Bugs item #2852707, was opened at 2009-09-06 03:24
Message generated for change (Comment added) made by mlkersten
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=482468&aid=2852707&group_id=56967
Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: Core
Group: MonetDB5 "stable"
Status: Open
Resolution: None
Priority: 5
Private: No
Submitted By: Stefan de Konink (skinkie)
Assigned to: Martin Kersten (mlkersten)
Summary: non existing mal function segv
Initial Comment:
Entering on the MonetDB server:
user.main();
Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 0x7faf8fe906f0 (LWP 15035)]
0x00007faf8f99ca60 in runMALsequence (cntxt=Cannot access memory at address
0x7fff7d7db5a8
) at ../../../src/mal/mal_interpreter.mx:415
415 {
(gdb) bt
#0 0x00007faf8f99ca60 in runMALsequence (cntxt=Cannot access memory at address
0x7fff7d7db5a8
) at ../../../src/mal/mal_interpreter.mx:415
#1 0x00007faf8f99bf06 in runMAL (cntxt=0x605560, mb=0x15960a8, startpc=1,
mbcaller=0x15960a8, env=0x7fff7d7e0530, pcicaller=0x1bf9698)
at ../../../src/mal/mal_interpreter.mx:308
#2 0x00007faf8f9a9972 in runMALsequence (cntxt=0x605560, mb=0x15960a8,
startpc=1, stoppc=0, stk=0x7fff7d7e0530, env=0x7fff7d7e3070,
pcicaller=0x1bf9698)
at ../../../src/mal/mal_interpreter.mx:1770
#3 0x00007faf8f99bf06 in runMAL (cntxt=0x605560, mb=0x15960a8, startpc=1,
mbcaller=0x15960a8, env=0x7fff7d7e3070, pcicaller=0x1bf9698)
at ../../../src/mal/mal_interpreter.mx:308
etc.
I found this one by pasting in a function that didn't work. And reduced it
actually executing the function.
----------------------------------------------------------------------
>Comment By: Martin Kersten (mlkersten)
Date: 2009-09-06 09:04
Message:
Confirmed. It is the famous recursive call. There is code in the
interpreter to catch it, but was turned into comments a long time ago
because it consumed too much time, hampering the execution of small
functions.
----------------------------------------------------------------------
Comment By: Stefan Manegold (stmane)
Date: 2009-09-06 08:54
Message:
The segfault is easily reproducible by simply starting mserver5 and then
calling `user.main();` on the MAL prompt.
It also occurs with the Aug2009 release.
While calling user.main(); interactively / explicitly is probably not
intended, we should at least try to avoid the segfault in this case.
looking at the complete trace, the problem might be related to a stack
overflow due to a too deep recursion:
CVS HEAD:
$ gdb mserver5
GNU gdb Fedora (6.8-32.fc10)
Copyright (C) 2008 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later
<http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. Type "show
copying"
and "show warranty" for details.
This GDB was configured as "x86_64-redhat-linux-gnu"...
(gdb) r
Starting program:
/net/rig.ins.cwi.nl/export/scratch0/manegold/Monet/Testing/Current/prefix.--enable-strict_--disable-optimize_--enable-debug_--enable-assert/bin/mserver5
[Thread debugging using libthread_db enabled]
[New Thread 0x7ffff67d37b0 (LWP 3966)]
[New Thread 0x7fffec2ed950 (LWP 4019)]
# MonetDB server v5.15.0, based on kernel v1.33.0
# Serving database 'demo', using 4 threads
# Compiled for x86_64-unknown-linux-gnu/64bit with 64bit OIDs dynamically
linked
# Detected 7.753 GiB (8324386816 bytes) main-memory.
# Copyright (c) 1993-July 2008 CWI.
# Copyright (c) August 2008-2009 MonetDB B.V., all rights reserved
# Visit http://monetdb.cwi.nl/ for further information
#warning: please don't forget to set your vault key!
#(see
/ufs/manegold/_/scratch0/Monet/Testing/Current/prefix.--enable-strict_--disable-optimize_--enable-debug_--enable-assert/etc/monetdb5.conf)
[New Thread 0x7fffe3229950 (LWP 4020)]
# Listening for connection requests on mapi:monetdb://127.0.0.1:50000/
>user.main();
Program received signal SIGSEGV, Segmentation fault.
0x00007ffff7ced3c5 in runMALsequence (cntxt=Cannot access memory at
address 0x7fffff3fdf28
) at
/ufs/manegold/_/scratch0/Monet/Testing/Current/source/MonetDB5/src/mal/mal_interpreter.mx:415
415 {
Missing separate debuginfos, use: debuginfo-install
bzip2-libs-1.0.5-3.fc10.x86_64 e2fsprogs-libs-1.41.4-6.fc10.x86_64
glibc-2.9-3.x86_64 keyutils-libs-1.2-3.fc9.x86_64
krb5-libs-1.6.3-18.fc10.x86_64 libselinux-2.0.78-1.fc10.x86_64
ncurses-libs-5.6-20.20080927.fc10.x86_64 openssl-0.9.8g-14.fc10.x86_64
pcre-7.8-1.fc10.x86_64 readline-5.2-13.fc9.x86_64 zlib-1.2.3-18.fc9.x86_64
(gdb) bt
#0 0x00007ffff7ced3c5 in runMALsequence (cntxt=Cannot access memory at
address 0x7fffff3fdf28
) at
/ufs/manegold/_/scratch0/Monet/Testing/Current/source/MonetDB5/src/mal/mal_interpreter.mx:415
#1 0x00007ffff7cec8a8 in runMAL (cntxt=0x6048a0, mb=0x611388, startpc=1,
mbcaller=0x611388, env=0x7fffff402f20, pcicaller=0x65d268) at
/ufs/manegold/_/scratch0/Monet/Testing/Current/source/MonetDB5/src/mal/mal_interpreter.mx:308
#2 0x00007ffff7cf98ff in runMALsequence (cntxt=0x6048a0, mb=0x611388,
startpc=1, stoppc=0, stk=0x7fffff402f20, env=0x7fffff405ad0,
pcicaller=0x65d268)
at
/ufs/manegold/_/scratch0/Monet/Testing/Current/source/MonetDB5/src/mal/mal_interpreter.mx:1770
#3 0x00007ffff7cec8a8 in runMAL (cntxt=0x6048a0, mb=0x611388, startpc=1,
mbcaller=0x611388, env=0x7fffff405ad0, pcicaller=0x65d268) at
/ufs/manegold/_/scratch0/Monet/Testing/Current/source/MonetDB5/src/mal/mal_interpreter.mx:308
[...]
#2248 0x00007ffff7cf98ff in runMALsequence (cntxt=0x6048a0, mb=0x611388,
startpc=1, stoppc=0, stk=0xd75818, env=0xd75818, pcicaller=0x0) at
/ufs/manegold/_/scratch0/Monet/Testing/Current/source/MonetDB5/src/mal/mal_interpreter.mx:1770
#2249 0x00007ffff7cec8a8 in runMAL (cntxt=0x6048a0, mb=0x611388,
startpc=1, mbcaller=0x0, env=0xd75818, pcicaller=0x0) at
/ufs/manegold/_/scratch0/Monet/Testing/Current/source/MonetDB5/src/mal/mal_interpreter.mx:308
#2250 0x00007ffff7cebbff in MALengine (c=0x6048a0) at
/ufs/manegold/_/scratch0/Monet/Testing/Current/source/MonetDB5/src/mal/mal_session.mx:681
#2251 0x00007ffff7d30265 in runPhase (c=0x6048a0, phase=4) at
/ufs/manegold/_/scratch0/Monet/Testing/Current/source/MonetDB5/src/mal/mal_scenario.mx:602
#2252 0x00007ffff7d303f2 in runScenarioBody (c=0x6048a0) at
/ufs/manegold/_/scratch0/Monet/Testing/Current/source/MonetDB5/src/mal/mal_scenario.mx:647
#2253 0x00007ffff7d30589 in runScenario (c=0x6048a0) at
/ufs/manegold/_/scratch0/Monet/Testing/Current/source/MonetDB5/src/mal/mal_scenario.mx:672
#2254 0x00007ffff7ceb04a in MSserveClient (dummy=0x6048a0) at
/ufs/manegold/_/scratch0/Monet/Testing/Current/source/MonetDB5/src/mal/mal_session.mx:496
#2255 0x0000000000402fa5 in main (argc=1, av=0x7fffffffdda8) at
/ufs/manegold/_/scratch0/Monet/Testing/Current/source/MonetDB5/src/tools/mserver5.mx:637
(gdb)
Aug2009:
$ gdb mserver5
GNU gdb Fedora (6.8-32.fc10)
Copyright (C) 2008 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later
<http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. Type "show
copying"
and "show warranty" for details.
This GDB was configured as "x86_64-redhat-linux-gnu"...
(gdb) r
Starting program:
/net/rig.ins.cwi.nl/export/scratch0/manegold/Monet/Testing/Stable/prefix.--enable-strict_--disable-optimize_--enable-debug_--enable-assert/bin/mserver5
[Thread debugging using libthread_db enabled]
[New Thread 0x7ffff67d37b0 (LWP 4283)]
[New Thread 0x7fffec2ed950 (LWP 4336)]
# MonetDB server v5.14.0, based on kernel v1.32.0
# Serving database 'demo', using 4 threads
# Compiled for x86_64-unknown-linux-gnu/64bit with 64bit OIDs dynamically
linked
# Copyright (c) 1993-July 2008 CWI.
# Copyright (c) August 2008-2009 MonetDB B.V., all rights reserved
# Visit http://monetdb.cwi.nl/ for further information
#warning: please don't forget to set your vault key!
#(see
/ufs/manegold/_/scratch0/Monet/Testing/Stable/prefix.--enable-strict_--disable-optimize_--enable-debug_--enable-assert/etc/monetdb5.conf)
[New Thread 0x7fffe33a6950 (LWP 4337)]
# Listening for connection requests on mapi:monetdb://127.0.0.1:50000/
>user.main();
Program received signal SIGSEGV, Segmentation fault.
0x00007ffff7ced319 in runMALsequence (cntxt=Cannot access memory at
address 0x7fffff3fecd8
) at
/ufs/manegold/_/scratch0/Monet/Testing/Stable/source/MonetDB5/src/mal/mal_interpreter.mx:415
415 {
Missing separate debuginfos, use: debuginfo-install
bzip2-libs-1.0.5-3.fc10.x86_64 e2fsprogs-libs-1.41.4-6.fc10.x86_64
glibc-2.9-3.x86_64 keyutils-libs-1.2-3.fc9.x86_64
krb5-libs-1.6.3-18.fc10.x86_64 libselinux-2.0.78-1.fc10.x86_64
ncurses-libs-5.6-20.20080927.fc10.x86_64 openssl-0.9.8g-14.fc10.x86_64
pcre-7.8-1.fc10.x86_64 readline-5.2-13.fc9.x86_64 zlib-1.2.3-18.fc9.x86_64
(gdb) bt
#0 0x00007ffff7ced319 in runMALsequence (cntxt=Cannot access memory at
address 0x7fffff3fecd8
) at
/ufs/manegold/_/scratch0/Monet/Testing/Stable/source/MonetDB5/src/mal/mal_interpreter.mx:415
#1 0x00007ffff7cec7fc in runMAL (cntxt=0x6047e0, mb=0x610ad8, startpc=1,
mbcaller=0x610ad8, env=0x7fffff3ffdf0, pcicaller=0x660d68) at
/ufs/manegold/_/scratch0/Monet/Testing/Stable/source/MonetDB5/src/mal/mal_interpreter.mx:308
#2 0x00007ffff7cf97bd in runMALsequence (cntxt=0x6047e0, mb=0x610ad8,
startpc=1, stoppc=0, stk=0x7fffff3ffdf0, env=0x7fffff400a30,
pcicaller=0x660d68)
at
/ufs/manegold/_/scratch0/Monet/Testing/Stable/source/MonetDB5/src/mal/mal_interpreter.mx:1770
#3 0x00007ffff7cec7fc in runMAL (cntxt=0x6047e0, mb=0x610ad8, startpc=1,
mbcaller=0x610ad8, env=0x7fffff400a30, pcicaller=0x660d68) at
/ufs/manegold/_/scratch0/Monet/Testing/Stable/source/MonetDB5/src/mal/mal_interpreter.mx:308
[...]
#8020 0x00007ffff7cf97bd in runMALsequence (cntxt=0x6047e0, mb=0x610ad8,
startpc=1, stoppc=0, stk=0xd76b68, env=0xd76b68, pcicaller=0x0) at
/ufs/manegold/_/scratch0/Monet/Testing/Stable/source/MonetDB5/src/mal/mal_interpreter.mx:1770
#8021 0x00007ffff7cec7fc in runMAL (cntxt=0x6047e0, mb=0x610ad8,
startpc=1, mbcaller=0x0, env=0xd76b68, pcicaller=0x0) at
/ufs/manegold/_/scratch0/Monet/Testing/Stable/source/MonetDB5/src/mal/mal_interpreter.mx:308
#8022 0x00007ffff7cebb54 in MALengine (c=0x6047e0) at
/ufs/manegold/_/scratch0/Monet/Testing/Stable/source/MonetDB5/src/mal/mal_session.mx:691
#8023 0x00007ffff7d2fe49 in runPhase (c=0x6047e0, phase=4) at
/ufs/manegold/_/scratch0/Monet/Testing/Stable/source/MonetDB5/src/mal/mal_scenario.mx:602
#8024 0x00007ffff7d2ffd6 in runScenarioBody (c=0x6047e0) at
/ufs/manegold/_/scratch0/Monet/Testing/Stable/source/MonetDB5/src/mal/mal_scenario.mx:647
#8025 0x00007ffff7d3016d in runScenario (c=0x6047e0) at
/ufs/manegold/_/scratch0/Monet/Testing/Stable/source/MonetDB5/src/mal/mal_scenario.mx:672
#8026 0x00007ffff7ceafe2 in MSserveClient (dummy=0x6047e0) at
/ufs/manegold/_/scratch0/Monet/Testing/Stable/source/MonetDB5/src/mal/mal_session.mx:496
#8027 0x0000000000402e22 in main (argc=1, av=0x7fffffffdda8) at
/ufs/manegold/_/scratch0/Monet/Testing/Stable/source/MonetDB5/src/tools/mserver5.mx:623
(gdb)
----------------------------------------------------------------------
Comment By: Martin Kersten (mlkersten)
Date: 2009-09-06 08:05
Message:
This is the general stack and does not give any clue on what object it is
attempting to access.
Also it seems a glitch depending on an unspecified sequence of actions.
The erroneous function might give an indication if the parser/type
resolver,etc.... left something
unmarked.
The bug is archived.
----------------------------------------------------------------------
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=482468&aid=2852707&group_id=56967
------------------------------------------------------------------------------
Let Crystal Reports handle the reporting - Free Crystal Reports 2008 30-Day
trial. Simplify your report design, integration and deployment - and focus on
what you do best, core application coding. Discover what's new with
Crystal Reports now. http://p.sf.net/sfu/bobj-july
_______________________________________________
Monetdb-bugs mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/monetdb-bugs