Re: HOT chain validation in verify_heapam()
От | Robert Haas |
---|---|
Тема | Re: HOT chain validation in verify_heapam() |
Дата | |
Msg-id | CA+TgmobO27WryCSVkOMvHsk46B2zXY9swiXmwPywRaothBY1aw@mail.gmail.com обсуждение исходный текст |
Ответ на | Re: HOT chain validation in verify_heapam() (Andres Freund <andres@anarazel.de>) |
Список | pgsql-hackers |
On Thu, Mar 23, 2023 at 4:36 PM Andres Freund <andres@anarazel.de> wrote: > Could it be that the tests didn't exercise the path before? Hmm, perhaps. > > Nonetheless, here's a patch. I notice that there's a similar problem > > in another place, too. get_xid_status() is called a total of five > > times and it looks like only three of them got it right. I suppose > > that if this is correct we should back-patch it. > > Yea, I think you're right. OK. > > + report_corruption(ctx, > > + pstrdup("xmin is invalid")); > > Not a correctnes issue: Nearly all callers to report_corruption() do a > psprintf(), the remaining a pstrdup(), as here. Seems like it'd be cleaner to > just make report_corruption() accept a format string? Meh. -- Robert Haas EDB: http://www.enterprisedb.com
В списке pgsql-hackers по дате отправления: