On Thu, 16 Oct 2025 09:54:25 +1100
David Gibson
On Wed, Oct 15, 2025 at 02:31:27PM +0800, Yumei Huang wrote:
On Wed, Oct 15, 2025 at 8:05 AM David Gibson
wrote: On Tue, Oct 14, 2025 at 03:38:36PM +0800, Yumei Huang wrote:
According to RFC 2988 and RFC 6298, we should use an exponential backoff timeout for data retransmission starting from one second (see Appendix A in RFC 6298), and limit it to about 60 seconds as allowed by the same RFC:
(2.5) A maximum value MAY be placed on RTO provided it is at least 60 seconds.
The interpretation of this isn't entirely clear to me. Does it mean if the total retransmit delay exceeds 60s we give up and RST (what this patch implements)? Or does it mean that if the retransmit delay reaches 60s we keep retransmitting, but don't increase the delay any further?
Looking at tcp_bound_rto() and related code in the kernel suggests the second interpretation.
Combine the macros defining the initial timeout for both SYN and ACK. And add a macro ACK_RETRIES to limit the total timeout to about 60s.
Signed-off-by: Yumei Huang
--- tcp.c | 32 ++++++++++++++++---------------- 1 file changed, 16 insertions(+), 16 deletions(-) diff --git a/tcp.c b/tcp.c index 3ce3991..84da069 100644 --- a/tcp.c +++ b/tcp.c @@ -179,16 +179,12 @@ * * Timeouts are implemented by means of timerfd timers, set based on flags: * - * - SYN_TIMEOUT_INIT: if no ACK is received from tap/guest during handshake - * (flag ACK_FROM_TAP_DUE without ESTABLISHED event) within this time, resend - * SYN. It's the starting timeout for the first SYN retry. If this persists - * for more than TCP_MAX_RETRIES or (tcp_syn_retries + - * tcp_syn_linear_timeouts) times in a row, reset the connection - * - * - ACK_TIMEOUT: if no ACK segment was received from tap/guest, after sending - * data (flag ACK_FROM_TAP_DUE with ESTABLISHED event), re-send data from the - * socket and reset sequence to what was acknowledged. If this persists for - * more than TCP_MAX_RETRIES times in a row, reset the connection + * - ACK_TIMEOUT_INIT: if no ACK segment was received from tap/guest, eiher + * during handshake(flag ACK_FROM_TAP_DUE without ESTABLISHED event) or after + * sending data (flag ACK_FROM_TAP_DUE with ESTABLISHED event), re-send data + * from the socket and reset sequence to what was acknowledged. It's the + * starting timeout for the first retry. If this persists for more than + * allowed times in a row, reset the connection * * - FIN_TIMEOUT: if a FIN segment was sent to tap/guest (flag ACK_FROM_TAP_DUE * with TAP_FIN_SENT event), and no ACK is received within this time, reset @@ -342,8 +338,7 @@ enum { #define WINDOW_DEFAULT 14600 /* RFC 6928 */
#define ACK_INTERVAL 10 /* ms */ -#define SYN_TIMEOUT_INIT 1 /* s */ -#define ACK_TIMEOUT 2 +#define ACK_TIMEOUT_INIT 1 /* s, RFC 6298 */
I'd suggest calling this RTO_INIT to match the terminology used in the RFCs.
Sure.
#define FIN_TIMEOUT 60 #define ACT_TIMEOUT 7200
@@ -352,6 +347,11 @@ enum {
#define ACK_IF_NEEDED 0 /* See tcp_send_flag() */
+/* Number of retries calculated from the exponential backoff formula, limited + * by a total timeout of about 60 seconds. + */ +#define ACK_RETRIES 5 +
As noted above, I think this is based on a misunderstanding of what the RFC is saying. TCP_MAX_RETRIES should be fine as it is, I think. We could implement the clamping of the RTO, but it's a "MAY" in the RFC, so we don't have to, and I don't really see a strong reason to do so.
If we use TCP_MAX_RETRIES and not clamping RTO, the total timeout could be 255 seconds.
Stefano mentioned "Retransmitting data after 256 seconds doesn't make a lot of sense to me" in the previous comment.
That's true, but it's pretty much true for 60s as well. For the local link we usually have between passt and guest, even 1s is an eternity.
Rather than the local link I was thinking of whatever monitor or liveness probe in KubeVirt which might have a 60-second period, or some firewall agent, or how long it typically takes for guests to stop and resume again in KubeVirt. It's usually seconds or maybe minutes but not five minutes.
Basically I see no harm, but also no advantage to clamping or limiting the RTO, so I'm suggesting going with the simplest code.
The advantage I see is that we'll recover significantly faster in case something went wrong.
Note that there are (rare) situations where we could get a response after minutes. - The interface on the guest was disabled for a while - An error in guest firewall configuration blocked packets for a while - A bug on the guest cause the kernel to wedge for a while - The user manually suspended the guest for a while (VM/passt only)
These generally indicate something has gone fairly badly wrong, but a long RTO gives the user a bit more time to realise their mistake and fix things.
True, it's just that to me five minutes sounds like "broken beyond repair", while one minute sounds like "oh we tried again and it worked".
These are niche cases, but given the cost of implementing it is "do nothing"...
...anyway, it's not a strong preference from my side. It's mostly about experience but I won't be able to really come up with obvious evidence (at least not quickly), so if the code is significantly simpler... whatever. It's not provable so I won't insist. Note: the comments I'm replying to are from yesterday / Thursday, on v3, and today / Friday we're at v6. I don't expect a week grace period as you would on the kernel: https://docs.kernel.org/process/submitting-patches.html#don-t-get-discourage... because we can surely move faster than that, but three versions in a day obviously before I get any chance to have a look means a substantial overhead for me, and I might miss the meaning and context of comments of other reviewers (David in this case). There are no changelogs in cover letters either. I plan to skip to v6 but don't expect a review soon, because of that overhead I just mentioned. -- Stefano