xref: /illumos-gate/usr/src/cmd/svc/svccfg/svccfg_libscf.c (revision 03270635d68df6a0392fb8f4b7c04acad764648b)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright (c) 2004, 2010, Oracle and/or its affiliates. All rights reserved.
24  * Copyright 2015 Joyent, Inc.
25  * Copyright 2012 Milan Jurik. All rights reserved.
26  * Copyright 2017 RackTop Systems.
27  * Copyright 2018 OmniOS Community Edition (OmniOSce) Association.
28  */
29 
30 
31 #include <alloca.h>
32 #include <assert.h>
33 #include <ctype.h>
34 #include <door.h>
35 #include <errno.h>
36 #include <fcntl.h>
37 #include <fnmatch.h>
38 #include <inttypes.h>
39 #include <libintl.h>
40 #include <libnvpair.h>
41 #include <libscf.h>
42 #include <libscf_priv.h>
43 #include <libtecla.h>
44 #include <libuutil.h>
45 #include <limits.h>
46 #include <locale.h>
47 #include <stdarg.h>
48 #include <string.h>
49 #include <strings.h>
50 #include <time.h>
51 #include <unistd.h>
52 #include <wait.h>
53 #include <poll.h>
54 
55 #include <libxml/tree.h>
56 
57 #include <sys/param.h>
58 
59 #include <sys/stat.h>
60 #include <sys/mman.h>
61 
62 #include "svccfg.h"
63 #include "notify_params.h"
64 #include "manifest_hash.h"
65 #include "manifest_find.h"
66 
67 /* The colon namespaces in each entity (each followed by a newline). */
68 #define	COLON_NAMESPACES	":properties\n"
69 
70 #define	TEMP_FILE_PATTERN	"/tmp/svccfg-XXXXXX"
71 
72 /* These are characters which the lexer requires to be in double-quotes. */
73 #define	CHARS_TO_QUOTE		" \t\n\\>=\"()"
74 
75 #define	HASH_SIZE		16
76 #define	HASH_PG_TYPE		"framework"
77 #define	HASH_PG_FLAGS		0
78 #define	HASH_PROP		"md5sum"
79 
80 /*
81  * Indentation used in the output of the describe subcommand.
82  */
83 #define	TMPL_VALUE_INDENT	"  "
84 #define	TMPL_INDENT		"    "
85 #define	TMPL_INDENT_2X		"        "
86 #define	TMPL_CHOICE_INDENT	"      "
87 
88 /*
89  * Directory locations for manifests
90  */
91 #define	VARSVC_DIR		"/var/svc/manifest"
92 #define	LIBSVC_DIR		"/lib/svc/manifest"
93 #define	VARSVC_PR		"var_svc_manifest"
94 #define	LIBSVC_PR		"lib_svc_manifest"
95 #define	MFSTFILEPR		"manifestfile"
96 
97 #define	SUPPORTPROP		"support"
98 
99 #define	MFSTHISTFILE		"/lib/svc/share/mfsthistory"
100 
101 #define	MFSTFILE_MAX		16
102 
103 /*
104  * These are the classes of elements which may appear as children of service
105  * or instance elements in XML manifests.
106  */
107 struct entity_elts {
108 	xmlNodePtr	create_default_instance;
109 	xmlNodePtr	single_instance;
110 	xmlNodePtr	restarter;
111 	xmlNodePtr	dependencies;
112 	xmlNodePtr	dependents;
113 	xmlNodePtr	method_context;
114 	xmlNodePtr	exec_methods;
115 	xmlNodePtr	notify_params;
116 	xmlNodePtr	property_groups;
117 	xmlNodePtr	instances;
118 	xmlNodePtr	stability;
119 	xmlNodePtr	template;
120 };
121 
122 /*
123  * Likewise for property_group elements.
124  */
125 struct pg_elts {
126 	xmlNodePtr	stability;
127 	xmlNodePtr	propvals;
128 	xmlNodePtr	properties;
129 };
130 
131 /*
132  * Likewise for template elements.
133  */
134 struct template_elts {
135 	xmlNodePtr	common_name;
136 	xmlNodePtr	description;
137 	xmlNodePtr	documentation;
138 };
139 
140 /*
141  * Likewise for type (for notification parameters) elements.
142  */
143 struct params_elts {
144 	xmlNodePtr	paramval;
145 	xmlNodePtr	parameter;
146 };
147 
148 /*
149  * This structure is for snaplevel lists.  They are convenient because libscf
150  * only allows traversing snaplevels in one direction.
151  */
152 struct snaplevel {
153 	uu_list_node_t	list_node;
154 	scf_snaplevel_t	*sl;
155 };
156 
157 /*
158  * This is used for communication between lscf_service_export and
159  * export_callback.
160  */
161 struct export_args {
162 	const char	*filename;
163 	int		flags;
164 };
165 
166 /*
167  * The service_manifest structure is used by the upgrade process
168  * to create a list of service to manifest linkages from the manifests
169  * in a set of given directories.
170  */
171 typedef struct service_manifest {
172 	const char	*servicename;
173 	uu_list_t	*mfstlist;
174 	size_t	mfstlist_sz;
175 
176 	uu_avl_node_t	svcmfst_node;
177 } service_manifest_t;
178 
179 /*
180  * Structure to track the manifest file property group
181  * and the manifest file associated with that property
182  * group.  Also, a flag to keep the access once it has
183  * been checked.
184  */
185 struct mpg_mfile {
186 	char	*mpg;
187 	char	*mfile;
188 	int	access;
189 };
190 
191 const char * const scf_pg_general = SCF_PG_GENERAL;
192 const char * const scf_group_framework = SCF_GROUP_FRAMEWORK;
193 const char * const scf_property_enabled = SCF_PROPERTY_ENABLED;
194 const char * const scf_property_external = "external";
195 
196 const char * const snap_initial = "initial";
197 const char * const snap_lastimport = "last-import";
198 const char * const snap_previous = "previous";
199 const char * const snap_running = "running";
200 
201 scf_handle_t *g_hndl = NULL;	/* only valid after lscf_prep_hndl() */
202 
203 ssize_t max_scf_fmri_len;
204 ssize_t max_scf_name_len;
205 ssize_t max_scf_pg_type_len;
206 ssize_t max_scf_value_len;
207 static size_t max_scf_len;
208 
209 static scf_scope_t *cur_scope;
210 static scf_service_t *cur_svc = NULL;
211 static scf_instance_t *cur_inst = NULL;
212 static scf_snapshot_t *cur_snap = NULL;
213 static scf_snaplevel_t *cur_level = NULL;
214 
215 static uu_list_pool_t *snaplevel_pool;
216 /* cur_levels is the snaplevels of cur_snap, from least specific to most. */
217 static uu_list_t *cur_levels;
218 static struct snaplevel *cur_elt;		/* cur_elt->sl == cur_level */
219 
220 static FILE *tempfile = NULL;
221 static char tempfilename[sizeof (TEMP_FILE_PATTERN)] = "";
222 
223 static const char *emsg_entity_not_selected;
224 static const char *emsg_permission_denied;
225 static const char *emsg_create_xml;
226 static const char *emsg_cant_modify_snapshots;
227 static const char *emsg_invalid_for_snapshot;
228 static const char *emsg_read_only;
229 static const char *emsg_deleted;
230 static const char *emsg_invalid_pg_name;
231 static const char *emsg_invalid_prop_name;
232 static const char *emsg_no_such_pg;
233 static const char *emsg_fmri_invalid_pg_name;
234 static const char *emsg_fmri_invalid_pg_name_type;
235 static const char *emsg_pg_added;
236 static const char *emsg_pg_changed;
237 static const char *emsg_pg_deleted;
238 static const char *emsg_pg_mod_perm;
239 static const char *emsg_pg_add_perm;
240 static const char *emsg_pg_del_perm;
241 static const char *emsg_snap_perm;
242 static const char *emsg_dpt_dangling;
243 static const char *emsg_dpt_no_dep;
244 
245 static int li_only = 0;
246 static int no_refresh = 0;
247 
248 /* how long in ns we should wait between checks for a pg */
249 static uint64_t pg_timeout = 100 * (NANOSEC / MILLISEC);
250 
251 /* import globals, to minimize allocations */
252 static scf_scope_t *imp_scope = NULL;
253 static scf_service_t *imp_svc = NULL, *imp_tsvc = NULL;
254 static scf_instance_t *imp_inst = NULL, *imp_tinst = NULL;
255 static scf_snapshot_t *imp_snap = NULL, *imp_lisnap = NULL, *imp_tlisnap = NULL;
256 static scf_snapshot_t *imp_rsnap = NULL;
257 static scf_snaplevel_t *imp_snpl = NULL, *imp_rsnpl = NULL;
258 static scf_propertygroup_t *imp_pg = NULL, *imp_pg2 = NULL;
259 static scf_property_t *imp_prop = NULL;
260 static scf_iter_t *imp_iter = NULL;
261 static scf_iter_t *imp_rpg_iter = NULL;
262 static scf_iter_t *imp_up_iter = NULL;
263 static scf_transaction_t *imp_tx = NULL;	/* always reset this */
264 static char *imp_str = NULL;
265 static size_t imp_str_sz;
266 static char *imp_tsname = NULL;
267 static char *imp_fe1 = NULL;		/* for fmri_equal() */
268 static char *imp_fe2 = NULL;
269 static uu_list_t *imp_deleted_dpts = NULL;	/* pgroup_t's to refresh */
270 
271 /* upgrade_dependents() globals */
272 static scf_instance_t *ud_inst = NULL;
273 static scf_snaplevel_t *ud_snpl = NULL;
274 static scf_propertygroup_t *ud_pg = NULL;
275 static scf_propertygroup_t *ud_cur_depts_pg = NULL;
276 static scf_propertygroup_t *ud_run_dpts_pg = NULL;
277 static int ud_run_dpts_pg_set = 0;
278 static scf_property_t *ud_prop = NULL;
279 static scf_property_t *ud_dpt_prop = NULL;
280 static scf_value_t *ud_val = NULL;
281 static scf_iter_t *ud_iter = NULL, *ud_iter2 = NULL;
282 static scf_transaction_t *ud_tx = NULL;
283 static char *ud_ctarg = NULL;
284 static char *ud_oldtarg = NULL;
285 static char *ud_name = NULL;
286 
287 /* export globals */
288 static scf_instance_t *exp_inst;
289 static scf_propertygroup_t *exp_pg;
290 static scf_property_t *exp_prop;
291 static scf_value_t *exp_val;
292 static scf_iter_t *exp_inst_iter, *exp_pg_iter, *exp_prop_iter, *exp_val_iter;
293 static char *exp_str;
294 static size_t exp_str_sz;
295 
296 /* cleanup globals */
297 static uu_avl_pool_t *service_manifest_pool = NULL;
298 static uu_avl_t *service_manifest_tree = NULL;
299 
300 static void scfdie_lineno(int lineno) __NORETURN;
301 
302 static char *start_method_names[] = {
303 	"start",
304 	"inetd_start",
305 	NULL
306 };
307 
308 static struct uri_scheme {
309 	const char *scheme;
310 	const char *protocol;
311 } uri_scheme[] = {
312 	{ "mailto", "smtp" },
313 	{ "snmp", "snmp" },
314 	{ "syslog", "syslog" },
315 	{ NULL, NULL }
316 };
317 #define	URI_SCHEME_NUM ((sizeof (uri_scheme) / \
318     sizeof (struct uri_scheme)) - 1)
319 
320 static int
321 check_uri_scheme(const char *scheme)
322 {
323 	int i;
324 
325 	for (i = 0; uri_scheme[i].scheme != NULL; ++i) {
326 		if (strcmp(scheme, uri_scheme[i].scheme) == 0)
327 			return (i);
328 	}
329 
330 	return (-1);
331 }
332 
333 static int
334 check_uri_protocol(const char *p)
335 {
336 	int i;
337 
338 	for (i = 0; uri_scheme[i].protocol != NULL; ++i) {
339 		if (strcmp(p, uri_scheme[i].protocol) == 0)
340 			return (i);
341 	}
342 
343 	return (-1);
344 }
345 
346 /*
347  * For unexpected libscf errors.
348  */
349 #ifdef NDEBUG
350 
351 static void scfdie(void) __NORETURN;
352 
353 static void
354 scfdie(void)
355 {
356 	scf_error_t err = scf_error();
357 
358 	if (err == SCF_ERROR_CONNECTION_BROKEN)
359 		uu_die(gettext("Repository connection broken.  Exiting.\n"));
360 
361 	uu_die(gettext("Unexpected fatal libscf error: %s.  Exiting.\n"),
362 	    scf_strerror(err));
363 }
364 
365 #else
366 
367 #define	scfdie()	scfdie_lineno(__LINE__)
368 
369 static void
370 scfdie_lineno(int lineno)
371 {
372 	scf_error_t err = scf_error();
373 
374 	if (err == SCF_ERROR_CONNECTION_BROKEN)
375 		uu_die(gettext("Repository connection broken.  Exiting.\n"));
376 
377 	uu_die(gettext("Unexpected libscf error on line %d of " __FILE__
378 	    ": %s.\n"), lineno, scf_strerror(err));
379 }
380 
381 #endif
382 
383 static void
384 scfwarn(void)
385 {
386 	warn(gettext("Unexpected libscf error: %s.\n"),
387 	    scf_strerror(scf_error()));
388 }
389 
390 /*
391  * Clear a field of a structure.
392  */
393 static int
394 clear_int(void *a, void *b)
395 {
396 	/* LINTED */
397 	*(int *)((char *)a + (size_t)b) = 0;
398 
399 	return (UU_WALK_NEXT);
400 }
401 
402 static int
403 scferror2errno(scf_error_t err)
404 {
405 	switch (err) {
406 	case SCF_ERROR_BACKEND_ACCESS:
407 		return (EACCES);
408 
409 	case SCF_ERROR_BACKEND_READONLY:
410 		return (EROFS);
411 
412 	case SCF_ERROR_CONNECTION_BROKEN:
413 		return (ECONNABORTED);
414 
415 	case SCF_ERROR_CONSTRAINT_VIOLATED:
416 	case SCF_ERROR_INVALID_ARGUMENT:
417 		return (EINVAL);
418 
419 	case SCF_ERROR_DELETED:
420 		return (ECANCELED);
421 
422 	case SCF_ERROR_EXISTS:
423 		return (EEXIST);
424 
425 	case SCF_ERROR_NO_MEMORY:
426 		return (ENOMEM);
427 
428 	case SCF_ERROR_NO_RESOURCES:
429 		return (ENOSPC);
430 
431 	case SCF_ERROR_NOT_FOUND:
432 		return (ENOENT);
433 
434 	case SCF_ERROR_PERMISSION_DENIED:
435 		return (EPERM);
436 
437 	default:
438 #ifndef NDEBUG
439 		(void) fprintf(stderr, "%s:%d: Unknown libscf error %d.\n",
440 		    __FILE__, __LINE__, err);
441 #else
442 		(void) fprintf(stderr, "Unknown libscf error %d.\n", err);
443 #endif
444 		abort();
445 		/* NOTREACHED */
446 	}
447 }
448 
449 static int
450 entity_get_pg(void *ent, int issvc, const char *name,
451     scf_propertygroup_t *pg)
452 {
453 	if (issvc)
454 		return (scf_service_get_pg(ent, name, pg));
455 	else
456 		return (scf_instance_get_pg(ent, name, pg));
457 }
458 
459 static void
460 entity_destroy(void *ent, int issvc)
461 {
462 	if (issvc)
463 		scf_service_destroy(ent);
464 	else
465 		scf_instance_destroy(ent);
466 }
467 
468 static int
469 get_pg(const char *pg_name, scf_propertygroup_t *pg)
470 {
471 	int ret;
472 
473 	if (cur_level != NULL)
474 		ret = scf_snaplevel_get_pg(cur_level, pg_name, pg);
475 	else if (cur_inst != NULL)
476 		ret = scf_instance_get_pg(cur_inst, pg_name, pg);
477 	else
478 		ret = scf_service_get_pg(cur_svc, pg_name, pg);
479 
480 	return (ret);
481 }
482 
483 /*
484  * Find a snaplevel in a snapshot.  If get_svc is true, find the service
485  * snaplevel.  Otherwise find the instance snaplevel.
486  *
487  * Returns
488  *   0 - success
489  *   ECONNABORTED - repository connection broken
490  *   ECANCELED - instance containing snap was deleted
491  *   ENOENT - snap has no snaplevels
492  *	    - requested snaplevel not found
493  */
494 static int
495 get_snaplevel(scf_snapshot_t *snap, int get_svc, scf_snaplevel_t *snpl)
496 {
497 	if (scf_snapshot_get_base_snaplevel(snap, snpl) != 0) {
498 		switch (scf_error()) {
499 		case SCF_ERROR_CONNECTION_BROKEN:
500 		case SCF_ERROR_DELETED:
501 		case SCF_ERROR_NOT_FOUND:
502 			return (scferror2errno(scf_error()));
503 
504 		case SCF_ERROR_HANDLE_MISMATCH:
505 		case SCF_ERROR_NOT_BOUND:
506 		case SCF_ERROR_NOT_SET:
507 		default:
508 			bad_error("scf_snapshot_get_base_snaplevel",
509 			    scf_error());
510 		}
511 	}
512 
513 	for (;;) {
514 		ssize_t ssz;
515 
516 		ssz = scf_snaplevel_get_instance_name(snpl, NULL, 0);
517 		if (ssz >= 0) {
518 			if (!get_svc)
519 				return (0);
520 		} else {
521 			switch (scf_error()) {
522 			case SCF_ERROR_CONSTRAINT_VIOLATED:
523 				if (get_svc)
524 					return (0);
525 				break;
526 
527 			case SCF_ERROR_DELETED:
528 			case SCF_ERROR_CONNECTION_BROKEN:
529 				return (scferror2errno(scf_error()));
530 
531 			case SCF_ERROR_NOT_SET:
532 			case SCF_ERROR_NOT_BOUND:
533 			default:
534 				bad_error("scf_snaplevel_get_instance_name",
535 				    scf_error());
536 			}
537 		}
538 
539 		if (scf_snaplevel_get_next_snaplevel(snpl, snpl) != 0) {
540 			switch (scf_error()) {
541 			case SCF_ERROR_NOT_FOUND:
542 			case SCF_ERROR_CONNECTION_BROKEN:
543 			case SCF_ERROR_DELETED:
544 				return (scferror2errno(scf_error()));
545 
546 			case SCF_ERROR_HANDLE_MISMATCH:
547 			case SCF_ERROR_NOT_BOUND:
548 			case SCF_ERROR_NOT_SET:
549 			case SCF_ERROR_INVALID_ARGUMENT:
550 			default:
551 				bad_error("scf_snaplevel_get_next_snaplevel",
552 				    scf_error());
553 			}
554 		}
555 	}
556 }
557 
558 /*
559  * If issvc is 0, take ent to be a pointer to an scf_instance_t.  If it has
560  * a running snapshot, and that snapshot has an instance snaplevel, set pg to
561  * the property group named name in it.  If it doesn't have a running
562  * snapshot, set pg to the instance's current property group named name.
563  *
564  * If issvc is nonzero, take ent to be a pointer to an scf_service_t, and walk
565  * its instances.  If one has a running snapshot with a service snaplevel, set
566  * pg to the property group named name in it.  If no such snaplevel could be
567  * found, set pg to the service's current property group named name.
568  *
569  * iter, inst, snap, and snpl are required scratch objects.
570  *
571  * Returns
572  *   0 - success
573  *   ECONNABORTED - repository connection broken
574  *   ECANCELED - ent was deleted
575  *   ENOENT - no such property group
576  *   EINVAL - name is an invalid property group name
577  *   EBADF - found running snapshot is missing a snaplevel
578  */
579 static int
580 entity_get_running_pg(void *ent, int issvc, const char *name,
581     scf_propertygroup_t *pg, scf_iter_t *iter, scf_instance_t *inst,
582     scf_snapshot_t *snap, scf_snaplevel_t *snpl)
583 {
584 	int r;
585 
586 	if (issvc) {
587 		/* Search for an instance with a running snapshot. */
588 		if (scf_iter_service_instances(iter, ent) != 0) {
589 			switch (scf_error()) {
590 			case SCF_ERROR_DELETED:
591 			case SCF_ERROR_CONNECTION_BROKEN:
592 				return (scferror2errno(scf_error()));
593 
594 			case SCF_ERROR_NOT_SET:
595 			case SCF_ERROR_NOT_BOUND:
596 			case SCF_ERROR_HANDLE_MISMATCH:
597 			default:
598 				bad_error("scf_iter_service_instances",
599 				    scf_error());
600 			}
601 		}
602 
603 		for (;;) {
604 			r = scf_iter_next_instance(iter, inst);
605 			if (r == 0) {
606 				if (scf_service_get_pg(ent, name, pg) == 0)
607 					return (0);
608 
609 				switch (scf_error()) {
610 				case SCF_ERROR_DELETED:
611 				case SCF_ERROR_NOT_FOUND:
612 				case SCF_ERROR_INVALID_ARGUMENT:
613 				case SCF_ERROR_CONNECTION_BROKEN:
614 					return (scferror2errno(scf_error()));
615 
616 				case SCF_ERROR_NOT_BOUND:
617 				case SCF_ERROR_HANDLE_MISMATCH:
618 				case SCF_ERROR_NOT_SET:
619 				default:
620 					bad_error("scf_service_get_pg",
621 					    scf_error());
622 				}
623 			}
624 			if (r != 1) {
625 				switch (scf_error()) {
626 				case SCF_ERROR_DELETED:
627 				case SCF_ERROR_CONNECTION_BROKEN:
628 					return (scferror2errno(scf_error()));
629 
630 				case SCF_ERROR_INVALID_ARGUMENT:
631 				case SCF_ERROR_NOT_SET:
632 				case SCF_ERROR_NOT_BOUND:
633 				case SCF_ERROR_HANDLE_MISMATCH:
634 				default:
635 					bad_error("scf_iter_next_instance",
636 					    scf_error());
637 				}
638 			}
639 
640 			if (scf_instance_get_snapshot(inst, snap_running,
641 			    snap) == 0)
642 				break;
643 
644 			switch (scf_error()) {
645 			case SCF_ERROR_NOT_FOUND:
646 			case SCF_ERROR_DELETED:
647 				continue;
648 
649 			case SCF_ERROR_CONNECTION_BROKEN:
650 				return (ECONNABORTED);
651 
652 			case SCF_ERROR_HANDLE_MISMATCH:
653 			case SCF_ERROR_INVALID_ARGUMENT:
654 			case SCF_ERROR_NOT_SET:
655 			case SCF_ERROR_NOT_BOUND:
656 			default:
657 				bad_error("scf_instance_get_snapshot",
658 				    scf_error());
659 			}
660 		}
661 	} else {
662 		if (scf_instance_get_snapshot(ent, snap_running, snap) != 0) {
663 			switch (scf_error()) {
664 			case SCF_ERROR_NOT_FOUND:
665 				break;
666 
667 			case SCF_ERROR_DELETED:
668 			case SCF_ERROR_CONNECTION_BROKEN:
669 				return (scferror2errno(scf_error()));
670 
671 			case SCF_ERROR_NOT_BOUND:
672 			case SCF_ERROR_HANDLE_MISMATCH:
673 			case SCF_ERROR_INVALID_ARGUMENT:
674 			case SCF_ERROR_NOT_SET:
675 			default:
676 				bad_error("scf_instance_get_snapshot",
677 				    scf_error());
678 			}
679 
680 			if (scf_instance_get_pg(ent, name, pg) == 0)
681 				return (0);
682 
683 			switch (scf_error()) {
684 			case SCF_ERROR_DELETED:
685 			case SCF_ERROR_NOT_FOUND:
686 			case SCF_ERROR_INVALID_ARGUMENT:
687 			case SCF_ERROR_CONNECTION_BROKEN:
688 				return (scferror2errno(scf_error()));
689 
690 			case SCF_ERROR_NOT_BOUND:
691 			case SCF_ERROR_HANDLE_MISMATCH:
692 			case SCF_ERROR_NOT_SET:
693 			default:
694 				bad_error("scf_instance_get_pg", scf_error());
695 			}
696 		}
697 	}
698 
699 	r = get_snaplevel(snap, issvc, snpl);
700 	switch (r) {
701 	case 0:
702 		break;
703 
704 	case ECONNABORTED:
705 	case ECANCELED:
706 		return (r);
707 
708 	case ENOENT:
709 		return (EBADF);
710 
711 	default:
712 		bad_error("get_snaplevel", r);
713 	}
714 
715 	if (scf_snaplevel_get_pg(snpl, name, pg) == 0)
716 		return (0);
717 
718 	switch (scf_error()) {
719 	case SCF_ERROR_DELETED:
720 	case SCF_ERROR_INVALID_ARGUMENT:
721 	case SCF_ERROR_CONNECTION_BROKEN:
722 	case SCF_ERROR_NOT_FOUND:
723 		return (scferror2errno(scf_error()));
724 
725 	case SCF_ERROR_NOT_BOUND:
726 	case SCF_ERROR_HANDLE_MISMATCH:
727 	case SCF_ERROR_NOT_SET:
728 	default:
729 		bad_error("scf_snaplevel_get_pg", scf_error());
730 		/* NOTREACHED */
731 	}
732 }
733 
734 /*
735  * To be registered with atexit().
736  */
737 static void
738 remove_tempfile(void)
739 {
740 	int ret;
741 
742 	if (tempfile != NULL) {
743 		if (fclose(tempfile) == EOF)
744 			(void) warn(gettext("Could not close temporary file"));
745 		tempfile = NULL;
746 	}
747 
748 	if (tempfilename[0] != '\0') {
749 		do {
750 			ret = remove(tempfilename);
751 		} while (ret == -1 && errno == EINTR);
752 		if (ret == -1)
753 			warn(gettext("Could not remove temporary file"));
754 		tempfilename[0] = '\0';
755 	}
756 }
757 
758 /*
759  * Launch private svc.configd(1M) for manipulating alternate repositories.
760  */
761 static void
762 start_private_repository(engine_state_t *est)
763 {
764 	int fd, stat;
765 	struct door_info info;
766 	pid_t pid;
767 
768 	/*
769 	 * 1.  Create a temporary file for the door.
770 	 */
771 	if (est->sc_repo_doorname != NULL)
772 		free((void *)est->sc_repo_doorname);
773 
774 	est->sc_repo_doorname = tempnam(est->sc_repo_doordir, "scfdr");
775 	if (est->sc_repo_doorname == NULL)
776 		uu_die(gettext("Could not acquire temporary filename"));
777 
778 	fd = open(est->sc_repo_doorname, O_CREAT | O_EXCL | O_RDWR, 0600);
779 	if (fd < 0)
780 		uu_die(gettext("Could not create temporary file for "
781 		    "repository server"));
782 
783 	(void) close(fd);
784 
785 	/*
786 	 * 2.  Launch a configd with that door, using the specified
787 	 * repository.
788 	 */
789 	if ((est->sc_repo_pid = fork()) == 0) {
790 		(void) execlp(est->sc_repo_server, est->sc_repo_server, "-p",
791 		    "-d", est->sc_repo_doorname, "-r", est->sc_repo_filename,
792 		    NULL);
793 		uu_die(gettext("Could not execute %s"), est->sc_repo_server);
794 	} else if (est->sc_repo_pid == -1)
795 		uu_die(gettext("Attempt to fork failed"));
796 
797 	do {
798 		pid = waitpid(est->sc_repo_pid, &stat, 0);
799 	} while (pid == -1 && errno == EINTR);
800 
801 	if (pid == -1)
802 		uu_die(gettext("Could not waitpid() for repository server"));
803 
804 	if (!WIFEXITED(stat)) {
805 		uu_die(gettext("Repository server failed (status %d).\n"),
806 		    stat);
807 	} else if (WEXITSTATUS(stat) != 0) {
808 		uu_die(gettext("Repository server failed (exit %d).\n"),
809 		    WEXITSTATUS(stat));
810 	}
811 
812 	/*
813 	 * See if it was successful by checking if the door is a door.
814 	 */
815 
816 	fd = open(est->sc_repo_doorname, O_RDWR);
817 	if (fd < 0)
818 		uu_die(gettext("Could not open door \"%s\""),
819 		    est->sc_repo_doorname);
820 
821 	if (door_info(fd, &info) < 0)
822 		uu_die(gettext("Unexpected door_info() error"));
823 
824 	if (close(fd) == -1)
825 		warn(gettext("Could not close repository door"),
826 		    strerror(errno));
827 
828 	est->sc_repo_pid = info.di_target;
829 }
830 
831 void
832 lscf_cleanup(void)
833 {
834 	/*
835 	 * In the case where we've launched a private svc.configd(1M)
836 	 * instance, we must terminate our child and remove the temporary
837 	 * rendezvous point.
838 	 */
839 	if (est->sc_repo_pid > 0) {
840 		(void) kill(est->sc_repo_pid, SIGTERM);
841 		(void) waitpid(est->sc_repo_pid, NULL, 0);
842 		(void) unlink(est->sc_repo_doorname);
843 
844 		est->sc_repo_pid = 0;
845 	}
846 }
847 
848 void
849 unselect_cursnap(void)
850 {
851 	void *cookie;
852 
853 	cur_level = NULL;
854 
855 	cookie = NULL;
856 	while ((cur_elt = uu_list_teardown(cur_levels, &cookie)) != NULL) {
857 		scf_snaplevel_destroy(cur_elt->sl);
858 		free(cur_elt);
859 	}
860 
861 	scf_snapshot_destroy(cur_snap);
862 	cur_snap = NULL;
863 }
864 
865 void
866 lscf_prep_hndl(void)
867 {
868 	if (g_hndl != NULL)
869 		return;
870 
871 	g_hndl = scf_handle_create(SCF_VERSION);
872 	if (g_hndl == NULL)
873 		scfdie();
874 
875 	if (est->sc_repo_filename != NULL)
876 		start_private_repository(est);
877 
878 	if (est->sc_repo_doorname != NULL) {
879 		scf_value_t *repo_value;
880 		int ret;
881 
882 		repo_value = scf_value_create(g_hndl);
883 		if (repo_value == NULL)
884 			scfdie();
885 
886 		ret = scf_value_set_astring(repo_value, est->sc_repo_doorname);
887 		assert(ret == SCF_SUCCESS);
888 
889 		if (scf_handle_decorate(g_hndl, "door_path", repo_value) !=
890 		    SCF_SUCCESS)
891 			scfdie();
892 
893 		scf_value_destroy(repo_value);
894 	}
895 
896 	if (scf_handle_bind(g_hndl) != 0)
897 		uu_die(gettext("Could not connect to repository server: %s.\n"),
898 		    scf_strerror(scf_error()));
899 
900 	cur_scope = scf_scope_create(g_hndl);
901 	if (cur_scope == NULL)
902 		scfdie();
903 
904 	if (scf_handle_get_local_scope(g_hndl, cur_scope) != 0)
905 		scfdie();
906 }
907 
908 static void
909 repository_teardown(void)
910 {
911 	if (g_hndl != NULL) {
912 		if (cur_snap != NULL)
913 			unselect_cursnap();
914 		scf_instance_destroy(cur_inst);
915 		scf_service_destroy(cur_svc);
916 		scf_scope_destroy(cur_scope);
917 		scf_handle_destroy(g_hndl);
918 		cur_inst = NULL;
919 		cur_svc = NULL;
920 		cur_scope = NULL;
921 		g_hndl = NULL;
922 		lscf_cleanup();
923 	}
924 }
925 
926 void
927 lscf_set_repository(const char *repfile, int force)
928 {
929 	repository_teardown();
930 
931 	if (est->sc_repo_filename != NULL) {
932 		free((void *)est->sc_repo_filename);
933 		est->sc_repo_filename = NULL;
934 	}
935 
936 	if ((force == 0) && (access(repfile, R_OK) != 0)) {
937 		/*
938 		 * Repository file does not exist
939 		 * or has no read permission.
940 		 */
941 		warn(gettext("Cannot access \"%s\": %s\n"),
942 		    repfile, strerror(errno));
943 	} else {
944 		est->sc_repo_filename = safe_strdup(repfile);
945 	}
946 
947 	lscf_prep_hndl();
948 }
949 
950 void
951 lscf_init()
952 {
953 	if ((max_scf_fmri_len = scf_limit(SCF_LIMIT_MAX_FMRI_LENGTH)) < 0 ||
954 	    (max_scf_name_len = scf_limit(SCF_LIMIT_MAX_NAME_LENGTH)) < 0 ||
955 	    (max_scf_pg_type_len = scf_limit(SCF_LIMIT_MAX_PG_TYPE_LENGTH)) <
956 	    0 ||
957 	    (max_scf_value_len = scf_limit(SCF_LIMIT_MAX_VALUE_LENGTH)) < 0)
958 		scfdie();
959 
960 	max_scf_len = max_scf_fmri_len;
961 	if (max_scf_name_len > max_scf_len)
962 		max_scf_len = max_scf_name_len;
963 	if (max_scf_pg_type_len > max_scf_len)
964 		max_scf_len = max_scf_pg_type_len;
965 	/*
966 	 * When a value of type opaque is represented as a string, the
967 	 * string contains 2 characters for every byte of data.  That is
968 	 * because the string contains the hex representation of the opaque
969 	 * value.
970 	 */
971 	if (2 * max_scf_value_len > max_scf_len)
972 		max_scf_len = 2 * max_scf_value_len;
973 
974 	if (atexit(remove_tempfile) != 0)
975 		uu_die(gettext("Could not register atexit() function"));
976 
977 	emsg_entity_not_selected = gettext("An entity is not selected.\n");
978 	emsg_permission_denied = gettext("Permission denied.\n");
979 	emsg_create_xml = gettext("Could not create XML node.\n");
980 	emsg_cant_modify_snapshots = gettext("Cannot modify snapshots.\n");
981 	emsg_invalid_for_snapshot =
982 	    gettext("Invalid operation on a snapshot.\n");
983 	emsg_read_only = gettext("Backend read-only.\n");
984 	emsg_deleted = gettext("Current selection has been deleted.\n");
985 	emsg_invalid_pg_name =
986 	    gettext("Invalid property group name \"%s\".\n");
987 	emsg_invalid_prop_name = gettext("Invalid property name \"%s\".\n");
988 	emsg_no_such_pg = gettext("No such property group \"%s\".\n");
989 	emsg_fmri_invalid_pg_name = gettext("Service %s has property group "
990 	    "with invalid name \"%s\".\n");
991 	emsg_fmri_invalid_pg_name_type = gettext("Service %s has property "
992 	    "group with invalid name \"%s\" or type \"%s\".\n");
993 	emsg_pg_added = gettext("%s changed unexpectedly "
994 	    "(property group \"%s\" added).\n");
995 	emsg_pg_changed = gettext("%s changed unexpectedly "
996 	    "(property group \"%s\" changed).\n");
997 	emsg_pg_deleted = gettext("%s changed unexpectedly "
998 	    "(property group \"%s\" or an ancestor was deleted).\n");
999 	emsg_pg_mod_perm = gettext("Could not modify property group \"%s\" "
1000 	    "in %s (permission denied).\n");
1001 	emsg_pg_add_perm = gettext("Could not create property group \"%s\" "
1002 	    "in %s (permission denied).\n");
1003 	emsg_pg_del_perm = gettext("Could not delete property group \"%s\" "
1004 	    "in %s (permission denied).\n");
1005 	emsg_snap_perm = gettext("Could not take \"%s\" snapshot of %s "
1006 	    "(permission denied).\n");
1007 	emsg_dpt_dangling = gettext("Conflict upgrading %s (not importing "
1008 	    "new dependent \"%s\" because it already exists).  Warning: The "
1009 	    "current dependent's target (%s) does not exist.\n");
1010 	emsg_dpt_no_dep = gettext("Conflict upgrading %s (not importing new "
1011 	    "dependent \"%s\" because it already exists).  Warning: The "
1012 	    "current dependent's target (%s) does not have a dependency named "
1013 	    "\"%s\" as expected.\n");
1014 
1015 	string_pool = uu_list_pool_create("strings", sizeof (string_list_t),
1016 	    offsetof(string_list_t, node), NULL, 0);
1017 	snaplevel_pool = uu_list_pool_create("snaplevels",
1018 	    sizeof (struct snaplevel), offsetof(struct snaplevel, list_node),
1019 	    NULL, 0);
1020 }
1021 
1022 
1023 static const char *
1024 prop_to_typestr(const scf_property_t *prop)
1025 {
1026 	scf_type_t ty;
1027 
1028 	if (scf_property_type(prop, &ty) != SCF_SUCCESS)
1029 		scfdie();
1030 
1031 	return (scf_type_to_string(ty));
1032 }
1033 
1034 static scf_type_t
1035 string_to_type(const char *type)
1036 {
1037 	size_t len = strlen(type);
1038 	char *buf;
1039 
1040 	if (len == 0 || type[len - 1] != ':')
1041 		return (SCF_TYPE_INVALID);
1042 
1043 	buf = (char *)alloca(len + 1);
1044 	(void) strlcpy(buf, type, len + 1);
1045 	buf[len - 1] = 0;
1046 
1047 	return (scf_string_to_type(buf));
1048 }
1049 
1050 static scf_value_t *
1051 string_to_value(const char *str, scf_type_t ty, boolean_t require_quotes)
1052 {
1053 	scf_value_t *v;
1054 	char *dup, *nstr;
1055 	size_t len;
1056 
1057 	v = scf_value_create(g_hndl);
1058 	if (v == NULL)
1059 		scfdie();
1060 
1061 	len = strlen(str);
1062 	if (require_quotes &&
1063 	    (len < 2 || str[0] != '\"' || str[len - 1] != '\"')) {
1064 		semerr(gettext("Multiple string values or string values "
1065 		    "with spaces must be quoted with '\"'.\n"));
1066 		scf_value_destroy(v);
1067 		return (NULL);
1068 	}
1069 
1070 	nstr = dup = safe_strdup(str);
1071 	if (dup[0] == '\"') {
1072 		/*
1073 		 * Strip out the first and the last quote.
1074 		 */
1075 		dup[len - 1] = '\0';
1076 		nstr = dup + 1;
1077 	}
1078 
1079 	if (scf_value_set_from_string(v, ty, (const char *)nstr) != 0) {
1080 		assert(scf_error() == SCF_ERROR_INVALID_ARGUMENT);
1081 		semerr(gettext("Invalid \"%s\" value \"%s\".\n"),
1082 		    scf_type_to_string(ty), nstr);
1083 		scf_value_destroy(v);
1084 		v = NULL;
1085 	}
1086 	free(dup);
1087 	return (v);
1088 }
1089 
1090 /*
1091  * Print str to strm, quoting double-quotes and backslashes with backslashes.
1092  * Optionally append a comment prefix ('#') to newlines ('\n').
1093  */
1094 static int
1095 quote_and_print(const char *str, FILE *strm, int commentnl)
1096 {
1097 	const char *cp;
1098 
1099 	for (cp = str; *cp != '\0'; ++cp) {
1100 		if (*cp == '"' || *cp == '\\')
1101 			(void) putc('\\', strm);
1102 
1103 		(void) putc(*cp, strm);
1104 
1105 		if (commentnl && *cp == '\n') {
1106 			(void) putc('#', strm);
1107 		}
1108 	}
1109 
1110 	return (ferror(strm));
1111 }
1112 
1113 /*
1114  * These wrappers around lowlevel functions provide consistent error checking
1115  * and warnings.
1116  */
1117 static int
1118 pg_get_prop(scf_propertygroup_t *pg, const char *propname, scf_property_t *prop)
1119 {
1120 	if (scf_pg_get_property(pg, propname, prop) == SCF_SUCCESS)
1121 		return (0);
1122 
1123 	if (scf_error() != SCF_ERROR_NOT_FOUND)
1124 		scfdie();
1125 
1126 	if (g_verbose) {
1127 		ssize_t len;
1128 		char *fmri;
1129 
1130 		len = scf_pg_to_fmri(pg, NULL, 0);
1131 		if (len < 0)
1132 			scfdie();
1133 
1134 		fmri = safe_malloc(len + 1);
1135 
1136 		if (scf_pg_to_fmri(pg, fmri, len + 1) < 0)
1137 			scfdie();
1138 
1139 		warn(gettext("Expected property %s of property group %s is "
1140 		    "missing.\n"), propname, fmri);
1141 
1142 		free(fmri);
1143 	}
1144 
1145 	return (-1);
1146 }
1147 
1148 static int
1149 prop_check_type(scf_property_t *prop, scf_type_t ty)
1150 {
1151 	scf_type_t pty;
1152 
1153 	if (scf_property_type(prop, &pty) != SCF_SUCCESS)
1154 		scfdie();
1155 
1156 	if (ty == pty)
1157 		return (0);
1158 
1159 	if (g_verbose) {
1160 		ssize_t len;
1161 		char *fmri;
1162 		const char *tystr;
1163 
1164 		len = scf_property_to_fmri(prop, NULL, 0);
1165 		if (len < 0)
1166 			scfdie();
1167 
1168 		fmri = safe_malloc(len + 1);
1169 
1170 		if (scf_property_to_fmri(prop, fmri, len + 1) < 0)
1171 			scfdie();
1172 
1173 		tystr = scf_type_to_string(ty);
1174 		if (tystr == NULL)
1175 			tystr = "?";
1176 
1177 		warn(gettext("Property %s is not of expected type %s.\n"),
1178 		    fmri, tystr);
1179 
1180 		free(fmri);
1181 	}
1182 
1183 	return (-1);
1184 }
1185 
1186 static int
1187 prop_get_val(scf_property_t *prop, scf_value_t *val)
1188 {
1189 	scf_error_t err;
1190 
1191 	if (scf_property_get_value(prop, val) == SCF_SUCCESS)
1192 		return (0);
1193 
1194 	err = scf_error();
1195 
1196 	if (err != SCF_ERROR_NOT_FOUND &&
1197 	    err != SCF_ERROR_CONSTRAINT_VIOLATED &&
1198 	    err != SCF_ERROR_PERMISSION_DENIED)
1199 		scfdie();
1200 
1201 	if (g_verbose) {
1202 		ssize_t len;
1203 		char *fmri, *emsg;
1204 
1205 		len = scf_property_to_fmri(prop, NULL, 0);
1206 		if (len < 0)
1207 			scfdie();
1208 
1209 		fmri = safe_malloc(len + 1);
1210 
1211 		if (scf_property_to_fmri(prop, fmri, len + 1) < 0)
1212 			scfdie();
1213 
1214 		if (err == SCF_ERROR_NOT_FOUND)
1215 			emsg = gettext("Property %s has no values; expected "
1216 			    "one.\n");
1217 		else if (err == SCF_ERROR_CONSTRAINT_VIOLATED)
1218 			emsg = gettext("Property %s has multiple values; "
1219 			    "expected one.\n");
1220 		else
1221 			emsg = gettext("No permission to read property %s.\n");
1222 
1223 		warn(emsg, fmri);
1224 
1225 		free(fmri);
1226 	}
1227 
1228 	return (-1);
1229 }
1230 
1231 
1232 static boolean_t
1233 snaplevel_is_instance(const scf_snaplevel_t *level)
1234 {
1235 	if (scf_snaplevel_get_instance_name(level, NULL, 0) < 0) {
1236 		if (scf_error() != SCF_ERROR_CONSTRAINT_VIOLATED)
1237 			scfdie();
1238 		return (0);
1239 	} else {
1240 		return (1);
1241 	}
1242 }
1243 
1244 /*
1245  * Decode FMRI into a service or instance, and put the result in *ep.  If
1246  * memory cannot be allocated, return SCF_ERROR_NO_MEMORY.  If the FMRI is
1247  * invalid, return SCF_ERROR_INVALID_ARGUMENT.  If the FMRI does not specify
1248  * an entity, return SCF_ERROR_CONSTRAINT_VIOLATED.  If the entity cannot be
1249  * found, return SCF_ERROR_NOT_FOUND.  Otherwise return SCF_ERROR_NONE, point
1250  * *ep to a valid scf_service_t or scf_instance_t, and set *isservice to
1251  * whether *ep is a service.
1252  */
1253 static scf_error_t
1254 fmri_to_entity(scf_handle_t *h, const char *fmri, void **ep, int *isservice)
1255 {
1256 	char *fmri_copy;
1257 	const char *sstr, *istr, *pgstr;
1258 	scf_service_t *svc;
1259 	scf_instance_t *inst;
1260 
1261 	fmri_copy = strdup(fmri);
1262 	if (fmri_copy == NULL)
1263 		return (SCF_ERROR_NO_MEMORY);
1264 
1265 	if (scf_parse_svc_fmri(fmri_copy, NULL, &sstr, &istr, &pgstr, NULL) !=
1266 	    SCF_SUCCESS) {
1267 		free(fmri_copy);
1268 		return (SCF_ERROR_INVALID_ARGUMENT);
1269 	}
1270 
1271 	free(fmri_copy);
1272 
1273 	if (sstr == NULL || pgstr != NULL)
1274 		return (SCF_ERROR_CONSTRAINT_VIOLATED);
1275 
1276 	if (istr == NULL) {
1277 		svc = scf_service_create(h);
1278 		if (svc == NULL)
1279 			return (SCF_ERROR_NO_MEMORY);
1280 
1281 		if (scf_handle_decode_fmri(h, fmri, NULL, svc, NULL, NULL, NULL,
1282 		    SCF_DECODE_FMRI_EXACT) != SCF_SUCCESS) {
1283 			if (scf_error() != SCF_ERROR_NOT_FOUND)
1284 				scfdie();
1285 
1286 			return (SCF_ERROR_NOT_FOUND);
1287 		}
1288 
1289 		*ep = svc;
1290 		*isservice = 1;
1291 	} else {
1292 		inst = scf_instance_create(h);
1293 		if (inst == NULL)
1294 			return (SCF_ERROR_NO_MEMORY);
1295 
1296 		if (scf_handle_decode_fmri(h, fmri, NULL, NULL, inst, NULL,
1297 		    NULL, SCF_DECODE_FMRI_EXACT) != SCF_SUCCESS) {
1298 			if (scf_error() != SCF_ERROR_NOT_FOUND)
1299 				scfdie();
1300 
1301 			return (SCF_ERROR_NOT_FOUND);
1302 		}
1303 
1304 		*ep = inst;
1305 		*isservice = 0;
1306 	}
1307 
1308 	return (SCF_ERROR_NONE);
1309 }
1310 
1311 /*
1312  * Create the entity named by fmri.  Place a pointer to its libscf handle in
1313  * *ep, and set or clear *isservicep if it is a service or an instance.
1314  * Returns
1315  *   SCF_ERROR_NONE - success
1316  *   SCF_ERROR_NO_MEMORY - scf_*_create() failed
1317  *   SCF_ERROR_INVALID_ARGUMENT - fmri is invalid
1318  *   SCF_ERROR_CONSTRAINT_VIOLATED - fmri is not a service or instance
1319  *   SCF_ERROR_NOT_FOUND - no such scope
1320  *   SCF_ERROR_PERMISSION_DENIED
1321  *   SCF_ERROR_BACKEND_READONLY
1322  *   SCF_ERROR_BACKEND_ACCESS
1323  */
1324 static scf_error_t
1325 create_entity(scf_handle_t *h, const char *fmri, void **ep, int *isservicep)
1326 {
1327 	char *fmri_copy;
1328 	const char *scstr, *sstr, *istr, *pgstr;
1329 	scf_scope_t *scope = NULL;
1330 	scf_service_t *svc = NULL;
1331 	scf_instance_t *inst = NULL;
1332 	scf_error_t scfe;
1333 
1334 	fmri_copy = safe_strdup(fmri);
1335 
1336 	if (scf_parse_svc_fmri(fmri_copy, &scstr, &sstr, &istr, &pgstr, NULL) !=
1337 	    0) {
1338 		free(fmri_copy);
1339 		return (SCF_ERROR_INVALID_ARGUMENT);
1340 	}
1341 
1342 	if (scstr == NULL || sstr == NULL || pgstr != NULL) {
1343 		free(fmri_copy);
1344 		return (SCF_ERROR_CONSTRAINT_VIOLATED);
1345 	}
1346 
1347 	*ep = NULL;
1348 
1349 	if ((scope = scf_scope_create(h)) == NULL ||
1350 	    (svc = scf_service_create(h)) == NULL ||
1351 	    (inst = scf_instance_create(h)) == NULL) {
1352 		scfe = SCF_ERROR_NO_MEMORY;
1353 		goto out;
1354 	}
1355 
1356 get_scope:
1357 	if (scf_handle_get_scope(h, scstr, scope) != 0) {
1358 		switch (scf_error()) {
1359 		case SCF_ERROR_CONNECTION_BROKEN:
1360 			scfdie();
1361 			/* NOTREACHED */
1362 
1363 		case SCF_ERROR_NOT_FOUND:
1364 			scfe = SCF_ERROR_NOT_FOUND;
1365 			goto out;
1366 
1367 		case SCF_ERROR_HANDLE_MISMATCH:
1368 		case SCF_ERROR_NOT_BOUND:
1369 		case SCF_ERROR_INVALID_ARGUMENT:
1370 		default:
1371 			bad_error("scf_handle_get_scope", scf_error());
1372 		}
1373 	}
1374 
1375 get_svc:
1376 	if (scf_scope_get_service(scope, sstr, svc) != 0) {
1377 		switch (scf_error()) {
1378 		case SCF_ERROR_CONNECTION_BROKEN:
1379 			scfdie();
1380 			/* NOTREACHED */
1381 
1382 		case SCF_ERROR_DELETED:
1383 			goto get_scope;
1384 
1385 		case SCF_ERROR_NOT_FOUND:
1386 			break;
1387 
1388 		case SCF_ERROR_HANDLE_MISMATCH:
1389 		case SCF_ERROR_INVALID_ARGUMENT:
1390 		case SCF_ERROR_NOT_BOUND:
1391 		case SCF_ERROR_NOT_SET:
1392 		default:
1393 			bad_error("scf_scope_get_service", scf_error());
1394 		}
1395 
1396 		if (scf_scope_add_service(scope, sstr, svc) != 0) {
1397 			switch (scf_error()) {
1398 			case SCF_ERROR_CONNECTION_BROKEN:
1399 				scfdie();
1400 				/* NOTREACHED */
1401 
1402 			case SCF_ERROR_DELETED:
1403 				goto get_scope;
1404 
1405 			case SCF_ERROR_PERMISSION_DENIED:
1406 			case SCF_ERROR_BACKEND_READONLY:
1407 			case SCF_ERROR_BACKEND_ACCESS:
1408 				scfe = scf_error();
1409 				goto out;
1410 
1411 			case SCF_ERROR_HANDLE_MISMATCH:
1412 			case SCF_ERROR_INVALID_ARGUMENT:
1413 			case SCF_ERROR_NOT_BOUND:
1414 			case SCF_ERROR_NOT_SET:
1415 			default:
1416 				bad_error("scf_scope_get_service", scf_error());
1417 			}
1418 		}
1419 	}
1420 
1421 	if (istr == NULL) {
1422 		scfe = SCF_ERROR_NONE;
1423 		*ep = svc;
1424 		*isservicep = 1;
1425 		goto out;
1426 	}
1427 
1428 get_inst:
1429 	if (scf_service_get_instance(svc, istr, inst) != 0) {
1430 		switch (scf_error()) {
1431 		case SCF_ERROR_CONNECTION_BROKEN:
1432 			scfdie();
1433 			/* NOTREACHED */
1434 
1435 		case SCF_ERROR_DELETED:
1436 			goto get_svc;
1437 
1438 		case SCF_ERROR_NOT_FOUND:
1439 			break;
1440 
1441 		case SCF_ERROR_HANDLE_MISMATCH:
1442 		case SCF_ERROR_INVALID_ARGUMENT:
1443 		case SCF_ERROR_NOT_BOUND:
1444 		case SCF_ERROR_NOT_SET:
1445 		default:
1446 			bad_error("scf_service_get_instance", scf_error());
1447 		}
1448 
1449 		if (scf_service_add_instance(svc, istr, inst) != 0) {
1450 			switch (scf_error()) {
1451 			case SCF_ERROR_CONNECTION_BROKEN:
1452 				scfdie();
1453 				/* NOTREACHED */
1454 
1455 			case SCF_ERROR_DELETED:
1456 				goto get_svc;
1457 
1458 			case SCF_ERROR_PERMISSION_DENIED:
1459 			case SCF_ERROR_BACKEND_READONLY:
1460 			case SCF_ERROR_BACKEND_ACCESS:
1461 				scfe = scf_error();
1462 				goto out;
1463 
1464 			case SCF_ERROR_HANDLE_MISMATCH:
1465 			case SCF_ERROR_INVALID_ARGUMENT:
1466 			case SCF_ERROR_NOT_BOUND:
1467 			case SCF_ERROR_NOT_SET:
1468 			default:
1469 				bad_error("scf_service_add_instance",
1470 				    scf_error());
1471 			}
1472 		}
1473 	}
1474 
1475 	scfe = SCF_ERROR_NONE;
1476 	*ep = inst;
1477 	*isservicep = 0;
1478 
1479 out:
1480 	if (*ep != inst)
1481 		scf_instance_destroy(inst);
1482 	if (*ep != svc)
1483 		scf_service_destroy(svc);
1484 	scf_scope_destroy(scope);
1485 	free(fmri_copy);
1486 	return (scfe);
1487 }
1488 
1489 /*
1490  * Create or update a snapshot of inst.  snap is a required scratch object.
1491  *
1492  * Returns
1493  *   0 - success
1494  *   ECONNABORTED - repository connection broken
1495  *   EPERM - permission denied
1496  *   ENOSPC - configd is out of resources
1497  *   ECANCELED - inst was deleted
1498  *   -1 - unknown libscf error (message printed)
1499  */
1500 static int
1501 take_snap(scf_instance_t *inst, const char *name, scf_snapshot_t *snap)
1502 {
1503 again:
1504 	if (scf_instance_get_snapshot(inst, name, snap) == 0) {
1505 		if (_scf_snapshot_take_attach(inst, snap) != 0) {
1506 			switch (scf_error()) {
1507 			case SCF_ERROR_CONNECTION_BROKEN:
1508 			case SCF_ERROR_PERMISSION_DENIED:
1509 			case SCF_ERROR_NO_RESOURCES:
1510 				return (scferror2errno(scf_error()));
1511 
1512 			case SCF_ERROR_NOT_SET:
1513 			case SCF_ERROR_INVALID_ARGUMENT:
1514 			default:
1515 				bad_error("_scf_snapshot_take_attach",
1516 				    scf_error());
1517 			}
1518 		}
1519 	} else {
1520 		switch (scf_error()) {
1521 		case SCF_ERROR_NOT_FOUND:
1522 			break;
1523 
1524 		case SCF_ERROR_DELETED:
1525 		case SCF_ERROR_CONNECTION_BROKEN:
1526 			return (scferror2errno(scf_error()));
1527 
1528 		case SCF_ERROR_HANDLE_MISMATCH:
1529 		case SCF_ERROR_NOT_BOUND:
1530 		case SCF_ERROR_INVALID_ARGUMENT:
1531 		case SCF_ERROR_NOT_SET:
1532 		default:
1533 			bad_error("scf_instance_get_snapshot", scf_error());
1534 		}
1535 
1536 		if (_scf_snapshot_take_new(inst, name, snap) != 0) {
1537 			switch (scf_error()) {
1538 			case SCF_ERROR_EXISTS:
1539 				goto again;
1540 
1541 			case SCF_ERROR_CONNECTION_BROKEN:
1542 			case SCF_ERROR_NO_RESOURCES:
1543 			case SCF_ERROR_PERMISSION_DENIED:
1544 				return (scferror2errno(scf_error()));
1545 
1546 			default:
1547 				scfwarn();
1548 				return (-1);
1549 
1550 			case SCF_ERROR_NOT_SET:
1551 			case SCF_ERROR_INTERNAL:
1552 			case SCF_ERROR_INVALID_ARGUMENT:
1553 			case SCF_ERROR_HANDLE_MISMATCH:
1554 				bad_error("_scf_snapshot_take_new",
1555 				    scf_error());
1556 			}
1557 		}
1558 	}
1559 
1560 	return (0);
1561 }
1562 
1563 static int
1564 refresh_running_snapshot(void *entity)
1565 {
1566 	scf_snapshot_t *snap;
1567 	int r;
1568 
1569 	if ((snap = scf_snapshot_create(g_hndl)) == NULL)
1570 		scfdie();
1571 	r = take_snap(entity, snap_running, snap);
1572 	scf_snapshot_destroy(snap);
1573 
1574 	return (r);
1575 }
1576 
1577 /*
1578  * Refresh entity.  If isservice is zero, take entity to be an scf_instance_t *.
1579  * Otherwise take entity to be an scf_service_t * and refresh all of its child
1580  * instances.  fmri is used for messages.  inst, iter, and name_buf are used
1581  * for scratch space.  Returns
1582  *   0 - success
1583  *   ECONNABORTED - repository connection broken
1584  *   ECANCELED - entity was deleted
1585  *   EACCES - backend denied access
1586  *   EPERM - permission denied
1587  *   ENOSPC - repository server out of resources
1588  *   -1 - _smf_refresh_instance_i() failed.  scf_error() should be set.
1589  */
1590 static int
1591 refresh_entity(int isservice, void *entity, const char *fmri,
1592     scf_instance_t *inst, scf_iter_t *iter, char *name_buf)
1593 {
1594 	scf_error_t scfe;
1595 	int r;
1596 
1597 	if (!isservice) {
1598 		/*
1599 		 * Let restarter handles refreshing and making new running
1600 		 * snapshot only if operating on a live repository and not
1601 		 * running in early import.
1602 		 */
1603 		if (est->sc_repo_filename == NULL &&
1604 		    est->sc_repo_doorname == NULL &&
1605 		    est->sc_in_emi == 0) {
1606 			if (_smf_refresh_instance_i(entity) == 0) {
1607 				if (g_verbose)
1608 					warn(gettext("Refreshed %s.\n"), fmri);
1609 				return (0);
1610 			}
1611 
1612 			switch (scf_error()) {
1613 			case SCF_ERROR_BACKEND_ACCESS:
1614 				return (EACCES);
1615 
1616 			case SCF_ERROR_PERMISSION_DENIED:
1617 				return (EPERM);
1618 
1619 			default:
1620 				return (-1);
1621 			}
1622 		} else {
1623 			r = refresh_running_snapshot(entity);
1624 			switch (r) {
1625 			case 0:
1626 				break;
1627 
1628 			case ECONNABORTED:
1629 			case ECANCELED:
1630 			case EPERM:
1631 			case ENOSPC:
1632 				break;
1633 
1634 			default:
1635 				bad_error("refresh_running_snapshot",
1636 				    scf_error());
1637 			}
1638 
1639 			return (r);
1640 		}
1641 	}
1642 
1643 	if (scf_iter_service_instances(iter, entity) != 0) {
1644 		switch (scf_error()) {
1645 		case SCF_ERROR_CONNECTION_BROKEN:
1646 			return (ECONNABORTED);
1647 
1648 		case SCF_ERROR_DELETED:
1649 			return (ECANCELED);
1650 
1651 		case SCF_ERROR_HANDLE_MISMATCH:
1652 		case SCF_ERROR_NOT_BOUND:
1653 		case SCF_ERROR_NOT_SET:
1654 		default:
1655 			bad_error("scf_iter_service_instances", scf_error());
1656 		}
1657 	}
1658 
1659 	for (;;) {
1660 		r = scf_iter_next_instance(iter, inst);
1661 		if (r == 0)
1662 			break;
1663 		if (r != 1) {
1664 			switch (scf_error()) {
1665 			case SCF_ERROR_CONNECTION_BROKEN:
1666 				return (ECONNABORTED);
1667 
1668 			case SCF_ERROR_DELETED:
1669 				return (ECANCELED);
1670 
1671 			case SCF_ERROR_HANDLE_MISMATCH:
1672 			case SCF_ERROR_NOT_BOUND:
1673 			case SCF_ERROR_NOT_SET:
1674 			case SCF_ERROR_INVALID_ARGUMENT:
1675 			default:
1676 				bad_error("scf_iter_next_instance",
1677 				    scf_error());
1678 			}
1679 		}
1680 
1681 		/*
1682 		 * Similarly, just take a new running snapshot if operating on
1683 		 * a non-live repository or running during early import.
1684 		 */
1685 		if (est->sc_repo_filename != NULL ||
1686 		    est->sc_repo_doorname != NULL ||
1687 		    est->sc_in_emi == 1) {
1688 			r = refresh_running_snapshot(inst);
1689 			switch (r) {
1690 			case 0:
1691 				continue;
1692 
1693 			case ECONNABORTED:
1694 			case ECANCELED:
1695 			case EPERM:
1696 			case ENOSPC:
1697 				break;
1698 			default:
1699 				bad_error("refresh_running_snapshot",
1700 				    scf_error());
1701 			}
1702 
1703 			return (r);
1704 
1705 		}
1706 
1707 		if (_smf_refresh_instance_i(inst) == 0) {
1708 			if (g_verbose) {
1709 				if (scf_instance_get_name(inst, name_buf,
1710 				    max_scf_name_len + 1) < 0)
1711 					(void) strcpy(name_buf, "?");
1712 
1713 				warn(gettext("Refreshed %s:%s.\n"),
1714 				    fmri, name_buf);
1715 			}
1716 		} else {
1717 			if (scf_error() != SCF_ERROR_BACKEND_ACCESS ||
1718 			    g_verbose) {
1719 				scfe = scf_error();
1720 
1721 				if (scf_instance_to_fmri(inst, name_buf,
1722 				    max_scf_name_len + 1) < 0)
1723 					(void) strcpy(name_buf, "?");
1724 
1725 				warn(gettext(
1726 				    "Refresh of %s:%s failed: %s.\n"), fmri,
1727 				    name_buf, scf_strerror(scfe));
1728 			}
1729 		}
1730 	}
1731 
1732 	return (0);
1733 }
1734 
1735 static void
1736 private_refresh(void)
1737 {
1738 	scf_instance_t *pinst = NULL;
1739 	scf_iter_t *piter = NULL;
1740 	ssize_t fmrilen;
1741 	size_t bufsz;
1742 	char *fmribuf;
1743 	void *ent;
1744 	int issvc;
1745 	int r;
1746 
1747 	if (est->sc_repo_filename == NULL && est->sc_repo_doorname == NULL)
1748 		return;
1749 
1750 	assert(cur_svc != NULL);
1751 
1752 	bufsz = max_scf_fmri_len + 1;
1753 	fmribuf = safe_malloc(bufsz);
1754 	if (cur_inst) {
1755 		issvc = 0;
1756 		ent = cur_inst;
1757 		fmrilen = scf_instance_to_fmri(ent, fmribuf, bufsz);
1758 	} else {
1759 		issvc = 1;
1760 		ent = cur_svc;
1761 		fmrilen = scf_service_to_fmri(ent, fmribuf, bufsz);
1762 		if ((pinst = scf_instance_create(g_hndl)) == NULL)
1763 			scfdie();
1764 
1765 		if ((piter = scf_iter_create(g_hndl)) == NULL)
1766 			scfdie();
1767 	}
1768 	if (fmrilen < 0) {
1769 		free(fmribuf);
1770 		if (scf_error() != SCF_ERROR_DELETED)
1771 			scfdie();
1772 
1773 		warn(emsg_deleted);
1774 		return;
1775 	}
1776 	assert(fmrilen < bufsz);
1777 
1778 	r = refresh_entity(issvc, ent, fmribuf, pinst, piter, NULL);
1779 	switch (r) {
1780 	case 0:
1781 		break;
1782 
1783 	case ECONNABORTED:
1784 		warn(gettext("Could not refresh %s "
1785 		    "(repository connection broken).\n"), fmribuf);
1786 		break;
1787 
1788 	case ECANCELED:
1789 		warn(emsg_deleted);
1790 		break;
1791 
1792 	case EPERM:
1793 		warn(gettext("Could not refresh %s "
1794 		    "(permission denied).\n"), fmribuf);
1795 		break;
1796 
1797 	case ENOSPC:
1798 		warn(gettext("Could not refresh %s "
1799 		    "(repository server out of resources).\n"),
1800 		    fmribuf);
1801 		break;
1802 
1803 	case EACCES:
1804 	default:
1805 		bad_error("refresh_entity", scf_error());
1806 	}
1807 
1808 	if (issvc) {
1809 		scf_instance_destroy(pinst);
1810 		scf_iter_destroy(piter);
1811 	}
1812 
1813 	free(fmribuf);
1814 }
1815 
1816 
1817 static int
1818 stash_scferror_err(scf_callback_t *cbp, scf_error_t err)
1819 {
1820 	cbp->sc_err = scferror2errno(err);
1821 	return (UU_WALK_ERROR);
1822 }
1823 
1824 static int
1825 stash_scferror(scf_callback_t *cbp)
1826 {
1827 	return (stash_scferror_err(cbp, scf_error()));
1828 }
1829 
1830 static int select_inst(const char *);
1831 static int select_svc(const char *);
1832 
1833 /*
1834  * Take a property that does not have a type and check to see if a type
1835  * exists or can be gleened from the current data.  Set the type.
1836  *
1837  * Check the current level (instance) and then check the higher level
1838  * (service).  This could be the case for adding a new property to
1839  * the instance that's going to "override" a service level property.
1840  *
1841  * For a property :
1842  * 1. Take the type from an existing property
1843  * 2. Take the type from a template entry
1844  *
1845  * If the type can not be found, then leave the type as is, and let the import
1846  * report the problem of the missing type.
1847  */
1848 static int
1849 find_current_prop_type(void *p, void *g)
1850 {
1851 	property_t *prop = p;
1852 	scf_callback_t *lcb = g;
1853 	pgroup_t *pg = NULL;
1854 
1855 	const char *fmri = NULL;
1856 	char *lfmri = NULL;
1857 	char *cur_selection = NULL;
1858 
1859 	scf_propertygroup_t *sc_pg = NULL;
1860 	scf_property_t *sc_prop = NULL;
1861 	scf_pg_tmpl_t *t_pg = NULL;
1862 	scf_prop_tmpl_t *t_prop = NULL;
1863 	scf_type_t prop_type;
1864 
1865 	value_t *vp;
1866 	int issvc = lcb->sc_service;
1867 	int r = UU_WALK_ERROR;
1868 
1869 	if (prop->sc_value_type != SCF_TYPE_INVALID)
1870 		return (UU_WALK_NEXT);
1871 
1872 	t_prop = scf_tmpl_prop_create(g_hndl);
1873 	sc_prop = scf_property_create(g_hndl);
1874 	if (sc_prop == NULL || t_prop == NULL) {
1875 		warn(gettext("Unable to create the property to attempt and "
1876 		    "find a missing type.\n"));
1877 
1878 		scf_property_destroy(sc_prop);
1879 		scf_tmpl_prop_destroy(t_prop);
1880 
1881 		return (UU_WALK_ERROR);
1882 	}
1883 
1884 	if (lcb->sc_flags == 1) {
1885 		pg = lcb->sc_parent;
1886 		issvc = (pg->sc_parent->sc_etype == SVCCFG_SERVICE_OBJECT);
1887 		fmri = pg->sc_parent->sc_fmri;
1888 retry_pg:
1889 		if (cur_svc && cur_selection == NULL) {
1890 			cur_selection = safe_malloc(max_scf_fmri_len + 1);
1891 			lscf_get_selection_str(cur_selection,
1892 			    max_scf_fmri_len + 1);
1893 
1894 			if (strcmp(cur_selection, fmri) != 0) {
1895 				lscf_select(fmri);
1896 			} else {
1897 				free(cur_selection);
1898 				cur_selection = NULL;
1899 			}
1900 		} else {
1901 			lscf_select(fmri);
1902 		}
1903 
1904 		if (sc_pg == NULL && (sc_pg = scf_pg_create(g_hndl)) == NULL) {
1905 			warn(gettext("Unable to create property group to "
1906 			    "find a missing property type.\n"));
1907 
1908 			goto out;
1909 		}
1910 
1911 		if (get_pg(pg->sc_pgroup_name, sc_pg) != SCF_SUCCESS) {
1912 			/*
1913 			 * If this is the sc_pg from the parent
1914 			 * let the caller clean up the sc_pg,
1915 			 * and just throw it away in this case.
1916 			 */
1917 			if (sc_pg != lcb->sc_parent)
1918 				scf_pg_destroy(sc_pg);
1919 
1920 			sc_pg = NULL;
1921 			if ((t_pg = scf_tmpl_pg_create(g_hndl)) == NULL) {
1922 				warn(gettext("Unable to create template "
1923 				    "property group to find a property "
1924 				    "type.\n"));
1925 
1926 				goto out;
1927 			}
1928 
1929 			if (scf_tmpl_get_by_pg_name(fmri, NULL,
1930 			    pg->sc_pgroup_name, NULL, t_pg,
1931 			    SCF_PG_TMPL_FLAG_EXACT) != SCF_SUCCESS) {
1932 				/*
1933 				 * if instance get service and jump back
1934 				 */
1935 				scf_tmpl_pg_destroy(t_pg);
1936 				t_pg = NULL;
1937 				if (issvc == 0) {
1938 					entity_t *e = pg->sc_parent->sc_parent;
1939 
1940 					fmri = e->sc_fmri;
1941 					issvc = 1;
1942 					goto retry_pg;
1943 				} else {
1944 					goto out;
1945 				}
1946 			}
1947 		}
1948 	} else {
1949 		sc_pg = lcb->sc_parent;
1950 	}
1951 
1952 	/*
1953 	 * Attempt to get the type from an existing property.  If the property
1954 	 * cannot be found then attempt to get the type from a template entry
1955 	 * for the property.
1956 	 *
1957 	 * Finally, if at the instance level look at the service level.
1958 	 */
1959 	if (sc_pg != NULL &&
1960 	    pg_get_prop(sc_pg, prop->sc_property_name,
1961 	    sc_prop) == SCF_SUCCESS &&
1962 	    scf_property_type(sc_prop, &prop_type) == SCF_SUCCESS) {
1963 		prop->sc_value_type = prop_type;
1964 
1965 		/*
1966 		 * Found a type, update the value types and validate
1967 		 * the actual value against this type.
1968 		 */
1969 		for (vp = uu_list_first(prop->sc_property_values);
1970 		    vp != NULL;
1971 		    vp = uu_list_next(prop->sc_property_values, vp)) {
1972 			vp->sc_type = prop->sc_value_type;
1973 			lxml_store_value(vp, 0, NULL);
1974 		}
1975 
1976 		r = UU_WALK_NEXT;
1977 		goto out;
1978 	}
1979 
1980 	/*
1981 	 * If we get here with t_pg set to NULL then we had to have
1982 	 * gotten an sc_pg but that sc_pg did not have the property
1983 	 * we are looking for.   So if the t_pg is not null look up
1984 	 * the template entry for the property.
1985 	 *
1986 	 * If the t_pg is null then need to attempt to get a matching
1987 	 * template entry for the sc_pg, and see if there is a property
1988 	 * entry for that template entry.
1989 	 */
1990 do_tmpl :
1991 	if (t_pg != NULL &&
1992 	    scf_tmpl_get_by_prop(t_pg, prop->sc_property_name,
1993 	    t_prop, 0) == SCF_SUCCESS) {
1994 		if (scf_tmpl_prop_type(t_prop, &prop_type) == SCF_SUCCESS) {
1995 			prop->sc_value_type = prop_type;
1996 
1997 			/*
1998 			 * Found a type, update the value types and validate
1999 			 * the actual value against this type.
2000 			 */
2001 			for (vp = uu_list_first(prop->sc_property_values);
2002 			    vp != NULL;
2003 			    vp = uu_list_next(prop->sc_property_values, vp)) {
2004 				vp->sc_type = prop->sc_value_type;
2005 				lxml_store_value(vp, 0, NULL);
2006 			}
2007 
2008 			r = UU_WALK_NEXT;
2009 			goto out;
2010 		}
2011 	} else {
2012 		if (t_pg == NULL && sc_pg) {
2013 			if ((t_pg = scf_tmpl_pg_create(g_hndl)) == NULL) {
2014 				warn(gettext("Unable to create template "
2015 				    "property group to find a property "
2016 				    "type.\n"));
2017 
2018 				goto out;
2019 			}
2020 
2021 			if (scf_tmpl_get_by_pg(sc_pg, t_pg, 0) != SCF_SUCCESS) {
2022 				scf_tmpl_pg_destroy(t_pg);
2023 				t_pg = NULL;
2024 			} else {
2025 				goto do_tmpl;
2026 			}
2027 		}
2028 	}
2029 
2030 	if (issvc == 0) {
2031 		scf_instance_t *i;
2032 		scf_service_t *s;
2033 
2034 		issvc = 1;
2035 		if (lcb->sc_flags == 1) {
2036 			entity_t *e = pg->sc_parent->sc_parent;
2037 
2038 			fmri = e->sc_fmri;
2039 			goto retry_pg;
2040 		}
2041 
2042 		/*
2043 		 * because lcb->sc_flags was not set then this means
2044 		 * the pg was not used and can be used here.
2045 		 */
2046 		if ((pg = internal_pgroup_new()) == NULL) {
2047 			warn(gettext("Could not create internal property group "
2048 			    "to find a missing type."));
2049 
2050 			goto out;
2051 		}
2052 
2053 		pg->sc_pgroup_name = safe_malloc(max_scf_name_len + 1);
2054 		if (scf_pg_get_name(sc_pg, (char *)pg->sc_pgroup_name,
2055 		    max_scf_name_len + 1) < 0)
2056 				goto out;
2057 
2058 		i = scf_instance_create(g_hndl);
2059 		s = scf_service_create(g_hndl);
2060 		if (i == NULL || s == NULL ||
2061 		    scf_pg_get_parent_instance(sc_pg, i) != SCF_SUCCESS) {
2062 			warn(gettext("Could not get a service for the instance "
2063 			    "to find a missing type."));
2064 
2065 			goto out;
2066 		}
2067 
2068 		/*
2069 		 * Check to see truly at the instance level.
2070 		 */
2071 		lfmri = safe_malloc(max_scf_fmri_len + 1);
2072 		if (scf_instance_get_parent(i, s) == SCF_SUCCESS &&
2073 		    scf_service_to_fmri(s, lfmri, max_scf_fmri_len + 1) < 0)
2074 			goto out;
2075 		else
2076 			fmri = (const char *)lfmri;
2077 
2078 		goto retry_pg;
2079 	}
2080 
2081 out :
2082 	if (sc_pg != lcb->sc_parent) {
2083 		scf_pg_destroy(sc_pg);
2084 	}
2085 
2086 	/*
2087 	 * If this is true then the pg was allocated
2088 	 * here, and the name was set so need to free
2089 	 * the name and the pg.
2090 	 */
2091 	if (pg != NULL && pg != lcb->sc_parent) {
2092 		free((char *)pg->sc_pgroup_name);
2093 		internal_pgroup_free(pg);
2094 	}
2095 
2096 	if (cur_selection) {
2097 		lscf_select(cur_selection);
2098 		free(cur_selection);
2099 	}
2100 
2101 	scf_tmpl_pg_destroy(t_pg);
2102 	scf_tmpl_prop_destroy(t_prop);
2103 	scf_property_destroy(sc_prop);
2104 
2105 	if (r != UU_WALK_NEXT)
2106 		warn(gettext("Could not find property type for \"%s\" "
2107 		    "from \"%s\"\n"), prop->sc_property_name,
2108 		    fmri != NULL ? fmri : lcb->sc_source_fmri);
2109 
2110 	free(lfmri);
2111 
2112 	return (r);
2113 }
2114 
2115 /*
2116  * Take a property group that does not have a type and check to see if a type
2117  * exists or can be gleened from the current data.  Set the type.
2118  *
2119  * Check the current level (instance) and then check the higher level
2120  * (service).  This could be the case for adding a new property to
2121  * the instance that's going to "override" a service level property.
2122  *
2123  * For a property group
2124  * 1. Take the type from an existing property group
2125  * 2. Take the type from a template entry
2126  *
2127  * If the type can not be found, then leave the type as is, and let the import
2128  * report the problem of the missing type.
2129  */
2130 static int
2131 find_current_pg_type(void *p, void *sori)
2132 {
2133 	entity_t *si = sori;
2134 	pgroup_t *pg = p;
2135 
2136 	const char *ofmri, *fmri;
2137 	char *cur_selection = NULL;
2138 	char *pg_type = NULL;
2139 
2140 	scf_propertygroup_t *sc_pg = NULL;
2141 	scf_pg_tmpl_t *t_pg = NULL;
2142 
2143 	int issvc = (si->sc_etype == SVCCFG_SERVICE_OBJECT);
2144 	int r = UU_WALK_ERROR;
2145 
2146 	ofmri = fmri = si->sc_fmri;
2147 	if (pg->sc_pgroup_type != NULL) {
2148 		r = UU_WALK_NEXT;
2149 
2150 		goto out;
2151 	}
2152 
2153 	sc_pg = scf_pg_create(g_hndl);
2154 	if (sc_pg == NULL) {
2155 		warn(gettext("Unable to create property group to attempt "
2156 		    "and find a missing type.\n"));
2157 
2158 		return (UU_WALK_ERROR);
2159 	}
2160 
2161 	/*
2162 	 * Using get_pg() requires that the cur_svc/cur_inst be
2163 	 * via lscf_select.  Need to preserve the current selection
2164 	 * if going to use lscf_select() to set up the cur_svc/cur_inst
2165 	 */
2166 	if (cur_svc) {
2167 		cur_selection = safe_malloc(max_scf_fmri_len + 1);
2168 		lscf_get_selection_str(cur_selection, max_scf_fmri_len + 1);
2169 	}
2170 
2171 	/*
2172 	 * If the property group exists get the type, and set
2173 	 * the pgroup_t type of that type.
2174 	 *
2175 	 * If not the check for a template pg_pattern entry
2176 	 * and take the type from that.
2177 	 */
2178 retry_svc:
2179 	lscf_select(fmri);
2180 
2181 	if (get_pg(pg->sc_pgroup_name, sc_pg) == SCF_SUCCESS) {
2182 		pg_type = safe_malloc(max_scf_pg_type_len + 1);
2183 		if (pg_type != NULL && scf_pg_get_type(sc_pg, pg_type,
2184 		    max_scf_pg_type_len + 1) != -1) {
2185 			pg->sc_pgroup_type = pg_type;
2186 
2187 			r = UU_WALK_NEXT;
2188 			goto out;
2189 		} else {
2190 			free(pg_type);
2191 		}
2192 	} else {
2193 		if ((t_pg == NULL) &&
2194 		    (t_pg = scf_tmpl_pg_create(g_hndl)) == NULL)
2195 			goto out;
2196 
2197 		if (scf_tmpl_get_by_pg_name(fmri, NULL, pg->sc_pgroup_name,
2198 		    NULL, t_pg, SCF_PG_TMPL_FLAG_EXACT) == SCF_SUCCESS &&
2199 		    scf_tmpl_pg_type(t_pg, &pg_type) != -1) {
2200 			pg->sc_pgroup_type = pg_type;
2201 
2202 			r = UU_WALK_NEXT;
2203 			goto out;
2204 		}
2205 	}
2206 
2207 	/*
2208 	 * If type is not found at the instance level then attempt to
2209 	 * find the type at the service level.
2210 	 */
2211 	if (!issvc) {
2212 		si = si->sc_parent;
2213 		fmri = si->sc_fmri;
2214 		issvc = (si->sc_etype == SVCCFG_SERVICE_OBJECT);
2215 		goto retry_svc;
2216 	}
2217 
2218 out :
2219 	if (cur_selection) {
2220 		lscf_select(cur_selection);
2221 		free(cur_selection);
2222 	}
2223 
2224 	/*
2225 	 * Now walk the properties of the property group to make sure that
2226 	 * all properties have the correct type and values are valid for
2227 	 * those types.
2228 	 */
2229 	if (r == UU_WALK_NEXT) {
2230 		scf_callback_t cb;
2231 
2232 		cb.sc_service = issvc;
2233 		cb.sc_source_fmri = ofmri;
2234 		if (sc_pg != NULL) {
2235 			cb.sc_parent = sc_pg;
2236 			cb.sc_flags = 0;
2237 		} else {
2238 			cb.sc_parent = pg;
2239 			cb.sc_flags = 1;
2240 		}
2241 
2242 		if (uu_list_walk(pg->sc_pgroup_props, find_current_prop_type,
2243 		    &cb, UU_DEFAULT) != 0) {
2244 			if (uu_error() != UU_ERROR_CALLBACK_FAILED)
2245 				bad_error("uu_list_walk", uu_error());
2246 
2247 			r = UU_WALK_ERROR;
2248 		}
2249 	} else {
2250 		warn(gettext("Could not find property group type for "
2251 		    "\"%s\" from \"%s\"\n"), pg->sc_pgroup_name, fmri);
2252 	}
2253 
2254 	scf_tmpl_pg_destroy(t_pg);
2255 	scf_pg_destroy(sc_pg);
2256 
2257 	return (r);
2258 }
2259 
2260 /*
2261  * Import.  These functions import a bundle into the repository.
2262  */
2263 
2264 /*
2265  * Add a transaction entry to lcbdata->sc_trans for this property_t.  Uses
2266  * sc_handle, sc_trans, and sc_flags (SCI_NOENABLED) in lcbdata.  On success,
2267  * returns UU_WALK_NEXT.  On error returns UU_WALK_ERROR and sets
2268  * lcbdata->sc_err to
2269  *   ENOMEM - out of memory
2270  *   ECONNABORTED - repository connection broken
2271  *   ECANCELED - sc_trans's property group was deleted
2272  *   EINVAL - p's name is invalid (error printed)
2273  *	    - p has an invalid value (error printed)
2274  */
2275 static int
2276 lscf_property_import(void *v, void *pvt)
2277 {
2278 	property_t *p = v;
2279 	scf_callback_t *lcbdata = pvt;
2280 	value_t *vp;
2281 	scf_transaction_t *trans = lcbdata->sc_trans;
2282 	scf_transaction_entry_t *entr;
2283 	scf_value_t *val;
2284 	scf_type_t tp;
2285 
2286 	if ((lcbdata->sc_flags & SCI_NOENABLED ||
2287 	    lcbdata->sc_flags & SCI_DELAYENABLE) &&
2288 	    strcmp(p->sc_property_name, SCF_PROPERTY_ENABLED) == 0) {
2289 		lcbdata->sc_enable = p;
2290 		return (UU_WALK_NEXT);
2291 	}
2292 
2293 	entr = scf_entry_create(lcbdata->sc_handle);
2294 	if (entr == NULL) {
2295 		switch (scf_error()) {
2296 		case SCF_ERROR_NO_MEMORY:
2297 			return (stash_scferror(lcbdata));
2298 
2299 		case SCF_ERROR_INVALID_ARGUMENT:
2300 		default:
2301 			bad_error("scf_entry_create", scf_error());
2302 		}
2303 	}
2304 
2305 	tp = p->sc_value_type;
2306 
2307 	if (scf_transaction_property_new(trans, entr,
2308 	    p->sc_property_name, tp) != 0) {
2309 		switch (scf_error()) {
2310 		case SCF_ERROR_INVALID_ARGUMENT:
2311 			semerr(emsg_invalid_prop_name, p->sc_property_name);
2312 			scf_entry_destroy(entr);
2313 			return (stash_scferror(lcbdata));
2314 
2315 		case SCF_ERROR_EXISTS:
2316 			break;
2317 
2318 		case SCF_ERROR_DELETED:
2319 		case SCF_ERROR_CONNECTION_BROKEN:
2320 			scf_entry_destroy(entr);
2321 			return (stash_scferror(lcbdata));
2322 
2323 		case SCF_ERROR_NOT_BOUND:
2324 		case SCF_ERROR_HANDLE_MISMATCH:
2325 		case SCF_ERROR_NOT_SET:
2326 		default:
2327 			bad_error("scf_transaction_property_new", scf_error());
2328 		}
2329 
2330 		if (scf_transaction_property_change_type(trans, entr,
2331 		    p->sc_property_name, tp) != 0) {
2332 			switch (scf_error()) {
2333 			case SCF_ERROR_DELETED:
2334 			case SCF_ERROR_CONNECTION_BROKEN:
2335 				scf_entry_destroy(entr);
2336 				return (stash_scferror(lcbdata));
2337 
2338 			case SCF_ERROR_INVALID_ARGUMENT:
2339 				semerr(emsg_invalid_prop_name,
2340 				    p->sc_property_name);
2341 				scf_entry_destroy(entr);
2342 				return (stash_scferror(lcbdata));
2343 
2344 			case SCF_ERROR_NOT_FOUND:
2345 			case SCF_ERROR_NOT_SET:
2346 			case SCF_ERROR_HANDLE_MISMATCH:
2347 			case SCF_ERROR_NOT_BOUND:
2348 			default:
2349 				bad_error(
2350 				    "scf_transaction_property_change_type",
2351 				    scf_error());
2352 			}
2353 		}
2354 	}
2355 
2356 	for (vp = uu_list_first(p->sc_property_values);
2357 	    vp != NULL;
2358 	    vp = uu_list_next(p->sc_property_values, vp)) {
2359 		val = scf_value_create(g_hndl);
2360 		if (val == NULL) {
2361 			switch (scf_error()) {
2362 			case SCF_ERROR_NO_MEMORY:
2363 				return (stash_scferror(lcbdata));
2364 
2365 			case SCF_ERROR_INVALID_ARGUMENT:
2366 			default:
2367 				bad_error("scf_value_create", scf_error());
2368 			}
2369 		}
2370 
2371 		switch (tp) {
2372 		case SCF_TYPE_BOOLEAN:
2373 			scf_value_set_boolean(val, vp->sc_u.sc_count);
2374 			break;
2375 		case SCF_TYPE_COUNT:
2376 			scf_value_set_count(val, vp->sc_u.sc_count);
2377 			break;
2378 		case SCF_TYPE_INTEGER:
2379 			scf_value_set_integer(val, vp->sc_u.sc_integer);
2380 			break;
2381 		default:
2382 			assert(vp->sc_u.sc_string != NULL);
2383 			if (scf_value_set_from_string(val, tp,
2384 			    vp->sc_u.sc_string) != 0) {
2385 				if (scf_error() != SCF_ERROR_INVALID_ARGUMENT)
2386 					bad_error("scf_value_set_from_string",
2387 					    scf_error());
2388 
2389 				warn(gettext("Value \"%s\" is not a valid "
2390 				    "%s.\n"), vp->sc_u.sc_string,
2391 				    scf_type_to_string(tp));
2392 				scf_value_destroy(val);
2393 				return (stash_scferror(lcbdata));
2394 			}
2395 			break;
2396 		}
2397 
2398 		if (scf_entry_add_value(entr, val) != 0)
2399 			bad_error("scf_entry_add_value", scf_error());
2400 	}
2401 
2402 	return (UU_WALK_NEXT);
2403 }
2404 
2405 /*
2406  * Import a pgroup_t into the repository.  Uses sc_handle, sc_parent,
2407  * sc_service, sc_flags (SCI_GENERALLAST, SCI_FORCE, & SCI_KEEP),
2408  * sc_source_fmri, and sc_target_fmri in lcbdata, and uses imp_pg and imp_tx.
2409  * On success, returns UU_WALK_NEXT.  On error returns UU_WALK_ERROR and sets
2410  * lcbdata->sc_err to
2411  *   ECONNABORTED - repository connection broken
2412  *   ENOMEM - out of memory
2413  *   ENOSPC - svc.configd is out of resources
2414  *   ECANCELED - sc_parent was deleted
2415  *   EPERM - could not create property group (permission denied) (error printed)
2416  *	   - could not modify property group (permission denied) (error printed)
2417  *	   - could not delete property group (permission denied) (error	printed)
2418  *   EROFS - could not create property group (repository is read-only)
2419  *	   - could not delete property group (repository is read-only)
2420  *   EACCES - could not create property group (backend access denied)
2421  *	    - could not delete property group (backend access denied)
2422  *   EEXIST - could not create property group (already exists)
2423  *   EINVAL - invalid property group name (error printed)
2424  *	    - invalid property name (error printed)
2425  *	    - invalid value (error printed)
2426  *   EBUSY - new property group deleted (error printed)
2427  *	   - new property group changed (error printed)
2428  *	   - property group added (error printed)
2429  *	   - property group deleted (error printed)
2430  */
2431 static int
2432 entity_pgroup_import(void *v, void *pvt)
2433 {
2434 	pgroup_t *p = v;
2435 	scf_callback_t cbdata;
2436 	scf_callback_t *lcbdata = pvt;
2437 	void *ent = lcbdata->sc_parent;
2438 	int issvc = lcbdata->sc_service;
2439 	int r;
2440 
2441 	const char * const pg_changed = gettext("%s changed unexpectedly "
2442 	    "(new property group \"%s\" changed).\n");
2443 
2444 	/* Never import deleted property groups. */
2445 	if (p->sc_pgroup_delete) {
2446 		if ((lcbdata->sc_flags & SCI_OP_APPLY) == SCI_OP_APPLY &&
2447 		    entity_get_pg(ent, issvc, p->sc_pgroup_name, imp_pg) == 0) {
2448 			goto delete_pg;
2449 		}
2450 		return (UU_WALK_NEXT);
2451 	}
2452 
2453 	if (!issvc && (lcbdata->sc_flags & SCI_GENERALLAST) &&
2454 	    strcmp(p->sc_pgroup_name, SCF_PG_GENERAL) == 0) {
2455 		lcbdata->sc_general = p;
2456 		return (UU_WALK_NEXT);
2457 	}
2458 
2459 add_pg:
2460 	if (issvc)
2461 		r = scf_service_add_pg(ent, p->sc_pgroup_name,
2462 		    p->sc_pgroup_type, p->sc_pgroup_flags, imp_pg);
2463 	else
2464 		r = scf_instance_add_pg(ent, p->sc_pgroup_name,
2465 		    p->sc_pgroup_type, p->sc_pgroup_flags, imp_pg);
2466 	if (r != 0) {
2467 		switch (scf_error()) {
2468 		case SCF_ERROR_DELETED:
2469 		case SCF_ERROR_CONNECTION_BROKEN:
2470 		case SCF_ERROR_BACKEND_READONLY:
2471 		case SCF_ERROR_BACKEND_ACCESS:
2472 		case SCF_ERROR_NO_RESOURCES:
2473 			return (stash_scferror(lcbdata));
2474 
2475 		case SCF_ERROR_EXISTS:
2476 			if (lcbdata->sc_flags & SCI_FORCE)
2477 				break;
2478 			return (stash_scferror(lcbdata));
2479 
2480 		case SCF_ERROR_INVALID_ARGUMENT:
2481 			warn(emsg_fmri_invalid_pg_name_type,
2482 			    lcbdata->sc_source_fmri,
2483 			    p->sc_pgroup_name, p->sc_pgroup_type);
2484 			return (stash_scferror(lcbdata));
2485 
2486 		case SCF_ERROR_PERMISSION_DENIED:
2487 			warn(emsg_pg_add_perm, p->sc_pgroup_name,
2488 			    lcbdata->sc_target_fmri);
2489 			return (stash_scferror(lcbdata));
2490 
2491 		case SCF_ERROR_NOT_BOUND:
2492 		case SCF_ERROR_HANDLE_MISMATCH:
2493 		case SCF_ERROR_NOT_SET:
2494 		default:
2495 			bad_error("scf_service_add_pg", scf_error());
2496 		}
2497 
2498 		if (entity_get_pg(ent, issvc, p->sc_pgroup_name, imp_pg) != 0) {
2499 			switch (scf_error()) {
2500 			case SCF_ERROR_CONNECTION_BROKEN:
2501 			case SCF_ERROR_DELETED:
2502 				return (stash_scferror(lcbdata));
2503 
2504 			case SCF_ERROR_INVALID_ARGUMENT:
2505 				warn(emsg_fmri_invalid_pg_name,
2506 				    lcbdata->sc_source_fmri,
2507 				    p->sc_pgroup_name);
2508 				return (stash_scferror(lcbdata));
2509 
2510 			case SCF_ERROR_NOT_FOUND:
2511 				warn(emsg_pg_deleted, lcbdata->sc_target_fmri,
2512 				    p->sc_pgroup_name);
2513 				lcbdata->sc_err = EBUSY;
2514 				return (UU_WALK_ERROR);
2515 
2516 			case SCF_ERROR_NOT_BOUND:
2517 			case SCF_ERROR_HANDLE_MISMATCH:
2518 			case SCF_ERROR_NOT_SET:
2519 			default:
2520 				bad_error("entity_get_pg", scf_error());
2521 			}
2522 		}
2523 
2524 		if (lcbdata->sc_flags & SCI_KEEP)
2525 			goto props;
2526 
2527 delete_pg:
2528 		if (scf_pg_delete(imp_pg) != 0) {
2529 			switch (scf_error()) {
2530 			case SCF_ERROR_DELETED:
2531 				warn(emsg_pg_deleted, lcbdata->sc_target_fmri,
2532 				    p->sc_pgroup_name);
2533 				lcbdata->sc_err = EBUSY;
2534 				return (UU_WALK_ERROR);
2535 
2536 			case SCF_ERROR_PERMISSION_DENIED:
2537 				warn(emsg_pg_del_perm, p->sc_pgroup_name,
2538 				    lcbdata->sc_target_fmri);
2539 				return (stash_scferror(lcbdata));
2540 
2541 			case SCF_ERROR_BACKEND_READONLY:
2542 			case SCF_ERROR_BACKEND_ACCESS:
2543 			case SCF_ERROR_CONNECTION_BROKEN:
2544 				return (stash_scferror(lcbdata));
2545 
2546 			case SCF_ERROR_NOT_SET:
2547 			default:
2548 				bad_error("scf_pg_delete", scf_error());
2549 			}
2550 		}
2551 
2552 		if (p->sc_pgroup_delete)
2553 			return (UU_WALK_NEXT);
2554 
2555 		goto add_pg;
2556 	}
2557 
2558 props:
2559 
2560 	/*
2561 	 * Add properties to property group, if any.
2562 	 */
2563 	cbdata.sc_handle = lcbdata->sc_handle;
2564 	cbdata.sc_parent = imp_pg;
2565 	cbdata.sc_flags = lcbdata->sc_flags;
2566 	cbdata.sc_trans = imp_tx;
2567 	cbdata.sc_enable = NULL;
2568 
2569 	if (scf_transaction_start(imp_tx, imp_pg) != 0) {
2570 		switch (scf_error()) {
2571 		case SCF_ERROR_BACKEND_ACCESS:
2572 		case SCF_ERROR_BACKEND_READONLY:
2573 		case SCF_ERROR_CONNECTION_BROKEN:
2574 			return (stash_scferror(lcbdata));
2575 
2576 		case SCF_ERROR_DELETED:
2577 			warn(pg_changed, lcbdata->sc_target_fmri,
2578 			    p->sc_pgroup_name);
2579 			lcbdata->sc_err = EBUSY;
2580 			return (UU_WALK_ERROR);
2581 
2582 		case SCF_ERROR_PERMISSION_DENIED:
2583 			warn(emsg_pg_mod_perm, p->sc_pgroup_name,
2584 			    lcbdata->sc_target_fmri);
2585 			return (stash_scferror(lcbdata));
2586 
2587 		case SCF_ERROR_NOT_BOUND:
2588 		case SCF_ERROR_NOT_SET:
2589 		case SCF_ERROR_IN_USE:
2590 		case SCF_ERROR_HANDLE_MISMATCH:
2591 		default:
2592 			bad_error("scf_transaction_start", scf_error());
2593 		}
2594 	}
2595 
2596 	if (uu_list_walk(p->sc_pgroup_props, lscf_property_import, &cbdata,
2597 	    UU_DEFAULT) != 0) {
2598 		if (uu_error() != UU_ERROR_CALLBACK_FAILED)
2599 			bad_error("uu_list_walk", uu_error());
2600 		scf_transaction_reset(imp_tx);
2601 
2602 		lcbdata->sc_err = cbdata.sc_err;
2603 		if (cbdata.sc_err == ECANCELED) {
2604 			warn(pg_changed, lcbdata->sc_target_fmri,
2605 			    p->sc_pgroup_name);
2606 			lcbdata->sc_err = EBUSY;
2607 		}
2608 		return (UU_WALK_ERROR);
2609 	}
2610 
2611 	if ((lcbdata->sc_flags & SCI_DELAYENABLE) && cbdata.sc_enable) {
2612 		cbdata.sc_flags = cbdata.sc_flags & (~SCI_DELAYENABLE);
2613 
2614 		/*
2615 		 * take the snapshot running snapshot then
2616 		 * import the stored general/enable property
2617 		 */
2618 		r = take_snap(ent, snap_running, imp_rsnap);
2619 		switch (r) {
2620 		case 0:
2621 			break;
2622 
2623 		case ECONNABORTED:
2624 			warn(gettext("Could not take %s snapshot on import "
2625 			    "(repository connection broken).\n"),
2626 			    snap_running);
2627 			lcbdata->sc_err = r;
2628 			return (UU_WALK_ERROR);
2629 		case ECANCELED:
2630 			warn(emsg_deleted);
2631 			lcbdata->sc_err = r;
2632 			return (UU_WALK_ERROR);
2633 
2634 		case EPERM:
2635 			warn(gettext("Could not take %s snapshot "
2636 			    "(permission denied).\n"), snap_running);
2637 			lcbdata->sc_err = r;
2638 			return (UU_WALK_ERROR);
2639 
2640 		case ENOSPC:
2641 			warn(gettext("Could not take %s snapshot"
2642 			    "(repository server out of resources).\n"),
2643 			    snap_running);
2644 			lcbdata->sc_err = r;
2645 			return (UU_WALK_ERROR);
2646 
2647 		default:
2648 			bad_error("take_snap", r);
2649 		}
2650 
2651 		r = lscf_property_import(cbdata.sc_enable, &cbdata);
2652 		if (r != UU_WALK_NEXT) {
2653 			if (r != UU_WALK_ERROR)
2654 				bad_error("lscf_property_import", r);
2655 			return (EINVAL);
2656 		}
2657 	}
2658 
2659 	r = scf_transaction_commit(imp_tx);
2660 	switch (r) {
2661 	case 1:
2662 		r = UU_WALK_NEXT;
2663 		break;
2664 
2665 	case 0:
2666 		warn(pg_changed, lcbdata->sc_target_fmri, p->sc_pgroup_name);
2667 		lcbdata->sc_err = EBUSY;
2668 		r = UU_WALK_ERROR;
2669 		break;
2670 
2671 	case -1:
2672 		switch (scf_error()) {
2673 		case SCF_ERROR_BACKEND_READONLY:
2674 		case SCF_ERROR_BACKEND_ACCESS:
2675 		case SCF_ERROR_CONNECTION_BROKEN:
2676 		case SCF_ERROR_NO_RESOURCES:
2677 			r = stash_scferror(lcbdata);
2678 			break;
2679 
2680 		case SCF_ERROR_DELETED:
2681 			warn(emsg_pg_deleted, lcbdata->sc_target_fmri,
2682 			    p->sc_pgroup_name);
2683 			lcbdata->sc_err = EBUSY;
2684 			r = UU_WALK_ERROR;
2685 			break;
2686 
2687 		case SCF_ERROR_PERMISSION_DENIED:
2688 			warn(emsg_pg_mod_perm, p->sc_pgroup_name,
2689 			    lcbdata->sc_target_fmri);
2690 			r = stash_scferror(lcbdata);
2691 			break;
2692 
2693 		case SCF_ERROR_NOT_SET:
2694 		case SCF_ERROR_INVALID_ARGUMENT:
2695 		case SCF_ERROR_NOT_BOUND:
2696 		default:
2697 			bad_error("scf_transaction_commit", scf_error());
2698 		}
2699 		break;
2700 
2701 	default:
2702 		bad_error("scf_transaction_commit", r);
2703 	}
2704 
2705 	scf_transaction_destroy_children(imp_tx);
2706 
2707 	return (r);
2708 }
2709 
2710 /*
2711  * Returns
2712  *   0 - success
2713  *   ECONNABORTED - repository connection broken
2714  *   ENOMEM - out of memory
2715  *   ENOSPC - svc.configd is out of resources
2716  *   ECANCELED - inst was deleted
2717  *   EPERM - could not create property group (permission denied) (error printed)
2718  *	   - could not modify property group (permission denied) (error printed)
2719  *   EROFS - could not create property group (repository is read-only)
2720  *   EACCES - could not create property group (backend access denied)
2721  *   EEXIST - could not create property group (already exists)
2722  *   EINVAL - invalid property group name (error printed)
2723  *	    - invalid property name (error printed)
2724  *	    - invalid value (error printed)
2725  *   EBUSY - new property group changed (error printed)
2726  */
2727 static int
2728 lscf_import_service_pgs(scf_service_t *svc, const char *target_fmri,
2729     const entity_t *isvc, int flags)
2730 {
2731 	scf_callback_t cbdata;
2732 
2733 	cbdata.sc_handle = scf_service_handle(svc);
2734 	cbdata.sc_parent = svc;
2735 	cbdata.sc_service = 1;
2736 	cbdata.sc_general = 0;
2737 	cbdata.sc_enable = 0;
2738 	cbdata.sc_flags = flags;
2739 	cbdata.sc_source_fmri = isvc->sc_fmri;
2740 	cbdata.sc_target_fmri = target_fmri;
2741 
2742 	/*
2743 	 * If the op is set, then add the flag to the callback
2744 	 * flags for later use.
2745 	 */
2746 	if (isvc->sc_op != SVCCFG_OP_NONE) {
2747 		switch (isvc->sc_op) {
2748 		case SVCCFG_OP_IMPORT :
2749 			cbdata.sc_flags |= SCI_OP_IMPORT;
2750 			break;
2751 		case SVCCFG_OP_APPLY :
2752 			cbdata.sc_flags |= SCI_OP_APPLY;
2753 			break;
2754 		case SVCCFG_OP_RESTORE :
2755 			cbdata.sc_flags |= SCI_OP_RESTORE;
2756 			break;
2757 		default :
2758 			uu_die(gettext("lscf_import_service_pgs : "
2759 			    "Unknown op stored in the service entity\n"));
2760 
2761 		}
2762 	}
2763 
2764 	if (uu_list_walk(isvc->sc_pgroups, entity_pgroup_import, &cbdata,
2765 	    UU_DEFAULT) != 0) {
2766 		if (uu_error() != UU_ERROR_CALLBACK_FAILED)
2767 			bad_error("uu_list_walk", uu_error());
2768 
2769 		return (cbdata.sc_err);
2770 	}
2771 
2772 	return (0);
2773 }
2774 
2775 /*
2776  * Returns
2777  *   0 - success
2778  *   ECONNABORTED - repository connection broken
2779  *   ENOMEM - out of memory
2780  *   ENOSPC - svc.configd is out of resources
2781  *   ECANCELED - inst was deleted
2782  *   EPERM - could not create property group (permission denied) (error printed)
2783  *	   - could not modify property group (permission denied) (error printed)
2784  *   EROFS - could not create property group (repository is read-only)
2785  *   EACCES - could not create property group (backend access denied)
2786  *   EEXIST - could not create property group (already exists)
2787  *   EINVAL - invalid property group name (error printed)
2788  *	    - invalid property name (error printed)
2789  *	    - invalid value (error printed)
2790  *   EBUSY - new property group changed (error printed)
2791  */
2792 static int
2793 lscf_import_instance_pgs(scf_instance_t *inst, const char *target_fmri,
2794     const entity_t *iinst, int flags)
2795 {
2796 	scf_callback_t cbdata;
2797 
2798 	cbdata.sc_handle = scf_instance_handle(inst);
2799 	cbdata.sc_parent = inst;
2800 	cbdata.sc_service = 0;
2801 	cbdata.sc_general = NULL;
2802 	cbdata.sc_enable = NULL;
2803 	cbdata.sc_flags = flags;
2804 	cbdata.sc_source_fmri = iinst->sc_fmri;
2805 	cbdata.sc_target_fmri = target_fmri;
2806 
2807 	/*
2808 	 * If the op is set, then add the flag to the callback
2809 	 * flags for later use.
2810 	 */
2811 	if (iinst->sc_op != SVCCFG_OP_NONE) {
2812 		switch (iinst->sc_op) {
2813 		case SVCCFG_OP_IMPORT :
2814 			cbdata.sc_flags |= SCI_OP_IMPORT;
2815 			break;
2816 		case SVCCFG_OP_APPLY :
2817 			cbdata.sc_flags |= SCI_OP_APPLY;
2818 			break;
2819 		case SVCCFG_OP_RESTORE :
2820 			cbdata.sc_flags |= SCI_OP_RESTORE;
2821 			break;
2822 		default :
2823 			uu_die(gettext("lscf_import_instance_pgs : "
2824 			    "Unknown op stored in the instance entity\n"));
2825 		}
2826 	}
2827 
2828 	if (uu_list_walk(iinst->sc_pgroups, entity_pgroup_import, &cbdata,
2829 	    UU_DEFAULT) != 0) {
2830 		if (uu_error() != UU_ERROR_CALLBACK_FAILED)
2831 			bad_error("uu_list_walk", uu_error());
2832 
2833 		return (cbdata.sc_err);
2834 	}
2835 
2836 	if ((flags & SCI_GENERALLAST) && cbdata.sc_general) {
2837 		cbdata.sc_flags = flags & (~SCI_GENERALLAST);
2838 		/*
2839 		 * If importing with the SCI_NOENABLED flag then
2840 		 * skip the delay, but if not then add the delay
2841 		 * of the enable property.
2842 		 */
2843 		if (!(cbdata.sc_flags & SCI_NOENABLED)) {
2844 			cbdata.sc_flags |= SCI_DELAYENABLE;
2845 		}
2846 
2847 		if (entity_pgroup_import(cbdata.sc_general, &cbdata)
2848 		    != UU_WALK_NEXT)
2849 			return (cbdata.sc_err);
2850 	}
2851 
2852 	return (0);
2853 }
2854 
2855 /*
2856  * Report the reasons why we can't upgrade pg2 to pg1.
2857  */
2858 static void
2859 report_pg_diffs(const pgroup_t *pg1, const pgroup_t *pg2, const char *fmri,
2860     int new)
2861 {
2862 	property_t *p1, *p2;
2863 
2864 	assert(strcmp(pg1->sc_pgroup_name, pg2->sc_pgroup_name) == 0);
2865 
2866 	if (!pg_attrs_equal(pg1, pg2, fmri, new))
2867 		return;
2868 
2869 	for (p1 = uu_list_first(pg1->sc_pgroup_props);
2870 	    p1 != NULL;
2871 	    p1 = uu_list_next(pg1->sc_pgroup_props, p1)) {
2872 		p2 = uu_list_find(pg2->sc_pgroup_props, p1, NULL, NULL);
2873 		if (p2 != NULL) {
2874 			(void) prop_equal(p1, p2, fmri, pg1->sc_pgroup_name,
2875 			    new);
2876 			continue;
2877 		}
2878 
2879 		if (new)
2880 			warn(gettext("Conflict upgrading %s (new property "
2881 			    "group \"%s\" is missing property \"%s\").\n"),
2882 			    fmri, pg1->sc_pgroup_name, p1->sc_property_name);
2883 		else
2884 			warn(gettext("Conflict upgrading %s (property "
2885 			    "\"%s/%s\" is missing).\n"), fmri,
2886 			    pg1->sc_pgroup_name, p1->sc_property_name);
2887 	}
2888 
2889 	/*
2890 	 * Since pg1 should be from the manifest, any properties in pg2 which
2891 	 * aren't in pg1 shouldn't be reported as conflicts.
2892 	 */
2893 }
2894 
2895 /*
2896  * Add transaction entries to tx which will upgrade cur's pg according to old
2897  * & new.
2898  *
2899  * Returns
2900  *   0 - success
2901  *   EINVAL - new has a property with an invalid name or value (message emitted)
2902  *   ENOMEM - out of memory
2903  */
2904 static int
2905 add_upgrade_entries(scf_transaction_t *tx, pgroup_t *old, pgroup_t *new,
2906     pgroup_t *cur, int speak, const char *fmri)
2907 {
2908 	property_t *p, *new_p, *cur_p;
2909 	scf_transaction_entry_t *e;
2910 	int r;
2911 	int is_general;
2912 	int is_protected;
2913 
2914 	if (uu_list_walk(new->sc_pgroup_props, clear_int,
2915 	    (void *)offsetof(property_t, sc_seen), UU_DEFAULT) != 0)
2916 		bad_error("uu_list_walk", uu_error());
2917 
2918 	is_general = strcmp(old->sc_pgroup_name, SCF_PG_GENERAL) == 0;
2919 
2920 	for (p = uu_list_first(old->sc_pgroup_props);
2921 	    p != NULL;
2922 	    p = uu_list_next(old->sc_pgroup_props, p)) {
2923 		/* p is a property in the old property group. */
2924 
2925 		/* Protect live properties. */
2926 		is_protected = 0;
2927 		if (is_general) {
2928 			if (strcmp(p->sc_property_name, SCF_PROPERTY_ENABLED) ==
2929 			    0 ||
2930 			    strcmp(p->sc_property_name,
2931 			    SCF_PROPERTY_RESTARTER) == 0)
2932 				is_protected = 1;
2933 		}
2934 
2935 		/* Look for the same property in the new properties. */
2936 		new_p = uu_list_find(new->sc_pgroup_props, p, NULL, NULL);
2937 		if (new_p != NULL) {
2938 			new_p->sc_seen = 1;
2939 
2940 			/*
2941 			 * If the new property is the same as the old, don't do
2942 			 * anything (leave any user customizations).
2943 			 */
2944 			if (prop_equal(p, new_p, NULL, NULL, 0))
2945 				continue;
2946 
2947 			if (new_p->sc_property_override)
2948 				goto upgrade;
2949 		}
2950 
2951 		cur_p = uu_list_find(cur->sc_pgroup_props, p, NULL, NULL);
2952 		if (cur_p == NULL) {
2953 			/*
2954 			 * p has been deleted from the repository.  If we were
2955 			 * going to delete it anyway, do nothing.  Otherwise
2956 			 * report a conflict.
2957 			 */
2958 			if (new_p == NULL)
2959 				continue;
2960 
2961 			if (is_protected)
2962 				continue;
2963 
2964 			warn(gettext("Conflict upgrading %s "
2965 			    "(property \"%s/%s\" is missing).\n"), fmri,
2966 			    old->sc_pgroup_name, p->sc_property_name);
2967 			continue;
2968 		}
2969 
2970 		if (!prop_equal(p, cur_p, NULL, NULL, 0)) {
2971 			/*
2972 			 * Conflict.  Don't warn if the property is already the
2973 			 * way we want it, though.
2974 			 */
2975 			if (is_protected)
2976 				continue;
2977 
2978 			if (new_p == NULL)
2979 				(void) prop_equal(p, cur_p, fmri,
2980 				    old->sc_pgroup_name, 0);
2981 			else
2982 				(void) prop_equal(cur_p, new_p, fmri,
2983 				    old->sc_pgroup_name, 0);
2984 			continue;
2985 		}
2986 
2987 		if (is_protected) {
2988 			if (speak)
2989 				warn(gettext("%s: Refusing to upgrade "
2990 				    "\"%s/%s\" (live property).\n"), fmri,
2991 				    old->sc_pgroup_name, p->sc_property_name);
2992 			continue;
2993 		}
2994 
2995 upgrade:
2996 		/* p hasn't been customized in the repository.  Upgrade it. */
2997 		if (new_p == NULL) {
2998 			/* p was deleted.  Delete from cur if unchanged. */
2999 			if (speak)
3000 				warn(gettext(
3001 				    "%s: Deleting property \"%s/%s\".\n"),
3002 				    fmri, old->sc_pgroup_name,
3003 				    p->sc_property_name);
3004 
3005 			e = scf_entry_create(g_hndl);
3006 			if (e == NULL)
3007 				return (ENOMEM);
3008 
3009 			if (scf_transaction_property_delete(tx, e,
3010 			    p->sc_property_name) != 0) {
3011 				switch (scf_error()) {
3012 				case SCF_ERROR_DELETED:
3013 					scf_entry_destroy(e);
3014 					return (ECANCELED);
3015 
3016 				case SCF_ERROR_CONNECTION_BROKEN:
3017 					scf_entry_destroy(e);
3018 					return (ECONNABORTED);
3019 
3020 				case SCF_ERROR_NOT_FOUND:
3021 					/*
3022 					 * This can happen if cur is from the
3023 					 * running snapshot (and it differs
3024 					 * from the live properties).
3025 					 */
3026 					scf_entry_destroy(e);
3027 					break;
3028 
3029 				case SCF_ERROR_HANDLE_MISMATCH:
3030 				case SCF_ERROR_NOT_BOUND:
3031 				case SCF_ERROR_NOT_SET:
3032 				case SCF_ERROR_INVALID_ARGUMENT:
3033 				default:
3034 					bad_error(
3035 					    "scf_transaction_property_delete",
3036 					    scf_error());
3037 				}
3038 			}
3039 		} else {
3040 			scf_callback_t ctx;
3041 
3042 			if (speak)
3043 				warn(gettext(
3044 				    "%s: Upgrading property \"%s/%s\".\n"),
3045 				    fmri, old->sc_pgroup_name,
3046 				    p->sc_property_name);
3047 
3048 			ctx.sc_handle = g_hndl;
3049 			ctx.sc_trans = tx;
3050 			ctx.sc_flags = 0;
3051 
3052 			r = lscf_property_import(new_p, &ctx);
3053 			if (r != UU_WALK_NEXT) {
3054 				if (r != UU_WALK_ERROR)
3055 					bad_error("lscf_property_import", r);
3056 				return (EINVAL);
3057 			}
3058 		}
3059 	}
3060 
3061 	/* Go over the properties which were added. */
3062 	for (new_p = uu_list_first(new->sc_pgroup_props);
3063 	    new_p != NULL;
3064 	    new_p = uu_list_next(new->sc_pgroup_props, new_p)) {
3065 		if (new_p->sc_seen)
3066 			continue;
3067 
3068 		/* This is a new property. */
3069 		cur_p = uu_list_find(cur->sc_pgroup_props, new_p, NULL, NULL);
3070 		if (cur_p == NULL) {
3071 			scf_callback_t ctx;
3072 
3073 			ctx.sc_handle = g_hndl;
3074 			ctx.sc_trans = tx;
3075 			ctx.sc_flags = 0;
3076 
3077 			r = lscf_property_import(new_p, &ctx);
3078 			if (r != UU_WALK_NEXT) {
3079 				if (r != UU_WALK_ERROR)
3080 					bad_error("lscf_property_import", r);
3081 				return (EINVAL);
3082 			}
3083 			continue;
3084 		}
3085 
3086 		/*
3087 		 * Report a conflict if the new property differs from the
3088 		 * current one.  Unless it's general/enabled, since that's
3089 		 * never in the last-import snapshot.
3090 		 */
3091 		if (strcmp(new_p->sc_property_name, SCF_PROPERTY_ENABLED) ==
3092 		    0 &&
3093 		    strcmp(cur->sc_pgroup_name, SCF_PG_GENERAL) == 0)
3094 			continue;
3095 
3096 		(void) prop_equal(cur_p, new_p, fmri, old->sc_pgroup_name, 1);
3097 	}
3098 
3099 	return (0);
3100 }
3101 
3102 /*
3103  * Upgrade pg according to old & new.
3104  *
3105  * Returns
3106  *   0 - success
3107  *   ECONNABORTED - repository connection broken
3108  *   ENOMEM - out of memory
3109  *   ENOSPC - svc.configd is out of resources
3110  *   ECANCELED - pg was deleted
3111  *   EPERM - couldn't modify pg (permission denied)
3112  *   EROFS - couldn't modify pg (backend read-only)
3113  *   EACCES - couldn't modify pg (backend access denied)
3114  *   EINVAL - new has a property with invalid name or value (error printed)
3115  *   EBUSY - pg changed unexpectedly
3116  */
3117 static int
3118 upgrade_pg(scf_propertygroup_t *pg, pgroup_t *cur, pgroup_t *old,
3119     pgroup_t *new, int speak, const char *fmri)
3120 {
3121 	int r;
3122 
3123 	if (scf_transaction_start(imp_tx, pg) != 0) {
3124 		switch (scf_error()) {
3125 		case SCF_ERROR_CONNECTION_BROKEN:
3126 		case SCF_ERROR_DELETED:
3127 		case SCF_ERROR_PERMISSION_DENIED:
3128 		case SCF_ERROR_BACKEND_READONLY:
3129 		case SCF_ERROR_BACKEND_ACCESS:
3130 			return (scferror2errno(scf_error()));
3131 
3132 		case SCF_ERROR_HANDLE_MISMATCH:
3133 		case SCF_ERROR_IN_USE:
3134 		case SCF_ERROR_NOT_BOUND:
3135 		case SCF_ERROR_NOT_SET:
3136 		default:
3137 			bad_error("scf_transaction_start", scf_error());
3138 		}
3139 	}
3140 
3141 	r = add_upgrade_entries(imp_tx, old, new, cur, speak, fmri);
3142 	switch (r) {
3143 	case 0:
3144 		break;
3145 
3146 	case EINVAL:
3147 	case ENOMEM:
3148 		scf_transaction_destroy_children(imp_tx);
3149 		return (r);
3150 
3151 	default:
3152 		bad_error("add_upgrade_entries", r);
3153 	}
3154 
3155 	r = scf_transaction_commit(imp_tx);
3156 
3157 	scf_transaction_destroy_children(imp_tx);
3158 
3159 	switch (r) {
3160 	case 1:
3161 		break;
3162 
3163 	case 0:
3164 		return (EBUSY);
3165 
3166 	case -1:
3167 		switch (scf_error()) {
3168 		case SCF_ERROR_CONNECTION_BROKEN:
3169 		case SCF_ERROR_NO_RESOURCES:
3170 		case SCF_ERROR_PERMISSION_DENIED:
3171 		case SCF_ERROR_BACKEND_READONLY:
3172 		case SCF_ERROR_BACKEND_ACCESS:
3173 		case SCF_ERROR_DELETED:
3174 			return (scferror2errno(scf_error()));
3175 
3176 		case SCF_ERROR_NOT_BOUND:
3177 		case SCF_ERROR_INVALID_ARGUMENT:
3178 		case SCF_ERROR_NOT_SET:
3179 		default:
3180 			bad_error("scf_transaction_commit", scf_error());
3181 		}
3182 
3183 	default:
3184 		bad_error("scf_transaction_commit", r);
3185 	}
3186 
3187 	return (0);
3188 }
3189 
3190 /*
3191  * Compares two entity FMRIs.  Returns
3192  *
3193  *   1 - equal
3194  *   0 - not equal
3195  *   -1 - f1 is invalid or not an entity
3196  *   -2 - f2 is invalid or not an entity
3197  */
3198 static int
3199 fmri_equal(const char *f1, const char *f2)
3200 {
3201 	int r;
3202 	const char *s1, *i1, *pg1;
3203 	const char *s2, *i2, *pg2;
3204 
3205 	if (strlcpy(imp_fe1, f1, max_scf_fmri_len + 1) >= max_scf_fmri_len + 1)
3206 		return (-1);
3207 	if (scf_parse_svc_fmri(imp_fe1, NULL, &s1, &i1, &pg1, NULL) != 0)
3208 		return (-1);
3209 
3210 	if (s1 == NULL || pg1 != NULL)
3211 		return (-1);
3212 
3213 	if (strlcpy(imp_fe2, f2, max_scf_fmri_len + 1) >= max_scf_fmri_len + 1)
3214 		return (-2);
3215 	if (scf_parse_svc_fmri(imp_fe2, NULL, &s2, &i2, &pg2, NULL) != 0)
3216 		return (-2);
3217 
3218 	if (s2 == NULL || pg2 != NULL)
3219 		return (-2);
3220 
3221 	r = strcmp(s1, s2);
3222 	if (r != 0)
3223 		return (0);
3224 
3225 	if (i1 == NULL && i2 == NULL)
3226 		return (1);
3227 
3228 	if (i1 == NULL || i2 == NULL)
3229 		return (0);
3230 
3231 	return (strcmp(i1, i2) == 0);
3232 }
3233 
3234 /*
3235  * Import a dependent by creating a dependency property group in the dependent
3236  * entity.  If lcbdata->sc_trans is set, assume it's been started on the
3237  * dependents pg, and add an entry to create a new property for this
3238  * dependent.  Uses sc_handle, sc_trans, and sc_fmri in lcbdata.
3239  *
3240  * On success, returns UU_WALK_NEXT.  On error, returns UU_WALK_ERROR and sets
3241  * lcbdata->sc_err to
3242  *   ECONNABORTED - repository connection broken
3243  *   ENOMEM - out of memory
3244  *   ENOSPC - configd is out of resources
3245  *   EINVAL - target is invalid (error printed)
3246  *	    - target is not an entity (error printed)
3247  *	    - dependent has invalid name (error printed)
3248  *	    - invalid property name (error printed)
3249  *	    - invalid value (error printed)
3250  *	    - scope of target does not exist (error printed)
3251  *   EPERM - couldn't create target (permission denied) (error printed)
3252  *	   - couldn't create dependency pg (permission denied) (error printed)
3253  *	   - couldn't modify dependency pg (permission denied) (error printed)
3254  *   EROFS - couldn't create target (repository read-only)
3255  *	   - couldn't create dependency pg (repository read-only)
3256  *   EACCES - couldn't create target (backend access denied)
3257  *	    - couldn't create dependency pg (backend access denied)
3258  *   ECANCELED - sc_trans's pg was deleted
3259  *   EALREADY - property for dependent already exists in sc_trans's pg
3260  *   EEXIST - dependency pg already exists in target (error printed)
3261  *   EBUSY - target deleted (error printed)
3262  *         - property group changed during import (error printed)
3263  */
3264 static int
3265 lscf_dependent_import(void *a1, void *pvt)
3266 {
3267 	pgroup_t *pgrp = a1;
3268 	scf_callback_t *lcbdata = pvt;
3269 
3270 	int isservice;
3271 	int ret;
3272 	scf_transaction_entry_t *e;
3273 	scf_value_t *val;
3274 	scf_callback_t dependent_cbdata;
3275 	scf_error_t scfe;
3276 
3277 	/*
3278 	 * Decode the FMRI into dependent_cbdata->sc_parent.  Do it here so if
3279 	 * it's invalid, we fail before modifying the repository.
3280 	 */
3281 	scfe = fmri_to_entity(lcbdata->sc_handle, pgrp->sc_pgroup_fmri,
3282 	    &dependent_cbdata.sc_parent, &isservice);
3283 	switch (scfe) {
3284 	case SCF_ERROR_NONE:
3285 		break;
3286 
3287 	case SCF_ERROR_NO_MEMORY:
3288 		return (stash_scferror_err(lcbdata, scfe));
3289 
3290 	case SCF_ERROR_INVALID_ARGUMENT:
3291 		semerr(gettext("The FMRI for the \"%s\" dependent is "
3292 		    "invalid.\n"), pgrp->sc_pgroup_name);
3293 		return (stash_scferror_err(lcbdata, scfe));
3294 
3295 	case SCF_ERROR_CONSTRAINT_VIOLATED:
3296 		semerr(gettext("The FMRI \"%s\" for the \"%s\" dependent "
3297 		    "specifies neither a service nor an instance.\n"),
3298 		    pgrp->sc_pgroup_fmri, pgrp->sc_pgroup_name);
3299 		return (stash_scferror_err(lcbdata, scfe));
3300 
3301 	case SCF_ERROR_NOT_FOUND:
3302 		scfe = create_entity(lcbdata->sc_handle, pgrp->sc_pgroup_fmri,
3303 		    &dependent_cbdata.sc_parent, &isservice);
3304 		switch (scfe) {
3305 		case SCF_ERROR_NONE:
3306 			break;
3307 
3308 		case SCF_ERROR_NO_MEMORY:
3309 		case SCF_ERROR_BACKEND_READONLY:
3310 		case SCF_ERROR_BACKEND_ACCESS:
3311 			return (stash_scferror_err(lcbdata, scfe));
3312 
3313 		case SCF_ERROR_NOT_FOUND:
3314 			semerr(gettext("The scope in FMRI \"%s\" for the "
3315 			    "\"%s\" dependent does not exist.\n"),
3316 			    pgrp->sc_pgroup_fmri, pgrp->sc_pgroup_name);
3317 			lcbdata->sc_err = EINVAL;
3318 			return (UU_WALK_ERROR);
3319 
3320 		case SCF_ERROR_PERMISSION_DENIED:
3321 			warn(gettext(
3322 			    "Could not create %s (permission denied).\n"),
3323 			    pgrp->sc_pgroup_fmri);
3324 			return (stash_scferror_err(lcbdata, scfe));
3325 
3326 		case SCF_ERROR_INVALID_ARGUMENT:
3327 		case SCF_ERROR_CONSTRAINT_VIOLATED:
3328 		default:
3329 			bad_error("create_entity", scfe);
3330 		}
3331 		break;
3332 
3333 	default:
3334 		bad_error("fmri_to_entity", scfe);
3335 	}
3336 
3337 	if (lcbdata->sc_trans != NULL) {
3338 		e = scf_entry_create(lcbdata->sc_handle);
3339 		if (e == NULL) {
3340 			if (scf_error() != SCF_ERROR_NO_MEMORY)
3341 				bad_error("scf_entry_create", scf_error());
3342 
3343 			entity_destroy(dependent_cbdata.sc_parent, isservice);
3344 			return (stash_scferror(lcbdata));
3345 		}
3346 
3347 		if (scf_transaction_property_new(lcbdata->sc_trans, e,
3348 		    pgrp->sc_pgroup_name, SCF_TYPE_FMRI) != 0) {
3349 			switch (scf_error()) {
3350 			case SCF_ERROR_INVALID_ARGUMENT:
3351 				warn(gettext("Dependent of %s has invalid name "
3352 				    "\"%s\".\n"), pgrp->sc_parent->sc_fmri,
3353 				    pgrp->sc_pgroup_name);
3354 				/* FALLTHROUGH */
3355 
3356 			case SCF_ERROR_DELETED:
3357 			case SCF_ERROR_CONNECTION_BROKEN:
3358 				scf_entry_destroy(e);
3359 				entity_destroy(dependent_cbdata.sc_parent,
3360 				    isservice);
3361 				return (stash_scferror(lcbdata));
3362 
3363 			case SCF_ERROR_EXISTS:
3364 				scf_entry_destroy(e);
3365 				entity_destroy(dependent_cbdata.sc_parent,
3366 				    isservice);
3367 				lcbdata->sc_err = EALREADY;
3368 				return (UU_WALK_ERROR);
3369 
3370 			case SCF_ERROR_NOT_BOUND:
3371 			case SCF_ERROR_HANDLE_MISMATCH:
3372 			case SCF_ERROR_NOT_SET:
3373 			default:
3374 				bad_error("scf_transaction_property_new",
3375 				    scf_error());
3376 			}
3377 		}
3378 
3379 		val = scf_value_create(lcbdata->sc_handle);
3380 		if (val == NULL) {
3381 			if (scf_error() != SCF_ERROR_NO_MEMORY)
3382 				bad_error("scf_value_create", scf_error());
3383 
3384 			entity_destroy(dependent_cbdata.sc_parent, isservice);
3385 			return (stash_scferror(lcbdata));
3386 		}
3387 
3388 		if (scf_value_set_from_string(val, SCF_TYPE_FMRI,
3389 		    pgrp->sc_pgroup_fmri) != 0)
3390 			/* invalid should have been caught above */
3391 			bad_error("scf_value_set_from_string", scf_error());
3392 
3393 		if (scf_entry_add_value(e, val) != 0)
3394 			bad_error("scf_entry_add_value", scf_error());
3395 	}
3396 
3397 	/* Add the property group to the target entity. */
3398 
3399 	dependent_cbdata.sc_handle = lcbdata->sc_handle;
3400 	dependent_cbdata.sc_flags = lcbdata->sc_flags;
3401 	dependent_cbdata.sc_source_fmri = lcbdata->sc_source_fmri;
3402 	dependent_cbdata.sc_target_fmri = pgrp->sc_pgroup_fmri;
3403 
3404 	ret = entity_pgroup_import(pgrp, &dependent_cbdata);
3405 
3406 	entity_destroy(dependent_cbdata.sc_parent, isservice);
3407 
3408 	if (ret == UU_WALK_NEXT)
3409 		return (ret);
3410 
3411 	if (ret != UU_WALK_ERROR)
3412 		bad_error("entity_pgroup_import", ret);
3413 
3414 	switch (dependent_cbdata.sc_err) {
3415 	case ECANCELED:
3416 		warn(gettext("%s deleted unexpectedly.\n"),
3417 		    pgrp->sc_pgroup_fmri);
3418 		lcbdata->sc_err = EBUSY;
3419 		break;
3420 
3421 	case EEXIST:
3422 		warn(gettext("Could not create \"%s\" dependency in %s "
3423 		    "(already exists).\n"), pgrp->sc_pgroup_name,
3424 		    pgrp->sc_pgroup_fmri);
3425 		/* FALLTHROUGH */
3426 
3427 	default:
3428 		lcbdata->sc_err = dependent_cbdata.sc_err;
3429 	}
3430 
3431 	return (UU_WALK_ERROR);
3432 }
3433 
3434 static int upgrade_dependent(const scf_property_t *, const entity_t *,
3435     const scf_snaplevel_t *, scf_transaction_t *);
3436 static int handle_dependent_conflict(const entity_t *, const scf_property_t *,
3437     const pgroup_t *);
3438 
3439 /*
3440  * Upgrade uncustomized dependents of ent to those specified in ient.  Read
3441  * the current dependent targets from running (the snaplevel of a running
3442  * snapshot which corresponds to ient) if not NULL (ent, an scf_service_t * or
3443  * scf_instance_t * according to ient, otherwise).  Draw the ancestral
3444  * dependent targets and dependency properties from li_dpts_pg (the
3445  * "dependents" property group in snpl) and snpl (the snaplevel which
3446  * corresponds to ent in a last-import snapshot).  If li_dpts_pg is NULL, then
3447  * snpl doesn't have a "dependents" property group, and any dependents in ient
3448  * are new.
3449  *
3450  * Returns
3451  *   0 - success
3452  *   ECONNABORTED - repository connection broken
3453  *   ENOMEM - out of memory
3454  *   ENOSPC - configd is out of resources
3455  *   ECANCELED - ent was deleted
3456  *   ENODEV - the entity containing li_dpts_pg was deleted
3457  *   EPERM - could not modify dependents pg (permission denied) (error printed)
3458  *	   - couldn't upgrade dependent (permission denied) (error printed)
3459  *	   - couldn't create dependent (permission denied) (error printed)
3460  *   EROFS - could not modify dependents pg (repository read-only)
3461  *	   - couldn't upgrade dependent (repository read-only)
3462  *	   - couldn't create dependent (repository read-only)
3463  *   EACCES - could not modify dependents pg (backend access denied)
3464  *	    - could not upgrade dependent (backend access denied)
3465  *	    - could not create dependent (backend access denied)
3466  *   EBUSY - "dependents" pg of ent added, changed, or deleted (error printed)
3467  *	   - dependent target deleted (error printed)
3468  *	   - dependent pg changed (error printed)
3469  *   EINVAL - new dependent is invalid (error printed)
3470  *   EBADF - snpl is corrupt (error printed)
3471  *	   - snpl has corrupt pg (error printed)
3472  *	   - dependency pg in target is corrupt (error printed)
3473  *	   - target has corrupt snapshot (error printed)
3474  *   EEXIST - dependency pg already existed in target service (error printed)
3475  */
3476 static int
3477 upgrade_dependents(const scf_propertygroup_t *li_dpts_pg,
3478     const scf_snaplevel_t *snpl, const entity_t *ient,
3479     const scf_snaplevel_t *running, void *ent)
3480 {
3481 	pgroup_t *new_dpt_pgroup;
3482 	scf_callback_t cbdata;
3483 	int r, unseen, tx_started = 0;
3484 	int have_cur_depts;
3485 
3486 	const char * const dependents = "dependents";
3487 
3488 	const int issvc = (ient->sc_etype == SVCCFG_SERVICE_OBJECT);
3489 
3490 	if (li_dpts_pg == NULL && uu_list_numnodes(ient->sc_dependents) == 0)
3491 		/* Nothing to do. */
3492 		return (0);
3493 
3494 	/* Fetch the current version of the "dependents" property group. */
3495 	have_cur_depts = 1;
3496 	if (entity_get_pg(ent, issvc, dependents, ud_cur_depts_pg) != 0) {
3497 		switch (scf_error()) {
3498 		case SCF_ERROR_NOT_FOUND:
3499 			break;
3500 
3501 		case SCF_ERROR_DELETED:
3502 		case SCF_ERROR_CONNECTION_BROKEN:
3503 			return (scferror2errno(scf_error()));
3504 
3505 		case SCF_ERROR_NOT_SET:
3506 		case SCF_ERROR_INVALID_ARGUMENT:
3507 		case SCF_ERROR_HANDLE_MISMATCH:
3508 		case SCF_ERROR_NOT_BOUND:
3509 		default:
3510 			bad_error("entity_get_pg", scf_error());
3511 		}
3512 
3513 		have_cur_depts = 0;
3514 	}
3515 
3516 	/* Fetch the running version of the "dependents" property group. */
3517 	ud_run_dpts_pg_set = 0;
3518 	if (running != NULL)
3519 		r = scf_snaplevel_get_pg(running, dependents, ud_run_dpts_pg);
3520 	else
3521 		r = entity_get_pg(ent, issvc, dependents, ud_run_dpts_pg);
3522 	if (r == 0) {
3523 		ud_run_dpts_pg_set = 1;
3524 	} else {
3525 		switch (scf_error()) {
3526 		case SCF_ERROR_NOT_FOUND:
3527 			break;
3528 
3529 		case SCF_ERROR_DELETED:
3530 		case SCF_ERROR_CONNECTION_BROKEN:
3531 			return (scferror2errno(scf_error()));
3532 
3533 		case SCF_ERROR_NOT_SET:
3534 		case SCF_ERROR_INVALID_ARGUMENT:
3535 		case SCF_ERROR_HANDLE_MISMATCH:
3536 		case SCF_ERROR_NOT_BOUND:
3537 		default:
3538 			bad_error(running ? "scf_snaplevel_get_pg" :
3539 			    "entity_get_pg", scf_error());
3540 		}
3541 	}
3542 
3543 	/*
3544 	 * Clear the seen fields of the dependents, so we can tell which ones
3545 	 * are new.
3546 	 */
3547 	if (uu_list_walk(ient->sc_dependents, clear_int,
3548 	    (void *)offsetof(pgroup_t, sc_pgroup_seen), UU_DEFAULT) != 0)
3549 		bad_error("uu_list_walk", uu_error());
3550 
3551 	if (li_dpts_pg != NULL) {
3552 		/*
3553 		 * Each property in li_dpts_pg represents a dependent tag in
3554 		 * the old manifest.  For each, call upgrade_dependent(),
3555 		 * which will change ud_cur_depts_pg or dependencies in other
3556 		 * services as appropriate.  Note (a) that changes to
3557 		 * ud_cur_depts_pg are accumulated in ud_tx so they can all be
3558 		 * made en masse, and (b) it's ok if the entity doesn't have
3559 		 * a current version of the "dependents" property group,
3560 		 * because we'll just consider all dependents as customized
3561 		 * (by being deleted).
3562 		 */
3563 
3564 		if (scf_iter_pg_properties(ud_iter, li_dpts_pg) != 0) {
3565 			switch (scf_error()) {
3566 			case SCF_ERROR_DELETED:
3567 				return (ENODEV);
3568 
3569 			case SCF_ERROR_CONNECTION_BROKEN:
3570 				return (ECONNABORTED);
3571 
3572 			case SCF_ERROR_HANDLE_MISMATCH:
3573 			case SCF_ERROR_NOT_BOUND:
3574 			case SCF_ERROR_NOT_SET:
3575 			default:
3576 				bad_error("scf_iter_pg_properties",
3577 				    scf_error());
3578 			}
3579 		}
3580 
3581 		if (have_cur_depts &&
3582 		    scf_transaction_start(ud_tx, ud_cur_depts_pg) != 0) {
3583 			switch (scf_error()) {
3584 			case SCF_ERROR_BACKEND_ACCESS:
3585 			case SCF_ERROR_BACKEND_READONLY:
3586 			case SCF_ERROR_CONNECTION_BROKEN:
3587 				return (scferror2errno(scf_error()));
3588 
3589 			case SCF_ERROR_DELETED:
3590 				warn(emsg_pg_deleted, ient->sc_fmri,
3591 				    dependents);
3592 				return (EBUSY);
3593 
3594 			case SCF_ERROR_PERMISSION_DENIED:
3595 				warn(emsg_pg_mod_perm, dependents,
3596 				    ient->sc_fmri);
3597 				return (scferror2errno(scf_error()));
3598 
3599 			case SCF_ERROR_HANDLE_MISMATCH:
3600 			case SCF_ERROR_IN_USE:
3601 			case SCF_ERROR_NOT_BOUND:
3602 			case SCF_ERROR_NOT_SET:
3603 			default:
3604 				bad_error("scf_transaction_start", scf_error());
3605 			}
3606 		}
3607 		tx_started = have_cur_depts;
3608 
3609 		for (;;) {
3610 			r = scf_iter_next_property(ud_iter, ud_dpt_prop);
3611 			if (r == 0)
3612 				break;
3613 			if (r == 1) {
3614 				r = upgrade_dependent(ud_dpt_prop, ient, snpl,
3615 				    tx_started ? ud_tx : NULL);
3616 				switch (r) {
3617 				case 0:
3618 					continue;
3619 
3620 				case ECONNABORTED:
3621 				case ENOMEM:
3622 				case ENOSPC:
3623 				case EBADF:
3624 				case EBUSY:
3625 				case EINVAL:
3626 				case EPERM:
3627 				case EROFS:
3628 				case EACCES:
3629 				case EEXIST:
3630 					break;
3631 
3632 				case ECANCELED:
3633 					r = ENODEV;
3634 					break;
3635 
3636 				default:
3637 					bad_error("upgrade_dependent", r);
3638 				}
3639 
3640 				if (tx_started)
3641 					scf_transaction_destroy_children(ud_tx);
3642 				return (r);
3643 			}
3644 			if (r != -1)
3645 				bad_error("scf_iter_next_property", r);
3646 
3647 			switch (scf_error()) {
3648 			case SCF_ERROR_DELETED:
3649 				r = ENODEV;
3650 				break;
3651 
3652 			case SCF_ERROR_CONNECTION_BROKEN:
3653 				r = ECONNABORTED;
3654 				break;
3655 
3656 			case SCF_ERROR_NOT_SET:
3657 			case SCF_ERROR_INVALID_ARGUMENT:
3658 			case SCF_ERROR_NOT_BOUND:
3659 			case SCF_ERROR_HANDLE_MISMATCH:
3660 			default:
3661 				bad_error("scf_iter_next_property",
3662 				    scf_error());
3663 			}
3664 
3665 			if (tx_started)
3666 				scf_transaction_destroy_children(ud_tx);
3667 			return (r);
3668 		}
3669 	}
3670 
3671 	/* import unseen dependents */
3672 	unseen = 0;
3673 	for (new_dpt_pgroup = uu_list_first(ient->sc_dependents);
3674 	    new_dpt_pgroup != NULL;
3675 	    new_dpt_pgroup = uu_list_next(ient->sc_dependents,
3676 	    new_dpt_pgroup)) {
3677 		if (!new_dpt_pgroup->sc_pgroup_seen) {
3678 			unseen = 1;
3679 			break;
3680 		}
3681 	}
3682 
3683 	/* If there are none, exit early. */
3684 	if (unseen == 0)
3685 		goto commit;
3686 
3687 	/* Set up for lscf_dependent_import() */
3688 	cbdata.sc_handle = g_hndl;
3689 	cbdata.sc_parent = ent;
3690 	cbdata.sc_service = issvc;
3691 	cbdata.sc_flags = 0;
3692 
3693 	if (!have_cur_depts) {
3694 		/*
3695 		 * We have new dependents to import, so we need a "dependents"
3696 		 * property group.
3697 		 */
3698 		if (issvc)
3699 			r = scf_service_add_pg(ent, dependents,
3700 			    SCF_GROUP_FRAMEWORK, 0, ud_cur_depts_pg);
3701 		else
3702 			r = scf_instance_add_pg(ent, dependents,
3703 			    SCF_GROUP_FRAMEWORK, 0, ud_cur_depts_pg);
3704 		if (r != 0) {
3705 			switch (scf_error()) {
3706 			case SCF_ERROR_DELETED:
3707 			case SCF_ERROR_CONNECTION_BROKEN:
3708 			case SCF_ERROR_BACKEND_READONLY:
3709 			case SCF_ERROR_BACKEND_ACCESS:
3710 			case SCF_ERROR_NO_RESOURCES:
3711 				return (scferror2errno(scf_error()));
3712 
3713 			case SCF_ERROR_EXISTS:
3714 				warn(emsg_pg_added, ient->sc_fmri, dependents);
3715 				return (EBUSY);
3716 
3717 			case SCF_ERROR_PERMISSION_DENIED:
3718 				warn(emsg_pg_add_perm, dependents,
3719 				    ient->sc_fmri);
3720 				return (scferror2errno(scf_error()));
3721 
3722 			case SCF_ERROR_NOT_BOUND:
3723 			case SCF_ERROR_HANDLE_MISMATCH:
3724 			case SCF_ERROR_INVALID_ARGUMENT:
3725 			case SCF_ERROR_NOT_SET:
3726 			default:
3727 				bad_error("scf_service_add_pg", scf_error());
3728 			}
3729 		}
3730 	}
3731 
3732 	cbdata.sc_trans = ud_tx;
3733 
3734 	if (!tx_started && scf_transaction_start(ud_tx, ud_cur_depts_pg) != 0) {
3735 		switch (scf_error()) {
3736 		case SCF_ERROR_CONNECTION_BROKEN:
3737 		case SCF_ERROR_BACKEND_ACCESS:
3738 		case SCF_ERROR_BACKEND_READONLY:
3739 			return (scferror2errno(scf_error()));
3740 
3741 		case SCF_ERROR_DELETED:
3742 			warn(emsg_pg_deleted, ient->sc_fmri, dependents);
3743 			return (EBUSY);
3744 
3745 		case SCF_ERROR_PERMISSION_DENIED:
3746 			warn(emsg_pg_mod_perm, dependents, ient->sc_fmri);
3747 			return (scferror2errno(scf_error()));
3748 
3749 		case SCF_ERROR_HANDLE_MISMATCH:
3750 		case SCF_ERROR_IN_USE:
3751 		case SCF_ERROR_NOT_BOUND:
3752 		case SCF_ERROR_NOT_SET:
3753 		default:
3754 			bad_error("scf_transaction_start", scf_error());
3755 		}
3756 	}
3757 	tx_started = 1;
3758 
3759 	for (new_dpt_pgroup = uu_list_first(ient->sc_dependents);
3760 	    new_dpt_pgroup != NULL;
3761 	    new_dpt_pgroup = uu_list_next(ient->sc_dependents,
3762 	    new_dpt_pgroup)) {
3763 		if (new_dpt_pgroup->sc_pgroup_seen)
3764 			continue;
3765 
3766 		if (ud_run_dpts_pg_set) {
3767 			/*
3768 			 * If the dependent is already there, then we have
3769 			 * a conflict.
3770 			 */
3771 			if (scf_pg_get_property(ud_run_dpts_pg,
3772 			    new_dpt_pgroup->sc_pgroup_name, ud_prop) == 0) {
3773 				r = handle_dependent_conflict(ient, ud_prop,
3774 				    new_dpt_pgroup);
3775 				switch (r) {
3776 				case 0:
3777 					continue;
3778 
3779 				case ECONNABORTED:
3780 				case ENOMEM:
3781 				case EBUSY:
3782 				case EBADF:
3783 				case EINVAL:
3784 					scf_transaction_destroy_children(ud_tx);
3785 					return (r);
3786 
3787 				default:
3788 					bad_error("handle_dependent_conflict",
3789 					    r);
3790 				}
3791 			} else {
3792 				switch (scf_error()) {
3793 				case SCF_ERROR_NOT_FOUND:
3794 					break;
3795 
3796 				case SCF_ERROR_INVALID_ARGUMENT:
3797 					warn(emsg_fmri_invalid_pg_name,
3798 					    ient->sc_fmri,
3799 					    new_dpt_pgroup->sc_pgroup_name);
3800 					scf_transaction_destroy_children(ud_tx);
3801 					return (EINVAL);
3802 
3803 				case SCF_ERROR_DELETED:
3804 					warn(emsg_pg_deleted, ient->sc_fmri,
3805 					    new_dpt_pgroup->sc_pgroup_name);
3806 					scf_transaction_destroy_children(ud_tx);
3807 					return (EBUSY);
3808 
3809 				case SCF_ERROR_CONNECTION_BROKEN:
3810 					scf_transaction_destroy_children(ud_tx);
3811 					return (ECONNABORTED);
3812 
3813 				case SCF_ERROR_NOT_BOUND:
3814 				case SCF_ERROR_HANDLE_MISMATCH:
3815 				case SCF_ERROR_NOT_SET:
3816 				default:
3817 					bad_error("scf_pg_get_property",
3818 					    scf_error());
3819 				}
3820 			}
3821 		}
3822 
3823 		r = lscf_dependent_import(new_dpt_pgroup, &cbdata);
3824 		if (r != UU_WALK_NEXT) {
3825 			if (r != UU_WALK_ERROR)
3826 				bad_error("lscf_dependent_import", r);
3827 
3828 			if (cbdata.sc_err == EALREADY) {
3829 				/* Collisions were handled preemptively. */
3830 				bad_error("lscf_dependent_import",
3831 				    cbdata.sc_err);
3832 			}
3833 
3834 			scf_transaction_destroy_children(ud_tx);
3835 			return (cbdata.sc_err);
3836 		}
3837 	}
3838 
3839 commit:
3840 	if (!tx_started)
3841 		return (0);
3842 
3843 	r = scf_transaction_commit(ud_tx);
3844 
3845 	scf_transaction_destroy_children(ud_tx);
3846 
3847 	switch (r) {
3848 	case 1:
3849 		return (0);
3850 
3851 	case 0:
3852 		warn(emsg_pg_changed, ient->sc_fmri, dependents);
3853 		return (EBUSY);
3854 
3855 	case -1:
3856 		break;
3857 
3858 	default:
3859 		bad_error("scf_transaction_commit", r);
3860 	}
3861 
3862 	switch (scf_error()) {
3863 	case SCF_ERROR_CONNECTION_BROKEN:
3864 	case SCF_ERROR_BACKEND_READONLY:
3865 	case SCF_ERROR_BACKEND_ACCESS:
3866 	case SCF_ERROR_NO_RESOURCES:
3867 		return (scferror2errno(scf_error()));
3868 
3869 	case SCF_ERROR_DELETED:
3870 		warn(emsg_pg_deleted, ient->sc_fmri, dependents);
3871 		return (EBUSY);
3872 
3873 	case SCF_ERROR_PERMISSION_DENIED:
3874 		warn(emsg_pg_mod_perm, dependents, ient->sc_fmri);
3875 		return (scferror2errno(scf_error()));
3876 
3877 	case SCF_ERROR_NOT_BOUND:
3878 	case SCF_ERROR_INVALID_ARGUMENT:
3879 	case SCF_ERROR_NOT_SET:
3880 	default:
3881 		bad_error("scf_transaction_destroy", scf_error());
3882 		/* NOTREACHED */
3883 	}
3884 }
3885 
3886 /*
3887  * Used to add the manifests to the list of currently supported manifests.
3888  * We can modify the existing manifest list removing entries if the files
3889  * don't exist.
3890  *
3891  * Get the old list and the new file name
3892  * If the new file name is in the list return
3893  * If not then add the file to the list.
3894  * As we process the list check to see if the files in the old list exist
3895  *	if not then remove the file from the list.
3896  * Commit the list of manifest file names.
3897  *
3898  */
3899 static int
3900 upgrade_manifestfiles(pgroup_t *pg, entity_t *ient,
3901     const scf_snaplevel_t *running, void *ent)
3902 {
3903 	scf_propertygroup_t *ud_mfsts_pg = NULL;
3904 	scf_property_t *ud_prop = NULL;
3905 	scf_iter_t *ud_prop_iter;
3906 	scf_value_t *fname_value;
3907 	scf_callback_t cbdata;
3908 	pgroup_t *mfst_pgroup;
3909 	property_t *mfst_prop;
3910 	property_t *old_prop;
3911 	char *pname;
3912 	char *fval;
3913 	char *old_pname;
3914 	char *old_fval;
3915 	int no_upgrade_pg;
3916 	int mfst_seen;
3917 	int r;
3918 
3919 	const int issvc = (ient->sc_etype == SVCCFG_SERVICE_OBJECT);
3920 
3921 	/*
3922 	 * This should always be the service base on the code
3923 	 * path, and the fact that the manifests pg is a service
3924 	 * level property group only.
3925 	 */
3926 	ud_mfsts_pg = scf_pg_create(g_hndl);
3927 	ud_prop = scf_property_create(g_hndl);
3928 	ud_prop_iter = scf_iter_create(g_hndl);
3929 	fname_value = scf_value_create(g_hndl);
3930 
3931 	/* Fetch the "manifests" property group */
3932 	no_upgrade_pg = 0;
3933 	r = entity_get_pg(ent, issvc, SCF_PG_MANIFESTFILES,
3934 	    ud_mfsts_pg);
3935 	if (r != 0) {
3936 		switch (scf_error()) {
3937 		case SCF_ERROR_NOT_FOUND:
3938 			no_upgrade_pg = 1;
3939 			break;
3940 
3941 		case SCF_ERROR_DELETED:
3942 		case SCF_ERROR_CONNECTION_BROKEN:
3943 			return (scferror2errno(scf_error()));
3944 
3945 		case SCF_ERROR_NOT_SET:
3946 		case SCF_ERROR_INVALID_ARGUMENT:
3947 		case SCF_ERROR_HANDLE_MISMATCH:
3948 		case SCF_ERROR_NOT_BOUND:
3949 		default:
3950 			bad_error(running ? "scf_snaplevel_get_pg" :
3951 			    "entity_get_pg", scf_error());
3952 		}
3953 	}
3954 
3955 	if (no_upgrade_pg) {
3956 		cbdata.sc_handle = g_hndl;
3957 		cbdata.sc_parent = ent;
3958 		cbdata.sc_service = issvc;
3959 		cbdata.sc_flags = SCI_FORCE;
3960 		cbdata.sc_source_fmri = ient->sc_fmri;
3961 		cbdata.sc_target_fmri = ient->sc_fmri;
3962 
3963 		if (entity_pgroup_import(pg, &cbdata) != UU_WALK_NEXT)
3964 			return (cbdata.sc_err);
3965 
3966 		return (0);
3967 	}
3968 
3969 	/* Fetch the new manifests property group */
3970 	mfst_pgroup = internal_pgroup_find_or_create(ient,
3971 	    SCF_PG_MANIFESTFILES, SCF_GROUP_FRAMEWORK);
3972 	assert(mfst_pgroup != NULL);
3973 
3974 	if ((r = scf_iter_pg_properties(ud_prop_iter, ud_mfsts_pg)) !=
3975 	    SCF_SUCCESS)
3976 		return (-1);
3977 
3978 	if ((pname = malloc(MAXPATHLEN)) == NULL)
3979 		return (ENOMEM);
3980 	if ((fval = malloc(MAXPATHLEN)) == NULL) {
3981 		free(pname);
3982 		return (ENOMEM);
3983 	}
3984 
3985 	while ((r = scf_iter_next_property(ud_prop_iter, ud_prop)) == 1) {
3986 		mfst_seen = 0;
3987 		if (scf_property_get_name(ud_prop, pname, MAXPATHLEN) < 0)
3988 			continue;
3989 
3990 		for (mfst_prop = uu_list_first(mfst_pgroup->sc_pgroup_props);
3991 		    mfst_prop != NULL;
3992 		    mfst_prop = uu_list_next(mfst_pgroup->sc_pgroup_props,
3993 		    mfst_prop)) {
3994 			if (strcmp(mfst_prop->sc_property_name, pname) == 0) {
3995 				mfst_seen = 1;
3996 			}
3997 		}
3998 
3999 		/*
4000 		 * If the manifest is not seen then add it to the new mfst
4001 		 * property list to get proccessed into the repo.
4002 		 */
4003 		if (mfst_seen == 0) {
4004 			/*
4005 			 * If we cannot get the value then there is no
4006 			 * reason to attempt to attach the value to
4007 			 * the property group
4008 			 */
4009 			if (prop_get_val(ud_prop, fname_value) == 0 &&
4010 			    scf_value_get_astring(fname_value, fval,
4011 			    MAXPATHLEN) != -1)  {
4012 				old_pname = safe_strdup(pname);
4013 				old_fval = safe_strdup(fval);
4014 				old_prop = internal_property_create(old_pname,
4015 				    SCF_TYPE_ASTRING, 1, old_fval);
4016 
4017 				/*
4018 				 * Already checked to see if the property exists
4019 				 * in the group, and it does not.
4020 				 */
4021 				(void) internal_attach_property(mfst_pgroup,
4022 				    old_prop);
4023 			}
4024 		}
4025 	}
4026 	free(pname);
4027 	free(fval);
4028 
4029 	cbdata.sc_handle = g_hndl;
4030 	cbdata.sc_parent = ent;
4031 	cbdata.sc_service = issvc;
4032 	cbdata.sc_flags = SCI_FORCE;
4033 	cbdata.sc_source_fmri = ient->sc_fmri;
4034 	cbdata.sc_target_fmri = ient->sc_fmri;
4035 
4036 	if (entity_pgroup_import(mfst_pgroup, &cbdata) != UU_WALK_NEXT)
4037 		return (cbdata.sc_err);
4038 
4039 	return (r);
4040 }
4041 
4042 /*
4043  * prop is taken to be a property in the "dependents" property group of snpl,
4044  * which is taken to be the snaplevel of a last-import snapshot corresponding
4045  * to ient.  If prop is a valid dependents property, upgrade the dependent it
4046  * represents according to the repository & ient.  If ud_run_dpts_pg_set is
4047  * true, then ud_run_dpts_pg is taken to be the "dependents" property group
4048  * of the entity ient represents (possibly in the running snapshot).  If it
4049  * needs to be changed, an entry will be added to tx, if not NULL.
4050  *
4051  * Returns
4052  *   0 - success
4053  *   ECONNABORTED - repository connection broken
4054  *   ENOMEM - out of memory
4055  *   ENOSPC - configd was out of resources
4056  *   ECANCELED - snpl's entity was deleted
4057  *   EINVAL - dependent target is invalid (error printed)
4058  *	    - dependent is invalid (error printed)
4059  *   EBADF - snpl is corrupt (error printed)
4060  *	   - snpl has corrupt pg (error printed)
4061  *	   - dependency pg in target is corrupt (error printed)
4062  *	   - running snapshot in dependent is missing snaplevel (error printed)
4063  *   EPERM - couldn't delete dependency pg (permission denied) (error printed)
4064  *	   - couldn't create dependent (permission denied) (error printed)
4065  *	   - couldn't modify dependent pg (permission denied) (error printed)
4066  *   EROFS - couldn't delete dependency pg (repository read-only)
4067  *	   - couldn't create dependent (repository read-only)
4068  *   EACCES - couldn't delete dependency pg (backend access denied)
4069  *	    - couldn't create dependent (backend access denied)
4070  *   EBUSY - ud_run_dpts_pg was deleted (error printed)
4071  *	   - tx's pg was deleted (error printed)
4072  *	   - dependent pg was changed or deleted (error printed)
4073  *   EEXIST - dependency pg already exists in new target (error printed)
4074  */
4075 static int
4076 upgrade_dependent(const scf_property_t *prop, const entity_t *ient,
4077     const scf_snaplevel_t *snpl, scf_transaction_t *tx)
4078 {
4079 	pgroup_t pgrp;
4080 	scf_type_t ty;
4081 	pgroup_t *new_dpt_pgroup;
4082 	pgroup_t *old_dpt_pgroup = NULL;
4083 	pgroup_t *current_pg;
4084 	pgroup_t *dpt;
4085 	scf_callback_t cbdata;
4086 	int tissvc;
4087 	void *target_ent;
4088 	scf_error_t serr;
4089 	int r;
4090 	scf_transaction_entry_t *ent;
4091 
4092 	const char * const cf_inval = gettext("Conflict upgrading %s "
4093 	    "(dependent \"%s\" has invalid dependents property).\n");
4094 	const char * const cf_missing = gettext("Conflict upgrading %s "
4095 	    "(dependent \"%s\" is missing).\n");
4096 	const char * const cf_newdpg = gettext("Conflict upgrading %s "
4097 	    "(dependent \"%s\" has new dependency property group).\n");
4098 	const char * const cf_newtarg = gettext("Conflict upgrading %s "
4099 	    "(dependent \"%s\" has new target).\n");
4100 	const char * const li_corrupt =
4101 	    gettext("%s: \"last-import\" snapshot is corrupt.\n");
4102 	const char * const upgrading =
4103 	    gettext("%s: Upgrading dependent \"%s\".\n");
4104 	const char * const r_no_lvl = gettext("%s: \"running\" snapshot is "
4105 	    "corrupt (missing snaplevel).\n");
4106 
4107 	if (scf_property_type(prop, &ty) != 0) {
4108 		switch (scf_error()) {
4109 		case SCF_ERROR_DELETED:
4110 		case SCF_ERROR_CONNECTION_BROKEN:
4111 			return (scferror2errno(scf_error()));
4112 
4113 		case SCF_ERROR_NOT_BOUND:
4114 		case SCF_ERROR_NOT_SET:
4115 		default:
4116 			bad_error("scf_property_type", scf_error());
4117 		}
4118 	}
4119 
4120 	if (!(ty == SCF_TYPE_FMRI || ty == SCF_TYPE_ASTRING)) {
4121 		warn(li_corrupt, ient->sc_fmri);
4122 		return (EBADF);
4123 	}
4124 
4125 	/*
4126 	 * prop represents a dependent in the old manifest.  It is named after
4127 	 * the dependent.
4128 	 */
4129 	if (scf_property_get_name(prop, ud_name, max_scf_name_len + 1) < 0) {
4130 		switch (scf_error()) {
4131 		case SCF_ERROR_DELETED:
4132 		case SCF_ERROR_CONNECTION_BROKEN:
4133 			return (scferror2errno(scf_error()));
4134 
4135 		case SCF_ERROR_NOT_BOUND:
4136 		case SCF_ERROR_NOT_SET:
4137 		default:
4138 			bad_error("scf_property_get_name", scf_error());
4139 		}
4140 	}
4141 
4142 	/* See if it's in the new manifest. */
4143 	pgrp.sc_pgroup_name = ud_name;
4144 	new_dpt_pgroup =
4145 	    uu_list_find(ient->sc_dependents, &pgrp, NULL, UU_DEFAULT);
4146 
4147 	/* If it's not, delete it... if it hasn't been customized. */
4148 	if (new_dpt_pgroup == NULL) {
4149 		if (!ud_run_dpts_pg_set)
4150 			return (0);
4151 
4152 		if (scf_property_get_value(prop, ud_val) != 0) {
4153 			switch (scf_error()) {
4154 			case SCF_ERROR_NOT_FOUND:
4155 			case SCF_ERROR_CONSTRAINT_VIOLATED:
4156 				warn(li_corrupt, ient->sc_fmri);
4157 				return (EBADF);
4158 
4159 			case SCF_ERROR_DELETED:
4160 			case SCF_ERROR_CONNECTION_BROKEN:
4161 				return (scferror2errno(scf_error()));
4162 
4163 			case SCF_ERROR_HANDLE_MISMATCH:
4164 			case SCF_ERROR_NOT_BOUND:
4165 			case SCF_ERROR_NOT_SET:
4166 			case SCF_ERROR_PERMISSION_DENIED:
4167 			default:
4168 				bad_error("scf_property_get_value",
4169 				    scf_error());
4170 			}
4171 		}
4172 
4173 		if (scf_value_get_as_string(ud_val, ud_oldtarg,
4174 		    max_scf_value_len + 1) < 0)
4175 			bad_error("scf_value_get_as_string", scf_error());
4176 
4177 		if (scf_pg_get_property(ud_run_dpts_pg, ud_name, ud_prop) !=
4178 		    0) {
4179 			switch (scf_error()) {
4180 			case SCF_ERROR_NOT_FOUND:
4181 				return (0);
4182 
4183 			case SCF_ERROR_CONNECTION_BROKEN:
4184 				return (scferror2errno(scf_error()));
4185 
4186 			case SCF_ERROR_DELETED:
4187 				warn(emsg_pg_deleted, ient->sc_fmri,
4188 				    "dependents");
4189 				return (EBUSY);
4190 
4191 			case SCF_ERROR_INVALID_ARGUMENT:
4192 			case SCF_ERROR_NOT_BOUND:
4193 			case SCF_ERROR_HANDLE_MISMATCH:
4194 			case SCF_ERROR_NOT_SET:
4195 			default:
4196 				bad_error("scf_pg_get_property", scf_error());
4197 			}
4198 		}
4199 		if (scf_property_get_value(ud_prop, ud_val) != 0) {
4200 			switch (scf_error()) {
4201 			case SCF_ERROR_NOT_FOUND:
4202 			case SCF_ERROR_CONSTRAINT_VIOLATED:
4203 				warn(cf_inval, ient->sc_fmri, ud_name);
4204 				return (0);
4205 
4206 			case SCF_ERROR_DELETED:
4207 			case SCF_ERROR_CONNECTION_BROKEN:
4208 				return (scferror2errno(scf_error()));
4209 
4210 			case SCF_ERROR_HANDLE_MISMATCH:
4211 			case SCF_ERROR_NOT_BOUND:
4212 			case SCF_ERROR_NOT_SET:
4213 			case SCF_ERROR_PERMISSION_DENIED:
4214 			default:
4215 				bad_error("scf_property_get_value",
4216 				    scf_error());
4217 			}
4218 		}
4219 
4220 		ty = scf_value_type(ud_val);
4221 		assert(ty != SCF_TYPE_INVALID);
4222 		if (!(ty == SCF_TYPE_FMRI || ty == SCF_TYPE_ASTRING)) {
4223 			warn(cf_inval, ient->sc_fmri, ud_name);
4224 			return (0);
4225 		}
4226 
4227 		if (scf_value_get_as_string(ud_val, ud_ctarg,
4228 		    max_scf_value_len + 1) < 0)
4229 			bad_error("scf_value_get_as_string", scf_error());
4230 
4231 		r = fmri_equal(ud_ctarg, ud_oldtarg);
4232 		switch (r) {
4233 		case 1:
4234 			break;
4235 
4236 		case 0:
4237 		case -1:	/* warn? */
4238 			warn(cf_newtarg, ient->sc_fmri, ud_name);
4239 			return (0);
4240 
4241 		case -2:
4242 			warn(li_corrupt, ient->sc_fmri);
4243 			return (EBADF);
4244 
4245 		default:
4246 			bad_error("fmri_equal", r);
4247 		}
4248 
4249 		if (scf_snaplevel_get_pg(snpl, ud_name, ud_pg) != 0) {
4250 			switch (scf_error()) {
4251 			case SCF_ERROR_NOT_FOUND:
4252 				warn(li_corrupt, ient->sc_fmri);
4253 				return (EBADF);
4254 
4255 			case SCF_ERROR_DELETED:
4256 			case SCF_ERROR_CONNECTION_BROKEN:
4257 				return (scferror2errno(scf_error()));
4258 
4259 			case SCF_ERROR_NOT_BOUND:
4260 			case SCF_ERROR_HANDLE_MISMATCH:
4261 			case SCF_ERROR_INVALID_ARGUMENT:
4262 			case SCF_ERROR_NOT_SET:
4263 			default:
4264 				bad_error("scf_snaplevel_get_pg", scf_error());
4265 			}
4266 		}
4267 
4268 		r = load_pg(ud_pg, &old_dpt_pgroup, ient->sc_fmri,
4269 		    snap_lastimport);
4270 		switch (r) {
4271 		case 0:
4272 			break;
4273 
4274 		case ECANCELED:
4275 		case ECONNABORTED:
4276 		case ENOMEM:
4277 		case EBADF:
4278 			return (r);
4279 
4280 		case EACCES:
4281 		default:
4282 			bad_error("load_pg", r);
4283 		}
4284 
4285 		serr = fmri_to_entity(g_hndl, ud_ctarg, &target_ent, &tissvc);
4286 		switch (serr) {
4287 		case SCF_ERROR_NONE:
4288 			break;
4289 
4290 		case SCF_ERROR_NO_MEMORY:
4291 			internal_pgroup_free(old_dpt_pgroup);
4292 			return (ENOMEM);
4293 
4294 		case SCF_ERROR_NOT_FOUND:
4295 			internal_pgroup_free(old_dpt_pgroup);
4296 			goto delprop;
4297 
4298 		case SCF_ERROR_CONSTRAINT_VIOLATED:	/* caught above */
4299 		case SCF_ERROR_INVALID_ARGUMENT:	/* caught above */
4300 		default:
4301 			bad_error("fmri_to_entity", serr);
4302 		}
4303 
4304 		r = entity_get_running_pg(target_ent, tissvc, ud_name,
4305 		    ud_pg, ud_iter2, ud_inst, imp_snap, ud_snpl);
4306 		switch (r) {
4307 		case 0:
4308 			break;
4309 
4310 		case ECONNABORTED:
4311 			internal_pgroup_free(old_dpt_pgroup);
4312 			return (r);
4313 
4314 		case ECANCELED:
4315 		case ENOENT:
4316 			internal_pgroup_free(old_dpt_pgroup);
4317 			goto delprop;
4318 
4319 		case EBADF:
4320 			warn(r_no_lvl, ud_ctarg);
4321 			internal_pgroup_free(old_dpt_pgroup);
4322 			return (r);
4323 
4324 		case EINVAL:
4325 		default:
4326 			bad_error("entity_get_running_pg", r);
4327 		}
4328 
4329 		/* load it */
4330 		r = load_pg(ud_pg, &current_pg, ud_ctarg, NULL);
4331 		switch (r) {
4332 		case 0:
4333 			break;
4334 
4335 		case ECANCELED:
4336 			internal_pgroup_free(old_dpt_pgroup);
4337 			goto delprop;
4338 
4339 		case ECONNABORTED:
4340 		case ENOMEM:
4341 		case EBADF:
4342 			internal_pgroup_free(old_dpt_pgroup);
4343 			return (r);
4344 
4345 		case EACCES:
4346 		default:
4347 			bad_error("load_pg", r);
4348 		}
4349 
4350 		/* compare property groups */
4351 		if (!pg_equal(old_dpt_pgroup, current_pg)) {
4352 			warn(cf_newdpg, ient->sc_fmri, ud_name);
4353 			internal_pgroup_free(old_dpt_pgroup);
4354 			internal_pgroup_free(current_pg);
4355 			return (0);
4356 		}
4357 
4358 		internal_pgroup_free(old_dpt_pgroup);
4359 		internal_pgroup_free(current_pg);
4360 
4361 		if (g_verbose)
4362 			warn(gettext("%s: Deleting dependent \"%s\".\n"),
4363 			    ient->sc_fmri, ud_name);
4364 
4365 		if (entity_get_pg(target_ent, tissvc, ud_name, ud_pg) != 0) {
4366 			switch (scf_error()) {
4367 			case SCF_ERROR_NOT_FOUND:
4368 			case SCF_ERROR_DELETED:
4369 				internal_pgroup_free(old_dpt_pgroup);
4370 				goto delprop;
4371 
4372 			case SCF_ERROR_CONNECTION_BROKEN:
4373 				internal_pgroup_free(old_dpt_pgroup);
4374 				return (ECONNABORTED);
4375 
4376 			case SCF_ERROR_NOT_SET:
4377 			case SCF_ERROR_INVALID_ARGUMENT:
4378 			case SCF_ERROR_HANDLE_MISMATCH:
4379 			case SCF_ERROR_NOT_BOUND:
4380 			default:
4381 				bad_error("entity_get_pg", scf_error());
4382 			}
4383 		}
4384 
4385 		if (scf_pg_delete(ud_pg) != 0) {
4386 			switch (scf_error()) {
4387 			case SCF_ERROR_DELETED:
4388 				break;
4389 
4390 			case SCF_ERROR_CONNECTION_BROKEN:
4391 			case SCF_ERROR_BACKEND_READONLY:
4392 			case SCF_ERROR_BACKEND_ACCESS:
4393 				return (scferror2errno(scf_error()));
4394 
4395 			case SCF_ERROR_PERMISSION_DENIED:
4396 				warn(emsg_pg_del_perm, ud_name, ient->sc_fmri);
4397 				return (scferror2errno(scf_error()));
4398 
4399 			case SCF_ERROR_NOT_SET:
4400 			default:
4401 				bad_error("scf_pg_delete", scf_error());
4402 			}
4403 		}
4404 
4405 		/*
4406 		 * This service was changed, so it must be refreshed.  But
4407 		 * since it's not mentioned in the new manifest, we have to
4408 		 * record its FMRI here for use later.  We record the name
4409 		 * & the entity (via sc_parent) in case we need to print error
4410 		 * messages during the refresh.
4411 		 */
4412 		dpt = internal_pgroup_new();
4413 		if (dpt == NULL)
4414 			return (ENOMEM);
4415 		dpt->sc_pgroup_name = strdup(ud_name);
4416 		dpt->sc_pgroup_fmri = strdup(ud_ctarg);
4417 		if (dpt->sc_pgroup_name == NULL || dpt->sc_pgroup_fmri == NULL)
4418 			return (ENOMEM);
4419 		dpt->sc_parent = (entity_t *)ient;
4420 		if (uu_list_insert_after(imp_deleted_dpts, NULL, dpt) != 0)
4421 			uu_die(gettext("libuutil error: %s\n"),
4422 			    uu_strerror(uu_error()));
4423 
4424 delprop:
4425 		if (tx == NULL)
4426 			return (0);
4427 
4428 		ent = scf_entry_create(g_hndl);
4429 		if (ent == NULL)
4430 			return (ENOMEM);
4431 
4432 		if (scf_transaction_property_delete(tx, ent, ud_name) != 0) {
4433 			scf_entry_destroy(ent);
4434 			switch (scf_error()) {
4435 			case SCF_ERROR_DELETED:
4436 				warn(emsg_pg_deleted, ient->sc_fmri,
4437 				    "dependents");
4438 				return (EBUSY);
4439 
4440 			case SCF_ERROR_CONNECTION_BROKEN:
4441 				return (scferror2errno(scf_error()));
4442 
4443 			case SCF_ERROR_NOT_FOUND:
4444 				break;
4445 
4446 			case SCF_ERROR_HANDLE_MISMATCH:
4447 			case SCF_ERROR_NOT_BOUND:
4448 			case SCF_ERROR_INVALID_ARGUMENT:
4449 			case SCF_ERROR_NOT_SET:
4450 			default:
4451 				bad_error("scf_transaction_property_delete",
4452 				    scf_error());
4453 			}
4454 		}
4455 
4456 		return (0);
4457 	}
4458 
4459 	new_dpt_pgroup->sc_pgroup_seen = 1;
4460 
4461 	/*
4462 	 * Decide whether the dependent has changed in the manifest.
4463 	 */
4464 	/* Compare the target. */
4465 	if (scf_property_get_value(prop, ud_val) != 0) {
4466 		switch (scf_error()) {
4467 		case SCF_ERROR_NOT_FOUND:
4468 		case SCF_ERROR_CONSTRAINT_VIOLATED:
4469 			warn(li_corrupt, ient->sc_fmri);
4470 			return (EBADF);
4471 
4472 		case SCF_ERROR_DELETED:
4473 		case SCF_ERROR_CONNECTION_BROKEN:
4474 			return (scferror2errno(scf_error()));
4475 
4476 		case SCF_ERROR_HANDLE_MISMATCH:
4477 		case SCF_ERROR_NOT_BOUND:
4478 		case SCF_ERROR_NOT_SET:
4479 		case SCF_ERROR_PERMISSION_DENIED:
4480 		default:
4481 			bad_error("scf_property_get_value", scf_error());
4482 		}
4483 	}
4484 
4485 	if (scf_value_get_as_string(ud_val, ud_oldtarg, max_scf_value_len + 1) <
4486 	    0)
4487 		bad_error("scf_value_get_as_string", scf_error());
4488 
4489 	/*
4490 	 * If the fmri's are not equal then the old fmri will need to
4491 	 * be refreshed to ensure that the changes are properly updated
4492 	 * in that service.
4493 	 */
4494 	r = fmri_equal(ud_oldtarg, new_dpt_pgroup->sc_pgroup_fmri);
4495 	switch (r) {
4496 	case 0:
4497 		dpt = internal_pgroup_new();
4498 		if (dpt == NULL)
4499 			return (ENOMEM);
4500 		dpt->sc_pgroup_name = strdup(ud_name);
4501 		dpt->sc_pgroup_fmri = strdup(ud_oldtarg);
4502 		if (dpt->sc_pgroup_name == NULL || dpt->sc_pgroup_fmri == NULL)
4503 			return (ENOMEM);
4504 		dpt->sc_parent = (entity_t *)ient;
4505 		if (uu_list_insert_after(imp_deleted_dpts, NULL, dpt) != 0)
4506 			uu_die(gettext("libuutil error: %s\n"),
4507 			    uu_strerror(uu_error()));
4508 		break;
4509 
4510 	case 1:
4511 		/* Compare the dependency pgs. */
4512 		if (scf_snaplevel_get_pg(snpl, ud_name, ud_pg) != 0) {
4513 			switch (scf_error()) {
4514 			case SCF_ERROR_NOT_FOUND:
4515 				warn(li_corrupt, ient->sc_fmri);
4516 				return (EBADF);
4517 
4518 			case SCF_ERROR_DELETED:
4519 			case SCF_ERROR_CONNECTION_BROKEN:
4520 				return (scferror2errno(scf_error()));
4521 
4522 			case SCF_ERROR_NOT_BOUND:
4523 			case SCF_ERROR_HANDLE_MISMATCH:
4524 			case SCF_ERROR_INVALID_ARGUMENT:
4525 			case SCF_ERROR_NOT_SET:
4526 			default:
4527 				bad_error("scf_snaplevel_get_pg", scf_error());
4528 			}
4529 		}
4530 
4531 		r = load_pg(ud_pg, &old_dpt_pgroup, ient->sc_fmri,
4532 		    snap_lastimport);
4533 		switch (r) {
4534 		case 0:
4535 			break;
4536 
4537 		case ECANCELED:
4538 		case ECONNABORTED:
4539 		case ENOMEM:
4540 		case EBADF:
4541 			return (r);
4542 
4543 		case EACCES:
4544 		default:
4545 			bad_error("load_pg", r);
4546 		}
4547 
4548 		if (pg_equal(old_dpt_pgroup, new_dpt_pgroup)) {
4549 			/* no change, leave customizations */
4550 			internal_pgroup_free(old_dpt_pgroup);
4551 			return (0);
4552 		}
4553 		break;
4554 
4555 	case -1:
4556 		warn(li_corrupt, ient->sc_fmri);
4557 		return (EBADF);
4558 
4559 	case -2:
4560 		warn(gettext("Dependent \"%s\" has invalid target \"%s\".\n"),
4561 		    ud_name, new_dpt_pgroup->sc_pgroup_fmri);
4562 		return (EINVAL);
4563 
4564 	default:
4565 		bad_error("fmri_equal", r);
4566 	}
4567 
4568 	/*
4569 	 * The dependent has changed in the manifest.  Upgrade the current
4570 	 * properties if they haven't been customized.
4571 	 */
4572 
4573 	/*
4574 	 * If new_dpt_pgroup->sc_override, then act as though the property
4575 	 * group hasn't been customized.
4576 	 */
4577 	if (new_dpt_pgroup->sc_pgroup_override) {
4578 		(void) strcpy(ud_ctarg, ud_oldtarg);
4579 		goto nocust;
4580 	}
4581 
4582 	if (!ud_run_dpts_pg_set) {
4583 		warn(cf_missing, ient->sc_fmri, ud_name);
4584 		r = 0;
4585 		goto out;
4586 	} else if (scf_pg_get_property(ud_run_dpts_pg, ud_name, ud_prop) != 0) {
4587 		switch (scf_error()) {
4588 		case SCF_ERROR_NOT_FOUND:
4589 			warn(cf_missing, ient->sc_fmri, ud_name);
4590 			r = 0;
4591 			goto out;
4592 
4593 		case SCF_ERROR_CONNECTION_BROKEN:
4594 			r = scferror2errno(scf_error());
4595 			goto out;
4596 
4597 		case SCF_ERROR_DELETED:
4598 			warn(emsg_pg_deleted, ient->sc_fmri, "dependents");
4599 			r = EBUSY;
4600 			goto out;
4601 
4602 		case SCF_ERROR_INVALID_ARGUMENT:
4603 		case SCF_ERROR_NOT_BOUND:
4604 		case SCF_ERROR_HANDLE_MISMATCH:
4605 		case SCF_ERROR_NOT_SET:
4606 		default:
4607 			bad_error("scf_pg_get_property", scf_error());
4608 		}
4609 	}
4610 
4611 	if (scf_property_get_value(ud_prop, ud_val) != 0) {
4612 		switch (scf_error()) {
4613 		case SCF_ERROR_NOT_FOUND:
4614 		case SCF_ERROR_CONSTRAINT_VIOLATED:
4615 			warn(cf_inval, ient->sc_fmri, ud_name);
4616 			r = 0;
4617 			goto out;
4618 
4619 		case SCF_ERROR_DELETED:
4620 		case SCF_ERROR_CONNECTION_BROKEN:
4621 			r = scferror2errno(scf_error());
4622 			goto out;
4623 
4624 		case SCF_ERROR_HANDLE_MISMATCH:
4625 		case SCF_ERROR_NOT_BOUND:
4626 		case SCF_ERROR_NOT_SET:
4627 		case SCF_ERROR_PERMISSION_DENIED:
4628 		default:
4629 			bad_error("scf_property_get_value", scf_error());
4630 		}
4631 	}
4632 
4633 	ty = scf_value_type(ud_val);
4634 	assert(ty != SCF_TYPE_INVALID);
4635 	if (!(ty == SCF_TYPE_FMRI || ty == SCF_TYPE_ASTRING)) {
4636 		warn(cf_inval, ient->sc_fmri, ud_name);
4637 		r = 0;
4638 		goto out;
4639 	}
4640 	if (scf_value_get_as_string(ud_val, ud_ctarg, max_scf_value_len + 1) <
4641 	    0)
4642 		bad_error("scf_value_get_as_string", scf_error());
4643 
4644 	r = fmri_equal(ud_ctarg, ud_oldtarg);
4645 	if (r == -1) {
4646 		warn(cf_inval, ient->sc_fmri, ud_name);
4647 		r = 0;
4648 		goto out;
4649 	} else if (r == -2) {
4650 		warn(li_corrupt, ient->sc_fmri);
4651 		r = EBADF;
4652 		goto out;
4653 	} else if (r == 0) {
4654 		/*
4655 		 * Target has been changed.  Only abort now if it's been
4656 		 * changed to something other than what's in the manifest.
4657 		 */
4658 		r = fmri_equal(ud_ctarg, new_dpt_pgroup->sc_pgroup_fmri);
4659 		if (r == -1) {
4660 			warn(cf_inval, ient->sc_fmri, ud_name);
4661 			r = 0;
4662 			goto out;
4663 		} else if (r == 0) {
4664 			warn(cf_newtarg, ient->sc_fmri, ud_name);
4665 			r = 0;
4666 			goto out;
4667 		} else if (r != 1) {
4668 			/* invalid sc_pgroup_fmri caught above */
4669 			bad_error("fmri_equal", r);
4670 		}
4671 
4672 		/*
4673 		 * Fetch the current dependency pg.  If it's what the manifest
4674 		 * says, then no problem.
4675 		 */
4676 		serr = fmri_to_entity(g_hndl, ud_ctarg, &target_ent, &tissvc);
4677 		switch (serr) {
4678 		case SCF_ERROR_NONE:
4679 			break;
4680 
4681 		case SCF_ERROR_NOT_FOUND:
4682 			warn(cf_missing, ient->sc_fmri, ud_name);
4683 			r = 0;
4684 			goto out;
4685 
4686 		case SCF_ERROR_NO_MEMORY:
4687 			r = ENOMEM;
4688 			goto out;
4689 
4690 		case SCF_ERROR_CONSTRAINT_VIOLATED:
4691 		case SCF_ERROR_INVALID_ARGUMENT:
4692 		default:
4693 			bad_error("fmri_to_entity", serr);
4694 		}
4695 
4696 		r = entity_get_running_pg(target_ent, tissvc, ud_name,
4697 		    ud_pg, ud_iter2, ud_inst, imp_snap, ud_snpl);
4698 		switch (r) {
4699 		case 0:
4700 			break;
4701 
4702 		case ECONNABORTED:
4703 			goto out;
4704 
4705 		case ECANCELED:
4706 		case ENOENT:
4707 			warn(cf_missing, ient->sc_fmri, ud_name);
4708 			r = 0;
4709 			goto out;
4710 
4711 		case EBADF:
4712 			warn(r_no_lvl, ud_ctarg);
4713 			goto out;
4714 
4715 		case EINVAL:
4716 		default:
4717 			bad_error("entity_get_running_pg", r);
4718 		}
4719 
4720 		r = load_pg(ud_pg, &current_pg, ud_ctarg, NULL);
4721 		switch (r) {
4722 		case 0:
4723 			break;
4724 
4725 		case ECANCELED:
4726 			warn(cf_missing, ient->sc_fmri, ud_name);
4727 			r = 0;
4728 			goto out;
4729 
4730 		case ECONNABORTED:
4731 		case ENOMEM:
4732 		case EBADF:
4733 			goto out;
4734 
4735 		case EACCES:
4736 		default:
4737 			bad_error("load_pg", r);
4738 		}
4739 
4740 		if (!pg_equal(current_pg, new_dpt_pgroup))
4741 			warn(cf_newdpg, ient->sc_fmri, ud_name);
4742 		internal_pgroup_free(current_pg);
4743 		r = 0;
4744 		goto out;
4745 	} else if (r != 1) {
4746 		bad_error("fmri_equal", r);
4747 	}
4748 
4749 nocust:
4750 	/*
4751 	 * Target has not been customized.  Check the dependency property
4752 	 * group.
4753 	 */
4754 
4755 	if (old_dpt_pgroup == NULL) {
4756 		if (scf_snaplevel_get_pg(snpl, new_dpt_pgroup->sc_pgroup_name,
4757 		    ud_pg) != 0) {
4758 			switch (scf_error()) {
4759 			case SCF_ERROR_NOT_FOUND:
4760 				warn(li_corrupt, ient->sc_fmri);
4761 				return (EBADF);
4762 
4763 			case SCF_ERROR_DELETED:
4764 			case SCF_ERROR_CONNECTION_BROKEN:
4765 				return (scferror2errno(scf_error()));
4766 
4767 			case SCF_ERROR_NOT_BOUND:
4768 			case SCF_ERROR_HANDLE_MISMATCH:
4769 			case SCF_ERROR_INVALID_ARGUMENT:
4770 			case SCF_ERROR_NOT_SET:
4771 			default:
4772 				bad_error("scf_snaplevel_get_pg", scf_error());
4773 			}
4774 		}
4775 
4776 		r = load_pg(ud_pg, &old_dpt_pgroup, ient->sc_fmri,
4777 		    snap_lastimport);
4778 		switch (r) {
4779 		case 0:
4780 			break;
4781 
4782 		case ECANCELED:
4783 		case ECONNABORTED:
4784 		case ENOMEM:
4785 		case EBADF:
4786 			return (r);
4787 
4788 		case EACCES:
4789 		default:
4790 			bad_error("load_pg", r);
4791 		}
4792 	}
4793 	serr = fmri_to_entity(g_hndl, ud_ctarg, &target_ent, &tissvc);
4794 	switch (serr) {
4795 	case SCF_ERROR_NONE:
4796 		break;
4797 
4798 	case SCF_ERROR_NOT_FOUND:
4799 		warn(cf_missing, ient->sc_fmri, ud_name);
4800 		r = 0;
4801 		goto out;
4802 
4803 	case SCF_ERROR_NO_MEMORY:
4804 		r = ENOMEM;
4805 		goto out;
4806 
4807 	case SCF_ERROR_CONSTRAINT_VIOLATED:
4808 	case SCF_ERROR_INVALID_ARGUMENT:
4809 	default:
4810 		bad_error("fmri_to_entity", serr);
4811 	}
4812 
4813 	r = entity_get_running_pg(target_ent, tissvc, ud_name, ud_pg,
4814 	    ud_iter2, ud_inst, imp_snap, ud_snpl);
4815 	switch (r) {
4816 	case 0:
4817 		break;
4818 
4819 	case ECONNABORTED:
4820 		goto out;
4821 
4822 	case ECANCELED:
4823 	case ENOENT:
4824 		warn(cf_missing, ient->sc_fmri, ud_name);
4825 		r = 0;
4826 		goto out;
4827 
4828 	case EBADF:
4829 		warn(r_no_lvl, ud_ctarg);
4830 		goto out;
4831 
4832 	case EINVAL:
4833 	default:
4834 		bad_error("entity_get_running_pg", r);
4835 	}
4836 
4837 	r = load_pg(ud_pg, &current_pg, ud_ctarg, NULL);
4838 	switch (r) {
4839 	case 0:
4840 		break;
4841 
4842 	case ECANCELED:
4843 		warn(cf_missing, ient->sc_fmri, ud_name);
4844 		goto out;
4845 
4846 	case ECONNABORTED:
4847 	case ENOMEM:
4848 	case EBADF:
4849 		goto out;
4850 
4851 	case EACCES:
4852 	default:
4853 		bad_error("load_pg", r);
4854 	}
4855 
4856 	if (!pg_equal(current_pg, old_dpt_pgroup)) {
4857 		if (!pg_equal(current_pg, new_dpt_pgroup))
4858 			warn(cf_newdpg, ient->sc_fmri, ud_name);
4859 		internal_pgroup_free(current_pg);
4860 		r = 0;
4861 		goto out;
4862 	}
4863 
4864 	/* Uncustomized.  Upgrade. */
4865 
4866 	r = fmri_equal(new_dpt_pgroup->sc_pgroup_fmri, ud_oldtarg);
4867 	switch (r) {
4868 	case 1:
4869 		if (pg_equal(current_pg, new_dpt_pgroup)) {
4870 			/* Already upgraded. */
4871 			internal_pgroup_free(current_pg);
4872 			r = 0;
4873 			goto out;
4874 		}
4875 
4876 		internal_pgroup_free(current_pg);
4877 
4878 		/* upgrade current_pg */
4879 		if (entity_get_pg(target_ent, tissvc, ud_name, ud_pg) != 0) {
4880 			switch (scf_error()) {
4881 			case SCF_ERROR_CONNECTION_BROKEN:
4882 				r = scferror2errno(scf_error());
4883 				goto out;
4884 
4885 			case SCF_ERROR_DELETED:
4886 				warn(cf_missing, ient->sc_fmri, ud_name);
4887 				r = 0;
4888 				goto out;
4889 
4890 			case SCF_ERROR_NOT_FOUND:
4891 				break;
4892 
4893 			case SCF_ERROR_INVALID_ARGUMENT:
4894 			case SCF_ERROR_NOT_BOUND:
4895 			case SCF_ERROR_NOT_SET:
4896 			case SCF_ERROR_HANDLE_MISMATCH:
4897 			default:
4898 				bad_error("entity_get_pg", scf_error());
4899 			}
4900 
4901 			if (tissvc)
4902 				r = scf_service_add_pg(target_ent, ud_name,
4903 				    SCF_GROUP_DEPENDENCY, 0, ud_pg);
4904 			else
4905 				r = scf_instance_add_pg(target_ent, ud_name,
4906 				    SCF_GROUP_DEPENDENCY, 0, ud_pg);
4907 			if (r != 0) {
4908 				switch (scf_error()) {
4909 				case SCF_ERROR_CONNECTION_BROKEN:
4910 				case SCF_ERROR_NO_RESOURCES:
4911 				case SCF_ERROR_BACKEND_READONLY:
4912 				case SCF_ERROR_BACKEND_ACCESS:
4913 					r = scferror2errno(scf_error());
4914 					goto out;
4915 
4916 				case SCF_ERROR_DELETED:
4917 					warn(cf_missing, ient->sc_fmri,
4918 					    ud_name);
4919 					r = 0;
4920 					goto out;
4921 
4922 				case SCF_ERROR_PERMISSION_DENIED:
4923 					warn(emsg_pg_deleted, ud_ctarg,
4924 					    ud_name);
4925 					r = EPERM;
4926 					goto out;
4927 
4928 				case SCF_ERROR_EXISTS:
4929 					warn(emsg_pg_added, ud_ctarg, ud_name);
4930 					r = EBUSY;
4931 					goto out;
4932 
4933 				case SCF_ERROR_NOT_BOUND:
4934 				case SCF_ERROR_HANDLE_MISMATCH:
4935 				case SCF_ERROR_INVALID_ARGUMENT:
4936 				case SCF_ERROR_NOT_SET:
4937 				default:
4938 					bad_error("entity_add_pg", scf_error());
4939 				}
4940 			}
4941 		}
4942 
4943 		r = load_pg(ud_pg, &current_pg, ud_ctarg, NULL);
4944 		switch (r) {
4945 		case 0:
4946 			break;
4947 
4948 		case ECANCELED:
4949 			warn(cf_missing, ient->sc_fmri, ud_name);
4950 			goto out;
4951 
4952 		case ECONNABORTED:
4953 		case ENOMEM:
4954 		case EBADF:
4955 			goto out;
4956 
4957 		case EACCES:
4958 		default:
4959 			bad_error("load_pg", r);
4960 		}
4961 
4962 		if (g_verbose)
4963 			warn(upgrading, ient->sc_fmri, ud_name);
4964 
4965 		r = upgrade_pg(ud_pg, current_pg, old_dpt_pgroup,
4966 		    new_dpt_pgroup, 0, ient->sc_fmri);
4967 		switch (r) {
4968 		case 0:
4969 			break;
4970 
4971 		case ECANCELED:
4972 			warn(emsg_pg_deleted, ud_ctarg, ud_name);
4973 			r = EBUSY;
4974 			goto out;
4975 
4976 		case EPERM:
4977 			warn(emsg_pg_mod_perm, ud_name, ud_ctarg);
4978 			goto out;
4979 
4980 		case EBUSY:
4981 			warn(emsg_pg_changed, ud_ctarg, ud_name);
4982 			goto out;
4983 
4984 		case ECONNABORTED:
4985 		case ENOMEM:
4986 		case ENOSPC:
4987 		case EROFS:
4988 		case EACCES:
4989 		case EINVAL:
4990 			goto out;
4991 
4992 		default:
4993 			bad_error("upgrade_pg", r);
4994 		}
4995 		break;
4996 
4997 	case 0: {
4998 		scf_transaction_entry_t *ent;
4999 		scf_value_t *val;
5000 
5001 		internal_pgroup_free(current_pg);
5002 
5003 		/* delete old pg */
5004 		if (g_verbose)
5005 			warn(upgrading, ient->sc_fmri, ud_name);
5006 
5007 		if (entity_get_pg(target_ent, tissvc, ud_name, ud_pg) != 0) {
5008 			switch (scf_error()) {
5009 			case SCF_ERROR_CONNECTION_BROKEN:
5010 				r = scferror2errno(scf_error());
5011 				goto out;
5012 
5013 			case SCF_ERROR_DELETED:
5014 				warn(cf_missing, ient->sc_fmri, ud_name);
5015 				r = 0;
5016 				goto out;
5017 
5018 			case SCF_ERROR_NOT_FOUND:
5019 				break;
5020 
5021 			case SCF_ERROR_INVALID_ARGUMENT:
5022 			case SCF_ERROR_NOT_BOUND:
5023 			case SCF_ERROR_NOT_SET:
5024 			case SCF_ERROR_HANDLE_MISMATCH:
5025 			default:
5026 				bad_error("entity_get_pg", scf_error());
5027 			}
5028 		} else if (scf_pg_delete(ud_pg) != 0) {
5029 			switch (scf_error()) {
5030 			case SCF_ERROR_DELETED:
5031 				break;
5032 
5033 			case SCF_ERROR_CONNECTION_BROKEN:
5034 			case SCF_ERROR_BACKEND_READONLY:
5035 			case SCF_ERROR_BACKEND_ACCESS:
5036 				r = scferror2errno(scf_error());
5037 				goto out;
5038 
5039 			case SCF_ERROR_PERMISSION_DENIED:
5040 				warn(emsg_pg_del_perm, ud_name, ient->sc_fmri);
5041 				r = scferror2errno(scf_error());
5042 				goto out;
5043 
5044 			case SCF_ERROR_NOT_SET:
5045 			default:
5046 				bad_error("scf_pg_delete", scf_error());
5047 			}
5048 		}
5049 
5050 		/* import new one */
5051 		cbdata.sc_handle = g_hndl;
5052 		cbdata.sc_trans = NULL;		/* handled below */
5053 		cbdata.sc_flags = 0;
5054 
5055 		r = lscf_dependent_import(new_dpt_pgroup, &cbdata);
5056 		if (r != UU_WALK_NEXT) {
5057 			if (r != UU_WALK_ERROR)
5058 				bad_error("lscf_dependent_import", r);
5059 
5060 			r = cbdata.sc_err;
5061 			goto out;
5062 		}
5063 
5064 		if (tx == NULL)
5065 			break;
5066 
5067 		if ((ent = scf_entry_create(g_hndl)) == NULL ||
5068 		    (val = scf_value_create(g_hndl)) == NULL) {
5069 			if (scf_error() == SCF_ERROR_NO_MEMORY)
5070 				return (ENOMEM);
5071 
5072 			bad_error("scf_entry_create", scf_error());
5073 		}
5074 
5075 		if (scf_transaction_property_change_type(tx, ent, ud_name,
5076 		    SCF_TYPE_FMRI) != 0) {
5077 			switch (scf_error()) {
5078 			case SCF_ERROR_CONNECTION_BROKEN:
5079 				r = scferror2errno(scf_error());
5080 				goto out;
5081 
5082 			case SCF_ERROR_DELETED:
5083 				warn(emsg_pg_deleted, ient->sc_fmri,
5084 				    "dependents");
5085 				r = EBUSY;
5086 				goto out;
5087 
5088 			case SCF_ERROR_NOT_FOUND:
5089 				break;
5090 
5091 			case SCF_ERROR_NOT_BOUND:
5092 			case SCF_ERROR_HANDLE_MISMATCH:
5093 			case SCF_ERROR_INVALID_ARGUMENT:
5094 			case SCF_ERROR_NOT_SET:
5095 			default:
5096 				bad_error("scf_transaction_property_"
5097 				    "change_type", scf_error());
5098 			}
5099 
5100 			if (scf_transaction_property_new(tx, ent, ud_name,
5101 			    SCF_TYPE_FMRI) != 0) {
5102 				switch (scf_error()) {
5103 				case SCF_ERROR_CONNECTION_BROKEN:
5104 					r = scferror2errno(scf_error());
5105 					goto out;
5106 
5107 				case SCF_ERROR_DELETED:
5108 					warn(emsg_pg_deleted, ient->sc_fmri,
5109 					    "dependents");
5110 					r = EBUSY;
5111 					goto out;
5112 
5113 				case SCF_ERROR_EXISTS:
5114 					warn(emsg_pg_changed, ient->sc_fmri,
5115 					    "dependents");
5116 					r = EBUSY;
5117 					goto out;
5118 
5119 				case SCF_ERROR_INVALID_ARGUMENT:
5120 				case SCF_ERROR_HANDLE_MISMATCH:
5121 				case SCF_ERROR_NOT_BOUND:
5122 				case SCF_ERROR_NOT_SET:
5123 				default:
5124 					bad_error("scf_transaction_property_"
5125 					    "new", scf_error());
5126 				}
5127 			}
5128 		}
5129 
5130 		if (scf_value_set_from_string(val, SCF_TYPE_FMRI,
5131 		    new_dpt_pgroup->sc_pgroup_fmri) != 0)
5132 			/* invalid sc_pgroup_fmri caught above */
5133 			bad_error("scf_value_set_from_string",
5134 			    scf_error());
5135 
5136 		if (scf_entry_add_value(ent, val) != 0)
5137 			bad_error("scf_entry_add_value", scf_error());
5138 		break;
5139 	}
5140 
5141 	case -2:
5142 		warn(li_corrupt, ient->sc_fmri);
5143 		internal_pgroup_free(current_pg);
5144 		r = EBADF;
5145 		goto out;
5146 
5147 	case -1:
5148 	default:
5149 		/* invalid sc_pgroup_fmri caught above */
5150 		bad_error("fmri_equal", r);
5151 	}
5152 
5153 	r = 0;
5154 
5155 out:
5156 	if (old_dpt_pgroup != NULL)
5157 		internal_pgroup_free(old_dpt_pgroup);
5158 
5159 	return (r);
5160 }
5161 
5162 /*
5163  * new_dpt_pgroup was in the manifest but not the last-import snapshot, so we
5164  * would import it, except it seems to exist in the service anyway.  Compare
5165  * the existent dependent with the one we would import, and report any
5166  * differences (if there are none, be silent).  prop is the property which
5167  * represents the existent dependent (in the dependents property group) in the
5168  * entity corresponding to ient.
5169  *
5170  * Returns
5171  *   0 - success (Sort of.  At least, we can continue importing.)
5172  *   ECONNABORTED - repository connection broken
5173  *   EBUSY - ancestor of prop was deleted (error printed)
5174  *   ENOMEM - out of memory
5175  *   EBADF - corrupt property group (error printed)
5176  *   EINVAL - new_dpt_pgroup has invalid target (error printed)
5177  */
5178 static int
5179 handle_dependent_conflict(const entity_t * const ient,
5180     const scf_property_t * const prop, const pgroup_t * const new_dpt_pgroup)
5181 {
5182 	int r;
5183 	scf_type_t ty;
5184 	scf_error_t scfe;
5185 	void *tptr;
5186 	int tissvc;
5187 	pgroup_t *pgroup;
5188 
5189 	if (scf_property_get_value(prop, ud_val) != 0) {
5190 		switch (scf_error()) {
5191 		case SCF_ERROR_CONNECTION_BROKEN:
5192 			return (scferror2errno(scf_error()));
5193 
5194 		case SCF_ERROR_DELETED:
5195 			warn(emsg_pg_deleted, ient->sc_fmri,
5196 			    new_dpt_pgroup->sc_pgroup_name);
5197 			return (EBUSY);
5198 
5199 		case SCF_ERROR_CONSTRAINT_VIOLATED:
5200 		case SCF_ERROR_NOT_FOUND:
5201 			warn(gettext("Conflict upgrading %s (not importing "
5202 			    "dependent \"%s\" because it already exists.)  "
5203 			    "Warning: The \"%s/%2$s\" property has more or "
5204 			    "fewer than one value)).\n"), ient->sc_fmri,
5205 			    new_dpt_pgroup->sc_pgroup_name, "dependents");
5206 			return (0);
5207 
5208 		case SCF_ERROR_HANDLE_MISMATCH:
5209 		case SCF_ERROR_NOT_BOUND:
5210 		case SCF_ERROR_NOT_SET:
5211 		case SCF_ERROR_PERMISSION_DENIED:
5212 		default:
5213 			bad_error("scf_property_get_value",
5214 			    scf_error());
5215 		}
5216 	}
5217 
5218 	ty = scf_value_type(ud_val);
5219 	assert(ty != SCF_TYPE_INVALID);
5220 	if (!(ty == SCF_TYPE_FMRI || ty == SCF_TYPE_ASTRING)) {
5221 		warn(gettext("Conflict upgrading %s (not importing dependent "
5222 		    "\"%s\" because it already exists).  Warning: The "
5223 		    "\"%s/%s\" property has unexpected type \"%s\")).\n"),
5224 		    ient->sc_fmri, new_dpt_pgroup->sc_pgroup_name,
5225 		    scf_type_to_string(ty), "dependents");
5226 		return (0);
5227 	}
5228 
5229 	if (scf_value_get_as_string(ud_val, ud_ctarg, max_scf_value_len + 1) <
5230 	    0)
5231 		bad_error("scf_value_get_as_string", scf_error());
5232 
5233 	r = fmri_equal(ud_ctarg, new_dpt_pgroup->sc_pgroup_fmri);
5234 	switch (r) {
5235 	case 0:
5236 		warn(gettext("Conflict upgrading %s (not importing dependent "
5237 		    "\"%s\" (target \"%s\") because it already exists with "
5238 		    "target \"%s\").\n"), ient->sc_fmri,
5239 		    new_dpt_pgroup->sc_pgroup_name,
5240 		    new_dpt_pgroup->sc_pgroup_fmri, ud_ctarg);
5241 		return (0);
5242 
5243 	case 1:
5244 		break;
5245 
5246 	case -1:
5247 		warn(gettext("Conflict upgrading %s (not importing dependent "
5248 		    "\"%s\" because it already exists).  Warning: The current "
5249 		    "dependent's target (%s) is invalid.\n"), ient->sc_fmri,
5250 		    new_dpt_pgroup->sc_pgroup_name, ud_ctarg);
5251 		return (0);
5252 
5253 	case -2:
5254 		warn(gettext("Dependent \"%s\" of %s has invalid target "
5255 		    "\"%s\".\n"), new_dpt_pgroup->sc_pgroup_name, ient->sc_fmri,
5256 		    new_dpt_pgroup->sc_pgroup_fmri);
5257 		return (EINVAL);
5258 
5259 	default:
5260 		bad_error("fmri_equal", r);
5261 	}
5262 
5263 	/* compare dependency pgs in target */
5264 	scfe = fmri_to_entity(g_hndl, ud_ctarg, &tptr, &tissvc);
5265 	switch (scfe) {
5266 	case SCF_ERROR_NONE:
5267 		break;
5268 
5269 	case SCF_ERROR_NO_MEMORY:
5270 		return (ENOMEM);
5271 
5272 	case SCF_ERROR_NOT_FOUND:
5273 		warn(emsg_dpt_dangling, ient->sc_fmri,
5274 		    new_dpt_pgroup->sc_pgroup_name, ud_ctarg);
5275 		return (0);
5276 
5277 	case SCF_ERROR_CONSTRAINT_VIOLATED:
5278 	case SCF_ERROR_INVALID_ARGUMENT:
5279 	default:
5280 		bad_error("fmri_to_entity", scfe);
5281 	}
5282 
5283 	r = entity_get_running_pg(tptr, tissvc, new_dpt_pgroup->sc_pgroup_name,
5284 	    ud_pg, ud_iter, ud_inst, imp_snap, ud_snpl);
5285 	switch (r) {
5286 	case 0:
5287 		break;
5288 
5289 	case ECONNABORTED:
5290 		return (r);
5291 
5292 	case ECANCELED:
5293 		warn(emsg_dpt_dangling, ient->sc_fmri,
5294 		    new_dpt_pgroup->sc_pgroup_name, ud_ctarg);
5295 		return (0);
5296 
5297 	case EBADF:
5298 		if (tissvc)
5299 			warn(gettext("%s has an instance with a \"%s\" "
5300 			    "snapshot which is missing a snaplevel.\n"),
5301 			    ud_ctarg, "running");
5302 		else
5303 			warn(gettext("%s has a \"%s\" snapshot which is "
5304 			    "missing a snaplevel.\n"), ud_ctarg, "running");
5305 		/* FALLTHROUGH */
5306 
5307 	case ENOENT:
5308 		warn(emsg_dpt_no_dep, ient->sc_fmri,
5309 		    new_dpt_pgroup->sc_pgroup_name, ud_ctarg,
5310 		    new_dpt_pgroup->sc_pgroup_name);
5311 		return (0);
5312 
5313 	case EINVAL:
5314 	default:
5315 		bad_error("entity_get_running_pg", r);
5316 	}
5317 
5318 	pgroup = internal_pgroup_new();
5319 	if (pgroup == NULL)
5320 		return (ENOMEM);
5321 
5322 	r = load_pg(ud_pg, &pgroup, ud_ctarg, NULL);
5323 	switch (r) {
5324 	case 0:
5325 		break;
5326 
5327 	case ECONNABORTED:
5328 	case EBADF:
5329 	case ENOMEM:
5330 		internal_pgroup_free(pgroup);
5331 		return (r);
5332 
5333 	case ECANCELED:
5334 		warn(emsg_dpt_no_dep, ient->sc_fmri,
5335 		    new_dpt_pgroup->sc_pgroup_name, ud_ctarg,
5336 		    new_dpt_pgroup->sc_pgroup_name);
5337 		internal_pgroup_free(pgroup);
5338 		return (0);
5339 
5340 	case EACCES:
5341 	default:
5342 		bad_error("load_pg", r);
5343 	}
5344 
5345 	/* report differences */
5346 	report_pg_diffs(new_dpt_pgroup, pgroup, ud_ctarg, 1);
5347 	internal_pgroup_free(pgroup);
5348 	return (0);
5349 }
5350 
5351 /*
5352  * lipg is a property group in the last-import snapshot of ent, which is an
5353  * scf_service_t or an scf_instance_t (according to ient).  If lipg is not in
5354  * ient's pgroups, delete it from ent if it hasn't been customized.  If it is
5355  * in ents's property groups, compare and upgrade ent appropriately.
5356  *
5357  * Returns
5358  *   0 - success
5359  *   ECONNABORTED - repository connection broken
5360  *   ENOMEM - out of memory
5361  *   ENOSPC - configd is out of resources
5362  *   EINVAL - ient has invalid dependent (error printed)
5363  *	    - ient has invalid pgroup_t (error printed)
5364  *   ECANCELED - ent has been deleted
5365  *   ENODEV - entity containing lipg has been deleted
5366  *	    - entity containing running has been deleted
5367  *   EPERM - could not delete pg (permission denied) (error printed)
5368  *	   - couldn't upgrade dependents (permission denied) (error printed)
5369  *	   - couldn't import pg (permission denied) (error printed)
5370  *	   - couldn't upgrade pg (permission denied) (error printed)
5371  *   EROFS - could not delete pg (repository read-only)
5372  *	   - couldn't upgrade dependents (repository read-only)
5373  *	   - couldn't import pg (repository read-only)
5374  *	   - couldn't upgrade pg (repository read-only)
5375  *   EACCES - could not delete pg (backend access denied)
5376  *	    - couldn't upgrade dependents (backend access denied)
5377  *	    - couldn't import pg (backend access denied)
5378  *	    - couldn't upgrade pg (backend access denied)
5379  *	    - couldn't read property (backend access denied)
5380  *   EBUSY - property group was added (error printed)
5381  *	   - property group was deleted (error printed)
5382  *	   - property group changed (error printed)
5383  *	   - "dependents" pg was added, changed, or deleted (error printed)
5384  *	   - dependent target deleted (error printed)
5385  *	   - dependent pg changed (error printed)
5386  *   EBADF - imp_snpl is corrupt (error printed)
5387  *	   - ent has bad pg (error printed)
5388  *   EEXIST - dependent collision in target service (error printed)
5389  */
5390 static int
5391 process_old_pg(const scf_propertygroup_t *lipg, entity_t *ient, void *ent,
5392     const scf_snaplevel_t *running)
5393 {
5394 	int r;
5395 	pgroup_t *mpg, *lipg_i, *curpg_i, pgrp;
5396 	scf_callback_t cbdata;
5397 
5398 	const char * const cf_pg_missing =
5399 	    gettext("Conflict upgrading %s (property group %s is missing)\n");
5400 	const char * const deleting =
5401 	    gettext("%s: Deleting property group \"%s\".\n");
5402 
5403 	const int issvc = (ient->sc_etype == SVCCFG_SERVICE_OBJECT);
5404 
5405 	/* Skip dependent property groups. */
5406 	if (scf_pg_get_type(lipg, imp_str, imp_str_sz) < 0) {
5407 		switch (scf_error()) {
5408 		case SCF_ERROR_DELETED:
5409 			return (ENODEV);
5410 
5411 		case SCF_ERROR_CONNECTION_BROKEN:
5412 			return (ECONNABORTED);
5413 
5414 		case SCF_ERROR_NOT_SET:
5415 		case SCF_ERROR_NOT_BOUND:
5416 		default:
5417 			bad_error("scf_pg_get_type", scf_error());
5418 		}
5419 	}
5420 
5421 	if (strcmp(imp_str, SCF_GROUP_DEPENDENCY) == 0) {
5422 		if (scf_pg_get_property(lipg, "external", NULL) == 0)
5423 			return (0);
5424 
5425 		switch (scf_error()) {
5426 		case SCF_ERROR_NOT_FOUND:
5427 			break;
5428 
5429 		case SCF_ERROR_CONNECTION_BROKEN:
5430 			return (ECONNABORTED);
5431 
5432 		case SCF_ERROR_DELETED:
5433 			return (ENODEV);
5434 
5435 		case SCF_ERROR_INVALID_ARGUMENT:
5436 		case SCF_ERROR_NOT_BOUND:
5437 		case SCF_ERROR_HANDLE_MISMATCH:
5438 		case SCF_ERROR_NOT_SET:
5439 		default:
5440 			bad_error("scf_pg_get_property", scf_error());
5441 		}
5442 	}
5443 
5444 	/* lookup pg in new properties */
5445 	if (scf_pg_get_name(lipg, imp_str, imp_str_sz) < 0) {
5446 		switch (scf_error()) {
5447 		case SCF_ERROR_DELETED:
5448 			return (ENODEV);
5449 
5450 		case SCF_ERROR_CONNECTION_BROKEN:
5451 			return (ECONNABORTED);
5452 
5453 		case SCF_ERROR_NOT_SET:
5454 		case SCF_ERROR_NOT_BOUND:
5455 		default:
5456 			bad_error("scf_pg_get_name", scf_error());
5457 		}
5458 	}
5459 
5460 	pgrp.sc_pgroup_name = imp_str;
5461 	mpg = uu_list_find(ient->sc_pgroups, &pgrp, NULL, NULL);
5462 
5463 	if (mpg != NULL)
5464 		mpg->sc_pgroup_seen = 1;
5465 
5466 	/* Special handling for dependents */
5467 	if (strcmp(imp_str, "dependents") == 0)
5468 		return (upgrade_dependents(lipg, imp_snpl, ient, running, ent));
5469 
5470 	if (strcmp(imp_str, SCF_PG_MANIFESTFILES) == 0)
5471 		return (upgrade_manifestfiles(NULL, ient, running, ent));
5472 
5473 	if (mpg == NULL || mpg->sc_pgroup_delete) {
5474 		/* property group was deleted from manifest */
5475 		if (entity_get_pg(ent, issvc, imp_str, imp_pg2) != 0) {
5476 			switch (scf_error()) {
5477 			case SCF_ERROR_NOT_FOUND:
5478 				return (0);
5479 
5480 			case SCF_ERROR_DELETED:
5481 			case SCF_ERROR_CONNECTION_BROKEN:
5482 				return (scferror2errno(scf_error()));
5483 
5484 			case SCF_ERROR_INVALID_ARGUMENT:
5485 			case SCF_ERROR_HANDLE_MISMATCH:
5486 			case SCF_ERROR_NOT_BOUND:
5487 			case SCF_ERROR_NOT_SET:
5488 			default:
5489 				bad_error("entity_get_pg", scf_error());
5490 			}
5491 		}
5492 
5493 		if (mpg != NULL && mpg->sc_pgroup_delete) {
5494 			if (g_verbose)
5495 				warn(deleting, ient->sc_fmri, imp_str);
5496 			if (scf_pg_delete(imp_pg2) == 0)
5497 				return (0);
5498 
5499 			switch (scf_error()) {
5500 			case SCF_ERROR_DELETED:
5501 				return (0);
5502 
5503 			case SCF_ERROR_CONNECTION_BROKEN:
5504 			case SCF_ERROR_BACKEND_READONLY:
5505 			case SCF_ERROR_BACKEND_ACCESS:
5506 				return (scferror2errno(scf_error()));
5507 
5508 			case SCF_ERROR_PERMISSION_DENIED:
5509 				warn(emsg_pg_del_perm, imp_str, ient->sc_fmri);
5510 				return (scferror2errno(scf_error()));
5511 
5512 			case SCF_ERROR_NOT_SET:
5513 			default:
5514 				bad_error("scf_pg_delete", scf_error());
5515 			}
5516 		}
5517 
5518 		r = load_pg(lipg, &lipg_i, ient->sc_fmri, snap_lastimport);
5519 		switch (r) {
5520 		case 0:
5521 			break;
5522 
5523 		case ECANCELED:
5524 			return (ENODEV);
5525 
5526 		case ECONNABORTED:
5527 		case ENOMEM:
5528 		case EBADF:
5529 		case EACCES:
5530 			return (r);
5531 
5532 		default:
5533 			bad_error("load_pg", r);
5534 		}
5535 
5536 		r = load_pg(imp_pg2, &curpg_i, ient->sc_fmri, NULL);
5537 		switch (r) {
5538 		case 0:
5539 			break;
5540 
5541 		case ECANCELED:
5542 		case ECONNABORTED:
5543 		case ENOMEM:
5544 		case EBADF:
5545 		case EACCES:
5546 			internal_pgroup_free(lipg_i);
5547 			return (r);
5548 
5549 		default:
5550 			bad_error("load_pg", r);
5551 		}
5552 
5553 		if (pg_equal(lipg_i, curpg_i)) {
5554 			if (g_verbose)
5555 				warn(deleting, ient->sc_fmri, imp_str);
5556 			if (scf_pg_delete(imp_pg2) != 0) {
5557 				switch (scf_error()) {
5558 				case SCF_ERROR_DELETED:
5559 					break;
5560 
5561 				case SCF_ERROR_CONNECTION_BROKEN:
5562 					internal_pgroup_free(lipg_i);
5563 					internal_pgroup_free(curpg_i);
5564 					return (ECONNABORTED);
5565 
5566 				case SCF_ERROR_NOT_SET:
5567 				case SCF_ERROR_NOT_BOUND:
5568 				default:
5569 					bad_error("scf_pg_delete", scf_error());
5570 				}
5571 			}
5572 		} else {
5573 			report_pg_diffs(lipg_i, curpg_i, ient->sc_fmri, 0);
5574 		}
5575 
5576 		internal_pgroup_free(lipg_i);
5577 		internal_pgroup_free(curpg_i);
5578 
5579 		return (0);
5580 	}
5581 
5582 	/*
5583 	 * Only dependent pgs can have override set, and we skipped those
5584 	 * above.
5585 	 */
5586 	assert(!mpg->sc_pgroup_override);
5587 
5588 	/* compare */
5589 	r = load_pg(lipg, &lipg_i, ient->sc_fmri, snap_lastimport);
5590 	switch (r) {
5591 	case 0:
5592 		break;
5593 
5594 	case ECANCELED:
5595 		return (ENODEV);
5596 
5597 	case ECONNABORTED:
5598 	case EBADF:
5599 	case ENOMEM:
5600 	case EACCES:
5601 		return (r);
5602 
5603 	default:
5604 		bad_error("load_pg", r);
5605 	}
5606 
5607 	if (pg_equal(mpg, lipg_i)) {
5608 		/* The manifest pg has not changed.  Move on. */
5609 		r = 0;
5610 		goto out;
5611 	}
5612 
5613 	/* upgrade current properties according to lipg & mpg */
5614 	if (running != NULL)
5615 		r = scf_snaplevel_get_pg(running, imp_str, imp_pg2);
5616 	else
5617 		r = entity_get_pg(ent, issvc, imp_str, imp_pg2);
5618 	if (r != 0) {
5619 		switch (scf_error()) {
5620 		case SCF_ERROR_CONNECTION_BROKEN:
5621 			r = scferror2errno(scf_error());
5622 			goto out;
5623 
5624 		case SCF_ERROR_DELETED:
5625 			if (running != NULL)
5626 				r = ENODEV;
5627 			else
5628 				r = ECANCELED;
5629 			goto out;
5630 
5631 		case SCF_ERROR_NOT_FOUND:
5632 			break;
5633 
5634 		case SCF_ERROR_INVALID_ARGUMENT:
5635 		case SCF_ERROR_HANDLE_MISMATCH:
5636 		case SCF_ERROR_NOT_BOUND:
5637 		case SCF_ERROR_NOT_SET:
5638 		default:
5639 			bad_error("entity_get_pg", scf_error());
5640 		}
5641 
5642 		warn(cf_pg_missing, ient->sc_fmri, imp_str);
5643 
5644 		r = 0;
5645 		goto out;
5646 	}
5647 
5648 	r = load_pg_attrs(imp_pg2, &curpg_i);
5649 	switch (r) {
5650 	case 0:
5651 		break;
5652 
5653 	case ECANCELED:
5654 		warn(cf_pg_missing, ient->sc_fmri, imp_str);
5655 		r = 0;
5656 		goto out;
5657 
5658 	case ECONNABORTED:
5659 	case ENOMEM:
5660 		goto out;
5661 
5662 	default:
5663 		bad_error("load_pg_attrs", r);
5664 	}
5665 
5666 	if (!pg_attrs_equal(lipg_i, curpg_i, NULL, 0)) {
5667 		(void) pg_attrs_equal(curpg_i, mpg, ient->sc_fmri, 0);
5668 		internal_pgroup_free(curpg_i);
5669 		r = 0;
5670 		goto out;
5671 	}
5672 
5673 	internal_pgroup_free(curpg_i);
5674 
5675 	r = load_pg(imp_pg2, &curpg_i, ient->sc_fmri, NULL);
5676 	switch (r) {
5677 	case 0:
5678 		break;
5679 
5680 	case ECANCELED:
5681 		warn(cf_pg_missing, ient->sc_fmri, imp_str);
5682 		r = 0;
5683 		goto out;
5684 
5685 	case ECONNABORTED:
5686 	case EBADF:
5687 	case ENOMEM:
5688 	case EACCES:
5689 		goto out;
5690 
5691 	default:
5692 		bad_error("load_pg", r);
5693 	}
5694 
5695 	if (pg_equal(lipg_i, curpg_i) &&
5696 	    !pg_attrs_equal(lipg_i, mpg, NULL, 0)) {
5697 		int do_delete = 1;
5698 
5699 		if (g_verbose)
5700 			warn(gettext("%s: Upgrading property group \"%s\".\n"),
5701 			    ient->sc_fmri, mpg->sc_pgroup_name);
5702 
5703 		internal_pgroup_free(curpg_i);
5704 
5705 		if (running != NULL &&
5706 		    entity_get_pg(ent, issvc, imp_str, imp_pg2) != 0) {
5707 			switch (scf_error()) {
5708 			case SCF_ERROR_DELETED:
5709 				r = ECANCELED;
5710 				goto out;
5711 
5712 			case SCF_ERROR_NOT_FOUND:
5713 				do_delete = 0;
5714 				break;
5715 
5716 			case SCF_ERROR_CONNECTION_BROKEN:
5717 				r = scferror2errno(scf_error());
5718 				goto out;
5719 
5720 			case SCF_ERROR_HANDLE_MISMATCH:
5721 			case SCF_ERROR_INVALID_ARGUMENT:
5722 			case SCF_ERROR_NOT_SET:
5723 			case SCF_ERROR_NOT_BOUND:
5724 			default:
5725 				bad_error("entity_get_pg", scf_error());
5726 			}
5727 		}
5728 
5729 		if (do_delete && scf_pg_delete(imp_pg2) != 0) {
5730 			switch (scf_error()) {
5731 			case SCF_ERROR_DELETED:
5732 				break;
5733 
5734 			case SCF_ERROR_CONNECTION_BROKEN:
5735 			case SCF_ERROR_BACKEND_READONLY:
5736 			case SCF_ERROR_BACKEND_ACCESS:
5737 				r = scferror2errno(scf_error());
5738 				goto out;
5739 
5740 			case SCF_ERROR_PERMISSION_DENIED:
5741 				warn(emsg_pg_del_perm, mpg->sc_pgroup_name,
5742 				    ient->sc_fmri);
5743 				r = scferror2errno(scf_error());
5744 				goto out;
5745 
5746 			case SCF_ERROR_NOT_SET:
5747 			case SCF_ERROR_NOT_BOUND:
5748 			default:
5749 				bad_error("scf_pg_delete", scf_error());
5750 			}
5751 		}
5752 
5753 		cbdata.sc_handle = g_hndl;
5754 		cbdata.sc_parent = ent;
5755 		cbdata.sc_service = issvc;
5756 		cbdata.sc_flags = 0;
5757 		cbdata.sc_source_fmri = ient->sc_fmri;
5758 		cbdata.sc_target_fmri = ient->sc_fmri;
5759 
5760 		r = entity_pgroup_import(mpg, &cbdata);
5761 		switch (r) {
5762 		case UU_WALK_NEXT:
5763 			r = 0;
5764 			goto out;
5765 
5766 		case UU_WALK_ERROR:
5767 			if (cbdata.sc_err == EEXIST) {
5768 				warn(emsg_pg_added, ient->sc_fmri,
5769 				    mpg->sc_pgroup_name);
5770 				r = EBUSY;
5771 			} else {
5772 				r = cbdata.sc_err;
5773 			}
5774 			goto out;
5775 
5776 		default:
5777 			bad_error("entity_pgroup_import", r);
5778 		}
5779 	}
5780 
5781 	if (running != NULL &&
5782 	    entity_get_pg(ent, issvc, imp_str, imp_pg2) != 0) {
5783 		switch (scf_error()) {
5784 		case SCF_ERROR_CONNECTION_BROKEN:
5785 		case SCF_ERROR_DELETED:
5786 			r = scferror2errno(scf_error());
5787 			goto out;
5788 
5789 		case SCF_ERROR_NOT_FOUND:
5790 			break;
5791 
5792 		case SCF_ERROR_HANDLE_MISMATCH:
5793 		case SCF_ERROR_INVALID_ARGUMENT:
5794 		case SCF_ERROR_NOT_SET:
5795 		case SCF_ERROR_NOT_BOUND:
5796 		default:
5797 			bad_error("entity_get_pg", scf_error());
5798 		}
5799 
5800 		cbdata.sc_handle = g_hndl;
5801 		cbdata.sc_parent = ent;
5802 		cbdata.sc_service = issvc;
5803 		cbdata.sc_flags = SCI_FORCE;
5804 		cbdata.sc_source_fmri = ient->sc_fmri;
5805 		cbdata.sc_target_fmri = ient->sc_fmri;
5806 
5807 		r = entity_pgroup_import(mpg, &cbdata);
5808 		switch (r) {
5809 		case UU_WALK_NEXT:
5810 			r = 0;
5811 			goto out;
5812 
5813 		case UU_WALK_ERROR:
5814 			if (cbdata.sc_err == EEXIST) {
5815 				warn(emsg_pg_added, ient->sc_fmri,
5816 				    mpg->sc_pgroup_name);
5817 				r = EBUSY;
5818 			} else {
5819 				r = cbdata.sc_err;
5820 			}
5821 			goto out;
5822 
5823 		default:
5824 			bad_error("entity_pgroup_import", r);
5825 		}
5826 	}
5827 
5828 	r = upgrade_pg(imp_pg2, curpg_i, lipg_i, mpg, g_verbose, ient->sc_fmri);
5829 	internal_pgroup_free(curpg_i);
5830 	switch (r) {
5831 	case 0:
5832 		ient->sc_import_state = IMPORT_PROP_BEGUN;
5833 		break;
5834 
5835 	case ECANCELED:
5836 		warn(emsg_pg_deleted, ient->sc_fmri, mpg->sc_pgroup_name);
5837 		r = EBUSY;
5838 		break;
5839 
5840 	case EPERM:
5841 		warn(emsg_pg_mod_perm, mpg->sc_pgroup_name, ient->sc_fmri);
5842 		break;
5843 
5844 	case EBUSY:
5845 		warn(emsg_pg_changed, ient->sc_fmri, mpg->sc_pgroup_name);
5846 		break;
5847 
5848 	case ECONNABORTED:
5849 	case ENOMEM:
5850 	case ENOSPC:
5851 	case EROFS:
5852 	case EACCES:
5853 	case EINVAL:
5854 		break;
5855 
5856 	default:
5857 		bad_error("upgrade_pg", r);
5858 	}
5859 
5860 out:
5861 	internal_pgroup_free(lipg_i);
5862 	return (r);
5863 }
5864 
5865 /*
5866  * Upgrade the properties of ent according to snpl & ient.
5867  *
5868  * Returns
5869  *   0 - success
5870  *   ECONNABORTED - repository connection broken
5871  *   ENOMEM - out of memory
5872  *   ENOSPC - configd is out of resources
5873  *   ECANCELED - ent was deleted
5874  *   ENODEV - entity containing snpl was deleted
5875  *	    - entity containing running was deleted
5876  *   EBADF - imp_snpl is corrupt (error printed)
5877  *	   - ent has corrupt pg (error printed)
5878  *	   - dependent has corrupt pg (error printed)
5879  *	   - dependent target has a corrupt snapshot (error printed)
5880  *   EBUSY - pg was added, changed, or deleted (error printed)
5881  *	   - dependent target was deleted (error printed)
5882  *	   - dependent pg changed (error printed)
5883  *   EINVAL - invalid property group name (error printed)
5884  *	    - invalid property name (error printed)
5885  *	    - invalid value (error printed)
5886  *	    - ient has invalid pgroup or dependent (error printed)
5887  *   EPERM - could not create property group (permission denied) (error printed)
5888  *	   - could not modify property group (permission denied) (error printed)
5889  *	   - couldn't delete, upgrade, or import pg or dependent (error printed)
5890  *   EROFS - could not create property group (repository read-only)
5891  *	   - couldn't delete, upgrade, or import pg or dependent
5892  *   EACCES - could not create property group (backend access denied)
5893  *	    - couldn't delete, upgrade, or import pg or dependent
5894  *   EEXIST - dependent collision in target service (error printed)
5895  */
5896 static int
5897 upgrade_props(void *ent, scf_snaplevel_t *running, scf_snaplevel_t *snpl,
5898     entity_t *ient)
5899 {
5900 	pgroup_t *pg, *rpg;
5901 	int r;
5902 	uu_list_t *pgs = ient->sc_pgroups;
5903 
5904 	const int issvc = (ient->sc_etype == SVCCFG_SERVICE_OBJECT);
5905 
5906 	/* clear sc_sceen for pgs */
5907 	if (uu_list_walk(pgs, clear_int,
5908 	    (void *)offsetof(pgroup_t, sc_pgroup_seen), UU_DEFAULT) != 0)
5909 		bad_error("uu_list_walk", uu_error());
5910 
5911 	if (scf_iter_snaplevel_pgs(imp_up_iter, snpl) != 0) {
5912 		switch (scf_error()) {
5913 		case SCF_ERROR_DELETED:
5914 			return (ENODEV);
5915 
5916 		case SCF_ERROR_CONNECTION_BROKEN:
5917 			return (ECONNABORTED);
5918 
5919 		case SCF_ERROR_NOT_SET:
5920 		case SCF_ERROR_NOT_BOUND:
5921 		case SCF_ERROR_HANDLE_MISMATCH:
5922 		default:
5923 			bad_error("scf_iter_snaplevel_pgs", scf_error());
5924 		}
5925 	}
5926 
5927 	for (;;) {
5928 		r = scf_iter_next_pg(imp_up_iter, imp_pg);
5929 		if (r == 0)
5930 			break;
5931 		if (r == 1) {
5932 			r = process_old_pg(imp_pg, ient, ent, running);
5933 			switch (r) {
5934 			case 0:
5935 				break;
5936 
5937 			case ECONNABORTED:
5938 			case ENOMEM:
5939 			case ENOSPC:
5940 			case ECANCELED:
5941 			case ENODEV:
5942 			case EPERM:
5943 			case EROFS:
5944 			case EACCES:
5945 			case EBADF:
5946 			case EBUSY:
5947 			case EINVAL:
5948 			case EEXIST:
5949 				return (r);
5950 
5951 			default:
5952 				bad_error("process_old_pg", r);
5953 			}
5954 			continue;
5955 		}
5956 		if (r != -1)
5957 			bad_error("scf_iter_next_pg", r);
5958 
5959 		switch (scf_error()) {
5960 		case SCF_ERROR_DELETED:
5961 			return (ENODEV);
5962 
5963 		case SCF_ERROR_CONNECTION_BROKEN:
5964 			return (ECONNABORTED);
5965 
5966 		case SCF_ERROR_HANDLE_MISMATCH:
5967 		case SCF_ERROR_NOT_BOUND:
5968 		case SCF_ERROR_NOT_SET:
5969 		case SCF_ERROR_INVALID_ARGUMENT:
5970 		default:
5971 			bad_error("scf_iter_next_pg", scf_error());
5972 		}
5973 	}
5974 
5975 	for (pg = uu_list_first(pgs); pg != NULL; pg = uu_list_next(pgs, pg)) {
5976 		if (pg->sc_pgroup_seen)
5977 			continue;
5978 
5979 		/* pg is new */
5980 
5981 		if (strcmp(pg->sc_pgroup_name, "dependents") == 0) {
5982 			r = upgrade_dependents(NULL, imp_snpl, ient, running,
5983 			    ent);
5984 			switch (r) {
5985 			case 0:
5986 				break;
5987 
5988 			case ECONNABORTED:
5989 			case ENOMEM:
5990 			case ENOSPC:
5991 			case ECANCELED:
5992 			case ENODEV:
5993 			case EBADF:
5994 			case EBUSY:
5995 			case EINVAL:
5996 			case EPERM:
5997 			case EROFS:
5998 			case EACCES:
5999 			case EEXIST:
6000 				return (r);
6001 
6002 			default:
6003 				bad_error("upgrade_dependents", r);
6004 			}
6005 			continue;
6006 		}
6007 
6008 		if (strcmp(pg->sc_pgroup_name, SCF_PG_MANIFESTFILES) == 0) {
6009 			r = upgrade_manifestfiles(pg, ient, running, ent);
6010 			switch (r) {
6011 			case 0:
6012 				break;
6013 
6014 			case ECONNABORTED:
6015 			case ENOMEM:
6016 			case ENOSPC:
6017 			case ECANCELED:
6018 			case ENODEV:
6019 			case EBADF:
6020 			case EBUSY:
6021 			case EINVAL:
6022 			case EPERM:
6023 			case EROFS:
6024 			case EACCES:
6025 			case EEXIST:
6026 				return (r);
6027 
6028 			default:
6029 				bad_error("upgrade_manifestfiles", r);
6030 			}
6031 			continue;
6032 		}
6033 
6034 		if (running != NULL) {
6035 			r = scf_snaplevel_get_pg(running, pg->sc_pgroup_name,
6036 			    imp_pg);
6037 		} else {
6038 			r = entity_get_pg(ent, issvc, pg->sc_pgroup_name,
6039 			    imp_pg);
6040 		}
6041 		if (r != 0) {
6042 			scf_callback_t cbdata;
6043 
6044 			switch (scf_error()) {
6045 			case SCF_ERROR_NOT_FOUND:
6046 				break;
6047 
6048 			case SCF_ERROR_CONNECTION_BROKEN:
6049 				return (scferror2errno(scf_error()));
6050 
6051 			case SCF_ERROR_DELETED:
6052 				if (running != NULL)
6053 					return (ENODEV);
6054 				else
6055 					return (scferror2errno(scf_error()));
6056 
6057 			case SCF_ERROR_INVALID_ARGUMENT:
6058 				warn(emsg_fmri_invalid_pg_name, ient->sc_fmri,
6059 				    pg->sc_pgroup_name);
6060 				return (EINVAL);
6061 
6062 			case SCF_ERROR_NOT_SET:
6063 			case SCF_ERROR_HANDLE_MISMATCH:
6064 			case SCF_ERROR_NOT_BOUND:
6065 			default:
6066 				bad_error("entity_get_pg", scf_error());
6067 			}
6068 
6069 			/* User doesn't have pg, so import it. */
6070 
6071 			cbdata.sc_handle = g_hndl;
6072 			cbdata.sc_parent = ent;
6073 			cbdata.sc_service = issvc;
6074 			cbdata.sc_flags = SCI_FORCE;
6075 			cbdata.sc_source_fmri = ient->sc_fmri;
6076 			cbdata.sc_target_fmri = ient->sc_fmri;
6077 
6078 			r = entity_pgroup_import(pg, &cbdata);
6079 			switch (r) {
6080 			case UU_WALK_NEXT:
6081 				ient->sc_import_state = IMPORT_PROP_BEGUN;
6082 				continue;
6083 
6084 			case UU_WALK_ERROR:
6085 				if (cbdata.sc_err == EEXIST) {
6086 					warn(emsg_pg_added, ient->sc_fmri,
6087 					    pg->sc_pgroup_name);
6088 					return (EBUSY);
6089 				}
6090 				return (cbdata.sc_err);
6091 
6092 			default:
6093 				bad_error("entity_pgroup_import", r);
6094 			}
6095 		}
6096 
6097 		/* report differences between pg & current */
6098 		r = load_pg(imp_pg, &rpg, ient->sc_fmri, NULL);
6099 		switch (r) {
6100 		case 0:
6101 			break;
6102 
6103 		case ECANCELED:
6104 			warn(emsg_pg_deleted, ient->sc_fmri,
6105 			    pg->sc_pgroup_name);
6106 			return (EBUSY);
6107 
6108 		case ECONNABORTED:
6109 		case EBADF:
6110 		case ENOMEM:
6111 		case EACCES:
6112 			return (r);
6113 
6114 		default:
6115 			bad_error("load_pg", r);
6116 		}
6117 		report_pg_diffs(pg, rpg, ient->sc_fmri, 1);
6118 		internal_pgroup_free(rpg);
6119 		rpg = NULL;
6120 	}
6121 
6122 	return (0);
6123 }
6124 
6125 /*
6126  * Import an instance.  If it doesn't exist, create it.  If it has
6127  * a last-import snapshot, upgrade its properties.  Finish by updating its
6128  * last-import snapshot.  If it doesn't have a last-import snapshot then it
6129  * could have been created for a dependent tag in another manifest.  Import the
6130  * new properties.  If there's a conflict, don't override, like now?
6131  *
6132  * On success, returns UU_WALK_NEXT.  On error returns UU_WALK_ERROR and sets
6133  * lcbdata->sc_err to
6134  *   ECONNABORTED - repository connection broken
6135  *   ENOMEM - out of memory
6136  *   ENOSPC - svc.configd is out of resources
6137  *   EEXIST - dependency collision in dependent service (error printed)
6138  *   EPERM - couldn't create temporary instance (permission denied)
6139  *	   - couldn't import into temporary instance (permission denied)
6140  *	   - couldn't take snapshot (permission denied)
6141  *	   - couldn't upgrade properties (permission denied)
6142  *	   - couldn't import properties (permission denied)
6143  *	   - couldn't import dependents (permission denied)
6144  *   EROFS - couldn't create temporary instance (repository read-only)
6145  *	   - couldn't import into temporary instance (repository read-only)
6146  *	   - couldn't upgrade properties (repository read-only)
6147  *	   - couldn't import properties (repository read-only)
6148  *	   - couldn't import dependents (repository read-only)
6149  *   EACCES - couldn't create temporary instance (backend access denied)
6150  *	    - couldn't import into temporary instance (backend access denied)
6151  *	    - couldn't upgrade properties (backend access denied)
6152  *	    - couldn't import properties (backend access denied)
6153  *	    - couldn't import dependents (backend access denied)
6154  *   EINVAL - invalid instance name (error printed)
6155  *	    - invalid pgroup_t's (error printed)
6156  *	    - invalid dependents (error printed)
6157  *   EBUSY - temporary service deleted (error printed)
6158  *	   - temporary instance deleted (error printed)
6159  *	   - temporary instance changed (error printed)
6160  *	   - temporary instance already exists (error printed)
6161  *	   - instance deleted (error printed)
6162  *   EBADF - instance has corrupt last-import snapshot (error printed)
6163  *	   - instance is corrupt (error printed)
6164  *	   - dependent has corrupt pg (error printed)
6165  *	   - dependent target has a corrupt snapshot (error printed)
6166  *   -1 - unknown libscf error (error printed)
6167  */
6168 static int
6169 lscf_instance_import(void *v, void *pvt)
6170 {
6171 	entity_t *inst = v;
6172 	scf_callback_t ctx;
6173 	scf_callback_t *lcbdata = pvt;
6174 	scf_service_t *rsvc = lcbdata->sc_parent;
6175 	int r;
6176 	scf_snaplevel_t *running;
6177 	int flags = lcbdata->sc_flags;
6178 
6179 	const char * const emsg_tdel =
6180 	    gettext("Temporary instance svc:/%s:%s was deleted.\n");
6181 	const char * const emsg_tchg = gettext("Temporary instance svc:/%s:%s "
6182 	    "changed unexpectedly.\n");
6183 	const char * const emsg_del = gettext("%s changed unexpectedly "
6184 	    "(instance \"%s\" was deleted.)\n");
6185 	const char * const emsg_badsnap = gettext(
6186 	    "\"%s\" snapshot of %s is corrupt (missing a snaplevel).\n");
6187 
6188 	/*
6189 	 * prepare last-import snapshot:
6190 	 * create temporary instance (service was precreated)
6191 	 * populate with properties from bundle
6192 	 * take snapshot
6193 	 */
6194 	if (scf_service_add_instance(imp_tsvc, inst->sc_name, imp_tinst) != 0) {
6195 		switch (scf_error()) {
6196 		case SCF_ERROR_CONNECTION_BROKEN:
6197 		case SCF_ERROR_NO_RESOURCES:
6198 		case SCF_ERROR_BACKEND_READONLY:
6199 		case SCF_ERROR_BACKEND_ACCESS:
6200 			return (stash_scferror(lcbdata));
6201 
6202 		case SCF_ERROR_EXISTS:
6203 			warn(gettext("Temporary service svc:/%s "
6204 			    "changed unexpectedly (instance \"%s\" added).\n"),
6205 			    imp_tsname, inst->sc_name);
6206 			lcbdata->sc_err = EBUSY;
6207 			return (UU_WALK_ERROR);
6208 
6209 		case SCF_ERROR_DELETED:
6210 			warn(gettext("Temporary service svc:/%s "
6211 			    "was deleted unexpectedly.\n"), imp_tsname);
6212 			lcbdata->sc_err = EBUSY;
6213 			return (UU_WALK_ERROR);
6214 
6215 		case SCF_ERROR_INVALID_ARGUMENT:
6216 			warn(gettext("Invalid instance name \"%s\".\n"),
6217 			    inst->sc_name);
6218 			return (stash_scferror(lcbdata));
6219 
6220 		case SCF_ERROR_PERMISSION_DENIED:
6221 			warn(gettext("Could not create temporary instance "
6222 			    "\"%s\" in svc:/%s (permission denied).\n"),
6223 			    inst->sc_name, imp_tsname);
6224 			return (stash_scferror(lcbdata));
6225 
6226 		case SCF_ERROR_HANDLE_MISMATCH:
6227 		case SCF_ERROR_NOT_BOUND:
6228 		case SCF_ERROR_NOT_SET:
6229 		default:
6230 			bad_error("scf_service_add_instance", scf_error());
6231 		}
6232 	}
6233 
6234 	r = snprintf(imp_str, imp_str_sz, "svc:/%s:%s", imp_tsname,
6235 	    inst->sc_name);
6236 	if (r < 0)
6237 		bad_error("snprintf", errno);
6238 
6239 	r = lscf_import_instance_pgs(imp_tinst, imp_str, inst,
6240 	    lcbdata->sc_flags | SCI_NOENABLED);
6241 	switch (r) {
6242 	case 0:
6243 		break;
6244 
6245 	case ECANCELED:
6246 		warn(emsg_tdel, imp_tsname, inst->sc_name);
6247 		lcbdata->sc_err = EBUSY;
6248 		r = UU_WALK_ERROR;
6249 		goto deltemp;
6250 
6251 	case EEXIST:
6252 		warn(emsg_tchg, imp_tsname, inst->sc_name);
6253 		lcbdata->sc_err = EBUSY;
6254 		r = UU_WALK_ERROR;
6255 		goto deltemp;
6256 
6257 	case ECONNABORTED:
6258 		goto connaborted;
6259 
6260 	case ENOMEM:
6261 	case ENOSPC:
6262 	case EPERM:
6263 	case EROFS:
6264 	case EACCES:
6265 	case EINVAL:
6266 	case EBUSY:
6267 		lcbdata->sc_err = r;
6268 		r = UU_WALK_ERROR;
6269 		goto deltemp;
6270 
6271 	default:
6272 		bad_error("lscf_import_instance_pgs", r);
6273 	}
6274 
6275 	r = snprintf(imp_str, imp_str_sz, "svc:/%s:%s", imp_tsname,
6276 	    inst->sc_name);
6277 	if (r < 0)
6278 		bad_error("snprintf", errno);
6279 
6280 	ctx.sc_handle = lcbdata->sc_handle;
6281 	ctx.sc_parent = imp_tinst;
6282 	ctx.sc_service = 0;
6283 	ctx.sc_source_fmri = inst->sc_fmri;
6284 	ctx.sc_target_fmri = imp_str;
6285 	if (uu_list_walk(inst->sc_dependents, entity_pgroup_import, &ctx,
6286 	    UU_DEFAULT) != 0) {
6287 		if (uu_error() != UU_ERROR_CALLBACK_FAILED)
6288 			bad_error("uu_list_walk", uu_error());
6289 
6290 		switch (ctx.sc_err) {
6291 		case ECONNABORTED:
6292 			goto connaborted;
6293 
6294 		case ECANCELED:
6295 			warn(emsg_tdel, imp_tsname, inst->sc_name);
6296 			lcbdata->sc_err = EBUSY;
6297 			break;
6298 
6299 		case EEXIST:
6300 			warn(emsg_tchg, imp_tsname, inst->sc_name);
6301 			lcbdata->sc_err = EBUSY;
6302 			break;
6303 
6304 		default:
6305 			lcbdata->sc_err = ctx.sc_err;
6306 		}
6307 		r = UU_WALK_ERROR;
6308 		goto deltemp;
6309 	}
6310 
6311 	if (_scf_snapshot_take_new_named(imp_tinst, inst->sc_parent->sc_name,
6312 	    inst->sc_name, snap_lastimport, imp_tlisnap) != 0) {
6313 		switch (scf_error()) {
6314 		case SCF_ERROR_CONNECTION_BROKEN:
6315 			goto connaborted;
6316 
6317 		case SCF_ERROR_NO_RESOURCES:
6318 			r = stash_scferror(lcbdata);
6319 			goto deltemp;
6320 
6321 		case SCF_ERROR_EXISTS:
6322 			warn(emsg_tchg, imp_tsname, inst->sc_name);
6323 			lcbdata->sc_err = EBUSY;
6324 			r = UU_WALK_ERROR;
6325 			goto deltemp;
6326 
6327 		case SCF_ERROR_PERMISSION_DENIED:
6328 			warn(gettext("Could not take \"%s\" snapshot of %s "
6329 			    "(permission denied).\n"), snap_lastimport,
6330 			    imp_str);
6331 			r = stash_scferror(lcbdata);
6332 			goto deltemp;
6333 
6334 		default:
6335 			scfwarn();
6336 			lcbdata->sc_err = -1;
6337 			r = UU_WALK_ERROR;
6338 			goto deltemp;
6339 
6340 		case SCF_ERROR_HANDLE_MISMATCH:
6341 		case SCF_ERROR_INVALID_ARGUMENT:
6342 		case SCF_ERROR_NOT_SET:
6343 			bad_error("_scf_snapshot_take_new_named", scf_error());
6344 		}
6345 	}
6346 
6347 	if (lcbdata->sc_flags & SCI_FRESH)
6348 		goto fresh;
6349 
6350 	if (scf_service_get_instance(rsvc, inst->sc_name, imp_inst) == 0) {
6351 		if (scf_instance_get_snapshot(imp_inst, snap_lastimport,
6352 		    imp_lisnap) != 0) {
6353 			switch (scf_error()) {
6354 			case SCF_ERROR_DELETED:
6355 				warn(emsg_del, inst->sc_parent->sc_fmri,
6356 				    inst->sc_name);
6357 				lcbdata->sc_err = EBUSY;
6358 				r = UU_WALK_ERROR;
6359 				goto deltemp;
6360 
6361 			case SCF_ERROR_NOT_FOUND:
6362 				flags |= SCI_FORCE;
6363 				goto nosnap;
6364 
6365 			case SCF_ERROR_CONNECTION_BROKEN:
6366 				goto connaborted;
6367 
6368 			case SCF_ERROR_INVALID_ARGUMENT:
6369 			case SCF_ERROR_HANDLE_MISMATCH:
6370 			case SCF_ERROR_NOT_BOUND:
6371 			case SCF_ERROR_NOT_SET:
6372 			default:
6373 				bad_error("scf_instance_get_snapshot",
6374 				    scf_error());
6375 			}
6376 		}
6377 
6378 		/* upgrade */
6379 
6380 		/*
6381 		 * compare new properties with last-import properties
6382 		 * upgrade current properties
6383 		 */
6384 		/* clear sc_sceen for pgs */
6385 		if (uu_list_walk(inst->sc_pgroups, clear_int,
6386 		    (void *)offsetof(pgroup_t, sc_pgroup_seen), UU_DEFAULT) !=
6387 		    0)
6388 			bad_error("uu_list_walk", uu_error());
6389 
6390 		r = get_snaplevel(imp_lisnap, 0, imp_snpl);
6391 		switch (r) {
6392 		case 0:
6393 			break;
6394 
6395 		case ECONNABORTED:
6396 			goto connaborted;
6397 
6398 		case ECANCELED:
6399 			warn(emsg_del, inst->sc_parent->sc_fmri, inst->sc_name);
6400 			lcbdata->sc_err = EBUSY;
6401 			r = UU_WALK_ERROR;
6402 			goto deltemp;
6403 
6404 		case ENOENT:
6405 			warn(emsg_badsnap, snap_lastimport, inst->sc_fmri);
6406 			lcbdata->sc_err = EBADF;
6407 			r = UU_WALK_ERROR;
6408 			goto deltemp;
6409 
6410 		default:
6411 			bad_error("get_snaplevel", r);
6412 		}
6413 
6414 		if (scf_instance_get_snapshot(imp_inst, snap_running,
6415 		    imp_rsnap) != 0) {
6416 			switch (scf_error()) {
6417 			case SCF_ERROR_DELETED:
6418 				warn(emsg_del, inst->sc_parent->sc_fmri,
6419 				    inst->sc_name);
6420 				lcbdata->sc_err = EBUSY;
6421 				r = UU_WALK_ERROR;
6422 				goto deltemp;
6423 
6424 			case SCF_ERROR_NOT_FOUND:
6425 				break;
6426 
6427 			case SCF_ERROR_CONNECTION_BROKEN:
6428 				goto connaborted;
6429 
6430 			case SCF_ERROR_INVALID_ARGUMENT:
6431 			case SCF_ERROR_HANDLE_MISMATCH:
6432 			case SCF_ERROR_NOT_BOUND:
6433 			case SCF_ERROR_NOT_SET:
6434 			default:
6435 				bad_error("scf_instance_get_snapshot",
6436 				    scf_error());
6437 			}
6438 
6439 			running = NULL;
6440 		} else {
6441 			r = get_snaplevel(imp_rsnap, 0, imp_rsnpl);
6442 			switch (r) {
6443 			case 0:
6444 				running = imp_rsnpl;
6445 				break;
6446 
6447 			case ECONNABORTED:
6448 				goto connaborted;
6449 
6450 			case ECANCELED:
6451 				warn(emsg_del, inst->sc_parent->sc_fmri,
6452 				    inst->sc_name);
6453 				lcbdata->sc_err = EBUSY;
6454 				r = UU_WALK_ERROR;
6455 				goto deltemp;
6456 
6457 			case ENOENT:
6458 				warn(emsg_badsnap, snap_running, inst->sc_fmri);
6459 				lcbdata->sc_err = EBADF;
6460 				r = UU_WALK_ERROR;
6461 				goto deltemp;
6462 
6463 			default:
6464 				bad_error("get_snaplevel", r);
6465 			}
6466 		}
6467 
6468 		r = upgrade_props(imp_inst, running, imp_snpl, inst);
6469 		switch (r) {
6470 		case 0:
6471 			break;
6472 
6473 		case ECANCELED:
6474 		case ENODEV:
6475 			warn(emsg_del, inst->sc_parent->sc_fmri, inst->sc_name);
6476 			lcbdata->sc_err = EBUSY;
6477 			r = UU_WALK_ERROR;
6478 			goto deltemp;
6479 
6480 		case ECONNABORTED:
6481 			goto connaborted;
6482 
6483 		case ENOMEM:
6484 		case ENOSPC:
6485 		case EBADF:
6486 		case EBUSY:
6487 		case EINVAL:
6488 		case EPERM:
6489 		case EROFS:
6490 		case EACCES:
6491 		case EEXIST:
6492 			lcbdata->sc_err = r;
6493 			r = UU_WALK_ERROR;
6494 			goto deltemp;
6495 
6496 		default:
6497 			bad_error("upgrade_props", r);
6498 		}
6499 
6500 		inst->sc_import_state = IMPORT_PROP_DONE;
6501 	} else {
6502 		switch (scf_error()) {
6503 		case SCF_ERROR_CONNECTION_BROKEN:
6504 			goto connaborted;
6505 
6506 		case SCF_ERROR_NOT_FOUND:
6507 			break;
6508 
6509 		case SCF_ERROR_INVALID_ARGUMENT:	/* caught above */
6510 		case SCF_ERROR_HANDLE_MISMATCH:
6511 		case SCF_ERROR_NOT_BOUND:
6512 		case SCF_ERROR_NOT_SET:
6513 		default:
6514 			bad_error("scf_service_get_instance", scf_error());
6515 		}
6516 
6517 fresh:
6518 		/* create instance */
6519 		if (scf_service_add_instance(rsvc, inst->sc_name,
6520 		    imp_inst) != 0) {
6521 			switch (scf_error()) {
6522 			case SCF_ERROR_CONNECTION_BROKEN:
6523 				goto connaborted;
6524 
6525 			case SCF_ERROR_NO_RESOURCES:
6526 			case SCF_ERROR_BACKEND_READONLY:
6527 			case SCF_ERROR_BACKEND_ACCESS:
6528 				r = stash_scferror(lcbdata);
6529 				goto deltemp;
6530 
6531 			case SCF_ERROR_EXISTS:
6532 				warn(gettext("%s changed unexpectedly "
6533 				    "(instance \"%s\" added).\n"),
6534 				    inst->sc_parent->sc_fmri, inst->sc_name);
6535 				lcbdata->sc_err = EBUSY;
6536 				r = UU_WALK_ERROR;
6537 				goto deltemp;
6538 
6539 			case SCF_ERROR_PERMISSION_DENIED:
6540 				warn(gettext("Could not create \"%s\" instance "
6541 				    "in %s (permission denied).\n"),
6542 				    inst->sc_name, inst->sc_parent->sc_fmri);
6543 				r = stash_scferror(lcbdata);
6544 				goto deltemp;
6545 
6546 			case SCF_ERROR_INVALID_ARGUMENT:  /* caught above */
6547 			case SCF_ERROR_HANDLE_MISMATCH:
6548 			case SCF_ERROR_NOT_BOUND:
6549 			case SCF_ERROR_NOT_SET:
6550 			default:
6551 				bad_error("scf_service_add_instance",
6552 				    scf_error());
6553 			}
6554 		}
6555 
6556 nosnap:
6557 		/*
6558 		 * Create a last-import snapshot to serve as an attachment
6559 		 * point for the real one from the temporary instance.  Since
6560 		 * the contents is irrelevant, take it now, while the instance
6561 		 * is empty, to minimize svc.configd's work.
6562 		 */
6563 		if (_scf_snapshot_take_new(imp_inst, snap_lastimport,
6564 		    imp_lisnap) != 0) {
6565 			switch (scf_error()) {
6566 			case SCF_ERROR_CONNECTION_BROKEN:
6567 				goto connaborted;
6568 
6569 			case SCF_ERROR_NO_RESOURCES:
6570 				r = stash_scferror(lcbdata);
6571 				goto deltemp;
6572 
6573 			case SCF_ERROR_EXISTS:
6574 				warn(gettext("%s changed unexpectedly "
6575 				    "(snapshot \"%s\" added).\n"),
6576 				    inst->sc_fmri, snap_lastimport);
6577 				lcbdata->sc_err = EBUSY;
6578 				r = UU_WALK_ERROR;
6579 				goto deltemp;
6580 
6581 			case SCF_ERROR_PERMISSION_DENIED:
6582 				warn(gettext("Could not take \"%s\" snapshot "
6583 				    "of %s (permission denied).\n"),
6584 				    snap_lastimport, inst->sc_fmri);
6585 				r = stash_scferror(lcbdata);
6586 				goto deltemp;
6587 
6588 			default:
6589 				scfwarn();
6590 				lcbdata->sc_err = -1;
6591 				r = UU_WALK_ERROR;
6592 				goto deltemp;
6593 
6594 			case SCF_ERROR_NOT_SET:
6595 			case SCF_ERROR_INTERNAL:
6596 			case SCF_ERROR_INVALID_ARGUMENT:
6597 			case SCF_ERROR_HANDLE_MISMATCH:
6598 				bad_error("_scf_snapshot_take_new",
6599 				    scf_error());
6600 			}
6601 		}
6602 
6603 		if (li_only)
6604 			goto lionly;
6605 
6606 		inst->sc_import_state = IMPORT_PROP_BEGUN;
6607 
6608 		r = lscf_import_instance_pgs(imp_inst, inst->sc_fmri, inst,
6609 		    flags);
6610 		switch (r) {
6611 		case 0:
6612 			break;
6613 
6614 		case ECONNABORTED:
6615 			goto connaborted;
6616 
6617 		case ECANCELED:
6618 			warn(gettext("%s changed unexpectedly "
6619 			    "(instance \"%s\" deleted).\n"),
6620 			    inst->sc_parent->sc_fmri, inst->sc_name);
6621 			lcbdata->sc_err = EBUSY;
6622 			r = UU_WALK_ERROR;
6623 			goto deltemp;
6624 
6625 		case EEXIST:
6626 			warn(gettext("%s changed unexpectedly "
6627 			    "(property group added).\n"), inst->sc_fmri);
6628 			lcbdata->sc_err = EBUSY;
6629 			r = UU_WALK_ERROR;
6630 			goto deltemp;
6631 
6632 		default:
6633 			lcbdata->sc_err = r;
6634 			r = UU_WALK_ERROR;
6635 			goto deltemp;
6636 
6637 		case EINVAL:	/* caught above */
6638 			bad_error("lscf_import_instance_pgs", r);
6639 		}
6640 
6641 		ctx.sc_parent = imp_inst;
6642 		ctx.sc_service = 0;
6643 		ctx.sc_trans = NULL;
6644 		ctx.sc_flags = 0;
6645 		if (uu_list_walk(inst->sc_dependents, lscf_dependent_import,
6646 		    &ctx, UU_DEFAULT) != 0) {
6647 			if (uu_error() != UU_ERROR_CALLBACK_FAILED)
6648 				bad_error("uu_list_walk", uu_error());
6649 
6650 			if (ctx.sc_err == ECONNABORTED)
6651 				goto connaborted;
6652 			lcbdata->sc_err = ctx.sc_err;
6653 			r = UU_WALK_ERROR;
6654 			goto deltemp;
6655 		}
6656 
6657 		inst->sc_import_state = IMPORT_PROP_DONE;
6658 
6659 		if (g_verbose)
6660 			warn(gettext("Taking \"%s\" snapshot for %s.\n"),
6661 			    snap_initial, inst->sc_fmri);
6662 		r = take_snap(imp_inst, snap_initial, imp_snap);
6663 		switch (r) {
6664 		case 0:
6665 			break;
6666 
6667 		case ECONNABORTED:
6668 			goto connaborted;
6669 
6670 		case ENOSPC:
6671 		case -1:
6672 			lcbdata->sc_err = r;
6673 			r = UU_WALK_ERROR;
6674 			goto deltemp;
6675 
6676 		case ECANCELED:
6677 			warn(gettext("%s changed unexpectedly "
6678 			    "(instance %s deleted).\n"),
6679 			    inst->sc_parent->sc_fmri, inst->sc_name);
6680 			lcbdata->sc_err = r;
6681 			r = UU_WALK_ERROR;
6682 			goto deltemp;
6683 
6684 		case EPERM:
6685 			warn(emsg_snap_perm, snap_initial, inst->sc_fmri);
6686 			lcbdata->sc_err = r;
6687 			r = UU_WALK_ERROR;
6688 			goto deltemp;
6689 
6690 		default:
6691 			bad_error("take_snap", r);
6692 		}
6693 	}
6694 
6695 lionly:
6696 	if (lcbdata->sc_flags & SCI_NOSNAP)
6697 		goto deltemp;
6698 
6699 	/* transfer snapshot from temporary instance */
6700 	if (g_verbose)
6701 		warn(gettext("Taking \"%s\" snapshot for %s.\n"),
6702 		    snap_lastimport, inst->sc_fmri);
6703 	if (_scf_snapshot_attach(imp_tlisnap, imp_lisnap) != 0) {
6704 		switch (scf_error()) {
6705 		case SCF_ERROR_CONNECTION_BROKEN:
6706 			goto connaborted;
6707 
6708 		case SCF_ERROR_NO_RESOURCES:
6709 			r = stash_scferror(lcbdata);
6710 			goto deltemp;
6711 
6712 		case SCF_ERROR_PERMISSION_DENIED:
6713 			warn(gettext("Could not take \"%s\" snapshot for %s "
6714 			    "(permission denied).\n"), snap_lastimport,
6715 			    inst->sc_fmri);
6716 			r = stash_scferror(lcbdata);
6717 			goto deltemp;
6718 
6719 		case SCF_ERROR_NOT_SET:
6720 		case SCF_ERROR_HANDLE_MISMATCH:
6721 		default:
6722 			bad_error("_scf_snapshot_attach", scf_error());
6723 		}
6724 	}
6725 
6726 	inst->sc_import_state = IMPORT_COMPLETE;
6727 
6728 	r = UU_WALK_NEXT;
6729 
6730 deltemp:
6731 	/* delete temporary instance */
6732 	if (scf_instance_delete(imp_tinst) != 0) {
6733 		switch (scf_error()) {
6734 		case SCF_ERROR_DELETED:
6735 			break;
6736 
6737 		case SCF_ERROR_CONNECTION_BROKEN:
6738 			goto connaborted;
6739 
6740 		case SCF_ERROR_NOT_SET:
6741 		case SCF_ERROR_NOT_BOUND:
6742 		default:
6743 			bad_error("scf_instance_delete", scf_error());
6744 		}
6745 	}
6746 
6747 	return (r);
6748 
6749 connaborted:
6750 	warn(gettext("Could not delete svc:/%s:%s "
6751 	    "(repository connection broken).\n"), imp_tsname, inst->sc_name);
6752 	lcbdata->sc_err = ECONNABORTED;
6753 	return (UU_WALK_ERROR);
6754 }
6755 
6756 /*
6757  * When an instance is imported we end up telling configd about it. Once we tell
6758  * configd about these changes, startd eventually notices. If this is a new
6759  * instance, the manifest may not specify the SCF_PG_RESTARTER (restarter)
6760  * property group. However, many of the other tools expect that this property
6761  * group exists and has certain values.
6762  *
6763  * These values are added asynchronously by startd. We should not return from
6764  * this routine until we can verify that the property group we need is there.
6765  *
6766  * Before we go ahead and verify this, we have to ask ourselves an important
6767  * question: Is the early manifest service currently running?  Because if it is
6768  * running and it has invoked us, then the service will never get a restarter
6769  * property because svc.startd is blocked on EMI finishing before it lets itself
6770  * fully connect to svc.configd. Of course, this means that this race condition
6771  * is in fact impossible to 100% eliminate.
6772  *
6773  * svc.startd makes sure that EMI only runs once and has succeeded by checking
6774  * the state of the EMI instance. If it is online it bails out and makes sure
6775  * that it doesn't run again. In this case, we're going to do something similar,
6776  * only if the state is online, then we're going to actually verify. EMI always
6777  * has to be present, but it can be explicitly disabled to reduce the amount of
6778  * damage it can cause. If EMI has been disabled then we no longer have to worry
6779  * about the implicit race condition and can go ahead and check things. If EMI
6780  * is in some state that isn't online or disabled and isn't runinng, then we
6781  * assume that things are rather bad and we're not going to get in your way,
6782  * even if the rest of SMF does.
6783  *
6784  * Returns 0 on success or returns an errno.
6785  */
6786 #ifndef NATIVE_BUILD
6787 static int
6788 lscf_instance_verify(scf_scope_t *scope, entity_t *svc, entity_t *inst)
6789 {
6790 	int ret, err;
6791 	struct timespec ts;
6792 	char *emi_state;
6793 
6794 	/*
6795 	 * smf_get_state does not distinguish between its different failure
6796 	 * modes: memory allocation failures, SMF internal failures, and a lack
6797 	 * of EMI entirely because it's been removed. In these cases, we're
6798 	 * going to be conservative and opt to say that if we don't know, better
6799 	 * to not block import or falsely warn to the user.
6800 	 */
6801 	if ((emi_state = smf_get_state(SCF_INSTANCE_EMI)) == NULL) {
6802 		return (0);
6803 	}
6804 
6805 	/*
6806 	 * As per the block comment for this function check the state of EMI
6807 	 */
6808 	if (strcmp(emi_state, SCF_STATE_STRING_ONLINE) != 0 &&
6809 	    strcmp(emi_state, SCF_STATE_STRING_DISABLED) != 0) {
6810 		warn(gettext("Not validating instance %s:%s because EMI's "
6811 		    "state is %s\n"), svc->sc_name, inst->sc_name, emi_state);
6812 		free(emi_state);
6813 		return (0);
6814 	}
6815 
6816 	free(emi_state);
6817 
6818 	/*
6819 	 * First we have to get the property.
6820 	 */
6821 	if ((ret = scf_scope_get_service(scope, svc->sc_name, imp_svc)) != 0) {
6822 		ret = scf_error();
6823 		warn(gettext("Failed to look up service: %s\n"), svc->sc_name);
6824 		return (ret);
6825 	}
6826 
6827 	/*
6828 	 * We should always be able to get the instance. It should already
6829 	 * exist because we just created it or got it. There probably is a
6830 	 * slim chance that someone may have come in and deleted it though from
6831 	 * under us.
6832 	 */
6833 	if ((ret = scf_service_get_instance(imp_svc, inst->sc_name, imp_inst))
6834 	    != 0) {
6835 		ret = scf_error();
6836 		warn(gettext("Failed to verify instance: %s\n"), inst->sc_name);
6837 		switch (ret) {
6838 		case SCF_ERROR_DELETED:
6839 			err = ENODEV;
6840 			break;
6841 		case SCF_ERROR_CONNECTION_BROKEN:
6842 			warn(gettext("Lost repository connection\n"));
6843 			err = ECONNABORTED;
6844 			break;
6845 		case SCF_ERROR_NOT_FOUND:
6846 			warn(gettext("Instance \"%s\" disappeared out from "
6847 			    "under us.\n"), inst->sc_name);
6848 			err = ENOENT;
6849 			break;
6850 		default:
6851 			bad_error("scf_service_get_instance", ret);
6852 		}
6853 
6854 		return (err);
6855 	}
6856 
6857 	/*
6858 	 * An astute observer may want to use _scf_wait_pg which would notify us
6859 	 * of a property group change, unfortunately that does not work if the
6860 	 * property group in question does not exist. So instead we have to
6861 	 * manually poll and ask smf the best way to get to it.
6862 	 */
6863 	while ((ret = scf_instance_get_pg(imp_inst, SCF_PG_RESTARTER, imp_pg))
6864 	    != SCF_SUCCESS) {
6865 		ret = scf_error();
6866 		if (ret != SCF_ERROR_NOT_FOUND) {
6867 			warn(gettext("Failed to get restarter property "
6868 			    "group for instance: %s\n"), inst->sc_name);
6869 			switch (ret) {
6870 			case SCF_ERROR_DELETED:
6871 				err = ENODEV;
6872 				break;
6873 			case SCF_ERROR_CONNECTION_BROKEN:
6874 				warn(gettext("Lost repository connection\n"));
6875 				err = ECONNABORTED;
6876 				break;
6877 			default:
6878 				bad_error("scf_service_get_instance", ret);
6879 			}
6880 
6881 			return (err);
6882 		}
6883 
6884 		ts.tv_sec = pg_timeout / NANOSEC;
6885 		ts.tv_nsec = pg_timeout % NANOSEC;
6886 
6887 		(void) nanosleep(&ts, NULL);
6888 	}
6889 
6890 	/*
6891 	 * svcadm also expects that the SCF_PROPERTY_STATE property is present.
6892 	 * So in addition to the property group being present, we need to wait
6893 	 * for the property to be there in some form.
6894 	 *
6895 	 * Note that a property group is a frozen snapshot in time. To properly
6896 	 * get beyond this, you have to refresh the property group each time.
6897 	 */
6898 	while ((ret = scf_pg_get_property(imp_pg, SCF_PROPERTY_STATE,
6899 	    imp_prop)) != 0) {
6900 
6901 		ret = scf_error();
6902 		if (ret != SCF_ERROR_NOT_FOUND) {
6903 			warn(gettext("Failed to get property %s from the "
6904 			    "restarter property group of instance %s\n"),
6905 			    SCF_PROPERTY_STATE, inst->sc_name);
6906 			switch (ret) {
6907 			case SCF_ERROR_CONNECTION_BROKEN:
6908 				warn(gettext("Lost repository connection\n"));
6909 				err = ECONNABORTED;
6910 				break;
6911 			case SCF_ERROR_DELETED:
6912 				err = ENODEV;
6913 				break;
6914 			default:
6915 				bad_error("scf_pg_get_property", ret);
6916 			}
6917 
6918 			return (err);
6919 		}
6920 
6921 		ts.tv_sec = pg_timeout / NANOSEC;
6922 		ts.tv_nsec = pg_timeout % NANOSEC;
6923 
6924 		(void) nanosleep(&ts, NULL);
6925 
6926 		ret = scf_instance_get_pg(imp_inst, SCF_PG_RESTARTER, imp_pg);
6927 		if (ret != SCF_SUCCESS) {
6928 			warn(gettext("Failed to get restarter property "
6929 			    "group for instance: %s\n"), inst->sc_name);
6930 			switch (ret) {
6931 			case SCF_ERROR_DELETED:
6932 				err = ENODEV;
6933 				break;
6934 			case SCF_ERROR_CONNECTION_BROKEN:
6935 				warn(gettext("Lost repository connection\n"));
6936 				err = ECONNABORTED;
6937 				break;
6938 			default:
6939 				bad_error("scf_service_get_instance", ret);
6940 			}
6941 
6942 			return (err);
6943 		}
6944 	}
6945 
6946 	/*
6947 	 * We don't have to free the property groups or other values that we got
6948 	 * because we stored them in global variables that are allocated and
6949 	 * freed by the routines that call into these functions. Unless of
6950 	 * course the rest of the code here that we are basing this on is
6951 	 * mistaken.
6952 	 */
6953 	return (0);
6954 }
6955 #endif
6956 
6957 /*
6958  * If the service is missing, create it, import its properties, and import the
6959  * instances.  Since the service is brand new, it should be empty, and if we
6960  * run into any existing entities (SCF_ERROR_EXISTS), abort.
6961  *
6962  * If the service exists, we want to upgrade its properties and import the
6963  * instances.  Upgrade requires a last-import snapshot, though, which are
6964  * children of instances, so first we'll have to go through the instances
6965  * looking for a last-import snapshot.  If we don't find one then we'll just
6966  * override-import the service properties (but don't delete existing
6967  * properties: another service might have declared us as a dependent).  Before
6968  * we change anything, though, we want to take the previous snapshots.  We
6969  * also give lscf_instance_import() a leg up on taking last-import snapshots
6970  * by importing the manifest's service properties into a temporary service.
6971  *
6972  * On success, returns UU_WALK_NEXT.  On failure, returns UU_WALK_ERROR and
6973  * sets lcbdata->sc_err to
6974  *   ECONNABORTED - repository connection broken
6975  *   ENOMEM - out of memory
6976  *   ENOSPC - svc.configd is out of resources
6977  *   EPERM - couldn't create temporary service (error printed)
6978  *	   - couldn't import into temp service (error printed)
6979  *	   - couldn't create service (error printed)
6980  *	   - couldn't import dependent (error printed)
6981  *	   - couldn't take snapshot (error printed)
6982  *	   - couldn't create instance (error printed)
6983  *	   - couldn't create, modify, or delete pg (error printed)
6984  *	   - couldn't create, modify, or delete dependent (error printed)
6985  *	   - couldn't import instance (error printed)
6986  *   EROFS - couldn't create temporary service (repository read-only)
6987  *	   - couldn't import into temporary service (repository read-only)
6988  *	   - couldn't create service (repository read-only)
6989  *	   - couldn't import dependent (repository read-only)
6990  *	   - couldn't create instance (repository read-only)
6991  *	   - couldn't create, modify, or delete pg or dependent
6992  *	   - couldn't import instance (repository read-only)
6993  *   EACCES - couldn't create temporary service (backend access denied)
6994  *	    - couldn't import into temporary service (backend access denied)
6995  *	    - couldn't create service (backend access denied)
6996  *	    - couldn't import dependent (backend access denied)
6997  *	    - couldn't create instance (backend access denied)
6998  *	    - couldn't create, modify, or delete pg or dependent
6999  *	    - couldn't import instance (backend access denied)
7000  *   EINVAL - service name is invalid (error printed)
7001  *	    - service name is too long (error printed)
7002  *	    - s has invalid pgroup (error printed)
7003  *	    - s has invalid dependent (error printed)
7004  *	    - instance name is invalid (error printed)
7005  *	    - instance entity_t is invalid (error printed)
7006  *   EEXIST - couldn't create temporary service (already exists) (error printed)
7007  *	    - couldn't import dependent (dependency pg already exists) (printed)
7008  *	    - dependency collision in dependent service (error printed)
7009  *   EBUSY - temporary service deleted (error printed)
7010  *	   - property group added to temporary service (error printed)
7011  *	   - new property group changed or was deleted (error printed)
7012  *	   - service was added unexpectedly (error printed)
7013  *	   - service was deleted unexpectedly (error printed)
7014  *	   - property group added to new service (error printed)
7015  *	   - instance added unexpectedly (error printed)
7016  *	   - instance deleted unexpectedly (error printed)
7017  *	   - dependent service deleted unexpectedly (error printed)
7018  *	   - pg was added, changed, or deleted (error printed)
7019  *	   - dependent pg changed (error printed)
7020  *	   - temporary instance added, changed, or deleted (error printed)
7021  *   EBADF - a last-import snapshot is corrupt (error printed)
7022  *	   - the service is corrupt (error printed)
7023  *	   - a dependent is corrupt (error printed)
7024  *	   - an instance is corrupt (error printed)
7025  *	   - an instance has a corrupt last-import snapshot (error printed)
7026  *	   - dependent target has a corrupt snapshot (error printed)
7027  *   -1 - unknown libscf error (error printed)
7028  */
7029 static int
7030 lscf_service_import(void *v, void *pvt)
7031 {
7032 	entity_t *s = v;
7033 	scf_callback_t cbdata;
7034 	scf_callback_t *lcbdata = pvt;
7035 	scf_scope_t *scope = lcbdata->sc_parent;
7036 	entity_t *inst, linst;
7037 	int r;
7038 	int fresh = 0;
7039 	scf_snaplevel_t *running;
7040 	int have_ge = 0;
7041 	boolean_t retried = B_FALSE;
7042 
7043 	const char * const ts_deleted = gettext("Temporary service svc:/%s "
7044 	    "was deleted unexpectedly.\n");
7045 	const char * const ts_pg_added = gettext("Temporary service svc:/%s "
7046 	    "changed unexpectedly (property group added).\n");
7047 	const char * const s_deleted =
7048 	    gettext("%s was deleted unexpectedly.\n");
7049 	const char * const i_deleted =
7050 	    gettext("%s changed unexpectedly (instance \"%s\" deleted).\n");
7051 	const char * const badsnap = gettext("\"%s\" snapshot of svc:/%s:%s "
7052 	    "is corrupt (missing service snaplevel).\n");
7053 	const char * const s_mfile_upd =
7054 	    gettext("Unable to update the manifest file connection "
7055 	    "for %s\n");
7056 
7057 	li_only = 0;
7058 	/* Validate the service name */
7059 	if (scf_scope_get_service(scope, s->sc_name, imp_svc) != 0) {
7060 		switch (scf_error()) {
7061 		case SCF_ERROR_CONNECTION_BROKEN:
7062 			return (stash_scferror(lcbdata));
7063 
7064 		case SCF_ERROR_INVALID_ARGUMENT:
7065 			warn(gettext("\"%s\" is an invalid service name.  "
7066 			    "Cannot import.\n"), s->sc_name);
7067 			return (stash_scferror(lcbdata));
7068 
7069 		case SCF_ERROR_NOT_FOUND:
7070 			break;
7071 
7072 		case SCF_ERROR_HANDLE_MISMATCH:
7073 		case SCF_ERROR_NOT_BOUND:
7074 		case SCF_ERROR_NOT_SET:
7075 		default:
7076 			bad_error("scf_scope_get_service", scf_error());
7077 		}
7078 	}
7079 
7080 	/* create temporary service */
7081 	/*
7082 	 * the size of the buffer was reduced to max_scf_name_len to prevent
7083 	 * hitting bug 6681151.  After the bug fix, the size of the buffer
7084 	 * should be restored to its original value (max_scf_name_len +1)
7085 	 */
7086 	r = snprintf(imp_tsname, max_scf_name_len, "TEMP/%s", s->sc_name);
7087 	if (r < 0)
7088 		bad_error("snprintf", errno);
7089 	if (r > max_scf_name_len) {
7090 		warn(gettext(
7091 		    "Service name \"%s\" is too long.  Cannot import.\n"),
7092 		    s->sc_name);
7093 		lcbdata->sc_err = EINVAL;
7094 		return (UU_WALK_ERROR);
7095 	}
7096 
7097 retry:
7098 	if (scf_scope_add_service(imp_scope, imp_tsname, imp_tsvc) != 0) {
7099 		switch (scf_error()) {
7100 		case SCF_ERROR_CONNECTION_BROKEN:
7101 		case SCF_ERROR_NO_RESOURCES:
7102 		case SCF_ERROR_BACKEND_READONLY:
7103 		case SCF_ERROR_BACKEND_ACCESS:
7104 			return (stash_scferror(lcbdata));
7105 
7106 		case SCF_ERROR_EXISTS:
7107 			if (!retried) {
7108 				lscf_delete(imp_tsname, 0);
7109 				retried = B_TRUE;
7110 				goto retry;
7111 			}
7112 			warn(gettext(
7113 			    "Temporary service \"%s\" must be deleted before "
7114 			    "this manifest can be imported.\n"), imp_tsname);
7115 			return (stash_scferror(lcbdata));
7116 
7117 		case SCF_ERROR_PERMISSION_DENIED:
7118 			warn(gettext("Could not create temporary service "
7119 			    "\"%s\" (permission denied).\n"), imp_tsname);
7120 			return (stash_scferror(lcbdata));
7121 
7122 		case SCF_ERROR_INVALID_ARGUMENT:
7123 		case SCF_ERROR_HANDLE_MISMATCH:
7124 		case SCF_ERROR_NOT_BOUND:
7125 		case SCF_ERROR_NOT_SET:
7126 		default:
7127 			bad_error("scf_scope_add_service", scf_error());
7128 		}
7129 	}
7130 
7131 	r = snprintf(imp_str, imp_str_sz, "svc:/%s", imp_tsname);
7132 	if (r < 0)
7133 		bad_error("snprintf", errno);
7134 
7135 	cbdata.sc_handle = lcbdata->sc_handle;
7136 	cbdata.sc_parent = imp_tsvc;
7137 	cbdata.sc_service = 1;
7138 	cbdata.sc_source_fmri = s->sc_fmri;
7139 	cbdata.sc_target_fmri = imp_str;
7140 	cbdata.sc_flags = 0;
7141 
7142 	if (uu_list_walk(s->sc_pgroups, entity_pgroup_import, &cbdata,
7143 	    UU_DEFAULT) != 0) {
7144 		if (uu_error() != UU_ERROR_CALLBACK_FAILED)
7145 			bad_error("uu_list_walk", uu_error());
7146 
7147 		lcbdata->sc_err = cbdata.sc_err;
7148 		switch (cbdata.sc_err) {
7149 		case ECONNABORTED:
7150 			goto connaborted;
7151 
7152 		case ECANCELED:
7153 			warn(ts_deleted, imp_tsname);
7154 			lcbdata->sc_err = EBUSY;
7155 			return (UU_WALK_ERROR);
7156 
7157 		case EEXIST:
7158 			warn(ts_pg_added, imp_tsname);
7159 			lcbdata->sc_err = EBUSY;
7160 			return (UU_WALK_ERROR);
7161 		}
7162 
7163 		r = UU_WALK_ERROR;
7164 		goto deltemp;
7165 	}
7166 
7167 	if (uu_list_walk(s->sc_dependents, entity_pgroup_import, &cbdata,
7168 	    UU_DEFAULT) != 0) {
7169 		if (uu_error() != UU_ERROR_CALLBACK_FAILED)
7170 			bad_error("uu_list_walk", uu_error());
7171 
7172 		lcbdata->sc_err = cbdata.sc_err;
7173 		switch (cbdata.sc_err) {
7174 		case ECONNABORTED:
7175 			goto connaborted;
7176 
7177 		case ECANCELED:
7178 			warn(ts_deleted, imp_tsname);
7179 			lcbdata->sc_err = EBUSY;
7180 			return (UU_WALK_ERROR);
7181 
7182 		case EEXIST:
7183 			warn(ts_pg_added, imp_tsname);
7184 			lcbdata->sc_err = EBUSY;
7185 			return (UU_WALK_ERROR);
7186 		}
7187 
7188 		r = UU_WALK_ERROR;
7189 		goto deltemp;
7190 	}
7191 
7192 	if (scf_scope_get_service(scope, s->sc_name, imp_svc) != 0) {
7193 		switch (scf_error()) {
7194 		case SCF_ERROR_NOT_FOUND:
7195 			break;
7196 
7197 		case SCF_ERROR_CONNECTION_BROKEN:
7198 			goto connaborted;
7199 
7200 		case SCF_ERROR_INVALID_ARGUMENT:
7201 		case SCF_ERROR_HANDLE_MISMATCH:
7202 		case SCF_ERROR_NOT_BOUND:
7203 		case SCF_ERROR_NOT_SET:
7204 		default:
7205 			bad_error("scf_scope_get_service", scf_error());
7206 		}
7207 
7208 		if (scf_scope_add_service(scope, s->sc_name, imp_svc) != 0) {
7209 			switch (scf_error()) {
7210 			case SCF_ERROR_CONNECTION_BROKEN:
7211 				goto connaborted;
7212 
7213 			case SCF_ERROR_NO_RESOURCES:
7214 			case SCF_ERROR_BACKEND_READONLY:
7215 			case SCF_ERROR_BACKEND_ACCESS:
7216 				r = stash_scferror(lcbdata);
7217 				goto deltemp;
7218 
7219 			case SCF_ERROR_EXISTS:
7220 				warn(gettext("Scope \"%s\" changed unexpectedly"
7221 				    " (service \"%s\" added).\n"),
7222 				    SCF_SCOPE_LOCAL, s->sc_name);
7223 				lcbdata->sc_err = EBUSY;
7224 				goto deltemp;
7225 
7226 			case SCF_ERROR_PERMISSION_DENIED:
7227 				warn(gettext("Could not create service \"%s\" "
7228 				    "(permission denied).\n"), s->sc_name);
7229 				goto deltemp;
7230 
7231 			case SCF_ERROR_INVALID_ARGUMENT:
7232 			case SCF_ERROR_HANDLE_MISMATCH:
7233 			case SCF_ERROR_NOT_BOUND:
7234 			case SCF_ERROR_NOT_SET:
7235 			default:
7236 				bad_error("scf_scope_add_service", scf_error());
7237 			}
7238 		}
7239 
7240 		s->sc_import_state = IMPORT_PROP_BEGUN;
7241 
7242 		/* import service properties */
7243 		cbdata.sc_handle = lcbdata->sc_handle;
7244 		cbdata.sc_parent = imp_svc;
7245 		cbdata.sc_service = 1;
7246 		cbdata.sc_flags = lcbdata->sc_flags;
7247 		cbdata.sc_source_fmri = s->sc_fmri;
7248 		cbdata.sc_target_fmri = s->sc_fmri;
7249 
7250 		if (uu_list_walk(s->sc_pgroups, entity_pgroup_import,
7251 		    &cbdata, UU_DEFAULT) != 0) {
7252 			if (uu_error() != UU_ERROR_CALLBACK_FAILED)
7253 				bad_error("uu_list_walk", uu_error());
7254 
7255 			lcbdata->sc_err = cbdata.sc_err;
7256 			switch (cbdata.sc_err) {
7257 			case ECONNABORTED:
7258 				goto connaborted;
7259 
7260 			case ECANCELED:
7261 				warn(s_deleted, s->sc_fmri);
7262 				lcbdata->sc_err = EBUSY;
7263 				return (UU_WALK_ERROR);
7264 
7265 			case EEXIST:
7266 				warn(gettext("%s changed unexpectedly "
7267 				    "(property group added).\n"), s->sc_fmri);
7268 				lcbdata->sc_err = EBUSY;
7269 				return (UU_WALK_ERROR);
7270 
7271 			case EINVAL:
7272 				/* caught above */
7273 				bad_error("entity_pgroup_import",
7274 				    cbdata.sc_err);
7275 			}
7276 
7277 			r = UU_WALK_ERROR;
7278 			goto deltemp;
7279 		}
7280 
7281 		cbdata.sc_trans = NULL;
7282 		cbdata.sc_flags = 0;
7283 		if (uu_list_walk(s->sc_dependents, lscf_dependent_import,
7284 		    &cbdata, UU_DEFAULT) != 0) {
7285 			if (uu_error() != UU_ERROR_CALLBACK_FAILED)
7286 				bad_error("uu_list_walk", uu_error());
7287 
7288 			lcbdata->sc_err = cbdata.sc_err;
7289 			if (cbdata.sc_err == ECONNABORTED)
7290 				goto connaborted;
7291 			r = UU_WALK_ERROR;
7292 			goto deltemp;
7293 		}
7294 
7295 		s->sc_import_state = IMPORT_PROP_DONE;
7296 
7297 		/*
7298 		 * This is a new service, so we can't take previous snapshots
7299 		 * or upgrade service properties.
7300 		 */
7301 		fresh = 1;
7302 		goto instances;
7303 	}
7304 
7305 	/* Clear sc_seen for the instances. */
7306 	if (uu_list_walk(s->sc_u.sc_service.sc_service_instances, clear_int,
7307 	    (void *)offsetof(entity_t, sc_seen), UU_DEFAULT) != 0)
7308 		bad_error("uu_list_walk", uu_error());
7309 
7310 	/*
7311 	 * Take previous snapshots for all instances.  Even for ones not
7312 	 * mentioned in the bundle, since we might change their service
7313 	 * properties.
7314 	 */
7315 	if (scf_iter_service_instances(imp_iter, imp_svc) != 0) {
7316 		switch (scf_error()) {
7317 		case SCF_ERROR_CONNECTION_BROKEN:
7318 			goto connaborted;
7319 
7320 		case SCF_ERROR_DELETED:
7321 			warn(s_deleted, s->sc_fmri);
7322 			lcbdata->sc_err = EBUSY;
7323 			r = UU_WALK_ERROR;
7324 			goto deltemp;
7325 
7326 		case SCF_ERROR_HANDLE_MISMATCH:
7327 		case SCF_ERROR_NOT_BOUND:
7328 		case SCF_ERROR_NOT_SET:
7329 		default:
7330 			bad_error("scf_iter_service_instances", scf_error());
7331 		}
7332 	}
7333 
7334 	for (;;) {
7335 		r = scf_iter_next_instance(imp_iter, imp_inst);
7336 		if (r == 0)
7337 			break;
7338 		if (r != 1) {
7339 			switch (scf_error()) {
7340 			case SCF_ERROR_DELETED:
7341 				warn(s_deleted, s->sc_fmri);
7342 				lcbdata->sc_err = EBUSY;
7343 				r = UU_WALK_ERROR;
7344 				goto deltemp;
7345 
7346 			case SCF_ERROR_CONNECTION_BROKEN:
7347 				goto connaborted;
7348 
7349 			case SCF_ERROR_NOT_BOUND:
7350 			case SCF_ERROR_HANDLE_MISMATCH:
7351 			case SCF_ERROR_INVALID_ARGUMENT:
7352 			case SCF_ERROR_NOT_SET:
7353 			default:
7354 				bad_error("scf_iter_next_instance",
7355 				    scf_error());
7356 			}
7357 		}
7358 
7359 		if (scf_instance_get_name(imp_inst, imp_str, imp_str_sz) < 0) {
7360 			switch (scf_error()) {
7361 			case SCF_ERROR_DELETED:
7362 				continue;
7363 
7364 			case SCF_ERROR_CONNECTION_BROKEN:
7365 				goto connaborted;
7366 
7367 			case SCF_ERROR_NOT_SET:
7368 			case SCF_ERROR_NOT_BOUND:
7369 			default:
7370 				bad_error("scf_instance_get_name", scf_error());
7371 			}
7372 		}
7373 
7374 		if (g_verbose)
7375 			warn(gettext(
7376 			    "Taking \"%s\" snapshot for svc:/%s:%s.\n"),
7377 			    snap_previous, s->sc_name, imp_str);
7378 
7379 		r = take_snap(imp_inst, snap_previous, imp_snap);
7380 		switch (r) {
7381 		case 0:
7382 			break;
7383 
7384 		case ECANCELED:
7385 			continue;
7386 
7387 		case ECONNABORTED:
7388 			goto connaborted;
7389 
7390 		case EPERM:
7391 			warn(gettext("Could not take \"%s\" snapshot of "
7392 			    "svc:/%s:%s (permission denied).\n"),
7393 			    snap_previous, s->sc_name, imp_str);
7394 			lcbdata->sc_err = r;
7395 			return (UU_WALK_ERROR);
7396 
7397 		case ENOSPC:
7398 		case -1:
7399 			lcbdata->sc_err = r;
7400 			r = UU_WALK_ERROR;
7401 			goto deltemp;
7402 
7403 		default:
7404 			bad_error("take_snap", r);
7405 		}
7406 
7407 		linst.sc_name = imp_str;
7408 		inst = uu_list_find(s->sc_u.sc_service.sc_service_instances,
7409 		    &linst, NULL, NULL);
7410 		if (inst != NULL) {
7411 			inst->sc_import_state = IMPORT_PREVIOUS;
7412 			inst->sc_seen = 1;
7413 		}
7414 	}
7415 
7416 	/*
7417 	 * Create the new instances and take previous snapshots of
7418 	 * them.  This is not necessary, but it maximizes data preservation.
7419 	 */
7420 	for (inst = uu_list_first(s->sc_u.sc_service.sc_service_instances);
7421 	    inst != NULL;
7422 	    inst = uu_list_next(s->sc_u.sc_service.sc_service_instances,
7423 	    inst)) {
7424 		if (inst->sc_seen)
7425 			continue;
7426 
7427 		if (scf_service_add_instance(imp_svc, inst->sc_name,
7428 		    imp_inst) != 0) {
7429 			switch (scf_error()) {
7430 			case SCF_ERROR_CONNECTION_BROKEN:
7431 				goto connaborted;
7432 
7433 			case SCF_ERROR_BACKEND_READONLY:
7434 			case SCF_ERROR_BACKEND_ACCESS:
7435 			case SCF_ERROR_NO_RESOURCES:
7436 				r = stash_scferror(lcbdata);
7437 				goto deltemp;
7438 
7439 			case SCF_ERROR_EXISTS:
7440 				warn(gettext("%s changed unexpectedly "
7441 				    "(instance \"%s\" added).\n"), s->sc_fmri,
7442 				    inst->sc_name);
7443 				lcbdata->sc_err = EBUSY;
7444 				r = UU_WALK_ERROR;
7445 				goto deltemp;
7446 
7447 			case SCF_ERROR_INVALID_ARGUMENT:
7448 				warn(gettext("Service \"%s\" has instance with "
7449 				    "invalid name \"%s\".\n"), s->sc_name,
7450 				    inst->sc_name);
7451 				r = stash_scferror(lcbdata);
7452 				goto deltemp;
7453 
7454 			case SCF_ERROR_PERMISSION_DENIED:
7455 				warn(gettext("Could not create instance \"%s\" "
7456 				    "in %s (permission denied).\n"),
7457 				    inst->sc_name, s->sc_fmri);
7458 				r = stash_scferror(lcbdata);
7459 				goto deltemp;
7460 
7461 			case SCF_ERROR_HANDLE_MISMATCH:
7462 			case SCF_ERROR_NOT_BOUND:
7463 			case SCF_ERROR_NOT_SET:
7464 			default:
7465 				bad_error("scf_service_add_instance",
7466 				    scf_error());
7467 			}
7468 		}
7469 
7470 		if (g_verbose)
7471 			warn(gettext("Taking \"%s\" snapshot for "
7472 			    "new service %s.\n"), snap_previous, inst->sc_fmri);
7473 		r = take_snap(imp_inst, snap_previous, imp_snap);
7474 		switch (r) {
7475 		case 0:
7476 			break;
7477 
7478 		case ECANCELED:
7479 			warn(i_deleted, s->sc_fmri, inst->sc_name);
7480 			lcbdata->sc_err = EBUSY;
7481 			r = UU_WALK_ERROR;
7482 			goto deltemp;
7483 
7484 		case ECONNABORTED:
7485 			goto connaborted;
7486 
7487 		case EPERM:
7488 			warn(emsg_snap_perm, snap_previous, inst->sc_fmri);
7489 			lcbdata->sc_err = r;
7490 			r = UU_WALK_ERROR;
7491 			goto deltemp;
7492 
7493 		case ENOSPC:
7494 		case -1:
7495 			r = UU_WALK_ERROR;
7496 			goto deltemp;
7497 
7498 		default:
7499 			bad_error("take_snap", r);
7500 		}
7501 	}
7502 
7503 	s->sc_import_state = IMPORT_PREVIOUS;
7504 
7505 	/*
7506 	 * Upgrade service properties, if we can find a last-import snapshot.
7507 	 * Any will do because we don't support different service properties
7508 	 * in different manifests, so all snaplevels of the service in all of
7509 	 * the last-import snapshots of the instances should be the same.
7510 	 */
7511 	if (scf_iter_service_instances(imp_iter, imp_svc) != 0) {
7512 		switch (scf_error()) {
7513 		case SCF_ERROR_CONNECTION_BROKEN:
7514 			goto connaborted;
7515 
7516 		case SCF_ERROR_DELETED:
7517 			warn(s_deleted, s->sc_fmri);
7518 			lcbdata->sc_err = EBUSY;
7519 			r = UU_WALK_ERROR;
7520 			goto deltemp;
7521 
7522 		case SCF_ERROR_HANDLE_MISMATCH:
7523 		case SCF_ERROR_NOT_BOUND:
7524 		case SCF_ERROR_NOT_SET:
7525 		default:
7526 			bad_error("scf_iter_service_instances", scf_error());
7527 		}
7528 	}
7529 
7530 	for (;;) {
7531 		r = scf_iter_next_instance(imp_iter, imp_inst);
7532 		if (r == -1) {
7533 			switch (scf_error()) {
7534 			case SCF_ERROR_DELETED:
7535 				warn(s_deleted, s->sc_fmri);
7536 				lcbdata->sc_err = EBUSY;
7537 				r = UU_WALK_ERROR;
7538 				goto deltemp;
7539 
7540 			case SCF_ERROR_CONNECTION_BROKEN:
7541 				goto connaborted;
7542 
7543 			case SCF_ERROR_NOT_BOUND:
7544 			case SCF_ERROR_HANDLE_MISMATCH:
7545 			case SCF_ERROR_INVALID_ARGUMENT:
7546 			case SCF_ERROR_NOT_SET:
7547 			default:
7548 				bad_error("scf_iter_next_instance",
7549 				    scf_error());
7550 			}
7551 		}
7552 
7553 		if (r == 0) {
7554 			/*
7555 			 * Didn't find any last-import snapshots.  Override-
7556 			 * import the properties.  Unless one of the instances
7557 			 * has a general/enabled property, in which case we're
7558 			 * probably running a last-import-capable svccfg for
7559 			 * the first time, and we should only take the
7560 			 * last-import snapshot.
7561 			 */
7562 			if (have_ge) {
7563 				pgroup_t *mfpg;
7564 				scf_callback_t mfcbdata;
7565 
7566 				li_only = 1;
7567 				no_refresh = 1;
7568 				/*
7569 				 * Need to go ahead and import the manifestfiles
7570 				 * pg if it exists. If the last-import snapshot
7571 				 * upgrade code is ever removed this code can
7572 				 * be removed as well.
7573 				 */
7574 				mfpg = internal_pgroup_find(s,
7575 				    SCF_PG_MANIFESTFILES, SCF_GROUP_FRAMEWORK);
7576 
7577 				if (mfpg) {
7578 					mfcbdata.sc_handle = g_hndl;
7579 					mfcbdata.sc_parent = imp_svc;
7580 					mfcbdata.sc_service = 1;
7581 					mfcbdata.sc_flags = SCI_FORCE;
7582 					mfcbdata.sc_source_fmri = s->sc_fmri;
7583 					mfcbdata.sc_target_fmri = s->sc_fmri;
7584 					if (entity_pgroup_import(mfpg,
7585 					    &mfcbdata) != UU_WALK_NEXT) {
7586 						warn(s_mfile_upd, s->sc_fmri);
7587 						r = UU_WALK_ERROR;
7588 						goto deltemp;
7589 					}
7590 				}
7591 				break;
7592 			}
7593 
7594 			s->sc_import_state = IMPORT_PROP_BEGUN;
7595 
7596 			cbdata.sc_handle = g_hndl;
7597 			cbdata.sc_parent = imp_svc;
7598 			cbdata.sc_service = 1;
7599 			cbdata.sc_flags = SCI_FORCE;
7600 			cbdata.sc_source_fmri = s->sc_fmri;
7601 			cbdata.sc_target_fmri = s->sc_fmri;
7602 			if (uu_list_walk(s->sc_pgroups, entity_pgroup_import,
7603 			    &cbdata, UU_DEFAULT) != 0) {
7604 				if (uu_error() != UU_ERROR_CALLBACK_FAILED)
7605 					bad_error("uu_list_walk", uu_error());
7606 				lcbdata->sc_err = cbdata.sc_err;
7607 				switch (cbdata.sc_err) {
7608 				case ECONNABORTED:
7609 					goto connaborted;
7610 
7611 				case ECANCELED:
7612 					warn(s_deleted, s->sc_fmri);
7613 					lcbdata->sc_err = EBUSY;
7614 					break;
7615 
7616 				case EINVAL:	/* caught above */
7617 				case EEXIST:
7618 					bad_error("entity_pgroup_import",
7619 					    cbdata.sc_err);
7620 				}
7621 
7622 				r = UU_WALK_ERROR;
7623 				goto deltemp;
7624 			}
7625 
7626 			cbdata.sc_trans = NULL;
7627 			cbdata.sc_flags = 0;
7628 			if (uu_list_walk(s->sc_dependents,
7629 			    lscf_dependent_import, &cbdata, UU_DEFAULT) != 0) {
7630 				if (uu_error() != UU_ERROR_CALLBACK_FAILED)
7631 					bad_error("uu_list_walk", uu_error());
7632 				lcbdata->sc_err = cbdata.sc_err;
7633 				if (cbdata.sc_err == ECONNABORTED)
7634 					goto connaborted;
7635 				r = UU_WALK_ERROR;
7636 				goto deltemp;
7637 			}
7638 			break;
7639 		}
7640 
7641 		if (scf_instance_get_snapshot(imp_inst, snap_lastimport,
7642 		    imp_snap) != 0) {
7643 			switch (scf_error()) {
7644 			case SCF_ERROR_DELETED:
7645 				continue;
7646 
7647 			case SCF_ERROR_NOT_FOUND:
7648 				break;
7649 
7650 			case SCF_ERROR_CONNECTION_BROKEN:
7651 				goto connaborted;
7652 
7653 			case SCF_ERROR_HANDLE_MISMATCH:
7654 			case SCF_ERROR_NOT_BOUND:
7655 			case SCF_ERROR_INVALID_ARGUMENT:
7656 			case SCF_ERROR_NOT_SET:
7657 			default:
7658 				bad_error("scf_instance_get_snapshot",
7659 				    scf_error());
7660 			}
7661 
7662 			if (have_ge)
7663 				continue;
7664 
7665 			/*
7666 			 * Check for a general/enabled property.  This is how
7667 			 * we tell whether to import if there turn out to be
7668 			 * no last-import snapshots.
7669 			 */
7670 			if (scf_instance_get_pg(imp_inst, SCF_PG_GENERAL,
7671 			    imp_pg) == 0) {
7672 				if (scf_pg_get_property(imp_pg,
7673 				    SCF_PROPERTY_ENABLED, imp_prop) == 0) {
7674 					have_ge = 1;
7675 				} else {
7676 					switch (scf_error()) {
7677 					case SCF_ERROR_DELETED:
7678 					case SCF_ERROR_NOT_FOUND:
7679 						continue;
7680 
7681 					case SCF_ERROR_INVALID_ARGUMENT:
7682 					case SCF_ERROR_HANDLE_MISMATCH:
7683 					case SCF_ERROR_CONNECTION_BROKEN:
7684 					case SCF_ERROR_NOT_BOUND:
7685 					case SCF_ERROR_NOT_SET:
7686 					default:
7687 						bad_error("scf_pg_get_property",
7688 						    scf_error());
7689 					}
7690 				}
7691 			} else {
7692 				switch (scf_error()) {
7693 				case SCF_ERROR_DELETED:
7694 				case SCF_ERROR_NOT_FOUND:
7695 					continue;
7696 
7697 				case SCF_ERROR_CONNECTION_BROKEN:
7698 					goto connaborted;
7699 
7700 				case SCF_ERROR_NOT_BOUND:
7701 				case SCF_ERROR_NOT_SET:
7702 				case SCF_ERROR_INVALID_ARGUMENT:
7703 				case SCF_ERROR_HANDLE_MISMATCH:
7704 				default:
7705 					bad_error("scf_instance_get_pg",
7706 					    scf_error());
7707 				}
7708 			}
7709 			continue;
7710 		}
7711 
7712 		/* find service snaplevel */
7713 		r = get_snaplevel(imp_snap, 1, imp_snpl);
7714 		switch (r) {
7715 		case 0:
7716 			break;
7717 
7718 		case ECONNABORTED:
7719 			goto connaborted;
7720 
7721 		case ECANCELED:
7722 			continue;
7723 
7724 		case ENOENT:
7725 			if (scf_instance_get_name(imp_inst, imp_str,
7726 			    imp_str_sz) < 0)
7727 				(void) strcpy(imp_str, "?");
7728 			warn(badsnap, snap_lastimport, s->sc_name, imp_str);
7729 			lcbdata->sc_err = EBADF;
7730 			r = UU_WALK_ERROR;
7731 			goto deltemp;
7732 
7733 		default:
7734 			bad_error("get_snaplevel", r);
7735 		}
7736 
7737 		if (scf_instance_get_snapshot(imp_inst, snap_running,
7738 		    imp_rsnap) != 0) {
7739 			switch (scf_error()) {
7740 			case SCF_ERROR_DELETED:
7741 				continue;
7742 
7743 			case SCF_ERROR_NOT_FOUND:
7744 				break;
7745 
7746 			case SCF_ERROR_CONNECTION_BROKEN:
7747 				goto connaborted;
7748 
7749 			case SCF_ERROR_INVALID_ARGUMENT:
7750 			case SCF_ERROR_HANDLE_MISMATCH:
7751 			case SCF_ERROR_NOT_BOUND:
7752 			case SCF_ERROR_NOT_SET:
7753 			default:
7754 				bad_error("scf_instance_get_snapshot",
7755 				    scf_error());
7756 			}
7757 			running = NULL;
7758 		} else {
7759 			r = get_snaplevel(imp_rsnap, 1, imp_rsnpl);
7760 			switch (r) {
7761 			case 0:
7762 				running = imp_rsnpl;
7763 				break;
7764 
7765 			case ECONNABORTED:
7766 				goto connaborted;
7767 
7768 			case ECANCELED:
7769 				continue;
7770 
7771 			case ENOENT:
7772 				if (scf_instance_get_name(imp_inst, imp_str,
7773 				    imp_str_sz) < 0)
7774 					(void) strcpy(imp_str, "?");
7775 				warn(badsnap, snap_running, s->sc_name,
7776 				    imp_str);
7777 				lcbdata->sc_err = EBADF;
7778 				r = UU_WALK_ERROR;
7779 				goto deltemp;
7780 
7781 			default:
7782 				bad_error("get_snaplevel", r);
7783 			}
7784 		}
7785 
7786 		if (g_verbose) {
7787 			if (scf_instance_get_name(imp_inst, imp_str,
7788 			    imp_str_sz) < 0)
7789 				(void) strcpy(imp_str, "?");
7790 			warn(gettext("Upgrading properties of %s according to "
7791 			    "instance \"%s\".\n"), s->sc_fmri, imp_str);
7792 		}
7793 
7794 		/* upgrade service properties */
7795 		r = upgrade_props(imp_svc, running, imp_snpl, s);
7796 		if (r == 0)
7797 			break;
7798 
7799 		switch (r) {
7800 		case ECONNABORTED:
7801 			goto connaborted;
7802 
7803 		case ECANCELED:
7804 			warn(s_deleted, s->sc_fmri);
7805 			lcbdata->sc_err = EBUSY;
7806 			break;
7807 
7808 		case ENODEV:
7809 			if (scf_instance_get_name(imp_inst, imp_str,
7810 			    imp_str_sz) < 0)
7811 				(void) strcpy(imp_str, "?");
7812 			warn(i_deleted, s->sc_fmri, imp_str);
7813 			lcbdata->sc_err = EBUSY;
7814 			break;
7815 
7816 		default:
7817 			lcbdata->sc_err = r;
7818 		}
7819 
7820 		r = UU_WALK_ERROR;
7821 		goto deltemp;
7822 	}
7823 
7824 	s->sc_import_state = IMPORT_PROP_DONE;
7825 
7826 instances:
7827 	/* import instances */
7828 	cbdata.sc_handle = lcbdata->sc_handle;
7829 	cbdata.sc_parent = imp_svc;
7830 	cbdata.sc_service = 1;
7831 	cbdata.sc_flags = lcbdata->sc_flags | (fresh ? SCI_FRESH : 0);
7832 	cbdata.sc_general = NULL;
7833 
7834 	if (uu_list_walk(s->sc_u.sc_service.sc_service_instances,
7835 	    lscf_instance_import, &cbdata, UU_DEFAULT) != 0) {
7836 		if (uu_error() != UU_ERROR_CALLBACK_FAILED)
7837 			bad_error("uu_list_walk", uu_error());
7838 
7839 		lcbdata->sc_err = cbdata.sc_err;
7840 		if (cbdata.sc_err == ECONNABORTED)
7841 			goto connaborted;
7842 		r = UU_WALK_ERROR;
7843 		goto deltemp;
7844 	}
7845 
7846 	s->sc_import_state = IMPORT_COMPLETE;
7847 	r = UU_WALK_NEXT;
7848 
7849 deltemp:
7850 	/* delete temporary service */
7851 	if (scf_service_delete(imp_tsvc) != 0) {
7852 		switch (scf_error()) {
7853 		case SCF_ERROR_DELETED:
7854 			break;
7855 
7856 		case SCF_ERROR_CONNECTION_BROKEN:
7857 			goto connaborted;
7858 
7859 		case SCF_ERROR_EXISTS:
7860 			warn(gettext(
7861 			    "Could not delete svc:/%s (instances exist).\n"),
7862 			    imp_tsname);
7863 			break;
7864 
7865 		case SCF_ERROR_NOT_SET:
7866 		case SCF_ERROR_NOT_BOUND:
7867 		default:
7868 			bad_error("scf_service_delete", scf_error());
7869 		}
7870 	}
7871 
7872 	return (r);
7873 
7874 connaborted:
7875 	warn(gettext("Could not delete svc:/%s "
7876 	    "(repository connection broken).\n"), imp_tsname);
7877 	lcbdata->sc_err = ECONNABORTED;
7878 	return (UU_WALK_ERROR);
7879 }
7880 
7881 static const char *
7882 import_progress(int st)
7883 {
7884 	switch (st) {
7885 	case 0:
7886 		return (gettext("not reached."));
7887 
7888 	case IMPORT_PREVIOUS:
7889 		return (gettext("previous snapshot taken."));
7890 
7891 	case IMPORT_PROP_BEGUN:
7892 		return (gettext("some properties imported."));
7893 
7894 	case IMPORT_PROP_DONE:
7895 		return (gettext("properties imported."));
7896 
7897 	case IMPORT_COMPLETE:
7898 		return (gettext("imported."));
7899 
7900 	case IMPORT_REFRESHED:
7901 		return (gettext("refresh requested."));
7902 
7903 	default:
7904 #ifndef NDEBUG
7905 		(void) fprintf(stderr, "%s:%d: Unknown entity state %d.\n",
7906 		    __FILE__, __LINE__, st);
7907 #endif
7908 		abort();
7909 		/* NOTREACHED */
7910 	}
7911 }
7912 
7913 /*
7914  * Returns
7915  *   0 - success
7916  *     - fmri wasn't found (error printed)
7917  *     - entity was deleted (error printed)
7918  *     - backend denied access (error printed)
7919  *   ENOMEM - out of memory (error printed)
7920  *   ECONNABORTED - repository connection broken (error printed)
7921  *   EPERM - permission denied (error printed)
7922  *   -1 - unknown libscf error (error printed)
7923  */
7924 static int
7925 imp_refresh_fmri(const char *fmri, const char *name, const char *d_fmri)
7926 {
7927 	scf_error_t serr;
7928 	void *ent;
7929 	int issvc;
7930 	int r;
7931 
7932 	const char *deleted = gettext("Could not refresh %s (deleted).\n");
7933 	const char *dpt_deleted = gettext("Could not refresh %s "
7934 	    "(dependent \"%s\" of %s) (deleted).\n");
7935 
7936 	serr = fmri_to_entity(g_hndl, fmri, &ent, &issvc);
7937 	switch (serr) {
7938 	case SCF_ERROR_NONE:
7939 		break;
7940 
7941 	case SCF_ERROR_NO_MEMORY:
7942 		if (name == NULL)
7943 			warn(gettext("Could not refresh %s (out of memory).\n"),
7944 			    fmri);
7945 		else
7946 			warn(gettext("Could not refresh %s "
7947 			    "(dependent \"%s\" of %s) (out of memory).\n"),
7948 			    fmri, name, d_fmri);
7949 		return (ENOMEM);
7950 
7951 	case SCF_ERROR_NOT_FOUND:
7952 		if (name == NULL)
7953 			warn(deleted, fmri);
7954 		else
7955 			warn(dpt_deleted, fmri, name, d_fmri);
7956 		return (0);
7957 
7958 	case SCF_ERROR_INVALID_ARGUMENT:
7959 	case SCF_ERROR_CONSTRAINT_VIOLATED:
7960 	default:
7961 		bad_error("fmri_to_entity", serr);
7962 	}
7963 
7964 	r = refresh_entity(issvc, ent, fmri, imp_inst, imp_iter, imp_str);
7965 	switch (r) {
7966 	case 0:
7967 		break;
7968 
7969 	case ECONNABORTED:
7970 		if (name != NULL)
7971 			warn(gettext("Could not refresh %s "
7972 			    "(dependent \"%s\" of %s) "
7973 			    "(repository connection broken).\n"), fmri, name,
7974 			    d_fmri);
7975 		return (r);
7976 
7977 	case ECANCELED:
7978 		if (name == NULL)
7979 			warn(deleted, fmri);
7980 		else
7981 			warn(dpt_deleted, fmri, name, d_fmri);
7982 		return (0);
7983 
7984 	case EACCES:
7985 		if (!g_verbose)
7986 			return (0);
7987 		if (name == NULL)
7988 			warn(gettext("Could not refresh %s "
7989 			    "(backend access denied).\n"), fmri);
7990 		else
7991 			warn(gettext("Could not refresh %s "
7992 			    "(dependent \"%s\" of %s) "
7993 			    "(backend access denied).\n"), fmri, name, d_fmri);
7994 		return (0);
7995 
7996 	case EPERM:
7997 		if (name == NULL)
7998 			warn(gettext("Could not refresh %s "
7999 			    "(permission denied).\n"), fmri);
8000 		else
8001 			warn(gettext("Could not refresh %s "
8002 			    "(dependent \"%s\" of %s) "
8003 			    "(permission denied).\n"), fmri, name, d_fmri);
8004 		return (r);
8005 
8006 	case ENOSPC:
8007 		if (name == NULL)
8008 			warn(gettext("Could not refresh %s "
8009 			    "(repository server out of resources).\n"),
8010 			    fmri);
8011 		else
8012 			warn(gettext("Could not refresh %s "
8013 			    "(dependent \"%s\" of %s) "
8014 			    "(repository server out of resources).\n"),
8015 			    fmri, name, d_fmri);
8016 		return (r);
8017 
8018 	case -1:
8019 		scfwarn();
8020 		return (r);
8021 
8022 	default:
8023 		bad_error("refresh_entity", r);
8024 	}
8025 
8026 	if (issvc)
8027 		scf_service_destroy(ent);
8028 	else
8029 		scf_instance_destroy(ent);
8030 
8031 	return (0);
8032 }
8033 
8034 static int
8035 alloc_imp_globals()
8036 {
8037 	int r;
8038 
8039 	const char * const emsg_nomem = gettext("Out of memory.\n");
8040 	const char * const emsg_nores =
8041 	    gettext("svc.configd is out of resources.\n");
8042 
8043 	imp_str_sz = ((max_scf_name_len > max_scf_fmri_len) ?
8044 	    max_scf_name_len : max_scf_fmri_len) + 1;
8045 
8046 	if ((imp_scope = scf_scope_create(g_hndl)) == NULL ||
8047 	    (imp_svc = scf_service_create(g_hndl)) == NULL ||
8048 	    (imp_tsvc = scf_service_create(g_hndl)) == NULL ||
8049 	    (imp_inst = scf_instance_create(g_hndl)) == NULL ||
8050 	    (imp_tinst = scf_instance_create(g_hndl)) == NULL ||
8051 	    (imp_snap = scf_snapshot_create(g_hndl)) == NULL ||
8052 	    (imp_lisnap = scf_snapshot_create(g_hndl)) == NULL ||
8053 	    (imp_tlisnap = scf_snapshot_create(g_hndl)) == NULL ||
8054 	    (imp_rsnap = scf_snapshot_create(g_hndl)) == NULL ||
8055 	    (imp_snpl = scf_snaplevel_create(g_hndl)) == NULL ||
8056 	    (imp_rsnpl = scf_snaplevel_create(g_hndl)) == NULL ||
8057 	    (imp_pg = scf_pg_create(g_hndl)) == NULL ||
8058 	    (imp_pg2 = scf_pg_create(g_hndl)) == NULL ||
8059 	    (imp_prop = scf_property_create(g_hndl)) == NULL ||
8060 	    (imp_iter = scf_iter_create(g_hndl)) == NULL ||
8061 	    (imp_rpg_iter = scf_iter_create(g_hndl)) == NULL ||
8062 	    (imp_up_iter = scf_iter_create(g_hndl)) == NULL ||
8063 	    (imp_tx = scf_transaction_create(g_hndl)) == NULL ||
8064 	    (imp_str = malloc(imp_str_sz)) == NULL ||
8065 	    (imp_tsname = malloc(max_scf_name_len + 1)) == NULL ||
8066 	    (imp_fe1 = malloc(max_scf_fmri_len + 1)) == NULL ||
8067 	    (imp_fe2 = malloc(max_scf_fmri_len + 1)) == NULL ||
8068 	    (imp_deleted_dpts = uu_list_create(string_pool, NULL, 0)) == NULL ||
8069 	    (ud_inst = scf_instance_create(g_hndl)) == NULL ||
8070 	    (ud_snpl = scf_snaplevel_create(g_hndl)) == NULL ||
8071 	    (ud_pg = scf_pg_create(g_hndl)) == NULL ||
8072 	    (ud_cur_depts_pg = scf_pg_create(g_hndl)) == NULL ||
8073 	    (ud_run_dpts_pg = scf_pg_create(g_hndl)) == NULL ||
8074 	    (ud_prop = scf_property_create(g_hndl)) == NULL ||
8075 	    (ud_dpt_prop = scf_property_create(g_hndl)) == NULL ||
8076 	    (ud_val = scf_value_create(g_hndl)) == NULL ||
8077 	    (ud_iter = scf_iter_create(g_hndl)) == NULL ||
8078 	    (ud_iter2 = scf_iter_create(g_hndl)) == NULL ||
8079 	    (ud_tx = scf_transaction_create(g_hndl)) == NULL ||
8080 	    (ud_ctarg = malloc(max_scf_value_len + 1)) == NULL ||
8081 	    (ud_oldtarg = malloc(max_scf_value_len + 1)) == NULL ||
8082 	    (ud_name = malloc(max_scf_name_len + 1)) == NULL) {
8083 		if (scf_error() == SCF_ERROR_NO_RESOURCES)
8084 			warn(emsg_nores);
8085 		else
8086 			warn(emsg_nomem);
8087 
8088 		return (-1);
8089 	}
8090 
8091 	r = load_init();
8092 	switch (r) {
8093 	case 0:
8094 		break;
8095 
8096 	case ENOMEM:
8097 		warn(emsg_nomem);
8098 		return (-1);
8099 
8100 	default:
8101 		bad_error("load_init", r);
8102 	}
8103 
8104 	return (0);
8105 }
8106 
8107 static void
8108 free_imp_globals()
8109 {
8110 	pgroup_t *old_dpt;
8111 	void *cookie;
8112 
8113 	load_fini();
8114 
8115 	free(ud_ctarg);
8116 	free(ud_oldtarg);
8117 	free(ud_name);
8118 	ud_ctarg = ud_oldtarg = ud_name = NULL;
8119 
8120 	scf_transaction_destroy(ud_tx);
8121 	ud_tx = NULL;
8122 	scf_iter_destroy(ud_iter);
8123 	scf_iter_destroy(ud_iter2);
8124 	ud_iter = ud_iter2 = NULL;
8125 	scf_value_destroy(ud_val);
8126 	ud_val = NULL;
8127 	scf_property_destroy(ud_prop);
8128 	scf_property_destroy(ud_dpt_prop);
8129 	ud_prop = ud_dpt_prop = NULL;
8130 	scf_pg_destroy(ud_pg);
8131 	scf_pg_destroy(ud_cur_depts_pg);
8132 	scf_pg_destroy(ud_run_dpts_pg);
8133 	ud_pg = ud_cur_depts_pg = ud_run_dpts_pg = NULL;
8134 	scf_snaplevel_destroy(ud_snpl);
8135 	ud_snpl = NULL;
8136 	scf_instance_destroy(ud_inst);
8137 	ud_inst = NULL;
8138 
8139 	free(imp_str);
8140 	free(imp_tsname);
8141 	free(imp_fe1);
8142 	free(imp_fe2);
8143 	imp_str = imp_tsname = imp_fe1 = imp_fe2 = NULL;
8144 
8145 	cookie = NULL;
8146 	while ((old_dpt = uu_list_teardown(imp_deleted_dpts, &cookie)) !=
8147 	    NULL) {
8148 		free((char *)old_dpt->sc_pgroup_name);
8149 		free((char *)old_dpt->sc_pgroup_fmri);
8150 		internal_pgroup_free(old_dpt);
8151 	}
8152 	uu_list_destroy(imp_deleted_dpts);
8153 
8154 	scf_transaction_destroy(imp_tx);
8155 	imp_tx = NULL;
8156 	scf_iter_destroy(imp_iter);
8157 	scf_iter_destroy(imp_rpg_iter);
8158 	scf_iter_destroy(imp_up_iter);
8159 	imp_iter = imp_rpg_iter = imp_up_iter = NULL;
8160 	scf_property_destroy(imp_prop);
8161 	imp_prop = NULL;
8162 	scf_pg_destroy(imp_pg);
8163 	scf_pg_destroy(imp_pg2);
8164 	imp_pg = imp_pg2 = NULL;
8165 	scf_snaplevel_destroy(imp_snpl);
8166 	scf_snaplevel_destroy(imp_rsnpl);
8167 	imp_snpl = imp_rsnpl = NULL;
8168 	scf_snapshot_destroy(imp_snap);
8169 	scf_snapshot_destroy(imp_lisnap);
8170 	scf_snapshot_destroy(imp_tlisnap);
8171 	scf_snapshot_destroy(imp_rsnap);
8172 	imp_snap = imp_lisnap = imp_tlisnap = imp_rsnap = NULL;
8173 	scf_instance_destroy(imp_inst);
8174 	scf_instance_destroy(imp_tinst);
8175 	imp_inst = imp_tinst = NULL;
8176 	scf_service_destroy(imp_svc);
8177 	scf_service_destroy(imp_tsvc);
8178 	imp_svc = imp_tsvc = NULL;
8179 	scf_scope_destroy(imp_scope);
8180 	imp_scope = NULL;
8181 
8182 	load_fini();
8183 }
8184 
8185 int
8186 lscf_bundle_import(bundle_t *bndl, const char *filename, uint_t flags)
8187 {
8188 	scf_callback_t cbdata;
8189 	int result = 0;
8190 	entity_t *svc, *inst;
8191 	uu_list_t *insts;
8192 	int r;
8193 	pgroup_t *old_dpt;
8194 	int annotation_set = 0;
8195 
8196 	const char * const emsg_nomem = gettext("Out of memory.\n");
8197 	const char * const emsg_nores =
8198 	    gettext("svc.configd is out of resources.\n");
8199 
8200 	lscf_prep_hndl();
8201 
8202 	if (alloc_imp_globals())
8203 		goto out;
8204 
8205 	if (scf_handle_get_scope(g_hndl, SCF_SCOPE_LOCAL, imp_scope) != 0) {
8206 		switch (scf_error()) {
8207 		case SCF_ERROR_CONNECTION_BROKEN:
8208 			warn(gettext("Repository connection broken.\n"));
8209 			repository_teardown();
8210 			result = -1;
8211 			goto out;
8212 
8213 		case SCF_ERROR_NOT_FOUND:
8214 		case SCF_ERROR_INVALID_ARGUMENT:
8215 		case SCF_ERROR_NOT_BOUND:
8216 		case SCF_ERROR_HANDLE_MISMATCH:
8217 		default:
8218 			bad_error("scf_handle_get_scope", scf_error());
8219 		}
8220 	}
8221 
8222 	/* Set up the auditing annotation. */
8223 	if (_scf_set_annotation(g_hndl, "svccfg import", filename) == 0) {
8224 		annotation_set = 1;
8225 	} else {
8226 		switch (scf_error()) {
8227 		case SCF_ERROR_CONNECTION_BROKEN:
8228 			warn(gettext("Repository connection broken.\n"));
8229 			repository_teardown();
8230 			result = -1;
8231 			goto out;
8232 
8233 		case SCF_ERROR_INVALID_ARGUMENT:
8234 		case SCF_ERROR_NOT_BOUND:
8235 		case SCF_ERROR_NO_RESOURCES:
8236 		case SCF_ERROR_INTERNAL:
8237 			bad_error("_scf_set_annotation", scf_error());
8238 			/* NOTREACHED */
8239 
8240 		default:
8241 			/*
8242 			 * Do not terminate import because of inability to
8243 			 * generate annotation audit event.
8244 			 */
8245 			warn(gettext("_scf_set_annotation() unexpectedly "
8246 			    "failed with return code of %d\n"), scf_error());
8247 			break;
8248 		}
8249 	}
8250 
8251 	/*
8252 	 * Clear the sc_import_state's of all services & instances so we can
8253 	 * report how far we got if we fail.
8254 	 */
8255 	for (svc = uu_list_first(bndl->sc_bundle_services);
8256 	    svc != NULL;
8257 	    svc = uu_list_next(bndl->sc_bundle_services, svc)) {
8258 		svc->sc_import_state = 0;
8259 
8260 		if (uu_list_walk(svc->sc_u.sc_service.sc_service_instances,
8261 		    clear_int, (void *)offsetof(entity_t, sc_import_state),
8262 		    UU_DEFAULT) != 0)
8263 			bad_error("uu_list_walk", uu_error());
8264 	}
8265 
8266 	cbdata.sc_handle = g_hndl;
8267 	cbdata.sc_parent = imp_scope;
8268 	cbdata.sc_flags = flags;
8269 	cbdata.sc_general = NULL;
8270 
8271 	if (uu_list_walk(bndl->sc_bundle_services, lscf_service_import,
8272 	    &cbdata, UU_DEFAULT) == 0) {
8273 		char *eptr;
8274 		/* Success.  Refresh everything. */
8275 
8276 		if (flags & SCI_NOREFRESH || no_refresh) {
8277 			no_refresh = 0;
8278 			result = 0;
8279 			goto out;
8280 		}
8281 
8282 		for (svc = uu_list_first(bndl->sc_bundle_services);
8283 		    svc != NULL;
8284 		    svc = uu_list_next(bndl->sc_bundle_services, svc)) {
8285 			pgroup_t *dpt;
8286 
8287 			insts = svc->sc_u.sc_service.sc_service_instances;
8288 
8289 			for (inst = uu_list_first(insts);
8290 			    inst != NULL;
8291 			    inst = uu_list_next(insts, inst)) {
8292 				r = imp_refresh_fmri(inst->sc_fmri, NULL, NULL);
8293 				switch (r) {
8294 				case 0:
8295 					break;
8296 
8297 				case ENOMEM:
8298 				case ECONNABORTED:
8299 				case EPERM:
8300 				case -1:
8301 					goto progress;
8302 
8303 				default:
8304 					bad_error("imp_refresh_fmri", r);
8305 				}
8306 
8307 				inst->sc_import_state = IMPORT_REFRESHED;
8308 
8309 				for (dpt = uu_list_first(inst->sc_dependents);
8310 				    dpt != NULL;
8311 				    dpt = uu_list_next(inst->sc_dependents,
8312 				    dpt))
8313 					if (imp_refresh_fmri(
8314 					    dpt->sc_pgroup_fmri,
8315 					    dpt->sc_pgroup_name,
8316 					    inst->sc_fmri) != 0)
8317 						goto progress;
8318 			}
8319 
8320 			for (dpt = uu_list_first(svc->sc_dependents);
8321 			    dpt != NULL;
8322 			    dpt = uu_list_next(svc->sc_dependents, dpt))
8323 				if (imp_refresh_fmri(dpt->sc_pgroup_fmri,
8324 				    dpt->sc_pgroup_name, svc->sc_fmri) != 0)
8325 					goto progress;
8326 		}
8327 
8328 		for (old_dpt = uu_list_first(imp_deleted_dpts);
8329 		    old_dpt != NULL;
8330 		    old_dpt = uu_list_next(imp_deleted_dpts, old_dpt))
8331 			if (imp_refresh_fmri(old_dpt->sc_pgroup_fmri,
8332 			    old_dpt->sc_pgroup_name,
8333 			    old_dpt->sc_parent->sc_fmri) != 0)
8334 				goto progress;
8335 
8336 		result = 0;
8337 
8338 		/*
8339 		 * This snippet of code assumes that we are running svccfg as we
8340 		 * normally do -- witih svc.startd running. Of course, that is
8341 		 * not actually the case all the time because we also use a
8342 		 * varient of svc.configd and svccfg which are only meant to
8343 		 * run during the build process. During this time we have no
8344 		 * svc.startd, so this check would hang the build process.
8345 		 *
8346 		 * However, we've also given other consolidations, a bit of a
8347 		 * means to tie themselves into a knot. They're not properly
8348 		 * using the native build equivalents, but they've been getting
8349 		 * away with it anyways. Therefore, if we've found that
8350 		 * SVCCFG_REPOSITORY is set indicating that a separate configd
8351 		 * should be spun up, then we have to assume it's not using a
8352 		 * startd and we should not do this check.
8353 		 */
8354 #ifndef NATIVE_BUILD
8355 		/*
8356 		 * Verify that the restarter group is preset
8357 		 */
8358 		eptr = getenv("SVCCFG_REPOSITORY");
8359 		for (svc = uu_list_first(bndl->sc_bundle_services);
8360 		    svc != NULL && eptr == NULL;
8361 		    svc = uu_list_next(bndl->sc_bundle_services, svc)) {
8362 
8363 			insts = svc->sc_u.sc_service.sc_service_instances;
8364 
8365 			for (inst = uu_list_first(insts);
8366 			    inst != NULL;
8367 			    inst = uu_list_next(insts, inst)) {
8368 				if (lscf_instance_verify(imp_scope, svc,
8369 				    inst) != 0)
8370 					goto progress;
8371 			}
8372 		}
8373 #endif
8374 		goto out;
8375 
8376 	}
8377 
8378 	if (uu_error() != UU_ERROR_CALLBACK_FAILED)
8379 		bad_error("uu_list_walk", uu_error());
8380 
8381 printerr:
8382 	/* If the error hasn't been printed yet, do so here. */
8383 	switch (cbdata.sc_err) {
8384 	case ECONNABORTED:
8385 		warn(gettext("Repository connection broken.\n"));
8386 		break;
8387 
8388 	case ENOMEM:
8389 		warn(emsg_nomem);
8390 		break;
8391 
8392 	case ENOSPC:
8393 		warn(emsg_nores);
8394 		break;
8395 
8396 	case EROFS:
8397 		warn(gettext("Repository is read-only.\n"));
8398 		break;
8399 
8400 	case EACCES:
8401 		warn(gettext("Repository backend denied access.\n"));
8402 		break;
8403 
8404 	case EPERM:
8405 	case EINVAL:
8406 	case EEXIST:
8407 	case EBUSY:
8408 	case EBADF:
8409 	case -1:
8410 		break;
8411 
8412 	default:
8413 		bad_error("lscf_service_import", cbdata.sc_err);
8414 	}
8415 
8416 progress:
8417 	warn(gettext("Import of %s failed.  Progress:\n"), filename);
8418 
8419 	for (svc = uu_list_first(bndl->sc_bundle_services);
8420 	    svc != NULL;
8421 	    svc = uu_list_next(bndl->sc_bundle_services, svc)) {
8422 		insts = svc->sc_u.sc_service.sc_service_instances;
8423 
8424 		warn(gettext("  Service \"%s\": %s\n"), svc->sc_name,
8425 		    import_progress(svc->sc_import_state));
8426 
8427 		for (inst = uu_list_first(insts);
8428 		    inst != NULL;
8429 		    inst = uu_list_next(insts, inst))
8430 			warn(gettext("    Instance \"%s\": %s\n"),
8431 			    inst->sc_name,
8432 			    import_progress(inst->sc_import_state));
8433 	}
8434 
8435 	if (cbdata.sc_err == ECONNABORTED)
8436 		repository_teardown();
8437 
8438 
8439 	result = -1;
8440 
8441 out:
8442 	if (annotation_set != 0) {
8443 		/* Turn off annotation.  It is no longer needed. */
8444 		(void) _scf_set_annotation(g_hndl, NULL, NULL);
8445 	}
8446 
8447 	free_imp_globals();
8448 
8449 	return (result);
8450 }
8451 
8452 /*
8453  * _lscf_import_err() summarize the error handling returned by
8454  * lscf_import_{instance | service}_pgs
8455  * Return values are:
8456  * IMPORT_NEXT
8457  * IMPORT_OUT
8458  * IMPORT_BAD
8459  */
8460 
8461 #define	IMPORT_BAD	-1
8462 #define	IMPORT_NEXT	0
8463 #define	IMPORT_OUT	1
8464 
8465 static int
8466 _lscf_import_err(int err, const char *fmri)
8467 {
8468 	switch (err) {
8469 	case 0:
8470 		if (g_verbose)
8471 			warn(gettext("%s updated.\n"), fmri);
8472 		return (IMPORT_NEXT);
8473 
8474 	case ECONNABORTED:
8475 		warn(gettext("Could not update %s "
8476 		    "(repository connection broken).\n"), fmri);
8477 		return (IMPORT_OUT);
8478 
8479 	case ENOMEM:
8480 		warn(gettext("Could not update %s (out of memory).\n"), fmri);
8481 		return (IMPORT_OUT);
8482 
8483 	case ENOSPC:
8484 		warn(gettext("Could not update %s "
8485 		    "(repository server out of resources).\n"), fmri);
8486 		return (IMPORT_OUT);
8487 
8488 	case ECANCELED:
8489 		warn(gettext(
8490 		    "Could not update %s (deleted).\n"), fmri);
8491 		return (IMPORT_NEXT);
8492 
8493 	case EPERM:
8494 	case EINVAL:
8495 	case EBUSY:
8496 		return (IMPORT_NEXT);
8497 
8498 	case EROFS:
8499 		warn(gettext("Could not update %s (repository read-only).\n"),
8500 		    fmri);
8501 		return (IMPORT_OUT);
8502 
8503 	case EACCES:
8504 		warn(gettext("Could not update %s "
8505 		    "(backend access denied).\n"), fmri);
8506 		return (IMPORT_NEXT);
8507 
8508 	case EEXIST:
8509 	default:
8510 		return (IMPORT_BAD);
8511 	}
8512 
8513 	/*NOTREACHED*/
8514 }
8515 
8516 /*
8517  * The global imp_svc and imp_inst should be set by the caller in the
8518  * check to make sure the service and instance exist that the apply is
8519  * working on.
8520  */
8521 static int
8522 lscf_dependent_apply(void *dpg, void *e)
8523 {
8524 	scf_callback_t cb;
8525 	pgroup_t *dpt_pgroup = dpg;
8526 	pgroup_t *deldpt;
8527 	entity_t *ent = e;
8528 	int tissvc;
8529 	void *sc_ent, *tent;
8530 	scf_error_t serr;
8531 	int r;
8532 
8533 	const char * const dependents = "dependents";
8534 	const int issvc = (ent->sc_etype == SVCCFG_SERVICE_OBJECT);
8535 
8536 	if (issvc)
8537 		sc_ent = imp_svc;
8538 	else
8539 		sc_ent = imp_inst;
8540 
8541 	if (entity_get_running_pg(sc_ent, issvc, dependents, imp_pg,
8542 	    imp_iter, imp_tinst, imp_snap, imp_snpl) != 0 ||
8543 	    scf_pg_get_property(imp_pg, dpt_pgroup->sc_pgroup_name,
8544 	    imp_prop) != 0) {
8545 		switch (scf_error()) {
8546 		case SCF_ERROR_NOT_FOUND:
8547 		case SCF_ERROR_DELETED:
8548 			break;
8549 
8550 		case SCF_ERROR_CONNECTION_BROKEN:
8551 		case SCF_ERROR_NOT_SET:
8552 		case SCF_ERROR_INVALID_ARGUMENT:
8553 		case SCF_ERROR_HANDLE_MISMATCH:
8554 		case SCF_ERROR_NOT_BOUND:
8555 		default:
8556 			bad_error("entity_get_pg", scf_error());
8557 		}
8558 	} else {
8559 		/*
8560 		 * Found the dependents/<wip dep> so check to
8561 		 * see if the service is different.  If so
8562 		 * store the service for later refresh, and
8563 		 * delete the wip dependency from the service
8564 		 */
8565 		if (scf_property_get_value(imp_prop, ud_val) != 0) {
8566 			switch (scf_error()) {
8567 				case SCF_ERROR_DELETED:
8568 					break;
8569 
8570 				case SCF_ERROR_CONNECTION_BROKEN:
8571 				case SCF_ERROR_NOT_SET:
8572 				case SCF_ERROR_INVALID_ARGUMENT:
8573 				case SCF_ERROR_HANDLE_MISMATCH:
8574 				case SCF_ERROR_NOT_BOUND:
8575 				default:
8576 					bad_error("scf_property_get_value",
8577 					    scf_error());
8578 			}
8579 		}
8580 
8581 		if (scf_value_get_as_string(ud_val, ud_oldtarg,
8582 		    max_scf_value_len + 1) < 0)
8583 			bad_error("scf_value_get_as_string", scf_error());
8584 
8585 		r = fmri_equal(dpt_pgroup->sc_pgroup_fmri, ud_oldtarg);
8586 		switch (r) {
8587 		case 1:
8588 			break;
8589 		case 0:
8590 			if ((serr = fmri_to_entity(g_hndl, ud_oldtarg, &tent,
8591 			    &tissvc)) != SCF_ERROR_NONE) {
8592 				if (serr == SCF_ERROR_NOT_FOUND) {
8593 					break;
8594 				} else {
8595 					bad_error("fmri_to_entity", serr);
8596 				}
8597 			}
8598 
8599 			if (entity_get_pg(tent, tissvc,
8600 			    dpt_pgroup->sc_pgroup_name, imp_pg) != 0) {
8601 				serr = scf_error();
8602 				if (serr == SCF_ERROR_NOT_FOUND ||
8603 				    serr == SCF_ERROR_DELETED) {
8604 					break;
8605 				} else {
8606 					bad_error("entity_get_pg", scf_error());
8607 				}
8608 			}
8609 
8610 			if (scf_pg_delete(imp_pg) != 0) {
8611 				serr = scf_error();
8612 				if (serr == SCF_ERROR_NOT_FOUND ||
8613 				    serr == SCF_ERROR_DELETED) {
8614 					break;
8615 				} else {
8616 					bad_error("scf_pg_delete", scf_error());
8617 				}
8618 			}
8619 
8620 			deldpt = internal_pgroup_new();
8621 			if (deldpt == NULL)
8622 				return (ENOMEM);
8623 			deldpt->sc_pgroup_name =
8624 			    strdup(dpt_pgroup->sc_pgroup_name);
8625 			deldpt->sc_pgroup_fmri = strdup(ud_oldtarg);
8626 			if (deldpt->sc_pgroup_name == NULL ||
8627 			    deldpt->sc_pgroup_fmri == NULL)
8628 				return (ENOMEM);
8629 			deldpt->sc_parent = (entity_t *)ent;
8630 			if (uu_list_insert_after(imp_deleted_dpts, NULL,
8631 			    deldpt) != 0)
8632 				uu_die(gettext("libuutil error: %s\n"),
8633 				    uu_strerror(uu_error()));
8634 
8635 			break;
8636 		default:
8637 			bad_error("fmri_equal", r);
8638 		}
8639 	}
8640 
8641 	cb.sc_handle = g_hndl;
8642 	cb.sc_parent = ent;
8643 	cb.sc_service = ent->sc_etype == SVCCFG_SERVICE_OBJECT;
8644 	cb.sc_source_fmri = ent->sc_fmri;
8645 	cb.sc_target_fmri = ent->sc_fmri;
8646 	cb.sc_trans = NULL;
8647 	cb.sc_flags = SCI_FORCE;
8648 
8649 	if (lscf_dependent_import(dpt_pgroup, &cb) != UU_WALK_NEXT)
8650 		return (UU_WALK_ERROR);
8651 
8652 	r = imp_refresh_fmri(dpt_pgroup->sc_pgroup_fmri, NULL, NULL);
8653 	switch (r) {
8654 	case 0:
8655 		break;
8656 
8657 	case ENOMEM:
8658 	case ECONNABORTED:
8659 	case EPERM:
8660 	case -1:
8661 		warn(gettext("Unable to refresh \"%s\"\n"),
8662 		    dpt_pgroup->sc_pgroup_fmri);
8663 		return (UU_WALK_ERROR);
8664 
8665 	default:
8666 		bad_error("imp_refresh_fmri", r);
8667 	}
8668 
8669 	return (UU_WALK_NEXT);
8670 }
8671 
8672 /*
8673  * Returns
8674  *   0 - success
8675  *   -1 - lscf_import_instance_pgs() failed.
8676  */
8677 int
8678 lscf_bundle_apply(bundle_t *bndl, const char *file)
8679 {
8680 	pgroup_t *old_dpt;
8681 	entity_t *svc, *inst;
8682 	int annotation_set = 0;
8683 	int ret = 0;
8684 	int r = 0;
8685 
8686 	lscf_prep_hndl();
8687 
8688 	if ((ret = alloc_imp_globals()))
8689 		goto out;
8690 
8691 	if (scf_handle_get_scope(g_hndl, SCF_SCOPE_LOCAL, imp_scope) != 0)
8692 		scfdie();
8693 
8694 	/*
8695 	 * Set the strings to be used for the security audit annotation
8696 	 * event.
8697 	 */
8698 	if (_scf_set_annotation(g_hndl, "svccfg apply", file) == 0) {
8699 		annotation_set = 1;
8700 	} else {
8701 		switch (scf_error()) {
8702 		case SCF_ERROR_CONNECTION_BROKEN:
8703 			warn(gettext("Repository connection broken.\n"));
8704 			goto out;
8705 
8706 		case SCF_ERROR_INVALID_ARGUMENT:
8707 		case SCF_ERROR_NOT_BOUND:
8708 		case SCF_ERROR_NO_RESOURCES:
8709 		case SCF_ERROR_INTERNAL:
8710 			bad_error("_scf_set_annotation", scf_error());
8711 			/* NOTREACHED */
8712 
8713 		default:
8714 			/*
8715 			 * Do not abort apply operation because of
8716 			 * inability to create annotation audit event.
8717 			 */
8718 			warn(gettext("_scf_set_annotation() unexpectedly "
8719 			    "failed with return code of %d\n"), scf_error());
8720 			break;
8721 		}
8722 	}
8723 
8724 	for (svc = uu_list_first(bndl->sc_bundle_services);
8725 	    svc != NULL;
8726 	    svc = uu_list_next(bndl->sc_bundle_services, svc)) {
8727 		int refresh = 0;
8728 
8729 		if (scf_scope_get_service(imp_scope, svc->sc_name,
8730 		    imp_svc) != 0) {
8731 			switch (scf_error()) {
8732 			case SCF_ERROR_NOT_FOUND:
8733 				if (g_verbose)
8734 					warn(gettext("Ignoring nonexistent "
8735 					    "service %s.\n"), svc->sc_name);
8736 				continue;
8737 
8738 			default:
8739 				scfdie();
8740 			}
8741 		}
8742 
8743 		/*
8744 		 * If there were missing types in the profile, then need to
8745 		 * attempt to find the types.
8746 		 */
8747 		if (svc->sc_miss_type) {
8748 			if (uu_list_numnodes(svc->sc_pgroups) &&
8749 			    uu_list_walk(svc->sc_pgroups, find_current_pg_type,
8750 			    svc, UU_DEFAULT) != 0) {
8751 				if (uu_error() != UU_ERROR_CALLBACK_FAILED)
8752 					bad_error("uu_list_walk", uu_error());
8753 
8754 				ret = -1;
8755 				continue;
8756 			}
8757 
8758 			for (inst = uu_list_first(
8759 			    svc->sc_u.sc_service.sc_service_instances);
8760 			    inst != NULL;
8761 			    inst = uu_list_next(
8762 			    svc->sc_u.sc_service.sc_service_instances, inst)) {
8763 				/*
8764 				 * If the instance doesn't exist just
8765 				 * skip to the next instance and let the
8766 				 * import note the missing instance.
8767 				 */
8768 				if (scf_service_get_instance(imp_svc,
8769 				    inst->sc_name, imp_inst) != 0)
8770 					continue;
8771 
8772 				if (uu_list_walk(inst->sc_pgroups,
8773 				    find_current_pg_type, inst,
8774 				    UU_DEFAULT) != 0) {
8775 					if (uu_error() !=
8776 					    UU_ERROR_CALLBACK_FAILED)
8777 						bad_error("uu_list_walk",
8778 						    uu_error());
8779 
8780 					ret = -1;
8781 					inst->sc_miss_type = B_TRUE;
8782 				}
8783 			}
8784 		}
8785 
8786 		/*
8787 		 * if we have pgs in the profile, we need to refresh ALL
8788 		 * instances of the service
8789 		 */
8790 		if (uu_list_numnodes(svc->sc_pgroups) != 0) {
8791 			refresh = 1;
8792 			r = lscf_import_service_pgs(imp_svc, svc->sc_fmri, svc,
8793 			    SCI_FORCE | SCI_KEEP);
8794 			switch (_lscf_import_err(r, svc->sc_fmri)) {
8795 			case IMPORT_NEXT:
8796 				break;
8797 
8798 			case IMPORT_OUT:
8799 				goto out;
8800 
8801 			case IMPORT_BAD:
8802 			default:
8803 				bad_error("lscf_import_service_pgs", r);
8804 			}
8805 		}
8806 
8807 		if (uu_list_numnodes(svc->sc_dependents) != 0) {
8808 			uu_list_walk(svc->sc_dependents,
8809 			    lscf_dependent_apply, svc, UU_DEFAULT);
8810 		}
8811 
8812 		for (inst = uu_list_first(
8813 		    svc->sc_u.sc_service.sc_service_instances);
8814 		    inst != NULL;
8815 		    inst = uu_list_next(
8816 		    svc->sc_u.sc_service.sc_service_instances, inst)) {
8817 			/*
8818 			 * This instance still has missing types
8819 			 * so skip it.
8820 			 */
8821 			if (inst->sc_miss_type) {
8822 				if (g_verbose)
8823 					warn(gettext("Ignoring instance "
8824 					    "%s:%s with missing types\n"),
8825 					    inst->sc_parent->sc_name,
8826 					    inst->sc_name);
8827 
8828 				continue;
8829 			}
8830 
8831 			if (scf_service_get_instance(imp_svc, inst->sc_name,
8832 			    imp_inst) != 0) {
8833 				switch (scf_error()) {
8834 				case SCF_ERROR_NOT_FOUND:
8835 					if (g_verbose)
8836 						warn(gettext("Ignoring "
8837 						    "nonexistant instance "
8838 						    "%s:%s.\n"),
8839 						    inst->sc_parent->sc_name,
8840 						    inst->sc_name);
8841 					continue;
8842 
8843 				default:
8844 					scfdie();
8845 				}
8846 			}
8847 
8848 			/*
8849 			 * If the instance does not have a general/enabled
8850 			 * property and no last-import snapshot then the
8851 			 * instance is not a fully installed instance and
8852 			 * should not have a profile applied to it.
8853 			 *
8854 			 * This could happen if a service/instance declares
8855 			 * a dependent on behalf of another service/instance.
8856 			 *
8857 			 */
8858 			if (scf_instance_get_snapshot(imp_inst, snap_lastimport,
8859 			    imp_snap) != 0) {
8860 				if (scf_instance_get_pg(imp_inst,
8861 				    SCF_PG_GENERAL, imp_pg) != 0 ||
8862 				    scf_pg_get_property(imp_pg,
8863 				    SCF_PROPERTY_ENABLED, imp_prop) != 0) {
8864 					if (g_verbose)
8865 						warn(gettext("Ignoreing "
8866 						    "partial instance "
8867 						    "%s:%s.\n"),
8868 						    inst->sc_parent->sc_name,
8869 						    inst->sc_name);
8870 					continue;
8871 				}
8872 			}
8873 
8874 			r = lscf_import_instance_pgs(imp_inst, inst->sc_fmri,
8875 			    inst, SCI_FORCE | SCI_KEEP);
8876 			switch (_lscf_import_err(r, inst->sc_fmri)) {
8877 			case IMPORT_NEXT:
8878 				break;
8879 
8880 			case IMPORT_OUT:
8881 				goto out;
8882 
8883 			case IMPORT_BAD:
8884 			default:
8885 				bad_error("lscf_import_instance_pgs", r);
8886 			}
8887 
8888 			if (uu_list_numnodes(inst->sc_dependents) != 0) {
8889 				uu_list_walk(inst->sc_dependents,
8890 				    lscf_dependent_apply, inst, UU_DEFAULT);
8891 			}
8892 
8893 			/* refresh only if there is no pgs in the service */
8894 			if (refresh == 0)
8895 				(void) refresh_entity(0, imp_inst,
8896 				    inst->sc_fmri, NULL, NULL, NULL);
8897 		}
8898 
8899 		if (refresh == 1) {
8900 			char *name_buf = safe_malloc(max_scf_name_len + 1);
8901 
8902 			(void) refresh_entity(1, imp_svc, svc->sc_name,
8903 			    imp_inst, imp_iter, name_buf);
8904 			free(name_buf);
8905 		}
8906 
8907 		for (old_dpt = uu_list_first(imp_deleted_dpts);
8908 		    old_dpt != NULL;
8909 		    old_dpt = uu_list_next(imp_deleted_dpts, old_dpt)) {
8910 			if (imp_refresh_fmri(old_dpt->sc_pgroup_fmri,
8911 			    old_dpt->sc_pgroup_name,
8912 			    old_dpt->sc_parent->sc_fmri) != 0) {
8913 				warn(gettext("Unable to refresh \"%s\"\n"),
8914 				    old_dpt->sc_pgroup_fmri);
8915 			}
8916 		}
8917 	}
8918 
8919 out:
8920 	if (annotation_set) {
8921 		/* Remove security audit annotation strings. */
8922 		(void) _scf_set_annotation(g_hndl, NULL, NULL);
8923 	}
8924 
8925 	free_imp_globals();
8926 	return (ret);
8927 }
8928 
8929 
8930 /*
8931  * Export.  These functions create and output an XML tree of a service
8932  * description from the repository.  This is largely the inverse of
8933  * lxml_get_bundle() in svccfg_xml.c, but with some kickers:
8934  *
8935  * - We must include any properties which are not represented specifically by
8936  *   a service manifest, e.g., properties created by an admin post-import.  To
8937  *   do so we'll iterate through all properties and deal with each
8938  *   apropriately.
8939  *
8940  * - Children of services and instances must must be in the order set by the
8941  *   DTD, but we iterate over the properties in undefined order.  The elements
8942  *   are not easily (or efficiently) sortable by name.  Since there's a fixed
8943  *   number of classes of them, however, we'll keep the classes separate and
8944  *   assemble them in order.
8945  */
8946 
8947 /*
8948  * Convenience function to handle xmlSetProp errors (and type casting).
8949  */
8950 static void
8951 safe_setprop(xmlNodePtr n, const char *name, const char *val)
8952 {
8953 	if (xmlSetProp(n, (const xmlChar *)name, (const xmlChar *)val) == NULL)
8954 		uu_die(gettext("Could not set XML property.\n"));
8955 }
8956 
8957 /*
8958  * Convenience function to set an XML attribute to the single value of an
8959  * astring property.  If the value happens to be the default, don't set the
8960  * attribute.  "dval" should be the default value supplied by the DTD, or
8961  * NULL for no default.
8962  */
8963 static int
8964 set_attr_from_prop_default(scf_property_t *prop, xmlNodePtr n,
8965     const char *name, const char *dval)
8966 {
8967 	scf_value_t *val;
8968 	ssize_t len;
8969 	char *str;
8970 
8971 	val = scf_value_create(g_hndl);
8972 	if (val == NULL)
8973 		scfdie();
8974 
8975 	if (prop_get_val(prop, val) != 0) {
8976 		scf_value_destroy(val);
8977 		return (-1);
8978 	}
8979 
8980 	len = scf_value_get_as_string(val, NULL, 0);
8981 	if (len < 0)
8982 		scfdie();
8983 
8984 	str = safe_malloc(len + 1);
8985 
8986 	if (scf_value_get_as_string(val, str, len + 1) < 0)
8987 		scfdie();
8988 
8989 	scf_value_destroy(val);
8990 
8991 	if (dval == NULL || strcmp(str, dval) != 0)
8992 		safe_setprop(n, name, str);
8993 
8994 	free(str);
8995 
8996 	return (0);
8997 }
8998 
8999 /*
9000  * As above, but the attribute is always set.
9001  */
9002 static int
9003 set_attr_from_prop(scf_property_t *prop, xmlNodePtr n, const char *name)
9004 {
9005 	return (set_attr_from_prop_default(prop, n, name, NULL));
9006 }
9007 
9008 /*
9009  * Dump the given document onto f, with "'s replaced by ''s.
9010  */
9011 static int
9012 write_service_bundle(xmlDocPtr doc, FILE *f)
9013 {
9014 	xmlChar *mem;
9015 	int sz, i;
9016 
9017 	mem = NULL;
9018 	xmlDocDumpFormatMemory(doc, &mem, &sz, 1);
9019 
9020 	if (mem == NULL) {
9021 		semerr(gettext("Could not dump XML tree.\n"));
9022 		return (-1);
9023 	}
9024 
9025 	/*
9026 	 * Fortunately libxml produces &quot; instead of ", so we can blindly
9027 	 * replace all " with '.  Cursed libxml2!  Why must you #ifdef out the
9028 	 * &apos; code?!
9029 	 */
9030 	for (i = 0; i < sz; ++i) {
9031 		char c = (char)mem[i];
9032 
9033 		if (c == '"')
9034 			(void) fputc('\'', f);
9035 		else if (c == '\'')
9036 			(void) fwrite("&apos;", sizeof ("&apos;") - 1, 1, f);
9037 		else
9038 			(void) fputc(c, f);
9039 	}
9040 
9041 	return (0);
9042 }
9043 
9044 /*
9045  * Create the DOM elements in elts necessary to (generically) represent prop
9046  * (i.e., a property or propval element).  If the name of the property is
9047  * known, it should be passed as name_arg.  Otherwise, pass NULL.
9048  */
9049 static void
9050 export_property(scf_property_t *prop, const char *name_arg,
9051     struct pg_elts *elts, int flags)
9052 {
9053 	const char *type;
9054 	scf_error_t err = 0;
9055 	xmlNodePtr pnode, lnode;
9056 	char *lnname;
9057 	int ret;
9058 
9059 	/* name */
9060 	if (name_arg != NULL) {
9061 		(void) strcpy(exp_str, name_arg);
9062 	} else {
9063 		if (scf_property_get_name(prop, exp_str, exp_str_sz) < 0)
9064 			scfdie();
9065 	}
9066 
9067 	/* type */
9068 	type = prop_to_typestr(prop);
9069 	if (type == NULL)
9070 		uu_die(gettext("Can't export property %s: unknown type.\n"),
9071 		    exp_str);
9072 
9073 	/* If we're exporting values, and there's just one, export it here. */
9074 	if (!(flags & SCE_ALL_VALUES))
9075 		goto empty;
9076 
9077 	if (scf_property_get_value(prop, exp_val) == SCF_SUCCESS) {
9078 		xmlNodePtr n;
9079 
9080 		/* Single value, so use propval */
9081 		n = xmlNewNode(NULL, (xmlChar *)"propval");
9082 		if (n == NULL)
9083 			uu_die(emsg_create_xml);
9084 
9085 		safe_setprop(n, name_attr, exp_str);
9086 		safe_setprop(n, type_attr, type);
9087 
9088 		if (scf_value_get_as_string(exp_val, exp_str, exp_str_sz) < 0)
9089 			scfdie();
9090 		safe_setprop(n, value_attr, exp_str);
9091 
9092 		if (elts->propvals == NULL)
9093 			elts->propvals = n;
9094 		else
9095 			(void) xmlAddSibling(elts->propvals, n);
9096 
9097 		return;
9098 	}
9099 
9100 	err = scf_error();
9101 
9102 	if (err == SCF_ERROR_PERMISSION_DENIED) {
9103 		semerr(emsg_permission_denied);
9104 		return;
9105 	}
9106 
9107 	if (err != SCF_ERROR_CONSTRAINT_VIOLATED &&
9108 	    err != SCF_ERROR_NOT_FOUND &&
9109 	    err != SCF_ERROR_PERMISSION_DENIED)
9110 		scfdie();
9111 
9112 empty:
9113 	/* Multiple (or no) values, so use property */
9114 	pnode = xmlNewNode(NULL, (xmlChar *)"property");
9115 	if (pnode == NULL)
9116 		uu_die(emsg_create_xml);
9117 
9118 	safe_setprop(pnode, name_attr, exp_str);
9119 	safe_setprop(pnode, type_attr, type);
9120 
9121 	if (err == SCF_ERROR_CONSTRAINT_VIOLATED) {
9122 		lnname = uu_msprintf("%s_list", type);
9123 		if (lnname == NULL)
9124 			uu_die(gettext("Could not create string"));
9125 
9126 		lnode = xmlNewChild(pnode, NULL, (xmlChar *)lnname, NULL);
9127 		if (lnode == NULL)
9128 			uu_die(emsg_create_xml);
9129 
9130 		uu_free(lnname);
9131 
9132 		if (scf_iter_property_values(exp_val_iter, prop) != SCF_SUCCESS)
9133 			scfdie();
9134 
9135 		while ((ret = scf_iter_next_value(exp_val_iter, exp_val)) ==
9136 		    1) {
9137 			xmlNodePtr vn;
9138 
9139 			vn = xmlNewChild(lnode, NULL, (xmlChar *)"value_node",
9140 			    NULL);
9141 			if (vn == NULL)
9142 				uu_die(emsg_create_xml);
9143 
9144 			if (scf_value_get_as_string(exp_val, exp_str,
9145 			    exp_str_sz) < 0)
9146 				scfdie();
9147 			safe_setprop(vn, value_attr, exp_str);
9148 		}
9149 		if (ret != 0)
9150 			scfdie();
9151 	}
9152 
9153 	if (elts->properties == NULL)
9154 		elts->properties = pnode;
9155 	else
9156 		(void) xmlAddSibling(elts->properties, pnode);
9157 }
9158 
9159 /*
9160  * Add a property_group element for this property group to elts.
9161  */
9162 static void
9163 export_pg(scf_propertygroup_t *pg, struct entity_elts *eelts, int flags)
9164 {
9165 	xmlNodePtr n;
9166 	struct pg_elts elts;
9167 	int ret;
9168 	boolean_t read_protected;
9169 
9170 	n = xmlNewNode(NULL, (xmlChar *)"property_group");
9171 
9172 	/* name */
9173 	if (scf_pg_get_name(pg, exp_str, max_scf_name_len + 1) < 0)
9174 		scfdie();
9175 	safe_setprop(n, name_attr, exp_str);
9176 
9177 	/* type */
9178 	if (scf_pg_get_type(pg, exp_str, exp_str_sz) < 0)
9179 		scfdie();
9180 	safe_setprop(n, type_attr, exp_str);
9181 
9182 	/* properties */
9183 	if (scf_iter_pg_properties(exp_prop_iter, pg) != SCF_SUCCESS)
9184 		scfdie();
9185 
9186 	(void) memset(&elts, 0, sizeof (elts));
9187 
9188 	/*
9189 	 * If this property group is not read protected, we always want to
9190 	 * output all the values.  Otherwise, we only output the values if the
9191 	 * caller set SCE_ALL_VALUES (i.e., the user gave us export/archive -a).
9192 	 */
9193 	if (_scf_pg_is_read_protected(pg, &read_protected) != SCF_SUCCESS)
9194 		scfdie();
9195 
9196 	if (!read_protected)
9197 		flags |= SCE_ALL_VALUES;
9198 
9199 	while ((ret = scf_iter_next_property(exp_prop_iter, exp_prop)) == 1) {
9200 		if (scf_property_get_name(exp_prop, exp_str, exp_str_sz) < 0)
9201 			scfdie();
9202 
9203 		if (strcmp(exp_str, SCF_PROPERTY_STABILITY) == 0) {
9204 			xmlNodePtr m;
9205 
9206 			m = xmlNewNode(NULL, (xmlChar *)"stability");
9207 			if (m == NULL)
9208 				uu_die(emsg_create_xml);
9209 
9210 			if (set_attr_from_prop(exp_prop, m, value_attr) == 0) {
9211 				elts.stability = m;
9212 				continue;
9213 			}
9214 
9215 			xmlFreeNode(m);
9216 		}
9217 
9218 		export_property(exp_prop, NULL, &elts, flags);
9219 	}
9220 	if (ret == -1)
9221 		scfdie();
9222 
9223 	(void) xmlAddChild(n, elts.stability);
9224 	(void) xmlAddChildList(n, elts.propvals);
9225 	(void) xmlAddChildList(n, elts.properties);
9226 
9227 	if (eelts->property_groups == NULL)
9228 		eelts->property_groups = n;
9229 	else
9230 		(void) xmlAddSibling(eelts->property_groups, n);
9231 }
9232 
9233 /*
9234  * Create an XML node representing the dependency described by the given
9235  * property group and put it in eelts.  Unless the dependency is not valid, in
9236  * which case create a generic property_group element which represents it and
9237  * put it in eelts.
9238  */
9239 static void
9240 export_dependency(scf_propertygroup_t *pg, struct entity_elts *eelts)
9241 {
9242 	xmlNodePtr n;
9243 	int err = 0, ret;
9244 	struct pg_elts elts;
9245 
9246 	n = xmlNewNode(NULL, (xmlChar *)"dependency");
9247 	if (n == NULL)
9248 		uu_die(emsg_create_xml);
9249 
9250 	/*
9251 	 * If the external flag is present, skip this dependency because it
9252 	 * should have been created by another manifest.
9253 	 */
9254 	if (scf_pg_get_property(pg, scf_property_external, exp_prop) == 0) {
9255 		if (prop_check_type(exp_prop, SCF_TYPE_BOOLEAN) == 0 &&
9256 		    prop_get_val(exp_prop, exp_val) == 0) {
9257 			uint8_t b;
9258 
9259 			if (scf_value_get_boolean(exp_val, &b) != SCF_SUCCESS)
9260 				scfdie();
9261 
9262 			if (b)
9263 				return;
9264 		}
9265 	} else if (scf_error() != SCF_ERROR_NOT_FOUND)
9266 		scfdie();
9267 
9268 	/* Get the required attributes. */
9269 
9270 	/* name */
9271 	if (scf_pg_get_name(pg, exp_str, max_scf_name_len + 1) < 0)
9272 		scfdie();
9273 	safe_setprop(n, name_attr, exp_str);
9274 
9275 	/* grouping */
9276 	if (pg_get_prop(pg, SCF_PROPERTY_GROUPING, exp_prop) != 0 ||
9277 	    set_attr_from_prop(exp_prop, n, "grouping") != 0)
9278 		err = 1;
9279 
9280 	/* restart_on */
9281 	if (pg_get_prop(pg, SCF_PROPERTY_RESTART_ON, exp_prop) != 0 ||
9282 	    set_attr_from_prop(exp_prop, n, "restart_on") != 0)
9283 		err = 1;
9284 
9285 	/* type */
9286 	if (pg_get_prop(pg, SCF_PROPERTY_TYPE, exp_prop) != 0 ||
9287 	    set_attr_from_prop(exp_prop, n, type_attr) != 0)
9288 		err = 1;
9289 
9290 	/*
9291 	 * entities: Not required, but if we create no children, it will be
9292 	 * created as empty on import, so fail if it's missing.
9293 	 */
9294 	if (pg_get_prop(pg, SCF_PROPERTY_ENTITIES, exp_prop) == 0 &&
9295 	    prop_check_type(exp_prop, SCF_TYPE_FMRI) == 0) {
9296 		scf_iter_t *eiter;
9297 		int ret2;
9298 
9299 		eiter = scf_iter_create(g_hndl);
9300 		if (eiter == NULL)
9301 			scfdie();
9302 
9303 		if (scf_iter_property_values(eiter, exp_prop) != SCF_SUCCESS)
9304 			scfdie();
9305 
9306 		while ((ret2 = scf_iter_next_value(eiter, exp_val)) == 1) {
9307 			xmlNodePtr ch;
9308 
9309 			if (scf_value_get_astring(exp_val, exp_str,
9310 			    exp_str_sz) < 0)
9311 				scfdie();
9312 
9313 			/*
9314 			 * service_fmri's must be first, so we can add them
9315 			 * here.
9316 			 */
9317 			ch = xmlNewChild(n, NULL, (xmlChar *)"service_fmri",
9318 			    NULL);
9319 			if (ch == NULL)
9320 				uu_die(emsg_create_xml);
9321 
9322 			safe_setprop(ch, value_attr, exp_str);
9323 		}
9324 		if (ret2 == -1)
9325 			scfdie();
9326 
9327 		scf_iter_destroy(eiter);
9328 	} else
9329 		err = 1;
9330 
9331 	if (err) {
9332 		xmlFreeNode(n);
9333 
9334 		export_pg(pg, eelts, SCE_ALL_VALUES);
9335 
9336 		return;
9337 	}
9338 
9339 	/* Iterate through the properties & handle each. */
9340 	if (scf_iter_pg_properties(exp_prop_iter, pg) != SCF_SUCCESS)
9341 		scfdie();
9342 
9343 	(void) memset(&elts, 0, sizeof (elts));
9344 
9345 	while ((ret = scf_iter_next_property(exp_prop_iter, exp_prop)) == 1) {
9346 		if (scf_property_get_name(exp_prop, exp_str, exp_str_sz) < 0)
9347 			scfdie();
9348 
9349 		if (strcmp(exp_str, SCF_PROPERTY_GROUPING) == 0 ||
9350 		    strcmp(exp_str, SCF_PROPERTY_RESTART_ON) == 0 ||
9351 		    strcmp(exp_str, SCF_PROPERTY_TYPE) == 0 ||
9352 		    strcmp(exp_str, SCF_PROPERTY_ENTITIES) == 0) {
9353 			continue;
9354 		} else if (strcmp(exp_str, SCF_PROPERTY_STABILITY) == 0) {
9355 			xmlNodePtr m;
9356 
9357 			m = xmlNewNode(NULL, (xmlChar *)"stability");
9358 			if (m == NULL)
9359 				uu_die(emsg_create_xml);
9360 
9361 			if (set_attr_from_prop(exp_prop, m, value_attr) == 0) {
9362 				elts.stability = m;
9363 				continue;
9364 			}
9365 
9366 			xmlFreeNode(m);
9367 		}
9368 
9369 		export_property(exp_prop, exp_str, &elts, SCE_ALL_VALUES);
9370 	}
9371 	if (ret == -1)
9372 		scfdie();
9373 
9374 	(void) xmlAddChild(n, elts.stability);
9375 	(void) xmlAddChildList(n, elts.propvals);
9376 	(void) xmlAddChildList(n, elts.properties);
9377 
9378 	if (eelts->dependencies == NULL)
9379 		eelts->dependencies = n;
9380 	else
9381 		(void) xmlAddSibling(eelts->dependencies, n);
9382 }
9383 
9384 static xmlNodePtr
9385 export_method_environment(scf_propertygroup_t *pg)
9386 {
9387 	xmlNodePtr env;
9388 	int ret;
9389 	int children = 0;
9390 
9391 	if (scf_pg_get_property(pg, SCF_PROPERTY_ENVIRONMENT, NULL) != 0)
9392 		return (NULL);
9393 
9394 	env = xmlNewNode(NULL, (xmlChar *)"method_environment");
9395 	if (env == NULL)
9396 		uu_die(emsg_create_xml);
9397 
9398 	if (pg_get_prop(pg, SCF_PROPERTY_ENVIRONMENT, exp_prop) != 0)
9399 		scfdie();
9400 
9401 	if (scf_iter_property_values(exp_val_iter, exp_prop) != SCF_SUCCESS)
9402 		scfdie();
9403 
9404 	while ((ret = scf_iter_next_value(exp_val_iter, exp_val)) == 1) {
9405 		xmlNodePtr ev;
9406 		char *cp;
9407 
9408 		if (scf_value_get_as_string(exp_val, exp_str, exp_str_sz) < 0)
9409 			scfdie();
9410 
9411 		if ((cp = strchr(exp_str, '=')) == NULL || cp == exp_str) {
9412 			warn(gettext("Invalid environment variable \"%s\".\n"),
9413 			    exp_str);
9414 			continue;
9415 		} else if (strncmp(exp_str, "SMF_", 4) == 0) {
9416 			warn(gettext("Invalid environment variable \"%s\"; "
9417 			    "\"SMF_\" prefix is reserved.\n"), exp_str);
9418 			continue;
9419 		}
9420 
9421 		*cp = '\0';
9422 		cp++;
9423 
9424 		ev = xmlNewChild(env, NULL, (xmlChar *)"envvar", NULL);
9425 		if (ev == NULL)
9426 			uu_die(emsg_create_xml);
9427 
9428 		safe_setprop(ev, name_attr, exp_str);
9429 		safe_setprop(ev, value_attr, cp);
9430 		children++;
9431 	}
9432 
9433 	if (ret != 0)
9434 		scfdie();
9435 
9436 	if (children == 0) {
9437 		xmlFreeNode(env);
9438 		return (NULL);
9439 	}
9440 
9441 	return (env);
9442 }
9443 
9444 /*
9445  * As above, but for a method property group.
9446  */
9447 static void
9448 export_method(scf_propertygroup_t *pg, struct entity_elts *eelts)
9449 {
9450 	xmlNodePtr n, env;
9451 	char *str;
9452 	int err = 0, nonenv, ret;
9453 	uint8_t use_profile;
9454 	struct pg_elts elts;
9455 	xmlNodePtr ctxt = NULL;
9456 
9457 	n = xmlNewNode(NULL, (xmlChar *)"exec_method");
9458 
9459 	/* Get the required attributes. */
9460 
9461 	/* name */
9462 	if (scf_pg_get_name(pg, exp_str, max_scf_name_len + 1) < 0)
9463 		scfdie();
9464 	safe_setprop(n, name_attr, exp_str);
9465 
9466 	/* type */
9467 	if (pg_get_prop(pg, SCF_PROPERTY_TYPE, exp_prop) != 0 ||
9468 	    set_attr_from_prop(exp_prop, n, type_attr) != 0)
9469 		err = 1;
9470 
9471 	/* exec */
9472 	if (pg_get_prop(pg, SCF_PROPERTY_EXEC, exp_prop) != 0 ||
9473 	    set_attr_from_prop(exp_prop, n, "exec") != 0)
9474 		err = 1;
9475 
9476 	/* timeout */
9477 	if (pg_get_prop(pg, SCF_PROPERTY_TIMEOUT, exp_prop) == 0 &&
9478 	    prop_check_type(exp_prop, SCF_TYPE_COUNT) == 0 &&
9479 	    prop_get_val(exp_prop, exp_val) == 0) {
9480 		uint64_t c;
9481 
9482 		if (scf_value_get_count(exp_val, &c) != SCF_SUCCESS)
9483 			scfdie();
9484 
9485 		str = uu_msprintf("%llu", c);
9486 		if (str == NULL)
9487 			uu_die(gettext("Could not create string"));
9488 
9489 		safe_setprop(n, "timeout_seconds", str);
9490 		free(str);
9491 	} else
9492 		err = 1;
9493 
9494 	if (err) {
9495 		xmlFreeNode(n);
9496 
9497 		export_pg(pg, eelts, SCE_ALL_VALUES);
9498 
9499 		return;
9500 	}
9501 
9502 
9503 	/*
9504 	 * If we're going to have a method_context child, we need to know
9505 	 * before we iterate through the properties.  Since method_context's
9506 	 * are optional, we don't want to complain about any properties
9507 	 * missing if none of them are there.  Thus we can't use the
9508 	 * convenience functions.
9509 	 */
9510 	nonenv =
9511 	    scf_pg_get_property(pg, SCF_PROPERTY_WORKING_DIRECTORY, NULL) ==
9512 	    SCF_SUCCESS ||
9513 	    scf_pg_get_property(pg, SCF_PROPERTY_PROJECT, NULL) ==
9514 	    SCF_SUCCESS ||
9515 	    scf_pg_get_property(pg, SCF_PROPERTY_RESOURCE_POOL, NULL) ==
9516 	    SCF_SUCCESS ||
9517 	    scf_pg_get_property(pg, SCF_PROPERTY_SECFLAGS, NULL) ==
9518 	    SCF_SUCCESS ||
9519 	    scf_pg_get_property(pg, SCF_PROPERTY_USE_PROFILE, NULL) ==
9520 	    SCF_SUCCESS;
9521 
9522 	if (nonenv) {
9523 		ctxt = xmlNewNode(NULL, (xmlChar *)"method_context");
9524 		if (ctxt == NULL)
9525 			uu_die(emsg_create_xml);
9526 
9527 		if (pg_get_prop(pg, SCF_PROPERTY_WORKING_DIRECTORY, exp_prop) ==
9528 		    0 &&
9529 		    set_attr_from_prop_default(exp_prop, ctxt,
9530 		    "working_directory", ":default") != 0)
9531 			err = 1;
9532 
9533 		if (pg_get_prop(pg, SCF_PROPERTY_PROJECT, exp_prop) == 0 &&
9534 		    set_attr_from_prop_default(exp_prop, ctxt, "project",
9535 		    ":default") != 0)
9536 			err = 1;
9537 
9538 		if (pg_get_prop(pg, SCF_PROPERTY_RESOURCE_POOL, exp_prop) ==
9539 		    0 &&
9540 		    set_attr_from_prop_default(exp_prop, ctxt,
9541 		    "resource_pool", ":default") != 0)
9542 			err = 1;
9543 
9544 		if (pg_get_prop(pg, SCF_PROPERTY_SECFLAGS, exp_prop) == 0 &&
9545 		    set_attr_from_prop_default(exp_prop, ctxt,
9546 		    "security_flags", ":default") != 0)
9547 			err = 1;
9548 
9549 		/*
9550 		 * We only want to complain about profile or credential
9551 		 * properties if we will use them.  To determine that we must
9552 		 * examine USE_PROFILE.
9553 		 */
9554 		if (pg_get_prop(pg, SCF_PROPERTY_USE_PROFILE, exp_prop) == 0 &&
9555 		    prop_check_type(exp_prop, SCF_TYPE_BOOLEAN) == 0 &&
9556 		    prop_get_val(exp_prop, exp_val) == 0) {
9557 			if (scf_value_get_boolean(exp_val, &use_profile) !=
9558 			    SCF_SUCCESS) {
9559 				scfdie();
9560 			}
9561 
9562 			if (use_profile) {
9563 				xmlNodePtr prof;
9564 
9565 				prof = xmlNewChild(ctxt, NULL,
9566 				    (xmlChar *)"method_profile", NULL);
9567 				if (prof == NULL)
9568 					uu_die(emsg_create_xml);
9569 
9570 				if (pg_get_prop(pg, SCF_PROPERTY_PROFILE,
9571 				    exp_prop) != 0 ||
9572 				    set_attr_from_prop(exp_prop, prof,
9573 				    name_attr) != 0)
9574 					err = 1;
9575 			} else {
9576 				xmlNodePtr cred;
9577 
9578 				cred = xmlNewChild(ctxt, NULL,
9579 				    (xmlChar *)"method_credential", NULL);
9580 				if (cred == NULL)
9581 					uu_die(emsg_create_xml);
9582 
9583 				if (pg_get_prop(pg, SCF_PROPERTY_USER,
9584 				    exp_prop) != 0 ||
9585 				    set_attr_from_prop(exp_prop, cred,
9586 				    "user") != 0) {
9587 					err = 1;
9588 				}
9589 
9590 				if (pg_get_prop(pg, SCF_PROPERTY_GROUP,
9591 				    exp_prop) == 0 &&
9592 				    set_attr_from_prop_default(exp_prop, cred,
9593 				    "group", ":default") != 0)
9594 					err = 1;
9595 
9596 				if (pg_get_prop(pg, SCF_PROPERTY_SUPP_GROUPS,
9597 				    exp_prop) == 0 &&
9598 				    set_attr_from_prop_default(exp_prop, cred,
9599 				    "supp_groups", ":default") != 0)
9600 					err = 1;
9601 
9602 				if (pg_get_prop(pg, SCF_PROPERTY_PRIVILEGES,
9603 				    exp_prop) == 0 &&
9604 				    set_attr_from_prop_default(exp_prop, cred,
9605 				    "privileges", ":default") != 0)
9606 					err = 1;
9607 
9608 				if (pg_get_prop(pg,
9609 				    SCF_PROPERTY_LIMIT_PRIVILEGES,
9610 				    exp_prop) == 0 &&
9611 				    set_attr_from_prop_default(exp_prop, cred,
9612 				    "limit_privileges", ":default") != 0)
9613 					err = 1;
9614 			}
9615 		}
9616 	}
9617 
9618 	if ((env = export_method_environment(pg)) != NULL) {
9619 		if (ctxt == NULL) {
9620 			ctxt = xmlNewNode(NULL, (xmlChar *)"method_context");
9621 			if (ctxt == NULL)
9622 				uu_die(emsg_create_xml);
9623 		}
9624 		(void) xmlAddChild(ctxt, env);
9625 	}
9626 
9627 	if (env != NULL || (nonenv && err == 0))
9628 		(void) xmlAddChild(n, ctxt);
9629 	else
9630 		xmlFreeNode(ctxt);
9631 
9632 	nonenv = (err == 0);
9633 
9634 	if (scf_iter_pg_properties(exp_prop_iter, pg) != SCF_SUCCESS)
9635 		scfdie();
9636 
9637 	(void) memset(&elts, 0, sizeof (elts));
9638 
9639 	while ((ret = scf_iter_next_property(exp_prop_iter, exp_prop)) == 1) {
9640 		if (scf_property_get_name(exp_prop, exp_str, exp_str_sz) < 0)
9641 			scfdie();
9642 
9643 		if (strcmp(exp_str, SCF_PROPERTY_TYPE) == 0 ||
9644 		    strcmp(exp_str, SCF_PROPERTY_EXEC) == 0 ||
9645 		    strcmp(exp_str, SCF_PROPERTY_TIMEOUT) == 0) {
9646 			continue;
9647 		} else if (strcmp(exp_str, SCF_PROPERTY_STABILITY) == 0) {
9648 			xmlNodePtr m;
9649 
9650 			m = xmlNewNode(NULL, (xmlChar *)"stability");
9651 			if (m == NULL)
9652 				uu_die(emsg_create_xml);
9653 
9654 			if (set_attr_from_prop(exp_prop, m, value_attr) == 0) {
9655 				elts.stability = m;
9656 				continue;
9657 			}
9658 
9659 			xmlFreeNode(m);
9660 		} else if (strcmp(exp_str, SCF_PROPERTY_WORKING_DIRECTORY) ==
9661 		    0 ||
9662 		    strcmp(exp_str, SCF_PROPERTY_PROJECT) == 0 ||
9663 		    strcmp(exp_str, SCF_PROPERTY_RESOURCE_POOL) == 0 ||
9664 		    strcmp(exp_str, SCF_PROPERTY_USE_PROFILE) == 0) {
9665 			if (nonenv)
9666 				continue;
9667 		} else if (strcmp(exp_str, SCF_PROPERTY_USER) == 0 ||
9668 		    strcmp(exp_str, SCF_PROPERTY_GROUP) == 0 ||
9669 		    strcmp(exp_str, SCF_PROPERTY_SUPP_GROUPS) == 0 ||
9670 		    strcmp(exp_str, SCF_PROPERTY_PRIVILEGES) == 0 ||
9671 		    strcmp(exp_str, SCF_PROPERTY_LIMIT_PRIVILEGES) == 0 ||
9672 		    strcmp(exp_str, SCF_PROPERTY_SECFLAGS) == 0) {
9673 			if (nonenv && !use_profile)
9674 				continue;
9675 		} else if (strcmp(exp_str, SCF_PROPERTY_PROFILE) == 0) {
9676 			if (nonenv && use_profile)
9677 				continue;
9678 		} else if (strcmp(exp_str, SCF_PROPERTY_ENVIRONMENT) == 0) {
9679 			if (env != NULL)
9680 				continue;
9681 		}
9682 
9683 		export_property(exp_prop, exp_str, &elts, SCE_ALL_VALUES);
9684 	}
9685 	if (ret == -1)
9686 		scfdie();
9687 
9688 	(void) xmlAddChild(n, elts.stability);
9689 	(void) xmlAddChildList(n, elts.propvals);
9690 	(void) xmlAddChildList(n, elts.properties);
9691 
9692 	if (eelts->exec_methods == NULL)
9693 		eelts->exec_methods = n;
9694 	else
9695 		(void) xmlAddSibling(eelts->exec_methods, n);
9696 }
9697 
9698 static void
9699 export_pg_elts(struct pg_elts *elts, const char *name, const char *type,
9700     struct entity_elts *eelts)
9701 {
9702 	xmlNodePtr pgnode;
9703 
9704 	pgnode = xmlNewNode(NULL, (xmlChar *)"property_group");
9705 	if (pgnode == NULL)
9706 		uu_die(emsg_create_xml);
9707 
9708 	safe_setprop(pgnode, name_attr, name);
9709 	safe_setprop(pgnode, type_attr, type);
9710 
9711 	(void) xmlAddChildList(pgnode, elts->propvals);
9712 	(void) xmlAddChildList(pgnode, elts->properties);
9713 
9714 	if (eelts->property_groups == NULL)
9715 		eelts->property_groups = pgnode;
9716 	else
9717 		(void) xmlAddSibling(eelts->property_groups, pgnode);
9718 }
9719 
9720 /*
9721  * Process the general property group for a service.  This is the one with the
9722  * goodies.
9723  */
9724 static void
9725 export_svc_general(scf_propertygroup_t *pg, struct entity_elts *selts)
9726 {
9727 	struct pg_elts elts;
9728 	int ret;
9729 
9730 	/*
9731 	 * In case there are properties which don't correspond to child
9732 	 * entities of the service entity, we'll set up a pg_elts structure to
9733 	 * put them in.
9734 	 */
9735 	(void) memset(&elts, 0, sizeof (elts));
9736 
9737 	/* Walk the properties, looking for special ones. */
9738 	if (scf_iter_pg_properties(exp_prop_iter, pg) != SCF_SUCCESS)
9739 		scfdie();
9740 
9741 	while ((ret = scf_iter_next_property(exp_prop_iter, exp_prop)) == 1) {
9742 		if (scf_property_get_name(exp_prop, exp_str, exp_str_sz) < 0)
9743 			scfdie();
9744 
9745 		if (strcmp(exp_str, SCF_PROPERTY_SINGLE_INSTANCE) == 0) {
9746 			if (prop_check_type(exp_prop, SCF_TYPE_BOOLEAN) == 0 &&
9747 			    prop_get_val(exp_prop, exp_val) == 0) {
9748 				uint8_t b;
9749 
9750 				if (scf_value_get_boolean(exp_val, &b) !=
9751 				    SCF_SUCCESS)
9752 					scfdie();
9753 
9754 				if (b) {
9755 					selts->single_instance =
9756 					    xmlNewNode(NULL,
9757 					    (xmlChar *)"single_instance");
9758 					if (selts->single_instance == NULL)
9759 						uu_die(emsg_create_xml);
9760 				}
9761 
9762 				continue;
9763 			}
9764 		} else if (strcmp(exp_str, SCF_PROPERTY_RESTARTER) == 0) {
9765 			xmlNodePtr rnode, sfnode;
9766 
9767 			rnode = xmlNewNode(NULL, (xmlChar *)"restarter");
9768 			if (rnode == NULL)
9769 				uu_die(emsg_create_xml);
9770 
9771 			sfnode = xmlNewChild(rnode, NULL,
9772 			    (xmlChar *)"service_fmri", NULL);
9773 			if (sfnode == NULL)
9774 				uu_die(emsg_create_xml);
9775 
9776 			if (set_attr_from_prop(exp_prop, sfnode,
9777 			    value_attr) == 0) {
9778 				selts->restarter = rnode;
9779 				continue;
9780 			}
9781 
9782 			xmlFreeNode(rnode);
9783 		} else if (strcmp(exp_str, SCF_PROPERTY_ENTITY_STABILITY) ==
9784 		    0) {
9785 			xmlNodePtr s;
9786 
9787 			s = xmlNewNode(NULL, (xmlChar *)"stability");
9788 			if (s == NULL)
9789 				uu_die(emsg_create_xml);
9790 
9791 			if (set_attr_from_prop(exp_prop, s, value_attr) == 0) {
9792 				selts->stability = s;
9793 				continue;
9794 			}
9795 
9796 			xmlFreeNode(s);
9797 		}
9798 
9799 		export_property(exp_prop, exp_str, &elts, SCE_ALL_VALUES);
9800 	}
9801 	if (ret == -1)
9802 		scfdie();
9803 
9804 	if (elts.propvals != NULL || elts.properties != NULL)
9805 		export_pg_elts(&elts, scf_pg_general, scf_group_framework,
9806 		    selts);
9807 }
9808 
9809 static void
9810 export_method_context(scf_propertygroup_t *pg, struct entity_elts *elts)
9811 {
9812 	xmlNodePtr n, prof, cred, env;
9813 	uint8_t use_profile;
9814 	int ret, err = 0;
9815 
9816 	n = xmlNewNode(NULL, (xmlChar *)"method_context");
9817 
9818 	env = export_method_environment(pg);
9819 
9820 	/* Need to know whether we'll use a profile or not. */
9821 	if (pg_get_prop(pg, SCF_PROPERTY_USE_PROFILE, exp_prop) == 0 &&
9822 	    prop_check_type(exp_prop, SCF_TYPE_BOOLEAN) == 0 &&
9823 	    prop_get_val(exp_prop, exp_val) == 0) {
9824 		if (scf_value_get_boolean(exp_val, &use_profile) != SCF_SUCCESS)
9825 			scfdie();
9826 
9827 		if (use_profile)
9828 			prof =
9829 			    xmlNewChild(n, NULL, (xmlChar *)"method_profile",
9830 			    NULL);
9831 		else
9832 			cred =
9833 			    xmlNewChild(n, NULL, (xmlChar *)"method_credential",
9834 			    NULL);
9835 	}
9836 
9837 	if (env != NULL)
9838 		(void) xmlAddChild(n, env);
9839 
9840 	if (scf_iter_pg_properties(exp_prop_iter, pg) != SCF_SUCCESS)
9841 		scfdie();
9842 
9843 	while ((ret = scf_iter_next_property(exp_prop_iter, exp_prop)) == 1) {
9844 		if (scf_property_get_name(exp_prop, exp_str, exp_str_sz) < 0)
9845 			scfdie();
9846 
9847 		if (strcmp(exp_str, SCF_PROPERTY_WORKING_DIRECTORY) == 0) {
9848 			if (set_attr_from_prop(exp_prop, n,
9849 			    "working_directory") != 0)
9850 				err = 1;
9851 		} else if (strcmp(exp_str, SCF_PROPERTY_PROJECT) == 0) {
9852 			if (set_attr_from_prop(exp_prop, n, "project") != 0)
9853 				err = 1;
9854 		} else if (strcmp(exp_str, SCF_PROPERTY_RESOURCE_POOL) == 0) {
9855 			if (set_attr_from_prop(exp_prop, n,
9856 			    "resource_pool") != 0)
9857 				err = 1;
9858 		} else if (strcmp(exp_str, SCF_PROPERTY_SECFLAGS) == 0) {
9859 			if (set_attr_from_prop(exp_prop, n,
9860 			    "security_flags") != 0)
9861 				err = 1;
9862 		} else if (strcmp(exp_str, SCF_PROPERTY_USE_PROFILE) == 0) {
9863 			/* EMPTY */
9864 		} else if (strcmp(exp_str, SCF_PROPERTY_USER) == 0) {
9865 			if (use_profile ||
9866 			    set_attr_from_prop(exp_prop, cred, "user") != 0)
9867 				err = 1;
9868 		} else if (strcmp(exp_str, SCF_PROPERTY_GROUP) == 0) {
9869 			if (use_profile ||
9870 			    set_attr_from_prop(exp_prop, cred, "group") != 0)
9871 				err = 1;
9872 		} else if (strcmp(exp_str, SCF_PROPERTY_SUPP_GROUPS) == 0) {
9873 			if (use_profile || set_attr_from_prop(exp_prop, cred,
9874 			    "supp_groups") != 0)
9875 				err = 1;
9876 		} else if (strcmp(exp_str, SCF_PROPERTY_PRIVILEGES) == 0) {
9877 			if (use_profile || set_attr_from_prop(exp_prop, cred,
9878 			    "privileges") != 0)
9879 				err = 1;
9880 		} else if (strcmp(exp_str, SCF_PROPERTY_LIMIT_PRIVILEGES) ==
9881 		    0) {
9882 			if (use_profile || set_attr_from_prop(exp_prop, cred,
9883 			    "limit_privileges") != 0)
9884 				err = 1;
9885 		} else if (strcmp(exp_str, SCF_PROPERTY_PROFILE) == 0) {
9886 			if (!use_profile || set_attr_from_prop(exp_prop,
9887 			    prof, name_attr) != 0)
9888 				err = 1;
9889 		} else {
9890 			/* Can't have generic properties in method_context's */
9891 			err = 1;
9892 		}
9893 	}
9894 	if (ret == -1)
9895 		scfdie();
9896 
9897 	if (err && env == NULL) {
9898 		xmlFreeNode(n);
9899 		export_pg(pg, elts, SCE_ALL_VALUES);
9900 		return;
9901 	}
9902 
9903 	elts->method_context = n;
9904 }
9905 
9906 /*
9907  * Given a dependency property group in the tfmri entity (target fmri), return
9908  * a dependent element which represents it.
9909  */
9910 static xmlNodePtr
9911 export_dependent(scf_propertygroup_t *pg, const char *name, const char *tfmri)
9912 {
9913 	uint8_t b;
9914 	xmlNodePtr n, sf;
9915 	int err = 0, ret;
9916 	struct pg_elts pgelts;
9917 
9918 	/*
9919 	 * If external isn't set to true then exporting the service will
9920 	 * export this as a normal dependency, so we should stop to avoid
9921 	 * duplication.
9922 	 */
9923 	if (scf_pg_get_property(pg, scf_property_external, exp_prop) != 0 ||
9924 	    scf_property_get_value(exp_prop, exp_val) != 0 ||
9925 	    scf_value_get_boolean(exp_val, &b) != 0 || !b) {
9926 		if (g_verbose) {
9927 			warn(gettext("Dependent \"%s\" cannot be exported "
9928 			    "properly because the \"%s\" property of the "
9929 			    "\"%s\" dependency of %s is not set to true.\n"),
9930 			    name, scf_property_external, name, tfmri);
9931 		}
9932 
9933 		return (NULL);
9934 	}
9935 
9936 	n = xmlNewNode(NULL, (xmlChar *)"dependent");
9937 	if (n == NULL)
9938 		uu_die(emsg_create_xml);
9939 
9940 	safe_setprop(n, name_attr, name);
9941 
9942 	/* Get the required attributes */
9943 	if (pg_get_prop(pg, SCF_PROPERTY_RESTART_ON, exp_prop) != 0 ||
9944 	    set_attr_from_prop(exp_prop, n, "restart_on") != 0)
9945 		err = 1;
9946 
9947 	if (pg_get_prop(pg, SCF_PROPERTY_GROUPING, exp_prop) != 0 ||
9948 	    set_attr_from_prop(exp_prop, n, "grouping") != 0)
9949 		err = 1;
9950 
9951 	if (pg_get_prop(pg, SCF_PROPERTY_ENTITIES, exp_prop) == 0 &&
9952 	    prop_check_type(exp_prop, SCF_TYPE_FMRI) == 0 &&
9953 	    prop_get_val(exp_prop, exp_val) == 0) {
9954 		/* EMPTY */
9955 	} else
9956 		err = 1;
9957 
9958 	if (err) {
9959 		xmlFreeNode(n);
9960 		return (NULL);
9961 	}
9962 
9963 	sf = xmlNewChild(n, NULL, (xmlChar *)"service_fmri", NULL);
9964 	if (sf == NULL)
9965 		uu_die(emsg_create_xml);
9966 
9967 	safe_setprop(sf, value_attr, tfmri);
9968 
9969 	/*
9970 	 * Now add elements for the other properties.
9971 	 */
9972 	if (scf_iter_pg_properties(exp_prop_iter, pg) != SCF_SUCCESS)
9973 		scfdie();
9974 
9975 	(void) memset(&pgelts, 0, sizeof (pgelts));
9976 
9977 	while ((ret = scf_iter_next_property(exp_prop_iter, exp_prop)) == 1) {
9978 		if (scf_property_get_name(exp_prop, exp_str, exp_str_sz) < 0)
9979 			scfdie();
9980 
9981 		if (strcmp(exp_str, scf_property_external) == 0 ||
9982 		    strcmp(exp_str, SCF_PROPERTY_RESTART_ON) == 0 ||
9983 		    strcmp(exp_str, SCF_PROPERTY_GROUPING) == 0 ||
9984 		    strcmp(exp_str, SCF_PROPERTY_ENTITIES) == 0) {
9985 			continue;
9986 		} else if (strcmp(exp_str, SCF_PROPERTY_TYPE) == 0) {
9987 			if (prop_check_type(exp_prop, SCF_TYPE_ASTRING) == 0 &&
9988 			    prop_get_val(exp_prop, exp_val) == 0) {
9989 				char type[sizeof ("service") + 1];
9990 
9991 				if (scf_value_get_astring(exp_val, type,
9992 				    sizeof (type)) < 0)
9993 					scfdie();
9994 
9995 				if (strcmp(type, "service") == 0)
9996 					continue;
9997 			}
9998 		} else if (strcmp(exp_str, SCF_PROPERTY_STABILITY) == 0) {
9999 			xmlNodePtr s;
10000 
10001 			s = xmlNewNode(NULL, (xmlChar *)"stability");
10002 			if (s == NULL)
10003 				uu_die(emsg_create_xml);
10004 
10005 			if (set_attr_from_prop(exp_prop, s, value_attr) == 0) {
10006 				pgelts.stability = s;
10007 				continue;
10008 			}
10009 
10010 			xmlFreeNode(s);
10011 		}
10012 
10013 		export_property(exp_prop, exp_str, &pgelts, SCE_ALL_VALUES);
10014 	}
10015 	if (ret == -1)
10016 		scfdie();
10017 
10018 	(void) xmlAddChild(n, pgelts.stability);
10019 	(void) xmlAddChildList(n, pgelts.propvals);
10020 	(void) xmlAddChildList(n, pgelts.properties);
10021 
10022 	return (n);
10023 }
10024 
10025 static void
10026 export_dependents(scf_propertygroup_t *pg, struct entity_elts *eelts)
10027 {
10028 	scf_propertygroup_t *opg;
10029 	scf_iter_t *iter;
10030 	char *type, *fmri;
10031 	int ret;
10032 	struct pg_elts pgelts;
10033 	xmlNodePtr n;
10034 	scf_error_t serr;
10035 
10036 	if ((opg = scf_pg_create(g_hndl)) == NULL ||
10037 	    (iter = scf_iter_create(g_hndl)) == NULL)
10038 		scfdie();
10039 
10040 	/* Can't use exp_prop_iter due to export_dependent(). */
10041 	if (scf_iter_pg_properties(iter, pg) != SCF_SUCCESS)
10042 		scfdie();
10043 
10044 	type = safe_malloc(max_scf_pg_type_len + 1);
10045 
10046 	/* Get an extra byte so we can tell if values are too long. */
10047 	fmri = safe_malloc(max_scf_fmri_len + 2);
10048 
10049 	(void) memset(&pgelts, 0, sizeof (pgelts));
10050 
10051 	while ((ret = scf_iter_next_property(iter, exp_prop)) == 1) {
10052 		void *entity;
10053 		int isservice;
10054 		scf_type_t ty;
10055 
10056 		if (scf_property_type(exp_prop, &ty) != SCF_SUCCESS)
10057 			scfdie();
10058 
10059 		if ((ty != SCF_TYPE_ASTRING &&
10060 		    prop_check_type(exp_prop, SCF_TYPE_FMRI) != 0) ||
10061 		    prop_get_val(exp_prop, exp_val) != 0) {
10062 			export_property(exp_prop, NULL, &pgelts,
10063 			    SCE_ALL_VALUES);
10064 			continue;
10065 		}
10066 
10067 		if (scf_property_get_name(exp_prop, exp_str, exp_str_sz) < 0)
10068 			scfdie();
10069 
10070 		if (scf_value_get_astring(exp_val, fmri,
10071 		    max_scf_fmri_len + 2) < 0)
10072 			scfdie();
10073 
10074 		/* Look for a dependency group in the target fmri. */
10075 		serr = fmri_to_entity(g_hndl, fmri, &entity, &isservice);
10076 		switch (serr) {
10077 		case SCF_ERROR_NONE:
10078 			break;
10079 
10080 		case SCF_ERROR_NO_MEMORY:
10081 			uu_die(gettext("Out of memory.\n"));
10082 			/* NOTREACHED */
10083 
10084 		case SCF_ERROR_INVALID_ARGUMENT:
10085 			if (g_verbose) {
10086 				if (scf_property_to_fmri(exp_prop, fmri,
10087 				    max_scf_fmri_len + 2) < 0)
10088 					scfdie();
10089 
10090 				warn(gettext("The value of %s is not a valid "
10091 				    "FMRI.\n"), fmri);
10092 			}
10093 
10094 			export_property(exp_prop, exp_str, &pgelts,
10095 			    SCE_ALL_VALUES);
10096 			continue;
10097 
10098 		case SCF_ERROR_CONSTRAINT_VIOLATED:
10099 			if (g_verbose) {
10100 				if (scf_property_to_fmri(exp_prop, fmri,
10101 				    max_scf_fmri_len + 2) < 0)
10102 					scfdie();
10103 
10104 				warn(gettext("The value of %s does not specify "
10105 				    "a service or an instance.\n"), fmri);
10106 			}
10107 
10108 			export_property(exp_prop, exp_str, &pgelts,
10109 			    SCE_ALL_VALUES);
10110 			continue;
10111 
10112 		case SCF_ERROR_NOT_FOUND:
10113 			if (g_verbose) {
10114 				if (scf_property_to_fmri(exp_prop, fmri,
10115 				    max_scf_fmri_len + 2) < 0)
10116 					scfdie();
10117 
10118 				warn(gettext("The entity specified by %s does "
10119 				    "not exist.\n"), fmri);
10120 			}
10121 
10122 			export_property(exp_prop, exp_str, &pgelts,
10123 			    SCE_ALL_VALUES);
10124 			continue;
10125 
10126 		default:
10127 #ifndef NDEBUG
10128 			(void) fprintf(stderr, "%s:%d: %s() failed with "
10129 			    "unexpected error %d.\n", __FILE__, __LINE__,
10130 			    "fmri_to_entity", serr);
10131 #endif
10132 			abort();
10133 		}
10134 
10135 		if (entity_get_pg(entity, isservice, exp_str, opg) != 0) {
10136 			if (scf_error() != SCF_ERROR_NOT_FOUND)
10137 				scfdie();
10138 
10139 			warn(gettext("Entity %s is missing dependency property "
10140 			    "group %s.\n"), fmri, exp_str);
10141 
10142 			export_property(exp_prop, NULL, &pgelts,
10143 			    SCE_ALL_VALUES);
10144 			continue;
10145 		}
10146 
10147 		if (scf_pg_get_type(opg, type, max_scf_pg_type_len + 1) < 0)
10148 			scfdie();
10149 
10150 		if (strcmp(type, SCF_GROUP_DEPENDENCY) != 0) {
10151 			if (scf_pg_to_fmri(opg, fmri, max_scf_fmri_len + 2) < 0)
10152 				scfdie();
10153 
10154 			warn(gettext("Property group %s is not of "
10155 			    "expected type %s.\n"), fmri, SCF_GROUP_DEPENDENCY);
10156 
10157 			export_property(exp_prop, NULL, &pgelts,
10158 			    SCE_ALL_VALUES);
10159 			continue;
10160 		}
10161 
10162 		n = export_dependent(opg, exp_str, fmri);
10163 		if (n == NULL) {
10164 			export_property(exp_prop, exp_str, &pgelts,
10165 			    SCE_ALL_VALUES);
10166 		} else {
10167 			if (eelts->dependents == NULL)
10168 				eelts->dependents = n;
10169 			else
10170 				(void) xmlAddSibling(eelts->dependents,
10171 				    n);
10172 		}
10173 	}
10174 	if (ret == -1)
10175 		scfdie();
10176 
10177 	free(fmri);
10178 	free(type);
10179 
10180 	scf_iter_destroy(iter);
10181 	scf_pg_destroy(opg);
10182 
10183 	if (pgelts.propvals != NULL || pgelts.properties != NULL)
10184 		export_pg_elts(&pgelts, SCF_PG_DEPENDENTS, scf_group_framework,
10185 		    eelts);
10186 }
10187 
10188 static void
10189 make_node(xmlNodePtr *nodep, const char *name)
10190 {
10191 	if (*nodep == NULL) {
10192 		*nodep = xmlNewNode(NULL, (xmlChar *)name);
10193 		if (*nodep == NULL)
10194 			uu_die(emsg_create_xml);
10195 	}
10196 }
10197 
10198 static xmlNodePtr
10199 export_tm_loctext(scf_propertygroup_t *pg, const char *parname)
10200 {
10201 	int ret;
10202 	xmlNodePtr parent = NULL;
10203 	xmlNodePtr loctext = NULL;
10204 
10205 	if (scf_iter_pg_properties(exp_prop_iter, pg) != SCF_SUCCESS)
10206 		scfdie();
10207 
10208 	while ((ret = scf_iter_next_property(exp_prop_iter, exp_prop)) == 1) {
10209 		if (prop_check_type(exp_prop, SCF_TYPE_USTRING) != 0 ||
10210 		    prop_get_val(exp_prop, exp_val) != 0)
10211 			continue;
10212 
10213 		if (scf_value_get_ustring(exp_val, exp_str, exp_str_sz) < 0)
10214 			scfdie();
10215 
10216 		make_node(&parent, parname);
10217 		loctext = xmlNewTextChild(parent, NULL, (xmlChar *)"loctext",
10218 		    (xmlChar *)exp_str);
10219 		if (loctext == NULL)
10220 			uu_die(emsg_create_xml);
10221 
10222 		if (scf_property_get_name(exp_prop, exp_str, exp_str_sz) < 0)
10223 			scfdie();
10224 
10225 		safe_setprop(loctext, "xml:lang", exp_str);
10226 	}
10227 
10228 	if (ret == -1)
10229 		scfdie();
10230 
10231 	return (parent);
10232 }
10233 
10234 static xmlNodePtr
10235 export_tm_manpage(scf_propertygroup_t *pg)
10236 {
10237 	xmlNodePtr manpage = xmlNewNode(NULL, (xmlChar *)"manpage");
10238 	if (manpage == NULL)
10239 		uu_die(emsg_create_xml);
10240 
10241 	if (pg_get_prop(pg, SCF_PROPERTY_TM_TITLE, exp_prop) != 0 ||
10242 	    set_attr_from_prop(exp_prop, manpage, "title") != 0 ||
10243 	    pg_get_prop(pg, SCF_PROPERTY_TM_SECTION, exp_prop) != 0 ||
10244 	    set_attr_from_prop(exp_prop, manpage, "section") != 0) {
10245 		xmlFreeNode(manpage);
10246 		return (NULL);
10247 	}
10248 
10249 	if (pg_get_prop(pg, SCF_PROPERTY_TM_MANPATH, exp_prop) == 0)
10250 		(void) set_attr_from_prop_default(exp_prop,
10251 		    manpage, "manpath", ":default");
10252 
10253 	return (manpage);
10254 }
10255 
10256 static xmlNodePtr
10257 export_tm_doc_link(scf_propertygroup_t *pg)
10258 {
10259 	xmlNodePtr doc_link = xmlNewNode(NULL, (xmlChar *)"doc_link");
10260 	if (doc_link == NULL)
10261 		uu_die(emsg_create_xml);
10262 
10263 	if (pg_get_prop(pg, SCF_PROPERTY_TM_NAME, exp_prop) != 0 ||
10264 	    set_attr_from_prop(exp_prop, doc_link, "name") != 0 ||
10265 	    pg_get_prop(pg, SCF_PROPERTY_TM_URI, exp_prop) != 0 ||
10266 	    set_attr_from_prop(exp_prop, doc_link, "uri") != 0) {
10267 		xmlFreeNode(doc_link);
10268 		return (NULL);
10269 	}
10270 	return (doc_link);
10271 }
10272 
10273 /*
10274  * Process template information for a service or instances.
10275  */
10276 static void
10277 export_template(scf_propertygroup_t *pg, struct entity_elts *elts,
10278     struct template_elts *telts)
10279 {
10280 	size_t mansz = strlen(SCF_PG_TM_MAN_PREFIX);
10281 	size_t docsz = strlen(SCF_PG_TM_DOC_PREFIX);
10282 	xmlNodePtr child = NULL;
10283 
10284 	if (scf_pg_get_name(pg, exp_str, exp_str_sz) < 0)
10285 		scfdie();
10286 
10287 	if (strcmp(exp_str, SCF_PG_TM_COMMON_NAME) == 0) {
10288 		telts->common_name = export_tm_loctext(pg, "common_name");
10289 		if (telts->common_name == NULL)
10290 			export_pg(pg, elts, SCE_ALL_VALUES);
10291 		return;
10292 	} else if (strcmp(exp_str, SCF_PG_TM_DESCRIPTION) == 0) {
10293 		telts->description = export_tm_loctext(pg, "description");
10294 		if (telts->description == NULL)
10295 			export_pg(pg, elts, SCE_ALL_VALUES);
10296 		return;
10297 	}
10298 
10299 	if (strncmp(exp_str, SCF_PG_TM_MAN_PREFIX, mansz) == 0) {
10300 		child = export_tm_manpage(pg);
10301 	} else if (strncmp(exp_str, SCF_PG_TM_DOC_PREFIX, docsz) == 0) {
10302 		child = export_tm_doc_link(pg);
10303 	}
10304 
10305 	if (child != NULL) {
10306 		make_node(&telts->documentation, "documentation");
10307 		(void) xmlAddChild(telts->documentation, child);
10308 	} else {
10309 		export_pg(pg, elts, SCE_ALL_VALUES);
10310 	}
10311 }
10312 
10313 /*
10314  * Process parameter and paramval elements
10315  */
10316 static void
10317 export_parameter(scf_property_t *prop, const char *name,
10318     struct params_elts *elts)
10319 {
10320 	xmlNodePtr param;
10321 	scf_error_t err = 0;
10322 	int ret;
10323 
10324 	if (scf_property_get_value(prop, exp_val) == SCF_SUCCESS) {
10325 		if ((param = xmlNewNode(NULL, (xmlChar *)"paramval")) == NULL)
10326 			uu_die(emsg_create_xml);
10327 
10328 		safe_setprop(param, name_attr, name);
10329 
10330 		if (scf_value_get_as_string(exp_val, exp_str, exp_str_sz) < 0)
10331 			scfdie();
10332 		safe_setprop(param, value_attr, exp_str);
10333 
10334 		if (elts->paramval == NULL)
10335 			elts->paramval = param;
10336 		else
10337 			(void) xmlAddSibling(elts->paramval, param);
10338 
10339 		return;
10340 	}
10341 
10342 	err = scf_error();
10343 
10344 	if (err != SCF_ERROR_CONSTRAINT_VIOLATED &&
10345 	    err != SCF_ERROR_NOT_FOUND)
10346 		scfdie();
10347 
10348 	if ((param = xmlNewNode(NULL, (xmlChar *)"parameter")) == NULL)
10349 		uu_die(emsg_create_xml);
10350 
10351 	safe_setprop(param, name_attr, name);
10352 
10353 	if (err == SCF_ERROR_CONSTRAINT_VIOLATED) {
10354 		if (scf_iter_property_values(exp_val_iter, prop) != SCF_SUCCESS)
10355 			scfdie();
10356 
10357 		while ((ret = scf_iter_next_value(exp_val_iter, exp_val)) ==
10358 		    1) {
10359 			xmlNodePtr vn;
10360 
10361 			if ((vn = xmlNewChild(param, NULL,
10362 			    (xmlChar *)"value_node", NULL)) == NULL)
10363 				uu_die(emsg_create_xml);
10364 
10365 			if (scf_value_get_as_string(exp_val, exp_str,
10366 			    exp_str_sz) < 0)
10367 				scfdie();
10368 
10369 			safe_setprop(vn, value_attr, exp_str);
10370 		}
10371 		if (ret != 0)
10372 			scfdie();
10373 	}
10374 
10375 	if (elts->parameter == NULL)
10376 		elts->parameter = param;
10377 	else
10378 		(void) xmlAddSibling(elts->parameter, param);
10379 }
10380 
10381 /*
10382  * Process notification parameters for a service or instance
10383  */
10384 static void
10385 export_notify_params(scf_propertygroup_t *pg, struct entity_elts *elts)
10386 {
10387 	xmlNodePtr n, event, *type;
10388 	struct params_elts *eelts;
10389 	int ret, err, i;
10390 	char *s;
10391 
10392 	n = xmlNewNode(NULL, (xmlChar *)"notification_parameters");
10393 	event = xmlNewNode(NULL, (xmlChar *)"event");
10394 	if (n == NULL || event == NULL)
10395 		uu_die(emsg_create_xml);
10396 
10397 	/* event value */
10398 	if (scf_pg_get_name(pg, exp_str, max_scf_name_len + 1) < 0)
10399 		scfdie();
10400 	/* trim SCF_NOTIFY_PG_POSTFIX appended to name on import */
10401 	if ((s = strchr(exp_str, ',')) != NULL)
10402 		*s = '\0';
10403 	safe_setprop(event, value_attr, exp_str);
10404 
10405 	(void) xmlAddChild(n, event);
10406 
10407 	if ((type = calloc(URI_SCHEME_NUM, sizeof (xmlNodePtr))) == NULL ||
10408 	    (eelts = calloc(URI_SCHEME_NUM,
10409 	    sizeof (struct params_elts))) == NULL)
10410 		uu_die(gettext("Out of memory.\n"));
10411 
10412 	err = 0;
10413 
10414 	if (scf_iter_pg_properties(exp_prop_iter, pg) != SCF_SUCCESS)
10415 		scfdie();
10416 
10417 	while ((ret = scf_iter_next_property(exp_prop_iter, exp_prop)) == 1) {
10418 		char *t, *p;
10419 
10420 		if (scf_property_get_name(exp_prop, exp_str, exp_str_sz) < 0)
10421 			scfdie();
10422 
10423 		if ((t = strtok_r(exp_str, ",", &p)) == NULL || p == NULL) {
10424 			/*
10425 			 * this is not a well formed notification parameters
10426 			 * element, we should export as regular pg
10427 			 */
10428 			err = 1;
10429 			break;
10430 		}
10431 
10432 		if ((i = check_uri_protocol(t)) < 0) {
10433 			err = 1;
10434 			break;
10435 		}
10436 
10437 		if (type[i] == NULL) {
10438 			if ((type[i] = xmlNewNode(NULL, (xmlChar *)"type")) ==
10439 			    NULL)
10440 				uu_die(emsg_create_xml);
10441 
10442 			safe_setprop(type[i], name_attr, t);
10443 		}
10444 		if (strcmp(p, active_attr) == 0) {
10445 			if (set_attr_from_prop(exp_prop, type[i],
10446 			    active_attr) != 0) {
10447 				err = 1;
10448 				break;
10449 			}
10450 			continue;
10451 		}
10452 		/*
10453 		 * We export the parameter
10454 		 */
10455 		export_parameter(exp_prop, p, &eelts[i]);
10456 	}
10457 
10458 	if (ret == -1)
10459 		scfdie();
10460 
10461 	if (err == 1) {
10462 		for (i = 0; i < URI_SCHEME_NUM; ++i)
10463 			xmlFree(type[i]);
10464 		free(type);
10465 
10466 		export_pg(pg, elts, SCE_ALL_VALUES);
10467 
10468 		return;
10469 	} else {
10470 		for (i = 0; i < URI_SCHEME_NUM; ++i)
10471 			if (type[i] != NULL) {
10472 				(void) xmlAddChildList(type[i],
10473 				    eelts[i].paramval);
10474 				(void) xmlAddChildList(type[i],
10475 				    eelts[i].parameter);
10476 				(void) xmlAddSibling(event, type[i]);
10477 			}
10478 	}
10479 	free(type);
10480 
10481 	if (elts->notify_params == NULL)
10482 		elts->notify_params = n;
10483 	else
10484 		(void) xmlAddSibling(elts->notify_params, n);
10485 }
10486 
10487 /*
10488  * Process the general property group for an instance.
10489  */
10490 static void
10491 export_inst_general(scf_propertygroup_t *pg, xmlNodePtr inode,
10492     struct entity_elts *elts)
10493 {
10494 	uint8_t enabled;
10495 	struct pg_elts pgelts;
10496 	int ret;
10497 
10498 	/* enabled */
10499 	if (pg_get_prop(pg, scf_property_enabled, exp_prop) == 0 &&
10500 	    prop_check_type(exp_prop, SCF_TYPE_BOOLEAN) == 0 &&
10501 	    prop_get_val(exp_prop, exp_val) == 0) {
10502 		if (scf_value_get_boolean(exp_val, &enabled) != SCF_SUCCESS)
10503 			scfdie();
10504 	} else {
10505 		enabled = 0;
10506 	}
10507 
10508 	safe_setprop(inode, enabled_attr, enabled ? true : false);
10509 
10510 	if (scf_iter_pg_properties(exp_prop_iter, pg) != SCF_SUCCESS)
10511 		scfdie();
10512 
10513 	(void) memset(&pgelts, 0, sizeof (pgelts));
10514 
10515 	while ((ret = scf_iter_next_property(exp_prop_iter, exp_prop)) == 1) {
10516 		if (scf_property_get_name(exp_prop, exp_str, exp_str_sz) < 0)
10517 			scfdie();
10518 
10519 		if (strcmp(exp_str, scf_property_enabled) == 0) {
10520 			continue;
10521 		} else if (strcmp(exp_str, SCF_PROPERTY_RESTARTER) == 0) {
10522 			xmlNodePtr rnode, sfnode;
10523 
10524 			rnode = xmlNewNode(NULL, (xmlChar *)"restarter");
10525 			if (rnode == NULL)
10526 				uu_die(emsg_create_xml);
10527 
10528 			sfnode = xmlNewChild(rnode, NULL,
10529 			    (xmlChar *)"service_fmri", NULL);
10530 			if (sfnode == NULL)
10531 				uu_die(emsg_create_xml);
10532 
10533 			if (set_attr_from_prop(exp_prop, sfnode,
10534 			    value_attr) == 0) {
10535 				elts->restarter = rnode;
10536 				continue;
10537 			}
10538 
10539 			xmlFreeNode(rnode);
10540 		}
10541 
10542 		export_property(exp_prop, exp_str, &pgelts, SCE_ALL_VALUES);
10543 	}
10544 	if (ret == -1)
10545 		scfdie();
10546 
10547 	if (pgelts.propvals != NULL || pgelts.properties != NULL)
10548 		export_pg_elts(&pgelts, scf_pg_general, scf_group_framework,
10549 		    elts);
10550 }
10551 
10552 /*
10553  * Put an instance element for the given instance into selts.
10554  */
10555 static void
10556 export_instance(scf_instance_t *inst, struct entity_elts *selts, int flags)
10557 {
10558 	xmlNodePtr n;
10559 	boolean_t isdefault;
10560 	struct entity_elts elts;
10561 	struct template_elts template_elts;
10562 	int ret;
10563 
10564 	n = xmlNewNode(NULL, (xmlChar *)"instance");
10565 	if (n == NULL)
10566 		uu_die(emsg_create_xml);
10567 
10568 	/* name */
10569 	if (scf_instance_get_name(inst, exp_str, exp_str_sz) < 0)
10570 		scfdie();
10571 	safe_setprop(n, name_attr, exp_str);
10572 	isdefault = strcmp(exp_str, "default") == 0;
10573 
10574 	/* check existance of general pg (since general/enabled is required) */
10575 	if (scf_instance_get_pg(inst, scf_pg_general, exp_pg) != SCF_SUCCESS) {
10576 		if (scf_error() != SCF_ERROR_NOT_FOUND)
10577 			scfdie();
10578 
10579 		if (g_verbose) {
10580 			if (scf_instance_to_fmri(inst, exp_str, exp_str_sz) < 0)
10581 				scfdie();
10582 
10583 			warn(gettext("Instance %s has no general property "
10584 			    "group; it will be marked disabled.\n"), exp_str);
10585 		}
10586 
10587 		safe_setprop(n, enabled_attr, false);
10588 	} else if (scf_pg_get_type(exp_pg, exp_str, exp_str_sz) < 0 ||
10589 	    strcmp(exp_str, scf_group_framework) != 0) {
10590 		if (g_verbose) {
10591 			if (scf_pg_to_fmri(exp_pg, exp_str, exp_str_sz) < 0)
10592 				scfdie();
10593 
10594 			warn(gettext("Property group %s is not of type "
10595 			    "framework; the instance will be marked "
10596 			    "disabled.\n"), exp_str);
10597 		}
10598 
10599 		safe_setprop(n, enabled_attr, false);
10600 	}
10601 
10602 	/* property groups */
10603 	if (scf_iter_instance_pgs(exp_pg_iter, inst) < 0)
10604 		scfdie();
10605 
10606 	(void) memset(&elts, 0, sizeof (elts));
10607 	(void) memset(&template_elts, 0, sizeof (template_elts));
10608 
10609 	while ((ret = scf_iter_next_pg(exp_pg_iter, exp_pg)) == 1) {
10610 		uint32_t pgflags;
10611 
10612 		if (scf_pg_get_flags(exp_pg, &pgflags) != 0)
10613 			scfdie();
10614 
10615 		if (pgflags & SCF_PG_FLAG_NONPERSISTENT)
10616 			continue;
10617 
10618 		if (scf_pg_get_type(exp_pg, exp_str, exp_str_sz) < 0)
10619 			scfdie();
10620 
10621 		if (strcmp(exp_str, SCF_GROUP_DEPENDENCY) == 0) {
10622 			export_dependency(exp_pg, &elts);
10623 			continue;
10624 		} else if (strcmp(exp_str, SCF_GROUP_METHOD) == 0) {
10625 			export_method(exp_pg, &elts);
10626 			continue;
10627 		} else if (strcmp(exp_str, scf_group_framework) == 0) {
10628 			if (scf_pg_get_name(exp_pg, exp_str,
10629 			    max_scf_name_len + 1) < 0)
10630 				scfdie();
10631 
10632 			if (strcmp(exp_str, scf_pg_general) == 0) {
10633 				export_inst_general(exp_pg, n, &elts);
10634 				continue;
10635 			} else if (strcmp(exp_str, SCF_PG_METHOD_CONTEXT) ==
10636 			    0) {
10637 				export_method_context(exp_pg, &elts);
10638 				continue;
10639 			} else if (strcmp(exp_str, SCF_PG_DEPENDENTS) == 0) {
10640 				export_dependents(exp_pg, &elts);
10641 				continue;
10642 			}
10643 		} else if (strcmp(exp_str, SCF_GROUP_TEMPLATE) == 0) {
10644 			export_template(exp_pg, &elts, &template_elts);
10645 			continue;
10646 		} else if (strcmp(exp_str, SCF_NOTIFY_PARAMS_PG_TYPE) == 0) {
10647 			export_notify_params(exp_pg, &elts);
10648 			continue;
10649 		}
10650 
10651 		/* Ordinary pg. */
10652 		export_pg(exp_pg, &elts, flags);
10653 	}
10654 	if (ret == -1)
10655 		scfdie();
10656 
10657 	if (template_elts.common_name != NULL) {
10658 		elts.template = xmlNewNode(NULL, (xmlChar *)"template");
10659 		(void) xmlAddChild(elts.template, template_elts.common_name);
10660 		(void) xmlAddChild(elts.template, template_elts.description);
10661 		(void) xmlAddChild(elts.template, template_elts.documentation);
10662 	} else {
10663 		xmlFreeNode(template_elts.description);
10664 		xmlFreeNode(template_elts.documentation);
10665 	}
10666 
10667 	if (isdefault && elts.restarter == NULL &&
10668 	    elts.dependencies == NULL && elts.method_context == NULL &&
10669 	    elts.exec_methods == NULL && elts.notify_params == NULL &&
10670 	    elts.property_groups == NULL && elts.template == NULL) {
10671 		xmlChar *eval;
10672 
10673 		/* This is a default instance */
10674 		eval = xmlGetProp(n, (xmlChar *)enabled_attr);
10675 
10676 		xmlFreeNode(n);
10677 
10678 		n = xmlNewNode(NULL, (xmlChar *)"create_default_instance");
10679 		if (n == NULL)
10680 			uu_die(emsg_create_xml);
10681 
10682 		safe_setprop(n, enabled_attr, (char *)eval);
10683 		xmlFree(eval);
10684 
10685 		selts->create_default_instance = n;
10686 	} else {
10687 		/* Assemble the children in order. */
10688 		(void) xmlAddChild(n, elts.restarter);
10689 		(void) xmlAddChildList(n, elts.dependencies);
10690 		(void) xmlAddChildList(n, elts.dependents);
10691 		(void) xmlAddChild(n, elts.method_context);
10692 		(void) xmlAddChildList(n, elts.exec_methods);
10693 		(void) xmlAddChildList(n, elts.notify_params);
10694 		(void) xmlAddChildList(n, elts.property_groups);
10695 		(void) xmlAddChild(n, elts.template);
10696 
10697 		if (selts->instances == NULL)
10698 			selts->instances = n;
10699 		else
10700 			(void) xmlAddSibling(selts->instances, n);
10701 	}
10702 }
10703 
10704 /*
10705  * Return a service element for the given service.
10706  */
10707 static xmlNodePtr
10708 export_service(scf_service_t *svc, int flags)
10709 {
10710 	xmlNodePtr snode;
10711 	struct entity_elts elts;
10712 	struct template_elts template_elts;
10713 	int ret;
10714 
10715 	snode = xmlNewNode(NULL, (xmlChar *)"service");
10716 	if (snode == NULL)
10717 		uu_die(emsg_create_xml);
10718 
10719 	/* Get & set name attribute */
10720 	if (scf_service_get_name(svc, exp_str, max_scf_name_len + 1) < 0)
10721 		scfdie();
10722 	safe_setprop(snode, name_attr, exp_str);
10723 
10724 	safe_setprop(snode, type_attr, "service");
10725 	safe_setprop(snode, "version", "0");
10726 
10727 	/* Acquire child elements. */
10728 	if (scf_iter_service_pgs(exp_pg_iter, svc) != SCF_SUCCESS)
10729 		scfdie();
10730 
10731 	(void) memset(&elts, 0, sizeof (elts));
10732 	(void) memset(&template_elts, 0, sizeof (template_elts));
10733 
10734 	while ((ret = scf_iter_next_pg(exp_pg_iter, exp_pg)) == 1) {
10735 		uint32_t pgflags;
10736 
10737 		if (scf_pg_get_flags(exp_pg, &pgflags) != 0)
10738 			scfdie();
10739 
10740 		if (pgflags & SCF_PG_FLAG_NONPERSISTENT)
10741 			continue;
10742 
10743 		if (scf_pg_get_type(exp_pg, exp_str, exp_str_sz) < 0)
10744 			scfdie();
10745 
10746 		if (strcmp(exp_str, SCF_GROUP_DEPENDENCY) == 0) {
10747 			export_dependency(exp_pg, &elts);
10748 			continue;
10749 		} else if (strcmp(exp_str, SCF_GROUP_METHOD) == 0) {
10750 			export_method(exp_pg, &elts);
10751 			continue;
10752 		} else if (strcmp(exp_str, scf_group_framework) == 0) {
10753 			if (scf_pg_get_name(exp_pg, exp_str,
10754 			    max_scf_name_len + 1) < 0)
10755 				scfdie();
10756 
10757 			if (strcmp(exp_str, scf_pg_general) == 0) {
10758 				export_svc_general(exp_pg, &elts);
10759 				continue;
10760 			} else if (strcmp(exp_str, SCF_PG_METHOD_CONTEXT) ==
10761 			    0) {
10762 				export_method_context(exp_pg, &elts);
10763 				continue;
10764 			} else if (strcmp(exp_str, SCF_PG_DEPENDENTS) == 0) {
10765 				export_dependents(exp_pg, &elts);
10766 				continue;
10767 			} else if (strcmp(exp_str, SCF_PG_MANIFESTFILES) == 0) {
10768 				continue;
10769 			}
10770 		} else if (strcmp(exp_str, SCF_GROUP_TEMPLATE) == 0) {
10771 			export_template(exp_pg, &elts, &template_elts);
10772 			continue;
10773 		} else if (strcmp(exp_str, SCF_NOTIFY_PARAMS_PG_TYPE) == 0) {
10774 			export_notify_params(exp_pg, &elts);
10775 			continue;
10776 		}
10777 
10778 		export_pg(exp_pg, &elts, flags);
10779 	}
10780 	if (ret == -1)
10781 		scfdie();
10782 
10783 	if (template_elts.common_name != NULL) {
10784 		elts.template = xmlNewNode(NULL, (xmlChar *)"template");
10785 		(void) xmlAddChild(elts.template, template_elts.common_name);
10786 		(void) xmlAddChild(elts.template, template_elts.description);
10787 		(void) xmlAddChild(elts.template, template_elts.documentation);
10788 	} else {
10789 		xmlFreeNode(template_elts.description);
10790 		xmlFreeNode(template_elts.documentation);
10791 	}
10792 
10793 	/* Iterate instances */
10794 	if (scf_iter_service_instances(exp_inst_iter, svc) != SCF_SUCCESS)
10795 		scfdie();
10796 
10797 	while ((ret = scf_iter_next_instance(exp_inst_iter, exp_inst)) == 1)
10798 		export_instance(exp_inst, &elts, flags);
10799 	if (ret == -1)
10800 		scfdie();
10801 
10802 	/* Now add all of the accumulated elements in order. */
10803 	(void) xmlAddChild(snode, elts.create_default_instance);
10804 	(void) xmlAddChild(snode, elts.single_instance);
10805 	(void) xmlAddChild(snode, elts.restarter);
10806 	(void) xmlAddChildList(snode, elts.dependencies);
10807 	(void) xmlAddChildList(snode, elts.dependents);
10808 	(void) xmlAddChild(snode, elts.method_context);
10809 	(void) xmlAddChildList(snode, elts.exec_methods);
10810 	(void) xmlAddChildList(snode, elts.notify_params);
10811 	(void) xmlAddChildList(snode, elts.property_groups);
10812 	(void) xmlAddChildList(snode, elts.instances);
10813 	(void) xmlAddChild(snode, elts.stability);
10814 	(void) xmlAddChild(snode, elts.template);
10815 
10816 	return (snode);
10817 }
10818 
10819 static int
10820 export_callback(void *data, scf_walkinfo_t *wip)
10821 {
10822 	FILE *f;
10823 	xmlDocPtr doc;
10824 	xmlNodePtr sb;
10825 	int result;
10826 	struct export_args *argsp = (struct export_args *)data;
10827 
10828 	if ((exp_inst = scf_instance_create(g_hndl)) == NULL ||
10829 	    (exp_pg = scf_pg_create(g_hndl)) == NULL ||
10830 	    (exp_prop = scf_property_create(g_hndl)) == NULL ||
10831 	    (exp_val = scf_value_create(g_hndl)) == NULL ||
10832 	    (exp_inst_iter = scf_iter_create(g_hndl)) == NULL ||
10833 	    (exp_pg_iter = scf_iter_create(g_hndl)) == NULL ||
10834 	    (exp_prop_iter = scf_iter_create(g_hndl)) == NULL ||
10835 	    (exp_val_iter = scf_iter_create(g_hndl)) == NULL)
10836 		scfdie();
10837 
10838 	exp_str_sz = max_scf_len + 1;
10839 	exp_str = safe_malloc(exp_str_sz);
10840 
10841 	if (argsp->filename != NULL) {
10842 		errno = 0;
10843 		f = fopen(argsp->filename, "wb");
10844 		if (f == NULL) {
10845 			if (errno == 0)
10846 				uu_die(gettext("Could not open \"%s\": no free "
10847 				    "stdio streams.\n"), argsp->filename);
10848 			else
10849 				uu_die(gettext("Could not open \"%s\""),
10850 				    argsp->filename);
10851 		}
10852 	} else
10853 		f = stdout;
10854 
10855 	doc = xmlNewDoc((xmlChar *)"1.0");
10856 	if (doc == NULL)
10857 		uu_die(gettext("Could not create XML document.\n"));
10858 
10859 	if (xmlCreateIntSubset(doc, (xmlChar *)"service_bundle", NULL,
10860 	    (xmlChar *)MANIFEST_DTD_PATH) == NULL)
10861 		uu_die(emsg_create_xml);
10862 
10863 	sb = xmlNewNode(NULL, (xmlChar *)"service_bundle");
10864 	if (sb == NULL)
10865 		uu_die(emsg_create_xml);
10866 	safe_setprop(sb, type_attr, "manifest");
10867 	safe_setprop(sb, name_attr, "export");
10868 	(void) xmlAddSibling(doc->children, sb);
10869 
10870 	(void) xmlAddChild(sb, export_service(wip->svc, argsp->flags));
10871 
10872 	result = write_service_bundle(doc, f);
10873 
10874 	free(exp_str);
10875 	scf_iter_destroy(exp_val_iter);
10876 	scf_iter_destroy(exp_prop_iter);
10877 	scf_iter_destroy(exp_pg_iter);
10878 	scf_iter_destroy(exp_inst_iter);
10879 	scf_value_destroy(exp_val);
10880 	scf_property_destroy(exp_prop);
10881 	scf_pg_destroy(exp_pg);
10882 	scf_instance_destroy(exp_inst);
10883 
10884 	xmlFreeDoc(doc);
10885 
10886 	if (f != stdout)
10887 		(void) fclose(f);
10888 
10889 	return (result);
10890 }
10891 
10892 /*
10893  * Get the service named by fmri, build an XML tree which represents it, and
10894  * dump it into filename (or stdout if filename is NULL).
10895  */
10896 int
10897 lscf_service_export(char *fmri, const char *filename, int flags)
10898 {
10899 	struct export_args args;
10900 	char *fmridup;
10901 	const char *scope, *svc, *inst;
10902 	size_t cblen = 3 * max_scf_name_len;
10903 	char *canonbuf = alloca(cblen);
10904 	int ret, err;
10905 
10906 	lscf_prep_hndl();
10907 
10908 	bzero(&args, sizeof (args));
10909 	args.filename = filename;
10910 	args.flags = flags;
10911 
10912 	/*
10913 	 * If some poor user has passed an exact instance FMRI, of the sort
10914 	 * one might cut and paste from svcs(1) or an error message, warn
10915 	 * and chop off the instance instead of failing.
10916 	 */
10917 	fmridup = alloca(strlen(fmri) + 1);
10918 	(void) strcpy(fmridup, fmri);
10919 	if (strncmp(fmridup, SCF_FMRI_SVC_PREFIX,
10920 	    sizeof (SCF_FMRI_SVC_PREFIX) -1) == 0 &&
10921 	    scf_parse_svc_fmri(fmridup, &scope, &svc, &inst, NULL, NULL) == 0 &&
10922 	    inst != NULL) {
10923 		(void) strlcpy(canonbuf, "svc:/", cblen);
10924 		if (strcmp(scope, SCF_FMRI_LOCAL_SCOPE) != 0) {
10925 			(void) strlcat(canonbuf, "/", cblen);
10926 			(void) strlcat(canonbuf, scope, cblen);
10927 		}
10928 		(void) strlcat(canonbuf, svc, cblen);
10929 		fmri = canonbuf;
10930 
10931 		warn(gettext("Only services may be exported; ignoring "
10932 		    "instance portion of argument.\n"));
10933 	}
10934 
10935 	err = 0;
10936 	if ((ret = scf_walk_fmri(g_hndl, 1, (char **)&fmri,
10937 	    SCF_WALK_SERVICE | SCF_WALK_NOINSTANCE, export_callback,
10938 	    &args, &err, semerr)) != 0) {
10939 		if (ret != -1)
10940 			semerr(gettext("Failed to walk instances: %s\n"),
10941 			    scf_strerror(ret));
10942 		return (-1);
10943 	}
10944 
10945 	/*
10946 	 * Error message has already been printed.
10947 	 */
10948 	if (err != 0)
10949 		return (-1);
10950 
10951 	return (0);
10952 }
10953 
10954 
10955 /*
10956  * Archive
10957  */
10958 
10959 static xmlNodePtr
10960 make_archive(int flags)
10961 {
10962 	xmlNodePtr sb;
10963 	scf_scope_t *scope;
10964 	scf_service_t *svc;
10965 	scf_iter_t *iter;
10966 	int r;
10967 
10968 	if ((scope = scf_scope_create(g_hndl)) == NULL ||
10969 	    (svc = scf_service_create(g_hndl)) == NULL ||
10970 	    (iter = scf_iter_create(g_hndl)) == NULL ||
10971 	    (exp_inst = scf_instance_create(g_hndl)) == NULL ||
10972 	    (exp_pg = scf_pg_create(g_hndl)) == NULL ||
10973 	    (exp_prop = scf_property_create(g_hndl)) == NULL ||
10974 	    (exp_val = scf_value_create(g_hndl)) == NULL ||
10975 	    (exp_inst_iter = scf_iter_create(g_hndl)) == NULL ||
10976 	    (exp_pg_iter = scf_iter_create(g_hndl)) == NULL ||
10977 	    (exp_prop_iter = scf_iter_create(g_hndl)) == NULL ||
10978 	    (exp_val_iter = scf_iter_create(g_hndl)) == NULL)
10979 		scfdie();
10980 
10981 	exp_str_sz = max_scf_len + 1;
10982 	exp_str = safe_malloc(exp_str_sz);
10983 
10984 	sb = xmlNewNode(NULL, (xmlChar *)"service_bundle");
10985 	if (sb == NULL)
10986 		uu_die(emsg_create_xml);
10987 	safe_setprop(sb, type_attr, "archive");
10988 	safe_setprop(sb, name_attr, "none");
10989 
10990 	if (scf_handle_get_scope(g_hndl, SCF_SCOPE_LOCAL, scope) != 0)
10991 		scfdie();
10992 	if (scf_iter_scope_services(iter, scope) != 0)
10993 		scfdie();
10994 
10995 	for (;;) {
10996 		r = scf_iter_next_service(iter, svc);
10997 		if (r == 0)
10998 			break;
10999 		if (r != 1)
11000 			scfdie();
11001 
11002 		if (scf_service_get_name(svc, exp_str,
11003 		    max_scf_name_len + 1) < 0)
11004 			scfdie();
11005 
11006 		if (strcmp(exp_str, SCF_LEGACY_SERVICE) == 0)
11007 			continue;
11008 
11009 		(void) xmlAddChild(sb, export_service(svc, flags));
11010 	}
11011 
11012 	free(exp_str);
11013 
11014 	scf_iter_destroy(exp_val_iter);
11015 	scf_iter_destroy(exp_prop_iter);
11016 	scf_iter_destroy(exp_pg_iter);
11017 	scf_iter_destroy(exp_inst_iter);
11018 	scf_value_destroy(exp_val);
11019 	scf_property_destroy(exp_prop);
11020 	scf_pg_destroy(exp_pg);
11021 	scf_instance_destroy(exp_inst);
11022 	scf_iter_destroy(iter);
11023 	scf_service_destroy(svc);
11024 	scf_scope_destroy(scope);
11025 
11026 	return (sb);
11027 }
11028 
11029 int
11030 lscf_archive(const char *filename, int flags)
11031 {
11032 	FILE *f;
11033 	xmlDocPtr doc;
11034 	int result;
11035 
11036 	lscf_prep_hndl();
11037 
11038 	if (filename != NULL) {
11039 		errno = 0;
11040 		f = fopen(filename, "wb");
11041 		if (f == NULL) {
11042 			if (errno == 0)
11043 				uu_die(gettext("Could not open \"%s\": no free "
11044 				    "stdio streams.\n"), filename);
11045 			else
11046 				uu_die(gettext("Could not open \"%s\""),
11047 				    filename);
11048 		}
11049 	} else
11050 		f = stdout;
11051 
11052 	doc = xmlNewDoc((xmlChar *)"1.0");
11053 	if (doc == NULL)
11054 		uu_die(gettext("Could not create XML document.\n"));
11055 
11056 	if (xmlCreateIntSubset(doc, (xmlChar *)"service_bundle", NULL,
11057 	    (xmlChar *)MANIFEST_DTD_PATH) == NULL)
11058 		uu_die(emsg_create_xml);
11059 
11060 	(void) xmlAddSibling(doc->children, make_archive(flags));
11061 
11062 	result = write_service_bundle(doc, f);
11063 
11064 	xmlFreeDoc(doc);
11065 
11066 	if (f != stdout)
11067 		(void) fclose(f);
11068 
11069 	return (result);
11070 }
11071 
11072 
11073 /*
11074  * "Extract" a profile.
11075  */
11076 int
11077 lscf_profile_extract(const char *filename)
11078 {
11079 	FILE *f;
11080 	xmlDocPtr doc;
11081 	xmlNodePtr sb, snode, inode;
11082 	scf_scope_t *scope;
11083 	scf_service_t *svc;
11084 	scf_instance_t *inst;
11085 	scf_propertygroup_t *pg;
11086 	scf_property_t *prop;
11087 	scf_value_t *val;
11088 	scf_iter_t *siter, *iiter;
11089 	int r, s;
11090 	char *namebuf;
11091 	uint8_t b;
11092 	int result;
11093 
11094 	lscf_prep_hndl();
11095 
11096 	if (filename != NULL) {
11097 		errno = 0;
11098 		f = fopen(filename, "wb");
11099 		if (f == NULL) {
11100 			if (errno == 0)
11101 				uu_die(gettext("Could not open \"%s\": no "
11102 				    "free stdio streams.\n"), filename);
11103 			else
11104 				uu_die(gettext("Could not open \"%s\""),
11105 				    filename);
11106 		}
11107 	} else
11108 		f = stdout;
11109 
11110 	doc = xmlNewDoc((xmlChar *)"1.0");
11111 	if (doc == NULL)
11112 		uu_die(gettext("Could not create XML document.\n"));
11113 
11114 	if (xmlCreateIntSubset(doc, (xmlChar *)"service_bundle", NULL,
11115 	    (xmlChar *)MANIFEST_DTD_PATH) == NULL)
11116 		uu_die(emsg_create_xml);
11117 
11118 	sb = xmlNewNode(NULL, (xmlChar *)"service_bundle");
11119 	if (sb == NULL)
11120 		uu_die(emsg_create_xml);
11121 	safe_setprop(sb, type_attr, "profile");
11122 	safe_setprop(sb, name_attr, "extract");
11123 	(void) xmlAddSibling(doc->children, sb);
11124 
11125 	if ((scope = scf_scope_create(g_hndl)) == NULL ||
11126 	    (svc = scf_service_create(g_hndl)) == NULL ||
11127 	    (inst = scf_instance_create(g_hndl)) == NULL ||
11128 	    (pg = scf_pg_create(g_hndl)) == NULL ||
11129 	    (prop = scf_property_create(g_hndl)) == NULL ||
11130 	    (val = scf_value_create(g_hndl)) == NULL ||
11131 	    (siter = scf_iter_create(g_hndl)) == NULL ||
11132 	    (iiter = scf_iter_create(g_hndl)) == NULL)
11133 		scfdie();
11134 
11135 	if (scf_handle_get_local_scope(g_hndl, scope) != SCF_SUCCESS)
11136 		scfdie();
11137 
11138 	if (scf_iter_scope_services(siter, scope) != SCF_SUCCESS)
11139 		scfdie();
11140 
11141 	namebuf = safe_malloc(max_scf_name_len + 1);
11142 
11143 	while ((r = scf_iter_next_service(siter, svc)) == 1) {
11144 		if (scf_iter_service_instances(iiter, svc) != SCF_SUCCESS)
11145 			scfdie();
11146 
11147 		snode = xmlNewNode(NULL, (xmlChar *)"service");
11148 		if (snode == NULL)
11149 			uu_die(emsg_create_xml);
11150 
11151 		if (scf_service_get_name(svc, namebuf, max_scf_name_len + 1) <
11152 		    0)
11153 			scfdie();
11154 
11155 		safe_setprop(snode, name_attr, namebuf);
11156 
11157 		safe_setprop(snode, type_attr, "service");
11158 		safe_setprop(snode, "version", "0");
11159 
11160 		while ((s = scf_iter_next_instance(iiter, inst)) == 1) {
11161 			if (scf_instance_get_pg(inst, scf_pg_general, pg) !=
11162 			    SCF_SUCCESS) {
11163 				if (scf_error() != SCF_ERROR_NOT_FOUND)
11164 					scfdie();
11165 
11166 				if (g_verbose) {
11167 					ssize_t len;
11168 					char *fmri;
11169 
11170 					len =
11171 					    scf_instance_to_fmri(inst, NULL, 0);
11172 					if (len < 0)
11173 						scfdie();
11174 
11175 					fmri = safe_malloc(len + 1);
11176 
11177 					if (scf_instance_to_fmri(inst, fmri,
11178 					    len + 1) < 0)
11179 						scfdie();
11180 
11181 					warn("Instance %s has no \"%s\" "
11182 					    "property group.\n", fmri,
11183 					    scf_pg_general);
11184 
11185 					free(fmri);
11186 				}
11187 
11188 				continue;
11189 			}
11190 
11191 			if (pg_get_prop(pg, scf_property_enabled, prop) != 0 ||
11192 			    prop_check_type(prop, SCF_TYPE_BOOLEAN) != 0 ||
11193 			    prop_get_val(prop, val) != 0)
11194 				continue;
11195 
11196 			inode = xmlNewChild(snode, NULL, (xmlChar *)"instance",
11197 			    NULL);
11198 			if (inode == NULL)
11199 				uu_die(emsg_create_xml);
11200 
11201 			if (scf_instance_get_name(inst, namebuf,
11202 			    max_scf_name_len + 1) < 0)
11203 				scfdie();
11204 
11205 			safe_setprop(inode, name_attr, namebuf);
11206 
11207 			if (scf_value_get_boolean(val, &b) != SCF_SUCCESS)
11208 				scfdie();
11209 
11210 			safe_setprop(inode, enabled_attr, b ? true : false);
11211 		}
11212 		if (s < 0)
11213 			scfdie();
11214 
11215 		if (snode->children != NULL)
11216 			(void) xmlAddChild(sb, snode);
11217 		else
11218 			xmlFreeNode(snode);
11219 	}
11220 	if (r < 0)
11221 		scfdie();
11222 
11223 	free(namebuf);
11224 
11225 	result = write_service_bundle(doc, f);
11226 
11227 	xmlFreeDoc(doc);
11228 
11229 	if (f != stdout)
11230 		(void) fclose(f);
11231 
11232 	return (result);
11233 }
11234 
11235 
11236 /*
11237  * Entity manipulation commands
11238  */
11239 
11240 /*
11241  * Entity selection.  If no entity is selected, then the current scope is in
11242  * cur_scope, and cur_svc and cur_inst are NULL.  When a service is selected,
11243  * only cur_inst is NULL, and when an instance is selected, none are NULL.
11244  * When the snaplevel of a snapshot is selected, cur_level, cur_snap, and
11245  * cur_inst will be non-NULL.
11246  */
11247 
11248 /* Returns 1 if maybe absolute fmri, 0 on success (dies on failure) */
11249 static int
11250 select_inst(const char *name)
11251 {
11252 	scf_instance_t *inst;
11253 	scf_error_t err;
11254 
11255 	assert(cur_svc != NULL);
11256 
11257 	inst = scf_instance_create(g_hndl);
11258 	if (inst == NULL)
11259 		scfdie();
11260 
11261 	if (scf_service_get_instance(cur_svc, name, inst) == SCF_SUCCESS) {
11262 		cur_inst = inst;
11263 		return (0);
11264 	}
11265 
11266 	err = scf_error();
11267 	if (err != SCF_ERROR_NOT_FOUND && err != SCF_ERROR_INVALID_ARGUMENT)
11268 		scfdie();
11269 
11270 	scf_instance_destroy(inst);
11271 	return (1);
11272 }
11273 
11274 /* Returns as above. */
11275 static int
11276 select_svc(const char *name)
11277 {
11278 	scf_service_t *svc;
11279 	scf_error_t err;
11280 
11281 	assert(cur_scope != NULL);
11282 
11283 	svc = scf_service_create(g_hndl);
11284 	if (svc == NULL)
11285 		scfdie();
11286 
11287 	if (scf_scope_get_service(cur_scope, name, svc) == SCF_SUCCESS) {
11288 		cur_svc = svc;
11289 		return (0);
11290 	}
11291 
11292 	err = scf_error();
11293 	if (err != SCF_ERROR_NOT_FOUND && err != SCF_ERROR_INVALID_ARGUMENT)
11294 		scfdie();
11295 
11296 	scf_service_destroy(svc);
11297 	return (1);
11298 }
11299 
11300 /* ARGSUSED */
11301 static int
11302 select_callback(void *unused, scf_walkinfo_t *wip)
11303 {
11304 	scf_instance_t *inst;
11305 	scf_service_t *svc;
11306 	scf_scope_t *scope;
11307 
11308 	if (wip->inst != NULL) {
11309 		if ((scope = scf_scope_create(g_hndl)) == NULL ||
11310 		    (svc = scf_service_create(g_hndl)) == NULL ||
11311 		    (inst = scf_instance_create(g_hndl)) == NULL)
11312 			scfdie();
11313 
11314 		if (scf_handle_decode_fmri(g_hndl, wip->fmri, scope, svc,
11315 		    inst, NULL, NULL, SCF_DECODE_FMRI_EXACT) != SCF_SUCCESS)
11316 			scfdie();
11317 	} else {
11318 		assert(wip->svc != NULL);
11319 
11320 		if ((scope = scf_scope_create(g_hndl)) == NULL ||
11321 		    (svc = scf_service_create(g_hndl)) == NULL)
11322 			scfdie();
11323 
11324 		if (scf_handle_decode_fmri(g_hndl, wip->fmri, scope, svc,
11325 		    NULL, NULL, NULL, SCF_DECODE_FMRI_EXACT) != SCF_SUCCESS)
11326 			scfdie();
11327 
11328 		inst = NULL;
11329 	}
11330 
11331 	/* Clear out the current selection */
11332 	assert(cur_scope != NULL);
11333 	scf_scope_destroy(cur_scope);
11334 	scf_service_destroy(cur_svc);
11335 	scf_instance_destroy(cur_inst);
11336 
11337 	cur_scope = scope;
11338 	cur_svc = svc;
11339 	cur_inst = inst;
11340 
11341 	return (0);
11342 }
11343 
11344 static int
11345 validate_callback(void *fmri_p, scf_walkinfo_t *wip)
11346 {
11347 	char **fmri = fmri_p;
11348 
11349 	*fmri = strdup(wip->fmri);
11350 	if (*fmri == NULL)
11351 		uu_die(gettext("Out of memory.\n"));
11352 
11353 	return (0);
11354 }
11355 
11356 /*
11357  * validate [fmri]
11358  * Perform the validation of an FMRI instance.
11359  */
11360 void
11361 lscf_validate_fmri(const char *fmri)
11362 {
11363 	int ret = 0;
11364 	size_t inst_sz;
11365 	char *inst_fmri = NULL;
11366 	scf_tmpl_errors_t *errs = NULL;
11367 	char *snapbuf = NULL;
11368 
11369 	lscf_prep_hndl();
11370 
11371 	if (fmri == NULL) {
11372 		inst_sz = max_scf_fmri_len + 1;
11373 		inst_fmri = safe_malloc(inst_sz);
11374 
11375 		if (cur_snap != NULL) {
11376 			snapbuf = safe_malloc(max_scf_name_len + 1);
11377 			if (scf_snapshot_get_name(cur_snap, snapbuf,
11378 			    max_scf_name_len + 1) < 0)
11379 				scfdie();
11380 		}
11381 		if (cur_inst == NULL) {
11382 			semerr(gettext("No instance selected\n"));
11383 			goto cleanup;
11384 		} else if (scf_instance_to_fmri(cur_inst, inst_fmri,
11385 		    inst_sz) >= inst_sz) {
11386 			/* sanity check. Should never get here */
11387 			uu_die(gettext("Unexpected error! file %s, line %d\n"),
11388 			    __FILE__, __LINE__);
11389 		}
11390 	} else {
11391 		scf_error_t scf_err;
11392 		int err = 0;
11393 
11394 		if ((scf_err = scf_walk_fmri(g_hndl, 1, (char **)&fmri, 0,
11395 		    validate_callback, &inst_fmri, &err, semerr)) != 0) {
11396 			uu_warn("Failed to walk instances: %s\n",
11397 			    scf_strerror(scf_err));
11398 			goto cleanup;
11399 		}
11400 		if (err != 0) {
11401 			/* error message displayed by scf_walk_fmri */
11402 			goto cleanup;
11403 		}
11404 	}
11405 
11406 	ret = scf_tmpl_validate_fmri(g_hndl, inst_fmri, snapbuf, &errs,
11407 	    SCF_TMPL_VALIDATE_FLAG_CURRENT);
11408 	if (ret == -1) {
11409 		if (scf_error() == SCF_ERROR_TEMPLATE_INVALID) {
11410 			warn(gettext("Template data for %s is invalid. "
11411 			    "Consider reverting to a previous snapshot or "
11412 			    "restoring original configuration.\n"), inst_fmri);
11413 		} else {
11414 			uu_warn("%s: %s\n",
11415 			    gettext("Error validating the instance"),
11416 			    scf_strerror(scf_error()));
11417 		}
11418 	} else if (ret == 1 && errs != NULL) {
11419 		scf_tmpl_error_t *err = NULL;
11420 		char *msg;
11421 		size_t len = 256;	/* initial error buffer size */
11422 		int flag = (est->sc_cmd_flags & SC_CMD_IACTIVE) ?
11423 		    SCF_TMPL_STRERROR_HUMAN : 0;
11424 
11425 		msg = safe_malloc(len);
11426 
11427 		while ((err = scf_tmpl_next_error(errs)) != NULL) {
11428 			int ret;
11429 
11430 			if ((ret = scf_tmpl_strerror(err, msg, len,
11431 			    flag)) >= len) {
11432 				len = ret + 1;
11433 				msg = realloc(msg, len);
11434 				if (msg == NULL)
11435 					uu_die(gettext(
11436 					    "Out of memory.\n"));
11437 				(void) scf_tmpl_strerror(err, msg, len,
11438 				    flag);
11439 			}
11440 			(void) fprintf(stderr, "%s\n", msg);
11441 		}
11442 		if (msg != NULL)
11443 			free(msg);
11444 	}
11445 	if (errs != NULL)
11446 		scf_tmpl_errors_destroy(errs);
11447 
11448 cleanup:
11449 	free(inst_fmri);
11450 	free(snapbuf);
11451 }
11452 
11453 static void
11454 lscf_validate_file(const char *filename)
11455 {
11456 	tmpl_errors_t *errs;
11457 
11458 	bundle_t *b = internal_bundle_new();
11459 	if (lxml_get_bundle_file(b, filename, SVCCFG_OP_IMPORT) == 0) {
11460 		if (tmpl_validate_bundle(b, &errs) != TVS_SUCCESS) {
11461 			tmpl_errors_print(stderr, errs, "");
11462 			semerr(gettext("Validation failed.\n"));
11463 		}
11464 		tmpl_errors_destroy(errs);
11465 	}
11466 	(void) internal_bundle_free(b);
11467 }
11468 
11469 /*
11470  * validate [fmri|file]
11471  */
11472 void
11473 lscf_validate(const char *arg)
11474 {
11475 	const char *str;
11476 
11477 	if (strncmp(arg, SCF_FMRI_FILE_PREFIX,
11478 	    sizeof (SCF_FMRI_FILE_PREFIX) - 1) == 0) {
11479 		str = arg + sizeof (SCF_FMRI_FILE_PREFIX) - 1;
11480 		lscf_validate_file(str);
11481 	} else if (strncmp(arg, SCF_FMRI_SVC_PREFIX,
11482 	    sizeof (SCF_FMRI_SVC_PREFIX) - 1) == 0) {
11483 		str = arg + sizeof (SCF_FMRI_SVC_PREFIX) - 1;
11484 		lscf_validate_fmri(str);
11485 	} else if (access(arg, R_OK | F_OK) == 0) {
11486 		lscf_validate_file(arg);
11487 	} else {
11488 		lscf_validate_fmri(arg);
11489 	}
11490 }
11491 
11492 void
11493 lscf_select(const char *fmri)
11494 {
11495 	int ret, err;
11496 
11497 	lscf_prep_hndl();
11498 
11499 	if (cur_snap != NULL) {
11500 		struct snaplevel *elt;
11501 		char *buf;
11502 
11503 		/* Error unless name is that of the next level. */
11504 		elt = uu_list_next(cur_levels, cur_elt);
11505 		if (elt == NULL) {
11506 			semerr(gettext("No children.\n"));
11507 			return;
11508 		}
11509 
11510 		buf = safe_malloc(max_scf_name_len + 1);
11511 
11512 		if (scf_snaplevel_get_instance_name(elt->sl, buf,
11513 		    max_scf_name_len + 1) < 0)
11514 			scfdie();
11515 
11516 		if (strcmp(buf, fmri) != 0) {
11517 			semerr(gettext("No such child.\n"));
11518 			free(buf);
11519 			return;
11520 		}
11521 
11522 		free(buf);
11523 
11524 		cur_elt = elt;
11525 		cur_level = elt->sl;
11526 		return;
11527 	}
11528 
11529 	/*
11530 	 * Special case for 'svc:', which takes the user to the scope level.
11531 	 */
11532 	if (strcmp(fmri, "svc:") == 0) {
11533 		scf_instance_destroy(cur_inst);
11534 		scf_service_destroy(cur_svc);
11535 		cur_inst = NULL;
11536 		cur_svc = NULL;
11537 		return;
11538 	}
11539 
11540 	/*
11541 	 * Special case for ':properties'.  This appears as part of 'list' but
11542 	 * can't be selected.  Give a more helpful error message in this case.
11543 	 */
11544 	if (strcmp(fmri, ":properties") == 0) {
11545 		semerr(gettext(":properties is not an entity.  Try 'listprop' "
11546 		    "to list properties.\n"));
11547 		return;
11548 	}
11549 
11550 	/*
11551 	 * First try the argument as relative to the current selection.
11552 	 */
11553 	if (cur_inst != NULL) {
11554 		/* EMPTY */;
11555 	} else if (cur_svc != NULL) {
11556 		if (select_inst(fmri) != 1)
11557 			return;
11558 	} else {
11559 		if (select_svc(fmri) != 1)
11560 			return;
11561 	}
11562 
11563 	err = 0;
11564 	if ((ret = scf_walk_fmri(g_hndl, 1, (char **)&fmri, SCF_WALK_SERVICE,
11565 	    select_callback, NULL, &err, semerr)) != 0) {
11566 		semerr(gettext("Failed to walk instances: %s\n"),
11567 		    scf_strerror(ret));
11568 	}
11569 }
11570 
11571 void
11572 lscf_unselect(void)
11573 {
11574 	lscf_prep_hndl();
11575 
11576 	if (cur_snap != NULL) {
11577 		struct snaplevel *elt;
11578 
11579 		elt = uu_list_prev(cur_levels, cur_elt);
11580 		if (elt == NULL) {
11581 			semerr(gettext("No parent levels.\n"));
11582 		} else {
11583 			cur_elt = elt;
11584 			cur_level = elt->sl;
11585 		}
11586 	} else if (cur_inst != NULL) {
11587 		scf_instance_destroy(cur_inst);
11588 		cur_inst = NULL;
11589 	} else if (cur_svc != NULL) {
11590 		scf_service_destroy(cur_svc);
11591 		cur_svc = NULL;
11592 	} else {
11593 		semerr(gettext("Cannot unselect at scope level.\n"));
11594 	}
11595 }
11596 
11597 /*
11598  * Return the FMRI of the current selection, for the prompt.
11599  */
11600 void
11601 lscf_get_selection_str(char *buf, size_t bufsz)
11602 {
11603 	char *cp;
11604 	ssize_t fmrilen, szret;
11605 	boolean_t deleted = B_FALSE;
11606 
11607 	if (g_hndl == NULL) {
11608 		(void) strlcpy(buf, "svc:", bufsz);
11609 		return;
11610 	}
11611 
11612 	if (cur_level != NULL) {
11613 		assert(cur_snap != NULL);
11614 
11615 		/* [ snapshot ] FMRI [: instance ] */
11616 		assert(bufsz >= 1 + max_scf_name_len + 1 + max_scf_fmri_len
11617 		    + 2 + max_scf_name_len + 1 + 1);
11618 
11619 		buf[0] = '[';
11620 
11621 		szret = scf_snapshot_get_name(cur_snap, buf + 1,
11622 		    max_scf_name_len + 1);
11623 		if (szret < 0) {
11624 			if (scf_error() != SCF_ERROR_DELETED)
11625 				scfdie();
11626 
11627 			goto snap_deleted;
11628 		}
11629 
11630 		(void) strcat(buf, "]svc:/");
11631 
11632 		cp = strchr(buf, '\0');
11633 
11634 		szret = scf_snaplevel_get_service_name(cur_level, cp,
11635 		    max_scf_name_len + 1);
11636 		if (szret < 0) {
11637 			if (scf_error() != SCF_ERROR_DELETED)
11638 				scfdie();
11639 
11640 			goto snap_deleted;
11641 		}
11642 
11643 		cp = strchr(cp, '\0');
11644 
11645 		if (snaplevel_is_instance(cur_level)) {
11646 			*cp++ = ':';
11647 
11648 			if (scf_snaplevel_get_instance_name(cur_level, cp,
11649 			    max_scf_name_len + 1) < 0) {
11650 				if (scf_error() != SCF_ERROR_DELETED)
11651 					scfdie();
11652 
11653 				goto snap_deleted;
11654 			}
11655 		} else {
11656 			*cp++ = '[';
11657 			*cp++ = ':';
11658 
11659 			if (scf_instance_get_name(cur_inst, cp,
11660 			    max_scf_name_len + 1) < 0) {
11661 				if (scf_error() != SCF_ERROR_DELETED)
11662 					scfdie();
11663 
11664 				goto snap_deleted;
11665 			}
11666 
11667 			(void) strcat(buf, "]");
11668 		}
11669 
11670 		return;
11671 
11672 snap_deleted:
11673 		deleted = B_TRUE;
11674 		free(buf);
11675 		unselect_cursnap();
11676 	}
11677 
11678 	assert(cur_snap == NULL);
11679 
11680 	if (cur_inst != NULL) {
11681 		assert(cur_svc != NULL);
11682 		assert(cur_scope != NULL);
11683 
11684 		fmrilen = scf_instance_to_fmri(cur_inst, buf, bufsz);
11685 		if (fmrilen >= 0) {
11686 			assert(fmrilen < bufsz);
11687 			if (deleted)
11688 				warn(emsg_deleted);
11689 			return;
11690 		}
11691 
11692 		if (scf_error() != SCF_ERROR_DELETED)
11693 			scfdie();
11694 
11695 		deleted = B_TRUE;
11696 
11697 		scf_instance_destroy(cur_inst);
11698 		cur_inst = NULL;
11699 	}
11700 
11701 	if (cur_svc != NULL) {
11702 		assert(cur_scope != NULL);
11703 
11704 		szret = scf_service_to_fmri(cur_svc, buf, bufsz);
11705 		if (szret >= 0) {
11706 			assert(szret < bufsz);
11707 			if (deleted)
11708 				warn(emsg_deleted);
11709 			return;
11710 		}
11711 
11712 		if (scf_error() != SCF_ERROR_DELETED)
11713 			scfdie();
11714 
11715 		deleted = B_TRUE;
11716 		scf_service_destroy(cur_svc);
11717 		cur_svc = NULL;
11718 	}
11719 
11720 	assert(cur_scope != NULL);
11721 	fmrilen = scf_scope_to_fmri(cur_scope, buf, bufsz);
11722 
11723 	if (fmrilen < 0)
11724 		scfdie();
11725 
11726 	assert(fmrilen < bufsz);
11727 	if (deleted)
11728 		warn(emsg_deleted);
11729 }
11730 
11731 /*
11732  * Entity listing.  Entities and colon namespaces (e.g., :properties and
11733  * :statistics) are listed for the current selection.
11734  */
11735 void
11736 lscf_list(const char *pattern)
11737 {
11738 	scf_iter_t *iter;
11739 	char *buf;
11740 	int ret;
11741 
11742 	lscf_prep_hndl();
11743 
11744 	if (cur_level != NULL) {
11745 		struct snaplevel *elt;
11746 
11747 		(void) fputs(COLON_NAMESPACES, stdout);
11748 
11749 		elt = uu_list_next(cur_levels, cur_elt);
11750 		if (elt == NULL)
11751 			return;
11752 
11753 		/*
11754 		 * For now, we know that the next level is an instance.  But
11755 		 * if we ever have multiple scopes, this could be complicated.
11756 		 */
11757 		buf = safe_malloc(max_scf_name_len + 1);
11758 		if (scf_snaplevel_get_instance_name(elt->sl, buf,
11759 		    max_scf_name_len + 1) >= 0) {
11760 			(void) puts(buf);
11761 		} else {
11762 			if (scf_error() != SCF_ERROR_DELETED)
11763 				scfdie();
11764 		}
11765 
11766 		free(buf);
11767 
11768 		return;
11769 	}
11770 
11771 	if (cur_inst != NULL) {
11772 		(void) fputs(COLON_NAMESPACES, stdout);
11773 		return;
11774 	}
11775 
11776 	iter = scf_iter_create(g_hndl);
11777 	if (iter == NULL)
11778 		scfdie();
11779 
11780 	buf = safe_malloc(max_scf_name_len + 1);
11781 
11782 	if (cur_svc != NULL) {
11783 		/* List the instances in this service. */
11784 		scf_instance_t *inst;
11785 
11786 		inst = scf_instance_create(g_hndl);
11787 		if (inst == NULL)
11788 			scfdie();
11789 
11790 		if (scf_iter_service_instances(iter, cur_svc) == 0) {
11791 			safe_printf(COLON_NAMESPACES);
11792 
11793 			for (;;) {
11794 				ret = scf_iter_next_instance(iter, inst);
11795 				if (ret == 0)
11796 					break;
11797 				if (ret != 1) {
11798 					if (scf_error() != SCF_ERROR_DELETED)
11799 						scfdie();
11800 
11801 					break;
11802 				}
11803 
11804 				if (scf_instance_get_name(inst, buf,
11805 				    max_scf_name_len + 1) >= 0) {
11806 					if (pattern == NULL ||
11807 					    fnmatch(pattern, buf, 0) == 0)
11808 						(void) puts(buf);
11809 				} else {
11810 					if (scf_error() != SCF_ERROR_DELETED)
11811 						scfdie();
11812 				}
11813 			}
11814 		} else {
11815 			if (scf_error() != SCF_ERROR_DELETED)
11816 				scfdie();
11817 		}
11818 
11819 		scf_instance_destroy(inst);
11820 	} else {
11821 		/* List the services in this scope. */
11822 		scf_service_t *svc;
11823 
11824 		assert(cur_scope != NULL);
11825 
11826 		svc = scf_service_create(g_hndl);
11827 		if (svc == NULL)
11828 			scfdie();
11829 
11830 		if (scf_iter_scope_services(iter, cur_scope) != SCF_SUCCESS)
11831 			scfdie();
11832 
11833 		for (;;) {
11834 			ret = scf_iter_next_service(iter, svc);
11835 			if (ret == 0)
11836 				break;
11837 			if (ret != 1)
11838 				scfdie();
11839 
11840 			if (scf_service_get_name(svc, buf,
11841 			    max_scf_name_len + 1) >= 0) {
11842 				if (pattern == NULL ||
11843 				    fnmatch(pattern, buf, 0) == 0)
11844 					safe_printf("%s\n", buf);
11845 			} else {
11846 				if (scf_error() != SCF_ERROR_DELETED)
11847 					scfdie();
11848 			}
11849 		}
11850 
11851 		scf_service_destroy(svc);
11852 	}
11853 
11854 	free(buf);
11855 	scf_iter_destroy(iter);
11856 }
11857 
11858 /*
11859  * Entity addition.  Creates an empty entity in the current selection.
11860  */
11861 void
11862 lscf_add(const char *name)
11863 {
11864 	lscf_prep_hndl();
11865 
11866 	if (cur_snap != NULL) {
11867 		semerr(emsg_cant_modify_snapshots);
11868 	} else if (cur_inst != NULL) {
11869 		semerr(gettext("Cannot add entities to an instance.\n"));
11870 	} else if (cur_svc != NULL) {
11871 
11872 		if (scf_service_add_instance(cur_svc, name, NULL) !=
11873 		    SCF_SUCCESS) {
11874 			switch (scf_error()) {
11875 			case SCF_ERROR_INVALID_ARGUMENT:
11876 				semerr(gettext("Invalid name.\n"));
11877 				break;
11878 
11879 			case SCF_ERROR_EXISTS:
11880 				semerr(gettext("Instance already exists.\n"));
11881 				break;
11882 
11883 			case SCF_ERROR_PERMISSION_DENIED:
11884 				semerr(emsg_permission_denied);
11885 				break;
11886 
11887 			default:
11888 				scfdie();
11889 			}
11890 		}
11891 	} else {
11892 		assert(cur_scope != NULL);
11893 
11894 		if (scf_scope_add_service(cur_scope, name, NULL) !=
11895 		    SCF_SUCCESS) {
11896 			switch (scf_error()) {
11897 			case SCF_ERROR_INVALID_ARGUMENT:
11898 				semerr(gettext("Invalid name.\n"));
11899 				break;
11900 
11901 			case SCF_ERROR_EXISTS:
11902 				semerr(gettext("Service already exists.\n"));
11903 				break;
11904 
11905 			case SCF_ERROR_PERMISSION_DENIED:
11906 				semerr(emsg_permission_denied);
11907 				break;
11908 
11909 			case SCF_ERROR_BACKEND_READONLY:
11910 				semerr(emsg_read_only);
11911 				break;
11912 
11913 			default:
11914 				scfdie();
11915 			}
11916 		}
11917 	}
11918 }
11919 
11920 /* return 1 if the entity has no persistent pgs, else return 0 */
11921 static int
11922 entity_has_no_pgs(void *ent, int isservice)
11923 {
11924 	scf_iter_t *iter = NULL;
11925 	scf_propertygroup_t *pg = NULL;
11926 	uint32_t flags;
11927 	int err;
11928 	int ret = 1;
11929 
11930 	if ((iter = scf_iter_create(g_hndl)) == NULL ||
11931 	    (pg = scf_pg_create(g_hndl)) == NULL)
11932 		scfdie();
11933 
11934 	if (isservice) {
11935 		if (scf_iter_service_pgs(iter, (scf_service_t *)ent) < 0)
11936 			scfdie();
11937 	} else {
11938 		if (scf_iter_instance_pgs(iter, (scf_instance_t *)ent) < 0)
11939 			scfdie();
11940 	}
11941 
11942 	while ((err = scf_iter_next_pg(iter, pg)) == 1) {
11943 		if (scf_pg_get_flags(pg, &flags) != 0)
11944 			scfdie();
11945 
11946 		/* skip nonpersistent pgs */
11947 		if (flags & SCF_PG_FLAG_NONPERSISTENT)
11948 			continue;
11949 
11950 		ret = 0;
11951 		break;
11952 	}
11953 
11954 	if (err == -1)
11955 		scfdie();
11956 
11957 	scf_pg_destroy(pg);
11958 	scf_iter_destroy(iter);
11959 
11960 	return (ret);
11961 }
11962 
11963 /* return 1 if the service has no instances, else return 0 */
11964 static int
11965 svc_has_no_insts(scf_service_t *svc)
11966 {
11967 	scf_instance_t *inst;
11968 	scf_iter_t *iter;
11969 	int r;
11970 	int ret = 1;
11971 
11972 	if ((inst = scf_instance_create(g_hndl)) == NULL ||
11973 	    (iter = scf_iter_create(g_hndl)) == NULL)
11974 		scfdie();
11975 
11976 	if (scf_iter_service_instances(iter, svc) != 0)
11977 		scfdie();
11978 
11979 	r = scf_iter_next_instance(iter, inst);
11980 	if (r == 1) {
11981 		ret = 0;
11982 	} else if (r == 0) {
11983 		ret = 1;
11984 	} else if (r == -1) {
11985 		scfdie();
11986 	} else {
11987 		bad_error("scf_iter_next_instance", r);
11988 	}
11989 
11990 	scf_iter_destroy(iter);
11991 	scf_instance_destroy(inst);
11992 
11993 	return (ret);
11994 }
11995 
11996 /*
11997  * Entity deletion.
11998  */
11999 
12000 /*
12001  * Delete the property group <fmri>/:properties/<name>.  Returns
12002  * SCF_ERROR_NONE on success (or if the entity is not found),
12003  * SCF_ERROR_INVALID_ARGUMENT if the fmri is bad, SCF_ERROR_TYPE_MISMATCH if
12004  * the pg is the wrong type, or SCF_ERROR_PERMISSION_DENIED if permission was
12005  * denied.
12006  */
12007 static scf_error_t
12008 delete_dependency_pg(const char *fmri, const char *name)
12009 {
12010 	void *entity = NULL;
12011 	int isservice;
12012 	scf_propertygroup_t *pg = NULL;
12013 	scf_error_t result;
12014 	char *pgty;
12015 	scf_service_t *svc = NULL;
12016 	scf_instance_t *inst = NULL;
12017 	scf_iter_t *iter = NULL;
12018 	char *name_buf = NULL;
12019 
12020 	result = fmri_to_entity(g_hndl, fmri, &entity, &isservice);
12021 	switch (result) {
12022 	case SCF_ERROR_NONE:
12023 		break;
12024 
12025 	case SCF_ERROR_NO_MEMORY:
12026 		uu_die(gettext("Out of memory.\n"));
12027 		/* NOTREACHED */
12028 
12029 	case SCF_ERROR_INVALID_ARGUMENT:
12030 	case SCF_ERROR_CONSTRAINT_VIOLATED:
12031 		return (SCF_ERROR_INVALID_ARGUMENT);
12032 
12033 	case SCF_ERROR_NOT_FOUND:
12034 		result = SCF_ERROR_NONE;
12035 		goto out;
12036 
12037 	default:
12038 		bad_error("fmri_to_entity", result);
12039 	}
12040 
12041 	pg = scf_pg_create(g_hndl);
12042 	if (pg == NULL)
12043 		scfdie();
12044 
12045 	if (entity_get_pg(entity, isservice, name, pg) != 0) {
12046 		if (scf_error() != SCF_ERROR_NOT_FOUND)
12047 			scfdie();
12048 
12049 		result = SCF_ERROR_NONE;
12050 		goto out;
12051 	}
12052 
12053 	pgty = safe_malloc(max_scf_pg_type_len + 1);
12054 
12055 	if (scf_pg_get_type(pg, pgty, max_scf_pg_type_len + 1) < 0)
12056 		scfdie();
12057 
12058 	if (strcmp(pgty, SCF_GROUP_DEPENDENCY) != 0) {
12059 		result = SCF_ERROR_TYPE_MISMATCH;
12060 		free(pgty);
12061 		goto out;
12062 	}
12063 
12064 	free(pgty);
12065 
12066 	if (scf_pg_delete(pg) != 0) {
12067 		result = scf_error();
12068 		if (result != SCF_ERROR_PERMISSION_DENIED)
12069 			scfdie();
12070 		goto out;
12071 	}
12072 
12073 	/*
12074 	 * We have to handle the case where we've just deleted the last
12075 	 * property group of a "dummy" entity (instance or service).
12076 	 * A "dummy" entity is an entity only present to hold an
12077 	 * external dependency.
12078 	 * So, in the case we deleted the last property group then we
12079 	 * can also delete the entity. If the entity is an instance then
12080 	 * we must verify if this was the last instance for the service
12081 	 * and if it is, we can also delete the service if it doesn't
12082 	 * have any property group either.
12083 	 */
12084 
12085 	result = SCF_ERROR_NONE;
12086 
12087 	if (isservice) {
12088 		svc = (scf_service_t *)entity;
12089 
12090 		if ((inst = scf_instance_create(g_hndl)) == NULL ||
12091 		    (iter = scf_iter_create(g_hndl)) == NULL)
12092 			scfdie();
12093 
12094 		name_buf = safe_malloc(max_scf_name_len + 1);
12095 	} else {
12096 		inst = (scf_instance_t *)entity;
12097 	}
12098 
12099 	/*
12100 	 * If the entity is an instance and we've just deleted its last
12101 	 * property group then we should delete it.
12102 	 */
12103 	if (!isservice && entity_has_no_pgs(entity, isservice)) {
12104 		/* find the service before deleting the inst. - needed later */
12105 		if ((svc = scf_service_create(g_hndl)) == NULL)
12106 			scfdie();
12107 
12108 		if (scf_instance_get_parent(inst, svc) != 0)
12109 			scfdie();
12110 
12111 		/* delete the instance */
12112 		if (scf_instance_delete(inst) != 0) {
12113 			if (scf_error() != SCF_ERROR_PERMISSION_DENIED)
12114 				scfdie();
12115 
12116 			result = SCF_ERROR_PERMISSION_DENIED;
12117 			goto out;
12118 		}
12119 		/* no need to refresh the instance */
12120 		inst = NULL;
12121 	}
12122 
12123 	/*
12124 	 * If the service has no more instances and pgs or we just deleted the
12125 	 * last instance and the service doesn't have anymore propery groups
12126 	 * then the service should be deleted.
12127 	 */
12128 	if (svc != NULL &&
12129 	    svc_has_no_insts(svc) &&
12130 	    entity_has_no_pgs((void *)svc, 1)) {
12131 		if (scf_service_delete(svc) == 0) {
12132 			if (isservice) {
12133 				/* no need to refresh the service */
12134 				svc = NULL;
12135 			}
12136 
12137 			goto out;
12138 		}
12139 
12140 		if (scf_error() != SCF_ERROR_PERMISSION_DENIED)
12141 			scfdie();
12142 
12143 		result = SCF_ERROR_PERMISSION_DENIED;
12144 	}
12145 
12146 	/* if the entity has not been deleted, refresh it */
12147 	if ((isservice && svc != NULL) || (!isservice && inst != NULL)) {
12148 		(void) refresh_entity(isservice, entity, fmri, inst, iter,
12149 		    name_buf);
12150 	}
12151 
12152 out:
12153 	if (isservice && (inst != NULL && iter != NULL)) {
12154 		free(name_buf);
12155 		scf_iter_destroy(iter);
12156 		scf_instance_destroy(inst);
12157 	}
12158 
12159 	if (!isservice && svc != NULL) {
12160 		scf_service_destroy(svc);
12161 	}
12162 
12163 	scf_pg_destroy(pg);
12164 	if (entity != NULL)
12165 		entity_destroy(entity, isservice);
12166 
12167 	return (result);
12168 }
12169 
12170 static int
12171 delete_dependents(scf_propertygroup_t *pg)
12172 {
12173 	char *pgty, *name, *fmri;
12174 	scf_property_t *prop;
12175 	scf_value_t *val;
12176 	scf_iter_t *iter;
12177 	int r;
12178 	scf_error_t err;
12179 
12180 	/* Verify that the pg has the correct type. */
12181 	pgty = safe_malloc(max_scf_pg_type_len + 1);
12182 	if (scf_pg_get_type(pg, pgty, max_scf_pg_type_len + 1) < 0)
12183 		scfdie();
12184 
12185 	if (strcmp(pgty, scf_group_framework) != 0) {
12186 		if (g_verbose) {
12187 			fmri = safe_malloc(max_scf_fmri_len + 1);
12188 			if (scf_pg_to_fmri(pg, fmri, max_scf_fmri_len + 1) < 0)
12189 				scfdie();
12190 
12191 			warn(gettext("Property group %s is not of expected "
12192 			    "type %s.\n"), fmri, scf_group_framework);
12193 
12194 			free(fmri);
12195 		}
12196 
12197 		free(pgty);
12198 		return (-1);
12199 	}
12200 
12201 	free(pgty);
12202 
12203 	/* map delete_dependency_pg onto the properties. */
12204 	if ((prop = scf_property_create(g_hndl)) == NULL ||
12205 	    (val = scf_value_create(g_hndl)) == NULL ||
12206 	    (iter = scf_iter_create(g_hndl)) == NULL)
12207 		scfdie();
12208 
12209 	if (scf_iter_pg_properties(iter, pg) != SCF_SUCCESS)
12210 		scfdie();
12211 
12212 	name = safe_malloc(max_scf_name_len + 1);
12213 	fmri = safe_malloc(max_scf_fmri_len + 2);
12214 
12215 	while ((r = scf_iter_next_property(iter, prop)) == 1) {
12216 		scf_type_t ty;
12217 
12218 		if (scf_property_get_name(prop, name, max_scf_name_len + 1) < 0)
12219 			scfdie();
12220 
12221 		if (scf_property_type(prop, &ty) != SCF_SUCCESS)
12222 			scfdie();
12223 
12224 		if ((ty != SCF_TYPE_ASTRING &&
12225 		    prop_check_type(prop, SCF_TYPE_FMRI) != 0) ||
12226 		    prop_get_val(prop, val) != 0)
12227 			continue;
12228 
12229 		if (scf_value_get_astring(val, fmri, max_scf_fmri_len + 2) < 0)
12230 			scfdie();
12231 
12232 		err = delete_dependency_pg(fmri, name);
12233 		if (err == SCF_ERROR_INVALID_ARGUMENT && g_verbose) {
12234 			if (scf_property_to_fmri(prop, fmri,
12235 			    max_scf_fmri_len + 2) < 0)
12236 				scfdie();
12237 
12238 			warn(gettext("Value of %s is not a valid FMRI.\n"),
12239 			    fmri);
12240 		} else if (err == SCF_ERROR_TYPE_MISMATCH && g_verbose) {
12241 			warn(gettext("Property group \"%s\" of entity \"%s\" "
12242 			    "does not have dependency type.\n"), name, fmri);
12243 		} else if (err == SCF_ERROR_PERMISSION_DENIED && g_verbose) {
12244 			warn(gettext("Could not delete property group \"%s\" "
12245 			    "of entity \"%s\" (permission denied).\n"), name,
12246 			    fmri);
12247 		}
12248 	}
12249 	if (r == -1)
12250 		scfdie();
12251 
12252 	scf_value_destroy(val);
12253 	scf_property_destroy(prop);
12254 
12255 	return (0);
12256 }
12257 
12258 /*
12259  * Returns 1 if the instance may be running, and 0 otherwise.
12260  */
12261 static int
12262 inst_is_running(scf_instance_t *inst)
12263 {
12264 	scf_propertygroup_t *pg;
12265 	scf_property_t *prop;
12266 	scf_value_t *val;
12267 	char buf[MAX_SCF_STATE_STRING_SZ];
12268 	int ret = 0;
12269 	ssize_t szret;
12270 
12271 	if ((pg = scf_pg_create(g_hndl)) == NULL ||
12272 	    (prop = scf_property_create(g_hndl)) == NULL ||
12273 	    (val = scf_value_create(g_hndl)) == NULL)
12274 		scfdie();
12275 
12276 	if (scf_instance_get_pg(inst, SCF_PG_RESTARTER, pg) != SCF_SUCCESS) {
12277 		if (scf_error() != SCF_ERROR_NOT_FOUND)
12278 			scfdie();
12279 		goto out;
12280 	}
12281 
12282 	if (pg_get_prop(pg, SCF_PROPERTY_STATE, prop) != 0 ||
12283 	    prop_check_type(prop, SCF_TYPE_ASTRING) != 0 ||
12284 	    prop_get_val(prop, val) != 0)
12285 		goto out;
12286 
12287 	szret = scf_value_get_astring(val, buf, sizeof (buf));
12288 	assert(szret >= 0);
12289 
12290 	ret = (strcmp(buf, SCF_STATE_STRING_ONLINE) == 0 ||
12291 	    strcmp(buf, SCF_STATE_STRING_DEGRADED) == 0) ? 1 : 0;
12292 
12293 out:
12294 	scf_value_destroy(val);
12295 	scf_property_destroy(prop);
12296 	scf_pg_destroy(pg);
12297 	return (ret);
12298 }
12299 
12300 static uint8_t
12301 pg_is_external_dependency(scf_propertygroup_t *pg)
12302 {
12303 	char *type;
12304 	scf_value_t *val;
12305 	scf_property_t *prop;
12306 	uint8_t b = B_FALSE;
12307 
12308 	type = safe_malloc(max_scf_pg_type_len + 1);
12309 
12310 	if (scf_pg_get_type(pg, type, max_scf_pg_type_len + 1) < 0)
12311 		scfdie();
12312 
12313 	if ((prop = scf_property_create(g_hndl)) == NULL ||
12314 	    (val = scf_value_create(g_hndl)) == NULL)
12315 		scfdie();
12316 
12317 	if (strcmp(type, SCF_GROUP_DEPENDENCY) == 0) {
12318 		if (pg_get_prop(pg, scf_property_external, prop) == 0) {
12319 			if (scf_property_get_value(prop, val) != 0)
12320 				scfdie();
12321 			if (scf_value_get_boolean(val, &b) != 0)
12322 				scfdie();
12323 		}
12324 	}
12325 
12326 	free(type);
12327 	(void) scf_value_destroy(val);
12328 	(void) scf_property_destroy(prop);
12329 
12330 	return (b);
12331 }
12332 
12333 #define	DELETE_FAILURE			-1
12334 #define	DELETE_SUCCESS_NOEXTDEPS	0
12335 #define	DELETE_SUCCESS_EXTDEPS		1
12336 
12337 /*
12338  * lscf_instance_delete() deletes an instance.  Before calling
12339  * scf_instance_delete(), though, we make sure the instance isn't
12340  * running and delete dependencies in other entities which the instance
12341  * declared as "dependents".  If there are dependencies which were
12342  * created for other entities, then instead of deleting the instance we
12343  * make it "empty" by deleting all other property groups and all
12344  * snapshots.
12345  *
12346  * lscf_instance_delete() verifies that there is no external dependency pgs
12347  * before suppressing the instance. If there is, then we must not remove them
12348  * now in case the instance is re-created otherwise the dependencies would be
12349  * lost. The external dependency pgs will be removed if the dependencies are
12350  * removed.
12351  *
12352  * Returns:
12353  *  DELETE_FAILURE		on failure
12354  *  DELETE_SUCCESS_NOEXTDEPS	on success - no external dependencies
12355  *  DELETE_SUCCESS_EXTDEPS	on success - external dependencies
12356  */
12357 static int
12358 lscf_instance_delete(scf_instance_t *inst, int force)
12359 {
12360 	scf_propertygroup_t *pg;
12361 	scf_snapshot_t *snap;
12362 	scf_iter_t *iter;
12363 	int err;
12364 	int external = 0;
12365 
12366 	/* If we're not forcing and the instance is running, refuse. */
12367 	if (!force && inst_is_running(inst)) {
12368 		char *fmri;
12369 
12370 		fmri = safe_malloc(max_scf_fmri_len + 1);
12371 
12372 		if (scf_instance_to_fmri(inst, fmri, max_scf_fmri_len + 1) < 0)
12373 			scfdie();
12374 
12375 		semerr(gettext("Instance %s may be running.  "
12376 		    "Use delete -f if it is not.\n"), fmri);
12377 
12378 		free(fmri);
12379 		return (DELETE_FAILURE);
12380 	}
12381 
12382 	pg = scf_pg_create(g_hndl);
12383 	if (pg == NULL)
12384 		scfdie();
12385 
12386 	if (scf_instance_get_pg(inst, SCF_PG_DEPENDENTS, pg) == 0)
12387 		(void) delete_dependents(pg);
12388 	else if (scf_error() != SCF_ERROR_NOT_FOUND)
12389 		scfdie();
12390 
12391 	scf_pg_destroy(pg);
12392 
12393 	/*
12394 	 * If the instance has some external dependencies then we must
12395 	 * keep them in case the instance is reimported otherwise the
12396 	 * dependencies would be lost on reimport.
12397 	 */
12398 	if ((iter = scf_iter_create(g_hndl)) == NULL ||
12399 	    (pg = scf_pg_create(g_hndl)) == NULL)
12400 		scfdie();
12401 
12402 	if (scf_iter_instance_pgs(iter, inst) < 0)
12403 		scfdie();
12404 
12405 	while ((err = scf_iter_next_pg(iter, pg)) == 1) {
12406 		if (pg_is_external_dependency(pg)) {
12407 			external = 1;
12408 			continue;
12409 		}
12410 
12411 		if (scf_pg_delete(pg) != 0) {
12412 			if (scf_error() != SCF_ERROR_PERMISSION_DENIED)
12413 				scfdie();
12414 			else {
12415 				semerr(emsg_permission_denied);
12416 
12417 				(void) scf_iter_destroy(iter);
12418 				(void) scf_pg_destroy(pg);
12419 				return (DELETE_FAILURE);
12420 			}
12421 		}
12422 	}
12423 
12424 	if (err == -1)
12425 		scfdie();
12426 
12427 	(void) scf_iter_destroy(iter);
12428 	(void) scf_pg_destroy(pg);
12429 
12430 	if (external) {
12431 		/*
12432 		 * All the pgs have been deleted for the instance except
12433 		 * the ones holding the external dependencies.
12434 		 * For the job to be complete, we must also delete the
12435 		 * snapshots associated with the instance.
12436 		 */
12437 		if ((snap = scf_snapshot_create((scf_handle_t *)g_hndl)) ==
12438 		    NULL)
12439 			scfdie();
12440 		if ((iter = scf_iter_create((scf_handle_t *)g_hndl)) == NULL)
12441 			scfdie();
12442 
12443 		if (scf_iter_instance_snapshots(iter, inst) == -1)
12444 			scfdie();
12445 
12446 		while ((err = scf_iter_next_snapshot(iter, snap)) == 1) {
12447 			if (_scf_snapshot_delete(snap) != 0) {
12448 				if (scf_error() != SCF_ERROR_PERMISSION_DENIED)
12449 					scfdie();
12450 
12451 				semerr(emsg_permission_denied);
12452 
12453 				(void) scf_iter_destroy(iter);
12454 				(void) scf_snapshot_destroy(snap);
12455 				return (DELETE_FAILURE);
12456 			}
12457 		}
12458 
12459 		if (err == -1)
12460 			scfdie();
12461 
12462 		(void) scf_iter_destroy(iter);
12463 		(void) scf_snapshot_destroy(snap);
12464 		return (DELETE_SUCCESS_EXTDEPS);
12465 	}
12466 
12467 	if (scf_instance_delete(inst) != 0) {
12468 		if (scf_error() != SCF_ERROR_PERMISSION_DENIED)
12469 			scfdie();
12470 
12471 		semerr(emsg_permission_denied);
12472 
12473 		return (DELETE_FAILURE);
12474 	}
12475 
12476 	return (DELETE_SUCCESS_NOEXTDEPS);
12477 }
12478 
12479 /*
12480  * lscf_service_delete() deletes a service.  Before calling
12481  * scf_service_delete(), though, we call lscf_instance_delete() for
12482  * each of the instances and delete dependencies in other entities
12483  * which were created as "dependents" of this service.  If there are
12484  * dependencies which were created for other entities, then we delete
12485  * all other property groups in the service and leave it as "empty".
12486  *
12487  * lscf_service_delete() verifies that there is no external dependency
12488  * pgs at the instance & service level before suppressing the service.
12489  * If there is, then we must not remove them now in case the service
12490  * is re-imported otherwise the dependencies would be lost. The external
12491  * dependency pgs will be removed if the dependencies are removed.
12492  *
12493  * Returns:
12494  *   DELETE_FAILURE		on failure
12495  *   DELETE_SUCCESS_NOEXTDEPS	on success - no external dependencies
12496  *   DELETE_SUCCESS_EXTDEPS	on success - external dependencies
12497  */
12498 static int
12499 lscf_service_delete(scf_service_t *svc, int force)
12500 {
12501 	int r;
12502 	scf_instance_t *inst;
12503 	scf_propertygroup_t *pg;
12504 	scf_iter_t *iter;
12505 	int ret;
12506 	int external = 0;
12507 
12508 	if ((inst = scf_instance_create(g_hndl)) == NULL ||
12509 	    (pg = scf_pg_create(g_hndl)) == NULL ||
12510 	    (iter = scf_iter_create(g_hndl)) == NULL)
12511 		scfdie();
12512 
12513 	if (scf_iter_service_instances(iter, svc) != 0)
12514 		scfdie();
12515 
12516 	for (r = scf_iter_next_instance(iter, inst);
12517 	    r == 1;
12518 	    r = scf_iter_next_instance(iter, inst)) {
12519 
12520 		ret = lscf_instance_delete(inst, force);
12521 		if (ret == DELETE_FAILURE) {
12522 			scf_iter_destroy(iter);
12523 			scf_pg_destroy(pg);
12524 			scf_instance_destroy(inst);
12525 			return (DELETE_FAILURE);
12526 		}
12527 
12528 		/*
12529 		 * Record the fact that there is some external dependencies
12530 		 * at the instance level.
12531 		 */
12532 		if (ret == DELETE_SUCCESS_EXTDEPS)
12533 			external |= 1;
12534 	}
12535 
12536 	if (r != 0)
12537 		scfdie();
12538 
12539 	/* Delete dependency property groups in dependent services. */
12540 	if (scf_service_get_pg(svc, SCF_PG_DEPENDENTS, pg) == 0)
12541 		(void) delete_dependents(pg);
12542 	else if (scf_error() != SCF_ERROR_NOT_FOUND)
12543 		scfdie();
12544 
12545 	scf_iter_destroy(iter);
12546 	scf_pg_destroy(pg);
12547 	scf_instance_destroy(inst);
12548 
12549 	/*
12550 	 * If the service has some external dependencies then we don't
12551 	 * want to remove them in case the service is re-imported.
12552 	 */
12553 	if ((pg = scf_pg_create(g_hndl)) == NULL ||
12554 	    (iter = scf_iter_create(g_hndl)) == NULL)
12555 		scfdie();
12556 
12557 	if (scf_iter_service_pgs(iter, svc) < 0)
12558 		scfdie();
12559 
12560 	while ((r = scf_iter_next_pg(iter, pg)) == 1) {
12561 		if (pg_is_external_dependency(pg)) {
12562 			external |= 2;
12563 			continue;
12564 		}
12565 
12566 		if (scf_pg_delete(pg) != 0) {
12567 			if (scf_error() != SCF_ERROR_PERMISSION_DENIED)
12568 				scfdie();
12569 			else {
12570 				semerr(emsg_permission_denied);
12571 
12572 				(void) scf_iter_destroy(iter);
12573 				(void) scf_pg_destroy(pg);
12574 				return (DELETE_FAILURE);
12575 			}
12576 		}
12577 	}
12578 
12579 	if (r == -1)
12580 		scfdie();
12581 
12582 	(void) scf_iter_destroy(iter);
12583 	(void) scf_pg_destroy(pg);
12584 
12585 	if (external != 0)
12586 		return (DELETE_SUCCESS_EXTDEPS);
12587 
12588 	if (scf_service_delete(svc) == 0)
12589 		return (DELETE_SUCCESS_NOEXTDEPS);
12590 
12591 	if (scf_error() != SCF_ERROR_PERMISSION_DENIED)
12592 		scfdie();
12593 
12594 	semerr(emsg_permission_denied);
12595 	return (DELETE_FAILURE);
12596 }
12597 
12598 static int
12599 delete_callback(void *data, scf_walkinfo_t *wip)
12600 {
12601 	int force = (int)data;
12602 
12603 	if (wip->inst != NULL)
12604 		(void) lscf_instance_delete(wip->inst, force);
12605 	else
12606 		(void) lscf_service_delete(wip->svc, force);
12607 
12608 	return (0);
12609 }
12610 
12611 void
12612 lscf_delete(const char *fmri, int force)
12613 {
12614 	scf_service_t *svc;
12615 	scf_instance_t *inst;
12616 	int ret;
12617 
12618 	lscf_prep_hndl();
12619 
12620 	if (cur_snap != NULL) {
12621 		if (!snaplevel_is_instance(cur_level)) {
12622 			char *buf;
12623 
12624 			buf = safe_malloc(max_scf_name_len + 1);
12625 			if (scf_instance_get_name(cur_inst, buf,
12626 			    max_scf_name_len + 1) >= 0) {
12627 				if (strcmp(buf, fmri) == 0) {
12628 					semerr(emsg_cant_modify_snapshots);
12629 					free(buf);
12630 					return;
12631 				}
12632 			} else if (scf_error() != SCF_ERROR_DELETED) {
12633 				scfdie();
12634 			}
12635 			free(buf);
12636 		}
12637 	} else if (cur_inst != NULL) {
12638 		/* EMPTY */;
12639 	} else if (cur_svc != NULL) {
12640 		inst = scf_instance_create(g_hndl);
12641 		if (inst == NULL)
12642 			scfdie();
12643 
12644 		if (scf_service_get_instance(cur_svc, fmri, inst) ==
12645 		    SCF_SUCCESS) {
12646 			(void) lscf_instance_delete(inst, force);
12647 			scf_instance_destroy(inst);
12648 			return;
12649 		}
12650 
12651 		if (scf_error() != SCF_ERROR_NOT_FOUND &&
12652 		    scf_error() != SCF_ERROR_INVALID_ARGUMENT)
12653 			scfdie();
12654 
12655 		scf_instance_destroy(inst);
12656 	} else {
12657 		assert(cur_scope != NULL);
12658 
12659 		svc = scf_service_create(g_hndl);
12660 		if (svc == NULL)
12661 			scfdie();
12662 
12663 		if (scf_scope_get_service(cur_scope, fmri, svc) ==
12664 		    SCF_SUCCESS) {
12665 			(void) lscf_service_delete(svc, force);
12666 			scf_service_destroy(svc);
12667 			return;
12668 		}
12669 
12670 		if (scf_error() != SCF_ERROR_NOT_FOUND &&
12671 		    scf_error() != SCF_ERROR_INVALID_ARGUMENT)
12672 			scfdie();
12673 
12674 		scf_service_destroy(svc);
12675 	}
12676 
12677 	/*
12678 	 * Match FMRI to entity.
12679 	 */
12680 	if ((ret = scf_walk_fmri(g_hndl, 1, (char **)&fmri, SCF_WALK_SERVICE,
12681 	    delete_callback, (void *)force, NULL, semerr)) != 0) {
12682 		semerr(gettext("Failed to walk instances: %s\n"),
12683 		    scf_strerror(ret));
12684 	}
12685 }
12686 
12687 
12688 
12689 /*
12690  * :properties commands.  These all end with "pg" or "prop" and generally
12691  * operate on the currently selected entity.
12692  */
12693 
12694 /*
12695  * Property listing.  List the property groups, properties, their types and
12696  * their values for the currently selected entity.
12697  */
12698 static void
12699 list_pg_info(const scf_propertygroup_t *pg, const char *name, size_t namewidth)
12700 {
12701 	char *buf;
12702 	uint32_t flags;
12703 
12704 	buf = safe_malloc(max_scf_pg_type_len + 1);
12705 
12706 	if (scf_pg_get_type(pg, buf, max_scf_pg_type_len + 1) < 0)
12707 		scfdie();
12708 
12709 	if (scf_pg_get_flags(pg, &flags) != SCF_SUCCESS)
12710 		scfdie();
12711 
12712 	safe_printf("%-*s  %s", namewidth, name, buf);
12713 
12714 	if (flags & SCF_PG_FLAG_NONPERSISTENT)
12715 		safe_printf("\tNONPERSISTENT");
12716 
12717 	safe_printf("\n");
12718 
12719 	free(buf);
12720 }
12721 
12722 static boolean_t
12723 prop_has_multiple_values(const scf_property_t *prop, scf_value_t *val)
12724 {
12725 	if (scf_property_get_value(prop, val) == 0) {
12726 		return (B_FALSE);
12727 	} else {
12728 		switch (scf_error()) {
12729 		case SCF_ERROR_NOT_FOUND:
12730 			return (B_FALSE);
12731 		case SCF_ERROR_PERMISSION_DENIED:
12732 		case SCF_ERROR_CONSTRAINT_VIOLATED:
12733 			return (B_TRUE);
12734 		default:
12735 			scfdie();
12736 			/*NOTREACHED*/
12737 		}
12738 	}
12739 }
12740 
12741 static void
12742 list_prop_info(const scf_property_t *prop, const char *name, size_t len)
12743 {
12744 	scf_iter_t *iter;
12745 	scf_value_t *val;
12746 	const char *type;
12747 	int multiple_strings = 0;
12748 	int ret;
12749 
12750 	if ((iter = scf_iter_create(g_hndl)) == NULL ||
12751 	    (val = scf_value_create(g_hndl)) == NULL)
12752 		scfdie();
12753 
12754 	type = prop_to_typestr(prop);
12755 	assert(type != NULL);
12756 
12757 	safe_printf("%-*s  %-7s ", len, name, type);
12758 
12759 	if (prop_has_multiple_values(prop, val) &&
12760 	    (scf_value_type(val) == SCF_TYPE_ASTRING ||
12761 	    scf_value_type(val) == SCF_TYPE_USTRING))
12762 		multiple_strings = 1;
12763 
12764 	if (scf_iter_property_values(iter, prop) != SCF_SUCCESS)
12765 		scfdie();
12766 
12767 	while ((ret = scf_iter_next_value(iter, val)) == 1) {
12768 		char *buf;
12769 		ssize_t vlen, szret;
12770 
12771 		vlen = scf_value_get_as_string(val, NULL, 0);
12772 		if (vlen < 0)
12773 			scfdie();
12774 
12775 		buf = safe_malloc(vlen + 1);
12776 
12777 		szret = scf_value_get_as_string(val, buf, vlen + 1);
12778 		if (szret < 0)
12779 			scfdie();
12780 		assert(szret <= vlen);
12781 
12782 		/* This is to be human-readable, so don't use CHARS_TO_QUOTE */
12783 		if (multiple_strings || strpbrk(buf, " \t\n\"()") != NULL) {
12784 			safe_printf(" \"");
12785 			(void) quote_and_print(buf, stdout, 0);
12786 			(void) putchar('"');
12787 			if (ferror(stdout)) {
12788 				(void) putchar('\n');
12789 				uu_die(gettext("Error writing to stdout.\n"));
12790 			}
12791 		} else {
12792 			safe_printf(" %s", buf);
12793 		}
12794 
12795 		free(buf);
12796 	}
12797 	if (ret != 0 && scf_error() != SCF_ERROR_PERMISSION_DENIED)
12798 		scfdie();
12799 
12800 	if (putchar('\n') != '\n')
12801 		uu_die(gettext("Could not output newline"));
12802 }
12803 
12804 /*
12805  * Outputs template property group info for the describe subcommand.
12806  * If 'templates' == 2, verbose output is printed in the format expected
12807  * for describe -v, which includes all templates fields.  If pg is
12808  * not NULL, we're describing the template data, not an existing property
12809  * group, and formatting should be appropriate for describe -t.
12810  */
12811 static void
12812 list_pg_tmpl(scf_pg_tmpl_t *pgt, scf_propertygroup_t *pg, int templates)
12813 {
12814 	char *buf;
12815 	uint8_t required;
12816 	scf_property_t *stability_prop;
12817 	scf_value_t *stability_val;
12818 
12819 	if (templates == 0)
12820 		return;
12821 
12822 	if ((stability_prop = scf_property_create(g_hndl)) == NULL ||
12823 	    (stability_val = scf_value_create(g_hndl)) == NULL)
12824 		scfdie();
12825 
12826 	if (templates == 2 && pg != NULL) {
12827 		if (scf_pg_get_property(pg, SCF_PROPERTY_STABILITY,
12828 		    stability_prop) == 0) {
12829 			if (prop_check_type(stability_prop,
12830 			    SCF_TYPE_ASTRING) == 0 &&
12831 			    prop_get_val(stability_prop, stability_val) == 0) {
12832 				char *stability;
12833 
12834 				stability = safe_malloc(max_scf_value_len + 1);
12835 
12836 				if (scf_value_get_astring(stability_val,
12837 				    stability, max_scf_value_len + 1) == -1 &&
12838 				    scf_error() != SCF_ERROR_NOT_FOUND)
12839 					scfdie();
12840 
12841 				safe_printf("%s%s: %s\n", TMPL_INDENT,
12842 				    gettext("stability"), stability);
12843 
12844 				free(stability);
12845 			}
12846 		} else if (scf_error() != SCF_ERROR_NOT_FOUND)
12847 			scfdie();
12848 	}
12849 
12850 	scf_property_destroy(stability_prop);
12851 	scf_value_destroy(stability_val);
12852 
12853 	if (pgt == NULL)
12854 		return;
12855 
12856 	if (pg == NULL || templates == 2) {
12857 		/* print type info only if scf_tmpl_pg_name succeeds */
12858 		if (scf_tmpl_pg_name(pgt, &buf) != -1) {
12859 			if (pg != NULL)
12860 				safe_printf("%s", TMPL_INDENT);
12861 			safe_printf("%s: ", gettext("name"));
12862 			safe_printf("%s\n", buf);
12863 			free(buf);
12864 		}
12865 
12866 		/* print type info only if scf_tmpl_pg_type succeeds */
12867 		if (scf_tmpl_pg_type(pgt, &buf) != -1) {
12868 			if (pg != NULL)
12869 				safe_printf("%s", TMPL_INDENT);
12870 			safe_printf("%s: ", gettext("type"));
12871 			safe_printf("%s\n", buf);
12872 			free(buf);
12873 		}
12874 	}
12875 
12876 	if (templates == 2 && scf_tmpl_pg_required(pgt, &required) == 0)
12877 		safe_printf("%s%s: %s\n", TMPL_INDENT, gettext("required"),
12878 		    required ? "true" : "false");
12879 
12880 	if (templates == 2 && scf_tmpl_pg_target(pgt, &buf) > 0) {
12881 		safe_printf("%s%s: %s\n", TMPL_INDENT, gettext("target"),
12882 		    buf);
12883 		free(buf);
12884 	}
12885 
12886 	if (templates == 2 && scf_tmpl_pg_common_name(pgt, NULL, &buf) > 0) {
12887 		safe_printf("%s%s: %s\n", TMPL_INDENT, gettext("common name"),
12888 		    buf);
12889 		free(buf);
12890 	}
12891 
12892 	if (scf_tmpl_pg_description(pgt, NULL, &buf) > 0) {
12893 		if (templates == 2)
12894 			safe_printf("%s%s: %s\n", TMPL_INDENT,
12895 			    gettext("description"), buf);
12896 		else
12897 			safe_printf("%s%s\n", TMPL_INDENT, buf);
12898 		free(buf);
12899 	}
12900 
12901 }
12902 
12903 /*
12904  * With as_value set to true, indent as appropriate for the value level.
12905  * If false, indent to appropriate level for inclusion in constraint
12906  * or choice printout.
12907  */
12908 static void
12909 print_template_value_details(scf_prop_tmpl_t *prt, const char *val_buf,
12910     int as_value)
12911 {
12912 	char *buf;
12913 
12914 	if (scf_tmpl_value_common_name(prt, NULL, val_buf, &buf) > 0) {
12915 		if (as_value == 0)
12916 			safe_printf("%s", TMPL_CHOICE_INDENT);
12917 		else
12918 			safe_printf("%s", TMPL_INDENT);
12919 		safe_printf("%s: %s\n", gettext("value common name"), buf);
12920 		free(buf);
12921 	}
12922 
12923 	if (scf_tmpl_value_description(prt, NULL, val_buf, &buf) > 0) {
12924 		if (as_value == 0)
12925 			safe_printf("%s", TMPL_CHOICE_INDENT);
12926 		else
12927 			safe_printf("%s", TMPL_INDENT);
12928 		safe_printf("%s: %s\n", gettext("value description"), buf);
12929 		free(buf);
12930 	}
12931 }
12932 
12933 static void
12934 print_template_value(scf_prop_tmpl_t *prt, const char *val_buf)
12935 {
12936 	safe_printf("%s%s: ", TMPL_VALUE_INDENT, gettext("value"));
12937 	/* This is to be human-readable, so don't use CHARS_TO_QUOTE */
12938 	safe_printf("%s\n", val_buf);
12939 
12940 	print_template_value_details(prt, val_buf, 1);
12941 }
12942 
12943 static void
12944 print_template_constraints(scf_prop_tmpl_t *prt, int verbose)
12945 {
12946 	int i, printed = 0;
12947 	scf_values_t values;
12948 	scf_count_ranges_t c_ranges;
12949 	scf_int_ranges_t i_ranges;
12950 
12951 	printed = 0;
12952 	i = 0;
12953 	if (scf_tmpl_value_name_constraints(prt, &values) == 0) {
12954 		safe_printf("%s%s:\n", TMPL_VALUE_INDENT,
12955 		    gettext("value constraints"));
12956 		printed++;
12957 		for (i = 0; i < values.value_count; ++i) {
12958 			safe_printf("%s%s: %s\n", TMPL_INDENT,
12959 			    gettext("value name"), values.values_as_strings[i]);
12960 			if (verbose == 1)
12961 				print_template_value_details(prt,
12962 				    values.values_as_strings[i], 0);
12963 		}
12964 
12965 		scf_values_destroy(&values);
12966 	}
12967 
12968 	if (scf_tmpl_value_count_range_constraints(prt, &c_ranges) == 0) {
12969 		if (printed++ == 0)
12970 			safe_printf("%s%s:\n", TMPL_VALUE_INDENT,
12971 			    gettext("value constraints"));
12972 		for (i = 0; i < c_ranges.scr_num_ranges; ++i) {
12973 			safe_printf("%s%s: %llu to %llu\n", TMPL_INDENT,
12974 			    gettext("range"), c_ranges.scr_min[i],
12975 			    c_ranges.scr_max[i]);
12976 		}
12977 		scf_count_ranges_destroy(&c_ranges);
12978 	} else if (scf_error() == SCF_ERROR_CONSTRAINT_VIOLATED &&
12979 	    scf_tmpl_value_int_range_constraints(prt, &i_ranges) == 0) {
12980 		if (printed++ == 0)
12981 			safe_printf("%s%s:\n", TMPL_VALUE_INDENT,
12982 			    gettext("value constraints"));
12983 		for (i = 0; i < i_ranges.sir_num_ranges; ++i) {
12984 			safe_printf("%s%s: %lld to %lld\n", TMPL_INDENT,
12985 			    gettext("range"), i_ranges.sir_min[i],
12986 			    i_ranges.sir_max[i]);
12987 		}
12988 		scf_int_ranges_destroy(&i_ranges);
12989 	}
12990 }
12991 
12992 static void
12993 print_template_choices(scf_prop_tmpl_t *prt, int verbose)
12994 {
12995 	int i = 0, printed = 0;
12996 	scf_values_t values;
12997 	scf_count_ranges_t c_ranges;
12998 	scf_int_ranges_t i_ranges;
12999 
13000 	printed = 0;
13001 	if (scf_tmpl_value_name_choices(prt, &values) == 0) {
13002 		safe_printf("%s%s:\n", TMPL_VALUE_INDENT,
13003 		    gettext("value constraints"));
13004 		printed++;
13005 		for (i = 0; i < values.value_count; i++) {
13006 			safe_printf("%s%s: %s\n", TMPL_INDENT,
13007 			    gettext("value name"), values.values_as_strings[i]);
13008 			if (verbose == 1)
13009 				print_template_value_details(prt,
13010 				    values.values_as_strings[i], 0);
13011 		}
13012 
13013 		scf_values_destroy(&values);
13014 	}
13015 
13016 	if (scf_tmpl_value_count_range_choices(prt, &c_ranges) == 0) {
13017 		for (i = 0; i < c_ranges.scr_num_ranges; ++i) {
13018 			if (printed++ == 0)
13019 				safe_printf("%s%s:\n", TMPL_VALUE_INDENT,
13020 				    gettext("value choices"));
13021 			safe_printf("%s%s: %llu to %llu\n", TMPL_INDENT,
13022 			    gettext("range"), c_ranges.scr_min[i],
13023 			    c_ranges.scr_max[i]);
13024 		}
13025 		scf_count_ranges_destroy(&c_ranges);
13026 	} else if (scf_error() == SCF_ERROR_CONSTRAINT_VIOLATED &&
13027 	    scf_tmpl_value_int_range_choices(prt, &i_ranges) == 0) {
13028 		for (i = 0; i < i_ranges.sir_num_ranges; ++i) {
13029 			if (printed++ == 0)
13030 				safe_printf("%s%s:\n", TMPL_VALUE_INDENT,
13031 				    gettext("value choices"));
13032 			safe_printf("%s%s: %lld to %lld\n", TMPL_INDENT,
13033 			    gettext("range"), i_ranges.sir_min[i],
13034 			    i_ranges.sir_max[i]);
13035 		}
13036 		scf_int_ranges_destroy(&i_ranges);
13037 	}
13038 }
13039 
13040 static void
13041 list_values_by_template(scf_prop_tmpl_t *prt)
13042 {
13043 	print_template_constraints(prt, 1);
13044 	print_template_choices(prt, 1);
13045 }
13046 
13047 static void
13048 list_values_tmpl(scf_prop_tmpl_t *prt, scf_property_t *prop)
13049 {
13050 	char *val_buf;
13051 	scf_iter_t *iter;
13052 	scf_value_t *val;
13053 	int ret;
13054 
13055 	if ((iter = scf_iter_create(g_hndl)) == NULL ||
13056 	    (val = scf_value_create(g_hndl)) == NULL)
13057 		scfdie();
13058 
13059 	if (scf_iter_property_values(iter, prop) != SCF_SUCCESS)
13060 		scfdie();
13061 
13062 	val_buf = safe_malloc(max_scf_value_len + 1);
13063 
13064 	while ((ret = scf_iter_next_value(iter, val)) == 1) {
13065 		if (scf_value_get_as_string(val, val_buf,
13066 		    max_scf_value_len + 1) < 0)
13067 			scfdie();
13068 
13069 		print_template_value(prt, val_buf);
13070 	}
13071 	if (ret != 0 && scf_error() != SCF_ERROR_PERMISSION_DENIED)
13072 		scfdie();
13073 	free(val_buf);
13074 
13075 	print_template_constraints(prt, 0);
13076 	print_template_choices(prt, 0);
13077 
13078 }
13079 
13080 /*
13081  * Outputs property info for the describe subcommand
13082  * Verbose output if templates == 2, -v option of svccfg describe
13083  * Displays template data if prop is not NULL, -t option of svccfg describe
13084  */
13085 static void
13086 list_prop_tmpl(scf_prop_tmpl_t *prt, scf_property_t *prop, int templates)
13087 {
13088 	char *buf;
13089 	uint8_t u_buf;
13090 	int i;
13091 	uint64_t min, max;
13092 	scf_values_t values;
13093 
13094 	if (prt == NULL || templates == 0)
13095 		return;
13096 
13097 	if (prop == NULL) {
13098 		safe_printf("%s%s: ", TMPL_VALUE_INDENT, gettext("name"));
13099 		if (scf_tmpl_prop_name(prt, &buf) > 0) {
13100 			safe_printf("%s\n", buf);
13101 			free(buf);
13102 		} else
13103 			safe_printf("(%s)\n", gettext("any"));
13104 	}
13105 
13106 	if (prop == NULL || templates == 2) {
13107 		if (prop != NULL)
13108 			safe_printf("%s", TMPL_INDENT);
13109 		else
13110 			safe_printf("%s", TMPL_VALUE_INDENT);
13111 		safe_printf("%s: ", gettext("type"));
13112 		if ((buf = _scf_read_tmpl_prop_type_as_string(prt)) != NULL) {
13113 			safe_printf("%s\n", buf);
13114 			free(buf);
13115 		} else
13116 			safe_printf("(%s)\n", gettext("any"));
13117 	}
13118 
13119 	if (templates == 2 && scf_tmpl_prop_required(prt, &u_buf) == 0)
13120 		safe_printf("%s%s: %s\n", TMPL_INDENT, gettext("required"),
13121 		    u_buf ? "true" : "false");
13122 
13123 	if (templates == 2 && scf_tmpl_prop_common_name(prt, NULL, &buf) > 0) {
13124 		safe_printf("%s%s: %s\n", TMPL_INDENT, gettext("common name"),
13125 		    buf);
13126 		free(buf);
13127 	}
13128 
13129 	if (templates == 2 && scf_tmpl_prop_units(prt, NULL, &buf) > 0) {
13130 		safe_printf("%s%s: %s\n", TMPL_INDENT, gettext("units"),
13131 		    buf);
13132 		free(buf);
13133 	}
13134 
13135 	if (scf_tmpl_prop_description(prt, NULL, &buf) > 0) {
13136 		safe_printf("%s%s\n", TMPL_INDENT, buf);
13137 		free(buf);
13138 	}
13139 
13140 	if (templates == 2 && scf_tmpl_prop_visibility(prt, &u_buf) == 0)
13141 		safe_printf("%s%s: %s\n", TMPL_INDENT, gettext("visibility"),
13142 		    scf_tmpl_visibility_to_string(u_buf));
13143 
13144 	if (templates == 2 && scf_tmpl_prop_cardinality(prt, &min, &max) == 0) {
13145 		safe_printf("%s%s: %" PRIu64 "\n", TMPL_INDENT,
13146 		    gettext("minimum number of values"), min);
13147 		if (max == ULLONG_MAX) {
13148 			safe_printf("%s%s: %s\n", TMPL_INDENT,
13149 			    gettext("maximum number of values"),
13150 			    gettext("unlimited"));
13151 		} else {
13152 			safe_printf("%s%s: %" PRIu64 "\n", TMPL_INDENT,
13153 			    gettext("maximum number of values"), max);
13154 		}
13155 	}
13156 
13157 	if (templates == 2 && scf_tmpl_prop_internal_seps(prt, &values) == 0) {
13158 		for (i = 0; i < values.value_count; i++) {
13159 			if (i == 0) {
13160 				safe_printf("%s%s:", TMPL_INDENT,
13161 				    gettext("internal separators"));
13162 			}
13163 			safe_printf(" \"%s\"", values.values_as_strings[i]);
13164 		}
13165 		safe_printf("\n");
13166 	}
13167 
13168 	if (templates != 2)
13169 		return;
13170 
13171 	if (prop != NULL)
13172 		list_values_tmpl(prt, prop);
13173 	else
13174 		list_values_by_template(prt);
13175 }
13176 
13177 static char *
13178 read_astring(scf_propertygroup_t *pg, const char *prop_name)
13179 {
13180 	char *rv;
13181 
13182 	rv = _scf_read_single_astring_from_pg(pg, prop_name);
13183 	if (rv == NULL) {
13184 		switch (scf_error()) {
13185 		case SCF_ERROR_NOT_FOUND:
13186 			break;
13187 		default:
13188 			scfdie();
13189 		}
13190 	}
13191 	return (rv);
13192 }
13193 
13194 static void
13195 display_documentation(scf_iter_t *iter, scf_propertygroup_t *pg)
13196 {
13197 	size_t doc_len;
13198 	size_t man_len;
13199 	char *pg_name;
13200 	char *text = NULL;
13201 	int rv;
13202 
13203 	doc_len = strlen(SCF_PG_TM_DOC_PREFIX);
13204 	man_len = strlen(SCF_PG_TM_MAN_PREFIX);
13205 	pg_name = safe_malloc(max_scf_name_len + 1);
13206 	while ((rv = scf_iter_next_pg(iter, pg)) == 1) {
13207 		if (scf_pg_get_name(pg, pg_name, max_scf_name_len + 1) == -1) {
13208 			scfdie();
13209 		}
13210 		if (strncmp(pg_name, SCF_PG_TM_DOC_PREFIX, doc_len) == 0) {
13211 			/* Display doc_link and and uri */
13212 			safe_printf("%s%s:\n", TMPL_INDENT,
13213 			    gettext("doc_link"));
13214 			text = read_astring(pg, SCF_PROPERTY_TM_NAME);
13215 			if (text != NULL) {
13216 				safe_printf("%s%s%s: %s\n", TMPL_INDENT,
13217 				    TMPL_INDENT, gettext("name"), text);
13218 				uu_free(text);
13219 			}
13220 			text = read_astring(pg, SCF_PROPERTY_TM_URI);
13221 			if (text != NULL) {
13222 				safe_printf("%s%s: %s\n", TMPL_INDENT_2X,
13223 				    gettext("uri"), text);
13224 				uu_free(text);
13225 			}
13226 		} else if (strncmp(pg_name, SCF_PG_TM_MAN_PREFIX,
13227 		    man_len) == 0) {
13228 			/* Display manpage title, section and path */
13229 			safe_printf("%s%s:\n", TMPL_INDENT,
13230 			    gettext("manpage"));
13231 			text = read_astring(pg, SCF_PROPERTY_TM_TITLE);
13232 			if (text != NULL) {
13233 				safe_printf("%s%s%s: %s\n", TMPL_INDENT,
13234 				    TMPL_INDENT, gettext("title"), text);
13235 				uu_free(text);
13236 			}
13237 			text = read_astring(pg, SCF_PROPERTY_TM_SECTION);
13238 			if (text != NULL) {
13239 				safe_printf("%s%s%s: %s\n", TMPL_INDENT,
13240 				    TMPL_INDENT, gettext("section"), text);
13241 				uu_free(text);
13242 			}
13243 			text = read_astring(pg, SCF_PROPERTY_TM_MANPATH);
13244 			if (text != NULL) {
13245 				safe_printf("%s%s%s: %s\n", TMPL_INDENT,
13246 				    TMPL_INDENT, gettext("manpath"), text);
13247 				uu_free(text);
13248 			}
13249 		}
13250 	}
13251 	if (rv == -1)
13252 		scfdie();
13253 
13254 done:
13255 	free(pg_name);
13256 }
13257 
13258 static void
13259 list_entity_tmpl(int templates)
13260 {
13261 	char *common_name = NULL;
13262 	char *description = NULL;
13263 	char *locale = NULL;
13264 	scf_iter_t *iter;
13265 	scf_propertygroup_t *pg;
13266 	scf_property_t *prop;
13267 	int r;
13268 	scf_value_t *val;
13269 
13270 	if ((pg = scf_pg_create(g_hndl)) == NULL ||
13271 	    (prop = scf_property_create(g_hndl)) == NULL ||
13272 	    (val = scf_value_create(g_hndl)) == NULL ||
13273 	    (iter = scf_iter_create(g_hndl)) == NULL)
13274 		scfdie();
13275 
13276 	locale = setlocale(LC_MESSAGES, NULL);
13277 
13278 	if (get_pg(SCF_PG_TM_COMMON_NAME, pg) == 0) {
13279 		common_name = safe_malloc(max_scf_value_len + 1);
13280 
13281 		/* Try both the current locale and the "C" locale. */
13282 		if (scf_pg_get_property(pg, locale, prop) == 0 ||
13283 		    (scf_error() == SCF_ERROR_NOT_FOUND &&
13284 		    scf_pg_get_property(pg, "C", prop) == 0)) {
13285 			if (prop_get_val(prop, val) == 0 &&
13286 			    scf_value_get_ustring(val, common_name,
13287 			    max_scf_value_len + 1) != -1) {
13288 				safe_printf("%s%s: %s\n", TMPL_INDENT,
13289 				    gettext("common name"), common_name);
13290 			}
13291 		}
13292 	}
13293 
13294 	/*
13295 	 * Do description, manpages, and doc links if templates == 2.
13296 	 */
13297 	if (templates == 2) {
13298 		/* Get the description. */
13299 		if (get_pg(SCF_PG_TM_DESCRIPTION, pg) == 0) {
13300 			description = safe_malloc(max_scf_value_len + 1);
13301 
13302 			/* Try both the current locale and the "C" locale. */
13303 			if (scf_pg_get_property(pg, locale, prop) == 0 ||
13304 			    (scf_error() == SCF_ERROR_NOT_FOUND &&
13305 			    scf_pg_get_property(pg, "C", prop) == 0)) {
13306 				if (prop_get_val(prop, val) == 0 &&
13307 				    scf_value_get_ustring(val, description,
13308 				    max_scf_value_len + 1) != -1) {
13309 					safe_printf("%s%s: %s\n", TMPL_INDENT,
13310 					    gettext("description"),
13311 					    description);
13312 				}
13313 			}
13314 		}
13315 
13316 		/* Process doc_link & manpage elements. */
13317 		if (cur_level != NULL) {
13318 			r = scf_iter_snaplevel_pgs_typed(iter, cur_level,
13319 			    SCF_GROUP_TEMPLATE);
13320 		} else if (cur_inst != NULL) {
13321 			r = scf_iter_instance_pgs_typed(iter, cur_inst,
13322 			    SCF_GROUP_TEMPLATE);
13323 		} else {
13324 			r = scf_iter_service_pgs_typed(iter, cur_svc,
13325 			    SCF_GROUP_TEMPLATE);
13326 		}
13327 		if (r == 0) {
13328 			display_documentation(iter, pg);
13329 		}
13330 	}
13331 
13332 	free(common_name);
13333 	free(description);
13334 	scf_pg_destroy(pg);
13335 	scf_property_destroy(prop);
13336 	scf_value_destroy(val);
13337 	scf_iter_destroy(iter);
13338 }
13339 
13340 static void
13341 listtmpl(const char *pattern, int templates)
13342 {
13343 	scf_pg_tmpl_t *pgt;
13344 	scf_prop_tmpl_t *prt;
13345 	char *snapbuf = NULL;
13346 	char *fmribuf;
13347 	char *pg_name = NULL, *prop_name = NULL;
13348 	ssize_t prop_name_size;
13349 	char *qual_prop_name;
13350 	char *search_name;
13351 	int listed = 0;
13352 
13353 	if ((pgt = scf_tmpl_pg_create(g_hndl)) == NULL ||
13354 	    (prt = scf_tmpl_prop_create(g_hndl)) == NULL)
13355 		scfdie();
13356 
13357 	fmribuf = safe_malloc(max_scf_name_len + 1);
13358 	qual_prop_name = safe_malloc(max_scf_name_len + 1);
13359 
13360 	if (cur_snap != NULL) {
13361 		snapbuf = safe_malloc(max_scf_name_len + 1);
13362 		if (scf_snapshot_get_name(cur_snap, snapbuf,
13363 		    max_scf_name_len + 1) < 0)
13364 			scfdie();
13365 	}
13366 
13367 	if (cur_inst != NULL) {
13368 		if (scf_instance_to_fmri(cur_inst, fmribuf,
13369 		    max_scf_name_len + 1) < 0)
13370 			scfdie();
13371 	} else if (cur_svc != NULL) {
13372 		if (scf_service_to_fmri(cur_svc, fmribuf,
13373 		    max_scf_name_len + 1) < 0)
13374 			scfdie();
13375 	} else
13376 		abort();
13377 
13378 	/* If pattern is specified, we want to list only those items. */
13379 	while (scf_tmpl_iter_pgs(pgt, fmribuf, snapbuf, NULL, 0) == 1) {
13380 		listed = 0;
13381 		if (pattern == NULL || (scf_tmpl_pg_name(pgt, &pg_name) > 0 &&
13382 		    fnmatch(pattern, pg_name, 0) == 0)) {
13383 			list_pg_tmpl(pgt, NULL, templates);
13384 			listed++;
13385 		}
13386 
13387 		scf_tmpl_prop_reset(prt);
13388 
13389 		while (scf_tmpl_iter_props(pgt, prt, 0) == 0) {
13390 			search_name = NULL;
13391 			prop_name_size = scf_tmpl_prop_name(prt, &prop_name);
13392 			if ((prop_name_size > 0) && (pg_name != NULL)) {
13393 				if (snprintf(qual_prop_name,
13394 				    max_scf_name_len + 1, "%s/%s",
13395 				    pg_name, prop_name) >=
13396 				    max_scf_name_len + 1) {
13397 					prop_name_size = -1;
13398 				} else {
13399 					search_name = qual_prop_name;
13400 				}
13401 			}
13402 			if (listed > 0 || pattern == NULL ||
13403 			    (prop_name_size > 0 &&
13404 			    fnmatch(pattern, search_name,
13405 			    FNM_PATHNAME) == 0))
13406 				list_prop_tmpl(prt, NULL, templates);
13407 			if (prop_name != NULL) {
13408 				free(prop_name);
13409 				prop_name = NULL;
13410 			}
13411 		}
13412 		if (pg_name != NULL) {
13413 			free(pg_name);
13414 			pg_name = NULL;
13415 		}
13416 	}
13417 
13418 	scf_tmpl_prop_destroy(prt);
13419 	scf_tmpl_pg_destroy(pgt);
13420 	free(snapbuf);
13421 	free(fmribuf);
13422 	free(qual_prop_name);
13423 }
13424 
13425 static void
13426 listprop(const char *pattern, int only_pgs, int templates)
13427 {
13428 	scf_propertygroup_t *pg;
13429 	scf_property_t *prop;
13430 	scf_iter_t *iter, *piter;
13431 	char *pgnbuf, *prnbuf, *ppnbuf;
13432 	scf_pg_tmpl_t *pgt, *pgtp;
13433 	scf_prop_tmpl_t *prt;
13434 
13435 	void **objects;
13436 	char **names;
13437 	void **tmpls;
13438 	int allocd, i;
13439 
13440 	int ret;
13441 	ssize_t pgnlen, prnlen, szret;
13442 	size_t max_len = 0;
13443 
13444 	if (cur_svc == NULL && cur_inst == NULL) {
13445 		semerr(emsg_entity_not_selected);
13446 		return;
13447 	}
13448 
13449 	if ((pg = scf_pg_create(g_hndl)) == NULL ||
13450 	    (prop = scf_property_create(g_hndl)) == NULL ||
13451 	    (iter = scf_iter_create(g_hndl)) == NULL ||
13452 	    (piter = scf_iter_create(g_hndl)) == NULL ||
13453 	    (prt = scf_tmpl_prop_create(g_hndl)) == NULL ||
13454 	    (pgt = scf_tmpl_pg_create(g_hndl)) == NULL)
13455 		scfdie();
13456 
13457 	prnbuf = safe_malloc(max_scf_name_len + 1);
13458 
13459 	if (cur_level != NULL)
13460 		ret = scf_iter_snaplevel_pgs(iter, cur_level);
13461 	else if (cur_inst != NULL)
13462 		ret = scf_iter_instance_pgs(iter, cur_inst);
13463 	else
13464 		ret = scf_iter_service_pgs(iter, cur_svc);
13465 	if (ret != 0) {
13466 		return;
13467 	}
13468 
13469 	/*
13470 	 * We want to only list items which match pattern, and we want the
13471 	 * second column to line up, so during the first pass we'll save
13472 	 * matching items, their names, and their templates in objects,
13473 	 * names, and tmpls, computing the maximum name length as we go,
13474 	 * and then we'll print them out.
13475 	 *
13476 	 * Note: We always keep an extra slot available so the array can be
13477 	 * NULL-terminated.
13478 	 */
13479 	i = 0;
13480 	allocd = 1;
13481 	objects = safe_malloc(sizeof (*objects));
13482 	names = safe_malloc(sizeof (*names));
13483 	tmpls = safe_malloc(sizeof (*tmpls));
13484 
13485 	while ((ret = scf_iter_next_pg(iter, pg)) == 1) {
13486 		int new_pg = 0;
13487 		int print_props = 0;
13488 		pgtp = NULL;
13489 
13490 		pgnlen = scf_pg_get_name(pg, NULL, 0);
13491 		if (pgnlen < 0)
13492 			scfdie();
13493 
13494 		pgnbuf = safe_malloc(pgnlen + 1);
13495 
13496 		szret = scf_pg_get_name(pg, pgnbuf, pgnlen + 1);
13497 		if (szret < 0)
13498 			scfdie();
13499 		assert(szret <= pgnlen);
13500 
13501 		if (scf_tmpl_get_by_pg(pg, pgt, 0) == -1) {
13502 			if (scf_error() != SCF_ERROR_NOT_FOUND)
13503 				scfdie();
13504 			pgtp = NULL;
13505 		} else {
13506 			pgtp = pgt;
13507 		}
13508 
13509 		if (pattern == NULL ||
13510 		    fnmatch(pattern, pgnbuf, 0) == 0) {
13511 			if (i+1 >= allocd) {
13512 				allocd *= 2;
13513 				objects = realloc(objects,
13514 				    sizeof (*objects) * allocd);
13515 				names =
13516 				    realloc(names, sizeof (*names) * allocd);
13517 				tmpls = realloc(tmpls,
13518 				    sizeof (*tmpls) * allocd);
13519 				if (objects == NULL || names == NULL ||
13520 				    tmpls == NULL)
13521 					uu_die(gettext("Out of memory"));
13522 			}
13523 			objects[i] = pg;
13524 			names[i] = pgnbuf;
13525 
13526 			if (pgtp == NULL)
13527 				tmpls[i] = NULL;
13528 			else
13529 				tmpls[i] = pgt;
13530 
13531 			++i;
13532 
13533 			if (pgnlen > max_len)
13534 				max_len = pgnlen;
13535 
13536 			new_pg = 1;
13537 			print_props = 1;
13538 		}
13539 
13540 		if (only_pgs) {
13541 			if (new_pg) {
13542 				pg = scf_pg_create(g_hndl);
13543 				if (pg == NULL)
13544 					scfdie();
13545 				pgt = scf_tmpl_pg_create(g_hndl);
13546 				if (pgt == NULL)
13547 					scfdie();
13548 			} else
13549 				free(pgnbuf);
13550 
13551 			continue;
13552 		}
13553 
13554 		if (scf_iter_pg_properties(piter, pg) != SCF_SUCCESS)
13555 			scfdie();
13556 
13557 		while ((ret = scf_iter_next_property(piter, prop)) == 1) {
13558 			prnlen = scf_property_get_name(prop, prnbuf,
13559 			    max_scf_name_len + 1);
13560 			if (prnlen < 0)
13561 				scfdie();
13562 
13563 			/* Will prepend the property group name and a slash. */
13564 			prnlen += pgnlen + 1;
13565 
13566 			ppnbuf = safe_malloc(prnlen + 1);
13567 
13568 			if (snprintf(ppnbuf, prnlen + 1, "%s/%s", pgnbuf,
13569 			    prnbuf) < 0)
13570 				uu_die("snprintf");
13571 
13572 			if (pattern == NULL || print_props == 1 ||
13573 			    fnmatch(pattern, ppnbuf, 0) == 0) {
13574 				if (i+1 >= allocd) {
13575 					allocd *= 2;
13576 					objects = realloc(objects,
13577 					    sizeof (*objects) * allocd);
13578 					names = realloc(names,
13579 					    sizeof (*names) * allocd);
13580 					tmpls = realloc(tmpls,
13581 					    sizeof (*tmpls) * allocd);
13582 					if (objects == NULL || names == NULL ||
13583 					    tmpls == NULL)
13584 						uu_die(gettext(
13585 						    "Out of memory"));
13586 				}
13587 
13588 				objects[i] = prop;
13589 				names[i] = ppnbuf;
13590 
13591 				if (pgtp != NULL) {
13592 					if (scf_tmpl_get_by_prop(pgt, prnbuf,
13593 					    prt, 0) < 0) {
13594 						if (scf_error() !=
13595 						    SCF_ERROR_NOT_FOUND)
13596 							scfdie();
13597 						tmpls[i] = NULL;
13598 					} else {
13599 						tmpls[i] = prt;
13600 					}
13601 				} else {
13602 					tmpls[i] = NULL;
13603 				}
13604 
13605 				++i;
13606 
13607 				if (prnlen > max_len)
13608 					max_len = prnlen;
13609 
13610 				prop = scf_property_create(g_hndl);
13611 				prt = scf_tmpl_prop_create(g_hndl);
13612 			} else {
13613 				free(ppnbuf);
13614 			}
13615 		}
13616 
13617 		if (new_pg) {
13618 			pg = scf_pg_create(g_hndl);
13619 			if (pg == NULL)
13620 				scfdie();
13621 			pgt = scf_tmpl_pg_create(g_hndl);
13622 			if (pgt == NULL)
13623 				scfdie();
13624 		} else
13625 			free(pgnbuf);
13626 	}
13627 	if (ret != 0)
13628 		scfdie();
13629 
13630 	objects[i] = NULL;
13631 
13632 	scf_pg_destroy(pg);
13633 	scf_tmpl_pg_destroy(pgt);
13634 	scf_property_destroy(prop);
13635 	scf_tmpl_prop_destroy(prt);
13636 
13637 	for (i = 0; objects[i] != NULL; ++i) {
13638 		if (strchr(names[i], '/') == NULL) {
13639 			/* property group */
13640 			pg = (scf_propertygroup_t *)objects[i];
13641 			pgt = (scf_pg_tmpl_t *)tmpls[i];
13642 			list_pg_info(pg, names[i], max_len);
13643 			list_pg_tmpl(pgt, pg, templates);
13644 			free(names[i]);
13645 			scf_pg_destroy(pg);
13646 			if (pgt != NULL)
13647 				scf_tmpl_pg_destroy(pgt);
13648 		} else {
13649 			/* property */
13650 			prop = (scf_property_t *)objects[i];
13651 			prt = (scf_prop_tmpl_t *)tmpls[i];
13652 			list_prop_info(prop, names[i], max_len);
13653 			list_prop_tmpl(prt, prop, templates);
13654 			free(names[i]);
13655 			scf_property_destroy(prop);
13656 			if (prt != NULL)
13657 				scf_tmpl_prop_destroy(prt);
13658 		}
13659 	}
13660 
13661 	free(names);
13662 	free(objects);
13663 	free(tmpls);
13664 }
13665 
13666 void
13667 lscf_listpg(const char *pattern)
13668 {
13669 	lscf_prep_hndl();
13670 
13671 	listprop(pattern, 1, 0);
13672 }
13673 
13674 /*
13675  * Property group and property creation, setting, and deletion.  setprop (and
13676  * its alias, addprop) can either create a property group of a given type, or
13677  * it can create or set a property to a given type and list of values.
13678  */
13679 void
13680 lscf_addpg(const char *name, const char *type, const char *flags)
13681 {
13682 	scf_propertygroup_t *pg;
13683 	int ret;
13684 	uint32_t flgs = 0;
13685 	const char *cp;
13686 
13687 
13688 	lscf_prep_hndl();
13689 
13690 	if (cur_snap != NULL) {
13691 		semerr(emsg_cant_modify_snapshots);
13692 		return;
13693 	}
13694 
13695 	if (cur_inst == NULL && cur_svc == NULL) {
13696 		semerr(emsg_entity_not_selected);
13697 		return;
13698 	}
13699 
13700 	if (flags != NULL) {
13701 		for (cp = flags; *cp != '\0'; ++cp) {
13702 			switch (*cp) {
13703 			case 'P':
13704 				flgs |= SCF_PG_FLAG_NONPERSISTENT;
13705 				break;
13706 
13707 			case 'p':
13708 				flgs &= ~SCF_PG_FLAG_NONPERSISTENT;
13709 				break;
13710 
13711 			default:
13712 				semerr(gettext("Invalid property group flag "
13713 				    "%c."), *cp);
13714 				return;
13715 			}
13716 		}
13717 	}
13718 
13719 	pg = scf_pg_create(g_hndl);
13720 	if (pg == NULL)
13721 		scfdie();
13722 
13723 	if (cur_inst != NULL)
13724 		ret = scf_instance_add_pg(cur_inst, name, type, flgs, pg);
13725 	else
13726 		ret = scf_service_add_pg(cur_svc, name, type, flgs, pg);
13727 
13728 	if (ret != SCF_SUCCESS) {
13729 		switch (scf_error()) {
13730 		case SCF_ERROR_INVALID_ARGUMENT:
13731 			semerr(gettext("Name, type, or flags are invalid.\n"));
13732 			break;
13733 
13734 		case SCF_ERROR_EXISTS:
13735 			semerr(gettext("Property group already exists.\n"));
13736 			break;
13737 
13738 		case SCF_ERROR_PERMISSION_DENIED:
13739 			semerr(emsg_permission_denied);
13740 			break;
13741 
13742 		case SCF_ERROR_BACKEND_ACCESS:
13743 			semerr(gettext("Backend refused access.\n"));
13744 			break;
13745 
13746 		default:
13747 			scfdie();
13748 		}
13749 	}
13750 
13751 	scf_pg_destroy(pg);
13752 
13753 	private_refresh();
13754 }
13755 
13756 void
13757 lscf_delpg(char *name)
13758 {
13759 	lscf_prep_hndl();
13760 
13761 	if (cur_snap != NULL) {
13762 		semerr(emsg_cant_modify_snapshots);
13763 		return;
13764 	}
13765 
13766 	if (cur_inst == NULL && cur_svc == NULL) {
13767 		semerr(emsg_entity_not_selected);
13768 		return;
13769 	}
13770 
13771 	if (strchr(name, '/') != NULL) {
13772 		semerr(emsg_invalid_pg_name, name);
13773 		return;
13774 	}
13775 
13776 	lscf_delprop(name);
13777 }
13778 
13779 /*
13780  * scf_delhash() is used to remove the property group related to the
13781  * hash entry for a specific manifest in the repository. pgname will be
13782  * constructed from the location of the manifest file. If deathrow isn't 0,
13783  * manifest file doesn't need to exist (manifest string will be used as
13784  * an absolute path).
13785  */
13786 void
13787 lscf_delhash(char *manifest, int deathrow)
13788 {
13789 	char *pgname;
13790 
13791 	if (cur_snap != NULL ||
13792 	    cur_inst != NULL || cur_svc != NULL) {
13793 		warn(gettext("error, an entity is selected\n"));
13794 		return;
13795 	}
13796 
13797 	/* select smf/manifest */
13798 	lscf_select(HASH_SVC);
13799 	/*
13800 	 * Translate the manifest file name to property name. In the deathrow
13801 	 * case, the manifest file does not need to exist.
13802 	 */
13803 	pgname = mhash_filename_to_propname(manifest,
13804 	    deathrow ? B_TRUE : B_FALSE);
13805 	if (pgname == NULL) {
13806 		warn(gettext("cannot resolve pathname for %s\n"), manifest);
13807 		return;
13808 	}
13809 	/* delete the hash property name */
13810 	lscf_delpg(pgname);
13811 }
13812 
13813 void
13814 lscf_listprop(const char *pattern)
13815 {
13816 	lscf_prep_hndl();
13817 
13818 	listprop(pattern, 0, 0);
13819 }
13820 
13821 int
13822 lscf_setprop(const char *pgname, const char *type, const char *value,
13823     const uu_list_t *values)
13824 {
13825 	scf_type_t ty, current_ty;
13826 	scf_service_t *svc;
13827 	scf_propertygroup_t *pg, *parent_pg;
13828 	scf_property_t *prop, *parent_prop;
13829 	scf_pg_tmpl_t *pgt;
13830 	scf_prop_tmpl_t *prt;
13831 	int ret, result = 0;
13832 	scf_transaction_t *tx;
13833 	scf_transaction_entry_t *e;
13834 	scf_value_t *v;
13835 	uu_list_walk_t *walk;
13836 	string_list_t *sp;
13837 	char *propname;
13838 	int req_quotes = 0;
13839 
13840 	lscf_prep_hndl();
13841 
13842 	if ((e = scf_entry_create(g_hndl)) == NULL ||
13843 	    (svc = scf_service_create(g_hndl)) == NULL ||
13844 	    (parent_pg = scf_pg_create(g_hndl)) == NULL ||
13845 	    (pg = scf_pg_create(g_hndl)) == NULL ||
13846 	    (parent_prop = scf_property_create(g_hndl)) == NULL ||
13847 	    (prop = scf_property_create(g_hndl)) == NULL ||
13848 	    (pgt = scf_tmpl_pg_create(g_hndl)) == NULL ||
13849 	    (prt = scf_tmpl_prop_create(g_hndl)) == NULL ||
13850 	    (tx = scf_transaction_create(g_hndl)) == NULL)
13851 		scfdie();
13852 
13853 	if (cur_snap != NULL) {
13854 		semerr(emsg_cant_modify_snapshots);
13855 		goto fail;
13856 	}
13857 
13858 	if (cur_inst == NULL && cur_svc == NULL) {
13859 		semerr(emsg_entity_not_selected);
13860 		goto fail;
13861 	}
13862 
13863 	propname = strchr(pgname, '/');
13864 	if (propname == NULL) {
13865 		semerr(gettext("Property names must contain a `/'.\n"));
13866 		goto fail;
13867 	}
13868 
13869 	*propname = '\0';
13870 	++propname;
13871 
13872 	if (type != NULL) {
13873 		ty = string_to_type(type);
13874 		if (ty == SCF_TYPE_INVALID) {
13875 			semerr(gettext("Unknown type \"%s\".\n"), type);
13876 			goto fail;
13877 		}
13878 	}
13879 
13880 	if (cur_inst != NULL)
13881 		ret = scf_instance_get_pg(cur_inst, pgname, pg);
13882 	else
13883 		ret = scf_service_get_pg(cur_svc, pgname, pg);
13884 	if (ret != SCF_SUCCESS) {
13885 		switch (scf_error()) {
13886 		case SCF_ERROR_NOT_FOUND:
13887 			semerr(emsg_no_such_pg, pgname);
13888 			goto fail;
13889 
13890 		case SCF_ERROR_INVALID_ARGUMENT:
13891 			semerr(emsg_invalid_pg_name, pgname);
13892 			goto fail;
13893 
13894 		default:
13895 			scfdie();
13896 			break;
13897 		}
13898 	}
13899 
13900 	do {
13901 		if (scf_pg_update(pg) == -1)
13902 			scfdie();
13903 		if (scf_transaction_start(tx, pg) != SCF_SUCCESS) {
13904 			if (scf_error() != SCF_ERROR_PERMISSION_DENIED)
13905 				scfdie();
13906 
13907 			semerr(emsg_permission_denied);
13908 			goto fail;
13909 		}
13910 
13911 		ret = scf_pg_get_property(pg, propname, prop);
13912 		if (ret == SCF_SUCCESS) {
13913 			if (scf_property_type(prop, &current_ty) != SCF_SUCCESS)
13914 				scfdie();
13915 
13916 			if (type == NULL)
13917 				ty = current_ty;
13918 			if (scf_transaction_property_change_type(tx, e,
13919 			    propname, ty) == -1)
13920 				scfdie();
13921 
13922 		} else if (scf_error() == SCF_ERROR_NOT_FOUND) {
13923 			/* Infer the type, if possible. */
13924 			if (type == NULL) {
13925 				/*
13926 				 * First check if we're an instance and the
13927 				 * property is set on the service.
13928 				 */
13929 				if (cur_inst != NULL &&
13930 				    scf_instance_get_parent(cur_inst,
13931 				    svc) == 0 &&
13932 				    scf_service_get_pg(cur_svc, pgname,
13933 				    parent_pg) == 0 &&
13934 				    scf_pg_get_property(parent_pg, propname,
13935 				    parent_prop) == 0 &&
13936 				    scf_property_type(parent_prop,
13937 				    &current_ty) == 0) {
13938 					ty = current_ty;
13939 
13940 				/* Then check for a type set in a template. */
13941 				} else if (scf_tmpl_get_by_pg(pg, pgt,
13942 				    0) == 0 &&
13943 				    scf_tmpl_get_by_prop(pgt, propname, prt,
13944 				    0) == 0 &&
13945 				    scf_tmpl_prop_type(prt, &current_ty) == 0) {
13946 					ty = current_ty;
13947 
13948 				/* If type can't be inferred, fail. */
13949 				} else {
13950 					semerr(gettext("Type required for new "
13951 					    "properties.\n"));
13952 					goto fail;
13953 				}
13954 			}
13955 			if (scf_transaction_property_new(tx, e, propname,
13956 			    ty) == -1)
13957 				scfdie();
13958 		} else if (scf_error() == SCF_ERROR_INVALID_ARGUMENT) {
13959 			semerr(emsg_invalid_prop_name, propname);
13960 			goto fail;
13961 		} else {
13962 			scfdie();
13963 		}
13964 
13965 		if (ty == SCF_TYPE_ASTRING || ty == SCF_TYPE_USTRING)
13966 			req_quotes = 1;
13967 
13968 		if (value != NULL) {
13969 			v = string_to_value(value, ty, 0);
13970 
13971 			if (v == NULL)
13972 				goto fail;
13973 
13974 			ret = scf_entry_add_value(e, v);
13975 			assert(ret == SCF_SUCCESS);
13976 		} else {
13977 			assert(values != NULL);
13978 
13979 			walk = uu_list_walk_start((uu_list_t *)values,
13980 			    UU_DEFAULT);
13981 			if (walk == NULL)
13982 				uu_die(gettext("Could not walk list"));
13983 
13984 			for (sp = uu_list_walk_next(walk); sp != NULL;
13985 			    sp = uu_list_walk_next(walk)) {
13986 				v = string_to_value(sp->str, ty, req_quotes);
13987 
13988 				if (v == NULL) {
13989 					scf_entry_destroy_children(e);
13990 					goto fail;
13991 				}
13992 
13993 				ret = scf_entry_add_value(e, v);
13994 				assert(ret == SCF_SUCCESS);
13995 			}
13996 			uu_list_walk_end(walk);
13997 		}
13998 		result = scf_transaction_commit(tx);
13999 
14000 		scf_transaction_reset(tx);
14001 		scf_entry_destroy_children(e);
14002 	} while (result == 0);
14003 
14004 	if (result < 0) {
14005 		if (scf_error() != SCF_ERROR_PERMISSION_DENIED)
14006 			scfdie();
14007 
14008 		semerr(emsg_permission_denied);
14009 		goto fail;
14010 	}
14011 
14012 	ret = 0;
14013 
14014 	private_refresh();
14015 
14016 	goto cleanup;
14017 
14018 fail:
14019 	ret = -1;
14020 
14021 cleanup:
14022 	scf_transaction_destroy(tx);
14023 	scf_entry_destroy(e);
14024 	scf_service_destroy(svc);
14025 	scf_pg_destroy(parent_pg);
14026 	scf_pg_destroy(pg);
14027 	scf_property_destroy(parent_prop);
14028 	scf_property_destroy(prop);
14029 	scf_tmpl_pg_destroy(pgt);
14030 	scf_tmpl_prop_destroy(prt);
14031 
14032 	return (ret);
14033 }
14034 
14035 void
14036 lscf_delprop(char *pgn)
14037 {
14038 	char *slash, *pn;
14039 	scf_propertygroup_t *pg;
14040 	scf_transaction_t *tx;
14041 	scf_transaction_entry_t *e;
14042 	int ret;
14043 
14044 
14045 	lscf_prep_hndl();
14046 
14047 	if (cur_snap != NULL) {
14048 		semerr(emsg_cant_modify_snapshots);
14049 		return;
14050 	}
14051 
14052 	if (cur_inst == NULL && cur_svc == NULL) {
14053 		semerr(emsg_entity_not_selected);
14054 		return;
14055 	}
14056 
14057 	pg = scf_pg_create(g_hndl);
14058 	if (pg == NULL)
14059 		scfdie();
14060 
14061 	slash = strchr(pgn, '/');
14062 	if (slash == NULL) {
14063 		pn = NULL;
14064 	} else {
14065 		*slash = '\0';
14066 		pn = slash + 1;
14067 	}
14068 
14069 	if (cur_inst != NULL)
14070 		ret = scf_instance_get_pg(cur_inst, pgn, pg);
14071 	else
14072 		ret = scf_service_get_pg(cur_svc, pgn, pg);
14073 	if (ret != SCF_SUCCESS) {
14074 		switch (scf_error()) {
14075 		case SCF_ERROR_NOT_FOUND:
14076 			semerr(emsg_no_such_pg, pgn);
14077 			break;
14078 
14079 		case SCF_ERROR_INVALID_ARGUMENT:
14080 			semerr(emsg_invalid_pg_name, pgn);
14081 			break;
14082 
14083 		default:
14084 			scfdie();
14085 		}
14086 
14087 		scf_pg_destroy(pg);
14088 
14089 		return;
14090 	}
14091 
14092 	if (pn == NULL) {
14093 		/* Try to delete the property group. */
14094 		if (scf_pg_delete(pg) != SCF_SUCCESS) {
14095 			if (scf_error() != SCF_ERROR_PERMISSION_DENIED)
14096 				scfdie();
14097 
14098 			semerr(emsg_permission_denied);
14099 		} else {
14100 			private_refresh();
14101 		}
14102 
14103 		scf_pg_destroy(pg);
14104 		return;
14105 	}
14106 
14107 	e = scf_entry_create(g_hndl);
14108 	tx = scf_transaction_create(g_hndl);
14109 
14110 	do {
14111 		if (scf_pg_update(pg) == -1)
14112 			scfdie();
14113 		if (scf_transaction_start(tx, pg) != SCF_SUCCESS) {
14114 			if (scf_error() != SCF_ERROR_PERMISSION_DENIED)
14115 				scfdie();
14116 
14117 			semerr(emsg_permission_denied);
14118 			break;
14119 		}
14120 
14121 		if (scf_transaction_property_delete(tx, e, pn) != SCF_SUCCESS) {
14122 			if (scf_error() == SCF_ERROR_NOT_FOUND) {
14123 				semerr(gettext("No such property %s/%s.\n"),
14124 				    pgn, pn);
14125 				break;
14126 			} else if (scf_error() == SCF_ERROR_INVALID_ARGUMENT) {
14127 				semerr(emsg_invalid_prop_name, pn);
14128 				break;
14129 			} else {
14130 				scfdie();
14131 			}
14132 		}
14133 
14134 		ret = scf_transaction_commit(tx);
14135 
14136 		if (ret == 0)
14137 			scf_transaction_reset(tx);
14138 	} while (ret == 0);
14139 
14140 	if (ret < 0) {
14141 		if (scf_error() != SCF_ERROR_PERMISSION_DENIED)
14142 			scfdie();
14143 
14144 		semerr(emsg_permission_denied);
14145 	} else {
14146 		private_refresh();
14147 	}
14148 
14149 	scf_transaction_destroy(tx);
14150 	scf_entry_destroy(e);
14151 	scf_pg_destroy(pg);
14152 }
14153 
14154 /*
14155  * Property editing.
14156  */
14157 
14158 static int
14159 write_edit_script(FILE *strm)
14160 {
14161 	char *fmribuf;
14162 	ssize_t fmrilen;
14163 
14164 	scf_propertygroup_t *pg;
14165 	scf_property_t *prop;
14166 	scf_value_t *val;
14167 	scf_type_t ty;
14168 	int ret, result = 0;
14169 	scf_iter_t *iter, *piter, *viter;
14170 	char *buf, *tybuf, *pname;
14171 	const char *emsg_write_error;
14172 
14173 
14174 	emsg_write_error = gettext("Error writing temoprary file: %s.\n");
14175 
14176 
14177 	/* select fmri */
14178 	if (cur_inst != NULL) {
14179 		fmrilen = scf_instance_to_fmri(cur_inst, NULL, 0);
14180 		if (fmrilen < 0)
14181 			scfdie();
14182 		fmribuf = safe_malloc(fmrilen + 1);
14183 		if (scf_instance_to_fmri(cur_inst, fmribuf, fmrilen + 1) < 0)
14184 			scfdie();
14185 	} else {
14186 		assert(cur_svc != NULL);
14187 		fmrilen = scf_service_to_fmri(cur_svc, NULL, 0);
14188 		if (fmrilen < 0)
14189 			scfdie();
14190 		fmribuf = safe_malloc(fmrilen + 1);
14191 		if (scf_service_to_fmri(cur_svc, fmribuf, fmrilen + 1) < 0)
14192 			scfdie();
14193 	}
14194 
14195 	if (fprintf(strm, "select %s\n\n", fmribuf) < 0) {
14196 		warn(emsg_write_error, strerror(errno));
14197 		free(fmribuf);
14198 		return (-1);
14199 	}
14200 
14201 	free(fmribuf);
14202 
14203 
14204 	if ((pg = scf_pg_create(g_hndl)) == NULL ||
14205 	    (prop = scf_property_create(g_hndl)) == NULL ||
14206 	    (val = scf_value_create(g_hndl)) == NULL ||
14207 	    (iter = scf_iter_create(g_hndl)) == NULL ||
14208 	    (piter = scf_iter_create(g_hndl)) == NULL ||
14209 	    (viter = scf_iter_create(g_hndl)) == NULL)
14210 		scfdie();
14211 
14212 	buf = safe_malloc(max_scf_name_len + 1);
14213 	tybuf = safe_malloc(max_scf_pg_type_len + 1);
14214 	pname = safe_malloc(max_scf_name_len + 1);
14215 
14216 	if (cur_inst != NULL)
14217 		ret = scf_iter_instance_pgs(iter, cur_inst);
14218 	else
14219 		ret = scf_iter_service_pgs(iter, cur_svc);
14220 	if (ret != SCF_SUCCESS)
14221 		scfdie();
14222 
14223 	while ((ret = scf_iter_next_pg(iter, pg)) == 1) {
14224 		int ret2;
14225 
14226 		/*
14227 		 * # delprop pg
14228 		 * # addpg pg type
14229 		 */
14230 		if (scf_pg_get_name(pg, buf, max_scf_name_len + 1) < 0)
14231 			scfdie();
14232 
14233 		if (scf_pg_get_type(pg, tybuf, max_scf_pg_type_len + 1) < 0)
14234 			scfdie();
14235 
14236 		if (fprintf(strm, "# Property group \"%s\"\n"
14237 		    "# delprop %s\n"
14238 		    "# addpg %s %s\n", buf, buf, buf, tybuf) < 0) {
14239 			warn(emsg_write_error, strerror(errno));
14240 			result = -1;
14241 			goto out;
14242 		}
14243 
14244 		/* # setprop pg/prop = (values) */
14245 
14246 		if (scf_iter_pg_properties(piter, pg) != SCF_SUCCESS)
14247 			scfdie();
14248 
14249 		while ((ret2 = scf_iter_next_property(piter, prop)) == 1) {
14250 			int first = 1;
14251 			int ret3;
14252 			int multiple;
14253 			int is_str;
14254 			scf_type_t bty;
14255 
14256 			if (scf_property_get_name(prop, pname,
14257 			    max_scf_name_len + 1) < 0)
14258 				scfdie();
14259 
14260 			if (scf_property_type(prop, &ty) != 0)
14261 				scfdie();
14262 
14263 			multiple = prop_has_multiple_values(prop, val);
14264 
14265 			if (fprintf(strm, "# setprop %s/%s = %s: %s", buf,
14266 			    pname, scf_type_to_string(ty), multiple ? "(" : "")
14267 			    < 0) {
14268 				warn(emsg_write_error, strerror(errno));
14269 				result = -1;
14270 				goto out;
14271 			}
14272 
14273 			(void) scf_type_base_type(ty, &bty);
14274 			is_str = (bty == SCF_TYPE_ASTRING);
14275 
14276 			if (scf_iter_property_values(viter, prop) !=
14277 			    SCF_SUCCESS)
14278 				scfdie();
14279 
14280 			while ((ret3 = scf_iter_next_value(viter, val)) == 1) {
14281 				char *buf;
14282 				ssize_t buflen;
14283 
14284 				buflen = scf_value_get_as_string(val, NULL, 0);
14285 				if (buflen < 0)
14286 					scfdie();
14287 
14288 				buf = safe_malloc(buflen + 1);
14289 
14290 				if (scf_value_get_as_string(val, buf,
14291 				    buflen + 1) < 0)
14292 					scfdie();
14293 
14294 				if (first)
14295 					first = 0;
14296 				else {
14297 					if (putc(' ', strm) != ' ') {
14298 						warn(emsg_write_error,
14299 						    strerror(errno));
14300 						result = -1;
14301 						goto out;
14302 					}
14303 				}
14304 
14305 				if ((is_str && multiple) ||
14306 				    strpbrk(buf, CHARS_TO_QUOTE) != NULL) {
14307 					(void) putc('"', strm);
14308 					(void) quote_and_print(buf, strm, 1);
14309 					(void) putc('"', strm);
14310 
14311 					if (ferror(strm)) {
14312 						warn(emsg_write_error,
14313 						    strerror(errno));
14314 						result = -1;
14315 						goto out;
14316 					}
14317 				} else {
14318 					if (fprintf(strm, "%s", buf) < 0) {
14319 						warn(emsg_write_error,
14320 						    strerror(errno));
14321 						result = -1;
14322 						goto out;
14323 					}
14324 				}
14325 
14326 				free(buf);
14327 			}
14328 			if (ret3 < 0 &&
14329 			    scf_error() != SCF_ERROR_PERMISSION_DENIED)
14330 				scfdie();
14331 
14332 			/* Write closing paren if mult-value property */
14333 			if ((multiple && putc(')', strm) == EOF) ||
14334 
14335 			    /* Write final newline */
14336 			    fputc('\n', strm) == EOF) {
14337 				warn(emsg_write_error, strerror(errno));
14338 				result = -1;
14339 				goto out;
14340 			}
14341 		}
14342 		if (ret2 < 0)
14343 			scfdie();
14344 
14345 		if (fputc('\n', strm) == EOF) {
14346 			warn(emsg_write_error, strerror(errno));
14347 			result = -1;
14348 			goto out;
14349 		}
14350 	}
14351 	if (ret < 0)
14352 		scfdie();
14353 
14354 out:
14355 	free(pname);
14356 	free(tybuf);
14357 	free(buf);
14358 	scf_iter_destroy(viter);
14359 	scf_iter_destroy(piter);
14360 	scf_iter_destroy(iter);
14361 	scf_value_destroy(val);
14362 	scf_property_destroy(prop);
14363 	scf_pg_destroy(pg);
14364 
14365 	if (result == 0) {
14366 		if (fflush(strm) != 0) {
14367 			warn(emsg_write_error, strerror(errno));
14368 			return (-1);
14369 		}
14370 	}
14371 
14372 	return (result);
14373 }
14374 
14375 int
14376 lscf_editprop()
14377 {
14378 	char *buf, *editor;
14379 	size_t bufsz;
14380 	int tmpfd;
14381 	char tempname[] = TEMP_FILE_PATTERN;
14382 
14383 	lscf_prep_hndl();
14384 
14385 	if (cur_snap != NULL) {
14386 		semerr(emsg_cant_modify_snapshots);
14387 		return (-1);
14388 	}
14389 
14390 	if (cur_svc == NULL && cur_inst == NULL) {
14391 		semerr(emsg_entity_not_selected);
14392 		return (-1);
14393 	}
14394 
14395 	tmpfd = mkstemp(tempname);
14396 	if (tmpfd == -1) {
14397 		semerr(gettext("Could not create temporary file.\n"));
14398 		return (-1);
14399 	}
14400 
14401 	(void) strcpy(tempfilename, tempname);
14402 
14403 	tempfile = fdopen(tmpfd, "r+");
14404 	if (tempfile == NULL) {
14405 		warn(gettext("Could not create temporary file.\n"));
14406 		if (close(tmpfd) == -1)
14407 			warn(gettext("Could not close temporary file: %s.\n"),
14408 			    strerror(errno));
14409 
14410 		remove_tempfile();
14411 
14412 		return (-1);
14413 	}
14414 
14415 	if (write_edit_script(tempfile) == -1) {
14416 		remove_tempfile();
14417 		return (-1);
14418 	}
14419 
14420 	editor = getenv("EDITOR");
14421 	if (editor == NULL)
14422 		editor = "vi";
14423 
14424 	bufsz = strlen(editor) + 1 + strlen(tempname) + 1;
14425 	buf = safe_malloc(bufsz);
14426 
14427 	if (snprintf(buf, bufsz, "%s %s", editor, tempname) < 0)
14428 		uu_die(gettext("Error creating editor command"));
14429 
14430 	if (system(buf) == -1) {
14431 		semerr(gettext("Could not launch editor %s: %s\n"), editor,
14432 		    strerror(errno));
14433 		free(buf);
14434 		remove_tempfile();
14435 		return (-1);
14436 	}
14437 
14438 	free(buf);
14439 
14440 	(void) engine_source(tempname, est->sc_cmd_flags & SC_CMD_IACTIVE);
14441 
14442 	remove_tempfile();
14443 
14444 	return (0);
14445 }
14446 
14447 static void
14448 add_string(uu_list_t *strlist, const char *str)
14449 {
14450 	string_list_t *elem;
14451 	elem = safe_malloc(sizeof (*elem));
14452 	uu_list_node_init(elem, &elem->node, string_pool);
14453 	elem->str = safe_strdup(str);
14454 	if (uu_list_append(strlist, elem) != 0)
14455 		uu_die(gettext("libuutil error: %s\n"),
14456 		    uu_strerror(uu_error()));
14457 }
14458 
14459 static int
14460 remove_string(uu_list_t *strlist, const char *str)
14461 {
14462 	uu_list_walk_t	*elems;
14463 	string_list_t	*sp;
14464 
14465 	/*
14466 	 * Find the element that needs to be removed.
14467 	 */
14468 	elems = uu_list_walk_start(strlist, UU_DEFAULT);
14469 	while ((sp = uu_list_walk_next(elems)) != NULL) {
14470 		if (strcmp(sp->str, str) == 0)
14471 			break;
14472 	}
14473 	uu_list_walk_end(elems);
14474 
14475 	/*
14476 	 * Returning 1 here as the value was not found, this
14477 	 * might not be an error.  Leave it to the caller to
14478 	 * decide.
14479 	 */
14480 	if (sp == NULL) {
14481 		return (1);
14482 	}
14483 
14484 	uu_list_remove(strlist, sp);
14485 
14486 	free(sp->str);
14487 	free(sp);
14488 
14489 	return (0);
14490 }
14491 
14492 /*
14493  * Get all property values that don't match the given glob pattern,
14494  * if a pattern is specified.
14495  */
14496 static void
14497 get_prop_values(scf_property_t *prop, uu_list_t *values,
14498     const char *pattern)
14499 {
14500 	scf_iter_t *iter;
14501 	scf_value_t *val;
14502 	int ret;
14503 
14504 	if ((iter = scf_iter_create(g_hndl)) == NULL ||
14505 	    (val = scf_value_create(g_hndl)) == NULL)
14506 		scfdie();
14507 
14508 	if (scf_iter_property_values(iter, prop) != 0)
14509 		scfdie();
14510 
14511 	while ((ret = scf_iter_next_value(iter, val)) == 1) {
14512 		char *buf;
14513 		ssize_t vlen, szret;
14514 
14515 		vlen = scf_value_get_as_string(val, NULL, 0);
14516 		if (vlen < 0)
14517 			scfdie();
14518 
14519 		buf = safe_malloc(vlen + 1);
14520 
14521 		szret = scf_value_get_as_string(val, buf, vlen + 1);
14522 		if (szret < 0)
14523 			scfdie();
14524 		assert(szret <= vlen);
14525 
14526 		if (pattern == NULL || fnmatch(pattern, buf, 0) != 0)
14527 			add_string(values, buf);
14528 
14529 		free(buf);
14530 	}
14531 
14532 	if (ret == -1)
14533 		scfdie();
14534 
14535 	scf_value_destroy(val);
14536 	scf_iter_destroy(iter);
14537 }
14538 
14539 static int
14540 lscf_setpropvalue(const char *pgname, const char *type,
14541     const char *arg, int isadd, int isnotfoundok)
14542 {
14543 	scf_type_t ty;
14544 	scf_propertygroup_t *pg;
14545 	scf_property_t *prop;
14546 	int ret, result = 0;
14547 	scf_transaction_t *tx;
14548 	scf_transaction_entry_t *e;
14549 	scf_value_t *v;
14550 	string_list_t *sp;
14551 	char *propname;
14552 	uu_list_t *values;
14553 	uu_list_walk_t *walk;
14554 	void *cookie = NULL;
14555 	char *pattern = NULL;
14556 
14557 	lscf_prep_hndl();
14558 
14559 	if ((values = uu_list_create(string_pool, NULL, 0)) == NULL)
14560 		uu_die(gettext("Could not create property list: %s\n"),
14561 		    uu_strerror(uu_error()));
14562 
14563 	if (!isadd)
14564 		pattern = safe_strdup(arg);
14565 
14566 	if ((e = scf_entry_create(g_hndl)) == NULL ||
14567 	    (pg = scf_pg_create(g_hndl)) == NULL ||
14568 	    (prop = scf_property_create(g_hndl)) == NULL ||
14569 	    (tx = scf_transaction_create(g_hndl)) == NULL)
14570 		scfdie();
14571 
14572 	if (cur_snap != NULL) {
14573 		semerr(emsg_cant_modify_snapshots);
14574 		goto fail;
14575 	}
14576 
14577 	if (cur_inst == NULL && cur_svc == NULL) {
14578 		semerr(emsg_entity_not_selected);
14579 		goto fail;
14580 	}
14581 
14582 	propname = strchr(pgname, '/');
14583 	if (propname == NULL) {
14584 		semerr(gettext("Property names must contain a `/'.\n"));
14585 		goto fail;
14586 	}
14587 
14588 	*propname = '\0';
14589 	++propname;
14590 
14591 	if (type != NULL) {
14592 		ty = string_to_type(type);
14593 		if (ty == SCF_TYPE_INVALID) {
14594 			semerr(gettext("Unknown type \"%s\".\n"), type);
14595 			goto fail;
14596 		}
14597 	}
14598 
14599 	if (cur_inst != NULL)
14600 		ret = scf_instance_get_pg(cur_inst, pgname, pg);
14601 	else
14602 		ret = scf_service_get_pg(cur_svc, pgname, pg);
14603 	if (ret != 0) {
14604 		switch (scf_error()) {
14605 		case SCF_ERROR_NOT_FOUND:
14606 			if (isnotfoundok) {
14607 				result = 0;
14608 			} else {
14609 				semerr(emsg_no_such_pg, pgname);
14610 				result = -1;
14611 			}
14612 			goto out;
14613 
14614 		case SCF_ERROR_INVALID_ARGUMENT:
14615 			semerr(emsg_invalid_pg_name, pgname);
14616 			goto fail;
14617 
14618 		default:
14619 			scfdie();
14620 		}
14621 	}
14622 
14623 	do {
14624 		if (scf_pg_update(pg) == -1)
14625 			scfdie();
14626 		if (scf_transaction_start(tx, pg) != 0) {
14627 			if (scf_error() != SCF_ERROR_PERMISSION_DENIED)
14628 				scfdie();
14629 
14630 			semerr(emsg_permission_denied);
14631 			goto fail;
14632 		}
14633 
14634 		ret = scf_pg_get_property(pg, propname, prop);
14635 		if (ret == 0) {
14636 			scf_type_t ptype;
14637 			char *pat = pattern;
14638 
14639 			if (scf_property_type(prop, &ptype) != 0)
14640 				scfdie();
14641 
14642 			if (isadd) {
14643 				if (type != NULL && ptype != ty) {
14644 					semerr(gettext("Property \"%s\" is not "
14645 					    "of type \"%s\".\n"), propname,
14646 					    type);
14647 					goto fail;
14648 				}
14649 
14650 				pat = NULL;
14651 			} else {
14652 				size_t len = strlen(pat);
14653 				if (len > 0 && pat[len - 1] == '\"')
14654 					pat[len - 1] = '\0';
14655 				if (len > 0 && pat[0] == '\"')
14656 					pat++;
14657 			}
14658 
14659 			ty = ptype;
14660 
14661 			get_prop_values(prop, values, pat);
14662 
14663 			if (isadd)
14664 				add_string(values, arg);
14665 
14666 			if (scf_transaction_property_change(tx, e,
14667 			    propname, ty) == -1)
14668 				scfdie();
14669 		} else if (scf_error() == SCF_ERROR_NOT_FOUND) {
14670 			if (isadd) {
14671 				if (type == NULL) {
14672 					semerr(gettext("Type required "
14673 					    "for new properties.\n"));
14674 					goto fail;
14675 				}
14676 
14677 				add_string(values, arg);
14678 
14679 				if (scf_transaction_property_new(tx, e,
14680 				    propname, ty) == -1)
14681 					scfdie();
14682 			} else if (isnotfoundok) {
14683 				result = 0;
14684 				goto out;
14685 			} else {
14686 				semerr(gettext("No such property %s/%s.\n"),
14687 				    pgname, propname);
14688 				result = -1;
14689 				goto out;
14690 			}
14691 		} else if (scf_error() == SCF_ERROR_INVALID_ARGUMENT) {
14692 			semerr(emsg_invalid_prop_name, propname);
14693 			goto fail;
14694 		} else {
14695 			scfdie();
14696 		}
14697 
14698 		walk = uu_list_walk_start(values, UU_DEFAULT);
14699 		if (walk == NULL)
14700 			uu_die(gettext("Could not walk property list.\n"));
14701 
14702 		for (sp = uu_list_walk_next(walk); sp != NULL;
14703 		    sp = uu_list_walk_next(walk)) {
14704 			v = string_to_value(sp->str, ty, 0);
14705 
14706 			if (v == NULL) {
14707 				scf_entry_destroy_children(e);
14708 				goto fail;
14709 			}
14710 			ret = scf_entry_add_value(e, v);
14711 			assert(ret == 0);
14712 		}
14713 		uu_list_walk_end(walk);
14714 
14715 		result = scf_transaction_commit(tx);
14716 
14717 		scf_transaction_reset(tx);
14718 		scf_entry_destroy_children(e);
14719 	} while (result == 0);
14720 
14721 	if (result < 0) {
14722 		if (scf_error() != SCF_ERROR_PERMISSION_DENIED)
14723 			scfdie();
14724 
14725 		semerr(emsg_permission_denied);
14726 		goto fail;
14727 	}
14728 
14729 	result = 0;
14730 
14731 	private_refresh();
14732 
14733 out:
14734 	scf_transaction_destroy(tx);
14735 	scf_entry_destroy(e);
14736 	scf_pg_destroy(pg);
14737 	scf_property_destroy(prop);
14738 	free(pattern);
14739 
14740 	while ((sp = uu_list_teardown(values, &cookie)) != NULL) {
14741 		free(sp->str);
14742 		free(sp);
14743 	}
14744 
14745 	uu_list_destroy(values);
14746 
14747 	return (result);
14748 
14749 fail:
14750 	result = -1;
14751 	goto out;
14752 }
14753 
14754 int
14755 lscf_addpropvalue(const char *pgname, const char *type, const char *value)
14756 {
14757 	return (lscf_setpropvalue(pgname, type, value, 1, 0));
14758 }
14759 
14760 int
14761 lscf_delpropvalue(const char *pgname, const char *pattern, int isnotfoundok)
14762 {
14763 	return (lscf_setpropvalue(pgname, NULL, pattern, 0, isnotfoundok));
14764 }
14765 
14766 /*
14767  * Look for a standard start method, first in the instance (if any),
14768  * then the service.
14769  */
14770 static const char *
14771 start_method_name(int *in_instance)
14772 {
14773 	scf_propertygroup_t *pg;
14774 	char **p;
14775 	int ret;
14776 	scf_instance_t *inst = cur_inst;
14777 
14778 	if ((pg = scf_pg_create(g_hndl)) == NULL)
14779 		scfdie();
14780 
14781 again:
14782 	for (p = start_method_names; *p != NULL; p++) {
14783 		if (inst != NULL)
14784 			ret = scf_instance_get_pg(inst, *p, pg);
14785 		else
14786 			ret = scf_service_get_pg(cur_svc, *p, pg);
14787 
14788 		if (ret == 0) {
14789 			size_t bufsz = strlen(SCF_GROUP_METHOD) + 1;
14790 			char *buf = safe_malloc(bufsz);
14791 
14792 			if ((ret = scf_pg_get_type(pg, buf, bufsz)) < 0) {
14793 				free(buf);
14794 				continue;
14795 			}
14796 			if (strcmp(buf, SCF_GROUP_METHOD) != 0) {
14797 				free(buf);
14798 				continue;
14799 			}
14800 
14801 			free(buf);
14802 			*in_instance = (inst != NULL);
14803 			scf_pg_destroy(pg);
14804 			return (*p);
14805 		}
14806 
14807 		if (scf_error() == SCF_ERROR_NOT_FOUND)
14808 			continue;
14809 
14810 		scfdie();
14811 	}
14812 
14813 	if (inst != NULL) {
14814 		inst = NULL;
14815 		goto again;
14816 	}
14817 
14818 	scf_pg_destroy(pg);
14819 	return (NULL);
14820 }
14821 
14822 static int
14823 addpg(const char *name, const char *type)
14824 {
14825 	scf_propertygroup_t *pg;
14826 	int ret;
14827 
14828 	pg = scf_pg_create(g_hndl);
14829 	if (pg == NULL)
14830 		scfdie();
14831 
14832 	if (cur_inst != NULL)
14833 		ret = scf_instance_add_pg(cur_inst, name, type, 0, pg);
14834 	else
14835 		ret = scf_service_add_pg(cur_svc, name, type, 0, pg);
14836 
14837 	if (ret != 0) {
14838 		switch (scf_error()) {
14839 		case SCF_ERROR_EXISTS:
14840 			ret = 0;
14841 			break;
14842 
14843 		case SCF_ERROR_PERMISSION_DENIED:
14844 			semerr(emsg_permission_denied);
14845 			break;
14846 
14847 		default:
14848 			scfdie();
14849 		}
14850 	}
14851 
14852 	scf_pg_destroy(pg);
14853 	return (ret);
14854 }
14855 
14856 int
14857 lscf_setenv(uu_list_t *args, int isunset)
14858 {
14859 	int ret = 0;
14860 	size_t i;
14861 	int argc;
14862 	char **argv = NULL;
14863 	string_list_t *slp;
14864 	char *pattern;
14865 	char *prop;
14866 	int do_service = 0;
14867 	int do_instance = 0;
14868 	const char *method = NULL;
14869 	const char *name = NULL;
14870 	const char *value = NULL;
14871 	scf_instance_t *saved_cur_inst = cur_inst;
14872 
14873 	lscf_prep_hndl();
14874 
14875 	argc = uu_list_numnodes(args);
14876 	if (argc < 1)
14877 		goto usage;
14878 
14879 	argv = calloc(argc + 1, sizeof (char *));
14880 	if (argv == NULL)
14881 		uu_die(gettext("Out of memory.\n"));
14882 
14883 	for (slp = uu_list_first(args), i = 0;
14884 	    slp != NULL;
14885 	    slp = uu_list_next(args, slp), ++i)
14886 		argv[i] = slp->str;
14887 
14888 	argv[i] = NULL;
14889 
14890 	opterr = 0;
14891 	optind = 0;
14892 	for (;;) {
14893 		ret = getopt(argc, argv, "sim:");
14894 		if (ret == -1)
14895 			break;
14896 
14897 		switch (ret) {
14898 		case 's':
14899 			do_service = 1;
14900 			cur_inst = NULL;
14901 			break;
14902 
14903 		case 'i':
14904 			do_instance = 1;
14905 			break;
14906 
14907 		case 'm':
14908 			method = optarg;
14909 			break;
14910 
14911 		case '?':
14912 			goto usage;
14913 
14914 		default:
14915 			bad_error("getopt", ret);
14916 		}
14917 	}
14918 
14919 	argc -= optind;
14920 	if ((do_service && do_instance) ||
14921 	    (isunset && argc != 1) ||
14922 	    (!isunset && argc != 2))
14923 		goto usage;
14924 
14925 	name = argv[optind];
14926 	if (!isunset)
14927 		value = argv[optind + 1];
14928 
14929 	if (cur_snap != NULL) {
14930 		semerr(emsg_cant_modify_snapshots);
14931 		ret = -1;
14932 		goto out;
14933 	}
14934 
14935 	if (cur_inst == NULL && cur_svc == NULL) {
14936 		semerr(emsg_entity_not_selected);
14937 		ret = -1;
14938 		goto out;
14939 	}
14940 
14941 	if (do_instance && cur_inst == NULL) {
14942 		semerr(gettext("No instance is selected.\n"));
14943 		ret = -1;
14944 		goto out;
14945 	}
14946 
14947 	if (do_service && cur_svc == NULL) {
14948 		semerr(gettext("No service is selected.\n"));
14949 		ret = -1;
14950 		goto out;
14951 	}
14952 
14953 	if (method == NULL) {
14954 		if (do_instance || do_service) {
14955 			method = "method_context";
14956 			if (!isunset) {
14957 				ret = addpg("method_context",
14958 				    SCF_GROUP_FRAMEWORK);
14959 				if (ret != 0)
14960 					goto out;
14961 			}
14962 		} else {
14963 			int in_instance;
14964 			method = start_method_name(&in_instance);
14965 			if (method == NULL) {
14966 				semerr(gettext(
14967 				    "Couldn't find start method; please "
14968 				    "specify a method with '-m'.\n"));
14969 				ret = -1;
14970 				goto out;
14971 			}
14972 			if (!in_instance)
14973 				cur_inst = NULL;
14974 		}
14975 	} else {
14976 		scf_propertygroup_t *pg;
14977 		size_t bufsz;
14978 		char *buf;
14979 		int ret;
14980 
14981 		if ((pg = scf_pg_create(g_hndl)) == NULL)
14982 			scfdie();
14983 
14984 		if (cur_inst != NULL)
14985 			ret = scf_instance_get_pg(cur_inst, method, pg);
14986 		else
14987 			ret = scf_service_get_pg(cur_svc, method, pg);
14988 
14989 		if (ret != 0) {
14990 			scf_pg_destroy(pg);
14991 			switch (scf_error()) {
14992 			case SCF_ERROR_NOT_FOUND:
14993 				semerr(gettext("Couldn't find the method "
14994 				    "\"%s\".\n"), method);
14995 				goto out;
14996 
14997 			case SCF_ERROR_INVALID_ARGUMENT:
14998 				semerr(gettext("Invalid method name \"%s\".\n"),
14999 				    method);
15000 				goto out;
15001 
15002 			default:
15003 				scfdie();
15004 			}
15005 		}
15006 
15007 		bufsz = strlen(SCF_GROUP_METHOD) + 1;
15008 		buf = safe_malloc(bufsz);
15009 
15010 		if (scf_pg_get_type(pg, buf, bufsz) < 0 ||
15011 		    strcmp(buf, SCF_GROUP_METHOD) != 0) {
15012 			semerr(gettext("Property group \"%s\" is not of type "
15013 			    "\"method\".\n"), method);
15014 			ret = -1;
15015 			free(buf);
15016 			scf_pg_destroy(pg);
15017 			goto out;
15018 		}
15019 
15020 		free(buf);
15021 		scf_pg_destroy(pg);
15022 	}
15023 
15024 	prop = uu_msprintf("%s/environment", method);
15025 	pattern = uu_msprintf("%s=*", name);
15026 
15027 	if (prop == NULL || pattern == NULL)
15028 		uu_die(gettext("Out of memory.\n"));
15029 
15030 	ret = lscf_delpropvalue(prop, pattern, !isunset);
15031 
15032 	if (ret == 0 && !isunset) {
15033 		uu_free(pattern);
15034 		uu_free(prop);
15035 		prop = uu_msprintf("%s/environment", method);
15036 		pattern = uu_msprintf("%s=%s", name, value);
15037 		if (prop == NULL || pattern == NULL)
15038 			uu_die(gettext("Out of memory.\n"));
15039 		ret = lscf_addpropvalue(prop, "astring:", pattern);
15040 	}
15041 	uu_free(pattern);
15042 	uu_free(prop);
15043 
15044 out:
15045 	cur_inst = saved_cur_inst;
15046 
15047 	free(argv);
15048 	return (ret);
15049 usage:
15050 	ret = -2;
15051 	goto out;
15052 }
15053 
15054 /*
15055  * Snapshot commands
15056  */
15057 
15058 void
15059 lscf_listsnap()
15060 {
15061 	scf_snapshot_t *snap;
15062 	scf_iter_t *iter;
15063 	char *nb;
15064 	int r;
15065 
15066 	lscf_prep_hndl();
15067 
15068 	if (cur_inst == NULL) {
15069 		semerr(gettext("Instance not selected.\n"));
15070 		return;
15071 	}
15072 
15073 	if ((snap = scf_snapshot_create(g_hndl)) == NULL ||
15074 	    (iter = scf_iter_create(g_hndl)) == NULL)
15075 		scfdie();
15076 
15077 	if (scf_iter_instance_snapshots(iter, cur_inst) != SCF_SUCCESS)
15078 		scfdie();
15079 
15080 	nb = safe_malloc(max_scf_name_len + 1);
15081 
15082 	while ((r = scf_iter_next_snapshot(iter, snap)) == 1) {
15083 		if (scf_snapshot_get_name(snap, nb, max_scf_name_len + 1) < 0)
15084 			scfdie();
15085 
15086 		(void) puts(nb);
15087 	}
15088 	if (r < 0)
15089 		scfdie();
15090 
15091 	free(nb);
15092 	scf_iter_destroy(iter);
15093 	scf_snapshot_destroy(snap);
15094 }
15095 
15096 void
15097 lscf_selectsnap(const char *name)
15098 {
15099 	scf_snapshot_t *snap;
15100 	scf_snaplevel_t *level;
15101 
15102 	lscf_prep_hndl();
15103 
15104 	if (cur_inst == NULL) {
15105 		semerr(gettext("Instance not selected.\n"));
15106 		return;
15107 	}
15108 
15109 	if (cur_snap != NULL) {
15110 		if (name != NULL) {
15111 			char *cur_snap_name;
15112 			boolean_t nochange;
15113 
15114 			cur_snap_name = safe_malloc(max_scf_name_len + 1);
15115 
15116 			if (scf_snapshot_get_name(cur_snap, cur_snap_name,
15117 			    max_scf_name_len + 1) < 0)
15118 				scfdie();
15119 
15120 			nochange = strcmp(name, cur_snap_name) == 0;
15121 
15122 			free(cur_snap_name);
15123 
15124 			if (nochange)
15125 				return;
15126 		}
15127 
15128 		unselect_cursnap();
15129 	}
15130 
15131 	if (name == NULL)
15132 		return;
15133 
15134 	if ((snap = scf_snapshot_create(g_hndl)) == NULL ||
15135 	    (level = scf_snaplevel_create(g_hndl)) == NULL)
15136 		scfdie();
15137 
15138 	if (scf_instance_get_snapshot(cur_inst, name, snap) !=
15139 	    SCF_SUCCESS) {
15140 		switch (scf_error()) {
15141 		case SCF_ERROR_INVALID_ARGUMENT:
15142 			semerr(gettext("Invalid name \"%s\".\n"), name);
15143 			break;
15144 
15145 		case SCF_ERROR_NOT_FOUND:
15146 			semerr(gettext("No such snapshot \"%s\".\n"), name);
15147 			break;
15148 
15149 		default:
15150 			scfdie();
15151 		}
15152 
15153 		scf_snaplevel_destroy(level);
15154 		scf_snapshot_destroy(snap);
15155 		return;
15156 	}
15157 
15158 	/* Load the snaplevels into our list. */
15159 	cur_levels = uu_list_create(snaplevel_pool, NULL, 0);
15160 	if (cur_levels == NULL)
15161 		uu_die(gettext("Could not create list: %s\n"),
15162 		    uu_strerror(uu_error()));
15163 
15164 	if (scf_snapshot_get_base_snaplevel(snap, level) != SCF_SUCCESS) {
15165 		if (scf_error() != SCF_ERROR_NOT_FOUND)
15166 			scfdie();
15167 
15168 		semerr(gettext("Snapshot has no snaplevels.\n"));
15169 
15170 		scf_snaplevel_destroy(level);
15171 		scf_snapshot_destroy(snap);
15172 		return;
15173 	}
15174 
15175 	cur_snap = snap;
15176 
15177 	for (;;) {
15178 		cur_elt = safe_malloc(sizeof (*cur_elt));
15179 		uu_list_node_init(cur_elt, &cur_elt->list_node,
15180 		    snaplevel_pool);
15181 		cur_elt->sl = level;
15182 		if (uu_list_insert_after(cur_levels, NULL, cur_elt) != 0)
15183 			uu_die(gettext("libuutil error: %s\n"),
15184 			    uu_strerror(uu_error()));
15185 
15186 		level = scf_snaplevel_create(g_hndl);
15187 		if (level == NULL)
15188 			scfdie();
15189 
15190 		if (scf_snaplevel_get_next_snaplevel(cur_elt->sl,
15191 		    level) != SCF_SUCCESS) {
15192 			if (scf_error() != SCF_ERROR_NOT_FOUND)
15193 				scfdie();
15194 
15195 			scf_snaplevel_destroy(level);
15196 			break;
15197 		}
15198 	}
15199 
15200 	cur_elt = uu_list_last(cur_levels);
15201 	cur_level = cur_elt->sl;
15202 }
15203 
15204 /*
15205  * Copies the properties & values in src to dst.  Assumes src won't change.
15206  * Returns -1 if permission is denied, -2 if another transaction interrupts,
15207  * and 0 on success.
15208  *
15209  * If enabled is 0 or 1, its value is used for the SCF_PROPERTY_ENABLED
15210  * property, if it is copied and has type boolean.  (See comment in
15211  * lscf_revert()).
15212  */
15213 static int
15214 pg_copy(const scf_propertygroup_t *src, scf_propertygroup_t *dst,
15215     uint8_t enabled)
15216 {
15217 	scf_transaction_t *tx;
15218 	scf_iter_t *iter, *viter;
15219 	scf_property_t *prop;
15220 	scf_value_t *v;
15221 	char *nbuf;
15222 	int r;
15223 
15224 	tx = scf_transaction_create(g_hndl);
15225 	if (tx == NULL)
15226 		scfdie();
15227 
15228 	if (scf_transaction_start(tx, dst) != SCF_SUCCESS) {
15229 		if (scf_error() != SCF_ERROR_PERMISSION_DENIED)
15230 			scfdie();
15231 
15232 		scf_transaction_destroy(tx);
15233 
15234 		return (-1);
15235 	}
15236 
15237 	if ((iter = scf_iter_create(g_hndl)) == NULL ||
15238 	    (prop = scf_property_create(g_hndl)) == NULL ||
15239 	    (viter = scf_iter_create(g_hndl)) == NULL)
15240 		scfdie();
15241 
15242 	nbuf = safe_malloc(max_scf_name_len + 1);
15243 
15244 	if (scf_iter_pg_properties(iter, src) != SCF_SUCCESS)
15245 		scfdie();
15246 
15247 	for (;;) {
15248 		scf_transaction_entry_t *e;
15249 		scf_type_t ty;
15250 
15251 		r = scf_iter_next_property(iter, prop);
15252 		if (r == -1)
15253 			scfdie();
15254 		if (r == 0)
15255 			break;
15256 
15257 		e = scf_entry_create(g_hndl);
15258 		if (e == NULL)
15259 			scfdie();
15260 
15261 		if (scf_property_type(prop, &ty) != SCF_SUCCESS)
15262 			scfdie();
15263 
15264 		if (scf_property_get_name(prop, nbuf, max_scf_name_len + 1) < 0)
15265 			scfdie();
15266 
15267 		if (scf_transaction_property_new(tx, e, nbuf,
15268 		    ty) != SCF_SUCCESS)
15269 			scfdie();
15270 
15271 		if ((enabled == 0 || enabled == 1) &&
15272 		    strcmp(nbuf, scf_property_enabled) == 0 &&
15273 		    ty == SCF_TYPE_BOOLEAN) {
15274 			v = scf_value_create(g_hndl);
15275 			if (v == NULL)
15276 				scfdie();
15277 
15278 			scf_value_set_boolean(v, enabled);
15279 
15280 			if (scf_entry_add_value(e, v) != 0)
15281 				scfdie();
15282 		} else {
15283 			if (scf_iter_property_values(viter, prop) != 0)
15284 				scfdie();
15285 
15286 			for (;;) {
15287 				v = scf_value_create(g_hndl);
15288 				if (v == NULL)
15289 					scfdie();
15290 
15291 				r = scf_iter_next_value(viter, v);
15292 				if (r == -1)
15293 					scfdie();
15294 				if (r == 0) {
15295 					scf_value_destroy(v);
15296 					break;
15297 				}
15298 
15299 				if (scf_entry_add_value(e, v) != SCF_SUCCESS)
15300 					scfdie();
15301 			}
15302 		}
15303 	}
15304 
15305 	free(nbuf);
15306 	scf_iter_destroy(viter);
15307 	scf_property_destroy(prop);
15308 	scf_iter_destroy(iter);
15309 
15310 	r = scf_transaction_commit(tx);
15311 	if (r == -1 && scf_error() != SCF_ERROR_PERMISSION_DENIED)
15312 		scfdie();
15313 
15314 	scf_transaction_destroy_children(tx);
15315 	scf_transaction_destroy(tx);
15316 
15317 	switch (r) {
15318 	case 1:		return (0);
15319 	case 0:		return (-2);
15320 	case -1:	return (-1);
15321 
15322 	default:
15323 		abort();
15324 	}
15325 
15326 	/* NOTREACHED */
15327 }
15328 
15329 void
15330 lscf_revert(const char *snapname)
15331 {
15332 	scf_snapshot_t *snap, *prev;
15333 	scf_snaplevel_t *level, *nlevel;
15334 	scf_iter_t *iter;
15335 	scf_propertygroup_t *pg, *npg;
15336 	scf_property_t *prop;
15337 	scf_value_t *val;
15338 	char *nbuf, *tbuf;
15339 	uint8_t enabled;
15340 
15341 	lscf_prep_hndl();
15342 
15343 	if (cur_inst == NULL) {
15344 		semerr(gettext("Instance not selected.\n"));
15345 		return;
15346 	}
15347 
15348 	if (snapname != NULL) {
15349 		snap = scf_snapshot_create(g_hndl);
15350 		if (snap == NULL)
15351 			scfdie();
15352 
15353 		if (scf_instance_get_snapshot(cur_inst, snapname, snap) !=
15354 		    SCF_SUCCESS) {
15355 			switch (scf_error()) {
15356 			case SCF_ERROR_INVALID_ARGUMENT:
15357 				semerr(gettext("Invalid snapshot name "
15358 				    "\"%s\".\n"), snapname);
15359 				break;
15360 
15361 			case SCF_ERROR_NOT_FOUND:
15362 				semerr(gettext("No such snapshot.\n"));
15363 				break;
15364 
15365 			default:
15366 				scfdie();
15367 			}
15368 
15369 			scf_snapshot_destroy(snap);
15370 			return;
15371 		}
15372 	} else {
15373 		if (cur_snap != NULL) {
15374 			snap = cur_snap;
15375 		} else {
15376 			semerr(gettext("No snapshot selected.\n"));
15377 			return;
15378 		}
15379 	}
15380 
15381 	if ((prev = scf_snapshot_create(g_hndl)) == NULL ||
15382 	    (level = scf_snaplevel_create(g_hndl)) == NULL ||
15383 	    (iter = scf_iter_create(g_hndl)) == NULL ||
15384 	    (pg = scf_pg_create(g_hndl)) == NULL ||
15385 	    (npg = scf_pg_create(g_hndl)) == NULL ||
15386 	    (prop = scf_property_create(g_hndl)) == NULL ||
15387 	    (val = scf_value_create(g_hndl)) == NULL)
15388 		scfdie();
15389 
15390 	nbuf = safe_malloc(max_scf_name_len + 1);
15391 	tbuf = safe_malloc(max_scf_pg_type_len + 1);
15392 
15393 	/* Take the "previous" snapshot before we blow away the properties. */
15394 	if (scf_instance_get_snapshot(cur_inst, snap_previous, prev) == 0) {
15395 		if (_scf_snapshot_take_attach(cur_inst, prev) != 0)
15396 			scfdie();
15397 	} else {
15398 		if (scf_error() != SCF_ERROR_NOT_FOUND)
15399 			scfdie();
15400 
15401 		if (_scf_snapshot_take_new(cur_inst, snap_previous, prev) != 0)
15402 			scfdie();
15403 	}
15404 
15405 	/* Save general/enabled, since we're probably going to replace it. */
15406 	enabled = 2;
15407 	if (scf_instance_get_pg(cur_inst, scf_pg_general, pg) == 0 &&
15408 	    scf_pg_get_property(pg, scf_property_enabled, prop) == 0 &&
15409 	    scf_property_get_value(prop, val) == 0)
15410 		(void) scf_value_get_boolean(val, &enabled);
15411 
15412 	if (scf_snapshot_get_base_snaplevel(snap, level) != SCF_SUCCESS) {
15413 		if (scf_error() != SCF_ERROR_NOT_FOUND)
15414 			scfdie();
15415 
15416 		goto out;
15417 	}
15418 
15419 	for (;;) {
15420 		boolean_t isinst;
15421 		uint32_t flags;
15422 		int r;
15423 
15424 		/* Clear the properties from the corresponding entity. */
15425 		isinst = snaplevel_is_instance(level);
15426 
15427 		if (!isinst)
15428 			r = scf_iter_service_pgs(iter, cur_svc);
15429 		else
15430 			r = scf_iter_instance_pgs(iter, cur_inst);
15431 		if (r != SCF_SUCCESS)
15432 			scfdie();
15433 
15434 		while ((r = scf_iter_next_pg(iter, pg)) == 1) {
15435 			if (scf_pg_get_flags(pg, &flags) != SCF_SUCCESS)
15436 				scfdie();
15437 
15438 			/* Skip nonpersistent pgs. */
15439 			if (flags & SCF_PG_FLAG_NONPERSISTENT)
15440 				continue;
15441 
15442 			if (scf_pg_delete(pg) != SCF_SUCCESS) {
15443 				if (scf_error() != SCF_ERROR_PERMISSION_DENIED)
15444 					scfdie();
15445 
15446 				semerr(emsg_permission_denied);
15447 				goto out;
15448 			}
15449 		}
15450 		if (r == -1)
15451 			scfdie();
15452 
15453 		/* Copy the properties to the corresponding entity. */
15454 		if (scf_iter_snaplevel_pgs(iter, level) != SCF_SUCCESS)
15455 			scfdie();
15456 
15457 		while ((r = scf_iter_next_pg(iter, pg)) == 1) {
15458 			if (scf_pg_get_name(pg, nbuf, max_scf_name_len + 1) < 0)
15459 				scfdie();
15460 
15461 			if (scf_pg_get_type(pg, tbuf, max_scf_pg_type_len + 1) <
15462 			    0)
15463 				scfdie();
15464 
15465 			if (scf_pg_get_flags(pg, &flags) != SCF_SUCCESS)
15466 				scfdie();
15467 
15468 			if (!isinst)
15469 				r = scf_service_add_pg(cur_svc, nbuf, tbuf,
15470 				    flags, npg);
15471 			else
15472 				r = scf_instance_add_pg(cur_inst, nbuf, tbuf,
15473 				    flags, npg);
15474 			if (r != SCF_SUCCESS) {
15475 				if (scf_error() != SCF_ERROR_PERMISSION_DENIED)
15476 					scfdie();
15477 
15478 				semerr(emsg_permission_denied);
15479 				goto out;
15480 			}
15481 
15482 			if ((enabled == 0 || enabled == 1) &&
15483 			    strcmp(nbuf, scf_pg_general) == 0)
15484 				r = pg_copy(pg, npg, enabled);
15485 			else
15486 				r = pg_copy(pg, npg, 2);
15487 
15488 			switch (r) {
15489 			case 0:
15490 				break;
15491 
15492 			case -1:
15493 				semerr(emsg_permission_denied);
15494 				goto out;
15495 
15496 			case -2:
15497 				semerr(gettext(
15498 				    "Interrupted by another change.\n"));
15499 				goto out;
15500 
15501 			default:
15502 				abort();
15503 			}
15504 		}
15505 		if (r == -1)
15506 			scfdie();
15507 
15508 		/* Get next level. */
15509 		nlevel = scf_snaplevel_create(g_hndl);
15510 		if (nlevel == NULL)
15511 			scfdie();
15512 
15513 		if (scf_snaplevel_get_next_snaplevel(level, nlevel) !=
15514 		    SCF_SUCCESS) {
15515 			if (scf_error() != SCF_ERROR_NOT_FOUND)
15516 				scfdie();
15517 
15518 			scf_snaplevel_destroy(nlevel);
15519 			break;
15520 		}
15521 
15522 		scf_snaplevel_destroy(level);
15523 		level = nlevel;
15524 	}
15525 
15526 	if (snapname == NULL) {
15527 		lscf_selectsnap(NULL);
15528 		snap = NULL;		/* cur_snap has been destroyed */
15529 	}
15530 
15531 out:
15532 	free(tbuf);
15533 	free(nbuf);
15534 	scf_value_destroy(val);
15535 	scf_property_destroy(prop);
15536 	scf_pg_destroy(npg);
15537 	scf_pg_destroy(pg);
15538 	scf_iter_destroy(iter);
15539 	scf_snaplevel_destroy(level);
15540 	scf_snapshot_destroy(prev);
15541 	if (snap != cur_snap)
15542 		scf_snapshot_destroy(snap);
15543 }
15544 
15545 void
15546 lscf_refresh(void)
15547 {
15548 	ssize_t fmrilen;
15549 	size_t bufsz;
15550 	char *fmribuf;
15551 	int r;
15552 
15553 	lscf_prep_hndl();
15554 
15555 	if (cur_inst == NULL) {
15556 		semerr(gettext("Instance not selected.\n"));
15557 		return;
15558 	}
15559 
15560 	bufsz = max_scf_fmri_len + 1;
15561 	fmribuf = safe_malloc(bufsz);
15562 	fmrilen = scf_instance_to_fmri(cur_inst, fmribuf, bufsz);
15563 	if (fmrilen < 0) {
15564 		free(fmribuf);
15565 		if (scf_error() != SCF_ERROR_DELETED)
15566 			scfdie();
15567 		scf_instance_destroy(cur_inst);
15568 		cur_inst = NULL;
15569 		warn(emsg_deleted);
15570 		return;
15571 	}
15572 	assert(fmrilen < bufsz);
15573 
15574 	r = refresh_entity(0, cur_inst, fmribuf, NULL, NULL, NULL);
15575 	switch (r) {
15576 	case 0:
15577 		break;
15578 
15579 	case ECONNABORTED:
15580 		warn(gettext("Could not refresh %s "
15581 		    "(repository connection broken).\n"), fmribuf);
15582 		break;
15583 
15584 	case ECANCELED:
15585 		warn(emsg_deleted);
15586 		break;
15587 
15588 	case EPERM:
15589 		warn(gettext("Could not refresh %s "
15590 		    "(permission denied).\n"), fmribuf);
15591 		break;
15592 
15593 	case ENOSPC:
15594 		warn(gettext("Could not refresh %s "
15595 		    "(repository server out of resources).\n"),
15596 		    fmribuf);
15597 		break;
15598 
15599 	case EACCES:
15600 	default:
15601 		bad_error("refresh_entity", scf_error());
15602 	}
15603 
15604 	free(fmribuf);
15605 }
15606 
15607 /*
15608  * describe [-v] [-t] [pg/prop]
15609  */
15610 int
15611 lscf_describe(uu_list_t *args, int hasargs)
15612 {
15613 	int ret = 0;
15614 	size_t i;
15615 	int argc;
15616 	char **argv = NULL;
15617 	string_list_t *slp;
15618 	int do_verbose = 0;
15619 	int do_templates = 0;
15620 	char *pattern = NULL;
15621 
15622 	lscf_prep_hndl();
15623 
15624 	if (hasargs != 0)  {
15625 		argc = uu_list_numnodes(args);
15626 		if (argc < 1)
15627 			goto usage;
15628 
15629 		argv = calloc(argc + 1, sizeof (char *));
15630 		if (argv == NULL)
15631 			uu_die(gettext("Out of memory.\n"));
15632 
15633 		for (slp = uu_list_first(args), i = 0;
15634 		    slp != NULL;
15635 		    slp = uu_list_next(args, slp), ++i)
15636 			argv[i] = slp->str;
15637 
15638 		argv[i] = NULL;
15639 
15640 		/*
15641 		 * We start optind = 0 because our list of arguments
15642 		 * starts at argv[0]
15643 		 */
15644 		optind = 0;
15645 		opterr = 0;
15646 		for (;;) {
15647 			ret = getopt(argc, argv, "vt");
15648 			if (ret == -1)
15649 				break;
15650 
15651 			switch (ret) {
15652 			case 'v':
15653 				do_verbose = 1;
15654 				break;
15655 
15656 			case 't':
15657 				do_templates = 1;
15658 				break;
15659 
15660 			case '?':
15661 				goto usage;
15662 
15663 			default:
15664 				bad_error("getopt", ret);
15665 			}
15666 		}
15667 
15668 		pattern = argv[optind];
15669 	}
15670 
15671 	if (cur_inst == NULL && cur_svc == NULL) {
15672 		semerr(emsg_entity_not_selected);
15673 		ret = -1;
15674 		goto out;
15675 	}
15676 
15677 	/*
15678 	 * list_entity_tmpl(), listprop() and listtmpl() produce verbose
15679 	 * output if their last parameter is set to 2.  Less information is
15680 	 * produced if the parameter is set to 1.
15681 	 */
15682 	if (pattern == NULL) {
15683 		if (do_verbose == 1)
15684 			list_entity_tmpl(2);
15685 		else
15686 			list_entity_tmpl(1);
15687 	}
15688 
15689 	if (do_templates == 0) {
15690 		if (do_verbose == 1)
15691 			listprop(pattern, 0, 2);
15692 		else
15693 			listprop(pattern, 0, 1);
15694 	} else {
15695 		if (do_verbose == 1)
15696 			listtmpl(pattern, 2);
15697 		else
15698 			listtmpl(pattern, 1);
15699 	}
15700 
15701 	ret = 0;
15702 out:
15703 	if (argv != NULL)
15704 		free(argv);
15705 	return (ret);
15706 usage:
15707 	ret = -2;
15708 	goto out;
15709 }
15710 
15711 #define	PARAM_ACTIVE	((const char *) "active")
15712 #define	PARAM_INACTIVE	((const char *) "inactive")
15713 #define	PARAM_SMTP_TO	((const char *) "to")
15714 
15715 /*
15716  * tokenize()
15717  * Breaks down the string according to the tokens passed.
15718  * Caller is responsible for freeing array of pointers returned.
15719  * Returns NULL on failure
15720  */
15721 char **
15722 tokenize(char *str, const char *sep)
15723 {
15724 	char *token, *lasts;
15725 	char **buf;
15726 	int n = 0;	/* number of elements */
15727 	int size = 8;	/* size of the array (initial) */
15728 
15729 	buf = safe_malloc(size * sizeof (char *));
15730 
15731 	for (token = strtok_r(str, sep, &lasts); token != NULL;
15732 	    token = strtok_r(NULL, sep, &lasts), ++n) {
15733 		if (n + 1 >= size) {
15734 			size *= 2;
15735 			if ((buf = realloc(buf, size * sizeof (char *))) ==
15736 			    NULL) {
15737 				uu_die(gettext("Out of memory"));
15738 			}
15739 		}
15740 		buf[n] = token;
15741 	}
15742 	/* NULL terminate the pointer array */
15743 	buf[n] = NULL;
15744 
15745 	return (buf);
15746 }
15747 
15748 int32_t
15749 check_tokens(char **p)
15750 {
15751 	int32_t smf = 0;
15752 	int32_t fma = 0;
15753 
15754 	while (*p) {
15755 		int32_t t = string_to_tset(*p);
15756 
15757 		if (t == 0) {
15758 			if (is_fma_token(*p) == 0)
15759 				return (INVALID_TOKENS);
15760 			fma = 1; /* this token is an fma event */
15761 		} else {
15762 			smf |= t;
15763 		}
15764 
15765 		if (smf != 0 && fma == 1)
15766 			return (MIXED_TOKENS);
15767 		++p;
15768 	}
15769 
15770 	if (smf > 0)
15771 		return (smf);
15772 	else if (fma == 1)
15773 		return (FMA_TOKENS);
15774 
15775 	return (INVALID_TOKENS);
15776 }
15777 
15778 static int
15779 get_selection_str(char *fmri, size_t sz)
15780 {
15781 	if (g_hndl == NULL) {
15782 		semerr(emsg_entity_not_selected);
15783 		return (-1);
15784 	} else if (cur_level != NULL) {
15785 		semerr(emsg_invalid_for_snapshot);
15786 		return (-1);
15787 	} else {
15788 		lscf_get_selection_str(fmri, sz);
15789 	}
15790 
15791 	return (0);
15792 }
15793 
15794 void
15795 lscf_delnotify(const char *set, int global)
15796 {
15797 	char *str = strdup(set);
15798 	char **pgs;
15799 	char **p;
15800 	int32_t tset;
15801 	char *fmri = NULL;
15802 
15803 	if (str == NULL)
15804 		uu_die(gettext("Out of memory.\n"));
15805 
15806 	pgs = tokenize(str, ",");
15807 
15808 	if ((tset = check_tokens(pgs)) > 0) {
15809 		size_t sz = max_scf_fmri_len + 1;
15810 
15811 		fmri = safe_malloc(sz);
15812 		if (global) {
15813 			(void) strlcpy(fmri, SCF_INSTANCE_GLOBAL, sz);
15814 		} else if (get_selection_str(fmri, sz) != 0) {
15815 			goto out;
15816 		}
15817 
15818 		if (smf_notify_del_params(SCF_SVC_TRANSITION_CLASS, fmri,
15819 		    tset) != SCF_SUCCESS) {
15820 			uu_warn(gettext("Failed smf_notify_del_params: %s\n"),
15821 			    scf_strerror(scf_error()));
15822 		}
15823 	} else if (tset == FMA_TOKENS) {
15824 		if (global) {
15825 			semerr(gettext("Can't use option '-g' with FMA event "
15826 			    "definitions\n"));
15827 			goto out;
15828 		}
15829 
15830 		for (p = pgs; *p; ++p) {
15831 			if (smf_notify_del_params(de_tag(*p), NULL, 0) !=
15832 			    SCF_SUCCESS) {
15833 				uu_warn(gettext("Failed for \"%s\": %s\n"), *p,
15834 				    scf_strerror(scf_error()));
15835 				goto out;
15836 			}
15837 		}
15838 	} else if (tset == MIXED_TOKENS) {
15839 		semerr(gettext("Can't mix SMF and FMA event definitions\n"));
15840 		goto out;
15841 	} else {
15842 		uu_die(gettext("Invalid input.\n"));
15843 	}
15844 
15845 out:
15846 	free(fmri);
15847 	free(pgs);
15848 	free(str);
15849 }
15850 
15851 void
15852 lscf_listnotify(const char *set, int global)
15853 {
15854 	char *str = safe_strdup(set);
15855 	char **pgs;
15856 	char **p;
15857 	int32_t tset;
15858 	nvlist_t *nvl;
15859 	char *fmri = NULL;
15860 
15861 	if (nvlist_alloc(&nvl, NV_UNIQUE_NAME, 0) != 0)
15862 		uu_die(gettext("Out of memory.\n"));
15863 
15864 	pgs = tokenize(str, ",");
15865 
15866 	if ((tset = check_tokens(pgs)) > 0) {
15867 		size_t sz = max_scf_fmri_len + 1;
15868 
15869 		fmri = safe_malloc(sz);
15870 		if (global) {
15871 			(void) strlcpy(fmri, SCF_INSTANCE_GLOBAL, sz);
15872 		} else if (get_selection_str(fmri, sz) != 0) {
15873 			goto out;
15874 		}
15875 
15876 		if (_scf_get_svc_notify_params(fmri, nvl, tset, 1, 1) !=
15877 		    SCF_SUCCESS) {
15878 			if (scf_error() != SCF_ERROR_NOT_FOUND &&
15879 			    scf_error() != SCF_ERROR_DELETED)
15880 				uu_warn(gettext(
15881 				    "Failed listnotify: %s\n"),
15882 				    scf_strerror(scf_error()));
15883 			goto out;
15884 		}
15885 
15886 		listnotify_print(nvl, NULL);
15887 	} else if (tset == FMA_TOKENS) {
15888 		if (global) {
15889 			semerr(gettext("Can't use option '-g' with FMA event "
15890 			    "definitions\n"));
15891 			goto out;
15892 		}
15893 
15894 		for (p = pgs; *p; ++p) {
15895 			if (_scf_get_fma_notify_params(de_tag(*p), nvl, 1) !=
15896 			    SCF_SUCCESS) {
15897 				/*
15898 				 * if the preferences have just been deleted
15899 				 * or does not exist, just skip.
15900 				 */
15901 				if (scf_error() == SCF_ERROR_NOT_FOUND ||
15902 				    scf_error() == SCF_ERROR_DELETED)
15903 					continue;
15904 				uu_warn(gettext(
15905 				    "Failed listnotify: %s\n"),
15906 				    scf_strerror(scf_error()));
15907 				goto out;
15908 			}
15909 			listnotify_print(nvl, re_tag(*p));
15910 		}
15911 	} else if (tset == MIXED_TOKENS) {
15912 		semerr(gettext("Can't mix SMF and FMA event definitions\n"));
15913 		goto out;
15914 	} else {
15915 		semerr(gettext("Invalid input.\n"));
15916 	}
15917 
15918 out:
15919 	nvlist_free(nvl);
15920 	free(fmri);
15921 	free(pgs);
15922 	free(str);
15923 }
15924 
15925 static char *
15926 strip_quotes_and_blanks(char *s)
15927 {
15928 	char *start = s;
15929 	char *end = strrchr(s, '\"');
15930 
15931 	if (s[0] == '\"' && end != NULL && *(end + 1) == '\0') {
15932 		start = s + 1;
15933 		while (isblank(*start))
15934 			start++;
15935 		while (isblank(*(end - 1)) && end > start) {
15936 			end--;
15937 		}
15938 		*end = '\0';
15939 	}
15940 
15941 	return (start);
15942 }
15943 
15944 static int
15945 set_active(nvlist_t *mech, const char *hier_part)
15946 {
15947 	boolean_t b;
15948 
15949 	if (*hier_part == '\0' || strcmp(hier_part, PARAM_ACTIVE) == 0) {
15950 		b = B_TRUE;
15951 	} else if (strcmp(hier_part, PARAM_INACTIVE) == 0) {
15952 		b = B_FALSE;
15953 	} else {
15954 		return (-1);
15955 	}
15956 
15957 	if (nvlist_add_boolean_value(mech, PARAM_ACTIVE, b) != 0)
15958 		uu_die(gettext("Out of memory.\n"));
15959 
15960 	return (0);
15961 }
15962 
15963 static int
15964 add_snmp_params(nvlist_t *mech, char *hier_part)
15965 {
15966 	return (set_active(mech, hier_part));
15967 }
15968 
15969 static int
15970 add_syslog_params(nvlist_t *mech, char *hier_part)
15971 {
15972 	return (set_active(mech, hier_part));
15973 }
15974 
15975 /*
15976  * add_mailto_paramas()
15977  * parse the hier_part of mailto URI
15978  * mailto:<addr>[?<header1>=<value1>[&<header2>=<value2>]]
15979  * or mailto:{[active]|inactive}
15980  */
15981 static int
15982 add_mailto_params(nvlist_t *mech, char *hier_part)
15983 {
15984 	const char *tok = "?&";
15985 	char *p;
15986 	char *lasts;
15987 	char *param;
15988 	char *val;
15989 
15990 	/*
15991 	 * If the notification parametes are in the form of
15992 	 *
15993 	 *   malito:{[active]|inactive}
15994 	 *
15995 	 * we set the property accordingly and return.
15996 	 * Otherwise, we make the notification type active and
15997 	 * process the hier_part.
15998 	 */
15999 	if (set_active(mech, hier_part) == 0)
16000 		return (0);
16001 	else if (set_active(mech, PARAM_ACTIVE) != 0)
16002 		return (-1);
16003 
16004 	if ((p = strtok_r(hier_part, tok, &lasts)) == NULL) {
16005 		/*
16006 		 * sanity check: we only get here if hier_part = "", but
16007 		 * that's handled by set_active
16008 		 */
16009 		uu_die("strtok_r");
16010 	}
16011 
16012 	if (nvlist_add_string(mech, PARAM_SMTP_TO, p) != 0)
16013 		uu_die(gettext("Out of memory.\n"));
16014 
16015 	while ((p = strtok_r(NULL, tok, &lasts)) != NULL)
16016 		if ((param = strtok_r(p, "=", &val)) != NULL)
16017 			if (nvlist_add_string(mech, param, val) != 0)
16018 				uu_die(gettext("Out of memory.\n"));
16019 
16020 	return (0);
16021 }
16022 
16023 static int
16024 uri_split(char *uri, char **scheme, char **hier_part)
16025 {
16026 	int r = -1;
16027 
16028 	if ((*scheme = strtok_r(uri, ":", hier_part)) == NULL ||
16029 	    *hier_part == NULL) {
16030 		semerr(gettext("'%s' is not an URI\n"), uri);
16031 		return (r);
16032 	}
16033 
16034 	if ((r = check_uri_scheme(*scheme)) < 0) {
16035 		semerr(gettext("Unkown URI scheme: %s\n"), *scheme);
16036 		return (r);
16037 	}
16038 
16039 	return (r);
16040 }
16041 
16042 static int
16043 process_uri(nvlist_t *params, char *uri)
16044 {
16045 	char *scheme;
16046 	char *hier_part;
16047 	nvlist_t *mech;
16048 	int index;
16049 	int r;
16050 
16051 	if ((index = uri_split(uri, &scheme, &hier_part)) < 0)
16052 		return (-1);
16053 
16054 	if (nvlist_alloc(&mech, NV_UNIQUE_NAME, 0) != 0)
16055 		uu_die(gettext("Out of memory.\n"));
16056 
16057 	switch (index) {
16058 	case 0:
16059 		/* error messages displayed by called function */
16060 		r = add_mailto_params(mech, hier_part);
16061 		break;
16062 
16063 	case 1:
16064 		if ((r = add_snmp_params(mech, hier_part)) != 0)
16065 			semerr(gettext("Not valid parameters: '%s'\n"),
16066 			    hier_part);
16067 		break;
16068 
16069 	case 2:
16070 		if ((r = add_syslog_params(mech, hier_part)) != 0)
16071 			semerr(gettext("Not valid parameters: '%s'\n"),
16072 			    hier_part);
16073 		break;
16074 
16075 	default:
16076 		r = -1;
16077 	}
16078 
16079 	if (r == 0 && nvlist_add_nvlist(params, uri_scheme[index].protocol,
16080 	    mech) != 0)
16081 		uu_die(gettext("Out of memory.\n"));
16082 
16083 	nvlist_free(mech);
16084 	return (r);
16085 }
16086 
16087 static int
16088 set_params(nvlist_t *params, char **p)
16089 {
16090 	char *uri;
16091 
16092 	if (p == NULL)
16093 		/* sanity check */
16094 		uu_die("set_params");
16095 
16096 	while (*p) {
16097 		uri = strip_quotes_and_blanks(*p);
16098 		if (process_uri(params, uri) != 0)
16099 			return (-1);
16100 
16101 		++p;
16102 	}
16103 
16104 	return (0);
16105 }
16106 
16107 static int
16108 setnotify(const char *e, char **p, int global)
16109 {
16110 	char *str = safe_strdup(e);
16111 	char **events;
16112 	int32_t tset;
16113 	int r = -1;
16114 	nvlist_t *nvl, *params;
16115 	char *fmri = NULL;
16116 
16117 	if (nvlist_alloc(&nvl, NV_UNIQUE_NAME, 0) != 0 ||
16118 	    nvlist_alloc(&params, NV_UNIQUE_NAME, 0) != 0 ||
16119 	    nvlist_add_uint32(nvl, SCF_NOTIFY_NAME_VERSION,
16120 	    SCF_NOTIFY_PARAMS_VERSION) != 0)
16121 		uu_die(gettext("Out of memory.\n"));
16122 
16123 	events = tokenize(str, ",");
16124 
16125 	if ((tset = check_tokens(events)) > 0) {
16126 		/* SMF state transitions parameters */
16127 		size_t sz = max_scf_fmri_len + 1;
16128 
16129 		fmri = safe_malloc(sz);
16130 		if (global) {
16131 			(void) strlcpy(fmri, SCF_INSTANCE_GLOBAL, sz);
16132 		} else if (get_selection_str(fmri, sz) != 0) {
16133 			goto out;
16134 		}
16135 
16136 		if (nvlist_add_string(nvl, SCF_NOTIFY_NAME_FMRI, fmri) != 0 ||
16137 		    nvlist_add_int32(nvl, SCF_NOTIFY_NAME_TSET, tset) != 0)
16138 			uu_die(gettext("Out of memory.\n"));
16139 
16140 		if ((r = set_params(params, p)) == 0) {
16141 			if (nvlist_add_nvlist(nvl, SCF_NOTIFY_PARAMS,
16142 			    params) != 0)
16143 				uu_die(gettext("Out of memory.\n"));
16144 
16145 			if (smf_notify_set_params(SCF_SVC_TRANSITION_CLASS,
16146 			    nvl) != SCF_SUCCESS) {
16147 				r = -1;
16148 				uu_warn(gettext(
16149 				    "Failed smf_notify_set_params(3SCF): %s\n"),
16150 				    scf_strerror(scf_error()));
16151 			}
16152 		}
16153 	} else if (tset == FMA_TOKENS) {
16154 		/* FMA event parameters */
16155 		if (global) {
16156 			semerr(gettext("Can't use option '-g' with FMA event "
16157 			    "definitions\n"));
16158 			goto out;
16159 		}
16160 
16161 		if ((r = set_params(params, p)) != 0)
16162 			goto out;
16163 
16164 		if (nvlist_add_nvlist(nvl, SCF_NOTIFY_PARAMS, params) != 0)
16165 			uu_die(gettext("Out of memory.\n"));
16166 
16167 		while (*events) {
16168 			if (smf_notify_set_params(de_tag(*events), nvl) !=
16169 			    SCF_SUCCESS)
16170 				uu_warn(gettext(
16171 				    "Failed smf_notify_set_params(3SCF) for "
16172 				    "event %s: %s\n"), *events,
16173 				    scf_strerror(scf_error()));
16174 			events++;
16175 		}
16176 	} else if (tset == MIXED_TOKENS) {
16177 		semerr(gettext("Can't mix SMF and FMA event definitions\n"));
16178 	} else {
16179 		/* Sanity check */
16180 		uu_die(gettext("Invalid input.\n"));
16181 	}
16182 
16183 out:
16184 	nvlist_free(nvl);
16185 	nvlist_free(params);
16186 	free(fmri);
16187 	free(str);
16188 
16189 	return (r);
16190 }
16191 
16192 int
16193 lscf_setnotify(uu_list_t *args)
16194 {
16195 	int argc;
16196 	char **argv = NULL;
16197 	string_list_t *slp;
16198 	int global;
16199 	char *events;
16200 	char **p;
16201 	int i;
16202 	int ret;
16203 
16204 	if ((argc = uu_list_numnodes(args)) < 2)
16205 		goto usage;
16206 
16207 	argv = calloc(argc + 1, sizeof (char *));
16208 	if (argv == NULL)
16209 		uu_die(gettext("Out of memory.\n"));
16210 
16211 	for (slp = uu_list_first(args), i = 0;
16212 	    slp != NULL;
16213 	    slp = uu_list_next(args, slp), ++i)
16214 		argv[i] = slp->str;
16215 
16216 	argv[i] = NULL;
16217 
16218 	if (strcmp(argv[0], "-g") == 0) {
16219 		global = 1;
16220 		events = argv[1];
16221 		p = argv + 2;
16222 	} else {
16223 		global = 0;
16224 		events = argv[0];
16225 		p = argv + 1;
16226 	}
16227 
16228 	ret = setnotify(events, p, global);
16229 
16230 out:
16231 	free(argv);
16232 	return (ret);
16233 
16234 usage:
16235 	ret = -2;
16236 	goto out;
16237 }
16238 
16239 /*
16240  * Creates a list of instance name strings associated with a service. If
16241  * wohandcrafted flag is set, get only instances that have a last-import
16242  * snapshot, instances that were imported via svccfg.
16243  */
16244 static uu_list_t *
16245 create_instance_list(scf_service_t *svc, int wohandcrafted)
16246 {
16247 	scf_snapshot_t  *snap = NULL;
16248 	scf_instance_t  *inst;
16249 	scf_iter_t	*inst_iter;
16250 	uu_list_t	*instances;
16251 	char		*instname;
16252 	int		r;
16253 
16254 	inst_iter = scf_iter_create(g_hndl);
16255 	inst = scf_instance_create(g_hndl);
16256 	if (inst_iter == NULL || inst == NULL) {
16257 		uu_warn(gettext("Could not create instance or iterator\n"));
16258 		scfdie();
16259 	}
16260 
16261 	if ((instances = uu_list_create(string_pool, NULL, 0)) == NULL)
16262 		return (instances);
16263 
16264 	if (scf_iter_service_instances(inst_iter, svc) != 0) {
16265 		switch (scf_error()) {
16266 		case SCF_ERROR_CONNECTION_BROKEN:
16267 		case SCF_ERROR_DELETED:
16268 			uu_list_destroy(instances);
16269 			instances = NULL;
16270 			goto out;
16271 
16272 		case SCF_ERROR_HANDLE_MISMATCH:
16273 		case SCF_ERROR_NOT_BOUND:
16274 		case SCF_ERROR_NOT_SET:
16275 		default:
16276 			bad_error("scf_iter_service_instances", scf_error());
16277 		}
16278 	}
16279 
16280 	instname = safe_malloc(max_scf_name_len + 1);
16281 	while ((r = scf_iter_next_instance(inst_iter, inst)) != 0) {
16282 		if (r == -1) {
16283 			(void) uu_warn(gettext("Unable to iterate through "
16284 			    "instances to create instance list : %s\n"),
16285 			    scf_strerror(scf_error()));
16286 
16287 			uu_list_destroy(instances);
16288 			instances = NULL;
16289 			goto out;
16290 		}
16291 
16292 		/*
16293 		 * If the instance does not have a last-import snapshot
16294 		 * then do not add it to the list as it is a hand-crafted
16295 		 * instance that should not be managed.
16296 		 */
16297 		if (wohandcrafted) {
16298 			if (snap == NULL &&
16299 			    (snap = scf_snapshot_create(g_hndl)) == NULL) {
16300 				uu_warn(gettext("Unable to create snapshot "
16301 				    "entity\n"));
16302 				scfdie();
16303 			}
16304 
16305 			if (scf_instance_get_snapshot(inst,
16306 			    snap_lastimport, snap) != 0) {
16307 				switch (scf_error()) {
16308 				case SCF_ERROR_NOT_FOUND :
16309 				case SCF_ERROR_DELETED:
16310 					continue;
16311 
16312 				case SCF_ERROR_CONNECTION_BROKEN:
16313 					uu_list_destroy(instances);
16314 					instances = NULL;
16315 					goto out;
16316 
16317 				case SCF_ERROR_HANDLE_MISMATCH:
16318 				case SCF_ERROR_NOT_BOUND:
16319 				case SCF_ERROR_NOT_SET:
16320 				default:
16321 					bad_error("scf_iter_service_instances",
16322 					    scf_error());
16323 				}
16324 			}
16325 		}
16326 
16327 		if (scf_instance_get_name(inst, instname,
16328 		    max_scf_name_len + 1) < 0) {
16329 			switch (scf_error()) {
16330 			case SCF_ERROR_NOT_FOUND :
16331 				continue;
16332 
16333 			case SCF_ERROR_CONNECTION_BROKEN:
16334 			case SCF_ERROR_DELETED:
16335 				uu_list_destroy(instances);
16336 				instances = NULL;
16337 				goto out;
16338 
16339 			case SCF_ERROR_HANDLE_MISMATCH:
16340 			case SCF_ERROR_NOT_BOUND:
16341 			case SCF_ERROR_NOT_SET:
16342 			default:
16343 				bad_error("scf_iter_service_instances",
16344 				    scf_error());
16345 			}
16346 		}
16347 
16348 		add_string(instances, instname);
16349 	}
16350 
16351 out:
16352 	if (snap)
16353 		scf_snapshot_destroy(snap);
16354 
16355 	scf_instance_destroy(inst);
16356 	scf_iter_destroy(inst_iter);
16357 	free(instname);
16358 	return (instances);
16359 }
16360 
16361 /*
16362  * disable an instance but wait for the instance to
16363  * move out of the running state.
16364  *
16365  * Returns 0 : if the instance did not disable
16366  * Returns non-zero : if the instance disabled.
16367  *
16368  */
16369 static int
16370 disable_instance(scf_instance_t *instance)
16371 {
16372 	char	*fmribuf;
16373 	int	enabled = 10000;
16374 
16375 	if (inst_is_running(instance)) {
16376 		fmribuf = safe_malloc(max_scf_name_len + 1);
16377 		if (scf_instance_to_fmri(instance, fmribuf,
16378 		    max_scf_name_len + 1) < 0) {
16379 			free(fmribuf);
16380 			return (0);
16381 		}
16382 
16383 		/*
16384 		 * If the instance cannot be disabled then return
16385 		 * failure to disable and let the caller decide
16386 		 * if that is of importance.
16387 		 */
16388 		if (smf_disable_instance(fmribuf, 0) != 0) {
16389 			free(fmribuf);
16390 			return (0);
16391 		}
16392 
16393 		while (enabled) {
16394 			if (!inst_is_running(instance))
16395 				break;
16396 
16397 			(void) poll(NULL, 0, 5);
16398 			enabled = enabled - 5;
16399 		}
16400 
16401 		free(fmribuf);
16402 	}
16403 
16404 	return (enabled);
16405 }
16406 
16407 /*
16408  * Function to compare two service_manifest structures.
16409  */
16410 /* ARGSUSED2 */
16411 static int
16412 service_manifest_compare(const void *left, const void *right, void *unused)
16413 {
16414 	service_manifest_t *l = (service_manifest_t *)left;
16415 	service_manifest_t *r = (service_manifest_t *)right;
16416 	int rc;
16417 
16418 	rc = strcmp(l->servicename, r->servicename);
16419 
16420 	return (rc);
16421 }
16422 
16423 /*
16424  * Look for the provided service in the service to manifest
16425  * tree.  If the service exists, and a manifest was provided
16426  * then add the manifest to that service.  If the service
16427  * does not exist, then add the service and manifest to the
16428  * list.
16429  *
16430  * If the manifest is NULL, return the element if found.  If
16431  * the service is not found return NULL.
16432  */
16433 service_manifest_t *
16434 find_add_svc_mfst(const char *svnbuf, const char *mfst)
16435 {
16436 	service_manifest_t	elem;
16437 	service_manifest_t	*fnelem;
16438 	uu_avl_index_t		marker;
16439 
16440 	elem.servicename = svnbuf;
16441 	fnelem = uu_avl_find(service_manifest_tree, &elem, NULL, &marker);
16442 
16443 	if (mfst) {
16444 		if (fnelem) {
16445 			add_string(fnelem->mfstlist, strdup(mfst));
16446 		} else {
16447 			fnelem = safe_malloc(sizeof (*fnelem));
16448 			fnelem->servicename = safe_strdup(svnbuf);
16449 			if ((fnelem->mfstlist =
16450 			    uu_list_create(string_pool, NULL, 0)) == NULL)
16451 				uu_die(gettext("Could not create property "
16452 				    "list: %s\n"), uu_strerror(uu_error()));
16453 
16454 			add_string(fnelem->mfstlist, safe_strdup(mfst));
16455 
16456 			uu_avl_insert(service_manifest_tree, fnelem, marker);
16457 		}
16458 	}
16459 
16460 	return (fnelem);
16461 }
16462 
16463 /*
16464  * Create the service to manifest avl tree.
16465  *
16466  * Walk each of the manifests currently installed in the supported
16467  * directories, /lib/svc/manifests and /var/svc/manifests.  For
16468  * each of the manifests, inventory the services and add them to
16469  * the tree.
16470  *
16471  * Code that calls this function should make sure fileystem/minimal is online,
16472  * /var is available, since this function walks the /var/svc/manifest directory.
16473  */
16474 static void
16475 create_manifest_tree(void)
16476 {
16477 	manifest_info_t **entry;
16478 	manifest_info_t **manifests;
16479 	uu_list_walk_t	*svcs;
16480 	bundle_t	*b;
16481 	entity_t	*mfsvc;
16482 	char		*dirs[] = {LIBSVC_DIR, VARSVC_DIR, NULL};
16483 	int		c, status;
16484 
16485 	if (service_manifest_pool)
16486 		return;
16487 
16488 	/*
16489 	 * Create the list pool for the service manifest list
16490 	 */
16491 	service_manifest_pool = uu_avl_pool_create("service_manifest",
16492 	    sizeof (service_manifest_t),
16493 	    offsetof(service_manifest_t, svcmfst_node),
16494 	    service_manifest_compare, UU_DEFAULT);
16495 	if (service_manifest_pool == NULL)
16496 		uu_die(gettext("service_manifest pool creation failed: %s\n"),
16497 		    uu_strerror(uu_error()));
16498 
16499 	/*
16500 	 * Create the list
16501 	 */
16502 	service_manifest_tree = uu_avl_create(service_manifest_pool, NULL,
16503 	    UU_DEFAULT);
16504 	if (service_manifest_tree == NULL)
16505 		uu_die(gettext("service_manifest tree creation failed: %s\n"),
16506 		    uu_strerror(uu_error()));
16507 
16508 	/*
16509 	 * Walk the manifests adding the service(s) from each manifest.
16510 	 *
16511 	 * If a service already exists add the manifest to the manifest
16512 	 * list for that service.  This covers the case of a service that
16513 	 * is supported by multiple manifest files.
16514 	 */
16515 	for (c = 0; dirs[c]; c++) {
16516 		status = find_manifests(g_hndl, dirs[c], &manifests, CHECKEXT);
16517 		if (status < 0) {
16518 			uu_warn(gettext("file tree walk of %s encountered "
16519 			    "error %s\n"), dirs[c], strerror(errno));
16520 
16521 			uu_avl_destroy(service_manifest_tree);
16522 			service_manifest_tree = NULL;
16523 			return;
16524 		}
16525 
16526 		/*
16527 		 * If a manifest that was in the list is not found
16528 		 * then skip and go to the next manifest file.
16529 		 */
16530 		if (manifests != NULL) {
16531 			for (entry = manifests; *entry != NULL; entry++) {
16532 				b = internal_bundle_new();
16533 				if (lxml_get_bundle_file(b, (*entry)->mi_path,
16534 				    SVCCFG_OP_IMPORT) != 0) {
16535 					internal_bundle_free(b);
16536 					continue;
16537 				}
16538 
16539 				svcs = uu_list_walk_start(b->sc_bundle_services,
16540 				    0);
16541 				if (svcs == NULL) {
16542 					internal_bundle_free(b);
16543 					continue;
16544 				}
16545 
16546 				while ((mfsvc = uu_list_walk_next(svcs)) !=
16547 				    NULL) {
16548 					/* Add manifest to service */
16549 					(void) find_add_svc_mfst(mfsvc->sc_name,
16550 					    (*entry)->mi_path);
16551 				}
16552 
16553 				uu_list_walk_end(svcs);
16554 				internal_bundle_free(b);
16555 			}
16556 
16557 			free_manifest_array(manifests);
16558 		}
16559 	}
16560 }
16561 
16562 /*
16563  * Check the manifest history file to see
16564  * if the service was ever installed from
16565  * one of the supported directories.
16566  *
16567  * Return Values :
16568  *	-1 - if there's error reading manifest history file
16569  *	 1 - if the service is not found
16570  *	 0 - if the service is found
16571  */
16572 static int
16573 check_mfst_history(const char *svcname)
16574 {
16575 	struct stat	st;
16576 	caddr_t		mfsthist_start;
16577 	char		*svnbuf;
16578 	int		fd;
16579 	int		r = 1;
16580 
16581 	fd = open(MFSTHISTFILE, O_RDONLY);
16582 	if (fd == -1) {
16583 		uu_warn(gettext("Unable to open the history file\n"));
16584 		return (-1);
16585 	}
16586 
16587 	if (fstat(fd, &st) == -1) {
16588 		uu_warn(gettext("Unable to stat the history file\n"));
16589 		return (-1);
16590 	}
16591 
16592 	mfsthist_start = mmap(0, st.st_size, PROT_READ,
16593 	    MAP_PRIVATE, fd, 0);
16594 
16595 	(void) close(fd);
16596 	if (mfsthist_start == MAP_FAILED ||
16597 	    *(mfsthist_start + st.st_size) != '\0') {
16598 		(void) munmap(mfsthist_start, st.st_size);
16599 		return (-1);
16600 	}
16601 
16602 	/*
16603 	 * The manifest history file is a space delimited list
16604 	 * of service and instance to manifest linkage.  Adding
16605 	 * a space to the end of the service name so to get only
16606 	 * the service that is being searched for.
16607 	 */
16608 	svnbuf = uu_msprintf("%s ", svcname);
16609 	if (svnbuf == NULL)
16610 		uu_die(gettext("Out of memory"));
16611 
16612 	if (strstr(mfsthist_start, svnbuf) != NULL)
16613 		r = 0;
16614 
16615 	(void) munmap(mfsthist_start, st.st_size);
16616 	uu_free(svnbuf);
16617 	return (r);
16618 }
16619 
16620 /*
16621  * Take down each of the instances in the service
16622  * and remove them, then delete the service.
16623  */
16624 static void
16625 teardown_service(scf_service_t *svc, const char *svnbuf)
16626 {
16627 	scf_instance_t	*instance;
16628 	scf_iter_t	*iter;
16629 	int		r;
16630 
16631 	safe_printf(gettext("Delete service %s as there are no "
16632 	    "supporting manifests\n"), svnbuf);
16633 
16634 	instance = scf_instance_create(g_hndl);
16635 	iter = scf_iter_create(g_hndl);
16636 	if (iter == NULL || instance == NULL) {
16637 		uu_warn(gettext("Unable to create supporting entities to "
16638 		    "teardown the service\n"));
16639 		uu_warn(gettext("scf error is : %s\n"),
16640 		    scf_strerror(scf_error()));
16641 		scfdie();
16642 	}
16643 
16644 	if (scf_iter_service_instances(iter, svc) != 0) {
16645 		switch (scf_error()) {
16646 		case SCF_ERROR_CONNECTION_BROKEN:
16647 		case SCF_ERROR_DELETED:
16648 			goto out;
16649 
16650 		case SCF_ERROR_HANDLE_MISMATCH:
16651 		case SCF_ERROR_NOT_BOUND:
16652 		case SCF_ERROR_NOT_SET:
16653 		default:
16654 			bad_error("scf_iter_service_instances",
16655 			    scf_error());
16656 		}
16657 	}
16658 
16659 	while ((r = scf_iter_next_instance(iter, instance)) != 0) {
16660 		if (r == -1) {
16661 			uu_warn(gettext("Error - %s\n"),
16662 			    scf_strerror(scf_error()));
16663 			goto out;
16664 		}
16665 
16666 		(void) disable_instance(instance);
16667 	}
16668 
16669 	/*
16670 	 * Delete the service... forcing the deletion in case
16671 	 * any of the instances did not disable.
16672 	 */
16673 	(void) lscf_service_delete(svc, 1);
16674 out:
16675 	scf_instance_destroy(instance);
16676 	scf_iter_destroy(iter);
16677 }
16678 
16679 /*
16680  * Get the list of instances supported by the manifest
16681  * file.
16682  *
16683  * Return 0 if there are no instances.
16684  *
16685  * Return -1 if there are errors attempting to collect instances.
16686  *
16687  * Return the count of instances found if there are no errors.
16688  *
16689  */
16690 static int
16691 check_instance_support(char *mfstfile, const char *svcname,
16692     uu_list_t *instances)
16693 {
16694 	uu_list_walk_t	*svcs, *insts;
16695 	uu_list_t	*ilist;
16696 	bundle_t	*b;
16697 	entity_t	*mfsvc, *mfinst;
16698 	const char	*svcn;
16699 	int		rminstcnt = 0;
16700 
16701 
16702 	b = internal_bundle_new();
16703 
16704 	if (lxml_get_bundle_file(b, mfstfile, SVCCFG_OP_IMPORT) != 0) {
16705 		/*
16706 		 * Unable to process the manifest file for
16707 		 * instance support, so just return as
16708 		 * don't want to remove instances that could
16709 		 * not be accounted for that might exist here.
16710 		 */
16711 		internal_bundle_free(b);
16712 		return (0);
16713 	}
16714 
16715 	svcs = uu_list_walk_start(b->sc_bundle_services, 0);
16716 	if (svcs == NULL) {
16717 		internal_bundle_free(b);
16718 		return (0);
16719 	}
16720 
16721 	svcn = svcname + (sizeof (SCF_FMRI_SVC_PREFIX) - 1) +
16722 	    (sizeof (SCF_FMRI_SERVICE_PREFIX) - 1);
16723 
16724 	while ((mfsvc = uu_list_walk_next(svcs)) != NULL) {
16725 		if (strcmp(mfsvc->sc_name, svcn) == 0)
16726 			break;
16727 	}
16728 	uu_list_walk_end(svcs);
16729 
16730 	if (mfsvc == NULL) {
16731 		internal_bundle_free(b);
16732 		return (-1);
16733 	}
16734 
16735 	ilist = mfsvc->sc_u.sc_service.sc_service_instances;
16736 	if ((insts = uu_list_walk_start(ilist, 0)) == NULL) {
16737 		internal_bundle_free(b);
16738 		return (0);
16739 	}
16740 
16741 	while ((mfinst = uu_list_walk_next(insts)) != NULL) {
16742 		/*
16743 		 * Remove the instance from the instances list.
16744 		 * The unaccounted for instances will be removed
16745 		 * from the service once all manifests are
16746 		 * processed.
16747 		 */
16748 		(void) remove_string(instances,
16749 		    mfinst->sc_name);
16750 		rminstcnt++;
16751 	}
16752 
16753 	uu_list_walk_end(insts);
16754 	internal_bundle_free(b);
16755 
16756 	return (rminstcnt);
16757 }
16758 
16759 /*
16760  * For the given service, set its SCF_PG_MANIFESTFILES/SUPPORT property to
16761  * 'false' to indicate there's no manifest file(s) found for the service.
16762  */
16763 static void
16764 svc_add_no_support(scf_service_t *svc)
16765 {
16766 	char	*pname;
16767 
16768 	/* Add no support */
16769 	cur_svc = svc;
16770 	if (addpg(SCF_PG_MANIFESTFILES, SCF_GROUP_FRAMEWORK))
16771 		return;
16772 
16773 	pname = uu_msprintf("%s/%s", SCF_PG_MANIFESTFILES, SUPPORTPROP);
16774 	if (pname == NULL)
16775 		uu_die(gettext("Out of memory.\n"));
16776 
16777 	(void) lscf_addpropvalue(pname, "boolean:", "0");
16778 
16779 	uu_free(pname);
16780 	cur_svc = NULL;
16781 }
16782 
16783 /*
16784  * This function handles all upgrade scenarios for a service that doesn't have
16785  * SCF_PG_MANIFESTFILES pg. The function creates and populates
16786  * SCF_PG_MANIFESTFILES pg for the given service to keep track of service to
16787  * manifest(s) mapping. Manifests under supported directories are inventoried
16788  * and a property is added for each file that delivers configuration to the
16789  * service.  A service that has no corresponding manifest files (deleted) are
16790  * removed from repository.
16791  *
16792  * Unsupported services:
16793  *
16794  * A service is considered unsupported if there is no corresponding manifest
16795  * in the supported directories for that service and the service isn't in the
16796  * history file list.  The history file, MFSTHISTFILE, contains a list of all
16797  * services and instances that were delivered by Solaris before the introduction
16798  * of the SCF_PG_MANIFESTFILES property group.  The history file also contains
16799  * the path to the manifest file that defined the service or instance.
16800  *
16801  * Another type of unsupported services is 'handcrafted' services,
16802  * programmatically created services or services created by dependent entries
16803  * in other manifests. A handcrafted service is identified by its lack of any
16804  * instance containing last-import snapshot which is created during svccfg
16805  * import.
16806  *
16807  * This function sets a flag for unsupported services by setting services'
16808  * SCF_PG_MANIFESTFILES/support property to false.
16809  */
16810 static void
16811 upgrade_svc_mfst_connection(scf_service_t *svc, const char *svcname)
16812 {
16813 	service_manifest_t	*elem;
16814 	uu_list_walk_t		*mfwalk;
16815 	string_list_t		*mfile;
16816 	uu_list_t		*instances;
16817 	const char		*sname;
16818 	char			*pname;
16819 	int			r;
16820 
16821 	/*
16822 	 * Since there's no guarantee manifests under /var are available during
16823 	 * early import, don't perform any upgrade during early import.
16824 	 */
16825 	if (IGNORE_VAR)
16826 		return;
16827 
16828 	if (service_manifest_tree == NULL) {
16829 		create_manifest_tree();
16830 	}
16831 
16832 	/*
16833 	 * Find service's supporting manifest(s) after
16834 	 * stripping off the svc:/ prefix that is part
16835 	 * of the fmri that is not used in the service
16836 	 * manifest bundle list.
16837 	 */
16838 	sname = svcname + strlen(SCF_FMRI_SVC_PREFIX) +
16839 	    strlen(SCF_FMRI_SERVICE_PREFIX);
16840 	elem = find_add_svc_mfst(sname, NULL);
16841 	if (elem == NULL) {
16842 
16843 		/*
16844 		 * A handcrafted service, one that has no instance containing
16845 		 * last-import snapshot, should get unsupported flag.
16846 		 */
16847 		instances = create_instance_list(svc, 1);
16848 		if (instances == NULL) {
16849 			uu_warn(gettext("Unable to create instance list %s\n"),
16850 			    svcname);
16851 			return;
16852 		}
16853 
16854 		if (uu_list_numnodes(instances) == 0) {
16855 			svc_add_no_support(svc);
16856 			return;
16857 		}
16858 
16859 		/*
16860 		 * If the service is in the history file, and its supporting
16861 		 * manifests are not found, we can safely delete the service
16862 		 * because its manifests are removed from the system.
16863 		 *
16864 		 * Services not found in the history file are not delivered by
16865 		 * Solaris and/or delivered outside supported directories, set
16866 		 * unsupported flag for these services.
16867 		 */
16868 		r = check_mfst_history(svcname);
16869 		if (r == -1)
16870 			return;
16871 
16872 		if (r) {
16873 			/* Set unsupported flag for service  */
16874 			svc_add_no_support(svc);
16875 		} else {
16876 			/* Delete the service */
16877 			teardown_service(svc, svcname);
16878 		}
16879 
16880 		return;
16881 	}
16882 
16883 	/*
16884 	 * Walk through the list of manifests and add them
16885 	 * to the service.
16886 	 *
16887 	 * Create a manifestfiles pg and add the property.
16888 	 */
16889 	mfwalk = uu_list_walk_start(elem->mfstlist, 0);
16890 	if (mfwalk == NULL)
16891 		return;
16892 
16893 	cur_svc = svc;
16894 	r = addpg(SCF_PG_MANIFESTFILES, SCF_GROUP_FRAMEWORK);
16895 	if (r != 0) {
16896 		cur_svc = NULL;
16897 		return;
16898 	}
16899 
16900 	while ((mfile = uu_list_walk_next(mfwalk)) != NULL) {
16901 		pname = uu_msprintf("%s/%s", SCF_PG_MANIFESTFILES,
16902 		    mhash_filename_to_propname(mfile->str, 0));
16903 		if (pname == NULL)
16904 			uu_die(gettext("Out of memory.\n"));
16905 
16906 		(void) lscf_addpropvalue(pname, "astring:", mfile->str);
16907 		uu_free(pname);
16908 	}
16909 	uu_list_walk_end(mfwalk);
16910 
16911 	cur_svc = NULL;
16912 }
16913 
16914 /*
16915  * Take a service and process the manifest file entires to see if
16916  * there is continued support for the service and instances.  If
16917  * not cleanup as appropriate.
16918  *
16919  * If a service does not have a manifest files entry flag it for
16920  * upgrade and return.
16921  *
16922  * For each manifestfiles property check if the manifest file is
16923  * under the supported /lib/svc/manifest or /var/svc/manifest path
16924  * and if not then return immediately as this service is not supported
16925  * by the cleanup mechanism and should be ignored.
16926  *
16927  * For each manifest file that is supported, check to see if the
16928  * file exists.  If not then remove the manifest file property
16929  * from the service and the smf/manifest hash table.  If the manifest
16930  * file exists then verify that it supports the instances that are
16931  * part of the service.
16932  *
16933  * Once all manifest files have been accounted for remove any instances
16934  * that are no longer supported in the service.
16935  *
16936  * Return values :
16937  * 0 - Successfully processed the service
16938  * non-zero - failed to process the service
16939  *
16940  * On most errors, will just return to wait and get the next service,
16941  * unless in case of unable to create the needed structures which is
16942  * most likely a fatal error that is not going to be recoverable.
16943  */
16944 int
16945 lscf_service_cleanup(void *act, scf_walkinfo_t *wip)
16946 {
16947 	struct mpg_mfile	*mpntov = NULL;
16948 	struct mpg_mfile	**mpvarry = NULL;
16949 	scf_service_t		*svc;
16950 	scf_propertygroup_t	*mpg;
16951 	scf_property_t		*mp;
16952 	scf_value_t		*mv;
16953 	scf_iter_t		*mi;
16954 	scf_instance_t		*instance;
16955 	uu_list_walk_t		*insts;
16956 	uu_list_t		*instances = NULL;
16957 	boolean_t		activity = (boolean_t)act;
16958 	char			*mpnbuf = NULL;
16959 	char			*mpvbuf = NULL;
16960 	char			*pgpropbuf;
16961 	int			mfstcnt, rminstct, instct, mfstmax;
16962 	int			index;
16963 	int			r = 0;
16964 
16965 	assert(g_hndl != NULL);
16966 	assert(wip->svc != NULL);
16967 	assert(wip->fmri != NULL);
16968 
16969 	svc = wip->svc;
16970 
16971 	mpg = scf_pg_create(g_hndl);
16972 	mp = scf_property_create(g_hndl);
16973 	mi = scf_iter_create(g_hndl);
16974 	mv = scf_value_create(g_hndl);
16975 	instance = scf_instance_create(g_hndl);
16976 
16977 	if (mpg == NULL || mp == NULL || mi == NULL || mv == NULL ||
16978 	    instance == NULL) {
16979 		uu_warn(gettext("Unable to create the supporting entities\n"));
16980 		uu_warn(gettext("scf error is : %s\n"),
16981 		    scf_strerror(scf_error()));
16982 		scfdie();
16983 	}
16984 
16985 	/*
16986 	 * Get the manifestfiles property group to be parsed for
16987 	 * files existence.
16988 	 */
16989 	if (scf_service_get_pg(svc, SCF_PG_MANIFESTFILES, mpg) != SCF_SUCCESS) {
16990 		switch (scf_error()) {
16991 		case SCF_ERROR_NOT_FOUND:
16992 			upgrade_svc_mfst_connection(svc, wip->fmri);
16993 			break;
16994 		case SCF_ERROR_DELETED:
16995 		case SCF_ERROR_CONNECTION_BROKEN:
16996 			goto out;
16997 
16998 		case SCF_ERROR_HANDLE_MISMATCH:
16999 		case SCF_ERROR_NOT_BOUND:
17000 		case SCF_ERROR_NOT_SET:
17001 		default:
17002 			bad_error("scf_iter_pg_properties",
17003 			    scf_error());
17004 		}
17005 
17006 		goto out;
17007 	}
17008 
17009 	/*
17010 	 * Iterate through each of the manifestfiles properties
17011 	 * to determine what manifestfiles are available.
17012 	 *
17013 	 * If a manifest file is supported then increment the
17014 	 * count and therefore the service is safe.
17015 	 */
17016 	if (scf_iter_pg_properties(mi, mpg) != 0) {
17017 		switch (scf_error()) {
17018 		case SCF_ERROR_DELETED:
17019 		case SCF_ERROR_CONNECTION_BROKEN:
17020 			goto out;
17021 
17022 		case SCF_ERROR_HANDLE_MISMATCH:
17023 		case SCF_ERROR_NOT_BOUND:
17024 		case SCF_ERROR_NOT_SET:
17025 		default:
17026 			bad_error("scf_iter_pg_properties",
17027 			    scf_error());
17028 		}
17029 	}
17030 
17031 	mfstcnt = 0;
17032 	mfstmax = MFSTFILE_MAX;
17033 	mpvarry = safe_malloc(sizeof (struct mpg_file *) * MFSTFILE_MAX);
17034 	while ((r = scf_iter_next_property(mi, mp)) != 0) {
17035 		if (r == -1)
17036 			bad_error(gettext("Unable to iterate through "
17037 			    "manifestfiles properties : %s"),
17038 			    scf_error());
17039 
17040 		mpntov = safe_malloc(sizeof (struct mpg_mfile));
17041 		mpnbuf = safe_malloc(max_scf_name_len + 1);
17042 		mpvbuf = safe_malloc(max_scf_value_len + 1);
17043 		mpntov->mpg = mpnbuf;
17044 		mpntov->mfile = mpvbuf;
17045 		mpntov->access = 1;
17046 		if (scf_property_get_name(mp, mpnbuf,
17047 		    max_scf_name_len + 1) < 0) {
17048 			uu_warn(gettext("Unable to get manifest file "
17049 			    "property : %s\n"),
17050 			    scf_strerror(scf_error()));
17051 
17052 			switch (scf_error()) {
17053 			case SCF_ERROR_DELETED:
17054 			case SCF_ERROR_CONNECTION_BROKEN:
17055 				r = scferror2errno(scf_error());
17056 				goto out_free;
17057 
17058 			case SCF_ERROR_HANDLE_MISMATCH:
17059 			case SCF_ERROR_NOT_BOUND:
17060 			case SCF_ERROR_NOT_SET:
17061 			default:
17062 				bad_error("scf_iter_pg_properties",
17063 				    scf_error());
17064 			}
17065 		}
17066 
17067 		/*
17068 		 * The support property is a boolean value that indicates
17069 		 * if the service is supported for manifest file deletion.
17070 		 * Currently at this time there is no code that sets this
17071 		 * value to true.  So while we could just let this be caught
17072 		 * by the support check below, in the future this by be set
17073 		 * to true and require processing.  So for that, go ahead
17074 		 * and check here, and just return if false.  Otherwise,
17075 		 * fall through expecting that other support checks will
17076 		 * handle the entries.
17077 		 */
17078 		if (strcmp(mpnbuf, SUPPORTPROP) == 0) {
17079 			uint8_t	support;
17080 
17081 			if (scf_property_get_value(mp, mv) != 0 ||
17082 			    scf_value_get_boolean(mv, &support) != 0) {
17083 				uu_warn(gettext("Unable to get the manifest "
17084 				    "support value: %s\n"),
17085 				    scf_strerror(scf_error()));
17086 
17087 				switch (scf_error()) {
17088 				case SCF_ERROR_DELETED:
17089 				case SCF_ERROR_CONNECTION_BROKEN:
17090 					r = scferror2errno(scf_error());
17091 					goto out_free;
17092 
17093 				case SCF_ERROR_HANDLE_MISMATCH:
17094 				case SCF_ERROR_NOT_BOUND:
17095 				case SCF_ERROR_NOT_SET:
17096 				default:
17097 					bad_error("scf_iter_pg_properties",
17098 					    scf_error());
17099 				}
17100 			}
17101 
17102 			if (support == B_FALSE)
17103 				goto out_free;
17104 		}
17105 
17106 		/*
17107 		 * Anything with a manifest outside of the supported
17108 		 * directories, immediately bail out because that makes
17109 		 * this service non-supported.  We don't even want
17110 		 * to do instance processing in this case because the
17111 		 * instances could be part of the non-supported manifest.
17112 		 */
17113 		if (strncmp(mpnbuf, LIBSVC_PR, strlen(LIBSVC_PR)) != 0) {
17114 			/*
17115 			 * Manifest is not in /lib/svc, so we need to
17116 			 * consider the /var/svc case.
17117 			 */
17118 			if (strncmp(mpnbuf, VARSVC_PR,
17119 			    strlen(VARSVC_PR)) != 0 || IGNORE_VAR) {
17120 				/*
17121 				 * Either the manifest is not in /var/svc or
17122 				 * /var is not yet mounted.  We ignore the
17123 				 * manifest either because it is not in a
17124 				 * standard location or because we cannot
17125 				 * currently access the manifest.
17126 				 */
17127 				goto out_free;
17128 			}
17129 		}
17130 
17131 		/*
17132 		 * Get the value to of the manifest file for this entry
17133 		 * for access verification and instance support
17134 		 * verification if it still exists.
17135 		 *
17136 		 * During Early Manifest Import if the manifest is in
17137 		 * /var/svc then it may not yet be available for checking
17138 		 * so we must determine if /var/svc is available.  If not
17139 		 * then defer until Late Manifest Import to cleanup.
17140 		 */
17141 		if (scf_property_get_value(mp, mv) != 0) {
17142 			uu_warn(gettext("Unable to get the manifest file "
17143 			    "value: %s\n"),
17144 			    scf_strerror(scf_error()));
17145 
17146 			switch (scf_error()) {
17147 			case SCF_ERROR_DELETED:
17148 			case SCF_ERROR_CONNECTION_BROKEN:
17149 				r = scferror2errno(scf_error());
17150 				goto out_free;
17151 
17152 			case SCF_ERROR_HANDLE_MISMATCH:
17153 			case SCF_ERROR_NOT_BOUND:
17154 			case SCF_ERROR_NOT_SET:
17155 			default:
17156 				bad_error("scf_property_get_value",
17157 				    scf_error());
17158 			}
17159 		}
17160 
17161 		if (scf_value_get_astring(mv, mpvbuf,
17162 		    max_scf_value_len + 1) < 0) {
17163 			uu_warn(gettext("Unable to get the manifest "
17164 			    "file : %s\n"),
17165 			    scf_strerror(scf_error()));
17166 
17167 			switch (scf_error()) {
17168 			case SCF_ERROR_DELETED:
17169 			case SCF_ERROR_CONNECTION_BROKEN:
17170 				r = scferror2errno(scf_error());
17171 				goto out_free;
17172 
17173 			case SCF_ERROR_HANDLE_MISMATCH:
17174 			case SCF_ERROR_NOT_BOUND:
17175 			case SCF_ERROR_NOT_SET:
17176 			default:
17177 				bad_error("scf_value_get_astring",
17178 				    scf_error());
17179 			}
17180 		}
17181 
17182 		mpvarry[mfstcnt] = mpntov;
17183 		mfstcnt++;
17184 
17185 		/*
17186 		 * Check for the need to reallocate array
17187 		 */
17188 		if (mfstcnt >= (mfstmax - 1)) {
17189 			struct mpg_mfile **newmpvarry;
17190 
17191 			mfstmax = mfstmax * 2;
17192 			newmpvarry = realloc(mpvarry,
17193 			    sizeof (struct mpg_mfile *) * mfstmax);
17194 
17195 			if (newmpvarry == NULL)
17196 				goto out_free;
17197 
17198 			mpvarry = newmpvarry;
17199 		}
17200 
17201 		mpvarry[mfstcnt] = NULL;
17202 	}
17203 
17204 	for (index = 0; mpvarry[index]; index++) {
17205 		mpntov = mpvarry[index];
17206 
17207 		/*
17208 		 * Check to see if the manifestfile is accessable, if so hand
17209 		 * this service and manifestfile off to be processed for
17210 		 * instance support.
17211 		 */
17212 		mpnbuf = mpntov->mpg;
17213 		mpvbuf = mpntov->mfile;
17214 		if (access(mpvbuf, F_OK) != 0) {
17215 			mpntov->access = 0;
17216 			activity++;
17217 			mfstcnt--;
17218 			/* Remove the entry from the service */
17219 			cur_svc = svc;
17220 			pgpropbuf = uu_msprintf("%s/%s", SCF_PG_MANIFESTFILES,
17221 			    mpnbuf);
17222 			if (pgpropbuf == NULL)
17223 				uu_die(gettext("Out of memory.\n"));
17224 
17225 			lscf_delprop(pgpropbuf);
17226 			cur_svc = NULL;
17227 
17228 			uu_free(pgpropbuf);
17229 		}
17230 	}
17231 
17232 	/*
17233 	 * If mfstcnt is 0, none of the manifests that supported the service
17234 	 * existed so remove the service.
17235 	 */
17236 	if (mfstcnt == 0) {
17237 		teardown_service(svc, wip->fmri);
17238 
17239 		goto out_free;
17240 	}
17241 
17242 	if (activity) {
17243 		int	nosvcsupport = 0;
17244 
17245 		/*
17246 		 * If the list of service instances is NULL then
17247 		 * create the list.
17248 		 */
17249 		instances = create_instance_list(svc, 1);
17250 		if (instances == NULL) {
17251 			uu_warn(gettext("Unable to create instance list %s\n"),
17252 			    wip->fmri);
17253 			goto out_free;
17254 		}
17255 
17256 		rminstct = uu_list_numnodes(instances);
17257 		instct = rminstct;
17258 
17259 		for (index = 0; mpvarry[index]; index++) {
17260 			mpntov = mpvarry[index];
17261 			if (mpntov->access == 0)
17262 				continue;
17263 
17264 			mpnbuf = mpntov->mpg;
17265 			mpvbuf = mpntov->mfile;
17266 			r = check_instance_support(mpvbuf, wip->fmri,
17267 			    instances);
17268 			if (r == -1) {
17269 				nosvcsupport++;
17270 			} else {
17271 				rminstct -= r;
17272 			}
17273 		}
17274 
17275 		if (instct && instct == rminstct && nosvcsupport == mfstcnt) {
17276 			teardown_service(svc, wip->fmri);
17277 
17278 			goto out_free;
17279 		}
17280 	}
17281 
17282 	/*
17283 	 * If there are instances left on the instance list, then
17284 	 * we must remove them.
17285 	 */
17286 	if (instances != NULL && uu_list_numnodes(instances)) {
17287 		string_list_t *sp;
17288 
17289 		insts = uu_list_walk_start(instances, 0);
17290 		while ((sp = uu_list_walk_next(insts)) != NULL) {
17291 			/*
17292 			 * Remove the instance from the instances list.
17293 			 */
17294 			safe_printf(gettext("Delete instance %s from "
17295 			    "service %s\n"), sp->str, wip->fmri);
17296 			if (scf_service_get_instance(svc, sp->str,
17297 			    instance) != SCF_SUCCESS) {
17298 				(void) uu_warn("scf_error - %s\n",
17299 				    scf_strerror(scf_error()));
17300 
17301 				continue;
17302 			}
17303 
17304 			(void) disable_instance(instance);
17305 
17306 			(void) lscf_instance_delete(instance, 1);
17307 		}
17308 		scf_instance_destroy(instance);
17309 		uu_list_walk_end(insts);
17310 	}
17311 
17312 out_free:
17313 	if (mpvarry) {
17314 		struct mpg_mfile *fmpntov;
17315 
17316 		for (index = 0; mpvarry[index]; index++) {
17317 			fmpntov  = mpvarry[index];
17318 			if (fmpntov->mpg == mpnbuf)
17319 				mpnbuf = NULL;
17320 			free(fmpntov->mpg);
17321 
17322 			if (fmpntov->mfile == mpvbuf)
17323 				mpvbuf = NULL;
17324 			free(fmpntov->mfile);
17325 
17326 			if (fmpntov == mpntov)
17327 				mpntov = NULL;
17328 			free(fmpntov);
17329 		}
17330 		if (mpnbuf)
17331 			free(mpnbuf);
17332 		if (mpvbuf)
17333 			free(mpvbuf);
17334 		if (mpntov)
17335 			free(mpntov);
17336 
17337 		free(mpvarry);
17338 	}
17339 out:
17340 	scf_pg_destroy(mpg);
17341 	scf_property_destroy(mp);
17342 	scf_iter_destroy(mi);
17343 	scf_value_destroy(mv);
17344 
17345 	return (0);
17346 }
17347 
17348 /*
17349  * Take the service and search for the manifestfiles property
17350  * in each of the property groups.  If the manifest file
17351  * associated with the property does not exist then remove
17352  * the property group.
17353  */
17354 int
17355 lscf_hash_cleanup()
17356 {
17357 	scf_service_t		*svc;
17358 	scf_scope_t		*scope;
17359 	scf_propertygroup_t	*pg;
17360 	scf_property_t		*prop;
17361 	scf_value_t		*val;
17362 	scf_iter_t		*iter;
17363 	char			*pgname = NULL;
17364 	char			*mfile = NULL;
17365 	int			r;
17366 
17367 	svc = scf_service_create(g_hndl);
17368 	scope = scf_scope_create(g_hndl);
17369 	pg = scf_pg_create(g_hndl);
17370 	prop = scf_property_create(g_hndl);
17371 	val = scf_value_create(g_hndl);
17372 	iter = scf_iter_create(g_hndl);
17373 	if (pg == NULL || prop == NULL || val == NULL || iter == NULL ||
17374 	    svc == NULL || scope == NULL) {
17375 		uu_warn(gettext("Unable to create a property group, or "
17376 		    "property\n"));
17377 		uu_warn("%s\n", pg == NULL ? "pg is NULL" :
17378 		    "pg is not NULL");
17379 		uu_warn("%s\n", prop == NULL ? "prop is NULL" :
17380 		    "prop is not NULL");
17381 		uu_warn("%s\n", val == NULL ? "val is NULL" :
17382 		    "val is not NULL");
17383 		uu_warn("%s\n", iter == NULL ? "iter is NULL" :
17384 		    "iter is not NULL");
17385 		uu_warn("%s\n", svc == NULL ? "svc is NULL" :
17386 		    "svc is not NULL");
17387 		uu_warn("%s\n", scope == NULL ? "scope is NULL" :
17388 		    "scope is not NULL");
17389 		uu_warn(gettext("scf error is : %s\n"),
17390 		    scf_strerror(scf_error()));
17391 		scfdie();
17392 	}
17393 
17394 	if (scf_handle_get_scope(g_hndl, SCF_SCOPE_LOCAL, scope) != 0) {
17395 		switch (scf_error()) {
17396 		case SCF_ERROR_CONNECTION_BROKEN:
17397 		case SCF_ERROR_NOT_FOUND:
17398 			goto out;
17399 
17400 		case SCF_ERROR_HANDLE_MISMATCH:
17401 		case SCF_ERROR_NOT_BOUND:
17402 		case SCF_ERROR_INVALID_ARGUMENT:
17403 		default:
17404 			bad_error("scf_handle_get_scope", scf_error());
17405 		}
17406 	}
17407 
17408 	if (scf_scope_get_service(scope, HASH_SVC, svc) != 0) {
17409 		uu_warn(gettext("Unable to process the hash service, %s\n"),
17410 		    HASH_SVC);
17411 		goto out;
17412 	}
17413 
17414 	pgname = safe_malloc(max_scf_name_len + 1);
17415 	mfile = safe_malloc(max_scf_value_len + 1);
17416 
17417 	if (scf_iter_service_pgs(iter, svc) != SCF_SUCCESS) {
17418 		uu_warn(gettext("Unable to cleanup smf hash table : %s\n"),
17419 		    scf_strerror(scf_error()));
17420 		goto out;
17421 	}
17422 
17423 	while ((r = scf_iter_next_pg(iter, pg)) != 0) {
17424 		if (r == -1)
17425 			goto out;
17426 
17427 		if (scf_pg_get_name(pg, pgname, max_scf_name_len + 1) < 0) {
17428 			switch (scf_error()) {
17429 			case SCF_ERROR_DELETED:
17430 				return (ENODEV);
17431 
17432 			case SCF_ERROR_CONNECTION_BROKEN:
17433 				return (ECONNABORTED);
17434 
17435 			case SCF_ERROR_NOT_SET:
17436 			case SCF_ERROR_NOT_BOUND:
17437 			default:
17438 				bad_error("scf_pg_get_name", scf_error());
17439 			}
17440 		}
17441 		if (IGNORE_VAR) {
17442 			if (strncmp(pgname, VARSVC_PR, strlen(VARSVC_PR)) == 0)
17443 				continue;
17444 		}
17445 
17446 		/*
17447 		 * If unable to get the property continue as this is an
17448 		 * entry that has no location to check against.
17449 		 */
17450 		if (scf_pg_get_property(pg, MFSTFILEPR, prop) != SCF_SUCCESS) {
17451 			continue;
17452 		}
17453 
17454 		if (scf_property_get_value(prop, val) != SCF_SUCCESS) {
17455 			uu_warn(gettext("Unable to get value from %s\n"),
17456 			    pgname);
17457 
17458 			switch (scf_error()) {
17459 			case SCF_ERROR_DELETED:
17460 			case SCF_ERROR_CONSTRAINT_VIOLATED:
17461 			case SCF_ERROR_NOT_FOUND:
17462 			case SCF_ERROR_NOT_SET:
17463 				continue;
17464 
17465 			case SCF_ERROR_CONNECTION_BROKEN:
17466 				r = scferror2errno(scf_error());
17467 				goto out;
17468 
17469 			case SCF_ERROR_HANDLE_MISMATCH:
17470 			case SCF_ERROR_NOT_BOUND:
17471 			default:
17472 				bad_error("scf_property_get_value",
17473 				    scf_error());
17474 			}
17475 		}
17476 
17477 		if (scf_value_get_astring(val, mfile, max_scf_value_len + 1)
17478 		    == -1) {
17479 			uu_warn(gettext("Unable to get astring from %s : %s\n"),
17480 			    pgname, scf_strerror(scf_error()));
17481 
17482 			switch (scf_error()) {
17483 			case SCF_ERROR_NOT_SET:
17484 			case SCF_ERROR_TYPE_MISMATCH:
17485 				continue;
17486 
17487 			default:
17488 				bad_error("scf_value_get_astring", scf_error());
17489 			}
17490 		}
17491 
17492 		if (access(mfile, F_OK) == 0)
17493 			continue;
17494 
17495 		(void) scf_pg_delete(pg);
17496 	}
17497 
17498 out:
17499 	scf_scope_destroy(scope);
17500 	scf_service_destroy(svc);
17501 	scf_pg_destroy(pg);
17502 	scf_property_destroy(prop);
17503 	scf_value_destroy(val);
17504 	scf_iter_destroy(iter);
17505 	free(pgname);
17506 	free(mfile);
17507 
17508 	return (0);
17509 }
17510 
17511 #ifndef NATIVE_BUILD
17512 /* ARGSUSED */
17513 CPL_MATCH_FN(complete_select)
17514 {
17515 	const char *arg0, *arg1, *arg1end;
17516 	int word_start, err = 0, r;
17517 	size_t len;
17518 	char *buf;
17519 
17520 	lscf_prep_hndl();
17521 
17522 	arg0 = line + strspn(line, " \t");
17523 	assert(strncmp(arg0, "select", sizeof ("select") - 1) == 0);
17524 
17525 	arg1 = arg0 + sizeof ("select") - 1;
17526 	arg1 += strspn(arg1, " \t");
17527 	word_start = arg1 - line;
17528 
17529 	arg1end = arg1 + strcspn(arg1, " \t");
17530 	if (arg1end < line + word_end)
17531 		return (0);
17532 
17533 	len = line + word_end - arg1;
17534 
17535 	buf = safe_malloc(max_scf_name_len + 1);
17536 
17537 	if (cur_snap != NULL) {
17538 		return (0);
17539 	} else if (cur_inst != NULL) {
17540 		return (0);
17541 	} else if (cur_svc != NULL) {
17542 		scf_instance_t *inst;
17543 		scf_iter_t *iter;
17544 
17545 		if ((inst = scf_instance_create(g_hndl)) == NULL ||
17546 		    (iter = scf_iter_create(g_hndl)) == NULL)
17547 			scfdie();
17548 
17549 		if (scf_iter_service_instances(iter, cur_svc) != 0)
17550 			scfdie();
17551 
17552 		for (;;) {
17553 			r = scf_iter_next_instance(iter, inst);
17554 			if (r == 0)
17555 				break;
17556 			if (r != 1)
17557 				scfdie();
17558 
17559 			if (scf_instance_get_name(inst, buf,
17560 			    max_scf_name_len + 1) < 0)
17561 				scfdie();
17562 
17563 			if (strncmp(buf, arg1, len) == 0) {
17564 				err = cpl_add_completion(cpl, line, word_start,
17565 				    word_end, buf + len, "", " ");
17566 				if (err != 0)
17567 					break;
17568 			}
17569 		}
17570 
17571 		scf_iter_destroy(iter);
17572 		scf_instance_destroy(inst);
17573 
17574 		return (err);
17575 	} else {
17576 		scf_service_t *svc;
17577 		scf_iter_t *iter;
17578 
17579 		assert(cur_scope != NULL);
17580 
17581 		if ((svc = scf_service_create(g_hndl)) == NULL ||
17582 		    (iter = scf_iter_create(g_hndl)) == NULL)
17583 			scfdie();
17584 
17585 		if (scf_iter_scope_services(iter, cur_scope) != 0)
17586 			scfdie();
17587 
17588 		for (;;) {
17589 			r = scf_iter_next_service(iter, svc);
17590 			if (r == 0)
17591 				break;
17592 			if (r != 1)
17593 				scfdie();
17594 
17595 			if (scf_service_get_name(svc, buf,
17596 			    max_scf_name_len + 1) < 0)
17597 				scfdie();
17598 
17599 			if (strncmp(buf, arg1, len) == 0) {
17600 				err = cpl_add_completion(cpl, line, word_start,
17601 				    word_end, buf + len, "", " ");
17602 				if (err != 0)
17603 					break;
17604 			}
17605 		}
17606 
17607 		scf_iter_destroy(iter);
17608 		scf_service_destroy(svc);
17609 
17610 		return (err);
17611 	}
17612 }
17613 
17614 /* ARGSUSED */
17615 CPL_MATCH_FN(complete_command)
17616 {
17617 	uint32_t scope = 0;
17618 
17619 	if (cur_snap != NULL)
17620 		scope = CS_SNAP;
17621 	else if (cur_inst != NULL)
17622 		scope = CS_INST;
17623 	else if (cur_svc != NULL)
17624 		scope = CS_SVC;
17625 	else
17626 		scope = CS_SCOPE;
17627 
17628 	return (scope ? add_cmd_matches(cpl, line, word_end, scope) : 0);
17629 }
17630 #endif	/* NATIVE_BUILD */
17631