-
Notifications
You must be signed in to change notification settings - Fork 104
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
modification of response headers with TCP segmentation 1-2 bytes #1864
Comments
EvgeniiMekhanik
added a commit
that referenced
this issue
May 18, 2023
After `skb_fragment` call we should upodate `skb` and `ptr` values using new values from `it`. Also improve work of `ss_skb_cutoff_data` function. If we deal with single skb we should update pointers in TfwStr only when new skb was allocated during `skb_fragment`. Closes #1864
EvgeniiMekhanik
added a commit
that referenced
this issue
May 18, 2023
After `skb_fragment` call we should upodate `skb` and `ptr` values using new values from `it`. Also improve work of `ss_skb_cutoff_data` function. If we deal with single skb we should update pointers in TfwStr only when new skb was allocated during `skb_fragment`. Closes #1864
EvgeniiMekhanik
added a commit
that referenced
this issue
May 19, 2023
After `skb_fragment` call we should upodate `skb` and `ptr` values using new values from `it`. Also improve work of `ss_skb_cutoff_data` function. If we deal with single skb we should update pointers in TfwStr only when new skb was allocated during `skb_fragment`. Closes #1864
EvgeniiMekhanik
added a commit
that referenced
this issue
May 19, 2023
After `skb_fragment` call we should upodate `skb` and `ptr` values using new values from `it`. Also improve work of `ss_skb_cutoff_data` function. If we deal with single skb we should update pointers in TfwStr only when new skb was allocated during `skb_fragment`. Closes #1864
krizhanovsky
pushed a commit
that referenced
this issue
Jun 16, 2023
After `skb_fragment` call we should upodate `skb` and `ptr` values using new values from `it`. Also improve work of `ss_skb_cutoff_data` function. If we deal with single skb we should update pointers in TfwStr only when new skb was allocated during `skb_fragment`. Closes #1864
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Scope
I receive
[tempesta fw] Warning: Can't delete len=1 from skb=000000005b2919ee
in dmesg when server responds with TCP chunks 1-4 bytes and Tempesta rewrites/adds/deletes headers from server response.AR: Client does not receive response;
ER: Client receive response.
Testing
Test to reproduce - some encoding tests. See PR415
The text was updated successfully, but these errors were encountered: