Sponsored Content
Top Forums UNIX for Advanced & Expert Users how to analyse the contents of a give IP packet? Post 302220997 by ramen_noodle on Saturday 2nd of August 2008 07:39:29 PM
Old 08-02-2008
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Using GDB to analyse different CORE dumps

Hi, Can we modify the GDB source code so as to analyze core dumps from different targets? From my analysis, I think we need to build our section table statically for each target. i.e., including the various address boundaries in build_section_table() function. If this is the case, then the GDB... (2 Replies)
Discussion started by: nsdeeps
2 Replies

2. Solaris

Ways to analyse root disk slice

Hi, Recently I faced with need of analyze root disk. I figured out two possible ways to do it: 1. Practical. Boot from CD and run format 2. Theoretical. Create live upgrade boot environment on another disk, activate it, reboot, unmont all root disk partitions and run format. I've already... (3 Replies)
Discussion started by: Sapfeer
3 Replies

3. Shell Programming and Scripting

Logfile analyse | problem with regex

Hello there, i am trying to write a shell script to analyse some of my log files. I want the script to check if there is a logfile from yesterday or today (some times the script that creates the logfile takes a bit longer and its after 00:00) and search the logfile itself if the script was... (0 Replies)
Discussion started by: Linien
0 Replies

4. UNIX for Advanced & Expert Users

analyse core file using pmap and pstack

Dear All, I am new to this forum. This is my first. I am facing customer issue. Customer has got core file while running the server. He had sent core file and details from pstack, pmap and pldd commands. I have to debug this application, please help me to fix this issue. I am using sparc... (1 Reply)
Discussion started by: KiranBangalore
1 Replies

5. Solaris

analyse core file using pmap and pstack

Dear All, I am new to this forum. This is my first. I am facing customer issue. Customer has got core file while running the server. He had sent core file and details from pstack, pmap and pldd commands. I have to debug this application, please help me to fix this issue. I am using sparc 10... (4 Replies)
Discussion started by: KiranBangalore
4 Replies

6. Solaris

I need to analyse some vmcore files

I need to analyse some vmcore files, do you guys know how can i get a free version of the "Solaris Crash Analysis Tool " (2 Replies)
Discussion started by: feg
2 Replies

7. Shell Programming and Scripting

How to analyse results of grep

Hi all, I'm working with a peice of software that runs on Linux that allows planning trips in cars through maps. This software has different variations depending on the type of car, e.g. BMW, Audi, Hyundai, etc... Each variation has a dependency on common external components that are not... (1 Reply)
Discussion started by: emoshaya
1 Replies

8. UNIX for Dummies Questions & Answers

Analyse this fdisk -l

Hi, Someone please analyse the following o/p of fdisk -l and tell me what it means for /dev/sda, /dev/sdb, /dev/sdc .... Disk /dev/sda: 53.6 GB, 53687091200 bytes 255 heads, 63 sectors/track, 6527 cylinders Units = cylinders of 16065 * 512 = 8225280 bytes Device Boot Start ... (5 Replies)
Discussion started by: stunn3r
5 Replies

9. HP-UX

How to analyse the syslog?

Hi All, When can we see these messages in the syslog. We have service guard cluster software installed on hpux 11iv3 servers. We were able to see the below error so many times in our syslog messages cmdisklockd: Unable to convert device to I/O tree node: I/O tree node does not exist. ... (2 Replies)
Discussion started by: Sachin1987
2 Replies

10. AIX

Packet loss coming with big packet size ping

(5 Replies)
Discussion started by: Vishal_dba
5 Replies
ZERO_COPY(9)						   BSD Kernel Developer's Manual					      ZERO_COPY(9)

NAME
zero_copy, zero_copy_sockets -- zero copy sockets code SYNOPSIS
options ZERO_COPY_SOCKETS DESCRIPTION
The FreeBSD kernel includes a facility for eliminating data copies on socket reads and writes. This code is collectively known as the zero copy sockets code, because during normal network I/O, data will not be copied by the CPU at all. Rather it will be DMAed from the user's buffer to the NIC (for sends), or DMAed from the NIC to a buffer that will then be given to the user (receives). The zero copy sockets code uses the standard socket read and write semantics, and therefore has some limitations and restrictions that pro- grammers should be aware of when trying to take advantage of this functionality. For sending data, there are no special requirements or capabilities that the sending NIC must have. The data written to the socket, though, must be at least a page in size and page aligned in order to be mapped into the kernel. If it does not meet the page size and alignment con- straints, it will be copied into the kernel, as is normally the case with socket I/O. The user should be careful not to overwrite buffers that have been written to the socket before the data has been freed by the kernel, and the copy-on-write mapping cleared. If a buffer is overwritten before it has been given up by the kernel, the data will be copied, and no savings in CPU utilization and memory bandwidth utilization will be realized. The socket(2) API does not really give the user any indication of when his data has actually been sent over the wire, or when the data has been freed from kernel buffers. For protocols like TCP, the data will be kept around in the kernel until it has been acknowledged by the other side; it must be kept until the acknowledgement is received in case retransmission is required. From an application standpoint, the best way to guarantee that the data has been sent out over the wire and freed by the kernel (for TCP- based sockets) is to set a socket buffer size (see the SO_SNDBUF socket option in the setsockopt(2) manual page) appropriate for the applica- tion and network environment and then make sure you have sent out twice as much data as the socket buffer size before reusing a buffer. For TCP, the send and receive socket buffer sizes generally directly correspond to the TCP window size. For receiving data, in order to take advantage of the zero copy receive code, the user must have a NIC that is configured for an MTU greater than the architecture page size. (E.g., for i386 it would be 4KB.) Additionally, in order for zero copy receive to work, packet payloads must be at least a page in size and page aligned. Achieving page aligned payloads requires a NIC that can split an incoming packet into multiple buffers. It also generally requires some sort of intelligence on the NIC to make sure that the payload starts in its own buffer. This is called ``header splitting''. Currently the only NICs with support for header splitting are Alteon Tigon 2 based boards running slightly modified firmware. The FreeBSD ti(4) driver includes modified firmware for Tigon 2 boards only. Header splitting code can be written, however, for any NIC that allows putting received packets into multiple buffers and that has enough programmability to determine that the header should go into one buffer and the payload into another. You can also do a form of header splitting that does not require any NIC modifications if your NIC is at least capable of splitting packets into multiple buffers. This requires that you optimize the NIC driver for your most common packet header size. If that size (ethernet + IP + TCP headers) is generally 66 bytes, for instance, you would set the first buffer in a set for a particular packet to be 66 bytes long, and then subsequent buffers would be a page in size. For packets that have headers that are exactly 66 bytes long, your payload will be page aligned. The other requirement for zero copy receive to work is that the buffer that is the destination for the data read from a socket must be at least a page in size and page aligned. Obviously the requirements for receive side zero copy are impossible to meet without NIC hardware that is programmable enough to do header splitting of some sort. Since most NICs are not that programmable, or their manufacturers will not share the source code to their firmware, this approach to zero copy receive is not widely useful. There are other approaches, such as RDMA and TCP Offload, that may potentially help alleviate the CPU overhead associated with copying data out of the kernel. Most known techniques require some sort of support at the NIC level to work, and describing such techniques is beyond the scope of this manual page. The zero copy send and zero copy receive code can be individually turned off via the kern.ipc.zero_copy.send and kern.ipc.zero_copy.receive sysctl variables respectively. SEE ALSO
sendfile(2), socket(2), ti(4) HISTORY
The zero copy sockets code first appeared in FreeBSD 5.0, although it has been in existence in patch form since at least mid-1999. AUTHORS
The zero copy sockets code was originally written by Andrew Gallatin <gallatin@FreeBSD.org> and substantially modified and updated by Kenneth Merry <ken@FreeBSD.org>. BSD
December 5, 2004 BSD
All times are GMT -4. The time now is 08:21 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy