- # Note that int64_t will overflow after 292 years of uptime
- first_action = "int64_t time = bpf_ktime_get_ns();\n"
- first_action += f"const uint32_t ratelimitidx = {ratelimitcnt};\n"
- first_action += "size_t pktlen = data_end - pktdata;\n"
- first_action += "uint64_t extra_bytes = 0;\n"
- first_action += "struct ratelimit *rate = bpf_map_lookup_elem(&rate_map, &ratelimitidx);\n"
- first_action += "if (rate) {\n"
- first_action += "\tbpf_spin_lock(&rate->lock);\n"
- first_action += "\tif (likely(rate->sent_bytes > 0)) {\n"
- first_action += "\t\tint64_t diff = time - rate->sent_time;\n"
- # Unlikely or not, if the flow is slow, take a perf hit (though with the else if branch it doesn't matter)
- first_action += "\t\tif (unlikely(diff > 1000000000))\n"
- first_action += "\t\t\trate->sent_bytes = 0;\n"
- first_action += "\t\telse if (likely(diff > 0))\n"
- first_action += f"\t\t\textra_bytes = ((uint64_t)diff) * {math.floor(value)} / 1000000000;\n"
- first_action += "\t}\n"
- first_action += "\tif (rate->sent_bytes - ((int64_t)extra_bytes) <= 0) {\n"
- first_action += "\t\trate->sent_bytes = data_end - pktdata;\n"
- first_action += "\t\trate->sent_time = time;\n"
- first_action += "\t\tbpf_spin_unlock(&rate->lock);\n"
- first_action += "\t} else {\n"
- first_action += "\t\tbpf_spin_unlock(&rate->lock);\n"
- first_action += "\t\treturn XDP_DROP;\n"
- first_action += "\t}\n"
- first_action += "}\n"
- ratelimitcnt += 1
+
+ first_action = "int64_t time_masked = bpf_ktime_get_ns() & RATE_TIME_MASK;\n"
+ first_action += f"int64_t per_pkt_ns = (1000000000LL << RATE_BUCKET_INTEGER_BITS) / {math.floor(value)};\n"
+ if ty == "0x8006" or ty == "0x8306":
+ first_action += "uint64_t amt = data_end - pktdata;\n"
+ else:
+ first_action += "uint64_t amt = 1;\n"
+ if ty == "0x8006" or ty == "0x800c":
+ first_action += f"const uint32_t ratelimitidx = {ratelimitcnt};\n"
+ first_action += "struct ratelimit *rate = bpf_map_lookup_elem(&rate_map, &ratelimitidx);\n"
+ ratelimitcnt += 1
+ first_action += "int matched = 0;\n"
+ first_action += "DO_RATE_LIMIT(bpf_spin_lock(&rate->lock), rate, time_masked, amt, per_pkt_ns, matched);\n"
+ first_action += "if (rate) { bpf_spin_unlock(&rate->lock); }\n"
+ else:
+ if proto == 4:
+ if mid_byte > 32:
+ continue
+ first_action += f"const uint32_t srcip = ip->saddr & MASK4({mid_byte});\n"
+ first_action += f"void *rate_map = &v4_src_rate_{len(v4persrcratelimits)};\n"
+ first_action += f"int matched = check_v4_persrc_ratelimit(srcip, rate_map, {(high_byte + 1) * 4096}, time_masked, amt, per_pkt_ns);\n"
+ v4persrcratelimits.append((high_byte + 1) * 4096)
+ elif mid_byte <= 64:
+ first_action += f"const uint64_t srcip = BE128BEHIGH64(ip6->saddr & MASK6({mid_byte}));\n"
+ first_action += f"void *rate_map = &v5_src_rate_{len(v5persrcratelimits)};\n"
+ first_action += f"int matched = check_v5_persrc_ratelimit(srcip, rate_map, {(high_byte + 1) * 4096}, time_masked, amt, per_pkt_ns);\n"
+ v5persrcratelimits.append((high_byte + 1) * 4096)
+ else:
+ if mid_byte > 128:
+ continue
+ first_action += f"const uint128_t srcip = ip6->saddr & MASK6({mid_byte});\n"
+ first_action += f"void *rate_map = &v6_src_rate_{len(v6persrcratelimits)};\n"
+ first_action += f"int matched = check_v6_persrc_ratelimit(srcip, rate_map, {(high_byte + 1) * 4096}, time_masked, amt, per_pkt_ns);\n"
+ v6persrcratelimits.append((high_byte + 1) * 4096)
+ first_action += "if (matched) {\n"
+ first_action += "\t{stats_replace}\n"
+ first_action += "\treturn XDP_DROP;\n"
+ first_action += "}\n"