Linux Audio

Check our new training course

Loading...
v3.1
  1/*
  2 * raw.c - Raw sockets for protocol family CAN
  3 *
  4 * Copyright (c) 2002-2007 Volkswagen Group Electronic Research
  5 * All rights reserved.
  6 *
  7 * Redistribution and use in source and binary forms, with or without
  8 * modification, are permitted provided that the following conditions
  9 * are met:
 10 * 1. Redistributions of source code must retain the above copyright
 11 *    notice, this list of conditions and the following disclaimer.
 12 * 2. Redistributions in binary form must reproduce the above copyright
 13 *    notice, this list of conditions and the following disclaimer in the
 14 *    documentation and/or other materials provided with the distribution.
 15 * 3. Neither the name of Volkswagen nor the names of its contributors
 16 *    may be used to endorse or promote products derived from this software
 17 *    without specific prior written permission.
 18 *
 19 * Alternatively, provided that this notice is retained in full, this
 20 * software may be distributed under the terms of the GNU General
 21 * Public License ("GPL") version 2, in which case the provisions of the
 22 * GPL apply INSTEAD OF those given above.
 23 *
 24 * The provided data structures and external interfaces from this code
 25 * are not restricted to be used by modules with a GPL compatible license.
 26 *
 27 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
 28 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
 29 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
 30 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
 31 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 32 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
 33 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 34 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 35 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 36 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
 37 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
 38 * DAMAGE.
 39 *
 40 * Send feedback to <socketcan-users@lists.berlios.de>
 41 *
 42 */
 43
 44#include <linux/module.h>
 45#include <linux/init.h>
 46#include <linux/uio.h>
 47#include <linux/net.h>
 48#include <linux/slab.h>
 49#include <linux/netdevice.h>
 50#include <linux/socket.h>
 51#include <linux/if_arp.h>
 52#include <linux/skbuff.h>
 53#include <linux/can.h>
 54#include <linux/can/core.h>
 
 
 55#include <linux/can/raw.h>
 56#include <net/sock.h>
 57#include <net/net_namespace.h>
 58
 59#define CAN_RAW_VERSION CAN_VERSION
 60static __initdata const char banner[] =
 61	KERN_INFO "can: raw protocol (rev " CAN_RAW_VERSION ")\n";
 62
 63MODULE_DESCRIPTION("PF_CAN raw protocol");
 64MODULE_LICENSE("Dual BSD/GPL");
 65MODULE_AUTHOR("Urs Thuermann <urs.thuermann@volkswagen.de>");
 66MODULE_ALIAS("can-proto-1");
 67
 
 
 68#define MASK_ALL 0
 69
 70/*
 71 * A raw socket has a list of can_filters attached to it, each receiving
 72 * the CAN frames matching that filter.  If the filter list is empty,
 73 * no CAN frames will be received by the socket.  The default after
 74 * opening the socket, is to have one filter which receives all frames.
 75 * The filter list is allocated dynamically with the exception of the
 76 * list containing only one item.  This common case is optimized by
 77 * storing the single filter in dfilter, to avoid using dynamic memory.
 78 */
 79
 
 
 
 
 
 
 80struct raw_sock {
 81	struct sock sk;
 82	int bound;
 83	int ifindex;
 84	struct notifier_block notifier;
 
 
 85	int loopback;
 86	int recv_own_msgs;
 
 
 
 87	int count;                 /* number of active filters */
 88	struct can_filter dfilter; /* default/single filter */
 89	struct can_filter *filter; /* pointer to filter(s) */
 90	can_err_mask_t err_mask;
 
 91};
 92
 93/*
 94 * Return pointer to store the extra msg flags for raw_recvmsg().
 
 
 
 95 * We use the space of one unsigned int beyond the 'struct sockaddr_can'
 96 * in skb->cb.
 97 */
 98static inline unsigned int *raw_flags(struct sk_buff *skb)
 99{
100	BUILD_BUG_ON(sizeof(skb->cb) <= (sizeof(struct sockaddr_can) +
101					 sizeof(unsigned int)));
102
103	/* return pointer after struct sockaddr_can */
104	return (unsigned int *)(&((struct sockaddr_can *)skb->cb)[1]);
105}
106
107static inline struct raw_sock *raw_sk(const struct sock *sk)
108{
109	return (struct raw_sock *)sk;
110}
111
112static void raw_rcv(struct sk_buff *oskb, void *data)
113{
114	struct sock *sk = (struct sock *)data;
115	struct raw_sock *ro = raw_sk(sk);
116	struct sockaddr_can *addr;
117	struct sk_buff *skb;
118	unsigned int *pflags;
119
120	/* check the received tx sock reference */
121	if (!ro->recv_own_msgs && oskb->sk == sk)
122		return;
123
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
124	/* clone the given skb to be able to enqueue it into the rcv queue */
125	skb = skb_clone(oskb, GFP_ATOMIC);
126	if (!skb)
127		return;
128
129	/*
130	 *  Put the datagram to the queue so that raw_recvmsg() can
131	 *  get it from there.  We need to pass the interface index to
132	 *  raw_recvmsg().  We pass a whole struct sockaddr_can in skb->cb
133	 *  containing the interface index.
134	 */
135
136	BUILD_BUG_ON(sizeof(skb->cb) < sizeof(struct sockaddr_can));
137	addr = (struct sockaddr_can *)skb->cb;
138	memset(addr, 0, sizeof(*addr));
139	addr->can_family  = AF_CAN;
140	addr->can_ifindex = skb->dev->ifindex;
141
142	/* add CAN specific message flags for raw_recvmsg() */
143	pflags = raw_flags(skb);
144	*pflags = 0;
145	if (oskb->sk)
146		*pflags |= MSG_DONTROUTE;
147	if (oskb->sk == sk)
148		*pflags |= MSG_CONFIRM;
149
150	if (sock_queue_rcv_skb(sk, skb) < 0)
151		kfree_skb(skb);
152}
153
154static int raw_enable_filters(struct net_device *dev, struct sock *sk,
155			      struct can_filter *filter, int count)
 
156{
157	int err = 0;
158	int i;
159
160	for (i = 0; i < count; i++) {
161		err = can_rx_register(dev, filter[i].can_id,
162				      filter[i].can_mask,
163				      raw_rcv, sk, "raw");
164		if (err) {
165			/* clean up successfully registered filters */
166			while (--i >= 0)
167				can_rx_unregister(dev, filter[i].can_id,
168						  filter[i].can_mask,
169						  raw_rcv, sk);
170			break;
171		}
172	}
173
174	return err;
175}
176
177static int raw_enable_errfilter(struct net_device *dev, struct sock *sk,
178				can_err_mask_t err_mask)
179{
180	int err = 0;
181
182	if (err_mask)
183		err = can_rx_register(dev, 0, err_mask | CAN_ERR_FLAG,
184				      raw_rcv, sk, "raw");
185
186	return err;
187}
188
189static void raw_disable_filters(struct net_device *dev, struct sock *sk,
190			      struct can_filter *filter, int count)
 
191{
192	int i;
193
194	for (i = 0; i < count; i++)
195		can_rx_unregister(dev, filter[i].can_id, filter[i].can_mask,
196				  raw_rcv, sk);
197}
198
199static inline void raw_disable_errfilter(struct net_device *dev,
 
200					 struct sock *sk,
201					 can_err_mask_t err_mask)
202
203{
204	if (err_mask)
205		can_rx_unregister(dev, 0, err_mask | CAN_ERR_FLAG,
206				  raw_rcv, sk);
207}
208
209static inline void raw_disable_allfilters(struct net_device *dev,
 
210					  struct sock *sk)
211{
212	struct raw_sock *ro = raw_sk(sk);
213
214	raw_disable_filters(dev, sk, ro->filter, ro->count);
215	raw_disable_errfilter(dev, sk, ro->err_mask);
216}
217
218static int raw_enable_allfilters(struct net_device *dev, struct sock *sk)
 
219{
220	struct raw_sock *ro = raw_sk(sk);
221	int err;
222
223	err = raw_enable_filters(dev, sk, ro->filter, ro->count);
224	if (!err) {
225		err = raw_enable_errfilter(dev, sk, ro->err_mask);
226		if (err)
227			raw_disable_filters(dev, sk, ro->filter, ro->count);
 
228	}
229
230	return err;
231}
232
233static int raw_notifier(struct notifier_block *nb,
234			unsigned long msg, void *data)
235{
236	struct net_device *dev = (struct net_device *)data;
237	struct raw_sock *ro = container_of(nb, struct raw_sock, notifier);
238	struct sock *sk = &ro->sk;
239
240	if (!net_eq(dev_net(dev), &init_net))
241		return NOTIFY_DONE;
242
243	if (dev->type != ARPHRD_CAN)
244		return NOTIFY_DONE;
245
246	if (ro->ifindex != dev->ifindex)
247		return NOTIFY_DONE;
248
249	switch (msg) {
250
251	case NETDEV_UNREGISTER:
252		lock_sock(sk);
253		/* remove current filters & unregister */
254		if (ro->bound)
255			raw_disable_allfilters(dev, sk);
 
 
256
257		if (ro->count > 1)
258			kfree(ro->filter);
259
260		ro->ifindex = 0;
261		ro->bound   = 0;
262		ro->count   = 0;
 
263		release_sock(sk);
264
265		sk->sk_err = ENODEV;
266		if (!sock_flag(sk, SOCK_DEAD))
267			sk->sk_error_report(sk);
268		break;
269
270	case NETDEV_DOWN:
271		sk->sk_err = ENETDOWN;
272		if (!sock_flag(sk, SOCK_DEAD))
273			sk->sk_error_report(sk);
274		break;
275	}
 
276
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
277	return NOTIFY_DONE;
278}
279
280static int raw_init(struct sock *sk)
281{
282	struct raw_sock *ro = raw_sk(sk);
283
284	ro->bound            = 0;
285	ro->ifindex          = 0;
 
286
287	/* set default filter to single entry dfilter */
288	ro->dfilter.can_id   = 0;
289	ro->dfilter.can_mask = MASK_ALL;
290	ro->filter           = &ro->dfilter;
291	ro->count            = 1;
292
293	/* set default loopback behaviour */
294	ro->loopback         = 1;
295	ro->recv_own_msgs    = 0;
 
 
 
 
 
 
 
 
296
297	/* set notifier */
298	ro->notifier.notifier_call = raw_notifier;
299
300	register_netdevice_notifier(&ro->notifier);
301
302	return 0;
303}
304
305static int raw_release(struct socket *sock)
306{
307	struct sock *sk = sock->sk;
308	struct raw_sock *ro;
309
310	if (!sk)
311		return 0;
312
313	ro = raw_sk(sk);
314
315	unregister_netdevice_notifier(&ro->notifier);
 
 
 
 
 
 
 
316
 
317	lock_sock(sk);
318
319	/* remove current filters & unregister */
320	if (ro->bound) {
321		if (ro->ifindex) {
322			struct net_device *dev;
323
324			dev = dev_get_by_index(&init_net, ro->ifindex);
325			if (dev) {
326				raw_disable_allfilters(dev, sk);
327				dev_put(dev);
328			}
329		} else
330			raw_disable_allfilters(NULL, sk);
331	}
332
333	if (ro->count > 1)
334		kfree(ro->filter);
335
336	ro->ifindex = 0;
337	ro->bound   = 0;
338	ro->count   = 0;
 
 
339
340	sock_orphan(sk);
341	sock->sk = NULL;
342
343	release_sock(sk);
 
 
344	sock_put(sk);
345
346	return 0;
347}
348
349static int raw_bind(struct socket *sock, struct sockaddr *uaddr, int len)
350{
351	struct sockaddr_can *addr = (struct sockaddr_can *)uaddr;
352	struct sock *sk = sock->sk;
353	struct raw_sock *ro = raw_sk(sk);
 
354	int ifindex;
355	int err = 0;
356	int notify_enetdown = 0;
357
358	if (len < sizeof(*addr))
 
 
359		return -EINVAL;
360
 
361	lock_sock(sk);
362
363	if (ro->bound && addr->can_ifindex == ro->ifindex)
364		goto out;
365
366	if (addr->can_ifindex) {
367		struct net_device *dev;
368
369		dev = dev_get_by_index(&init_net, addr->can_ifindex);
370		if (!dev) {
371			err = -ENODEV;
372			goto out;
373		}
374		if (dev->type != ARPHRD_CAN) {
375			dev_put(dev);
376			err = -ENODEV;
377			goto out;
378		}
 
379		if (!(dev->flags & IFF_UP))
380			notify_enetdown = 1;
381
382		ifindex = dev->ifindex;
383
384		/* filters set by default/setsockopt */
385		err = raw_enable_allfilters(dev, sk);
386		dev_put(dev);
 
 
387	} else {
388		ifindex = 0;
389
390		/* filters set by default/setsockopt */
391		err = raw_enable_allfilters(NULL, sk);
392	}
393
394	if (!err) {
395		if (ro->bound) {
396			/* unregister old filters */
397			if (ro->ifindex) {
398				struct net_device *dev;
399
400				dev = dev_get_by_index(&init_net, ro->ifindex);
401				if (dev) {
402					raw_disable_allfilters(dev, sk);
403					dev_put(dev);
404				}
405			} else
406				raw_disable_allfilters(NULL, sk);
407		}
408		ro->ifindex = ifindex;
409		ro->bound = 1;
 
 
 
 
410	}
411
412 out:
 
 
 
413	release_sock(sk);
 
414
415	if (notify_enetdown) {
416		sk->sk_err = ENETDOWN;
417		if (!sock_flag(sk, SOCK_DEAD))
418			sk->sk_error_report(sk);
419	}
420
421	return err;
422}
423
424static int raw_getname(struct socket *sock, struct sockaddr *uaddr,
425		       int *len, int peer)
426{
427	struct sockaddr_can *addr = (struct sockaddr_can *)uaddr;
428	struct sock *sk = sock->sk;
429	struct raw_sock *ro = raw_sk(sk);
430
431	if (peer)
432		return -EOPNOTSUPP;
433
434	memset(addr, 0, sizeof(*addr));
435	addr->can_family  = AF_CAN;
436	addr->can_ifindex = ro->ifindex;
437
438	*len = sizeof(*addr);
439
440	return 0;
441}
442
443static int raw_setsockopt(struct socket *sock, int level, int optname,
444			  char __user *optval, unsigned int optlen)
445{
446	struct sock *sk = sock->sk;
447	struct raw_sock *ro = raw_sk(sk);
448	struct can_filter *filter = NULL;  /* dyn. alloc'ed filters */
449	struct can_filter sfilter;         /* single filter */
450	struct net_device *dev = NULL;
451	can_err_mask_t err_mask = 0;
 
452	int count = 0;
453	int err = 0;
454
455	if (level != SOL_CAN_RAW)
456		return -EINVAL;
457
458	switch (optname) {
459
460	case CAN_RAW_FILTER:
461		if (optlen % sizeof(struct can_filter) != 0)
462			return -EINVAL;
463
 
 
 
464		count = optlen / sizeof(struct can_filter);
465
466		if (count > 1) {
467			/* filter does not fit into dfilter => alloc space */
468			filter = memdup_user(optval, optlen);
469			if (IS_ERR(filter))
470				return PTR_ERR(filter);
471		} else if (count == 1) {
472			if (copy_from_user(&sfilter, optval, sizeof(sfilter)))
473				return -EFAULT;
474		}
475
 
476		lock_sock(sk);
477
478		if (ro->bound && ro->ifindex)
479			dev = dev_get_by_index(&init_net, ro->ifindex);
 
 
 
 
 
 
 
480
481		if (ro->bound) {
482			/* (try to) register the new filters */
483			if (count == 1)
484				err = raw_enable_filters(dev, sk, &sfilter, 1);
 
485			else
486				err = raw_enable_filters(dev, sk, filter,
487							 count);
488			if (err) {
489				if (count > 1)
490					kfree(filter);
491				goto out_fil;
492			}
493
494			/* remove old filter registrations */
495			raw_disable_filters(dev, sk, ro->filter, ro->count);
 
496		}
497
498		/* remove old filter space */
499		if (ro->count > 1)
500			kfree(ro->filter);
501
502		/* link new filters to the socket */
503		if (count == 1) {
504			/* copy filter data for single filter */
505			ro->dfilter = sfilter;
506			filter = &ro->dfilter;
507		}
508		ro->filter = filter;
509		ro->count  = count;
510
511 out_fil:
512		if (dev)
513			dev_put(dev);
514
515		release_sock(sk);
 
516
517		break;
518
519	case CAN_RAW_ERR_FILTER:
520		if (optlen != sizeof(err_mask))
521			return -EINVAL;
522
523		if (copy_from_user(&err_mask, optval, optlen))
524			return -EFAULT;
525
526		err_mask &= CAN_ERR_MASK;
527
 
528		lock_sock(sk);
529
530		if (ro->bound && ro->ifindex)
531			dev = dev_get_by_index(&init_net, ro->ifindex);
 
 
 
 
 
532
533		/* remove current error mask */
534		if (ro->bound) {
535			/* (try to) register the new err_mask */
536			err = raw_enable_errfilter(dev, sk, err_mask);
 
537
538			if (err)
539				goto out_err;
540
541			/* remove old err_mask registration */
542			raw_disable_errfilter(dev, sk, ro->err_mask);
 
543		}
544
545		/* link new err_mask to the socket */
546		ro->err_mask = err_mask;
547
548 out_err:
549		if (dev)
550			dev_put(dev);
551
552		release_sock(sk);
 
553
554		break;
555
556	case CAN_RAW_LOOPBACK:
557		if (optlen != sizeof(ro->loopback))
558			return -EINVAL;
559
560		if (copy_from_user(&ro->loopback, optval, optlen))
561			return -EFAULT;
562
563		break;
564
565	case CAN_RAW_RECV_OWN_MSGS:
566		if (optlen != sizeof(ro->recv_own_msgs))
567			return -EINVAL;
568
569		if (copy_from_user(&ro->recv_own_msgs, optval, optlen))
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
570			return -EFAULT;
571
572		break;
573
574	default:
575		return -ENOPROTOOPT;
576	}
577	return err;
578}
579
580static int raw_getsockopt(struct socket *sock, int level, int optname,
581			  char __user *optval, int __user *optlen)
582{
583	struct sock *sk = sock->sk;
584	struct raw_sock *ro = raw_sk(sk);
585	int len;
586	void *val;
587	int err = 0;
588
589	if (level != SOL_CAN_RAW)
590		return -EINVAL;
591	if (get_user(len, optlen))
592		return -EFAULT;
593	if (len < 0)
594		return -EINVAL;
595
596	switch (optname) {
597
598	case CAN_RAW_FILTER:
599		lock_sock(sk);
600		if (ro->count > 0) {
601			int fsize = ro->count * sizeof(struct can_filter);
602			if (len > fsize)
603				len = fsize;
604			if (copy_to_user(optval, ro->filter, len))
605				err = -EFAULT;
606		} else
 
 
 
 
 
 
 
 
 
607			len = 0;
 
608		release_sock(sk);
609
610		if (!err)
611			err = put_user(len, optlen);
612		return err;
613
614	case CAN_RAW_ERR_FILTER:
615		if (len > sizeof(can_err_mask_t))
616			len = sizeof(can_err_mask_t);
617		val = &ro->err_mask;
618		break;
619
620	case CAN_RAW_LOOPBACK:
621		if (len > sizeof(int))
622			len = sizeof(int);
623		val = &ro->loopback;
624		break;
625
626	case CAN_RAW_RECV_OWN_MSGS:
627		if (len > sizeof(int))
628			len = sizeof(int);
629		val = &ro->recv_own_msgs;
630		break;
631
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
632	default:
633		return -ENOPROTOOPT;
634	}
635
636	if (put_user(len, optlen))
637		return -EFAULT;
638	if (copy_to_user(optval, val, len))
639		return -EFAULT;
640	return 0;
641}
642
643static int raw_sendmsg(struct kiocb *iocb, struct socket *sock,
644		       struct msghdr *msg, size_t size)
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
645{
646	struct sock *sk = sock->sk;
647	struct raw_sock *ro = raw_sk(sk);
 
648	struct sk_buff *skb;
649	struct net_device *dev;
650	int ifindex;
651	int err;
 
 
 
 
652
653	if (msg->msg_name) {
654		struct sockaddr_can *addr =
655			(struct sockaddr_can *)msg->msg_name;
656
657		if (msg->msg_namelen < sizeof(*addr))
658			return -EINVAL;
659
660		if (addr->can_family != AF_CAN)
661			return -EINVAL;
662
663		ifindex = addr->can_ifindex;
664	} else
665		ifindex = ro->ifindex;
 
666
667	if (size != sizeof(struct can_frame))
668		return -EINVAL;
669
670	dev = dev_get_by_index(&init_net, ifindex);
671	if (!dev)
672		return -ENXIO;
673
674	skb = sock_alloc_send_skb(sk, size, msg->msg_flags & MSG_DONTWAIT,
675				  &err);
676	if (!skb)
677		goto put_dev;
678
679	err = memcpy_fromiovec(skb_put(skb, size), msg->msg_iov, size);
 
 
 
 
 
680	if (err < 0)
681		goto free_skb;
682	err = sock_tx_timestamp(sk, &skb_shinfo(skb)->tx_flags);
683	if (err < 0)
 
684		goto free_skb;
685
686	/* to be able to check the received tx sock reference in raw_rcv() */
687	skb_shinfo(skb)->tx_flags |= SKBTX_DRV_NEEDS_SK_REF;
 
 
 
 
688
689	skb->dev = dev;
690	skb->sk  = sk;
 
 
 
 
691
692	err = can_send(skb, ro->loopback);
693
694	dev_put(dev);
695
696	if (err)
697		goto send_failed;
698
699	return size;
700
701free_skb:
702	kfree_skb(skb);
703put_dev:
704	dev_put(dev);
705send_failed:
706	return err;
707}
708
709static int raw_recvmsg(struct kiocb *iocb, struct socket *sock,
710		       struct msghdr *msg, size_t size, int flags)
711{
712	struct sock *sk = sock->sk;
713	struct sk_buff *skb;
714	int err = 0;
715	int noblock;
716
717	noblock =  flags & MSG_DONTWAIT;
718	flags   &= ~MSG_DONTWAIT;
 
719
720	skb = skb_recv_datagram(sk, flags, noblock, &err);
721	if (!skb)
722		return err;
723
724	if (size < skb->len)
725		msg->msg_flags |= MSG_TRUNC;
726	else
727		size = skb->len;
728
729	err = memcpy_toiovec(msg->msg_iov, skb->data, size);
730	if (err < 0) {
731		skb_free_datagram(sk, skb);
732		return err;
733	}
734
735	sock_recv_ts_and_drops(msg, sk, skb);
736
737	if (msg->msg_name) {
738		msg->msg_namelen = sizeof(struct sockaddr_can);
 
739		memcpy(msg->msg_name, skb->cb, msg->msg_namelen);
740	}
741
742	/* assign the flags that have been recorded in raw_rcv() */
743	msg->msg_flags |= *(raw_flags(skb));
744
745	skb_free_datagram(sk, skb);
746
747	return size;
748}
749
 
 
 
 
 
 
 
750static const struct proto_ops raw_ops = {
751	.family        = PF_CAN,
752	.release       = raw_release,
753	.bind          = raw_bind,
754	.connect       = sock_no_connect,
755	.socketpair    = sock_no_socketpair,
756	.accept        = sock_no_accept,
757	.getname       = raw_getname,
758	.poll          = datagram_poll,
759	.ioctl         = can_ioctl,	/* use can_ioctl() from af_can.c */
 
760	.listen        = sock_no_listen,
761	.shutdown      = sock_no_shutdown,
762	.setsockopt    = raw_setsockopt,
763	.getsockopt    = raw_getsockopt,
764	.sendmsg       = raw_sendmsg,
765	.recvmsg       = raw_recvmsg,
766	.mmap          = sock_no_mmap,
767	.sendpage      = sock_no_sendpage,
768};
769
770static struct proto raw_proto __read_mostly = {
771	.name       = "CAN_RAW",
772	.owner      = THIS_MODULE,
773	.obj_size   = sizeof(struct raw_sock),
774	.init       = raw_init,
775};
776
777static const struct can_proto raw_can_proto = {
778	.type       = SOCK_RAW,
779	.protocol   = CAN_RAW,
780	.ops        = &raw_ops,
781	.prot       = &raw_proto,
782};
783
 
 
 
 
784static __init int raw_module_init(void)
785{
786	int err;
787
788	printk(banner);
 
 
 
 
789
790	err = can_proto_register(&raw_can_proto);
791	if (err < 0)
792		printk(KERN_ERR "can: registration of raw protocol failed\n");
 
 
 
 
793
 
 
794	return err;
795}
796
797static __exit void raw_module_exit(void)
798{
799	can_proto_unregister(&raw_can_proto);
 
800}
801
802module_init(raw_module_init);
803module_exit(raw_module_exit);
v6.8
   1// SPDX-License-Identifier: (GPL-2.0 OR BSD-3-Clause)
   2/* raw.c - Raw sockets for protocol family CAN
   3 *
   4 * Copyright (c) 2002-2007 Volkswagen Group Electronic Research
   5 * All rights reserved.
   6 *
   7 * Redistribution and use in source and binary forms, with or without
   8 * modification, are permitted provided that the following conditions
   9 * are met:
  10 * 1. Redistributions of source code must retain the above copyright
  11 *    notice, this list of conditions and the following disclaimer.
  12 * 2. Redistributions in binary form must reproduce the above copyright
  13 *    notice, this list of conditions and the following disclaimer in the
  14 *    documentation and/or other materials provided with the distribution.
  15 * 3. Neither the name of Volkswagen nor the names of its contributors
  16 *    may be used to endorse or promote products derived from this software
  17 *    without specific prior written permission.
  18 *
  19 * Alternatively, provided that this notice is retained in full, this
  20 * software may be distributed under the terms of the GNU General
  21 * Public License ("GPL") version 2, in which case the provisions of the
  22 * GPL apply INSTEAD OF those given above.
  23 *
  24 * The provided data structures and external interfaces from this code
  25 * are not restricted to be used by modules with a GPL compatible license.
  26 *
  27 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
  28 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
  29 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
  30 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
  31 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  32 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
  33 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
  34 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
  35 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
  36 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
  37 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
  38 * DAMAGE.
  39 *
 
 
  40 */
  41
  42#include <linux/module.h>
  43#include <linux/init.h>
  44#include <linux/uio.h>
  45#include <linux/net.h>
  46#include <linux/slab.h>
  47#include <linux/netdevice.h>
  48#include <linux/socket.h>
  49#include <linux/if_arp.h>
  50#include <linux/skbuff.h>
  51#include <linux/can.h>
  52#include <linux/can/core.h>
  53#include <linux/can/dev.h> /* for can_is_canxl_dev_mtu() */
  54#include <linux/can/skb.h>
  55#include <linux/can/raw.h>
  56#include <net/sock.h>
  57#include <net/net_namespace.h>
  58
 
 
 
 
  59MODULE_DESCRIPTION("PF_CAN raw protocol");
  60MODULE_LICENSE("Dual BSD/GPL");
  61MODULE_AUTHOR("Urs Thuermann <urs.thuermann@volkswagen.de>");
  62MODULE_ALIAS("can-proto-1");
  63
  64#define RAW_MIN_NAMELEN CAN_REQUIRED_SIZE(struct sockaddr_can, can_ifindex)
  65
  66#define MASK_ALL 0
  67
  68/* A raw socket has a list of can_filters attached to it, each receiving
 
  69 * the CAN frames matching that filter.  If the filter list is empty,
  70 * no CAN frames will be received by the socket.  The default after
  71 * opening the socket, is to have one filter which receives all frames.
  72 * The filter list is allocated dynamically with the exception of the
  73 * list containing only one item.  This common case is optimized by
  74 * storing the single filter in dfilter, to avoid using dynamic memory.
  75 */
  76
  77struct uniqframe {
  78	int skbcnt;
  79	const struct sk_buff *skb;
  80	unsigned int join_rx_count;
  81};
  82
  83struct raw_sock {
  84	struct sock sk;
  85	int bound;
  86	int ifindex;
  87	struct net_device *dev;
  88	netdevice_tracker dev_tracker;
  89	struct list_head notifier;
  90	int loopback;
  91	int recv_own_msgs;
  92	int fd_frames;
  93	int xl_frames;
  94	int join_filters;
  95	int count;                 /* number of active filters */
  96	struct can_filter dfilter; /* default/single filter */
  97	struct can_filter *filter; /* pointer to filter(s) */
  98	can_err_mask_t err_mask;
  99	struct uniqframe __percpu *uniq;
 100};
 101
 102static LIST_HEAD(raw_notifier_list);
 103static DEFINE_SPINLOCK(raw_notifier_lock);
 104static struct raw_sock *raw_busy_notifier;
 105
 106/* Return pointer to store the extra msg flags for raw_recvmsg().
 107 * We use the space of one unsigned int beyond the 'struct sockaddr_can'
 108 * in skb->cb.
 109 */
 110static inline unsigned int *raw_flags(struct sk_buff *skb)
 111{
 112	sock_skb_cb_check_size(sizeof(struct sockaddr_can) +
 113			       sizeof(unsigned int));
 114
 115	/* return pointer after struct sockaddr_can */
 116	return (unsigned int *)(&((struct sockaddr_can *)skb->cb)[1]);
 117}
 118
 119static inline struct raw_sock *raw_sk(const struct sock *sk)
 120{
 121	return (struct raw_sock *)sk;
 122}
 123
 124static void raw_rcv(struct sk_buff *oskb, void *data)
 125{
 126	struct sock *sk = (struct sock *)data;
 127	struct raw_sock *ro = raw_sk(sk);
 128	struct sockaddr_can *addr;
 129	struct sk_buff *skb;
 130	unsigned int *pflags;
 131
 132	/* check the received tx sock reference */
 133	if (!ro->recv_own_msgs && oskb->sk == sk)
 134		return;
 135
 136	/* make sure to not pass oversized frames to the socket */
 137	if ((!ro->fd_frames && can_is_canfd_skb(oskb)) ||
 138	    (!ro->xl_frames && can_is_canxl_skb(oskb)))
 139		return;
 140
 141	/* eliminate multiple filter matches for the same skb */
 142	if (this_cpu_ptr(ro->uniq)->skb == oskb &&
 143	    this_cpu_ptr(ro->uniq)->skbcnt == can_skb_prv(oskb)->skbcnt) {
 144		if (!ro->join_filters)
 145			return;
 146
 147		this_cpu_inc(ro->uniq->join_rx_count);
 148		/* drop frame until all enabled filters matched */
 149		if (this_cpu_ptr(ro->uniq)->join_rx_count < ro->count)
 150			return;
 151	} else {
 152		this_cpu_ptr(ro->uniq)->skb = oskb;
 153		this_cpu_ptr(ro->uniq)->skbcnt = can_skb_prv(oskb)->skbcnt;
 154		this_cpu_ptr(ro->uniq)->join_rx_count = 1;
 155		/* drop first frame to check all enabled filters? */
 156		if (ro->join_filters && ro->count > 1)
 157			return;
 158	}
 159
 160	/* clone the given skb to be able to enqueue it into the rcv queue */
 161	skb = skb_clone(oskb, GFP_ATOMIC);
 162	if (!skb)
 163		return;
 164
 165	/* Put the datagram to the queue so that raw_recvmsg() can get
 166	 * it from there. We need to pass the interface index to
 167	 * raw_recvmsg(). We pass a whole struct sockaddr_can in
 168	 * skb->cb containing the interface index.
 
 169	 */
 170
 171	sock_skb_cb_check_size(sizeof(struct sockaddr_can));
 172	addr = (struct sockaddr_can *)skb->cb;
 173	memset(addr, 0, sizeof(*addr));
 174	addr->can_family = AF_CAN;
 175	addr->can_ifindex = skb->dev->ifindex;
 176
 177	/* add CAN specific message flags for raw_recvmsg() */
 178	pflags = raw_flags(skb);
 179	*pflags = 0;
 180	if (oskb->sk)
 181		*pflags |= MSG_DONTROUTE;
 182	if (oskb->sk == sk)
 183		*pflags |= MSG_CONFIRM;
 184
 185	if (sock_queue_rcv_skb(sk, skb) < 0)
 186		kfree_skb(skb);
 187}
 188
 189static int raw_enable_filters(struct net *net, struct net_device *dev,
 190			      struct sock *sk, struct can_filter *filter,
 191			      int count)
 192{
 193	int err = 0;
 194	int i;
 195
 196	for (i = 0; i < count; i++) {
 197		err = can_rx_register(net, dev, filter[i].can_id,
 198				      filter[i].can_mask,
 199				      raw_rcv, sk, "raw", sk);
 200		if (err) {
 201			/* clean up successfully registered filters */
 202			while (--i >= 0)
 203				can_rx_unregister(net, dev, filter[i].can_id,
 204						  filter[i].can_mask,
 205						  raw_rcv, sk);
 206			break;
 207		}
 208	}
 209
 210	return err;
 211}
 212
 213static int raw_enable_errfilter(struct net *net, struct net_device *dev,
 214				struct sock *sk, can_err_mask_t err_mask)
 215{
 216	int err = 0;
 217
 218	if (err_mask)
 219		err = can_rx_register(net, dev, 0, err_mask | CAN_ERR_FLAG,
 220				      raw_rcv, sk, "raw", sk);
 221
 222	return err;
 223}
 224
 225static void raw_disable_filters(struct net *net, struct net_device *dev,
 226				struct sock *sk, struct can_filter *filter,
 227				int count)
 228{
 229	int i;
 230
 231	for (i = 0; i < count; i++)
 232		can_rx_unregister(net, dev, filter[i].can_id,
 233				  filter[i].can_mask, raw_rcv, sk);
 234}
 235
 236static inline void raw_disable_errfilter(struct net *net,
 237					 struct net_device *dev,
 238					 struct sock *sk,
 239					 can_err_mask_t err_mask)
 240
 241{
 242	if (err_mask)
 243		can_rx_unregister(net, dev, 0, err_mask | CAN_ERR_FLAG,
 244				  raw_rcv, sk);
 245}
 246
 247static inline void raw_disable_allfilters(struct net *net,
 248					  struct net_device *dev,
 249					  struct sock *sk)
 250{
 251	struct raw_sock *ro = raw_sk(sk);
 252
 253	raw_disable_filters(net, dev, sk, ro->filter, ro->count);
 254	raw_disable_errfilter(net, dev, sk, ro->err_mask);
 255}
 256
 257static int raw_enable_allfilters(struct net *net, struct net_device *dev,
 258				 struct sock *sk)
 259{
 260	struct raw_sock *ro = raw_sk(sk);
 261	int err;
 262
 263	err = raw_enable_filters(net, dev, sk, ro->filter, ro->count);
 264	if (!err) {
 265		err = raw_enable_errfilter(net, dev, sk, ro->err_mask);
 266		if (err)
 267			raw_disable_filters(net, dev, sk, ro->filter,
 268					    ro->count);
 269	}
 270
 271	return err;
 272}
 273
 274static void raw_notify(struct raw_sock *ro, unsigned long msg,
 275		       struct net_device *dev)
 276{
 
 
 277	struct sock *sk = &ro->sk;
 278
 279	if (!net_eq(dev_net(dev), sock_net(sk)))
 280		return;
 
 
 
 281
 282	if (ro->dev != dev)
 283		return;
 284
 285	switch (msg) {
 
 286	case NETDEV_UNREGISTER:
 287		lock_sock(sk);
 288		/* remove current filters & unregister */
 289		if (ro->bound) {
 290			raw_disable_allfilters(dev_net(dev), dev, sk);
 291			netdev_put(dev, &ro->dev_tracker);
 292		}
 293
 294		if (ro->count > 1)
 295			kfree(ro->filter);
 296
 297		ro->ifindex = 0;
 298		ro->bound = 0;
 299		ro->dev = NULL;
 300		ro->count = 0;
 301		release_sock(sk);
 302
 303		sk->sk_err = ENODEV;
 304		if (!sock_flag(sk, SOCK_DEAD))
 305			sk_error_report(sk);
 306		break;
 307
 308	case NETDEV_DOWN:
 309		sk->sk_err = ENETDOWN;
 310		if (!sock_flag(sk, SOCK_DEAD))
 311			sk_error_report(sk);
 312		break;
 313	}
 314}
 315
 316static int raw_notifier(struct notifier_block *nb, unsigned long msg,
 317			void *ptr)
 318{
 319	struct net_device *dev = netdev_notifier_info_to_dev(ptr);
 320
 321	if (dev->type != ARPHRD_CAN)
 322		return NOTIFY_DONE;
 323	if (msg != NETDEV_UNREGISTER && msg != NETDEV_DOWN)
 324		return NOTIFY_DONE;
 325	if (unlikely(raw_busy_notifier)) /* Check for reentrant bug. */
 326		return NOTIFY_DONE;
 327
 328	spin_lock(&raw_notifier_lock);
 329	list_for_each_entry(raw_busy_notifier, &raw_notifier_list, notifier) {
 330		spin_unlock(&raw_notifier_lock);
 331		raw_notify(raw_busy_notifier, msg, dev);
 332		spin_lock(&raw_notifier_lock);
 333	}
 334	raw_busy_notifier = NULL;
 335	spin_unlock(&raw_notifier_lock);
 336	return NOTIFY_DONE;
 337}
 338
 339static int raw_init(struct sock *sk)
 340{
 341	struct raw_sock *ro = raw_sk(sk);
 342
 343	ro->bound            = 0;
 344	ro->ifindex          = 0;
 345	ro->dev              = NULL;
 346
 347	/* set default filter to single entry dfilter */
 348	ro->dfilter.can_id   = 0;
 349	ro->dfilter.can_mask = MASK_ALL;
 350	ro->filter           = &ro->dfilter;
 351	ro->count            = 1;
 352
 353	/* set default loopback behaviour */
 354	ro->loopback         = 1;
 355	ro->recv_own_msgs    = 0;
 356	ro->fd_frames        = 0;
 357	ro->xl_frames        = 0;
 358	ro->join_filters     = 0;
 359
 360	/* alloc_percpu provides zero'ed memory */
 361	ro->uniq = alloc_percpu(struct uniqframe);
 362	if (unlikely(!ro->uniq))
 363		return -ENOMEM;
 364
 365	/* set notifier */
 366	spin_lock(&raw_notifier_lock);
 367	list_add_tail(&ro->notifier, &raw_notifier_list);
 368	spin_unlock(&raw_notifier_lock);
 369
 370	return 0;
 371}
 372
 373static int raw_release(struct socket *sock)
 374{
 375	struct sock *sk = sock->sk;
 376	struct raw_sock *ro;
 377
 378	if (!sk)
 379		return 0;
 380
 381	ro = raw_sk(sk);
 382
 383	spin_lock(&raw_notifier_lock);
 384	while (raw_busy_notifier == ro) {
 385		spin_unlock(&raw_notifier_lock);
 386		schedule_timeout_uninterruptible(1);
 387		spin_lock(&raw_notifier_lock);
 388	}
 389	list_del(&ro->notifier);
 390	spin_unlock(&raw_notifier_lock);
 391
 392	rtnl_lock();
 393	lock_sock(sk);
 394
 395	/* remove current filters & unregister */
 396	if (ro->bound) {
 397		if (ro->dev) {
 398			raw_disable_allfilters(dev_net(ro->dev), ro->dev, sk);
 399			netdev_put(ro->dev, &ro->dev_tracker);
 400		} else {
 401			raw_disable_allfilters(sock_net(sk), NULL, sk);
 402		}
 
 
 
 
 403	}
 404
 405	if (ro->count > 1)
 406		kfree(ro->filter);
 407
 408	ro->ifindex = 0;
 409	ro->bound = 0;
 410	ro->dev = NULL;
 411	ro->count = 0;
 412	free_percpu(ro->uniq);
 413
 414	sock_orphan(sk);
 415	sock->sk = NULL;
 416
 417	release_sock(sk);
 418	rtnl_unlock();
 419
 420	sock_put(sk);
 421
 422	return 0;
 423}
 424
 425static int raw_bind(struct socket *sock, struct sockaddr *uaddr, int len)
 426{
 427	struct sockaddr_can *addr = (struct sockaddr_can *)uaddr;
 428	struct sock *sk = sock->sk;
 429	struct raw_sock *ro = raw_sk(sk);
 430	struct net_device *dev = NULL;
 431	int ifindex;
 432	int err = 0;
 433	int notify_enetdown = 0;
 434
 435	if (len < RAW_MIN_NAMELEN)
 436		return -EINVAL;
 437	if (addr->can_family != AF_CAN)
 438		return -EINVAL;
 439
 440	rtnl_lock();
 441	lock_sock(sk);
 442
 443	if (ro->bound && addr->can_ifindex == ro->ifindex)
 444		goto out;
 445
 446	if (addr->can_ifindex) {
 447		dev = dev_get_by_index(sock_net(sk), addr->can_ifindex);
 
 
 448		if (!dev) {
 449			err = -ENODEV;
 450			goto out;
 451		}
 452		if (dev->type != ARPHRD_CAN) {
 
 453			err = -ENODEV;
 454			goto out_put_dev;
 455		}
 456
 457		if (!(dev->flags & IFF_UP))
 458			notify_enetdown = 1;
 459
 460		ifindex = dev->ifindex;
 461
 462		/* filters set by default/setsockopt */
 463		err = raw_enable_allfilters(sock_net(sk), dev, sk);
 464		if (err)
 465			goto out_put_dev;
 466
 467	} else {
 468		ifindex = 0;
 469
 470		/* filters set by default/setsockopt */
 471		err = raw_enable_allfilters(sock_net(sk), NULL, sk);
 472	}
 473
 474	if (!err) {
 475		if (ro->bound) {
 476			/* unregister old filters */
 477			if (ro->dev) {
 478				raw_disable_allfilters(dev_net(ro->dev),
 479						       ro->dev, sk);
 480				/* drop reference to old ro->dev */
 481				netdev_put(ro->dev, &ro->dev_tracker);
 482			} else {
 483				raw_disable_allfilters(sock_net(sk), NULL, sk);
 484			}
 
 
 485		}
 486		ro->ifindex = ifindex;
 487		ro->bound = 1;
 488		/* bind() ok -> hold a reference for new ro->dev */
 489		ro->dev = dev;
 490		if (ro->dev)
 491			netdev_hold(ro->dev, &ro->dev_tracker, GFP_KERNEL);
 492	}
 493
 494out_put_dev:
 495	/* remove potential reference from dev_get_by_index() */
 496	dev_put(dev);
 497out:
 498	release_sock(sk);
 499	rtnl_unlock();
 500
 501	if (notify_enetdown) {
 502		sk->sk_err = ENETDOWN;
 503		if (!sock_flag(sk, SOCK_DEAD))
 504			sk_error_report(sk);
 505	}
 506
 507	return err;
 508}
 509
 510static int raw_getname(struct socket *sock, struct sockaddr *uaddr,
 511		       int peer)
 512{
 513	struct sockaddr_can *addr = (struct sockaddr_can *)uaddr;
 514	struct sock *sk = sock->sk;
 515	struct raw_sock *ro = raw_sk(sk);
 516
 517	if (peer)
 518		return -EOPNOTSUPP;
 519
 520	memset(addr, 0, RAW_MIN_NAMELEN);
 521	addr->can_family  = AF_CAN;
 522	addr->can_ifindex = ro->ifindex;
 523
 524	return RAW_MIN_NAMELEN;
 
 
 525}
 526
 527static int raw_setsockopt(struct socket *sock, int level, int optname,
 528			  sockptr_t optval, unsigned int optlen)
 529{
 530	struct sock *sk = sock->sk;
 531	struct raw_sock *ro = raw_sk(sk);
 532	struct can_filter *filter = NULL;  /* dyn. alloc'ed filters */
 533	struct can_filter sfilter;         /* single filter */
 534	struct net_device *dev = NULL;
 535	can_err_mask_t err_mask = 0;
 536	int fd_frames;
 537	int count = 0;
 538	int err = 0;
 539
 540	if (level != SOL_CAN_RAW)
 541		return -EINVAL;
 542
 543	switch (optname) {
 
 544	case CAN_RAW_FILTER:
 545		if (optlen % sizeof(struct can_filter) != 0)
 546			return -EINVAL;
 547
 548		if (optlen > CAN_RAW_FILTER_MAX * sizeof(struct can_filter))
 549			return -EINVAL;
 550
 551		count = optlen / sizeof(struct can_filter);
 552
 553		if (count > 1) {
 554			/* filter does not fit into dfilter => alloc space */
 555			filter = memdup_sockptr(optval, optlen);
 556			if (IS_ERR(filter))
 557				return PTR_ERR(filter);
 558		} else if (count == 1) {
 559			if (copy_from_sockptr(&sfilter, optval, sizeof(sfilter)))
 560				return -EFAULT;
 561		}
 562
 563		rtnl_lock();
 564		lock_sock(sk);
 565
 566		dev = ro->dev;
 567		if (ro->bound && dev) {
 568			if (dev->reg_state != NETREG_REGISTERED) {
 569				if (count > 1)
 570					kfree(filter);
 571				err = -ENODEV;
 572				goto out_fil;
 573			}
 574		}
 575
 576		if (ro->bound) {
 577			/* (try to) register the new filters */
 578			if (count == 1)
 579				err = raw_enable_filters(sock_net(sk), dev, sk,
 580							 &sfilter, 1);
 581			else
 582				err = raw_enable_filters(sock_net(sk), dev, sk,
 583							 filter, count);
 584			if (err) {
 585				if (count > 1)
 586					kfree(filter);
 587				goto out_fil;
 588			}
 589
 590			/* remove old filter registrations */
 591			raw_disable_filters(sock_net(sk), dev, sk, ro->filter,
 592					    ro->count);
 593		}
 594
 595		/* remove old filter space */
 596		if (ro->count > 1)
 597			kfree(ro->filter);
 598
 599		/* link new filters to the socket */
 600		if (count == 1) {
 601			/* copy filter data for single filter */
 602			ro->dfilter = sfilter;
 603			filter = &ro->dfilter;
 604		}
 605		ro->filter = filter;
 606		ro->count  = count;
 607
 608 out_fil:
 
 
 
 609		release_sock(sk);
 610		rtnl_unlock();
 611
 612		break;
 613
 614	case CAN_RAW_ERR_FILTER:
 615		if (optlen != sizeof(err_mask))
 616			return -EINVAL;
 617
 618		if (copy_from_sockptr(&err_mask, optval, optlen))
 619			return -EFAULT;
 620
 621		err_mask &= CAN_ERR_MASK;
 622
 623		rtnl_lock();
 624		lock_sock(sk);
 625
 626		dev = ro->dev;
 627		if (ro->bound && dev) {
 628			if (dev->reg_state != NETREG_REGISTERED) {
 629				err = -ENODEV;
 630				goto out_err;
 631			}
 632		}
 633
 634		/* remove current error mask */
 635		if (ro->bound) {
 636			/* (try to) register the new err_mask */
 637			err = raw_enable_errfilter(sock_net(sk), dev, sk,
 638						   err_mask);
 639
 640			if (err)
 641				goto out_err;
 642
 643			/* remove old err_mask registration */
 644			raw_disable_errfilter(sock_net(sk), dev, sk,
 645					      ro->err_mask);
 646		}
 647
 648		/* link new err_mask to the socket */
 649		ro->err_mask = err_mask;
 650
 651 out_err:
 
 
 
 652		release_sock(sk);
 653		rtnl_unlock();
 654
 655		break;
 656
 657	case CAN_RAW_LOOPBACK:
 658		if (optlen != sizeof(ro->loopback))
 659			return -EINVAL;
 660
 661		if (copy_from_sockptr(&ro->loopback, optval, optlen))
 662			return -EFAULT;
 663
 664		break;
 665
 666	case CAN_RAW_RECV_OWN_MSGS:
 667		if (optlen != sizeof(ro->recv_own_msgs))
 668			return -EINVAL;
 669
 670		if (copy_from_sockptr(&ro->recv_own_msgs, optval, optlen))
 671			return -EFAULT;
 672
 673		break;
 674
 675	case CAN_RAW_FD_FRAMES:
 676		if (optlen != sizeof(fd_frames))
 677			return -EINVAL;
 678
 679		if (copy_from_sockptr(&fd_frames, optval, optlen))
 680			return -EFAULT;
 681
 682		/* Enabling CAN XL includes CAN FD */
 683		if (ro->xl_frames && !fd_frames)
 684			return -EINVAL;
 685
 686		ro->fd_frames = fd_frames;
 687		break;
 688
 689	case CAN_RAW_XL_FRAMES:
 690		if (optlen != sizeof(ro->xl_frames))
 691			return -EINVAL;
 692
 693		if (copy_from_sockptr(&ro->xl_frames, optval, optlen))
 694			return -EFAULT;
 695
 696		/* Enabling CAN XL includes CAN FD */
 697		if (ro->xl_frames)
 698			ro->fd_frames = ro->xl_frames;
 699		break;
 700
 701	case CAN_RAW_JOIN_FILTERS:
 702		if (optlen != sizeof(ro->join_filters))
 703			return -EINVAL;
 704
 705		if (copy_from_sockptr(&ro->join_filters, optval, optlen))
 706			return -EFAULT;
 707
 708		break;
 709
 710	default:
 711		return -ENOPROTOOPT;
 712	}
 713	return err;
 714}
 715
 716static int raw_getsockopt(struct socket *sock, int level, int optname,
 717			  char __user *optval, int __user *optlen)
 718{
 719	struct sock *sk = sock->sk;
 720	struct raw_sock *ro = raw_sk(sk);
 721	int len;
 722	void *val;
 723	int err = 0;
 724
 725	if (level != SOL_CAN_RAW)
 726		return -EINVAL;
 727	if (get_user(len, optlen))
 728		return -EFAULT;
 729	if (len < 0)
 730		return -EINVAL;
 731
 732	switch (optname) {
 
 733	case CAN_RAW_FILTER:
 734		lock_sock(sk);
 735		if (ro->count > 0) {
 736			int fsize = ro->count * sizeof(struct can_filter);
 737
 738			/* user space buffer to small for filter list? */
 739			if (len < fsize) {
 740				/* return -ERANGE and needed space in optlen */
 741				err = -ERANGE;
 742				if (put_user(fsize, optlen))
 743					err = -EFAULT;
 744			} else {
 745				if (len > fsize)
 746					len = fsize;
 747				if (copy_to_user(optval, ro->filter, len))
 748					err = -EFAULT;
 749			}
 750		} else {
 751			len = 0;
 752		}
 753		release_sock(sk);
 754
 755		if (!err)
 756			err = put_user(len, optlen);
 757		return err;
 758
 759	case CAN_RAW_ERR_FILTER:
 760		if (len > sizeof(can_err_mask_t))
 761			len = sizeof(can_err_mask_t);
 762		val = &ro->err_mask;
 763		break;
 764
 765	case CAN_RAW_LOOPBACK:
 766		if (len > sizeof(int))
 767			len = sizeof(int);
 768		val = &ro->loopback;
 769		break;
 770
 771	case CAN_RAW_RECV_OWN_MSGS:
 772		if (len > sizeof(int))
 773			len = sizeof(int);
 774		val = &ro->recv_own_msgs;
 775		break;
 776
 777	case CAN_RAW_FD_FRAMES:
 778		if (len > sizeof(int))
 779			len = sizeof(int);
 780		val = &ro->fd_frames;
 781		break;
 782
 783	case CAN_RAW_XL_FRAMES:
 784		if (len > sizeof(int))
 785			len = sizeof(int);
 786		val = &ro->xl_frames;
 787		break;
 788
 789	case CAN_RAW_JOIN_FILTERS:
 790		if (len > sizeof(int))
 791			len = sizeof(int);
 792		val = &ro->join_filters;
 793		break;
 794
 795	default:
 796		return -ENOPROTOOPT;
 797	}
 798
 799	if (put_user(len, optlen))
 800		return -EFAULT;
 801	if (copy_to_user(optval, val, len))
 802		return -EFAULT;
 803	return 0;
 804}
 805
 806static bool raw_bad_txframe(struct raw_sock *ro, struct sk_buff *skb, int mtu)
 807{
 808	/* Classical CAN -> no checks for flags and device capabilities */
 809	if (can_is_can_skb(skb))
 810		return false;
 811
 812	/* CAN FD -> needs to be enabled and a CAN FD or CAN XL device */
 813	if (ro->fd_frames && can_is_canfd_skb(skb) &&
 814	    (mtu == CANFD_MTU || can_is_canxl_dev_mtu(mtu)))
 815		return false;
 816
 817	/* CAN XL -> needs to be enabled and a CAN XL device */
 818	if (ro->xl_frames && can_is_canxl_skb(skb) &&
 819	    can_is_canxl_dev_mtu(mtu))
 820		return false;
 821
 822	return true;
 823}
 824
 825static int raw_sendmsg(struct socket *sock, struct msghdr *msg, size_t size)
 826{
 827	struct sock *sk = sock->sk;
 828	struct raw_sock *ro = raw_sk(sk);
 829	struct sockcm_cookie sockc;
 830	struct sk_buff *skb;
 831	struct net_device *dev;
 832	int ifindex;
 833	int err = -EINVAL;
 834
 835	/* check for valid CAN frame sizes */
 836	if (size < CANXL_HDR_SIZE + CANXL_MIN_DLEN || size > CANXL_MTU)
 837		return -EINVAL;
 838
 839	if (msg->msg_name) {
 840		DECLARE_SOCKADDR(struct sockaddr_can *, addr, msg->msg_name);
 
