> The first option is necessarry and is the primary use of the target.
> The last three options are more experimental and would allow somebody
> to play with 'simulated congestion' by setting the ECT in IP, etc.
> However, this is potentially very dangerous
Yes, they are illegal.
I would not say "very dangerous". Surely, much less dangerous
than cp /dev/zero /dev/mem. :-)
So, I think it can be added for debugging purposes, provided hidden
in a section devoted to debugging in manual and not shown in command