Re: [tsvwg] RDMA Support by UDP FRAG Option

Joseph Touch <touch@strayalpha.com> Fri, 18 June 2021 15:11 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 23CD03A145D for <tsvwg@ietfa.amsl.com>; Fri, 18 Jun 2021 08:11:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.318
X-Spam-Level:
X-Spam-Status: No, score=-1.318 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rtv1lkfu_9R2 for <tsvwg@ietfa.amsl.com>; Fri, 18 Jun 2021 08:11:53 -0700 (PDT)
Received: from server217-4.web-hosting.com (server217-4.web-hosting.com [198.54.116.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 979053A145C for <tsvwg@ietf.org>; Fri, 18 Jun 2021 08:11:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id:Cc:Date:In-Reply-To: From:Subject:Mime-Version:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=d45MYkoLda9EagdgKX3XViEmG9Jp3b0RHn72sUBER8E=; b=QzH8me9jxbskvxYxXxN4qxKLnZ +E+uGqyMWcJFAYVKsdmpKNHOJp8V0jhV59Q4SQY7/X5GXLUJTdSe6IIyWWYJndZ+Cgzujv1jC1zoD cLxt44oEwi+426oSGxZM0vKvcYVV2TC/esj9O2/eOciD5aKlEMBo1/UA8PFw3X81lQ4e77iS4UgOX jEG9wsgJLi75AJq96arO68UctX2Jae2tMgHkoJRgeIZxzYaYbeTXp2tKRYlHvXyUmAeOlmz/JCDv7 YPXT552ctVO+t0ClzVhh5Yma47AD3fYSNaOBW3G18DZflTM5z/KQfszigvvwv1SFiQT1qaMsr7qUX cIt/F14g==;
Received: from cpe-172-250-225-198.socal.res.rr.com ([172.250.225.198]:59384 helo=smtpclient.apple) by server217.web-hosting.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <touch@strayalpha.com>) id 1luG9q-002r9O-T1; Fri, 18 Jun 2021 11:11:51 -0400
Content-Type: multipart/alternative; boundary="Apple-Mail=_93BED2C0-E009-422B-B50E-2EA1494A8465"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.100.0.2.22\))
From: Joseph Touch <touch@strayalpha.com>
In-Reply-To: <8af3abf9-943f-13c1-e239-5efca27cf68c@erg.abdn.ac.uk>
Date: Fri, 18 Jun 2021 08:11:45 -0700
Cc: Tom Herbert <tom@herbertland.com>, TSVWG <tsvwg@ietf.org>
Message-Id: <5D0A926D-AB95-48F7-9D7B-8862FE290761@strayalpha.com>
References: <CACL_3VEyLdQZ-3hvzXxyA8ehtWs2hXESZ2OqyAx+BeSg85+-cA@mail.gmail.com> <CACL_3VFE4TjKvmkfZjvNpWo6vVfKjz5w85=Q+yqnYZKcwbYLmQ@mail.gmail.com> <63FFC34B-2179-47F1-B325-21CAC3D1543A@strayalpha.com> <CACL_3VHTfxWaBj7TFEmBXBqovrrAj7XuFEZFUag_iBHr3Hx09g@mail.gmail.com> <0EBFC9B0-591A-4860-B327-6E617B83F4D1@strayalpha.com> <CALx6S34pT81TbfQDk2vKF8wBrXL312As79K=rEzUQ3Lmg7UvpA@mail.gmail.com> <7C51D926-9DBB-41F5-93B2-10F716F672B1@strayalpha.com> <CALx6S37uN8TsXQZ3cv5jmxwxSyBRjK=-GQ_MsWxPWSs21XoGHw@mail.gmail.com> <CACL_3VEx7+VnLz7OLdXyhZU41e+-oBz3dc8JdMV_7pLMfic6=w@mail.gmail.com> <fcc8762f-c042-7999-d2e4-f28384950a19@erg.abdn.ac.uk> <CALx6S36sWGcZmFpAhF4DfOMyf6Z0w5F9bemNfeM1yWV-r0M+BA@mail.gmail.com> <8af3abf9-943f-13c1-e239-5efca27cf68c@erg.abdn.ac.uk>
To: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
X-Mailer: Apple Mail (2.3654.100.0.2.22)
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/mE9ftuCHczxtcTeh1ce3Oa-kEt0>
Subject: Re: [tsvwg] RDMA Support by UDP FRAG Option
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Jun 2021 15:11:58 -0000


> On Jun 18, 2021, at 2:36 AM, Gorry Fairhurst <gorry@erg.abdn.ac.uk> wrote:
> 
>> Please look at draft-herbert-udp-space-hdr-01 for my proposal as to
>> how the UDP surplus space should be formatted. If there is interest, I
>> could update draft to include considerations for UDP options
>> fragmentation and reassembly offload as well as header/data split
>> which is needed for zero-copy receive (i.e. packet headers are DMA'ed
>> into one set of buffers to be processed by the stack, payload is
>> DMA'ed to another set of buffers to be processed by the application).
>> 
>> Tom
> ...
> I think it would be good for the WG to focus on how to finish draft-ietf-tsvwg-udp-options, but I do seem some opportunities to use some of these ideas for making the fragment header - because that also places all data in the "option”.

The difference between this draft and where we are (and have been before that draft):
	1. it adds an option area length field 
	2. it requires length on all packets with options
	3. It requires OCS on all packets with options

(1) repeats TCP's mistake of limiting the options space (see draft-ietf-tcpm-tcp-edo)
(1) undermines the use of FRAGs where fragments are larger than 1K (not to mention being smaller for per-frag options)
(2) adds a field that is not needed in packets that are not FRAGs
(3) requires checks that are redundant on packets already protected, undermining the flexibility that continues to be available via UDP CS=0

I don’t understand “places all the data in the ‘option’”. It doesn’t appear to do that unless used with FRAG, which we already do in the WG doc.

Joe