IPC problem
Michael Scheibel
m.scheibel at sirrix.com
Fri Feb 9 11:52:19 CET 2007
Hello L4 hackers,
we've encountered a problem with an IPC transmission based on DICE stubs
generated from the following interface definition:
UInt32 process(
[in, size_is(bufferALen), max_is(MAX_BUFFER_SIZE)] UInt8* bufferA,
[in] UInt32 bufferALen,
[in, size_is(bufferBLen), max_is(MAX_BUFFER_SIZE)] UInt8* bufferB ,
[in] UInt32 bufferBLen,
[out, size_is(*bufferCLen), max_is(MAX_BUFFER_SIZE)] UInt8** bufferC,
[out] UInt32* bufferCLen);
UInt8 is defined as unsigned char, UInt32 is defined as unsigned long,
MAX_BUFFER_SIZE is 1500.
We are using dice version 3.1.0 with the command line options
-fforce-corba-alloc -nostdinc -P-DL4API_l4v2 and the latest OTC snapshot.
In this configuration bufferB is not transmitted correctly but is received as
corrupt data on the server side (which is an L4Linux application).
Is there anything wrong with our interface definition? Any hints appreciated!
Michael
--
Sirrix AG security technologies - http://www.sirrix.com
Michael Scheibel eMail: m.scheibel at sirrix.com
Tel +49(234) 610 071-124
Public key on demand.
Fingerprint 009B 9963 7B28 4356 CA43 5BFD 17A4 AE0F 6943 4B54
This message may contain confidential and/or privileged information.
If you are not the addressee, you must not use, copy, disclose or
take any action based on this message or any information herein.
If you have received this message in error, please advise the sender
immediately by reply e-mail and delete this message.
More information about the l4-hackers
mailing list