diff --git a/src/sock.c b/src/sock.c index 687b080..d40d28c 100644 --- a/src/sock.c +++ b/src/sock.c @@ -146,7 +146,7 @@ int sock_set_event(port_state_t* port_state, const struct epoll_event* ev) { /* EPOLLERR and EPOLLHUP are always reported, even when not requested by the * caller. However they are disabled after a event has been reported for a - * socket for which the EPOLLONESHOT flag as set. */ + * socket for which the EPOLLONESHOT flag was set. */ uint32_t events = ev->events | EPOLLERR | EPOLLHUP; sock_state->user_events = events; diff --git a/src/ws.c b/src/ws.c index 2a97c96..8a3428e 100644 --- a/src/ws.c +++ b/src/ws.c @@ -60,10 +60,10 @@ SOCKET ws_get_base_socket(SOCKET socket) { * never intercept the `SIO_BASE_HANDLE` ioctl [1], Komodia based LSPs do * so anyway, breaking it, with the apparent intention of preventing LSP * bypass [2]. Fortunately they don't handle `SIO_BSP_HANDLE_POLL`, which - * we can use to obtain the socket associated with the next protocol chain - * entry. If this succeeds, loop around and call `SIO_BASE_HANDLE` again - * with the retrieved BSP socket to be sure that we actually got all the - * way to the base. + * will at least let us obtain the socket associated with the next winsock + * protocol chain entry. If this succeeds, loop around and call + * `SIO_BASE_HANDLE` again with the returned BSP socket, to make sure that + * we unwrap all layers and retrieve the actual base socket. * [1] https://docs.microsoft.com/en-us/windows/win32/winsock/winsock-ioctls * [2] https://www.komodia.com/newwiki/index.php?title=Komodia%27s_Redirector_bug_fixes#Version_2.2.2.6 */