^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) /* Copyright (c) 2017 Facebook
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3) * This program is free software; you can redistribute it and/or
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4) * modify it under the terms of version 2 of the GNU General Public
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5) * License as published by the Free Software Foundation.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7) * BPF program to set initial receive window to 40 packets and send
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8) * and receive buffers to 1.5MB. This would usually be done after
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9) * doing appropriate checks that indicate the hosts are far enough
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) * away (i.e. large RTT).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) * Use "bpftool cgroup attach $cg sock_ops $prog" to load this BPF program.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) #include <uapi/linux/bpf.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) #include <uapi/linux/if_ether.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) #include <uapi/linux/if_packet.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18) #include <uapi/linux/ip.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) #include <linux/socket.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20) #include <bpf/bpf_helpers.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) #include <bpf/bpf_endian.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) #define DEBUG 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25) SEC("sockops")
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26) int bpf_bufs(struct bpf_sock_ops *skops)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28) int bufsize = 1500000;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) int rwnd_init = 40;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30) int rv = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31) int op;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33) /* For testing purposes, only execute rest of BPF program
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34) * if neither port numberis 55601
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36) if (bpf_ntohl(skops->remote_port) != 55601 &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) skops->local_port != 55601) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38) skops->reply = -1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39) return 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) op = (int) skops->op;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44) #ifdef DEBUG
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45) bpf_printk("Returning %d\n", rv);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46) #endif
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 47)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 48) /* Usually there would be a check to insure the hosts are far
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 49) * from each other so it makes sense to increase buffer sizes
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 50) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 51) switch (op) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 52) case BPF_SOCK_OPS_RWND_INIT:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 53) rv = rwnd_init;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 54) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 55) case BPF_SOCK_OPS_TCP_CONNECT_CB:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 56) /* Set sndbuf and rcvbuf of active connections */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 57) rv = bpf_setsockopt(skops, SOL_SOCKET, SO_SNDBUF, &bufsize,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 58) sizeof(bufsize));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 59) rv += bpf_setsockopt(skops, SOL_SOCKET, SO_RCVBUF,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 60) &bufsize, sizeof(bufsize));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 61) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 62) case BPF_SOCK_OPS_ACTIVE_ESTABLISHED_CB:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 63) /* Nothing to do */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 64) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 65) case BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 66) /* Set sndbuf and rcvbuf of passive connections */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 67) rv = bpf_setsockopt(skops, SOL_SOCKET, SO_SNDBUF, &bufsize,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 68) sizeof(bufsize));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 69) rv += bpf_setsockopt(skops, SOL_SOCKET, SO_RCVBUF,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 70) &bufsize, sizeof(bufsize));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 71) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 72) default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 73) rv = -1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 74) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 75) #ifdef DEBUG
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 76) bpf_printk("Returning %d\n", rv);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 77) #endif
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 78) skops->reply = rv;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 79) return 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 80) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 81) char _license[] SEC("license") = "GPL";