mirror of
https://github.com/torvalds/linux.git
synced 2026-03-08 04:04:43 +01:00
ovpn: implement peer add/get/dump/delete via netlink
This change introduces the netlink command needed to add, delete and retrieve/dump known peers. Userspace is expected to use these commands to handle known peer lifecycles. Signed-off-by: Antonio Quartulli <antonio@openvpn.net> Link: https://patch.msgid.link/20250415-b4-ovpn-v26-18-577f6097b964@openvpn.net Reviewed-by: Sabrina Dubroca <sd@queasysnail.net> Tested-by: Oleksandr Natalenko <oleksandr@natalenko.name> Signed-off-by: Paolo Abeni <pabeni@redhat.com>
This commit is contained in:
parent
f0281c1d37
commit
1d36a36f6d
4 changed files with 738 additions and 36 deletions
|
|
@ -7,6 +7,7 @@
|
|||
*/
|
||||
|
||||
#include <linux/netdevice.h>
|
||||
#include <linux/types.h>
|
||||
#include <net/genetlink.h>
|
||||
|
||||
#include <uapi/linux/ovpn.h>
|
||||
|
|
@ -15,6 +16,9 @@
|
|||
#include "main.h"
|
||||
#include "netlink.h"
|
||||
#include "netlink-gen.h"
|
||||
#include "bind.h"
|
||||
#include "peer.h"
|
||||
#include "socket.h"
|
||||
|
||||
MODULE_ALIAS_GENL_FAMILY(OVPN_FAMILY_NAME);
|
||||
|
||||
|
|
@ -89,29 +93,701 @@ void ovpn_nl_post_doit(const struct genl_split_ops *ops, struct sk_buff *skb,
|
|||
netdev_put(ovpn->dev, tracker);
|
||||
}
|
||||
|
||||
static bool ovpn_nl_attr_sockaddr_remote(struct nlattr **attrs,
|
||||
struct sockaddr_storage *ss)
|
||||
{
|
||||
struct sockaddr_in6 *sin6;
|
||||
struct sockaddr_in *sin;
|
||||
struct in6_addr *in6;
|
||||
__be16 port = 0;
|
||||
__be32 *in;
|
||||
|
||||
ss->ss_family = AF_UNSPEC;
|
||||
|
||||
if (attrs[OVPN_A_PEER_REMOTE_PORT])
|
||||
port = nla_get_be16(attrs[OVPN_A_PEER_REMOTE_PORT]);
|
||||
|
||||
if (attrs[OVPN_A_PEER_REMOTE_IPV4]) {
|
||||
ss->ss_family = AF_INET;
|
||||
in = nla_data(attrs[OVPN_A_PEER_REMOTE_IPV4]);
|
||||
} else if (attrs[OVPN_A_PEER_REMOTE_IPV6]) {
|
||||
ss->ss_family = AF_INET6;
|
||||
in6 = nla_data(attrs[OVPN_A_PEER_REMOTE_IPV6]);
|
||||
} else {
|
||||
return false;
|
||||
}
|
||||
|
||||
switch (ss->ss_family) {
|
||||
case AF_INET6:
|
||||
/* If this is a regular IPv6 just break and move on,
|
||||
* otherwise switch to AF_INET and extract the IPv4 accordingly
|
||||
*/
|
||||
if (!ipv6_addr_v4mapped(in6)) {
|
||||
sin6 = (struct sockaddr_in6 *)ss;
|
||||
sin6->sin6_port = port;
|
||||
memcpy(&sin6->sin6_addr, in6, sizeof(*in6));
|
||||
break;
|
||||
}
|
||||
|
||||
/* v4-mapped-v6 address */
|
||||
ss->ss_family = AF_INET;
|
||||
in = &in6->s6_addr32[3];
|
||||
fallthrough;
|
||||
case AF_INET:
|
||||
sin = (struct sockaddr_in *)ss;
|
||||
sin->sin_port = port;
|
||||
sin->sin_addr.s_addr = *in;
|
||||
break;
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
static u8 *ovpn_nl_attr_local_ip(struct nlattr **attrs)
|
||||
{
|
||||
u8 *addr6;
|
||||
|
||||
if (!attrs[OVPN_A_PEER_LOCAL_IPV4] && !attrs[OVPN_A_PEER_LOCAL_IPV6])
|
||||
return NULL;
|
||||
|
||||
if (attrs[OVPN_A_PEER_LOCAL_IPV4])
|
||||
return nla_data(attrs[OVPN_A_PEER_LOCAL_IPV4]);
|
||||
|
||||
addr6 = nla_data(attrs[OVPN_A_PEER_LOCAL_IPV6]);
|
||||
/* this is an IPv4-mapped IPv6 address, therefore extract the actual
|
||||
* v4 address from the last 4 bytes
|
||||
*/
|
||||
if (ipv6_addr_v4mapped((struct in6_addr *)addr6))
|
||||
return addr6 + 12;
|
||||
|
||||
return addr6;
|
||||
}
|
||||
|
||||
static sa_family_t ovpn_nl_family_get(struct nlattr *addr4,
|
||||
struct nlattr *addr6)
|
||||
{
|
||||
if (addr4)
|
||||
return AF_INET;
|
||||
|
||||
if (addr6) {
|
||||
if (ipv6_addr_v4mapped((struct in6_addr *)nla_data(addr6)))
|
||||
return AF_INET;
|
||||
return AF_INET6;
|
||||
}
|
||||
|
||||
return AF_UNSPEC;
|
||||
}
|
||||
|
||||
static int ovpn_nl_peer_precheck(struct ovpn_priv *ovpn,
|
||||
struct genl_info *info,
|
||||
struct nlattr **attrs)
|
||||
{
|
||||
sa_family_t local_fam, remote_fam;
|
||||
|
||||
if (NL_REQ_ATTR_CHECK(info->extack, info->attrs[OVPN_A_PEER], attrs,
|
||||
OVPN_A_PEER_ID))
|
||||
return -EINVAL;
|
||||
|
||||
if (attrs[OVPN_A_PEER_REMOTE_IPV4] && attrs[OVPN_A_PEER_REMOTE_IPV6]) {
|
||||
NL_SET_ERR_MSG_MOD(info->extack,
|
||||
"cannot specify both remote IPv4 or IPv6 address");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
if (!attrs[OVPN_A_PEER_REMOTE_IPV4] &&
|
||||
!attrs[OVPN_A_PEER_REMOTE_IPV6] && attrs[OVPN_A_PEER_REMOTE_PORT]) {
|
||||
NL_SET_ERR_MSG_MOD(info->extack,
|
||||
"cannot specify remote port without IP address");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
if ((attrs[OVPN_A_PEER_REMOTE_IPV4] ||
|
||||
attrs[OVPN_A_PEER_REMOTE_IPV6]) &&
|
||||
!attrs[OVPN_A_PEER_REMOTE_PORT]) {
|
||||
NL_SET_ERR_MSG_MOD(info->extack,
|
||||
"cannot specify remote IP address without port");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
if (!attrs[OVPN_A_PEER_REMOTE_IPV4] &&
|
||||
attrs[OVPN_A_PEER_LOCAL_IPV4]) {
|
||||
NL_SET_ERR_MSG_MOD(info->extack,
|
||||
"cannot specify local IPv4 address without remote");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
if (!attrs[OVPN_A_PEER_REMOTE_IPV6] &&
|
||||
attrs[OVPN_A_PEER_LOCAL_IPV6]) {
|
||||
NL_SET_ERR_MSG_MOD(info->extack,
|
||||
"cannot specify local IPV6 address without remote");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
/* check that local and remote address families are the same even
|
||||
* after parsing v4mapped IPv6 addresses.
|
||||
* (if addresses are not provided, family will be AF_UNSPEC and
|
||||
* the check is skipped)
|
||||
*/
|
||||
local_fam = ovpn_nl_family_get(attrs[OVPN_A_PEER_LOCAL_IPV4],
|
||||
attrs[OVPN_A_PEER_LOCAL_IPV6]);
|
||||
remote_fam = ovpn_nl_family_get(attrs[OVPN_A_PEER_REMOTE_IPV4],
|
||||
attrs[OVPN_A_PEER_REMOTE_IPV6]);
|
||||
if (local_fam != AF_UNSPEC && remote_fam != AF_UNSPEC &&
|
||||
local_fam != remote_fam) {
|
||||
NL_SET_ERR_MSG_MOD(info->extack,
|
||||
"mismatching local and remote address families");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
if (remote_fam != AF_INET6 && attrs[OVPN_A_PEER_REMOTE_IPV6_SCOPE_ID]) {
|
||||
NL_SET_ERR_MSG_MOD(info->extack,
|
||||
"cannot specify scope id without remote IPv6 address");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
/* VPN IPs are needed only in MP mode for selecting the right peer */
|
||||
if (ovpn->mode == OVPN_MODE_P2P && (attrs[OVPN_A_PEER_VPN_IPV4] ||
|
||||
attrs[OVPN_A_PEER_VPN_IPV6])) {
|
||||
NL_SET_ERR_MSG_FMT_MOD(info->extack,
|
||||
"unexpected VPN IP in P2P mode");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
if ((attrs[OVPN_A_PEER_KEEPALIVE_INTERVAL] &&
|
||||
!attrs[OVPN_A_PEER_KEEPALIVE_TIMEOUT]) ||
|
||||
(!attrs[OVPN_A_PEER_KEEPALIVE_INTERVAL] &&
|
||||
attrs[OVPN_A_PEER_KEEPALIVE_TIMEOUT])) {
|
||||
NL_SET_ERR_MSG_FMT_MOD(info->extack,
|
||||
"keepalive interval and timeout are required together");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* ovpn_nl_peer_modify - modify the peer attributes according to the incoming msg
|
||||
* @peer: the peer to modify
|
||||
* @info: generic netlink info from the user request
|
||||
* @attrs: the attributes from the user request
|
||||
*
|
||||
* Return: a negative error code in case of failure, 0 on success or 1 on
|
||||
* success and the VPN IPs have been modified (requires rehashing in MP
|
||||
* mode)
|
||||
*/
|
||||
static int ovpn_nl_peer_modify(struct ovpn_peer *peer, struct genl_info *info,
|
||||
struct nlattr **attrs)
|
||||
{
|
||||
struct sockaddr_storage ss = {};
|
||||
void *local_ip = NULL;
|
||||
u32 interv, timeout;
|
||||
bool rehash = false;
|
||||
int ret;
|
||||
|
||||
spin_lock_bh(&peer->lock);
|
||||
|
||||
if (ovpn_nl_attr_sockaddr_remote(attrs, &ss)) {
|
||||
/* we carry the local IP in a generic container.
|
||||
* ovpn_peer_reset_sockaddr() will properly interpret it
|
||||
* based on ss.ss_family
|
||||
*/
|
||||
local_ip = ovpn_nl_attr_local_ip(attrs);
|
||||
|
||||
/* set peer sockaddr */
|
||||
ret = ovpn_peer_reset_sockaddr(peer, &ss, local_ip);
|
||||
if (ret < 0) {
|
||||
NL_SET_ERR_MSG_FMT_MOD(info->extack,
|
||||
"cannot set peer sockaddr: %d",
|
||||
ret);
|
||||
goto err_unlock;
|
||||
}
|
||||
dst_cache_reset(&peer->dst_cache);
|
||||
}
|
||||
|
||||
if (attrs[OVPN_A_PEER_VPN_IPV4]) {
|
||||
rehash = true;
|
||||
peer->vpn_addrs.ipv4.s_addr =
|
||||
nla_get_in_addr(attrs[OVPN_A_PEER_VPN_IPV4]);
|
||||
}
|
||||
|
||||
if (attrs[OVPN_A_PEER_VPN_IPV6]) {
|
||||
rehash = true;
|
||||
peer->vpn_addrs.ipv6 =
|
||||
nla_get_in6_addr(attrs[OVPN_A_PEER_VPN_IPV6]);
|
||||
}
|
||||
|
||||
/* when setting the keepalive, both parameters have to be configured */
|
||||
if (attrs[OVPN_A_PEER_KEEPALIVE_INTERVAL] &&
|
||||
attrs[OVPN_A_PEER_KEEPALIVE_TIMEOUT]) {
|
||||
interv = nla_get_u32(attrs[OVPN_A_PEER_KEEPALIVE_INTERVAL]);
|
||||
timeout = nla_get_u32(attrs[OVPN_A_PEER_KEEPALIVE_TIMEOUT]);
|
||||
ovpn_peer_keepalive_set(peer, interv, timeout);
|
||||
}
|
||||
|
||||
netdev_dbg(peer->ovpn->dev,
|
||||
"modify peer id=%u endpoint=%pIScp VPN-IPv4=%pI4 VPN-IPv6=%pI6c\n",
|
||||
peer->id, &ss,
|
||||
&peer->vpn_addrs.ipv4.s_addr, &peer->vpn_addrs.ipv6);
|
||||
|
||||
spin_unlock_bh(&peer->lock);
|
||||
|
||||
return rehash ? 1 : 0;
|
||||
err_unlock:
|
||||
spin_unlock_bh(&peer->lock);
|
||||
return ret;
|
||||
}
|
||||
|
||||
int ovpn_nl_peer_new_doit(struct sk_buff *skb, struct genl_info *info)
|
||||
{
|
||||
return -EOPNOTSUPP;
|
||||
struct nlattr *attrs[OVPN_A_PEER_MAX + 1];
|
||||
struct ovpn_priv *ovpn = info->user_ptr[0];
|
||||
struct ovpn_socket *ovpn_sock;
|
||||
struct socket *sock = NULL;
|
||||
struct ovpn_peer *peer;
|
||||
u32 sockfd, peer_id;
|
||||
int ret;
|
||||
|
||||
if (GENL_REQ_ATTR_CHECK(info, OVPN_A_PEER))
|
||||
return -EINVAL;
|
||||
|
||||
ret = nla_parse_nested(attrs, OVPN_A_PEER_MAX, info->attrs[OVPN_A_PEER],
|
||||
ovpn_peer_nl_policy, info->extack);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
ret = ovpn_nl_peer_precheck(ovpn, info, attrs);
|
||||
if (ret < 0)
|
||||
return ret;
|
||||
|
||||
if (NL_REQ_ATTR_CHECK(info->extack, info->attrs[OVPN_A_PEER], attrs,
|
||||
OVPN_A_PEER_SOCKET))
|
||||
return -EINVAL;
|
||||
|
||||
/* in MP mode VPN IPs are required for selecting the right peer */
|
||||
if (ovpn->mode == OVPN_MODE_MP && !attrs[OVPN_A_PEER_VPN_IPV4] &&
|
||||
!attrs[OVPN_A_PEER_VPN_IPV6]) {
|
||||
NL_SET_ERR_MSG_FMT_MOD(info->extack,
|
||||
"VPN IP must be provided in MP mode");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
peer_id = nla_get_u32(attrs[OVPN_A_PEER_ID]);
|
||||
peer = ovpn_peer_new(ovpn, peer_id);
|
||||
if (IS_ERR(peer)) {
|
||||
NL_SET_ERR_MSG_FMT_MOD(info->extack,
|
||||
"cannot create new peer object for peer %u: %ld",
|
||||
peer_id, PTR_ERR(peer));
|
||||
return PTR_ERR(peer);
|
||||
}
|
||||
|
||||
/* lookup the fd in the kernel table and extract the socket object */
|
||||
sockfd = nla_get_u32(attrs[OVPN_A_PEER_SOCKET]);
|
||||
/* sockfd_lookup() increases sock's refcounter */
|
||||
sock = sockfd_lookup(sockfd, &ret);
|
||||
if (!sock) {
|
||||
NL_SET_ERR_MSG_FMT_MOD(info->extack,
|
||||
"cannot lookup peer socket (fd=%u): %d",
|
||||
sockfd, ret);
|
||||
ret = -ENOTSOCK;
|
||||
goto peer_release;
|
||||
}
|
||||
|
||||
/* Only when using UDP as transport protocol the remote endpoint
|
||||
* can be configured so that ovpn knows where to send packets to.
|
||||
*/
|
||||
if (sock->sk->sk_protocol == IPPROTO_UDP &&
|
||||
!attrs[OVPN_A_PEER_REMOTE_IPV4] &&
|
||||
!attrs[OVPN_A_PEER_REMOTE_IPV6]) {
|
||||
NL_SET_ERR_MSG_FMT_MOD(info->extack,
|
||||
"missing remote IP address for UDP socket");
|
||||
sockfd_put(sock);
|
||||
ret = -EINVAL;
|
||||
goto peer_release;
|
||||
}
|
||||
|
||||
/* In case of TCP, the socket is connected to the peer and ovpn
|
||||
* will just send bytes over it, without the need to specify a
|
||||
* destination.
|
||||
*/
|
||||
if (sock->sk->sk_protocol == IPPROTO_TCP &&
|
||||
(attrs[OVPN_A_PEER_REMOTE_IPV4] ||
|
||||
attrs[OVPN_A_PEER_REMOTE_IPV6])) {
|
||||
NL_SET_ERR_MSG_FMT_MOD(info->extack,
|
||||
"unexpected remote IP address with TCP socket");
|
||||
sockfd_put(sock);
|
||||
ret = -EINVAL;
|
||||
goto peer_release;
|
||||
}
|
||||
|
||||
ovpn_sock = ovpn_socket_new(sock, peer);
|
||||
/* at this point we unconditionally drop the reference to the socket:
|
||||
* - in case of error, the socket has to be dropped
|
||||
* - if case of success, the socket is configured and let
|
||||
* userspace own the reference, so that the latter can
|
||||
* trigger the final close()
|
||||
*/
|
||||
sockfd_put(sock);
|
||||
if (IS_ERR(ovpn_sock)) {
|
||||
NL_SET_ERR_MSG_FMT_MOD(info->extack,
|
||||
"cannot encapsulate socket: %ld",
|
||||
PTR_ERR(ovpn_sock));
|
||||
ret = -ENOTSOCK;
|
||||
goto peer_release;
|
||||
}
|
||||
|
||||
rcu_assign_pointer(peer->sock, ovpn_sock);
|
||||
|
||||
ret = ovpn_nl_peer_modify(peer, info, attrs);
|
||||
if (ret < 0)
|
||||
goto sock_release;
|
||||
|
||||
ret = ovpn_peer_add(ovpn, peer);
|
||||
if (ret < 0) {
|
||||
NL_SET_ERR_MSG_FMT_MOD(info->extack,
|
||||
"cannot add new peer (id=%u) to hashtable: %d",
|
||||
peer->id, ret);
|
||||
goto sock_release;
|
||||
}
|
||||
|
||||
return 0;
|
||||
|
||||
sock_release:
|
||||
ovpn_socket_release(peer);
|
||||
peer_release:
|
||||
/* release right away because peer was not yet hashed, thus it is not
|
||||
* used in any context
|
||||
*/
|
||||
ovpn_peer_release(peer);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
int ovpn_nl_peer_set_doit(struct sk_buff *skb, struct genl_info *info)
|
||||
{
|
||||
return -EOPNOTSUPP;
|
||||
struct nlattr *attrs[OVPN_A_PEER_MAX + 1];
|
||||
struct ovpn_priv *ovpn = info->user_ptr[0];
|
||||
struct ovpn_socket *sock;
|
||||
struct ovpn_peer *peer;
|
||||
u32 peer_id;
|
||||
int ret;
|
||||
|
||||
if (GENL_REQ_ATTR_CHECK(info, OVPN_A_PEER))
|
||||
return -EINVAL;
|
||||
|
||||
ret = nla_parse_nested(attrs, OVPN_A_PEER_MAX, info->attrs[OVPN_A_PEER],
|
||||
ovpn_peer_nl_policy, info->extack);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
ret = ovpn_nl_peer_precheck(ovpn, info, attrs);
|
||||
if (ret < 0)
|
||||
return ret;
|
||||
|
||||
if (attrs[OVPN_A_PEER_SOCKET]) {
|
||||
NL_SET_ERR_MSG_FMT_MOD(info->extack,
|
||||
"socket cannot be modified");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
peer_id = nla_get_u32(attrs[OVPN_A_PEER_ID]);
|
||||
peer = ovpn_peer_get_by_id(ovpn, peer_id);
|
||||
if (!peer) {
|
||||
NL_SET_ERR_MSG_FMT_MOD(info->extack,
|
||||
"cannot find peer with id %u", peer_id);
|
||||
return -ENOENT;
|
||||
}
|
||||
|
||||
/* when using a TCP socket the remote IP is not expected */
|
||||
rcu_read_lock();
|
||||
sock = rcu_dereference(peer->sock);
|
||||
if (sock && sock->sock->sk->sk_protocol == IPPROTO_TCP &&
|
||||
(attrs[OVPN_A_PEER_REMOTE_IPV4] ||
|
||||
attrs[OVPN_A_PEER_REMOTE_IPV6])) {
|
||||
rcu_read_unlock();
|
||||
NL_SET_ERR_MSG_FMT_MOD(info->extack,
|
||||
"unexpected remote IP address with TCP socket");
|
||||
ovpn_peer_put(peer);
|
||||
return -EINVAL;
|
||||
}
|
||||
rcu_read_unlock();
|
||||
|
||||
spin_lock_bh(&ovpn->lock);
|
||||
ret = ovpn_nl_peer_modify(peer, info, attrs);
|
||||
if (ret < 0) {
|
||||
spin_unlock_bh(&ovpn->lock);
|
||||
ovpn_peer_put(peer);
|
||||
return ret;
|
||||
}
|
||||
|
||||
/* ret == 1 means that VPN IPv4/6 has been modified and rehashing
|
||||
* is required
|
||||
*/
|
||||
if (ret > 0)
|
||||
ovpn_peer_hash_vpn_ip(peer);
|
||||
spin_unlock_bh(&ovpn->lock);
|
||||
ovpn_peer_put(peer);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int ovpn_nl_send_peer(struct sk_buff *skb, const struct genl_info *info,
|
||||
const struct ovpn_peer *peer, u32 portid, u32 seq,
|
||||
int flags)
|
||||
{
|
||||
const struct ovpn_bind *bind;
|
||||
struct ovpn_socket *sock;
|
||||
int ret = -EMSGSIZE;
|
||||
struct nlattr *attr;
|
||||
__be16 local_port;
|
||||
void *hdr;
|
||||
int id;
|
||||
|
||||
hdr = genlmsg_put(skb, portid, seq, &ovpn_nl_family, flags,
|
||||
OVPN_CMD_PEER_GET);
|
||||
if (!hdr)
|
||||
return -ENOBUFS;
|
||||
|
||||
attr = nla_nest_start(skb, OVPN_A_PEER);
|
||||
if (!attr)
|
||||
goto err;
|
||||
|
||||
rcu_read_lock();
|
||||
sock = rcu_dereference(peer->sock);
|
||||
if (!sock) {
|
||||
ret = -EINVAL;
|
||||
goto err_unlock;
|
||||
}
|
||||
|
||||
if (!net_eq(genl_info_net(info), sock_net(sock->sock->sk))) {
|
||||
id = peernet2id_alloc(genl_info_net(info),
|
||||
sock_net(sock->sock->sk),
|
||||
GFP_ATOMIC);
|
||||
if (nla_put_s32(skb, OVPN_A_PEER_SOCKET_NETNSID, id))
|
||||
goto err_unlock;
|
||||
}
|
||||
local_port = inet_sk(sock->sock->sk)->inet_sport;
|
||||
rcu_read_unlock();
|
||||
|
||||
if (nla_put_u32(skb, OVPN_A_PEER_ID, peer->id))
|
||||
goto err;
|
||||
|
||||
if (peer->vpn_addrs.ipv4.s_addr != htonl(INADDR_ANY))
|
||||
if (nla_put_in_addr(skb, OVPN_A_PEER_VPN_IPV4,
|
||||
peer->vpn_addrs.ipv4.s_addr))
|
||||
goto err;
|
||||
|
||||
if (!ipv6_addr_equal(&peer->vpn_addrs.ipv6, &in6addr_any))
|
||||
if (nla_put_in6_addr(skb, OVPN_A_PEER_VPN_IPV6,
|
||||
&peer->vpn_addrs.ipv6))
|
||||
goto err;
|
||||
|
||||
if (nla_put_u32(skb, OVPN_A_PEER_KEEPALIVE_INTERVAL,
|
||||
peer->keepalive_interval) ||
|
||||
nla_put_u32(skb, OVPN_A_PEER_KEEPALIVE_TIMEOUT,
|
||||
peer->keepalive_timeout))
|
||||
goto err;
|
||||
|
||||
rcu_read_lock();
|
||||
bind = rcu_dereference(peer->bind);
|
||||
if (bind) {
|
||||
if (bind->remote.in4.sin_family == AF_INET) {
|
||||
if (nla_put_in_addr(skb, OVPN_A_PEER_REMOTE_IPV4,
|
||||
bind->remote.in4.sin_addr.s_addr) ||
|
||||
nla_put_net16(skb, OVPN_A_PEER_REMOTE_PORT,
|
||||
bind->remote.in4.sin_port) ||
|
||||
nla_put_in_addr(skb, OVPN_A_PEER_LOCAL_IPV4,
|
||||
bind->local.ipv4.s_addr))
|
||||
goto err_unlock;
|
||||
} else if (bind->remote.in4.sin_family == AF_INET6) {
|
||||
if (nla_put_in6_addr(skb, OVPN_A_PEER_REMOTE_IPV6,
|
||||
&bind->remote.in6.sin6_addr) ||
|
||||
nla_put_u32(skb, OVPN_A_PEER_REMOTE_IPV6_SCOPE_ID,
|
||||
bind->remote.in6.sin6_scope_id) ||
|
||||
nla_put_net16(skb, OVPN_A_PEER_REMOTE_PORT,
|
||||
bind->remote.in6.sin6_port) ||
|
||||
nla_put_in6_addr(skb, OVPN_A_PEER_LOCAL_IPV6,
|
||||
&bind->local.ipv6))
|
||||
goto err_unlock;
|
||||
}
|
||||
}
|
||||
rcu_read_unlock();
|
||||
|
||||
if (nla_put_net16(skb, OVPN_A_PEER_LOCAL_PORT, local_port) ||
|
||||
/* VPN RX stats */
|
||||
nla_put_uint(skb, OVPN_A_PEER_VPN_RX_BYTES,
|
||||
atomic64_read(&peer->vpn_stats.rx.bytes)) ||
|
||||
nla_put_uint(skb, OVPN_A_PEER_VPN_RX_PACKETS,
|
||||
atomic64_read(&peer->vpn_stats.rx.packets)) ||
|
||||
/* VPN TX stats */
|
||||
nla_put_uint(skb, OVPN_A_PEER_VPN_TX_BYTES,
|
||||
atomic64_read(&peer->vpn_stats.tx.bytes)) ||
|
||||
nla_put_uint(skb, OVPN_A_PEER_VPN_TX_PACKETS,
|
||||
atomic64_read(&peer->vpn_stats.tx.packets)) ||
|
||||
/* link RX stats */
