Displaying 5 results from an estimated 5 matches for "s_start".
Did you mean:
_start
2007 Oct 09
1
read only certain parts of a file
...read a text file and create a data frame of only certain parts of the file.
For instance, from this text file:
===================================================
Matches For Query 0 (108 bases): 000019_0070
===================================================
Score Q_Name S_Name Q_Start Q_End S_Start S_End Direction Bases identity
89 000019_0070 Chr15 3 108 43251883 43251778 C 106 95.28
88 000019_0070 Chr1 4 108 85826948 85826844 C 105 95.24
===================================================
Matches For Query 1 (124 bases): 000024_1262
===================================================...
2013 Jul 19
2
9.2PRERELEASE ZFS panic in lzjb_compress
...e
0xffffffcf75bd6a20
fork_exit() at fork_exit+0x11f/frame 0xffffffcf75bd6a70
fork_trampoline() at fork_trampoline+0xe/frame 0xffffffcf75bd6a70
--- trap 0, rip = 0, rsp = 0xffffffcf75bd6b30, rbp = 0 ---
lzjb_compress+0x185 corresponds to line 85 in
80 cpy = src - offset;
81 if (cpy >= (uchar_t *)s_start && cpy != src &&
82 src[0] == cpy[0] && src[1] == cpy[1] && src[2] == cpy[2]) {
83 *copymap |= copymask;
84 for (mlen = MATCH_MIN; mlen < MATCH_MAX; mlen++)
85 if (src[mlen] != cpy[mlen])
86 break;
87 *dst++ = ((mlen - MATCH_MIN) << (NBBY - MATCH_BITS)) |...
2013 Oct 26
2
[PATCH] 1. changes for vdiskadm on illumos based platform
...blogspot.com/p/lz4.html
+ * - LZ4 source repository : http://code.google.com/p/lz4/
+ */
+
+#include "fsys_zfs.h"
+#include <string.h>
+
+static int LZ4_uncompress_unknownOutputSize(const char *source, char *dest,
+ int isize, int maxOutputSize);
+
+int
+lz4_decompress(void *s_start, void *d_start, size_t s_len, size_t d_len)
+{
+ const uint8_t *src = s_start;
+ uint32_t bufsiz = (src[0] << 24) | (src[1] << 16) | (src[2] << 8) |
+ src[3];
+
+ /* invalid compressed buffer size encoded at start */
+ if (bufsiz + 4 > s_len)
+ return (1);
+
+ /*
+ * Retu...
1997 Nov 13
0
another buffer overrun in sperl5.003
...e affected as well.
Quick fix:
chmod u-s /usr/bin/sperl5.003 (what else?)
Details:
There is a nasty bug in mess() (util.c): it is possible to overflow
its buffer (via sprintf()); mess() tries to detect this situation but
fails to handle the problem properly:
[excerpt from util.c]
if (s - s_start >= sizeof(buf)) { /* Ooops! */
if (usermess)
fputs(SvPVX(tmpstr), stderr);
else
fputs(buf, stderr);
fputs("panic: message overflow - memory corrupted!\n",stderr);
my_exit(1);
}
It does not abort immediately. It prints out a...
2010 Aug 04
6
[PATCH -v2 0/3] jbd2 scalability patches
This version fixes three bugs in the 2nd patch of this series that
caused kernel BUG when the system was under race. We weren't accounting
with t_oustanding_credits correctly, and there were race conditions
caused by the fact the I had overlooked the fact that
__jbd2_log_wait_for_space() and jbd2_get_transaction() requires
j_state_lock to be write locked.
Theodore Ts'o (3):
jbd2: Use