Re: [tsvwg] A review of draft-ietf-tsvwg-udp-options-12

Tom Herbert <tom@herbertland.com> Mon, 14 June 2021 17:02 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F8623A2B03 for <tsvwg@ietfa.amsl.com>; Mon, 14 Jun 2021 10:02:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hS6KopmjyUbg for <tsvwg@ietfa.amsl.com>; Mon, 14 Jun 2021 10:02:48 -0700 (PDT)
Received: from mail-ej1-x633.google.com (mail-ej1-x633.google.com [IPv6:2a00:1450:4864:20::633]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1FE833A2B04 for <tsvwg@ietf.org>; Mon, 14 Jun 2021 10:02:47 -0700 (PDT)
Received: by mail-ej1-x633.google.com with SMTP id ce15so17785198ejb.4 for <tsvwg@ietf.org>; Mon, 14 Jun 2021 10:02:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=NSxfYOz/R8RS6M5pYtX0ZKfEb2726ZlBSTrgI4gKFWM=; b=YdgC3d6N1DDJozSPEPP79SX9GXQXjBS2fFEtgvL83lZUc5UVmacYLByiwxbHLbXmsv QPRI9EcJvbEU0gNIetxWAqYcOLSO3JGqj7Miw1w9Fc6zIUzCQ0+xiuLz9frqHxqey7VV rEKybUnmRnJSp0T5lGF3u07dy2WwH99PotitwfCHLPFT3uVutxPt91G5IMFjsCFWimmS 6gX9IorC1RGIUW8D8RMd+y03DUdDbBVAUMqZRr4d8hkzCqQytuvWr2c3BHHhqkTiJyX6 DCb8vcmOF6pC+pMHNNf85dntNx0fc1ADYPBfMY7TK2cxQWExmq7GsITCY7+gocv5A+02 TTmQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=NSxfYOz/R8RS6M5pYtX0ZKfEb2726ZlBSTrgI4gKFWM=; b=VMKva2CdZsL2IAszAg1IARxE/rGtVNGvwWwaB9hbZd4i5m2aASBctEfKpBH0aIUL6Z 2TZaNu9lH4EHPSI8iE3P24hOKJKCZGROOBukwXYdsC7J0u2leKFjXaE+Xhzn7HRSP544 F0amcQatT9BcfHtleGHghfEGPfRea1rbcfGBNZorPpk6KUt5CuduUtMz1a+uHLqJBMLl zhpGCLkO5kn75bB109PCA0FqfOKP5OaUdPoagZhVSANs1qe1iLLJ0Y4SKnR7KEHFtq3U tb/g+e/WCZ9Gp0msTFYqfl6i+ssunwisXtaw6KJiARt2e16XAJziMJWey2XudAam5N+y zNbw==
X-Gm-Message-State: AOAM531vieKeKlpVc9+xqJrrzwtgTLbmKnExIWMMIwDgkCn8SEAny1sn kTivbLfx4LaUdmCMTXADb8oVsrfMx/lJB2CODbJTGA==
X-Google-Smtp-Source: ABdhPJwuv/hU1YyAHtRzW9PV6AuYnfJsB/f7aOOW9JCkhZsOCF8PhKQ0ocRWiEntaK4ubq0ZLJo1JIS6iuMIvPKXihw=
X-Received: by 2002:a17:906:498b:: with SMTP id p11mr16628976eju.295.1623690160748; Mon, 14 Jun 2021 10:02:40 -0700 (PDT)
MIME-Version: 1.0
References: <CACL_3VGb_9P5SfPGRJtf1ZBvEhgywc2ZEGr-qbgNOMXV20rFeA@mail.gmail.com> <CACL_3VHyoRr5ju8203DiLTUo-658DCj7ud+1dQE2o0hUPVhF0A@mail.gmail.com> <7D766992-AEEB-434F-BB1D-3817EE07DE61@strayalpha.com> <1BBDBD80-3A53-4700-A79F-9A3AE4876F2B@strayalpha.com> <CACL_3VEXCT-sSNhtncVK26DPQefDLJhqEijgDke4Q7DmhRrpTQ@mail.gmail.com> <67E79ED1-14DE-4127-83AF-D17E8C72F362@strayalpha.com> <CALx6S37faGXPaC-4qZ0e_3CM5hSFQhrDOQydVvdjxzY5zKf5SA@mail.gmail.com> <4564201c-a3ca-7e17-a03f-ee9626852169@erg.abdn.ac.uk>
In-Reply-To: <4564201c-a3ca-7e17-a03f-ee9626852169@erg.abdn.ac.uk>
From: Tom Herbert <tom@herbertland.com>
Date: Mon, 14 Jun 2021 10:02:29 -0700
Message-ID: <CALx6S36PMx4HK-+5w=WDQCkjAmkPTsMGPYVi_=s41OvRn6t=sw@mail.gmail.com>
To: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
Cc: Joseph Touch <touch@strayalpha.com>, TSVWG <tsvwg@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/NkzoZDCJNzYD7n2KUcI0dGW1FqI>
Subject: Re: [tsvwg] A review of draft-ietf-tsvwg-udp-options-12
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Jun 2021 17:02:54 -0000

On Mon, Jun 14, 2021 at 9:31 AM Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
>
> On 14/06/2021 17:17, Tom Herbert wrote:
> > On Sun, Jun 13, 2021 at 9:31 PM Joseph Touch <touch@strayalpha.com> wrote:
> >>
> >>
> >> On Jun 13, 2021, at 7:20 PM, C. M. Heard <heard@pobox.com> wrote:
> >>
> >>> If we DO support zero-copy and thus want to allow non-terminal fragments to have post-fragoption options that operate on each fragment, then we would add THISFRAGLEN to the nonterminal format and issue different KIND numbers to nonterminal/terminal fragment.
> >>
> >>
> >> I for one would appreciate further discussion of these last points. I admit that I have failed to grasp Joe's message on the RDMA thread, and I would appreciate some time to think about it.
> >>
> >>
> >> Sure - here’s how it all works. Note that this is relevant mostly for long transfers with persistent UDP fragmentation; if that is assumed to be ‘adjusted’ at the app layer (as QUIC does), then we don’t need zero-copy support...
> >>
> >> - right now, UDP data can be zero-copied when received into user space, starting with the user data
> > Only if the device supports header/data split where the headers are in
> > one buffer and UDP data is in aligned buffer.
> >
> >> - if we add options, UDP data can still be zero-copied because it hasn’t moved (it still begins the payload
> >> - however, fragments are different because (esp given the merging of frag and lite) they don’t start at the beginning of data
> >> - they always start after OCS (which I think we should make fit the uniform KIND/LEN/OCS format of 4 bytes)
> >> - if the FRAG comes next, then we can move the frag content around a little and still support zero-copy
> >>
> >> notably, we move the first 10 bytes of the fragment to the end
> >> 4 for OCS
> >> 6 for FRAG (assuming FRAG includes KIND/OPTLEN/FRAGOFFSET/ID/FRAGLEN)
> >> that way we can zero-copy the frag packet into place, then just copy those last 8 bytes over OCS and the FRAG header
> >>
> > An obvious feature we'd want is NIC hardware to do UDP options
> > fragementation and reassembly, analogous to existing UDP Fragmentation
> > Offload (UFO) which performs IP fragmentation of UDP packets. The
> > impediment with supporting this is that hardware devices would need to
> > perform protocol processing on trailers as opposed to headers. Nearly
> > all hardware devices, including switches and NICs, are optimized to
> > process protocol headers and in modern devices they are quite
> > programmable in that regard. However, they typically rely on a parsing
> > buffer that holds the first N bytes of the packet and assume that all
> > the protocol headers lie within that. They wouldn't process data after
> > that header in the fast path at least, and almost certainly would have
> > capability to process protocol headers at that end of a large packet.
> > I am doubtful we'll ever see hardware support for trailer protocols,
> > and hence it's unlikely we'd see accelerations for UDP options like we
> > have for TCP.
> >
> > Tom
>
> OK.... Is there any way that we could design to enable this?
>
> I'm "fishing" for ideas because I know you've talked about the various
> offload methods.
>

Gorry,

My suggestion was to place UDP options after the UDP header. Instead
of just placing fragment header after the UDP header, place all the
UDP options there and then follow that by the Payload. So packet looks
like:

+-------------------+
|   UDP header  |
+-------------------+
|  UDP options  |
+-------------------+
|     Payload      |
+-------------------+

Now this looks a lot like a TCP packet and other variable length
headers which we know how to handle. For zero copy we can do
header/split by programming emerging smart devices to split through
UDP options in one buffer and payload in another thereby also
eliminating any need to move headers or data around.

Tom

> So for options in the trailer, this is clearly an impediment.
>
> For UDP-Opt fragmentation, I understand there is no standard UDP payload,
>
> .... only an option containing a fragment, so the Fragment information
> would actually be in the" first N bytes of the packet".
>
> So, what do you think  could be most likely helpful to enable fastpath
> accelleration for the fragments?
>
> Gorry
>
> >> This method assumes that we try to keep FRAG early in the packet - preferably right after OCS. The later it comes, the more additional bytes we need to move to “fix” the copy (beyond the 8 bytes noted above).
> >>
> >> —
> >>
> >> This method is the only reason we would want to allow options after non-terminal fragments - basically to keep the fragment toward the front of the packet, using the rule that post-noninitial frag options still operate on the fragment, rather than waiting for reassembly. The exception is the terminal fragment, where post-terminal fragment options operate on the reassembled packet.
> >>
> >> Joe
> >>
> >>
> >>
> >>
>