Re: [HACKERS] Backend crash on non-exclusive backup cancel
От | Andres Freund |
---|---|
Тема | Re: [HACKERS] Backend crash on non-exclusive backup cancel |
Дата | |
Msg-id | 20170315154638.tuca45qzvydzmvu7@alap3.anarazel.de обсуждение исходный текст |
Ответ на | Re: [HACKERS] Backend crash on non-exclusive backup cancel (Michael Paquier <michael.paquier@gmail.com>) |
Ответы |
Re: [HACKERS] Backend crash on non-exclusive backup cancel
|
Список | pgsql-hackers |
Hi, On 2017-03-15 15:28:03 +0900, Michael Paquier wrote: > diff --git a/src/backend/access/transam/xlog.c b/src/backend/access/transam/xlog.c > index 64335f909e..eaf8e32fe1 100644 > --- a/src/backend/access/transam/xlog.c > +++ b/src/backend/access/transam/xlog.c > --- a/src/backend/access/transam/xlogfuncs.c > +++ b/src/backend/access/transam/xlogfuncs.c > diff --git a/src/include/access/xlog.h b/src/include/access/xlog.h > index 104ee7dd5e..d4abf94862 100644 > --- a/src/include/access/xlog.h > +++ b/src/include/access/xlog.h > @@ -288,8 +288,26 @@ extern void assign_max_wal_size(int newval, void *extra); > extern void assign_checkpoint_completion_target(double newval, void *extra); This seems like something easy enough to exercise in a tap test, could we get one? Greetings, Andres Freund
В списке pgsql-hackers по дате отправления: