xref: /titanic_41/usr/src/cmd/rcm_daemon/common/svm_rcm.c (revision eef1c0f44cd22770cc506dadb89d71aab3c071e3)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #pragma ident	"%Z%%M%	%I%	%E% SMI"
27 
28 #include <stdlib.h>
29 #include <stdio.h>
30 #include <string.h>
31 #include <sys/types.h>
32 #include <errno.h>
33 #include <meta.h>
34 #include <sys/lvm/mdio.h>
35 #include <sys/lvm/md_sp.h>
36 #include <sdssc.h>
37 
38 #include "rcm_module.h"
39 
40 /*
41  * This module is the RCM Module for SVM. The policy adopted by this module
42  * is to block offline requests for any SVM resource that is in use. A
43  * resource is considered to be in use if it contains a metadb or if it is
44  * a non-errored component of a metadevice that is open.
45  *
46  * The module uses the library libmeta to access the current state of the
47  * metadevices. On entry, and when svm_register() is called, the module
48  * builds a cache of all of the SVM resources and their dependencies. Each
49  * metadevice has an entry of type deventry_t which is accessed by a hash
50  * function. When the cache is built each SVM resource is registered with
51  * the RCM framework.  The check_device code path uses meta_invalidate_name to
52  * ensure that the caching in libmeta will not conflict with the cache
53  * we build within this code.
54  *
55  * When an RCM operation occurs that affects a registered SVM resource, the RCM
56  * framework will call the appropriate routine in this module. The cache
57  * entry will be found and if the resource has dependants, a callback will
58  * be made into the RCM framework to pass the request on to the dependants,
59  * which may themselves by SVM resources.
60  *
61  * Locking:
62  *      The cache is protected by a mutex
63  */
64 
65 /*
66  * Private constants
67  */
68 
69 /*
70  * Generic Messages
71  */
72 #define	MSG_UNRECOGNIZED	gettext("SVM: \"%s\" is not a SVM resource")
73 #define	MSG_NODEPS		gettext("SVM: can't find dependents")
74 #define	MSG_NORECACHE		gettext("SVM: WARNING: couldn't re-cache.")
75 #define	MSG_OPENERR		gettext("SVM: can't open \"%s\"")
76 #define	MSG_CACHEFAIL		gettext("SVM: can't malloc cache")
77 
78 #define	ERR_UNRECOGNIZED	gettext("unrecognized SVM resource")
79 #define	ERR_NODEPS		gettext("can't find SVM resource dependents")
80 
81 /*
82  * Macros to produce a quoted string containing the value of a preprocessor
83  * macro. For example, if SIZE is defined to be 256, VAL2STR(SIZE) is "256".
84  * This is used to construct format strings for scanf-family functions below.
85  */
86 #define	QUOTE(x)	#x
87 #define	VAL2STR(x)	QUOTE(x)
88 
89 typedef enum {
90     SVM_SLICE = 0,
91     SVM_STRIPE,
92     SVM_CONCAT,
93     SVM_MIRROR,
94     SVM_RAID,
95     SVM_TRANS,
96     SVM_SOFTPART,
97     SVM_HS
98 } svm_type_t;
99 
100 /* Hash table parameters */
101 #define	HASH_DEFAULT	251
102 
103 /* Hot spare pool users */
104 typedef struct hspuser {
105 	struct hspuser  *next;		/* next user */
106 	char		*hspusername;	/* name */
107 	dev_t		hspuserkey;	/* key */
108 } hspuser_t;
109 
110 /* Hot spare pool entry */
111 typedef struct hspentry {
112 	struct hspentry *link;		/* link through all hsp entries */
113 	struct hspentry *next;		/* next hsp entry for a slice */
114 	char		*hspname;	/* name */
115 	hspuser_t	*hspuser;	/* first hsp user */
116 } hspentry_t;
117 
118 /* Hash table entry */
119 typedef struct deventry {
120 	struct deventry		*next;		/* next entry with same hash */
121 	svm_type_t		devtype;	/* device type */
122 	dev_t			devkey;		/* key */
123 	char			*devname;	/* name in /dev */
124 	char			*devicesname;	/* name in /devices */
125 	struct deventry		*dependent;	/* 1st dependent */
126 	struct deventry		*next_dep;	/* next dependent */
127 	struct deventry		*antecedent;	/* antecedent */
128 	hspentry_t		*hsp_list;	/* list of hot spare pools */
129 	int			flags;		/* flags */
130 } deventry_t;
131 
132 /* flag values */
133 #define	 REMOVED	0x1
134 #define	 IN_HSP		0x2
135 #define	 TRANS_LOG	0x4
136 #define	 CONT_SOFTPART	0x8
137 #define	 CONT_METADB	0x10
138 
139 /*
140  * Device redundancy flags. If the device can be removed from the
141  * metadevice configuration then it is considered a redundant device,
142  * otherwise not.
143  */
144 #define	NOTINDEVICE	-1
145 #define	NOTREDUNDANT	0
146 #define	REDUNDANT	1
147 
148 /* Cache */
149 typedef struct cache {
150 	deventry_t	**hashline;	/* hash table */
151 	int32_t		size;		/* sizer of hash table */
152 	uint32_t	registered;	/* cache regsitered */
153 } cache_t;
154 
155 /*
156  * Forward declarations of private functions
157  */
158 
159 static int svm_register(rcm_handle_t *hd);
160 static int svm_unregister(rcm_handle_t *hd);
161 static int svm_unregister_device(rcm_handle_t *hd, deventry_t *d);
162 static deventry_t *cache_dependent(cache_t *cache, char *devname, int devflags,
163     deventry_t *dependents);
164 static deventry_t *cache_device(cache_t *cache, char *devname,
165     svm_type_t devtype, md_dev64_t devkey, int devflags);
166 static hspentry_t *find_hsp(char *hspname);
167 static hspuser_t *add_hsp_user(char *hspname, deventry_t *deventry);
168 static hspentry_t *add_hsp(char *hspname, deventry_t *deventry);
169 static void free_names(mdnamelist_t *nlp);
170 static int cache_all_devices(cache_t *cache);
171 static int cache_hsp(cache_t *cache, mdhspnamelist_t *nlp, md_hsp_t *hsp);
172 static int cache_trans(cache_t *cache, mdnamelist_t *nlp, md_trans_t *trans);
173 static int cache_mirror(cache_t *cache, mdnamelist_t *nlp,
174     md_mirror_t *mirror);
175 static int cache_raid(cache_t *cache, mdnamelist_t *nlp, md_raid_t *raid);
176 static int cache_stripe(cache_t *cache, mdnamelist_t *nlp,
177     md_stripe_t *stripe);
178 static int cache_sp(cache_t *cache, mdnamelist_t *nlp, md_sp_t *soft_part);
179 static int cache_all_devices_in_set(cache_t *cache, mdsetname_t *sp);
180 static cache_t  *create_cache();
181 static deventry_t *create_deventry(char *devname, svm_type_t devtype,
182     md_dev64_t devkey, int devflags);
183 static void cache_remove(cache_t *cache, deventry_t *deventry);
184 static deventry_t *cache_lookup(cache_t *cache, char *devname);
185 static void cache_sync(rcm_handle_t *hd, cache_t **cachep);
186 static char *cache_walk(cache_t *cache, uint32_t *i, deventry_t **hashline);
187 static void free_cache(cache_t **cache);
188 static void free_deventry(deventry_t **deventry);
189 static uint32_t hash(uint32_t h, char *s);
190 static void svm_register_device(rcm_handle_t *hd, char *devname);
191 static int add_dep(int *ndeps, char ***depsp, deventry_t *deventry);
192 static int get_dependents(deventry_t *deventry, char *** dependentsp);
193 char *add_to_usage(char ** usagep, char *string);
194 char *add_to_usage_fmt(char **usagep, char *fmt, char *string);
195 static int is_open(dev_t devkey);
196 static int svm_offline(rcm_handle_t *hd, char *rsrc, id_t id, uint_t flags,
197     char **errorp, rcm_info_t **infop);
198 static int svm_online(rcm_handle_t *hd, char *rsrc, id_t id, uint_t flags,
199     char **errorp, rcm_info_t **infop);
200 static int svm_get_info(rcm_handle_t *hd, char *rsrc, id_t id, uint_t flags,
201     char **usagep, char **errorp, nvlist_t *props, rcm_info_t **infop);
202 static int svm_suspend(rcm_handle_t *hd, char *rsrc, id_t id,
203     timespec_t *interval, uint_t flags, char **errorp,
204     rcm_info_t **infop);
205 static int svm_resume(rcm_handle_t *hd, char *rsrc, id_t id, uint_t flags,
206     char **errorp, rcm_info_t **infop);
207 static int svm_remove(rcm_handle_t *hd, char *rsrc, id_t id, uint_t flags,
208     char **errorp, rcm_info_t **infop);
209 static int check_device(deventry_t *deventry);
210 static int check_mirror(mdsetname_t *sp, mdname_t *np, md_error_t *ep);
211 
212 /*
213  * Module-Private data
214  */
215 static struct rcm_mod_ops svm_ops =
216 {
217 	RCM_MOD_OPS_VERSION,
218 	svm_register,
219 	svm_unregister,
220 	svm_get_info,
221 	svm_suspend,
222 	svm_resume,
223 	svm_offline,
224 	svm_online,
225 	svm_remove,
226 	NULL,
227 	NULL,
228 	NULL
229 };
230 
231 static cache_t *svm_cache = NULL;
232 static mutex_t svm_cache_lock;
233 static hspentry_t *hsp_head = NULL;
234 
235 /*
236  * Module Interface Routines
237  */
238 
239 /*
240  *      rcm_mod_init()
241  *
242  *      Create a cache, and return the ops structure.
243  *      Input: None
244  *      Return: rcm_mod_ops structure
245  */
246 struct rcm_mod_ops *
247 rcm_mod_init()
248 {
249 	/* initialize the lock mutex */
250 	if (mutex_init(&svm_cache_lock, USYNC_THREAD, NULL)) {
251 		rcm_log_message(RCM_ERROR,
252 		    gettext("SVM: can't init mutex"));
253 		return (NULL);
254 	}
255 
256 	/* need to initialize the cluster library to avoid seg faults */
257 	if (sdssc_bind_library() == SDSSC_ERROR) {
258 		rcm_log_message(RCM_ERROR,
259 			gettext("SVM: Interface error with libsds_sc.so,"
260 			    " aborting."));
261 		return (NULL);
262 	}
263 
264 	/* Create a cache */
265 	if ((svm_cache = create_cache()) == NULL) {
266 		rcm_log_message(RCM_ERROR,
267 			gettext("SVM: module can't function, aborting."));
268 		return (NULL);
269 	}
270 
271 	/* Return the ops vectors */
272 	return (&svm_ops);
273 }
274 
275 /*
276  *	rcm_mod_info()
277  *
278  *	Return a string describing this module.
279  *	Input: None
280  *	Return: String
281  *	Locking: None
282  */
283 const char *
284 rcm_mod_info()
285 {
286 	return (gettext("Solaris Volume Manager module %I%"));
287 }
288 
289 /*
290  *	rcm_mod_fini()
291  *
292  *	Destroy the cache and mutex
293  *	Input: None
294  *	Return: RCM_SUCCESS
295  *	Locking: None
296  */
297 int
298 rcm_mod_fini()
299 {
300 	(void) mutex_lock(&svm_cache_lock);
301 	if (svm_cache) {
302 		free_cache(&svm_cache);
303 	}
304 	(void) mutex_unlock(&svm_cache_lock);
305 	(void) mutex_destroy(&svm_cache_lock);
306 	return (RCM_SUCCESS);
307 }
308 
309 /*
310  *	svm_register()
311  *
312  *	Make sure the cache is properly sync'ed, and its registrations are in
313  *	order.
314  *
315  *	Input:
316  *		rcm_handle_t	*hd
317  *	Return:
318  *		RCM_SUCCESS
319  *      Locking: the cache is locked throughout the execution of this routine
320  *      because it reads and possibly modifies cache links continuously.
321  */
322 static int
323 svm_register(rcm_handle_t *hd)
324 {
325 	uint32_t i = 0;
326 	deventry_t *l = NULL;
327 	char    *devicename;
328 
329 
330 	rcm_log_message(RCM_TRACE1, "SVM: register\n");
331 	/* Guard against bad arguments */
332 	assert(hd != NULL);
333 
334 	/* Lock the cache */
335 	(void) mutex_lock(&svm_cache_lock);
336 
337 	/* If the cache has already been registered, then just sync it.  */
338 	if (svm_cache && svm_cache->registered) {
339 		cache_sync(hd, &svm_cache);
340 		(void) mutex_unlock(&svm_cache_lock);
341 		return (RCM_SUCCESS);
342 	}
343 
344 	/* If not, register the whole cache and mark it as registered. */
345 	while ((devicename = cache_walk(svm_cache, &i, &l)) != NULL) {
346 			svm_register_device(hd, devicename);
347 	}
348 	svm_cache->registered = 1;
349 
350 	/* Unlock the cache */
351 	(void) mutex_unlock(&svm_cache_lock);
352 
353 	return (RCM_SUCCESS);
354 }
355 
356 /*
357  *	svm_unregister()
358  *
359  *	Manually walk through the cache, unregistering all the special files and
360  *	mount points.
361  *
362  *	Input:
363  *		rcm_handle_t	*hd
364  *	Return:
365  *		RCM_SUCCESS
366  *      Locking: the cache is locked throughout the execution of this routine
367  *      because it reads and modifies cache links continuously.
368  */
369 static int
370 svm_unregister(rcm_handle_t *hd)
371 {
372 	deventry_t *l = NULL;
373 	uint32_t i = 0;
374 
375 	rcm_log_message(RCM_TRACE1, "SVM: unregister\n");
376 	/* Guard against bad arguments */
377 	assert(hd != NULL);
378 
379 	/* Walk the cache, unregistering everything */
380 	(void) mutex_lock(&svm_cache_lock);
381 	if (svm_cache != NULL) {
382 		while (cache_walk(svm_cache, &i, &l) != NULL) {
383 			(void) svm_unregister_device(hd, l);
384 		}
385 		svm_cache->registered = 0;
386 	}
387 	(void) mutex_unlock(&svm_cache_lock);
388 	return (RCM_SUCCESS);
389 }
390 
391 /*
392  *      svm_offline()
393  *
394  *      Determine dependents of the resource being offlined, and offline
395  *      them all.
396  *
397  *      Input:
398  *		rcm_handle_t	*hd		handle
399  *		char*		*rsrc		resource name
400  *		id_t		id		0
401  *		char		**errorp	ptr to error message
402  *		rcm_info_t	**infop		ptr to info string
403  *      Output:
404  *		char		**errorp	pass back error message
405  *      Return:
406  *		int		RCM_SUCCESS or RCM_FAILURE
407  *      Locking: the cache is locked for most of this routine, except while
408  *      processing dependents.
409  */
410 /*ARGSUSED*/
411 static int
412 svm_offline(rcm_handle_t *hd, char *rsrc, id_t id, uint_t flags,
413     char **errorp, rcm_info_t **infop)
414 {
415 	int		rv = RCM_SUCCESS;
416 	int		ret;
417 	char		**dependents;
418 	deventry_t	*deventry;
419 	hspentry_t	*hspentry;
420 	hspuser_t	*hspuser;
421 
422 	/* Guard against bad arguments */
423 	assert(hd != NULL);
424 	assert(rsrc != NULL);
425 	assert(id == (id_t)0);
426 	assert(errorp != NULL);
427 
428 	/* Trace */
429 	rcm_log_message(RCM_TRACE1, "SVM: offline(%s), flags(%d)\n",
430 	    rsrc, flags);
431 
432 	/* Lock the cache */
433 	(void) mutex_lock(&svm_cache_lock);
434 
435 	/* Lookup the resource in the cache. */
436 	if ((deventry = cache_lookup(svm_cache, rsrc)) == NULL) {
437 		rcm_log_message(RCM_ERROR, MSG_UNRECOGNIZED);
438 		*errorp = strdup(ERR_UNRECOGNIZED);
439 		(void) mutex_unlock(&svm_cache_lock);
440 		rv = RCM_FAILURE;
441 		rcm_log_message(RCM_TRACE1, "SVM: svm_offline(%s) exit %d\n",
442 		    rsrc, rv);
443 		return (rv);
444 	}
445 	/* If it is a TRANS device, do not allow the offline */
446 	if (deventry->devtype == SVM_TRANS) {
447 		rv = RCM_FAILURE;
448 		(void) mutex_unlock(&svm_cache_lock);
449 		goto exit;
450 	}
451 
452 	if (deventry->flags&IN_HSP) {
453 		/*
454 		 * If this is in a hot spare pool, check to see
455 		 * if any of the hot spare pool users are open
456 		 */
457 		hspentry = deventry->hsp_list;
458 		while (hspentry) {
459 			hspuser = hspentry->hspuser;
460 			while (hspuser) {
461 				/* Check if open */
462 				if (is_open(hspuser->hspuserkey)) {
463 					rv = RCM_FAILURE;
464 					(void) mutex_unlock(&svm_cache_lock);
465 					goto exit;
466 				}
467 				hspuser = hspuser->next;
468 			}
469 			hspentry = hspentry->next;
470 		}
471 	}
472 
473 	/* Fail if the device contains a metadb replica */
474 	if (deventry->flags&CONT_METADB) {
475 		/*
476 		 * The user should delete the replica before continuing,
477 		 * so force the error.
478 		 */
479 		rcm_log_message(RCM_TRACE1, "SVM: %s has a replica\n",
480 		    deventry->devname);
481 		rv = RCM_FAILURE;
482 		(void) mutex_unlock(&svm_cache_lock);
483 		goto exit;
484 	}
485 
486 	/* Get dependents */
487 	if (get_dependents(deventry, &dependents) != 0) {
488 		rcm_log_message(RCM_ERROR, MSG_NODEPS);
489 		rv = RCM_FAILURE;
490 		(void) mutex_unlock(&svm_cache_lock);
491 		goto exit;
492 	}
493 
494 	if (dependents) {
495 		/* Check if the device is broken (needs maintanence). */
496 		if (check_device(deventry) == REDUNDANT) {
497 			/*
498 			 * The device is broken, the offline request should
499 			 * succeed, so ignore any of the dependents.
500 			 */
501 			rcm_log_message(RCM_TRACE1,
502 			    "SVM: ignoring dependents\n");
503 			(void) mutex_unlock(&svm_cache_lock);
504 			free(dependents);
505 			goto exit;
506 		}
507 		(void) mutex_unlock(&svm_cache_lock);
508 		ret = rcm_request_offline_list(hd, dependents, flags, infop);
509 		if (ret != RCM_SUCCESS) {
510 			rv = ret;
511 		}
512 		free(dependents);
513 	} else {
514 		/* If no dependents, check if the metadevice is open */
515 		if ((deventry->devkey) && (is_open(deventry->devkey))) {
516 			rv = RCM_FAILURE;
517 			(void) mutex_unlock(&svm_cache_lock);
518 			goto exit;
519 		}
520 		(void) mutex_unlock(&svm_cache_lock);
521 	}
522 exit:
523 	rcm_log_message(RCM_TRACE1, "SVM: svm_offline(%s) exit %d\n", rsrc, rv);
524 	if (rv != RCM_SUCCESS)
525 		*errorp = strdup(gettext("unable to offline"));
526 	return (rv);
527 }
528 
529 /*
530  *      svm_online()
531  *
532  *      Just pass the online notification on to the dependents of this resource
533  *
534  *      Input:
535  *		rcm_handle_t	*hd		handle
536  *		char*		*rsrc		resource name
537  *		id_t		id		0
538  *		char		**errorp	ptr to error message
539  *		rcm_info_t	**infop		ptr to info string
540  *      Output:
541  *		char		**errorp	pass back error message
542  *      Return:
543  *		int		RCM_SUCCESS or RCM_FAILURE
544  *      Locking: the cache is locked for most of this routine, except while
545  *      processing dependents.
546  */
547 /*ARGSUSED*/
548 static int
549 svm_online(rcm_handle_t *hd, char *rsrc, id_t id, uint_t flags, char **errorp,
550     rcm_info_t **infop)
551 {
552 	int		rv = RCM_SUCCESS;
553 	char		**dependents;
554 	deventry_t	*deventry;
555 
556 	/* Guard against bad arguments */
557 	assert(hd != NULL);
558 	assert(rsrc != NULL);
559 	assert(id == (id_t)0);
560 
561 	/* Trace */
562 	rcm_log_message(RCM_TRACE1, "SVM: online(%s)\n", rsrc);
563 
564 	/* Lookup this resource in the cache (cache gets locked) */
565 	(void) mutex_lock(&svm_cache_lock);
566 	deventry = cache_lookup(svm_cache, rsrc);
567 	if (deventry == NULL) {
568 		(void) mutex_unlock(&svm_cache_lock);
569 		rcm_log_message(RCM_ERROR, MSG_UNRECOGNIZED, rsrc);
570 		*errorp = strdup(ERR_UNRECOGNIZED);
571 		return (RCM_FAILURE);
572 	}
573 
574 	/* Get dependents */
575 	if (get_dependents(deventry, &dependents) != 0) {
576 		(void) mutex_unlock(&svm_cache_lock);
577 		rcm_log_message(RCM_ERROR, MSG_NODEPS);
578 		*errorp = strdup(ERR_NODEPS);
579 		return (RCM_FAILURE);
580 	}
581 	(void) mutex_unlock(&svm_cache_lock);
582 
583 	if (dependents) {
584 		rv = rcm_notify_online_list(hd, dependents, flags, infop);
585 		if (rv != RCM_SUCCESS)
586 			*errorp = strdup(gettext("unable to online"));
587 		free(dependents);
588 	}
589 
590 	return (rv);
591 }
592 
593 /*
594  *      svm_get_info()
595  *
596  *      Gather usage information for this resource.
597  *
598  *      Input:
599  *		rcm_handle_t	*hd		handle
600  *		char*		*rsrc		resource name
601  *		id_t		id		0
602  *		char		**errorp	ptr to error message
603  *		nvlist_t	*props		Not used
604  *		rcm_info_t	**infop		ptr to info string
605  *      Output:
606  *		char		**infop		pass back info string
607  *      Return:
608  *		int		RCM_SUCCESS or RCM_FAILURE
609  *      Locking: the cache is locked  throughout the whole function
610  */
611 /*ARGSUSED*/
612 static int
613 svm_get_info(rcm_handle_t *hd, char *rsrc, id_t id, uint_t flags, char **usagep,
614     char **errorp, nvlist_t *props, rcm_info_t **infop)
615 {
616 	int 		rv = RCM_SUCCESS;
617 	deventry_t	*deventry;
618 	deventry_t	*dependent;
619 	hspentry_t	*hspentry;
620 	char		**dependents;
621 
622 	/* Guard against bad arguments */
623 	assert(hd != NULL);
624 	assert(rsrc != NULL);
625 	assert(id == (id_t)0);
626 	assert(usagep != NULL);
627 	assert(errorp != NULL);
628 
629 	/* Trace */
630 	rcm_log_message(RCM_TRACE1, "SVM: get_info(%s)\n", rsrc);
631 
632 	/* Lookup this resource in the cache (cache gets locked) */
633 	(void) mutex_lock(&svm_cache_lock);
634 	deventry = cache_lookup(svm_cache, rsrc);
635 	if (deventry == NULL) {
636 		(void) mutex_unlock(&svm_cache_lock);
637 		rcm_log_message(RCM_ERROR, MSG_UNRECOGNIZED, rsrc);
638 		*errorp = strdup(ERR_UNRECOGNIZED);
639 		return (RCM_FAILURE);
640 	}
641 
642 	*usagep = NULL; /* Initialise usage string */
643 	if (deventry->flags&CONT_METADB) {
644 		*usagep = add_to_usage(usagep, gettext("contains metadb(s)"));
645 	}
646 	if (deventry->flags&CONT_SOFTPART) {
647 		*usagep = add_to_usage(usagep,
648 		    gettext("contains soft partition(s)"));
649 	}
650 	if (deventry->devtype == SVM_SOFTPART) {
651 		*usagep = add_to_usage_fmt(usagep,
652 		    gettext("soft partition based on \"%s\""),
653 		    deventry->antecedent->devname);
654 	}
655 
656 	if (deventry->flags&IN_HSP) {
657 		int	hspflag = 0;
658 		hspentry = deventry->hsp_list;
659 		while (hspentry) {
660 			if (hspflag == 0) {
661 				*usagep = add_to_usage(usagep,
662 				    gettext("member of hot spare pool"));
663 				hspflag = 1;
664 			}
665 			*usagep = add_to_usage_fmt(usagep, "\"%s\"",
666 			    hspentry->hspname);
667 			hspentry = hspentry->next;
668 		}
669 	} else {
670 		dependent = deventry->dependent;
671 		while (dependent) {
672 			/* Resource has dependents */
673 			switch (dependent->devtype) {
674 			case SVM_STRIPE:
675 				*usagep = add_to_usage_fmt(usagep,
676 				    gettext("component of stripe \"%s\""),
677 				    dependent->devname);
678 				break;
679 			case SVM_CONCAT:
680 				*usagep = add_to_usage_fmt(usagep,
681 				    gettext("component of concat \"%s\""),
682 				    dependent->devname);
683 				break;
684 			case SVM_MIRROR:
685 				*usagep = add_to_usage_fmt(usagep,
686 				    gettext("submirror of \"%s\""),
687 				    dependent->devname);
688 				break;
689 			case SVM_RAID:
690 				*usagep = add_to_usage_fmt(usagep,
691 				    gettext("component of RAID \"%s\""),
692 				    dependent->devname);
693 				break;
694 			case SVM_TRANS:
695 				if (deventry->flags&TRANS_LOG) {
696 					*usagep = add_to_usage_fmt(usagep,
697 					    gettext("trans log for \"%s\""),
698 					    dependent->devname);
699 				} else {
700 					*usagep = add_to_usage_fmt(usagep,
701 					    gettext("trans master for \"%s\""),
702 					    dependent->devname);
703 				}
704 				break;
705 			case SVM_SOFTPART:
706 				/* Contains soft parts, already processed */
707 				break;
708 			default:
709 				rcm_log_message(RCM_ERROR,
710 				    gettext("Unknown type %d\n"),
711 				    dependent->devtype);
712 			}
713 			dependent = dependent->next_dep;
714 		}
715 	}
716 
717 	/* Get dependents  and recurse if necessary */
718 	if (get_dependents(deventry, &dependents) != 0) {
719 		(void) mutex_unlock(&svm_cache_lock);
720 		rcm_log_message(RCM_ERROR, MSG_NODEPS);
721 		*errorp = strdup(ERR_NODEPS);
722 		return (RCM_FAILURE);
723 	}
724 	(void) mutex_unlock(&svm_cache_lock);
725 
726 	if ((flags & RCM_INCLUDE_DEPENDENT) && (dependents != NULL)) {
727 		rv = rcm_get_info_list(hd, dependents, flags, infop);
728 		if (rv != RCM_SUCCESS)
729 			*errorp = strdup(gettext("unable to get info"));
730 	}
731 	free(dependents);
732 
733 	if (*usagep != NULL)
734 		rcm_log_message(RCM_TRACE1, "SVM: usage = %s\n", *usagep);
735 	return (rv);
736 }
737 
738 /*
739  *      svm_suspend()
740  *
741  *      Notify all dependents that the resource is being suspended.
742  *      Since no real operation is involved, QUERY or not doesn't matter.
743  *
744  *      Input:
745  *		rcm_handle_t	*hd		handle
746  *		char*		*rsrc		resource name
747  *		id_t		id		0
748  *		char		**errorp	ptr to error message
749  *		rcm_info_t	**infop		ptr to info string
750  *      Output:
751  *		char		**errorp	pass back error message
752  *      Return:
753  *		int		RCM_SUCCESS or RCM_FAILURE
754  *      Locking: the cache is locked for most of this routine, except while
755  *      processing dependents.
756  */
757 static int
758 svm_suspend(rcm_handle_t *hd, char *rsrc, id_t id, timespec_t *interval,
759     uint_t flags, char **errorp, rcm_info_t **infop)
760 {
761 	int		rv = RCM_SUCCESS;
762 	deventry_t	*deventry;
763 	char		**dependents;
764 
765 	/* Guard against bad arguments */
766 	assert(hd != NULL);
767 	assert(rsrc != NULL);
768 	assert(id == (id_t)0);
769 	assert(interval != NULL);
770 	assert(errorp != NULL);
771 
772 	/* Trace */
773 	rcm_log_message(RCM_TRACE1, "SVM: suspend(%s)\n", rsrc);
774 
775 	/* Lock the cache and extract information about this resource.  */
776 	(void) mutex_lock(&svm_cache_lock);
777 	if ((deventry = cache_lookup(svm_cache, rsrc)) == NULL) {
778 		(void) mutex_unlock(&svm_cache_lock);
779 		rcm_log_message(RCM_ERROR, MSG_UNRECOGNIZED, rsrc);
780 		*errorp = strdup(ERR_UNRECOGNIZED);
781 		return (RCM_SUCCESS);
782 	}
783 
784 	/* Get dependents */
785 	if (get_dependents(deventry, &dependents) != 0) {
786 		(void) mutex_unlock(&svm_cache_lock);
787 		rcm_log_message(RCM_ERROR, MSG_NODEPS);
788 		*errorp = strdup(ERR_NODEPS);
789 		return (RCM_FAILURE);
790 	}
791 	(void) mutex_unlock(&svm_cache_lock);
792 
793 	if (dependents) {
794 		rv = rcm_request_suspend_list(hd, dependents, flags,
795 		    interval, infop);
796 		if (rv != RCM_SUCCESS)
797 			*errorp = strdup(gettext("unable to suspend"));
798 		free(dependents);
799 	}
800 
801 	return (rv);
802 }
803 
804 /*
805  *      svm_resume()
806  *
807  *      Notify all dependents that the resource is being resumed.
808  *
809  *      Input:
810  *		rcm_handle_t	*hd		handle
811  *		char*		*rsrc		resource name
812  *		id_t		id		0
813  *		char		**errorp	ptr to error message
814  *		rcm_info_t	**infop		ptr to info string
815  *      Output:
816  *		char		**errorp	pass back error message
817  *      Return:
818  *		int		RCM_SUCCESS or RCM_FAILURE
819  *      Locking: the cache is locked for most of this routine, except while
820  *      processing dependents.
821  *
822  */
823 static int
824 svm_resume(rcm_handle_t *hd, char *rsrc, id_t id, uint_t flags, char **errorp,
825     rcm_info_t **infop)
826 {
827 	int		rv = RCM_SUCCESS;
828 	deventry_t	*deventry;
829 	char		**dependents;
830 
831 	/* Guard against bad arguments */
832 	assert(hd != NULL);
833 	assert(rsrc != NULL);
834 	assert(id == (id_t)0);
835 	assert(errorp != NULL);
836 
837 	/* Trace */
838 	rcm_log_message(RCM_TRACE1, "SVM: resume(%s)\n", rsrc);
839 
840 	/*
841 	 * Lock the cache just long enough to extract information about this
842 	 * resource.
843 	 */
844 	(void) mutex_lock(&svm_cache_lock);
845 	if ((deventry = cache_lookup(svm_cache, rsrc)) == NULL) {
846 		(void) mutex_unlock(&svm_cache_lock);
847 		rcm_log_message(RCM_ERROR, MSG_UNRECOGNIZED, rsrc);
848 		*errorp = strdup(ERR_UNRECOGNIZED);
849 		return (RCM_SUCCESS);
850 	}
851 
852 	/* Get dependents */
853 
854 	if (get_dependents(deventry, &dependents) != 0) {
855 		(void) mutex_unlock(&svm_cache_lock);
856 		rcm_log_message(RCM_ERROR, MSG_NODEPS);
857 		*errorp = strdup(ERR_NODEPS);
858 		return (RCM_FAILURE);
859 	}
860 
861 	(void) mutex_unlock(&svm_cache_lock);
862 	if (dependents) {
863 		rv = rcm_notify_resume_list(hd, dependents, flags, infop);
864 		if (rv != RCM_SUCCESS)
865 			*errorp = strdup(gettext("unable to resume"));
866 		free(dependents);
867 	}
868 
869 	return (rv);
870 }
871 
872 
873 /*
874  *	svm_remove()
875  *
876  *      Remove the resource from the cache and notify all dependents that
877  *      the resource has been removed.
878  *
879  *      Input:
880  *		rcm_handle_t	*hd		handle
881  *		char*		*rsrc		resource name
882  *		id_t		id		0
883  *		char		**errorp	ptr to error message
884  *		rcm_info_t	**infop		ptr to info string
885  *      Output:
886  *		char		**errorp	pass back error message
887  *      Return:
888  *		int		RCM_SUCCESS or RCM_FAILURE
889  *      Locking: the cache is locked for most of this routine, except while
890  *      processing dependents.
891  */
892 static int
893 svm_remove(rcm_handle_t *hd, char *rsrc, id_t id, uint_t flags, char **errorp,
894     rcm_info_t **infop)
895 {
896 	int		rv = RCM_SUCCESS;
897 	char		**dependents;
898 	deventry_t	*deventry;
899 
900 	/* Guard against bad arguments */
901 	assert(hd != NULL);
902 	assert(rsrc != NULL);
903 	assert(id == (id_t)0);
904 
905 	/* Trace */
906 	rcm_log_message(RCM_TRACE1, "SVM: svm_remove(%s)\n", rsrc);
907 
908 	/* Lock the cache while removing resource */
909 	(void) mutex_lock(&svm_cache_lock);
910 	if ((deventry = cache_lookup(svm_cache, rsrc)) == NULL) {
911 		(void) mutex_unlock(&svm_cache_lock);
912 		return (RCM_SUCCESS);
913 	}
914 
915 	/* Get dependents */
916 	if (get_dependents(deventry, &dependents) != 0) {
917 		(void) mutex_unlock(&svm_cache_lock);
918 		rcm_log_message(RCM_ERROR, MSG_NODEPS);
919 		deventry->flags |= REMOVED;
920 		*errorp = strdup(ERR_NODEPS);
921 		return (RCM_FAILURE);
922 	}
923 
924 	if (dependents) {
925 		(void) mutex_unlock(&svm_cache_lock);
926 		rv = rcm_notify_remove_list(hd, dependents, flags, infop);
927 		(void) mutex_lock(&svm_cache_lock);
928 		if (rv != RCM_SUCCESS)
929 			*errorp = strdup(gettext("unable to remove"));
930 		free(dependents);
931 	}
932 
933 	/* Mark entry as removed */
934 	deventry->flags |= REMOVED;
935 
936 	(void) mutex_unlock(&svm_cache_lock);
937 	rcm_log_message(RCM_TRACE1, "SVM: exit svm_remove(%s)\n", rsrc);
938 	/* Clean up and return success */
939 	return (RCM_SUCCESS);
940 }
941 
942 /*
943  * Definitions of private functions
944  *
945  */
946 
947 /*
948  *	find_hsp()
949  *
950  *	Find the hot spare entry from the linked list of all hotspare pools
951  *
952  *	Input:
953  *		char		*hspname	name of hot spare pool
954  *	Return:
955  *		hspentry_t	hot spare entry
956  */
957 static hspentry_t *
958 find_hsp(char *hspname)
959 {
960 	hspentry_t	*hspentry = hsp_head;
961 
962 	while (hspentry) {
963 		if (strcmp(hspname, hspentry->hspname) == 0)
964 			return (hspentry);
965 		hspentry = hspentry->link;
966 	}
967 	return (NULL);
968 }
969 
970 /*
971  *      add_hsp_user()
972  *
973  *      Add a hot spare pool user to the list for the hsp specfied by
974  *	hspname. The memory allocated here will be freed by free_cache()
975  *
976  *      Input:
977  *		char		*hspname	hot spare pool name
978  *		deventry_t	*deventry	specified hsp user
979  *      Return:
980  *		hspuser_t	entry in hsp user list
981  */
982 static hspuser_t *
983 add_hsp_user(char *hspname, deventry_t *deventry)
984 {
985 	hspuser_t	*newhspuser;
986 	char		*newhspusername;
987 	hspuser_t	*previous;
988 	hspentry_t	*hspentry;
989 
990 	hspentry = find_hsp(hspname);
991 	if (hspentry == NULL)
992 		return (NULL);
993 	rcm_log_message(RCM_TRACE1, "SVM: Enter add_hsp_user %s, %x, %x\n",
994 	    hspname, hspentry, hspentry->hspuser);
995 
996 	newhspuser = (hspuser_t *)malloc(sizeof (*newhspuser));
997 	if (newhspuser == NULL) {
998 		rcm_log_message(RCM_ERROR,
999 		    gettext("SVM: can't malloc hspuser"));
1000 		return (NULL);
1001 	}
1002 	(void) memset((char *)newhspuser, 0, sizeof (*newhspuser));
1003 
1004 	newhspusername = strdup(deventry->devname);
1005 	if (newhspusername == NULL) {
1006 		rcm_log_message(RCM_ERROR,
1007 		    gettext("SVM: can't malloc hspusername"));
1008 		free(newhspuser);
1009 		return (NULL);
1010 	}
1011 	newhspuser->hspusername = newhspusername;
1012 	newhspuser->hspuserkey = deventry->devkey;
1013 
1014 	if ((previous = hspentry->hspuser) == NULL) {
1015 		hspentry->hspuser = newhspuser;
1016 	} else {
1017 		hspuser_t	*temp = previous->next;
1018 		previous->next = newhspuser;
1019 		newhspuser->next = temp;
1020 	}
1021 	rcm_log_message(RCM_TRACE1, "SVM: Added hsp_user %s (dev %x) to %s\n",
1022 	    newhspusername, newhspuser->hspuserkey, hspname);
1023 	return (newhspuser);
1024 }
1025 
1026 /*
1027  *      add_hsp()
1028  *
1029  *      Add a hot spare pool entry to the list for the slice, deventry.
1030  *      Also add to the linked list of all hsp pools
1031  *	The memory alllocated here will be freed by free_cache()
1032  *
1033  *      Input:
1034  *		char		*hspname	name of hsp pool entry
1035  *		deventry_t	*deventry	device entry for the slice
1036  *      Return:
1037  *		hspentry_t	end of hsp list
1038  *      Locking: None
1039  */
1040 static hspentry_t *
1041 add_hsp(char *hspname, deventry_t *deventry)
1042 {
1043 	hspentry_t	*newhspentry;
1044 	hspentry_t	*previous;
1045 	char		*newhspname;
1046 
1047 	rcm_log_message(RCM_TRACE1, "SVM: Enter add_hsp %s\n",
1048 	    hspname);
1049 	newhspentry = (hspentry_t *)malloc(sizeof (*newhspentry));
1050 	if (newhspentry == NULL) {
1051 		rcm_log_message(RCM_ERROR,
1052 		    gettext("SVM: can't malloc hspentry"));
1053 		return (NULL);
1054 	}
1055 	(void) memset((char *)newhspentry, 0, sizeof (*newhspentry));
1056 
1057 	newhspname = strdup(hspname);
1058 	if (newhspname == NULL) {
1059 		rcm_log_message(RCM_ERROR,
1060 		    gettext("SVM: can't malloc hspname"));
1061 		free(newhspentry);
1062 		return (NULL);
1063 	}
1064 	newhspentry->hspname = newhspname;
1065 
1066 	/* Add to linked list of all hotspare pools */
1067 	newhspentry->link = hsp_head;
1068 	hsp_head = newhspentry;
1069 
1070 	/* Add to list of hotspare pools containing this slice */
1071 	if ((previous = deventry->hsp_list) == NULL) {
1072 		deventry->hsp_list = newhspentry;
1073 	} else {
1074 		hspentry_t	*temp = previous->next;
1075 		previous->next = newhspentry;
1076 		newhspentry->next = temp;
1077 	}
1078 	rcm_log_message(RCM_TRACE1, "SVM: Exit add_hsp %s\n",
1079 	    hspname);
1080 	return (newhspentry);
1081 }
1082 
1083 /*
1084  *      cache_dependent()
1085  *
1086  *      Add a dependent for a deventry to the cache and return the cache entry
1087  *	If the name is not in the cache, we assume that it a SLICE. If it
1088  *	turns out to be any other type of metadevice, when it is processed
1089  *	in cache_all_devices_in_set(), cache_device() will be called to
1090  *	set the type to the actual value.
1091  *
1092  *      Input:
1093  *		cache_t		*cache		cache
1094  *		char		*devname	metadevice name
1095  *		int		devflags	metadevice flags
1096  *		deventry_t	*dependent	dependent of this metadevice
1097  *      Return:
1098  *		deventry_t	metadevice entry added to cache
1099  *      Locking: None
1100  */
1101 static deventry_t *
1102 cache_dependent(cache_t *cache, char *devname, int devflags,
1103     deventry_t *dependent)
1104 {
1105 
1106 	deventry_t	*newdeventry = NULL;
1107 	deventry_t	*hashprev = NULL;
1108 	deventry_t	*deventry = NULL;
1109 	deventry_t	*previous = NULL;
1110 	uint32_t	hash_index;
1111 	int		comp;
1112 
1113 	rcm_log_message(RCM_TRACE1, "SVM: Enter cache_dep %s, %x, %s\n",
1114 	    devname, devflags, dependent->devname);
1115 
1116 	hash_index = hash(cache->size, devname);
1117 	if (hash_index >= cache->size) {
1118 		rcm_log_message(RCM_ERROR,
1119 		    gettext("SVM: can't hash device."));
1120 		return (NULL);
1121 	}
1122 
1123 	deventry = cache->hashline[hash_index];
1124 
1125 	/* if the hash table slot is empty, then this is easy */
1126 	if (deventry == NULL) {
1127 		deventry = create_deventry(devname, SVM_SLICE, 0, devflags);
1128 		cache->hashline[hash_index] = deventry;
1129 	} else {
1130 	/* if the hash table slot isn't empty, find the immediate successor */
1131 		hashprev = NULL;
1132 		while ((comp = strcmp(deventry->devname, devname)) < 0 &&
1133 		    deventry->next != NULL) {
1134 			hashprev = deventry;
1135 			deventry = deventry->next;
1136 		}
1137 
1138 		if (comp == 0) {
1139 			/* if already in cache, just update the flags */
1140 			deventry->flags |= devflags;
1141 		} else {
1142 			/* insert the entry if it's not already there */
1143 			if ((newdeventry = create_deventry(devname,
1144 			    SVM_SLICE, 0, devflags)) == NULL) {
1145 				rcm_log_message(RCM_ERROR,
1146 				    gettext("SVM: can't create hash line."));
1147 				return (NULL);
1148 			}
1149 			if (comp > 0) {
1150 				newdeventry->next = deventry;
1151 				if (hashprev)
1152 					hashprev->next = newdeventry;
1153 				else
1154 					cache->hashline[hash_index] =
1155 					    newdeventry;
1156 			} else if (comp < 0) {
1157 				newdeventry->next = deventry->next;
1158 				deventry->next = newdeventry;
1159 			}
1160 			deventry = newdeventry;
1161 		}
1162 	}
1163 	/* complete deventry by linking the dependent to it */
1164 	dependent->antecedent = deventry;
1165 	if ((previous = deventry->dependent) != NULL) {
1166 		deventry_t *temp = previous->next_dep;
1167 		previous->next_dep = dependent;
1168 		dependent->next_dep = temp;
1169 	} else deventry->dependent = dependent;
1170 	return (deventry);
1171 
1172 }
1173 
1174 /*
1175  *      cache_device()
1176  *
1177  *      Add an entry to the cache for devname
1178  *
1179  *      Input:
1180  *		cache_t		*cache		cache
1181  *		char		*devname	metadevice named
1182  *		svm_type_t	devtype		metadevice type
1183  *		md_dev64_t	devkey		dev_t of device
1184  *		int		devflags	device flags
1185  *      Return:
1186  *		deventry_t	metadevice added to cache
1187  *      Locking: None
1188  */
1189 static deventry_t *
1190 cache_device(cache_t *cache, char *devname, svm_type_t devtype,
1191     md_dev64_t devkey, int devflags)
1192 {
1193 	deventry_t	*newdeventry = NULL;
1194 	deventry_t	*previous = NULL;
1195 	deventry_t	*deventry = NULL;
1196 	uint32_t	hash_index;
1197 	int		comp;
1198 
1199 	rcm_log_message(RCM_TRACE1, "SVM: Enter cache_device %s, %x, %lx, %x\n",
1200 	    devname, devtype, devkey, devflags);
1201 
1202 	hash_index = hash(cache->size, devname);
1203 	if (hash_index >= cache->size) {
1204 		rcm_log_message(RCM_ERROR,
1205 		    gettext("SVM: can't hash device."));
1206 		return (NULL);
1207 	}
1208 
1209 	deventry = cache->hashline[hash_index];
1210 
1211 	/* if the hash table slot is empty, then this is easy */
1212 	if (deventry == NULL) {
1213 		deventry = create_deventry(devname, devtype, devkey,
1214 		    devflags);
1215 		cache->hashline[hash_index] = deventry;
1216 	} else {
1217 	/* if the hash table slot isn't empty, find the immediate successor */
1218 		previous = NULL;
1219 		while ((comp = strcmp(deventry->devname, devname)) < 0 &&
1220 		    deventry->next != NULL) {
1221 			previous = deventry;
1222 			deventry = deventry->next;
1223 		}
1224 
1225 		if (comp == 0) {
1226 			/*
1227 			 * If entry already exists, just set the type, key
1228 			 * and flags
1229 			 */
1230 			deventry->devtype = devtype;
1231 			deventry->devkey = meta_cmpldev(devkey);
1232 			deventry->flags |= devflags;
1233 		} else {
1234 			/* insert the entry if it's not already there */
1235 			if ((newdeventry = create_deventry(devname, devtype,
1236 			    devkey, devflags)) == NULL) {
1237 				rcm_log_message(RCM_ERROR,
1238 				    gettext("SVM: can't create hash line."));
1239 			}
1240 			if (comp > 0) {
1241 				newdeventry->next = deventry;
1242 				if (previous)
1243 					previous->next = newdeventry;
1244 				else
1245 					cache->hashline[hash_index] =
1246 					    newdeventry;
1247 			} else if (comp < 0) {
1248 				newdeventry->next = deventry->next;
1249 				deventry->next = newdeventry;
1250 			}
1251 			deventry = newdeventry;
1252 		}
1253 	}
1254 	return (deventry);
1255 }
1256 /*
1257  *	free_names()
1258  *
1259  *	Free all name list entries
1260  *
1261  *	Input:
1262  *		mdnamelist_t		*np		namelist pointer
1263  *	Return: None
1264  */
1265 
1266 static void
1267 free_names(mdnamelist_t *nlp)
1268 {
1269 	mdnamelist_t *p;
1270 
1271 	for (p = nlp; p != NULL; p = p->next) {
1272 	    meta_invalidate_name(p->namep);
1273 	    p->namep = NULL;
1274 	}
1275 	metafreenamelist(nlp);
1276 }
1277 
1278 /*
1279  * cache_hsp()
1280  *
1281  *	Add an entry to the cache for each slice in the hot spare
1282  *	pool. Call add_hsp() to add the hot spare pool to the list
1283  *	of all hot spare pools.
1284  *
1285  *	Input:
1286  *		cache_t		*cache	cache
1287  *		mdnamelist_t	*nlp	pointer to hsp name
1288  *		md_hsp_t	*hsp
1289  *	Return:
1290  *		0 if successful or error code
1291  */
1292 static int
1293 cache_hsp(cache_t *cache, mdhspnamelist_t *nlp, md_hsp_t *hsp)
1294 {
1295 	int		i;
1296 	deventry_t	*deventry;
1297 	md_hs_t		*hs;
1298 
1299 	for (i = 0; i < hsp->hotspares.hotspares_len; i++) {
1300 		hs = &hsp->hotspares.hotspares_val[i];
1301 		if ((deventry = cache_device(cache, hs->hsnamep->bname,
1302 		    SVM_SLICE, hs->hsnamep->dev,
1303 		    IN_HSP)) == NULL) {
1304 			return (ENOMEM);
1305 		}
1306 		if (add_hsp(nlp->hspnamep->hspname, deventry) == NULL) {
1307 			return (ENOMEM);
1308 		}
1309 	}
1310 	return (0);
1311 }
1312 
1313 /*
1314  * cache_trans()
1315  *
1316  *	Add an entry to the cache for trans metadevice, the master
1317  *	and the log. Call cache_dependent() to link that master and
1318  *	the log to the trans metadevice.
1319  *
1320  *	Input:
1321  *		cache_t		*cache	cache
1322  *		mdnamelist_t	*nlp	pointer to trans name
1323  *		md_trans_t	*trans
1324  *	Return:
1325  *		0 if successful or error code
1326  *
1327  */
1328 static int
1329 cache_trans(cache_t *cache, mdnamelist_t *nlp, md_trans_t *trans)
1330 {
1331 	deventry_t	*antecedent;
1332 
1333 	if ((antecedent = cache_device(cache, nlp->namep->bname, SVM_TRANS,
1334 	    nlp->namep->dev, 0)) == NULL) {
1335 		return (ENOMEM);
1336 	}
1337 
1338 	if (cache_device(cache, trans->masternamep->bname, SVM_SLICE,
1339 	    trans->masternamep->dev, 0) == NULL) {
1340 		return (ENOMEM);
1341 	}
1342 
1343 	if (cache_dependent(cache, trans->masternamep->bname, 0,
1344 	    antecedent) == NULL) {
1345 		return (ENOMEM);
1346 	}
1347 
1348 	if (trans->lognamep != NULL) {
1349 		if (cache_device(cache, trans->lognamep->bname, SVM_SLICE,
1350 		    trans->lognamep->dev, TRANS_LOG) == NULL) {
1351 			return (ENOMEM);
1352 		}
1353 
1354 		if (cache_dependent(cache, trans->lognamep->bname, 0,
1355 		    antecedent) == NULL) {
1356 			return (ENOMEM);
1357 		}
1358 	}
1359 	return (0);
1360 }
1361 
1362 /*
1363  * cache_mirror()
1364  *
1365  *	Add an entry to the cache for the mirror. For each
1366  *	submirror, call cache_dependent() to add an entry to the
1367  *	cache and to link it to mirror entry.
1368  *
1369  *	Input:
1370  *		cache_t		*cache	cache
1371  *		mdnamelist_t	*nlp	pointer to mirror name
1372  *		md_mirror_t	*mirror
1373  *	Return:
1374  *		0 if successful or error code
1375  *
1376  */
1377 static int
1378 cache_mirror(cache_t *cache, mdnamelist_t *nlp, md_mirror_t *mirror)
1379 {
1380 	int i;
1381 	deventry_t	*antecedent;
1382 
1383 	if ((antecedent = cache_device(cache, nlp->namep->bname, SVM_MIRROR,
1384 	    nlp->namep->dev, 0)) == NULL) {
1385 		return (ENOMEM);
1386 	}
1387 	for (i = 0; i <  NMIRROR; i++) {
1388 		md_submirror_t	*submirror;
1389 
1390 		submirror = &mirror->submirrors[i];
1391 		if (submirror->state == SMS_UNUSED)
1392 			continue;
1393 
1394 		if (!submirror->submirnamep)
1395 			continue;
1396 
1397 		if (cache_dependent(cache, submirror->submirnamep->bname,
1398 		    0, antecedent) == NULL) {
1399 			return (ENOMEM);
1400 		}
1401 	}
1402 	return (0);
1403 }
1404 
1405 /*
1406  * cache_raid()
1407  *
1408  *	Add an entry to the cache for the RAID metadevice. For
1409  *	each component of the RAID call cache_dependent() to add
1410  *	add it to the cache and to link it to the RAID metadevice.
1411  *
1412  *	Input:
1413  *		cache_t		*cache	cache
1414  *		mdnamelist_t	*nlp	pointer to raid name
1415  *		md_raid_t	*raid	mirror
1416  *	Return:
1417  *		0 if successful or error code
1418  */
1419 static int
1420 cache_raid(cache_t *cache, mdnamelist_t *nlp, md_raid_t *raid)
1421 {
1422 	int i;
1423 	deventry_t	*antecedent;
1424 
1425 	if ((antecedent = cache_device(cache, nlp->namep->bname, SVM_RAID,
1426 	    nlp->namep->dev, 0)) == NULL) {
1427 		return (ENOMEM);
1428 	}
1429 	if (raid->hspnamep) {
1430 		if (add_hsp_user(raid->hspnamep->hspname,
1431 		    antecedent) == NULL) {
1432 			return (ENOMEM);
1433 		}
1434 	}
1435 	for (i = 0; i < raid->cols.cols_len; i++) {
1436 		if (cache_dependent(cache,
1437 		    raid->cols.cols_val[i].colnamep->bname, 0,
1438 		    antecedent) == NULL) {
1439 			return (ENOMEM);
1440 		}
1441 	}
1442 	return (0);
1443 }
1444 
1445 /*
1446  * cache_stripe()
1447  *
1448  *	Add a CONCAT or a STRIPE entry entry to the cache for the
1449  *	metadevice and call cache_dependent() to add each
1450  *	component to the cache.
1451  *
1452  *	Input:
1453  *		cache_t		*cache	cache
1454  *		mdnamelist_t	*nlp	pointer to stripe name
1455  *		md_stripe_t	*stripe
1456  *	Return:
1457  *		0 if successful or error code
1458  *
1459  */
1460 static int
1461 cache_stripe(cache_t *cache, mdnamelist_t *nlp, md_stripe_t *stripe)
1462 {
1463 	int i;
1464 	deventry_t	*antecedent;
1465 
1466 	if ((antecedent = cache_device(cache, nlp->namep->bname, SVM_CONCAT,
1467 	    nlp->namep->dev, 0)) == NULL) {
1468 		return (ENOMEM);
1469 	}
1470 
1471 	if (stripe->hspnamep) {
1472 		if (add_hsp_user(stripe->hspnamep->hspname,
1473 		    antecedent) == NULL) {
1474 			return (ENOMEM);
1475 		}
1476 	}
1477 	for (i = 0; i < stripe->rows.rows_len; i++) {
1478 		md_row_t	*rowp;
1479 		int		j;
1480 
1481 		rowp = &stripe->rows.rows_val[i];
1482 		if (stripe->rows.rows_len == 1 && rowp->comps.comps_len > 1) {
1483 			if ((void*) cache_device(cache, nlp->namep->bname,
1484 			    SVM_STRIPE, nlp->namep->dev, 0) == NULL)
1485 				return (ENOMEM);
1486 		}
1487 		for (j = 0; j < rowp->comps.comps_len; j++) {
1488 			md_comp_t	*component;
1489 
1490 			component = &rowp->comps.comps_val[j];
1491 			if (cache_dependent(cache,
1492 			    component->compnamep->bname, 0,
1493 			    antecedent) == NULL) {
1494 				return (ENOMEM);
1495 			}
1496 		}
1497 	}
1498 	return (0);
1499 }
1500 
1501 /*
1502  * cache_sp()
1503  *
1504  *	Add an entry to the cache for the softpart and also call
1505  *	cache_dependent() to set the CONT_SOFTPART flag in the
1506  *	cache entry for the metadevice that contains the softpart.
1507  *
1508  *	Input:
1509  *		cache_t		*cache	cache
1510  *		mdnamelist_t	*nlp	pointer to soft part name
1511  *		md_sp_t		*soft_part
1512  *	Return:
1513  *		0 if successful or error code
1514  *
1515  */
1516 static int
1517 cache_sp(cache_t *cache, mdnamelist_t *nlp, md_sp_t *soft_part)
1518 {
1519 	deventry_t	*antecedent;
1520 
1521 	if ((antecedent = cache_device(cache, nlp->namep->bname,
1522 	    SVM_SOFTPART, nlp->namep->dev, 0)) == NULL) {
1523 			    return (ENOMEM);
1524 	}
1525 	if (cache_dependent(cache, soft_part->compnamep->bname,
1526 	    CONT_SOFTPART, antecedent) == NULL) {
1527 		return (ENOMEM);
1528 	}
1529 	return (0);
1530 }
1531 
1532 /*
1533  *      cache_all_devices_in_set()
1534  *
1535  *      Add all of the metadevices and mddb replicas in the set to the
1536  *	cache
1537  *
1538  *      Input:
1539  *		cache_t		*cache		cache
1540  *		mdsetname_t	*sp		setname
1541  *      Return:
1542  *		0 if successful or error code
1543  */
1544 
1545 static int
1546 cache_all_devices_in_set(cache_t *cache, mdsetname_t *sp)
1547 {
1548 	md_error_t		error = mdnullerror;
1549 	md_replicalist_t	*replica_list = NULL;
1550 	md_replicalist_t	*mdbp;
1551 	mdnamelist_t		*nlp;
1552 	mdnamelist_t		*trans_list = NULL;
1553 	mdnamelist_t		*mirror_list = NULL;
1554 	mdnamelist_t		*raid_list = NULL;
1555 	mdnamelist_t		*stripe_list = NULL;
1556 	mdnamelist_t		*sp_list = NULL;
1557 	mdhspnamelist_t		*hsp_list = NULL;
1558 
1559 	rcm_log_message(RCM_TRACE1, "SVM: cache_all_devices_in_set\n");
1560 
1561 	/* Add each mddb replica to the cache */
1562 	if (metareplicalist(sp, MD_BASICNAME_OK, &replica_list, &error) < 0) {
1563 	    /* there are no metadb's; that is ok, no need to check the rest */
1564 	    mdclrerror(&error);
1565 	    return (0);
1566 	}
1567 
1568 	for (mdbp = replica_list; mdbp != NULL; mdbp = mdbp->rl_next) {
1569 		if (cache_device(cache, mdbp->rl_repp->r_namep->bname,
1570 		    SVM_SLICE, mdbp->rl_repp->r_namep->dev,
1571 		    CONT_METADB) == NULL) {
1572 			metafreereplicalist(replica_list);
1573 			return (ENOMEM);
1574 		}
1575 	}
1576 	metafreereplicalist(replica_list);
1577 
1578 	/* Process Hot Spare pools */
1579 	if (meta_get_hsp_names(sp, &hsp_list, 0, &error) >= 0) {
1580 	    mdhspnamelist_t *nlp;
1581 
1582 		for (nlp = hsp_list; nlp != NULL; nlp = nlp->next) {
1583 			md_hsp_t	*hsp;
1584 
1585 			hsp = meta_get_hsp(sp, nlp->hspnamep, &error);
1586 			if (hsp != NULL) {
1587 				if (cache_hsp(cache, nlp, hsp) != 0) {
1588 					metafreehspnamelist(hsp_list);
1589 					return (ENOMEM);
1590 				}
1591 			}
1592 			meta_invalidate_hsp(nlp->hspnamep);
1593 		}
1594 		metafreehspnamelist(hsp_list);
1595 	}
1596 
1597 	/* Process Trans devices */
1598 	if (meta_get_trans_names(sp, &trans_list, 0, &error) >= 0) {
1599 		for (nlp = trans_list; nlp != NULL; nlp = nlp->next) {
1600 			mdname_t	*mdn;
1601 			md_trans_t	*trans;
1602 
1603 			mdn = metaname(&sp, nlp->namep->cname, META_DEVICE,
1604 			    &error);
1605 			if (mdn == NULL) {
1606 				continue;
1607 			}
1608 
1609 			trans = meta_get_trans(sp, mdn, &error);
1610 
1611 			if (trans != NULL && trans->masternamep != NULL) {
1612 				if (cache_trans(cache, nlp, trans) != NULL) {
1613 					free_names(trans_list);
1614 					return (ENOMEM);
1615 				}
1616 			}
1617 		}
1618 		free_names(trans_list);
1619 	}
1620 
1621 	/* Process Mirrors */
1622 	if (meta_get_mirror_names(sp, &mirror_list, 0, &error) >= 0) {
1623 		for (nlp = mirror_list; nlp != NULL; nlp = nlp->next) {
1624 			mdname_t	*mdn;
1625 			md_mirror_t	*mirror;
1626 
1627 			mdn = metaname(&sp, nlp->namep->cname, META_DEVICE,
1628 			    &error);
1629 			if (mdn == NULL) {
1630 				continue;
1631 			}
1632 
1633 			mirror = meta_get_mirror(sp, mdn, &error);
1634 
1635 			if (mirror != NULL) {
1636 				if (cache_mirror(cache, nlp, mirror) != 0) {
1637 					free_names(mirror_list);
1638 					return (ENOMEM);
1639 				}
1640 			}
1641 		}
1642 		free_names(mirror_list);
1643 	}
1644 
1645 	/* Process Raid devices */
1646 	if (meta_get_raid_names(sp, &raid_list, 0, &error) >= 0) {
1647 		for (nlp = raid_list; nlp != NULL; nlp = nlp->next) {
1648 			mdname_t	*mdn;
1649 			md_raid_t	*raid;
1650 
1651 			mdn = metaname(&sp, nlp->namep->cname, META_DEVICE,
1652 			    &error);
1653 			if (mdn == NULL) {
1654 				continue;
1655 			}
1656 
1657 			raid = meta_get_raid(sp, mdn, &error);
1658 
1659 			if (raid != NULL) {
1660 				if (cache_raid(cache, nlp, raid) != 0) {
1661 					free_names(raid_list);
1662 					return (ENOMEM);
1663 				}
1664 			}
1665 		}
1666 		free_names(raid_list);
1667 	}
1668 
1669 	/* Process Slices */
1670 	if (meta_get_stripe_names(sp, &stripe_list, 0, &error) >= 0) {
1671 		for (nlp = stripe_list; nlp != NULL; nlp = nlp->next) {
1672 			mdname_t	*mdn;
1673 			md_stripe_t	*stripe;
1674 
1675 			mdn = metaname(&sp, nlp->namep->cname, META_DEVICE,
1676 			    &error);
1677 			if (mdn == NULL) {
1678 				continue;
1679 			}
1680 
1681 			stripe = meta_get_stripe(sp, mdn, &error);
1682 
1683 			if (stripe != NULL) {
1684 				if (cache_stripe(cache, nlp, stripe) != 0) {
1685 					free_names(stripe_list);
1686 					return (ENOMEM);
1687 				}
1688 			}
1689 		}
1690 		free_names(stripe_list);
1691 	}
1692 
1693 	/* Process Soft partitions */
1694 	if (meta_get_sp_names(sp, &sp_list, 0, &error) >= 0) {
1695 		for (nlp = sp_list; nlp != NULL; nlp = nlp->next) {
1696 			mdname_t	*mdn;
1697 			md_sp_t		*soft_part;
1698 
1699 			mdn = metaname(&sp, nlp->namep->cname, META_DEVICE,
1700 			    &error);
1701 			if (mdn == NULL) {
1702 				continue;
1703 			}
1704 
1705 			soft_part = meta_get_sp(sp, mdn, &error);
1706 
1707 			if (soft_part != NULL) {
1708 				if (cache_sp(cache, nlp, soft_part) != 0) {
1709 					free_names(sp_list);
1710 					return (ENOMEM);
1711 				}
1712 			}
1713 		}
1714 		free_names(sp_list);
1715 	}
1716 	mdclrerror(&error);
1717 	return (0);
1718 }
1719 
1720 /*
1721  *      create_all_devices()
1722  *
1723  *      Cache all devices in all sets
1724  *
1725  *      Input:
1726  *		cache_t		cache
1727  *      Return:
1728  *		0 if successful, error code if not
1729  *      Locking: None
1730  */
1731 static int
1732 cache_all_devices(cache_t *cache)
1733 {
1734 	int		max_sets;
1735 	md_error_t	error = mdnullerror;
1736 	int		i;
1737 
1738 	if ((max_sets = get_max_sets(&error)) == 0) {
1739 		return (0);
1740 	}
1741 	if (!mdisok(&error)) {
1742 		mdclrerror(&error);
1743 		return (0);
1744 	}
1745 
1746 	rcm_log_message(RCM_TRACE1,
1747 	    "SVM: cache_all_devices,max sets = %d\n", max_sets);
1748 	/* for each possible set number, see if we really have a diskset */
1749 	for (i = 0; i < max_sets; i++) {
1750 		mdsetname_t	*sp;
1751 
1752 		if ((sp = metasetnosetname(i, &error)) == NULL) {
1753 			rcm_log_message(RCM_TRACE1,
1754 			    "SVM: cache_all_devices no set: setno %d\n", i);
1755 			if (!mdisok(&error) &&
1756 			    ((error.info.errclass == MDEC_RPC) ||
1757 			    (mdiserror(&error, MDE_SMF_NO_SERVICE)))) {
1758 				/*
1759 				 * metad rpc program not available
1760 				 * - no metasets.  metad rpc not available
1761 				 * is indicated either by an RPC error or
1762 				 * the fact that the service is not
1763 				 * enabled.
1764 				 */
1765 				break;
1766 			}
1767 
1768 			continue;
1769 		}
1770 
1771 		if (cache_all_devices_in_set(cache, sp)) {
1772 			metaflushsetname(sp);
1773 			return (ENOMEM);
1774 		}
1775 		metaflushsetname(sp);
1776 	}
1777 	mdclrerror(&error);
1778 	rcm_log_message(RCM_TRACE1, "SVM: exit cache_all_devices\n");
1779 	return (0);
1780 }
1781 
1782 /*
1783  *      create_cache()
1784  *
1785  *      Create an empty cache
1786  *	If the function fails free_cache() will be called to free any
1787  *	allocated memory.
1788  *
1789  *      Input: None
1790  *      Return:
1791  *		cache_t		cache created
1792  *      Locking: None
1793  */
1794 static cache_t *
1795 create_cache()
1796 {
1797 	cache_t		*cache;
1798 	uint32_t	size;
1799 	int		ret;
1800 
1801 	size = HASH_DEFAULT;
1802 	/* try allocating storage for a new, empty cache */
1803 	if ((cache = (cache_t *)malloc(sizeof (cache_t))) == NULL) {
1804 		rcm_log_message(RCM_ERROR, MSG_CACHEFAIL);
1805 		return (NULL);
1806 	}
1807 
1808 	(void) memset((char *)cache, 0, sizeof (*cache));
1809 	cache->hashline = (deventry_t **)calloc(size, sizeof (deventry_t *));
1810 	if (cache->hashline == NULL) {
1811 		rcm_log_message(RCM_ERROR, MSG_CACHEFAIL);
1812 		free(cache);
1813 		return (NULL);
1814 	}
1815 	cache->size = size;
1816 
1817 	/* Initialise linked list of hsp entries */
1818 	hsp_head = NULL;
1819 
1820 	/* add entries to cache */
1821 	ret = cache_all_devices(cache);
1822 	if (ret != 0) {
1823 		free_cache(&cache);
1824 		return (NULL);
1825 	}
1826 
1827 	/* Mark the cache as new */
1828 	cache->registered = 0;
1829 
1830 	/* Finished - return the new cache */
1831 	return (cache);
1832 }
1833 
1834 /*
1835  *      create_deventry()
1836  *
1837  *      Create a new deventry entry for device with name devname
1838  *	The memory alllocated here will be freed by free_cache()
1839  *
1840  *      Input:
1841  *		char		*devname	device name
1842  *		svm_type_t	devtype		metadevice type
1843  *		md_dev64_t	devkey		device key
1844  *		int		devflags	device flags
1845  *      Return:
1846  *		deventry_t	New deventry
1847  *      Locking: None
1848  */
1849 static deventry_t *
1850 create_deventry(char *devname, svm_type_t devtype, md_dev64_t devkey,
1851     int devflags)
1852 {
1853 	const char	*devprefix = "/dev/";
1854 	deventry_t	*newdeventry = NULL;
1855 	char		*newdevname = NULL;
1856 	char		*devicesname = NULL;
1857 
1858 	newdeventry = (deventry_t *)malloc(sizeof (*newdeventry));
1859 	if (newdeventry == NULL) {
1860 		rcm_log_message(RCM_ERROR,
1861 		    gettext("SVM: can't malloc deventrys"));
1862 		goto errout;
1863 	}
1864 	(void) memset((char *)newdeventry, 0, sizeof (*newdeventry));
1865 
1866 	newdevname = strdup(devname);
1867 	if (newdevname == NULL) {
1868 		rcm_log_message(RCM_ERROR,
1869 		    gettext("SVM: can't malloc devname"));
1870 		goto errout;
1871 	}
1872 
1873 	/*
1874 	 * When we register interest in a name starting with /dev/, RCM
1875 	 * will use realpath to convert the name to a /devices name before
1876 	 * storing it.  metaclear removes both the /dev and the /devices
1877 	 * form of the name of a metadevice from the file system.  Thus,
1878 	 * when we later call rcm_unregister_interest to get rid of a
1879 	 * metacleared device, RCM will not be able to derive the /devices
1880 	 * name for the /dev name.  Thus, to unregister we will need to use
1881 	 * the /devices name.  We will save it now, so that we have it when
1882 	 * it comes time to unregister.
1883 	 */
1884 	if (strncmp(devname, devprefix, strlen(devprefix)) == 0) {
1885 		devicesname = (char *)malloc(PATH_MAX);
1886 		if (devicesname == NULL) {
1887 			rcm_log_message(RCM_ERROR,
1888 			    gettext("SVM: can't malloc PATH_MAX bytes"));
1889 			goto errout;
1890 		}
1891 		if (realpath(devname, devicesname) == NULL) {
1892 			free(devicesname);
1893 			devicesname = NULL;
1894 		}
1895 	}
1896 	newdeventry->devname = newdevname;
1897 	newdeventry->devicesname = devicesname;
1898 	newdeventry->devtype = devtype;
1899 	newdeventry->devkey = meta_cmpldev(devkey);
1900 	newdeventry->flags = devflags;
1901 	if (newdeventry->devicesname == NULL) {
1902 		rcm_log_message(RCM_TRACE1,
1903 			"SVM created deventry for %s\n", newdeventry->devname);
1904 	} else {
1905 		rcm_log_message(RCM_TRACE1,
1906 			"SVM created deventry for %s (%s)\n",
1907 			newdeventry->devname, newdeventry->devicesname);
1908 	}
1909 	return (newdeventry);
1910 
1911 errout:
1912 	if (devicesname != NULL)
1913 		free(devicesname);
1914 	if (newdevname != NULL)
1915 		free(newdevname);
1916 	if (newdeventry != NULL)
1917 		free(newdeventry);
1918 	return (NULL);
1919 }
1920 
1921 /*
1922  *      cache_remove()
1923  *
1924  *      Given a cache and a deventry, the deventry is
1925  *      removed from the cache's tables and memory for the deventry is
1926  *      free'ed.
1927  *
1928  *      Input:
1929  *		cache_t		*cache		cache
1930  *		deventry_t	*deventry	deventry to be removed
1931  *      Return: None
1932  *      Locking: The cache must be locked by the caller prior to calling
1933  *      this routine.
1934  */
1935 static void
1936 cache_remove(cache_t *cache, deventry_t *deventry)
1937 {
1938 	deventry_t	*olddeventry;
1939 	deventry_t	*previous;
1940 	hspentry_t	*hspentry;
1941 	hspentry_t	*oldhspentry;
1942 	hspuser_t	*hspuser;
1943 	hspuser_t	*oldhspuser;
1944 	uint32_t	hash_index;
1945 
1946 	/* sanity check */
1947 	if (cache == NULL || deventry == NULL || deventry->devname == NULL)
1948 		return;
1949 
1950 
1951 	/* If this is in the hash table, remove it from there */
1952 	hash_index = hash(cache->size, deventry->devname);
1953 	if (hash_index >= cache->size) {
1954 		rcm_log_message(RCM_ERROR,
1955 		    gettext("SVM: can't hash device."));
1956 		return;
1957 	}
1958 	olddeventry = cache->hashline[hash_index];
1959 	previous = NULL;
1960 	while (olddeventry) {
1961 		if (olddeventry->devname &&
1962 		    strcmp(olddeventry->devname, deventry->devname) == 0) {
1963 			break;
1964 		}
1965 		previous = olddeventry;
1966 		olddeventry = olddeventry->next;
1967 	}
1968 	if (olddeventry) {
1969 		if (previous)
1970 			previous->next = olddeventry->next;
1971 		else
1972 			cache->hashline[hash_index] = olddeventry->next;
1973 
1974 		if (olddeventry->flags&IN_HSP) {
1975 			/*
1976 			 * If this is in a hot spare pool, remove the list
1977 			 * of hot spare pools that it is in along with
1978 			 * all of the volumes that are users of the pool
1979 			 */
1980 			hspentry = olddeventry->hsp_list;
1981 			while (hspentry) {
1982 				oldhspentry = hspentry;
1983 				hspuser = hspentry->hspuser;
1984 				while (hspuser) {
1985 					oldhspuser = hspuser;
1986 					free(hspuser->hspusername);
1987 					hspuser = hspuser->next;
1988 					free(oldhspuser);
1989 				}
1990 				free(hspentry->hspname);
1991 				hspentry = hspentry->next;
1992 				free(oldhspentry);
1993 			}
1994 		}
1995 		free(olddeventry->devname);
1996 		free(olddeventry);
1997 	}
1998 
1999 }
2000 
2001 /*
2002  *      cache_lookup()
2003  *
2004  *      Return the deventry corresponding to devname from the cache
2005  *      Input:
2006  *		cache_t		cache		cache
2007  *		char		*devname	name to lookup in cache
2008  *      Return:
2009  *		deventry_t	deventry of name, NULL if not found
2010  *      Locking: cache lock held on entry and on exit
2011  */
2012 static deventry_t *
2013 cache_lookup(cache_t *cache, char *devname)
2014 {
2015 	int		comp;
2016 	uint32_t	hash_index;
2017 	deventry_t	*deventry;
2018 
2019 	hash_index = hash(cache->size, devname);
2020 	if (hash_index >= cache->size) {
2021 		rcm_log_message(RCM_ERROR,
2022 		    gettext("SVM: can't hash resource."));
2023 		return (NULL);
2024 	}
2025 
2026 	deventry = cache->hashline[hash_index];
2027 	while (deventry) {
2028 		comp = strcmp(deventry->devname, devname);
2029 		if (comp == 0)
2030 			return (deventry);
2031 		if (comp > 0)
2032 			return (NULL);
2033 		deventry = deventry->next;
2034 	}
2035 	return (NULL);
2036 }
2037 
2038 /*
2039  *      cache_sync()
2040  *
2041  *	Resync cache with the svm database.  First a new cache is created
2042  *	that represents the current state of the SVM database.  The
2043  *	function walks the new cache to look for new entries that must be
2044  *	registered.  The new entries are kept in a list, because we cannot
2045  *	register them at this point.  Entries that appear in both caches
2046  *	are removed from the old cache.  Because of this at the end of the
2047  *	walk, the old cache will only contain devices that have been
2048  *	removed and need to be unregistered.
2049  *
2050  *	Next the old cache is walked, so that we can unregister the devices
2051  *	that are no longer present.
2052  *
2053  *	Finally, we process the list of new devices that must be
2054  *	registered.  There is a reason why we must unregister the removed
2055  *	(metacleared) devices before registering the new ones.  It has to
2056  *	do with the fact that rcm_register_interest calls realpath(3C) to
2057  *	convert a /dev name to a /devices name.  It uses the /devices name
2058  *	for storing the device information.
2059  *
2060  *	It can happen that between cache_syncs that the administrator
2061  *	metaclears one metadevice and metacreates a new one.  For example,
2062  *
2063  *		metaclear acct
2064  *		metainit engr 1 1 c1t12d0s0
2065  *
2066  *	The metaclear operation frees up the minor number that was being
2067  *	used by acct.  The metainit operation can then reuse the minor
2068  *	number.  This means that both metadevices would have the same
2069  *	/devices name even though they had different /dev names.  Since
2070  *	rcm_register_interest uses /devices names for storing records, we
2071  *	need to unregister acct before registering engr.  Otherwise we
2072  *	would get an EALREADY errno and a failed registration.  This is why
2073  *	cache_sync creates a list of devices to be registered after all the
2074  *	removed devices have been unregistered.
2075  *
2076  *      Input:
2077  *		rcm_handle_t	*hd		rcm handle
2078  *		cache_t		**cachep	pointer to cache
2079  *      Return:
2080  *		cache_t		**cachep	pointer to new cache
2081  *      Return: None
2082  *      Locking: The cache must be locked prior to entry
2083  */
2084 static void
2085 cache_sync(rcm_handle_t *hd, cache_t **cachep)
2086 {
2087 	char		*devicename;
2088 	deventry_t	*deventry;
2089 	cache_t		*new_cache;
2090 	cache_t		*old_cache = *cachep;
2091 	deventry_t	*hashline = NULL;
2092 	deventry_t	**register_list = NULL;
2093 	deventry_t	*register_this;
2094 	uint32_t	register_count = 0;	/* # entrys in register_list */
2095 	uint32_t	allocated = 0;		/* # entrys allocated in */
2096 						/* register_list */
2097 	uint32_t	allocate_incr = 16;
2098 	uint32_t	i = 0;
2099 
2100 	/* Get a new cache */
2101 	if ((new_cache = create_cache()) == NULL) {
2102 		rcm_log_message(RCM_WARNING, MSG_NORECACHE);
2103 		return;
2104 	}
2105 
2106 	/* For every entry in the new cache... */
2107 	while ((devicename = cache_walk(new_cache, &i, &hashline)) != NULL) {
2108 		register_this = NULL;
2109 
2110 		/* Look for this entry in the old cache */
2111 		deventry = cache_lookup(old_cache, devicename);
2112 		/*
2113 		 * If no entry in old cache, register the resource. If there
2114 		 * is an entry, but it is marked as removed, register it
2115 		 * again and remove it from the old cache
2116 		 */
2117 		if (deventry == NULL) {
2118 			register_this = hashline;
2119 		} else {
2120 			if (deventry->flags&REMOVED)
2121 				register_this = hashline;
2122 			cache_remove(old_cache, deventry);
2123 		}
2124 
2125 		/* Save this entry if we need to register it later. */
2126 		if (register_this) {
2127 			if (register_count >= allocated) {
2128 				/* Need to extend our array */
2129 				allocated += allocate_incr;
2130 				register_list =
2131 					(deventry_t **)realloc(register_list,
2132 					allocated * sizeof (*register_list));
2133 				if (register_list == NULL) {
2134 					/* Out of memory.  Give up. */
2135 					rcm_log_message(RCM_WARNING,
2136 						MSG_NORECACHE);
2137 					free(new_cache);
2138 					return;
2139 				}
2140 			}
2141 			*(register_list + register_count) = register_this;
2142 			register_count++;
2143 		}
2144 	}
2145 
2146 	/*
2147 	 * For every device left in the old cache, just unregister if
2148 	 * it has not already been removed
2149 	 */
2150 	i = 0;
2151 	hashline = NULL;
2152 	while ((devicename = cache_walk(old_cache, &i, &hashline)) != NULL) {
2153 		if (!(hashline->flags&REMOVED)) {
2154 			(void) svm_unregister_device(hd, hashline);
2155 		}
2156 	}
2157 
2158 	/* Register the new devices. */
2159 	for (i = 0; i < register_count; i++) {
2160 		deventry = *(register_list + i);
2161 		svm_register_device(hd, deventry->devname);
2162 	}
2163 	if (register_list)
2164 		free(register_list);
2165 
2166 	/* Swap pointers */
2167 	*cachep = new_cache;
2168 
2169 	/* Destroy old cache */
2170 	free_cache(&old_cache);
2171 
2172 	/* Mark the new cache as registered */
2173 	new_cache-> registered = 1;
2174 }
2175 
2176 /*
2177  * cache_walk()
2178  *
2179  *      Perform one step of a walk through the cache.  The i and hashline
2180  *      parameters are updated to store progress of the walk for future steps.
2181  *      They must all be initialized for the beginning of the walk
2182  *      (i = 0, line = NULL). Initialize variables to these values for these
2183  *      parameters, and then pass in the address of each of the variables
2184  *      along with the cache.  A NULL return value will be given to indicate
2185  *      when there are no more cached items to be returned.
2186  *
2187  *      Input:
2188  *		cache_t		*cache		cache
2189  *		uint32_t	*i		hash table index of prev entry
2190  *		deventry_t	**line		ptr to previous device entry
2191  *      Output:
2192  *		uint32_t	*i		updated hash table index
2193  *		deventry_t	**line		ptr to device entry
2194  *      Return:
2195  *		char*		device name (NULL for end of cache)
2196  *      Locking: The cache must be locked prior to calling this routine.
2197  */
2198 static char *
2199 cache_walk(cache_t *cache, uint32_t *i, deventry_t **line)
2200 {
2201 	uint32_t	j;
2202 
2203 	/* sanity check */
2204 	if (cache == NULL || i == NULL || line == NULL ||
2205 	    *i >= cache->size)
2206 		return (NULL);
2207 
2208 	/* if initial values were given, look for the first entry */
2209 	if (*i == 0 && *line == NULL) {
2210 		for (j = 0; j < cache->size; j++) {
2211 			if (cache->hashline[j]) {
2212 				*i = j;
2213 				*line = cache->hashline[j];
2214 				return ((*line)->devname);
2215 			}
2216 		}
2217 	} else {
2218 		/* otherwise, look for the next entry for this hash value */
2219 		if (*line && (*line)->next) {
2220 			*line = (*line)->next;
2221 			return ((*line)->devname);
2222 		} else {
2223 		/* next look further down in the hash table */
2224 			for (j = (*i) + 1; j < cache->size; j++) {
2225 				if (cache->hashline[j]) {
2226 					*i = j;
2227 					*line = cache->hashline[j];
2228 					return ((*line)->devname);
2229 				}
2230 			}
2231 		}
2232 	}
2233 
2234 	/*
2235 	 * We would have returned somewhere above if there were any more
2236 	 * entries.  So set the sentinel values and return a NULL.
2237 	 */
2238 	*i = cache->size;
2239 	*line = NULL;
2240 	return (NULL);
2241 }
2242 
2243 /*
2244  *      free_cache()
2245  *
2246  *      Given a pointer to a cache structure, this routine will free all
2247  *      of the memory allocated within the cache.
2248  *
2249  *      Input:
2250  *		cache_t		**cache		ptr to cache
2251  *      Return: None
2252  *      Locking: cache lock held on entry
2253  */
2254 static void
2255 free_cache(cache_t **cache)
2256 {
2257 	uint32_t	index;
2258 	cache_t		*realcache;
2259 
2260 	/* sanity check */
2261 	if (cache == NULL || *cache == NULL)
2262 		return;
2263 
2264 	/* de-reference the cache pointer */
2265 	realcache = *cache;
2266 
2267 	/* free the hash table */
2268 	for (index = 0; index < realcache->size; index++) {
2269 		free_deventry(&realcache->hashline[index]);
2270 	}
2271 	free(realcache->hashline);
2272 	realcache->hashline = NULL;
2273 
2274 	free(realcache);
2275 	*cache = NULL;
2276 }
2277 
2278 /*
2279  *      free_deventry()
2280  *
2281  *      This routine frees all of the memory allocated within a node of a
2282  *      deventry.
2283  *
2284  *      Input:
2285  *		deventry_t	**deventry	ptr to deventry
2286  *      Return: None
2287  *      Locking: cache lock held on entry
2288  */
2289 static void
2290 free_deventry(deventry_t **deventry)
2291 {
2292 	deventry_t	*olddeventry;
2293 	hspentry_t	*hspentry;
2294 	hspentry_t	*oldhspentry;
2295 	hspuser_t	*hspuser;
2296 	hspuser_t	*oldhspuser;
2297 
2298 	if (deventry != NULL) {
2299 		while (*deventry != NULL) {
2300 			olddeventry = (*deventry)->next;
2301 			if ((*deventry)->flags&IN_HSP) {
2302 				/*
2303 				 * If this is in a hot spare pool, remove the
2304 				 * memory allocated to hot spare pools and
2305 				 * the users of the pool
2306 				 */
2307 				hspentry = (*deventry)->hsp_list;
2308 				while (hspentry) {
2309 					oldhspentry = hspentry;
2310 					hspuser = hspentry->hspuser;
2311 					while (hspuser) {
2312 						oldhspuser = hspuser;
2313 						free(hspuser->hspusername);
2314 						hspuser = hspuser->next;
2315 						free(oldhspuser);
2316 					}
2317 					free(hspentry->hspname);
2318 					hspentry = hspentry->next;
2319 					free(oldhspentry);
2320 				}
2321 			}
2322 			if ((*deventry)->devicesname)
2323 				free((*deventry)->devicesname);
2324 			free((*deventry)->devname);
2325 			free (*deventry);
2326 			*deventry = olddeventry;
2327 		}
2328 	}
2329 }
2330 
2331 /*
2332  *      hash()
2333  *
2334  *	A rotating hashing function that converts a string 's' to an index
2335  *      in a hash table of size 'h'.
2336  *
2337  *      Input:
2338  *		uint32_t	h		hash table size
2339  *		char		*s		string to be hashed
2340  *      Return:
2341  *		uint32_t	hash value
2342  *      Locking: None
2343  */
2344 static uint32_t
2345 hash(uint32_t h, char *s)
2346 {
2347 
2348 	int	len;
2349 	int	hash, i;
2350 
2351 	len = strlen(s);
2352 
2353 	for (hash = len, i = 0; i < len; ++i) {
2354 		hash = (hash<<4)^(hash>>28)^s[i];
2355 	}
2356 	return (hash % h);
2357 }
2358 
2359 /*
2360  *      svm_register_device()
2361  *
2362  *      Register a device
2363  *
2364  *      Input:
2365  *		rcm_handle_t	*hd		rcm handle
2366  *		char		*devname	device name
2367  *      Return: None
2368  *      Locking: None
2369  */
2370 static void
2371 svm_register_device(rcm_handle_t *hd, char *devname)
2372 {
2373 	/* Sanity check */
2374 	if (devname == NULL)
2375 		return;
2376 
2377 	rcm_log_message(RCM_TRACE1, "SVM: Registering %s(%d)\n", devname,
2378 		devname);
2379 
2380 	if (rcm_register_interest(hd, devname, 0, NULL) != RCM_SUCCESS) {
2381 		rcm_log_message(RCM_ERROR,
2382 		    gettext("SVM: failed to register \"%s\"\n"), devname);
2383 	}
2384 }
2385 
2386 /*
2387  *      add_dep()
2388  *
2389  *      Add an entry to an array of dependent names for a device. Used to
2390  *      build an array to call the rcm framework with when passing on a
2391  *      DR request.
2392  *
2393  *      Input:
2394  *		int		*ndeps		ptr to current number of deps
2395  *		char		***depsp	ptr to current dependent array
2396  *		deventry_t	*deventry	deventry of device to be added
2397  *      Output:
2398  *		int		*ndeps		ptr to updated no of deps
2399  *		char		***depsp	ptr to new dependant array
2400  *      Return:
2401  *		int		0, of ok, -1 if failed to allocate memory
2402  *      Locking: None
2403  */
2404 static int
2405 add_dep(int *ndeps, char ***depsp, deventry_t *deventry)
2406 {
2407 	char	**deps_new;
2408 
2409 	*ndeps += 1;
2410 	deps_new = realloc(*depsp, ((*ndeps) + 1) * sizeof (char  *));
2411 	if (deps_new == NULL) {
2412 		rcm_log_message(RCM_ERROR,
2413 		    gettext("SVM: cannot allocate dependent array (%s).\n"),
2414 		    strerror(errno));
2415 		return (-1);
2416 	}
2417 	deps_new[(*ndeps-1)] = deventry->devname;
2418 	deps_new[(*ndeps)] = NULL;
2419 	*depsp = deps_new;
2420 	return (0);
2421 }
2422 
2423 
2424 /*
2425  *      get_dependent()
2426  *
2427  *      Create a list of all dependents of a device
2428  *      Do not add dependent if it is marked as removed
2429  *
2430  *      Input:
2431  *		deventry_t	*deventry	device entry
2432  *      Output:
2433  *		char		***dependentsp	pty to dependent list
2434  *      Return:
2435  *		int		0, if ok, -1 if failed
2436  *      Locking: None
2437  */
2438 static int
2439 get_dependents(deventry_t *deventry, char *** dependentsp)
2440 {
2441 	int		ndeps = 0;
2442 	deventry_t	*dependent;
2443 	char		**deps = NULL;
2444 
2445 
2446 	dependent = deventry->dependent;
2447 	if (dependent == NULL) {
2448 		*dependentsp = NULL;
2449 		return (0);
2450 	}
2451 	while (dependent != NULL) {
2452 		/*
2453 		 * do not add dependent if we have
2454 		 * already received a remove notifification
2455 		 */
2456 		if (!(dependent->flags&REMOVED))
2457 			if (add_dep(&ndeps, &deps, dependent) < 0)
2458 				return (-1);
2459 		dependent = dependent->next_dep;
2460 	}
2461 	if (ndeps == 0) {
2462 		*dependentsp = NULL;
2463 	} else {
2464 		*dependentsp = deps;
2465 	}
2466 	return (0);
2467 }
2468 
2469 /*
2470  *      add_to_usage()
2471  *      Add string to the usage string pointed at by usagep. Allocate memory
2472  *      for the new usage string and free the memory used by the original
2473  *      usage string
2474  *
2475  *      Input:
2476  *		char	**usagep	ptr to usage string
2477  *		char	*string		string to be added to usage
2478  *      Return:
2479  *		char	ptr to new usage string
2480  *      Locking: None
2481  */
2482 char *
2483 add_to_usage(char ** usagep, char *string)
2484 {
2485 	int	len;
2486 	char	*new_usage = NULL;
2487 
2488 	if (*usagep == NULL) {
2489 		len = 0;
2490 	} else {
2491 		len = strlen(*usagep) + 2; /* allow space for comma */
2492 	}
2493 	len += strlen(string) + 1;
2494 	if (new_usage = calloc(1, len)) {
2495 		if (*usagep) {
2496 			(void) strcpy(new_usage, *usagep);
2497 			free(*usagep);
2498 			(void) strcat(new_usage, ", ");
2499 		}
2500 		(void) strcat(new_usage, string);
2501 	}
2502 	return (new_usage);
2503 }
2504 
2505 /*
2506  *      add_to_usage_fmt()
2507  *
2508  *      Add a formatted string , of the form "blah %s" to the usage string
2509  *      pointed at by usagep. Allocate memory for the new usage string and free
2510  *      the memory used by the original usage string.
2511  *
2512  *      Input:
2513  *		char		**usagep	ptr to current usage string
2514  *		char		*fmt		format string
2515  *		char		*string		string to be added
2516  *      Return:
2517  *		char*		new usage string
2518  *      Locking: None
2519  */
2520 /*PRINTFLIKE2*/
2521 char *
2522 add_to_usage_fmt(char **usagep, char *fmt, char *string)
2523 {
2524 	int	len;
2525 	char	*usage;
2526 	char	*new_usage = NULL;
2527 
2528 	len = strlen(fmt)
2529 	    + strlen(string) + 1;
2530 	if (usage = calloc(1, len)) {
2531 		(void) sprintf(usage, fmt, string);
2532 		new_usage = add_to_usage(usagep, usage);
2533 		free(usage);
2534 	}
2535 	return (new_usage);
2536 }
2537 
2538 /*
2539  *      is_open()
2540  *
2541  *      Make ioctl call to find if a device is open
2542  *
2543  *      Input:
2544  *		dev_t 		devkey	dev_t for device
2545  *      Return:
2546  *		int		0 if not open,  !=0 if open
2547  *      Locking: None
2548  */
2549 static int
2550 is_open(dev_t devkey)
2551 {
2552 	int		fd;
2553 	md_isopen_t	isopen_ioc;
2554 
2555 	/* Open admin device */
2556 	if ((fd = open(ADMSPECIAL, O_RDONLY, 0)) < 0) {
2557 		rcm_log_message(RCM_ERROR, MSG_OPENERR, ADMSPECIAL);
2558 		return (0);
2559 	}
2560 
2561 	(void) memset(&isopen_ioc, 0, sizeof (isopen_ioc));
2562 	isopen_ioc.dev = devkey;
2563 	if (ioctl(fd, MD_IOCISOPEN, &isopen_ioc) < 0) {
2564 		(void) close(fd);
2565 		return (0);
2566 	}
2567 	(void) close(fd);
2568 	return (isopen_ioc.isopen);
2569 }
2570 
2571 /*
2572  *	check_softpart()
2573  *
2574  *	Check the status of the passed in device within the softpartition.
2575  *
2576  *	Input:
2577  *		mdsetname_t *	the name of the set
2578  *		mdname_t *	the softpartition device that is being examined
2579  *		char *		the device which needs to be checked
2580  *		md_error_t *	error pointer (not used)
2581  *	Return:
2582  *		int		REDUNDANT    - device is redundant and can be
2583  *					       removed
2584  *				NOTREDUNDANT - device cannot be removed
2585  *				NOTINDEVICE  - device is not part of this
2586  *					       component
2587  */
2588 static int
2589 check_softpart(mdsetname_t *sp, mdname_t *np, char *uname, md_error_t *ep)
2590 {
2591 	md_sp_t	*softp = NULL;
2592 
2593 	rcm_log_message(RCM_TRACE1, "SVM: softpart checking %s %s\n",
2594 	    np->bname, uname);
2595 
2596 	softp = meta_get_sp(sp, np, ep);
2597 
2598 	/* softp cannot be NULL, if it is then the RCM cache is corrupt */
2599 	assert(softp != NULL);
2600 
2601 	/*
2602 	 * if the softpartition is not a parent then nothing can be done, user
2603 	 * must close the device and then fix the under lying devices.
2604 	 */
2605 	if (!(MD_HAS_PARENT(softp->common.parent))) {
2606 		rcm_log_message(RCM_TRACE1,
2607 		    "SVM: softpart is a top level device\n");
2608 		return (NOTREDUNDANT);
2609 	}
2610 
2611 	if (strcmp(softp->compnamep->bname, uname) != 0) {
2612 		/*
2613 		 * This can occur if this function has been called by the
2614 		 * check_raid5 code as it is cycling through each column
2615 		 * in turn.
2616 		 */
2617 		rcm_log_message(RCM_TRACE1,
2618 		    "SVM: %s is not in softpart (%s)\n",
2619 		    uname, softp->compnamep->bname);
2620 		return (NOTINDEVICE);
2621 	}
2622 
2623 	/*
2624 	 * Check the status of the soft partition this only moves from
2625 	 * an okay state if the underlying devices fails while the soft
2626 	 * partition is open.
2627 	 */
2628 	if (softp->status != MD_SP_OK) {
2629 		rcm_log_message(RCM_TRACE1,
2630 		    "SVM: softpart is broken (state: 0x%x)\n",
2631 		    softp->status);
2632 		return (REDUNDANT);
2633 	}
2634 
2635 	return (NOTREDUNDANT);
2636 }
2637 
2638 /*
2639  *	check_raid5()
2640  *
2641  *	Check the status of the passed in device within the raid5 in question.
2642  *
2643  *	Input:
2644  *		mdsetname_t *	the name of the set
2645  *		mdname_t *	the raid5 device that is being examined
2646  *		char *		the device which needs to be checked
2647  *		md_error_t *	error pointer (not used)
2648  *	Return:
2649  *		int		REDUNDANT    - device is redundant and can be
2650  *					       removed
2651  *				NOTREDUNDANT - device cannot be removed
2652  */
2653 static int
2654 check_raid5(mdsetname_t *sp, mdname_t *np, char *uname, md_error_t *ep)
2655 {
2656 	md_raid_t	*raidp = NULL;
2657 	md_raidcol_t	*colp = NULL;
2658 	int		i;
2659 	int		rval = 0;
2660 
2661 	rcm_log_message(RCM_TRACE1, "SVM: raid5 checking %s %s\n",
2662 	    np->bname, uname);
2663 
2664 	raidp = meta_get_raid(sp, np, ep);
2665 
2666 	/* raidp cannot be NULL, if it is then the RCM cache is corrupt */
2667 	assert(raidp != NULL);
2668 
2669 	/*
2670 	 * Now check each column in the device. We cannot rely upon the state
2671 	 * of the device because if a hotspare is in use all the states are
2672 	 * set to Okay, both at the metadevice layer and the column layer.
2673 	 */
2674 	for (i = 0; (i < raidp->cols.cols_len); i++) {
2675 		colp = &raidp->cols.cols_val[i];
2676 		np = colp->colnamep;
2677 
2678 		rcm_log_message(RCM_TRACE1,
2679 		    "SVM: raid5 checking %s state %s 0x%x\n",
2680 		    np->bname, raid_col_state_to_name(colp, NULL, 0),
2681 		    colp->state);
2682 
2683 		/*
2684 		 * It is possible for the column to be a softpartition,
2685 		 * so need to check the softpartiton if this is the
2686 		 * case. It is *not* valid for the column to be a
2687 		 * stripe/concat/mirror, and so no check to see what
2688 		 * type of metadevice is being used.
2689 		 */
2690 		if (metaismeta(np)) {
2691 			/* this is a metadevice ie a softpartiton */
2692 			rval = check_softpart(sp, np, uname, ep);
2693 			if (rval == REDUNDANT) {
2694 				rcm_log_message(RCM_TRACE1,
2695 				    "SVM: raid5 %s is broken\n", uname);
2696 				meta_invalidate_name(np);
2697 				return (REDUNDANT);
2698 			} else if (rval == NOTREDUNDANT &&
2699 			    colp->hsnamep != NULL) {
2700 				rcm_log_message(RCM_TRACE1,
2701 				    "SVM: raid5 device is broken, hotspared\n");
2702 				meta_invalidate_name(np);
2703 				return (REDUNDANT);
2704 			}
2705 			meta_invalidate_name(np);
2706 			continue;
2707 		}
2708 		meta_invalidate_name(np);
2709 
2710 		if (strcmp(uname, np->bname) != 0)
2711 			continue;
2712 
2713 		/*
2714 		 * Found the device. Check if it is broken or hotspared.
2715 		 */
2716 		if (colp->state & RUS_ERRED) {
2717 			rcm_log_message(RCM_TRACE1,
2718 			    "SVM: raid5 column device is broken\n");
2719 			return (REDUNDANT);
2720 		}
2721 
2722 		if (colp->hsnamep != NULL) {
2723 			rcm_log_message(RCM_TRACE1,
2724 			    "SVM: raid5 column device is broken, hotspared\n");
2725 			return (REDUNDANT);
2726 		}
2727 	}
2728 	return (NOTREDUNDANT);
2729 }
2730 
2731 /*
2732  *	check_stripe()
2733  *
2734  *	Check the status of the passed in device within the stripe in question.
2735  *
2736  *	Input:
2737  *		mdsetname_t *	the name of the set
2738  *		mdname_t *	the stripe that is being examined
2739  *		char *		the device which needs to be checked
2740  *		md_error_t *	error pointer (not used)
2741  *	Return:
2742  *		int		REDUNDANT    - device is redundant and can be
2743  *					       removed
2744  *				NOTREDUNDANT - device cannot be removed
2745  *				NOTINDEVICE  - device is not part of this
2746  *					       component
2747  */
2748 static int
2749 check_stripe(mdsetname_t *sp, mdname_t *np, char *uname, md_error_t *ep)
2750 {
2751 	md_stripe_t	*stripep = NULL;
2752 	md_row_t	*mrp = NULL;
2753 	md_comp_t	*mcp;
2754 	mdname_t	*pnp;
2755 	char		*miscname;
2756 	int		row;
2757 	int		col;
2758 
2759 	rcm_log_message(RCM_TRACE1, "SVM: concat/stripe checking %s %s\n",
2760 	    np->bname, uname);
2761 	stripep = meta_get_stripe(sp, np, ep);
2762 
2763 	/* stripep cannot be NULL, if it is then the RCM cache is corrupt */
2764 	assert(stripep != NULL);
2765 
2766 	/*
2767 	 * If the stripe is not a parent then nothing can be done, user
2768 	 * must close the device and then fix the devices.
2769 	 */
2770 	if (!(MD_HAS_PARENT(stripep->common.parent))) {
2771 		rcm_log_message(RCM_TRACE1,
2772 		    "SVM: stripe is a top level device\n");
2773 		return (NOTREDUNDANT);
2774 	}
2775 
2776 	pnp = metamnumname(&sp, stripep->common.parent, 0, ep);
2777 
2778 	if (pnp == NULL) {
2779 		/*
2780 		 * Only NULL when the replicas are in an inconsistant state
2781 		 * ie the device says it is the parent of X but X does not
2782 		 * exist.
2783 		 */
2784 		rcm_log_message(RCM_TRACE1, "SVM: parent is not configured\n");
2785 		return (NOTREDUNDANT);
2786 	}
2787 
2788 	/*
2789 	 * Get the type of the parent and make sure that it is a mirror,
2790 	 * if it is then need to find out the number of submirrors, and
2791 	 * if it is not a mirror then this is not a REDUNDANT device.
2792 	 */
2793 	if ((miscname = metagetmiscname(pnp, ep)) == NULL) {
2794 		/*
2795 		 * Again something is wrong with the configuration.
2796 		 */
2797 		rcm_log_message(RCM_TRACE1,
2798 		    "SVM: unable to find the type of %s\n", pnp->cname);
2799 		meta_invalidate_name(pnp);
2800 		return (NOTREDUNDANT);
2801 	}
2802 
2803 	if (!(strcmp(miscname, MD_MIRROR) == 0 &&
2804 	    check_mirror(sp, pnp, ep) == REDUNDANT)) {
2805 		rcm_log_message(RCM_TRACE1,
2806 		    "SVM: %s is a %s and not redundant\n",
2807 		    pnp->cname, miscname);
2808 		meta_invalidate_name(pnp);
2809 		return (NOTREDUNDANT);
2810 	}
2811 
2812 	meta_invalidate_name(pnp);
2813 
2814 	for (row = 0; row < stripep->rows.rows_len; row++) {
2815 		mrp = &stripep->rows.rows_val[row];
2816 
2817 		/* now the components in the row */
2818 		for (col = 0; col < mrp->comps.comps_len; col++) {
2819 			mcp = &mrp->comps.comps_val[col];
2820 
2821 			rcm_log_message(RCM_TRACE1,
2822 			    "SVM: stripe comp %s check\n",
2823 			    mcp->compnamep->bname);
2824 
2825 			if (strcmp(mcp->compnamep->bname, uname) != 0)
2826 				continue;
2827 
2828 			rcm_log_message(RCM_TRACE1,
2829 			    "SVM: component state: %s\n",
2830 			    comp_state_to_name(mcp, NULL, 0));
2831 
2832 			if (mcp->hsnamep != NULL) {
2833 				/* device is broken and hotspared */
2834 				rcm_log_message(RCM_TRACE1,
2835 				    "SVM: stripe %s broken, hotspare active\n",
2836 				    uname);
2837 				return (REDUNDANT);
2838 			}
2839 
2840 			/*
2841 			 * LAST_ERRED is a special case.  If the state of a
2842 			 * component is CS_LAST_ERRED then this is the last
2843 			 * copy of the data and we need to keep using it, even
2844 			 * though we had errors.  Thus, we must block the DR
2845 			 * request.  If you follow the documented procedure for
2846 			 * fixing each component (fix devs in maintenance
2847 			 * before last erred) then the mirror will
2848 			 * automatically transition Last Erred components to
2849 			 * the Erred state after which they can be DRed out.
2850 			 */
2851 			if (mcp->state == CS_ERRED) {
2852 				/* device is broken */
2853 				rcm_log_message(RCM_TRACE1,
2854 				    "SVM: stripe %s is broken\n", uname);
2855 				return (REDUNDANT);
2856 			}
2857 
2858 			/*
2859 			 * Short circuit - if here the component has been
2860 			 * found in the column so no further processing is
2861 			 * required here.
2862 			 */
2863 			return (NOTREDUNDANT);
2864 		}
2865 	}
2866 
2867 	/*
2868 	 * Only get to this point if the device (uname) has not been
2869 	 * found in the stripe. This means that there is something
2870 	 * wrong with the device dependency list.
2871 	 */
2872 	rcm_log_message(RCM_TRACE1,
2873 	    "SVM: component %s is not part of %s\n",
2874 	    uname, np->bname);
2875 
2876 	return (NOTINDEVICE);
2877 }
2878 
2879 /*
2880  *	check_mirror()
2881  *
2882  *	Make sure that the mirror > 1 submirror.
2883  *
2884  *	Input:
2885  *		mdsetname_t *	the name of the set
2886  *		mdname_t *	the stripe that is being examined
2887  *	Return:
2888  *		int		REDUNDANT    - mirror > 1 submirrors
2889  *				NOTREDUNDANT - mirror has 1 submirror
2890  */
2891 static int
2892 check_mirror(mdsetname_t *sp, mdname_t *np, md_error_t *ep)
2893 {
2894 	uint_t		nsm = 0;	/* number of submirrors */
2895 	uint_t		smi = 0;	/* index into submirror array */
2896 	md_mirror_t	*mirrorp = NULL;
2897 
2898 	rcm_log_message(RCM_TRACE1, "SVM: mirror checking %s\n", np->bname);
2899 	mirrorp = meta_get_mirror(sp, np, ep);
2900 
2901 	/* mirrorp cannot be NULL, if it is then the RCM cache is corrupt */
2902 	assert(mirrorp != NULL);
2903 
2904 	/*
2905 	 * Need to check how many submirrors that the mirror has.
2906 	 */
2907 	for (smi = 0, nsm = 0; (smi < NMIRROR); ++smi) {
2908 		md_submirror_t	*mdsp = &mirrorp->submirrors[smi];
2909 		mdname_t	*submirnamep = mdsp->submirnamep;
2910 
2911 		/* Is this submirror being used ?  No, then continue */
2912 		if (submirnamep == NULL)
2913 			continue;
2914 		nsm++;
2915 	}
2916 
2917 	/*
2918 	 * If there is only one submirror then there is no redundancy
2919 	 * in the configuration and the user needs to take some other
2920 	 * action before using cfgadm on the device ie close the metadevice.
2921 	 */
2922 	if (nsm == 1) {
2923 		rcm_log_message(RCM_TRACE1,
2924 		    "SVM: only one submirror unable to allow action\n");
2925 		return (NOTREDUNDANT);
2926 	}
2927 
2928 	return (REDUNDANT);
2929 }
2930 
2931 /*
2932  *	check_device()
2933  *
2934  *	Check the current status of the underlying device.
2935  *
2936  *	Input:
2937  *		deventry_t *	the device that is being checked
2938  *	Return:
2939  *		int		REDUNDANT    - device is redundant and can be
2940  *					       removed
2941  *				NOTREDUNDANT - device cannot be removed
2942  *	Locking:
2943  *		None
2944  *
2945  * The check_device code path (the functions called by check_device) use
2946  * libmeta calls directly to determine if the specified device is
2947  * redundant or not.  The can lead to conflicts between data cached in
2948  * libmeta and data that is being cached by this rcm module.  Since the
2949  * rcm cache is our primary source of information here, we need to make
2950  * sure that we are not getting stale data from the libmeta caches.
2951  * We use meta_invalidate_name throughout this code path to clear the
2952  * cached data in libmeta in order to ensure that we are not using stale data.
2953  */
2954 static int
2955 check_device(deventry_t *deventry)
2956 {
2957 	mdsetname_t	*sp;
2958 	md_error_t	error = mdnullerror;
2959 	char		sname[BUFSIZ+1];
2960 	mdname_t	*np;
2961 	deventry_t	*dependent;
2962 	int		rval = NOTREDUNDANT;
2963 	int		ret;
2964 
2965 	dependent = deventry->dependent;
2966 
2967 	rcm_log_message(RCM_TRACE1, "SVM: check_device(%s)\n",
2968 	    deventry->devname);
2969 	/*
2970 	 * should not be null because the caller has already figured out
2971 	 * there are dependent devices.
2972 	 */
2973 	assert(dependent != NULL);
2974 
2975 	do {
2976 
2977 		rcm_log_message(RCM_TRACE1, "SVM: check dependent: %s\n",
2978 		    dependent->devname);
2979 
2980 		if (dependent->flags & REMOVED) {
2981 			dependent = dependent->next_dep;
2982 			continue;
2983 		}
2984 
2985 		/*
2986 		 * The device *should* be a metadevice and so need to see if
2987 		 * it contains a setname.
2988 		 */
2989 		ret = sscanf(dependent->devname,
2990 		    "/dev/md/%" VAL2STR(BUFSIZ) "[^/]/dsk/",
2991 		    sname);
2992 
2993 		if (ret != 1)
2994 			(void) strcpy(sname, MD_LOCAL_NAME);
2995 
2996 		if ((sp = metasetname(sname, &error)) == NULL) {
2997 			rcm_log_message(RCM_TRACE1,
2998 			    "SVM: unable to get setname for \"%s\", error %s\n",
2999 			    sname, mde_sperror(&error, ""));
3000 			break;
3001 		}
3002 
3003 		rcm_log_message(RCM_TRACE1, "SVM: processing: %s\n",
3004 		    dependent->devname);
3005 
3006 		np = metaname(&sp, dependent->devname, META_DEVICE, &error);
3007 
3008 		switch (dependent->devtype) {
3009 		case SVM_TRANS:
3010 			/*
3011 			 * No code to check trans devices because ufs logging
3012 			 * should be being used.
3013 			 */
3014 			rcm_log_message(RCM_TRACE1,
3015 			    "SVM: Use UFS logging instead of trans devices\n");
3016 			break;
3017 		case SVM_SLICE:
3018 		case SVM_STRIPE:
3019 		case SVM_CONCAT:
3020 			rval = check_stripe(sp, np, deventry->devname, &error);
3021 			break;
3022 		case SVM_MIRROR:
3023 			/*
3024 			 * No check here as this is performed by the one
3025 			 * above when the submirror is checked.
3026 			 */
3027 			rcm_log_message(RCM_TRACE1,
3028 			    "SVM: Mirror check is done by the stripe check\n");
3029 			break;
3030 		case SVM_RAID:
3031 			/*
3032 			 * Raid5 devices can be built on soft partitions or
3033 			 * slices and so the check here is for the raid5
3034 			 * device built on top of slices. Note, a raid5 cannot
3035 			 * be built on a stripe/concat.
3036 			 */
3037 			rval = check_raid5(sp, np, deventry->devname, &error);
3038 			break;
3039 		case SVM_SOFTPART:
3040 			/*
3041 			 * Raid5 devices can be built on top of soft partitions
3042 			 * and so they have to be checked.
3043 			 */
3044 			rval = check_softpart(sp, np, deventry->devname,
3045 			    &error);
3046 			break;
3047 		default:
3048 			rcm_log_message(RCM_TRACE1,
3049 			    "SVM: unknown devtype: %d\n", dependent->devtype);
3050 			break;
3051 		}
3052 
3053 		meta_invalidate_name(np);
3054 
3055 		if (rval == REDUNDANT)
3056 			break;
3057 	} while ((dependent = dependent->next_dep) != NULL);
3058 
3059 	rcm_log_message(RCM_TRACE1, "SVM: check_device return %d\n", rval);
3060 	return (rval);
3061 }
3062 
3063 /*
3064  *	svm_unregister_device
3065  *
3066  *	Unregister the device specified by the deventry
3067  *
3068  *	Input:
3069  *		rcm_handle_t *	information for RCM
3070  *		deventry_t *	description of the device to be
3071  *				unregistered
3072  *
3073  *	Return:
3074  *		int		0	- successfully unregistered
3075  *				!= 0	- failed to unregister
3076  *
3077  *	Locking:
3078  *		None
3079  *
3080  * If the deventry_t has a devicesname, we will first attempt to unregister
3081  * using that name.  If that fails then we'll attempt to unregister using
3082  * devname.  The reason for this strategy has to do with the way that
3083  * rcm_register_interest works.  If passed a /dev/ name,
3084  * rcm_register_interest uses realpath() to convert it to a /devices name.
3085  * Thus, we are more likely to succeed if we use devicesname first.
3086  */
3087 
3088 static int
3089 svm_unregister_device(rcm_handle_t *hd, deventry_t *d)
3090 {
3091 	int	deleted;
3092 
3093 	if (d->devicesname) {
3094 		rcm_log_message(RCM_TRACE1, "SVM: unregister_device %s (%s)\n",
3095 			d->devname, d->devicesname);
3096 	} else {
3097 		rcm_log_message(RCM_TRACE1, "SVM: unregister_device %s\n",
3098 			d->devname);
3099 	}
3100 	deleted = -1;
3101 	if (d->devicesname != NULL) {
3102 		/*
3103 		 * Try to unregister via the /devices entry first.  RCM
3104 		 * converts /dev/ entries to /devices entries before
3105 		 * storing them.  Thus, if this item has a /devices name
3106 		 * available, we should use it for unregistering.
3107 		 */
3108 		deleted = rcm_unregister_interest(hd,
3109 			d->devicesname, 0);
3110 	}
3111 	if (deleted != 0) {
3112 		/*
3113 		 * Either we did not have a /devices name or the attempt to
3114 		 * unregister using the /devices name failed.  Either way
3115 		 * we'll now try to unregister using the conventional name.
3116 		 */
3117 		deleted = rcm_unregister_interest(hd, d->devname, 0);
3118 	}
3119 	if (deleted != 0) {
3120 		rcm_log_message(RCM_TRACE1, "SVM: unregister_device failed "
3121 			"for %s\n", d->devname);
3122 	}
3123 	return (deleted);
3124 }
3125