148 lines
4.0 KiB
C
148 lines
4.0 KiB
C
/* Kernel module to control the rate
|
|
*
|
|
* 2 September 1999: Changed from the target RATE to the match
|
|
* `limit', removed logging. Did I mention that
|
|
* Alexey is a fucking genius?
|
|
* Rusty Russell (rusty@rustcorp.com.au). */
|
|
|
|
/* (C) 1999 Jérôme de Vivie <devivie@info.enserb.u-bordeaux.fr>
|
|
* (C) 1999 Hervé Eychenne <eychenne@info.enserb.u-bordeaux.fr>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
* published by the Free Software Foundation.
|
|
*/
|
|
|
|
#include <linux/module.h>
|
|
#include <linux/skbuff.h>
|
|
#include <linux/spinlock.h>
|
|
#include <linux/interrupt.h>
|
|
|
|
#include <linux/netfilter_ipv6/ip6_tables.h>
|
|
#include <linux/netfilter_ipv6/ip6t_limit.h>
|
|
|
|
MODULE_LICENSE("GPL");
|
|
MODULE_AUTHOR("Herve Eychenne <rv@wallfire.org>");
|
|
MODULE_DESCRIPTION("rate limiting within ip6tables");
|
|
|
|
/* The algorithm used is the Simple Token Bucket Filter (TBF)
|
|
* see net/sched/sch_tbf.c in the linux source tree
|
|
*/
|
|
|
|
static DEFINE_SPINLOCK(limit_lock);
|
|
|
|
/* Rusty: This is my (non-mathematically-inclined) understanding of
|
|
this algorithm. The `average rate' in jiffies becomes your initial
|
|
amount of credit `credit' and the most credit you can ever have
|
|
`credit_cap'. The `peak rate' becomes the cost of passing the
|
|
test, `cost'.
|
|
|
|
`prev' tracks the last packet hit: you gain one credit per jiffy.
|
|
If you get credit balance more than this, the extra credit is
|
|
discarded. Every time the match passes, you lose `cost' credits;
|
|
if you don't have that many, the test fails.
|
|
|
|
See Alexey's formal explanation in net/sched/sch_tbf.c.
|
|
|
|
To avoid underflow, we multiply by 128 (ie. you get 128 credits per
|
|
jiffy). Hence a cost of 2^32-1, means one pass per 32768 seconds
|
|
at 1024HZ (or one every 9 hours). A cost of 1 means 12800 passes
|
|
per second at 100HZ. */
|
|
|
|
#define CREDITS_PER_JIFFY 128
|
|
|
|
static int
|
|
ip6t_limit_match(const struct sk_buff *skb,
|
|
const struct net_device *in,
|
|
const struct net_device *out,
|
|
const void *matchinfo,
|
|
int offset,
|
|
unsigned int protoff,
|
|
int *hotdrop)
|
|
{
|
|
struct ip6t_rateinfo *r = ((struct ip6t_rateinfo *)matchinfo)->master;
|
|
unsigned long now = jiffies;
|
|
|
|
spin_lock_bh(&limit_lock);
|
|
r->credit += (now - xchg(&r->prev, now)) * CREDITS_PER_JIFFY;
|
|
if (r->credit > r->credit_cap)
|
|
r->credit = r->credit_cap;
|
|
|
|
if (r->credit >= r->cost) {
|
|
/* We're not limited. */
|
|
r->credit -= r->cost;
|
|
spin_unlock_bh(&limit_lock);
|
|
return 1;
|
|
}
|
|
|
|
spin_unlock_bh(&limit_lock);
|
|
return 0;
|
|
}
|
|
|
|
/* Precision saver. */
|
|
static u_int32_t
|
|
user2credits(u_int32_t user)
|
|
{
|
|
/* If multiplying would overflow... */
|
|
if (user > 0xFFFFFFFF / (HZ*CREDITS_PER_JIFFY))
|
|
/* Divide first. */
|
|
return (user / IP6T_LIMIT_SCALE) * HZ * CREDITS_PER_JIFFY;
|
|
|
|
return (user * HZ * CREDITS_PER_JIFFY) / IP6T_LIMIT_SCALE;
|
|
}
|
|
|
|
static int
|
|
ip6t_limit_checkentry(const char *tablename,
|
|
const struct ip6t_ip6 *ip,
|
|
void *matchinfo,
|
|
unsigned int matchsize,
|
|
unsigned int hook_mask)
|
|
{
|
|
struct ip6t_rateinfo *r = matchinfo;
|
|
|
|
if (matchsize != IP6T_ALIGN(sizeof(struct ip6t_rateinfo)))
|
|
return 0;
|
|
|
|
/* Check for overflow. */
|
|
if (r->burst == 0
|
|
|| user2credits(r->avg * r->burst) < user2credits(r->avg)) {
|
|
printk("Call rusty: overflow in ip6t_limit: %u/%u\n",
|
|
r->avg, r->burst);
|
|
return 0;
|
|
}
|
|
|
|
/* User avg in seconds * IP6T_LIMIT_SCALE: convert to jiffies *
|
|
128. */
|
|
r->prev = jiffies;
|
|
r->credit = user2credits(r->avg * r->burst); /* Credits full. */
|
|
r->credit_cap = user2credits(r->avg * r->burst); /* Credits full. */
|
|
r->cost = user2credits(r->avg);
|
|
|
|
/* For SMP, we only want to use one set of counters. */
|
|
r->master = r;
|
|
|
|
return 1;
|
|
}
|
|
|
|
static struct ip6t_match ip6t_limit_reg = {
|
|
.name = "limit",
|
|
.match = ip6t_limit_match,
|
|
.checkentry = ip6t_limit_checkentry,
|
|
.me = THIS_MODULE,
|
|
};
|
|
|
|
static int __init init(void)
|
|
{
|
|
if (ip6t_register_match(&ip6t_limit_reg))
|
|
return -EINVAL;
|
|
return 0;
|
|
}
|
|
|
|
static void __exit fini(void)
|
|
{
|
|
ip6t_unregister_match(&ip6t_limit_reg);
|
|
}
|
|
|
|
module_init(init);
|
|
module_exit(fini);
|