Line data Source code
1 : /*-------------------------------------------------------------------------
2 : *
3 : * verify_heapam.c
4 : * Functions to check postgresql heap relations for corruption
5 : *
6 : * Copyright (c) 2016-2026, PostgreSQL Global Development Group
7 : *
8 : * contrib/amcheck/verify_heapam.c
9 : *-------------------------------------------------------------------------
10 : */
11 : #include "postgres.h"
12 :
13 : #include "access/detoast.h"
14 : #include "access/genam.h"
15 : #include "access/heaptoast.h"
16 : #include "access/multixact.h"
17 : #include "access/relation.h"
18 : #include "access/table.h"
19 : #include "access/toast_internals.h"
20 : #include "access/visibilitymap.h"
21 : #include "access/xact.h"
22 : #include "catalog/pg_am.h"
23 : #include "catalog/pg_class.h"
24 : #include "funcapi.h"
25 : #include "miscadmin.h"
26 : #include "storage/bufmgr.h"
27 : #include "storage/lwlock.h"
28 : #include "storage/procarray.h"
29 : #include "storage/read_stream.h"
30 : #include "utils/builtins.h"
31 : #include "utils/fmgroids.h"
32 : #include "utils/rel.h"
33 : #include "utils/tuplestore.h"
34 :
35 303 : PG_FUNCTION_INFO_V1(verify_heapam);
36 :
37 : /* The number of columns in tuples returned by verify_heapam */
38 : #define HEAPCHECK_RELATION_COLS 4
39 :
40 : /* The largest valid toast va_rawsize */
41 : #define VARLENA_SIZE_LIMIT 0x3FFFFFFF
42 :
43 : /*
44 : * Despite the name, we use this for reporting problems with both XIDs and
45 : * MXIDs.
46 : */
47 : typedef enum XidBoundsViolation
48 : {
49 : XID_INVALID,
50 : XID_IN_FUTURE,
51 : XID_PRECEDES_CLUSTERMIN,
52 : XID_PRECEDES_RELMIN,
53 : XID_BOUNDS_OK,
54 : } XidBoundsViolation;
55 :
56 : typedef enum XidCommitStatus
57 : {
58 : XID_COMMITTED,
59 : XID_IS_CURRENT_XID,
60 : XID_IN_PROGRESS,
61 : XID_ABORTED,
62 : } XidCommitStatus;
63 :
64 : typedef enum SkipPages
65 : {
66 : SKIP_PAGES_ALL_FROZEN,
67 : SKIP_PAGES_ALL_VISIBLE,
68 : SKIP_PAGES_NONE,
69 : } SkipPages;
70 :
71 : /*
72 : * Struct holding information about a toasted attribute sufficient to both
73 : * check the toasted attribute and, if found to be corrupt, to report where it
74 : * was encountered in the main table.
75 : */
76 : typedef struct ToastedAttribute
77 : {
78 : varatt_external toast_pointer;
79 : BlockNumber blkno; /* block in main table */
80 : OffsetNumber offnum; /* offset in main table */
81 : AttrNumber attnum; /* attribute in main table */
82 : } ToastedAttribute;
83 :
84 : /*
85 : * Struct holding the running context information during
86 : * a lifetime of a verify_heapam execution.
87 : */
88 : typedef struct HeapCheckContext
89 : {
90 : /*
91 : * Cached copies of values from TransamVariables and computed values from
92 : * them.
93 : */
94 : FullTransactionId next_fxid; /* TransamVariables->nextXid */
95 : TransactionId next_xid; /* 32-bit version of next_fxid */
96 : TransactionId oldest_xid; /* TransamVariables->oldestXid */
97 : FullTransactionId oldest_fxid; /* 64-bit version of oldest_xid, computed
98 : * relative to next_fxid */
99 : TransactionId safe_xmin; /* this XID and newer ones can't become
100 : * all-visible while we're running */
101 :
102 : /*
103 : * Cached copy of value from MultiXactState
104 : */
105 : MultiXactId next_mxact; /* MultiXactState->nextMXact */
106 : MultiXactId oldest_mxact; /* MultiXactState->oldestMultiXactId */
107 :
108 : /*
109 : * Cached copies of the most recently checked xid and its status.
110 : */
111 : TransactionId cached_xid;
112 : XidCommitStatus cached_status;
113 :
114 : /* Values concerning the heap relation being checked */
115 : Relation rel;
116 : TransactionId relfrozenxid;
117 : FullTransactionId relfrozenfxid;
118 : TransactionId relminmxid;
119 : Relation toast_rel;
120 : Relation *toast_indexes;
121 : Relation valid_toast_index;
122 : int num_toast_indexes;
123 :
124 : /*
125 : * Values for iterating over pages in the relation. `blkno` is the most
126 : * recent block in the buffer yielded by the read stream API.
127 : */
128 : BlockNumber blkno;
129 : BufferAccessStrategy bstrategy;
130 : Buffer buffer;
131 : Page page;
132 :
133 : /* Values for iterating over tuples within a page */
134 : OffsetNumber offnum;
135 : ItemId itemid;
136 : uint16 lp_len;
137 : uint16 lp_off;
138 : HeapTupleHeader tuphdr;
139 : int natts;
140 :
141 : /* Values for iterating over attributes within the tuple */
142 : uint32 offset; /* offset in tuple data */
143 : AttrNumber attnum;
144 :
145 : /* True if tuple's xmax makes it eligible for pruning */
146 : bool tuple_could_be_pruned;
147 :
148 : /*
149 : * List of ToastedAttribute structs for toasted attributes which are not
150 : * eligible for pruning and should be checked
151 : */
152 : List *toasted_attributes;
153 :
154 : /* Whether verify_heapam has yet encountered any corrupt tuples */
155 : bool is_corrupt;
156 :
157 : /* The descriptor and tuplestore for verify_heapam's result tuples */
158 : TupleDesc tupdesc;
159 : Tuplestorestate *tupstore;
160 : } HeapCheckContext;
161 :
162 : /*
163 : * The per-relation data provided to the read stream API for heap amcheck to
164 : * use in its callback for the SKIP_PAGES_ALL_FROZEN and
165 : * SKIP_PAGES_ALL_VISIBLE options.
166 : */
167 : typedef struct HeapCheckReadStreamData
168 : {
169 : /*
170 : * `range` is used by all SkipPages options. SKIP_PAGES_NONE uses the
171 : * default read stream callback, block_range_read_stream_cb(), which takes
172 : * a BlockRangeReadStreamPrivate as its callback_private_data. `range`
173 : * keeps track of the current block number across
174 : * read_stream_next_buffer() invocations.
175 : */
176 : BlockRangeReadStreamPrivate range;
177 : SkipPages skip_option;
178 : Relation rel;
179 : Buffer *vmbuffer;
180 : } HeapCheckReadStreamData;
181 :
182 :
183 : /* Internal implementation */
184 : static BlockNumber heapcheck_read_stream_next_unskippable(ReadStream *stream,
185 : void *callback_private_data,
186 : void *per_buffer_data);
187 :
188 : static void check_tuple(HeapCheckContext *ctx,
189 : bool *xmin_commit_status_ok,
190 : XidCommitStatus *xmin_commit_status);
191 : static void check_toast_tuple(HeapTuple toasttup, HeapCheckContext *ctx,
192 : ToastedAttribute *ta, int32 *expected_chunk_seq,
193 : uint32 extsize);
194 :
195 : static bool check_tuple_attribute(HeapCheckContext *ctx);
196 : static void check_toasted_attribute(HeapCheckContext *ctx,
197 : ToastedAttribute *ta);
198 :
199 : static bool check_tuple_header(HeapCheckContext *ctx);
200 : static bool check_tuple_visibility(HeapCheckContext *ctx,
201 : bool *xmin_commit_status_ok,
202 : XidCommitStatus *xmin_commit_status);
203 :
204 : static void report_corruption(HeapCheckContext *ctx, char *msg);
205 : static void report_toast_corruption(HeapCheckContext *ctx,
206 : ToastedAttribute *ta, char *msg);
207 : static FullTransactionId FullTransactionIdFromXidAndCtx(TransactionId xid,
208 : const HeapCheckContext *ctx);
209 : static void update_cached_xid_range(HeapCheckContext *ctx);
210 : static void update_cached_mxid_range(HeapCheckContext *ctx);
211 : static XidBoundsViolation check_mxid_in_range(MultiXactId mxid,
212 : HeapCheckContext *ctx);
213 : static XidBoundsViolation check_mxid_valid_in_rel(MultiXactId mxid,
214 : HeapCheckContext *ctx);
215 : static XidBoundsViolation get_xid_status(TransactionId xid,
216 : HeapCheckContext *ctx,
217 : XidCommitStatus *status);
218 :
219 : /*
220 : * Scan and report corruption in heap pages, optionally reconciling toasted
221 : * attributes with entries in the associated toast table. Intended to be
222 : * called from SQL with the following parameters:
223 : *
224 : * relation:
225 : * The Oid of the heap relation to be checked.
226 : *
227 : * on_error_stop:
228 : * Whether to stop at the end of the first page for which errors are
229 : * detected. Note that multiple rows may be returned.
230 : *
231 : * check_toast:
232 : * Whether to check each toasted attribute against the toast table to
233 : * verify that it can be found there.
234 : *
235 : * skip:
236 : * What kinds of pages in the heap relation should be skipped. Valid
237 : * options are "all-visible", "all-frozen", and "none".
238 : *
239 : * Returns to the SQL caller a set of tuples, each containing the location
240 : * and a description of a corruption found in the heap.
241 : *
242 : * This code goes to some trouble to avoid crashing the server even if the
243 : * table pages are badly corrupted, but it's probably not perfect. If
244 : * check_toast is true, we'll use regular index lookups to try to fetch TOAST
245 : * tuples, which can certainly cause crashes if the right kind of corruption
246 : * exists in the toast table or index. No matter what parameters you pass,
247 : * we can't protect against crashes that might occur trying to look up the
248 : * commit status of transaction IDs (though we avoid trying to do such lookups
249 : * for transaction IDs that can't legally appear in the table).
250 : */
251 : Datum
252 3573 : verify_heapam(PG_FUNCTION_ARGS)
253 : {
254 3573 : ReturnSetInfo *rsinfo = (ReturnSetInfo *) fcinfo->resultinfo;
255 : HeapCheckContext ctx;
256 3573 : Buffer vmbuffer = InvalidBuffer;
257 : Oid relid;
258 : bool on_error_stop;
259 : bool check_toast;
260 3573 : SkipPages skip_option = SKIP_PAGES_NONE;
261 : BlockNumber first_block;
262 : BlockNumber last_block;
263 : BlockNumber nblocks;
264 : const char *skip;
265 : ReadStream *stream;
266 : int stream_flags;
267 : ReadStreamBlockNumberCB stream_cb;
268 : void *stream_data;
269 : HeapCheckReadStreamData stream_skip_data;
270 :
271 : /* Check supplied arguments */
272 3573 : if (PG_ARGISNULL(0))
273 0 : ereport(ERROR,
274 : (errcode(ERRCODE_INVALID_PARAMETER_VALUE),
275 : errmsg("relation cannot be null")));
276 3573 : relid = PG_GETARG_OID(0);
277 :
278 3573 : if (PG_ARGISNULL(1))
279 0 : ereport(ERROR,
280 : (errcode(ERRCODE_INVALID_PARAMETER_VALUE),
281 : errmsg("on_error_stop cannot be null")));
282 3573 : on_error_stop = PG_GETARG_BOOL(1);
283 :
284 3573 : if (PG_ARGISNULL(2))
285 0 : ereport(ERROR,
286 : (errcode(ERRCODE_INVALID_PARAMETER_VALUE),
287 : errmsg("check_toast cannot be null")));
288 3573 : check_toast = PG_GETARG_BOOL(2);
289 :
290 3573 : if (PG_ARGISNULL(3))
291 0 : ereport(ERROR,
292 : (errcode(ERRCODE_INVALID_PARAMETER_VALUE),
293 : errmsg("skip cannot be null")));
294 3573 : skip = text_to_cstring(PG_GETARG_TEXT_PP(3));
295 3573 : if (pg_strcasecmp(skip, "all-visible") == 0)
296 85 : skip_option = SKIP_PAGES_ALL_VISIBLE;
297 3488 : else if (pg_strcasecmp(skip, "all-frozen") == 0)
298 87 : skip_option = SKIP_PAGES_ALL_FROZEN;
299 3401 : else if (pg_strcasecmp(skip, "none") == 0)
300 3400 : skip_option = SKIP_PAGES_NONE;
301 : else
302 1 : ereport(ERROR,
303 : (errcode(ERRCODE_INVALID_PARAMETER_VALUE),
304 : errmsg("invalid skip option"),
305 : errhint("Valid skip options are \"all-visible\", \"all-frozen\", and \"none\".")));
306 :
307 3572 : memset(&ctx, 0, sizeof(HeapCheckContext));
308 3572 : ctx.cached_xid = InvalidTransactionId;
309 3572 : ctx.toasted_attributes = NIL;
310 :
311 : /*
312 : * Any xmin newer than the xmin of our snapshot can't become all-visible
313 : * while we're running.
314 : */
315 3572 : ctx.safe_xmin = GetTransactionSnapshot()->xmin;
316 :
317 : /*
318 : * If we report corruption when not examining some individual attribute,
319 : * we need attnum to be reported as NULL. Set that up before any
320 : * corruption reporting might happen.
321 : */
322 3572 : ctx.attnum = -1;
323 :
324 : /* Construct the tuplestore and tuple descriptor */
325 3572 : InitMaterializedSRF(fcinfo, 0);
326 3572 : ctx.tupdesc = rsinfo->setDesc;
327 3572 : ctx.tupstore = rsinfo->setResult;
328 :
329 : /* Open relation, check relkind and access method */
330 3572 : ctx.rel = relation_open(relid, AccessShareLock);
331 :
332 : /*
333 : * Check that a relation's relkind and access method are both supported.
334 : */
335 3572 : if (!RELKIND_HAS_TABLE_AM(ctx.rel->rd_rel->relkind) &&
336 196 : ctx.rel->rd_rel->relkind != RELKIND_SEQUENCE)
337 4 : ereport(ERROR,
338 : (errcode(ERRCODE_WRONG_OBJECT_TYPE),
339 : errmsg("cannot check relation \"%s\"",
340 : RelationGetRelationName(ctx.rel)),
341 : errdetail_relkind_not_supported(ctx.rel->rd_rel->relkind)));
342 :
343 : /*
344 : * Sequences always use heap AM, but they don't show that in the catalogs.
345 : * Other relkinds might be using a different AM, so check.
346 : */
347 3568 : if (ctx.rel->rd_rel->relkind != RELKIND_SEQUENCE &&
348 3376 : ctx.rel->rd_rel->relam != HEAP_TABLE_AM_OID)
349 0 : ereport(ERROR,
350 : (errcode(ERRCODE_FEATURE_NOT_SUPPORTED),
351 : errmsg("only heap AM is supported")));
352 :
353 : /*
354 : * Early exit for unlogged relations during recovery. These will have no
355 : * relation fork, so there won't be anything to check. We behave as if
356 : * the relation is empty.
357 : */
358 3568 : if (ctx.rel->rd_rel->relpersistence == RELPERSISTENCE_UNLOGGED &&
359 0 : RecoveryInProgress())
360 : {
361 0 : ereport(DEBUG1,
362 : (errcode(ERRCODE_READ_ONLY_SQL_TRANSACTION),
363 : errmsg("cannot verify unlogged relation \"%s\" during recovery, skipping",
364 : RelationGetRelationName(ctx.rel))));
365 0 : relation_close(ctx.rel, AccessShareLock);
366 0 : PG_RETURN_NULL();
367 : }
368 :
369 : /* Early exit if the relation is empty */
370 3568 : nblocks = RelationGetNumberOfBlocks(ctx.rel);
371 3551 : if (!nblocks)
372 : {
373 2073 : relation_close(ctx.rel, AccessShareLock);
374 2073 : PG_RETURN_NULL();
375 : }
376 :
377 1478 : ctx.bstrategy = GetAccessStrategy(BAS_BULKREAD);
378 1478 : ctx.buffer = InvalidBuffer;
379 1478 : ctx.page = NULL;
380 :
381 : /* Validate block numbers, or handle nulls. */
382 1478 : if (PG_ARGISNULL(4))
383 1354 : first_block = 0;
384 : else
385 : {
386 124 : int64 fb = PG_GETARG_INT64(4);
387 :
388 124 : if (fb < 0 || fb >= nblocks)
389 1 : ereport(ERROR,
390 : (errcode(ERRCODE_INVALID_PARAMETER_VALUE),
391 : errmsg("starting block number must be between 0 and %u",
392 : nblocks - 1)));
393 123 : first_block = (BlockNumber) fb;
394 : }
395 1477 : if (PG_ARGISNULL(5))
396 1354 : last_block = nblocks - 1;
397 : else
398 : {
399 123 : int64 lb = PG_GETARG_INT64(5);
400 :
401 123 : if (lb < 0 || lb >= nblocks)
402 1 : ereport(ERROR,
403 : (errcode(ERRCODE_INVALID_PARAMETER_VALUE),
404 : errmsg("ending block number must be between 0 and %u",
405 : nblocks - 1)));
406 122 : last_block = (BlockNumber) lb;
407 : }
408 :
409 : /* Optionally open the toast relation, if any. */
410 1476 : if (ctx.rel->rd_rel->reltoastrelid && check_toast)
411 696 : {
412 : int offset;
413 :
414 : /* Main relation has associated toast relation */
415 696 : ctx.toast_rel = table_open(ctx.rel->rd_rel->reltoastrelid,
416 : AccessShareLock);
417 696 : offset = toast_open_indexes(ctx.toast_rel,
418 : AccessShareLock,
419 : &(ctx.toast_indexes),
420 : &(ctx.num_toast_indexes));
421 696 : ctx.valid_toast_index = ctx.toast_indexes[offset];
422 : }
423 : else
424 : {
425 : /*
426 : * Main relation has no associated toast relation, or we're
427 : * intentionally skipping it.
428 : */
429 780 : ctx.toast_rel = NULL;
430 780 : ctx.toast_indexes = NULL;
431 780 : ctx.num_toast_indexes = 0;
432 : }
433 :
434 1476 : update_cached_xid_range(&ctx);
435 1476 : update_cached_mxid_range(&ctx);
436 1476 : ctx.relfrozenxid = ctx.rel->rd_rel->relfrozenxid;
437 1476 : ctx.relfrozenfxid = FullTransactionIdFromXidAndCtx(ctx.relfrozenxid, &ctx);
438 1476 : ctx.relminmxid = ctx.rel->rd_rel->relminmxid;
439 :
440 1476 : if (TransactionIdIsNormal(ctx.relfrozenxid))
441 1284 : ctx.oldest_xid = ctx.relfrozenxid;
442 :
443 : /* Now that `ctx` is set up, set up the read stream */
444 1476 : stream_skip_data.range.current_blocknum = first_block;
445 1476 : stream_skip_data.range.last_exclusive = last_block + 1;
446 1476 : stream_skip_data.skip_option = skip_option;
447 1476 : stream_skip_data.rel = ctx.rel;
448 1476 : stream_skip_data.vmbuffer = &vmbuffer;
449 :
450 1476 : if (skip_option == SKIP_PAGES_NONE)
451 : {
452 : /*
453 : * It is safe to use batchmode as block_range_read_stream_cb takes no
454 : * locks.
455 : */
456 1310 : stream_cb = block_range_read_stream_cb;
457 1310 : stream_flags = READ_STREAM_SEQUENTIAL |
458 : READ_STREAM_FULL |
459 : READ_STREAM_USE_BATCHING;
460 1310 : stream_data = &stream_skip_data.range;
461 : }
462 : else
463 : {
464 : /*
465 : * It would not be safe to naively use batchmode, as
466 : * heapcheck_read_stream_next_unskippable takes locks. It shouldn't be
467 : * too hard to convert though.
468 : */
469 166 : stream_cb = heapcheck_read_stream_next_unskippable;
470 166 : stream_flags = READ_STREAM_DEFAULT;
471 166 : stream_data = &stream_skip_data;
472 : }
473 :
474 1476 : stream = read_stream_begin_relation(stream_flags,
475 : ctx.bstrategy,
476 : ctx.rel,
477 : MAIN_FORKNUM,
478 : stream_cb,
479 : stream_data,
480 : 0);
481 :
482 13710 : while ((ctx.buffer = read_stream_next_buffer(stream, NULL)) != InvalidBuffer)
483 : {
484 : OffsetNumber maxoff;
485 : OffsetNumber predecessor[MaxOffsetNumber];
486 : OffsetNumber successor[MaxOffsetNumber];
487 : bool lp_valid[MaxOffsetNumber];
488 : bool xmin_commit_status_ok[MaxOffsetNumber];
489 : XidCommitStatus xmin_commit_status[MaxOffsetNumber];
490 :
491 12237 : CHECK_FOR_INTERRUPTS();
492 :
493 12237 : memset(predecessor, 0, sizeof(OffsetNumber) * MaxOffsetNumber);
494 :
495 : /* Lock the next page. */
496 : Assert(BufferIsValid(ctx.buffer));
497 12237 : LockBuffer(ctx.buffer, BUFFER_LOCK_SHARE);
498 :
499 12237 : ctx.blkno = BufferGetBlockNumber(ctx.buffer);
500 12237 : ctx.page = BufferGetPage(ctx.buffer);
501 :
502 : /* Perform tuple checks */
503 12237 : maxoff = PageGetMaxOffsetNumber(ctx.page);
504 589219 : for (ctx.offnum = FirstOffsetNumber; ctx.offnum <= maxoff;
505 576982 : ctx.offnum = OffsetNumberNext(ctx.offnum))
506 : {
507 : BlockNumber nextblkno;
508 : OffsetNumber nextoffnum;
509 :
510 576982 : successor[ctx.offnum] = InvalidOffsetNumber;
511 576982 : lp_valid[ctx.offnum] = false;
512 576982 : xmin_commit_status_ok[ctx.offnum] = false;
513 576982 : ctx.itemid = PageGetItemId(ctx.page, ctx.offnum);
514 :
515 : /* Skip over unused/dead line pointers */
516 576982 : if (!ItemIdIsUsed(ctx.itemid) || ItemIdIsDead(ctx.itemid))
517 7752 : continue;
518 :
519 : /*
520 : * If this line pointer has been redirected, check that it
521 : * redirects to a valid offset within the line pointer array
522 : */
523 569230 : if (ItemIdIsRedirected(ctx.itemid))
524 5169 : {
525 5190 : OffsetNumber rdoffnum = ItemIdGetRedirect(ctx.itemid);
526 : ItemId rditem;
527 :
528 5190 : if (rdoffnum < FirstOffsetNumber)
529 : {
530 6 : report_corruption(&ctx,
531 : psprintf("line pointer redirection to item at offset %d precedes minimum offset %d",
532 : rdoffnum,
533 : FirstOffsetNumber));
534 6 : continue;
535 : }
536 5184 : if (rdoffnum > maxoff)
537 : {
538 14 : report_corruption(&ctx,
539 : psprintf("line pointer redirection to item at offset %d exceeds maximum offset %d",
540 : rdoffnum,
541 : maxoff));
542 14 : continue;
543 : }
544 :
545 : /*
546 : * Since we've checked that this redirect points to a line
547 : * pointer between FirstOffsetNumber and maxoff, it should now
548 : * be safe to fetch the referenced line pointer. We expect it
549 : * to be LP_NORMAL; if not, that's corruption.
550 : */
551 5170 : rditem = PageGetItemId(ctx.page, rdoffnum);
552 5170 : if (!ItemIdIsUsed(rditem))
553 : {
554 0 : report_corruption(&ctx,
555 : psprintf("redirected line pointer points to an unused item at offset %d",
556 : rdoffnum));
557 0 : continue;
558 : }
559 5170 : else if (ItemIdIsDead(rditem))
560 : {
561 0 : report_corruption(&ctx,
562 : psprintf("redirected line pointer points to a dead item at offset %d",
563 : rdoffnum));
564 0 : continue;
565 : }
566 5170 : else if (ItemIdIsRedirected(rditem))
567 : {
568 1 : report_corruption(&ctx,
569 : psprintf("redirected line pointer points to another redirected line pointer at offset %d",
570 : rdoffnum));
571 1 : continue;
572 : }
573 :
574 : /*
575 : * Record the fact that this line pointer has passed basic
576 : * sanity checking, and also the offset number to which it
577 : * points.
578 : */
579 5169 : lp_valid[ctx.offnum] = true;
580 5169 : successor[ctx.offnum] = rdoffnum;
581 5169 : continue;
582 : }
583 :
584 : /* Sanity-check the line pointer's offset and length values */
585 564040 : ctx.lp_len = ItemIdGetLength(ctx.itemid);
586 564040 : ctx.lp_off = ItemIdGetOffset(ctx.itemid);
587 :
588 564040 : if (ctx.lp_off != MAXALIGN(ctx.lp_off))
589 : {
590 6 : report_corruption(&ctx,
591 : psprintf("line pointer to page offset %u is not maximally aligned",
592 6 : ctx.lp_off));
593 6 : continue;
594 : }
595 564034 : if (ctx.lp_len < MAXALIGN(SizeofHeapTupleHeader))
596 : {
597 12 : report_corruption(&ctx,
598 : psprintf("line pointer length %u is less than the minimum tuple header size %u",
599 12 : ctx.lp_len,
600 : (unsigned) MAXALIGN(SizeofHeapTupleHeader)));
601 12 : continue;
602 : }
603 564022 : if (ctx.lp_off + ctx.lp_len > BLCKSZ)
604 : {
605 14 : report_corruption(&ctx,
606 : psprintf("line pointer to page offset %u with length %u ends beyond maximum page offset %d",
607 14 : ctx.lp_off,
608 14 : ctx.lp_len,
609 : BLCKSZ));
610 14 : continue;
611 : }
612 :
613 : /* It should be safe to examine the tuple's header, at least */
614 564008 : lp_valid[ctx.offnum] = true;
615 564008 : ctx.tuphdr = (HeapTupleHeader) PageGetItem(ctx.page, ctx.itemid);
616 564008 : ctx.natts = HeapTupleHeaderGetNatts(ctx.tuphdr);
617 :
618 : /* Ok, ready to check this next tuple */
619 564008 : check_tuple(&ctx,
620 564008 : &xmin_commit_status_ok[ctx.offnum],
621 564008 : &xmin_commit_status[ctx.offnum]);
622 :
623 : /*
624 : * If the CTID field of this tuple seems to point to another tuple
625 : * on the same page, record that tuple as the successor of this
626 : * one.
627 : */
628 564008 : nextblkno = ItemPointerGetBlockNumber(&(ctx.tuphdr)->t_ctid);
629 564008 : nextoffnum = ItemPointerGetOffsetNumber(&(ctx.tuphdr)->t_ctid);
630 564008 : if (nextblkno == ctx.blkno && nextoffnum != ctx.offnum &&
631 176 : nextoffnum >= FirstOffsetNumber && nextoffnum <= maxoff)
632 176 : successor[ctx.offnum] = nextoffnum;
633 : }
634 :
635 : /*
636 : * Update chain validation. Check each line pointer that's got a valid
637 : * successor against that successor.
638 : */
639 12237 : ctx.attnum = -1;
640 589219 : for (ctx.offnum = FirstOffsetNumber; ctx.offnum <= maxoff;
641 576982 : ctx.offnum = OffsetNumberNext(ctx.offnum))
642 : {
643 : ItemId curr_lp;
644 : ItemId next_lp;
645 : HeapTupleHeader curr_htup;
646 : HeapTupleHeader next_htup;
647 : TransactionId curr_xmin;
648 : TransactionId curr_xmax;
649 : TransactionId next_xmin;
650 576982 : OffsetNumber nextoffnum = successor[ctx.offnum];
651 :
652 : /*
653 : * The current line pointer may not have a successor, either
654 : * because it's not valid or because it didn't point to anything.
655 : * In either case, we have to give up.
656 : *
657 : * If the current line pointer does point to something, it's
658 : * possible that the target line pointer isn't valid. We have to
659 : * give up in that case, too.
660 : */
661 576982 : if (nextoffnum == InvalidOffsetNumber || !lp_valid[nextoffnum])
662 571637 : continue;
663 :
664 : /* We have two valid line pointers that we can examine. */
665 5345 : curr_lp = PageGetItemId(ctx.page, ctx.offnum);
666 5345 : next_lp = PageGetItemId(ctx.page, nextoffnum);
667 :
668 : /* Handle the cases where the current line pointer is a redirect. */
669 5345 : if (ItemIdIsRedirected(curr_lp))
670 : {
671 : /*
672 : * We should not have set successor[ctx.offnum] to a value
673 : * other than InvalidOffsetNumber unless that line pointer is
674 : * LP_NORMAL.
675 : */
676 : Assert(ItemIdIsNormal(next_lp));
677 :
678 : /* Can only redirect to a HOT tuple. */
679 5169 : next_htup = (HeapTupleHeader) PageGetItem(ctx.page, next_lp);
680 5169 : if (!HeapTupleHeaderIsHeapOnly(next_htup))
681 : {
682 1 : report_corruption(&ctx,
683 : psprintf("redirected line pointer points to a non-heap-only tuple at offset %d",
684 : nextoffnum));
685 : }
686 :
687 : /* HOT chains should not intersect. */
688 5169 : if (predecessor[nextoffnum] != InvalidOffsetNumber)
689 : {
690 1 : report_corruption(&ctx,
691 : psprintf("redirect line pointer points to offset %d, but offset %d also points there",
692 1 : nextoffnum, predecessor[nextoffnum]));
693 1 : continue;
694 : }
695 :
696 : /*
697 : * This redirect and the tuple to which it points seem to be
698 : * part of an update chain.
699 : */
700 5168 : predecessor[nextoffnum] = ctx.offnum;
701 5168 : continue;
702 : }
703 :
704 : /*
705 : * If the next line pointer is a redirect, or if it's a tuple but
706 : * the XMAX of this tuple doesn't match the XMIN of the next
707 : * tuple, then the two aren't part of the same update chain and
708 : * there is nothing more to do.
709 : */
710 176 : if (ItemIdIsRedirected(next_lp))
711 0 : continue;
712 176 : curr_htup = (HeapTupleHeader) PageGetItem(ctx.page, curr_lp);
713 176 : curr_xmax = HeapTupleHeaderGetUpdateXid(curr_htup);
714 176 : next_htup = (HeapTupleHeader) PageGetItem(ctx.page, next_lp);
715 176 : next_xmin = HeapTupleHeaderGetXmin(next_htup);
716 176 : if (!TransactionIdIsValid(curr_xmax) ||
717 : !TransactionIdEquals(curr_xmax, next_xmin))
718 4 : continue;
719 :
720 : /* HOT chains should not intersect. */
721 172 : if (predecessor[nextoffnum] != InvalidOffsetNumber)
722 : {
723 1 : report_corruption(&ctx,
724 : psprintf("tuple points to new version at offset %d, but offset %d also points there",
725 1 : nextoffnum, predecessor[nextoffnum]));
726 1 : continue;
727 : }
728 :
729 : /*
730 : * This tuple and the tuple to which it points seem to be part of
731 : * an update chain.
732 : */
733 171 : predecessor[nextoffnum] = ctx.offnum;
734 :
735 : /*
736 : * If the current tuple is marked as HOT-updated, then the next
737 : * tuple should be marked as a heap-only tuple. Conversely, if the
738 : * current tuple isn't marked as HOT-updated, then the next tuple
739 : * shouldn't be marked as a heap-only tuple.
740 : *
741 : * NB: Can't use HeapTupleHeaderIsHotUpdated() as it checks if
742 : * hint bits indicate xmin/xmax aborted.
743 : */
744 172 : if (!(curr_htup->t_infomask2 & HEAP_HOT_UPDATED) &&
745 1 : HeapTupleHeaderIsHeapOnly(next_htup))
746 : {
747 1 : report_corruption(&ctx,
748 : psprintf("non-heap-only update produced a heap-only tuple at offset %d",
749 : nextoffnum));
750 : }
751 171 : if ((curr_htup->t_infomask2 & HEAP_HOT_UPDATED) &&
752 170 : !HeapTupleHeaderIsHeapOnly(next_htup))
753 : {
754 1 : report_corruption(&ctx,
755 : psprintf("heap-only update produced a non-heap only tuple at offset %d",
756 : nextoffnum));
757 : }
758 :
759 : /*
760 : * If the current tuple's xmin is still in progress but the
761 : * successor tuple's xmin is committed, that's corruption.
762 : *
763 : * NB: We recheck the commit status of the current tuple's xmin
764 : * here, because it might have committed after we checked it and
765 : * before we checked the commit status of the successor tuple's
766 : * xmin. This should be safe because the xmin itself can't have
767 : * changed, only its commit status.
768 : */
769 171 : curr_xmin = HeapTupleHeaderGetXmin(curr_htup);
770 171 : if (xmin_commit_status_ok[ctx.offnum] &&
771 171 : xmin_commit_status[ctx.offnum] == XID_IN_PROGRESS &&
772 1 : xmin_commit_status_ok[nextoffnum] &&
773 2 : xmin_commit_status[nextoffnum] == XID_COMMITTED &&
774 1 : TransactionIdIsInProgress(curr_xmin))
775 : {
776 1 : report_corruption(&ctx,
777 : psprintf("tuple with in-progress xmin %u was updated to produce a tuple at offset %d with committed xmin %u",
778 : curr_xmin,
779 1 : ctx.offnum,
780 : next_xmin));
781 : }
782 :
783 : /*
784 : * If the current tuple's xmin is aborted but the successor
785 : * tuple's xmin is in-progress or committed, that's corruption.
786 : */
787 171 : if (xmin_commit_status_ok[ctx.offnum] &&
788 171 : xmin_commit_status[ctx.offnum] == XID_ABORTED &&
789 2 : xmin_commit_status_ok[nextoffnum])
790 : {
791 2 : if (xmin_commit_status[nextoffnum] == XID_IN_PROGRESS)
792 1 : report_corruption(&ctx,
793 : psprintf("tuple with aborted xmin %u was updated to produce a tuple at offset %d with in-progress xmin %u",
794 : curr_xmin,
795 1 : ctx.offnum,
796 : next_xmin));
797 1 : else if (xmin_commit_status[nextoffnum] == XID_COMMITTED)
798 1 : report_corruption(&ctx,
799 : psprintf("tuple with aborted xmin %u was updated to produce a tuple at offset %d with committed xmin %u",
800 : curr_xmin,
801 1 : ctx.offnum,
802 : next_xmin));
803 : }
804 : }
805 :
806 : /*
807 : * An update chain can start either with a non-heap-only tuple or with
808 : * a redirect line pointer, but not with a heap-only tuple.
809 : *
810 : * (This check is in a separate loop because we need the predecessor
811 : * array to be fully populated before we can perform it.)
812 : */
813 12237 : for (ctx.offnum = FirstOffsetNumber;
814 589219 : ctx.offnum <= maxoff;
815 576982 : ctx.offnum = OffsetNumberNext(ctx.offnum))
816 : {
817 576982 : if (xmin_commit_status_ok[ctx.offnum] &&
818 563999 : (xmin_commit_status[ctx.offnum] == XID_COMMITTED ||
819 7 : xmin_commit_status[ctx.offnum] == XID_IN_PROGRESS) &&
820 563994 : predecessor[ctx.offnum] == InvalidOffsetNumber)
821 : {
822 : ItemId curr_lp;
823 :
824 558658 : curr_lp = PageGetItemId(ctx.page, ctx.offnum);
825 558658 : if (!ItemIdIsRedirected(curr_lp))
826 : {
827 : HeapTupleHeader curr_htup;
828 :
829 : curr_htup = (HeapTupleHeader)
830 558658 : PageGetItem(ctx.page, curr_lp);
831 558658 : if (HeapTupleHeaderIsHeapOnly(curr_htup))
832 4 : report_corruption(&ctx,
833 : psprintf("tuple is root of chain but is marked as heap-only tuple"));
834 : }
835 : }
836 : }
837 :
838 : /* clean up */
839 12237 : UnlockReleaseBuffer(ctx.buffer);
840 :
841 : /*
842 : * Check any toast pointers from the page whose lock we just released
843 : */
844 12237 : if (ctx.toasted_attributes != NIL)
845 : {
846 : ListCell *cell;
847 :
848 13500 : foreach(cell, ctx.toasted_attributes)
849 12613 : check_toasted_attribute(&ctx, lfirst(cell));
850 887 : list_free_deep(ctx.toasted_attributes);
851 887 : ctx.toasted_attributes = NIL;
852 : }
853 :
854 12234 : if (on_error_stop && ctx.is_corrupt)
855 0 : break;
856 : }
857 :
858 1473 : read_stream_end(stream);
859 :
860 1473 : if (vmbuffer != InvalidBuffer)
861 37 : ReleaseBuffer(vmbuffer);
862 :
863 : /* Close the associated toast table and indexes, if any. */
864 1473 : if (ctx.toast_indexes)
865 693 : toast_close_indexes(ctx.toast_indexes, ctx.num_toast_indexes,
866 : AccessShareLock);
867 1473 : if (ctx.toast_rel)
868 693 : table_close(ctx.toast_rel, AccessShareLock);
869 :
870 : /* Close the main relation */
871 1473 : relation_close(ctx.rel, AccessShareLock);
872 :
873 1473 : PG_RETURN_NULL();
874 : }
875 :
876 : /*
877 : * Heap amcheck's read stream callback for getting the next unskippable block.
878 : * This callback is only used when 'all-visible' or 'all-frozen' is provided
879 : * as the skip option to verify_heapam(). With the default 'none',
880 : * block_range_read_stream_cb() is used instead.
881 : */
882 : static BlockNumber
883 869 : heapcheck_read_stream_next_unskippable(ReadStream *stream,
884 : void *callback_private_data,
885 : void *per_buffer_data)
886 : {
887 869 : HeapCheckReadStreamData *p = callback_private_data;
888 :
889 : /* Loops over [current_blocknum, last_exclusive) blocks */
890 902 : for (BlockNumber i; (i = p->range.current_blocknum++) < p->range.last_exclusive;)
891 : {
892 736 : uint8 mapbits = visibilitymap_get_status(p->rel, i, p->vmbuffer);
893 :
894 736 : if (p->skip_option == SKIP_PAGES_ALL_FROZEN)
895 : {
896 384 : if ((mapbits & VISIBILITYMAP_ALL_FROZEN) != 0)
897 32 : continue;
898 : }
899 :
900 704 : if (p->skip_option == SKIP_PAGES_ALL_VISIBLE)
901 : {
902 352 : if ((mapbits & VISIBILITYMAP_ALL_VISIBLE) != 0)
903 1 : continue;
904 : }
905 :
906 703 : return i;
907 : }
908 :
909 166 : return InvalidBlockNumber;
910 : }
911 :
912 : /*
913 : * Shared internal implementation for report_corruption and
914 : * report_toast_corruption.
915 : */
916 : static void
917 86 : report_corruption_internal(Tuplestorestate *tupstore, TupleDesc tupdesc,
918 : BlockNumber blkno, OffsetNumber offnum,
919 : AttrNumber attnum, char *msg)
920 : {
921 86 : Datum values[HEAPCHECK_RELATION_COLS] = {0};
922 86 : bool nulls[HEAPCHECK_RELATION_COLS] = {0};
923 : HeapTuple tuple;
924 :
925 86 : values[0] = Int64GetDatum(blkno);
926 86 : values[1] = Int32GetDatum(offnum);
927 86 : values[2] = Int32GetDatum(attnum);
928 86 : nulls[2] = (attnum < 0);
929 86 : values[3] = CStringGetTextDatum(msg);
930 :
931 : /*
932 : * In principle, there is nothing to prevent a scan over a large, highly
933 : * corrupted table from using work_mem worth of memory building up the
934 : * tuplestore. That's ok, but if we also leak the msg argument memory
935 : * until the end of the query, we could exceed work_mem by more than a
936 : * trivial amount. Therefore, free the msg argument each time we are
937 : * called rather than waiting for our current memory context to be freed.
938 : */
939 86 : pfree(msg);
940 :
941 86 : tuple = heap_form_tuple(tupdesc, values, nulls);
942 86 : tuplestore_puttuple(tupstore, tuple);
943 86 : }
944 :
945 : /*
946 : * Record a single corruption found in the main table. The values in ctx should
947 : * indicate the location of the corruption, and the msg argument should contain
948 : * a human-readable description of the corruption.
949 : *
950 : * The msg argument is pfree'd by this function.
951 : */
952 : static void
953 85 : report_corruption(HeapCheckContext *ctx, char *msg)
954 : {
955 85 : report_corruption_internal(ctx->tupstore, ctx->tupdesc, ctx->blkno,
956 85 : ctx->offnum, ctx->attnum, msg);
957 85 : ctx->is_corrupt = true;
958 85 : }
959 :
960 : /*
961 : * Record corruption found in the toast table. The values in ta should
962 : * indicate the location in the main table where the toast pointer was
963 : * encountered, and the msg argument should contain a human-readable
964 : * description of the toast table corruption.
965 : *
966 : * As above, the msg argument is pfree'd by this function.
967 : */
968 : static void
969 1 : report_toast_corruption(HeapCheckContext *ctx, ToastedAttribute *ta,
970 : char *msg)
971 : {
972 1 : report_corruption_internal(ctx->tupstore, ctx->tupdesc, ta->blkno,
973 1 : ta->offnum, ta->attnum, msg);
974 1 : ctx->is_corrupt = true;
975 1 : }
976 :
977 : /*
978 : * Check for tuple header corruption.
979 : *
980 : * Some kinds of corruption make it unsafe to check the tuple attributes, for
981 : * example when the line pointer refers to a range of bytes outside the page.
982 : * In such cases, we return false (not checkable) after recording appropriate
983 : * corruption messages.
984 : *
985 : * Some other kinds of tuple header corruption confuse the question of where
986 : * the tuple attributes begin, or how long the nulls bitmap is, etc., making it
987 : * unreasonable to attempt to check attributes, even if all candidate answers
988 : * to those questions would not result in reading past the end of the line
989 : * pointer or page. In such cases, like above, we record corruption messages
990 : * about the header and then return false.
991 : *
992 : * Other kinds of tuple header corruption do not bear on the question of
993 : * whether the tuple attributes can be checked, so we record corruption
994 : * messages for them but we do not return false merely because we detected
995 : * them.
996 : *
997 : * Returns whether the tuple is sufficiently sensible to undergo visibility and
998 : * attribute checks.
999 : */
1000 : static bool
1001 564008 : check_tuple_header(HeapCheckContext *ctx)
1002 : {
1003 564008 : HeapTupleHeader tuphdr = ctx->tuphdr;
1004 564008 : uint16 infomask = tuphdr->t_infomask;
1005 564008 : TransactionId curr_xmax = HeapTupleHeaderGetUpdateXid(tuphdr);
1006 564008 : bool result = true;
1007 : unsigned expected_hoff;
1008 :
1009 564008 : if (ctx->tuphdr->t_hoff > ctx->lp_len)
1010 : {
1011 1 : report_corruption(ctx,
1012 : psprintf("data begins at offset %u beyond the tuple length %u",
1013 1 : ctx->tuphdr->t_hoff, ctx->lp_len));
1014 1 : result = false;
1015 : }
1016 :
1017 564008 : if ((ctx->tuphdr->t_infomask & HEAP_XMAX_COMMITTED) &&
1018 137 : (ctx->tuphdr->t_infomask & HEAP_XMAX_IS_MULTI))
1019 : {
1020 2 : report_corruption(ctx,
1021 : pstrdup("multixact should not be marked committed"));
1022 :
1023 : /*
1024 : * This condition is clearly wrong, but it's not enough to justify
1025 : * skipping further checks, because we don't rely on this to determine
1026 : * whether the tuple is visible or to interpret other relevant header
1027 : * fields.
1028 : */
1029 : }
1030 :
1031 1126974 : if (!TransactionIdIsValid(curr_xmax) &&
1032 562966 : HeapTupleHeaderIsHotUpdated(tuphdr))
1033 : {
1034 1 : report_corruption(ctx,
1035 : psprintf("tuple has been HOT updated, but xmax is 0"));
1036 :
1037 : /*
1038 : * As above, even though this shouldn't happen, it's not sufficient
1039 : * justification for skipping further checks, we should still be able
1040 : * to perform sensibly.
1041 : */
1042 : }
1043 :
1044 564008 : if (HeapTupleHeaderIsHeapOnly(tuphdr) &&
1045 5341 : ((tuphdr->t_infomask & HEAP_UPDATED) == 0))
1046 : {
1047 1 : report_corruption(ctx,
1048 : psprintf("tuple is heap only, but not the result of an update"));
1049 :
1050 : /* Here again, we can still perform further checks. */
1051 : }
1052 :
1053 564008 : if (infomask & HEAP_HASNULL)
1054 256271 : expected_hoff = MAXALIGN(SizeofHeapTupleHeader + BITMAPLEN(ctx->natts));
1055 : else
1056 307737 : expected_hoff = MAXALIGN(SizeofHeapTupleHeader);
1057 564008 : if (ctx->tuphdr->t_hoff != expected_hoff)
1058 : {
1059 5 : if ((infomask & HEAP_HASNULL) && ctx->natts == 1)
1060 0 : report_corruption(ctx,
1061 : psprintf("tuple data should begin at byte %u, but actually begins at byte %u (1 attribute, has nulls)",
1062 0 : expected_hoff, ctx->tuphdr->t_hoff));
1063 5 : else if ((infomask & HEAP_HASNULL))
1064 1 : report_corruption(ctx,
1065 : psprintf("tuple data should begin at byte %u, but actually begins at byte %u (%u attributes, has nulls)",
1066 1 : expected_hoff, ctx->tuphdr->t_hoff, ctx->natts));
1067 4 : else if (ctx->natts == 1)
1068 0 : report_corruption(ctx,
1069 : psprintf("tuple data should begin at byte %u, but actually begins at byte %u (1 attribute, no nulls)",
1070 0 : expected_hoff, ctx->tuphdr->t_hoff));
1071 : else
1072 4 : report_corruption(ctx,
1073 : psprintf("tuple data should begin at byte %u, but actually begins at byte %u (%u attributes, no nulls)",
1074 4 : expected_hoff, ctx->tuphdr->t_hoff, ctx->natts));
1075 5 : result = false;
1076 : }
1077 :
1078 564008 : return result;
1079 : }
1080 :
1081 : /*
1082 : * Checks tuple visibility so we know which further checks are safe to
1083 : * perform.
1084 : *
1085 : * If a tuple could have been inserted by a transaction that also added a
1086 : * column to the table, but which ultimately did not commit, or which has not
1087 : * yet committed, then the table's current TupleDesc might differ from the one
1088 : * used to construct this tuple, so we must not check it.
1089 : *
1090 : * As a special case, if our own transaction inserted the tuple, even if we
1091 : * added a column to the table, our TupleDesc should match. We could check the
1092 : * tuple, but choose not to do so.
1093 : *
1094 : * If a tuple has been updated or deleted, we can still read the old tuple for
1095 : * corruption checking purposes, as long as we are careful about concurrent
1096 : * vacuums. The main table tuple itself cannot be vacuumed away because we
1097 : * hold a buffer lock on the page, but if the deleting transaction is older
1098 : * than our transaction snapshot's xmin, then vacuum could remove the toast at
1099 : * any time, so we must not try to follow TOAST pointers.
1100 : *
1101 : * If xmin or xmax values are older than can be checked against clog, or appear
1102 : * to be in the future (possibly due to wrap-around), then we cannot make a
1103 : * determination about the visibility of the tuple, so we skip further checks.
1104 : *
1105 : * Returns true if the tuple itself should be checked, false otherwise. Sets
1106 : * ctx->tuple_could_be_pruned if the tuple -- and thus also any associated
1107 : * TOAST tuples -- are eligible for pruning.
1108 : *
1109 : * Sets *xmin_commit_status_ok to true if the commit status of xmin is known
1110 : * and false otherwise. If it's set to true, then also set *xmin_commit_status
1111 : * to the actual commit status.
1112 : */
1113 : static bool
1114 564003 : check_tuple_visibility(HeapCheckContext *ctx, bool *xmin_commit_status_ok,
1115 : XidCommitStatus *xmin_commit_status)
1116 : {
1117 : TransactionId xmin;
1118 : TransactionId xvac;
1119 : TransactionId xmax;
1120 : XidCommitStatus xmin_status;
1121 : XidCommitStatus xvac_status;
1122 : XidCommitStatus xmax_status;
1123 564003 : HeapTupleHeader tuphdr = ctx->tuphdr;
1124 :
1125 564003 : ctx->tuple_could_be_pruned = true; /* have not yet proven otherwise */
1126 564003 : *xmin_commit_status_ok = false; /* have not yet proven otherwise */
1127 :
1128 : /* If xmin is normal, it should be within valid range */
1129 564003 : xmin = HeapTupleHeaderGetXmin(tuphdr);
1130 564003 : switch (get_xid_status(xmin, ctx, &xmin_status))
1131 : {
1132 0 : case XID_INVALID:
1133 : /* Could be the result of a speculative insertion that aborted. */
1134 0 : return false;
1135 563999 : case XID_BOUNDS_OK:
1136 563999 : *xmin_commit_status_ok = true;
1137 563999 : *xmin_commit_status = xmin_status;
1138 563999 : break;
1139 1 : case XID_IN_FUTURE:
1140 1 : report_corruption(ctx,
1141 : psprintf("xmin %u equals or exceeds next valid transaction ID %u:%u",
1142 : xmin,
1143 1 : EpochFromFullTransactionId(ctx->next_fxid),
1144 1 : XidFromFullTransactionId(ctx->next_fxid)));
1145 1 : return false;
1146 2 : case XID_PRECEDES_CLUSTERMIN:
1147 2 : report_corruption(ctx,
1148 : psprintf("xmin %u precedes oldest valid transaction ID %u:%u",
1149 : xmin,
1150 2 : EpochFromFullTransactionId(ctx->oldest_fxid),
1151 2 : XidFromFullTransactionId(ctx->oldest_fxid)));
1152 2 : return false;
1153 1 : case XID_PRECEDES_RELMIN:
1154 1 : report_corruption(ctx,
1155 : psprintf("xmin %u precedes relation freeze threshold %u:%u",
1156 : xmin,
1157 1 : EpochFromFullTransactionId(ctx->relfrozenfxid),
1158 1 : XidFromFullTransactionId(ctx->relfrozenfxid)));
1159 1 : return false;
1160 : }
1161 :
1162 : /*
1163 : * Has inserting transaction committed?
1164 : */
1165 563999 : if (!HeapTupleHeaderXminCommitted(tuphdr))
1166 : {
1167 8422 : if (HeapTupleHeaderXminInvalid(tuphdr))
1168 0 : return false; /* inserter aborted, don't check */
1169 : /* Used by pre-9.0 binary upgrades */
1170 8422 : else if (tuphdr->t_infomask & HEAP_MOVED_OFF)
1171 : {
1172 0 : xvac = HeapTupleHeaderGetXvac(tuphdr);
1173 :
1174 0 : switch (get_xid_status(xvac, ctx, &xvac_status))
1175 : {
1176 0 : case XID_INVALID:
1177 0 : report_corruption(ctx,
1178 : pstrdup("old-style VACUUM FULL transaction ID for moved off tuple is invalid"));
1179 0 : return false;
1180 0 : case XID_IN_FUTURE:
1181 0 : report_corruption(ctx,
1182 : psprintf("old-style VACUUM FULL transaction ID %u for moved off tuple equals or exceeds next valid transaction ID %u:%u",
1183 : xvac,
1184 0 : EpochFromFullTransactionId(ctx->next_fxid),
1185 0 : XidFromFullTransactionId(ctx->next_fxid)));
1186 0 : return false;
1187 0 : case XID_PRECEDES_RELMIN:
1188 0 : report_corruption(ctx,
1189 : psprintf("old-style VACUUM FULL transaction ID %u for moved off tuple precedes relation freeze threshold %u:%u",
1190 : xvac,
1191 0 : EpochFromFullTransactionId(ctx->relfrozenfxid),
1192 0 : XidFromFullTransactionId(ctx->relfrozenfxid)));
1193 0 : return false;
1194 0 : case XID_PRECEDES_CLUSTERMIN:
1195 0 : report_corruption(ctx,
1196 : psprintf("old-style VACUUM FULL transaction ID %u for moved off tuple precedes oldest valid transaction ID %u:%u",
1197 : xvac,
1198 0 : EpochFromFullTransactionId(ctx->oldest_fxid),
1199 0 : XidFromFullTransactionId(ctx->oldest_fxid)));
1200 0 : return false;
1201 0 : case XID_BOUNDS_OK:
1202 0 : break;
1203 : }
1204 :
1205 0 : switch (xvac_status)
1206 : {
1207 0 : case XID_IS_CURRENT_XID:
1208 0 : report_corruption(ctx,
1209 : psprintf("old-style VACUUM FULL transaction ID %u for moved off tuple matches our current transaction ID",
1210 : xvac));
1211 0 : return false;
1212 0 : case XID_IN_PROGRESS:
1213 0 : report_corruption(ctx,
1214 : psprintf("old-style VACUUM FULL transaction ID %u for moved off tuple appears to be in progress",
1215 : xvac));
1216 0 : return false;
1217 :
1218 0 : case XID_COMMITTED:
1219 :
1220 : /*
1221 : * The tuple is dead, because the xvac transaction moved
1222 : * it off and committed. It's checkable, but also
1223 : * prunable.
1224 : */
1225 0 : return true;
1226 :
1227 0 : case XID_ABORTED:
1228 :
1229 : /*
1230 : * The original xmin must have committed, because the xvac
1231 : * transaction tried to move it later. Since xvac is
1232 : * aborted, whether it's still alive now depends on the
1233 : * status of xmax.
1234 : */
1235 0 : break;
1236 : }
1237 : }
1238 : /* Used by pre-9.0 binary upgrades */
1239 8422 : else if (tuphdr->t_infomask & HEAP_MOVED_IN)
1240 : {
1241 0 : xvac = HeapTupleHeaderGetXvac(tuphdr);
1242 :
1243 0 : switch (get_xid_status(xvac, ctx, &xvac_status))
1244 : {
1245 0 : case XID_INVALID:
1246 0 : report_corruption(ctx,
1247 : pstrdup("old-style VACUUM FULL transaction ID for moved in tuple is invalid"));
1248 0 : return false;
1249 0 : case XID_IN_FUTURE:
1250 0 : report_corruption(ctx,
1251 : psprintf("old-style VACUUM FULL transaction ID %u for moved in tuple equals or exceeds next valid transaction ID %u:%u",
1252 : xvac,
1253 0 : EpochFromFullTransactionId(ctx->next_fxid),
1254 0 : XidFromFullTransactionId(ctx->next_fxid)));
1255 0 : return false;
1256 0 : case XID_PRECEDES_RELMIN:
1257 0 : report_corruption(ctx,
1258 : psprintf("old-style VACUUM FULL transaction ID %u for moved in tuple precedes relation freeze threshold %u:%u",
1259 : xvac,
1260 0 : EpochFromFullTransactionId(ctx->relfrozenfxid),
1261 0 : XidFromFullTransactionId(ctx->relfrozenfxid)));
1262 0 : return false;
1263 0 : case XID_PRECEDES_CLUSTERMIN:
1264 0 : report_corruption(ctx,
1265 : psprintf("old-style VACUUM FULL transaction ID %u for moved in tuple precedes oldest valid transaction ID %u:%u",
1266 : xvac,
1267 0 : EpochFromFullTransactionId(ctx->oldest_fxid),
1268 0 : XidFromFullTransactionId(ctx->oldest_fxid)));
1269 0 : return false;
1270 0 : case XID_BOUNDS_OK:
1271 0 : break;
1272 : }
1273 :
1274 0 : switch (xvac_status)
1275 : {
1276 0 : case XID_IS_CURRENT_XID:
1277 0 : report_corruption(ctx,
1278 : psprintf("old-style VACUUM FULL transaction ID %u for moved in tuple matches our current transaction ID",
1279 : xvac));
1280 0 : return false;
1281 0 : case XID_IN_PROGRESS:
1282 0 : report_corruption(ctx,
1283 : psprintf("old-style VACUUM FULL transaction ID %u for moved in tuple appears to be in progress",
1284 : xvac));
1285 0 : return false;
1286 :
1287 0 : case XID_COMMITTED:
1288 :
1289 : /*
1290 : * The original xmin must have committed, because the xvac
1291 : * transaction moved it later. Whether it's still alive
1292 : * now depends on the status of xmax.
1293 : */
1294 0 : break;
1295 :
1296 0 : case XID_ABORTED:
1297 :
1298 : /*
1299 : * The tuple is dead, because the xvac transaction moved
1300 : * it off and committed. It's checkable, but also
1301 : * prunable.
1302 : */
1303 0 : return true;
1304 : }
1305 : }
1306 8422 : else if (xmin_status != XID_COMMITTED)
1307 : {
1308 : /*
1309 : * Inserting transaction is not in progress, and not committed, so
1310 : * it might have changed the TupleDesc in ways we don't know
1311 : * about. Thus, don't try to check the tuple structure.
1312 : *
1313 : * If xmin_status happens to be XID_IS_CURRENT_XID, then in theory
1314 : * any such DDL changes ought to be visible to us, so perhaps we
1315 : * could check anyway in that case. But, for now, let's be
1316 : * conservative and treat this like any other uncommitted insert.
1317 : */
1318 7 : return false;
1319 : }
1320 : }
1321 :
1322 : /*
1323 : * Okay, the inserter committed, so it was good at some point. Now what
1324 : * about the deleting transaction?
1325 : */
1326 :
1327 563992 : if (tuphdr->t_infomask & HEAP_XMAX_IS_MULTI)
1328 : {
1329 : /*
1330 : * xmax is a multixact, so sanity-check the MXID. Note that we do this
1331 : * prior to checking for HEAP_XMAX_INVALID or
1332 : * HEAP_XMAX_IS_LOCKED_ONLY. This might therefore complain about
1333 : * things that wouldn't actually be a problem during a normal scan,
1334 : * but eventually we're going to have to freeze, and that process will
1335 : * ignore hint bits.
1336 : *
1337 : * Even if the MXID is out of range, we still know that the original
1338 : * insert committed, so we can check the tuple itself. However, we
1339 : * can't rule out the possibility that this tuple is dead, so don't
1340 : * clear ctx->tuple_could_be_pruned. Possibly we should go ahead and
1341 : * clear that flag anyway if HEAP_XMAX_INVALID is set or if
1342 : * HEAP_XMAX_IS_LOCKED_ONLY is true, but for now we err on the side of
1343 : * avoiding possibly-bogus complaints about missing TOAST entries.
1344 : */
1345 58 : xmax = HeapTupleHeaderGetRawXmax(tuphdr);
1346 58 : switch (check_mxid_valid_in_rel(xmax, ctx))
1347 : {
1348 0 : case XID_INVALID:
1349 0 : report_corruption(ctx,
1350 : pstrdup("multitransaction ID is invalid"));
1351 0 : return true;
1352 1 : case XID_PRECEDES_RELMIN:
1353 1 : report_corruption(ctx,
1354 : psprintf("multitransaction ID %u precedes relation minimum multitransaction ID threshold %u",
1355 : xmax, ctx->relminmxid));
1356 1 : return true;
1357 0 : case XID_PRECEDES_CLUSTERMIN:
1358 0 : report_corruption(ctx,
1359 : psprintf("multitransaction ID %u precedes oldest valid multitransaction ID threshold %u",
1360 : xmax, ctx->oldest_mxact));
1361 0 : return true;
1362 1 : case XID_IN_FUTURE:
1363 1 : report_corruption(ctx,
1364 : psprintf("multitransaction ID %u equals or exceeds next valid multitransaction ID %u",
1365 : xmax,
1366 : ctx->next_mxact));
1367 1 : return true;
1368 56 : case XID_BOUNDS_OK:
1369 56 : break;
1370 : }
1371 : }
1372 :
1373 563990 : if (tuphdr->t_infomask & HEAP_XMAX_INVALID)
1374 : {
1375 : /*
1376 : * This tuple is live. A concurrently running transaction could
1377 : * delete it before we get around to checking the toast, but any such
1378 : * running transaction is surely not less than our safe_xmin, so the
1379 : * toast cannot be vacuumed out from under us.
1380 : */
1381 562953 : ctx->tuple_could_be_pruned = false;
1382 562953 : return true;
1383 : }
1384 :
1385 1037 : if (HEAP_XMAX_IS_LOCKED_ONLY(tuphdr->t_infomask))
1386 : {
1387 : /*
1388 : * "Deleting" xact really only locked it, so the tuple is live in any
1389 : * case. As above, a concurrently running transaction could delete
1390 : * it, but it cannot be vacuumed out from under us.
1391 : */
1392 28 : ctx->tuple_could_be_pruned = false;
1393 28 : return true;
1394 : }
1395 :
1396 1009 : if (tuphdr->t_infomask & HEAP_XMAX_IS_MULTI)
1397 : {
1398 : /*
1399 : * We already checked above that this multixact is within limits for
1400 : * this table. Now check the update xid from this multixact.
1401 : */
1402 28 : xmax = HeapTupleGetUpdateXid(tuphdr);
1403 28 : switch (get_xid_status(xmax, ctx, &xmax_status))
1404 : {
1405 0 : case XID_INVALID:
1406 : /* not LOCKED_ONLY, so it has to have an xmax */
1407 0 : report_corruption(ctx,
1408 : pstrdup("update xid is invalid"));
1409 0 : return true;
1410 0 : case XID_IN_FUTURE:
1411 0 : report_corruption(ctx,
1412 : psprintf("update xid %u equals or exceeds next valid transaction ID %u:%u",
1413 : xmax,
1414 0 : EpochFromFullTransactionId(ctx->next_fxid),
1415 0 : XidFromFullTransactionId(ctx->next_fxid)));
1416 0 : return true;
1417 0 : case XID_PRECEDES_RELMIN:
1418 0 : report_corruption(ctx,
1419 : psprintf("update xid %u precedes relation freeze threshold %u:%u",
1420 : xmax,
1421 0 : EpochFromFullTransactionId(ctx->relfrozenfxid),
1422 0 : XidFromFullTransactionId(ctx->relfrozenfxid)));
1423 0 : return true;
1424 0 : case XID_PRECEDES_CLUSTERMIN:
1425 0 : report_corruption(ctx,
1426 : psprintf("update xid %u precedes oldest valid transaction ID %u:%u",
1427 : xmax,
1428 0 : EpochFromFullTransactionId(ctx->oldest_fxid),
1429 0 : XidFromFullTransactionId(ctx->oldest_fxid)));
1430 0 : return true;
1431 28 : case XID_BOUNDS_OK:
1432 28 : break;
1433 : }
1434 :
1435 28 : switch (xmax_status)
1436 : {
1437 0 : case XID_IS_CURRENT_XID:
1438 : case XID_IN_PROGRESS:
1439 :
1440 : /*
1441 : * The delete is in progress, so it cannot be visible to our
1442 : * snapshot.
1443 : */
1444 0 : ctx->tuple_could_be_pruned = false;
1445 0 : break;
1446 28 : case XID_COMMITTED:
1447 :
1448 : /*
1449 : * The delete committed. Whether the toast can be vacuumed
1450 : * away depends on how old the deleting transaction is.
1451 : */
1452 28 : ctx->tuple_could_be_pruned = TransactionIdPrecedes(xmax,
1453 : ctx->safe_xmin);
1454 28 : break;
1455 0 : case XID_ABORTED:
1456 :
1457 : /*
1458 : * The delete aborted or crashed. The tuple is still live.
1459 : */
1460 0 : ctx->tuple_could_be_pruned = false;
1461 0 : break;
1462 : }
1463 :
1464 : /* Tuple itself is checkable even if it's dead. */
1465 28 : return true;
1466 : }
1467 :
1468 : /* xmax is an XID, not a MXID. Sanity check it. */
1469 981 : xmax = HeapTupleHeaderGetRawXmax(tuphdr);
1470 981 : switch (get_xid_status(xmax, ctx, &xmax_status))
1471 : {
1472 1 : case XID_INVALID:
1473 1 : ctx->tuple_could_be_pruned = false;
1474 1 : return true;
1475 0 : case XID_IN_FUTURE:
1476 0 : report_corruption(ctx,
1477 : psprintf("xmax %u equals or exceeds next valid transaction ID %u:%u",
1478 : xmax,
1479 0 : EpochFromFullTransactionId(ctx->next_fxid),
1480 0 : XidFromFullTransactionId(ctx->next_fxid)));
1481 0 : return false; /* corrupt */
1482 0 : case XID_PRECEDES_RELMIN:
1483 0 : report_corruption(ctx,
1484 : psprintf("xmax %u precedes relation freeze threshold %u:%u",
1485 : xmax,
1486 0 : EpochFromFullTransactionId(ctx->relfrozenfxid),
1487 0 : XidFromFullTransactionId(ctx->relfrozenfxid)));
1488 0 : return false; /* corrupt */
1489 1 : case XID_PRECEDES_CLUSTERMIN:
1490 1 : report_corruption(ctx,
1491 : psprintf("xmax %u precedes oldest valid transaction ID %u:%u",
1492 : xmax,
1493 1 : EpochFromFullTransactionId(ctx->oldest_fxid),
1494 1 : XidFromFullTransactionId(ctx->oldest_fxid)));
1495 1 : return false; /* corrupt */
1496 979 : case XID_BOUNDS_OK:
1497 979 : break;
1498 : }
1499 :
1500 : /*
1501 : * Whether the toast can be vacuumed away depends on how old the deleting
1502 : * transaction is.
1503 : */
1504 979 : switch (xmax_status)
1505 : {
1506 0 : case XID_IS_CURRENT_XID:
1507 : case XID_IN_PROGRESS:
1508 :
1509 : /*
1510 : * The delete is in progress, so it cannot be visible to our
1511 : * snapshot.
1512 : */
1513 0 : ctx->tuple_could_be_pruned = false;
1514 0 : break;
1515 :
1516 976 : case XID_COMMITTED:
1517 :
1518 : /*
1519 : * The delete committed. Whether the toast can be vacuumed away
1520 : * depends on how old the deleting transaction is.
1521 : */
1522 976 : ctx->tuple_could_be_pruned = TransactionIdPrecedes(xmax,
1523 : ctx->safe_xmin);
1524 976 : break;
1525 :
1526 3 : case XID_ABORTED:
1527 :
1528 : /*
1529 : * The delete aborted or crashed. The tuple is still live.
1530 : */
1531 3 : ctx->tuple_could_be_pruned = false;
1532 3 : break;
1533 : }
1534 :
1535 : /* Tuple itself is checkable even if it's dead. */
1536 979 : return true;
1537 : }
1538 :
1539 :
1540 : /*
1541 : * Check the current toast tuple against the state tracked in ctx, recording
1542 : * any corruption found in ctx->tupstore.
1543 : *
1544 : * This is not equivalent to running verify_heapam on the toast table itself,
1545 : * and is not hardened against corruption of the toast table. Rather, when
1546 : * validating a toasted attribute in the main table, the sequence of toast
1547 : * tuples that store the toasted value are retrieved and checked in order, with
1548 : * each toast tuple being checked against where we are in the sequence, as well
1549 : * as each toast tuple having its varlena structure sanity checked.
1550 : *
1551 : * On entry, *expected_chunk_seq should be the chunk_seq value that we expect
1552 : * to find in toasttup. On exit, it will be updated to the value the next call
1553 : * to this function should expect to see.
1554 : */
1555 : static void
1556 42279 : check_toast_tuple(HeapTuple toasttup, HeapCheckContext *ctx,
1557 : ToastedAttribute *ta, int32 *expected_chunk_seq,
1558 : uint32 extsize)
1559 : {
1560 : int32 chunk_seq;
1561 42279 : int32 last_chunk_seq = (extsize - 1) / TOAST_MAX_CHUNK_SIZE;
1562 : Pointer chunk;
1563 : bool isnull;
1564 : int32 chunksize;
1565 : int32 expected_size;
1566 :
1567 : /* Sanity-check the sequence number. */
1568 42279 : chunk_seq = DatumGetInt32(fastgetattr(toasttup, 2,
1569 42279 : ctx->toast_rel->rd_att, &isnull));
1570 42279 : if (isnull)
1571 : {
1572 0 : report_toast_corruption(ctx, ta,
1573 : psprintf("toast value %u has toast chunk with null sequence number",
1574 : ta->toast_pointer.va_valueid));
1575 0 : return;
1576 : }
1577 42279 : if (chunk_seq != *expected_chunk_seq)
1578 : {
1579 : /* Either the TOAST index is corrupt, or we don't have all chunks. */
1580 0 : report_toast_corruption(ctx, ta,
1581 : psprintf("toast value %u index scan returned chunk %d when expecting chunk %d",
1582 : ta->toast_pointer.va_valueid,
1583 : chunk_seq, *expected_chunk_seq));
1584 : }
1585 42279 : *expected_chunk_seq = chunk_seq + 1;
1586 :
1587 : /* Sanity-check the chunk data. */
1588 42279 : chunk = DatumGetPointer(fastgetattr(toasttup, 3,
1589 42279 : ctx->toast_rel->rd_att, &isnull));
1590 42279 : if (isnull)
1591 : {
1592 0 : report_toast_corruption(ctx, ta,
1593 : psprintf("toast value %u chunk %d has null data",
1594 : ta->toast_pointer.va_valueid,
1595 : chunk_seq));
1596 0 : return;
1597 : }
1598 42279 : if (!VARATT_IS_EXTENDED(chunk))
1599 42279 : chunksize = VARSIZE(chunk) - VARHDRSZ;
1600 0 : else if (VARATT_IS_SHORT(chunk))
1601 : {
1602 : /*
1603 : * could happen due to heap_form_tuple doing its thing
1604 : */
1605 0 : chunksize = VARSIZE_SHORT(chunk) - VARHDRSZ_SHORT;
1606 : }
1607 : else
1608 : {
1609 : /* should never happen */
1610 0 : uint32 header = ((varattrib_4b *) chunk)->va_4byte.va_header;
1611 :
1612 0 : report_toast_corruption(ctx, ta,
1613 : psprintf("toast value %u chunk %d has invalid varlena header %0x",
1614 : ta->toast_pointer.va_valueid,
1615 : chunk_seq, header));
1616 0 : return;
1617 : }
1618 :
1619 : /*
1620 : * Some checks on the data we've found
1621 : */
1622 42279 : if (chunk_seq > last_chunk_seq)
1623 : {
1624 0 : report_toast_corruption(ctx, ta,
1625 : psprintf("toast value %u chunk %d follows last expected chunk %d",
1626 : ta->toast_pointer.va_valueid,
1627 : chunk_seq, last_chunk_seq));
1628 0 : return;
1629 : }
1630 :
1631 42279 : expected_size = chunk_seq < last_chunk_seq ? TOAST_MAX_CHUNK_SIZE
1632 12609 : : extsize - (last_chunk_seq * TOAST_MAX_CHUNK_SIZE);
1633 :
1634 42279 : if (chunksize != expected_size)
1635 0 : report_toast_corruption(ctx, ta,
1636 : psprintf("toast value %u chunk %d has size %u, but expected size %u",
1637 : ta->toast_pointer.va_valueid,
1638 : chunk_seq, chunksize, expected_size));
1639 : }
1640 :
1641 : /*
1642 : * Check the current attribute as tracked in ctx, recording any corruption
1643 : * found in ctx->tupstore.
1644 : *
1645 : * This function follows the logic performed by heap_deform_tuple(), and in the
1646 : * case of a toasted value, optionally stores the toast pointer so later it can
1647 : * be checked following the logic of detoast_external_attr(), checking for any
1648 : * conditions that would result in either of those functions Asserting or
1649 : * crashing the backend. The checks performed by Asserts present in those two
1650 : * functions are also performed here and in check_toasted_attribute. In cases
1651 : * where those two functions are a bit cavalier in their assumptions about data
1652 : * being correct, we perform additional checks not present in either of those
1653 : * two functions. Where some condition is checked in both of those functions,
1654 : * we perform it here twice, as we parallel the logical flow of those two
1655 : * functions. The presence of duplicate checks seems a reasonable price to pay
1656 : * for keeping this code tightly coupled with the code it protects.
1657 : *
1658 : * Returns true if the tuple attribute is sane enough for processing to
1659 : * continue on to the next attribute, false otherwise.
1660 : */
1661 : static bool
1662 8131890 : check_tuple_attribute(HeapCheckContext *ctx)
1663 : {
1664 : Datum attdatum;
1665 : varlena *attr;
1666 : char *tp; /* pointer to the tuple data */
1667 : uint16 infomask;
1668 : CompactAttribute *thisatt;
1669 : varatt_external toast_pointer;
1670 :
1671 8131890 : infomask = ctx->tuphdr->t_infomask;
1672 8131890 : thisatt = TupleDescCompactAttr(RelationGetDescr(ctx->rel), ctx->attnum);
1673 :
1674 8131890 : tp = (char *) ctx->tuphdr + ctx->tuphdr->t_hoff;
1675 :
1676 8131890 : if (ctx->tuphdr->t_hoff + ctx->offset > ctx->lp_len)
1677 : {
1678 0 : report_corruption(ctx,
1679 : psprintf("attribute with length %u starts at offset %u beyond total tuple length %u",
1680 0 : thisatt->attlen,
1681 0 : ctx->tuphdr->t_hoff + ctx->offset,
1682 0 : ctx->lp_len));
1683 0 : return false;
1684 : }
1685 :
1686 : /* Skip null values */
1687 8131890 : if (infomask & HEAP_HASNULL && att_isnull(ctx->attnum, ctx->tuphdr->t_bits))
1688 1386095 : return true;
1689 :
1690 : /* Skip non-varlena values, but update offset first */
1691 6745795 : if (thisatt->attlen != -1)
1692 : {
1693 6188557 : ctx->offset = att_nominal_alignby(ctx->offset, thisatt->attalignby);
1694 6188557 : ctx->offset = att_addlength_pointer(ctx->offset, thisatt->attlen,
1695 : tp + ctx->offset);
1696 6188557 : if (ctx->tuphdr->t_hoff + ctx->offset > ctx->lp_len)
1697 : {
1698 0 : report_corruption(ctx,
1699 : psprintf("attribute with length %u ends at offset %u beyond total tuple length %u",
1700 0 : thisatt->attlen,
1701 0 : ctx->tuphdr->t_hoff + ctx->offset,
1702 0 : ctx->lp_len));
1703 0 : return false;
1704 : }
1705 6188557 : return true;
1706 : }
1707 :
1708 : /* Ok, we're looking at a varlena attribute. */
1709 557238 : ctx->offset = att_pointer_alignby(ctx->offset, thisatt->attalignby, -1,
1710 : tp + ctx->offset);
1711 :
1712 : /* Get the (possibly corrupt) varlena datum */
1713 557238 : attdatum = fetchatt(thisatt, tp + ctx->offset);
1714 :
1715 : /*
1716 : * We have the datum, but we cannot decode it carelessly, as it may still
1717 : * be corrupt.
1718 : */
1719 :
1720 : /*
1721 : * Check that VARTAG_SIZE won't hit an Assert on a corrupt va_tag before
1722 : * risking a call into att_addlength_pointer
1723 : */
1724 557238 : if (VARATT_IS_EXTERNAL(tp + ctx->offset))
1725 : {
1726 27050 : uint8 va_tag = VARTAG_EXTERNAL(tp + ctx->offset);
1727 :
1728 27050 : if (va_tag != VARTAG_ONDISK)
1729 : {
1730 0 : report_corruption(ctx,
1731 : psprintf("toasted attribute has unexpected TOAST tag %u",
1732 : va_tag));
1733 : /* We can't know where the next attribute begins */
1734 0 : return false;
1735 : }
1736 : }
1737 :
1738 : /* Ok, should be safe now */
1739 557238 : ctx->offset = att_addlength_pointer(ctx->offset, thisatt->attlen,
1740 : tp + ctx->offset);
1741 :
1742 557238 : if (ctx->tuphdr->t_hoff + ctx->offset > ctx->lp_len)
1743 : {
1744 1 : report_corruption(ctx,
1745 : psprintf("attribute with length %u ends at offset %u beyond total tuple length %u",
1746 1 : thisatt->attlen,
1747 1 : ctx->tuphdr->t_hoff + ctx->offset,
1748 1 : ctx->lp_len));
1749 :
1750 1 : return false;
1751 : }
1752 :
1753 : /*
1754 : * heap_deform_tuple would be done with this attribute at this point,
1755 : * having stored it in values[], and would continue to the next attribute.
1756 : * We go further, because we need to check if the toast datum is corrupt.
1757 : */
1758 :
1759 557237 : attr = (varlena *) DatumGetPointer(attdatum);
1760 :
1761 : /*
1762 : * Now we follow the logic of detoast_external_attr(), with the same
1763 : * caveats about being paranoid about corruption.
1764 : */
1765 :
1766 : /* Skip values that are not external */
1767 557237 : if (!VARATT_IS_EXTERNAL(attr))
1768 530187 : return true;
1769 :
1770 : /* It is external, and we're looking at a page on disk */
1771 :
1772 : /*
1773 : * Must copy attr into toast_pointer for alignment considerations
1774 : */
1775 27050 : VARATT_EXTERNAL_GET_POINTER(toast_pointer, attr);
1776 :
1777 : /* Toasted attributes too large to be untoasted should never be stored */
1778 27050 : if (toast_pointer.va_rawsize > VARLENA_SIZE_LIMIT)
1779 0 : report_corruption(ctx,
1780 : psprintf("toast value %u rawsize %d exceeds limit %d",
1781 : toast_pointer.va_valueid,
1782 : toast_pointer.va_rawsize,
1783 : VARLENA_SIZE_LIMIT));
1784 :
1785 27050 : if (VARATT_EXTERNAL_IS_COMPRESSED(toast_pointer))
1786 : {
1787 : ToastCompressionId cmid;
1788 2822 : bool valid = false;
1789 :
1790 : /* Compressed attributes should have a valid compression method */
1791 2822 : cmid = TOAST_COMPRESS_METHOD(&toast_pointer);
1792 2822 : switch (cmid)
1793 : {
1794 : /* List of all valid compression method IDs */
1795 2822 : case TOAST_PGLZ_COMPRESSION_ID:
1796 : case TOAST_LZ4_COMPRESSION_ID:
1797 2822 : valid = true;
1798 2822 : break;
1799 :
1800 : /* Recognized but invalid compression method ID */
1801 0 : case TOAST_INVALID_COMPRESSION_ID:
1802 0 : break;
1803 :
1804 : /* Intentionally no default here */
1805 : }
1806 2822 : if (!valid)
1807 0 : report_corruption(ctx,
1808 : psprintf("toast value %u has invalid compression method id %d",
1809 : toast_pointer.va_valueid, cmid));
1810 : }
1811 :
1812 : /* The tuple header better claim to contain toasted values */
1813 27050 : if (!(infomask & HEAP_HASEXTERNAL))
1814 : {
1815 0 : report_corruption(ctx,
1816 : psprintf("toast value %u is external but tuple header flag HEAP_HASEXTERNAL not set",
1817 : toast_pointer.va_valueid));
1818 0 : return true;
1819 : }
1820 :
1821 : /* The relation better have a toast table */
1822 27050 : if (!ctx->rel->rd_rel->reltoastrelid)
1823 : {
1824 0 : report_corruption(ctx,
1825 : psprintf("toast value %u is external but relation has no toast relation",
1826 : toast_pointer.va_valueid));
1827 0 : return true;
1828 : }
1829 :
1830 : /* If we were told to skip toast checking, then we're done. */
1831 27050 : if (ctx->toast_rel == NULL)
1832 14429 : return true;
1833 :
1834 : /*
1835 : * If this tuple is eligible to be pruned, we cannot check the toast.
1836 : * Otherwise, we push a copy of the toast tuple so we can check it after
1837 : * releasing the main table buffer lock.
1838 : */
1839 12621 : if (!ctx->tuple_could_be_pruned)
1840 : {
1841 : ToastedAttribute *ta;
1842 :
1843 12619 : ta = palloc0_object(ToastedAttribute);
1844 :
1845 12619 : VARATT_EXTERNAL_GET_POINTER(ta->toast_pointer, attr);
1846 12619 : ta->blkno = ctx->blkno;
1847 12619 : ta->offnum = ctx->offnum;
1848 12619 : ta->attnum = ctx->attnum;
1849 12619 : ctx->toasted_attributes = lappend(ctx->toasted_attributes, ta);
1850 : }
1851 :
1852 12621 : return true;
1853 : }
1854 :
1855 : /*
1856 : * For each attribute collected in ctx->toasted_attributes, look up the value
1857 : * in the toast table and perform checks on it. This function should only be
1858 : * called on toast pointers which cannot be vacuumed away during our
1859 : * processing.
1860 : */
1861 : static void
1862 12613 : check_toasted_attribute(HeapCheckContext *ctx, ToastedAttribute *ta)
1863 : {
1864 : ScanKeyData toastkey;
1865 : SysScanDesc toastscan;
1866 : bool found_toasttup;
1867 : HeapTuple toasttup;
1868 : uint32 extsize;
1869 12613 : int32 expected_chunk_seq = 0;
1870 : int32 last_chunk_seq;
1871 :
1872 12613 : extsize = VARATT_EXTERNAL_GET_EXTSIZE(ta->toast_pointer);
1873 12613 : last_chunk_seq = (extsize - 1) / TOAST_MAX_CHUNK_SIZE;
1874 :
1875 : /*
1876 : * Setup a scan key to find chunks in toast table with matching va_valueid
1877 : */
1878 12613 : ScanKeyInit(&toastkey,
1879 : (AttrNumber) 1,
1880 : BTEqualStrategyNumber, F_OIDEQ,
1881 : ObjectIdGetDatum(ta->toast_pointer.va_valueid));
1882 :
1883 : /*
1884 : * Check if any chunks for this toasted object exist in the toast table,
1885 : * accessible via the index.
1886 : */
1887 12613 : toastscan = systable_beginscan_ordered(ctx->toast_rel,
1888 : ctx->valid_toast_index,
1889 : get_toast_snapshot(), 1,
1890 : &toastkey);
1891 12613 : found_toasttup = false;
1892 12613 : while ((toasttup =
1893 54892 : systable_getnext_ordered(toastscan,
1894 54889 : ForwardScanDirection)) != NULL)
1895 : {
1896 42279 : found_toasttup = true;
1897 42279 : check_toast_tuple(toasttup, ctx, ta, &expected_chunk_seq, extsize);
1898 : }
1899 12610 : systable_endscan_ordered(toastscan);
1900 :
1901 12610 : if (!found_toasttup)
1902 1 : report_toast_corruption(ctx, ta,
1903 : psprintf("toast value %u not found in toast table",
1904 : ta->toast_pointer.va_valueid));
1905 12609 : else if (expected_chunk_seq <= last_chunk_seq)
1906 0 : report_toast_corruption(ctx, ta,
1907 : psprintf("toast value %u was expected to end at chunk %d, but ended while expecting chunk %d",
1908 : ta->toast_pointer.va_valueid,
1909 : last_chunk_seq, expected_chunk_seq));
1910 12610 : }
1911 :
1912 : /*
1913 : * Check the current tuple as tracked in ctx, recording any corruption found in
1914 : * ctx->tupstore.
1915 : *
1916 : * We return some information about the status of xmin to aid in validating
1917 : * update chains.
1918 : */
1919 : static void
1920 564008 : check_tuple(HeapCheckContext *ctx, bool *xmin_commit_status_ok,
1921 : XidCommitStatus *xmin_commit_status)
1922 : {
1923 : /*
1924 : * Check various forms of tuple header corruption, and if the header is
1925 : * too corrupt, do not continue with other checks.
1926 : */
1927 564008 : if (!check_tuple_header(ctx))
1928 5 : return;
1929 :
1930 : /*
1931 : * Check tuple visibility. If the inserting transaction aborted, we
1932 : * cannot assume our relation description matches the tuple structure, and
1933 : * therefore cannot check it.
1934 : */
1935 564003 : if (!check_tuple_visibility(ctx, xmin_commit_status_ok,
1936 : xmin_commit_status))
1937 12 : return;
1938 :
1939 : /*
1940 : * The tuple is visible, so it must be compatible with the current version
1941 : * of the relation descriptor. It might have fewer columns than are
1942 : * present in the relation descriptor, but it cannot have more.
1943 : */
1944 563991 : if (RelationGetDescr(ctx->rel)->natts < ctx->natts)
1945 : {
1946 2 : report_corruption(ctx,
1947 : psprintf("number of attributes %u exceeds maximum %u expected for table",
1948 : ctx->natts,
1949 2 : RelationGetDescr(ctx->rel)->natts));
1950 2 : return;
1951 : }
1952 :
1953 : /*
1954 : * Check each attribute unless we hit corruption that confuses what to do
1955 : * next, at which point we abort further attribute checks for this tuple.
1956 : * Note that we don't abort for all types of corruption, only for those
1957 : * types where we don't know how to continue. We also don't abort the
1958 : * checking of toasted attributes collected from the tuple prior to
1959 : * aborting. Those will still be checked later along with other toasted
1960 : * attributes collected from the page.
1961 : */
1962 563989 : ctx->offset = 0;
1963 8695878 : for (ctx->attnum = 0; ctx->attnum < ctx->natts; ctx->attnum++)
1964 8131890 : if (!check_tuple_attribute(ctx))
1965 1 : break; /* cannot continue */
1966 :
1967 : /* revert attnum to -1 until we again examine individual attributes */
1968 563989 : ctx->attnum = -1;
1969 : }
1970 :
1971 : /*
1972 : * Convert a TransactionId into a FullTransactionId using our cached values of
1973 : * the valid transaction ID range. It is the caller's responsibility to have
1974 : * already updated the cached values, if necessary. This is akin to
1975 : * FullTransactionIdFromAllowableAt(), but it tolerates corruption in the form
1976 : * of an xid before epoch 0.
1977 : */
1978 : static FullTransactionId
1979 74837 : FullTransactionIdFromXidAndCtx(TransactionId xid, const HeapCheckContext *ctx)
1980 : {
1981 : uint64 nextfxid_i;
1982 : int32 diff;
1983 : FullTransactionId fxid;
1984 :
1985 : Assert(TransactionIdIsNormal(ctx->next_xid));
1986 : Assert(FullTransactionIdIsNormal(ctx->next_fxid));
1987 : Assert(XidFromFullTransactionId(ctx->next_fxid) == ctx->next_xid);
1988 :
1989 74837 : if (!TransactionIdIsNormal(xid))
1990 192 : return FullTransactionIdFromEpochAndXid(0, xid);
1991 :
1992 74645 : nextfxid_i = U64FromFullTransactionId(ctx->next_fxid);
1993 :
1994 : /* compute the 32bit modulo difference */
1995 74645 : diff = (int32) (ctx->next_xid - xid);
1996 :
1997 : /*
1998 : * In cases of corruption we might see a 32bit xid that is before epoch 0.
1999 : * We can't represent that as a 64bit xid, due to 64bit xids being
2000 : * unsigned integers, without the modulo arithmetic of 32bit xid. There's
2001 : * no really nice way to deal with that, but it works ok enough to use
2002 : * FirstNormalFullTransactionId in that case, as a freshly initdb'd
2003 : * cluster already has a newer horizon.
2004 : */
2005 74645 : if (diff > 0 && (nextfxid_i - FirstNormalTransactionId) < (int64) diff)
2006 : {
2007 : Assert(EpochFromFullTransactionId(ctx->next_fxid) == 0);
2008 4 : fxid = FirstNormalFullTransactionId;
2009 : }
2010 : else
2011 74641 : fxid = FullTransactionIdFromU64(nextfxid_i - diff);
2012 :
2013 : Assert(FullTransactionIdIsNormal(fxid));
2014 74645 : return fxid;
2015 : }
2016 :
2017 : /*
2018 : * Update our cached range of valid transaction IDs.
2019 : */
2020 : static void
2021 1480 : update_cached_xid_range(HeapCheckContext *ctx)
2022 : {
2023 : /* Make cached copies */
2024 1480 : LWLockAcquire(XidGenLock, LW_SHARED);
2025 1480 : ctx->next_fxid = TransamVariables->nextXid;
2026 1480 : ctx->oldest_xid = TransamVariables->oldestXid;
2027 1480 : LWLockRelease(XidGenLock);
2028 :
2029 : /* And compute alternate versions of the same */
2030 1480 : ctx->next_xid = XidFromFullTransactionId(ctx->next_fxid);
2031 1480 : ctx->oldest_fxid = FullTransactionIdFromXidAndCtx(ctx->oldest_xid, ctx);
2032 1480 : }
2033 :
2034 : /*
2035 : * Update our cached range of valid multitransaction IDs.
2036 : */
2037 : static void
2038 1478 : update_cached_mxid_range(HeapCheckContext *ctx)
2039 : {
2040 1478 : ReadMultiXactIdRange(&ctx->oldest_mxact, &ctx->next_mxact);
2041 1478 : }
2042 :
2043 : /*
2044 : * Return whether the given FullTransactionId is within our cached valid
2045 : * transaction ID range.
2046 : */
2047 : static inline bool
2048 62726 : fxid_in_cached_range(FullTransactionId fxid, const HeapCheckContext *ctx)
2049 : {
2050 125449 : return (FullTransactionIdPrecedesOrEquals(ctx->oldest_fxid, fxid) &&
2051 62723 : FullTransactionIdPrecedes(fxid, ctx->next_fxid));
2052 : }
2053 :
2054 : /*
2055 : * Checks whether a multitransaction ID is in the cached valid range, returning
2056 : * the nature of the range violation, if any.
2057 : */
2058 : static XidBoundsViolation
2059 60 : check_mxid_in_range(MultiXactId mxid, HeapCheckContext *ctx)
2060 : {
2061 60 : if (!TransactionIdIsValid(mxid))
2062 0 : return XID_INVALID;
2063 60 : if (MultiXactIdPrecedes(mxid, ctx->relminmxid))
2064 2 : return XID_PRECEDES_RELMIN;
2065 58 : if (MultiXactIdPrecedes(mxid, ctx->oldest_mxact))
2066 0 : return XID_PRECEDES_CLUSTERMIN;
2067 58 : if (MultiXactIdPrecedesOrEquals(ctx->next_mxact, mxid))
2068 2 : return XID_IN_FUTURE;
2069 56 : return XID_BOUNDS_OK;
2070 : }
2071 :
2072 : /*
2073 : * Checks whether the given mxid is valid to appear in the heap being checked,
2074 : * returning the nature of the range violation, if any.
2075 : *
2076 : * This function attempts to return quickly by caching the known valid mxid
2077 : * range in ctx. Callers should already have performed the initial setup of
2078 : * the cache prior to the first call to this function.
2079 : */
2080 : static XidBoundsViolation
2081 58 : check_mxid_valid_in_rel(MultiXactId mxid, HeapCheckContext *ctx)
2082 : {
2083 : XidBoundsViolation result;
2084 :
2085 58 : result = check_mxid_in_range(mxid, ctx);
2086 58 : if (result == XID_BOUNDS_OK)
2087 56 : return XID_BOUNDS_OK;
2088 :
2089 : /* The range may have advanced. Recheck. */
2090 2 : update_cached_mxid_range(ctx);
2091 2 : return check_mxid_in_range(mxid, ctx);
2092 : }
2093 :
2094 : /*
2095 : * Checks whether the given transaction ID is (or was recently) valid to appear
2096 : * in the heap being checked, or whether it is too old or too new to appear in
2097 : * the relation, returning information about the nature of the bounds violation.
2098 : *
2099 : * We cache the range of valid transaction IDs. If xid is in that range, we
2100 : * conclude that it is valid, even though concurrent changes to the table might
2101 : * invalidate it under certain corrupt conditions. (For example, if the table
2102 : * contains corrupt all-frozen bits, a concurrent vacuum might skip the page(s)
2103 : * containing the xid and then truncate clog and advance the relfrozenxid
2104 : * beyond xid.) Reporting the xid as valid under such conditions seems
2105 : * acceptable, since if we had checked it earlier in our scan it would have
2106 : * truly been valid at that time.
2107 : *
2108 : * If the status argument is not NULL, and if and only if the transaction ID
2109 : * appears to be valid in this relation, the status argument will be set with
2110 : * the commit status of the transaction ID.
2111 : */
2112 : static XidBoundsViolation
2113 565012 : get_xid_status(TransactionId xid, HeapCheckContext *ctx,
2114 : XidCommitStatus *status)
2115 : {
2116 : FullTransactionId fxid;
2117 : FullTransactionId clog_horizon;
2118 :
2119 : /* Quick check for special xids */
2120 565012 : if (!TransactionIdIsValid(xid))
2121 1 : return XID_INVALID;
2122 565011 : else if (xid == BootstrapTransactionId || xid == FrozenTransactionId)
2123 : {
2124 502285 : if (status != NULL)
2125 502285 : *status = XID_COMMITTED;
2126 502285 : return XID_BOUNDS_OK;
2127 : }
2128 :
2129 : /* Check if the xid is within bounds */
2130 62726 : fxid = FullTransactionIdFromXidAndCtx(xid, ctx);
2131 62726 : if (!fxid_in_cached_range(fxid, ctx))
2132 : {
2133 : /*
2134 : * We may have been checking against stale values. Update the cached
2135 : * range to be sure, and since we relied on the cached range when we
2136 : * performed the full xid conversion, reconvert.
2137 : */
2138 4 : update_cached_xid_range(ctx);
2139 4 : fxid = FullTransactionIdFromXidAndCtx(xid, ctx);
2140 : }
2141 :
2142 62726 : if (FullTransactionIdPrecedesOrEquals(ctx->next_fxid, fxid))
2143 1 : return XID_IN_FUTURE;
2144 62725 : if (FullTransactionIdPrecedes(fxid, ctx->oldest_fxid))
2145 3 : return XID_PRECEDES_CLUSTERMIN;
2146 62722 : if (FullTransactionIdPrecedes(fxid, ctx->relfrozenfxid))
2147 1 : return XID_PRECEDES_RELMIN;
2148 :
2149 : /* Early return if the caller does not request clog checking */
2150 62721 : if (status == NULL)
2151 0 : return XID_BOUNDS_OK;
2152 :
2153 : /* Early return if we just checked this xid in a prior call */
2154 62721 : if (xid == ctx->cached_xid)
2155 : {
2156 53570 : *status = ctx->cached_status;
2157 53570 : return XID_BOUNDS_OK;
2158 : }
2159 :
2160 9151 : *status = XID_COMMITTED;
2161 9151 : LWLockAcquire(XactTruncationLock, LW_SHARED);
2162 : clog_horizon =
2163 9151 : FullTransactionIdFromXidAndCtx(TransamVariables->oldestClogXid,
2164 : ctx);
2165 9151 : if (FullTransactionIdPrecedesOrEquals(clog_horizon, fxid))
2166 : {
2167 9151 : if (TransactionIdIsCurrentTransactionId(xid))
2168 0 : *status = XID_IS_CURRENT_XID;
2169 9151 : else if (TransactionIdIsInProgress(xid))
2170 2 : *status = XID_IN_PROGRESS;
2171 9149 : else if (TransactionIdDidCommit(xid))
2172 9142 : *status = XID_COMMITTED;
2173 : else
2174 7 : *status = XID_ABORTED;
2175 : }
2176 9151 : LWLockRelease(XactTruncationLock);
2177 9151 : ctx->cached_xid = xid;
2178 9151 : ctx->cached_status = *status;
2179 9151 : return XID_BOUNDS_OK;
2180 : }
|