#include "dco.h"
#include "tun.h"
#include "crypto.h"
+#include "multi.h"
#include "ssl_common.h"
static nvlist_t *
nvlist_destroy(nvl);
}
+static void
+dco_update_peer_stat(struct multi_context *m, uint32_t peerid, const nvlist_t *nvl)
+{
+ struct hash_element *he;
+ struct hash_iterator hi;
+
+ hash_iterator_init(m->hash, &hi);
+
+ while ((he = hash_iterator_next(&hi)))
+ {
+ struct multi_instance *mi = (struct multi_instance *) he->value;
+
+ if (mi->context.c2.tls_multi->peer_id != peerid)
+ {
+ continue;
+ }
+
+ mi->context.c2.dco_read_bytes = nvlist_get_number(nvl, "in");
+ mi->context.c2.dco_write_bytes = nvlist_get_number(nvl, "out");
+
+ return;
+ }
+
+ msg(M_INFO, "Peer %d returned by kernel, but not found locally", peerid);
+}
+
+int
+dco_get_peer_stats(dco_context_t *dco, struct multi_context *m)
+{
+
+ struct ifdrv drv;
+ uint8_t buf[4096];
+ nvlist_t *nvl;
+ const nvlist_t *const *nvpeers;
+ size_t npeers;
+ int ret;
+
+ if (!dco || !dco->open)
+ {
+ return 0;
+ }
+
+ CLEAR(drv);
+ snprintf(drv.ifd_name, IFNAMSIZ, "%s", dco->ifname);
+ drv.ifd_cmd = OVPN_GET_PEER_STATS;
+ drv.ifd_len = sizeof(buf);
+ drv.ifd_data = buf;
+
+ ret = ioctl(dco->fd, SIOCGDRVSPEC, &drv);
+ if (ret)
+ {
+ msg(M_WARN | M_ERRNO, "Failed to get peer stats");
+ return -EINVAL;
+ }
+
+ nvl = nvlist_unpack(buf, drv.ifd_len, 0);
+ if (!nvl)
+ {
+ msg(M_WARN, "Failed to unpack nvlist");
+ return -EINVAL;
+ }
+
+ if (!nvlist_exists_nvlist_array(nvl, "peers"))
+ {
+ /* no peers */
+ return 0;
+ }
+
+ nvpeers = nvlist_get_nvlist_array(nvl, "peers", &npeers);
+ for (size_t i = 0; i < npeers; i++)
+ {
+ const nvlist_t *peer = nvpeers[i];
+ uint32_t peerid = nvlist_get_number(peer, "peerid");
+
+ dco_update_peer_stat(m, peerid, nvlist_get_nvlist(peer, "bytes"));
+ }
+
+ return 0;
+}
+
const char *
dco_get_supported_ciphers()
{
}
static void
-setenv_stats(struct context *c)
+setenv_stats(struct multi_context *m, struct context *c)
{
- setenv_counter(c->c2.es, "bytes_received", c->c2.link_read_bytes);
- setenv_counter(c->c2.es, "bytes_sent", c->c2.link_write_bytes);
+ dco_get_peer_stats(&m->top.c1.tuntap->dco, m);
+
+ setenv_counter(c->c2.es, "bytes_received", c->c2.link_read_bytes + c->c2.dco_read_bytes);
+ setenv_counter(c->c2.es, "bytes_sent", c->c2.link_write_bytes + c->c2.dco_write_bytes);
}
static void
-multi_client_disconnect_setenv(struct multi_instance *mi)
+multi_client_disconnect_setenv(struct multi_context *m, struct multi_instance *mi)
{
/* setenv client real IP address */
setenv_trusted(mi->context.c2.es, get_link_socket_info(&mi->context));
/* setenv stats */
- setenv_stats(&mi->context);
+ setenv_stats(m, &mi->context);
/* setenv connection duration */
setenv_long_long(mi->context.c2.es, "time_duration", now - mi->created);
}
static void
-multi_client_disconnect_script(struct multi_instance *mi)
+multi_client_disconnect_script(struct multi_context *m, struct multi_instance *mi)
{
- multi_client_disconnect_setenv(mi);
+ multi_client_disconnect_setenv(m, mi);
if (plugin_defined(mi->context.plugins, OPENVPN_PLUGIN_CLIENT_DISCONNECT))
{
if (mi->context.c2.tls_multi->multi_state >= CAS_CONNECT_DONE)
{
- multi_client_disconnect_script(mi);
+ multi_client_disconnect_script(m, mi);
}
close_context(&mi->context, SIGTERM, CC_GC_FREE);
status_reset(so);
+ dco_get_peer_stats(&m->top.c1.tuntap->dco, m);
+
if (version == 1)
{
/*
status_printf(so, "%s,%s," counter_format "," counter_format ",%s",
tls_common_name(mi->context.c2.tls_multi, false),
mroute_addr_print(&mi->real, &gc),
- mi->context.c2.link_read_bytes,
- mi->context.c2.link_write_bytes,
+ mi->context.c2.link_read_bytes + mi->context.c2.dco_read_bytes,
+ mi->context.c2.link_write_bytes + mi->context.c2.dco_write_bytes,
time_string(mi->created, 0, false, &gc));
}
gc_free(&gc);
sep, mroute_addr_print(&mi->real, &gc),
sep, print_in_addr_t(mi->reporting_addr, IA_EMPTY_IF_UNDEF, &gc),
sep, print_in6_addr(mi->reporting_addr_ipv6, IA_EMPTY_IF_UNDEF, &gc),
- sep, mi->context.c2.link_read_bytes,
- sep, mi->context.c2.link_write_bytes,
+ sep, mi->context.c2.link_read_bytes + mi->context.c2.dco_read_bytes,
+ sep, mi->context.c2.link_write_bytes + mi->context.c2.dco_write_bytes,
sep, time_string(mi->created, 0, false, &gc),
sep, (unsigned int)mi->created,
sep, tls_username(mi->context.c2.tls_multi, false),
* did not fail */
if (mi->context.c2.tls_multi->multi_state == CAS_PENDING_DEFERRED_PARTIAL)
{
- multi_client_disconnect_script(mi);
+ multi_client_disconnect_script(m, mi);
}
mi->context.c2.tls_multi->multi_state = CAS_FAILED;