1 /* -*- mode: c; c-basic-offset: 8; indent-tabs-mode: nil; -*-
2 * vim:expandtab:shiftwidth=8:tabstop=8:
7 # if defined(CONFIG_SYSCTL) && !CFS_SYSFS_MODULE_PARM
8 static cfs_sysctl_table_t ksocknal_ctl_table[21];
10 cfs_sysctl_table_t ksocknal_top_ctl_table[] = {
13 .procname = "socknal",
17 .child = ksocknal_ctl_table
23 ksocknal_lib_tunables_init ()
28 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
30 .procname = "timeout",
31 .data = ksocknal_tunables.ksnd_timeout,
32 .maxlen = sizeof (int),
34 .proc_handler = &proc_dointvec
36 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
38 .procname = "credits",
39 .data = ksocknal_tunables.ksnd_credits,
40 .maxlen = sizeof (int),
42 .proc_handler = &proc_dointvec
44 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
46 .procname = "peer_credits",
47 .data = ksocknal_tunables.ksnd_peercredits,
48 .maxlen = sizeof (int),
50 .proc_handler = &proc_dointvec
52 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
54 .procname = "nconnds",
55 .data = ksocknal_tunables.ksnd_nconnds,
56 .maxlen = sizeof (int),
58 .proc_handler = &proc_dointvec
60 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
62 .procname = "min_reconnectms",
63 .data = ksocknal_tunables.ksnd_min_reconnectms,
64 .maxlen = sizeof (int),
66 .proc_handler = &proc_dointvec
68 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
70 .procname = "max_reconnectms",
71 .data = ksocknal_tunables.ksnd_max_reconnectms,
72 .maxlen = sizeof (int),
74 .proc_handler = &proc_dointvec
76 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
78 .procname = "eager_ack",
79 .data = ksocknal_tunables.ksnd_eager_ack,
80 .maxlen = sizeof (int),
82 .proc_handler = &proc_dointvec
84 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
86 .procname = "zero_copy",
87 .data = ksocknal_tunables.ksnd_zc_min_frag,
88 .maxlen = sizeof (int),
90 .proc_handler = &proc_dointvec
92 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
95 .data = ksocknal_tunables.ksnd_typed_conns,
96 .maxlen = sizeof (int),
98 .proc_handler = &proc_dointvec
100 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
102 .procname = "min_bulk",
103 .data = ksocknal_tunables.ksnd_min_bulk,
104 .maxlen = sizeof (int),
106 .proc_handler = &proc_dointvec
108 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
110 .procname = "rx_buffer_size",
111 .data = ksocknal_tunables.ksnd_rx_buffer_size,
112 .maxlen = sizeof(int),
114 .proc_handler = &proc_dointvec
116 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
118 .procname = "tx_buffer_size",
119 .data = ksocknal_tunables.ksnd_tx_buffer_size,
120 .maxlen = sizeof(int),
122 .proc_handler = &proc_dointvec
124 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
127 .data = ksocknal_tunables.ksnd_nagle,
128 .maxlen = sizeof(int),
130 .proc_handler = &proc_dointvec
133 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
135 .procname = "irq_affinity",
136 .data = ksocknal_tunables.ksnd_irq_affinity,
137 .maxlen = sizeof(int),
139 .proc_handler = &proc_dointvec
142 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
144 .procname = "keepalive_idle",
145 .data = ksocknal_tunables.ksnd_keepalive_idle,
146 .maxlen = sizeof(int),
148 .proc_handler = &proc_dointvec
150 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
