find

Results 5 comments of find

the `offs + sizeof(struct exa_tcp_new_connection)` will be large than RX_BUFFER_SIZE and the `rx_lock` will dead lock https://github.com/exablaze-oss/exanic-software/blob/9b1f69cfa252402cd1f0dbe9ba4115ed51d0ae7a/modules/exasock/exasock-tcp.c#L2589

I have used the Epoll frame in the server when I found this, and my client is like this: ``` python server_msg=(addr, port) while True: client_sock = socket.socket() client_sock.connect(server_msg) client_sock.close()...

I run the `exasock` at the server , and the version is 2.4.1

How can I defense this attack