[ntp:hackers] FreeBSD serial ports

Danny Mayer mayer at gis.net
Fri Feb 11 19:05:57 PST 2005


Spam detection software, running on the system "maccarony.ntp.org", has
identified this incoming email as possible spam.  The original message
has been attached to this so you can view it (if it isn't spam) or block
similar future email.  If you have any questions, see
the administrator of that system for details.

Content preview:  At 12:27 PM 2/10/2005, Greg Dowd wrote: >Dave, > That
  may be fixed by changing the 0 length read to drop the >recvbuf and
  continue. That fix didn't work for ACTS since the daemon >would hard
  loop there forever since 0 length read meant eof without &C >change. If
  the problem is a momentary glitch in hardware, perhaps it >would
  recover? > >The daemon really shouldn't be allocating a recvbuf on a 0
  length read >anyway, should it? There's no state that I know of where
  you would need >to timestamp the hangup in refclock. [...] 

Content analysis details:   (4.3 points, 4.1 required)

 pts rule name              description
---- ---------------------- --------------------------------------------------
 2.8 RCVD_IN_SORBS_WEB      RBL: SORBS: sender is a abuseable web server
                            [207.7.194.204 listed in dnsbl.sorbs.net]
 1.5 RCVD_IN_SORBS          RBL: SORBS: sender is listed in SORBS
                            [207.7.194.204 listed in dnsbl.sorbs.net]




More information about the hackers mailing list