Displaying 20 results from an estimated 100000 matches similar to: "error: contextstack overflow"
2016 Apr 13
0
error: contextstack overflow
I've never seen the error mentioned before but see Brian Ripley's post https://stat.ethz.ch/pipermail/r-help/2008-March/157341.html. It looks like you are exceeding a limit.
We probably should see some sample code and data.
Please have a look at http://stackoverflow.com/questions/5963269/how-to-make-a-great-r-reproducible-example and/or http://adv-r.had.co.nz/Reproducibility.html for
2007 Feb 20
1
contextstack overflow
Hello!
I written several implementations in R of R?my's algorithm for
generating random ordered strictly binary trees on 2n+1 vertices.
One implementation involves manufacturing character strings like:
"X <- list(0,list(0,0))"
for the case n=2. If I perform the following two steps:
cmd <- "X <- list(0,list(0,0))"
eval(parse(text=cmd))
then X becomes a true
2008 Mar 17
3
contextstack overflow
Hi all,
I´m an absolute beginner in R programming…I have a really long R-code with
many variables. When I run the program I always get an error at the same
place called “contextstack overflow”. Does anybody know what to do in this
case? Are there so strict limitations in R? If yes, is it possible to handle
it? How?
Thank you for any help!
[[alternative HTML version deleted]]
2008 Dec 18
2
Contextstack overlow
All -
I have a number of rows that I am assigning length classes to via
l.class<-with(wae,
ifelse((Length>=120)&(Length<130),"125",
ifelse((Length>=130)&(Length<140),"135",
ifelse((Length>=140)&(Length<150),"145",
ifelse((Length>=150)&(Length<160),"155",
2005 Feb 14
3
'combinations' in gtools and stack overflow
Dear R-users,
Let me ask about the 'stack overflow' error which I got when I used
the function 'combinations' in "gtools".
The following is what I did:
---------
library(gtools)
options(expressions=1e5)
combinations(500, 3, 1:500)
# or combinations(400, 2, 1:400)
Error: protect(): stack overflow
---------
How can I overcome this error?
Is there perhaps any other
2004 Sep 23
0
Re: did you manage to solve dst cache overflow ?
See, /proc/sys/net/ipv4/ip_conntrack_max
try to change value from this file to a higher value. It may happen. If it
doesn''t help go keep mailing me :).
No i didn''t overcome my problem yet. But I''m close. I did what i sad in the
first line of my mail and it help for some time.
I think htb has some kind of defect when using ds_mark. When I were shaping
download only using
2011 Aug 31
1
[LLVMdev] FP Stack overflow with inline asm
Hi LLVM hackers,
when switching one of our projects to LLVM we discovered some strange behavior. We tracked the issue down to the following test case:
int main()
{
double v = 0.84711;
int r;
__asm__("fistl %0": "=m"(r) : "t"(v));
return r;
}
The (relevant) clang generated asm looks like this:
fldt 0.84711
## InlineAsm Start
fistl -4(%ebp)
## InlineAsm End
2017 Jul 27
1
GEP with a null pointer base
>
>
> Message: 5
> Date: Tue, 25 Jul 2017 00:12:35 -0700
> From: Sean Silva via llvm-dev <llvm-dev at lists.llvm.org <mailto:llvm-dev at lists.llvm.org>>
> To: Peter Lawrence <peterl95124 at sbcglobal.net <mailto:peterl95124 at sbcglobal.net>>
> Cc: llvm-dev <llvm-dev at lists.llvm.org <mailto:llvm-dev at lists.llvm.org>>, John Regehr
>
2005 Aug 10
1
overflow and drag&drop?
All,
I''m creating a palette type UI where the user sees a div on the right
of the screen with various items they can drag to the center area. So
far, I''m using the drag & drop calls and this works perfectly. I''ve
run into a problem now because I gave the div an overflow setting and
fixed height so if the palette list gets long it won''t stretch out the
page:
2017 Jul 22
1
GEP with a null pointer base
Sean,
Let me re-phrase a couple words to make it perfectly clear
> On Jul 21, 2017, at 6:29 PM, Peter Lawrence <peterl95124 at sbcglobal.net> wrote:
>
> Sean,
>
> Dan Gohman’s “transform” changes a loop induction variable, but does not change the CFG,
>
> Hal’s “transform” deletes blocks out of the CFG, fundamentally altering it.
>
> These are two totally
2017 Jul 22
3
GEP with a null pointer base
Sean,
Dan Gohman’s “transform” changes a loop induction variable, but does not change the CFG,
Hal’s “transform” deletes blocks out of the CFG, fundamentally altering it.
These are two totally different transforms.
And even the analysis is different,
The first is based on an *assumption* of non-UB (actually there is no analysis to perform)
the second Is based on a *proof* of existence of UB
2007 Sep 18
0
Bug#443024: xen-3: FTBFS: xc_core.c:195: warning: assuming signed overflow does not occur when assuming that (X + c) < X is always false
Package: xen-3
version: 3.1.0-2
Severity: serious
User: debian-qa at lists.debian.org
Usertags: qa-ftbfs-20070917 qa-ftbfs
Justification: FTBFS on i386
Hi,
During a rebuild of all packages in sid, your package failed to build on i386.
Relevant part:
make[5]: Entering directory `/build/user/xen-3-3.1.0/debian/build/build-utils_i386/tools/libxc'
gcc -O2 -fomit-frame-pointer -m32 -march=i686
2005 Jun 20
0
R 2.1.1 is released
I've rolled up R-2.1.1.tar.gz a short while ago. This is a maintenance
release containing mainly bugfixes.
See the full list of changes below.
You can get it from
http://cran.r-project.org/src/base/R-2/R-2.1.1.tar.gz
(give it some time to arrive there) or wait for it to be mirrored at a
CRAN site nearer to you. If you're *really* impatient,
www.biostat.ku.dk/~pd/R-release should work
2005 Jun 20
0
R 2.1.1 is released
I've rolled up R-2.1.1.tar.gz a short while ago. This is a maintenance
release containing mainly bugfixes.
See the full list of changes below.
You can get it from
http://cran.r-project.org/src/base/R-2/R-2.1.1.tar.gz
(give it some time to arrive there) or wait for it to be mirrored at a
CRAN site nearer to you. If you're *really* impatient,
www.biostat.ku.dk/~pd/R-release should work
2003 Apr 07
0
Fwd: [VulnWatch] [DDI-1013] Buffer Overflow in Samba allows remote root compromise
FYI
>Mailing-List: contact vulnwatch-help@vulnwatch.org; run by ezmlm
>List-Post: <mailto:vulnwatch@vulnwatch.org>
>List-Help: <mailto:vulnwatch-help@vulnwatch.org>
>List-Unsubscribe: <mailto:vulnwatch-unsubscribe@vulnwatch.org>
>List-Subscribe: <mailto:vulnwatch-subscribe@vulnwatch.org>
>Delivered-To: mailing list vulnwatch@vulnwatch.org
2007 Mar 22
0
Fwd: RSPerl buffer overflow
Hi,
I installed RSPerl (RSPerl_0.91-2.tar.gz) and after
loading the library I get a buffer overflow.
below is the output from R and below that the
messages during the installation.
Its on an AMD opteron system running Fedora Core5
R version 2.4.1 (2006-12-18).
Thank you very much for your help.
Ido
> sessionInfo()
R version 2.4.1 (2006-12-18)
x86_64-redhat-linux-gnu
locale:
2005 Jun 09
0
[Bug 2784] New: rsync gives following error: buffer overflow in receive_file_entry
https://bugzilla.samba.org/show_bug.cgi?id=2784
Summary: rsync gives following error: buffer overflow in
receive_file_entry
Product: rsync
Version: 2.6.3
Platform: All
OS/Version: All
Status: NEW
Severity: major
Priority: P3
Component: core
AssignedTo: wayned@samba.org
2005 Jun 09
0
[Bug 2785] New: rsync gives following error: buffer overflow in receive_file_entry
https://bugzilla.samba.org/show_bug.cgi?id=2785
Summary: rsync gives following error: buffer overflow in
receive_file_entry
Product: rsync
Version: 2.6.3
Platform: All
OS/Version: All
Status: NEW
Severity: major
Priority: P3
Component: core
AssignedTo: wayned@samba.org
2013 May 27
0
Stack Overflow
Did you try replacing the create() with separate malloc() and init()
steps. If so, which of the two was causing the problems?
BTW, you need a C99 compiler for VAR_ARRAYS to work, although you may be
able to use USE_ALLOCA.
Jean-Marc
On 05/27/2013 08:36 AM, Fezin E T wrote:
> Guys,
>
> Program stack is getting overflowed when I create and destroy encoder
> instance continuously for
2009 Feb 16
2
rsync 3.0.5 - ERROR: buffer overflow in recv_file_entry [generator]
Hi,
Rsync 3.0.5 on both sides. receiver is Open Solaris and sender is Linux.
I got a nested directory - relatively depth but still it should work. It
fails instead.
sending daemon args: --server --sender -vvlWHogDtpre.is --ignore-errors
--numeric-ids --inplace . TEST/
receiving incremental file list
delta-transmission disabled for local transfer or --whole-file
[...]
overflow: xflags=0x7a