Re: Cross-backend signals and administration (Was: Re: pg_terminate_backend for same-role)

Поиск
Список
Период
Сортировка
От Tom Lane
Тема Re: Cross-backend signals and administration (Was: Re: pg_terminate_backend for same-role)
Дата
Msg-id 27331.1332262105@sss.pgh.pa.us
обсуждение исходный текст
Ответ на Re: Cross-backend signals and administration (Was: Re: pg_terminate_backend for same-role)  (Robert Haas <robertmhaas@gmail.com>)
Ответы Re: Cross-backend signals and administration (Was: Re: pg_terminate_backend for same-role)
Список pgsql-hackers
Robert Haas <robertmhaas@gmail.com> writes:
> Well, I'm not sure it would save anything meaningful to read the PID
> after releasing the lock even if it were safe, so I'd be inclined to
> keep things simple.  But on further reflection I had us using the PID
> to find the target PGPROC in the first place, so we don't need to
> "remember" a value that we already know; that step is simply
> redundant.

I'm confused.  If the premise is that PID is untrustworthy as a process
ID, how does searching PGPROC make it more trustworthy?  The
hypothetical new owner of the PID could have gotten into PGPROC before
you begin to look.

What would make sense to me is to search PGPROC for some *other*
identifying property (and then set bit, remember PID, unlock, send
signal).  But it seems like the key point here is what are we going
to use as an identifying property.
        regards, tom lane


В списке pgsql-hackers по дате отправления:

Предыдущее
От: Robert Haas
Дата:
Сообщение: Re: Cross-backend signals and administration (Was: Re: pg_terminate_backend for same-role)
Следующее
От: "Atri Sharma"
Дата:
Сообщение: Re: Regarding column reordering project for GSoc 2012