* [PATCH] sendfile.2: caution against modifying sent pages
@ 2014-07-16 22:50 Eric Wong
[not found] ` <20140716225050.GA4675-yBiyF41qdooeIZ0/mPfg9Q@public.gmane.org>
0 siblings, 1 reply; 3+ messages in thread
From: Eric Wong @ 2014-07-16 22:50 UTC (permalink / raw)
To: mtk.manpages-Re5JQEeQqe8AvxtiuMwx3w; +Cc: linux-man-u79uwXL29TY76Z2rM5mHXA
The following program illustrates the difference between TCP and Unix
stream sockets doing sendfile. Since TCP implements zero-copy, the new
modifications to the file tranferred is seen upon reading despite
the modifications happening after sendfile was last called.
Unix stream sockets do not implement zero-copy (as of Linux 3.15),
so readers continue to see the contents of the file at the time it
was sent, not as they are at the time of reading.
----------------- sendfile-mod.c ---------------
#define _GNU_SOURCE
#include <sys/ioctl.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/sendfile.h>
#include <arpa/inet.h>
#include <stdio.h>
#include <errno.h>
#include <string.h>
#include <unistd.h>
#include <assert.h>
#include <fcntl.h>
static void tcp_socketpair(int sv[2])
{
struct sockaddr_in addr;
socklen_t addrlen = sizeof(addr);
int l = socket(PF_INET, SOCK_STREAM, 0);
int c = socket(PF_INET, SOCK_STREAM, 0);
int a;
int val = 1;
addr.sin_family = AF_INET;
addr.sin_addr.s_addr = INADDR_ANY;
addr.sin_port = 0;
assert(0 == bind(l, (struct sockaddr*)&addr, addrlen));
assert(0 == listen(l, 1024));
assert(0 == getsockname(l, (struct sockaddr *)&addr, &addrlen));
assert(0 == connect(c, (struct sockaddr *)&addr, addrlen));
a = accept4(l, NULL, NULL, SOCK_NONBLOCK);
assert(a >= 0);
close(l);
assert(0 == ioctl(c, FIONBIO, &val));
sv[0] = a;
sv[1] = c;
}
int main(int argc, char *argv[])
{
int pair[2];
FILE *tmp = tmpfile();
int tfd;
char buf[16384];
ssize_t w, r;
size_t i;
const size_t n = 2048;
off_t off = 0;
char expect[4096];
int flags = SOCK_STREAM|SOCK_NONBLOCK;
tfd = fileno(tmp);
assert(tfd >= 0);
/* prepare the tempfile */
memset(buf, 'a', sizeof(buf));
for (i = 0; i < n; i++)
assert(sizeof(buf) == write(tfd, buf, sizeof(buf)));
if (argc == 2 && strcmp(argv[1], "unix") == 0)
assert(0 == socketpair(AF_UNIX, flags, 0, pair));
else if (argc == 2 && strcmp(argv[1], "pipe") == 0)
assert(0 == pipe2(pair, O_NONBLOCK));
else
tcp_socketpair(pair);
/* fill up the socket buffer */
for (;;) {
w = sendfile(pair[1], tfd, &off, n);
if (w > 0)
continue;
if (w < 0 && errno == EAGAIN)
break;
assert(0 && "unhandled error" && w && errno);
}
printf("wrote off=%lld\n", (long long)off);
/* rewrite the tempfile */
memset(buf, 'A', sizeof(buf));
assert(0 == lseek(tfd, 0, SEEK_SET));
for (i = 0; i < n; i++)
assert(sizeof(buf) == write(tfd, buf, sizeof(buf)));
/* we should be reading 'a's, not 'A's */
memset(expect, 'a', sizeof(expect));
do {
r = read(pair[0], buf, sizeof(expect));
/* TCP fails here since it is zero copy (on Linux 3.15.5) */
if (r > 0)
assert(memcmp(buf, expect, r) == 0);
} while (r > 0);
return 0;
}
Signed-off-by: Eric Wong <normalperson-rMlxZR9MS24@public.gmane.org>
---
One of my applications turned out to be buggy due to my failure to
realize this in time. Hopefully this note prevents others from
suffering the same fate.
I think splice.2 and tee.2 will need similar notes
(not sure if my current wording here is good enough,
I am not comfortable writing documentation :x)
man2/sendfile.2 | 9 +++++++++
1 file changed, 9 insertions(+)
diff --git a/man2/sendfile.2 b/man2/sendfile.2
index 6e9ec42..fcc2724 100644
--- a/man2/sendfile.2
+++ b/man2/sendfile.2
@@ -190,6 +190,15 @@ fails with
or
.BR ENOSYS .
+If
+.I out_fd
+refers to a socket or pipe with zero-copy support, callers must ensure the
+transferred portions of the file referred to by
+.I in_fd
+remain unmodified until the reader on the other end of
+.I out_fd
+has consumed the transferred data.
+
The Linux-specific
.BR splice (2)
call supports transferring data between arbitrary files
--
EW
--
To unsubscribe from this list: send the line "unsubscribe linux-man" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply related [flat|nested] 3+ messages in thread
* Re: [PATCH] sendfile.2: caution against modifying sent pages
[not found] ` <20140716225050.GA4675-yBiyF41qdooeIZ0/mPfg9Q@public.gmane.org>
@ 2014-08-14 20:48 ` Eric Wong
2015-02-05 12:54 ` Michael Kerrisk (man-pages)
1 sibling, 0 replies; 3+ messages in thread
From: Eric Wong @ 2014-08-14 20:48 UTC (permalink / raw)
To: mtk.manpages-Re5JQEeQqe8AvxtiuMwx3w; +Cc: linux-man-u79uwXL29TY76Z2rM5mHXA
ping
Eric Wong <normalperson-rMlxZR9MS24@public.gmane.org> wrote:
> The following program illustrates the difference between TCP and Unix
> stream sockets doing sendfile. Since TCP implements zero-copy, the new
> modifications to the file tranferred is seen upon reading despite
> the modifications happening after sendfile was last called.
>
> Unix stream sockets do not implement zero-copy (as of Linux 3.15),
> so readers continue to see the contents of the file at the time it
> was sent, not as they are at the time of reading.
>
> ----------------- sendfile-mod.c ---------------
> #define _GNU_SOURCE
> #include <sys/ioctl.h>
> #include <sys/types.h>
> #include <sys/socket.h>
> #include <sys/sendfile.h>
> #include <arpa/inet.h>
> #include <stdio.h>
> #include <errno.h>
> #include <string.h>
> #include <unistd.h>
> #include <assert.h>
> #include <fcntl.h>
>
> static void tcp_socketpair(int sv[2])
> {
> struct sockaddr_in addr;
> socklen_t addrlen = sizeof(addr);
> int l = socket(PF_INET, SOCK_STREAM, 0);
> int c = socket(PF_INET, SOCK_STREAM, 0);
> int a;
> int val = 1;
>
> addr.sin_family = AF_INET;
> addr.sin_addr.s_addr = INADDR_ANY;
> addr.sin_port = 0;
> assert(0 == bind(l, (struct sockaddr*)&addr, addrlen));
> assert(0 == listen(l, 1024));
> assert(0 == getsockname(l, (struct sockaddr *)&addr, &addrlen));
> assert(0 == connect(c, (struct sockaddr *)&addr, addrlen));
> a = accept4(l, NULL, NULL, SOCK_NONBLOCK);
> assert(a >= 0);
> close(l);
> assert(0 == ioctl(c, FIONBIO, &val));
> sv[0] = a;
> sv[1] = c;
> }
>
> int main(int argc, char *argv[])
> {
> int pair[2];
> FILE *tmp = tmpfile();
> int tfd;
> char buf[16384];
> ssize_t w, r;
> size_t i;
> const size_t n = 2048;
> off_t off = 0;
> char expect[4096];
> int flags = SOCK_STREAM|SOCK_NONBLOCK;
>
> tfd = fileno(tmp);
> assert(tfd >= 0);
>
> /* prepare the tempfile */
> memset(buf, 'a', sizeof(buf));
> for (i = 0; i < n; i++)
> assert(sizeof(buf) == write(tfd, buf, sizeof(buf)));
>
> if (argc == 2 && strcmp(argv[1], "unix") == 0)
> assert(0 == socketpair(AF_UNIX, flags, 0, pair));
> else if (argc == 2 && strcmp(argv[1], "pipe") == 0)
> assert(0 == pipe2(pair, O_NONBLOCK));
> else
> tcp_socketpair(pair);
>
> /* fill up the socket buffer */
> for (;;) {
> w = sendfile(pair[1], tfd, &off, n);
> if (w > 0)
> continue;
> if (w < 0 && errno == EAGAIN)
> break;
> assert(0 && "unhandled error" && w && errno);
> }
> printf("wrote off=%lld\n", (long long)off);
>
> /* rewrite the tempfile */
> memset(buf, 'A', sizeof(buf));
> assert(0 == lseek(tfd, 0, SEEK_SET));
> for (i = 0; i < n; i++)
> assert(sizeof(buf) == write(tfd, buf, sizeof(buf)));
>
> /* we should be reading 'a's, not 'A's */
> memset(expect, 'a', sizeof(expect));
> do {
> r = read(pair[0], buf, sizeof(expect));
>
> /* TCP fails here since it is zero copy (on Linux 3.15.5) */
> if (r > 0)
> assert(memcmp(buf, expect, r) == 0);
> } while (r > 0);
>
> return 0;
> }
>
> Signed-off-by: Eric Wong <normalperson-rMlxZR9MS24@public.gmane.org>
> ---
> One of my applications turned out to be buggy due to my failure to
> realize this in time. Hopefully this note prevents others from
> suffering the same fate.
>
> I think splice.2 and tee.2 will need similar notes
> (not sure if my current wording here is good enough,
> I am not comfortable writing documentation :x)
>
> man2/sendfile.2 | 9 +++++++++
> 1 file changed, 9 insertions(+)
>
> diff --git a/man2/sendfile.2 b/man2/sendfile.2
> index 6e9ec42..fcc2724 100644
> --- a/man2/sendfile.2
> +++ b/man2/sendfile.2
> @@ -190,6 +190,15 @@ fails with
> or
> .BR ENOSYS .
>
> +If
> +.I out_fd
> +refers to a socket or pipe with zero-copy support, callers must ensure the
> +transferred portions of the file referred to by
> +.I in_fd
> +remain unmodified until the reader on the other end of
> +.I out_fd
> +has consumed the transferred data.
> +
> The Linux-specific
> .BR splice (2)
> call supports transferring data between arbitrary files
> --
> EW
--
To unsubscribe from this list: send the line "unsubscribe linux-man" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [PATCH] sendfile.2: caution against modifying sent pages
[not found] ` <20140716225050.GA4675-yBiyF41qdooeIZ0/mPfg9Q@public.gmane.org>
2014-08-14 20:48 ` Eric Wong
@ 2015-02-05 12:54 ` Michael Kerrisk (man-pages)
1 sibling, 0 replies; 3+ messages in thread
From: Michael Kerrisk (man-pages) @ 2015-02-05 12:54 UTC (permalink / raw)
To: Eric Wong
Cc: mtk.manpages-Re5JQEeQqe8AvxtiuMwx3w,
linux-man-u79uwXL29TY76Z2rM5mHXA
On 07/17/2014 12:50 AM, Eric Wong wrote:
> The following program illustrates the difference between TCP and Unix
> stream sockets doing sendfile. Since TCP implements zero-copy, the new
> modifications to the file tranferred is seen upon reading despite
> the modifications happening after sendfile was last called.
>
> Unix stream sockets do not implement zero-copy (as of Linux 3.15),
> so readers continue to see the contents of the file at the time it
> was sent, not as they are at the time of reading.
Hello Eric,
Applied! Thank you for the well supported patch.
Cheers,
Michael
> ----------------- sendfile-mod.c ---------------
> #define _GNU_SOURCE
> #include <sys/ioctl.h>
> #include <sys/types.h>
> #include <sys/socket.h>
> #include <sys/sendfile.h>
> #include <arpa/inet.h>
> #include <stdio.h>
> #include <errno.h>
> #include <string.h>
> #include <unistd.h>
> #include <assert.h>
> #include <fcntl.h>
>
> static void tcp_socketpair(int sv[2])
> {
> struct sockaddr_in addr;
> socklen_t addrlen = sizeof(addr);
> int l = socket(PF_INET, SOCK_STREAM, 0);
> int c = socket(PF_INET, SOCK_STREAM, 0);
> int a;
> int val = 1;
>
> addr.sin_family = AF_INET;
> addr.sin_addr.s_addr = INADDR_ANY;
> addr.sin_port = 0;
> assert(0 == bind(l, (struct sockaddr*)&addr, addrlen));
> assert(0 == listen(l, 1024));
> assert(0 == getsockname(l, (struct sockaddr *)&addr, &addrlen));
> assert(0 == connect(c, (struct sockaddr *)&addr, addrlen));
> a = accept4(l, NULL, NULL, SOCK_NONBLOCK);
> assert(a >= 0);
> close(l);
> assert(0 == ioctl(c, FIONBIO, &val));
> sv[0] = a;
> sv[1] = c;
> }
>
> int main(int argc, char *argv[])
> {
> int pair[2];
> FILE *tmp = tmpfile();
> int tfd;
> char buf[16384];
> ssize_t w, r;
> size_t i;
> const size_t n = 2048;
> off_t off = 0;
> char expect[4096];
> int flags = SOCK_STREAM|SOCK_NONBLOCK;
>
> tfd = fileno(tmp);
> assert(tfd >= 0);
>
> /* prepare the tempfile */
> memset(buf, 'a', sizeof(buf));
> for (i = 0; i < n; i++)
> assert(sizeof(buf) == write(tfd, buf, sizeof(buf)));
>
> if (argc == 2 && strcmp(argv[1], "unix") == 0)
> assert(0 == socketpair(AF_UNIX, flags, 0, pair));
> else if (argc == 2 && strcmp(argv[1], "pipe") == 0)
> assert(0 == pipe2(pair, O_NONBLOCK));
> else
> tcp_socketpair(pair);
>
> /* fill up the socket buffer */
> for (;;) {
> w = sendfile(pair[1], tfd, &off, n);
> if (w > 0)
> continue;
> if (w < 0 && errno == EAGAIN)
> break;
> assert(0 && "unhandled error" && w && errno);
> }
> printf("wrote off=%lld\n", (long long)off);
>
> /* rewrite the tempfile */
> memset(buf, 'A', sizeof(buf));
> assert(0 == lseek(tfd, 0, SEEK_SET));
> for (i = 0; i < n; i++)
> assert(sizeof(buf) == write(tfd, buf, sizeof(buf)));
>
> /* we should be reading 'a's, not 'A's */
> memset(expect, 'a', sizeof(expect));
> do {
> r = read(pair[0], buf, sizeof(expect));
>
> /* TCP fails here since it is zero copy (on Linux 3.15.5) */
> if (r > 0)
> assert(memcmp(buf, expect, r) == 0);
> } while (r > 0);
>
> return 0;
> }
>
> Signed-off-by: Eric Wong <normalperson-rMlxZR9MS24@public.gmane.org>
> ---
> One of my applications turned out to be buggy due to my failure to
> realize this in time. Hopefully this note prevents others from
> suffering the same fate.
>
> I think splice.2 and tee.2 will need similar notes
> (not sure if my current wording here is good enough,
> I am not comfortable writing documentation :x)
>
> man2/sendfile.2 | 9 +++++++++
> 1 file changed, 9 insertions(+)
>
> diff --git a/man2/sendfile.2 b/man2/sendfile.2
> index 6e9ec42..fcc2724 100644
> --- a/man2/sendfile.2
> +++ b/man2/sendfile.2
> @@ -190,6 +190,15 @@ fails with
> or
> .BR ENOSYS .
>
> +If
> +.I out_fd
> +refers to a socket or pipe with zero-copy support, callers must ensure the
> +transferred portions of the file referred to by
> +.I in_fd
> +remain unmodified until the reader on the other end of
> +.I out_fd
> +has consumed the transferred data.
> +
> The Linux-specific
> .BR splice (2)
> call supports transferring data between arbitrary files
>
--
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
--
To unsubscribe from this list: send the line "unsubscribe linux-man" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2015-02-05 12:54 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-07-16 22:50 [PATCH] sendfile.2: caution against modifying sent pages Eric Wong
[not found] ` <20140716225050.GA4675-yBiyF41qdooeIZ0/mPfg9Q@public.gmane.org>
2014-08-14 20:48 ` Eric Wong
2015-02-05 12:54 ` Michael Kerrisk (man-pages)
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).