g_shsec.c revision 223921
1140074Spjd/*-
2141993Spjd * Copyright (c) 2005 Pawel Jakub Dawidek <pjd@FreeBSD.org>
3140074Spjd * All rights reserved.
4140074Spjd *
5140074Spjd * Redistribution and use in source and binary forms, with or without
6140074Spjd * modification, are permitted provided that the following conditions
7140074Spjd * are met:
8140074Spjd * 1. Redistributions of source code must retain the above copyright
9140074Spjd *    notice, this list of conditions and the following disclaimer.
10140074Spjd * 2. Redistributions in binary form must reproduce the above copyright
11140074Spjd *    notice, this list of conditions and the following disclaimer in the
12140074Spjd *    documentation and/or other materials provided with the distribution.
13155174Spjd *
14140074Spjd * THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND
15140074Spjd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16140074Spjd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17140074Spjd * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE
18140074Spjd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19140074Spjd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20140074Spjd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21140074Spjd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22140074Spjd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23140074Spjd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24140074Spjd * SUCH DAMAGE.
25140074Spjd */
26140074Spjd
27140074Spjd#include <sys/cdefs.h>
28140074Spjd__FBSDID("$FreeBSD: head/sys/geom/shsec/g_shsec.c 223921 2011-07-11 05:22:31Z ae $");
29140074Spjd
30140074Spjd#include <sys/param.h>
31140074Spjd#include <sys/systm.h>
32140074Spjd#include <sys/kernel.h>
33140074Spjd#include <sys/module.h>
34140074Spjd#include <sys/lock.h>
35140074Spjd#include <sys/mutex.h>
36140074Spjd#include <sys/bio.h>
37223921Sae#include <sys/sbuf.h>
38140074Spjd#include <sys/sysctl.h>
39140074Spjd#include <sys/malloc.h>
40140074Spjd#include <vm/uma.h>
41140074Spjd#include <geom/geom.h>
42140074Spjd#include <geom/shsec/g_shsec.h>
43140074Spjd
44219029SnetchildFEATURE(geom_shsec, "GEOM shared secret device support");
45140074Spjd
46151897Srwatsonstatic MALLOC_DEFINE(M_SHSEC, "shsec_data", "GEOM_SHSEC Data");
47140074Spjd
48140074Spjdstatic uma_zone_t g_shsec_zone;
49140074Spjd
50140074Spjdstatic int g_shsec_destroy(struct g_shsec_softc *sc, boolean_t force);
51140074Spjdstatic int g_shsec_destroy_geom(struct gctl_req *req, struct g_class *mp,
52140074Spjd    struct g_geom *gp);
53140074Spjd
54140074Spjdstatic g_taste_t g_shsec_taste;
55140074Spjdstatic g_ctl_req_t g_shsec_config;
56140074Spjdstatic g_dumpconf_t g_shsec_dumpconf;
57140074Spjdstatic g_init_t g_shsec_init;
58140074Spjdstatic g_fini_t g_shsec_fini;
59140074Spjd
60140074Spjdstruct g_class g_shsec_class = {
61140074Spjd	.name = G_SHSEC_CLASS_NAME,
62140074Spjd	.version = G_VERSION,
63140074Spjd	.ctlreq = g_shsec_config,
64140074Spjd	.taste = g_shsec_taste,
65140074Spjd	.destroy_geom = g_shsec_destroy_geom,
66140074Spjd	.init = g_shsec_init,
67140074Spjd	.fini = g_shsec_fini
68140074Spjd};
69140074Spjd
70140074SpjdSYSCTL_DECL(_kern_geom);
71140074SpjdSYSCTL_NODE(_kern_geom, OID_AUTO, shsec, CTLFLAG_RW, 0, "GEOM_SHSEC stuff");
72140074Spjdstatic u_int g_shsec_debug = 0;
73140074SpjdTUNABLE_INT("kern.geom.shsec.debug", &g_shsec_debug);
74140074SpjdSYSCTL_UINT(_kern_geom_shsec, OID_AUTO, debug, CTLFLAG_RW, &g_shsec_debug, 0,
75140074Spjd    "Debug level");
76140074Spjdstatic u_int g_shsec_maxmem = MAXPHYS * 100;
77140074SpjdTUNABLE_INT("kern.geom.shsec.maxmem", &g_shsec_maxmem);
78140074SpjdSYSCTL_UINT(_kern_geom_shsec, OID_AUTO, maxmem, CTLFLAG_RD, &g_shsec_maxmem,
79140074Spjd    0, "Maximum memory that can be allocated for I/O (in bytes)");
80140074Spjdstatic u_int g_shsec_alloc_failed = 0;
81140074SpjdSYSCTL_UINT(_kern_geom_shsec, OID_AUTO, alloc_failed, CTLFLAG_RD,
82140074Spjd    &g_shsec_alloc_failed, 0, "How many times I/O allocation failed");
83140074Spjd
84140074Spjd/*
85140074Spjd * Greatest Common Divisor.
86140074Spjd */
87140074Spjdstatic u_int
88140074Spjdgcd(u_int a, u_int b)
89140074Spjd{
90140074Spjd	u_int c;
91140074Spjd
92140074Spjd	while (b != 0) {
93140074Spjd		c = a;
94140074Spjd		a = b;
95140074Spjd		b = (c % b);
96140074Spjd	}
97140074Spjd	return (a);
98140074Spjd}
99140074Spjd
100140074Spjd/*
101140074Spjd * Least Common Multiple.
102140074Spjd */
103140074Spjdstatic u_int
104140074Spjdlcm(u_int a, u_int b)
105140074Spjd{
106140074Spjd
107140074Spjd	return ((a * b) / gcd(a, b));
108140074Spjd}
109140074Spjd
110140074Spjdstatic void
111140074Spjdg_shsec_init(struct g_class *mp __unused)
112140074Spjd{
113140074Spjd
114140074Spjd	g_shsec_zone = uma_zcreate("g_shsec_zone", MAXPHYS, NULL, NULL, NULL,
115140074Spjd	    NULL, 0, 0);
116140074Spjd	g_shsec_maxmem -= g_shsec_maxmem % MAXPHYS;
117140074Spjd	uma_zone_set_max(g_shsec_zone, g_shsec_maxmem / MAXPHYS);
118140074Spjd}
119140074Spjd
120140074Spjdstatic void
121140074Spjdg_shsec_fini(struct g_class *mp __unused)
122140074Spjd{
123140074Spjd
124140074Spjd	uma_zdestroy(g_shsec_zone);
125140074Spjd}
126140074Spjd
127140074Spjd/*
128140074Spjd * Return the number of valid disks.
129140074Spjd */
130140074Spjdstatic u_int
131140074Spjdg_shsec_nvalid(struct g_shsec_softc *sc)
132140074Spjd{
133140074Spjd	u_int i, no;
134140074Spjd
135140074Spjd	no = 0;
136140074Spjd	for (i = 0; i < sc->sc_ndisks; i++) {
137140074Spjd		if (sc->sc_disks[i] != NULL)
138140074Spjd			no++;
139140074Spjd	}
140140074Spjd
141140074Spjd	return (no);
142140074Spjd}
143140074Spjd
144140074Spjdstatic void
145140074Spjdg_shsec_remove_disk(struct g_consumer *cp)
146140074Spjd{
147140074Spjd	struct g_shsec_softc *sc;
148140074Spjd	u_int no;
149140074Spjd
150140074Spjd	KASSERT(cp != NULL, ("Non-valid disk in %s.", __func__));
151140074Spjd	sc = (struct g_shsec_softc *)cp->private;
152140074Spjd	KASSERT(sc != NULL, ("NULL sc in %s.", __func__));
153140074Spjd	no = cp->index;
154140074Spjd
155140074Spjd	G_SHSEC_DEBUG(0, "Disk %s removed from %s.", cp->provider->name,
156140074Spjd	    sc->sc_name);
157140074Spjd
158140074Spjd	sc->sc_disks[no] = NULL;
159140074Spjd	if (sc->sc_provider != NULL) {
160140074Spjd		g_orphan_provider(sc->sc_provider, ENXIO);
161140074Spjd		sc->sc_provider = NULL;
162140074Spjd		G_SHSEC_DEBUG(0, "Device %s removed.", sc->sc_name);
163140074Spjd	}
164140074Spjd
165140074Spjd	if (cp->acr > 0 || cp->acw > 0 || cp->ace > 0)
166140074Spjd		g_access(cp, -cp->acr, -cp->acw, -cp->ace);
167140074Spjd	g_detach(cp);
168140074Spjd	g_destroy_consumer(cp);
169140074Spjd}
170140074Spjd
171140074Spjdstatic void
172140074Spjdg_shsec_orphan(struct g_consumer *cp)
173140074Spjd{
174140074Spjd	struct g_shsec_softc *sc;
175140074Spjd	struct g_geom *gp;
176140074Spjd
177140074Spjd	g_topology_assert();
178140074Spjd	gp = cp->geom;
179140074Spjd	sc = gp->softc;
180140074Spjd	if (sc == NULL)
181140074Spjd		return;
182140074Spjd
183140074Spjd	g_shsec_remove_disk(cp);
184140074Spjd	/* If there are no valid disks anymore, remove device. */
185140074Spjd	if (g_shsec_nvalid(sc) == 0)
186140074Spjd		g_shsec_destroy(sc, 1);
187140074Spjd}
188140074Spjd
189140074Spjdstatic int
190140074Spjdg_shsec_access(struct g_provider *pp, int dr, int dw, int de)
191140074Spjd{
192140074Spjd	struct g_consumer *cp1, *cp2;
193140074Spjd	struct g_shsec_softc *sc;
194140074Spjd	struct g_geom *gp;
195140074Spjd	int error;
196140074Spjd
197140074Spjd	gp = pp->geom;
198140074Spjd	sc = gp->softc;
199140074Spjd
200140074Spjd	if (sc == NULL) {
201140074Spjd		/*
202140074Spjd		 * It looks like geom is being withered.
203140074Spjd		 * In that case we allow only negative requests.
204140074Spjd		 */
205140074Spjd		KASSERT(dr <= 0 && dw <= 0 && de <= 0,
206140074Spjd		    ("Positive access request (device=%s).", pp->name));
207140074Spjd		if ((pp->acr + dr) == 0 && (pp->acw + dw) == 0 &&
208140074Spjd		    (pp->ace + de) == 0) {
209140074Spjd			G_SHSEC_DEBUG(0, "Device %s definitely destroyed.",
210140074Spjd			    gp->name);
211140074Spjd		}
212140074Spjd		return (0);
213140074Spjd	}
214140074Spjd
215140074Spjd	/* On first open, grab an extra "exclusive" bit */
216140074Spjd	if (pp->acr == 0 && pp->acw == 0 && pp->ace == 0)
217140074Spjd		de++;
218140074Spjd	/* ... and let go of it on last close */
219140074Spjd	if ((pp->acr + dr) == 0 && (pp->acw + dw) == 0 && (pp->ace + de) == 0)
220140074Spjd		de--;
221140074Spjd
222140074Spjd	error = ENXIO;
223140074Spjd	LIST_FOREACH(cp1, &gp->consumer, consumer) {
224140074Spjd		error = g_access(cp1, dr, dw, de);
225140074Spjd		if (error == 0)
226140074Spjd			continue;
227140074Spjd		/*
228140074Spjd		 * If we fail here, backout all previous changes.
229140074Spjd		 */
230140074Spjd		LIST_FOREACH(cp2, &gp->consumer, consumer) {
231140074Spjd			if (cp1 == cp2)
232140074Spjd				return (error);
233140074Spjd			g_access(cp2, -dr, -dw, -de);
234140074Spjd		}
235140074Spjd		/* NOTREACHED */
236140074Spjd	}
237140074Spjd
238140074Spjd	return (error);
239140074Spjd}
240140074Spjd
241140074Spjdstatic void
242140074Spjdg_shsec_xor1(uint32_t *src, uint32_t *dst, ssize_t len)
243140074Spjd{
244140074Spjd
245140074Spjd	for (; len > 0; len -= sizeof(uint32_t), dst++)
246140074Spjd		*dst = *dst ^ *src++;
247140074Spjd	KASSERT(len == 0, ("len != 0 (len=%zd)", len));
248140074Spjd}
249140074Spjd
250140074Spjdstatic void
251140074Spjdg_shsec_done(struct bio *bp)
252140074Spjd{
253140074Spjd	struct g_shsec_softc *sc;
254140074Spjd	struct bio *pbp;
255140074Spjd
256140074Spjd	pbp = bp->bio_parent;
257140074Spjd	sc = pbp->bio_to->geom->softc;
258140074Spjd	if (bp->bio_error == 0)
259140074Spjd		G_SHSEC_LOGREQ(2, bp, "Request done.");
260140074Spjd	else {
261140074Spjd		G_SHSEC_LOGREQ(0, bp, "Request failed (error=%d).",
262140074Spjd		    bp->bio_error);
263140074Spjd		if (pbp->bio_error == 0)
264140074Spjd			pbp->bio_error = bp->bio_error;
265140074Spjd	}
266140074Spjd	if (pbp->bio_cmd == BIO_READ) {
267140074Spjd		if ((pbp->bio_pflags & G_SHSEC_BFLAG_FIRST) != 0) {
268140074Spjd			bcopy(bp->bio_data, pbp->bio_data, pbp->bio_length);
269140074Spjd			pbp->bio_pflags = 0;
270140074Spjd		} else {
271140074Spjd			g_shsec_xor1((uint32_t *)bp->bio_data,
272140074Spjd			    (uint32_t *)pbp->bio_data,
273140074Spjd			    (ssize_t)pbp->bio_length);
274140074Spjd		}
275140074Spjd	}
276140074Spjd	bzero(bp->bio_data, bp->bio_length);
277140074Spjd	uma_zfree(g_shsec_zone, bp->bio_data);
278140074Spjd	g_destroy_bio(bp);
279140074Spjd	pbp->bio_inbed++;
280140074Spjd	if (pbp->bio_children == pbp->bio_inbed) {
281140074Spjd		pbp->bio_completed = pbp->bio_length;
282140074Spjd		g_io_deliver(pbp, pbp->bio_error);
283140074Spjd	}
284140074Spjd}
285140074Spjd
286140074Spjdstatic void
287140074Spjdg_shsec_xor2(uint32_t *rand, uint32_t *dst, ssize_t len)
288140074Spjd{
289140074Spjd
290140074Spjd	for (; len > 0; len -= sizeof(uint32_t), dst++) {
291140074Spjd		*rand = arc4random();
292140074Spjd		*dst = *dst ^ *rand++;
293140074Spjd	}
294140074Spjd	KASSERT(len == 0, ("len != 0 (len=%zd)", len));
295140074Spjd}
296140074Spjd
297140074Spjdstatic void
298140074Spjdg_shsec_start(struct bio *bp)
299140074Spjd{
300140074Spjd	TAILQ_HEAD(, bio) queue = TAILQ_HEAD_INITIALIZER(queue);
301140074Spjd	struct g_shsec_softc *sc;
302140074Spjd	struct bio *cbp;
303140074Spjd	uint32_t *dst;
304140074Spjd	ssize_t len;
305140074Spjd	u_int no;
306140074Spjd	int error;
307140074Spjd
308140074Spjd	sc = bp->bio_to->geom->softc;
309140074Spjd	/*
310140074Spjd	 * If sc == NULL, provider's error should be set and g_shsec_start()
311140074Spjd	 * should not be called at all.
312140074Spjd	 */
313140074Spjd	KASSERT(sc != NULL,
314140074Spjd	    ("Provider's error should be set (error=%d)(device=%s).",
315140074Spjd	    bp->bio_to->error, bp->bio_to->name));
316140074Spjd
317140074Spjd	G_SHSEC_LOGREQ(2, bp, "Request received.");
318140074Spjd
319140074Spjd	switch (bp->bio_cmd) {
320140074Spjd	case BIO_READ:
321140074Spjd	case BIO_WRITE:
322163869Spjd	case BIO_FLUSH:
323140074Spjd		/*
324140074Spjd		 * Only those requests are supported.
325140074Spjd		 */
326140074Spjd		break;
327140074Spjd	case BIO_DELETE:
328140074Spjd	case BIO_GETATTR:
329140074Spjd		/* To which provider it should be delivered? */
330140074Spjd	default:
331140074Spjd		g_io_deliver(bp, EOPNOTSUPP);
332140074Spjd		return;
333140074Spjd	}
334140074Spjd
335140074Spjd	/*
336140074Spjd	 * Allocate all bios first and calculate XOR.
337140074Spjd	 */
338140074Spjd	dst = NULL;
339140074Spjd	len = bp->bio_length;
340140074Spjd	if (bp->bio_cmd == BIO_READ)
341140074Spjd		bp->bio_pflags = G_SHSEC_BFLAG_FIRST;
342140074Spjd	for (no = 0; no < sc->sc_ndisks; no++) {
343140074Spjd		cbp = g_clone_bio(bp);
344140074Spjd		if (cbp == NULL) {
345140074Spjd			error = ENOMEM;
346140074Spjd			goto failure;
347140074Spjd		}
348140074Spjd		TAILQ_INSERT_TAIL(&queue, cbp, bio_queue);
349140074Spjd
350140074Spjd		/*
351140074Spjd		 * Fill in the component buf structure.
352140074Spjd		 */
353140074Spjd		cbp->bio_done = g_shsec_done;
354140074Spjd		cbp->bio_data = uma_zalloc(g_shsec_zone, M_NOWAIT);
355140074Spjd		if (cbp->bio_data == NULL) {
356140074Spjd			g_shsec_alloc_failed++;
357140074Spjd			error = ENOMEM;
358140074Spjd			goto failure;
359140074Spjd		}
360140074Spjd		cbp->bio_caller2 = sc->sc_disks[no];
361140074Spjd		if (bp->bio_cmd == BIO_WRITE) {
362140074Spjd			if (no == 0) {
363140074Spjd				dst = (uint32_t *)cbp->bio_data;
364140074Spjd				bcopy(bp->bio_data, dst, len);
365140074Spjd			} else {
366140074Spjd				g_shsec_xor2((uint32_t *)cbp->bio_data, dst,
367140074Spjd				    len);
368140074Spjd			}
369140074Spjd		}
370140074Spjd	}
371140074Spjd	/*
372140074Spjd	 * Fire off all allocated requests!
373140074Spjd	 */
374140074Spjd	while ((cbp = TAILQ_FIRST(&queue)) != NULL) {
375140074Spjd		struct g_consumer *cp;
376140074Spjd
377140074Spjd		TAILQ_REMOVE(&queue, cbp, bio_queue);
378140074Spjd		cp = cbp->bio_caller2;
379140074Spjd		cbp->bio_caller2 = NULL;
380140074Spjd		cbp->bio_to = cp->provider;
381140074Spjd		G_SHSEC_LOGREQ(2, cbp, "Sending request.");
382140074Spjd		g_io_request(cbp, cp);
383140074Spjd	}
384140074Spjd	return;
385140074Spjdfailure:
386140074Spjd	while ((cbp = TAILQ_FIRST(&queue)) != NULL) {
387140074Spjd		TAILQ_REMOVE(&queue, cbp, bio_queue);
388140074Spjd		bp->bio_children--;
389140074Spjd		if (cbp->bio_data != NULL) {
390140074Spjd			bzero(cbp->bio_data, cbp->bio_length);
391140074Spjd			uma_zfree(g_shsec_zone, cbp->bio_data);
392140074Spjd		}
393140074Spjd		g_destroy_bio(cbp);
394140074Spjd	}
395140074Spjd	if (bp->bio_error == 0)
396140074Spjd		bp->bio_error = error;
397140074Spjd	g_io_deliver(bp, bp->bio_error);
398140074Spjd}
399140074Spjd
400140074Spjdstatic void
401140074Spjdg_shsec_check_and_run(struct g_shsec_softc *sc)
402140074Spjd{
403140074Spjd	off_t mediasize, ms;
404140074Spjd	u_int no, sectorsize = 0;
405140074Spjd
406140074Spjd	if (g_shsec_nvalid(sc) != sc->sc_ndisks)
407140074Spjd		return;
408140074Spjd
409140074Spjd	sc->sc_provider = g_new_providerf(sc->sc_geom, "shsec/%s", sc->sc_name);
410140074Spjd	/*
411140074Spjd	 * Find the smallest disk.
412140074Spjd	 */
413140074Spjd	mediasize = sc->sc_disks[0]->provider->mediasize;
414140074Spjd	mediasize -= sc->sc_disks[0]->provider->sectorsize;
415140074Spjd	sectorsize = sc->sc_disks[0]->provider->sectorsize;
416140074Spjd	for (no = 1; no < sc->sc_ndisks; no++) {
417140074Spjd		ms = sc->sc_disks[no]->provider->mediasize;
418140074Spjd		ms -= sc->sc_disks[no]->provider->sectorsize;
419140074Spjd		if (ms < mediasize)
420140074Spjd			mediasize = ms;
421140074Spjd		sectorsize = lcm(sectorsize,
422140074Spjd		    sc->sc_disks[no]->provider->sectorsize);
423140074Spjd	}
424140074Spjd	sc->sc_provider->sectorsize = sectorsize;
425140074Spjd	sc->sc_provider->mediasize = mediasize;
426140074Spjd	g_error_provider(sc->sc_provider, 0);
427140074Spjd
428140074Spjd	G_SHSEC_DEBUG(0, "Device %s activated.", sc->sc_name);
429140074Spjd}
430140074Spjd
431140074Spjdstatic int
432140074Spjdg_shsec_read_metadata(struct g_consumer *cp, struct g_shsec_metadata *md)
433140074Spjd{
434140074Spjd	struct g_provider *pp;
435140074Spjd	u_char *buf;
436140074Spjd	int error;
437140074Spjd
438140074Spjd	g_topology_assert();
439140074Spjd
440140074Spjd	error = g_access(cp, 1, 0, 0);
441140074Spjd	if (error != 0)
442140074Spjd		return (error);
443140074Spjd	pp = cp->provider;
444140074Spjd	g_topology_unlock();
445140074Spjd	buf = g_read_data(cp, pp->mediasize - pp->sectorsize, pp->sectorsize,
446140074Spjd	    &error);
447140074Spjd	g_topology_lock();
448140074Spjd	g_access(cp, -1, 0, 0);
449140074Spjd	if (buf == NULL)
450140074Spjd		return (error);
451140074Spjd
452140074Spjd	/* Decode metadata. */
453140074Spjd	shsec_metadata_decode(buf, md);
454140074Spjd	g_free(buf);
455140074Spjd
456140074Spjd	return (0);
457140074Spjd}
458140074Spjd
459140074Spjd/*
460140074Spjd * Add disk to given device.
461140074Spjd */
462140074Spjdstatic int
463140074Spjdg_shsec_add_disk(struct g_shsec_softc *sc, struct g_provider *pp, u_int no)
464140074Spjd{
465140074Spjd	struct g_consumer *cp, *fcp;
466140074Spjd	struct g_geom *gp;
467140074Spjd	struct g_shsec_metadata md;
468140074Spjd	int error;
469140074Spjd
470140074Spjd	/* Metadata corrupted? */
471140074Spjd	if (no >= sc->sc_ndisks)
472140074Spjd		return (EINVAL);
473140074Spjd
474140074Spjd	/* Check if disk is not already attached. */
475140074Spjd	if (sc->sc_disks[no] != NULL)
476140074Spjd		return (EEXIST);
477140074Spjd
478140074Spjd	gp = sc->sc_geom;
479140074Spjd	fcp = LIST_FIRST(&gp->consumer);
480140074Spjd
481140074Spjd	cp = g_new_consumer(gp);
482140074Spjd	error = g_attach(cp, pp);
483140074Spjd	if (error != 0) {
484140074Spjd		g_destroy_consumer(cp);
485140074Spjd		return (error);
486140074Spjd	}
487140074Spjd
488140074Spjd	if (fcp != NULL && (fcp->acr > 0 || fcp->acw > 0 || fcp->ace > 0)) {
489140074Spjd		error = g_access(cp, fcp->acr, fcp->acw, fcp->ace);
490140074Spjd		if (error != 0) {
491140074Spjd			g_detach(cp);
492140074Spjd			g_destroy_consumer(cp);
493140074Spjd			return (error);
494140074Spjd		}
495140074Spjd	}
496140074Spjd
497140074Spjd	/* Reread metadata. */
498140074Spjd	error = g_shsec_read_metadata(cp, &md);
499140074Spjd	if (error != 0)
500140074Spjd		goto fail;
501140074Spjd
502140074Spjd	if (strcmp(md.md_magic, G_SHSEC_MAGIC) != 0 ||
503140074Spjd	    strcmp(md.md_name, sc->sc_name) != 0 || md.md_id != sc->sc_id) {
504140074Spjd		G_SHSEC_DEBUG(0, "Metadata on %s changed.", pp->name);
505140074Spjd		goto fail;
506140074Spjd	}
507140074Spjd
508140074Spjd	cp->private = sc;
509140074Spjd	cp->index = no;
510140074Spjd	sc->sc_disks[no] = cp;
511140074Spjd
512140074Spjd	G_SHSEC_DEBUG(0, "Disk %s attached to %s.", pp->name, sc->sc_name);
513140074Spjd
514140074Spjd	g_shsec_check_and_run(sc);
515140074Spjd
516140074Spjd	return (0);
517140074Spjdfail:
518140074Spjd	if (fcp != NULL && (fcp->acr > 0 || fcp->acw > 0 || fcp->ace > 0))
519140074Spjd		g_access(cp, -fcp->acr, -fcp->acw, -fcp->ace);
520140074Spjd	g_detach(cp);
521140074Spjd	g_destroy_consumer(cp);
522140074Spjd	return (error);
523140074Spjd}
524140074Spjd
525140074Spjdstatic struct g_geom *
526140074Spjdg_shsec_create(struct g_class *mp, const struct g_shsec_metadata *md)
527140074Spjd{
528140074Spjd	struct g_shsec_softc *sc;
529140074Spjd	struct g_geom *gp;
530140074Spjd	u_int no;
531140074Spjd
532140074Spjd	G_SHSEC_DEBUG(1, "Creating device %s (id=%u).", md->md_name, md->md_id);
533140074Spjd
534140074Spjd	/* Two disks is minimum. */
535140074Spjd	if (md->md_all < 2) {
536140074Spjd		G_SHSEC_DEBUG(0, "Too few disks defined for %s.", md->md_name);
537140074Spjd		return (NULL);
538140074Spjd	}
539140074Spjd
540140074Spjd	/* Check for duplicate unit */
541140074Spjd	LIST_FOREACH(gp, &mp->geom, geom) {
542140074Spjd		sc = gp->softc;
543140074Spjd		if (sc != NULL && strcmp(sc->sc_name, md->md_name) == 0) {
544140074Spjd			G_SHSEC_DEBUG(0, "Device %s already configured.",
545140074Spjd			    sc->sc_name);
546140074Spjd			return (NULL);
547140074Spjd		}
548140074Spjd	}
549140074Spjd	gp = g_new_geomf(mp, "%s", md->md_name);
550140074Spjd	sc = malloc(sizeof(*sc), M_SHSEC, M_WAITOK | M_ZERO);
551140074Spjd	gp->start = g_shsec_start;
552140074Spjd	gp->spoiled = g_shsec_orphan;
553140074Spjd	gp->orphan = g_shsec_orphan;
554140074Spjd	gp->access = g_shsec_access;
555140074Spjd	gp->dumpconf = g_shsec_dumpconf;
556140074Spjd
557140074Spjd	sc->sc_id = md->md_id;
558140074Spjd	sc->sc_ndisks = md->md_all;
559140074Spjd	sc->sc_disks = malloc(sizeof(struct g_consumer *) * sc->sc_ndisks,
560140074Spjd	    M_SHSEC, M_WAITOK | M_ZERO);
561140074Spjd	for (no = 0; no < sc->sc_ndisks; no++)
562140074Spjd		sc->sc_disks[no] = NULL;
563140074Spjd
564140074Spjd	gp->softc = sc;
565140074Spjd	sc->sc_geom = gp;
566140074Spjd	sc->sc_provider = NULL;
567140074Spjd
568140074Spjd	G_SHSEC_DEBUG(0, "Device %s created (id=%u).", sc->sc_name, sc->sc_id);
569140074Spjd
570140074Spjd	return (gp);
571140074Spjd}
572140074Spjd
573140074Spjdstatic int
574140074Spjdg_shsec_destroy(struct g_shsec_softc *sc, boolean_t force)
575140074Spjd{
576140074Spjd	struct g_provider *pp;
577140074Spjd	struct g_geom *gp;
578140074Spjd	u_int no;
579140074Spjd
580140074Spjd	g_topology_assert();
581140074Spjd
582140074Spjd	if (sc == NULL)
583140074Spjd		return (ENXIO);
584140074Spjd
585140074Spjd	pp = sc->sc_provider;
586140074Spjd	if (pp != NULL && (pp->acr != 0 || pp->acw != 0 || pp->ace != 0)) {
587140074Spjd		if (force) {
588140074Spjd			G_SHSEC_DEBUG(0, "Device %s is still open, so it "
589140074Spjd			    "can't be definitely removed.", pp->name);
590140074Spjd		} else {
591140074Spjd			G_SHSEC_DEBUG(1,
592140074Spjd			    "Device %s is still open (r%dw%de%d).", pp->name,
593140074Spjd			    pp->acr, pp->acw, pp->ace);
594140074Spjd			return (EBUSY);
595140074Spjd		}
596140074Spjd	}
597140074Spjd
598140074Spjd	for (no = 0; no < sc->sc_ndisks; no++) {
599140074Spjd		if (sc->sc_disks[no] != NULL)
600140074Spjd			g_shsec_remove_disk(sc->sc_disks[no]);
601140074Spjd	}
602140074Spjd
603140074Spjd	gp = sc->sc_geom;
604140074Spjd	gp->softc = NULL;
605140074Spjd	KASSERT(sc->sc_provider == NULL, ("Provider still exists? (device=%s)",
606140074Spjd	    gp->name));
607140074Spjd	free(sc->sc_disks, M_SHSEC);
608140074Spjd	free(sc, M_SHSEC);
609140074Spjd
610155174Spjd	pp = LIST_FIRST(&gp->provider);
611140074Spjd	if (pp == NULL || (pp->acr == 0 && pp->acw == 0 && pp->ace == 0))
612140074Spjd		G_SHSEC_DEBUG(0, "Device %s destroyed.", gp->name);
613140074Spjd
614140074Spjd	g_wither_geom(gp, ENXIO);
615140074Spjd
616140074Spjd	return (0);
617140074Spjd}
618140074Spjd
619140074Spjdstatic int
620140074Spjdg_shsec_destroy_geom(struct gctl_req *req __unused, struct g_class *mp __unused,
621140074Spjd    struct g_geom *gp)
622140074Spjd{
623140074Spjd	struct g_shsec_softc *sc;
624140074Spjd
625140074Spjd	sc = gp->softc;
626140074Spjd	return (g_shsec_destroy(sc, 0));
627140074Spjd}
628140074Spjd
629140074Spjdstatic struct g_geom *
630140074Spjdg_shsec_taste(struct g_class *mp, struct g_provider *pp, int flags __unused)
631140074Spjd{
632140074Spjd	struct g_shsec_metadata md;
633140074Spjd	struct g_shsec_softc *sc;
634140074Spjd	struct g_consumer *cp;
635140074Spjd	struct g_geom *gp;
636140074Spjd	int error;
637140074Spjd
638140074Spjd	g_trace(G_T_TOPOLOGY, "%s(%s, %s)", __func__, mp->name, pp->name);
639140074Spjd	g_topology_assert();
640140074Spjd
641197898Spjd	/* Skip providers that are already open for writing. */
642197898Spjd	if (pp->acw > 0)
643197898Spjd		return (NULL);
644197898Spjd
645140074Spjd	G_SHSEC_DEBUG(3, "Tasting %s.", pp->name);
646140074Spjd
647140074Spjd	gp = g_new_geomf(mp, "shsec:taste");
648140074Spjd	gp->start = g_shsec_start;
649140074Spjd	gp->access = g_shsec_access;
650140074Spjd	gp->orphan = g_shsec_orphan;
651140074Spjd	cp = g_new_consumer(gp);
652140074Spjd	g_attach(cp, pp);
653140074Spjd	error = g_shsec_read_metadata(cp, &md);
654140074Spjd	g_detach(cp);
655140074Spjd	g_destroy_consumer(cp);
656140074Spjd	g_destroy_geom(gp);
657140074Spjd	if (error != 0)
658140074Spjd		return (NULL);
659140074Spjd	gp = NULL;
660140074Spjd
661140074Spjd	if (strcmp(md.md_magic, G_SHSEC_MAGIC) != 0)
662140074Spjd		return (NULL);
663140074Spjd	if (md.md_version > G_SHSEC_VERSION) {
664140074Spjd		G_SHSEC_DEBUG(0, "Kernel module is too old to handle %s.\n",
665140074Spjd		    pp->name);
666140074Spjd		return (NULL);
667140074Spjd	}
668142727Spjd	/*
669142727Spjd	 * Backward compatibility:
670142727Spjd	 */
671142727Spjd	/* There was no md_provsize field in earlier versions of metadata. */
672142727Spjd	if (md.md_version < 1)
673142727Spjd		md.md_provsize = pp->mediasize;
674142727Spjd
675221101Smav	if (md.md_provider[0] != '\0' &&
676221101Smav	    !g_compare_names(md.md_provider, pp->name))
677140074Spjd		return (NULL);
678142727Spjd	if (md.md_provsize != pp->mediasize)
679142727Spjd		return (NULL);
680140074Spjd
681140074Spjd	/*
682140074Spjd	 * Let's check if device already exists.
683140074Spjd	 */
684140074Spjd	sc = NULL;
685140074Spjd	LIST_FOREACH(gp, &mp->geom, geom) {
686140074Spjd		sc = gp->softc;
687140074Spjd		if (sc == NULL)
688140074Spjd			continue;
689140074Spjd		if (strcmp(md.md_name, sc->sc_name) != 0)
690140074Spjd			continue;
691140074Spjd		if (md.md_id != sc->sc_id)
692140074Spjd			continue;
693140074Spjd		break;
694140074Spjd	}
695140074Spjd	if (gp != NULL) {
696140074Spjd		G_SHSEC_DEBUG(1, "Adding disk %s to %s.", pp->name, gp->name);
697140074Spjd		error = g_shsec_add_disk(sc, pp, md.md_no);
698140074Spjd		if (error != 0) {
699140074Spjd			G_SHSEC_DEBUG(0, "Cannot add disk %s to %s (error=%d).",
700140074Spjd			    pp->name, gp->name, error);
701140074Spjd			return (NULL);
702140074Spjd		}
703140074Spjd	} else {
704140074Spjd		gp = g_shsec_create(mp, &md);
705140074Spjd		if (gp == NULL) {
706140074Spjd			G_SHSEC_DEBUG(0, "Cannot create device %s.", md.md_name);
707140074Spjd			return (NULL);
708140074Spjd		}
709140074Spjd		sc = gp->softc;
710140074Spjd		G_SHSEC_DEBUG(1, "Adding disk %s to %s.", pp->name, gp->name);
711140074Spjd		error = g_shsec_add_disk(sc, pp, md.md_no);
712140074Spjd		if (error != 0) {
713140074Spjd			G_SHSEC_DEBUG(0, "Cannot add disk %s to %s (error=%d).",
714140074Spjd			    pp->name, gp->name, error);
715140074Spjd			g_shsec_destroy(sc, 1);
716140074Spjd			return (NULL);
717140074Spjd		}
718140074Spjd	}
719140074Spjd	return (gp);
720140074Spjd}
721140074Spjd
722140074Spjdstatic struct g_shsec_softc *
723140074Spjdg_shsec_find_device(struct g_class *mp, const char *name)
724140074Spjd{
725140074Spjd	struct g_shsec_softc *sc;
726140074Spjd	struct g_geom *gp;
727140074Spjd
728140074Spjd	LIST_FOREACH(gp, &mp->geom, geom) {
729140074Spjd		sc = gp->softc;
730140074Spjd		if (sc == NULL)
731140074Spjd			continue;
732140074Spjd		if (strcmp(sc->sc_name, name) == 0)
733140074Spjd			return (sc);
734140074Spjd	}
735140074Spjd	return (NULL);
736140074Spjd}
737140074Spjd
738140074Spjdstatic void
739140074Spjdg_shsec_ctl_destroy(struct gctl_req *req, struct g_class *mp)
740140074Spjd{
741140074Spjd	struct g_shsec_softc *sc;
742140074Spjd	int *force, *nargs, error;
743140074Spjd	const char *name;
744140074Spjd	char param[16];
745140074Spjd	u_int i;
746140074Spjd
747140074Spjd	g_topology_assert();
748140074Spjd
749140074Spjd	nargs = gctl_get_paraml(req, "nargs", sizeof(*nargs));
750140074Spjd	if (nargs == NULL) {
751140074Spjd		gctl_error(req, "No '%s' argument.", "nargs");
752140074Spjd		return;
753140074Spjd	}
754140074Spjd	if (*nargs <= 0) {
755140074Spjd		gctl_error(req, "Missing device(s).");
756140074Spjd		return;
757140074Spjd	}
758140074Spjd	force = gctl_get_paraml(req, "force", sizeof(*force));
759140074Spjd	if (force == NULL) {
760140074Spjd		gctl_error(req, "No '%s' argument.", "force");
761140074Spjd		return;
762140074Spjd	}
763140074Spjd
764140074Spjd	for (i = 0; i < (u_int)*nargs; i++) {
765140074Spjd		snprintf(param, sizeof(param), "arg%u", i);
766140074Spjd		name = gctl_get_asciiparam(req, param);
767140074Spjd		if (name == NULL) {
768140074Spjd			gctl_error(req, "No 'arg%u' argument.", i);
769140074Spjd			return;
770140074Spjd		}
771140074Spjd		sc = g_shsec_find_device(mp, name);
772140074Spjd		if (sc == NULL) {
773140074Spjd			gctl_error(req, "No such device: %s.", name);
774140074Spjd			return;
775140074Spjd		}
776140074Spjd		error = g_shsec_destroy(sc, *force);
777140074Spjd		if (error != 0) {
778140074Spjd			gctl_error(req, "Cannot destroy device %s (error=%d).",
779140074Spjd			    sc->sc_name, error);
780140074Spjd			return;
781140074Spjd		}
782140074Spjd	}
783140074Spjd}
784140074Spjd
785140074Spjdstatic void
786140074Spjdg_shsec_config(struct gctl_req *req, struct g_class *mp, const char *verb)
787140074Spjd{
788140074Spjd	uint32_t *version;
789140074Spjd
790140074Spjd	g_topology_assert();
791140074Spjd
792140074Spjd	version = gctl_get_paraml(req, "version", sizeof(*version));
793140074Spjd	if (version == NULL) {
794140074Spjd		gctl_error(req, "No '%s' argument.", "version");
795140074Spjd		return;
796140074Spjd	}
797140074Spjd	if (*version != G_SHSEC_VERSION) {
798140074Spjd		gctl_error(req, "Userland and kernel parts are out of sync.");
799140074Spjd		return;
800140074Spjd	}
801140074Spjd
802140074Spjd	if (strcmp(verb, "stop") == 0) {
803140074Spjd		g_shsec_ctl_destroy(req, mp);
804140074Spjd		return;
805140074Spjd	}
806140074Spjd
807140074Spjd	gctl_error(req, "Unknown verb.");
808140074Spjd}
809140074Spjd
810140074Spjdstatic void
811140074Spjdg_shsec_dumpconf(struct sbuf *sb, const char *indent, struct g_geom *gp,
812140074Spjd    struct g_consumer *cp, struct g_provider *pp)
813140074Spjd{
814140074Spjd	struct g_shsec_softc *sc;
815140074Spjd
816140074Spjd	sc = gp->softc;
817140074Spjd	if (sc == NULL)
818140074Spjd		return;
819140074Spjd	if (pp != NULL) {
820140074Spjd		/* Nothing here. */
821140074Spjd	} else if (cp != NULL) {
822140074Spjd		sbuf_printf(sb, "%s<Number>%u</Number>\n", indent,
823140074Spjd		    (u_int)cp->index);
824140074Spjd	} else {
825140074Spjd		sbuf_printf(sb, "%s<ID>%u</ID>\n", indent, (u_int)sc->sc_id);
826140074Spjd		sbuf_printf(sb, "%s<Status>Total=%u, Online=%u</Status>\n",
827140074Spjd		    indent, sc->sc_ndisks, g_shsec_nvalid(sc));
828140074Spjd		sbuf_printf(sb, "%s<State>", indent);
829140074Spjd		if (sc->sc_provider != NULL && sc->sc_provider->error == 0)
830140074Spjd			sbuf_printf(sb, "UP");
831140074Spjd		else
832140074Spjd			sbuf_printf(sb, "DOWN");
833140074Spjd		sbuf_printf(sb, "</State>\n");
834140074Spjd	}
835140074Spjd}
836140074Spjd
837140074SpjdDECLARE_GEOM_CLASS(g_shsec_class, g_shsec);
838