|
||||
nla_put_uint(skb, OVPN_A_PEER_LINK_RX_BYTES,
|
||||
atomic64_read(&peer->link_stats.rx.bytes)) ||
|
||||
nla_put_uint(skb, OVPN_A_PEER_LINK_RX_PACKETS,
|
||||
atomic64_read(&peer->link_stats.rx.packets)) ||
|
||||
/* link TX stats */
|
||||
nla_put_uint(skb, OVPN_A_PEER_LINK_TX_BYTES,
|
||||
atomic64_read(&peer->link_stats.tx.bytes)) ||
|
||||
nla_put_uint(skb, OVPN_A_PEER_LINK_TX_PACKETS,
|
||||
atomic64_read(&peer->link_stats.tx.packets)))
|
||||
goto err;
|
||||
|
||||
nla_nest_end(skb, attr);
|
||||
genlmsg_end(skb, hdr);
|
||||
|
||||
return 0;
|
||||
err_unlock:
|
||||
rcu_read_unlock();
|
||||
err:
|
||||
genlmsg_cancel(skb, hdr);
|
||||
return ret;
|
||||
}
|
||||
|
||||
int ovpn_nl_peer_get_doit(struct sk_buff *skb, struct genl_info *info)
|
||||
{
|
||||
return -EOPNOTSUPP;
|
||||
struct nlattr *attrs[OVPN_A_PEER_MAX + 1];
|
||||
struct ovpn_priv *ovpn = info->user_ptr[0];
|
||||
struct ovpn_peer *peer;
|
||||
struct sk_buff *msg;
|
||||
u32 peer_id;
|
||||
int ret;
|
||||
|
||||
if (GENL_REQ_ATTR_CHECK(info, OVPN_A_PEER))
|
||||
return -EINVAL;
|
||||
|
||||
ret = nla_parse_nested(attrs, OVPN_A_PEER_MAX, info->attrs[OVPN_A_PEER],
|
||||
ovpn_peer_nl_policy, info->extack);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
if (NL_REQ_ATTR_CHECK(info->extack, info->attrs[OVPN_A_PEER], attrs,
|
||||
OVPN_A_PEER_ID))
|
||||
return -EINVAL;
|
||||
|
||||
peer_id = nla_get_u32(attrs[OVPN_A_PEER_ID]);
|
||||
peer = ovpn_peer_get_by_id(ovpn, peer_id);
|
||||
if (!peer) {
|
||||
NL_SET_ERR_MSG_FMT_MOD(info->extack,
|
||||
"cannot find peer with id %u", peer_id);
|
||||
return -ENOENT;
|
||||
}
|
||||
|
||||
msg = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
|
||||
if (!msg) {
|
||||
ret = -ENOMEM;
|
||||
goto err;
|
||||
}
|
||||
|
||||
ret = ovpn_nl_send_peer(msg, info, peer, info->snd_portid,
|
||||
info->snd_seq, 0);
|
||||
if (ret < 0) {
|
||||
nlmsg_free(msg);
|
||||
goto err;
|
||||
}
|
||||
|
||||
ret = genlmsg_reply(msg, info);
|
||||
err:
|
||||
ovpn_peer_put(peer);
|
||||
return ret;
|
||||
}
|
||||
|
||||
int ovpn_nl_peer_get_dumpit(struct sk_buff *skb, struct netlink_callback *cb)
|
||||
{
|
||||
return -EOPNOTSUPP;
|
||||
const struct genl_info *info = genl_info_dump(cb);
|
||||
int bkt, last_idx = cb->args[1], dumped = 0;
|
||||
netdevice_tracker tracker;
|
||||
struct ovpn_priv *ovpn;
|
||||
struct ovpn_peer *peer;
|
||||
|
||||
ovpn = ovpn_get_dev_from_attrs(sock_net(cb->skb->sk), info, &tracker);
|
||||
if (IS_ERR(ovpn))
|
||||
return PTR_ERR(ovpn);
|
||||
|
||||
if (ovpn->mode == OVPN_MODE_P2P) {
|
||||
/* if we already dumped a peer it means we are done */
|
||||
if (last_idx)
|
||||
goto out;
|
||||
|
||||
rcu_read_lock();
|
||||
peer = rcu_dereference(ovpn->peer);
|
||||
if (peer) {
|
||||
if (ovpn_nl_send_peer(skb, info, peer,
|
||||
NETLINK_CB(cb->skb).portid,
|
||||
cb->nlh->nlmsg_seq,
|
||||
NLM_F_MULTI) == 0)
|
||||
dumped++;
|
||||
}
|
||||
rcu_read_unlock();
|
||||
} else {
|
||||
rcu_read_lock();
|
||||
hash_for_each_rcu(ovpn->peers->by_id, bkt, peer,
|
||||
hash_entry_id) {
|
||||
/* skip already dumped peers that were dumped by
|
||||
* previous invocations
|
||||
*/
|
||||
if (last_idx > 0) {
|
||||
last_idx--;
|
||||
continue;
|
||||
}
|
||||
|
||||
if (ovpn_nl_send_peer(skb, info, peer,
|
||||
NETLINK_CB(cb->skb).portid,
|
||||
cb->nlh->nlmsg_seq,
|
||||
NLM_F_MULTI) < 0)
|
||||
break;
|
||||
|
||||
/* count peers being dumped during this invocation */
|
||||
dumped++;
|
||||
}
|
||||
rcu_read_unlock();
|
||||
}
|
||||
|
||||
out:
|
||||
netdev_put(ovpn->dev, &tracker);
|
||||
|
||||
/* sum up peers dumped in this message, so that at the next invocation
|
||||
* we can continue from where we left
|
||||
*/
|
||||
cb->args[1] += dumped;
|
||||
return skb->len;
|
||||
}
|
||||
|
||||
int ovpn_nl_peer_del_doit(struct sk_buff *skb, struct genl_info *info)
|
||||
{
|
||||
return -EOPNOTSUPP;
|
||||
struct nlattr *attrs[OVPN_A_PEER_MAX + 1];
|
||||
struct ovpn_priv *ovpn = info->user_ptr[0];
|
||||
struct ovpn_peer *peer;
|
||||
u32 peer_id;
|
||||
int ret;
|
||||
|
||||
if (GENL_REQ_ATTR_CHECK(info, OVPN_A_PEER))
|
||||
return -EINVAL;
|
||||
|
||||
ret = nla_parse_nested(attrs, OVPN_A_PEER_MAX, info->attrs[OVPN_A_PEER],
|
||||
ovpn_peer_nl_policy, info->extack);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
if (NL_REQ_ATTR_CHECK(info->extack, info->attrs[OVPN_A_PEER], attrs,
|
||||
OVPN_A_PEER_ID))
|
||||
return -EINVAL;
|
||||
|
||||
peer_id = nla_get_u32(attrs[OVPN_A_PEER_ID]);
|
||||
peer = ovpn_peer_get_by_id(ovpn, peer_id);
|
||||
if (!peer) {
|
||||
NL_SET_ERR_MSG_FMT_MOD(info->extack,
|
||||
"cannot find peer with id %u", peer_id);
|
||||
return -ENOENT;
|
||||
}
|
||||
|
||||
netdev_dbg(ovpn->dev, "del peer %u\n", peer->id);
|
||||
ret = ovpn_peer_del(peer, OVPN_DEL_PEER_REASON_USERSPACE);
|
||||
ovpn_peer_put(peer);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
int ovpn_nl_key_new_doit(struct sk_buff *skb, struct genl_info *info)
|
||||
|
|
|
|||
|
|
@ -135,9 +135,9 @@ struct ovpn_peer *ovpn_peer_new(struct ovpn_priv *ovpn, u32 id)
|
|||
*
|
||||
* Return: 0 on success or a negative error code otherwise
|
||||
*/
|
||||
static int ovpn_peer_reset_sockaddr(struct ovpn_peer *peer,
|
||||
const struct sockaddr_storage *ss,
|
||||
const void *local_ip)
|
||||
int ovpn_peer_reset_sockaddr(struct ovpn_peer *peer,
|
||||
const struct sockaddr_storage *ss,
|
||||
const void *local_ip)
|
||||
{
|
||||
struct ovpn_bind *bind;
|
||||
size_t ip_len;
|
||||
|
|
@ -149,19 +149,21 @@ static int ovpn_peer_reset_sockaddr(struct ovpn_peer *peer,
|
|||
if (IS_ERR(bind))
|
||||
return PTR_ERR(bind);
|
||||
|
||||
if (ss->ss_family == AF_INET) {
|
||||
ip_len = sizeof(struct in_addr);
|
||||
} else if (ss->ss_family == AF_INET6) {
|
||||
ip_len = sizeof(struct in6_addr);
|
||||
} else {
|
||||
net_dbg_ratelimited("%s: invalid family %u for remote endpoint for peer %u\n",
|
||||
netdev_name(peer->ovpn->dev),
|
||||
ss->ss_family, peer->id);
|
||||
kfree(bind);
|
||||
return -EINVAL;
|
||||
}
|
||||
if (local_ip) {
|
||||
if (ss->ss_family == AF_INET) {
|
||||
ip_len = sizeof(struct in_addr);
|
||||
} else if (ss->ss_family == AF_INET6) {
|
||||
ip_len = sizeof(struct in6_addr);
|
||||
} else {
|
||||
net_dbg_ratelimited("%s: invalid family %u for remote endpoint for peer %u\n",
|
||||
netdev_name(peer->ovpn->dev),
|
||||
ss->ss_family, peer->id);
|
||||
kfree(bind);
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
memcpy(&bind->local, local_ip, ip_len);
|
||||
memcpy(&bind->local, local_ip, ip_len);
|
||||
}
|
||||
|
||||
/* set binding */
|
||||
ovpn_bind_reset(peer, bind);
|
||||
|
|
@ -346,7 +348,7 @@ static void ovpn_peer_release_rcu(struct rcu_head *head)
|
|||
* ovpn_peer_release - release peer private members
|
||||
* @peer: the peer to release
|
||||
*/
|
||||
static void ovpn_peer_release(struct ovpn_peer *peer)
|
||||
void ovpn_peer_release(struct ovpn_peer *peer)
|
||||
{
|
||||
ovpn_crypto_state_release(&peer->crypto);
|
||||
spin_lock_bh(&peer->lock);
|
||||
|
|
@ -887,6 +889,37 @@ bool ovpn_peer_check_by_src(struct ovpn_priv *ovpn, struct sk_buff *skb,
|
|||
return match;
|
||||
}
|
||||
|
||||
void ovpn_peer_hash_vpn_ip(struct ovpn_peer *peer)
|
||||
{
|
||||
struct hlist_nulls_head *nhead;
|
||||
|
||||
lockdep_assert_held(&peer->ovpn->lock);
|
||||
|
||||
/* rehashing makes sense only in multipeer mode */
