From: | Nathan Bossart <nathandbossart(at)gmail(dot)com> |
---|---|
To: | Andreas 'ads' Scherbaum <ads(at)pgug(dot)de> |
Cc: | Matthias van de Meent <boekewurm+postgres(at)gmail(dot)com>, PostgreSQL Hackers <pgsql-hackers(at)lists(dot)postgresql(dot)org> |
Subject: | Re: Crash: invalid DSA memory alloc request |
Date: | 2024-12-16 22:18:26 |
Message-ID: | Z2CnMpS2srwNxfXg@nathan |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
On Mon, Dec 16, 2024 at 08:00:00AM +0100, Andreas 'ads' Scherbaum wrote:
> Can confirm that the crash no longer happens when applying your patch.
The patch looks reasonable to me. I'll commit it soon unless someone
objects. I was surprised to learn that the DSA_ALLOC_HUGE flag is only
intended to catch faulty allocation requests [0].
> Was able to both continue the old and crashed test, as well as run a new
> test:
>
> tabletest=# select count(*) from information_schema.tables;
> count
> ----------
> 20000211
> (1 row)
That's a lot of tables...
[0] https://postgr.es/m/28062.1487456862%40sss.pgh.pa.us
--
nathan
From | Date | Subject | |
---|---|---|---|
Next Message | Tom Lane | 2024-12-16 22:41:54 | Re: improve EXPLAIN for wide tables |
Previous Message | Tom Lane | 2024-12-16 22:16:11 | Re: Support regular expressions with nondeterministic collations |