Re: pg_autovacuum w/ dbt2 - Mailing list pgsql-hackers
From | Mark Wong |
---|---|
Subject | Re: pg_autovacuum w/ dbt2 |
Date | |
Msg-id | 20050112154429.E2586@osdl.org Whole thread Raw |
In response to | Re: pg_autovacuum w/ dbt2 (Tom Lane <tgl@sss.pgh.pa.us>) |
Responses |
Re: pg_autovacuum w/ dbt2
|
List | pgsql-hackers |
On Tue, Dec 21, 2004 at 05:56:47PM -0500, Tom Lane wrote: > If you want to track it yourself, please change those elog(ERROR)s to > elog(PANIC) so that they'll generate core dumps, then build with > --enable-debug if you didn't already (--enable-cassert would be good too) > and get a debugger stack trace from the core dump. Ok, well I got a core dump with 8.0rc4, but I'm not sure if it's exactly the same problem. I have the postgres binary and the core here:http://developer.osdl.org/markw/pgsql/core/2files.tar.bz2 But it's for ia64, if you got one. Otherwise, this is what gdb is telling me with a bt: (gdb) bt #0 FunctionCall2 (flinfo=0x6000000000187850, arg1=16, arg2=1043) at fmgr.c:1141 #1 0x400000000007a320 in _bt_checkkeys (scan=0x60000000000c2d80, tuple=0x200000000101f660, dir=ForwardScanDirection, continuescan=0x60000fffffff8ae0 "\001") at nbtutils.c:542 #2 0x4000000000078eb0 in _bt_endpoint (scan=0x6000000000187690, dir=ForwardScanDirection) at nbtsearch.c:1309 #3 0x40000000000771e0 in _bt_first (scan=0x6000000000187690, dir=ForwardScanDirection) at nbtsearch.c:482 #4 0x4000000000074350 in btgettuple (fcinfo=0x1) at nbtree.c:265 #5 0x40000000003bd430 in FunctionCall2 (flinfo=0x6000000000187700, arg1=6917529027642685072, arg2=1) at fmgr.c:1141 #6 0x400000000006b3a0 in index_getnext (scan=0x6000000000187690, direction=ForwardScanDirection) at indexam.c:429 #7 0x400000000006a1e0 in systable_getnext (sysscan=0x6000000000187668) at genam.c:253 #8 0x400000000039c970 in SearchCatCache (cache=0x200000001f1e0140, v1=0, v2=6917529027641871376, v3=4294966252, v4=6917546619827097184) at catcache.c:1217 #9 0x40000000003a9ee0 in SearchSysCache (cacheId=33, key1=1043, key2=0, key3=0, key4=0) at syscache.c:524 #10 0x4000000000049110 in TupleDescInitEntry (desc=0x60000000001872c8, attributeNumber=4, attributeName=0x6000000000187614"\023\004", oidtypeid=1043, typmod=28, attdim=0) at tupdesc.c:444 #11 0x40000000001b5fc0 in ExecTypeFromTLInternal ( targetList=0x6000000000135d40, hasoid=-64 'À', skipjunk=1 '\001') at execTuples.c:570 #12 0x40000000001a4a20 in ExecInitJunkFilter (targetList=0x6000000000135b38, hasoid=-64 'À', slot=0x60000000001258a0)at execJunk.c:76 #13 0x40000000001a6890 in InitPlan (queryDesc=0x6000000000177ed0, explainOnly=0 '\0') at execMain.c:456 #14 0x40000000001a5800 in ExecutorStart (queryDesc=0x6000000000177ed0, explainOnly=0 '\0') at execMain.c:160 #15 0x40000000001d6ab0 in _SPI_pquery (queryDesc=0x6000000000177ed0, tcount=0) at spi.c:1521 #16 0x40000000001d6390 in _SPI_execute_plan (plan=0x60000fffffff9380, Values=0x0, Nulls=0x0, snapshot=0x0, crosscheck_snapshot=0x0, read_only=0 '\0', tcount=0) at spi.c:1452
pgsql-hackers by date: