inetpeer.c 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638
  1. /*
  2. * INETPEER - A storage for permanent information about peers
  3. *
  4. * This source is covered by the GNU GPL, the same as all kernel sources.
  5. *
  6. * Authors: Andrey V. Savochkin <saw@msu.ru>
  7. */
  8. #include <linux/module.h>
  9. #include <linux/types.h>
  10. #include <linux/slab.h>
  11. #include <linux/interrupt.h>
  12. #include <linux/spinlock.h>
  13. #include <linux/random.h>
  14. #include <linux/timer.h>
  15. #include <linux/time.h>
  16. #include <linux/kernel.h>
  17. #include <linux/mm.h>
  18. #include <linux/net.h>
  19. #include <net/ip.h>
  20. #include <net/inetpeer.h>
  21. #include <net/secure_seq.h>
  22. /*
  23. * Theory of operations.
  24. * We keep one entry for each peer IP address. The nodes contains long-living
  25. * information about the peer which doesn't depend on routes.
  26. * At this moment this information consists only of ID field for the next
  27. * outgoing IP packet. This field is incremented with each packet as encoded
  28. * in inet_getid() function (include/net/inetpeer.h).
  29. * At the moment of writing this notes identifier of IP packets is generated
  30. * to be unpredictable using this code only for packets subjected
  31. * (actually or potentially) to defragmentation. I.e. DF packets less than
  32. * PMTU in size uses a constant ID and do not use this code (see
  33. * ip_select_ident() in include/net/ip.h).
  34. *
  35. * Route cache entries hold references to our nodes.
  36. * New cache entries get references via lookup by destination IP address in
  37. * the avl tree. The reference is grabbed only when it's needed i.e. only
  38. * when we try to output IP packet which needs an unpredictable ID (see
  39. * __ip_select_ident() in net/ipv4/route.c).
  40. * Nodes are removed only when reference counter goes to 0.
  41. * When it's happened the node may be removed when a sufficient amount of
  42. * time has been passed since its last use. The less-recently-used entry can
  43. * also be removed if the pool is overloaded i.e. if the total amount of
  44. * entries is greater-or-equal than the threshold.
  45. *
  46. * Node pool is organised as an AVL tree.
  47. * Such an implementation has been chosen not just for fun. It's a way to
  48. * prevent easy and efficient DoS attacks by creating hash collisions. A huge
  49. * amount of long living nodes in a single hash slot would significantly delay
  50. * lookups performed with disabled BHs.
  51. *
  52. * Serialisation issues.
  53. * 1. Nodes may appear in the tree only with the pool lock held.
  54. * 2. Nodes may disappear from the tree only with the pool lock held
  55. * AND reference count being 0.
  56. * 3. Nodes appears and disappears from unused node list only under
  57. * "inet_peer_unused_lock".
  58. * 4. Global variable peer_total is modified under the pool lock.
  59. * 5. struct inet_peer fields modification:
  60. * avl_left, avl_right, avl_parent, avl_height: pool lock
  61. * unused: unused node list lock
  62. * refcnt: atomically against modifications on other CPU;
  63. * usually under some other lock to prevent node disappearing
  64. * dtime: unused node list lock
  65. * daddr: unchangeable
  66. * ip_id_count: atomic value (no lock needed)
  67. */
  68. static struct kmem_cache *peer_cachep __read_mostly;
  69. #define node_height(x) x->avl_height
  70. #define peer_avl_empty ((struct inet_peer *)&peer_fake_node)
  71. #define peer_avl_empty_rcu ((struct inet_peer __rcu __force *)&peer_fake_node)
  72. static const struct inet_peer peer_fake_node = {
  73. .avl_left = peer_avl_empty_rcu,
  74. .avl_right = peer_avl_empty_rcu,
  75. .avl_height = 0
  76. };
  77. struct inet_peer_base {
  78. struct inet_peer __rcu *root;
  79. seqlock_t lock;
  80. int total;
  81. };
  82. static struct inet_peer_base v4_peers = {
  83. .root = peer_avl_empty_rcu,
  84. .lock = __SEQLOCK_UNLOCKED(v4_peers.lock),
  85. .total = 0,
  86. };
  87. static struct inet_peer_base v6_peers = {
  88. .root = peer_avl_empty_rcu,
  89. .lock = __SEQLOCK_UNLOCKED(v6_peers.lock),
  90. .total = 0,
  91. };
  92. #define PEER_MAXDEPTH 40 /* sufficient for about 2^27 nodes */
  93. /* Exported for sysctl_net_ipv4. */
  94. int inet_peer_threshold __read_mostly = 65536 + 128; /* start to throw entries more
  95. * aggressively at this stage */
  96. int inet_peer_minttl __read_mostly = 120 * HZ; /* TTL under high load: 120 sec */
  97. int inet_peer_maxttl __read_mostly = 10 * 60 * HZ; /* usual time to live: 10 min */
  98. int inet_peer_gc_mintime __read_mostly = 10 * HZ;
  99. int inet_peer_gc_maxtime __read_mostly = 120 * HZ;
  100. static struct {
  101. struct list_head list;
  102. spinlock_t lock;
  103. } unused_peers = {
  104. .list = LIST_HEAD_INIT(unused_peers.list),
  105. .lock = __SPIN_LOCK_UNLOCKED(unused_peers.lock),
  106. };
  107. static void peer_check_expire(unsigned long dummy);
  108. static DEFINE_TIMER(peer_periodic_timer, peer_check_expire, 0, 0);
  109. /* Called from ip_output.c:ip_init */
  110. void __init inet_initpeers(void)
  111. {
  112. struct sysinfo si;
  113. /* Use the straight interface to information about memory. */
  114. si_meminfo(&si);
  115. /* The values below were suggested by Alexey Kuznetsov
  116. * <kuznet@ms2.inr.ac.ru>. I don't have any opinion about the values
  117. * myself. --SAW
  118. */
  119. if (si.totalram <= (32768*1024)/PAGE_SIZE)
  120. inet_peer_threshold >>= 1; /* max pool size about 1MB on IA32 */
  121. if (si.totalram <= (16384*1024)/PAGE_SIZE)
  122. inet_peer_threshold >>= 1; /* about 512KB */
  123. if (si.totalram <= (8192*1024)/PAGE_SIZE)
  124. inet_peer_threshold >>= 2; /* about 128KB */
  125. peer_cachep = kmem_cache_create("inet_peer_cache",
  126. sizeof(struct inet_peer),
  127. 0, SLAB_HWCACHE_ALIGN | SLAB_PANIC,
  128. NULL);
  129. /* All the timers, started at system startup tend
  130. to synchronize. Perturb it a bit.
  131. */
  132. peer_periodic_timer.expires = jiffies
  133. + net_random() % inet_peer_gc_maxtime
  134. + inet_peer_gc_maxtime;
  135. add_timer(&peer_periodic_timer);
  136. }
  137. /* Called with or without local BH being disabled. */
  138. static void unlink_from_unused(struct inet_peer *p)
  139. {
  140. spin_lock_bh(&unused_peers.lock);
  141. list_del_init(&p->unused);
  142. spin_unlock_bh(&unused_peers.lock);
  143. }
  144. static int addr_compare(const struct inetpeer_addr *a,
  145. const struct inetpeer_addr *b)
  146. {
  147. int i, n = (a->family == AF_INET ? 1 : 4);
  148. for (i = 0; i < n; i++) {
  149. if (a->addr.a6[i] == b->addr.a6[i])
  150. continue;
  151. if (a->addr.a6[i] < b->addr.a6[i])
  152. return -1;
  153. return 1;
  154. }
  155. return 0;
  156. }
  157. #define rcu_deref_locked(X, BASE) \
  158. rcu_dereference_protected(X, lockdep_is_held(&(BASE)->lock.lock))
  159. /*
  160. * Called with local BH disabled and the pool lock held.
  161. */
  162. #define lookup(_daddr, _stack, _base) \
  163. ({ \
  164. struct inet_peer *u; \
  165. struct inet_peer __rcu **v; \
  166. \
  167. stackptr = _stack; \
  168. *stackptr++ = &_base->root; \
  169. for (u = rcu_deref_locked(_base->root, _base); \
  170. u != peer_avl_empty; ) { \
  171. int cmp = addr_compare(_daddr, &u->daddr); \
  172. if (cmp == 0) \
  173. break; \
  174. if (cmp == -1) \
  175. v = &u->avl_left; \
  176. else \
  177. v = &u->avl_right; \
  178. *stackptr++ = v; \
  179. u = rcu_deref_locked(*v, _base); \
  180. } \
  181. u; \
  182. })
  183. static bool atomic_add_unless_return(atomic_t *ptr, int a, int u, int *newv)
  184. {
  185. int cur, old = atomic_read(ptr);
  186. while (old != u) {
  187. *newv = old + a;
  188. cur = atomic_cmpxchg(ptr, old, *newv);
  189. if (cur == old)
  190. return true;
  191. old = cur;
  192. }
  193. return false;
  194. }
  195. /*
  196. * Called with rcu_read_lock()
  197. * Because we hold no lock against a writer, its quite possible we fall
  198. * in an endless loop.
  199. * But every pointer we follow is guaranteed to be valid thanks to RCU.
  200. * We exit from this function if number of links exceeds PEER_MAXDEPTH
  201. */
  202. static struct inet_peer *lookup_rcu(const struct inetpeer_addr *daddr,
  203. struct inet_peer_base *base,
  204. int *newrefcnt)
  205. {
  206. struct inet_peer *u = rcu_dereference(base->root);
  207. int count = 0;
  208. while (u != peer_avl_empty) {
  209. int cmp = addr_compare(daddr, &u->daddr);
  210. if (cmp == 0) {
  211. /* Before taking a reference, check if this entry was
  212. * deleted, unlink_from_pool() sets refcnt=-1 to make
  213. * distinction between an unused entry (refcnt=0) and
  214. * a freed one.
  215. */
  216. if (!atomic_add_unless_return(&u->refcnt, 1, -1, newrefcnt))
  217. u = NULL;
  218. return u;
  219. }
  220. if (cmp == -1)
  221. u = rcu_dereference(u->avl_left);
  222. else
  223. u = rcu_dereference(u->avl_right);
  224. if (unlikely(++count == PEER_MAXDEPTH))
  225. break;
  226. }
  227. return NULL;
  228. }
  229. /* Called with local BH disabled and the pool lock held. */
  230. #define lookup_rightempty(start, base) \
  231. ({ \
  232. struct inet_peer *u; \
  233. struct inet_peer __rcu **v; \
  234. *stackptr++ = &start->avl_left; \
  235. v = &start->avl_left; \
  236. for (u = rcu_deref_locked(*v, base); \
  237. u->avl_right != peer_avl_empty_rcu; ) { \
  238. v = &u->avl_right; \
  239. *stackptr++ = v; \
  240. u = rcu_deref_locked(*v, base); \
  241. } \
  242. u; \
  243. })
  244. /* Called with local BH disabled and the pool lock held.
  245. * Variable names are the proof of operation correctness.
  246. * Look into mm/map_avl.c for more detail description of the ideas.
  247. */
  248. static void peer_avl_rebalance(struct inet_peer __rcu **stack[],
  249. struct inet_peer __rcu ***stackend,
  250. struct inet_peer_base *base)
  251. {
  252. struct inet_peer __rcu **nodep;
  253. struct inet_peer *node, *l, *r;
  254. int lh, rh;
  255. while (stackend > stack) {
  256. nodep = *--stackend;
  257. node = rcu_deref_locked(*nodep, base);
  258. l = rcu_deref_locked(node->avl_left, base);
  259. r = rcu_deref_locked(node->avl_right, base);
  260. lh = node_height(l);
  261. rh = node_height(r);
  262. if (lh > rh + 1) { /* l: RH+2 */
  263. struct inet_peer *ll, *lr, *lrl, *lrr;
  264. int lrh;
  265. ll = rcu_deref_locked(l->avl_left, base);
  266. lr = rcu_deref_locked(l->avl_right, base);
  267. lrh = node_height(lr);
  268. if (lrh <= node_height(ll)) { /* ll: RH+1 */
  269. RCU_INIT_POINTER(node->avl_left, lr); /* lr: RH or RH+1 */
  270. RCU_INIT_POINTER(node->avl_right, r); /* r: RH */
  271. node->avl_height = lrh + 1; /* RH+1 or RH+2 */
  272. RCU_INIT_POINTER(l->avl_left, ll); /* ll: RH+1 */
  273. RCU_INIT_POINTER(l->avl_right, node); /* node: RH+1 or RH+2 */
  274. l->avl_height = node->avl_height + 1;
  275. RCU_INIT_POINTER(*nodep, l);
  276. } else { /* ll: RH, lr: RH+1 */
  277. lrl = rcu_deref_locked(lr->avl_left, base);/* lrl: RH or RH-1 */
  278. lrr = rcu_deref_locked(lr->avl_right, base);/* lrr: RH or RH-1 */
  279. RCU_INIT_POINTER(node->avl_left, lrr); /* lrr: RH or RH-1 */
  280. RCU_INIT_POINTER(node->avl_right, r); /* r: RH */
  281. node->avl_height = rh + 1; /* node: RH+1 */
  282. RCU_INIT_POINTER(l->avl_left, ll); /* ll: RH */
  283. RCU_INIT_POINTER(l->avl_right, lrl); /* lrl: RH or RH-1 */
  284. l->avl_height = rh + 1; /* l: RH+1 */
  285. RCU_INIT_POINTER(lr->avl_left, l); /* l: RH+1 */
  286. RCU_INIT_POINTER(lr->avl_right, node); /* node: RH+1 */
  287. lr->avl_height = rh + 2;
  288. RCU_INIT_POINTER(*nodep, lr);
  289. }
  290. } else if (rh > lh + 1) { /* r: LH+2 */
  291. struct inet_peer *rr, *rl, *rlr, *rll;
  292. int rlh;
  293. rr = rcu_deref_locked(r->avl_right, base);
  294. rl = rcu_deref_locked(r->avl_left, base);
  295. rlh = node_height(rl);
  296. if (rlh <= node_height(rr)) { /* rr: LH+1 */
  297. RCU_INIT_POINTER(node->avl_right, rl); /* rl: LH or LH+1 */
  298. RCU_INIT_POINTER(node->avl_left, l); /* l: LH */
  299. node->avl_height = rlh + 1; /* LH+1 or LH+2 */
  300. RCU_INIT_POINTER(r->avl_right, rr); /* rr: LH+1 */
  301. RCU_INIT_POINTER(r->avl_left, node); /* node: LH+1 or LH+2 */
  302. r->avl_height = node->avl_height + 1;
  303. RCU_INIT_POINTER(*nodep, r);
  304. } else { /* rr: RH, rl: RH+1 */
  305. rlr = rcu_deref_locked(rl->avl_right, base);/* rlr: LH or LH-1 */
  306. rll = rcu_deref_locked(rl->avl_left, base);/* rll: LH or LH-1 */
  307. RCU_INIT_POINTER(node->avl_right, rll); /* rll: LH or LH-1 */
  308. RCU_INIT_POINTER(node->avl_left, l); /* l: LH */
  309. node->avl_height = lh + 1; /* node: LH+1 */
  310. RCU_INIT_POINTER(r->avl_right, rr); /* rr: LH */
  311. RCU_INIT_POINTER(r->avl_left, rlr); /* rlr: LH or LH-1 */
  312. r->avl_height = lh + 1; /* r: LH+1 */
  313. RCU_INIT_POINTER(rl->avl_right, r); /* r: LH+1 */
  314. RCU_INIT_POINTER(rl->avl_left, node); /* node: LH+1 */
  315. rl->avl_height = lh + 2;
  316. RCU_INIT_POINTER(*nodep, rl);
  317. }
  318. } else {
  319. node->avl_height = (lh > rh ? lh : rh) + 1;
  320. }
  321. }
  322. }
  323. /* Called with local BH disabled and the pool lock held. */
  324. #define link_to_pool(n, base) \
  325. do { \
  326. n->avl_height = 1; \
  327. n->avl_left = peer_avl_empty_rcu; \
  328. n->avl_right = peer_avl_empty_rcu; \
  329. /* lockless readers can catch us now */ \
  330. rcu_assign_pointer(**--stackptr, n); \
  331. peer_avl_rebalance(stack, stackptr, base); \
  332. } while (0)
  333. static void inetpeer_free_rcu(struct rcu_head *head)
  334. {
  335. kmem_cache_free(peer_cachep, container_of(head, struct inet_peer, rcu));
  336. }
  337. /* May be called with local BH enabled. */
  338. static void unlink_from_pool(struct inet_peer *p, struct inet_peer_base *base,
  339. struct inet_peer __rcu **stack[PEER_MAXDEPTH])
  340. {
  341. int do_free;
  342. do_free = 0;
  343. write_seqlock_bh(&base->lock);
  344. /* Check the reference counter. It was artificially incremented by 1
  345. * in cleanup() function to prevent sudden disappearing. If we can
  346. * atomically (because of lockless readers) take this last reference,
  347. * it's safe to remove the node and free it later.
  348. * We use refcnt=-1 to alert lockless readers this entry is deleted.
  349. */
  350. if (atomic_cmpxchg(&p->refcnt, 1, -1) == 1) {
  351. struct inet_peer __rcu ***stackptr, ***delp;
  352. if (lookup(&p->daddr, stack, base) != p)
  353. BUG();
  354. delp = stackptr - 1; /* *delp[0] == p */
  355. if (p->avl_left == peer_avl_empty_rcu) {
  356. *delp[0] = p->avl_right;
  357. --stackptr;
  358. } else {
  359. /* look for a node to insert instead of p */
  360. struct inet_peer *t;
  361. t = lookup_rightempty(p, base);
  362. BUG_ON(rcu_deref_locked(*stackptr[-1], base) != t);
  363. **--stackptr = t->avl_left;
  364. /* t is removed, t->daddr > x->daddr for any
  365. * x in p->avl_left subtree.
  366. * Put t in the old place of p. */
  367. RCU_INIT_POINTER(*delp[0], t);
  368. t->avl_left = p->avl_left;
  369. t->avl_right = p->avl_right;
  370. t->avl_height = p->avl_height;
  371. BUG_ON(delp[1] != &p->avl_left);
  372. delp[1] = &t->avl_left; /* was &p->avl_left */
  373. }
  374. peer_avl_rebalance(stack, stackptr, base);
  375. base->total--;
  376. do_free = 1;
  377. }
  378. write_sequnlock_bh(&base->lock);
  379. if (do_free)
  380. call_rcu(&p->rcu, inetpeer_free_rcu);
  381. else
  382. /* The node is used again. Decrease the reference counter
  383. * back. The loop "cleanup -> unlink_from_unused
  384. * -> unlink_from_pool -> putpeer -> link_to_unused
  385. * -> cleanup (for the same node)"
  386. * doesn't really exist because the entry will have a
  387. * recent deletion time and will not be cleaned again soon.
  388. */
  389. inet_putpeer(p);
  390. }
  391. static struct inet_peer_base *family_to_base(int family)
  392. {
  393. return (family == AF_INET ? &v4_peers : &v6_peers);
  394. }
  395. static struct inet_peer_base *peer_to_base(struct inet_peer *p)
  396. {
  397. return family_to_base(p->daddr.family);
  398. }
  399. /* May be called with local BH enabled. */
  400. static int cleanup_once(unsigned long ttl, struct inet_peer __rcu **stack[PEER_MAXDEPTH])
  401. {
  402. struct inet_peer *p = NULL;
  403. /* Remove the first entry from the list of unused nodes. */
  404. spin_lock_bh(&unused_peers.lock);
  405. if (!list_empty(&unused_peers.list)) {
  406. __u32 delta;
  407. p = list_first_entry(&unused_peers.list, struct inet_peer, unused);
  408. delta = (__u32)jiffies - p->dtime;
  409. if (delta < ttl) {
  410. /* Do not prune fresh entries. */
  411. spin_unlock_bh(&unused_peers.lock);
  412. return -1;
  413. }
  414. list_del_init(&p->unused);
  415. /* Grab an extra reference to prevent node disappearing
  416. * before unlink_from_pool() call. */
  417. atomic_inc(&p->refcnt);
  418. }
  419. spin_unlock_bh(&unused_peers.lock);
  420. if (p == NULL)
  421. /* It means that the total number of USED entries has
  422. * grown over inet_peer_threshold. It shouldn't really
  423. * happen because of entry limits in route cache. */
  424. return -1;
  425. unlink_from_pool(p, peer_to_base(p), stack);
  426. return 0;
  427. }
  428. /* Called with or without local BH being disabled. */
  429. struct inet_peer *inet_getpeer(struct inetpeer_addr *daddr, int create)
  430. {
  431. struct inet_peer __rcu **stack[PEER_MAXDEPTH], ***stackptr;
  432. struct inet_peer_base *base = family_to_base(daddr->family);
  433. struct inet_peer *p;
  434. unsigned int sequence;
  435. int invalidated, newrefcnt = 0;
  436. /* Look up for the address quickly, lockless.
  437. * Because of a concurrent writer, we might not find an existing entry.
  438. */
  439. rcu_read_lock();
  440. sequence = read_seqbegin(&base->lock);
  441. p = lookup_rcu(daddr, base, &newrefcnt);
  442. invalidated = read_seqretry(&base->lock, sequence);
  443. rcu_read_unlock();
  444. if (p) {
  445. found: /* The existing node has been found.
  446. * Remove the entry from unused list if it was there.
  447. */
  448. if (newrefcnt == 1)
  449. unlink_from_unused(p);
  450. return p;
  451. }
  452. /* If no writer did a change during our lookup, we can return early. */
  453. if (!create && !invalidated)
  454. return NULL;
  455. /* retry an exact lookup, taking the lock before.
  456. * At least, nodes should be hot in our cache.
  457. */
  458. write_seqlock_bh(&base->lock);
  459. p = lookup(daddr, stack, base);
  460. if (p != peer_avl_empty) {
  461. newrefcnt = atomic_inc_return(&p->refcnt);
  462. write_sequnlock_bh(&base->lock);
  463. goto found;
  464. }
  465. p = create ? kmem_cache_alloc(peer_cachep, GFP_ATOMIC) : NULL;
  466. if (p) {
  467. p->daddr = *daddr;
  468. atomic_set(&p->refcnt, 1);
  469. atomic_set(&p->rid, 0);
  470. atomic_set(&p->ip_id_count, secure_ip_id(daddr->addr.a4));
  471. p->tcp_ts_stamp = 0;
  472. p->metrics[RTAX_LOCK-1] = INETPEER_METRICS_NEW;
  473. p->rate_tokens = 0;
  474. p->rate_last = 0;
  475. p->pmtu_expires = 0;
  476. p->pmtu_orig = 0;
  477. memset(&p->redirect_learned, 0, sizeof(p->redirect_learned));
  478. INIT_LIST_HEAD(&p->unused);
  479. /* Link the node. */
  480. link_to_pool(p, base);
  481. base->total++;
  482. }
  483. write_sequnlock_bh(&base->lock);
  484. if (base->total >= inet_peer_threshold)
  485. /* Remove one less-recently-used entry. */
  486. cleanup_once(0, stack);
  487. return p;
  488. }
  489. static int compute_total(void)
  490. {
  491. return v4_peers.total + v6_peers.total;
  492. }
  493. EXPORT_SYMBOL_GPL(inet_getpeer);
  494. /* Called with local BH disabled. */
  495. static void peer_check_expire(unsigned long dummy)
  496. {
  497. unsigned long now = jiffies;
  498. int ttl, total;
  499. struct inet_peer __rcu **stack[PEER_MAXDEPTH];
  500. total = compute_total();
  501. if (total >= inet_peer_threshold)
  502. ttl = inet_peer_minttl;
  503. else
  504. ttl = inet_peer_maxttl
  505. - (inet_peer_maxttl - inet_peer_minttl) / HZ *
  506. total / inet_peer_threshold * HZ;
  507. while (!cleanup_once(ttl, stack)) {
  508. if (jiffies != now)
  509. break;
  510. }
  511. /* Trigger the timer after inet_peer_gc_mintime .. inet_peer_gc_maxtime
  512. * interval depending on the total number of entries (more entries,
  513. * less interval). */
  514. total = compute_total();
  515. if (total >= inet_peer_threshold)
  516. peer_periodic_timer.expires = jiffies + inet_peer_gc_mintime;
  517. else
  518. peer_periodic_timer.expires = jiffies
  519. + inet_peer_gc_maxtime
  520. - (inet_peer_gc_maxtime - inet_peer_gc_mintime) / HZ *
  521. total / inet_peer_threshold * HZ;
  522. add_timer(&peer_periodic_timer);
  523. }
  524. void inet_putpeer(struct inet_peer *p)
  525. {
  526. local_bh_disable();
  527. if (atomic_dec_and_lock(&p->refcnt, &unused_peers.lock)) {
  528. list_add_tail(&p->unused, &unused_peers.list);
  529. p->dtime = (__u32)jiffies;
  530. spin_unlock(&unused_peers.lock);
  531. }
  532. local_bh_enable();
  533. }
  534. EXPORT_SYMBOL_GPL(inet_putpeer);
  535. /*
  536. * Check transmit rate limitation for given message.
  537. * The rate information is held in the inet_peer entries now.
  538. * This function is generic and could be used for other purposes
  539. * too. It uses a Token bucket filter as suggested by Alexey Kuznetsov.
  540. *
  541. * Note that the same inet_peer fields are modified by functions in
  542. * route.c too, but these work for packet destinations while xrlim_allow
  543. * works for icmp destinations. This means the rate limiting information
  544. * for one "ip object" is shared - and these ICMPs are twice limited:
  545. * by source and by destination.
  546. *
  547. * RFC 1812: 4.3.2.8 SHOULD be able to limit error message rate
  548. * SHOULD allow setting of rate limits
  549. *
  550. * Shared between ICMPv4 and ICMPv6.
  551. */
  552. #define XRLIM_BURST_FACTOR 6
  553. bool inet_peer_xrlim_allow(struct inet_peer *peer, int timeout)
  554. {
  555. unsigned long now, token;
  556. bool rc = false;
  557. if (!peer)
  558. return true;
  559. token = peer->rate_tokens;
  560. now = jiffies;
  561. token += now - peer->rate_last;
  562. peer->rate_last = now;
  563. if (token > XRLIM_BURST_FACTOR * timeout)
  564. token = XRLIM_BURST_FACTOR * timeout;
  565. if (token >= timeout) {
  566. token -= timeout;
  567. rc = true;
  568. }
  569. peer->rate_tokens = token;
  570. return rc;
  571. }
  572. EXPORT_SYMBOL(inet_peer_xrlim_allow);