From: | Michael Paquier <michael(at)paquier(dot)xyz> |
---|---|
To: | Steven Niu <niushiji(at)gmail(dot)com> |
Cc: | Mikhail Kot <mikhail(dot)kot(at)databricks(dot)com>, "pgsql-hackers(at)lists(dot)postgresql(dot)org" <pgsql-hackers(at)lists(dot)postgresql(dot)org>, "to(at)myrrc(dot)dev" <to(at)myrrc(dot)dev> |
Subject: | Re: 回复: Fix segfault while accessing half-initialized hash table in pgstat_shmem.c |
Date: | 2025-09-03 09:43:20 |
Message-ID: | aLgNuGcQ8NAANUp7@paquier.xyz |
Views: | Whole Thread | Raw Message | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
On Wed, Sep 03, 2025 at 07:22:00AM +0000, Steven Niu wrote:
> So unless dsa_allocate() can ensure never returns InvalidDsaPointer,
> there is risk of SegV. In fact the function dsa_allocate() does
> return InvalidDsaPointer in some cases.
>
> So, maybe should we add pointer check in all places where dsa_get_address is called. Comments?
dsa_allocate() calls dsa_allocate_extended() without DSA_ALLOC_NO_OOM,
hence on allocation failure the code does a ereport(ERROR). It would
be a problem to not check the result if DSA_ALLOC_NO_OOM is used.
The problem dealt with here is different, as far as I understand: we
set some data in shared memory without considering that the DSA
allocation could fail, leaving shared memory in an inconsistent state
when an allocation failure occurs. The problem is not in the
allocation failure in itself, but in the dependency that we have
between the state in shared memory and the allocation attempt for this
pgstats code path.
--
Michael
From | Date | Subject | |
---|---|---|---|
Next Message | Antonin Houska | 2025-09-03 09:49:32 | Unexpected changes of CurrentResourceOwner and CurrentMemoryContext |
Previous Message | Richard Guo | 2025-09-03 09:39:29 | Re: Generate GUC tables from .dat file |