Displaying 20 results from an estimated 4000 matches similar to: "add Rvsnprintf to API ??"
help with gotoExitingHandler(R_NilValue, call, entry); . Implementation of error handling internally
2014 Feb 26
1
help with gotoExitingHandler(R_NilValue, call, entry); . Implementation of error handling internally
Hello,
I?m trying to leverage R_ToplevelExec to implement C level try/catch.
The way it is implemented allows for running a function in a top level context. This context gets an empty handler stack, so either the function runs correctly or it jumps. When it jumps, it does not find a handler, so it jumps to the top level context.
R does not allow me to call begin context and end context
2005 Nov 27
1
segfault on write.dcf with gzfile connection
I'm seeing a segfault on x86_64 Linux with the following code:
desc = read.dcf("BAD")
con = gzfile("test.gz", "wt")
write.dcf(desc, file=con)
close(con)
where BAD has a long field (see below for example). The crash happens
inside dummy_vfprintf. I think the issue is that the va_list ap is
modified by the first vsnprintf call
2011 Nov 11
1
When collected warnings exceeds 50
Hi,
I've been tracking down a memory leak in an rApache application,
http://data.vanderbilt.edu/rapache/bbplot. The code was deployed in
2007 and has survived numerous upgrades of both R and rApache
(including upgrades and bugs in RMySQL). It's written in such a way so
that web crawlers will download every possible URL the app will
create. It's not a high-traffic app, but just about
2006 May 09
1
Seg fault when installing package from bad repository
> install.packages("rggobi", repos="http://ggobi.org/r/")
Warning in install.packages("rggobi", repos = "http://ggobi.org/r/") :
argument 'lib' is missing: using /Users/hadley/Library/R/library/
Reading symbols for shared libraries . done
Program received signal EXC_BAD_ACCESS, Could not access memory.
Reason: KERN_INVALID_ADDRESS at
2014 Sep 20
2
vsnprintf_s and vsnprintf
lvqcl wrote:
> I wrote a small program that fills a buffer[] with "abcdefghijklmnopqrstuvwxyz\0"
> pattern and then tries to write "0123456789" string into it.
> It calls either
> ret = vsnprintf_s(buffer, buf_size, _TRUNCATE, fmt, va);
> or
> ret = vsnprintf(buffer, buf_size, fmt, va);
<snip>
> vsnprintf (MSVC, MinGW):
>
> buf_size =
2014 Aug 09
3
[PATCH] for win_utf8_io.c
Janne Hyv?rinen wrote:
> Some comments for patch #1, I chose the non-secure versions because they
> are faster and produce smaller binary. The functions where these
> printings are performed can't in my opinion ever exceed the safety
> margin of 32 KB. They print short help and error texts and occasionally
> filename, which with APIs is restricted to 260 characters. And you
2001 Oct 18
2
Incorrect return types for snprintf() and vsnprintf()
Both of these functions are using strlen() to create return value.
Cheers,
Scott Rankin
*** /openbsd-compat/bsd-snprintf.c.orig Thu Oct 18 13:57:51 2001
--- /openbsd-compat/bsd-snprintf.c Thu Oct 18 13:58:26 2001
***************
*** 632,638 ****
#endif /* !defined(HAVE_SNPRINTF) || !defined(HAVE_VSNPRINTF) */
#ifndef HAVE_VSNPRINTF
! int
vsnprintf(char *str, size_t count, const char *fmt,
2016 Oct 19
10
[PATCH v4 0/5] implement vcpu preempted check
change from v3:
add x86 vcpu preempted check patch
change from v2:
no code change, fix typos, update some comments
change from v1:
a simplier definition of default vcpu_is_preempted
skip mahcine type check on ppc, and add config. remove dedicated macro.
add one patch to drop overload of rwsem_spin_on_owner and mutex_spin_on_owner.
add more comments
thanks boqun and Peter's suggestion.
2016 Oct 19
10
[PATCH v4 0/5] implement vcpu preempted check
change from v3:
add x86 vcpu preempted check patch
change from v2:
no code change, fix typos, update some comments
change from v1:
a simplier definition of default vcpu_is_preempted
skip mahcine type check on ppc, and add config. remove dedicated macro.
add one patch to drop overload of rwsem_spin_on_owner and mutex_spin_on_owner.
add more comments
thanks boqun and Peter's suggestion.
2014 Sep 12
0
patch for win_utf8_io.c: vsnprintf_s vs. MinGW
Erik de Castro Lopo wrote:
> Janne Hyv?rinen wrote:
>
>> Some comments for patch #1, I chose the non-secure versions because they
>> are faster and produce smaller binary. The functions where these
>> printings are performed can't in my opinion ever exceed the safety
>> margin of 32 KB. They print short help and error texts and occasionally
>> filename,
2014 Sep 20
3
vsnprintf_s and vsnprintf
lvqcl wrote:
> Why? We can use vsnprintf_s for MSVS, and vsnprintf for MinGW.
>
> MSVS version of vsnprintf_s is located inside (statically linked) msvcp???.lib
> or (dynamically linked) msvcp???.dll. They are part of MSVS runtime, and compatible
> with WinXP. So it is safe to use it in FLAC.
Oh, ok. I missed this bit. I know so very little about Windows.
However, if you compile
2015 Sep 21
5
segfault with readDCF on R 3.1.2 on AIX 6.1 when using install.packages
Hi,
Note that one significant change to read.dcf() that happened since R
3.0.2 is the addition of support for arbitrary long lines (commit
63281), which never worked:
dcf <- paste(c("aa: ", rep(letters, length.out=10000)), collapse="")
writeLines(dcf, "test.dcf")
nchar(read.dcf("test.dcf"))
# aa
# [1,] 8186
The culprit being line
2016 Dec 28
2
Help with httpd userdir recovery
On 12/28/2016 01:43 AM, John Fawcett wrote:
> On 12/28/2016 01:12 AM, Robert Moskowitz wrote:
>>
>> On 12/27/2016 07:06 PM, John Fawcett wrote:
>>> On 12/28/2016 12:34 AM, Robert Moskowitz wrote:
>>>> On 12/27/2016 05:44 PM, John Fawcett wrote:
>>>>> That error should be caused by having MultiViews options but incorrect
>>>>>
2025 Jan 14
1
new release 3.4.0 - critical security release
Here is my fix for the situation:
diff --git a/popt/findme.c b/popt/findme.c
index ac4cbae..4fe8a18 100644
--- a/popt/findme.c
+++ b/popt/findme.c
@@ -25,12 +25,23 @@ const char * findProgramPath(const char * argv0)
if (path == NULL) return NULL;
bufsize = strlen(path) + 1;
+#if defined __TANDEM
+ start = pathbuf = malloc(bufsize);
+#else
start = pathbuf =
2025 Jan 15
2
new release 3.4.0 - critical security release
Another issue here in findme.c. strlcpy() is a BSD-only method and definitely not portable.
Please consider other platforms when creating patches. I can provide a patch to this
patch also.
Thanks,
Randall
From: rsync <rsync-bounces at lists.samba.org> On Behalf Of Randall S. Becker via rsync
Sent: January 14, 2025 6:46 PM
To: 'rsync.project' <rsync.project at
2000 Feb 08
1
problem with va_list type (alpha) (PR#421)
Full_Name: Albrecht Gebhardt
Version: 0.99.0
OS: alpha, osf4.0
Submission from: (NULL) (143.205.180.40)
Both DEC cc and gcc complain (osf4.0, alpha) about applying
an unary operator (!) to a non scalar type (va_list arg) in
printutils.c
I'm not sure if I understood what was intended by "!arg" (see below),
but with this patch I at least was able to compile. (and R runs now,
but I
2016 Oct 28
16
[PATCH v6 00/11] implement vcpu preempted check
change from v5:
spilt x86/kvm patch into guest/host part.
introduce kvm_write_guest_offset_cached.
fix some typos.
rebase patch onto 4.9.2
change from v4:
spilt x86 kvm vcpu preempted check into two patches.
add documentation patch.
add x86 vcpu preempted check patch under xen
add s390 vcpu preempted check patch
change from v3:
add x86 vcpu preempted check patch
change from v2:
no code
2016 Oct 28
16
[PATCH v6 00/11] implement vcpu preempted check
change from v5:
spilt x86/kvm patch into guest/host part.
introduce kvm_write_guest_offset_cached.
fix some typos.
rebase patch onto 4.9.2
change from v4:
spilt x86 kvm vcpu preempted check into two patches.
add documentation patch.
add x86 vcpu preempted check patch under xen
add s390 vcpu preempted check patch
change from v3:
add x86 vcpu preempted check patch
change from v2:
no code
2025 Jan 15
1
new release 3.4.0 - critical security release
The popt changes came from upstream popt. We have Solaris and FreeBSD CI
tests, along with linux, but don't have a method for testing other
platforms. If you submit a PR to fix this, please consider a way we can
test the fix in CI.
Cheers, Tridge
On Wed, 15 Jan 2025 at 14:35, <rsbecker at nexbridge.com> wrote:
> Another issue here in findme.c. strlcpy() is a BSD-only method and
>
2015 Jan 08
1
New version of Rtools for Windows
Oh, I forgot to mention that besides setting AR, RANLIB and the stack probing fix, you also need a very up to date binutils. 2.25 was out in december. Even with that , if you linker's default is not what you are compiling for (i.e. a multiarch toolchain), you need to set GNUTARGET also, i.e. -m32/-m64 is not enough. Some fix to autodetect non-default targets went in after christmas before the