5907 xdrmblk_getpos() is unreliable
[illumos-gate.git] / usr / src / uts / common / io / hook.c
blobf7ed005413314a62fc059b89af5933de0c803f77
1 /*
2 * CDDL HEADER START
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
19 * CDDL HEADER END
22 * Copyright 2008 Sun Microsystems, Inc. All rights reserved.
23 * Use is subject to license terms.
25 * Copyright 2013 Joyent, Inc. All rights reserved.
27 #include <sys/param.h>
28 #include <sys/types.h>
29 #include <sys/systm.h>
30 #include <sys/errno.h>
31 #include <sys/kmem.h>
32 #include <sys/mutex.h>
33 #include <sys/condvar.h>
34 #include <sys/modctl.h>
35 #include <sys/hook_impl.h>
36 #include <sys/sdt.h>
37 #include <sys/cmn_err.h>
40 * This file provides kernel hook framework.
43 static struct modldrv modlmisc = {
44 &mod_miscops, /* drv_modops */
45 "Hooks Interface v1.0", /* drv_linkinfo */
48 static struct modlinkage modlinkage = {
49 MODREV_1, /* ml_rev */
50 &modlmisc, /* ml_linkage */
51 NULL
54 static const char *hook_hintvalue_none = "<none>";
57 * How it works.
58 * =============
59 * Use of the hook framework here is tied up with zones - when a new zone
60 * is created, we create a new hook_stack_t and are open to business for
61 * allowing new hook families and their events.
63 * A consumer of these hooks is expected to operate in this fashion:
64 * 1) call hook_family_add() to create a new family of hooks. It is a
65 * current requirement that this call must be made with the value
66 * returned from hook_stack_init, by way of infrastructure elsewhere.
67 * 2) add events to the registered family with calls to hook_event_add.
69 * At this point, the structures in place should be open to others to
70 * add hooks to the event or add notifiers for when the contents of the
71 * hook stack changes.
73 * The interesting stuff happens on teardown.
75 * It is a requirement that the provider of hook events work in the reverse
76 * order to the above, so that the first step is:
77 * 1) remove events from each hook family created earlier
78 * 2) remove hook families from the hook stack.
80 * When doing teardown of both events and families, a check is made to see
81 * if either structure is still "busy". If so then a boolean flag (FWF_DESTROY)
82 * is set to say that the structure is condemned. The presence of this flag
83 * being set must be checked for in _add()/_register()/ functions and a
84 * failure returned if it is set. It is ignored by the _find() functions
85 * because they're used by _remove()/_unregister().
86 * While setting the condemned flag when trying to delete a structure would
87 * normally be keyed from the presence of a reference count being greater
88 * than 1, in this implementation there are no reference counts required:
89 * instead the presence of objects on linked lists is taken to mean
90 * something is still "busy."
92 * ONLY the caller that adds the family and the events ever has a direct
93 * reference to the internal structures and thus ONLY it should be doing
94 * the removal of either the event or family. In practise, what this means
95 * is that in ip_netinfo.c, we have calls to net_protocol_register(), followed
96 * by net_event_register() (these interface to hook_family_add() and
97 * hook_event_add(), respectively) that are made when we create an instance
98 * of IP and when the IP instance is shutdown/destroyed, it calls
99 * net_event_unregister() and net_protocol_unregister(), which in turn call
100 * hook_event_remove() and hook_family_remove() respectively. Nobody else
101 * is entitled to call the _unregister() functions. It is imperative that
102 * there be only one _remove() call for every _add() call.
104 * It is possible that code which is interfacing with this hook framework
105 * won't do all the cleaning up that it needs to at the right time. While
106 * we can't prevent programmers from creating memory leaks, we can synchronise
107 * when we clean up data structures to prevent code accessing free'd memory.
109 * A simple diagram showing the ownership is as follows:
111 * Owned +--------------+
112 * by | hook_stack_t |
113 * the +--------------+
114 * Instance |
115 * - - - - - - - -|- - - - - - - - - - - - - - - - - -
117 * Owned +-------------------+ +-------------------+
118 * | hook_family_int_t |---->| hook_family_int_t |
119 * by +-------------------+ +-------------------+
120 * | \+---------------+ \+---------------+
121 * network | | hook_family_t | | hook_family_t |
122 * V +---------------+ +---------------+
123 * protocol +------------------+ +------------------+
124 * | hook_event_int_t |---->| hook_event_int_t |
125 * (ipv4,ipv6) +------------------+ +------------------+
126 * | \+--------------+ \+--------------+
127 * | | hook_event_t | | hook_event_t |
128 * | +--------------+ +--------------+
129 * - - - - - - - -|- - - - - - - - - - - - - - - - - -
131 * Owned +------------+
132 * | hook_int_t |
133 * by +------------+
134 * \+--------+
135 * the consumer | hook_t |
136 * +--------+
138 * The consumers, such as IPFilter, do not have any pointers or hold any
139 * references to hook_int_t, hook_event_t or hook_event_int_t. By placing
140 * a hook on an event through net_hook_register(), an implicit reference
141 * to the hook_event_int_t is returned with a successful call. Additionally,
142 * IPFilter does not see the hook_family_int_t or hook_family_t directly.
143 * Rather it is returned a net_handle_t (from net_protocol_lookup()) that
144 * contains a pointer to hook_family_int_t. The structure behind the
145 * net_handle_t (struct net_data) *is* reference counted and managed
146 * appropriately.
148 * A more detailed picture that describes how the family/event structures
149 * are linked together can be found in <sys/hook_impl.h>
151 * Notification callbacks.
152 * =======================
153 * For each of the hook stack, hook family and hook event, it is possible
154 * to request notificatin of change to them. Why?
155 * First, lets equate the hook stack to an IP instance, a hook family to
156 * a network protocol and a hook event to IP packets on the input path.
157 * If a kernel module wants to apply security from the very start of
158 * things, it needs to know as soon as a new instance of networking
159 * is initiated. Whilst for the global zone, it is taken for granted that
160 * this instance will always exist before any interaction takes place,
161 * that is not true for zones running with an exclusive networking instance.
162 * Thus when a local zone is started and a new instance is created to support
163 * that, parties that wish to monitor it and apply a security policy from
164 * the onset need to be informed as early as possible - quite probably
165 * before any networking is started by the zone's boot scripts.
166 * Inside each instance, it is possible to have a number of network protocols
167 * (hook families) in operation. Inside the context of the global zone,
168 * it is possible to have code run before the kernel module providing the
169 * IP networking is loaded. From here, to apply the appropriate security,
170 * it is necessary to become informed of when IP is being configured into
171 * the zone and this is done by registering a notification callback with
172 * the hook stack for changes to it. The next step is to know when packets
173 * can be received through the physical_in, etc, events. This is achieved
174 * by registering a callback with the appropriate network protocol (or in
175 * this file, the correct hook family.) Thus when IP finally attaches a
176 * physical_in event to inet, the module looking to enforce a security
177 * policy can become aware of it being present. Of course there's no
178 * requirement for such a module to be present before all of the above
179 * happens and in such a case, it is reasonable for the same module to
180 * work after everything has been put in place. For this reason, when
181 * a notification callback is added, a series of fake callback events
182 * is generated to simulate the arrival of those entities. There is one
183 * final series of callbacks that can be registered - those to monitor
184 * actual hooks that are added or removed from an event. In practice,
185 * this is useful when there are multiple kernel modules participating
186 * in the processing of packets and there are behaviour dependencies
187 * involved, such that one kernel module might only register its hook
188 * if another is already present and also might want to remove its hook
189 * when the other disappears.
191 * If you know a kernel module will not be loaded before the infrastructure
192 * used in this file is present then it is not necessary to use this
193 * notification callback mechanism.
197 * Locking
198 * =======
199 * The use of CVW_* macros to do locking is driven by the need to allow
200 * recursive locking with read locks when we're processing packets. This
201 * is necessary because various netinfo functions need to hold read locks,
202 * by design, as they can be called in or out of packet context.
205 * Hook internal functions
207 static hook_int_t *hook_copy(hook_t *src);
208 static hook_event_int_t *hook_event_checkdup(hook_event_t *he,
209 hook_stack_t *hks);
210 static hook_event_int_t *hook_event_copy(hook_event_t *src);
211 static hook_event_int_t *hook_event_find(hook_family_int_t *hfi, char *event);
212 static void hook_event_free(hook_event_int_t *hei, hook_family_int_t *hfi);
213 static hook_family_int_t *hook_family_copy(hook_family_t *src);
214 static hook_family_int_t *hook_family_find(char *family, hook_stack_t *hks);
215 static void hook_family_free(hook_family_int_t *hfi, hook_stack_t *hks);
216 static hook_int_t *hook_find(hook_event_int_t *hei, hook_t *h);
217 static void hook_int_free(hook_int_t *hi, netstackid_t);
218 static void hook_init(void);
219 static void hook_fini(void);
220 static void *hook_stack_init(netstackid_t stackid, netstack_t *ns);
221 static void hook_stack_fini(netstackid_t stackid, void *arg);
222 static void hook_stack_shutdown(netstackid_t stackid, void *arg);
223 static int hook_insert(hook_int_head_t *head, hook_int_t *new);
224 static void hook_insert_plain(hook_int_head_t *head, hook_int_t *new);
225 static int hook_insert_afterbefore(hook_int_head_t *head, hook_int_t *new);
226 static hook_int_t *hook_find_byname(hook_int_head_t *head, char *name);
227 static void hook_event_init_kstats(hook_family_int_t *, hook_event_int_t *);
228 static void hook_event_notify_run(hook_event_int_t *, hook_family_int_t *,
229 char *event, char *name, hook_notify_cmd_t cmd);
230 static void hook_init_kstats(hook_family_int_t *hfi, hook_event_int_t *hei,
231 hook_int_t *hi);
232 static int hook_notify_register(hook_notify_head_t *head,
233 hook_notify_fn_t callback, void *arg);
234 static int hook_notify_unregister(hook_notify_head_t *head,
235 hook_notify_fn_t callback, void **);
236 static void hook_notify_run(hook_notify_head_t *head, char *family,
237 char *event, char *name, hook_notify_cmd_t cmd);
238 static void hook_stack_notify_run(hook_stack_t *hks, char *name,
239 hook_notify_cmd_t cmd);
240 static void hook_stack_remove(hook_stack_t *hks);
243 * A list of the hook stacks is kept here because we need to enable
244 * net_instance_notify_register() to be called during the creation
245 * of a new instance. Previously hook_stack_get() would just use
246 * the netstack functions for this work but they will return NULL
247 * until the zone has been fully initialised.
249 static hook_stack_head_t hook_stacks;
250 static kmutex_t hook_stack_lock;
253 * Module entry points.
256 _init(void)
258 int error;
260 hook_init();
261 error = mod_install(&modlinkage);
262 if (error != 0)
263 hook_fini();
265 return (error);
269 _fini(void)
271 int error;
273 error = mod_remove(&modlinkage);
274 if (error == 0)
275 hook_fini();
277 return (error);
281 _info(struct modinfo *modinfop)
283 return (mod_info(&modlinkage, modinfop));
287 * Function: hook_init
288 * Returns: None
289 * Parameters: None
291 * Initialize hooks
293 static void
294 hook_init(void)
296 mutex_init(&hook_stack_lock, NULL, MUTEX_DRIVER, NULL);
297 SLIST_INIT(&hook_stacks);
300 * We want to be informed each time a stack is created or
301 * destroyed in the kernel.
303 netstack_register(NS_HOOK, hook_stack_init, hook_stack_shutdown,
304 hook_stack_fini);
308 * Function: hook_fini
309 * Returns: None
310 * Parameters: None
312 * Deinitialize hooks
314 static void
315 hook_fini(void)
317 netstack_unregister(NS_HOOK);
319 mutex_destroy(&hook_stack_lock);
320 ASSERT(SLIST_EMPTY(&hook_stacks));
324 * Function: hook_wait_setflag
325 * Returns: -1 = setting flag is disallowed, 0 = flag set and did
326 * not have to wait (ie no lock droped), 1 = flag set but
327 * it was necessary to drop locks to set it.
328 * Parameters: waiter(I) - control data structure
329 * busyset(I) - set of flags that we don't want set while
330 * we are active.
331 * wanted(I) - flag associated with newflag to indicate
332 * what we want to do.
333 * newflag(I) - the new ACTIVE flag we want to set that
334 * indicates what we are doing.
336 * The set of functions hook_wait_* implement an API that builds on top of
337 * the kcondvar_t to provide controlled execution through a critical region.
338 * For each flag that indicates work is being done (FWF_*_ACTIVE) there is
339 * also a flag that we set to indicate that we want to do it (FWF_*_WANTED).
340 * The combination of flags is required as when this function exits to do
341 * the task, the structure is then free for another caller to use and
342 * to indicate that it wants to do work. The flags used when a caller wants
343 * to destroy an object take precedence over those that are used for making
344 * changes to it (add/remove.) In this case, we don't try to secure the
345 * ability to run and return with an error.
347 * "wantedset" is used here to determine who has the right to clear the
348 * wanted but from the fw_flags set: only he that sets the flag has the
349 * right to clear it at the bottom of the loop, even if someone else
350 * wants to set it.
352 * wanted - the FWF_*_WANTED flag that describes the action being requested
353 * busyset- the set of FWF_* flags we don't want set when we run
354 * newflag- the FWF_*_ACTIVE flag we will set to indicate we are busy
357 hook_wait_setflag(flagwait_t *waiter, uint32_t busyset, fwflag_t wanted,
358 fwflag_t newflag)
360 boolean_t wantedset;
361 int waited = 0;
363 mutex_enter(&waiter->fw_lock);
364 if (waiter->fw_flags & FWF_DESTROY) {
365 cv_signal(&waiter->fw_cv);
366 mutex_exit(&waiter->fw_lock);
367 return (-1);
369 while (waiter->fw_flags & busyset) {
370 wantedset = ((waiter->fw_flags & wanted) == wanted);
371 if (!wantedset)
372 waiter->fw_flags |= wanted;
373 CVW_EXIT_WRITE(waiter->fw_owner);
374 cv_wait(&waiter->fw_cv, &waiter->fw_lock);
376 * This lock needs to be dropped here to preserve the order
377 * of acquisition that is fw_owner followed by fw_lock, else
378 * we can deadlock.
380 mutex_exit(&waiter->fw_lock);
381 waited = 1;
382 CVW_ENTER_WRITE(waiter->fw_owner);
383 mutex_enter(&waiter->fw_lock);
384 if (!wantedset)
385 waiter->fw_flags &= ~wanted;
386 if (waiter->fw_flags & FWF_DESTROY) {
387 cv_signal(&waiter->fw_cv);
388 mutex_exit(&waiter->fw_lock);
389 return (-1);
392 waiter->fw_flags &= ~wanted;
393 ASSERT((waiter->fw_flags & wanted) == 0);
394 ASSERT((waiter->fw_flags & newflag) == 0);
395 waiter->fw_flags |= newflag;
396 mutex_exit(&waiter->fw_lock);
397 return (waited);
401 * Function: hook_wait_unsetflag
402 * Returns: None
403 * Parameters: waiter(I) - control data structure
404 * oldflag(I) - flag to reset
406 * Turn off the bit that we had set to run and let others know that
407 * they should now check to see if they can run.
409 void
410 hook_wait_unsetflag(flagwait_t *waiter, fwflag_t oldflag)
412 mutex_enter(&waiter->fw_lock);
413 waiter->fw_flags &= ~oldflag;
414 cv_signal(&waiter->fw_cv);
415 mutex_exit(&waiter->fw_lock);
419 * Function: hook_wait_destroy
420 * Returns: None
421 * Parameters: waiter(I) - control data structure
423 * Since outer locking (on fw_owner) should ensure that only one function
424 * at a time gets to call hook_wait_destroy() on a given object, there is
425 * no need to guard against setting FWF_DESTROY_WANTED already being set.
426 * It is, however, necessary to wait for all activity on the owning
427 * structure to cease.
430 hook_wait_destroy(flagwait_t *waiter)
432 ASSERT((waiter->fw_flags & FWF_DESTROY_WANTED) == 0);
433 mutex_enter(&waiter->fw_lock);
434 if (waiter->fw_flags & FWF_DESTROY_WANTED) {
435 cv_signal(&waiter->fw_cv);
436 mutex_exit(&waiter->fw_lock);
437 return (EINPROGRESS);
439 waiter->fw_flags |= FWF_DESTROY_WANTED;
440 while (!FWF_DESTROY_OK(waiter)) {
441 CVW_EXIT_WRITE(waiter->fw_owner);
442 cv_wait(&waiter->fw_cv, &waiter->fw_lock);
443 CVW_ENTER_WRITE(waiter->fw_owner);
446 * There should now be nothing else using "waiter" or its
447 * owner, so we can safely assign here without risk of wiiping
448 * out someone's bit.
450 waiter->fw_flags = FWF_DESTROY_ACTIVE;
451 cv_signal(&waiter->fw_cv);
452 mutex_exit(&waiter->fw_lock);
454 return (0);
458 * Function: hook_wait_init
459 * Returns: None
460 * Parameters: waiter(I) - control data structure
461 * ownder(I) - pointer to lock that the owner of this
462 * waiter uses
464 * "owner" gets passed in here so that when we need to call cv_wait,
465 * for example in hook_wait_setflag(), we can drop the lock for the
466 * next layer out, which is likely to be held in an exclusive manner.
468 void
469 hook_wait_init(flagwait_t *waiter, cvwaitlock_t *owner)
471 cv_init(&waiter->fw_cv, NULL, CV_DRIVER, NULL);
472 mutex_init(&waiter->fw_lock, NULL, MUTEX_DRIVER, NULL);
473 waiter->fw_flags = FWF_NONE;
474 waiter->fw_owner = owner;
478 * Function: hook_stack_init
479 * Returns: void * - pointer to new hook stack structure
480 * Parameters: stackid(I) - identifier for the network instance that owns this
481 * ns(I) - pointer to the network instance data structure
483 * Allocate and initialize the hook stack instance. This function is not
484 * allowed to fail, so KM_SLEEP is used here when allocating memory. The
485 * value returned is passed back into the shutdown and destroy hooks.
487 /*ARGSUSED*/
488 static void *
489 hook_stack_init(netstackid_t stackid, netstack_t *ns)
491 hook_stack_t *hks;
493 #ifdef NS_DEBUG
494 printf("hook_stack_init(stack %d)\n", stackid);
495 #endif
497 hks = (hook_stack_t *)kmem_zalloc(sizeof (*hks), KM_SLEEP);
498 hks->hks_netstack = ns;
499 hks->hks_netstackid = stackid;
501 CVW_INIT(&hks->hks_lock);
502 TAILQ_INIT(&hks->hks_nhead);
503 SLIST_INIT(&hks->hks_familylist);
505 hook_wait_init(&hks->hks_waiter, &hks->hks_lock);
507 mutex_enter(&hook_stack_lock);
508 SLIST_INSERT_HEAD(&hook_stacks, hks, hks_entry);
509 mutex_exit(&hook_stack_lock);
511 return (hks);
515 * Function: hook_stack_shutdown
516 * Returns: void
517 * Parameters: stackid(I) - identifier for the network instance that owns this
518 * arg(I) - pointer returned by hook_stack_init
520 * Set the shutdown flag to indicate that we should stop accepting new
521 * register calls as we're now in the cleanup process. The cleanup is a
522 * two stage process and we're not required to free any memory here.
524 * The curious would wonder why isn't there any code that walks through
525 * all of the data structures and sets the flag(s) there? The answer is
526 * that it is expected that this will happen when the zone shutdown calls
527 * the shutdown callbacks for other modules that they will initiate the
528 * free'ing and shutdown of the hooks themselves.
530 /*ARGSUSED*/
531 static void
532 hook_stack_shutdown(netstackid_t stackid, void *arg)
534 hook_stack_t *hks = (hook_stack_t *)arg;
536 mutex_enter(&hook_stack_lock);
538 * Once this flag gets set to one, no more additions are allowed
539 * to any of the structures that make up this stack.
541 hks->hks_shutdown = 1;
542 mutex_exit(&hook_stack_lock);
546 * Function: hook_stack_destroy
547 * Returns: void
548 * Parameters: stackid(I) - identifier for the network instance that owns this
549 * arg(I) - pointer returned by hook_stack_init
551 * Free the hook stack instance.
553 * The rationale for the shutdown being lazy (see the comment above for
554 * hook_stack_shutdown) also applies to the destroy being lazy. Only if
555 * the hook_stack_t data structure is unused will it go away. Else it
556 * is left up to the last user of a data structure to actually free it.
558 /*ARGSUSED*/
559 static void
560 hook_stack_fini(netstackid_t stackid, void *arg)
562 hook_stack_t *hks = (hook_stack_t *)arg;
564 mutex_enter(&hook_stack_lock);
565 hks->hks_shutdown = 2;
566 hook_stack_remove(hks);
567 mutex_exit(&hook_stack_lock);
571 * Function: hook_stack_remove
572 * Returns: void
573 * Parameters: hks(I) - pointer to an instance of a hook_stack_t
575 * This function assumes that it is called with hook_stack_lock held.
576 * It functions differently to hook_family/event_remove in that it does
577 * the checks to see if it can be removed. This difference exists
578 * because this structure has nothing higher up that depends on it.
580 static void
581 hook_stack_remove(hook_stack_t *hks)
584 ASSERT(mutex_owned(&hook_stack_lock));
587 * Is the structure still in use?
589 if (!SLIST_EMPTY(&hks->hks_familylist) ||
590 !TAILQ_EMPTY(&hks->hks_nhead))
591 return;
593 SLIST_REMOVE(&hook_stacks, hks, hook_stack, hks_entry);
595 VERIFY(hook_wait_destroy(&hks->hks_waiter) == 0);
596 CVW_DESTROY(&hks->hks_lock);
597 kmem_free(hks, sizeof (*hks));
601 * Function: hook_stack_get
602 * Returns: hook_stack_t * - NULL if not found, else matching instance
603 * Parameters: stackid(I) - instance id to search for
605 * Search the list of currently active hook_stack_t structures for one that
606 * has a matching netstackid_t to the value passed in. The linked list can
607 * only ever have at most one match for this value.
609 static hook_stack_t *
610 hook_stack_get(netstackid_t stackid)
612 hook_stack_t *hks;
614 SLIST_FOREACH(hks, &hook_stacks, hks_entry) {
615 if (hks->hks_netstackid == stackid)
616 break;
619 return (hks);
623 * Function: hook_stack_notify_register
624 * Returns: int - 0 = success, else failure
625 * Parameters: stackid(I) - netstack identifier
626 * callback(I)- function to be called
627 * arg(I) - arg to provide callback when it is called
629 * If we're not shutting down this instance, append a new function to the
630 * list of those to call when a new family of hooks is added to this stack.
631 * If the function can be successfully added to the list of callbacks
632 * activated when there is a change to the stack (addition or removal of
633 * a hook family) then generate a fake HN_REGISTER event by directly
634 * calling the callback with the relevant information for each hook
635 * family that currently exists (and isn't being shutdown.)
638 hook_stack_notify_register(netstackid_t stackid, hook_notify_fn_t callback,
639 void *arg)
641 hook_family_int_t *hfi;
642 hook_stack_t *hks;
643 boolean_t canrun;
644 char buffer[16];
645 int error;
647 ASSERT(callback != NULL);
649 canrun = B_FALSE;
650 mutex_enter(&hook_stack_lock);
651 hks = hook_stack_get(stackid);
652 if (hks != NULL) {
653 if (hks->hks_shutdown != 0) {
654 error = ESHUTDOWN;
655 } else {
656 CVW_ENTER_WRITE(&hks->hks_lock);
657 canrun = (hook_wait_setflag(&hks->hks_waiter,
658 FWF_ADD_WAIT_MASK, FWF_ADD_WANTED,
659 FWF_ADD_ACTIVE) != -1);
660 error = hook_notify_register(&hks->hks_nhead,
661 callback, arg);
662 CVW_EXIT_WRITE(&hks->hks_lock);
664 } else {
665 error = ESRCH;
667 mutex_exit(&hook_stack_lock);
669 if (error == 0 && canrun) {
671 * Generate fake register event for callback that
672 * is being added, letting it know everything that
673 * already exists.
675 (void) snprintf(buffer, sizeof (buffer), "%u",
676 hks->hks_netstackid);
678 SLIST_FOREACH(hfi, &hks->hks_familylist, hfi_entry) {
679 if (hfi->hfi_condemned || hfi->hfi_shutdown)
680 continue;
681 callback(HN_REGISTER, arg, buffer, NULL,
682 hfi->hfi_family.hf_name);
686 if (canrun)
687 hook_wait_unsetflag(&hks->hks_waiter, FWF_ADD_ACTIVE);
689 return (error);
693 * Function: hook_stack_notify_unregister
694 * Returns: int - 0 = success, else failure
695 * Parameters: stackid(I) - netstack identifier
696 * callback(I) - function to be called
698 * Attempt to remove a registered function from a hook stack's list of
699 * callbacks to activiate when protocols are added/deleted.
700 * As with hook_stack_notify_register, if all things are going well then
701 * a fake unregister event is delivered to the callback being removed
702 * for each hook family that presently exists.
705 hook_stack_notify_unregister(netstackid_t stackid, hook_notify_fn_t callback)
707 hook_family_int_t *hfi;
708 hook_stack_t *hks;
709 boolean_t canrun;
710 char buffer[16];
711 void *arg;
712 int error;
714 mutex_enter(&hook_stack_lock);
715 hks = hook_stack_get(stackid);
716 if (hks != NULL) {
717 CVW_ENTER_WRITE(&hks->hks_lock);
718 canrun = (hook_wait_setflag(&hks->hks_waiter, FWF_ADD_WAIT_MASK,
719 FWF_ADD_WANTED, FWF_ADD_ACTIVE) != -1);
721 error = hook_notify_unregister(&hks->hks_nhead, callback, &arg);
722 CVW_EXIT_WRITE(&hks->hks_lock);
723 } else {
724 error = ESRCH;
726 mutex_exit(&hook_stack_lock);
728 if (error == 0) {
729 if (canrun) {
731 * Generate fake unregister event for callback that
732 * is being removed, letting it know everything that
733 * currently exists is now "disappearing."
735 (void) snprintf(buffer, sizeof (buffer), "%u",
736 hks->hks_netstackid);
738 SLIST_FOREACH(hfi, &hks->hks_familylist, hfi_entry) {
739 callback(HN_UNREGISTER, arg, buffer, NULL,
740 hfi->hfi_family.hf_name);
743 hook_wait_unsetflag(&hks->hks_waiter, FWF_ADD_ACTIVE);
746 mutex_enter(&hook_stack_lock);
747 hks = hook_stack_get(stackid);
748 if ((error == 0) && (hks->hks_shutdown == 2))
749 hook_stack_remove(hks);
750 mutex_exit(&hook_stack_lock);
753 return (error);
757 * Function: hook_stack_notify_run
758 * Returns: None
759 * Parameters: hks(I) - hook stack pointer to execute callbacks for
760 * name(I) - name of a hook family
761 * cmd(I) - either HN_UNREGISTER or HN_REGISTER
763 * Run through the list of callbacks on the hook stack to be called when
764 * a new hook family is added
766 * As hook_notify_run() expects 3 names, one for the family that is associated
767 * with the cmd (HN_REGISTER or HN_UNREGISTER), one for the event and one
768 * for the object being introduced and we really only have one name (that
769 * of the new hook family), fake the hook stack's name by converting the
770 * integer to a string and for the event just pass NULL.
772 static void
773 hook_stack_notify_run(hook_stack_t *hks, char *name,
774 hook_notify_cmd_t cmd)
776 char buffer[16];
778 ASSERT(hks != NULL);
779 ASSERT(name != NULL);
781 (void) snprintf(buffer, sizeof (buffer), "%u", hks->hks_netstackid);
783 hook_notify_run(&hks->hks_nhead, buffer, NULL, name, cmd);
787 * Function: hook_run
788 * Returns: int - return value according to callback func
789 * Parameters: token(I) - event pointer
790 * info(I) - message
792 * Run hooks for specific provider. The hooks registered are stepped through
793 * until either the end of the list is reached or a hook function returns a
794 * non-zero value. If a non-zero value is returned from a hook function, we
795 * return that value back to our caller. By design, a hook function can be
796 * called more than once, simultaneously.
799 hook_run(hook_family_int_t *hfi, hook_event_token_t token, hook_data_t info)
801 hook_event_int_t *hei;
802 hook_int_t *hi;
803 int rval = 0;
805 ASSERT(token != NULL);
807 hei = (hook_event_int_t *)token;
808 DTRACE_PROBE2(hook__run__start,
809 hook_event_token_t, token,
810 hook_data_t, info);
813 * If we consider that this function is only called from within the
814 * stack while an instance is currently active,
816 CVW_ENTER_READ(&hfi->hfi_lock);
818 TAILQ_FOREACH(hi, &hei->hei_head, hi_entry) {
819 ASSERT(hi->hi_hook.h_func != NULL);
820 DTRACE_PROBE3(hook__func__start,
821 hook_event_token_t, token,
822 hook_data_t, info,
823 hook_int_t *, hi);
824 rval = (*hi->hi_hook.h_func)(token, info, hi->hi_hook.h_arg);
825 DTRACE_PROBE4(hook__func__end,
826 hook_event_token_t, token,
827 hook_data_t, info,
828 hook_int_t *, hi,
829 int, rval);
830 hi->hi_kstats.hook_hits.value.ui64++;
831 if (rval != 0)
832 break;
835 hei->hei_kstats.events.value.ui64++;
837 CVW_EXIT_READ(&hfi->hfi_lock);
839 DTRACE_PROBE3(hook__run__end,
840 hook_event_token_t, token,
841 hook_data_t, info,
842 hook_int_t *, hi);
844 return (rval);
848 * Function: hook_family_add
849 * Returns: internal family pointer - NULL = Fail
850 * Parameters: hf(I) - family pointer
851 * hks(I) - pointer to an instance of a hook_stack_t
852 * store(O) - where returned pointer will be stored
854 * Add new family to the family list. The requirements for the addition to
855 * succeed are that the family name must not already be registered and that
856 * the hook stack is not being shutdown.
857 * If store is non-NULL, it is expected to be a pointer to the same variable
858 * that is awaiting to be assigned the return value of this function.
859 * In its current use, the returned value is assigned to netd_hooks in
860 * net_family_register. The use of "store" allows the return value to be
861 * used before this function returns. How can this happen? Through the
862 * callbacks that can be activated at the bottom of this function, when
863 * hook_stack_notify_run is called.
865 hook_family_int_t *
866 hook_family_add(hook_family_t *hf, hook_stack_t *hks, void **store)
868 hook_family_int_t *hfi, *new;
870 ASSERT(hf != NULL);
871 ASSERT(hf->hf_name != NULL);
873 new = hook_family_copy(hf);
874 if (new == NULL)
875 return (NULL);
877 mutex_enter(&hook_stack_lock);
878 CVW_ENTER_WRITE(&hks->hks_lock);
880 if (hks->hks_shutdown != 0) {
881 CVW_EXIT_WRITE(&hks->hks_lock);
882 mutex_exit(&hook_stack_lock);
883 hook_family_free(new, NULL);
884 return (NULL);
887 /* search family list */
888 hfi = hook_family_find(hf->hf_name, hks);
889 if (hfi != NULL) {
890 CVW_EXIT_WRITE(&hks->hks_lock);
891 mutex_exit(&hook_stack_lock);
892 hook_family_free(new, NULL);
893 return (NULL);
897 * Try and set the FWF_ADD_ACTIVE flag so that we can drop all the
898 * lock further down when calling all of the functions registered
899 * for notification when a new hook family is added.
901 if (hook_wait_setflag(&hks->hks_waiter, FWF_ADD_WAIT_MASK,
902 FWF_ADD_WANTED, FWF_ADD_ACTIVE) == -1) {
903 CVW_EXIT_WRITE(&hks->hks_lock);
904 mutex_exit(&hook_stack_lock);
905 hook_family_free(new, NULL);
906 return (NULL);
909 CVW_INIT(&new->hfi_lock);
910 SLIST_INIT(&new->hfi_head);
911 TAILQ_INIT(&new->hfi_nhead);
913 hook_wait_init(&new->hfi_waiter, &new->hfi_lock);
915 new->hfi_stack = hks;
916 if (store != NULL)
917 *store = new;
919 /* Add to family list head */
920 SLIST_INSERT_HEAD(&hks->hks_familylist, new, hfi_entry);
922 CVW_EXIT_WRITE(&hks->hks_lock);
923 mutex_exit(&hook_stack_lock);
925 hook_stack_notify_run(hks, hf->hf_name, HN_REGISTER);
927 hook_wait_unsetflag(&hks->hks_waiter, FWF_ADD_ACTIVE);
929 return (new);
933 * Function: hook_family_remove
934 * Returns: int - 0 = success, else = failure
935 * Parameters: hfi(I) - internal family pointer
937 * Remove family from family list. This function has been designed to be
938 * called once and once only per hook_family_int_t. Thus when cleaning up
939 * this structure as an orphan, callers should only call hook_family_free.
942 hook_family_remove(hook_family_int_t *hfi)
944 hook_stack_t *hks;
945 boolean_t notifydone;
947 ASSERT(hfi != NULL);
948 hks = hfi->hfi_stack;
950 CVW_ENTER_WRITE(&hfi->hfi_lock);
951 notifydone = hfi->hfi_shutdown;
952 hfi->hfi_shutdown = B_TRUE;
953 CVW_EXIT_WRITE(&hfi->hfi_lock);
955 CVW_ENTER_WRITE(&hks->hks_lock);
957 if (hook_wait_setflag(&hks->hks_waiter, FWF_DEL_WAIT_MASK,
958 FWF_DEL_WANTED, FWF_DEL_ACTIVE) == -1) {
960 * If we're trying to destroy the hook_stack_t...
962 CVW_EXIT_WRITE(&hks->hks_lock);
963 return (ENXIO);
967 * Check if the family is in use by the presence of either events
968 * or notify callbacks on the hook family.
970 if (!SLIST_EMPTY(&hfi->hfi_head) || !TAILQ_EMPTY(&hfi->hfi_nhead)) {
971 hfi->hfi_condemned = B_TRUE;
972 } else {
973 VERIFY(hook_wait_destroy(&hfi->hfi_waiter) == 0);
975 * Although hfi_condemned = B_FALSE is implied from creation,
976 * putting a comment here inside the else upsets lint.
978 hfi->hfi_condemned = B_FALSE;
980 CVW_EXIT_WRITE(&hks->hks_lock);
982 if (!notifydone)
983 hook_stack_notify_run(hks, hfi->hfi_family.hf_name,
984 HN_UNREGISTER);
986 hook_wait_unsetflag(&hks->hks_waiter, FWF_DEL_ACTIVE);
989 * If we don't have to wait for anything else to disappear from this
990 * structure then we can free it up.
992 if (!hfi->hfi_condemned)
993 hook_family_free(hfi, hks);
995 return (0);
1000 * Function: hook_family_free
1001 * Returns: None
1002 * Parameters: hfi(I) - internal family pointer
1004 * Free alloc memory for family
1006 static void
1007 hook_family_free(hook_family_int_t *hfi, hook_stack_t *hks)
1011 * This lock gives us possession of the hks pointer after the
1012 * SLIST_REMOVE, for which it is not needed, when hks_shutdown
1013 * is checked and hook_stack_remove called.
1015 mutex_enter(&hook_stack_lock);
1017 ASSERT(hfi != NULL);
1019 if (hks != NULL) {
1020 CVW_ENTER_WRITE(&hks->hks_lock);
1021 /* Remove from family list */
1022 SLIST_REMOVE(&hks->hks_familylist, hfi, hook_family_int,
1023 hfi_entry);
1025 CVW_EXIT_WRITE(&hks->hks_lock);
1028 /* Free name space */
1029 if (hfi->hfi_family.hf_name != NULL) {
1030 kmem_free(hfi->hfi_family.hf_name,
1031 strlen(hfi->hfi_family.hf_name) + 1);
1034 /* Free container */
1035 kmem_free(hfi, sizeof (*hfi));
1037 if (hks->hks_shutdown == 2)
1038 hook_stack_remove(hks);
1040 mutex_exit(&hook_stack_lock);
1044 * Function: hook_family_shutdown
1045 * Returns: int - 0 = success, else = failure
1046 * Parameters: hfi(I) - internal family pointer
1048 * As an alternative to removing a family, we may desire to just generate
1049 * a series of callbacks to indicate that we will be going away in the
1050 * future. The hfi_condemned flag isn't set because we aren't trying to
1051 * remove the structure.
1054 hook_family_shutdown(hook_family_int_t *hfi)
1056 hook_stack_t *hks;
1057 boolean_t notifydone;
1059 ASSERT(hfi != NULL);
1060 hks = hfi->hfi_stack;
1062 CVW_ENTER_WRITE(&hfi->hfi_lock);
1063 notifydone = hfi->hfi_shutdown;
1064 hfi->hfi_shutdown = B_TRUE;
1065 CVW_EXIT_WRITE(&hfi->hfi_lock);
1067 CVW_ENTER_WRITE(&hks->hks_lock);
1069 if (hook_wait_setflag(&hks->hks_waiter, FWF_DEL_WAIT_MASK,
1070 FWF_DEL_WANTED, FWF_DEL_ACTIVE) == -1) {
1072 * If we're trying to destroy the hook_stack_t...
1074 CVW_EXIT_WRITE(&hks->hks_lock);
1075 return (ENXIO);
1078 CVW_EXIT_WRITE(&hks->hks_lock);
1080 if (!notifydone)
1081 hook_stack_notify_run(hks, hfi->hfi_family.hf_name,
1082 HN_UNREGISTER);
1084 hook_wait_unsetflag(&hks->hks_waiter, FWF_DEL_ACTIVE);
1086 return (0);
1090 * Function: hook_family_copy
1091 * Returns: internal family pointer - NULL = Failed
1092 * Parameters: src(I) - family pointer
1094 * Allocate internal family block and duplicate incoming family
1095 * No locks should be held across this function as it may sleep.
1097 static hook_family_int_t *
1098 hook_family_copy(hook_family_t *src)
1100 hook_family_int_t *new;
1101 hook_family_t *dst;
1103 ASSERT(src != NULL);
1104 ASSERT(src->hf_name != NULL);
1106 new = (hook_family_int_t *)kmem_zalloc(sizeof (*new), KM_SLEEP);
1108 /* Copy body */
1109 dst = &new->hfi_family;
1110 *dst = *src;
1112 SLIST_INIT(&new->hfi_head);
1113 TAILQ_INIT(&new->hfi_nhead);
1115 /* Copy name */
1116 dst->hf_name = (char *)kmem_alloc(strlen(src->hf_name) + 1, KM_SLEEP);
1117 (void) strcpy(dst->hf_name, src->hf_name);
1119 return (new);
1123 * Function: hook_family_find
1124 * Returns: internal family pointer - NULL = Not match
1125 * Parameters: family(I) - family name string
1127 * Search family list with family name
1128 * A lock on hfi_lock must be held when called.
1130 static hook_family_int_t *
1131 hook_family_find(char *family, hook_stack_t *hks)
1133 hook_family_int_t *hfi = NULL;
1135 ASSERT(family != NULL);
1137 SLIST_FOREACH(hfi, &hks->hks_familylist, hfi_entry) {
1138 if (strcmp(hfi->hfi_family.hf_name, family) == 0)
1139 break;
1141 return (hfi);
1145 * Function: hook_family_notify_register
1146 * Returns: int - 0 = success, else failure
1147 * Parameters: hfi(I) - hook family
1148 * callback(I) - function to be called
1149 * arg(I) - arg to provide callback when it is called
1151 * So long as this hook stack isn't being shut down, register a new
1152 * callback to be activated each time a new event is added to this
1153 * family.
1155 * To call this function we must have an active handle in use on the family,
1156 * so if we take this into account, then neither the hook_family_int_t nor
1157 * the hook_stack_t that owns it can disappear. We have to put some trust
1158 * in the callers to be properly synchronised...
1160 * Holding hks_lock is required to provide synchronisation for hks_shutdown.
1163 hook_family_notify_register(hook_family_int_t *hfi,
1164 hook_notify_fn_t callback, void *arg)
1166 hook_event_int_t *hei;
1167 hook_stack_t *hks;
1168 boolean_t canrun;
1169 int error;
1171 ASSERT(hfi != NULL);
1172 canrun = B_FALSE;
1173 hks = hfi->hfi_stack;
1175 CVW_ENTER_READ(&hks->hks_lock);
1177 if ((hfi->hfi_stack->hks_shutdown != 0) ||
1178 hfi->hfi_condemned || hfi->hfi_shutdown) {
1179 CVW_EXIT_READ(&hks->hks_lock);
1180 return (ESHUTDOWN);
1183 CVW_ENTER_WRITE(&hfi->hfi_lock);
1184 canrun = (hook_wait_setflag(&hfi->hfi_waiter, FWF_ADD_WAIT_MASK,
1185 FWF_ADD_WANTED, FWF_ADD_ACTIVE) != -1);
1186 error = hook_notify_register(&hfi->hfi_nhead, callback, arg);
1187 CVW_EXIT_WRITE(&hfi->hfi_lock);
1189 CVW_EXIT_READ(&hks->hks_lock);
1191 if (error == 0 && canrun) {
1192 SLIST_FOREACH(hei, &hfi->hfi_head, hei_entry) {
1193 callback(HN_REGISTER, arg,
1194 hfi->hfi_family.hf_name, NULL,
1195 hei->hei_event->he_name);
1199 if (canrun)
1200 hook_wait_unsetflag(&hfi->hfi_waiter, FWF_ADD_ACTIVE);
1202 return (error);
1206 * Function: hook_family_notify_unregister
1207 * Returns: int - 0 = success, else failure
1208 * Parameters: hfi(I) - hook family
1209 * callback(I) - function to be called
1211 * Remove a callback from the list of those executed when a new event is
1212 * added to a hook family. If the family is not in the process of being
1213 * destroyed then simulate an unregister callback for each event that is
1214 * on the family. This pairs up with the hook_family_notify_register
1215 * action that simulates register events.
1216 * The order of what happens here is important and goes like this.
1217 * 1) Remove the callback from the list of functions to be called as part
1218 * of the notify operation when an event is added or removed from the
1219 * hook family.
1220 * 2) If the hook_family_int_t structure is on death row (free_family will
1221 * be set to true) then there's nothing else to do than let it be free'd.
1222 * 3) If the structure isn't about to die, mark it up as being busy using
1223 * hook_wait_setflag and then drop the lock so the loop can be run.
1224 * 4) if hook_wait_setflag was successful, tell all of the notify callback
1225 * functions that this family has been unregistered.
1226 * 5) Cleanup
1229 hook_family_notify_unregister(hook_family_int_t *hfi,
1230 hook_notify_fn_t callback)
1232 hook_event_int_t *hei;
1233 boolean_t free_family;
1234 boolean_t canrun;
1235 int error;
1236 void *arg;
1238 canrun = B_FALSE;
1240 CVW_ENTER_WRITE(&hfi->hfi_lock);
1242 (void) hook_wait_setflag(&hfi->hfi_waiter, FWF_DEL_WAIT_MASK,
1243 FWF_DEL_WANTED, FWF_DEL_ACTIVE);
1245 error = hook_notify_unregister(&hfi->hfi_nhead, callback, &arg);
1247 hook_wait_unsetflag(&hfi->hfi_waiter, FWF_DEL_ACTIVE);
1250 * If hook_family_remove has been called but the structure was still
1251 * "busy" ... but we might have just made it "unbusy"...
1253 if ((error == 0) && hfi->hfi_condemned &&
1254 SLIST_EMPTY(&hfi->hfi_head) && TAILQ_EMPTY(&hfi->hfi_nhead)) {
1255 free_family = B_TRUE;
1256 } else {
1257 free_family = B_FALSE;
1260 if (error == 0 && !free_family) {
1261 canrun = (hook_wait_setflag(&hfi->hfi_waiter, FWF_ADD_WAIT_MASK,
1262 FWF_ADD_WANTED, FWF_ADD_ACTIVE) != -1);
1265 CVW_EXIT_WRITE(&hfi->hfi_lock);
1267 if (canrun) {
1268 SLIST_FOREACH(hei, &hfi->hfi_head, hei_entry) {
1269 callback(HN_UNREGISTER, arg,
1270 hfi->hfi_family.hf_name, NULL,
1271 hei->hei_event->he_name);
1274 hook_wait_unsetflag(&hfi->hfi_waiter, FWF_ADD_ACTIVE);
1275 } else if (free_family) {
1276 hook_family_free(hfi, hfi->hfi_stack);
1279 return (error);
1283 * Function: hook_event_add
1284 * Returns: internal event pointer - NULL = Fail
1285 * Parameters: hfi(I) - internal family pointer
1286 * he(I) - event pointer
1288 * Add new event to event list on specific family.
1289 * This function can fail to return successfully if (1) it cannot allocate
1290 * enough memory for its own internal data structures, (2) the event has
1291 * already been registered (for any hook family.)
1293 hook_event_int_t *
1294 hook_event_add(hook_family_int_t *hfi, hook_event_t *he)
1296 hook_event_int_t *hei, *new;
1297 hook_stack_t *hks;
1299 ASSERT(hfi != NULL);
1300 ASSERT(he != NULL);
1301 ASSERT(he->he_name != NULL);
1303 new = hook_event_copy(he);
1304 if (new == NULL)
1305 return (NULL);
1307 hks = hfi->hfi_stack;
1308 CVW_ENTER_READ(&hks->hks_lock);
1310 hks = hfi->hfi_stack;
1311 if (hks->hks_shutdown != 0) {
1312 CVW_EXIT_READ(&hks->hks_lock);
1313 hook_event_free(new, NULL);
1314 return (NULL);
1317 /* Check whether this event pointer is already registered */
1318 hei = hook_event_checkdup(he, hks);
1319 if (hei != NULL) {
1320 CVW_EXIT_READ(&hks->hks_lock);
1321 hook_event_free(new, NULL);
1322 return (NULL);
1325 CVW_ENTER_WRITE(&hfi->hfi_lock);
1327 if (hfi->hfi_condemned || hfi->hfi_shutdown) {
1328 CVW_EXIT_WRITE(&hfi->hfi_lock);
1329 CVW_EXIT_READ(&hks->hks_lock);
1330 hook_event_free(new, NULL);
1331 return (NULL);
1333 CVW_EXIT_READ(&hks->hks_lock);
1335 if (hook_wait_setflag(&hfi->hfi_waiter, FWF_ADD_WAIT_MASK,
1336 FWF_ADD_WANTED, FWF_ADD_ACTIVE) == -1) {
1337 CVW_EXIT_WRITE(&hfi->hfi_lock);
1338 hook_event_free(new, NULL);
1339 return (NULL);
1342 TAILQ_INIT(&new->hei_nhead);
1344 hook_event_init_kstats(hfi, new);
1345 hook_wait_init(&new->hei_waiter, &new->hei_lock);
1347 /* Add to event list head */
1348 SLIST_INSERT_HEAD(&hfi->hfi_head, new, hei_entry);
1350 CVW_EXIT_WRITE(&hfi->hfi_lock);
1352 hook_notify_run(&hfi->hfi_nhead,
1353 hfi->hfi_family.hf_name, NULL, he->he_name, HN_REGISTER);
1355 hook_wait_unsetflag(&hfi->hfi_waiter, FWF_ADD_ACTIVE);
1357 return (new);
1361 * Function: hook_event_init_kstats
1362 * Returns: None
1363 * Parameters: hfi(I) - pointer to the family that owns this event.
1364 * hei(I) - pointer to the hook event that needs some kstats.
1366 * Create a set of kstats that relate to each event registered with
1367 * the hook framework. A counter is kept for each time the event is
1368 * activated and for each time a hook is added or removed. As the
1369 * kstats just count the events as they happen, the total number of
1370 * hooks registered must be obtained by subtractived removed from added.
1372 static void
1373 hook_event_init_kstats(hook_family_int_t *hfi, hook_event_int_t *hei)
1375 hook_event_kstat_t template = {
1376 { "hooksAdded", KSTAT_DATA_UINT64 },
1377 { "hooksRemoved", KSTAT_DATA_UINT64 },
1378 { "events", KSTAT_DATA_UINT64 }
1380 hook_stack_t *hks;
1382 hks = hfi->hfi_stack;
1383 hei->hei_kstatp = kstat_create_netstack(hfi->hfi_family.hf_name, 0,
1384 hei->hei_event->he_name, "hook_event", KSTAT_TYPE_NAMED,
1385 sizeof (hei->hei_kstats) / sizeof (kstat_named_t),
1386 KSTAT_FLAG_VIRTUAL, hks->hks_netstackid);
1388 bcopy((char *)&template, &hei->hei_kstats, sizeof (template));
1390 if (hei->hei_kstatp != NULL) {
1391 hei->hei_kstatp->ks_data = (void *)&hei->hei_kstats;
1392 hei->hei_kstatp->ks_private =
1393 (void *)(uintptr_t)hks->hks_netstackid;
1395 kstat_install(hei->hei_kstatp);
1400 * Function: hook_event_remove
1401 * Returns: int - 0 = success, else = failure
1402 * Parameters: hfi(I) - internal family pointer
1403 * he(I) - event pointer
1405 * Remove event from event list on specific family
1407 * This function assumes that the caller has received a pointer to a the
1408 * hook_family_int_t via a call to net_protocol_lookup or net_protocol_unreg'.
1409 * This the hook_family_int_t is guaranteed to be around for the life of this
1410 * call, unless the caller has decided to call net_protocol_release or
1411 * net_protocol_unregister before calling net_event_unregister - an error.
1414 hook_event_remove(hook_family_int_t *hfi, hook_event_t *he)
1416 boolean_t free_family;
1417 hook_event_int_t *hei;
1418 boolean_t notifydone;
1420 ASSERT(hfi != NULL);
1421 ASSERT(he != NULL);
1423 CVW_ENTER_WRITE(&hfi->hfi_lock);
1426 * Set the flag so that we can call hook_event_notify_run without
1427 * holding any locks but at the same time prevent other changes to
1428 * the event at the same time.
1430 if (hook_wait_setflag(&hfi->hfi_waiter, FWF_DEL_WAIT_MASK,
1431 FWF_DEL_WANTED, FWF_DEL_ACTIVE) == -1) {
1432 CVW_EXIT_WRITE(&hfi->hfi_lock);
1433 return (ENXIO);
1436 hei = hook_event_find(hfi, he->he_name);
1437 if (hei == NULL) {
1438 hook_wait_unsetflag(&hfi->hfi_waiter, FWF_DEL_ACTIVE);
1439 CVW_EXIT_WRITE(&hfi->hfi_lock);
1440 return (ESRCH);
1443 free_family = B_FALSE;
1445 CVW_ENTER_WRITE(&hei->hei_lock);
1447 * The hei_shutdown flag is used to indicate whether or not we have
1448 * done a shutdown and thus already walked through the notify list.
1450 notifydone = hei->hei_shutdown;
1451 hei->hei_shutdown = B_TRUE;
1453 * If there are any hooks still registered for this event or
1454 * there are any notifiers registered, return an error indicating
1455 * that the event is still busy.
1457 if (!TAILQ_EMPTY(&hei->hei_head) || !TAILQ_EMPTY(&hei->hei_nhead)) {
1458 hei->hei_condemned = B_TRUE;
1459 CVW_EXIT_WRITE(&hei->hei_lock);
1460 } else {
1461 /* hei_condemned = B_FALSE is implied from creation */
1463 * Even though we know the notify list is empty, we call
1464 * hook_wait_destroy here to synchronise wait removing a
1465 * hook from an event.
1467 VERIFY(hook_wait_destroy(&hei->hei_waiter) == 0);
1469 CVW_EXIT_WRITE(&hei->hei_lock);
1471 if (hfi->hfi_condemned && SLIST_EMPTY(&hfi->hfi_head) &&
1472 TAILQ_EMPTY(&hfi->hfi_nhead))
1473 free_family = B_TRUE;
1476 CVW_EXIT_WRITE(&hfi->hfi_lock);
1478 if (!notifydone)
1479 hook_notify_run(&hfi->hfi_nhead,
1480 hfi->hfi_family.hf_name, NULL, he->he_name, HN_UNREGISTER);
1482 hook_wait_unsetflag(&hfi->hfi_waiter, FWF_DEL_ACTIVE);
1484 if (!hei->hei_condemned) {
1485 hook_event_free(hei, hfi);
1486 if (free_family)
1487 hook_family_free(hfi, hfi->hfi_stack);
1490 return (0);
1494 * Function: hook_event_shutdown
1495 * Returns: int - 0 = success, else = failure
1496 * Parameters: hfi(I) - internal family pointer
1497 * he(I) - event pointer
1499 * As with hook_family_shutdown, we want to generate the notify callbacks
1500 * as if the event was being removed but not actually do the remove.
1503 hook_event_shutdown(hook_family_int_t *hfi, hook_event_t *he)
1505 hook_event_int_t *hei;
1506 boolean_t notifydone;
1508 ASSERT(hfi != NULL);
1509 ASSERT(he != NULL);
1511 CVW_ENTER_WRITE(&hfi->hfi_lock);
1514 * Set the flag so that we can call hook_event_notify_run without
1515 * holding any locks but at the same time prevent other changes to
1516 * the event at the same time.
1518 if (hook_wait_setflag(&hfi->hfi_waiter, FWF_DEL_WAIT_MASK,
1519 FWF_DEL_WANTED, FWF_DEL_ACTIVE) == -1) {
1520 CVW_EXIT_WRITE(&hfi->hfi_lock);
1521 return (ENXIO);
1524 hei = hook_event_find(hfi, he->he_name);
1525 if (hei == NULL) {
1526 hook_wait_unsetflag(&hfi->hfi_waiter, FWF_DEL_ACTIVE);
1527 CVW_EXIT_WRITE(&hfi->hfi_lock);
1528 return (ESRCH);
1531 CVW_ENTER_WRITE(&hei->hei_lock);
1532 notifydone = hei->hei_shutdown;
1533 hei->hei_shutdown = B_TRUE;
1534 CVW_EXIT_WRITE(&hei->hei_lock);
1536 CVW_EXIT_WRITE(&hfi->hfi_lock);
1538 if (!notifydone)
1539 hook_notify_run(&hfi->hfi_nhead,
1540 hfi->hfi_family.hf_name, NULL, he->he_name, HN_UNREGISTER);
1542 hook_wait_unsetflag(&hfi->hfi_waiter, FWF_DEL_ACTIVE);
1544 return (0);
1548 * Function: hook_event_free
1549 * Returns: None
1550 * Parameters: hei(I) - internal event pointer
1552 * Free alloc memory for event
1554 static void
1555 hook_event_free(hook_event_int_t *hei, hook_family_int_t *hfi)
1557 boolean_t free_family;
1559 ASSERT(hei != NULL);
1561 if (hfi != NULL) {
1562 CVW_ENTER_WRITE(&hfi->hfi_lock);
1564 * Remove the event from the hook family's list.
1566 SLIST_REMOVE(&hfi->hfi_head, hei, hook_event_int, hei_entry);
1567 if (hfi->hfi_condemned && SLIST_EMPTY(&hfi->hfi_head) &&
1568 TAILQ_EMPTY(&hfi->hfi_nhead)) {
1569 free_family = B_TRUE;
1570 } else {
1571 free_family = B_FALSE;
1573 CVW_EXIT_WRITE(&hfi->hfi_lock);
1576 if (hei->hei_kstatp != NULL) {
1577 ASSERT(hfi != NULL);
1579 kstat_delete_netstack(hei->hei_kstatp,
1580 hfi->hfi_stack->hks_netstackid);
1581 hei->hei_kstatp = NULL;
1584 /* Free container */
1585 kmem_free(hei, sizeof (*hei));
1587 if (free_family)
1588 hook_family_free(hfi, hfi->hfi_stack);
1592 * Function: hook_event_checkdup
1593 * Returns: internal event pointer - NULL = Not match
1594 * Parameters: he(I) - event pointer
1596 * Search all of the hook families to see if the event being passed in
1597 * has already been associated with one.
1599 static hook_event_int_t *
1600 hook_event_checkdup(hook_event_t *he, hook_stack_t *hks)
1602 hook_family_int_t *hfi;
1603 hook_event_int_t *hei;
1605 ASSERT(he != NULL);
1607 CVW_ENTER_READ(&hks->hks_lock);
1608 SLIST_FOREACH(hfi, &hks->hks_familylist, hfi_entry) {
1609 SLIST_FOREACH(hei, &hfi->hfi_head, hei_entry) {
1610 if (hei->hei_event == he) {
1611 CVW_EXIT_READ(&hks->hks_lock);
1612 return (hei);
1616 CVW_EXIT_READ(&hks->hks_lock);
1618 return (NULL);
1622 * Function: hook_event_copy
1623 * Returns: internal event pointer - NULL = Failed
1624 * Parameters: src(I) - event pointer
1626 * Allocate internal event block and duplicate incoming event
1627 * No locks should be held across this function as it may sleep.
1629 static hook_event_int_t *
1630 hook_event_copy(hook_event_t *src)
1632 hook_event_int_t *new;
1634 ASSERT(src != NULL);
1635 ASSERT(src->he_name != NULL);
1637 new = (hook_event_int_t *)kmem_zalloc(sizeof (*new), KM_SLEEP);
1639 /* Copy body */
1640 TAILQ_INIT(&new->hei_head);
1641 new->hei_event = src;
1643 return (new);
1647 * Function: hook_event_find
1648 * Returns: internal event pointer - NULL = Not match
1649 * Parameters: hfi(I) - internal family pointer
1650 * event(I) - event name string
1652 * Search event list with event name
1653 * A lock on hfi->hfi_lock must be held when called.
1655 static hook_event_int_t *
1656 hook_event_find(hook_family_int_t *hfi, char *event)
1658 hook_event_int_t *hei = NULL;
1660 ASSERT(hfi != NULL);
1661 ASSERT(event != NULL);
1663 SLIST_FOREACH(hei, &hfi->hfi_head, hei_entry) {
1664 if ((strcmp(hei->hei_event->he_name, event) == 0) &&
1665 ((hei->hei_waiter.fw_flags & FWF_UNSAFE) == 0))
1666 break;
1668 return (hei);
1672 * Function: hook_event_notify_register
1673 * Returns: int - 0 = success, else failure
1674 * Parameters: hfi(I) - hook family
1675 * event(I) - name of the event
1676 * callback(I) - function to be called
1677 * arg(I) - arg to provide callback when it is called
1679 * Adds a new callback to the event named by "event" (we must find it)
1680 * that will be executed each time a new hook is added to the event.
1681 * Of course, if the stack is being shut down, this call should fail.
1684 hook_event_notify_register(hook_family_int_t *hfi, char *event,
1685 hook_notify_fn_t callback, void *arg)
1687 hook_event_int_t *hei;
1688 hook_stack_t *hks;
1689 boolean_t canrun;
1690 hook_int_t *h;
1691 int error;
1693 canrun = B_FALSE;
1694 hks = hfi->hfi_stack;
1695 CVW_ENTER_READ(&hks->hks_lock);
1696 if (hks->hks_shutdown != 0) {
1697 CVW_EXIT_READ(&hks->hks_lock);
1698 return (ESHUTDOWN);
1701 CVW_ENTER_READ(&hfi->hfi_lock);
1703 if (hfi->hfi_condemned || hfi->hfi_shutdown) {
1704 CVW_EXIT_READ(&hfi->hfi_lock);
1705 CVW_EXIT_READ(&hks->hks_lock);
1706 return (ESHUTDOWN);
1709 hei = hook_event_find(hfi, event);
1710 if (hei == NULL) {
1711 CVW_EXIT_READ(&hfi->hfi_lock);
1712 CVW_EXIT_READ(&hks->hks_lock);
1713 return (ESRCH);
1716 if (hei->hei_condemned || hei->hei_shutdown) {
1717 CVW_EXIT_READ(&hfi->hfi_lock);
1718 CVW_EXIT_READ(&hks->hks_lock);
1719 return (ESHUTDOWN);
1722 CVW_ENTER_WRITE(&hei->hei_lock);
1723 canrun = (hook_wait_setflag(&hei->hei_waiter, FWF_ADD_WAIT_MASK,
1724 FWF_ADD_WANTED, FWF_ADD_ACTIVE) != -1);
1725 error = hook_notify_register(&hei->hei_nhead, callback, arg);
1726 CVW_EXIT_WRITE(&hei->hei_lock);
1728 CVW_EXIT_READ(&hfi->hfi_lock);
1729 CVW_EXIT_READ(&hks->hks_lock);
1731 if (error == 0 && canrun) {
1732 TAILQ_FOREACH(h, &hei->hei_head, hi_entry) {
1733 callback(HN_REGISTER, arg,
1734 hfi->hfi_family.hf_name, hei->hei_event->he_name,
1735 h->hi_hook.h_name);
1739 if (canrun)
1740 hook_wait_unsetflag(&hei->hei_waiter, FWF_ADD_ACTIVE);
1742 return (error);
1746 * Function: hook_event_notify_unregister
1747 * Returns: int - 0 = success, else failure
1748 * Parameters: hfi(I) - hook family
1749 * event(I) - name of the event
1750 * callback(I) - function to be called
1752 * Remove the given callback from the named event's list of functions
1753 * to call when a hook is added or removed.
1756 hook_event_notify_unregister(hook_family_int_t *hfi, char *event,
1757 hook_notify_fn_t callback)
1759 hook_event_int_t *hei;
1760 boolean_t free_event;
1761 boolean_t canrun;
1762 hook_int_t *h;
1763 void *arg;
1764 int error;
1766 canrun = B_FALSE;
1768 CVW_ENTER_READ(&hfi->hfi_lock);
1770 hei = hook_event_find(hfi, event);
1771 if (hei == NULL) {
1772 CVW_EXIT_READ(&hfi->hfi_lock);
1773 return (ESRCH);
1776 CVW_ENTER_WRITE(&hei->hei_lock);
1778 (void) hook_wait_setflag(&hei->hei_waiter, FWF_DEL_WAIT_MASK,
1779 FWF_DEL_WANTED, FWF_DEL_ACTIVE);
1781 error = hook_notify_unregister(&hei->hei_nhead, callback, &arg);
1783 hook_wait_unsetflag(&hei->hei_waiter, FWF_DEL_ACTIVE);
1786 * hei_condemned has been set if someone tried to remove the
1787 * event but couldn't because there were still things attached to
1788 * it. Now that we've done a successful remove, if it is now empty
1789 * then by all rights we should be free'ing it too. Note that the
1790 * expectation is that only the caller of hook_event_add will ever
1791 * call hook_event_remove.
1793 if ((error == 0) && hei->hei_condemned &&
1794 TAILQ_EMPTY(&hei->hei_head) && TAILQ_EMPTY(&hei->hei_nhead)) {
1795 free_event = B_TRUE;
1796 } else {
1797 free_event = B_FALSE;
1800 if (error == 0 && !free_event) {
1801 canrun = (hook_wait_setflag(&hei->hei_waiter, FWF_ADD_WAIT_MASK,
1802 FWF_ADD_WANTED, FWF_ADD_ACTIVE) != -1);
1805 CVW_EXIT_WRITE(&hei->hei_lock);
1806 CVW_EXIT_READ(&hfi->hfi_lock);
1808 if (canrun) {
1809 TAILQ_FOREACH(h, &hei->hei_head, hi_entry) {
1810 callback(HN_UNREGISTER, arg,
1811 hfi->hfi_family.hf_name, hei->hei_event->he_name,
1812 h->hi_hook.h_name);
1815 hook_wait_unsetflag(&hei->hei_waiter, FWF_ADD_ACTIVE);
1818 if (free_event) {
1820 * It is safe to pass in hfi here, without a lock, because
1821 * our structure (hei) is still on one of its lists and thus
1822 * it won't be able to disappear yet...
1824 hook_event_free(hei, hfi);
1827 return (error);
1831 * Function: hook_event_notify_run
1832 * Returns: None
1833 * Parameters: nrun(I) - pointer to the list of callbacks to execute
1834 * hfi(I) - hook stack pointer to execute callbacks for
1835 * name(I) - name of a hook family
1836 * cmd(I) - either HN_UNREGISTER or HN_REGISTER
1838 * Execute all of the callbacks registered for this event.
1840 static void
1841 hook_event_notify_run(hook_event_int_t *hei, hook_family_int_t *hfi,
1842 char *event, char *name, hook_notify_cmd_t cmd)
1845 hook_notify_run(&hei->hei_nhead, hfi->hfi_family.hf_name,
1846 event, name, cmd);
1850 * Function: hook_register
1851 * Returns: int - 0 = success, else = failure
1852 * Parameters: hfi(I) - internal family pointer
1853 * event(I) - event name string
1854 * h(I) - hook pointer
1856 * Add new hook to hook list on the specified family and event.
1859 hook_register(hook_family_int_t *hfi, char *event, hook_t *h)
1861 hook_event_int_t *hei;
1862 hook_int_t *hi, *new;
1863 int error;
1865 ASSERT(hfi != NULL);
1866 ASSERT(event != NULL);
1867 ASSERT(h != NULL);
1869 if (hfi->hfi_stack->hks_shutdown)
1870 return (NULL);
1872 /* Alloc hook_int_t and copy hook */
1873 new = hook_copy(h);
1874 if (new == NULL)
1875 return (ENOMEM);
1878 * Since hook add/remove only impact event, so it is unnecessary
1879 * to hold global family write lock. Just get read lock here to
1880 * ensure event will not be removed when doing hooks operation
1882 CVW_ENTER_WRITE(&hfi->hfi_lock);
1884 hei = hook_event_find(hfi, event);
1885 if (hei == NULL) {
1886 CVW_EXIT_WRITE(&hfi->hfi_lock);
1887 hook_int_free(new, hfi->hfi_stack->hks_netstackid);
1888 return (ENXIO);
1891 CVW_ENTER_WRITE(&hei->hei_lock);
1894 * If we've run either the remove() or shutdown(), do not allow any
1895 * more hooks to be added to this event.
1897 if (hei->hei_shutdown) {
1898 error = ESHUTDOWN;
1899 goto bad_add;
1902 hi = hook_find(hei, h);
1903 if (hi != NULL) {
1904 error = EEXIST;
1905 goto bad_add;
1908 if (hook_wait_setflag(&hei->hei_waiter, FWF_ADD_WAIT_MASK,
1909 FWF_ADD_WANTED, FWF_ADD_ACTIVE) == -1) {
1910 error = ENOENT;
1911 bad_add:
1912 CVW_EXIT_WRITE(&hei->hei_lock);
1913 CVW_EXIT_WRITE(&hfi->hfi_lock);
1914 hook_int_free(new, hfi->hfi_stack->hks_netstackid);
1915 return (error);
1918 /* Add to hook list head */
1919 error = hook_insert(&hei->hei_head, new);
1920 if (error == 0) {
1921 hei->hei_event->he_interested = B_TRUE;
1922 hei->hei_kstats.hooks_added.value.ui64++;
1924 hook_init_kstats(hfi, hei, new);
1927 CVW_EXIT_WRITE(&hei->hei_lock);
1928 CVW_EXIT_WRITE(&hfi->hfi_lock);
1931 * Note that the name string passed through to the notify callbacks
1932 * is from the original hook being registered, not the copy being
1933 * inserted.
1935 if (error == 0)
1936 hook_event_notify_run(hei, hfi, event, h->h_name, HN_REGISTER);
1938 hook_wait_unsetflag(&hei->hei_waiter, FWF_ADD_ACTIVE);
1940 return (error);
1944 * Function: hook_insert
1945 * Returns: int - 0 = success, else = failure
1946 * Parameters: head(I) - pointer to hook list to insert hook onto
1947 * new(I) - pointer to hook to be inserted
1949 * Try to insert the hook onto the list of hooks according to the hints
1950 * given in the hook to be inserted and those that already exist on the
1951 * list. For now, the implementation permits only a single hook to be
1952 * either first or last and names provided with before or after are only
1953 * loosely coupled with the action.
1955 static int
1956 hook_insert(hook_int_head_t *head, hook_int_t *new)
1958 hook_int_t *before;
1959 hook_int_t *hi;
1960 hook_t *hih;
1961 hook_t *h = &new->hi_hook;
1963 switch (new->hi_hook.h_hint) {
1964 case HH_NONE :
1965 before = NULL;
1967 * If there is no hint present (or not one that can be
1968 * satisfied now) then try to at least respect the wishes
1969 * of those that want to be last. If there are none wanting
1970 * to be last then add the new hook to the tail of the
1971 * list - this means we keep any wanting to be first
1972 * happy without having to search for HH_FIRST.
1974 TAILQ_FOREACH(hi, head, hi_entry) {
1975 hih = &hi->hi_hook;
1976 if ((hih->h_hint == HH_AFTER) &&
1977 (strcmp(h->h_name,
1978 (char *)hih->h_hintvalue) == 0)) {
1979 TAILQ_INSERT_BEFORE(hi, new, hi_entry);
1980 return (0);
1982 if ((hih->h_hint == HH_BEFORE) && (before == NULL) &&
1983 (strcmp(h->h_name,
1984 (char *)hih->h_hintvalue) == 0)) {
1985 before = hi;
1988 if (before != NULL) {
1989 TAILQ_INSERT_AFTER(head, before, new, hi_entry);
1990 return (0);
1992 hook_insert_plain(head, new);
1993 break;
1995 case HH_FIRST :
1996 hi = TAILQ_FIRST(head);
1997 if ((hi != NULL) && (hi->hi_hook.h_hint == HH_FIRST))
1998 return (EBUSY);
1999 TAILQ_INSERT_HEAD(head, new, hi_entry);
2000 break;
2002 case HH_LAST :
2003 hi = TAILQ_LAST(head, hook_int_head);
2004 if ((hi != NULL) && (hi->hi_hook.h_hint == HH_LAST))
2005 return (EBUSY);
2006 TAILQ_INSERT_TAIL(head, new, hi_entry);
2007 break;
2009 case HH_BEFORE :
2010 hi = hook_find_byname(head, (char *)new->hi_hook.h_hintvalue);
2011 if (hi == NULL)
2012 return (hook_insert_afterbefore(head, new));
2014 if (hi->hi_hook.h_hint == HH_FIRST)
2015 return (EBUSY);
2017 TAILQ_INSERT_BEFORE(hi, new, hi_entry);
2018 break;
2020 case HH_AFTER :
2021 hi = hook_find_byname(head, (char *)new->hi_hook.h_hintvalue);
2022 if (hi == NULL)
2023 return (hook_insert_afterbefore(head, new));
2025 if (hi->hi_hook.h_hint == HH_LAST)
2026 return (EBUSY);
2028 TAILQ_INSERT_AFTER(head, hi, new, hi_entry);
2029 break;
2031 default :
2032 return (EINVAL);
2035 return (0);
2039 * Function: hook_insert_plain
2040 * Returns: int - 0 = success, else = failure
2041 * Parameters: head(I) - pointer to hook list to insert hook onto
2042 * new(I) - pointer to hook to be inserted
2044 * Insert a hook such that it respects the wishes of those that want to
2045 * be last. If there are none wanting to be last then add the new hook
2046 * to the tail of the list - this means we keep any wanting to be first
2047 * happy without having to search for HH_FIRST.
2049 static void
2050 hook_insert_plain(hook_int_head_t *head, hook_int_t *new)
2052 hook_int_t *hi;
2054 hi = TAILQ_FIRST(head);
2055 if (hi != NULL) {
2056 if (hi->hi_hook.h_hint == HH_LAST) {
2057 TAILQ_INSERT_BEFORE(hi, new, hi_entry);
2058 } else {
2059 TAILQ_INSERT_TAIL(head, new, hi_entry);
2061 } else {
2062 TAILQ_INSERT_TAIL(head, new, hi_entry);
2067 * Function: hook_insert_afterbefore
2068 * Returns: int - 0 = success, else = failure
2069 * Parameters: head(I) - pointer to hook list to insert hook onto
2070 * new(I) - pointer to hook to be inserted
2072 * Simple insertion of a hook specifying a HH_BEFORE or HH_AFTER was not
2073 * possible, so now we need to be more careful. The first pass is to go
2074 * through the list and look for any other hooks that also specify the
2075 * same hint name as the new one. The object of this exercise is to make
2076 * sure that hooks with HH_BEFORE always appear on the list before those
2077 * with HH_AFTER so that when said hook arrives, it can be placed in the
2078 * middle of the BEFOREs and AFTERs. If this condition does not arise,
2079 * just use hook_insert_plain() to try and insert the hook somewhere that
2080 * is innocuous to existing efforts.
2082 static int
2083 hook_insert_afterbefore(hook_int_head_t *head, hook_int_t *new)
2085 hook_int_t *hi;
2086 hook_t *nh;
2087 hook_t *h;
2089 nh = &new->hi_hook;
2090 ASSERT(new->hi_hook.h_hint != HH_NONE);
2091 ASSERT(new->hi_hook.h_hint != HH_LAST);
2092 ASSERT(new->hi_hook.h_hint != HH_FIRST);
2095 * First, look through the list to see if there are any other
2096 * before's or after's that have a matching hint name.
2098 TAILQ_FOREACH(hi, head, hi_entry) {
2099 h = &hi->hi_hook;
2100 switch (h->h_hint) {
2101 case HH_FIRST :
2102 case HH_LAST :
2103 case HH_NONE :
2104 break;
2105 case HH_BEFORE :
2106 if ((nh->h_hint == HH_BEFORE) &&
2107 (strcmp((char *)h->h_hintvalue,
2108 (char *)nh->h_hintvalue) == 0)) {
2109 TAILQ_INSERT_AFTER(head, hi, new, hi_entry);
2110 return (0);
2112 if ((nh->h_hint == HH_AFTER) &&
2113 (strcmp((char *)h->h_hintvalue,
2114 (char *)nh->h_hintvalue) == 0)) {
2115 TAILQ_INSERT_BEFORE(hi, new, hi_entry);
2116 return (0);
2118 break;
2119 case HH_AFTER :
2120 if ((nh->h_hint == HH_AFTER) &&
2121 (strcmp((char *)h->h_hintvalue,
2122 (char *)nh->h_hintvalue) == 0)) {
2123 TAILQ_INSERT_AFTER(head, hi, new, hi_entry);
2124 return (0);
2126 if ((nh->h_hint == HH_BEFORE) &&
2127 (strcmp((char *)h->h_hintvalue,
2128 (char *)nh->h_hintvalue) == 0)) {
2129 TAILQ_INSERT_BEFORE(hi, new, hi_entry);
2130 return (0);
2132 break;
2136 hook_insert_plain(head, new);
2138 return (0);
2142 * Function: hook_unregister
2143 * Returns: int - 0 = success, else = failure
2144 * Parameters: hfi(I) - internal family pointer
2145 * event(I) - event name string
2146 * h(I) - hook pointer
2148 * Remove hook from hook list on specific family, event
2151 hook_unregister(hook_family_int_t *hfi, char *event, hook_t *h)
2153 hook_event_int_t *hei;
2154 hook_int_t *hi;
2155 boolean_t free_event;
2157 ASSERT(hfi != NULL);
2158 ASSERT(h != NULL);
2160 CVW_ENTER_WRITE(&hfi->hfi_lock);
2162 hei = hook_event_find(hfi, event);
2163 if (hei == NULL) {
2164 CVW_EXIT_WRITE(&hfi->hfi_lock);
2165 return (ENXIO);
2168 /* Hold write lock for event */
2169 CVW_ENTER_WRITE(&hei->hei_lock);
2171 hi = hook_find(hei, h);
2172 if (hi == NULL) {
2173 CVW_EXIT_WRITE(&hei->hei_lock);
2174 CVW_EXIT_WRITE(&hfi->hfi_lock);
2175 return (ENXIO);
2178 if (hook_wait_setflag(&hei->hei_waiter, FWF_DEL_WAIT_MASK,
2179 FWF_DEL_WANTED, FWF_DEL_ACTIVE) == -1) {
2180 CVW_EXIT_WRITE(&hei->hei_lock);
2181 CVW_EXIT_WRITE(&hfi->hfi_lock);
2182 return (ENOENT);
2185 /* Remove from hook list */
2186 TAILQ_REMOVE(&hei->hei_head, hi, hi_entry);
2188 free_event = B_FALSE;
2189 if (TAILQ_EMPTY(&hei->hei_head)) {
2190 hei->hei_event->he_interested = B_FALSE;
2192 * If the delete pending flag has been set and there are
2193 * no notifiers on the event (and we've removed the last
2194 * hook) then we need to free this event after we're done.
2196 if (hei->hei_condemned && TAILQ_EMPTY(&hei->hei_nhead))
2197 free_event = B_TRUE;
2199 hei->hei_kstats.hooks_removed.value.ui64++;
2201 CVW_EXIT_WRITE(&hei->hei_lock);
2202 CVW_EXIT_WRITE(&hfi->hfi_lock);
2204 * While the FWF_DEL_ACTIVE flag is set, the hook_event_int_t
2205 * will not be free'd and thus the hook_family_int_t wil not
2206 * be free'd either.
2208 hook_event_notify_run(hei, hfi, event, h->h_name, HN_UNREGISTER);
2209 hook_wait_unsetflag(&hei->hei_waiter, FWF_DEL_ACTIVE);
2211 hook_int_free(hi, hfi->hfi_stack->hks_netstackid);
2213 if (free_event)
2214 hook_event_free(hei, hfi);
2216 return (0);
2220 * Function: hook_find_byname
2221 * Returns: internal hook pointer - NULL = Not match
2222 * Parameters: hei(I) - internal event pointer
2223 * name(I)- hook name
2225 * Search an event's list of hooks to see if there is a hook present that
2226 * has a matching name to the one being looked for.
2228 static hook_int_t *
2229 hook_find_byname(hook_int_head_t *head, char *name)
2231 hook_int_t *hi;
2233 TAILQ_FOREACH(hi, head, hi_entry) {
2234 if (strcmp(hi->hi_hook.h_name, name) == 0)
2235 return (hi);
2238 return (NULL);
2242 * Function: hook_find
2243 * Returns: internal hook pointer - NULL = Not match
2244 * Parameters: hei(I) - internal event pointer
2245 * h(I) - hook pointer
2247 * Search an event's list of hooks to see if there is already one that
2248 * matches the hook being passed in. Currently the only criteria for a
2249 * successful search here is for the names to be the same.
2251 static hook_int_t *
2252 hook_find(hook_event_int_t *hei, hook_t *h)
2255 ASSERT(hei != NULL);
2256 ASSERT(h != NULL);
2258 return (hook_find_byname(&hei->hei_head, h->h_name));
2262 * Function: hook_copy
2263 * Returns: internal hook pointer - NULL = Failed
2264 * Parameters: src(I) - hook pointer
2266 * Allocate internal hook block and duplicate incoming hook.
2267 * No locks should be held across this function as it may sleep.
2268 * Because hook_copy() is responsible for the creation of the internal
2269 * hook structure that is used here, it takes on population the structure
2270 * with the kstat information. Note that while the kstat bits are
2271 * seeded here, their installation of the kstats is handled elsewhere.
2273 static hook_int_t *
2274 hook_copy(hook_t *src)
2276 hook_int_t *new;
2277 hook_t *dst;
2278 int len;
2280 ASSERT(src != NULL);
2281 ASSERT(src->h_name != NULL);
2283 new = (hook_int_t *)kmem_zalloc(sizeof (*new), KM_SLEEP);
2285 /* Copy body */
2286 dst = &new->hi_hook;
2287 *dst = *src;
2289 /* Copy name */
2290 len = strlen(src->h_name);
2291 dst->h_name = (char *)kmem_alloc(len + 1, KM_SLEEP);
2292 (void) strcpy(dst->h_name, src->h_name);
2295 * This is initialised in this manner to make it safer to use the
2296 * same pointer in the kstats field.
2298 dst->h_hintvalue = (uintptr_t)"";
2300 if (dst->h_hint == HH_BEFORE || dst->h_hint == HH_AFTER) {
2301 len = strlen((char *)src->h_hintvalue);
2302 if (len > 0) {
2303 dst->h_hintvalue = (uintptr_t)kmem_alloc(len + 1,
2304 KM_SLEEP);
2305 (void) strcpy((char *)dst->h_hintvalue,
2306 (char *)src->h_hintvalue);
2310 return (new);
2314 * Function: hook_init_kstats
2315 * Returns: None
2316 * Parameters: hfi(I) - pointer to the family that owns the event.
2317 * hei(I) - pointer to the event that owns this hook
2318 * hi(I) - pointer to the hook for which we create kstats for
2320 * Each hook that is registered with this framework has its own kstats
2321 * set up so that we can provide an easy way in which to observe the
2322 * look of hooks (using the kstat command.) The position is set to 0
2323 * here but is recalculated after we know the insertion has been a
2324 * success.
2326 static void
2327 hook_init_kstats(hook_family_int_t *hfi, hook_event_int_t *hei, hook_int_t *hi)
2329 hook_hook_kstat_t template = {
2330 { "version", KSTAT_DATA_INT32 },
2331 { "flags", KSTAT_DATA_UINT32 },
2332 { "hint", KSTAT_DATA_INT32 },
2333 { "hint_value", KSTAT_DATA_STRING },
2334 { "position", KSTAT_DATA_INT32 },
2335 { "hook_hits", KSTAT_DATA_UINT64 }
2337 hook_stack_t *hks;
2338 size_t kslen;
2339 int position;
2340 hook_int_t *h;
2342 kslen = strlen(hfi->hfi_family.hf_name) +
2343 strlen(hei->hei_event->he_name) + 2;
2345 hi->hi_ksname = (char *)kmem_zalloc(kslen, KM_SLEEP);
2346 (void) snprintf(hi->hi_ksname, kslen, "%s/%s",
2347 hfi->hfi_family.hf_name, hei->hei_event->he_name);
2349 hks = hfi->hfi_stack;
2350 hi->hi_kstatp = kstat_create_netstack(hi->hi_ksname, 0,
2351 hi->hi_hook.h_name, "hook", KSTAT_TYPE_NAMED,
2352 sizeof (hi->hi_kstats) / sizeof (kstat_named_t),
2353 KSTAT_FLAG_VIRTUAL, hks->hks_netstackid);
2355 /* Initialise the kstats for the structure */
2356 bcopy(&template, &hi->hi_kstats, sizeof (template));
2357 hi->hi_kstats.hook_version.value.i32 = hi->hi_hook.h_version;
2358 hi->hi_kstats.hook_flags.value.ui32 = hi->hi_hook.h_flags;
2359 hi->hi_kstats.hook_hint.value.i32 = hi->hi_hook.h_hint;
2360 hi->hi_kstats.hook_position.value.i32 = 0;
2361 hi->hi_kstats.hook_hits.value.ui64 = 0;
2363 switch (hi->hi_hook.h_hint) {
2364 case HH_BEFORE :
2365 case HH_AFTER :
2366 kstat_named_setstr(&(hi->hi_kstats.hook_hintvalue),
2367 (const char *)hi->hi_hook.h_hintvalue);
2368 break;
2369 default :
2370 kstat_named_setstr(&(hi->hi_kstats.hook_hintvalue),
2371 hook_hintvalue_none);
2372 break;
2375 if (hi->hi_kstatp != NULL) {
2376 hi->hi_kstatp->ks_data = (void *)&hi->hi_kstats;
2377 hi->hi_kstatp->ks_private =
2378 (void *)(uintptr_t)hks->hks_netstackid;
2379 hi->hi_kstatp->ks_data_size +=
2380 KSTAT_NAMED_STR_BUFLEN(&(hi->hi_kstats.hook_hintvalue)) + 1;
2382 kstat_install(hi->hi_kstatp);
2385 position = 1;
2386 TAILQ_FOREACH(h, &hei->hei_head, hi_entry) {
2387 h->hi_kstats.hook_position.value.ui32 = position++;
2392 * Function: hook_int_free
2393 * Returns: None
2394 * Parameters: hi(I) - internal hook pointer
2396 * Free memory allocated to support a hook.
2398 static void
2399 hook_int_free(hook_int_t *hi, netstackid_t stackid)
2401 int len;
2403 ASSERT(hi != NULL);
2405 /* Free name space */
2406 if (hi->hi_hook.h_name != NULL) {
2407 kmem_free(hi->hi_hook.h_name, strlen(hi->hi_hook.h_name) + 1);
2409 if (hi->hi_ksname != NULL) {
2410 kmem_free(hi->hi_ksname, strlen(hi->hi_ksname) + 1);
2413 /* Free the name used with the before/after hints. */
2414 switch (hi->hi_hook.h_hint) {
2415 case HH_BEFORE :
2416 case HH_AFTER :
2417 len = strlen((char *)hi->hi_hook.h_hintvalue);
2418 if (len > 0)
2419 kmem_free((void *)hi->hi_hook.h_hintvalue, len + 1);
2420 break;
2421 default :
2422 break;
2425 if (hi->hi_kstatp != NULL)
2426 kstat_delete_netstack(hi->hi_kstatp, stackid);
2428 /* Free container */
2429 kmem_free(hi, sizeof (*hi));
2433 * Function: hook_alloc
2434 * Returns: hook_t * - pointer to new hook structure
2435 * Parameters: version(I) - version number of the API when compiled
2437 * This function serves as the interface for consumers to obtain a hook_t
2438 * structure. At this point in time, there is only a single "version" of
2439 * it, leading to a straight forward function. In a perfect world the
2440 * h_vesion would be a protected data structure member, but C isn't that
2441 * advanced...
2443 hook_t *
2444 hook_alloc(const int h_version)
2446 hook_t *h;
2448 h = kmem_zalloc(sizeof (hook_t), KM_SLEEP);
2449 h->h_version = h_version;
2450 return (h);
2454 * Function: hook_free
2455 * Returns: None
2456 * Parameters: h(I) - external hook pointer
2458 * This function only free's memory allocated with hook_alloc(), so that if
2459 * (for example) kernel memory was allocated for h_name, this needs to be
2460 * free'd before calling hook_free().
2462 void
2463 hook_free(hook_t *h)
2465 kmem_free(h, sizeof (*h));
2469 * Function: hook_notify_register
2470 * Returns: int - 0 = success, else failure
2471 * Parameters: head(I) - top of the list of callbacks
2472 * callback(I) - function to be called
2473 * arg(I) - arg to pass back to the function
2475 * This function implements the modification of the list of callbacks
2476 * that are registered when someone wants to be advised of a change
2477 * that has happened.
2479 static int
2480 hook_notify_register(hook_notify_head_t *head, hook_notify_fn_t callback,
2481 void *arg)
2483 hook_notify_t *hn;
2485 TAILQ_FOREACH(hn, head, hn_entry) {
2486 if (hn->hn_func == callback) {
2487 return (EEXIST);
2491 hn = (hook_notify_t *)kmem_alloc(sizeof (*hn), KM_SLEEP);
2492 hn->hn_func = callback;
2493 hn->hn_arg = arg;
2494 TAILQ_INSERT_TAIL(head, hn, hn_entry);
2496 return (0);
2500 * Function: hook_notify_unregister
2501 * Returns: int - 0 = success, else failure
2502 * Parameters: stackid(I) - netstack identifier
2503 * callback(I) - function to be called
2504 * parg(O) - pointer to storage for pointer
2506 * When calling this function, the provision of a valid pointer in parg
2507 * allows the caller to be made aware of what argument the hook function
2508 * was expecting. This then allows the simulation of HN_UNREGISTER events
2509 * when a notify-unregister is performed.
2511 static int
2512 hook_notify_unregister(hook_notify_head_t *head,
2513 hook_notify_fn_t callback, void **parg)
2515 hook_notify_t *hn;
2517 ASSERT(parg != NULL);
2519 TAILQ_FOREACH(hn, head, hn_entry) {
2520 if (hn->hn_func == callback)
2521 break;
2524 if (hn == NULL)
2525 return (ESRCH);
2527 *parg = hn->hn_arg;
2529 TAILQ_REMOVE(head, hn, hn_entry);
2531 kmem_free(hn, sizeof (*hn));
2533 return (0);
2537 * Function: hook_notify_run
2538 * Returns: None
2539 * Parameters: head(I) - top of the list of callbacks
2540 * family(I) - name of the hook family that owns the event
2541 * event(I) - name of the event being changed
2542 * name(I) - name of the object causing change
2543 * cmd(I) - either HN_UNREGISTER or HN_REGISTER
2545 * This function walks through the list of registered callbacks and
2546 * executes each one, passing back the arg supplied when registered
2547 * and the name of the family (that owns the event), event (the thing
2548 * to which we're making a change) and finally a name that describes
2549 * what is being added or removed, as indicated by cmd.
2551 * This function does not acquire or release any lock as it is required
2552 * that code calling it do so before hand. The use of hook_notify_head_t
2553 * is protected by the use of flagwait_t in the structures that own this
2554 * list and with the use of the FWF_ADD/DEL_ACTIVE flags.
2556 static void
2557 hook_notify_run(hook_notify_head_t *head, char *family, char *event,
2558 char *name, hook_notify_cmd_t cmd)
2560 hook_notify_t *hn;
2562 TAILQ_FOREACH(hn, head, hn_entry) {
2563 (*hn->hn_func)(cmd, hn->hn_arg, family, event, name);