Re: [HACKERS] dynloader.h missing in prebuilt package for Windows?

2015-12-08 Thread Olson, Ken
11/19/2015 12:19 AM 843 rusagestub.h 11/19/2015 12:19 AM 2,379 windowapi.h 22 File(s)239,127 bytes 27 Dir(s) 26,142,257,152 bytes free Ken -Original Message- From: Chapman Flack [mailto:c...@anastigmatix.net] Sent: Saturday

Re: [HACKERS] Summary of some postgres portability issues

2008-07-09 Thread Ken Camann
On Wed, Jul 9, 2008 at 3:35 AM, Martijn van Oosterhout <[EMAIL PROTECTED]> wrote: > Just clarifying for myself: you are mostly listing theoretical problems > here, not actual "I ran it and got regression failures" problems, right? Correct. This is why most of them point out that they are not act

[HACKERS] Summary of some postgres portability issues

2008-07-08 Thread Ken Camann
time. Does that mean that almost every part of postgres that interacts with memory or the Datum type must be read very carefully to rediscover all the assumptions behind the code? Unfortunately I would guess yes. This is going to take much longer than I thought. But it's that or use MySQL, wh

[HACKERS] Windows 64-bit work in progress patch

2008-07-07 Thread Ken Camann
not submitting it for inclusion yet. I'd like to submit it first so that people can look over it. -Ken -- Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org) To make changes to your subscription: http://www.postgresql.org/mailpref/pgsql-hackers

Re: [HACKERS] A Windows x64 port of PostgreSQL

2008-07-02 Thread Ken Camann
On Thu, Jul 3, 2008 at 12:39 AM, Tom Lane <[EMAIL PROTECTED]> wrote: > "Ken Camann" <[EMAIL PROTECTED]> writes: >> EMT64/AMD64 is new compared to the older architectures, I >> would guess the older ones predate the time when it became a somewhat >> de fa

Re: [HACKERS] A Windows x64 port of PostgreSQL

2008-07-02 Thread Ken Camann
On Wed, Jul 2, 2008 at 8:43 PM, Tom Lane <[EMAIL PROTECTED]> wrote: > "Ken Camann" <[EMAIL PROTECTED]> writes: >> Oh I see. Between this and looking again at the warning list, I see >> that it will probably take a lot more work than I thought. There are >&

[HACKERS] Working on native Windows x64 version of PostgreSQL

2008-07-02 Thread Ken Camann
ently used since I have no other habits. -Ken -- Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org) To make changes to your subscription: http://www.postgresql.org/mailpref/pgsql-hackers

Re: [HACKERS] A Windows x64 port of PostgreSQL

2008-07-02 Thread Ken Camann
On Wed, Jul 2, 2008 at 9:09 AM, Bernd Helmle <[EMAIL PROTECTED]> wrote: > --On Mittwoch, Juli 02, 2008 07:39:29 -0400 Ken Camann <[EMAIL PROTECTED]> > wrote: > >> I assume it would only really matter if you did this to >> a pointer, and perhaps that is happening s

[HACKERS] A Windows x64 port of MySQL

2008-07-02 Thread Ken Camann
b...the binaries are all available but they're all 32-bit DLLs so they can't be used...everything has to be rebuilt as a native x64 DLL. That didn't matter to me since I'm not using any of them (yet), and I was happy just to see how easily postgres built. -Ken -- Sent via p

[HACKERS] V3 protocol; way to return table aliases?

2007-01-29 Thread Ken Johanson
es this really, really need V4? Since I've been told V3 is prob. not doable, this question certainly seems to match the 'Hackers' challenge/namesake :) Thanks in advance, ken ---(end of broadcast)--- TIP 5: don't forget to increase your free space map settings

[HACKERS] V4 protocol, extensible?

2007-01-04 Thread Ken Johanson
on this, or if my presumption that metatdata in the current V3 cannot be easily added too, is wrong. Thank you, Ken ---(end of broadcast)--- TIP 4: Have you searched our list archives? http://archives.postgresql.org

Re: [HACKERS] Probably security hole in postgresql-7.4.1

2004-05-13 Thread Ken Ashcraft
> Ken Ashcraft <[EMAIL PROTECTED]> writes: >> I work at Coverity where we use static analysis to find bugs in >> software. I ran a security checker over postgresql-7.4.1 and I think I >> found a security hole. >> >> In the code below, fld_size gets copied

[HACKERS] Reporting a security hole

2004-04-20 Thread ken
ponse. So where can I report a potential security hole? thanks, Ken Ashcraft ---(end of broadcast)--- TIP 6: Have you searched our list archives? http://archives.postgresql.org

[HACKERS] Probably security hole in postgresql-7.4.1

2004-04-20 Thread Ken Ashcraft
ciate your feedback, Ken Ashcraft In the code below, fld_size gets copied in from a user specified file. It is passed as the 'needed' parameter to enlargeStringInfo(). If needed is a very large positive value, the addition 'needed += str->len + 1;' could cause an overflow

Re: [pgsql-hackers-win32] [HACKERS] What's left?

2004-03-03 Thread Ken Hirsch
"Merlin Moncure" <[EMAIL PROTECTED]> wrote: >Greg Stark wrote: >> imposed no such conditions. If Microsoft wanted to release a >> Microsoft Postgresql under a completely proprietary license they >> would be free >>to do >I have often wondered, in a completely off-topic and unproductive sort >of way

Re: [HACKERS] Password security question

2002-12-17 Thread Ken Hirsch
http://msdn.microsoft.com/library/en-us/dncode/html/secure10102002.asp ---(end of broadcast)--- TIP 1: subscribe and unsubscribe commands go to [EMAIL PROTECTED]

Re: [HACKERS] nested transactions

2002-11-27 Thread Ken Hirsch
an grow without bound for long-lived transactions, but it's very straightforward and fast. Ken Hirsch ---(end of broadcast)--- TIP 6: Have you searched our list archives? http://archives.postgresql.org

Re: Geometry test on NetBSD (was Re: [HACKERS] RC1?)

2002-11-20 Thread Ken Hirsch
Bruce Momjian <[EMAIL PROTECTED]> wrote: > > Tom, can you clarify why -0 is valid. Is it for _small_ near zero > values that are indeed negative? > "Branch Cuts for Complex Elementary Functions, or Much Ado About Nothing's Sign Bit" W. Kahan; ch. 7 in _The State of the Art in Numerical Analysi

Re: [HACKERS] Proposed LogWriter Scheme, WAS: Potential Large

2002-10-07 Thread Ken Hirsch
I sent this yesterday, but it seems not to have made it to the list... I have a couple of comments orthogonal to the present discussion. 1) It would be fairly easy to write log records over a network to a dedicated process on another system. If the other system has an uninterruptible powe

Re: [HACKERS] New string functions; initdb required

2002-06-12 Thread Ken Hirsch
Thomas Lockhart wrote: > Right. I'm not certain about the regex syntax defined by SQL99; I used > the syntax that we already have enabled and it looks like we have a > couple of other variants available if we need them. If someone wants to > research the *actual* syntax specified by SQL99 that wou

Re: [HACKERS] Suggestion for optimization

2002-04-05 Thread Ken Hirsch
> In addition, this seems to be the "canonical paper" on snapshot > isolation: > > http://citeseer.nj.nec.com/berenson95critique.html There is an excellent, more recent paper, Generalized Isolation Level Definitions (http://citeseer.nj.nec.com/adya00generalized.html).

Re: [HACKERS] When scripting, which is better?

2001-10-01 Thread Ken Hirsch
Justin Clift wrote: > if [ x"$foo" = x"" ]; then This is the safest way. It prevents problems when $foo begins with with a "-" I don't know about your first question, though. ---(end of broadcast)--- TIP 5: Have you checked our extensive FAQ?

Re: [HACKERS] Pre-forking backend

2001-09-30 Thread Ken Hirsch
Doug McNaught wrote: > > You can pass open file descriptors across Unix domain sockets on most > systems, which is a possible way to address the problem, but probably > not worth it for the reasons discussed earlier. I think that it does solve the problem. The only drawback is that it's not port

Re: [HACKERS] Pre-forking backend

2001-09-29 Thread Ken Hirsch
Tom Lane wrote: > > This approach would only work as far as saving the fork() call itself, > not the backend setup time. Not sure it's worth the trouble. I doubt > that the fork itself is a huge component of our start time; it's setting > up all the catalog caches and so forth that's expensive.

Re: [HACKERS] Pre-forking backend

2001-09-29 Thread Ken Hirsch
Bruce Momjian wrote: > Tom Lane wrote: > > Bruce Momjian <[EMAIL PROTECTED]> writes: > > > How hard would it be to pre-fork an extra backend > > > > How are you going to pass the connection socket to an already-forked > > child process? AFAIK there's no remotely portable way ... > > No idea but i

Re: [HACKERS] [OT] http://www.postgresql.ca.org

2001-09-20 Thread Ken Hirsch
http://anything.ca.org goes to the same IP address. It has nothing to do with postgres - Original Message - From: "Serguei Mokhov" <[EMAIL PROTECTED]> To: "PostgreSQL Hackers" <[EMAIL PROTECTED]> Sent: Wednesday, September 19, 2001 8:57 AM Subject: [HACKERS] [OT] http://www.postgresql.ca

Re: [HACKERS] Log rotation?

2001-09-06 Thread Ken Hirsch
You may be interested in http://www.ietf.org/internet-drafts/draft-ietf-syslog-reliable-12.txt which builds a reliable syslog protocol on top of BEEP. There are free implementations of BEEP in C and Java at http://beepcore.org - Original Message - From: "Matthew Hagerty" <[EMAIL PROTECTE

Re: [HACKERS] Porting to Native WindowsNT/2000

2001-09-03 Thread Ken Hirsch
"Ian Lance Taylor" <[EMAIL PROTECTED]> wrote: > "Dwayne Miller" <[EMAIL PROTECTED]> writes: > > > Well, for one I have no idea what cygwin is, or what it does to > > your system, or what security vulnerabilities it might add to your > > system. It comes with alot of stuff that I may or may n

Re: [HACKERS] INTERVAL type: SQL92 implementation

2001-09-01 Thread Ken Hirsch
Thomas Lockhart <[EMAIL PROTECTED]> wrote: > We have a copy of an SQL99 draft which seems to be reasonably complete. > afaik we haven't come across an actual released version. Let me know if > you want me to forward it; perhaps it is on the ftp or web site? ftp://ftp.postgresql.org/pub/doc/sql/s

Re: [HACKERS] Re: From TODO, XML?

2001-07-29 Thread Ken Hirsch
mlw <[EMAIL PROTECTED]> wrote: > "Frank Ch. Eigler" wrote: > > : So a parser that can scan a DTD and make a usable create table (...) > > : line would be very helpful. [...] > > > > Hmm, but hierarchically structured documents such as XML don't map > > well to a relational model. The former ten

Re: [HACKERS] Re: New Linux xfs/reiser file systems

2001-05-04 Thread Ken Hirsch
e have anything? Already, Trond Eivind Glomsrød [EMAIL PROTECTED] has volunteered to test on XFS. The easier we make it, the more help we'll get. Ken Hirsch ---(end of broadcast)--- TIP 5: Have you checked our extensive FAQ? http://www.postgresql.org/users-lounge/docs/faq.html

[HACKERS] Re: New Linux xfs/reiser file systems

2001-05-04 Thread Ken Hirsch
sync since they only log metadata changes. I don't have a machine with XFS installed and it will be at least a week before I could get around to a build. Any volunteers? Ken Hirsch ---(end of broadcast)--- TIP 5: Have you checked

Re: [HACKERS] Learning from other open source databases

2001-04-30 Thread Ken Hirsch
res, Mariposa, and Postgres 4.2. There's also the Shore data manager. While not a complete SQL database, I've wondered if it could actually be spliced into PostgreSQL, since the licenses appear compatible. http://www.cs.wisc.edu/shore/ Ken Hirsch

Re: [HACKERS] Hardcopy docs available

2001-04-20 Thread Ken Hirsch
Okay, you're right. I just updated my Ghostscript to 7.00 (just out) and it produced very nice PDFs. I can upload them somewhere if you give me an FTP address. Ken Hirsch - Original Message - From: "Bruce Momjian" <[EMAIL PROTECTED]> To: "Ken Hirsch"

Re: [HACKERS] Re: TODO list

2001-04-05 Thread Ken Hirsch
ust match a word at the beginning of the block. It gets changed each time you write the block. Ken Hirsch All your database are belong to us. ---(end of broadcast)--- TIP 1: subscribe and unsubscribe commands go to [EMAIL PROTECTED]

Re: [HACKERS] Allowing WAL fsync to be done via O_SYNC

2001-03-16 Thread Ken Hirsch
From: "Bruce Momjian" <[EMAIL PROTECTED]> > > > Could anyone consider fork a syncer process to sync data to disk ? > > > build a shared sync queue, when a daemon process want to do sync after > > > write() is called, just put a sync request to the queue. this can release > > > process from blocked

Re: [HACKERS] rtrim giving weird result

2001-03-14 Thread Ken Hirsch
The second parameter to "rtrim" is interpreted as a set of characters and rtrim: "Returns string with final characters removed after the last character not in set" So rtrim("center_out_opto", "_opto") returns "center_ou" because "u" is not in the set {o, p, t, _} but all the characters after

Re: [HACKERS] WAL & SHM principles

2001-03-13 Thread Ken Hirsch
ut other systems. Does anybody know what the POSIX.1b standard says? It was even suggested to me on the linux-fsdev mailing list that mlock() was a good way to insure the write-ahead condition. Ken Hirsch ---(end of broadcast)--- TIP 2: you ca

Re: [HACKERS] WAL & SHM principles

2001-03-13 Thread Ken Hirsch
ut other systems. Does anybody know what the POSIX.1b standard says? It was even suggested to me on the linux-fsdev mailing list that mlock() was a good way to insure the write-ahead condition. Ken Hirsch ---(end of broadcast)--- TIP 3: if posti