Re: [tsvwg] A review of draft-ietf-tsvwg-udp-options-12

Tom Herbert <tom@herbertland.com> Mon, 14 June 2021 17:32 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 85DB03A2BCF for <tsvwg@ietfa.amsl.com>; Mon, 14 Jun 2021 10:32:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tsqDevgzffwC for <tsvwg@ietfa.amsl.com>; Mon, 14 Jun 2021 10:32:39 -0700 (PDT)
Received: from mail-ej1-x629.google.com (mail-ej1-x629.google.com [IPv6:2a00:1450:4864:20::629]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92EBC3A2BFC for <tsvwg@ietf.org>; Mon, 14 Jun 2021 10:32:37 -0700 (PDT)
Received: by mail-ej1-x629.google.com with SMTP id g20so18048707ejt.0 for <tsvwg@ietf.org>; Mon, 14 Jun 2021 10:32:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=Byq/VJcm7Cl2HL+mQeF/YIRL/xKNJQpdY1Z4Ip/uLDc=; b=DJSCo0uofEYP5A260GaigtE2UDtLLXHifedwZXYzBBlV7EDiHS0DZPmXs3ez3Zko2o 2PFDGXnHXv/boSs0/gNtpcHEiH36NEMIkjbOak9c9s/T1MwdZ6FTjSaN6gN3pop3TFmy pvXINL9s6ldCuLKEutLa3ZPsW2bsSGPjQz+mDX/vv0lKb6P+aJKRpZ5cNAwAKHNidcFY MmWAIihL0akq6SDNm4nXORY43+EVQlWTeqZyuvVdZB5CBgyTsGQ2DVX5HnrKlc5WfUSj In0Kz+cBhkqCMNkMREwc07OmRzt1ItLyfSJM+I/Ce+HdkKPpKBuAU2HZh3fzqUbXj/uR zToQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=Byq/VJcm7Cl2HL+mQeF/YIRL/xKNJQpdY1Z4Ip/uLDc=; b=MFcpWvCyXbjmBFu/DIfDq3VPbYZ7ZZxIWfJUHuOCsBtQpMP6aGrnnT4TeWVDEJHOw1 FzbFuuS/nH0IoH8umWCYF+E9SCA8h4ffsRP3MeKXXtNG8bBE4pA15YTUzj/Hsp2TaPf4 /lM0u30MdMNBGPWYaLXMM1MfX3iCKw5iv/TsHdOHStTucqegmSCEmyOhwEMoN3HtjV61 iGDR1DKKKAR2w4C8pFSoE31G86h1xJiNRCWONr986ZzQRAnycg11wC+p6y+u/uhvzVLp FKmxKtPLLROHOxwCF0orzKCfUDGf5LXorbR4EKvHU2FTU5AhtZG4Ui4KieQgiF7fBeHt cwEg==
X-Gm-Message-State: AOAM531WQNIixD3ilqXWD8l+FuN6OmJv61KX8NftRqvLYx5GWWeDmVQw 5WjN43eDZ5DmcGAvQPEaSkrWCAyZ1tyeeJxbK0g/SUbJ8LMB7A==
X-Google-Smtp-Source: ABdhPJwGfSPp5n5gd4XWmpvlpv53kCBj7teiyH0Y7wE5H7cP8cAAytmfllkRCUifBmwgKabOGBal2vaTf2ELvhxM1mo=
X-Received: by 2002:a17:906:498b:: with SMTP id p11mr16759652eju.295.1623691954914; Mon, 14 Jun 2021 10:32:34 -0700 (PDT)
MIME-Version: 1.0
References: <D9B2E315-5C7A-4BE9-97A9-AF627F6FD6FF@strayalpha.com> <DCF3D0D3-83E0-4F84-8C1F-57DF9EE63C59@strayalpha.com>
In-Reply-To: <DCF3D0D3-83E0-4F84-8C1F-57DF9EE63C59@strayalpha.com>
From: Tom Herbert <tom@herbertland.com>
Date: Mon, 14 Jun 2021 10:32:23 -0700
Message-ID: <CALx6S37Hx1zafjjr_fnG1ZY7afGEF081QfV5yhdfPftM57Ro0g@mail.gmail.com>
To: Joe Touch <touch@strayalpha.com>
Cc: Gorry Fairhurst <gorry@erg.abdn.ac.uk>, TSVWG <tsvwg@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/HV8mWFLOfupfEE1R6DyLyOtCv-g>
Subject: Re: [tsvwg] A review of draft-ietf-tsvwg-udp-options-12
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Jun 2021 17:32:46 -0000

Joe,

I suggest that the UDP options should be preceded by a four byte
header consisting of one byte type, one byte length, and two byte
checksum. As I've mentioned previously, making the checksum optional
is inherently problematic because it cannot protect against a
corrupted type field for the optional checksum. e.g. a single bit flip
in the type field for the checksum could turn the checksum option into
some other type and there is no way to detect that.

Tom

Tom


On Mon, Jun 14, 2021 at 10:20 AM Joe Touch <touch@strayalpha.com> wrote:
>
> Ps - we need an option length field to make fragments look like tcp. I can put that in - do we want that in OCS? Or independent?
>
> > On Jun 14, 2021, at 10:16 AM, Joe Touch <touch@strayalpha.com> wrote:
> >
> > FYI that’s what fragments look like. We can’t do this for non fragments.
> >
> >>> On Jun 14, 2021, at 10:03 AM, Tom Herbert <tom@herbertland.com> wrote:
> >>>
> >>> On Mon, Jun 14, 2021 at 9:31 AM Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
> >>>
> >>>> On 14/06/2021 17:17, Tom Herbert wrote:
> >>>> On Sun, Jun 13, 2021 at 9:31 PM Joseph Touch <touch@strayalpha.com> wrote:
> >>>>>
> >>>>>
> >>>>> On Jun 13, 2021, at 7:20 PM, C. M. Heard <heard@pobox.com> wrote:
> >>>>>
> >>>>>> If we DO support zero-copy and thus want to allow non-terminal fragments to have post-fragoption options that operate on each fragment, then we would add THISFRAGLEN to the nonterminal format and issue different KIND numbers to nonterminal/terminal fragment.
> >>>>>
> >>>>>
> >>>>> I for one would appreciate further discussion of these last points. I admit that I have failed to grasp Joe's message on the RDMA thread, and I would appreciate some time to think about it.
> >>>>>
> >>>>>
> >>>>> Sure - here’s how it all works. Note that this is relevant mostly for long transfers with persistent UDP fragmentation; if that is assumed to be ‘adjusted’ at the app layer (as QUIC does), then we don’t need zero-copy support...
> >>>>>
> >>>>> - right now, UDP data can be zero-copied when received into user space, starting with the user data
> >>>> Only if the device supports header/data split where the headers are in
> >>>> one buffer and UDP data is in aligned buffer.
> >>>>
> >>>>> - if we add options, UDP data can still be zero-copied because it hasn’t moved (it still begins the payload
> >>>>> - however, fragments are different because (esp given the merging of frag and lite) they don’t start at the beginning of data
> >>>>> - they always start after OCS (which I think we should make fit the uniform KIND/LEN/OCS format of 4 bytes)
> >>>>> - if the FRAG comes next, then we can move the frag content around a little and still support zero-copy
> >>>>>
> >>>>> notably, we move the first 10 bytes of the fragment to the end
> >>>>> 4 for OCS
> >>>>> 6 for FRAG (assuming FRAG includes KIND/OPTLEN/FRAGOFFSET/ID/FRAGLEN)
> >>>>> that way we can zero-copy the frag packet into place, then just copy those last 8 bytes over OCS and the FRAG header
> >>>>>
> >>>> An obvious feature we'd want is NIC hardware to do UDP options
> >>>> fragementation and reassembly, analogous to existing UDP Fragmentation
> >>>> Offload (UFO) which performs IP fragmentation of UDP packets. The
> >>>> impediment with supporting this is that hardware devices would need to
> >>>> perform protocol processing on trailers as opposed to headers. Nearly
> >>>> all hardware devices, including switches and NICs, are optimized to
> >>>> process protocol headers and in modern devices they are quite
> >>>> programmable in that regard. However, they typically rely on a parsing
> >>>> buffer that holds the first N bytes of the packet and assume that all
> >>>> the protocol headers lie within that. They wouldn't process data after
> >>>> that header in the fast path at least, and almost certainly would have
> >>>> capability to process protocol headers at that end of a large packet.
> >>>> I am doubtful we'll ever see hardware support for trailer protocols,
> >>>> and hence it's unlikely we'd see accelerations for UDP options like we
> >>>> have for TCP.
> >>>>
> >>>> Tom
> >>>
> >>> OK.... Is there any way that we could design to enable this?
> >>>
> >>> I'm "fishing" for ideas because I know you've talked about the various
> >>> offload methods.
> >>>
> >>
> >> Gorry,
> >>
> >> My suggestion was to place UDP options after the UDP header. Instead
> >> of just placing fragment header after the UDP header, place all the
> >> UDP options there and then follow that by the Payload. So packet looks
> >> like:
> >>
> >> +-------------------+
> >> |   UDP header  |
> >> +-------------------+
> >> |  UDP options  |
> >> +-------------------+
> >> |     Payload      |
> >> +-------------------+
> >>
> >> Now this looks a lot like a TCP packet and other variable length
> >> headers which we know how to handle. For zero copy we can do
> >> header/split by programming emerging smart devices to split through
> >> UDP options in one buffer and payload in another thereby also
> >> eliminating any need to move headers or data around.
> >>
> >> Tom
> >>
> >>> So for options in the trailer, this is clearly an impediment.
> >>>
> >>> For UDP-Opt fragmentation, I understand there is no standard UDP payload,
> >>>
> >>> .... only an option containing a fragment, so the Fragment information
> >>> would actually be in the" first N bytes of the packet".
> >>>
> >>> So, what do you think  could be most likely helpful to enable fastpath
> >>> accelleration for the fragments?
> >>>
> >>> Gorry
> >>>
> >>>>> This method assumes that we try to keep FRAG early in the packet - preferably right after OCS. The later it comes, the more additional bytes we need to move to “fix” the copy (beyond the 8 bytes noted above).
> >>>>>
> >>>>> —
> >>>>>
> >>>>> This method is the only reason we would want to allow options after non-terminal fragments - basically to keep the fragment toward the front of the packet, using the rule that post-noninitial frag options still operate on the fragment, rather than waiting for reassembly. The exception is the terminal fragment, where post-terminal fragment options operate on the reassembled packet.
> >>>>>
> >>>>> Joe
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>
>