Because srtt and mrtt_us are added as args in bpf_sock_ops at BPF_SOCK_OPS_RTT_CB, a simple check is added to make sure they are both non-zero. $ ./test_progs -t tcp_rtt #373 tcp_rtt:OK Summary: 1/0 PASSED, 0 SKIPPED, 0 FAILED Suggested-by: Stanislav Fomichev <sdf@google.com> Signed-off-by: Philo Lu <lulie@linux.alibaba.com> Link: https://lore.kernel.org/r/20240425161724.73707-3-lulie@linux.alibaba.com Signed-off-by: Martin KaFai Lau <martin.lau@kernel.org>
65 lines
1.3 KiB
C
65 lines
1.3 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
#include <linux/bpf.h>
|
|
#include <bpf/bpf_helpers.h>
|
|
|
|
char _license[] SEC("license") = "GPL";
|
|
|
|
struct tcp_rtt_storage {
|
|
__u32 invoked;
|
|
__u32 dsack_dups;
|
|
__u32 delivered;
|
|
__u32 delivered_ce;
|
|
__u32 icsk_retransmits;
|
|
|
|
__u32 mrtt_us; /* args[0] */
|
|
__u32 srtt; /* args[1] */
|
|
};
|
|
|
|
struct {
|
|
__uint(type, BPF_MAP_TYPE_SK_STORAGE);
|
|
__uint(map_flags, BPF_F_NO_PREALLOC);
|
|
__type(key, int);
|
|
__type(value, struct tcp_rtt_storage);
|
|
} socket_storage_map SEC(".maps");
|
|
|
|
SEC("sockops")
|
|
int _sockops(struct bpf_sock_ops *ctx)
|
|
{
|
|
struct tcp_rtt_storage *storage;
|
|
struct bpf_tcp_sock *tcp_sk;
|
|
int op = (int) ctx->op;
|
|
struct bpf_sock *sk;
|
|
|
|
sk = ctx->sk;
|
|
if (!sk)
|
|
return 1;
|
|
|
|
storage = bpf_sk_storage_get(&socket_storage_map, sk, 0,
|
|
BPF_SK_STORAGE_GET_F_CREATE);
|
|
if (!storage)
|
|
return 1;
|
|
|
|
if (op == BPF_SOCK_OPS_TCP_CONNECT_CB) {
|
|
bpf_sock_ops_cb_flags_set(ctx, BPF_SOCK_OPS_RTT_CB_FLAG);
|
|
return 1;
|
|
}
|
|
|
|
if (op != BPF_SOCK_OPS_RTT_CB)
|
|
return 1;
|
|
|
|
tcp_sk = bpf_tcp_sock(sk);
|
|
if (!tcp_sk)
|
|
return 1;
|
|
|
|
storage->invoked++;
|
|
|
|
storage->dsack_dups = tcp_sk->dsack_dups;
|
|
storage->delivered = tcp_sk->delivered;
|
|
storage->delivered_ce = tcp_sk->delivered_ce;
|
|
storage->icsk_retransmits = tcp_sk->icsk_retransmits;
|
|
|
|
storage->mrtt_us = ctx->args[0];
|
|
storage->srtt = ctx->args[1];
|
|
|
|
return 1;
|
|
}
|