 841
 842		if (msg->msg_namelen < RAW_MIN_NAMELEN)
 843			return -EINVAL;
 844
 845		if (addr->can_family != AF_CAN)
 846			return -EINVAL;
 847
 848		ifindex = addr->can_ifindex;
 849	} else {
 850		ifindex = ro->ifindex;
 851	}
 852
 853	dev = dev_get_by_index(sock_net(sk), ifindex);
 
 
 
 854	if (!dev)
 855		return -ENXIO;
 856
 857	skb = sock_alloc_send_skb(sk, size + sizeof(struct can_skb_priv),
 858				  msg->msg_flags & MSG_DONTWAIT, &err);
 859	if (!skb)
 860		goto put_dev;
 861
 862	can_skb_reserve(skb);
 863	can_skb_prv(skb)->ifindex = dev->ifindex;
 864	can_skb_prv(skb)->skbcnt = 0;
 865
 866	/* fill the skb before testing for valid CAN frames */
 867	err = memcpy_from_msg(skb_put(skb, size), msg, size);
 868	if (err < 0)
 869		goto free_skb;
 870
 871	err = -EINVAL;
 872	if (raw_bad_txframe(ro, skb, dev->mtu))
 873		goto free_skb;
 874
 875	sockcm_init(&sockc, sk);
 876	if (msg->msg_controllen) {
 877		err = sock_cmsg_send(sk, msg, &sockc);
 878		if (unlikely(err))
 879			goto free_skb;
 880	}
 881
 882	skb->dev = dev;
 883	skb->priority = READ_ONCE(sk->sk_priority);
 884	skb->mark = READ_ONCE(sk->sk_mark);
 885	skb->tstamp = sockc.transmit_time;
 886
 887	skb_setup_tx_timestamp(skb, sockc.tsflags);
 888
 889	err = can_send(skb, ro->loopback);
 890
 891	dev_put(dev);
 892
 893	if (err)
 894		goto send_failed;
 895
 896	return size;
 897
 898free_skb:
 899	kfree_skb(skb);
 900put_dev:
 901	dev_put(dev);
 902send_failed:
 903	return err;
 904}
 905
 906static int raw_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
 907		       int flags)
 908{
 909	struct sock *sk = sock->sk;
 910	struct sk_buff *skb;
 911	int err = 0;
 
 912
 913	if (flags & MSG_ERRQUEUE)
 914		return sock_recv_errqueue(sk, msg, size,
 915					  SOL_CAN_RAW, SCM_CAN_RAW_ERRQUEUE);
 916
 917	skb = skb_recv_datagram(sk, flags, &err);
 918	if (!skb)
 919		return err;
 920
 921	if (size < skb->len)
 922		msg->msg_flags |= MSG_TRUNC;
 923	else
 924		size = skb->len;
 925
 926	err = memcpy_to_msg(msg, skb->data, size);
 927	if (err < 0) {
 928		skb_free_datagram(sk, skb);
 929		return err;
 930	}
 931
 932	sock_recv_cmsgs(msg, sk, skb);
 933
 934	if (msg->msg_name) {
 935		__sockaddr_check_size(RAW_MIN_NAMELEN);
 936		msg->msg_namelen = RAW_MIN_NAMELEN;
 937		memcpy(msg->msg_name, skb->cb, msg->msg_namelen);
 938	}
 939
 940	/* assign the flags that have been recorded in raw_rcv() */
 941	msg->msg_flags |= *(raw_flags(skb));
 942
 943	skb_free_datagram(sk, skb);
 944
 945	return size;
 946}
 947
 948static int raw_sock_no_ioctlcmd(struct socket *sock, unsigned int cmd,
 949				unsigned long arg)
 950{
 951	/* no ioctls for socket layer -> hand it down to NIC layer */
 952	return -ENOIOCTLCMD;
 953}
 954
 955static const struct proto_ops raw_ops = {
 956	.family        = PF_CAN,
 957	.release       = raw_release,
 958	.bind          = raw_bind,
 959	.connect       = sock_no_connect,
 960	.socketpair    = sock_no_socketpair,
 961	.accept        = sock_no_accept,
 962	.getname       = raw_getname,
 963	.poll          = datagram_poll,
 964	.ioctl         = raw_sock_no_ioctlcmd,
 965	.gettstamp     = sock_gettstamp,
 966	.listen        = sock_no_listen,
 967	.shutdown      = sock_no_shutdown,
 968	.setsockopt    = raw_setsockopt,
 969	.getsockopt    = raw_getsockopt,
 970	.sendmsg       = raw_sendmsg,
 971	.recvmsg       = raw_recvmsg,
 972	.mmap          = sock_no_mmap,
 
 973};
 974
 975static struct proto raw_proto __read_mostly = {
 976	.name       = "CAN_RAW",
 977	.owner      = THIS_MODULE,
 978	.obj_size   = sizeof(struct raw_sock),
 979	.init       = raw_init,
 980};
 981
 982static const struct can_proto raw_can_proto = {
 983	.type       = SOCK_RAW,
 984	.protocol   = CAN_RAW,
 985	.ops        = &raw_ops,
 986	.prot       = &raw_proto,
 987};
 988
 989static struct notifier_block canraw_notifier = {
 990	.notifier_call = raw_notifier
 991};
 992
 993static __init int raw_module_init(void)
 994{
 995	int err;
 996
 997	pr_info("can: raw protocol\n");
 998
 999	err = register_netdevice_notifier(&canraw_notifier);
1000	if (err)
1001		return err;
1002
1003	err = can_proto_register(&raw_can_proto);
1004	if (err < 0) {
1005		pr_err("can: registration of raw protocol failed\n");
1006		goto register_proto_failed;
1007	}
1008
1009	return 0;
1010
1011register_proto_failed:
1012	unregister_netdevice_notifier(&canraw_notifier);
1013	return err;
1014}
1015
1016static __exit void raw_module_exit(void)
1017{
1018	can_proto_unregister(&raw_can_proto);
1019	unregister_netdevice_notifier(&canraw_notifier);
1020}
1021
1022module_init(raw_module_init);
1023module_exit(raw_module_exit);