Re: HOT chain validation in verify_heapam()

From: Robert Haas <robertmhaas(at)gmail(dot)com>
To: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
Cc: Aleksander Alekseev <aleksander(at)timescale(dot)com>, PostgreSQL Hackers <pgsql-hackers(at)postgresql(dot)org>, Himanshu Upadhyaya <upadhyaya(dot)himanshu(at)gmail(dot)com>, Mark Dilger <mark(dot)dilger(at)enterprisedb(dot)com>, Andres Freund <andres(at)anarazel(dot)de>
Subject: Re: HOT chain validation in verify_heapam()
Date: 2023-03-23 17:06:08
Message-ID: CA+TgmoZYxy4mu3o_6K1=dv2a8Vh7mjxuQBy32HuURFCkonBefw@mail.gmail.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

On Thu, Mar 23, 2023 at 9:42 AM Robert Haas <robertmhaas(at)gmail(dot)com> wrote:
> Hmph. I didn't think very hard about that code and just assumed
> Himanshu had tested it. I don't have convenient access to a Big-endian
> test machine myself. Are you able to check whether using 0x00010019
> unconditionally works?

Oh, I see now you already pushed a fix. Thanks.

--
Robert Haas
EDB: http://www.enterprisedb.com

In response to

Browse pgsql-hackers by date

  From Date Subject
Next Message Tomas Vondra 2023-03-23 17:10:27 Re: Add LZ4 compression in pg_dump
Previous Message Andres Freund 2023-03-23 16:50:20 Re: POC: Lock updated tuples in tuple_update() and tuple_delete()