bitmap scan cause core dump 8.1dev - Mailing list pgsql-hackers

From Oleg Bartunov
Subject bitmap scan cause core dump 8.1dev
Date
Msg-id Pine.GSO.4.63.0508271713430.16397@ra.sai.msu.su
Whole thread Raw
Responses Re: bitmap scan cause core dump 8.1dev  (Michael Fuhr <mike@fuhr.org>)
Re: bitmap scan cause core dump 8.1dev  (Tom Lane <tgl@sss.pgh.pa.us>)
List pgsql-hackers
This message is in MIME format.  The first part should be readable text, while the remaining parts are likely
unreadablewithout MIME-aware tools.
 

---559023410-560155114-1125148906=:16397
Content-Type: TEXT/PLAIN; charset=koi8-r; format=flowed
Content-Transfer-Encoding: 8BIT

Hi there,

I finally narrow down my problem with postmaster crashing 8.1dev 
(today's CVS):

This query works as expected:
# select  name_qualified from place
where fts_index @@ to_tsquery('moscow');

This query (essentially the same as above) crashes:
# select  name_qualified from place, to_tsquery('moscow') as query 
where fts_index @@ query;

When I disable bitmap scanning (set enable_bitmapscan=off)
second query works fine.

gdb output:

#0  ExecEvalVar (exprstate=0x1, econtext=0x0,    isNull=0xbfffe1cb
"\b╟╠<\b╦╡<\b\210╡<\b\bБЪ©Б>\025\b╦╡<\b\210╡<\b<╡<\b\001",isDone=0x0) at execQual.c:486
 
#1  0x0814c345 in ExecEvalExprSwitchContext (expression=0x0, econtext=0x0,    isNull=0x1 <Address 0x1 out of bounds>,
isDone=0x1)at execQual.c:2808
 
#2  0x08155f0e in ExecIndexEvalRuntimeKeys (econtext=0x83cb2b8,    run_keys=0x83cb288, scan_keys=0x83cb23c, n_keys=1)
atnodeIndexscan.c:270
 
#3  0x08153ee2 in ExecBitmapIndexReScan (node=0x83a31c8, exprCtxt=0x1)    at nodeBitmapIndexscan.c:146
#4  0x0814498f in ExecReScan (node=0x83cb1b0, exprCtxt=0x83ca1e8)    at execAmi.c:131
#5  0x081449a6 in ExecReScan (node=0x83ca730, exprCtxt=0x83ca1e8)    at execAmi.c:135
#6  0x08157b6b in ExecNestLoop (node=0x83ca15c) at nodeNestloop.c:163
#7  0x081483cd in ExecProcNode (node=0x83ca15c) at execProcnode.c:350
#8  0x0814698c in ExecutePlan (estate=0x83c9ec4, planstate=0x83ca15c,    operation=CMD_SELECT, numberTuples=0,
direction=ForwardScanDirection,   dest=0x8320fbc) at execMain.c:1107
 
#9  0x08145b0b in ExecutorRun (queryDesc=0x83c99fc,    direction=ForwardScanDirection, count=1) at execMain.c:231
#10 0x08113548 in ExplainOnePlan (queryDesc=0x83c99fc, stmt=0x83b8570,    tstate=0x83cf694) at explain.c:240
#11 0x08113040 in ExplainOneQuery (query=0x83cec44, stmt=0x83b8570,    tstate=0xbfffe3e0) at explain.c:205
#12 0x08112ea2 in ExplainQuery (stmt=0xbfffe3e0, dest=0x1) at explain.c:121
#13 0x081da5b3 in PortalRunUtility (portal=0x83c028c, query=0x83b7ffc,    dest=0x83cebec, completionTag=0x0) at
pquery.c:991
#14 0x081d9ff8 in PortalRun (portal=0x83c028c, count=2147483647,    dest=0x83b85bc, altdest=0x83b85bc,
completionTag=0xbfffe610"")    at pg_list.h:81
 
#15 0x081d5b5b in exec_simple_query (    query_string=0x83b7de4 "explain analyze select  name_qualified from place,
to_tsquery('moscow')as query where fts_index @@ query;") at postgres.c:1017
 
#16 0x081d8798 in PostgresMain (argc=4, argv=0x8364c44,    username=0x8364c1c "megera") at postgres.c:3157
#17 0x081acc82 in BackendRun (port=0x837d1a8) at postmaster.c:2864
#18 0x081ac670 in BackendStartup (port=0x837d1a8) at postmaster.c:2505
#19 0x081aa910 in ServerLoop () at postmaster.c:1232
#20 0x081a9c59 in PostmasterMain (argc=1, argv=0x83633d0) at postmaster.c:941
#21 0x0816710e in main (argc=1, argv=0x83633d0) at main.c:268
#22 0x400edd06 in __libc_start_main () from /lib/libc.so.6


    Regards,        Oleg
_____________________________________________________________
Oleg Bartunov, sci.researcher, hostmaster of AstroNet,
Sternberg Astronomical Institute, Moscow University (Russia)
Internet: oleg@sai.msu.su, http://www.sai.msu.su/~megera/
phone: +007(095)939-16-83, +007(095)939-23-83
---559023410-560155114-1125148906=:16397--


pgsql-hackers by date:

Previous
From: "Andrew Dunstan"
Date:
Subject: Re: Call for 7.5 feature completion
Next
From: Bruce Momjian
Date:
Subject: Re: Typmod for user-defined types