bitmap scan cause core dump 8.1dev - Mailing list pgsql-hackers
From | Oleg Bartunov |
---|---|
Subject | bitmap scan cause core dump 8.1dev |
Date | |
Msg-id | Pine.GSO.4.63.0508271713430.16397@ra.sai.msu.su Whole thread Raw |
Responses |
Re: bitmap scan cause core dump 8.1dev
Re: bitmap scan cause core dump 8.1dev |
List | pgsql-hackers |
This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadablewithout MIME-aware tools. ---559023410-560155114-1125148906=:16397 Content-Type: TEXT/PLAIN; charset=koi8-r; format=flowed Content-Transfer-Encoding: 8BIT Hi there, I finally narrow down my problem with postmaster crashing 8.1dev (today's CVS): This query works as expected: # select name_qualified from place where fts_index @@ to_tsquery('moscow'); This query (essentially the same as above) crashes: # select name_qualified from place, to_tsquery('moscow') as query where fts_index @@ query; When I disable bitmap scanning (set enable_bitmapscan=off) second query works fine. gdb output: #0 ExecEvalVar (exprstate=0x1, econtext=0x0, isNull=0xbfffe1cb "\b╟╠<\b╦╡<\b\210╡<\b\bБЪ©Б>\025\b╦╡<\b\210╡<\b<╡<\b\001",isDone=0x0) at execQual.c:486 #1 0x0814c345 in ExecEvalExprSwitchContext (expression=0x0, econtext=0x0, isNull=0x1 <Address 0x1 out of bounds>, isDone=0x1)at execQual.c:2808 #2 0x08155f0e in ExecIndexEvalRuntimeKeys (econtext=0x83cb2b8, run_keys=0x83cb288, scan_keys=0x83cb23c, n_keys=1) atnodeIndexscan.c:270 #3 0x08153ee2 in ExecBitmapIndexReScan (node=0x83a31c8, exprCtxt=0x1) at nodeBitmapIndexscan.c:146 #4 0x0814498f in ExecReScan (node=0x83cb1b0, exprCtxt=0x83ca1e8) at execAmi.c:131 #5 0x081449a6 in ExecReScan (node=0x83ca730, exprCtxt=0x83ca1e8) at execAmi.c:135 #6 0x08157b6b in ExecNestLoop (node=0x83ca15c) at nodeNestloop.c:163 #7 0x081483cd in ExecProcNode (node=0x83ca15c) at execProcnode.c:350 #8 0x0814698c in ExecutePlan (estate=0x83c9ec4, planstate=0x83ca15c, operation=CMD_SELECT, numberTuples=0, direction=ForwardScanDirection, dest=0x8320fbc) at execMain.c:1107 #9 0x08145b0b in ExecutorRun (queryDesc=0x83c99fc, direction=ForwardScanDirection, count=1) at execMain.c:231 #10 0x08113548 in ExplainOnePlan (queryDesc=0x83c99fc, stmt=0x83b8570, tstate=0x83cf694) at explain.c:240 #11 0x08113040 in ExplainOneQuery (query=0x83cec44, stmt=0x83b8570, tstate=0xbfffe3e0) at explain.c:205 #12 0x08112ea2 in ExplainQuery (stmt=0xbfffe3e0, dest=0x1) at explain.c:121 #13 0x081da5b3 in PortalRunUtility (portal=0x83c028c, query=0x83b7ffc, dest=0x83cebec, completionTag=0x0) at pquery.c:991 #14 0x081d9ff8 in PortalRun (portal=0x83c028c, count=2147483647, dest=0x83b85bc, altdest=0x83b85bc, completionTag=0xbfffe610"") at pg_list.h:81 #15 0x081d5b5b in exec_simple_query ( query_string=0x83b7de4 "explain analyze select name_qualified from place, to_tsquery('moscow')as query where fts_index @@ query;") at postgres.c:1017 #16 0x081d8798 in PostgresMain (argc=4, argv=0x8364c44, username=0x8364c1c "megera") at postgres.c:3157 #17 0x081acc82 in BackendRun (port=0x837d1a8) at postmaster.c:2864 #18 0x081ac670 in BackendStartup (port=0x837d1a8) at postmaster.c:2505 #19 0x081aa910 in ServerLoop () at postmaster.c:1232 #20 0x081a9c59 in PostmasterMain (argc=1, argv=0x83633d0) at postmaster.c:941 #21 0x0816710e in main (argc=1, argv=0x83633d0) at main.c:268 #22 0x400edd06 in __libc_start_main () from /lib/libc.so.6 Regards, Oleg _____________________________________________________________ Oleg Bartunov, sci.researcher, hostmaster of AstroNet, Sternberg Astronomical Institute, Moscow University (Russia) Internet: oleg@sai.msu.su, http://www.sai.msu.su/~megera/ phone: +007(095)939-16-83, +007(095)939-23-83 ---559023410-560155114-1125148906=:16397--
pgsql-hackers by date: