Loading...
1// SPDX-License-Identifier: ((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause)
2/* gw.c - CAN frame Gateway/Router/Bridge with netlink interface
3 *
4 * Copyright (c) 2019 Volkswagen Group Electronic Research
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of Volkswagen nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * Alternatively, provided that this notice is retained in full, this
20 * software may be distributed under the terms of the GNU General
21 * Public License ("GPL") version 2, in which case the provisions of the
22 * GPL apply INSTEAD OF those given above.
23 *
24 * The provided data structures and external interfaces from this code
25 * are not restricted to be used by modules with a GPL compatible license.
26 *
27 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
28 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
29 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
30 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
31 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
32 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
33 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
34 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
35 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
36 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
37 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
38 * DAMAGE.
39 *
40 */
41
42#include <linux/module.h>
43#include <linux/init.h>
44#include <linux/types.h>
45#include <linux/kernel.h>
46#include <linux/list.h>
47#include <linux/spinlock.h>
48#include <linux/rcupdate.h>
49#include <linux/rculist.h>
50#include <linux/net.h>
51#include <linux/netdevice.h>
52#include <linux/if_arp.h>
53#include <linux/skbuff.h>
54#include <linux/can.h>
55#include <linux/can/core.h>
56#include <linux/can/skb.h>
57#include <linux/can/gw.h>
58#include <net/rtnetlink.h>
59#include <net/net_namespace.h>
60#include <net/sock.h>
61
62#define CAN_GW_VERSION "20190810"
63#define CAN_GW_NAME "can-gw"
64
65MODULE_DESCRIPTION("PF_CAN netlink gateway");
66MODULE_LICENSE("Dual BSD/GPL");
67MODULE_AUTHOR("Oliver Hartkopp <oliver.hartkopp@volkswagen.de>");
68MODULE_ALIAS(CAN_GW_NAME);
69
70#define CGW_MIN_HOPS 1
71#define CGW_MAX_HOPS 6
72#define CGW_DEFAULT_HOPS 1
73
74static unsigned int max_hops __read_mostly = CGW_DEFAULT_HOPS;
75module_param(max_hops, uint, 0444);
76MODULE_PARM_DESC(max_hops,
77 "maximum " CAN_GW_NAME " routing hops for CAN frames "
78 "(valid values: " __stringify(CGW_MIN_HOPS) "-"
79 __stringify(CGW_MAX_HOPS) " hops, "
80 "default: " __stringify(CGW_DEFAULT_HOPS) ")");
81
82static struct notifier_block notifier;
83static struct kmem_cache *cgw_cache __read_mostly;
84
85/* structure that contains the (on-the-fly) CAN frame modifications */
86struct cf_mod {
87 struct {
88 struct canfd_frame and;
89 struct canfd_frame or;
90 struct canfd_frame xor;
91 struct canfd_frame set;
92 } modframe;
93 struct {
94 u8 and;
95 u8 or;
96 u8 xor;
97 u8 set;
98 } modtype;
99 void (*modfunc[MAX_MODFUNCTIONS])(struct canfd_frame *cf,
100 struct cf_mod *mod);
101
102 /* CAN frame checksum calculation after CAN frame modifications */
103 struct {
104 struct cgw_csum_xor xor;
105 struct cgw_csum_crc8 crc8;
106 } csum;
107 struct {
108 void (*xor)(struct canfd_frame *cf,
109 struct cgw_csum_xor *xor);
110 void (*crc8)(struct canfd_frame *cf,
111 struct cgw_csum_crc8 *crc8);
112 } csumfunc;
113 u32 uid;
114};
115
116/* So far we just support CAN -> CAN routing and frame modifications.
117 *
118 * The internal can_can_gw structure contains data and attributes for
119 * a CAN -> CAN gateway job.
120 */
121struct can_can_gw {
122 struct can_filter filter;
123 int src_idx;
124 int dst_idx;
125};
126
127/* list entry for CAN gateways jobs */
128struct cgw_job {
129 struct hlist_node list;
130 struct rcu_head rcu;
131 u32 handled_frames;
132 u32 dropped_frames;
133 u32 deleted_frames;
134 struct cf_mod mod;
135 union {
136 /* CAN frame data source */
137 struct net_device *dev;
138 } src;
139 union {
140 /* CAN frame data destination */
141 struct net_device *dev;
142 } dst;
143 union {
144 struct can_can_gw ccgw;
145 /* tbc */
146 };
147 u8 gwtype;
148 u8 limit_hops;
149 u16 flags;
150};
151
152/* modification functions that are invoked in the hot path in can_can_gw_rcv */
153
154#define MODFUNC(func, op) static void func(struct canfd_frame *cf, \
155 struct cf_mod *mod) { op ; }
156
157MODFUNC(mod_and_id, cf->can_id &= mod->modframe.and.can_id)
158MODFUNC(mod_and_len, cf->len &= mod->modframe.and.len)
159MODFUNC(mod_and_flags, cf->flags &= mod->modframe.and.flags)
160MODFUNC(mod_and_data, *(u64 *)cf->data &= *(u64 *)mod->modframe.and.data)
161MODFUNC(mod_or_id, cf->can_id |= mod->modframe.or.can_id)
162MODFUNC(mod_or_len, cf->len |= mod->modframe.or.len)
163MODFUNC(mod_or_flags, cf->flags |= mod->modframe.or.flags)
164MODFUNC(mod_or_data, *(u64 *)cf->data |= *(u64 *)mod->modframe.or.data)
165MODFUNC(mod_xor_id, cf->can_id ^= mod->modframe.xor.can_id)
166MODFUNC(mod_xor_len, cf->len ^= mod->modframe.xor.len)
167MODFUNC(mod_xor_flags, cf->flags ^= mod->modframe.xor.flags)
168MODFUNC(mod_xor_data, *(u64 *)cf->data ^= *(u64 *)mod->modframe.xor.data)
169MODFUNC(mod_set_id, cf->can_id = mod->modframe.set.can_id)
170MODFUNC(mod_set_len, cf->len = mod->modframe.set.len)
171MODFUNC(mod_set_flags, cf->flags = mod->modframe.set.flags)
172MODFUNC(mod_set_data, *(u64 *)cf->data = *(u64 *)mod->modframe.set.data)
173
174static void mod_and_fddata(struct canfd_frame *cf, struct cf_mod *mod)
175{
176 int i;
177
178 for (i = 0; i < CANFD_MAX_DLEN; i += 8)
179 *(u64 *)(cf->data + i) &= *(u64 *)(mod->modframe.and.data + i);
180}
181
182static void mod_or_fddata(struct canfd_frame *cf, struct cf_mod *mod)
183{
184 int i;
185
186 for (i = 0; i < CANFD_MAX_DLEN; i += 8)
187 *(u64 *)(cf->data + i) |= *(u64 *)(mod->modframe.or.data + i);
188}
189
190static void mod_xor_fddata(struct canfd_frame *cf, struct cf_mod *mod)
191{
192 int i;
193
194 for (i = 0; i < CANFD_MAX_DLEN; i += 8)
195 *(u64 *)(cf->data + i) ^= *(u64 *)(mod->modframe.xor.data + i);
196}
197
198static void mod_set_fddata(struct canfd_frame *cf, struct cf_mod *mod)
199{
200 memcpy(cf->data, mod->modframe.set.data, CANFD_MAX_DLEN);
201}
202
203static void canframecpy(struct canfd_frame *dst, struct can_frame *src)
204{
205 /* Copy the struct members separately to ensure that no uninitialized
206 * data are copied in the 3 bytes hole of the struct. This is needed
207 * to make easy compares of the data in the struct cf_mod.
208 */
209
210 dst->can_id = src->can_id;
211 dst->len = src->can_dlc;
212 *(u64 *)dst->data = *(u64 *)src->data;
213}
214
215static void canfdframecpy(struct canfd_frame *dst, struct canfd_frame *src)
216{
217 /* Copy the struct members separately to ensure that no uninitialized
218 * data are copied in the 2 bytes hole of the struct. This is needed
219 * to make easy compares of the data in the struct cf_mod.
220 */
221
222 dst->can_id = src->can_id;
223 dst->flags = src->flags;
224 dst->len = src->len;
225 memcpy(dst->data, src->data, CANFD_MAX_DLEN);
226}
227
228static int cgw_chk_csum_parms(s8 fr, s8 to, s8 re, struct rtcanmsg *r)
229{
230 s8 dlen = CAN_MAX_DLEN;
231
232 if (r->flags & CGW_FLAGS_CAN_FD)
233 dlen = CANFD_MAX_DLEN;
234
235 /* absolute dlc values 0 .. 7 => 0 .. 7, e.g. data [0]
236 * relative to received dlc -1 .. -8 :
237 * e.g. for received dlc = 8
238 * -1 => index = 7 (data[7])
239 * -3 => index = 5 (data[5])
240 * -8 => index = 0 (data[0])
241 */
242
243 if (fr >= -dlen && fr < dlen &&
244 to >= -dlen && to < dlen &&
245 re >= -dlen && re < dlen)
246 return 0;
247 else
248 return -EINVAL;
249}
250
251static inline int calc_idx(int idx, int rx_len)
252{
253 if (idx < 0)
254 return rx_len + idx;
255 else
256 return idx;
257}
258
259static void cgw_csum_xor_rel(struct canfd_frame *cf, struct cgw_csum_xor *xor)
260{
261 int from = calc_idx(xor->from_idx, cf->len);
262 int to = calc_idx(xor->to_idx, cf->len);
263 int res = calc_idx(xor->result_idx, cf->len);
264 u8 val = xor->init_xor_val;
265 int i;
266
267 if (from < 0 || to < 0 || res < 0)
268 return;
269
270 if (from <= to) {
271 for (i = from; i <= to; i++)
272 val ^= cf->data[i];
273 } else {
274 for (i = from; i >= to; i--)
275 val ^= cf->data[i];
276 }
277
278 cf->data[res] = val;
279}
280
281static void cgw_csum_xor_pos(struct canfd_frame *cf, struct cgw_csum_xor *xor)
282{
283 u8 val = xor->init_xor_val;
284 int i;
285
286 for (i = xor->from_idx; i <= xor->to_idx; i++)
287 val ^= cf->data[i];
288
289 cf->data[xor->result_idx] = val;
290}
291
292static void cgw_csum_xor_neg(struct canfd_frame *cf, struct cgw_csum_xor *xor)
293{
294 u8 val = xor->init_xor_val;
295 int i;
296
297 for (i = xor->from_idx; i >= xor->to_idx; i--)
298 val ^= cf->data[i];
299
300 cf->data[xor->result_idx] = val;
301}
302
303static void cgw_csum_crc8_rel(struct canfd_frame *cf,
304 struct cgw_csum_crc8 *crc8)
305{
306 int from = calc_idx(crc8->from_idx, cf->len);
307 int to = calc_idx(crc8->to_idx, cf->len);
308 int res = calc_idx(crc8->result_idx, cf->len);
309 u8 crc = crc8->init_crc_val;
310 int i;
311
312 if (from < 0 || to < 0 || res < 0)
313 return;
314
315 if (from <= to) {
316 for (i = crc8->from_idx; i <= crc8->to_idx; i++)
317 crc = crc8->crctab[crc ^ cf->data[i]];
318 } else {
319 for (i = crc8->from_idx; i >= crc8->to_idx; i--)
320 crc = crc8->crctab[crc ^ cf->data[i]];
321 }
322
323 switch (crc8->profile) {
324 case CGW_CRC8PRF_1U8:
325 crc = crc8->crctab[crc ^ crc8->profile_data[0]];
326 break;
327
328 case CGW_CRC8PRF_16U8:
329 crc = crc8->crctab[crc ^ crc8->profile_data[cf->data[1] & 0xF]];
330 break;
331
332 case CGW_CRC8PRF_SFFID_XOR:
333 crc = crc8->crctab[crc ^ (cf->can_id & 0xFF) ^
334 (cf->can_id >> 8 & 0xFF)];
335 break;
336 }
337
338 cf->data[crc8->result_idx] = crc ^ crc8->final_xor_val;
339}
340
341static void cgw_csum_crc8_pos(struct canfd_frame *cf,
342 struct cgw_csum_crc8 *crc8)
343{
344 u8 crc = crc8->init_crc_val;
345 int i;
346
347 for (i = crc8->from_idx; i <= crc8->to_idx; i++)
348 crc = crc8->crctab[crc ^ cf->data[i]];
349
350 switch (crc8->profile) {
351 case CGW_CRC8PRF_1U8:
352 crc = crc8->crctab[crc ^ crc8->profile_data[0]];
353 break;
354
355 case CGW_CRC8PRF_16U8:
356 crc = crc8->crctab[crc ^ crc8->profile_data[cf->data[1] & 0xF]];
357 break;
358
359 case CGW_CRC8PRF_SFFID_XOR:
360 crc = crc8->crctab[crc ^ (cf->can_id & 0xFF) ^
361 (cf->can_id >> 8 & 0xFF)];
362 break;
363 }
364
365 cf->data[crc8->result_idx] = crc ^ crc8->final_xor_val;
366}
367
368static void cgw_csum_crc8_neg(struct canfd_frame *cf,
369 struct cgw_csum_crc8 *crc8)
370{
371 u8 crc = crc8->init_crc_val;
372 int i;
373
374 for (i = crc8->from_idx; i >= crc8->to_idx; i--)
375 crc = crc8->crctab[crc ^ cf->data[i]];
376
377 switch (crc8->profile) {
378 case CGW_CRC8PRF_1U8:
379 crc = crc8->crctab[crc ^ crc8->profile_data[0]];
380 break;
381
382 case CGW_CRC8PRF_16U8:
383 crc = crc8->crctab[crc ^ crc8->profile_data[cf->data[1] & 0xF]];
384 break;
385
386 case CGW_CRC8PRF_SFFID_XOR:
387 crc = crc8->crctab[crc ^ (cf->can_id & 0xFF) ^
388 (cf->can_id >> 8 & 0xFF)];
389 break;
390 }
391
392 cf->data[crc8->result_idx] = crc ^ crc8->final_xor_val;
393}
394
395/* the receive & process & send function */
396static void can_can_gw_rcv(struct sk_buff *skb, void *data)
397{
398 struct cgw_job *gwj = (struct cgw_job *)data;
399 struct canfd_frame *cf;
400 struct sk_buff *nskb;
401 int modidx = 0;
402
403 /* process strictly Classic CAN or CAN FD frames */
404 if (gwj->flags & CGW_FLAGS_CAN_FD) {
405 if (skb->len != CANFD_MTU)
406 return;
407 } else {
408 if (skb->len != CAN_MTU)
409 return;
410 }
411
412 /* Do not handle CAN frames routed more than 'max_hops' times.
413 * In general we should never catch this delimiter which is intended
414 * to cover a misconfiguration protection (e.g. circular CAN routes).
415 *
416 * The Controller Area Network controllers only accept CAN frames with
417 * correct CRCs - which are not visible in the controller registers.
418 * According to skbuff.h documentation the csum_start element for IP
419 * checksums is undefined/unused when ip_summed == CHECKSUM_UNNECESSARY.
420 * Only CAN skbs can be processed here which already have this property.
421 */
422
423#define cgw_hops(skb) ((skb)->csum_start)
424
425 BUG_ON(skb->ip_summed != CHECKSUM_UNNECESSARY);
426
427 if (cgw_hops(skb) >= max_hops) {
428 /* indicate deleted frames due to misconfiguration */
429 gwj->deleted_frames++;
430 return;
431 }
432
433 if (!(gwj->dst.dev->flags & IFF_UP)) {
434 gwj->dropped_frames++;
435 return;
436 }
437
438 /* is sending the skb back to the incoming interface not allowed? */
439 if (!(gwj->flags & CGW_FLAGS_CAN_IIF_TX_OK) &&
440 can_skb_prv(skb)->ifindex == gwj->dst.dev->ifindex)
441 return;
442
443 /* clone the given skb, which has not been done in can_rcv()
444 *
445 * When there is at least one modification function activated,
446 * we need to copy the skb as we want to modify skb->data.
447 */
448 if (gwj->mod.modfunc[0])
449 nskb = skb_copy(skb, GFP_ATOMIC);
450 else
451 nskb = skb_clone(skb, GFP_ATOMIC);
452
453 if (!nskb) {
454 gwj->dropped_frames++;
455 return;
456 }
457
458 /* put the incremented hop counter in the cloned skb */
459 cgw_hops(nskb) = cgw_hops(skb) + 1;
460
461 /* first processing of this CAN frame -> adjust to private hop limit */
462 if (gwj->limit_hops && cgw_hops(nskb) == 1)
463 cgw_hops(nskb) = max_hops - gwj->limit_hops + 1;
464
465 nskb->dev = gwj->dst.dev;
466
467 /* pointer to modifiable CAN frame */
468 cf = (struct canfd_frame *)nskb->data;
469
470 /* perform preprocessed modification functions if there are any */
471 while (modidx < MAX_MODFUNCTIONS && gwj->mod.modfunc[modidx])
472 (*gwj->mod.modfunc[modidx++])(cf, &gwj->mod);
473
474 /* Has the CAN frame been modified? */
475 if (modidx) {
476 /* get available space for the processed CAN frame type */
477 int max_len = nskb->len - offsetof(struct canfd_frame, data);
478
479 /* dlc may have changed, make sure it fits to the CAN frame */
480 if (cf->len > max_len) {
481 /* delete frame due to misconfiguration */
482 gwj->deleted_frames++;
483 kfree_skb(nskb);
484 return;
485 }
486
487 /* check for checksum updates */
488 if (gwj->mod.csumfunc.crc8)
489 (*gwj->mod.csumfunc.crc8)(cf, &gwj->mod.csum.crc8);
490
491 if (gwj->mod.csumfunc.xor)
492 (*gwj->mod.csumfunc.xor)(cf, &gwj->mod.csum.xor);
493 }
494
495 /* clear the skb timestamp if not configured the other way */
496 if (!(gwj->flags & CGW_FLAGS_CAN_SRC_TSTAMP))
497 nskb->tstamp = 0;
498
499 /* send to netdevice */
500 if (can_send(nskb, gwj->flags & CGW_FLAGS_CAN_ECHO))
501 gwj->dropped_frames++;
502 else
503 gwj->handled_frames++;
504}
505
506static inline int cgw_register_filter(struct net *net, struct cgw_job *gwj)
507{
508 return can_rx_register(net, gwj->src.dev, gwj->ccgw.filter.can_id,
509 gwj->ccgw.filter.can_mask, can_can_gw_rcv,
510 gwj, "gw", NULL);
511}
512
513static inline void cgw_unregister_filter(struct net *net, struct cgw_job *gwj)
514{
515 can_rx_unregister(net, gwj->src.dev, gwj->ccgw.filter.can_id,
516 gwj->ccgw.filter.can_mask, can_can_gw_rcv, gwj);
517}
518
519static int cgw_notifier(struct notifier_block *nb,
520 unsigned long msg, void *ptr)
521{
522 struct net_device *dev = netdev_notifier_info_to_dev(ptr);
523 struct net *net = dev_net(dev);
524
525 if (dev->type != ARPHRD_CAN)
526 return NOTIFY_DONE;
527
528 if (msg == NETDEV_UNREGISTER) {
529 struct cgw_job *gwj = NULL;
530 struct hlist_node *nx;
531
532 ASSERT_RTNL();
533
534 hlist_for_each_entry_safe(gwj, nx, &net->can.cgw_list, list) {
535 if (gwj->src.dev == dev || gwj->dst.dev == dev) {
536 hlist_del(&gwj->list);
537 cgw_unregister_filter(net, gwj);
538 kmem_cache_free(cgw_cache, gwj);
539 }
540 }
541 }
542
543 return NOTIFY_DONE;
544}
545
546static int cgw_put_job(struct sk_buff *skb, struct cgw_job *gwj, int type,
547 u32 pid, u32 seq, int flags)
548{
549 struct rtcanmsg *rtcan;
550 struct nlmsghdr *nlh;
551
552 nlh = nlmsg_put(skb, pid, seq, type, sizeof(*rtcan), flags);
553 if (!nlh)
554 return -EMSGSIZE;
555
556 rtcan = nlmsg_data(nlh);
557 rtcan->can_family = AF_CAN;
558 rtcan->gwtype = gwj->gwtype;
559 rtcan->flags = gwj->flags;
560
561 /* add statistics if available */
562
563 if (gwj->handled_frames) {
564 if (nla_put_u32(skb, CGW_HANDLED, gwj->handled_frames) < 0)
565 goto cancel;
566 }
567
568 if (gwj->dropped_frames) {
569 if (nla_put_u32(skb, CGW_DROPPED, gwj->dropped_frames) < 0)
570 goto cancel;
571 }
