You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Test case ID: N/A
Date: 2013/05/09
OS: N/A
Tester: AL
Error module: core.
Description: Packet linearization: http://vger.kernel.org/~davem/skb_data.html.
This doesn't affect functionality at all; it will simply introduce some performance penalty if people gets paged packets.
Observations: It hasn't been addressed because it appears to me the "two helper routines available which make this pretty easy" don't really buy me anything when packets contain IPv4 options or IPv6 extension headers (Eg. how do I know how many bytes do I need to ask to get the layer 4 header's protocol of a IPv6 packet?).
Am I missing something?
The text was updated successfully, but these errors were encountered:
The kernel's IPv4 defragmenter (on kernels 3.13+) accomplishes its task by pretending fragments are pages. Because paging is what linearizing undoes, #41 most likely depends on this.
This is necessary so NAT64 happens after iptables does filtering.
It's also needed so Jool catches local traffic, which is needed by local CLATs.
As an added bonus, it invalidates issue #90. Woot!
Progress so far, summary:
- Issue #33: Done.
- Issue #41: Done.
- Issue #107: Done.
- Issue #111: dhfelix is done, but haven't even started to review.
- Issue #116: EAM done, moved from prerouting done, dummy interface done. Missing (off the top of my head):
- Adapting the global packet processing pipeline for stateless mode.
- Configuration options.
- Review RFC 6145 and updaters.
- Issue #120: Done.
- Issue #121: Not done.
Everything needs testing. There are known bugs with fragmentation.
Test case ID: N/A
Date: 2013/05/09
OS: N/A
Tester: AL
Error module: core.
Description: Packet linearization: http://vger.kernel.org/~davem/skb_data.html.
This doesn't affect functionality at all; it will simply introduce some performance penalty if people gets paged packets.
Observations: It hasn't been addressed because it appears to me the "two helper routines available which make this pretty easy" don't really buy me anything when packets contain IPv4 options or IPv6 extension headers (Eg. how do I know how many bytes do I need to ask to get the layer 4 header's protocol of a IPv6 packet?).
Am I missing something?
The text was updated successfully, but these errors were encountered: