1 // SPDX-License-Identifier: GPL-2.0
2 // Copyright (c) 2010-2011 EIA Electronics,
3 // Kurt Van Dijck <kurt.van.dijck@eia.be>
4 // Copyright (c) 2018 Protonic,
5 // Robin van der Gracht <robin@protonic.nl>
6 // Copyright (c) 2017-2019 Pengutronix,
7 // Marc Kleine-Budde <kernel@pengutronix.de>
8 // Copyright (c) 2017-2019 Pengutronix,
9 // Oleksij Rempel <kernel@pengutronix.de>
11 #include <linux/can/skb.h>
13 #include "j1939-priv.h"
15 #define J1939_XTP_TX_RETRY_LIMIT 100
17 #define J1939_ETP_PGN_CTL 0xc800
18 #define J1939_ETP_PGN_DAT 0xc700
19 #define J1939_TP_PGN_CTL 0xec00
20 #define J1939_TP_PGN_DAT 0xeb00
22 #define J1939_TP_CMD_RTS 0x10
23 #define J1939_TP_CMD_CTS 0x11
24 #define J1939_TP_CMD_EOMA 0x13
25 #define J1939_TP_CMD_BAM 0x20
26 #define J1939_TP_CMD_ABORT 0xff
28 #define J1939_ETP_CMD_RTS 0x14
29 #define J1939_ETP_CMD_CTS 0x15
30 #define J1939_ETP_CMD_DPO 0x16
31 #define J1939_ETP_CMD_EOMA 0x17
32 #define J1939_ETP_CMD_ABORT 0xff
34 enum j1939_xtp_abort {
35 J1939_XTP_NO_ABORT = 0,
36 J1939_XTP_ABORT_BUSY = 1,
37 /* Already in one or more connection managed sessions and
38 * cannot support another.
41 * Operation already in progress
44 J1939_XTP_ABORT_RESOURCE = 2,
45 /* System resources were needed for another task so this
46 * connection managed session was terminated.
49 * The socket type requires that message be sent atomically,
50 * and the size of the message to be sent made this
54 J1939_XTP_ABORT_TIMEOUT = 3,
55 /* A timeout occurred and this is the connection abort to
59 * The destination host cannot be reached (probably because
60 * the host is down or a remote router cannot reach it).
63 J1939_XTP_ABORT_GENERIC = 4,
64 /* CTS messages received when data transfer is in progress
70 J1939_XTP_ABORT_FAULT = 5,
71 /* Maximal retransmit request limit reached
74 * State not recoverable
77 J1939_XTP_ABORT_UNEXPECTED_DATA = 6,
78 /* Unexpected data transfer packet
81 * Transport endpoint is not connected
84 J1939_XTP_ABORT_BAD_SEQ = 7,
85 /* Bad sequence number (and software is not able to recover)
88 * Illegal byte sequence
91 J1939_XTP_ABORT_DUP_SEQ = 8,
92 /* Duplicate sequence number (and software is not able to
96 J1939_XTP_ABORT_EDPO_UNEXPECTED = 9,
97 /* Unexpected EDPO packet (ETP) or Message size > 1785 bytes
101 J1939_XTP_ABORT_BAD_EDPO_PGN = 10,
102 /* Unexpected EDPO PGN (PGN in EDPO is bad) */
104 J1939_XTP_ABORT_EDPO_OUTOF_CTS = 11,
105 /* EDPO number of packets is greater than CTS */
107 J1939_XTP_ABORT_BAD_EDPO_OFFSET = 12,
108 /* Bad EDPO offset */
110 J1939_XTP_ABORT_OTHER_DEPRECATED = 13,
111 /* Deprecated. Use 250 instead (Any other reason) */
113 J1939_XTP_ABORT_ECTS_UNXPECTED_PGN = 14,
114 /* Unexpected ECTS PGN (PGN in ECTS is bad) */
116 J1939_XTP_ABORT_ECTS_TOO_BIG = 15,
117 /* ECTS requested packets exceeds message size */
119 J1939_XTP_ABORT_OTHER = 250,
120 /* Any other reason (if a Connection Abort reason is
121 * identified that is not listed in the table use code 250)
125 static unsigned int j1939_tp_block = 255;
126 static unsigned int j1939_tp_packet_delay;
127 static unsigned int j1939_tp_padding = 1;
130 static const char *j1939_xtp_abort_to_str(enum j1939_xtp_abort abort)
133 case J1939_XTP_ABORT_BUSY:
134 return "Already in one or more connection managed sessions and cannot support another.";
135 case J1939_XTP_ABORT_RESOURCE:
136 return "System resources were needed for another task so this connection managed session was terminated.";
137 case J1939_XTP_ABORT_TIMEOUT:
138 return "A timeout occurred and this is the connection abort to close the session.";
139 case J1939_XTP_ABORT_GENERIC:
140 return "CTS messages received when data transfer is in progress";
141 case J1939_XTP_ABORT_FAULT:
142 return "Maximal retransmit request limit reached";
143 case J1939_XTP_ABORT_UNEXPECTED_DATA:
144 return "Unexpected data transfer packet";
145 case J1939_XTP_ABORT_BAD_SEQ:
146 return "Bad sequence number (and software is not able to recover)";
147 case J1939_XTP_ABORT_DUP_SEQ:
148 return "Duplicate sequence number (and software is not able to recover)";
149 case J1939_XTP_ABORT_EDPO_UNEXPECTED:
150 return "Unexpected EDPO packet (ETP) or Message size > 1785 bytes (TP)";
151 case J1939_XTP_ABORT_BAD_EDPO_PGN:
152 return "Unexpected EDPO PGN (PGN in EDPO is bad)";
153 case J1939_XTP_ABORT_EDPO_OUTOF_CTS:
154 return "EDPO number of packets is greater than CTS";
155 case J1939_XTP_ABORT_BAD_EDPO_OFFSET:
156 return "Bad EDPO offset";
157 case J1939_XTP_ABORT_OTHER_DEPRECATED:
158 return "Deprecated. Use 250 instead (Any other reason)";
159 case J1939_XTP_ABORT_ECTS_UNXPECTED_PGN:
160 return "Unexpected ECTS PGN (PGN in ECTS is bad)";
161 case J1939_XTP_ABORT_ECTS_TOO_BIG:
162 return "ECTS requested packets exceeds message size";
163 case J1939_XTP_ABORT_OTHER:
164 return "Any other reason (if a Connection Abort reason is identified that is not listed in the table use code 250)";
170 static int j1939_xtp_abort_to_errno(struct j1939_priv *priv,
171 enum j1939_xtp_abort abort)
176 case J1939_XTP_NO_ABORT:
177 WARN_ON_ONCE(abort == J1939_XTP_NO_ABORT);
180 case J1939_XTP_ABORT_BUSY:
183 case J1939_XTP_ABORT_RESOURCE:
186 case J1939_XTP_ABORT_TIMEOUT:
189 case J1939_XTP_ABORT_GENERIC:
192 case J1939_XTP_ABORT_FAULT:
193 err = ENOTRECOVERABLE;
195 case J1939_XTP_ABORT_UNEXPECTED_DATA:
198 case J1939_XTP_ABORT_BAD_SEQ:
201 case J1939_XTP_ABORT_DUP_SEQ:
204 case J1939_XTP_ABORT_EDPO_UNEXPECTED:
207 case J1939_XTP_ABORT_BAD_EDPO_PGN:
210 case J1939_XTP_ABORT_EDPO_OUTOF_CTS:
213 case J1939_XTP_ABORT_BAD_EDPO_OFFSET:
216 case J1939_XTP_ABORT_OTHER_DEPRECATED:
219 case J1939_XTP_ABORT_ECTS_UNXPECTED_PGN:
222 case J1939_XTP_ABORT_ECTS_TOO_BIG:
225 case J1939_XTP_ABORT_OTHER:
229 netdev_warn(priv->ndev, "Unknown abort code %i", abort);
236 static inline void j1939_session_list_lock(struct j1939_priv *priv)
238 spin_lock_bh(&priv->active_session_list_lock);
241 static inline void j1939_session_list_unlock(struct j1939_priv *priv)
243 spin_unlock_bh(&priv->active_session_list_lock);
246 void j1939_session_get(struct j1939_session *session)
248 kref_get(&session->kref);
251 /* session completion functions */
252 static void __j1939_session_drop(struct j1939_session *session)
254 if (!session->transmission)
257 j1939_sock_pending_del(session->sk);
258 sock_put(session->sk);
261 static void j1939_session_destroy(struct j1939_session *session)
264 j1939_sk_errqueue(session, J1939_ERRQUEUE_ABORT);
266 j1939_sk_errqueue(session, J1939_ERRQUEUE_ACK);
268 netdev_dbg(session->priv->ndev, "%s: 0x%p\n", __func__, session);
270 WARN_ON_ONCE(!list_empty(&session->sk_session_queue_entry));
271 WARN_ON_ONCE(!list_empty(&session->active_session_list_entry));
273 skb_queue_purge(&session->skb_queue);
274 __j1939_session_drop(session);
275 j1939_priv_put(session->priv);
279 static void __j1939_session_release(struct kref *kref)
281 struct j1939_session *session = container_of(kref, struct j1939_session,
284 j1939_session_destroy(session);
287 void j1939_session_put(struct j1939_session *session)
289 kref_put(&session->kref, __j1939_session_release);
292 static void j1939_session_txtimer_cancel(struct j1939_session *session)
294 if (hrtimer_cancel(&session->txtimer))
295 j1939_session_put(session);
298 static void j1939_session_rxtimer_cancel(struct j1939_session *session)
300 if (hrtimer_cancel(&session->rxtimer))
301 j1939_session_put(session);
304 void j1939_session_timers_cancel(struct j1939_session *session)
306 j1939_session_txtimer_cancel(session);
307 j1939_session_rxtimer_cancel(session);
310 static inline bool j1939_cb_is_broadcast(const struct j1939_sk_buff_cb *skcb)
312 return (!skcb->addr.dst_name && (skcb->addr.da == 0xff));
315 static void j1939_session_skb_drop_old(struct j1939_session *session)
317 struct sk_buff *do_skb;
318 struct j1939_sk_buff_cb *do_skcb;
319 unsigned int offset_start;
322 if (skb_queue_len(&session->skb_queue) < 2)
325 offset_start = session->pkt.tx_acked * 7;
327 spin_lock_irqsave(&session->skb_queue.lock, flags);
328 do_skb = skb_peek(&session->skb_queue);
329 do_skcb = j1939_skb_to_cb(do_skb);
331 if ((do_skcb->offset + do_skb->len) < offset_start) {
332 __skb_unlink(do_skb, &session->skb_queue);
333 /* drop ref taken in j1939_session_skb_queue() */
338 spin_unlock_irqrestore(&session->skb_queue.lock, flags);
341 void j1939_session_skb_queue(struct j1939_session *session,
344 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb);
345 struct j1939_priv *priv = session->priv;
347 j1939_ac_fixup(priv, skb);
349 if (j1939_address_is_unicast(skcb->addr.da) &&
350 priv->ents[skcb->addr.da].nusers)
351 skcb->flags |= J1939_ECU_LOCAL_DST;
353 skcb->flags |= J1939_ECU_LOCAL_SRC;
356 skb_queue_tail(&session->skb_queue, skb);
360 sk_buff *j1939_session_skb_get_by_offset(struct j1939_session *session,
361 unsigned int offset_start)
363 struct j1939_priv *priv = session->priv;
364 struct j1939_sk_buff_cb *do_skcb;
365 struct sk_buff *skb = NULL;
366 struct sk_buff *do_skb;
369 spin_lock_irqsave(&session->skb_queue.lock, flags);
370 skb_queue_walk(&session->skb_queue, do_skb) {
371 do_skcb = j1939_skb_to_cb(do_skb);
373 if (offset_start >= do_skcb->offset &&
374 offset_start < (do_skcb->offset + do_skb->len)) {
382 spin_unlock_irqrestore(&session->skb_queue.lock, flags);
385 netdev_dbg(priv->ndev, "%s: 0x%p: no skb found for start: %i, queue size: %i\n",
386 __func__, session, offset_start,
387 skb_queue_len(&session->skb_queue));
392 static struct sk_buff *j1939_session_skb_get(struct j1939_session *session)
394 unsigned int offset_start;
396 offset_start = session->pkt.dpo * 7;
397 return j1939_session_skb_get_by_offset(session, offset_start);
400 /* see if we are receiver
401 * returns 0 for broadcasts, although we will receive them
403 static inline int j1939_tp_im_receiver(const struct j1939_sk_buff_cb *skcb)
405 return skcb->flags & J1939_ECU_LOCAL_DST;
408 /* see if we are sender */
409 static inline int j1939_tp_im_transmitter(const struct j1939_sk_buff_cb *skcb)
411 return skcb->flags & J1939_ECU_LOCAL_SRC;
414 /* see if we are involved as either receiver or transmitter */
415 static int j1939_tp_im_involved(const struct j1939_sk_buff_cb *skcb, bool swap)
418 return j1939_tp_im_receiver(skcb);
420 return j1939_tp_im_transmitter(skcb);
423 static int j1939_tp_im_involved_anydir(struct j1939_sk_buff_cb *skcb)
425 return skcb->flags & (J1939_ECU_LOCAL_SRC | J1939_ECU_LOCAL_DST);
428 /* extract pgn from flow-ctl message */
429 static inline pgn_t j1939_xtp_ctl_to_pgn(const u8 *dat)
433 pgn = (dat[7] << 16) | (dat[6] << 8) | (dat[5] << 0);
434 if (j1939_pgn_is_pdu1(pgn))
439 static inline unsigned int j1939_tp_ctl_to_size(const u8 *dat)
441 return (dat[2] << 8) + (dat[1] << 0);
444 static inline unsigned int j1939_etp_ctl_to_packet(const u8 *dat)
446 return (dat[4] << 16) | (dat[3] << 8) | (dat[2] << 0);
449 static inline unsigned int j1939_etp_ctl_to_size(const u8 *dat)
451 return (dat[4] << 24) | (dat[3] << 16) |
452 (dat[2] << 8) | (dat[1] << 0);
455 /* find existing session:
456 * reverse: swap cb's src & dst
457 * there is no problem with matching broadcasts, since
458 * broadcasts (no dst, no da) would never call this
459 * with reverse == true
461 static bool j1939_session_match(struct j1939_addr *se_addr,
462 struct j1939_addr *sk_addr, bool reverse)
464 if (se_addr->type != sk_addr->type)
468 if (se_addr->src_name) {
469 if (se_addr->src_name != sk_addr->dst_name)
471 } else if (se_addr->sa != sk_addr->da) {
475 if (se_addr->dst_name) {
476 if (se_addr->dst_name != sk_addr->src_name)
478 } else if (se_addr->da != sk_addr->sa) {
482 if (se_addr->src_name) {
483 if (se_addr->src_name != sk_addr->src_name)
485 } else if (se_addr->sa != sk_addr->sa) {
489 if (se_addr->dst_name) {
490 if (se_addr->dst_name != sk_addr->dst_name)
492 } else if (se_addr->da != sk_addr->da) {
501 j1939_session *j1939_session_get_by_addr_locked(struct j1939_priv *priv,
502 struct list_head *root,
503 struct j1939_addr *addr,
504 bool reverse, bool transmitter)
506 struct j1939_session *session;
508 lockdep_assert_held(&priv->active_session_list_lock);
510 list_for_each_entry(session, root, active_session_list_entry) {
511 j1939_session_get(session);
512 if (j1939_session_match(&session->skcb.addr, addr, reverse) &&
513 session->transmission == transmitter)
515 j1939_session_put(session);
522 j1939_session *j1939_session_get_simple(struct j1939_priv *priv,
525 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb);
526 struct j1939_session *session;
528 lockdep_assert_held(&priv->active_session_list_lock);
530 list_for_each_entry(session, &priv->active_session_list,
531 active_session_list_entry) {
532 j1939_session_get(session);
533 if (session->skcb.addr.type == J1939_SIMPLE &&
534 session->tskey == skcb->tskey && session->sk == skb->sk)
536 j1939_session_put(session);
543 j1939_session *j1939_session_get_by_addr(struct j1939_priv *priv,
544 struct j1939_addr *addr,
545 bool reverse, bool transmitter)
547 struct j1939_session *session;
549 j1939_session_list_lock(priv);
550 session = j1939_session_get_by_addr_locked(priv,
551 &priv->active_session_list,
552 addr, reverse, transmitter);
553 j1939_session_list_unlock(priv);
558 static void j1939_skbcb_swap(struct j1939_sk_buff_cb *skcb)
562 swap(skcb->addr.dst_name, skcb->addr.src_name);
563 swap(skcb->addr.da, skcb->addr.sa);
565 /* swap SRC and DST flags, leave other untouched */
566 if (skcb->flags & J1939_ECU_LOCAL_SRC)
567 tmp |= J1939_ECU_LOCAL_DST;
568 if (skcb->flags & J1939_ECU_LOCAL_DST)
569 tmp |= J1939_ECU_LOCAL_SRC;
570 skcb->flags &= ~(J1939_ECU_LOCAL_SRC | J1939_ECU_LOCAL_DST);
575 sk_buff *j1939_tp_tx_dat_new(struct j1939_priv *priv,
576 const struct j1939_sk_buff_cb *re_skcb,
581 struct j1939_sk_buff_cb *skcb;
583 skb = alloc_skb(sizeof(struct can_frame) + sizeof(struct can_skb_priv),
586 return ERR_PTR(-ENOMEM);
588 skb->dev = priv->ndev;
589 can_skb_reserve(skb);
590 can_skb_prv(skb)->ifindex = priv->ndev->ifindex;
591 can_skb_prv(skb)->skbcnt = 0;
592 /* reserve CAN header */
593 skb_reserve(skb, offsetof(struct can_frame, data));
595 memcpy(skb->cb, re_skcb, sizeof(skb->cb));
596 skcb = j1939_skb_to_cb(skb);
598 j1939_skbcb_swap(skcb);
601 if (skcb->addr.type == J1939_ETP)
602 skcb->addr.pgn = J1939_ETP_PGN_CTL;
604 skcb->addr.pgn = J1939_TP_PGN_CTL;
606 if (skcb->addr.type == J1939_ETP)
607 skcb->addr.pgn = J1939_ETP_PGN_DAT;
609 skcb->addr.pgn = J1939_TP_PGN_DAT;
615 /* TP transmit packet functions */
616 static int j1939_tp_tx_dat(struct j1939_session *session,
617 const u8 *dat, int len)
619 struct j1939_priv *priv = session->priv;
622 skb = j1939_tp_tx_dat_new(priv, &session->skcb,
627 skb_put_data(skb, dat, len);
628 if (j1939_tp_padding && len < 8)
629 memset(skb_put(skb, 8 - len), 0xff, 8 - len);
631 return j1939_send_one(priv, skb);
634 static int j1939_xtp_do_tx_ctl(struct j1939_priv *priv,
635 const struct j1939_sk_buff_cb *re_skcb,
636 bool swap_src_dst, pgn_t pgn, const u8 *dat)
641 if (!j1939_tp_im_involved(re_skcb, swap_src_dst))
644 skb = j1939_tp_tx_dat_new(priv, re_skcb, true, swap_src_dst);
648 skdat = skb_put(skb, 8);
649 memcpy(skdat, dat, 5);
650 skdat[5] = (pgn >> 0);
651 skdat[6] = (pgn >> 8);
652 skdat[7] = (pgn >> 16);
654 return j1939_send_one(priv, skb);
657 static inline int j1939_tp_tx_ctl(struct j1939_session *session,
658 bool swap_src_dst, const u8 *dat)
660 struct j1939_priv *priv = session->priv;
662 return j1939_xtp_do_tx_ctl(priv, &session->skcb,
664 session->skcb.addr.pgn, dat);
667 static int j1939_xtp_tx_abort(struct j1939_priv *priv,
668 const struct j1939_sk_buff_cb *re_skcb,
670 enum j1939_xtp_abort err,
675 if (!j1939_tp_im_involved(re_skcb, swap_src_dst))
678 memset(dat, 0xff, sizeof(dat));
679 dat[0] = J1939_TP_CMD_ABORT;
681 return j1939_xtp_do_tx_ctl(priv, re_skcb, swap_src_dst, pgn, dat);
684 void j1939_tp_schedule_txtimer(struct j1939_session *session, int msec)
686 j1939_session_get(session);
687 hrtimer_start(&session->txtimer, ms_to_ktime(msec),
688 HRTIMER_MODE_REL_SOFT);
691 static inline void j1939_tp_set_rxtimeout(struct j1939_session *session,
694 j1939_session_rxtimer_cancel(session);
695 j1939_session_get(session);
696 hrtimer_start(&session->rxtimer, ms_to_ktime(msec),
697 HRTIMER_MODE_REL_SOFT);
700 static int j1939_session_tx_rts(struct j1939_session *session)
705 memset(dat, 0xff, sizeof(dat));
707 dat[1] = (session->total_message_size >> 0);
708 dat[2] = (session->total_message_size >> 8);
709 dat[3] = session->pkt.total;
711 if (session->skcb.addr.type == J1939_ETP) {
712 dat[0] = J1939_ETP_CMD_RTS;
713 dat[1] = (session->total_message_size >> 0);
714 dat[2] = (session->total_message_size >> 8);
715 dat[3] = (session->total_message_size >> 16);
716 dat[4] = (session->total_message_size >> 24);
717 } else if (j1939_cb_is_broadcast(&session->skcb)) {
718 dat[0] = J1939_TP_CMD_BAM;
719 /* fake cts for broadcast */
722 dat[0] = J1939_TP_CMD_RTS;
726 if (dat[0] == session->last_txcmd)
730 ret = j1939_tp_tx_ctl(session, false, dat);
734 session->last_txcmd = dat[0];
735 if (dat[0] == J1939_TP_CMD_BAM) {
736 j1939_tp_schedule_txtimer(session, 50);
737 j1939_tp_set_rxtimeout(session, 250);
739 j1939_tp_set_rxtimeout(session, 1250);
742 netdev_dbg(session->priv->ndev, "%s: 0x%p\n", __func__, session);
747 static int j1939_session_tx_dpo(struct j1939_session *session)
753 memset(dat, 0xff, sizeof(dat));
755 dat[0] = J1939_ETP_CMD_DPO;
756 session->pkt.dpo = session->pkt.tx_acked;
757 pkt = session->pkt.dpo;
758 dat[1] = session->pkt.last - session->pkt.tx_acked;
761 dat[4] = (pkt >> 16);
763 ret = j1939_tp_tx_ctl(session, false, dat);
767 session->last_txcmd = dat[0];
768 j1939_tp_set_rxtimeout(session, 1250);
769 session->pkt.tx = session->pkt.tx_acked;
771 netdev_dbg(session->priv->ndev, "%s: 0x%p\n", __func__, session);
776 static int j1939_session_tx_dat(struct j1939_session *session)
778 struct j1939_priv *priv = session->priv;
779 struct j1939_sk_buff_cb *skcb;
780 int offset, pkt_done, pkt_end;
781 unsigned int len, pdelay;
782 struct sk_buff *se_skb;
787 se_skb = j1939_session_skb_get_by_offset(session, session->pkt.tx * 7);
791 skcb = j1939_skb_to_cb(se_skb);
792 tpdat = se_skb->data;
795 if (session->skcb.addr.type != J1939_ETP &&
796 j1939_cb_is_broadcast(&session->skcb))
797 pkt_end = session->pkt.total;
799 pkt_end = session->pkt.last;
801 while (session->pkt.tx < pkt_end) {
802 dat[0] = session->pkt.tx - session->pkt.dpo + 1;
803 offset = (session->pkt.tx * 7) - skcb->offset;
804 len = se_skb->len - offset;
808 if (offset + len > se_skb->len) {
809 netdev_err_once(priv->ndev,
810 "%s: 0x%p: requested data outside of queued buffer: offset %i, len %i, pkt.tx: %i\n",
811 __func__, session, skcb->offset, se_skb->len , session->pkt.tx);
821 memcpy(&dat[1], &tpdat[offset], len);
822 ret = j1939_tp_tx_dat(session, dat, len + 1);
824 /* ENOBUS == CAN interface TX queue is full */
826 netdev_alert(priv->ndev,
827 "%s: 0x%p: queue data error: %i\n",
828 __func__, session, ret);
832 session->last_txcmd = 0xff;
835 pdelay = j1939_cb_is_broadcast(&session->skcb) ? 50 :
836 j1939_tp_packet_delay;
838 if (session->pkt.tx < session->pkt.total && pdelay) {
839 j1939_tp_schedule_txtimer(session, pdelay);
845 j1939_tp_set_rxtimeout(session, 250);
856 static int j1939_xtp_txnext_transmiter(struct j1939_session *session)
858 struct j1939_priv *priv = session->priv;
861 if (!j1939_tp_im_transmitter(&session->skcb)) {
862 netdev_alert(priv->ndev, "%s: 0x%p: called by not transmitter!\n",
867 switch (session->last_cmd) {
869 ret = j1939_session_tx_rts(session);
872 case J1939_ETP_CMD_CTS:
873 if (session->last_txcmd != J1939_ETP_CMD_DPO) {
874 ret = j1939_session_tx_dpo(session);
880 case J1939_TP_CMD_CTS:
881 case 0xff: /* did some data */
882 case J1939_ETP_CMD_DPO:
883 case J1939_TP_CMD_BAM:
884 ret = j1939_session_tx_dat(session);
888 netdev_alert(priv->ndev, "%s: 0x%p: unexpected last_cmd: %x\n",
889 __func__, session, session->last_cmd);
895 static int j1939_session_tx_cts(struct j1939_session *session)
897 struct j1939_priv *priv = session->priv;
898 unsigned int pkt, len;
902 if (!j1939_sk_recv_match(priv, &session->skcb))
905 len = session->pkt.total - session->pkt.rx;
906 len = min3(len, session->pkt.block, j1939_tp_block ?: 255);
907 memset(dat, 0xff, sizeof(dat));
909 if (session->skcb.addr.type == J1939_ETP) {
910 pkt = session->pkt.rx + 1;
911 dat[0] = J1939_ETP_CMD_CTS;
915 dat[4] = (pkt >> 16);
917 dat[0] = J1939_TP_CMD_CTS;
919 dat[2] = session->pkt.rx + 1;
922 if (dat[0] == session->last_txcmd)
926 ret = j1939_tp_tx_ctl(session, true, dat);
931 /* only mark cts done when len is set */
932 session->last_txcmd = dat[0];
933 j1939_tp_set_rxtimeout(session, 1250);
935 netdev_dbg(session->priv->ndev, "%s: 0x%p\n", __func__, session);
940 static int j1939_session_tx_eoma(struct j1939_session *session)
942 struct j1939_priv *priv = session->priv;
946 if (!j1939_sk_recv_match(priv, &session->skcb))
949 memset(dat, 0xff, sizeof(dat));
951 if (session->skcb.addr.type == J1939_ETP) {
952 dat[0] = J1939_ETP_CMD_EOMA;
953 dat[1] = session->total_message_size >> 0;
954 dat[2] = session->total_message_size >> 8;
955 dat[3] = session->total_message_size >> 16;
956 dat[4] = session->total_message_size >> 24;
958 dat[0] = J1939_TP_CMD_EOMA;
959 dat[1] = session->total_message_size;
960 dat[2] = session->total_message_size >> 8;
961 dat[3] = session->pkt.total;
964 if (dat[0] == session->last_txcmd)
968 ret = j1939_tp_tx_ctl(session, true, dat);
972 session->last_txcmd = dat[0];
974 /* wait for the EOMA packet to come in */
975 j1939_tp_set_rxtimeout(session, 1250);
977 netdev_dbg(session->priv->ndev, "%p: 0x%p\n", __func__, session);
982 static int j1939_xtp_txnext_receiver(struct j1939_session *session)
984 struct j1939_priv *priv = session->priv;
987 if (!j1939_tp_im_receiver(&session->skcb)) {
988 netdev_alert(priv->ndev, "%s: 0x%p: called by not receiver!\n",
993 switch (session->last_cmd) {
994 case J1939_TP_CMD_RTS:
995 case J1939_ETP_CMD_RTS:
996 ret = j1939_session_tx_cts(session);
999 case J1939_ETP_CMD_CTS:
1000 case J1939_TP_CMD_CTS:
1001 case 0xff: /* did some data */
1002 case J1939_ETP_CMD_DPO:
1003 if ((session->skcb.addr.type == J1939_TP &&
1004 j1939_cb_is_broadcast(&session->skcb)))
1007 if (session->pkt.rx >= session->pkt.total) {
1008 ret = j1939_session_tx_eoma(session);
1009 } else if (session->pkt.rx >= session->pkt.last) {
1010 session->last_txcmd = 0;
1011 ret = j1939_session_tx_cts(session);
1015 netdev_alert(priv->ndev, "%s: 0x%p: unexpected last_cmd: %x\n",
1016 __func__, session, session->last_cmd);
1022 static int j1939_simple_txnext(struct j1939_session *session)
1024 struct j1939_priv *priv = session->priv;
1025 struct sk_buff *se_skb = j1939_session_skb_get(session);
1026 struct sk_buff *skb;
1032 skb = skb_clone(se_skb, GFP_ATOMIC);
1038 can_skb_set_owner(skb, se_skb->sk);
1040 j1939_tp_set_rxtimeout(session, J1939_SIMPLE_ECHO_TIMEOUT_MS);
1042 ret = j1939_send_one(priv, skb);
1046 j1939_sk_errqueue(session, J1939_ERRQUEUE_SCHED);
1047 j1939_sk_queue_activate_next(session);
1053 consume_skb(se_skb);
1058 static bool j1939_session_deactivate_locked(struct j1939_session *session)
1060 bool active = false;
1062 lockdep_assert_held(&session->priv->active_session_list_lock);
1064 if (session->state >= J1939_SESSION_ACTIVE &&
1065 session->state < J1939_SESSION_ACTIVE_MAX) {
1068 list_del_init(&session->active_session_list_entry);
1069 session->state = J1939_SESSION_DONE;
1070 j1939_session_put(session);
1076 static bool j1939_session_deactivate(struct j1939_session *session)
1078 struct j1939_priv *priv = session->priv;
1081 j1939_session_list_lock(priv);
1082 /* This function should be called with a session ref-count of at
1085 WARN_ON_ONCE(kref_read(&session->kref) < 2);
1086 active = j1939_session_deactivate_locked(session);
1087 j1939_session_list_unlock(priv);
1093 j1939_session_deactivate_activate_next(struct j1939_session *session)
1095 if (j1939_session_deactivate(session))
1096 j1939_sk_queue_activate_next(session);
1099 static void __j1939_session_cancel(struct j1939_session *session,
1100 enum j1939_xtp_abort err)
1102 struct j1939_priv *priv = session->priv;
1105 lockdep_assert_held(&session->priv->active_session_list_lock);
1107 session->err = j1939_xtp_abort_to_errno(priv, err);
1108 session->state = J1939_SESSION_WAITING_ABORT;
1109 /* do not send aborts on incoming broadcasts */
1110 if (!j1939_cb_is_broadcast(&session->skcb)) {
1111 j1939_xtp_tx_abort(priv, &session->skcb,
1112 !session->transmission,
1113 err, session->skcb.addr.pgn);
1117 j1939_sk_send_loop_abort(session->sk, session->err);
1120 static void j1939_session_cancel(struct j1939_session *session,
1121 enum j1939_xtp_abort err)
1123 j1939_session_list_lock(session->priv);
1125 if (session->state >= J1939_SESSION_ACTIVE &&
1126 session->state < J1939_SESSION_WAITING_ABORT) {
1127 j1939_tp_set_rxtimeout(session, J1939_XTP_ABORT_TIMEOUT_MS);
1128 __j1939_session_cancel(session, err);
1131 j1939_session_list_unlock(session->priv);
1134 static enum hrtimer_restart j1939_tp_txtimer(struct hrtimer *hrtimer)
1136 struct j1939_session *session =
1137 container_of(hrtimer, struct j1939_session, txtimer);
1138 struct j1939_priv *priv = session->priv;
1141 if (session->skcb.addr.type == J1939_SIMPLE) {
1142 ret = j1939_simple_txnext(session);
1144 if (session->transmission)
1145 ret = j1939_xtp_txnext_transmiter(session);
1147 ret = j1939_xtp_txnext_receiver(session);
1152 /* Retry limit is currently arbitrary chosen */
1153 if (session->tx_retry < J1939_XTP_TX_RETRY_LIMIT) {
1154 session->tx_retry++;
1155 j1939_tp_schedule_txtimer(session,
1156 10 + prandom_u32_max(16));
1158 netdev_alert(priv->ndev, "%s: 0x%p: tx retry count reached\n",
1160 session->err = -ENETUNREACH;
1161 j1939_session_rxtimer_cancel(session);
1162 j1939_session_deactivate_activate_next(session);
1166 /* In this case we should get a netdev_event(), all active
1167 * sessions will be cleared by
1168 * j1939_cancel_all_active_sessions(). So handle this as an
1169 * error, but let j1939_cancel_all_active_sessions() do the
1170 * cleanup including propagation of the error to user space.
1174 j1939_session_cancel(session, J1939_XTP_ABORT_ECTS_TOO_BIG);
1177 session->tx_retry = 0;
1180 netdev_alert(priv->ndev, "%s: 0x%p: tx aborted with unknown reason: %i\n",
1181 __func__, session, ret);
1182 if (session->skcb.addr.type != J1939_SIMPLE) {
1183 j1939_session_cancel(session, J1939_XTP_ABORT_OTHER);
1186 j1939_session_rxtimer_cancel(session);
1187 j1939_session_deactivate_activate_next(session);
1191 j1939_session_put(session);
1193 return HRTIMER_NORESTART;
1196 static void j1939_session_completed(struct j1939_session *session)
1198 struct sk_buff *skb;
1200 if (!session->transmission) {
1201 skb = j1939_session_skb_get(session);
1202 /* distribute among j1939 receivers */
1203 j1939_sk_recv(session->priv, skb);
1207 j1939_session_deactivate_activate_next(session);
1210 static enum hrtimer_restart j1939_tp_rxtimer(struct hrtimer *hrtimer)
1212 struct j1939_session *session = container_of(hrtimer,
1213 struct j1939_session,
1215 struct j1939_priv *priv = session->priv;
1217 if (session->state == J1939_SESSION_WAITING_ABORT) {
1218 netdev_alert(priv->ndev, "%s: 0x%p: abort rx timeout. Force session deactivation\n",
1221 j1939_session_deactivate_activate_next(session);
1223 } else if (session->skcb.addr.type == J1939_SIMPLE) {
1224 netdev_alert(priv->ndev, "%s: 0x%p: Timeout. Failed to send simple message.\n",
1227 /* The message is probably stuck in the CAN controller and can
1228 * be send as soon as CAN bus is in working state again.
1230 session->err = -ETIME;
1231 j1939_session_deactivate(session);
1233 j1939_session_list_lock(session->priv);
1234 if (session->state >= J1939_SESSION_ACTIVE &&
1235 session->state < J1939_SESSION_ACTIVE_MAX) {
1236 netdev_alert(priv->ndev, "%s: 0x%p: rx timeout, send abort\n",
1238 j1939_session_get(session);
1239 hrtimer_start(&session->rxtimer,
1240 ms_to_ktime(J1939_XTP_ABORT_TIMEOUT_MS),
1241 HRTIMER_MODE_REL_SOFT);
1242 __j1939_session_cancel(session, J1939_XTP_ABORT_TIMEOUT);
1244 j1939_session_list_unlock(session->priv);
1247 j1939_session_put(session);
1249 return HRTIMER_NORESTART;
1252 static bool j1939_xtp_rx_cmd_bad_pgn(struct j1939_session *session,
1253 const struct sk_buff *skb)
1255 const struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb);
1256 pgn_t pgn = j1939_xtp_ctl_to_pgn(skb->data);
1257 struct j1939_priv *priv = session->priv;
1258 enum j1939_xtp_abort abort = J1939_XTP_NO_ABORT;
1259 u8 cmd = skb->data[0];
1261 if (session->skcb.addr.pgn == pgn)
1265 case J1939_TP_CMD_BAM:
1266 abort = J1939_XTP_NO_ABORT;
1269 case J1939_ETP_CMD_RTS:
1270 case J1939_TP_CMD_RTS: /* fall through */
1271 abort = J1939_XTP_ABORT_BUSY;
1274 case J1939_ETP_CMD_CTS:
1275 case J1939_TP_CMD_CTS: /* fall through */
1276 abort = J1939_XTP_ABORT_ECTS_UNXPECTED_PGN;
1279 case J1939_ETP_CMD_DPO:
1280 abort = J1939_XTP_ABORT_BAD_EDPO_PGN;
1283 case J1939_ETP_CMD_EOMA:
1284 case J1939_TP_CMD_EOMA: /* fall through */
1285 abort = J1939_XTP_ABORT_OTHER;
1288 case J1939_ETP_CMD_ABORT: /* && J1939_TP_CMD_ABORT */
1289 abort = J1939_XTP_NO_ABORT;
1297 netdev_warn(priv->ndev, "%s: 0x%p: CMD 0x%02x with PGN 0x%05x for running session with different PGN 0x%05x.\n",
1298 __func__, session, cmd, pgn, session->skcb.addr.pgn);
1299 if (abort != J1939_XTP_NO_ABORT)
1300 j1939_xtp_tx_abort(priv, skcb, true, abort, pgn);
1305 static void j1939_xtp_rx_abort_one(struct j1939_priv *priv, struct sk_buff *skb,
1306 bool reverse, bool transmitter)
1308 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb);
1309 struct j1939_session *session;
1310 u8 abort = skb->data[1];
1312 session = j1939_session_get_by_addr(priv, &skcb->addr, reverse,
1317 if (j1939_xtp_rx_cmd_bad_pgn(session, skb))
1320 netdev_info(priv->ndev, "%s: 0x%p: 0x%05x: (%u) %s\n", __func__,
1321 session, j1939_xtp_ctl_to_pgn(skb->data), abort,
1322 j1939_xtp_abort_to_str(abort));
1324 j1939_session_timers_cancel(session);
1325 session->err = j1939_xtp_abort_to_errno(priv, abort);
1327 j1939_sk_send_loop_abort(session->sk, session->err);
1328 j1939_session_deactivate_activate_next(session);
1331 j1939_session_put(session);
1334 /* abort packets may come in 2 directions */
1336 j1939_xtp_rx_abort(struct j1939_priv *priv, struct sk_buff *skb,
1339 j1939_xtp_rx_abort_one(priv, skb, false, transmitter);
1340 j1939_xtp_rx_abort_one(priv, skb, true, transmitter);
1344 j1939_xtp_rx_eoma_one(struct j1939_session *session, struct sk_buff *skb)
1346 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb);
1350 if (j1939_xtp_rx_cmd_bad_pgn(session, skb))
1355 if (skcb->addr.type == J1939_ETP)
1356 len = j1939_etp_ctl_to_size(dat);
1358 len = j1939_tp_ctl_to_size(dat);
1360 if (session->total_message_size != len) {
1361 netdev_warn_once(session->priv->ndev,
1362 "%s: 0x%p: Incorrect size. Expected: %i; got: %i.\n",
1363 __func__, session, session->total_message_size,
1367 netdev_dbg(session->priv->ndev, "%s: 0x%p\n", __func__, session);
1369 session->pkt.tx_acked = session->pkt.total;
1370 j1939_session_timers_cancel(session);
1371 /* transmitted without problems */
1372 j1939_session_completed(session);
1376 j1939_xtp_rx_eoma(struct j1939_priv *priv, struct sk_buff *skb,
1379 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb);
1380 struct j1939_session *session;
1382 session = j1939_session_get_by_addr(priv, &skcb->addr, true,
1387 j1939_xtp_rx_eoma_one(session, skb);
1388 j1939_session_put(session);
1392 j1939_xtp_rx_cts_one(struct j1939_session *session, struct sk_buff *skb)
1394 enum j1939_xtp_abort err = J1939_XTP_ABORT_FAULT;
1400 if (j1939_xtp_rx_cmd_bad_pgn(session, skb))
1403 netdev_dbg(session->priv->ndev, "%s: 0x%p\n", __func__, session);
1405 if (session->last_cmd == dat[0]) {
1406 err = J1939_XTP_ABORT_DUP_SEQ;
1407 goto out_session_cancel;
1410 if (session->skcb.addr.type == J1939_ETP)
1411 pkt = j1939_etp_ctl_to_packet(dat);
1416 goto out_session_cancel;
1417 else if (dat[1] > session->pkt.block /* 0xff for etp */)
1418 goto out_session_cancel;
1420 /* set packet counters only when not CTS(0) */
1421 session->pkt.tx_acked = pkt - 1;
1422 j1939_session_skb_drop_old(session);
1423 session->pkt.last = session->pkt.tx_acked + dat[1];
1424 if (session->pkt.last > session->pkt.total)
1425 /* safety measure */
1426 session->pkt.last = session->pkt.total;
1427 /* TODO: do not set tx here, do it in txtimer */
1428 session->pkt.tx = session->pkt.tx_acked;
1430 session->last_cmd = dat[0];
1432 j1939_tp_set_rxtimeout(session, 1250);
1433 if (session->transmission) {
1434 if (session->pkt.tx_acked)
1435 j1939_sk_errqueue(session,
1436 J1939_ERRQUEUE_SCHED);
1437 j1939_session_txtimer_cancel(session);
1438 j1939_tp_schedule_txtimer(session, 0);
1442 j1939_tp_set_rxtimeout(session, 550);
1447 j1939_session_timers_cancel(session);
1448 j1939_session_cancel(session, err);
1452 j1939_xtp_rx_cts(struct j1939_priv *priv, struct sk_buff *skb, bool transmitter)
1454 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb);
1455 struct j1939_session *session;
1457 session = j1939_session_get_by_addr(priv, &skcb->addr, true,
1461 j1939_xtp_rx_cts_one(session, skb);
1462 j1939_session_put(session);
1465 static struct j1939_session *j1939_session_new(struct j1939_priv *priv,
1466 struct sk_buff *skb, size_t size)
1468 struct j1939_session *session;
1469 struct j1939_sk_buff_cb *skcb;
1471 session = kzalloc(sizeof(*session), gfp_any());
1475 INIT_LIST_HEAD(&session->active_session_list_entry);
1476 INIT_LIST_HEAD(&session->sk_session_queue_entry);
1477 kref_init(&session->kref);
1479 j1939_priv_get(priv);
1480 session->priv = priv;
1481 session->total_message_size = size;
1482 session->state = J1939_SESSION_NEW;
1484 skb_queue_head_init(&session->skb_queue);
1485 skb_queue_tail(&session->skb_queue, skb);
1487 skcb = j1939_skb_to_cb(skb);
1488 memcpy(&session->skcb, skcb, sizeof(session->skcb));
1490 hrtimer_init(&session->txtimer, CLOCK_MONOTONIC,
1491 HRTIMER_MODE_REL_SOFT);
1492 session->txtimer.function = j1939_tp_txtimer;
1493 hrtimer_init(&session->rxtimer, CLOCK_MONOTONIC,
1494 HRTIMER_MODE_REL_SOFT);
1495 session->rxtimer.function = j1939_tp_rxtimer;
1497 netdev_dbg(priv->ndev, "%s: 0x%p: sa: %02x, da: %02x\n",
1498 __func__, session, skcb->addr.sa, skcb->addr.da);
1504 j1939_session *j1939_session_fresh_new(struct j1939_priv *priv,
1506 const struct j1939_sk_buff_cb *rel_skcb)
1508 struct sk_buff *skb;
1509 struct j1939_sk_buff_cb *skcb;
1510 struct j1939_session *session;
1512 skb = alloc_skb(size + sizeof(struct can_skb_priv), GFP_ATOMIC);
1516 skb->dev = priv->ndev;
1517 can_skb_reserve(skb);
1518 can_skb_prv(skb)->ifindex = priv->ndev->ifindex;
1519 can_skb_prv(skb)->skbcnt = 0;
1520 skcb = j1939_skb_to_cb(skb);
1521 memcpy(skcb, rel_skcb, sizeof(*skcb));
1523 session = j1939_session_new(priv, skb, size);
1529 /* alloc data area */
1531 /* skb is recounted in j1939_session_new() */
1535 int j1939_session_activate(struct j1939_session *session)
1537 struct j1939_priv *priv = session->priv;
1538 struct j1939_session *active = NULL;
1541 j1939_session_list_lock(priv);
1542 if (session->skcb.addr.type != J1939_SIMPLE)
1543 active = j1939_session_get_by_addr_locked(priv,
1544 &priv->active_session_list,
1545 &session->skcb.addr, false,
1546 session->transmission);
1548 j1939_session_put(active);
1551 WARN_ON_ONCE(session->state != J1939_SESSION_NEW);
1552 list_add_tail(&session->active_session_list_entry,
1553 &priv->active_session_list);
1554 j1939_session_get(session);
1555 session->state = J1939_SESSION_ACTIVE;
1557 netdev_dbg(session->priv->ndev, "%s: 0x%p\n",
1560 j1939_session_list_unlock(priv);
1566 j1939_session *j1939_xtp_rx_rts_session_new(struct j1939_priv *priv,
1567 struct sk_buff *skb)
1569 enum j1939_xtp_abort abort = J1939_XTP_NO_ABORT;
1570 struct j1939_sk_buff_cb skcb = *j1939_skb_to_cb(skb);
1571 struct j1939_session *session;
1576 netdev_dbg(priv->ndev, "%s\n", __func__);
1579 pgn = j1939_xtp_ctl_to_pgn(dat);
1580 skcb.addr.pgn = pgn;
1582 if (!j1939_sk_recv_match(priv, &skcb))
1585 if (skcb.addr.type == J1939_ETP) {
1586 len = j1939_etp_ctl_to_size(dat);
1587 if (len > J1939_MAX_ETP_PACKET_SIZE)
1588 abort = J1939_XTP_ABORT_FAULT;
1589 else if (len > priv->tp_max_packet_size)
1590 abort = J1939_XTP_ABORT_RESOURCE;
1591 else if (len <= J1939_MAX_TP_PACKET_SIZE)
1592 abort = J1939_XTP_ABORT_FAULT;
1594 len = j1939_tp_ctl_to_size(dat);
1595 if (len > J1939_MAX_TP_PACKET_SIZE)
1596 abort = J1939_XTP_ABORT_FAULT;
1597 else if (len > priv->tp_max_packet_size)
1598 abort = J1939_XTP_ABORT_RESOURCE;
1599 else if (len < J1939_MIN_TP_PACKET_SIZE)
1600 abort = J1939_XTP_ABORT_FAULT;
1603 if (abort != J1939_XTP_NO_ABORT) {
1604 j1939_xtp_tx_abort(priv, &skcb, true, abort, pgn);
1608 session = j1939_session_fresh_new(priv, len, &skcb);
1610 j1939_xtp_tx_abort(priv, &skcb, true,
1611 J1939_XTP_ABORT_RESOURCE, pgn);
1615 /* initialize the control buffer: plain copy */
1616 session->pkt.total = (len + 6) / 7;
1617 session->pkt.block = 0xff;
1618 if (skcb.addr.type != J1939_ETP) {
1619 if (dat[3] != session->pkt.total)
1620 netdev_alert(priv->ndev, "%s: 0x%p: strange total, %u != %u\n",
1621 __func__, session, session->pkt.total,
1623 session->pkt.total = dat[3];
1624 session->pkt.block = min(dat[3], dat[4]);
1627 session->pkt.rx = 0;
1628 session->pkt.tx = 0;
1630 WARN_ON_ONCE(j1939_session_activate(session));
1635 static int j1939_xtp_rx_rts_session_active(struct j1939_session *session,
1636 struct sk_buff *skb)
1638 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb);
1639 struct j1939_priv *priv = session->priv;
1641 if (!session->transmission) {
1642 if (j1939_xtp_rx_cmd_bad_pgn(session, skb))
1645 /* RTS on active session */
1646 j1939_session_timers_cancel(session);
1647 j1939_session_cancel(session, J1939_XTP_ABORT_BUSY);
1650 if (session->last_cmd != 0) {
1651 /* we received a second rts on the same connection */
1652 netdev_alert(priv->ndev, "%s: 0x%p: connection exists (%02x %02x). last cmd: %x\n",
1653 __func__, session, skcb->addr.sa, skcb->addr.da,
1656 j1939_session_timers_cancel(session);
1657 j1939_session_cancel(session, J1939_XTP_ABORT_BUSY);
1662 if (session->skcb.addr.sa != skcb->addr.sa ||
1663 session->skcb.addr.da != skcb->addr.da)
1664 netdev_warn(priv->ndev, "%s: 0x%p: session->skcb.addr.sa=0x%02x skcb->addr.sa=0x%02x session->skcb.addr.da=0x%02x skcb->addr.da=0x%02x\n",
1666 session->skcb.addr.sa, skcb->addr.sa,
1667 session->skcb.addr.da, skcb->addr.da);
1668 /* make sure 'sa' & 'da' are correct !
1669 * They may be 'not filled in yet' for sending
1670 * skb's, since they did not pass the Address Claim ever.
1672 session->skcb.addr.sa = skcb->addr.sa;
1673 session->skcb.addr.da = skcb->addr.da;
1675 netdev_dbg(session->priv->ndev, "%s: 0x%p\n", __func__, session);
1680 static void j1939_xtp_rx_rts(struct j1939_priv *priv, struct sk_buff *skb,
1683 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb);
1684 struct j1939_session *session;
1685 u8 cmd = skb->data[0];
1687 session = j1939_session_get_by_addr(priv, &skcb->addr, false,
1692 /* If we're the transmitter and this function is called,
1693 * we received our own RTS. A session has already been
1696 * For some reasons however it might have been destroyed
1697 * already. So don't create a new one here (using
1698 * "j1939_xtp_rx_rts_session_new()") as this will be a
1701 * The reasons the session is already destroyed might
1703 * - user space closed socket was and the session was
1705 * - session was aborted due to external abort message
1709 session = j1939_xtp_rx_rts_session_new(priv, skb);
1711 if (cmd == J1939_TP_CMD_BAM && j1939_sk_recv_match(priv, skcb))
1712 netdev_info(priv->ndev, "%s: failed to create TP BAM session\n",
1717 if (j1939_xtp_rx_rts_session_active(session, skb)) {
1718 j1939_session_put(session);
1722 session->last_cmd = cmd;
1724 if (cmd == J1939_TP_CMD_BAM) {
1725 if (!session->transmission)
1726 j1939_tp_set_rxtimeout(session, 750);
1728 if (!session->transmission) {
1729 j1939_session_txtimer_cancel(session);
1730 j1939_tp_schedule_txtimer(session, 0);
1732 j1939_tp_set_rxtimeout(session, 1250);
1735 j1939_session_put(session);
1738 static void j1939_xtp_rx_dpo_one(struct j1939_session *session,
1739 struct sk_buff *skb)
1741 const u8 *dat = skb->data;
1743 if (j1939_xtp_rx_cmd_bad_pgn(session, skb))
1746 netdev_dbg(session->priv->ndev, "%s: 0x%p\n", __func__, session);
1748 /* transmitted without problems */
1749 session->pkt.dpo = j1939_etp_ctl_to_packet(skb->data);
1750 session->last_cmd = dat[0];
1751 j1939_tp_set_rxtimeout(session, 750);
1754 static void j1939_xtp_rx_dpo(struct j1939_priv *priv, struct sk_buff *skb,
1757 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb);
1758 struct j1939_session *session;
1760 session = j1939_session_get_by_addr(priv, &skcb->addr, false,
1763 netdev_info(priv->ndev,
1764 "%s: no connection found\n", __func__);
1768 j1939_xtp_rx_dpo_one(session, skb);
1769 j1939_session_put(session);
1772 static void j1939_xtp_rx_dat_one(struct j1939_session *session,
1773 struct sk_buff *skb)
1775 enum j1939_xtp_abort abort = J1939_XTP_ABORT_FAULT;
1776 struct j1939_priv *priv = session->priv;
1777 struct j1939_sk_buff_cb *skcb;
1778 struct sk_buff *se_skb = NULL;
1784 bool remain = false;
1785 bool do_cts_eoma = false;
1788 skcb = j1939_skb_to_cb(skb);
1790 if (skb->len != 8) {
1791 /* makes no sense */
1792 abort = J1939_XTP_ABORT_UNEXPECTED_DATA;
1793 goto out_session_cancel;
1796 switch (session->last_cmd) {
1799 case J1939_ETP_CMD_DPO:
1800 if (skcb->addr.type == J1939_ETP)
1803 case J1939_TP_CMD_BAM: /* fall through */
1804 case J1939_TP_CMD_CTS: /* fall through */
1805 if (skcb->addr.type != J1939_ETP)
1809 netdev_info(priv->ndev, "%s: 0x%p: last %02x\n", __func__,
1810 session, session->last_cmd);
1811 goto out_session_cancel;
1814 packet = (dat[0] - 1 + session->pkt.dpo);
1815 if (packet > session->pkt.total ||
1816 (session->pkt.rx + 1) > session->pkt.total) {
1817 netdev_info(priv->ndev, "%s: 0x%p: should have been completed\n",
1819 goto out_session_cancel;
1822 se_skb = j1939_session_skb_get_by_offset(session, packet * 7);
1824 netdev_warn(priv->ndev, "%s: 0x%p: no skb found\n", __func__,
1826 goto out_session_cancel;
1829 skcb = j1939_skb_to_cb(se_skb);
1830 offset = packet * 7 - skcb->offset;
1831 nbytes = se_skb->len - offset;
1834 if (nbytes <= 0 || (nbytes + 1) > skb->len) {
1835 netdev_info(priv->ndev, "%s: 0x%p: nbytes %i, len %i\n",
1836 __func__, session, nbytes, skb->len);
1837 goto out_session_cancel;
1840 tpdat = se_skb->data;
1841 if (!session->transmission) {
1842 memcpy(&tpdat[offset], &dat[1], nbytes);
1846 err = memcmp(&tpdat[offset], &dat[1], nbytes);
1848 netdev_err_once(priv->ndev,
1849 "%s: 0x%p: Data of RX-looped back packet (%*ph) doesn't match TX data (%*ph)!\n",
1852 nbytes, &tpdat[offset]);
1855 if (packet == session->pkt.rx)
1858 if (skcb->addr.type != J1939_ETP &&
1859 j1939_cb_is_broadcast(&session->skcb)) {
1860 if (session->pkt.rx >= session->pkt.total)
1865 /* never final, an EOMA must follow */
1866 if (session->pkt.rx >= session->pkt.last)
1871 j1939_session_timers_cancel(session);
1872 j1939_session_completed(session);
1873 } else if (remain) {
1874 if (!session->transmission)
1875 j1939_tp_set_rxtimeout(session, 750);
1876 } else if (do_cts_eoma) {
1877 j1939_tp_set_rxtimeout(session, 1250);
1878 if (!session->transmission)
1879 j1939_tp_schedule_txtimer(session, 0);
1881 j1939_tp_set_rxtimeout(session, 750);
1883 session->last_cmd = 0xff;
1884 consume_skb(se_skb);
1885 j1939_session_put(session);
1891 j1939_session_timers_cancel(session);
1892 j1939_session_cancel(session, abort);
1893 j1939_session_put(session);
1896 static void j1939_xtp_rx_dat(struct j1939_priv *priv, struct sk_buff *skb)
1898 struct j1939_sk_buff_cb *skcb;
1899 struct j1939_session *session;
1901 skcb = j1939_skb_to_cb(skb);
1903 if (j1939_tp_im_transmitter(skcb)) {
1904 session = j1939_session_get_by_addr(priv, &skcb->addr, false,
1907 netdev_info(priv->ndev, "%s: no tx connection found\n",
1910 j1939_xtp_rx_dat_one(session, skb);
1913 if (j1939_tp_im_receiver(skcb)) {
1914 session = j1939_session_get_by_addr(priv, &skcb->addr, false,
1917 netdev_info(priv->ndev, "%s: no rx connection found\n",
1920 j1939_xtp_rx_dat_one(session, skb);
1923 if (j1939_cb_is_broadcast(skcb)) {
1924 session = j1939_session_get_by_addr(priv, &skcb->addr, false,
1927 j1939_xtp_rx_dat_one(session, skb);
1931 /* j1939 main intf */
1932 struct j1939_session *j1939_tp_send(struct j1939_priv *priv,
1933 struct sk_buff *skb, size_t size)
1935 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb);
1936 struct j1939_session *session;
1939 if (skcb->addr.pgn == J1939_TP_PGN_DAT ||
1940 skcb->addr.pgn == J1939_TP_PGN_CTL ||
1941 skcb->addr.pgn == J1939_ETP_PGN_DAT ||
1942 skcb->addr.pgn == J1939_ETP_PGN_CTL)
1943 /* avoid conflict */
1944 return ERR_PTR(-EDOM);
1946 if (size > priv->tp_max_packet_size)
1947 return ERR_PTR(-EMSGSIZE);
1950 skcb->addr.type = J1939_SIMPLE;
1951 else if (size > J1939_MAX_TP_PACKET_SIZE)
1952 skcb->addr.type = J1939_ETP;
1954 skcb->addr.type = J1939_TP;
1956 if (skcb->addr.type == J1939_ETP &&
1957 j1939_cb_is_broadcast(skcb))
1958 return ERR_PTR(-EDESTADDRREQ);
1960 /* fill in addresses from names */
1961 ret = j1939_ac_fixup(priv, skb);
1963 return ERR_PTR(ret);
1965 /* fix DST flags, it may be used there soon */
1966 if (j1939_address_is_unicast(skcb->addr.da) &&
1967 priv->ents[skcb->addr.da].nusers)
1968 skcb->flags |= J1939_ECU_LOCAL_DST;
1970 /* src is always local, I'm sending ... */
1971 skcb->flags |= J1939_ECU_LOCAL_SRC;
1973 /* prepare new session */
1974 session = j1939_session_new(priv, skb, size);
1976 return ERR_PTR(-ENOMEM);
1978 /* skb is recounted in j1939_session_new() */
1980 session->sk = skb->sk;
1981 session->transmission = true;
1982 session->pkt.total = (size + 6) / 7;
1983 session->pkt.block = skcb->addr.type == J1939_ETP ? 255 :
1984 min(j1939_tp_block ?: 255, session->pkt.total);
1986 if (j1939_cb_is_broadcast(&session->skcb))
1987 /* set the end-packet for broadcast */
1988 session->pkt.last = session->pkt.total;
1990 skcb->tskey = session->sk->sk_tskey++;
1991 session->tskey = skcb->tskey;
1996 static void j1939_tp_cmd_recv(struct j1939_priv *priv, struct sk_buff *skb)
1998 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb);
1999 int extd = J1939_TP;
2000 u8 cmd = skb->data[0];
2003 case J1939_ETP_CMD_RTS:
2006 case J1939_TP_CMD_BAM: /* fall through */
2007 if (cmd == J1939_TP_CMD_BAM && !j1939_cb_is_broadcast(skcb)) {
2008 netdev_err_once(priv->ndev, "%s: BAM to unicast (%02x), ignoring!\n",
2009 __func__, skcb->addr.sa);
2013 case J1939_TP_CMD_RTS: /* fall through */
2014 if (skcb->addr.type != extd)
2017 if (cmd == J1939_TP_CMD_RTS && j1939_cb_is_broadcast(skcb)) {
2018 netdev_alert(priv->ndev, "%s: rts without destination (%02x)\n",
2019 __func__, skcb->addr.sa);
2023 if (j1939_tp_im_transmitter(skcb))
2024 j1939_xtp_rx_rts(priv, skb, true);
2026 if (j1939_tp_im_receiver(skcb) || j1939_cb_is_broadcast(skcb))
2027 j1939_xtp_rx_rts(priv, skb, false);
2031 case J1939_ETP_CMD_CTS:
2034 case J1939_TP_CMD_CTS:
2035 if (skcb->addr.type != extd)
2038 if (j1939_tp_im_transmitter(skcb))
2039 j1939_xtp_rx_cts(priv, skb, false);
2041 if (j1939_tp_im_receiver(skcb))
2042 j1939_xtp_rx_cts(priv, skb, true);
2046 case J1939_ETP_CMD_DPO:
2047 if (skcb->addr.type != J1939_ETP)
2050 if (j1939_tp_im_transmitter(skcb))
2051 j1939_xtp_rx_dpo(priv, skb, true);
2053 if (j1939_tp_im_receiver(skcb))
2054 j1939_xtp_rx_dpo(priv, skb, false);
2058 case J1939_ETP_CMD_EOMA:
2061 case J1939_TP_CMD_EOMA:
2062 if (skcb->addr.type != extd)
2065 if (j1939_tp_im_transmitter(skcb))
2066 j1939_xtp_rx_eoma(priv, skb, false);
2068 if (j1939_tp_im_receiver(skcb))
2069 j1939_xtp_rx_eoma(priv, skb, true);
2073 case J1939_ETP_CMD_ABORT: /* && J1939_TP_CMD_ABORT */
2074 if (j1939_cb_is_broadcast(skcb)) {
2075 netdev_err_once(priv->ndev, "%s: abort to broadcast (%02x), ignoring!\n",
2076 __func__, skcb->addr.sa);
2080 if (j1939_tp_im_transmitter(skcb))
2081 j1939_xtp_rx_abort(priv, skb, true);
2083 if (j1939_tp_im_receiver(skcb))
2084 j1939_xtp_rx_abort(priv, skb, false);
2092 int j1939_tp_recv(struct j1939_priv *priv, struct sk_buff *skb)
2094 struct j1939_sk_buff_cb *skcb = j1939_skb_to_cb(skb);
2096 if (!j1939_tp_im_involved_anydir(skcb) && !j1939_cb_is_broadcast(skcb))
2099 switch (skcb->addr.pgn) {
2100 case J1939_ETP_PGN_DAT:
2101 skcb->addr.type = J1939_ETP;
2103 case J1939_TP_PGN_DAT:
2104 j1939_xtp_rx_dat(priv, skb);
2107 case J1939_ETP_PGN_CTL:
2108 skcb->addr.type = J1939_ETP;
2110 case J1939_TP_PGN_CTL:
2112 return 0; /* Don't care. Nothing to extract here */
2114 j1939_tp_cmd_recv(priv, skb);
2117 return 0; /* no problem */
2119 return 1; /* "I processed the message" */
2122 void j1939_simple_recv(struct j1939_priv *priv, struct sk_buff *skb)
2124 struct j1939_session *session;
2129 if (skb->sk->sk_family != AF_CAN ||
2130 skb->sk->sk_protocol != CAN_J1939)
2133 j1939_session_list_lock(priv);
2134 session = j1939_session_get_simple(priv, skb);
2135 j1939_session_list_unlock(priv);
2137 netdev_warn(priv->ndev,
2138 "%s: Received already invalidated message\n",
2143 j1939_session_timers_cancel(session);
2144 j1939_session_deactivate(session);
2145 j1939_session_put(session);
2148 int j1939_cancel_active_session(struct j1939_priv *priv, struct sock *sk)
2150 struct j1939_session *session, *saved;
2152 netdev_dbg(priv->ndev, "%s, sk: %p\n", __func__, sk);
2153 j1939_session_list_lock(priv);
2154 list_for_each_entry_safe(session, saved,
2155 &priv->active_session_list,
2156 active_session_list_entry) {
2157 if (!sk || sk == session->sk) {
2158 if (hrtimer_try_to_cancel(&session->txtimer) == 1)
2159 j1939_session_put(session);
2160 if (hrtimer_try_to_cancel(&session->rxtimer) == 1)
2161 j1939_session_put(session);
2163 session->err = ESHUTDOWN;
2164 j1939_session_deactivate_locked(session);
2167 j1939_session_list_unlock(priv);
2171 void j1939_tp_init(struct j1939_priv *priv)
2173 spin_lock_init(&priv->active_session_list_lock);
2174 INIT_LIST_HEAD(&priv->active_session_list);
2175 priv->tp_max_packet_size = J1939_MAX_ETP_PACKET_SIZE;