PostgreSQL Source Code git master
Loading...
Searching...
No Matches
predicate.c
Go to the documentation of this file.
1/*-------------------------------------------------------------------------
2 *
3 * predicate.c
4 * POSTGRES predicate locking
5 * to support full serializable transaction isolation
6 *
7 *
8 * The approach taken is to implement Serializable Snapshot Isolation (SSI)
9 * as initially described in this paper:
10 *
11 * Michael J. Cahill, Uwe Röhm, and Alan D. Fekete. 2008.
12 * Serializable isolation for snapshot databases.
13 * In SIGMOD '08: Proceedings of the 2008 ACM SIGMOD
14 * international conference on Management of data,
15 * pages 729-738, New York, NY, USA. ACM.
16 * http://doi.acm.org/10.1145/1376616.1376690
17 *
18 * and further elaborated in Cahill's doctoral thesis:
19 *
20 * Michael James Cahill. 2009.
21 * Serializable Isolation for Snapshot Databases.
22 * Sydney Digital Theses.
23 * University of Sydney, School of Information Technologies.
24 * http://hdl.handle.net/2123/5353
25 *
26 *
27 * Predicate locks for Serializable Snapshot Isolation (SSI) are SIREAD
28 * locks, which are so different from normal locks that a distinct set of
29 * structures is required to handle them. They are needed to detect
30 * rw-conflicts when the read happens before the write. (When the write
31 * occurs first, the reading transaction can check for a conflict by
32 * examining the MVCC data.)
33 *
34 * (1) Besides tuples actually read, they must cover ranges of tuples
35 * which would have been read based on the predicate. This will
36 * require modelling the predicates through locks against database
37 * objects such as pages, index ranges, or entire tables.
38 *
39 * (2) They must be kept in RAM for quick access. Because of this, it
40 * isn't possible to always maintain tuple-level granularity -- when
41 * the space allocated to store these approaches exhaustion, a
42 * request for a lock may need to scan for situations where a single
43 * transaction holds many fine-grained locks which can be coalesced
44 * into a single coarser-grained lock.
45 *
46 * (3) They never block anything; they are more like flags than locks
47 * in that regard; although they refer to database objects and are
48 * used to identify rw-conflicts with normal write locks.
49 *
50 * (4) While they are associated with a transaction, they must survive
51 * a successful COMMIT of that transaction, and remain until all
52 * overlapping transactions complete. This even means that they
53 * must survive termination of the transaction's process. If a
54 * top level transaction is rolled back, however, it is immediately
55 * flagged so that it can be ignored, and its SIREAD locks can be
56 * released any time after that.
57 *
58 * (5) The only transactions which create SIREAD locks or check for
59 * conflicts with them are serializable transactions.
60 *
61 * (6) When a write lock for a top level transaction is found to cover
62 * an existing SIREAD lock for the same transaction, the SIREAD lock
63 * can be deleted.
64 *
65 * (7) A write from a serializable transaction must ensure that an xact
66 * record exists for the transaction, with the same lifespan (until
67 * all concurrent transaction complete or the transaction is rolled
68 * back) so that rw-dependencies to that transaction can be
69 * detected.
70 *
71 * We use an optimization for read-only transactions. Under certain
72 * circumstances, a read-only transaction's snapshot can be shown to
73 * never have conflicts with other transactions. This is referred to
74 * as a "safe" snapshot (and one known not to be is "unsafe").
75 * However, it can't be determined whether a snapshot is safe until
76 * all concurrent read/write transactions complete.
77 *
78 * Once a read-only transaction is known to have a safe snapshot, it
79 * can release its predicate locks and exempt itself from further
80 * predicate lock tracking. READ ONLY DEFERRABLE transactions run only
81 * on safe snapshots, waiting as necessary for one to be available.
82 *
83 *
84 * Lightweight locks to manage access to the predicate locking shared
85 * memory objects must be taken in this order, and should be released in
86 * reverse order:
87 *
88 * SerializableFinishedListLock
89 * - Protects the list of transactions which have completed but which
90 * may yet matter because they overlap still-active transactions.
91 *
92 * SerializablePredicateListLock
93 * - Protects the linked list of locks held by a transaction. Note
94 * that the locks themselves are also covered by the partition
95 * locks of their respective lock targets; this lock only affects
96 * the linked list connecting the locks related to a transaction.
97 * - All transactions share this single lock (with no partitioning).
98 * - There is never a need for a process other than the one running
99 * an active transaction to walk the list of locks held by that
100 * transaction, except parallel query workers sharing the leader's
101 * transaction. In the parallel case, an extra per-sxact lock is
102 * taken; see below.
103 * - It is relatively infrequent that another process needs to
104 * modify the list for a transaction, but it does happen for such
105 * things as index page splits for pages with predicate locks and
106 * freeing of predicate locked pages by a vacuum process. When
107 * removing a lock in such cases, the lock itself contains the
108 * pointers needed to remove it from the list. When adding a
109 * lock in such cases, the lock can be added using the anchor in
110 * the transaction structure. Neither requires walking the list.
111 * - Cleaning up the list for a terminated transaction is sometimes
112 * not done on a retail basis, in which case no lock is required.
113 * - Due to the above, a process accessing its active transaction's
114 * list always uses a shared lock, regardless of whether it is
115 * walking or maintaining the list. This improves concurrency
116 * for the common access patterns.
117 * - A process which needs to alter the list of a transaction other
118 * than its own active transaction must acquire an exclusive
119 * lock.
120 *
121 * SERIALIZABLEXACT's member 'perXactPredicateListLock'
122 * - Protects the linked list of predicate locks held by a transaction.
123 * Only needed for parallel mode, where multiple backends share the
124 * same SERIALIZABLEXACT object. Not needed if
125 * SerializablePredicateListLock is held exclusively.
126 *
127 * PredicateLockHashPartitionLock(hashcode)
128 * - The same lock protects a target, all locks on that target, and
129 * the linked list of locks on the target.
130 * - When more than one is needed, acquire in ascending address order.
131 * - When all are needed (rare), acquire in ascending index order with
132 * PredicateLockHashPartitionLockByIndex(index).
133 *
134 * SerializableXactHashLock
135 * - Protects both PredXact and SerializableXidHash.
136 *
137 * SerialControlLock
138 * - Protects SerialControlData members
139 *
140 * SLRU per-bank locks
141 * - Protects SerialSlruCtl
142 *
143 * Portions Copyright (c) 1996-2026, PostgreSQL Global Development Group
144 * Portions Copyright (c) 1994, Regents of the University of California
145 *
146 *
147 * IDENTIFICATION
148 * src/backend/storage/lmgr/predicate.c
149 *
150 *-------------------------------------------------------------------------
151 */
152/*
153 * INTERFACE ROUTINES
154 *
155 * predicate lock reporting
156 * GetPredicateLockStatusData(void)
157 * PageIsPredicateLocked(Relation relation, BlockNumber blkno)
158 *
159 * predicate lock maintenance
160 * GetSerializableTransactionSnapshot(Snapshot snapshot)
161 * SetSerializableTransactionSnapshot(Snapshot snapshot,
162 * VirtualTransactionId *sourcevxid)
163 * RegisterPredicateLockingXid(void)
164 * PredicateLockRelation(Relation relation, Snapshot snapshot)
165 * PredicateLockPage(Relation relation, BlockNumber blkno,
166 * Snapshot snapshot)
167 * PredicateLockTID(Relation relation, const ItemPointerData *tid, Snapshot snapshot,
168 * TransactionId tuple_xid)
169 * PredicateLockPageSplit(Relation relation, BlockNumber oldblkno,
170 * BlockNumber newblkno)
171 * PredicateLockPageCombine(Relation relation, BlockNumber oldblkno,
172 * BlockNumber newblkno)
173 * TransferPredicateLocksToHeapRelation(Relation relation)
174 * ReleasePredicateLocks(bool isCommit, bool isReadOnlySafe)
175 *
176 * conflict detection (may also trigger rollback)
177 * CheckForSerializableConflictOut(Relation relation, TransactionId xid,
178 * Snapshot snapshot)
179 * CheckForSerializableConflictIn(Relation relation, const ItemPointerData *tid,
180 * BlockNumber blkno)
181 * CheckTableForSerializableConflictIn(Relation relation)
182 *
183 * final rollback checking
184 * PreCommit_CheckForSerializationFailure(void)
185 *
186 * two-phase commit support
187 * AtPrepare_PredicateLocks(void);
188 * PostPrepare_PredicateLocks(TransactionId xid);
189 * PredicateLockTwoPhaseFinish(FullTransactionId fxid, bool isCommit);
190 * predicatelock_twophase_recover(FullTransactionId fxid, uint16 info,
191 * void *recdata, uint32 len);
192 */
193
194#include "postgres.h"
195
196#include "access/parallel.h"
197#include "access/slru.h"
198#include "access/transam.h"
199#include "access/twophase.h"
200#include "access/twophase_rmgr.h"
201#include "access/xact.h"
202#include "access/xlog.h"
203#include "miscadmin.h"
204#include "pgstat.h"
205#include "port/pg_lfind.h"
206#include "storage/predicate.h"
208#include "storage/proc.h"
209#include "storage/procarray.h"
210#include "storage/shmem.h"
211#include "storage/subsystems.h"
212#include "utils/guc_hooks.h"
213#include "utils/rel.h"
214#include "utils/snapmgr.h"
215#include "utils/wait_event.h"
216
217/* Uncomment the next line to test the graceful degradation code. */
218/* #define TEST_SUMMARIZE_SERIAL */
219
220/*
221 * Test the most selective fields first, for performance.
222 *
223 * a is covered by b if all of the following hold:
224 * 1) a.database = b.database
225 * 2) a.relation = b.relation
226 * 3) b.offset is invalid (b is page-granularity or higher)
227 * 4) either of the following:
228 * 4a) a.offset is valid (a is tuple-granularity) and a.page = b.page
229 * or 4b) a.offset is invalid and b.page is invalid (a is
230 * page-granularity and b is relation-granularity
231 */
232#define TargetTagIsCoveredBy(covered_target, covering_target) \
233 ((GET_PREDICATELOCKTARGETTAG_RELATION(covered_target) == /* (2) */ \
234 GET_PREDICATELOCKTARGETTAG_RELATION(covering_target)) \
235 && (GET_PREDICATELOCKTARGETTAG_OFFSET(covering_target) == \
236 InvalidOffsetNumber) /* (3) */ \
237 && (((GET_PREDICATELOCKTARGETTAG_OFFSET(covered_target) != \
238 InvalidOffsetNumber) /* (4a) */ \
239 && (GET_PREDICATELOCKTARGETTAG_PAGE(covering_target) == \
240 GET_PREDICATELOCKTARGETTAG_PAGE(covered_target))) \
241 || ((GET_PREDICATELOCKTARGETTAG_PAGE(covering_target) == \
242 InvalidBlockNumber) /* (4b) */ \
243 && (GET_PREDICATELOCKTARGETTAG_PAGE(covered_target) \
244 != InvalidBlockNumber))) \
245 && (GET_PREDICATELOCKTARGETTAG_DB(covered_target) == /* (1) */ \
246 GET_PREDICATELOCKTARGETTAG_DB(covering_target)))
247
248/*
249 * The predicate locking target and lock shared hash tables are partitioned to
250 * reduce contention. To determine which partition a given target belongs to,
251 * compute the tag's hash code with PredicateLockTargetTagHashCode(), then
252 * apply one of these macros.
253 * NB: NUM_PREDICATELOCK_PARTITIONS must be a power of 2!
254 */
255#define PredicateLockHashPartition(hashcode) \
256 ((hashcode) % NUM_PREDICATELOCK_PARTITIONS)
257#define PredicateLockHashPartitionLock(hashcode) \
258 (&MainLWLockArray[PREDICATELOCK_MANAGER_LWLOCK_OFFSET + \
259 PredicateLockHashPartition(hashcode)].lock)
260#define PredicateLockHashPartitionLockByIndex(i) \
261 (&MainLWLockArray[PREDICATELOCK_MANAGER_LWLOCK_OFFSET + (i)].lock)
262
263#define NPREDICATELOCKTARGETENTS() \
264 mul_size(max_predicate_locks_per_xact, add_size(MaxBackends, max_prepared_xacts))
265
266#define SxactIsOnFinishedList(sxact) (!dlist_node_is_detached(&(sxact)->finishedLink))
267
268/*
269 * Note that a sxact is marked "prepared" once it has passed
270 * PreCommit_CheckForSerializationFailure, even if it isn't using
271 * 2PC. This is the point at which it can no longer be aborted.
272 *
273 * The PREPARED flag remains set after commit, so SxactIsCommitted
274 * implies SxactIsPrepared.
275 */
276#define SxactIsCommitted(sxact) (((sxact)->flags & SXACT_FLAG_COMMITTED) != 0)
277#define SxactIsPrepared(sxact) (((sxact)->flags & SXACT_FLAG_PREPARED) != 0)
278#define SxactIsRolledBack(sxact) (((sxact)->flags & SXACT_FLAG_ROLLED_BACK) != 0)
279#define SxactIsDoomed(sxact) (((sxact)->flags & SXACT_FLAG_DOOMED) != 0)
280#define SxactIsReadOnly(sxact) (((sxact)->flags & SXACT_FLAG_READ_ONLY) != 0)
281#define SxactHasSummaryConflictIn(sxact) (((sxact)->flags & SXACT_FLAG_SUMMARY_CONFLICT_IN) != 0)
282#define SxactHasSummaryConflictOut(sxact) (((sxact)->flags & SXACT_FLAG_SUMMARY_CONFLICT_OUT) != 0)
283/*
284 * The following macro actually means that the specified transaction has a
285 * conflict out *to a transaction which committed ahead of it*. It's hard
286 * to get that into a name of a reasonable length.
287 */
288#define SxactHasConflictOut(sxact) (((sxact)->flags & SXACT_FLAG_CONFLICT_OUT) != 0)
289#define SxactIsDeferrableWaiting(sxact) (((sxact)->flags & SXACT_FLAG_DEFERRABLE_WAITING) != 0)
290#define SxactIsROSafe(sxact) (((sxact)->flags & SXACT_FLAG_RO_SAFE) != 0)
291#define SxactIsROUnsafe(sxact) (((sxact)->flags & SXACT_FLAG_RO_UNSAFE) != 0)
292#define SxactIsPartiallyReleased(sxact) (((sxact)->flags & SXACT_FLAG_PARTIALLY_RELEASED) != 0)
293
294/*
295 * Compute the hash code associated with a PREDICATELOCKTARGETTAG.
296 *
297 * To avoid unnecessary recomputations of the hash code, we try to do this
298 * just once per function, and then pass it around as needed. Aside from
299 * passing the hashcode to hash_search_with_hash_value(), we can extract
300 * the lock partition number from the hashcode.
301 */
302#define PredicateLockTargetTagHashCode(predicatelocktargettag) \
303 get_hash_value(PredicateLockTargetHash, predicatelocktargettag)
304
305/*
306 * Given a predicate lock tag, and the hash for its target,
307 * compute the lock hash.
308 *
309 * To make the hash code also depend on the transaction, we xor the sxid
310 * struct's address into the hash code, left-shifted so that the
311 * partition-number bits don't change. Since this is only a hash, we
312 * don't care if we lose high-order bits of the address; use an
313 * intermediate variable to suppress cast-pointer-to-int warnings.
314 */
315#define PredicateLockHashCodeFromTargetHashCode(predicatelocktag, targethash) \
316 ((targethash) ^ ((uint32) PointerGetDatum((predicatelocktag)->myXact)) \
317 << LOG2_NUM_PREDICATELOCK_PARTITIONS)
318
319
320/*
321 * The SLRU buffer area through which we access the old xids.
322 */
324static int serial_errdetail_for_io_error(const void *opaque_data);
325
327
328#define SerialSlruCtl (&SerialSlruDesc)
329
330#define SERIAL_PAGESIZE BLCKSZ
331#define SERIAL_ENTRYSIZE sizeof(SerCommitSeqNo)
332#define SERIAL_ENTRIESPERPAGE (SERIAL_PAGESIZE / SERIAL_ENTRYSIZE)
333
334/*
335 * Set maximum pages based on the number needed to track all transactions.
336 */
337#define SERIAL_MAX_PAGE (MaxTransactionId / SERIAL_ENTRIESPERPAGE)
338
339#define SerialNextPage(page) (((page) >= SERIAL_MAX_PAGE) ? 0 : (page) + 1)
340
341#define SerialValue(slotno, xid) (*((SerCommitSeqNo *) \
342 (SerialSlruCtl->shared->page_buffer[slotno] + \
343 ((((uint32) (xid)) % SERIAL_ENTRIESPERPAGE) * SERIAL_ENTRYSIZE))))
344
345#define SerialPage(xid) (((uint32) (xid)) / SERIAL_ENTRIESPERPAGE)
346
347typedef struct SerialControlData
348{
349 int64 headPage; /* newest initialized page */
350 TransactionId headXid; /* newest valid Xid in the SLRU */
351 TransactionId tailXid; /* oldest xmin we might be interested in */
353
355
357
358/*
359 * When the oldest committed transaction on the "finished" list is moved to
360 * SLRU, its predicate locks will be moved to this "dummy" transaction,
361 * collapsing duplicate targets. When a duplicate is found, the later
362 * commitSeqNo is used.
363 */
365
366
367/*
368 * These configuration variables are used to set the predicate lock table size
369 * and to control promotion of predicate locks to coarser granularity in an
370 * attempt to degrade performance (mostly as false positive serialization
371 * failure) gracefully in the face of memory pressure.
372 */
373int max_predicate_locks_per_xact; /* in guc_tables.c */
374int max_predicate_locks_per_relation; /* in guc_tables.c */
375int max_predicate_locks_per_page; /* in guc_tables.c */
376
377/*
378 * This provides a list of objects in order to track transactions
379 * participating in predicate locking. Entries in the list are fixed size,
380 * and reside in shared memory. The memory address of an entry must remain
381 * fixed during its lifetime. The list will be protected from concurrent
382 * update externally; no provision is made in this code to manage that. The
383 * number of entries in the list, and the size allowed for each entry is
384 * fixed upon creation.
385 */
387
388static void PredicateLockShmemRequest(void *arg);
389static void PredicateLockShmemInit(void *arg);
390static void PredicateLockShmemAttach(void *arg);
391
397
398
399/*
400 * This provides a pool of RWConflict data elements to use in conflict lists
401 * between transactions.
402 */
404
405/*
406 * The predicate locking hash tables are in shared memory.
407 * Each backend keeps pointers to them.
408 */
413
414/*
415 * Tag for a dummy entry in PredicateLockTargetHash. By temporarily removing
416 * this entry, you can ensure that there's enough scratch space available for
417 * inserting one entry in the hash table. This is an otherwise-invalid tag.
418 */
419static const PREDICATELOCKTARGETTAG ScratchTargetTag = {0, 0, 0, 0};
422
423/*
424 * The local hash table used to determine when to combine multiple fine-
425 * grained locks into a single courser-grained lock.
426 */
428
429/*
430 * Keep a pointer to the currently-running serializable transaction (if any)
431 * for quick reference. Also, remember if we have written anything that could
432 * cause a rw-conflict.
433 */
435static bool MyXactDidWrite = false;
436
437/*
438 * The SXACT_FLAG_RO_UNSAFE optimization might lead us to release
439 * MySerializableXact early. If that happens in a parallel query, the leader
440 * needs to defer the destruction of the SERIALIZABLEXACT until end of
441 * transaction, because the workers still have a reference to it. In that
442 * case, the leader stores it here.
443 */
445
447
448/* local functions */
449
450static SERIALIZABLEXACT *CreatePredXact(void);
452
453static bool RWConflictExists(const SERIALIZABLEXACT *reader, const SERIALIZABLEXACT *writer);
458
462
463static uint32 predicatelock_hash(const void *key, Size keysize);
464
465static void SummarizeOldestCommittedSxact(void);
469 int sourcepid);
472 PREDICATELOCKTARGETTAG *parent);
474static void RemoveScratchTarget(bool lockheld);
475static void RestoreScratchTarget(bool lockheld);
488 bool removeOld);
490static void DropAllPredicateLocksFromTable(Relation relation,
491 bool transfer);
492static void SetNewSxactGlobalXmin(void);
493static void ClearOldPredicateLocks(void);
494static void ReleaseOneSerializableXact(SERIALIZABLEXACT *sxact, bool partial,
495 bool summarize);
496static bool XidIsConcurrent(TransactionId xid);
501static void CreateLocalPredicateLockHash(void);
502static void ReleasePredicateLocksLocal(void);
503
504
505/*------------------------------------------------------------------------*/
506
507/*
508 * Does this relation participate in predicate locking? Temporary and system
509 * relations are exempt.
510 */
511static inline bool
513{
514 return !(relation->rd_id < FirstUnpinnedObjectId ||
515 RelationUsesLocalBuffers(relation));
516}
517
518/*
519 * When a public interface method is called for a read, this is the test to
520 * see if we should do a quick return.
521 *
522 * Note: this function has side-effects! If this transaction has been flagged
523 * as RO-safe since the last call, we release all predicate locks and reset
524 * MySerializableXact. That makes subsequent calls to return quickly.
525 *
526 * This is marked as 'inline' to eliminate the function call overhead in the
527 * common case that serialization is not needed.
528 */
529static inline bool
531{
532 /* Nothing to do if this is not a serializable transaction */
534 return false;
535
536 /*
537 * Don't acquire locks or conflict when scanning with a special snapshot.
538 * This excludes things like CLUSTER and REINDEX. They use the wholesale
539 * functions TransferPredicateLocksToHeapRelation() and
540 * CheckTableForSerializableConflictIn() to participate in serialization,
541 * but the scans involved don't need serialization.
542 */
543 if (!IsMVCCSnapshot(snapshot))
544 return false;
545
546 /*
547 * Check if we have just become "RO-safe". If we have, immediately release
548 * all locks as they're not needed anymore. This also resets
549 * MySerializableXact, so that subsequent calls to this function can exit
550 * quickly.
551 *
552 * A transaction is flagged as RO_SAFE if all concurrent R/W transactions
553 * commit without having conflicts out to an earlier snapshot, thus
554 * ensuring that no conflicts are possible for this transaction.
555 */
557 {
558 ReleasePredicateLocks(false, true);
559 return false;
560 }
561
562 /* Check if the relation doesn't participate in predicate locking */
564 return false;
565
566 return true; /* no excuse to skip predicate locking */
567}
568
569/*
570 * Like SerializationNeededForRead(), but called on writes.
571 * The logic is the same, but there is no snapshot and we can't be RO-safe.
572 */
573static inline bool
575{
576 /* Nothing to do if this is not a serializable transaction */
578 return false;
579
580 /* Check if the relation doesn't participate in predicate locking */
582 return false;
583
584 return true; /* no excuse to skip predicate locking */
585}
586
587
588/*------------------------------------------------------------------------*/
589
590/*
591 * These functions are a simple implementation of a list for this specific
592 * type of struct. If there is ever a generalized shared memory list, we
593 * should probably switch to that.
594 */
595static SERIALIZABLEXACT *
608
609static void
617
618/*------------------------------------------------------------------------*/
619
620/*
621 * These functions manage primitive access to the RWConflict pool and lists.
622 */
623static bool
625{
626 dlist_iter iter;
627
628 Assert(reader != writer);
629
630 /* Check the ends of the purported conflict first. */
631 if (SxactIsDoomed(reader)
633 || dlist_is_empty(&reader->outConflicts)
634 || dlist_is_empty(&writer->inConflicts))
635 return false;
636
637 /*
638 * A conflict is possible; walk the list to find out.
639 *
640 * The unconstify is needed as we have no const version of
641 * dlist_foreach().
642 */
643 dlist_foreach(iter, &unconstify(SERIALIZABLEXACT *, reader)->outConflicts)
644 {
646 dlist_container(RWConflictData, outLink, iter.cur);
647
648 if (conflict->sxactIn == writer)
649 return true;
650 }
651
652 /* No conflict found. */
653 return false;
654}
655
656static void
658{
660
661 Assert(reader != writer);
662 Assert(!RWConflictExists(reader, writer));
663
667 errmsg("not enough elements in RWConflictPool to record a read/write conflict"),
668 errhint("You might need to run fewer transactions at a time or increase \"max_connections\".")));
669
671 dlist_delete(&conflict->outLink);
672
673 conflict->sxactOut = reader;
674 conflict->sxactIn = writer;
675 dlist_push_tail(&reader->outConflicts, &conflict->outLink);
676 dlist_push_tail(&writer->inConflicts, &conflict->inLink);
677}
678
679static void
682{
684
688
692 errmsg("not enough elements in RWConflictPool to record a potential read/write conflict"),
693 errhint("You might need to run fewer transactions at a time or increase \"max_connections\".")));
694
696 dlist_delete(&conflict->outLink);
697
698 conflict->sxactOut = activeXact;
699 conflict->sxactIn = roXact;
700 dlist_push_tail(&activeXact->possibleUnsafeConflicts, &conflict->outLink);
701 dlist_push_tail(&roXact->possibleUnsafeConflicts, &conflict->inLink);
702}
703
704static void
711
712static void
714{
716
719
720 sxact->flags |= SXACT_FLAG_RO_UNSAFE;
721
722 /*
723 * We know this isn't a safe snapshot, so we can stop looking for other
724 * potential conflicts.
725 */
726 dlist_foreach_modify(iter, &sxact->possibleUnsafeConflicts)
727 {
729 dlist_container(RWConflictData, inLink, iter.cur);
730
731 Assert(!SxactIsReadOnly(conflict->sxactOut));
732 Assert(sxact == conflict->sxactIn);
733
735 }
736}
737
738/*------------------------------------------------------------------------*/
739
740/*
741 * Decide whether a Serial page number is "older" for truncation purposes.
742 * Analogous to CLOGPagePrecedes().
743 */
744static bool
758
759static int
761{
762 TransactionId xid = *(const TransactionId *) opaque_data;
763
764 return errdetail("Could not access serializable CSN of transaction %u.", xid);
765}
766
767#ifdef USE_ASSERT_CHECKING
768static void
770{
772 offset = per_page / 2;
775 headPage,
778 oldestXact;
779
780 /* GetNewTransactionId() has assigned the last XID it can safely use. */
781 newestPage = 2 * SLRU_PAGES_PER_SEGMENT - 1; /* nothing special */
782 newestXact = newestPage * per_page + offset;
784 oldestXact = newestXact + 1;
785 oldestXact -= 1U << 31;
786 oldestPage = oldestXact / per_page;
787
788 /*
789 * In this scenario, the SLRU headPage pertains to the last ~1000 XIDs
790 * assigned. oldestXact finishes, ~2B XIDs having elapsed since it
791 * started. Further transactions cause us to summarize oldestXact to
792 * tailPage. Function must return false so SerialAdd() doesn't zero
793 * tailPage (which may contain entries for other old, recently-finished
794 * XIDs) and half the SLRU. Reaching this requires burning ~2B XIDs in
795 * single-user mode, a negligible possibility.
796 */
800
801 /*
802 * In this scenario, the SLRU headPage pertains to oldestXact. We're
803 * summarizing an XID near newestXact. (Assume few other XIDs used
804 * SERIALIZABLE, hence the minimal headPage advancement. Assume
805 * oldestXact was long-running and only recently reached the SLRU.)
806 * Function must return true to make SerialAdd() create targetPage.
807 *
808 * Today's implementation mishandles this case, but it doesn't matter
809 * enough to fix. Verify that the defect affects just one page by
810 * asserting correct treatment of its prior page. Reaching this case
811 * requires burning ~2B XIDs in single-user mode, a negligible
812 * possibility. Moreover, if it does happen, the consequence would be
813 * mild, namely a new transaction failing in SimpleLruReadPage().
814 */
818#if 0
820#endif
821}
822#endif
823
824/*
825 * GUC check_hook for serializable_buffers
826 */
827bool
829{
830 return check_slru_buffers("serializable_buffers", newval);
831}
832
833/*
834 * Record a committed read write serializable xid and the minimum
835 * commitSeqNo of any transactions to which this xid had a rw-conflict out.
836 * An invalid commitSeqNo means that there were no conflicts out from xid.
837 */
838static void
840{
843 int slotno;
845 bool isNewPage;
846 LWLock *lock;
847
849
850 targetPage = SerialPage(xid);
852
853 /*
854 * In this routine, we must hold both SerialControlLock and the SLRU bank
855 * lock simultaneously while making the SLRU data catch up with the new
856 * state that we determine.
857 */
859
860 /*
861 * If 'xid' is older than the global xmin (== tailXid), there's no need to
862 * store it, after all. This can happen if the oldest transaction holding
863 * back the global xmin just finished, making 'xid' uninteresting, but
864 * ClearOldPredicateLocks() has not yet run.
865 */
868 {
870 return;
871 }
872
873 /*
874 * If the SLRU is currently unused, zero out the whole active region from
875 * tailXid to headXid before taking it into use. Otherwise zero out only
876 * any new pages that enter the tailXid-headXid range as we advance
877 * headXid.
878 */
879 if (serialControl->headPage < 0)
880 {
882 isNewPage = true;
883 }
884 else
885 {
888 targetPage);
889 }
890
893 serialControl->headXid = xid;
894 if (isNewPage)
896
897 if (isNewPage)
898 {
899 /* Initialize intervening pages; might involve trading locks */
900 for (;;)
901 {
906 break;
908 LWLockRelease(lock);
909 }
910 }
911 else
912 {
915 }
916
918 SerialSlruCtl->shared->page_dirty[slotno] = true;
919
920 LWLockRelease(lock);
922}
923
924/*
925 * Get the minimum commitSeqNo for any conflict out for the given xid. For
926 * a transaction which exists but has no conflict out, InvalidSerCommitSeqNo
927 * will be returned.
928 */
929static SerCommitSeqNo
931{
935 int slotno;
936
938
943
945 return 0;
946
948
951 return 0;
952
953 /*
954 * The following function must be called without holding SLRU bank lock,
955 * but will return with that lock held, which must then be released.
956 */
958 SerialPage(xid), &xid);
959 val = SerialValue(slotno, xid);
961 return val;
962}
963
964/*
965 * Call this whenever there is a new xmin for active serializable
966 * transactions. We don't need to keep information on transactions which
967 * precede that. InvalidTransactionId means none active, so everything in
968 * the SLRU can be discarded.
969 */
970static void
972{
974
975 /*
976 * When no sxacts are active, nothing overlaps, set the xid values to
977 * invalid to show that there are no valid entries. Don't clear headPage,
978 * though. A new xmin might still land on that page, and we don't want to
979 * repeatedly zero out the same page.
980 */
981 if (!TransactionIdIsValid(xid))
982 {
986 return;
987 }
988
989 /*
990 * When we're recovering prepared transactions, the global xmin might move
991 * backwards depending on the order they're recovered. Normally that's not
992 * OK, but during recovery no serializable transactions will commit, so
993 * the SLRU is empty and we can get away with it.
994 */
995 if (RecoveryInProgress())
996 {
1000 {
1001 serialControl->tailXid = xid;
1002 }
1004 return;
1005 }
1006
1009
1010 serialControl->tailXid = xid;
1011
1013}
1014
1015/*
1016 * Perform a checkpoint --- either during shutdown, or on-the-fly
1017 *
1018 * We don't have any data that needs to survive a restart, but this is a
1019 * convenient place to truncate the SLRU.
1020 */
1021void
1023{
1025
1027
1028 /* Exit quickly if the SLRU is currently not in use. */
1029 if (serialControl->headPage < 0)
1030 {
1032 return;
1033 }
1034
1036 {
1038
1040
1041 /*
1042 * It is possible for the tailXid to be ahead of the headXid. This
1043 * occurs if we checkpoint while there are in-progress serializable
1044 * transaction(s) advancing the tail but we are yet to summarize the
1045 * transactions. In this case, we cutoff up to the headPage and the
1046 * next summary will advance the headXid.
1047 */
1049 {
1050 /* We can truncate the SLRU up to the page containing tailXid */
1052 }
1053 else
1055 }
1056 else
1057 {
1058 /*----------
1059 * The SLRU is no longer needed. Truncate to head before we set head
1060 * invalid.
1061 *
1062 * XXX: It's possible that the SLRU is not needed again until XID
1063 * wrap-around has happened, so that the segment containing headPage
1064 * that we leave behind will appear to be new again. In that case it
1065 * won't be removed until XID horizon advances enough to make it
1066 * current again.
1067 *
1068 * XXX: This should happen in vac_truncate_clog(), not in checkpoints.
1069 * Consider this scenario, starting from a system with no in-progress
1070 * transactions and VACUUM FREEZE having maximized oldestXact:
1071 * - Start a SERIALIZABLE transaction.
1072 * - Start, finish, and summarize a SERIALIZABLE transaction, creating
1073 * one SLRU page.
1074 * - Consume XIDs to reach xidStopLimit.
1075 * - Finish all transactions. Due to the long-running SERIALIZABLE
1076 * transaction, earlier checkpoints did not touch headPage. The
1077 * next checkpoint will change it, but that checkpoint happens after
1078 * the end of the scenario.
1079 * - VACUUM to advance XID limits.
1080 * - Consume ~2M XIDs, crossing the former xidWrapLimit.
1081 * - Start, finish, and summarize a SERIALIZABLE transaction.
1082 * SerialAdd() declines to create the targetPage, because headPage
1083 * is not regarded as in the past relative to that targetPage. The
1084 * transaction instigating the summarize fails in
1085 * SimpleLruReadPage().
1086 */
1088 serialControl->headPage = -1;
1089 }
1090
1092
1093 /*
1094 * Truncate away pages that are no longer required. Note that no
1095 * additional locking is required, because this is only called as part of
1096 * a checkpoint, and the validity limits have already been determined.
1097 */
1099
1100 /*
1101 * Write dirty SLRU pages to disk
1102 *
1103 * This is not actually necessary from a correctness point of view. We do
1104 * it merely as a debugging aid.
1105 *
1106 * We're doing this after the truncation to avoid writing pages right
1107 * before deleting the file in which they sit, which would be completely
1108 * pointless.
1109 */
1111}
1112
1113/*------------------------------------------------------------------------*/
1114
1115/*
1116 * PredicateLockShmemRequest -- Register the predicate locking data structures.
1117 */
1118static void
1120{
1124
1125 /*
1126 * Register hash table for PREDICATELOCKTARGET structs. This stores
1127 * per-predicate-lock-target information.
1128 */
1130
1131 ShmemRequestHash(.name = "PREDICATELOCKTARGET hash",
1134 .hash_info.keysize = sizeof(PREDICATELOCKTARGETTAG),
1135 .hash_info.entrysize = sizeof(PREDICATELOCKTARGET),
1136 .hash_info.num_partitions = NUM_PREDICATELOCK_PARTITIONS,
1138 );
1139
1140 /*
1141 * Allocate hash table for PREDICATELOCK structs. This stores per
1142 * xact-lock-of-a-target information.
1143 *
1144 * Assume an average of 2 xacts per target.
1145 */
1147
1148 ShmemRequestHash(.name = "PREDICATELOCK hash",
1149 .nelems = max_predicate_locks,
1150 .ptr = &PredicateLockHash,
1151 .hash_info.keysize = sizeof(PREDICATELOCKTAG),
1152 .hash_info.entrysize = sizeof(PREDICATELOCK),
1153 .hash_info.hash = predicatelock_hash,
1154 .hash_info.num_partitions = NUM_PREDICATELOCK_PARTITIONS,
1156 );
1157
1158 /*
1159 * Compute size for serializable transaction hashtable.
1160 *
1161 * Assume an average of 10 predicate locking transactions per backend.
1162 * This allows aggressive cleanup while detail is present before data must
1163 * be summarized for storage in SLRU and the "dummy" transaction.
1164 */
1166
1167 /*
1168 * Register a list to hold information on transactions participating in
1169 * predicate locking.
1170 */
1171 ShmemRequestStruct(.name = "PredXactList",
1174 sizeof(SERIALIZABLEXACT)))),
1175 .ptr = (void **) &PredXact,
1176 );
1177
1178 /*
1179 * Register hash table for SERIALIZABLEXID structs. This stores per-xid
1180 * information for serializable transactions which have accessed data.
1181 */
1182 ShmemRequestHash(.name = "SERIALIZABLEXID hash",
1183 .nelems = max_serializable_xacts,
1184 .ptr = &SerializableXidHash,
1185 .hash_info.keysize = sizeof(SERIALIZABLEXIDTAG),
1186 .hash_info.entrysize = sizeof(SERIALIZABLEXID),
1187 .hash_flags = HASH_ELEM | HASH_BLOBS | HASH_FIXED_SIZE,
1188 );
1189
1190 /*
1191 * Allocate space for tracking rw-conflicts in lists attached to the
1192 * transactions.
1193 *
1194 * Assume an average of 5 conflicts per transaction. Calculations suggest
1195 * that this will prevent resource exhaustion in even the most pessimal
1196 * loads up to max_connections = 200 with all 200 connections pounding the
1197 * database with serializable transactions. Beyond that, there may be
1198 * occasional transactions canceled when trying to flag conflicts. That's
1199 * probably OK.
1200 */
1202
1203 ShmemRequestStruct(.name = "RWConflictPool",
1206 .ptr = (void **) &RWConflictPool,
1207 );
1208
1209 ShmemRequestStruct(.name = "FinishedSerializableTransactions",
1210 .size = sizeof(dlist_head),
1211 .ptr = (void **) &FinishedSerializableTransactions,
1212 );
1213
1214 /*
1215 * Initialize the SLRU storage for old committed serializable
1216 * transactions.
1217 */
1219 .name = "serializable",
1220 .Dir = "pg_serial",
1221 .long_segment_names = false,
1222
1223 .nslots = serializable_buffers,
1224
1225 .sync_handler = SYNC_HANDLER_NONE,
1226 .PagePrecedes = SerialPagePrecedesLogically,
1227 .errdetail_for_io_error = serial_errdetail_for_io_error,
1228
1229 .buffer_tranche_id = LWTRANCHE_SERIAL_BUFFER,
1230 .bank_tranche_id = LWTRANCHE_SERIAL_SLRU,
1231 );
1232#ifdef USE_ASSERT_CHECKING
1234#endif
1235
1236 ShmemRequestStruct(.name = "SerialControlData",
1237 .size = sizeof(SerialControlData),
1238 .ptr = (void **) &serialControl,
1239 );
1240}
1241
1242static void
1244{
1245 int max_rw_conflicts;
1246 bool found;
1247
1248 /*
1249 * Reserve a dummy entry in the hash table; we use it to make sure there's
1250 * always one entry available when we need to split or combine a page,
1251 * because running out of space there could mean aborting a
1252 * non-serializable transaction.
1253 */
1255 HASH_ENTER, &found);
1256 Assert(!found);
1257
1268 /* Add all elements to available list, clean. */
1269 for (int i = 0; i < max_serializable_xacts; i++)
1270 {
1274 }
1291
1292 /* Initialize the rw-conflict pool */
1296
1298
1299 /* Add all elements to available list, clean. */
1300 for (int i = 0; i < max_rw_conflicts; i++)
1301 {
1304 }
1305
1306 /* Initialize the list of finished serializable transactions */
1308
1309 /* Initialize SerialControl to reflect empty SLRU. */
1311 serialControl->headPage = -1;
1315
1317
1318 /* This never changes, so let's keep a local copy. */
1320
1321 /* Pre-calculate the hash and partition lock of the scratch entry */
1324}
1325
1326static void
1328{
1329 /* This never changes, so let's keep a local copy. */
1331
1332 /* Pre-calculate the hash and partition lock of the scratch entry */
1335}
1336
1337/*
1338 * Compute the hash code associated with a PREDICATELOCKTAG.
1339 *
1340 * Because we want to use just one set of partition locks for both the
1341 * PREDICATELOCKTARGET and PREDICATELOCK hash tables, we have to make sure
1342 * that PREDICATELOCKs fall into the same partition number as their
1343 * associated PREDICATELOCKTARGETs. dynahash.c expects the partition number
1344 * to be the low-order bits of the hash code, and therefore a
1345 * PREDICATELOCKTAG's hash code must have the same low-order bits as the
1346 * associated PREDICATELOCKTARGETTAG's hash code. We achieve this with this
1347 * specialized hash function.
1348 */
1349static uint32
1350predicatelock_hash(const void *key, Size keysize)
1351{
1352 const PREDICATELOCKTAG *predicatelocktag = (const PREDICATELOCKTAG *) key;
1354
1355 Assert(keysize == sizeof(PREDICATELOCKTAG));
1356
1357 /* Look into the associated target object, and compute its hash code */
1359
1361}
1362
1363
1364/*
1365 * GetPredicateLockStatusData
1366 * Return a table containing the internal state of the predicate
1367 * lock manager for use in pg_lock_status.
1368 *
1369 * Like GetLockStatusData, this function tries to hold the partition LWLocks
1370 * for as short a time as possible by returning two arrays that simply
1371 * contain the PREDICATELOCKTARGETTAG and SERIALIZABLEXACT for each lock
1372 * table entry. Multiple copies of the same PREDICATELOCKTARGETTAG and
1373 * SERIALIZABLEXACT will likely appear.
1374 */
1377{
1379 int i;
1380 int els,
1381 el;
1384
1386
1387 /*
1388 * To ensure consistency, take simultaneous locks on all partition locks
1389 * in ascending order, then SerializableXactHashLock.
1390 */
1391 for (i = 0; i < NUM_PREDICATELOCK_PARTITIONS; i++)
1394
1395 /* Get number of locks and allocate appropriately-sized arrays. */
1397 data->nelements = els;
1400
1401
1402 /* Scan through PredicateLockHash and copy contents */
1404
1405 el = 0;
1406
1408 {
1409 data->locktags[el] = predlock->tag.myTarget->tag;
1410 data->xacts[el] = *predlock->tag.myXact;
1411 el++;
1412 }
1413
1414 Assert(el == els);
1415
1416 /* Release locks in reverse order */
1418 for (i = NUM_PREDICATELOCK_PARTITIONS - 1; i >= 0; i--)
1420
1421 return data;
1422}
1423
1424/*
1425 * Free up shared memory structures by pushing the oldest sxact (the one at
1426 * the front of the SummarizeOldestCommittedSxact queue) into summary form.
1427 * Each call will free exactly one SERIALIZABLEXACT structure and may also
1428 * free one or more of these structures: SERIALIZABLEXID, PREDICATELOCK,
1429 * PREDICATELOCKTARGET, RWConflictData.
1430 */
1431static void
1433{
1435
1437
1438 /*
1439 * This function is only called if there are no sxact slots available.
1440 * Some of them must belong to old, already-finished transactions, so
1441 * there should be something in FinishedSerializableTransactions list that
1442 * we can summarize. However, there's a race condition: while we were not
1443 * holding any locks, a transaction might have ended and cleaned up all
1444 * the finished sxact entries already, freeing up their sxact slots. In
1445 * that case, we have nothing to do here. The caller will find one of the
1446 * slots released by the other backend when it retries.
1447 */
1449 {
1451 return;
1452 }
1453
1454 /*
1455 * Grab the first sxact off the finished list -- this will be the earliest
1456 * commit. Remove it from the list.
1457 */
1460 dlist_delete_thoroughly(&sxact->finishedLink);
1461
1462 /* Add to SLRU summary information. */
1465 ? sxact->SeqNo.earliestOutConflictCommit : InvalidSerCommitSeqNo);
1466
1467 /* Summarize and release the detail. */
1468 ReleaseOneSerializableXact(sxact, false, true);
1469
1471}
1472
1473/*
1474 * GetSafeSnapshot
1475 * Obtain and register a snapshot for a READ ONLY DEFERRABLE
1476 * transaction. Ensures that the snapshot is "safe", i.e. a
1477 * read-only transaction running on it can execute serializably
1478 * without further checks. This requires waiting for concurrent
1479 * transactions to complete, and retrying with a new snapshot if
1480 * one of them could possibly create a conflict.
1481 *
1482 * As with GetSerializableTransactionSnapshot (which this is a subroutine
1483 * for), the passed-in Snapshot pointer should reference a static data
1484 * area that can safely be passed to GetSnapshotData.
1485 */
1486static Snapshot
1488{
1489 Snapshot snapshot;
1490
1492
1493 while (true)
1494 {
1495 /*
1496 * GetSerializableTransactionSnapshotInt is going to call
1497 * GetSnapshotData, so we need to provide it the static snapshot area
1498 * our caller passed to us. The pointer returned is actually the same
1499 * one passed to it, but we avoid assuming that here.
1500 */
1502 NULL, InvalidPid);
1503
1505 return snapshot; /* no concurrent r/w xacts; it's safe */
1506
1508
1509 /*
1510 * Wait for concurrent transactions to finish. Stop early if one of
1511 * them marked us as conflicted.
1512 */
1516 {
1520 }
1522
1524 {
1526 break; /* success */
1527 }
1528
1530
1531 /* else, need to retry... */
1534 errmsg_internal("deferrable snapshot was unsafe; trying a new one")));
1535 ReleasePredicateLocks(false, false);
1536 }
1537
1538 /*
1539 * Now we have a safe snapshot, so we don't need to do any further checks.
1540 */
1542 ReleasePredicateLocks(false, true);
1543
1544 return snapshot;
1545}
1546
1547/*
1548 * GetSafeSnapshotBlockingPids
1549 * If the specified process is currently blocked in GetSafeSnapshot,
1550 * write the process IDs of all processes that it is blocked by
1551 * into the caller-supplied buffer output[]. The list is truncated at
1552 * output_size, and the number of PIDs written into the buffer is
1553 * returned. Returns zero if the given PID is not currently blocked
1554 * in GetSafeSnapshot.
1555 */
1556int
1558{
1559 int num_written = 0;
1560 dlist_iter iter;
1562
1564
1565 /* Find blocked_pid's SERIALIZABLEXACT by linear search. */
1567 {
1569 dlist_container(SERIALIZABLEXACT, xactLink, iter.cur);
1570
1571 if (sxact->pid == blocked_pid)
1572 {
1574 break;
1575 }
1576 }
1577
1578 /* Did we find it, and is it currently waiting in GetSafeSnapshot? */
1580 {
1581 /* Traverse the list of possible unsafe conflicts collecting PIDs. */
1582 dlist_foreach(iter, &blocking_sxact->possibleUnsafeConflicts)
1583 {
1585 dlist_container(RWConflictData, inLink, iter.cur);
1586
1587 output[num_written++] = possibleUnsafeConflict->sxactOut->pid;
1588
1589 if (num_written >= output_size)
1590 break;
1591 }
1592 }
1593
1595
1596 return num_written;
1597}
1598
1599/*
1600 * Acquire a snapshot that can be used for the current transaction.
1601 *
1602 * Make sure we have a SERIALIZABLEXACT reference in MySerializableXact.
1603 * It should be current for this process and be contained in PredXact.
1604 *
1605 * The passed-in Snapshot pointer should reference a static data area that
1606 * can safely be passed to GetSnapshotData. The return value is actually
1607 * always this same pointer; no new snapshot data structure is allocated
1608 * within this function.
1609 */
1612{
1614
1615 /*
1616 * Can't use serializable mode while recovery is still active, as it is,
1617 * for example, on a hot standby. We could get here despite the check in
1618 * check_transaction_isolation() if default_transaction_isolation is set
1619 * to serializable, so phrase the hint accordingly.
1620 */
1621 if (RecoveryInProgress())
1622 ereport(ERROR,
1624 errmsg("cannot use serializable mode in a hot standby"),
1625 errdetail("\"default_transaction_isolation\" is set to \"serializable\"."),
1626 errhint("You can use \"SET default_transaction_isolation = 'repeatable read'\" to change the default.")));
1627
1628 /*
1629 * A special optimization is available for SERIALIZABLE READ ONLY
1630 * DEFERRABLE transactions -- we can wait for a suitable snapshot and
1631 * thereby avoid all SSI overhead once it's running.
1632 */
1634 return GetSafeSnapshot(snapshot);
1635
1637 NULL, InvalidPid);
1638}
1639
1640/*
1641 * Import a snapshot to be used for the current transaction.
1642 *
1643 * This is nearly the same as GetSerializableTransactionSnapshot, except that
1644 * we don't take a new snapshot, but rather use the data we're handed.
1645 *
1646 * The caller must have verified that the snapshot came from a serializable
1647 * transaction; and if we're read-write, the source transaction must not be
1648 * read-only.
1649 */
1650void
1653 int sourcepid)
1654{
1656
1657 /*
1658 * If this is called by parallel.c in a parallel worker, we don't want to
1659 * create a SERIALIZABLEXACT just yet because the leader's
1660 * SERIALIZABLEXACT will be installed with AttachSerializableXact(). We
1661 * also don't want to reject SERIALIZABLE READ ONLY DEFERRABLE in this
1662 * case, because the leader has already determined that the snapshot it
1663 * has passed us is safe. So there is nothing for us to do.
1664 */
1665 if (IsParallelWorker())
1666 return;
1667
1668 /*
1669 * We do not allow SERIALIZABLE READ ONLY DEFERRABLE transactions to
1670 * import snapshots, since there's no way to wait for a safe snapshot when
1671 * we're using the snap we're told to. (XXX instead of throwing an error,
1672 * we could just ignore the XactDeferrable flag?)
1673 */
1675 ereport(ERROR,
1677 errmsg("a snapshot-importing transaction must not be READ ONLY DEFERRABLE")));
1678
1680 sourcepid);
1681}
1682
1683/*
1684 * Guts of GetSerializableTransactionSnapshot
1685 *
1686 * If sourcevxid is valid, this is actually an import operation and we should
1687 * skip calling GetSnapshotData, because the snapshot contents are already
1688 * loaded up. HOWEVER: to avoid race conditions, we must check that the
1689 * source xact is still running after we acquire SerializableXactHashLock.
1690 * We do that by calling ProcArrayInstallImportedXmin.
1691 */
1692static Snapshot
1695 int sourcepid)
1696{
1697 PGPROC *proc;
1700 *othersxact;
1701
1702 /* We only do this for serializable transactions. Once. */
1704
1706
1707 /*
1708 * Since all parts of a serializable transaction must use the same
1709 * snapshot, it is too late to establish one after a parallel operation
1710 * has begun.
1711 */
1712 if (IsInParallelMode())
1713 elog(ERROR, "cannot establish serializable snapshot during a parallel operation");
1714
1715 proc = MyProc;
1716 Assert(proc != NULL);
1717 GET_VXID_FROM_PGPROC(vxid, *proc);
1718
1719 /*
1720 * First we get the sxact structure, which may involve looping and access
1721 * to the "finished" list to free a structure for use.
1722 *
1723 * We must hold SerializableXactHashLock when taking/checking the snapshot
1724 * to avoid race conditions, for much the same reasons that
1725 * GetSnapshotData takes the ProcArrayLock. Since we might have to
1726 * release SerializableXactHashLock to call SummarizeOldestCommittedSxact,
1727 * this means we have to create the sxact first, which is a bit annoying
1728 * (in particular, an elog(ERROR) in procarray.c would cause us to leak
1729 * the sxact). Consider refactoring to avoid this.
1730 */
1731#ifdef TEST_SUMMARIZE_SERIAL
1733#endif
1735 do
1736 {
1738 /* If null, push out committed sxact to SLRU summary & retry. */
1739 if (!sxact)
1740 {
1744 }
1745 } while (!sxact);
1746
1747 /* Get the snapshot, or check that it's safe to use */
1748 if (!sourcevxid)
1749 snapshot = GetSnapshotData(snapshot);
1750 else if (!ProcArrayInstallImportedXmin(snapshot->xmin, sourcevxid))
1751 {
1754 ereport(ERROR,
1756 errmsg("could not import the requested snapshot"),
1757 errdetail("The source process with PID %d is not running anymore.",
1758 sourcepid)));
1759 }
1760
1761 /*
1762 * If there are no serializable transactions which are not read-only, we
1763 * can "opt out" of predicate locking and conflict checking for a
1764 * read-only transaction.
1765 *
1766 * The reason this is safe is that a read-only transaction can only become
1767 * part of a dangerous structure if it overlaps a writable transaction
1768 * which in turn overlaps a writable transaction which committed before
1769 * the read-only transaction started. A new writable transaction can
1770 * overlap this one, but it can't meet the other condition of overlapping
1771 * a transaction which committed before this one started.
1772 */
1774 {
1777 return snapshot;
1778 }
1779
1780 /* Initialize the structure. */
1781 sxact->vxid = vxid;
1782 sxact->SeqNo.lastCommitBeforeSnapshot = PredXact->LastSxactCommitSeqNo;
1783 sxact->prepareSeqNo = InvalidSerCommitSeqNo;
1784 sxact->commitSeqNo = InvalidSerCommitSeqNo;
1785 dlist_init(&(sxact->outConflicts));
1786 dlist_init(&(sxact->inConflicts));
1787 dlist_init(&(sxact->possibleUnsafeConflicts));
1788 sxact->topXid = GetTopTransactionIdIfAny();
1789 sxact->finishedBefore = InvalidTransactionId;
1790 sxact->xmin = snapshot->xmin;
1791 sxact->pid = MyProcPid;
1792 sxact->pgprocno = MyProcNumber;
1793 dlist_init(&sxact->predicateLocks);
1794 dlist_node_init(&sxact->finishedLink);
1795 sxact->flags = 0;
1796 if (XactReadOnly)
1797 {
1798 dlist_iter iter;
1799
1800 sxact->flags |= SXACT_FLAG_READ_ONLY;
1801
1802 /*
1803 * Register all concurrent r/w transactions as possible conflicts; if
1804 * all of them commit without any outgoing conflicts to earlier
1805 * transactions then this snapshot can be deemed safe (and we can run
1806 * without tracking predicate locks).
1807 */
1809 {
1811
1815 {
1817 }
1818 }
1819
1820 /*
1821 * If we didn't find any possibly unsafe conflicts because every
1822 * uncommitted writable transaction turned out to be doomed, then we
1823 * can "opt out" immediately. See comments above the earlier check
1824 * for PredXact->WritableSxactCount == 0.
1825 */
1826 if (dlist_is_empty(&sxact->possibleUnsafeConflicts))
1827 {
1830 return snapshot;
1831 }
1832 }
1833 else
1834 {
1838 }
1839
1840 /* Maintain serializable global xmin info. */
1842 {
1844 PredXact->SxactGlobalXmin = snapshot->xmin;
1846 SerialSetActiveSerXmin(snapshot->xmin);
1847 }
1848 else if (TransactionIdEquals(snapshot->xmin, PredXact->SxactGlobalXmin))
1849 {
1852 }
1853 else
1854 {
1856 }
1857
1859 MyXactDidWrite = false; /* haven't written anything yet */
1860
1862
1864
1865 return snapshot;
1866}
1867
1868static void
1870{
1872
1873 /* Initialize the backend-local hash table of parent locks */
1875 hash_ctl.keysize = sizeof(PREDICATELOCKTARGETTAG);
1876 hash_ctl.entrysize = sizeof(LOCALPREDICATELOCK);
1877 LocalPredicateLockHash = hash_create("Local predicate lock",
1879 &hash_ctl,
1881}
1882
1883/*
1884 * Register the top level XID in SerializableXidHash.
1885 * Also store it for easy reference in MySerializableXact.
1886 */
1887void
1889{
1892 bool found;
1893
1894 /*
1895 * If we're not tracking predicate lock data for this transaction, we
1896 * should ignore the request and return quickly.
1897 */
1899 return;
1900
1901 /* We should have a valid XID and be at the top level. */
1903
1905
1906 /* This should only be done once per transaction. */
1908
1910
1911 sxidtag.xid = xid;
1913 &sxidtag,
1914 HASH_ENTER, &found);
1915 Assert(!found);
1916
1917 /* Initialize the structure. */
1918 sxid->myXact = MySerializableXact;
1920}
1921
1922
1923/*
1924 * Check whether there are any predicate locks held by any transaction
1925 * for the page at the given block number.
1926 *
1927 * Note that the transaction may be completed but not yet subject to
1928 * cleanup due to overlapping serializable transactions. This must
1929 * return valid information regardless of transaction isolation level.
1930 *
1931 * Also note that this doesn't check for a conflicting relation lock,
1932 * just a lock specifically on the given page.
1933 *
1934 * One use is to support proper behavior during GiST index vacuum.
1935 */
1936bool
1960
1961
1962/*
1963 * Check whether a particular lock is held by this transaction.
1964 *
1965 * Important note: this function may return false even if the lock is
1966 * being held, because it uses the local lock table which is not
1967 * updated if another transaction modifies our lock list (e.g. to
1968 * split an index page). It can also return true when a coarser
1969 * granularity lock that covers this target is being held. Be careful
1970 * to only use this function in circumstances where such errors are
1971 * acceptable!
1972 */
1973static bool
1975{
1976 LOCALPREDICATELOCK *lock;
1977
1978 /* check local hash table */
1980 targettag,
1981 HASH_FIND, NULL);
1982
1983 if (!lock)
1984 return false;
1985
1986 /*
1987 * Found entry in the table, but still need to check whether it's actually
1988 * held -- it could just be a parent of some held lock.
1989 */
1990 return lock->held;
1991}
1992
1993/*
1994 * Return the parent lock tag in the lock hierarchy: the next coarser
1995 * lock that covers the provided tag.
1996 *
1997 * Returns true and sets *parent to the parent tag if one exists,
1998 * returns false if none exists.
1999 */
2000static bool
2002 PREDICATELOCKTARGETTAG *parent)
2003{
2004 switch (GET_PREDICATELOCKTARGETTAG_TYPE(*tag))
2005 {
2007 /* relation locks have no parent lock */
2008 return false;
2009
2010 case PREDLOCKTAG_PAGE:
2011 /* parent lock is relation lock */
2015
2016 return true;
2017
2018 case PREDLOCKTAG_TUPLE:
2019 /* parent lock is page lock */
2024 return true;
2025 }
2026
2027 /* not reachable */
2028 Assert(false);
2029 return false;
2030}
2031
2032/*
2033 * Check whether the lock we are considering is already covered by a
2034 * coarser lock for our transaction.
2035 *
2036 * Like PredicateLockExists, this function might return a false
2037 * negative, but it will never return a false positive.
2038 */
2039static bool
2041{
2043 parenttag;
2044
2046
2047 /* check parents iteratively until no more */
2049 {
2052 return true;
2053 }
2054
2055 /* no more parents to check; lock is not covered */
2056 return false;
2057}
2058
2059/*
2060 * Remove the dummy entry from the predicate lock target hash, to free up some
2061 * scratch space. The caller must be holding SerializablePredicateListLock,
2062 * and must restore the entry with RestoreScratchTarget() before releasing the
2063 * lock.
2064 *
2065 * If lockheld is true, the caller is already holding the partition lock
2066 * of the partition containing the scratch entry.
2067 */
2068static void
2085
2086/*
2087 * Re-insert the dummy entry in predicate lock target hash.
2088 */
2089static void
2106
2107/*
2108 * Check whether the list of related predicate locks is empty for a
2109 * predicate lock target, and remove the target if it is.
2110 */
2111static void
2113{
2115
2117
2118 /* Can't remove it until no locks at this target. */
2119 if (!dlist_is_empty(&target->predicateLocks))
2120 return;
2121
2122 /* Actually remove the target. */
2124 &target->tag,
2126 HASH_REMOVE, NULL);
2127 Assert(rmtarget == target);
2128}
2129
2130/*
2131 * Delete child target locks owned by this process.
2132 * This implementation is assuming that the usage of each target tag field
2133 * is uniform. No need to make this hard if we don't have to.
2134 *
2135 * We acquire an LWLock in the case of parallel mode, because worker
2136 * backends have access to the leader's SERIALIZABLEXACT. Otherwise,
2137 * we aren't acquiring LWLocks for the predicate lock or lock
2138 * target structures associated with this transaction unless we're going
2139 * to modify them, because no other process is permitted to modify our
2140 * locks.
2141 */
2142static void
2144{
2147 dlist_mutable_iter iter;
2148
2151 if (IsInParallelMode())
2152 LWLockAcquire(&sxact->perXactPredicateListLock, LW_EXCLUSIVE);
2153
2154 dlist_foreach_modify(iter, &sxact->predicateLocks)
2155 {
2159
2160 predlock = dlist_container(PREDICATELOCK, xactLink, iter.cur);
2161
2162 oldlocktag = predlock->tag;
2163 Assert(oldlocktag.myXact == sxact);
2164 oldtarget = oldlocktag.myTarget;
2165 oldtargettag = oldtarget->tag;
2166
2168 {
2172
2175
2177
2178 dlist_delete(&predlock->xactLink);
2179 dlist_delete(&predlock->targetLink);
2182 &oldlocktag,
2185 HASH_REMOVE, NULL);
2187
2189
2191
2193 }
2194 }
2195 if (IsInParallelMode())
2196 LWLockRelease(&sxact->perXactPredicateListLock);
2198}
2199
2200/*
2201 * Returns the promotion limit for a given predicate lock target. This is the
2202 * max number of descendant locks allowed before promoting to the specified
2203 * tag. Note that the limit includes non-direct descendants (e.g., both tuples
2204 * and pages for a relation lock).
2205 *
2206 * Currently the default limit is 2 for a page lock, and half of the value of
2207 * max_pred_locks_per_transaction - 1 for a relation lock, to match behavior
2208 * of earlier releases when upgrading.
2209 *
2210 * TODO SSI: We should probably add additional GUCs to allow a maximum ratio
2211 * of page and tuple locks based on the pages in a relation, and the maximum
2212 * ratio of tuple locks to tuples in a page. This would provide more
2213 * generally "balanced" allocation of locks to where they are most useful,
2214 * while still allowing the absolute numbers to prevent one relation from
2215 * tying up all predicate lock resources.
2216 */
2217static int
2219{
2220 switch (GET_PREDICATELOCKTARGETTAG_TYPE(*tag))
2221 {
2227
2228 case PREDLOCKTAG_PAGE:
2230
2231 case PREDLOCKTAG_TUPLE:
2232
2233 /*
2234 * not reachable: nothing is finer-granularity than a tuple, so we
2235 * should never try to promote to it.
2236 */
2237 Assert(false);
2238 return 0;
2239 }
2240
2241 /* not reachable */
2242 Assert(false);
2243 return 0;
2244}
2245
2246/*
2247 * For all ancestors of a newly-acquired predicate lock, increment
2248 * their child count in the parent hash table. If any of them have
2249 * more descendants than their promotion threshold, acquire the
2250 * coarsest such lock.
2251 *
2252 * Returns true if a parent lock was acquired and false otherwise.
2253 */
2254static bool
2256{
2258 nexttag,
2261 bool found,
2262 promote;
2263
2264 promote = false;
2265
2266 targettag = *reqtag;
2267
2268 /* check parents iteratively */
2270 {
2273 &targettag,
2274 HASH_ENTER,
2275 &found);
2276 if (!found)
2277 {
2278 parentlock->held = false;
2279 parentlock->childLocks = 1;
2280 }
2281 else
2282 parentlock->childLocks++;
2283
2284 if (parentlock->childLocks >
2286 {
2287 /*
2288 * We should promote to this parent lock. Continue to check its
2289 * ancestors, however, both to get their child counts right and to
2290 * check whether we should just go ahead and promote to one of
2291 * them.
2292 */
2294 promote = true;
2295 }
2296 }
2297
2298 if (promote)
2299 {
2300 /* acquire coarsest ancestor eligible for promotion */
2302 return true;
2303 }
2304 else
2305 return false;
2306}
2307
2308/*
2309 * When releasing a lock, decrement the child count on all ancestor
2310 * locks.
2311 *
2312 * This is called only when releasing a lock via
2313 * DeleteChildTargetLocks (i.e. when a lock becomes redundant because
2314 * we've acquired its parent, possibly due to promotion) or when a new
2315 * MVCC write lock makes the predicate lock unnecessary. There's no
2316 * point in calling it when locks are released at transaction end, as
2317 * this information is no longer needed.
2318 */
2319static void
2321{
2323 nexttag;
2324
2326
2328 {
2332
2338 HASH_FIND, NULL);
2339
2340 /*
2341 * There's a small chance the parent lock doesn't exist in the lock
2342 * table. This can happen if we prematurely removed it because an
2343 * index split caused the child refcount to be off.
2344 */
2345 if (parentlock == NULL)
2346 continue;
2347
2348 parentlock->childLocks--;
2349
2350 /*
2351 * Under similar circumstances the parent lock's refcount might be
2352 * zero. This only happens if we're holding that lock (otherwise we
2353 * would have removed the entry).
2354 */
2355 if (parentlock->childLocks < 0)
2356 {
2357 Assert(parentlock->held);
2358 parentlock->childLocks = 0;
2359 }
2360
2361 if ((parentlock->childLocks == 0) && (!parentlock->held))
2362 {
2366 HASH_REMOVE, NULL);
2368 }
2369 }
2370}
2371
2372/*
2373 * Indicate that a predicate lock on the given target is held by the
2374 * specified transaction. Has no effect if the lock is already held.
2375 *
2376 * This updates the lock table and the sxact's lock list, and creates
2377 * the lock target if necessary, but does *not* do anything related to
2378 * granularity promotion or the local lock table. See
2379 * PredicateLockAcquire for that.
2380 */
2381static void
2385{
2386 PREDICATELOCKTARGET *target;
2387 PREDICATELOCKTAG locktag;
2388 PREDICATELOCK *lock;
2390 bool found;
2391
2393
2395 if (IsInParallelMode())
2396 LWLockAcquire(&sxact->perXactPredicateListLock, LW_EXCLUSIVE);
2398
2399 /* Make sure that the target is represented. */
2400 target = (PREDICATELOCKTARGET *)
2403 HASH_ENTER_NULL, &found);
2404 if (!target)
2405 ereport(ERROR,
2407 errmsg("out of shared memory"),
2408 errhint("You might need to increase \"%s\".", "max_pred_locks_per_transaction")));
2409 if (!found)
2410 dlist_init(&target->predicateLocks);
2411
2412 /* We've got the sxact and target, make sure they're joined. */
2413 locktag.myTarget = target;
2414 locktag.myXact = sxact;
2415 lock = (PREDICATELOCK *)
2418 HASH_ENTER_NULL, &found);
2419 if (!lock)
2420 ereport(ERROR,
2422 errmsg("out of shared memory"),
2423 errhint("You might need to increase \"%s\".", "max_pred_locks_per_transaction")));
2424
2425 if (!found)
2426 {
2427 dlist_push_tail(&target->predicateLocks, &lock->targetLink);
2428 dlist_push_tail(&sxact->predicateLocks, &lock->xactLink);
2430 }
2431
2433 if (IsInParallelMode())
2434 LWLockRelease(&sxact->perXactPredicateListLock);
2436}
2437
2438/*
2439 * Acquire a predicate lock on the specified target for the current
2440 * connection if not already held. This updates the local lock table
2441 * and uses it to implement granularity promotion. It will consolidate
2442 * multiple locks into a coarser lock if warranted, and will release
2443 * any finer-grained locks covered by the new one.
2444 */
2445static void
2447{
2449 bool found;
2451
2452 /* Do we have the lock already, or a covering lock? */
2454 return;
2455
2457 return;
2458
2459 /* the same hash and LW lock apply to the lock target and the local lock. */
2461
2462 /* Acquire lock in local table */
2466 HASH_ENTER, &found);
2467 locallock->held = true;
2468 if (!found)
2469 locallock->childLocks = 0;
2470
2471 /* Actually create the lock */
2473
2474 /*
2475 * Lock has been acquired. Check whether it should be promoted to a
2476 * coarser granularity, or whether there are finer-granularity locks to
2477 * clean up.
2478 */
2480 {
2481 /*
2482 * Lock request was promoted to a coarser-granularity lock, and that
2483 * lock was acquired. It will delete this lock and any of its
2484 * children, so we're done.
2485 */
2486 }
2487 else
2488 {
2489 /* Clean up any finer-granularity locks */
2492 }
2493}
2494
2495
2496/*
2497 * PredicateLockRelation
2498 *
2499 * Gets a predicate lock at the relation level.
2500 * Skip if not in full serializable transaction isolation level.
2501 * Skip if this is a temporary table.
2502 * Clear any finer-grained predicate locks this session has on the relation.
2503 */
2504void
2506{
2508
2509 if (!SerializationNeededForRead(relation, snapshot))
2510 return;
2511
2513 relation->rd_locator.dbOid,
2514 relation->rd_id);
2516}
2517
2518/*
2519 * PredicateLockPage
2520 *
2521 * Gets a predicate lock at the page level.
2522 * Skip if not in full serializable transaction isolation level.
2523 * Skip if this is a temporary table.
2524 * Skip if a coarser predicate lock already covers this page.
2525 * Clear any finer-grained predicate locks this session has on the relation.
2526 */
2527void
2529{
2531
2532 if (!SerializationNeededForRead(relation, snapshot))
2533 return;
2534
2536 relation->rd_locator.dbOid,
2537 relation->rd_id,
2538 blkno);
2540}
2541
2542/*
2543 * PredicateLockTID
2544 *
2545 * Gets a predicate lock at the tuple level.
2546 * Skip if not in full serializable transaction isolation level.
2547 * Skip if this is a temporary table.
2548 */
2549void
2550PredicateLockTID(Relation relation, const ItemPointerData *tid, Snapshot snapshot,
2552{
2554
2555 if (!SerializationNeededForRead(relation, snapshot))
2556 return;
2557
2558 /*
2559 * Return if this xact wrote it.
2560 */
2561 if (relation->rd_index == NULL)
2562 {
2563 /* If we wrote it; we already have a write lock. */
2565 return;
2566 }
2567
2568 /*
2569 * Do quick-but-not-definitive test for a relation lock first. This will
2570 * never cause a return when the relation is *not* locked, but will
2571 * occasionally let the check continue when there really *is* a relation
2572 * level lock.
2573 */
2575 relation->rd_locator.dbOid,
2576 relation->rd_id);
2577 if (PredicateLockExists(&tag))
2578 return;
2579
2581 relation->rd_locator.dbOid,
2582 relation->rd_id,
2586}
2587
2588
2589/*
2590 * DeleteLockTarget
2591 *
2592 * Remove a predicate lock target along with any locks held for it.
2593 *
2594 * Caller must hold SerializablePredicateListLock and the
2595 * appropriate hash partition lock for the target.
2596 */
2597static void
2599{
2600 dlist_mutable_iter iter;
2601
2603 LW_EXCLUSIVE));
2605
2607
2608 dlist_foreach_modify(iter, &target->predicateLocks)
2609 {
2611 dlist_container(PREDICATELOCK, targetLink, iter.cur);
2612 bool found;
2613
2614 dlist_delete(&(predlock->xactLink));
2615 dlist_delete(&(predlock->targetLink));
2616
2619 &predlock->tag,
2622 HASH_REMOVE, &found);
2623 Assert(found);
2624 }
2626
2627 /* Remove the target itself, if possible. */
2629}
2630
2631
2632/*
2633 * TransferPredicateLocksToNewTarget
2634 *
2635 * Move or copy all the predicate locks for a lock target, for use by
2636 * index page splits/combines and other things that create or replace
2637 * lock targets. If 'removeOld' is true, the old locks and the target
2638 * will be removed.
2639 *
2640 * Returns true on success, or false if we ran out of shared memory to
2641 * allocate the new target or locks. Guaranteed to always succeed if
2642 * removeOld is set (by using the scratch entry in PredicateLockTargetHash
2643 * for scratch space).
2644 *
2645 * Warning: the "removeOld" option should be used only with care,
2646 * because this function does not (indeed, can not) update other
2647 * backends' LocalPredicateLockHash. If we are only adding new
2648 * entries, this is not a problem: the local lock table is used only
2649 * as a hint, so missing entries for locks that are held are
2650 * OK. Having entries for locks that are no longer held, as can happen
2651 * when using "removeOld", is not in general OK. We can only use it
2652 * safely when replacing a lock with a coarser-granularity lock that
2653 * covers it, or if we are absolutely certain that no one will need to
2654 * refer to that lock in the future.
2655 *
2656 * Caller must hold SerializablePredicateListLock exclusively.
2657 */
2658static bool
2661 bool removeOld)
2662{
2668 bool found;
2669 bool outOfShmem = false;
2670
2672 LW_EXCLUSIVE));
2673
2678
2679 if (removeOld)
2680 {
2681 /*
2682 * Remove the dummy entry to give us scratch space, so we know we'll
2683 * be able to create the new lock target.
2684 */
2685 RemoveScratchTarget(false);
2686 }
2687
2688 /*
2689 * We must get the partition locks in ascending sequence to avoid
2690 * deadlocks. If old and new partitions are the same, we must request the
2691 * lock only once.
2692 */
2694 {
2698 }
2700 {
2704 }
2705 else
2707
2708 /*
2709 * Look for the old target. If not found, that's OK; no predicate locks
2710 * are affected, so we can just clean up and return. If it does exist,
2711 * walk its list of predicate locks and move or copy them to the new
2712 * target.
2713 */
2715 &oldtargettag,
2717 HASH_FIND, NULL);
2718
2719 if (oldtarget)
2720 {
2723 dlist_mutable_iter iter;
2724
2726 &newtargettag,
2728 HASH_ENTER_NULL, &found);
2729
2730 if (!newtarget)
2731 {
2732 /* Failed to allocate due to insufficient shmem */
2733 outOfShmem = true;
2734 goto exit;
2735 }
2736
2737 /* If we created a new entry, initialize it */
2738 if (!found)
2739 dlist_init(&newtarget->predicateLocks);
2740
2741 newpredlocktag.myTarget = newtarget;
2742
2743 /*
2744 * Loop through all the locks on the old target, replacing them with
2745 * locks on the new target.
2746 */
2748
2749 dlist_foreach_modify(iter, &oldtarget->predicateLocks)
2750 {
2752 dlist_container(PREDICATELOCK, targetLink, iter.cur);
2755
2756 newpredlocktag.myXact = oldpredlock->tag.myXact;
2757
2758 if (removeOld)
2759 {
2760 dlist_delete(&(oldpredlock->xactLink));
2761 dlist_delete(&(oldpredlock->targetLink));
2762
2765 &oldpredlock->tag,
2768 HASH_REMOVE, &found);
2769 Assert(found);
2770 }
2771
2778 &found);
2779 if (!newpredlock)
2780 {
2781 /* Out of shared memory. Undo what we've done so far. */
2784 outOfShmem = true;
2785 goto exit;
2786 }
2787 if (!found)
2788 {
2789 dlist_push_tail(&(newtarget->predicateLocks),
2790 &(newpredlock->targetLink));
2791 dlist_push_tail(&(newpredlocktag.myXact->predicateLocks),
2792 &(newpredlock->xactLink));
2793 newpredlock->commitSeqNo = oldCommitSeqNo;
2794 }
2795 else
2796 {
2797 if (newpredlock->commitSeqNo < oldCommitSeqNo)
2798 newpredlock->commitSeqNo = oldCommitSeqNo;
2799 }
2800
2801 Assert(newpredlock->commitSeqNo != 0);
2802 Assert((newpredlock->commitSeqNo == InvalidSerCommitSeqNo)
2803 || (newpredlock->tag.myXact == OldCommittedSxact));
2804 }
2806
2807 if (removeOld)
2808 {
2809 Assert(dlist_is_empty(&oldtarget->predicateLocks));
2811 }
2812 }
2813
2814
2815exit:
2816 /* Release partition locks in reverse order of acquisition. */
2818 {
2821 }
2823 {
2826 }
2827 else
2829
2830 if (removeOld)
2831 {
2832 /* We shouldn't run out of memory if we're moving locks */
2834
2835 /* Put the scratch entry back */
2836 RestoreScratchTarget(false);
2837 }
2838
2839 return !outOfShmem;
2840}
2841
2842/*
2843 * Drop all predicate locks of any granularity from the specified relation,
2844 * which can be a heap relation or an index relation. If 'transfer' is true,
2845 * acquire a relation lock on the heap for any transactions with any lock(s)
2846 * on the specified relation.
2847 *
2848 * This requires grabbing a lot of LW locks and scanning the entire lock
2849 * target table for matches. That makes this more expensive than most
2850 * predicate lock management functions, but it will only be called for DDL
2851 * type commands that are expensive anyway, and there are fast returns when
2852 * no serializable transactions are active or the relation is temporary.
2853 *
2854 * We don't use the TransferPredicateLocksToNewTarget function because it
2855 * acquires its own locks on the partitions of the two targets involved,
2856 * and we'll already be holding all partition locks.
2857 *
2858 * We can't throw an error from here, because the call could be from a
2859 * transaction which is not serializable.
2860 *
2861 * NOTE: This is currently only called with transfer set to true, but that may
2862 * change. If we decide to clean up the locks from a table on commit of a
2863 * transaction which executed DROP TABLE, the false condition will be useful.
2864 */
2865static void
2867{
2871 Oid dbId;
2872 Oid relId;
2873 Oid heapId;
2874 int i;
2875 bool isIndex;
2876 bool found;
2878
2879 /*
2880 * Bail out quickly if there are no serializable transactions running.
2881 * It's safe to check this without taking locks because the caller is
2882 * holding an ACCESS EXCLUSIVE lock on the relation. No new locks which
2883 * would matter here can be acquired while that is held.
2884 */
2886 return;
2887
2888 if (!PredicateLockingNeededForRelation(relation))
2889 return;
2890
2891 dbId = relation->rd_locator.dbOid;
2892 relId = relation->rd_id;
2893 if (relation->rd_index == NULL)
2894 {
2895 isIndex = false;
2896 heapId = relId;
2897 }
2898 else
2899 {
2900 isIndex = true;
2901 heapId = relation->rd_index->indrelid;
2902 }
2904 Assert(transfer || !isIndex); /* index OID only makes sense with
2905 * transfer */
2906
2907 /* Retrieve first time needed, then keep. */
2909 heaptarget = NULL;
2910
2911 /* Acquire locks on all lock partitions */
2913 for (i = 0; i < NUM_PREDICATELOCK_PARTITIONS; i++)
2916
2917 /*
2918 * Remove the dummy entry to give us scratch space, so we know we'll be
2919 * able to create the new lock target.
2920 */
2921 if (transfer)
2922 RemoveScratchTarget(true);
2923
2924 /* Scan through target map */
2926
2928 {
2929 dlist_mutable_iter iter;
2930
2931 /*
2932 * Check whether this is a target which needs attention.
2933 */
2935 continue; /* wrong relation id */
2936 if (GET_PREDICATELOCKTARGETTAG_DB(oldtarget->tag) != dbId)
2937 continue; /* wrong database id */
2938 if (transfer && !isIndex
2940 continue; /* already the right lock */
2941
2942 /*
2943 * If we made it here, we have work to do. We make sure the heap
2944 * relation lock exists, then we walk the list of predicate locks for
2945 * the old target we found, moving all locks to the heap relation lock
2946 * -- unless they already hold that.
2947 */
2948
2949 /*
2950 * First make sure we have the heap relation target. We only need to
2951 * do this once.
2952 */
2953 if (transfer && heaptarget == NULL)
2954 {
2956
2962 HASH_ENTER, &found);
2963 if (!found)
2964 dlist_init(&heaptarget->predicateLocks);
2965 }
2966
2967 /*
2968 * Loop through all the locks on the old target, replacing them with
2969 * locks on the new target.
2970 */
2971 dlist_foreach_modify(iter, &oldtarget->predicateLocks)
2972 {
2974 dlist_container(PREDICATELOCK, targetLink, iter.cur);
2978
2979 /*
2980 * Remove the old lock first. This avoids the chance of running
2981 * out of lock structure entries for the hash table.
2982 */
2984 oldXact = oldpredlock->tag.myXact;
2985
2986 dlist_delete(&(oldpredlock->xactLink));
2987
2988 /*
2989 * No need for retail delete from oldtarget list, we're removing
2990 * the whole target anyway.
2991 */
2993 &oldpredlock->tag,
2994 HASH_REMOVE, &found);
2995 Assert(found);
2996
2997 if (transfer)
2998 {
3000
3002 newpredlocktag.myXact = oldXact;
3008 HASH_ENTER,
3009 &found);
3010 if (!found)
3011 {
3012 dlist_push_tail(&(heaptarget->predicateLocks),
3013 &(newpredlock->targetLink));
3014 dlist_push_tail(&(newpredlocktag.myXact->predicateLocks),
3015 &(newpredlock->xactLink));
3016 newpredlock->commitSeqNo = oldCommitSeqNo;
3017 }
3018 else
3019 {
3020 if (newpredlock->commitSeqNo < oldCommitSeqNo)
3021 newpredlock->commitSeqNo = oldCommitSeqNo;
3022 }
3023
3024 Assert(newpredlock->commitSeqNo != 0);
3025 Assert((newpredlock->commitSeqNo == InvalidSerCommitSeqNo)
3026 || (newpredlock->tag.myXact == OldCommittedSxact));
3027 }
3028 }
3029
3031 &found);
3032 Assert(found);
3033 }
3034
3035 /* Put the scratch entry back */
3036 if (transfer)
3038
3039 /* Release locks in reverse order */
3041 for (i = NUM_PREDICATELOCK_PARTITIONS - 1; i >= 0; i--)
3044}
3045
3046/*
3047 * TransferPredicateLocksToHeapRelation
3048 * For all transactions, transfer all predicate locks for the given
3049 * relation to a single relation lock on the heap.
3050 */
3051void
3056
3057
3058/*
3059 * PredicateLockPageSplit
3060 *
3061 * Copies any predicate locks for the old page to the new page.
3062 * Skip if this is a temporary table or toast table.
3063 *
3064 * NOTE: A page split (or overflow) affects all serializable transactions,
3065 * even if it occurs in the context of another transaction isolation level.
3066 *
3067 * NOTE: This currently leaves the local copy of the locks without
3068 * information on the new lock which is in shared memory. This could cause
3069 * problems if enough page splits occur on locked pages without the processes
3070 * which hold the locks getting in and noticing.
3071 */
3072void
3075{
3078 bool success;
3079
3080 /*
3081 * Bail out quickly if there are no serializable transactions running.
3082 *
3083 * It's safe to do this check without taking any additional locks. Even if
3084 * a serializable transaction starts concurrently, we know it can't take
3085 * any SIREAD locks on the page being split because the caller is holding
3086 * the associated buffer page lock. Memory reordering isn't an issue; the
3087 * memory barrier in the LWLock acquisition guarantees that this read
3088 * occurs while the buffer page lock is held.
3089 */
3091 return;
3092
3093 if (!PredicateLockingNeededForRelation(relation))
3094 return;
3095
3099
3101 relation->rd_locator.dbOid,
3102 relation->rd_id,
3103 oldblkno);
3105 relation->rd_locator.dbOid,
3106 relation->rd_id,
3107 newblkno);
3108
3110
3111 /*
3112 * Try copying the locks over to the new page's tag, creating it if
3113 * necessary.
3114 */
3117 false);
3118
3119 if (!success)
3120 {
3121 /*
3122 * No more predicate lock entries are available. Failure isn't an
3123 * option here, so promote the page lock to a relation lock.
3124 */
3125
3126 /* Get the parent relation lock's lock tag */
3128 &newtargettag);
3129 Assert(success);
3130
3131 /*
3132 * Move the locks to the parent. This shouldn't fail.
3133 *
3134 * Note that here we are removing locks held by other backends,
3135 * leading to a possible inconsistency in their local lock hash table.
3136 * This is OK because we're replacing it with a lock that covers the
3137 * old one.
3138 */
3141 true);
3142 Assert(success);
3143 }
3144
3146}
3147
3148/*
3149 * PredicateLockPageCombine
3150 *
3151 * Combines predicate locks for two existing pages.
3152 * Skip if this is a temporary table or toast table.
3153 *
3154 * NOTE: A page combine affects all serializable transactions, even if it
3155 * occurs in the context of another transaction isolation level.
3156 */
3157void
3160{
3161 /*
3162 * Page combines differ from page splits in that we ought to be able to
3163 * remove the locks on the old page after transferring them to the new
3164 * page, instead of duplicating them. However, because we can't edit other
3165 * backends' local lock tables, removing the old lock would leave them
3166 * with an entry in their LocalPredicateLockHash for a lock they're not
3167 * holding, which isn't acceptable. So we wind up having to do the same
3168 * work as a page split, acquiring a lock on the new page and keeping the
3169 * old page locked too. That can lead to some false positives, but should
3170 * be rare in practice.
3171 */
3173}
3174
3175/*
3176 * Walk the list of in-progress serializable transactions and find the new
3177 * xmin.
3178 */
3179static void
3214
3215/*
3216 * ReleasePredicateLocks
3217 *
3218 * Releases predicate locks based on completion of the current transaction,
3219 * whether committed or rolled back. It can also be called for a read only
3220 * transaction when it becomes impossible for the transaction to become
3221 * part of a dangerous structure.
3222 *
3223 * We do nothing unless this is a serializable transaction.
3224 *
3225 * This method must ensure that shared memory hash tables are cleaned
3226 * up in some relatively timely fashion.
3227 *
3228 * If this transaction is committing and is holding any predicate locks,
3229 * it must be added to a list of completed serializable transactions still
3230 * holding locks.
3231 *
3232 * If isReadOnlySafe is true, then predicate locks are being released before
3233 * the end of the transaction because MySerializableXact has been determined
3234 * to be RO_SAFE. In non-parallel mode we can release it completely, but it
3235 * in parallel mode we partially release the SERIALIZABLEXACT and keep it
3236 * around until the end of the transaction, allowing each backend to clear its
3237 * MySerializableXact variable and benefit from the optimization in its own
3238 * time.
3239 */
3240void
3242{
3243 bool partiallyReleasing = false;
3244 bool needToClear;
3246 dlist_mutable_iter iter;
3247
3248 /*
3249 * We can't trust XactReadOnly here, because a transaction which started
3250 * as READ WRITE can show as READ ONLY later, e.g., within
3251 * subtransactions. We want to flag a transaction as READ ONLY if it
3252 * commits without writing so that de facto READ ONLY transactions get the
3253 * benefit of some RO optimizations, so we will use this local variable to
3254 * get some cleanup logic right which is based on whether the transaction
3255 * was declared READ ONLY at the top level.
3256 */
3258
3259 /* We can't be both committing and releasing early due to RO_SAFE. */
3261
3262 /* Are we at the end of a transaction, that is, a commit or abort? */
3263 if (!isReadOnlySafe)
3264 {
3265 /*
3266 * Parallel workers mustn't release predicate locks at the end of
3267 * their transaction. The leader will do that at the end of its
3268 * transaction.
3269 */
3270 if (IsParallelWorker())
3271 {
3273 return;
3274 }
3275
3276 /*
3277 * By the time the leader in a parallel query reaches end of
3278 * transaction, it has waited for all workers to exit.
3279 */
3281
3282 /*
3283 * If the leader in a parallel query earlier stashed a partially
3284 * released SERIALIZABLEXACT for final clean-up at end of transaction
3285 * (because workers might still have been accessing it), then it's
3286 * time to restore it.
3287 */
3289 {
3294 }
3295 }
3296
3298 {
3300 return;
3301 }
3302
3304
3305 /*
3306 * If the transaction is committing, but it has been partially released
3307 * already, then treat this as a roll back. It was marked as rolled back.
3308 */
3310 isCommit = false;
3311
3312 /*
3313 * If we're called in the middle of a transaction because we discovered
3314 * that the SXACT_FLAG_RO_SAFE flag was set, then we'll partially release
3315 * it (that is, release the predicate locks and conflicts, but not the
3316 * SERIALIZABLEXACT itself) if we're the first backend to have noticed.
3317 */
3319 {
3320 /*
3321 * The leader needs to stash a pointer to it, so that it can
3322 * completely release it at end-of-transaction.
3323 */
3324 if (!IsParallelWorker())
3326
3327 /*
3328 * The first backend to reach this condition will partially release
3329 * the SERIALIZABLEXACT. All others will just clear their
3330 * backend-local state so that they stop doing SSI checks for the rest
3331 * of the transaction.
3332 */
3334 {
3337 return;
3338 }
3339 else
3340 {
3342 partiallyReleasing = true;
3343 /* ... and proceed to perform the partial release below. */
3344 }
3345 }
3351
3352 /* may not be serializable during COMMIT/ROLLBACK PREPARED */
3354
3355 /* We'd better not already be on the cleanup list. */
3357
3359
3360 /*
3361 * We don't hold XidGenLock lock here, assuming that TransactionId is
3362 * atomic!
3363 *
3364 * If this value is changing, we don't care that much whether we get the
3365 * old or new value -- it is just used to determine how far
3366 * SxactGlobalXmin must advance before this transaction can be fully
3367 * cleaned up. The worst that could happen is we wait for one more
3368 * transaction to complete before freeing some RAM; correctness of visible
3369 * behavior is not affected.
3370 */
3372
3373 /*
3374 * If it's not a commit it's either a rollback or a read-only transaction
3375 * flagged SXACT_FLAG_RO_SAFE, and we can clear our locks immediately.
3376 */
3377 if (isCommit)
3378 {
3381 /* Recognize implicit read-only transaction (commit without write). */
3382 if (!MyXactDidWrite)
3384 }
3385 else
3386 {
3387 /*
3388 * The DOOMED flag indicates that we intend to roll back this
3389 * transaction and so it should not cause serialization failures for
3390 * other transactions that conflict with it. Note that this flag might
3391 * already be set, if another backend marked this transaction for
3392 * abort.
3393 *
3394 * The ROLLED_BACK flag further indicates that ReleasePredicateLocks
3395 * has been called, and so the SerializableXact is eligible for
3396 * cleanup. This means it should not be considered when calculating
3397 * SxactGlobalXmin.
3398 */
3401
3402 /*
3403 * If the transaction was previously prepared, but is now failing due
3404 * to a ROLLBACK PREPARED or (hopefully very rare) error after the
3405 * prepare, clear the prepared flag. This simplifies conflict
3406 * checking.
3407 */
3409 }
3410
3412 {
3414 if (--(PredXact->WritableSxactCount) == 0)
3415 {
3416 /*
3417 * Release predicate locks and rw-conflicts in for all committed
3418 * transactions. There are no longer any transactions which might
3419 * conflict with the locks and no chance for new transactions to
3420 * overlap. Similarly, existing conflicts in can't cause pivots,
3421 * and any conflicts in which could have completed a dangerous
3422 * structure would already have caused a rollback, so any
3423 * remaining ones must be benign.
3424 */
3426 }
3427 }
3428 else
3429 {
3430 /*
3431 * Read-only transactions: clear the list of transactions that might
3432 * make us unsafe. Note that we use 'inLink' for the iteration as
3433 * opposed to 'outLink' for the r/w xacts.
3434 */
3436 {
3438 dlist_container(RWConflictData, inLink, iter.cur);
3439
3442
3444 }
3445 }
3446
3447 /* Check for conflict out to old committed transactions. */
3448 if (isCommit
3451 {
3452 /*
3453 * we don't know which old committed transaction we conflicted with,
3454 * so be conservative and use FirstNormalSerCommitSeqNo here
3455 */
3459 }
3460
3461 /*
3462 * Release all outConflicts to committed transactions. If we're rolling
3463 * back clear them all. Set SXACT_FLAG_CONFLICT_OUT if any point to
3464 * previously committed transactions.
3465 */
3467 {
3469 dlist_container(RWConflictData, outLink, iter.cur);
3470
3471 if (isCommit
3473 && SxactIsCommitted(conflict->sxactIn))
3474 {
3476 || conflict->sxactIn->prepareSeqNo < MySerializableXact->SeqNo.earliestOutConflictCommit)
3479 }
3480
3481 if (!isCommit
3482 || SxactIsCommitted(conflict->sxactIn)
3483 || (conflict->sxactIn->SeqNo.lastCommitBeforeSnapshot >= PredXact->LastSxactCommitSeqNo))
3485 }
3486
3487 /*
3488 * Release all inConflicts from committed and read-only transactions. If
3489 * we're rolling back, clear them all.
3490 */
3492 {
3494 dlist_container(RWConflictData, inLink, iter.cur);
3495
3496 if (!isCommit
3497 || SxactIsCommitted(conflict->sxactOut)
3498 || SxactIsReadOnly(conflict->sxactOut))
3500 }
3501
3503 {
3504 /*
3505 * Remove ourselves from the list of possible conflicts for concurrent
3506 * READ ONLY transactions, flagging them as unsafe if we have a
3507 * conflict out. If any are waiting DEFERRABLE transactions, wake them
3508 * up if they are known safe or known unsafe.
3509 */
3511 {
3513 dlist_container(RWConflictData, outLink, iter.cur);
3514
3515 roXact = possibleUnsafeConflict->sxactIn;
3518
3519 /* Mark conflicted if necessary. */
3520 if (isCommit
3524 <= roXact->SeqNo.lastCommitBeforeSnapshot))
3525 {
3526 /*
3527 * This releases possibleUnsafeConflict (as well as all other
3528 * possible conflicts for roXact)
3529 */
3531 }
3532 else
3533 {
3535
3536 /*
3537 * If we were the last possible conflict, flag it safe. The
3538 * transaction can now safely release its predicate locks (but
3539 * that transaction's backend has to do that itself).
3540 */
3541 if (dlist_is_empty(&roXact->possibleUnsafeConflicts))
3542 roXact->flags |= SXACT_FLAG_RO_SAFE;
3543 }
3544
3545 /*
3546 * Wake up the process for a waiting DEFERRABLE transaction if we
3547 * now know it's either safe or conflicted.
3548 */
3551 ProcSendSignal(roXact->pgprocno);
3552 }
3553 }
3554
3555 /*
3556 * Check whether it's time to clean up old transactions. This can only be
3557 * done when the last serializable transaction with the oldest xmin among
3558 * serializable transactions completes. We then find the "new oldest"
3559 * xmin and purge any transactions which finished before this transaction
3560 * was launched.
3561 *
3562 * For parallel queries in read-only transactions, it might run twice. We
3563 * only release the reference on the first call.
3564 */
3565 needToClear = false;
3566 if ((partiallyReleasing ||
3570 {
3572 if (--(PredXact->SxactGlobalXminCount) == 0)
3573 {
3575 needToClear = true;
3576 }
3577 }
3578
3580
3582
3583 /* Add this to the list of transactions to check for later cleanup. */
3584 if (isCommit)
3587
3588 /*
3589 * If we're releasing a RO_SAFE transaction in parallel mode, we'll only
3590 * partially release it. That's necessary because other backends may have
3591 * a reference to it. The leader will release the SERIALIZABLEXACT itself
3592 * at the end of the transaction after workers have stopped running.
3593 */
3594 if (!isCommit)
3597 false);
3598
3600
3601 if (needToClear)
3603
3605}
3606
3607static void
3609{
3611 MyXactDidWrite = false;
3612
3613 /* Delete per-transaction lock table */
3615 {
3618 }
3619}
3620
3621/*
3622 * Clear old predicate locks, belonging to committed transactions that are no
3623 * longer interesting to any in-progress transaction.
3624 */
3625static void
3627{
3628 dlist_mutable_iter iter;
3629
3630 /*
3631 * Loop through finished transactions. They are in commit order, so we can
3632 * stop as soon as we find one that's still interesting.
3633 */
3637 {
3639 dlist_container(SERIALIZABLEXACT, finishedLink, iter.cur);
3640
3644 {
3645 /*
3646 * This transaction committed before any in-progress transaction
3647 * took its snapshot. It's no longer interesting.
3648 */
3650 dlist_delete_thoroughly(&finishedSxact->finishedLink);
3653 }
3654 else if (finishedSxact->commitSeqNo > PredXact->HavePartialClearedThrough
3655 && finishedSxact->commitSeqNo <= PredXact->CanPartialClearThrough)
3656 {
3657 /*
3658 * Any active transactions that took their snapshot before this
3659 * transaction committed are read-only, so we can clear part of
3660 * its state.
3661 */
3663
3665 {
3666 /* A read-only transaction can be removed entirely */
3667 dlist_delete_thoroughly(&(finishedSxact->finishedLink));
3669 }
3670 else
3671 {
3672 /*
3673 * A read-write transaction can only be partially cleared. We
3674 * need to keep the SERIALIZABLEXACT but can release the
3675 * SIREAD locks and conflicts in.
3676 */
3678 }
3679
3682 }
3683 else
3684 {
3685 /* Still interesting. */
3686 break;
3687 }
3688 }
3690
3691 /*
3692 * Loop through predicate locks on dummy transaction for summarized data.
