From: | Andrew Dunstan <andrew(dot)dunstan(at)2ndquadrant(dot)com> |
---|---|
To: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
Cc: | Alexander Korotkov <a(dot)korotkov(at)postgrespro(dot)ru>, Andres Freund <andres(at)anarazel(dot)de>, John Naylor <john(dot)naylor(at)2ndquadrant(dot)com>, Jeff Janes <jeff(dot)janes(at)gmail(dot)com>, Nikita Glukhov <n(dot)gluhov(at)postgrespro(dot)ru>, Tomas Vondra <tomas(dot)vondra(at)2ndquadrant(dot)com>, Oleg Bartunov <obartunov(at)postgrespro(dot)ru>, Michael Paquier <michael(at)paquier(dot)xyz>, Stas Kelvich <s(dot)kelvich(at)postgrespro(dot)ru>, PostgreSQL-development <pgsql-hackers(at)postgresql(dot)org>, Thomas Munro <thomas(dot)munro(at)enterprisedb(dot)com>, David Steele <david(at)pgmasters(dot)net>, Robert Haas <robertmhaas(at)gmail(dot)com>, Pavel Stehule <pavel(dot)stehule(at)gmail(dot)com> |
Subject: | Re: jsonpath |
Date: | 2019-03-28 11:45:16 |
Message-ID: | e52d520e-9e45-8d4b-2c64-6114b3a140f5@2ndQuadrant.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
On 3/28/19 1:01 AM, Tom Lane wrote:
> Andrew Dunstan <andrew(dot)dunstan(at)2ndquadrant(dot)com> writes:
>> I was able to get this stack trace.
>>
>> (gdb) bt
>> #0 0x00007ffb9ce6a458 in ntdll!RtlRaiseStatus ()
>> from C:\WINDOWS\SYSTEM32\ntdll.dll
>> #1 0x00007ffb9ce7760e in ntdll!memset () from C:\WINDOWS\SYSTEM32\ntdll.dll
>> #2 0x00007ffb9ac52e1a in msvcrt!_setjmpex ()
>> from C:\WINDOWS\System32\msvcrt.dll
>> #3 0x000000000087431a in pg_re_throw ()
>> at c:/MinGW/msys/1.0/home/pgrunner/bf/root/HEAD/pgsql.build/../pgsql/src/backend/utils/error/elog.c:1720
>> #4 0x0000000000874106 in errfinish (dummy=<optimized out>)
>> at c:/MinGW/msys/1.0/home/pgrunner/bf/root/HEAD/pgsql.build/../pgsql/src/backend/utils/error/elog.c:464
>> #5 0x00000000007cc938 in jsonpath_yyerror (result=result(at)entry=0x0,
>> message=message(at)entry=0xab0868 <__func__.110231+1592> "unrecognized flag of LIKE_REGEX predicate")
>> at /home/pgrunner/bf/root/HEAD/pgsql.build/../pgsql/src/backend/utils/adt/jsonpath_scan.l:305
>> #6 0x00000000007cec9d in makeItemLikeRegex (pattern=<optimized out>,
>> pattern=<optimized out>, flags=<optimized out>, expr=0x73c7a80)
>> at /home/pgrunner/bf/root/HEAD/pgsql.build/../pgsql/src/backend/utils/adt/jsonpath_gram.y:512
> Hmm. Reaching the yyerror call is expected given this input, but
> seemingly the siglongjmp stack has been trashed? The best I can
> think of is a wild store that either occurs only on this platform
> or happens to be harmless elsewhere ... but neither idea is terribly
> convincing.
Further data point: if I just call the offending statement alone,
there's no crash. The crash only occurs when I call the whole script.
I'll see if I can triangulate a bit to get a minimal test case.
cheers
andrew
--
Andrew Dunstan https://www.2ndQuadrant.com
PostgreSQL Development, 24x7 Support, Remote DBA, Training & Services
From | Date | Subject | |
---|---|---|---|
Next Message | Darafei Komяpa Praliaskouski | 2019-03-28 11:58:02 | Re: Berserk Autovacuum (let's save next Mandrill) |
Previous Message | Darafei Komяpa Praliaskouski | 2019-03-28 11:36:58 | Re: Berserk Autovacuum (let's save next Mandrill) |