luwenpeng
|
a64837d19d
|
revert: tcp_reassembly_pop() check ptr && tcp_segment_init() reduce memset
|
2024-08-14 17:25:46 +08:00 |
|
yangwei
|
f25c80d7f5
|
🐞 fix(tcp_reassembly_pop): oldest ptr check null
|
2024-08-12 15:48:37 +08:00 |
|
yangwei
|
0deeb7f3e7
|
🎈 perf(timer, packet_io_yield): update parameter
|
2024-08-12 15:45:50 +08:00 |
|
yangwei
|
49539eb253
|
🎈 perf(pacekt and tcp_segment init): reduce memset
|
2024-08-12 15:45:50 +08:00 |
|
luwenpeng
|
12975e2da7
|
Removed the ambiguous session_get0_current_payload() API. It is unclear whether the original packet payload or TCP reassembled payload is obtained.
It is recommended to:
* Use packet_get_payload() to obtain the original packet payload
* Use tcp_segment_get_data() to obtain the reassembled data
|
2024-08-01 15:48:27 +08:00 |
|
luwenpeng
|
076b3c7b0b
|
refactor: session module (split to define/utils/pool/table/timer/transition/manager)
|
2024-06-25 10:32:51 +08:00 |
|
luwenpeng
|
61ee619689
|
TCP reassembly add stat of TCP retransmit and TCP overlap
|
2024-05-06 17:33:02 +08:00 |
|
luwenpeng
|
d57c81697f
|
bugfix: call duplicated packet filter too many times
|
2024-04-17 17:53:42 +08:00 |
|
luwenpeng
|
17f5d338de
|
Add packet utils to packet.h
|
2024-04-14 13:14:48 +08:00 |
|
luwenpeng
|
e8e60cee6d
|
Refactor TCP reassembly, the session knows where the TCP segment comes from: raw packet or tcp segment queue
|
2024-04-03 15:45:08 +08:00 |
|
luwenpeng
|
a509f0ce3b
|
Update API of manipulation session
|
2024-04-01 17:15:19 +08:00 |
|
luwenpeng
|
6e422ecb8d
|
Update session timeouts
|
2024-03-29 16:32:16 +08:00 |
|
luwenpeng
|
814a0d739f
|
Add linux kernel interval tree
|
2024-03-27 17:16:59 +08:00 |
|
luwenpeng
|
eb281ab789
|
session manager support tcp reassembly
|
2024-03-26 15:09:03 +08:00 |
|
luwenpeng
|
5b92d6d8de
|
Add tcp reassembly test case
|
2024-03-25 17:30:48 +08:00 |
|
luwenpeng
|
2ad811f68d
|
Add tcp reassembly
|
2024-03-21 19:27:41 +08:00 |
|