xref: /illumos-gate/usr/src/lib/libscf/inc/libscf_priv.h (revision 56350fe51602d105c19353b8bf580ddd591726d5)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright (c) 2004, 2010, Oracle and/or its affiliates. All rights reserved.
23  * Copyright 2013, Joyent, Inc. All rights reserved.
24  */
25 
26 #ifndef	_LIBSCF_PRIV_H
27 #define	_LIBSCF_PRIV_H
28 
29 
30 #include <libscf.h>
31 #include <unistd.h>
32 #if !defined(NATIVE_BUILD)
33 #include <sys/secflags.h>
34 #endif
35 
36 #ifdef	__cplusplus
37 extern "C" {
38 #endif
39 
40 /*
41  * NOTE
42  *
43  * The contents of this file are private to the implementation of Solaris
44  * and are subject to change at any time without notice.
45  */
46 
47 #define	SCF_PG_GENERAL_TYPE		SCF_GROUP_FRAMEWORK
48 #define	SCF_PG_GENERAL_FLAGS		0
49 
50 #define	SCF_PG_GENERAL_OVR_TYPE		SCF_GROUP_FRAMEWORK
51 #define	SCF_PG_GENERAL_OVR_FLAGS	SCF_PG_FLAG_NONPERSISTENT
52 
53 #define	SCF_PG_DEATHROW_TYPE		SCF_GROUP_FRAMEWORK
54 #define	SCF_PG_DEATHROW_FLAGS		SCF_PG_FLAG_NONPERSISTENT
55 
56 #define	SCF_PG_OPTIONS_TYPE		SCF_GROUP_FRAMEWORK
57 #define	SCF_PG_OPTIONS_FLAGS		0
58 
59 #define	SCF_PG_OPTIONS_OVR_TYPE		SCF_GROUP_FRAMEWORK
60 #define	SCF_PG_OPTIONS_OVR_FLAGS	SCF_PG_FLAG_NONPERSISTENT
61 
62 #define	SCF_PG_RESTARTER_TYPE		SCF_GROUP_FRAMEWORK
63 #define	SCF_PG_RESTARTER_FLAGS		SCF_PG_FLAG_NONPERSISTENT
64 
65 #define	SCF_PG_RESTARTER_ACTIONS_TYPE	SCF_GROUP_FRAMEWORK
66 #define	SCF_PG_RESTARTER_ACTIONS_FLAGS	SCF_PG_FLAG_NONPERSISTENT
67 
68 #define	SCF_PROPERTY_CLEAR		((const char *)"maint_off")
69 #define	SCF_PROPERTY_MAINTENANCE	((const char *)"maint_on")
70 
71 #define	SCF_PROPERTY_LOGFILE		((const char *)"logfile")
72 #define	SCF_PROPERTY_ALT_LOGFILE	((const char *)"alt_logfile")
73 
74 #define	SCF_LEGACY_SERVICE		((const char *)"smf/legacy_run")
75 
76 #define	SCF_LEGACY_PROPERTY_NAME	((const char *)"name")
77 #define	SCF_LEGACY_PROPERTY_INODE	((const char *)"inode")
78 #define	SCF_LEGACY_PROPERTY_SUFFIX	((const char *)"suffix")
79 
80 #define	SCF_FMRI_TYPE_SVC		0x1
81 #define	SCF_FMRI_TYPE_FILE		0x2
82 
83 /*
84  * Strings for use in constructing FMRIs
85  */
86 #define	SCF_FMRI_SVC_PREFIX		"svc:"
87 #define	SCF_FMRI_FILE_PREFIX		"file:"
88 #define	SCF_FMRI_SCOPE_PREFIX		"//"
89 #define	SCF_FMRI_LOCAL_SCOPE		"localhost"
90 #define	SCF_FMRI_SCOPE_SUFFIX		"@localhost"
91 #define	SCF_FMRI_SERVICE_PREFIX		"/"
92 #define	SCF_FMRI_INSTANCE_PREFIX	":"
93 #define	SCF_FMRI_PROPERTYGRP_PREFIX	"/:properties/"
94 #define	SCF_FMRI_PROPERTY_PREFIX	"/"
95 #define	SCF_FMRI_LEGACY_PREFIX		"lrc:"
96 
97 /*
98  * sulogin Service FMRI
99  */
100 #define	SVC_SULOGIN_FMRI ((const char *)"svc:/system/sulogin")
101 
102 typedef struct scf_decoration_info {
103 	const char *sdi_name;
104 	scf_type_t sdi_type;
105 	scf_value_t *sdi_value;		/* can be SCF_DECORATE_CLEAR */
106 } scf_decoration_info_t;
107 
108 typedef int (*scf_decoration_func)(const scf_decoration_info_t *, void *);
109 
110 /*
111  * calls a callback function for each decoration on the handle.  If the
112  * callback returns 0, the iteration stops and returns 0.  If the callback
113  * returns a non-zero value, the iteration continues.  After full completion,
114  * 1 is returned.  On error, -1 is returned.
115  */
116 int _scf_handle_decorations(scf_handle_t *, scf_decoration_func *,
117     scf_value_t *, void *);
118 
119 /*
120  * wait for a change to the propertygroup -- may return early.
121  * For now, only one of these can be outstanding at a time.
122  *
123  * The second argument is how long, in seconds, to wait for a response.
124  *
125  * Returns SCF_COMPLETE on timeout, -1 on error, and SCF_SUCCESS in every
126  * other case.  You must call scf_pg_update() to see if the object has
127  * actually changed.
128  */
129 int _scf_pg_wait(scf_propertygroup_t *, int);
130 
131 /*
132  * set up notifications for changes to a class of property groups (by name
133  * and type)
134  *
135  * Only one thread can be sleeping in _scf_notify_wait() -- others will
136  * fail.  Deletions give an fmri in the output path.
137  *
138  * These do not survive unbind()->bind() -- in fact, that is currently the
139  * only way to clear them.
140  */
141 int _scf_notify_add_pgname(scf_handle_t *, const char *);
142 int _scf_notify_add_pgtype(scf_handle_t *, const char *);
143 int _scf_notify_wait(scf_propertygroup_t *, char *, size_t);
144 
145 /*
146  * Internal interfaces for snapshot creation:
147  *	_scf_snapshot_take_new(), _scf_snapshot_take_new_named(), and
148  *	_scf_snapshot_take_attach() create a set of snaplevels
149  *	containing frozen versions of both the instance's property groups and
150  *	its parent service's property groups. _scf_snapshot_take_new() and
151  *	_scf_snapshot_take_new_named() create a new snapshot to which the
152  *	new snaplevels are attached, while _scf_snapshot_take_attach()
153  *	attaches the new snaplevels to a pre-existing snapshot.
154  *
155  *	_scf_snapshot_take_new_named() records the passed in names into the
156  *	snaplevel instead of the instance and service name.  This creates
157  *	an inconsistency, which should be resolved by using
158  *	_scf_snapshot_attach() to attach the new snaplevels to a snapshot
159  *	underneath the appropriate instance.  The first snapshot can
160  *	then be deleted.
161  *
162  *	_scf_snapshot_attach(snap1, snap2) points snap2 at the snaplevels
163  *	pointed to by snap1.  After a call to either
164  *	_scf_snapshot_take_attach(snap1, snap2) or
165  *	_scf_snapshot_attach(inst, snap), scf_snapshot_update() will be
166  *	required for any open references to snap or snap2 to see the new
167  *	snaplevels.
168  *
169  *	_scf_snapshot_delete() deletes the snapshot object.  While
170  *	snaplevels, being only loosely connected to snapshots, stay
171  *	around until they are no longer referenced, any references *through
172  *	this snapshot object* will be invalidated.
173  *
174  * _scf_snapshot_take_new() can fail with at least _HANDLE_MISMATCH,
175  * _CONNECTION_BROKEN, _INVALID_ARGUMENT, _NO_RESOURCES, _PERMISSION_DENIED,
176  * _NOT_SET, _EXISTS.
177  *
178  * _scf_snapshot_take_new_named() can fail with at least _HANDLE_MISMATCH,
179  * _CONNECTION_BROKEN, _INVALID_ARGUMENT, _NO_RESOURCES, _PERMISSION_DENIED,
180  * _NOT_SET, _EXISTS.
181  *
182  * _scf_snapshot_take_attach() can fail with _CONNECTION_BROKEN, _NOT_SET,
183  * _PERMISSION_DENIED, _NO_RESOURCES, _INVALID_ARGUMENT.
184  *
185  * _scf_snapshot_attach() can fail with _HANDLE_MISMATCH, _CONNECTION_BROKEN,
186  * _NOT_SET, _NO_RESOURCES, _PERMISSION_DENIED.
187  */
188 int _scf_snapshot_take_new(scf_instance_t *, const char *, scf_snapshot_t *);
189 int _scf_snapshot_take_new_named(scf_instance_t *,
190     const char *, const char *, const char *, scf_snapshot_t *);
191 int _scf_snapshot_take_attach(scf_instance_t *, scf_snapshot_t *);
192 int _scf_snapshot_attach(scf_snapshot_t *, scf_snapshot_t *);
193 int _scf_snapshot_delete(scf_snapshot_t *);
194 
195 /*
196  * Destructively portions up the first argument into the different portions
197  * of a svc: fmri, and returns pointers to the applicable portions.  Omitted
198  * portions are set to NULL, except for the scope, which is set to the
199  * default local scope if not specified.
200  *
201  * Parsing is attempted in the order of: svc:, file:. The identified type
202  * of the service is returned in the second argument and may take a value
203  * of: SCF_FMRI_TYPE_SVC or SCF_FMRI_TYPE_FILE.
204  *
205  * Note that some of the returned pointers (in particular the scope) may not
206  * point into the passed buffer.
207  */
208 int scf_parse_fmri(char *, int *, const char **, const char **, const char **,
209     const char **, const char **);
210 
211 int scf_parse_svc_fmri(char *, const char **, const char **, const char **,
212     const char **, const char **);
213 
214 int scf_parse_file_fmri(char *fmri, const char **scope, const char **path);
215 
216 ssize_t scf_canonify_fmri(const char *, char *, size_t);
217 
218 int _smf_refresh_instance_i(scf_instance_t *);
219 
220 typedef struct scf_simple_handle {
221 	scf_handle_t		*h;
222 	scf_snapshot_t		*snap;
223 	scf_instance_t		*inst;
224 	scf_propertygroup_t	*running_pg;
225 	scf_propertygroup_t	*editing_pg;
226 } scf_simple_handle_t;
227 
228 void scf_simple_handle_destroy(scf_simple_handle_t *);
229 scf_simple_handle_t *scf_general_pg_setup(const char *, const char *);
230 scf_transaction_t *scf_transaction_setup(scf_simple_handle_t *);
231 int scf_transaction_restart(scf_simple_handle_t *, scf_transaction_t *);
232 int scf_read_count_property(scf_simple_handle_t *, char *, uint64_t *);
233 int scf_set_count_property(scf_transaction_t *, char *, uint64_t, boolean_t);
234 
235 /*
236  * Walks all the instances matching a given fmri list.  Each fmri in the array
237  * can be one of the following:
238  *
239  * 	- Full instance name
240  * 	- Full service name
241  * 	- Full property group or property name
242  * 	- Partial service or instance name
243  * 	- A globbed pattern
244  *
245  * The matching rules for partial fmris are a slightly more complex.  We allow
246  * for any substring anchored at the end of the instance or service name,
247  * provided it begins with a complete element in the fmri.  For example, given
248  * the fmri "svc:/system/filesystem/local:default", any of the following would
249  * be acceptable matches: 'default', 'local', 'local:default',
250  * 'filesystem/local'.  The following would not be acceptable:
251  * 'system/filesystem', 'filesystem/loc', 'system/local'.  Possible flag values:
252  *
253  * 	SCF_WALK_MULTIPLE	Allow individual arguments to correspond to
254  * 				multiple instances.
255  *
256  * 	SCF_WALK_LEGACY		Walk legacy services (indicated by a non-NULL
257  * 				propery group).
258  *
259  * 	SCF_WALK_SERVICE	If the user specifies a service, pass the
260  * 				service to the callback without iterating over
261  * 				its instances.
262  *
263  * 	SCF_WALK_PROPERTY	Allow FMRIs which match property groups or
264  * 				individual properties.  Incompatible with
265  * 				SCF_WALK_LEGACY.
266  *
267  * 	SCF_WALK_NOINSTANCE	Walk only services.  Must be used in
268  * 				conjunction with SCF_WALK_SERVICE.
269  *
270  * 	SCF_WALK_EXPLICIT	Walk only services if the match is exact
271  *				else return instances. Must be used in
272  *				conjunction with SCF_WALK_SERVICE.
273  *
274  * 	SCF_WALK_UNIPARTIAL	Can be combined with SCF_WALK_MULTIPLE
275  * 				so that an error is returned if a partial
276  *				fmri matches multiple instances, unless
277  *				a wildcard match is also used.
278  *
279  * If no arguments are given, then all instances in the service graph are
280  * walked.
281  *
282  * The second to last parameter is set to UU_EXIT_FATAL if one of the arguments
283  * is an invalid FMRI or matches multiple FMRIs when SCF_WALK_MULTIPLE is not
284  * set.
285  *
286  * The last parameter is a user-supplied error function that is called when
287  * reporting invalid arguments.
288  */
289 
290 #define	SCF_WALK_MULTIPLE	0x01
291 #define	SCF_WALK_LEGACY		0x02
292 #define	SCF_WALK_SERVICE	0x04
293 #define	SCF_WALK_PROPERTY	0x08
294 #define	SCF_WALK_NOINSTANCE	0x10
295 #define	SCF_WALK_EXPLICIT	0x20
296 #define	SCF_WALK_UNIPARTIAL	0x40
297 
298 /*
299  * The default locations of the repository dbs
300  */
301 #define	REPOSITORY_DB		"/etc/svc/repository.db"
302 #define	NONPERSIST_DB		"/etc/svc/volatile/svc_nonpersist.db"
303 #define	FAST_REPOSITORY_DB	"/etc/svc/volatile/fast_repository.db"
304 #define	REPOSITORY_CHECKPOINT	"/etc/svc/volatile/checkpoint_repository.db"
305 
306 
307 typedef struct scf_walkinfo {
308 	const char		*fmri;
309 	scf_scope_t		*scope;
310 	scf_service_t		*svc;
311 	scf_instance_t		*inst;
312 	scf_propertygroup_t	*pg;
313 	scf_property_t		*prop;
314 	int			count;	/* svcprop special */
315 } scf_walkinfo_t;
316 
317 typedef int (*scf_walk_callback)(void *, scf_walkinfo_t *);
318 
319 scf_error_t scf_walk_fmri(scf_handle_t *, int, char **, int,
320     scf_walk_callback, void *, int *, void (*)(const char *, ...));
321 
322 /*
323  * Requests a backup of the repository with a particular name, which
324  * can be any alphabetic string.  Only privileged users can do this.
325  *
326  * Can fail with:
327  *	_NOT_BOUND, _CONNECTION_BROKEN, _PERMISSION_DENIED, _INVALID_ARGUMENT,
328  *	_INTERNAL (path too long, or the backup failed for an odd reason),
329  *	_BACKEND_READONLY (filesystem is still read-only)
330  */
331 int _scf_request_backup(scf_handle_t *, const char *);
332 
333 /*
334  * Repository switch client
335  */
336 int _scf_repository_switch(scf_handle_t *, int);
337 
338 /*
339  * Determines whether a property group requires authorization to read; this
340  * does not in any way reflect whether the caller has that authorization.
341  * To determine that, the caller must attempt to read the value of one of the
342  * group's properties.
343  *
344  * Can fail with:
345  *	_NOT_BOUND, _CONNECTION_BROKEN, _INVALID_ARGUMENT, _INTERNAL,
346  *	_NO_RESOURCES, _CONSTRAINT_VIOLATED, _DELETED.
347  */
348 int _scf_pg_is_read_protected(const scf_propertygroup_t *, boolean_t *);
349 
350 /*
351  * Sets annotation data for SMF audit logging.  Once this function has been
352  * set, the next audit record will be preceded by an ADT_smf_annotation
353  * with the information provided in this function.  This function is used
354  * to mark operations which comprise multiple primitive operations such as
355  * svccfg import.
356  */
357 int _scf_set_annotation(scf_handle_t *h, const char *operation,
358     const char *file);
359 
360 /*
361  * scf_pattern_t
362  */
363 typedef struct scf_pattern {
364 	enum	{
365 		PATTERN_INVALID,	/* Uninitialized state */
366 		PATTERN_EXACT,
367 		PATTERN_GLOB,
368 		PATTERN_PARTIAL
369 	} sp_type;
370 	char			*sp_arg;	/* Original argument */
371 	struct scf_match	*sp_matches;	/* List of matches */
372 	int			sp_matchcount;	/* # of matches */
373 } scf_pattern_t;
374 
375 int scf_cmp_pattern(char *, scf_pattern_t *);
376 
377 int gen_filenms_from_fmri(const char *, const char *, char *, char *);
378 
379 /*
380  * Interfaces for bulk access to SMF-stored configuration.
381  *
382  * Each scf_propvec_t represents a single property to be read (with
383  * scf_read_propvec) or written (with scf_write_propvec).
384  *
385  * The fields of a scf_propvec_t have the following meanings:
386  *
387  *   pv_prop - the name of the property
388  *   pv_desc - a description string (optional; to be consumed by the caller)
389  *   pv_type - the type of the property
390  *   pv_ptr  - where to store the data read, or a pointer to the data to
391  *             be written
392  *   pv_aux  - additional data influencing the interpretation of pv_ptr
393  *
394  * The meaning of pv_ptr and pv_aux depends on the type of property.  For:
395  *
396  *   boolean - if pv_aux is 0, pv_ptr is a pointer to a boolean_t
397  *             if pv_aux is non-0, pv_ptr is a pointer to a uint64_t,
398  *             where pv_aux indicates the bit holding the truth value.
399  *   count   - pv_ptr is a pointer to a uint64_t; pv_aux is unused
400  *   integer - pv_ptr is a pointer to an int64_t; pv_aux is unused
401  *   time    - pv_ptr is a pointer to an scf_time_t; pv_aux is unused
402  *   opaque  - pv_ptr is a pointer to an scf_opaque_t; pv_aux is unused
403  *   strings - (scf_read_propvec) pv_ptr is a pointer to a char *
404  *             (scf_write_propvec) pv_ptr is a pointer to an array of char
405  *             (both) pv_aux is unused
406  */
407 typedef struct {
408 	void	*so_addr;
409 	size_t	so_size;
410 } scf_opaque_t;
411 
412 typedef struct {
413 	const char	*pv_prop;
414 	const char	*pv_desc;
415 	scf_type_t	pv_type;
416 	void		*pv_ptr;
417 	uint64_t	pv_aux;
418 } scf_propvec_t;
419 
420 void scf_clean_propvec(scf_propvec_t *);
421 int scf_read_propvec(const char *, const char *, boolean_t, scf_propvec_t *,
422     scf_propvec_t **);
423 int scf_write_propvec(const char *, const char *, scf_propvec_t *,
424     scf_propvec_t **);
425 
426 scf_tmpl_errors_t *_scf_create_errors(const char *, int);
427 int _scf_tmpl_add_error(scf_tmpl_errors_t *errs, scf_tmpl_error_type_t type,
428     const char *pg_name, const char *prop_name,
429     const char *ev1, const char *ev2, const char *actual,
430     const char *tmpl_fmri, const char *tmpl_pg_name, const char *tmpl_pg_type,
431     const char *tmpl_prop_name, const char *tmpl_prop_type);
432 int _scf_tmpl_error_set_prefix(scf_tmpl_errors_t *, const char *);
433 
434 /*
435  * Templates definitions
436  */
437 
438 /*
439  * For CARDINALITY_VIOLATION and RANGE_VIOLATION, te_ev1 holds
440  * the min value and te_ev2 holds the max value
441  *
442  * For MISSING_PG te_ev1 should hold the expected pg_name and
443  * expected2 holds the expected pg_type.
444  *
445  * For SCF_TERR_PG_PATTERN_CONFLICT and SCF_TERR_GENERAL_REDEFINE te_ev1 is
446  * the FMRI holding the conflicting pg_pattern.  te_ev2 is the name of the
447  * conflicting pg_pattern, and actual is the type of the conflicting
448  * pg_pattern.
449  *
450  * SCF_TERR_PROP_PATTERN_CONFLICT te_ev1 is the FMRI holding the
451  * conflicting prop_pattern.  te_ev2 is the name of the conflicting
452  * prop_pattern, and actual is the type of the conflicting prop_pattern.
453  *
454  * For SCF_TERR_INCLUDE_VALUES te_ev1 is the type specified for the
455  * include_values element.
456  *
457  * For all other errors, te_ev1 should hold the expected value and
458  * te_ev2 is ignored
459  *
460  * te_actual holds the current value of the property
461  */
462 
463 struct scf_tmpl_error {
464 	scf_tmpl_errors_t		*te_errs;
465 	scf_tmpl_error_type_t		te_type;
466 	const char			*te_pg_name;
467 	const char			*te_prop_name;
468 	const char			*te_ev1;
469 	const char			*te_ev2;
470 	const char			*te_actual;
471 	const char			*te_tmpl_fmri;
472 	const char			*te_tmpl_pg_name;
473 	const char			*te_tmpl_pg_type;
474 	const char			*te_tmpl_prop_name;
475 	const char			*te_tmpl_prop_type;
476 };
477 
478 /*
479  * The pg_pattern element has two optional attributes that play a part in
480  * selecting the appropriate prefix for the name of the pg_pattern property
481  * group. The two attributes are name and type.  The appropriate prefix
482  * encodes the presence are absence of these attributes.
483  *
484  *	SCF_PG_TM_PG_PATTERN_PREFIX	neither attribute
485  *	SCF_PG_TM_PG_PATTERN_N_PREFIX	name only
486  *	SCF_PG_TM_PG_PATTERN_T_PREFIX	type only
487  *	SCF_PG_TM_PG_PATTERN_NT_PREFIX	both name and type
488  */
489 #define	SCF_PG_TM_PG_PAT_BASE		"tm_pgpat"
490 #define	SCF_PG_TM_PG_PATTERN_PREFIX	((const char *)SCF_PG_TM_PG_PAT_BASE \
491 	"_")
492 #define	SCF_PG_TM_PG_PATTERN_N_PREFIX	((const char *)SCF_PG_TM_PG_PAT_BASE \
493 	"n_")
494 #define	SCF_PG_TM_PG_PATTERN_T_PREFIX	((const char *)SCF_PG_TM_PG_PAT_BASE \
495 	"t_")
496 #define	SCF_PG_TM_PG_PATTERN_NT_PREFIX	((const char *)SCF_PG_TM_PG_PAT_BASE \
497 	"nt_")
498 #define	SCF_PG_TM_PROP_PATTERN_PREFIX	((const char *)"tm_proppat_")
499 
500 /*
501  * Pad character to use when encoding strings for property names.
502  */
503 #define	SCF_ENCODE32_PAD		('-')
504 
505 /*
506  * Functions for base 32 encoding/decoding
507  */
508 int scf_decode32(const char *, size_t, char *, size_t, size_t *, char);
509 int scf_encode32(const char *, size_t, char *, size_t, size_t *, char);
510 
511 /*
512  * handy functions
513  */
514 /*
515  * _scf_sanitize_locale
516  * Make sure a locale string has only alpha-numeric or '_' characters
517  */
518 void _scf_sanitize_locale(char *);
519 
520 /*
521  * _scf_read_tmpl_prop_type_as_string()
522  * Handy function to get template property type as a string
523  */
524 char *_scf_read_tmpl_prop_type_as_string(const scf_prop_tmpl_t *);
525 /*
526  * _scf_read_single_astring_from_pg()
527  * Given a property group (pg) and a property name (pn), this function
528  * retrives an astring value from pg/pn.
529  */
530 char *_scf_read_single_astring_from_pg(scf_propertygroup_t *, const char *);
531 
532 /*
533  * scf_instance_delete_prop()
534  * Given instance, property group, and property, delete the property.
535  */
536 int
537 scf_instance_delete_prop(scf_instance_t *, const char *, const char *);
538 
539 /*
540  * Functions to extract boot config information from FMRI_BOOT_CONFIG
541  */
542 void scf_get_boot_config(uint8_t *);
543 void scf_get_boot_config_ovr(uint8_t *);
544 int scf_is_fastboot_default(void);
545 
546 /*
547  * Set value of "config_ovr/fastreboot_default".
548  */
549 int scf_fastreboot_default_set_transient(boolean_t);
550 
551 /*
552  * scf_is_compatible_type()
553  * Return true if the second type is the same type, or a subtype of the
554  * first.
555  */
556 int scf_is_compatible_type(scf_type_t, scf_type_t);
557 
558 /*
559  * Check an array of services and enable any that don't have the
560  * "application/auto_enable" property set to "false", which is
561  * the interface to turn off this behaviour (see PSARC 2004/739).
562  */
563 void _check_services(char **);
564 
565 /*
566  * _scf_handle_create_and_bind()
567  * convenience function that creates and binds a handle
568  */
569 scf_handle_t *_scf_handle_create_and_bind(scf_version_t);
570 
571 /*
572  * _smf_refresh_all_instances()
573  * refresh all intances of a service
574  * return SCF_SUCCESS or SCF_FAILED on _PERMISSION_DENIED, _BACKEND_ACCESS
575  * or _BACKEND_READONLY.
576  */
577 int _smf_refresh_all_instances(scf_service_t *);
578 
579 /*
580  * _scf_get_fma_notify_params()
581  * Specialized fuction to get fma notifitation parameters
582  */
583 int _scf_get_fma_notify_params(const char *, nvlist_t *, int);
584 
585 /*
586  * _scf_get_svc_notify_params()
587  * Specialized function to get SMF state transition notification parameters
588  */
589 int _scf_get_svc_notify_params(const char *, nvlist_t *, int32_t, int, int);
590 
591 /*
592  * _scf_notify_get_params()
593  * Specialized function to get notification parametes from a pg into an
594  * nvlist_t
595  */
596 int _scf_notify_get_params(scf_propertygroup_t *, nvlist_t *);
597 
598 #if !defined(NATIVE_BUILD)
599 int scf_default_secflags(scf_handle_t *, scf_secflags_t *);
600 #endif
601 
602 #define	SCF_NOTIFY_PARAMS_SOURCE_NAME	((const char *)"preference_source")
603 
604 #ifdef	__cplusplus
605 }
606 #endif
607 
608 #endif	/* _LIBSCF_PRIV_H */
609