-
Notifications
You must be signed in to change notification settings - Fork 66
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Incorrect fragment handling on higher kernels #231
Comments
Totally a 3.4 bug as well. It seems to happen when the packets are both paged and fragmented. This seems to prevent This changes the way Jool has to cope with |
The bug is already known so there's no need to keep adding noise to the kernel log.
Planning to remove the defrag dependency in Jool 4, so this will be indirectly fixed by #140. |
|
Turns out that this bug took too long to get fixed, and the kernels that were supposed to reach the stated code are seemingly phasing out of relevance. Right now, the earliest most relevant kernels that I'm aware of are
At this point it seems that the sensible solution is to just drop support for kernels 3.12- and call it a day. This is the current plan. If anyone disagrees, please comment. |
- Removed glue code for kernels older than 3.13. (Mostly the fragment database. Including --fragment-arrival-timeout.) Basically terminates #231. - Fixed some --instance bugs. Usage of the command should also be simpler. It is certainly easier to explain in the documentation, at least. - The stats system got in the way of something (can't recall what), and I decided that it needed a refactor. Only the API and callers were updated; the innards were removed because I'm out of time. - Separate Netfilter hook code (kernel_hook_netfilter.c) from iptables hook code (kernel_hook_iptables.c). - To account for the design of iptables, VERDICT_ACCEPT became VERDICT_UNTRANSLATABLE (accept on Netfilter, drop on iptables). Jool no longer NF_ACCEPTs at iptables; it didn't make sense because of the rule matching.
Released; closing. |
Updated some kernel (4.4.1), found this several times on the log:
This is a warning, not a panic. NAT64 only. Tested on Jool 3.5. Relevant and surrounding code did not change between 3.4 and 3.5, so this is likely a bug on both Jool series. Will confirm later.
Affects fragmented packets. I don't know what happens to them; they probably get dropped. Trying to replicate it I seem to have triggered it once by querying either Steam or the Playstation Store for the first time in a while. If my traffic really caused it, the endnodes managed to stabilize the connection automatically; I didn't notice any disruptions.
The text was updated successfully, but these errors were encountered: