13ccda647Slclee /* 23ccda647Slclee * CDDL HEADER START 33ccda647Slclee * 43ccda647Slclee * The contents of this file are subject to the terms of the 5e8fb11a1Sshidokht * Common Development and Distribution License (the "License"). 6e8fb11a1Sshidokht * You may not use this file except in compliance with the License. 73ccda647Slclee * 83ccda647Slclee * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 93ccda647Slclee * or http://www.opensolaris.org/os/licensing. 103ccda647Slclee * See the License for the specific language governing permissions 113ccda647Slclee * and limitations under the License. 123ccda647Slclee * 133ccda647Slclee * When distributing Covered Code, include this CDDL HEADER in each 143ccda647Slclee * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 153ccda647Slclee * If applicable, add the following below this CDDL HEADER, with the 163ccda647Slclee * fields enclosed by brackets "[]" replaced with your own identifying 173ccda647Slclee * information: Portions Copyright [yyyy] [name of copyright owner] 183ccda647Slclee * 193ccda647Slclee * CDDL HEADER END 203ccda647Slclee */ 213ccda647Slclee /* 227f0b8309SEdward Pilatowicz * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 233ccda647Slclee * Use is subject to license terms. 243ccda647Slclee */ 253ccda647Slclee 263ccda647Slclee #ifndef _SYS_CMLB_H 273ccda647Slclee #define _SYS_CMLB_H 283ccda647Slclee 293ccda647Slclee #ifdef __cplusplus 303ccda647Slclee extern "C" { 313ccda647Slclee #endif 323ccda647Slclee 333ccda647Slclee #include <sys/dktp/fdisk.h> 343ccda647Slclee 353ccda647Slclee /* 363ccda647Slclee * structure used for getting phygeom and virtgeom from target driver 373ccda647Slclee */ 383ccda647Slclee typedef struct cmlb_geom { 393ccda647Slclee unsigned int g_ncyl; 403ccda647Slclee unsigned short g_acyl; 413ccda647Slclee unsigned short g_nhead; 423ccda647Slclee unsigned short g_nsect; 433ccda647Slclee unsigned short g_secsize; 443ccda647Slclee diskaddr_t g_capacity; 453ccda647Slclee unsigned short g_intrlv; 463ccda647Slclee unsigned short g_rpm; 473ccda647Slclee } cmlb_geom_t; 483ccda647Slclee 493ccda647Slclee 503ccda647Slclee typedef struct tg_attribute { 513ccda647Slclee int media_is_writable; 52*b081f1c4Syu, larry liu - Sun Microsystems - Beijing China int media_is_solid_state; 533ccda647Slclee } tg_attribute_t; 543ccda647Slclee 553ccda647Slclee 563ccda647Slclee 57e8fb11a1Sshidokht /* bit definitions for alter_behavior passed to cmlb_attach */ 583ccda647Slclee 593ccda647Slclee #define CMLB_CREATE_ALTSLICE_VTOC_16_DTYPE_DIRECT 0x00000001 603ccda647Slclee #define CMLB_FAKE_GEOM_LABEL_IOCTLS_VTOC8 0x00000002 61e8fb11a1Sshidokht #define CMLB_OFF_BY_ONE 0x00000004 62843e1988Sjohnlev #define CMLB_FAKE_LABEL_ONE_PARTITION 0x00000008 6306bbe1e0Sedp #define CMLB_INTERNAL_MINOR_NODES 0x00000010 64e8fb11a1Sshidokht 65e8fb11a1Sshidokht /* bit definitions of flag passed to cmlb_validate */ 66e8fb11a1Sshidokht #define CMLB_SILENT 0x00000001 67e8fb11a1Sshidokht 68e8fb11a1Sshidokht /* version for tg_ops */ 69e8fb11a1Sshidokht #define TG_DK_OPS_VERSION_0 0 70e8fb11a1Sshidokht #define TG_DK_OPS_VERSION_1 1 71e8fb11a1Sshidokht 72e8fb11a1Sshidokht /* definitions for cmd passed to tg_rdwr */ 73e8fb11a1Sshidokht #define TG_READ 0 74e8fb11a1Sshidokht #define TG_WRITE 1 75e8fb11a1Sshidokht 76e8fb11a1Sshidokht /* definitions for cmd passed to tg_getinfo */ 77e8fb11a1Sshidokht #define TG_GETPHYGEOM 1 78e8fb11a1Sshidokht #define TG_GETVIRTGEOM 2 79e8fb11a1Sshidokht #define TG_GETCAPACITY 3 80e8fb11a1Sshidokht #define TG_GETBLOCKSIZE 4 81e8fb11a1Sshidokht #define TG_GETATTR 5 82e8fb11a1Sshidokht 833ccda647Slclee 843ccda647Slclee /* 853ccda647Slclee * Ops vector including utility functions into target driver that cmlb uses. 863ccda647Slclee */ 873ccda647Slclee typedef struct cmlb_tg_ops { 88e8fb11a1Sshidokht int tg_version; 89e8fb11a1Sshidokht 903ccda647Slclee /* 913ccda647Slclee * tg_rdwr: 923ccda647Slclee * perform read/write on target device associated with devi. 93e8fb11a1Sshidokht * 943ccda647Slclee * Arguments: 95e8fb11a1Sshidokht * 963ccda647Slclee * devi: pointer to device's dev_info structure. 97e8fb11a1Sshidokht * 983ccda647Slclee * cmd: operation to perform. 993ccda647Slclee * Possible values: TG_READ, TG_WRITE 100e8fb11a1Sshidokht * 1013ccda647Slclee * bufp: pointer to allocated buffer for transfer 102e8fb11a1Sshidokht * 1033ccda647Slclee * start_block: starting block number to read/write (based on 1043ccda647Slclee * system blocksize, DEV_BSIZE) 1053ccda647Slclee * 1063ccda647Slclee * reqlength: requested transfer length (in bytes) 1073ccda647Slclee * 108e8fb11a1Sshidokht * tg_cookie cookie from target driver to be passed back to 109e8fb11a1Sshidokht * target driver when we call back to it through 110e8fb11a1Sshidokht * tg_ops. 111e8fb11a1Sshidokht * 1123ccda647Slclee * Note: It is the responsibility of caller to make sure 1133ccda647Slclee * length of buffer pointed to by bufp is at least equal to 1143ccda647Slclee * requested transfer length 1153ccda647Slclee * 1163ccda647Slclee * Return values: 1173ccda647Slclee * 0 success 1183ccda647Slclee * ENOMEM can not allocate memory 1193ccda647Slclee * EACCESS reservation conflict 1203ccda647Slclee * EIO I/O error 1213ccda647Slclee * EFAULT copyin/copyout error 1223ccda647Slclee * ENXIO internal error/ invalid devi 1233ccda647Slclee * EINVAL invalid command value. 1243ccda647Slclee */ 1253ccda647Slclee int (*tg_rdwr)(dev_info_t *devi, uchar_t cmd, void *bufp, 126e8fb11a1Sshidokht diskaddr_t start_block, size_t reqlength, void *tg_cookie); 1273ccda647Slclee 1283ccda647Slclee /* 129e8fb11a1Sshidokht * tg_getinfo: 1303ccda647Slclee * Report the information requested on device/media and 131e8fb11a1Sshidokht * store the requested info in area pointed to by arg. 1323ccda647Slclee * 1333ccda647Slclee * Arguments: 1343ccda647Slclee * devi: pointer to device's dev_info structure. 135e8fb11a1Sshidokht * 136e8fb11a1Sshidokht * cmd: operation to perform 137e8fb11a1Sshidokht * 138e8fb11a1Sshidokht * arg: arg for the operation for result. 139e8fb11a1Sshidokht * 140e8fb11a1Sshidokht * tg_cookie cookie from target driver to be passed back to 141e8fb11a1Sshidokht * target driver when we call back to it through 142e8fb11a1Sshidokht * tg_ops. 143e8fb11a1Sshidokht * 144e8fb11a1Sshidokht * Possible commands and the interpretation of arg: 145e8fb11a1Sshidokht * 146e8fb11a1Sshidokht * cmd: 147e8fb11a1Sshidokht * TG_GETPHYGEOM 148e8fb11a1Sshidokht * Obtain raw physical geometry from target, 149e8fb11a1Sshidokht * and store in structure pointed to by arg, 150e8fb11a1Sshidokht * a cmlb_geom_t structure. 151e8fb11a1Sshidokht * 152e8fb11a1Sshidokht * TG_GETVIRTGEOM: 153e8fb11a1Sshidokht * Obtain HBA geometry for the target and 154e8fb11a1Sshidokht * store in struct pointed to by arg, 155e8fb11a1Sshidokht * a cmlb_geom_t structure. 156e8fb11a1Sshidokht * 157e8fb11a1Sshidokht * TG_GETCAPACITY: 158e8fb11a1Sshidokht * Report the capacity of the target (in system 159e8fb11a1Sshidokht * blocksize (DEV_BSIZE) and store in the 160e8fb11a1Sshidokht * space pointed to by arg, a diskaddr_t. 161e8fb11a1Sshidokht * 162e8fb11a1Sshidokht * TG_GETBLOCKSIZE: 163e8fb11a1Sshidokht * Report the block size of the target 164e8fb11a1Sshidokht * in the space pointed to by arg, a uint32_t. 165e8fb11a1Sshidokht * 166e8fb11a1Sshidokht * TG_GETATTR: 167e8fb11a1Sshidokht * Report the information requested on 168e8fb11a1Sshidokht * device/media and store in area pointed to by 169e8fb11a1Sshidokht * arg, a tg_attribute_t structure. 170e8fb11a1Sshidokht * Return values: 1713ccda647Slclee * 1723ccda647Slclee * Return values: 1733ccda647Slclee * 0 success 174e8fb11a1Sshidokht * 1753ccda647Slclee * EACCESS reservation conflict 1763ccda647Slclee * 1773ccda647Slclee * ENXIO internal error/invalid devi 178e8fb11a1Sshidokht * 179e8fb11a1Sshidokht * EINVAL When command is TG_GETPHYGEOM or 180e8fb11a1Sshidokht * TG_GETVIRTGEOM, or TG_GETATTR, this return code 181e8fb11a1Sshidokht * indicates the operation is not applicable to 182e8fb11a1Sshidokht * target. 183e8fb11a1Sshidokht * In case of TG_GETCAP, this return code 184e8fb11a1Sshidokht * indicates no media in the drive. 185e8fb11a1Sshidokht * 186b9ccdc5aScth * EIO An error occurred during obtaining info 187e8fb11a1Sshidokht * from device/media. 188e8fb11a1Sshidokht * 189e8fb11a1Sshidokht * ENOTSUP In case of TG_GETCAP, target does not 190e8fb11a1Sshidokht * support getting capacity info. 191e8fb11a1Sshidokht * 192e8fb11a1Sshidokht * ENOTTY Unknown command. 193e8fb11a1Sshidokht * 194e8fb11a1Sshidokht * 1953ccda647Slclee */ 196e8fb11a1Sshidokht int (*tg_getinfo)(dev_info_t *devi, int cmd, void *arg, 197e8fb11a1Sshidokht void *tg_cookie); 198e8fb11a1Sshidokht 1993ccda647Slclee } cmlb_tg_ops_t; 2003ccda647Slclee 2013ccda647Slclee 2023ccda647Slclee typedef struct __cmlb_handle *cmlb_handle_t; 2033ccda647Slclee 2043ccda647Slclee /* 2053ccda647Slclee * 2063ccda647Slclee * Functions exported from cmlb 2073ccda647Slclee * 2083ccda647Slclee * Note: Most these functions can callback to target driver through the 2093ccda647Slclee * tg_ops functions. Target driver should consider this for synchronization. 2103ccda647Slclee * Any functions that may adjust minor nodes should be called when 2113ccda647Slclee * the target driver ensures it is safe to do so. 2123ccda647Slclee */ 2133ccda647Slclee 2143ccda647Slclee /* 2153ccda647Slclee * cmlb_alloc_handle: 2163ccda647Slclee * 2173ccda647Slclee * Allocates a handle. 