git: 18a30fd39be7 - main - if_ovpn: start tracking per-peer packets/bytes in/out
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Wed, 14 Dec 2022 05:49:42 UTC
The branch main has been updated by kp: URL: https://cgit.FreeBSD.org/src/commit/?id=18a30fd39be77de7e56e30ceacc90f4c8833cfc9 commit 18a30fd39be77de7e56e30ceacc90f4c8833cfc9 Author: Kristof Provost <kp@FreeBSD.org> AuthorDate: 2022-11-26 13:22:23 +0000 Commit: Kristof Provost <kp@FreeBSD.org> CommitDate: 2022-12-14 05:48:58 +0000 if_ovpn: start tracking per-peer packets/bytes in/out OpenVPN will introduce a mechanism to retrieve per-peer statistics. Start tracking those so we can return them to userspace when queried. Sponsored by: Rubicon Communications, LLC ("Netgate") Differential Revision: https://reviews.freebsd.org/D37603 --- sys/net/if_ovpn.c | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) diff --git a/sys/net/if_ovpn.c b/sys/net/if_ovpn.c index 256d7d56bada..6686315fbf01 100644 --- a/sys/net/if_ovpn.c +++ b/sys/net/if_ovpn.c @@ -122,6 +122,14 @@ struct ovpn_notification { struct ovpn_softc; +struct ovpn_peer_counters { + uint64_t pkt_in; + uint64_t pkt_out; + uint64_t bytes_in; + uint64_t bytes_out; +}; +#define OVPN_PEER_COUNTER_SIZE (sizeof(struct ovpn_peer_counters)/sizeof(uint64_t)) + struct ovpn_kpeer { RB_ENTRY(ovpn_kpeer) tree; int refcount; @@ -142,6 +150,8 @@ struct ovpn_kpeer { uint32_t *last_active; struct callout ping_send; struct callout ping_rcv; + + counter_u64_t counters[OVPN_PEER_COUNTER_SIZE]; }; struct ovpn_counters { @@ -219,6 +229,9 @@ VNET_DEFINE_STATIC(struct if_clone *, ovpn_cloner); #define OVPN_COUNTER_ADD(sc, name, val) \ counter_u64_add(sc->counters[offsetof(struct ovpn_counters, name) / \ sizeof(uint64_t)], val) +#define OVPN_PEER_COUNTER_ADD(p, name, val) \ + counter_u64_add(p->counters[offsetof(struct ovpn_peer_counters, name) / \ + sizeof(uint64_t)], val) #define TO_IN(x) ((struct sockaddr_in *)(x)) #define TO_IN6(x) ((struct sockaddr_in6 *)(x)) @@ -499,6 +512,7 @@ ovpn_new_peer(struct ifnet *ifp, const nvlist_t *nvl) peer->tx_seq = 1; peer->refcount = 1; peer->last_active = uma_zalloc_pcpu(pcpu_zone_4, M_WAITOK | M_ZERO); + COUNTER_ARRAY_ALLOC(peer->counters, OVPN_PEER_COUNTER_SIZE, M_WAITOK); if (nvlist_exists_binary(nvl, "vpn_ipv4")) { size_t len; @@ -606,6 +620,7 @@ error_locked: OVPN_WUNLOCK(sc); error: free(name, M_SONAME); + COUNTER_ARRAY_FREE(peer->counters, OVPN_PEER_COUNTER_SIZE); uma_zfree_pcpu(pcpu_zone_4, peer->last_active); free(peer, M_OVPN); done: @@ -1404,6 +1419,8 @@ ovpn_finish_rx(struct ovpn_softc *sc, struct mbuf *m, OVPN_COUNTER_ADD(sc, received_data_pkts, 1); OVPN_COUNTER_ADD(sc, tunnel_bytes_received, m->m_pkthdr.len); + OVPN_PEER_COUNTER_ADD(peer, pkt_in, 1); + OVPN_PEER_COUNTER_ADD(peer, bytes_in, m->m_pkthdr.len); /* Receive the packet on our interface. */ m->m_pkthdr.rcvif = sc->ifp; @@ -1740,6 +1757,9 @@ ovpn_transmit_to_peer(struct ifnet *ifp, struct mbuf *m, seq = htonl(seq); ohdr->seq = seq; + OVPN_PEER_COUNTER_ADD(peer, pkt_out, 1); + OVPN_PEER_COUNTER_ADD(peer, bytes_out, len); + if (key->encrypt->cipher == OVPN_CIPHER_ALG_NONE) { ret = ovpn_encap(sc, peer->peerid, m); if (_ovpn_lock_trackerp != NULL)