Re: Crash: invalid DSA memory alloc request

From: Nathan Bossart <nathandbossart(at)gmail(dot)com>
To: Andreas 'ads' Scherbaum <ads(at)pgug(dot)de>
Cc: Matthias van de Meent <boekewurm+postgres(at)gmail(dot)com>, PostgreSQL Hackers <pgsql-hackers(at)lists(dot)postgresql(dot)org>
Subject: Re: Crash: invalid DSA memory alloc request
Date: 2024-12-16 22:18:26
Message-ID: Z2CnMpS2srwNxfXg@nathan
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

On Mon, Dec 16, 2024 at 08:00:00AM +0100, Andreas 'ads' Scherbaum wrote:
> Can confirm that the crash no longer happens when applying your patch.

The patch looks reasonable to me. I'll commit it soon unless someone
objects. I was surprised to learn that the DSA_ALLOC_HUGE flag is only
intended to catch faulty allocation requests [0].

> Was able to both continue the old and crashed test, as well as run a new
> test:
>
> tabletest=# select count(*) from information_schema.tables;
> count
> ----------
> 20000211
> (1 row)

That's a lot of tables...

[0] https://postgr.es/m/28062.1487456862%40sss.pgh.pa.us

--
nathan

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Tom Lane 2024-12-16 22:41:54 Re: improve EXPLAIN for wide tables
Previous Message Tom Lane 2024-12-16 22:16:11 Re: Support regular expressions with nondeterministic collations