search for: ssize_max

Displaying 15 results from an estimated 15 matches for "ssize_max".

Did you mean: size_max
2013 May 02
3
Minimal build of R ...
Hi, I'm trying to cross-compile R to javascript so that it can run in a web-browser. Take as long as you need to stop laughing. So, as I was saying - I want to try and get a build of R running in the browser. [If you're not familiar with it already, you might enjoy looking at emscripten.org. It's a remarkably capable tool for translating LLVM bitcode to javascript. Check out some of
2019 Sep 23
0
Re: [PATCH nbdkit] server: public: Add nbdkit_parse_* functions for safely parsing integers.
...E_COMMON_TAIL; > +} Probably a dead #if, but doesn't hurt to leave it in. > + > +int > +nbdkit_parse_ssize_t (const char *what, const char *str, ssize_t *rp) > +{ > + long long r; > + char *end; > + > + errno = 0; > + r = strtoll (str, &end, 0); > +#if SSIZE_MAX != LONGLONG_MAX > +#ifndef SSIZE_MIN > +#define SSIZE_MIN (-SSIZE_MAX-1) Assumes twos-complement, but that's sane enough for the platforms we target. > +#endif > + if (r < SSIZE_MIN || r > SSIZE_MAX) > + errno = ERANGE; > +#endif > + PARSE_COMMON_TAIL; > +}...
2010 Mar 20
1
[MODULE] COM32 module to time null-dumping a file, v1.1
...CT 0 + +static inline float get_tps(){ return 18.2; } + +#else /* __COM32__ */ + +# define BUFSZ_DEF 16384 +/* Need to check what might be a "best" buffer/fetch block size here */ + +static inline float get_tps(){ return (float)sysconf(_SC_CLK_TCK); } + +#endif /* __COM32__ */ + +#ifndef SSIZE_MAX +# define SSIZE_MAX PTRDIFF_MAX +#endif +/* typedef ptrdiff_t ssize_t; */ +#define BUFSZ_MAX SSIZE_MAX +/* ssize_t max */ +#define BUFSZ_MIN 1 +#ifndef OFF_MAX +# define OFF_MAX SIZE_MAX +#endif +/* typedef size_t off_t */ +#define LEN_MAX OFF_MAX +/* off_t max */ + +void print_cp_result_tick(in...
2014 May 20
1
Question about fifo behavior on Linux between versions 3.0.3 and 3.1.0
...ng error: Error in writeBin(raw(12501), con) : too large a block specified In investigating R's source, the difference seems to be in src/main/connections.c, in the function fifo_write() (around line 932). In R 3.0.3, fifo_write() has these lines: if ((double) size * (double) nitems > SSIZE_MAX) error(_("too large a block specified")); R 3.1.0 has these lines changed to this: if ((size * sizeof(wchar_t) * nitems) > 50000) { error(_("too large a block specified")); } The change effectively places a limit of 12500 bytes on writes (since sizeof(wchar_...
2019 Sep 21
2
[PATCH nbdkit] server: public: Add nbdkit_parse_* functions for safely parsing integers.
...); +#if INT64_MAX != LONGLONG_MAX + if (r < INT64_MIN || r > INT64_MAX) + errno = ERANGE; +#endif + PARSE_COMMON_TAIL; +} + +int +nbdkit_parse_ssize_t (const char *what, const char *str, ssize_t *rp) +{ + long long r; + char *end; + + errno = 0; + r = strtoll (str, &end, 0); +#if SSIZE_MAX != LONGLONG_MAX +#ifndef SSIZE_MIN +#define SSIZE_MIN (-SSIZE_MAX-1) +#endif + if (r < SSIZE_MIN || r > SSIZE_MAX) + errno = ERANGE; +#endif + PARSE_COMMON_TAIL; +} + +/* Functions for parsing unsigned integers. */ + +/* strtou* functions have surprising behaviour if the first character...
2016 Feb 08
3
[Bug] Regression problem in transfer.sh for OpenSSH 7.1 P2 on HPE NSE above dd-size 32k
G'Day, I am requesting help in resolving an issue on the HPE NonStop platform in OpenSSH 7.1 P2 in the regression suite for all dd-size above 32k. Previous tests are all passing, but in the for-loop inside regress/transfer.sh, when s is 64k, the command: dd if=$DATA obs=${s} 2> /dev/null | \ ${SSH} -q -$p -F $OBJ/ssh_proxy somehost "cat >
2023 Mar 15
4
[libnbd PATCH v4 0/3] lib/utils: add async-signal-safe assert()
This is version 4 of the following sub-series: [libnbd PATCH v3 06/29] lib/utils: introduce xwrite() as a more robust write() [libnbd PATCH v3 07/29] lib/utils: add async-signal-safe assert() [libnbd PATCH v3 08/29] lib/utils: add unit test for async-signal-safe assert() http://mid.mail-archive.com/20230215141158.2426855-7-lersek at redhat.com
2020 Sep 03
2
Re: [PATCH nbdkit] server/public.c: Uninline nbdkit_strdup_intern to avoid compiler warning.
...; I'm still not clear if this is a GCC problem or a code problem, > although Dan pointed out on the list that SIZE_MAX is the largest > size_t, so I guess our code seems OK ... The error message seems to indicate that the compiler believes a pointer cannot reference an object larger than SSIZE_MAX and thus doesn't like the use of SIZE_MAX. This is quite strange though, given that malloc() and other C functions pretty much all use size_t for object sizes, not ssize_t. I think we should try reporting to the GCC maintainers for an opinion on whether its a compiler bug or not Regards, Da...
2013 May 25
0
R in the browser ...
...le.in's accordingly - also adding instruction to link in a version of libf2c that I'd pre-compiled to LLVM bitcode. - I had to manually hack on the configure.h file to remove references to some functions that don't seem to exist in emscripten: ccosh, cexp etc. - I also added code to set SSIZE_MAX and R_XLEN_T_MAX to sensible values (thanks Peter). - I hacked connections.c as there were some duplicate case statements. I think this was because the ./configure was getting confused over the size of some basic types. I suspect all of above hacks could be avoided if I understood autotools better....
2020 Sep 03
4
[PATCH nbdkit] server/public.c: Uninline nbdkit_strdup_intern to avoid compiler warning.
I'm not sure if this is a GCC bug or a bug in our code, but the attached workaround fixes it for me. Rich.
2012 May 31
1
klibc 2.0 release
...ipconfig: Use /run/ directory for script file [klibc] include: [sys/socket.h] define SOMAXCONN [klibc] include: [sys/elfcommon.h] define STN_UNDEF [klibc] klcc.1: document -nostdinc [klibc] include: [stdio.h] add clearerr() prototype [klibc] include: [limits.h] define SSIZE_MAX [klibc] Add faccessat() system call [klibc] README update arch status [klibc] kinit: Fix capabilities alternate read/write io without flush [klibc] capabilities: Use fflush() instead of fseek() [klibc] include: [limits.h] define MB_LEN_MAX
2023 Feb 06
20
[Bug 3534] New: probable underflow calculating display width of file name
...Android, but am able to replicate on x86-64 Ubuntu 20.04. running: touch ????????????????????????????????????????????????????????????????.txt scp ????????????????????????????????????????????????????????????????.txt jacob at 192.168.1.141: gives: FORTIFY: vsnprintf: size 18446744073709551610 > SSIZE_MAX Aborted afaict this is terminal-width-dependent, my terminal has $COLUMNS set to 120, if i increase my terminal width to 205, then it completes successfully. Afaict this bug also occurs in sftp, i was able to crash it by running the corresponding `put` command from interactive sftp. I was able t...
2015 Nov 09
6
[PATCH 0/5] build: Enable some more warnings.
Add some warnings. Well, the first patch is a miscellaneous change, but patches 2-5 add some warnings. Rich.
2009 Apr 09
0
Processed: Update submitter address for my bugs
...ail.com>. > submitter 518888 ! Bug#518888: fam: FTBFS: 'NULL' was not declared in this scope Changed Bug submitter from Daniel Schepler <schepler at math.berkeley.edu> to Daniel Schepler <dschepler at gmail.com>. > submitter 518890 ! Bug#518890: wmaloader: FTBFS: 'SSIZE_MAX' undeclared Changed Bug submitter from Daniel Schepler <schepler at math.berkeley.edu> to Daniel Schepler <dschepler at gmail.com>. > submitter 519490 ! Bug#519490: FTBFS: compiler parser error Changed Bug submitter from Daniel Schepler <schepler at math.berkeley.edu> to D...
2019 Sep 23
2
Re: [PATCH nbdkit] server: public: Add nbdkit_parse_* functions for safely parsing integers.
...t; INT_MAX) > > + errno = ERANGE; > > +#endif > > + PARSE_COMMON_TAIL; > > +} > > Looks correct. I actually compiled this and ran the tests with -m32 and -m64. It took several rounds to get it right. > > +#endif > > + if (r < SSIZE_MIN || r > SSIZE_MAX) > > + errno = ERANGE; > > +#endif > > + PARSE_COMMON_TAIL; > > +} > > + > > +/* Functions for parsing unsigned integers. */ > > + > > +/* strtou* functions have surprising behaviour if the first character > > + * (after whitespace) is '...