mirror of
https://github.com/postgres/postgres.git
synced 2025-09-05 02:22:28 +03:00
Fix inconsistencies and typos in the tree
This is numbered take 7, and addresses a set of issues around: - Fixes for typos and incorrect reference names. - Removal of unneeded comments. - Removal of unreferenced functions and structures. - Fixes regarding variable name consistency. Author: Alexander Lakhin Discussion: https://postgr.es/m/10bfd4ac-3e7c-40ab-2b2e-355ed15495e8@gmail.com
This commit is contained in:
@@ -216,9 +216,9 @@ static PROCLOCK *FastPathGetRelationLockEntry(LOCALLOCK *locallock);
|
||||
|
||||
/*
|
||||
* To make the fast-path lock mechanism work, we must have some way of
|
||||
* preventing the use of the fast-path when a conflicting lock might be
|
||||
* present. We partition* the locktag space into FAST_PATH_HASH_BUCKETS
|
||||
* partitions, and maintain an integer count of the number of "strong" lockers
|
||||
* preventing the use of the fast-path when a conflicting lock might be present.
|
||||
* We partition* the locktag space into FAST_PATH_STRONG_LOCK_HASH_PARTITIONS,
|
||||
* and maintain an integer count of the number of "strong" lockers
|
||||
* in each partition. When any "strong" lockers are present (which is
|
||||
* hopefully not very often), the fast-path mechanism can't be used, and we
|
||||
* must fall back to the slower method of pushing matching locks directly
|
||||
@@ -2709,7 +2709,7 @@ FastPathTransferRelationLocks(LockMethod lockMethodTable, const LOCKTAG *locktag
|
||||
}
|
||||
|
||||
/*
|
||||
* FastPathGetLockEntry
|
||||
* FastPathGetRelationLockEntry
|
||||
* Return the PROCLOCK for a lock originally taken via the fast-path,
|
||||
* transferring it to the primary lock table if necessary.
|
||||
*
|
||||
@@ -2896,8 +2896,8 @@ GetLockConflicts(const LOCKTAG *locktag, LOCKMODE lockmode, int *countp)
|
||||
* the lock, then we needn't examine the individual relation IDs
|
||||
* at all; none of them can be relevant.
|
||||
*
|
||||
* See FastPathTransferLocks() for discussion of why we do this
|
||||
* test after acquiring the lock.
|
||||
* See FastPathTransferRelationLocks() for discussion of why we do
|
||||
* this test after acquiring the lock.
|
||||
*/
|
||||
if (proc->databaseId != locktag->locktag_field1)
|
||||
{
|
||||
|
@@ -3405,8 +3405,8 @@ ReleasePredicateLocks(bool isCommit, bool isReadOnlySafe)
|
||||
*
|
||||
* If this value is changing, we don't care that much whether we get the
|
||||
* old or new value -- it is just used to determine how far
|
||||
* GlobalSerializableXmin must advance before this transaction can be
|
||||
* fully cleaned up. The worst that could happen is we wait for one more
|
||||
* SxactGlobalXmin must advance before this transaction can be fully
|
||||
* cleaned up. The worst that could happen is we wait for one more
|
||||
* transaction to complete before freeing some RAM; correctness of visible
|
||||
* behavior is not affected.
|
||||
*/
|
||||
@@ -4820,7 +4820,7 @@ OnConflict_CheckForSerializationFailure(const SERIALIZABLEXACT *reader,
|
||||
*
|
||||
* If a dangerous structure is found, the pivot (the near conflict) is
|
||||
* marked for death, because rolling back another transaction might mean
|
||||
* that we flail without ever making progress. This transaction is
|
||||
* that we fail without ever making progress. This transaction is
|
||||
* committing writes, so letting it commit ensures progress. If we
|
||||
* canceled the far conflict, it might immediately fail again on retry.
|
||||
*/
|
||||
|
Reference in New Issue
Block a user