Re: Bug in huge simplehash

Поиск
Список
Период
Сортировка
От Andres Freund
Тема Re: Bug in huge simplehash
Дата
Msg-id 20210813121431.bykwkdmttbwulqib@alap3.anarazel.de
обсуждение исходный текст
Ответ на Re: Bug in huge simplehash  (Yura Sokolov <y.sokolov@postgrespro.ru>)
Список pgsql-hackers
On 2021-08-13 14:40:08 +0300, Yura Sokolov wrote:
> Ranier Vilela писал 2021-08-13 14:12:
> > Em sex., 13 de ago. de 2021 às 07:15, Andres Freund
> > <andres@anarazel.de> escreveu:
> > > Personally I find it more obvious to understand the intended
> > > behaviour
> > > with ~0 (i.e. all bits set) than with a width truncation.
> > 
> > https://godbolt.org/z/57WcjKqMj
> > The generated code is identical.
> 
> I believe, you mean https://godbolt.org/z/qWzE1ePTE

I don't think the choice of instructions matters. This is called around
creation and resizing - the other costs are several orders of magnitude
more expensive than determining the mask.



В списке pgsql-hackers по дате отправления:

Предыдущее
От: Marek Szuba
Дата:
Сообщение: [PATCH] Native spinlock support on RISC-V
Следующее
От: Julien Rouhaud
Дата:
Сообщение: Re: Shared memory size computation oversight?