xref: /titanic_50/usr/src/cmd/fm/fmd/common/fmd_api.c (revision a8449b6b91b07447ea0dd49293b52ffc26e07fe8)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright (c) 2004, 2010, Oracle and/or its affiliates. All rights reserved.
24  */
25 
26 #include <sys/types.h>
27 #include <sys/fm/protocol.h>
28 #include <fm/topo_hc.h>
29 #include <uuid/uuid.h>
30 
31 #include <unistd.h>
32 #include <signal.h>
33 #include <limits.h>
34 #include <syslog.h>
35 #include <alloca.h>
36 #include <stddef.h>
37 #include <door.h>
38 
39 #include <fmd_module.h>
40 #include <fmd_api.h>
41 #include <fmd_string.h>
42 #include <fmd_subr.h>
43 #include <fmd_error.h>
44 #include <fmd_event.h>
45 #include <fmd_eventq.h>
46 #include <fmd_dispq.h>
47 #include <fmd_timerq.h>
48 #include <fmd_thread.h>
49 #include <fmd_ustat.h>
50 #include <fmd_case.h>
51 #include <fmd_protocol.h>
52 #include <fmd_buf.h>
53 #include <fmd_asru.h>
54 #include <fmd_fmri.h>
55 #include <fmd_topo.h>
56 #include <fmd_ckpt.h>
57 #include <fmd_xprt.h>
58 
59 #include <fmd.h>
60 
61 /*
62  * Table of configuration file variable types ops-vector pointers.  We use this
63  * to convert from the property description array specified by the module to an
64  * array of fmd_conf_formal_t's.  The order of this array must match the order
65  * of #define values specified in <fmd_api.h> (i.e. FMD_TYPE_BOOL must be 0).
66  * For now, the fmd_conf_list and fmd_conf_path types are not supported as we
67  * do not believe modules need them and they would require more complexity.
68  */
69 static const fmd_conf_ops_t *const _fmd_prop_ops[] = {
70 	&fmd_conf_bool,		/* FMD_TYPE_BOOL */
71 	&fmd_conf_int32,	/* FMD_TYPE_INT32 */
72 	&fmd_conf_uint32,	/* FMD_TYPE_UINT32 */
73 	&fmd_conf_int64,	/* FMD_TYPE_INT64 */
74 	&fmd_conf_uint64,	/* FMD_TYPE_UINT64 */
75 	&fmd_conf_string,	/* FMD_TYPE_STRING */
76 	&fmd_conf_time,		/* FMD_TYPE_TIME */
77 	&fmd_conf_size,		/* FMD_TYPE_SIZE */
78 };
79 
80 static void fmd_api_verror(fmd_module_t *, int, const char *, va_list)
81     __NORETURN;
82 static void fmd_api_error(fmd_module_t *, int, const char *, ...) __NORETURN;
83 
84 /*
85  * fmd_api_vxerror() provides the engine underlying the fmd_hdl_[v]error() API
86  * calls and the fmd_api_[v]error() utility routine defined below.  The routine
87  * formats the error, optionally associated with a particular errno code 'err',
88  * and logs it as an ereport associated with the calling module.  Depending on
89  * other optional properties, we also emit a message to stderr and to syslog.
90  */
91 static void
92 fmd_api_vxerror(fmd_module_t *mp, int err, const char *format, va_list ap)
93 {
94 	int raw_err = err;
95 	nvlist_t *nvl;
96 	fmd_event_t *e;
97 	char *class, *msg;
98 	size_t len1, len2;
99 	char c;
100 
101 	/*
102 	 * fmd_api_vxerror() counts as both an error of class EFMD_MODULE
103 	 * as well as an instance of 'err' w.r.t. our internal bean counters.
104 	 */
105 	(void) pthread_mutex_lock(&fmd.d_err_lock);
106 	fmd.d_errstats[EFMD_MODULE - EFMD_UNKNOWN].fmds_value.ui64++;
107 
108 	if (err > EFMD_UNKNOWN && err < EFMD_END)
109 		fmd.d_errstats[err - EFMD_UNKNOWN].fmds_value.ui64++;
110 
111 	(void) pthread_mutex_unlock(&fmd.d_err_lock);
112 
113 	/*
114 	 * Format the message using vsnprintf().  As usual, if the format has a
115 	 * newline in it, it is printed alone; otherwise strerror() is added.
116 	 */
117 	if (strchr(format, '\n') != NULL)
118 		err = 0; /* err is not relevant in the message */
119 
120 	len1 = vsnprintf(&c, 1, format, ap);
121 	len2 = err != 0 ? snprintf(&c, 1, ": %s\n", fmd_strerror(err)) : 0;
122 
123 	msg = fmd_alloc(len1 + len2 + 1, FMD_SLEEP);
124 	(void) vsnprintf(msg, len1 + 1, format, ap);
125 
126 	if (err != 0) {
127 		(void) snprintf(&msg[len1], len2 + 1,
128 		    ": %s\n", fmd_strerror(err));
129 	}
130 
131 	/*
132 	 * Create an error event corresponding to the error, insert it into the
133 	 * error log, and dispatch it to the fmd-self-diagnosis engine.
134 	 */
135 	if (mp != fmd.d_self && (raw_err != EFMD_HDL_ABORT || fmd.d_running)) {
136 		if ((c = msg[len1 + len2 - 1]) == '\n')
137 			msg[len1 + len2 - 1] = '\0'; /* strip \n for event */
138 
139 		nvl = fmd_protocol_moderror(mp, err, msg);
140 
141 		if (c == '\n')
142 			msg[len1 + len2 - 1] = c;
143 
144 		(void) nvlist_lookup_string(nvl, FM_CLASS, &class);
145 		e = fmd_event_create(FMD_EVT_PROTOCOL, FMD_HRT_NOW, nvl, class);
146 
147 		(void) pthread_rwlock_rdlock(&fmd.d_log_lock);
148 		fmd_log_append(fmd.d_errlog, e, NULL);
149 		(void) pthread_rwlock_unlock(&fmd.d_log_lock);
150 
151 		fmd_event_transition(e, FMD_EVS_ACCEPTED);
152 		fmd_event_commit(e);
153 
154 		fmd_dispq_dispatch(fmd.d_disp, e, class);
155 	}
156 
157 	/*
158 	 * Similar to fmd_vdebug(), if the debugging switches are enabled we
159 	 * echo the module name and message to stderr and/or syslog.  Unlike
160 	 * fmd_vdebug(), we also print to stderr if foreground mode is enabled.
161 	 * We also print the message if a built-in module is aborting before
162 	 * fmd has detached from its parent (e.g. default transport failure).
163 	 */
164 	if (fmd.d_fg || (fmd.d_hdl_dbout & FMD_DBOUT_STDERR) || (
165 	    raw_err == EFMD_HDL_ABORT && !fmd.d_running)) {
166 		(void) pthread_mutex_lock(&fmd.d_err_lock);
167 		(void) fprintf(stderr, "%s: %s: %s",
168 		    fmd.d_pname, mp->mod_name, msg);
169 		(void) pthread_mutex_unlock(&fmd.d_err_lock);
170 	}
171 
172 	if (fmd.d_hdl_dbout & FMD_DBOUT_SYSLOG) {
173 		syslog(LOG_ERR | LOG_DAEMON, "%s ERROR: %s: %s",
174 		    fmd.d_pname, mp->mod_name, msg);
175 	}
176 
177 	fmd_free(msg, len1 + len2 + 1);
178 }
179 
180 /*PRINTFLIKE3*/
181 static void
182 fmd_api_xerror(fmd_module_t *mp, int err, const char *format, ...)
183 {
184 	va_list ap;
185 
186 	va_start(ap, format);
187 	fmd_api_vxerror(mp, err, format, ap);
188 	va_end(ap);
189 }
190 
191 /*
192  * fmd_api_verror() is a wrapper around fmd_api_vxerror() for API subroutines.
193  * It calls fmd_module_unlock() on behalf of its caller, logs the error, and
194  * then aborts the API call and the surrounding module entry point by doing an
195  * fmd_module_abort(), which longjmps to the place where we entered the module.
196  */
197 static void
198 fmd_api_verror(fmd_module_t *mp, int err, const char *format, va_list ap)
199 {
200 	if (fmd_module_locked(mp))
201 		fmd_module_unlock(mp);
202 
203 	fmd_api_vxerror(mp, err, format, ap);
204 	fmd_module_abort(mp, err);
205 }
206 
207 /*PRINTFLIKE3*/
208 static void
209 fmd_api_error(fmd_module_t *mp, int err, const char *format, ...)
210 {
211 	va_list ap;
212 
213 	va_start(ap, format);
214 	fmd_api_verror(mp, err, format, ap);
215 	va_end(ap);
216 }
217 
218 /*
219  * Common code for fmd_api_module_lock() and fmd_api_transport_impl().  This
220  * code verifies that the handle is valid and associated with a proper thread.
221  */
222 static fmd_module_t *
223 fmd_api_module(fmd_hdl_t *hdl)
224 {
225 	fmd_thread_t *tp;
226 	fmd_module_t *mp;
227 
228 	/*
229 	 * If our TSD is not present at all, this is either a serious bug or
230 	 * someone has created a thread behind our back and is using fmd's API.
231 	 * We can't call fmd_api_error() because we can't be sure that we can
232 	 * unwind our state back to an enclosing fmd_module_dispatch(), so we
233 	 * must panic instead.  This is likely a module design or coding error.
234 	 */
235 	if ((tp = pthread_getspecific(fmd.d_key)) == NULL) {
236 		fmd_panic("fmd module api call made using "
237 		    "client handle %p from unknown thread\n", (void *)hdl);
238 	}
239 
240 	/*
241 	 * If our TSD refers to the root module and is a non-private
242 	 * door server thread,  then it was created asynchronously at the
243 	 * request of a module but is using now the module API as an
244 	 * auxiliary module thread.  We reset tp->thr_mod to the module
245 	 * handle so it can act as a module thread.
246 	 *
247 	 * If more than one module uses non-private doors then the
248 	 * "client handle is not valid" check below can fail since
249 	 * door server threads for such doors can service *any*
250 	 * non-private door.  We use non-private door for legacy sysevent
251 	 * alone.
252 	 */
253 	if (tp->thr_mod == fmd.d_rmod && tp->thr_func == &fmd_door_server)
254 		tp->thr_mod = (fmd_module_t *)hdl;
255 
256 	if ((mp = tp->thr_mod) != (fmd_module_t *)hdl) {
257 		fmd_api_error(mp, EFMD_HDL_INVAL,
258 		    "client handle %p is not valid\n", (void *)hdl);
259 	}
260 
261 	if (mp->mod_flags & FMD_MOD_FAIL) {
262 		fmd_api_error(mp, EFMD_MOD_FAIL,
263 		    "module has experienced an unrecoverable error\n");
264 	}
265 
266 	return (mp);
267 }
268 
269 /*
270  * fmd_api_module_lock() is used as a wrapper around fmd_module_lock() and a
271  * common prologue to each fmd_api.c routine.  It verifies that the handle is
272  * valid and owned by the current server thread, locks the handle, and then
273  * verifies that the caller is performing an operation on a registered handle.
274  * If any tests fail, the entire API call is aborted by fmd_api_error().
275  */
276 static fmd_module_t *
277 fmd_api_module_lock(fmd_hdl_t *hdl)
278 {
279 	fmd_module_t *mp = fmd_api_module(hdl);
280 
281 	fmd_module_lock(mp);
282 
283 	if (mp->mod_info == NULL) {
284 		fmd_api_error(mp, EFMD_HDL_NOTREG,
285 		    "client handle %p has not been registered\n", (void *)hdl);
286 	}
287 
288 	return (mp);
289 }
290 
291 /*
292  * Utility function for API entry points that accept fmd_case_t's.  We cast cp
293  * to fmd_case_impl_t and check to make sure the case is owned by the caller.
294  */
295 static fmd_case_impl_t *
296 fmd_api_case_impl(fmd_module_t *mp, fmd_case_t *cp)
297 {
298 	fmd_case_impl_t *cip = (fmd_case_impl_t *)cp;
299 
300 	if (cip == NULL || cip->ci_mod != mp) {
301 		fmd_api_error(mp, EFMD_CASE_OWNER,
302 		    "case %p is invalid or not owned by caller\n", (void *)cip);
303 	}
304 
305 	return (cip);
306 }
307 
308 /*
309  * Utility function for API entry points that accept fmd_xprt_t's.  We cast xp
310  * to fmd_transport_t and check to make sure the case is owned by the caller.
311  * Note that we could make this check safer by actually walking mp's transport
312  * list, but that requires holding the module lock and this routine needs to be
313  * MT-hot w.r.t. auxiliary module threads.  Ultimately any loadable module can
314  * cause us to crash anyway, so we optimize for scalability over safety here.
315  */
316 static fmd_xprt_impl_t *
317 fmd_api_transport_impl(fmd_hdl_t *hdl, fmd_xprt_t *xp)
318 {
319 	fmd_module_t *mp = fmd_api_module(hdl);
320 	fmd_xprt_impl_t *xip = (fmd_xprt_impl_t *)xp;
321 
322 	if (xip == NULL || xip->xi_queue->eq_mod != mp) {
323 		fmd_api_error(mp, EFMD_XPRT_OWNER,
324 		    "xprt %p is invalid or not owned by caller\n", (void *)xp);
325 	}
326 
327 	return (xip);
328 }
329 
330 /*
331  * fmd_hdl_register() is the one function which cannot use fmd_api_error() to
332  * report errors, because that routine causes the module to abort.  Failure to
333  * register is instead handled by having fmd_hdl_register() return an error to
334  * the _fmd_init() function and then detecting no registration when it returns.
335  * So we use this routine for fmd_hdl_register() error paths instead.
336  */
337 static int
338 fmd_hdl_register_error(fmd_module_t *mp, int err)
339 {
340 	if (fmd_module_locked(mp))
341 		fmd_module_unlock(mp);
342 
343 	fmd_api_xerror(mp, err, "failed to register");
344 	return (fmd_set_errno(err));
345 }
346 
347 static void
348 fmd_hdl_nop(void)
349 {
350 	/* empty function for use with unspecified module entry points */
351 }
352 
353 int
354 fmd_hdl_register(fmd_hdl_t *hdl, int version, const fmd_hdl_info_t *mip)
355 {
356 	fmd_thread_t *tp = pthread_getspecific(fmd.d_key);
357 	fmd_module_t *mp = tp->thr_mod;
358 
359 	const fmd_prop_t *prop;
360 	const fmd_conf_path_t *pap;
361 	fmd_conf_formal_t *cfp;
362 	fmd_hdl_ops_t ops;
363 
364 	const char *conf = NULL;
365 	char buf[PATH_MAX];
366 	int i;
367 
368 	if (mp != (fmd_module_t *)hdl)
369 		return (fmd_hdl_register_error(mp, EFMD_HDL_INVAL));
370 
371 	fmd_module_lock(mp);
372 
373 	/*
374 	 * First perform some sanity checks on our input.  The API version must
375 	 * be supported by FMD and the handle can only be registered once by
376 	 * the module thread to which we assigned this client handle.  The info
377 	 * provided for the handle must be valid and have the minimal settings.
378 	 */
379 	if (version > FMD_API_VERSION_5)
380 		return (fmd_hdl_register_error(mp, EFMD_VER_NEW));
381 
382 	if (version < FMD_API_VERSION_1)
383 		return (fmd_hdl_register_error(mp, EFMD_VER_OLD));
384 
385 	if (mp->mod_conf != NULL)
386 		return (fmd_hdl_register_error(mp, EFMD_HDL_REG));
387 
388 	if (pthread_self() != mp->mod_thread->thr_tid)
389 		return (fmd_hdl_register_error(mp, EFMD_HDL_TID));
390 
391 	if (mip == NULL || mip->fmdi_desc == NULL ||
392 	    mip->fmdi_vers == NULL || mip->fmdi_ops == NULL)
393 		return (fmd_hdl_register_error(mp, EFMD_HDL_INFO));
394 
395 	/*
396 	 * Copy the module's ops vector into a local variable to account for
397 	 * changes in the module ABI.  Then if any of the optional entry points
398 	 * are NULL, set them to nop so we don't have to check before calling.
399 	 */
400 	bzero(&ops, sizeof (ops));
401 
402 	if (version < FMD_API_VERSION_3)
403 		bcopy(mip->fmdi_ops, &ops, offsetof(fmd_hdl_ops_t, fmdo_send));
404 	else if (version < FMD_API_VERSION_4)
405 		bcopy(mip->fmdi_ops, &ops,
406 		    offsetof(fmd_hdl_ops_t, fmdo_topo));
407 	else
408 		bcopy(mip->fmdi_ops, &ops, sizeof (ops));
409 
410 	if (ops.fmdo_recv == NULL)
411 		ops.fmdo_recv = (void (*)())fmd_hdl_nop;
412 	if (ops.fmdo_timeout == NULL)
413 		ops.fmdo_timeout = (void (*)())fmd_hdl_nop;
414 	if (ops.fmdo_close == NULL)
415 		ops.fmdo_close = (void (*)())fmd_hdl_nop;
416 	if (ops.fmdo_stats == NULL)
417 		ops.fmdo_stats = (void (*)())fmd_hdl_nop;
418 	if (ops.fmdo_gc == NULL)
419 		ops.fmdo_gc = (void (*)())fmd_hdl_nop;
420 	if (ops.fmdo_send == NULL)
421 		ops.fmdo_send = (int (*)())fmd_hdl_nop;
422 	if (ops.fmdo_topo == NULL)
423 		ops.fmdo_topo = (void (*)())fmd_hdl_nop;
424 
425 	/*
426 	 * Make two passes through the property array to initialize the formals
427 	 * to use for processing the module's .conf file.  In the first pass,
428 	 * we validate the types and count the number of properties.  In the
429 	 * second pass we copy the strings and fill in the appropriate ops.
430 	 */
431 	for (prop = mip->fmdi_props, i = 0; prop != NULL &&
432 	    prop->fmdp_name != NULL; prop++, i++) {
433 		if (prop->fmdp_type >=
434 		    sizeof (_fmd_prop_ops) / sizeof (_fmd_prop_ops[0])) {
435 			fmd_api_xerror(mp, EFMD_HDL_PROP,
436 			    "property %s uses invalid type %u\n",
437 			    prop->fmdp_name, prop->fmdp_type);
438 			return (fmd_hdl_register_error(mp, EFMD_HDL_PROP));
439 		}
440 	}
441 
442 	mp->mod_argc = i;
443 	mp->mod_argv = fmd_zalloc(sizeof (fmd_conf_formal_t) * i, FMD_SLEEP);
444 
445 	prop = mip->fmdi_props;
446 	cfp = mp->mod_argv;
447 
448 	for (i = 0; i < mp->mod_argc; i++, prop++, cfp++) {
449 		cfp->cf_name = fmd_strdup(prop->fmdp_name, FMD_SLEEP);
450 		cfp->cf_ops = _fmd_prop_ops[prop->fmdp_type];
451 		cfp->cf_default = fmd_strdup(prop->fmdp_defv, FMD_SLEEP);
452 	}
453 
454 	/*
455 	 * If this module came from an on-disk file, compute the name of the
456 	 * corresponding .conf file and parse properties from it if it exists.
457 	 */
458 	if (mp->mod_path != NULL) {
459 		(void) strlcpy(buf, mp->mod_path, sizeof (buf));
460 		(void) fmd_strdirname(buf);
461 
462 		(void) strlcat(buf, "/", sizeof (buf));
463 		(void) strlcat(buf, mp->mod_name, sizeof (buf));
464 		(void) strlcat(buf, ".conf", sizeof (buf));
465 
466 		if (access(buf, F_OK) == 0)
467 			conf = buf;
468 	}
469 
470 	if ((mp->mod_conf = fmd_conf_open(conf,
471 	    mp->mod_argc, mp->mod_argv, 0)) == NULL)
472 		return (fmd_hdl_register_error(mp, EFMD_MOD_CONF));
473 
474 	fmd_conf_propagate(fmd.d_conf, mp->mod_conf, mp->mod_name);
475 
476 	/*
477 	 * Look up the list of the libdiagcode dictionaries associated with the
478 	 * module.  If none were specified, use the value from daemon's config.
479 	 * We only fail if the module specified an explicit dictionary.
480 	 */
481 	(void) fmd_conf_getprop(mp->mod_conf, FMD_PROP_DICTIONARIES, &pap);
482 	if (pap->cpa_argc == 0 && mp->mod_ops == &fmd_bltin_ops)
483 		(void) fmd_conf_getprop(fmd.d_conf, "self.dict", &pap);
484 
485 	for (i = 0; i < pap->cpa_argc; i++) {
486 		if (fmd_module_dc_opendict(mp, pap->cpa_argv[i]) != 0) {
487 			fmd_api_xerror(mp, errno,
488 			    "failed to open dictionary %s", pap->cpa_argv[i]);
489 			return (fmd_hdl_register_error(mp, EFMD_MOD_CONF));
490 		}
491 	}
492 
493 	/*
494 	 * Make a copy of the handle information and store it in mod_info.  We
495 	 * do not need to bother copying fmdi_props since they're already read.
496 	 */
497 	mp->mod_info = fmd_alloc(sizeof (fmd_hdl_info_t), FMD_SLEEP);
498 	mp->mod_info->fmdi_desc = fmd_strdup(mip->fmdi_desc, FMD_SLEEP);
499 	mp->mod_info->fmdi_vers = fmd_strdup(mip->fmdi_vers, FMD_SLEEP);
500 	mp->mod_info->fmdi_ops = fmd_alloc(sizeof (fmd_hdl_ops_t), FMD_SLEEP);
501 	bcopy(&ops, (void *)mp->mod_info->fmdi_ops, sizeof (fmd_hdl_ops_t));
502 	mp->mod_info->fmdi_props = NULL;
503 
504 	/*
505 	 * Store a copy of module version in mp for fmd_scheme_fmd_present()
506 	 */
507 	if (mp->mod_vers == NULL)
508 		mp->mod_vers = fmd_strdup(mip->fmdi_vers, FMD_SLEEP);
509 
510 	/*
511 	 * Allocate an FMRI representing this module.  We'll use this later
512 	 * if the module decides to publish any events (e.g. list.suspects).
513 	 */
514 	mp->mod_fmri = fmd_protocol_fmri_module(mp);
515 
516 	/*
517 	 * Any subscriptions specified in the conf file are now stored in the
518 	 * corresponding property.  Add all of these to the dispatch queue.
519 	 */
520 	(void) fmd_conf_getprop(mp->mod_conf, FMD_PROP_SUBSCRIPTIONS, &pap);
521 
522 	for (i = 0; i < pap->cpa_argc; i++) {
523 		fmd_dispq_insert(fmd.d_disp, mp->mod_queue, pap->cpa_argv[i]);
524 		fmd_xprt_subscribe_all(pap->cpa_argv[i]);
525 	}
526 
527 	/*
528 	 * Unlock the module and restore any pre-existing module checkpoint.
529 	 * If the checkpoint is missing or corrupt, we just keep going.
530 	 */
531 	fmd_module_unlock(mp);
532 	fmd_ckpt_restore(mp);
533 	return (0);
534 }
535 
536 /*
537  * If an auxiliary thread exists for the specified module at unregistration
538  * time, send it an asynchronous cancellation to force it to exit and then
539  * join with it (we expect this to either succeed quickly or return ESRCH).
540  * Once this is complete we can destroy the associated fmd_thread_t data.
541  */
542 static void
543 fmd_module_thrcancel(fmd_idspace_t *ids, id_t id, fmd_module_t *mp)
544 {
545 	fmd_thread_t *tp = fmd_idspace_getspecific(ids, id);
546 
547 	/*
548 	 * Door service threads are not cancellable (worse - if they're
549 	 * waiting in door_return then that is interrupted, but they then spin
550 	 * endlessly!).  Non-private door service threads are not tracked
551 	 * in the module thread idspace so it's only private server threads
552 	 * created via fmd_doorthr_create that we'll encounter.  In most
553 	 * cases the module _fini should have tidied up (e.g., calling
554 	 * sysevent_evc_unbind which will cleanup door threads if
555 	 * sysevent_evc_xsubscribe was used).  One case that does not
556 	 * clean up is sysev_fini which explicitly does not unbind the
557 	 * channel, so we must skip any remaining door threads here.
558 	 */
559 	if (tp->thr_isdoor) {
560 		fmd_dprintf(FMD_DBG_MOD, "not cancelling %s private door "
561 		    "thread %u\n", mp->mod_name, tp->thr_tid);
562 		fmd_thread_destroy(tp, FMD_THREAD_NOJOIN);
563 		return;
564 	}
565 
566 	fmd_dprintf(FMD_DBG_MOD, "cancelling %s auxiliary thread %u\n",
567 	    mp->mod_name, tp->thr_tid);
568 
569 	ASSERT(tp->thr_tid == id);
570 	(void) pthread_cancel(tp->thr_tid);
571 	(void) pthread_join(tp->thr_tid, NULL);
572 
573 	fmd_thread_destroy(tp, FMD_THREAD_NOJOIN);
574 }
575 
576 void
577 fmd_module_unregister(fmd_module_t *mp)
578 {
579 	fmd_conf_formal_t *cfp = mp->mod_argv;
580 	const fmd_conf_path_t *pap;
581 	fmd_case_t *cp;
582 	fmd_xprt_t *xp;
583 	int i;
584 
585 	TRACE((FMD_DBG_MOD, "unregister %p (%s)", (void *)mp, mp->mod_name));
586 	ASSERT(fmd_module_locked(mp));
587 
588 	/*
589 	 * If any transports are still open, they have send threads that are
590 	 * using the module handle: shut them down and join with these threads.
591 	 */
592 	while ((xp = fmd_list_next(&mp->mod_transports)) != NULL)
593 		fmd_xprt_destroy(xp);
594 
595 	/*
596 	 * If any auxiliary threads exist, they may be using our module handle,
597 	 * and therefore could cause a fault as soon as we start destroying it.
598 	 * Module writers should clean up any threads before unregistering: we
599 	 * forcibly cancel any remaining auxiliary threads before proceeding.
600 	 */
601 	fmd_idspace_apply(mp->mod_threads,
602 	    (void (*)())fmd_module_thrcancel, mp);
603 
604 	if (mp->mod_error == 0)
605 		fmd_ckpt_save(mp); /* take one more checkpoint if needed */
606 
607 	/*
608 	 * Delete any cases associated with the module (UNSOLVED, SOLVED, or
609 	 * CLOSE_WAIT) as if fmdo_close() has finished processing them.
610 	 */
611 	while ((cp = fmd_list_next(&mp->mod_cases)) != NULL)
612 		fmd_case_delete(cp);
613 
614 	fmd_ustat_delete_references(mp->mod_ustat);
615 	(void) fmd_conf_getprop(mp->mod_conf, FMD_PROP_SUBSCRIPTIONS, &pap);
616 
617 	for (i = 0; i < pap->cpa_argc; i++) {
618 		fmd_xprt_unsubscribe_all(pap->cpa_argv[i]);
619 		fmd_dispq_delete(fmd.d_disp, mp->mod_queue, pap->cpa_argv[i]);
620 	}
621 
622 	fmd_conf_close(mp->mod_conf);
623 	mp->mod_conf = NULL;
624 
625 	for (i = 0; i < mp->mod_argc; i++, cfp++) {
626 		fmd_strfree((char *)cfp->cf_name);
627 		fmd_strfree((char *)cfp->cf_default);
628 	}
629 
630 	fmd_free(mp->mod_argv, sizeof (fmd_conf_formal_t) * mp->mod_argc);
631 	mp->mod_argv = NULL;
632 	mp->mod_argc = 0;
633 
634 	nvlist_free(mp->mod_fmri);
635 	mp->mod_fmri = NULL;
636 
637 	fmd_strfree((char *)mp->mod_info->fmdi_desc);
638 	fmd_strfree((char *)mp->mod_info->fmdi_vers);
639 	fmd_free((void *)mp->mod_info->fmdi_ops, sizeof (fmd_hdl_ops_t));
640 	fmd_free(mp->mod_info, sizeof (fmd_hdl_info_t));
641 	mp->mod_info = NULL;
642 
643 	fmd_eventq_abort(mp->mod_queue);
644 }
645 
646 void
647 fmd_hdl_unregister(fmd_hdl_t *hdl)
648 {
649 	fmd_module_t *mp = fmd_api_module_lock(hdl);
650 	fmd_module_unregister(mp);
651 	fmd_module_unlock(mp);
652 }
653 
654 void
655 fmd_hdl_subscribe(fmd_hdl_t *hdl, const char *class)
656 {
657 	fmd_module_t *mp = fmd_api_module_lock(hdl);
658 
659 	if (fmd_conf_setprop(mp->mod_conf,
660 	    FMD_PROP_SUBSCRIPTIONS, class) == 0) {
661 		fmd_dispq_insert(fmd.d_disp, mp->mod_queue, class);
662 		fmd_xprt_subscribe_all(class);
663 	}
664 
665 	fmd_module_unlock(mp);
666 }
667 
668 
669 void
670 fmd_hdl_unsubscribe(fmd_hdl_t *hdl, const char *class)
671 {
672 	fmd_module_t *mp = fmd_api_module_lock(hdl);
673 
674 	if (fmd_conf_delprop(mp->mod_conf,
675 	    FMD_PROP_SUBSCRIPTIONS, class) == 0) {
676 		fmd_xprt_unsubscribe_all(class);
677 		fmd_dispq_delete(fmd.d_disp, mp->mod_queue, class);
678 	}
679 
680 	fmd_module_unlock(mp);
681 	fmd_eventq_cancel(mp->mod_queue, FMD_EVT_PROTOCOL, (void *)class);
682 }
683 
684 void
685 fmd_hdl_setspecific(fmd_hdl_t *hdl, void *spec)
686 {
687 	fmd_module_t *mp = fmd_api_module_lock(hdl);
688 
689 	mp->mod_spec = spec;
690 	fmd_module_unlock(mp);
691 }
692 
693 void *
694 fmd_hdl_getspecific(fmd_hdl_t *hdl)
695 {
696 	fmd_module_t *mp = fmd_api_module_lock(hdl);
697 	void *spec = mp->mod_spec;
698 
699 	fmd_module_unlock(mp);
700 	return (spec);
701 }
702 
703 void
704 fmd_hdl_opendict(fmd_hdl_t *hdl, const char *dict)
705 {
706 	fmd_module_t *mp = fmd_api_module_lock(hdl);
707 	const fmd_conf_path_t *pap;
708 	int i;
709 
710 	/*
711 	 * Update the dictionary property in order to preserve the list of
712 	 * pathnames and expand any % tokens in the path.  Then retrieve the
713 	 * new dictionary names from cpa_argv[] and open them one at a time.
714 	 */
715 	(void) fmd_conf_setprop(mp->mod_conf, FMD_PROP_DICTIONARIES, dict);
716 	(void) fmd_conf_getprop(mp->mod_conf, FMD_PROP_DICTIONARIES, &pap);
717 
718 	ASSERT(pap->cpa_argc > mp->mod_dictc);
719 
720 	for (i = mp->mod_dictc; i < pap->cpa_argc; i++) {
721 		if (fmd_module_dc_opendict(mp, pap->cpa_argv[i]) != 0) {
722 			fmd_api_error(mp, EFMD_MOD_DICT,
723 			    "failed to open dictionary %s for module %s",
724 			    pap->cpa_argv[i], mp->mod_name);
725 		}
726 	}
727 
728 	fmd_module_unlock(mp);
729 }
730 
731 topo_hdl_t *
732 fmd_hdl_topo_hold(fmd_hdl_t *hdl, int v)
733 {
734 	fmd_module_t *mp = fmd_api_module_lock(hdl);
735 	topo_hdl_t *thp;
736 
737 	if (v != TOPO_VERSION) {
738 		fmd_api_error(mp, EFMD_MOD_TOPO, "libtopo version mismatch: "
739 		    "fmd version %d != client version %d\n", TOPO_VERSION, v);
740 	}
741 
742 	thp = fmd_module_topo_hold(mp);
743 	ASSERT(thp != NULL);
744 
745 	fmd_module_unlock(mp);
746 	return (thp);
747 }
748 
749 void
750 fmd_hdl_topo_rele(fmd_hdl_t *hdl, topo_hdl_t *thp)
751 {
752 	fmd_module_t *mp = fmd_api_module_lock(hdl);
753 
754 	if (fmd_module_topo_rele(mp, thp) != 0)
755 		fmd_api_error(mp, EFMD_MOD_TOPO, "failed to release invalid "
756 		    "topo handle: %p\n", (void *)thp);
757 
758 	fmd_module_unlock(mp);
759 }
760 
761 static void *
762 fmd_hdl_alloc_locked(fmd_module_t *mp, size_t size, int flags)
763 {
764 	void *data;
765 
766 	if (mp->mod_stats->ms_memlimit.fmds_value.ui64 -
767 	    mp->mod_stats->ms_memtotal.fmds_value.ui64 < size) {
768 		fmd_api_error(mp, EFMD_HDL_NOMEM, "%s's allocation of %lu "
769 		    "bytes exceeds module memory limit (%llu)\n",
770 		    mp->mod_name, (ulong_t)size, (u_longlong_t)
771 		    mp->mod_stats->ms_memtotal.fmds_value.ui64);
772 	}
773 
774 	if ((data = fmd_alloc(size, flags)) != NULL)
775 		mp->mod_stats->ms_memtotal.fmds_value.ui64 += size;
776 
777 	return (data);
778 }
779 
780 void *
781 fmd_hdl_alloc(fmd_hdl_t *hdl, size_t size, int flags)
782 {
783 	fmd_module_t *mp = fmd_api_module_lock(hdl);
784 	void *data;
785 
786 	data = fmd_hdl_alloc_locked(mp, size, flags);
787 
788 	fmd_module_unlock(mp);
789 	return (data);
790 }
791 
792 void *
793 fmd_hdl_zalloc(fmd_hdl_t *hdl, size_t size, int flags)
794 {
795 	void *data = fmd_hdl_alloc(hdl, size, flags);
796 
797 	if (data != NULL)
798 		bzero(data, size);
799 
800 	return (data);
801 }
802 
803 static void
804 fmd_hdl_free_locked(fmd_module_t *mp, void *data, size_t size)
805 {
806 	fmd_free(data, size);
807 	mp->mod_stats->ms_memtotal.fmds_value.ui64 -= size;
808 }
809 
810 void
811 fmd_hdl_free(fmd_hdl_t *hdl, void *data, size_t size)
812 {
813 	fmd_module_t *mp = fmd_api_module_lock(hdl);
814 
815 	fmd_hdl_free_locked(mp, data, size);
816 
817 	fmd_module_unlock(mp);
818 }
819 
820 char *
821 fmd_hdl_strdup(fmd_hdl_t *hdl, const char *s, int flags)
822 {
823 	char *p;
824 
825 	if (s != NULL)
826 		p = fmd_hdl_alloc(hdl, strlen(s) + 1, flags);
827 	else
828 		p = NULL;
829 
830 	if (p != NULL)
831 		(void) strcpy(p, s);
832 
833 	return (p);
834 }
835 
836 void
837 fmd_hdl_strfree(fmd_hdl_t *hdl, char *s)
838 {
839 	if (s != NULL)
840 		fmd_hdl_free(hdl, s, strlen(s) + 1);
841 }
842 
843 void
844 fmd_hdl_vabort(fmd_hdl_t *hdl, const char *format, va_list ap)
845 {
846 	fmd_api_verror(fmd_api_module_lock(hdl), EFMD_HDL_ABORT, format, ap);
847 }
848 
849 /*PRINTFLIKE2*/
850 void
851 fmd_hdl_abort(fmd_hdl_t *hdl, const char *format, ...)
852 {
853 	fmd_module_t *mp = fmd_api_module_lock(hdl);
854 	va_list ap;
855 
856 	va_start(ap, format);
857 	fmd_api_verror(mp, EFMD_HDL_ABORT, format, ap);
858 	va_end(ap);
859 }
860 
861 void
862 fmd_hdl_verror(fmd_hdl_t *hdl, const char *format, va_list ap)
863 {
864 	fmd_module_t *mp = fmd_api_module_lock(hdl);
865 	fmd_api_vxerror(mp, errno, format, ap);
866 	fmd_module_unlock(mp);
867 }
868 
869 /*PRINTFLIKE2*/
870 void
871 fmd_hdl_error(fmd_hdl_t *hdl, const char *format, ...)
872 {
873 	va_list ap;
874 
875 	va_start(ap, format);
876 	fmd_hdl_verror(hdl, format, ap);
877 	va_end(ap);
878 }
879 
880 void
881 fmd_hdl_vdebug(fmd_hdl_t *hdl, const char *format, va_list ap)
882 {
883 	fmd_module_t *mp = fmd_api_module_lock(hdl);
884 
885 	char *msg;
886 	size_t len;
887 	char c;
888 
889 	if (!(fmd.d_hdl_debug)) {
890 		mp->mod_stats->ms_debugdrop.fmds_value.ui64++;
891 		fmd_module_unlock(mp);
892 		return;
893 	}
894 
895 	len = vsnprintf(&c, 1, format, ap);
896 
897 	if ((msg = fmd_alloc(len + 2, FMD_NOSLEEP)) == NULL) {
898 		mp->mod_stats->ms_debugdrop.fmds_value.ui64++;
899 		fmd_module_unlock(mp);
900 		return;
901 	}
902 
903 	(void) vsnprintf(msg, len + 1, format, ap);
904 
905 	if (msg[len - 1] != '\n')
906 		(void) strcpy(&msg[len], "\n");
907 
908 	if (fmd.d_hdl_dbout & FMD_DBOUT_STDERR) {
909 		(void) pthread_mutex_lock(&fmd.d_err_lock);
910 		(void) fprintf(stderr, "%s DEBUG: %s: %s",
911 		    fmd.d_pname, mp->mod_name, msg);
912 		(void) pthread_mutex_unlock(&fmd.d_err_lock);
913 	}
914 
915 	if (fmd.d_hdl_dbout & FMD_DBOUT_SYSLOG) {
916 		syslog(LOG_DEBUG | LOG_DAEMON, "%s DEBUG: %s: %s",
917 		    fmd.d_pname, mp->mod_name, msg);
918 	}
919 
920 	fmd_free(msg, len + 2);
921 	fmd_module_unlock(mp);
922 }
923 
924 /*PRINTFLIKE2*/
925 void
926 fmd_hdl_debug(fmd_hdl_t *hdl, const char *format, ...)
927 {
928 	va_list ap;
929 
930 	va_start(ap, format);
931 	fmd_hdl_vdebug(hdl, format, ap);
932 	va_end(ap);
933 }
934 
935 int32_t
936 fmd_prop_get_int32(fmd_hdl_t *hdl, const char *name)
937 {
938 	fmd_module_t *mp = fmd_api_module_lock(hdl);
939 	const fmd_conf_ops_t *ops = fmd_conf_gettype(mp->mod_conf, name);
940 	int32_t value = 0;
941 
942 	if (ops == &fmd_conf_bool || ops == &fmd_conf_int32 ||
943 	    ops == &fmd_conf_uint32)
944 		(void) fmd_conf_getprop(mp->mod_conf, name, &value);
945 	else if (ops != NULL) {
946 		fmd_api_error(mp, EFMD_PROP_TYPE,
947 		    "property %s is not of int32 type\n", name);
948 	} else {
949 		fmd_api_error(mp, EFMD_PROP_DEFN,
950 		    "property %s is not defined\n", name);
951 	}
952 
953 	fmd_module_unlock(mp);
954 	return (value);
955 }
956 
957 int64_t
958 fmd_prop_get_int64(fmd_hdl_t *hdl, const char *name)
959 {
960 	fmd_module_t *mp = fmd_api_module_lock(hdl);
961 	const fmd_conf_ops_t *ops = fmd_conf_gettype(mp->mod_conf, name);
962 	int64_t value = 0;
963 
964 	if (ops == &fmd_conf_int64 || ops == &fmd_conf_uint64 ||
965 	    ops == &fmd_conf_time || ops == &fmd_conf_size)
966 		(void) fmd_conf_getprop(mp->mod_conf, name, &value);
967 	else if (ops != NULL) {
968 		fmd_api_error(mp, EFMD_PROP_TYPE,
969 		    "property %s is not of int64 type\n", name);
970 	} else {
971 		fmd_api_error(mp, EFMD_PROP_DEFN,
972 		    "property %s is not defined\n", name);
973 	}
974 
975 	fmd_module_unlock(mp);
976 	return (value);
977 }
978 
979 char *
980 fmd_prop_get_string(fmd_hdl_t *hdl, const char *name)
981 {
982 	fmd_module_t *mp = fmd_api_module_lock(hdl);
983 	const fmd_conf_ops_t *ops = fmd_conf_gettype(mp->mod_conf, name);
984 	char *value = NULL;
985 	const char *s;
986 
987 	if (ops == &fmd_conf_string) {
988 		(void) fmd_conf_getprop(mp->mod_conf, name, &s);
989 		value = fmd_strdup(s, FMD_SLEEP);
990 	} else if (ops != NULL) {
991 		fmd_api_error(mp, EFMD_PROP_TYPE,
992 		    "property %s is not of string type\n", name);
993 	} else {
994 		fmd_api_error(mp, EFMD_PROP_DEFN,
995 		    "property %s is not defined\n", name);
996 	}
997 
998 	fmd_module_unlock(mp);
999 	return (value);
1000 }
1001 
1002 void
1003 fmd_prop_free_string(fmd_hdl_t *hdl, char *s)
1004 {
1005 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1006 	fmd_strfree(s);
1007 	fmd_module_unlock(mp);
1008 }
1009 
1010 fmd_stat_t *
1011 fmd_stat_create(fmd_hdl_t *hdl, uint_t flags, uint_t argc, fmd_stat_t *argv)
1012 {
1013 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1014 	fmd_stat_t *ep, *sp;
1015 
1016 	if (flags & ~FMD_STAT_ALLOC) {
1017 		fmd_api_error(mp, EFMD_STAT_FLAGS,
1018 		    "invalid flags 0x%x passed to fmd_stat_create\n", flags);
1019 	}
1020 
1021 	if ((sp = fmd_ustat_insert(mp->mod_ustat,
1022 	    flags | FMD_USTAT_VALIDATE, argc, argv, &ep)) == NULL) {
1023 		fmd_api_error(mp, errno,
1024 		    "failed to publish stat '%s'", ep->fmds_name);
1025 	}
1026 
1027 	fmd_module_unlock(mp);
1028 	return (sp);
1029 }
1030 
1031 void
1032 fmd_stat_destroy(fmd_hdl_t *hdl, uint_t argc, fmd_stat_t *argv)
1033 {
1034 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1035 	fmd_ustat_delete(mp->mod_ustat, argc, argv);
1036 	fmd_module_unlock(mp);
1037 }
1038 
1039 void
1040 fmd_stat_setstr(fmd_hdl_t *hdl, fmd_stat_t *sp, const char *s)
1041 {
1042 	char *str = fmd_strdup(s, FMD_SLEEP);
1043 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1044 
1045 	if (sp->fmds_type != FMD_TYPE_STRING) {
1046 		fmd_strfree(str);
1047 		fmd_api_error(mp, EFMD_STAT_TYPE,
1048 		    "stat '%s' is not a string\n", sp->fmds_name);
1049 	}
1050 
1051 	fmd_strfree(sp->fmds_value.str);
1052 	sp->fmds_value.str = str;
1053 
1054 	fmd_module_unlock(mp);
1055 }
1056 
1057 fmd_case_t *
1058 fmd_case_open(fmd_hdl_t *hdl, void *data)
1059 {
1060 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1061 	fmd_case_t *cp = fmd_case_create(mp, NULL, data);
1062 	fmd_module_unlock(mp);
1063 	return (cp);
1064 }
1065 
1066 fmd_case_t *
1067 fmd_case_open_uuid(fmd_hdl_t *hdl, const char *uuidstr, void *data)
1068 {
1069 	fmd_module_t *mp;
1070 	fmd_case_t *cp;
1071 	uint_t uuidlen;
1072 	uuid_t uuid;
1073 
1074 	mp = fmd_api_module_lock(hdl);
1075 
1076 	(void) fmd_conf_getprop(fmd.d_conf, "uuidlen", &uuidlen);
1077 
1078 	if (uuidstr == NULL) {
1079 		fmd_api_error(mp, EFMD_CASE_INVAL, "NULL uuid string\n");
1080 	} else if (strnlen(uuidstr, uuidlen + 1) != uuidlen) {
1081 		fmd_api_error(mp, EFMD_CASE_INVAL, "invalid uuid string: '%s' "
1082 		    "(expected length %d)\n", uuidstr, uuidlen);
1083 	} else if (uuid_parse((char *)uuidstr, uuid) == -1) {
1084 		fmd_api_error(mp, EFMD_CASE_INVAL, "cannot parse uuid string: "
1085 		    "'%s'\n", uuidstr);
1086 	}
1087 
1088 	if ((cp = fmd_case_hash_lookup(fmd.d_cases, uuidstr)) == NULL) {
1089 		cp = fmd_case_create(mp, uuidstr, data);
1090 	} else {
1091 		fmd_case_rele(cp);
1092 		cp = NULL;
1093 	}
1094 
1095 	fmd_module_unlock(mp);
1096 	return (cp);	/* May be NULL iff case already exists */
1097 }
1098 
1099 void
1100 fmd_case_reset(fmd_hdl_t *hdl, fmd_case_t *cp)
1101 {
1102 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1103 	fmd_case_impl_t *cip = fmd_api_case_impl(mp, cp);
1104 
1105 	if (cip->ci_state >= FMD_CASE_SOLVED) {
1106 		fmd_api_error(mp, EFMD_CASE_STATE, "cannot solve %s: "
1107 		    "case is already solved or closed\n", cip->ci_uuid);
1108 	}
1109 
1110 	fmd_case_reset_suspects(cp);
1111 	fmd_module_unlock(mp);
1112 }
1113 
1114 void
1115 fmd_case_solve(fmd_hdl_t *hdl, fmd_case_t *cp)
1116 {
1117 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1118 	fmd_case_impl_t *cip = fmd_api_case_impl(mp, cp);
1119 
1120 	if (cip->ci_state >= FMD_CASE_SOLVED) {
1121 		fmd_api_error(mp, EFMD_CASE_STATE, "cannot solve %s: "
1122 		    "case is already solved or closed\n", cip->ci_uuid);
1123 	}
1124 
1125 	fmd_case_transition(cp, FMD_CASE_SOLVED, FMD_CF_SOLVED);
1126 	fmd_module_unlock(mp);
1127 }
1128 
1129 void
1130 fmd_case_close(fmd_hdl_t *hdl, fmd_case_t *cp)
1131 {
1132 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1133 
1134 	(void) fmd_api_case_impl(mp, cp); /* validate 'cp' */
1135 	fmd_case_transition(cp, FMD_CASE_CLOSE_WAIT, FMD_CF_ISOLATED);
1136 
1137 	fmd_module_unlock(mp);
1138 }
1139 
1140 const char *
1141 fmd_case_uuid(fmd_hdl_t *hdl, fmd_case_t *cp)
1142 {
1143 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1144 	fmd_case_impl_t *cip = fmd_api_case_impl(mp, cp);
1145 	const char *uuid = cip->ci_uuid;
1146 
1147 	fmd_module_unlock(mp);
1148 	return (uuid);
1149 }
1150 
1151 fmd_case_t *
1152 fmd_case_uulookup(fmd_hdl_t *hdl, const char *uuid)
1153 {
1154 	fmd_module_t *cmp, *mp = fmd_api_module_lock(hdl);
1155 	fmd_case_t *cp = fmd_case_hash_lookup(fmd.d_cases, uuid);
1156 
1157 	if (cp != NULL) {
1158 		cmp = ((fmd_case_impl_t *)cp)->ci_mod;
1159 		fmd_case_rele(cp);
1160 	} else
1161 		cmp = NULL;
1162 
1163 	fmd_module_unlock(mp);
1164 	return (cmp == mp ? cp : NULL);
1165 }
1166 
1167 void
1168 fmd_case_uuclose(fmd_hdl_t *hdl, const char *uuid)
1169 {
1170 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1171 	fmd_case_t *cp = fmd_case_hash_lookup(fmd.d_cases, uuid);
1172 
1173 	if (cp != NULL) {
1174 		fmd_case_transition(cp, FMD_CASE_CLOSE_WAIT, FMD_CF_ISOLATED);
1175 		fmd_case_rele(cp);
1176 	}
1177 
1178 	fmd_module_unlock(mp);
1179 }
1180 
1181 int
1182 fmd_case_uuclosed(fmd_hdl_t *hdl, const char *uuid)
1183 {
1184 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1185 	fmd_case_t *cp = fmd_case_hash_lookup(fmd.d_cases, uuid);
1186 	fmd_case_impl_t *cip = (fmd_case_impl_t *)cp;
1187 	int rv = FMD_B_TRUE;
1188 
1189 	if (cip != NULL) {
1190 		rv = cip->ci_state >= FMD_CASE_CLOSE_WAIT;
1191 		fmd_case_rele(cp);
1192 	}
1193 
1194 	fmd_module_unlock(mp);
1195 	return (rv);
1196 }
1197 
1198 void
1199 fmd_case_uuresolved(fmd_hdl_t *hdl, const char *uuid)
1200 {
1201 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1202 	fmd_case_t *cp = fmd_case_hash_lookup(fmd.d_cases, uuid);
1203 
1204 	if (cp != NULL) {
1205 		fmd_case_impl_t *cip = (fmd_case_impl_t *)cp;
1206 		/*
1207 		 * For a proxy, we notify the diagnosing side, and then
1208 		 * wait for it to send us back a list.resolved.
1209 		 */
1210 		if (cip->ci_xprt != NULL)
1211 			fmd_xprt_uuresolved(cip->ci_xprt, cip->ci_uuid);
1212 		else
1213 			fmd_case_transition(cp, FMD_CASE_RESOLVED, 0);
1214 		fmd_case_rele(cp);
1215 	}
1216 
1217 	fmd_module_unlock(mp);
1218 }
1219 
1220 int
1221 fmd_case_uuisresolved(fmd_hdl_t *hdl, const char *uuid)
1222 {
1223 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1224 	fmd_case_t *cp = fmd_case_hash_lookup(fmd.d_cases, uuid);
1225 	fmd_case_impl_t *cip = (fmd_case_impl_t *)cp;
1226 	int rv = FMD_B_FALSE;
1227 
1228 	if (cip != NULL) {
1229 		rv = (cip->ci_state >= FMD_CASE_RESOLVED);
1230 		fmd_case_rele(cp);
1231 	}
1232 
1233 	fmd_module_unlock(mp);
1234 	return (rv);
1235 }
1236 
1237 static int
1238 fmd_case_instate(fmd_hdl_t *hdl, fmd_case_t *cp, uint_t state)
1239 {
1240 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1241 	fmd_case_impl_t *cip = fmd_api_case_impl(mp, cp);
1242 	int rv = cip->ci_state >= state;
1243 
1244 	fmd_module_unlock(mp);
1245 	return (rv);
1246 }
1247 
1248 int
1249 fmd_case_solved(fmd_hdl_t *hdl, fmd_case_t *cp)
1250 {
1251 	return (fmd_case_instate(hdl, cp, FMD_CASE_SOLVED));
1252 }
1253 
1254 int
1255 fmd_case_closed(fmd_hdl_t *hdl, fmd_case_t *cp)
1256 {
1257 	return (fmd_case_instate(hdl, cp, FMD_CASE_CLOSE_WAIT));
1258 }
1259 
1260 void
1261 fmd_case_add_ereport(fmd_hdl_t *hdl, fmd_case_t *cp, fmd_event_t *ep)
1262 {
1263 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1264 
1265 	(void) fmd_api_case_impl(mp, cp); /* validate 'cp' */
1266 
1267 	if (fmd_case_insert_event(cp, ep))
1268 		mp->mod_stats->ms_accepted.fmds_value.ui64++;
1269 
1270 	fmd_module_unlock(mp);
1271 }
1272 
1273 void
1274 fmd_case_add_serd(fmd_hdl_t *hdl, fmd_case_t *cp, const char *name)
1275 {
1276 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1277 	fmd_serd_elem_t *sep;
1278 	fmd_serd_eng_t *sgp;
1279 
1280 	if ((sgp = fmd_serd_eng_lookup(&mp->mod_serds, name)) == NULL) {
1281 		fmd_api_error(mp, EFMD_SERD_NAME,
1282 		    "failed to add events from serd engine '%s'", name);
1283 	}
1284 
1285 	(void) fmd_api_case_impl(mp, cp); /* validate 'cp' */
1286 
1287 	for (sep = fmd_list_next(&sgp->sg_list);
1288 	    sep != NULL; sep = fmd_list_next(sep)) {
1289 		if (fmd_case_insert_event(cp, sep->se_event))
1290 			mp->mod_stats->ms_accepted.fmds_value.ui64++;
1291 	}
1292 
1293 	fmd_module_unlock(mp);
1294 }
1295 
1296 void
1297 fmd_case_add_suspect(fmd_hdl_t *hdl, fmd_case_t *cp, nvlist_t *nvl)
1298 {
1299 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1300 	fmd_case_impl_t *cip = fmd_api_case_impl(mp, cp);
1301 	char *class;
1302 	topo_hdl_t *thp;
1303 	int err;
1304 	nvlist_t *rsrc = NULL, *asru_prop = NULL, *asru = NULL, *fru = NULL;
1305 	char *loc = NULL, *serial = NULL;
1306 
1307 	if (cip->ci_state >= FMD_CASE_SOLVED) {
1308 		fmd_api_error(mp, EFMD_CASE_STATE, "cannot add suspect to "
1309 		    "%s: case is already solved or closed\n", cip->ci_uuid);
1310 	}
1311 
1312 	if (nvlist_lookup_string(nvl, FM_CLASS, &class) != 0 ||
1313 	    class == NULL || *class == '\0') {
1314 		fmd_api_error(mp, EFMD_CASE_EVENT, "cannot add suspect to "
1315 		    "%s: suspect event is missing a class\n", cip->ci_uuid);
1316 	}
1317 
1318 	thp = fmd_module_topo_hold(mp);
1319 	(void) nvlist_lookup_nvlist(nvl, FM_FAULT_RESOURCE, &rsrc);
1320 	(void) nvlist_lookup_nvlist(nvl, FM_FAULT_ASRU, &asru);
1321 	(void) nvlist_lookup_nvlist(nvl, FM_FAULT_FRU, &fru);
1322 	if (rsrc != NULL) {
1323 		if (strncmp(class, "defect", 6) == 0) {
1324 			if (asru == NULL && topo_fmri_getprop(thp, rsrc,
1325 			    TOPO_PGROUP_IO, TOPO_IO_MODULE, rsrc,
1326 			    &asru_prop, &err) == 0 &&
1327 			    nvlist_lookup_nvlist(asru_prop, TOPO_PROP_VAL_VAL,
1328 			    &asru) == 0) {
1329 				(void) nvlist_add_nvlist(nvl, FM_FAULT_ASRU,
1330 				    asru);
1331 				nvlist_free(asru_prop);
1332 				(void) nvlist_lookup_nvlist(nvl, FM_FAULT_ASRU,
1333 				    &asru);
1334 			}
1335 		} else {
1336 			if (topo_fmri_asru(thp, rsrc, &asru, &err) == 0) {
1337 				(void) nvlist_remove(nvl, FM_FAULT_ASRU,
1338 				    DATA_TYPE_NVLIST);
1339 				(void) nvlist_add_nvlist(nvl, FM_FAULT_ASRU,
1340 				    asru);
1341 				nvlist_free(asru);
1342 				(void) nvlist_lookup_nvlist(nvl, FM_FAULT_ASRU,
1343 				    &asru);
1344 			}
1345 			if (topo_fmri_fru(thp, rsrc, &fru, &err) == 0) {
1346 				(void) nvlist_remove(nvl, FM_FAULT_FRU,
1347 				    DATA_TYPE_NVLIST);
1348 				(void) nvlist_add_nvlist(nvl, FM_FAULT_FRU,
1349 				    fru);
1350 				nvlist_free(fru);
1351 				(void) nvlist_lookup_nvlist(nvl, FM_FAULT_FRU,
1352 				    &fru);
1353 			}
1354 		}
1355 	}
1356 
1357 	/*
1358 	 * Try to find the location label for this resource
1359 	 */
1360 	if (strncmp(class, "defect", 6) != 0) {
1361 		if (fru != NULL)
1362 			(void) topo_fmri_label(thp, fru, &loc, &err);
1363 		else if (rsrc != NULL)
1364 			(void) topo_fmri_label(thp, rsrc, &loc, &err);
1365 		if (loc != NULL) {
1366 			(void) nvlist_remove(nvl, FM_FAULT_LOCATION,
1367 			    DATA_TYPE_STRING);
1368 			(void) nvlist_add_string(nvl, FM_FAULT_LOCATION, loc);
1369 			topo_hdl_strfree(thp, loc);
1370 		}
1371 	}
1372 
1373 	/*
1374 	 * In some cases, serial information for the resource will not be
1375 	 * available at enumeration but may instead be available by invoking
1376 	 * a dynamic property method on the FRU.  In order to ensure the serial
1377 	 * number is persisted properly in the ASRU cache, we'll fetch the
1378 	 * property, if it exists, and add it to the resource and fru fmris.
1379 	 * If the DE has not listed a fru in the suspect, see if we can
1380 	 * retrieve the serial from the resource instead.
1381 	 */
1382 	if (fru != NULL) {
1383 		(void) topo_fmri_serial(thp, fru, &serial, &err);
1384 		if (serial != NULL) {
1385 			(void) nvlist_add_string(fru, "serial", serial);
1386 			topo_hdl_strfree(thp, serial);
1387 		}
1388 	}
1389 
1390 	err = fmd_module_topo_rele(mp, thp);
1391 	ASSERT(err == 0);
1392 
1393 	fmd_case_insert_suspect(cp, nvl);
1394 	fmd_module_unlock(mp);
1395 }
1396 
1397 void
1398 fmd_case_setspecific(fmd_hdl_t *hdl, fmd_case_t *cp, void *data)
1399 {
1400 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1401 	fmd_case_impl_t *cip = fmd_api_case_impl(mp, cp);
1402 
1403 	(void) pthread_mutex_lock(&cip->ci_lock);
1404 	cip->ci_data = data;
1405 	(void) pthread_mutex_unlock(&cip->ci_lock);
1406 
1407 	fmd_module_unlock(mp);
1408 }
1409 
1410 void *
1411 fmd_case_getspecific(fmd_hdl_t *hdl, fmd_case_t *cp)
1412 {
1413 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1414 	fmd_case_impl_t *cip = fmd_api_case_impl(mp, cp);
1415 	void *data;
1416 
1417 	(void) pthread_mutex_lock(&cip->ci_lock);
1418 	data = cip->ci_data;
1419 	(void) pthread_mutex_unlock(&cip->ci_lock);
1420 
1421 	fmd_module_unlock(mp);
1422 	return (data);
1423 }
1424 
1425 void
1426 fmd_case_setprincipal(fmd_hdl_t *hdl, fmd_case_t *cp, fmd_event_t *ep)
1427 {
1428 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1429 
1430 	(void) fmd_api_case_impl(mp, cp); /* validate 'cp' */
1431 
1432 	if (fmd_case_insert_principal(cp, ep))
1433 		mp->mod_stats->ms_accepted.fmds_value.ui64++;
1434 
1435 	fmd_module_unlock(mp);
1436 }
1437 
1438 fmd_event_t *
1439 fmd_case_getprincipal(fmd_hdl_t *hdl, fmd_case_t *cp)
1440 {
1441 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1442 	fmd_case_impl_t *cip = fmd_api_case_impl(mp, cp);
1443 	fmd_event_t *ep;
1444 
1445 	(void) pthread_mutex_lock(&cip->ci_lock);
1446 	ep = cip->ci_principal;
1447 	(void) pthread_mutex_unlock(&cip->ci_lock);
1448 
1449 	fmd_module_unlock(mp);
1450 	return (ep);
1451 }
1452 
1453 fmd_case_t *
1454 fmd_case_next(fmd_hdl_t *hdl, fmd_case_t *cp)
1455 {
1456 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1457 
1458 	if (cp != NULL)
1459 		cp = fmd_list_next(fmd_api_case_impl(mp, cp));
1460 	else
1461 		cp = fmd_list_next(&mp->mod_cases);
1462 
1463 	fmd_module_unlock(mp);
1464 	return (cp);
1465 }
1466 
1467 fmd_case_t *
1468 fmd_case_prev(fmd_hdl_t *hdl, fmd_case_t *cp)
1469 {
1470 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1471 
1472 	if (cp != NULL)
1473 		cp = fmd_list_prev(fmd_api_case_impl(mp, cp));
1474 	else
1475 		cp = fmd_list_prev(&mp->mod_cases);
1476 
1477 	fmd_module_unlock(mp);
1478 	return (cp);
1479 }
1480 
1481 /*
1482  * Utility function for fmd_buf_* routines.  If a case is specified, use the
1483  * case's ci_bufs hash; otherwise use the module's global mod_bufs hash.
1484  */
1485 static fmd_buf_hash_t *
1486 fmd_buf_gethash(fmd_module_t *mp, fmd_case_t *cp)
1487 {
1488 	return (cp ? &fmd_api_case_impl(mp, cp)->ci_bufs : &mp->mod_bufs);
1489 }
1490 
1491 void
1492 fmd_buf_create(fmd_hdl_t *hdl, fmd_case_t *cp, const char *name, size_t size)
1493 {
1494 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1495 	fmd_buf_hash_t *bhp = fmd_buf_gethash(mp, cp);
1496 	fmd_buf_t *bp = fmd_buf_lookup(bhp, name);
1497 
1498 	if (bp == NULL) {
1499 		if (fmd_strbadid(name, FMD_B_TRUE) != NULL || size == 0) {
1500 			fmd_api_error(mp, EFMD_BUF_INVAL, "cannot create '%s' "
1501 			    "(size %lu): %s\n", name, (ulong_t)size,
1502 			    fmd_strerror(EFMD_BUF_INVAL));
1503 		}
1504 
1505 		if (mp->mod_stats->ms_buflimit.fmds_value.ui64 -
1506 		    mp->mod_stats->ms_buftotal.fmds_value.ui64 < size) {
1507 			fmd_api_error(mp, EFMD_BUF_LIMIT, "cannot create '%s': "
1508 			    "buf limit exceeded (%llu)\n", name, (u_longlong_t)
1509 			    mp->mod_stats->ms_buflimit.fmds_value.ui64);
1510 		}
1511 
1512 		mp->mod_stats->ms_buftotal.fmds_value.ui64 += size;
1513 		bp = fmd_buf_insert(bhp, name, size);
1514 
1515 	} else {
1516 		fmd_api_error(mp, EFMD_BUF_EXISTS,
1517 		    "cannot create '%s': buffer already exists\n", name);
1518 	}
1519 
1520 	if (cp != NULL)
1521 		fmd_case_setdirty(cp);
1522 	else
1523 		fmd_module_setdirty(mp);
1524 
1525 	fmd_module_unlock(mp);
1526 }
1527 
1528 void
1529 fmd_buf_destroy(fmd_hdl_t *hdl, fmd_case_t *cp, const char *name)
1530 {
1531 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1532 	fmd_buf_hash_t *bhp = fmd_buf_gethash(mp, cp);
1533 	fmd_buf_t *bp = fmd_buf_lookup(bhp, name);
1534 
1535 	if (bp != NULL) {
1536 		mp->mod_stats->ms_buftotal.fmds_value.ui64 -= bp->buf_size;
1537 		fmd_buf_delete(bhp, name);
1538 
1539 		if (cp != NULL)
1540 			fmd_case_setdirty(cp);
1541 		else
1542 			fmd_module_setdirty(mp);
1543 	}
1544 
1545 	fmd_module_unlock(mp);
1546 }
1547 
1548 void
1549 fmd_buf_read(fmd_hdl_t *hdl, fmd_case_t *cp,
1550     const char *name, void *buf, size_t size)
1551 {
1552 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1553 	fmd_buf_t *bp = fmd_buf_lookup(fmd_buf_gethash(mp, cp), name);
1554 
1555 	if (bp == NULL) {
1556 		fmd_api_error(mp, EFMD_BUF_NOENT, "no buf named '%s' is "
1557 		    "associated with %s\n", name, cp ? "case" : "module");
1558 	}
1559 
1560 	bcopy(bp->buf_data, buf, MIN(bp->buf_size, size));
1561 	if (size > bp->buf_size)
1562 		bzero((char *)buf + bp->buf_size, size - bp->buf_size);
1563 
1564 	fmd_module_unlock(mp);
1565 }
1566 
1567 void
1568 fmd_buf_write(fmd_hdl_t *hdl, fmd_case_t *cp,
1569     const char *name, const void *buf, size_t size)
1570 {
1571 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1572 	fmd_buf_hash_t *bhp = fmd_buf_gethash(mp, cp);
1573 	fmd_buf_t *bp = fmd_buf_lookup(bhp, name);
1574 
1575 	if (bp == NULL) {
1576 		if (fmd_strbadid(name, FMD_B_TRUE) != NULL || size == 0) {
1577 			fmd_api_error(mp, EFMD_BUF_INVAL, "cannot write '%s' "
1578 			    "(size %lu): %s\n", name, (ulong_t)size,
1579 			    fmd_strerror(EFMD_BUF_INVAL));
1580 		}
1581 
1582 		if (mp->mod_stats->ms_buflimit.fmds_value.ui64 -
1583 		    mp->mod_stats->ms_buftotal.fmds_value.ui64 < size) {
1584 			fmd_api_error(mp, EFMD_BUF_LIMIT, "cannot write '%s': "
1585 			    "buf limit exceeded (%llu)\n", name, (u_longlong_t)
1586 			    mp->mod_stats->ms_buflimit.fmds_value.ui64);
1587 		}
1588 
1589 		mp->mod_stats->ms_buftotal.fmds_value.ui64 += size;
1590 		bp = fmd_buf_insert(bhp, name, size);
1591 
1592 	} else if (size > bp->buf_size) {
1593 		fmd_api_error(mp, EFMD_BUF_OFLOW,
1594 		    "write to buf '%s' overflows buf size (%lu > %lu)\n",
1595 		    name, (ulong_t)size, (ulong_t)bp->buf_size);
1596 	}
1597 
1598 	bcopy(buf, bp->buf_data, MIN(bp->buf_size, size));
1599 	bp->buf_flags |= FMD_BUF_DIRTY;
1600 
1601 	if (cp != NULL)
1602 		fmd_case_setdirty(cp);
1603 	else
1604 		fmd_module_setdirty(mp);
1605 
1606 	fmd_module_unlock(mp);
1607 }
1608 
1609 size_t
1610 fmd_buf_size(fmd_hdl_t *hdl, fmd_case_t *cp, const char *name)
1611 {
1612 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1613 	fmd_buf_hash_t *bhp = fmd_buf_gethash(mp, cp);
1614 
1615 	fmd_buf_t *bp;
1616 	size_t size;
1617 
1618 	if ((bp = fmd_buf_lookup(bhp, name)) != NULL)
1619 		size = bp->buf_size;
1620 	else
1621 		size = 0;
1622 
1623 	fmd_module_unlock(mp);
1624 	return (size);
1625 }
1626 
1627 void
1628 fmd_serd_create(fmd_hdl_t *hdl, const char *name, uint_t n, hrtime_t t)
1629 {
1630 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1631 
1632 	if (fmd_serd_eng_lookup(&mp->mod_serds, name) != NULL) {
1633 		fmd_api_error(mp, EFMD_SERD_EXISTS,
1634 		    "failed to create serd engine '%s': %s\n",
1635 		    name, fmd_strerror(EFMD_SERD_EXISTS));
1636 	}
1637 
1638 	(void) fmd_serd_eng_insert(&mp->mod_serds, name, n, t);
1639 	fmd_module_setdirty(mp);
1640 	fmd_module_unlock(mp);
1641 }
1642 
1643 void
1644 fmd_serd_destroy(fmd_hdl_t *hdl, const char *name)
1645 {
1646 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1647 
1648 	fmd_serd_eng_delete(&mp->mod_serds, name);
1649 	fmd_module_setdirty(mp);
1650 	fmd_module_unlock(mp);
1651 }
1652 
1653 int
1654 fmd_serd_exists(fmd_hdl_t *hdl, const char *name)
1655 {
1656 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1657 	int rv = (fmd_serd_eng_lookup(&mp->mod_serds, name) != NULL);
1658 	fmd_module_unlock(mp);
1659 
1660 	return (rv);
1661 }
1662 
1663 void
1664 fmd_serd_reset(fmd_hdl_t *hdl, const char *name)
1665 {
1666 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1667 	fmd_serd_eng_t *sgp;
1668 
1669 	if ((sgp = fmd_serd_eng_lookup(&mp->mod_serds, name)) == NULL) {
1670 		fmd_api_error(mp, EFMD_SERD_NAME,
1671 		    "serd engine '%s' does not exist\n", name);
1672 	}
1673 
1674 	fmd_serd_eng_reset(sgp);
1675 	fmd_module_setdirty(mp);
1676 	fmd_module_unlock(mp);
1677 }
1678 
1679 int
1680 fmd_serd_record(fmd_hdl_t *hdl, const char *name, fmd_event_t *ep)
1681 {
1682 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1683 	fmd_serd_eng_t *sgp;
1684 	int err;
1685 
1686 	if ((sgp = fmd_serd_eng_lookup(&mp->mod_serds, name)) == NULL) {
1687 		fmd_api_error(mp, EFMD_SERD_NAME,
1688 		    "failed to add record to serd engine '%s'", name);
1689 	}
1690 
1691 	err = fmd_serd_eng_record(sgp, ep);
1692 
1693 	if (sgp->sg_flags & FMD_SERD_DIRTY)
1694 		fmd_module_setdirty(mp);
1695 
1696 	fmd_module_unlock(mp);
1697 	return (err);
1698 }
1699 
1700 int
1701 fmd_serd_fired(fmd_hdl_t *hdl, const char *name)
1702 {
1703 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1704 	fmd_serd_eng_t *sgp;
1705 	int err;
1706 
1707 	if ((sgp = fmd_serd_eng_lookup(&mp->mod_serds, name)) == NULL) {
1708 		fmd_api_error(mp, EFMD_SERD_NAME,
1709 		    "serd engine '%s' does not exist\n", name);
1710 	}
1711 
1712 	err = fmd_serd_eng_fired(sgp);
1713 	fmd_module_unlock(mp);
1714 	return (err);
1715 }
1716 
1717 int
1718 fmd_serd_empty(fmd_hdl_t *hdl, const char *name)
1719 {
1720 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1721 	fmd_serd_eng_t *sgp;
1722 	int empty;
1723 
1724 	if ((sgp = fmd_serd_eng_lookup(&mp->mod_serds, name)) == NULL) {
1725 		fmd_api_error(mp, EFMD_SERD_NAME,
1726 		    "serd engine '%s' does not exist\n", name);
1727 	}
1728 
1729 	empty = fmd_serd_eng_empty(sgp);
1730 	fmd_module_unlock(mp);
1731 	return (empty);
1732 }
1733 
1734 pthread_t
1735 fmd_thr_create(fmd_hdl_t *hdl, void (*func)(void *), void *arg)
1736 {
1737 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1738 	fmd_thread_t *tp;
1739 	pthread_t tid;
1740 
1741 	if (mp->mod_stats->ms_thrtotal.fmds_value.ui32 >=
1742 	    mp->mod_stats->ms_thrlimit.fmds_value.ui32) {
1743 		fmd_api_error(mp, EFMD_THR_LIMIT, "%s request to create an "
1744 		    "auxiliary thread exceeds module thread limit (%u)\n",
1745 		    mp->mod_name, mp->mod_stats->ms_thrlimit.fmds_value.ui32);
1746 	}
1747 
1748 	if ((tp = fmd_thread_create(mp, func, arg)) == NULL) {
1749 		fmd_api_error(mp, EFMD_THR_CREATE,
1750 		    "failed to create auxiliary thread");
1751 	}
1752 
1753 	tid = tp->thr_tid;
1754 	mp->mod_stats->ms_thrtotal.fmds_value.ui32++;
1755 	(void) fmd_idspace_xalloc(mp->mod_threads, tid, tp);
1756 
1757 	fmd_module_unlock(mp);
1758 	return (tid);
1759 }
1760 
1761 void
1762 fmd_thr_destroy(fmd_hdl_t *hdl, pthread_t tid)
1763 {
1764 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1765 	fmd_thread_t *tp;
1766 	int err;
1767 
1768 	if (pthread_self() == tid) {
1769 		fmd_api_error(mp, EFMD_THR_INVAL, "auxiliary thread tried to "
1770 		    "destroy itself (tid %u)\n", tid);
1771 	}
1772 
1773 	if ((tp = fmd_idspace_getspecific(mp->mod_threads, tid)) == NULL) {
1774 		fmd_api_error(mp, EFMD_THR_INVAL, "auxiliary thread tried to "
1775 		    "destroy an invalid thread (tid %u)\n", tid);
1776 	}
1777 
1778 	/*
1779 	 * Wait for the specified thread to exit and then join with it.  Since
1780 	 * the thread may need to make API calls in order to complete its work
1781 	 * we must sleep with the module lock unheld, and then reacquire it.
1782 	 */
1783 	fmd_module_unlock(mp);
1784 	err = pthread_join(tid, NULL);
1785 	mp = fmd_api_module_lock(hdl);
1786 
1787 	/*
1788 	 * Since pthread_join() was called without the module lock held, if
1789 	 * multiple callers attempted to destroy the same auxiliary thread
1790 	 * simultaneously, one will succeed and the others will get ESRCH.
1791 	 * Therefore we silently ignore ESRCH but only allow the caller who
1792 	 * succeessfully joined with the auxiliary thread to destroy it.
1793 	 */
1794 	if (err != 0 && err != ESRCH) {
1795 		fmd_api_error(mp, EFMD_THR_JOIN,
1796 		    "failed to join with auxiliary thread %u\n", tid);
1797 	}
1798 
1799 	if (err == 0) {
1800 		fmd_thread_destroy(tp, FMD_THREAD_NOJOIN);
1801 		mp->mod_stats->ms_thrtotal.fmds_value.ui32--;
1802 		(void) fmd_idspace_free(mp->mod_threads, tid);
1803 	}
1804 
1805 	fmd_module_unlock(mp);
1806 }
1807 
1808 void
1809 fmd_thr_signal(fmd_hdl_t *hdl, pthread_t tid)
1810 {
1811 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1812 
1813 	if (tid != mp->mod_thread->thr_tid &&
1814 	    fmd_idspace_getspecific(mp->mod_threads, tid) == NULL) {
1815 		fmd_api_error(mp, EFMD_THR_INVAL, "tid %u is not a valid "
1816 		    "thread id for module %s\n", tid, mp->mod_name);
1817 	}
1818 
1819 	(void) pthread_kill(tid, fmd.d_thr_sig);
1820 	fmd_module_unlock(mp);
1821 }
1822 
1823 void
1824 fmd_thr_checkpoint(fmd_hdl_t *hdl)
1825 {
1826 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1827 	pthread_t tid = pthread_self();
1828 
1829 	if (tid == mp->mod_thread->thr_tid ||
1830 	    fmd_idspace_getspecific(mp->mod_threads, tid) == NULL) {
1831 		fmd_api_error(mp, EFMD_THR_INVAL, "tid %u is not a valid "
1832 		    "auxiliary thread id for module %s\n", tid, mp->mod_name);
1833 	}
1834 
1835 	fmd_ckpt_save(mp);
1836 
1837 	fmd_module_unlock(mp);
1838 }
1839 
1840 /*ARGSUSED3*/
1841 int
1842 fmd_doorthr_create(door_info_t *dip, void *(*crf)(void *), void *crarg,
1843     void *cookie)
1844 {
1845 	fmd_thread_t *old_tp, *new_tp;
1846 	fmd_module_t *mp;
1847 	pthread_t tid;
1848 
1849 	/*
1850 	 * We're called either during initial door_xcreate or during
1851 	 * a depletion callback.  In both cases the current thread
1852 	 * is already setup so we can retrieve the fmd_thread_t.
1853 	 * If not then we panic.  The new thread will be associated with
1854 	 * the same module as the old.
1855 	 *
1856 	 * If dip == NULL we're being called as part of the
1857 	 * sysevent_bind_subscriber hack - see comments there.
1858 	 */
1859 	if ((old_tp = pthread_getspecific(fmd.d_key)) == NULL)
1860 		fmd_panic("fmd_doorthr_create from unrecognized thread\n");
1861 
1862 	mp = old_tp->thr_mod;
1863 	(void) fmd_api_module_lock((fmd_hdl_t *)mp);
1864 
1865 	if (dip && mp->mod_stats->ms_doorthrtotal.fmds_value.ui32 >=
1866 	    mp->mod_stats->ms_doorthrlimit.fmds_value.ui32) {
1867 		fmd_module_unlock(mp);
1868 		(void) fmd_dprintf(FMD_DBG_XPRT, "door server %s for %p "
1869 		    "not attemped - at max\n",
1870 		    dip->di_attributes & DOOR_DEPLETION_CB ?
1871 		    "depletion callback" : "startup", (void *)dip);
1872 		return (0);
1873 	}
1874 
1875 	if ((new_tp = fmd_doorthread_create(mp, (fmd_thread_f *)crf,
1876 	    crarg)) != NULL) {
1877 		tid = new_tp->thr_tid;
1878 		mp->mod_stats->ms_doorthrtotal.fmds_value.ui32++;
1879 		(void) fmd_idspace_xalloc(mp->mod_threads, tid, new_tp);
1880 	}
1881 
1882 	fmd_module_unlock(mp);
1883 
1884 	if (dip) {
1885 		fmd_dprintf(FMD_DBG_XPRT, "door server startup for %p %s\n",
1886 		    (void *)dip, new_tp ? "successful" : "failed");
1887 	}
1888 
1889 	return (new_tp ? 1 : -1);
1890 }
1891 
1892 /*ARGSUSED*/
1893 void
1894 fmd_doorthr_setup(void *cookie)
1895 {
1896 	(void) pthread_setcancelstate(PTHREAD_CANCEL_DISABLE, NULL);
1897 }
1898 
1899 id_t
1900 fmd_timer_install(fmd_hdl_t *hdl, void *arg, fmd_event_t *ep, hrtime_t delta)
1901 {
1902 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1903 	fmd_modtimer_t *t;
1904 	id_t id;
1905 
1906 	if (delta < 0) {
1907 		fmd_api_error(mp, EFMD_TIMER_INVAL,
1908 		    "timer delta %lld is not a valid interval\n", delta);
1909 	}
1910 
1911 	t = fmd_alloc(sizeof (fmd_modtimer_t), FMD_SLEEP);
1912 	t->mt_mod = mp;
1913 	t->mt_arg = arg;
1914 	t->mt_id = -1;
1915 
1916 	if ((id = fmd_timerq_install(fmd.d_timers, mp->mod_timerids,
1917 	    (fmd_timer_f *)fmd_module_timeout, t, ep, delta)) == -1) {
1918 		fmd_free(t, sizeof (fmd_modtimer_t));
1919 		fmd_api_error(mp, EFMD_TIMER_LIMIT,
1920 		    "failed to install timer +%lld", delta);
1921 	}
1922 
1923 	fmd_module_unlock(mp);
1924 	return (id);
1925 }
1926 
1927 void
1928 fmd_timer_remove(fmd_hdl_t *hdl, id_t id)
1929 {
1930 	fmd_module_t *mp = fmd_api_module_lock(hdl);
1931 	fmd_modtimer_t *t;
1932 
1933 	if (!fmd_idspace_valid(mp->mod_timerids, id)) {
1934 		fmd_api_error(mp, EFMD_TIMER_INVAL,
1935 		    "id %ld is not a valid timer id\n", id);
1936 	}
1937 
1938 	/*
1939 	 * If the timer has not fired (t != NULL), remove it from the timer
1940 	 * queue.  If the timer has fired (t == NULL), we could be in one of
1941 	 * two situations: a) we are processing the timer callback or b)
1942 	 * the timer event is on the module queue awaiting dispatch.  For a),
1943 	 * fmd_timerq_remove() will wait for the timer callback function
1944 	 * to complete and queue an event for dispatch.  For a) and b),
1945 	 * we cancel the outstanding timer event from the module's dispatch
1946 	 * queue.
1947 	 */
1948 	if ((t = fmd_timerq_remove(fmd.d_timers, mp->mod_timerids, id)) != NULL)
1949 		fmd_free(t, sizeof (fmd_modtimer_t));
1950 	fmd_module_unlock(mp);
1951 
1952 	fmd_eventq_cancel(mp->mod_queue, FMD_EVT_TIMEOUT, (void *)id);
1953 }
1954 
1955 static nvlist_t *
1956 fmd_nvl_create_suspect(fmd_hdl_t *hdl, const char *class,
1957     uint8_t certainty, nvlist_t *asru, nvlist_t *fru, nvlist_t *rsrc,
1958     const char *pfx, boolean_t chkpfx)
1959 {
1960 	fmd_module_t *mp;
1961 	nvlist_t *nvl;
1962 
1963 	mp = fmd_api_module_lock(hdl);
1964 	if (class == NULL || class[0] == '\0' ||
1965 	    chkpfx == B_TRUE && strncmp(class, pfx, strlen(pfx)) != 0)
1966 		fmd_api_error(mp, EFMD_NVL_INVAL, "invalid %s class: '%s'\n",
1967 		    pfx, class ? class : "(empty)");
1968 
1969 	nvl = fmd_protocol_fault(class, certainty, asru, fru, rsrc, NULL);
1970 
1971 	fmd_module_unlock(mp);
1972 
1973 	return (nvl);
1974 }
1975 
1976 nvlist_t *
1977 fmd_nvl_create_fault(fmd_hdl_t *hdl, const char *class,
1978     uint8_t certainty, nvlist_t *asru, nvlist_t *fru, nvlist_t *rsrc)
1979 {
1980 	/*
1981 	 * We can't enforce that callers only specifiy classes matching
1982 	 * fault.* since there are already a number of modules that
1983 	 * use fmd_nvl_create_fault to create a defect event.  Since
1984 	 * fmd_nvl_create_{fault,defect} are equivalent, for now anyway,
1985 	 * no harm is done.  So call fmd_nvl_create_suspect with last
1986 	 * argument B_FALSE.
1987 	 */
1988 	return (fmd_nvl_create_suspect(hdl, class, certainty, asru,
1989 	    fru, rsrc, FM_FAULT_CLASS ".", B_FALSE));
1990 }
1991 
1992 nvlist_t *
1993 fmd_nvl_create_defect(fmd_hdl_t *hdl, const char *class,
1994     uint8_t certainty, nvlist_t *asru, nvlist_t *fru, nvlist_t *rsrc)
1995 {
1996 	return (fmd_nvl_create_suspect(hdl, class, certainty, asru,
1997 	    fru, rsrc, FM_DEFECT_CLASS ".", B_TRUE));
1998 }
1999 
2000 const nvlist_t *
2001 fmd_hdl_fmauth(fmd_hdl_t *hdl)
2002 {
2003 	fmd_module_t *mp = fmd_api_module_lock(hdl);
2004 	const nvlist_t *auth;
2005 
2006 	auth = (const nvlist_t *)fmd.d_rmod->mod_fmri;
2007 
2008 	fmd_module_unlock(mp);
2009 
2010 	return (auth);
2011 }
2012 
2013 const nvlist_t *
2014 fmd_hdl_modauth(fmd_hdl_t *hdl)
2015 {
2016 	fmd_module_t *mp = fmd_api_module_lock(hdl);
2017 	const nvlist_t *auth;
2018 
2019 	auth = (const nvlist_t *)mp->mod_fmri;
2020 
2021 	fmd_module_unlock(mp);
2022 
2023 	return (auth);
2024 }
2025 
2026 
2027 int
2028 fmd_nvl_class_match(fmd_hdl_t *hdl, nvlist_t *nvl, const char *pattern)
2029 {
2030 	fmd_module_t *mp = fmd_api_module_lock(hdl);
2031 	char *class;
2032 	int rv;
2033 
2034 	rv = (nvl != NULL && nvlist_lookup_string(nvl,
2035 	    FM_CLASS, &class) == 0 && fmd_strmatch(class, pattern));
2036 
2037 	fmd_module_unlock(mp);
2038 	return (rv);
2039 }
2040 
2041 int
2042 fmd_nvl_fmri_expand(fmd_hdl_t *hdl, nvlist_t *nvl)
2043 {
2044 	fmd_module_t *mp = fmd_api_module_lock(hdl);
2045 	int rv;
2046 
2047 	if (nvl == NULL) {
2048 		fmd_api_error(mp, EFMD_NVL_INVAL,
2049 		    "invalid nvlist %p\n", (void *)nvl);
2050 	}
2051 
2052 	rv = fmd_fmri_expand(nvl);
2053 	fmd_module_unlock(mp);
2054 	return (rv);
2055 }
2056 
2057 int
2058 fmd_nvl_fmri_present(fmd_hdl_t *hdl, nvlist_t *nvl)
2059 {
2060 	fmd_module_t *mp = fmd_api_module_lock(hdl);
2061 	int rv;
2062 
2063 	if (nvl == NULL) {
2064 		fmd_api_error(mp, EFMD_NVL_INVAL,
2065 		    "invalid nvlist %p\n", (void *)nvl);
2066 	}
2067 
2068 	rv = fmd_fmri_present(nvl);
2069 	fmd_module_unlock(mp);
2070 
2071 	if (rv < 0) {
2072 		fmd_api_error(mp, EFMD_FMRI_OP, "invalid fmri for "
2073 		    "fmd_nvl_fmri_present\n");
2074 	}
2075 
2076 	return (rv);
2077 }
2078 
2079 int
2080 fmd_nvl_fmri_replaced(fmd_hdl_t *hdl, nvlist_t *nvl)
2081 {
2082 	fmd_module_t *mp = fmd_api_module_lock(hdl);
2083 	int rv;
2084 
2085 	if (nvl == NULL) {
2086 		fmd_api_error(mp, EFMD_NVL_INVAL,
2087 		    "invalid nvlist %p\n", (void *)nvl);
2088 	}
2089 
2090 	rv = fmd_fmri_replaced(nvl);
2091 	fmd_module_unlock(mp);
2092 
2093 	return (rv);
2094 }
2095 
2096 int
2097 fmd_nvl_fmri_unusable(fmd_hdl_t *hdl, nvlist_t *nvl)
2098 {
2099 	fmd_module_t *mp = fmd_api_module_lock(hdl);
2100 	int rv;
2101 
2102 	if (nvl == NULL) {
2103 		fmd_api_error(mp, EFMD_NVL_INVAL,
2104 		    "invalid nvlist %p\n", (void *)nvl);
2105 	}
2106 
2107 	rv = fmd_fmri_unusable(nvl);
2108 	fmd_module_unlock(mp);
2109 
2110 	if (rv < 0) {
2111 		fmd_api_error(mp, EFMD_FMRI_OP, "invalid fmri for "
2112 		    "fmd_nvl_fmri_unusable\n");
2113 	}
2114 
2115 	return (rv);
2116 }
2117 
2118 int
2119 fmd_nvl_fmri_retire(fmd_hdl_t *hdl, nvlist_t *nvl)
2120 {
2121 	fmd_module_t *mp = fmd_api_module_lock(hdl);
2122 	int rv;
2123 
2124 	if (nvl == NULL) {
2125 		fmd_api_error(mp, EFMD_NVL_INVAL,
2126 		    "invalid nvlist %p\n", (void *)nvl);
2127 	}
2128 
2129 	rv = fmd_fmri_retire(nvl);
2130 	fmd_module_unlock(mp);
2131 
2132 	return (rv);
2133 }
2134 
2135 int
2136 fmd_nvl_fmri_unretire(fmd_hdl_t *hdl, nvlist_t *nvl)
2137 {
2138 	fmd_module_t *mp = fmd_api_module_lock(hdl);
2139 	int rv;
2140 
2141 	if (nvl == NULL) {
2142 		fmd_api_error(mp, EFMD_NVL_INVAL,
2143 		    "invalid nvlist %p\n", (void *)nvl);
2144 	}
2145 
2146 	rv = fmd_fmri_unretire(nvl);
2147 	fmd_module_unlock(mp);
2148 
2149 	return (rv);
2150 }
2151 
2152 int
2153 fmd_nvl_fmri_service_state(fmd_hdl_t *hdl, nvlist_t *nvl)
2154 {
2155 	fmd_module_t *mp = fmd_api_module_lock(hdl);
2156 	int rv;
2157 
2158 	if (nvl == NULL) {
2159 		fmd_api_error(mp, EFMD_NVL_INVAL,
2160 		    "invalid nvlist %p\n", (void *)nvl);
2161 	}
2162 
2163 	rv = fmd_fmri_service_state(nvl);
2164 	if (rv < 0)
2165 		rv = fmd_fmri_unusable(nvl) ? FMD_SERVICE_STATE_UNUSABLE :
2166 		    FMD_SERVICE_STATE_OK;
2167 	fmd_module_unlock(mp);
2168 
2169 	if (rv < 0) {
2170 		fmd_api_error(mp, EFMD_FMRI_OP, "invalid fmri for "
2171 		    "fmd_nvl_fmri_service_state\n");
2172 	}
2173 
2174 	return (rv);
2175 }
2176 
2177 typedef struct {
2178 	const char	*class;
2179 	int	*rvp;
2180 } fmd_has_fault_arg_t;
2181 
2182 static void
2183 fmd_rsrc_has_fault(fmd_asru_link_t *alp, void *arg)
2184 {
2185 	fmd_has_fault_arg_t *fhfp = (fmd_has_fault_arg_t *)arg;
2186 	char *class;
2187 
2188 	if (fhfp->class == NULL) {
2189 		if (alp->al_flags & FMD_ASRU_FAULTY)
2190 			*fhfp->rvp = 1;
2191 	} else {
2192 		if ((alp->al_flags & FMD_ASRU_FAULTY) &&
2193 		    alp->al_event != NULL && nvlist_lookup_string(alp->al_event,
2194 		    FM_CLASS, &class) == 0 && fmd_strmatch(class, fhfp->class))
2195 			*fhfp->rvp = 1;
2196 	}
2197 }
2198 
2199 int
2200 fmd_nvl_fmri_has_fault(fmd_hdl_t *hdl, nvlist_t *nvl, int type, char *class)
2201 {
2202 	fmd_module_t *mp = fmd_api_module_lock(hdl);
2203 	fmd_asru_hash_t *ahp = fmd.d_asrus;
2204 	int rv = 0;
2205 	char *name;
2206 	int namelen;
2207 	fmd_has_fault_arg_t fhf;
2208 
2209 	if (nvl == NULL) {
2210 		fmd_api_error(mp, EFMD_NVL_INVAL,
2211 		    "invalid nvlist %p\n", (void *)nvl);
2212 	}
2213 	if ((namelen = fmd_fmri_nvl2str(nvl, NULL, 0)) == -1)
2214 		fmd_api_error(mp, EFMD_NVL_INVAL,
2215 		    "invalid nvlist: %p\n", (void *)nvl);
2216 	name = fmd_alloc(namelen + 1, FMD_SLEEP);
2217 	if (fmd_fmri_nvl2str(nvl, name, namelen + 1) == -1) {
2218 		if (name != NULL)
2219 			fmd_free(name, namelen + 1);
2220 		fmd_api_error(mp, EFMD_NVL_INVAL,
2221 		    "invalid nvlist: %p\n", (void *)nvl);
2222 	}
2223 
2224 	fhf.class = class;
2225 	fhf.rvp = &rv;
2226 	if (type == FMD_HAS_FAULT_RESOURCE)
2227 		fmd_asru_hash_apply_by_rsrc(ahp, name, fmd_rsrc_has_fault,
2228 		    &fhf);
2229 	else if (type == FMD_HAS_FAULT_ASRU)
2230 		fmd_asru_hash_apply_by_asru(ahp, name, fmd_rsrc_has_fault,
2231 		    &fhf);
2232 	else if (type == FMD_HAS_FAULT_FRU)
2233 		fmd_asru_hash_apply_by_fru(ahp, name, fmd_rsrc_has_fault,
2234 		    &fhf);
2235 
2236 	if (name != NULL)
2237 		fmd_free(name, namelen + 1);
2238 	fmd_module_unlock(mp);
2239 	return (rv);
2240 }
2241 
2242 int
2243 fmd_nvl_fmri_contains(fmd_hdl_t *hdl, nvlist_t *n1, nvlist_t *n2)
2244 {
2245 	fmd_module_t *mp = fmd_api_module_lock(hdl);
2246 	int rv;
2247 
2248 	if (n1 == NULL || n2 == NULL) {
2249 		fmd_api_error(mp, EFMD_NVL_INVAL,
2250 		    "invalid nvlist(s): %p, %p\n", (void *)n1, (void *)n2);
2251 	}
2252 
2253 	rv = fmd_fmri_contains(n1, n2);
2254 	fmd_module_unlock(mp);
2255 
2256 	if (rv < 0) {
2257 		fmd_api_error(mp, EFMD_FMRI_OP, "invalid fmri for "
2258 		    "fmd_nvl_fmri_contains\n");
2259 	}
2260 
2261 	return (rv);
2262 }
2263 
2264 nvlist_t *
2265 fmd_nvl_fmri_translate(fmd_hdl_t *hdl, nvlist_t *fmri, nvlist_t *auth)
2266 {
2267 	fmd_module_t *mp = fmd_api_module_lock(hdl);
2268 	nvlist_t *xfmri;
2269 
2270 	if (fmri == NULL || auth == NULL) {
2271 		fmd_api_error(mp, EFMD_NVL_INVAL,
2272 		    "invalid nvlist(s): %p, %p\n", (void *)fmri, (void *)auth);
2273 	}
2274 
2275 	xfmri = fmd_fmri_translate(fmri, auth);
2276 	fmd_module_unlock(mp);
2277 	return (xfmri);
2278 }
2279 
2280 static int
2281 fmd_nvl_op_init(nv_alloc_t *ops, va_list ap)
2282 {
2283 	fmd_module_t *mp = va_arg(ap, fmd_module_t *);
2284 
2285 	ops->nva_arg = mp;
2286 
2287 	return (0);
2288 }
2289 
2290 static void *
2291 fmd_nvl_op_alloc_sleep(nv_alloc_t *ops, size_t size)
2292 {
2293 	fmd_module_t *mp = ops->nva_arg;
2294 
2295 	return (fmd_hdl_alloc_locked(mp, size, FMD_SLEEP));
2296 }
2297 
2298 static void *
2299 fmd_nvl_op_alloc_nosleep(nv_alloc_t *ops, size_t size)
2300 {
2301 	fmd_module_t *mp = ops->nva_arg;
2302 
2303 	return (fmd_hdl_alloc_locked(mp, size, FMD_NOSLEEP));
2304 }
2305 
2306 static void
2307 fmd_nvl_op_free(nv_alloc_t *ops, void *data, size_t size)
2308 {
2309 	fmd_module_t *mp = ops->nva_arg;
2310 
2311 	fmd_hdl_free_locked(mp, data, size);
2312 }
2313 
2314 nv_alloc_ops_t fmd_module_nva_ops_sleep = {
2315 	fmd_nvl_op_init,
2316 	NULL,
2317 	fmd_nvl_op_alloc_sleep,
2318 	fmd_nvl_op_free,
2319 	NULL
2320 };
2321 
2322 nv_alloc_ops_t fmd_module_nva_ops_nosleep = {
2323 	fmd_nvl_op_init,
2324 	NULL,
2325 	fmd_nvl_op_alloc_nosleep,
2326 	fmd_nvl_op_free,
2327 	NULL
2328 };
2329 
2330 nvlist_t *
2331 fmd_nvl_alloc(fmd_hdl_t *hdl, int flags)
2332 {
2333 	fmd_module_t *mp = fmd_api_module_lock(hdl);
2334 	nv_alloc_t *nva;
2335 	nvlist_t *nvl;
2336 	int ret;
2337 
2338 	if (flags == FMD_SLEEP)
2339 		nva = &mp->mod_nva_sleep;
2340 	else
2341 		nva = &mp->mod_nva_nosleep;
2342 
2343 	ret = nvlist_xalloc(&nvl, NV_UNIQUE_NAME, nva);
2344 
2345 	fmd_module_unlock(mp);
2346 
2347 	if (ret != 0)
2348 		return (NULL);
2349 	else
2350 		return (nvl);
2351 }
2352 
2353 nvlist_t *
2354 fmd_nvl_dup(fmd_hdl_t *hdl, nvlist_t *src, int flags)
2355 {
2356 	fmd_module_t *mp = fmd_api_module_lock(hdl);
2357 	nv_alloc_t *nva;
2358 	nvlist_t *nvl;
2359 	int ret;
2360 
2361 	if (flags == FMD_SLEEP)
2362 		nva = &mp->mod_nva_sleep;
2363 	else
2364 		nva = &mp->mod_nva_nosleep;
2365 
2366 	ret = nvlist_xdup(src, &nvl, nva);
2367 
2368 	fmd_module_unlock(mp);
2369 
2370 	if (ret != 0)
2371 		return (NULL);
2372 	else
2373 		return (nvl);
2374 }
2375 
2376 /*ARGSUSED*/
2377 void
2378 fmd_repair_fru(fmd_hdl_t *hdl, const char *fmri)
2379 {
2380 	int err;
2381 	fmd_asru_rep_arg_t fara;
2382 
2383 	fara.fara_reason = FMD_ASRU_REPAIRED;
2384 	fara.fara_bywhat = FARA_BY_FRU;
2385 	fara.fara_rval = &err;
2386 	fmd_asru_hash_apply_by_fru(fmd.d_asrus, (char *)fmri,
2387 	    fmd_asru_repaired, &fara);
2388 }
2389 
2390 /*ARGSUSED*/
2391 int
2392 fmd_repair_asru(fmd_hdl_t *hdl, const char *fmri)
2393 {
2394 	int err = FARA_ERR_RSRCNOTF;
2395 	fmd_asru_rep_arg_t fara;
2396 
2397 	fara.fara_reason = FMD_ASRU_REPAIRED;
2398 	fara.fara_rval = &err;
2399 	fara.fara_uuid = NULL;
2400 	fara.fara_bywhat = FARA_BY_ASRU;
2401 	fmd_asru_hash_apply_by_asru(fmd.d_asrus, fmri,
2402 	    fmd_asru_repaired, &fara);
2403 	return (err);
2404 }
2405 
2406 int
2407 fmd_event_local(fmd_hdl_t *hdl, fmd_event_t *ep)
2408 {
2409 	if (hdl == NULL || ep == NULL) {
2410 		fmd_api_error(fmd_api_module_lock(hdl), EFMD_EVENT_INVAL,
2411 		    "NULL parameter specified to fmd_event_local\n");
2412 	}
2413 
2414 	return (((fmd_event_impl_t *)ep)->ev_flags & FMD_EVF_LOCAL);
2415 }
2416 
2417 /*ARGSUSED*/
2418 uint64_t
2419 fmd_event_ena_create(fmd_hdl_t *hdl)
2420 {
2421 	return (fmd_ena());
2422 }
2423 
2424 fmd_xprt_t *
2425 fmd_xprt_open(fmd_hdl_t *hdl, uint_t flags, nvlist_t *auth, void *data)
2426 {
2427 	fmd_module_t *mp = fmd_api_module_lock(hdl);
2428 	fmd_xprt_t *xp;
2429 
2430 	if (flags & ~FMD_XPRT_CMASK) {
2431 		fmd_api_error(mp, EFMD_XPRT_INVAL,
2432 		    "invalid transport flags 0x%x\n", flags);
2433 	}
2434 
2435 	if ((flags & FMD_XPRT_RDWR) != FMD_XPRT_RDWR &&
2436 	    (flags & FMD_XPRT_RDWR) != FMD_XPRT_RDONLY) {
2437 		fmd_api_error(mp, EFMD_XPRT_INVAL,
2438 		    "cannot open write-only transport\n");
2439 	}
2440 
2441 	if (mp->mod_stats->ms_xprtopen.fmds_value.ui32 >=
2442 	    mp->mod_stats->ms_xprtlimit.fmds_value.ui32) {
2443 		fmd_api_error(mp, EFMD_XPRT_LIMIT, "%s request to create a "
2444 		    "transport exceeds module transport limit (%u)\n",
2445 		    mp->mod_name, mp->mod_stats->ms_xprtlimit.fmds_value.ui32);
2446 	}
2447 
2448 	if ((xp = fmd_xprt_create(mp, flags, auth, data)) == NULL)
2449 		fmd_api_error(mp, errno, "cannot create transport");
2450 
2451 	fmd_module_unlock(mp);
2452 	return (xp);
2453 }
2454 
2455 void
2456 fmd_xprt_close(fmd_hdl_t *hdl, fmd_xprt_t *xp)
2457 {
2458 	fmd_module_t *mp = fmd_api_module_lock(hdl);
2459 	fmd_xprt_impl_t *xip = fmd_api_transport_impl(hdl, xp);
2460 
2461 	/*
2462 	 * Although this could be supported, it doesn't seem necessary or worth
2463 	 * the trouble.  For now, just detect this and trigger a module abort.
2464 	 * If it is needed, transports should grow reference counts and a new
2465 	 * event type will need to be enqueued for the main thread to reap it.
2466 	 */
2467 	if (xip->xi_thread != NULL &&
2468 	    xip->xi_thread->thr_tid == pthread_self()) {
2469 		fmd_api_error(mp, EFMD_XPRT_INVAL,
2470 		    "fmd_xprt_close() cannot be called from fmdo_send()\n");
2471 	}
2472 
2473 	fmd_xprt_destroy(xp);
2474 	fmd_module_unlock(mp);
2475 }
2476 
2477 void
2478 fmd_xprt_post(fmd_hdl_t *hdl, fmd_xprt_t *xp, nvlist_t *nvl, hrtime_t hrt)
2479 {
2480 	nv_alloc_t *nva = nvlist_lookup_nv_alloc(nvl);
2481 	fmd_module_t *mp = fmd_api_module(hdl);
2482 	fmd_xprt_impl_t *xip = fmd_api_transport_impl(hdl, xp);
2483 	nvlist_t *tmp;
2484 
2485 	/*
2486 	 * If this event was allocated using the module-specific nvlist ops, we
2487 	 * need to create a copy using the standard fmd nvlist ops.  Otherwise,
2488 	 * the event may persist after the module has been unloaded and we'll
2489 	 * die when attempting to free the nvlist.
2490 	 */
2491 	if (nva == &mp->mod_nva_sleep || nva == &mp->mod_nva_nosleep) {
2492 		(void) nvlist_xdup(nvl, &tmp, &fmd.d_nva);
2493 		nvlist_free(nvl);
2494 		nvl = tmp;
2495 	}
2496 
2497 	/*
2498 	 * fmd_xprt_recv() must block during startup waiting for fmd to globally
2499 	 * clear FMD_XPRT_DSUSPENDED.  As such, we can't allow it to be called
2500 	 * from a module's _fmd_init() routine, because that would block
2501 	 * fmd from completing initial module loading, resulting in a deadlock.
2502 	 */
2503 	if ((xip->xi_flags & FMD_XPRT_ISUSPENDED) &&
2504 	    (pthread_self() == xip->xi_queue->eq_mod->mod_thread->thr_tid)) {
2505 		fmd_api_error(fmd_api_module_lock(hdl), EFMD_XPRT_INVAL,
2506 		    "fmd_xprt_post() cannot be called from _fmd_init()\n");
2507 	}
2508 
2509 	fmd_xprt_recv(xp, nvl, hrt, FMD_B_FALSE);
2510 }
2511 
2512 void
2513 fmd_xprt_log(fmd_hdl_t *hdl, fmd_xprt_t *xp, nvlist_t *nvl, hrtime_t hrt)
2514 {
2515 	fmd_xprt_impl_t *xip = fmd_api_transport_impl(hdl, xp);
2516 
2517 	/*
2518 	 * fmd_xprt_recv() must block during startup waiting for fmd to globally
2519 	 * clear FMD_XPRT_DSUSPENDED.  As such, we can't allow it to be called
2520 	 * from a module's _fmd_init() routine, because that would block
2521 	 * fmd from completing initial module loading, resulting in a deadlock.
2522 	 */
2523 	if ((xip->xi_flags & FMD_XPRT_ISUSPENDED) &&
2524 	    (pthread_self() == xip->xi_queue->eq_mod->mod_thread->thr_tid)) {
2525 		fmd_api_error(fmd_api_module_lock(hdl), EFMD_XPRT_INVAL,
2526 		    "fmd_xprt_log() cannot be called from _fmd_init()\n");
2527 	}
2528 
2529 	fmd_xprt_recv(xp, nvl, hrt, FMD_B_TRUE);
2530 }
2531 
2532 void
2533 fmd_xprt_suspend(fmd_hdl_t *hdl, fmd_xprt_t *xp)
2534 {
2535 	(void) fmd_api_transport_impl(hdl, xp); /* validate 'xp' */
2536 	fmd_xprt_xsuspend(xp, FMD_XPRT_SUSPENDED);
2537 }
2538 
2539 void
2540 fmd_xprt_resume(fmd_hdl_t *hdl, fmd_xprt_t *xp)
2541 {
2542 	(void) fmd_api_transport_impl(hdl, xp); /* validate 'xp' */
2543 	fmd_xprt_xresume(xp, FMD_XPRT_SUSPENDED);
2544 }
2545 
2546 int
2547 fmd_xprt_error(fmd_hdl_t *hdl, fmd_xprt_t *xp)
2548 {
2549 	fmd_xprt_impl_t *xip = fmd_api_transport_impl(hdl, xp);
2550 	return (xip->xi_state == _fmd_xprt_state_err);
2551 }
2552 
2553 /*
2554  * Translate all FMRIs in the specified name-value pair list for the specified
2555  * FMRI authority, and return a new name-value pair list for the translation.
2556  * This function is the recursive engine used by fmd_xprt_translate(), below.
2557  */
2558 static nvlist_t *
2559 fmd_xprt_xtranslate(nvlist_t *nvl, nvlist_t *auth)
2560 {
2561 	uint_t i, j, n;
2562 	nvpair_t *nvp, **nvps;
2563 	uint_t nvpslen = 0;
2564 	char *name;
2565 	size_t namelen = 0;
2566 
2567 	nvlist_t **a, **b;
2568 	nvlist_t *l, *r;
2569 	data_type_t type;
2570 	char *s;
2571 	int err;
2572 
2573 	(void) nvlist_xdup(nvl, &nvl, &fmd.d_nva);
2574 
2575 	/*
2576 	 * Count up the number of name-value pairs in 'nvl' and compute the
2577 	 * maximum length of a name used in this list for use below.
2578 	 */
2579 	for (nvp = nvlist_next_nvpair(nvl, NULL);
2580 	    nvp != NULL; nvp = nvlist_next_nvpair(nvl, nvp), nvpslen++) {
2581 		size_t len = strlen(nvpair_name(nvp));
2582 		namelen = MAX(namelen, len);
2583 	}
2584 
2585 	nvps = alloca(sizeof (nvpair_t *) * nvpslen);
2586 	name = alloca(namelen + 1);
2587 
2588 	/*
2589 	 * Store a snapshot of the name-value pairs in 'nvl' into nvps[] so
2590 	 * that we can iterate over the original pairs in the loop below while
2591 	 * performing arbitrary insert and delete operations on 'nvl' itself.
2592 	 */
2593 	for (i = 0, nvp = nvlist_next_nvpair(nvl, NULL);
2594 	    nvp != NULL; nvp = nvlist_next_nvpair(nvl, nvp))
2595 		nvps[i++] = nvp;
2596 
2597 	/*
2598 	 * Now iterate over the snapshot of the name-value pairs.  If we find a
2599 	 * value that is of type NVLIST or NVLIST_ARRAY, we translate that
2600 	 * object by either calling ourself recursively on it, or calling into
2601 	 * fmd_fmri_translate() if the object is an FMRI.  We then rip out the
2602 	 * original name-value pair and replace it with the translated one.
2603 	 */
2604 	for (i = 0; i < nvpslen; i++) {
2605 		nvp = nvps[i];
2606 		type = nvpair_type(nvp);
2607 
2608 		switch (type) {
2609 		case DATA_TYPE_NVLIST_ARRAY:
2610 			if (nvpair_value_nvlist_array(nvp, &a, &n) != 0 ||
2611 			    a == NULL || n == 0)
2612 				continue; /* array is zero-sized; skip it */
2613 
2614 			b = fmd_alloc(sizeof (nvlist_t *) * n, FMD_SLEEP);
2615 
2616 			/*
2617 			 * If the first array nvlist element looks like an FMRI
2618 			 * then assume the other elements are FMRIs as well.
2619 			 * If any b[j]'s can't be translated, then EINVAL will
2620 			 * be returned from nvlist_add_nvlist_array() below.
2621 			 */
2622 			if (nvlist_lookup_string(*a, FM_FMRI_SCHEME, &s) == 0) {
2623 				for (j = 0; j < n; j++)
2624 					b[j] = fmd_fmri_translate(a[j], auth);
2625 			} else {
2626 				for (j = 0; j < n; j++)
2627 					b[j] = fmd_xprt_xtranslate(a[j], auth);
2628 			}
2629 
2630 			(void) strcpy(name, nvpair_name(nvp));
2631 			(void) nvlist_remove(nvl, name, type);
2632 			err = nvlist_add_nvlist_array(nvl, name, b, n);
2633 
2634 			for (j = 0; j < n; j++)
2635 				nvlist_free(b[j]);
2636 
2637 			fmd_free(b, sizeof (nvlist_t *) * n);
2638 
2639 			if (err != 0) {
2640 				nvlist_free(nvl);
2641 				errno = err;
2642 				return (NULL);
2643 			}
2644 			break;
2645 
2646 		case DATA_TYPE_NVLIST:
2647 			if (nvpair_value_nvlist(nvp, &l) == 0 &&
2648 			    nvlist_lookup_string(l, FM_FMRI_SCHEME, &s) == 0)
2649 				r = fmd_fmri_translate(l, auth);
2650 			else
2651 				r = fmd_xprt_xtranslate(l, auth);
2652 
2653 			if (r == NULL) {
2654 				nvlist_free(nvl);
2655 				return (NULL);
2656 			}
2657 
2658 			(void) strcpy(name, nvpair_name(nvp));
2659 			(void) nvlist_remove(nvl, name, type);
2660 			(void) nvlist_add_nvlist(nvl, name, r);
2661 
2662 			nvlist_free(r);
2663 			break;
2664 		}
2665 	}
2666 
2667 	return (nvl);
2668 }
2669 
2670 nvlist_t *
2671 fmd_xprt_translate(fmd_hdl_t *hdl, fmd_xprt_t *xp, fmd_event_t *ep)
2672 {
2673 	fmd_xprt_impl_t *xip = fmd_api_transport_impl(hdl, xp);
2674 
2675 	if (xip->xi_auth == NULL) {
2676 		fmd_api_error(fmd_api_module_lock(hdl), EFMD_XPRT_INVAL,
2677 		    "no authority defined for transport %p\n", (void *)xp);
2678 	}
2679 
2680 	return (fmd_xprt_xtranslate(FMD_EVENT_NVL(ep), xip->xi_auth));
2681 }
2682 
2683 /*ARGSUSED*/
2684 void
2685 fmd_xprt_add_domain(fmd_hdl_t *hdl, nvlist_t *nvl, char *domain)
2686 {
2687 	nvpair_t *nvp, *nvp2;
2688 	nvlist_t *nvl2, *nvl3;
2689 	char *class;
2690 
2691 	if (nvl == NULL || domain == NULL)
2692 		return;
2693 	for (nvp = nvlist_next_nvpair(nvl, NULL); nvp != NULL;
2694 	    nvp = nvlist_next_nvpair(nvl, nvp)) {
2695 		if (strcmp(nvpair_name(nvp), FM_CLASS) == 0) {
2696 			(void) nvpair_value_string(nvp, &class);
2697 			if (strcmp(class, FM_LIST_SUSPECT_CLASS) != 0)
2698 				return;
2699 		}
2700 	}
2701 	for (nvp = nvlist_next_nvpair(nvl, NULL); nvp != NULL;
2702 	    nvp = nvlist_next_nvpair(nvl, nvp)) {
2703 		if (strcmp(nvpair_name(nvp), FM_SUSPECT_DE) == 0) {
2704 			(void) nvpair_value_nvlist(nvp, &nvl2);
2705 			for (nvp2 = nvlist_next_nvpair(nvl2, NULL);
2706 			    nvp2 != NULL;
2707 			    nvp2 = nvlist_next_nvpair(nvl2, nvp2)) {
2708 				if (strcmp(nvpair_name(nvp2),
2709 				    FM_FMRI_AUTHORITY) == 0) {
2710 					(void) nvpair_value_nvlist(nvp2, &nvl3);
2711 					(void) nvlist_add_string(nvl3,
2712 					    FM_FMRI_AUTH_DOMAIN, domain);
2713 					break;
2714 				}
2715 			}
2716 			break;
2717 		}
2718 	}
2719 }
2720 
2721 void
2722 fmd_xprt_setspecific(fmd_hdl_t *hdl, fmd_xprt_t *xp, void *data)
2723 {
2724 	fmd_api_transport_impl(hdl, xp)->xi_data = data;
2725 }
2726 
2727 void *
2728 fmd_xprt_getspecific(fmd_hdl_t *hdl, fmd_xprt_t *xp)
2729 {
2730 	return (fmd_api_transport_impl(hdl, xp)->xi_data);
2731 }
2732