Re: [HACKERS] Custom compression methods (mac+lz4.h)
От | Tom Lane |
---|---|
Тема | Re: [HACKERS] Custom compression methods (mac+lz4.h) |
Дата | |
Msg-id | 558766.1616424108@sss.pgh.pa.us обсуждение исходный текст |
Ответ на | Re: [HACKERS] Custom compression methods (mac+lz4.h) (Dilip Kumar <dilipbalaut@gmail.com>) |
Ответы |
Re: [HACKERS] Custom compression methods (mac+lz4.h)
Re: [HACKERS] Custom compression methods (mac+lz4.h) |
Список | pgsql-hackers |
Dilip Kumar <dilipbalaut@gmail.com> writes: > On Mon, Mar 22, 2021 at 5:22 AM Tom Lane <tgl@sss.pgh.pa.us> wrote: >> Also, after studying the documentation for LZ4_decompress_safe >> and LZ4_decompress_safe_partial, I realized that liblz4 is also >> counting on the *output* buffer size to not be a lie. So we >> cannot pass it a number larger than the chunk's true decompressed >> size. The attached patch resolves the issue I'm seeing. > Okay, the fix makes sense. In fact, IMHO, in general also this fix > looks like an optimization, I mean when slicelength >= > VARRAWSIZE_4B_C(value), then why do we need to allocate extra memory > even in the case of pglz. So shall we put this check directly in > toast_decompress_datum_slice instead of handling it at the lz4 level? Yeah, I thought about that too, but do we want to assume that VARRAWSIZE_4B_C is the correct way to get the decompressed size for all compression methods? (If so, I think it would be better style to have a less opaque macro name for the purpose.) regards, tom lane
В списке pgsql-hackers по дате отправления: