Hi all,
As gdb isn't providing any stacktrace when segfault occurs, we ve launched mserver5 with valgrind.Here is the valgrind output when the server is crashing:==1995== Thread 8:==1995== Syscall param write(buf) points to uninitialised byte(s)==1995== at 0x71D877D: ??? (in /lib64/libpthread-2.12.so)==1995== by 0x562BD6A: GDKsave (gdk_storage.c:369)==1995== by 0x552BF93: HEAPsave_intern (gdk_heap.c:708)==1995== by 0x552BFD0: HEAPsave (gdk_heap.c:714)==1995== by 0x57B561E: BATimprints (gdk_imprints.c:847)==1995== by 0x54FD095: BAT_scanselect (gdk_select.c:910)==1995== by 0x5504180: BATsubselect (gdk_select.c:1719)==1995== by 0x4EE0D53: ALGsubselect2 (algebra.c:341)==1995== by 0x4E76C22: malCommandCall (mal_interpreter.c:119)==1995== by 0x4E790CA: runMALsequence (mal_interpreter.c:655)==1995== by 0x4E7C5D2: DFLOWworker (mal_dataflow.c:376)==1995== by 0x71D1A50: start_thread (in /lib64/libpthread-2.12.so)==1995== Address 0x14724820 is 64 bytes inside a block of size 1,760 alloc'd==1995== at 0x4C27A2E: malloc (vg_replace_malloc.c:270)==1995== by 0x559286F: GDKmalloc_prefixsize (gdk_utils.c:641)==1995== by 0x55928D8: GDKmallocmax (gdk_utils.c:667)==1995== by 0x552A212: HEAPalloc (gdk_heap.c:105)==1995== by 0x57B3F72: BATimprints (gdk_imprints.c:770)==1995== by 0x54FD095: BAT_scanselect (gdk_select.c:910)==1995== by 0x5504180: BATsubselect (gdk_select.c:1719)==1995== by 0x4EE0D53: ALGsubselect2 (algebra.c:341)==1995== by 0x4E76C22: malCommandCall (mal_interpreter.c:119)==1995== by 0x4E790CA: runMALsequence (mal_interpreter.c:655)==1995== by 0x4E7C5D2: DFLOWworker (mal_dataflow.c:376)==1995== by 0x71D1A50: start_thread (in /lib64/libpthread-2.12.so)==1995====1995== Thread 5:==1995== Invalid read of size 8==1995== at 0x11713FD9: delta_bind_bat (bat_storage.c:166)==1995== by 0x11714127: bind_col (bat_storage.c:185)==1995== by 0x115E98AB: sql_storage (sql.c:4742)==1995== by 0x4E790A5: runMALsequence (mal_interpreter.c:631)==1995== by 0x4E78596: callMAL (mal_interpreter.c:447)==1995== by 0x115F1D3F: SQLexecutePrepared (sql_execute.c:328)==1995== by 0x115F2143: SQLengineIntern (sql_execute.c:390)==1995== by 0x115F0DD1: SQLengine (sql_scenario.c:1307)==1995== by 0x4E9691A: runPhase (mal_scenario.c:515)==1995== by 0x4E96AE4: runScenarioBody (mal_scenario.c:560)==1995== by 0x4E96BF3: runScenario (mal_scenario.c:579)==1995== by 0x4E97B97: MSserveClient (mal_session.c:439)==1995== Address 0x18 is not stack'd, malloc'd or (recently) free'd==1995====1995====1995== Process terminating with default action of signal 11 (SIGSEGV)==1995== Access not within mapped region at address 0x18==1995== at 0x11713FD9: delta_bind_bat (bat_storage.c:166)==1995== by 0x11714127: bind_col (bat_storage.c:185)==1995== by 0x115E98AB: sql_storage (sql.c:4742)==1995== by 0x4E790A5: runMALsequence (mal_interpreter.c:631)==1995== by 0x4E78596: callMAL (mal_interpreter.c:447)==1995== by 0x115F1D3F: SQLexecutePrepared (sql_execute.c:328)==1995== by 0x115F2143: SQLengineIntern (sql_execute.c:390)==1995== by 0x115F0DD1: SQLengine (sql_scenario.c:1307)==1995== by 0x4E9691A: runPhase (mal_scenario.c:515)==1995== by 0x4E96AE4: runScenarioBody (mal_scenario.c:560)==1995== by 0x4E96BF3: runScenario (mal_scenario.c:579)==1995== by 0x4E97B97: MSserveClient (mal_session.c:439)==1995== If you believe this happened as a result of a stack==1995== overflow in your program's main thread (unlikely but==1995== possible), you can try to increase the size of the==1995== main thread stack using the --main-stacksize= flag.==1995== The main thread stack size used in this run was 10485760.==1995====1995== HEAP SUMMARY:==1995== in use at exit: 41,189,795 bytes in 200,474 blocks==1995== total heap usage: 279,871 allocs, 79,397 frees, 66,479,732 bytes allocated==1995====1995== LEAK SUMMARY:==1995== definitely lost: 2,432 bytes in 74 blocks==1995== indirectly lost: 0 bytes in 0 blocks==1995== possibly lost: 40,090,357 bytes in 200,294 blocks==1995== still reachable: 1,097,006 bytes in 106 blocks==1995== suppressed: 0 bytes in 0 blocks==1995== Rerun with --leak-check=full to see details of leaked memory==1995====1995== For counts of detected and suppressed errors, rerun with: -v==1995== Use --track-origins=yes to see where uninitialised values come from==1995== ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 21 from 9)
Regards