[Bug 1889943] Re: Improper TCP/IP packet splitting on e1000e/vmxnet3

2021-07-06 Thread Launchpad Bug Tracker
[Expired for QEMU because there has been no activity for 60 days.] ** Changed in: qemu Status: Incomplete => Expired -- You received this bug notification because you are a member of qemu- devel-ml, which is subscribed to QEMU. https://bugs.launchpad.net/bugs/1889943 Title: Improper

[Bug 1889943] Re: Improper TCP/IP packet splitting on e1000e/vmxnet3

2021-05-07 Thread Thomas Huth
The QEMU project is currently moving its bug tracking to another system. For this we need to know which bugs are still valid and which could be closed already. Thus we are setting the bug state to "Incomplete" now. If the bug has already been fixed in the latest upstream version of QEMU, then

[Bug 1889943] Re: Improper TCP/IP packet splitting on e1000e/vmxnet3

2020-08-02 Thread Patrick Magauran
Some more clarifications: It appears the QEMU does turn on the vnet_hdr flag of the tap interface in most cases, not just host-only networks. My previous assumption was due to the way the libvirt manages it, only setting it if the virtio interface is used. Still, for software fragmentation

[Bug 1889943] Re: Improper TCP/IP packet splitting on e1000e/vmxnet3

2020-08-01 Thread Patrick Magauran
After stepping through the code, it has become clear that the e1000e/vmxnet3 emulated models do not implement TCP segmentation, however they still "advertise" it as a feature to the guest OS. Regarding my prior interpretation, the implementation is written to forward the entire packet to the host

[Bug 1889943] Re: Improper TCP/IP packet splitting on e1000e/vmxnet3

2020-07-31 Thread Patrick Magauran
After reading through some of the code for the e1000, e1000e, and vmxnet3 device models, it appears that all 3 are capable of performing tcp segementation, however, in the net_tx_pkt_send function, there is a check if (pkt->has_virt_hdr || pkt->virt_hdr.gso_type ==