152 .procname = "keepalive_count",
153 .data = ksocknal_tunables.ksnd_keepalive_count,
154 .maxlen = sizeof(int),
156 .proc_handler = &proc_dointvec
158 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
160 .procname = "keepalive_intvl",
161 .data = ksocknal_tunables.ksnd_keepalive_intvl,
162 .maxlen = sizeof(int),
164 .proc_handler = &proc_dointvec
166 #ifdef SOCKNAL_BACKOFF
167 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
169 .procname = "backoff_init",
170 .data = ksocknal_tunables.ksnd_backoff_init,
171 .maxlen = sizeof(int),
173 .proc_handler = &proc_dointvec
175 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
177 .procname = "backoff_max",
178 .data = ksocknal_tunables.ksnd_backoff_max,
179 .maxlen = sizeof(int),
181 .proc_handler = &proc_dointvec
184 #if SOCKNAL_VERSION_DEBUG
185 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) {
187 .procname = "protocol",
188 .data = ksocknal_tunables.ksnd_protocol,
189 .maxlen = sizeof(int),
191 .proc_handler = &proc_dointvec
194 ksocknal_ctl_table[i++] = (cfs_sysctl_table_t) { 0 };
197 LASSERT (i <= sizeof(ksocknal_ctl_table)/sizeof(ksocknal_ctl_table[0]));
199 ksocknal_tunables.ksnd_sysctl =
200 cfs_register_sysctl_table(ksocknal_top_ctl_table, 0);
202 if (ksocknal_tunables.ksnd_sysctl == NULL)
203 CWARN("Can't setup /proc tunables\n");
209 ksocknal_lib_tunables_fini ()
211 if (ksocknal_tunables.ksnd_sysctl != NULL)
212 cfs_unregister_sysctl_table(ksocknal_tunables.ksnd_sysctl);
216 ksocknal_lib_tunables_init ()
222 ksocknal_lib_tunables_fini ()
225 #endif /* # if CONFIG_SYSCTL && !CFS_SYSFS_MODULE_PARM */
228 ksocknal_lib_bind_irq (unsigned int irq)
230 #if (defined(CONFIG_SMP) && defined(CPU_AFFINITY))
234 ksock_irqinfo_t *info;
235 char *argv[] = {"/bin/sh",
239 char *envp[] = {"HOME=/",
240 "PATH=/sbin:/bin:/usr/sbin:/usr/bin",
243 LASSERT (irq < NR_IRQS);
244 if (irq == 0) /* software NIC or affinity disabled */
247 info = &ksocknal_data.ksnd_irqinfo[irq];
249 write_lock_bh (&ksocknal_data.ksnd_global_lock);
251 LASSERT (info->ksni_valid);
252 bind = !info->ksni_bound;
253 info->ksni_bound = 1;
255 write_unlock_bh (&ksocknal_data.ksnd_global_lock);
257 if (!bind) /* bound already */
260 cpu = ksocknal_irqsched2cpu(info->ksni_sched);
261 snprintf (cmdline, sizeof (cmdline),
262 "echo %d > /proc/irq/%u/smp_affinity", 1 << cpu, irq);
264 LCONSOLE_INFO("Binding irq %u to CPU %d with cmd: %s\n",
267 /* FIXME: Find a better method of setting IRQ affinity...
270 USERMODEHELPER(argv[0], argv, envp);
275 ksocknal_lib_get_conn_addrs (ksock_conn_t *conn)
277 int rc = libcfs_sock_getaddr(conn->ksnc_sock, 1,
281 /* Didn't need the {get,put}connsock dance to deref ksnc_sock... */
282 LASSERT (!conn->ksnc_closing);
285 CERROR ("Error %d getting sock peer IP\n", rc);
289 rc = libcfs_sock_getaddr(conn->ksnc_sock, 0,
290 &conn->ksnc_myipaddr, NULL);
292 CERROR ("Error %d getting sock local IP\n", rc);
300 ksocknal_lib_sock_irq (struct socket *sock)
304 struct dst_entry *dst;
306 if (!*ksocknal_tunables.ksnd_irq_affinity)
309 dst = sk_dst_get (sock->sk);
311 if (dst->dev != NULL) {
313 if (irq >= NR_IRQS) {
314 CERROR ("Unexpected IRQ %x\n", irq);
326 ksocknal_lib_zc_capable(struct socket *sock)
328 int caps = sock->sk->sk_route_caps;
330 /* ZC if the socket supports scatter/gather and doesn't need software
332 return ((caps & NETIF_F_SG) != 0 &&
333 (caps & (NETIF_F_IP_CSUM | NETIF_F_NO_CSUM | NETIF_F_HW_CSUM)) != 0);
337 ksocknal_lib_send_iov (ksock_conn_t *conn, ksock_tx_t *tx)
339 struct socket *sock = conn->ksnc_sock;
343 if (*ksocknal_tunables.ksnd_enable_csum && /* checksum enabled */
344 conn->ksnc_proto == &ksocknal_protocol_v2x && /* V2.x connection */
345 tx->tx_nob == tx->tx_resid && /* frist sending */
346 tx->tx_msg.ksm_csum == 0) /* not checksummed */
347 ksocknal_lib_csum_tx(tx);
349 /* NB we can't trust socket ops to either consume our iovs
350 * or leave them alone. */
353 #if SOCKNAL_SINGLE_FRAG_TX
354 struct iovec scratch;
355 struct iovec *scratchiov = &scratch;
356 unsigned int niov = 1;
358 struct iovec *scratchiov = conn->ksnc_tx_scratch_iov;
359 unsigned int niov = tx->tx_niov;
361 struct msghdr msg = {
364 .msg_iov = scratchiov,
368 .msg_flags = MSG_DONTWAIT
370 mm_segment_t oldmm = get_fs();
373 for (nob = i = 0; i < niov; i++) {
374 scratchiov[i] = tx->tx_iov[i];
375 nob += scratchiov[i].iov_len;
378 if (!list_empty(&conn->ksnc_tx_queue) ||
380 msg.msg_flags |= MSG_MORE;
383 rc = sock_sendmsg(sock, &msg, nob);
390 ksocknal_lib_send_kiov (ksock_conn_t *conn, ksock_tx_t *tx)
392 struct socket *sock = conn->ksnc_sock;
393 lnet_kiov_t *kiov = tx->tx_kiov;
397 /* NB we can't trust socket ops to either consume our iovs
398 * or leave them alone. */
400 if (kiov->kiov_len >= *ksocknal_tunables.ksnd_zc_min_frag &&
401 tx->tx_msg.ksm_zc_req_cookie != 0) {
402 /* Zero copy is enabled */
403 struct sock *sk = sock->sk;
404 struct page *page = kiov->kiov_page;
405 int offset = kiov->kiov_offset;
406 int fragsize = kiov->kiov_len;
407 int msgflg = MSG_DONTWAIT;
409 CDEBUG(D_NET, "page %p + offset %x for %d\n",
410 page, offset, kiov->kiov_len);
412 if (!list_empty(&conn->ksnc_tx_queue) ||
413 fragsize < tx->tx_resid)
416 if (sk->sk_prot->sendpage != NULL) {
417 rc = sk->sk_prot->sendpage(sk, page,
418 offset, fragsize, msgflg);
420 rc = tcp_sendpage(sock, page, offset, fragsize, msgflg);
423 #if SOCKNAL_SINGLE_FRAG_TX || !SOCKNAL_RISK_KMAP_DEADLOCK
424 struct iovec scratch;
425 struct iovec *scratchiov = &scratch;
426 unsigned int niov = 1;
428 #ifdef CONFIG_HIGHMEM
429 #warning "XXX risk of kmap deadlock on multiple frags..."
431 struct iovec *scratchiov = conn->ksnc_tx_scratch_iov;
432 unsigned int niov = tx->tx_nkiov;
434 struct msghdr msg = {
437 .msg_iov = scratchiov,
441 .msg_flags = MSG_DONTWAIT
443 mm_segment_t oldmm = get_fs();
446 for (nob = i = 0; i < niov; i++) {
447 scratchiov[i].iov_base = kmap(kiov[i].kiov_page) +
449 nob += scratchiov[i].iov_len = kiov[i].kiov_len;
452 if (!list_empty(&conn->ksnc_tx_queue) ||
454 msg.msg_flags |= MSG_MORE;
457 rc = sock_sendmsg(sock, &msg, nob);
460 for (i = 0; i < niov; i++)
461 kunmap(kiov[i].kiov_page);
467 ksocknal_lib_eager_ack (ksock_conn_t *conn)
470 mm_segment_t oldmm = get_fs();
471 struct socket *sock = conn->ksnc_sock;
473 /* Remind the socket to ACK eagerly. If I don't, the socket might
474 * think I'm about to send something it could piggy-back the ACK
475 * on, introducing delay in completing zero-copy sends in my
479 sock->ops->setsockopt (sock, SOL_TCP, TCP_QUICKACK,
480 (char *)&opt, sizeof (opt));
485 ksocknal_lib_recv_iov (ksock_conn_t *conn)
487 #if SOCKNAL_SINGLE_FRAG_RX
488 struct iovec scratch;
489 struct iovec *scratchiov = &scratch;
490 unsigned int niov = 1;
492 struct iovec *scratchiov = conn->ksnc_rx_scratch_iov;
493 unsigned int niov = conn->ksnc_rx_niov;
495 struct iovec *iov = conn->ksnc_rx_iov;
496 struct msghdr msg = {
499 .msg_iov = scratchiov,
505 mm_segment_t oldmm = get_fs();
513 /* NB we can't trust socket ops to either consume our iovs
514 * or leave them alone. */
517 for (nob = i = 0; i < niov; i++) {
518 scratchiov[i] = iov[i];
519 nob += scratchiov[i].iov_len;
521 LASSERT (nob <= conn->ksnc_rx_nob_wanted);
524 rc = sock_recvmsg (conn->ksnc_sock, &msg, nob, MSG_DONTWAIT);
525 /* NB this is just a boolean..........................^ */
529 if (conn->ksnc_proto == &ksocknal_protocol_v2x) {
530 saved_csum = conn->ksnc_msg.ksm_csum;
531 conn->ksnc_msg.ksm_csum = 0;
534 if (saved_csum != 0) {
535 /* accumulate checksum */
536 for (i = 0, sum = rc; sum > 0; i++, sum -= fragnob) {
539 fragnob = iov[i].iov_len;
543 conn->ksnc_rx_csum = ksocknal_csum(conn->ksnc_rx_csum,
544 iov[i].iov_base, fragnob);
546 conn->ksnc_msg.ksm_csum = saved_csum;
553 ksocknal_lib_recv_kiov (ksock_conn_t *conn)
555 #if SOCKNAL_SINGLE_FRAG_RX || !SOCKNAL_RISK_KMAP_DEADLOCK
556 struct iovec scratch;
557 struct iovec *scratchiov = &scratch;
558 unsigned int niov = 1;
560 #ifdef CONFIG_HIGHMEM
561 #warning "XXX risk of kmap deadlock on multiple frags..."
563 struct iovec *scratchiov = conn->ksnc_rx_scratch_iov;
564 unsigned int niov = conn->ksnc_rx_nkiov;
566 lnet_kiov_t *kiov = conn->ksnc_rx_kiov;
567 struct msghdr msg = {
570 .msg_iov = scratchiov,
576 mm_segment_t oldmm = get_fs();
584 /* NB we can't trust socket ops to either consume our iovs
585 * or leave them alone. */
586 for (nob = i = 0; i < niov; i++) {
587 scratchiov[i].iov_base = kmap(kiov[i].kiov_page) + kiov[i].kiov_offset;
588 nob += scratchiov[i].iov_len = kiov[i].kiov_len;
590 LASSERT (nob <= conn->ksnc_rx_nob_wanted);
593 rc = sock_recvmsg (conn->ksnc_sock, &msg, nob, MSG_DONTWAIT);
594 /* NB this is just a boolean.......................^ */
597 if (conn->ksnc_msg.ksm_csum != 0) {
598 for (i = 0, sum = rc; sum > 0; i++, sum -= fragnob) {
601 /* Dang! have to kmap again because I have nowhere to stash the
602 * mapped address. But by doing it while the page is still
603 * mapped, the kernel just bumps the map count and returns me
604 * the address it stashed. */
605 base = kmap(kiov[i].kiov_page) + kiov[i].kiov_offset;
606 fragnob = kiov[i].kiov_len;
610 conn->ksnc_rx_csum = ksocknal_csum(conn->ksnc_rx_csum,
613 kunmap(kiov[i].kiov_page);
616 for (i = 0; i < niov; i++)
617 kunmap(kiov[i].kiov_page);
623 ksocknal_lib_csum_tx(ksock_tx_t *tx)
629 LASSERT(tx->tx_iov[0].iov_base == (void *)&tx->tx_msg);
630 LASSERT(tx->tx_conn != NULL);
631 LASSERT(tx->tx_conn->ksnc_proto == &ksocknal_protocol_v2x);
633 tx->tx_msg.ksm_csum = 0;
635 csum = ksocknal_csum(~0, (void *)tx->tx_iov[0].iov_base,
636 tx->tx_iov[0].iov_len);
638 if (tx->tx_kiov != NULL) {
639 for (i = 0; i < tx->tx_nkiov; i++) {
640 base = kmap(tx->tx_kiov[i].kiov_page) +
641 tx->tx_kiov[i].kiov_offset;
643 csum = ksocknal_csum(csum, base, tx->tx_kiov[i].kiov_len);
645 kunmap(tx->tx_kiov[i].kiov_page);
648 for (i = 1; i < tx->tx_niov; i++)
649 csum = ksocknal_csum(csum, tx->tx_iov[i].iov_base,
650 tx->tx_iov[i].iov_len);
653 if (*ksocknal_tunables.ksnd_inject_csum_error) {
655 *ksocknal_tunables.ksnd_inject_csum_error = 0;
658 tx->tx_msg.ksm_csum = csum;
662 ksocknal_lib_get_conn_tunables (ksock_conn_t *conn, int *txmem, int *rxmem, int *nagle)
664 mm_segment_t oldmm = get_fs ();
665 struct socket *sock = conn->ksnc_sock;
669 rc = ksocknal_connsock_addref(conn);
671 LASSERT (conn->ksnc_closing);
672 *txmem = *rxmem = *nagle = 0;
676 rc = libcfs_sock_getbuf(sock, txmem, rxmem);
678 len = sizeof(*nagle);
680 rc = sock->ops->getsockopt(sock, SOL_TCP, TCP_NODELAY,
681 (char *)nagle, &len);
685 ksocknal_connsock_decref(conn);
690 *txmem = *rxmem = *nagle = 0;
696 ksocknal_lib_setup_sock (struct socket *sock)
698 mm_segment_t oldmm = get_fs ();
705 struct linger linger;
707 sock->sk->sk_allocation = GFP_NOFS;
709 /* Ensure this socket aborts active sends immediately when we close
716 rc = sock_setsockopt (sock, SOL_SOCKET, SO_LINGER,
717 (char *)&linger, sizeof (linger));
720 CERROR ("Can't set SO_LINGER: %d\n", rc);
726 rc = sock->ops->setsockopt (sock, SOL_TCP, TCP_LINGER2,
727 (char *)&option, sizeof (option));
730 CERROR ("Can't set SO_LINGER2: %d\n", rc);
734 if (!*ksocknal_tunables.ksnd_nagle) {
738 rc = sock->ops->setsockopt (sock, SOL_TCP, TCP_NODELAY,
739 (char *)&option, sizeof (option));
742 CERROR ("Can't disable nagle: %d\n", rc);
747 rc = libcfs_sock_setbuf(sock,
748 *ksocknal_tunables.ksnd_tx_buffer_size,
749 *ksocknal_tunables.ksnd_rx_buffer_size);
751 CERROR ("Can't set buffer tx %d, rx %d buffers: %d\n",
752 *ksocknal_tunables.ksnd_tx_buffer_size,
753 *ksocknal_tunables.ksnd_rx_buffer_size, rc);
757 /* TCP_BACKOFF_* sockopt tunables unsupported in stock kernels */
758 #ifdef SOCKNAL_BACKOFF
759 if (*ksocknal_tunables.ksnd_backoff_init > 0) {
760 option = *ksocknal_tunables.ksnd_backoff_init;
763 rc = sock->ops->setsockopt (sock, SOL_TCP, TCP_BACKOFF_INIT,
764 (char *)&option, sizeof (option));
767 CERROR ("Can't set initial tcp backoff %d: %d\n",
773 if (*ksocknal_tunables.ksnd_backoff_max > 0) {
774 option = *ksocknal_tunables.ksnd_backoff_max;
777 rc = sock->ops->setsockopt (sock, SOL_TCP, TCP_BACKOFF_MAX,
778 (char *)&option, sizeof (option));
781 CERROR ("Can't set maximum tcp backoff %d: %d\n",
788 /* snapshot tunables */
789 keep_idle = *ksocknal_tunables.ksnd_keepalive_idle;
790 keep_count = *ksocknal_tunables.ksnd_keepalive_count;
791 keep_intvl = *ksocknal_tunables.ksnd_keepalive_intvl;
793 do_keepalive = (keep_idle > 0 && keep_count > 0 && keep_intvl > 0);
795 option = (do_keepalive ? 1 : 0);
797 rc = sock_setsockopt (sock, SOL_SOCKET, SO_KEEPALIVE,
798 (char *)&option, sizeof (option));
801 CERROR ("Can't set SO_KEEPALIVE: %d\n", rc);
809 rc = sock->ops->setsockopt (sock, SOL_TCP, TCP_KEEPIDLE,
810 (char *)&keep_idle, sizeof (keep_idle));
813 CERROR ("Can't set TCP_KEEPIDLE: %d\n", rc);
818 rc = sock->ops->setsockopt (sock, SOL_TCP, TCP_KEEPINTVL,
819 (char *)&keep_intvl, sizeof (keep_intvl));
822 CERROR ("Can't set TCP_KEEPINTVL: %d\n", rc);
827 rc = sock->ops->setsockopt (sock, SOL_TCP, TCP_KEEPCNT,
828 (char *)&keep_count, sizeof (keep_count));
831 CERROR ("Can't set TCP_KEEPCNT: %d\n", rc);
838 #if (LINUX_VERSION_CODE < KERNEL_VERSION(2,5,0))
839 struct tcp_opt *sock2tcp_opt(struct sock *sk)
841 return &(sk->tp_pinfo.af_tcp);
843 #elif (LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,10))
844 #define sock2tcp_opt(sk) tcp_sk(sk)
846 struct tcp_opt *sock2tcp_opt(struct sock *sk)
848 struct tcp_sock *s = (struct tcp_sock *)sk;
854 ksocknal_lib_push_conn (ksock_conn_t *conn)
857 #if (LINUX_VERSION_CODE < KERNEL_VERSION(2,6,11))
867 rc = ksocknal_connsock_addref(conn);
868 if (rc != 0) /* being shut down */
871 sk = conn->ksnc_sock->sk;
872 tp = sock2tcp_opt(sk);
875 nonagle = tp->nonagle;
882 rc = sk->sk_prot->setsockopt (sk, SOL_TCP, TCP_NODELAY,
883 (char *)&val, sizeof (val));
889 tp->nonagle = nonagle;
892 ksocknal_connsock_decref(conn);
895 extern void ksocknal_read_callback (ksock_conn_t *conn);
896 extern void ksocknal_write_callback (ksock_conn_t *conn);
898 * socket call back in Linux
901 ksocknal_data_ready (struct sock *sk, int n)
906 /* interleave correctly with closing sockets... */
908 read_lock (&ksocknal_data.ksnd_global_lock);
910 conn = sk->sk_user_data;
911 if (conn == NULL) { /* raced with ksocknal_terminate_conn */
912 LASSERT (sk->sk_data_ready != &ksocknal_data_ready);
913 sk->sk_data_ready (sk, n);
915 ksocknal_read_callback(conn);
917 read_unlock (&ksocknal_data.ksnd_global_lock);
923 ksocknal_write_space (struct sock *sk)
929 /* interleave correctly with closing sockets... */
931 read_lock (&ksocknal_data.ksnd_global_lock);
933 conn = sk->sk_user_data;
934 wspace = SOCKNAL_WSPACE(sk);
935 min_wpace = SOCKNAL_MIN_WSPACE(sk);
937 CDEBUG(D_NET, "sk %p wspace %d low water %d conn %p%s%s%s\n",
938 sk, wspace, min_wpace, conn,
939 (conn == NULL) ? "" : (conn->ksnc_tx_ready ?
940 " ready" : " blocked"),
941 (conn == NULL) ? "" : (conn->ksnc_tx_scheduled ?
942 " scheduled" : " idle"),
943 (conn == NULL) ? "" : (list_empty (&conn->ksnc_tx_queue) ?
944 " empty" : " queued"));
946 if (conn == NULL) { /* raced with ksocknal_terminate_conn */
947 LASSERT (sk->sk_write_space != &ksocknal_write_space);
948 sk->sk_write_space (sk);
950 read_unlock (&ksocknal_data.ksnd_global_lock);
954 if (wspace >= min_wpace) { /* got enough space */
955 ksocknal_write_callback(conn);
957 /* Clear SOCK_NOSPACE _after_ ksocknal_write_callback so the
958 * ENOMEM check in ksocknal_transmit is race-free (think about
961 clear_bit (SOCK_NOSPACE, &sk->sk_socket->flags);
964 read_unlock (&ksocknal_data.ksnd_global_lock);
968 ksocknal_lib_save_callback(struct socket *sock, ksock_conn_t *conn)
970 conn->ksnc_saved_data_ready = sock->sk->sk_data_ready;
971 conn->ksnc_saved_write_space = sock->sk->sk_write_space;
975 ksocknal_lib_set_callback(struct socket *sock, ksock_conn_t *conn)
977 sock->sk->sk_user_data = conn;
978 sock->sk->sk_data_ready = ksocknal_data_ready;
979 sock->sk->sk_write_space = ksocknal_write_space;
984 ksocknal_lib_reset_callback(struct socket *sock, ksock_conn_t *conn)
986 /* Remove conn's network callbacks.
987 * NB I _have_ to restore the callback, rather than storing a noop,
988 * since the socket could survive past this module being unloaded!! */
989 sock->sk->sk_data_ready = conn->ksnc_saved_data_ready;
990 sock->sk->sk_write_space = conn->ksnc_saved_write_space;
992 /* A callback could be in progress already; they hold a read lock
993 * on ksnd_global_lock (to serialise with me) and NOOP if
994 * sk_user_data is NULL. */
995 sock->sk->sk_user_data = NULL;