aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMartin Braun <martin.braun@ettus.com>2021-11-16 11:50:55 +0100
committerAaron Rossetto <aaron.rossetto@ni.com>2021-12-02 05:49:53 -0800
commitd5f7b0cf90f5095059004445852a422e914c52cb (patch)
treeb6bb9f5db14fd5ee06f3a79e87f53ee40e463047
parent902c8456fbd13e85b930eae423e24b7abfc81869 (diff)
downloaduhd-d5f7b0cf90f5095059004445852a422e914c52cb.tar.gz
uhd-d5f7b0cf90f5095059004445852a422e914c52cb.tar.bz2
uhd-d5f7b0cf90f5095059004445852a422e914c52cb.zip
mpmd: Add MTU plausibility check
We have noticed that on 1 GbE connections, MTU discovery can become unreliable. Since we now use the MTU directly for deriving spp and other values, a correct MTU is important. Because we don't have a way of knowing if MTU discovery worked or not, we add some heuristics in form of a plausibility check. For now, the only rule in this check is if that the detected MTU is a bit larger than 1472 bytes, we coerce down to 1472, because this is such a standard value (most 1 GbE interfaces default to an IPv4 MTU of 1500 bytes). For the cases where the interface MTU is set to be between 1500 and 1528 bytes, this would cause a very minor performance loss. We accept this performance loss as it is small, and those cases are very rare. MTUs are usually 1500 bytes, or >= 8000 bytes for high-speed links using jumbo frames.
-rw-r--r--host/lib/usrp/mpmd/mpmd_link_if_ctrl_udp.cpp42
1 files changed, 42 insertions, 0 deletions
diff --git a/host/lib/usrp/mpmd/mpmd_link_if_ctrl_udp.cpp b/host/lib/usrp/mpmd/mpmd_link_if_ctrl_udp.cpp
index fe7d2b670..92d2ae99c 100644
--- a/host/lib/usrp/mpmd/mpmd_link_if_ctrl_udp.cpp
+++ b/host/lib/usrp/mpmd/mpmd_link_if_ctrl_udp.cpp
@@ -138,6 +138,46 @@ std::vector<std::string> get_addrs_from_mb_args(const uhd::device_addr_t& mb_arg
return addrs;
}
+/*! Run a plausibility check on a detected MTU, and return a value that passes
+ * custom constraints.
+ *
+ * This function forcibly overrides the detected MTU value using hardcoded
+ * heuristics/rules, even if the detected MTU is actually correct!
+ * These rules should thus be chosen very carefully, and should only coerce down
+ * (i.e., the return value should be smaller than argument).
+ */
+size_t run_mtu_plausibility_check(const size_t detected_mtu)
+{
+ // 1 GbE MTU check: We have observed that the detected path MTU for 1 GbE
+ // devices can come out a few bytes too high over 1 GbE. This is most likely
+ // due to some drivers being a little more tolerant with larger-than-MTU
+ // packets, which is not helpful for us. When the MTU detection errs on the
+ // large side, it can happen that either packets going from UHD to the
+ // device get fragmented (this is bad, the USRP can't defragment) or that
+ // packets coming from the device won't get accepted by our NIC/driver,
+ // causing drops (this is the rarer case). We avoid this by detecting typical
+ // 1 GbE MTU sizes and coercing them to 1472 bytes. When using a NIC MTU of
+ // 1500, we have observed detected MTUs of 1476 up to 1488 bytes, when they
+ // should be 1472 bytes instead.
+ {
+ constexpr size_t DEFAULT_1GBE_MTU = 1472; // bytes
+ constexpr size_t MIN_1GBE_MTU_COERCE_VALUE = 1472; // bytes
+ constexpr size_t MAX_1GBE_MTU_COERCE_VALUE = 1500; // bytes
+ if (detected_mtu > MIN_1GBE_MTU_COERCE_VALUE
+ && detected_mtu < MAX_1GBE_MTU_COERCE_VALUE) {
+ UHD_LOG_DEBUG("MPMD",
+ "MTU discovery detected "
+ << detected_mtu
+ << " bytes. This may be due to a faulty MTU discovery. Coercing to "
+ << DEFAULT_1GBE_MTU << " bytes.");
+ return DEFAULT_1GBE_MTU;
+ }
+ } // End 1 GbE MTU check.
+
+ // If no one raises any red flags, we let the detected MTU slide.
+ return detected_mtu;
+}
+
/*! Do a binary search to discover MTU
*
* Uses the MPM echo service to figure out MTU. We simply send a bunch of
@@ -233,6 +273,8 @@ size_t discover_mtu(const std::string& address,
max_frame_size = len;
}
}
+
+ min_frame_size = run_mtu_plausibility_check(min_frame_size);
UHD_LOG_DEBUG("MPMD", "Path MTU for address " << address << ": " << min_frame_size);
return min_frame_size;
}