netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* ICMP_PARAMETERPROB and ICMP_TIME_EXCEEDED during connect
@ 2024-03-26 20:34 Jakub Kicinski
  2024-03-26 22:03 ` Neal Cardwell
  0 siblings, 1 reply; 8+ messages in thread
From: Jakub Kicinski @ 2024-03-26 20:34 UTC (permalink / raw)
  To: Eric Dumazet, Paolo Abeni, ncardwell; +Cc: netdev

Hi!

I got a report from a user surprised/displeased that ICMP_TIME_EXCEEDED
breaks connect(), while TCP RFCs say it shouldn't. Even pointing a
finger at Linux, RFC5461:

   A number of TCP implementations have modified their reaction to all
   ICMP soft errors and treat them as hard errors when they are received
   for connections in the SYN-SENT or SYN-RECEIVED states.  For example,
   this workaround has been implemented in the Linux kernel since
   version 2.0.0 (released in 1996) [Linux].  However, it should be
   noted that this change violates section 4.2.3.9 of [RFC1122], which
   states that these ICMP error messages indicate soft error conditions
   and that, therefore, TCP MUST NOT abort the corresponding connection.

Is there any reason we continue with this behavior or is it just that
nobody ever sent a patch?

Somewhat related in tcp_v4_err() we do:

	switch (sk->sk_state) {
	case TCP_SYN_SENT:
	case TCP_SYN_RECV:
		[...]

		if (!sock_owned_by_user(sk)) {
			WRITE_ONCE(sk->sk_err, err);

			sk_error_report(sk);

			tcp_done(sk);
		} else {
			WRITE_ONCE(sk->sk_err_soft, err);
		}
		goto out;
	}

So the error is soft if socket is locked, and I can't find anything
in backlog processing which would pay attention. So it seems that 
under certain conditions we already ignore it.

Can we ignore it always, or perhaps conditionally based on IP_RECVERR?

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: ICMP_PARAMETERPROB and ICMP_TIME_EXCEEDED during connect
  2024-03-26 20:34 ICMP_PARAMETERPROB and ICMP_TIME_EXCEEDED during connect Jakub Kicinski
@ 2024-03-26 22:03 ` Neal Cardwell
  2024-03-26 23:55   ` Jakub Kicinski
  0 siblings, 1 reply; 8+ messages in thread
From: Neal Cardwell @ 2024-03-26 22:03 UTC (permalink / raw)
  To: Jakub Kicinski; +Cc: Eric Dumazet, Paolo Abeni, netdev

On Tue, Mar 26, 2024 at 9:34 PM Jakub Kicinski <kuba@kernel.org> wrote:
>
> Hi!
>
> I got a report from a user surprised/displeased that ICMP_TIME_EXCEEDED
> breaks connect(), while TCP RFCs say it shouldn't. Even pointing a
> finger at Linux, RFC5461:
>
>    A number of TCP implementations have modified their reaction to all
>    ICMP soft errors and treat them as hard errors when they are received
>    for connections in the SYN-SENT or SYN-RECEIVED states.  For example,
>    this workaround has been implemented in the Linux kernel since
>    version 2.0.0 (released in 1996) [Linux].  However, it should be
>    noted that this change violates section 4.2.3.9 of [RFC1122], which
>    states that these ICMP error messages indicate soft error conditions
>    and that, therefore, TCP MUST NOT abort the corresponding connection.
>
> Is there any reason we continue with this behavior or is it just that
> nobody ever sent a patch?

Back in November of 2023 Eric did merge a patch to bring the
processing in line with section 4.2.3.9 of [RFC1122]:

0a8de364ff7a tcp: no longer abort SYN_SENT when receiving some ICMP

However, the fixed behavior did not meet some expectations of Vagrant
(see the netdev thread "Bug report connect to VM with Vagrant"), so
for now it got reverted:

b59db45d7eba tcp: Revert no longer abort SYN_SENT when receiving some ICMP

I think the hope was to root-cause the Vagrant issue, fix Vagrant's
assumptions, then resubmit Eric's commit. Eric mentioned on Jan 8,
2024: "We will submit the patch again for 6.9, once we get to the root
cause." But I don't think anyone has had time to do that yet.

neal

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: ICMP_PARAMETERPROB and ICMP_TIME_EXCEEDED during connect
  2024-03-26 22:03 ` Neal Cardwell
@ 2024-03-26 23:55   ` Jakub Kicinski
  2024-03-27 13:05     ` Eric Dumazet
  0 siblings, 1 reply; 8+ messages in thread
From: Jakub Kicinski @ 2024-03-26 23:55 UTC (permalink / raw)
  To: Neal Cardwell; +Cc: Eric Dumazet, Paolo Abeni, netdev

On Tue, 26 Mar 2024 23:03:26 +0100 Neal Cardwell wrote:
> On Tue, Mar 26, 2024 at 9:34 PM Jakub Kicinski <kuba@kernel.org> wrote:
> >
> > Hi!
> >
> > I got a report from a user surprised/displeased that ICMP_TIME_EXCEEDED
> > breaks connect(), while TCP RFCs say it shouldn't. Even pointing a
> > finger at Linux, RFC5461:
> >
> >    A number of TCP implementations have modified their reaction to all
> >    ICMP soft errors and treat them as hard errors when they are received
> >    for connections in the SYN-SENT or SYN-RECEIVED states.  For example,
> >    this workaround has been implemented in the Linux kernel since
> >    version 2.0.0 (released in 1996) [Linux].  However, it should be
> >    noted that this change violates section 4.2.3.9 of [RFC1122], which
> >    states that these ICMP error messages indicate soft error conditions
> >    and that, therefore, TCP MUST NOT abort the corresponding connection.
> >
> > Is there any reason we continue with this behavior or is it just that
> > nobody ever sent a patch?  
> 
> Back in November of 2023 Eric did merge a patch to bring the
> processing in line with section 4.2.3.9 of [RFC1122]:
> 
> 0a8de364ff7a tcp: no longer abort SYN_SENT when receiving some ICMP
> 
> However, the fixed behavior did not meet some expectations of Vagrant
> (see the netdev thread "Bug report connect to VM with Vagrant"), so
> for now it got reverted:
> 
> b59db45d7eba tcp: Revert no longer abort SYN_SENT when receiving some ICMP
> 
> I think the hope was to root-cause the Vagrant issue, fix Vagrant's
> assumptions, then resubmit Eric's commit. Eric mentioned on Jan 8,
> 2024: "We will submit the patch again for 6.9, once we get to the root
> cause." But I don't think anyone has had time to do that yet.

Ah.

Thank you!!

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: ICMP_PARAMETERPROB and ICMP_TIME_EXCEEDED during connect
  2024-03-26 23:55   ` Jakub Kicinski
@ 2024-03-27 13:05     ` Eric Dumazet
  2024-04-02 13:21       ` Leon Romanovsky
  0 siblings, 1 reply; 8+ messages in thread
From: Eric Dumazet @ 2024-03-27 13:05 UTC (permalink / raw)
  To: Jakub Kicinski; +Cc: Neal Cardwell, Paolo Abeni, netdev

On Wed, Mar 27, 2024 at 12:55 AM Jakub Kicinski <kuba@kernel.org> wrote:
>
> On Tue, 26 Mar 2024 23:03:26 +0100 Neal Cardwell wrote:
> > On Tue, Mar 26, 2024 at 9:34 PM Jakub Kicinski <kuba@kernel.org> wrote:
> > >
> > > Hi!
> > >
> > > I got a report from a user surprised/displeased that ICMP_TIME_EXCEEDED
> > > breaks connect(), while TCP RFCs say it shouldn't. Even pointing a
> > > finger at Linux, RFC5461:
> > >
> > >    A number of TCP implementations have modified their reaction to all
> > >    ICMP soft errors and treat them as hard errors when they are received
> > >    for connections in the SYN-SENT or SYN-RECEIVED states.  For example,
> > >    this workaround has been implemented in the Linux kernel since
> > >    version 2.0.0 (released in 1996) [Linux].  However, it should be
> > >    noted that this change violates section 4.2.3.9 of [RFC1122], which
> > >    states that these ICMP error messages indicate soft error conditions
> > >    and that, therefore, TCP MUST NOT abort the corresponding connection.
> > >
> > > Is there any reason we continue with this behavior or is it just that
> > > nobody ever sent a patch?
> >
> > Back in November of 2023 Eric did merge a patch to bring the
> > processing in line with section 4.2.3.9 of [RFC1122]:
> >
> > 0a8de364ff7a tcp: no longer abort SYN_SENT when receiving some ICMP
> >
> > However, the fixed behavior did not meet some expectations of Vagrant
> > (see the netdev thread "Bug report connect to VM with Vagrant"), so
> > for now it got reverted:
> >
> > b59db45d7eba tcp: Revert no longer abort SYN_SENT when receiving some ICMP
> >
> > I think the hope was to root-cause the Vagrant issue, fix Vagrant's
> > assumptions, then resubmit Eric's commit. Eric mentioned on Jan 8,
> > 2024: "We will submit the patch again for 6.9, once we get to the root
> > cause." But I don't think anyone has had time to do that yet.
>
> Ah.
>
> Thank you!!

For the record, Leon Romanovsky brought this issue directly to Linus
Torvalds, stating that I broke things.

It tooks weeks before Shachar did some debugging, but with no
conclusion I recall.

This kind of stuff makes me not very eager to work on this point.

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: ICMP_PARAMETERPROB and ICMP_TIME_EXCEEDED during connect
  2024-03-27 13:05     ` Eric Dumazet
@ 2024-04-02 13:21       ` Leon Romanovsky
  2024-04-02 13:31         ` Eric Dumazet
  0 siblings, 1 reply; 8+ messages in thread
From: Leon Romanovsky @ 2024-04-02 13:21 UTC (permalink / raw)
  To: Eric Dumazet; +Cc: Jakub Kicinski, Neal Cardwell, Paolo Abeni, netdev

On Wed, Mar 27, 2024 at 02:05:17PM +0100, Eric Dumazet wrote:
> On Wed, Mar 27, 2024 at 12:55 AM Jakub Kicinski <kuba@kernel.org> wrote:
> >
> > On Tue, 26 Mar 2024 23:03:26 +0100 Neal Cardwell wrote:
> > > On Tue, Mar 26, 2024 at 9:34 PM Jakub Kicinski <kuba@kernel.org> wrote:
> > > >
> > > > Hi!
> > > >
> > > > I got a report from a user surprised/displeased that ICMP_TIME_EXCEEDED
> > > > breaks connect(), while TCP RFCs say it shouldn't. Even pointing a
> > > > finger at Linux, RFC5461:
> > > >
> > > >    A number of TCP implementations have modified their reaction to all
> > > >    ICMP soft errors and treat them as hard errors when they are received
> > > >    for connections in the SYN-SENT or SYN-RECEIVED states.  For example,
> > > >    this workaround has been implemented in the Linux kernel since
> > > >    version 2.0.0 (released in 1996) [Linux].  However, it should be
> > > >    noted that this change violates section 4.2.3.9 of [RFC1122], which
> > > >    states that these ICMP error messages indicate soft error conditions
> > > >    and that, therefore, TCP MUST NOT abort the corresponding connection.
> > > >
> > > > Is there any reason we continue with this behavior or is it just that
> > > > nobody ever sent a patch?
> > >
> > > Back in November of 2023 Eric did merge a patch to bring the
> > > processing in line with section 4.2.3.9 of [RFC1122]:
> > >
> > > 0a8de364ff7a tcp: no longer abort SYN_SENT when receiving some ICMP
> > >
> > > However, the fixed behavior did not meet some expectations of Vagrant
> > > (see the netdev thread "Bug report connect to VM with Vagrant"), so
> > > for now it got reverted:
> > >
> > > b59db45d7eba tcp: Revert no longer abort SYN_SENT when receiving some ICMP
> > >
> > > I think the hope was to root-cause the Vagrant issue, fix Vagrant's
> > > assumptions, then resubmit Eric's commit. Eric mentioned on Jan 8,
> > > 2024: "We will submit the patch again for 6.9, once we get to the root
> > > cause." But I don't think anyone has had time to do that yet.
> >
> > Ah.
> >
> > Thank you!!
> 
> For the record, Leon Romanovsky brought this issue directly to Linus
> Torvalds, stating that I broke things.

Just to make it clear, Linus was involved after we didn't progress for
more than one month after initial starting "Bug report connect to VM with Vagrant",
while approaching to merge window.
https://lore.kernel.org/netdev/MN2PR12MB44863139E562A59329E89DBEB982A@MN2PR12MB4486.namprd12.prod.outlook.com/

Despite long standing netdev patch flow: apply fast -> revert fast, this
patch was treated differently.

> 
> It tooks weeks before Shachar did some debugging, but with no
> conclusion I recall.

Shachar didn't do debugging, she didn't write the bisected patch.
She is verification engineer who was ready to run ANY tests and try
ANY debug patch which you wanted.

> 
> This kind of stuff makes me not very eager to work on this point.
> 

OK, so it is not important at the end.

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: ICMP_PARAMETERPROB and ICMP_TIME_EXCEEDED during connect
  2024-04-02 13:21       ` Leon Romanovsky
@ 2024-04-02 13:31         ` Eric Dumazet
  2024-04-02 14:17           ` Jason Xing
  0 siblings, 1 reply; 8+ messages in thread
From: Eric Dumazet @ 2024-04-02 13:31 UTC (permalink / raw)
  To: Leon Romanovsky; +Cc: Jakub Kicinski, Neal Cardwell, Paolo Abeni, netdev

On Tue, Apr 2, 2024 at 3:21 PM Leon Romanovsky <leon@kernel.org> wrote:
>
> On Wed, Mar 27, 2024 at 02:05:17PM +0100, Eric Dumazet wrote:
> > On Wed, Mar 27, 2024 at 12:55 AM Jakub Kicinski <kuba@kernel.org> wrote:
> > >
> > > On Tue, 26 Mar 2024 23:03:26 +0100 Neal Cardwell wrote:
> > > > On Tue, Mar 26, 2024 at 9:34 PM Jakub Kicinski <kuba@kernel.org> wrote:
> > > > >
> > > > > Hi!
> > > > >
> > > > > I got a report from a user surprised/displeased that ICMP_TIME_EXCEEDED
> > > > > breaks connect(), while TCP RFCs say it shouldn't. Even pointing a
> > > > > finger at Linux, RFC5461:
> > > > >
> > > > >    A number of TCP implementations have modified their reaction to all
> > > > >    ICMP soft errors and treat them as hard errors when they are received
> > > > >    for connections in the SYN-SENT or SYN-RECEIVED states.  For example,
> > > > >    this workaround has been implemented in the Linux kernel since
> > > > >    version 2.0.0 (released in 1996) [Linux].  However, it should be
> > > > >    noted that this change violates section 4.2.3.9 of [RFC1122], which
> > > > >    states that these ICMP error messages indicate soft error conditions
> > > > >    and that, therefore, TCP MUST NOT abort the corresponding connection.
> > > > >
> > > > > Is there any reason we continue with this behavior or is it just that
> > > > > nobody ever sent a patch?
> > > >
> > > > Back in November of 2023 Eric did merge a patch to bring the
> > > > processing in line with section 4.2.3.9 of [RFC1122]:
> > > >
> > > > 0a8de364ff7a tcp: no longer abort SYN_SENT when receiving some ICMP
> > > >
> > > > However, the fixed behavior did not meet some expectations of Vagrant
> > > > (see the netdev thread "Bug report connect to VM with Vagrant"), so
> > > > for now it got reverted:
> > > >
> > > > b59db45d7eba tcp: Revert no longer abort SYN_SENT when receiving some ICMP
> > > >
> > > > I think the hope was to root-cause the Vagrant issue, fix Vagrant's
> > > > assumptions, then resubmit Eric's commit. Eric mentioned on Jan 8,
> > > > 2024: "We will submit the patch again for 6.9, once we get to the root
> > > > cause." But I don't think anyone has had time to do that yet.
> > >
> > > Ah.
> > >
> > > Thank you!!
> >
> > For the record, Leon Romanovsky brought this issue directly to Linus
> > Torvalds, stating that I broke things.
>
> Just to make it clear, Linus was involved after we didn't progress for
> more than one month after initial starting "Bug report connect to VM with Vagrant",
> while approaching to merge window.
> https://lore.kernel.org/netdev/MN2PR12MB44863139E562A59329E89DBEB982A@MN2PR12MB4486.namprd12.prod.outlook.com/
>
> Despite long standing netdev patch flow: apply fast -> revert fast, this
> patch was treated differently.

I was waiting input from you. I think you only waited for "revert first"

>
> >
> > It tooks weeks before Shachar did some debugging, but with no
> > conclusion I recall.
>
> Shachar didn't do debugging, she didn't write the bisected patch.
> She is verification engineer who was ready to run ANY tests and try
> ANY debug patch which you wanted.
>
> >
> > This kind of stuff makes me not very eager to work on this point.
> >
>
> OK, so it is not important at the end.

I certainly do not want to waste time arguing with you on a valid
patch, which happens to break some buggy user space.

Apparently some people think RFC are not important.

You won.

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: ICMP_PARAMETERPROB and ICMP_TIME_EXCEEDED during connect
  2024-04-02 13:31         ` Eric Dumazet
@ 2024-04-02 14:17           ` Jason Xing
  2024-04-02 17:32             ` Leon Romanovsky
  0 siblings, 1 reply; 8+ messages in thread
From: Jason Xing @ 2024-04-02 14:17 UTC (permalink / raw)
  To: Eric Dumazet
  Cc: Leon Romanovsky, Jakub Kicinski, Neal Cardwell, Paolo Abeni,
	netdev

On Tue, Apr 2, 2024 at 9:32 PM Eric Dumazet <edumazet@google.com> wrote:
>
> On Tue, Apr 2, 2024 at 3:21 PM Leon Romanovsky <leon@kernel.org> wrote:
> >
> > On Wed, Mar 27, 2024 at 02:05:17PM +0100, Eric Dumazet wrote:
> > > On Wed, Mar 27, 2024 at 12:55 AM Jakub Kicinski <kuba@kernel.org> wrote:
> > > >
> > > > On Tue, 26 Mar 2024 23:03:26 +0100 Neal Cardwell wrote:
> > > > > On Tue, Mar 26, 2024 at 9:34 PM Jakub Kicinski <kuba@kernel.org> wrote:
> > > > > >
> > > > > > Hi!
> > > > > >
> > > > > > I got a report from a user surprised/displeased that ICMP_TIME_EXCEEDED
> > > > > > breaks connect(), while TCP RFCs say it shouldn't. Even pointing a
> > > > > > finger at Linux, RFC5461:
> > > > > >
> > > > > >    A number of TCP implementations have modified their reaction to all
> > > > > >    ICMP soft errors and treat them as hard errors when they are received
> > > > > >    for connections in the SYN-SENT or SYN-RECEIVED states.  For example,
> > > > > >    this workaround has been implemented in the Linux kernel since
> > > > > >    version 2.0.0 (released in 1996) [Linux].  However, it should be
> > > > > >    noted that this change violates section 4.2.3.9 of [RFC1122], which
> > > > > >    states that these ICMP error messages indicate soft error conditions
> > > > > >    and that, therefore, TCP MUST NOT abort the corresponding connection.
> > > > > >
> > > > > > Is there any reason we continue with this behavior or is it just that
> > > > > > nobody ever sent a patch?
> > > > >
> > > > > Back in November of 2023 Eric did merge a patch to bring the
> > > > > processing in line with section 4.2.3.9 of [RFC1122]:
> > > > >
> > > > > 0a8de364ff7a tcp: no longer abort SYN_SENT when receiving some ICMP
> > > > >
> > > > > However, the fixed behavior did not meet some expectations of Vagrant
> > > > > (see the netdev thread "Bug report connect to VM with Vagrant"), so
> > > > > for now it got reverted:
> > > > >
> > > > > b59db45d7eba tcp: Revert no longer abort SYN_SENT when receiving some ICMP
> > > > >
> > > > > I think the hope was to root-cause the Vagrant issue, fix Vagrant's
> > > > > assumptions, then resubmit Eric's commit. Eric mentioned on Jan 8,
> > > > > 2024: "We will submit the patch again for 6.9, once we get to the root
> > > > > cause." But I don't think anyone has had time to do that yet.
> > > >
> > > > Ah.
> > > >
> > > > Thank you!!
> > >
> > > For the record, Leon Romanovsky brought this issue directly to Linus
> > > Torvalds, stating that I broke things.
> >
> > Just to make it clear, Linus was involved after we didn't progress for
> > more than one month after initial starting "Bug report connect to VM with Vagrant",
> > while approaching to merge window.
> > https://lore.kernel.org/netdev/MN2PR12MB44863139E562A59329E89DBEB982A@MN2PR12MB4486.namprd12.prod.outlook.com/
> >
> > Despite long standing netdev patch flow: apply fast -> revert fast, this
> > patch was treated differently.
>
> I was waiting input from you. I think you only waited for "revert first"
>
> >
> > >
> > > It tooks weeks before Shachar did some debugging, but with no
> > > conclusion I recall.
> >
> > Shachar didn't do debugging, she didn't write the bisected patch.
> > She is verification engineer who was ready to run ANY tests and try
> > ANY debug patch which you wanted.
> >
> > >
> > > This kind of stuff makes me not very eager to work on this point.
> > >
> >
> > OK, so it is not important at the end.
>
> I certainly do not want to waste time arguing with you on a valid
> patch, which happens to break some buggy user space.
>
> Apparently some people think RFC are not important.

RFC is important.

Honestly, I read those threads over and over again. Since she provided
some tcpdump logs which do not include ICMP, my question is still the
same as Eric: why does this breakage have a relationship with this
patch??? I get lost. It doesn't make sense really...

If someone is able to more easily reproduce this issue, I'm happy to help debug.

Thanks,
Jason

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: ICMP_PARAMETERPROB and ICMP_TIME_EXCEEDED during connect
  2024-04-02 14:17           ` Jason Xing
@ 2024-04-02 17:32             ` Leon Romanovsky
  0 siblings, 0 replies; 8+ messages in thread
From: Leon Romanovsky @ 2024-04-02 17:32 UTC (permalink / raw)
  To: Jason Xing
  Cc: Eric Dumazet, Jakub Kicinski, Neal Cardwell, Paolo Abeni, netdev

On Tue, Apr 02, 2024 at 10:17:16PM +0800, Jason Xing wrote:
> On Tue, Apr 2, 2024 at 9:32 PM Eric Dumazet <edumazet@google.com> wrote:
> >
> > On Tue, Apr 2, 2024 at 3:21 PM Leon Romanovsky <leon@kernel.org> wrote:
> > >
> > > On Wed, Mar 27, 2024 at 02:05:17PM +0100, Eric Dumazet wrote:
> > > > On Wed, Mar 27, 2024 at 12:55 AM Jakub Kicinski <kuba@kernel.org> wrote:
> > > > >
> > > > > On Tue, 26 Mar 2024 23:03:26 +0100 Neal Cardwell wrote:
> > > > > > On Tue, Mar 26, 2024 at 9:34 PM Jakub Kicinski <kuba@kernel.org> wrote:
> > > > > > >
> > > > > > > Hi!
> > > > > > >
> > > > > > > I got a report from a user surprised/displeased that ICMP_TIME_EXCEEDED
> > > > > > > breaks connect(), while TCP RFCs say it shouldn't. Even pointing a
> > > > > > > finger at Linux, RFC5461:
> > > > > > >
> > > > > > >    A number of TCP implementations have modified their reaction to all
> > > > > > >    ICMP soft errors and treat them as hard errors when they are received
> > > > > > >    for connections in the SYN-SENT or SYN-RECEIVED states.  For example,
> > > > > > >    this workaround has been implemented in the Linux kernel since
> > > > > > >    version 2.0.0 (released in 1996) [Linux].  However, it should be
> > > > > > >    noted that this change violates section 4.2.3.9 of [RFC1122], which
> > > > > > >    states that these ICMP error messages indicate soft error conditions
> > > > > > >    and that, therefore, TCP MUST NOT abort the corresponding connection.
> > > > > > >
> > > > > > > Is there any reason we continue with this behavior or is it just that
> > > > > > > nobody ever sent a patch?
> > > > > >
> > > > > > Back in November of 2023 Eric did merge a patch to bring the
> > > > > > processing in line with section 4.2.3.9 of [RFC1122]:
> > > > > >
> > > > > > 0a8de364ff7a tcp: no longer abort SYN_SENT when receiving some ICMP
> > > > > >
> > > > > > However, the fixed behavior did not meet some expectations of Vagrant
> > > > > > (see the netdev thread "Bug report connect to VM with Vagrant"), so
> > > > > > for now it got reverted:
> > > > > >
> > > > > > b59db45d7eba tcp: Revert no longer abort SYN_SENT when receiving some ICMP
> > > > > >
> > > > > > I think the hope was to root-cause the Vagrant issue, fix Vagrant's
> > > > > > assumptions, then resubmit Eric's commit. Eric mentioned on Jan 8,
> > > > > > 2024: "We will submit the patch again for 6.9, once we get to the root
> > > > > > cause." But I don't think anyone has had time to do that yet.
> > > > >
> > > > > Ah.
> > > > >
> > > > > Thank you!!
> > > >
> > > > For the record, Leon Romanovsky brought this issue directly to Linus
> > > > Torvalds, stating that I broke things.
> > >
> > > Just to make it clear, Linus was involved after we didn't progress for
> > > more than one month after initial starting "Bug report connect to VM with Vagrant",
> > > while approaching to merge window.
> > > https://lore.kernel.org/netdev/MN2PR12MB44863139E562A59329E89DBEB982A@MN2PR12MB4486.namprd12.prod.outlook.com/
> > >
> > > Despite long standing netdev patch flow: apply fast -> revert fast, this
> > > patch was treated differently.
> >
> > I was waiting input from you. I think you only waited for "revert first"
> >
> > >
> > > >
> > > > It tooks weeks before Shachar did some debugging, but with no
> > > > conclusion I recall.
> > >
> > > Shachar didn't do debugging, she didn't write the bisected patch.
> > > She is verification engineer who was ready to run ANY tests and try
> > > ANY debug patch which you wanted.
> > >
> > > >
> > > > This kind of stuff makes me not very eager to work on this point.
> > > >
> > >
> > > OK, so it is not important at the end.
> >
> > I certainly do not want to waste time arguing with you on a valid
> > patch, which happens to break some buggy user space.
> >
> > Apparently some people think RFC are not important.
> 
> RFC is important.
> 
> Honestly, I read those threads over and over again. Since she provided
> some tcpdump logs which do not include ICMP, my question is still the
> same as Eric: why does this breakage have a relationship with this
> patch??? I get lost. It doesn't make sense really...

It was unfortunate outcome of moving the discussion to be private.
https://lore.kernel.org/netdev/CANn89i+e2TcvSU1EgrVZRUoEmZ5NDauXd3=kEkjpsGjmaypHOw@mail.gmail.com/

> 
> If someone is able to more easily reproduce this issue, I'm happy to help debug.
> 
> Thanks,
> Jason
> 

^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2024-04-02 17:32 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-03-26 20:34 ICMP_PARAMETERPROB and ICMP_TIME_EXCEEDED during connect Jakub Kicinski
2024-03-26 22:03 ` Neal Cardwell
2024-03-26 23:55   ` Jakub Kicinski
2024-03-27 13:05     ` Eric Dumazet
2024-04-02 13:21       ` Leon Romanovsky
2024-04-02 13:31         ` Eric Dumazet
2024-04-02 14:17           ` Jason Xing
2024-04-02 17:32             ` Leon Romanovsky

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).