Re: jsonpath
От | Andres Freund |
---|---|
Тема | Re: jsonpath |
Дата | |
Msg-id | 128935DB-EFE1-437F-8675-67A59A5DB6E9@anarazel.de обсуждение исходный текст |
Ответ на | Re: jsonpath (Tom Lane <tgl@sss.pgh.pa.us>) |
Ответы |
Re: jsonpath
|
Список | pgsql-hackers |
On March 28, 2019 9:31:14 AM EDT, Tom Lane <tgl@sss.pgh.pa.us> wrote: >Andrew Dunstan <andrew.dunstan@2ndquadrant.com> writes: >> I mean repeated invocations of >> psql -c "select '$ ? (@ like_regex \"pattern\" flag >\"a\")'::jsonpath" >> These get crash, no crash, crash, no crash ... > >That is just wacko ... but it does seem to support my thought of >a wild store somewhere. The mechanism for this case might be >that memory layout is different depending on whether we had to >rebuild the relcache init file at session start or not. Similarly, >the fact that the full test script reliably crashes might be >dependent on previous commands having left things in a certain >state. Unfortunately that gets us little closer to a fix. > >Has anybody gotten through a valgrind run on this code yet? Skink has successfully passed since - but that's x86... -- Sent from my Android device with K-9 Mail. Please excuse my brevity.
В списке pgsql-hackers по дате отправления: