On 08/04/2018 04:03 AM, Jeremiah Breeden wrote:
> Ok, with that in mind, the current set of loops are not being done atomically
> (it is not done inside a protected operation).  So the next question is how do
> we get to where they are done in a more atomic manner.  I started off with a
> mutex like implementation for the close loop.since the close procedure could
> potentially block (and thus could not go in a protected operation).  That
> wouldn't work for the ping loop without restructuring the ping procedure 
> itself
> (and pull out the deletions to be done afterwards as mentioned in an earlier
> email/post).

With GNAT, which we have to use because Gnoga's in Ada 12, you can include
potentially blocking operations in a PO, which is nice, because that restriction
was a mistake. So I see no problem with putting these loops into protected
operations. Modifying the Ping loop to create a structure of IDs to delete after
the ping loop should be trivial.

-- 
Jeff Carter
"The time has come to act, and act fast. I'm leaving."
Blazing Saddles
36

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Gnoga-list mailing list
Gnoga-list@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/gnoga-list

Reply via email to