Re: [Bpf] [Cats] Fw: New Version Notification for draft-elkins-v6ops-bpf-pdm-ebpf-00.txt

Adrian Farrel <adrian@olddog.co.uk> Tue, 27 February 2024 15:02 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: bpf@ietfa.amsl.com
Delivered-To: bpf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E7B85C151073; Tue, 27 Feb 2024 07:02:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.803
X-Spam-Level:
X-Spam-Status: No, score=-2.803 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=olddog.co.uk
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lvyL_ZPK45tv; Tue, 27 Feb 2024 07:02:45 -0800 (PST)
Received: from mta8.iomartmail.com (mta8.iomartmail.com [62.128.193.158]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 29F3BC14F6A5; Tue, 27 Feb 2024 07:02:41 -0800 (PST)
Received: from vs4.iomartmail.com (vs4.iomartmail.com [10.12.10.122]) by mta8.iomartmail.com (8.14.7/8.14.7) with ESMTP id 41RF2SCp026204; Tue, 27 Feb 2024 15:02:28 GMT
Received: from vs4.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 4E99B4604B; Tue, 27 Feb 2024 15:02:28 +0000 (GMT)
Received: from vs4.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 361194604D; Tue, 27 Feb 2024 15:02:28 +0000 (GMT)
Received: from asmtp3.iomartmail.com (unknown [10.12.10.224]) by vs4.iomartmail.com (Postfix) with ESMTPS; Tue, 27 Feb 2024 15:02:28 +0000 (GMT)
Received: from LAPTOPK7AS653V ([148.252.133.18]) (authenticated bits=0) by asmtp3.iomartmail.com (8.14.7/8.14.7) with ESMTP id 41RF2OST012539 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Tue, 27 Feb 2024 15:02:26 GMT
Reply-To: adrian@olddog.co.uk
From: Adrian Farrel <adrian@olddog.co.uk>
To: nalini.elkins@insidethestack.com, 'Cats' <cats@ietf.org>, "'Shihang(Vincent)'" <shihang9=40huawei.com@dmarc.ietf.org>
Cc: "'Balajinaidu V.'" <balajinaidu.191ec111@nitk.edu.in>, "'Mohit P. Tahiliani'" <tahiliani@nitk.edu.in>, "'CHINMAYA SHARMA .'" <chinmayasharma.201ec113@nitk.edu.in>, 'AMOGH UMESH' <amoghumesh.201cs207@nitk.edu.in>, 'V6ops List' <v6ops@ietf.org>, 'Dhruv Dhody' <dhruv.ietf@gmail.com>, 'Michael Ackermann' <mackermann@bcbsm.com>, bpf@ietf.org
References: <170843673270.61706.12474682382364794921@ietfa.amsl.com> <1889439465.4739825.1708436995942@mail.yahoo.com> <58668099.416596.1708837316278@mail.yahoo.com> <CY4PR1301MB207175F86648C2313BCACE71F4592@CY4PR1301MB2071.namprd13.prod.outlook.com> <798990938.1377147.1709034073896@mail.yahoo.com> <82cd153779a34a7f84491a9729104d8c@huawei.com> <1937055331.1389462.1709036969458@mail.yahoo.com>
In-Reply-To: <1937055331.1389462.1709036969458@mail.yahoo.com>
Date: Tue, 27 Feb 2024 15:02:25 -0000
Organization: Old Dog Consulting
Message-ID: <057a01da698d$fb1bcfa0$f1536ee0$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_057B_01DA698D.FB1D2F30"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQHdtFHa7rxbx6hVIimDLDlmOyGVZgEBxC0/ATdSM4MC4wwVrQGYGSR/AKr1cmMCL0ZKd7DLPb7w
Content-Language: en-gb
X-Originating-IP: 148.252.133.18
X-Thinkmail-Auth: adrian@olddog.co.uk
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed; d=olddog.co.uk; h=reply-to :from:to:cc:references:in-reply-to:subject:date:message-id :mime-version:content-type; s=20221128; bh=A4em/wdr50N5qFHBAMTCU Pip62A1nyw47l6q2VTMFvw=; b=n4eto+/IvJG7j8jmyrZoQ8oKWVPk6RmTK8eVE +43fhSPkpWLTMTWRVIxjQrhARbfT/GR30bTtvVILfcJNtCWnYBkF5otmwbxoHWMF NP9Gj13xXGto2+gjLQW8esIFnAw7Bpf6ZduwcsbfQrTMu20KrxkV1GDuYnqkLiEp 6vNxo3ua6w5yhfPatqYk1CGLx++BmfZXvyb/aVqIhnQe4K+H+fRh+2twrtnltIBH ZnBheaez5TuVqeknESMtV8Uegdvkcr8xF1lGVvvl+Cyw2b+2+VcJumf5LsPScbzS PlAzPSAQunrvlBsrgQNssjD65vsu3W6tDQqAirDHm6UZ49S8A==
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.1.0.2090-9.0.0.1002-28218.000
X-TM-AS-Result: No--43.037-10.0-31-10
X-imss-scan-details: No--43.037-10.0-31-10
X-TMASE-Version: IMSVA-9.1.0.2090-9.0.1002-28218.000
X-TMASE-Result: 10--43.036900-10.000000
X-TMASE-MatchedRID: CxmI61mtwh/H1DfC+QNQxHFPUrVDm6jtkYC3rjkUXRIOzQEZTWW7CDDj STUxKLQbyD+g+Ydtc6gVPEime2+RVVhjkrwAPsLRlVHM/F6YkvQpA2ExuipmWvt9kl8N0IhcBD/ W9bhLRoqOHJaQyVEicEsUSkiku+oRwT/ZBeki4ea369EpPR24O0Ee5VjFzwNbubaW0+d2TRa3Ll mlccUEXG0cUsVJookIlBG0Vrh0bpPuha5ro/3Uo6w4YlsZcAHlOhJ9m53n4aDozDhGeQC9EijEI NafKEeOQxTNQIR96f6/+Zvv1EV3SfjmmbJZn2nmYu9YuaJ9+Cp4ssIDQ8PtqOSRuUv4+Sg/81oS Kb4F9XDzi489G9/ebGPKQgbIX4yuCuAYV83gfMIr03vdSbaR7Pi4nVERfgwdvHGwZVw7NKktbEB nKg+1LZ3Q8J0NqcD6MeYgsATIbsOgOjV7cDlnVYEMv3ouDK4xtOtXYgbXjdcUoJOBFYW8Jp1gul 1JQsZxoas8zFG5jkP4XVohF6dILp5W+x7SCPoW2Sa33ZGXWdZZDdHiTk9OcF99KTJvos9IAMbDt o+TG9Bc5t0paFWk1JfPyjX+bYmVHOeM15PwtLlQsahOMIZ15X8v+Rbmrr4Ha7JqOUUsotWBSr6X 9BZP67/5yx5GCNXjceel4syBjTUdyopa6ZksEhO7C3UVWhpn31asM/gsp2mpVUR0SvYtSvU72nY VxvYN4D6lW82JZVEb8xI2OD3Z7eyDy8V8lTWUZBiPr4EU8TBRpObkR9DMwkekR3VSvOYV2jgVmh KlDxiqH12uH+NHwruAYBYzL15HQOFTxWCroW+eAiCmPx4NwGmRqNBHmBve1B0Hk1Q1KyI9euiYe 3o8eBvcxZgTG+du4kYXbobxJbLnIzRzWS2P0w==
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/bpf/A-o6335DevivJsOPsz-BgUCaGjk>
Subject: Re: [Bpf] [Cats] Fw: New Version Notification for draft-elkins-v6ops-bpf-pdm-ebpf-00.txt
X-BeenThere: bpf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Discussion of BPF/eBPF standardization efforts within the IETF <bpf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bpf>, <mailto:bpf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bpf/>
List-Post: <mailto:bpf@ietf.org>
List-Help: <mailto:bpf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bpf>, <mailto:bpf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Feb 2024 15:02:50 -0000

Thanks for sharing this with CATS, Nalini.

 

If you’re looking for an IETF git repo for this, I think it would sit best on one attached to the BPF working group.

 

Cheers,

Adrian

 

From: Cats <cats-bounces@ietf.org> On Behalf Of nalini.elkins@insidethestack.com
Sent: 27 February 2024 12:29
To: Cats <cats@ietf.org>; Shihang(Vincent) <shihang9=40huawei.com@dmarc.ietf.org>
Cc: Balajinaidu V. <balajinaidu.191ec111@nitk.edu.in>; Mohit P. Tahiliani <tahiliani@nitk.edu.in>; CHINMAYA SHARMA . <chinmayasharma.201ec113@nitk.edu.in>; AMOGH UMESH <amoghumesh.201cs207@nitk.edu.in>; V6ops List <v6ops@ietf.org>; Dhruv Dhody <dhruv.ietf@gmail.com>; Michael Ackermann <mackermann@bcbsm.com>; bpf@ietf.org
Subject: Re: [Cats] Fw: New Version Notification for draft-elkins-v6ops-bpf-pdm-ebpf-00.txt

 

Vincent,


> Thanks for sharing. It looks really promising.

Thanks for the kind words.

> Some quick questions:

 

> 1.       Is the source code open sourced so that we can play it?

 

We are looking into how to do this.  We can either set up a GitHub repo ourselves at NITK or we can work with v6ops / CATS / BPF.   

 

Thoughts?

 

 

> 2.       Does eBPF requires root permission to load or run?

 

The actual process of loading the programs into the kernel requires root permissions.  

 

> I.e, Does any application developer can load/run a eBPF code by itself without the intervention of the OS?

 

I’m not sure I understood this correctly, but eBPF code, once compiled, will work on all compatible kernels without any problems but it needs root permissions to attach.

 

BPF folks, please add thoughts, if you have any. 

 

We are also looking into doing a Windows implementation.

 

 

> 3.   It seems the PDM option is a DoH option. Will eBPF works with HBH option? I assume it can handle both.


I believe that any EH (or many other packet modifications) should work without problems.  Again, BPFers, if you know something that we do not, please chime in.

 

BPF is a great tool!

 

I don't know if you saw our performance benchmarks comparing our EH implementation in the Linux kernel to eBPF.  It takes slightly longer with eBPF but actually, IMHO, minimally.  And, just to not have to recompile the kernel and all the headaches that causes, we still prefer eBPF.

Thanks,

Nalini Elkins
CEO and Founder
Inside Products, Inc.
https://www.insidethestack.com

President
Industry Network Technology Council
https://www.industrynetcouncil.org






On Tuesday, February 27, 2024 at 04:01:42 AM PST, Shihang(Vincent) <shihang9=40huawei.com@dmarc.ietf.org> wrote: 







Hi Nalini,

Thanks for sharing. It looks really promising. Some quick questions:

1.       Is the source code open sourced so that we can play it?

2.       Does eBPF requires root permission to load or run? I.e, Does any application developer can load/run a eBPF code by itself without the intervention of the OS?

3.       It seems the PDM option is a DoH option. Will eBPF works with HBH option? I assume it can handle both.

 

Thanks,

Hang

 



From: Cats <cats-bounces@ietf.org> On Behalf Of nalini.elkins@insidethestack.comSent: Tuesday, February 27, 2024 7:41 PMTo: Cats <cats@ietf.org>Cc: Balajinaidu V. <balajinaidu.191ec111@nitk.edu.in>; Mohit P. Tahiliani <tahiliani@nitk.edu.in>; CHINMAYA SHARMA . <chinmayasharma.201ec113@nitk.edu.in>; AMOGH UMESH <amoghumesh.201cs207@nitk.edu.in>Subject: [Cats] Fw: New Version Notification for draft-elkins-v6ops-bpf-pdm-ebpf-00.txt



 




Hello List,



 



You may be interested in a draft we have done describing how to add IPv6 EH using eBPF and comparing the performance of eBPF implementation to EH implementation in the Linux kernel.   This may be useful for CATS.  The link to the draft is below. 



 



URL:      https://www.ietf.org/archive/id/draft-elkins-v6ops-bpf-pdm-ebpf-00.txt



 




Thanks,Nalini ElkinsCEO and FounderInside Products, Inc.


https://www.insidethestack.com



 



President



Industry Network Technology Council



https://www.industrynetcouncil.org






 



 






----- Forwarded Message -----



From: Michael McBride <michael.mcbride@futurewei.com>



To: nalini.elkins@insidethestack.com <nalini.elkins@insidethestack.com>; bpf@ietf.org <bpf@ietf.org>; V6 Ops List <v6ops@ietf.org>



Cc: chinmayasharma.201ec113@nitk.edu.in <chinmayasharma.201ec113@nitk.edu.in>; tahiliani@nitk.edu.in <tahiliani@nitk.edu.in>; amoghumesh.201cs207@nitk.edu.in <amoghumesh.201cs207@nitk.edu.in>; balajinaidu.191ec111@nitk.edu.in <balajinaidu.191ec111@nitk.edu.in>



Sent: Tuesday, February 27, 2024 at 12:58:45 AM PST



Subject: RE: New Version Notification for draft-elkins-v6ops-bpf-pdm-ebpf-00.txt



 









Interesting and useful draft Nalini, thanks for forwarding to the list. 

 

We could use more of these types of implementation drafts particularly for EH. Hopefully you can get some time to discuss this in Brisbane. This may also be of interest to computing-aware traffic steering (cats) wg.

 

We also just updated the eh-use-cases draft which also includes PDM.

 

Thanks,

mike


 

 

From: nalini.elkins@insidethestack.com <nalini.elkins@insidethestack.com>





To: bpf@ietf.org <bpf@ietf.org>; V6ops List <v6ops@ietf.org>



Cc: CHINMAYA SHARMA . <chinmayasharma.201ec113@nitk.edu.in>; Mohit P. Tahiliani <tahiliani@nitk.edu.in>; AMOGH UMESH <amoghumesh.201cs207@nitk.edu.in>; Balajinaidu V. <balajinaidu.191ec111@nitk.edu.in>



Sent: Tuesday, February 20, 2024 at 05:49:55 AM PST



Subject: Fw: New Version Notification for draft-elkins-v6ops-bpf-pdm-ebpf-00.txt



 










All,



 



We have described our implementation of the IPv6 Destination Options extension header using eBPF.   We have also provided a performance analysis of the eBPF implementation in comparison to the traditional kernel implementation.



 



Please do read and comment.  We hope this may be of use to others in using IPv6 extension headers as well as to the BPF community in looking at the performance analysis of various factors such as CPU, latency, throughput and so on.



 




Thanks,

Nalini Elkins
CEO and Founder
Inside Products, Inc.


https://www.insidethestack.com



 



President



Industry Network Technology Council



https://www.industrynetcouncil.org






 



 







----- Forwarded Message -----



From: "internet-drafts@ietf.org" <internet-drafts@ietf.org>



To: Mohit P. Tahiliani <tahiliani@nitk.edu.in>; Amogh Umesh <amoghumesh02@gmail.com>; Balajinaidu V <balajinaiduhanur@gmail.com>; Chinmaya Sharma <chinmaysharma1020@gmail.com>; Mohit Tahiliani <tahiliani@nitk.edu.in>; Nalini Elkins <nalini.elkins@insidethestack.com>



Sent: Tuesday, February 20, 2024 at 05:45:33 AM PST



Subject: New Version Notification for draft-elkins-v6ops-bpf-pdm-ebpf-00.txt



 




A new version of Internet-Draft draft-elkins-v6ops-bpf-pdm-ebpf-00.txt has



been successfully submitted by Nalini Elkins and posted to the



IETF repository.



 



Name:    draft-elkins-v6ops-bpf-pdm-ebpf



Revision: 00



Title:    Implementation and Performance Evaluation of PDM using eBPF



Date:    2024-02-20



Group:    Individual Submission



Pages:    16



URL:       https://www.ietf.org/archive/id/draft-elkins-v6ops-bpf-pdm-ebpf-00.txt



Status:   https://datatracker.ietf.org/doc/draft-elkins-v6ops-bpf-pdm-ebpf/



HTMLized:  https://datatracker.ietf.org/doc/html/draft-elkins-v6ops-bpf-pdm-ebpf



 



 



Abstract:



 



  RFC8250 describes an optional Destination Option (DO) header embedded



  in each packet to provide sequence numbers and timing information as



  a basis for measurements.  As kernel implementation can be complex



  and time-consuming, this document describes the implementation of the



  Performance and Diagnostic Metrics (PDM) extension header using eBPF



  in the Linux kernel's Traffic Control (TC) subsystem.  The document



  also provides a performance analysis of the eBPF implementation in



  comparison to the traditional kernel implementation.



 



 



 



The IETF Secretariat



 



 



















-- 
Cats mailing list
Cats@ietf.org
https://www.ietf.org/mailman/listinfo/cats