1 /* 2 * gw.c - CAN frame Gateway/Router/Bridge with netlink interface 3 * 4 * Copyright (c) 2017 Volkswagen Group Electronic Research 5 * All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. Neither the name of Volkswagen nor the names of its contributors 16 * may be used to endorse or promote products derived from this software 17 * without specific prior written permission. 18 * 19 * Alternatively, provided that this notice is retained in full, this 20 * software may be distributed under the terms of the GNU General 21 * Public License ("GPL") version 2, in which case the provisions of the 22 * GPL apply INSTEAD OF those given above. 23 * 24 * The provided data structures and external interfaces from this code 25 * are not restricted to be used by modules with a GPL compatible license. 26 * 27 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 28 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 29 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 30 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 31 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 32 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 33 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 34 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 35 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 36 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 37 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH 38 * DAMAGE. 39 * 40 */ 41 42 #include <linux/module.h> 43 #include <linux/init.h> 44 #include <linux/types.h> 45 #include <linux/kernel.h> 46 #include <linux/list.h> 47 #include <linux/spinlock.h> 48 #include <linux/rcupdate.h> 49 #include <linux/rculist.h> 50 #include <linux/net.h> 51 #include <linux/netdevice.h> 52 #include <linux/if_arp.h> 53 #include <linux/skbuff.h> 54 #include <linux/can.h> 55 #include <linux/can/core.h> 56 #include <linux/can/skb.h> 57 #include <linux/can/gw.h> 58 #include <net/rtnetlink.h> 59 #include <net/net_namespace.h> 60 #include <net/sock.h> 61 62 #define CAN_GW_VERSION "20170425" 63 #define CAN_GW_NAME "can-gw" 64 65 MODULE_DESCRIPTION("PF_CAN netlink gateway"); 66 MODULE_LICENSE("Dual BSD/GPL"); 67 MODULE_AUTHOR("Oliver Hartkopp <oliver.hartkopp@volkswagen.de>"); 68 MODULE_ALIAS(CAN_GW_NAME); 69 70 #define CGW_MIN_HOPS 1 71 #define CGW_MAX_HOPS 6 72 #define CGW_DEFAULT_HOPS 1 73 74 static unsigned int max_hops __read_mostly = CGW_DEFAULT_HOPS; 75 module_param(max_hops, uint, 0444); 76 MODULE_PARM_DESC(max_hops, 77 "maximum " CAN_GW_NAME " routing hops for CAN frames " 78 "(valid values: " __stringify(CGW_MIN_HOPS) "-" 79 __stringify(CGW_MAX_HOPS) " hops, " 80 "default: " __stringify(CGW_DEFAULT_HOPS) ")"); 81 82 static struct notifier_block notifier; 83 static struct kmem_cache *cgw_cache __read_mostly; 84 85 /* structure that contains the (on-the-fly) CAN frame modifications */ 86 struct cf_mod { 87 struct { 88 struct can_frame and; 89 struct can_frame or; 90 struct can_frame xor; 91 struct can_frame set; 92 } modframe; 93 struct { 94 u8 and; 95 u8 or; 96 u8 xor; 97 u8 set; 98 } modtype; 99 void (*modfunc[MAX_MODFUNCTIONS])(struct can_frame *cf, 100 struct cf_mod *mod); 101 102 /* CAN frame checksum calculation after CAN frame modifications */ 103 struct { 104 struct cgw_csum_xor xor; 105 struct cgw_csum_crc8 crc8; 106 } csum; 107 struct { 108 void (*xor)(struct can_frame *cf, struct cgw_csum_xor *xor); 109 void (*crc8)(struct can_frame *cf, struct cgw_csum_crc8 *crc8); 110 } csumfunc; 111 u32 uid; 112 }; 113 114 115 /* 116 * So far we just support CAN -> CAN routing and frame modifications. 117 * 118 * The internal can_can_gw structure contains data and attributes for 119 * a CAN -> CAN gateway job. 120 */ 121 struct can_can_gw { 122 struct can_filter filter; 123 int src_idx; 124 int dst_idx; 125 }; 126 127 /* list entry for CAN gateways jobs */ 128 struct cgw_job { 129 struct hlist_node list; 130 struct rcu_head rcu; 131 u32 handled_frames; 132 u32 dropped_frames; 133 u32 deleted_frames; 134 struct cf_mod mod; 135 union { 136 /* CAN frame data source */ 137 struct net_device *dev; 138 } src; 139 union { 140 /* CAN frame data destination */ 141 struct net_device *dev; 142 } dst; 143 union { 144 struct can_can_gw ccgw; 145 /* tbc */ 146 }; 147 u8 gwtype; 148 u8 limit_hops; 149 u16 flags; 150 }; 151 152 /* modification functions that are invoked in the hot path in can_can_gw_rcv */ 153 154 #define MODFUNC(func, op) static void func(struct can_frame *cf, \ 155 struct cf_mod *mod) { op ; } 156 157 MODFUNC(mod_and_id, cf->can_id &= mod->modframe.and.can_id) 158 MODFUNC(mod_and_dlc, cf->can_dlc &= mod->modframe.and.can_dlc) 159 MODFUNC(mod_and_data, *(u64 *)cf->data &= *(u64 *)mod->modframe.and.data) 160 MODFUNC(mod_or_id, cf->can_id |= mod->modframe.or.can_id) 161 MODFUNC(mod_or_dlc, cf->can_dlc |= mod->modframe.or.can_dlc) 162 MODFUNC(mod_or_data, *(u64 *)cf->data |= *(u64 *)mod->modframe.or.data) 163 MODFUNC(mod_xor_id, cf->can_id ^= mod->modframe.xor.can_id) 164 MODFUNC(mod_xor_dlc, cf->can_dlc ^= mod->modframe.xor.can_dlc) 165 MODFUNC(mod_xor_data, *(u64 *)cf->data ^= *(u64 *)mod->modframe.xor.data) 166 MODFUNC(mod_set_id, cf->can_id = mod->modframe.set.can_id) 167 MODFUNC(mod_set_dlc, cf->can_dlc = mod->modframe.set.can_dlc) 168 MODFUNC(mod_set_data, *(u64 *)cf->data = *(u64 *)mod->modframe.set.data) 169 170 static inline void canframecpy(struct can_frame *dst, struct can_frame *src) 171 { 172 /* 173 * Copy the struct members separately to ensure that no uninitialized 174 * data are copied in the 3 bytes hole of the struct. This is needed 175 * to make easy compares of the data in the struct cf_mod. 176 */ 177 178 dst->can_id = src->can_id; 179 dst->can_dlc = src->can_dlc; 180 *(u64 *)dst->data = *(u64 *)src->data; 181 } 182 183 static int cgw_chk_csum_parms(s8 fr, s8 to, s8 re) 184 { 185 /* 186 * absolute dlc values 0 .. 7 => 0 .. 7, e.g. data [0] 187 * relative to received dlc -1 .. -8 : 188 * e.g. for received dlc = 8 189 * -1 => index = 7 (data[7]) 190 * -3 => index = 5 (data[5]) 191 * -8 => index = 0 (data[0]) 192 */ 193 194 if (fr > -9 && fr < 8 && 195 to > -9 && to < 8 && 196 re > -9 && re < 8) 197 return 0; 198 else 199 return -EINVAL; 200 } 201 202 static inline int calc_idx(int idx, int rx_dlc) 203 { 204 if (idx < 0) 205 return rx_dlc + idx; 206 else 207 return idx; 208 } 209 210 static void cgw_csum_xor_rel(struct can_frame *cf, struct cgw_csum_xor *xor) 211 { 212 int from = calc_idx(xor->from_idx, cf->can_dlc); 213 int to = calc_idx(xor->to_idx, cf->can_dlc); 214 int res = calc_idx(xor->result_idx, cf->can_dlc); 215 u8 val = xor->init_xor_val; 216 int i; 217 218 if (from < 0 || to < 0 || res < 0) 219 return; 220 221 if (from <= to) { 222 for (i = from; i <= to; i++) 223 val ^= cf->data[i]; 224 } else { 225 for (i = from; i >= to; i--) 226 val ^= cf->data[i]; 227 } 228 229 cf->data[res] = val; 230 } 231 232 static void cgw_csum_xor_pos(struct can_frame *cf, struct cgw_csum_xor *xor) 233 { 234 u8 val = xor->init_xor_val; 235 int i; 236 237 for (i = xor->from_idx; i <= xor->to_idx; i++) 238 val ^= cf->data[i]; 239 240 cf->data[xor->result_idx] = val; 241 } 242 243 static void cgw_csum_xor_neg(struct can_frame *cf, struct cgw_csum_xor *xor) 244 { 245 u8 val = xor->init_xor_val; 246 int i; 247 248 for (i = xor->from_idx; i >= xor->to_idx; i--) 249 val ^= cf->data[i]; 250 251 cf->data[xor->result_idx] = val; 252 } 253 254 static void cgw_csum_crc8_rel(struct can_frame *cf, struct cgw_csum_crc8 *crc8) 255 { 256 int from = calc_idx(crc8->from_idx, cf->can_dlc); 257 int to = calc_idx(crc8->to_idx, cf->can_dlc); 258 int res = calc_idx(crc8->result_idx, cf->can_dlc); 259 u8 crc = crc8->init_crc_val; 260 int i; 261 262 if (from < 0 || to < 0 || res < 0) 263 return; 264 265 if (from <= to) { 266 for (i = crc8->from_idx; i <= crc8->to_idx; i++) 267 crc = crc8->crctab[crc^cf->data[i]]; 268 } else { 269 for (i = crc8->from_idx; i >= crc8->to_idx; i--) 270 crc = crc8->crctab[crc^cf->data[i]]; 271 } 272 273 switch (crc8->profile) { 274 275 case CGW_CRC8PRF_1U8: 276 crc = crc8->crctab[crc^crc8->profile_data[0]]; 277 break; 278 279 case CGW_CRC8PRF_16U8: 280 crc = crc8->crctab[crc^crc8->profile_data[cf->data[1] & 0xF]]; 281 break; 282 283 case CGW_CRC8PRF_SFFID_XOR: 284 crc = crc8->crctab[crc^(cf->can_id & 0xFF)^ 285 (cf->can_id >> 8 & 0xFF)]; 286 break; 287 288 } 289 290 cf->data[crc8->result_idx] = crc^crc8->final_xor_val; 291 } 292 293 static void cgw_csum_crc8_pos(struct can_frame *cf, struct cgw_csum_crc8 *crc8) 294 { 295 u8 crc = crc8->init_crc_val; 296 int i; 297 298 for (i = crc8->from_idx; i <= crc8->to_idx; i++) 299 crc = crc8->crctab[crc^cf->data[i]]; 300 301 switch (crc8->profile) { 302 303 case CGW_CRC8PRF_1U8: 304 crc = crc8->crctab[crc^crc8->profile_data[0]]; 305 break; 306 307 case CGW_CRC8PRF_16U8: 308 crc = crc8->crctab[crc^crc8->profile_data[cf->data[1] & 0xF]]; 309 break; 310 311 case CGW_CRC8PRF_SFFID_XOR: 312 crc = crc8->crctab[crc^(cf->can_id & 0xFF)^ 313 (cf->can_id >> 8 & 0xFF)]; 314 break; 315 } 316 317 cf->data[crc8->result_idx] = crc^crc8->final_xor_val; 318 } 319 320 static void cgw_csum_crc8_neg(struct can_frame *cf, struct cgw_csum_crc8 *crc8) 321 { 322 u8 crc = crc8->init_crc_val; 323 int i; 324 325 for (i = crc8->from_idx; i >= crc8->to_idx; i--) 326 crc = crc8->crctab[crc^cf->data[i]]; 327 328 switch (crc8->profile) { 329 330 case CGW_CRC8PRF_1U8: 331 crc = crc8->crctab[crc^crc8->profile_data[0]]; 332 break; 333 334 case CGW_CRC8PRF_16U8: 335 crc = crc8->crctab[crc^crc8->profile_data[cf->data[1] & 0xF]]; 336 break; 337 338 case CGW_CRC8PRF_SFFID_XOR: 339 crc = crc8->crctab[crc^(cf->can_id & 0xFF)^ 340 (cf->can_id >> 8 & 0xFF)]; 341 break; 342 } 343 344 cf->data[crc8->result_idx] = crc^crc8->final_xor_val; 345 } 346 347 /* the receive & process & send function */ 348 static void can_can_gw_rcv(struct sk_buff *skb, void *data) 349 { 350 struct cgw_job *gwj = (struct cgw_job *)data; 351 struct can_frame *cf; 352 struct sk_buff *nskb; 353 int modidx = 0; 354 355 /* 356 * Do not handle CAN frames routed more than 'max_hops' times. 357 * In general we should never catch this delimiter which is intended 358 * to cover a misconfiguration protection (e.g. circular CAN routes). 359 * 360 * The Controller Area Network controllers only accept CAN frames with 361 * correct CRCs - which are not visible in the controller registers. 362 * According to skbuff.h documentation the csum_start element for IP 363 * checksums is undefined/unused when ip_summed == CHECKSUM_UNNECESSARY. 364 * Only CAN skbs can be processed here which already have this property. 365 */ 366 367 #define cgw_hops(skb) ((skb)->csum_start) 368 369 BUG_ON(skb->ip_summed != CHECKSUM_UNNECESSARY); 370 371 if (cgw_hops(skb) >= max_hops) { 372 /* indicate deleted frames due to misconfiguration */ 373 gwj->deleted_frames++; 374 return; 375 } 376 377 if (!(gwj->dst.dev->flags & IFF_UP)) { 378 gwj->dropped_frames++; 379 return; 380 } 381 382 /* is sending the skb back to the incoming interface not allowed? */ 383 if (!(gwj->flags & CGW_FLAGS_CAN_IIF_TX_OK) && 384 can_skb_prv(skb)->ifindex == gwj->dst.dev->ifindex) 385 return; 386 387 /* 388 * clone the given skb, which has not been done in can_rcv() 389 * 390 * When there is at least one modification function activated, 391 * we need to copy the skb as we want to modify skb->data. 392 */ 393 if (gwj->mod.modfunc[0]) 394 nskb = skb_copy(skb, GFP_ATOMIC); 395 else 396 nskb = skb_clone(skb, GFP_ATOMIC); 397 398 if (!nskb) { 399 gwj->dropped_frames++; 400 return; 401 } 402 403 /* put the incremented hop counter in the cloned skb */ 404 cgw_hops(nskb) = cgw_hops(skb) + 1; 405 406 /* first processing of this CAN frame -> adjust to private hop limit */ 407 if (gwj->limit_hops && cgw_hops(nskb) == 1) 408 cgw_hops(nskb) = max_hops - gwj->limit_hops + 1; 409 410 nskb->dev = gwj->dst.dev; 411 412 /* pointer to modifiable CAN frame */ 413 cf = (struct can_frame *)nskb->data; 414 415 /* perform preprocessed modification functions if there are any */ 416 while (modidx < MAX_MODFUNCTIONS && gwj->mod.modfunc[modidx]) 417 (*gwj->mod.modfunc[modidx++])(cf, &gwj->mod); 418 419 /* Has the CAN frame been modified? */ 420 if (modidx) { 421 /* get available space for the processed CAN frame type */ 422 int max_len = nskb->len - offsetof(struct can_frame, data); 423 424 /* dlc may have changed, make sure it fits to the CAN frame */ 425 if (cf->can_dlc > max_len) 426 goto out_delete; 427 428 /* check for checksum updates in classic CAN length only */ 429 if (gwj->mod.csumfunc.crc8) { 430 if (cf->can_dlc > 8) 431 goto out_delete; 432 433 (*gwj->mod.csumfunc.crc8)(cf, &gwj->mod.csum.crc8); 434 } 435 436 if (gwj->mod.csumfunc.xor) { 437 if (cf->can_dlc > 8) 438 goto out_delete; 439 440 (*gwj->mod.csumfunc.xor)(cf, &gwj->mod.csum.xor); 441 } 442 } 443 444 /* clear the skb timestamp if not configured the other way */ 445 if (!(gwj->flags & CGW_FLAGS_CAN_SRC_TSTAMP)) 446 nskb->tstamp = 0; 447 448 /* send to netdevice */ 449 if (can_send(nskb, gwj->flags & CGW_FLAGS_CAN_ECHO)) 450 gwj->dropped_frames++; 451 else 452 gwj->handled_frames++; 453 454 return; 455 456 out_delete: 457 /* delete frame due to misconfiguration */ 458 gwj->deleted_frames++; 459 kfree_skb(nskb); 460 return; 461 } 462 463 static inline int cgw_register_filter(struct net *net, struct cgw_job *gwj) 464 { 465 return can_rx_register(net, gwj->src.dev, gwj->ccgw.filter.can_id, 466 gwj->ccgw.filter.can_mask, can_can_gw_rcv, 467 gwj, "gw", NULL); 468 } 469 470 static inline void cgw_unregister_filter(struct net *net, struct cgw_job *gwj) 471 { 472 can_rx_unregister(net, gwj->src.dev, gwj->ccgw.filter.can_id, 473 gwj->ccgw.filter.can_mask, can_can_gw_rcv, gwj); 474 } 475 476 static int cgw_notifier(struct notifier_block *nb, 477 unsigned long msg, void *ptr) 478 { 479 struct net_device *dev = netdev_notifier_info_to_dev(ptr); 480 struct net *net = dev_net(dev); 481 482 if (dev->type != ARPHRD_CAN) 483 return NOTIFY_DONE; 484 485 if (msg == NETDEV_UNREGISTER) { 486 487 struct cgw_job *gwj = NULL; 488 struct hlist_node *nx; 489 490 ASSERT_RTNL(); 491 492 hlist_for_each_entry_safe(gwj, nx, &net->can.cgw_list, list) { 493 494 if (gwj->src.dev == dev || gwj->dst.dev == dev) { 495 hlist_del(&gwj->list); 496 cgw_unregister_filter(net, gwj); 497 kmem_cache_free(cgw_cache, gwj); 498 } 499 } 500 } 501 502 return NOTIFY_DONE; 503 } 504 505 static int cgw_put_job(struct sk_buff *skb, struct cgw_job *gwj, int type, 506 u32 pid, u32 seq, int flags) 507 { 508 struct cgw_frame_mod mb; 509 struct rtcanmsg *rtcan; 510 struct nlmsghdr *nlh; 511 512 nlh = nlmsg_put(skb, pid, seq, type, sizeof(*rtcan), flags); 513 if (!nlh) 514 return -EMSGSIZE; 515 516 rtcan = nlmsg_data(nlh); 517 rtcan->can_family = AF_CAN; 518 rtcan->gwtype = gwj->gwtype; 519 rtcan->flags = gwj->flags; 520 521 /* add statistics if available */ 522 523 if (gwj->handled_frames) { 524 if (nla_put_u32(skb, CGW_HANDLED, gwj->handled_frames) < 0) 525 goto cancel; 526 } 527 528 if (gwj->dropped_frames) { 529 if (nla_put_u32(skb, CGW_DROPPED, gwj->dropped_frames) < 0) 530 goto cancel; 531 } 532 533 if (gwj->deleted_frames) { 534 if (nla_put_u32(skb, CGW_DELETED, gwj->deleted_frames) < 0) 535 goto cancel; 536 } 537 538 /* check non default settings of attributes */ 539 540 if (gwj->limit_hops) { 541 if (nla_put_u8(skb, CGW_LIM_HOPS, gwj->limit_hops) < 0) 542 goto cancel; 543 } 544 545 if (gwj->mod.modtype.and) { 546 memcpy(&mb.cf, &gwj->mod.modframe.and, sizeof(mb.cf)); 547 mb.modtype = gwj->mod.modtype.and; 548 if (nla_put(skb, CGW_MOD_AND, sizeof(mb), &mb) < 0) 549 goto cancel; 550 } 551 552 if (gwj->mod.modtype.or) { 553 memcpy(&mb.cf, &gwj->mod.modframe.or, sizeof(mb.cf)); 554 mb.modtype = gwj->mod.modtype.or; 555 if (nla_put(skb, CGW_MOD_OR, sizeof(mb), &mb) < 0) 556 goto cancel; 557 } 558 559 if (gwj->mod.modtype.xor) { 560 memcpy(&mb.cf, &gwj->mod.modframe.xor, sizeof(mb.cf)); 561 mb.modtype = gwj->mod.modtype.xor; 562 if (nla_put(skb, CGW_MOD_XOR, sizeof(mb), &mb) < 0) 563 goto cancel; 564 } 565 566 if (gwj->mod.modtype.set) { 567 memcpy(&mb.cf, &gwj->mod.modframe.set, sizeof(mb.cf)); 568 mb.modtype = gwj->mod.modtype.set; 569 if (nla_put(skb, CGW_MOD_SET, sizeof(mb), &mb) < 0) 570 goto cancel; 571 } 572 573 if (gwj->mod.uid) { 574 if (nla_put_u32(skb, CGW_MOD_UID, gwj->mod.uid) < 0) 575 goto cancel; 576 } 577 578 if (gwj->mod.csumfunc.crc8) { 579 if (nla_put(skb, CGW_CS_CRC8, CGW_CS_CRC8_LEN, 580 &gwj->mod.csum.crc8) < 0) 581 goto cancel; 582 } 583 584 if (gwj->mod.csumfunc.xor) { 585 if (nla_put(skb, CGW_CS_XOR, CGW_CS_XOR_LEN, 586 &gwj->mod.csum.xor) < 0) 587 goto cancel; 588 } 589 590 if (gwj->gwtype == CGW_TYPE_CAN_CAN) { 591 592 if (gwj->ccgw.filter.can_id || gwj->ccgw.filter.can_mask) { 593 if (nla_put(skb, CGW_FILTER, sizeof(struct can_filter), 594 &gwj->ccgw.filter) < 0) 595 goto cancel; 596 } 597 598 if (nla_put_u32(skb, CGW_SRC_IF, gwj->ccgw.src_idx) < 0) 599 goto cancel; 600 601 if (nla_put_u32(skb, CGW_DST_IF, gwj->ccgw.dst_idx) < 0) 602 goto cancel; 603 } 604 605 nlmsg_end(skb, nlh); 606 return 0; 607 608 cancel: 609 nlmsg_cancel(skb, nlh); 610 return -EMSGSIZE; 611 } 612 613 /* Dump information about all CAN gateway jobs, in response to RTM_GETROUTE */ 614 static int cgw_dump_jobs(struct sk_buff *skb, struct netlink_callback *cb) 615 { 616 struct net *net = sock_net(skb->sk); 617 struct cgw_job *gwj = NULL; 618 int idx = 0; 619 int s_idx = cb->args[0]; 620 621 rcu_read_lock(); 622 hlist_for_each_entry_rcu(gwj, &net->can.cgw_list, list) { 623 if (idx < s_idx) 624 goto cont; 625 626 if (cgw_put_job(skb, gwj, RTM_NEWROUTE, NETLINK_CB(cb->skb).portid, 627 cb->nlh->nlmsg_seq, NLM_F_MULTI) < 0) 628 break; 629 cont: 630 idx++; 631 } 632 rcu_read_unlock(); 633 634 cb->args[0] = idx; 635 636 return skb->len; 637 } 638 639 static const struct nla_policy cgw_policy[CGW_MAX+1] = { 640 [CGW_MOD_AND] = { .len = sizeof(struct cgw_frame_mod) }, 641 [CGW_MOD_OR] = { .len = sizeof(struct cgw_frame_mod) }, 642 [CGW_MOD_XOR] = { .len = sizeof(struct cgw_frame_mod) }, 643 [CGW_MOD_SET] = { .len = sizeof(struct cgw_frame_mod) }, 644 [CGW_CS_XOR] = { .len = sizeof(struct cgw_csum_xor) }, 645 [CGW_CS_CRC8] = { .len = sizeof(struct cgw_csum_crc8) }, 646 [CGW_SRC_IF] = { .type = NLA_U32 }, 647 [CGW_DST_IF] = { .type = NLA_U32 }, 648 [CGW_FILTER] = { .len = sizeof(struct can_filter) }, 649 [CGW_LIM_HOPS] = { .type = NLA_U8 }, 650 [CGW_MOD_UID] = { .type = NLA_U32 }, 651 }; 652 653 /* check for common and gwtype specific attributes */ 654 static int cgw_parse_attr(struct nlmsghdr *nlh, struct cf_mod *mod, 655 u8 gwtype, void *gwtypeattr, u8 *limhops) 656 { 657 struct nlattr *tb[CGW_MAX+1]; 658 struct cgw_frame_mod mb; 659 int modidx = 0; 660 int err = 0; 661 662 /* initialize modification & checksum data space */ 663 memset(mod, 0, sizeof(*mod)); 664 665 err = nlmsg_parse_deprecated(nlh, sizeof(struct rtcanmsg), tb, 666 CGW_MAX, cgw_policy, NULL); 667 if (err < 0) 668 return err; 669 670 if (tb[CGW_LIM_HOPS]) { 671 *limhops = nla_get_u8(tb[CGW_LIM_HOPS]); 672 673 if (*limhops < 1 || *limhops > max_hops) 674 return -EINVAL; 675 } 676 677 /* check for AND/OR/XOR/SET modifications */ 678 679 if (tb[CGW_MOD_AND]) { 680 nla_memcpy(&mb, tb[CGW_MOD_AND], CGW_MODATTR_LEN); 681 682 canframecpy(&mod->modframe.and, &mb.cf); 683 mod->modtype.and = mb.modtype; 684 685 if (mb.modtype & CGW_MOD_ID) 686 mod->modfunc[modidx++] = mod_and_id; 687 688 if (mb.modtype & CGW_MOD_DLC) 689 mod->modfunc[modidx++] = mod_and_dlc; 690 691 if (mb.modtype & CGW_MOD_DATA) 692 mod->modfunc[modidx++] = mod_and_data; 693 } 694 695 if (tb[CGW_MOD_OR]) { 696 nla_memcpy(&mb, tb[CGW_MOD_OR], CGW_MODATTR_LEN); 697 698 canframecpy(&mod->modframe.or, &mb.cf); 699 mod->modtype.or = mb.modtype; 700 701 if (mb.modtype & CGW_MOD_ID) 702 mod->modfunc[modidx++] = mod_or_id; 703 704 if (mb.modtype & CGW_MOD_DLC) 705 mod->modfunc[modidx++] = mod_or_dlc; 706 707 if (mb.modtype & CGW_MOD_DATA) 708 mod->modfunc[modidx++] = mod_or_data; 709 } 710 711 if (tb[CGW_MOD_XOR]) { 712 nla_memcpy(&mb, tb[CGW_MOD_XOR], CGW_MODATTR_LEN); 713 714 canframecpy(&mod->modframe.xor, &mb.cf); 715 mod->modtype.xor = mb.modtype; 716 717 if (mb.modtype & CGW_MOD_ID) 718 mod->modfunc[modidx++] = mod_xor_id; 719 720 if (mb.modtype & CGW_MOD_DLC) 721 mod->modfunc[modidx++] = mod_xor_dlc; 722 723 if (mb.modtype & CGW_MOD_DATA) 724 mod->modfunc[modidx++] = mod_xor_data; 725 } 726 727 if (tb[CGW_MOD_SET]) { 728 nla_memcpy(&mb, tb[CGW_MOD_SET], CGW_MODATTR_LEN); 729 730 canframecpy(&mod->modframe.set, &mb.cf); 731 mod->modtype.set = mb.modtype; 732 733 if (mb.modtype & CGW_MOD_ID) 734 mod->modfunc[modidx++] = mod_set_id; 735 736 if (mb.modtype & CGW_MOD_DLC) 737 mod->modfunc[modidx++] = mod_set_dlc; 738 739 if (mb.modtype & CGW_MOD_DATA) 740 mod->modfunc[modidx++] = mod_set_data; 741 } 742 743 /* check for checksum operations after CAN frame modifications */ 744 if (modidx) { 745 746 if (tb[CGW_CS_CRC8]) { 747 struct cgw_csum_crc8 *c = nla_data(tb[CGW_CS_CRC8]); 748 749 err = cgw_chk_csum_parms(c->from_idx, c->to_idx, 750 c->result_idx); 751 if (err) 752 return err; 753 754 nla_memcpy(&mod->csum.crc8, tb[CGW_CS_CRC8], 755 CGW_CS_CRC8_LEN); 756 757 /* 758 * select dedicated processing function to reduce 759 * runtime operations in receive hot path. 760 */ 761 if (c->from_idx < 0 || c->to_idx < 0 || 762 c->result_idx < 0) 763 mod->csumfunc.crc8 = cgw_csum_crc8_rel; 764 else if (c->from_idx <= c->to_idx) 765 mod->csumfunc.crc8 = cgw_csum_crc8_pos; 766 else 767 mod->csumfunc.crc8 = cgw_csum_crc8_neg; 768 } 769 770 if (tb[CGW_CS_XOR]) { 771 struct cgw_csum_xor *c = nla_data(tb[CGW_CS_XOR]); 772 773 err = cgw_chk_csum_parms(c->from_idx, c->to_idx, 774 c->result_idx); 775 if (err) 776 return err; 777 778 nla_memcpy(&mod->csum.xor, tb[CGW_CS_XOR], 779 CGW_CS_XOR_LEN); 780 781 /* 782 * select dedicated processing function to reduce 783 * runtime operations in receive hot path. 784 */ 785 if (c->from_idx < 0 || c->to_idx < 0 || 786 c->result_idx < 0) 787 mod->csumfunc.xor = cgw_csum_xor_rel; 788 else if (c->from_idx <= c->to_idx) 789 mod->csumfunc.xor = cgw_csum_xor_pos; 790 else 791 mod->csumfunc.xor = cgw_csum_xor_neg; 792 } 793 794 if (tb[CGW_MOD_UID]) { 795 nla_memcpy(&mod->uid, tb[CGW_MOD_UID], sizeof(u32)); 796 } 797 } 798 799 if (gwtype == CGW_TYPE_CAN_CAN) { 800 801 /* check CGW_TYPE_CAN_CAN specific attributes */ 802 803 struct can_can_gw *ccgw = (struct can_can_gw *)gwtypeattr; 804 memset(ccgw, 0, sizeof(*ccgw)); 805 806 /* check for can_filter in attributes */ 807 if (tb[CGW_FILTER]) 808 nla_memcpy(&ccgw->filter, tb[CGW_FILTER], 809 sizeof(struct can_filter)); 810 811 err = -ENODEV; 812 813 /* specifying two interfaces is mandatory */ 814 if (!tb[CGW_SRC_IF] || !tb[CGW_DST_IF]) 815 return err; 816 817 ccgw->src_idx = nla_get_u32(tb[CGW_SRC_IF]); 818 ccgw->dst_idx = nla_get_u32(tb[CGW_DST_IF]); 819 820 /* both indices set to 0 for flushing all routing entries */ 821 if (!ccgw->src_idx && !ccgw->dst_idx) 822 return 0; 823 824 /* only one index set to 0 is an error */ 825 if (!ccgw->src_idx || !ccgw->dst_idx) 826 return err; 827 } 828 829 /* add the checks for other gwtypes here */ 830 831 return 0; 832 } 833 834 static int cgw_create_job(struct sk_buff *skb, struct nlmsghdr *nlh, 835 struct netlink_ext_ack *extack) 836 { 837 struct net *net = sock_net(skb->sk); 838 struct rtcanmsg *r; 839 struct cgw_job *gwj; 840 struct cf_mod mod; 841 struct can_can_gw ccgw; 842 u8 limhops = 0; 843 int err = 0; 844 845 if (!netlink_capable(skb, CAP_NET_ADMIN)) 846 return -EPERM; 847 848 if (nlmsg_len(nlh) < sizeof(*r)) 849 return -EINVAL; 850 851 r = nlmsg_data(nlh); 852 if (r->can_family != AF_CAN) 853 return -EPFNOSUPPORT; 854 855 /* so far we only support CAN -> CAN routings */ 856 if (r->gwtype != CGW_TYPE_CAN_CAN) 857 return -EINVAL; 858 859 err = cgw_parse_attr(nlh, &mod, CGW_TYPE_CAN_CAN, &ccgw, &limhops); 860 if (err < 0) 861 return err; 862 863 if (mod.uid) { 864 865 ASSERT_RTNL(); 866 867 /* check for updating an existing job with identical uid */ 868 hlist_for_each_entry(gwj, &net->can.cgw_list, list) { 869 870 if (gwj->mod.uid != mod.uid) 871 continue; 872 873 /* interfaces & filters must be identical */ 874 if (memcmp(&gwj->ccgw, &ccgw, sizeof(ccgw))) 875 return -EINVAL; 876 877 /* update modifications with disabled softirq & quit */ 878 local_bh_disable(); 879 memcpy(&gwj->mod, &mod, sizeof(mod)); 880 local_bh_enable(); 881 return 0; 882 } 883 } 884 885 /* ifindex == 0 is not allowed for job creation */ 886 if (!ccgw.src_idx || !ccgw.dst_idx) 887 return -ENODEV; 888 889 gwj = kmem_cache_alloc(cgw_cache, GFP_KERNEL); 890 if (!gwj) 891 return -ENOMEM; 892 893 gwj->handled_frames = 0; 894 gwj->dropped_frames = 0; 895 gwj->deleted_frames = 0; 896 gwj->flags = r->flags; 897 gwj->gwtype = r->gwtype; 898 gwj->limit_hops = limhops; 899 900 /* insert already parsed information */ 901 memcpy(&gwj->mod, &mod, sizeof(mod)); 902 memcpy(&gwj->ccgw, &ccgw, sizeof(ccgw)); 903 904 err = -ENODEV; 905 906 gwj->src.dev = __dev_get_by_index(net, gwj->ccgw.src_idx); 907 908 if (!gwj->src.dev) 909 goto out; 910 911 if (gwj->src.dev->type != ARPHRD_CAN) 912 goto out; 913 914 gwj->dst.dev = __dev_get_by_index(net, gwj->ccgw.dst_idx); 915 916 if (!gwj->dst.dev) 917 goto out; 918 919 if (gwj->dst.dev->type != ARPHRD_CAN) 920 goto out; 921 922 ASSERT_RTNL(); 923 924 err = cgw_register_filter(net, gwj); 925 if (!err) 926 hlist_add_head_rcu(&gwj->list, &net->can.cgw_list); 927 out: 928 if (err) 929 kmem_cache_free(cgw_cache, gwj); 930 931 return err; 932 } 933 934 static void cgw_remove_all_jobs(struct net *net) 935 { 936 struct cgw_job *gwj = NULL; 937 struct hlist_node *nx; 938 939 ASSERT_RTNL(); 940 941 hlist_for_each_entry_safe(gwj, nx, &net->can.cgw_list, list) { 942 hlist_del(&gwj->list); 943 cgw_unregister_filter(net, gwj); 944 kmem_cache_free(cgw_cache, gwj); 945 } 946 } 947 948 static int cgw_remove_job(struct sk_buff *skb, struct nlmsghdr *nlh, 949 struct netlink_ext_ack *extack) 950 { 951 struct net *net = sock_net(skb->sk); 952 struct cgw_job *gwj = NULL; 953 struct hlist_node *nx; 954 struct rtcanmsg *r; 955 struct cf_mod mod; 956 struct can_can_gw ccgw; 957 u8 limhops = 0; 958 int err = 0; 959 960 if (!netlink_capable(skb, CAP_NET_ADMIN)) 961 return -EPERM; 962 963 if (nlmsg_len(nlh) < sizeof(*r)) 964 return -EINVAL; 965 966 r = nlmsg_data(nlh); 967 if (r->can_family != AF_CAN) 968 return -EPFNOSUPPORT; 969 970 /* so far we only support CAN -> CAN routings */ 971 if (r->gwtype != CGW_TYPE_CAN_CAN) 972 return -EINVAL; 973 974 err = cgw_parse_attr(nlh, &mod, CGW_TYPE_CAN_CAN, &ccgw, &limhops); 975 if (err < 0) 976 return err; 977 978 /* two interface indices both set to 0 => remove all entries */ 979 if (!ccgw.src_idx && !ccgw.dst_idx) { 980 cgw_remove_all_jobs(net); 981 return 0; 982 } 983 984 err = -EINVAL; 985 986 ASSERT_RTNL(); 987 988 /* remove only the first matching entry */ 989 hlist_for_each_entry_safe(gwj, nx, &net->can.cgw_list, list) { 990 991 if (gwj->flags != r->flags) 992 continue; 993 994 if (gwj->limit_hops != limhops) 995 continue; 996 997 /* we have a match when uid is enabled and identical */ 998 if (gwj->mod.uid || mod.uid) { 999 if (gwj->mod.uid != mod.uid) 1000 continue; 1001 } else { 1002 /* no uid => check for identical modifications */ 1003 if (memcmp(&gwj->mod, &mod, sizeof(mod))) 1004 continue; 1005 } 1006 1007 /* if (r->gwtype == CGW_TYPE_CAN_CAN) - is made sure here */ 1008 if (memcmp(&gwj->ccgw, &ccgw, sizeof(ccgw))) 1009 continue; 1010 1011 hlist_del(&gwj->list); 1012 cgw_unregister_filter(net, gwj); 1013 kmem_cache_free(cgw_cache, gwj); 1014 err = 0; 1015 break; 1016 } 1017 1018 return err; 1019 } 1020 1021 static int __net_init cangw_pernet_init(struct net *net) 1022 { 1023 INIT_HLIST_HEAD(&net->can.cgw_list); 1024 return 0; 1025 } 1026 1027 static void __net_exit cangw_pernet_exit(struct net *net) 1028 { 1029 rtnl_lock(); 1030 cgw_remove_all_jobs(net); 1031 rtnl_unlock(); 1032 } 1033 1034 static struct pernet_operations cangw_pernet_ops = { 1035 .init = cangw_pernet_init, 1036 .exit = cangw_pernet_exit, 1037 }; 1038 1039 static __init int cgw_module_init(void) 1040 { 1041 int ret; 1042 1043 /* sanitize given module parameter */ 1044 max_hops = clamp_t(unsigned int, max_hops, CGW_MIN_HOPS, CGW_MAX_HOPS); 1045 1046 pr_info("can: netlink gateway (rev " CAN_GW_VERSION ") max_hops=%d\n", 1047 max_hops); 1048 1049 register_pernet_subsys(&cangw_pernet_ops); 1050 cgw_cache = kmem_cache_create("can_gw", sizeof(struct cgw_job), 1051 0, 0, NULL); 1052 1053 if (!cgw_cache) 1054 return -ENOMEM; 1055 1056 /* set notifier */ 1057 notifier.notifier_call = cgw_notifier; 1058 register_netdevice_notifier(¬ifier); 1059 1060 ret = rtnl_register_module(THIS_MODULE, PF_CAN, RTM_GETROUTE, 1061 NULL, cgw_dump_jobs, 0); 1062 if (ret) { 1063 unregister_netdevice_notifier(¬ifier); 1064 kmem_cache_destroy(cgw_cache); 1065 return -ENOBUFS; 1066 } 1067 1068 /* Only the first call to rtnl_register_module can fail */ 1069 rtnl_register_module(THIS_MODULE, PF_CAN, RTM_NEWROUTE, 1070 cgw_create_job, NULL, 0); 1071 rtnl_register_module(THIS_MODULE, PF_CAN, RTM_DELROUTE, 1072 cgw_remove_job, NULL, 0); 1073 1074 return 0; 1075 } 1076 1077 static __exit void cgw_module_exit(void) 1078 { 1079 rtnl_unregister_all(PF_CAN); 1080 1081 unregister_netdevice_notifier(¬ifier); 1082 1083 unregister_pernet_subsys(&cangw_pernet_ops); 1084 rcu_barrier(); /* Wait for completion of call_rcu()'s */ 1085 1086 kmem_cache_destroy(cgw_cache); 1087 } 1088 1089 module_init(cgw_module_init); 1090 module_exit(cgw_module_exit); 1091