From: | Robert Haas <robertmhaas(at)gmail(dot)com> |
---|---|
To: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
Cc: | daveg <daveg(at)sonic(dot)net>, pgsql-hackers(at)postgresql(dot)org |
Subject: | Re: FATAL: lock AccessShareLock on object 0/1260/0 is already held |
Date: | 2011-09-07 22:17:30 |
Message-ID: | CA+TgmobWEW1-_e-x9m7BJ5nbDRJ58hO80vM8yo1YbTZ9dajFUw@mail.gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
On Wed, Sep 7, 2011 at 4:55 PM, Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> wrote:
> Yeah, and for that matter it seems to let VACUUM off the hook too.
> If we assume that the reported object ID is non-corrupt (and if it's
> always the same, that seems like the way to bet) then this is a lock
> on pg_authid.
>
> Hmmm ... could the pathway involve an error exit from client
> authentication? We're still finding bugs in the 9.0 rewrite of
> auth-time database access.
Well, according to Dave's report upthread, it's not only this one relation:
DG> The recent errors are:
DG> lock AccessShareLock on object 16403/2615/0 is already held
DG> which is for pg_namespace in database c23.
I thought about an error exit from client authentication, and that's a
somewhat appealing explanation, but I can't quite see why we wouldn't
clean up there the same as anywhere else. The whole mechanism feels a
bit rickety to me - we don't actually release locks; we just abort the
transaction and *assume* that will cause locks to get released. And
it should. But there's a bit more action-at-a-distance there than I'd
ideally like.
--
Robert Haas
EnterpriseDB: http://www.enterprisedb.com
The Enterprise PostgreSQL Company
From | Date | Subject | |
---|---|---|---|
Next Message | daveg | 2011-09-07 22:23:26 | Re: FATAL: lock AccessShareLock on object 0/1260/0 is already held |
Previous Message | Alvaro Herrera | 2011-09-07 21:24:53 | Re: [PATCH] Log crashed backend's query (activity string) |