Sponsored Content
Top Forums UNIX for Dummies Questions & Answers Partial Write for sockets in LINUX Post 302521899 by Loic Domaigne on Thursday 12th of May 2011 04:20:36 PM
Old 05-12-2011
Quote:
Also these sockets are in Non Blocking mode (O_NONBLOCK)
Any reason for not using standard blocking mode?

Quote:
Consider the server tried to write 2464 bytes. But after the repeated 30 attempts it could write only 1080 bytes. Server will raise a EAGAIN at this point. Client try to read 2464 bytes. The read command will return 2464 and hence the read itself is ok. But the data we received is a corrupted one (Partially written data only). So client crashes.
I can't quite follow. If only 1080 has been sent, I don't think that read() returns 2464 bytes...

Quote:
2) Is there any way to identify in client side that we had read a partially written message?.
You need to handle partial read anyway with TCP, since you don't know how your message will be segmented. The usual design pattern goes along those lines:
- a message is composed of a header and payload section,
- the header contains (among other) the payload size,
- the receiver read() first the header (a few bytes), decodes the expected payload length. To get the payload, it re-iterates read() until the wanted size is reached or an error occurs.

Quote:
Please note that we are facing the partial write issue in LINUX(REDHAT 5.4) only. System is working fine in Solaris (In solaris either eh entire data will be written OR NO data witll be written with in 30 tries of write).
Perhaps tune kernel parameters TCP send/recv queue length ?

HTH, Loïc
This User Gave Thanks to Loic Domaigne For This Post:
 

9 More Discussions You Might Find Interesting

1. Programming

Linux BSD sockets blocking issue

I am using BSD TCP sockets under Debian Linux 2.6 and no matter what I do, the socket blocks on recv. I have set O_NONBLOCK and O_NDELAY using fcntl to no effect. Any ideas ? (3 Replies)
Discussion started by: johnmb
3 Replies

2. IP Networking

read/write,write/write lock with smbclient fails

Hi, We have smb client running on two of the linux boxes and smb server on another linux system. During a backup operation which uses smb, read of a file was allowed while write to the same file was going on.Also simultaneous writes to the same file were allowed.Following are the settings in the... (1 Reply)
Discussion started by: swatidas11
1 Replies

3. Programming

c++, raw sockets, stopping kernel write in header?

Hi, im trying to lern about raw sockets with my debian and c++. Tried to make a icmp and tcp packet and send it with sendto. Checked on wireshark and recognized that kernel changed my headers. So searched about stopping the kernel change the header and tried it with setsockopt, like said in at this... (4 Replies)
Discussion started by: sandcastle
4 Replies

4. Shell Programming and Scripting

AWK - Print partial line/partial field

Hello, this is probably a simple request but I've been toying with it for a while. I have a large list of devices and commands that were run with a script, now I have lines such as: a-router-hostname-C#show ver I want to print everything up to (and excluding) the # and everything after it... (3 Replies)
Discussion started by: ippy98
3 Replies

5. Shell Programming and Scripting

How to bulk changing partial file name in Linux?

I have a bunch of database files in a directory. Their name are like: 1234_ABCD_01.dbf, 28hrs_ABCD_02.dbf I want to change them in bulk to: 1234_XXXU_01.dbf, 28hrs_XXXU_02.dbf. I mean I just want to replace ABCD by XXXU. don't change other part of the file name and the contents of the... (4 Replies)
Discussion started by: duke0001
4 Replies

6. Programming

Sockets (C under Linux)

Hi, I have to write an UDP broadcast. It works so far, but how can I get the actual network address at runtime? Should run under Linux and Unix (Solaris). Thanks (1 Reply)
Discussion started by: peng1967
1 Replies

7. Programming

help: problem with sockets write/read

I am trying to make a server and client, the client will choose between some options and the server will react accordingly. After a some reads and writes that work the server needs to read from client an INT i use this: read(newSd,&k,sizeof(int));But even if all the other times there was no... (1 Reply)
Discussion started by: theSling
1 Replies

8. Cybersecurity

root cannot write to Linux RAM

void main() { long ((long)(&array)); int x; for (;;) { (array) =+ 1023; printf("%c", array); } } What is wrong with this code to print Linux RAM? (13 Replies)
Discussion started by: Alux
13 Replies

9. Red Hat

SE Linux write permission denied

Hi, In my server I am getting below errors in "/var/log/messages": Oct 8 14:45:44 LKOGOMEEMM01 kernel: type=1400 audit(1444295744.792:15818): avc: denied { write } for pid=53421 comm="ip" path="/var/VRTSvcs/log/tmp/IPMultiNIC-8" dev=dm-0 ino=2754879 scontext=system_u:system_r:ifconfig_t:s0... (4 Replies)
Discussion started by: rochitsharma
4 Replies
ZERO_COPY(9)						   BSD Kernel Developer's Manual					      ZERO_COPY(9)

NAME
zero_copy, zero_copy_sockets -- zero copy sockets code SYNOPSIS
options SOCKET_SEND_COW options SOCKET_RECV_PFLIP DESCRIPTION
The FreeBSD kernel includes a facility for eliminating data copies on socket reads and writes. This code is collectively known as the zero copy sockets code, because during normal network I/O, data will not be copied by the CPU at all. Rather it will be DMAed from the user's buffer to the NIC (for sends), or DMAed from the NIC to a buffer that will then be given to the user (receives). The zero copy sockets code uses the standard socket read and write semantics, and therefore has some limitations and restrictions that pro- grammers should be aware of when trying to take advantage of this functionality. For sending data, there are no special requirements or capabilities that the sending NIC must have. The data written to the socket, though, must be at least a page in size and page aligned in order to be mapped into the kernel. If it does not meet the page size and alignment con- straints, it will be copied into the kernel, as is normally the case with socket I/O. The user should be careful not to overwrite buffers that have been written to the socket before the data has been freed by the kernel, and the copy-on-write mapping cleared. If a buffer is overwritten before it has been given up by the kernel, the data will be copied, and no savings in CPU utilization and memory bandwidth utilization will be realized. The socket(2) API does not really give the user any indication of when his data has actually been sent over the wire, or when the data has been freed from kernel buffers. For protocols like TCP, the data will be kept around in the kernel until it has been acknowledged by the other side; it must be kept until the acknowledgement is received in case retransmission is required. From an application standpoint, the best way to guarantee that the data has been sent out over the wire and freed by the kernel (for TCP- based sockets) is to set a socket buffer size (see the SO_SNDBUF socket option in the setsockopt(2) manual page) appropriate for the applica- tion and network environment and then make sure you have sent out twice as much data as the socket buffer size before reusing a buffer. For TCP, the send and receive socket buffer sizes generally directly correspond to the TCP window size. For receiving data, in order to take advantage of the zero copy receive code, the user must have a NIC that is configured for an MTU greater than the architecture page size. (E.g., for i386 it would be 4KB.) Additionally, in order for zero copy receive to work, packet payloads must be at least a page in size and page aligned. Achieving page aligned payloads requires a NIC that can split an incoming packet into multiple buffers. It also generally requires some sort of intelligence on the NIC to make sure that the payload starts in its own buffer. This is called ``header splitting''. Currently the only NICs with support for header splitting are Alteon Tigon 2 based boards running slightly modified firmware. The FreeBSD ti(4) driver includes modified firmware for Tigon 2 boards only. Header splitting code can be written, however, for any NIC that allows putting received packets into multiple buffers and that has enough programmability to determine that the header should go into one buffer and the payload into another. You can also do a form of header splitting that does not require any NIC modifications if your NIC is at least capable of splitting packets into multiple buffers. This requires that you optimize the NIC driver for your most common packet header size. If that size (ethernet + IP + TCP headers) is generally 66 bytes, for instance, you would set the first buffer in a set for a particular packet to be 66 bytes long, and then subsequent buffers would be a page in size. For packets that have headers that are exactly 66 bytes long, your payload will be page aligned. The other requirement for zero copy receive to work is that the buffer that is the destination for the data read from a socket must be at least a page in size and page aligned. Obviously the requirements for receive side zero copy are impossible to meet without NIC hardware that is programmable enough to do header splitting of some sort. Since most NICs are not that programmable, or their manufacturers will not share the source code to their firmware, this approach to zero copy receive is not widely useful. There are other approaches, such as RDMA and TCP Offload, that may potentially help alleviate the CPU overhead associated with copying data out of the kernel. Most known techniques require some sort of support at the NIC level to work, and describing such techniques is beyond the scope of this manual page. The zero copy send and zero copy receive code can be individually turned off via the kern.ipc.zero_copy.send and kern.ipc.zero_copy.receive sysctl variables respectively. SEE ALSO
sendfile(2), socket(2), ti(4) HISTORY
The zero copy sockets code first appeared in FreeBSD 5.0, although it has been in existence in patch form since at least mid-1999. AUTHORS
The zero copy sockets code was originally written by Andrew Gallatin <gallatin@FreeBSD.org> and substantially modified and updated by Kenneth Merry <ken@FreeBSD.org>. BUGS
The COW based send mechanism is not safe and may result in kernel crashes. BSD
October 23, 2012 BSD
All times are GMT -4. The time now is 12:30 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy