xref: /freebsd/sys/geom/eli/g_eli.c (revision ea35a2ec3aa53656bfc46869268a7b834b87c53d)
1c58794deSPawel Jakub Dawidek /*-
2c58794deSPawel Jakub Dawidek  * Copyright (c) 2005 Pawel Jakub Dawidek <pjd@FreeBSD.org>
3c58794deSPawel Jakub Dawidek  * All rights reserved.
4c58794deSPawel Jakub Dawidek  *
5c58794deSPawel Jakub Dawidek  * Redistribution and use in source and binary forms, with or without
6c58794deSPawel Jakub Dawidek  * modification, are permitted provided that the following conditions
7c58794deSPawel Jakub Dawidek  * are met:
8c58794deSPawel Jakub Dawidek  * 1. Redistributions of source code must retain the above copyright
9c58794deSPawel Jakub Dawidek  *    notice, this list of conditions and the following disclaimer.
10c58794deSPawel Jakub Dawidek  * 2. Redistributions in binary form must reproduce the above copyright
11c58794deSPawel Jakub Dawidek  *    notice, this list of conditions and the following disclaimer in the
12c58794deSPawel Jakub Dawidek  *    documentation and/or other materials provided with the distribution.
13c58794deSPawel Jakub Dawidek  *
14c58794deSPawel Jakub Dawidek  * THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND
15c58794deSPawel Jakub Dawidek  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16c58794deSPawel Jakub Dawidek  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17c58794deSPawel Jakub Dawidek  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE
18c58794deSPawel Jakub Dawidek  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19c58794deSPawel Jakub Dawidek  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20c58794deSPawel Jakub Dawidek  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21c58794deSPawel Jakub Dawidek  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22c58794deSPawel Jakub Dawidek  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23c58794deSPawel Jakub Dawidek  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24c58794deSPawel Jakub Dawidek  * SUCH DAMAGE.
25c58794deSPawel Jakub Dawidek  */
26c58794deSPawel Jakub Dawidek 
27c58794deSPawel Jakub Dawidek #include <sys/cdefs.h>
28c58794deSPawel Jakub Dawidek __FBSDID("$FreeBSD$");
29c58794deSPawel Jakub Dawidek 
30c58794deSPawel Jakub Dawidek #include <sys/param.h>
31c58794deSPawel Jakub Dawidek #include <sys/systm.h>
32c58794deSPawel Jakub Dawidek #include <sys/kernel.h>
33c58794deSPawel Jakub Dawidek #include <sys/module.h>
34c58794deSPawel Jakub Dawidek #include <sys/lock.h>
35c58794deSPawel Jakub Dawidek #include <sys/mutex.h>
36c58794deSPawel Jakub Dawidek #include <sys/bio.h>
37c58794deSPawel Jakub Dawidek #include <sys/sysctl.h>
38c58794deSPawel Jakub Dawidek #include <sys/malloc.h>
39c58794deSPawel Jakub Dawidek #include <sys/kthread.h>
40c58794deSPawel Jakub Dawidek #include <sys/proc.h>
41c58794deSPawel Jakub Dawidek #include <sys/sched.h>
42c58794deSPawel Jakub Dawidek #include <sys/uio.h>
43c58794deSPawel Jakub Dawidek 
44c58794deSPawel Jakub Dawidek #include <vm/uma.h>
45c58794deSPawel Jakub Dawidek 
46c58794deSPawel Jakub Dawidek #include <geom/geom.h>
47c58794deSPawel Jakub Dawidek #include <geom/eli/g_eli.h>
48c58794deSPawel Jakub Dawidek #include <geom/eli/pkcs5v2.h>
49c58794deSPawel Jakub Dawidek 
50c58794deSPawel Jakub Dawidek 
51c58794deSPawel Jakub Dawidek MALLOC_DEFINE(M_ELI, "eli data", "GEOM_ELI Data");
52c58794deSPawel Jakub Dawidek 
53c58794deSPawel Jakub Dawidek SYSCTL_DECL(_kern_geom);
54c58794deSPawel Jakub Dawidek SYSCTL_NODE(_kern_geom, OID_AUTO, eli, CTLFLAG_RW, 0, "GEOM_ELI stuff");
5576254298SPawel Jakub Dawidek u_int g_eli_debug = 0;
56c58794deSPawel Jakub Dawidek TUNABLE_INT("kern.geom.eli.debug", &g_eli_debug);
57c58794deSPawel Jakub Dawidek SYSCTL_UINT(_kern_geom_eli, OID_AUTO, debug, CTLFLAG_RW, &g_eli_debug, 0,
58c58794deSPawel Jakub Dawidek     "Debug level");
59c58794deSPawel Jakub Dawidek static u_int g_eli_tries = 3;
60c58794deSPawel Jakub Dawidek TUNABLE_INT("kern.geom.eli.tries", &g_eli_tries);
61c58794deSPawel Jakub Dawidek SYSCTL_UINT(_kern_geom_eli, OID_AUTO, tries, CTLFLAG_RW, &g_eli_tries, 0,
62c58794deSPawel Jakub Dawidek     "Number of tries when asking for passphrase");
63c58794deSPawel Jakub Dawidek static u_int g_eli_visible_passphrase = 0;
64c58794deSPawel Jakub Dawidek TUNABLE_INT("kern.geom.eli.visible_passphrase", &g_eli_visible_passphrase);
65c58794deSPawel Jakub Dawidek SYSCTL_UINT(_kern_geom_eli, OID_AUTO, visible_passphrase, CTLFLAG_RW,
66c58794deSPawel Jakub Dawidek     &g_eli_visible_passphrase, 0,
67c58794deSPawel Jakub Dawidek     "Turn on echo when entering passphrase (debug purposes only!!)");
68c58794deSPawel Jakub Dawidek u_int g_eli_overwrites = 5;
69c58794deSPawel Jakub Dawidek SYSCTL_UINT(_kern_geom_eli, OID_AUTO, overwrites, CTLFLAG_RW, &g_eli_overwrites,
70c58794deSPawel Jakub Dawidek     0, "Number of overwrites on-disk keys when destroying");
71c58794deSPawel Jakub Dawidek static u_int g_eli_threads = 1;
72c58794deSPawel Jakub Dawidek TUNABLE_INT("kern.geom.eli.threads", &g_eli_threads);
73c58794deSPawel Jakub Dawidek SYSCTL_UINT(_kern_geom_eli, OID_AUTO, threads, CTLFLAG_RW, &g_eli_threads, 0,
74c58794deSPawel Jakub Dawidek     "Number of threads doing crypto work");
75c58794deSPawel Jakub Dawidek 
76c58794deSPawel Jakub Dawidek static int g_eli_do_taste = 0;
77c58794deSPawel Jakub Dawidek 
78c58794deSPawel Jakub Dawidek static int g_eli_destroy_geom(struct gctl_req *req, struct g_class *mp,
79c58794deSPawel Jakub Dawidek     struct g_geom *gp);
80c58794deSPawel Jakub Dawidek static int g_eli_crypto_run(struct g_eli_worker *wr, struct bio *bp);
81c58794deSPawel Jakub Dawidek 
82c58794deSPawel Jakub Dawidek static g_taste_t g_eli_taste;
83c58794deSPawel Jakub Dawidek static g_dumpconf_t g_eli_dumpconf;
84c58794deSPawel Jakub Dawidek 
85c58794deSPawel Jakub Dawidek struct g_class g_eli_class = {
86c58794deSPawel Jakub Dawidek 	.name = G_ELI_CLASS_NAME,
87c58794deSPawel Jakub Dawidek 	.version = G_VERSION,
88c58794deSPawel Jakub Dawidek 	.ctlreq = g_eli_config,
89c58794deSPawel Jakub Dawidek 	.taste = g_eli_taste,
90c58794deSPawel Jakub Dawidek 	.destroy_geom = g_eli_destroy_geom
91c58794deSPawel Jakub Dawidek };
92c58794deSPawel Jakub Dawidek 
93c58794deSPawel Jakub Dawidek 
94c58794deSPawel Jakub Dawidek /*
95c58794deSPawel Jakub Dawidek  * Code paths:
96c58794deSPawel Jakub Dawidek  * BIO_READ:
97c58794deSPawel Jakub Dawidek  *	g_eli_start -> g_io_request -> g_eli_read_done -> g_eli_crypto_run -> g_eli_crypto_read_done -> g_io_deliver
98c58794deSPawel Jakub Dawidek  * BIO_WRITE:
99c58794deSPawel Jakub Dawidek  *	g_eli_start -> g_eli_crypto_run -> g_eli_crypto_write_done -> g_io_request -> g_eli_write_done -> g_io_deliver
100c58794deSPawel Jakub Dawidek  */
101c58794deSPawel Jakub Dawidek 
102c58794deSPawel Jakub Dawidek 
103c58794deSPawel Jakub Dawidek /*
104c58794deSPawel Jakub Dawidek  * EAGAIN from crypto(9) means, that we were probably balanced to another crypto
105c58794deSPawel Jakub Dawidek  * accelerator or something like this.
106c58794deSPawel Jakub Dawidek  * The function updates the SID and rerun the operation.
107c58794deSPawel Jakub Dawidek  */
108c58794deSPawel Jakub Dawidek static int
109c58794deSPawel Jakub Dawidek g_eli_crypto_rerun(struct cryptop *crp)
110c58794deSPawel Jakub Dawidek {
111c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
112c58794deSPawel Jakub Dawidek 	struct g_eli_worker *wr;
113c58794deSPawel Jakub Dawidek 	struct bio *bp;
114c58794deSPawel Jakub Dawidek 	int error;
115c58794deSPawel Jakub Dawidek 
116c58794deSPawel Jakub Dawidek 	bp = (struct bio *)crp->crp_opaque;
117c58794deSPawel Jakub Dawidek 	sc = bp->bio_to->geom->softc;
118c58794deSPawel Jakub Dawidek 	LIST_FOREACH(wr, &sc->sc_workers, w_next) {
119c58794deSPawel Jakub Dawidek 		if (wr->w_number == bp->bio_pflags)
120c58794deSPawel Jakub Dawidek 			break;
121c58794deSPawel Jakub Dawidek 	}
122c58794deSPawel Jakub Dawidek 	KASSERT(wr != NULL, ("Invalid worker (%u).", bp->bio_pflags));
123c58794deSPawel Jakub Dawidek 	G_ELI_DEBUG(1, "Reruning crypto %s request (sid: %ju -> %ju).",
124c58794deSPawel Jakub Dawidek 	    bp->bio_cmd == BIO_READ ? "READ" : "WRITE", (uintmax_t)wr->w_sid,
125c58794deSPawel Jakub Dawidek 	    (uintmax_t)crp->crp_sid);
126c58794deSPawel Jakub Dawidek 	wr->w_sid = crp->crp_sid;
127c58794deSPawel Jakub Dawidek 	crp->crp_etype = 0;
128c58794deSPawel Jakub Dawidek 	error = crypto_dispatch(crp);
129c58794deSPawel Jakub Dawidek 	if (error == 0)
130c58794deSPawel Jakub Dawidek 		return (0);
131c58794deSPawel Jakub Dawidek 	G_ELI_DEBUG(1, "%s: crypto_dispatch() returned %d.", __func__, error);
132c58794deSPawel Jakub Dawidek 	crp->crp_etype = error;
133c58794deSPawel Jakub Dawidek 	return (error);
134c58794deSPawel Jakub Dawidek }
135c58794deSPawel Jakub Dawidek 
136c58794deSPawel Jakub Dawidek /*
137c58794deSPawel Jakub Dawidek  * The function is called afer reading encrypted data from the provider.
138c58794deSPawel Jakub Dawidek  */
139c58794deSPawel Jakub Dawidek static void
140c58794deSPawel Jakub Dawidek g_eli_read_done(struct bio *bp)
141c58794deSPawel Jakub Dawidek {
142c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
143c58794deSPawel Jakub Dawidek 	struct bio *pbp;
144c58794deSPawel Jakub Dawidek 	int error;
145c58794deSPawel Jakub Dawidek 
146c58794deSPawel Jakub Dawidek 	G_ELI_LOGREQ(2, bp, "Request done.");
147c58794deSPawel Jakub Dawidek 	pbp = bp->bio_parent;
148c58794deSPawel Jakub Dawidek 	if (pbp->bio_error == 0)
149c58794deSPawel Jakub Dawidek 		pbp->bio_error = bp->bio_error;
150c58794deSPawel Jakub Dawidek 	g_destroy_bio(bp);
151c58794deSPawel Jakub Dawidek 	if (pbp->bio_error != 0) {
152c58794deSPawel Jakub Dawidek 		G_ELI_LOGREQ(0, pbp, "%s() failed", __func__);
153c58794deSPawel Jakub Dawidek 		pbp->bio_completed = 0;
154c58794deSPawel Jakub Dawidek 		g_io_deliver(pbp, pbp->bio_error);
155c58794deSPawel Jakub Dawidek 		return;
156c58794deSPawel Jakub Dawidek 	}
157c58794deSPawel Jakub Dawidek 	sc = pbp->bio_to->geom->softc;
158c58794deSPawel Jakub Dawidek 	/*
159c58794deSPawel Jakub Dawidek 	 * If we have hardware acceleration we can call g_eli_crypto_run()
160c58794deSPawel Jakub Dawidek 	 * directly. If not, put it on the queue and wakeup worker thread,
161c58794deSPawel Jakub Dawidek 	 * which will do the work for us, so we don't slow down g_up path.
162c58794deSPawel Jakub Dawidek 	 */
163c58794deSPawel Jakub Dawidek 	if (sc->sc_crypto == G_ELI_CRYPTO_HW) {
164c58794deSPawel Jakub Dawidek 		struct g_eli_worker *wr;
165c58794deSPawel Jakub Dawidek 
166c58794deSPawel Jakub Dawidek 		wr = LIST_FIRST(&sc->sc_workers);
167c58794deSPawel Jakub Dawidek 		error = g_eli_crypto_run(wr, pbp);
168c58794deSPawel Jakub Dawidek 		if (error != 0) {
169c58794deSPawel Jakub Dawidek 			G_ELI_LOGREQ(0, pbp,
170c58794deSPawel Jakub Dawidek 			    "g_eli_crypto_run() failed (error=%d).", error);
171c58794deSPawel Jakub Dawidek 			pbp->bio_completed = 0;
172c58794deSPawel Jakub Dawidek 			g_io_deliver(pbp, error);
173c58794deSPawel Jakub Dawidek 		}
174c58794deSPawel Jakub Dawidek 	} else {
175c58794deSPawel Jakub Dawidek 		mtx_lock(&sc->sc_queue_mtx);
176c58794deSPawel Jakub Dawidek 		bioq_insert_tail(&sc->sc_queue, pbp);
177c58794deSPawel Jakub Dawidek 		mtx_unlock(&sc->sc_queue_mtx);
178c58794deSPawel Jakub Dawidek 		wakeup(sc);
179c58794deSPawel Jakub Dawidek 	}
180c58794deSPawel Jakub Dawidek }
181c58794deSPawel Jakub Dawidek 
182c58794deSPawel Jakub Dawidek /*
183c58794deSPawel Jakub Dawidek  * The function is called after we read and decrypt data.
184c58794deSPawel Jakub Dawidek  */
185c58794deSPawel Jakub Dawidek static int
186c58794deSPawel Jakub Dawidek g_eli_crypto_read_done(struct cryptop *crp)
187c58794deSPawel Jakub Dawidek {
188c58794deSPawel Jakub Dawidek 	struct bio *bp;
189c58794deSPawel Jakub Dawidek 
190c58794deSPawel Jakub Dawidek 	if (crp->crp_etype == EAGAIN) {
191c58794deSPawel Jakub Dawidek 		if (g_eli_crypto_rerun(crp) == 0)
192c58794deSPawel Jakub Dawidek 			return (0);
193c58794deSPawel Jakub Dawidek 	}
194c58794deSPawel Jakub Dawidek 	bp = (struct bio *)crp->crp_opaque;
195c58794deSPawel Jakub Dawidek 	bp->bio_inbed++;
196c58794deSPawel Jakub Dawidek 	if (crp->crp_etype == 0) {
197c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(3, "Crypto READ request done (%d/%d).",
198c58794deSPawel Jakub Dawidek 		    bp->bio_inbed, bp->bio_children);
199c58794deSPawel Jakub Dawidek 		bp->bio_completed += crp->crp_olen;
200c58794deSPawel Jakub Dawidek 	} else {
201c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(1, "Crypto READ request failed (%d/%d) error=%d.",
202c58794deSPawel Jakub Dawidek 		    bp->bio_inbed, bp->bio_children, crp->crp_etype);
203c58794deSPawel Jakub Dawidek 		if (bp->bio_error == 0)
204c58794deSPawel Jakub Dawidek 			bp->bio_error = crp->crp_etype;
205c58794deSPawel Jakub Dawidek 	}
206c58794deSPawel Jakub Dawidek 	/*
207c58794deSPawel Jakub Dawidek 	 * Do we have all sectors already?
208c58794deSPawel Jakub Dawidek 	 */
209c58794deSPawel Jakub Dawidek 	if (bp->bio_inbed < bp->bio_children)
210c58794deSPawel Jakub Dawidek 		return (0);
211c58794deSPawel Jakub Dawidek 	free(bp->bio_driver2, M_ELI);
212c58794deSPawel Jakub Dawidek 	bp->bio_driver2 = NULL;
213c58794deSPawel Jakub Dawidek 	if (bp->bio_error != 0) {
214c58794deSPawel Jakub Dawidek 		G_ELI_LOGREQ(0, bp, "Crypto READ request failed (error=%d).",
215c58794deSPawel Jakub Dawidek 		    bp->bio_error);
216c58794deSPawel Jakub Dawidek 		bp->bio_completed = 0;
217c58794deSPawel Jakub Dawidek 	}
218c58794deSPawel Jakub Dawidek 	/*
219c58794deSPawel Jakub Dawidek 	 * Read is finished, send it up.
220c58794deSPawel Jakub Dawidek 	 */
221c58794deSPawel Jakub Dawidek 	g_io_deliver(bp, bp->bio_error);
222c58794deSPawel Jakub Dawidek 	return (0);
223c58794deSPawel Jakub Dawidek }
224c58794deSPawel Jakub Dawidek 
225c58794deSPawel Jakub Dawidek /*
226c58794deSPawel Jakub Dawidek  * The function is called after we encrypt and write data.
227c58794deSPawel Jakub Dawidek  */
228c58794deSPawel Jakub Dawidek static void
229c58794deSPawel Jakub Dawidek g_eli_write_done(struct bio *bp)
230c58794deSPawel Jakub Dawidek {
231c58794deSPawel Jakub Dawidek 	struct bio *pbp;
232c58794deSPawel Jakub Dawidek 
233c58794deSPawel Jakub Dawidek 	G_ELI_LOGREQ(2, bp, "Request done.");
234c58794deSPawel Jakub Dawidek 	pbp = bp->bio_parent;
235c58794deSPawel Jakub Dawidek 	if (pbp->bio_error == 0)
236c58794deSPawel Jakub Dawidek 		pbp->bio_error = bp->bio_error;
237c58794deSPawel Jakub Dawidek 	free(pbp->bio_driver2, M_ELI);
238c58794deSPawel Jakub Dawidek 	pbp->bio_driver2 = NULL;
239c58794deSPawel Jakub Dawidek 	if (pbp->bio_error == 0)
240c58794deSPawel Jakub Dawidek 		pbp->bio_completed = pbp->bio_length;
241c58794deSPawel Jakub Dawidek 	else {
242c58794deSPawel Jakub Dawidek 		G_ELI_LOGREQ(0, pbp, "Crypto READ request failed (error=%d).",
243c58794deSPawel Jakub Dawidek 		    pbp->bio_error);
244c58794deSPawel Jakub Dawidek 		pbp->bio_completed = 0;
245c58794deSPawel Jakub Dawidek 	}
246c58794deSPawel Jakub Dawidek 	g_destroy_bio(bp);
247c58794deSPawel Jakub Dawidek 	/*
248c58794deSPawel Jakub Dawidek 	 * Write is finished, send it up.
249c58794deSPawel Jakub Dawidek 	 */
250c58794deSPawel Jakub Dawidek 	g_io_deliver(pbp, pbp->bio_error);
251c58794deSPawel Jakub Dawidek }
252c58794deSPawel Jakub Dawidek 
253c58794deSPawel Jakub Dawidek /*
254c58794deSPawel Jakub Dawidek  * The function is called after data encryption.
255c58794deSPawel Jakub Dawidek  */
256c58794deSPawel Jakub Dawidek static int
257c58794deSPawel Jakub Dawidek g_eli_crypto_write_done(struct cryptop *crp)
258c58794deSPawel Jakub Dawidek {
259c58794deSPawel Jakub Dawidek 	struct g_geom *gp;
260c58794deSPawel Jakub Dawidek 	struct g_consumer *cp;
261c58794deSPawel Jakub Dawidek 	struct bio *bp, *cbp;
262c58794deSPawel Jakub Dawidek 
263c58794deSPawel Jakub Dawidek 	if (crp->crp_etype == EAGAIN) {
264c58794deSPawel Jakub Dawidek 		if (g_eli_crypto_rerun(crp) == 0)
265c58794deSPawel Jakub Dawidek 			return (0);
266c58794deSPawel Jakub Dawidek 	}
267c58794deSPawel Jakub Dawidek 	bp = (struct bio *)crp->crp_opaque;
268c58794deSPawel Jakub Dawidek 	bp->bio_inbed++;
269c58794deSPawel Jakub Dawidek 	if (crp->crp_etype == 0) {
270c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(3, "Crypto WRITE request done (%d/%d).",
271c58794deSPawel Jakub Dawidek 		    bp->bio_inbed, bp->bio_children);
272c58794deSPawel Jakub Dawidek 	} else {
273c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(1, "Crypto WRITE request failed (%d/%d) error=%d.",
274c58794deSPawel Jakub Dawidek 		    bp->bio_inbed, bp->bio_children, crp->crp_etype);
275c58794deSPawel Jakub Dawidek 		if (bp->bio_error == 0)
276c58794deSPawel Jakub Dawidek 			bp->bio_error = crp->crp_etype;
277c58794deSPawel Jakub Dawidek 	}
278c58794deSPawel Jakub Dawidek 	/*
279c58794deSPawel Jakub Dawidek 	 * All sectors are already encrypted?
280c58794deSPawel Jakub Dawidek 	 */
281c58794deSPawel Jakub Dawidek 	if (bp->bio_inbed < bp->bio_children)
282c58794deSPawel Jakub Dawidek 		return (0);
283c58794deSPawel Jakub Dawidek 	bp->bio_inbed = 0;
284c58794deSPawel Jakub Dawidek 	bp->bio_children = 1;
285c58794deSPawel Jakub Dawidek 	cbp = bp->bio_driver1;
286c58794deSPawel Jakub Dawidek 	bp->bio_driver1 = NULL;
287c58794deSPawel Jakub Dawidek 	if (bp->bio_error != 0) {
288c58794deSPawel Jakub Dawidek 		G_ELI_LOGREQ(0, bp, "Crypto WRITE request failed (error=%d).",
289c58794deSPawel Jakub Dawidek 		    bp->bio_error);
290c58794deSPawel Jakub Dawidek 		free(bp->bio_driver2, M_ELI);
291c58794deSPawel Jakub Dawidek 		bp->bio_driver2 = NULL;
292c58794deSPawel Jakub Dawidek 		g_destroy_bio(cbp);
293c58794deSPawel Jakub Dawidek 		g_io_deliver(bp, bp->bio_error);
294c58794deSPawel Jakub Dawidek 		return (0);
295c58794deSPawel Jakub Dawidek 	}
296c58794deSPawel Jakub Dawidek 	cbp->bio_data = bp->bio_driver2;
297c58794deSPawel Jakub Dawidek 	cbp->bio_done = g_eli_write_done;
298c58794deSPawel Jakub Dawidek 	gp = bp->bio_to->geom;
299c58794deSPawel Jakub Dawidek 	cp = LIST_FIRST(&gp->consumer);
300c58794deSPawel Jakub Dawidek 	cbp->bio_to = cp->provider;
301c58794deSPawel Jakub Dawidek 	G_ELI_LOGREQ(2, cbp, "Sending request.");
302c58794deSPawel Jakub Dawidek 	/*
303c58794deSPawel Jakub Dawidek 	 * Send encrypted data to the provider.
304c58794deSPawel Jakub Dawidek 	 */
305c58794deSPawel Jakub Dawidek 	g_io_request(cbp, cp);
306c58794deSPawel Jakub Dawidek 	return (0);
307c58794deSPawel Jakub Dawidek }
308c58794deSPawel Jakub Dawidek 
309c58794deSPawel Jakub Dawidek /*
310c58794deSPawel Jakub Dawidek  * This function should never be called, but GEOM made as it set ->orphan()
311c58794deSPawel Jakub Dawidek  * method for every geom.
312c58794deSPawel Jakub Dawidek  */
313c58794deSPawel Jakub Dawidek static void
314c58794deSPawel Jakub Dawidek g_eli_orphan_spoil_assert(struct g_consumer *cp)
315c58794deSPawel Jakub Dawidek {
316c58794deSPawel Jakub Dawidek 
317c58794deSPawel Jakub Dawidek 	panic("Function %s() called for %s.", __func__, cp->geom->name);
318c58794deSPawel Jakub Dawidek }
319c58794deSPawel Jakub Dawidek 
320c58794deSPawel Jakub Dawidek static void
321c58794deSPawel Jakub Dawidek g_eli_orphan(struct g_consumer *cp)
322c58794deSPawel Jakub Dawidek {
323c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
324c58794deSPawel Jakub Dawidek 
325c58794deSPawel Jakub Dawidek 	g_topology_assert();
326c58794deSPawel Jakub Dawidek 	sc = cp->geom->softc;
327c58794deSPawel Jakub Dawidek 	if (sc == NULL)
328c58794deSPawel Jakub Dawidek 		return;
329c58794deSPawel Jakub Dawidek 	g_eli_destroy(sc, 1);
330c58794deSPawel Jakub Dawidek }
331c58794deSPawel Jakub Dawidek 
332c58794deSPawel Jakub Dawidek static void
333c58794deSPawel Jakub Dawidek g_eli_start(struct bio *bp)
334c58794deSPawel Jakub Dawidek {
335c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
336c58794deSPawel Jakub Dawidek 	struct bio *cbp;
337c58794deSPawel Jakub Dawidek 
338c58794deSPawel Jakub Dawidek 	sc = bp->bio_to->geom->softc;
339c58794deSPawel Jakub Dawidek 	KASSERT(sc != NULL,
340c58794deSPawel Jakub Dawidek 	    ("Provider's error should be set (error=%d)(device=%s).",
341c58794deSPawel Jakub Dawidek 	    bp->bio_to->error, bp->bio_to->name));
342c58794deSPawel Jakub Dawidek 	G_ELI_LOGREQ(2, bp, "Request received.");
343c58794deSPawel Jakub Dawidek 
344c58794deSPawel Jakub Dawidek 	switch (bp->bio_cmd) {
345c58794deSPawel Jakub Dawidek 	case BIO_READ:
346c58794deSPawel Jakub Dawidek 	case BIO_WRITE:
347c58794deSPawel Jakub Dawidek 		break;
348c58794deSPawel Jakub Dawidek 	case BIO_DELETE:
349c58794deSPawel Jakub Dawidek 		/*
350c58794deSPawel Jakub Dawidek 		 * We could eventually support BIO_DELETE request.
351c58794deSPawel Jakub Dawidek 		 * It could be done by overwritting requested sector with
352c58794deSPawel Jakub Dawidek 		 * random data g_eli_overwrites number of times.
353c58794deSPawel Jakub Dawidek 		 */
354c58794deSPawel Jakub Dawidek 	case BIO_GETATTR:
355c58794deSPawel Jakub Dawidek 	default:
356c58794deSPawel Jakub Dawidek 		g_io_deliver(bp, EOPNOTSUPP);
357c58794deSPawel Jakub Dawidek 		return;
358c58794deSPawel Jakub Dawidek 	}
359c58794deSPawel Jakub Dawidek 	cbp = g_clone_bio(bp);
360c58794deSPawel Jakub Dawidek 	if (cbp == NULL) {
361c58794deSPawel Jakub Dawidek 		g_io_deliver(bp, ENOMEM);
362c58794deSPawel Jakub Dawidek 		return;
363c58794deSPawel Jakub Dawidek 	}
364c58794deSPawel Jakub Dawidek 	if (bp->bio_cmd == BIO_READ) {
365c58794deSPawel Jakub Dawidek 		struct g_consumer *cp;
366c58794deSPawel Jakub Dawidek 
367c58794deSPawel Jakub Dawidek 		cbp->bio_done = g_eli_read_done;
368c58794deSPawel Jakub Dawidek 		cp = LIST_FIRST(&sc->sc_geom->consumer);
369c58794deSPawel Jakub Dawidek 		cbp->bio_to = cp->provider;
370c58794deSPawel Jakub Dawidek 		G_ELI_LOGREQ(2, bp, "Sending request.");
371c58794deSPawel Jakub Dawidek 		/*
372c58794deSPawel Jakub Dawidek 		 * Read encrypted data from provider.
373c58794deSPawel Jakub Dawidek 		 */
374c58794deSPawel Jakub Dawidek 		g_io_request(cbp, cp);
375c58794deSPawel Jakub Dawidek 	} else /* if (bp->bio_cmd == BIO_WRITE) */ {
376c58794deSPawel Jakub Dawidek 		struct g_eli_worker *wr;
377c58794deSPawel Jakub Dawidek 		int error;
378c58794deSPawel Jakub Dawidek 
379c58794deSPawel Jakub Dawidek 		bp->bio_driver1 = cbp;
380c58794deSPawel Jakub Dawidek 		wr = LIST_FIRST(&sc->sc_workers);
381c58794deSPawel Jakub Dawidek 		/*
382c58794deSPawel Jakub Dawidek 		 * If we have hardware acceleration we can call
383c58794deSPawel Jakub Dawidek 		 * g_eli_crypto_run() directly. If not, put it on the queue and
384c58794deSPawel Jakub Dawidek 		 * wakeup worker thread, which will do the work for us, so we
385c58794deSPawel Jakub Dawidek 		 * don't slow down g_down path.
386c58794deSPawel Jakub Dawidek 		 */
387c58794deSPawel Jakub Dawidek 		if (sc->sc_crypto == G_ELI_CRYPTO_HW) {
388c58794deSPawel Jakub Dawidek 			error = g_eli_crypto_run(wr, bp);
389c58794deSPawel Jakub Dawidek 			if (error != 0) {
390c58794deSPawel Jakub Dawidek 				G_ELI_LOGREQ(0, bp,
391c58794deSPawel Jakub Dawidek 				    "g_eli_crypto_run() failed (error=%d).",
392c58794deSPawel Jakub Dawidek 				    error);
393c58794deSPawel Jakub Dawidek 				g_destroy_bio(cbp);
394c58794deSPawel Jakub Dawidek 				bp->bio_completed = 0;
395c58794deSPawel Jakub Dawidek 				g_io_deliver(bp, error);
396c58794deSPawel Jakub Dawidek 			}
397c58794deSPawel Jakub Dawidek 		} else {
398c58794deSPawel Jakub Dawidek 			mtx_lock(&sc->sc_queue_mtx);
399c58794deSPawel Jakub Dawidek 			bioq_insert_tail(&sc->sc_queue, bp);
400c58794deSPawel Jakub Dawidek 			mtx_unlock(&sc->sc_queue_mtx);
401c58794deSPawel Jakub Dawidek 			wakeup(sc);
402c58794deSPawel Jakub Dawidek 		}
403c58794deSPawel Jakub Dawidek 	}
404c58794deSPawel Jakub Dawidek }
405c58794deSPawel Jakub Dawidek 
406c58794deSPawel Jakub Dawidek /*
407c58794deSPawel Jakub Dawidek  * This is the main function for kernel worker thread when we don't have
408c58794deSPawel Jakub Dawidek  * hardware acceleration and we have to do cryptography in software.
409c58794deSPawel Jakub Dawidek  * Dedicated thread is needed, so we don't slow down g_up/g_down GEOM
410c58794deSPawel Jakub Dawidek  * threads with crypto work.
411c58794deSPawel Jakub Dawidek  */
412c58794deSPawel Jakub Dawidek static void
413c58794deSPawel Jakub Dawidek g_eli_worker(void *arg)
414c58794deSPawel Jakub Dawidek {
415c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
416c58794deSPawel Jakub Dawidek 	struct g_eli_worker *wr;
417c58794deSPawel Jakub Dawidek 	struct bio *bp;
418c58794deSPawel Jakub Dawidek 	int error;
419c58794deSPawel Jakub Dawidek 
420c58794deSPawel Jakub Dawidek 	wr = arg;
421c58794deSPawel Jakub Dawidek 	sc = wr->w_softc;
422c58794deSPawel Jakub Dawidek 	mtx_lock_spin(&sched_lock);
423c58794deSPawel Jakub Dawidek 	sched_prio(curthread, PRIBIO);
424c58794deSPawel Jakub Dawidek 	mtx_unlock_spin(&sched_lock);
425c58794deSPawel Jakub Dawidek 
426c58794deSPawel Jakub Dawidek 	G_ELI_DEBUG(1, "Thread %s started.", curthread->td_proc->p_comm);
427c58794deSPawel Jakub Dawidek 
428c58794deSPawel Jakub Dawidek 	for (;;) {
429c58794deSPawel Jakub Dawidek 		mtx_lock(&sc->sc_queue_mtx);
430c58794deSPawel Jakub Dawidek 		bp = bioq_takefirst(&sc->sc_queue);
431c58794deSPawel Jakub Dawidek 		if (bp == NULL) {
432c58794deSPawel Jakub Dawidek 			if ((sc->sc_flags & G_ELI_FLAG_DESTROY) != 0) {
433c58794deSPawel Jakub Dawidek 				LIST_REMOVE(wr, w_next);
434c58794deSPawel Jakub Dawidek 				crypto_freesession(wr->w_sid);
435c58794deSPawel Jakub Dawidek 				free(wr, M_ELI);
436c58794deSPawel Jakub Dawidek 				G_ELI_DEBUG(1, "Thread %s exiting.",
437c58794deSPawel Jakub Dawidek 				    curthread->td_proc->p_comm);
438c58794deSPawel Jakub Dawidek 				wakeup(&sc->sc_workers);
439c58794deSPawel Jakub Dawidek 				mtx_unlock(&sc->sc_queue_mtx);
440c58794deSPawel Jakub Dawidek 				kthread_exit(0);
441c58794deSPawel Jakub Dawidek 			}
442c58794deSPawel Jakub Dawidek 			msleep(sc, &sc->sc_queue_mtx, PRIBIO | PDROP,
443c58794deSPawel Jakub Dawidek 			    "geli:w", 0);
444c58794deSPawel Jakub Dawidek 			continue;
445c58794deSPawel Jakub Dawidek 		}
446c58794deSPawel Jakub Dawidek 		mtx_unlock(&sc->sc_queue_mtx);
447c58794deSPawel Jakub Dawidek 		error = g_eli_crypto_run(wr, bp);
448c58794deSPawel Jakub Dawidek 		if (error != 0) {
449c58794deSPawel Jakub Dawidek 			G_ELI_LOGREQ(0, bp,
450c58794deSPawel Jakub Dawidek 			    "g_eli_crypto_run() failed (error=%d).", error);
451c58794deSPawel Jakub Dawidek 			if (bp->bio_cmd == BIO_WRITE) {
452c58794deSPawel Jakub Dawidek 				g_destroy_bio(bp->bio_driver1);
453c58794deSPawel Jakub Dawidek 				bp->bio_driver1 = NULL;
454c58794deSPawel Jakub Dawidek 			}
455c58794deSPawel Jakub Dawidek 			bp->bio_driver2 = NULL;
456c58794deSPawel Jakub Dawidek 			bp->bio_completed = 0;
457c58794deSPawel Jakub Dawidek 			g_io_deliver(bp, error);
458c58794deSPawel Jakub Dawidek 		}
459c58794deSPawel Jakub Dawidek 	}
460c58794deSPawel Jakub Dawidek }
461c58794deSPawel Jakub Dawidek 
462c58794deSPawel Jakub Dawidek /*
463c58794deSPawel Jakub Dawidek  * Here we generate IV. It is unique for every sector.
464c58794deSPawel Jakub Dawidek  */
465c58794deSPawel Jakub Dawidek static void
466c58794deSPawel Jakub Dawidek g_eli_crypto_ivgen(struct g_eli_softc *sc, off_t offset, u_char *iv,
467c58794deSPawel Jakub Dawidek     size_t size)
468c58794deSPawel Jakub Dawidek {
469c58794deSPawel Jakub Dawidek 	u_char hash[SHA256_DIGEST_LENGTH];
470c58794deSPawel Jakub Dawidek 	SHA256_CTX ctx;
471c58794deSPawel Jakub Dawidek 
472c58794deSPawel Jakub Dawidek 	/* Copy precalculated SHA256 context for IV-Key. */
473c58794deSPawel Jakub Dawidek 	bcopy(&sc->sc_ivctx, &ctx, sizeof(ctx));
474c58794deSPawel Jakub Dawidek 	SHA256_Update(&ctx, (uint8_t *)&offset, sizeof(offset));
475c58794deSPawel Jakub Dawidek 	SHA256_Final(hash, &ctx);
476c58794deSPawel Jakub Dawidek 	bcopy(hash, iv, size);
477c58794deSPawel Jakub Dawidek }
478c58794deSPawel Jakub Dawidek 
479c58794deSPawel Jakub Dawidek /*
480c58794deSPawel Jakub Dawidek  * This is the main function responsible for cryptography (ie. communication
481c58794deSPawel Jakub Dawidek  * with crypto(9) subsystem).
482c58794deSPawel Jakub Dawidek  */
483c58794deSPawel Jakub Dawidek static int
484c58794deSPawel Jakub Dawidek g_eli_crypto_run(struct g_eli_worker *wr, struct bio *bp)
485c58794deSPawel Jakub Dawidek {
486c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
487c58794deSPawel Jakub Dawidek 	struct cryptop *crp;
488c58794deSPawel Jakub Dawidek 	struct cryptodesc *crd;
489c58794deSPawel Jakub Dawidek 	struct uio *uio;
490c58794deSPawel Jakub Dawidek 	struct iovec *iov;
491c58794deSPawel Jakub Dawidek 	u_int i, nsec, add, secsize;
492c58794deSPawel Jakub Dawidek 	int err, error, flags;
493c58794deSPawel Jakub Dawidek 	size_t size;
494c58794deSPawel Jakub Dawidek 	u_char *p, *data;
495c58794deSPawel Jakub Dawidek 
496c58794deSPawel Jakub Dawidek 	G_ELI_LOGREQ(3, bp, "%s", __func__);
497c58794deSPawel Jakub Dawidek 
498c58794deSPawel Jakub Dawidek 	bp->bio_pflags = wr->w_number;
499c58794deSPawel Jakub Dawidek 	sc = wr->w_softc;
500c58794deSPawel Jakub Dawidek 	secsize = LIST_FIRST(&sc->sc_geom->provider)->sectorsize;
501c58794deSPawel Jakub Dawidek 	nsec = bp->bio_length / secsize;
502c58794deSPawel Jakub Dawidek 
503c58794deSPawel Jakub Dawidek 	/*
504c58794deSPawel Jakub Dawidek 	 * Calculate how much memory do we need.
505c58794deSPawel Jakub Dawidek 	 * We need separate crypto operation for every single sector.
506c58794deSPawel Jakub Dawidek 	 * It is much faster to calculate total amount of needed memory here and
507c58794deSPawel Jakub Dawidek 	 * do the allocation once insteaf of allocate memory in pieces (many,
508c58794deSPawel Jakub Dawidek 	 * many pieces).
509c58794deSPawel Jakub Dawidek 	 */
510c58794deSPawel Jakub Dawidek 	size = sizeof(*crp) * nsec;
511c58794deSPawel Jakub Dawidek 	size += sizeof(*crd) * nsec;
512c58794deSPawel Jakub Dawidek 	size += sizeof(*uio) * nsec;
513c58794deSPawel Jakub Dawidek 	size += sizeof(*iov) * nsec;
514c58794deSPawel Jakub Dawidek 	/*
515c58794deSPawel Jakub Dawidek 	 * If we write the data we cannot destroy current bio_data content,
516c58794deSPawel Jakub Dawidek 	 * so we need to allocate more memory for encrypted data.
517c58794deSPawel Jakub Dawidek 	 */
518c58794deSPawel Jakub Dawidek 	if (bp->bio_cmd == BIO_WRITE)
519c58794deSPawel Jakub Dawidek 		size += bp->bio_length;
520c58794deSPawel Jakub Dawidek 	p = malloc(size, M_ELI, M_NOWAIT | M_ZERO);
521c58794deSPawel Jakub Dawidek 	if (p == NULL)
522c58794deSPawel Jakub Dawidek 		return (ENOMEM);
523c58794deSPawel Jakub Dawidek 
524c58794deSPawel Jakub Dawidek 	bp->bio_inbed = 0;
525c58794deSPawel Jakub Dawidek 	bp->bio_children = nsec;
526c58794deSPawel Jakub Dawidek 	bp->bio_driver2 = p;
527c58794deSPawel Jakub Dawidek 
528c58794deSPawel Jakub Dawidek 	if (bp->bio_cmd == BIO_READ)
529c58794deSPawel Jakub Dawidek 		data = bp->bio_data;
530c58794deSPawel Jakub Dawidek 	else {
531c58794deSPawel Jakub Dawidek 		data = p;
532c58794deSPawel Jakub Dawidek 		p += bp->bio_length;
533c58794deSPawel Jakub Dawidek 		bcopy(bp->bio_data, data, bp->bio_length);
534c58794deSPawel Jakub Dawidek 	}
535c58794deSPawel Jakub Dawidek 
536c58794deSPawel Jakub Dawidek 	error = 0;
537c58794deSPawel Jakub Dawidek 	for (i = 0, add = 0; i < nsec; i++, add += secsize) {
538c58794deSPawel Jakub Dawidek 		crp = (struct cryptop *)p;	p += sizeof(*crp);
539c58794deSPawel Jakub Dawidek 		crd = (struct cryptodesc *)p;	p += sizeof(*crd);
540c58794deSPawel Jakub Dawidek 		uio = (struct uio *)p;		p += sizeof(*uio);
541c58794deSPawel Jakub Dawidek 		iov = (struct iovec *)p;	p += sizeof(*iov);
542c58794deSPawel Jakub Dawidek 
543c58794deSPawel Jakub Dawidek 		iov->iov_len = secsize;
544c58794deSPawel Jakub Dawidek 		iov->iov_base = data;
545c58794deSPawel Jakub Dawidek 		data += secsize;
546c58794deSPawel Jakub Dawidek 
547c58794deSPawel Jakub Dawidek 		uio->uio_iov = iov;
548c58794deSPawel Jakub Dawidek 		uio->uio_iovcnt = 1;
549c58794deSPawel Jakub Dawidek 		uio->uio_segflg = UIO_SYSSPACE;
550c58794deSPawel Jakub Dawidek 		uio->uio_resid = secsize;
551c58794deSPawel Jakub Dawidek 
552c58794deSPawel Jakub Dawidek 		crp->crp_sid = wr->w_sid;
553c58794deSPawel Jakub Dawidek 		crp->crp_ilen = secsize;
554c58794deSPawel Jakub Dawidek 		crp->crp_olen = secsize;
555c58794deSPawel Jakub Dawidek 		crp->crp_opaque = (void *)bp;
556c58794deSPawel Jakub Dawidek 		crp->crp_buf = (void *)uio;
557c58794deSPawel Jakub Dawidek 		if (bp->bio_cmd == BIO_WRITE)
558c58794deSPawel Jakub Dawidek 			crp->crp_callback = g_eli_crypto_write_done;
559c58794deSPawel Jakub Dawidek 		else /* if (bp->bio_cmd == BIO_READ) */
560c58794deSPawel Jakub Dawidek 			crp->crp_callback = g_eli_crypto_read_done;
561c58794deSPawel Jakub Dawidek 		crp->crp_flags = CRYPTO_F_IOV | CRYPTO_F_CBIFSYNC | CRYPTO_F_REL;
562c58794deSPawel Jakub Dawidek 		crp->crp_desc = crd;
563c58794deSPawel Jakub Dawidek 
564c58794deSPawel Jakub Dawidek 		crd->crd_skip = 0;
565c58794deSPawel Jakub Dawidek 		crd->crd_len = secsize;
566c58794deSPawel Jakub Dawidek 		crd->crd_flags = flags;
567c58794deSPawel Jakub Dawidek 		crd->crd_flags =
568c58794deSPawel Jakub Dawidek 		    CRD_F_IV_EXPLICIT | CRD_F_IV_PRESENT | CRD_F_KEY_EXPLICIT;
569c58794deSPawel Jakub Dawidek 		if (bp->bio_cmd == BIO_WRITE)
570c58794deSPawel Jakub Dawidek 			crd->crd_flags |= CRD_F_ENCRYPT;
571c58794deSPawel Jakub Dawidek 		crd->crd_alg = sc->sc_algo;
572c58794deSPawel Jakub Dawidek 		crd->crd_key = sc->sc_datakey;
573c58794deSPawel Jakub Dawidek 		crd->crd_klen = sc->sc_keylen;
574c58794deSPawel Jakub Dawidek 		g_eli_crypto_ivgen(sc, bp->bio_offset + add, crd->crd_iv,
575c58794deSPawel Jakub Dawidek 		    sizeof(crd->crd_iv));
576c58794deSPawel Jakub Dawidek 		crd->crd_next = NULL;
577c58794deSPawel Jakub Dawidek 
578c58794deSPawel Jakub Dawidek 		err = crypto_dispatch(crp);
579c58794deSPawel Jakub Dawidek 		if (err != 0) {
580c58794deSPawel Jakub Dawidek 			G_ELI_DEBUG(1, "crypto_dispatch() returned %d.", err);
581c58794deSPawel Jakub Dawidek 			bp->bio_children--;
582c58794deSPawel Jakub Dawidek 			if (error == 0)
583c58794deSPawel Jakub Dawidek 				error = err;
584c58794deSPawel Jakub Dawidek 		}
585c58794deSPawel Jakub Dawidek 	}
586c58794deSPawel Jakub Dawidek 	if (bp->bio_error == 0)
587c58794deSPawel Jakub Dawidek 		bp->bio_error = error;
588c58794deSPawel Jakub Dawidek 	if (bp->bio_children > 0)
589c58794deSPawel Jakub Dawidek 		error = 0;
590c58794deSPawel Jakub Dawidek 	else {
591c58794deSPawel Jakub Dawidek 		free(bp->bio_driver2, M_ELI);
592c58794deSPawel Jakub Dawidek 		bp->bio_driver2 = NULL;
593c58794deSPawel Jakub Dawidek 	}
594c58794deSPawel Jakub Dawidek 	return (error);
595c58794deSPawel Jakub Dawidek }
596c58794deSPawel Jakub Dawidek 
597c58794deSPawel Jakub Dawidek int
598c58794deSPawel Jakub Dawidek g_eli_read_metadata(struct g_class *mp, struct g_provider *pp,
599c58794deSPawel Jakub Dawidek     struct g_eli_metadata *md)
600c58794deSPawel Jakub Dawidek {
601c58794deSPawel Jakub Dawidek 	struct g_geom *gp;
602c58794deSPawel Jakub Dawidek 	struct g_consumer *cp;
603c58794deSPawel Jakub Dawidek 	u_char *buf = NULL;
604c58794deSPawel Jakub Dawidek 	int error;
605c58794deSPawel Jakub Dawidek 
606c58794deSPawel Jakub Dawidek 	g_topology_assert();
607c58794deSPawel Jakub Dawidek 
608c58794deSPawel Jakub Dawidek 	gp = g_new_geomf(mp, "eli:taste");
609c58794deSPawel Jakub Dawidek 	gp->start = g_eli_start;
610c58794deSPawel Jakub Dawidek 	gp->access = g_std_access;
611c58794deSPawel Jakub Dawidek 	/*
612c58794deSPawel Jakub Dawidek 	 * g_eli_read_metadata() is always called from the event thread.
613c58794deSPawel Jakub Dawidek 	 * Our geom is created and destroyed in the same event, so there
614c58794deSPawel Jakub Dawidek 	 * could be no orphan nor spoil event in the meantime.
615c58794deSPawel Jakub Dawidek 	 */
616c58794deSPawel Jakub Dawidek 	gp->orphan = g_eli_orphan_spoil_assert;
617c58794deSPawel Jakub Dawidek 	gp->spoiled = g_eli_orphan_spoil_assert;
618c58794deSPawel Jakub Dawidek 	cp = g_new_consumer(gp);
619c58794deSPawel Jakub Dawidek 	error = g_attach(cp, pp);
620c58794deSPawel Jakub Dawidek 	if (error != 0)
621c58794deSPawel Jakub Dawidek 		goto end;
622c58794deSPawel Jakub Dawidek 	error = g_access(cp, 1, 0, 0);
623c58794deSPawel Jakub Dawidek 	if (error != 0)
624c58794deSPawel Jakub Dawidek 		goto end;
625c58794deSPawel Jakub Dawidek 	g_topology_unlock();
626c58794deSPawel Jakub Dawidek 	buf = g_read_data(cp, pp->mediasize - pp->sectorsize, pp->sectorsize,
627c58794deSPawel Jakub Dawidek 	    &error);
628c58794deSPawel Jakub Dawidek 	g_topology_lock();
629c58794deSPawel Jakub Dawidek 	if (error != 0)
630c58794deSPawel Jakub Dawidek 		goto end;
631c58794deSPawel Jakub Dawidek 	eli_metadata_decode(buf, md);
632c58794deSPawel Jakub Dawidek end:
633c58794deSPawel Jakub Dawidek 	if (buf != NULL)
634c58794deSPawel Jakub Dawidek 		g_free(buf);
635c58794deSPawel Jakub Dawidek 	if (cp->provider != NULL) {
636c58794deSPawel Jakub Dawidek 		if (cp->acr == 1)
637c58794deSPawel Jakub Dawidek 			g_access(cp, -1, 0, 0);
638c58794deSPawel Jakub Dawidek 		g_detach(cp);
639c58794deSPawel Jakub Dawidek 	}
640c58794deSPawel Jakub Dawidek 	g_destroy_consumer(cp);
641c58794deSPawel Jakub Dawidek 	g_destroy_geom(gp);
642c58794deSPawel Jakub Dawidek 	return (error);
643c58794deSPawel Jakub Dawidek }
644c58794deSPawel Jakub Dawidek 
645c58794deSPawel Jakub Dawidek /*
646c58794deSPawel Jakub Dawidek  * The function is called when we had last close on provider and user requested
647c58794deSPawel Jakub Dawidek  * to close it when this situation occur.
648c58794deSPawel Jakub Dawidek  */
649c58794deSPawel Jakub Dawidek static void
650c58794deSPawel Jakub Dawidek g_eli_last_close(struct g_eli_softc *sc)
651c58794deSPawel Jakub Dawidek {
652c58794deSPawel Jakub Dawidek 	struct g_geom *gp;
653c58794deSPawel Jakub Dawidek 	struct g_provider *pp;
654c58794deSPawel Jakub Dawidek 	char ppname[64];
655c58794deSPawel Jakub Dawidek 	int error;
656c58794deSPawel Jakub Dawidek 
657c58794deSPawel Jakub Dawidek 	g_topology_assert();
658c58794deSPawel Jakub Dawidek 	gp = sc->sc_geom;
659c58794deSPawel Jakub Dawidek 	pp = LIST_FIRST(&gp->provider);
660c58794deSPawel Jakub Dawidek 	strlcpy(ppname, pp->name, sizeof(ppname));
661c58794deSPawel Jakub Dawidek 	error = g_eli_destroy(sc, 1);
662c58794deSPawel Jakub Dawidek 	KASSERT(error == 0, ("Cannot detach %s on last close (error=%d).",
663c58794deSPawel Jakub Dawidek 	    ppname, error));
664c58794deSPawel Jakub Dawidek 	G_ELI_DEBUG(0, "Detached %s on last close.", ppname);
665c58794deSPawel Jakub Dawidek }
666c58794deSPawel Jakub Dawidek 
667c58794deSPawel Jakub Dawidek int
668c58794deSPawel Jakub Dawidek g_eli_access(struct g_provider *pp, int dr, int dw, int de)
669c58794deSPawel Jakub Dawidek {
670c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
671c58794deSPawel Jakub Dawidek 	struct g_geom *gp;
672c58794deSPawel Jakub Dawidek 
673c58794deSPawel Jakub Dawidek 	gp = pp->geom;
674c58794deSPawel Jakub Dawidek 	sc = gp->softc;
675c58794deSPawel Jakub Dawidek 
676c58794deSPawel Jakub Dawidek 	if (dw > 0) {
677c58794deSPawel Jakub Dawidek 		/* Someone is opening us for write, we need to remember that. */
678c58794deSPawel Jakub Dawidek 		sc->sc_flags |= G_ELI_FLAG_WOPEN;
679c58794deSPawel Jakub Dawidek 		return (0);
680c58794deSPawel Jakub Dawidek 	}
681c58794deSPawel Jakub Dawidek 	/* Is this the last close? */
682c58794deSPawel Jakub Dawidek 	if (pp->acr + dr > 0 || pp->acw + dw > 0 || pp->ace + de > 0)
683c58794deSPawel Jakub Dawidek 		return (0);
684c58794deSPawel Jakub Dawidek 
685c58794deSPawel Jakub Dawidek 	/*
686c58794deSPawel Jakub Dawidek 	 * Automatically detach on last close if requested.
687c58794deSPawel Jakub Dawidek 	 */
688c58794deSPawel Jakub Dawidek 	if ((sc->sc_flags & G_ELI_FLAG_RW_DETACH) ||
689c58794deSPawel Jakub Dawidek 	    (sc->sc_flags & G_ELI_FLAG_WOPEN)) {
690c58794deSPawel Jakub Dawidek 		g_eli_last_close(sc);
691c58794deSPawel Jakub Dawidek 	}
692c58794deSPawel Jakub Dawidek 	return (0);
693c58794deSPawel Jakub Dawidek }
694c58794deSPawel Jakub Dawidek 
695c58794deSPawel Jakub Dawidek struct g_geom *
696c58794deSPawel Jakub Dawidek g_eli_create(struct gctl_req *req, struct g_class *mp, struct g_provider *bpp,
697c58794deSPawel Jakub Dawidek     const struct g_eli_metadata *md, const u_char *mkey, int nkey)
698c58794deSPawel Jakub Dawidek {
699c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
700c58794deSPawel Jakub Dawidek 	struct g_eli_worker *wr;
701c58794deSPawel Jakub Dawidek 	struct g_geom *gp;
702c58794deSPawel Jakub Dawidek 	struct g_provider *pp;
703c58794deSPawel Jakub Dawidek 	struct g_consumer *cp;
704c58794deSPawel Jakub Dawidek 	struct cryptoini cri;
705c58794deSPawel Jakub Dawidek 	u_int i, threads;
706c58794deSPawel Jakub Dawidek 	int error;
707c58794deSPawel Jakub Dawidek 
708c58794deSPawel Jakub Dawidek 	G_ELI_DEBUG(1, "Creating device %s%s.", bpp->name, G_ELI_SUFFIX);
709c58794deSPawel Jakub Dawidek 
710c58794deSPawel Jakub Dawidek 	gp = g_new_geomf(mp, "%s%s", bpp->name, G_ELI_SUFFIX);
711c58794deSPawel Jakub Dawidek 	gp->softc = NULL;	/* for a moment */
712c58794deSPawel Jakub Dawidek 
713c58794deSPawel Jakub Dawidek 	sc = malloc(sizeof(*sc), M_ELI, M_WAITOK | M_ZERO);
714c58794deSPawel Jakub Dawidek 	gp->start = g_eli_start;
715c58794deSPawel Jakub Dawidek 	/*
716c58794deSPawel Jakub Dawidek 	 * Spoiling cannot happen actually, because we keep provider open for
717c58794deSPawel Jakub Dawidek 	 * writing all the time.
718c58794deSPawel Jakub Dawidek 	 */
719c58794deSPawel Jakub Dawidek 	gp->spoiled = g_eli_orphan_spoil_assert;
720c58794deSPawel Jakub Dawidek 	gp->orphan = g_eli_orphan;
721c58794deSPawel Jakub Dawidek 	/*
722c58794deSPawel Jakub Dawidek 	 * If detach-on-last-close feature is not enabled, we can simply use
723c58794deSPawel Jakub Dawidek 	 * g_std_access().
724c58794deSPawel Jakub Dawidek 	 */
725c58794deSPawel Jakub Dawidek 	if (md->md_flags & G_ELI_FLAG_WO_DETACH)
726c58794deSPawel Jakub Dawidek 		gp->access = g_eli_access;
727c58794deSPawel Jakub Dawidek 	else
728c58794deSPawel Jakub Dawidek 		gp->access = g_std_access;
729c58794deSPawel Jakub Dawidek 	gp->dumpconf = g_eli_dumpconf;
730c58794deSPawel Jakub Dawidek 
731c58794deSPawel Jakub Dawidek 	sc->sc_crypto = G_ELI_CRYPTO_SW;
732c58794deSPawel Jakub Dawidek 	sc->sc_flags = md->md_flags;
733c58794deSPawel Jakub Dawidek 	sc->sc_algo = md->md_algo;
734c58794deSPawel Jakub Dawidek 	sc->sc_nkey = nkey;
735c58794deSPawel Jakub Dawidek 	/*
736c58794deSPawel Jakub Dawidek 	 * Remember the keys in our softc structure.
737c58794deSPawel Jakub Dawidek 	 */
738c58794deSPawel Jakub Dawidek 	bcopy(mkey, sc->sc_ivkey, sizeof(sc->sc_ivkey));
739c58794deSPawel Jakub Dawidek 	mkey += sizeof(sc->sc_ivkey);
740c58794deSPawel Jakub Dawidek 	bcopy(mkey, sc->sc_datakey, sizeof(sc->sc_datakey));
741c58794deSPawel Jakub Dawidek 	sc->sc_keylen = md->md_keylen;
742c58794deSPawel Jakub Dawidek 
743c58794deSPawel Jakub Dawidek 	/*
744c58794deSPawel Jakub Dawidek 	 * Precalculate SHA256 for IV generation.
745c58794deSPawel Jakub Dawidek 	 * This is expensive operation and we can do it only once now or for
746c58794deSPawel Jakub Dawidek 	 * every access to sector, so now will be much better.
747c58794deSPawel Jakub Dawidek 	 */
748c58794deSPawel Jakub Dawidek 	SHA256_Init(&sc->sc_ivctx);
749c58794deSPawel Jakub Dawidek 	SHA256_Update(&sc->sc_ivctx, sc->sc_ivkey, sizeof(sc->sc_ivkey));
750c58794deSPawel Jakub Dawidek 
751c58794deSPawel Jakub Dawidek 	gp->softc = sc;
752c58794deSPawel Jakub Dawidek 	sc->sc_geom = gp;
753c58794deSPawel Jakub Dawidek 
754c58794deSPawel Jakub Dawidek 	bioq_init(&sc->sc_queue);
755c58794deSPawel Jakub Dawidek 	mtx_init(&sc->sc_queue_mtx, "geli:queue", NULL, MTX_DEF);
756c58794deSPawel Jakub Dawidek 
757c58794deSPawel Jakub Dawidek 	pp = NULL;
758c58794deSPawel Jakub Dawidek 	cp = g_new_consumer(gp);
759c58794deSPawel Jakub Dawidek 	error = g_attach(cp, bpp);
760c58794deSPawel Jakub Dawidek 	if (error != 0) {
761c58794deSPawel Jakub Dawidek 		if (req != NULL) {
762c58794deSPawel Jakub Dawidek 			gctl_error(req, "Cannot attach to %s (error=%d).",
763c58794deSPawel Jakub Dawidek 			    bpp->name, error);
764c58794deSPawel Jakub Dawidek 		} else {
765c58794deSPawel Jakub Dawidek 			G_ELI_DEBUG(1, "Cannot attach to %s (error=%d).",
766c58794deSPawel Jakub Dawidek 			    bpp->name, error);
767c58794deSPawel Jakub Dawidek 		}
768c58794deSPawel Jakub Dawidek 		goto failed;
769c58794deSPawel Jakub Dawidek 	}
770c58794deSPawel Jakub Dawidek 	/*
771c58794deSPawel Jakub Dawidek 	 * Keep provider open all the time, so we can run critical tasks,
772c58794deSPawel Jakub Dawidek 	 * like Master Keys deletion, without wondering if we can open
773c58794deSPawel Jakub Dawidek 	 * provider or not.
774c58794deSPawel Jakub Dawidek 	 */
775c58794deSPawel Jakub Dawidek 	error = g_access(cp, 1, 1, 1);
776c58794deSPawel Jakub Dawidek 	if (error != 0) {
777c58794deSPawel Jakub Dawidek 		if (req != NULL) {
778c58794deSPawel Jakub Dawidek 			gctl_error(req, "Cannot access %s (error=%d).",
779c58794deSPawel Jakub Dawidek 			    bpp->name, error);
780c58794deSPawel Jakub Dawidek 		} else {
781c58794deSPawel Jakub Dawidek 			G_ELI_DEBUG(1, "Cannot access %s (error=%d).",
782c58794deSPawel Jakub Dawidek 			    bpp->name, error);
783c58794deSPawel Jakub Dawidek 		}
784c58794deSPawel Jakub Dawidek 		goto failed;
785c58794deSPawel Jakub Dawidek 	}
786c58794deSPawel Jakub Dawidek 
787c58794deSPawel Jakub Dawidek 	LIST_INIT(&sc->sc_workers);
788c58794deSPawel Jakub Dawidek 
789c58794deSPawel Jakub Dawidek 	bzero(&cri, sizeof(cri));
790c58794deSPawel Jakub Dawidek 	cri.cri_alg = sc->sc_algo;
791c58794deSPawel Jakub Dawidek 	cri.cri_klen = sc->sc_keylen;
792c58794deSPawel Jakub Dawidek 	cri.cri_key = sc->sc_datakey;
793c58794deSPawel Jakub Dawidek 
794c58794deSPawel Jakub Dawidek 	threads = g_eli_threads;
795c58794deSPawel Jakub Dawidek 	/* There is really no need for too many worker threads. */
796c58794deSPawel Jakub Dawidek 	if (threads > MAXCPU) {
797c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(0, "Reducing number of threads to %u.", MAXCPU);
798c58794deSPawel Jakub Dawidek 		threads = MAXCPU;
799c58794deSPawel Jakub Dawidek 	}
800c58794deSPawel Jakub Dawidek 	for (i = 0; i < threads; i++) {
801c58794deSPawel Jakub Dawidek 		wr = malloc(sizeof(*wr), M_ELI, M_WAITOK | M_ZERO);
802c58794deSPawel Jakub Dawidek 		wr->w_softc = sc;
803c58794deSPawel Jakub Dawidek 		wr->w_number = i;
804c58794deSPawel Jakub Dawidek 
805c58794deSPawel Jakub Dawidek 		/*
806c58794deSPawel Jakub Dawidek 		 * If this is the first pass, try to get hardware support.
807c58794deSPawel Jakub Dawidek 		 * Use software cryptography, if we cannot get it.
808c58794deSPawel Jakub Dawidek 		 */
809c58794deSPawel Jakub Dawidek 		if (i == 0) {
810c58794deSPawel Jakub Dawidek 			error = crypto_newsession(&wr->w_sid, &cri, 1);
811c58794deSPawel Jakub Dawidek 			if (error == 0) {
812c58794deSPawel Jakub Dawidek 				sc->sc_crypto = G_ELI_CRYPTO_HW;
813c58794deSPawel Jakub Dawidek 				wr->w_proc = NULL;
814c58794deSPawel Jakub Dawidek 				LIST_INSERT_HEAD(&sc->sc_workers, wr, w_next);
815c58794deSPawel Jakub Dawidek 				break;
816c58794deSPawel Jakub Dawidek 			}
817c58794deSPawel Jakub Dawidek 		}
818c58794deSPawel Jakub Dawidek 		error = crypto_newsession(&wr->w_sid, &cri, 0);
819c58794deSPawel Jakub Dawidek 		if (error != 0) {
820c58794deSPawel Jakub Dawidek 			free(wr, M_ELI);
821c58794deSPawel Jakub Dawidek 			if (req != NULL) {
822c58794deSPawel Jakub Dawidek 				gctl_error(req, "Cannot setup crypto session "
823c58794deSPawel Jakub Dawidek 				    "for %s (error=%d).", bpp->name, error);
824c58794deSPawel Jakub Dawidek 			} else {
825c58794deSPawel Jakub Dawidek 				G_ELI_DEBUG(1, "Cannot setup crypto session "
826c58794deSPawel Jakub Dawidek 				    "for %s (error=%d).", bpp->name, error);
827c58794deSPawel Jakub Dawidek 			}
828c58794deSPawel Jakub Dawidek 			goto failed;
829c58794deSPawel Jakub Dawidek 		}
830c58794deSPawel Jakub Dawidek 
831c58794deSPawel Jakub Dawidek 		/*
832c58794deSPawel Jakub Dawidek 		 * If we cannot get hardware acceleration, create dedicated
833c58794deSPawel Jakub Dawidek 		 * thread(s) and do the crypto work in there.
834c58794deSPawel Jakub Dawidek 		 */
835c58794deSPawel Jakub Dawidek 
836c58794deSPawel Jakub Dawidek 		error = kthread_create(g_eli_worker, wr, &wr->w_proc, 0, 0,
837c58794deSPawel Jakub Dawidek 		    "g_eli[%u] %s", i, bpp->name);
838c58794deSPawel Jakub Dawidek 		if (error != 0) {
839c58794deSPawel Jakub Dawidek 			crypto_freesession(wr->w_sid);
840c58794deSPawel Jakub Dawidek 			free(wr, M_ELI);
841c58794deSPawel Jakub Dawidek 			if (req != NULL) {
842c58794deSPawel Jakub Dawidek 				gctl_error(req, "Cannot create kernel "
843c58794deSPawel Jakub Dawidek 				    "thread for %s (error=%d).",
844c58794deSPawel Jakub Dawidek 				    bpp->name, error);
845c58794deSPawel Jakub Dawidek 			} else {
846c58794deSPawel Jakub Dawidek 				G_ELI_DEBUG(1, "Cannot create kernel "
847c58794deSPawel Jakub Dawidek 				    "thread for %s (error=%d).",
848c58794deSPawel Jakub Dawidek 				    bpp->name, error);
849c58794deSPawel Jakub Dawidek 			}
850c58794deSPawel Jakub Dawidek 			goto failed;
851c58794deSPawel Jakub Dawidek 		}
852c58794deSPawel Jakub Dawidek 		LIST_INSERT_HEAD(&sc->sc_workers, wr, w_next);
853c58794deSPawel Jakub Dawidek 	}
854c58794deSPawel Jakub Dawidek 
855c58794deSPawel Jakub Dawidek 	/*
856c58794deSPawel Jakub Dawidek 	 * Create decrypted provider.
857c58794deSPawel Jakub Dawidek 	 */
858c58794deSPawel Jakub Dawidek 	pp = g_new_providerf(gp, "%s%s", bpp->name, G_ELI_SUFFIX);
859c58794deSPawel Jakub Dawidek 	pp->sectorsize = md->md_sectorsize;
860c58794deSPawel Jakub Dawidek 	pp->mediasize = bpp->mediasize;
861c58794deSPawel Jakub Dawidek 	if ((sc->sc_flags & G_ELI_FLAG_ONETIME) == 0)
862c58794deSPawel Jakub Dawidek 		pp->mediasize -= bpp->sectorsize;
863c58794deSPawel Jakub Dawidek 	pp->mediasize -= (pp->mediasize % pp->sectorsize);
864c58794deSPawel Jakub Dawidek 	g_error_provider(pp, 0);
865c58794deSPawel Jakub Dawidek 
866c58794deSPawel Jakub Dawidek 	G_ELI_DEBUG(0, "Device %s created.", pp->name);
867c58794deSPawel Jakub Dawidek 	G_ELI_DEBUG(0, "    Cipher: %s", g_eli_algo2str(sc->sc_algo));
868c58794deSPawel Jakub Dawidek 	G_ELI_DEBUG(0, "Key length: %u", sc->sc_keylen);
869c58794deSPawel Jakub Dawidek 	G_ELI_DEBUG(0, "    Crypto: %s",
870c58794deSPawel Jakub Dawidek 	    sc->sc_crypto == G_ELI_CRYPTO_SW ? "software" : "hardware");
871c58794deSPawel Jakub Dawidek 	return (gp);
872c58794deSPawel Jakub Dawidek failed:
873c58794deSPawel Jakub Dawidek 	if (sc->sc_crypto == G_ELI_CRYPTO_SW) {
874c58794deSPawel Jakub Dawidek 		mtx_lock(&sc->sc_queue_mtx);
875c58794deSPawel Jakub Dawidek 		sc->sc_flags |= G_ELI_FLAG_DESTROY;
876c58794deSPawel Jakub Dawidek 		wakeup(sc);
877c58794deSPawel Jakub Dawidek 		/*
878c58794deSPawel Jakub Dawidek 		 * Wait for kernel threads self destruction.
879c58794deSPawel Jakub Dawidek 		 */
880c58794deSPawel Jakub Dawidek 		while (!LIST_EMPTY(&sc->sc_workers)) {
881c58794deSPawel Jakub Dawidek 			msleep(&sc->sc_workers, &sc->sc_queue_mtx, PRIBIO,
882c58794deSPawel Jakub Dawidek 			    "geli:destroy", 0);
883c58794deSPawel Jakub Dawidek 		}
884c58794deSPawel Jakub Dawidek 	} else if (sc->sc_crypto == G_ELI_CRYPTO_HW) {
885c58794deSPawel Jakub Dawidek 		wr = LIST_FIRST(&sc->sc_workers);
886c58794deSPawel Jakub Dawidek 		LIST_REMOVE(wr, w_next);
887c58794deSPawel Jakub Dawidek 		crypto_freesession(wr->w_sid);
888c58794deSPawel Jakub Dawidek 		free(wr, M_ELI);
889c58794deSPawel Jakub Dawidek 	}
890c58794deSPawel Jakub Dawidek 	mtx_destroy(&sc->sc_queue_mtx);
891c58794deSPawel Jakub Dawidek 	if (cp->provider != NULL) {
892c58794deSPawel Jakub Dawidek 		if (cp->acr == 1)
893c58794deSPawel Jakub Dawidek 			g_access(cp, -1, -1, -1);
894c58794deSPawel Jakub Dawidek 		g_detach(cp);
895c58794deSPawel Jakub Dawidek 	}
896c58794deSPawel Jakub Dawidek 	g_destroy_consumer(cp);
897c58794deSPawel Jakub Dawidek 	if (pp != NULL)
898c58794deSPawel Jakub Dawidek 		g_destroy_provider(pp);
899c58794deSPawel Jakub Dawidek 	g_destroy_geom(gp);
900c58794deSPawel Jakub Dawidek 	bzero(sc, sizeof(*sc));
901c58794deSPawel Jakub Dawidek 	free(sc, M_ELI);
902c58794deSPawel Jakub Dawidek 	return (NULL);
903c58794deSPawel Jakub Dawidek }
904c58794deSPawel Jakub Dawidek 
905c58794deSPawel Jakub Dawidek int
906c58794deSPawel Jakub Dawidek g_eli_destroy(struct g_eli_softc *sc, boolean_t force)
907c58794deSPawel Jakub Dawidek {
908c58794deSPawel Jakub Dawidek 	struct g_eli_worker *wr;
909c58794deSPawel Jakub Dawidek 	struct g_geom *gp;
910c58794deSPawel Jakub Dawidek 	struct g_provider *pp;
911c58794deSPawel Jakub Dawidek 
912c58794deSPawel Jakub Dawidek 	g_topology_assert();
913c58794deSPawel Jakub Dawidek 
914c58794deSPawel Jakub Dawidek 	if (sc == NULL)
915c58794deSPawel Jakub Dawidek 		return (ENXIO);
916c58794deSPawel Jakub Dawidek 
917c58794deSPawel Jakub Dawidek 	gp = sc->sc_geom;
918c58794deSPawel Jakub Dawidek 	pp = LIST_FIRST(&gp->provider);
919c58794deSPawel Jakub Dawidek 	if (pp != NULL && (pp->acr != 0 || pp->acw != 0 || pp->ace != 0)) {
920c58794deSPawel Jakub Dawidek 		if (force) {
921c58794deSPawel Jakub Dawidek 			G_ELI_DEBUG(1, "Device %s is still open, so it "
922c58794deSPawel Jakub Dawidek 			    "can't be definitely removed.", pp->name);
923c58794deSPawel Jakub Dawidek 		} else {
924c58794deSPawel Jakub Dawidek 			G_ELI_DEBUG(1,
925c58794deSPawel Jakub Dawidek 			    "Device %s is still open (r%dw%de%d).", pp->name,
926c58794deSPawel Jakub Dawidek 			    pp->acr, pp->acw, pp->ace);
927c58794deSPawel Jakub Dawidek 			return (EBUSY);
928c58794deSPawel Jakub Dawidek 		}
929c58794deSPawel Jakub Dawidek 	}
930c58794deSPawel Jakub Dawidek 
931c58794deSPawel Jakub Dawidek 	/*
932c58794deSPawel Jakub Dawidek 	 * When we do cryptography in software, we have kernel thread hanging
933c58794deSPawel Jakub Dawidek 	 * around, so we need to destroy it first.
934c58794deSPawel Jakub Dawidek 	 */
935c58794deSPawel Jakub Dawidek 	if (sc->sc_crypto == G_ELI_CRYPTO_SW) {
936c58794deSPawel Jakub Dawidek 		mtx_lock(&sc->sc_queue_mtx);
937c58794deSPawel Jakub Dawidek 		sc->sc_flags |= G_ELI_FLAG_DESTROY;
938c58794deSPawel Jakub Dawidek 		wakeup(sc);
939c58794deSPawel Jakub Dawidek 		while (!LIST_EMPTY(&sc->sc_workers)) {
940c58794deSPawel Jakub Dawidek 			msleep(&sc->sc_workers, &sc->sc_queue_mtx, PRIBIO,
941c58794deSPawel Jakub Dawidek 			    "geli:destroy", 0);
942c58794deSPawel Jakub Dawidek 		}
943c58794deSPawel Jakub Dawidek 	} else /* if (sc->sc_crypto == G_ELI_CRYPTO_HW) */ {
944c58794deSPawel Jakub Dawidek 		wr = LIST_FIRST(&sc->sc_workers);
945c58794deSPawel Jakub Dawidek 		LIST_REMOVE(wr, w_next);
946c58794deSPawel Jakub Dawidek 		crypto_freesession(wr->w_sid);
947c58794deSPawel Jakub Dawidek 		free(wr, M_ELI);
948c58794deSPawel Jakub Dawidek 	}
949c58794deSPawel Jakub Dawidek 	mtx_destroy(&sc->sc_queue_mtx);
950c58794deSPawel Jakub Dawidek 	gp->softc = NULL;
951c58794deSPawel Jakub Dawidek 	bzero(sc, sizeof(*sc));
952c58794deSPawel Jakub Dawidek 	free(sc, M_ELI);
953c58794deSPawel Jakub Dawidek 
954c58794deSPawel Jakub Dawidek 	if (pp == NULL || (pp->acr == 0 && pp->acw == 0 && pp->ace == 0))
955c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(0, "Device %s destroyed.", gp->name);
956c58794deSPawel Jakub Dawidek 	g_wither_geom_close(gp, ENXIO);
957c58794deSPawel Jakub Dawidek 
958c58794deSPawel Jakub Dawidek 	return (0);
959c58794deSPawel Jakub Dawidek }
960c58794deSPawel Jakub Dawidek 
961c58794deSPawel Jakub Dawidek static int
962c58794deSPawel Jakub Dawidek g_eli_destroy_geom(struct gctl_req *req __unused,
963c58794deSPawel Jakub Dawidek     struct g_class *mp __unused, struct g_geom *gp)
964c58794deSPawel Jakub Dawidek {
965c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
966c58794deSPawel Jakub Dawidek 
967c58794deSPawel Jakub Dawidek 	sc = gp->softc;
968c58794deSPawel Jakub Dawidek 	return (g_eli_destroy(sc, 0));
969c58794deSPawel Jakub Dawidek }
970c58794deSPawel Jakub Dawidek 
971c58794deSPawel Jakub Dawidek /*
972c58794deSPawel Jakub Dawidek  * Tasting is only made on boot.
973c58794deSPawel Jakub Dawidek  * We detect providers which should be attached before root is mounted.
974c58794deSPawel Jakub Dawidek  */
975c58794deSPawel Jakub Dawidek static struct g_geom *
976c58794deSPawel Jakub Dawidek g_eli_taste(struct g_class *mp, struct g_provider *pp, int flags __unused)
977c58794deSPawel Jakub Dawidek {
978c58794deSPawel Jakub Dawidek 	struct g_eli_metadata md;
979c58794deSPawel Jakub Dawidek 	struct g_geom *gp;
980c58794deSPawel Jakub Dawidek 	struct hmac_ctx ctx;
981c58794deSPawel Jakub Dawidek 	char passphrase[256];
982c58794deSPawel Jakub Dawidek 	u_char key[G_ELI_USERKEYLEN], mkey[G_ELI_DATAIVKEYLEN];
983c58794deSPawel Jakub Dawidek 	u_int nkey, i;
984c58794deSPawel Jakub Dawidek 	int error;
985c58794deSPawel Jakub Dawidek 
986c58794deSPawel Jakub Dawidek 	g_trace(G_T_TOPOLOGY, "%s(%s, %s)", __func__, mp->name, pp->name);
987c58794deSPawel Jakub Dawidek 	g_topology_assert();
988c58794deSPawel Jakub Dawidek 
989c58794deSPawel Jakub Dawidek 	if (!g_eli_do_taste || g_eli_tries == 0)
990c58794deSPawel Jakub Dawidek 		return (NULL);
991c58794deSPawel Jakub Dawidek 
992c58794deSPawel Jakub Dawidek 	G_ELI_DEBUG(3, "Tasting %s.", pp->name);
993c58794deSPawel Jakub Dawidek 
994c58794deSPawel Jakub Dawidek 	error = g_eli_read_metadata(mp, pp, &md);
995c58794deSPawel Jakub Dawidek 	if (error != 0)
996c58794deSPawel Jakub Dawidek 		return (NULL);
997c58794deSPawel Jakub Dawidek 	gp = NULL;
998c58794deSPawel Jakub Dawidek 
999c58794deSPawel Jakub Dawidek 	if (strcmp(md.md_magic, G_ELI_MAGIC) != 0)
1000c58794deSPawel Jakub Dawidek 		return (NULL);
1001c58794deSPawel Jakub Dawidek 	if (md.md_version > G_ELI_VERSION) {
1002c58794deSPawel Jakub Dawidek 		printf("geom_eli.ko module is too old to handle %s.\n",
1003c58794deSPawel Jakub Dawidek 		    pp->name);
1004c58794deSPawel Jakub Dawidek 		return (NULL);
1005c58794deSPawel Jakub Dawidek 	}
1006c58794deSPawel Jakub Dawidek 	if (md.md_provsize != pp->mediasize)
1007c58794deSPawel Jakub Dawidek 		return (NULL);
1008c58794deSPawel Jakub Dawidek 	/* Should we attach it on boot? */
1009c58794deSPawel Jakub Dawidek 	if ((md.md_flags & G_ELI_FLAG_BOOT) == 0)
1010c58794deSPawel Jakub Dawidek 		return (NULL);
1011c58794deSPawel Jakub Dawidek 	if (md.md_keys == 0x00) {
1012c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(0, "No valid keys on %s.", pp->name);
1013c58794deSPawel Jakub Dawidek 		return (NULL);
1014c58794deSPawel Jakub Dawidek 	}
1015c58794deSPawel Jakub Dawidek 
1016c58794deSPawel Jakub Dawidek 	/*
1017c58794deSPawel Jakub Dawidek 	 * Ask for the passphrase no more than g_eli_tries times.
1018c58794deSPawel Jakub Dawidek 	 */
1019c58794deSPawel Jakub Dawidek 	for (i = 0; i < g_eli_tries; i++) {
1020c58794deSPawel Jakub Dawidek 		printf("Enter passphrase for %s: ", pp->name);
1021c58794deSPawel Jakub Dawidek 		gets(passphrase, sizeof(passphrase), g_eli_visible_passphrase);
1022c58794deSPawel Jakub Dawidek 		KASSERT(md.md_iterations >= 0, ("md_iterations = %d for %s",
1023c58794deSPawel Jakub Dawidek 		    (int)md.md_iterations, pp->name));
1024c58794deSPawel Jakub Dawidek 		/*
1025c58794deSPawel Jakub Dawidek 		 * Prepare Derived-Key from the user passphrase.
1026c58794deSPawel Jakub Dawidek 		 */
1027c58794deSPawel Jakub Dawidek 		g_eli_crypto_hmac_init(&ctx, NULL, 0);
1028c58794deSPawel Jakub Dawidek 		if (md.md_iterations == 0) {
1029c58794deSPawel Jakub Dawidek 			g_eli_crypto_hmac_update(&ctx, md.md_salt,
1030c58794deSPawel Jakub Dawidek 			    sizeof(md.md_salt));
1031c58794deSPawel Jakub Dawidek 			g_eli_crypto_hmac_update(&ctx, passphrase,
1032c58794deSPawel Jakub Dawidek 			    strlen(passphrase));
1033c58794deSPawel Jakub Dawidek 		} else {
1034c58794deSPawel Jakub Dawidek 			u_char dkey[G_ELI_USERKEYLEN];
1035c58794deSPawel Jakub Dawidek 
1036c58794deSPawel Jakub Dawidek 			pkcs5v2_genkey(dkey, sizeof(dkey), md.md_salt,
1037c58794deSPawel Jakub Dawidek 			    sizeof(md.md_salt), passphrase, md.md_iterations);
1038c58794deSPawel Jakub Dawidek 			g_eli_crypto_hmac_update(&ctx, dkey, sizeof(dkey));
1039c58794deSPawel Jakub Dawidek 			bzero(dkey, sizeof(dkey));
1040c58794deSPawel Jakub Dawidek 		}
1041c58794deSPawel Jakub Dawidek 		g_eli_crypto_hmac_final(&ctx, key, 0);
1042c58794deSPawel Jakub Dawidek 
1043c58794deSPawel Jakub Dawidek 		/*
1044c58794deSPawel Jakub Dawidek 		 * Decrypt Master-Key.
1045c58794deSPawel Jakub Dawidek 		 */
1046c58794deSPawel Jakub Dawidek 		error = g_eli_mkey_decrypt(&md, key, mkey, &nkey);
1047c58794deSPawel Jakub Dawidek 		bzero(key, sizeof(key));
1048c58794deSPawel Jakub Dawidek 		if (error == -1) {
1049c58794deSPawel Jakub Dawidek 			if (i == g_eli_tries - 1) {
1050c58794deSPawel Jakub Dawidek 				i++;
1051c58794deSPawel Jakub Dawidek 				break;
1052c58794deSPawel Jakub Dawidek 			}
1053c58794deSPawel Jakub Dawidek 			G_ELI_DEBUG(0, "Wrong key for %s. Tries left: %u.",
1054c58794deSPawel Jakub Dawidek 			    pp->name, g_eli_tries - i - 1);
1055c58794deSPawel Jakub Dawidek 			/* Try again. */
1056c58794deSPawel Jakub Dawidek 			continue;
1057c58794deSPawel Jakub Dawidek 		} else if (error > 0) {
1058c58794deSPawel Jakub Dawidek 			G_ELI_DEBUG(0, "Cannot decrypt Master Key for %s (error=%d).",
1059c58794deSPawel Jakub Dawidek 			    pp->name, error);
1060c58794deSPawel Jakub Dawidek 			return (NULL);
1061c58794deSPawel Jakub Dawidek 		}
1062c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(1, "Using Master Key %u for %s.", nkey, pp->name);
1063c58794deSPawel Jakub Dawidek 		break;
1064c58794deSPawel Jakub Dawidek 	}
1065c58794deSPawel Jakub Dawidek 	if (i == g_eli_tries) {
1066c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(0, "Wrong key for %s. No tries left.", pp->name);
1067c58794deSPawel Jakub Dawidek 		return (NULL);
1068c58794deSPawel Jakub Dawidek 	}
1069c58794deSPawel Jakub Dawidek 
1070c58794deSPawel Jakub Dawidek 	/*
1071c58794deSPawel Jakub Dawidek 	 * We have correct key, let's attach provider.
1072c58794deSPawel Jakub Dawidek 	 */
1073c58794deSPawel Jakub Dawidek 	gp = g_eli_create(NULL, mp, pp, &md, mkey, nkey);
1074c58794deSPawel Jakub Dawidek 	bzero(mkey, sizeof(mkey));
1075c58794deSPawel Jakub Dawidek 	bzero(&md, sizeof(md));
1076c58794deSPawel Jakub Dawidek 	if (gp == NULL) {
1077c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(0, "Cannot create device %s%s.", pp->name,
1078c58794deSPawel Jakub Dawidek 		    G_ELI_SUFFIX);
1079c58794deSPawel Jakub Dawidek 		return (NULL);
1080c58794deSPawel Jakub Dawidek 	}
1081c58794deSPawel Jakub Dawidek 	return (gp);
1082c58794deSPawel Jakub Dawidek }
1083c58794deSPawel Jakub Dawidek 
1084c58794deSPawel Jakub Dawidek static void
1085c58794deSPawel Jakub Dawidek g_eli_dumpconf(struct sbuf *sb, const char *indent, struct g_geom *gp,
1086c58794deSPawel Jakub Dawidek     struct g_consumer *cp, struct g_provider *pp)
1087c58794deSPawel Jakub Dawidek {
1088c58794deSPawel Jakub Dawidek 	struct g_eli_softc *sc;
1089c58794deSPawel Jakub Dawidek 
1090c58794deSPawel Jakub Dawidek 	g_topology_assert();
1091c58794deSPawel Jakub Dawidek 	sc = gp->softc;
1092c58794deSPawel Jakub Dawidek 	if (sc == NULL)
1093c58794deSPawel Jakub Dawidek 		return;
1094c58794deSPawel Jakub Dawidek 	if (pp != NULL || cp != NULL)
1095c58794deSPawel Jakub Dawidek 		return;	/* Nothing here. */
1096ea35a2ecSPawel Jakub Dawidek 	sbuf_printf(sb, "%s<Flags>", indent);
1097ea35a2ecSPawel Jakub Dawidek 	if (sc->sc_flags == 0)
1098ea35a2ecSPawel Jakub Dawidek 		sbuf_printf(sb, "NONE");
1099ea35a2ecSPawel Jakub Dawidek 	else {
1100ea35a2ecSPawel Jakub Dawidek 		int first = 1;
1101ea35a2ecSPawel Jakub Dawidek 
1102ea35a2ecSPawel Jakub Dawidek #define ADD_FLAG(flag, name)	do {					\
1103ea35a2ecSPawel Jakub Dawidek 	if ((sc->sc_flags & (flag)) != 0) {				\
1104ea35a2ecSPawel Jakub Dawidek 		if (!first)						\
1105ea35a2ecSPawel Jakub Dawidek 			sbuf_printf(sb, ", ");				\
1106ea35a2ecSPawel Jakub Dawidek 		else							\
1107ea35a2ecSPawel Jakub Dawidek 			first = 0;					\
1108ea35a2ecSPawel Jakub Dawidek 		sbuf_printf(sb, name);					\
1109ea35a2ecSPawel Jakub Dawidek 	}								\
1110ea35a2ecSPawel Jakub Dawidek } while (0)
1111ea35a2ecSPawel Jakub Dawidek 		ADD_FLAG(G_ELI_FLAG_ONETIME, "ONETIME");
1112ea35a2ecSPawel Jakub Dawidek 		ADD_FLAG(G_ELI_FLAG_BOOT, "BOOT");
1113ea35a2ecSPawel Jakub Dawidek 		ADD_FLAG(G_ELI_FLAG_WO_DETACH, "W-DETACH");
1114ea35a2ecSPawel Jakub Dawidek 		ADD_FLAG(G_ELI_FLAG_RW_DETACH, "RW-DETACH");
1115ea35a2ecSPawel Jakub Dawidek 		ADD_FLAG(G_ELI_FLAG_WOPEN, "W-OPEN");
1116ea35a2ecSPawel Jakub Dawidek 		ADD_FLAG(G_ELI_FLAG_DESTROY, "DESTROY");
1117ea35a2ecSPawel Jakub Dawidek #undef  ADD_FLAG
1118ea35a2ecSPawel Jakub Dawidek 	}
1119ea35a2ecSPawel Jakub Dawidek 	sbuf_printf(sb, "</Flags>\n");
1120ea35a2ecSPawel Jakub Dawidek 
1121ea35a2ecSPawel Jakub Dawidek 	if ((sc->sc_flags & G_ELI_FLAG_ONETIME) == 0) {
1122ea35a2ecSPawel Jakub Dawidek 		sbuf_printf(sb, "%s<UsedKey>%u</UsedKey>\n", indent,
1123ea35a2ecSPawel Jakub Dawidek 		    sc->sc_nkey);
1124ea35a2ecSPawel Jakub Dawidek 	}
1125c58794deSPawel Jakub Dawidek 	sbuf_printf(sb, "%s<Crypto>", indent);
1126c58794deSPawel Jakub Dawidek 	switch (sc->sc_crypto) {
1127c58794deSPawel Jakub Dawidek 	case G_ELI_CRYPTO_HW:
1128c58794deSPawel Jakub Dawidek 		sbuf_printf(sb, "hardware");
1129c58794deSPawel Jakub Dawidek 		break;
1130c58794deSPawel Jakub Dawidek 	case G_ELI_CRYPTO_SW:
1131c58794deSPawel Jakub Dawidek 		sbuf_printf(sb, "software");
1132c58794deSPawel Jakub Dawidek 		break;
1133c58794deSPawel Jakub Dawidek 	default:
1134c58794deSPawel Jakub Dawidek 		sbuf_printf(sb, "UNKNOWN");
1135c58794deSPawel Jakub Dawidek 		break;
1136c58794deSPawel Jakub Dawidek 	}
1137c58794deSPawel Jakub Dawidek 	sbuf_printf(sb, "</Crypto>\n");
1138ea35a2ecSPawel Jakub Dawidek 	sbuf_printf(sb, "%s<KeyLength>%u</KeyLength>\n", indent, sc->sc_keylen);
1139ea35a2ecSPawel Jakub Dawidek 	sbuf_printf(sb, "%s<Cipher>%s</Cipher>\n", indent,
1140ea35a2ecSPawel Jakub Dawidek 	    g_eli_algo2str(sc->sc_algo));
1141c58794deSPawel Jakub Dawidek }
1142c58794deSPawel Jakub Dawidek 
1143c58794deSPawel Jakub Dawidek static void
1144c58794deSPawel Jakub Dawidek g_eli_on_boot_start(void *dummy __unused)
1145c58794deSPawel Jakub Dawidek {
1146c58794deSPawel Jakub Dawidek 
1147c58794deSPawel Jakub Dawidek 	/* This prevents from tasting when module is loaded after boot. */
1148c58794deSPawel Jakub Dawidek 	if (cold) {
1149c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(1, "Start tasting.");
1150c58794deSPawel Jakub Dawidek 		g_eli_do_taste = 1;
1151c58794deSPawel Jakub Dawidek 	} else {
1152c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(1, "Tasting not started.");
1153c58794deSPawel Jakub Dawidek 	}
1154c58794deSPawel Jakub Dawidek }
1155c58794deSPawel Jakub Dawidek SYSINIT(geli_boot_start, SI_SUB_TUNABLES, SI_ORDER_ANY, g_eli_on_boot_start, NULL)
1156c58794deSPawel Jakub Dawidek 
1157c58794deSPawel Jakub Dawidek static void
1158c58794deSPawel Jakub Dawidek g_eli_on_boot_end(void *dummy __unused)
1159c58794deSPawel Jakub Dawidek {
1160c58794deSPawel Jakub Dawidek 
1161c58794deSPawel Jakub Dawidek 	if (g_eli_do_taste) {
1162c58794deSPawel Jakub Dawidek 		G_ELI_DEBUG(1, "Tasting no more.");
1163c58794deSPawel Jakub Dawidek 		g_eli_do_taste = 0;
1164c58794deSPawel Jakub Dawidek 	}
1165c58794deSPawel Jakub Dawidek }
1166c58794deSPawel Jakub Dawidek SYSINIT(geli_boot_end, SI_SUB_RUN_SCHEDULER, SI_ORDER_ANY, g_eli_on_boot_end, NULL)
1167c58794deSPawel Jakub Dawidek 
1168c58794deSPawel Jakub Dawidek DECLARE_GEOM_CLASS(g_eli_class, g_eli);
1169c58794deSPawel Jakub Dawidek MODULE_DEPEND(geom_eli, crypto, 1, 1, 1);
1170c58794deSPawel Jakub Dawidek MODULE_DEPEND(geom_eli, cryptodev, 1, 1, 1);
1171