572
573 if (gwj->deleted_frames) {
574 if (nla_put_u32(skb, CGW_DELETED, gwj->deleted_frames) < 0)
575 goto cancel;
576 }
577
578 /* check non default settings of attributes */
579
580 if (gwj->limit_hops) {
581 if (nla_put_u8(skb, CGW_LIM_HOPS, gwj->limit_hops) < 0)
582 goto cancel;
583 }
584
585 if (gwj->flags & CGW_FLAGS_CAN_FD) {
586 struct cgw_fdframe_mod mb;
587
588 if (gwj->mod.modtype.and) {
589 memcpy(&mb.cf, &gwj->mod.modframe.and, sizeof(mb.cf));
590 mb.modtype = gwj->mod.modtype.and;
591 if (nla_put(skb, CGW_FDMOD_AND, sizeof(mb), &mb) < 0)
592 goto cancel;
593 }
594
595 if (gwj->mod.modtype.or) {
596 memcpy(&mb.cf, &gwj->mod.modframe.or, sizeof(mb.cf));
597 mb.modtype = gwj->mod.modtype.or;
598 if (nla_put(skb, CGW_FDMOD_OR, sizeof(mb), &mb) < 0)
599 goto cancel;
600 }
601
602 if (gwj->mod.modtype.xor) {
603 memcpy(&mb.cf, &gwj->mod.modframe.xor, sizeof(mb.cf));
604 mb.modtype = gwj->mod.modtype.xor;
605 if (nla_put(skb, CGW_FDMOD_XOR, sizeof(mb), &mb) < 0)
606 goto cancel;
607 }
608
609 if (gwj->mod.modtype.set) {
610 memcpy(&mb.cf, &gwj->mod.modframe.set, sizeof(mb.cf));
611 mb.modtype = gwj->mod.modtype.set;
612 if (nla_put(skb, CGW_FDMOD_SET, sizeof(mb), &mb) < 0)
613 goto cancel;
614 }
615 } else {
616 struct cgw_frame_mod mb;
617
618 if (gwj->mod.modtype.and) {
619 memcpy(&mb.cf, &gwj->mod.modframe.and, sizeof(mb.cf));
620 mb.modtype = gwj->mod.modtype.and;
621 if (nla_put(skb, CGW_MOD_AND, sizeof(mb), &mb) < 0)
622 goto cancel;
623 }
624
625 if (gwj->mod.modtype.or) {
626 memcpy(&mb.cf, &gwj->mod.modframe.or, sizeof(mb.cf));
627 mb.modtype = gwj->mod.modtype.or;
628 if (nla_put(skb, CGW_MOD_OR, sizeof(mb), &mb) < 0)
629 goto cancel;
630 }
631
632 if (gwj->mod.modtype.xor) {
633 memcpy(&mb.cf, &gwj->mod.modframe.xor, sizeof(mb.cf));
634 mb.modtype = gwj->mod.modtype.xor;
635 if (nla_put(skb, CGW_MOD_XOR, sizeof(mb), &mb) < 0)
636 goto cancel;
637 }
638
639 if (gwj->mod.modtype.set) {
640 memcpy(&mb.cf, &gwj->mod.modframe.set, sizeof(mb.cf));
641 mb.modtype = gwj->mod.modtype.set;
642 if (nla_put(skb, CGW_MOD_SET, sizeof(mb), &mb) < 0)
643 goto cancel;
644 }
645 }
646
647 if (gwj->mod.uid) {
648 if (nla_put_u32(skb, CGW_MOD_UID, gwj->mod.uid) < 0)
649 goto cancel;
650 }
651
652 if (gwj->mod.csumfunc.crc8) {
653 if (nla_put(skb, CGW_CS_CRC8, CGW_CS_CRC8_LEN,
654 &gwj->mod.csum.crc8) < 0)
655 goto cancel;
656 }
657
658 if (gwj->mod.csumfunc.xor) {
659 if (nla_put(skb, CGW_CS_XOR, CGW_CS_XOR_LEN,
660 &gwj->mod.csum.xor) < 0)
661 goto cancel;
662 }
663
664 if (gwj->gwtype == CGW_TYPE_CAN_CAN) {
665 if (gwj->ccgw.filter.can_id || gwj->ccgw.filter.can_mask) {
666 if (nla_put(skb, CGW_FILTER, sizeof(struct can_filter),
667 &gwj->ccgw.filter) < 0)
668 goto cancel;
669 }
670
671 if (nla_put_u32(skb, CGW_SRC_IF, gwj->ccgw.src_idx) < 0)
672 goto cancel;
673
674 if (nla_put_u32(skb, CGW_DST_IF, gwj->ccgw.dst_idx) < 0)
675 goto cancel;
676 }
677
678 nlmsg_end(skb, nlh);
679 return 0;
680
681cancel:
682 nlmsg_cancel(skb, nlh);
683 return -EMSGSIZE;
684}
685
686/* Dump information about all CAN gateway jobs, in response to RTM_GETROUTE */
687static int cgw_dump_jobs(struct sk_buff *skb, struct netlink_callback *cb)
688{
689 struct net *net = sock_net(skb->sk);
690 struct cgw_job *gwj = NULL;
691 int idx = 0;
692 int s_idx = cb->args[0];
693
694 rcu_read_lock();
695 hlist_for_each_entry_rcu(gwj, &net->can.cgw_list, list) {
696 if (idx < s_idx)
697 goto cont;
698
699 if (cgw_put_job(skb, gwj, RTM_NEWROUTE,
700 NETLINK_CB(cb->skb).portid,
701 cb->nlh->nlmsg_seq, NLM_F_MULTI) < 0)
702 break;
703cont:
704 idx++;
705 }
706 rcu_read_unlock();
707
708 cb->args[0] = idx;
709
710 return skb->len;
711}
712
713static const struct nla_policy cgw_policy[CGW_MAX + 1] = {
714 [CGW_MOD_AND] = { .len = sizeof(struct cgw_frame_mod) },
715 [CGW_MOD_OR] = { .len = sizeof(struct cgw_frame_mod) },
716 [CGW_MOD_XOR] = { .len = sizeof(struct cgw_frame_mod) },
717 [CGW_MOD_SET] = { .len = sizeof(struct cgw_frame_mod) },
718 [CGW_CS_XOR] = { .len = sizeof(struct cgw_csum_xor) },
719 [CGW_CS_CRC8] = { .len = sizeof(struct cgw_csum_crc8) },
720 [CGW_SRC_IF] = { .type = NLA_U32 },
721 [CGW_DST_IF] = { .type = NLA_U32 },
722 [CGW_FILTER] = { .len = sizeof(struct can_filter) },
723 [CGW_LIM_HOPS] = { .type = NLA_U8 },
724 [CGW_MOD_UID] = { .type = NLA_U32 },
725 [CGW_FDMOD_AND] = { .len = sizeof(struct cgw_fdframe_mod) },
726 [CGW_FDMOD_OR] = { .len = sizeof(struct cgw_fdframe_mod) },
727 [CGW_FDMOD_XOR] = { .len = sizeof(struct cgw_fdframe_mod) },
728 [CGW_FDMOD_SET] = { .len = sizeof(struct cgw_fdframe_mod) },
729};
730
731/* check for common and gwtype specific attributes */
732static int cgw_parse_attr(struct nlmsghdr *nlh, struct cf_mod *mod,
733 u8 gwtype, void *gwtypeattr, u8 *limhops)
734{
735 struct nlattr *tb[CGW_MAX + 1];
736 struct rtcanmsg *r = nlmsg_data(nlh);
737 int modidx = 0;
738 int err = 0;
739
740 /* initialize modification & checksum data space */
741 memset(mod, 0, sizeof(*mod));
742
743 err = nlmsg_parse_deprecated(nlh, sizeof(struct rtcanmsg), tb,
744 CGW_MAX, cgw_policy, NULL);
745 if (err < 0)
746 return err;
747
748 if (tb[CGW_LIM_HOPS]) {
749 *limhops = nla_get_u8(tb[CGW_LIM_HOPS]);
750
751 if (*limhops < 1 || *limhops > max_hops)
752 return -EINVAL;
753 }
754
755 /* check for AND/OR/XOR/SET modifications */
756 if (r->flags & CGW_FLAGS_CAN_FD) {
757 struct cgw_fdframe_mod mb;
758
759 if (tb[CGW_FDMOD_AND]) {
760 nla_memcpy(&mb, tb[CGW_FDMOD_AND], CGW_FDMODATTR_LEN);
761
762 canfdframecpy(&mod->modframe.and, &mb.cf);
763 mod->modtype.and = mb.modtype;
764
765 if (mb.modtype & CGW_MOD_ID)
766 mod->modfunc[modidx++] = mod_and_id;
767
768 if (mb.modtype & CGW_MOD_LEN)
769 mod->modfunc[modidx++] = mod_and_len;
770
771 if (mb.modtype & CGW_MOD_FLAGS)
772 mod->modfunc[modidx++] = mod_and_flags;
773
774 if (mb.modtype & CGW_MOD_DATA)
775 mod->modfunc[modidx++] = mod_and_fddata;
776 }
777
778 if (tb[CGW_FDMOD_OR]) {
779 nla_memcpy(&mb, tb[CGW_FDMOD_OR], CGW_FDMODATTR_LEN);
780
781 canfdframecpy(&mod->modframe.or, &mb.cf);
782 mod->modtype.or = mb.modtype;
783
784 if (mb.modtype & CGW_MOD_ID)
785 mod->modfunc[modidx++] = mod_or_id;
786
787 if (mb.modtype & CGW_MOD_LEN)
788 mod->modfunc[modidx++] = mod_or_len;
789
790 if (mb.modtype & CGW_MOD_FLAGS)
791 mod->modfunc[modidx++] = mod_or_flags;
792
793 if (mb.modtype & CGW_MOD_DATA)
794 mod->modfunc[modidx++] = mod_or_fddata;
795 }
796
797 if (tb[CGW_FDMOD_XOR]) {
798 nla_memcpy(&mb, tb[CGW_FDMOD_XOR], CGW_FDMODATTR_LEN);
799
800 canfdframecpy(&mod->modframe.xor, &mb.cf);
801 mod->modtype.xor = mb.modtype;
802
803 if (mb.modtype & CGW_MOD_ID)
804 mod->modfunc[modidx++] = mod_xor_id;
805
806 if (mb.modtype & CGW_MOD_LEN)
807 mod->modfunc[modidx++] = mod_xor_len;
808
809 if (mb.modtype & CGW_MOD_FLAGS)
810 mod->modfunc[modidx++] = mod_xor_flags;
811
812 if (mb.modtype & CGW_MOD_DATA)
813 mod->modfunc[modidx++] = mod_xor_fddata;
814 }
815
816 if (tb[CGW_FDMOD_SET]) {
817 nla_memcpy(&mb, tb[CGW_FDMOD_SET], CGW_FDMODATTR_LEN);
818
819 canfdframecpy(&mod->modframe.set, &mb.cf);
820 mod->modtype.set = mb.modtype;
821
822 if (mb.modtype & CGW_MOD_ID)
823 mod->modfunc[modidx++] = mod_set_id;
824
825 if (mb.modtype & CGW_MOD_LEN)
826 mod->modfunc[modidx++] = mod_set_len;
827
828 if (mb.modtype & CGW_MOD_FLAGS)
829 mod->modfunc[modidx++] = mod_set_flags;
830
831 if (mb.modtype & CGW_MOD_DATA)
832 mod->modfunc[modidx++] = mod_set_fddata;
833 }
834 } else {
835 struct cgw_frame_mod mb;
836
837 if (tb[CGW_MOD_AND]) {
838 nla_memcpy(&mb, tb[CGW_MOD_AND], CGW_MODATTR_LEN);
839
840 canframecpy(&mod->modframe.and, &mb.cf);
841 mod->modtype.and = mb.modtype;
842
843 if (mb.modtype & CGW_MOD_ID)
844 mod->modfunc[modidx++] = mod_and_id;
845
846 if (mb.modtype & CGW_MOD_LEN)
847 mod->modfunc[modidx++] = mod_and_len;
848
849 if (mb.modtype & CGW_MOD_DATA)
850 mod->modfunc[modidx++] = mod_and_data;
851 }
852
853 if (tb[CGW_MOD_OR]) {
854 nla_memcpy(&mb, tb[CGW_MOD_OR], CGW_MODATTR_LEN);
855
856 canframecpy(&mod->modframe.or, &mb.cf);
857 mod->modtype.or = mb.modtype;
858
859 if (mb.modtype & CGW_MOD_ID)
860 mod->modfunc[modidx++] = mod_or_id;
861
862 if (mb.modtype & CGW_MOD_LEN)
863 mod->modfunc[modidx++] = mod_or_len;
864
865 if (mb.modtype & CGW_MOD_DATA)
866 mod->modfunc[modidx++] = mod_or_data;
867 }
868
869 if (tb[CGW_MOD_XOR]) {
870 nla_memcpy(&mb, tb[CGW_MOD_XOR], CGW_MODATTR_LEN);
871
872 canframecpy(&mod->modframe.xor, &mb.cf);
873 mod->modtype.xor = mb.modtype;
874
875 if (mb.modtype & CGW_MOD_ID)
876 mod->modfunc[modidx++] = mod_xor_id;
877
878 if (mb.modtype & CGW_MOD_LEN)
879 mod->modfunc[modidx++] = mod_xor_len;
880
881 if (mb.modtype & CGW_MOD_DATA)
882 mod->modfunc[modidx++] = mod_xor_data;
883 }
884
885 if (tb[CGW_MOD_SET]) {
886 nla_memcpy(&mb, tb[CGW_MOD_SET], CGW_MODATTR_LEN);
887
888 canframecpy(&mod->modframe.set, &mb.cf);
889 mod->modtype.set = mb.modtype;
890
891 if (mb.modtype & CGW_MOD_ID)
892 mod->modfunc[modidx++] = mod_set_id;
893
894 if (mb.modtype & CGW_MOD_LEN)
895 mod->modfunc[modidx++] = mod_set_len;
896
897 if (mb.modtype & CGW_MOD_DATA)
898 mod->modfunc[modidx++] = mod_set_data;
899 }
900 }
901
902 /* check for checksum operations after CAN frame modifications */
903 if (modidx) {
904 if (tb[CGW_CS_CRC8]) {
905 struct cgw_csum_crc8 *c = nla_data(tb[CGW_CS_CRC8]);
906
907 err = cgw_chk_csum_parms(c->from_idx, c->to_idx,
908 c->result_idx, r);
909 if (err)
910 return err;
911
912 nla_memcpy(&mod->csum.crc8, tb[CGW_CS_CRC8],
913 CGW_CS_CRC8_LEN);
914
915 /* select dedicated processing function to reduce
916 * runtime operations in receive hot path.
917 */
918 if (c->from_idx < 0 || c->to_idx < 0 ||
919 c->result_idx < 0)
920 mod->csumfunc.crc8 = cgw_csum_crc8_rel;
921 else if (c->from_idx <= c->to_idx)
922 mod->csumfunc.crc8 = cgw_csum_crc8_pos;
923 else
924 mod->csumfunc.crc8 = cgw_csum_crc8_neg;
925 }
926
927 if (tb[CGW_CS_XOR]) {
928 struct cgw_csum_xor *c = nla_data(tb[CGW_CS_XOR]);
929
930 err = cgw_chk_csum_parms(c->from_idx, c->to_idx,
931 c->result_idx, r);
932 if (err)
933 return err;
934
935 nla_memcpy(&mod->csum.xor, tb[CGW_CS_XOR],
936 CGW_CS_XOR_LEN);
937
938 /* select dedicated processing function to reduce
939 * runtime operations in receive hot path.
940 */
941 if (c->from_idx < 0 || c->to_idx < 0 ||
942 c->result_idx < 0)
943 mod->csumfunc.xor = cgw_csum_xor_rel;
944 else if (c->from_idx <= c->to_idx)
945 mod->csumfunc.xor = cgw_csum_xor_pos;
946 else
947 mod->csumfunc.xor = cgw_csum_xor_neg;
948 }
949
950 if (tb[CGW_MOD_UID])
951 nla_memcpy(&mod->uid, tb[CGW_MOD_UID], sizeof(u32));
952 }
953
954 if (gwtype == CGW_TYPE_CAN_CAN) {
955 /* check CGW_TYPE_CAN_CAN specific attributes */
956 struct can_can_gw *ccgw = (struct can_can_gw *)gwtypeattr;
957
958 memset(ccgw, 0, sizeof(*ccgw));
959
960 /* check for can_filter in attributes */
961 if (tb[CGW_FILTER])
962 nla_memcpy(&ccgw->filter, tb[CGW_FILTER],
963 sizeof(struct can_filter));
964
965 err = -ENODEV;
966
967 /* specifying two interfaces is mandatory */
968 if (!tb[CGW_SRC_IF] || !tb[CGW_DST_IF])
969 return err;
970
971 ccgw->src_idx = nla_get_u32(tb[CGW_SRC_IF]);
972 ccgw->dst_idx = nla_get_u32(tb[CGW_DST_IF]);
973
974 /* both indices set to 0 for flushing all routing entries */
975 if (!ccgw->src_idx && !ccgw->dst_idx)
976 return 0;
977
978 /* only one index set to 0 is an error */
979 if (!ccgw->src_idx || !ccgw->dst_idx)
980 return err;
981 }
982
983 /* add the checks for other gwtypes here */
984
985 return 0;
986}
987
988static int cgw_create_job(struct sk_buff *skb, struct nlmsghdr *nlh,
989 struct netlink_ext_ack *extack)
990{
991 struct net *net = sock_net(skb->sk);
992 struct rtcanmsg *r;
993 struct cgw_job *gwj;
994 struct cf_mod mod;
995 struct can_can_gw ccgw;
996 u8 limhops = 0;
997 int err = 0;
998
999 if (!netlink_capable(skb, CAP_NET_ADMIN))
1000 return -EPERM;
1001
1002 if (nlmsg_len(nlh) < sizeof(*r))
1003 return -EINVAL;
1004
1005 r = nlmsg_data(nlh);
1006 if (r->can_family != AF_CAN)
1007 return -EPFNOSUPPORT;
1008
1009 /* so far we only support CAN -> CAN routings */
1010 if (r->gwtype != CGW_TYPE_CAN_CAN)
1011 return -EINVAL;
1012
1013 err = cgw_parse_attr(nlh, &mod, CGW_TYPE_CAN_CAN, &ccgw, &limhops);
1014 if (err < 0)
1015 return err;
1016
1017 if (mod.uid) {
1018 ASSERT_RTNL();
1019
1020 /* check for updating an existing job with identical uid */
1021 hlist_for_each_entry(gwj, &net->can.cgw_list, list) {
1022 if (gwj->mod.uid != mod.uid)
1023 continue;
1024
1025 /* interfaces & filters must be identical */
1026 if (memcmp(&gwj->ccgw, &ccgw, sizeof(ccgw)))
1027 return -EINVAL;
1028
1029 /* update modifications with disabled softirq & quit */
1030 local_bh_disable();
1031 memcpy(&gwj->mod, &mod, sizeof(mod));
1032 local_bh_enable();
1033 return 0;
1034 }
1035 }
1036
1037 /* ifindex == 0 is not allowed for job creation */
1038 if (!ccgw.src_idx || !ccgw.dst_idx)
1039 return -ENODEV;
1040
1041 gwj = kmem_cache_alloc(cgw_cache, GFP_KERNEL);
1042 if (!gwj)
1043 return -ENOMEM;
1044
1045 gwj->handled_frames = 0;
1046 gwj->dropped_frames = 0;
1047 gwj->deleted_frames = 0;
1048 gwj->flags = r->flags;
1049 gwj->gwtype = r->gwtype;
1050 gwj->limit_hops = limhops;
1051
1052 /* insert already parsed information */
1053 memcpy(&gwj->mod, &mod, sizeof(mod));
1054 memcpy(&gwj->ccgw, &ccgw, sizeof(ccgw));
1055
1056 err = -ENODEV;
1057
1058 gwj->src.dev = __dev_get_by_index(net, gwj->ccgw.src_idx);
1059
1060 if (!gwj->src.dev)
1061 goto out;
1062
1063 if (gwj->src.dev->type != ARPHRD_CAN)
1064 goto out;
1065
1066 gwj->dst.dev = __dev_get_by_index(net, gwj->ccgw.dst_idx);
1067
1068 if (!gwj->dst.dev)
1069 goto out;
1070
1071 if (gwj->dst.dev->type != ARPHRD_CAN)
1072 goto out;
1073
1074 ASSERT_RTNL();
1075
1076 err = cgw_register_filter(net, gwj);
1077 if (!err)
1078 hlist_add_head_rcu(&gwj->list, &net->can.cgw_list);
1079out:
1080 if (err)
1081 kmem_cache_free(cgw_cache, gwj);
1082
1083 return err;
1084}
1085
1086static void cgw_remove_all_jobs(struct net *net)
1087{
1088 struct cgw_job *gwj = NULL;
1089 struct hlist_node *nx;
1090
1091 ASSERT_RTNL();
1092
1093 hlist_for_each_entry_safe(gwj, nx, &net->can.cgw_list, list) {
1094 hlist_del(&gwj->list);
1095 cgw_unregister_filter(net, gwj);
1096 kmem_cache_free(cgw_cache, gwj);
1097 }
1098}
1099
1100static int cgw_remove_job(struct sk_buff *skb, struct nlmsghdr *nlh,
1101 struct netlink_ext_ack *extack)
1102{
1103 struct net *net = sock_net(skb->sk);
1104 struct cgw_job *gwj = NULL;
1105 struct hlist_node *nx;
1106 struct rtcanmsg *r;
1107 struct cf_mod mod;
1108 struct can_can_gw ccgw;
1109 u8 limhops = 0;
1110 int err = 0;
1111
1112 if (!netlink_capable(skb, CAP_NET_ADMIN))
1113 return -EPERM;
1114
1115 if (nlmsg_len(nlh) < sizeof(*r))
1116 return -EINVAL;
1117
1118 r = nlmsg_data(nlh);
1119 if (r->can_family != AF_CAN)
1120 return -EPFNOSUPPORT;
1121
1122 /* so far we only support CAN -> CAN routings */
1123 if (r->gwtype != CGW_TYPE_CAN_CAN)
1124 return -EINVAL;
1125
1126 err = cgw_parse_attr(nlh, &mod, CGW_TYPE_CAN_CAN, &ccgw, &limhops);
1127 if (err < 0)
1128 return err;
1129
1130 /* two interface indices both set to 0 => remove all entries */
1131 if (!ccgw.src_idx && !ccgw.dst_idx) {
1132 cgw_remove_all_jobs(net);
1133 return 0;
1134 }
1135
1136 err = -EINVAL;
1137
1138 ASSERT_RTNL();
1139
1140 /* remove only the first matching entry */
1141 hlist_for_each_entry_safe(gwj, nx, &net->can.cgw_list, list) {
1142 if (gwj->flags != r->flags)
1143 continue;
1144
1145 if (gwj->limit_hops != limhops)
1146 continue;
1147
1148 /* we have a match when uid is enabled and identical */
1149 if (gwj->mod.uid || mod.uid) {
1150 if (gwj->mod.uid != mod.uid)
1151 continue;
1152 } else {
1153 /* no uid => check for identical modifications */
1154 if (memcmp(&gwj->mod, &mod, sizeof(mod)))
1155 continue;
1156 }
1157
1158 /* if (r->gwtype == CGW_TYPE_CAN_CAN) - is made sure here */
1159 if (memcmp(&gwj->ccgw, &ccgw, sizeof(ccgw)))
1160 continue;
1161
1162 hlist_del(&gwj->list);
1163 cgw_unregister_filter(net, gwj);
1164 kmem_cache_free(cgw_cache, gwj);
1165 err = 0;
1166 break;
1167 }
1168
1169 return err;
1170}
1171
1172static int __net_init cangw_pernet_init(struct net *net)
1173{
1174 INIT_HLIST_HEAD(&net->can.cgw_list);
1175 return 0;
1176}
1177
1178static void __net_exit cangw_pernet_exit(struct net *net)
1179{
1180 rtnl_lock();
1181 cgw_remove_all_jobs(net);
1182 rtnl_unlock();
1183}
1184
1185static struct pernet_operations cangw_pernet_ops = {
1186 .init = cangw_pernet_init,
1187 .exit = cangw_pernet_exit,
1188};
1189
1190static __init int cgw_module_init(void)
1191{
1192 int ret;
1193
1194 /* sanitize given module parameter */
1195 max_hops = clamp_t(unsigned int, max_hops, CGW_MIN_HOPS, CGW_MAX_HOPS);
1196
1197 pr_info("can: netlink gateway (rev " CAN_GW_VERSION ") max_hops=%d\n",
1198 max_hops);
1199
1200 ret = register_pernet_subsys(&cangw_pernet_ops);
1201 if (ret)
1202 return ret;
1203
1204 ret = -ENOMEM;
1205 cgw_cache = kmem_cache_create("can_gw", sizeof(struct cgw_job),
1206 0, 0, NULL);
1207 if (!cgw_cache)
1208 goto out_cache_create;
1209
1210 /* set notifier */
1211 notifier.notifier_call = cgw_notifier;
1212 ret = register_netdevice_notifier(¬ifier);
1213 if (ret)
1214 goto out_register_notifier;
1215
1216 ret = rtnl_register_module(THIS_MODULE, PF_CAN, RTM_GETROUTE,
1217 NULL, cgw_dump_jobs, 0);
1218 if (ret)
1219 goto out_rtnl_register1;
1220
1221 ret = rtnl_register_module(THIS_MODULE, PF_CAN, RTM_NEWROUTE,
1222 cgw_create_job, NULL, 0);
1223 if (ret)
1224 goto out_rtnl_register2;
1225 ret = rtnl_register_module(THIS_MODULE, PF_CAN, RTM_DELROUTE,
1226 cgw_remove_job, NULL, 0);
1227 if (ret)
1228 goto out_rtnl_register3;
1229
1230 return 0;
1231
1232out_rtnl_register3:
1233 rtnl_unregister(PF_CAN, RTM_NEWROUTE);
1234out_rtnl_register2:
1235 rtnl_unregister(PF_CAN, RTM_GETROUTE);
1236out_rtnl_register1:
1237 unregister_netdevice_notifier(¬ifier);
1238out_register_notifier:
1239 kmem_cache_destroy(cgw_cache);
1240out_cache_create:
1241 unregister_pernet_subsys(&cangw_pernet_ops);
1242
1243 return ret;
1244}
1245
1246static __exit void cgw_module_exit(void)
1247{
1248 rtnl_unregister_all(PF_CAN);
1249
1250 unregister_netdevice_notifier(¬ifier);
1251
1252 unregister_pernet_subsys(&cangw_pernet_ops);
1253 rcu_barrier(); /* Wait for completion of call_rcu()'s */
1254
1255 kmem_cache_destroy(cgw_cache);
1256}
1257
1258module_init(cgw_module_init);
1259module_exit(cgw_module_exit);
1/*
2 * gw.c - CAN frame Gateway/Router/Bridge with netlink interface
3 *
4 * Copyright (c) 2017 Volkswagen Group Electronic Research
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of Volkswagen nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * Alternatively, provided that this notice is retained in full, this
20 * software may be distributed under the terms of the GNU General
21 * Public License ("GPL") version 2, in which case the provisions of the
22 * GPL apply INSTEAD OF those given above.
23 *
24 * The provided data structures and external interfaces from this code
25 * are not restricted to be used by modules with a GPL compatible license.
26 *
27 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
28 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
29 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
30 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
31 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
32 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
33 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
34 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
35 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
36 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
37 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
38 * DAMAGE.
39 *
40 */
41
42#include <linux/module.h>
43#include <linux/init.h>
44#include <linux/types.h>
45#include <linux/kernel.h>
46#include <linux/list.h>
47#include <linux/spinlock.h>
48#include <linux/rcupdate.h>
49#include <linux/rculist.h>
50#include <linux/net.h>
51#include <linux/netdevice.h>
52#include <linux/if_arp.h>
53#include <linux/skbuff.h>
54#include <linux/can.h>
55#include <linux/can/core.h>
56#include <linux/can/skb.h>
57#include <linux/can/gw.h>
58#include <net/rtnetlink.h>
59#include <net/net_namespace.h>
60#include <net/sock.h>
61
62#define CAN_GW_VERSION "20170425"
63#define CAN_GW_NAME "can-gw"
64
65MODULE_DESCRIPTION("PF_CAN netlink gateway");
66MODULE_LICENSE("Dual BSD/GPL");
67MODULE_AUTHOR("Oliver Hartkopp <oliver.hartkopp@volkswagen.de>");
68MODULE_ALIAS(CAN_GW_NAME);
69
70#define CGW_MIN_HOPS 1
71#define CGW_MAX_HOPS 6
72#define CGW_DEFAULT_HOPS 1
73
74static unsigned int max_hops __read_mostly = CGW_DEFAULT_HOPS;
75module_param(max_hops, uint, 0444);
76MODULE_PARM_DESC(max_hops,
77 "maximum " CAN_GW_NAME " routing hops for CAN frames "
78 "(valid values: " __stringify(CGW_MIN_HOPS) "-"
79 __stringify(CGW_MAX_HOPS) " hops, "
80 "default: " __stringify(CGW_DEFAULT_HOPS) ")");
81
82static struct notifier_block notifier;
83static struct kmem_cache *cgw_cache __read_mostly;
84
85/* structure that contains the (on-the-fly) CAN frame modifications */
86struct cf_mod {
87 struct {
88 struct can_frame and;
89 struct can_frame or;
90 struct can_frame xor;
91 struct can_frame set;
92 } modframe;
93 struct {
94 u8 and;
95 u8 or;
96 u8 xor;
97 u8 set;
98 } modtype;
99 void (*modfunc[MAX_MODFUNCTIONS])(struct can_frame *cf,
100 struct cf_mod *mod);
101
102 /* CAN frame checksum calculation after CAN frame modifications */
103 struct {
104 struct cgw_csum_xor xor;
105 struct cgw_csum_crc8 crc8;
106 } csum;
107 struct {
108 void (*xor)(struct can_frame *cf, struct cgw_csum_xor *xor);
109 void (*crc8)(struct can_frame *cf, struct cgw_csum_crc8 *crc8);
110 } csumfunc;
111 u32 uid;
112};
113
114
115/*
116 * So far we just support CAN -> CAN routing and frame modifications.
117 *
118 * The internal can_can_gw structure contains data and attributes for
119 * a CAN -> CAN gateway job.
120 */
121struct can_can_gw {
122 struct can_filter filter;
123 int src_idx;
124 int dst_idx;
125};
126
127/* list entry for CAN gateways jobs */
128struct cgw_job {
129 struct hlist_node list;
130 struct rcu_head rcu;
131 u32 handled_frames;
132 u32 dropped_frames;
133 u32 deleted_frames;
134 struct cf_mod mod;
135 union {
136 /* CAN frame data source */
137 struct net_device *dev;
138 } src;
139 union {
140 /* CAN frame data destination */
141 struct net_device *dev;
142 } dst;
143 union {
144 struct can_can_gw ccgw;
145 /* tbc */
146 };
147 u8 gwtype;
148 u8 limit_hops;
149 u16 flags;
150};
151
152/* modification functions that are invoked in the hot path in can_can_gw_rcv */
153
154#define MODFUNC(func, op) static void func(struct can_frame *cf, \
155 struct cf_mod *mod) { op ; }
156
157MODFUNC(mod_and_id, cf->can_id &= mod->modframe.and.can_id)
158MODFUNC(mod_and_dlc, cf->can_dlc &= mod->modframe.and.can_dlc)
159MODFUNC(mod_and_data, *(u64 *)cf->data &= *(u64 *)mod->modframe.and.data)
160MODFUNC(mod_or_id, cf->can_id |= mod->modframe.or.can_id)
161MODFUNC(mod_or_dlc, cf->can_dlc |= mod->modframe.or.can_dlc)
162MODFUNC(mod_or_data, *(u64 *)cf->data |= *(u64 *)mod->modframe.or.data)
163MODFUNC(mod_xor_id, cf->can_id ^= mod->modframe.xor.can_id)
164MODFUNC(mod_xor_dlc, cf->can_dlc ^= mod->modframe.xor.can_dlc)
165MODFUNC(mod_xor_data, *(u64 *)cf->data ^= *(u64 *)mod->modframe.xor.data)
166MODFUNC(mod_set_id, cf->can_id = mod->modframe.set.can_id)
167MODFUNC(mod_set_dlc, cf->can_dlc = mod->modframe.set.can_dlc)
168MODFUNC(mod_set_data, *(u64 *)cf->data = *(u64 *)mod->modframe.set.data)
169
170static inline void canframecpy(struct can_frame *dst, struct can_frame *src)
171{
172 /*
173 * Copy the struct members separately to ensure that no uninitialized
174 * data are copied in the 3 bytes hole of the struct. This is needed
175 * to make easy compares of the data in the struct cf_mod.
176 */
177
178 dst->can_id = src->can_id;
179 dst->can_dlc = src->can_dlc;
180 *(u64 *)dst->data = *(u64 *)src->data;
181}
182
183static int cgw_chk_csum_parms(s8 fr, s8 to, s8 re)
184{
185 /*
186 * absolute dlc values 0 .. 7 => 0 .. 7, e.g. data [0]
187 * relative to received dlc -1 .. -8 :
188 * e.g. for received dlc = 8
189 * -1 => index = 7 (data[7])
190 * -3 => index = 5 (data[5])
191 * -8 => index = 0 (data[0])
192 */
193
194 if (fr > -9 && fr < 8 &&
195 to > -9 && to < 8 &&
196 re > -9 && re < 8)
197 return 0;
198 else
199 return -EINVAL;
200}
201
202static inline int calc_idx(int idx, int rx_dlc)
203{
204 if (idx < 0)
205 return rx_dlc + idx;
206 else
207 return idx;
208}
209
210static void cgw_csum_xor_rel(struct can_frame *cf, struct cgw_csum_xor *xor)
211{
212 int from = calc_idx(xor->from_idx, cf->can_dlc);
213 int to = calc_idx(xor->to_idx, cf->can_dlc);
214 int res = calc_idx(xor->result_idx, cf->can_dlc);
215 u8 val = xor->init_xor_val;
216 int i;
217
218 if (from < 0 || to < 0 || res < 0)
219 return;
220
221 if (from <= to) {
222 for (i = from; i <= to; i++)
223 val ^= cf->data[i];
224 } else {
225 for (i = from; i >= to; i--)
226 val ^= cf->data[i];
227 }
228
229 cf->data[res] = val;
230}
231
232static void cgw_csum_xor_pos(struct can_frame *cf, struct cgw_csum_xor *xor)
233{
234 u8 val = xor->init_xor_val;
235 int i;
236
237 for (i = xor->from_idx; i <= xor->to_idx; i++)
238 val ^= cf->data[i];
239
240 cf->data[xor->result_idx] = val;
241}
242
243static void cgw_csum_xor_neg(struct can_frame *cf, struct cgw_csum_xor *xor)
244{
245 u8 val = xor->init_xor_val;
246 int i;
247
248 for (i = xor->from_idx; i >= xor->to_idx; i--)
249 val ^= cf->data[i];
250
251 cf->data[xor->result_idx] = val;
252}
253
254static void cgw_csum_crc8_rel(struct can_frame *cf, struct cgw_csum_crc8 *crc8)
255{
256 int from = calc_idx(crc8->from_idx, cf->can_dlc);
257 int to = calc_idx(crc8->to_idx, cf->can_dlc);
258 int res = calc_idx(crc8->result_idx, cf->can_dlc);
259 u8 crc = crc8->init_crc_val;
260 int i;
261
262 if (from < 0 || to < 0 || res < 0)
263 return;
264
265 if (from <= to) {
266 for (i = crc8->from_idx; i <= crc8->to_idx; i++)
267 crc = crc8->crctab[crc^cf->data[i]];
268 } else {
269 for (i = crc8->from_idx; i >= crc8->to_idx; i--)
270 crc = crc8->crctab[crc^cf->data[i]];
271 }
272
273 switch (crc8->profile) {
274
275 case CGW_CRC8PRF_1U8:
276 crc = crc8->crctab[crc^crc8->profile_data[0]];
277 break;
278
279 case CGW_CRC8PRF_16U8:
280 crc = crc8->crctab[crc^crc8->profile_data[cf->data[1] & 0xF]];
281 break;
282
283 case CGW_CRC8PRF_SFFID_XOR:
284 crc = crc8->crctab[crc^(cf->can_id & 0xFF)^
285 (cf->can_id >> 8 & 0xFF)];
286 break;
287
288 }
289
290 cf->data[crc8->result_idx] = crc^crc8->final_xor_val;
291}
292
293static void cgw_csum_crc8_pos(struct can_frame *cf, struct cgw_csum_crc8 *crc8)
294{
295 u8 crc = crc8->init_crc_val;
296 int i;
297
298 for (i = crc8->from_idx; i <= crc8->to_idx; i++)
299 crc = crc8->crctab[crc^cf->data[i]];
300
301 switch (crc8->profile) {
302
303 case CGW_CRC8PRF_1U8:
304 crc = crc8->crctab[crc^crc8->profile_data[0]];
305 break;
306
307 case CGW_CRC8PRF_16U8:
308 crc = crc8->crctab[crc^crc8->profile_data[cf->data[1] & 0xF]];
309 break;
310
311 case CGW_CRC8PRF_SFFID_XOR:
312 crc = crc8->crctab[crc^(cf->can_id & 0xFF)^
313 (cf->can_id >> 8 & 0xFF)];
314 break;
315 }
316
317 cf->data[crc8->result_idx] = crc^crc8->final_xor_val;
318}
319
320static void cgw_csum_crc8_neg(struct can_frame *cf, struct cgw_csum_crc8 *crc8)
321{
322 u8 crc = crc8->init_crc_val;
323 int i;
324
325 for (i = crc8->from_idx; i >= crc8->to_idx; i--)
326 crc = crc8->crctab[crc^cf->data[i]];
327
328 switch (crc8->profile) {
329
330 case CGW_CRC8PRF_1U8:
331 crc = crc8->crctab[crc^crc8->profile_data[0]];
332 break;
333
334 case CGW_CRC8PRF_16U8:
335 crc = crc8->crctab[crc^crc8->profile_data[cf->data[1] & 0xF]];
336 break;
337
338 case CGW_CRC8PRF_SFFID_XOR:
339 crc = crc8->crctab[crc^(cf->can_id & 0xFF)^
340 (cf->can_id >> 8 & 0xFF)];
341 break;
342 }
343
344 cf->data[crc8->result_idx] = crc^crc8->final_xor_val;
345}
346
347/* the receive & process & send function */
348static void can_can_gw_rcv(struct sk_buff *skb, void *data)
349{
350 struct cgw_job *gwj = (struct cgw_job *)data;
351 struct can_frame *cf;
352 struct sk_buff *nskb;
353 int modidx = 0;
354
355 /*
356 * Do not handle CAN frames routed more than 'max_hops' times.
357 * In general we should never catch this delimiter which is intended
358 * to cover a misconfiguration protection (e.g. circular CAN routes).
359 *
360 * The Controller Area Network controllers only accept CAN frames with
361 * correct CRCs - which are not visible in the controller registers.
362 * According to skbuff.h documentation the csum_start element for IP
363 * checksums is undefined/unused when ip_summed == CHECKSUM_UNNECESSARY.
364 * Only CAN skbs can be processed here which already have this property.
365 */
366
367#define cgw_hops(skb) ((skb)->csum_start)
368
369 BUG_ON(skb->ip_summed != CHECKSUM_UNNECESSARY);
370
371 if (cgw_hops(skb) >= max_hops) {
372 /* indicate deleted frames due to misconfiguration */
373 gwj->deleted_frames++;
374 return;
375 }
376
377 if (!(gwj->dst.dev->flags & IFF_UP)) {
378 gwj->dropped_frames++;
379 return;
380 }
381
382 /* is sending the skb back to the incoming interface not allowed? */
383 if (!(gwj->flags & CGW_FLAGS_CAN_IIF_TX_OK) &&
384 can_skb_prv(skb)->ifindex == gwj->dst.dev->ifindex)
385 return;
386
387 /*
388 * clone the given skb, which has not been done in can_rcv()
389 *
390 * When there is at least one modification function activated,
391 * we need to copy the skb as we want to modify skb->data.
392 */
393 if (gwj->mod.modfunc[0])
394 nskb = skb_copy(skb, GFP_ATOMIC);
395 else
396 nskb = skb_clone(skb, GFP_ATOMIC);
397
398 if (!nskb) {
399 gwj->dropped_frames++;
400 return;
401 }
402
403 /* put the incremented hop counter in the cloned skb */
404 cgw_hops(nskb) = cgw_hops(skb) + 1;
405
406 /* first processing of this CAN frame -> adjust to private hop limit */
407 if (gwj->limit_hops && cgw_hops(nskb) == 1)
408 cgw_hops(nskb) = max_hops - gwj->limit_hops + 1;
409
410 nskb->dev = gwj->dst.dev;
411
412 /* pointer to modifiable CAN frame */
413 cf = (struct can_frame *)nskb->data;
414
415 /* perform preprocessed modification functions if there are any */
416 while (modidx < MAX_MODFUNCTIONS && gwj->mod.modfunc[modidx])
417 (*gwj->mod.modfunc[modidx++])(cf, &gwj->mod);
418
419 /* check for checksum updates when the CAN frame has been modified */
420 if (modidx) {
421 if (gwj->mod.csumfunc.crc8)
422 (*gwj->mod.csumfunc.crc8)(cf, &gwj->mod.csum.crc8);
423
424 if (gwj->mod.csumfunc.xor)
425 (*gwj->mod.csumfunc.xor)(cf, &gwj->mod.csum.xor);
426 }
427
428 /* clear the skb timestamp if not configured the other way */
429 if (!(gwj->flags & CGW_FLAGS_CAN_SRC_TSTAMP))
430 nskb->tstamp = 0;
431
432 /* send to netdevice */
433 if (can_send(nskb, gwj->flags & CGW_FLAGS_CAN_ECHO))
434 gwj->dropped_frames++;
435 else
436 gwj->handled_frames++;
437}
438
439static inline int cgw_register_filter(struct net *net, struct cgw_job *gwj)
440{
441 return can_rx_register(net, gwj->src.dev, gwj->ccgw.filter.can_id,
442 gwj->ccgw.filter.can_mask, can_can_gw_rcv,
443 gwj, "gw", NULL);
444}
445
446static inline void cgw_unregister_filter(struct net *net, struct cgw_job *gwj)
447{
448 can_rx_unregister(net, gwj->src.dev, gwj->ccgw.filter.can_id,
449 gwj->ccgw.filter.can_mask, can_can_gw_rcv, gwj);
450}
451
452static int cgw_notifier(struct notifier_block *nb,
453 unsigned long msg, void *ptr)
454{
455 struct net_device *dev = netdev_notifier_info_to_dev(ptr);
456 struct net *net = dev_net(dev);
457
458 if (dev->type != ARPHRD_CAN)
459 return NOTIFY_DONE;
460
461 if (msg == NETDEV_UNREGISTER) {
462
463 struct cgw_job *gwj = NULL;
464 struct hlist_node *nx;
465
466 ASSERT_RTNL();
467
468 hlist_for_each_entry_safe(gwj, nx, &net->can.cgw_list, list) {
469
470 if (gwj->src.dev == dev || gwj->dst.dev == dev) {
471 hlist_del(&gwj->list);
472 cgw_unregister_filter(net, gwj);
473 kmem_cache_free(cgw_cache, gwj);
474 }
475 }
476 }
477
478 return NOTIFY_DONE;
479}
480
481static int cgw_put_job(struct sk_buff *skb, struct cgw_job *gwj, int type,
482 u32 pid, u32 seq, int flags)
483{
484 struct cgw_frame_mod mb;
485 struct rtcanmsg *rtcan;
486 struct nlmsghdr *nlh;
487
488 nlh = nlmsg_put(skb, pid, seq, type, sizeof(*rtcan), flags);
489 if (!nlh)
490 return -EMSGSIZE;
491
492 rtcan = nlmsg_data(nlh);
493 rtcan->can_family = AF_CAN;
494 rtcan->gwtype = gwj->gwtype;
495 rtcan->flags = gwj->flags;
496
497 /* add statistics if available */
498
499 if (gwj->handled_frames) {
500 if (nla_put_u32(skb, CGW_HANDLED, gwj->handled_frames) < 0)
501 goto cancel;
502 }
503
504 if (gwj->dropped_frames) {
505 if (nla_put_u32(skb, CGW_DROPPED, gwj->dropped_frames) < 0)
506 goto cancel;
507 }
508
509 if (gwj->deleted_frames) {
510 if (nla_put_u32(skb, CGW_DELETED, gwj->deleted_frames) < 0)
511 goto cancel;
512 }
513
514 /* check non default settings of attributes */
515
516 if (gwj->limit_hops) {
517 if (nla_put_u8(skb, CGW_LIM_HOPS, gwj->limit_hops) < 0)
518 goto cancel;
519 }
520
521 if (gwj->mod.modtype.and) {
522 memcpy(&mb.cf, &gwj->mod.modframe.and, sizeof(mb.cf));
523 mb.modtype = gwj->mod.modtype.and;
524 if (nla_put(skb, CGW_MOD_AND, sizeof(mb), &mb) < 0)
525 goto cancel;
526 }
527
528 if (gwj->mod.modtype.or) {
529 memcpy(&mb.cf, &gwj->mod.modframe.or, sizeof(mb.cf));
530 mb.modtype = gwj->mod.modtype.or;
531 if (nla_put(skb, CGW_MOD_OR, sizeof(mb), &mb) < 0)
532 goto cancel;
533 }
534
535 if (gwj->mod.modtype.xor) {
536 memcpy(&mb.cf, &gwj->mod.modframe.xor, sizeof(mb.cf));
537 mb.modtype = gwj->mod.modtype.xor;
538 if (nla_put(skb, CGW_MOD_XOR, sizeof(mb), &mb) < 0)
539 goto cancel;
540 }
541
542 if (gwj->mod.modtype.set) {
543 memcpy(&mb.cf, &gwj->mod.modframe.set, sizeof(mb.cf));
544 mb.modtype = gwj->mod.modtype.set;
545 if (nla_put(skb, CGW_MOD_SET, sizeof(mb), &mb) < 0)
546 goto cancel;
547 }
548
549 if (gwj->mod.uid) {
550 if (nla_put_u32(skb, CGW_MOD_UID, gwj->mod.uid) < 0)
551 goto cancel;
552 }
553
554 if (gwj->mod.csumfunc.crc8) {
555 if (nla_put(skb, CGW_CS_CRC8, CGW_CS_CRC8_LEN,
556 &gwj->mod.csum.crc8) < 0)
557 goto cancel;
558 }
559
560 if (gwj->mod.csumfunc.xor) {
561 if (nla_put(skb, CGW_CS_XOR, CGW_CS_XOR_LEN,
562 &gwj->mod.csum.xor) < 0)
563 goto cancel;
564 }
565
566 if (gwj->gwtype == CGW_TYPE_CAN_CAN) {
567
568 if (gwj->ccgw.filter.can_id || gwj->ccgw.filter.can_mask) {
569 if (nla_put(skb, CGW_FILTER, sizeof(struct can_filter),
570 &gwj->ccgw.filter) < 0)
571 goto cancel;
572 }
573
574 if (nla_put_u32(skb, CGW_SRC_IF, gwj->ccgw.src_idx) < 0)
575 goto cancel;
576
577 if (nla_put_u32(skb, CGW_DST_IF, gwj->ccgw.dst_idx) < 0)
578 goto cancel;
579 }
580
581 nlmsg_end(skb, nlh);
582 return 0;
583
584cancel:
585 nlmsg_cancel(skb, nlh);
586 return -EMSGSIZE;
587}
588
589/* Dump information about all CAN gateway jobs, in response to RTM_GETROUTE */
590static int cgw_dump_jobs(struct sk_buff *skb, struct netlink_callback *cb)
591{
592 struct net *net = sock_net(skb->sk);
593 struct cgw_job *gwj = NULL;
594 int idx = 0;
595 int s_idx = cb->args[0];
596
597 rcu_read_lock();
598 hlist_for_each_entry_rcu(gwj, &net->can.cgw_list, list) {
599 if (idx < s_idx)
600 goto cont;
601
602 if (cgw_put_job(skb, gwj, RTM_NEWROUTE, NETLINK_CB(cb->skb).portid,
603 cb->nlh->nlmsg_seq, NLM_F_MULTI) < 0)
604 break;
605cont:
606 idx++;
607 }
608 rcu_read_unlock();
609
610 cb->args[0] = idx;
611
612 return skb->len;
613}
614
615static const struct nla_policy cgw_policy[CGW_MAX+1] = {
616 [CGW_MOD_AND] = { .len = sizeof(struct cgw_frame_mod) },
617 [CGW_MOD_OR] = { .len = sizeof(struct cgw_frame_mod) },
618 [CGW_MOD_XOR] = { .len = sizeof(struct cgw_frame_mod) },
619 [CGW_MOD_SET] = { .len = sizeof(struct cgw_frame_mod) },
620 [CGW_CS_XOR] = { .len = sizeof(struct cgw_csum_xor) },
621 [CGW_CS_CRC8] = { .len = sizeof(struct cgw_csum_crc8) },
622 [CGW_SRC_IF] = { .type = NLA_U32 },
623 [CGW_DST_IF] = { .type = NLA_U32 },
624 [CGW_FILTER] = { .len = sizeof(struct can_filter) },
625 [CGW_LIM_HOPS] = { .type = NLA_U8 },
626 [CGW_MOD_UID] = { .type = NLA_U32 },
627};
628
629/* check for common and gwtype specific attributes */
630static int cgw_parse_attr(struct nlmsghdr *nlh, struct cf_mod *mod,
631 u8 gwtype, void *gwtypeattr, u8 *limhops)
632{
633 struct nlattr *tb[CGW_MAX+1];
634 struct cgw_frame_mod mb;
635 int modidx = 0;
636 int err = 0;
637
638 /* initialize modification & checksum data space */
639 memset(mod, 0, sizeof(*mod));
640
641 err = nlmsg_parse(nlh, sizeof(struct rtcanmsg), tb, CGW_MAX,
642 cgw_policy, NULL);
643 if (err < 0)
644 return err;
645
646 if (tb[CGW_LIM_HOPS]) {
647 *limhops = nla_get_u8(tb[CGW_LIM_HOPS]);
648
649 if (*limhops < 1 || *limhops > max_hops)
650 return -EINVAL;
651 }
652
653 /* check for AND/OR/XOR/SET modifications */
654
655 if (tb[CGW_MOD_AND]) {
656 nla_memcpy(&mb, tb[CGW_MOD_AND], CGW_MODATTR_LEN);
657
658 canframecpy(&mod->modframe.and, &mb.cf);
659 mod->modtype.and = mb.modtype;
660
661 if (mb.modtype & CGW_MOD_ID)
662 mod->modfunc[modidx++] = mod_and_id;
663
664 if (mb.modtype & CGW_MOD_DLC)
665 mod->modfunc[modidx++] = mod_and_dlc;
666
667 if (mb.modtype & CGW_MOD_DATA)
668 mod->modfunc[modidx++] = mod_and_data;
669 }
670
671 if (tb[CGW_MOD_OR]) {
672 nla_memcpy(&mb, tb[CGW_MOD_OR], CGW_MODATTR_LEN);
673
674 canframecpy(&mod->modframe.or, &mb.cf);
675 mod->modtype.or = mb.modtype;
676
677 if (mb.modtype & CGW_MOD_ID)
678 mod->modfunc[modidx++] = mod_or_id;
679
680 if (mb.modtype & CGW_MOD_DLC)
681 mod->modfunc[modidx++] = mod_or_dlc;
682
683 if (mb.modtype & CGW_MOD_DATA)
684 mod->modfunc[modidx++] = mod_or_data;
685 }
686
687 if (tb[CGW_MOD_XOR]) {
688 nla_memcpy(&mb, tb[CGW_MOD_XOR], CGW_MODATTR_LEN);
689
690 canframecpy(&mod->modframe.xor, &mb.cf);
691 mod->modtype.xor = mb.modtype;
692
693 if (mb.modtype & CGW_MOD_ID)
694 mod->modfunc[modidx++] = mod_xor_id;
695
696 if (mb.modtype & CGW_MOD_DLC)
697 mod->modfunc[modidx++] = mod_xor_dlc;
698
699 if (mb.modtype & CGW_MOD_DATA)
700 mod->modfunc[modidx++] = mod_xor_data;
701 }
702
703 if (tb[CGW_MOD_SET]) {
704 nla_memcpy(&mb, tb[CGW_MOD_SET], CGW_MODATTR_LEN);
705
706 canframecpy(&mod->modframe.set, &mb.cf);
707 mod->modtype.set = mb.modtype;
708
709 if (mb.modtype & CGW_MOD_ID)
710 mod->modfunc[modidx++] = mod_set_id;
711
712 if (mb.modtype & CGW_MOD_DLC)
713 mod->modfunc[modidx++] = mod_set_dlc;
714
715 if (mb.modtype & CGW_MOD_DATA)
716 mod->modfunc[modidx++] = mod_set_data;
717 }
718
719 /* check for checksum operations after CAN frame modifications */
720 if (modidx) {
721
722 if (tb[CGW_CS_CRC8]) {
723 struct cgw_csum_crc8 *c = nla_data(tb[CGW_CS_CRC8]);
724
725 err = cgw_chk_csum_parms(c->from_idx, c->to_idx,
726 c->result_idx);
727 if (err)
728 return err;
729
730 nla_memcpy(&mod->csum.crc8, tb[CGW_CS_CRC8],
731 CGW_CS_CRC8_LEN);
732
733 /*
734 * select dedicated processing function to reduce
735 * runtime operations in receive hot path.
736 */
737 if (c->from_idx < 0 || c->to_idx < 0 ||
738 c->result_idx < 0)
739 mod->csumfunc.crc8 = cgw_csum_crc8_rel;
740 else if (c->from_idx <= c->to_idx)
741 mod->csumfunc.crc8 = cgw_csum_crc8_pos;
742 else
743 mod->csumfunc.crc8 = cgw_csum_crc8_neg;
744 }
745
746 if (tb[CGW_CS_XOR]) {
747 struct cgw_csum_xor *c = nla_data(tb[CGW_CS_XOR]);
748
749 err = cgw_chk_csum_parms(c->from_idx, c->to_idx,
750 c->result_idx);
751 if (err)
752 return err;
753
754 nla_memcpy(&mod->csum.xor, tb[CGW_CS_XOR],
755 CGW_CS_XOR_LEN);
756
757 /*
758 * select dedicated processing function to reduce
759 * runtime operations in receive hot path.
760 */
761 if (c->from_idx < 0 || c->to_idx < 0 ||
762 c->result_idx < 0)
763 mod->csumfunc.xor = cgw_csum_xor_rel;
764 else if (c->from_idx <= c->to_idx)
765 mod->csumfunc.xor = cgw_csum_xor_pos;
766 else
767 mod->csumfunc.xor = cgw_csum_xor_neg;
768 }
769
770 if (tb[CGW_MOD_UID]) {
771 nla_memcpy(&mod->uid, tb[CGW_MOD_UID], sizeof(u32));
772 }
773 }
774
775 if (gwtype == CGW_TYPE_CAN_CAN) {
776
777 /* check CGW_TYPE_CAN_CAN specific attributes */
778
779 struct can_can_gw *ccgw = (struct can_can_gw *)gwtypeattr;
780 memset(ccgw, 0, sizeof(*ccgw));
781
782 /* check for can_filter in attributes */
783 if (tb[CGW_FILTER])
784 nla_memcpy(&ccgw->filter, tb[CGW_FILTER],
785 sizeof(struct can_filter));
786
787 err = -ENODEV;
788
789 /* specifying two interfaces is mandatory */
790 if (!tb[CGW_SRC_IF] || !tb[CGW_DST_IF])
791 return err;
792
793 ccgw->src_idx = nla_get_u32(tb[CGW_SRC_IF]);
794 ccgw->dst_idx = nla_get_u32(tb[CGW_DST_IF]);
795
796 /* both indices set to 0 for flushing all routing entries */
797 if (!ccgw->src_idx && !ccgw->dst_idx)
798 return 0;
799
800 /* only one index set to 0 is an error */
801 if (!ccgw->src_idx || !ccgw->dst_idx)
802 return err;
803 }
804
805 /* add the checks for other gwtypes here */
806
807 return 0;
808}
809
810static int cgw_create_job(struct sk_buff *skb, struct nlmsghdr *nlh,
811 struct netlink_ext_ack *extack)
812{
813 struct net *net = sock_net(skb->sk);
814 struct rtcanmsg *r;
815 struct cgw_job *gwj;
816 struct cf_mod mod;
817 struct can_can_gw ccgw;
818 u8 limhops = 0;
819 int err = 0;
820
821 if (!netlink_capable(skb, CAP_NET_ADMIN))
822 return -EPERM;
823
824 if (nlmsg_len(nlh) < sizeof(*r))
825 return -EINVAL;
826
827 r = nlmsg_data(nlh);
828 if (r->can_family != AF_CAN)
829 return -EPFNOSUPPORT;
830
831 /* so far we only support CAN -> CAN routings */
832 if (r->gwtype != CGW_TYPE_CAN_CAN)
833 return -EINVAL;
834
835 err = cgw_parse_attr(nlh, &mod, CGW_TYPE_CAN_CAN, &ccgw, &limhops);
836 if (err < 0)
837 return err;
838
839 if (mod.uid) {
840
841 ASSERT_RTNL();
842
843 /* check for updating an existing job with identical uid */
844 hlist_for_each_entry(gwj, &net->can.cgw_list, list) {
845
846 if (gwj->mod.uid != mod.uid)
847 continue;
848
849 /* interfaces & filters must be identical */
850 if (memcmp(&gwj->ccgw, &ccgw, sizeof(ccgw)))
851 return -EINVAL;
852
853 /* update modifications with disabled softirq & quit */
854 local_bh_disable();
855 memcpy(&gwj->mod, &mod, sizeof(mod));
856 local_bh_enable();
857 return 0;
858 }
859 }
860
861 /* ifindex == 0 is not allowed for job creation */
862 if (!ccgw.src_idx || !ccgw.dst_idx)
863 return -ENODEV;
864
865 gwj = kmem_cache_alloc(cgw_cache, GFP_KERNEL);
866 if (!gwj)
867 return -ENOMEM;
868
869 gwj->handled_frames = 0;
870 gwj->dropped_frames = 0;
871 gwj->deleted_frames = 0;
872 gwj->flags = r->flags;
873 gwj->gwtype = r->gwtype;
874 gwj->limit_hops = limhops;
875
876 /* insert already parsed information */
877 memcpy(&gwj->mod, &mod, sizeof(mod));
878 memcpy(&gwj->ccgw, &ccgw, sizeof(ccgw));
879
880 err = -ENODEV;
881
882 gwj->src.dev = __dev_get_by_index(net, gwj->ccgw.src_idx);
883
884 if (!gwj->src.dev)
885 goto out;
886
887 if (gwj->src.dev->type != ARPHRD_CAN)
888 goto out;
889
890 gwj->dst.dev = __dev_get_by_index(net, gwj->ccgw.dst_idx);
891
892 if (!gwj->dst.dev)
893 goto out;
894
895 if (gwj->dst.dev->type != ARPHRD_CAN)
896 goto out;
897
898 ASSERT_RTNL();
899
900 err = cgw_register_filter(net, gwj);
901 if (!err)
902 hlist_add_head_rcu(&gwj->list, &net->can.cgw_list);
903out:
904 if (err)
905 kmem_cache_free(cgw_cache, gwj);
906
907 return err;
908}
909
910static void cgw_remove_all_jobs(struct net *net)
911{
912 struct cgw_job *gwj = NULL;
913 struct hlist_node *nx;
914
915 ASSERT_RTNL();
916
917 hlist_for_each_entry_safe(gwj, nx, &net->can.cgw_list, list) {
918 hlist_del(&gwj->list);
919 cgw_unregister_filter(net, gwj);
920 kmem_cache_free(cgw_cache, gwj);
921 }
922}
923
924static int cgw_remove_job(struct sk_buff *skb, struct nlmsghdr *nlh,
925 struct netlink_ext_ack *extack)
926{
927 struct net *net = sock_net(skb->sk);
928 struct cgw_job *gwj = NULL;
929 struct hlist_node *nx;
930 struct rtcanmsg *r;
931 struct cf_mod mod;
932 struct can_can_gw ccgw;
933 u8 limhops = 0;
934 int err = 0;
935
936 if (!netlink_capable(skb, CAP_NET_ADMIN))
937 return -EPERM;
938
939 if (nlmsg_len(nlh) < sizeof(*r))
940 return -EINVAL;
941
942 r = nlmsg_data(nlh);
943 if (r->can_family != AF_CAN)
944 return -EPFNOSUPPORT;
945
946 /* so far we only support CAN -> CAN routings */
947 if (r->gwtype != CGW_TYPE_CAN_CAN)
948 return -EINVAL;
949
950 err = cgw_parse_attr(nlh, &mod, CGW_TYPE_CAN_CAN, &ccgw, &limhops);
951 if (err < 0)
952 return err;
953
954 /* two interface indices both set to 0 => remove all entries */
955 if (!ccgw.src_idx && !ccgw.dst_idx) {
956 cgw_remove_all_jobs(net);
957 return 0;
958 }
959
960 err = -EINVAL;
961
962 ASSERT_RTNL();
963
964 /* remove only the first matching entry */
965 hlist_for_each_entry_safe(gwj, nx, &net->can.cgw_list, list) {
966
967 if (gwj->flags != r->flags)
968 continue;
969
970 if (gwj->limit_hops != limhops)
971 continue;
972
973 /* we have a match when uid is enabled and identical */
974 if (gwj->mod.uid || mod.uid) {
975 if (gwj->mod.uid != mod.uid)
976 continue;
977 } else {
978 /* no uid => check for identical modifications */
979 if (memcmp(&gwj->mod, &mod, sizeof(mod)))
980 continue;
981 }
982
983 /* if (r->gwtype == CGW_TYPE_CAN_CAN) - is made sure here */
984 if (memcmp(&gwj->ccgw, &ccgw, sizeof(ccgw)))
985 continue;
986
987 hlist_del(&gwj->list);
988 cgw_unregister_filter(net, gwj);
989 kmem_cache_free(cgw_cache, gwj);
990 err = 0;
991 break;
992 }
993
994 return err;
995}
996
997static int __net_init cangw_pernet_init(struct net *net)
998{
999 INIT_HLIST_HEAD(&net->can.cgw_list);
1000 return 0;
1001}
1002
1003static void __net_exit cangw_pernet_exit(struct net *net)
1004{
1005 rtnl_lock();
1006 cgw_remove_all_jobs(net);
1007 rtnl_unlock();
1008}
1009
1010static struct pernet_operations cangw_pernet_ops = {
1011 .init = cangw_pernet_init,
1012 .exit = cangw_pernet_exit,
1013};
1014
1015static __init int cgw_module_init(void)
1016{
1017 int ret;
1018
1019 /* sanitize given module parameter */
1020 max_hops = clamp_t(unsigned int, max_hops, CGW_MIN_HOPS, CGW_MAX_HOPS);
1021
1022 pr_info("can: netlink gateway (rev " CAN_GW_VERSION ") max_hops=%d\n",
1023 max_hops);
1024
1025 register_pernet_subsys(&cangw_pernet_ops);
1026 cgw_cache = kmem_cache_create("can_gw", sizeof(struct cgw_job),
1027 0, 0, NULL);
1028
1029 if (!cgw_cache)
1030 return -ENOMEM;
1031
1032 /* set notifier */
1033 notifier.notifier_call = cgw_notifier;
1034 register_netdevice_notifier(¬ifier);
1035
1036 ret = rtnl_register_module(THIS_MODULE, PF_CAN, RTM_GETROUTE,
1037 NULL, cgw_dump_jobs, 0);
1038 if (ret) {
1039 unregister_netdevice_notifier(¬ifier);
1040 kmem_cache_destroy(cgw_cache);
1041 return -ENOBUFS;
1042 }
1043
1044 /* Only the first call to rtnl_register_module can fail */
1045 rtnl_register_module(THIS_MODULE, PF_CAN, RTM_NEWROUTE,
1046 cgw_create_job, NULL, 0);
1047 rtnl_register_module(THIS_MODULE, PF_CAN, RTM_DELROUTE,
1048 cgw_remove_job, NULL, 0);
1049
1050 return 0;
1051}
1052
1053static __exit void cgw_module_exit(void)
1054{
1055 rtnl_unregister_all(PF_CAN);
1056
1057 unregister_netdevice_notifier(¬ifier);
1058
1059 unregister_pernet_subsys(&cangw_pernet_ops);
1060 rcu_barrier(); /* Wait for completion of call_rcu()'s */
1061
1062 kmem_cache_destroy(cgw_cache);
1063}
1064
1065module_init(cgw_module_init);
1066module_exit(cgw_module_exit);