Whamcloud - gitweb
507b7198dc0ab7d637264ce20e662efed86bbb20
[fs/lustre-release.git] / lnet / klnds / socklnd / socklnd_cb.c
1 /* -*- mode: c; c-basic-offset: 8; indent-tabs-mode: nil; -*-
2  * vim:expandtab:shiftwidth=8:tabstop=8:
3  *
4  * Copyright (C) 2001, 2002 Cluster File Systems, Inc.
5  *   Author: Zach Brown <zab@zabbo.net>
6  *   Author: Peter J. Braam <braam@clusterfs.com>
7  *   Author: Phil Schwan <phil@clusterfs.com>
8  *   Author: Eric Barton <eric@bartonsoftware.com>
9  *
10  *   This file is part of Portals, http://www.sf.net/projects/sandiaportals/
11  *
12  *   Portals is free software; you can redistribute it and/or
13  *   modify it under the terms of version 2 of the GNU General Public
14  *   License as published by the Free Software Foundation.
15  *
16  *   Portals is distributed in the hope that it will be useful,
17  *   but WITHOUT ANY WARRANTY; without even the implied warranty of
18  *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
19  *   GNU General Public License for more details.
20  *
21  *   You should have received a copy of the GNU General Public License
22  *   along with Portals; if not, write to the Free Software
23  *   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
24  */
25
26 #include "socklnd.h"
27
28 ksock_tx_t *
29 ksocknal_alloc_tx (int size) 
30 {
31         ksock_tx_t *tx = NULL;
32
33         if (size == KSOCK_NOOP_TX_SIZE) {
34                 /* searching for a noop tx in free list */
35                 spin_lock(&ksocknal_data.ksnd_tx_lock);
36
37                 if (!list_empty(&ksocknal_data.ksnd_idle_noop_txs)) {
38                         tx = list_entry(ksocknal_data.ksnd_idle_noop_txs.next,
39                                         ksock_tx_t, tx_list);
40                         LASSERT(tx->tx_desc_size == size);
41                         list_del(&tx->tx_list);
42                 }
43                              
44                 spin_unlock(&ksocknal_data.ksnd_tx_lock);
45         }
46                 
47         if (tx == NULL)
48                 LIBCFS_ALLOC(tx, size);
49
50         if (tx == NULL) 
51                 return NULL;
52
53         atomic_set(&tx->tx_refcount, 1);
54         tx->tx_desc_size = size;
55         atomic_inc(&ksocknal_data.ksnd_nactive_txs);
56
57         return tx;
58 }
59
60 void
61 ksocknal_free_tx (ksock_tx_t *tx)
62 {
63         atomic_dec(&ksocknal_data.ksnd_nactive_txs);
64
65         if (tx->tx_desc_size == KSOCK_NOOP_TX_SIZE) {
66                 /* it's a noop tx */
67                 spin_lock(&ksocknal_data.ksnd_tx_lock);
68
69                 list_add(&tx->tx_list, &ksocknal_data.ksnd_idle_noop_txs);
70
71                 spin_unlock(&ksocknal_data.ksnd_tx_lock);
72         } else {
73                 LIBCFS_FREE(tx, tx->tx_desc_size);
74         }
75 }
76
77 void
78 ksocknal_init_msg(ksock_msg_t *msg, int type)
79 {
80         msg->ksm_type           = type;
81         msg->ksm_csum           = 0;
82         msg->ksm_zc_req_cookie  = 0;
83         msg->ksm_zc_ack_cookie  = 0;
84 }
85
86 int
87 ksocknal_send_iov (ksock_conn_t *conn, ksock_tx_t *tx)
88
89         struct iovec  *iov = tx->tx_iov;
90         int    nob;
91         int    rc;
92
93         LASSERT (tx->tx_niov > 0);
94
95         /* Never touch tx->tx_iov inside ksocknal_lib_send_iov() */
96         rc = ksocknal_lib_send_iov(conn, tx);
97
98         if (rc <= 0)                            /* sent nothing? */ 
99                 return (rc);
100
101         nob = rc; 
102         LASSERT (nob <= tx->tx_resid); 
103         tx->tx_resid -= nob;
104
105         /* "consume" iov */ 
106         do { 
107                 LASSERT (tx->tx_niov > 0); 
108
109                 if (nob < iov->iov_len) { 
110                         iov->iov_base = (void *)(((unsigned long)(iov->iov_base)) + nob); 
111                         iov->iov_len -= nob; 
112                         return (rc); 
113                 } 
114
115                 nob -= iov->iov_len; 
116                 tx->tx_iov = ++iov; 
117                 tx->tx_niov--; 
118         } while (nob != 0);
119
120         return (rc);
121 }
122
123 int
124 ksocknal_send_kiov (ksock_conn_t *conn, ksock_tx_t *tx)
125
126         lnet_kiov_t    *kiov = tx->tx_kiov;
127         int     nob;
128         int     rc;
129
130         LASSERT (tx->tx_niov == 0); 
131         LASSERT (tx->tx_nkiov > 0);
132
133         /* Never touch tx->tx_kiov inside ksocknal_lib_send_kiov() */
134         rc = ksocknal_lib_send_kiov(conn, tx);
135
136         if (rc <= 0)                            /* sent nothing? */ 
137                 return (rc); 
138         
139         nob = rc; 
140         LASSERT (nob <= tx->tx_resid); 
141         tx->tx_resid -= nob; 
142
143         /* "consume" kiov */ 
144         do { 
145                 LASSERT(tx->tx_nkiov > 0); 
146
147                 if (nob < kiov->kiov_len) { 
148                         kiov->kiov_offset += nob; 
149                         kiov->kiov_len -= nob; 
150                         return rc; 
151                 } 
152
153                 nob -= kiov->kiov_len; 
154                 tx->tx_kiov = ++kiov; 
155                 tx->tx_nkiov--; 
156         } while (nob != 0);
157
158         return (rc);
159 }
160
161 int
162 ksocknal_transmit (ksock_conn_t *conn, ksock_tx_t *tx)
163 {
164         int      rc;
165         int      bufnob;
166         
167         if (ksocknal_data.ksnd_stall_tx != 0) {
168                 cfs_pause(cfs_time_seconds(ksocknal_data.ksnd_stall_tx));
169         }
170
171         LASSERT (tx->tx_resid != 0);
172
173         rc = ksocknal_connsock_addref(conn);
174         if (rc != 0) {
175                 LASSERT (conn->ksnc_closing);
176                 return (-ESHUTDOWN);
177         }
178
179         do {
180                 if (ksocknal_data.ksnd_enomem_tx > 0) {
181                         /* testing... */
182                         ksocknal_data.ksnd_enomem_tx--;
183                         rc = -EAGAIN;
184                 } else if (tx->tx_niov != 0) {
185                         rc = ksocknal_send_iov (conn, tx);
186                 } else {
187                         rc = ksocknal_send_kiov (conn, tx);
188                 }
189
190                 bufnob = SOCK_WMEM_QUEUED(conn->ksnc_sock);
191                 if (rc > 0)                     /* sent something? */
192                         conn->ksnc_tx_bufnob += rc; /* account it */
193                 
194                 if (bufnob < conn->ksnc_tx_bufnob) {
195                         /* allocated send buffer bytes < computed; infer
196                          * something got ACKed */
197                         conn->ksnc_tx_deadline = 
198                                 cfs_time_shift(*ksocknal_tunables.ksnd_timeout);
199                         conn->ksnc_peer->ksnp_last_alive = cfs_time_current();
200                         conn->ksnc_tx_bufnob = bufnob;
201                         mb();
202                 }
203
204                 if (rc <= 0) { /* Didn't write anything? */
205                         ksock_sched_t *sched;
206
207                         if (rc == 0) /* some stacks return 0 instead of -EAGAIN */
208                                 rc = -EAGAIN;
209
210                         if (rc != -EAGAIN)
211                                 break;
212
213                         /* Check if EAGAIN is due to memory pressure */
214
215                         sched = conn->ksnc_scheduler;
216                         spin_lock_bh (&sched->kss_lock);
217                                 
218                         if (!SOCK_TEST_NOSPACE(conn->ksnc_sock) &&
219                             !conn->ksnc_tx_ready) {
220                                 /* SOCK_NOSPACE is set when the socket fills
221                                  * and cleared in the write_space callback
222                                  * (which also sets ksnc_tx_ready).  If
223                                  * SOCK_NOSPACE and ksnc_tx_ready are BOTH
224                                  * zero, I didn't fill the socket and
225                                  * write_space won't reschedule me, so I
226                                  * return -ENOMEM to get my caller to retry
227                                  * after a timeout */
228                                 rc = -ENOMEM;
229                         }
230
231                         spin_unlock_bh (&sched->kss_lock);
232                         break;
233                 }
234
235                 /* socket's wmem_queued now includes 'rc' bytes */
236                 atomic_sub (rc, &conn->ksnc_tx_nob);
237                 rc = 0;
238
239         } while (tx->tx_resid != 0);
240
241         ksocknal_connsock_decref(conn);
242         return (rc);
243 }
244
245 int
246 ksocknal_recv_iov (ksock_conn_t *conn)
247
248         struct iovec *iov = conn->ksnc_rx_iov;
249         int     nob;
250         int     rc;
251
252         LASSERT (conn->ksnc_rx_niov > 0);
253
254         /* Never touch conn->ksnc_rx_iov or change connection 
255          * status inside ksocknal_lib_recv_iov */
256         rc = ksocknal_lib_recv_iov(conn); 
257
258         if (rc <= 0) 
259                 return (rc); 
260
261         /* received something... */ 
262         nob = rc; 
263         
264         conn->ksnc_peer->ksnp_last_alive = cfs_time_current(); 
265         conn->ksnc_rx_deadline = 
266                 cfs_time_shift(*ksocknal_tunables.ksnd_timeout); 
267         mb();                           /* order with setting rx_started */ 
268         conn->ksnc_rx_started = 1; 
269         
270         conn->ksnc_rx_nob_wanted -= nob; 
271         conn->ksnc_rx_nob_left -= nob;
272
273         do { 
274                 LASSERT (conn->ksnc_rx_niov > 0); 
275
276                 if (nob < iov->iov_len) { 
277                         iov->iov_len -= nob; 
278                         iov->iov_base = (void *)(((unsigned long)iov->iov_base) + nob); 
279                         return (-EAGAIN); 
280                 } 
281
282                 nob -= iov->iov_len; 
283                 conn->ksnc_rx_iov = ++iov; 
284                 conn->ksnc_rx_niov--; 
285         } while (nob != 0);
286
287         return (rc);
288 }
289
290 int
291 ksocknal_recv_kiov (ksock_conn_t *conn)
292 {
293         lnet_kiov_t   *kiov = conn->ksnc_rx_kiov;
294         int     nob;
295         int     rc;
296         LASSERT (conn->ksnc_rx_nkiov > 0);
297
298         /* Never touch conn->ksnc_rx_kiov or change connection 
299          * status inside ksocknal_lib_recv_iov */
300         rc = ksocknal_lib_recv_kiov(conn); 
301         
302         if (rc <= 0) 
303                 return (rc); 
304         
305         /* received something... */ 
306         nob = rc; 
307
308         conn->ksnc_peer->ksnp_last_alive = cfs_time_current(); 
309         conn->ksnc_rx_deadline = 
310                 cfs_time_shift(*ksocknal_tunables.ksnd_timeout); 
311         mb();                           /* order with setting rx_started */ 
312         conn->ksnc_rx_started = 1;
313
314         conn->ksnc_rx_nob_wanted -= nob; 
315         conn->ksnc_rx_nob_left -= nob; 
316         
317         do { 
318                 LASSERT (conn->ksnc_rx_nkiov > 0); 
319
320                 if (nob < kiov->kiov_len) { 
321                         kiov->kiov_offset += nob; 
322                         kiov->kiov_len -= nob; 
323                         return -EAGAIN; 
324                 } 
325
326                 nob -= kiov->kiov_len; 
327                 conn->ksnc_rx_kiov = ++kiov; 
328                 conn->ksnc_rx_nkiov--; 
329         } while (nob != 0);
330
331         return 1;
332 }
333
334 int
335 ksocknal_receive (ksock_conn_t *conn) 
336 {
337         /* Return 1 on success, 0 on EOF, < 0 on error.
338          * Caller checks ksnc_rx_nob_wanted to determine
339          * progress/completion. */
340         int     rc;
341         ENTRY;
342         
343         if (ksocknal_data.ksnd_stall_rx != 0) {
344                 cfs_pause(cfs_time_seconds (ksocknal_data.ksnd_stall_rx));
345         }
346
347         rc = ksocknal_connsock_addref(conn);
348         if (rc != 0) {
349                 LASSERT (conn->ksnc_closing);
350                 return (-ESHUTDOWN);
351         }
352
353         for (;;) {
354                 if (conn->ksnc_rx_niov != 0)
355                         rc = ksocknal_recv_iov (conn);
356                 else
357                         rc = ksocknal_recv_kiov (conn);
358
359                 if (rc <= 0) {
360                         /* error/EOF or partial receive */
361                         if (rc == -EAGAIN) {
362                                 rc = 1;
363                         } else if (rc == 0 && conn->ksnc_rx_started) {
364                                 /* EOF in the middle of a message */
365                                 rc = -EPROTO;
366                         }
367                         break;
368                 }
369
370                 /* Completed a fragment */
371
372                 if (conn->ksnc_rx_nob_wanted == 0) {
373                         rc = 1;
374                         break;
375                 }
376         }
377
378         ksocknal_connsock_decref(conn);
379         RETURN (rc);
380 }
381
382 void
383 ksocknal_tx_done (lnet_ni_t *ni, ksock_tx_t *tx)
384 {
385         lnet_msg_t  *lnetmsg = tx->tx_lnetmsg;
386         int          rc = (tx->tx_resid == 0) ? 0 : -EIO;
387         ENTRY;
388
389         LASSERT(ni != NULL || tx->tx_conn != NULL);
390
391         if (tx->tx_conn != NULL)
392                 ksocknal_conn_decref(tx->tx_conn);
393
394         if (ni == NULL && tx->tx_conn != NULL) 
395                 ni = tx->tx_conn->ksnc_peer->ksnp_ni;
396
397         ksocknal_free_tx (tx);
398         if (lnetmsg != NULL) /* KSOCK_MSG_NOOP go without lnetmsg */
399                 lnet_finalize (ni, lnetmsg, rc);
400
401         EXIT;
402 }
403
404 void
405 ksocknal_txlist_done (lnet_ni_t *ni, struct list_head *txlist, int error)
406 {
407         ksock_tx_t *tx;
408         
409         while (!list_empty (txlist)) {
410                 tx = list_entry (txlist->next, ksock_tx_t, tx_list);
411
412                 if (error && tx->tx_lnetmsg != NULL) {
413                         CDEBUG (D_NETERROR, "Deleting packet type %d len %d %s->%s\n",
414                                 le32_to_cpu (tx->tx_lnetmsg->msg_hdr.type),
415                                 le32_to_cpu (tx->tx_lnetmsg->msg_hdr.payload_length),
416                                 libcfs_nid2str(le64_to_cpu(tx->tx_lnetmsg->msg_hdr.src_nid)),
417                                 libcfs_nid2str(le64_to_cpu (tx->tx_lnetmsg->msg_hdr.dest_nid)));
418                 } else if (error) {
419                         CDEBUG (D_NETERROR, "Deleting noop packet\n");
420                 }
421
422                 list_del (&tx->tx_list);
423
424                 LASSERT (atomic_read(&tx->tx_refcount) == 1);
425                 ksocknal_tx_done (ni, tx);
426         }
427 }
428
429 static void
430 ksocknal_check_zc_req(ksock_tx_t *tx)
431 {
432         ksock_conn_t   *conn = tx->tx_conn;
433         ksock_peer_t   *peer = conn->ksnc_peer;
434         lnet_kiov_t    *kiov = tx->tx_kiov;
435         int             nkiov = tx->tx_nkiov;
436
437         /* Set tx_msg.ksm_zc_req_cookie to a unique non-zero cookie and add tx
438          * to ksnp_zc_req_list if some fragment of this message should be sent
439          * zero-copy.  Our peer will send an ACK containing this cookie when
440          * she has received this message to tell us we can signal completion.
441          * tx_msg.ksm_zc_req_cookie remains non-zero while tx is on
442          * ksnp_zc_req_list. */
443
444         if (conn->ksnc_proto != &ksocknal_protocol_v2x ||
445             !conn->ksnc_zc_capable)
446                 return;
447         
448         while (nkiov > 0) {
449                 if (kiov->kiov_len >= *ksocknal_tunables.ksnd_zc_min_frag)
450                         break;
451                 --nkiov;
452                 ++kiov;
453         }
454
455         if (nkiov == 0)
456                 return;
457         
458         /* assign cookie and queue tx to pending list, it will be released when
459          * a matching ack is received. See ksocknal_handle_zc_ack() */
460
461         ksocknal_tx_addref(tx);
462
463         spin_lock(&peer->ksnp_lock);
464
465         LASSERT (tx->tx_msg.ksm_zc_req_cookie == 0);
466         tx->tx_msg.ksm_zc_req_cookie = peer->ksnp_zc_next_cookie++; 
467         list_add_tail(&tx->tx_zc_list, &peer->ksnp_zc_req_list);
468
469         spin_unlock(&peer->ksnp_lock);
470 }
471
472 static void
473 ksocknal_unzc_req(ksock_tx_t *tx)
474 {
475         ksock_peer_t   *peer = tx->tx_conn->ksnc_peer;
476
477         spin_lock(&peer->ksnp_lock);
478
479         if (tx->tx_msg.ksm_zc_req_cookie == 0) {
480                 /* Not waiting for an ACK */
481                 spin_unlock(&peer->ksnp_lock);
482                 return;
483         }
484
485         tx->tx_msg.ksm_zc_req_cookie = 0;
486         list_del(&tx->tx_zc_list);
487
488         spin_unlock(&peer->ksnp_lock);
489
490         ksocknal_tx_decref(tx);
491 }
492
493 int
494 ksocknal_process_transmit (ksock_conn_t *conn, ksock_tx_t *tx)
495 {
496         int            rc;
497
498         if (!tx->tx_checked_zc) {
499                 tx->tx_checked_zc = 1;
500                 ksocknal_check_zc_req(tx);
501         }
502       
503         rc = ksocknal_transmit (conn, tx);
504
505         CDEBUG (D_NET, "send(%d) %d\n", tx->tx_resid, rc);
506
507         if (tx->tx_resid == 0) {
508                 /* Sent everything OK */
509                 LASSERT (rc == 0);
510
511                 return (0);
512         }
513
514         if (rc == -EAGAIN)
515                 return (rc);
516
517         if (rc == -ENOMEM) {
518                 static int counter;
519
520                 counter++;   /* exponential backoff warnings */
521                 if ((counter & (-counter)) == counter)
522                         CWARN("%u ENOMEM tx %p (%u allocated)\n",
523                               counter, conn, atomic_read(&libcfs_kmemory));
524
525                 /* Queue on ksnd_enomem_conns for retry after a timeout */
526                 spin_lock_bh (&ksocknal_data.ksnd_reaper_lock);
527
528                 /* enomem list takes over scheduler's ref... */
529                 LASSERT (conn->ksnc_tx_scheduled);
530                 list_add_tail(&conn->ksnc_tx_list,
531                               &ksocknal_data.ksnd_enomem_conns);
532                 if (!cfs_time_aftereq(cfs_time_add(cfs_time_current(),
533                                                    SOCKNAL_ENOMEM_RETRY),
534                                    ksocknal_data.ksnd_reaper_waketime))
535                         cfs_waitq_signal (&ksocknal_data.ksnd_reaper_waitq);
536                 
537                 spin_unlock_bh (&ksocknal_data.ksnd_reaper_lock);
538                 return (rc);
539         }
540
541         /* Actual error */
542         LASSERT (rc < 0);
543
544         if (!conn->ksnc_closing) {
545                 switch (rc) {
546                 case -ECONNRESET:
547                         LCONSOLE_WARN("Host %u.%u.%u.%u reset our connection "
548                                       "while we were sending data; it may have "
549                                       "rebooted.\n",
550                                       HIPQUAD(conn->ksnc_ipaddr));
551                         break;
552                 default:
553                         LCONSOLE_WARN("There was an unexpected network error "
554                                       "while writing to %u.%u.%u.%u: %d.\n",
555                                       HIPQUAD(conn->ksnc_ipaddr), rc);
556                         break;
557                 }
558                 CDEBUG(D_NET, "[%p] Error %d on write to %s"
559                        " ip %d.%d.%d.%d:%d\n", conn, rc,
560                        libcfs_id2str(conn->ksnc_peer->ksnp_id),
561                        HIPQUAD(conn->ksnc_ipaddr),
562                        conn->ksnc_port);
563         } 
564           
565         ksocknal_unzc_req(tx);
566
567         /* it's not an error if conn is being closed */
568         ksocknal_close_conn_and_siblings (conn, 
569                                           (conn->ksnc_closing) ? 0 : rc);
570
571         return (rc);
572 }
573
574 void
575 ksocknal_launch_connection_locked (ksock_route_t *route)
576 {
577
578         /* called holding write lock on ksnd_global_lock */
579
580         LASSERT (!route->ksnr_scheduled);
581         LASSERT (!route->ksnr_connecting);
582         LASSERT ((ksocknal_route_mask() & ~route->ksnr_connected) != 0);
583         
584         route->ksnr_scheduled = 1;              /* scheduling conn for connd */
585         ksocknal_route_addref(route);           /* extra ref for connd */
586         
587         spin_lock_bh (&ksocknal_data.ksnd_connd_lock);
588         
589         list_add_tail (&route->ksnr_connd_list,
590                        &ksocknal_data.ksnd_connd_routes);
591         cfs_waitq_signal (&ksocknal_data.ksnd_connd_waitq);
592         
593         spin_unlock_bh (&ksocknal_data.ksnd_connd_lock);
594 }
595
596 ksock_conn_t *
597 ksocknal_find_conn_locked (int payload_nob, ksock_peer_t *peer)
598 {
599         struct list_head *tmp;
600         ksock_conn_t     *typed = NULL;
601         int               tnob  = 0;
602         ksock_conn_t     *fallback = NULL;
603         int               fnob     = 0;
604         ksock_conn_t     *conn;
605
606         list_for_each (tmp, &peer->ksnp_conns) {
607                 ksock_conn_t *c = list_entry(tmp, ksock_conn_t, ksnc_list);
608                 int           hdr_nob = 0;
609 #if SOCKNAL_ROUND_ROBIN
610                 const int     nob = 0;
611 #else
612                 int           nob = atomic_read(&c->ksnc_tx_nob) +
613                                         SOCK_WMEM_QUEUED(c->ksnc_sock);
614 #endif
615                 LASSERT (!c->ksnc_closing);
616                 LASSERT(c->ksnc_proto != NULL);
617
618                 if (fallback == NULL || nob < fnob) {
619                         fallback = c;
620                         fnob     = nob;
621                 }
622
623                 if (!*ksocknal_tunables.ksnd_typed_conns)
624                         continue;
625
626                 if (payload_nob == 0) {
627                         /* noop packet */
628                         hdr_nob = offsetof(ksock_msg_t, ksm_u);
629                 } else {
630                         /* lnet packet */
631                         hdr_nob = (c->ksnc_proto == &ksocknal_protocol_v2x)?
632                                   offsetof(ksock_msg_t, ksm_u.lnetmsg.ksnm_payload):
633                                   sizeof(lnet_hdr_t);
634                 }
635
636                 switch (c->ksnc_type) {
637                 default:
638                         CERROR("ksnc_type bad: %u\n", c->ksnc_type);
639                         LBUG();
640                 case SOCKLND_CONN_ANY:
641                         break;
642                 case SOCKLND_CONN_BULK_IN:
643                         continue;
644                 case SOCKLND_CONN_BULK_OUT:
645                         if ((hdr_nob + payload_nob) < *ksocknal_tunables.ksnd_min_bulk)
646                                 continue;
647                         break;
648                 case SOCKLND_CONN_CONTROL:
649                         if ((hdr_nob + payload_nob) >= *ksocknal_tunables.ksnd_min_bulk)
650                                 continue;
651                         break;
652                 }
653
654                 if (typed == NULL || nob < tnob) {
655                         typed = c;
656                         tnob  = nob;
657                 }
658         }
659
660         /* prefer the typed selection */
661         conn = (typed != NULL) ? typed : fallback;
662
663 #if SOCKNAL_ROUND_ROBIN
664         if (conn != NULL) {
665                 /* round-robin all else being equal */
666                 list_del (&conn->ksnc_list);
667                 list_add_tail (&conn->ksnc_list, &peer->ksnp_conns);
668         }
669 #endif
670         return conn;
671 }
672
673 void
674 ksocknal_next_mono_tx(ksock_conn_t *conn)
675 {
676         ksock_tx_t     *tx = conn->ksnc_tx_mono;
677
678         /* Called holding BH lock: conn->ksnc_scheduler->kss_lock */
679         LASSERT(conn->ksnc_proto == &ksocknal_protocol_v2x);
680         LASSERT(!list_empty(&conn->ksnc_tx_queue));
681         LASSERT(tx != NULL);
682
683         if (tx->tx_list.next == &conn->ksnc_tx_queue) {
684                 /* no more packets queued */
685                 conn->ksnc_tx_mono = NULL;
686         } else {
687                 conn->ksnc_tx_mono = list_entry(tx->tx_list.next, ksock_tx_t, tx_list);
688                 LASSERT(conn->ksnc_tx_mono->tx_msg.ksm_type == tx->tx_msg.ksm_type);
689         }
690 }
691
692 int
693 ksocknal_piggyback_zcack(ksock_conn_t *conn, __u64 cookie)
694 {
695         ksock_tx_t     *tx = conn->ksnc_tx_mono;
696
697         /* Called holding BH lock: conn->ksnc_scheduler->kss_lock */
698
699         if (tx == NULL)
700                 return 0;
701
702         if (tx->tx_msg.ksm_type == KSOCK_MSG_NOOP) {
703                 /* tx is noop zc-ack, can't piggyback zc-ack cookie */
704                 return 0;
705         }
706
707         LASSERT(tx->tx_msg.ksm_type == KSOCK_MSG_LNET);
708         LASSERT(tx->tx_msg.ksm_zc_ack_cookie == 0);
709
710         /* piggyback the zc-ack cookie */
711         tx->tx_msg.ksm_zc_ack_cookie = cookie;
712         ksocknal_next_mono_tx(conn);
713
714         return 1;
715 }
716
717 void
718 ksocknal_queue_tx_locked (ksock_tx_t *tx, ksock_conn_t *conn)
719 {
720         ksock_sched_t *sched = conn->ksnc_scheduler;
721         ksock_msg_t   *msg = &tx->tx_msg;
722         ksock_tx_t    *ztx;
723         int            bufnob = 0;
724
725         /* called holding global lock (read or irq-write) and caller may
726          * not have dropped this lock between finding conn and calling me,
727          * so we don't need the {get,put}connsock dance to deref
728          * ksnc_sock... */
729         LASSERT(!conn->ksnc_closing);
730
731         CDEBUG (D_NET, "Sending to %s ip %d.%d.%d.%d:%d\n", 
732                 libcfs_id2str(conn->ksnc_peer->ksnp_id),
733                 HIPQUAD(conn->ksnc_ipaddr),
734                 conn->ksnc_port);
735
736         tx->tx_checked_zc = 0;
737         conn->ksnc_proto->pro_pack(tx);
738
739         /* Ensure the frags we've been given EXACTLY match the number of
740          * bytes we want to send.  Many TCP/IP stacks disregard any total
741          * size parameters passed to them and just look at the frags. 
742          *
743          * We always expect at least 1 mapped fragment containing the
744          * complete ksocknal message header. */
745         LASSERT (lnet_iov_nob (tx->tx_niov, tx->tx_iov) +
746                  lnet_kiov_nob (tx->tx_nkiov, tx->tx_kiov) == tx->tx_nob);
747         LASSERT (tx->tx_niov >= 1);
748         LASSERT (tx->tx_resid == tx->tx_nob);
749
750         CDEBUG (D_NET, "Packet %p type %d, nob %d niov %d nkiov %d\n",
751                 tx, (tx->tx_lnetmsg != NULL)? tx->tx_lnetmsg->msg_hdr.type: 
752                                               KSOCK_MSG_NOOP, 
753                 tx->tx_nob, tx->tx_niov, tx->tx_nkiov);
754         
755         atomic_add (tx->tx_nob, &conn->ksnc_tx_nob);
756         tx->tx_conn = conn;
757         ksocknal_conn_addref(conn); /* +1 ref for tx */
758
759         /* 
760          * NB Darwin: SOCK_WMEM_QUEUED()->sock_getsockopt() will take
761          * a blockable lock(socket lock), so SOCK_WMEM_QUEUED can't be
762          * put in spinlock. 
763          */
764         bufnob = SOCK_WMEM_QUEUED(conn->ksnc_sock);
765         spin_lock_bh (&sched->kss_lock);
766
767         if (list_empty(&conn->ksnc_tx_queue) && bufnob == 0) {
768                 /* First packet starts the timeout */
769                 conn->ksnc_tx_deadline = 
770                         cfs_time_shift(*ksocknal_tunables.ksnd_timeout);
771                 conn->ksnc_tx_bufnob = 0;
772                 mb();    /* order with adding to tx_queue */
773         }
774
775         ztx = NULL;
776
777         if (msg->ksm_type == KSOCK_MSG_NOOP) {
778                 /* The packet is noop ZC ACK, try to piggyback the ack_cookie
779                  * on a normal packet so I don't need to send it */
780                 LASSERT(msg->ksm_zc_req_cookie == 0);
781                 LASSERT(msg->ksm_zc_ack_cookie != 0);
782
783                 if (conn->ksnc_tx_mono != NULL) {
784                         if (ksocknal_piggyback_zcack(conn, msg->ksm_zc_ack_cookie)) {
785                                 /* zc-ack cookie is piggybacked */
786                                 atomic_sub (tx->tx_nob, &conn->ksnc_tx_nob);
787                                 ztx = tx;       /* Put to freelist later */
788                         } else {
789                                 /* no packet can piggyback zc-ack cookie */
790                                 list_add_tail (&tx->tx_list, &conn->ksnc_tx_queue);
791                         }
792                 } else {
793                         /* It's the first mono-packet */
794                         conn->ksnc_tx_mono = tx;
795                         list_add_tail (&tx->tx_list, &conn->ksnc_tx_queue);
796                 }
797
798         } else {
799                 /* It's a normal packet - can it piggback a noop zc-ack that
800                  * has been queued already? */
801                 LASSERT(msg->ksm_zc_ack_cookie == 0);
802
803                 if (conn->ksnc_proto == &ksocknal_protocol_v2x &&  /* V2.x packet */
804                     conn->ksnc_tx_mono != NULL) {          
805                         if (conn->ksnc_tx_mono->tx_msg.ksm_type == KSOCK_MSG_NOOP) {
806                                 /* There is a noop zc-ack can be piggybacked */
807                                 ztx = conn->ksnc_tx_mono;
808
809                                 msg->ksm_zc_ack_cookie = ztx->tx_msg.ksm_zc_ack_cookie;
810                                 ksocknal_next_mono_tx(conn);
811
812                                 /* use tx to replace the noop zc-ack packet, ztx will
813                                  * be put to freelist later */
814                                 list_add(&tx->tx_list, &ztx->tx_list);
815                                 list_del(&ztx->tx_list);
816
817                                 atomic_sub (ztx->tx_nob, &conn->ksnc_tx_nob);
818                         } else {
819                                 /* no noop zc-ack packet, just enqueue it */
820                                 LASSERT(conn->ksnc_tx_mono->tx_msg.ksm_type == KSOCK_MSG_LNET);
821                                 list_add_tail (&tx->tx_list, &conn->ksnc_tx_queue);
822                         }
823
824                 } else if (conn->ksnc_proto == &ksocknal_protocol_v2x) {
825                         /* it's the first mono-packet, enqueue it */
826                         conn->ksnc_tx_mono = tx;
827                         list_add_tail (&tx->tx_list, &conn->ksnc_tx_queue);
828                 } else {
829                         /* V1.x packet, just enqueue it */
830                         list_add_tail (&tx->tx_list, &conn->ksnc_tx_queue);
831                 }
832         }
833
834         if (ztx != NULL)
835                 list_add_tail(&ztx->tx_list, &sched->kss_zombie_noop_txs);
836                 
837         if (conn->ksnc_tx_ready &&      /* able to send */
838             !conn->ksnc_tx_scheduled) { /* not scheduled to send */
839                 /* +1 ref for scheduler */
840                 ksocknal_conn_addref(conn);
841                 list_add_tail (&conn->ksnc_tx_list, 
842                                &sched->kss_tx_conns);
843                 conn->ksnc_tx_scheduled = 1;
844                 cfs_waitq_signal (&sched->kss_waitq);
845         }
846
847         spin_unlock_bh (&sched->kss_lock);
848 }
849
850 ksock_route_t *
851 ksocknal_find_connectable_route_locked (ksock_peer_t *peer)
852 {
853         struct list_head  *tmp;
854         ksock_route_t     *route;
855         
856         list_for_each (tmp, &peer->ksnp_routes) {
857                 route = list_entry (tmp, ksock_route_t, ksnr_list);
858
859                 LASSERT (!route->ksnr_connecting || route->ksnr_scheduled);
860
861                 if (route->ksnr_scheduled)      /* connections being established */
862                         continue;
863
864                 /* all route types connected ? */
865                 if ((ksocknal_route_mask() & ~route->ksnr_connected) == 0)
866                         continue;
867
868                 /* too soon to retry this guy? */
869                 if (!(route->ksnr_retry_interval == 0 || /* first attempt */
870                       cfs_time_aftereq (cfs_time_current(), 
871                                         route->ksnr_timeout)))
872                         continue;
873                 
874                 return (route);
875         }
876         
877         return (NULL);
878 }
879
880 ksock_route_t *
881 ksocknal_find_connecting_route_locked (ksock_peer_t *peer)
882 {
883         struct list_head  *tmp;
884         ksock_route_t     *route;
885
886         list_for_each (tmp, &peer->ksnp_routes) {
887                 route = list_entry (tmp, ksock_route_t, ksnr_list);
888
889                 LASSERT (!route->ksnr_connecting || route->ksnr_scheduled);
890                 
891                 if (route->ksnr_scheduled)
892                         return (route);
893         }
894         
895         return (NULL);
896 }
897
898 int
899 ksocknal_launch_packet (lnet_ni_t *ni, ksock_tx_t *tx, lnet_process_id_t id)
900 {
901         ksock_peer_t     *peer;
902         ksock_conn_t     *conn;
903         ksock_route_t    *route;
904         rwlock_t         *g_lock;
905         int               retry;
906         int               rc;
907         
908         LASSERT (tx->tx_conn == NULL);
909         LASSERT (tx->tx_lnetmsg != NULL);
910
911         g_lock = &ksocknal_data.ksnd_global_lock;
912         
913         for (retry = 0;; retry = 1) {
914 #if !SOCKNAL_ROUND_ROBIN
915                 read_lock (g_lock);
916                 peer = ksocknal_find_peer_locked(ni, id);
917                 if (peer != NULL) {
918                         if (ksocknal_find_connectable_route_locked(peer) == NULL) {
919                                 conn = ksocknal_find_conn_locked (tx->tx_lnetmsg->msg_len, peer);
920                                 if (conn != NULL) {
921                                         /* I've got no routes that need to be
922                                          * connecting and I do have an actual
923                                          * connection... */
924                                         ksocknal_queue_tx_locked (tx, conn);
925                                         read_unlock (g_lock);
926                                         return (0);
927                                 }
928                         }
929                 }
930  
931                 /* I'll need a write lock... */
932                 read_unlock (g_lock);
933 #endif
934                 write_lock_bh (g_lock);
935
936                 peer = ksocknal_find_peer_locked(ni, id);
937                 if (peer != NULL) 
938                         break;
939                 
940                 write_unlock_bh (g_lock);
941
942                 if ((id.pid & LNET_PID_USERFLAG) != 0) {
943                         CERROR("Refusing to create a connection to "
944                                "userspace process %s\n", libcfs_id2str(id));
945                         return -EHOSTUNREACH;
946                 }
947                 
948                 if (retry) {
949                         CERROR("Can't find peer %s\n", libcfs_id2str(id));
950                         return -EHOSTUNREACH;
951                 }
952                 
953                 rc = ksocknal_add_peer(ni, id, 
954                                        LNET_NIDADDR(id.nid),
955                                        lnet_acceptor_port());
956                 if (rc != 0) {
957                         CERROR("Can't add peer %s: %d\n",
958                                libcfs_id2str(id), rc);
959                         return rc;
960                 }
961         }
962
963         for (;;) {
964                 /* launch any/all connections that need it */
965                 route = ksocknal_find_connectable_route_locked (peer);
966                 if (route == NULL)
967                         break;
968
969                 ksocknal_launch_connection_locked (route);
970         }
971
972         conn = ksocknal_find_conn_locked (tx->tx_lnetmsg->msg_len, peer);
973         if (conn != NULL) {
974                 /* Connection exists; queue message on it */
975                 ksocknal_queue_tx_locked (tx, conn);
976                 write_unlock_bh (g_lock);
977                 return (0);
978         }
979
980         if (peer->ksnp_accepting > 0 ||
981             ksocknal_find_connecting_route_locked (peer) != NULL) {
982                 /* Queue the message until a connection is established */
983                 list_add_tail (&tx->tx_list, &peer->ksnp_tx_queue);
984                 write_unlock_bh (g_lock);
985                 return 0;
986         }
987         
988         write_unlock_bh (g_lock);
989
990         /* NB Routes may be ignored if connections to them failed recently */
991         CDEBUG(D_NETERROR, "No usable routes to %s\n", libcfs_id2str(id));
992         return (-EHOSTUNREACH);
993 }
994
995 int
996 ksocknal_send(lnet_ni_t *ni, void *private, lnet_msg_t *lntmsg)
997 {
998         int               type = lntmsg->msg_type; 
999         lnet_process_id_t target = lntmsg->msg_target;
1000         unsigned int      payload_niov = lntmsg->msg_niov; 
1001         struct iovec     *payload_iov = lntmsg->msg_iov; 
1002         lnet_kiov_t      *payload_kiov = lntmsg->msg_kiov;
1003         unsigned int      payload_offset = lntmsg->msg_offset;
1004         unsigned int      payload_nob = lntmsg->msg_len;
1005         ksock_tx_t       *tx;
1006         int               desc_size;
1007         int               rc;
1008
1009         /* NB 'private' is different depending on what we're sending.
1010          * Just ignore it... */
1011
1012         CDEBUG(D_NET, "sending %u bytes in %d frags to %s\n",
1013                payload_nob, payload_niov, libcfs_id2str(target));
1014
1015         LASSERT (payload_nob == 0 || payload_niov > 0);
1016         LASSERT (payload_niov <= LNET_MAX_IOV);
1017         /* payload is either all vaddrs or all pages */
1018         LASSERT (!(payload_kiov != NULL && payload_iov != NULL));
1019         LASSERT (!in_interrupt ());
1020         
1021         if (payload_iov != NULL)
1022                 desc_size = offsetof(ksock_tx_t, 
1023                                      tx_frags.virt.iov[1 + payload_niov]);
1024         else
1025                 desc_size = offsetof(ksock_tx_t, 
1026                                      tx_frags.paged.kiov[payload_niov]);
1027         
1028         tx = ksocknal_alloc_tx(desc_size);
1029         if (tx == NULL) {
1030                 CERROR("Can't allocate tx desc type %d size %d\n",
1031                        type, desc_size);
1032                 return (-ENOMEM);
1033         }
1034
1035         tx->tx_conn = NULL;                     /* set when assigned a conn */
1036         tx->tx_lnetmsg = lntmsg;
1037
1038         if (payload_iov != NULL) {
1039                 tx->tx_kiov = NULL;
1040                 tx->tx_nkiov = 0;
1041                 tx->tx_iov = tx->tx_frags.virt.iov;
1042                 tx->tx_niov = 1 + 
1043                               lnet_extract_iov(payload_niov, &tx->tx_iov[1],
1044                                                payload_niov, payload_iov,
1045                                                payload_offset, payload_nob);
1046         } else {
1047                 tx->tx_niov = 1;
1048                 tx->tx_iov = &tx->tx_frags.paged.iov;
1049                 tx->tx_kiov = tx->tx_frags.paged.kiov;
1050                 tx->tx_nkiov = lnet_extract_kiov(payload_niov, tx->tx_kiov,
1051                                                  payload_niov, payload_kiov,
1052                                                  payload_offset, payload_nob);
1053         }
1054
1055         ksocknal_init_msg(&tx->tx_msg, KSOCK_MSG_LNET);
1056
1057         /* The first fragment will be set later in pro_pack */
1058         rc = ksocknal_launch_packet(ni, tx, target);
1059         if (rc == 0)
1060                 return (0);
1061         
1062         ksocknal_free_tx(tx);
1063         return (-EIO);
1064 }
1065
1066 int
1067 ksocknal_thread_start (int (*fn)(void *arg), void *arg)
1068 {
1069         long          pid = cfs_kernel_thread (fn, arg, 0);
1070
1071         if (pid < 0)
1072                 return ((int)pid);
1073
1074         write_lock_bh (&ksocknal_data.ksnd_global_lock);
1075         ksocknal_data.ksnd_nthreads++;
1076         write_unlock_bh (&ksocknal_data.ksnd_global_lock);
1077         return (0);
1078 }
1079
1080 void
1081 ksocknal_thread_fini (void)
1082 {
1083         write_lock_bh (&ksocknal_data.ksnd_global_lock);
1084         ksocknal_data.ksnd_nthreads--;
1085         write_unlock_bh (&ksocknal_data.ksnd_global_lock);
1086 }
1087
1088 int
1089 ksocknal_new_packet (ksock_conn_t *conn, int nob_to_skip)
1090 {
1091         static char ksocknal_slop_buffer[4096];
1092
1093         int            nob;
1094         unsigned int   niov;
1095         int            skipped;
1096
1097         LASSERT(conn->ksnc_proto != NULL);
1098
1099         if ((*ksocknal_tunables.ksnd_eager_ack & conn->ksnc_type) != 0) {
1100                 /* Remind the socket to ack eagerly... */
1101                 ksocknal_lib_eager_ack(conn);
1102         }
1103
1104         if (nob_to_skip == 0) {         /* right at next packet boundary now */
1105                 conn->ksnc_rx_started = 0;
1106                 mb ();                          /* racing with timeout thread */
1107                 
1108                 switch (conn->ksnc_proto->pro_version) {
1109                 case  KSOCK_PROTO_V2:
1110                         conn->ksnc_rx_state = SOCKNAL_RX_KSM_HEADER;
1111                         conn->ksnc_rx_iov = (struct iovec *)&conn->ksnc_rx_iov_space;
1112                         conn->ksnc_rx_iov[0].iov_base = (char *)&conn->ksnc_msg;
1113
1114                         conn->ksnc_rx_nob_wanted = offsetof(ksock_msg_t, ksm_u);
1115                         conn->ksnc_rx_nob_left = offsetof(ksock_msg_t, ksm_u);
1116                         conn->ksnc_rx_iov[0].iov_len  = offsetof(ksock_msg_t, ksm_u);
1117                         break;
1118
1119                 case KSOCK_PROTO_V1:
1120                         /* Receiving bare lnet_hdr_t */
1121                         conn->ksnc_rx_state = SOCKNAL_RX_LNET_HEADER;
1122                         conn->ksnc_rx_nob_wanted = sizeof(lnet_hdr_t);
1123                         conn->ksnc_rx_nob_left = sizeof(lnet_hdr_t);
1124
1125                         conn->ksnc_rx_iov = (struct iovec *)&conn->ksnc_rx_iov_space;
1126                         conn->ksnc_rx_iov[0].iov_base = (char *)&conn->ksnc_msg.ksm_u.lnetmsg;
1127                         conn->ksnc_rx_iov[0].iov_len  = sizeof (lnet_hdr_t);
1128                         break;
1129
1130                 default:
1131                         LBUG ();
1132                 } 
1133                 conn->ksnc_rx_niov = 1;
1134
1135                 conn->ksnc_rx_kiov = NULL;
1136                 conn->ksnc_rx_nkiov = 0;
1137                 conn->ksnc_rx_csum = ~0;
1138                 return (1);
1139         }
1140
1141         /* Set up to skip as much as possible now.  If there's more left
1142          * (ran out of iov entries) we'll get called again */
1143
1144         conn->ksnc_rx_state = SOCKNAL_RX_SLOP;
1145         conn->ksnc_rx_nob_left = nob_to_skip;
1146         conn->ksnc_rx_iov = (struct iovec *)&conn->ksnc_rx_iov_space;
1147         skipped = 0;
1148         niov = 0;
1149
1150         do {
1151                 nob = MIN (nob_to_skip, sizeof (ksocknal_slop_buffer));
1152
1153                 conn->ksnc_rx_iov[niov].iov_base = ksocknal_slop_buffer;
1154                 conn->ksnc_rx_iov[niov].iov_len  = nob;
1155                 niov++;
1156                 skipped += nob;
1157                 nob_to_skip -=nob;
1158
1159         } while (nob_to_skip != 0 &&    /* mustn't overflow conn's rx iov */
1160                  niov < sizeof(conn->ksnc_rx_iov_space) / sizeof (struct iovec));
1161
1162         conn->ksnc_rx_niov = niov;
1163         conn->ksnc_rx_kiov = NULL;
1164         conn->ksnc_rx_nkiov = 0;
1165         conn->ksnc_rx_nob_wanted = skipped;
1166         return (0);
1167 }
1168
1169 /* (Sink) handle incoming ZC request from sender */
1170 static int
1171 ksocknal_handle_zc_req(ksock_peer_t *peer, __u64 cookie)
1172 {
1173         ksock_conn_t   *conn;
1174         ksock_tx_t     *tx;
1175         ksock_sched_t  *sched;
1176         int             rc;
1177
1178         read_lock (&ksocknal_data.ksnd_global_lock);
1179
1180         conn = ksocknal_find_conn_locked (0, peer);
1181         if (conn == NULL) {
1182                 read_unlock (&ksocknal_data.ksnd_global_lock);
1183                 CERROR("Can't find connection to send zcack.\n");
1184                 return -ECONNRESET;
1185         }
1186
1187         sched = conn->ksnc_scheduler;
1188
1189         spin_lock_bh (&sched->kss_lock);
1190         rc = ksocknal_piggyback_zcack(conn, cookie);
1191         spin_unlock_bh (&sched->kss_lock);
1192
1193         read_unlock (&ksocknal_data.ksnd_global_lock);
1194         if (rc) {
1195                 /* Ack cookie is piggybacked */
1196                 return 0;
1197         }
1198
1199         tx = ksocknal_alloc_tx(KSOCK_NOOP_TX_SIZE);
1200         if (tx == NULL) {
1201                 CERROR("Can't allocate noop tx desc\n");
1202                 return -ENOMEM;
1203         }
1204
1205         tx->tx_conn     = NULL;
1206         tx->tx_lnetmsg  = NULL;
1207         tx->tx_kiov     = NULL;
1208         tx->tx_nkiov    = 0;
1209         tx->tx_iov      = tx->tx_frags.virt.iov;
1210         tx->tx_niov     = 1;
1211
1212         ksocknal_init_msg(&tx->tx_msg, KSOCK_MSG_NOOP);
1213         tx->tx_msg.ksm_zc_ack_cookie = cookie; /* incoming cookie */
1214
1215         read_lock (&ksocknal_data.ksnd_global_lock);
1216
1217         conn = ksocknal_find_conn_locked (0, peer);
1218         if (conn == NULL) {
1219                 read_unlock (&ksocknal_data.ksnd_global_lock);
1220                 ksocknal_free_tx(tx);
1221                 CERROR("Can't find connection to send zcack.\n");
1222                 return -ECONNRESET;
1223         }
1224         ksocknal_queue_tx_locked(tx, conn);
1225
1226         read_unlock (&ksocknal_data.ksnd_global_lock);
1227
1228         return 0;
1229 }
1230
1231 /* (Sender) handle ZC_ACK from sink */
1232 static int
1233 ksocknal_handle_zc_ack(ksock_peer_t *peer, __u64 cookie)
1234 {
1235         ksock_tx_t             *tx;
1236         struct list_head       *ctmp;
1237
1238         spin_lock(&peer->ksnp_lock);
1239
1240         list_for_each(ctmp, &peer->ksnp_zc_req_list) {
1241                 tx = list_entry (ctmp, ksock_tx_t, tx_zc_list); 
1242                 if (tx->tx_msg.ksm_zc_req_cookie != cookie) 
1243                         continue;
1244
1245                 tx->tx_msg.ksm_zc_req_cookie = 0;
1246                 list_del(&tx->tx_zc_list);
1247
1248                 spin_unlock(&peer->ksnp_lock);
1249
1250                 ksocknal_tx_decref(tx);
1251                 return 0;
1252         }
1253         spin_unlock(&peer->ksnp_lock);
1254
1255         return -EPROTO;
1256 }
1257
1258 int
1259 ksocknal_process_receive (ksock_conn_t *conn)
1260 {
1261         int           rc;
1262         
1263         LASSERT (atomic_read(&conn->ksnc_conn_refcount) > 0);
1264
1265         /* NB: sched lock NOT held */
1266         /* SOCKNAL_RX_LNET_HEADER is here for backward compatability */
1267         LASSERT (conn->ksnc_rx_state == SOCKNAL_RX_KSM_HEADER ||
1268                  conn->ksnc_rx_state == SOCKNAL_RX_LNET_PAYLOAD ||
1269                  conn->ksnc_rx_state == SOCKNAL_RX_LNET_HEADER ||
1270                  conn->ksnc_rx_state == SOCKNAL_RX_SLOP);
1271  again:
1272         if (conn->ksnc_rx_nob_wanted != 0) {
1273                 rc = ksocknal_receive(conn);
1274
1275                 if (rc <= 0) {
1276                         LASSERT (rc != -EAGAIN);
1277
1278                         if (rc == 0)
1279                                 CDEBUG (D_NET, "[%p] EOF from %s"
1280                                         " ip %d.%d.%d.%d:%d\n", conn, 
1281                                         libcfs_id2str(conn->ksnc_peer->ksnp_id),
1282                                         HIPQUAD(conn->ksnc_ipaddr),
1283                                         conn->ksnc_port);
1284                         else if (!conn->ksnc_closing)
1285                                 CERROR ("[%p] Error %d on read from %s"
1286                                         " ip %d.%d.%d.%d:%d\n",
1287                                         conn, rc, 
1288                                         libcfs_id2str(conn->ksnc_peer->ksnp_id),
1289                                         HIPQUAD(conn->ksnc_ipaddr),
1290                                         conn->ksnc_port);
1291
1292                         /* it's not an error if conn is being closed */
1293                         ksocknal_close_conn_and_siblings (conn, 
1294                                                           (conn->ksnc_closing) ? 0 : rc);
1295                         return (rc == 0 ? -ESHUTDOWN : rc);
1296                 }
1297                 
1298                 if (conn->ksnc_rx_nob_wanted != 0) {
1299                         /* short read */
1300                         return (-EAGAIN);
1301                 }
1302         }
1303         switch (conn->ksnc_rx_state) {
1304         case SOCKNAL_RX_KSM_HEADER:
1305                 if (conn->ksnc_flip) {
1306                         __swab32s(&conn->ksnc_msg.ksm_type);
1307                         __swab32s(&conn->ksnc_msg.ksm_csum);
1308                         __swab64s(&conn->ksnc_msg.ksm_zc_req_cookie);
1309                         __swab64s(&conn->ksnc_msg.ksm_zc_ack_cookie);
1310                 } 
1311
1312                 if (conn->ksnc_msg.ksm_type == KSOCK_MSG_NOOP &&
1313                     conn->ksnc_msg.ksm_csum != 0 &&     /* has checksum */
1314                     conn->ksnc_msg.ksm_csum != conn->ksnc_rx_csum) { 
1315                         /* NOOP Checksum error */
1316                         CERROR("%s: Checksum error, wire:0x%08X data:0x%08X\n",
1317                                libcfs_id2str(conn->ksnc_peer->ksnp_id),
1318                                conn->ksnc_msg.ksm_csum, conn->ksnc_rx_csum);
1319                         ksocknal_new_packet(conn, 0);
1320                         ksocknal_close_conn_and_siblings(conn, -EPROTO);
1321                         return (-EIO);
1322                 }
1323
1324                 if (conn->ksnc_msg.ksm_zc_ack_cookie != 0) {
1325                         LASSERT(conn->ksnc_proto == &ksocknal_protocol_v2x);
1326
1327                         rc = ksocknal_handle_zc_ack(conn->ksnc_peer,
1328                                                     conn->ksnc_msg.ksm_zc_ack_cookie);
1329                         if (rc != 0) {
1330                                 CERROR("%s: Unknown zero copy ACK cookie: "LPU64"\n",
1331                                        libcfs_id2str(conn->ksnc_peer->ksnp_id),
1332                                        conn->ksnc_msg.ksm_zc_ack_cookie);
1333                                 ksocknal_new_packet(conn, 0);
1334                                 ksocknal_close_conn_and_siblings(conn, -EPROTO);
1335                                 return (rc);
1336                         }
1337                 }
1338
1339                 if (conn->ksnc_msg.ksm_type == KSOCK_MSG_NOOP) { 
1340                         ksocknal_new_packet (conn, 0);
1341                         return 0;       /* NOOP is done and just return */
1342                 }
1343                 LASSERT (conn->ksnc_msg.ksm_type == KSOCK_MSG_LNET);
1344
1345                 conn->ksnc_rx_state = SOCKNAL_RX_LNET_HEADER;
1346                 conn->ksnc_rx_nob_wanted = sizeof(ksock_lnet_msg_t);
1347                 conn->ksnc_rx_nob_left = sizeof(ksock_lnet_msg_t);
1348         
1349                 conn->ksnc_rx_iov = (struct iovec *)&conn->ksnc_rx_iov_space;
1350                 conn->ksnc_rx_iov[0].iov_base = (char *)&conn->ksnc_msg.ksm_u.lnetmsg;
1351                 conn->ksnc_rx_iov[0].iov_len  = sizeof(ksock_lnet_msg_t);
1352
1353                 conn->ksnc_rx_niov = 1;
1354                 conn->ksnc_rx_kiov = NULL;
1355                 conn->ksnc_rx_nkiov = 0;
1356
1357                 goto again;     /* read lnet header now */
1358
1359         case SOCKNAL_RX_LNET_HEADER:
1360                 /* unpack message header */
1361                 conn->ksnc_proto->pro_unpack(&conn->ksnc_msg);
1362
1363                 if ((conn->ksnc_peer->ksnp_id.pid & LNET_PID_USERFLAG) != 0) { 
1364                         /* Userspace peer */
1365                         lnet_process_id_t *id = &conn->ksnc_peer->ksnp_id;
1366                         lnet_hdr_t        *lhdr = &conn->ksnc_msg.ksm_u.lnetmsg.ksnm_hdr;
1367                         
1368                         /* Substitute process ID assigned at connection time */
1369                         lhdr->src_pid = cpu_to_le32(id->pid);
1370                         lhdr->src_nid = cpu_to_le64(id->nid);
1371                 }
1372
1373                 conn->ksnc_rx_state = SOCKNAL_RX_PARSE;
1374                 ksocknal_conn_addref(conn);     /* ++ref while parsing */
1375                 
1376                 rc = lnet_parse(conn->ksnc_peer->ksnp_ni, 
1377                                 &conn->ksnc_msg.ksm_u.lnetmsg.ksnm_hdr, 
1378                                 conn->ksnc_peer->ksnp_id.nid, conn, 0);
1379                 if (rc < 0) {
1380                         /* I just received garbage: give up on this conn */
1381                         ksocknal_new_packet(conn, 0);
1382                         ksocknal_close_conn_and_siblings (conn, rc);
1383                         ksocknal_conn_decref(conn);
1384                         return (-EPROTO);
1385                 }
1386
1387                 /* I'm racing with ksocknal_recv() */
1388                 LASSERT (conn->ksnc_rx_state == SOCKNAL_RX_PARSE ||
1389                          conn->ksnc_rx_state == SOCKNAL_RX_LNET_PAYLOAD);
1390                 
1391                 if (conn->ksnc_rx_state != SOCKNAL_RX_LNET_PAYLOAD)
1392                         return 0;
1393                 
1394                 /* ksocknal_recv() got called */
1395                 goto again;
1396
1397         case SOCKNAL_RX_LNET_PAYLOAD:
1398                 /* payload all received */
1399                 rc = 0;
1400
1401                 if (conn->ksnc_rx_nob_left == 0 &&   /* not truncating */
1402                     conn->ksnc_msg.ksm_csum != 0 &&  /* has checksum */
1403                     conn->ksnc_msg.ksm_csum != conn->ksnc_rx_csum) { 
1404                         CERROR("%s: Checksum error, wire:0x%08X data:0x%08X\n",
1405                                libcfs_id2str(conn->ksnc_peer->ksnp_id),
1406                                conn->ksnc_msg.ksm_csum, conn->ksnc_rx_csum);
1407                         rc = -EIO;
1408                 }
1409
1410                 lnet_finalize(conn->ksnc_peer->ksnp_ni, conn->ksnc_cookie, rc);
1411
1412                 if (rc == 0 && conn->ksnc_msg.ksm_zc_req_cookie != 0) {
1413                         LASSERT(conn->ksnc_proto == &ksocknal_protocol_v2x);
1414                         rc = ksocknal_handle_zc_req(conn->ksnc_peer,
1415                                                     conn->ksnc_msg.ksm_zc_req_cookie);
1416                 }
1417
1418                 if (rc != 0) {
1419                         ksocknal_new_packet(conn, 0);
1420                         ksocknal_close_conn_and_siblings (conn, rc);
1421                         return (-EPROTO);
1422                 }
1423                 /* Fall through */
1424
1425         case SOCKNAL_RX_SLOP:
1426                 /* starting new packet? */
1427                 if (ksocknal_new_packet (conn, conn->ksnc_rx_nob_left))
1428                         return 0;       /* come back later */
1429                 goto again;             /* try to finish reading slop now */
1430
1431         default:
1432                 break;
1433         }
1434
1435         /* Not Reached */
1436         LBUG ();
1437         return (-EINVAL);                       /* keep gcc happy */
1438 }
1439
1440 int
1441 ksocknal_recv (lnet_ni_t *ni, void *private, lnet_msg_t *msg, int delayed,
1442                unsigned int niov, struct iovec *iov, lnet_kiov_t *kiov,
1443                unsigned int offset, unsigned int mlen, unsigned int rlen)
1444 {
1445         ksock_conn_t  *conn = (ksock_conn_t *)private;
1446         ksock_sched_t *sched = conn->ksnc_scheduler;
1447
1448         LASSERT (mlen <= rlen);
1449         LASSERT (niov <= LNET_MAX_IOV);
1450         
1451         conn->ksnc_cookie = msg;
1452         conn->ksnc_rx_nob_wanted = mlen;
1453         conn->ksnc_rx_nob_left   = rlen;
1454
1455         if (mlen == 0 || iov != NULL) {
1456                 conn->ksnc_rx_nkiov = 0;
1457                 conn->ksnc_rx_kiov = NULL;
1458                 conn->ksnc_rx_iov = conn->ksnc_rx_iov_space.iov;
1459                 conn->ksnc_rx_niov =
1460                         lnet_extract_iov(LNET_MAX_IOV, conn->ksnc_rx_iov,
1461                                          niov, iov, offset, mlen);
1462         } else {
1463                 conn->ksnc_rx_niov = 0;
1464                 conn->ksnc_rx_iov  = NULL;
1465                 conn->ksnc_rx_kiov = conn->ksnc_rx_iov_space.kiov;
1466                 conn->ksnc_rx_nkiov = 
1467                         lnet_extract_kiov(LNET_MAX_IOV, conn->ksnc_rx_kiov,
1468                                           niov, kiov, offset, mlen);
1469         }
1470         
1471         LASSERT (mlen == 
1472                  lnet_iov_nob (conn->ksnc_rx_niov, conn->ksnc_rx_iov) +
1473                  lnet_kiov_nob (conn->ksnc_rx_nkiov, conn->ksnc_rx_kiov));
1474
1475         LASSERT (conn->ksnc_rx_scheduled);
1476
1477         spin_lock_bh (&sched->kss_lock);
1478
1479         switch (conn->ksnc_rx_state) {
1480         case SOCKNAL_RX_PARSE_WAIT:
1481                 list_add_tail(&conn->ksnc_rx_list, &sched->kss_rx_conns);
1482                 cfs_waitq_signal (&sched->kss_waitq);
1483                 LASSERT (conn->ksnc_rx_ready);
1484                 break;
1485                 
1486         case SOCKNAL_RX_PARSE:
1487                 /* scheduler hasn't noticed I'm parsing yet */
1488                 break;
1489         }
1490
1491         conn->ksnc_rx_state = SOCKNAL_RX_LNET_PAYLOAD;
1492         
1493         spin_unlock_bh (&sched->kss_lock);
1494         ksocknal_conn_decref(conn);
1495         return (0);
1496 }
1497
1498 static inline int
1499 ksocknal_sched_cansleep(ksock_sched_t *sched)
1500 {
1501         int           rc;
1502
1503         spin_lock_bh (&sched->kss_lock);
1504
1505         rc = (!ksocknal_data.ksnd_shuttingdown &&
1506               list_empty(&sched->kss_rx_conns) &&
1507               list_empty(&sched->kss_tx_conns));
1508         
1509         spin_unlock_bh (&sched->kss_lock);
1510         return (rc);
1511 }
1512
1513 int ksocknal_scheduler (void *arg)
1514 {
1515         ksock_sched_t     *sched = (ksock_sched_t *)arg;
1516         ksock_conn_t      *conn;
1517         ksock_tx_t        *tx;
1518         int                rc;
1519         int                nloops = 0;
1520         int                id = sched - ksocknal_data.ksnd_schedulers;
1521         char               name[16];
1522
1523         snprintf (name, sizeof (name),"socknal_sd%02d", id);
1524         cfs_daemonize (name);
1525         cfs_block_allsigs ();
1526
1527 #if defined(CONFIG_SMP) && defined(CPU_AFFINITY)
1528         id = ksocknal_sched2cpu(id);
1529         if (cpu_online(id)) {
1530                 cpumask_t m;
1531                 cpu_set(id, m);
1532                 set_cpus_allowed(current, m);
1533         } else {
1534                 CERROR ("Can't set CPU affinity for %s to %d\n", name, id);
1535         }
1536 #endif /* CONFIG_SMP && CPU_AFFINITY */
1537
1538         spin_lock_bh (&sched->kss_lock);
1539
1540         while (!ksocknal_data.ksnd_shuttingdown) {
1541                 int did_something = 0;
1542
1543                 /* Ensure I progress everything semi-fairly */
1544
1545                 if (!list_empty (&sched->kss_rx_conns)) {
1546                         conn = list_entry(sched->kss_rx_conns.next,
1547                                           ksock_conn_t, ksnc_rx_list);
1548                         list_del(&conn->ksnc_rx_list);
1549
1550                         LASSERT(conn->ksnc_rx_scheduled);
1551                         LASSERT(conn->ksnc_rx_ready);
1552
1553                         /* clear rx_ready in case receive isn't complete.
1554                          * Do it BEFORE we call process_recv, since
1555                          * data_ready can set it any time after we release
1556                          * kss_lock. */
1557                         conn->ksnc_rx_ready = 0;
1558                         spin_unlock_bh (&sched->kss_lock);
1559
1560                         rc = ksocknal_process_receive(conn);
1561
1562                         spin_lock_bh (&sched->kss_lock);
1563
1564                         /* I'm the only one that can clear this flag */
1565                         LASSERT(conn->ksnc_rx_scheduled);
1566
1567                         /* Did process_receive get everything it wanted? */
1568                         if (rc == 0)
1569                                 conn->ksnc_rx_ready = 1;
1570
1571                         if (conn->ksnc_rx_state == SOCKNAL_RX_PARSE) {
1572                                 /* Conn blocked waiting for ksocknal_recv()
1573                                  * I change its state (under lock) to signal
1574                                  * it can be rescheduled */
1575                                 conn->ksnc_rx_state = SOCKNAL_RX_PARSE_WAIT;
1576                         } else if (conn->ksnc_rx_ready) {
1577                                 /* reschedule for rx */
1578                                 list_add_tail (&conn->ksnc_rx_list,
1579                                                &sched->kss_rx_conns);
1580                         } else {
1581                                 conn->ksnc_rx_scheduled = 0;
1582                                 /* drop my ref */
1583                                 ksocknal_conn_decref(conn);
1584                         }
1585
1586                         did_something = 1;
1587                 }
1588
1589                 if (!list_empty (&sched->kss_tx_conns)) {
1590                         CFS_LIST_HEAD    (zlist);
1591
1592                         if (!list_empty(&sched->kss_zombie_noop_txs)) {
1593                                 list_add(&zlist, &sched->kss_zombie_noop_txs); 
1594                                 list_del_init(&sched->kss_zombie_noop_txs);
1595                         }
1596
1597                         conn = list_entry(sched->kss_tx_conns.next,
1598                                           ksock_conn_t, ksnc_tx_list);
1599                         list_del (&conn->ksnc_tx_list);
1600                         
1601                         LASSERT(conn->ksnc_tx_scheduled);
1602                         LASSERT(conn->ksnc_tx_ready);
1603                         LASSERT(!list_empty(&conn->ksnc_tx_queue));
1604                         
1605                         tx = list_entry(conn->ksnc_tx_queue.next,
1606                                         ksock_tx_t, tx_list);
1607
1608                         if (conn->ksnc_tx_mono == tx)
1609                                 ksocknal_next_mono_tx(conn);
1610
1611                         /* dequeue now so empty list => more to send */
1612                         list_del(&tx->tx_list);
1613
1614                         /* Clear tx_ready in case send isn't complete.  Do
1615                          * it BEFORE we call process_transmit, since
1616                          * write_space can set it any time after we release
1617                          * kss_lock. */
1618                         conn->ksnc_tx_ready = 0;
1619                         spin_unlock_bh (&sched->kss_lock);
1620
1621                         if (!list_empty(&zlist)) {
1622                                 /* free zombie noop txs, it's fast because 
1623                                  * noop txs are just put in freelist */
1624                                 ksocknal_txlist_done(NULL, &zlist, 0);
1625                         }
1626
1627                         rc = ksocknal_process_transmit(conn, tx);
1628
1629                         if (rc == -ENOMEM || rc == -EAGAIN) {
1630                                 /* Incomplete send: replace tx on HEAD of tx_queue */
1631                                 spin_lock_bh (&sched->kss_lock);
1632                                 list_add (&tx->tx_list, &conn->ksnc_tx_queue);
1633                         } else {
1634                                 /* Complete send; tx -ref */
1635                                 ksocknal_tx_decref (tx);
1636
1637                                 spin_lock_bh (&sched->kss_lock);
1638                                 /* assume space for more */
1639                                 conn->ksnc_tx_ready = 1;
1640                         }
1641
1642                         if (rc == -ENOMEM) {
1643                                 /* Do nothing; after a short timeout, this
1644                                  * conn will be reposted on kss_tx_conns. */
1645                         } else if (conn->ksnc_tx_ready &&
1646                                    !list_empty (&conn->ksnc_tx_queue)) {
1647                                 /* reschedule for tx */
1648                                 list_add_tail (&conn->ksnc_tx_list, 
1649                                                &sched->kss_tx_conns);
1650                         } else {
1651                                 conn->ksnc_tx_scheduled = 0;
1652                                 /* drop my ref */
1653                                 ksocknal_conn_decref(conn);
1654                         }
1655                                 
1656                         did_something = 1;
1657                 }
1658                 if (!did_something ||           /* nothing to do */
1659                     ++nloops == SOCKNAL_RESCHED) { /* hogging CPU? */
1660                         spin_unlock_bh (&sched->kss_lock);
1661
1662                         nloops = 0;
1663
1664                         if (!did_something) {   /* wait for something to do */
1665                                 rc = wait_event_interruptible_exclusive(
1666                                         sched->kss_waitq,
1667                                         !ksocknal_sched_cansleep(sched));
1668                                 LASSERT (rc == 0);
1669                         } else {
1670                                 our_cond_resched();
1671                         }
1672
1673                         spin_lock_bh (&sched->kss_lock);
1674                 }
1675         }
1676
1677         spin_unlock_bh (&sched->kss_lock);
1678         ksocknal_thread_fini ();
1679         return (0);
1680 }
1681
1682 /*
1683  * Add connection to kss_rx_conns of scheduler
1684  * and wakeup the scheduler.
1685  */
1686 void ksocknal_read_callback (ksock_conn_t *conn)
1687 {
1688         ksock_sched_t *sched; 
1689         ENTRY;
1690
1691         sched = conn->ksnc_scheduler; 
1692
1693         spin_lock_bh (&sched->kss_lock);
1694
1695         conn->ksnc_rx_ready = 1; 
1696
1697         if (!conn->ksnc_rx_scheduled) {  /* not being progressed */ 
1698                 list_add_tail(&conn->ksnc_rx_list, 
1699                               &sched->kss_rx_conns); 
1700                 conn->ksnc_rx_scheduled = 1; 
1701                 /* extra ref for scheduler */ 
1702                 ksocknal_conn_addref(conn);
1703
1704                 cfs_waitq_signal (&sched->kss_waitq); 
1705         } 
1706         spin_unlock_bh (&sched->kss_lock);
1707
1708         EXIT;
1709
1710
1711 /*
1712  * Add connection to kss_tx_conns of scheduler
1713  * and wakeup the scheduler.
1714  */
1715 void ksocknal_write_callback (ksock_conn_t *conn)
1716
1717         ksock_sched_t *sched; 
1718         ENTRY;
1719         
1720         sched = conn->ksnc_scheduler; 
1721
1722         spin_lock_bh (&sched->kss_lock);
1723
1724         conn->ksnc_tx_ready = 1; 
1725
1726         if (!conn->ksnc_tx_scheduled && // not being progressed 
1727             !list_empty(&conn->ksnc_tx_queue)){//packets to send 
1728                 list_add_tail (&conn->ksnc_tx_list, 
1729                                &sched->kss_tx_conns); 
1730                 conn->ksnc_tx_scheduled = 1; 
1731                 /* extra ref for scheduler */ 
1732                 ksocknal_conn_addref(conn); 
1733
1734                 cfs_waitq_signal (&sched->kss_waitq); 
1735         } 
1736
1737         spin_unlock_bh (&sched->kss_lock);
1738
1739         EXIT;
1740 }
1741
1742 ksock_protocol_t *
1743 ksocknal_compat_protocol (ksock_hello_msg_t *hello)
1744 {
1745         if ((hello->kshm_magic   == LNET_PROTO_MAGIC &&
1746              hello->kshm_version == KSOCK_PROTO_V2) ||
1747             (hello->kshm_magic   == __swab32(LNET_PROTO_MAGIC) &&
1748              hello->kshm_version == __swab32(KSOCK_PROTO_V2)))
1749                 return &ksocknal_protocol_v2x;
1750
1751         if (hello->kshm_magic == le32_to_cpu(LNET_PROTO_TCP_MAGIC)) {
1752                 lnet_magicversion_t *hmv = (lnet_magicversion_t *)hello;
1753
1754                 CLASSERT (sizeof (lnet_magicversion_t) ==
1755                           offsetof (ksock_hello_msg_t, kshm_src_nid));
1756
1757                 if (hmv->version_major == cpu_to_le16 (KSOCK_PROTO_V1_MAJOR) &&
1758                     hmv->version_minor == cpu_to_le16 (KSOCK_PROTO_V1_MINOR))
1759                         return &ksocknal_protocol_v1x;
1760         }
1761
1762         return NULL;
1763 }
1764
1765 static int
1766 ksocknal_send_hello_v1 (ksock_conn_t *conn, ksock_hello_msg_t *hello)
1767 {
1768         cfs_socket_t        *sock = conn->ksnc_sock;
1769         lnet_hdr_t          *hdr;
1770         lnet_magicversion_t *hmv;
1771         int                  rc;
1772         int                  i;
1773
1774         CLASSERT(sizeof(lnet_magicversion_t) == offsetof(lnet_hdr_t, src_nid));
1775
1776         LIBCFS_ALLOC(hdr, sizeof(*hdr));
1777         if (hdr == NULL) {
1778                 CERROR("Can't allocate lnet_hdr_t\n");
1779                 return -ENOMEM;
1780         }
1781
1782         hmv = (lnet_magicversion_t *)&hdr->dest_nid;
1783
1784         /* Re-organize V2.x message header to V1.x (lnet_hdr_t)
1785          * header and send out */
1786         hmv->magic         = cpu_to_le32 (LNET_PROTO_TCP_MAGIC);
1787         hmv->version_major = cpu_to_le16 (KSOCK_PROTO_V1_MAJOR);
1788         hmv->version_minor = cpu_to_le16 (KSOCK_PROTO_V1_MINOR);
1789
1790         if (the_lnet.ln_testprotocompat != 0) {
1791                 /* single-shot proto check */
1792                 LNET_LOCK();
1793                 if ((the_lnet.ln_testprotocompat & 1) != 0) {
1794                         hmv->version_major++;   /* just different! */
1795                         the_lnet.ln_testprotocompat &= ~1;
1796                 }
1797                 if ((the_lnet.ln_testprotocompat & 2) != 0) {
1798                         hmv->magic = LNET_PROTO_MAGIC;
1799                         the_lnet.ln_testprotocompat &= ~2;
1800                 }
1801                 LNET_UNLOCK();
1802         }
1803
1804         hdr->src_nid        = cpu_to_le64 (hello->kshm_src_nid);
1805         hdr->src_pid        = cpu_to_le32 (hello->kshm_src_pid);
1806         hdr->type           = cpu_to_le32 (LNET_MSG_HELLO);
1807         hdr->payload_length = cpu_to_le32 (hello->kshm_nips * sizeof(__u32));
1808         hdr->msg.hello.type = cpu_to_le32 (hello->kshm_ctype);
1809         hdr->msg.hello.incarnation = cpu_to_le64 (hello->kshm_src_incarnation);
1810
1811         rc = libcfs_sock_write(sock, hdr, sizeof(*hdr), lnet_acceptor_timeout());
1812
1813         if (rc != 0) {
1814                 CDEBUG (D_NETERROR, "Error %d sending HELLO hdr to %u.%u.%u.%u/%d\n",
1815                         rc, HIPQUAD(conn->ksnc_ipaddr), conn->ksnc_port);
1816                 goto out;
1817         }
1818
1819         if (hello->kshm_nips == 0)
1820                 goto out;
1821
1822         for (i = 0; i < hello->kshm_nips; i++) {
1823                 hello->kshm_ips[i] = __cpu_to_le32 (hello->kshm_ips[i]);
1824         }
1825         
1826         rc = libcfs_sock_write(sock, hello->kshm_ips,
1827                                hello->kshm_nips * sizeof(__u32),
1828                                lnet_acceptor_timeout());
1829         if (rc != 0) {
1830                 CDEBUG (D_NETERROR, "Error %d sending HELLO payload (%d)"
1831                         " to %u.%u.%u.%u/%d\n", rc, hello->kshm_nips, 
1832                         HIPQUAD(conn->ksnc_ipaddr), conn->ksnc_port);
1833         }
1834 out:
1835         LIBCFS_FREE(hdr, sizeof(*hdr));
1836
1837         return rc;
1838
1839
1840 static int
1841 ksocknal_send_hello_v2 (ksock_conn_t *conn, ksock_hello_msg_t *hello)
1842 {
1843         cfs_socket_t   *sock = conn->ksnc_sock;
1844         int             rc;
1845
1846         hello->kshm_magic       = LNET_PROTO_MAGIC;
1847         hello->kshm_version     = KSOCK_PROTO_V2;
1848
1849         if (the_lnet.ln_testprotocompat != 0) {
1850                 /* single-shot proto check */
1851                 LNET_LOCK();
1852                 if ((the_lnet.ln_testprotocompat & 1) != 0) {
1853                         hello->kshm_version++;   /* just different! */
1854                         the_lnet.ln_testprotocompat &= ~1;
1855                 }
1856                 LNET_UNLOCK();
1857         }
1858
1859         rc = libcfs_sock_write(sock, hello, offsetof(ksock_hello_msg_t, kshm_ips),
1860                                lnet_acceptor_timeout());
1861
1862         if (rc != 0) {
1863                 CDEBUG (D_NETERROR, "Error %d sending HELLO hdr to %u.%u.%u.%u/%d\n",
1864                         rc, HIPQUAD(conn->ksnc_ipaddr), conn->ksnc_port);
1865                 return rc;
1866         }
1867
1868         if (hello->kshm_nips == 0)
1869                 return 0;
1870
1871         rc = libcfs_sock_write(sock, hello->kshm_ips,
1872                                hello->kshm_nips * sizeof(__u32),
1873                                lnet_acceptor_timeout());
1874         if (rc != 0) {
1875                 CDEBUG (D_NETERROR, "Error %d sending HELLO payload (%d)"
1876                         " to %u.%u.%u.%u/%d\n", rc, hello->kshm_nips,
1877                         HIPQUAD(conn->ksnc_ipaddr), conn->ksnc_port);
1878         }
1879
1880         return rc;
1881 }
1882
1883 static int
1884 ksocknal_recv_hello_v1(ksock_conn_t *conn, ksock_hello_msg_t *hello,int timeout)
1885 {
1886         cfs_socket_t        *sock = conn->ksnc_sock;
1887         lnet_hdr_t          *hdr;
1888         int                  rc;
1889         int                  i;
1890
1891         LIBCFS_ALLOC(hdr, sizeof(*hdr));
1892         if (hdr == NULL) {
1893                 CERROR("Can't allocate lnet_hdr_t\n");
1894                 return -ENOMEM;
1895         }
1896
1897         rc = libcfs_sock_read(sock, &hdr->src_nid,
1898                               sizeof (*hdr) - offsetof (lnet_hdr_t, src_nid),
1899                               timeout);
1900         if (rc != 0) {
1901                 CERROR ("Error %d reading rest of HELLO hdr from %u.%u.%u.%u\n",
1902                         rc, HIPQUAD(conn->ksnc_ipaddr));
1903                 LASSERT (rc < 0 && rc != -EALREADY);
1904                 goto out;
1905         }
1906
1907         /* ...and check we got what we expected */
1908         if (hdr->type != cpu_to_le32 (LNET_MSG_HELLO)) {
1909                 CERROR ("Expecting a HELLO hdr,"
1910                         " but got type %d from %u.%u.%u.%u\n",
1911                         le32_to_cpu (hdr->type),
1912                         HIPQUAD(conn->ksnc_ipaddr));
1913                 rc = -EPROTO;
1914                 goto out;
1915         }
1916
1917         hello->kshm_src_nid         = le64_to_cpu (hdr->src_nid);
1918         hello->kshm_src_pid         = le32_to_cpu (hdr->src_pid);
1919         hello->kshm_src_incarnation = le64_to_cpu (hdr->msg.hello.incarnation);
1920         hello->kshm_ctype           = le32_to_cpu (hdr->msg.hello.type);
1921         hello->kshm_nips            = le32_to_cpu (hdr->payload_length) /
1922                                          sizeof (__u32);
1923
1924         if (hello->kshm_nips > LNET_MAX_INTERFACES) {
1925                 CERROR("Bad nips %d from ip %u.%u.%u.%u\n",
1926                        hello->kshm_nips, HIPQUAD(conn->ksnc_ipaddr));
1927                 rc = -EPROTO;
1928                 goto out;
1929         }
1930
1931         if (hello->kshm_nips == 0)
1932                 goto out;
1933
1934         rc = libcfs_sock_read(sock, hello->kshm_ips,
1935                               hello->kshm_nips * sizeof(__u32), timeout);
1936         if (rc != 0) {
1937                 CERROR ("Error %d reading IPs from ip %u.%u.%u.%u\n",
1938                         rc, HIPQUAD(conn->ksnc_ipaddr));
1939                 LASSERT (rc < 0 && rc != -EALREADY);
1940                 goto out;
1941         }
1942
1943         for (i = 0; i < hello->kshm_nips; i++) {
1944                 hello->kshm_ips[i] = __le32_to_cpu(hello->kshm_ips[i]);
1945                 
1946                 if (hello->kshm_ips[i] == 0) {
1947                         CERROR("Zero IP[%d] from ip %u.%u.%u.%u\n",
1948                                i, HIPQUAD(conn->ksnc_ipaddr));
1949                         rc = -EPROTO;
1950                         break;
1951                 }
1952         }
1953 out:
1954         LIBCFS_FREE(hdr, sizeof(*hdr));
1955
1956         return rc;
1957 }
1958
1959 static int
1960 ksocknal_recv_hello_v2 (ksock_conn_t *conn, ksock_hello_msg_t *hello, int timeout) 
1961 {
1962         cfs_socket_t      *sock = conn->ksnc_sock;
1963         int                rc;         
1964         int                i;
1965
1966         if (hello->kshm_magic == LNET_PROTO_MAGIC)
1967                 conn->ksnc_flip = 0;
1968         else
1969                 conn->ksnc_flip = 1;
1970
1971         rc = libcfs_sock_read(sock, &hello->kshm_src_nid,
1972                               offsetof(ksock_hello_msg_t, kshm_ips) -
1973                                        offsetof(ksock_hello_msg_t, kshm_src_nid),
1974                               timeout); 
1975         if (rc != 0) {
1976                 CERROR ("Error %d reading HELLO from %u.%u.%u.%u\n",
1977                         rc, HIPQUAD(conn->ksnc_ipaddr));
1978                 LASSERT (rc < 0 && rc != -EALREADY);
1979                 return rc;
1980         }
1981
1982         if (conn->ksnc_flip) {
1983                 __swab32s(&hello->kshm_src_pid);
1984                 __swab64s(&hello->kshm_src_nid);
1985                 __swab32s(&hello->kshm_dst_pid);
1986                 __swab64s(&hello->kshm_dst_nid);
1987                 __swab64s(&hello->kshm_src_incarnation);
1988                 __swab64s(&hello->kshm_dst_incarnation);
1989                 __swab32s(&hello->kshm_ctype);
1990                 __swab32s(&hello->kshm_nips);
1991         }
1992
1993         if (hello->kshm_nips > LNET_MAX_INTERFACES) {
1994                 CERROR("Bad nips %d from ip %u.%u.%u.%u\n",
1995                        hello->kshm_nips, HIPQUAD(conn->ksnc_ipaddr));
1996                 return -EPROTO;
1997         }
1998
1999         if (hello->kshm_nips == 0)
2000                 return 0;
2001         
2002         rc = libcfs_sock_read(sock, hello->kshm_ips,
2003                               hello->kshm_nips * sizeof(__u32), timeout);
2004         if (rc != 0) {
2005                 CERROR ("Error %d reading IPs from ip %u.%u.%u.%u\n",
2006                         rc, HIPQUAD(conn->ksnc_ipaddr));
2007                 LASSERT (rc < 0 && rc != -EALREADY);
2008                 return rc;
2009         }
2010
2011         for (i = 0; i < hello->kshm_nips; i++) {
2012                 if (conn->ksnc_flip)
2013                         __swab32s(&hello->kshm_ips[i]);
2014                 
2015                 if (hello->kshm_ips[i] == 0) {
2016                         CERROR("Zero IP[%d] from ip %u.%u.%u.%u\n",
2017                                i, HIPQUAD(conn->ksnc_ipaddr));
2018                         return -EPROTO;
2019                 }
2020         }
2021
2022         return 0;
2023 }
2024
2025 static void
2026 ksocknal_pack_msg_v1(ksock_tx_t *tx)
2027 {
2028         /* V1.x has no KSOCK_MSG_NOOP */
2029         LASSERT(tx->tx_msg.ksm_type != KSOCK_MSG_NOOP);
2030         LASSERT(tx->tx_lnetmsg != NULL);
2031
2032         tx->tx_iov[0].iov_base = (void *)&tx->tx_lnetmsg->msg_hdr;
2033         tx->tx_iov[0].iov_len  = sizeof(lnet_hdr_t);
2034
2035         tx->tx_resid = tx->tx_nob = tx->tx_lnetmsg->msg_len + sizeof(lnet_hdr_t);
2036 }
2037
2038 static void
2039 ksocknal_pack_msg_v2(ksock_tx_t *tx)
2040 {
2041         tx->tx_iov[0].iov_base = (void *)&tx->tx_msg;
2042
2043         if (tx->tx_lnetmsg != NULL) {
2044                 LASSERT(tx->tx_msg.ksm_type != KSOCK_MSG_NOOP);
2045
2046                 tx->tx_msg.ksm_u.lnetmsg.ksnm_hdr = tx->tx_lnetmsg->msg_hdr;
2047                 tx->tx_iov[0].iov_len = offsetof(ksock_msg_t, ksm_u.lnetmsg.ksnm_payload);
2048                 tx->tx_resid = tx->tx_nob = offsetof(ksock_msg_t,  ksm_u.lnetmsg.ksnm_payload) +
2049                                             tx->tx_lnetmsg->msg_len;
2050         } else {
2051                 LASSERT(tx->tx_msg.ksm_type == KSOCK_MSG_NOOP);
2052
2053                 tx->tx_iov[0].iov_len = offsetof(ksock_msg_t, ksm_u.lnetmsg.ksnm_hdr);
2054                 tx->tx_resid = tx->tx_nob = offsetof(ksock_msg_t,  ksm_u.lnetmsg.ksnm_hdr);
2055         }
2056         /* Don't checksum before start sending, because packet can be piggybacked with ACK */
2057 }
2058
2059 static void
2060 ksocknal_unpack_msg_v1(ksock_msg_t *msg)
2061 {
2062         msg->ksm_type           = KSOCK_MSG_LNET;
2063         msg->ksm_csum           = 0;
2064         msg->ksm_zc_req_cookie  = 0;
2065         msg->ksm_zc_ack_cookie  = 0;
2066 }
2067
2068 static void
2069 ksocknal_unpack_msg_v2(ksock_msg_t *msg)
2070 {
2071         return;  /* Do nothing */
2072 }
2073
2074 ksock_protocol_t  ksocknal_protocol_v1x =
2075 {
2076         KSOCK_PROTO_V1,
2077         ksocknal_send_hello_v1,
2078         ksocknal_recv_hello_v1,
2079         ksocknal_pack_msg_v1,
2080         ksocknal_unpack_msg_v1
2081 };
2082
2083 ksock_protocol_t  ksocknal_protocol_v2x =
2084 {
2085         KSOCK_PROTO_V2,
2086         ksocknal_send_hello_v2,
2087         ksocknal_recv_hello_v2,
2088         ksocknal_pack_msg_v2,
2089         ksocknal_unpack_msg_v2
2090 };
2091
2092 int
2093 ksocknal_send_hello (lnet_ni_t *ni, ksock_conn_t *conn,
2094                      lnet_nid_t peer_nid, ksock_hello_msg_t *hello)
2095 {
2096         /* CAVEAT EMPTOR: this byte flips 'ipaddrs' */
2097         ksock_net_t         *net = (ksock_net_t *)ni->ni_data;
2098         lnet_nid_t           srcnid;
2099
2100         LASSERT (0 <= hello->kshm_nips && hello->kshm_nips <= LNET_MAX_INTERFACES);
2101
2102         /* No need for getconnsock/putconnsock */
2103         LASSERT (!conn->ksnc_closing);
2104         LASSERT (conn->ksnc_proto != NULL);
2105
2106         srcnid = lnet_ptlcompat_srcnid(ni->ni_nid, peer_nid);
2107
2108         hello->kshm_src_nid         = srcnid;
2109         hello->kshm_dst_nid         = peer_nid;
2110         hello->kshm_src_pid         = the_lnet.ln_pid;
2111
2112         hello->kshm_src_incarnation = net->ksnn_incarnation;
2113         hello->kshm_ctype           = conn->ksnc_type;
2114
2115         return conn->ksnc_proto->pro_send_hello(conn, hello);
2116 }
2117
2118 int
2119 ksocknal_invert_type(int type)
2120 {
2121         switch (type)
2122         {
2123         case SOCKLND_CONN_ANY:
2124         case SOCKLND_CONN_CONTROL:
2125                 return (type);
2126         case SOCKLND_CONN_BULK_IN:
2127                 return SOCKLND_CONN_BULK_OUT;
2128         case SOCKLND_CONN_BULK_OUT:
2129                 return SOCKLND_CONN_BULK_IN;
2130         default:
2131                 return (SOCKLND_CONN_NONE);
2132         }
2133 }
2134
2135 int
2136 ksocknal_recv_hello (lnet_ni_t *ni, ksock_conn_t *conn, 
2137                      ksock_hello_msg_t *hello, lnet_process_id_t *peerid,
2138                      __u64 *incarnation)
2139 {
2140         cfs_socket_t        *sock = conn->ksnc_sock;
2141         int                  active;
2142         int                  timeout;
2143         int                  match = 0;
2144         int                  rc;
2145         ksock_protocol_t    *proto;
2146         lnet_process_id_t    recv_id;
2147
2148         active = (peerid->nid != LNET_NID_ANY);
2149         timeout = active ? *ksocknal_tunables.ksnd_timeout :
2150                             lnet_acceptor_timeout();
2151
2152         rc = libcfs_sock_read(sock, &hello->kshm_magic, sizeof (hello->kshm_magic), timeout);
2153         if (rc != 0) {
2154                 CERROR ("Error %d reading HELLO from %u.%u.%u.%u\n",
2155                         rc, HIPQUAD(conn->ksnc_ipaddr));
2156                 LASSERT (rc < 0 && rc != -EALREADY);
2157                 return rc;
2158         }
2159
2160         if (hello->kshm_magic != LNET_PROTO_MAGIC &&
2161             hello->kshm_magic != __swab32(LNET_PROTO_MAGIC) &&
2162             hello->kshm_magic != le32_to_cpu (LNET_PROTO_TCP_MAGIC)) {
2163                 /* Unexpected magic! */
2164                 if (active ||
2165                     the_lnet.ln_ptlcompat == 0) {
2166                         CERROR ("Bad magic(1) %#08x (%#08x expected) from "
2167                                 "%u.%u.%u.%u\n", __cpu_to_le32 (hello->kshm_magic),
2168                                 LNET_PROTO_TCP_MAGIC,
2169                                 HIPQUAD(conn->ksnc_ipaddr));
2170                         return -EPROTO;
2171                 }
2172
2173                 /* When portals compatibility is set, I may be passed a new
2174                  * connection "blindly" by the acceptor, and I have to
2175                  * determine if my peer has sent an acceptor connection request
2176                  * or not.  This isn't a 'hello', so I'll get the acceptor to
2177                  * look at it... */
2178                 rc = lnet_accept(ni, sock, hello->kshm_magic);
2179                 if (rc != 0)
2180                         return -EPROTO;
2181
2182                 /* ...and if it's OK I'm back to looking for a 'hello'... */
2183                 rc = libcfs_sock_read(sock, &hello->kshm_magic, 
2184                                       sizeof (hello->kshm_magic), timeout);
2185                 if (rc != 0) {
2186                         CERROR ("Error %d reading HELLO from %u.%u.%u.%u\n",
2187                                 rc, HIPQUAD(conn->ksnc_ipaddr));
2188                         LASSERT (rc < 0 && rc != -EALREADY);
2189                         return rc;
2190                 }
2191         
2192                 /* Only need to check V1.x magic */
2193                 if (hello->kshm_magic != le32_to_cpu (LNET_PROTO_TCP_MAGIC)) {
2194                         CERROR ("Bad magic(2) %#08x (%#08x expected) from "
2195                                 "%u.%u.%u.%u\n", __cpu_to_le32 (hello->kshm_magic),
2196                                 LNET_PROTO_TCP_MAGIC,
2197                                 HIPQUAD(conn->ksnc_ipaddr));
2198                         return -EPROTO;
2199                 }
2200         }
2201
2202         rc = libcfs_sock_read(sock, &hello->kshm_version,
2203                               sizeof(hello->kshm_version), timeout);
2204         if (rc != 0) {
2205                 CERROR ("Error %d reading HELLO from %u.%u.%u.%u\n",
2206                         rc, HIPQUAD(conn->ksnc_ipaddr));
2207                 LASSERT (rc < 0 && rc != -EALREADY);
2208                 return rc;
2209         }
2210
2211         proto = ksocknal_compat_protocol(hello);
2212         if (proto == NULL) {
2213                 if (!active) { 
2214                         /* unknown protocol from peer, tell peer my protocol */
2215                         conn->ksnc_proto = &ksocknal_protocol_v2x;
2216                         hello->kshm_nips = 0;
2217                         ksocknal_send_hello(ni, conn, ni->ni_nid, hello);
2218                 }
2219
2220                 CERROR ("Unknown protocol version (%d.x expected)"
2221                         " from %u.%u.%u.%u\n",
2222                         conn->ksnc_proto->pro_version,
2223                         HIPQUAD(conn->ksnc_ipaddr));
2224
2225                 return -EPROTO;
2226         }
2227
2228         if (conn->ksnc_proto == proto)
2229                 match = 1;
2230
2231         conn->ksnc_proto = proto;
2232
2233         /* receive the rest of hello message anyway */
2234         rc = conn->ksnc_proto->pro_recv_hello(conn, hello, timeout);
2235         if (rc != 0) {
2236                 CERROR("Error %d reading or checking hello from from %u.%u.%u.%u\n",
2237                        rc, HIPQUAD(conn->ksnc_ipaddr));
2238                 return rc;
2239         }
2240
2241         if (hello->kshm_src_nid == LNET_NID_ANY) {
2242                 CERROR("Expecting a HELLO hdr with a NID, but got LNET_NID_ANY"
2243                        "from %u.%u.%u.%u\n", HIPQUAD(conn->ksnc_ipaddr));
2244                 return -EPROTO;
2245         }
2246
2247         if (conn->ksnc_port > LNET_ACCEPTOR_MAX_RESERVED_PORT) {          
2248                 /* Userspace NAL assigns peer process ID from socket */
2249                 recv_id.pid = conn->ksnc_port | LNET_PID_USERFLAG;
2250                 recv_id.nid = LNET_MKNID(LNET_NIDNET(ni->ni_nid), conn->ksnc_ipaddr);
2251         } else {
2252                 recv_id.nid = hello->kshm_src_nid;
2253
2254                 if (the_lnet.ln_ptlcompat > 1 && /* portals peers may exist */
2255                     LNET_NIDNET(recv_id.nid) == 0) /* this is one */
2256                         recv_id.pid = the_lnet.ln_pid; /* give it a sensible pid */
2257                 else
2258                         recv_id.pid = hello->kshm_src_pid;
2259
2260         }
2261         
2262         if (!active) {                          /* don't know peer's nid yet */
2263                 *peerid = recv_id;
2264         } else if (peerid->pid != recv_id.pid ||
2265                    !lnet_ptlcompat_matchnid(peerid->nid, recv_id.nid)) {
2266                 LCONSOLE_ERROR_MSG(0x130, "Connected successfully to %s on host"
2267                                    " %u.%u.%u.%u, but they claimed they were "
2268                                    "%s; please check your Lustre "
2269                                    "configuration.\n",
2270                                    libcfs_id2str(*peerid),
2271                                    HIPQUAD(conn->ksnc_ipaddr),
2272                                    libcfs_id2str(recv_id));
2273                 return -EPROTO;
2274         }
2275
2276         if (conn->ksnc_type == SOCKLND_CONN_NONE) {
2277                 /* I've accepted this connection; peer determines type */
2278                 conn->ksnc_type = ksocknal_invert_type(hello->kshm_ctype);
2279                 if (conn->ksnc_type == SOCKLND_CONN_NONE) {
2280                         CERROR ("Unexpected type %d from %s ip %u.%u.%u.%u\n",
2281                                 hello->kshm_ctype, libcfs_id2str(*peerid), 
2282                                 HIPQUAD(conn->ksnc_ipaddr));
2283                         return -EPROTO;
2284                 }
2285         } else if (hello->kshm_ctype == SOCKLND_CONN_NONE) {
2286                 if (match) {
2287                         /* lost a connection race */
2288                         return -EALREADY;
2289                 }
2290                 /* unmatched protocol get SOCKLND_CONN_NONE anyway */
2291         } else if (ksocknal_invert_type(hello->kshm_ctype) != conn->ksnc_type) {
2292                 CERROR ("Mismatched types: me %d, %s ip %u.%u.%u.%u %d\n",
2293                         conn->ksnc_type, libcfs_id2str(*peerid), 
2294                         HIPQUAD(conn->ksnc_ipaddr),
2295                         hello->kshm_ctype);
2296                 return -EPROTO;
2297         }
2298
2299         *incarnation = hello->kshm_src_incarnation;
2300
2301         return 0;
2302 }
2303
2304 void
2305 ksocknal_connect (ksock_route_t *route)
2306 {
2307         CFS_LIST_HEAD    (zombies);
2308         ksock_peer_t     *peer = route->ksnr_peer;
2309         int               type;
2310         int               wanted;
2311         cfs_socket_t     *sock;
2312         cfs_time_t        deadline;
2313         int               retry_later = 0;
2314         int               rc = 0;
2315
2316         deadline = cfs_time_add(cfs_time_current(), 
2317                                 cfs_time_seconds(*ksocknal_tunables.ksnd_timeout));
2318
2319         write_lock_bh (&ksocknal_data.ksnd_global_lock);
2320
2321         LASSERT (route->ksnr_scheduled);
2322         LASSERT (!route->ksnr_connecting);
2323
2324         route->ksnr_connecting = 1;
2325
2326         for (;;) {
2327                 wanted = ksocknal_route_mask() & ~route->ksnr_connected;
2328
2329                 /* stop connecting if peer/route got closed under me, or
2330                  * route got connected while queued */
2331                 if (peer->ksnp_closing || route->ksnr_deleted ||
2332                     wanted == 0) {
2333                         retry_later = 0;
2334                         break;
2335                 }
2336
2337                 /* reschedule if peer is connecting to me */
2338                 if (peer->ksnp_accepting > 0) {
2339                         CDEBUG(D_NET,
2340                                "peer %s(%d) already connecting to me, retry later.\n",
2341                                libcfs_nid2str(peer->ksnp_id.nid), peer->ksnp_accepting);
2342                         retry_later = 1;
2343                 }
2344
2345                 if (retry_later) /* needs reschedule */
2346                         break;
2347                         
2348                 if ((wanted & (1 << SOCKLND_CONN_ANY)) != 0) {
2349                         type = SOCKLND_CONN_ANY;
2350                 } else if ((wanted & (1 << SOCKLND_CONN_CONTROL)) != 0) {
2351                         type = SOCKLND_CONN_CONTROL;
2352                 } else if ((wanted & (1 << SOCKLND_CONN_BULK_IN)) != 0) {
2353                         type = SOCKLND_CONN_BULK_IN;
2354                 } else {
2355                         LASSERT ((wanted & (1 << SOCKLND_CONN_BULK_OUT)) != 0);
2356                         type = SOCKLND_CONN_BULK_OUT;
2357                 }
2358
2359                 write_unlock_bh (&ksocknal_data.ksnd_global_lock);
2360
2361                 if (cfs_time_aftereq(cfs_time_current(), deadline)) {
2362                         rc = -ETIMEDOUT;
2363                         lnet_connect_console_error(rc, peer->ksnp_id.nid,
2364                                                    route->ksnr_ipaddr,
2365                                                    route->ksnr_port);
2366                         goto failed;
2367                 }
2368                 
2369                 rc = lnet_connect(&sock, peer->ksnp_id.nid,
2370                                   route->ksnr_myipaddr, 
2371                                   route->ksnr_ipaddr, route->ksnr_port);
2372                 if (rc != 0)
2373                         goto failed;
2374
2375                 rc = ksocknal_create_conn(peer->ksnp_ni, route, sock, type);
2376
2377                 if (rc < 0) {
2378                         lnet_connect_console_error(rc, peer->ksnp_id.nid,
2379                                                    route->ksnr_ipaddr, 
2380                                                    route->ksnr_port);
2381                         goto failed;
2382                 }
2383
2384                 /* rc == EALREADY means I lost a connection race and my
2385                  * peer is connecting to me.
2386                  * rc == EPROTO means my peer is speaking an older 
2387                  * protocol version. */
2388                 LASSERT (rc == 0 || rc == EALREADY || rc == EPROTO);
2389
2390                 retry_later = rc != 0;
2391                 if (retry_later)
2392                         CDEBUG(D_NET, "peer %s: conn race, retry later.\n",
2393                                libcfs_nid2str(peer->ksnp_id.nid));
2394                 
2395                 write_lock_bh (&ksocknal_data.ksnd_global_lock);
2396         }
2397
2398         route->ksnr_scheduled = 0;
2399         route->ksnr_connecting = 0;
2400
2401         if (retry_later) {
2402                 /* re-queue for attention; this frees me up to handle
2403                  * the peer's incoming connection request */
2404                 ksocknal_launch_connection_locked(route);
2405         }
2406
2407         write_unlock_bh (&ksocknal_data.ksnd_global_lock);
2408         return;
2409
2410  failed:
2411         write_lock_bh (&ksocknal_data.ksnd_global_lock);
2412
2413         route->ksnr_scheduled = 0;
2414         route->ksnr_connecting = 0;
2415
2416         /* This is a retry rather than a new connection */
2417         route->ksnr_retry_interval *= 2;
2418         route->ksnr_retry_interval = 
2419                 MAX(route->ksnr_retry_interval,
2420                     cfs_time_seconds(*ksocknal_tunables.ksnd_min_reconnectms)/1000);
2421         route->ksnr_retry_interval = 
2422                 MIN(route->ksnr_retry_interval,
2423                     cfs_time_seconds(*ksocknal_tunables.ksnd_max_reconnectms)/1000);
2424         
2425         LASSERT (route->ksnr_retry_interval != 0);
2426         route->ksnr_timeout = cfs_time_add(cfs_time_current(),
2427                                            route->ksnr_retry_interval);
2428
2429         if (!list_empty(&peer->ksnp_tx_queue) &&
2430             peer->ksnp_accepting == 0 &&
2431             ksocknal_find_connecting_route_locked(peer) == NULL) {
2432                 /* ksnp_tx_queue is queued on a conn on successful
2433                  * connection */
2434                 LASSERT (list_empty (&peer->ksnp_conns));
2435
2436                 /* take all the blocked packets while I've got the lock and
2437                  * complete below... */
2438                 list_add(&zombies, &peer->ksnp_tx_queue);
2439                 list_del_init(&peer->ksnp_tx_queue);
2440         }
2441
2442 #if 0           /* irrelevent with only eager routes */
2443         if (!route->ksnr_deleted) {
2444                 /* make this route least-favourite for re-selection */
2445                 list_del(&route->ksnr_list);
2446                 list_add_tail(&route->ksnr_list, &peer->ksnp_routes);
2447         }
2448 #endif
2449         write_unlock_bh (&ksocknal_data.ksnd_global_lock);
2450
2451         ksocknal_peer_failed(peer);
2452         ksocknal_txlist_done(peer->ksnp_ni, &zombies, 1);
2453 }
2454
2455 static inline int
2456 ksocknal_connd_connect_route_locked(void)
2457 {
2458         /* Only handle an outgoing connection request if there is someone left
2459          * to handle incoming connections */
2460         return !list_empty(&ksocknal_data.ksnd_connd_routes) &&
2461                 ((ksocknal_data.ksnd_connd_connecting + 1) <
2462                  *ksocknal_tunables.ksnd_nconnds);
2463 }
2464
2465 static inline int
2466 ksocknal_connd_ready(void)
2467 {
2468         int            rc;
2469         
2470         spin_lock_bh (&ksocknal_data.ksnd_connd_lock);
2471         
2472         rc = ksocknal_data.ksnd_shuttingdown ||
2473              !list_empty(&ksocknal_data.ksnd_connd_connreqs) ||
2474              ksocknal_connd_connect_route_locked();
2475         
2476         spin_unlock_bh (&ksocknal_data.ksnd_connd_lock);
2477
2478         return rc;
2479 }
2480
2481 int
2482 ksocknal_connd (void *arg)
2483 {
2484         long               id = (long)arg;
2485         char               name[16];
2486         ksock_connreq_t   *cr;
2487         ksock_route_t     *route;
2488
2489         snprintf (name, sizeof (name), "socknal_cd%02ld", id);
2490         cfs_daemonize (name);
2491         cfs_block_allsigs ();
2492
2493         spin_lock_bh (&ksocknal_data.ksnd_connd_lock);
2494
2495         while (!ksocknal_data.ksnd_shuttingdown) {
2496
2497                 if (!list_empty(&ksocknal_data.ksnd_connd_connreqs)) {
2498                         /* Connection accepted by the listener */
2499                         cr = list_entry(ksocknal_data.ksnd_connd_connreqs.next,
2500                                         ksock_connreq_t, ksncr_list);
2501                         
2502                         list_del(&cr->ksncr_list);
2503                         spin_unlock_bh (&ksocknal_data.ksnd_connd_lock);
2504                         
2505                         ksocknal_create_conn(cr->ksncr_ni, NULL, 
2506                                              cr->ksncr_sock, SOCKLND_CONN_NONE);
2507                         lnet_ni_decref(cr->ksncr_ni);
2508                         LIBCFS_FREE(cr, sizeof(*cr));
2509                         
2510                         spin_lock_bh (&ksocknal_data.ksnd_connd_lock);
2511                 }
2512
2513                 if (ksocknal_connd_connect_route_locked()) {
2514                         /* Connection request */
2515                         route = list_entry (ksocknal_data.ksnd_connd_routes.next,
2516                                             ksock_route_t, ksnr_connd_list);
2517
2518                         list_del (&route->ksnr_connd_list);
2519                         ksocknal_data.ksnd_connd_connecting++;
2520                         spin_unlock_bh (&ksocknal_data.ksnd_connd_lock);
2521
2522                         ksocknal_connect (route);
2523                         ksocknal_route_decref(route);
2524
2525                         spin_lock_bh (&ksocknal_data.ksnd_connd_lock);
2526                         ksocknal_data.ksnd_connd_connecting--;
2527                 }
2528
2529                 spin_unlock_bh (&ksocknal_data.ksnd_connd_lock);
2530
2531                 wait_event_interruptible_exclusive(
2532                         ksocknal_data.ksnd_connd_waitq,
2533                         ksocknal_connd_ready());
2534
2535                 spin_lock_bh (&ksocknal_data.ksnd_connd_lock);
2536         }
2537
2538         spin_unlock_bh (&ksocknal_data.ksnd_connd_lock);
2539
2540         ksocknal_thread_fini ();
2541         return (0);
2542 }
2543
2544 ksock_conn_t *
2545 ksocknal_find_timed_out_conn (ksock_peer_t *peer)
2546 {
2547         /* We're called with a shared lock on ksnd_global_lock */
2548         ksock_conn_t      *conn;
2549         struct list_head  *ctmp;
2550
2551         list_for_each (ctmp, &peer->ksnp_conns) {
2552                 int     error;
2553                 conn = list_entry (ctmp, ksock_conn_t, ksnc_list);
2554
2555                 /* Don't need the {get,put}connsock dance to deref ksnc_sock */
2556                 LASSERT (!conn->ksnc_closing);
2557
2558                 /* SOCK_ERROR will reset error code of socket in
2559                  * some platform (like Darwin8.x) */
2560                 error = SOCK_ERROR(conn->ksnc_sock);
2561                 if (error != 0) {
2562                         ksocknal_conn_addref(conn);
2563
2564                         switch (error) {
2565                         case ECONNRESET:
2566                                 CDEBUG(D_NETERROR, "A connection with %s "
2567                                        "(%u.%u.%u.%u:%d) was reset; "
2568                                        "it may have rebooted.\n",
2569                                        libcfs_id2str(peer->ksnp_id),
2570                                        HIPQUAD(conn->ksnc_ipaddr),
2571                                        conn->ksnc_port);
2572                                 break;
2573                         case ETIMEDOUT:
2574                                 CDEBUG(D_NETERROR, "A connection with %s "
2575                                        "(%u.%u.%u.%u:%d) timed out; the "
2576                                        "network or node may be down.\n",
2577                                        libcfs_id2str(peer->ksnp_id),
2578                                        HIPQUAD(conn->ksnc_ipaddr),
2579                                        conn->ksnc_port);
2580                                 break;
2581                         default:
2582                                 CDEBUG(D_NETERROR, "An unexpected network error %d "
2583                                        "occurred with %s "
2584                                        "(%u.%u.%u.%u:%d\n", error,
2585                                        libcfs_id2str(peer->ksnp_id),
2586                                        HIPQUAD(conn->ksnc_ipaddr),
2587                                        conn->ksnc_port);
2588                                 break;
2589                         }
2590
2591                         return (conn);
2592                 }
2593
2594                 if (conn->ksnc_rx_started &&
2595                     cfs_time_aftereq(cfs_time_current(),
2596                                      conn->ksnc_rx_deadline)) {
2597                         /* Timed out incomplete incoming message */
2598                         ksocknal_conn_addref(conn);
2599                         CDEBUG(D_NETERROR, "Timeout receiving from %s "
2600                                "(%u.%u.%u.%u:%d), state %d wanted %d left %d\n",
2601                                libcfs_id2str(peer->ksnp_id),
2602                                HIPQUAD(conn->ksnc_ipaddr),
2603                                conn->ksnc_port,
2604                                conn->ksnc_rx_state,
2605                                conn->ksnc_rx_nob_wanted,
2606                                conn->ksnc_rx_nob_left);
2607                         return (conn);
2608                 }
2609
2610                 if ((!list_empty(&conn->ksnc_tx_queue) ||
2611                      SOCK_WMEM_QUEUED(conn->ksnc_sock) != 0) &&
2612                     cfs_time_aftereq(cfs_time_current(),
2613                                      conn->ksnc_tx_deadline)) {
2614                         /* Timed out messages queued for sending or
2615                          * buffered in the socket's send buffer */
2616                         ksocknal_conn_addref(conn);
2617                         CDEBUG(D_NETERROR, "Timeout sending data to %s "
2618                                "(%u.%u.%u.%u:%d) the network or that "
2619                                "node may be down.\n",
2620                                libcfs_id2str(peer->ksnp_id),
2621                                HIPQUAD(conn->ksnc_ipaddr),
2622                                conn->ksnc_port);
2623                         return (conn);
2624                 }
2625         }
2626
2627         return (NULL);
2628 }
2629
2630 void
2631 ksocknal_check_peer_timeouts (int idx)
2632 {
2633         struct list_head *peers = &ksocknal_data.ksnd_peers[idx];
2634         struct list_head *ptmp;
2635         ksock_peer_t     *peer;
2636         ksock_conn_t     *conn;
2637
2638  again:
2639         /* NB. We expect to have a look at all the peers and not find any
2640          * connections to time out, so we just use a shared lock while we
2641          * take a look... */
2642         read_lock (&ksocknal_data.ksnd_global_lock);
2643
2644         list_for_each (ptmp, peers) {
2645                 peer = list_entry (ptmp, ksock_peer_t, ksnp_list);
2646                 conn = ksocknal_find_timed_out_conn (peer);
2647
2648                 if (conn != NULL) {
2649                         read_unlock (&ksocknal_data.ksnd_global_lock);
2650
2651                         ksocknal_close_conn_and_siblings (conn, -ETIMEDOUT);
2652
2653                         /* NB we won't find this one again, but we can't
2654                          * just proceed with the next peer, since we dropped
2655                          * ksnd_global_lock and it might be dead already! */
2656                         ksocknal_conn_decref(conn);
2657                         goto again;
2658                 }
2659         }
2660
2661         read_unlock (&ksocknal_data.ksnd_global_lock);
2662 }
2663
2664 int
2665 ksocknal_reaper (void *arg)
2666 {
2667         cfs_waitlink_t     wait;
2668         ksock_conn_t      *conn;
2669         ksock_sched_t     *sched;
2670         struct list_head   enomem_conns;
2671         int                nenomem_conns;
2672         cfs_duration_t     timeout;
2673         int                i;
2674         int                peer_index = 0;
2675         cfs_time_t         deadline = cfs_time_current();
2676
2677         cfs_daemonize ("socknal_reaper");
2678         cfs_block_allsigs ();
2679
2680         CFS_INIT_LIST_HEAD(&enomem_conns);
2681         cfs_waitlink_init (&wait);
2682
2683         spin_lock_bh (&ksocknal_data.ksnd_reaper_lock);
2684
2685         while (!ksocknal_data.ksnd_shuttingdown) {
2686
2687                 if (!list_empty (&ksocknal_data.ksnd_deathrow_conns)) {
2688                         conn = list_entry (ksocknal_data.ksnd_deathrow_conns.next,
2689                                            ksock_conn_t, ksnc_list);
2690                         list_del (&conn->ksnc_list);
2691                         
2692                         spin_unlock_bh (&ksocknal_data.ksnd_reaper_lock);
2693
2694                         ksocknal_terminate_conn (conn);
2695                         ksocknal_conn_decref(conn);
2696
2697                         spin_lock_bh (&ksocknal_data.ksnd_reaper_lock);
2698                         continue;
2699                 }
2700
2701                 if (!list_empty (&ksocknal_data.ksnd_zombie_conns)) {
2702                         conn = list_entry (ksocknal_data.ksnd_zombie_conns.next,
2703                                            ksock_conn_t, ksnc_list);
2704                         list_del (&conn->ksnc_list);
2705                         
2706                         spin_unlock_bh (&ksocknal_data.ksnd_reaper_lock);
2707
2708                         ksocknal_destroy_conn (conn);
2709
2710                         spin_lock_bh (&ksocknal_data.ksnd_reaper_lock);
2711                         continue;
2712                 }
2713
2714                 if (!list_empty (&ksocknal_data.ksnd_enomem_conns)) {
2715                         list_add(&enomem_conns, &ksocknal_data.ksnd_enomem_conns);
2716                         list_del_init(&ksocknal_data.ksnd_enomem_conns);
2717                 }
2718
2719                 spin_unlock_bh (&ksocknal_data.ksnd_reaper_lock);
2720
2721                 /* reschedule all the connections that stalled with ENOMEM... */
2722                 nenomem_conns = 0;
2723                 while (!list_empty (&enomem_conns)) {
2724                         conn = list_entry (enomem_conns.next,
2725                                            ksock_conn_t, ksnc_tx_list);
2726                         list_del (&conn->ksnc_tx_list);
2727
2728                         sched = conn->ksnc_scheduler;
2729
2730                         spin_lock_bh (&sched->kss_lock);
2731
2732                         LASSERT (conn->ksnc_tx_scheduled);
2733                         conn->ksnc_tx_ready = 1;
2734                         list_add_tail(&conn->ksnc_tx_list, &sched->kss_tx_conns);
2735                         cfs_waitq_signal (&sched->kss_waitq);
2736
2737                         spin_unlock_bh (&sched->kss_lock);
2738                         nenomem_conns++;
2739                 }
2740
2741                 /* careful with the jiffy wrap... */
2742                 while ((timeout = cfs_time_sub(deadline,
2743                                                cfs_time_current())) <= 0) {
2744                         const int n = 4;
2745                         const int p = 1;
2746                         int       chunk = ksocknal_data.ksnd_peer_hash_size;
2747
2748                         /* Time to check for timeouts on a few more peers: I do
2749                          * checks every 'p' seconds on a proportion of the peer
2750                          * table and I need to check every connection 'n' times
2751                          * within a timeout interval, to ensure I detect a
2752                          * timeout on any connection within (n+1)/n times the
2753                          * timeout interval. */
2754
2755                         if (*ksocknal_tunables.ksnd_timeout > n * p)
2756                                 chunk = (chunk * n * p) /
2757                                         *ksocknal_tunables.ksnd_timeout;
2758                         if (chunk == 0)
2759                                 chunk = 1;
2760
2761                         for (i = 0; i < chunk; i++) {
2762                                 ksocknal_check_peer_timeouts (peer_index);
2763                                 peer_index = (peer_index + 1) %
2764                                              ksocknal_data.ksnd_peer_hash_size;
2765                         }
2766
2767                         deadline = cfs_time_add(deadline, cfs_time_seconds(p));
2768                 }
2769
2770                 if (nenomem_conns != 0) {
2771                         /* Reduce my timeout if I rescheduled ENOMEM conns.
2772                          * This also prevents me getting woken immediately
2773                          * if any go back on my enomem list. */
2774                         timeout = SOCKNAL_ENOMEM_RETRY;
2775                 }
2776                 ksocknal_data.ksnd_reaper_waketime =
2777                         cfs_time_add(cfs_time_current(), timeout);
2778
2779                 set_current_state (TASK_INTERRUPTIBLE);
2780                 cfs_waitq_add (&ksocknal_data.ksnd_reaper_waitq, &wait);
2781
2782                 if (!ksocknal_data.ksnd_shuttingdown &&
2783                     list_empty (&ksocknal_data.ksnd_deathrow_conns) &&
2784                     list_empty (&ksocknal_data.ksnd_zombie_conns))
2785                         cfs_waitq_timedwait (&wait, CFS_TASK_INTERRUPTIBLE, timeout);
2786
2787                 set_current_state (TASK_RUNNING);
2788                 cfs_waitq_del (&ksocknal_data.ksnd_reaper_waitq, &wait);
2789
2790                 spin_lock_bh (&ksocknal_data.ksnd_reaper_lock);
2791         }
2792
2793         spin_unlock_bh (&ksocknal_data.ksnd_reaper_lock);
2794
2795         ksocknal_thread_fini ();
2796         return (0);
2797 }