Message129091
| Author |
sdaoden |
| Recipients |
brett.cannon, ixokai, ned.deily, pitrou, sdaoden, vstinner |
| Date |
2011年02月22日.15:58:30 |
| SpamBayes Score |
0.03864599 |
| Marked as misclassified |
No |
| Message-id |
<1298390315.35.0.771640626763.issue11277@psf.upfronthosting.co.za> |
| In-reply-to |
| Content |
Snippet
if (pbuf.len > 1024*5) {
volatile unsigned char *buf = pbuf.buf;
Py_ssize_t len = pbuf.len;
Py_ssize_t i = 0;
volatile unsigned char au[100];
volatile unsigned char*x = au;
fprintf(stderr, "CRC ENTER, buffer=%p\n", buf);
for (i=0; (size_t)i < (size_t)len; ++i) {
fprintf(stderr, "%ld, buf=%p\n", (signed long)i, buf);
*x = *buf++;
}
results in
test_big_buffer (test.test_zlib.ChecksumBigBufferTestCase) ... CRC ENTER, buffer=0x1014ab000
0, buf=0x1014ab000 |
|