Eric S. Raymond via devel writes:
> Thanks, that's a more specific clue than we've had before, and I think
> explains why nobody else could reproduce the bug.  You need a
> rate_exceeded event to trigger it.

Well, it might be the first time it's all together in a single mail, but
all the information was already available earlier.  The question still
is why it gets a KOD at all (maybe once in a while the requests from the
other clients line up in a way that causes a KOD to be sent, but with so
few clients I don't really see the trigger).  The occurence is more rare
since I've de-configured burst mode, but it still happens.

> I'm now betting this bug was introduced by the changed handling of KOD
> packets in Daniel's refactoring of the protcol engine. That tells me
> where to look.

Again, that suspicion was raised earlier, by you IIRC.  I've looked at
that patch, but it changed so many other things.

> I'll put some attention on this immediately.  I think it is quite likely
> that it will be trivial to fix once I have identified the exact defect.

I'm certain of that. :-)


Regards,
Achim.
-- 
+<[Q+ Matrix-12 WAVE#46+305 Neuron microQkb Andromeda XTk Blofeld]>+

Factory and User Sound Singles for Waldorf Blofeld:
http://Synth.Stromeko.net/Downloads.html#WaldorfSounds

_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to