3693 */
3696 {
3698 dlist_container(PREDICATELOCK, xactLink, iter.cur);
3700
3702 Assert(predlock->commitSeqNo != 0);
3703 Assert(predlock->commitSeqNo != InvalidSerCommitSeqNo);
3706
3707 /*
3708 * If this lock originally belonged to an old enough transaction, we
3709 * can release it.
3710 */
3712 {
3713 PREDICATELOCKTAG tag;
3714 PREDICATELOCKTARGET *target;
3718
3719 tag = predlock->tag;
3720 target = tag.myTarget;
3721 targettag = target->tag;
3724
3726
3727 dlist_delete(&(predlock->targetLink));
3728 dlist_delete(&(predlock->xactLink));
3729
3733 HASH_REMOVE, NULL);
3735
3737 }
3738 }
3739
3742}
3743
3744/*
3745 * This is the normal way to delete anything from any of the predicate
3746 * locking hash tables. Given a transaction which we know can be deleted:
3747 * delete all predicate locks held by that transaction and any predicate
3748 * lock targets which are now unreferenced by a lock; delete all conflicts
3749 * for the transaction; delete all xid values for the transaction; then
3750 * delete the transaction.
3751 *
3752 * When the partial flag is set, we can release all predicate locks and
3753 * in-conflict information -- we've established that there are no longer
3754 * any overlapping read write transactions for which this transaction could
3755 * matter -- but keep the transaction entry itself and any outConflicts.
3756 *
3757 * When the summarize flag is set, we've run short of room for sxact data
3758 * and must summarize to the SLRU. Predicate locks are transferred to a
3759 * dummy "old" transaction, with duplicate locks on a single target
3760 * collapsing to a single lock with the "latest" commitSeqNo from among
3761 * the conflicting locks..
3762 */
3763static void
3765 bool summarize)
3766{
3768 dlist_mutable_iter iter;
3769
3770 Assert(sxact != NULL);
3772 Assert(partial || !SxactIsOnFinishedList(sxact));
3774
3775 /*
3776 * First release all the predicate locks held by this xact (or transfer
3777 * them to OldCommittedSxact if summarize is true)
3778 */
3780 if (IsInParallelMode())
3781 LWLockAcquire(&sxact->perXactPredicateListLock, LW_EXCLUSIVE);
3782 dlist_foreach_modify(iter, &sxact->predicateLocks)
3783 {
3785 dlist_container(PREDICATELOCK, xactLink, iter.cur);
3786 PREDICATELOCKTAG tag;
3787 PREDICATELOCKTARGET *target;
3791
3792 tag = predlock->tag;
3793 target = tag.myTarget;
3794 targettag = target->tag;
3797
3799
3800 dlist_delete(&predlock->targetLink);
3801
3805 HASH_REMOVE, NULL);
3806 if (summarize)
3807 {
3808 bool found;
3809
3810 /* Fold into dummy transaction list. */
3815 HASH_ENTER_NULL, &found);
3816 if (!predlock)
3817 ereport(ERROR,
3819 errmsg("out of shared memory"),
3820 errhint("You might need to increase \"%s\".", "max_pred_locks_per_transaction")));
3821 if (found)
3822 {
3823 Assert(predlock->commitSeqNo != 0);
3824 Assert(predlock->commitSeqNo != InvalidSerCommitSeqNo);
3825 if (predlock->commitSeqNo < sxact->commitSeqNo)
3826 predlock->commitSeqNo = sxact->commitSeqNo;
3827 }
3828 else
3829 {
3831 &predlock->targetLink);
3833 &predlock->xactLink);
3834 predlock->commitSeqNo = sxact->commitSeqNo;
3835 }
3836 }
3837 else
3839
3841 }
3842
3843 /*
3844 * Rather than retail removal, just re-init the head after we've run
3845 * through the list.
3846 */
3847 dlist_init(&sxact->predicateLocks);
3848
3849 if (IsInParallelMode())
3850 LWLockRelease(&sxact->perXactPredicateListLock);
3852
3853 sxidtag.xid = sxact->topXid;
3855
3856 /* Release all outConflicts (unless 'partial' is true) */
3857 if (!partial)
3858 {
3859 dlist_foreach_modify(iter, &sxact->outConflicts)
3860 {
3862 dlist_container(RWConflictData, outLink, iter.cur);
3863
3864 if (summarize)
3865 conflict->sxactIn->flags |= SXACT_FLAG_SUMMARY_CONFLICT_IN;
3867 }
3868 }
3869
3870 /* Release all inConflicts. */
3871 dlist_foreach_modify(iter, &sxact->inConflicts)
3872 {
3874 dlist_container(RWConflictData, inLink, iter.cur);
3875
3876 if (summarize)
3877 conflict->sxactOut->flags |= SXACT_FLAG_SUMMARY_CONFLICT_OUT;
3879 }
3880
3881 /* Finally, get rid of the xid and the record of the transaction itself. */
3882 if (!partial)
3883 {
3884 if (sxidtag.xid != InvalidTransactionId)
3887 }
3888
3890}
3891
3892/*
3893 * Tests whether the given top level transaction is concurrent with
3894 * (overlaps) our current transaction.
3895 *
3896 * We need to identify the top level transaction for SSI, anyway, so pass
3897 * that to this function to save the overhead of checking the snapshot's
3898 * subxip array.
3899 */
3900static bool
3902{
3903 Snapshot snap;
3904
3907
3909
3910 if (TransactionIdPrecedes(xid, snap->xmin))
3911 return false;
3912
3913 if (TransactionIdFollowsOrEquals(xid, snap->xmax))
3914 return true;
3915
3916 return pg_lfind32(xid, snap->xip, snap->xcnt);
3917}
3918
3919bool
3921{
3922 if (!SerializationNeededForRead(relation, snapshot))
3923 return false;
3924
3925 /* Check if someone else has already decided that we need to die */
3927 {
3928 ereport(ERROR,
3930 errmsg("could not serialize access due to read/write dependencies among transactions"),
3931 errdetail_internal("Reason code: Canceled on identification as a pivot, during conflict out checking."),
3932 errhint("The transaction might succeed if retried.")));
3933 }
3934
3935 return true;
3936}
3937
3938/*
3939 * CheckForSerializableConflictOut
3940 * A table AM is reading a tuple that has been modified. If it determines
3941 * that the tuple version it is reading is not visible to us, it should
3942 * pass in the top level xid of the transaction that created it.
3943 * Otherwise, if it determines that it is visible to us but it has been
3944 * deleted or there is a newer version available due to an update, it
3945 * should pass in the top level xid of the modifying transaction.
3946 *
3947 * This function will check for overlap with our own transaction. If the given
3948 * xid is also serializable and the transactions overlap (i.e., they cannot see
3949 * each other's writes), then we have a conflict out.
3950 */
3951void
3953{
3957
3958 if (!SerializationNeededForRead(relation, snapshot))
3959 return;
3960
3961 /* Check if someone else has already decided that we need to die */
3963 {
3964 ereport(ERROR,
3966 errmsg("could not serialize access due to read/write dependencies among transactions"),
3967 errdetail_internal("Reason code: Canceled on identification as a pivot, during conflict out checking."),
3968 errhint("The transaction might succeed if retried.")));
3969 }
3971
3973 return;
3974
3975 /*
3976 * Find sxact or summarized info for the top level xid.
3977 */
3978 sxidtag.xid = xid;
3980 sxid = (SERIALIZABLEXID *)
3982 if (!sxid)
3983 {
3984 /*
3985 * Transaction not found in "normal" SSI structures. Check whether it
3986 * got pushed out to SLRU storage for "old committed" transactions.
3987 */
3989
3991 if (conflictCommitSeqNo != 0)
3992 {
3997 ereport(ERROR,
3999 errmsg("could not serialize access due to read/write dependencies among transactions"),
4000 errdetail_internal("Reason code: Canceled on conflict out to old pivot %u.", xid),
4001 errhint("The transaction might succeed if retried.")));
4002
4005 ereport(ERROR,
4007 errmsg("could not serialize access due to read/write dependencies among transactions"),
4008 errdetail_internal("Reason code: Canceled on identification as a pivot, with conflict out to old committed transaction %u.", xid),
4009 errhint("The transaction might succeed if retried.")));
4010
4012 }
4013
4014 /* It's not serializable or otherwise not important. */
4016 return;
4017 }
4018 sxact = sxid->myXact;
4019 Assert(TransactionIdEquals(sxact->topXid, xid));
4021 {
4022 /* Can't conflict with ourself or a transaction that will roll back. */
4024 return;
4025 }
4026
4027 /*
4028 * We have a conflict out to a transaction which has a conflict out to a
4029 * summarized transaction. That summarized transaction must have
4030 * committed first, and we can't tell when it committed in relation to our
4031 * snapshot acquisition, so something needs to be canceled.
4032 */
4034 {
4035 if (!SxactIsPrepared(sxact))
4036 {
4037 sxact->flags |= SXACT_FLAG_DOOMED;
4039 return;
4040 }
4041 else
4042 {
4044 ereport(ERROR,
4046 errmsg("could not serialize access due to read/write dependencies among transactions"),
4047 errdetail_internal("Reason code: Canceled on conflict out to old pivot."),
4048 errhint("The transaction might succeed if retried.")));
4049 }
4050 }
4051
4052 /*
4053 * If this is a read-only transaction and the writing transaction has
4054 * committed, and it doesn't have a rw-conflict to a transaction which
4055 * committed before it, no conflict.
4056 */
4061 || MySerializableXact->SeqNo.lastCommitBeforeSnapshot < sxact->SeqNo.earliestOutConflictCommit))
4062 {
4063 /* Read-only transaction will appear to run first. No conflict. */
4065 return;
4066 }
4067
4068 if (!XidIsConcurrent(xid))
4069 {
4070 /* This write was already in our snapshot; no conflict. */
4072 return;
4073 }
4074
4076 {
4077 /* We don't want duplicate conflict records in the list. */
4079 return;
4080 }
4081
4082 /*
4083 * Flag the conflict. But first, if this conflict creates a dangerous
4084 * structure, ereport an error.
4085 */
4088}
4089
4090/*
4091 * Check a particular target for rw-dependency conflict in. A subroutine of
4092 * CheckForSerializableConflictIn().
4093 */
4094static void
4096{
4099 PREDICATELOCKTARGET *target;
4102 dlist_mutable_iter iter;
4103
4105
4106 /*
4107 * The same hash and LW lock apply to the lock target and the lock itself.
4108 */
4112 target = (PREDICATELOCKTARGET *)
4115 HASH_FIND, NULL);
4116 if (!target)
4117 {
4118 /* Nothing has this target locked; we're done here. */
4120 return;
4121 }
4122
4123 /*
4124 * Each lock for an overlapping transaction represents a conflict: a
4125 * rw-dependency in to this transaction.
4126 */
4128
4129 dlist_foreach_modify(iter, &target->predicateLocks)
4130 {
4132 dlist_container(PREDICATELOCK, targetLink, iter.cur);
4133 SERIALIZABLEXACT *sxact = predlock->tag.myXact;
4134
4136 {
4137 /*
4138 * If we're getting a write lock on a tuple, we don't need a
4139 * predicate (SIREAD) lock on the same tuple. We can safely remove
4140 * our SIREAD lock, but we'll defer doing so until after the loop
4141 * because that requires upgrading to an exclusive partition lock.
4142 *
4143 * We can't use this optimization within a subtransaction because
4144 * the subtransaction could roll back, and we would be left
4145 * without any lock at the top level.
4146 */
4147 if (!IsSubTransaction()
4149 {
4151 mypredlocktag = predlock->tag;
4152 }
4153 }
4154 else if (!SxactIsDoomed(sxact)
4157 sxact->finishedBefore))
4159 {
4162
4163 /*
4164 * Re-check after getting exclusive lock because the other
4165 * transaction may have flagged a conflict.
4166 */
4167 if (!SxactIsDoomed(sxact)
4170 sxact->finishedBefore))
4172 {
4174 }
4175
4178 }
4179 }
4182
4183 /*
4184 * If we found one of our own SIREAD locks to remove, remove it now.
4185 *
4186 * At this point our transaction already has a RowExclusiveLock on the
4187 * relation, so we are OK to drop the predicate lock on the tuple, if
4188 * found, without fearing that another write against the tuple will occur
4189 * before the MVCC information makes it to the buffer.
4190 */
4191 if (mypredlock != NULL)
4192 {
4195
4197 if (IsInParallelMode())
4201
4202 /*
4203 * Remove the predicate lock from shared memory, if it wasn't removed
4204 * while the locks were released. One way that could happen is from
4205 * autovacuum cleaning up an index.
4206 */
4213 HASH_FIND, NULL);
4214 if (rmpredlock != NULL)
4215 {
4217
4218 dlist_delete(&(mypredlock->targetLink));
4219 dlist_delete(&(mypredlock->xactLink));
4220
4225 HASH_REMOVE, NULL);
4227
4229 }
4230
4233 if (IsInParallelMode())
4236
4237 if (rmpredlock != NULL)
4238 {
4239 /*
4240 * Remove entry in local lock table if it exists. It's OK if it
4241 * doesn't exist; that means the lock was transferred to a new
4242 * target by a different backend.
4243 */
4246 HASH_REMOVE, NULL);
4247
4249 }
4250 }
4251}
4252
4253/*
4254 * CheckForSerializableConflictIn
4255 * We are writing the given tuple. If that indicates a rw-conflict
4256 * in from another serializable transaction, take appropriate action.
4257 *
4258 * Skip checking for any granularity for which a parameter is missing.
4259 *
4260 * A tuple update or delete is in conflict if we have a predicate lock
4261 * against the relation or page in which the tuple exists, or against the
4262 * tuple itself.
4263 */
4264void
4266{
4268
4269 if (!SerializationNeededForWrite(relation))
4270 return;
4271
4272 /* Check if someone else has already decided that we need to die */
4274 ereport(ERROR,
4276 errmsg("could not serialize access due to read/write dependencies among transactions"),
4277 errdetail_internal("Reason code: Canceled on identification as a pivot, during conflict in checking."),
4278 errhint("The transaction might succeed if retried.")));
4279
4280 /*
4281 * We're doing a write which might cause rw-conflicts now or later.
4282 * Memorize that fact.
4283 */
4284 MyXactDidWrite = true;
4285
4286 /*
4287 * It is important that we check for locks from the finest granularity to
4288 * the coarsest granularity, so that granularity promotion doesn't cause
4289 * us to miss a lock. The new (coarser) lock will be acquired before the
4290 * old (finer) locks are released.
4291 *
4292 * It is not possible to take and hold a lock across the checks for all
4293 * granularities because each target could be in a separate partition.
4294 */
4295 if (tid != NULL)
4296 {
4298 relation->rd_locator.dbOid,
4299 relation->rd_id,
4303 }
4304
4305 if (blkno != InvalidBlockNumber)
4306 {
4308 relation->rd_locator.dbOid,
4309 relation->rd_id,
4310 blkno);
4312 }
4313
4315 relation->rd_locator.dbOid,
4316 relation->rd_id);
4318}
4319
4320/*
4321 * CheckTableForSerializableConflictIn
4322 * The entire table is going through a DDL-style logical mass delete
4323 * like TRUNCATE or DROP TABLE. If that causes a rw-conflict in from
4324 * another serializable transaction, take appropriate action.
4325 *
4326 * While these operations do not operate entirely within the bounds of
4327 * snapshot isolation, they can occur inside a serializable transaction, and
4328 * will logically occur after any reads which saw rows which were destroyed
4329 * by these operations, so we do what we can to serialize properly under
4330 * SSI.
4331 *
4332 * The relation passed in must be a heap relation. Any predicate lock of any
4333 * granularity on the heap will cause a rw-conflict in to this transaction.
4334 * Predicate locks on indexes do not matter because they only exist to guard
4335 * against conflicting inserts into the index, and this is a mass *delete*.
4336 * When a table is truncated or dropped, the index will also be truncated
4337 * or dropped, and we'll deal with locks on the index when that happens.
4338 *
4339 * Dropping or truncating a table also needs to drop any existing predicate
4340 * locks on heap tuples or pages, because they're about to go away. This
4341 * should be done before altering the predicate locks because the transaction
4342 * could be rolled back because of a conflict, in which case the lock changes
4343 * are not needed. (At the moment, we don't actually bother to drop the
4344 * existing locks on a dropped or truncated table at the moment. That might
4345 * lead to some false positives, but it doesn't seem worth the trouble.)
4346 */
4347void
4349{
4351 PREDICATELOCKTARGET *target;
4352 Oid dbId;
4353 Oid heapId;
4354 int i;
4355
4356 /*
4357 * Bail out quickly if there are no serializable transactions running.
4358 * It's safe to check this without taking locks because the caller is
4359 * holding an ACCESS EXCLUSIVE lock on the relation. No new locks which
4360 * would matter here can be acquired while that is held.
4361 */
4363 return;
4364
4365 if (!SerializationNeededForWrite(relation))
4366 return;
4367
4368 /*
4369 * We're doing a write which might cause rw-conflicts now or later.
4370 * Memorize that fact.
4371 */
4372 MyXactDidWrite = true;
4373
4374 Assert(relation->rd_index == NULL); /* not an index relation */
4375
4376 dbId = relation->rd_locator.dbOid;
4377 heapId = relation->rd_id;
4378
4380 for (i = 0; i < NUM_PREDICATELOCK_PARTITIONS; i++)
4383
4384 /* Scan through target list */
4386
4387 while ((target = (PREDICATELOCKTARGET *) hash_seq_search(&seqstat)))
4388 {
4389 dlist_mutable_iter iter;
4390
4391 /*
4392 * Check whether this is a target which needs attention.
4393 */
4395 continue; /* wrong relation id */
4396 if (GET_PREDICATELOCKTARGETTAG_DB(target->tag) != dbId)
4397 continue; /* wrong database id */
4398
4399 /*
4400 * Loop through locks for this target and flag conflicts.
4401 */
4402 dlist_foreach_modify(iter, &target->predicateLocks)
4403 {
4405 dlist_container(PREDICATELOCK, targetLink, iter.cur);
4406
4407 if (predlock->tag.myXact != MySerializableXact
4409 {
4411 }
4412 }
4413 }
4414
4415 /* Release locks in reverse order */
4417 for (i = NUM_PREDICATELOCK_PARTITIONS - 1; i >= 0; i--)
4420}
4421
4422
4423/*
4424 * Flag a rw-dependency between two serializable transactions.
4425 *
4426 * The caller is responsible for ensuring that we have a LW lock on
4427 * the transaction hash table.
4428 */
4429static void
4431{
4432 Assert(reader != writer);
4433
4434 /* First, see if this conflict causes failure. */
4436
4437 /* Actually do the conflict flagging. */
4438 if (reader == OldCommittedSxact)
4440 else if (writer == OldCommittedSxact)
4442 else
4443 SetRWConflict(reader, writer);
4444}
4445
4446/*----------------------------------------------------------------------------
4447 * We are about to add a RW-edge to the dependency graph - check that we don't
4448 * introduce a dangerous structure by doing so, and abort one of the
4449 * transactions if so.
4450 *
4451 * A serialization failure can only occur if there is a dangerous structure
4452 * in the dependency graph:
4453 *
4454 * Tin ------> Tpivot ------> Tout
4455 * rw rw
4456 *
4457 * Furthermore, Tout must commit first.
4458 *
4459 * One more optimization is that if Tin is declared READ ONLY (or commits
4460 * without writing), we can only have a problem if Tout committed before Tin
4461 * acquired its snapshot.
4462 *----------------------------------------------------------------------------
4463 */
4464static void
4467{
4468 bool failure;
4469
4471
4472 failure = false;
4473
4474 /*------------------------------------------------------------------------
4475 * Check for already-committed writer with rw-conflict out flagged
4476 * (conflict-flag on W means that T2 committed before W):
4477 *
4478 * R ------> W ------> T2
4479 * rw rw
4480 *
4481 * That is a dangerous structure, so we must abort. (Since the writer
4482 * has already committed, we must be the reader)
4483 *------------------------------------------------------------------------
4484 */
4487 failure = true;
4488
4489 /*------------------------------------------------------------------------
4490 * Check whether the writer has become a pivot with an out-conflict
4491 * committed transaction (T2), and T2 committed first:
4492 *
4493 * R ------> W ------> T2
4494 * rw rw
4495 *
4496 * Because T2 must've committed first, there is no anomaly if:
4497 * - the reader committed before T2
4498 * - the writer committed before T2
4499 * - the reader is a READ ONLY transaction and the reader was concurrent
4500 * with T2 (= reader acquired its snapshot before T2 committed)
4501 *
4502 * We also handle the case that T2 is prepared but not yet committed
4503 * here. In that case T2 has already checked for conflicts, so if it
4504 * commits first, making the above conflict real, it's too late for it
4505 * to abort.
4506 *------------------------------------------------------------------------
4507 */
4509 failure = true;
4510 else if (!failure)
4511 {
4512 dlist_iter iter;
4513
4514 dlist_foreach(iter, &writer->outConflicts)
4515 {
4517 dlist_container(RWConflictData, outLink, iter.cur);
4518 SERIALIZABLEXACT *t2 = conflict->sxactIn;
4519
4520 if (SxactIsPrepared(t2)
4521 && (!SxactIsCommitted(reader)
4522 || t2->prepareSeqNo <= reader->commitSeqNo)
4524 || t2->prepareSeqNo <= writer->commitSeqNo)
4525 && (!SxactIsReadOnly(reader)
4526 || t2->prepareSeqNo <= reader->SeqNo.lastCommitBeforeSnapshot))
4527 {
4528 failure = true;
4529 break;
4530 }
4531 }
4532 }
4533
4534 /*------------------------------------------------------------------------
4535 * Check whether the reader has become a pivot with a writer
4536 * that's committed (or prepared):
4537 *
4538 * T0 ------> R ------> W
4539 * rw rw
4540 *
4541 * Because W must've committed first for an anomaly to occur, there is no
4542 * anomaly if:
4543 * - T0 committed before the writer
4544 * - T0 is READ ONLY, and overlaps the writer
4545 *------------------------------------------------------------------------
4546 */
4547 if (!failure && SxactIsPrepared(writer) && !SxactIsReadOnly(reader))
4548 {
4549 if (SxactHasSummaryConflictIn(reader))
4550 {
4551 failure = true;
4552 }
4553 else
4554 {
4555 dlist_iter iter;
4556
4557 /*
4558 * The unconstify is needed as we have no const version of
4559 * dlist_foreach().
4560 */
4561 dlist_foreach(iter, &unconstify(SERIALIZABLEXACT *, reader)->inConflicts)
4562 {
4563 const RWConflict conflict =
4564 dlist_container(RWConflictData, inLink, iter.cur);
4565 const SERIALIZABLEXACT *t0 = conflict->sxactOut;
4566
4567 if (!SxactIsDoomed(t0)
4568 && (!SxactIsCommitted(t0)
4569 || t0->commitSeqNo >= writer->prepareSeqNo)
4570 && (!SxactIsReadOnly(t0)
4571 || t0->SeqNo.lastCommitBeforeSnapshot >= writer->prepareSeqNo))
4572 {
4573 failure = true;
4574 break;
4575 }
4576 }
4577 }
4578 }
4579
4580 if (failure)
4581 {
4582 /*
4583 * We have to kill a transaction to avoid a possible anomaly from
4584 * occurring. If the writer is us, we can just ereport() to cause a
4585 * transaction abort. Otherwise we flag the writer for termination,
4586 * causing it to abort when it tries to commit. However, if the writer
4587 * is a prepared transaction, already prepared, we can't abort it
4588 * anymore, so we have to kill the reader instead.
4589 */
4591 {
4593 ereport(ERROR,
4595 errmsg("could not serialize access due to read/write dependencies among transactions"),
4596 errdetail_internal("Reason code: Canceled on identification as a pivot, during write."),
4597 errhint("The transaction might succeed if retried.")));
4598 }
4599 else if (SxactIsPrepared(writer))
4600 {
4602
4603 /* if we're not the writer, we have to be the reader */
4604 Assert(MySerializableXact == reader);
4605 ereport(ERROR,
4607 errmsg("could not serialize access due to read/write dependencies among transactions"),
4608 errdetail_internal("Reason code: Canceled on conflict out to pivot %u, during read.", writer->topXid),
4609 errhint("The transaction might succeed if retried.")));
4610 }
4611 writer->flags |= SXACT_FLAG_DOOMED;
4612 }
4613}
4614
4615/*
4616 * PreCommit_CheckForSerializationFailure
4617 * Check for dangerous structures in a serializable transaction
4618 * at commit.
4619 *
4620 * We're checking for a dangerous structure as each conflict is recorded.
4621 * The only way we could have a problem at commit is if this is the "out"
4622 * side of a pivot, and neither the "in" side nor the pivot has yet
4623 * committed.
4624 *
4625 * If a dangerous structure is found, the pivot (the near conflict) is
4626 * marked for death, because rolling back another transaction might mean
4627 * that we fail without ever making progress. This transaction is
4628 * committing writes, so letting it commit ensures progress. If we
4629 * canceled the far conflict, it might immediately fail again on retry.
4630 */
4631void
4633{
4635
4637 return;
4638
4640
4642
4643 /*
4644 * Check if someone else has already decided that we need to die. Since
4645 * we set our own DOOMED flag when partially releasing, ignore in that
4646 * case.
4647 */
4650 {
4652 ereport(ERROR,
4654 errmsg("could not serialize access due to read/write dependencies among transactions"),
4655 errdetail_internal("Reason code: Canceled on identification as a pivot, during commit attempt."),
4656 errhint("The transaction might succeed if retried.")));
4657 }
4658
4660 {
4663
4664 if (!SxactIsCommitted(nearConflict->sxactOut)
4665 && !SxactIsDoomed(nearConflict->sxactOut))
4666 {
4668
4669 dlist_foreach(far_iter, &nearConflict->sxactOut->inConflicts)
4670 {
4673
4674 if (farConflict->sxactOut == MySerializableXact
4675 || (!SxactIsCommitted(farConflict->sxactOut)
4676 && !SxactIsReadOnly(farConflict->sxactOut)
4677 && !SxactIsDoomed(farConflict->sxactOut)))
4678 {
4679 /*
4680 * Normally, we kill the pivot transaction to make sure we
4681 * make progress if the failing transaction is retried.
4682 * However, we can't kill it if it's already prepared, so
4683 * in that case we commit suicide instead.
4684 */
4685 if (SxactIsPrepared(nearConflict->sxactOut))
4686 {
4688 ereport(ERROR,
4690 errmsg("could not serialize access due to read/write dependencies among transactions"),
4691 errdetail_internal("Reason code: Canceled on commit attempt with conflict in from prepared pivot."),
4692 errhint("The transaction might succeed if retried.")));
4693 }
4694 nearConflict->sxactOut->flags |= SXACT_FLAG_DOOMED;
4695 break;
4696 }
4697 }
4698 }
4699 }
4700
4703
4705}
4706
4707/*------------------------------------------------------------------------*/
4708
4709/*
4710 * Two-phase commit support
4711 */
4712
4713/*
4714 * AtPrepare_Locks
4715 * Do the preparatory work for a PREPARE: make 2PC state file
4716 * records for all predicate locks currently held.
4717 */
4718void
4720{
4723 TwoPhasePredicateXactRecord *xactRecord;
4724 TwoPhasePredicateLockRecord *lockRecord;
4725 dlist_iter iter;
4726
4728 xactRecord = &(record.data.xactRecord);
4729 lockRecord = &(record.data.lockRecord);
4730
4732 return;
4733
4734 /* Generate an xact record for our SERIALIZABLEXACT */
4736 xactRecord->xmin = MySerializableXact->xmin;
4737 xactRecord->flags = MySerializableXact->flags;
4738
4739 /*
4740 * Note that we don't include the list of conflicts in our out in the
4741 * statefile, because new conflicts can be added even after the
4742 * transaction prepares. We'll just make a conservative assumption during
4743 * recovery instead.
4744 */
4745
4747 &record, sizeof(record));
4748
4749 /*
4750 * Generate a lock record for each lock.
4751 *
4752 * To do this, we need to walk the predicate lock list in our sxact rather
4753 * than using the local predicate lock table because the latter is not
4754 * guaranteed to be accurate.
4755 */
4757
4758 /*
4759 * No need to take sxact->perXactPredicateListLock in parallel mode
4760 * because there cannot be any parallel workers running while we are
4761 * preparing a transaction.
4762 */
4764
4765 dlist_foreach(iter, &sxact->predicateLocks)
4766 {
4768 dlist_container(PREDICATELOCK, xactLink, iter.cur);
4769
4771 lockRecord->target = predlock->tag.myTarget->tag;
4772
4774 &record, sizeof(record));
4775 }
4776
4778}
4779
4780/*
4781 * PostPrepare_Locks
4782 * Clean up after successful PREPARE. Unlike the non-predicate
4783 * lock manager, we do not need to transfer locks to a dummy
4784 * PGPROC because our SERIALIZABLEXACT will stay around
4785 * anyway. We only need to clean up our local state.
4786 */
4787void
4804
4805/*
4806 * PredicateLockTwoPhaseFinish
4807 * Release a prepared transaction's predicate locks once it
4808 * commits or aborts.
4809 */
4810void
4812{
4815
4817
4819 sxid = (SERIALIZABLEXID *)
4822
4823 /* xid will not be found if it wasn't a serializable transaction */
4824 if (sxid == NULL)
4825 return;
4826
4827 /* Release its locks */
4828 MySerializableXact = sxid->myXact;
4829 MyXactDidWrite = true; /* conservatively assume that we wrote
4830 * something */
4832}
4833
4834/*
4835 * Re-acquire a predicate lock belonging to a transaction that was prepared.
4836 */
4837void
4839 void *recdata, uint32 len)
4840{
4843
4845
4846 record = (TwoPhasePredicateRecord *) recdata;
4847
4849 (record->type == TWOPHASEPREDICATERECORD_LOCK));
4850
4851 if (record->type == TWOPHASEPREDICATERECORD_XACT)
4852 {
4853 /* Per-transaction record. Set up a SERIALIZABLEXACT. */
4854 TwoPhasePredicateXactRecord *xactRecord;
4858 bool found;
4859
4860 xactRecord = (TwoPhasePredicateXactRecord *) &record->data.xactRecord;
4861
4864 if (!sxact)
4865 ereport(ERROR,
4867 errmsg("out of shared memory")));
4868
4869 /* vxid for a prepared xact is INVALID_PROC_NUMBER/xid; no pid */
4870 sxact->vxid.procNumber = INVALID_PROC_NUMBER;
4871 sxact->vxid.localTransactionId = (LocalTransactionId) xid;
4872 sxact->pid = 0;
4873 sxact->pgprocno = INVALID_PROC_NUMBER;
4874
4875 /* a prepared xact hasn't committed yet */
4876 sxact->prepareSeqNo = RecoverySerCommitSeqNo;
4877 sxact->commitSeqNo = InvalidSerCommitSeqNo;
4878 sxact->finishedBefore = InvalidTransactionId;
4879
4880 sxact->SeqNo.lastCommitBeforeSnapshot = RecoverySerCommitSeqNo;
4881
4882 /*
4883 * Don't need to track this; no transactions running at the time the
4884 * recovered xact started are still active, except possibly other
4885 * prepared xacts and we don't care whether those are RO_SAFE or not.
4886 */
4887 dlist_init(&(sxact->possibleUnsafeConflicts));
4888
4889 dlist_init(&(sxact->predicateLocks));
4890 dlist_node_init(&sxact->finishedLink);
4891
4892 sxact->topXid = xid;
4893 sxact->xmin = xactRecord->xmin;
4894 sxact->flags = xactRecord->flags;
4896 if (!SxactIsReadOnly(sxact))
4897 {
4901 }
4902
4903 /*
4904 * We don't know whether the transaction had any conflicts or not, so
4905 * we'll conservatively assume that it had both a conflict in and a
4906 * conflict out, and represent that with the summary conflict flags.
4907 */
4908 dlist_init(&(sxact->outConflicts));
4909 dlist_init(&(sxact->inConflicts));
4912
4913 /* Register the transaction's xid */
4914 sxidtag.xid = xid;
4916 &sxidtag,
4917 HASH_ENTER, &found);
4918 Assert(sxid != NULL);
4919 Assert(!found);
4920 sxid->myXact = sxact;
4921
4922 /*
4923 * Update global xmin. Note that this is a special case compared to
4924 * registering a normal transaction, because the global xmin might go
4925 * backwards. That's OK, because until recovery is over we're not
4926 * going to complete any transactions or create any non-prepared
4927 * transactions, so there's no danger of throwing away.
4928 */
4931 {
4935 }
4937 {
4940 }
4941
4943 }
4944 else if (record->type == TWOPHASEPREDICATERECORD_LOCK)
4945 {
4946 /* Lock record. Recreate the PREDICATELOCK */
4947 TwoPhasePredicateLockRecord *lockRecord;
4952
4953 lockRecord = (TwoPhasePredicateLockRecord *) &record->data.lockRecord;
4955
4957 sxidtag.xid = xid;
4958 sxid = (SERIALIZABLEXID *)
4961
4962 Assert(sxid != NULL);
4963 sxact = sxid->myXact;
4965
4967 }
4968}
4969
4970/*
4971 * Prepare to share the current SERIALIZABLEXACT with parallel workers.
4972 * Return a handle object that can be used by AttachSerializableXact() in a
4973 * parallel worker.
4974 */
4977{
4978 return MySerializableXact;
4979}
4980
4981/*
4982 * Allow parallel workers to import the leader's SERIALIZABLEXACT.
4983 */
4984void
bool ParallelContextActive(void)
Definition parallel.c:1033
uint32 BlockNumber
Definition block.h:31
#define InvalidBlockNumber
Definition block.h:33
static bool BlockNumberIsValid(BlockNumber blockNumber)
Definition block.h:71
#define unconstify(underlying_type, expr)
Definition c.h:1325
#define PG_USED_FOR_ASSERTS_ONLY
Definition c.h:249
#define Assert(condition)
Definition c.h:943
int64_t int64
Definition c.h:621
uint16_t uint16
Definition c.h:623
uint32_t uint32
Definition c.h:624
uint32 LocalTransactionId
Definition c.h:738
uint32 TransactionId
Definition c.h:736
size_t Size
Definition c.h:689
void * hash_search(HTAB *hashp, const void *keyPtr, HASHACTION action, bool *foundPtr)
Definition dynahash.c:889
HTAB * hash_create(const char *tabname, int64 nelem, const HASHCTL *info, int flags)
Definition dynahash.c:360
void hash_destroy(HTAB *hashp)
Definition dynahash.c:802
void * hash_search_with_hash_value(HTAB *hashp, const void *keyPtr, uint32 hashvalue, HASHACTION action, bool *foundPtr)
Definition dynahash.c:902
void * hash_seq_search(HASH_SEQ_STATUS *status)
Definition dynahash.c:1352
int64 hash_get_num_entries(HTAB *hashp)
Definition dynahash.c:1273
void hash_seq_init(HASH_SEQ_STATUS *status, HTAB *hashp)
Definition dynahash.c:1317
Datum arg
Definition elog.c:1323
int errcode(int sqlerrcode)
Definition elog.c:875
int int errdetail_internal(const char *fmt,...) pg_attribute_printf(1
int errhint(const char *fmt,...) pg_attribute_printf(1
int errdetail(const char *fmt,...) pg_attribute_printf(1
int int errmsg_internal(const char *fmt,...) pg_attribute_printf(1
#define DEBUG2
Definition elog.h:30
#define ERROR
Definition elog.h:40
#define elog(elevel,...)
Definition elog.h:228
#define ereport(elevel,...)
Definition elog.h:152
#define palloc_object(type)
Definition fe_memutils.h:74
#define palloc_array(type, count)
Definition fe_memutils.h:76
int MyProcPid
Definition globals.c:49
ProcNumber MyProcNumber
Definition globals.c:92
int MaxBackends
Definition globals.c:149
int serializable_buffers
Definition globals.c:168
#define newval
GucSource
Definition guc.h:112
@ HASH_FIND
Definition hsearch.h:108
@ HASH_REMOVE
Definition hsearch.h:110
@ HASH_ENTER
Definition hsearch.h:109
@ HASH_ENTER_NULL
Definition hsearch.h:111
#define HASH_ELEM
Definition hsearch.h:90
#define HASH_FUNCTION
Definition hsearch.h:93
#define HASH_BLOBS
Definition hsearch.h:92
#define HASH_FIXED_SIZE
Definition hsearch.h:100
#define HASH_PARTITION
Definition hsearch.h:87
static dlist_node * dlist_pop_head_node(dlist_head *head)
Definition ilist.h:450
#define dlist_foreach(iter, lhead)
Definition ilist.h:623
static void dlist_init(dlist_head *head)
Definition ilist.h:314
#define dlist_head_element(type, membername, lhead)
Definition ilist.h:603
static void dlist_delete_thoroughly(dlist_node *node)
Definition ilist.h:416
static void dlist_delete(dlist_node *node)
Definition ilist.h:405
#define dlist_foreach_modify(iter, lhead)
Definition ilist.h:640
static bool dlist_is_empty(const dlist_head *head)
Definition ilist.h:336
static void dlist_push_tail(dlist_head *head, dlist_node *node)
Definition ilist.h:364
static void dlist_node_init(dlist_node *node)
Definition ilist.h:325
#define dlist_container(type, membername, ptr)
Definition ilist.h:593
#define IsParallelWorker()
Definition parallel.h:62
FILE * output
long val
Definition informix.c:689
static bool success
Definition initdb.c:188
int i
Definition isn.c:77
static OffsetNumber ItemPointerGetOffsetNumber(const ItemPointerData *pointer)
Definition itemptr.h:124
static BlockNumber ItemPointerGetBlockNumber(const ItemPointerData *pointer)
Definition itemptr.h:103
#define GET_VXID_FROM_PGPROC(vxid_dst, proc)
Definition lock.h:80
#define SetInvalidVirtualTransactionId(vxid)
Definition lock.h:77
bool LWLockHeldByMe(LWLock *lock)
Definition lwlock.c:1885
bool LWLockAcquire(LWLock *lock, LWLockMode mode)
Definition lwlock.c:1150
bool LWLockHeldByMeInMode(LWLock *lock, LWLockMode mode)
Definition lwlock.c:1929
void LWLockRelease(LWLock *lock)
Definition lwlock.c:1767
void LWLockInitialize(LWLock *lock, int tranche_id)
Definition lwlock.c:670
@ LW_SHARED
Definition lwlock.h:105
@ LW_EXCLUSIVE
Definition lwlock.h:104
#define NUM_PREDICATELOCK_PARTITIONS
Definition lwlock.h:91
#define InvalidPid
Definition miscadmin.h:32
static char * errmsg
#define SLRU_PAGES_PER_SEGMENT
const void size_t len
const void * data
static bool pg_lfind32(uint32 key, const uint32 *base, uint32 nelem)
Definition pg_lfind.h:153
static rewind_source * source
Definition pg_rewind.c:89
#define ERRCODE_T_R_SERIALIZATION_FAILURE
Definition pgbench.c:77
#define InvalidOid
unsigned int Oid
PredicateLockData * GetPredicateLockStatusData(void)
Definition predicate.c:1376
void CheckPointPredicate(void)
Definition predicate.c:1022
void PredicateLockPageSplit(Relation relation, BlockNumber oldblkno, BlockNumber newblkno)
Definition predicate.c:3073
static void DecrementParentLocks(const PREDICATELOCKTARGETTAG *targettag)
Definition predicate.c:2320
static HTAB * PredicateLockHash
Definition predicate.c:411
static void SetPossibleUnsafeConflict(SERIALIZABLEXACT *roXact, SERIALIZABLEXACT *activeXact)
Definition predicate.c:680
#define PredicateLockTargetTagHashCode(predicatelocktargettag)
Definition predicate.c:302
static void SetNewSxactGlobalXmin(void)
Definition predicate.c:3180
void CheckForSerializableConflictIn(Relation relation, const ItemPointerData *tid, BlockNumber blkno)
Definition predicate.c:4265
#define SerialPage(xid)
Definition predicate.c:345
static void ReleasePredXact(SERIALIZABLEXACT *sxact)
Definition predicate.c:610
static void PredicateLockShmemInit(void *arg)
Definition predicate.c:1243
void SetSerializableTransactionSnapshot(Snapshot snapshot, VirtualTransactionId *sourcevxid, int sourcepid)
Definition predicate.c:1651
static bool RWConflictExists(const SERIALIZABLEXACT *reader, const SERIALIZABLEXACT *writer)
Definition predicate.c:624
static bool PredicateLockingNeededForRelation(Relation relation)
Definition predicate.c:512
static bool SerializationNeededForRead(Relation relation, Snapshot snapshot)
Definition predicate.c:530
static Snapshot GetSafeSnapshot(Snapshot origSnapshot)
Definition predicate.c:1487
#define SxactIsCommitted(sxact)
Definition predicate.c:276
static SerialControl serialControl
Definition predicate.c:356
void PredicateLockPage(Relation relation, BlockNumber blkno, Snapshot snapshot)
Definition predicate.c:2528
#define SxactIsROUnsafe(sxact)
Definition predicate.c:291
static Snapshot GetSerializableTransactionSnapshotInt(Snapshot snapshot, VirtualTransactionId *sourcevxid, int sourcepid)
Definition predicate.c:1693
static LWLock * ScratchPartitionLock
Definition predicate.c:421
static void PredicateLockAcquire(const PREDICATELOCKTARGETTAG *targettag)
Definition predicate.c:2446
#define SxactIsDeferrableWaiting(sxact)
Definition predicate.c:289
static void ReleasePredicateLocksLocal(void)
Definition predicate.c:3608
static HTAB * LocalPredicateLockHash
Definition predicate.c:427
int max_predicate_locks_per_page
Definition predicate.c:375
struct SerialControlData * SerialControl
Definition predicate.c:354
static PredXactList PredXact
Definition predicate.c:386
static void SetRWConflict(SERIALIZABLEXACT *reader, SERIALIZABLEXACT *writer)
Definition predicate.c:657
int GetSafeSnapshotBlockingPids(int blocked_pid, int *output, int output_size)
Definition predicate.c:1557
static uint32 ScratchTargetTagHash
Definition predicate.c:420
static void RemoveTargetIfNoLongerUsed(PREDICATELOCKTARGET *target, uint32 targettaghash)
Definition predicate.c:2112
static uint32 predicatelock_hash(const void *key, Size keysize)
Definition predicate.c:1350
void CheckForSerializableConflictOut(Relation relation, TransactionId xid, Snapshot snapshot)
Definition predicate.c:3952
static int64 max_serializable_xacts
Definition predicate.c:446
#define SxactIsReadOnly(sxact)
Definition predicate.c:280
#define SerialNextPage(page)
Definition predicate.c:339
static void DropAllPredicateLocksFromTable(Relation relation, bool transfer)
Definition predicate.c:2866
bool PageIsPredicateLocked(Relation relation, BlockNumber blkno)
Definition predicate.c:1937
static int serial_errdetail_for_io_error(const void *opaque_data)
Definition predicate.c:760
static void CreatePredicateLock(const PREDICATELOCKTARGETTAG *targettag, uint32 targettaghash, SERIALIZABLEXACT *sxact)
Definition predicate.c:2382
static void SerialAdd(TransactionId xid, SerCommitSeqNo minConflictCommitSeqNo)
Definition predicate.c:839
static void ClearOldPredicateLocks(void)
Definition predicate.c:3626
#define SxactHasSummaryConflictIn(sxact)
Definition predicate.c:281
static SERIALIZABLEXACT * CreatePredXact(void)
Definition predicate.c:596
static bool GetParentPredicateLockTag(const PREDICATELOCKTARGETTAG *tag, PREDICATELOCKTARGETTAG *parent)
Definition predicate.c:2001
#define PredicateLockHashCodeFromTargetHashCode(predicatelocktag, targethash)
Definition predicate.c:315
static void RestoreScratchTarget(bool lockheld)
Definition predicate.c:2090
#define SerialValue(slotno, xid)
Definition predicate.c:341
static void DeleteChildTargetLocks(const PREDICATELOCKTARGETTAG *newtargettag)
Definition predicate.c:2143
static void DeleteLockTarget(PREDICATELOCKTARGET *target, uint32 targettaghash)
Definition predicate.c:2598
void PredicateLockTwoPhaseFinish(FullTransactionId fxid, bool isCommit)
Definition predicate.c:4811
void predicatelock_twophase_recover(FullTransactionId fxid, uint16 info, void *recdata, uint32 len)
Definition predicate.c:4838
static SlruDesc SerialSlruDesc
Definition predicate.c:326
static SERIALIZABLEXACT * OldCommittedSxact
Definition predicate.c:364
#define SxactHasConflictOut(sxact)
Definition predicate.c:288
static bool MyXactDidWrite
Definition predicate.c:435
static int MaxPredicateChildLocks(const PREDICATELOCKTARGETTAG *tag)
Definition predicate.c:2218
static void FlagSxactUnsafe(SERIALIZABLEXACT *sxact)
Definition predicate.c:713
static void PredicateLockShmemRequest(void *arg)
Definition predicate.c:1119
void CheckTableForSerializableConflictIn(Relation relation)
Definition predicate.c:4348
#define SxactIsPrepared(sxact)
Definition predicate.c:277
void AttachSerializableXact(SerializableXactHandle handle)
Definition predicate.c:4985
SerializableXactHandle ShareSerializableXact(void)
Definition predicate.c:4976
static bool PredicateLockExists(const PREDICATELOCKTARGETTAG *targettag)
Definition predicate.c:1974
static void RemoveScratchTarget(bool lockheld)
Definition predicate.c:2069
#define SxactIsOnFinishedList(sxact)
Definition predicate.c:266
#define SxactIsPartiallyReleased(sxact)
Definition predicate.c:292
static void SerialSetActiveSerXmin(TransactionId xid)
Definition predicate.c:971
static dlist_head * FinishedSerializableTransactions
Definition predicate.c:412
static bool SerializationNeededForWrite(Relation relation)
Definition predicate.c:574
static HTAB * SerializableXidHash
Definition predicate.c:409
static bool CheckAndPromotePredicateLockRequest(const PREDICATELOCKTARGETTAG *reqtag)
Definition predicate.c:2255
void PredicateLockPageCombine(Relation relation, BlockNumber oldblkno, BlockNumber newblkno)
Definition predicate.c:3158
static bool SerialPagePrecedesLogically(int64 page1, int64 page2)
Definition predicate.c:745
static void CheckTargetForConflictsIn(PREDICATELOCKTARGETTAG *targettag)
Definition predicate.c:4095
int max_predicate_locks_per_relation
Definition predicate.c:374
#define SxactIsROSafe(sxact)
Definition predicate.c:290
void PreCommit_CheckForSerializationFailure(void)
Definition predicate.c:4632
void ReleasePredicateLocks(bool isCommit, bool isReadOnlySafe)
Definition predicate.c:3241
static void FlagRWConflict(SERIALIZABLEXACT *reader, SERIALIZABLEXACT *writer)
Definition predicate.c:4430
static const PREDICATELOCKTARGETTAG ScratchTargetTag
Definition predicate.c:419
#define PredicateLockHashPartitionLockByIndex(i)
Definition predicate.c:260
static void OnConflict_CheckForSerializationFailure(const SERIALIZABLEXACT *reader, SERIALIZABLEXACT *writer)
Definition predicate.c:4465
static bool CoarserLockCovers(const PREDICATELOCKTARGETTAG *newtargettag)
Definition predicate.c:2040
void PredicateLockRelation(Relation relation, Snapshot snapshot)
Definition predicate.c:2505
static SERIALIZABLEXACT * MySerializableXact
Definition predicate.c:434
void PredicateLockTID(Relation relation, const ItemPointerData *tid, Snapshot snapshot, TransactionId tuple_xid)
Definition predicate.c:2550
#define SxactIsDoomed(sxact)
Definition predicate.c:279
#define NPREDICATELOCKTARGETENTS()
Definition predicate.c:263
static SerCommitSeqNo SerialGetMinConflictCommitSeqNo(TransactionId xid)
Definition predicate.c:930
static void SummarizeOldestCommittedSxact(void)
Definition predicate.c:1432
const ShmemCallbacks PredicateLockShmemCallbacks
Definition predicate.c:392
bool check_serial_buffers(int *newval, void **extra, GucSource source)
Definition predicate.c:828
void PostPrepare_PredicateLocks(FullTransactionId fxid)
Definition predicate.c:4788
#define TargetTagIsCoveredBy(covered_target, covering_target)
Definition predicate.c:232
static RWConflictPoolHeader RWConflictPool
Definition predicate.c:403
static void ReleaseRWConflict(RWConflict conflict)
Definition predicate.c:705
static bool TransferPredicateLocksToNewTarget(PREDICATELOCKTARGETTAG oldtargettag, PREDICATELOCKTARGETTAG newtargettag, bool removeOld)
Definition predicate.c:2659
void AtPrepare_PredicateLocks(void)
Definition predicate.c:4719
void RegisterPredicateLockingXid(TransactionId xid)
Definition predicate.c:1888
#define PredicateLockHashPartitionLock(hashcode)
Definition predicate.c:257
#define SERIAL_ENTRIESPERPAGE
Definition predicate.c:332
static bool XidIsConcurrent(TransactionId xid)
Definition predicate.c:3901
static void ReleaseOneSerializableXact(SERIALIZABLEXACT *sxact, bool partial, bool summarize)
Definition predicate.c:3764
static HTAB * PredicateLockTargetHash
Definition predicate.c:410
bool CheckForSerializableConflictOutNeeded(Relation relation, Snapshot snapshot)
Definition predicate.c:3920
#define SxactIsRolledBack(sxact)
Definition predicate.c:278
static SERIALIZABLEXACT * SavedSerializableXact
Definition predicate.c:444
#define SxactHasSummaryConflictOut(sxact)
Definition predicate.c:282
static void PredicateLockShmemAttach(void *arg)
Definition predicate.c:1327
void TransferPredicateLocksToHeapRelation(Relation relation)
Definition predicate.c:3052
static void CreateLocalPredicateLockHash(void)
Definition predicate.c:1869
#define SerialSlruCtl
Definition predicate.c:328
int max_predicate_locks_per_xact
Definition predicate.c:373
Snapshot GetSerializableTransactionSnapshot(Snapshot snapshot)
Definition predicate.c:1611
void * SerializableXactHandle
Definition predicate.h:39
#define RWConflictDataSize
#define SXACT_FLAG_DEFERRABLE_WAITING
#define SXACT_FLAG_SUMMARY_CONFLICT_IN
@ TWOPHASEPREDICATERECORD_XACT
@ TWOPHASEPREDICATERECORD_LOCK
#define FirstNormalSerCommitSeqNo
#define InvalidSerCommitSeqNo
@ PREDLOCKTAG_RELATION
@ PREDLOCKTAG_PAGE
@ PREDLOCKTAG_TUPLE
#define SXACT_FLAG_CONFLICT_OUT
#define PredXactListDataSize
#define SXACT_FLAG_READ_ONLY
#define SXACT_FLAG_DOOMED
#define GET_PREDICATELOCKTARGETTAG_DB(locktag)
#define GET_PREDICATELOCKTARGETTAG_RELATION(locktag)
#define RWConflictPoolHeaderDataSize
#define InvalidSerializableXact
#define SET_PREDICATELOCKTARGETTAG_PAGE(locktag, dboid, reloid, blocknum)
#define RecoverySerCommitSeqNo
struct RWConflictData * RWConflict
#define GET_PREDICATELOCKTARGETTAG_TYPE(locktag)
#define SET_PREDICATELOCKTARGETTAG_RELATION(locktag, dboid, reloid)
uint64 SerCommitSeqNo
#define SXACT_FLAG_ROLLED_BACK
#define SXACT_FLAG_COMMITTED
#define SXACT_FLAG_RO_UNSAFE
#define SXACT_FLAG_PREPARED
#define SET_PREDICATELOCKTARGETTAG_TUPLE(locktag, dboid, reloid, blocknum, offnum)
#define SXACT_FLAG_PARTIALLY_RELEASED
#define GET_PREDICATELOCKTARGETTAG_PAGE(locktag)
#define SXACT_FLAG_RO_SAFE
#define SXACT_FLAG_SUMMARY_CONFLICT_OUT
#define GET_PREDICATELOCKTARGETTAG_OFFSET(locktag)
static int fb(int x)
Snapshot GetSnapshotData(Snapshot snapshot)
Definition procarray.c:2114
bool ProcArrayInstallImportedXmin(TransactionId xmin, VirtualTransactionId *sourcevxid)
Definition procarray.c:2471
#define INVALID_PROC_NUMBER
Definition procnumber.h:26
#define RelationUsesLocalBuffers(relation)
Definition rel.h:648
bool ShmemAddrIsValid(const void *addr)
Definition shmem.c:850
Size add_size(Size s1, Size s2)
Definition shmem.c:1048
Size mul_size(Size s1, Size s2)
Definition shmem.c:1063
#define ShmemRequestHash(...)
Definition shmem.h:179
#define ShmemRequestStruct(...)
Definition shmem.h:176
int SimpleLruReadPage_ReadOnly(SlruDesc *ctl, int64 pageno, const void *opaque_data)
Definition slru.c:654
void SimpleLruTruncate(SlruDesc *ctl, int64 cutoffPage)
Definition slru.c:1458
int SimpleLruZeroPage(SlruDesc *ctl, int64 pageno)
Definition slru.c:397
void SimpleLruWriteAll(SlruDesc *ctl, bool allow_redirtied)
Definition slru.c:1372
int SimpleLruReadPage(SlruDesc *ctl, int64 pageno, bool write_ok, const void *opaque_data)
Definition slru.c:550
bool check_slru_buffers(const char *name, int *newval)
Definition slru.c:377
#define SlruPagePrecedesUnitTests(ctl, per_page)
Definition slru.h:233
#define SimpleLruRequest(...)
Definition slru.h:218
static LWLock * SimpleLruGetBankLock(SlruDesc *ctl, int64 pageno)
Definition slru.h:207
Snapshot GetTransactionSnapshot(void)
Definition snapmgr.c:272
#define IsMVCCSnapshot(snapshot)
Definition snapmgr.h:59
void ProcSendSignal(ProcNumber procNumber)
Definition proc.c:2027
PGPROC * MyProc
Definition proc.c:71
void ProcWaitForSignal(uint32 wait_event_info)
Definition proc.c:2015
Size keysize
Definition dynahash.c:241
Definition proc.h:179
SERIALIZABLEXACT * myXact
PREDICATELOCKTARGET * myTarget
PREDICATELOCKTARGETTAG tag
SerCommitSeqNo commitSeqNo
SERIALIZABLEXACT * element
SerCommitSeqNo LastSxactCommitSeqNo
SerCommitSeqNo CanPartialClearThrough
SERIALIZABLEXACT * OldCommittedSxact
SerCommitSeqNo HavePartialClearedThrough
TransactionId SxactGlobalXmin
Form_pg_index rd_index
Definition rel.h:192
Oid rd_id
Definition rel.h:113
RelFileLocator rd_locator
Definition rel.h:57
VirtualTransactionId vxid
SerCommitSeqNo lastCommitBeforeSnapshot
dlist_head possibleUnsafeConflicts
SerCommitSeqNo prepareSeqNo
SerCommitSeqNo commitSeqNo
union SERIALIZABLEXACT::@134 SeqNo
TransactionId finishedBefore
SerCommitSeqNo earliestOutConflictCommit
TransactionId headXid
Definition predicate.c:350
TransactionId tailXid
Definition predicate.c:351
ShmemRequestCallback request_fn
Definition shmem.h:133
TransactionId xmin
Definition snapshot.h:153
FullTransactionId nextXid
Definition transam.h:220
PREDICATELOCKTARGETTAG target
TwoPhasePredicateRecordType type
TwoPhasePredicateLockRecord lockRecord
union TwoPhasePredicateRecord::@135 data
TwoPhasePredicateXactRecord xactRecord
dlist_node * cur
Definition ilist.h:179
dlist_node * cur
Definition ilist.h:200
@ SYNC_HANDLER_NONE
Definition sync.h:42
static bool TransactionIdFollows(TransactionId id1, TransactionId id2)
Definition transam.h:297
#define FirstUnpinnedObjectId
Definition transam.h:196
#define InvalidTransactionId
Definition transam.h:31
static bool TransactionIdPrecedesOrEquals(TransactionId id1, TransactionId id2)
Definition transam.h:282
static bool TransactionIdFollowsOrEquals(TransactionId id1, TransactionId id2)
Definition transam.h:312
#define TransactionIdEquals(id1, id2)
Definition transam.h:43
#define XidFromFullTransactionId(x)
Definition transam.h:48
#define FirstNormalTransactionId
Definition transam.h:34
#define TransactionIdIsValid(xid)
Definition transam.h:41
static bool TransactionIdPrecedes(TransactionId id1, TransactionId id2)
Definition transam.h:263
void RegisterTwoPhaseRecord(TwoPhaseRmgrId rmid, uint16 info, const void *data, uint32 len)
Definition twophase.c:1277
int max_prepared_xacts
Definition twophase.c:118
#define TWOPHASE_RM_PREDICATELOCK_ID
TransamVariablesData * TransamVariables
Definition varsup.c:37
const char * name
bool XactDeferrable
Definition xact.c:87
bool XactReadOnly
Definition xact.c:84
TransactionId GetTopTransactionIdIfAny(void)
Definition xact.c:443
bool IsSubTransaction(void)
Definition xact.c:5095
bool TransactionIdIsCurrentTransactionId(TransactionId xid)
Definition xact.c:943
bool IsInParallelMode(void)
Definition xact.c:1119
#define IsolationIsSerializable()
Definition xact.h:53
bool RecoveryInProgress(void)
Definition xlog.c:6836