2183ccda647Slclee * 2193ccda647Slclee * Arguments: 2203ccda647Slclee * cmlbhandlep pointer to handle 2213ccda647Slclee * 2223ccda647Slclee * Notes: 2233ccda647Slclee * Allocates a handle and stores the allocated handle in the area 2243ccda647Slclee * pointed to by cmlbhandlep 2253ccda647Slclee * 2263ccda647Slclee * Context: 2273ccda647Slclee * Kernel thread only (can sleep). 2283ccda647Slclee */ 2293ccda647Slclee void 2303ccda647Slclee cmlb_alloc_handle(cmlb_handle_t *cmlbhandlep); 2313ccda647Slclee 2323ccda647Slclee 2333ccda647Slclee /* 2343ccda647Slclee * cmlb_attach: 2353ccda647Slclee * 2363ccda647Slclee * Attach handle to device, create minor nodes for device. 2373ccda647Slclee * 2383ccda647Slclee * 2393ccda647Slclee * Arguments: 2403ccda647Slclee * devi pointer to device's dev_info structure. 2413ccda647Slclee * tgopsp pointer to array of functions cmlb can use to callback 2423ccda647Slclee * to target driver. 2433ccda647Slclee * 2443ccda647Slclee * device_type Peripheral device type as defined in 2453ccda647Slclee * scsi/generic/inquiry.h 2463ccda647Slclee * 2473ccda647Slclee * is_removable whether or not device is removable. 2483ccda647Slclee * 249e8fb11a1Sshidokht * is_hotpluggable whether or not device is hotpluggable. 250e8fb11a1Sshidokht * 2513ccda647Slclee * node_type minor node type (as used by ddi_create_minor_node) 2523ccda647Slclee * 2533ccda647Slclee * alter_behavior 2543ccda647Slclee * bit flags: 2553ccda647Slclee * 2563ccda647Slclee * CMLB_CREATE_ALTSLICE_VTOC_16_DTYPE_DIRECT: create 2573ccda647Slclee * an alternate slice for the default label, if 2583ccda647Slclee * device type is DTYPE_DIRECT an architectures default 2593ccda647Slclee * label type is VTOC16. 2603ccda647Slclee * Otherwise alternate slice will no be created. 2613ccda647Slclee * 2623ccda647Slclee * 2633ccda647Slclee * CMLB_FAKE_GEOM_LABEL_IOCTLS_VTOC8: report a default 2643ccda647Slclee * geometry and label for DKIOCGGEOM and DKIOCGVTOC 2653ccda647Slclee * on architecture with VTOC 8 label types. 2663ccda647Slclee * 267e8fb11a1Sshidokht * CMLB_OFF_BY_ONE: do the workaround for legacy off-by- 268e8fb11a1Sshidokht * one bug in obtaining capacity (used for sd). 269e8fb11a1Sshidokht * 2703ccda647Slclee * 2713ccda647Slclee * cmlbhandle cmlb handle associated with device 2723ccda647Slclee * 273e8fb11a1Sshidokht * tg_cookie cookie from target driver to be passed back to target 274e8fb11a1Sshidokht * driver when we call back to it through tg_ops. 275e8fb11a1Sshidokht * 276e8fb11a1Sshidokht * cmlb does not interpret the values. It is currently 277e8fb11a1Sshidokht * used for sd to indicate whether retries are allowed 278e8fb11a1Sshidokht * on commands or not. e.g when cmlb entries are called 279e8fb11a1Sshidokht * from interrupt context on removable media, sd rather 280e8fb11a1Sshidokht * not have retries done. 281e8fb11a1Sshidokht * 282e8fb11a1Sshidokht * 283e8fb11a1Sshidokht * 2843ccda647Slclee * Notes: 2853ccda647Slclee * Assumes a default label based on capacity for non-removable devices. 2863ccda647Slclee * If capacity > 1TB, EFI is assumed otherwise VTOC (default VTOC 2873ccda647Slclee * for the architecture). 2883ccda647Slclee * For removable devices, default label type is assumed to be VTOC 2893ccda647Slclee * type. Create minor nodes based on a default label type. 2903ccda647Slclee * Label on the media is not validated. 2913ccda647Slclee * minor number consists of: 2923ccda647Slclee * if _SUNOS_VTOC_8 is defined 2933ccda647Slclee * lowest 3 bits is taken as partition number 2943ccda647Slclee * the rest is instance number 2953ccda647Slclee * if _SUNOS_VTOC_16 is defined 2963ccda647Slclee * lowest 6 bits is taken as partition number 2973ccda647Slclee * the rest is instance number 2983ccda647Slclee * 2993ccda647Slclee * 3003ccda647Slclee * Return values: 3013ccda647Slclee * 0 Success 3023ccda647Slclee * ENXIO creating minor nodes failed. 303e8fb11a1Sshidokht * EINVAL invalid arg, unsupported tg_ops version 3043ccda647Slclee * 3053ccda647Slclee */ 3063ccda647Slclee int 3073ccda647Slclee cmlb_attach(dev_info_t *devi, cmlb_tg_ops_t *tgopsp, int device_type, 3087f0b8309SEdward Pilatowicz boolean_t is_removable, boolean_t is_hotpluggable, char *node_type, 309e8fb11a1Sshidokht int alter_behavior, cmlb_handle_t cmlbhandle, void *tg_cookie); 3103ccda647Slclee 3113ccda647Slclee 3123ccda647Slclee /* 3133ccda647Slclee * cmlb_validate: 3143ccda647Slclee * 3153ccda647Slclee * Validates label. 3163ccda647Slclee * 3173ccda647Slclee * Arguments 3183ccda647Slclee * cmlbhandle cmlb handle associated with device. 3193ccda647Slclee * 320e8fb11a1Sshidokht * int flags 321e8fb11a1Sshidokht * currently used for verbosity control. 322e8fb11a1Sshidokht * CMLB_SILENT is the only current definition for it 323e8fb11a1Sshidokht * tg_cookie cookie from target driver to be passed back to target 324e8fb11a1Sshidokht * driver when we call back to it through tg_ops. 3253ccda647Slclee * Notes: 3263ccda647Slclee * If new label type is different from the current, adjust minor nodes 3273ccda647Slclee * accordingly. 3283ccda647Slclee * 3293ccda647Slclee * Return values: 3303ccda647Slclee * 0 success 3313ccda647Slclee * Note: having fdisk but no solaris partition is assumed 3323ccda647Slclee * success. 3333ccda647Slclee * 3343ccda647Slclee * ENOMEM memory allocation failed 3353ccda647Slclee * EIO i/o errors during read or get capacity 3363ccda647Slclee * EACCESS reservation conflicts 3373ccda647Slclee * EINVAL label was corrupt, or no default label was assumed 3383ccda647Slclee * ENXIO invalid handle 3393ccda647Slclee * 3403ccda647Slclee */ 3413ccda647Slclee int 342e8fb11a1Sshidokht cmlb_validate(cmlb_handle_t cmlbhandle, int flags, void *tg_cookie); 3433ccda647Slclee 3443ccda647Slclee /* 3453ccda647Slclee * cmlb_invalidate: 3463ccda647Slclee * Invalidate in core label data 3473ccda647Slclee * 3483ccda647Slclee * Arguments: 3493ccda647Slclee * cmlbhandle cmlb handle associated with device. 350e8fb11a1Sshidokht * tg_cookie cookie from target driver to be passed back to target 351e8fb11a1Sshidokht * driver when we call back to it through tg_ops. 3523ccda647Slclee */ 3533ccda647Slclee void 354e8fb11a1Sshidokht cmlb_invalidate(cmlb_handle_t cmlbhandle, void *tg_cookie); 3553ccda647Slclee 3563ccda647Slclee 357e8fb11a1Sshidokht 358e8fb11a1Sshidokht /* 359e8fb11a1Sshidokht * cmlb_is_valid 360e8fb11a1Sshidokht * Get status on whether the incore label/geom data is valid 361e8fb11a1Sshidokht * 362e8fb11a1Sshidokht * Arguments: 363e8fb11a1Sshidokht * cmlbhandle cmlb handle associated with device. 364e8fb11a1Sshidokht * 365e8fb11a1Sshidokht * Return values: 366e8fb11a1Sshidokht * TRUE if valid 367e8fb11a1Sshidokht * FALSE otherwise. 368e8fb11a1Sshidokht * 369e8fb11a1Sshidokht */ 3707f0b8309SEdward Pilatowicz boolean_t 371e8fb11a1Sshidokht cmlb_is_valid(cmlb_handle_t cmlbhandle); 372e8fb11a1Sshidokht 3733ccda647Slclee /* 3743ccda647Slclee * cmlb_partinfo: 3753ccda647Slclee * Get partition info for specified partition number. 3763ccda647Slclee * 3773ccda647Slclee * Arguments: 3783ccda647Slclee * cmlbhandle cmlb handle associated with device. 3793ccda647Slclee * part partition number 380e8fb11a1Sshidokht * driver when we call back to it through tg_ops. 3813ccda647Slclee * nblocksp pointer to number of blocks 3823ccda647Slclee * startblockp pointer to starting block 3833ccda647Slclee * partnamep pointer to name of partition 3843ccda647Slclee * tagp pointer to tag info 385e8fb11a1Sshidokht * tg_cookie cookie from target driver to be passed back to target 3863ccda647Slclee * 3873ccda647Slclee * Notes: 3883ccda647Slclee * If in-core label is not valid, this functions tries to revalidate 3893ccda647Slclee * the label. If label is valid, it stores the total number of blocks 3903ccda647Slclee * in this partition in the area pointed to by nblocksp, starting 3913ccda647Slclee * block number in area pointed to by startblockp, pointer to partition 3923ccda647Slclee * name in area pointed to by partnamep, and tag value in area 3933ccda647Slclee * pointed by tagp. 3943ccda647Slclee * For EFI labels, tag value will be set to 0. 3953ccda647Slclee * 3963ccda647Slclee * For all nblocksp, startblockp and partnamep, tagp, a value of NULL 3973ccda647Slclee * indicates the corresponding info is not requested. 3983ccda647Slclee * 3993ccda647Slclee * 4003ccda647Slclee * Return values: 4013ccda647Slclee * 0 success 4023ccda647Slclee * EINVAL no valid label or requested partition number is invalid. 4033ccda647Slclee * 4043ccda647Slclee */ 4053ccda647Slclee int 4063ccda647Slclee cmlb_partinfo(cmlb_handle_t cmlbhandle, int part, diskaddr_t *nblocksp, 407e8fb11a1Sshidokht diskaddr_t *startblockp, char **partnamep, uint16_t *tagp, void *tg_cookie); 4083ccda647Slclee 409af007057Syl194034 /* 410af007057Syl194034 * cmlb_efi_label_capacity: 411af007057Syl194034 * Get capacity stored in EFI disk label. 412af007057Syl194034 * 413af007057Syl194034 * Arguments: 414af007057Syl194034 * cmlbhandle cmlb handle associated with device. 415af007057Syl194034 * capacity pointer to capacity stored in EFI disk label. 416af007057Syl194034 * tg_cookie cookie from target driver to be passed back to target 417af007057Syl194034 * driver when we call back to it through tg_ops. 418af007057Syl194034 * 419af007057Syl194034 * 420af007057Syl194034 * Notes: 421af007057Syl194034 * If in-core label is not valid, this functions tries to revalidate 422af007057Syl194034 * the label. If label is valid and is an EFI label, it stores the capacity 423af007057Syl194034 * in disk label in the area pointed to by capacity. 424af007057Syl194034 * 425af007057Syl194034 * 426af007057Syl194034 * Return values: 427af007057Syl194034 * 0 success 428af007057Syl194034 * EINVAL no valid EFI label or capacity is NULL. 429af007057Syl194034 * 430af007057Syl194034 */ 431af007057Syl194034 int 432af007057Syl194034 cmlb_efi_label_capacity(cmlb_handle_t cmlbhandle, diskaddr_t *capacity, 433af007057Syl194034 void *tg_cookie); 4343ccda647Slclee 4353ccda647Slclee /* 4363ccda647Slclee * cmlb_ioctl: 4373ccda647Slclee * Ioctls for label handling will be handled by this function. 4383ccda647Slclee * These are: 4393ccda647Slclee * DKIOCGGEOM 4403ccda647Slclee * DKIOCSGEOM 4413ccda647Slclee * DKIOCGAPART 4423ccda647Slclee * DKIOCSAPART 4433ccda647Slclee * DKIOCGVTOC 4443ccda647Slclee * DKIOCGETEFI 4453ccda647Slclee * DKIOCPARTITION 4463ccda647Slclee * DKIOCSVTOC 4473ccda647Slclee * DKIOCSETEFI 4483ccda647Slclee * DKIOCGMBOOT 4493ccda647Slclee * DKIOCSMBOOT 4503ccda647Slclee * DKIOCG_PHYGEOM 4513ccda647Slclee * DKIOCG_VIRTGEOM 4523ccda647Slclee * DKIOCPARTINFO 4533ccda647Slclee * 4543ccda647Slclee * 4553ccda647Slclee * Arguments: 4563ccda647Slclee * cmlbhandle handle associated with device. 4573ccda647Slclee * cmd ioctl operation to be performed 4583ccda647Slclee * arg user argument, contains data to be set or reference 4593ccda647Slclee * parameter for get 4603ccda647Slclee * flag bit flag, indicating open settings, 32/64 bit type 4613ccda647Slclee * cred_p user credential pointer (not currently used) 4623ccda647Slclee * rval_p not currently used 463e8fb11a1Sshidokht * tg_cookie cookie from target driver to be passed back to target 464e8fb11a1Sshidokht * driver when we call back to it through tg_ops. 465e8fb11a1Sshidokht * 4663ccda647Slclee * 4673ccda647Slclee * 4683ccda647Slclee * Return values: 4693ccda647Slclee * 0 4703ccda647Slclee * EINVAL 4713ccda647Slclee * ENOTTY 4723ccda647Slclee * ENXIO 4733ccda647Slclee * EIO 4743ccda647Slclee * EFAULT 4753ccda647Slclee * ENOTSUP 4763ccda647Slclee * EPERM 4773ccda647Slclee */ 4783ccda647Slclee int 479e8fb11a1Sshidokht cmlb_ioctl(cmlb_handle_t cmlbhandle, dev_t dev, int cmd, 480e8fb11a1Sshidokht intptr_t arg, int flag, cred_t *cred_p, int *rval_p, void *tg_cookie); 4813ccda647Slclee 4823ccda647Slclee /* 483b9ccdc5aScth * cmlb_prop_op: 484b9ccdc5aScth * provide common label prop_op(9E) implementation that understands the 485b9ccdc5aScth * size(9p) properties. 486b9ccdc5aScth * 487b9ccdc5aScth * Arguments: 488b9ccdc5aScth * cmlbhandle cmlb handle associated with device. 489b9ccdc5aScth * dev See prop_op(9E) 490b9ccdc5aScth * dip " 491b9ccdc5aScth * prop_op " 492b9ccdc5aScth * mod_flags " 493b9ccdc5aScth * name " 494b9ccdc5aScth * valuep " 495b9ccdc5aScth * lengthp " 496b9ccdc5aScth * part partition number 497b9ccdc5aScth * tg_cookie cookie from target driver to be passed back to target 498b9ccdc5aScth */ 499b9ccdc5aScth int 500b9ccdc5aScth cmlb_prop_op(cmlb_handle_t cmlbhandle, 501b9ccdc5aScth dev_t dev, dev_info_t *dip, ddi_prop_op_t prop_op, int mod_flags, 502b9ccdc5aScth char *name, caddr_t valuep, int *lengthp, int part, void *tg_cookie); 503b9ccdc5aScth 504b9ccdc5aScth /* 5053ccda647Slclee * cmlb_get_devid_block: 5063ccda647Slclee * get the block number where device id is stored. 5073ccda647Slclee * 5083ccda647Slclee * Arguments: 5093ccda647Slclee * cmlbhandle cmlb handle associated with device. 5103ccda647Slclee * devidblockp pointer to block number. 511e8fb11a1Sshidokht * tg_cookie cookie from target driver to be passed back to target 512e8fb11a1Sshidokht * driver when we call back to it through tg_ops. 5133ccda647Slclee * 5143ccda647Slclee * Notes: 5153ccda647Slclee * It stores the block number of device id in the area pointed to 5163ccda647Slclee * by devidblockp. 5173ccda647Slclee * 5183ccda647Slclee * Return values: 5193ccda647Slclee * 0 success 5203ccda647Slclee * EINVAL device id does not apply to current label type. 5213ccda647Slclee */ 5223ccda647Slclee int 523e8fb11a1Sshidokht cmlb_get_devid_block(cmlb_handle_t cmlbhandle, diskaddr_t *devidblockp, 524e8fb11a1Sshidokht void *tg_cookie); 5253ccda647Slclee 5263ccda647Slclee 5273ccda647Slclee /* 5283ccda647Slclee * cmlb_close: 5293ccda647Slclee * 5303ccda647Slclee * Close the device, revert to a default label minor node for the device, 5313ccda647Slclee * if it is removable. 5323ccda647Slclee * 5333ccda647Slclee * Arguments: 5343ccda647Slclee * cmlbhandle cmlb handle associated with device. 5353ccda647Slclee * 536e8fb11a1Sshidokht * tg_cookie cookie from target driver to be passed back to target 537e8fb11a1Sshidokht * driver when we call back to it through tg_ops. 5383ccda647Slclee * Return values: 5393ccda647Slclee * 0 Success 5403ccda647Slclee * ENXIO Re-creating minor node failed. 5413ccda647Slclee */ 5423ccda647Slclee int 543e8fb11a1Sshidokht cmlb_close(cmlb_handle_t cmlbhandle, void *tg_cookie); 5443ccda647Slclee 5453ccda647Slclee /* 5463ccda647Slclee * cmlb_detach: 5473ccda647Slclee * 5483ccda647Slclee * Invalidate in-core labeling data and remove all minor nodes for 5493ccda647Slclee * the device associate with handle. 5503ccda647Slclee * 5513ccda647Slclee * Arguments: 5523ccda647Slclee * cmlbhandle cmlb handle associated with device. 553e8fb11a1Sshidokht * tg_cookie cookie from target driver to be passed back to target 554e8fb11a1Sshidokht * driver when we call back to it through tg_ops. 5553ccda647Slclee * 5563ccda647Slclee */ 5573ccda647Slclee void 558e8fb11a1Sshidokht cmlb_detach(cmlb_handle_t cmlbhandle, void *tg_cookie); 5593ccda647Slclee 5603ccda647Slclee /* 5613ccda647Slclee * cmlb_free_handle 5623ccda647Slclee * 5633ccda647Slclee * Frees handle. 5643ccda647Slclee * 5653ccda647Slclee * Arguments: 5663ccda647Slclee * cmlbhandlep pointer to handle 5673ccda647Slclee * 5683ccda647Slclee */ 5693ccda647Slclee void 5703ccda647Slclee cmlb_free_handle(cmlb_handle_t *cmlbhandlep); 5713ccda647Slclee 5723ccda647Slclee #ifdef __cplusplus 5733ccda647Slclee } 5743ccda647Slclee #endif 5753ccda647Slclee 5763ccda647Slclee #endif /* _SYS_CMLB_H */ 577