search for: s_start

Displaying 5 results from an estimated 5 matches for "s_start".

Did you mean: _start
2007 Oct 09
1
read only certain parts of a file
...read a text file and create a data frame of only certain parts of the file. For instance, from this text file: =================================================== Matches For Query 0 (108 bases): 000019_0070 =================================================== Score Q_Name S_Name Q_Start Q_End S_Start S_End Direction Bases identity 89 000019_0070 Chr15 3 108 43251883 43251778 C 106 95.28 88 000019_0070 Chr1 4 108 85826948 85826844 C 105 95.24 =================================================== Matches For Query 1 (124 bases): 000024_1262 ===================================================...
2013 Jul 19
2
9.2PRERELEASE ZFS panic in lzjb_compress
...e 0xffffffcf75bd6a20 fork_exit() at fork_exit+0x11f/frame 0xffffffcf75bd6a70 fork_trampoline() at fork_trampoline+0xe/frame 0xffffffcf75bd6a70 --- trap 0, rip = 0, rsp = 0xffffffcf75bd6b30, rbp = 0 --- lzjb_compress+0x185 corresponds to line 85 in 80 cpy = src - offset; 81 if (cpy >= (uchar_t *)s_start && cpy != src && 82 src[0] == cpy[0] && src[1] == cpy[1] && src[2] == cpy[2]) { 83 *copymap |= copymask; 84 for (mlen = MATCH_MIN; mlen < MATCH_MAX; mlen++) 85 if (src[mlen] != cpy[mlen]) 86 break; 87 *dst++ = ((mlen - MATCH_MIN) << (NBBY - MATCH_BITS)) |...
2013 Oct 26
2
[PATCH] 1. changes for vdiskadm on illumos based platform
...blogspot.com/p/lz4.html + * - LZ4 source repository : http://code.google.com/p/lz4/ + */ + +#include "fsys_zfs.h" +#include <string.h> + +static int LZ4_uncompress_unknownOutputSize(const char *source, char *dest, + int isize, int maxOutputSize); + +int +lz4_decompress(void *s_start, void *d_start, size_t s_len, size_t d_len) +{ + const uint8_t *src = s_start; + uint32_t bufsiz = (src[0] << 24) | (src[1] << 16) | (src[2] << 8) | + src[3]; + + /* invalid compressed buffer size encoded at start */ + if (bufsiz + 4 > s_len) + return (1); + + /* + * Retu...
1997 Nov 13
0
another buffer overrun in sperl5.003
...e affected as well. Quick fix: chmod u-s /usr/bin/sperl5.003 (what else?) Details: There is a nasty bug in mess() (util.c): it is possible to overflow its buffer (via sprintf()); mess() tries to detect this situation but fails to handle the problem properly: [excerpt from util.c] if (s - s_start >= sizeof(buf)) { /* Ooops! */ if (usermess) fputs(SvPVX(tmpstr), stderr); else fputs(buf, stderr); fputs("panic: message overflow - memory corrupted!\n",stderr); my_exit(1); } It does not abort immediately. It prints out a...
2010 Aug 04
6
[PATCH -v2 0/3] jbd2 scalability patches
This version fixes three bugs in the 2nd patch of this series that caused kernel BUG when the system was under race. We weren't accounting with t_oustanding_credits correctly, and there were race conditions caused by the fact the I had overlooked the fact that __jbd2_log_wait_for_space() and jbd2_get_transaction() requires j_state_lock to be write locked. Theodore Ts'o (3): jbd2: Use