xref: /openbmc/linux/net/ethtool/wol.c (revision 0584bff0)
1 // SPDX-License-Identifier: GPL-2.0-only
2 
3 #include "netlink.h"
4 #include "common.h"
5 #include "bitset.h"
6 
7 struct wol_req_info {
8 	struct ethnl_req_info		base;
9 };
10 
11 struct wol_reply_data {
12 	struct ethnl_reply_data		base;
13 	struct ethtool_wolinfo		wol;
14 	bool				show_sopass;
15 };
16 
17 #define WOL_REPDATA(__reply_base) \
18 	container_of(__reply_base, struct wol_reply_data, base)
19 
20 static const struct nla_policy
21 wol_get_policy[ETHTOOL_A_WOL_MAX + 1] = {
22 	[ETHTOOL_A_WOL_UNSPEC]		= { .type = NLA_REJECT },
23 	[ETHTOOL_A_WOL_HEADER]		= { .type = NLA_NESTED },
24 	[ETHTOOL_A_WOL_MODES]		= { .type = NLA_REJECT },
25 	[ETHTOOL_A_WOL_SOPASS]		= { .type = NLA_REJECT },
26 };
27 
28 static int wol_prepare_data(const struct ethnl_req_info *req_base,
29 			    struct ethnl_reply_data *reply_base,
30 			    struct genl_info *info)
31 {
32 	struct wol_reply_data *data = WOL_REPDATA(reply_base);
33 	struct net_device *dev = reply_base->dev;
34 	int ret;
35 
36 	if (!dev->ethtool_ops->get_wol)
37 		return -EOPNOTSUPP;
38 
39 	ret = ethnl_ops_begin(dev);
40 	if (ret < 0)
41 		return ret;
42 	dev->ethtool_ops->get_wol(dev, &data->wol);
43 	ethnl_ops_complete(dev);
44 	/* do not include password in notifications */
45 	data->show_sopass = info && (data->wol.supported & WAKE_MAGICSECURE);
46 
47 	return 0;
48 }
49 
50 static int wol_reply_size(const struct ethnl_req_info *req_base,
51 			  const struct ethnl_reply_data *reply_base)
52 {
53 	bool compact = req_base->flags & ETHTOOL_FLAG_COMPACT_BITSETS;
54 	const struct wol_reply_data *data = WOL_REPDATA(reply_base);
55 	int len;
56 
57 	len = ethnl_bitset32_size(&data->wol.wolopts, &data->wol.supported,
58 				  WOL_MODE_COUNT, wol_mode_names, compact);
59 	if (len < 0)
60 		return len;
61 	if (data->show_sopass)
62 		len += nla_total_size(sizeof(data->wol.sopass));
63 
64 	return len;
65 }
66 
67 static int wol_fill_reply(struct sk_buff *skb,
68 			  const struct ethnl_req_info *req_base,
69 			  const struct ethnl_reply_data *reply_base)
70 {
71 	bool compact = req_base->flags & ETHTOOL_FLAG_COMPACT_BITSETS;
72 	const struct wol_reply_data *data = WOL_REPDATA(reply_base);
73 	int ret;
74 
75 	ret = ethnl_put_bitset32(skb, ETHTOOL_A_WOL_MODES, &data->wol.wolopts,
76 				 &data->wol.supported, WOL_MODE_COUNT,
77 				 wol_mode_names, compact);
78 	if (ret < 0)
79 		return ret;
80 	if (data->show_sopass &&
81 	    nla_put(skb, ETHTOOL_A_WOL_SOPASS, sizeof(data->wol.sopass),
82 		    data->wol.sopass))
83 		return -EMSGSIZE;
84 
85 	return 0;
86 }
87 
88 const struct ethnl_request_ops ethnl_wol_request_ops = {
89 	.request_cmd		= ETHTOOL_MSG_WOL_GET,
90 	.reply_cmd		= ETHTOOL_MSG_WOL_GET_REPLY,
91 	.hdr_attr		= ETHTOOL_A_WOL_HEADER,
92 	.max_attr		= ETHTOOL_A_WOL_MAX,
93 	.req_info_size		= sizeof(struct wol_req_info),
94 	.reply_data_size	= sizeof(struct wol_reply_data),
95 	.request_policy		= wol_get_policy,
96 
97 	.prepare_data		= wol_prepare_data,
98 	.reply_size		= wol_reply_size,
99 	.fill_reply		= wol_fill_reply,
100 };
101 
102 /* WOL_SET */
103 
104 static const struct nla_policy
105 wol_set_policy[ETHTOOL_A_WOL_MAX + 1] = {
106 	[ETHTOOL_A_WOL_UNSPEC]		= { .type = NLA_REJECT },
107 	[ETHTOOL_A_WOL_HEADER]		= { .type = NLA_NESTED },
108 	[ETHTOOL_A_WOL_MODES]		= { .type = NLA_NESTED },
109 	[ETHTOOL_A_WOL_SOPASS]		= { .type = NLA_BINARY,
110 					    .len = SOPASS_MAX },
111 };
112 
113 int ethnl_set_wol(struct sk_buff *skb, struct genl_info *info)
114 {
115 	struct ethtool_wolinfo wol = { .cmd = ETHTOOL_GWOL };
116 	struct nlattr *tb[ETHTOOL_A_WOL_MAX + 1];
117 	struct ethnl_req_info req_info = {};
118 	struct net_device *dev;
119 	bool mod = false;
120 	int ret;
121 
122 	ret = nlmsg_parse(info->nlhdr, GENL_HDRLEN, tb, ETHTOOL_A_WOL_MAX,
123 			  wol_set_policy, info->extack);
124 	if (ret < 0)
125 		return ret;
126 	ret = ethnl_parse_header_dev_get(&req_info, tb[ETHTOOL_A_WOL_HEADER],
127 					 genl_info_net(info), info->extack,
128 					 true);
129 	if (ret < 0)
130 		return ret;
131 	dev = req_info.dev;
132 	ret = -EOPNOTSUPP;
133 	if (!dev->ethtool_ops->get_wol || !dev->ethtool_ops->set_wol)
134 		goto out_dev;
135 
136 	rtnl_lock();
137 	ret = ethnl_ops_begin(dev);
138 	if (ret < 0)
139 		goto out_rtnl;
140 
141 	dev->ethtool_ops->get_wol(dev, &wol);
142 	ret = ethnl_update_bitset32(&wol.wolopts, WOL_MODE_COUNT,
143 				    tb[ETHTOOL_A_WOL_MODES], wol_mode_names,
144 				    info->extack, &mod);
145 	if (ret < 0)
146 		goto out_ops;
147 	if (wol.wolopts & ~wol.supported) {
148 		NL_SET_ERR_MSG_ATTR(info->extack, tb[ETHTOOL_A_WOL_MODES],
149 				    "cannot enable unsupported WoL mode");
150 		ret = -EINVAL;
151 		goto out_ops;
152 	}
153 	if (tb[ETHTOOL_A_WOL_SOPASS]) {
154 		if (!(wol.supported & WAKE_MAGICSECURE)) {
155 			NL_SET_ERR_MSG_ATTR(info->extack,
156 					    tb[ETHTOOL_A_WOL_SOPASS],
157 					    "magicsecure not supported, cannot set password");
158 			ret = -EINVAL;
159 			goto out_ops;
160 		}
161 		ethnl_update_binary(wol.sopass, sizeof(wol.sopass),
162 				    tb[ETHTOOL_A_WOL_SOPASS], &mod);
163 	}
164 
165 	if (!mod)
166 		goto out_ops;
167 	ret = dev->ethtool_ops->set_wol(dev, &wol);
168 	if (ret)
169 		goto out_ops;
170 	dev->wol_enabled = !!wol.wolopts;
171 	ethtool_notify(dev, ETHTOOL_MSG_WOL_NTF, NULL);
172 
173 out_ops:
174 	ethnl_ops_complete(dev);
175 out_rtnl:
176 	rtnl_unlock();
177 out_dev:
178 	dev_put(dev);
179 	return ret;
180 }
181