1 // SPDX-License-Identifier: GPL-2.0 2 // Copyright (c) 2010-2011 EIA Electronics, 3 // Kurt Van Dijck <kurt.van.dijck@eia.be> 4 // Copyright (c) 2018 Protonic, 5 // Robin van der Gracht <robin@protonic.nl> 6 // Copyright (c) 2017-2019 Pengutronix, 7 // Marc Kleine-Budde <kernel@pengutronix.de> 8 // Copyright (c) 2017-2019 Pengutronix, 9 // Oleksij Rempel <kernel@pengutronix.de> 10 11 #include <linux/can/skb.h> 12 13 #include "j1939-priv.h" 14 15 #define J1939_XTP_TX_RETRY_LIMIT 100 16 17 #define J1939_ETP_PGN_CTL 0xc800 18 #define J1939_ETP_PGN_DAT 0xc700 19 #define J1939_TP_PGN_CTL 0xec00 20 #define J1939_TP_PGN_DAT 0xeb00 21 22 #define J1939_TP_CMD_RTS 0x10 23 #define J1939_TP_CMD_CTS 0x11 24 #define J1939_TP_CMD_EOMA 0x13 25 #define J1939_TP_CMD_BAM 0x20 26 #define J1939_TP_CMD_ABORT 0xff 27 28 #define J1939_ETP_CMD_RTS 0x14 29 #define J1939_ETP_CMD_CTS 0x15 30 #define J1939_ETP_CMD_DPO 0x16 31 #define J1939_ETP_CMD_EOMA 0x17 32 #define J1939_ETP_CMD_ABORT 0xff 33 34 enum j1939_xtp_abort { 35 J1939_XTP_NO_ABORT = 0, 36 J1939_XTP_ABORT_BUSY = 1, 37 /* Already in one or more connection managed sessions and 38 * cannot support another. 39 * 40 * EALREADY: 41 * Operation already in progress 42 */ 43 44 J1939_XTP_ABORT_RESOURCE = 2, 45 /* System resources were needed for another task so this 46 * connection managed session was terminated. 47 * 48 * EMSGSIZE: 49 * The socket type requires that message be sent atomically, 50 * and the size of the message to be sent made this 51 * impossible. 52 */ 53 54 J1939_XTP_ABORT_TIMEOUT = 3, 55 /* A timeout occurred and this is the connection abort to 56 * close the session. 57 * 58 * EHOSTUNREACH: 59 * The destination host cannot be reached (probably because 60 * the host is down or a remote router cannot reach it). 61 */ 62 63 J1939_XTP_ABORT_GENERIC = 4, 64 /* CTS messages received when data transfer is in progress 65 * 66 * EBADMSG: 67 * Not a data message 68 */ 69 70 J1939_XTP_ABORT_FAULT = 5, 71 /* Maximal retransmit request limit reached 72 * 73 * ENOTRECOVERABLE: 74 * State not recoverable 75 */ 76 77 J1939_XTP_ABORT_UNEXPECTED_DATA = 6, 78 /* Unexpected data transfer packet 79 * 80 * ENOTCONN: 81 * Transport endpoint is not connected 82 */ 83 84 J1939_XTP_ABORT_BAD_SEQ = 7, 85 /* Bad sequence number (and software is not able to recover) 86 * 87 * EILSEQ: 88 * Illegal byte sequence 89 */ 90 91 J1939_XTP_ABORT_DUP_SEQ = 8, 92 /* Duplicate sequence number (and software is not able to 93 * recover) 94 */ 95 96 J1939_XTP_ABORT_EDPO_UNEXPECTED = 9, 97 /* Unexpected EDPO packet (ETP) or Message size > 1785 bytes 98 * (TP) 99 */ 100 101 J1939_XTP_ABORT_BAD_EDPO_PGN = 10, 102 /* Unexpected EDPO PGN (PGN in EDPO is bad) */ 103 104 J1939_XTP_ABORT_EDPO_OUTOF_CTS = 11, 105 /* EDPO number of packets is greater than CTS */ 106 107 J1939_XTP_ABORT_BAD_EDPO_OFFSET = 12, 108 /* Bad EDPO offset */ 109 110 J1939_XTP_ABORT_OTHER_DEPRECATED = 13, 111 /* Deprecated. Use 250 instead (Any other reason) */ 112 113 J1939_XTP_ABORT_ECTS_UNXPECTED_PGN = 14, 114 /* Unexpected ECTS PGN (PGN in ECTS is bad) */ 115 116 J1939_XTP_ABORT_ECTS_TOO_BIG = 15, 117 /* ECTS requested packets exceeds message size */ 118 119 J1939_XTP_ABORT_OTHER = 250, 120 /* Any other reason (if a Connection Abort reason is 121 * identified that is not listed in the table use code 250) 122 */ 123 }; 124 125 static unsigned int j1939_tp_block = 255; 126 static unsigned int j1939_tp_packet_delay; 127 static unsigned int j1939_tp_padding = 1; 128 129 /* helpers */ 130 static const char *j1939_xtp_abort_to_str(enum j1939_xtp_abort abort) 131 { 132 switch (abort) { 133 case J1939_XTP_ABORT_BUSY: 134 return "Already in one or more connection managed sessions and cannot support another."; 135 case J1939_XTP_ABORT_RESOURCE: 136 return "System resources were needed for another task so this connection managed session was terminated."; 137 case J1939_XTP_ABORT_TIMEOUT: 138 return "A timeout occurred and this is the connection abort to close the session."; 139 case J1939_XTP_ABORT_GENERIC: 140 return "CTS messages received when data transfer is in progress"; 141 case J1939_XTP_ABORT_FAULT: 142 return "Maximal retransmit request limit reached"; 143 case J1939_XTP_ABORT_UNEXPECTED_DATA: 144 return "Unexpected data transfer packet"; 145 case J1939_XTP_ABORT_BAD_SEQ: 146 return "Bad sequence number (and software is not able to recover)"; 147 case J1939_XTP_ABORT_DUP_SEQ: 148 return "Duplicate sequence number (and software is not able to recover)"; 149 case J1939_XTP_ABORT_EDPO_UNEXPECTED: 150 return "Unexpected EDPO packet (ETP) or Message size > 1785 bytes (TP)"; 151 case J1939_XTP_ABORT_BAD_EDPO_PGN: 152 return "Unexpected EDPO PGN (PGN in EDPO is bad)"; 153 case J1939_XTP_ABORT_EDPO_OUTOF_CTS: 154 return "EDPO number of packets is greater than CTS"; 155 case J1939_XTP_ABORT_BAD_EDPO_OFFSET: 156 return "Bad EDPO offset"; 157 case J1939_XTP_ABORT_OTHER_DEPRECATED: 158 return "Deprecated. Use 250 instead (Any other reason)"; 159 case J1939_XTP_ABORT_ECTS_UNXPECTED_PGN: 160 return "Unexpected ECTS PGN (PGN in ECTS is bad)"; 161 case J1939_XTP_ABORT_ECTS_TOO_BIG: 162 return "ECTS requested packets exceeds message size"; 163 case J1939_XTP_ABORT_OTHER: 164 return "Any other reason (if a Connection Abort reason is identified that is not listed in the table use code 250)"; 165 default: 166 return "<unknown>"; 167 } 168 } 169 170 static int j1939_xtp_abort_to_errno(struct j1939_priv *priv, 171 enum j1939_xtp_abort abort) 172 { 173 int err; 174 175 switch (abort) { 176 case J1939_XTP_NO_ABORT: 177 WARN_ON_ONCE(abort == J1939_XTP_NO_ABORT); 178 err = 0; 179 break; 180 case J1939_XTP_ABORT_BUSY: 181 err = EALREADY; 182 break; 183 case J1939_XTP_ABORT_RESOURCE: 184 err = EMSGSIZE; 185 break; 186 case J1939_XTP_ABORT_TIMEOUT: 187 err = EHOSTUNREACH; 188 break; 189 case J1939_XTP_ABORT_GENERIC: 190 err = EBADMSG; 191 break; 192 case J1939_XTP_ABORT_FAULT: 193 err = ENOTRECOVERABLE; 194 break; 195 case J1939_XTP_ABORT_UNEXPECTED_DATA: 196 err = ENOTCONN; 197 break; 198 case J1939_XTP_ABORT_BAD_SEQ: 199 err = EILSEQ; 200 break; 201 case J1939_XTP_ABORT_DUP_SEQ: 202 err = EPROTO; 203 break; 204 case J1939_XTP_ABORT_EDPO_UNEXPECTED: 205 err = EPROTO; 206 break; 207 case J1939_XTP_ABORT_BAD_EDPO_PGN: 208 err = EPROTO; 209 break; 210 case J1939_XTP_ABORT_EDPO_OUTOF_CTS: 211 err = EPROTO; 212 break; 213 case J1939_XTP_ABORT_BAD_EDPO_OFFSET: 214 err = EPROTO; 215 break; 216 case J1939_XTP_ABORT_OTHER_DEPRECATED: 217 err = EPROTO; 218 break; 219 case J1939_XTP_ABORT_ECTS_UNXPECTED_PGN: 220 err = EPROTO; 221 break; 222 case J1939_XTP_ABORT_ECTS_TOO_BIG: 223 err = EPROTO; 224 break; 225 case J1939_XTP_ABORT_OTHER: 226 err = EPROTO; 227 break; 228 default: 229 netdev_warn(priv->ndev, "Unknown abort code %i", abort); 230 err = EPROTO; 231 } 232 233 return err; 234 } 235 236 static inline void j1939_session_list_lock(struct j1939_priv *priv) 237 { 238 spin_lock_bh(&priv->active_session_list_lock); 239 } 240 241 static inline void j1939_session_list_unlock(struct j1939_priv *priv) 242 { 243 spin_unlock_bh(&priv->active_session_list_lock); 244 } 245 246 void j1939_session_get(struct j1939_session *session) 247 { 248 kref_get(&session->kref); 249 } 250 251 /* session completion functions */ 252 static void __j1939_session_drop(struct j1939_session *session) 253 { 254 if (!session->transmission) 255 return; 256 257 j1939_sock_pending_del(session->sk); 258 sock_put(session->sk); 259 } 260 261 static void j1939_session_destroy(struct j1939_session *session) 262 { 263 struct sk_buff *skb; 264 265 if (session->transmission) { 266 if (session->err) 267 j1939_sk_errqueue(session, J1939_ERRQUEUE_TX_ABORT); 268 else 269 j1939_sk_errqueue(session, J1939_ERRQUEUE_TX_ACK); 270 } else if (session->err) { 271 j1939_sk_errqueue(session, J1939_ERRQUEUE_RX_ABORT); 272 } 273 274 netdev_dbg(session->priv->ndev, "%s: 0x%p\n", __func__, session); 275 276 WARN_ON_ONCE(!list_empty(&session->sk_session_queue_entry)); 277 WARN_ON_ONCE(!list_empty(&session->active_session_list_entry)); 278 279 while ((skb = skb_dequeue(&session->skb_queue)) != NULL) { 280 /* drop ref taken in j1939_session_skb_queue() */ 281 skb_unref(skb); 282 kfree_skb(skb); 283 } 284 __j1939_session_drop(session); 285 j1939_priv_put(session->priv); 286 kfree(session); 287 } 288 289 static void __j1939_session_release(struct kref *kref) 290 { 291 struct j1939_session *session = container_of(kref, struct j1939_session, 292 kref); 293 294 j1939_session_destroy(session); 295 } 296 297 void j1939_session_put(struct j1939_session *session) 298 { 299 kref_put(&session->kref, __j1939_session_release); 300 } 301 302 static void j1939_session_txtimer_cancel(struct j1939_session *session) 303 { 304 if (hrtimer_cancel(&session->txtimer)) 305 j1939_session_put(session); 306 } 307 308 static void j1939_session_rxtimer_cancel(struct j1939_session *session) 309 { 310 if (hrtimer_cancel(&session->rxtimer)) 311 j1939_session_put(session); 312 } 313 314 void j1939_session_timers_cancel(struct j1939_session *session) 315 { 316 j1939_session_txtimer_cancel(session); 317 j1939_session_rxtimer_cancel(session); 318 } 319 320 static inline bool j1939_cb_is_broadcast(const struct j1939_sk_buff_cb *skcb) 321 { 322 return (!skcb->addr.dst_name && (skcb->addr.da == 0xff)); 323 } 324 325 static void j1939_session_skb_drop_old(struct j1939_session *session) 326 { 327 struct sk_buff *do_skb; 328 struct j1939_sk_buff_cb *do_skcb; 329 unsigned int offset_start; 330 unsigned long flags; 331 332 if (skb_queue_len(&session->skb_queue) < 2) 333 return; 334 335 offset_start = session->pkt.tx_acked * 7; 336 337 spin_lock_irqsave(&session->skb_queue.lock, flags); 338 do_skb = skb_peek(&session->skb_queue); 339 do_skcb = j1939_skb_to_cb(do_skb); 340 341 if ((do_skcb->offset + do_skb->len) < offset_start) { 342 __skb_unlink(do_skb, &session->skb_queue); 343 /* drop ref taken in j1939_session_skb_queue() */ 344 skb_unref(do_skb); 345 spin_unlock_irqrestore(&session->skb_queue.lock, flags); 346 347 kfree_skb(do_skb); 348 } else { 349 spin_unlock_irqrestore(&session->skb_queue.lock, flags); 350 } 351 } 352 353 void j1939_session_skb_queue(struct j1939_session *session, 354 struct sk_buff *skb) 355 { 356 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb); 357 struct j1939_priv *priv = session->priv; 358 359 j1939_ac_fixup(priv, skb); 360 361 if (j1939_address_is_unicast(skcb->addr.da) && 362 priv->ents[skcb->addr.da].nusers) 363 skcb->flags |= J1939_ECU_LOCAL_DST; 364 365 skcb->flags |= J1939_ECU_LOCAL_SRC; 366 367 skb_get(skb); 368 skb_queue_tail(&session->skb_queue, skb); 369 } 370 371 static struct 372 sk_buff *j1939_session_skb_get_by_offset(struct j1939_session *session, 373 unsigned int offset_start) 374 { 375 struct j1939_priv *priv = session->priv; 376 struct j1939_sk_buff_cb *do_skcb; 377 struct sk_buff *skb = NULL; 378 struct sk_buff *do_skb; 379 unsigned long flags; 380 381 spin_lock_irqsave(&session->skb_queue.lock, flags); 382 skb_queue_walk(&session->skb_queue, do_skb) { 383 do_skcb = j1939_skb_to_cb(do_skb); 384 385 if (offset_start >= do_skcb->offset && 386 offset_start < (do_skcb->offset + do_skb->len)) { 387 skb = do_skb; 388 } 389 } 390 391 if (skb) 392 skb_get(skb); 393 394 spin_unlock_irqrestore(&session->skb_queue.lock, flags); 395 396 if (!skb) 397 netdev_dbg(priv->ndev, "%s: 0x%p: no skb found for start: %i, queue size: %i\n", 398 __func__, session, offset_start, 399 skb_queue_len(&session->skb_queue)); 400 401 return skb; 402 } 403 404 static struct sk_buff *j1939_session_skb_get(struct j1939_session *session) 405 { 406 unsigned int offset_start; 407 408 offset_start = session->pkt.dpo * 7; 409 return j1939_session_skb_get_by_offset(session, offset_start); 410 } 411 412 /* see if we are receiver 413 * returns 0 for broadcasts, although we will receive them 414 */ 415 static inline int j1939_tp_im_receiver(const struct j1939_sk_buff_cb *skcb) 416 { 417 return skcb->flags & J1939_ECU_LOCAL_DST; 418 } 419 420 /* see if we are sender */ 421 static inline int j1939_tp_im_transmitter(const struct j1939_sk_buff_cb *skcb) 422 { 423 return skcb->flags & J1939_ECU_LOCAL_SRC; 424 } 425 426 /* see if we are involved as either receiver or transmitter */ 427 static int j1939_tp_im_involved(const struct j1939_sk_buff_cb *skcb, bool swap) 428 { 429 if (swap) 430 return j1939_tp_im_receiver(skcb); 431 else 432 return j1939_tp_im_transmitter(skcb); 433 } 434 435 static int j1939_tp_im_involved_anydir(struct j1939_sk_buff_cb *skcb) 436 { 437 return skcb->flags & (J1939_ECU_LOCAL_SRC | J1939_ECU_LOCAL_DST); 438 } 439 440 /* extract pgn from flow-ctl message */ 441 static inline pgn_t j1939_xtp_ctl_to_pgn(const u8 *dat) 442 { 443 pgn_t pgn; 444 445 pgn = (dat[7] << 16) | (dat[6] << 8) | (dat[5] << 0); 446 if (j1939_pgn_is_pdu1(pgn)) 447 pgn &= 0xffff00; 448 return pgn; 449 } 450 451 static inline unsigned int j1939_tp_ctl_to_size(const u8 *dat) 452 { 453 return (dat[2] << 8) + (dat[1] << 0); 454 } 455 456 static inline unsigned int j1939_etp_ctl_to_packet(const u8 *dat) 457 { 458 return (dat[4] << 16) | (dat[3] << 8) | (dat[2] << 0); 459 } 460 461 static inline unsigned int j1939_etp_ctl_to_size(const u8 *dat) 462 { 463 return (dat[4] << 24) | (dat[3] << 16) | 464 (dat[2] << 8) | (dat[1] << 0); 465 } 466 467 /* find existing session: 468 * reverse: swap cb's src & dst 469 * there is no problem with matching broadcasts, since 470 * broadcasts (no dst, no da) would never call this 471 * with reverse == true 472 */ 473 static bool j1939_session_match(struct j1939_addr *se_addr, 474 struct j1939_addr *sk_addr, bool reverse) 475 { 476 if (se_addr->type != sk_addr->type) 477 return false; 478 479 if (reverse) { 480 if (se_addr->src_name) { 481 if (se_addr->src_name != sk_addr->dst_name) 482 return false; 483 } else if (se_addr->sa != sk_addr->da) { 484 return false; 485 } 486 487 if (se_addr->dst_name) { 488 if (se_addr->dst_name != sk_addr->src_name) 489 return false; 490 } else if (se_addr->da != sk_addr->sa) { 491 return false; 492 } 493 } else { 494 if (se_addr->src_name) { 495 if (se_addr->src_name != sk_addr->src_name) 496 return false; 497 } else if (se_addr->sa != sk_addr->sa) { 498 return false; 499 } 500 501 if (se_addr->dst_name) { 502 if (se_addr->dst_name != sk_addr->dst_name) 503 return false; 504 } else if (se_addr->da != sk_addr->da) { 505 return false; 506 } 507 } 508 509 return true; 510 } 511 512 static struct 513 j1939_session *j1939_session_get_by_addr_locked(struct j1939_priv *priv, 514 struct list_head *root, 515 struct j1939_addr *addr, 516 bool reverse, bool transmitter) 517 { 518 struct j1939_session *session; 519 520 lockdep_assert_held(&priv->active_session_list_lock); 521 522 list_for_each_entry(session, root, active_session_list_entry) { 523 j1939_session_get(session); 524 if (j1939_session_match(&session->skcb.addr, addr, reverse) && 525 session->transmission == transmitter) 526 return session; 527 j1939_session_put(session); 528 } 529 530 return NULL; 531 } 532 533 static struct 534 j1939_session *j1939_session_get_simple(struct j1939_priv *priv, 535 struct sk_buff *skb) 536 { 537 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb); 538 struct j1939_session *session; 539 540 lockdep_assert_held(&priv->active_session_list_lock); 541 542 list_for_each_entry(session, &priv->active_session_list, 543 active_session_list_entry) { 544 j1939_session_get(session); 545 if (session->skcb.addr.type == J1939_SIMPLE && 546 session->tskey == skcb->tskey && session->sk == skb->sk) 547 return session; 548 j1939_session_put(session); 549 } 550 551 return NULL; 552 } 553 554 static struct 555 j1939_session *j1939_session_get_by_addr(struct j1939_priv *priv, 556 struct j1939_addr *addr, 557 bool reverse, bool transmitter) 558 { 559 struct j1939_session *session; 560 561 j1939_session_list_lock(priv); 562 session = j1939_session_get_by_addr_locked(priv, 563 &priv->active_session_list, 564 addr, reverse, transmitter); 565 j1939_session_list_unlock(priv); 566 567 return session; 568 } 569 570 static void j1939_skbcb_swap(struct j1939_sk_buff_cb *skcb) 571 { 572 u8 tmp = 0; 573 574 swap(skcb->addr.dst_name, skcb->addr.src_name); 575 swap(skcb->addr.da, skcb->addr.sa); 576 577 /* swap SRC and DST flags, leave other untouched */ 578 if (skcb->flags & J1939_ECU_LOCAL_SRC) 579 tmp |= J1939_ECU_LOCAL_DST; 580 if (skcb->flags & J1939_ECU_LOCAL_DST) 581 tmp |= J1939_ECU_LOCAL_SRC; 582 skcb->flags &= ~(J1939_ECU_LOCAL_SRC | J1939_ECU_LOCAL_DST); 583 skcb->flags |= tmp; 584 } 585 586 static struct 587 sk_buff *j1939_tp_tx_dat_new(struct j1939_priv *priv, 588 const struct j1939_sk_buff_cb *re_skcb, 589 bool ctl, 590 bool swap_src_dst) 591 { 592 struct sk_buff *skb; 593 struct j1939_sk_buff_cb *skcb; 594 595 skb = alloc_skb(sizeof(struct can_frame) + sizeof(struct can_skb_priv), 596 GFP_ATOMIC); 597 if (unlikely(!skb)) 598 return ERR_PTR(-ENOMEM); 599 600 skb->dev = priv->ndev; 601 can_skb_reserve(skb); 602 can_skb_prv(skb)->ifindex = priv->ndev->ifindex; 603 can_skb_prv(skb)->skbcnt = 0; 604 /* reserve CAN header */ 605 skb_reserve(skb, offsetof(struct can_frame, data)); 606 607 /* skb->cb must be large enough to hold a j1939_sk_buff_cb structure */ 608 BUILD_BUG_ON(sizeof(skb->cb) < sizeof(*re_skcb)); 609 610 memcpy(skb->cb, re_skcb, sizeof(*re_skcb)); 611 skcb = j1939_skb_to_cb(skb); 612 if (swap_src_dst) 613 j1939_skbcb_swap(skcb); 614 615 if (ctl) { 616 if (skcb->addr.type == J1939_ETP) 617 skcb->addr.pgn = J1939_ETP_PGN_CTL; 618 else 619 skcb->addr.pgn = J1939_TP_PGN_CTL; 620 } else { 621 if (skcb->addr.type == J1939_ETP) 622 skcb->addr.pgn = J1939_ETP_PGN_DAT; 623 else 624 skcb->addr.pgn = J1939_TP_PGN_DAT; 625 } 626 627 return skb; 628 } 629 630 /* TP transmit packet functions */ 631 static int j1939_tp_tx_dat(struct j1939_session *session, 632 const u8 *dat, int len) 633 { 634 struct j1939_priv *priv = session->priv; 635 struct sk_buff *skb; 636 637 skb = j1939_tp_tx_dat_new(priv, &session->skcb, 638 false, false); 639 if (IS_ERR(skb)) 640 return PTR_ERR(skb); 641 642 skb_put_data(skb, dat, len); 643 if (j1939_tp_padding && len < 8) 644 memset(skb_put(skb, 8 - len), 0xff, 8 - len); 645 646 return j1939_send_one(priv, skb); 647 } 648 649 static int j1939_xtp_do_tx_ctl(struct j1939_priv *priv, 650 const struct j1939_sk_buff_cb *re_skcb, 651 bool swap_src_dst, pgn_t pgn, const u8 *dat) 652 { 653 struct sk_buff *skb; 654 u8 *skdat; 655 656 if (!j1939_tp_im_involved(re_skcb, swap_src_dst)) 657 return 0; 658 659 skb = j1939_tp_tx_dat_new(priv, re_skcb, true, swap_src_dst); 660 if (IS_ERR(skb)) 661 return PTR_ERR(skb); 662 663 skdat = skb_put(skb, 8); 664 memcpy(skdat, dat, 5); 665 skdat[5] = (pgn >> 0); 666 skdat[6] = (pgn >> 8); 667 skdat[7] = (pgn >> 16); 668 669 return j1939_send_one(priv, skb); 670 } 671 672 static inline int j1939_tp_tx_ctl(struct j1939_session *session, 673 bool swap_src_dst, const u8 *dat) 674 { 675 struct j1939_priv *priv = session->priv; 676 677 return j1939_xtp_do_tx_ctl(priv, &session->skcb, 678 swap_src_dst, 679 session->skcb.addr.pgn, dat); 680 } 681 682 static int j1939_xtp_tx_abort(struct j1939_priv *priv, 683 const struct j1939_sk_buff_cb *re_skcb, 684 bool swap_src_dst, 685 enum j1939_xtp_abort err, 686 pgn_t pgn) 687 { 688 u8 dat[5]; 689 690 if (!j1939_tp_im_involved(re_skcb, swap_src_dst)) 691 return 0; 692 693 memset(dat, 0xff, sizeof(dat)); 694 dat[0] = J1939_TP_CMD_ABORT; 695 dat[1] = err; 696 return j1939_xtp_do_tx_ctl(priv, re_skcb, swap_src_dst, pgn, dat); 697 } 698 699 void j1939_tp_schedule_txtimer(struct j1939_session *session, int msec) 700 { 701 j1939_session_get(session); 702 hrtimer_start(&session->txtimer, ms_to_ktime(msec), 703 HRTIMER_MODE_REL_SOFT); 704 } 705 706 static inline void j1939_tp_set_rxtimeout(struct j1939_session *session, 707 int msec) 708 { 709 j1939_session_rxtimer_cancel(session); 710 j1939_session_get(session); 711 hrtimer_start(&session->rxtimer, ms_to_ktime(msec), 712 HRTIMER_MODE_REL_SOFT); 713 } 714 715 static int j1939_session_tx_rts(struct j1939_session *session) 716 { 717 u8 dat[8]; 718 int ret; 719 720 memset(dat, 0xff, sizeof(dat)); 721 722 dat[1] = (session->total_message_size >> 0); 723 dat[2] = (session->total_message_size >> 8); 724 dat[3] = session->pkt.total; 725 726 if (session->skcb.addr.type == J1939_ETP) { 727 dat[0] = J1939_ETP_CMD_RTS; 728 dat[1] = (session->total_message_size >> 0); 729 dat[2] = (session->total_message_size >> 8); 730 dat[3] = (session->total_message_size >> 16); 731 dat[4] = (session->total_message_size >> 24); 732 } else if (j1939_cb_is_broadcast(&session->skcb)) { 733 dat[0] = J1939_TP_CMD_BAM; 734 /* fake cts for broadcast */ 735 session->pkt.tx = 0; 736 } else { 737 dat[0] = J1939_TP_CMD_RTS; 738 dat[4] = dat[3]; 739 } 740 741 if (dat[0] == session->last_txcmd) 742 /* done already */ 743 return 0; 744 745 ret = j1939_tp_tx_ctl(session, false, dat); 746 if (ret < 0) 747 return ret; 748 749 session->last_txcmd = dat[0]; 750 if (dat[0] == J1939_TP_CMD_BAM) { 751 j1939_tp_schedule_txtimer(session, 50); 752 j1939_tp_set_rxtimeout(session, 250); 753 } else { 754 j1939_tp_set_rxtimeout(session, 1250); 755 } 756 757 netdev_dbg(session->priv->ndev, "%s: 0x%p\n", __func__, session); 758 759 return 0; 760 } 761 762 static int j1939_session_tx_dpo(struct j1939_session *session) 763 { 764 unsigned int pkt; 765 u8 dat[8]; 766 int ret; 767 768 memset(dat, 0xff, sizeof(dat)); 769 770 dat[0] = J1939_ETP_CMD_DPO; 771 session->pkt.dpo = session->pkt.tx_acked; 772 pkt = session->pkt.dpo; 773 dat[1] = session->pkt.last - session->pkt.tx_acked; 774 dat[2] = (pkt >> 0); 775 dat[3] = (pkt >> 8); 776 dat[4] = (pkt >> 16); 777 778 ret = j1939_tp_tx_ctl(session, false, dat); 779 if (ret < 0) 780 return ret; 781 782 session->last_txcmd = dat[0]; 783 j1939_tp_set_rxtimeout(session, 1250); 784 session->pkt.tx = session->pkt.tx_acked; 785 786 netdev_dbg(session->priv->ndev, "%s: 0x%p\n", __func__, session); 787 788 return 0; 789 } 790 791 static int j1939_session_tx_dat(struct j1939_session *session) 792 { 793 struct j1939_priv *priv = session->priv; 794 struct j1939_sk_buff_cb *se_skcb; 795 int offset, pkt_done, pkt_end; 796 unsigned int len, pdelay; 797 struct sk_buff *se_skb; 798 const u8 *tpdat; 799 int ret = 0; 800 u8 dat[8]; 801 802 se_skb = j1939_session_skb_get_by_offset(session, session->pkt.tx * 7); 803 if (!se_skb) 804 return -ENOBUFS; 805 806 se_skcb = j1939_skb_to_cb(se_skb); 807 tpdat = se_skb->data; 808 ret = 0; 809 pkt_done = 0; 810 if (session->skcb.addr.type != J1939_ETP && 811 j1939_cb_is_broadcast(&session->skcb)) 812 pkt_end = session->pkt.total; 813 else 814 pkt_end = session->pkt.last; 815 816 while (session->pkt.tx < pkt_end) { 817 dat[0] = session->pkt.tx - session->pkt.dpo + 1; 818 offset = (session->pkt.tx * 7) - se_skcb->offset; 819 len = se_skb->len - offset; 820 if (len > 7) 821 len = 7; 822 823 if (offset + len > se_skb->len) { 824 netdev_err_once(priv->ndev, 825 "%s: 0x%p: requested data outside of queued buffer: offset %i, len %i, pkt.tx: %i\n", 826 __func__, session, se_skcb->offset, 827 se_skb->len , session->pkt.tx); 828 ret = -EOVERFLOW; 829 goto out_free; 830 } 831 832 if (!len) { 833 ret = -ENOBUFS; 834 break; 835 } 836 837 memcpy(&dat[1], &tpdat[offset], len); 838 ret = j1939_tp_tx_dat(session, dat, len + 1); 839 if (ret < 0) { 840 /* ENOBUFS == CAN interface TX queue is full */ 841 if (ret != -ENOBUFS) 842 netdev_alert(priv->ndev, 843 "%s: 0x%p: queue data error: %i\n", 844 __func__, session, ret); 845 break; 846 } 847 848 session->last_txcmd = 0xff; 849 pkt_done++; 850 session->pkt.tx++; 851 pdelay = j1939_cb_is_broadcast(&session->skcb) ? 50 : 852 j1939_tp_packet_delay; 853 854 if (session->pkt.tx < session->pkt.total && pdelay) { 855 j1939_tp_schedule_txtimer(session, pdelay); 856 break; 857 } 858 } 859 860 if (pkt_done) 861 j1939_tp_set_rxtimeout(session, 250); 862 863 out_free: 864 if (ret) 865 kfree_skb(se_skb); 866 else 867 consume_skb(se_skb); 868 869 return ret; 870 } 871 872 static int j1939_xtp_txnext_transmiter(struct j1939_session *session) 873 { 874 struct j1939_priv *priv = session->priv; 875 int ret = 0; 876 877 if (!j1939_tp_im_transmitter(&session->skcb)) { 878 netdev_alert(priv->ndev, "%s: 0x%p: called by not transmitter!\n", 879 __func__, session); 880 return -EINVAL; 881 } 882 883 switch (session->last_cmd) { 884 case 0: 885 ret = j1939_session_tx_rts(session); 886 break; 887 888 case J1939_ETP_CMD_CTS: 889 if (session->last_txcmd != J1939_ETP_CMD_DPO) { 890 ret = j1939_session_tx_dpo(session); 891 if (ret) 892 return ret; 893 } 894 895 fallthrough; 896 case J1939_TP_CMD_CTS: 897 case 0xff: /* did some data */ 898 case J1939_ETP_CMD_DPO: 899 case J1939_TP_CMD_BAM: 900 ret = j1939_session_tx_dat(session); 901 902 break; 903 default: 904 netdev_alert(priv->ndev, "%s: 0x%p: unexpected last_cmd: %x\n", 905 __func__, session, session->last_cmd); 906 } 907 908 return ret; 909 } 910 911 static int j1939_session_tx_cts(struct j1939_session *session) 912 { 913 struct j1939_priv *priv = session->priv; 914 unsigned int pkt, len; 915 int ret; 916 u8 dat[8]; 917 918 if (!j1939_sk_recv_match(priv, &session->skcb)) 919 return -ENOENT; 920 921 len = session->pkt.total - session->pkt.rx; 922 len = min3(len, session->pkt.block, j1939_tp_block ?: 255); 923 memset(dat, 0xff, sizeof(dat)); 924 925 if (session->skcb.addr.type == J1939_ETP) { 926 pkt = session->pkt.rx + 1; 927 dat[0] = J1939_ETP_CMD_CTS; 928 dat[1] = len; 929 dat[2] = (pkt >> 0); 930 dat[3] = (pkt >> 8); 931 dat[4] = (pkt >> 16); 932 } else { 933 dat[0] = J1939_TP_CMD_CTS; 934 dat[1] = len; 935 dat[2] = session->pkt.rx + 1; 936 } 937 938 if (dat[0] == session->last_txcmd) 939 /* done already */ 940 return 0; 941 942 ret = j1939_tp_tx_ctl(session, true, dat); 943 if (ret < 0) 944 return ret; 945 946 if (len) 947 /* only mark cts done when len is set */ 948 session->last_txcmd = dat[0]; 949 j1939_tp_set_rxtimeout(session, 1250); 950 951 netdev_dbg(session->priv->ndev, "%s: 0x%p\n", __func__, session); 952 953 return 0; 954 } 955 956 static int j1939_session_tx_eoma(struct j1939_session *session) 957 { 958 struct j1939_priv *priv = session->priv; 959 u8 dat[8]; 960 int ret; 961 962 if (!j1939_sk_recv_match(priv, &session->skcb)) 963 return -ENOENT; 964 965 memset(dat, 0xff, sizeof(dat)); 966 967 if (session->skcb.addr.type == J1939_ETP) { 968 dat[0] = J1939_ETP_CMD_EOMA; 969 dat[1] = session->total_message_size >> 0; 970 dat[2] = session->total_message_size >> 8; 971 dat[3] = session->total_message_size >> 16; 972 dat[4] = session->total_message_size >> 24; 973 } else { 974 dat[0] = J1939_TP_CMD_EOMA; 975 dat[1] = session->total_message_size; 976 dat[2] = session->total_message_size >> 8; 977 dat[3] = session->pkt.total; 978 } 979 980 if (dat[0] == session->last_txcmd) 981 /* done already */ 982 return 0; 983 984 ret = j1939_tp_tx_ctl(session, true, dat); 985 if (ret < 0) 986 return ret; 987 988 session->last_txcmd = dat[0]; 989 990 /* wait for the EOMA packet to come in */ 991 j1939_tp_set_rxtimeout(session, 1250); 992 993 netdev_dbg(session->priv->ndev, "%s: 0x%p\n", __func__, session); 994 995 return 0; 996 } 997 998 static int j1939_xtp_txnext_receiver(struct j1939_session *session) 999 { 1000 struct j1939_priv *priv = session->priv; 1001 int ret = 0; 1002 1003 if (!j1939_tp_im_receiver(&session->skcb)) { 1004 netdev_alert(priv->ndev, "%s: 0x%p: called by not receiver!\n", 1005 __func__, session); 1006 return -EINVAL; 1007 } 1008 1009 switch (session->last_cmd) { 1010 case J1939_TP_CMD_RTS: 1011 case J1939_ETP_CMD_RTS: 1012 ret = j1939_session_tx_cts(session); 1013 break; 1014 1015 case J1939_ETP_CMD_CTS: 1016 case J1939_TP_CMD_CTS: 1017 case 0xff: /* did some data */ 1018 case J1939_ETP_CMD_DPO: 1019 if ((session->skcb.addr.type == J1939_TP && 1020 j1939_cb_is_broadcast(&session->skcb))) 1021 break; 1022 1023 if (session->pkt.rx >= session->pkt.total) { 1024 ret = j1939_session_tx_eoma(session); 1025 } else if (session->pkt.rx >= session->pkt.last) { 1026 session->last_txcmd = 0; 1027 ret = j1939_session_tx_cts(session); 1028 } 1029 break; 1030 default: 1031 netdev_alert(priv->ndev, "%s: 0x%p: unexpected last_cmd: %x\n", 1032 __func__, session, session->last_cmd); 1033 } 1034 1035 return ret; 1036 } 1037 1038 static int j1939_simple_txnext(struct j1939_session *session) 1039 { 1040 struct j1939_priv *priv = session->priv; 1041 struct sk_buff *se_skb = j1939_session_skb_get(session); 1042 struct sk_buff *skb; 1043 int ret; 1044 1045 if (!se_skb) 1046 return 0; 1047 1048 skb = skb_clone(se_skb, GFP_ATOMIC); 1049 if (!skb) { 1050 ret = -ENOMEM; 1051 goto out_free; 1052 } 1053 1054 can_skb_set_owner(skb, se_skb->sk); 1055 1056 j1939_tp_set_rxtimeout(session, J1939_SIMPLE_ECHO_TIMEOUT_MS); 1057 1058 ret = j1939_send_one(priv, skb); 1059 if (ret) 1060 goto out_free; 1061 1062 j1939_sk_errqueue(session, J1939_ERRQUEUE_TX_SCHED); 1063 j1939_sk_queue_activate_next(session); 1064 1065 out_free: 1066 if (ret) 1067 kfree_skb(se_skb); 1068 else 1069 consume_skb(se_skb); 1070 1071 return ret; 1072 } 1073 1074 static bool j1939_session_deactivate_locked(struct j1939_session *session) 1075 { 1076 bool active = false; 1077 1078 lockdep_assert_held(&session->priv->active_session_list_lock); 1079 1080 if (session->state >= J1939_SESSION_ACTIVE && 1081 session->state < J1939_SESSION_ACTIVE_MAX) { 1082 active = true; 1083 1084 list_del_init(&session->active_session_list_entry); 1085 session->state = J1939_SESSION_DONE; 1086 j1939_session_put(session); 1087 } 1088 1089 return active; 1090 } 1091 1092 static bool j1939_session_deactivate(struct j1939_session *session) 1093 { 1094 struct j1939_priv *priv = session->priv; 1095 bool active; 1096 1097 j1939_session_list_lock(priv); 1098 active = j1939_session_deactivate_locked(session); 1099 j1939_session_list_unlock(priv); 1100 1101 return active; 1102 } 1103 1104 static void 1105 j1939_session_deactivate_activate_next(struct j1939_session *session) 1106 { 1107 if (j1939_session_deactivate(session)) 1108 j1939_sk_queue_activate_next(session); 1109 } 1110 1111 static void __j1939_session_cancel(struct j1939_session *session, 1112 enum j1939_xtp_abort err) 1113 { 1114 struct j1939_priv *priv = session->priv; 1115 1116 WARN_ON_ONCE(!err); 1117 lockdep_assert_held(&session->priv->active_session_list_lock); 1118 1119 session->err = j1939_xtp_abort_to_errno(priv, err); 1120 session->state = J1939_SESSION_WAITING_ABORT; 1121 /* do not send aborts on incoming broadcasts */ 1122 if (!j1939_cb_is_broadcast(&session->skcb)) { 1123 j1939_xtp_tx_abort(priv, &session->skcb, 1124 !session->transmission, 1125 err, session->skcb.addr.pgn); 1126 } 1127 1128 if (session->sk) 1129 j1939_sk_send_loop_abort(session->sk, session->err); 1130 } 1131 1132 static void j1939_session_cancel(struct j1939_session *session, 1133 enum j1939_xtp_abort err) 1134 { 1135 j1939_session_list_lock(session->priv); 1136 1137 if (session->state >= J1939_SESSION_ACTIVE && 1138 session->state < J1939_SESSION_WAITING_ABORT) { 1139 j1939_tp_set_rxtimeout(session, J1939_XTP_ABORT_TIMEOUT_MS); 1140 __j1939_session_cancel(session, err); 1141 } 1142 1143 j1939_session_list_unlock(session->priv); 1144 1145 if (!session->sk) 1146 j1939_sk_errqueue(session, J1939_ERRQUEUE_RX_ABORT); 1147 } 1148 1149 static enum hrtimer_restart j1939_tp_txtimer(struct hrtimer *hrtimer) 1150 { 1151 struct j1939_session *session = 1152 container_of(hrtimer, struct j1939_session, txtimer); 1153 struct j1939_priv *priv = session->priv; 1154 int ret = 0; 1155 1156 if (session->skcb.addr.type == J1939_SIMPLE) { 1157 ret = j1939_simple_txnext(session); 1158 } else { 1159 if (session->transmission) 1160 ret = j1939_xtp_txnext_transmiter(session); 1161 else 1162 ret = j1939_xtp_txnext_receiver(session); 1163 } 1164 1165 switch (ret) { 1166 case -ENOBUFS: 1167 /* Retry limit is currently arbitrary chosen */ 1168 if (session->tx_retry < J1939_XTP_TX_RETRY_LIMIT) { 1169 session->tx_retry++; 1170 j1939_tp_schedule_txtimer(session, 1171 10 + get_random_u32_below(16)); 1172 } else { 1173 netdev_alert(priv->ndev, "%s: 0x%p: tx retry count reached\n", 1174 __func__, session); 1175 session->err = -ENETUNREACH; 1176 j1939_session_rxtimer_cancel(session); 1177 j1939_session_deactivate_activate_next(session); 1178 } 1179 break; 1180 case -ENETDOWN: 1181 /* In this case we should get a netdev_event(), all active 1182 * sessions will be cleared by 1183 * j1939_cancel_all_active_sessions(). So handle this as an 1184 * error, but let j1939_cancel_all_active_sessions() do the 1185 * cleanup including propagation of the error to user space. 1186 */ 1187 break; 1188 case -EOVERFLOW: 1189 j1939_session_cancel(session, J1939_XTP_ABORT_ECTS_TOO_BIG); 1190 break; 1191 case 0: 1192 session->tx_retry = 0; 1193 break; 1194 default: 1195 netdev_alert(priv->ndev, "%s: 0x%p: tx aborted with unknown reason: %i\n", 1196 __func__, session, ret); 1197 if (session->skcb.addr.type != J1939_SIMPLE) { 1198 j1939_session_cancel(session, J1939_XTP_ABORT_OTHER); 1199 } else { 1200 session->err = ret; 1201 j1939_session_rxtimer_cancel(session); 1202 j1939_session_deactivate_activate_next(session); 1203 } 1204 } 1205 1206 j1939_session_put(session); 1207 1208 return HRTIMER_NORESTART; 1209 } 1210 1211 static void j1939_session_completed(struct j1939_session *session) 1212 { 1213 struct sk_buff *se_skb; 1214 1215 if (!session->transmission) { 1216 se_skb = j1939_session_skb_get(session); 1217 /* distribute among j1939 receivers */ 1218 j1939_sk_recv(session->priv, se_skb); 1219 consume_skb(se_skb); 1220 } 1221 1222 j1939_session_deactivate_activate_next(session); 1223 } 1224 1225 static enum hrtimer_restart j1939_tp_rxtimer(struct hrtimer *hrtimer) 1226 { 1227 struct j1939_session *session = container_of(hrtimer, 1228 struct j1939_session, 1229 rxtimer); 1230 struct j1939_priv *priv = session->priv; 1231 1232 if (session->state == J1939_SESSION_WAITING_ABORT) { 1233 netdev_alert(priv->ndev, "%s: 0x%p: abort rx timeout. Force session deactivation\n", 1234 __func__, session); 1235 1236 j1939_session_deactivate_activate_next(session); 1237 1238 } else if (session->skcb.addr.type == J1939_SIMPLE) { 1239 netdev_alert(priv->ndev, "%s: 0x%p: Timeout. Failed to send simple message.\n", 1240 __func__, session); 1241 1242 /* The message is probably stuck in the CAN controller and can 1243 * be send as soon as CAN bus is in working state again. 1244 */ 1245 session->err = -ETIME; 1246 j1939_session_deactivate(session); 1247 } else { 1248 j1939_session_list_lock(session->priv); 1249 if (session->state >= J1939_SESSION_ACTIVE && 1250 session->state < J1939_SESSION_ACTIVE_MAX) { 1251 netdev_alert(priv->ndev, "%s: 0x%p: rx timeout, send abort\n", 1252 __func__, session); 1253 j1939_session_get(session); 1254 hrtimer_start(&session->rxtimer, 1255 ms_to_ktime(J1939_XTP_ABORT_TIMEOUT_MS), 1256 HRTIMER_MODE_REL_SOFT); 1257 __j1939_session_cancel(session, J1939_XTP_ABORT_TIMEOUT); 1258 } 1259 j1939_session_list_unlock(session->priv); 1260 1261 if (!session->sk) 1262 j1939_sk_errqueue(session, J1939_ERRQUEUE_RX_ABORT); 1263 } 1264 1265 j1939_session_put(session); 1266 1267 return HRTIMER_NORESTART; 1268 } 1269 1270 static bool j1939_xtp_rx_cmd_bad_pgn(struct j1939_session *session, 1271 const struct sk_buff *skb) 1272 { 1273 const struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb); 1274 pgn_t pgn = j1939_xtp_ctl_to_pgn(skb->data); 1275 struct j1939_priv *priv = session->priv; 1276 enum j1939_xtp_abort abort = J1939_XTP_NO_ABORT; 1277 u8 cmd = skb->data[0]; 1278 1279 if (session->skcb.addr.pgn == pgn) 1280 return false; 1281 1282 switch (cmd) { 1283 case J1939_TP_CMD_BAM: 1284 abort = J1939_XTP_NO_ABORT; 1285 break; 1286 1287 case J1939_ETP_CMD_RTS: 1288 fallthrough; 1289 case J1939_TP_CMD_RTS: 1290 abort = J1939_XTP_ABORT_BUSY; 1291 break; 1292 1293 case J1939_ETP_CMD_CTS: 1294 fallthrough; 1295 case J1939_TP_CMD_CTS: 1296 abort = J1939_XTP_ABORT_ECTS_UNXPECTED_PGN; 1297 break; 1298 1299 case J1939_ETP_CMD_DPO: 1300 abort = J1939_XTP_ABORT_BAD_EDPO_PGN; 1301 break; 1302 1303 case J1939_ETP_CMD_EOMA: 1304 fallthrough; 1305 case J1939_TP_CMD_EOMA: 1306 abort = J1939_XTP_ABORT_OTHER; 1307 break; 1308 1309 case J1939_ETP_CMD_ABORT: /* && J1939_TP_CMD_ABORT */ 1310 abort = J1939_XTP_NO_ABORT; 1311 break; 1312 1313 default: 1314 WARN_ON_ONCE(1); 1315 break; 1316 } 1317 1318 netdev_warn(priv->ndev, "%s: 0x%p: CMD 0x%02x with PGN 0x%05x for running session with different PGN 0x%05x.\n", 1319 __func__, session, cmd, pgn, session->skcb.addr.pgn); 1320 if (abort != J1939_XTP_NO_ABORT) 1321 j1939_xtp_tx_abort(priv, skcb, true, abort, pgn); 1322 1323 return true; 1324 } 1325 1326 static void j1939_xtp_rx_abort_one(struct j1939_priv *priv, struct sk_buff *skb, 1327 bool reverse, bool transmitter) 1328 { 1329 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb); 1330 struct j1939_session *session; 1331 u8 abort = skb->data[1]; 1332 1333 session = j1939_session_get_by_addr(priv, &skcb->addr, reverse, 1334 transmitter); 1335 if (!session) 1336 return; 1337 1338 if (j1939_xtp_rx_cmd_bad_pgn(session, skb)) 1339 goto abort_put; 1340 1341 netdev_info(priv->ndev, "%s: 0x%p: 0x%05x: (%u) %s\n", __func__, 1342 session, j1939_xtp_ctl_to_pgn(skb->data), abort, 1343 j1939_xtp_abort_to_str(abort)); 1344 1345 j1939_session_timers_cancel(session); 1346 session->err = j1939_xtp_abort_to_errno(priv, abort); 1347 if (session->sk) 1348 j1939_sk_send_loop_abort(session->sk, session->err); 1349 else 1350 j1939_sk_errqueue(session, J1939_ERRQUEUE_RX_ABORT); 1351 j1939_session_deactivate_activate_next(session); 1352 1353 abort_put: 1354 j1939_session_put(session); 1355 } 1356 1357 /* abort packets may come in 2 directions */ 1358 static void 1359 j1939_xtp_rx_abort(struct j1939_priv *priv, struct sk_buff *skb, 1360 bool transmitter) 1361 { 1362 j1939_xtp_rx_abort_one(priv, skb, false, transmitter); 1363 j1939_xtp_rx_abort_one(priv, skb, true, transmitter); 1364 } 1365 1366 static void 1367 j1939_xtp_rx_eoma_one(struct j1939_session *session, struct sk_buff *skb) 1368 { 1369 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb); 1370 const u8 *dat; 1371 int len; 1372 1373 if (j1939_xtp_rx_cmd_bad_pgn(session, skb)) 1374 return; 1375 1376 dat = skb->data; 1377 1378 if (skcb->addr.type == J1939_ETP) 1379 len = j1939_etp_ctl_to_size(dat); 1380 else 1381 len = j1939_tp_ctl_to_size(dat); 1382 1383 if (session->total_message_size != len) { 1384 netdev_warn_once(session->priv->ndev, 1385 "%s: 0x%p: Incorrect size. Expected: %i; got: %i.\n", 1386 __func__, session, session->total_message_size, 1387 len); 1388 } 1389 1390 netdev_dbg(session->priv->ndev, "%s: 0x%p\n", __func__, session); 1391 1392 session->pkt.tx_acked = session->pkt.total; 1393 j1939_session_timers_cancel(session); 1394 /* transmitted without problems */ 1395 j1939_session_completed(session); 1396 } 1397 1398 static void 1399 j1939_xtp_rx_eoma(struct j1939_priv *priv, struct sk_buff *skb, 1400 bool transmitter) 1401 { 1402 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb); 1403 struct j1939_session *session; 1404 1405 session = j1939_session_get_by_addr(priv, &skcb->addr, true, 1406 transmitter); 1407 if (!session) 1408 return; 1409 1410 j1939_xtp_rx_eoma_one(session, skb); 1411 j1939_session_put(session); 1412 } 1413 1414 static void 1415 j1939_xtp_rx_cts_one(struct j1939_session *session, struct sk_buff *skb) 1416 { 1417 enum j1939_xtp_abort err = J1939_XTP_ABORT_FAULT; 1418 unsigned int pkt; 1419 const u8 *dat; 1420 1421 dat = skb->data; 1422 1423 if (j1939_xtp_rx_cmd_bad_pgn(session, skb)) 1424 return; 1425 1426 netdev_dbg(session->priv->ndev, "%s: 0x%p\n", __func__, session); 1427 1428 if (session->last_cmd == dat[0]) { 1429 err = J1939_XTP_ABORT_DUP_SEQ; 1430 goto out_session_cancel; 1431 } 1432 1433 if (session->skcb.addr.type == J1939_ETP) 1434 pkt = j1939_etp_ctl_to_packet(dat); 1435 else 1436 pkt = dat[2]; 1437 1438 if (!pkt) 1439 goto out_session_cancel; 1440 else if (dat[1] > session->pkt.block /* 0xff for etp */) 1441 goto out_session_cancel; 1442 1443 /* set packet counters only when not CTS(0) */ 1444 session->pkt.tx_acked = pkt - 1; 1445 j1939_session_skb_drop_old(session); 1446 session->pkt.last = session->pkt.tx_acked + dat[1]; 1447 if (session->pkt.last > session->pkt.total) 1448 /* safety measure */ 1449 session->pkt.last = session->pkt.total; 1450 /* TODO: do not set tx here, do it in txtimer */ 1451 session->pkt.tx = session->pkt.tx_acked; 1452 1453 session->last_cmd = dat[0]; 1454 if (dat[1]) { 1455 j1939_tp_set_rxtimeout(session, 1250); 1456 if (session->transmission) { 1457 if (session->pkt.tx_acked) 1458 j1939_sk_errqueue(session, 1459 J1939_ERRQUEUE_TX_SCHED); 1460 j1939_session_txtimer_cancel(session); 1461 j1939_tp_schedule_txtimer(session, 0); 1462 } 1463 } else { 1464 /* CTS(0) */ 1465 j1939_tp_set_rxtimeout(session, 550); 1466 } 1467 return; 1468 1469 out_session_cancel: 1470 j1939_session_timers_cancel(session); 1471 j1939_session_cancel(session, err); 1472 } 1473 1474 static void 1475 j1939_xtp_rx_cts(struct j1939_priv *priv, struct sk_buff *skb, bool transmitter) 1476 { 1477 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb); 1478 struct j1939_session *session; 1479 1480 session = j1939_session_get_by_addr(priv, &skcb->addr, true, 1481 transmitter); 1482 if (!session) 1483 return; 1484 j1939_xtp_rx_cts_one(session, skb); 1485 j1939_session_put(session); 1486 } 1487 1488 static struct j1939_session *j1939_session_new(struct j1939_priv *priv, 1489 struct sk_buff *skb, size_t size) 1490 { 1491 struct j1939_session *session; 1492 struct j1939_sk_buff_cb *skcb; 1493 1494 session = kzalloc(sizeof(*session), gfp_any()); 1495 if (!session) 1496 return NULL; 1497 1498 INIT_LIST_HEAD(&session->active_session_list_entry); 1499 INIT_LIST_HEAD(&session->sk_session_queue_entry); 1500 kref_init(&session->kref); 1501 1502 j1939_priv_get(priv); 1503 session->priv = priv; 1504 session->total_message_size = size; 1505 session->state = J1939_SESSION_NEW; 1506 1507 skb_queue_head_init(&session->skb_queue); 1508 skb_queue_tail(&session->skb_queue, skb); 1509 1510 skcb = j1939_skb_to_cb(skb); 1511 memcpy(&session->skcb, skcb, sizeof(session->skcb)); 1512 1513 hrtimer_init(&session->txtimer, CLOCK_MONOTONIC, 1514 HRTIMER_MODE_REL_SOFT); 1515 session->txtimer.function = j1939_tp_txtimer; 1516 hrtimer_init(&session->rxtimer, CLOCK_MONOTONIC, 1517 HRTIMER_MODE_REL_SOFT); 1518 session->rxtimer.function = j1939_tp_rxtimer; 1519 1520 netdev_dbg(priv->ndev, "%s: 0x%p: sa: %02x, da: %02x\n", 1521 __func__, session, skcb->addr.sa, skcb->addr.da); 1522 1523 return session; 1524 } 1525 1526 static struct 1527 j1939_session *j1939_session_fresh_new(struct j1939_priv *priv, 1528 int size, 1529 const struct j1939_sk_buff_cb *rel_skcb) 1530 { 1531 struct sk_buff *skb; 1532 struct j1939_sk_buff_cb *skcb; 1533 struct j1939_session *session; 1534 1535 skb = alloc_skb(size + sizeof(struct can_skb_priv), GFP_ATOMIC); 1536 if (unlikely(!skb)) 1537 return NULL; 1538 1539 skb->dev = priv->ndev; 1540 can_skb_reserve(skb); 1541 can_skb_prv(skb)->ifindex = priv->ndev->ifindex; 1542 can_skb_prv(skb)->skbcnt = 0; 1543 skcb = j1939_skb_to_cb(skb); 1544 memcpy(skcb, rel_skcb, sizeof(*skcb)); 1545 1546 session = j1939_session_new(priv, skb, size); 1547 if (!session) { 1548 kfree_skb(skb); 1549 return NULL; 1550 } 1551 1552 /* alloc data area */ 1553 skb_put(skb, size); 1554 /* skb is recounted in j1939_session_new() */ 1555 return session; 1556 } 1557 1558 int j1939_session_activate(struct j1939_session *session) 1559 { 1560 struct j1939_priv *priv = session->priv; 1561 struct j1939_session *active = NULL; 1562 int ret = 0; 1563 1564 j1939_session_list_lock(priv); 1565 if (session->skcb.addr.type != J1939_SIMPLE) 1566 active = j1939_session_get_by_addr_locked(priv, 1567 &priv->active_session_list, 1568 &session->skcb.addr, false, 1569 session->transmission); 1570 if (active) { 1571 j1939_session_put(active); 1572 ret = -EAGAIN; 1573 } else { 1574 WARN_ON_ONCE(session->state != J1939_SESSION_NEW); 1575 list_add_tail(&session->active_session_list_entry, 1576 &priv->active_session_list); 1577 j1939_session_get(session); 1578 session->state = J1939_SESSION_ACTIVE; 1579 1580 netdev_dbg(session->priv->ndev, "%s: 0x%p\n", 1581 __func__, session); 1582 } 1583 j1939_session_list_unlock(priv); 1584 1585 return ret; 1586 } 1587 1588 static struct 1589 j1939_session *j1939_xtp_rx_rts_session_new(struct j1939_priv *priv, 1590 struct sk_buff *skb) 1591 { 1592 enum j1939_xtp_abort abort = J1939_XTP_NO_ABORT; 1593 struct j1939_sk_buff_cb skcb = *j1939_skb_to_cb(skb); 1594 struct j1939_session *session; 1595 const u8 *dat; 1596 int len, ret; 1597 pgn_t pgn; 1598 1599 netdev_dbg(priv->ndev, "%s\n", __func__); 1600 1601 dat = skb->data; 1602 pgn = j1939_xtp_ctl_to_pgn(dat); 1603 skcb.addr.pgn = pgn; 1604 1605 if (!j1939_sk_recv_match(priv, &skcb)) 1606 return NULL; 1607 1608 if (skcb.addr.type == J1939_ETP) { 1609 len = j1939_etp_ctl_to_size(dat); 1610 if (len > J1939_MAX_ETP_PACKET_SIZE) 1611 abort = J1939_XTP_ABORT_FAULT; 1612 else if (len > priv->tp_max_packet_size) 1613 abort = J1939_XTP_ABORT_RESOURCE; 1614 else if (len <= J1939_MAX_TP_PACKET_SIZE) 1615 abort = J1939_XTP_ABORT_FAULT; 1616 } else { 1617 len = j1939_tp_ctl_to_size(dat); 1618 if (len > J1939_MAX_TP_PACKET_SIZE) 1619 abort = J1939_XTP_ABORT_FAULT; 1620 else if (len > priv->tp_max_packet_size) 1621 abort = J1939_XTP_ABORT_RESOURCE; 1622 else if (len < J1939_MIN_TP_PACKET_SIZE) 1623 abort = J1939_XTP_ABORT_FAULT; 1624 } 1625 1626 if (abort != J1939_XTP_NO_ABORT) { 1627 j1939_xtp_tx_abort(priv, &skcb, true, abort, pgn); 1628 return NULL; 1629 } 1630 1631 session = j1939_session_fresh_new(priv, len, &skcb); 1632 if (!session) { 1633 j1939_xtp_tx_abort(priv, &skcb, true, 1634 J1939_XTP_ABORT_RESOURCE, pgn); 1635 return NULL; 1636 } 1637 1638 /* initialize the control buffer: plain copy */ 1639 session->pkt.total = (len + 6) / 7; 1640 session->pkt.block = 0xff; 1641 if (skcb.addr.type != J1939_ETP) { 1642 if (dat[3] != session->pkt.total) 1643 netdev_alert(priv->ndev, "%s: 0x%p: strange total, %u != %u\n", 1644 __func__, session, session->pkt.total, 1645 dat[3]); 1646 session->pkt.total = dat[3]; 1647 session->pkt.block = min(dat[3], dat[4]); 1648 } 1649 1650 session->pkt.rx = 0; 1651 session->pkt.tx = 0; 1652 1653 session->tskey = priv->rx_tskey++; 1654 j1939_sk_errqueue(session, J1939_ERRQUEUE_RX_RTS); 1655 1656 ret = j1939_session_activate(session); 1657 if (ret) { 1658 /* Entering this scope indicates an issue with the J1939 bus. 1659 * Possible scenarios include: 1660 * - A time lapse occurred, and a new session was initiated 1661 * due to another packet being sent correctly. This could 1662 * have been caused by too long interrupt, debugger, or being 1663 * out-scheduled by another task. 1664 * - The bus is receiving numerous erroneous packets, either 1665 * from a malfunctioning device or during a test scenario. 1666 */ 1667 netdev_alert(priv->ndev, "%s: 0x%p: concurrent session with same addr (%02x %02x) is already active.\n", 1668 __func__, session, skcb.addr.sa, skcb.addr.da); 1669 j1939_session_put(session); 1670 return NULL; 1671 } 1672 1673 return session; 1674 } 1675 1676 static int j1939_xtp_rx_rts_session_active(struct j1939_session *session, 1677 struct sk_buff *skb) 1678 { 1679 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb); 1680 struct j1939_priv *priv = session->priv; 1681 1682 if (!session->transmission) { 1683 if (j1939_xtp_rx_cmd_bad_pgn(session, skb)) 1684 return -EBUSY; 1685 1686 /* RTS on active session */ 1687 j1939_session_timers_cancel(session); 1688 j1939_session_cancel(session, J1939_XTP_ABORT_BUSY); 1689 } 1690 1691 if (session->last_cmd != 0) { 1692 /* we received a second rts on the same connection */ 1693 netdev_alert(priv->ndev, "%s: 0x%p: connection exists (%02x %02x). last cmd: %x\n", 1694 __func__, session, skcb->addr.sa, skcb->addr.da, 1695 session->last_cmd); 1696 1697 j1939_session_timers_cancel(session); 1698 j1939_session_cancel(session, J1939_XTP_ABORT_BUSY); 1699 if (session->transmission) 1700 j1939_session_deactivate_activate_next(session); 1701 1702 return -EBUSY; 1703 } 1704 1705 if (session->skcb.addr.sa != skcb->addr.sa || 1706 session->skcb.addr.da != skcb->addr.da) 1707 netdev_warn(priv->ndev, "%s: 0x%p: session->skcb.addr.sa=0x%02x skcb->addr.sa=0x%02x session->skcb.addr.da=0x%02x skcb->addr.da=0x%02x\n", 1708 __func__, session, 1709 session->skcb.addr.sa, skcb->addr.sa, 1710 session->skcb.addr.da, skcb->addr.da); 1711 /* make sure 'sa' & 'da' are correct ! 1712 * They may be 'not filled in yet' for sending 1713 * skb's, since they did not pass the Address Claim ever. 1714 */ 1715 session->skcb.addr.sa = skcb->addr.sa; 1716 session->skcb.addr.da = skcb->addr.da; 1717 1718 netdev_dbg(session->priv->ndev, "%s: 0x%p\n", __func__, session); 1719 1720 return 0; 1721 } 1722 1723 static void j1939_xtp_rx_rts(struct j1939_priv *priv, struct sk_buff *skb, 1724 bool transmitter) 1725 { 1726 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb); 1727 struct j1939_session *session; 1728 u8 cmd = skb->data[0]; 1729 1730 session = j1939_session_get_by_addr(priv, &skcb->addr, false, 1731 transmitter); 1732 1733 if (!session) { 1734 if (transmitter) { 1735 /* If we're the transmitter and this function is called, 1736 * we received our own RTS. A session has already been 1737 * created. 1738 * 1739 * For some reasons however it might have been destroyed 1740 * already. So don't create a new one here (using 1741 * "j1939_xtp_rx_rts_session_new()") as this will be a 1742 * receiver session. 1743 * 1744 * The reasons the session is already destroyed might 1745 * be: 1746 * - user space closed socket was and the session was 1747 * aborted 1748 * - session was aborted due to external abort message 1749 */ 1750 return; 1751 } 1752 session = j1939_xtp_rx_rts_session_new(priv, skb); 1753 if (!session) { 1754 if (cmd == J1939_TP_CMD_BAM && j1939_sk_recv_match(priv, skcb)) 1755 netdev_info(priv->ndev, "%s: failed to create TP BAM session\n", 1756 __func__); 1757 return; 1758 } 1759 } else { 1760 if (j1939_xtp_rx_rts_session_active(session, skb)) { 1761 j1939_session_put(session); 1762 return; 1763 } 1764 } 1765 session->last_cmd = cmd; 1766 1767 if (cmd == J1939_TP_CMD_BAM) { 1768 if (!session->transmission) 1769 j1939_tp_set_rxtimeout(session, 750); 1770 } else { 1771 if (!session->transmission) { 1772 j1939_session_txtimer_cancel(session); 1773 j1939_tp_schedule_txtimer(session, 0); 1774 } 1775 j1939_tp_set_rxtimeout(session, 1250); 1776 } 1777 1778 j1939_session_put(session); 1779 } 1780 1781 static void j1939_xtp_rx_dpo_one(struct j1939_session *session, 1782 struct sk_buff *skb) 1783 { 1784 const u8 *dat = skb->data; 1785 1786 if (j1939_xtp_rx_cmd_bad_pgn(session, skb)) 1787 return; 1788 1789 netdev_dbg(session->priv->ndev, "%s: 0x%p\n", __func__, session); 1790 1791 /* transmitted without problems */ 1792 session->pkt.dpo = j1939_etp_ctl_to_packet(skb->data); 1793 session->last_cmd = dat[0]; 1794 j1939_tp_set_rxtimeout(session, 750); 1795 1796 if (!session->transmission) 1797 j1939_sk_errqueue(session, J1939_ERRQUEUE_RX_DPO); 1798 } 1799 1800 static void j1939_xtp_rx_dpo(struct j1939_priv *priv, struct sk_buff *skb, 1801 bool transmitter) 1802 { 1803 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb); 1804 struct j1939_session *session; 1805 1806 session = j1939_session_get_by_addr(priv, &skcb->addr, false, 1807 transmitter); 1808 if (!session) { 1809 netdev_info(priv->ndev, 1810 "%s: no connection found\n", __func__); 1811 return; 1812 } 1813 1814 j1939_xtp_rx_dpo_one(session, skb); 1815 j1939_session_put(session); 1816 } 1817 1818 static void j1939_xtp_rx_dat_one(struct j1939_session *session, 1819 struct sk_buff *skb) 1820 { 1821 enum j1939_xtp_abort abort = J1939_XTP_ABORT_FAULT; 1822 struct j1939_priv *priv = session->priv; 1823 struct j1939_sk_buff_cb *skcb, *se_skcb; 1824 struct sk_buff *se_skb = NULL; 1825 const u8 *dat; 1826 u8 *tpdat; 1827 int offset; 1828 int nbytes; 1829 bool final = false; 1830 bool remain = false; 1831 bool do_cts_eoma = false; 1832 int packet; 1833 1834 skcb = j1939_skb_to_cb(skb); 1835 dat = skb->data; 1836 if (skb->len != 8) { 1837 /* makes no sense */ 1838 abort = J1939_XTP_ABORT_UNEXPECTED_DATA; 1839 goto out_session_cancel; 1840 } 1841 1842 switch (session->last_cmd) { 1843 case 0xff: 1844 break; 1845 case J1939_ETP_CMD_DPO: 1846 if (skcb->addr.type == J1939_ETP) 1847 break; 1848 fallthrough; 1849 case J1939_TP_CMD_BAM: 1850 fallthrough; 1851 case J1939_TP_CMD_CTS: 1852 if (skcb->addr.type != J1939_ETP) 1853 break; 1854 fallthrough; 1855 default: 1856 netdev_info(priv->ndev, "%s: 0x%p: last %02x\n", __func__, 1857 session, session->last_cmd); 1858 goto out_session_cancel; 1859 } 1860 1861 packet = (dat[0] - 1 + session->pkt.dpo); 1862 if (packet > session->pkt.total || 1863 (session->pkt.rx + 1) > session->pkt.total) { 1864 netdev_info(priv->ndev, "%s: 0x%p: should have been completed\n", 1865 __func__, session); 1866 goto out_session_cancel; 1867 } 1868 1869 se_skb = j1939_session_skb_get_by_offset(session, packet * 7); 1870 if (!se_skb) { 1871 netdev_warn(priv->ndev, "%s: 0x%p: no skb found\n", __func__, 1872 session); 1873 goto out_session_cancel; 1874 } 1875 1876 se_skcb = j1939_skb_to_cb(se_skb); 1877 offset = packet * 7 - se_skcb->offset; 1878 nbytes = se_skb->len - offset; 1879 if (nbytes > 7) 1880 nbytes = 7; 1881 if (nbytes <= 0 || (nbytes + 1) > skb->len) { 1882 netdev_info(priv->ndev, "%s: 0x%p: nbytes %i, len %i\n", 1883 __func__, session, nbytes, skb->len); 1884 goto out_session_cancel; 1885 } 1886 1887 tpdat = se_skb->data; 1888 if (!session->transmission) { 1889 memcpy(&tpdat[offset], &dat[1], nbytes); 1890 } else { 1891 int err; 1892 1893 err = memcmp(&tpdat[offset], &dat[1], nbytes); 1894 if (err) 1895 netdev_err_once(priv->ndev, 1896 "%s: 0x%p: Data of RX-looped back packet (%*ph) doesn't match TX data (%*ph)!\n", 1897 __func__, session, 1898 nbytes, &dat[1], 1899 nbytes, &tpdat[offset]); 1900 } 1901 1902 if (packet == session->pkt.rx) 1903 session->pkt.rx++; 1904 1905 if (se_skcb->addr.type != J1939_ETP && 1906 j1939_cb_is_broadcast(&session->skcb)) { 1907 if (session->pkt.rx >= session->pkt.total) 1908 final = true; 1909 else 1910 remain = true; 1911 } else { 1912 /* never final, an EOMA must follow */ 1913 if (session->pkt.rx >= session->pkt.last) 1914 do_cts_eoma = true; 1915 } 1916 1917 if (final) { 1918 j1939_session_timers_cancel(session); 1919 j1939_session_completed(session); 1920 } else if (remain) { 1921 if (!session->transmission) 1922 j1939_tp_set_rxtimeout(session, 750); 1923 } else if (do_cts_eoma) { 1924 j1939_tp_set_rxtimeout(session, 1250); 1925 if (!session->transmission) 1926 j1939_tp_schedule_txtimer(session, 0); 1927 } else { 1928 j1939_tp_set_rxtimeout(session, 750); 1929 } 1930 session->last_cmd = 0xff; 1931 consume_skb(se_skb); 1932 j1939_session_put(session); 1933 1934 return; 1935 1936 out_session_cancel: 1937 kfree_skb(se_skb); 1938 j1939_session_timers_cancel(session); 1939 j1939_session_cancel(session, abort); 1940 j1939_session_put(session); 1941 } 1942 1943 static void j1939_xtp_rx_dat(struct j1939_priv *priv, struct sk_buff *skb) 1944 { 1945 struct j1939_sk_buff_cb *skcb; 1946 struct j1939_session *session; 1947 1948 skcb = j1939_skb_to_cb(skb); 1949 1950 if (j1939_tp_im_transmitter(skcb)) { 1951 session = j1939_session_get_by_addr(priv, &skcb->addr, false, 1952 true); 1953 if (!session) 1954 netdev_info(priv->ndev, "%s: no tx connection found\n", 1955 __func__); 1956 else 1957 j1939_xtp_rx_dat_one(session, skb); 1958 } 1959 1960 if (j1939_tp_im_receiver(skcb)) { 1961 session = j1939_session_get_by_addr(priv, &skcb->addr, false, 1962 false); 1963 if (!session) 1964 netdev_info(priv->ndev, "%s: no rx connection found\n", 1965 __func__); 1966 else 1967 j1939_xtp_rx_dat_one(session, skb); 1968 } 1969 1970 if (j1939_cb_is_broadcast(skcb)) { 1971 session = j1939_session_get_by_addr(priv, &skcb->addr, false, 1972 false); 1973 if (session) 1974 j1939_xtp_rx_dat_one(session, skb); 1975 } 1976 } 1977 1978 /* j1939 main intf */ 1979 struct j1939_session *j1939_tp_send(struct j1939_priv *priv, 1980 struct sk_buff *skb, size_t size) 1981 { 1982 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb); 1983 struct j1939_session *session; 1984 int ret; 1985 1986 if (skcb->addr.pgn == J1939_TP_PGN_DAT || 1987 skcb->addr.pgn == J1939_TP_PGN_CTL || 1988 skcb->addr.pgn == J1939_ETP_PGN_DAT || 1989 skcb->addr.pgn == J1939_ETP_PGN_CTL) 1990 /* avoid conflict */ 1991 return ERR_PTR(-EDOM); 1992 1993 if (size > priv->tp_max_packet_size) 1994 return ERR_PTR(-EMSGSIZE); 1995 1996 if (size <= 8) 1997 skcb->addr.type = J1939_SIMPLE; 1998 else if (size > J1939_MAX_TP_PACKET_SIZE) 1999 skcb->addr.type = J1939_ETP; 2000 else 2001 skcb->addr.type = J1939_TP; 2002 2003 if (skcb->addr.type == J1939_ETP && 2004 j1939_cb_is_broadcast(skcb)) 2005 return ERR_PTR(-EDESTADDRREQ); 2006 2007 /* fill in addresses from names */ 2008 ret = j1939_ac_fixup(priv, skb); 2009 if (unlikely(ret)) 2010 return ERR_PTR(ret); 2011 2012 /* fix DST flags, it may be used there soon */ 2013 if (j1939_address_is_unicast(skcb->addr.da) && 2014 priv->ents[skcb->addr.da].nusers) 2015 skcb->flags |= J1939_ECU_LOCAL_DST; 2016 2017 /* src is always local, I'm sending ... */ 2018 skcb->flags |= J1939_ECU_LOCAL_SRC; 2019 2020 /* prepare new session */ 2021 session = j1939_session_new(priv, skb, size); 2022 if (!session) 2023 return ERR_PTR(-ENOMEM); 2024 2025 /* skb is recounted in j1939_session_new() */ 2026 sock_hold(skb->sk); 2027 session->sk = skb->sk; 2028 session->transmission = true; 2029 session->pkt.total = (size + 6) / 7; 2030 session->pkt.block = skcb->addr.type == J1939_ETP ? 255 : 2031 min(j1939_tp_block ?: 255, session->pkt.total); 2032 2033 if (j1939_cb_is_broadcast(&session->skcb)) 2034 /* set the end-packet for broadcast */ 2035 session->pkt.last = session->pkt.total; 2036 2037 skcb->tskey = atomic_inc_return(&session->sk->sk_tskey) - 1; 2038 session->tskey = skcb->tskey; 2039 2040 return session; 2041 } 2042 2043 static void j1939_tp_cmd_recv(struct j1939_priv *priv, struct sk_buff *skb) 2044 { 2045 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb); 2046 int extd = J1939_TP; 2047 u8 cmd = skb->data[0]; 2048 2049 switch (cmd) { 2050 case J1939_ETP_CMD_RTS: 2051 extd = J1939_ETP; 2052 fallthrough; 2053 case J1939_TP_CMD_BAM: 2054 if (cmd == J1939_TP_CMD_BAM && !j1939_cb_is_broadcast(skcb)) { 2055 netdev_err_once(priv->ndev, "%s: BAM to unicast (%02x), ignoring!\n", 2056 __func__, skcb->addr.sa); 2057 return; 2058 } 2059 fallthrough; 2060 case J1939_TP_CMD_RTS: 2061 if (skcb->addr.type != extd) 2062 return; 2063 2064 if (cmd == J1939_TP_CMD_RTS && j1939_cb_is_broadcast(skcb)) { 2065 netdev_alert(priv->ndev, "%s: rts without destination (%02x)\n", 2066 __func__, skcb->addr.sa); 2067 return; 2068 } 2069 2070 if (j1939_tp_im_transmitter(skcb)) 2071 j1939_xtp_rx_rts(priv, skb, true); 2072 2073 if (j1939_tp_im_receiver(skcb) || j1939_cb_is_broadcast(skcb)) 2074 j1939_xtp_rx_rts(priv, skb, false); 2075 2076 break; 2077 2078 case J1939_ETP_CMD_CTS: 2079 extd = J1939_ETP; 2080 fallthrough; 2081 case J1939_TP_CMD_CTS: 2082 if (skcb->addr.type != extd) 2083 return; 2084 2085 if (j1939_tp_im_transmitter(skcb)) 2086 j1939_xtp_rx_cts(priv, skb, false); 2087 2088 if (j1939_tp_im_receiver(skcb)) 2089 j1939_xtp_rx_cts(priv, skb, true); 2090 2091 break; 2092 2093 case J1939_ETP_CMD_DPO: 2094 if (skcb->addr.type != J1939_ETP) 2095 return; 2096 2097 if (j1939_tp_im_transmitter(skcb)) 2098 j1939_xtp_rx_dpo(priv, skb, true); 2099 2100 if (j1939_tp_im_receiver(skcb)) 2101 j1939_xtp_rx_dpo(priv, skb, false); 2102 2103 break; 2104 2105 case J1939_ETP_CMD_EOMA: 2106 extd = J1939_ETP; 2107 fallthrough; 2108 case J1939_TP_CMD_EOMA: 2109 if (skcb->addr.type != extd) 2110 return; 2111 2112 if (j1939_tp_im_transmitter(skcb)) 2113 j1939_xtp_rx_eoma(priv, skb, false); 2114 2115 if (j1939_tp_im_receiver(skcb)) 2116 j1939_xtp_rx_eoma(priv, skb, true); 2117 2118 break; 2119 2120 case J1939_ETP_CMD_ABORT: /* && J1939_TP_CMD_ABORT */ 2121 if (j1939_cb_is_broadcast(skcb)) { 2122 netdev_err_once(priv->ndev, "%s: abort to broadcast (%02x), ignoring!\n", 2123 __func__, skcb->addr.sa); 2124 return; 2125 } 2126 2127 if (j1939_tp_im_transmitter(skcb)) 2128 j1939_xtp_rx_abort(priv, skb, true); 2129 2130 if (j1939_tp_im_receiver(skcb)) 2131 j1939_xtp_rx_abort(priv, skb, false); 2132 2133 break; 2134 default: 2135 return; 2136 } 2137 } 2138 2139 int j1939_tp_recv(struct j1939_priv *priv, struct sk_buff *skb) 2140 { 2141 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb); 2142 2143 if (!j1939_tp_im_involved_anydir(skcb) && !j1939_cb_is_broadcast(skcb)) 2144 return 0; 2145 2146 switch (skcb->addr.pgn) { 2147 case J1939_ETP_PGN_DAT: 2148 skcb->addr.type = J1939_ETP; 2149 fallthrough; 2150 case J1939_TP_PGN_DAT: 2151 j1939_xtp_rx_dat(priv, skb); 2152 break; 2153 2154 case J1939_ETP_PGN_CTL: 2155 skcb->addr.type = J1939_ETP; 2156 fallthrough; 2157 case J1939_TP_PGN_CTL: 2158 if (skb->len < 8) 2159 return 0; /* Don't care. Nothing to extract here */ 2160 2161 j1939_tp_cmd_recv(priv, skb); 2162 break; 2163 default: 2164 return 0; /* no problem */ 2165 } 2166 return 1; /* "I processed the message" */ 2167 } 2168 2169 void j1939_simple_recv(struct j1939_priv *priv, struct sk_buff *skb) 2170 { 2171 struct j1939_session *session; 2172 2173 if (!skb->sk) 2174 return; 2175 2176 if (skb->sk->sk_family != AF_CAN || 2177 skb->sk->sk_protocol != CAN_J1939) 2178 return; 2179 2180 j1939_session_list_lock(priv); 2181 session = j1939_session_get_simple(priv, skb); 2182 j1939_session_list_unlock(priv); 2183 if (!session) { 2184 netdev_warn(priv->ndev, 2185 "%s: Received already invalidated message\n", 2186 __func__); 2187 return; 2188 } 2189 2190 j1939_session_timers_cancel(session); 2191 j1939_session_deactivate(session); 2192 j1939_session_put(session); 2193 } 2194 2195 int j1939_cancel_active_session(struct j1939_priv *priv, struct sock *sk) 2196 { 2197 struct j1939_session *session, *saved; 2198 2199 netdev_dbg(priv->ndev, "%s, sk: %p\n", __func__, sk); 2200 j1939_session_list_lock(priv); 2201 list_for_each_entry_safe(session, saved, 2202 &priv->active_session_list, 2203 active_session_list_entry) { 2204 if (!sk || sk == session->sk) { 2205 if (hrtimer_try_to_cancel(&session->txtimer) == 1) 2206 j1939_session_put(session); 2207 if (hrtimer_try_to_cancel(&session->rxtimer) == 1) 2208 j1939_session_put(session); 2209 2210 session->err = ESHUTDOWN; 2211 j1939_session_deactivate_locked(session); 2212 } 2213 } 2214 j1939_session_list_unlock(priv); 2215 return NOTIFY_DONE; 2216 } 2217 2218 void j1939_tp_init(struct j1939_priv *priv) 2219 { 2220 spin_lock_init(&priv->active_session_list_lock); 2221 INIT_LIST_HEAD(&priv->active_session_list); 2222 priv->tp_max_packet_size = J1939_MAX_ETP_PACKET_SIZE; 2223 } 2224