Re: Injection points: preloading and runtime arguments - Mailing list pgsql-hackers

From Andrey M. Borodin
Subject Re: Injection points: preloading and runtime arguments
Date
Msg-id FDA1B5E9-5C29-46B8-BEB9-09546343ED2C@yandex-team.ru
Whole thread Raw
In response to Re: Injection points: preloading and runtime arguments  (Michael Paquier <michael@paquier.xyz>)
Responses Re: Injection points: preloading and runtime arguments
List pgsql-hackers

> On 18 Jul 2024, at 03:55, Michael Paquier <michael@paquier.xyz> wrote:
>
> If there is anything else you would like to see adjusted in this area,
> please let me know.

I’ve tried to switch my multixact test to new INJECTION_POINT_CACHED… and it does not work for me. Could you please
takea look? 

2024-08-02 18:52:32.244 MSK [53155] 001_multixact.pl LOG:  statement: select test_create_multixact();
TRAP: failed Assert("CritSectionCount == 0 || (context)->allowInCritSection"), File: "mcxt.c", Line: 1186, PID: 53155
0   postgres                            0x00000001031212f0 ExceptionalCondition + 236
1   postgres                            0x000000010317a01c MemoryContextAlloc + 240
2   postgres                            0x0000000102e66158 dsm_create_descriptor + 80
3   postgres                            0x0000000102e66474 dsm_attach + 416
4   postgres                            0x000000010316c264 dsa_attach + 24
5   postgres                            0x0000000102e69994 init_dsm_registry + 256
6   postgres                            0x0000000102e6965c GetNamedDSMSegment + 492
7   injection_points.dylib              0x000000010388f2cc injection_init_shmem + 68
8   injection_points.dylib              0x000000010388efbc injection_wait + 72
9   postgres                            0x00000001031606bc InjectionPointCached + 72
10  postgres                            0x00000001028ffc70 MultiXactIdCreateFromMembers + 360
11  postgres                            0x00000001028ffac8 MultiXactIdCreate + 344
12  test_slru.dylib                     0x000000010376fa04 test_create_multixact + 52


The test works fine with SQL interface “select injection_points_load('get-new-multixact-id');”.
Thanks!


Best regards, Andrey Borodin.

Attachment

pgsql-hackers by date:

Previous
From: Matthias van de Meent
Date:
Subject: Re: Parallel CREATE INDEX for GIN indexes
Next
From: Robert Haas
Date:
Subject: Re: On disable_cost