lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Tue, 5 May 2015 17:39:56 +0000
From:	Chris Purvis <Chris.Purvis@...rofocus.com>
To:	"'Peter Hurley'" <peter@...leysoftware.com>,
	Nic Percival <Nic.Percival@...rofocus.com>,
	"'Michael Matz'" <matz@...e.de>,
	Kevin Fletcher <Kevin.Fletcher@...rofocus.com>,
	Paul Matthews <Paul.Matthews@...rofocus.com>
CC:	"'NeilBrown'" <neilb@...e.de>,
	"'Greg Kroah-Hartman'" <gregkh@...uxfoundation.org>,
	"'Jiri Slaby'" <jslaby@...e.cz>,
	"'linux-kernel@...r.kernel.org'" <linux-kernel@...r.kernel.org>
Subject: RE: [PATCH bisected regression] input_available_p() sometimes says
 'no' when it should say 'yes'

Apologies all.  Nic and I did not realise that an internal email had been cross-posted to a public mail list (let alone one with strict email formatting rules!), and were having a hard time understanding the context for the emails we were receiving.

I have a certain amount of experience of asynchronous communication and protocol design: we aren't novices in this area.  One would hope in the kind of intra-machine protocol that we're using here that, if we know the sender is halted, there should be a way of clearing the contents of the channel so that the receiver can get hold of whatever has been put in to it.
Can tcflush() (or some similar API) be used to resolve our debugging scenario?

Regards,
Chris
-- 
Chris Purvis
Senior Development Manager 

Micro Focus

chris.purvis@...rofocus.com
The Lawn, 22-30 Old Bath Road
Newbury, Berkshire, RG14 1QN, UK
Direct:    +44 1635 565282



This message has been scanned for malware by Websense. www.websense.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