- 21 Apr, 2011 1 commit
-
-
deuce authored
are where the code was actually "wrong" in some way and the cast was not intentional. If the compiler thinks you need to be warned about casting a pointer to an int of a different size and that's exactly what we mean to do, then we *should* be getting a warning.
-
- 12 Mar, 2010 1 commit
-
-
deuce authored
Also, prevent a write of zero bytes from clearing the empty event.
-
- 21 Oct, 2005 8 commits
-
-
deuce authored
-
deuce authored
-
deuce authored
-
deuce authored
your whole day)
-
deuce authored
Does Win32 hate this?
-
deuce authored
-
deuce authored
To prevent mutex leaks, lock the mutex before destroying it... To prevent sem leaks, if the return value is -1 and the sem is not invalid, wait, post, retry. Unfortunately, POSIX doesn't define the behaviour or sem_destroy() if called while there are threads blocked on sem... luckily, we rarely use POSIX sems.
-
rswindell authored
semaphore from being prematurely reset.
-
- 20 Oct, 2005 2 commits
- 15 Jan, 2005 1 commit
-
-
rswindell authored
-
- 13 Jan, 2005 2 commits
- 08 May, 2003 3 commits
- 04 May, 2003 1 commit
-
-
rswindell authored
each write), must define RINGBUF_SEM.
-
- 30 Apr, 2003 1 commit
-
-
rswindell authored
-
- 29 Apr, 2003 2 commits
- 26 Apr, 2003 1 commit
-
-
deuce authored
old 486 hardware!
-
- 31 Dec, 2002 1 commit
-
-
rswindell authored
Experimenting with this in sbbs to see if there are any race conditions between threads that manipulate the I/O buffers (e.g. Ctrl-C in input_thread clears output buffer).
-
- 18 Nov, 2002 1 commit
-
-
rswindell authored
(for example), you end up with 10K of usable buffer (need extra byte to detect wrap). Was previously limiting usable buffer to size-1.
-
- 29 Oct, 2002 1 commit
-
-
rswindell authored
-
- 30 Oct, 2001 1 commit
-
-
rswindell authored
-
- 04 Feb, 2001 1 commit
-
-
rswindell authored
-
- 10 Oct, 2000 1 commit
-
-
rswindell authored
-