xref: /titanic_52/usr/src/uts/common/io/hook.c (revision 652fb50dec8e8b074b60a3c82d00248a2aeb5eb9)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  *
25  * Copyright 2013 Joyent, Inc.  All rights reserved.
26  */
27 #include <sys/param.h>
28 #include <sys/types.h>
29 #include <sys/systm.h>
30 #include <sys/errno.h>
31 #include <sys/kmem.h>
32 #include <sys/mutex.h>
33 #include <sys/condvar.h>
34 #include <sys/modctl.h>
35 #include <sys/hook_impl.h>
36 #include <sys/sdt.h>
37 #include <sys/cmn_err.h>
38 
39 /*
40  * This file provides kernel hook framework.
41  */
42 
43 static struct modldrv modlmisc = {
44 	&mod_miscops,				/* drv_modops */
45 	"Hooks Interface v1.0",			/* drv_linkinfo */
46 };
47 
48 static struct modlinkage modlinkage = {
49 	MODREV_1,				/* ml_rev */
50 	&modlmisc,				/* ml_linkage */
51 	NULL
52 };
53 
54 static const char *hook_hintvalue_none = "<none>";
55 
56 /*
57  * How it works.
58  * =============
59  * Use of the hook framework here is tied up with zones - when a new zone
60  * is created, we create a new hook_stack_t and are open to business for
61  * allowing new hook families and their events.
62  *
63  * A consumer of these hooks is expected to operate in this fashion:
64  * 1) call hook_family_add() to create a new family of hooks. It is a
65  *    current requirement that this call must be made with the value
66  *    returned from hook_stack_init, by way of infrastructure elsewhere.
67  * 2) add events to the registered family with calls to hook_event_add.
68  *
69  * At this point, the structures in place should be open to others to
70  * add hooks to the event or add notifiers for when the contents of the
71  * hook stack changes.
72  *
73  * The interesting stuff happens on teardown.
74  *
75  * It is a requirement that the provider of hook events work in the reverse
76  * order to the above, so that the first step is:
77  * 1) remove events from each hook family created earlier
78  * 2) remove hook families from the hook stack.
79  *
80  * When doing teardown of both events and families, a check is made to see
81  * if either structure is still "busy". If so then a boolean flag (FWF_DESTROY)
82  * is set to say that the structure is condemned. The presence of this flag
83  * being set must be checked for in _add()/_register()/ functions and a
84  * failure returned if it is set. It is ignored by the _find() functions
85  * because they're used by _remove()/_unregister().
86  * While setting the condemned flag when trying to delete a structure would
87  * normally be keyed from the presence of a reference count being greater
88  * than 1, in this implementation there are no reference counts required:
89  * instead the presence of objects on linked lists is taken to mean
90  * something is still "busy."
91  *
92  * ONLY the caller that adds the family and the events ever has a direct
93  * reference to the internal structures and thus ONLY it should be doing
94  * the removal of either the event or family.  In practise, what this means
95  * is that in ip_netinfo.c, we have calls to net_protocol_register(), followed
96  * by net_event_register() (these interface to hook_family_add() and
97  * hook_event_add(), respectively) that are made when we create an instance
98  * of IP and when the IP instance is shutdown/destroyed, it calls
99  * net_event_unregister() and net_protocol_unregister(), which in turn call
100  * hook_event_remove() and hook_family_remove() respectively. Nobody else
101  * is entitled to call the _unregister() functions.  It is imperative that
102  * there be only one _remove() call for every _add() call.
103  *
104  * It is possible that code which is interfacing with this hook framework
105  * won't do all the cleaning up that it needs to at the right time. While
106  * we can't prevent programmers from creating memory leaks, we can synchronise
107  * when we clean up data structures to prevent code accessing free'd memory.
108  *
109  * A simple diagram showing the ownership is as follows:
110  *
111  *  Owned       +--------------+
112  *   by         | hook_stack_t |
113  *   the        +--------------+
114  *  Instance      |
115  * - - - - - - - -|- - - - - - - - - - - - - - - - - -
116  *                V
117  *  Owned       +-------------------+     +-------------------+
118  *              | hook_family_int_t |---->| hook_family_int_t |
119  *   by         +-------------------+     +-------------------+
120  *                | \+---------------+        \+---------------+
121  *  network       |  | hook_family_t |         | hook_family_t |
122  *                V  +---------------+         +---------------+
123  *  protocol   +------------------+     +------------------+
124  *             | hook_event_int_t |---->| hook_event_int_t |
125  * (ipv4,ipv6) +------------------+     +------------------+
126  *                | \+--------------+        \+--------------+
127  *                |  | hook_event_t |         | hook_event_t |
128  *                |  +--------------+         +--------------+
129  * - - - - - - - -|- - - - - - - - - - - - - - - - - -
130  *                V
131  *  Owned      +------------+
132  *             | hook_int_t |
133  *   by        +------------+
134  *                  \+--------+
135  * the consumer      | hook_t |
136  *                   +--------+
137  *
138  * The consumers, such as IPFilter, do not have any pointers or hold any
139  * references to hook_int_t, hook_event_t or hook_event_int_t. By placing
140  * a hook on an event through net_hook_register(), an implicit reference
141  * to the hook_event_int_t is returned with a successful call.  Additionally,
142  * IPFilter does not see the hook_family_int_t or hook_family_t directly.
143  * Rather it is returned a net_handle_t (from net_protocol_lookup()) that
144  * contains a pointer to hook_family_int_t.  The structure behind the
145  * net_handle_t (struct net_data) *is* reference counted and managed
146  * appropriately.
147  *
148  * A more detailed picture that describes how the family/event structures
149  * are linked together can be found in <sys/hook_impl.h>
150  *
151  * Notification callbacks.
152  * =======================
153  * For each of the hook stack, hook family and hook event, it is possible
154  * to request notificatin of change to them. Why?
155  * First, lets equate the hook stack to an IP instance, a hook family to
156  * a network protocol and a hook event to IP packets on the input path.
157  * If a kernel module wants to apply security from the very start of
158  * things, it needs to know as soon as a new instance of networking
159  * is initiated. Whilst for the global zone, it is taken for granted that
160  * this instance will always exist before any interaction takes place,
161  * that is not true for zones running with an exclusive networking instance.
162  * Thus when a local zone is started and a new instance is created to support
163  * that, parties that wish to monitor it and apply a security policy from
164  * the onset need to be informed as early as possible - quite probably
165  * before any networking is started by the zone's boot scripts.
166  * Inside each instance, it is possible to have a number of network protocols
167  * (hook families) in operation. Inside the context of the global zone,
168  * it is possible to have code run before the kernel module providing the
169  * IP networking is loaded. From here, to apply the appropriate security,
170  * it is necessary to become informed of when IP is being configured into
171  * the zone and this is done by registering a notification callback with
172  * the hook stack for changes to it. The next step is to know when packets
173  * can be received through the physical_in, etc, events. This is achieved
174  * by registering a callback with the appropriate network protocol (or in
175  * this file, the correct hook family.) Thus when IP finally attaches a
176  * physical_in event to inet, the module looking to enforce a security
177  * policy can become aware of it being present. Of course there's no
178  * requirement for such a module to be present before all of the above
179  * happens and in such a case, it is reasonable for the same module to
180  * work after everything has been put in place. For this reason, when
181  * a notification callback is added, a series of fake callback events
182  * is generated to simulate the arrival of those entities. There is one
183  * final series of callbacks that can be registered - those to monitor
184  * actual hooks that are added or removed from an event. In practice,
185  * this is useful when there are multiple kernel modules participating
186  * in the processing of packets and there are behaviour dependencies
187  * involved, such that one kernel module might only register its hook
188  * if another is already present and also might want to remove its hook
189  * when the other disappears.
190  *
191  * If you know a kernel module will not be loaded before the infrastructure
192  * used in this file is present then it is not necessary to use this
193  * notification callback mechanism.
194  */
195 
196 /*
197  * Locking
198  * =======
199  * The use of CVW_* macros to do locking is driven by the need to allow
200  * recursive locking with read locks when we're processing packets. This
201  * is necessary because various netinfo functions need to hold read locks,
202  * by design, as they can be called in or out of packet context.
203  */
204 /*
205  * Hook internal functions
206  */
207 static hook_int_t *hook_copy(hook_t *src);
208 static hook_event_int_t *hook_event_checkdup(hook_event_t *he,
209     hook_stack_t *hks);
210 static hook_event_int_t *hook_event_copy(hook_event_t *src);
211 static hook_event_int_t *hook_event_find(hook_family_int_t *hfi, char *event);
212 static void hook_event_free(hook_event_int_t *hei, hook_family_int_t *hfi);
213 static hook_family_int_t *hook_family_copy(hook_family_t *src);
214 static hook_family_int_t *hook_family_find(char *family, hook_stack_t *hks);
215 static void hook_family_free(hook_family_int_t *hfi, hook_stack_t *hks);
216 static hook_int_t *hook_find(hook_event_int_t *hei, hook_t *h);
217 static void hook_int_free(hook_int_t *hi, netstackid_t);
218 static void hook_init(void);
219 static void hook_fini(void);
220 static void *hook_stack_init(netstackid_t stackid, netstack_t *ns);
221 static void hook_stack_fini(netstackid_t stackid, void *arg);
222 static void hook_stack_shutdown(netstackid_t stackid, void *arg);
223 static int hook_insert(hook_int_head_t *head, hook_int_t *new);
224 static void hook_insert_plain(hook_int_head_t *head, hook_int_t *new);
225 static int hook_insert_afterbefore(hook_int_head_t *head, hook_int_t *new);
226 static hook_int_t *hook_find_byname(hook_int_head_t *head, char *name);
227 static void hook_event_init_kstats(hook_family_int_t *, hook_event_int_t *);
228 static void hook_event_notify_run(hook_event_int_t *, hook_family_int_t *,
229     char *event, char *name, hook_notify_cmd_t cmd);
230 static void hook_init_kstats(hook_family_int_t *hfi, hook_event_int_t *hei,
231     hook_int_t *hi);
232 static int hook_notify_register(hook_notify_head_t *head,
233     hook_notify_fn_t callback, void *arg);
234 static int hook_notify_unregister(hook_notify_head_t *head,
235     hook_notify_fn_t callback, void **);
236 static void hook_notify_run(hook_notify_head_t *head, char *family,
237     char *event, char *name, hook_notify_cmd_t cmd);
238 static void hook_stack_notify_run(hook_stack_t *hks, char *name,
239     hook_notify_cmd_t cmd);
240 static void hook_stack_remove(hook_stack_t *hks);
241 
242 /*
243  * A list of the hook stacks is kept here because we need to enable
244  * net_instance_notify_register() to be called during the creation
245  * of a new instance. Previously hook_stack_get() would just use
246  * the netstack functions for this work but they will return NULL
247  * until the zone has been fully initialised.
248  */
249 static hook_stack_head_t hook_stacks;
250 static kmutex_t hook_stack_lock;
251 
252 /*
253  * Module entry points.
254  */
255 int
256 _init(void)
257 {
258 	int error;
259 
260 	hook_init();
261 	error = mod_install(&modlinkage);
262 	if (error != 0)
263 		hook_fini();
264 
265 	return (error);
266 }
267 
268 int
269 _fini(void)
270 {
271 	int error;
272 
273 	error = mod_remove(&modlinkage);
274 	if (error == 0)
275 		hook_fini();
276 
277 	return (error);
278 }
279 
280 int
281 _info(struct modinfo *modinfop)
282 {
283 	return (mod_info(&modlinkage, modinfop));
284 }
285 
286 /*
287  * Function:	hook_init
288  * Returns:	None
289  * Parameters:	None
290  *
291  * Initialize hooks
292  */
293 static void
294 hook_init(void)
295 {
296 	mutex_init(&hook_stack_lock, NULL, MUTEX_DRIVER, NULL);
297 	SLIST_INIT(&hook_stacks);
298 
299 	/*
300 	 * We want to be informed each time a stack is created or
301 	 * destroyed in the kernel.
302 	 */
303 	netstack_register(NS_HOOK, hook_stack_init, hook_stack_shutdown,
304 	    hook_stack_fini);
305 }
306 
307 /*
308  * Function:	hook_fini
309  * Returns:	None
310  * Parameters:	None
311  *
312  * Deinitialize hooks
313  */
314 static void
315 hook_fini(void)
316 {
317 	netstack_unregister(NS_HOOK);
318 
319 	mutex_destroy(&hook_stack_lock);
320 	ASSERT(SLIST_EMPTY(&hook_stacks));
321 }
322 
323 /*
324  * Function:	hook_wait_setflag
325  * Returns:     -1 = setting flag is disallowed, 0 = flag set and did
326  *              not have to wait (ie no lock droped), 1 = flag set but
327  *              it was necessary to drop locks to set it.
328  * Parameters:  waiter(I)  - control data structure
329  *              busyset(I) - set of flags that we don't want set while
330  *                           we are active.
331  *              wanted(I)  - flag associated with newflag to indicate
332  *                           what we want to do.
333  *              newflag(I) - the new ACTIVE flag we want to set that
334  *                           indicates what we are doing.
335  *
336  * The set of functions hook_wait_* implement an API that builds on top of
337  * the kcondvar_t to provide controlled execution through a critical region.
338  * For each flag that indicates work is being done (FWF_*_ACTIVE) there is
339  * also a flag that we set to indicate that we want to do it (FWF_*_WANTED).
340  * The combination of flags is required as when this function exits to do
341  * the task, the structure is then free for another caller to use and
342  * to indicate that it wants to do work.  The flags used when a caller wants
343  * to destroy an object take precedence over those that are used for making
344  * changes to it (add/remove.) In this case, we don't try to secure the
345  * ability to run and return with an error.
346  *
347  * "wantedset" is used here to determine who has the right to clear the
348  * wanted but from the fw_flags set: only he that sets the flag has the
349  * right to clear it at the bottom of the loop, even if someone else
350  * wants to set it.
351  *
352  * wanted - the FWF_*_WANTED flag that describes the action being requested
353  * busyset- the set of FWF_* flags we don't want set when we run
354  * newflag- the FWF_*_ACTIVE flag we will set to indicate we are busy
355  */
356 int
357 hook_wait_setflag(flagwait_t *waiter, uint32_t busyset, fwflag_t wanted,
358     fwflag_t newflag)
359 {
360 	boolean_t wantedset;
361 	int waited = 0;
362 
363 	mutex_enter(&waiter->fw_lock);
364 	if (waiter->fw_flags & FWF_DESTROY) {
365 		cv_signal(&waiter->fw_cv);
366 		mutex_exit(&waiter->fw_lock);
367 		return (-1);
368 	}
369 	while (waiter->fw_flags & busyset) {
370 		wantedset = ((waiter->fw_flags & wanted) == wanted);
371 		if (!wantedset)
372 			waiter->fw_flags |= wanted;
373 		CVW_EXIT_WRITE(waiter->fw_owner);
374 		cv_wait(&waiter->fw_cv, &waiter->fw_lock);
375 		/*
376 		 * This lock needs to be dropped here to preserve the order
377 		 * of acquisition that is fw_owner followed by fw_lock, else
378 		 * we can deadlock.
379 		 */
380 		mutex_exit(&waiter->fw_lock);
381 		waited = 1;
382 		CVW_ENTER_WRITE(waiter->fw_owner);
383 		mutex_enter(&waiter->fw_lock);
384 		if (!wantedset)
385 			waiter->fw_flags &= ~wanted;
386 		if (waiter->fw_flags & FWF_DESTROY) {
387 			cv_signal(&waiter->fw_cv);
388 			mutex_exit(&waiter->fw_lock);
389 			return (-1);
390 		}
391 	}
392 	waiter->fw_flags &= ~wanted;
393 	ASSERT((waiter->fw_flags & wanted) == 0);
394 	ASSERT((waiter->fw_flags & newflag) == 0);
395 	waiter->fw_flags |= newflag;
396 	mutex_exit(&waiter->fw_lock);
397 	return (waited);
398 }
399 
400 /*
401  * Function:	hook_wait_unsetflag
402  * Returns:     None
403  * Parameters:  waiter(I)  - control data structure
404  *              oldflag(I) - flag to reset
405  *
406  * Turn off the bit that we had set to run and let others know that
407  * they should now check to see if they can run.
408  */
409 void
410 hook_wait_unsetflag(flagwait_t *waiter, fwflag_t oldflag)
411 {
412 	mutex_enter(&waiter->fw_lock);
413 	waiter->fw_flags &= ~oldflag;
414 	cv_signal(&waiter->fw_cv);
415 	mutex_exit(&waiter->fw_lock);
416 }
417 
418 /*
419  * Function:	hook_wait_destroy
420  * Returns:     None
421  * Parameters:  waiter(I)  - control data structure
422  *
423  * Since outer locking (on fw_owner) should ensure that only one function
424  * at a time gets to call hook_wait_destroy() on a given object, there is
425  * no need to guard against setting FWF_DESTROY_WANTED already being set.
426  * It is, however, necessary to wait for all activity on the owning
427  * structure to cease.
428  */
429 int
430 hook_wait_destroy(flagwait_t *waiter)
431 {
432 	ASSERT((waiter->fw_flags & FWF_DESTROY_WANTED) == 0);
433 	mutex_enter(&waiter->fw_lock);
434 	if (waiter->fw_flags & FWF_DESTROY_WANTED) {
435 		cv_signal(&waiter->fw_cv);
436 		mutex_exit(&waiter->fw_lock);
437 		return (EINPROGRESS);
438 	}
439 	waiter->fw_flags |= FWF_DESTROY_WANTED;
440 	while (!FWF_DESTROY_OK(waiter)) {
441 		CVW_EXIT_WRITE(waiter->fw_owner);
442 		cv_wait(&waiter->fw_cv, &waiter->fw_lock);
443 		CVW_ENTER_WRITE(waiter->fw_owner);
444 	}
445 	/*
446 	 * There should now be nothing else using "waiter" or its
447 	 * owner, so we can safely assign here without risk of wiiping
448 	 * out someone's bit.
449 	 */
450 	waiter->fw_flags = FWF_DESTROY_ACTIVE;
451 	cv_signal(&waiter->fw_cv);
452 	mutex_exit(&waiter->fw_lock);
453 
454 	return (0);
455 }
456 
457 /*
458  * Function:	hook_wait_init
459  * Returns:     None
460  * Parameters:  waiter(I)  - control data structure
461  *              ownder(I)  - pointer to lock that the owner of this
462  *                           waiter uses
463  *
464  * "owner" gets passed in here so that when we need to call cv_wait,
465  * for example in hook_wait_setflag(), we can drop the lock for the
466  * next layer out, which is likely to be held in an exclusive manner.
467  */
468 void
469 hook_wait_init(flagwait_t *waiter, cvwaitlock_t *owner)
470 {
471 	cv_init(&waiter->fw_cv, NULL, CV_DRIVER, NULL);
472 	mutex_init(&waiter->fw_lock, NULL, MUTEX_DRIVER, NULL);
473 	waiter->fw_flags = FWF_NONE;
474 	waiter->fw_owner = owner;
475 }
476 
477 /*
478  * Function:	hook_stack_init
479  * Returns:     void *     - pointer to new hook stack structure
480  * Parameters:  stackid(I) - identifier for the network instance that owns this
481  *              ns(I)      - pointer to the network instance data structure
482  *
483  * Allocate and initialize the hook stack instance. This function is not
484  * allowed to fail, so KM_SLEEP is used here when allocating memory. The
485  * value returned is passed back into the shutdown and destroy hooks.
486  */
487 /*ARGSUSED*/
488 static void *
489 hook_stack_init(netstackid_t stackid, netstack_t *ns)
490 {
491 	hook_stack_t	*hks;
492 
493 #ifdef NS_DEBUG
494 	printf("hook_stack_init(stack %d)\n", stackid);
495 #endif
496 
497 	hks = (hook_stack_t *)kmem_zalloc(sizeof (*hks), KM_SLEEP);
498 	hks->hks_netstack = ns;
499 	hks->hks_netstackid = stackid;
500 
501 	CVW_INIT(&hks->hks_lock);
502 	TAILQ_INIT(&hks->hks_nhead);
503 	SLIST_INIT(&hks->hks_familylist);
504 
505 	hook_wait_init(&hks->hks_waiter, &hks->hks_lock);
506 
507 	mutex_enter(&hook_stack_lock);
508 	SLIST_INSERT_HEAD(&hook_stacks, hks, hks_entry);
509 	mutex_exit(&hook_stack_lock);
510 
511 	return (hks);
512 }
513 
514 /*
515  * Function:	hook_stack_shutdown
516  * Returns:     void
517  * Parameters:  stackid(I) - identifier for the network instance that owns this
518  *              arg(I)     - pointer returned by hook_stack_init
519  *
520  * Set the shutdown flag to indicate that we should stop accepting new
521  * register calls as we're now in the cleanup process. The cleanup is a
522  * two stage process and we're not required to free any memory here.
523  *
524  * The curious would wonder why isn't there any code that walks through
525  * all of the data structures and sets the flag(s) there? The answer is
526  * that it is expected that this will happen when the zone shutdown calls
527  * the shutdown callbacks for other modules that they will initiate the
528  * free'ing and shutdown of the hooks themselves.
529  */
530 /*ARGSUSED*/
531 static void
532 hook_stack_shutdown(netstackid_t stackid, void *arg)
533 {
534 	hook_stack_t *hks = (hook_stack_t *)arg;
535 
536 	mutex_enter(&hook_stack_lock);
537 	/*
538 	 * Once this flag gets set to one, no more additions are allowed
539 	 * to any of the structures that make up this stack.
540 	 */
541 	hks->hks_shutdown = 1;
542 	mutex_exit(&hook_stack_lock);
543 }
544 
545 /*
546  * Function:	hook_stack_destroy
547  * Returns:     void
548  * Parameters:  stackid(I) - identifier for the network instance that owns this
549  *              arg(I)     - pointer returned by hook_stack_init
550  *
551  * Free the hook stack instance.
552  *
553  * The rationale for the shutdown being lazy (see the comment above for
554  * hook_stack_shutdown) also applies to the destroy being lazy. Only if
555  * the hook_stack_t data structure is unused will it go away. Else it
556  * is left up to the last user of a data structure to actually free it.
557  */
558 /*ARGSUSED*/
559 static void
560 hook_stack_fini(netstackid_t stackid, void *arg)
561 {
562 	hook_stack_t *hks = (hook_stack_t *)arg;
563 
564 	mutex_enter(&hook_stack_lock);
565 	hks->hks_shutdown = 2;
566 	hook_stack_remove(hks);
567 	mutex_exit(&hook_stack_lock);
568 }
569 
570 /*
571  * Function:	hook_stack_remove
572  * Returns:     void
573  * Parameters:  hks(I) - pointer to an instance of a hook_stack_t
574  *
575  * This function assumes that it is called with hook_stack_lock held.
576  * It functions differently to hook_family/event_remove in that it does
577  * the checks to see if it can be removed. This difference exists
578  * because this structure has nothing higher up that depends on it.
579  */
580 static void
581 hook_stack_remove(hook_stack_t *hks)
582 {
583 
584 	ASSERT(mutex_owned(&hook_stack_lock));
585 
586 	/*
587 	 * Is the structure still in use?
588 	 */
589 	if (!SLIST_EMPTY(&hks->hks_familylist) ||
590 	    !TAILQ_EMPTY(&hks->hks_nhead))
591 		return;
592 
593 	SLIST_REMOVE(&hook_stacks, hks, hook_stack, hks_entry);
594 
595 	VERIFY(hook_wait_destroy(&hks->hks_waiter) == 0);
596 	CVW_DESTROY(&hks->hks_lock);
597 	kmem_free(hks, sizeof (*hks));
598 }
599 
600 /*
601  * Function:	hook_stack_get
602  * Returns:     hook_stack_t * - NULL if not found, else matching instance
603  * Parameters:  stackid(I)     - instance id to search for
604  *
605  * Search the list of currently active hook_stack_t structures for one that
606  * has a matching netstackid_t to the value passed in. The linked list can
607  * only ever have at most one match for this value.
608  */
609 static hook_stack_t *
610 hook_stack_get(netstackid_t stackid)
611 {
612 	hook_stack_t *hks;
613 
614 	SLIST_FOREACH(hks, &hook_stacks, hks_entry) {
615 		if (hks->hks_netstackid == stackid)
616 			break;
617 	}
618 
619 	return (hks);
620 }
621 
622 /*
623  * Function:	hook_stack_notify_register
624  * Returns:	int        - 0 = success, else failure
625  * Parameters:	stackid(I) - netstack identifier
626  *              callback(I)- function to be called
627  *              arg(I)     - arg to provide callback when it is called
628  *
629  * If we're not shutting down this instance, append a new function to the
630  * list of those to call when a new family of hooks is added to this stack.
631  * If the function can be successfully added to the list of callbacks
632  * activated when there is a change to the stack (addition or removal of
633  * a hook family) then generate a fake HN_REGISTER event by directly
634  * calling the callback with the relevant information for each hook
635  * family that currently exists (and isn't being shutdown.)
636  */
637 int
638 hook_stack_notify_register(netstackid_t stackid, hook_notify_fn_t callback,
639     void *arg)
640 {
641 	hook_family_int_t *hfi;
642 	hook_stack_t *hks;
643 	boolean_t canrun;
644 	char buffer[16];
645 	int error;
646 
647 	ASSERT(callback != NULL);
648 
649 	canrun = B_FALSE;
650 	mutex_enter(&hook_stack_lock);
651 	hks = hook_stack_get(stackid);
652 	if (hks != NULL) {
653 		if (hks->hks_shutdown != 0) {
654 			error = ESHUTDOWN;
655 		} else {
656 			CVW_ENTER_WRITE(&hks->hks_lock);
657 			canrun = (hook_wait_setflag(&hks->hks_waiter,
658 			    FWF_ADD_WAIT_MASK, FWF_ADD_WANTED,
659 			    FWF_ADD_ACTIVE) != -1);
660 			error = hook_notify_register(&hks->hks_nhead,
661 			    callback, arg);
662 			CVW_EXIT_WRITE(&hks->hks_lock);
663 		}
664 	} else {
665 		error = ESRCH;
666 	}
667 	mutex_exit(&hook_stack_lock);
668 
669 	if (error == 0 && canrun) {
670 		/*
671 		 * Generate fake register event for callback that
672 		 * is being added, letting it know everything that
673 		 * already exists.
674 		 */
675 		(void) snprintf(buffer, sizeof (buffer), "%u",
676 		    hks->hks_netstackid);
677 
678 		SLIST_FOREACH(hfi, &hks->hks_familylist, hfi_entry) {
679 			if (hfi->hfi_condemned || hfi->hfi_shutdown)
680 				continue;
681 			callback(HN_REGISTER, arg, buffer, NULL,
682 			    hfi->hfi_family.hf_name);
683 		}
684 	}
685 
686 	if (canrun)
687 		hook_wait_unsetflag(&hks->hks_waiter, FWF_ADD_ACTIVE);
688 
689 	return (error);
690 }
691 
692 /*
693  * Function:	hook_stack_notify_unregister
694  * Returns:	int         - 0 = success, else failure
695  * Parameters:	stackid(I)  - netstack identifier
696  *              callback(I) - function to be called
697  *
698  * Attempt to remove a registered function from a hook stack's list of
699  * callbacks to activiate when protocols are added/deleted.
700  * As with hook_stack_notify_register, if all things are going well then
701  * a fake unregister event is delivered to the callback being removed
702  * for each hook family that presently exists.
703  */
704 int
705 hook_stack_notify_unregister(netstackid_t stackid, hook_notify_fn_t callback)
706 {
707 	hook_family_int_t *hfi;
708 	hook_stack_t *hks;
709 	boolean_t canrun;
710 	char buffer[16];
711 	void *arg;
712 	int error;
713 
714 	mutex_enter(&hook_stack_lock);
715 	hks = hook_stack_get(stackid);
716 	if (hks != NULL) {
717 		CVW_ENTER_WRITE(&hks->hks_lock);
718 		canrun = (hook_wait_setflag(&hks->hks_waiter, FWF_ADD_WAIT_MASK,
719 		    FWF_ADD_WANTED, FWF_ADD_ACTIVE) != -1);
720 
721 		error = hook_notify_unregister(&hks->hks_nhead, callback, &arg);
722 		CVW_EXIT_WRITE(&hks->hks_lock);
723 	} else {
724 		error = ESRCH;
725 	}
726 	mutex_exit(&hook_stack_lock);
727 
728 	if (error == 0) {
729 		if (canrun) {
730 			/*
731 			 * Generate fake unregister event for callback that
732 			 * is being removed, letting it know everything that
733 			 * currently exists is now "disappearing."
734 			 */
735 			(void) snprintf(buffer, sizeof (buffer), "%u",
736 			    hks->hks_netstackid);
737 
738 			SLIST_FOREACH(hfi, &hks->hks_familylist, hfi_entry) {
739 				callback(HN_UNREGISTER, arg, buffer, NULL,
740 				    hfi->hfi_family.hf_name);
741 			}
742 
743 			hook_wait_unsetflag(&hks->hks_waiter, FWF_ADD_ACTIVE);
744 		}
745 
746 		mutex_enter(&hook_stack_lock);
747 		hks = hook_stack_get(stackid);
748 		if ((error == 0) && (hks->hks_shutdown == 2))
749 			hook_stack_remove(hks);
750 		mutex_exit(&hook_stack_lock);
751 	}
752 
753 	return (error);
754 }
755 
756 /*
757  * Function:	hook_stack_notify_run
758  * Returns:	None
759  * Parameters:	hks(I)  - hook stack pointer to execute callbacks for
760  *              name(I) - name of a hook family
761  *              cmd(I)  - either HN_UNREGISTER or HN_REGISTER
762  *
763  * Run through the list of callbacks on the hook stack to be called when
764  * a new hook family is added
765  *
766  * As hook_notify_run() expects 3 names, one for the family that is associated
767  * with the cmd (HN_REGISTER or HN_UNREGISTER), one for the event and one
768  * for the object being introduced and we really only have one name (that
769  * of the new hook family), fake the hook stack's name by converting the
770  * integer to a string and for the event just pass NULL.
771  */
772 static void
773 hook_stack_notify_run(hook_stack_t *hks, char *name,
774     hook_notify_cmd_t cmd)
775 {
776 	char buffer[16];
777 
778 	ASSERT(hks != NULL);
779 	ASSERT(name != NULL);
780 
781 	(void) snprintf(buffer, sizeof (buffer), "%u", hks->hks_netstackid);
782 
783 	hook_notify_run(&hks->hks_nhead, buffer, NULL, name, cmd);
784 }
785 
786 /*
787  * Function:	hook_run
788  * Returns:	int      - return value according to callback func
789  * Parameters:	token(I) - event pointer
790  *		info(I)  - message
791  *
792  * Run hooks for specific provider.  The hooks registered are stepped through
793  * until either the end of the list is reached or a hook function returns a
794  * non-zero value.  If a non-zero value is returned from a hook function, we
795  * return that value back to our caller.  By design, a hook function can be
796  * called more than once, simultaneously.
797  */
798 int
799 hook_run(hook_family_int_t *hfi, hook_event_token_t token, hook_data_t info)
800 {
801 	hook_event_int_t *hei;
802 	hook_int_t *hi;
803 	int rval = 0;
804 
805 	ASSERT(token != NULL);
806 
807 	hei = (hook_event_int_t *)token;
808 	DTRACE_PROBE2(hook__run__start,
809 	    hook_event_token_t, token,
810 	    hook_data_t, info);
811 
812 	/*
813 	 * If we consider that this function is only called from within the
814 	 * stack while an instance is currently active,
815 	 */
816 	CVW_ENTER_READ(&hfi->hfi_lock);
817 
818 	TAILQ_FOREACH(hi, &hei->hei_head, hi_entry) {
819 		ASSERT(hi->hi_hook.h_func != NULL);
820 		DTRACE_PROBE3(hook__func__start,
821 		    hook_event_token_t, token,
822 		    hook_data_t, info,
823 		    hook_int_t *, hi);
824 		rval = (*hi->hi_hook.h_func)(token, info, hi->hi_hook.h_arg);
825 		DTRACE_PROBE4(hook__func__end,
826 		    hook_event_token_t, token,
827 		    hook_data_t, info,
828 		    hook_int_t *, hi,
829 		    int, rval);
830 		hi->hi_kstats.hook_hits.value.ui64++;
831 		if (rval != 0)
832 			break;
833 	}
834 
835 	hei->hei_kstats.events.value.ui64++;
836 
837 	CVW_EXIT_READ(&hfi->hfi_lock);
838 
839 	DTRACE_PROBE3(hook__run__end,
840 	    hook_event_token_t, token,
841 	    hook_data_t, info,
842 	    hook_int_t *, hi);
843 
844 	return (rval);
845 }
846 
847 /*
848  * Function:	hook_family_add
849  * Returns:	internal family pointer - NULL = Fail
850  * Parameters:	hf(I)    - family pointer
851  *              hks(I)   - pointer to an instance of a hook_stack_t
852  *              store(O) - where returned pointer will be stored
853  *
854  * Add new family to the family list. The requirements for the addition to
855  * succeed are that the family name must not already be registered and that
856  * the hook stack is not being shutdown.
857  * If store is non-NULL, it is expected to be a pointer to the same variable
858  * that is awaiting to be assigned the return value of this function.
859  * In its current use, the returned value is assigned to netd_hooks in
860  * net_family_register. The use of "store" allows the return value to be
861  * used before this function returns. How can this happen? Through the
862  * callbacks that can be activated at the bottom of this function, when
863  * hook_stack_notify_run is called.
864  */
865 hook_family_int_t *
866 hook_family_add(hook_family_t *hf, hook_stack_t *hks, void **store)
867 {
868 	hook_family_int_t *hfi, *new;
869 
870 	ASSERT(hf != NULL);
871 	ASSERT(hf->hf_name != NULL);
872 
873 	new = hook_family_copy(hf);
874 	if (new == NULL)
875 		return (NULL);
876 
877 	mutex_enter(&hook_stack_lock);
878 	CVW_ENTER_WRITE(&hks->hks_lock);
879 
880 	if (hks->hks_shutdown != 0) {
881 		CVW_EXIT_WRITE(&hks->hks_lock);
882 		mutex_exit(&hook_stack_lock);
883 		hook_family_free(new, NULL);
884 		return (NULL);
885 	}
886 
887 	/* search family list */
888 	hfi = hook_family_find(hf->hf_name, hks);
889 	if (hfi != NULL) {
890 		CVW_EXIT_WRITE(&hks->hks_lock);
891 		mutex_exit(&hook_stack_lock);
892 		hook_family_free(new, NULL);
893 		return (NULL);
894 	}
895 
896 	/*
897 	 * Try and set the FWF_ADD_ACTIVE flag so that we can drop all the
898 	 * lock further down when calling all of the functions registered
899 	 * for notification when a new hook family is added.
900 	 */
901 	if (hook_wait_setflag(&hks->hks_waiter, FWF_ADD_WAIT_MASK,
902 	    FWF_ADD_WANTED, FWF_ADD_ACTIVE) == -1) {
903 		CVW_EXIT_WRITE(&hks->hks_lock);
904 		mutex_exit(&hook_stack_lock);
905 		hook_family_free(new, NULL);
906 		return (NULL);
907 	}
908 
909 	CVW_INIT(&new->hfi_lock);
910 	SLIST_INIT(&new->hfi_head);
911 	TAILQ_INIT(&new->hfi_nhead);
912 
913 	hook_wait_init(&new->hfi_waiter, &new->hfi_lock);
914 
915 	new->hfi_stack = hks;
916 	if (store != NULL)
917 		*store = new;
918 
919 	/* Add to family list head */
920 	SLIST_INSERT_HEAD(&hks->hks_familylist, new, hfi_entry);
921 
922 	CVW_EXIT_WRITE(&hks->hks_lock);
923 	mutex_exit(&hook_stack_lock);
924 
925 	hook_stack_notify_run(hks, hf->hf_name, HN_REGISTER);
926 
927 	hook_wait_unsetflag(&hks->hks_waiter, FWF_ADD_ACTIVE);
928 
929 	return (new);
930 }
931 
932 /*
933  * Function:	hook_family_remove
934  * Returns:	int    - 0 = success, else = failure
935  * Parameters:	hfi(I) - internal family pointer
936  *
937  * Remove family from family list. This function has been designed to be
938  * called once and once only per hook_family_int_t. Thus when cleaning up
939  * this structure as an orphan, callers should only call hook_family_free.
940  */
941 int
942 hook_family_remove(hook_family_int_t *hfi)
943 {
944 	hook_stack_t *hks;
945 	boolean_t notifydone;
946 
947 	ASSERT(hfi != NULL);
948 	hks = hfi->hfi_stack;
949 
950 	CVW_ENTER_WRITE(&hfi->hfi_lock);
951 	notifydone = hfi->hfi_shutdown;
952 	hfi->hfi_shutdown = B_TRUE;
953 	CVW_EXIT_WRITE(&hfi->hfi_lock);
954 
955 	CVW_ENTER_WRITE(&hks->hks_lock);
956 
957 	if (hook_wait_setflag(&hks->hks_waiter, FWF_DEL_WAIT_MASK,
958 	    FWF_DEL_WANTED, FWF_DEL_ACTIVE) == -1) {
959 		/*
960 		 * If we're trying to destroy the hook_stack_t...
961 		 */
962 		CVW_EXIT_WRITE(&hks->hks_lock);
963 		return (ENXIO);
964 	}
965 
966 	/*
967 	 * Check if the family is in use by the presence of either events
968 	 * or notify callbacks on the hook family.
969 	 */
970 	if (!SLIST_EMPTY(&hfi->hfi_head) || !TAILQ_EMPTY(&hfi->hfi_nhead)) {
971 		hfi->hfi_condemned = B_TRUE;
972 	} else {
973 		VERIFY(hook_wait_destroy(&hfi->hfi_waiter) == 0);
974 		/*
975 		 * Although hfi_condemned = B_FALSE is implied from creation,
976 		 * putting a comment here inside the else upsets lint.
977 		 */
978 		hfi->hfi_condemned = B_FALSE;
979 	}
980 	CVW_EXIT_WRITE(&hks->hks_lock);
981 
982 	if (!notifydone)
983 		hook_stack_notify_run(hks, hfi->hfi_family.hf_name,
984 		    HN_UNREGISTER);
985 
986 	hook_wait_unsetflag(&hks->hks_waiter, FWF_DEL_ACTIVE);
987 
988 	/*
989 	 * If we don't have to wait for anything else to disappear from this
990 	 * structure then we can free it up.
991 	 */
992 	if (!hfi->hfi_condemned)
993 		hook_family_free(hfi, hks);
994 
995 	return (0);
996 }
997 
998 
999 /*
1000  * Function:	hook_family_free
1001  * Returns:	None
1002  * Parameters:	hfi(I) - internal family pointer
1003  *
1004  * Free alloc memory for family
1005  */
1006 static void
1007 hook_family_free(hook_family_int_t *hfi, hook_stack_t *hks)
1008 {
1009 
1010 	/*
1011 	 * This lock gives us possession of the hks pointer after the
1012 	 * SLIST_REMOVE, for which it is not needed, when hks_shutdown
1013 	 * is checked and hook_stack_remove called.
1014 	 */
1015 	mutex_enter(&hook_stack_lock);
1016 
1017 	ASSERT(hfi != NULL);
1018 
1019 	if (hks != NULL) {
1020 		CVW_ENTER_WRITE(&hks->hks_lock);
1021 		/* Remove from family list */
1022 		SLIST_REMOVE(&hks->hks_familylist, hfi, hook_family_int,
1023 		    hfi_entry);
1024 
1025 		CVW_EXIT_WRITE(&hks->hks_lock);
1026 	}
1027 
1028 	/* Free name space */
1029 	if (hfi->hfi_family.hf_name != NULL) {
1030 		kmem_free(hfi->hfi_family.hf_name,
1031 		    strlen(hfi->hfi_family.hf_name) + 1);
1032 	}
1033 
1034 	/* Free container */
1035 	kmem_free(hfi, sizeof (*hfi));
1036 
1037 	if (hks->hks_shutdown == 2)
1038 		hook_stack_remove(hks);
1039 
1040 	mutex_exit(&hook_stack_lock);
1041 }
1042 
1043 /*
1044  * Function:	hook_family_shutdown
1045  * Returns:	int    - 0 = success, else = failure
1046  * Parameters:	hfi(I) - internal family pointer
1047  *
1048  * As an alternative to removing a family, we may desire to just generate
1049  * a series of callbacks to indicate that we will be going away in the
1050  * future. The hfi_condemned flag isn't set because we aren't trying to
1051  * remove the structure.
1052  */
1053 int
1054 hook_family_shutdown(hook_family_int_t *hfi)
1055 {
1056 	hook_stack_t *hks;
1057 	boolean_t notifydone;
1058 
1059 	ASSERT(hfi != NULL);
1060 	hks = hfi->hfi_stack;
1061 
1062 	CVW_ENTER_WRITE(&hfi->hfi_lock);
1063 	notifydone = hfi->hfi_shutdown;
1064 	hfi->hfi_shutdown = B_TRUE;
1065 	CVW_EXIT_WRITE(&hfi->hfi_lock);
1066 
1067 	CVW_ENTER_WRITE(&hks->hks_lock);
1068 
1069 	if (hook_wait_setflag(&hks->hks_waiter, FWF_DEL_WAIT_MASK,
1070 	    FWF_DEL_WANTED, FWF_DEL_ACTIVE) == -1) {
1071 		/*
1072 		 * If we're trying to destroy the hook_stack_t...
1073 		 */
1074 		CVW_EXIT_WRITE(&hks->hks_lock);
1075 		return (ENXIO);
1076 	}
1077 
1078 	CVW_EXIT_WRITE(&hks->hks_lock);
1079 
1080 	if (!notifydone)
1081 		hook_stack_notify_run(hks, hfi->hfi_family.hf_name,
1082 		    HN_UNREGISTER);
1083 
1084 	hook_wait_unsetflag(&hks->hks_waiter, FWF_DEL_ACTIVE);
1085 
1086 	return (0);
1087 }
1088 
1089 /*
1090  * Function:	hook_family_copy
1091  * Returns:	internal family pointer - NULL = Failed
1092  * Parameters:	src(I) - family pointer
1093  *
1094  * Allocate internal family block and duplicate incoming family
1095  * No locks should be held across this function as it may sleep.
1096  */
1097 static hook_family_int_t *
1098 hook_family_copy(hook_family_t *src)
1099 {
1100 	hook_family_int_t *new;
1101 	hook_family_t *dst;
1102 
1103 	ASSERT(src != NULL);
1104 	ASSERT(src->hf_name != NULL);
1105 
1106 	new = (hook_family_int_t *)kmem_zalloc(sizeof (*new), KM_SLEEP);
1107 
1108 	/* Copy body */
1109 	dst = &new->hfi_family;
1110 	*dst = *src;
1111 
1112 	SLIST_INIT(&new->hfi_head);
1113 	TAILQ_INIT(&new->hfi_nhead);
1114 
1115 	/* Copy name */
1116 	dst->hf_name = (char *)kmem_alloc(strlen(src->hf_name) + 1, KM_SLEEP);
1117 	(void) strcpy(dst->hf_name, src->hf_name);
1118 
1119 	return (new);
1120 }
1121 
1122 /*
1123  * Function:	hook_family_find
1124  * Returns:	internal family pointer - NULL = Not match
1125  * Parameters:	family(I) - family name string
1126  *
1127  * Search family list with family name
1128  * 	A lock on hfi_lock must be held when called.
1129  */
1130 static hook_family_int_t *
1131 hook_family_find(char *family, hook_stack_t *hks)
1132 {
1133 	hook_family_int_t *hfi = NULL;
1134 
1135 	ASSERT(family != NULL);
1136 
1137 	SLIST_FOREACH(hfi, &hks->hks_familylist, hfi_entry) {
1138 		if (strcmp(hfi->hfi_family.hf_name, family) == 0)
1139 			break;
1140 	}
1141 	return (hfi);
1142 }
1143 
1144 /*
1145  * Function:	hook_family_notify_register
1146  * Returns:	int         - 0 = success, else failure
1147  * Parameters:	hfi(I)      - hook family
1148  *              callback(I) - function to be called
1149  *              arg(I)      - arg to provide callback when it is called
1150  *
1151  * So long as this hook stack isn't being shut down, register a new
1152  * callback to be activated each time a new event is added to this
1153  * family.
1154  *
1155  * To call this function we must have an active handle in use on the family,
1156  * so if we take this into account, then neither the hook_family_int_t nor
1157  * the hook_stack_t that owns it can disappear. We have to put some trust
1158  * in the callers to be properly synchronised...
1159  *
1160  * Holding hks_lock is required to provide synchronisation for hks_shutdown.
1161  */
1162 int
1163 hook_family_notify_register(hook_family_int_t *hfi,
1164     hook_notify_fn_t callback, void *arg)
1165 {
1166 	hook_event_int_t *hei;
1167 	hook_stack_t *hks;
1168 	boolean_t canrun;
1169 	int error;
1170 
1171 	ASSERT(hfi != NULL);
1172 	canrun = B_FALSE;
1173 	hks = hfi->hfi_stack;
1174 
1175 	CVW_ENTER_READ(&hks->hks_lock);
1176 
1177 	if ((hfi->hfi_stack->hks_shutdown != 0) ||
1178 	    hfi->hfi_condemned || hfi->hfi_shutdown) {
1179 		CVW_EXIT_READ(&hks->hks_lock);
1180 		return (ESHUTDOWN);
1181 	}
1182 
1183 	CVW_ENTER_WRITE(&hfi->hfi_lock);
1184 	canrun = (hook_wait_setflag(&hfi->hfi_waiter, FWF_ADD_WAIT_MASK,
1185 	    FWF_ADD_WANTED, FWF_ADD_ACTIVE) != -1);
1186 	error = hook_notify_register(&hfi->hfi_nhead, callback, arg);
1187 	CVW_EXIT_WRITE(&hfi->hfi_lock);
1188 
1189 	CVW_EXIT_READ(&hks->hks_lock);
1190 
1191 	if (error == 0 && canrun) {
1192 		SLIST_FOREACH(hei, &hfi->hfi_head, hei_entry) {
1193 			callback(HN_REGISTER, arg,
1194 			    hfi->hfi_family.hf_name, NULL,
1195 			    hei->hei_event->he_name);
1196 		}
1197 	}
1198 
1199 	if (canrun)
1200 		hook_wait_unsetflag(&hfi->hfi_waiter, FWF_ADD_ACTIVE);
1201 
1202 	return (error);
1203 }
1204 
1205 /*
1206  * Function:	hook_family_notify_unregister
1207  * Returns:	int         - 0 = success, else failure
1208  * Parameters:	hfi(I)      - hook family
1209  *              callback(I) - function to be called
1210  *
1211  * Remove a callback from the list of those executed when a new event is
1212  * added to a hook family. If the family is not in the process of being
1213  * destroyed then simulate an unregister callback for each event that is
1214  * on the family. This pairs up with the hook_family_notify_register
1215  * action that simulates register events.
1216  * The order of what happens here is important and goes like this.
1217  * 1) Remove the callback from the list of functions to be called as part
1218  *    of the notify operation when an event is added or removed from the
1219  *    hook family.
1220  * 2) If the hook_family_int_t structure is on death row (free_family will
1221  *    be set to true) then there's nothing else to do than let it be free'd.
1222  * 3) If the structure isn't about to die, mark it up as being busy using
1223  *    hook_wait_setflag and then drop the lock so the loop can be run.
1224  * 4) if hook_wait_setflag was successful, tell all of the notify callback
1225  *    functions that this family has been unregistered.
1226  * 5) Cleanup
1227  */
1228 int
1229 hook_family_notify_unregister(hook_family_int_t *hfi,
1230     hook_notify_fn_t callback)
1231 {
1232 	hook_event_int_t *hei;
1233 	boolean_t free_family;
1234 	boolean_t canrun;
1235 	int error;
1236 	void *arg;
1237 
1238 	canrun = B_FALSE;
1239 
1240 	CVW_ENTER_WRITE(&hfi->hfi_lock);
1241 
1242 	(void) hook_wait_setflag(&hfi->hfi_waiter, FWF_DEL_WAIT_MASK,
1243 	    FWF_DEL_WANTED, FWF_DEL_ACTIVE);
1244 
1245 	error = hook_notify_unregister(&hfi->hfi_nhead, callback, &arg);
1246 
1247 	hook_wait_unsetflag(&hfi->hfi_waiter, FWF_DEL_ACTIVE);
1248 
1249 	/*
1250 	 * If hook_family_remove has been called but the structure was still
1251 	 * "busy" ... but we might have just made it "unbusy"...
1252 	 */
1253 	if ((error == 0) && hfi->hfi_condemned &&
1254 	    SLIST_EMPTY(&hfi->hfi_head) && TAILQ_EMPTY(&hfi->hfi_nhead)) {
1255 		free_family = B_TRUE;
1256 	} else {
1257 		free_family = B_FALSE;
1258 	}
1259 
1260 	if (error == 0 && !free_family) {
1261 		canrun = (hook_wait_setflag(&hfi->hfi_waiter, FWF_ADD_WAIT_MASK,
1262 		    FWF_ADD_WANTED, FWF_ADD_ACTIVE) != -1);
1263 	}
1264 
1265 	CVW_EXIT_WRITE(&hfi->hfi_lock);
1266 
1267 	if (canrun) {
1268 		SLIST_FOREACH(hei, &hfi->hfi_head, hei_entry) {
1269 			callback(HN_UNREGISTER, arg,
1270 			    hfi->hfi_family.hf_name, NULL,
1271 			    hei->hei_event->he_name);
1272 		}
1273 
1274 		hook_wait_unsetflag(&hfi->hfi_waiter, FWF_ADD_ACTIVE);
1275 	} else if (free_family) {
1276 		hook_family_free(hfi, hfi->hfi_stack);
1277 	}
1278 
1279 	return (error);
1280 }
1281 
1282 /*
1283  * Function:	hook_event_add
1284  * Returns:	internal event pointer - NULL = Fail
1285  * Parameters:	hfi(I) - internal family pointer
1286  *		he(I)  - event pointer
1287  *
1288  * Add new event to event list on specific family.
1289  * This function can fail to return successfully if (1) it cannot allocate
1290  * enough memory for its own internal data structures, (2) the event has
1291  * already been registered (for any hook family.)
1292  */
1293 hook_event_int_t *
1294 hook_event_add(hook_family_int_t *hfi, hook_event_t *he)
1295 {
1296 	hook_event_int_t *hei, *new;
1297 	hook_stack_t *hks;
1298 
1299 	ASSERT(hfi != NULL);
1300 	ASSERT(he != NULL);
1301 	ASSERT(he->he_name != NULL);
1302 
1303 	new = hook_event_copy(he);
1304 	if (new == NULL)
1305 		return (NULL);
1306 
1307 	hks = hfi->hfi_stack;
1308 	CVW_ENTER_READ(&hks->hks_lock);
1309 
1310 	hks = hfi->hfi_stack;
1311 	if (hks->hks_shutdown != 0) {
1312 		CVW_EXIT_READ(&hks->hks_lock);
1313 		hook_event_free(new, NULL);
1314 		return (NULL);
1315 	}
1316 
1317 	/* Check whether this event pointer is already registered */
1318 	hei = hook_event_checkdup(he, hks);
1319 	if (hei != NULL) {
1320 		CVW_EXIT_READ(&hks->hks_lock);
1321 		hook_event_free(new, NULL);
1322 		return (NULL);
1323 	}
1324 
1325 	CVW_ENTER_WRITE(&hfi->hfi_lock);
1326 
1327 	if (hfi->hfi_condemned || hfi->hfi_shutdown) {
1328 		CVW_EXIT_WRITE(&hfi->hfi_lock);
1329 		CVW_EXIT_READ(&hks->hks_lock);
1330 		hook_event_free(new, NULL);
1331 		return (NULL);
1332 	}
1333 	CVW_EXIT_READ(&hks->hks_lock);
1334 
1335 	if (hook_wait_setflag(&hfi->hfi_waiter, FWF_ADD_WAIT_MASK,
1336 	    FWF_ADD_WANTED, FWF_ADD_ACTIVE) == -1) {
1337 		CVW_EXIT_WRITE(&hfi->hfi_lock);
1338 		hook_event_free(new, NULL);
1339 		return (NULL);
1340 	}
1341 
1342 	TAILQ_INIT(&new->hei_nhead);
1343 
1344 	hook_event_init_kstats(hfi, new);
1345 	hook_wait_init(&new->hei_waiter, &new->hei_lock);
1346 
1347 	/* Add to event list head */
1348 	SLIST_INSERT_HEAD(&hfi->hfi_head, new, hei_entry);
1349 
1350 	CVW_EXIT_WRITE(&hfi->hfi_lock);
1351 
1352 	hook_notify_run(&hfi->hfi_nhead,
1353 	    hfi->hfi_family.hf_name, NULL, he->he_name, HN_REGISTER);
1354 
1355 	hook_wait_unsetflag(&hfi->hfi_waiter, FWF_ADD_ACTIVE);
1356 
1357 	return (new);
1358 }
1359 
1360 /*
1361  * Function:	hook_event_init_kstats
1362  * Returns:	None
1363  * Parameters:  hfi(I) - pointer to the family that owns this event.
1364  *              hei(I) - pointer to the hook event that needs some kstats.
1365  *
1366  * Create a set of kstats that relate to each event registered with
1367  * the hook framework.  A counter is kept for each time the event is
1368  * activated and for each time a hook is added or removed.  As the
1369  * kstats just count the events as they happen, the total number of
1370  * hooks registered must be obtained by subtractived removed from added.
1371  */
1372 static void
1373 hook_event_init_kstats(hook_family_int_t *hfi, hook_event_int_t *hei)
1374 {
1375 	hook_event_kstat_t template = {
1376 		{ "hooksAdded",		KSTAT_DATA_UINT64 },
1377 		{ "hooksRemoved",	KSTAT_DATA_UINT64 },
1378 		{ "events",		KSTAT_DATA_UINT64 }
1379 	};
1380 	hook_stack_t *hks;
1381 
1382 	hks = hfi->hfi_stack;
1383 	hei->hei_kstatp = kstat_create_netstack(hfi->hfi_family.hf_name, 0,
1384 	    hei->hei_event->he_name, "hook_event", KSTAT_TYPE_NAMED,
1385 	    sizeof (hei->hei_kstats) / sizeof (kstat_named_t),
1386 	    KSTAT_FLAG_VIRTUAL, hks->hks_netstackid);
1387 
1388 	bcopy((char *)&template, &hei->hei_kstats, sizeof (template));
1389 
1390 	if (hei->hei_kstatp != NULL) {
1391 		hei->hei_kstatp->ks_data = (void *)&hei->hei_kstats;
1392 		hei->hei_kstatp->ks_private =
1393 		    (void *)(uintptr_t)hks->hks_netstackid;
1394 
1395 		kstat_install(hei->hei_kstatp);
1396 	}
1397 }
1398 
1399 /*
1400  * Function:	hook_event_remove
1401  * Returns:	int    - 0 = success, else = failure
1402  * Parameters:	hfi(I) - internal family pointer
1403  *		he(I)  - event pointer
1404  *
1405  * Remove event from event list on specific family
1406  *
1407  * This function assumes that the caller has received a pointer to a the
1408  * hook_family_int_t via a call to net_protocol_lookup or net_protocol_unreg'.
1409  * This the hook_family_int_t is guaranteed to be around for the life of this
1410  * call, unless the caller has decided to call net_protocol_release or
1411  * net_protocol_unregister before calling net_event_unregister - an error.
1412  */
1413 int
1414 hook_event_remove(hook_family_int_t *hfi, hook_event_t *he)
1415 {
1416 	boolean_t free_family;
1417 	hook_event_int_t *hei;
1418 	boolean_t notifydone;
1419 
1420 	ASSERT(hfi != NULL);
1421 	ASSERT(he != NULL);
1422 
1423 	CVW_ENTER_WRITE(&hfi->hfi_lock);
1424 
1425 	/*
1426 	 * Set the flag so that we can call hook_event_notify_run without
1427 	 * holding any locks but at the same time prevent other changes to
1428 	 * the event at the same time.
1429 	 */
1430 	if (hook_wait_setflag(&hfi->hfi_waiter, FWF_DEL_WAIT_MASK,
1431 	    FWF_DEL_WANTED, FWF_DEL_ACTIVE) == -1) {
1432 		CVW_EXIT_WRITE(&hfi->hfi_lock);
1433 		return (ENXIO);
1434 	}
1435 
1436 	hei = hook_event_find(hfi, he->he_name);
1437 	if (hei == NULL) {
1438 		hook_wait_unsetflag(&hfi->hfi_waiter, FWF_DEL_ACTIVE);
1439 		CVW_EXIT_WRITE(&hfi->hfi_lock);
1440 		return (ESRCH);
1441 	}
1442 
1443 	free_family = B_FALSE;
1444 
1445 	CVW_ENTER_WRITE(&hei->hei_lock);
1446 	/*
1447 	 * The hei_shutdown flag is used to indicate whether or not we have
1448 	 * done a shutdown and thus already walked through the notify list.
1449 	 */
1450 	notifydone = hei->hei_shutdown;
1451 	hei->hei_shutdown = B_TRUE;
1452 	/*
1453 	 * If there are any hooks still registered for this event or
1454 	 * there are any notifiers registered, return an error indicating
1455 	 * that the event is still busy.
1456 	 */
1457 	if (!TAILQ_EMPTY(&hei->hei_head) || !TAILQ_EMPTY(&hei->hei_nhead)) {
1458 		hei->hei_condemned = B_TRUE;
1459 		CVW_EXIT_WRITE(&hei->hei_lock);
1460 	} else {
1461 		/* hei_condemned = B_FALSE is implied from creation */
1462 		/*
1463 		 * Even though we know the notify list is empty, we call
1464 		 * hook_wait_destroy here to synchronise wait removing a
1465 		 * hook from an event.
1466 		 */
1467 		VERIFY(hook_wait_destroy(&hei->hei_waiter) == 0);
1468 
1469 		CVW_EXIT_WRITE(&hei->hei_lock);
1470 
1471 		if (hfi->hfi_condemned && SLIST_EMPTY(&hfi->hfi_head) &&
1472 		    TAILQ_EMPTY(&hfi->hfi_nhead))
1473 			free_family = B_TRUE;
1474 	}
1475 
1476 	CVW_EXIT_WRITE(&hfi->hfi_lock);
1477 
1478 	if (!notifydone)
1479 		hook_notify_run(&hfi->hfi_nhead,
1480 		    hfi->hfi_family.hf_name, NULL, he->he_name, HN_UNREGISTER);
1481 
1482 	hook_wait_unsetflag(&hfi->hfi_waiter, FWF_DEL_ACTIVE);
1483 
1484 	if (!hei->hei_condemned) {
1485 		hook_event_free(hei, hfi);
1486 		if (free_family)
1487 			hook_family_free(hfi, hfi->hfi_stack);
1488 	}
1489 
1490 	return (0);
1491 }
1492 
1493 /*
1494  * Function:	hook_event_shutdown
1495  * Returns:	int    - 0 = success, else = failure
1496  * Parameters:	hfi(I) - internal family pointer
1497  *		he(I)  - event pointer
1498  *
1499  * As with hook_family_shutdown, we want to generate the notify callbacks
1500  * as if the event was being removed but not actually do the remove.
1501  */
1502 int
1503 hook_event_shutdown(hook_family_int_t *hfi, hook_event_t *he)
1504 {
1505 	hook_event_int_t *hei;
1506 	boolean_t notifydone;
1507 
1508 	ASSERT(hfi != NULL);
1509 	ASSERT(he != NULL);
1510 
1511 	CVW_ENTER_WRITE(&hfi->hfi_lock);
1512 
1513 	/*
1514 	 * Set the flag so that we can call hook_event_notify_run without
1515 	 * holding any locks but at the same time prevent other changes to
1516 	 * the event at the same time.
1517 	 */
1518 	if (hook_wait_setflag(&hfi->hfi_waiter, FWF_DEL_WAIT_MASK,
1519 	    FWF_DEL_WANTED, FWF_DEL_ACTIVE) == -1) {
1520 		CVW_EXIT_WRITE(&hfi->hfi_lock);
1521 		return (ENXIO);
1522 	}
1523 
1524 	hei = hook_event_find(hfi, he->he_name);
1525 	if (hei == NULL) {
1526 		hook_wait_unsetflag(&hfi->hfi_waiter, FWF_DEL_ACTIVE);
1527 		CVW_EXIT_WRITE(&hfi->hfi_lock);
1528 		return (ESRCH);
1529 	}
1530 
1531 	CVW_ENTER_WRITE(&hei->hei_lock);
1532 	notifydone = hei->hei_shutdown;
1533 	hei->hei_shutdown = B_TRUE;
1534 	CVW_EXIT_WRITE(&hei->hei_lock);
1535 
1536 	CVW_EXIT_WRITE(&hfi->hfi_lock);
1537 
1538 	if (!notifydone)
1539 		hook_notify_run(&hfi->hfi_nhead,
1540 		    hfi->hfi_family.hf_name, NULL, he->he_name, HN_UNREGISTER);
1541 
1542 	hook_wait_unsetflag(&hfi->hfi_waiter, FWF_DEL_ACTIVE);
1543 
1544 	return (0);
1545 }
1546 
1547 /*
1548  * Function:	hook_event_free
1549  * Returns:	None
1550  * Parameters:	hei(I) - internal event pointer
1551  *
1552  * Free alloc memory for event
1553  */
1554 static void
1555 hook_event_free(hook_event_int_t *hei, hook_family_int_t *hfi)
1556 {
1557 	boolean_t free_family;
1558 
1559 	ASSERT(hei != NULL);
1560 
1561 	if (hfi != NULL) {
1562 		CVW_ENTER_WRITE(&hfi->hfi_lock);
1563 		/*
1564 		 * Remove the event from the hook family's list.
1565 		 */
1566 		SLIST_REMOVE(&hfi->hfi_head, hei, hook_event_int, hei_entry);
1567 		if (hfi->hfi_condemned && SLIST_EMPTY(&hfi->hfi_head) &&
1568 		    TAILQ_EMPTY(&hfi->hfi_nhead)) {
1569 			free_family = B_TRUE;
1570 		} else {
1571 			free_family = B_FALSE;
1572 		}
1573 		CVW_EXIT_WRITE(&hfi->hfi_lock);
1574 	}
1575 
1576 	if (hei->hei_kstatp != NULL) {
1577 		ASSERT(hfi != NULL);
1578 
1579 		kstat_delete_netstack(hei->hei_kstatp,
1580 		    hfi->hfi_stack->hks_netstackid);
1581 		hei->hei_kstatp = NULL;
1582 	}
1583 
1584 	/* Free container */
1585 	kmem_free(hei, sizeof (*hei));
1586 
1587 	if (free_family)
1588 		hook_family_free(hfi, hfi->hfi_stack);
1589 }
1590 
1591 /*
1592  * Function:    hook_event_checkdup
1593  * Returns:     internal event pointer - NULL = Not match
1594  * Parameters:  he(I) - event pointer
1595  *
1596  * Search all of the hook families to see if the event being passed in
1597  * has already been associated with one.
1598  */
1599 static hook_event_int_t *
1600 hook_event_checkdup(hook_event_t *he, hook_stack_t *hks)
1601 {
1602 	hook_family_int_t *hfi;
1603 	hook_event_int_t *hei;
1604 
1605 	ASSERT(he != NULL);
1606 
1607 	CVW_ENTER_READ(&hks->hks_lock);
1608 	SLIST_FOREACH(hfi, &hks->hks_familylist, hfi_entry) {
1609 		SLIST_FOREACH(hei, &hfi->hfi_head, hei_entry) {
1610 			if (hei->hei_event == he) {
1611 				CVW_EXIT_READ(&hks->hks_lock);
1612 				return (hei);
1613 			}
1614 		}
1615 	}
1616 	CVW_EXIT_READ(&hks->hks_lock);
1617 
1618 	return (NULL);
1619 }
1620 
1621 /*
1622  * Function:	hook_event_copy
1623  * Returns:	internal event pointer - NULL = Failed
1624  * Parameters:	src(I) - event pointer
1625  *
1626  * Allocate internal event block and duplicate incoming event
1627  * No locks should be held across this function as it may sleep.
1628  */
1629 static hook_event_int_t *
1630 hook_event_copy(hook_event_t *src)
1631 {
1632 	hook_event_int_t *new;
1633 
1634 	ASSERT(src != NULL);
1635 	ASSERT(src->he_name != NULL);
1636 
1637 	new = (hook_event_int_t *)kmem_zalloc(sizeof (*new), KM_SLEEP);
1638 
1639 	/* Copy body */
1640 	TAILQ_INIT(&new->hei_head);
1641 	new->hei_event = src;
1642 
1643 	return (new);
1644 }
1645 
1646 /*
1647  * Function:	hook_event_find
1648  * Returns:	internal event pointer - NULL = Not match
1649  * Parameters:	hfi(I)   - internal family pointer
1650  *		event(I) - event name string
1651  *
1652  * Search event list with event name
1653  * 	A lock on hfi->hfi_lock must be held when called.
1654  */
1655 static hook_event_int_t *
1656 hook_event_find(hook_family_int_t *hfi, char *event)
1657 {
1658 	hook_event_int_t *hei = NULL;
1659 
1660 	ASSERT(hfi != NULL);
1661 	ASSERT(event != NULL);
1662 
1663 	SLIST_FOREACH(hei, &hfi->hfi_head, hei_entry) {
1664 		if ((strcmp(hei->hei_event->he_name, event) == 0) &&
1665 		    ((hei->hei_waiter.fw_flags & FWF_UNSAFE) == 0))
1666 			break;
1667 	}
1668 	return (hei);
1669 }
1670 
1671 /*
1672  * Function:	hook_event_notify_register
1673  * Returns:	int         - 0 = success, else failure
1674  * Parameters:	hfi(I)      - hook family
1675  *              event(I)    - name of the event
1676  *              callback(I) - function to be called
1677  *              arg(I)      - arg to provide callback when it is called
1678  *
1679  * Adds a new callback to the event named by "event" (we must find it)
1680  * that will be executed each time a new hook is added to the event.
1681  * Of course, if the stack is being shut down, this call should fail.
1682  */
1683 int
1684 hook_event_notify_register(hook_family_int_t *hfi, char *event,
1685     hook_notify_fn_t callback, void *arg)
1686 {
1687 	hook_event_int_t *hei;
1688 	hook_stack_t *hks;
1689 	boolean_t canrun;
1690 	hook_int_t *h;
1691 	int error;
1692 
1693 	canrun = B_FALSE;
1694 	hks = hfi->hfi_stack;
1695 	CVW_ENTER_READ(&hks->hks_lock);
1696 	if (hks->hks_shutdown != 0) {
1697 		CVW_EXIT_READ(&hks->hks_lock);
1698 		return (ESHUTDOWN);
1699 	}
1700 
1701 	CVW_ENTER_READ(&hfi->hfi_lock);
1702 
1703 	if (hfi->hfi_condemned || hfi->hfi_shutdown) {
1704 		CVW_EXIT_READ(&hfi->hfi_lock);
1705 		CVW_EXIT_READ(&hks->hks_lock);
1706 		return (ESHUTDOWN);
1707 	}
1708 
1709 	hei = hook_event_find(hfi, event);
1710 	if (hei == NULL) {
1711 		CVW_EXIT_READ(&hfi->hfi_lock);
1712 		CVW_EXIT_READ(&hks->hks_lock);
1713 		return (ESRCH);
1714 	}
1715 
1716 	if (hei->hei_condemned || hei->hei_shutdown) {
1717 		CVW_EXIT_READ(&hfi->hfi_lock);
1718 		CVW_EXIT_READ(&hks->hks_lock);
1719 		return (ESHUTDOWN);
1720 	}
1721 
1722 	CVW_ENTER_WRITE(&hei->hei_lock);
1723 	canrun = (hook_wait_setflag(&hei->hei_waiter, FWF_ADD_WAIT_MASK,
1724 	    FWF_ADD_WANTED, FWF_ADD_ACTIVE) != -1);
1725 	error = hook_notify_register(&hei->hei_nhead, callback, arg);
1726 	CVW_EXIT_WRITE(&hei->hei_lock);
1727 
1728 	CVW_EXIT_READ(&hfi->hfi_lock);
1729 	CVW_EXIT_READ(&hks->hks_lock);
1730 
1731 	if (error == 0 && canrun) {
1732 		TAILQ_FOREACH(h, &hei->hei_head, hi_entry) {
1733 			callback(HN_REGISTER, arg,
1734 			    hfi->hfi_family.hf_name, hei->hei_event->he_name,
1735 			    h->hi_hook.h_name);
1736 		}
1737 	}
1738 
1739 	if (canrun)
1740 		hook_wait_unsetflag(&hei->hei_waiter, FWF_ADD_ACTIVE);
1741 
1742 	return (error);
1743 }
1744 
1745 /*
1746  * Function:	hook_event_notify_unregister
1747  * Returns:	int         - 0 = success, else failure
1748  * Parameters:	hfi(I)      - hook family
1749  *              event(I)    - name of the event
1750  *              callback(I) - function to be called
1751  *
1752  * Remove the given callback from the named event's list of functions
1753  * to call when a hook is added or removed.
1754  */
1755 int
1756 hook_event_notify_unregister(hook_family_int_t *hfi, char *event,
1757     hook_notify_fn_t callback)
1758 {
1759 	hook_event_int_t *hei;
1760 	boolean_t free_event;
1761 	boolean_t canrun;
1762 	hook_int_t *h;
1763 	void *arg;
1764 	int error;
1765 
1766 	canrun = B_FALSE;
1767 
1768 	CVW_ENTER_READ(&hfi->hfi_lock);
1769 
1770 	hei = hook_event_find(hfi, event);
1771 	if (hei == NULL) {
1772 		CVW_EXIT_READ(&hfi->hfi_lock);
1773 		return (ESRCH);
1774 	}
1775 
1776 	CVW_ENTER_WRITE(&hei->hei_lock);
1777 
1778 	(void) hook_wait_setflag(&hei->hei_waiter, FWF_DEL_WAIT_MASK,
1779 	    FWF_DEL_WANTED, FWF_DEL_ACTIVE);
1780 
1781 	error = hook_notify_unregister(&hei->hei_nhead, callback, &arg);
1782 
1783 	hook_wait_unsetflag(&hei->hei_waiter, FWF_DEL_ACTIVE);
1784 
1785 	/*
1786 	 * hei_condemned has been set if someone tried to remove the
1787 	 * event but couldn't because there were still things attached to
1788 	 * it. Now that we've done a successful remove, if it is now empty
1789 	 * then by all rights we should be free'ing it too.  Note that the
1790 	 * expectation is that only the caller of hook_event_add will ever
1791 	 * call hook_event_remove.
1792 	 */
1793 	if ((error == 0) && hei->hei_condemned &&
1794 	    TAILQ_EMPTY(&hei->hei_head) && TAILQ_EMPTY(&hei->hei_nhead)) {
1795 		free_event = B_TRUE;
1796 	} else {
1797 		free_event = B_FALSE;
1798 	}
1799 
1800 	if (error == 0 && !free_event) {
1801 		canrun = (hook_wait_setflag(&hei->hei_waiter, FWF_ADD_WAIT_MASK,
1802 		    FWF_ADD_WANTED, FWF_ADD_ACTIVE) != -1);
1803 	}
1804 
1805 	CVW_EXIT_WRITE(&hei->hei_lock);
1806 	CVW_EXIT_READ(&hfi->hfi_lock);
1807 
1808 	if (canrun) {
1809 		TAILQ_FOREACH(h, &hei->hei_head, hi_entry) {
1810 			callback(HN_UNREGISTER, arg,
1811 			    hfi->hfi_family.hf_name, hei->hei_event->he_name,
1812 			    h->hi_hook.h_name);
1813 		}
1814 
1815 		hook_wait_unsetflag(&hei->hei_waiter, FWF_ADD_ACTIVE);
1816 	}
1817 
1818 	if (free_event) {
1819 		/*
1820 		 * It is safe to pass in hfi here, without a lock, because
1821 		 * our structure (hei) is still on one of its lists and thus
1822 		 * it won't be able to disappear yet...
1823 		 */
1824 		hook_event_free(hei, hfi);
1825 	}
1826 
1827 	return (error);
1828 }
1829 
1830 /*
1831  * Function:	hook_event_notify_run
1832  * Returns:	None
1833  * Parameters:	nrun(I) - pointer to the list of callbacks to execute
1834  *              hfi(I)  - hook stack pointer to execute callbacks for
1835  *              name(I) - name of a hook family
1836  *              cmd(I)  - either HN_UNREGISTER or HN_REGISTER
1837  *
1838  * Execute all of the callbacks registered for this event.
1839  */
1840 static void
1841 hook_event_notify_run(hook_event_int_t *hei, hook_family_int_t *hfi,
1842     char *event, char *name, hook_notify_cmd_t cmd)
1843 {
1844 
1845 	hook_notify_run(&hei->hei_nhead, hfi->hfi_family.hf_name,
1846 	    event, name, cmd);
1847 }
1848 
1849 /*
1850  * Function:	hook_register
1851  * Returns:	int      - 0 = success, else = failure
1852  * Parameters:	hfi(I)   - internal family pointer
1853  *		event(I) - event name string
1854  *		h(I)     - hook pointer
1855  *
1856  * Add new hook to hook list on the specified family and event.
1857  */
1858 int
1859 hook_register(hook_family_int_t *hfi, char *event, hook_t *h)
1860 {
1861 	hook_event_int_t *hei;
1862 	hook_int_t *hi, *new;
1863 	int error;
1864 
1865 	ASSERT(hfi != NULL);
1866 	ASSERT(event != NULL);
1867 	ASSERT(h != NULL);
1868 
1869 	if (hfi->hfi_stack->hks_shutdown)
1870 		return (NULL);
1871 
1872 	/* Alloc hook_int_t and copy hook */
1873 	new = hook_copy(h);
1874 	if (new == NULL)
1875 		return (ENOMEM);
1876 
1877 	/*
1878 	 * Since hook add/remove only impact event, so it is unnecessary
1879 	 * to hold global family write lock. Just get read lock here to
1880 	 * ensure event will not be removed when doing hooks operation
1881 	 */
1882 	CVW_ENTER_WRITE(&hfi->hfi_lock);
1883 
1884 	hei = hook_event_find(hfi, event);
1885 	if (hei == NULL) {
1886 		CVW_EXIT_WRITE(&hfi->hfi_lock);
1887 		hook_int_free(new, hfi->hfi_stack->hks_netstackid);
1888 		return (ENXIO);
1889 	}
1890 
1891 	CVW_ENTER_WRITE(&hei->hei_lock);
1892 
1893 	/*
1894 	 * If we've run either the remove() or shutdown(), do not allow any
1895 	 * more hooks to be added to this event.
1896 	 */
1897 	if (hei->hei_shutdown) {
1898 		error = ESHUTDOWN;
1899 		goto bad_add;
1900 	}
1901 
1902 	hi = hook_find(hei, h);
1903 	if (hi != NULL) {
1904 		error = EEXIST;
1905 		goto bad_add;
1906 	}
1907 
1908 	if (hook_wait_setflag(&hei->hei_waiter, FWF_ADD_WAIT_MASK,
1909 	    FWF_ADD_WANTED, FWF_ADD_ACTIVE) == -1) {
1910 		error = ENOENT;
1911 bad_add:
1912 		CVW_EXIT_WRITE(&hei->hei_lock);
1913 		CVW_EXIT_WRITE(&hfi->hfi_lock);
1914 		hook_int_free(new, hfi->hfi_stack->hks_netstackid);
1915 		return (error);
1916 	}
1917 
1918 	/* Add to hook list head */
1919 	error = hook_insert(&hei->hei_head, new);
1920 	if (error == 0) {
1921 		hei->hei_event->he_interested = B_TRUE;
1922 		hei->hei_kstats.hooks_added.value.ui64++;
1923 
1924 		hook_init_kstats(hfi, hei, new);
1925 	}
1926 
1927 	CVW_EXIT_WRITE(&hei->hei_lock);
1928 	CVW_EXIT_WRITE(&hfi->hfi_lock);
1929 
1930 	/*
1931 	 * Note that the name string passed through to the notify callbacks
1932 	 * is from the original hook being registered, not the copy being
1933 	 * inserted.
1934 	 */
1935 	if (error == 0)
1936 		hook_event_notify_run(hei, hfi, event, h->h_name, HN_REGISTER);
1937 
1938 	hook_wait_unsetflag(&hei->hei_waiter, FWF_ADD_ACTIVE);
1939 
1940 	return (error);
1941 }
1942 
1943 /*
1944  * Function:	hook_insert
1945  * Returns:	int     - 0 = success, else = failure
1946  * Parameters:	head(I) - pointer to hook list to insert hook onto
1947  *		new(I)  - pointer to hook to be inserted
1948  *
1949  * Try to insert the hook onto the list of hooks according to the hints
1950  * given in the hook to be inserted and those that already exist on the
1951  * list.  For now, the implementation permits only a single hook to be
1952  * either first or last and names provided with before or after are only
1953  * loosely coupled with the action.
1954  */
1955 static int
1956 hook_insert(hook_int_head_t *head, hook_int_t *new)
1957 {
1958 	hook_int_t *before;
1959 	hook_int_t *hi;
1960 	hook_t *hih;
1961 	hook_t *h = &new->hi_hook;
1962 
1963 	switch (new->hi_hook.h_hint) {
1964 	case HH_NONE :
1965 		before = NULL;
1966 		/*
1967 		 * If there is no hint present (or not one that can be
1968 		 * satisfied now) then try to at least respect the wishes
1969 		 * of those that want to be last.  If there are none wanting
1970 		 * to be last then add the new hook to the tail of the
1971 		 * list - this means we keep any wanting to be first
1972 		 * happy without having to search for HH_FIRST.
1973 		 */
1974 		TAILQ_FOREACH(hi, head, hi_entry) {
1975 			hih = &hi->hi_hook;
1976 			if ((hih->h_hint == HH_AFTER) &&
1977 			    (strcmp(h->h_name,
1978 			    (char *)hih->h_hintvalue) == 0)) {
1979 				TAILQ_INSERT_BEFORE(hi, new, hi_entry);
1980 				return (0);
1981 			}
1982 			if ((hih->h_hint == HH_BEFORE) && (before == NULL) &&
1983 			    (strcmp(h->h_name,
1984 			    (char *)hih->h_hintvalue) == 0)) {
1985 				before = hi;
1986 			}
1987 		}
1988 		if (before != NULL) {
1989 			TAILQ_INSERT_AFTER(head, before, new, hi_entry);
1990 			return (0);
1991 		}
1992 		hook_insert_plain(head, new);
1993 		break;
1994 
1995 	case HH_FIRST :
1996 		hi = TAILQ_FIRST(head);
1997 		if ((hi != NULL) && (hi->hi_hook.h_hint == HH_FIRST))
1998 			return (EBUSY);
1999 		TAILQ_INSERT_HEAD(head, new, hi_entry);
2000 		break;
2001 
2002 	case HH_LAST :
2003 		hi = TAILQ_LAST(head, hook_int_head);
2004 		if ((hi != NULL) && (hi->hi_hook.h_hint == HH_LAST))
2005 			return (EBUSY);
2006 		TAILQ_INSERT_TAIL(head, new, hi_entry);
2007 		break;
2008 
2009 	case HH_BEFORE :
2010 		hi = hook_find_byname(head, (char *)new->hi_hook.h_hintvalue);
2011 		if (hi == NULL)
2012 			return (hook_insert_afterbefore(head, new));
2013 
2014 		if (hi->hi_hook.h_hint == HH_FIRST)
2015 			return (EBUSY);
2016 
2017 		TAILQ_INSERT_BEFORE(hi, new, hi_entry);
2018 		break;
2019 
2020 	case HH_AFTER :
2021 		hi = hook_find_byname(head, (char *)new->hi_hook.h_hintvalue);
2022 		if (hi == NULL)
2023 			return (hook_insert_afterbefore(head, new));
2024 
2025 		if (hi->hi_hook.h_hint == HH_LAST)
2026 			return (EBUSY);
2027 
2028 		TAILQ_INSERT_AFTER(head, hi, new, hi_entry);
2029 		break;
2030 
2031 	default :
2032 		return (EINVAL);
2033 	}
2034 
2035 	return (0);
2036 }
2037 
2038 /*
2039  * Function:	hook_insert_plain
2040  * Returns:	int     - 0 = success, else = failure
2041  * Parameters:	head(I) - pointer to hook list to insert hook onto
2042  *		new(I)  - pointer to hook to be inserted
2043  *
2044  * Insert a hook such that it respects the wishes of those that want to
2045  * be last.  If there are none wanting to be last then add the new hook
2046  * to the tail of the list - this means we keep any wanting to be first
2047  * happy without having to search for HH_FIRST.
2048  */
2049 static void
2050 hook_insert_plain(hook_int_head_t *head, hook_int_t *new)
2051 {
2052 	hook_int_t *hi;
2053 
2054 	hi = TAILQ_FIRST(head);
2055 	if (hi != NULL) {
2056 		if (hi->hi_hook.h_hint == HH_LAST) {
2057 			TAILQ_INSERT_BEFORE(hi, new, hi_entry);
2058 		} else {
2059 			TAILQ_INSERT_TAIL(head, new, hi_entry);
2060 		}
2061 	} else {
2062 		TAILQ_INSERT_TAIL(head, new, hi_entry);
2063 	}
2064 }
2065 
2066 /*
2067  * Function:	hook_insert_afterbefore
2068  * Returns:	int     - 0 = success, else = failure
2069  * Parameters:	head(I) - pointer to hook list to insert hook onto
2070  *		new(I)  - pointer to hook to be inserted
2071  *
2072  * Simple insertion of a hook specifying a HH_BEFORE or HH_AFTER was not
2073  * possible, so now we need to be more careful.  The first pass is to go
2074  * through the list and look for any other hooks that also specify the
2075  * same hint name as the new one.  The object of this exercise is to make
2076  * sure that hooks with HH_BEFORE always appear on the list before those
2077  * with HH_AFTER so that when said hook arrives, it can be placed in the
2078  * middle of the BEFOREs and AFTERs.  If this condition does not arise,
2079  * just use hook_insert_plain() to try and insert the hook somewhere that
2080  * is innocuous to existing efforts.
2081  */
2082 static int
2083 hook_insert_afterbefore(hook_int_head_t *head, hook_int_t *new)
2084 {
2085 	hook_int_t *hi;
2086 	hook_t *nh;
2087 	hook_t *h;
2088 
2089 	nh = &new->hi_hook;
2090 	ASSERT(new->hi_hook.h_hint != HH_NONE);
2091 	ASSERT(new->hi_hook.h_hint != HH_LAST);
2092 	ASSERT(new->hi_hook.h_hint != HH_FIRST);
2093 
2094 	/*
2095 	 * First, look through the list to see if there are any other
2096 	 * before's or after's that have a matching hint name.
2097 	 */
2098 	TAILQ_FOREACH(hi, head, hi_entry) {
2099 		h = &hi->hi_hook;
2100 		switch (h->h_hint) {
2101 		case HH_FIRST :
2102 		case HH_LAST :
2103 		case HH_NONE :
2104 			break;
2105 		case HH_BEFORE :
2106 			if ((nh->h_hint == HH_BEFORE) &&
2107 			    (strcmp((char *)h->h_hintvalue,
2108 			    (char *)nh->h_hintvalue) == 0)) {
2109 				TAILQ_INSERT_AFTER(head, hi, new, hi_entry);
2110 				return (0);
2111 			}
2112 			if ((nh->h_hint == HH_AFTER) &&
2113 			    (strcmp((char *)h->h_hintvalue,
2114 			    (char *)nh->h_hintvalue) == 0)) {
2115 				TAILQ_INSERT_BEFORE(hi, new, hi_entry);
2116 				return (0);
2117 			}
2118 			break;
2119 		case HH_AFTER :
2120 			if ((nh->h_hint == HH_AFTER) &&
2121 			    (strcmp((char *)h->h_hintvalue,
2122 			    (char *)nh->h_hintvalue) == 0)) {
2123 				TAILQ_INSERT_AFTER(head, hi, new, hi_entry);
2124 				return (0);
2125 			}
2126 			if ((nh->h_hint == HH_BEFORE) &&
2127 			    (strcmp((char *)h->h_hintvalue,
2128 			    (char *)nh->h_hintvalue) == 0)) {
2129 				TAILQ_INSERT_BEFORE(hi, new, hi_entry);
2130 				return (0);
2131 			}
2132 			break;
2133 		}
2134 	}
2135 
2136 	hook_insert_plain(head, new);
2137 
2138 	return (0);
2139 }
2140 
2141 /*
2142  * Function:	hook_unregister
2143  * Returns:	int      - 0 = success, else = failure
2144  * Parameters:	hfi(I)   - internal family pointer
2145  *		event(I) - event name string
2146  *		h(I)     - hook pointer
2147  *
2148  * Remove hook from hook list on specific family, event
2149  */
2150 int
2151 hook_unregister(hook_family_int_t *hfi, char *event, hook_t *h)
2152 {
2153 	hook_event_int_t *hei;
2154 	hook_int_t *hi;
2155 	boolean_t free_event;
2156 
2157 	ASSERT(hfi != NULL);
2158 	ASSERT(h != NULL);
2159 
2160 	CVW_ENTER_WRITE(&hfi->hfi_lock);
2161 
2162 	hei = hook_event_find(hfi, event);
2163 	if (hei == NULL) {
2164 		CVW_EXIT_WRITE(&hfi->hfi_lock);
2165 		return (ENXIO);
2166 	}
2167 
2168 	/* Hold write lock for event */
2169 	CVW_ENTER_WRITE(&hei->hei_lock);
2170 
2171 	hi = hook_find(hei, h);
2172 	if (hi == NULL) {
2173 		CVW_EXIT_WRITE(&hei->hei_lock);
2174 		CVW_EXIT_WRITE(&hfi->hfi_lock);
2175 		return (ENXIO);
2176 	}
2177 
2178 	if (hook_wait_setflag(&hei->hei_waiter, FWF_DEL_WAIT_MASK,
2179 	    FWF_DEL_WANTED, FWF_DEL_ACTIVE) == -1) {
2180 		CVW_EXIT_WRITE(&hei->hei_lock);
2181 		CVW_EXIT_WRITE(&hfi->hfi_lock);
2182 		return (ENOENT);
2183 	}
2184 
2185 	/* Remove from hook list */
2186 	TAILQ_REMOVE(&hei->hei_head, hi, hi_entry);
2187 
2188 	free_event = B_FALSE;
2189 	if (TAILQ_EMPTY(&hei->hei_head)) {
2190 		hei->hei_event->he_interested = B_FALSE;
2191 		/*
2192 		 * If the delete pending flag has been set and there are
2193 		 * no notifiers on the event (and we've removed the last
2194 		 * hook) then we need to free this event after we're done.
2195 		 */
2196 		if (hei->hei_condemned && TAILQ_EMPTY(&hei->hei_nhead))
2197 			free_event = B_TRUE;
2198 	}
2199 	hei->hei_kstats.hooks_removed.value.ui64++;
2200 
2201 	CVW_EXIT_WRITE(&hei->hei_lock);
2202 	CVW_EXIT_WRITE(&hfi->hfi_lock);
2203 	/*
2204 	 * While the FWF_DEL_ACTIVE flag is set, the hook_event_int_t
2205 	 * will not be free'd and thus the hook_family_int_t wil not
2206 	 * be free'd either.
2207 	 */
2208 	hook_event_notify_run(hei, hfi, event, h->h_name, HN_UNREGISTER);
2209 	hook_wait_unsetflag(&hei->hei_waiter, FWF_DEL_ACTIVE);
2210 
2211 	hook_int_free(hi, hfi->hfi_stack->hks_netstackid);
2212 
2213 	if (free_event)
2214 		hook_event_free(hei, hfi);
2215 
2216 	return (0);
2217 }
2218 
2219 /*
2220  * Function:	hook_find_byname
2221  * Returns:	internal hook pointer - NULL = Not match
2222  * Parameters:	hei(I) - internal event pointer
2223  *		name(I)- hook name
2224  *
2225  * Search an event's list of hooks to see if there is a hook present that
2226  * has a matching name to the one being looked for.
2227  */
2228 static hook_int_t *
2229 hook_find_byname(hook_int_head_t *head, char *name)
2230 {
2231 	hook_int_t *hi;
2232 
2233 	TAILQ_FOREACH(hi, head, hi_entry) {
2234 		if (strcmp(hi->hi_hook.h_name, name) == 0)
2235 			return (hi);
2236 	}
2237 
2238 	return (NULL);
2239 }
2240 
2241 /*
2242  * Function:	hook_find
2243  * Returns:	internal hook pointer - NULL = Not match
2244  * Parameters:	hei(I) - internal event pointer
2245  *		h(I)   - hook pointer
2246  *
2247  * Search an event's list of hooks to see if there is already one that
2248  * matches the hook being passed in.  Currently the only criteria for a
2249  * successful search here is for the names to be the same.
