I thought I remembered hitting the ENOBUFs which is the case per the source.
// perform write
currLen = write( mSettings->mSock, mBuf, mSettings->mBufLen );
if ( currLen < 0 && errno != ENOBUFS ) {
WARN_errno( currLen < 0, "write2" );
break;
}
// report packets
reportstruct->packetLen = currLen;
ReportPacket( mSettings->reporthdr, reportstruct );
A minor nit, the currLen may need to set to zero when errno==ENOBUFFS before
the ReportPacket()
Also, ione could count the number of writes that return ENOBUFFS but not sure
why that's interesting.
As an FYI, I have a tool that manages multiple, distributed iperf sessions
which I use for wi-fi testing. The following shows an 802.11 AC wi-fi link
that maxes out around 800Mbs. The offered load is 2G and the iperf client
seems to be reporting properly and responding as expected when RF attenuation
is added and then removed.
utf> udp start; udp linkcheck -now; L1 attn 65; UTF::Sleep 0.3; L1 attn 0;
UTF::Sleep 0.3; udp stop
20:45:08 LOG sfast-lx2 iperf -s -w 7350000 -l 1470 -u -i 0.1 -fb -p 60001
20:45:08 HNDLR_ udp-rx Server listening on UDP port 60001 (sflx2,file12)
20:45:08 HNDLR_ udp-rx Receiving 1470 byte datagrams (sflx2,file12)
20:45:08 HNDLR_ udp-rx UDP buffer size: 8388608 Byte (WARNING: requested
7350000 Byte) (sflx2,file12)
20:45:08 LOG itx-lx1 iperf -c 192.168.1.42 -w 367500 -l 1470 -u -b 2G -B
192.168.1.100 -i 0.1 -fb -S 0x0 -T 255 -t 5356800 -p 60001
20:45:08 HNDLR udp-tx
------------------------------------------------------------ (43602lx1,file13)
20:45:08 HNDLR_ udp-rx [ 3] local 192.168.1.42 port 60001 connected with
192.168.1.100 port 60001 (sflx2,file12)
20:45:08 HNDLR udp-tx Client connecting to 192.168.1.42, UDP port 60001
(43602lx1,file13)
20:45:08 INFO udp-tx TX start: protocol=UDP Offered rate=2G pktsize=1470
delay=5us
20:45:08 HNDLR udp-tx Binding to local address 192.168.1.100
(43602lx1,file13)
20:45:08 HNDLR udp-tx Sending 1470 byte datagrams (43602lx1,file13)
20:45:08 HNDLR udp-tx UDP buffer size: 735000 Byte (WARNING: requested
367500 Byte) (43602lx1,file13)
20:45:08 HNDLR udp-tx
------------------------------------------------------------ (43602lx1,file13)
20:45:08 HNDLR udp-tx [ 3] local 192.168.1.100 port 60001 connected with
192.168.1.42 port 60001 (43602lx1,file13)
20:45:08 HNDLR udp-tx [ ID] Interval Transfer Bandwidth
(43602lx1,file13)
20:45:08 HNDLR udp-tx [ 3] 0.000-0.100 sec 11244030 Bytes 899522400
bits/sec (43602lx1,file13)
20:45:08 LOG L1 attn 65
20:45:08 INFO ::AF-A Setting attn to 65
20:45:08 INFO Sleep 0.3 sec
20:45:08 LOG itx-lx1 wl0.0: wlc_send_bar: seq 0x17f tid 0
20:45:08 LOG itx-lx1 wl0.0: wlc_send_bar: seq 0x17f tid 0 (repeated 1
times)
20:45:08 LOG L1 attn 0
20:45:08 INFO ::AF-A Setting attn to 0
20:45:08 INFO Sleep 0.3 sec
20:45:08 HNDLR udp-tx [ 3] 0.100-0.200 sec 2625420 Bytes 210033600
bits/sec (43602lx1,file13)
20:45:08 HNDLR udp-tx [ 3] 0.200-0.300 sec 0.00 Bytes 0.00 bits/sec
(43602lx1,file13)
20:45:08 HNDLR udp-tx [ 3] 0.300-0.400 sec 0.00 Bytes 0.00 bits/sec
(43602lx1,file13)
20:45:08 HNDLR udp-tx [ 3] 0.400-0.500 sec 6251910 Bytes 500152800
bits/sec (43602lx1,file13)
20:45:08 HNDLR udp-tx [ 3] 0.500-0.600 sec 10406130 Bytes 832490400
bits/sec (43602lx1,file13)
20:45:08 HNDLR udp-tx [ 3] 0.600-0.700 sec 10229730 Bytes 818378400
bits/sec (43602lx1,file13)
20:45:08 INFO udp Kill signal -HUP sent to (43602lx1,file13) : iperf
-c 192.168.1.42 -w 367500 -l 1470 -u -b 2G -B 192.168.1.100 -i 0.1 -fb -S 0x0
-T 255 -t 5356800 -p 60001
20:45:09 INFO udp Kill signal -HUP sent to (sflx2,file12) : iperf -s
-w 7350000 -l 1470 -u -i 0.1 -fb -p 60001
20:45:09 HNDLR udp-tx Close actions for event handler (43602lx1,file13)
20:45:09 INFO udp-tx Closed : (43602lx1,file13)
Bob
-----Original Message-----
From: Bob (Robert) McMahon
Sent: Wednesday, September 10, 2014 5:02 PM
To: Martin T; [email protected]
Cc: [email protected]
Subject: RE: [Iperf-users] Iperf client sends out less UDP traffic than
determined with "-b" flag
Hi Martin,
Just to confirm Andrew, I'm pretty sure I've seen the write syscall on linux
return ENOBUFFs. I'll check it out in the next few days and let you know.
Bob
-----Original Message-----
From: Martin T [mailto:[email protected]]
Sent: Wednesday, September 10, 2014 5:12 AM
To: [email protected]; Bob (Robert) McMahon
Cc: [email protected]
Subject: Re: [Iperf-users] Iperf client sends out less UDP traffic than
determined with "-b" flag
Andrew, Bob:
does Iperf use send() system call? Based on Iperf source code and
tests with strace, it seems to use write() system call to send data to
socket and according to write() manual page, it doesn't have a similar
error to ENOBUFS. However, I could easily be wrong here.
Andrew,
if Linux kernel silently drops packets in case the device queue
overflows, then how does Iperf client know that? For example if I
start the Iperf client with "iperf -c 10.10.10.1 -fm -t 600 -i 60 -u
-b 500m" command and thus request Iperf to send data with bandwidth of
500Mbps and Iperf client reports me that it has sent data at 120Mbps
instead of 500Mbps:
[ 3] 0.0-600.0 sec 8602 MBytes 120 Mbits/sec
..then this means that Iperf client somehow had to know that some of
the data was dropped or Iperf client was restricted to send data at
faster rate than 120Mbps. How to explain this behavior?
thanks,
Martin
On 9/8/14, Andrew Gallatin <[email protected]> wrote:
> No, just that it is fairly new (added 5 years ago in "6ce9e7b ip: Report
> qdisc packet drops"). Netperf did not have it either, until I tried to
> figure out why I was getting wildly inaccurate results from netperf (eg,
> seeing 20Gb/s on a 1GbE link).
>
>
> On Mon, Sep 8, 2014 at 11:34 AM, Bob (Robert) McMahon
> <[email protected]
>> wrote:
>
>> Hi Drew,
>>
>>
>>
>> Thanks for the detailed explanation. Do you know any reason that iperf
>> doesn’t or shouldn’t set IP_RECVERR on the sending socket(s)?
>>
>>
>>
>> Thanks,
>>
>> Bob
>>
>> *From:* Andrew Gallatin [mailto:[email protected]]
>> *Sent:* Monday, September 08, 2014 6:53 AM
>> *To:* Martin T
>> *Cc:* iperf-users
>> *Subject:* Re: [Iperf-users] Iperf client sends out less UDP traffic than
>> determined with "-b" flag
>>
>>
>>
>> Please, there are no "dropping" or "non dropping" NIC drivers, unless
>> some
>> driver is so broken that
>>
>> it silently returns NETDEV_TX_OK & does not stop its txqueue, but a
>> driver
>> that broken would
>>
>> not be accepted into the kernel.
>>
>>
>>
>> What is really happening is that the linux kernel is silently dropping
>> packets when the device's
>>
>> queue is full *AND* when the device queue is too small to hold the entire
>> socket buffer's worth
>>
>> of traffic. If you want blocking behavior, you need to ensure you have
>> the driver's queue
>>
>> large enough (or the socket buffer small enough) so that the driver's
>> queue can hold an
>>
>> entire socket buffer worth of traffic (* the number of active sockets per
>> queue). You can change
>>
>> the driver's queue size via ifconfig txqueuelen. It might be better to
>> reduce the socketbuffer
>>
>> size (and remember that linux multiplies whatever value you give it by 2,
>> to account for
>>
>> slop...).
>>
>>
>>
>> Note that any silent drops are done by the kernel, not the NIC and that
>> this is
>>
>> (bizarrely) the expected behavior on linux. If you don't believe me,
>> read the send(2) man page on linux:
>>
>> ENOBUFS
>>
>> The output queue for a network interface was full. This
>> generally indicates that the
>>
>> interface has stopped sending, but may be caused by
>> transient congestion. (Normally,
>>
>> this does not occur in Linux. Packets are just silently
>> dropped when a device queue
>>
>> overflows.)
>>
>>
>>
>> If iperf wants a correct accounting of the packets sent by the stack vs
>> dropped, iperf must set
>>
>> the IP_RECVERR sockopt on the sending socket. This stops the kernel from
>> silently
>>
>> dropping packets, and causes send() to return -ENOBUFS rather than 0 when
>>
>> datagram is dropped due to lack of resources (eg, like BSD does).
>>
>>
>>
>> Drew
>>
>
------------------------------------------------------------------------------
Want excitement?
Manually upgrade your production database.
When you want reliability, choose Perforce
Perforce version control. Predictably reliable.
http://pubads.g.doubleclick.net/gampad/clk?id=157508191&iu=/4140/ostg.clktrk
_______________________________________________
Iperf-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/iperf-users