Re: [Bpf] [Cats] Fw: New Version Notification for draft-elkins-v6ops-bpf-pdm-ebpf-00.txt

"nalini.elkins@insidethestack.com" <nalini.elkins@insidethestack.com> Tue, 27 February 2024 15:18 UTC

Return-Path: <nalini.elkins@insidethestack.com>
X-Original-To: bpf@ietfa.amsl.com
Delivered-To: bpf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D889AC14F5FD for <bpf@ietfa.amsl.com>; Tue, 27 Feb 2024 07:18:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.904
X-Spam-Level:
X-Spam-Status: No, score=-1.904 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yahoo.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5re_7u_Ofo0M for <bpf@ietfa.amsl.com>; Tue, 27 Feb 2024 07:18:07 -0800 (PST)
Received: from sonic319-26.consmr.mail.ne1.yahoo.com (sonic319-26.consmr.mail.ne1.yahoo.com [66.163.188.88]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CEE76C14F5F4 for <bpf@ietf.org>; Tue, 27 Feb 2024 07:18:06 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1709047086; bh=7l7KeaPa/+PqqrZGtokHBc0iCGGTt95Ny1ZRDkQaMrM=; h=Date:From:To:Cc:In-Reply-To:References:Subject:From:Subject:Reply-To; b=XDt/XpyuZwDA/76HHKb9ylKLEsYECQL56ZGyPhrqNkqUR6tskd224knOQt1dggBMB/L7ASJLTfragInDdyNZJq/XuOlIp7aa952/leNtOeVgWYayQKjZIbzcdoFof9rk6Uv18vBMUcQNOAL3s3Tw7/GAjrWbXXPHvBJ6KwsLptNvpQltcJw/GlGM8I8pqsh1fYBr7T+KViiWfoh0nAV7bx8FSuW8WgBhLPVwjDplrMTxw5aatDS+Gt7i8+XMH6EXjJA52opWxQfJ+mhkdEQ3KUGQJCnKqPdixnf/gaIvlRDapP8wObDBtlR581XRmVW2YUJ/UySvQOTk0mfd2wvSOA==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1709047086; bh=01xkXw2zv6aZQVyNvA7MaOU9NTtcNfSYDpgX8ftNJIS=; h=X-Sonic-MF:Date:From:To:Subject:From:Subject; b=AF4iD1MCPHtHzCKwHxTHD9PLBf2fF6ekJ8Lh8j0RB/ubXYpctgPCQDjz1NkOVVYWr+jLH+tCIb48APFzS8PL38Nbxoth21Ml1meoUYXH3hhf8BMKVMlzZP2nQgjCKHMp2+A/BsLEgcYl9hLKHLuc0xMCgKsQ5AgxzAQVdCuuhHPntv4MXhdstZsutgyM78oc6wIc1z8nvd8PGJ8jtoosx2U8yu0eDhic3TJL3iD753FTlOflT/JtPPdvib821krGylwyXyI3F7ZqXUg+RohX03/eoiFkBcLwkehjxZawKFnoLQxDOqHFACiKsrmqA+ZGvO9acLPzK2+AjntbY7AYKA==
X-YMail-OSG: 7WAEO2gVM1nwNZCf9GaVRux6NDF3zH.JLk_Ttmjt5mSHb4OvMeQcfxkFJLX5Toh pZoiR3tJjDmGIc.hOwSFfZCASXr288IWX0RYyfFWiTe8GLaQnFmkniymKjf38b364sUn5yMpbZZn iY8UvTLo3DBbgXLcuVGoRhCxrP1._mTywLLkuGBjvq2BODFd9o8NjT_eB.iHZt_wcKZLDgcR.oIb ubnfzQyDCjL.rbWKNzipOk9QOtIUnURPu2yOXeKitIvuCxAd51g5TW1SgNYtbRVo8jt.Li4PGqg6 vceExrBtzqgbFv_29BitCAiu9uYHxh1Da0SBruDjcjNSZ_uLXwZEvds8dYLBw4XJRfnA4rvSX0yH cC0E60NyZvOgLuU9oS0BLy.0ShsEQEfYcZjGl0HGTK.bq5uOsXLFP106IVKA0AUJwVSNchnVyEJN M.anu_Wesb9wSdaE9hbes01Kw9rTzgQu1BIQQ6HBhOBXz8ZGPjzN.mheyiHsB_n7L7xlDO3Tyibd aB3USFd072LTmY5wcLf8nT3oONLs1E8Xjv4jlcmrCrnhTiXtWIrik5YWNncLRJepuvLGhubELvjp VUktWdzkBvbcBsVwnpC5qGcN.TJkBHsa6rWtLpTK9u3_EPXkFhN8BTOxKQ1te.SjMdwdyp5E99XJ FUkY2vGxswTKr5phxxKsyUvcJTnO9aW47yRPl98X4nJiccT28EDmpWCW9G2YbC4uy4j8dJjt.baq 5sqcRfpvSHbqX55xOCC1YfeV6kYGIn_nC4DlWxDIfJRXUWGTgDbPLtm3V3YP0dsZfYXPMGb6L.un NcLrvBQh2npaffhtaNVCYYXLC6JyY.6EqlSmHTPmaKyN46UJBg1Yt_VpBtO6aYxQa_hE1jiuqMke fwmFZ.k6pbu6V8td1moGflcE2E15ZZaMsIWgv0871CwM27ozkpI2qA8Pr_AMjyvTccnt9Omw1IvD N4ef5rfR8Eni1Xn0U.U50.8ZDMML.k1obU_dRjQw.8GTkFndOxsBw_xnRmjt_.tR6_KPcdZhBd6s V7K_JBSYvmrRQO4kU4GsYx5kXb9eBrPGQpl09d56GpokNPBH_X2wq5YPkpE_kBRSE7ct7OSndLXM hQOru9dFuHACGLhnnGWfrhcJT1sjCCKzkEfGRukF7Eb05d2mPDRW.F4Lu80ipV23Fo.ndqZMhEFC K1YyXohqej61w2Z_P1_P3.5KMc9GXZoc3G0P_ELHQeY7KntNVzzBWr.NilDmR5OvogItDJDxjUyV cuqCzEobOZUzCy.w9bSxazzgDbH_mbAsG96d_uib7fYZlLbF83MQZV91KRJJw4y7he5hnFfiPVnu tws7CkXRvkGn0VX0cKin_Pvoaf5x8Yi1jIQK0a8ySaLALF.ByDBWweWb9X1O0OuqtJwZkEkkWiwC rr2Jo3FISDfGlPfgH4YiyOSPnfnC37lrluuhrOTsquf6uUb3xRwK_EyMX49vIlDfeCp0GV2ADuMA e337Z1IGfLG9.THL1IPzHSGICm7iOLAEMYsElotYNKy4wADKtMgm6fXPLl4BcIz29XxsAmxU41Zu _gzXgr8SYnz9ShMvppMd1pMqvfjP7jK_p3A63PM.75sRJdoRmIfb7FbCJorun7xHXxjcaaHImYDS DtQvJalLVtEjRf6ZjBi4FqUUgOGDuuhSL8g9nw8Sbj4ImLD3sWb6tpDI3CJpfNPfEuuyXhBDokMS us0eqFXC62tuJg9H0.hnSNtrIZXhYY_cAUpIOXCKuFJFYbk71gA3EwpFwyeQA8aPg8vLZrzkcI_G 9.c6hS87TChNIBwH5mYoSbsxyaraYjZ7Pw3ETskgYwrdEaOdTPN1etZKIbs9Mn3sHAONDpyHiaY4 dxzsOCA_vDoMfbyz3FvYQPuKGSWDTOe1H8djeMxIr83uAq6ysVHDpj1Og9Q3tJjkPGnERjvUwlU9 2Ia9CFIQkL0xqFrG5BloQ7ZkZcob_iB2bTMwptkI5UxqGGxoc1UiaRY_kRd5UVUH.v7CHF09xylR qy9ZoyvMgZL3wzA_TxhkccEX9s6LUxApHP2WJBxjXAbYQGGmeA5RrqNFVZ6iea5w1teMs5sR33Xe YC_CsXTJrWQz7.a7o8I4nzI1Qb9uTUAyUCPmImZU8OedeeOX3puPVS7H_kPaoghrgu_nqAwC0EvW 3fJfYYBaUXeG3V2kIrXvmjEn6KcGzDVx1oD2kzjjnN6GUzF8iY9GiXOcPa.0gMHmDpTbWYkbv_i. DbEb5WDprp5bk.ePzACuSQ18xugTjv1BaaHZWKE3oWDGzECcK5dhi.cngeJmaZW8NO00vo9ShYpi jvZGQXIu2doIO9akh877HJw90Fk6._B_SBFWm3ROK2cNinoBO
X-Sonic-MF: <nalini.elkins@insidethestack.com>
X-Sonic-ID: c0bdf603-b44c-4b07-b981-3f0e5375b28d
Received: from sonic.gate.mail.ne1.yahoo.com by sonic319.consmr.mail.ne1.yahoo.com with HTTP; Tue, 27 Feb 2024 15:18:06 +0000
Date: Tue, 27 Feb 2024 15:07:59 +0000
From: "nalini.elkins@insidethestack.com" <nalini.elkins@insidethestack.com>
To: 'Cats' <cats@ietf.org>, "'Shihang(Vincent)'" <shihang9=40huawei.com@dmarc.ietf.org>, Adrian Farrel <adrian@olddog.co.uk>
Cc: "'Balajinaidu V.'" <balajinaidu.191ec111@nitk.edu.in>, "'Mohit P. Tahiliani'" <tahiliani@nitk.edu.in>, "'CHINMAYA SHARMA .'" <chinmayasharma.201ec113@nitk.edu.in>, 'AMOGH UMESH' <amoghumesh.201cs207@nitk.edu.in>, 'V6ops List' <v6ops@ietf.org>, 'Dhruv Dhody' <dhruv.ietf@gmail.com>, 'Michael Ackermann' <mackermann@bcbsm.com>, "bpf@ietf.org" <bpf@ietf.org>
Message-ID: <1667485273.1470250.1709046479388@mail.yahoo.com>
In-Reply-To: <057a01da698d$fb1bcfa0$f1536ee0$@olddog.co.uk>
References: <170843673270.61706.12474682382364794921@ietfa.amsl.com> <1889439465.4739825.1708436995942@mail.yahoo.com> <58668099.416596.1708837316278@mail.yahoo.com> <CY4PR1301MB207175F86648C2313BCACE71F4592@CY4PR1301MB2071.namprd13.prod.outlook.com> <798990938.1377147.1709034073896@mail.yahoo.com> <82cd153779a34a7f84491a9729104d8c@huawei.com> <1937055331.1389462.1709036969458@mail.yahoo.com> <057a01da698d$fb1bcfa0$f1536ee0$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_Part_1470249_184015104.1709046479383"
X-Mailer: WebService/1.1.22103 YMailNorrin
Archived-At: <https://mailarchive.ietf.org/arch/msg/bpf/vz-KJXAS9LPylG7_wh785dNnqxw>
Subject: Re: [Bpf] [Cats] Fw: New Version Notification for draft-elkins-v6ops-bpf-pdm-ebpf-00.txt
X-BeenThere: bpf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Discussion of BPF/eBPF standardization efforts within the IETF <bpf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bpf>, <mailto:bpf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bpf/>
List-Post: <mailto:bpf@ietf.org>
List-Help: <mailto:bpf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bpf>, <mailto:bpf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Feb 2024 15:18:10 -0000

Thanks, Adrian!
> If you’re looking for an IETF git repo for this, I think it would sit best on one attached to the BPF working group.

I will talk to the BPF and v6Ops chairs and also get their opinion.
Thanks,

Nalini Elkins
CEO and Founder
Inside Products, Inc.
https://www.insidethestack.com
PresidentIndustry Network Technology Councilhttps://www.industrynetcouncil.org 

    On Tuesday, February 27, 2024 at 07:03:02 AM PST, Adrian Farrel <adrian@olddog.co.uk> wrote:  
 
 
Thanks for sharing this with CATS, Nalini.

  

If you’re looking for an IETF git repo for this, I think it would sit best on one attached to the BPF working group.

  

Cheers,

Adrian

  

From: Cats <cats-bounces@ietf.org> On Behalf Of nalini.elkins@insidethestack.com
Sent: 27 February 2024 12:29
To: Cats <cats@ietf.org>; Shihang(Vincent) <shihang9=40huawei.com@dmarc.ietf.org>
Cc: Balajinaidu V. <balajinaidu.191ec111@nitk.edu.in>; Mohit P. Tahiliani <tahiliani@nitk.edu.in>; CHINMAYA SHARMA . <chinmayasharma.201ec113@nitk.edu.in>; AMOGH UMESH <amoghumesh.201cs207@nitk.edu.in>; V6ops List <v6ops@ietf.org>; Dhruv Dhody <dhruv.ietf@gmail.com>; Michael Ackermann <mackermann@bcbsm.com>; bpf@ietf.org
Subject: Re: [Cats] Fw: New Version Notification for draft-elkins-v6ops-bpf-pdm-ebpf-00.txt

  

Vincent,


> Thanks for sharing. It looks really promising.

Thanks for the kind words.

> Some quick questions:

  

> 1.       Is the source code open sourced so that we can play it?

  

We are looking into how to do this.  We can either set up a GitHub repo ourselves at NITK or we can work with v6ops / CATS / BPF.   

  

Thoughts?

  

  

> 2.       Does eBPF requires root permission to load or run?

  

The actual process of loading the programs into the kernel requires root permissions.  

  

> I.e, Does any application developer can load/run a eBPF code by itself without the intervention of the OS?

  

I’m not sure I understood this correctly, but eBPF code, once compiled, will work on all compatible kernels without any problems but it needs root permissions to attach.

  

BPF folks, please add thoughts, if you have any. 

  

We are also looking into doing a Windows implementation.

  

  

> 3.   It seems the PDM option is a DoH option. Will eBPF works with HBH option? I assume it can handle both.


I believe that any EH (or many other packet modifications) should work without problems.  Again, BPFers, if you know something that we do not, please chime in.

  

BPF is a great tool!

  

I don't know if you saw our performance benchmarks comparing our EH implementation in the Linux kernel to eBPF.  It takes slightly longer with eBPF but actually, IMHO, minimally.  And, just to not have to recompile the kernel and all the headaches that causes, we still prefer eBPF.

Thanks,

Nalini Elkins
CEO and Founder
Inside Products, Inc.
https://www.insidethestack.com

President
Industry Network Technology Council
https://www.industrynetcouncil.org






On Tuesday, February 27, 2024 at 04:01:42 AM PST, Shihang(Vincent) <shihang9=40huawei.com@dmarc.ietf.org> wrote: 







Hi Nalini,

Thanks for sharing. It looks really promising. Some quick questions:

1.       Is the source code open sourced so that we can play it?

2.       Does eBPF requires root permission to load or run? I.e, Does any application developer can load/run a eBPF code by itself without the intervention of the OS?

3.       It seems the PDM option is a DoH option. Will eBPF works with HBH option? I assume it can handle both.

 

Thanks,

Hang

 



From: Cats <cats-bounces@ietf.org> On Behalf Of nalini.elkins@insidethestack.comSent: Tuesday, February 27, 2024 7:41 PMTo: Cats <cats@ietf.org>Cc: Balajinaidu V. <balajinaidu.191ec111@nitk.edu.in>; Mohit P. Tahiliani <tahiliani@nitk.edu.in>; CHINMAYA SHARMA . <chinmayasharma.201ec113@nitk.edu.in>; AMOGH UMESH <amoghumesh.201cs207@nitk.edu.in>Subject: [Cats] Fw: New Version Notification for draft-elkins-v6ops-bpf-pdm-ebpf-00.txt



 




Hello List,



 



You may be interested in a draft we have done describing how to add IPv6 EH using eBPF and comparing the performance of eBPF implementation to EH implementation in the Linux kernel.   This may be useful for CATS.  The link to the draft is below. 



 



URL:      https://www.ietf.org/archive/id/draft-elkins-v6ops-bpf-pdm-ebpf-00.txt



 




Thanks,Nalini ElkinsCEO and FounderInside Products, Inc.


https://www.insidethestack.com



 



President



Industry Network Technology Council



https://www.industrynetcouncil.org






 



 






----- Forwarded Message -----



From: Michael McBride <michael.mcbride@futurewei.com>



To: nalini.elkins@insidethestack.com <nalini.elkins@insidethestack.com>; bpf@ietf.org <bpf@ietf.org>; V6 Ops List <v6ops@ietf.org>



Cc: chinmayasharma.201ec113@nitk.edu.in <chinmayasharma.201ec113@nitk.edu.in>; tahiliani@nitk.edu.in <tahiliani@nitk.edu.in>; amoghumesh.201cs207@nitk.edu.in <amoghumesh.201cs207@nitk.edu.in>; balajinaidu.191ec111@nitk.edu.in <balajinaidu.191ec111@nitk.edu.in>



Sent: Tuesday, February 27, 2024 at 12:58:45 AM PST



Subject: RE: New Version Notification for draft-elkins-v6ops-bpf-pdm-ebpf-00.txt



 









Interesting and useful draft Nalini, thanks for forwarding to the list. 

 

We could use more of these types of implementation drafts particularly for EH. Hopefully you can get some time to discuss this in Brisbane. This may also be of interest to computing-aware traffic steering (cats) wg.

 

We also just updated the eh-use-cases draft which also includes PDM.

 

Thanks,

mike


 

 

From: nalini.elkins@insidethestack.com <nalini.elkins@insidethestack.com>





To: bpf@ietf.org <bpf@ietf.org>; V6ops List <v6ops@ietf.org>



Cc: CHINMAYA SHARMA . <chinmayasharma.201ec113@nitk.edu.in>; Mohit P. Tahiliani <tahiliani@nitk.edu.in>; AMOGH UMESH <amoghumesh.201cs207@nitk.edu.in>; Balajinaidu V. <balajinaidu.191ec111@nitk.edu.in>



Sent: Tuesday, February 20, 2024 at 05:49:55 AM PST



Subject: Fw: New Version Notification for draft-elkins-v6ops-bpf-pdm-ebpf-00.txt



 










All,



 



We have described our implementation of the IPv6 Destination Options extension header using eBPF.   We have also provided a performance analysis of the eBPF implementation in comparison to the traditional kernel implementation.



 



Please do read and comment.  We hope this may be of use to others in using IPv6 extension headers as well as to the BPF community in looking at the performance analysis of various factors such as CPU, latency, throughput and so on.



 




Thanks,

Nalini Elkins
CEO and Founder
Inside Products, Inc.


https://www.insidethestack.com



 



President



Industry Network Technology Council



https://www.industrynetcouncil.org






 



 







----- Forwarded Message -----



From: "internet-drafts@ietf.org" <internet-drafts@ietf.org>



To: Mohit P. Tahiliani <tahiliani@nitk.edu.in>; Amogh Umesh <amoghumesh02@gmail.com>; Balajinaidu V <balajinaiduhanur@gmail.com>; Chinmaya Sharma <chinmaysharma1020@gmail.com>; Mohit Tahiliani <tahiliani@nitk.edu.in>; Nalini Elkins <nalini.elkins@insidethestack.com>



Sent: Tuesday, February 20, 2024 at 05:45:33 AM PST



Subject: New Version Notification for draft-elkins-v6ops-bpf-pdm-ebpf-00.txt



 




A new version of Internet-Draft draft-elkins-v6ops-bpf-pdm-ebpf-00.txt has



been successfully submitted by Nalini Elkins and posted to the



IETF repository.



 



Name:    draft-elkins-v6ops-bpf-pdm-ebpf



Revision: 00



Title:    Implementation and Performance Evaluation of PDM using eBPF



Date:    2024-02-20



Group:    Individual Submission



Pages:    16



URL:       https://www.ietf.org/archive/id/draft-elkins-v6ops-bpf-pdm-ebpf-00.txt



Status:   https://datatracker.ietf.org/doc/draft-elkins-v6ops-bpf-pdm-ebpf/



HTMLized:  https://datatracker.ietf.org/doc/html/draft-elkins-v6ops-bpf-pdm-ebpf



 



 



Abstract:



 



  RFC8250 describes an optional Destination Option (DO) header embedded



  in each packet to provide sequence numbers and timing information as



  a basis for measurements.  As kernel implementation can be complex



  and time-consuming, this document describes the implementation of the



  Performance and Diagnostic Metrics (PDM) extension header using eBPF



  in the Linux kernel's Traffic Control (TC) subsystem.  The document



  also provides a performance analysis of the eBPF implementation in



  comparison to the traditional kernel implementation.



 



 



 



The IETF Secretariat



 



 



















-- 
Cats mailing list
Cats@ietf.org
https://www.ietf.org/mailman/listinfo/cats
-- 
Cats mailing list
Cats@ietf.org
https://www.ietf.org/mailman/listinfo/cats