2250  */
2251 static hook_int_t *
2252 hook_find(hook_event_int_t *hei, hook_t *h)
2253 {
2254 
2255 	ASSERT(hei != NULL);
2256 	ASSERT(h != NULL);
2257 
2258 	return (hook_find_byname(&hei->hei_head, h->h_name));
2259 }
2260 
2261 /*
2262  * Function:	hook_copy
2263  * Returns:	internal hook pointer - NULL = Failed
2264  * Parameters:	src(I) - hook pointer
2265  *
2266  * Allocate internal hook block and duplicate incoming hook.
2267  * No locks should be held across this function as it may sleep.
2268  * Because hook_copy() is responsible for the creation of the internal
2269  * hook structure that is used here, it takes on population the structure
2270  * with the kstat information.  Note that while the kstat bits are
2271  * seeded here, their installation of the kstats is handled elsewhere.
2272  */
2273 static hook_int_t *
2274 hook_copy(hook_t *src)
2275 {
2276 	hook_int_t *new;
2277 	hook_t *dst;
2278 	int len;
2279 
2280 	ASSERT(src != NULL);
2281 	ASSERT(src->h_name != NULL);
2282 
2283 	new = (hook_int_t *)kmem_zalloc(sizeof (*new), KM_SLEEP);
2284 
2285 	/* Copy body */
2286 	dst = &new->hi_hook;
2287 	*dst = *src;
2288 
2289 	/* Copy name */
2290 	len = strlen(src->h_name);
2291 	dst->h_name = (char *)kmem_alloc(len + 1, KM_SLEEP);
2292 	(void) strcpy(dst->h_name, src->h_name);
2293 
2294 	/*
2295 	 * This is initialised in this manner to make it safer to use the
2296 	 * same pointer in the kstats field.
2297 	 */
2298 	dst->h_hintvalue = (uintptr_t)"";
2299 
2300 	if (dst->h_hint == HH_BEFORE || dst->h_hint == HH_AFTER) {
2301 		len = strlen((char *)src->h_hintvalue);
2302 		if (len > 0) {
2303 			dst->h_hintvalue = (uintptr_t)kmem_alloc(len + 1,
2304 			    KM_SLEEP);
2305 			(void) strcpy((char *)dst->h_hintvalue,
2306 			    (char *)src->h_hintvalue);
2307 		}
2308 	}
2309 
2310 	return (new);
2311 }
2312 
2313 /*
2314  * Function:	hook_init_kstats
2315  * Returns:	None
2316  * Parameters:  hfi(I) - pointer to the family that owns the event.
2317  *              hei(I) - pointer to the event that owns this hook
2318  *              hi(I)  - pointer to the hook for which we create kstats for
2319  *
2320  * Each hook that is registered with this framework has its own kstats
2321  * set up so that we can provide an easy way in which to observe the
2322  * look of hooks (using the kstat command.) The position is set to 0
2323  * here but is recalculated after we know the insertion has been a
2324  * success.
2325  */
2326 static void
2327 hook_init_kstats(hook_family_int_t *hfi, hook_event_int_t *hei, hook_int_t *hi)
2328 {
2329 	hook_hook_kstat_t template = {
2330 		{ "version",			KSTAT_DATA_INT32 },
2331 		{ "flags",			KSTAT_DATA_UINT32 },
2332 		{ "hint",			KSTAT_DATA_INT32 },
2333 		{ "hint_value",			KSTAT_DATA_STRING },
2334 		{ "position",			KSTAT_DATA_INT32 },
2335 		{ "hook_hits",			KSTAT_DATA_UINT64 }
2336 	};
2337 	hook_stack_t *hks;
2338 	size_t kslen;
2339 	int position;
2340 	hook_int_t *h;
2341 
2342 	kslen = strlen(hfi->hfi_family.hf_name) +
2343 	    strlen(hei->hei_event->he_name) + 2;
2344 
2345 	hi->hi_ksname = (char *)kmem_zalloc(kslen, KM_SLEEP);
2346 	(void) snprintf(hi->hi_ksname, kslen, "%s/%s",
2347 	    hfi->hfi_family.hf_name, hei->hei_event->he_name);
2348 
2349 	hks = hfi->hfi_stack;
2350 	hi->hi_kstatp = kstat_create_netstack(hi->hi_ksname, 0,
2351 	    hi->hi_hook.h_name, "hook", KSTAT_TYPE_NAMED,
2352 	    sizeof (hi->hi_kstats) / sizeof (kstat_named_t),
2353 	    KSTAT_FLAG_VIRTUAL, hks->hks_netstackid);
2354 
2355 	/* Initialise the kstats for the structure */
2356 	bcopy(&template, &hi->hi_kstats, sizeof (template));
2357 	hi->hi_kstats.hook_version.value.i32 = hi->hi_hook.h_version;
2358 	hi->hi_kstats.hook_flags.value.ui32 = hi->hi_hook.h_flags;
2359 	hi->hi_kstats.hook_hint.value.i32 = hi->hi_hook.h_hint;
2360 	hi->hi_kstats.hook_position.value.i32 = 0;
2361 	hi->hi_kstats.hook_hits.value.ui64 = 0;
2362 
2363 	switch (hi->hi_hook.h_hint) {
2364 	case HH_BEFORE :
2365 	case HH_AFTER :
2366 		kstat_named_setstr(&(hi->hi_kstats.hook_hintvalue),
2367 		    (const char *)hi->hi_hook.h_hintvalue);
2368 		break;
2369 	default :
2370 		kstat_named_setstr(&(hi->hi_kstats.hook_hintvalue),
2371 		    hook_hintvalue_none);
2372 		break;
2373 	}
2374 
2375 	if (hi->hi_kstatp != NULL) {
2376 		hi->hi_kstatp->ks_data = (void *)&hi->hi_kstats;
2377 		hi->hi_kstatp->ks_private =
2378 		    (void *)(uintptr_t)hks->hks_netstackid;
2379 		hi->hi_kstatp->ks_data_size +=
2380 		    KSTAT_NAMED_STR_BUFLEN(&(hi->hi_kstats.hook_hintvalue)) + 1;
2381 
2382 		kstat_install(hi->hi_kstatp);
2383 	}
2384 
2385 	position = 1;
2386 	TAILQ_FOREACH(h, &hei->hei_head, hi_entry) {
2387 		h->hi_kstats.hook_position.value.ui32 = position++;
2388 	}
2389 }
2390 
2391 /*
2392  * Function:	hook_int_free
2393  * Returns:	None
2394  * Parameters:	hi(I) - internal hook pointer
2395  *
2396  * Free memory allocated to support a hook.
2397  */
2398 static void
2399 hook_int_free(hook_int_t *hi, netstackid_t stackid)
2400 {
2401 	int len;
2402 
2403 	ASSERT(hi != NULL);
2404 
2405 	/* Free name space */
2406 	if (hi->hi_hook.h_name != NULL) {
2407 		kmem_free(hi->hi_hook.h_name, strlen(hi->hi_hook.h_name) + 1);
2408 	}
2409 	if (hi->hi_ksname != NULL) {
2410 		kmem_free(hi->hi_ksname, strlen(hi->hi_ksname) + 1);
2411 	}
2412 
2413 	/* Free the name used with the before/after hints. */
2414 	switch (hi->hi_hook.h_hint) {
2415 	case HH_BEFORE :
2416 	case HH_AFTER :
2417 		len = strlen((char *)hi->hi_hook.h_hintvalue);
2418 		if (len > 0)
2419 			kmem_free((void *)hi->hi_hook.h_hintvalue, len + 1);
2420 		break;
2421 	default :
2422 		break;
2423 	}
2424 
2425 	if (hi->hi_kstatp != NULL)
2426 		kstat_delete_netstack(hi->hi_kstatp, stackid);
2427 
2428 	/* Free container */
2429 	kmem_free(hi, sizeof (*hi));
2430 }
2431 
2432 /*
2433  * Function:	hook_alloc
2434  * Returns:	hook_t *   - pointer to new hook structure
2435  * Parameters:	version(I) - version number of the API when compiled
2436  *
2437  * This function serves as the interface for consumers to obtain a hook_t
2438  * structure.  At this point in time, there is only a single "version" of
2439  * it, leading to a straight forward function.  In a perfect world the
2440  * h_vesion would be a protected data structure member, but C isn't that
2441  * advanced...
2442  */
2443 hook_t *
2444 hook_alloc(const int h_version)
2445 {
2446 	hook_t *h;
2447 
2448 	h = kmem_zalloc(sizeof (hook_t), KM_SLEEP);
2449 	h->h_version = h_version;
2450 	return (h);
2451 }
2452 
2453 /*
2454  * Function:	hook_free
2455  * Returns:	None
2456  * Parameters:	h(I) - external hook pointer
2457  *
2458  * This function only free's memory allocated with hook_alloc(), so that if
2459  * (for example) kernel memory was allocated for h_name, this needs to be
2460  * free'd before calling hook_free().
2461  */
2462 void
2463 hook_free(hook_t *h)
2464 {
2465 	kmem_free(h, sizeof (*h));
2466 }
2467 
2468 /*
2469  * Function:	hook_notify_register
2470  * Returns:	int         - 0 = success, else failure
2471  * Parameters:	head(I)     - top of the list of callbacks
2472  *              callback(I) - function to be called
2473  *              arg(I)      - arg to pass back to the function
2474  *
2475  * This function implements the modification of the list of callbacks
2476  * that are registered when someone wants to be advised of a change
2477  * that has happened.
2478  */
2479 static int
2480 hook_notify_register(hook_notify_head_t *head, hook_notify_fn_t callback,
2481     void *arg)
2482 {
2483 	hook_notify_t *hn;
2484 
2485 	TAILQ_FOREACH(hn, head, hn_entry) {
2486 		if (hn->hn_func == callback) {
2487 			return (EEXIST);
2488 		}
2489 	}
2490 
2491 	hn = (hook_notify_t *)kmem_alloc(sizeof (*hn), KM_SLEEP);
2492 	hn->hn_func = callback;
2493 	hn->hn_arg = arg;
2494 	TAILQ_INSERT_TAIL(head, hn, hn_entry);
2495 
2496 	return (0);
2497 }
2498 
2499 /*
2500  * Function:	hook_notify_unregister
2501  * Returns:	int         - 0 = success, else failure
2502  * Parameters:	stackid(I)  - netstack identifier
2503  *              callback(I) - function to be called
2504  *              parg(O)     - pointer to storage for pointer
2505  *
2506  * When calling this function, the provision of a valid pointer in parg
2507  * allows the caller to be made aware of what argument the hook function
2508  * was expecting. This then allows the simulation of HN_UNREGISTER events
2509  * when a notify-unregister is performed.
2510  */
2511 static int
2512 hook_notify_unregister(hook_notify_head_t *head,
2513     hook_notify_fn_t callback, void **parg)
2514 {
2515 	hook_notify_t *hn;
2516 
2517 	ASSERT(parg != NULL);
2518 
2519 	TAILQ_FOREACH(hn, head, hn_entry) {
2520 		if (hn->hn_func == callback)
2521 			break;
2522 	}
2523 
2524 	if (hn == NULL)
2525 		return (ESRCH);
2526 
2527 	*parg = hn->hn_arg;
2528 
2529 	TAILQ_REMOVE(head, hn, hn_entry);
2530 
2531 	kmem_free(hn, sizeof (*hn));
2532 
2533 	return (0);
2534 }
2535 
2536 /*
2537  * Function:	hook_notify_run
2538  * Returns:	None
2539  * Parameters:	head(I)   - top of the list of callbacks
2540  *              family(I) - name of the hook family that owns the event
2541  *              event(I)  - name of the event being changed
2542  *              name(I)   - name of the object causing change
2543  *              cmd(I)    - either HN_UNREGISTER or HN_REGISTER
2544  *
2545  * This function walks through the list of registered callbacks and
2546  * executes each one, passing back the arg supplied when registered
2547  * and the name of the family (that owns the event), event (the thing
2548  * to which we're making a change) and finally a name that describes
2549  * what is being added or removed, as indicated by cmd.
2550  *
2551  * This function does not acquire or release any lock as it is required
2552  * that code calling it do so before hand.  The use of hook_notify_head_t
2553  * is protected by the use of flagwait_t in the structures that own this
2554  * list and with the use of the FWF_ADD/DEL_ACTIVE flags.
2555  */
2556 static void
2557 hook_notify_run(hook_notify_head_t *head, char *family, char *event,
2558     char *name, hook_notify_cmd_t cmd)
2559 {
2560 	hook_notify_t *hn;
2561 
2562 	TAILQ_FOREACH(hn, head, hn_entry) {
2563 		(*hn->hn_func)(cmd, hn->hn_arg, family, event, name);
2564 	}
2565 }
2566