPTED
- || buf_page_is_corrupted(true, page,
- cursor->page_size,
- space)) {
-corrupted:
- retry_count--;
- if (retry_count == 0) {
- msg("[%02u] mariabackup: "
- "Error: failed to read page after "
- "10 retries. File %s seems to be "
- "corrupted.\n", cursor->thread_n,
- cursor->abs_path);
- ret = XB_FIL_CUR_ERROR;
- break;
- }
-
- if (retry_count == 9) {
- msg("[%02u] mariabackup: "
- "Database page corruption detected at page "
- ULINTPF ", retrying...\n",
- cursor->thread_n, page_no);
- }
-
- os_thread_sleep(100000);
- goto read_retry;
- }
- cursor->buf_read += page_size;
- cursor->buf_npages++;
+ os_thread_sleep(100000);
+ goto read_retry;
+ }
+ cursor->buf_read += page_size;
+ cursor->buf_npages++;
}
posix_fadvise(cursor->file, offset, to_read, POSIX_FADV_DONTNEED);
diff --git a/extra/mariabackup/xtrabackup.cc b/extra/mariabackup/xtrabackup.cc
index cbd5a72aa34..9769c875fe3 100644
--- a/extra/mariabackup/xtrabackup.cc
+++ b/extra/mariabackup/xtrabackup.cc
@@ -200,6 +200,7 @@ static char* log_ignored_opt;
extern my_bool opt_use_ssl;
my_bool opt_ssl_verify_server_cert;
+my_bool opt_extended_validation;
/* === metadata of backup === */
#define XTRABACKUP_METADATA_FILENAME "xtrabackup_checkpoints"
@@ -760,6 +761,7 @@ enum options_xtrabackup
OPT_XTRA_DATABASES,
OPT_XTRA_DATABASES_FILE,
OPT_XTRA_PARALLEL,
+ OPT_XTRA_EXTENDED_VALIDATION,
OPT_XTRA_STREAM,
OPT_XTRA_COMPRESS,
OPT_XTRA_COMPRESS_THREADS,
@@ -1220,6 +1222,14 @@ struct my_option xb_server_options[] =
(G_PTR*) &xtrabackup_parallel, (G_PTR*) &xtrabackup_parallel, 0, GET_INT,
REQUIRED_ARG, 1, 1, INT_MAX, 0, 0, 0},
+ {"extended_validation", OPT_XTRA_EXTENDED_VALIDATION,
+ "Enable extended validation for Innodb data pages during backup phase."
+ "Will slow down backup considerably, in case encryption is used.",
+ (G_PTR*)&opt_extended_validation,
+ (G_PTR*)&opt_extended_validation,
+ 0, GET_BOOL, NO_ARG, FALSE, 0, 0, 0, 0, 0},
+
+
{"log", OPT_LOG, "Ignored option for MySQL option compatibility",
(G_PTR*) &log_ignored_opt, (G_PTR*) &log_ignored_opt, 0,
GET_STR, OPT_ARG, 0, 0, 0, 0, 0, 0},
diff --git a/extra/mariabackup/xtrabackup.h b/extra/mariabackup/xtrabackup.h
index 857c253f803..7de28d1ea31 100644
--- a/extra/mariabackup/xtrabackup.h
+++ b/extra/mariabackup/xtrabackup.h
@@ -111,6 +111,7 @@ extern my_bool opt_noversioncheck;
extern my_bool opt_no_backup_locks;
extern my_bool opt_decompress;
extern my_bool opt_remove_original;
+extern my_bool opt_extended_validation;
extern my_bool opt_lock_ddl_per_table;
extern char *opt_incremental_history_name;