Here's the stacktrace:
Program received signal SIGSEGV, Segmentation fault. [Switching to Thread 0x7f474c3f8700 (LWP 1215)] 0x00007f474f3c7274 in ATOMcmp () from /usr/local/lib/libbat.so.10 (gdb) where #0 0x00007f474f3c7274 in ATOMcmp () from /usr/local/lib/libbat.so.10 #1 0x00007f474f2f8a88 in BATsubselect () from /usr/local/lib/libbat.so.10 #2 0x00007f474f9225f4 in ALGsubselect2 () from /usr/local/lib/libmonetdb5.so.16 #3 0x00007f474f8c93f7 in malCommandCall () from /usr/local/lib/libmonetdb5.so.16 #4 0x00007f474f8ca9eb in runMALsequence () from /usr/local/lib/libmonetdb5.so.16 #5 0x00007f474f8cb97f in callMAL () from /usr/local/lib/libmonetdb5.so.16 #6 0x00007f474ce41bc0 in SQLengineIntern () from /usr/local/lib/monetdb5/lib_sql.so #7 0x00007f474f8e5b50 in runScenarioBody () from /usr/local/lib/libmonetdb5.so.16 #8 0x00007f474f8e662d in runScenario () from /usr/local/lib/libmonetdb5.so.16 #9 0x00007f474f8e6700 in MSserveClient () from /usr/local/lib/libmonetdb5.so.16 #10 0x00007f474f439c3b in thread_starter () from /usr/local/lib/libbat.so.10 #11 0x00007f474ed37182 in start_thread (arg=0x7f474c3f8700) at pthread_create.c:312 #12 0x00007f474ea63fbd in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:111
Does that help, or do you need me to rebuild with debug enabled? A good firt step. If you are able to build for debugging it could provide more information about the column, types, and precise variable that causes havoc.
On 17/09/14 14:56, Nick Chadwick wrote: thanks in advance.
-----Original Message----- From: users-list [mailto:users-list-bounces+nickc=digiterre.com@monetdb.org] On Behalf Of Martin Kersten Sent: 17 September 2014 12:52 To: users-list@monetdb.org Subject: Re: Crashing when querying on date column
On 17/09/14 12:08, Nick Chadwick wrote:
CREATE TABLE "sys"."negs" ( "id" VARCHAR(50) NOT NULL, "xdate" DATE NOT NULL, "market" INTEGER, "product" INTEGER, "notional" DOUBLE, "client" INTEGER, "tier" INTEGER, "status" INTEGER, "dayno" INTEGER, CONSTRAINT "negs_id_xdate_pkey" PRIMARY KEY ("id", "xdate") ); CREATE INDEX "idx_negs_client" ON "sys"."negs" ("client"); CREATE INDEX "idx_negs_market" ON "sys"."negs" ("market"); CREATE INDEX "idx_negs_product" ON "sys"."negs" ("product"); CREATE INDEX "idx_negs_status" ON "sys"."negs" ("status"); CREATE INDEX "idx_negs_tier" ON "sys"."negs" ("tier"); CREATE INDEX "idx_negs_xdate" ON "sys"."negs" ("xdate"); sql>select * from negs; +----+-------+--------+---------+----------+--------+------+--------+-------+ | id | xdate | market | product | notional | client | tier | status | | dayno | +====+=======+========+=========+==========+========+======+========+=== +====+ +----+-------+--------+---------+----------+--------+------+--------+-------+ 0 tuples (4.456ms) sql>insert into negs values('id',now(),1,1,1.2,1,1,1,1); 1 affected rows (19.534ms) sql>select * from negs; +------+------------+--------+---------+--------------------------+--------+------+--------+-------+ | id | xdate | market | product | notional | client | tier | status | dayno | +======+============+========+=========+==========================+===== +===+======+========+=======+ | id | 2014-09-17 | 1 | 1 | 1.2 | 1 | 1 | 1 | 1 | +------+------------+--------+---------+--------------------------+--------+------+--------+-------+ 1 tuple (3.283ms) sql>insert into negs values('id2',now(),1,1,1.2,1,1,1,1); 1 affected rows (16.154ms) sql>select * from negs; +------+------------+--------+---------+--------------------------+--------+------+--------+-------+ | id | xdate | market | product | notional | client | tier | status | dayno | +======+============+========+=========+==========================+===== +===+======+========+=======+ | id | 2014-09-17 | 1 | 1 | 1.2 | 1 | 1 | 1 | 1 | | id2 | 2014-09-17 | 1 | 1 | 1.2 | 1 | 1 | 1 | 1 | +------+------------+--------+---------+--------------------------+--------+------+--------+-------+ 2 tuples (1.867ms)
we need to dig further. Are you able to work with 'gdb' and produce a stacktrace of the crashed server?
regards, Martin
steps: 1) start mclient 2) other window: ps axl |grep mserver 3) extract the process id of the mserver 4) gdb mserver5 "processid" continue 5) in mclient, activate the malicious query 6) if it crashes, gdb window will say so 7) get stacktrace command: where
_______________________________________________ users-list mailing list users-list@monetdb.org https://www.monetdb.org/mailman/listinfo/users-list
www.digiterre.com _________________
Privileged or confidential information may be contained in this message. If you are not the addressee of this message please notify the sender by return and thereafter delete the message, and you may not use, copy, disclose or rely on the information contained in it. Internet e-mail may be susceptible to data corruption, interception and unauthorised amendment for which Digiterre does not accept liability. Whilst we have taken reasonable precautions to ensure that this e-mail and any attachments have been swept for viruses, Digiterre does not accept liability for any damage sustained as a result of viruses. Statements in this message that do not relate to the business of Digiterre are neither given nor endorsed by the company or its directors. _______________________________________________ users-list mailing list users-list@monetdb.org https://www.monetdb.org/mailman/listinfo/users-list