Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

at v4.16-rc3 373 lines 9.3 kB view raw
1/* 2 * count the number of connections matching an arbitrary key. 3 * 4 * (C) 2017 Red Hat GmbH 5 * Author: Florian Westphal <fw@strlen.de> 6 * 7 * split from xt_connlimit.c: 8 * (c) 2000 Gerd Knorr <kraxel@bytesex.org> 9 * Nov 2002: Martin Bene <martin.bene@icomedias.com>: 10 * only ignore TIME_WAIT or gone connections 11 * (C) CC Computer Consultants GmbH, 2007 12 */ 13#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt 14#include <linux/in.h> 15#include <linux/in6.h> 16#include <linux/ip.h> 17#include <linux/ipv6.h> 18#include <linux/jhash.h> 19#include <linux/slab.h> 20#include <linux/list.h> 21#include <linux/rbtree.h> 22#include <linux/module.h> 23#include <linux/random.h> 24#include <linux/skbuff.h> 25#include <linux/spinlock.h> 26#include <linux/netfilter/nf_conntrack_tcp.h> 27#include <linux/netfilter/x_tables.h> 28#include <net/netfilter/nf_conntrack.h> 29#include <net/netfilter/nf_conntrack_count.h> 30#include <net/netfilter/nf_conntrack_core.h> 31#include <net/netfilter/nf_conntrack_tuple.h> 32#include <net/netfilter/nf_conntrack_zones.h> 33 34#define CONNCOUNT_SLOTS 256U 35 36#ifdef CONFIG_LOCKDEP 37#define CONNCOUNT_LOCK_SLOTS 8U 38#else 39#define CONNCOUNT_LOCK_SLOTS 256U 40#endif 41 42#define CONNCOUNT_GC_MAX_NODES 8 43#define MAX_KEYLEN 5 44 45/* we will save the tuples of all connections we care about */ 46struct nf_conncount_tuple { 47 struct hlist_node node; 48 struct nf_conntrack_tuple tuple; 49}; 50 51struct nf_conncount_rb { 52 struct rb_node node; 53 struct hlist_head hhead; /* connections/hosts in same subnet */ 54 u32 key[MAX_KEYLEN]; 55}; 56 57static spinlock_t nf_conncount_locks[CONNCOUNT_LOCK_SLOTS] __cacheline_aligned_in_smp; 58 59struct nf_conncount_data { 60 unsigned int keylen; 61 struct rb_root root[CONNCOUNT_SLOTS]; 62}; 63 64static u_int32_t conncount_rnd __read_mostly; 65static struct kmem_cache *conncount_rb_cachep __read_mostly; 66static struct kmem_cache *conncount_conn_cachep __read_mostly; 67 68static inline bool already_closed(const struct nf_conn *conn) 69{ 70 if (nf_ct_protonum(conn) == IPPROTO_TCP) 71 return conn->proto.tcp.state == TCP_CONNTRACK_TIME_WAIT || 72 conn->proto.tcp.state == TCP_CONNTRACK_CLOSE; 73 else 74 return false; 75} 76 77static int key_diff(const u32 *a, const u32 *b, unsigned int klen) 78{ 79 return memcmp(a, b, klen * sizeof(u32)); 80} 81 82static bool add_hlist(struct hlist_head *head, 83 const struct nf_conntrack_tuple *tuple) 84{ 85 struct nf_conncount_tuple *conn; 86 87 conn = kmem_cache_alloc(conncount_conn_cachep, GFP_ATOMIC); 88 if (conn == NULL) 89 return false; 90 conn->tuple = *tuple; 91 hlist_add_head(&conn->node, head); 92 return true; 93} 94 95static unsigned int check_hlist(struct net *net, 96 struct hlist_head *head, 97 const struct nf_conntrack_tuple *tuple, 98 const struct nf_conntrack_zone *zone, 99 bool *addit) 100{ 101 const struct nf_conntrack_tuple_hash *found; 102 struct nf_conncount_tuple *conn; 103 struct hlist_node *n; 104 struct nf_conn *found_ct; 105 unsigned int length = 0; 106 107 *addit = true; 108 109 /* check the saved connections */ 110 hlist_for_each_entry_safe(conn, n, head, node) { 111 found = nf_conntrack_find_get(net, zone, &conn->tuple); 112 if (found == NULL) { 113 hlist_del(&conn->node); 114 kmem_cache_free(conncount_conn_cachep, conn); 115 continue; 116 } 117 118 found_ct = nf_ct_tuplehash_to_ctrack(found); 119 120 if (nf_ct_tuple_equal(&conn->tuple, tuple)) { 121 /* 122 * Just to be sure we have it only once in the list. 123 * We should not see tuples twice unless someone hooks 124 * this into a table without "-p tcp --syn". 125 */ 126 *addit = false; 127 } else if (already_closed(found_ct)) { 128 /* 129 * we do not care about connections which are 130 * closed already -> ditch it 131 */ 132 nf_ct_put(found_ct); 133 hlist_del(&conn->node); 134 kmem_cache_free(conncount_conn_cachep, conn); 135 continue; 136 } 137 138 nf_ct_put(found_ct); 139 length++; 140 } 141 142 return length; 143} 144 145static void tree_nodes_free(struct rb_root *root, 146 struct nf_conncount_rb *gc_nodes[], 147 unsigned int gc_count) 148{ 149 struct nf_conncount_rb *rbconn; 150 151 while (gc_count) { 152 rbconn = gc_nodes[--gc_count]; 153 rb_erase(&rbconn->node, root); 154 kmem_cache_free(conncount_rb_cachep, rbconn); 155 } 156} 157 158static unsigned int 159count_tree(struct net *net, struct rb_root *root, 160 const u32 *key, u8 keylen, 161 u8 family, 162 const struct nf_conntrack_tuple *tuple, 163 const struct nf_conntrack_zone *zone) 164{ 165 struct nf_conncount_rb *gc_nodes[CONNCOUNT_GC_MAX_NODES]; 166 struct rb_node **rbnode, *parent; 167 struct nf_conncount_rb *rbconn; 168 struct nf_conncount_tuple *conn; 169 unsigned int gc_count; 170 bool no_gc = false; 171 172 restart: 173 gc_count = 0; 174 parent = NULL; 175 rbnode = &(root->rb_node); 176 while (*rbnode) { 177 int diff; 178 bool addit; 179 180 rbconn = rb_entry(*rbnode, struct nf_conncount_rb, node); 181 182 parent = *rbnode; 183 diff = key_diff(key, rbconn->key, keylen); 184 if (diff < 0) { 185 rbnode = &((*rbnode)->rb_left); 186 } else if (diff > 0) { 187 rbnode = &((*rbnode)->rb_right); 188 } else { 189 /* same source network -> be counted! */ 190 unsigned int count; 191 count = check_hlist(net, &rbconn->hhead, tuple, zone, &addit); 192 193 tree_nodes_free(root, gc_nodes, gc_count); 194 if (!addit) 195 return count; 196 197 if (!add_hlist(&rbconn->hhead, tuple)) 198 return 0; /* hotdrop */ 199 200 return count + 1; 201 } 202 203 if (no_gc || gc_count >= ARRAY_SIZE(gc_nodes)) 204 continue; 205 206 /* only used for GC on hhead, retval and 'addit' ignored */ 207 check_hlist(net, &rbconn->hhead, tuple, zone, &addit); 208 if (hlist_empty(&rbconn->hhead)) 209 gc_nodes[gc_count++] = rbconn; 210 } 211 212 if (gc_count) { 213 no_gc = true; 214 tree_nodes_free(root, gc_nodes, gc_count); 215 /* tree_node_free before new allocation permits 216 * allocator to re-use newly free'd object. 217 * 218 * This is a rare event; in most cases we will find 219 * existing node to re-use. (or gc_count is 0). 220 */ 221 goto restart; 222 } 223 224 /* no match, need to insert new node */ 225 rbconn = kmem_cache_alloc(conncount_rb_cachep, GFP_ATOMIC); 226 if (rbconn == NULL) 227 return 0; 228 229 conn = kmem_cache_alloc(conncount_conn_cachep, GFP_ATOMIC); 230 if (conn == NULL) { 231 kmem_cache_free(conncount_rb_cachep, rbconn); 232 return 0; 233 } 234 235 conn->tuple = *tuple; 236 memcpy(rbconn->key, key, sizeof(u32) * keylen); 237 238 INIT_HLIST_HEAD(&rbconn->hhead); 239 hlist_add_head(&conn->node, &rbconn->hhead); 240 241 rb_link_node(&rbconn->node, parent, rbnode); 242 rb_insert_color(&rbconn->node, root); 243 return 1; 244} 245 246unsigned int nf_conncount_count(struct net *net, 247 struct nf_conncount_data *data, 248 const u32 *key, 249 unsigned int family, 250 const struct nf_conntrack_tuple *tuple, 251 const struct nf_conntrack_zone *zone) 252{ 253 struct rb_root *root; 254 int count; 255 u32 hash; 256 257 hash = jhash2(key, data->keylen, conncount_rnd) % CONNCOUNT_SLOTS; 258 root = &data->root[hash]; 259 260 spin_lock_bh(&nf_conncount_locks[hash % CONNCOUNT_LOCK_SLOTS]); 261 262 count = count_tree(net, root, key, data->keylen, family, tuple, zone); 263 264 spin_unlock_bh(&nf_conncount_locks[hash % CONNCOUNT_LOCK_SLOTS]); 265 266 return count; 267} 268EXPORT_SYMBOL_GPL(nf_conncount_count); 269 270struct nf_conncount_data *nf_conncount_init(struct net *net, unsigned int family, 271 unsigned int keylen) 272{ 273 struct nf_conncount_data *data; 274 int ret, i; 275 276 if (keylen % sizeof(u32) || 277 keylen / sizeof(u32) > MAX_KEYLEN || 278 keylen == 0) 279 return ERR_PTR(-EINVAL); 280 281 net_get_random_once(&conncount_rnd, sizeof(conncount_rnd)); 282 283 data = kmalloc(sizeof(*data), GFP_KERNEL); 284 if (!data) 285 return ERR_PTR(-ENOMEM); 286 287 ret = nf_ct_netns_get(net, family); 288 if (ret < 0) { 289 kfree(data); 290 return ERR_PTR(ret); 291 } 292 293 for (i = 0; i < ARRAY_SIZE(data->root); ++i) 294 data->root[i] = RB_ROOT; 295 296 data->keylen = keylen / sizeof(u32); 297 298 return data; 299} 300EXPORT_SYMBOL_GPL(nf_conncount_init); 301 302static void destroy_tree(struct rb_root *r) 303{ 304 struct nf_conncount_tuple *conn; 305 struct nf_conncount_rb *rbconn; 306 struct hlist_node *n; 307 struct rb_node *node; 308 309 while ((node = rb_first(r)) != NULL) { 310 rbconn = rb_entry(node, struct nf_conncount_rb, node); 311 312 rb_erase(node, r); 313 314 hlist_for_each_entry_safe(conn, n, &rbconn->hhead, node) 315 kmem_cache_free(conncount_conn_cachep, conn); 316 317 kmem_cache_free(conncount_rb_cachep, rbconn); 318 } 319} 320 321void nf_conncount_destroy(struct net *net, unsigned int family, 322 struct nf_conncount_data *data) 323{ 324 unsigned int i; 325 326 nf_ct_netns_put(net, family); 327 328 for (i = 0; i < ARRAY_SIZE(data->root); ++i) 329 destroy_tree(&data->root[i]); 330 331 kfree(data); 332} 333EXPORT_SYMBOL_GPL(nf_conncount_destroy); 334 335static int __init nf_conncount_modinit(void) 336{ 337 int i; 338 339 BUILD_BUG_ON(CONNCOUNT_LOCK_SLOTS > CONNCOUNT_SLOTS); 340 BUILD_BUG_ON((CONNCOUNT_SLOTS % CONNCOUNT_LOCK_SLOTS) != 0); 341 342 for (i = 0; i < CONNCOUNT_LOCK_SLOTS; ++i) 343 spin_lock_init(&nf_conncount_locks[i]); 344 345 conncount_conn_cachep = kmem_cache_create("nf_conncount_tuple", 346 sizeof(struct nf_conncount_tuple), 347 0, 0, NULL); 348 if (!conncount_conn_cachep) 349 return -ENOMEM; 350 351 conncount_rb_cachep = kmem_cache_create("nf_conncount_rb", 352 sizeof(struct nf_conncount_rb), 353 0, 0, NULL); 354 if (!conncount_rb_cachep) { 355 kmem_cache_destroy(conncount_conn_cachep); 356 return -ENOMEM; 357 } 358 359 return 0; 360} 361 362static void __exit nf_conncount_modexit(void) 363{ 364 kmem_cache_destroy(conncount_conn_cachep); 365 kmem_cache_destroy(conncount_rb_cachep); 366} 367 368module_init(nf_conncount_modinit); 369module_exit(nf_conncount_modexit); 370MODULE_AUTHOR("Jan Engelhardt <jengelh@medozas.de>"); 371MODULE_AUTHOR("Florian Westphal <fw@strlen.de>"); 372MODULE_DESCRIPTION("netfilter: count number of connections matching a key"); 373MODULE_LICENSE("GPL");