// SPDX-License-Identifier: GPL-2.0 #include "vmlinux.h" #include #include #include "bpf_tracing_net.h" char _license[] SEC("license") = "GPL"; enum { BPF_SMC_LISTEN = 10, }; struct smc_sock___local { struct sock sk; struct smc_sock *listen_smc; bool use_fallback; } __attribute__((preserve_access_index)); int smc_cnt = 0; int fallback_cnt = 0; SEC("fentry/smc_release") int BPF_PROG(bpf_smc_release, struct socket *sock) { /* only count from one side (client) */ if (sock->sk->__sk_common.skc_state == BPF_SMC_LISTEN) return 0; smc_cnt++; return 0; } SEC("fentry/smc_switch_to_fallback") int BPF_PROG(bpf_smc_switch_to_fallback, struct smc_sock___local *smc) { /* only count from one side (client) */ if (smc && !smc->listen_smc) fallback_cnt++; return 0; } /* go with default value if no strat was found */ bool default_ip_strat_value = true; struct smc_policy_ip_key { __u32 sip; __u32 dip; }; struct smc_policy_ip_value { __u8 mode; }; struct { __uint(type, BPF_MAP_TYPE_HASH); __uint(key_size, sizeof(struct smc_policy_ip_key)); __uint(value_size, sizeof(struct smc_policy_ip_value)); __uint(max_entries, 128); __uint(map_flags, BPF_F_NO_PREALLOC); } smc_policy_ip SEC(".maps"); static bool smc_check(__u32 src, __u32 dst) { struct smc_policy_ip_value *value; struct smc_policy_ip_key key = { .sip = src, .dip = dst, }; value = bpf_map_lookup_elem(&smc_policy_ip, &key); return value ? value->mode : default_ip_strat_value; } SEC("fmod_ret/update_socket_protocol") int BPF_PROG(smc_run, int family, int type, int protocol) { struct task_struct *task; if (family != AF_INET && family != AF_INET6) return protocol; if ((type & 0xf) != SOCK_STREAM) return protocol; if (protocol != 0 && protocol != IPPROTO_TCP) return protocol; task = bpf_get_current_task_btf(); /* Prevent from affecting other tests */ if (!task || !task->nsproxy->net_ns->smc.hs_ctrl) return protocol; return IPPROTO_SMC; } SEC("struct_ops") int BPF_PROG(bpf_smc_set_tcp_option_cond, const struct tcp_sock *tp, struct inet_request_sock *ireq) { return smc_check(ireq->req.__req_common.skc_daddr, ireq->req.__req_common.skc_rcv_saddr); } SEC("struct_ops") int BPF_PROG(bpf_smc_set_tcp_option, struct tcp_sock *tp) { return smc_check(tp->inet_conn.icsk_inet.sk.__sk_common.skc_rcv_saddr, tp->inet_conn.icsk_inet.sk.__sk_common.skc_daddr); } SEC(".struct_ops") struct smc_hs_ctrl linkcheck = { .name = "linkcheck", .syn_option = (void *)bpf_smc_set_tcp_option, .synack_option = (void *)bpf_smc_set_tcp_option_cond, };