On Tue, Feb 2, 2016 at 10:49 AM, Andres Freund <and...@anarazel.de> wrote: > I'm doubtful that anything that does the victim buffer search while > holding the extension lock will actually scale in a wide range of > scenarios. The copy scenario here probably isn't too bad because the > copy ring buffes are in use, and because there's no reads increasing the > usagecount of recent buffers; thus a victim buffers are easily found.
I agree that's an avenue we should try to explore. I haven't had any time to think much about how it should be done, but it seems like it ought to be possible somehow. -- Robert Haas EnterpriseDB: http://www.enterprisedb.com The Enterprise PostgreSQL Company -- Sent via pgsql-hackers mailing list (email@example.com) To make changes to your subscription: http://www.postgresql.org/mailpref/pgsql-hackers