Fix incorrect format placeholders
authorPeter Eisentraut <peter@eisentraut.org>
Wed, 10 Nov 2021 07:13:12 +0000 (08:13 +0100)
committerPeter Eisentraut <peter@eisentraut.org>
Wed, 10 Nov 2021 07:13:12 +0000 (08:13 +0100)
contrib/amcheck/verify_heapam.c

index 774a70f63dfc592e1b35db395315a8774d1125ba..bae5340111c90c9c44f62fe27272039009c84b97 100644 (file)
@@ -1420,7 +1420,7 @@ check_tuple_attribute(HeapCheckContext *ctx)
        /* Toasted attributes too large to be untoasted should never be stored */
        if (toast_pointer.va_rawsize > VARLENA_SIZE_LIMIT)
                report_corruption(ctx,
-                                                 psprintf("toast value %u rawsize %u exceeds limit %u",
+                                                 psprintf("toast value %u rawsize %d exceeds limit %d",
                                                                   toast_pointer.va_valueid,
                                                                   toast_pointer.va_rawsize,
                                                                   VARLENA_SIZE_LIMIT));
@@ -1433,7 +1433,7 @@ check_tuple_attribute(HeapCheckContext *ctx)
                /* Compression should never expand the attribute */
                if (VARATT_EXTERNAL_GET_EXTSIZE(toast_pointer) > toast_pointer.va_rawsize - VARHDRSZ)
                        report_corruption(ctx,
-                                                         psprintf("toast value %u external size %u exceeds maximum expected for rawsize %u",
+                                                         psprintf("toast value %u external size %u exceeds maximum expected for rawsize %d",
                                                                           toast_pointer.va_valueid,
                                                                           VARATT_EXTERNAL_GET_EXTSIZE(toast_pointer),
                                                                           toast_pointer.va_rawsize));