Linux Audio

Check our new training course

Loading...
v6.13.7
  1// SPDX-License-Identifier: GPL-2.0-only
  2
  3#include "netlink.h"
  4#include "common.h"
  5#include "bitset.h"
  6
  7struct wol_req_info {
  8	struct ethnl_req_info		base;
  9};
 10
 11struct wol_reply_data {
 12	struct ethnl_reply_data		base;
 13	struct ethtool_wolinfo		wol;
 14	bool				show_sopass;
 15};
 16
 17#define WOL_REPDATA(__reply_base) \
 18	container_of(__reply_base, struct wol_reply_data, base)
 19
 20const struct nla_policy ethnl_wol_get_policy[] = {
 21	[ETHTOOL_A_WOL_HEADER]		=
 22		NLA_POLICY_NESTED(ethnl_header_policy),
 23};
 24
 25static int wol_prepare_data(const struct ethnl_req_info *req_base,
 26			    struct ethnl_reply_data *reply_base,
 27			    const struct genl_info *info)
 28{
 29	struct wol_reply_data *data = WOL_REPDATA(reply_base);
 30	struct net_device *dev = reply_base->dev;
 31	int ret;
 32
 33	if (!dev->ethtool_ops->get_wol)
 34		return -EOPNOTSUPP;
 35
 36	ret = ethnl_ops_begin(dev);
 37	if (ret < 0)
 38		return ret;
 39	dev->ethtool_ops->get_wol(dev, &data->wol);
 40	ethnl_ops_complete(dev);
 41	/* do not include password in notifications */
 42	data->show_sopass = !genl_info_is_ntf(info) &&
 43		(data->wol.supported & WAKE_MAGICSECURE);
 44
 45	return 0;
 46}
 47
 48static int wol_reply_size(const struct ethnl_req_info *req_base,
 49			  const struct ethnl_reply_data *reply_base)
 50{
 51	bool compact = req_base->flags & ETHTOOL_FLAG_COMPACT_BITSETS;
 52	const struct wol_reply_data *data = WOL_REPDATA(reply_base);
 53	int len;
 54
 55	len = ethnl_bitset32_size(&data->wol.wolopts, &data->wol.supported,
 56				  WOL_MODE_COUNT, wol_mode_names, compact);
 57	if (len < 0)
 58		return len;
 59	if (data->show_sopass)
 60		len += nla_total_size(sizeof(data->wol.sopass));
 61
 62	return len;
 63}
 64
 65static int wol_fill_reply(struct sk_buff *skb,
 66			  const struct ethnl_req_info *req_base,
 67			  const struct ethnl_reply_data *reply_base)
 68{
 69	bool compact = req_base->flags & ETHTOOL_FLAG_COMPACT_BITSETS;
 70	const struct wol_reply_data *data = WOL_REPDATA(reply_base);
 71	int ret;
 72
 73	ret = ethnl_put_bitset32(skb, ETHTOOL_A_WOL_MODES, &data->wol.wolopts,
 74				 &data->wol.supported, WOL_MODE_COUNT,
 75				 wol_mode_names, compact);
 76	if (ret < 0)
 77		return ret;
 78	if (data->show_sopass &&
 79	    nla_put(skb, ETHTOOL_A_WOL_SOPASS, sizeof(data->wol.sopass),
 80		    data->wol.sopass))
 81		return -EMSGSIZE;
 82
 83	return 0;
 84}
 85
 
 
 
 
 
 
 
 
 
 
 
 
 86/* WOL_SET */
 87
 88const struct nla_policy ethnl_wol_set_policy[] = {
 89	[ETHTOOL_A_WOL_HEADER]		=
 90		NLA_POLICY_NESTED(ethnl_header_policy),
 91	[ETHTOOL_A_WOL_MODES]		= { .type = NLA_NESTED },
 92	[ETHTOOL_A_WOL_SOPASS]		= { .type = NLA_BINARY,
 93					    .len = SOPASS_MAX },
 94};
 95
 96static int
 97ethnl_set_wol_validate(struct ethnl_req_info *req_info, struct genl_info *info)
 98{
 99	const struct ethtool_ops *ops = req_info->dev->ethtool_ops;
100
101	return ops->get_wol && ops->set_wol ? 1 : -EOPNOTSUPP;
102}
103
104static int
105ethnl_set_wol(struct ethnl_req_info *req_info, struct genl_info *info)
106{
107	struct ethtool_wolinfo wol = { .cmd = ETHTOOL_GWOL };
108	struct net_device *dev = req_info->dev;
109	struct nlattr **tb = info->attrs;
 
110	bool mod = false;
111	int ret;
112
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
113	dev->ethtool_ops->get_wol(dev, &wol);
114	ret = ethnl_update_bitset32(&wol.wolopts, WOL_MODE_COUNT,
115				    tb[ETHTOOL_A_WOL_MODES], wol_mode_names,
116				    info->extack, &mod);
117	if (ret < 0)
118		return ret;
119	if (wol.wolopts & ~wol.supported) {
120		NL_SET_ERR_MSG_ATTR(info->extack, tb[ETHTOOL_A_WOL_MODES],
121				    "cannot enable unsupported WoL mode");
122		return -EINVAL;
 
123	}
124	if (tb[ETHTOOL_A_WOL_SOPASS]) {
125		if (!(wol.supported & WAKE_MAGICSECURE)) {
126			NL_SET_ERR_MSG_ATTR(info->extack,
127					    tb[ETHTOOL_A_WOL_SOPASS],
128					    "magicsecure not supported, cannot set password");
129			return -EINVAL;
 
130		}
131		ethnl_update_binary(wol.sopass, sizeof(wol.sopass),
132				    tb[ETHTOOL_A_WOL_SOPASS], &mod);
133	}
134
135	if (!mod)
136		return 0;
137	ret = dev->ethtool_ops->set_wol(dev, &wol);
138	if (ret)
139		return ret;
140	dev->ethtool->wol_enabled = !!wol.wolopts;
141	return 1;
142}
143
144const struct ethnl_request_ops ethnl_wol_request_ops = {
145	.request_cmd		= ETHTOOL_MSG_WOL_GET,
146	.reply_cmd		= ETHTOOL_MSG_WOL_GET_REPLY,
147	.hdr_attr		= ETHTOOL_A_WOL_HEADER,
148	.req_info_size		= sizeof(struct wol_req_info),
149	.reply_data_size	= sizeof(struct wol_reply_data),
150
151	.prepare_data		= wol_prepare_data,
152	.reply_size		= wol_reply_size,
153	.fill_reply		= wol_fill_reply,
154
155	.set_validate		= ethnl_set_wol_validate,
156	.set			= ethnl_set_wol,
157	.set_ntf_cmd		= ETHTOOL_MSG_WOL_NTF,
158};
v6.2
  1// SPDX-License-Identifier: GPL-2.0-only
  2
  3#include "netlink.h"
  4#include "common.h"
  5#include "bitset.h"
  6
  7struct wol_req_info {
  8	struct ethnl_req_info		base;
  9};
 10
 11struct wol_reply_data {
 12	struct ethnl_reply_data		base;
 13	struct ethtool_wolinfo		wol;
 14	bool				show_sopass;
 15};
 16
 17#define WOL_REPDATA(__reply_base) \
 18	container_of(__reply_base, struct wol_reply_data, base)
 19
 20const struct nla_policy ethnl_wol_get_policy[] = {
 21	[ETHTOOL_A_WOL_HEADER]		=
 22		NLA_POLICY_NESTED(ethnl_header_policy),
 23};
 24
 25static int wol_prepare_data(const struct ethnl_req_info *req_base,
 26			    struct ethnl_reply_data *reply_base,
 27			    struct genl_info *info)
 28{
 29	struct wol_reply_data *data = WOL_REPDATA(reply_base);
 30	struct net_device *dev = reply_base->dev;
 31	int ret;
 32
 33	if (!dev->ethtool_ops->get_wol)
 34		return -EOPNOTSUPP;
 35
 36	ret = ethnl_ops_begin(dev);
 37	if (ret < 0)
 38		return ret;
 39	dev->ethtool_ops->get_wol(dev, &data->wol);
 40	ethnl_ops_complete(dev);
 41	/* do not include password in notifications */
 42	data->show_sopass = info && (data->wol.supported & WAKE_MAGICSECURE);
 
 43
 44	return 0;
 45}
 46
 47static int wol_reply_size(const struct ethnl_req_info *req_base,
 48			  const struct ethnl_reply_data *reply_base)
 49{
 50	bool compact = req_base->flags & ETHTOOL_FLAG_COMPACT_BITSETS;
 51	const struct wol_reply_data *data = WOL_REPDATA(reply_base);
 52	int len;
 53
 54	len = ethnl_bitset32_size(&data->wol.wolopts, &data->wol.supported,
 55				  WOL_MODE_COUNT, wol_mode_names, compact);
 56	if (len < 0)
 57		return len;
 58	if (data->show_sopass)
 59		len += nla_total_size(sizeof(data->wol.sopass));
 60
 61	return len;
 62}
 63
 64static int wol_fill_reply(struct sk_buff *skb,
 65			  const struct ethnl_req_info *req_base,
 66			  const struct ethnl_reply_data *reply_base)
 67{
 68	bool compact = req_base->flags & ETHTOOL_FLAG_COMPACT_BITSETS;
 69	const struct wol_reply_data *data = WOL_REPDATA(reply_base);
 70	int ret;
 71
 72	ret = ethnl_put_bitset32(skb, ETHTOOL_A_WOL_MODES, &data->wol.wolopts,
 73				 &data->wol.supported, WOL_MODE_COUNT,
 74				 wol_mode_names, compact);
 75	if (ret < 0)
 76		return ret;
 77	if (data->show_sopass &&
 78	    nla_put(skb, ETHTOOL_A_WOL_SOPASS, sizeof(data->wol.sopass),
 79		    data->wol.sopass))
 80		return -EMSGSIZE;
 81
 82	return 0;
 83}
 84
 85const struct ethnl_request_ops ethnl_wol_request_ops = {
 86	.request_cmd		= ETHTOOL_MSG_WOL_GET,
 87	.reply_cmd		= ETHTOOL_MSG_WOL_GET_REPLY,
 88	.hdr_attr		= ETHTOOL_A_WOL_HEADER,
 89	.req_info_size		= sizeof(struct wol_req_info),
 90	.reply_data_size	= sizeof(struct wol_reply_data),
 91
 92	.prepare_data		= wol_prepare_data,
 93	.reply_size		= wol_reply_size,
 94	.fill_reply		= wol_fill_reply,
 95};
 96
 97/* WOL_SET */
 98
 99const struct nla_policy ethnl_wol_set_policy[] = {
100	[ETHTOOL_A_WOL_HEADER]		=
101		NLA_POLICY_NESTED(ethnl_header_policy),
102	[ETHTOOL_A_WOL_MODES]		= { .type = NLA_NESTED },
103	[ETHTOOL_A_WOL_SOPASS]		= { .type = NLA_BINARY,
104					    .len = SOPASS_MAX },
105};
106
107int ethnl_set_wol(struct sk_buff *skb, struct genl_info *info)
 
 
 
 
 
 
 
 
 
108{
109	struct ethtool_wolinfo wol = { .cmd = ETHTOOL_GWOL };
110	struct ethnl_req_info req_info = {};
111	struct nlattr **tb = info->attrs;
112	struct net_device *dev;
113	bool mod = false;
114	int ret;
115
116	ret = ethnl_parse_header_dev_get(&req_info, tb[ETHTOOL_A_WOL_HEADER],
117					 genl_info_net(info), info->extack,
118					 true);
119	if (ret < 0)
120		return ret;
121	dev = req_info.dev;
122	ret = -EOPNOTSUPP;
123	if (!dev->ethtool_ops->get_wol || !dev->ethtool_ops->set_wol)
124		goto out_dev;
125
126	rtnl_lock();
127	ret = ethnl_ops_begin(dev);
128	if (ret < 0)
129		goto out_rtnl;
130
131	dev->ethtool_ops->get_wol(dev, &wol);
132	ret = ethnl_update_bitset32(&wol.wolopts, WOL_MODE_COUNT,
133				    tb[ETHTOOL_A_WOL_MODES], wol_mode_names,
134				    info->extack, &mod);
135	if (ret < 0)
136		goto out_ops;
137	if (wol.wolopts & ~wol.supported) {
138		NL_SET_ERR_MSG_ATTR(info->extack, tb[ETHTOOL_A_WOL_MODES],
139				    "cannot enable unsupported WoL mode");
140		ret = -EINVAL;
141		goto out_ops;
142	}
143	if (tb[ETHTOOL_A_WOL_SOPASS]) {
144		if (!(wol.supported & WAKE_MAGICSECURE)) {
145			NL_SET_ERR_MSG_ATTR(info->extack,
146					    tb[ETHTOOL_A_WOL_SOPASS],
147					    "magicsecure not supported, cannot set password");
148			ret = -EINVAL;
149			goto out_ops;
150		}
151		ethnl_update_binary(wol.sopass, sizeof(wol.sopass),
152				    tb[ETHTOOL_A_WOL_SOPASS], &mod);
153	}
154
155	if (!mod)
156		goto out_ops;
157	ret = dev->ethtool_ops->set_wol(dev, &wol);
158	if (ret)
159		goto out_ops;
160	dev->wol_enabled = !!wol.wolopts;
161	ethtool_notify(dev, ETHTOOL_MSG_WOL_NTF, NULL);
 
162
163out_ops:
164	ethnl_ops_complete(dev);
165out_rtnl:
166	rtnl_unlock();
167out_dev:
168	ethnl_parse_header_dev_put(&req_info);
169	return ret;
170}