[ntp:hackers] FreeBSD serial ports
Danny Mayer
mayer at gis.net
Fri Feb 11 19:05:57 PST 2005
Spam detection software, running on the system "maccarony.ntp.org", has
identified this incoming email as possible spam. The original message
has been attached to this so you can view it (if it isn't spam) or block
similar future email. If you have any questions, see
the administrator of that system for details.
Content preview: At 12:27 PM 2/10/2005, Greg Dowd wrote: >Dave, > That
may be fixed by changing the 0 length read to drop the >recvbuf and
continue. That fix didn't work for ACTS since the daemon >would hard
loop there forever since 0 length read meant eof without &C >change. If
the problem is a momentary glitch in hardware, perhaps it >would
recover? > >The daemon really shouldn't be allocating a recvbuf on a 0
length read >anyway, should it? There's no state that I know of where
you would need >to timestamp the hangup in refclock. [...]
Content analysis details: (4.3 points, 4.1 required)
pts rule name description
---- ---------------------- --------------------------------------------------
2.8 RCVD_IN_SORBS_WEB RBL: SORBS: sender is a abuseable web server
[207.7.194.204 listed in dnsbl.sorbs.net]
1.5 RCVD_IN_SORBS RBL: SORBS: sender is listed in SORBS
[207.7.194.204 listed in dnsbl.sorbs.net]
More information about the hackers
mailing list