diff options
Diffstat (limited to 'src/backend/tcop')
-rw-r--r-- | src/backend/tcop/aclchk.c | 32 | ||||
-rw-r--r-- | src/backend/tcop/fastpath.c | 18 | ||||
-rw-r--r-- | src/backend/tcop/postgres.c | 18 | ||||
-rw-r--r-- | src/backend/tcop/pquery.c | 4 | ||||
-rw-r--r-- | src/backend/tcop/utility.c | 32 | ||||
-rw-r--r-- | src/backend/tcop/variable.c | 30 |
6 files changed, 67 insertions, 67 deletions
diff --git a/src/backend/tcop/aclchk.c b/src/backend/tcop/aclchk.c index 0021213365c..9c7ed14cd5b 100644 --- a/src/backend/tcop/aclchk.c +++ b/src/backend/tcop/aclchk.c @@ -7,7 +7,7 @@ * * * IDENTIFICATION - * $Header: /cvsroot/pgsql/src/backend/tcop/Attic/aclchk.c,v 1.20 1997/11/25 22:06:08 momjian Exp $ + * $Header: /cvsroot/pgsql/src/backend/tcop/Attic/aclchk.c,v 1.21 1998/01/05 03:33:40 momjian Exp $ * * NOTES * See acl.h. @@ -120,7 +120,7 @@ ChangeAcl(char *relname, */ relation = heap_openr(RelationRelationName); if (!RelationIsValid(relation)) - elog(WARN, "ChangeAcl: could not open '%s'??", + elog(ABORT, "ChangeAcl: could not open '%s'??", RelationRelationName); fmgr_info(NameEqualRegProcedure, &relkey[0].sk_func, &relkey[0].sk_nargs); relkey[0].sk_argument = NameGetDatum(relname); @@ -134,7 +134,7 @@ ChangeAcl(char *relname, { heap_endscan(hsdp); heap_close(relation); - elog(WARN, "ChangeAcl: class \"%s\" not found", + elog(ABORT, "ChangeAcl: class \"%s\" not found", relname); return; } @@ -205,7 +205,7 @@ get_grosysid(char *groname) } else { - elog(WARN, "non-existent group \"%s\"", groname); + elog(ABORT, "non-existent group \"%s\"", groname); } return (id); } @@ -370,7 +370,7 @@ aclcheck(Acl *acl, AclId id, AclIdType idtype, AclMode mode) case ACL_IDTYPE_WORLD: break; default: - elog(WARN, "aclcheck: bogus ACL id type: %d", idtype); + elog(ABORT, "aclcheck: bogus ACL id type: %d", idtype); break; } @@ -393,7 +393,7 @@ pg_aclcheck(char *relname, char *usename, AclMode mode) htp = SearchSysCacheTuple(USENAME, PointerGetDatum(usename), 0, 0, 0); if (!HeapTupleIsValid(htp)) - elog(WARN, "pg_aclcheck: user \"%s\" not found", + elog(ABORT, "pg_aclcheck: user \"%s\" not found", usename); id = (AclId) ((Form_pg_user) GETSTRUCT(htp))->usesysid; @@ -445,9 +445,9 @@ pg_aclcheck(char *relname, char *usename, AclMode mode) 0, 0, 0); if (!HeapTupleIsValid(htp)) { - elog(WARN, "pg_aclcheck: class \"%s\" not found", + elog(ABORT, "pg_aclcheck: class \"%s\" not found", relname); - /* an elog(WARN) kills us, so no need to return anything. */ + /* an elog(ABORT) kills us, so no need to return anything. */ } if (!heap_attisnull(htp, Anum_pg_class_relacl)) { @@ -528,7 +528,7 @@ pg_ownercheck(char *usename, htp = SearchSysCacheTuple(USENAME, PointerGetDatum(usename), 0, 0, 0); if (!HeapTupleIsValid(htp)) - elog(WARN, "pg_ownercheck: user \"%s\" not found", + elog(ABORT, "pg_ownercheck: user \"%s\" not found", usename); user_id = (AclId) ((Form_pg_user) GETSTRUCT(htp))->usesysid; @@ -550,30 +550,30 @@ pg_ownercheck(char *usename, { case OPROID: if (!HeapTupleIsValid(htp)) - elog(WARN, "pg_ownercheck: operator %ld not found", + elog(ABORT, "pg_ownercheck: operator %ld not found", PointerGetDatum(value)); owner_id = ((OperatorTupleForm) GETSTRUCT(htp))->oprowner; break; case PRONAME: if (!HeapTupleIsValid(htp)) - elog(WARN, "pg_ownercheck: function \"%s\" not found", + elog(ABORT, "pg_ownercheck: function \"%s\" not found", value); owner_id = ((Form_pg_proc) GETSTRUCT(htp))->proowner; break; case RELNAME: if (!HeapTupleIsValid(htp)) - elog(WARN, "pg_ownercheck: class \"%s\" not found", + elog(ABORT, "pg_ownercheck: class \"%s\" not found", value); owner_id = ((Form_pg_class) GETSTRUCT(htp))->relowner; break; case TYPNAME: if (!HeapTupleIsValid(htp)) - elog(WARN, "pg_ownercheck: type \"%s\" not found", + elog(ABORT, "pg_ownercheck: type \"%s\" not found", value); owner_id = ((TypeTupleForm) GETSTRUCT(htp))->typowner; break; default: - elog(WARN, "pg_ownercheck: invalid cache id: %d", + elog(ABORT, "pg_ownercheck: invalid cache id: %d", cacheid); break; } @@ -594,7 +594,7 @@ pg_func_ownercheck(char *usename, htp = SearchSysCacheTuple(USENAME, PointerGetDatum(usename), 0, 0, 0); if (!HeapTupleIsValid(htp)) - elog(WARN, "pg_func_ownercheck: user \"%s\" not found", + elog(ABORT, "pg_func_ownercheck: user \"%s\" not found", usename); user_id = (AclId) ((Form_pg_user) GETSTRUCT(htp))->usesysid; @@ -635,7 +635,7 @@ pg_aggr_ownercheck(char *usename, htp = SearchSysCacheTuple(USENAME, PointerGetDatum(usename), 0, 0, 0); if (!HeapTupleIsValid(htp)) - elog(WARN, "pg_aggr_ownercheck: user \"%s\" not found", + elog(ABORT, "pg_aggr_ownercheck: user \"%s\" not found", usename); user_id = (AclId) ((Form_pg_user) GETSTRUCT(htp))->usesysid; diff --git a/src/backend/tcop/fastpath.c b/src/backend/tcop/fastpath.c index b4fb2ebaec4..6a030956993 100644 --- a/src/backend/tcop/fastpath.c +++ b/src/backend/tcop/fastpath.c @@ -7,7 +7,7 @@ * * * IDENTIFICATION - * $Header: /cvsroot/pgsql/src/backend/tcop/fastpath.c,v 1.8 1997/12/06 22:57:03 momjian Exp $ + * $Header: /cvsroot/pgsql/src/backend/tcop/fastpath.c,v 1.9 1998/01/05 03:33:44 momjian Exp $ * * NOTES * This cruft is the server side of PQfn. @@ -199,7 +199,7 @@ update_fp_info(Oid func_id, struct fp_info * fip) * Since the validity of this structure is determined by whether the * funcid is OK, we clear the funcid here. It must not be set to the * correct value until we are about to return with a good struct - * fp_info, since we can be interrupted (i.e., with an elog(WARN, + * fp_info, since we can be interrupted (i.e., with an elog(ABORT, * ...)) at any time. */ MemSet((char *) fip, 0, (int) sizeof(struct fp_info)); @@ -209,7 +209,7 @@ update_fp_info(Oid func_id, struct fp_info * fip) 0, 0, 0); if (!HeapTupleIsValid(func_htp)) { - elog(WARN, "update_fp_info: cache lookup for function %d failed", + elog(ABORT, "update_fp_info: cache lookup for function %d failed", func_id); } pp = (Form_pg_proc) GETSTRUCT(func_htp); @@ -226,7 +226,7 @@ update_fp_info(Oid func_id, struct fp_info * fip) 0, 0, 0); if (!HeapTupleIsValid(type_htp)) { - elog(WARN, "update_fp_info: bad argument type %d for %d", + elog(ABORT, "update_fp_info: bad argument type %d for %d", argtypes[i], func_id); } tp = (TypeTupleForm) GETSTRUCT(type_htp); @@ -241,7 +241,7 @@ update_fp_info(Oid func_id, struct fp_info * fip) 0, 0, 0); if (!HeapTupleIsValid(type_htp)) { - elog(WARN, "update_fp_info: bad return type %d for %d", + elog(ABORT, "update_fp_info: bad return type %d for %d", rettype, func_id); } tp = (TypeTupleForm) GETSTRUCT(type_htp); @@ -267,7 +267,7 @@ update_fp_info(Oid func_id, struct fp_info * fip) * * RETURNS: * nothing of significance. - * All errors result in elog(WARN,...). + * All errors result in elog(ABORT,...). */ int HandleFunctionRequest() @@ -297,7 +297,7 @@ HandleFunctionRequest() if (fip->nargs != nargs) { - elog(WARN, "HandleFunctionRequest: actual arguments (%d) != registered arguments (%d)", + elog(ABORT, "HandleFunctionRequest: actual arguments (%d) != registered arguments (%d)", nargs, fip->nargs); } @@ -328,7 +328,7 @@ HandleFunctionRequest() { /* ... varlena */ if (!(p = palloc(argsize + VARHDRSZ))) { - elog(WARN, "HandleFunctionRequest: palloc failed"); + elog(ABORT, "HandleFunctionRequest: palloc failed"); } VARSIZE(p) = argsize + VARHDRSZ; pq_getnchar(VARDATA(p), 0, argsize); @@ -338,7 +338,7 @@ HandleFunctionRequest() /* XXX cross our fingers and trust "argsize" */ if (!(p = palloc(argsize))) { - elog(WARN, "HandleFunctionRequest: palloc failed"); + elog(ABORT, "HandleFunctionRequest: palloc failed"); } pq_getnchar(p, 0, argsize); } diff --git a/src/backend/tcop/postgres.c b/src/backend/tcop/postgres.c index 42a6bd88546..64b7e99d986 100644 --- a/src/backend/tcop/postgres.c +++ b/src/backend/tcop/postgres.c @@ -7,7 +7,7 @@ * * * IDENTIFICATION - * $Header: /cvsroot/pgsql/src/backend/tcop/postgres.c,v 1.57 1997/12/16 15:57:00 thomas Exp $ + * $Header: /cvsroot/pgsql/src/backend/tcop/postgres.c,v 1.58 1998/01/05 03:33:46 momjian Exp $ * * NOTES * this is the "main" module of the postgres backend and @@ -125,7 +125,7 @@ jmp_buf Warn_restart; sigjmp_buf Warn_restart; #endif /* defined(nextstep) */ -int InWarn; +int InErrorOrAbort; extern int NBuffers; @@ -728,7 +728,7 @@ pg_exec_query_dest(char *query_string,/* string to execute */ * signal handler routines used in PostgresMain() * * handle_warn() is used to catch kill(getpid(),1) which - * occurs when elog(WARN) is called. + * occurs when elog(ABORT) is called. * * quickdie() occurs when signalled by the postmaster. * Some backend has bought the farm, @@ -774,7 +774,7 @@ die(SIGNAL_ARGS) static void FloatExceptionHandler(SIGNAL_ARGS) { - elog(WARN, "floating point exception!" + elog(ABORT, "floating point exception!" " The last floating point operation either exceeded legal ranges" " or was a divide by zero"); } @@ -1343,7 +1343,7 @@ PostgresMain(int argc, char *argv[]) * so that the slaves signal the master to abort the transaction * rather than calling AbortCurrentTransaction() themselves. * - * Note: elog(WARN) causes a kill(getpid(),1) to occur sending + * Note: elog(ABORT) causes a kill(getpid(),1) to occur sending * us back here. * ---------------- */ @@ -1352,7 +1352,7 @@ PostgresMain(int argc, char *argv[]) if (sigsetjmp(Warn_restart, 1) != 0) { - InWarn = 1; + InErrorOrAbort = 1; time(&tim); @@ -1363,7 +1363,7 @@ PostgresMain(int argc, char *argv[]) AbortCurrentTransaction(); } - InWarn = 0; + InErrorOrAbort = 0; /* ---------------- * POSTGRES main processing loop begins here @@ -1372,7 +1372,7 @@ PostgresMain(int argc, char *argv[]) if (IsUnderPostmaster == false) { puts("\nPOSTGRES backend interactive interface"); - puts("$Revision: 1.57 $ $Date: 1997/12/16 15:57:00 $"); + puts("$Revision: 1.58 $ $Date: 1998/01/05 03:33:46 $"); } /* ---------------- @@ -1565,7 +1565,7 @@ PostgresMain(int argc, char *argv[]) break; default: - elog(WARN, "unknown frontend message was recieved"); + elog(ABORT, "unknown frontend message was recieved"); } /* ---------------- diff --git a/src/backend/tcop/pquery.c b/src/backend/tcop/pquery.c index 360f41303e5..cc7517a5a68 100644 --- a/src/backend/tcop/pquery.c +++ b/src/backend/tcop/pquery.c @@ -7,7 +7,7 @@ * * * IDENTIFICATION - * $Header: /cvsroot/pgsql/src/backend/tcop/pquery.c,v 1.11 1997/09/18 20:22:05 momjian Exp $ + * $Header: /cvsroot/pgsql/src/backend/tcop/pquery.c,v 1.12 1998/01/05 03:33:48 momjian Exp $ * *------------------------------------------------------------------------- */ @@ -166,7 +166,7 @@ ProcessPortal(char *portalName, */ if (PortalNameIsSpecial(portalName)) - elog(WARN, + elog(ABORT, "The portal name %s is reserved for internal use", portalName); diff --git a/src/backend/tcop/utility.c b/src/backend/tcop/utility.c index 4ee0c2cd4e0..27b735653e9 100644 --- a/src/backend/tcop/utility.c +++ b/src/backend/tcop/utility.c @@ -9,7 +9,7 @@ * * * IDENTIFICATION - * $Header: /cvsroot/pgsql/src/backend/tcop/utility.c,v 1.33 1998/01/01 05:48:14 thomas Exp $ + * $Header: /cvsroot/pgsql/src/backend/tcop/utility.c,v 1.34 1998/01/05 03:33:49 momjian Exp $ * *------------------------------------------------------------------------- */ @@ -183,24 +183,24 @@ ProcessUtility(Node * parsetree, { relname = strVal(lfirst(arg)); if (IsSystemRelationName(relname)) - elog(WARN, "class \"%s\" is a system catalog", + elog(ABORT, "class \"%s\" is a system catalog", relname); rel = heap_openr(relname); if (RelationIsValid(rel)) { if (stmt->sequence && rel->rd_rel->relkind != RELKIND_SEQUENCE) - elog(WARN, "Use DROP TABLE to drop table '%s'", + elog(ABORT, "Use DROP TABLE to drop table '%s'", relname); if (!(stmt->sequence) && rel->rd_rel->relkind == RELKIND_SEQUENCE) - elog(WARN, "Use DROP SEQUENCE to drop sequence '%s'", + elog(ABORT, "Use DROP SEQUENCE to drop sequence '%s'", relname); heap_close(rel); } #ifndef NO_SECURITY if (!pg_ownercheck(userName, relname, RELNAME)) - elog(WARN, "you do not own class \"%s\"", + elog(ABORT, "you do not own class \"%s\"", relname); #endif } @@ -263,11 +263,11 @@ ProcessUtility(Node * parsetree, relname = stmt->relname; if (IsSystemRelationName(relname)) - elog(WARN, "class \"%s\" is a system catalog", + elog(ABORT, "class \"%s\" is a system catalog", relname); #ifndef NO_SECURITY if (!pg_ownercheck(userName, relname, RELNAME)) - elog(WARN, "you do not own class \"%s\"", + elog(ABORT, "you do not own class \"%s\"", relname); #endif @@ -327,7 +327,7 @@ ProcessUtility(Node * parsetree, { relname = strVal(lfirst(i)); if (!pg_ownercheck(userName, relname, RELNAME)) - elog(WARN, "you do not own class \"%s\"", + elog(ABORT, "you do not own class \"%s\"", relname); } #endif @@ -413,7 +413,7 @@ ProcessUtility(Node * parsetree, relname = stmt->object->relname; aclcheck_result = pg_aclcheck(relname, userName, ACL_RU); if (aclcheck_result != ACLCHECK_OK) - elog(WARN, "%s: %s", relname, aclcheck_error_strings[aclcheck_result]); + elog(ABORT, "%s: %s", relname, aclcheck_error_strings[aclcheck_result]); #endif commandTag = "CREATE"; CHECK_IF_ABORTED(); @@ -453,11 +453,11 @@ ProcessUtility(Node * parsetree, case INDEX: relname = stmt->name; if (IsSystemRelationName(relname)) - elog(WARN, "class \"%s\" is a system catalog index", + elog(ABORT, "class \"%s\" is a system catalog index", relname); #ifndef NO_SECURITY if (!pg_ownercheck(userName, relname, RELNAME)) - elog(WARN, "%s: %s", relname, aclcheck_error_strings[ACLCHECK_NOT_OWNER]); + elog(ABORT, "%s: %s", relname, aclcheck_error_strings[ACLCHECK_NOT_OWNER]); #endif RemoveIndex(relname); break; @@ -472,7 +472,7 @@ ProcessUtility(Node * parsetree, aclcheck_result = pg_aclcheck(relationName, userName, ACL_RU); if (aclcheck_result != ACLCHECK_OK) { - elog(WARN, "%s: %s", relationName, aclcheck_error_strings[aclcheck_result]); + elog(ABORT, "%s: %s", relationName, aclcheck_error_strings[aclcheck_result]); } #endif RemoveRewriteRule(rulename); @@ -494,7 +494,7 @@ ProcessUtility(Node * parsetree, ruleName = MakeRetrieveViewRuleName(viewName); relationName = RewriteGetRuleEventRel(ruleName); if (!pg_ownercheck(userName, relationName, RELNAME)) - elog(WARN, "%s: %s", relationName, aclcheck_error_strings[ACLCHECK_NOT_OWNER]); + elog(ABORT, "%s: %s", relationName, aclcheck_error_strings[ACLCHECK_NOT_OWNER]); pfree(ruleName); #endif RemoveView(viewName); @@ -546,7 +546,7 @@ ProcessUtility(Node * parsetree, case T_VersionStmt: { - elog(WARN, "CREATE VERSION is not currently implemented"); + elog(ABORT, "CREATE VERSION is not currently implemented"); } break; @@ -609,7 +609,7 @@ ProcessUtility(Node * parsetree, filename = stmt->filename; closeAllVfds(); if ((fp = AllocateFile(filename, "r")) == NULL) - elog(WARN, "LOAD: could not open file %s", filename); + elog(ABORT, "LOAD: could not open file %s", filename); FreeFile(fp); load_file(filename); } @@ -754,7 +754,7 @@ ProcessUtility(Node * parsetree, * */ default: - elog(WARN, "ProcessUtility: command #%d unsupported", + elog(ABORT, "ProcessUtility: command #%d unsupported", nodeTag(parsetree)); break; } diff --git a/src/backend/tcop/variable.c b/src/backend/tcop/variable.c index 6834c10eb7d..c6fe6244933 100644 --- a/src/backend/tcop/variable.c +++ b/src/backend/tcop/variable.c @@ -2,7 +2,7 @@ * Routines for handling of 'SET var TO', * 'SHOW var' and 'RESET var' statements. * - * $Id: variable.c,v 1.24 1997/12/04 23:17:13 thomas Exp $ + * $Id: variable.c,v 1.25 1998/01/05 03:33:50 momjian Exp $ * */ @@ -53,7 +53,7 @@ get_token(char **tok, char **val, const char *str) while (isspace(*str)) str++; if (*str == ',' || *str == '=') - elog(WARN, "Syntax error near (%s): empty setting", str); + elog(ABORT, "Syntax error near (%s): empty setting", str); /* end of string? then return NULL */ if (!(*str)) @@ -94,7 +94,7 @@ get_token(char **tok, char **val, const char *str) } else if ((val == NULL) || (*str != '=')) { - elog(WARN, "Syntax error near (%s)", str); + elog(ABORT, "Syntax error near (%s)", str); }; str++; /* '=': get value */ @@ -105,7 +105,7 @@ get_token(char **tok, char **val, const char *str) str++; if (*str == ',' || !(*str)) - elog(WARN, "Syntax error near (=%s)", str); + elog(ABORT, "Syntax error near (=%s)", str); start = str; @@ -131,7 +131,7 @@ get_token(char **tok, char **val, const char *str) if (*str == ',') return (++str); - elog(WARN, "Syntax error near (%s)", str); + elog(ABORT, "Syntax error near (%s)", str); return str; } @@ -172,10 +172,10 @@ parse_geqo(const char *value) rest = get_token(&tok, &val, value); if (tok == NULL) - elog(WARN, "Value undefined"); + elog(ABORT, "Value undefined"); if ((rest) && (*rest != '\0')) - elog(WARN, "Unable to parse '%s'", value); + elog(ABORT, "Unable to parse '%s'", value); if (strcasecmp(tok, "on") == 0) { @@ -185,7 +185,7 @@ parse_geqo(const char *value) { geqo_rels = pg_atoi(val, sizeof(int32), '\0'); if (geqo_rels <= 1) - elog(WARN, "Bad value for # of relations (%s)", val); + elog(ABORT, "Bad value for # of relations (%s)", val); PFREE(val); } _use_geqo_ = true; @@ -194,11 +194,11 @@ parse_geqo(const char *value) else if (strcasecmp(tok, "off") == 0) { if ((val != NULL) && (*val != '\0')) - elog(WARN, "%s does not allow a parameter", tok); + elog(ABORT, "%s does not allow a parameter", tok); _use_geqo_ = false; } else - elog(WARN, "Bad value for GEQO (%s)", value); + elog(ABORT, "Bad value for GEQO (%s)", value); PFREE(tok); return TRUE; @@ -242,7 +242,7 @@ parse_r_plans(const char *value) else if (strcasecmp(value, "off") == 0) _use_right_sided_plans_ = false; else - elog(WARN, "Bad value for Right-sided Plans (%s)", value); + elog(ABORT, "Bad value for Right-sided Plans (%s)", value); return TRUE; } @@ -392,7 +392,7 @@ parse_date(const char *value) } else { - elog(WARN, "Bad value for date style (%s)", tok); + elog(ABORT, "Bad value for date style (%s)", tok); } PFREE(tok); } @@ -490,7 +490,7 @@ parse_timezone(const char *value) strcpy(tzbuf, "TZ="); strcat(tzbuf, tok); if (putenv(tzbuf) != 0) - elog(WARN, "Unable to set TZ environment variable to %s", tok); + elog(ABORT, "Unable to set TZ environment variable to %s", tok); tzset(); PFREE(tok); @@ -528,13 +528,13 @@ reset_timezone() strcpy(tzbuf, "TZ="); strcat(tzbuf, TZvalue); if (putenv(tzbuf) != 0) - elog(WARN, "Unable to set TZ environment variable to %s", TZvalue); + elog(ABORT, "Unable to set TZ environment variable to %s", TZvalue); } else { strcpy(tzbuf, "="); if (putenv(tzbuf) != 0) - elog(WARN, "Unable to clear TZ environment variable", NULL); + elog(ABORT, "Unable to clear TZ environment variable", NULL); } tzset(); |