1
From: Geliang Tang <tanggeliang@kylinos.cn>
1
From: Geliang Tang <tanggeliang@kylinos.cn>
2
2
3
v3:
4
- patch 3, continue to use sock_owned_by_user_nocheck() and spin_is_locked()
5
checks instead of using msk_owned_by_me().
6
- patch 5, drop declaration of bpf_mptcp_subflow_tcp_sock. It's no longer
7
used.
8
- patch 5, update the comment for mptcp_subflow_tcp_sock(), which is a BPF
9
helper, not a kfunc.
10
11
The commit log of "bpf: Register mptcp common kfunc set" doesn't match the
12
code, please update it as:
13
14
'''
15
bpf: Register mptcp common kfunc set
16
17
MPTCP helper mptcp_subflow_ctx() is used to convert struct sock to
18
struct mptcp_subflow_context. It will be used in MPTCP BPF programs.
19
20
This patch defines corresponding wrapper of this helper, and put it
21
into the newly defined mptcp common kfunc set and register this set
22
with the flag BPF_PROG_TYPE_CGROUP_SOCKOPT to let it accessible to
23
the 'cgroup/getsockopt' type of BPF programs.
24
'''
25
3
v2:
26
v2:
4
- add CONFIG_LOCKDEP check in patch 2 to fix the build error reported
27
- Drop bpf_skc_to_mptcp_sock
5
by CI.
28
- Check the owner before assigning the msk as Mat suggested.
29
- Use bpf_core_cast() in mptcp_subflow bpf_iter subtest instead of
30
using bpf_skc_to_mptcp_sock().
6
31
7
Address Martin's comments in v1.
32
Address Martin's suggestions for "Add mptcp_subflow bpf_iter support" v2.
8
33
9
Geliang Tang (3):
34
Geliang Tang (5):
10
Squash to "bpf: Register mptcp common kfunc set"
35
Revert "bpf: Extend bpf_skc_to_mptcp_sock to MPTCP sock"
36
Revert "bpf: Allow use of skc_to_mptcp_sock in cg_sockopt"
11
Squash to "bpf: Add mptcp_subflow bpf_iter"
37
Squash to "bpf: Add mptcp_subflow bpf_iter"
38
Revert "bpf: Acquire and release mptcp socket"
12
Squash to "selftests/bpf: Add mptcp_subflow bpf_iter subtest"
39
Squash to "selftests/bpf: Add mptcp_subflow bpf_iter subtest"
13
40
14
net/mptcp/bpf.c | 22 ++++++++++++++-----
41
include/net/mptcp.h | 4 +-
15
.../selftests/bpf/progs/mptcp_bpf_iters.c | 7 +++---
42
kernel/bpf/cgroup.c | 2 -
16
2 files changed, 20 insertions(+), 9 deletions(-)
43
net/core/filter.c | 2 +-
44
net/mptcp/bpf.c | 41 +++++--------------
45
.../testing/selftests/bpf/bpf_experimental.h | 2 +-
46
tools/testing/selftests/bpf/progs/mptcp_bpf.h | 5 ---
47
.../selftests/bpf/progs/mptcp_bpf_iters.c | 10 ++---
48
7 files changed, 17 insertions(+), 49 deletions(-)
17
49
18
--
50
--
19
2.45.2
51
2.43.0
diff view generated by jsdifflib
New patch
1
From: Geliang Tang <tanggeliang@kylinos.cn>
1
2
3
bpf_core_cast() can be used in mptcp_subflow bpf_iter selftests to get the
4
msk, instead of using bpf_skc_to_mptcp_sock(). No need to add this patch
5
anymore, revert it.
6
7
Signed-off-by: Geliang Tang <tanggeliang@kylinos.cn>
8
---
9
include/net/mptcp.h | 4 ++--
10
net/core/filter.c | 2 +-
11
net/mptcp/bpf.c | 10 ++--------
12
3 files changed, 5 insertions(+), 11 deletions(-)
13
14
diff --git a/include/net/mptcp.h b/include/net/mptcp.h
15
index XXXXXXX..XXXXXXX 100644
16
--- a/include/net/mptcp.h
17
+++ b/include/net/mptcp.h
18
@@ -XXX,XX +XXX,XX @@ static inline void mptcpv6_handle_mapped(struct sock *sk, bool mapped) { }
19
#endif
20
21
#if defined(CONFIG_MPTCP) && defined(CONFIG_BPF_SYSCALL)
22
-struct mptcp_sock *bpf_mptcp_sock_from_sock(struct sock *sk);
23
+struct mptcp_sock *bpf_mptcp_sock_from_subflow(struct sock *sk);
24
#else
25
-static inline struct mptcp_sock *bpf_mptcp_sock_from_sock(struct sock *sk) { return NULL; }
26
+static inline struct mptcp_sock *bpf_mptcp_sock_from_subflow(struct sock *sk) { return NULL; }
27
#endif
28
29
#if !IS_ENABLED(CONFIG_MPTCP)
30
diff --git a/net/core/filter.c b/net/core/filter.c
31
index XXXXXXX..XXXXXXX 100644
32
--- a/net/core/filter.c
33
+++ b/net/core/filter.c
34
@@ -XXX,XX +XXX,XX @@ const struct bpf_func_proto bpf_skc_to_unix_sock_proto = {
35
BPF_CALL_1(bpf_skc_to_mptcp_sock, struct sock *, sk)
36
{
37
    BTF_TYPE_EMIT(struct mptcp_sock);
38
-    return (unsigned long)bpf_mptcp_sock_from_sock(sk);
39
+    return (unsigned long)bpf_mptcp_sock_from_subflow(sk);
40
}
41
42
const struct bpf_func_proto bpf_skc_to_mptcp_sock_proto = {
43
diff --git a/net/mptcp/bpf.c b/net/mptcp/bpf.c
44
index XXXXXXX..XXXXXXX 100644
45
--- a/net/mptcp/bpf.c
46
+++ b/net/mptcp/bpf.c
47
@@ -XXX,XX +XXX,XX @@ static struct bpf_struct_ops bpf_mptcp_sched_ops = {
48
};
49
#endif /* CONFIG_BPF_JIT */
50
51
-struct mptcp_sock *bpf_mptcp_sock_from_sock(struct sock *sk)
52
+struct mptcp_sock *bpf_mptcp_sock_from_subflow(struct sock *sk)
53
{
54
-    if (unlikely(!sk || !sk_fullsock(sk)))
55
-        return NULL;
56
-
57
-    if (sk->sk_protocol == IPPROTO_MPTCP)
58
-        return mptcp_sk(sk);
59
-
60
-    if (sk->sk_protocol == IPPROTO_TCP && sk_is_mptcp(sk))
61
+    if (sk && sk_fullsock(sk) && sk->sk_protocol == IPPROTO_TCP && sk_is_mptcp(sk))
62
        return mptcp_sk(mptcp_subflow_ctx(sk)->conn);
63
64
    return NULL;
65
--
66
2.43.0
diff view generated by jsdifflib
New patch
1
From: Geliang Tang <tanggeliang@kylinos.cn>
1
2
3
bpf_core_cast() can be used in mptcp_subflow bpf_iter selftests to get the
4
msk, instead of using bpf_skc_to_mptcp_sock(). No need to add this patch
5
anymore, revert it.
6
7
This reverts commit d8d42f5a4542c2dc31e4e00c58508a821c6ab789.
8
---
9
kernel/bpf/cgroup.c | 2 --
10
1 file changed, 2 deletions(-)
11
12
diff --git a/kernel/bpf/cgroup.c b/kernel/bpf/cgroup.c
13
index XXXXXXX..XXXXXXX 100644
14
--- a/kernel/bpf/cgroup.c
15
+++ b/kernel/bpf/cgroup.c
16
@@ -XXX,XX +XXX,XX @@ cg_sockopt_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog)
17
#ifdef CONFIG_INET
18
    case BPF_FUNC_tcp_sock:
19
        return &bpf_tcp_sock_proto;
20
-    case BPF_FUNC_skc_to_mptcp_sock:
21
-        return &bpf_skc_to_mptcp_sock_proto;
22
#endif
23
    case BPF_FUNC_perf_event_output:
24
        return &bpf_event_output_data_proto;
25
--
26
2.43.0
diff view generated by jsdifflib
1
From: Geliang Tang <tanggeliang@kylinos.cn>
1
From: Geliang Tang <tanggeliang@kylinos.cn>
2
2
3
Address Martin's comments in v1:
3
Drop the NULL check for 'msk' as Martin suggested, add more checks
4
for 'sk'.
4
5
5
- bpf_iter_mptcp_subflow_new returns -EINVAL when msk socket lock isn't
6
Use the "struct sock *sk" instead of "struct mptcp-sock *msk" as the
6
held.
7
argument in the bpf_iter_mptcp_subflow_new as Martin suggested.
8
9
v3:
10
- continue to use sock_owned_by_user_nocheck and spin_is_locked
11
checks instead of using msk_owned_by_me().
12
13
v2:
14
- check the owner before assigning the msk as Mat suggested.
7
15
8
Signed-off-by: Geliang Tang <tanggeliang@kylinos.cn>
16
Signed-off-by: Geliang Tang <tanggeliang@kylinos.cn>
9
---
17
---
10
net/mptcp/bpf.c | 5 ++++-
18
net/mptcp/bpf.c | 12 ++++++++----
11
1 file changed, 4 insertions(+), 1 deletion(-)
19
1 file changed, 8 insertions(+), 4 deletions(-)
12
20
13
diff --git a/net/mptcp/bpf.c b/net/mptcp/bpf.c
21
diff --git a/net/mptcp/bpf.c b/net/mptcp/bpf.c
14
index XXXXXXX..XXXXXXX 100644
22
index XXXXXXX..XXXXXXX 100644
15
--- a/net/mptcp/bpf.c
23
--- a/net/mptcp/bpf.c
16
+++ b/net/mptcp/bpf.c
24
+++ b/net/mptcp/bpf.c
17
@@ -XXX,XX +XXX,XX @@ bpf_iter_mptcp_subflow_new(struct bpf_iter_mptcp_subflow *it,
25
@@ -XXX,XX +XXX,XX @@ bpf_mptcp_subflow_ctx(const struct sock *sk)
18
    if (!msk)
26
27
__bpf_kfunc static int
28
bpf_iter_mptcp_subflow_new(struct bpf_iter_mptcp_subflow *it,
29
-             struct mptcp_sock *msk)
30
+             struct sock *sk)
31
{
32
    struct bpf_iter_mptcp_subflow_kern *kit = (void *)it;
33
-    struct sock *sk = (struct sock *)msk;
34
+    struct mptcp_sock *msk;
35
36
    BUILD_BUG_ON(sizeof(struct bpf_iter_mptcp_subflow_kern) >
37
         sizeof(struct bpf_iter_mptcp_subflow));
38
    BUILD_BUG_ON(__alignof__(struct bpf_iter_mptcp_subflow_kern) !=
39
         __alignof__(struct bpf_iter_mptcp_subflow));
40
41
-    kit->msk = msk;
42
-    if (!msk)
43
+    if (unlikely(!sk || !sk_fullsock(sk)))
44
+        return -EINVAL;
45
+
46
+    if (sk->sk_protocol != IPPROTO_MPTCP)
19
        return -EINVAL;
47
        return -EINVAL;
20
48
21
-    msk_owned_by_me(msk);
49
    if (!sock_owned_by_user_nocheck(sk) &&
22
+#ifdef CONFIG_LOCKDEP
50
     !spin_is_locked(&sk->sk_lock.slock))
23
+    if (!lockdep_sock_is_held((const struct sock *)msk))
51
        return -EINVAL;
24
+        return -EINVAL;
52
25
+#endif
53
+    msk = mptcp_sk(sk);
26
54
+    kit->msk = msk;
27
    kit->pos = &msk->conn_list;
55
    kit->pos = &msk->conn_list;
28
    return 0;
56
    return 0;
57
}
29
--
58
--
30
2.45.2
59
2.43.0
diff view generated by jsdifflib
1
From: Geliang Tang <tanggeliang@kylinos.cn>
1
From: Geliang Tang <tanggeliang@kylinos.cn>
2
2
3
Address Martin's comments in v1:
3
Drop this patch as Martin suggested.
4
5
- check IPPROTO_MPTCP in bpf_mptcp_sk.
6
- add null-checks for the wrappers.
7
- add more BPF flags for the wrappers.
8
- register this kfunc set to BPF_PROG_TYPE_CGROUP_SOCKOPT only,
9
not BPF_PROG_TYPE_UNSPEC.
10
4
11
Signed-off-by: Geliang Tang <tanggeliang@kylinos.cn>
5
Signed-off-by: Geliang Tang <tanggeliang@kylinos.cn>
12
---
6
---
13
net/mptcp/bpf.c | 17 +++++++++++++----
7
net/mptcp/bpf.c | 19 -------------------
14
1 file changed, 13 insertions(+), 4 deletions(-)
8
1 file changed, 19 deletions(-)
15
9
16
diff --git a/net/mptcp/bpf.c b/net/mptcp/bpf.c
10
diff --git a/net/mptcp/bpf.c b/net/mptcp/bpf.c
17
index XXXXXXX..XXXXXXX 100644
11
index XXXXXXX..XXXXXXX 100644
18
--- a/net/mptcp/bpf.c
12
--- a/net/mptcp/bpf.c
19
+++ b/net/mptcp/bpf.c
13
+++ b/net/mptcp/bpf.c
20
@@ -XXX,XX +XXX,XX @@ __bpf_kfunc_start_defs();
14
@@ -XXX,XX +XXX,XX @@ bpf_iter_mptcp_subflow_destroy(struct bpf_iter_mptcp_subflow *it)
21
22
__bpf_kfunc static struct mptcp_sock *bpf_mptcp_sk(struct sock *sk)
23
{
15
{
24
+    if (!sk || sk->sk_protocol != IPPROTO_MPTCP)
25
+        return NULL;
26
+
27
    return mptcp_sk(sk);
28
}
16
}
29
17
30
__bpf_kfunc static struct mptcp_subflow_context *
18
-__bpf_kfunc static struct
31
bpf_mptcp_subflow_ctx(const struct sock *sk)
19
-mptcp_sock *bpf_mptcp_sock_acquire(struct mptcp_sock *msk)
20
-{
21
-    struct sock *sk = (struct sock *)msk;
22
-
23
-    if (sk && refcount_inc_not_zero(&sk->sk_refcnt))
24
-        return msk;
25
-    return NULL;
26
-}
27
-
28
-__bpf_kfunc static void bpf_mptcp_sock_release(struct mptcp_sock *msk)
29
-{
30
-    struct sock *sk = (struct sock *)msk;
31
-
32
-    WARN_ON_ONCE(!sk || !refcount_dec_not_one(&sk->sk_refcnt));
33
-}
34
-
35
__bpf_kfunc struct mptcp_subflow_context *
36
bpf_mptcp_subflow_ctx_by_pos(const struct mptcp_sched_data *data, unsigned int pos)
32
{
37
{
33
+    if (!sk)
38
@@ -XXX,XX +XXX,XX @@ BTF_ID_FLAGS(func, bpf_mptcp_subflow_ctx, KF_RET_NULL)
34
+        return NULL;
35
+
36
    return mptcp_subflow_ctx(sk);
37
}
38
39
__bpf_kfunc static struct sock *
40
bpf_mptcp_subflow_tcp_sock(const struct mptcp_subflow_context *subflow)
41
{
42
+    if (!subflow)
43
+        return NULL;
44
+
45
    return mptcp_subflow_tcp_sock(subflow);
46
}
47
48
@@ -XXX,XX +XXX,XX @@ __bpf_kfunc static bool bpf_mptcp_subflow_queues_empty(struct sock *sk)
49
__bpf_kfunc_end_defs();
50
51
BTF_KFUNCS_START(bpf_mptcp_common_kfunc_ids)
52
-BTF_ID_FLAGS(func, bpf_mptcp_sk)
53
-BTF_ID_FLAGS(func, bpf_mptcp_subflow_ctx)
54
-BTF_ID_FLAGS(func, bpf_mptcp_subflow_tcp_sock)
55
+BTF_ID_FLAGS(func, bpf_mptcp_sk, KF_TRUSTED_ARGS | KF_RET_NULL)
56
+BTF_ID_FLAGS(func, bpf_mptcp_subflow_ctx, KF_RET_NULL)
57
+BTF_ID_FLAGS(func, bpf_mptcp_subflow_tcp_sock, KF_RET_NULL)
58
BTF_ID_FLAGS(func, bpf_iter_mptcp_subflow_new, KF_ITER_NEW | KF_TRUSTED_ARGS)
39
BTF_ID_FLAGS(func, bpf_iter_mptcp_subflow_new, KF_ITER_NEW | KF_TRUSTED_ARGS)
59
BTF_ID_FLAGS(func, bpf_iter_mptcp_subflow_next, KF_ITER_NEXT | KF_RET_NULL)
40
BTF_ID_FLAGS(func, bpf_iter_mptcp_subflow_next, KF_ITER_NEXT | KF_RET_NULL)
60
BTF_ID_FLAGS(func, bpf_iter_mptcp_subflow_destroy, KF_ITER_DESTROY)
41
BTF_ID_FLAGS(func, bpf_iter_mptcp_subflow_destroy, KF_ITER_DESTROY)
61
@@ -XXX,XX +XXX,XX @@ static int __init bpf_mptcp_kfunc_init(void)
42
-BTF_ID_FLAGS(func, bpf_mptcp_sock_acquire, KF_ACQUIRE | KF_RET_NULL)
62
    int ret;
43
-BTF_ID_FLAGS(func, bpf_mptcp_sock_release, KF_RELEASE)
63
44
BTF_KFUNCS_END(bpf_mptcp_common_kfunc_ids)
64
    ret = register_btf_fmodret_id_set(&bpf_mptcp_fmodret_set);
45
65
-    ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_UNSPEC,
46
static const struct btf_kfunc_id_set bpf_mptcp_common_kfunc_set = {
66
+    ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_CGROUP_SOCKOPT,
67
                     &bpf_mptcp_common_kfunc_set);
68
    ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_STRUCT_OPS,
69
                     &bpf_mptcp_sched_kfunc_set);
70
--
47
--
71
2.45.2
48
2.43.0
diff view generated by jsdifflib
1
From: Geliang Tang <tanggeliang@kylinos.cn>
1
From: Geliang Tang <tanggeliang@kylinos.cn>
2
2
3
IPPROTO_MPTCP is checked in bpf_mptcp_sk(), no need to check it in BPF
3
Use bpf_core_cast() instead of bpf_skc_to_mptcp_sock().
4
program.
4
Change the 2nd parameter type of bpf_for_each() as 'struct sock'.
5
Drop use of bpf_mptcp_sock_acquire/release.
6
Drop declaration of bpf_mptcp_subflow_tcp_sock. It's no longer used.
7
Update the comment for mptcp_subflow_tcp_sock(), which is a BPF helper,
8
not a kfunc.
5
9
6
bpf_mptcp_sk() and bpf_mptcp_subflow_ctx() may return NULL, need to
10
Please update the commit log as:
7
check the return values.
11
12
'''
13
This patch adds a "cgroup/getsockopt" program "iters_subflow" to test the
14
newly added mptcp_subflow bpf_iter.
15
16
Export mptcp_subflow helpers bpf_iter_mptcp_subflow_new/_next/_destroy
17
and other helpers into bpf_experimental.h.
18
19
Use bpf_for_each() to walk the subflow list of this msk. MPTCP-specific
20
packet scheduler kfunc can be called in the loop. In this test, just
21
add all subflow ids to local variable local_ids, then invoke the helper
22
mptcp_subflow_tcp_sock() in the loop to pick a subsocket.
23
24
Out of the loop, use bpf_mptcp_subflow_ctx() to get the subflow context
25
of the picked subsocket and do some verification. Finally, assign
26
local_ids to global variable ids so that the application can obtain this
27
value.
28
29
Add a subtest named test_iters_subflow to load and verify the newly added
30
mptcp_subflow type bpf_iter example in test_mptcp. Use the helper
31
endpoint_init() to add 3 new subflow endpoints. Send a byte of message
32
to start the mptcp connection, and wait for new subflows to be added.
33
getsockopt() is invoked to trigger the "cgroup/getsockopt" test program
34
"iters_subflow". Check if skel->bss->ids equals 10 to verify whether this
35
mptcp_subflow bpf_iter loops correctly as expected.
36
'''
8
37
9
Signed-off-by: Geliang Tang <tanggeliang@kylinos.cn>
38
Signed-off-by: Geliang Tang <tanggeliang@kylinos.cn>
10
---
39
---
11
tools/testing/selftests/bpf/progs/mptcp_bpf_iters.c | 7 +++----
40
tools/testing/selftests/bpf/bpf_experimental.h | 2 +-
12
1 file changed, 3 insertions(+), 4 deletions(-)
41
tools/testing/selftests/bpf/progs/mptcp_bpf.h | 5 -----
42
tools/testing/selftests/bpf/progs/mptcp_bpf_iters.c | 10 +++-------
43
3 files changed, 4 insertions(+), 13 deletions(-)
13
44
45
diff --git a/tools/testing/selftests/bpf/bpf_experimental.h b/tools/testing/selftests/bpf/bpf_experimental.h
46
index XXXXXXX..XXXXXXX 100644
47
--- a/tools/testing/selftests/bpf/bpf_experimental.h
48
+++ b/tools/testing/selftests/bpf/bpf_experimental.h
49
@@ -XXX,XX +XXX,XX @@ extern void bpf_iter_css_destroy(struct bpf_iter_css *it) __weak __ksym;
50
51
struct bpf_iter_mptcp_subflow;
52
extern int bpf_iter_mptcp_subflow_new(struct bpf_iter_mptcp_subflow *it,
53
-                 struct mptcp_sock *msk) __weak __ksym;
54
+                 struct sock *sk) __weak __ksym;
55
extern struct mptcp_subflow_context *
56
bpf_iter_mptcp_subflow_next(struct bpf_iter_mptcp_subflow *it) __weak __ksym;
57
extern void
58
diff --git a/tools/testing/selftests/bpf/progs/mptcp_bpf.h b/tools/testing/selftests/bpf/progs/mptcp_bpf.h
59
index XXXXXXX..XXXXXXX 100644
60
--- a/tools/testing/selftests/bpf/progs/mptcp_bpf.h
61
+++ b/tools/testing/selftests/bpf/progs/mptcp_bpf.h
62
@@ -XXX,XX +XXX,XX @@ mptcp_subflow_tcp_sock(const struct mptcp_subflow_context *subflow)
63
}
64
65
/* ksym */
66
-extern struct mptcp_sock *bpf_mptcp_sock_acquire(struct mptcp_sock *msk) __ksym;
67
-extern void bpf_mptcp_sock_release(struct mptcp_sock *msk) __ksym;
68
-
69
extern struct mptcp_subflow_context *
70
bpf_mptcp_subflow_ctx(const struct sock *sk) __ksym;
71
-extern struct sock *
72
-bpf_mptcp_subflow_tcp_sock(const struct mptcp_subflow_context *subflow) __ksym;
73
74
extern void mptcp_subflow_set_scheduled(struct mptcp_subflow_context *subflow,
75
                    bool scheduled) __ksym;
14
diff --git a/tools/testing/selftests/bpf/progs/mptcp_bpf_iters.c b/tools/testing/selftests/bpf/progs/mptcp_bpf_iters.c
76
diff --git a/tools/testing/selftests/bpf/progs/mptcp_bpf_iters.c b/tools/testing/selftests/bpf/progs/mptcp_bpf_iters.c
15
index XXXXXXX..XXXXXXX 100644
77
index XXXXXXX..XXXXXXX 100644
16
--- a/tools/testing/selftests/bpf/progs/mptcp_bpf_iters.c
78
--- a/tools/testing/selftests/bpf/progs/mptcp_bpf_iters.c
17
+++ b/tools/testing/selftests/bpf/progs/mptcp_bpf_iters.c
79
+++ b/tools/testing/selftests/bpf/progs/mptcp_bpf_iters.c
18
@@ -XXX,XX +XXX,XX @@ int iters_subflow(struct bpf_sockopt *ctx)
80
@@ -XXX,XX +XXX,XX @@ int iters_subflow(struct bpf_sockopt *ctx)
19
    struct mptcp_sock *msk;
81
    if (ctx->level != SOL_TCP || ctx->optname != TCP_IS_MPTCP)
20
    int local_ids = 0;
21
22
-    if (!sk || sk->protocol != IPPROTO_MPTCP ||
23
-     ctx->level != SOL_TCP || ctx->optname != TCP_IS_MPTCP)
24
+    if (ctx->level != SOL_TCP || ctx->optname != TCP_IS_MPTCP)
25
        return 1;
82
        return 1;
26
83
27
    msk = bpf_mptcp_sk((struct sock *)sk);
84
-    msk = bpf_skc_to_mptcp_sock(sk);
28
-    if (msk->pm.server_side || !msk->pm.subflows)
85
+    msk = bpf_core_cast(sk, struct mptcp_sock);
29
+    if (!msk || msk->pm.server_side || !msk->pm.subflows)
86
    if (!msk || msk->pm.server_side || !msk->pm.subflows)
30
        return 1;
87
        return 1;
31
88
32
    msk = bpf_mptcp_sock_acquire(msk);
89
-    msk = bpf_mptcp_sock_acquire(msk);
90
-    if (!msk)
91
-        return 1;
92
-    bpf_for_each(mptcp_subflow, subflow, msk) {
93
+    bpf_for_each(mptcp_subflow, subflow, (struct sock *)sk) {
94
        /* Here MPTCP-specific packet scheduler kfunc can be called:
95
         * this test is not doing anything really useful, only to
96
         * verify the iteration works.
33
@@ -XXX,XX +XXX,XX @@ int iters_subflow(struct bpf_sockopt *ctx)
97
@@ -XXX,XX +XXX,XX @@ int iters_subflow(struct bpf_sockopt *ctx)
34
98
35
    /* only to check the following kfunc works */
99
        local_ids += subflow->subflow_id;
36
    subflow = bpf_mptcp_subflow_ctx(ssk);
100
37
-    if (subflow->token != msk->token)
101
-        /* only to check the following kfunc works */
38
+    if (!subflow || subflow->token != msk->token)
102
+        /* only to check the following helper works */
39
        goto out;
103
        ssk = mptcp_subflow_tcp_sock(subflow);
40
104
    }
105
106
@@ -XXX,XX +XXX,XX @@ int iters_subflow(struct bpf_sockopt *ctx)
41
    ids = local_ids;
107
    ids = local_ids;
108
109
out:
110
-    bpf_mptcp_sock_release(msk);
111
    return 1;
112
}
42
--
113
--
43
2.45.2
114
2.43.0
diff view generated by jsdifflib