1 /* -*- mode: c; c-basic-offset: 8; indent-tabs-mode: nil; -*-
2 * vim:expandtab:shiftwidth=8:tabstop=8:
6 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 only,
10 * as published by the Free Software Foundation.
12 * This program is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License version 2 for more details (a copy is included
16 * in the LICENSE file that accompanied this code).
18 * You should have received a copy of the GNU General Public License
19 * version 2 along with this program; If not, see [sun.com URL with a
22 * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
23 * CA 95054 USA or visit www.sun.com if you need additional information or
29 * Copyright 2008 Sun Microsystems, Inc. All rights reserved
30 * Use is subject to license terms.
33 * This file is part of Lustre, http://www.lustre.org/
34 * Lustre is a trademark of Sun Microsystems, Inc.
39 # if defined(CONFIG_SYSCTL) && !CFS_SYSFS_MODULE_PARM
40 static cfs_sysctl_table_t ksocknal_ctl_table[21];
42 cfs_sysctl_table_t ksocknal_top_ctl_table[] = {
45 .procname = "socknal",
49 .child = ksocknal_ctl_table
55 ksocknal_lib_tunables_init ()
60 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
62 .procname = "timeout",
63 .data = ksocknal_tunables.ksnd_timeout,
64 .maxlen = sizeof (int),
66 .proc_handler = &proc_dointvec
68 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
70 .procname = "credits",
71 .data = ksocknal_tunables.ksnd_credits,
72 .maxlen = sizeof (int),
74 .proc_handler = &proc_dointvec
76 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
78 .procname = "peer_credits",
79 .data = ksocknal_tunables.ksnd_peercredits,
80 .maxlen = sizeof (int),
82 .proc_handler = &proc_dointvec
84 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
86 .procname = "nconnds",
87 .data = ksocknal_tunables.ksnd_nconnds,
88 .maxlen = sizeof (int),
90 .proc_handler = &proc_dointvec
92 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
94 .procname = "min_reconnectms",
95 .data = ksocknal_tunables.ksnd_min_reconnectms,
96 .maxlen = sizeof (int),
98 .proc_handler = &proc_dointvec
100 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
102 .procname = "max_reconnectms",
103 .data = ksocknal_tunables.ksnd_max_reconnectms,
104 .maxlen = sizeof (int),
106 .proc_handler = &proc_dointvec
108 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
110 .procname = "eager_ack",
111 .data = ksocknal_tunables.ksnd_eager_ack,
112 .maxlen = sizeof (int),
114 .proc_handler = &proc_dointvec
116 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
118 .procname = "zero_copy",
119 .data = ksocknal_tunables.ksnd_zc_min_frag,
120 .maxlen = sizeof (int),
122 .proc_handler = &proc_dointvec
124 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
127 .data = ksocknal_tunables.ksnd_typed_conns,
128 .maxlen = sizeof (int),
130 .proc_handler = &proc_dointvec
132 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
134 .procname = "min_bulk",
135 .data = ksocknal_tunables.ksnd_min_bulk,
136 .maxlen = sizeof (int),
138 .proc_handler = &proc_dointvec
140 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
142 .procname = "rx_buffer_size",
143 .data = ksocknal_tunables.ksnd_rx_buffer_size,
144 .maxlen = sizeof(int),
146 .proc_handler = &proc_dointvec
148 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
150 .procname = "tx_buffer_size",
151 .data = ksocknal_tunables.ksnd_tx_buffer_size,
152 .maxlen = sizeof(int),
154 .proc_handler = &proc_dointvec
156 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
159 .data = ksocknal_tunables.ksnd_nagle,
160 .maxlen = sizeof(int),
162 .proc_handler = &proc_dointvec
165 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
167 .procname = "irq_affinity",
168 .data = ksocknal_tunables.ksnd_irq_affinity,
169 .maxlen = sizeof(int),
171 .proc_handler = &proc_dointvec
174 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
176 .procname = "keepalive_idle",
177 .data = ksocknal_tunables.ksnd_keepalive_idle,
178 .maxlen = sizeof(int),
180 .proc_handler = &proc_dointvec
182 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
184 .procname = "keepalive_count",
185 .data = ksocknal_tunables.ksnd_keepalive_count,
186 .maxlen = sizeof(int),
188 .proc_handler = &proc_dointvec
190 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
192 .procname = "keepalive_intvl",
193 .data = ksocknal_tunables.ksnd_keepalive_intvl,
194 .maxlen = sizeof(int),
196 .proc_handler = &proc_dointvec
198 #ifdef SOCKNAL_BACKOFF
199 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
201 .procname = "backoff_init",
202 .data = ksocknal_tunables.ksnd_backoff_init,
203 .maxlen = sizeof(int),
205 .proc_handler = &proc_dointvec
207 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
209 .procname = "backoff_max",
210 .data = ksocknal_tunables.ksnd_backoff_max,
211 .maxlen = sizeof(int),
213 .proc_handler = &proc_dointvec
216 #if SOCKNAL_VERSION_DEBUG
217 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
219 .procname = "protocol",
220 .data = ksocknal_tunables.ksnd_protocol,
221 .maxlen = sizeof(int),
223 .proc_handler = &proc_dointvec
226 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) { 0 };
229 LASSERT (i <= sizeof(ksocknal_ctl_table)/sizeof(ksocknal_ctl_table[0]));
231 ksocknal_tunables.ksnd_sysctl =
232 cfs_register_sysctl_table(ksocknal_top_ctl_table, 0);
234 if (ksocknal_tunables.ksnd_sysctl == NULL)
235 CWARN("Can't setup /proc tunables\n");
241 ksocknal_lib_tunables_fini ()
243 if (ksocknal_tunables.ksnd_sysctl != NULL)
244 cfs_unregister_sysctl_table(ksocknal_tunables.ksnd_sysctl);
248 ksocknal_lib_tunables_init ()
254 ksocknal_lib_tunables_fini ()
257 #endif /* # if CONFIG_SYSCTL && !CFS_SYSFS_MODULE_PARM */
260 ksocknal_lib_bind_irq (unsigned int irq)
262 #if (defined(CONFIG_SMP) && defined(CPU_AFFINITY))
266 ksock_irqinfo_t *info;
267 char *argv[] = {"/bin/sh",
271 char *envp[] = {"HOME=/",
272 "PATH=/sbin:/bin:/usr/sbin:/usr/bin",
275 LASSERT (irq < NR_IRQS);
276 if (irq == 0) /* software NIC or affinity disabled */
279 info = &ksocknal_data.ksnd_irqinfo[irq];
281 write_lock_bh (&ksocknal_data.ksnd_global_lock);
283 LASSERT (info->ksni_valid);
284 bind = !info->ksni_bound;
285 info->ksni_bound = 1;
287 write_unlock_bh (&ksocknal_data.ksnd_global_lock);
289 if (!bind) /* bound already */
292 cpu = ksocknal_irqsched2cpu(info->ksni_sched);
293 snprintf (cmdline, sizeof (cmdline),
294 "echo %d > /proc/irq/%u/smp_affinity", 1 << cpu, irq);
296 LCONSOLE_INFO("Binding irq %u to CPU %d with cmd: %s\n",
299 /* FIXME: Find a better method of setting IRQ affinity...
302 USERMODEHELPER(argv[0], argv, envp);
307 ksocknal_lib_get_conn_addrs (ksock_conn_t *conn)
309 int rc = libcfs_sock_getaddr(conn->ksnc_sock, 1,
313 /* Didn't need the {get,put}connsock dance to deref ksnc_sock... */
314 LASSERT (!conn->ksnc_closing);
317 CERROR ("Error %d getting sock peer IP\n", rc);
321 rc = libcfs_sock_getaddr(conn->ksnc_sock, 0,
322 &conn->ksnc_myipaddr, NULL);
324 CERROR ("Error %d getting sock local IP\n", rc);
332 ksocknal_lib_sock_irq (struct socket *sock)
336 struct dst_entry *dst;
338 if (!*ksocknal_tunables.ksnd_irq_affinity)
341 dst = sk_dst_get (sock->sk);
343 if (dst->dev != NULL) {
345 if (irq >= NR_IRQS) {
346 CERROR ("Unexpected IRQ %x\n", irq);
358 ksocknal_lib_zc_capable(struct socket *sock)
360 int caps = sock->sk->sk_route_caps;
362 /* ZC if the socket supports scatter/gather and doesn't need software
364 return ((caps & NETIF_F_SG) != 0 &&
365 (caps & (NETIF_F_IP_CSUM | NETIF_F_NO_CSUM | NETIF_F_HW_CSUM)) != 0);
369 ksocknal_lib_send_iov (ksock_conn_t *conn, ksock_tx_t *tx)
371 struct socket *sock = conn->ksnc_sock;
375 if (*ksocknal_tunables.ksnd_enable_csum && /* checksum enabled */
376 conn->ksnc_proto == &ksocknal_protocol_v2x && /* V2.x connection */
377 tx->tx_nob == tx->tx_resid && /* frist sending */
378 tx->tx_msg.ksm_csum == 0) /* not checksummed */
379 ksocknal_lib_csum_tx(tx);
381 /* NB we can't trust socket ops to either consume our iovs
382 * or leave them alone. */
385 #if SOCKNAL_SINGLE_FRAG_TX
386 struct iovec scratch;
387 struct iovec *scratchiov = &scratch;
388 unsigned int niov = 1;
390 struct iovec *scratchiov = conn->ksnc_tx_scratch_iov;
391 unsigned int niov = tx->tx_niov;
393 struct msghdr msg = {
396 .msg_iov = scratchiov,
400 .msg_flags = MSG_DONTWAIT
402 mm_segment_t oldmm = get_fs();
405 for (nob = i = 0; i < niov; i++) {
406 scratchiov[i] = tx->tx_iov[i];
407 nob += scratchiov[i].iov_len;
410 if (!list_empty(&conn->ksnc_tx_queue) ||
412 msg.msg_flags |= MSG_MORE;
415 rc = sock_sendmsg(sock, &msg, nob);
422 ksocknal_lib_send_kiov (ksock_conn_t *conn, ksock_tx_t *tx)
424 struct socket *sock = conn->ksnc_sock;
425 lnet_kiov_t *kiov = tx->tx_kiov;
429 /* NB we can't trust socket ops to either consume our iovs
430 * or leave them alone. */
432 if (kiov->kiov_len >= *ksocknal_tunables.ksnd_zc_min_frag &&
433 tx->tx_msg.ksm_zc_req_cookie != 0) {
434 /* Zero copy is enabled */
435 struct sock *sk = sock->sk;
436 struct page *page = kiov->kiov_page;
437 int offset = kiov->kiov_offset;
438 int fragsize = kiov->kiov_len;
439 int msgflg = MSG_DONTWAIT;
441 CDEBUG(D_NET, "page %p + offset %x for %d\n",
442 page, offset, kiov->kiov_len);
444 if (!list_empty(&conn->ksnc_tx_queue) ||
445 fragsize < tx->tx_resid)
448 if (sk->sk_prot->sendpage != NULL) {
449 rc = sk->sk_prot->sendpage(sk, page,
450 offset, fragsize, msgflg);
452 rc = tcp_sendpage(sock, page, offset, fragsize, msgflg);
455 #if SOCKNAL_SINGLE_FRAG_TX || !SOCKNAL_RISK_KMAP_DEADLOCK
456 struct iovec scratch;
457 struct iovec *scratchiov = &scratch;
458 unsigned int niov = 1;
460 #ifdef CONFIG_HIGHMEM
461 #warning "XXX risk of kmap deadlock on multiple frags..."
463 struct iovec *scratchiov = conn->ksnc_tx_scratch_iov;
464 unsigned int niov = tx->tx_nkiov;
466 struct msghdr msg = {
469 .msg_iov = scratchiov,
473 .msg_flags = MSG_DONTWAIT
475 mm_segment_t oldmm = get_fs();
478 for (nob = i = 0; i < niov; i++) {
479 scratchiov[i].iov_base = kmap(kiov[i].kiov_page) +
481 nob += scratchiov[i].iov_len = kiov[i].kiov_len;
484 if (!list_empty(&conn->ksnc_tx_queue) ||
486 msg.msg_flags |= MSG_MORE;
489 rc = sock_sendmsg(sock, &msg, nob);
492 for (i = 0; i < niov; i++)
493 kunmap(kiov[i].kiov_page);
499 ksocknal_lib_eager_ack (ksock_conn_t *conn)
502 mm_segment_t oldmm = get_fs();
503 struct socket *sock = conn->ksnc_sock;
505 /* Remind the socket to ACK eagerly. If I don't, the socket might
506 * think I'm about to send something it could piggy-back the ACK
507 * on, introducing delay in completing zero-copy sends in my
511 sock->ops->setsockopt (sock, SOL_TCP, TCP_QUICKACK,
512 (char *)&opt, sizeof (opt));
517 ksocknal_lib_recv_iov (ksock_conn_t *conn)
519 #if SOCKNAL_SINGLE_FRAG_RX
520 struct iovec scratch;
521 struct iovec *scratchiov = &scratch;
522 unsigned int niov = 1;
524 struct iovec *scratchiov = conn->ksnc_rx_scratch_iov;
525 unsigned int niov = conn->ksnc_rx_niov;
527 struct iovec *iov = conn->ksnc_rx_iov;
528 struct msghdr msg = {
531 .msg_iov = scratchiov,
537 mm_segment_t oldmm = get_fs();
545 /* NB we can't trust socket ops to either consume our iovs
546 * or leave them alone. */
549 for (nob = i = 0; i < niov; i++) {
550 scratchiov[i] = iov[i];
551 nob += scratchiov[i].iov_len;
553 LASSERT (nob <= conn->ksnc_rx_nob_wanted);
556 rc = sock_recvmsg (conn->ksnc_sock, &msg, nob, MSG_DONTWAIT);
557 /* NB this is just a boolean..........................^ */
561 if (conn->ksnc_proto == &ksocknal_protocol_v2x) {
562 saved_csum = conn->ksnc_msg.ksm_csum;
563 conn->ksnc_msg.ksm_csum = 0;
566 if (saved_csum != 0) {
567 /* accumulate checksum */
568 for (i = 0, sum = rc; sum > 0; i++, sum -= fragnob) {
571 fragnob = iov[i].iov_len;
575 conn->ksnc_rx_csum = ksocknal_csum(conn->ksnc_rx_csum,
576 iov[i].iov_base, fragnob);
578 conn->ksnc_msg.ksm_csum = saved_csum;
585 ksocknal_lib_recv_kiov (ksock_conn_t *conn)
587 #if SOCKNAL_SINGLE_FRAG_RX || !SOCKNAL_RISK_KMAP_DEADLOCK
588 struct iovec scratch;
589 struct iovec *scratchiov = &scratch;
590 unsigned int niov = 1;
592 #ifdef CONFIG_HIGHMEM
593 #warning "XXX risk of kmap deadlock on multiple frags..."
595 struct iovec *scratchiov = conn->ksnc_rx_scratch_iov;
596 unsigned int niov = conn->ksnc_rx_nkiov;
598 lnet_kiov_t *kiov = conn->ksnc_rx_kiov;
599 struct msghdr msg = {
602 .msg_iov = scratchiov,
608 mm_segment_t oldmm = get_fs();
616 /* NB we can't trust socket ops to either consume our iovs
617 * or leave them alone. */
618 for (nob = i = 0; i < niov; i++) {
619 scratchiov[i].iov_base = kmap(kiov[i].kiov_page) + kiov[i].kiov_offset;
620 nob += scratchiov[i].iov_len = kiov[i].kiov_len;
622 LASSERT (nob <= conn->ksnc_rx_nob_wanted);
625 rc = sock_recvmsg (conn->ksnc_sock, &msg, nob, MSG_DONTWAIT);
626 /* NB this is just a boolean.......................^ */
629 if (conn->ksnc_msg.ksm_csum != 0) {
630 for (i = 0, sum = rc; sum > 0; i++, sum -= fragnob) {
633 /* Dang! have to kmap again because I have nowhere to stash the
634 * mapped address. But by doing it while the page is still
635 * mapped, the kernel just bumps the map count and returns me
636 * the address it stashed. */
637 base = kmap(kiov[i].kiov_page) + kiov[i].kiov_offset;
638 fragnob = kiov[i].kiov_len;
642 conn->ksnc_rx_csum = ksocknal_csum(conn->ksnc_rx_csum,
645 kunmap(kiov[i].kiov_page);
648 for (i = 0; i < niov; i++)
649 kunmap(kiov[i].kiov_page);
655 ksocknal_lib_csum_tx(ksock_tx_t *tx)
661 LASSERT(tx->tx_iov[0].iov_base == (void *)&tx->tx_msg);
662 LASSERT(tx->tx_conn != NULL);
663 LASSERT(tx->tx_conn->ksnc_proto == &ksocknal_protocol_v2x);
665 tx->tx_msg.ksm_csum = 0;
667 csum = ksocknal_csum(~0, (void *)tx->tx_iov[0].iov_base,
668 tx->tx_iov[0].iov_len);
670 if (tx->tx_kiov != NULL) {
671 for (i = 0; i < tx->tx_nkiov; i++) {
672 base = kmap(tx->tx_kiov[i].kiov_page) +
673 tx->tx_kiov[i].kiov_offset;
675 csum = ksocknal_csum(csum, base, tx->tx_kiov[i].kiov_len);
677 kunmap(tx->tx_kiov[i].kiov_page);
680 for (i = 1; i < tx->tx_niov; i++)
681 csum = ksocknal_csum(csum, tx->tx_iov[i].iov_base,
682 tx->tx_iov[i].iov_len);
685 if (*ksocknal_tunables.ksnd_inject_csum_error) {
687 *ksocknal_tunables.ksnd_inject_csum_error = 0;
690 tx->tx_msg.ksm_csum = csum;
694 ksocknal_lib_get_conn_tunables (ksock_conn_t *conn, int *txmem, int *rxmem, int *nagle)
696 mm_segment_t oldmm = get_fs ();
697 struct socket *sock = conn->ksnc_sock;
701 rc = ksocknal_connsock_addref(conn);
703 LASSERT (conn->ksnc_closing);
704 *txmem = *rxmem = *nagle = 0;
708 rc = libcfs_sock_getbuf(sock, txmem, rxmem);
710 len = sizeof(*nagle);
712 rc = sock->ops->getsockopt(sock, SOL_TCP, TCP_NODELAY,
713 (char *)nagle, &len);
717 ksocknal_connsock_decref(conn);
722 *txmem = *rxmem = *nagle = 0;
728 ksocknal_lib_setup_sock (struct socket *sock)
730 mm_segment_t oldmm = get_fs ();
737 struct linger linger;
739 sock->sk->sk_allocation = GFP_NOFS;
741 /* Ensure this socket aborts active sends immediately when we close
748 rc = sock_setsockopt (sock, SOL_SOCKET, SO_LINGER,
749 (char *)&linger, sizeof (linger));
752 CERROR ("Can't set SO_LINGER: %d\n", rc);
758 rc = sock->ops->setsockopt (sock, SOL_TCP, TCP_LINGER2,
759 (char *)&option, sizeof (option));
762 CERROR ("Can't set SO_LINGER2: %d\n", rc);
766 if (!*ksocknal_tunables.ksnd_nagle) {
770 rc = sock->ops->setsockopt (sock, SOL_TCP, TCP_NODELAY,
771 (char *)&option, sizeof (option));
774 CERROR ("Can't disable nagle: %d\n", rc);
779 rc = libcfs_sock_setbuf(sock,
780 *ksocknal_tunables.ksnd_tx_buffer_size,
781 *ksocknal_tunables.ksnd_rx_buffer_size);
783 CERROR ("Can't set buffer tx %d, rx %d buffers: %d\n",
784 *ksocknal_tunables.ksnd_tx_buffer_size,
785 *ksocknal_tunables.ksnd_rx_buffer_size, rc);
789 /* TCP_BACKOFF_* sockopt tunables unsupported in stock kernels */
790 #ifdef SOCKNAL_BACKOFF
791 if (*ksocknal_tunables.ksnd_backoff_init > 0) {
792 option = *ksocknal_tunables.ksnd_backoff_init;
793 #ifdef SOCKNAL_BACKOFF_MS
798 rc = sock->ops->setsockopt (sock, SOL_TCP, TCP_BACKOFF_INIT,
799 (char *)&option, sizeof (option));
802 CERROR ("Can't set initial tcp backoff %d: %d\n",
808 if (*ksocknal_tunables.ksnd_backoff_max > 0) {
809 option = *ksocknal_tunables.ksnd_backoff_max;
810 #ifdef SOCKNAL_BACKOFF_MS
815 rc = sock->ops->setsockopt (sock, SOL_TCP, TCP_BACKOFF_MAX,
816 (char *)&option, sizeof (option));
819 CERROR ("Can't set maximum tcp backoff %d: %d\n",
826 /* snapshot tunables */
827 keep_idle = *ksocknal_tunables.ksnd_keepalive_idle;
828 keep_count = *ksocknal_tunables.ksnd_keepalive_count;
829 keep_intvl = *ksocknal_tunables.ksnd_keepalive_intvl;
831 do_keepalive = (keep_idle > 0 && keep_count > 0 && keep_intvl > 0);
833 option = (do_keepalive ? 1 : 0);
835 rc = sock_setsockopt (sock, SOL_SOCKET, SO_KEEPALIVE,
836 (char *)&option, sizeof (option));
839 CERROR ("Can't set SO_KEEPALIVE: %d\n", rc);
847 rc = sock->ops->setsockopt (sock, SOL_TCP, TCP_KEEPIDLE,
848 (char *)&keep_idle, sizeof (keep_idle));
851 CERROR ("Can't set TCP_KEEPIDLE: %d\n", rc);
856 rc = sock->ops->setsockopt (sock, SOL_TCP, TCP_KEEPINTVL,
857 (char *)&keep_intvl, sizeof (keep_intvl));
860 CERROR ("Can't set TCP_KEEPINTVL: %d\n", rc);
865 rc = sock->ops->setsockopt (sock, SOL_TCP, TCP_KEEPCNT,
866 (char *)&keep_count, sizeof (keep_count));
869 CERROR ("Can't set TCP_KEEPCNT: %d\n", rc);
876 #if (LINUX_VERSION_CODE < KERNEL_VERSION(2,5,0))
877 struct tcp_opt *sock2tcp_opt(struct sock *sk)
879 return &(sk->tp_pinfo.af_tcp);
881 #elif (LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,10))
882 #define sock2tcp_opt(sk) tcp_sk(sk)
884 struct tcp_opt *sock2tcp_opt(struct sock *sk)
886 struct tcp_sock *s = (struct tcp_sock *)sk;
892 ksocknal_lib_push_conn (ksock_conn_t *conn)
895 #if (LINUX_VERSION_CODE < KERNEL_VERSION(2,6,11))
905 rc = ksocknal_connsock_addref(conn);
906 if (rc != 0) /* being shut down */
909 sk = conn->ksnc_sock->sk;
910 tp = sock2tcp_opt(sk);
913 nonagle = tp->nonagle;
920 rc = sk->sk_prot->setsockopt (sk, SOL_TCP, TCP_NODELAY,
921 (char *)&val, sizeof (val));
927 tp->nonagle = nonagle;
930 ksocknal_connsock_decref(conn);
933 extern void ksocknal_read_callback (ksock_conn_t *conn);
934 extern void ksocknal_write_callback (ksock_conn_t *conn);
936 * socket call back in Linux
939 ksocknal_data_ready (struct sock *sk, int n)
944 /* interleave correctly with closing sockets... */
946 read_lock (&ksocknal_data.ksnd_global_lock);
948 conn = sk->sk_user_data;
949 if (conn == NULL) { /* raced with ksocknal_terminate_conn */
950 LASSERT (sk->sk_data_ready != &ksocknal_data_ready);
951 sk->sk_data_ready (sk, n);
953 ksocknal_read_callback(conn);
955 read_unlock (&ksocknal_data.ksnd_global_lock);
961 ksocknal_write_space (struct sock *sk)
967 /* interleave correctly with closing sockets... */
969 read_lock (&ksocknal_data.ksnd_global_lock);
971 conn = sk->sk_user_data;
972 wspace = SOCKNAL_WSPACE(sk);
973 min_wpace = SOCKNAL_MIN_WSPACE(sk);
975 CDEBUG(D_NET, "sk %p wspace %d low water %d conn %p%s%s%s\n",
976 sk, wspace, min_wpace, conn,
977 (conn == NULL) ? "" : (conn->ksnc_tx_ready ?
978 " ready" : " blocked"),
979 (conn == NULL) ? "" : (conn->ksnc_tx_scheduled ?
980 " scheduled" : " idle"),
981 (conn == NULL) ? "" : (list_empty (&conn->ksnc_tx_queue) ?
982 " empty" : " queued"));
984 if (conn == NULL) { /* raced with ksocknal_terminate_conn */
985 LASSERT (sk->sk_write_space != &ksocknal_write_space);
986 sk->sk_write_space (sk);
988 read_unlock (&ksocknal_data.ksnd_global_lock);
992 if (wspace >= min_wpace) { /* got enough space */
993 ksocknal_write_callback(conn);
995 /* Clear SOCK_NOSPACE _after_ ksocknal_write_callback so the
996 * ENOMEM check in ksocknal_transmit is race-free (think about
999 clear_bit (SOCK_NOSPACE, &sk->sk_socket->flags);
1002 read_unlock (&ksocknal_data.ksnd_global_lock);
1006 ksocknal_lib_save_callback(struct socket *sock, ksock_conn_t *conn)
1008 conn->ksnc_saved_data_ready = sock->sk->sk_data_ready;
1009 conn->ksnc_saved_write_space = sock->sk->sk_write_space;
1013 ksocknal_lib_set_callback(struct socket *sock, ksock_conn_t *conn)
1015 sock->sk->sk_user_data = conn;
1016 sock->sk->sk_data_ready = ksocknal_data_ready;
1017 sock->sk->sk_write_space = ksocknal_write_space;
1022 ksocknal_lib_reset_callback(struct socket *sock, ksock_conn_t *conn)
1024 /* Remove conn's network callbacks.
1025 * NB I _have_ to restore the callback, rather than storing a noop,
1026 * since the socket could survive past this module being unloaded!! */
1027 sock->sk->sk_data_ready = conn->ksnc_saved_data_ready;
1028 sock->sk->sk_write_space = conn->ksnc_saved_write_space;
1030 /* A callback could be in progress already; they hold a read lock
1031 * on ksnd_global_lock (to serialise with me) and NOOP if
1032 * sk_user_data is NULL. */
1033 sock->sk->sk_user_data = NULL;