Thread: Re: pltcl.so patch

Re: pltcl.so patch

From
"Nigel J. Andrews"
Date:

In answer to the question posed at the end of the message below:

Yes, I do get the similar results.

A quick investigation shows that the SPI_freetuptable at the end of
pltcl_SPI_exec is trying to free a tuptable of value 0x82ebe64 (which looks
sensible to me) but which has a memory context of 0x7f7f7f7f (the unallocated
marker).

Briefly following through to check this value shows that as long as I have
CLOBBER_FREED_MEMORY defined, which I presume I do having configured with
--debug, this value is also consistent with the tuptable having been freed
before this faulting invocation.

I haven't looked too closely yet but at a glance I can't see what could be
going wrong with the exception that the tuptable is freed even if zero rows are
returned by SPI_exec. That and I'm not sure what that $T(id) thing is doing in
the SQL submited to pltcl_SPI_exec. Oh 'eck, I've been reading that test
function wrong, it's got a level of nesting.

Unfortunately, I am currently trying to throw together a quick demo of
something at the moment so can't investigate too fully for the next day or so.
If someone wants to pick this up feel free otherwise I'll look into it later.


--
Nigel J. Andrews


On Tue, 24 Sep 2002, Ian Harding wrote to me:

> First, thank you very much for working on this issue.  Pltcl is extremely important to me right now, and this memory
leakis cramping my style a bit.
 
> 
> I applied the patch you sent to my pltcl.c (I am at version 7.2.1, but it seems to apply fine...)  It builds fine,
psqlstarts fine, but my test function still blows up dramatically.
 
> 
> Here is the script I am using:
> 
> drop function memleak();
> create function memleak() returns int as '
> 
>         for {set i 1} {$i < 100} {incr i} {
>                 set sql "select ''foo''"
>                 spi_exec "$sql"
>         }
> 
> 
> ' language 'pltcl';
> 
> drop table testable;
> create table testable (
>         id int,
>         data text);
> 
> insert into testable values (1, 'foobar');
> insert into testable values (2, 'foobar');
> insert into testable values (3, 'foobar');
> insert into testable values (4, 'foobar');
> insert into testable values (5, 'foobar');
> insert into testable values (6, 'foobar');
> 
> drop function memleak(int);
> create function memleak(int) returns int as '
> 
> set sql "select * From testable"
> spi_exec -array T "$sql" {
> 
>         for {set i 1} {$i < 100} {incr i} {
>                 set sql "select * from testable where id = $T(id)"
>                 spi_exec "$sql"
>         }
> }
> ' language 'pltcl';
> 
> Here is what happens:
> 
> bash-2.05# psql -U iharding test < testfunction
> DROP
> CREATE
> ERROR:  table "testable" does not exist
> CREATE
> INSERT 118942676 1
> INSERT 118942677 1
> INSERT 118942678 1
> INSERT 118942679 1
> INSERT 118942680 1
> INSERT 118942681 1
> DROP
> CREATE
> bash-2.05# psql -U iharding test
> Welcome to psql, the PostgreSQL interactive terminal.
> 
> Type:  \copyright for distribution terms
>        \h for help with SQL commands
>        \? for help on internal slash commands
>        \g or terminate with semicolon to execute query
>        \q to quit
> 
> test=# select memleak();
>  memleak
> ---------
>        0
> (1 row)
> 
> test=# select memleak(1);
> server closed the connection unexpectedly
>         This probably means the server terminated abnormally
>         before or while processing the request.
> The connection to the server was lost. Attempting reset: Failed.
> !#
> 
> 
> Here is the end of the log:
> 
> DEBUG:  server process (pid 1992) was terminated by signal 11
> DEBUG:  terminating any other active server processes
> DEBUG:  all server processes terminated; reinitializing shared memory and semaphores
> IpcMemoryCreate: shmget(key=5432001, size=29769728, 03600) failed: Cannot allocate memory
> 
> This error usually means that PostgreSQL's request for a shared
> ...
>
>
> Do you have similar results?




Re: pltcl.so patch

From
Neil Conway
Date:
"Nigel J. Andrews" <nandrews@investsystems.co.uk> writes:
> Yes, I do get the similar results.
>
> A quick investigation shows that the SPI_freetuptable at the end of
> pltcl_SPI_exec is trying to free a tuptable of value 0x82ebe64
> (which looks sensible to me) but which has a memory context of
> 0x7f7f7f7f (the unallocated marker).

Attached is a patch against CVS HEAD which fixes this, I believe. The
problem appears to be the newly added free of the tuptable at the end
of pltcl_SPI_exec(). I've added a comment to that effect:

    /*
     * Do *NOT* free the tuptable here. That's because if the loop
     * body executed any SQL statements, it will have already free'd
     * the tuptable itself, so freeing it twice is not wise. We could
     * get around this by making a copy of SPI_tuptable->vals and
     * feeding that to pltcl_set_tuple_values above, but that would
     * still leak memory (the palloc'ed copy would only be free'd on
     * context reset).
     */

At least, I *think* that's the problem -- I've only been looking at
the code for about 20 minutes, so I may be wrong. In any case, this
makes both memleak() and memleak(1) work on my machine. Let me know if
it works for you, and/or if someone knows of a better solution.

I also added some SPI_freetuptable() calls in some places where Nigel
didn't, and added some paranoia when dealing with statically sized
buffers (snprintf() rather than sprintf(), and so on). I also didn't
include Nigel's changes to some apparently unrelated PL/Python stuff
-- this patch includes only the PL/Tcl changes.

Cheers,

Neil

--
Neil Conway <neilc@samurai.com> || PGP Key ID: DB3C29FC

Attachment

Re: pltcl.so patch

From
"Nigel J. Andrews"
Date:
On 25 Sep 2002, Neil Conway wrote:

> "Nigel J. Andrews" <nandrews@investsystems.co.uk> writes:
> > Yes, I do get the similar results.
> > 
> > A quick investigation shows that the SPI_freetuptable at the end of
> > pltcl_SPI_exec is trying to free a tuptable of value 0x82ebe64
> > (which looks sensible to me) but which has a memory context of
> > 0x7f7f7f7f (the unallocated marker).
> 
> Attached is a patch against CVS HEAD which fixes this, I believe. The
> problem appears to be the newly added free of the tuptable at the end
> of pltcl_SPI_exec(). I've added a comment to that effect:
> 
>     /*
>      * Do *NOT* free the tuptable here. That's because if the loop
>      * body executed any SQL statements, it will have already free'd
>      * the tuptable itself, so freeing it twice is not wise. We could
>      * get around this by making a copy of SPI_tuptable->vals and
>      * feeding that to pltcl_set_tuple_values above, but that would
>      * still leak memory (the palloc'ed copy would only be free'd on
>      * context reset).
>      */

That's certainly where the fault was happening. However, that's where the
original memory leak problem was coming from (without the SPI_freetuptable
call). It could be I got that fix wrong and the extra calls you've added are
the right fix for that. I'll take a look to see what I can learn later.

> At least, I *think* that's the problem -- I've only been looking at
> the code for about 20 minutes, so I may be wrong. In any case, this
> makes both memleak() and memleak(1) work on my machine. Let me know if
> it works for you, and/or if someone knows of a better solution.

I'll have to check later.

> 
> I also added some SPI_freetuptable() calls in some places where Nigel
> didn't, and added some paranoia when dealing with statically sized
> buffers (snprintf() rather than sprintf(), and so on). I also didn't
> include Nigel's changes to some apparently unrelated PL/Python stuff
> -- this patch includes only the PL/Tcl changes.

I dare say the plpython needs to be checked by someone who knows how to since I
can well imagine the same nested call fault will exist there.


-- 
Nigel J. Andrews



Re: pltcl.so patch

From
"Nigel J. Andrews"
Date:

Okay, I've looked again at spi_exec and I believe I can fix the bug I
introduced and the memory leak. However, I have only looked quickly and not
made these most recent changes to the execp version nor to the plpython
code. Therefore I am not attaching a patch at the moment, just mentioning that
I've straightened this out in my brain a bit more.


On Wed, 25 Sep 2002, Nigel J. Andrews wrote:

> On 25 Sep 2002, Neil Conway wrote:
> 
> > "Nigel J. Andrews" <nandrews@investsystems.co.uk> writes:
> > > Yes, I do get the similar results.
> > > 
> > > A quick investigation shows that the SPI_freetuptable at the end of
> > > pltcl_SPI_exec is trying to free a tuptable of value 0x82ebe64
> > > (which looks sensible to me) but which has a memory context of
> > > 0x7f7f7f7f (the unallocated marker).
> > 
> > Attached is a patch against CVS HEAD which fixes this, I believe. The
> > problem appears to be the newly added free of the tuptable at the end
> > of pltcl_SPI_exec(). I've added a comment to that effect:
> > 
> >     /*
> >      * Do *NOT* free the tuptable here. That's because if the loop
> >      * body executed any SQL statements, it will have already free'd
> >      * the tuptable itself, so freeing it twice is not wise. We could
> >      * get around this by making a copy of SPI_tuptable->vals and
> >      * feeding that to pltcl_set_tuple_values above, but that would
> >      * still leak memory (the palloc'ed copy would only be free'd on
> >      * context reset).
> >      */
> 
> That's certainly where the fault was happening. However, that's where the
> original memory leak problem was coming from (without the SPI_freetuptable
> call). It could be I got that fix wrong and the extra calls you've added are
> the right fix for that. I'll take a look to see what I can learn later.
> 
> > At least, I *think* that's the problem -- I've only been looking at
> > the code for about 20 minutes, so I may be wrong. In any case, this
> > makes both memleak() and memleak(1) work on my machine. Let me know if
> > it works for you, and/or if someone knows of a better solution.
> 
> I'll have to check later.
> 
> > 
> > I also added some SPI_freetuptable() calls in some places where Nigel
> > didn't, and added some paranoia when dealing with statically sized
> > buffers (snprintf() rather than sprintf(), and so on). I also didn't
> > include Nigel's changes to some apparently unrelated PL/Python stuff
> > -- this patch includes only the PL/Tcl changes.
> 
> I dare say the plpython needs to be checked by someone who knows how to since I
> can well imagine the same nested call fault will exist there.
> 
> 
> 

-- 
Nigel J. Andrews




Re: pltcl.so patch

From
Bruce Momjian
Date:
Oh, so this is the later version.  Fine.  Let me know when it is ready.

---------------------------------------------------------------------------

Nigel J. Andrews wrote:
> 
> 
> Okay, I've looked again at spi_exec and I believe I can fix the bug I
> introduced and the memory leak. However, I have only looked quickly and not
> made these most recent changes to the execp version nor to the plpython
> code. Therefore I am not attaching a patch at the moment, just mentioning that
> I've straightened this out in my brain a bit more.
> 
> 
> On Wed, 25 Sep 2002, Nigel J. Andrews wrote:
> 
> > On 25 Sep 2002, Neil Conway wrote:
> > 
> > > "Nigel J. Andrews" <nandrews@investsystems.co.uk> writes:
> > > > Yes, I do get the similar results.
> > > > 
> > > > A quick investigation shows that the SPI_freetuptable at the end of
> > > > pltcl_SPI_exec is trying to free a tuptable of value 0x82ebe64
> > > > (which looks sensible to me) but which has a memory context of
> > > > 0x7f7f7f7f (the unallocated marker).
> > > 
> > > Attached is a patch against CVS HEAD which fixes this, I believe. The
> > > problem appears to be the newly added free of the tuptable at the end
> > > of pltcl_SPI_exec(). I've added a comment to that effect:
> > > 
> > >     /*
> > >      * Do *NOT* free the tuptable here. That's because if the loop
> > >      * body executed any SQL statements, it will have already free'd
> > >      * the tuptable itself, so freeing it twice is not wise. We could
> > >      * get around this by making a copy of SPI_tuptable->vals and
> > >      * feeding that to pltcl_set_tuple_values above, but that would
> > >      * still leak memory (the palloc'ed copy would only be free'd on
> > >      * context reset).
> > >      */
> > 
> > That's certainly where the fault was happening. However, that's where the
> > original memory leak problem was coming from (without the SPI_freetuptable
> > call). It could be I got that fix wrong and the extra calls you've added are
> > the right fix for that. I'll take a look to see what I can learn later.
> > 
> > > At least, I *think* that's the problem -- I've only been looking at
> > > the code for about 20 minutes, so I may be wrong. In any case, this
> > > makes both memleak() and memleak(1) work on my machine. Let me know if
> > > it works for you, and/or if someone knows of a better solution.
> > 
> > I'll have to check later.
> > 
> > > 
> > > I also added some SPI_freetuptable() calls in some places where Nigel
> > > didn't, and added some paranoia when dealing with statically sized
> > > buffers (snprintf() rather than sprintf(), and so on). I also didn't
> > > include Nigel's changes to some apparently unrelated PL/Python stuff
> > > -- this patch includes only the PL/Tcl changes.
> > 
> > I dare say the plpython needs to be checked by someone who knows how to since I
> > can well imagine the same nested call fault will exist there.
> > 
> > 
> > 
> 
> -- 
> Nigel J. Andrews
> 
> 
> 
> ---------------------------(end of broadcast)---------------------------
> TIP 2: you can get off all lists at once with the unregister command
>     (send "unregister YourEmailAddressHere" to majordomo@postgresql.org)
> 

--  Bruce Momjian                        |  http://candle.pha.pa.us pgman@candle.pha.pa.us               |  (610)
359-1001+  If your life is a hard drive,     |  13 Roberts Road +  Christ can be your backup.        |  Newtown Square,
Pennsylvania19073