Hi Daniel,
On 04.04.2013 15:02, Daniel Wagner wrote:
Hi Jukka,
On 04/04/2013 01:46 PM, Jukka Rissanen wrote:
We were not handling client sent partial TCP messages correctly.
This meant that ConnMan could block if the client using TCP would
not send full DNS request.
Could you describe how you solved it? This would make it simpler to
review it.
Just making the client reading socket non blocking and reading bytes
until we get a full dns request. There is also a timeout (2s) if client
is not sending data fast enough.
The patch is actually very simple but looks complicated because
dnsproxy.c is quite complex piece of code.
Cheers,
Jukka
_______________________________________________
connman mailing list
[email protected]
http://lists.connman.net/listinfo/connman