Skip to content

Commit e194f13

Browse files
committed
Add stack-overflow guards in set-operation planning.
create_plan_recurse lacked any stack depth check. This is not per our normal coding rules, but I'd supposed it was safe because earlier planner processing is more complex and presumably should eat more stack. But bug #15033 from Andrew Grossman shows this isn't true, at least not for queries having the form of a many-thousand-way INTERSECT stack. Further testing showed that recurse_set_operations is also capable of being crashed in this way, since it likewise will recurse to the bottom of a parsetree before calling any support functions that might themselves contain any stack checks. However, its stack consumption is only perhaps a third of create_plan_recurse's. It's possible that this particular problem with create_plan_recurse can only manifest in 9.6 and later, since before that we didn't build a Path tree for set operations. But having seen this example, I now have no faith in the proposition that create_plan_recurse doesn't need a stack check, so back-patch to all supported branches. Discussion: https://postgr.es/m/20180127050845.28812.58244@wrigleys.postgresql.org
1 parent b00e755 commit e194f13

File tree

2 files changed

+6
-0
lines changed

2 files changed

+6
-0
lines changed

src/backend/optimizer/plan/createplan.c

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -230,6 +230,9 @@ create_plan_recurse(PlannerInfo *root, Path *best_path)
230230
{
231231
Plan *plan;
232232

233+
/* Guard against stack overflow due to overly complex plans */
234+
check_stack_depth();
235+
233236
switch (best_path->pathtype)
234237
{
235238
case T_SeqScan:

src/backend/optimizer/prep/prepunion.c

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -220,6 +220,9 @@ recurse_set_operations(Node *setOp, PlannerInfo *root,
220220
int flag, List *refnames_tlist,
221221
List **sortClauses, double *pNumGroups)
222222
{
223+
/* Guard against stack overflow due to overly complex setop nests */
224+
check_stack_depth();
225+
223226
if (IsA(setOp, RangeTblRef))
224227
{
225228
RangeTblRef *rtr = (RangeTblRef *) setOp;

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy