linux/samples/bpf/hbm_edt_kern.c
<<
>>
Prefs
   1// SPDX-License-Identifier: GPL-2.0
   2/* Copyright (c) 2019 Facebook
   3 *
   4 * This program is free software; you can redistribute it and/or
   5 * modify it under the terms of version 2 of the GNU General Public
   6 * License as published by the Free Software Foundation.
   7 *
   8 * Sample Host Bandwidth Manager (HBM) BPF program.
   9 *
  10 * A cgroup skb BPF egress program to limit cgroup output bandwidth.
  11 * It uses a modified virtual token bucket queue to limit average
  12 * egress bandwidth. The implementation uses credits instead of tokens.
  13 * Negative credits imply that queueing would have happened (this is
  14 * a virtual queue, so no queueing is done by it. However, queueing may
  15 * occur at the actual qdisc (which is not used for rate limiting).
  16 *
  17 * This implementation uses 3 thresholds, one to start marking packets and
  18 * the other two to drop packets:
  19 *                                  CREDIT
  20 *        - <--------------------------|------------------------> +
  21 *              |    |          |      0
  22 *              |  Large pkt    |
  23 *              |  drop thresh  |
  24 *   Small pkt drop             Mark threshold
  25 *       thresh
  26 *
  27 * The effect of marking depends on the type of packet:
  28 * a) If the packet is ECN enabled and it is a TCP packet, then the packet
  29 *    is ECN marked.
  30 * b) If the packet is a TCP packet, then we probabilistically call tcp_cwr
  31 *    to reduce the congestion window. The current implementation uses a linear
  32 *    distribution (0% probability at marking threshold, 100% probability
  33 *    at drop threshold).
  34 * c) If the packet is not a TCP packet, then it is dropped.
  35 *
  36 * If the credit is below the drop threshold, the packet is dropped. If it
  37 * is a TCP packet, then it also calls tcp_cwr since packets dropped by
  38 * by a cgroup skb BPF program do not automatically trigger a call to
  39 * tcp_cwr in the current kernel code.
  40 *
  41 * This BPF program actually uses 2 drop thresholds, one threshold
  42 * for larger packets (>= 120 bytes) and another for smaller packets. This
  43 * protects smaller packets such as SYNs, ACKs, etc.
  44 *
  45 * The default bandwidth limit is set at 1Gbps but this can be changed by
  46 * a user program through a shared BPF map. In addition, by default this BPF
  47 * program does not limit connections using loopback. This behavior can be
  48 * overwritten by the user program. There is also an option to calculate
  49 * some statistics, such as percent of packets marked or dropped, which
  50 * a user program, such as hbm, can access.
  51 */
  52
  53#include "hbm_kern.h"
  54
  55SEC("cgroup_skb/egress")
  56int _hbm_out_cg(struct __sk_buff *skb)
  57{
  58        long long delta = 0, delta_send;
  59        unsigned long long curtime, sendtime;
  60        struct hbm_queue_stats *qsp = NULL;
  61        unsigned int queue_index = 0;
  62        bool congestion_flag = false;
  63        bool ecn_ce_flag = false;
  64        struct hbm_pkt_info pkti = {};
  65        struct hbm_vqueue *qdp;
  66        bool drop_flag = false;
  67        bool cwr_flag = false;
  68        int len = skb->len;
  69        int rv = ALLOW_PKT;
  70
  71        qsp = bpf_map_lookup_elem(&queue_stats, &queue_index);
  72
  73        // Check if we should ignore loopback traffic
  74        if (qsp != NULL && !qsp->loopback && (skb->ifindex == 1))
  75                return ALLOW_PKT;
  76
  77        hbm_get_pkt_info(skb, &pkti);
  78
  79        // We may want to account for the length of headers in len
  80        // calculation, like ETH header + overhead, specially if it
  81        // is a gso packet. But I am not doing it right now.
  82
  83        qdp = bpf_get_local_storage(&queue_state, 0);
  84        if (!qdp)
  85                return ALLOW_PKT;
  86        if (qdp->lasttime == 0)
  87                hbm_init_edt_vqueue(qdp, 1024);
  88
  89        curtime = bpf_ktime_get_ns();
  90
  91        // Begin critical section
  92        bpf_spin_lock(&qdp->lock);
  93        delta = qdp->lasttime - curtime;
  94        // bound bursts to 100us
  95        if (delta < -BURST_SIZE_NS) {
  96                // negative delta is a credit that allows bursts
  97                qdp->lasttime = curtime - BURST_SIZE_NS;
  98                delta = -BURST_SIZE_NS;
  99        }
 100        sendtime = qdp->lasttime;
 101        delta_send = BYTES_TO_NS(len, qdp->rate);
 102        __sync_add_and_fetch(&(qdp->lasttime), delta_send);
 103        bpf_spin_unlock(&qdp->lock);
 104        // End critical section
 105
 106        // Set EDT of packet
 107        skb->tstamp = sendtime;
 108
 109        // Check if we should update rate
 110        if (qsp != NULL && (qsp->rate * 128) != qdp->rate)
 111                qdp->rate = qsp->rate * 128;
 112
 113        // Set flags (drop, congestion, cwr)
 114        // last packet will be sent in the future, bound latency
 115        if (delta > DROP_THRESH_NS || (delta > LARGE_PKT_DROP_THRESH_NS &&
 116                                       len > LARGE_PKT_THRESH)) {
 117                drop_flag = true;
 118                if (pkti.is_tcp && pkti.ecn == 0)
 119                        cwr_flag = true;
 120        } else if (delta > MARK_THRESH_NS) {
 121                if (pkti.is_tcp)
 122                        congestion_flag = true;
 123                else
 124                        drop_flag = true;
 125        }
 126
 127        if (congestion_flag) {
 128                if (bpf_skb_ecn_set_ce(skb)) {
 129                        ecn_ce_flag = true;
 130                } else {
 131                        if (pkti.is_tcp) {
 132                                unsigned int rand = bpf_get_prandom_u32();
 133
 134                                if (delta >= MARK_THRESH_NS +
 135                                    (rand % MARK_REGION_SIZE_NS)) {
 136                                        // Do congestion control
 137                                        cwr_flag = true;
 138                                }
 139                        } else if (len > LARGE_PKT_THRESH) {
 140                                // Problem if too many small packets?
 141                                drop_flag = true;
 142                                congestion_flag = false;
 143                        }
 144                }
 145        }
 146
 147        if (pkti.is_tcp && drop_flag && pkti.packets_out <= 1) {
 148                drop_flag = false;
 149                cwr_flag = true;
 150                congestion_flag = false;
 151        }
 152
 153        if (qsp != NULL && qsp->no_cn)
 154                        cwr_flag = false;
 155
 156        hbm_update_stats(qsp, len, curtime, congestion_flag, drop_flag,
 157                         cwr_flag, ecn_ce_flag, &pkti, (int) delta);
 158
 159        if (drop_flag) {
 160                __sync_add_and_fetch(&(qdp->lasttime), -delta_send);
 161                rv = DROP_PKT;
 162        }
 163
 164        if (cwr_flag)
 165                rv |= CWR;
 166        return rv;
 167}
 168char _license[] SEC("license") = "GPL";
 169