Skip to content

Commit 6310809

Browse files
committed
Fix check for conflicting session- vs transaction-level locks.
We have an implementation restriction that PREPARE TRANSACTION can't handle cases where both session-lifespan and transaction-lifespan locks are held on the same lockable object. (That's because we'd otherwise need to acquire a new PROCLOCK entry during post-prepare cleanup, which is an operation that might fail. The situation can only arise with odd usages of advisory locks, so removing the restriction is probably not worth the amount of effort it would take.) AtPrepare_Locks attempted to enforce this, but its logic was many bricks shy of a load, because it only detected cases where the session and transaction locks had the same lockmode. Locks of different modes on the same object would lead to the rather unhelpful message "PANIC: we seem to have dropped a bit somewhere". To fix, build a transient hashtable with one entry per locktag, not one per locktag + mode, and use that to detect conflicts. Per bug #17122 from Alexander Pyhalov. This bug is ancient, so back-patch to all supported branches. Discussion: https://postgr.es/m/17122-04f3c32098a62233@postgresql.org
1 parent 3779ac6 commit 6310809

File tree

4 files changed

+144
-24
lines changed

4 files changed

+144
-24
lines changed

src/backend/storage/lmgr/lock.c

+105-24
Original file line numberDiff line numberDiff line change
@@ -3204,31 +3204,124 @@ LockRefindAndRelease(LockMethod lockMethodTable, PGPROC *proc,
32043204
}
32053205
}
32063206

3207+
/*
3208+
* CheckForSessionAndXactLocks
3209+
* Check to see if transaction holds both session-level and xact-level
3210+
* locks on the same object; if so, throw an error.
3211+
*
3212+
* If we have both session- and transaction-level locks on the same object,
3213+
* PREPARE TRANSACTION must fail. This should never happen with regular
3214+
* locks, since we only take those at session level in some special operations
3215+
* like VACUUM. It's possible to hit this with advisory locks, though.
3216+
*
3217+
* It would be nice if we could keep the session hold and give away the
3218+
* transactional hold to the prepared xact. However, that would require two
3219+
* PROCLOCK objects, and we cannot be sure that another PROCLOCK will be
3220+
* available when it comes time for PostPrepare_Locks to do the deed.
3221+
* So for now, we error out while we can still do so safely.
3222+
*
3223+
* Since the LOCALLOCK table stores a separate entry for each lockmode,
3224+
* we can't implement this check by examining LOCALLOCK entries in isolation.
3225+
* We must build a transient hashtable that is indexed by locktag only.
3226+
*/
3227+
static void
3228+
CheckForSessionAndXactLocks(void)
3229+
{
3230+
typedef struct
3231+
{
3232+
LOCKTAG lock; /* identifies the lockable object */
3233+
bool sessLock; /* is any lockmode held at session level? */
3234+
bool xactLock; /* is any lockmode held at xact level? */
3235+
} PerLockTagEntry;
3236+
3237+
HASHCTL hash_ctl;
3238+
HTAB *lockhtab;
3239+
HASH_SEQ_STATUS status;
3240+
LOCALLOCK *locallock;
3241+
3242+
/* Create a local hash table keyed by LOCKTAG only */
3243+
hash_ctl.keysize = sizeof(LOCKTAG);
3244+
hash_ctl.entrysize = sizeof(PerLockTagEntry);
3245+
hash_ctl.hcxt = CurrentMemoryContext;
3246+
3247+
lockhtab = hash_create("CheckForSessionAndXactLocks table",
3248+
256, /* arbitrary initial size */
3249+
&hash_ctl,
3250+
HASH_ELEM | HASH_BLOBS | HASH_CONTEXT);
3251+
3252+
/* Scan local lock table to find entries for each LOCKTAG */
3253+
hash_seq_init(&status, LockMethodLocalHash);
3254+
3255+
while ((locallock = (LOCALLOCK *) hash_seq_search(&status)) != NULL)
3256+
{
3257+
LOCALLOCKOWNER *lockOwners = locallock->lockOwners;
3258+
PerLockTagEntry *hentry;
3259+
bool found;
3260+
int i;
3261+
3262+
/*
3263+
* Ignore VXID locks. We don't want those to be held by prepared
3264+
* transactions, since they aren't meaningful after a restart.
3265+
*/
3266+
if (locallock->tag.lock.locktag_type == LOCKTAG_VIRTUALTRANSACTION)
3267+
continue;
3268+
3269+
/* Ignore it if we don't actually hold the lock */
3270+
if (locallock->nLocks <= 0)
3271+
continue;
3272+
3273+
/* Otherwise, find or make an entry in lockhtab */
3274+
hentry = (PerLockTagEntry *) hash_search(lockhtab,
3275+
(void *) &locallock->tag.lock,
3276+
HASH_ENTER, &found);
3277+
if (!found) /* initialize, if newly created */
3278+
hentry->sessLock = hentry->xactLock = false;
3279+
3280+
/* Scan to see if we hold lock at session or xact level or both */
3281+
for (i = locallock->numLockOwners - 1; i >= 0; i--)
3282+
{
3283+
if (lockOwners[i].owner == NULL)
3284+
hentry->sessLock = true;
3285+
else
3286+
hentry->xactLock = true;
3287+
}
3288+
3289+
/*
3290+
* We can throw error immediately when we see both types of locks; no
3291+
* need to wait around to see if there are more violations.
3292+
*/
3293+
if (hentry->sessLock && hentry->xactLock)
3294+
ereport(ERROR,
3295+
(errcode(ERRCODE_FEATURE_NOT_SUPPORTED),
3296+
errmsg("cannot PREPARE while holding both session-level and transaction-level locks on the same object")));
3297+
}
3298+
3299+
/* Success, so clean up */
3300+
hash_destroy(lockhtab);
3301+
}
3302+
32073303
/*
32083304
* AtPrepare_Locks
32093305
* Do the preparatory work for a PREPARE: make 2PC state file records
32103306
* for all locks currently held.
32113307
*
32123308
* Session-level locks are ignored, as are VXID locks.
32133309
*
3214-
* There are some special cases that we error out on: we can't be holding any
3215-
* locks at both session and transaction level (since we must either keep or
3216-
* give away the PROCLOCK object), and we can't be holding any locks on
3217-
* temporary objects (since that would mess up the current backend if it tries
3218-
* to exit before the prepared xact is committed).
3310+
* For the most part, we don't need to touch shared memory for this ---
3311+
* all the necessary state information is in the locallock table.
3312+
* Fast-path locks are an exception, however: we move any such locks to
3313+
* the main table before allowing PREPARE TRANSACTION to succeed.
32193314
*/
32203315
void
32213316
AtPrepare_Locks(void)
32223317
{
32233318
HASH_SEQ_STATUS status;
32243319
LOCALLOCK *locallock;
32253320

3226-
/*
3227-
* For the most part, we don't need to touch shared memory for this ---
3228-
* all the necessary state information is in the locallock table.
3229-
* Fast-path locks are an exception, however: we move any such locks to
3230-
* the main table before allowing PREPARE TRANSACTION to succeed.
3231-
*/
3321+
/* First, verify there aren't locks of both xact and session level */
3322+
CheckForSessionAndXactLocks();
3323+
3324+
/* Now do the per-locallock cleanup work */
32323325
hash_seq_init(&status, LockMethodLocalHash);
32333326

32343327
while ((locallock = (LOCALLOCK *) hash_seq_search(&status)) != NULL)
@@ -3264,19 +3357,7 @@ AtPrepare_Locks(void)
32643357
if (!haveXactLock)
32653358
continue;
32663359

3267-
/*
3268-
* If we have both session- and transaction-level locks, fail. This
3269-
* should never happen with regular locks, since we only take those at
3270-
* session level in some special operations like VACUUM. It's
3271-
* possible to hit this with advisory locks, though.
3272-
*
3273-
* It would be nice if we could keep the session hold and give away
3274-
* the transactional hold to the prepared xact. However, that would
3275-
* require two PROCLOCK objects, and we cannot be sure that another
3276-
* PROCLOCK will be available when it comes time for PostPrepare_Locks
3277-
* to do the deed. So for now, we error out while we can still do so
3278-
* safely.
3279-
*/
3360+
/* This can't happen, because we already checked it */
32803361
if (haveSessionLock)
32813362
ereport(ERROR,
32823363
(errcode(ERRCODE_FEATURE_NOT_SUPPORTED),

src/test/regress/expected/prepared_xacts.out

+16
Original file line numberDiff line numberDiff line change
@@ -151,6 +151,22 @@ SELECT gid FROM pg_prepared_xacts;
151151

152152
-- Clean up
153153
DROP TABLE pxtest1;
154+
-- Test detection of session-level and xact-level locks on same object
155+
BEGIN;
156+
SELECT pg_advisory_lock(1);
157+
pg_advisory_lock
158+
------------------
159+
160+
(1 row)
161+
162+
SELECT pg_advisory_xact_lock_shared(1);
163+
pg_advisory_xact_lock_shared
164+
------------------------------
165+
166+
(1 row)
167+
168+
PREPARE TRANSACTION 'foo6'; -- fails
169+
ERROR: cannot PREPARE while holding both session-level and transaction-level locks on the same object
154170
-- Test subtransactions
155171
BEGIN TRANSACTION ISOLATION LEVEL SERIALIZABLE;
156172
CREATE TABLE pxtest2 (a int);

src/test/regress/expected/prepared_xacts_1.out

+17
Original file line numberDiff line numberDiff line change
@@ -153,6 +153,23 @@ SELECT gid FROM pg_prepared_xacts;
153153

154154
-- Clean up
155155
DROP TABLE pxtest1;
156+
-- Test detection of session-level and xact-level locks on same object
157+
BEGIN;
158+
SELECT pg_advisory_lock(1);
159+
pg_advisory_lock
160+
------------------
161+
162+
(1 row)
163+
164+
SELECT pg_advisory_xact_lock_shared(1);
165+
pg_advisory_xact_lock_shared
166+
------------------------------
167+
168+
(1 row)
169+
170+
PREPARE TRANSACTION 'foo6'; -- fails
171+
ERROR: prepared transactions are disabled
172+
HINT: Set max_prepared_transactions to a nonzero value.
156173
-- Test subtransactions
157174
BEGIN TRANSACTION ISOLATION LEVEL SERIALIZABLE;
158175
CREATE TABLE pxtest2 (a int);

src/test/regress/sql/prepared_xacts.sql

+6
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,12 @@ SELECT gid FROM pg_prepared_xacts;
8888
-- Clean up
8989
DROP TABLE pxtest1;
9090

91+
-- Test detection of session-level and xact-level locks on same object
92+
BEGIN;
93+
SELECT pg_advisory_lock(1);
94+
SELECT pg_advisory_xact_lock_shared(1);
95+
PREPARE TRANSACTION 'foo6'; -- fails
96+
9197
-- Test subtransactions
9298
BEGIN TRANSACTION ISOLATION LEVEL SERIALIZABLE;
9399
CREATE TABLE pxtest2 (a int);

0 commit comments

Comments
 (0)