|
||||
if (peer->ovpn->mode != OVPN_MODE_MP)
|
||||
return;
|
||||
|
||||
if (peer->vpn_addrs.ipv4.s_addr != htonl(INADDR_ANY)) {
|
||||
/* remove potential old hashing */
|
||||
hlist_nulls_del_init_rcu(&peer->hash_entry_addr4);
|
||||
|
||||
nhead = ovpn_get_hash_head(peer->ovpn->peers->by_vpn_addr4,
|
||||
&peer->vpn_addrs.ipv4,
|
||||
sizeof(peer->vpn_addrs.ipv4));
|
||||
hlist_nulls_add_head_rcu(&peer->hash_entry_addr4, nhead);
|
||||
}
|
||||
|
||||
if (!ipv6_addr_any(&peer->vpn_addrs.ipv6)) {
|
||||
/* remove potential old hashing */
|
||||
hlist_nulls_del_init_rcu(&peer->hash_entry_addr6);
|
||||
|
||||
nhead = ovpn_get_hash_head(peer->ovpn->peers->by_vpn_addr6,
|
||||
&peer->vpn_addrs.ipv6,
|
||||
sizeof(peer->vpn_addrs.ipv6));
|
||||
hlist_nulls_add_head_rcu(&peer->hash_entry_addr6, nhead);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* ovpn_peer_add_mp - add peer to related tables in a MP instance
|
||||
* @ovpn: the instance to add the peer to
|
||||
|
|
@ -948,19 +981,7 @@ static int ovpn_peer_add_mp(struct ovpn_priv *ovpn, struct ovpn_peer *peer)
|
|||
ovpn_get_hash_head(ovpn->peers->by_id, &peer->id,
|
||||
sizeof(peer->id)));
|
||||
|
||||
if (peer->vpn_addrs.ipv4.s_addr != htonl(INADDR_ANY)) {
|
||||
nhead = ovpn_get_hash_head(ovpn->peers->by_vpn_addr4,
|
||||
&peer->vpn_addrs.ipv4,
|
||||
sizeof(peer->vpn_addrs.ipv4));
|
||||
hlist_nulls_add_head_rcu(&peer->hash_entry_addr4, nhead);
|
||||
}
|
||||
|
||||
if (!ipv6_addr_any(&peer->vpn_addrs.ipv6)) {
|
||||
nhead = ovpn_get_hash_head(ovpn->peers->by_vpn_addr6,
|
||||
&peer->vpn_addrs.ipv6,
|
||||
sizeof(peer->vpn_addrs.ipv6));
|
||||
hlist_nulls_add_head_rcu(&peer->hash_entry_addr6, nhead);
|
||||
}
|
||||
ovpn_peer_hash_vpn_ip(peer);
|
||||
out:
|
||||
spin_unlock_bh(&ovpn->lock);
|
||||
return ret;
|
||||
|
|
|
|||
|
|
@ -125,6 +125,7 @@ static inline bool ovpn_peer_hold(struct ovpn_peer *peer)
|
|||
return kref_get_unless_zero(&peer->refcount);
|
||||
}
|
||||
|
||||
void ovpn_peer_release(struct ovpn_peer *peer);
|
||||
void ovpn_peer_release_kref(struct kref *kref);
|
||||
|
||||
/**
|
||||
|
|
@ -147,6 +148,7 @@ struct ovpn_peer *ovpn_peer_get_by_transp_addr(struct ovpn_priv *ovpn,
|
|||
struct ovpn_peer *ovpn_peer_get_by_id(struct ovpn_priv *ovpn, u32 peer_id);
|
||||
struct ovpn_peer *ovpn_peer_get_by_dst(struct ovpn_priv *ovpn,
|
||||
struct sk_buff *skb);
|
||||
void ovpn_peer_hash_vpn_ip(struct ovpn_peer *peer);
|
||||
bool ovpn_peer_check_by_src(struct ovpn_priv *ovpn, struct sk_buff *skb,
|
||||
struct ovpn_peer *peer);
|
||||
|
||||
|
|
@ -154,5 +156,8 @@ void ovpn_peer_keepalive_set(struct ovpn_peer *peer, u32 interval, u32 timeout);
|
|||
void ovpn_peer_keepalive_work(struct work_struct *work);
|
||||
|
||||
void ovpn_peer_endpoints_update(struct ovpn_peer *peer, struct sk_buff *skb);
|
||||
int ovpn_peer_reset_sockaddr(struct ovpn_peer *peer,
|
||||
const struct sockaddr_storage *ss,
|
||||
const void *local_ip);
|
||||
|
||||
#endif /* _NET_OVPN_OVPNPEER_H_ */
|
||||
|
|
|
|||
|
|
@ -49,8 +49,8 @@ static bool ovpn_socket_put(struct ovpn_peer *peer, struct ovpn_socket *sock)
|
|||
* ovpn_socket_release - release resources owned by socket user
|
||||
* @peer: peer whose socket should be released
|
||||
*
|
||||
* This function should be invoked when the user is shutting
|
||||
* down and wants to drop its link to the socket.
|
||||
* This function should be invoked when the peer is being removed
|
||||
* and wants to drop its link to the socket.
|
||||
*
|
||||
* In case of UDP, the detach routine will drop a reference to the
|
||||
* ovpn netdev, pointed by the ovpn_socket.
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue