xref: /freebsd/sys/geom/eli/g_eli.c (revision a80f82a4a3c541a35d9b3b41e94e05cc583bb4dd)
1c58794deSPawel Jakub Dawidek /*-
2c58794deSPawel Jakub Dawidek  * Copyright (c) 2005 Pawel Jakub Dawidek <pjd@FreeBSD.org>
3c58794deSPawel Jakub Dawidek  * All rights reserved.
4c58794deSPawel Jakub Dawidek  *
5c58794deSPawel Jakub Dawidek  * Redistribution and use in source and binary forms, with or without
6c58794deSPawel Jakub Dawidek  * modification, are permitted provided that the following conditions
7c58794deSPawel Jakub Dawidek  * are met:
8c58794deSPawel Jakub Dawidek  * 1. Redistributions of source code must retain the above copyright
9c58794deSPawel Jakub Dawidek  *    notice, this list of conditions and the following disclaimer.
10c58794deSPawel Jakub Dawidek  * 2. Redistributions in binary form must reproduce the above copyright
11c58794deSPawel Jakub Dawidek  *    notice, this list of conditions and the following disclaimer in the
12c58794deSPawel Jakub Dawidek  *    documentation and/or other materials provided with the distribution.
13c58794deSPawel Jakub Dawidek  *
14c58794deSPawel Jakub Dawidek  * THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND
15c58794deSPawel Jakub Dawidek  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16c58794deSPawel Jakub Dawidek  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17c58794deSPawel Jakub Dawidek  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE
18c58794deSPawel Jakub Dawidek  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19c58794deSPawel Jakub Dawidek  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20c58794deSPawel Jakub Dawidek  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21c58794deSPawel Jakub Dawidek  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22c58794deSPawel Jakub Dawidek  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23c58794deSPawel Jakub Dawidek  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24c58794deSPawel Jakub Dawidek  * SUCH DAMAGE.
25c58794deSPawel Jakub Dawidek  */
26c58794deSPawel Jakub Dawidek 
27c58794deSPawel Jakub Dawidek #include <sys/cdefs.h>
28c58794deSPawel Jakub Dawidek __FBSDID("$FreeBSD$");
29c58794deSPawel Jakub Dawidek 
30c58794deSPawel Jakub Dawidek #include <sys/param.h>
31c58794deSPawel Jakub Dawidek #include <sys/systm.h>
32c58794deSPawel Jakub Dawidek #include <sys/kernel.h>
33c58794deSPawel Jakub Dawidek #include <sys/module.h>
34c58794deSPawel Jakub Dawidek #include <sys/lock.h>
35c58794deSPawel Jakub Dawidek #include <sys/mutex.h>
36c58794deSPawel Jakub Dawidek #include <sys/bio.h>
37c58794deSPawel Jakub Dawidek #include <sys/sysctl.h>
38c58794deSPawel Jakub Dawidek #include <sys/malloc.h>
39c58794deSPawel Jakub Dawidek #include <sys/kthread.h>
40c58794deSPawel Jakub Dawidek #include <sys/proc.h>
41c58794deSPawel Jakub Dawidek #include <sys/sched.h>
42dd549194SPawel Jakub Dawidek #include <sys/smp.h>
43c58794deSPawel Jakub Dawidek #include <sys/uio.h>
44a80f82a4SPawel Jakub Dawidek #include <sys/vnode.h>
45c58794deSPawel Jakub Dawidek 
46c58794deSPawel Jakub Dawidek #include <vm/uma.h>
47c58794deSPawel Jakub Dawidek 
48c58794deSPawel Jakub Dawidek #include <geom/geom.h>
49c58794deSPawel Jakub Dawidek #include <geom/eli/g_eli.h>
50c58794deSPawel Jakub Dawidek #include <geom/eli/pkcs5v2.h>
51c58794deSPawel Jakub Dawidek 
52c58794deSPawel Jakub Dawidek 
53c58794deSPawel Jakub Dawidek MALLOC_DEFINE(M_ELI, "eli data", "GEOM_ELI Data");
54c58794deSPawel Jakub Dawidek 
55c58794deSPawel Jakub Dawidek SYSCTL_DECL(_kern_geom);
56c58794deSPawel Jakub Dawidek SYSCTL_NODE(_kern_geom, OID_AUTO, eli, CTLFLAG_RW, 0, "GEOM_ELI stuff");
5776254298SPawel Jakub Dawidek u_int g_eli_debug = 0;
58c58794deSPawel Jakub Dawidek TUNABLE_INT("kern.geom.eli.debug", &g_eli_debug);
59c58794deSPawel Jakub Dawidek SYSCTL_UINT(_kern_geom_eli, OID_AUTO, debug, CTLFLAG_RW, &g_eli_debug, 0,
60c58794deSPawel Jakub Dawidek     "Debug level");
61c58794deSPawel Jakub Dawidek static u_int g_eli_tries = 3;
62c58794deSPawel Jakub Dawidek TUNABLE_INT("kern.geom.eli.tries", &g_eli_tries);
63c58794deSPawel Jakub Dawidek SYSCTL_UINT(_kern_geom_eli, OID_AUTO, tries, CTLFLAG_RW, &g_eli_tries, 0,
6498645006SChristian Brueffer     "Number of tries for entering the passphrase");
65c58794deSPawel Jakub Dawidek static u_int g_eli_visible_passphrase = 0;
66c58794deSPawel Jakub Dawidek TUNABLE_INT("kern.geom.eli.visible_passphrase", &g_eli_visible_passphrase);
67c58794deSPawel Jakub Dawidek SYSCTL_UINT(_kern_geom_eli, OID_AUTO, visible_passphrase, CTLFLAG_RW,
68c58794deSPawel Jakub Dawidek     &g_eli_visible_passphrase, 0,
6998645006SChristian Brueffer     "Turn on echo when entering the passphrase (for debug purposes only!!)");
70c58794deSPawel Jakub Dawidek u_int g_eli_overwrites = 5;
71c58794deSPawel Jakub Dawidek SYSCTL_UINT(_kern_geom_eli, OID_AUTO, overwrites, CTLFLAG_RW, &g_eli_overwrites,
7298645006SChristian Brueffer     0, "Number of times on-disk keys should be overwritten when destroying them");
73dd549194SPawel Jakub Dawidek static u_int g_eli_threads = 0;
74c58794deSPawel Jakub Dawidek TUNABLE_INT("kern.geom.eli.threads", &g_eli_threads);
75c58794deSPawel Jakub Dawidek SYSCTL_UINT(_kern_geom_eli, OID_AUTO, threads, CTLFLAG_RW, &g_eli_threads, 0,
76c58794deSPawel Jakub Dawidek     "Number of threads doing crypto work");
77c58794deSPawel Jakub Dawidek 
78c58794deSPawel Jakub Dawidek static int g_eli_destroy_geom(struct gctl_req *req, struct g_class *mp,
79c58794deSPawel Jakub Dawidek     struct g_geom *gp);
80dddd1d53SPawel Jakub Dawidek static void g_eli_crypto_run(struct g_eli_worker *wr, struct bio *bp);
81c58794deSPawel Jakub Dawidek 
82c58794deSPawel Jakub Dawidek static g_taste_t g_eli_taste;
83c58794deSPawel Jakub Dawidek static g_dumpconf_t g_eli_dumpconf;
84c58794deSPawel Jakub Dawidek 
85c58794deSPawel Jakub Dawidek struct g_class g_eli_class = {
86c58794deSPawel Jakub Dawidek 	.name = G_ELI_CLASS_NAME,
87c58794deSPawel Jakub Dawidek 	.version = G_VERSION,
88c58794deSPawel Jakub Dawidek 	.ctlreq = g_eli_config,
89c58794deSPawel Jakub Dawidek 	.taste = g_eli_taste,
90c58794deSPawel Jakub Dawidek 	.destroy_geom = g_eli_destroy_geom
91c58794deSPawel Jakub Dawidek };
92c58794deSPawel Jakub Dawidek 
93c58794deSPawel Jakub Dawidek 
94c58794deSPawel Jakub Dawidek /*
95c58794deSPawel Jakub Dawidek  * Code paths:
96c58794deSPawel Jakub Dawidek  * BIO_READ:
97c58794deSPawel Jakub Dawidek  *	g_eli_start -> g_io_request -> g_eli_read_done -> g_eli_crypto_run -> g_eli_crypto_read_done -> g_io_deliver
98c58794deSPawel Jakub Dawidek  * BIO_WRITE:
99c58794deSPawel Jakub Dawidek  *	g_eli_start -> g_eli_crypto_run -> g_eli_crypto_write_done -> g_io_request -> g_eli_write_done -> g_io_deliver
100c58794deSPawel Jakub Dawidek  */
101c58794deSPawel Jakub Dawidek 
102c58794deSPawel Jakub Dawidek 
103c58794deSPawel Jakub Dawidek /*
104c58794deSPawel Jakub Dawidek  * EAGAIN from crypto(9) means, that we were probably balanced to another crypto
105c58794deSPawel Jakub Dawidek  * accelerator or something like this.
106c58794deSPawel Jakub Dawidek  * The function updates the SID and rerun the operation.
107c58794deSPawel Jakub Dawidek  */
108c58794deSPawel Jakub Dawidek static int
109c58794deSPawel Jakub Dawidek g_eli_crypto_rerun(struct cryptop *crp)
110c58794deSPawel Jakub Dawidek {
111c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
112c58794deSPawel Jakub Dawidek 	struct g_eli_worker *wr;
113c58794deSPawel Jakub Dawidek 	struct bio *bp;
114c58794deSPawel Jakub Dawidek 	int error;
115c58794deSPawel Jakub Dawidek 
116c58794deSPawel Jakub Dawidek 	bp = (struct bio *)crp->crp_opaque;
117c58794deSPawel Jakub Dawidek 	sc = bp->bio_to->geom->softc;
118c58794deSPawel Jakub Dawidek 	LIST_FOREACH(wr, &sc->sc_workers, w_next) {
119c58794deSPawel Jakub Dawidek 		if (wr->w_number == bp->bio_pflags)
120c58794deSPawel Jakub Dawidek 			break;
121c58794deSPawel Jakub Dawidek 	}
122c58794deSPawel Jakub Dawidek 	KASSERT(wr != NULL, ("Invalid worker (%u).", bp->bio_pflags));
12398645006SChristian Brueffer 	G_ELI_DEBUG(1, "Rerunning crypto %s request (sid: %ju -> %ju).",
124c58794deSPawel Jakub Dawidek 	    bp->bio_cmd == BIO_READ ? "READ" : "WRITE", (uintmax_t)wr->w_sid,
125c58794deSPawel Jakub Dawidek 	    (uintmax_t)crp->crp_sid);
126c58794deSPawel Jakub Dawidek 	wr->w_sid = crp->crp_sid;
127c58794deSPawel Jakub Dawidek 	crp->crp_etype = 0;
128c58794deSPawel Jakub Dawidek 	error = crypto_dispatch(crp);
129c58794deSPawel Jakub Dawidek 	if (error == 0)
130c58794deSPawel Jakub Dawidek 		return (0);
131c58794deSPawel Jakub Dawidek 	G_ELI_DEBUG(1, "%s: crypto_dispatch() returned %d.", __func__, error);
132c58794deSPawel Jakub Dawidek 	crp->crp_etype = error;
133c58794deSPawel Jakub Dawidek 	return (error);
134c58794deSPawel Jakub Dawidek }
135c58794deSPawel Jakub Dawidek 
136c58794deSPawel Jakub Dawidek /*
137c58794deSPawel Jakub Dawidek  * The function is called afer reading encrypted data from the provider.
138bb30fea6SPawel Jakub Dawidek  *
139bb30fea6SPawel Jakub Dawidek  * g_eli_start -> g_io_request -> G_ELI_READ_DONE -> g_eli_crypto_run -> g_eli_crypto_read_done -> g_io_deliver
140c58794deSPawel Jakub Dawidek  */
141c58794deSPawel Jakub Dawidek static void
142c58794deSPawel Jakub Dawidek g_eli_read_done(struct bio *bp)
143c58794deSPawel Jakub Dawidek {
144c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
145c58794deSPawel Jakub Dawidek 	struct bio *pbp;
146c58794deSPawel Jakub Dawidek 
147c58794deSPawel Jakub Dawidek 	G_ELI_LOGREQ(2, bp, "Request done.");
148c58794deSPawel Jakub Dawidek 	pbp = bp->bio_parent;
149c58794deSPawel Jakub Dawidek 	if (pbp->bio_error == 0)
150c58794deSPawel Jakub Dawidek 		pbp->bio_error = bp->bio_error;
151c58794deSPawel Jakub Dawidek 	g_destroy_bio(bp);
152c58794deSPawel Jakub Dawidek 	if (pbp->bio_error != 0) {
153c58794deSPawel Jakub Dawidek 		G_ELI_LOGREQ(0, pbp, "%s() failed", __func__);
154c58794deSPawel Jakub Dawidek 		pbp->bio_completed = 0;
155c58794deSPawel Jakub Dawidek 		g_io_deliver(pbp, pbp->bio_error);
156c58794deSPawel Jakub Dawidek 		return;
157c58794deSPawel Jakub Dawidek 	}
158c58794deSPawel Jakub Dawidek 	sc = pbp->bio_to->geom->softc;
159c58794deSPawel Jakub Dawidek 	mtx_lock(&sc->sc_queue_mtx);
160c58794deSPawel Jakub Dawidek 	bioq_insert_tail(&sc->sc_queue, pbp);
161c58794deSPawel Jakub Dawidek 	mtx_unlock(&sc->sc_queue_mtx);
162c58794deSPawel Jakub Dawidek 	wakeup(sc);
163c58794deSPawel Jakub Dawidek }
164c58794deSPawel Jakub Dawidek 
165c58794deSPawel Jakub Dawidek /*
166c58794deSPawel Jakub Dawidek  * The function is called after we read and decrypt data.
167bb30fea6SPawel Jakub Dawidek  *
168bb30fea6SPawel Jakub Dawidek  * g_eli_start -> g_io_request -> g_eli_read_done -> g_eli_crypto_run -> G_ELI_CRYPTO_READ_DONE -> g_io_deliver
169c58794deSPawel Jakub Dawidek  */
170c58794deSPawel Jakub Dawidek static int
171c58794deSPawel Jakub Dawidek g_eli_crypto_read_done(struct cryptop *crp)
172c58794deSPawel Jakub Dawidek {
173c58794deSPawel Jakub Dawidek 	struct bio *bp;
174c58794deSPawel Jakub Dawidek 
175c58794deSPawel Jakub Dawidek 	if (crp->crp_etype == EAGAIN) {
176c58794deSPawel Jakub Dawidek 		if (g_eli_crypto_rerun(crp) == 0)
177c58794deSPawel Jakub Dawidek 			return (0);
178c58794deSPawel Jakub Dawidek 	}
179c58794deSPawel Jakub Dawidek 	bp = (struct bio *)crp->crp_opaque;
180c58794deSPawel Jakub Dawidek 	bp->bio_inbed++;
181c58794deSPawel Jakub Dawidek 	if (crp->crp_etype == 0) {
182c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(3, "Crypto READ request done (%d/%d).",
183c58794deSPawel Jakub Dawidek 		    bp->bio_inbed, bp->bio_children);
184c58794deSPawel Jakub Dawidek 		bp->bio_completed += crp->crp_olen;
185c58794deSPawel Jakub Dawidek 	} else {
186c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(1, "Crypto READ request failed (%d/%d) error=%d.",
187c58794deSPawel Jakub Dawidek 		    bp->bio_inbed, bp->bio_children, crp->crp_etype);
188c58794deSPawel Jakub Dawidek 		if (bp->bio_error == 0)
189c58794deSPawel Jakub Dawidek 			bp->bio_error = crp->crp_etype;
190c58794deSPawel Jakub Dawidek 	}
191c58794deSPawel Jakub Dawidek 	/*
192c58794deSPawel Jakub Dawidek 	 * Do we have all sectors already?
193c58794deSPawel Jakub Dawidek 	 */
194c58794deSPawel Jakub Dawidek 	if (bp->bio_inbed < bp->bio_children)
195c58794deSPawel Jakub Dawidek 		return (0);
196c58794deSPawel Jakub Dawidek 	free(bp->bio_driver2, M_ELI);
197c58794deSPawel Jakub Dawidek 	bp->bio_driver2 = NULL;
198c58794deSPawel Jakub Dawidek 	if (bp->bio_error != 0) {
199c58794deSPawel Jakub Dawidek 		G_ELI_LOGREQ(0, bp, "Crypto READ request failed (error=%d).",
200c58794deSPawel Jakub Dawidek 		    bp->bio_error);
201c58794deSPawel Jakub Dawidek 		bp->bio_completed = 0;
202c58794deSPawel Jakub Dawidek 	}
203c58794deSPawel Jakub Dawidek 	/*
204c58794deSPawel Jakub Dawidek 	 * Read is finished, send it up.
205c58794deSPawel Jakub Dawidek 	 */
206c58794deSPawel Jakub Dawidek 	g_io_deliver(bp, bp->bio_error);
207c58794deSPawel Jakub Dawidek 	return (0);
208c58794deSPawel Jakub Dawidek }
209c58794deSPawel Jakub Dawidek 
210c58794deSPawel Jakub Dawidek /*
211c58794deSPawel Jakub Dawidek  * The function is called after we encrypt and write data.
212bb30fea6SPawel Jakub Dawidek  *
213bb30fea6SPawel Jakub Dawidek  * g_eli_start -> g_eli_crypto_run -> g_eli_crypto_write_done -> g_io_request -> G_ELI_WRITE_DONE -> g_io_deliver
214c58794deSPawel Jakub Dawidek  */
215c58794deSPawel Jakub Dawidek static void
216c58794deSPawel Jakub Dawidek g_eli_write_done(struct bio *bp)
217c58794deSPawel Jakub Dawidek {
218c58794deSPawel Jakub Dawidek 	struct bio *pbp;
219c58794deSPawel Jakub Dawidek 
220c58794deSPawel Jakub Dawidek 	G_ELI_LOGREQ(2, bp, "Request done.");
221c58794deSPawel Jakub Dawidek 	pbp = bp->bio_parent;
222c58794deSPawel Jakub Dawidek 	if (pbp->bio_error == 0)
223c58794deSPawel Jakub Dawidek 		pbp->bio_error = bp->bio_error;
224c58794deSPawel Jakub Dawidek 	free(pbp->bio_driver2, M_ELI);
225c58794deSPawel Jakub Dawidek 	pbp->bio_driver2 = NULL;
226c58794deSPawel Jakub Dawidek 	if (pbp->bio_error == 0)
227c58794deSPawel Jakub Dawidek 		pbp->bio_completed = pbp->bio_length;
228c58794deSPawel Jakub Dawidek 	else {
22971270ca6SPawel Jakub Dawidek 		G_ELI_LOGREQ(0, pbp, "Crypto WRITE request failed (error=%d).",
230c58794deSPawel Jakub Dawidek 		    pbp->bio_error);
231c58794deSPawel Jakub Dawidek 		pbp->bio_completed = 0;
232c58794deSPawel Jakub Dawidek 	}
233c58794deSPawel Jakub Dawidek 	g_destroy_bio(bp);
234c58794deSPawel Jakub Dawidek 	/*
235c58794deSPawel Jakub Dawidek 	 * Write is finished, send it up.
236c58794deSPawel Jakub Dawidek 	 */
237c58794deSPawel Jakub Dawidek 	g_io_deliver(pbp, pbp->bio_error);
238c58794deSPawel Jakub Dawidek }
239c58794deSPawel Jakub Dawidek 
240c58794deSPawel Jakub Dawidek /*
241c58794deSPawel Jakub Dawidek  * The function is called after data encryption.
242bb30fea6SPawel Jakub Dawidek  *
243bb30fea6SPawel Jakub Dawidek  * g_eli_start -> g_eli_crypto_run -> G_ELI_CRYPTO_WRITE_DONE -> g_io_request -> g_eli_write_done -> g_io_deliver
244c58794deSPawel Jakub Dawidek  */
245c58794deSPawel Jakub Dawidek static int
246c58794deSPawel Jakub Dawidek g_eli_crypto_write_done(struct cryptop *crp)
247c58794deSPawel Jakub Dawidek {
248c58794deSPawel Jakub Dawidek 	struct g_geom *gp;
249c58794deSPawel Jakub Dawidek 	struct g_consumer *cp;
250c58794deSPawel Jakub Dawidek 	struct bio *bp, *cbp;
251c58794deSPawel Jakub Dawidek 
252c58794deSPawel Jakub Dawidek 	if (crp->crp_etype == EAGAIN) {
253c58794deSPawel Jakub Dawidek 		if (g_eli_crypto_rerun(crp) == 0)
254c58794deSPawel Jakub Dawidek 			return (0);
255c58794deSPawel Jakub Dawidek 	}
256c58794deSPawel Jakub Dawidek 	bp = (struct bio *)crp->crp_opaque;
257c58794deSPawel Jakub Dawidek 	bp->bio_inbed++;
258c58794deSPawel Jakub Dawidek 	if (crp->crp_etype == 0) {
259c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(3, "Crypto WRITE request done (%d/%d).",
260c58794deSPawel Jakub Dawidek 		    bp->bio_inbed, bp->bio_children);
261c58794deSPawel Jakub Dawidek 	} else {
262c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(1, "Crypto WRITE request failed (%d/%d) error=%d.",
263c58794deSPawel Jakub Dawidek 		    bp->bio_inbed, bp->bio_children, crp->crp_etype);
264c58794deSPawel Jakub Dawidek 		if (bp->bio_error == 0)
265c58794deSPawel Jakub Dawidek 			bp->bio_error = crp->crp_etype;
266c58794deSPawel Jakub Dawidek 	}
267c58794deSPawel Jakub Dawidek 	/*
268c58794deSPawel Jakub Dawidek 	 * All sectors are already encrypted?
269c58794deSPawel Jakub Dawidek 	 */
270c58794deSPawel Jakub Dawidek 	if (bp->bio_inbed < bp->bio_children)
271c58794deSPawel Jakub Dawidek 		return (0);
272c58794deSPawel Jakub Dawidek 	bp->bio_inbed = 0;
273c58794deSPawel Jakub Dawidek 	bp->bio_children = 1;
274c58794deSPawel Jakub Dawidek 	cbp = bp->bio_driver1;
275c58794deSPawel Jakub Dawidek 	bp->bio_driver1 = NULL;
276c58794deSPawel Jakub Dawidek 	if (bp->bio_error != 0) {
277c58794deSPawel Jakub Dawidek 		G_ELI_LOGREQ(0, bp, "Crypto WRITE request failed (error=%d).",
278c58794deSPawel Jakub Dawidek 		    bp->bio_error);
279c58794deSPawel Jakub Dawidek 		free(bp->bio_driver2, M_ELI);
280c58794deSPawel Jakub Dawidek 		bp->bio_driver2 = NULL;
281c58794deSPawel Jakub Dawidek 		g_destroy_bio(cbp);
282c58794deSPawel Jakub Dawidek 		g_io_deliver(bp, bp->bio_error);
283c58794deSPawel Jakub Dawidek 		return (0);
284c58794deSPawel Jakub Dawidek 	}
285c58794deSPawel Jakub Dawidek 	cbp->bio_data = bp->bio_driver2;
286c58794deSPawel Jakub Dawidek 	cbp->bio_done = g_eli_write_done;
287c58794deSPawel Jakub Dawidek 	gp = bp->bio_to->geom;
288c58794deSPawel Jakub Dawidek 	cp = LIST_FIRST(&gp->consumer);
289c58794deSPawel Jakub Dawidek 	cbp->bio_to = cp->provider;
290c58794deSPawel Jakub Dawidek 	G_ELI_LOGREQ(2, cbp, "Sending request.");
291c58794deSPawel Jakub Dawidek 	/*
292c58794deSPawel Jakub Dawidek 	 * Send encrypted data to the provider.
293c58794deSPawel Jakub Dawidek 	 */
294c58794deSPawel Jakub Dawidek 	g_io_request(cbp, cp);
295c58794deSPawel Jakub Dawidek 	return (0);
296c58794deSPawel Jakub Dawidek }
297c58794deSPawel Jakub Dawidek 
298c58794deSPawel Jakub Dawidek /*
299c58794deSPawel Jakub Dawidek  * This function should never be called, but GEOM made as it set ->orphan()
300c58794deSPawel Jakub Dawidek  * method for every geom.
301c58794deSPawel Jakub Dawidek  */
302c58794deSPawel Jakub Dawidek static void
303c58794deSPawel Jakub Dawidek g_eli_orphan_spoil_assert(struct g_consumer *cp)
304c58794deSPawel Jakub Dawidek {
305c58794deSPawel Jakub Dawidek 
306c58794deSPawel Jakub Dawidek 	panic("Function %s() called for %s.", __func__, cp->geom->name);
307c58794deSPawel Jakub Dawidek }
308c58794deSPawel Jakub Dawidek 
309c58794deSPawel Jakub Dawidek static void
310c58794deSPawel Jakub Dawidek g_eli_orphan(struct g_consumer *cp)
311c58794deSPawel Jakub Dawidek {
312c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
313c58794deSPawel Jakub Dawidek 
314c58794deSPawel Jakub Dawidek 	g_topology_assert();
315c58794deSPawel Jakub Dawidek 	sc = cp->geom->softc;
316c58794deSPawel Jakub Dawidek 	if (sc == NULL)
317c58794deSPawel Jakub Dawidek 		return;
318c58794deSPawel Jakub Dawidek 	g_eli_destroy(sc, 1);
319c58794deSPawel Jakub Dawidek }
320c58794deSPawel Jakub Dawidek 
321bb30fea6SPawel Jakub Dawidek /*
322bb30fea6SPawel Jakub Dawidek  * BIO_READ : G_ELI_START -> g_io_request -> g_eli_read_done -> g_eli_crypto_run -> g_eli_crypto_read_done -> g_io_deliver
323bb30fea6SPawel Jakub Dawidek  * BIO_WRITE: G_ELI_START -> g_eli_crypto_run -> g_eli_crypto_write_done -> g_io_request -> g_eli_write_done -> g_io_deliver
324bb30fea6SPawel Jakub Dawidek  */
325c58794deSPawel Jakub Dawidek static void
326c58794deSPawel Jakub Dawidek g_eli_start(struct bio *bp)
327c58794deSPawel Jakub Dawidek {
328c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
329c58794deSPawel Jakub Dawidek 	struct bio *cbp;
330c58794deSPawel Jakub Dawidek 
331c58794deSPawel Jakub Dawidek 	sc = bp->bio_to->geom->softc;
332c58794deSPawel Jakub Dawidek 	KASSERT(sc != NULL,
333c58794deSPawel Jakub Dawidek 	    ("Provider's error should be set (error=%d)(device=%s).",
334c58794deSPawel Jakub Dawidek 	    bp->bio_to->error, bp->bio_to->name));
335c58794deSPawel Jakub Dawidek 	G_ELI_LOGREQ(2, bp, "Request received.");
336c58794deSPawel Jakub Dawidek 
337c58794deSPawel Jakub Dawidek 	switch (bp->bio_cmd) {
338c58794deSPawel Jakub Dawidek 	case BIO_READ:
339c58794deSPawel Jakub Dawidek 	case BIO_WRITE:
340c58794deSPawel Jakub Dawidek 		break;
341c58794deSPawel Jakub Dawidek 	case BIO_DELETE:
342c58794deSPawel Jakub Dawidek 		/*
343c58794deSPawel Jakub Dawidek 		 * We could eventually support BIO_DELETE request.
344c58794deSPawel Jakub Dawidek 		 * It could be done by overwritting requested sector with
345c58794deSPawel Jakub Dawidek 		 * random data g_eli_overwrites number of times.
346c58794deSPawel Jakub Dawidek 		 */
347c58794deSPawel Jakub Dawidek 	case BIO_GETATTR:
348c58794deSPawel Jakub Dawidek 	default:
349c58794deSPawel Jakub Dawidek 		g_io_deliver(bp, EOPNOTSUPP);
350c58794deSPawel Jakub Dawidek 		return;
351c58794deSPawel Jakub Dawidek 	}
352c58794deSPawel Jakub Dawidek 	cbp = g_clone_bio(bp);
353c58794deSPawel Jakub Dawidek 	if (cbp == NULL) {
354c58794deSPawel Jakub Dawidek 		g_io_deliver(bp, ENOMEM);
355c58794deSPawel Jakub Dawidek 		return;
356c58794deSPawel Jakub Dawidek 	}
357c58794deSPawel Jakub Dawidek 	if (bp->bio_cmd == BIO_READ) {
358c58794deSPawel Jakub Dawidek 		struct g_consumer *cp;
359c58794deSPawel Jakub Dawidek 
360c58794deSPawel Jakub Dawidek 		cbp->bio_done = g_eli_read_done;
361c58794deSPawel Jakub Dawidek 		cp = LIST_FIRST(&sc->sc_geom->consumer);
362c58794deSPawel Jakub Dawidek 		cbp->bio_to = cp->provider;
363c58794deSPawel Jakub Dawidek 		G_ELI_LOGREQ(2, bp, "Sending request.");
364c58794deSPawel Jakub Dawidek 		/*
365c58794deSPawel Jakub Dawidek 		 * Read encrypted data from provider.
366c58794deSPawel Jakub Dawidek 		 */
367c58794deSPawel Jakub Dawidek 		g_io_request(cbp, cp);
368c58794deSPawel Jakub Dawidek 	} else /* if (bp->bio_cmd == BIO_WRITE) */ {
369c58794deSPawel Jakub Dawidek 		bp->bio_driver1 = cbp;
370c58794deSPawel Jakub Dawidek 		mtx_lock(&sc->sc_queue_mtx);
371c58794deSPawel Jakub Dawidek 		bioq_insert_tail(&sc->sc_queue, bp);
372c58794deSPawel Jakub Dawidek 		mtx_unlock(&sc->sc_queue_mtx);
373c58794deSPawel Jakub Dawidek 		wakeup(sc);
374c58794deSPawel Jakub Dawidek 	}
375c58794deSPawel Jakub Dawidek }
376c58794deSPawel Jakub Dawidek 
377c58794deSPawel Jakub Dawidek /*
378c58794deSPawel Jakub Dawidek  * This is the main function for kernel worker thread when we don't have
379c58794deSPawel Jakub Dawidek  * hardware acceleration and we have to do cryptography in software.
380c58794deSPawel Jakub Dawidek  * Dedicated thread is needed, so we don't slow down g_up/g_down GEOM
381c58794deSPawel Jakub Dawidek  * threads with crypto work.
382c58794deSPawel Jakub Dawidek  */
383c58794deSPawel Jakub Dawidek static void
384c58794deSPawel Jakub Dawidek g_eli_worker(void *arg)
385c58794deSPawel Jakub Dawidek {
386c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
387c58794deSPawel Jakub Dawidek 	struct g_eli_worker *wr;
388c58794deSPawel Jakub Dawidek 	struct bio *bp;
389c58794deSPawel Jakub Dawidek 
390c58794deSPawel Jakub Dawidek 	wr = arg;
391c58794deSPawel Jakub Dawidek 	sc = wr->w_softc;
392c58794deSPawel Jakub Dawidek 	mtx_lock_spin(&sched_lock);
393c58794deSPawel Jakub Dawidek 	sched_prio(curthread, PRIBIO);
394dd549194SPawel Jakub Dawidek 	if (sc->sc_crypto == G_ELI_CRYPTO_SW && g_eli_threads == 0)
395dd549194SPawel Jakub Dawidek 		sched_bind(curthread, wr->w_number);
396c58794deSPawel Jakub Dawidek 	mtx_unlock_spin(&sched_lock);
397c58794deSPawel Jakub Dawidek 
398c58794deSPawel Jakub Dawidek 	G_ELI_DEBUG(1, "Thread %s started.", curthread->td_proc->p_comm);
399c58794deSPawel Jakub Dawidek 
400c58794deSPawel Jakub Dawidek 	for (;;) {
401c58794deSPawel Jakub Dawidek 		mtx_lock(&sc->sc_queue_mtx);
402c58794deSPawel Jakub Dawidek 		bp = bioq_takefirst(&sc->sc_queue);
403c58794deSPawel Jakub Dawidek 		if (bp == NULL) {
404c58794deSPawel Jakub Dawidek 			if ((sc->sc_flags & G_ELI_FLAG_DESTROY) != 0) {
405c58794deSPawel Jakub Dawidek 				LIST_REMOVE(wr, w_next);
406c58794deSPawel Jakub Dawidek 				crypto_freesession(wr->w_sid);
407c58794deSPawel Jakub Dawidek 				free(wr, M_ELI);
408c58794deSPawel Jakub Dawidek 				G_ELI_DEBUG(1, "Thread %s exiting.",
409c58794deSPawel Jakub Dawidek 				    curthread->td_proc->p_comm);
410c58794deSPawel Jakub Dawidek 				wakeup(&sc->sc_workers);
411c58794deSPawel Jakub Dawidek 				mtx_unlock(&sc->sc_queue_mtx);
412c58794deSPawel Jakub Dawidek 				kthread_exit(0);
413c58794deSPawel Jakub Dawidek 			}
414c58794deSPawel Jakub Dawidek 			msleep(sc, &sc->sc_queue_mtx, PRIBIO | PDROP,
415c58794deSPawel Jakub Dawidek 			    "geli:w", 0);
416c58794deSPawel Jakub Dawidek 			continue;
417c58794deSPawel Jakub Dawidek 		}
418c58794deSPawel Jakub Dawidek 		mtx_unlock(&sc->sc_queue_mtx);
419dddd1d53SPawel Jakub Dawidek 		g_eli_crypto_run(wr, bp);
420c58794deSPawel Jakub Dawidek 	}
421c58794deSPawel Jakub Dawidek }
422c58794deSPawel Jakub Dawidek 
423c58794deSPawel Jakub Dawidek /*
424c58794deSPawel Jakub Dawidek  * Here we generate IV. It is unique for every sector.
425c58794deSPawel Jakub Dawidek  */
426c58794deSPawel Jakub Dawidek static void
427c58794deSPawel Jakub Dawidek g_eli_crypto_ivgen(struct g_eli_softc *sc, off_t offset, u_char *iv,
428c58794deSPawel Jakub Dawidek     size_t size)
429c58794deSPawel Jakub Dawidek {
430c58794deSPawel Jakub Dawidek 	u_char hash[SHA256_DIGEST_LENGTH];
431c58794deSPawel Jakub Dawidek 	SHA256_CTX ctx;
432c58794deSPawel Jakub Dawidek 
433c58794deSPawel Jakub Dawidek 	/* Copy precalculated SHA256 context for IV-Key. */
434c58794deSPawel Jakub Dawidek 	bcopy(&sc->sc_ivctx, &ctx, sizeof(ctx));
435c58794deSPawel Jakub Dawidek 	SHA256_Update(&ctx, (uint8_t *)&offset, sizeof(offset));
436c58794deSPawel Jakub Dawidek 	SHA256_Final(hash, &ctx);
437c58794deSPawel Jakub Dawidek 	bcopy(hash, iv, size);
438c58794deSPawel Jakub Dawidek }
439c58794deSPawel Jakub Dawidek 
440c58794deSPawel Jakub Dawidek /*
441c58794deSPawel Jakub Dawidek  * This is the main function responsible for cryptography (ie. communication
442c58794deSPawel Jakub Dawidek  * with crypto(9) subsystem).
443c58794deSPawel Jakub Dawidek  */
444dddd1d53SPawel Jakub Dawidek static void
445c58794deSPawel Jakub Dawidek g_eli_crypto_run(struct g_eli_worker *wr, struct bio *bp)
446c58794deSPawel Jakub Dawidek {
447c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
448c58794deSPawel Jakub Dawidek 	struct cryptop *crp;
449c58794deSPawel Jakub Dawidek 	struct cryptodesc *crd;
450c58794deSPawel Jakub Dawidek 	struct uio *uio;
451c58794deSPawel Jakub Dawidek 	struct iovec *iov;
452c58794deSPawel Jakub Dawidek 	u_int i, nsec, add, secsize;
4534ec04907SPawel Jakub Dawidek 	int err, error;
454c58794deSPawel Jakub Dawidek 	size_t size;
455c58794deSPawel Jakub Dawidek 	u_char *p, *data;
456c58794deSPawel Jakub Dawidek 
457c58794deSPawel Jakub Dawidek 	G_ELI_LOGREQ(3, bp, "%s", __func__);
458c58794deSPawel Jakub Dawidek 
459c58794deSPawel Jakub Dawidek 	bp->bio_pflags = wr->w_number;
460c58794deSPawel Jakub Dawidek 	sc = wr->w_softc;
461c58794deSPawel Jakub Dawidek 	secsize = LIST_FIRST(&sc->sc_geom->provider)->sectorsize;
462c58794deSPawel Jakub Dawidek 	nsec = bp->bio_length / secsize;
463c58794deSPawel Jakub Dawidek 
464c58794deSPawel Jakub Dawidek 	/*
465c58794deSPawel Jakub Dawidek 	 * Calculate how much memory do we need.
466c58794deSPawel Jakub Dawidek 	 * We need separate crypto operation for every single sector.
467c58794deSPawel Jakub Dawidek 	 * It is much faster to calculate total amount of needed memory here and
468c58794deSPawel Jakub Dawidek 	 * do the allocation once insteaf of allocate memory in pieces (many,
469c58794deSPawel Jakub Dawidek 	 * many pieces).
470c58794deSPawel Jakub Dawidek 	 */
471c58794deSPawel Jakub Dawidek 	size = sizeof(*crp) * nsec;
472c58794deSPawel Jakub Dawidek 	size += sizeof(*crd) * nsec;
473c58794deSPawel Jakub Dawidek 	size += sizeof(*uio) * nsec;
474c58794deSPawel Jakub Dawidek 	size += sizeof(*iov) * nsec;
475c58794deSPawel Jakub Dawidek 	/*
476c58794deSPawel Jakub Dawidek 	 * If we write the data we cannot destroy current bio_data content,
477c58794deSPawel Jakub Dawidek 	 * so we need to allocate more memory for encrypted data.
478c58794deSPawel Jakub Dawidek 	 */
479c58794deSPawel Jakub Dawidek 	if (bp->bio_cmd == BIO_WRITE)
480c58794deSPawel Jakub Dawidek 		size += bp->bio_length;
481dddd1d53SPawel Jakub Dawidek 	p = malloc(size, M_ELI, M_WAITOK);
482c58794deSPawel Jakub Dawidek 
483c58794deSPawel Jakub Dawidek 	bp->bio_inbed = 0;
484c58794deSPawel Jakub Dawidek 	bp->bio_children = nsec;
485c58794deSPawel Jakub Dawidek 	bp->bio_driver2 = p;
486c58794deSPawel Jakub Dawidek 
487c58794deSPawel Jakub Dawidek 	if (bp->bio_cmd == BIO_READ)
488c58794deSPawel Jakub Dawidek 		data = bp->bio_data;
489c58794deSPawel Jakub Dawidek 	else {
490c58794deSPawel Jakub Dawidek 		data = p;
491c58794deSPawel Jakub Dawidek 		p += bp->bio_length;
492c58794deSPawel Jakub Dawidek 		bcopy(bp->bio_data, data, bp->bio_length);
493c58794deSPawel Jakub Dawidek 	}
494c58794deSPawel Jakub Dawidek 
495c58794deSPawel Jakub Dawidek 	error = 0;
496c58794deSPawel Jakub Dawidek 	for (i = 0, add = 0; i < nsec; i++, add += secsize) {
497c58794deSPawel Jakub Dawidek 		crp = (struct cryptop *)p;	p += sizeof(*crp);
498c58794deSPawel Jakub Dawidek 		crd = (struct cryptodesc *)p;	p += sizeof(*crd);
499c58794deSPawel Jakub Dawidek 		uio = (struct uio *)p;		p += sizeof(*uio);
500c58794deSPawel Jakub Dawidek 		iov = (struct iovec *)p;	p += sizeof(*iov);
501c58794deSPawel Jakub Dawidek 
502c58794deSPawel Jakub Dawidek 		iov->iov_len = secsize;
503c58794deSPawel Jakub Dawidek 		iov->iov_base = data;
504c58794deSPawel Jakub Dawidek 		data += secsize;
505c58794deSPawel Jakub Dawidek 
506c58794deSPawel Jakub Dawidek 		uio->uio_iov = iov;
507c58794deSPawel Jakub Dawidek 		uio->uio_iovcnt = 1;
508c58794deSPawel Jakub Dawidek 		uio->uio_segflg = UIO_SYSSPACE;
509c58794deSPawel Jakub Dawidek 		uio->uio_resid = secsize;
510c58794deSPawel Jakub Dawidek 
511c58794deSPawel Jakub Dawidek 		crp->crp_sid = wr->w_sid;
512c58794deSPawel Jakub Dawidek 		crp->crp_ilen = secsize;
513c58794deSPawel Jakub Dawidek 		crp->crp_olen = secsize;
514c58794deSPawel Jakub Dawidek 		crp->crp_opaque = (void *)bp;
515c58794deSPawel Jakub Dawidek 		crp->crp_buf = (void *)uio;
516c58794deSPawel Jakub Dawidek 		if (bp->bio_cmd == BIO_WRITE)
517c58794deSPawel Jakub Dawidek 			crp->crp_callback = g_eli_crypto_write_done;
518c58794deSPawel Jakub Dawidek 		else /* if (bp->bio_cmd == BIO_READ) */
519c58794deSPawel Jakub Dawidek 			crp->crp_callback = g_eli_crypto_read_done;
520c58794deSPawel Jakub Dawidek 		crp->crp_flags = CRYPTO_F_IOV | CRYPTO_F_CBIFSYNC | CRYPTO_F_REL;
521c58794deSPawel Jakub Dawidek 		crp->crp_desc = crd;
522c58794deSPawel Jakub Dawidek 
523c58794deSPawel Jakub Dawidek 		crd->crd_skip = 0;
524c58794deSPawel Jakub Dawidek 		crd->crd_len = secsize;
525c58794deSPawel Jakub Dawidek 		crd->crd_flags =
526c58794deSPawel Jakub Dawidek 		    CRD_F_IV_EXPLICIT | CRD_F_IV_PRESENT | CRD_F_KEY_EXPLICIT;
527c58794deSPawel Jakub Dawidek 		if (bp->bio_cmd == BIO_WRITE)
528c58794deSPawel Jakub Dawidek 			crd->crd_flags |= CRD_F_ENCRYPT;
529c58794deSPawel Jakub Dawidek 		crd->crd_alg = sc->sc_algo;
530c58794deSPawel Jakub Dawidek 		crd->crd_key = sc->sc_datakey;
531c58794deSPawel Jakub Dawidek 		crd->crd_klen = sc->sc_keylen;
532c58794deSPawel Jakub Dawidek 		g_eli_crypto_ivgen(sc, bp->bio_offset + add, crd->crd_iv,
533c58794deSPawel Jakub Dawidek 		    sizeof(crd->crd_iv));
534c58794deSPawel Jakub Dawidek 		crd->crd_next = NULL;
535c58794deSPawel Jakub Dawidek 
536cf479540SPawel Jakub Dawidek 		crp->crp_etype = 0;
537c58794deSPawel Jakub Dawidek 		err = crypto_dispatch(crp);
538c58794deSPawel Jakub Dawidek 		if (error == 0)
539c58794deSPawel Jakub Dawidek 			error = err;
540c58794deSPawel Jakub Dawidek 	}
541c58794deSPawel Jakub Dawidek 	if (bp->bio_error == 0)
542c58794deSPawel Jakub Dawidek 		bp->bio_error = error;
543c58794deSPawel Jakub Dawidek }
544c58794deSPawel Jakub Dawidek 
545c58794deSPawel Jakub Dawidek int
546c58794deSPawel Jakub Dawidek g_eli_read_metadata(struct g_class *mp, struct g_provider *pp,
547c58794deSPawel Jakub Dawidek     struct g_eli_metadata *md)
548c58794deSPawel Jakub Dawidek {
549c58794deSPawel Jakub Dawidek 	struct g_geom *gp;
550c58794deSPawel Jakub Dawidek 	struct g_consumer *cp;
551c58794deSPawel Jakub Dawidek 	u_char *buf = NULL;
552c58794deSPawel Jakub Dawidek 	int error;
553c58794deSPawel Jakub Dawidek 
554c58794deSPawel Jakub Dawidek 	g_topology_assert();
555c58794deSPawel Jakub Dawidek 
556c58794deSPawel Jakub Dawidek 	gp = g_new_geomf(mp, "eli:taste");
557c58794deSPawel Jakub Dawidek 	gp->start = g_eli_start;
558c58794deSPawel Jakub Dawidek 	gp->access = g_std_access;
559c58794deSPawel Jakub Dawidek 	/*
560c58794deSPawel Jakub Dawidek 	 * g_eli_read_metadata() is always called from the event thread.
561c58794deSPawel Jakub Dawidek 	 * Our geom is created and destroyed in the same event, so there
562c58794deSPawel Jakub Dawidek 	 * could be no orphan nor spoil event in the meantime.
563c58794deSPawel Jakub Dawidek 	 */
564c58794deSPawel Jakub Dawidek 	gp->orphan = g_eli_orphan_spoil_assert;
565c58794deSPawel Jakub Dawidek 	gp->spoiled = g_eli_orphan_spoil_assert;
566c58794deSPawel Jakub Dawidek 	cp = g_new_consumer(gp);
567c58794deSPawel Jakub Dawidek 	error = g_attach(cp, pp);
568c58794deSPawel Jakub Dawidek 	if (error != 0)
569c58794deSPawel Jakub Dawidek 		goto end;
570c58794deSPawel Jakub Dawidek 	error = g_access(cp, 1, 0, 0);
571c58794deSPawel Jakub Dawidek 	if (error != 0)
572c58794deSPawel Jakub Dawidek 		goto end;
573c58794deSPawel Jakub Dawidek 	g_topology_unlock();
574c58794deSPawel Jakub Dawidek 	buf = g_read_data(cp, pp->mediasize - pp->sectorsize, pp->sectorsize,
575c58794deSPawel Jakub Dawidek 	    &error);
576c58794deSPawel Jakub Dawidek 	g_topology_lock();
5778a4a44b5SMaxim Sobolev 	if (buf == NULL)
578c58794deSPawel Jakub Dawidek 		goto end;
579c58794deSPawel Jakub Dawidek 	eli_metadata_decode(buf, md);
580c58794deSPawel Jakub Dawidek end:
581c58794deSPawel Jakub Dawidek 	if (buf != NULL)
582c58794deSPawel Jakub Dawidek 		g_free(buf);
583c58794deSPawel Jakub Dawidek 	if (cp->provider != NULL) {
584c58794deSPawel Jakub Dawidek 		if (cp->acr == 1)
585c58794deSPawel Jakub Dawidek 			g_access(cp, -1, 0, 0);
586c58794deSPawel Jakub Dawidek 		g_detach(cp);
587c58794deSPawel Jakub Dawidek 	}
588c58794deSPawel Jakub Dawidek 	g_destroy_consumer(cp);
589c58794deSPawel Jakub Dawidek 	g_destroy_geom(gp);
590c58794deSPawel Jakub Dawidek 	return (error);
591c58794deSPawel Jakub Dawidek }
592c58794deSPawel Jakub Dawidek 
593c58794deSPawel Jakub Dawidek /*
594c58794deSPawel Jakub Dawidek  * The function is called when we had last close on provider and user requested
595c58794deSPawel Jakub Dawidek  * to close it when this situation occur.
596c58794deSPawel Jakub Dawidek  */
597c58794deSPawel Jakub Dawidek static void
598c58794deSPawel Jakub Dawidek g_eli_last_close(struct g_eli_softc *sc)
599c58794deSPawel Jakub Dawidek {
600c58794deSPawel Jakub Dawidek 	struct g_geom *gp;
601c58794deSPawel Jakub Dawidek 	struct g_provider *pp;
602c58794deSPawel Jakub Dawidek 	char ppname[64];
603c58794deSPawel Jakub Dawidek 	int error;
604c58794deSPawel Jakub Dawidek 
605c58794deSPawel Jakub Dawidek 	g_topology_assert();
606c58794deSPawel Jakub Dawidek 	gp = sc->sc_geom;
607c58794deSPawel Jakub Dawidek 	pp = LIST_FIRST(&gp->provider);
608c58794deSPawel Jakub Dawidek 	strlcpy(ppname, pp->name, sizeof(ppname));
609c58794deSPawel Jakub Dawidek 	error = g_eli_destroy(sc, 1);
610c58794deSPawel Jakub Dawidek 	KASSERT(error == 0, ("Cannot detach %s on last close (error=%d).",
611c58794deSPawel Jakub Dawidek 	    ppname, error));
612c58794deSPawel Jakub Dawidek 	G_ELI_DEBUG(0, "Detached %s on last close.", ppname);
613c58794deSPawel Jakub Dawidek }
614c58794deSPawel Jakub Dawidek 
615c58794deSPawel Jakub Dawidek int
616c58794deSPawel Jakub Dawidek g_eli_access(struct g_provider *pp, int dr, int dw, int de)
617c58794deSPawel Jakub Dawidek {
618c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
619c58794deSPawel Jakub Dawidek 	struct g_geom *gp;
620c58794deSPawel Jakub Dawidek 
621c58794deSPawel Jakub Dawidek 	gp = pp->geom;
622c58794deSPawel Jakub Dawidek 	sc = gp->softc;
623c58794deSPawel Jakub Dawidek 
624c58794deSPawel Jakub Dawidek 	if (dw > 0) {
625c58794deSPawel Jakub Dawidek 		/* Someone is opening us for write, we need to remember that. */
626c58794deSPawel Jakub Dawidek 		sc->sc_flags |= G_ELI_FLAG_WOPEN;
627c58794deSPawel Jakub Dawidek 		return (0);
628c58794deSPawel Jakub Dawidek 	}
629c58794deSPawel Jakub Dawidek 	/* Is this the last close? */
630c58794deSPawel Jakub Dawidek 	if (pp->acr + dr > 0 || pp->acw + dw > 0 || pp->ace + de > 0)
631c58794deSPawel Jakub Dawidek 		return (0);
632c58794deSPawel Jakub Dawidek 
633c58794deSPawel Jakub Dawidek 	/*
634c58794deSPawel Jakub Dawidek 	 * Automatically detach on last close if requested.
635c58794deSPawel Jakub Dawidek 	 */
636c58794deSPawel Jakub Dawidek 	if ((sc->sc_flags & G_ELI_FLAG_RW_DETACH) ||
637c58794deSPawel Jakub Dawidek 	    (sc->sc_flags & G_ELI_FLAG_WOPEN)) {
638c58794deSPawel Jakub Dawidek 		g_eli_last_close(sc);
639c58794deSPawel Jakub Dawidek 	}
640c58794deSPawel Jakub Dawidek 	return (0);
641c58794deSPawel Jakub Dawidek }
642c58794deSPawel Jakub Dawidek 
643c58794deSPawel Jakub Dawidek struct g_geom *
644c58794deSPawel Jakub Dawidek g_eli_create(struct gctl_req *req, struct g_class *mp, struct g_provider *bpp,
645c58794deSPawel Jakub Dawidek     const struct g_eli_metadata *md, const u_char *mkey, int nkey)
646c58794deSPawel Jakub Dawidek {
647c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
648c58794deSPawel Jakub Dawidek 	struct g_eli_worker *wr;
649c58794deSPawel Jakub Dawidek 	struct g_geom *gp;
650c58794deSPawel Jakub Dawidek 	struct g_provider *pp;
651c58794deSPawel Jakub Dawidek 	struct g_consumer *cp;
652c58794deSPawel Jakub Dawidek 	struct cryptoini cri;
653c58794deSPawel Jakub Dawidek 	u_int i, threads;
654c58794deSPawel Jakub Dawidek 	int error;
655c58794deSPawel Jakub Dawidek 
656c58794deSPawel Jakub Dawidek 	G_ELI_DEBUG(1, "Creating device %s%s.", bpp->name, G_ELI_SUFFIX);
657c58794deSPawel Jakub Dawidek 
658c58794deSPawel Jakub Dawidek 	gp = g_new_geomf(mp, "%s%s", bpp->name, G_ELI_SUFFIX);
659c58794deSPawel Jakub Dawidek 	gp->softc = NULL;	/* for a moment */
660c58794deSPawel Jakub Dawidek 
661c58794deSPawel Jakub Dawidek 	sc = malloc(sizeof(*sc), M_ELI, M_WAITOK | M_ZERO);
662c58794deSPawel Jakub Dawidek 	gp->start = g_eli_start;
663c58794deSPawel Jakub Dawidek 	/*
664c58794deSPawel Jakub Dawidek 	 * Spoiling cannot happen actually, because we keep provider open for
665c58794deSPawel Jakub Dawidek 	 * writing all the time.
666c58794deSPawel Jakub Dawidek 	 */
667c58794deSPawel Jakub Dawidek 	gp->spoiled = g_eli_orphan_spoil_assert;
668c58794deSPawel Jakub Dawidek 	gp->orphan = g_eli_orphan;
669c58794deSPawel Jakub Dawidek 	/*
670c58794deSPawel Jakub Dawidek 	 * If detach-on-last-close feature is not enabled, we can simply use
671c58794deSPawel Jakub Dawidek 	 * g_std_access().
672c58794deSPawel Jakub Dawidek 	 */
673c58794deSPawel Jakub Dawidek 	if (md->md_flags & G_ELI_FLAG_WO_DETACH)
674c58794deSPawel Jakub Dawidek 		gp->access = g_eli_access;
675c58794deSPawel Jakub Dawidek 	else
676c58794deSPawel Jakub Dawidek 		gp->access = g_std_access;
677c58794deSPawel Jakub Dawidek 	gp->dumpconf = g_eli_dumpconf;
678c58794deSPawel Jakub Dawidek 
679c58794deSPawel Jakub Dawidek 	sc->sc_crypto = G_ELI_CRYPTO_SW;
680c58794deSPawel Jakub Dawidek 	sc->sc_flags = md->md_flags;
681c58794deSPawel Jakub Dawidek 	sc->sc_algo = md->md_algo;
682c58794deSPawel Jakub Dawidek 	sc->sc_nkey = nkey;
683c58794deSPawel Jakub Dawidek 	/*
684c58794deSPawel Jakub Dawidek 	 * Remember the keys in our softc structure.
685c58794deSPawel Jakub Dawidek 	 */
686c58794deSPawel Jakub Dawidek 	bcopy(mkey, sc->sc_ivkey, sizeof(sc->sc_ivkey));
687c58794deSPawel Jakub Dawidek 	mkey += sizeof(sc->sc_ivkey);
688c58794deSPawel Jakub Dawidek 	bcopy(mkey, sc->sc_datakey, sizeof(sc->sc_datakey));
689c58794deSPawel Jakub Dawidek 	sc->sc_keylen = md->md_keylen;
690c58794deSPawel Jakub Dawidek 
691c58794deSPawel Jakub Dawidek 	/*
692c58794deSPawel Jakub Dawidek 	 * Precalculate SHA256 for IV generation.
693c58794deSPawel Jakub Dawidek 	 * This is expensive operation and we can do it only once now or for
694c58794deSPawel Jakub Dawidek 	 * every access to sector, so now will be much better.
695c58794deSPawel Jakub Dawidek 	 */
696c58794deSPawel Jakub Dawidek 	SHA256_Init(&sc->sc_ivctx);
697c58794deSPawel Jakub Dawidek 	SHA256_Update(&sc->sc_ivctx, sc->sc_ivkey, sizeof(sc->sc_ivkey));
698c58794deSPawel Jakub Dawidek 
699c58794deSPawel Jakub Dawidek 	gp->softc = sc;
700c58794deSPawel Jakub Dawidek 	sc->sc_geom = gp;
701c58794deSPawel Jakub Dawidek 
702c58794deSPawel Jakub Dawidek 	bioq_init(&sc->sc_queue);
703c58794deSPawel Jakub Dawidek 	mtx_init(&sc->sc_queue_mtx, "geli:queue", NULL, MTX_DEF);
704c58794deSPawel Jakub Dawidek 
705c58794deSPawel Jakub Dawidek 	pp = NULL;
706c58794deSPawel Jakub Dawidek 	cp = g_new_consumer(gp);
707c58794deSPawel Jakub Dawidek 	error = g_attach(cp, bpp);
708c58794deSPawel Jakub Dawidek 	if (error != 0) {
709c58794deSPawel Jakub Dawidek 		if (req != NULL) {
710c58794deSPawel Jakub Dawidek 			gctl_error(req, "Cannot attach to %s (error=%d).",
711c58794deSPawel Jakub Dawidek 			    bpp->name, error);
712c58794deSPawel Jakub Dawidek 		} else {
713c58794deSPawel Jakub Dawidek 			G_ELI_DEBUG(1, "Cannot attach to %s (error=%d).",
714c58794deSPawel Jakub Dawidek 			    bpp->name, error);
715c58794deSPawel Jakub Dawidek 		}
716c58794deSPawel Jakub Dawidek 		goto failed;
717c58794deSPawel Jakub Dawidek 	}
718c58794deSPawel Jakub Dawidek 	/*
719c58794deSPawel Jakub Dawidek 	 * Keep provider open all the time, so we can run critical tasks,
720c58794deSPawel Jakub Dawidek 	 * like Master Keys deletion, without wondering if we can open
721c58794deSPawel Jakub Dawidek 	 * provider or not.
722c58794deSPawel Jakub Dawidek 	 */
723c58794deSPawel Jakub Dawidek 	error = g_access(cp, 1, 1, 1);
724c58794deSPawel Jakub Dawidek 	if (error != 0) {
725c58794deSPawel Jakub Dawidek 		if (req != NULL) {
726c58794deSPawel Jakub Dawidek 			gctl_error(req, "Cannot access %s (error=%d).",
727c58794deSPawel Jakub Dawidek 			    bpp->name, error);
728c58794deSPawel Jakub Dawidek 		} else {
729c58794deSPawel Jakub Dawidek 			G_ELI_DEBUG(1, "Cannot access %s (error=%d).",
730c58794deSPawel Jakub Dawidek 			    bpp->name, error);
731c58794deSPawel Jakub Dawidek 		}
732c58794deSPawel Jakub Dawidek 		goto failed;
733c58794deSPawel Jakub Dawidek 	}
734c58794deSPawel Jakub Dawidek 
735c58794deSPawel Jakub Dawidek 	LIST_INIT(&sc->sc_workers);
736c58794deSPawel Jakub Dawidek 
737c58794deSPawel Jakub Dawidek 	bzero(&cri, sizeof(cri));
738c58794deSPawel Jakub Dawidek 	cri.cri_alg = sc->sc_algo;
739c58794deSPawel Jakub Dawidek 	cri.cri_klen = sc->sc_keylen;
740c58794deSPawel Jakub Dawidek 	cri.cri_key = sc->sc_datakey;
741c58794deSPawel Jakub Dawidek 
742c58794deSPawel Jakub Dawidek 	threads = g_eli_threads;
743dd549194SPawel Jakub Dawidek 	if (threads == 0)
744dd549194SPawel Jakub Dawidek 		threads = mp_ncpus;
745dd549194SPawel Jakub Dawidek 	else if (threads > mp_ncpus) {
746c58794deSPawel Jakub Dawidek 		/* There is really no need for too many worker threads. */
747dd549194SPawel Jakub Dawidek 		threads = mp_ncpus;
748dd549194SPawel Jakub Dawidek 		G_ELI_DEBUG(0, "Reducing number of threads to %u.", threads);
749c58794deSPawel Jakub Dawidek 	}
750c58794deSPawel Jakub Dawidek 	for (i = 0; i < threads; i++) {
751c58794deSPawel Jakub Dawidek 		wr = malloc(sizeof(*wr), M_ELI, M_WAITOK | M_ZERO);
752c58794deSPawel Jakub Dawidek 		wr->w_softc = sc;
753c58794deSPawel Jakub Dawidek 		wr->w_number = i;
754c58794deSPawel Jakub Dawidek 
755c58794deSPawel Jakub Dawidek 		/*
756c58794deSPawel Jakub Dawidek 		 * If this is the first pass, try to get hardware support.
757c58794deSPawel Jakub Dawidek 		 * Use software cryptography, if we cannot get it.
758c58794deSPawel Jakub Dawidek 		 */
759c58794deSPawel Jakub Dawidek 		if (i == 0) {
760c58794deSPawel Jakub Dawidek 			error = crypto_newsession(&wr->w_sid, &cri, 1);
761dddd1d53SPawel Jakub Dawidek 			if (error == 0)
762c58794deSPawel Jakub Dawidek 				sc->sc_crypto = G_ELI_CRYPTO_HW;
763c58794deSPawel Jakub Dawidek 		}
764dddd1d53SPawel Jakub Dawidek 		if (sc->sc_crypto == G_ELI_CRYPTO_SW)
765c58794deSPawel Jakub Dawidek 			error = crypto_newsession(&wr->w_sid, &cri, 0);
766c58794deSPawel Jakub Dawidek 		if (error != 0) {
767c58794deSPawel Jakub Dawidek 			free(wr, M_ELI);
768c58794deSPawel Jakub Dawidek 			if (req != NULL) {
769c58794deSPawel Jakub Dawidek 				gctl_error(req, "Cannot set up crypto session "
770c58794deSPawel Jakub Dawidek 				    "for %s (error=%d).", bpp->name, error);
771c58794deSPawel Jakub Dawidek 			} else {
772c58794deSPawel Jakub Dawidek 				G_ELI_DEBUG(1, "Cannot set up crypto session "
773c58794deSPawel Jakub Dawidek 				    "for %s (error=%d).", bpp->name, error);
774c58794deSPawel Jakub Dawidek 			}
775c58794deSPawel Jakub Dawidek 			goto failed;
776c58794deSPawel Jakub Dawidek 		}
777c58794deSPawel Jakub Dawidek 
778c58794deSPawel Jakub Dawidek 		error = kthread_create(g_eli_worker, wr, &wr->w_proc, 0, 0,
779c58794deSPawel Jakub Dawidek 		    "g_eli[%u] %s", i, bpp->name);
780c58794deSPawel Jakub Dawidek 		if (error != 0) {
781c58794deSPawel Jakub Dawidek 			crypto_freesession(wr->w_sid);
782c58794deSPawel Jakub Dawidek 			free(wr, M_ELI);
783c58794deSPawel Jakub Dawidek 			if (req != NULL) {
784dddd1d53SPawel Jakub Dawidek 				gctl_error(req, "Cannot create kernel thread "
785dddd1d53SPawel Jakub Dawidek 				    "for %s (error=%d).", bpp->name, error);
786c58794deSPawel Jakub Dawidek 			} else {
787dddd1d53SPawel Jakub Dawidek 				G_ELI_DEBUG(1, "Cannot create kernel thread "
788dddd1d53SPawel Jakub Dawidek 				    "for %s (error=%d).", bpp->name, error);
789c58794deSPawel Jakub Dawidek 			}
790c58794deSPawel Jakub Dawidek 			goto failed;
791c58794deSPawel Jakub Dawidek 		}
792c58794deSPawel Jakub Dawidek 		LIST_INSERT_HEAD(&sc->sc_workers, wr, w_next);
793dddd1d53SPawel Jakub Dawidek 		/* If we have hardware support, one thread is enough. */
794dddd1d53SPawel Jakub Dawidek 		if (sc->sc_crypto == G_ELI_CRYPTO_HW)
795dddd1d53SPawel Jakub Dawidek 			break;
796c58794deSPawel Jakub Dawidek 	}
797c58794deSPawel Jakub Dawidek 
798c58794deSPawel Jakub Dawidek 	/*
799c58794deSPawel Jakub Dawidek 	 * Create decrypted provider.
800c58794deSPawel Jakub Dawidek 	 */
801c58794deSPawel Jakub Dawidek 	pp = g_new_providerf(gp, "%s%s", bpp->name, G_ELI_SUFFIX);
802c58794deSPawel Jakub Dawidek 	pp->sectorsize = md->md_sectorsize;
803c58794deSPawel Jakub Dawidek 	pp->mediasize = bpp->mediasize;
804c58794deSPawel Jakub Dawidek 	if ((sc->sc_flags & G_ELI_FLAG_ONETIME) == 0)
805c58794deSPawel Jakub Dawidek 		pp->mediasize -= bpp->sectorsize;
806c58794deSPawel Jakub Dawidek 	pp->mediasize -= (pp->mediasize % pp->sectorsize);
807c58794deSPawel Jakub Dawidek 	g_error_provider(pp, 0);
808c58794deSPawel Jakub Dawidek 
809c58794deSPawel Jakub Dawidek 	G_ELI_DEBUG(0, "Device %s created.", pp->name);
810c58794deSPawel Jakub Dawidek 	G_ELI_DEBUG(0, "    Cipher: %s", g_eli_algo2str(sc->sc_algo));
811c58794deSPawel Jakub Dawidek 	G_ELI_DEBUG(0, "Key length: %u", sc->sc_keylen);
812c58794deSPawel Jakub Dawidek 	G_ELI_DEBUG(0, "    Crypto: %s",
813c58794deSPawel Jakub Dawidek 	    sc->sc_crypto == G_ELI_CRYPTO_SW ? "software" : "hardware");
814c58794deSPawel Jakub Dawidek 	return (gp);
815c58794deSPawel Jakub Dawidek failed:
816c58794deSPawel Jakub Dawidek 	mtx_lock(&sc->sc_queue_mtx);
817c58794deSPawel Jakub Dawidek 	sc->sc_flags |= G_ELI_FLAG_DESTROY;
818c58794deSPawel Jakub Dawidek 	wakeup(sc);
819c58794deSPawel Jakub Dawidek 	/*
820c58794deSPawel Jakub Dawidek 	 * Wait for kernel threads self destruction.
821c58794deSPawel Jakub Dawidek 	 */
822c58794deSPawel Jakub Dawidek 	while (!LIST_EMPTY(&sc->sc_workers)) {
823c58794deSPawel Jakub Dawidek 		msleep(&sc->sc_workers, &sc->sc_queue_mtx, PRIBIO,
824c58794deSPawel Jakub Dawidek 		    "geli:destroy", 0);
825c58794deSPawel Jakub Dawidek 	}
826c58794deSPawel Jakub Dawidek 	mtx_destroy(&sc->sc_queue_mtx);
827c58794deSPawel Jakub Dawidek 	if (cp->provider != NULL) {
828c58794deSPawel Jakub Dawidek 		if (cp->acr == 1)
829c58794deSPawel Jakub Dawidek 			g_access(cp, -1, -1, -1);
830c58794deSPawel Jakub Dawidek 		g_detach(cp);
831c58794deSPawel Jakub Dawidek 	}
832c58794deSPawel Jakub Dawidek 	g_destroy_consumer(cp);
833c58794deSPawel Jakub Dawidek 	g_destroy_geom(gp);
834c58794deSPawel Jakub Dawidek 	bzero(sc, sizeof(*sc));
835c58794deSPawel Jakub Dawidek 	free(sc, M_ELI);
836c58794deSPawel Jakub Dawidek 	return (NULL);
837c58794deSPawel Jakub Dawidek }
838c58794deSPawel Jakub Dawidek 
839c58794deSPawel Jakub Dawidek int
840c58794deSPawel Jakub Dawidek g_eli_destroy(struct g_eli_softc *sc, boolean_t force)
841c58794deSPawel Jakub Dawidek {
842c58794deSPawel Jakub Dawidek 	struct g_geom *gp;
843c58794deSPawel Jakub Dawidek 	struct g_provider *pp;
844c58794deSPawel Jakub Dawidek 
845c58794deSPawel Jakub Dawidek 	g_topology_assert();
846c58794deSPawel Jakub Dawidek 
847c58794deSPawel Jakub Dawidek 	if (sc == NULL)
848c58794deSPawel Jakub Dawidek 		return (ENXIO);
849c58794deSPawel Jakub Dawidek 
850c58794deSPawel Jakub Dawidek 	gp = sc->sc_geom;
851c58794deSPawel Jakub Dawidek 	pp = LIST_FIRST(&gp->provider);
852c58794deSPawel Jakub Dawidek 	if (pp != NULL && (pp->acr != 0 || pp->acw != 0 || pp->ace != 0)) {
853c58794deSPawel Jakub Dawidek 		if (force) {
854c58794deSPawel Jakub Dawidek 			G_ELI_DEBUG(1, "Device %s is still open, so it "
85598645006SChristian Brueffer 			    "cannot be definitely removed.", pp->name);
856c58794deSPawel Jakub Dawidek 		} else {
857c58794deSPawel Jakub Dawidek 			G_ELI_DEBUG(1,
858c58794deSPawel Jakub Dawidek 			    "Device %s is still open (r%dw%de%d).", pp->name,
859c58794deSPawel Jakub Dawidek 			    pp->acr, pp->acw, pp->ace);
860c58794deSPawel Jakub Dawidek 			return (EBUSY);
861c58794deSPawel Jakub Dawidek 		}
862c58794deSPawel Jakub Dawidek 	}
863c58794deSPawel Jakub Dawidek 
864c58794deSPawel Jakub Dawidek 	mtx_lock(&sc->sc_queue_mtx);
865c58794deSPawel Jakub Dawidek 	sc->sc_flags |= G_ELI_FLAG_DESTROY;
866c58794deSPawel Jakub Dawidek 	wakeup(sc);
867c58794deSPawel Jakub Dawidek 	while (!LIST_EMPTY(&sc->sc_workers)) {
868c58794deSPawel Jakub Dawidek 		msleep(&sc->sc_workers, &sc->sc_queue_mtx, PRIBIO,
869c58794deSPawel Jakub Dawidek 		    "geli:destroy", 0);
870c58794deSPawel Jakub Dawidek 	}
871c58794deSPawel Jakub Dawidek 	mtx_destroy(&sc->sc_queue_mtx);
872c58794deSPawel Jakub Dawidek 	gp->softc = NULL;
873c58794deSPawel Jakub Dawidek 	bzero(sc, sizeof(*sc));
874c58794deSPawel Jakub Dawidek 	free(sc, M_ELI);
875c58794deSPawel Jakub Dawidek 
876c58794deSPawel Jakub Dawidek 	if (pp == NULL || (pp->acr == 0 && pp->acw == 0 && pp->ace == 0))
877c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(0, "Device %s destroyed.", gp->name);
878c58794deSPawel Jakub Dawidek 	g_wither_geom_close(gp, ENXIO);
879c58794deSPawel Jakub Dawidek 
880c58794deSPawel Jakub Dawidek 	return (0);
881c58794deSPawel Jakub Dawidek }
882c58794deSPawel Jakub Dawidek 
883c58794deSPawel Jakub Dawidek static int
884c58794deSPawel Jakub Dawidek g_eli_destroy_geom(struct gctl_req *req __unused,
885c58794deSPawel Jakub Dawidek     struct g_class *mp __unused, struct g_geom *gp)
886c58794deSPawel Jakub Dawidek {
887c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
888c58794deSPawel Jakub Dawidek 
889c58794deSPawel Jakub Dawidek 	sc = gp->softc;
890c58794deSPawel Jakub Dawidek 	return (g_eli_destroy(sc, 0));
891c58794deSPawel Jakub Dawidek }
892c58794deSPawel Jakub Dawidek 
893c58794deSPawel Jakub Dawidek /*
894c58794deSPawel Jakub Dawidek  * Tasting is only made on boot.
895c58794deSPawel Jakub Dawidek  * We detect providers which should be attached before root is mounted.
896c58794deSPawel Jakub Dawidek  */
897c58794deSPawel Jakub Dawidek static struct g_geom *
898c58794deSPawel Jakub Dawidek g_eli_taste(struct g_class *mp, struct g_provider *pp, int flags __unused)
899c58794deSPawel Jakub Dawidek {
900c58794deSPawel Jakub Dawidek 	struct g_eli_metadata md;
901c58794deSPawel Jakub Dawidek 	struct g_geom *gp;
902c58794deSPawel Jakub Dawidek 	struct hmac_ctx ctx;
903c58794deSPawel Jakub Dawidek 	char passphrase[256];
904c58794deSPawel Jakub Dawidek 	u_char key[G_ELI_USERKEYLEN], mkey[G_ELI_DATAIVKEYLEN];
905c58794deSPawel Jakub Dawidek 	u_int nkey, i;
906c58794deSPawel Jakub Dawidek 	int error;
907c58794deSPawel Jakub Dawidek 
908c58794deSPawel Jakub Dawidek 	g_trace(G_T_TOPOLOGY, "%s(%s, %s)", __func__, mp->name, pp->name);
909c58794deSPawel Jakub Dawidek 	g_topology_assert();
910c58794deSPawel Jakub Dawidek 
911a80f82a4SPawel Jakub Dawidek 	if (rootvnode != NULL || g_eli_tries == 0)
912c58794deSPawel Jakub Dawidek 		return (NULL);
913c58794deSPawel Jakub Dawidek 
914c58794deSPawel Jakub Dawidek 	G_ELI_DEBUG(3, "Tasting %s.", pp->name);
915c58794deSPawel Jakub Dawidek 
916c58794deSPawel Jakub Dawidek 	error = g_eli_read_metadata(mp, pp, &md);
917c58794deSPawel Jakub Dawidek 	if (error != 0)
918c58794deSPawel Jakub Dawidek 		return (NULL);
919c58794deSPawel Jakub Dawidek 	gp = NULL;
920c58794deSPawel Jakub Dawidek 
921c58794deSPawel Jakub Dawidek 	if (strcmp(md.md_magic, G_ELI_MAGIC) != 0)
922c58794deSPawel Jakub Dawidek 		return (NULL);
923c58794deSPawel Jakub Dawidek 	if (md.md_version > G_ELI_VERSION) {
924c58794deSPawel Jakub Dawidek 		printf("geom_eli.ko module is too old to handle %s.\n",
925c58794deSPawel Jakub Dawidek 		    pp->name);
926c58794deSPawel Jakub Dawidek 		return (NULL);
927c58794deSPawel Jakub Dawidek 	}
928c58794deSPawel Jakub Dawidek 	if (md.md_provsize != pp->mediasize)
929c58794deSPawel Jakub Dawidek 		return (NULL);
930c58794deSPawel Jakub Dawidek 	/* Should we attach it on boot? */
931c58794deSPawel Jakub Dawidek 	if ((md.md_flags & G_ELI_FLAG_BOOT) == 0)
932c58794deSPawel Jakub Dawidek 		return (NULL);
933c58794deSPawel Jakub Dawidek 	if (md.md_keys == 0x00) {
934c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(0, "No valid keys on %s.", pp->name);
935c58794deSPawel Jakub Dawidek 		return (NULL);
936c58794deSPawel Jakub Dawidek 	}
937c58794deSPawel Jakub Dawidek 
938c58794deSPawel Jakub Dawidek 	/*
939c58794deSPawel Jakub Dawidek 	 * Ask for the passphrase no more than g_eli_tries times.
940c58794deSPawel Jakub Dawidek 	 */
941c58794deSPawel Jakub Dawidek 	for (i = 0; i < g_eli_tries; i++) {
942c58794deSPawel Jakub Dawidek 		printf("Enter passphrase for %s: ", pp->name);
943c58794deSPawel Jakub Dawidek 		gets(passphrase, sizeof(passphrase), g_eli_visible_passphrase);
944c58794deSPawel Jakub Dawidek 		KASSERT(md.md_iterations >= 0, ("md_iterations = %d for %s",
945c58794deSPawel Jakub Dawidek 		    (int)md.md_iterations, pp->name));
946c58794deSPawel Jakub Dawidek 		/*
947c58794deSPawel Jakub Dawidek 		 * Prepare Derived-Key from the user passphrase.
948c58794deSPawel Jakub Dawidek 		 */
949c58794deSPawel Jakub Dawidek 		g_eli_crypto_hmac_init(&ctx, NULL, 0);
950c58794deSPawel Jakub Dawidek 		if (md.md_iterations == 0) {
951c58794deSPawel Jakub Dawidek 			g_eli_crypto_hmac_update(&ctx, md.md_salt,
952c58794deSPawel Jakub Dawidek 			    sizeof(md.md_salt));
953c58794deSPawel Jakub Dawidek 			g_eli_crypto_hmac_update(&ctx, passphrase,
954c58794deSPawel Jakub Dawidek 			    strlen(passphrase));
955c58794deSPawel Jakub Dawidek 		} else {
956c58794deSPawel Jakub Dawidek 			u_char dkey[G_ELI_USERKEYLEN];
957c58794deSPawel Jakub Dawidek 
958c58794deSPawel Jakub Dawidek 			pkcs5v2_genkey(dkey, sizeof(dkey), md.md_salt,
959c58794deSPawel Jakub Dawidek 			    sizeof(md.md_salt), passphrase, md.md_iterations);
960c58794deSPawel Jakub Dawidek 			g_eli_crypto_hmac_update(&ctx, dkey, sizeof(dkey));
961c58794deSPawel Jakub Dawidek 			bzero(dkey, sizeof(dkey));
962c58794deSPawel Jakub Dawidek 		}
963c58794deSPawel Jakub Dawidek 		g_eli_crypto_hmac_final(&ctx, key, 0);
964c58794deSPawel Jakub Dawidek 
965c58794deSPawel Jakub Dawidek 		/*
966c58794deSPawel Jakub Dawidek 		 * Decrypt Master-Key.
967c58794deSPawel Jakub Dawidek 		 */
968c58794deSPawel Jakub Dawidek 		error = g_eli_mkey_decrypt(&md, key, mkey, &nkey);
969c58794deSPawel Jakub Dawidek 		bzero(key, sizeof(key));
970c58794deSPawel Jakub Dawidek 		if (error == -1) {
971c58794deSPawel Jakub Dawidek 			if (i == g_eli_tries - 1) {
972c58794deSPawel Jakub Dawidek 				i++;
973c58794deSPawel Jakub Dawidek 				break;
974c58794deSPawel Jakub Dawidek 			}
975c58794deSPawel Jakub Dawidek 			G_ELI_DEBUG(0, "Wrong key for %s. Tries left: %u.",
976c58794deSPawel Jakub Dawidek 			    pp->name, g_eli_tries - i - 1);
977c58794deSPawel Jakub Dawidek 			/* Try again. */
978c58794deSPawel Jakub Dawidek 			continue;
979c58794deSPawel Jakub Dawidek 		} else if (error > 0) {
980c58794deSPawel Jakub Dawidek 			G_ELI_DEBUG(0, "Cannot decrypt Master Key for %s (error=%d).",
981c58794deSPawel Jakub Dawidek 			    pp->name, error);
982c58794deSPawel Jakub Dawidek 			return (NULL);
983c58794deSPawel Jakub Dawidek 		}
984c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(1, "Using Master Key %u for %s.", nkey, pp->name);
985c58794deSPawel Jakub Dawidek 		break;
986c58794deSPawel Jakub Dawidek 	}
987c58794deSPawel Jakub Dawidek 	if (i == g_eli_tries) {
988c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(0, "Wrong key for %s. No tries left.", pp->name);
989c58794deSPawel Jakub Dawidek 		return (NULL);
990c58794deSPawel Jakub Dawidek 	}
991c58794deSPawel Jakub Dawidek 
992c58794deSPawel Jakub Dawidek 	/*
993c58794deSPawel Jakub Dawidek 	 * We have correct key, let's attach provider.
994c58794deSPawel Jakub Dawidek 	 */
995c58794deSPawel Jakub Dawidek 	gp = g_eli_create(NULL, mp, pp, &md, mkey, nkey);
996c58794deSPawel Jakub Dawidek 	bzero(mkey, sizeof(mkey));
997c58794deSPawel Jakub Dawidek 	bzero(&md, sizeof(md));
998c58794deSPawel Jakub Dawidek 	if (gp == NULL) {
999c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(0, "Cannot create device %s%s.", pp->name,
1000c58794deSPawel Jakub Dawidek 		    G_ELI_SUFFIX);
1001c58794deSPawel Jakub Dawidek 		return (NULL);
1002c58794deSPawel Jakub Dawidek 	}
1003c58794deSPawel Jakub Dawidek 	return (gp);
1004c58794deSPawel Jakub Dawidek }
1005c58794deSPawel Jakub Dawidek 
1006c58794deSPawel Jakub Dawidek static void
1007c58794deSPawel Jakub Dawidek g_eli_dumpconf(struct sbuf *sb, const char *indent, struct g_geom *gp,
1008c58794deSPawel Jakub Dawidek     struct g_consumer *cp, struct g_provider *pp)
1009c58794deSPawel Jakub Dawidek {
1010c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
1011c58794deSPawel Jakub Dawidek 
1012c58794deSPawel Jakub Dawidek 	g_topology_assert();
1013c58794deSPawel Jakub Dawidek 	sc = gp->softc;
1014c58794deSPawel Jakub Dawidek 	if (sc == NULL)
1015c58794deSPawel Jakub Dawidek 		return;
1016c58794deSPawel Jakub Dawidek 	if (pp != NULL || cp != NULL)
1017c58794deSPawel Jakub Dawidek 		return;	/* Nothing here. */
1018ea35a2ecSPawel Jakub Dawidek 	sbuf_printf(sb, "%s<Flags>", indent);
1019ea35a2ecSPawel Jakub Dawidek 	if (sc->sc_flags == 0)
1020ea35a2ecSPawel Jakub Dawidek 		sbuf_printf(sb, "NONE");
1021ea35a2ecSPawel Jakub Dawidek 	else {
1022ea35a2ecSPawel Jakub Dawidek 		int first = 1;
1023ea35a2ecSPawel Jakub Dawidek 
1024ea35a2ecSPawel Jakub Dawidek #define ADD_FLAG(flag, name)	do {					\
1025ea35a2ecSPawel Jakub Dawidek 	if ((sc->sc_flags & (flag)) != 0) {				\
1026ea35a2ecSPawel Jakub Dawidek 		if (!first)						\
1027ea35a2ecSPawel Jakub Dawidek 			sbuf_printf(sb, ", ");				\
1028ea35a2ecSPawel Jakub Dawidek 		else							\
1029ea35a2ecSPawel Jakub Dawidek 			first = 0;					\
1030ea35a2ecSPawel Jakub Dawidek 		sbuf_printf(sb, name);					\
1031ea35a2ecSPawel Jakub Dawidek 	}								\
1032ea35a2ecSPawel Jakub Dawidek } while (0)
1033ea35a2ecSPawel Jakub Dawidek 		ADD_FLAG(G_ELI_FLAG_ONETIME, "ONETIME");
1034ea35a2ecSPawel Jakub Dawidek 		ADD_FLAG(G_ELI_FLAG_BOOT, "BOOT");
1035ea35a2ecSPawel Jakub Dawidek 		ADD_FLAG(G_ELI_FLAG_WO_DETACH, "W-DETACH");
1036ea35a2ecSPawel Jakub Dawidek 		ADD_FLAG(G_ELI_FLAG_RW_DETACH, "RW-DETACH");
1037ea35a2ecSPawel Jakub Dawidek 		ADD_FLAG(G_ELI_FLAG_WOPEN, "W-OPEN");
1038ea35a2ecSPawel Jakub Dawidek 		ADD_FLAG(G_ELI_FLAG_DESTROY, "DESTROY");
1039ea35a2ecSPawel Jakub Dawidek #undef  ADD_FLAG
1040ea35a2ecSPawel Jakub Dawidek 	}
1041ea35a2ecSPawel Jakub Dawidek 	sbuf_printf(sb, "</Flags>\n");
1042ea35a2ecSPawel Jakub Dawidek 
1043ea35a2ecSPawel Jakub Dawidek 	if ((sc->sc_flags & G_ELI_FLAG_ONETIME) == 0) {
1044ea35a2ecSPawel Jakub Dawidek 		sbuf_printf(sb, "%s<UsedKey>%u</UsedKey>\n", indent,
1045ea35a2ecSPawel Jakub Dawidek 		    sc->sc_nkey);
1046ea35a2ecSPawel Jakub Dawidek 	}
1047c58794deSPawel Jakub Dawidek 	sbuf_printf(sb, "%s<Crypto>", indent);
1048c58794deSPawel Jakub Dawidek 	switch (sc->sc_crypto) {
1049c58794deSPawel Jakub Dawidek 	case G_ELI_CRYPTO_HW:
1050c58794deSPawel Jakub Dawidek 		sbuf_printf(sb, "hardware");
1051c58794deSPawel Jakub Dawidek 		break;
1052c58794deSPawel Jakub Dawidek 	case G_ELI_CRYPTO_SW:
1053c58794deSPawel Jakub Dawidek 		sbuf_printf(sb, "software");
1054c58794deSPawel Jakub Dawidek 		break;
1055c58794deSPawel Jakub Dawidek 	default:
1056c58794deSPawel Jakub Dawidek 		sbuf_printf(sb, "UNKNOWN");
1057c58794deSPawel Jakub Dawidek 		break;
1058c58794deSPawel Jakub Dawidek 	}
1059c58794deSPawel Jakub Dawidek 	sbuf_printf(sb, "</Crypto>\n");
1060ea35a2ecSPawel Jakub Dawidek 	sbuf_printf(sb, "%s<KeyLength>%u</KeyLength>\n", indent, sc->sc_keylen);
1061ea35a2ecSPawel Jakub Dawidek 	sbuf_printf(sb, "%s<Cipher>%s</Cipher>\n", indent,
1062ea35a2ecSPawel Jakub Dawidek 	    g_eli_algo2str(sc->sc_algo));
1063c58794deSPawel Jakub Dawidek }
1064c58794deSPawel Jakub Dawidek 
1065c58794deSPawel Jakub Dawidek DECLARE_GEOM_CLASS(g_eli_class, g_eli);
1066c58794deSPawel Jakub Dawidek MODULE_DEPEND(geom_eli, crypto, 1, 1, 1);
1067