octeontx2-pf: Fix error return code in otx2_probe()
[linux/fpc-iii.git] / net / ethtool / wol.c
blob1798421e9f1c13e69c32800a26e5ee8fae6adfdc
1 // SPDX-License-Identifier: GPL-2.0-only
3 #include "netlink.h"
4 #include "common.h"
5 #include "bitset.h"
7 struct wol_req_info {
8 struct ethnl_req_info base;
9 };
11 struct wol_reply_data {
12 struct ethnl_reply_data base;
13 struct ethtool_wolinfo wol;
14 bool show_sopass;
17 #define WOL_REPDATA(__reply_base) \
18 container_of(__reply_base, struct wol_reply_data, base)
20 static const struct nla_policy
21 wol_get_policy[ETHTOOL_A_WOL_MAX + 1] = {
22 [ETHTOOL_A_WOL_UNSPEC] = { .type = NLA_REJECT },
23 [ETHTOOL_A_WOL_HEADER] = { .type = NLA_NESTED },
24 [ETHTOOL_A_WOL_MODES] = { .type = NLA_REJECT },
25 [ETHTOOL_A_WOL_SOPASS] = { .type = NLA_REJECT },
28 static int wol_prepare_data(const struct ethnl_req_info *req_base,
29 struct ethnl_reply_data *reply_base,
30 struct genl_info *info)
32 struct wol_reply_data *data = WOL_REPDATA(reply_base);
33 struct net_device *dev = reply_base->dev;
34 int ret;
36 if (!dev->ethtool_ops->get_wol)
37 return -EOPNOTSUPP;
39 ret = ethnl_ops_begin(dev);
40 if (ret < 0)
41 return ret;
42 dev->ethtool_ops->get_wol(dev, &data->wol);
43 ethnl_ops_complete(dev);
44 /* do not include password in notifications */
45 data->show_sopass = info && (data->wol.supported & WAKE_MAGICSECURE);
47 return 0;
50 static int wol_reply_size(const struct ethnl_req_info *req_base,
51 const struct ethnl_reply_data *reply_base)
53 bool compact = req_base->flags & ETHTOOL_FLAG_COMPACT_BITSETS;
54 const struct wol_reply_data *data = WOL_REPDATA(reply_base);
55 int len;
57 len = ethnl_bitset32_size(&data->wol.wolopts, &data->wol.supported,
58 WOL_MODE_COUNT, wol_mode_names, compact);
59 if (len < 0)
60 return len;
61 if (data->show_sopass)
62 len += nla_total_size(sizeof(data->wol.sopass));
64 return len;
67 static int wol_fill_reply(struct sk_buff *skb,
68 const struct ethnl_req_info *req_base,
69 const struct ethnl_reply_data *reply_base)
71 bool compact = req_base->flags & ETHTOOL_FLAG_COMPACT_BITSETS;
72 const struct wol_reply_data *data = WOL_REPDATA(reply_base);
73 int ret;
75 ret = ethnl_put_bitset32(skb, ETHTOOL_A_WOL_MODES, &data->wol.wolopts,
76 &data->wol.supported, WOL_MODE_COUNT,
77 wol_mode_names, compact);
78 if (ret < 0)
79 return ret;
80 if (data->show_sopass &&
81 nla_put(skb, ETHTOOL_A_WOL_SOPASS, sizeof(data->wol.sopass),
82 data->wol.sopass))
83 return -EMSGSIZE;
85 return 0;
88 const struct ethnl_request_ops ethnl_wol_request_ops = {
89 .request_cmd = ETHTOOL_MSG_WOL_GET,
90 .reply_cmd = ETHTOOL_MSG_WOL_GET_REPLY,
91 .hdr_attr = ETHTOOL_A_WOL_HEADER,
92 .max_attr = ETHTOOL_A_WOL_MAX,
93 .req_info_size = sizeof(struct wol_req_info),
94 .reply_data_size = sizeof(struct wol_reply_data),
95 .request_policy = wol_get_policy,
97 .prepare_data = wol_prepare_data,
98 .reply_size = wol_reply_size,
99 .fill_reply = wol_fill_reply,
102 /* WOL_SET */
104 static const struct nla_policy
105 wol_set_policy[ETHTOOL_A_WOL_MAX + 1] = {
106 [ETHTOOL_A_WOL_UNSPEC] = { .type = NLA_REJECT },
107 [ETHTOOL_A_WOL_HEADER] = { .type = NLA_NESTED },
108 [ETHTOOL_A_WOL_MODES] = { .type = NLA_NESTED },
109 [ETHTOOL_A_WOL_SOPASS] = { .type = NLA_BINARY,
110 .len = SOPASS_MAX },
113 int ethnl_set_wol(struct sk_buff *skb, struct genl_info *info)
115 struct ethtool_wolinfo wol = { .cmd = ETHTOOL_GWOL };
116 struct nlattr *tb[ETHTOOL_A_WOL_MAX + 1];
117 struct ethnl_req_info req_info = {};
118 struct net_device *dev;
119 bool mod = false;
120 int ret;
122 ret = nlmsg_parse(info->nlhdr, GENL_HDRLEN, tb, ETHTOOL_A_WOL_MAX,
123 wol_set_policy, info->extack);
124 if (ret < 0)
125 return ret;
126 ret = ethnl_parse_header_dev_get(&req_info, tb[ETHTOOL_A_WOL_HEADER],
127 genl_info_net(info), info->extack,
128 true);
129 if (ret < 0)
130 return ret;
131 dev = req_info.dev;
132 ret = -EOPNOTSUPP;
133 if (!dev->ethtool_ops->get_wol || !dev->ethtool_ops->set_wol)
134 goto out_dev;
136 rtnl_lock();
137 ret = ethnl_ops_begin(dev);
138 if (ret < 0)
139 goto out_rtnl;
141 dev->ethtool_ops->get_wol(dev, &wol);
142 ret = ethnl_update_bitset32(&wol.wolopts, WOL_MODE_COUNT,
143 tb[ETHTOOL_A_WOL_MODES], wol_mode_names,
144 info->extack, &mod);
145 if (ret < 0)
146 goto out_ops;
147 if (wol.wolopts & ~wol.supported) {
148 NL_SET_ERR_MSG_ATTR(info->extack, tb[ETHTOOL_A_WOL_MODES],
149 "cannot enable unsupported WoL mode");
150 ret = -EINVAL;
151 goto out_ops;
153 if (tb[ETHTOOL_A_WOL_SOPASS]) {
154 if (!(wol.supported & WAKE_MAGICSECURE)) {
155 NL_SET_ERR_MSG_ATTR(info->extack,
156 tb[ETHTOOL_A_WOL_SOPASS],
157 "magicsecure not supported, cannot set password");
158 ret = -EINVAL;
159 goto out_ops;
161 ethnl_update_binary(wol.sopass, sizeof(wol.sopass),
162 tb[ETHTOOL_A_WOL_SOPASS], &mod);
165 if (!mod)
166 goto out_ops;
167 ret = dev->ethtool_ops->set_wol(dev, &wol);
168 if (ret)
169 goto out_ops;
170 dev->wol_enabled = !!wol.wolopts;
171 ethtool_notify(dev, ETHTOOL_MSG_WOL_NTF, NULL);
173 out_ops:
174 ethnl_ops_complete(dev);
175 out_rtnl:
176 rtnl_unlock();
177 out_dev:
178 dev_put(dev);
179 return ret;