1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2008 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 * 25 * Copyright 2018 Joyent, Inc. All rights reserved. 26 * Copyright (c) 2016 by Delphix. All rights reserved. 27 */ 28 #include <sys/param.h> 29 #include <sys/types.h> 30 #include <sys/systm.h> 31 #include <sys/errno.h> 32 #include <sys/kmem.h> 33 #include <sys/mutex.h> 34 #include <sys/condvar.h> 35 #include <sys/modctl.h> 36 #include <sys/hook_impl.h> 37 #include <sys/sdt.h> 38 #include <sys/cmn_err.h> 39 40 /* 41 * This file provides kernel hook framework. 42 */ 43 44 static struct modldrv modlmisc = { 45 &mod_miscops, /* drv_modops */ 46 "Hooks Interface v1.0", /* drv_linkinfo */ 47 }; 48 49 static struct modlinkage modlinkage = { 50 MODREV_1, /* ml_rev */ 51 &modlmisc, /* ml_linkage */ 52 NULL 53 }; 54 55 static const char *hook_hintvalue_none = "<none>"; 56 57 /* 58 * How it works. 59 * ============= 60 * Use of the hook framework here is tied up with zones - when a new zone 61 * is created, we create a new hook_stack_t and are open to business for 62 * allowing new hook families and their events. 63 * 64 * A consumer of these hooks is expected to operate in this fashion: 65 * 1) call hook_family_add() to create a new family of hooks. It is a 66 * current requirement that this call must be made with the value 67 * returned from hook_stack_init, by way of infrastructure elsewhere. 68 * 2) add events to the registered family with calls to hook_event_add. 69 * 70 * At this point, the structures in place should be open to others to 71 * add hooks to the event or add notifiers for when the contents of the 72 * hook stack changes. 73 * 74 * The interesting stuff happens on teardown. 75 * 76 * It is a requirement that the provider of hook events work in the reverse 77 * order to the above, so that the first step is: 78 * 1) remove events from each hook family created earlier 79 * 2) remove hook families from the hook stack. 80 * 81 * When doing teardown of both events and families, a check is made to see 82 * if either structure is still "busy". If so then a boolean flag (FWF_DESTROY) 83 * is set to say that the structure is condemned. The presence of this flag 84 * being set must be checked for in _add()/_register()/ functions and a 85 * failure returned if it is set. It is ignored by the _find() functions 86 * because they're used by _remove()/_unregister(). 87 * While setting the condemned flag when trying to delete a structure would 88 * normally be keyed from the presence of a reference count being greater 89 * than 1, in this implementation there are no reference counts required: 90 * instead the presence of objects on linked lists is taken to mean 91 * something is still "busy." 92 * 93 * ONLY the caller that adds the family and the events ever has a direct 94 * reference to the internal structures and thus ONLY it should be doing 95 * the removal of either the event or family. In practise, what this means 96 * is that in ip_netinfo.c, we have calls to net_protocol_register(), followed 97 * by net_event_register() (these interface to hook_family_add() and 98 * hook_event_add(), respectively) that are made when we create an instance 99 * of IP and when the IP instance is shutdown/destroyed, it calls 100 * net_event_unregister() and net_protocol_unregister(), which in turn call 101 * hook_event_remove() and hook_family_remove() respectively. Nobody else 102 * is entitled to call the _unregister() functions. It is imperative that 103 * there be only one _remove() call for every _add() call. 104 * 105 * It is possible that code which is interfacing with this hook framework 106 * won't do all the cleaning up that it needs to at the right time. While 107 * we can't prevent programmers from creating memory leaks, we can synchronise 108 * when we clean up data structures to prevent code accessing free'd memory. 109 * 110 * A simple diagram showing the ownership is as follows: 111 * 112 * Owned +--------------+ 113 * by | hook_stack_t | 114 * the +--------------+ 115 * Instance | 116 * - - - - - - - -|- - - - - - - - - - - - - - - - - - 117 * V 118 * Owned +-------------------+ +-------------------+ 119 * | hook_family_int_t |---->| hook_family_int_t | 120 * by +-------------------+ +-------------------+ 121 * | \+---------------+ \+---------------+ 122 * network | | hook_family_t | | hook_family_t | 123 * V +---------------+ +---------------+ 124 * protocol +------------------+ +------------------+ 125 * | hook_event_int_t |---->| hook_event_int_t | 126 * (ipv4,ipv6) +------------------+ +------------------+ 127 * | \+--------------+ \+--------------+ 128 * | | hook_event_t | | hook_event_t | 129 * | +--------------+ +--------------+ 130 * - - - - - - - -|- - - - - - - - - - - - - - - - - - 131 * V 132 * Owned +------------+ 133 * | hook_int_t | 134 * by +------------+ 135 * \+--------+ 136 * the consumer | hook_t | 137 * +--------+ 138 * 139 * The consumers, such as IPFilter, do not have any pointers or hold any 140 * references to hook_int_t, hook_event_t or hook_event_int_t. By placing 141 * a hook on an event through net_hook_register(), an implicit reference 142 * to the hook_event_int_t is returned with a successful call. Additionally, 143 * IPFilter does not see the hook_family_int_t or hook_family_t directly. 144 * Rather it is returned a net_handle_t (from net_protocol_lookup()) that 145 * contains a pointer to hook_family_int_t. The structure behind the 146 * net_handle_t (struct net_data) *is* reference counted and managed 147 * appropriately. 148 * 149 * A more detailed picture that describes how the family/event structures 150 * are linked together can be found in <sys/hook_impl.h> 151 * 152 * Notification callbacks. 153 * ======================= 154 * For each of the hook stack, hook family and hook event, it is possible 155 * to request notificatin of change to them. Why? 156 * First, lets equate the hook stack to an IP instance, a hook family to 157 * a network protocol and a hook event to IP packets on the input path. 158 * If a kernel module wants to apply security from the very start of 159 * things, it needs to know as soon as a new instance of networking 160 * is initiated. Whilst for the global zone, it is taken for granted that 161 * this instance will always exist before any interaction takes place, 162 * that is not true for zones running with an exclusive networking instance. 163 * Thus when a local zone is started and a new instance is created to support 164 * that, parties that wish to monitor it and apply a security policy from 165 * the onset need to be informed as early as possible - quite probably 166 * before any networking is started by the zone's boot scripts. 167 * Inside each instance, it is possible to have a number of network protocols 168 * (hook families) in operation. Inside the context of the global zone, 169 * it is possible to have code run before the kernel module providing the 170 * IP networking is loaded. From here, to apply the appropriate security, 171 * it is necessary to become informed of when IP is being configured into 172 * the zone and this is done by registering a notification callback with 173 * the hook stack for changes to it. The next step is to know when packets 174 * can be received through the physical_in, etc, events. This is achieved 175 * by registering a callback with the appropriate network protocol (or in 176 * this file, the correct hook family.) Thus when IP finally attaches a 177 * physical_in event to inet, the module looking to enforce a security 178 * policy can become aware of it being present. Of course there's no 179 * requirement for such a module to be present before all of the above 180 * happens and in such a case, it is reasonable for the same module to 181 * work after everything has been put in place. For this reason, when 182 * a notification callback is added, a series of fake callback events 183 * is generated to simulate the arrival of those entities. There is one 184 * final series of callbacks that can be registered - those to monitor 185 * actual hooks that are added or removed from an event. In practice, 186 * this is useful when there are multiple kernel modules participating 187 * in the processing of packets and there are behaviour dependencies 188 * involved, such that one kernel module might only register its hook 189 * if another is already present and also might want to remove its hook 190 * when the other disappears. 191 * 192 * If you know a kernel module will not be loaded before the infrastructure 193 * used in this file is present then it is not necessary to use this 194 * notification callback mechanism. 195 */ 196 197 /* 198 * Locking 199 * ======= 200 * The use of CVW_* macros to do locking is driven by the need to allow 201 * recursive locking with read locks when we're processing packets. This 202 * is necessary because various netinfo functions need to hold read locks, 203 * by design, as they can be called in or out of packet context. 204 */ 205 /* 206 * Hook internal functions 207 */ 208 static hook_int_t *hook_copy(hook_t *src); 209 static hook_event_int_t *hook_event_checkdup(hook_event_t *he, 210 hook_stack_t *hks); 211 static hook_event_int_t *hook_event_copy(hook_event_t *src); 212 static hook_event_int_t *hook_event_find(hook_family_int_t *hfi, char *event); 213 static void hook_event_free(hook_event_int_t *hei, hook_family_int_t *hfi); 214 static hook_family_int_t *hook_family_copy(hook_family_t *src); 215 static hook_family_int_t *hook_family_find(char *family, hook_stack_t *hks); 216 static void hook_family_free(hook_family_int_t *hfi, hook_stack_t *hks); 217 static hook_int_t *hook_find(hook_event_int_t *hei, hook_t *h); 218 static void hook_int_free(hook_int_t *hi, netstackid_t); 219 static void hook_init(void); 220 static void hook_fini(void); 221 static void *hook_stack_init(netstackid_t stackid, netstack_t *ns); 222 static void hook_stack_fini(netstackid_t stackid, void *arg); 223 static void hook_stack_shutdown(netstackid_t stackid, void *arg); 224 static int hook_insert(hook_int_head_t *head, hook_int_t *new); 225 static void hook_insert_plain(hook_int_head_t *head, hook_int_t *new); 226 static int hook_insert_afterbefore(hook_int_head_t *head, hook_int_t *new); 227 static hook_int_t *hook_find_byname(hook_int_head_t *head, char *name); 228 static void hook_event_init_kstats(hook_family_int_t *, hook_event_int_t *); 229 static void hook_event_notify_run(hook_event_int_t *, hook_family_int_t *, 230 char *event, char *name, hook_notify_cmd_t cmd); 231 static void hook_init_kstats(hook_family_int_t *hfi, hook_event_int_t *hei, 232 hook_int_t *hi); 233 static int hook_notify_register(hook_notify_head_t *head, 234 hook_notify_fn_t callback, void *arg); 235 static int hook_notify_unregister(hook_notify_head_t *head, 236 hook_notify_fn_t callback, void **); 237 static void hook_notify_run(hook_notify_head_t *head, char *family, 238 char *event, char *name, hook_notify_cmd_t cmd); 239 static void hook_stack_notify_run(hook_stack_t *hks, char *name, 240 hook_notify_cmd_t cmd); 241 static void hook_stack_remove(hook_stack_t *hks); 242 243 /* 244 * A list of the hook stacks is kept here because we need to enable 245 * net_instance_notify_register() to be called during the creation 246 * of a new instance. Previously hook_stack_get() would just use 247 * the netstack functions for this work but they will return NULL 248 * until the zone has been fully initialised. 249 */ 250 static hook_stack_head_t hook_stacks; 251 static kmutex_t hook_stack_lock; 252 253 /* 254 * Module entry points. 255 */ 256 int 257 _init(void) 258 { 259 int error; 260 261 hook_init(); 262 error = mod_install(&modlinkage); 263 if (error != 0) 264 hook_fini(); 265 266 return (error); 267 } 268 269 int 270 _fini(void) 271 { 272 int error; 273 274 error = mod_remove(&modlinkage); 275 if (error == 0) 276 hook_fini(); 277 278 return (error); 279 } 280 281 int 282 _info(struct modinfo *modinfop) 283 { 284 return (mod_info(&modlinkage, modinfop)); 285 } 286 287 /* 288 * Function: hook_init 289 * Returns: None 290 * Parameters: None 291 * 292 * Initialize hooks 293 */ 294 static void 295 hook_init(void) 296 { 297 mutex_init(&hook_stack_lock, NULL, MUTEX_DRIVER, NULL); 298 SLIST_INIT(&hook_stacks); 299 300 /* 301 * We want to be informed each time a stack is created or 302 * destroyed in the kernel. 303 */ 304 netstack_register(NS_HOOK, hook_stack_init, hook_stack_shutdown, 305 hook_stack_fini); 306 } 307 308 /* 309 * Function: hook_fini 310 * Returns: None 311 * Parameters: None 312 * 313 * Deinitialize hooks 314 */ 315 static void 316 hook_fini(void) 317 { 318 netstack_unregister(NS_HOOK); 319 320 mutex_destroy(&hook_stack_lock); 321 ASSERT(SLIST_EMPTY(&hook_stacks)); 322 } 323 324 /* 325 * Function: hook_wait_setflag 326 * Returns: -1 = setting flag is disallowed, 0 = flag set and did 327 * not have to wait (ie no lock droped), 1 = flag set but 328 * it was necessary to drop locks to set it. 329 * Parameters: waiter(I) - control data structure 330 * busyset(I) - set of flags that we don't want set while 331 * we are active. 332 * wanted(I) - flag associated with newflag to indicate 333 * what we want to do. 334 * newflag(I) - the new ACTIVE flag we want to set that 335 * indicates what we are doing. 336 * 337 * The set of functions hook_wait_* implement an API that builds on top of 338 * the kcondvar_t to provide controlled execution through a critical region. 339 * For each flag that indicates work is being done (FWF_*_ACTIVE) there is 340 * also a flag that we set to indicate that we want to do it (FWF_*_WANTED). 341 * The combination of flags is required as when this function exits to do 342 * the task, the structure is then free for another caller to use and 343 * to indicate that it wants to do work. The flags used when a caller wants 344 * to destroy an object take precedence over those that are used for making 345 * changes to it (add/remove.) In this case, we don't try to secure the 346 * ability to run and return with an error. 347 * 348 * "wantedset" is used here to determine who has the right to clear the 349 * wanted bit from the fw_flags set: only whomever sets the flag has the 350 * right to clear it at the bottom of the loop, even if someone else 351 * wants to set it. 352 * 353 * wanted - the FWF_*_WANTED flag that describes the action being requested 354 * busyset- the set of FWF_* flags we don't want set when we run 355 * newflag- the FWF_*_ACTIVE flag we will set to indicate we are busy 356 */ 357 int 358 hook_wait_setflag(flagwait_t *waiter, uint32_t busyset, fwflag_t wanted, 359 fwflag_t newflag) 360 { 361 boolean_t wantedset; 362 int waited = 0; 363 364 mutex_enter(&waiter->fw_lock); 365 if (waiter->fw_flags & FWF_DESTROY) { 366 cv_signal(&waiter->fw_cv); 367 mutex_exit(&waiter->fw_lock); 368 return (-1); 369 } 370 while (waiter->fw_flags & busyset) { 371 wantedset = ((waiter->fw_flags & wanted) == wanted); 372 if (!wantedset) 373 waiter->fw_flags |= wanted; 374 CVW_EXIT_WRITE(waiter->fw_owner); 375 cv_wait(&waiter->fw_cv, &waiter->fw_lock); 376 /* 377 * This lock needs to be dropped here to preserve the order 378 * of acquisition that is fw_owner followed by fw_lock, else 379 * we can deadlock. 380 */ 381 mutex_exit(&waiter->fw_lock); 382 waited = 1; 383 CVW_ENTER_WRITE(waiter->fw_owner); 384 mutex_enter(&waiter->fw_lock); 385 if (!wantedset) 386 waiter->fw_flags &= ~wanted; 387 if (waiter->fw_flags & FWF_DESTROY) { 388 cv_signal(&waiter->fw_cv); 389 mutex_exit(&waiter->fw_lock); 390 return (-1); 391 } 392 } 393 waiter->fw_flags &= ~wanted; 394 ASSERT((waiter->fw_flags & wanted) == 0); 395 ASSERT((waiter->fw_flags & newflag) == 0); 396 waiter->fw_flags |= newflag; 397 mutex_exit(&waiter->fw_lock); 398 return (waited); 399 } 400 401 /* 402 * Function: hook_wait_unsetflag 403 * Returns: None 404 * Parameters: waiter(I) - control data structure 405 * oldflag(I) - flag to reset 406 * 407 * Turn off the bit that we had set to run and let others know that 408 * they should now check to see if they can run. 409 */ 410 void 411 hook_wait_unsetflag(flagwait_t *waiter, fwflag_t oldflag) 412 { 413 mutex_enter(&waiter->fw_lock); 414 waiter->fw_flags &= ~oldflag; 415 cv_signal(&waiter->fw_cv); 416 mutex_exit(&waiter->fw_lock); 417 } 418 419 /* 420 * Function: hook_wait_destroy 421 * Returns: None 422 * Parameters: waiter(I) - control data structure 423 * 424 * Since outer locking (on fw_owner) should ensure that only one function 425 * at a time gets to call hook_wait_destroy() on a given object, there is 426 * no need to guard against setting FWF_DESTROY_WANTED already being set. 427 * It is, however, necessary to wait for all activity on the owning 428 * structure to cease. 429 */ 430 int 431 hook_wait_destroy(flagwait_t *waiter) 432 { 433 ASSERT((waiter->fw_flags & FWF_DESTROY_WANTED) == 0); 434 mutex_enter(&waiter->fw_lock); 435 if (waiter->fw_flags & FWF_DESTROY_WANTED) { 436 cv_signal(&waiter->fw_cv); 437 mutex_exit(&waiter->fw_lock); 438 return (EINPROGRESS); 439 } 440 waiter->fw_flags |= FWF_DESTROY_WANTED; 441 while (!FWF_DESTROY_OK(waiter)) { 442 CVW_EXIT_WRITE(waiter->fw_owner); 443 cv_wait(&waiter->fw_cv, &waiter->fw_lock); 444 CVW_ENTER_WRITE(waiter->fw_owner); 445 } 446 /* 447 * There should now be nothing else using "waiter" or its 448 * owner, so we can safely assign here without risk of wiiping 449 * out someone's bit. 450 */ 451 waiter->fw_flags = FWF_DESTROY_ACTIVE; 452 cv_signal(&waiter->fw_cv); 453 mutex_exit(&waiter->fw_lock); 454 455 return (0); 456 } 457 458 /* 459 * Function: hook_wait_init 460 * Returns: None 461 * Parameters: waiter(I) - control data structure 462 * ownder(I) - pointer to lock that the owner of this 463 * waiter uses 464 * 465 * "owner" gets passed in here so that when we need to call cv_wait, 466 * for example in hook_wait_setflag(), we can drop the lock for the 467 * next layer out, which is likely to be held in an exclusive manner. 468 */ 469 void 470 hook_wait_init(flagwait_t *waiter, cvwaitlock_t *owner) 471 { 472 cv_init(&waiter->fw_cv, NULL, CV_DRIVER, NULL); 473 mutex_init(&waiter->fw_lock, NULL, MUTEX_DRIVER, NULL); 474 waiter->fw_flags = FWF_NONE; 475 waiter->fw_owner = owner; 476 } 477 478 /* 479 * Function: hook_stack_init 480 * Returns: void * - pointer to new hook stack structure 481 * Parameters: stackid(I) - identifier for the network instance that owns this 482 * ns(I) - pointer to the network instance data structure 483 * 484 * Allocate and initialize the hook stack instance. This function is not 485 * allowed to fail, so KM_SLEEP is used here when allocating memory. The 486 * value returned is passed back into the shutdown and destroy hooks. 487 */ 488 /*ARGSUSED*/ 489 static void * 490 hook_stack_init(netstackid_t stackid, netstack_t *ns) 491 { 492 hook_stack_t *hks; 493 494 #ifdef NS_DEBUG 495 printf("hook_stack_init(stack %d)\n", stackid); 496 #endif 497 498 hks = (hook_stack_t *)kmem_zalloc(sizeof (*hks), KM_SLEEP); 499 hks->hks_netstack = ns; 500 hks->hks_netstackid = stackid; 501 502 CVW_INIT(&hks->hks_lock); 503 TAILQ_INIT(&hks->hks_nhead); 504 SLIST_INIT(&hks->hks_familylist); 505 506 hook_wait_init(&hks->hks_waiter, &hks->hks_lock); 507 508 mutex_enter(&hook_stack_lock); 509 SLIST_INSERT_HEAD(&hook_stacks, hks, hks_entry); 510 mutex_exit(&hook_stack_lock); 511 512 return (hks); 513 } 514 515 /* 516 * Function: hook_stack_shutdown 517 * Returns: void 518 * Parameters: stackid(I) - identifier for the network instance that owns this 519 * arg(I) - pointer returned by hook_stack_init 520 * 521 * Set the shutdown flag to indicate that we should stop accepting new 522 * register calls as we're now in the cleanup process. The cleanup is a 523 * two stage process and we're not required to free any memory here. 524 * 525 * The curious would wonder why isn't there any code that walks through 526 * all of the data structures and sets the flag(s) there? The answer is 527 * that it is expected that this will happen when the zone shutdown calls 528 * the shutdown callbacks for other modules that they will initiate the 529 * free'ing and shutdown of the hooks themselves. 530 */ 531 /*ARGSUSED*/ 532 static void 533 hook_stack_shutdown(netstackid_t stackid, void *arg) 534 { 535 hook_stack_t *hks = (hook_stack_t *)arg; 536 537 mutex_enter(&hook_stack_lock); 538 /* 539 * Once this flag gets set to one, no more additions are allowed 540 * to any of the structures that make up this stack. 541 */ 542 hks->hks_shutdown = 1; 543 mutex_exit(&hook_stack_lock); 544 } 545 546 /* 547 * Function: hook_stack_destroy 548 * Returns: void 549 * Parameters: stackid(I) - identifier for the network instance that owns this 550 * arg(I) - pointer returned by hook_stack_init 551 * 552 * Free the hook stack instance. 553 * 554 * The rationale for the shutdown being lazy (see the comment above for 555 * hook_stack_shutdown) also applies to the destroy being lazy. Only if 556 * the hook_stack_t data structure is unused will it go away. Else it 557 * is left up to the last user of a data structure to actually free it. 558 */ 559 /*ARGSUSED*/ 560 static void 561 hook_stack_fini(netstackid_t stackid, void *arg) 562 { 563 hook_stack_t *hks = (hook_stack_t *)arg; 564 565 mutex_enter(&hook_stack_lock); 566 hks->hks_shutdown = 2; 567 hook_stack_remove(hks); 568 mutex_exit(&hook_stack_lock); 569 } 570 571 /* 572 * Function: hook_stack_remove 573 * Returns: void 574 * Parameters: hks(I) - pointer to an instance of a hook_stack_t 575 * 576 * This function assumes that it is called with hook_stack_lock held. 577 * It functions differently to hook_family/event_remove in that it does 578 * the checks to see if it can be removed. This difference exists 579 * because this structure has nothing higher up that depends on it. 580 */ 581 static void 582 hook_stack_remove(hook_stack_t *hks) 583 { 584 585 ASSERT(mutex_owned(&hook_stack_lock)); 586 587 /* 588 * Is the structure still in use? 589 */ 590 if (!SLIST_EMPTY(&hks->hks_familylist) || 591 !TAILQ_EMPTY(&hks->hks_nhead)) 592 return; 593 594 SLIST_REMOVE(&hook_stacks, hks, hook_stack, hks_entry); 595 596 VERIFY(hook_wait_destroy(&hks->hks_waiter) == 0); 597 CVW_DESTROY(&hks->hks_lock); 598 kmem_free(hks, sizeof (*hks)); 599 } 600 601 /* 602 * Function: hook_stack_get 603 * Returns: hook_stack_t * - NULL if not found, else matching instance 604 * Parameters: stackid(I) - instance id to search for 605 * 606 * Search the list of currently active hook_stack_t structures for one that 607 * has a matching netstackid_t to the value passed in. The linked list can 608 * only ever have at most one match for this value. 609 */ 610 static hook_stack_t * 611 hook_stack_get(netstackid_t stackid) 612 { 613 hook_stack_t *hks; 614 615 SLIST_FOREACH(hks, &hook_stacks, hks_entry) { 616 if (hks->hks_netstackid == stackid) 617 break; 618 } 619 620 return (hks); 621 } 622 623 /* 624 * Function: hook_stack_notify_register 625 * Returns: int - 0 = success, else failure 626 * Parameters: stackid(I) - netstack identifier 627 * callback(I)- function to be called 628 * arg(I) - arg to provide callback when it is called 629 * 630 * If we're not shutting down this instance, append a new function to the 631 * list of those to call when a new family of hooks is added to this stack. 632 * If the function can be successfully added to the list of callbacks 633 * activated when there is a change to the stack (addition or removal of 634 * a hook family) then generate a fake HN_REGISTER event by directly 635 * calling the callback with the relevant information for each hook 636 * family that currently exists (and isn't being shutdown.) 637 */ 638 int 639 hook_stack_notify_register(netstackid_t stackid, hook_notify_fn_t callback, 640 void *arg) 641 { 642 hook_family_int_t *hfi; 643 hook_stack_t *hks; 644 boolean_t canrun; 645 char buffer[16]; 646 int error; 647 648 ASSERT(callback != NULL); 649 650 canrun = B_FALSE; 651 mutex_enter(&hook_stack_lock); 652 hks = hook_stack_get(stackid); 653 if (hks != NULL) { 654 if (hks->hks_shutdown != 0) { 655 error = ESHUTDOWN; 656 } else { 657 CVW_ENTER_WRITE(&hks->hks_lock); 658 canrun = (hook_wait_setflag(&hks->hks_waiter, 659 FWF_ADD_WAIT_MASK, FWF_ADD_WANTED, 660 FWF_ADD_ACTIVE) != -1); 661 error = hook_notify_register(&hks->hks_nhead, 662 callback, arg); 663 CVW_EXIT_WRITE(&hks->hks_lock); 664 } 665 } else { 666 error = ESRCH; 667 } 668 mutex_exit(&hook_stack_lock); 669 670 if (error == 0 && canrun) { 671 /* 672 * Generate fake register event for callback that 673 * is being added, letting it know everything that 674 * already exists. 675 */ 676 (void) snprintf(buffer, sizeof (buffer), "%u", 677 hks->hks_netstackid); 678 679 SLIST_FOREACH(hfi, &hks->hks_familylist, hfi_entry) { 680 if (hfi->hfi_condemned || hfi->hfi_shutdown) 681 continue; 682 callback(HN_REGISTER, arg, buffer, NULL, 683 hfi->hfi_family.hf_name); 684 } 685 } 686 687 if (canrun) 688 hook_wait_unsetflag(&hks->hks_waiter, FWF_ADD_ACTIVE); 689 690 return (error); 691 } 692 693 /* 694 * Function: hook_stack_notify_unregister 695 * Returns: int - 0 = success, else failure 696 * Parameters: stackid(I) - netstack identifier 697 * callback(I) - function to be called 698 * 699 * Attempt to remove a registered function from a hook stack's list of 700 * callbacks to activiate when protocols are added/deleted. 701 * As with hook_stack_notify_register, if all things are going well then 702 * a fake unregister event is delivered to the callback being removed 703 * for each hook family that presently exists. 704 */ 705 int 706 hook_stack_notify_unregister(netstackid_t stackid, hook_notify_fn_t callback) 707 { 708 hook_family_int_t *hfi; 709 hook_stack_t *hks; 710 char buffer[16]; 711 void *arg; 712 int error; 713 714 mutex_enter(&hook_stack_lock); 715 hks = hook_stack_get(stackid); 716 if (hks == NULL) { 717 mutex_exit(&hook_stack_lock); 718 return (ESRCH); 719 } 720 721 CVW_ENTER_WRITE(&hks->hks_lock); 722 /* 723 * If hook_wait_setflag returns -1, another thread has flagged that it 724 * is attempting to destroy this hook stack. Before it can flag that 725 * it's destroying the hook stack, it must first verify (with 726 * hook_stack_lock held) that the hook stack is empty. If we 727 * encounter this, it means we should have nothing to do and we 728 * just snuck in. 729 */ 730 if (hook_wait_setflag(&hks->hks_waiter, FWF_DEL_WAIT_MASK, 731 FWF_DEL_WANTED, FWF_DEL_ACTIVE) == -1) { 732 VERIFY(TAILQ_EMPTY(&hks->hks_nhead)); 733 CVW_EXIT_WRITE(&hks->hks_lock); 734 mutex_exit(&hook_stack_lock); 735 return (ESRCH); 736 } 737 738 error = hook_notify_unregister(&hks->hks_nhead, callback, &arg); 739 CVW_EXIT_WRITE(&hks->hks_lock); 740 mutex_exit(&hook_stack_lock); 741 742 if (error == 0) { 743 /* 744 * Generate fake unregister event for callback that 745 * is being removed, letting it know everything that 746 * currently exists is now "disappearing." 747 */ 748 (void) snprintf(buffer, sizeof (buffer), "%u", 749 hks->hks_netstackid); 750 751 SLIST_FOREACH(hfi, &hks->hks_familylist, hfi_entry) { 752 callback(HN_UNREGISTER, arg, buffer, NULL, 753 hfi->hfi_family.hf_name); 754 } 755 } else { 756 /* 757 * hook_notify_unregister() should only fail if the callback has 758 * already been deleted (ESRCH). 759 */ 760 VERIFY3S(error, ==, ESRCH); 761 } 762 763 mutex_enter(&hook_stack_lock); 764 hook_wait_unsetflag(&hks->hks_waiter, FWF_DEL_ACTIVE); 765 if (hks->hks_shutdown == 2) 766 hook_stack_remove(hks); 767 mutex_exit(&hook_stack_lock); 768 769 return (error); 770 } 771 772 /* 773 * Function: hook_stack_notify_run 774 * Returns: None 775 * Parameters: hks(I) - hook stack pointer to execute callbacks for 776 * name(I) - name of a hook family 777 * cmd(I) - either HN_UNREGISTER or HN_REGISTER 778 * 779 * Run through the list of callbacks on the hook stack to be called when 780 * a new hook family is added 781 * 782 * As hook_notify_run() expects 3 names, one for the family that is associated 783 * with the cmd (HN_REGISTER or HN_UNREGISTER), one for the event and one 784 * for the object being introduced and we really only have one name (that 785 * of the new hook family), fake the hook stack's name by converting the 786 * integer to a string and for the event just pass NULL. 787 */ 788 static void 789 hook_stack_notify_run(hook_stack_t *hks, char *name, 790 hook_notify_cmd_t cmd) 791 { 792 char buffer[16]; 793 794 ASSERT(hks != NULL); 795 ASSERT(name != NULL); 796 797 (void) snprintf(buffer, sizeof (buffer), "%u", hks->hks_netstackid); 798 799 hook_notify_run(&hks->hks_nhead, buffer, NULL, name, cmd); 800 } 801 802 /* 803 * Function: hook_run 804 * Returns: int - return value according to callback func 805 * Parameters: token(I) - event pointer 806 * info(I) - message 807 * 808 * Run hooks for specific provider. The hooks registered are stepped through 809 * until either the end of the list is reached or a hook function returns a 810 * non-zero value. If a non-zero value is returned from a hook function, we 811 * return that value back to our caller. By design, a hook function can be 812 * called more than once, simultaneously. 813 */ 814 int 815 hook_run(hook_family_int_t *hfi, hook_event_token_t token, hook_data_t info) 816 { 817 hook_event_int_t *hei; 818 hook_int_t *hi; 819 int rval = 0; 820 821 ASSERT(token != NULL); 822 823 hei = (hook_event_int_t *)token; 824 DTRACE_PROBE2(hook__run__start, 825 hook_event_token_t, token, 826 hook_data_t, info); 827 828 /* 829 * If we consider that this function is only called from within the 830 * stack while an instance is currently active, 831 */ 832 CVW_ENTER_READ(&hfi->hfi_lock); 833 834 TAILQ_FOREACH(hi, &hei->hei_head, hi_entry) { 835 ASSERT(hi->hi_hook.h_func != NULL); 836 DTRACE_PROBE3(hook__func__start, 837 hook_event_token_t, token, 838 hook_data_t, info, 839 hook_int_t *, hi); 840 rval = (*hi->hi_hook.h_func)(token, info, hi->hi_hook.h_arg); 841 DTRACE_PROBE4(hook__func__end, 842 hook_event_token_t, token, 843 hook_data_t, info, 844 hook_int_t *, hi, 845 int, rval); 846 hi->hi_kstats.hook_hits.value.ui64++; 847 if (rval != 0) 848 break; 849 } 850 851 hei->hei_kstats.events.value.ui64++; 852 853 CVW_EXIT_READ(&hfi->hfi_lock); 854 855 DTRACE_PROBE3(hook__run__end, 856 hook_event_token_t, token, 857 hook_data_t, info, 858 hook_int_t *, hi); 859 860 return (rval); 861 } 862 863 /* 864 * Function: hook_family_add 865 * Returns: internal family pointer - NULL = Fail 866 * Parameters: hf(I) - family pointer 867 * hks(I) - pointer to an instance of a hook_stack_t 868 * store(O) - where returned pointer will be stored 869 * 870 * Add new family to the family list. The requirements for the addition to 871 * succeed are that the family name must not already be registered and that 872 * the hook stack is not being shutdown. 873 * If store is non-NULL, it is expected to be a pointer to the same variable 874 * that is awaiting to be assigned the return value of this function. 875 * In its current use, the returned value is assigned to netd_hooks in 876 * net_family_register. The use of "store" allows the return value to be 877 * used before this function returns. How can this happen? Through the 878 * callbacks that can be activated at the bottom of this function, when 879 * hook_stack_notify_run is called. 880 */ 881 hook_family_int_t * 882 hook_family_add(hook_family_t *hf, hook_stack_t *hks, void **store) 883 { 884 hook_family_int_t *hfi, *new; 885 886 ASSERT(hf != NULL); 887 ASSERT(hf->hf_name != NULL); 888 889 new = hook_family_copy(hf); 890 if (new == NULL) 891 return (NULL); 892 893 mutex_enter(&hook_stack_lock); 894 CVW_ENTER_WRITE(&hks->hks_lock); 895 896 if (hks->hks_shutdown != 0) { 897 CVW_EXIT_WRITE(&hks->hks_lock); 898 mutex_exit(&hook_stack_lock); 899 hook_family_free(new, NULL); 900 return (NULL); 901 } 902 903 /* search family list */ 904 hfi = hook_family_find(hf->hf_name, hks); 905 if (hfi != NULL) { 906 CVW_EXIT_WRITE(&hks->hks_lock); 907 mutex_exit(&hook_stack_lock); 908 hook_family_free(new, NULL); 909 return (NULL); 910 } 911 912 /* 913 * Try and set the FWF_ADD_ACTIVE flag so that we can drop all the 914 * lock further down when calling all of the functions registered 915 * for notification when a new hook family is added. 916 */ 917 if (hook_wait_setflag(&hks->hks_waiter, FWF_ADD_WAIT_MASK, 918 FWF_ADD_WANTED, FWF_ADD_ACTIVE) == -1) { 919 CVW_EXIT_WRITE(&hks->hks_lock); 920 mutex_exit(&hook_stack_lock); 921 hook_family_free(new, NULL); 922 return (NULL); 923 } 924 925 CVW_INIT(&new->hfi_lock); 926 SLIST_INIT(&new->hfi_head); 927 TAILQ_INIT(&new->hfi_nhead); 928 929 hook_wait_init(&new->hfi_waiter, &new->hfi_lock); 930 931 new->hfi_stack = hks; 932 if (store != NULL) 933 *store = new; 934 935 /* Add to family list head */ 936 SLIST_INSERT_HEAD(&hks->hks_familylist, new, hfi_entry); 937 938 CVW_EXIT_WRITE(&hks->hks_lock); 939 mutex_exit(&hook_stack_lock); 940 941 hook_stack_notify_run(hks, hf->hf_name, HN_REGISTER); 942 943 hook_wait_unsetflag(&hks->hks_waiter, FWF_ADD_ACTIVE); 944 945 return (new); 946 } 947 948 /* 949 * Function: hook_family_remove 950 * Returns: int - 0 = success, else = failure 951 * Parameters: hfi(I) - internal family pointer 952 * 953 * Remove family from family list. This function has been designed to be 954 * called once and once only per hook_family_int_t. Thus when cleaning up 955 * this structure as an orphan, callers should only call hook_family_free. 956 */ 957 int 958 hook_family_remove(hook_family_int_t *hfi) 959 { 960 hook_stack_t *hks; 961 boolean_t notifydone; 962 963 ASSERT(hfi != NULL); 964 hks = hfi->hfi_stack; 965 966 CVW_ENTER_WRITE(&hfi->hfi_lock); 967 notifydone = hfi->hfi_shutdown; 968 hfi->hfi_shutdown = B_TRUE; 969 CVW_EXIT_WRITE(&hfi->hfi_lock); 970 971 CVW_ENTER_WRITE(&hks->hks_lock); 972 973 if (hook_wait_setflag(&hks->hks_waiter, FWF_DEL_WAIT_MASK, 974 FWF_DEL_WANTED, FWF_DEL_ACTIVE) == -1) { 975 /* 976 * If we're trying to destroy the hook_stack_t... 977 */ 978 CVW_EXIT_WRITE(&hks->hks_lock); 979 return (ENXIO); 980 } 981 982 /* 983 * Check if the family is in use by the presence of either events 984 * or notify callbacks on the hook family. 985 */ 986 if (!SLIST_EMPTY(&hfi->hfi_head) || !TAILQ_EMPTY(&hfi->hfi_nhead)) { 987 hfi->hfi_condemned = B_TRUE; 988 } else { 989 VERIFY(hook_wait_destroy(&hfi->hfi_waiter) == 0); 990 /* 991 * Although hfi_condemned = B_FALSE is implied from creation, 992 * putting a comment here inside the else upsets lint. 993 */ 994 hfi->hfi_condemned = B_FALSE; 995 } 996 CVW_EXIT_WRITE(&hks->hks_lock); 997 998 if (!notifydone) 999 hook_stack_notify_run(hks, hfi->hfi_family.hf_name, 1000 HN_UNREGISTER); 1001 1002 hook_wait_unsetflag(&hks->hks_waiter, FWF_DEL_ACTIVE); 1003 1004 /* 1005 * If we don't have to wait for anything else to disappear from this 1006 * structure then we can free it up. 1007 */ 1008 if (!hfi->hfi_condemned) 1009 hook_family_free(hfi, hks); 1010 1011 return (0); 1012 } 1013 1014 1015 /* 1016 * Function: hook_family_free 1017 * Returns: None 1018 * Parameters: hfi(I) - internal family pointer 1019 * 1020 * Free alloc memory for family 1021 */ 1022 static void 1023 hook_family_free(hook_family_int_t *hfi, hook_stack_t *hks) 1024 { 1025 1026 /* 1027 * This lock gives us possession of the hks pointer after the 1028 * SLIST_REMOVE, for which it is not needed, when hks_shutdown 1029 * is checked and hook_stack_remove called. 1030 */ 1031 mutex_enter(&hook_stack_lock); 1032 1033 ASSERT(hfi != NULL); 1034 1035 if (hks != NULL) { 1036 CVW_ENTER_WRITE(&hks->hks_lock); 1037 /* Remove from family list */ 1038 SLIST_REMOVE(&hks->hks_familylist, hfi, hook_family_int, 1039 hfi_entry); 1040 1041 CVW_EXIT_WRITE(&hks->hks_lock); 1042 } 1043 1044 /* Free name space */ 1045 if (hfi->hfi_family.hf_name != NULL) { 1046 kmem_free(hfi->hfi_family.hf_name, 1047 strlen(hfi->hfi_family.hf_name) + 1); 1048 } 1049 1050 /* Free container */ 1051 kmem_free(hfi, sizeof (*hfi)); 1052 1053 if (hks->hks_shutdown == 2) 1054 hook_stack_remove(hks); 1055 1056 mutex_exit(&hook_stack_lock); 1057 } 1058 1059 /* 1060 * Function: hook_family_shutdown 1061 * Returns: int - 0 = success, else = failure 1062 * Parameters: hfi(I) - internal family pointer 1063 * 1064 * As an alternative to removing a family, we may desire to just generate 1065 * a series of callbacks to indicate that we will be going away in the 1066 * future. The hfi_condemned flag isn't set because we aren't trying to 1067 * remove the structure. 1068 */ 1069 int 1070 hook_family_shutdown(hook_family_int_t *hfi) 1071 { 1072 hook_stack_t *hks; 1073 boolean_t notifydone; 1074 1075 ASSERT(hfi != NULL); 1076 hks = hfi->hfi_stack; 1077 1078 CVW_ENTER_WRITE(&hfi->hfi_lock); 1079 notifydone = hfi->hfi_shutdown; 1080 hfi->hfi_shutdown = B_TRUE; 1081 CVW_EXIT_WRITE(&hfi->hfi_lock); 1082 1083 CVW_ENTER_WRITE(&hks->hks_lock); 1084 1085 if (hook_wait_setflag(&hks->hks_waiter, FWF_DEL_WAIT_MASK, 1086 FWF_DEL_WANTED, FWF_DEL_ACTIVE) == -1) { 1087 /* 1088 * If we're trying to destroy the hook_stack_t... 1089 */ 1090 CVW_EXIT_WRITE(&hks->hks_lock); 1091 return (ENXIO); 1092 } 1093 1094 CVW_EXIT_WRITE(&hks->hks_lock); 1095 1096 if (!notifydone) 1097 hook_stack_notify_run(hks, hfi->hfi_family.hf_name, 1098 HN_UNREGISTER); 1099 1100 hook_wait_unsetflag(&hks->hks_waiter, FWF_DEL_ACTIVE); 1101 1102 return (0); 1103 } 1104 1105 /* 1106 * Function: hook_family_copy 1107 * Returns: internal family pointer - NULL = Failed 1108 * Parameters: src(I) - family pointer 1109 * 1110 * Allocate internal family block and duplicate incoming family 1111 * No locks should be held across this function as it may sleep. 1112 */ 1113 static hook_family_int_t * 1114 hook_family_copy(hook_family_t *src) 1115 { 1116 hook_family_int_t *new; 1117 hook_family_t *dst; 1118 1119 ASSERT(src != NULL); 1120 ASSERT(src->hf_name != NULL); 1121 1122 new = (hook_family_int_t *)kmem_zalloc(sizeof (*new), KM_SLEEP); 1123 1124 /* Copy body */ 1125 dst = &new->hfi_family; 1126 *dst = *src; 1127 1128 SLIST_INIT(&new->hfi_head); 1129 TAILQ_INIT(&new->hfi_nhead); 1130 1131 /* Copy name */ 1132 dst->hf_name = (char *)kmem_alloc(strlen(src->hf_name) + 1, KM_SLEEP); 1133 (void) strcpy(dst->hf_name, src->hf_name); 1134 1135 return (new); 1136 } 1137 1138 /* 1139 * Function: hook_family_find 1140 * Returns: internal family pointer - NULL = Not match 1141 * Parameters: family(I) - family name string 1142 * 1143 * Search family list with family name 1144 * A lock on hfi_lock must be held when called. 1145 */ 1146 static hook_family_int_t * 1147 hook_family_find(char *family, hook_stack_t *hks) 1148 { 1149 hook_family_int_t *hfi = NULL; 1150 1151 ASSERT(family != NULL); 1152 1153 SLIST_FOREACH(hfi, &hks->hks_familylist, hfi_entry) { 1154 if (strcmp(hfi->hfi_family.hf_name, family) == 0) 1155 break; 1156 } 1157 return (hfi); 1158 } 1159 1160 /* 1161 * Function: hook_family_notify_register 1162 * Returns: int - 0 = success, else failure 1163 * Parameters: hfi(I) - hook family 1164 * callback(I) - function to be called 1165 * arg(I) - arg to provide callback when it is called 1166 * 1167 * So long as this hook stack isn't being shut down, register a new 1168 * callback to be activated each time a new event is added to this 1169 * family. 1170 * 1171 * To call this function we must have an active handle in use on the family, 1172 * so if we take this into account, then neither the hook_family_int_t nor 1173 * the hook_stack_t that owns it can disappear. We have to put some trust 1174 * in the callers to be properly synchronised... 1175 * 1176 * Holding hks_lock is required to provide synchronisation for hks_shutdown. 1177 */ 1178 int 1179 hook_family_notify_register(hook_family_int_t *hfi, 1180 hook_notify_fn_t callback, void *arg) 1181 { 1182 hook_event_int_t *hei; 1183 hook_stack_t *hks; 1184 boolean_t canrun; 1185 int error; 1186 1187 ASSERT(hfi != NULL); 1188 canrun = B_FALSE; 1189 hks = hfi->hfi_stack; 1190 1191 CVW_ENTER_READ(&hks->hks_lock); 1192 1193 if ((hfi->hfi_stack->hks_shutdown != 0) || 1194 hfi->hfi_condemned || hfi->hfi_shutdown) { 1195 CVW_EXIT_READ(&hks->hks_lock); 1196 return (ESHUTDOWN); 1197 } 1198 1199 CVW_ENTER_WRITE(&hfi->hfi_lock); 1200 canrun = (hook_wait_setflag(&hfi->hfi_waiter, FWF_ADD_WAIT_MASK, 1201 FWF_ADD_WANTED, FWF_ADD_ACTIVE) != -1); 1202 error = hook_notify_register(&hfi->hfi_nhead, callback, arg); 1203 CVW_EXIT_WRITE(&hfi->hfi_lock); 1204 1205 CVW_EXIT_READ(&hks->hks_lock); 1206 1207 if (error == 0 && canrun) { 1208 SLIST_FOREACH(hei, &hfi->hfi_head, hei_entry) { 1209 callback(HN_REGISTER, arg, 1210 hfi->hfi_family.hf_name, NULL, 1211 hei->hei_event->he_name); 1212 } 1213 } 1214 1215 if (canrun) 1216 hook_wait_unsetflag(&hfi->hfi_waiter, FWF_ADD_ACTIVE); 1217 1218 return (error); 1219 } 1220 1221 /* 1222 * Function: hook_family_notify_unregister 1223 * Returns: int - 0 = success, else failure 1224 * Parameters: hfi(I) - hook family 1225 * callback(I) - function to be called 1226 * 1227 * Remove a callback from the list of those executed when a new event is 1228 * added to a hook family. If the family is not in the process of being 1229 * destroyed then simulate an unregister callback for each event that is 1230 * on the family. This pairs up with the hook_family_notify_register 1231 * action that simulates register events. 1232 * The order of what happens here is important and goes like this. 1233 * 1) Remove the callback from the list of functions to be called as part 1234 * of the notify operation when an event is added or removed from the 1235 * hook family. 1236 * 2) If the hook_family_int_t structure is on death row (free_family will 1237 * be set to true) then there's nothing else to do than let it be free'd. 1238 * 3) If the structure isn't about to die, mark it up as being busy using 1239 * hook_wait_setflag and then drop the lock so the loop can be run. 1240 * 4) if hook_wait_setflag was successful, tell all of the notify callback 1241 * functions that this family has been unregistered. 1242 * 5) Cleanup 1243 */ 1244 int 1245 hook_family_notify_unregister(hook_family_int_t *hfi, 1246 hook_notify_fn_t callback) 1247 { 1248 hook_event_int_t *hei; 1249 boolean_t free_family; 1250 boolean_t canrun; 1251 int error; 1252 void *arg; 1253 1254 canrun = B_FALSE; 1255 1256 CVW_ENTER_WRITE(&hfi->hfi_lock); 1257 1258 (void) hook_wait_setflag(&hfi->hfi_waiter, FWF_DEL_WAIT_MASK, 1259 FWF_DEL_WANTED, FWF_DEL_ACTIVE); 1260 1261 error = hook_notify_unregister(&hfi->hfi_nhead, callback, &arg); 1262 1263 hook_wait_unsetflag(&hfi->hfi_waiter, FWF_DEL_ACTIVE); 1264 1265 /* 1266 * If hook_family_remove has been called but the structure was still 1267 * "busy" ... but we might have just made it "unbusy"... 1268 */ 1269 if ((error == 0) && hfi->hfi_condemned && 1270 SLIST_EMPTY(&hfi->hfi_head) && TAILQ_EMPTY(&hfi->hfi_nhead)) { 1271 free_family = B_TRUE; 1272 } else { 1273 free_family = B_FALSE; 1274 } 1275 1276 if (error == 0 && !free_family) { 1277 canrun = (hook_wait_setflag(&hfi->hfi_waiter, FWF_ADD_WAIT_MASK, 1278 FWF_ADD_WANTED, FWF_ADD_ACTIVE) != -1); 1279 } 1280 1281 CVW_EXIT_WRITE(&hfi->hfi_lock); 1282 1283 if (canrun) { 1284 SLIST_FOREACH(hei, &hfi->hfi_head, hei_entry) { 1285 callback(HN_UNREGISTER, arg, 1286 hfi->hfi_family.hf_name, NULL, 1287 hei->hei_event->he_name); 1288 } 1289 1290 hook_wait_unsetflag(&hfi->hfi_waiter, FWF_ADD_ACTIVE); 1291 } else if (free_family) { 1292 hook_family_free(hfi, hfi->hfi_stack); 1293 } 1294 1295 return (error); 1296 } 1297 1298 /* 1299 * Function: hook_event_add 1300 * Returns: internal event pointer - NULL = Fail 1301 * Parameters: hfi(I) - internal family pointer 1302 * he(I) - event pointer 1303 * 1304 * Add new event to event list on specific family. 1305 * This function can fail to return successfully if (1) it cannot allocate 1306 * enough memory for its own internal data structures, (2) the event has 1307 * already been registered (for any hook family.) 1308 */ 1309 hook_event_int_t * 1310 hook_event_add(hook_family_int_t *hfi, hook_event_t *he) 1311 { 1312 hook_event_int_t *hei, *new; 1313 hook_stack_t *hks; 1314 1315 ASSERT(hfi != NULL); 1316 ASSERT(he != NULL); 1317 ASSERT(he->he_name != NULL); 1318 1319 new = hook_event_copy(he); 1320 if (new == NULL) 1321 return (NULL); 1322 1323 hks = hfi->hfi_stack; 1324 CVW_ENTER_READ(&hks->hks_lock); 1325 1326 hks = hfi->hfi_stack; 1327 if (hks->hks_shutdown != 0) { 1328 CVW_EXIT_READ(&hks->hks_lock); 1329 hook_event_free(new, NULL); 1330 return (NULL); 1331 } 1332 1333 /* Check whether this event pointer is already registered */ 1334 hei = hook_event_checkdup(he, hks); 1335 if (hei != NULL) { 1336 CVW_EXIT_READ(&hks->hks_lock); 1337 hook_event_free(new, NULL); 1338 return (NULL); 1339 } 1340 1341 CVW_ENTER_WRITE(&hfi->hfi_lock); 1342 1343 if (hfi->hfi_condemned || hfi->hfi_shutdown) { 1344 CVW_EXIT_WRITE(&hfi->hfi_lock); 1345 CVW_EXIT_READ(&hks->hks_lock); 1346 hook_event_free(new, NULL); 1347 return (NULL); 1348 } 1349 CVW_EXIT_READ(&hks->hks_lock); 1350 1351 if (hook_wait_setflag(&hfi->hfi_waiter, FWF_ADD_WAIT_MASK, 1352 FWF_ADD_WANTED, FWF_ADD_ACTIVE) == -1) { 1353 CVW_EXIT_WRITE(&hfi->hfi_lock); 1354 hook_event_free(new, NULL); 1355 return (NULL); 1356 } 1357 1358 TAILQ_INIT(&new->hei_nhead); 1359 1360 hook_event_init_kstats(hfi, new); 1361 hook_wait_init(&new->hei_waiter, &new->hei_lock); 1362 1363 /* Add to event list head */ 1364 SLIST_INSERT_HEAD(&hfi->hfi_head, new, hei_entry); 1365 1366 CVW_EXIT_WRITE(&hfi->hfi_lock); 1367 1368 hook_notify_run(&hfi->hfi_nhead, 1369 hfi->hfi_family.hf_name, NULL, he->he_name, HN_REGISTER); 1370 1371 hook_wait_unsetflag(&hfi->hfi_waiter, FWF_ADD_ACTIVE); 1372 1373 return (new); 1374 } 1375 1376 /* 1377 * Function: hook_event_init_kstats 1378 * Returns: None 1379 * Parameters: hfi(I) - pointer to the family that owns this event. 1380 * hei(I) - pointer to the hook event that needs some kstats. 1381 * 1382 * Create a set of kstats that relate to each event registered with 1383 * the hook framework. A counter is kept for each time the event is 1384 * activated and for each time a hook is added or removed. As the 1385 * kstats just count the events as they happen, the total number of 1386 * hooks registered must be obtained by subtractived removed from added. 1387 */ 1388 static void 1389 hook_event_init_kstats(hook_family_int_t *hfi, hook_event_int_t *hei) 1390 { 1391 hook_event_kstat_t template = { 1392 { "hooksAdded", KSTAT_DATA_UINT64 }, 1393 { "hooksRemoved", KSTAT_DATA_UINT64 }, 1394 { "events", KSTAT_DATA_UINT64 } 1395 }; 1396 hook_stack_t *hks; 1397 1398 hks = hfi->hfi_stack; 1399 hei->hei_kstatp = kstat_create_netstack(hfi->hfi_family.hf_name, 0, 1400 hei->hei_event->he_name, "hook_event", KSTAT_TYPE_NAMED, 1401 sizeof (hei->hei_kstats) / sizeof (kstat_named_t), 1402 KSTAT_FLAG_VIRTUAL, hks->hks_netstackid); 1403 1404 bcopy((char *)&template, &hei->hei_kstats, sizeof (template)); 1405 1406 if (hei->hei_kstatp != NULL) { 1407 hei->hei_kstatp->ks_data = (void *)&hei->hei_kstats; 1408 hei->hei_kstatp->ks_private = 1409 (void *)(uintptr_t)hks->hks_netstackid; 1410 1411 kstat_install(hei->hei_kstatp); 1412 } 1413 } 1414 1415 /* 1416 * Function: hook_event_remove 1417 * Returns: int - 0 = success, else = failure 1418 * Parameters: hfi(I) - internal family pointer 1419 * he(I) - event pointer 1420 * 1421 * Remove event from event list on specific family 1422 * 1423 * This function assumes that the caller has received a pointer to a the 1424 * hook_family_int_t via a call to net_protocol_lookup or net_protocol_unreg'. 1425 * This the hook_family_int_t is guaranteed to be around for the life of this 1426 * call, unless the caller has decided to call net_protocol_release or 1427 * net_protocol_unregister before calling net_event_unregister - an error. 1428 */ 1429 int 1430 hook_event_remove(hook_family_int_t *hfi, hook_event_t *he) 1431 { 1432 boolean_t free_family; 1433 hook_event_int_t *hei; 1434 boolean_t notifydone; 1435 1436 ASSERT(hfi != NULL); 1437 ASSERT(he != NULL); 1438 1439 CVW_ENTER_WRITE(&hfi->hfi_lock); 1440 1441 /* 1442 * Set the flag so that we can call hook_event_notify_run without 1443 * holding any locks but at the same time prevent other changes to 1444 * the event at the same time. 1445 */ 1446 if (hook_wait_setflag(&hfi->hfi_waiter, FWF_DEL_WAIT_MASK, 1447 FWF_DEL_WANTED, FWF_DEL_ACTIVE) == -1) { 1448 CVW_EXIT_WRITE(&hfi->hfi_lock); 1449 return (ENXIO); 1450 } 1451 1452 hei = hook_event_find(hfi, he->he_name); 1453 if (hei == NULL) { 1454 hook_wait_unsetflag(&hfi->hfi_waiter, FWF_DEL_ACTIVE); 1455 CVW_EXIT_WRITE(&hfi->hfi_lock); 1456 return (ESRCH); 1457 } 1458 1459 free_family = B_FALSE; 1460 1461 CVW_ENTER_WRITE(&hei->hei_lock); 1462 /* 1463 * The hei_shutdown flag is used to indicate whether or not we have 1464 * done a shutdown and thus already walked through the notify list. 1465 */ 1466 notifydone = hei->hei_shutdown; 1467 hei->hei_shutdown = B_TRUE; 1468 /* 1469 * If there are any hooks still registered for this event or 1470 * there are any notifiers registered, return an error indicating 1471 * that the event is still busy. 1472 */ 1473 if (!TAILQ_EMPTY(&hei->hei_head) || !TAILQ_EMPTY(&hei->hei_nhead)) { 1474 hei->hei_condemned = B_TRUE; 1475 CVW_EXIT_WRITE(&hei->hei_lock); 1476 } else { 1477 /* hei_condemned = B_FALSE is implied from creation */ 1478 /* 1479 * Even though we know the notify list is empty, we call 1480 * hook_wait_destroy here to synchronise wait removing a 1481 * hook from an event. 1482 */ 1483 VERIFY(hook_wait_destroy(&hei->hei_waiter) == 0); 1484 1485 CVW_EXIT_WRITE(&hei->hei_lock); 1486 1487 if (hfi->hfi_condemned && SLIST_EMPTY(&hfi->hfi_head) && 1488 TAILQ_EMPTY(&hfi->hfi_nhead)) 1489 free_family = B_TRUE; 1490 } 1491 1492 CVW_EXIT_WRITE(&hfi->hfi_lock); 1493 1494 if (!notifydone) 1495 hook_notify_run(&hfi->hfi_nhead, 1496 hfi->hfi_family.hf_name, NULL, he->he_name, HN_UNREGISTER); 1497 1498 hook_wait_unsetflag(&hfi->hfi_waiter, FWF_DEL_ACTIVE); 1499 1500 if (!hei->hei_condemned) { 1501 hook_event_free(hei, hfi); 1502 if (free_family) 1503 hook_family_free(hfi, hfi->hfi_stack); 1504 } 1505 1506 return (0); 1507 } 1508 1509 /* 1510 * Function: hook_event_shutdown 1511 * Returns: int - 0 = success, else = failure 1512 * Parameters: hfi(I) - internal family pointer 1513 * he(I) - event pointer 1514 * 1515 * As with hook_family_shutdown, we want to generate the notify callbacks 1516 * as if the event was being removed but not actually do the remove. 1517 */ 1518 int 1519 hook_event_shutdown(hook_family_int_t *hfi, hook_event_t *he) 1520 { 1521 hook_event_int_t *hei; 1522 boolean_t notifydone; 1523 1524 ASSERT(hfi != NULL); 1525 ASSERT(he != NULL); 1526 1527 CVW_ENTER_WRITE(&hfi->hfi_lock); 1528 1529 /* 1530 * Set the flag so that we can call hook_event_notify_run without 1531 * holding any locks but at the same time prevent other changes to 1532 * the event at the same time. 1533 */ 1534 if (hook_wait_setflag(&hfi->hfi_waiter, FWF_DEL_WAIT_MASK, 1535 FWF_DEL_WANTED, FWF_DEL_ACTIVE) == -1) { 1536 CVW_EXIT_WRITE(&hfi->hfi_lock); 1537 return (ENXIO); 1538 } 1539 1540 hei = hook_event_find(hfi, he->he_name); 1541 if (hei == NULL) { 1542 hook_wait_unsetflag(&hfi->hfi_waiter, FWF_DEL_ACTIVE); 1543 CVW_EXIT_WRITE(&hfi->hfi_lock); 1544 return (ESRCH); 1545 } 1546 1547 CVW_ENTER_WRITE(&hei->hei_lock); 1548 notifydone = hei->hei_shutdown; 1549 hei->hei_shutdown = B_TRUE; 1550 CVW_EXIT_WRITE(&hei->hei_lock); 1551 1552 CVW_EXIT_WRITE(&hfi->hfi_lock); 1553 1554 if (!notifydone) 1555 hook_notify_run(&hfi->hfi_nhead, 1556 hfi->hfi_family.hf_name, NULL, he->he_name, HN_UNREGISTER); 1557 1558 hook_wait_unsetflag(&hfi->hfi_waiter, FWF_DEL_ACTIVE); 1559 1560 return (0); 1561 } 1562 1563 /* 1564 * Function: hook_event_free 1565 * Returns: None 1566 * Parameters: hei(I) - internal event pointer 1567 * 1568 * Free alloc memory for event 1569 */ 1570 static void 1571 hook_event_free(hook_event_int_t *hei, hook_family_int_t *hfi) 1572 { 1573 boolean_t free_family; 1574 1575 ASSERT(hei != NULL); 1576 1577 if (hfi != NULL) { 1578 CVW_ENTER_WRITE(&hfi->hfi_lock); 1579 /* 1580 * Remove the event from the hook family's list. 1581 */ 1582 SLIST_REMOVE(&hfi->hfi_head, hei, hook_event_int, hei_entry); 1583 if (hfi->hfi_condemned && SLIST_EMPTY(&hfi->hfi_head) && 1584 TAILQ_EMPTY(&hfi->hfi_nhead)) { 1585 free_family = B_TRUE; 1586 } else { 1587 free_family = B_FALSE; 1588 } 1589 CVW_EXIT_WRITE(&hfi->hfi_lock); 1590 } 1591 1592 if (hei->hei_kstatp != NULL) { 1593 ASSERT(hfi != NULL); 1594 1595 kstat_delete_netstack(hei->hei_kstatp, 1596 hfi->hfi_stack->hks_netstackid); 1597 hei->hei_kstatp = NULL; 1598 } 1599 1600 /* Free container */ 1601 kmem_free(hei, sizeof (*hei)); 1602 1603 if (free_family) 1604 hook_family_free(hfi, hfi->hfi_stack); 1605 } 1606 1607 /* 1608 * Function: hook_event_checkdup 1609 * Returns: internal event pointer - NULL = Not match 1610 * Parameters: he(I) - event pointer 1611 * 1612 * Search all of the hook families to see if the event being passed in 1613 * has already been associated with one. 1614 */ 1615 static hook_event_int_t * 1616 hook_event_checkdup(hook_event_t *he, hook_stack_t *hks) 1617 { 1618 hook_family_int_t *hfi; 1619 hook_event_int_t *hei; 1620 1621 ASSERT(he != NULL); 1622 1623 CVW_ENTER_READ(&hks->hks_lock); 1624 SLIST_FOREACH(hfi, &hks->hks_familylist, hfi_entry) { 1625 SLIST_FOREACH(hei, &hfi->hfi_head, hei_entry) { 1626 if (hei->hei_event == he) { 1627 CVW_EXIT_READ(&hks->hks_lock); 1628 return (hei); 1629 } 1630 } 1631 } 1632 CVW_EXIT_READ(&hks->hks_lock); 1633 1634 return (NULL); 1635 } 1636 1637 /* 1638 * Function: hook_event_copy 1639 * Returns: internal event pointer - NULL = Failed 1640 * Parameters: src(I) - event pointer 1641 * 1642 * Allocate internal event block and duplicate incoming event 1643 * No locks should be held across this function as it may sleep. 1644 */ 1645 static hook_event_int_t * 1646 hook_event_copy(hook_event_t *src) 1647 { 1648 hook_event_int_t *new; 1649 1650 ASSERT(src != NULL); 1651 ASSERT(src->he_name != NULL); 1652 1653 new = (hook_event_int_t *)kmem_zalloc(sizeof (*new), KM_SLEEP); 1654 1655 /* Copy body */ 1656 TAILQ_INIT(&new->hei_head); 1657 new->hei_event = src; 1658 1659 return (new); 1660 } 1661 1662 /* 1663 * Function: hook_event_find 1664 * Returns: internal event pointer - NULL = Not match 1665 * Parameters: hfi(I) - internal family pointer 1666 * event(I) - event name string 1667 * 1668 * Search event list with event name 1669 * A lock on hfi->hfi_lock must be held when called. 1670 */ 1671 static hook_event_int_t * 1672 hook_event_find(hook_family_int_t *hfi, char *event) 1673 { 1674 hook_event_int_t *hei = NULL; 1675 1676 ASSERT(hfi != NULL); 1677 ASSERT(event != NULL); 1678 1679 SLIST_FOREACH(hei, &hfi->hfi_head, hei_entry) { 1680 if ((strcmp(hei->hei_event->he_name, event) == 0) && 1681 ((hei->hei_waiter.fw_flags & FWF_UNSAFE) == 0)) 1682 break; 1683 } 1684 return (hei); 1685 } 1686 1687 /* 1688 * Function: hook_event_notify_register 1689 * Returns: int - 0 = success, else failure 1690 * Parameters: hfi(I) - hook family 1691 * event(I) - name of the event 1692 * callback(I) - function to be called 1693 * arg(I) - arg to provide callback when it is called 1694 * 1695 * Adds a new callback to the event named by "event" (we must find it) 1696 * that will be executed each time a new hook is added to the event. 1697 * Of course, if the stack is being shut down, this call should fail. 1698 */ 1699 int 1700 hook_event_notify_register(hook_family_int_t *hfi, char *event, 1701 hook_notify_fn_t callback, void *arg) 1702 { 1703 hook_event_int_t *hei; 1704 hook_stack_t *hks; 1705 boolean_t canrun; 1706 hook_int_t *h; 1707 int error; 1708 1709 canrun = B_FALSE; 1710 hks = hfi->hfi_stack; 1711 CVW_ENTER_READ(&hks->hks_lock); 1712 if (hks->hks_shutdown != 0) { 1713 CVW_EXIT_READ(&hks->hks_lock); 1714 return (ESHUTDOWN); 1715 } 1716 1717 CVW_ENTER_READ(&hfi->hfi_lock); 1718 1719 if (hfi->hfi_condemned || hfi->hfi_shutdown) { 1720 CVW_EXIT_READ(&hfi->hfi_lock); 1721 CVW_EXIT_READ(&hks->hks_lock); 1722 return (ESHUTDOWN); 1723 } 1724 1725 hei = hook_event_find(hfi, event); 1726 if (hei == NULL) { 1727 CVW_EXIT_READ(&hfi->hfi_lock); 1728 CVW_EXIT_READ(&hks->hks_lock); 1729 return (ESRCH); 1730 } 1731 1732 if (hei->hei_condemned || hei->hei_shutdown) { 1733 CVW_EXIT_READ(&hfi->hfi_lock); 1734 CVW_EXIT_READ(&hks->hks_lock); 1735 return (ESHUTDOWN); 1736 } 1737 1738 CVW_ENTER_WRITE(&hei->hei_lock); 1739 canrun = (hook_wait_setflag(&hei->hei_waiter, FWF_ADD_WAIT_MASK, 1740 FWF_ADD_WANTED, FWF_ADD_ACTIVE) != -1); 1741 error = hook_notify_register(&hei->hei_nhead, callback, arg); 1742 CVW_EXIT_WRITE(&hei->hei_lock); 1743 1744 CVW_EXIT_READ(&hfi->hfi_lock); 1745 CVW_EXIT_READ(&hks->hks_lock); 1746 1747 if (error == 0 && canrun) { 1748 TAILQ_FOREACH(h, &hei->hei_head, hi_entry) { 1749 callback(HN_REGISTER, arg, 1750 hfi->hfi_family.hf_name, hei->hei_event->he_name, 1751 h->hi_hook.h_name); 1752 } 1753 } 1754 1755 if (canrun) 1756 hook_wait_unsetflag(&hei->hei_waiter, FWF_ADD_ACTIVE); 1757 1758 return (error); 1759 } 1760 1761 /* 1762 * Function: hook_event_notify_unregister 1763 * Returns: int - 0 = success, else failure 1764 * Parameters: hfi(I) - hook family 1765 * event(I) - name of the event 1766 * callback(I) - function to be called 1767 * 1768 * Remove the given callback from the named event's list of functions 1769 * to call when a hook is added or removed. 1770 */ 1771 int 1772 hook_event_notify_unregister(hook_family_int_t *hfi, char *event, 1773 hook_notify_fn_t callback) 1774 { 1775 hook_event_int_t *hei; 1776 boolean_t free_event; 1777 boolean_t canrun; 1778 hook_int_t *h; 1779 void *arg; 1780 int error; 1781 1782 canrun = B_FALSE; 1783 1784 CVW_ENTER_READ(&hfi->hfi_lock); 1785 1786 hei = hook_event_find(hfi, event); 1787 if (hei == NULL) { 1788 CVW_EXIT_READ(&hfi->hfi_lock); 1789 return (ESRCH); 1790 } 1791 1792 CVW_ENTER_WRITE(&hei->hei_lock); 1793 1794 (void) hook_wait_setflag(&hei->hei_waiter, FWF_DEL_WAIT_MASK, 1795 FWF_DEL_WANTED, FWF_DEL_ACTIVE); 1796 1797 error = hook_notify_unregister(&hei->hei_nhead, callback, &arg); 1798 1799 hook_wait_unsetflag(&hei->hei_waiter, FWF_DEL_ACTIVE); 1800 1801 /* 1802 * hei_condemned has been set if someone tried to remove the 1803 * event but couldn't because there were still things attached to 1804 * it. Now that we've done a successful remove, if it is now empty 1805 * then by all rights we should be free'ing it too. Note that the 1806 * expectation is that only the caller of hook_event_add will ever 1807 * call hook_event_remove. 1808 */ 1809 if ((error == 0) && hei->hei_condemned && 1810 TAILQ_EMPTY(&hei->hei_head) && TAILQ_EMPTY(&hei->hei_nhead)) { 1811 free_event = B_TRUE; 1812 } else { 1813 free_event = B_FALSE; 1814 } 1815 1816 if (error == 0 && !free_event) { 1817 canrun = (hook_wait_setflag(&hei->hei_waiter, FWF_ADD_WAIT_MASK, 1818 FWF_ADD_WANTED, FWF_ADD_ACTIVE) != -1); 1819 } 1820 1821 CVW_EXIT_WRITE(&hei->hei_lock); 1822 CVW_EXIT_READ(&hfi->hfi_lock); 1823 1824 if (canrun) { 1825 TAILQ_FOREACH(h, &hei->hei_head, hi_entry) { 1826 callback(HN_UNREGISTER, arg, 1827 hfi->hfi_family.hf_name, hei->hei_event->he_name, 1828 h->hi_hook.h_name); 1829 } 1830 1831 hook_wait_unsetflag(&hei->hei_waiter, FWF_ADD_ACTIVE); 1832 } 1833 1834 if (free_event) { 1835 /* 1836 * It is safe to pass in hfi here, without a lock, because 1837 * our structure (hei) is still on one of its lists and thus 1838 * it won't be able to disappear yet... 1839 */ 1840 hook_event_free(hei, hfi); 1841 } 1842 1843 return (error); 1844 } 1845 1846 /* 1847 * Function: hook_event_notify_run 1848 * Returns: None 1849 * Parameters: nrun(I) - pointer to the list of callbacks to execute 1850 * hfi(I) - hook stack pointer to execute callbacks for 1851 * name(I) - name of a hook family 1852 * cmd(I) - either HN_UNREGISTER or HN_REGISTER 1853 * 1854 * Execute all of the callbacks registered for this event. 1855 */ 1856 static void 1857 hook_event_notify_run(hook_event_int_t *hei, hook_family_int_t *hfi, 1858 char *event, char *name, hook_notify_cmd_t cmd) 1859 { 1860 1861 hook_notify_run(&hei->hei_nhead, hfi->hfi_family.hf_name, 1862 event, name, cmd); 1863 } 1864 1865 /* 1866 * Function: hook_register 1867 * Returns: int - 0 = success, else = failure 1868 * Parameters: hfi(I) - internal family pointer 1869 * event(I) - event name string 1870 * h(I) - hook pointer 1871 * 1872 * Add new hook to hook list on the specified family and event. 1873 */ 1874 int 1875 hook_register(hook_family_int_t *hfi, char *event, hook_t *h) 1876 { 1877 hook_event_int_t *hei; 1878 hook_int_t *hi, *new; 1879 int error; 1880 1881 ASSERT(hfi != NULL); 1882 ASSERT(event != NULL); 1883 ASSERT(h != NULL); 1884 1885 if (hfi->hfi_stack->hks_shutdown) 1886 return (0); 1887 1888 /* Alloc hook_int_t and copy hook */ 1889 new = hook_copy(h); 1890 if (new == NULL) 1891 return (ENOMEM); 1892 1893 /* 1894 * Since hook add/remove only impact event, so it is unnecessary 1895 * to hold global family write lock. Just get read lock here to 1896 * ensure event will not be removed when doing hooks operation 1897 */ 1898 CVW_ENTER_WRITE(&hfi->hfi_lock); 1899 1900 hei = hook_event_find(hfi, event); 1901 if (hei == NULL) { 1902 CVW_EXIT_WRITE(&hfi->hfi_lock); 1903 hook_int_free(new, hfi->hfi_stack->hks_netstackid); 1904 return (ENXIO); 1905 } 1906 1907 CVW_ENTER_WRITE(&hei->hei_lock); 1908 1909 /* 1910 * If we've run either the remove() or shutdown(), do not allow any 1911 * more hooks to be added to this event. 1912 */ 1913 if (hei->hei_shutdown) { 1914 error = ESHUTDOWN; 1915 goto bad_add; 1916 } 1917 1918 hi = hook_find(hei, h); 1919 if (hi != NULL) { 1920 error = EEXIST; 1921 goto bad_add; 1922 } 1923 1924 if (hook_wait_setflag(&hei->hei_waiter, FWF_ADD_WAIT_MASK, 1925 FWF_ADD_WANTED, FWF_ADD_ACTIVE) == -1) { 1926 error = ENOENT; 1927 bad_add: 1928 CVW_EXIT_WRITE(&hei->hei_lock); 1929 CVW_EXIT_WRITE(&hfi->hfi_lock); 1930 hook_int_free(new, hfi->hfi_stack->hks_netstackid); 1931 return (error); 1932 } 1933 1934 /* Add to hook list head */ 1935 error = hook_insert(&hei->hei_head, new); 1936 if (error == 0) { 1937 hei->hei_event->he_interested = B_TRUE; 1938 hei->hei_kstats.hooks_added.value.ui64++; 1939 1940 hook_init_kstats(hfi, hei, new); 1941 } 1942 1943 CVW_EXIT_WRITE(&hei->hei_lock); 1944 CVW_EXIT_WRITE(&hfi->hfi_lock); 1945 1946 /* 1947 * Note that the name string passed through to the notify callbacks 1948 * is from the original hook being registered, not the copy being 1949 * inserted. 1950 */ 1951 if (error == 0) 1952 hook_event_notify_run(hei, hfi, event, h->h_name, HN_REGISTER); 1953 1954 hook_wait_unsetflag(&hei->hei_waiter, FWF_ADD_ACTIVE); 1955 1956 return (error); 1957 } 1958 1959 /* 1960 * Function: hook_insert 1961 * Returns: int - 0 = success, else = failure 1962 * Parameters: head(I) - pointer to hook list to insert hook onto 1963 * new(I) - pointer to hook to be inserted 1964 * 1965 * Try to insert the hook onto the list of hooks according to the hints 1966 * given in the hook to be inserted and those that already exist on the 1967 * list. For now, the implementation permits only a single hook to be 1968 * either first or last and names provided with before or after are only 1969 * loosely coupled with the action. 1970 */ 1971 static int 1972 hook_insert(hook_int_head_t *head, hook_int_t *new) 1973 { 1974 hook_int_t *before; 1975 hook_int_t *hi; 1976 hook_t *hih; 1977 hook_t *h = &new->hi_hook; 1978 1979 switch (new->hi_hook.h_hint) { 1980 case HH_NONE : 1981 before = NULL; 1982 /* 1983 * If there is no hint present (or not one that can be 1984 * satisfied now) then try to at least respect the wishes 1985 * of those that want to be last. If there are none wanting 1986 * to be last then add the new hook to the tail of the 1987 * list - this means we keep any wanting to be first 1988 * happy without having to search for HH_FIRST. 1989 */ 1990 TAILQ_FOREACH(hi, head, hi_entry) { 1991 hih = &hi->hi_hook; 1992 if ((hih->h_hint == HH_AFTER) && 1993 (strcmp(h->h_name, 1994 (char *)hih->h_hintvalue) == 0)) { 1995 TAILQ_INSERT_BEFORE(hi, new, hi_entry); 1996 return (0); 1997 } 1998 if ((hih->h_hint == HH_BEFORE) && (before == NULL) && 1999 (strcmp(h->h_name, 2000 (char *)hih->h_hintvalue) == 0)) { 2001 before = hi; 2002 } 2003 } 2004 if (before != NULL) { 2005 TAILQ_INSERT_AFTER(head, before, new, hi_entry); 2006 return (0); 2007 } 2008 hook_insert_plain(head, new); 2009 break; 2010 2011 case HH_FIRST : 2012 hi = TAILQ_FIRST(head); 2013 if ((hi != NULL) && (hi->hi_hook.h_hint == HH_FIRST)) 2014 return (EBUSY); 2015 TAILQ_INSERT_HEAD(head, new, hi_entry); 2016 break; 2017 2018 case HH_LAST : 2019 hi = TAILQ_LAST(head, hook_int_head); 2020 if ((hi != NULL) && (hi->hi_hook.h_hint == HH_LAST)) 2021 return (EBUSY); 2022 TAILQ_INSERT_TAIL(head, new, hi_entry); 2023 break; 2024 2025 case HH_BEFORE : 2026 hi = hook_find_byname(head, (char *)new->hi_hook.h_hintvalue); 2027 if (hi == NULL) 2028 return (hook_insert_afterbefore(head, new)); 2029 2030 if (hi->hi_hook.h_hint == HH_FIRST) 2031 return (EBUSY); 2032 2033 TAILQ_INSERT_BEFORE(hi, new, hi_entry); 2034 break; 2035 2036 case HH_AFTER : 2037 hi = hook_find_byname(head, (char *)new->hi_hook.h_hintvalue); 2038 if (hi == NULL) 2039 return (hook_insert_afterbefore(head, new)); 2040 2041 if (hi->hi_hook.h_hint == HH_LAST) 2042 return (EBUSY); 2043 2044 TAILQ_INSERT_AFTER(head, hi, new, hi_entry); 2045 break; 2046 2047 default : 2048 return (EINVAL); 2049 } 2050 2051 return (0); 2052 } 2053 2054 /* 2055 * Function: hook_insert_plain 2056 * Returns: int - 0 = success, else = failure 2057 * Parameters: head(I) - pointer to hook list to insert hook onto 2058 * new(I) - pointer to hook to be inserted 2059 * 2060 * Insert a hook such that it respects the wishes of those that want to 2061 * be last. If there are none wanting to be last then add the new hook 2062 * to the tail of the list - this means we keep any wanting to be first 2063 * happy without having to search for HH_FIRST. 2064 */ 2065 static void 2066 hook_insert_plain(hook_int_head_t *head, hook_int_t *new) 2067 { 2068 hook_int_t *hi; 2069 2070 hi = TAILQ_FIRST(head); 2071 if (hi != NULL) { 2072 if (hi->hi_hook.h_hint == HH_LAST) { 2073 TAILQ_INSERT_BEFORE(hi, new, hi_entry); 2074 } else { 2075 TAILQ_INSERT_TAIL(head, new, hi_entry); 2076 } 2077 } else { 2078 TAILQ_INSERT_TAIL(head, new, hi_entry); 2079 } 2080 } 2081 2082 /* 2083 * Function: hook_insert_afterbefore 2084 * Returns: int - 0 = success, else = failure 2085 * Parameters: head(I) - pointer to hook list to insert hook onto 2086 * new(I) - pointer to hook to be inserted 2087 * 2088 * Simple insertion of a hook specifying a HH_BEFORE or HH_AFTER was not 2089 * possible, so now we need to be more careful. The first pass is to go 2090 * through the list and look for any other hooks that also specify the 2091 * same hint name as the new one. The object of this exercise is to make 2092 * sure that hooks with HH_BEFORE always appear on the list before those 2093 * with HH_AFTER so that when said hook arrives, it can be placed in the 2094 * middle of the BEFOREs and AFTERs. If this condition does not arise, 2095 * just use hook_insert_plain() to try and insert the hook somewhere that 2096 * is innocuous to existing efforts. 2097 */ 2098 static int 2099 hook_insert_afterbefore(hook_int_head_t *head, hook_int_t *new) 2100 { 2101 hook_int_t *hi; 2102 hook_t *nh; 2103 hook_t *h; 2104 2105 nh = &new->hi_hook; 2106 ASSERT(new->hi_hook.h_hint != HH_NONE); 2107 ASSERT(new->hi_hook.h_hint != HH_LAST); 2108 ASSERT(new->hi_hook.h_hint != HH_FIRST); 2109 2110 /* 2111 * First, look through the list to see if there are any other 2112 * before's or after's that have a matching hint name. 2113 */ 2114 TAILQ_FOREACH(hi, head, hi_entry) { 2115 h = &hi->hi_hook; 2116 switch (h->h_hint) { 2117 case HH_FIRST : 2118 case HH_LAST : 2119 case HH_NONE : 2120 break; 2121 case HH_BEFORE : 2122 if ((nh->h_hint == HH_BEFORE) && 2123 (strcmp((char *)h->h_hintvalue, 2124 (char *)nh->h_hintvalue) == 0)) { 2125 TAILQ_INSERT_AFTER(head, hi, new, hi_entry); 2126 return (0); 2127 } 2128 if ((nh->h_hint == HH_AFTER) && 2129 (strcmp((char *)h->h_hintvalue, 2130 (char *)nh->h_hintvalue) == 0)) { 2131 TAILQ_INSERT_BEFORE(hi, new, hi_entry); 2132 return (0); 2133 } 2134 break; 2135 case HH_AFTER : 2136 if ((nh->h_hint == HH_AFTER) && 2137 (strcmp((char *)h->h_hintvalue, 2138 (char *)nh->h_hintvalue) == 0)) { 2139 TAILQ_INSERT_AFTER(head, hi, new, hi_entry); 2140 return (0); 2141 } 2142 if ((nh->h_hint == HH_BEFORE) && 2143 (strcmp((char *)h->h_hintvalue, 2144 (char *)nh->h_hintvalue) == 0)) { 2145 TAILQ_INSERT_BEFORE(hi, new, hi_entry); 2146 return (0); 2147 } 2148 break; 2149 } 2150 } 2151 2152 hook_insert_plain(head, new); 2153 2154 return (0); 2155 } 2156 2157 /* 2158 * Function: hook_unregister 2159 * Returns: int - 0 = success, else = failure 2160 * Parameters: hfi(I) - internal family pointer 2161 * event(I) - event name string 2162 * h(I) - hook pointer 2163 * 2164 * Remove hook from hook list on specific family, event 2165 */ 2166 int 2167 hook_unregister(hook_family_int_t *hfi, char *event, hook_t *h) 2168 { 2169 hook_event_int_t *hei; 2170 hook_int_t *hi; 2171 boolean_t free_event; 2172 2173 ASSERT(hfi != NULL); 2174 ASSERT(h != NULL); 2175 2176 CVW_ENTER_WRITE(&hfi->hfi_lock); 2177 2178 hei = hook_event_find(hfi, event); 2179 if (hei == NULL) { 2180 CVW_EXIT_WRITE(&hfi->hfi_lock); 2181 return (ENXIO); 2182 } 2183 2184 /* Hold write lock for event */ 2185 CVW_ENTER_WRITE(&hei->hei_lock); 2186 2187 hi = hook_find(hei, h); 2188 if (hi == NULL) { 2189 CVW_EXIT_WRITE(&hei->hei_lock); 2190 CVW_EXIT_WRITE(&hfi->hfi_lock); 2191 return (ENXIO); 2192 } 2193 2194 if (hook_wait_setflag(&hei->hei_waiter, FWF_DEL_WAIT_MASK, 2195 FWF_DEL_WANTED, FWF_DEL_ACTIVE) == -1) { 2196 CVW_EXIT_WRITE(&hei->hei_lock); 2197 CVW_EXIT_WRITE(&hfi->hfi_lock); 2198 return (ENOENT); 2199 } 2200 2201 /* Remove from hook list */ 2202 TAILQ_REMOVE(&hei->hei_head, hi, hi_entry); 2203 2204 free_event = B_FALSE; 2205 if (TAILQ_EMPTY(&hei->hei_head)) { 2206 hei->hei_event->he_interested = B_FALSE; 2207 /* 2208 * If the delete pending flag has been set and there are 2209 * no notifiers on the event (and we've removed the last 2210 * hook) then we need to free this event after we're done. 2211 */ 2212 if (hei->hei_condemned && TAILQ_EMPTY(&hei->hei_nhead)) 2213 free_event = B_TRUE; 2214 } 2215 hei->hei_kstats.hooks_removed.value.ui64++; 2216 2217 CVW_EXIT_WRITE(&hei->hei_lock); 2218 CVW_EXIT_WRITE(&hfi->hfi_lock); 2219 /* 2220 * While the FWF_DEL_ACTIVE flag is set, the hook_event_int_t 2221 * will not be free'd and thus the hook_family_int_t wil not 2222 * be free'd either. 2223 */ 2224 hook_event_notify_run(hei, hfi, event, h->h_name, HN_UNREGISTER); 2225 hook_wait_unsetflag(&hei->hei_waiter, FWF_DEL_ACTIVE); 2226 2227 hook_int_free(hi, hfi->hfi_stack->hks_netstackid); 2228 2229 if (free_event) 2230 hook_event_free(hei, hfi); 2231 2232 return (0); 2233 } 2234 2235 /* 2236 * Function: hook_find_byname 2237 * Returns: internal hook pointer - NULL = Not match 2238 * Parameters: hei(I) - internal event pointer 2239 * name(I)- hook name 2240 * 2241 * Search an event's list of hooks to see if there is a hook present that 2242 * has a matching name to the one being looked for. 2243 */ 2244 static hook_int_t * 2245 hook_find_byname(hook_int_head_t *head, char *name) 2246 { 2247 hook_int_t *hi; 2248 2249 TAILQ_FOREACH(hi, head, hi_entry) { 2250 if (strcmp(hi->hi_hook.h_name, name) == 0) 2251 return (hi); 2252 } 2253 2254 return (NULL); 2255 } 2256 2257 /* 2258 * Function: hook_find 2259 * Returns: internal hook pointer - NULL = Not match 2260 * Parameters: hei(I) - internal event pointer 2261 * h(I) - hook pointer 2262 * 2263 * Search an event's list of hooks to see if there is already one that 2264 * matches the hook being passed in. Currently the only criteria for a 2265 * successful search here is for the names to be the same. 2266 */ 2267 static hook_int_t * 2268 hook_find(hook_event_int_t *hei, hook_t *h) 2269 { 2270 2271 ASSERT(hei != NULL); 2272 ASSERT(h != NULL); 2273 2274 return (hook_find_byname(&hei->hei_head, h->h_name)); 2275 } 2276 2277 /* 2278 * Function: hook_copy 2279 * Returns: internal hook pointer - NULL = Failed 2280 * Parameters: src(I) - hook pointer 2281 * 2282 * Allocate internal hook block and duplicate incoming hook. 2283 * No locks should be held across this function as it may sleep. 2284 * Because hook_copy() is responsible for the creation of the internal 2285 * hook structure that is used here, it takes on population the structure 2286 * with the kstat information. Note that while the kstat bits are 2287 * seeded here, their installation of the kstats is handled elsewhere. 2288 */ 2289 static hook_int_t * 2290 hook_copy(hook_t *src) 2291 { 2292 hook_int_t *new; 2293 hook_t *dst; 2294 int len; 2295 2296 ASSERT(src != NULL); 2297 ASSERT(src->h_name != NULL); 2298 2299 new = (hook_int_t *)kmem_zalloc(sizeof (*new), KM_SLEEP); 2300 2301 /* Copy body */ 2302 dst = &new->hi_hook; 2303 *dst = *src; 2304 2305 /* Copy name */ 2306 len = strlen(src->h_name); 2307 dst->h_name = (char *)kmem_alloc(len + 1, KM_SLEEP); 2308 (void) strcpy(dst->h_name, src->h_name); 2309 2310 /* 2311 * This is initialised in this manner to make it safer to use the 2312 * same pointer in the kstats field. 2313 */ 2314 dst->h_hintvalue = (uintptr_t)""; 2315 2316 if (dst->h_hint == HH_BEFORE || dst->h_hint == HH_AFTER) { 2317 len = strlen((char *)src->h_hintvalue); 2318 if (len > 0) { 2319 dst->h_hintvalue = (uintptr_t)kmem_alloc(len + 1, 2320 KM_SLEEP); 2321 (void) strcpy((char *)dst->h_hintvalue, 2322 (char *)src->h_hintvalue); 2323 } 2324 } 2325 2326 return (new); 2327 } 2328 2329 /* 2330 * Function: hook_init_kstats 2331 * Returns: None 2332 * Parameters: hfi(I) - pointer to the family that owns the event. 2333 * hei(I) - pointer to the event that owns this hook 2334 * hi(I) - pointer to the hook for which we create kstats for 2335 * 2336 * Each hook that is registered with this framework has its own kstats 2337 * set up so that we can provide an easy way in which to observe the 2338 * look of hooks (using the kstat command.) The position is set to 0 2339 * here but is recalculated after we know the insertion has been a 2340 * success. 2341 */ 2342 static void 2343 hook_init_kstats(hook_family_int_t *hfi, hook_event_int_t *hei, hook_int_t *hi) 2344 { 2345 hook_hook_kstat_t template = { 2346 { "version", KSTAT_DATA_INT32 }, 2347 { "flags", KSTAT_DATA_UINT32 }, 2348 { "hint", KSTAT_DATA_INT32 }, 2349 { "hint_value", KSTAT_DATA_STRING }, 2350 { "position", KSTAT_DATA_INT32 }, 2351 { "hook_hits", KSTAT_DATA_UINT64 } 2352 }; 2353 hook_stack_t *hks; 2354 size_t kslen; 2355 int position; 2356 hook_int_t *h; 2357 2358 kslen = strlen(hfi->hfi_family.hf_name) + 2359 strlen(hei->hei_event->he_name) + 2; 2360 2361 hi->hi_ksname = (char *)kmem_zalloc(kslen, KM_SLEEP); 2362 (void) snprintf(hi->hi_ksname, kslen, "%s/%s", 2363 hfi->hfi_family.hf_name, hei->hei_event->he_name); 2364 2365 hks = hfi->hfi_stack; 2366 hi->hi_kstatp = kstat_create_netstack(hi->hi_ksname, 0, 2367 hi->hi_hook.h_name, "hook", KSTAT_TYPE_NAMED, 2368 sizeof (hi->hi_kstats) / sizeof (kstat_named_t), 2369 KSTAT_FLAG_VIRTUAL, hks->hks_netstackid); 2370 2371 /* Initialise the kstats for the structure */ 2372 bcopy(&template, &hi->hi_kstats, sizeof (template)); 2373 hi->hi_kstats.hook_version.value.i32 = hi->hi_hook.h_version; 2374 hi->hi_kstats.hook_flags.value.ui32 = hi->hi_hook.h_flags; 2375 hi->hi_kstats.hook_hint.value.i32 = hi->hi_hook.h_hint; 2376 hi->hi_kstats.hook_position.value.i32 = 0; 2377 hi->hi_kstats.hook_hits.value.ui64 = 0; 2378 2379 switch (hi->hi_hook.h_hint) { 2380 case HH_BEFORE : 2381 case HH_AFTER : 2382 kstat_named_setstr(&(hi->hi_kstats.hook_hintvalue), 2383 (const char *)hi->hi_hook.h_hintvalue); 2384 break; 2385 default : 2386 kstat_named_setstr(&(hi->hi_kstats.hook_hintvalue), 2387 hook_hintvalue_none); 2388 break; 2389 } 2390 2391 if (hi->hi_kstatp != NULL) { 2392 hi->hi_kstatp->ks_data = (void *)&hi->hi_kstats; 2393 hi->hi_kstatp->ks_private = 2394 (void *)(uintptr_t)hks->hks_netstackid; 2395 hi->hi_kstatp->ks_data_size += 2396 KSTAT_NAMED_STR_BUFLEN(&(hi->hi_kstats.hook_hintvalue)) + 1; 2397 2398 kstat_install(hi->hi_kstatp); 2399 } 2400 2401 position = 1; 2402 TAILQ_FOREACH(h, &hei->hei_head, hi_entry) { 2403 h->hi_kstats.hook_position.value.ui32 = position++; 2404 } 2405 } 2406 2407 /* 2408 * Function: hook_int_free 2409 * Returns: None 2410 * Parameters: hi(I) - internal hook pointer 2411 * 2412 * Free memory allocated to support a hook. 2413 */ 2414 static void 2415 hook_int_free(hook_int_t *hi, netstackid_t stackid) 2416 { 2417 int len; 2418 2419 ASSERT(hi != NULL); 2420 2421 /* Free name space */ 2422 if (hi->hi_hook.h_name != NULL) { 2423 kmem_free(hi->hi_hook.h_name, strlen(hi->hi_hook.h_name) + 1); 2424 } 2425 if (hi->hi_ksname != NULL) { 2426 kmem_free(hi->hi_ksname, strlen(hi->hi_ksname) + 1); 2427 } 2428 2429 /* Free the name used with the before/after hints. */ 2430 switch (hi->hi_hook.h_hint) { 2431 case HH_BEFORE : 2432 case HH_AFTER : 2433 len = strlen((char *)hi->hi_hook.h_hintvalue); 2434 if (len > 0) 2435 kmem_free((void *)hi->hi_hook.h_hintvalue, len + 1); 2436 break; 2437 default : 2438 break; 2439 } 2440 2441 if (hi->hi_kstatp != NULL) 2442 kstat_delete_netstack(hi->hi_kstatp, stackid); 2443 2444 /* Free container */ 2445 kmem_free(hi, sizeof (*hi)); 2446 } 2447 2448 /* 2449 * Function: hook_alloc 2450 * Returns: hook_t * - pointer to new hook structure 2451 * Parameters: version(I) - version number of the API when compiled 2452 * 2453 * This function serves as the interface for consumers to obtain a hook_t 2454 * structure. At this point in time, there is only a single "version" of 2455 * it, leading to a straight forward function. In a perfect world the 2456 * h_vesion would be a protected data structure member, but C isn't that 2457 * advanced... 2458 */ 2459 hook_t * 2460 hook_alloc(const int h_version) 2461 { 2462 hook_t *h; 2463 2464 h = kmem_zalloc(sizeof (hook_t), KM_SLEEP); 2465 h->h_version = h_version; 2466 return (h); 2467 } 2468 2469 /* 2470 * Function: hook_free 2471 * Returns: None 2472 * Parameters: h(I) - external hook pointer 2473 * 2474 * This function only free's memory allocated with hook_alloc(), so that if 2475 * (for example) kernel memory was allocated for h_name, this needs to be 2476 * free'd before calling hook_free(). 2477 */ 2478 void 2479 hook_free(hook_t *h) 2480 { 2481 kmem_free(h, sizeof (*h)); 2482 } 2483 2484 /* 2485 * Function: hook_notify_register 2486 * Returns: int - 0 = success, else failure 2487 * Parameters: head(I) - top of the list of callbacks 2488 * callback(I) - function to be called 2489 * arg(I) - arg to pass back to the function 2490 * 2491 * This function implements the modification of the list of callbacks 2492 * that are registered when someone wants to be advised of a change 2493 * that has happened. 2494 */ 2495 static int 2496 hook_notify_register(hook_notify_head_t *head, hook_notify_fn_t callback, 2497 void *arg) 2498 { 2499 hook_notify_t *hn; 2500 2501 TAILQ_FOREACH(hn, head, hn_entry) { 2502 if (hn->hn_func == callback) { 2503 return (EEXIST); 2504 } 2505 } 2506 2507 hn = (hook_notify_t *)kmem_alloc(sizeof (*hn), KM_SLEEP); 2508 hn->hn_func = callback; 2509 hn->hn_arg = arg; 2510 TAILQ_INSERT_TAIL(head, hn, hn_entry); 2511 2512 return (0); 2513 } 2514 2515 /* 2516 * Function: hook_notify_unregister 2517 * Returns: int - 0 = success, else failure 2518 * Parameters: stackid(I) - netstack identifier 2519 * callback(I) - function to be called 2520 * parg(O) - pointer to storage for pointer 2521 * 2522 * When calling this function, the provision of a valid pointer in parg 2523 * allows the caller to be made aware of what argument the hook function 2524 * was expecting. This then allows the simulation of HN_UNREGISTER events 2525 * when a notify-unregister is performed. 2526 */ 2527 static int 2528 hook_notify_unregister(hook_notify_head_t *head, 2529 hook_notify_fn_t callback, void **parg) 2530 { 2531 hook_notify_t *hn; 2532 2533 ASSERT(parg != NULL); 2534 2535 TAILQ_FOREACH(hn, head, hn_entry) { 2536 if (hn->hn_func == callback) 2537 break; 2538 } 2539 2540 if (hn == NULL) 2541 return (ESRCH); 2542 2543 *parg = hn->hn_arg; 2544 2545 TAILQ_REMOVE(head, hn, hn_entry); 2546 2547 kmem_free(hn, sizeof (*hn)); 2548 2549 return (0); 2550 } 2551 2552 /* 2553 * Function: hook_notify_run 2554 * Returns: None 2555 * Parameters: head(I) - top of the list of callbacks 2556 * family(I) - name of the hook family that owns the event 2557 * event(I) - name of the event being changed 2558 * name(I) - name of the object causing change 2559 * cmd(I) - either HN_UNREGISTER or HN_REGISTER 2560 * 2561 * This function walks through the list of registered callbacks and 2562 * executes each one, passing back the arg supplied when registered 2563 * and the name of the family (that owns the event), event (the thing 2564 * to which we're making a change) and finally a name that describes 2565 * what is being added or removed, as indicated by cmd. 2566 * 2567 * This function does not acquire or release any lock as it is required 2568 * that code calling it do so before hand. The use of hook_notify_head_t 2569 * is protected by the use of flagwait_t in the structures that own this 2570 * list and with the use of the FWF_ADD/DEL_ACTIVE flags. 2571 */ 2572 static void 2573 hook_notify_run(hook_notify_head_t *head, char *family, char *event, 2574 char *name, hook_notify_cmd_t cmd) 2575 { 2576 hook_notify_t *hn; 2577 2578 TAILQ_FOREACH(hn, head, hn_entry) { 2579 (*hn->hn_func)(cmd, hn->hn_arg, family, event, name); 2580 } 2581 } 2582