mirror of
https://github.com/torvalds/linux.git
synced 2024-11-18 18:11:56 +00:00
7cf245a37e
Fix all files in samples/bpf to include libbpf header files with the bpf/
prefix, to be consistent with external users of the library. Also ensure
that all includes of exported libbpf header files (those that are exported
on 'make install' of the library) use bracketed includes instead of quoted.
To make sure no new files are introduced that doesn't include the bpf/
prefix in its include, remove tools/lib/bpf from the include path entirely,
and use tools/lib instead.
Fixes: 6910d7d386
("selftests/bpf: Ensure bpf_helper_defs.h are taken from selftests dir")
Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: Jesper Dangaard Brouer <brouer@redhat.com>
Acked-by: Andrii Nakryiko <andriin@fb.com>
Link: https://lore.kernel.org/bpf/157952560911.1683545.8795966751309534150.stgit@toke.dk
82 lines
2.1 KiB
C
82 lines
2.1 KiB
C
/* Copyright (c) 2017 Facebook
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of version 2 of the GNU General Public
|
|
* License as published by the Free Software Foundation.
|
|
*
|
|
* BPF program to set initial receive window to 40 packets and send
|
|
* and receive buffers to 1.5MB. This would usually be done after
|
|
* doing appropriate checks that indicate the hosts are far enough
|
|
* away (i.e. large RTT).
|
|
*
|
|
* Use "bpftool cgroup attach $cg sock_ops $prog" to load this BPF program.
|
|
*/
|
|
|
|
#include <uapi/linux/bpf.h>
|
|
#include <uapi/linux/if_ether.h>
|
|
#include <uapi/linux/if_packet.h>
|
|
#include <uapi/linux/ip.h>
|
|
#include <linux/socket.h>
|
|
#include <bpf/bpf_helpers.h>
|
|
#include <bpf/bpf_endian.h>
|
|
|
|
#define DEBUG 1
|
|
|
|
SEC("sockops")
|
|
int bpf_bufs(struct bpf_sock_ops *skops)
|
|
{
|
|
int bufsize = 1500000;
|
|
int rwnd_init = 40;
|
|
int rv = 0;
|
|
int op;
|
|
|
|
/* For testing purposes, only execute rest of BPF program
|
|
* if neither port numberis 55601
|
|
*/
|
|
if (bpf_ntohl(skops->remote_port) != 55601 &&
|
|
skops->local_port != 55601) {
|
|
skops->reply = -1;
|
|
return 1;
|
|
}
|
|
|
|
op = (int) skops->op;
|
|
|
|
#ifdef DEBUG
|
|
bpf_printk("Returning %d\n", rv);
|
|
#endif
|
|
|
|
/* Usually there would be a check to insure the hosts are far
|
|
* from each other so it makes sense to increase buffer sizes
|
|
*/
|
|
switch (op) {
|
|
case BPF_SOCK_OPS_RWND_INIT:
|
|
rv = rwnd_init;
|
|
break;
|
|
case BPF_SOCK_OPS_TCP_CONNECT_CB:
|
|
/* Set sndbuf and rcvbuf of active connections */
|
|
rv = bpf_setsockopt(skops, SOL_SOCKET, SO_SNDBUF, &bufsize,
|
|
sizeof(bufsize));
|
|
rv += bpf_setsockopt(skops, SOL_SOCKET, SO_RCVBUF,
|
|
&bufsize, sizeof(bufsize));
|
|
break;
|
|
case BPF_SOCK_OPS_ACTIVE_ESTABLISHED_CB:
|
|
/* Nothing to do */
|
|
break;
|
|
case BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB:
|
|
/* Set sndbuf and rcvbuf of passive connections */
|
|
rv = bpf_setsockopt(skops, SOL_SOCKET, SO_SNDBUF, &bufsize,
|
|
sizeof(bufsize));
|
|
rv += bpf_setsockopt(skops, SOL_SOCKET, SO_RCVBUF,
|
|
&bufsize, sizeof(bufsize));
|
|
break;
|
|
default:
|
|
rv = -1;
|
|
}
|
|
#ifdef DEBUG
|
|
bpf_printk("Returning %d\n", rv);
|
|
#endif
|
|
skops->reply = rv;
|
|
return 1;
|
|
}
|
|
char _license[] SEC("license") = "GPL";
|