The remote terminal emulator receives these ordinary pieces of data and executes the switch Vim outputs the terminal initialization sequence, which typically includes "switch to alternate screen". Vim performs further initialization via various config files (eg. Vim starts, and calls libraries to obtain and set terminal capabilities for the edit session, based upon $TERM invoked programs inherit $TERM Vim, for instance. environment variable TERM is set upon login and passed to shell you connect to the remote host using a set terminal emulator ( When you are using a X command window, ensure that the titeInhibit resource is not set. Given this, this will require you to ensure you are connecting with both terminal emulators using xterm, to the same host, using the same Vim, using the same Vim settings. SecureCRT supports the alternate screen switch using xterm (I just tested, and can make the alternate screen switch, or not, based upon a setting in my. 54 support the alternate screen switch using xterm Putty supports xterm as the terminal emulator I don't believe there is any option in SecureCRT to enable/disable the "switch to alternate screen" xterm key sequence, so there must be something else different between your putty and SecureCRT connections. L/usr/lib/python2.3/config -lpython2.3 -lutil -lm -Xlinker -export-dynamicīackspace=2 cscopeverbose helplang=en modified tabstop=4 viminfo='20,"50Ĭindent expandtab history=50 ruler ttyfast t_Sb=^[[4%dmĬscopetag foldmethod=marker incsearch shiftwidth=2 ttymouse=xterm t_Sf=^[[3%dm L5/5.8.5/i386-linux-thread-multi/auto/DynaLoader/DynaLoader.a -L/usr/lib/perl5/5.8.5/i386-linux-thread-multi/CORE -lperl -lutil -lc lncurses -lselinux -lacl -lgpm -Wl,-E -Wl,-rpath,/usr/lib/perl5/5.8.5/i386-linux-thread-multi/CORE -L/usr/local/lib /usr/lib/per Linking: i386-redhat-linux-gcc -Wl,-E -Wl,-rpath,/usr/lib/perl5/5.8.5/i386-linux-thread-multi/CORE -L/usr/local/lib -o vim I/usr/include/gdbm -I/usr/lib/perl5/5.8.5/i386-linux-thread-multi/CORE -I/usr/include/python2.3 -pthread _FILE_OFFSET_BITS=64 -D_REENTRANT -D_GNU_SOURCE -DDEBUGGING -pipe -I/usr/local/include -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 Iproto -DHAVE_CONFIG_H -O2 -g -pipe -m32 -march=i386 -mtune=pentium4 -D_GNU_SOURCE -D +visual +visualextra +viminfo +vreplace +wildignore +wildmenu +windows +writebackup -X11 -xfontset -xim -xsmp -xterm_clipboardĬompilation: i386-redhat-linux-gcc -c -I. +printer +python +quickfix +rightleft -ruby +scrollbind +signs +smartindent -sniff +statusline -sun_workshop +syntax +tag_binary mouse_jsbterm +mouse_netterm +mouse_xterm +multi_byte +multi_lang -netbeans_intg -osfiletype +path_extra +perl +postscript +libcall +linebreak +lispindent +listcmds +localmap +menu +mksession +modify_fname +mouse -mouseshape +mouse_dec +mouse_gpm +file_in_path +find_in_path +folding -footer +fork() +gettext -hangul_input +iconv +insert_expand +jumplist +keymap +langmap +cmdline_info +comments +cryptv +cscope +dialog_con +diff +digraphs -dnd -ebcdic +emacs_tags +eval +ex_extra +extra_search +farsi +arabic +autocmd -balloon_eval -browse ++builtin_terms +byte_offset +cindent -clientserver -clipboard +cmdline_compl +cmdline_hist release/bin/SunOS-x86/rfs_preload.so: 0 error(s), 4 warning(s), 0 leak(s) in total WARNING 4 (MRC): missing null-pointer check after malloc: malloc(8):Ĥ23: prev = (int (*)(void*, void*, void * (*)(void *), void*)) get_real_addr(pthread_create) Ĥ25:=> pthread_routine_data *data = malloc(sizeof (pthread_routine_data)) WARNING 3 (MRC): missing null-pointer check after malloc: malloc(((unsigned).XA$BAAB3lwXWUgk.my_dir_len+1)): WARNING 2 (MRC): missing null-pointer check after malloc: malloc(1025): WARNING 1 (MRC): missing null-pointer check after malloc: malloc(1025): release/bin/SunOS-x86/rfs_controller:Ġ error(s), 5 warning(s), 2 leak(s) in total release/bin/SunOS-x86/rfs_preload.so:Ġ error(s), 4 warning(s), 0 leak(s) in total There are also issues discovered with static analysis. LEAK 65: 1 allocation with total size of 63 bytesĮRROR 1 (UAW): writing to unallocated memory at address 0x81f7c40 (63 bytes) on the heap at:ģ53: char* dir = getenv("RFS_CONTROLLER_DIR") ĮRROR 2 (UAR): reading from unallocated memory "*real_dir" at address 0x8208d70 (62 bytes) on the heap at: LEAK 18: 1 allocation with total size of 1025 bytesģ61:=> char* real_dir = malloc(PATH_MAX + 1) There are also several issues wit rfs_preload:
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |