xref: /titanic_52/usr/src/lib/libscf/common/lowlevel.c (revision 25c28e83beb90e7c80452a7c818c5e6f73a07dc8)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright (c) 2004, 2010, Oracle and/or its affiliates. All rights reserved.
24  * Copyright 2013, Joyent, Inc. All rights reserved.
25  */
26 
27 /*
28  * This is the main implementation file for the low-level repository
29  * interface.
30  */
31 
32 #include "lowlevel_impl.h"
33 
34 #include "repcache_protocol.h"
35 #include "scf_type.h"
36 
37 #include <assert.h>
38 #include <alloca.h>
39 #include <door.h>
40 #include <errno.h>
41 #include <fcntl.h>
42 #include <fnmatch.h>
43 #include <libuutil.h>
44 #include <poll.h>
45 #include <pthread.h>
46 #include <synch.h>
47 #include <stddef.h>
48 #include <stdio.h>
49 #include <stdlib.h>
50 #include <string.h>
51 #include <sys/mman.h>
52 #include <sys/sysmacros.h>
53 #include <libzonecfg.h>
54 #include <unistd.h>
55 #include <dlfcn.h>
56 
57 #define	ENV_SCF_DEBUG		"LIBSCF_DEBUG"
58 #define	ENV_SCF_DOORPATH	"LIBSCF_DOORPATH"
59 
60 static uint32_t default_debug = 0;
61 static const char *default_door_path = REPOSITORY_DOOR_NAME;
62 
63 #define	CALL_FAILED		-1
64 #define	RESULT_TOO_BIG		-2
65 #define	NOT_BOUND		-3
66 
67 static pthread_mutex_t	lowlevel_init_lock;
68 static int32_t		lowlevel_inited;
69 
70 static uu_list_pool_t	*tran_entry_pool;
71 static uu_list_pool_t	*datael_pool;
72 static uu_list_pool_t	*iter_pool;
73 
74 /*
75  * base32[] index32[] are used in base32 encoding and decoding.
76  */
77 static char base32[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZ234567";
78 static char index32[128] = {
79 	-1, -1, -1, -1, -1, -1, -1, -1,	/* 0-7 */
80 	-1, -1, -1, -1, -1, -1, -1, -1,	/* 8-15 */
81 	-1, -1, -1, -1, -1, -1, -1, -1,	/* 16-23 */
82 	-1, -1, -1, -1, -1, -1, -1, -1,	/* 24-31 */
83 	-1, -1, -1, -1, -1, -1, -1, -1,	/* 32-39 */
84 	-1, -1, -1, -1, -1, -1, -1, -1,	/* 40-47 */
85 	-1, -1, 26, 27, 28, 29, 30, 31,	/* 48-55 */
86 	-1, -1, -1, -1, -1, -1, -1, -1,	/* 56-63 */
87 	-1, 0, 1, 2, 3, 4, 5, 6,	/* 64-71 */
88 	7, 8, 9, 10, 11, 12, 13, 14,	/* 72-79 */
89 	15, 16, 17, 18, 19, 20, 21, 22,	/* 80-87 */
90 	23, 24, 25, -1, -1, -1, -1, -1,	/* 88-95 */
91 	-1, -1, -1, -1, -1, -1, -1, -1,	/* 96-103 */
92 	-1, -1, -1, -1, -1, -1, -1, -1,	/* 104-111 */
93 	-1, -1, -1, -1, -1, -1, -1, -1,	/* 112-119 */
94 	-1, -1, -1, -1, -1, -1, -1, -1	/* 120-127 */
95 };
96 
97 #define	DECODE32_GS	(8)	/* scf_decode32 group size */
98 
99 #ifdef lint
100 #define	assert_nolint(x) (void)0
101 #else
102 #define	assert_nolint(x) assert(x)
103 #endif
104 
105 static void scf_iter_reset_locked(scf_iter_t *iter);
106 static void scf_value_reset_locked(scf_value_t *val, int and_destroy);
107 
108 #define	TYPE_VALUE	(-100)
109 
110 /*
111  * Hold and release subhandles.  We only allow one thread access to the
112  * subhandles at a time, and he can use any subset, grabbing and releasing
113  * them in any order.  The only restrictions are that you cannot hold an
114  * already-held subhandle, and all subhandles must be released before
115  * returning to the original caller.
116  */
117 static void
118 handle_hold_subhandles(scf_handle_t *h, int mask)
119 {
120 	assert(mask != 0 && (mask & ~RH_HOLD_ALL) == 0);
121 
122 	(void) pthread_mutex_lock(&h->rh_lock);
123 	while (h->rh_hold_flags != 0 && h->rh_holder != pthread_self()) {
124 		int cancel_state;
125 
126 		(void) pthread_setcancelstate(PTHREAD_CANCEL_DISABLE,
127 		    &cancel_state);
128 		(void) pthread_cond_wait(&h->rh_cv, &h->rh_lock);
129 		(void) pthread_setcancelstate(cancel_state, NULL);
130 	}
131 	if (h->rh_hold_flags == 0)
132 		h->rh_holder = pthread_self();
133 	assert(!(h->rh_hold_flags & mask));
134 	h->rh_hold_flags |= mask;
135 	(void) pthread_mutex_unlock(&h->rh_lock);
136 }
137 
138 static void
139 handle_rele_subhandles(scf_handle_t *h, int mask)
140 {
141 	assert(mask != 0 && (mask & ~RH_HOLD_ALL) == 0);
142 
143 	(void) pthread_mutex_lock(&h->rh_lock);
144 	assert(h->rh_holder == pthread_self());
145 	assert((h->rh_hold_flags & mask));
146 
147 	h->rh_hold_flags &= ~mask;
148 	if (h->rh_hold_flags == 0)
149 		(void) pthread_cond_signal(&h->rh_cv);
150 	(void) pthread_mutex_unlock(&h->rh_lock);
151 }
152 
153 #define	HOLD_HANDLE(h, flag, field) \
154 	(handle_hold_subhandles((h), (flag)), (h)->field)
155 
156 #define	RELE_HANDLE(h, flag) \
157 	(handle_rele_subhandles((h), (flag)))
158 
159 /*
160  * convenience macros, for functions that only need a one or two handles at
161  * any given time
162  */
163 #define	HANDLE_HOLD_ITER(h)	HOLD_HANDLE((h), RH_HOLD_ITER, rh_iter)
164 #define	HANDLE_HOLD_SCOPE(h)	HOLD_HANDLE((h), RH_HOLD_SCOPE, rh_scope)
165 #define	HANDLE_HOLD_SERVICE(h)	HOLD_HANDLE((h), RH_HOLD_SERVICE, rh_service)
166 #define	HANDLE_HOLD_INSTANCE(h)	HOLD_HANDLE((h), RH_HOLD_INSTANCE, rh_instance)
167 #define	HANDLE_HOLD_SNAPSHOT(h)	HOLD_HANDLE((h), RH_HOLD_SNAPSHOT, rh_snapshot)
168 #define	HANDLE_HOLD_SNAPLVL(h)	HOLD_HANDLE((h), RH_HOLD_SNAPLVL, rh_snaplvl)
169 #define	HANDLE_HOLD_PG(h)	HOLD_HANDLE((h), RH_HOLD_PG, rh_pg)
170 #define	HANDLE_HOLD_PROPERTY(h)	HOLD_HANDLE((h), RH_HOLD_PROPERTY, rh_property)
171 #define	HANDLE_HOLD_VALUE(h)	HOLD_HANDLE((h), RH_HOLD_VALUE, rh_value)
172 
173 #define	HANDLE_RELE_ITER(h)	RELE_HANDLE((h), RH_HOLD_ITER)
174 #define	HANDLE_RELE_SCOPE(h)	RELE_HANDLE((h), RH_HOLD_SCOPE)
175 #define	HANDLE_RELE_SERVICE(h)	RELE_HANDLE((h), RH_HOLD_SERVICE)
176 #define	HANDLE_RELE_INSTANCE(h)	RELE_HANDLE((h), RH_HOLD_INSTANCE)
177 #define	HANDLE_RELE_SNAPSHOT(h)	RELE_HANDLE((h), RH_HOLD_SNAPSHOT)
178 #define	HANDLE_RELE_SNAPLVL(h)	RELE_HANDLE((h), RH_HOLD_SNAPLVL)
179 #define	HANDLE_RELE_PG(h)	RELE_HANDLE((h), RH_HOLD_PG)
180 #define	HANDLE_RELE_PROPERTY(h)	RELE_HANDLE((h), RH_HOLD_PROPERTY)
181 #define	HANDLE_RELE_VALUE(h)	RELE_HANDLE((h), RH_HOLD_VALUE)
182 
183 /*ARGSUSED*/
184 static int
185 transaction_entry_compare(const void *l_arg, const void *r_arg, void *private)
186 {
187 	const char *l_prop =
188 	    ((scf_transaction_entry_t *)l_arg)->entry_property;
189 	const char *r_prop =
190 	    ((scf_transaction_entry_t *)r_arg)->entry_property;
191 
192 	int ret;
193 
194 	ret = strcmp(l_prop, r_prop);
195 	if (ret > 0)
196 		return (1);
197 	if (ret < 0)
198 		return (-1);
199 	return (0);
200 }
201 
202 static int
203 datael_compare(const void *l_arg, const void *r_arg, void *private)
204 {
205 	uint32_t l_id = ((scf_datael_t *)l_arg)->rd_entity;
206 	uint32_t r_id = (r_arg != NULL) ? ((scf_datael_t *)r_arg)->rd_entity :
207 	    *(uint32_t *)private;
208 
209 	if (l_id > r_id)
210 		return (1);
211 	if (l_id < r_id)
212 		return (-1);
213 	return (0);
214 }
215 
216 static int
217 iter_compare(const void *l_arg, const void *r_arg, void *private)
218 {
219 	uint32_t l_id = ((scf_iter_t *)l_arg)->iter_id;
220 	uint32_t r_id = (r_arg != NULL) ? ((scf_iter_t *)r_arg)->iter_id :
221 	    *(uint32_t *)private;
222 
223 	if (l_id > r_id)
224 		return (1);
225 	if (l_id < r_id)
226 		return (-1);
227 	return (0);
228 }
229 
230 static int
231 lowlevel_init(void)
232 {
233 	const char *debug;
234 	const char *door_path;
235 
236 	(void) pthread_mutex_lock(&lowlevel_init_lock);
237 	if (lowlevel_inited == 0) {
238 		if (!issetugid() &&
239 		    (debug = getenv(ENV_SCF_DEBUG)) != NULL && debug[0] != 0 &&
240 		    uu_strtoint(debug, &default_debug, sizeof (default_debug),
241 		    0, 0, 0) == -1) {
242 			(void) fprintf(stderr, "LIBSCF: $%s (%s): %s",
243 			    ENV_SCF_DEBUG, debug,
244 			    uu_strerror(uu_error()));
245 		}
246 
247 		if (!issetugid() &&
248 		    (door_path = getenv(ENV_SCF_DOORPATH)) != NULL &&
249 		    door_path[0] != 0) {
250 			default_door_path = strdup(door_path);
251 			if (default_door_path == NULL)
252 				default_door_path = door_path;
253 		}
254 
255 		datael_pool = uu_list_pool_create("SUNW,libscf_datael",
256 		    sizeof (scf_datael_t), offsetof(scf_datael_t, rd_node),
257 		    datael_compare, UU_LIST_POOL_DEBUG);
258 
259 		iter_pool = uu_list_pool_create("SUNW,libscf_iter",
260 		    sizeof (scf_iter_t), offsetof(scf_iter_t, iter_node),
261 		    iter_compare, UU_LIST_POOL_DEBUG);
262 
263 		assert_nolint(offsetof(scf_transaction_entry_t,
264 		    entry_property) == 0);
265 		tran_entry_pool = uu_list_pool_create(
266 		    "SUNW,libscf_transaction_entity",
267 		    sizeof (scf_transaction_entry_t),
268 		    offsetof(scf_transaction_entry_t, entry_link),
269 		    transaction_entry_compare, UU_LIST_POOL_DEBUG);
270 
271 		if (datael_pool == NULL || iter_pool == NULL ||
272 		    tran_entry_pool == NULL) {
273 			lowlevel_inited = -1;
274 			goto end;
275 		}
276 
277 		if (!scf_setup_error()) {
278 			lowlevel_inited = -1;
279 			goto end;
280 		}
281 		lowlevel_inited = 1;
282 	}
283 end:
284 	(void) pthread_mutex_unlock(&lowlevel_init_lock);
285 	if (lowlevel_inited > 0)
286 		return (1);
287 	return (0);
288 }
289 
290 static const struct {
291 	scf_type_t ti_type;
292 	rep_protocol_value_type_t ti_proto_type;
293 	const char *ti_name;
294 } scf_type_info[] = {
295 	{SCF_TYPE_BOOLEAN,	REP_PROTOCOL_TYPE_BOOLEAN,	"boolean"},
296 	{SCF_TYPE_COUNT,	REP_PROTOCOL_TYPE_COUNT,	"count"},
297 	{SCF_TYPE_INTEGER,	REP_PROTOCOL_TYPE_INTEGER,	"integer"},
298 	{SCF_TYPE_TIME,		REP_PROTOCOL_TYPE_TIME,		"time"},
299 	{SCF_TYPE_ASTRING,	REP_PROTOCOL_TYPE_STRING,	"astring"},
300 	{SCF_TYPE_OPAQUE,	REP_PROTOCOL_TYPE_OPAQUE,	"opaque"},
301 	{SCF_TYPE_USTRING,	REP_PROTOCOL_SUBTYPE_USTRING,	"ustring"},
302 	{SCF_TYPE_URI,		REP_PROTOCOL_SUBTYPE_URI,	"uri"},
303 	{SCF_TYPE_FMRI,		REP_PROTOCOL_SUBTYPE_FMRI,	"fmri"},
304 	{SCF_TYPE_HOST,		REP_PROTOCOL_SUBTYPE_HOST,	"host"},
305 	{SCF_TYPE_HOSTNAME,	REP_PROTOCOL_SUBTYPE_HOSTNAME,	"hostname"},
306 	{SCF_TYPE_NET_ADDR,	REP_PROTOCOL_SUBTYPE_NETADDR,	"net_address"},
307 	{SCF_TYPE_NET_ADDR_V4,	REP_PROTOCOL_SUBTYPE_NETADDR_V4,
308 	    "net_address_v4"},
309 	{SCF_TYPE_NET_ADDR_V6,	REP_PROTOCOL_SUBTYPE_NETADDR_V6,
310 	    "net_address_v6"}
311 };
312 
313 #define	SCF_TYPE_INFO_COUNT (sizeof (scf_type_info) / sizeof (*scf_type_info))
314 static rep_protocol_value_type_t
315 scf_type_to_protocol_type(scf_type_t t)
316 {
317 	int i;
318 
319 	for (i = 0; i < SCF_TYPE_INFO_COUNT; i++)
320 		if (scf_type_info[i].ti_type == t)
321 			return (scf_type_info[i].ti_proto_type);
322 
323 	return (REP_PROTOCOL_TYPE_INVALID);
324 }
325 
326 static scf_type_t
327 scf_protocol_type_to_type(rep_protocol_value_type_t t)
328 {
329 	int i;
330 
331 	for (i = 0; i < SCF_TYPE_INFO_COUNT; i++)
332 		if (scf_type_info[i].ti_proto_type == t)
333 			return (scf_type_info[i].ti_type);
334 
335 	return (SCF_TYPE_INVALID);
336 }
337 
338 const char *
339 scf_type_to_string(scf_type_t ty)
340 {
341 	int i;
342 
343 	for (i = 0; i < SCF_TYPE_INFO_COUNT; i++)
344 		if (scf_type_info[i].ti_type == ty)
345 			return (scf_type_info[i].ti_name);
346 
347 	return ("unknown");
348 }
349 
350 scf_type_t
351 scf_string_to_type(const char *name)
352 {
353 	int i;
354 
355 	for (i = 0; i < sizeof (scf_type_info) / sizeof (*scf_type_info); i++)
356 		if (strcmp(scf_type_info[i].ti_name, name) == 0)
357 			return (scf_type_info[i].ti_type);
358 
359 	return (SCF_TYPE_INVALID);
360 }
361 
362 int
363 scf_type_base_type(scf_type_t type, scf_type_t *out)
364 {
365 	rep_protocol_value_type_t t = scf_type_to_protocol_type(type);
366 	if (t == REP_PROTOCOL_TYPE_INVALID)
367 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
368 
369 	*out = scf_protocol_type_to_type(scf_proto_underlying_type(t));
370 	return (SCF_SUCCESS);
371 }
372 
373 /*
374  * Convert a protocol error code into an SCF_ERROR_* code.
375  */
376 static scf_error_t
377 proto_error(rep_protocol_responseid_t e)
378 {
379 	switch (e) {
380 	case REP_PROTOCOL_FAIL_MISORDERED:
381 	case REP_PROTOCOL_FAIL_UNKNOWN_ID:
382 	case REP_PROTOCOL_FAIL_INVALID_TYPE:
383 	case REP_PROTOCOL_FAIL_TRUNCATED:
384 	case REP_PROTOCOL_FAIL_TYPE_MISMATCH:
385 	case REP_PROTOCOL_FAIL_NOT_APPLICABLE:
386 	case REP_PROTOCOL_FAIL_UNKNOWN:
387 		return (SCF_ERROR_INTERNAL);
388 
389 	case REP_PROTOCOL_FAIL_BAD_TX:
390 		return (SCF_ERROR_INVALID_ARGUMENT);
391 	case REP_PROTOCOL_FAIL_BAD_REQUEST:
392 		return (SCF_ERROR_INVALID_ARGUMENT);
393 	case REP_PROTOCOL_FAIL_NO_RESOURCES:
394 		return (SCF_ERROR_NO_RESOURCES);
395 	case REP_PROTOCOL_FAIL_NOT_FOUND:
396 		return (SCF_ERROR_NOT_FOUND);
397 	case REP_PROTOCOL_FAIL_DELETED:
398 		return (SCF_ERROR_DELETED);
399 	case REP_PROTOCOL_FAIL_NOT_SET:
400 		return (SCF_ERROR_NOT_SET);
401 	case REP_PROTOCOL_FAIL_EXISTS:
402 		return (SCF_ERROR_EXISTS);
403 	case REP_PROTOCOL_FAIL_DUPLICATE_ID:
404 		return (SCF_ERROR_EXISTS);
405 	case REP_PROTOCOL_FAIL_PERMISSION_DENIED:
406 		return (SCF_ERROR_PERMISSION_DENIED);
407 	case REP_PROTOCOL_FAIL_BACKEND_ACCESS:
408 		return (SCF_ERROR_BACKEND_ACCESS);
409 	case REP_PROTOCOL_FAIL_BACKEND_READONLY:
410 		return (SCF_ERROR_BACKEND_READONLY);
411 
412 	case REP_PROTOCOL_SUCCESS:
413 	case REP_PROTOCOL_DONE:
414 	case REP_PROTOCOL_FAIL_NOT_LATEST:	/* TX code should handle this */
415 	default:
416 #ifndef NDEBUG
417 		uu_warn("%s:%d: Bad error code %d passed to proto_error().\n",
418 		    __FILE__, __LINE__, e);
419 #endif
420 		abort();
421 		/*NOTREACHED*/
422 	}
423 }
424 
425 ssize_t
426 scf_limit(uint32_t limit)
427 {
428 	switch (limit) {
429 	case SCF_LIMIT_MAX_NAME_LENGTH:
430 	case SCF_LIMIT_MAX_PG_TYPE_LENGTH:
431 		return (REP_PROTOCOL_NAME_LEN - 1);
432 	case SCF_LIMIT_MAX_VALUE_LENGTH:
433 		return (REP_PROTOCOL_VALUE_LEN - 1);
434 	case SCF_LIMIT_MAX_FMRI_LENGTH:
435 		return (SCF_FMRI_PREFIX_MAX_LEN +
436 		    sizeof (SCF_FMRI_SCOPE_PREFIX) - 1 +
437 		    sizeof (SCF_FMRI_SCOPE_SUFFIX) - 1 +
438 		    sizeof (SCF_FMRI_SERVICE_PREFIX) - 1 +
439 		    sizeof (SCF_FMRI_INSTANCE_PREFIX) - 1 +
440 		    sizeof (SCF_FMRI_PROPERTYGRP_PREFIX) - 1 +
441 		    sizeof (SCF_FMRI_PROPERTY_PREFIX) - 1 +
442 		    5 * (REP_PROTOCOL_NAME_LEN - 1));
443 	default:
444 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
445 	}
446 }
447 
448 static size_t
449 scf_opaque_decode(char *out_arg, const char *in, size_t max_out)
450 {
451 	char a, b;
452 	char *out = out_arg;
453 
454 	while (max_out > 0 && (a = in[0]) != 0 && (b = in[1]) != 0) {
455 		in += 2;
456 
457 		if (a >= '0' && a <= '9')
458 			a -= '0';
459 		else if (a >= 'a' && a <= 'f')
460 			a = a - 'a' + 10;
461 		else if (a >= 'A' && a <= 'F')
462 			a = a - 'A' + 10;
463 		else
464 			break;
465 
466 		if (b >= '0' && b <= '9')
467 			b -= '0';
468 		else if (b >= 'a' && b <= 'f')
469 			b = b - 'a' + 10;
470 		else if (b >= 'A' && b <= 'F')
471 			b = b - 'A' + 10;
472 		else
473 			break;
474 
475 		*out++ = (a << 4) | b;
476 		max_out--;
477 	}
478 
479 	return (out - out_arg);
480 }
481 
482 static size_t
483 scf_opaque_encode(char *out_arg, const char *in_arg, size_t in_sz)
484 {
485 	uint8_t *in = (uint8_t *)in_arg;
486 	uint8_t *end = in + in_sz;
487 	char *out = out_arg;
488 
489 	if (out == NULL)
490 		return (2 * in_sz);
491 
492 	while (in < end) {
493 		uint8_t c = *in++;
494 
495 		uint8_t a = (c & 0xf0) >> 4;
496 		uint8_t b = (c & 0x0f);
497 
498 		if (a <= 9)
499 			*out++ = a + '0';
500 		else
501 			*out++ = a + 'a' - 10;
502 
503 		if (b <= 9)
504 			*out++ = b + '0';
505 		else
506 			*out++ = b + 'a' - 10;
507 	}
508 
509 	*out = 0;
510 
511 	return (out - out_arg);
512 }
513 
514 static void
515 handle_do_close(scf_handle_t *h)
516 {
517 	assert(MUTEX_HELD(&h->rh_lock));
518 	assert(h->rh_doorfd != -1);
519 
520 	/*
521 	 * if there are any active FD users, we just move the FD over
522 	 * to rh_doorfd_old -- they'll close it when they finish.
523 	 */
524 	if (h->rh_fd_users > 0) {
525 		h->rh_doorfd_old = h->rh_doorfd;
526 		h->rh_doorfd = -1;
527 	} else {
528 		assert(h->rh_doorfd_old == -1);
529 		(void) close(h->rh_doorfd);
530 		h->rh_doorfd = -1;
531 	}
532 }
533 
534 /*
535  * Check if a handle is currently bound.  fork()ing implicitly unbinds
536  * the handle in the child.
537  */
538 static int
539 handle_is_bound(scf_handle_t *h)
540 {
541 	assert(MUTEX_HELD(&h->rh_lock));
542 
543 	if (h->rh_doorfd == -1)
544 		return (0);
545 
546 	if (getpid() == h->rh_doorpid)
547 		return (1);
548 
549 	/* forked since our last bind -- initiate handle close */
550 	handle_do_close(h);
551 	return (0);
552 }
553 
554 static int
555 handle_has_server_locked(scf_handle_t *h)
556 {
557 	door_info_t i;
558 	assert(MUTEX_HELD(&h->rh_lock));
559 
560 	return (handle_is_bound(h) && door_info(h->rh_doorfd, &i) != -1 &&
561 	    i.di_target != -1);
562 }
563 
564 static int
565 handle_has_server(scf_handle_t *h)
566 {
567 	int ret;
568 
569 	(void) pthread_mutex_lock(&h->rh_lock);
570 	ret = handle_has_server_locked(h);
571 	(void) pthread_mutex_unlock(&h->rh_lock);
572 
573 	return (ret);
574 }
575 
576 /*
577  * This makes a door request on the client door associated with handle h.
578  * It will automatically retry calls which fail on EINTR.  If h is not bound,
579  * returns NOT_BOUND.  If the door call fails or the server response is too
580  * small, returns CALL_FAILED.  If the server response is too big, truncates the
581  * response and returns RESULT_TOO_BIG.  Otherwise, the size of the result is
582  * returned.
583  */
584 static ssize_t
585 make_door_call(scf_handle_t *h, const void *req, size_t req_sz,
586     void *res, size_t res_sz)
587 {
588 	door_arg_t arg;
589 	int r;
590 
591 	assert(MUTEX_HELD(&h->rh_lock));
592 
593 	if (!handle_is_bound(h)) {
594 		return (NOT_BOUND);
595 	}
596 
597 	arg.data_ptr = (void *)req;
598 	arg.data_size = req_sz;
599 	arg.desc_ptr = NULL;
600 	arg.desc_num = 0;
601 	arg.rbuf = res;
602 	arg.rsize = res_sz;
603 
604 	while ((r = door_call(h->rh_doorfd, &arg)) < 0) {
605 		if (errno != EINTR)
606 			break;
607 	}
608 
609 	if (r < 0) {
610 		return (CALL_FAILED);
611 	}
612 
613 	if (arg.desc_num > 0) {
614 		while (arg.desc_num > 0) {
615 			if (arg.desc_ptr->d_attributes & DOOR_DESCRIPTOR) {
616 				int cfd = arg.desc_ptr->d_data.d_desc.d_id;
617 				(void) close(cfd);
618 			}
619 			arg.desc_ptr++;
620 			arg.desc_num--;
621 		}
622 	}
623 	if (arg.data_ptr != res && arg.data_size > 0)
624 		(void) memmove(res, arg.data_ptr, MIN(arg.data_size, res_sz));
625 
626 	if (arg.rbuf != res)
627 		(void) munmap(arg.rbuf, arg.rsize);
628 
629 	if (arg.data_size > res_sz)
630 		return (RESULT_TOO_BIG);
631 
632 	if (arg.data_size < sizeof (uint32_t))
633 		return (CALL_FAILED);
634 
635 	return (arg.data_size);
636 }
637 
638 /*
639  * Should only be used when r < 0.
640  */
641 #define	DOOR_ERRORS_BLOCK(r)	{					\
642 	switch (r) {							\
643 	case NOT_BOUND:							\
644 		return (scf_set_error(SCF_ERROR_NOT_BOUND));		\
645 									\
646 	case CALL_FAILED:						\
647 		return (scf_set_error(SCF_ERROR_CONNECTION_BROKEN));	\
648 									\
649 	case RESULT_TOO_BIG:						\
650 		return (scf_set_error(SCF_ERROR_INTERNAL));		\
651 									\
652 	default:							\
653 		assert(r == NOT_BOUND || r == CALL_FAILED ||		\
654 		    r == RESULT_TOO_BIG);				\
655 		abort();						\
656 	}								\
657 }
658 
659 /*
660  * Like make_door_call(), but takes an fd instead of a handle, and expects
661  * a single file descriptor, returned via res_fd.
662  *
663  * If no file descriptor is returned, *res_fd == -1.
664  */
665 static int
666 make_door_call_retfd(int fd, const void *req, size_t req_sz, void *res,
667     size_t res_sz, int *res_fd)
668 {
669 	door_arg_t arg;
670 	int r;
671 	char rbuf[256];
672 
673 	*res_fd = -1;
674 
675 	if (fd == -1)
676 		return (NOT_BOUND);
677 
678 	arg.data_ptr = (void *)req;
679 	arg.data_size = req_sz;
680 	arg.desc_ptr = NULL;
681 	arg.desc_num = 0;
682 	arg.rbuf = rbuf;
683 	arg.rsize = sizeof (rbuf);
684 
685 	while ((r = door_call(fd, &arg)) < 0) {
686 		if (errno != EINTR)
687 			break;
688 	}
689 
690 	if (r < 0)
691 		return (CALL_FAILED);
692 
693 	if (arg.desc_num > 1) {
694 		while (arg.desc_num > 0) {
695 			if (arg.desc_ptr->d_attributes & DOOR_DESCRIPTOR) {
696 				int cfd =
697 				    arg.desc_ptr->d_data.d_desc.d_descriptor;
698 				(void) close(cfd);
699 			}
700 			arg.desc_ptr++;
701 			arg.desc_num--;
702 		}
703 	}
704 	if (arg.desc_num == 1 && arg.desc_ptr->d_attributes & DOOR_DESCRIPTOR)
705 		*res_fd = arg.desc_ptr->d_data.d_desc.d_descriptor;
706 
707 	if (arg.data_size > 0)
708 		(void) memmove(res, arg.data_ptr, MIN(arg.data_size, res_sz));
709 
710 	if (arg.rbuf != rbuf)
711 		(void) munmap(arg.rbuf, arg.rsize);
712 
713 	if (arg.data_size > res_sz)
714 		return (RESULT_TOO_BIG);
715 
716 	if (arg.data_size < sizeof (uint32_t))
717 		return (CALL_FAILED);
718 
719 	return (arg.data_size);
720 }
721 
722 /*
723  * Fails with
724  *   _VERSION_MISMATCH
725  *   _NO_MEMORY
726  */
727 scf_handle_t *
728 scf_handle_create(scf_version_t v)
729 {
730 	scf_handle_t *ret;
731 	int failed;
732 
733 	/*
734 	 * This will need to be revisited when we bump SCF_VERSION
735 	 */
736 	if (v != SCF_VERSION) {
737 		(void) scf_set_error(SCF_ERROR_VERSION_MISMATCH);
738 		return (NULL);
739 	}
740 
741 	if (!lowlevel_init()) {
742 		(void) scf_set_error(SCF_ERROR_NO_MEMORY);
743 		return (NULL);
744 	}
745 
746 	ret = uu_zalloc(sizeof (*ret));
747 	if (ret == NULL) {
748 		(void) scf_set_error(SCF_ERROR_NO_MEMORY);
749 		return (NULL);
750 	}
751 
752 	ret->rh_dataels = uu_list_create(datael_pool, ret, 0);
753 	ret->rh_iters = uu_list_create(iter_pool, ret, 0);
754 	if (ret->rh_dataels == NULL || ret->rh_iters == NULL) {
755 		if (ret->rh_dataels != NULL)
756 			uu_list_destroy(ret->rh_dataels);
757 		if (ret->rh_iters != NULL)
758 			uu_list_destroy(ret->rh_iters);
759 		uu_free(ret);
760 		(void) scf_set_error(SCF_ERROR_NO_MEMORY);
761 		return (NULL);
762 	}
763 
764 	ret->rh_doorfd = -1;
765 	ret->rh_doorfd_old = -1;
766 	(void) pthread_mutex_init(&ret->rh_lock, NULL);
767 
768 	handle_hold_subhandles(ret, RH_HOLD_ALL);
769 
770 	failed = ((ret->rh_iter = scf_iter_create(ret)) == NULL ||
771 	    (ret->rh_scope = scf_scope_create(ret)) == NULL ||
772 	    (ret->rh_service = scf_service_create(ret)) == NULL ||
773 	    (ret->rh_instance = scf_instance_create(ret)) == NULL ||
774 	    (ret->rh_snapshot = scf_snapshot_create(ret)) == NULL ||
775 	    (ret->rh_snaplvl = scf_snaplevel_create(ret)) == NULL ||
776 	    (ret->rh_pg = scf_pg_create(ret)) == NULL ||
777 	    (ret->rh_property = scf_property_create(ret)) == NULL ||
778 	    (ret->rh_value = scf_value_create(ret)) == NULL);
779 
780 	/*
781 	 * these subhandles count as internal references, not external ones.
782 	 */
783 	ret->rh_intrefs = ret->rh_extrefs;
784 	ret->rh_extrefs = 0;
785 	handle_rele_subhandles(ret, RH_HOLD_ALL);
786 
787 	if (failed) {
788 		scf_handle_destroy(ret);
789 		(void) scf_set_error(SCF_ERROR_NO_MEMORY);
790 		return (NULL);
791 	}
792 
793 	scf_value_set_count(ret->rh_value, default_debug);
794 	(void) scf_handle_decorate(ret, "debug", ret->rh_value);
795 
796 	return (ret);
797 }
798 
799 /*
800  * Fails with
801  *   _NO_MEMORY
802  *   _NO_SERVER - server door could not be open()ed
803  *		  door call failed
804  *		  door_info() failed
805  *   _VERSION_MISMATCH - server returned bad file descriptor
806  *			 server claimed bad request
807  *			 server reported version mismatch
808  *			 server refused with unknown reason
809  *   _INVALID_ARGUMENT
810  *   _NO_RESOURCES - server is out of memory
811  *   _PERMISSION_DENIED
812  *   _INTERNAL - could not set up entities or iters
813  *		 server response too big
814  */
815 scf_handle_t *
816 _scf_handle_create_and_bind(scf_version_t ver)
817 {
818 	scf_handle_t *h;
819 
820 	h = scf_handle_create(ver);
821 	if (h == NULL)
822 		return (NULL);
823 
824 	if (scf_handle_bind(h) == -1) {
825 		scf_handle_destroy(h);
826 		return (NULL);
827 	}
828 	return (h);
829 }
830 
831 int
832 scf_handle_decorate(scf_handle_t *handle, const char *name, scf_value_t *v)
833 {
834 	if (v != SCF_DECORATE_CLEAR && handle != v->value_handle)
835 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
836 
837 	(void) pthread_mutex_lock(&handle->rh_lock);
838 	if (handle_is_bound(handle)) {
839 		(void) pthread_mutex_unlock(&handle->rh_lock);
840 		return (scf_set_error(SCF_ERROR_IN_USE));
841 	}
842 	(void) pthread_mutex_unlock(&handle->rh_lock);
843 
844 	if (strcmp(name, "debug") == 0) {
845 		if (v == SCF_DECORATE_CLEAR) {
846 			(void) pthread_mutex_lock(&handle->rh_lock);
847 			handle->rh_debug = 0;
848 			(void) pthread_mutex_unlock(&handle->rh_lock);
849 		} else {
850 			uint64_t val;
851 			if (scf_value_get_count(v, &val) < 0)
852 				return (-1);		/* error already set */
853 
854 			(void) pthread_mutex_lock(&handle->rh_lock);
855 			handle->rh_debug = (uid_t)val;
856 			(void) pthread_mutex_unlock(&handle->rh_lock);
857 		}
858 		return (0);
859 	}
860 	if (strcmp(name, "door_path") == 0) {
861 		char name[sizeof (handle->rh_doorpath)];
862 
863 		if (v == SCF_DECORATE_CLEAR) {
864 			(void) pthread_mutex_lock(&handle->rh_lock);
865 			handle->rh_doorpath[0] = 0;
866 			(void) pthread_mutex_unlock(&handle->rh_lock);
867 		} else {
868 			ssize_t len;
869 
870 			if ((len = scf_value_get_astring(v, name,
871 			    sizeof (name))) < 0) {
872 				return (-1);		/* error already set */
873 			}
874 			if (len == 0 || len >= sizeof (name)) {
875 				return (scf_set_error(
876 				    SCF_ERROR_INVALID_ARGUMENT));
877 			}
878 			(void) pthread_mutex_lock(&handle->rh_lock);
879 			(void) strlcpy(handle->rh_doorpath, name,
880 			    sizeof (handle->rh_doorpath));
881 			(void) pthread_mutex_unlock(&handle->rh_lock);
882 		}
883 		return (0);
884 	}
885 
886 	if (strcmp(name, "zone") == 0) {
887 		char zone[MAXPATHLEN], root[MAXPATHLEN], door[MAXPATHLEN];
888 		static int (*zone_get_rootpath)(char *, char *, size_t);
889 		ssize_t len;
890 
891 		/*
892 		 * In order to be able to set the zone on a handle, we want
893 		 * to determine the zone's path, which requires us to call into
894 		 * libzonecfg -- but libzonecfg.so links against libscf.so so
895 		 * we must not explicitly link to it.  To circumvent the
896 		 * circular dependency, we will pull it in here via dlopen().
897 		 */
898 		if (zone_get_rootpath == NULL) {
899 			void *dl = dlopen("libzonecfg.so.1", RTLD_LAZY), *sym;
900 
901 			if (dl == NULL)
902 				return (scf_set_error(SCF_ERROR_NOT_FOUND));
903 
904 			if ((sym = dlsym(dl, "zone_get_rootpath")) == NULL) {
905 				(void) dlclose(dl);
906 				return (scf_set_error(SCF_ERROR_INTERNAL));
907 			}
908 
909 			zone_get_rootpath = (int(*)(char *, char *, size_t))sym;
910 		}
911 
912 		if (v == SCF_DECORATE_CLEAR) {
913 			(void) pthread_mutex_lock(&handle->rh_lock);
914 			handle->rh_doorpath[0] = 0;
915 			(void) pthread_mutex_unlock(&handle->rh_lock);
916 
917 			return (0);
918 		}
919 
920 		if ((len = scf_value_get_astring(v, zone, sizeof (zone))) < 0)
921 			return (-1);
922 
923 		if (len == 0 || len >= sizeof (zone))
924 			return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
925 
926 		if (zone_get_rootpath(zone, root, sizeof (root)) != Z_OK) {
927 			if (strcmp(zone, GLOBAL_ZONENAME) == 0) {
928 				root[0] = '\0';
929 			} else {
930 				return (scf_set_error(SCF_ERROR_NOT_FOUND));
931 			}
932 		}
933 
934 		if (snprintf(door, sizeof (door), "%s/%s", root,
935 		    default_door_path) >= sizeof (door))
936 			return (scf_set_error(SCF_ERROR_INTERNAL));
937 
938 		(void) pthread_mutex_lock(&handle->rh_lock);
939 		(void) strlcpy(handle->rh_doorpath, door,
940 		    sizeof (handle->rh_doorpath));
941 		(void) pthread_mutex_unlock(&handle->rh_lock);
942 
943 		return (0);
944 	}
945 
946 	return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
947 }
948 
949 /*
950  * fails with INVALID_ARGUMENT and HANDLE_MISMATCH.
951  */
952 int
953 _scf_handle_decorations(scf_handle_t *handle, scf_decoration_func *f,
954     scf_value_t *v, void *data)
955 {
956 	scf_decoration_info_t i;
957 	char name[sizeof (handle->rh_doorpath)];
958 	uint64_t debug;
959 
960 	if (f == NULL || v == NULL)
961 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
962 
963 	if (v->value_handle != handle)
964 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
965 
966 	i.sdi_name = (const char *)"debug";
967 	i.sdi_type = SCF_TYPE_COUNT;
968 	(void) pthread_mutex_lock(&handle->rh_lock);
969 	debug = handle->rh_debug;
970 	(void) pthread_mutex_unlock(&handle->rh_lock);
971 	if (debug != 0) {
972 		scf_value_set_count(v, debug);
973 		i.sdi_value = v;
974 	} else {
975 		i.sdi_value = SCF_DECORATE_CLEAR;
976 	}
977 
978 	if ((*f)(&i, data) == 0)
979 		return (0);
980 
981 	i.sdi_name = (const char *)"door_path";
982 	i.sdi_type = SCF_TYPE_ASTRING;
983 	(void) pthread_mutex_lock(&handle->rh_lock);
984 	(void) strlcpy(name, handle->rh_doorpath, sizeof (name));
985 	(void) pthread_mutex_unlock(&handle->rh_lock);
986 	if (name[0] != 0) {
987 		(void) scf_value_set_astring(v, name);
988 		i.sdi_value = v;
989 	} else {
990 		i.sdi_value = SCF_DECORATE_CLEAR;
991 	}
992 
993 	if ((*f)(&i, data) == 0)
994 		return (0);
995 
996 	return (1);
997 }
998 
999 /*
1000  * Fails if handle is not bound.
1001  */
1002 static int
1003 handle_unbind_unlocked(scf_handle_t *handle)
1004 {
1005 	rep_protocol_request_t request;
1006 	rep_protocol_response_t response;
1007 
1008 	if (!handle_is_bound(handle))
1009 		return (-1);
1010 
1011 	request.rpr_request = REP_PROTOCOL_CLOSE;
1012 
1013 	(void) make_door_call(handle, &request, sizeof (request),
1014 	    &response, sizeof (response));
1015 
1016 	handle_do_close(handle);
1017 
1018 	return (SCF_SUCCESS);
1019 }
1020 
1021 /*
1022  * Fails with
1023  *   _HANDLE_DESTROYED - dp's handle has been destroyed
1024  *   _INTERNAL - server response too big
1025  *		 entity already set up with different type
1026  *   _NO_RESOURCES - server out of memory
1027  */
1028 static int
1029 datael_attach(scf_datael_t *dp)
1030 {
1031 	scf_handle_t *h = dp->rd_handle;
1032 
1033 	struct rep_protocol_entity_setup request;
1034 	rep_protocol_response_t response;
1035 	ssize_t r;
1036 
1037 	assert(MUTEX_HELD(&h->rh_lock));
1038 
1039 	dp->rd_reset = 0;		/* setup implicitly resets */
1040 
1041 	if (h->rh_flags & HANDLE_DEAD)
1042 		return (scf_set_error(SCF_ERROR_HANDLE_DESTROYED));
1043 
1044 	if (!handle_is_bound(h))
1045 		return (SCF_SUCCESS);		/* nothing to do */
1046 
1047 	request.rpr_request = REP_PROTOCOL_ENTITY_SETUP;
1048 	request.rpr_entityid = dp->rd_entity;
1049 	request.rpr_entitytype = dp->rd_type;
1050 
1051 	r = make_door_call(h, &request, sizeof (request),
1052 	    &response, sizeof (response));
1053 
1054 	if (r == NOT_BOUND || r == CALL_FAILED)
1055 		return (SCF_SUCCESS);
1056 	if (r == RESULT_TOO_BIG)
1057 		return (scf_set_error(SCF_ERROR_INTERNAL));
1058 
1059 	if (response.rpr_response != REP_PROTOCOL_SUCCESS)
1060 		return (scf_set_error(proto_error(response.rpr_response)));
1061 
1062 	return (SCF_SUCCESS);
1063 }
1064 
1065 /*
1066  * Fails with
1067  *   _HANDLE_DESTROYED - iter's handle has been destroyed
1068  *   _INTERNAL - server response too big
1069  *		 iter already existed
1070  *   _NO_RESOURCES
1071  */
1072 static int
1073 iter_attach(scf_iter_t *iter)
1074 {
1075 	scf_handle_t *h = iter->iter_handle;
1076 	struct rep_protocol_iter_request request;
1077 	struct rep_protocol_response response;
1078 	int r;
1079 
1080 	assert(MUTEX_HELD(&h->rh_lock));
1081 
1082 	if (h->rh_flags & HANDLE_DEAD)
1083 		return (scf_set_error(SCF_ERROR_HANDLE_DESTROYED));
1084 
1085 	if (!handle_is_bound(h))
1086 		return (SCF_SUCCESS);		/* nothing to do */
1087 
1088 	request.rpr_request = REP_PROTOCOL_ITER_SETUP;
1089 	request.rpr_iterid = iter->iter_id;
1090 
1091 	r = make_door_call(h, &request, sizeof (request),
1092 	    &response, sizeof (response));
1093 
1094 	if (r == NOT_BOUND || r == CALL_FAILED)
1095 		return (SCF_SUCCESS);
1096 	if (r == RESULT_TOO_BIG)
1097 		return (scf_set_error(SCF_ERROR_INTERNAL));
1098 
1099 	if (response.rpr_response != REP_PROTOCOL_SUCCESS)
1100 		return (scf_set_error(proto_error(response.rpr_response)));
1101 
1102 	return (SCF_SUCCESS);
1103 }
1104 
1105 /*
1106  * Fails with
1107  *   _IN_USE - handle already bound
1108  *   _NO_SERVER - server door could not be open()ed
1109  *		  door call failed
1110  *		  door_info() failed
1111  *   _VERSION_MISMATCH - server returned bad file descriptor
1112  *			 server claimed bad request
1113  *			 server reported version mismatch
1114  *			 server refused with unknown reason
1115  *   _INVALID_ARGUMENT
1116  *   _NO_RESOURCES - server is out of memory
1117  *   _PERMISSION_DENIED
1118  *   _INTERNAL - could not set up entities or iters
1119  *		 server response too big
1120  *
1121  * perhaps this should try multiple times.
1122  */
1123 int
1124 scf_handle_bind(scf_handle_t *handle)
1125 {
1126 	scf_datael_t *el;
1127 	scf_iter_t *iter;
1128 
1129 	pid_t pid;
1130 	int fd;
1131 	int res;
1132 	door_info_t info;
1133 	repository_door_request_t request;
1134 	repository_door_response_t response;
1135 	const char *door_name = default_door_path;
1136 
1137 	(void) pthread_mutex_lock(&handle->rh_lock);
1138 	if (handle_is_bound(handle)) {
1139 		(void) pthread_mutex_unlock(&handle->rh_lock);
1140 		return (scf_set_error(SCF_ERROR_IN_USE));
1141 	}
1142 
1143 	/* wait until any active fd users have cleared out */
1144 	while (handle->rh_fd_users > 0) {
1145 		int cancel_state;
1146 
1147 		(void) pthread_setcancelstate(PTHREAD_CANCEL_DISABLE,
1148 		    &cancel_state);
1149 		(void) pthread_cond_wait(&handle->rh_cv, &handle->rh_lock);
1150 		(void) pthread_setcancelstate(cancel_state, NULL);
1151 	}
1152 
1153 	/* check again, since we had to drop the lock */
1154 	if (handle_is_bound(handle)) {
1155 		(void) pthread_mutex_unlock(&handle->rh_lock);
1156 		return (scf_set_error(SCF_ERROR_IN_USE));
1157 	}
1158 
1159 	assert(handle->rh_doorfd == -1 && handle->rh_doorfd_old == -1);
1160 
1161 	if (handle->rh_doorpath[0] != 0)
1162 		door_name = handle->rh_doorpath;
1163 
1164 	fd = open(door_name, O_RDONLY, 0);
1165 	if (fd == -1) {
1166 		(void) pthread_mutex_unlock(&handle->rh_lock);
1167 		return (scf_set_error(SCF_ERROR_NO_SERVER));
1168 	}
1169 
1170 	request.rdr_version = REPOSITORY_DOOR_VERSION;
1171 	request.rdr_request = REPOSITORY_DOOR_REQUEST_CONNECT;
1172 	request.rdr_flags = handle->rh_flags;
1173 	request.rdr_debug = handle->rh_debug;
1174 
1175 	pid = getpid();
1176 
1177 	res = make_door_call_retfd(fd, &request, sizeof (request),
1178 	    &response, sizeof (response), &handle->rh_doorfd);
1179 
1180 	(void) close(fd);
1181 
1182 	if (res < 0) {
1183 		(void) pthread_mutex_unlock(&handle->rh_lock);
1184 
1185 		assert(res != NOT_BOUND);
1186 		if (res == CALL_FAILED)
1187 			return (scf_set_error(SCF_ERROR_NO_SERVER));
1188 		assert(res == RESULT_TOO_BIG);
1189 		return (scf_set_error(SCF_ERROR_INTERNAL));
1190 	}
1191 
1192 	if (handle->rh_doorfd < 0) {
1193 		(void) pthread_mutex_unlock(&handle->rh_lock);
1194 
1195 		switch (response.rdr_status) {
1196 		case REPOSITORY_DOOR_SUCCESS:
1197 			return (scf_set_error(SCF_ERROR_VERSION_MISMATCH));
1198 
1199 		case REPOSITORY_DOOR_FAIL_BAD_REQUEST:
1200 			return (scf_set_error(SCF_ERROR_VERSION_MISMATCH));
1201 
1202 		case REPOSITORY_DOOR_FAIL_VERSION_MISMATCH:
1203 			return (scf_set_error(SCF_ERROR_VERSION_MISMATCH));
1204 
1205 		case REPOSITORY_DOOR_FAIL_BAD_FLAG:
1206 			return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
1207 
1208 		case REPOSITORY_DOOR_FAIL_NO_RESOURCES:
1209 			return (scf_set_error(SCF_ERROR_NO_RESOURCES));
1210 
1211 		case REPOSITORY_DOOR_FAIL_PERMISSION_DENIED:
1212 			return (scf_set_error(SCF_ERROR_PERMISSION_DENIED));
1213 
1214 		default:
1215 			return (scf_set_error(SCF_ERROR_VERSION_MISMATCH));
1216 		}
1217 	}
1218 
1219 	(void) fcntl(handle->rh_doorfd, F_SETFD, FD_CLOEXEC);
1220 
1221 	if (door_info(handle->rh_doorfd, &info) < 0) {
1222 		(void) close(handle->rh_doorfd);
1223 		handle->rh_doorfd = -1;
1224 
1225 		(void) pthread_mutex_unlock(&handle->rh_lock);
1226 		return (scf_set_error(SCF_ERROR_NO_SERVER));
1227 	}
1228 
1229 	handle->rh_doorpid = pid;
1230 	handle->rh_doorid = info.di_uniquifier;
1231 
1232 	/*
1233 	 * Now, re-attach everything
1234 	 */
1235 	for (el = uu_list_first(handle->rh_dataels); el != NULL;
1236 	    el = uu_list_next(handle->rh_dataels, el)) {
1237 		if (datael_attach(el) == -1) {
1238 			assert(scf_error() != SCF_ERROR_HANDLE_DESTROYED);
1239 			(void) handle_unbind_unlocked(handle);
1240 			(void) pthread_mutex_unlock(&handle->rh_lock);
1241 			return (-1);
1242 		}
1243 	}
1244 
1245 	for (iter = uu_list_first(handle->rh_iters); iter != NULL;
1246 	    iter = uu_list_next(handle->rh_iters, iter)) {
1247 		if (iter_attach(iter) == -1) {
1248 			assert(scf_error() != SCF_ERROR_HANDLE_DESTROYED);
1249 			(void) handle_unbind_unlocked(handle);
1250 			(void) pthread_mutex_unlock(&handle->rh_lock);
1251 			return (-1);
1252 		}
1253 	}
1254 	(void) pthread_mutex_unlock(&handle->rh_lock);
1255 	return (SCF_SUCCESS);
1256 }
1257 
1258 int
1259 scf_handle_unbind(scf_handle_t *handle)
1260 {
1261 	int ret;
1262 	(void) pthread_mutex_lock(&handle->rh_lock);
1263 	ret = handle_unbind_unlocked(handle);
1264 	(void) pthread_mutex_unlock(&handle->rh_lock);
1265 	return (ret == SCF_SUCCESS ? ret : scf_set_error(SCF_ERROR_NOT_BOUND));
1266 }
1267 
1268 static scf_handle_t *
1269 handle_get(scf_handle_t *h)
1270 {
1271 	(void) pthread_mutex_lock(&h->rh_lock);
1272 	if (h->rh_flags & HANDLE_DEAD) {
1273 		(void) pthread_mutex_unlock(&h->rh_lock);
1274 		(void) scf_set_error(SCF_ERROR_HANDLE_DESTROYED);
1275 		return (NULL);
1276 	}
1277 	(void) pthread_mutex_unlock(&h->rh_lock);
1278 	return (h);
1279 }
1280 
1281 /*
1282  * Called when an object is removed from the handle.  On the last remove,
1283  * cleans up and frees the handle.
1284  */
1285 static void
1286 handle_unrefed(scf_handle_t *handle)
1287 {
1288 	scf_iter_t *iter;
1289 	scf_value_t *v;
1290 	scf_scope_t *sc;
1291 	scf_service_t *svc;
1292 	scf_instance_t *inst;
1293 	scf_snapshot_t *snap;
1294 	scf_snaplevel_t *snaplvl;
1295 	scf_propertygroup_t *pg;
1296 	scf_property_t *prop;
1297 
1298 	assert(MUTEX_HELD(&handle->rh_lock));
1299 
1300 	/*
1301 	 * Don't do anything if the handle has not yet been destroyed, there
1302 	 * are still external references, or we're already doing unrefed
1303 	 * handling.
1304 	 */
1305 	if (!(handle->rh_flags & HANDLE_DEAD) ||
1306 	    handle->rh_extrefs > 0 ||
1307 	    handle->rh_fd_users > 0 ||
1308 	    (handle->rh_flags & HANDLE_UNREFED)) {
1309 		(void) pthread_mutex_unlock(&handle->rh_lock);
1310 		return;
1311 	}
1312 
1313 	handle->rh_flags |= HANDLE_UNREFED;
1314 
1315 	/*
1316 	 * Now that we know that there are no external references, and the
1317 	 * HANDLE_DEAD flag keeps new ones from appearing, we can clean up
1318 	 * our subhandles and destroy the handle completely.
1319 	 */
1320 	assert(handle->rh_intrefs >= 0);
1321 	handle->rh_extrefs = handle->rh_intrefs;
1322 	handle->rh_intrefs = 0;
1323 	(void) pthread_mutex_unlock(&handle->rh_lock);
1324 
1325 	handle_hold_subhandles(handle, RH_HOLD_ALL);
1326 
1327 	iter = handle->rh_iter;
1328 	sc = handle->rh_scope;
1329 	svc = handle->rh_service;
1330 	inst = handle->rh_instance;
1331 	snap = handle->rh_snapshot;
1332 	snaplvl = handle->rh_snaplvl;
1333 	pg = handle->rh_pg;
1334 	prop = handle->rh_property;
1335 	v = handle->rh_value;
1336 
1337 	handle->rh_iter = NULL;
1338 	handle->rh_scope = NULL;
1339 	handle->rh_service = NULL;
1340 	handle->rh_instance = NULL;
1341 	handle->rh_snapshot = NULL;
1342 	handle->rh_snaplvl = NULL;
1343 	handle->rh_pg = NULL;
1344 	handle->rh_property = NULL;
1345 	handle->rh_value = NULL;
1346 
1347 	if (iter != NULL)
1348 		scf_iter_destroy(iter);
1349 	if (sc != NULL)
1350 		scf_scope_destroy(sc);
1351 	if (svc != NULL)
1352 		scf_service_destroy(svc);
1353 	if (inst != NULL)
1354 		scf_instance_destroy(inst);
1355 	if (snap != NULL)
1356 		scf_snapshot_destroy(snap);
1357 	if (snaplvl != NULL)
1358 		scf_snaplevel_destroy(snaplvl);
1359 	if (pg != NULL)
1360 		scf_pg_destroy(pg);
1361 	if (prop != NULL)
1362 		scf_property_destroy(prop);
1363 	if (v != NULL)
1364 		scf_value_destroy(v);
1365 
1366 	(void) pthread_mutex_lock(&handle->rh_lock);
1367 
1368 	/* there should be no outstanding children at this point */
1369 	assert(handle->rh_extrefs == 0);
1370 	assert(handle->rh_intrefs == 0);
1371 	assert(handle->rh_values == 0);
1372 	assert(handle->rh_entries == 0);
1373 	assert(uu_list_numnodes(handle->rh_dataels) == 0);
1374 	assert(uu_list_numnodes(handle->rh_iters) == 0);
1375 
1376 	uu_list_destroy(handle->rh_dataels);
1377 	uu_list_destroy(handle->rh_iters);
1378 	handle->rh_dataels = NULL;
1379 	handle->rh_iters = NULL;
1380 	(void) pthread_mutex_unlock(&handle->rh_lock);
1381 
1382 	(void) pthread_mutex_destroy(&handle->rh_lock);
1383 
1384 	uu_free(handle);
1385 }
1386 
1387 void
1388 scf_handle_destroy(scf_handle_t *handle)
1389 {
1390 	if (handle == NULL)
1391 		return;
1392 
1393 	(void) pthread_mutex_lock(&handle->rh_lock);
1394 	if (handle->rh_flags & HANDLE_DEAD) {
1395 		/*
1396 		 * This is an error (you are not allowed to reference the
1397 		 * handle after it is destroyed), but we can't report it.
1398 		 */
1399 		(void) pthread_mutex_unlock(&handle->rh_lock);
1400 		return;
1401 	}
1402 	handle->rh_flags |= HANDLE_DEAD;
1403 	(void) handle_unbind_unlocked(handle);
1404 	handle_unrefed(handle);
1405 }
1406 
1407 ssize_t
1408 scf_myname(scf_handle_t *h, char *out, size_t len)
1409 {
1410 	char *cp;
1411 
1412 	if (!handle_has_server(h))
1413 		return (scf_set_error(SCF_ERROR_CONNECTION_BROKEN));
1414 
1415 	cp = getenv("SMF_FMRI");
1416 	if (cp == NULL)
1417 		return (scf_set_error(SCF_ERROR_NOT_SET));
1418 
1419 	return (strlcpy(out, cp, len));
1420 }
1421 
1422 static uint32_t
1423 handle_alloc_entityid(scf_handle_t *h)
1424 {
1425 	uint32_t nextid;
1426 
1427 	assert(MUTEX_HELD(&h->rh_lock));
1428 
1429 	if (uu_list_numnodes(h->rh_dataels) == UINT32_MAX)
1430 		return (0);		/* no ids available */
1431 
1432 	/*
1433 	 * The following loop assumes that there are not a huge number of
1434 	 * outstanding entities when we've wrapped.  If that ends up not
1435 	 * being the case, the O(N^2) nature of this search will hurt a lot,
1436 	 * and the data structure should be switched to an AVL tree.
1437 	 */
1438 	nextid = h->rh_nextentity + 1;
1439 	for (;;) {
1440 		scf_datael_t *cur;
1441 
1442 		if (nextid == 0) {
1443 			nextid++;
1444 			h->rh_flags |= HANDLE_WRAPPED_ENTITY;
1445 		}
1446 		if (!(h->rh_flags & HANDLE_WRAPPED_ENTITY))
1447 			break;
1448 
1449 		cur = uu_list_find(h->rh_dataels, NULL, &nextid, NULL);
1450 		if (cur == NULL)
1451 			break;		/* not in use */
1452 
1453 		if (nextid == h->rh_nextentity)
1454 			return (0);	/* wrapped around; no ids available */
1455 		nextid++;
1456 	}
1457 
1458 	h->rh_nextentity = nextid;
1459 	return (nextid);
1460 }
1461 
1462 static uint32_t
1463 handle_alloc_iterid(scf_handle_t *h)
1464 {
1465 	uint32_t nextid;
1466 
1467 	assert(MUTEX_HELD(&h->rh_lock));
1468 
1469 	if (uu_list_numnodes(h->rh_iters) == UINT32_MAX)
1470 		return (0);		/* no ids available */
1471 
1472 	/* see the comment in handle_alloc_entityid */
1473 	nextid = h->rh_nextiter + 1;
1474 	for (;;) {
1475 		scf_iter_t *cur;
1476 
1477 		if (nextid == 0) {
1478 			nextid++;
1479 			h->rh_flags |= HANDLE_WRAPPED_ITER;
1480 		}
1481 		if (!(h->rh_flags & HANDLE_WRAPPED_ITER))
1482 			break;			/* not yet wrapped */
1483 
1484 		cur = uu_list_find(h->rh_iters, NULL, &nextid, NULL);
1485 		if (cur == NULL)
1486 			break;		/* not in use */
1487 
1488 		if (nextid == h->rh_nextiter)
1489 			return (0);	/* wrapped around; no ids available */
1490 		nextid++;
1491 	}
1492 
1493 	h->rh_nextiter = nextid;
1494 	return (nextid);
1495 }
1496 
1497 static uint32_t
1498 handle_next_changeid(scf_handle_t *handle)
1499 {
1500 	uint32_t nextid;
1501 
1502 	assert(MUTEX_HELD(&handle->rh_lock));
1503 
1504 	nextid = ++handle->rh_nextchangeid;
1505 	if (nextid == 0)
1506 		nextid = ++handle->rh_nextchangeid;
1507 	return (nextid);
1508 }
1509 
1510 /*
1511  * Fails with
1512  *   _INVALID_ARGUMENT - h is NULL
1513  *   _HANDLE_DESTROYED
1514  *   _INTERNAL - server response too big
1515  *		 entity already set up with different type
1516  *   _NO_RESOURCES
1517  */
1518 static int
1519 datael_init(scf_datael_t *dp, scf_handle_t *h, uint32_t type)
1520 {
1521 	int ret;
1522 
1523 	if (h == NULL)
1524 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
1525 
1526 	uu_list_node_init(dp, &dp->rd_node, datael_pool);
1527 
1528 	dp->rd_handle = h;
1529 	dp->rd_type = type;
1530 	dp->rd_reset = 0;
1531 
1532 	(void) pthread_mutex_lock(&h->rh_lock);
1533 	if (h->rh_flags & HANDLE_DEAD) {
1534 		/*
1535 		 * we're in undefined territory (the user cannot use a handle
1536 		 * directly after it has been destroyed), but we don't want
1537 		 * to allow any new references to happen, so we fail here.
1538 		 */
1539 		(void) pthread_mutex_unlock(&h->rh_lock);
1540 		return (scf_set_error(SCF_ERROR_HANDLE_DESTROYED));
1541 	}
1542 	dp->rd_entity = handle_alloc_entityid(h);
1543 	if (dp->rd_entity == 0) {
1544 		(void) pthread_mutex_unlock(&h->rh_lock);
1545 		uu_list_node_fini(dp, &dp->rd_node, datael_pool);
1546 		return (scf_set_error(SCF_ERROR_NO_MEMORY));
1547 	}
1548 
1549 	ret = datael_attach(dp);
1550 	if (ret == 0) {
1551 		(void) uu_list_insert_before(h->rh_dataels, NULL, dp);
1552 		h->rh_extrefs++;
1553 	} else {
1554 		uu_list_node_fini(dp, &dp->rd_node, datael_pool);
1555 	}
1556 	(void) pthread_mutex_unlock(&h->rh_lock);
1557 
1558 	return (ret);
1559 }
1560 
1561 static void
1562 datael_destroy(scf_datael_t *dp)
1563 {
1564 	scf_handle_t *h = dp->rd_handle;
1565 
1566 	struct rep_protocol_entity_teardown request;
1567 	rep_protocol_response_t response;
1568 
1569 	(void) pthread_mutex_lock(&h->rh_lock);
1570 	uu_list_remove(h->rh_dataels, dp);
1571 	--h->rh_extrefs;
1572 
1573 	if (handle_is_bound(h)) {
1574 		request.rpr_request = REP_PROTOCOL_ENTITY_TEARDOWN;
1575 		request.rpr_entityid = dp->rd_entity;
1576 
1577 		(void) make_door_call(h, &request, sizeof (request),
1578 		    &response, sizeof (response));
1579 	}
1580 	handle_unrefed(h);			/* drops h->rh_lock */
1581 
1582 	dp->rd_handle = NULL;
1583 }
1584 
1585 static scf_handle_t *
1586 datael_handle(const scf_datael_t *dp)
1587 {
1588 	return (handle_get(dp->rd_handle));
1589 }
1590 
1591 /*
1592  * We delay ENTITY_RESETs until right before the entity is used.  By doing
1593  * them lazily, we remove quite a few unnecessary calls.
1594  */
1595 static void
1596 datael_do_reset_locked(scf_datael_t *dp)
1597 {
1598 	scf_handle_t *h = dp->rd_handle;
1599 
1600 	struct rep_protocol_entity_reset request;
1601 	rep_protocol_response_t response;
1602 
1603 	assert(MUTEX_HELD(&h->rh_lock));
1604 
1605 	request.rpr_request = REP_PROTOCOL_ENTITY_RESET;
1606 	request.rpr_entityid = dp->rd_entity;
1607 
1608 	(void) make_door_call(h, &request, sizeof (request),
1609 	    &response, sizeof (response));
1610 
1611 	dp->rd_reset = 0;
1612 }
1613 
1614 static void
1615 datael_reset_locked(scf_datael_t *dp)
1616 {
1617 	assert(MUTEX_HELD(&dp->rd_handle->rh_lock));
1618 	dp->rd_reset = 1;
1619 }
1620 
1621 static void
1622 datael_reset(scf_datael_t *dp)
1623 {
1624 	scf_handle_t *h = dp->rd_handle;
1625 
1626 	(void) pthread_mutex_lock(&h->rh_lock);
1627 	dp->rd_reset = 1;
1628 	(void) pthread_mutex_unlock(&h->rh_lock);
1629 }
1630 
1631 static void
1632 datael_finish_reset(const scf_datael_t *dp_arg)
1633 {
1634 	scf_datael_t *dp = (scf_datael_t *)dp_arg;
1635 
1636 	if (dp->rd_reset)
1637 		datael_do_reset_locked(dp);
1638 }
1639 
1640 /*
1641  * Fails with _NOT_BOUND, _CONNECTION_BROKEN, _INTERNAL (server response too
1642  * big, bad entity id, request not applicable to entity, name too long for
1643  * buffer), _NOT_SET, _DELETED, or _CONSTRAINT_VIOLATED (snaplevel is not of an
1644  * instance).
1645  */
1646 static ssize_t
1647 datael_get_name(const scf_datael_t *dp, char *buf, size_t size, uint32_t type)
1648 {
1649 	scf_handle_t *h = dp->rd_handle;
1650 
1651 	struct rep_protocol_entity_name request;
1652 	struct rep_protocol_name_response response;
1653 	ssize_t r;
1654 
1655 	(void) pthread_mutex_lock(&h->rh_lock);
1656 	request.rpr_request = REP_PROTOCOL_ENTITY_NAME;
1657 	request.rpr_entityid = dp->rd_entity;
1658 	request.rpr_answertype = type;
1659 
1660 	datael_finish_reset(dp);
1661 	r = make_door_call(h, &request, sizeof (request),
1662 	    &response, sizeof (response));
1663 	(void) pthread_mutex_unlock(&h->rh_lock);
1664 
1665 	if (r < 0)
1666 		DOOR_ERRORS_BLOCK(r);
1667 
1668 	if (response.rpr_response != REP_PROTOCOL_SUCCESS) {
1669 		assert(response.rpr_response != REP_PROTOCOL_FAIL_BAD_REQUEST);
1670 		if (response.rpr_response == REP_PROTOCOL_FAIL_NOT_FOUND)
1671 			return (scf_set_error(SCF_ERROR_CONSTRAINT_VIOLATED));
1672 		return (scf_set_error(proto_error(response.rpr_response)));
1673 	}
1674 	return (strlcpy(buf, response.rpr_name, size));
1675 }
1676 
1677 /*
1678  * Fails with _HANDLE_MISMATCH, _NOT_BOUND, _CONNECTION_BROKEN, _INTERNAL
1679  * (server response too big, bad element id), _EXISTS (elements have same id),
1680  * _NOT_SET, _DELETED, _CONSTRAINT_VIOLATED, _NOT_FOUND (scope has no parent),
1681  * or _SUCCESS.
1682  */
1683 static int
1684 datael_get_parent(const scf_datael_t *dp, scf_datael_t *pp)
1685 {
1686 	scf_handle_t *h = dp->rd_handle;
1687 
1688 	struct rep_protocol_entity_parent request;
1689 	struct rep_protocol_response response;
1690 
1691 	ssize_t r;
1692 
1693 	if (h != pp->rd_handle)
1694 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
1695 
1696 	(void) pthread_mutex_lock(&h->rh_lock);
1697 	request.rpr_request = REP_PROTOCOL_ENTITY_GET_PARENT;
1698 	request.rpr_entityid = dp->rd_entity;
1699 	request.rpr_outid = pp->rd_entity;
1700 
1701 	datael_finish_reset(dp);
1702 	datael_finish_reset(pp);
1703 	r = make_door_call(h, &request, sizeof (request),
1704 	    &response, sizeof (response));
1705 	(void) pthread_mutex_unlock(&h->rh_lock);
1706 
1707 	if (r < 0)
1708 		DOOR_ERRORS_BLOCK(r);
1709 
1710 	if (response.rpr_response != REP_PROTOCOL_SUCCESS) {
1711 		if (response.rpr_response == REP_PROTOCOL_FAIL_TYPE_MISMATCH)
1712 			return (scf_set_error(SCF_ERROR_CONSTRAINT_VIOLATED));
1713 		return (scf_set_error(proto_error(response.rpr_response)));
1714 	}
1715 
1716 	return (SCF_SUCCESS);
1717 }
1718 
1719 /*
1720  * Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT (out does not have type type,
1721  * name is invalid), _NOT_BOUND, _CONNECTION_BROKEN, _INTERNAL (server response
1722  * too big, bad id, iter already exists, element cannot have children of type,
1723  * type is invalid, iter was reset, sequence was bad, iter walks values, iter
1724  * does not walk type entities), _NOT_SET, _DELETED, _NO_RESOURCES,
1725  * _BACKEND_ACCESS, _NOT_FOUND.
1726  */
1727 static int
1728 datael_get_child_composed_locked(const scf_datael_t *dp, const char *name,
1729     uint32_t type, scf_datael_t *out, scf_iter_t *iter)
1730 {
1731 	struct rep_protocol_iter_start request;
1732 	struct rep_protocol_iter_read read_request;
1733 	struct rep_protocol_response response;
1734 
1735 	scf_handle_t *h = dp->rd_handle;
1736 	ssize_t r;
1737 
1738 	if (h != out->rd_handle)
1739 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
1740 
1741 	if (out->rd_type != type)
1742 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
1743 
1744 	assert(MUTEX_HELD(&h->rh_lock));
1745 	assert(iter != NULL);
1746 
1747 	scf_iter_reset_locked(iter);
1748 	iter->iter_type = type;
1749 
1750 	request.rpr_request = REP_PROTOCOL_ITER_START;
1751 	request.rpr_iterid = iter->iter_id;
1752 	request.rpr_entity = dp->rd_entity;
1753 	request.rpr_itertype = type;
1754 	request.rpr_flags = RP_ITER_START_EXACT | RP_ITER_START_COMPOSED;
1755 
1756 	if (name == NULL || strlcpy(request.rpr_pattern, name,
1757 	    sizeof (request.rpr_pattern)) >= sizeof (request.rpr_pattern)) {
1758 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
1759 	}
1760 
1761 	datael_finish_reset(dp);
1762 	datael_finish_reset(out);
1763 
1764 	/*
1765 	 * We hold the handle lock across both door calls, so that they
1766 	 * appear atomic.
1767 	 */
1768 	r = make_door_call(h, &request, sizeof (request),
1769 	    &response, sizeof (response));
1770 
1771 	if (r < 0)
1772 		DOOR_ERRORS_BLOCK(r);
1773 
1774 	if (response.rpr_response != REP_PROTOCOL_SUCCESS)
1775 		return (scf_set_error(proto_error(response.rpr_response)));
1776 
1777 	iter->iter_sequence++;
1778 
1779 	read_request.rpr_request = REP_PROTOCOL_ITER_READ;
1780 	read_request.rpr_iterid = iter->iter_id;
1781 	read_request.rpr_sequence = iter->iter_sequence;
1782 	read_request.rpr_entityid = out->rd_entity;
1783 
1784 	r = make_door_call(h, &read_request, sizeof (read_request),
1785 	    &response, sizeof (response));
1786 
1787 	scf_iter_reset_locked(iter);
1788 
1789 	if (r < 0)
1790 		DOOR_ERRORS_BLOCK(r);
1791 
1792 	if (response.rpr_response == REP_PROTOCOL_DONE) {
1793 		return (scf_set_error(SCF_ERROR_NOT_FOUND));
1794 	}
1795 
1796 	if (response.rpr_response != REP_PROTOCOL_SUCCESS) {
1797 		if (response.rpr_response == REP_PROTOCOL_FAIL_NOT_SET ||
1798 		    response.rpr_response == REP_PROTOCOL_FAIL_BAD_REQUEST)
1799 			return (scf_set_error(SCF_ERROR_INTERNAL));
1800 		return (scf_set_error(proto_error(response.rpr_response)));
1801 	}
1802 
1803 	return (0);
1804 }
1805 
1806 /*
1807  * Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT (out does not have type type,
1808  * name is invalid), _NOT_BOUND, _CONNECTION_BROKEN, _INTERNAL (server response
1809  * too big, bad id, element cannot have children of type, type is invalid),
1810  * _NOT_SET, _DELETED, _NO_RESOURCES, _BACKEND_ACCESS.
1811  */
1812 static int
1813 datael_get_child_locked(const scf_datael_t *dp, const char *name,
1814     uint32_t type, scf_datael_t *out)
1815 {
1816 	struct rep_protocol_entity_get_child request;
1817 	struct rep_protocol_response response;
1818 
1819 	scf_handle_t *h = dp->rd_handle;
1820 	ssize_t r;
1821 
1822 	if (h != out->rd_handle)
1823 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
1824 
1825 	if (out->rd_type != type)
1826 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
1827 
1828 	assert(MUTEX_HELD(&h->rh_lock));
1829 
1830 	request.rpr_request = REP_PROTOCOL_ENTITY_GET_CHILD;
1831 	request.rpr_entityid = dp->rd_entity;
1832 	request.rpr_childid = out->rd_entity;
1833 
1834 	if (name == NULL || strlcpy(request.rpr_name, name,
1835 	    sizeof (request.rpr_name)) >= sizeof (request.rpr_name)) {
1836 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
1837 	}
1838 
1839 	datael_finish_reset(dp);
1840 	datael_finish_reset(out);
1841 
1842 	r = make_door_call(h, &request, sizeof (request),
1843 	    &response, sizeof (response));
1844 
1845 	if (r < 0)
1846 		DOOR_ERRORS_BLOCK(r);
1847 
1848 	if (response.rpr_response != REP_PROTOCOL_SUCCESS)
1849 		return (scf_set_error(proto_error(response.rpr_response)));
1850 	return (0);
1851 }
1852 
1853 /*
1854  * Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT (out does not have type type,
1855  * name is invalid), _NOT_BOUND, _CONNECTION_BROKEN, _INTERNAL (server response
1856  * too big, bad id, iter already exists, element cannot have children of type,
1857  * type is invalid, iter was reset, sequence was bad, iter walks values, iter
1858  * does not walk type entities), _NOT_SET, _DELETED, _NO_RESOURCES,
1859  * _BACKEND_ACCESS, _NOT_FOUND.
1860  */
1861 static int
1862 datael_get_child(const scf_datael_t *dp, const char *name, uint32_t type,
1863     scf_datael_t *out, boolean_t composed)
1864 {
1865 	scf_handle_t *h = dp->rd_handle;
1866 	uint32_t held = 0;
1867 	int ret;
1868 
1869 	scf_iter_t *iter = NULL;
1870 
1871 	if (composed)
1872 		iter = HANDLE_HOLD_ITER(h);
1873 
1874 	if (out == NULL) {
1875 		switch (type) {
1876 		case REP_PROTOCOL_ENTITY_SERVICE:
1877 			out = &HANDLE_HOLD_SERVICE(h)->rd_d;
1878 			held = RH_HOLD_SERVICE;
1879 			break;
1880 
1881 		case REP_PROTOCOL_ENTITY_INSTANCE:
1882 			out = &HANDLE_HOLD_INSTANCE(h)->rd_d;
1883 			held = RH_HOLD_INSTANCE;
1884 			break;
1885 
1886 		case REP_PROTOCOL_ENTITY_SNAPSHOT:
1887 			out = &HANDLE_HOLD_SNAPSHOT(h)->rd_d;
1888 			held = RH_HOLD_SNAPSHOT;
1889 			break;
1890 
1891 		case REP_PROTOCOL_ENTITY_SNAPLEVEL:
1892 			out = &HANDLE_HOLD_SNAPLVL(h)->rd_d;
1893 			held = RH_HOLD_SNAPLVL;
1894 			break;
1895 
1896 		case REP_PROTOCOL_ENTITY_PROPERTYGRP:
1897 			out = &HANDLE_HOLD_PG(h)->rd_d;
1898 			held = RH_HOLD_PG;
1899 			break;
1900 
1901 		case REP_PROTOCOL_ENTITY_PROPERTY:
1902 			out = &HANDLE_HOLD_PROPERTY(h)->rd_d;
1903 			held = RH_HOLD_PROPERTY;
1904 			break;
1905 
1906 		default:
1907 			assert(0);
1908 			abort();
1909 		}
1910 	}
1911 
1912 	(void) pthread_mutex_lock(&h->rh_lock);
1913 	if (composed)
1914 		ret = datael_get_child_composed_locked(dp, name, type, out,
1915 		    iter);
1916 	else
1917 		ret = datael_get_child_locked(dp, name, type, out);
1918 	(void) pthread_mutex_unlock(&h->rh_lock);
1919 
1920 	if (composed)
1921 		HANDLE_RELE_ITER(h);
1922 
1923 	if (held)
1924 		handle_rele_subhandles(h, held);
1925 
1926 	return (ret);
1927 }
1928 
1929 /*
1930  * Fails with
1931  *   _HANDLE_MISMATCH
1932  *   _INVALID_ARGUMENT - name is too long
1933  *			 invalid changeid
1934  *			 name is invalid
1935  *			 cannot create children for dp's type of node
1936  *   _NOT_BOUND - handle is not bound
1937  *   _CONNECTION_BROKEN - server is not reachable
1938  *   _INTERNAL - server response too big
1939  *		 dp or cp has unknown id
1940  *		 type is _PROPERTYGRP
1941  *		 type is invalid
1942  *		 dp cannot have children of type type
1943  *		 database is corrupt
1944  *   _EXISTS - dp & cp have the same id
1945  *   _EXISTS - child already exists
1946  *   _DELETED - dp has been deleted
1947  *   _NOT_SET - dp is reset
1948  *   _NO_RESOURCES
1949  *   _PERMISSION_DENIED
1950  *   _BACKEND_ACCESS
1951  *   _BACKEND_READONLY
1952  */
1953 static int
1954 datael_add_child(const scf_datael_t *dp, const char *name, uint32_t type,
1955     scf_datael_t *cp)
1956 {
1957 	scf_handle_t *h = dp->rd_handle;
1958 
1959 	struct rep_protocol_entity_create_child request;
1960 	struct rep_protocol_response response;
1961 	ssize_t r;
1962 	uint32_t held = 0;
1963 
1964 	if (cp == NULL) {
1965 		switch (type) {
1966 		case REP_PROTOCOL_ENTITY_SCOPE:
1967 			cp = &HANDLE_HOLD_SCOPE(h)->rd_d;
1968 			held = RH_HOLD_SCOPE;
1969 			break;
1970 		case REP_PROTOCOL_ENTITY_SERVICE:
1971 			cp = &HANDLE_HOLD_SERVICE(h)->rd_d;
1972 			held = RH_HOLD_SERVICE;
1973 			break;
1974 		case REP_PROTOCOL_ENTITY_INSTANCE:
1975 			cp = &HANDLE_HOLD_INSTANCE(h)->rd_d;
1976 			held = RH_HOLD_INSTANCE;
1977 			break;
1978 		case REP_PROTOCOL_ENTITY_SNAPSHOT:
1979 		default:
1980 			assert(0);
1981 			abort();
1982 		}
1983 		assert(h == cp->rd_handle);
1984 
1985 	} else if (h != cp->rd_handle) {
1986 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
1987 	}
1988 
1989 	if (strlcpy(request.rpr_name, name, sizeof (request.rpr_name)) >=
1990 	    sizeof (request.rpr_name)) {
1991 		r = scf_set_error(SCF_ERROR_INVALID_ARGUMENT);
1992 		goto err;
1993 	}
1994 
1995 	(void) pthread_mutex_lock(&h->rh_lock);
1996 	request.rpr_request = REP_PROTOCOL_ENTITY_CREATE_CHILD;
1997 	request.rpr_entityid = dp->rd_entity;
1998 	request.rpr_childtype = type;
1999 	request.rpr_childid = cp->rd_entity;
2000 
2001 	datael_finish_reset(dp);
2002 	request.rpr_changeid = handle_next_changeid(h);
2003 	r = make_door_call(h, &request, sizeof (request),
2004 	    &response, sizeof (response));
2005 	(void) pthread_mutex_unlock(&h->rh_lock);
2006 
2007 	if (held)
2008 		handle_rele_subhandles(h, held);
2009 
2010 	if (r < 0)
2011 		DOOR_ERRORS_BLOCK(r);
2012 
2013 	if (response.rpr_response != REP_PROTOCOL_SUCCESS)
2014 		return (scf_set_error(proto_error(response.rpr_response)));
2015 
2016 	return (SCF_SUCCESS);
2017 
2018 err:
2019 	if (held)
2020 		handle_rele_subhandles(h, held);
2021 	return (r);
2022 }
2023 
2024 static int
2025 datael_add_pg(const scf_datael_t *dp, const char *name, const char *type,
2026     uint32_t flags, scf_datael_t *cp)
2027 {
2028 	scf_handle_t *h = dp->rd_handle;
2029 
2030 	struct rep_protocol_entity_create_pg request;
2031 	struct rep_protocol_response response;
2032 	ssize_t r;
2033 
2034 	int holding_els = 0;
2035 
2036 	if (cp == NULL) {
2037 		holding_els = 1;
2038 		cp = &HANDLE_HOLD_PG(h)->rd_d;
2039 		assert(h == cp->rd_handle);
2040 
2041 	} else if (h != cp->rd_handle) {
2042 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
2043 	}
2044 
2045 	request.rpr_request = REP_PROTOCOL_ENTITY_CREATE_PG;
2046 
2047 	if (name == NULL || strlcpy(request.rpr_name, name,
2048 	    sizeof (request.rpr_name)) > sizeof (request.rpr_name)) {
2049 		r = scf_set_error(SCF_ERROR_INVALID_ARGUMENT);
2050 		goto err;
2051 	}
2052 
2053 	if (type == NULL || strlcpy(request.rpr_type, type,
2054 	    sizeof (request.rpr_type)) > sizeof (request.rpr_type)) {
2055 		r = scf_set_error(SCF_ERROR_INVALID_ARGUMENT);
2056 		goto err;
2057 	}
2058 
2059 	(void) pthread_mutex_lock(&h->rh_lock);
2060 	request.rpr_entityid = dp->rd_entity;
2061 	request.rpr_childid = cp->rd_entity;
2062 	request.rpr_flags = flags;
2063 
2064 	datael_finish_reset(dp);
2065 	datael_finish_reset(cp);
2066 	request.rpr_changeid = handle_next_changeid(h);
2067 	r = make_door_call(h, &request, sizeof (request),
2068 	    &response, sizeof (response));
2069 	(void) pthread_mutex_unlock(&h->rh_lock);
2070 
2071 	if (holding_els)
2072 		HANDLE_RELE_PG(h);
2073 
2074 	if (r < 0)
2075 		DOOR_ERRORS_BLOCK(r);
2076 
2077 	if (response.rpr_response != REP_PROTOCOL_SUCCESS)
2078 		return (scf_set_error(proto_error(response.rpr_response)));
2079 
2080 	return (SCF_SUCCESS);
2081 
2082 err:
2083 	if (holding_els)
2084 		HANDLE_RELE_PG(h);
2085 	return (r);
2086 }
2087 
2088 static int
2089 datael_delete(const scf_datael_t *dp)
2090 {
2091 	scf_handle_t *h = dp->rd_handle;
2092 
2093 	struct rep_protocol_entity_delete request;
2094 	struct rep_protocol_response response;
2095 	ssize_t r;
2096 
2097 	(void) pthread_mutex_lock(&h->rh_lock);
2098 	request.rpr_request = REP_PROTOCOL_ENTITY_DELETE;
2099 	request.rpr_entityid = dp->rd_entity;
2100 
2101 	datael_finish_reset(dp);
2102 	request.rpr_changeid = handle_next_changeid(h);
2103 	r = make_door_call(h, &request, sizeof (request),
2104 	    &response, sizeof (response));
2105 	(void) pthread_mutex_unlock(&h->rh_lock);
2106 
2107 	if (r < 0)
2108 		DOOR_ERRORS_BLOCK(r);
2109 
2110 	if (response.rpr_response != REP_PROTOCOL_SUCCESS)
2111 		return (scf_set_error(proto_error(response.rpr_response)));
2112 
2113 	return (SCF_SUCCESS);
2114 }
2115 
2116 /*
2117  * Fails with
2118  *   _INVALID_ARGUMENT - h is NULL
2119  *   _NO_MEMORY
2120  *   _HANDLE_DESTROYED - h has been destroyed
2121  *   _INTERNAL - server response too big
2122  *		 iter already exists
2123  *   _NO_RESOURCES
2124  */
2125 scf_iter_t *
2126 scf_iter_create(scf_handle_t *h)
2127 {
2128 	scf_iter_t *iter;
2129 
2130 	if (h == NULL) {
2131 		(void) scf_set_error(SCF_ERROR_INVALID_ARGUMENT);
2132 		return (NULL);
2133 	}
2134 
2135 	iter = uu_zalloc(sizeof (*iter));
2136 	if (iter == NULL) {
2137 		(void) scf_set_error(SCF_ERROR_NO_MEMORY);
2138 		return (NULL);
2139 	}
2140 
2141 	uu_list_node_init(iter, &iter->iter_node, iter_pool);
2142 	iter->iter_handle = h;
2143 	iter->iter_sequence = 1;
2144 	iter->iter_type = REP_PROTOCOL_ENTITY_NONE;
2145 
2146 	(void) pthread_mutex_lock(&h->rh_lock);
2147 	iter->iter_id = handle_alloc_iterid(h);
2148 	if (iter->iter_id == 0) {
2149 		(void) pthread_mutex_unlock(&h->rh_lock);
2150 		uu_list_node_fini(iter, &iter->iter_node, iter_pool);
2151 		(void) scf_set_error(SCF_ERROR_NO_MEMORY);
2152 		uu_free(iter);
2153 		return (NULL);
2154 	}
2155 	if (iter_attach(iter) == -1) {
2156 		uu_list_node_fini(iter, &iter->iter_node, iter_pool);
2157 		(void) pthread_mutex_unlock(&h->rh_lock);
2158 		uu_free(iter);
2159 		return (NULL);
2160 	}
2161 	(void) uu_list_insert_before(h->rh_iters, NULL, iter);
2162 	h->rh_extrefs++;
2163 	(void) pthread_mutex_unlock(&h->rh_lock);
2164 	return (iter);
2165 }
2166 
2167 scf_handle_t *
2168 scf_iter_handle(const scf_iter_t *iter)
2169 {
2170 	return (handle_get(iter->iter_handle));
2171 }
2172 
2173 static void
2174 scf_iter_reset_locked(scf_iter_t *iter)
2175 {
2176 	struct rep_protocol_iter_request request;
2177 	struct rep_protocol_response response;
2178 
2179 	request.rpr_request = REP_PROTOCOL_ITER_RESET;
2180 	request.rpr_iterid = iter->iter_id;
2181 
2182 	assert(MUTEX_HELD(&iter->iter_handle->rh_lock));
2183 
2184 	(void) make_door_call(iter->iter_handle,
2185 	    &request, sizeof (request), &response, sizeof (response));
2186 
2187 	iter->iter_type = REP_PROTOCOL_ENTITY_NONE;
2188 	iter->iter_sequence = 1;
2189 }
2190 
2191 void
2192 scf_iter_reset(scf_iter_t *iter)
2193 {
2194 	(void) pthread_mutex_lock(&iter->iter_handle->rh_lock);
2195 	scf_iter_reset_locked(iter);
2196 	(void) pthread_mutex_unlock(&iter->iter_handle->rh_lock);
2197 }
2198 
2199 void
2200 scf_iter_destroy(scf_iter_t *iter)
2201 {
2202 	scf_handle_t *handle;
2203 
2204 	struct rep_protocol_iter_request request;
2205 	struct rep_protocol_response response;
2206 
2207 	if (iter == NULL)
2208 		return;
2209 
2210 	handle = iter->iter_handle;
2211 
2212 	(void) pthread_mutex_lock(&handle->rh_lock);
2213 	request.rpr_request = REP_PROTOCOL_ITER_TEARDOWN;
2214 	request.rpr_iterid = iter->iter_id;
2215 
2216 	(void) make_door_call(handle, &request, sizeof (request),
2217 	    &response, sizeof (response));
2218 
2219 	uu_list_remove(handle->rh_iters, iter);
2220 	--handle->rh_extrefs;
2221 	handle_unrefed(handle);			/* drops h->rh_lock */
2222 	iter->iter_handle = NULL;
2223 
2224 	uu_list_node_fini(iter, &iter->iter_node, iter_pool);
2225 	uu_free(iter);
2226 }
2227 
2228 static int
2229 handle_get_local_scope_locked(scf_handle_t *handle, scf_scope_t *out)
2230 {
2231 	struct rep_protocol_entity_get request;
2232 	struct rep_protocol_name_response response;
2233 	ssize_t r;
2234 
2235 	assert(MUTEX_HELD(&handle->rh_lock));
2236 
2237 	if (handle != out->rd_d.rd_handle)
2238 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
2239 
2240 	request.rpr_request = REP_PROTOCOL_ENTITY_GET;
2241 	request.rpr_entityid = out->rd_d.rd_entity;
2242 	request.rpr_object = RP_ENTITY_GET_MOST_LOCAL_SCOPE;
2243 
2244 	datael_finish_reset(&out->rd_d);
2245 	r = make_door_call(handle, &request, sizeof (request),
2246 	    &response, sizeof (response));
2247 
2248 	if (r < 0)
2249 		DOOR_ERRORS_BLOCK(r);
2250 
2251 	if (response.rpr_response != REP_PROTOCOL_SUCCESS)
2252 		return (scf_set_error(proto_error(response.rpr_response)));
2253 
2254 	return (SCF_SUCCESS);
2255 }
2256 
2257 int
2258 scf_iter_handle_scopes(scf_iter_t *iter, const scf_handle_t *handle)
2259 {
2260 	scf_handle_t *h = iter->iter_handle;
2261 	if (h != handle)
2262 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
2263 
2264 	(void) pthread_mutex_lock(&h->rh_lock);
2265 	scf_iter_reset_locked(iter);
2266 
2267 	if (!handle_is_bound(h)) {
2268 		(void) pthread_mutex_unlock(&h->rh_lock);
2269 		return (scf_set_error(SCF_ERROR_NOT_BOUND));
2270 	}
2271 
2272 	if (!handle_has_server_locked(h)) {
2273 		(void) pthread_mutex_unlock(&h->rh_lock);
2274 		return (scf_set_error(SCF_ERROR_CONNECTION_BROKEN));
2275 	}
2276 
2277 	iter->iter_type = REP_PROTOCOL_ENTITY_SCOPE;
2278 	iter->iter_sequence = 1;
2279 	(void) pthread_mutex_unlock(&h->rh_lock);
2280 	return (0);
2281 }
2282 
2283 int
2284 scf_iter_next_scope(scf_iter_t *iter, scf_scope_t *out)
2285 {
2286 	int ret;
2287 	scf_handle_t *h = iter->iter_handle;
2288 
2289 	if (h != out->rd_d.rd_handle)
2290 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
2291 
2292 	(void) pthread_mutex_lock(&h->rh_lock);
2293 	if (iter->iter_type == REP_PROTOCOL_ENTITY_NONE) {
2294 		(void) pthread_mutex_unlock(&h->rh_lock);
2295 		return (scf_set_error(SCF_ERROR_NOT_SET));
2296 	}
2297 	if (iter->iter_type != REP_PROTOCOL_ENTITY_SCOPE) {
2298 		(void) pthread_mutex_unlock(&h->rh_lock);
2299 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
2300 	}
2301 	if (iter->iter_sequence == 1) {
2302 		if ((ret = handle_get_local_scope_locked(h, out)) ==
2303 		    SCF_SUCCESS) {
2304 			iter->iter_sequence++;
2305 			ret = 1;
2306 		}
2307 	} else {
2308 		datael_reset_locked(&out->rd_d);
2309 		ret = 0;
2310 	}
2311 	(void) pthread_mutex_unlock(&h->rh_lock);
2312 	return (ret);
2313 }
2314 
2315 int
2316 scf_handle_get_scope(scf_handle_t *h, const char *name, scf_scope_t *out)
2317 {
2318 	int ret;
2319 
2320 	if (h != out->rd_d.rd_handle)
2321 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
2322 
2323 	(void) pthread_mutex_lock(&h->rh_lock);
2324 	if (strcmp(name, SCF_SCOPE_LOCAL) == 0) {
2325 		ret = handle_get_local_scope_locked(h, out);
2326 	} else {
2327 		datael_reset_locked(&out->rd_d);
2328 		if (uu_check_name(name, 0) == -1)
2329 			ret = scf_set_error(SCF_ERROR_INVALID_ARGUMENT);
2330 		else
2331 			ret = scf_set_error(SCF_ERROR_NOT_FOUND);
2332 	}
2333 	(void) pthread_mutex_unlock(&h->rh_lock);
2334 	return (ret);
2335 }
2336 
2337 static int
2338 datael_setup_iter(scf_iter_t *iter, const scf_datael_t *dp, uint32_t res_type,
2339     boolean_t composed)
2340 {
2341 	scf_handle_t *h = dp->rd_handle;
2342 
2343 	struct rep_protocol_iter_start request;
2344 	struct rep_protocol_response response;
2345 
2346 	ssize_t r;
2347 
2348 	if (h != iter->iter_handle)
2349 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
2350 
2351 	(void) pthread_mutex_lock(&h->rh_lock);
2352 	scf_iter_reset_locked(iter);
2353 	iter->iter_type = res_type;
2354 
2355 	request.rpr_request = REP_PROTOCOL_ITER_START;
2356 	request.rpr_iterid = iter->iter_id;
2357 	request.rpr_entity = dp->rd_entity;
2358 	request.rpr_itertype = res_type;
2359 	request.rpr_flags = RP_ITER_START_ALL |
2360 	    (composed ? RP_ITER_START_COMPOSED : 0);
2361 	request.rpr_pattern[0] = 0;
2362 
2363 	datael_finish_reset(dp);
2364 	r = make_door_call(h, &request, sizeof (request),
2365 	    &response, sizeof (response));
2366 
2367 	if (r < 0) {
2368 		(void) pthread_mutex_unlock(&h->rh_lock);
2369 		DOOR_ERRORS_BLOCK(r);
2370 	}
2371 	if (response.rpr_response != REP_PROTOCOL_SUCCESS) {
2372 		(void) pthread_mutex_unlock(&h->rh_lock);
2373 		return (scf_set_error(proto_error(response.rpr_response)));
2374 	}
2375 	iter->iter_sequence++;
2376 	(void) pthread_mutex_unlock(&h->rh_lock);
2377 	return (SCF_SUCCESS);
2378 }
2379 
2380 static int
2381 datael_setup_iter_pgtyped(scf_iter_t *iter, const scf_datael_t *dp,
2382     const char *pgtype, boolean_t composed)
2383 {
2384 	scf_handle_t *h = dp->rd_handle;
2385 
2386 	struct rep_protocol_iter_start request;
2387 	struct rep_protocol_response response;
2388 
2389 	ssize_t r;
2390 
2391 	if (h != iter->iter_handle)
2392 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
2393 
2394 	if (pgtype == NULL || strlcpy(request.rpr_pattern, pgtype,
2395 	    sizeof (request.rpr_pattern)) >= sizeof (request.rpr_pattern)) {
2396 		scf_iter_reset(iter);
2397 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
2398 	}
2399 
2400 	(void) pthread_mutex_lock(&h->rh_lock);
2401 	request.rpr_request = REP_PROTOCOL_ITER_START;
2402 	request.rpr_iterid = iter->iter_id;
2403 	request.rpr_entity = dp->rd_entity;
2404 	request.rpr_itertype = REP_PROTOCOL_ENTITY_PROPERTYGRP;
2405 	request.rpr_flags = RP_ITER_START_PGTYPE |
2406 	    (composed ? RP_ITER_START_COMPOSED : 0);
2407 
2408 	datael_finish_reset(dp);
2409 	scf_iter_reset_locked(iter);
2410 	iter->iter_type = REP_PROTOCOL_ENTITY_PROPERTYGRP;
2411 
2412 	r = make_door_call(h, &request, sizeof (request),
2413 	    &response, sizeof (response));
2414 
2415 	if (r < 0) {
2416 		(void) pthread_mutex_unlock(&h->rh_lock);
2417 
2418 		DOOR_ERRORS_BLOCK(r);
2419 	}
2420 	if (response.rpr_response != REP_PROTOCOL_SUCCESS) {
2421 		(void) pthread_mutex_unlock(&h->rh_lock);
2422 		return (scf_set_error(proto_error(response.rpr_response)));
2423 	}
2424 	iter->iter_sequence++;
2425 	(void) pthread_mutex_unlock(&h->rh_lock);
2426 	return (SCF_SUCCESS);
2427 }
2428 
2429 static int
2430 datael_iter_next(scf_iter_t *iter, scf_datael_t *out)
2431 {
2432 	scf_handle_t *h = iter->iter_handle;
2433 
2434 	struct rep_protocol_iter_read request;
2435 	struct rep_protocol_response response;
2436 	ssize_t r;
2437 
2438 	if (h != out->rd_handle)
2439 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
2440 
2441 	(void) pthread_mutex_lock(&h->rh_lock);
2442 	if (iter->iter_type == REP_PROTOCOL_ENTITY_NONE ||
2443 	    iter->iter_sequence == 1) {
2444 		(void) pthread_mutex_unlock(&h->rh_lock);
2445 		return (scf_set_error(SCF_ERROR_NOT_SET));
2446 	}
2447 
2448 	if (out->rd_type != iter->iter_type) {
2449 		(void) pthread_mutex_unlock(&h->rh_lock);
2450 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
2451 	}
2452 
2453 	request.rpr_request = REP_PROTOCOL_ITER_READ;
2454 	request.rpr_iterid = iter->iter_id;
2455 	request.rpr_sequence = iter->iter_sequence;
2456 	request.rpr_entityid = out->rd_entity;
2457 
2458 	datael_finish_reset(out);
2459 	r = make_door_call(h, &request, sizeof (request),
2460 	    &response, sizeof (response));
2461 
2462 	if (r < 0) {
2463 		(void) pthread_mutex_unlock(&h->rh_lock);
2464 		DOOR_ERRORS_BLOCK(r);
2465 	}
2466 
2467 	if (response.rpr_response == REP_PROTOCOL_DONE) {
2468 		(void) pthread_mutex_unlock(&h->rh_lock);
2469 		return (0);
2470 	}
2471 	if (response.rpr_response != REP_PROTOCOL_SUCCESS) {
2472 		(void) pthread_mutex_unlock(&h->rh_lock);
2473 		return (scf_set_error(proto_error(response.rpr_response)));
2474 	}
2475 	iter->iter_sequence++;
2476 	(void) pthread_mutex_unlock(&h->rh_lock);
2477 
2478 	return (1);
2479 }
2480 
2481 int
2482 scf_iter_scope_services(scf_iter_t *iter, const scf_scope_t *s)
2483 {
2484 	return (datael_setup_iter(iter, &s->rd_d,
2485 	    REP_PROTOCOL_ENTITY_SERVICE, 0));
2486 }
2487 
2488 int
2489 scf_iter_next_service(scf_iter_t *iter, scf_service_t *out)
2490 {
2491 	return (datael_iter_next(iter, &out->rd_d));
2492 }
2493 
2494 int
2495 scf_iter_service_instances(scf_iter_t *iter, const scf_service_t *svc)
2496 {
2497 	return (datael_setup_iter(iter, &svc->rd_d,
2498 	    REP_PROTOCOL_ENTITY_INSTANCE, 0));
2499 }
2500 
2501 int
2502 scf_iter_next_instance(scf_iter_t *iter, scf_instance_t *out)
2503 {
2504 	return (datael_iter_next(iter, &out->rd_d));
2505 }
2506 
2507 int
2508 scf_iter_service_pgs(scf_iter_t *iter, const scf_service_t *svc)
2509 {
2510 	return (datael_setup_iter(iter, &svc->rd_d,
2511 	    REP_PROTOCOL_ENTITY_PROPERTYGRP, 0));
2512 }
2513 
2514 int
2515 scf_iter_service_pgs_typed(scf_iter_t *iter, const scf_service_t *svc,
2516     const char *type)
2517 {
2518 	return (datael_setup_iter_pgtyped(iter, &svc->rd_d, type, 0));
2519 }
2520 
2521 int
2522 scf_iter_instance_snapshots(scf_iter_t *iter, const scf_instance_t *inst)
2523 {
2524 	return (datael_setup_iter(iter, &inst->rd_d,
2525 	    REP_PROTOCOL_ENTITY_SNAPSHOT, 0));
2526 }
2527 
2528 int
2529 scf_iter_next_snapshot(scf_iter_t *iter, scf_snapshot_t *out)
2530 {
2531 	return (datael_iter_next(iter, &out->rd_d));
2532 }
2533 
2534 int
2535 scf_iter_instance_pgs(scf_iter_t *iter, const scf_instance_t *inst)
2536 {
2537 	return (datael_setup_iter(iter, &inst->rd_d,
2538 	    REP_PROTOCOL_ENTITY_PROPERTYGRP, 0));
2539 }
2540 
2541 int
2542 scf_iter_instance_pgs_typed(scf_iter_t *iter, const scf_instance_t *inst,
2543     const char *type)
2544 {
2545 	return (datael_setup_iter_pgtyped(iter, &inst->rd_d, type, 0));
2546 }
2547 
2548 int
2549 scf_iter_instance_pgs_composed(scf_iter_t *iter, const scf_instance_t *inst,
2550     const scf_snapshot_t *snap)
2551 {
2552 	if (snap != NULL && inst->rd_d.rd_handle != snap->rd_d.rd_handle)
2553 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
2554 
2555 	return (datael_setup_iter(iter, snap ? &snap->rd_d : &inst->rd_d,
2556 	    REP_PROTOCOL_ENTITY_PROPERTYGRP, 1));
2557 }
2558 
2559 int
2560 scf_iter_instance_pgs_typed_composed(scf_iter_t *iter,
2561     const scf_instance_t *inst, const scf_snapshot_t *snap, const char *type)
2562 {
2563 	if (snap != NULL && inst->rd_d.rd_handle != snap->rd_d.rd_handle)
2564 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
2565 
2566 	return (datael_setup_iter_pgtyped(iter,
2567 	    snap ? &snap->rd_d : &inst->rd_d, type, 1));
2568 }
2569 
2570 int
2571 scf_iter_snaplevel_pgs(scf_iter_t *iter, const scf_snaplevel_t *inst)
2572 {
2573 	return (datael_setup_iter(iter, &inst->rd_d,
2574 	    REP_PROTOCOL_ENTITY_PROPERTYGRP, 0));
2575 }
2576 
2577 int
2578 scf_iter_snaplevel_pgs_typed(scf_iter_t *iter, const scf_snaplevel_t *inst,
2579     const char *type)
2580 {
2581 	return (datael_setup_iter_pgtyped(iter, &inst->rd_d, type, 0));
2582 }
2583 
2584 int
2585 scf_iter_next_pg(scf_iter_t *iter, scf_propertygroup_t *out)
2586 {
2587 	return (datael_iter_next(iter, &out->rd_d));
2588 }
2589 
2590 int
2591 scf_iter_pg_properties(scf_iter_t *iter, const scf_propertygroup_t *pg)
2592 {
2593 	return (datael_setup_iter(iter, &pg->rd_d,
2594 	    REP_PROTOCOL_ENTITY_PROPERTY, 0));
2595 }
2596 
2597 int
2598 scf_iter_next_property(scf_iter_t *iter, scf_property_t *out)
2599 {
2600 	return (datael_iter_next(iter, &out->rd_d));
2601 }
2602 
2603 /*
2604  * Fails with
2605  *   _INVALID_ARGUMENT - handle is NULL
2606  *   _INTERNAL - server response too big
2607  *		 entity already set up with different type
2608  *   _NO_RESOURCES
2609  *   _NO_MEMORY
2610  */
2611 scf_scope_t *
2612 scf_scope_create(scf_handle_t *handle)
2613 {
2614 	scf_scope_t *ret;
2615 
2616 	ret = uu_zalloc(sizeof (*ret));
2617 	if (ret != NULL) {
2618 		if (datael_init(&ret->rd_d, handle,
2619 		    REP_PROTOCOL_ENTITY_SCOPE) == -1) {
2620 			uu_free(ret);
2621 			return (NULL);
2622 		}
2623 	} else {
2624 		(void) scf_set_error(SCF_ERROR_NO_MEMORY);
2625 	}
2626 
2627 	return (ret);
2628 }
2629 
2630 scf_handle_t *
2631 scf_scope_handle(const scf_scope_t *val)
2632 {
2633 	return (datael_handle(&val->rd_d));
2634 }
2635 
2636 void
2637 scf_scope_destroy(scf_scope_t *val)
2638 {
2639 	if (val == NULL)
2640 		return;
2641 
2642 	datael_destroy(&val->rd_d);
2643 	uu_free(val);
2644 }
2645 
2646 ssize_t
2647 scf_scope_get_name(const scf_scope_t *rep, char *out, size_t len)
2648 {
2649 	return (datael_get_name(&rep->rd_d, out, len, RP_ENTITY_NAME_NAME));
2650 }
2651 
2652 /*ARGSUSED*/
2653 int
2654 scf_scope_get_parent(const scf_scope_t *child, scf_scope_t *parent)
2655 {
2656 	char name[1];
2657 
2658 	/* fake up the side-effects */
2659 	datael_reset(&parent->rd_d);
2660 	if (scf_scope_get_name(child, name, sizeof (name)) < 0)
2661 		return (-1);
2662 	return (scf_set_error(SCF_ERROR_NOT_FOUND));
2663 }
2664 
2665 /*
2666  * Fails with _INVALID_ARGUMENT (handle is NULL), _HANDLE_DESTROYED, _INTERNAL
2667  * (bad server response or id in use), _NO_RESOURCES, or _NO_MEMORY.
2668  */
2669 scf_service_t *
2670 scf_service_create(scf_handle_t *handle)
2671 {
2672 	scf_service_t *ret;
2673 	ret = uu_zalloc(sizeof (*ret));
2674 	if (ret != NULL) {
2675 		if (datael_init(&ret->rd_d, handle,
2676 		    REP_PROTOCOL_ENTITY_SERVICE) == -1) {
2677 			uu_free(ret);
2678 			return (NULL);
2679 		}
2680 	} else {
2681 		(void) scf_set_error(SCF_ERROR_NO_MEMORY);
2682 	}
2683 
2684 	return (ret);
2685 }
2686 
2687 
2688 /*
2689  * Fails with
2690  *   _HANDLE_MISMATCH
2691  *   _INVALID_ARGUMENT
2692  *   _NOT_BOUND
2693  *   _CONNECTION_BROKEN
2694  *   _INTERNAL
2695  *   _EXISTS
2696  *   _DELETED
2697  *   _NOT_SET
2698  *   _NO_RESOURCES
2699  *   _PERMISSION_DENIED
2700  *   _BACKEND_ACCESS
2701  *   _BACKEND_READONLY
2702  */
2703 int
2704 scf_scope_add_service(const scf_scope_t *scope, const char *name,
2705     scf_service_t *svc)
2706 {
2707 	return (datael_add_child(&scope->rd_d, name,
2708 	    REP_PROTOCOL_ENTITY_SERVICE, (svc != NULL)? &svc->rd_d : NULL));
2709 }
2710 
2711 /*
2712  * Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
2713  * _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
2714  * _BACKEND_ACCESS, _NOT_FOUND.
2715  */
2716 int
2717 scf_scope_get_service(const scf_scope_t *s, const char *name,
2718     scf_service_t *svc)
2719 {
2720 	return (datael_get_child(&s->rd_d, name, REP_PROTOCOL_ENTITY_SERVICE,
2721 	    svc ? &svc->rd_d : NULL, 0));
2722 }
2723 
2724 scf_handle_t *
2725 scf_service_handle(const scf_service_t *val)
2726 {
2727 	return (datael_handle(&val->rd_d));
2728 }
2729 
2730 int
2731 scf_service_delete(scf_service_t *svc)
2732 {
2733 	return (datael_delete(&svc->rd_d));
2734 }
2735 
2736 int
2737 scf_instance_delete(scf_instance_t *inst)
2738 {
2739 	return (datael_delete(&inst->rd_d));
2740 }
2741 
2742 int
2743 scf_pg_delete(scf_propertygroup_t *pg)
2744 {
2745 	return (datael_delete(&pg->rd_d));
2746 }
2747 
2748 int
2749 _scf_snapshot_delete(scf_snapshot_t *snap)
2750 {
2751 	return (datael_delete(&snap->rd_d));
2752 }
2753 
2754 /*
2755  * Fails with
2756  *   _HANDLE_MISMATCH
2757  *   _INVALID_ARGUMENT
2758  *   _NOT_BOUND
2759  *   _CONNECTION_BROKEN
2760  *   _INTERNAL
2761  *   _EXISTS
2762  *   _DELETED
2763  *   _NOT_SET
2764  *   _NO_RESOURCES
2765  *   _PERMISSION_DENIED
2766  *   _BACKEND_ACCESS
2767  *   _BACKEND_READONLY
2768  */
2769 int
2770 scf_service_add_instance(const scf_service_t *svc, const char *name,
2771     scf_instance_t *instance)
2772 {
2773 	return (datael_add_child(&svc->rd_d, name,
2774 	    REP_PROTOCOL_ENTITY_INSTANCE,
2775 	    (instance != NULL)? &instance->rd_d : NULL));
2776 }
2777 
2778 
2779 /*
2780  * Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
2781  * _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
2782  * _BACKEND_ACCESS, _NOT_FOUND.
2783  */
2784 int
2785 scf_service_get_instance(const scf_service_t *svc, const char *name,
2786     scf_instance_t *inst)
2787 {
2788 	return (datael_get_child(&svc->rd_d, name, REP_PROTOCOL_ENTITY_INSTANCE,
2789 	    inst ? &inst->rd_d : NULL, 0));
2790 }
2791 
2792 int
2793 scf_service_add_pg(const scf_service_t *svc, const char *name,
2794     const char *type, uint32_t flags, scf_propertygroup_t *pg)
2795 {
2796 	return (datael_add_pg(&svc->rd_d, name, type, flags,
2797 	    (pg != NULL)?&pg->rd_d : NULL));
2798 }
2799 
2800 /*
2801  * Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
2802  * _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
2803  * _BACKEND_ACCESS, _NOT_FOUND.
2804  */
2805 int
2806 scf_service_get_pg(const scf_service_t *svc, const char *name,
2807     scf_propertygroup_t *pg)
2808 {
2809 	return (datael_get_child(&svc->rd_d, name,
2810 	    REP_PROTOCOL_ENTITY_PROPERTYGRP, pg ? &pg->rd_d : NULL, 0));
2811 }
2812 
2813 int
2814 scf_instance_add_pg(const scf_instance_t *inst, const char *name,
2815     const char *type, uint32_t flags, scf_propertygroup_t *pg)
2816 {
2817 	return (datael_add_pg(&inst->rd_d, name, type, flags,
2818 	    (pg != NULL)?&pg->rd_d : NULL));
2819 }
2820 
2821 /*
2822  * Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
2823  * _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
2824  * _BACKEND_ACCESS, _NOT_FOUND.
2825  */
2826 int
2827 scf_instance_get_snapshot(const scf_instance_t *inst, const char *name,
2828     scf_snapshot_t *pg)
2829 {
2830 	return (datael_get_child(&inst->rd_d, name,
2831 	    REP_PROTOCOL_ENTITY_SNAPSHOT, pg ? &pg->rd_d : NULL, 0));
2832 }
2833 
2834 /*
2835  * Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
2836  * _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
2837  * _BACKEND_ACCESS, _NOT_FOUND.
2838  */
2839 int
2840 scf_instance_get_pg(const scf_instance_t *inst, const char *name,
2841     scf_propertygroup_t *pg)
2842 {
2843 	return (datael_get_child(&inst->rd_d, name,
2844 	    REP_PROTOCOL_ENTITY_PROPERTYGRP, pg ? &pg->rd_d : NULL, 0));
2845 }
2846 
2847 /*
2848  * Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
2849  * _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
2850  * _BACKEND_ACCESS, _NOT_FOUND.
2851  */
2852 int
2853 scf_instance_get_pg_composed(const scf_instance_t *inst,
2854     const scf_snapshot_t *snap, const char *name, scf_propertygroup_t *pg)
2855 {
2856 	if (snap != NULL && inst->rd_d.rd_handle != snap->rd_d.rd_handle)
2857 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
2858 
2859 	return (datael_get_child(snap ? &snap->rd_d : &inst->rd_d, name,
2860 	    REP_PROTOCOL_ENTITY_PROPERTYGRP, pg ? &pg->rd_d : NULL, 1));
2861 }
2862 
2863 /*
2864  * Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
2865  * _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
2866  * _BACKEND_ACCESS, _NOT_FOUND.
2867  */
2868 int
2869 scf_pg_get_property(const scf_propertygroup_t *pg, const char *name,
2870     scf_property_t *prop)
2871 {
2872 	return (datael_get_child(&pg->rd_d, name, REP_PROTOCOL_ENTITY_PROPERTY,
2873 	    prop ? &prop->rd_d : NULL, 0));
2874 }
2875 
2876 void
2877 scf_service_destroy(scf_service_t *val)
2878 {
2879 	if (val == NULL)
2880 		return;
2881 
2882 	datael_destroy(&val->rd_d);
2883 	uu_free(val);
2884 }
2885 
2886 ssize_t
2887 scf_service_get_name(const scf_service_t *rep, char *out, size_t len)
2888 {
2889 	return (datael_get_name(&rep->rd_d, out, len, RP_ENTITY_NAME_NAME));
2890 }
2891 
2892 /*
2893  * Fails with _INVALID_ARGUMENT (handle is NULL), _HANDLE_DESTROYED, _INTERNAL
2894  * (bad server response or id in use), _NO_RESOURCES, or _NO_MEMORY.
2895  */
2896 scf_instance_t *
2897 scf_instance_create(scf_handle_t *handle)
2898 {
2899 	scf_instance_t *ret;
2900 
2901 	ret = uu_zalloc(sizeof (*ret));
2902 	if (ret != NULL) {
2903 		if (datael_init(&ret->rd_d, handle,
2904 		    REP_PROTOCOL_ENTITY_INSTANCE) == -1) {
2905 			uu_free(ret);
2906 			return (NULL);
2907 		}
2908 	} else {
2909 		(void) scf_set_error(SCF_ERROR_NO_MEMORY);
2910 	}
2911 
2912 	return (ret);
2913 }
2914 
2915 scf_handle_t *
2916 scf_instance_handle(const scf_instance_t *val)
2917 {
2918 	return (datael_handle(&val->rd_d));
2919 }
2920 
2921 void
2922 scf_instance_destroy(scf_instance_t *val)
2923 {
2924 	if (val == NULL)
2925 		return;
2926 
2927 	datael_destroy(&val->rd_d);
2928 	uu_free(val);
2929 }
2930 
2931 ssize_t
2932 scf_instance_get_name(const scf_instance_t *rep, char *out, size_t len)
2933 {
2934 	return (datael_get_name(&rep->rd_d, out, len, RP_ENTITY_NAME_NAME));
2935 }
2936 
2937 /*
2938  * Fails with _INVALID_ARGUMENT (handle is NULL), _HANDLE_DESTROYED, _INTERNAL
2939  * (bad server response or id in use), _NO_RESOURCES, or _NO_MEMORY.
2940  */
2941 scf_snapshot_t *
2942 scf_snapshot_create(scf_handle_t *handle)
2943 {
2944 	scf_snapshot_t *ret;
2945 
2946 	ret = uu_zalloc(sizeof (*ret));
2947 	if (ret != NULL) {
2948 		if (datael_init(&ret->rd_d, handle,
2949 		    REP_PROTOCOL_ENTITY_SNAPSHOT) == -1) {
2950 			uu_free(ret);
2951 			return (NULL);
2952 		}
2953 	} else {
2954 		(void) scf_set_error(SCF_ERROR_NO_MEMORY);
2955 	}
2956 
2957 	return (ret);
2958 }
2959 
2960 scf_handle_t *
2961 scf_snapshot_handle(const scf_snapshot_t *val)
2962 {
2963 	return (datael_handle(&val->rd_d));
2964 }
2965 
2966 void
2967 scf_snapshot_destroy(scf_snapshot_t *val)
2968 {
2969 	if (val == NULL)
2970 		return;
2971 
2972 	datael_destroy(&val->rd_d);
2973 	uu_free(val);
2974 }
2975 
2976 ssize_t
2977 scf_snapshot_get_name(const scf_snapshot_t *rep, char *out, size_t len)
2978 {
2979 	return (datael_get_name(&rep->rd_d, out, len, RP_ENTITY_NAME_NAME));
2980 }
2981 
2982 /*
2983  * Fails with _INVALID_ARGUMENT (handle is NULL), _HANDLE_DESTROYED, _INTERNAL
2984  * (bad server response or id in use), _NO_RESOURCES, _NO_MEMORY.
2985  */
2986 scf_snaplevel_t *
2987 scf_snaplevel_create(scf_handle_t *handle)
2988 {
2989 	scf_snaplevel_t *ret;
2990 
2991 	ret = uu_zalloc(sizeof (*ret));
2992 	if (ret != NULL) {
2993 		if (datael_init(&ret->rd_d, handle,
2994 		    REP_PROTOCOL_ENTITY_SNAPLEVEL) == -1) {
2995 			uu_free(ret);
2996 			return (NULL);
2997 		}
2998 	} else {
2999 		(void) scf_set_error(SCF_ERROR_NO_MEMORY);
3000 	}
3001 
3002 	return (ret);
3003 }
3004 
3005 scf_handle_t *
3006 scf_snaplevel_handle(const scf_snaplevel_t *val)
3007 {
3008 	return (datael_handle(&val->rd_d));
3009 }
3010 
3011 void
3012 scf_snaplevel_destroy(scf_snaplevel_t *val)
3013 {
3014 	if (val == NULL)
3015 		return;
3016 
3017 	datael_destroy(&val->rd_d);
3018 	uu_free(val);
3019 }
3020 
3021 ssize_t
3022 scf_snaplevel_get_scope_name(const scf_snaplevel_t *rep, char *out, size_t len)
3023 {
3024 	return (datael_get_name(&rep->rd_d, out, len,
3025 	    RP_ENTITY_NAME_SNAPLEVEL_SCOPE));
3026 }
3027 
3028 ssize_t
3029 scf_snaplevel_get_service_name(const scf_snaplevel_t *rep, char *out,
3030     size_t len)
3031 {
3032 	return (datael_get_name(&rep->rd_d, out, len,
3033 	    RP_ENTITY_NAME_SNAPLEVEL_SERVICE));
3034 }
3035 
3036 ssize_t
3037 scf_snaplevel_get_instance_name(const scf_snaplevel_t *rep, char *out,
3038     size_t len)
3039 {
3040 	return (datael_get_name(&rep->rd_d, out, len,
3041 	    RP_ENTITY_NAME_SNAPLEVEL_INSTANCE));
3042 }
3043 
3044 /*
3045  * Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
3046  * _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
3047  * _BACKEND_ACCESS, _NOT_FOUND.
3048  */
3049 int
3050 scf_snaplevel_get_pg(const scf_snaplevel_t *snap, const char *name,
3051     scf_propertygroup_t *pg)
3052 {
3053 	return (datael_get_child(&snap->rd_d, name,
3054 	    REP_PROTOCOL_ENTITY_PROPERTYGRP, pg ? &pg->rd_d : NULL, 0));
3055 }
3056 
3057 static int
3058 snaplevel_next(const scf_datael_t *src, scf_snaplevel_t *dst_arg)
3059 {
3060 	scf_handle_t *h = src->rd_handle;
3061 	scf_snaplevel_t *dst = dst_arg;
3062 	struct rep_protocol_entity_pair request;
3063 	struct rep_protocol_response response;
3064 	int r;
3065 	int dups = 0;
3066 
3067 	if (h != dst->rd_d.rd_handle)
3068 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
3069 
3070 	if (src == &dst->rd_d) {
3071 		dups = 1;
3072 		dst = HANDLE_HOLD_SNAPLVL(h);
3073 	}
3074 	(void) pthread_mutex_lock(&h->rh_lock);
3075 	request.rpr_request = REP_PROTOCOL_NEXT_SNAPLEVEL;
3076 	request.rpr_entity_src = src->rd_entity;
3077 	request.rpr_entity_dst = dst->rd_d.rd_entity;
3078 
3079 	datael_finish_reset(src);
3080 	datael_finish_reset(&dst->rd_d);
3081 	r = make_door_call(h, &request, sizeof (request),
3082 	    &response, sizeof (response));
3083 	/*
3084 	 * if we succeeded, we need to swap dst and dst_arg's identity.  We
3085 	 * take advantage of the fact that the only in-library knowledge is
3086 	 * their entity ids.
3087 	 */
3088 	if (dups && r >= 0 &&
3089 	    (response.rpr_response == REP_PROTOCOL_SUCCESS ||
3090 	    response.rpr_response == REP_PROTOCOL_DONE)) {
3091 		int entity = dst->rd_d.rd_entity;
3092 
3093 		dst->rd_d.rd_entity = dst_arg->rd_d.rd_entity;
3094 		dst_arg->rd_d.rd_entity = entity;
3095 	}
3096 	(void) pthread_mutex_unlock(&h->rh_lock);
3097 
3098 	if (dups)
3099 		HANDLE_RELE_SNAPLVL(h);
3100 
3101 	if (r < 0)
3102 		DOOR_ERRORS_BLOCK(r);
3103 
3104 	if (response.rpr_response != REP_PROTOCOL_SUCCESS &&
3105 	    response.rpr_response != REP_PROTOCOL_DONE) {
3106 		return (scf_set_error(proto_error(response.rpr_response)));
3107 	}
3108 
3109 	return (response.rpr_response == REP_PROTOCOL_SUCCESS) ?
3110 	    SCF_SUCCESS : SCF_COMPLETE;
3111 }
3112 
3113 int scf_snapshot_get_base_snaplevel(const scf_snapshot_t *base,
3114     scf_snaplevel_t *out)
3115 {
3116 	return (snaplevel_next(&base->rd_d, out));
3117 }
3118 
3119 int scf_snaplevel_get_next_snaplevel(const scf_snaplevel_t *base,
3120     scf_snaplevel_t *out)
3121 {
3122 	return (snaplevel_next(&base->rd_d, out));
3123 }
3124 
3125 /*
3126  * Fails with _INVALID_ARGUMENT (handle is NULL), _HANDLE_DESTROYED, _INTERNAL
3127  * (bad server response or id in use), _NO_RESOURCES, or _NO_MEMORY.
3128  */
3129 scf_propertygroup_t *
3130 scf_pg_create(scf_handle_t *handle)
3131 {
3132 	scf_propertygroup_t *ret;
3133 	ret = uu_zalloc(sizeof (*ret));
3134 	if (ret != NULL) {
3135 		if (datael_init(&ret->rd_d, handle,
3136 		    REP_PROTOCOL_ENTITY_PROPERTYGRP) == -1) {
3137 			uu_free(ret);
3138 			return (NULL);
3139 		}
3140 	} else {
3141 		(void) scf_set_error(SCF_ERROR_NO_MEMORY);
3142 	}
3143 
3144 	return (ret);
3145 }
3146 
3147 scf_handle_t *
3148 scf_pg_handle(const scf_propertygroup_t *val)
3149 {
3150 	return (datael_handle(&val->rd_d));
3151 }
3152 
3153 void
3154 scf_pg_destroy(scf_propertygroup_t *val)
3155 {
3156 	if (val == NULL)
3157 		return;
3158 
3159 	datael_destroy(&val->rd_d);
3160 	uu_free(val);
3161 }
3162 
3163 ssize_t
3164 scf_pg_get_name(const scf_propertygroup_t *pg,  char *out, size_t len)
3165 {
3166 	return (datael_get_name(&pg->rd_d, out, len, RP_ENTITY_NAME_NAME));
3167 }
3168 
3169 ssize_t
3170 scf_pg_get_type(const scf_propertygroup_t *pg,  char *out, size_t len)
3171 {
3172 	return (datael_get_name(&pg->rd_d, out, len, RP_ENTITY_NAME_PGTYPE));
3173 }
3174 
3175 int
3176 scf_pg_get_flags(const scf_propertygroup_t *pg, uint32_t *out)
3177 {
3178 	char buf[REP_PROTOCOL_NAME_LEN];
3179 	ssize_t res;
3180 
3181 	res = datael_get_name(&pg->rd_d, buf, sizeof (buf),
3182 	    RP_ENTITY_NAME_PGFLAGS);
3183 
3184 	if (res == -1)
3185 		return (-1);
3186 
3187 	if (uu_strtouint(buf, out, sizeof (*out), 0, 0, UINT32_MAX) == -1)
3188 		return (scf_set_error(SCF_ERROR_INTERNAL));
3189 
3190 	return (0);
3191 }
3192 
3193 static int
3194 datael_update(scf_datael_t *dp)
3195 {
3196 	scf_handle_t *h = dp->rd_handle;
3197 
3198 	struct rep_protocol_entity_update request;
3199 	struct rep_protocol_response response;
3200 
3201 	int r;
3202 
3203 	(void) pthread_mutex_lock(&h->rh_lock);
3204 	request.rpr_request = REP_PROTOCOL_ENTITY_UPDATE;
3205 	request.rpr_entityid = dp->rd_entity;
3206 
3207 	datael_finish_reset(dp);
3208 	request.rpr_changeid = handle_next_changeid(h);
3209 
3210 	r = make_door_call(h, &request, sizeof (request),
3211 	    &response, sizeof (response));
3212 	(void) pthread_mutex_unlock(&h->rh_lock);
3213 
3214 	if (r < 0)
3215 		DOOR_ERRORS_BLOCK(r);
3216 
3217 	/*
3218 	 * This should never happen but if it does something has
3219 	 * gone terribly wrong and we should abort.
3220 	 */
3221 	if (response.rpr_response == REP_PROTOCOL_FAIL_BAD_REQUEST)
3222 		abort();
3223 
3224 	if (response.rpr_response != REP_PROTOCOL_SUCCESS &&
3225 	    response.rpr_response != REP_PROTOCOL_DONE) {
3226 		return (scf_set_error(proto_error(response.rpr_response)));
3227 	}
3228 
3229 	return (response.rpr_response == REP_PROTOCOL_SUCCESS) ?
3230 	    SCF_SUCCESS : SCF_COMPLETE;
3231 }
3232 
3233 int
3234 scf_pg_update(scf_propertygroup_t *pg)
3235 {
3236 	return (datael_update(&pg->rd_d));
3237 }
3238 
3239 int
3240 scf_snapshot_update(scf_snapshot_t *snap)
3241 {
3242 	return (datael_update(&snap->rd_d));
3243 }
3244 
3245 int
3246 _scf_pg_wait(scf_propertygroup_t *pg, int timeout)
3247 {
3248 	scf_handle_t *h = pg->rd_d.rd_handle;
3249 
3250 	struct rep_protocol_propertygrp_request request;
3251 	struct rep_protocol_response response;
3252 
3253 	struct pollfd pollfd;
3254 
3255 	int r;
3256 
3257 	(void) pthread_mutex_lock(&h->rh_lock);
3258 	request.rpr_request = REP_PROTOCOL_PROPERTYGRP_SETUP_WAIT;
3259 	request.rpr_entityid = pg->rd_d.rd_entity;
3260 
3261 	datael_finish_reset(&pg->rd_d);
3262 	if (!handle_is_bound(h)) {
3263 		(void) pthread_mutex_unlock(&h->rh_lock);
3264 		return (scf_set_error(SCF_ERROR_CONNECTION_BROKEN));
3265 	}
3266 	r = make_door_call_retfd(h->rh_doorfd, &request, sizeof (request),
3267 	    &response, sizeof (response), &pollfd.fd);
3268 	(void) pthread_mutex_unlock(&h->rh_lock);
3269 
3270 	if (r < 0)
3271 		DOOR_ERRORS_BLOCK(r);
3272 
3273 	assert((response.rpr_response == REP_PROTOCOL_SUCCESS) ==
3274 	    (pollfd.fd != -1));
3275 
3276 	if (response.rpr_response == REP_PROTOCOL_FAIL_NOT_LATEST)
3277 		return (SCF_SUCCESS);
3278 
3279 	if (response.rpr_response != REP_PROTOCOL_SUCCESS)
3280 		return (scf_set_error(proto_error(response.rpr_response)));
3281 
3282 	pollfd.events = 0;
3283 	pollfd.revents = 0;
3284 
3285 	r = poll(&pollfd, 1, timeout * MILLISEC);
3286 
3287 	(void) close(pollfd.fd);
3288 	return (pollfd.revents ? SCF_SUCCESS : SCF_COMPLETE);
3289 }
3290 
3291 static int
3292 scf_notify_add_pattern(scf_handle_t *h, int type, const char *name)
3293 {
3294 	struct rep_protocol_notify_request request;
3295 	struct rep_protocol_response response;
3296 	int r;
3297 
3298 	(void) pthread_mutex_lock(&h->rh_lock);
3299 	request.rpr_request = REP_PROTOCOL_CLIENT_ADD_NOTIFY;
3300 	request.rpr_type = type;
3301 	(void) strlcpy(request.rpr_pattern, name, sizeof (request.rpr_pattern));
3302 
3303 	r = make_door_call(h, &request, sizeof (request),
3304 	    &response, sizeof (response));
3305 	(void) pthread_mutex_unlock(&h->rh_lock);
3306 
3307 	if (r < 0)
3308 		DOOR_ERRORS_BLOCK(r);
3309 
3310 	if (response.rpr_response != REP_PROTOCOL_SUCCESS)
3311 		return (scf_set_error(proto_error(response.rpr_response)));
3312 
3313 	return (SCF_SUCCESS);
3314 }
3315 
3316 int
3317 _scf_notify_add_pgname(scf_handle_t *h, const char *name)
3318 {
3319 	return (scf_notify_add_pattern(h, REP_PROTOCOL_NOTIFY_PGNAME, name));
3320 }
3321 
3322 int
3323 _scf_notify_add_pgtype(scf_handle_t *h, const char *type)
3324 {
3325 	return (scf_notify_add_pattern(h, REP_PROTOCOL_NOTIFY_PGTYPE, type));
3326 }
3327 
3328 int
3329 _scf_notify_wait(scf_propertygroup_t *pg, char *out, size_t sz)
3330 {
3331 	struct rep_protocol_wait_request request;
3332 	struct rep_protocol_fmri_response response;
3333 
3334 	scf_handle_t *h = pg->rd_d.rd_handle;
3335 	int dummy;
3336 	int fd;
3337 	int r;
3338 
3339 	(void) pthread_mutex_lock(&h->rh_lock);
3340 	datael_finish_reset(&pg->rd_d);
3341 	if (!handle_is_bound(h)) {
3342 		(void) pthread_mutex_unlock(&h->rh_lock);
3343 		return (scf_set_error(SCF_ERROR_CONNECTION_BROKEN));
3344 	}
3345 	fd = h->rh_doorfd;
3346 	++h->rh_fd_users;
3347 	assert(h->rh_fd_users > 0);
3348 
3349 	request.rpr_request = REP_PROTOCOL_CLIENT_WAIT;
3350 	request.rpr_entityid = pg->rd_d.rd_entity;
3351 	(void) pthread_mutex_unlock(&h->rh_lock);
3352 
3353 	r = make_door_call_retfd(fd, &request, sizeof (request),
3354 	    &response, sizeof (response), &dummy);
3355 
3356 	(void) pthread_mutex_lock(&h->rh_lock);
3357 	assert(h->rh_fd_users > 0);
3358 	if (--h->rh_fd_users == 0) {
3359 		(void) pthread_cond_broadcast(&h->rh_cv);
3360 		/*
3361 		 * check for a delayed close, now that there are no other
3362 		 * users.
3363 		 */
3364 		if (h->rh_doorfd_old != -1) {
3365 			assert(h->rh_doorfd == -1);
3366 			assert(fd == h->rh_doorfd_old);
3367 			(void) close(h->rh_doorfd_old);
3368 			h->rh_doorfd_old = -1;
3369 		}
3370 	}
3371 	handle_unrefed(h);			/* drops h->rh_lock */
3372 
3373 	if (r < 0)
3374 		DOOR_ERRORS_BLOCK(r);
3375 
3376 	if (response.rpr_response == REP_PROTOCOL_DONE)
3377 		return (scf_set_error(SCF_ERROR_NOT_SET));
3378 
3379 	if (response.rpr_response != REP_PROTOCOL_SUCCESS)
3380 		return (scf_set_error(proto_error(response.rpr_response)));
3381 
3382 	/* the following will be non-zero for delete notifications */
3383 	return (strlcpy(out, response.rpr_fmri, sz));
3384 }
3385 
3386 static int
3387 _scf_snapshot_take(scf_instance_t *inst, const char *name,
3388     scf_snapshot_t *snap, int flags)
3389 {
3390 	scf_handle_t *h = inst->rd_d.rd_handle;
3391 
3392 	struct rep_protocol_snapshot_take request;
3393 	struct rep_protocol_response response;
3394 
3395 	int r;
3396 
3397 	if (h != snap->rd_d.rd_handle)
3398 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
3399 
3400 	if (strlcpy(request.rpr_name, (name != NULL)? name : "",
3401 	    sizeof (request.rpr_name)) >= sizeof (request.rpr_name))
3402 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
3403 
3404 	(void) pthread_mutex_lock(&h->rh_lock);
3405 	request.rpr_request = REP_PROTOCOL_SNAPSHOT_TAKE;
3406 	request.rpr_entityid_src = inst->rd_d.rd_entity;
3407 	request.rpr_entityid_dest = snap->rd_d.rd_entity;
3408 	request.rpr_flags = flags;
3409 
3410 	datael_finish_reset(&inst->rd_d);
3411 	datael_finish_reset(&snap->rd_d);
3412 
3413 	r = make_door_call(h, &request, sizeof (request),
3414 	    &response, sizeof (response));
3415 	(void) pthread_mutex_unlock(&h->rh_lock);
3416 
3417 	if (r < 0)
3418 		DOOR_ERRORS_BLOCK(r);
3419 
3420 	if (response.rpr_response != REP_PROTOCOL_SUCCESS)
3421 		return (scf_set_error(proto_error(response.rpr_response)));
3422 
3423 	return (SCF_SUCCESS);
3424 }
3425 
3426 int
3427 _scf_snapshot_take_new_named(scf_instance_t *inst,
3428     const char *svcname, const char *instname, const char *snapname,
3429     scf_snapshot_t *snap)
3430 {
3431 	scf_handle_t *h = inst->rd_d.rd_handle;
3432 
3433 	struct rep_protocol_snapshot_take_named request;
3434 	struct rep_protocol_response response;
3435 
3436 	int r;
3437 
3438 	if (h != snap->rd_d.rd_handle)
3439 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
3440 
3441 	if (strlcpy(request.rpr_svcname, svcname,
3442 	    sizeof (request.rpr_svcname)) >= sizeof (request.rpr_svcname))
3443 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
3444 
3445 	if (strlcpy(request.rpr_instname, instname,
3446 	    sizeof (request.rpr_instname)) >= sizeof (request.rpr_instname))
3447 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
3448 
3449 	if (strlcpy(request.rpr_name, snapname,
3450 	    sizeof (request.rpr_name)) >= sizeof (request.rpr_name))
3451 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
3452 
3453 	(void) pthread_mutex_lock(&h->rh_lock);
3454 	request.rpr_request = REP_PROTOCOL_SNAPSHOT_TAKE_NAMED;
3455 	request.rpr_entityid_src = inst->rd_d.rd_entity;
3456 	request.rpr_entityid_dest = snap->rd_d.rd_entity;
3457 
3458 	datael_finish_reset(&inst->rd_d);
3459 	datael_finish_reset(&snap->rd_d);
3460 
3461 	r = make_door_call(h, &request, sizeof (request),
3462 	    &response, sizeof (response));
3463 	(void) pthread_mutex_unlock(&h->rh_lock);
3464 
3465 	if (r < 0)
3466 		DOOR_ERRORS_BLOCK(r);
3467 
3468 	if (response.rpr_response != REP_PROTOCOL_SUCCESS) {
3469 		assert(response.rpr_response !=
3470 		    REP_PROTOCOL_FAIL_TYPE_MISMATCH);
3471 		return (scf_set_error(proto_error(response.rpr_response)));
3472 	}
3473 
3474 	return (SCF_SUCCESS);
3475 }
3476 
3477 int
3478 _scf_snapshot_take_new(scf_instance_t *inst, const char *name,
3479     scf_snapshot_t *snap)
3480 {
3481 	return (_scf_snapshot_take(inst, name, snap, REP_SNAPSHOT_NEW));
3482 }
3483 
3484 int
3485 _scf_snapshot_take_attach(scf_instance_t *inst, scf_snapshot_t *snap)
3486 {
3487 	return (_scf_snapshot_take(inst, NULL, snap, REP_SNAPSHOT_ATTACH));
3488 }
3489 
3490 int
3491 _scf_snapshot_attach(scf_snapshot_t *src, scf_snapshot_t *dest)
3492 {
3493 	scf_handle_t *h = dest->rd_d.rd_handle;
3494 
3495 	struct rep_protocol_snapshot_attach request;
3496 	struct rep_protocol_response response;
3497 
3498 	int r;
3499 
3500 	if (h != src->rd_d.rd_handle)
3501 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
3502 
3503 	(void) pthread_mutex_lock(&h->rh_lock);
3504 	request.rpr_request = REP_PROTOCOL_SNAPSHOT_ATTACH;
3505 	request.rpr_entityid_src = src->rd_d.rd_entity;
3506 	request.rpr_entityid_dest = dest->rd_d.rd_entity;
3507 
3508 	datael_finish_reset(&src->rd_d);
3509 	datael_finish_reset(&dest->rd_d);
3510 
3511 	r = make_door_call(h, &request, sizeof (request),
3512 	    &response, sizeof (response));
3513 	(void) pthread_mutex_unlock(&h->rh_lock);
3514 
3515 	if (r < 0)
3516 		DOOR_ERRORS_BLOCK(r);
3517 
3518 	if (response.rpr_response != REP_PROTOCOL_SUCCESS)
3519 		return (scf_set_error(proto_error(response.rpr_response)));
3520 
3521 	return (SCF_SUCCESS);
3522 }
3523 
3524 /*
3525  * Fails with _INVALID_ARGUMENT (handle is NULL), _HANDLE_DESTROYED, _INTERNAL
3526  * (bad server response or id in use), _NO_RESOURCES, or _NO_MEMORY.
3527  */
3528 scf_property_t *
3529 scf_property_create(scf_handle_t *handle)
3530 {
3531 	scf_property_t *ret;
3532 	ret = uu_zalloc(sizeof (*ret));
3533 	if (ret != NULL) {
3534 		if (datael_init(&ret->rd_d, handle,
3535 		    REP_PROTOCOL_ENTITY_PROPERTY) == -1) {
3536 			uu_free(ret);
3537 			return (NULL);
3538 		}
3539 	} else {
3540 		(void) scf_set_error(SCF_ERROR_NO_MEMORY);
3541 	}
3542 
3543 	return (ret);
3544 }
3545 
3546 scf_handle_t *
3547 scf_property_handle(const scf_property_t *val)
3548 {
3549 	return (datael_handle(&val->rd_d));
3550 }
3551 
3552 void
3553 scf_property_destroy(scf_property_t *val)
3554 {
3555 	if (val == NULL)
3556 		return;
3557 
3558 	datael_destroy(&val->rd_d);
3559 	uu_free(val);
3560 }
3561 
3562 static int
3563 property_type_locked(const scf_property_t *prop,
3564     rep_protocol_value_type_t *out)
3565 {
3566 	scf_handle_t *h = prop->rd_d.rd_handle;
3567 
3568 	struct rep_protocol_property_request request;
3569 	struct rep_protocol_integer_response response;
3570 
3571 	int r;
3572 
3573 	assert(MUTEX_HELD(&h->rh_lock));
3574 
3575 	request.rpr_request = REP_PROTOCOL_PROPERTY_GET_TYPE;
3576 	request.rpr_entityid = prop->rd_d.rd_entity;
3577 
3578 	datael_finish_reset(&prop->rd_d);
3579 	r = make_door_call(h, &request, sizeof (request),
3580 	    &response, sizeof (response));
3581 
3582 	if (r < 0)
3583 		DOOR_ERRORS_BLOCK(r);
3584 
3585 	if (response.rpr_response != REP_PROTOCOL_SUCCESS ||
3586 	    r < sizeof (response)) {
3587 		return (scf_set_error(proto_error(response.rpr_response)));
3588 	}
3589 	*out = response.rpr_value;
3590 	return (SCF_SUCCESS);
3591 }
3592 
3593 int
3594 scf_property_type(const scf_property_t *prop, scf_type_t *out)
3595 {
3596 	scf_handle_t *h = prop->rd_d.rd_handle;
3597 	rep_protocol_value_type_t out_raw;
3598 	int ret;
3599 
3600 	(void) pthread_mutex_lock(&h->rh_lock);
3601 	ret = property_type_locked(prop, &out_raw);
3602 	(void) pthread_mutex_unlock(&h->rh_lock);
3603 
3604 	if (ret == SCF_SUCCESS)
3605 		*out = scf_protocol_type_to_type(out_raw);
3606 
3607 	return (ret);
3608 }
3609 
3610 int
3611 scf_property_is_type(const scf_property_t *prop, scf_type_t base_arg)
3612 {
3613 	scf_handle_t *h = prop->rd_d.rd_handle;
3614 	rep_protocol_value_type_t base = scf_type_to_protocol_type(base_arg);
3615 	rep_protocol_value_type_t type;
3616 	int ret;
3617 
3618 	if (base == REP_PROTOCOL_TYPE_INVALID)
3619 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
3620 
3621 	(void) pthread_mutex_lock(&h->rh_lock);
3622 	ret = property_type_locked(prop, &type);
3623 	(void) pthread_mutex_unlock(&h->rh_lock);
3624 
3625 	if (ret == SCF_SUCCESS) {
3626 		if (!scf_is_compatible_protocol_type(base, type))
3627 			return (scf_set_error(SCF_ERROR_TYPE_MISMATCH));
3628 	}
3629 	return (ret);
3630 }
3631 
3632 int
3633 scf_is_compatible_type(scf_type_t base_arg, scf_type_t type_arg)
3634 {
3635 	rep_protocol_value_type_t base = scf_type_to_protocol_type(base_arg);
3636 	rep_protocol_value_type_t type = scf_type_to_protocol_type(type_arg);
3637 
3638 	if (base == REP_PROTOCOL_TYPE_INVALID ||
3639 	    type == REP_PROTOCOL_TYPE_INVALID)
3640 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
3641 
3642 	if (!scf_is_compatible_protocol_type(base, type))
3643 		return (scf_set_error(SCF_ERROR_TYPE_MISMATCH));
3644 
3645 	return (SCF_SUCCESS);
3646 }
3647 
3648 ssize_t
3649 scf_property_get_name(const scf_property_t *prop, char *out, size_t len)
3650 {
3651 	return (datael_get_name(&prop->rd_d, out, len, RP_ENTITY_NAME_NAME));
3652 }
3653 
3654 /*
3655  * transaction functions
3656  */
3657 
3658 /*
3659  * Fails with _NO_MEMORY, _INVALID_ARGUMENT (handle is NULL), _HANDLE_DESTROYED,
3660  * _INTERNAL (bad server response or id in use), or _NO_RESOURCES.
3661  */
3662 scf_transaction_t *
3663 scf_transaction_create(scf_handle_t *handle)
3664 {
3665 	scf_transaction_t *ret;
3666 
3667 	ret = uu_zalloc(sizeof (scf_transaction_t));
3668 	if (ret == NULL) {
3669 		(void) scf_set_error(SCF_ERROR_NO_MEMORY);
3670 		return (NULL);
3671 	}
3672 	if (datael_init(&ret->tran_pg.rd_d, handle,
3673 	    REP_PROTOCOL_ENTITY_PROPERTYGRP) == -1) {
3674 		uu_free(ret);
3675 		return (NULL);			/* error already set */
3676 	}
3677 	ret->tran_state = TRAN_STATE_NEW;
3678 	ret->tran_props = uu_list_create(tran_entry_pool, ret, UU_LIST_SORTED);
3679 	if (ret->tran_props == NULL) {
3680 		datael_destroy(&ret->tran_pg.rd_d);
3681 		uu_free(ret);
3682 		(void) scf_set_error(SCF_ERROR_NO_MEMORY);
3683 		return (NULL);
3684 	}
3685 
3686 	return (ret);
3687 }
3688 
3689 scf_handle_t *
3690 scf_transaction_handle(const scf_transaction_t *val)
3691 {
3692 	return (handle_get(val->tran_pg.rd_d.rd_handle));
3693 }
3694 
3695 int
3696 scf_transaction_start(scf_transaction_t *tran, scf_propertygroup_t *pg)
3697 {
3698 	scf_handle_t *h = tran->tran_pg.rd_d.rd_handle;
3699 
3700 	struct rep_protocol_transaction_start request;
3701 	struct rep_protocol_response response;
3702 	int r;
3703 
3704 	if (h != pg->rd_d.rd_handle)
3705 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
3706 
3707 	(void) pthread_mutex_lock(&h->rh_lock);
3708 	if (tran->tran_state != TRAN_STATE_NEW) {
3709 		(void) pthread_mutex_unlock(&h->rh_lock);
3710 		return (scf_set_error(SCF_ERROR_IN_USE));
3711 	}
3712 	request.rpr_request = REP_PROTOCOL_PROPERTYGRP_TX_START;
3713 	request.rpr_entityid_tx = tran->tran_pg.rd_d.rd_entity;
3714 	request.rpr_entityid = pg->rd_d.rd_entity;
3715 
3716 	datael_finish_reset(&tran->tran_pg.rd_d);
3717 	datael_finish_reset(&pg->rd_d);
3718 
3719 	r = make_door_call(h, &request, sizeof (request),
3720 	    &response, sizeof (response));
3721 
3722 	if (r < 0) {
3723 		(void) pthread_mutex_unlock(&h->rh_lock);
3724 		DOOR_ERRORS_BLOCK(r);
3725 	}
3726 
3727 	/* r < sizeof (response) cannot happen because sizeof (response) == 4 */
3728 
3729 	if (response.rpr_response != REP_PROTOCOL_SUCCESS ||
3730 	    r < sizeof (response)) {
3731 		(void) pthread_mutex_unlock(&h->rh_lock);
3732 		return (scf_set_error(proto_error(response.rpr_response)));
3733 	}
3734 
3735 	tran->tran_state = TRAN_STATE_SETUP;
3736 	tran->tran_invalid = 0;
3737 	(void) pthread_mutex_unlock(&h->rh_lock);
3738 	return (SCF_SUCCESS);
3739 }
3740 
3741 static void
3742 entry_invalidate(scf_transaction_entry_t *cur, int and_destroy,
3743     int and_reset_value)
3744 {
3745 	scf_value_t *v, *next;
3746 	scf_transaction_t *tx;
3747 	scf_handle_t *h = cur->entry_handle;
3748 
3749 	assert(MUTEX_HELD(&h->rh_lock));
3750 
3751 	if ((tx = cur->entry_tx) != NULL) {
3752 		tx->tran_invalid = 1;
3753 		uu_list_remove(tx->tran_props, cur);
3754 		cur->entry_tx = NULL;
3755 	}
3756 
3757 	cur->entry_property = NULL;
3758 	cur->entry_state = ENTRY_STATE_INVALID;
3759 	cur->entry_action = REP_PROTOCOL_TX_ENTRY_INVALID;
3760 	cur->entry_type = REP_PROTOCOL_TYPE_INVALID;
3761 
3762 	for (v = cur->entry_head; v != NULL; v = next) {
3763 		next = v->value_next;
3764 		v->value_tx = NULL;
3765 		v->value_next = NULL;
3766 		if (and_destroy || and_reset_value)
3767 			scf_value_reset_locked(v, and_destroy);
3768 	}
3769 	cur->entry_head = NULL;
3770 	cur->entry_tail = NULL;
3771 }
3772 
3773 static void
3774 entry_destroy_locked(scf_transaction_entry_t *entry)
3775 {
3776 	scf_handle_t *h = entry->entry_handle;
3777 
3778 	assert(MUTEX_HELD(&h->rh_lock));
3779 
3780 	entry_invalidate(entry, 0, 0);
3781 
3782 	entry->entry_handle = NULL;
3783 	assert(h->rh_entries > 0);
3784 	--h->rh_entries;
3785 	--h->rh_extrefs;
3786 	uu_list_node_fini(entry, &entry->entry_link, tran_entry_pool);
3787 	uu_free(entry);
3788 }
3789 
3790 /*
3791  * Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
3792  * _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
3793  * _BACKEND_ACCESS, _IN_USE, _NOT_FOUND, _EXISTS, _TYPE_MISMATCH.
3794  */
3795 static int
3796 transaction_add(scf_transaction_t *tran, scf_transaction_entry_t *entry,
3797     enum rep_protocol_transaction_action action,
3798     const char *prop, rep_protocol_value_type_t type)
3799 {
3800 	scf_handle_t *h = tran->tran_pg.rd_d.rd_handle;
3801 	scf_transaction_entry_t *old;
3802 	scf_property_t *prop_p;
3803 	rep_protocol_value_type_t oldtype;
3804 	scf_error_t error = SCF_ERROR_NONE;
3805 	int ret;
3806 	uu_list_index_t idx;
3807 
3808 	if (h != entry->entry_handle)
3809 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
3810 
3811 	if (action == REP_PROTOCOL_TX_ENTRY_DELETE)
3812 		assert(type == REP_PROTOCOL_TYPE_INVALID);
3813 	else if (type == REP_PROTOCOL_TYPE_INVALID)
3814 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
3815 
3816 	prop_p = HANDLE_HOLD_PROPERTY(h);
3817 
3818 	(void) pthread_mutex_lock(&h->rh_lock);
3819 	if (tran->tran_state != TRAN_STATE_SETUP) {
3820 		error = SCF_ERROR_NOT_SET;
3821 		goto error;
3822 	}
3823 	if (tran->tran_invalid) {
3824 		error = SCF_ERROR_NOT_SET;
3825 		goto error;
3826 	}
3827 
3828 	if (entry->entry_state != ENTRY_STATE_INVALID)
3829 		entry_invalidate(entry, 0, 0);
3830 
3831 	old = uu_list_find(tran->tran_props, &prop, NULL, &idx);
3832 	if (old != NULL) {
3833 		error = SCF_ERROR_IN_USE;
3834 		goto error;
3835 	}
3836 
3837 	ret = datael_get_child_locked(&tran->tran_pg.rd_d, prop,
3838 	    REP_PROTOCOL_ENTITY_PROPERTY, &prop_p->rd_d);
3839 	if (ret == -1 && (error = scf_error()) != SCF_ERROR_NOT_FOUND) {
3840 		goto error;
3841 	}
3842 
3843 	switch (action) {
3844 	case REP_PROTOCOL_TX_ENTRY_DELETE:
3845 		if (ret == -1) {
3846 			error = SCF_ERROR_NOT_FOUND;
3847 			goto error;
3848 		}
3849 		break;
3850 	case REP_PROTOCOL_TX_ENTRY_NEW:
3851 		if (ret != -1) {
3852 			error = SCF_ERROR_EXISTS;
3853 			goto error;
3854 		}
3855 		break;
3856 
3857 	case REP_PROTOCOL_TX_ENTRY_CLEAR:
3858 	case REP_PROTOCOL_TX_ENTRY_REPLACE:
3859 		if (ret == -1) {
3860 			error = SCF_ERROR_NOT_FOUND;
3861 			goto error;
3862 		}
3863 		if (action == REP_PROTOCOL_TX_ENTRY_CLEAR) {
3864 			if (property_type_locked(prop_p, &oldtype) == -1) {
3865 				error = scf_error();
3866 				goto error;
3867 			}
3868 			if (oldtype != type) {
3869 				error = SCF_ERROR_TYPE_MISMATCH;
3870 				goto error;
3871 			}
3872 		}
3873 		break;
3874 	default:
3875 		assert(0);
3876 		abort();
3877 	}
3878 
3879 	(void) strlcpy(entry->entry_namebuf, prop,
3880 	    sizeof (entry->entry_namebuf));
3881 	entry->entry_property = entry->entry_namebuf;
3882 	entry->entry_action = action;
3883 	entry->entry_type = type;
3884 
3885 	entry->entry_state = ENTRY_STATE_IN_TX_ACTION;
3886 	entry->entry_tx = tran;
3887 	uu_list_insert(tran->tran_props, entry, idx);
3888 
3889 	(void) pthread_mutex_unlock(&h->rh_lock);
3890 
3891 	HANDLE_RELE_PROPERTY(h);
3892 
3893 	return (SCF_SUCCESS);
3894 
3895 error:
3896 	(void) pthread_mutex_unlock(&h->rh_lock);
3897 
3898 	HANDLE_RELE_PROPERTY(h);
3899 
3900 	return (scf_set_error(error));
3901 }
3902 
3903 /*
3904  * Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
3905  * _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
3906  * _BACKEND_ACCESS, _IN_USE, _NOT_FOUND, _EXISTS, _TYPE_MISMATCH.
3907  */
3908 int
3909 scf_transaction_property_new(scf_transaction_t *tx,
3910     scf_transaction_entry_t *entry, const char *prop, scf_type_t type)
3911 {
3912 	return (transaction_add(tx, entry, REP_PROTOCOL_TX_ENTRY_NEW,
3913 	    prop, scf_type_to_protocol_type(type)));
3914 }
3915 
3916 /*
3917  * Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
3918  * _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
3919  * _BACKEND_ACCESS, _IN_USE, _NOT_FOUND, _EXISTS, _TYPE_MISMATCH.
3920  */
3921 int
3922 scf_transaction_property_change(scf_transaction_t *tx,
3923     scf_transaction_entry_t *entry, const char *prop, scf_type_t type)
3924 {
3925 	return (transaction_add(tx, entry, REP_PROTOCOL_TX_ENTRY_CLEAR,
3926 	    prop, scf_type_to_protocol_type(type)));
3927 }
3928 
3929 /*
3930  * Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
3931  * _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
3932  * _BACKEND_ACCESS, _IN_USE, _NOT_FOUND, _EXISTS, _TYPE_MISMATCH.
3933  */
3934 int
3935 scf_transaction_property_change_type(scf_transaction_t *tx,
3936     scf_transaction_entry_t *entry, const char *prop, scf_type_t type)
3937 {
3938 	return (transaction_add(tx, entry, REP_PROTOCOL_TX_ENTRY_REPLACE,
3939 	    prop, scf_type_to_protocol_type(type)));
3940 }
3941 
3942 /*
3943  * Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
3944  * _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
3945  * _BACKEND_ACCESS, _IN_USE, _NOT_FOUND, _EXISTS, _TYPE_MISMATCH.
3946  */
3947 int
3948 scf_transaction_property_delete(scf_transaction_t *tx,
3949     scf_transaction_entry_t *entry, const char *prop)
3950 {
3951 	return (transaction_add(tx, entry, REP_PROTOCOL_TX_ENTRY_DELETE,
3952 	    prop, REP_PROTOCOL_TYPE_INVALID));
3953 }
3954 
3955 #define	BAD_SIZE (-1UL)
3956 
3957 static size_t
3958 commit_value(caddr_t data, scf_value_t *val, rep_protocol_value_type_t t)
3959 {
3960 	size_t len;
3961 
3962 	assert(val->value_type == t);
3963 
3964 	if (t == REP_PROTOCOL_TYPE_OPAQUE) {
3965 		len = scf_opaque_encode(data, val->value_value,
3966 		    val->value_size);
3967 	} else {
3968 		if (data != NULL)
3969 			len = strlcpy(data, val->value_value,
3970 			    REP_PROTOCOL_VALUE_LEN);
3971 		else
3972 			len = strlen(val->value_value);
3973 		if (len >= REP_PROTOCOL_VALUE_LEN)
3974 			return (BAD_SIZE);
3975 	}
3976 	return (len + 1);	/* count the '\0' */
3977 }
3978 
3979 static size_t
3980 commit_process(scf_transaction_entry_t *cur,
3981     struct rep_protocol_transaction_cmd *out)
3982 {
3983 	scf_value_t *child;
3984 	size_t sz = 0;
3985 	size_t len;
3986 	caddr_t data = (caddr_t)out->rptc_data;
3987 	caddr_t val_data;
3988 
3989 	if (out != NULL) {
3990 		len = strlcpy(data, cur->entry_property, REP_PROTOCOL_NAME_LEN);
3991 
3992 		out->rptc_action = cur->entry_action;
3993 		out->rptc_type = cur->entry_type;
3994 		out->rptc_name_len = len + 1;
3995 	} else {
3996 		len = strlen(cur->entry_property);
3997 	}
3998 
3999 	if (len >= REP_PROTOCOL_NAME_LEN)
4000 		return (BAD_SIZE);
4001 
4002 	len = TX_SIZE(len + 1);
4003 
4004 	sz += len;
4005 	val_data = data + len;
4006 
4007 	for (child = cur->entry_head; child != NULL;
4008 	    child = child->value_next) {
4009 		assert(cur->entry_action != REP_PROTOCOL_TX_ENTRY_DELETE);
4010 		if (out != NULL) {
4011 			len = commit_value(val_data + sizeof (uint32_t), child,
4012 			    cur->entry_type);
4013 			/* LINTED alignment */
4014 			*(uint32_t *)val_data = len;
4015 		} else
4016 			len = commit_value(NULL, child, cur->entry_type);
4017 
4018 		if (len == BAD_SIZE)
4019 			return (BAD_SIZE);
4020 
4021 		len += sizeof (uint32_t);
4022 		len = TX_SIZE(len);
4023 
4024 		sz += len;
4025 		val_data += len;
4026 	}
4027 
4028 	assert(val_data - data == sz);
4029 
4030 	if (out != NULL)
4031 		out->rptc_size = REP_PROTOCOL_TRANSACTION_CMD_SIZE(sz);
4032 
4033 	return (REP_PROTOCOL_TRANSACTION_CMD_SIZE(sz));
4034 }
4035 
4036 int
4037 scf_transaction_commit(scf_transaction_t *tran)
4038 {
4039 	scf_handle_t *h = tran->tran_pg.rd_d.rd_handle;
4040 
4041 	struct rep_protocol_transaction_commit *request;
4042 	struct rep_protocol_response response;
4043 	uintptr_t cmd;
4044 	scf_transaction_entry_t *cur;
4045 	size_t total, size;
4046 	size_t request_size;
4047 	size_t new_total;
4048 	int r;
4049 
4050 	(void) pthread_mutex_lock(&h->rh_lock);
4051 	if (tran->tran_state != TRAN_STATE_SETUP ||
4052 	    tran->tran_invalid) {
4053 		(void) pthread_mutex_unlock(&h->rh_lock);
4054 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
4055 	}
4056 
4057 	total = 0;
4058 	for (cur = uu_list_first(tran->tran_props); cur != NULL;
4059 	    cur = uu_list_next(tran->tran_props, cur)) {
4060 		size = commit_process(cur, NULL);
4061 		if (size == BAD_SIZE) {
4062 			(void) pthread_mutex_unlock(&h->rh_lock);
4063 			return (scf_set_error(SCF_ERROR_INTERNAL));
4064 		}
4065 		assert(TX_SIZE(size) == size);
4066 		total += size;
4067 	}
4068 
4069 	request_size = REP_PROTOCOL_TRANSACTION_COMMIT_SIZE(total);
4070 	request = alloca(request_size);
4071 	(void) memset(request, '\0', request_size);
4072 	request->rpr_request = REP_PROTOCOL_PROPERTYGRP_TX_COMMIT;
4073 	request->rpr_entityid = tran->tran_pg.rd_d.rd_entity;
4074 	request->rpr_size = request_size;
4075 	cmd = (uintptr_t)request->rpr_cmd;
4076 
4077 	datael_finish_reset(&tran->tran_pg.rd_d);
4078 
4079 	new_total = 0;
4080 	for (cur = uu_list_first(tran->tran_props); cur != NULL;
4081 	    cur = uu_list_next(tran->tran_props, cur)) {
4082 		size = commit_process(cur, (void *)cmd);
4083 		if (size == BAD_SIZE) {
4084 			(void) pthread_mutex_unlock(&h->rh_lock);
4085 			return (scf_set_error(SCF_ERROR_INTERNAL));
4086 		}
4087 		cmd += size;
4088 		new_total += size;
4089 	}
4090 	assert(new_total == total);
4091 
4092 	r = make_door_call(h, request, request_size,
4093 	    &response, sizeof (response));
4094 
4095 	if (r < 0) {
4096 		(void) pthread_mutex_unlock(&h->rh_lock);
4097 		DOOR_ERRORS_BLOCK(r);
4098 	}
4099 
4100 	if (response.rpr_response != REP_PROTOCOL_SUCCESS &&
4101 	    response.rpr_response != REP_PROTOCOL_FAIL_NOT_LATEST) {
4102 		(void) pthread_mutex_unlock(&h->rh_lock);
4103 		return (scf_set_error(proto_error(response.rpr_response)));
4104 	}
4105 
4106 	tran->tran_state = TRAN_STATE_COMMITTED;
4107 	(void) pthread_mutex_unlock(&h->rh_lock);
4108 	return (response.rpr_response == REP_PROTOCOL_SUCCESS);
4109 }
4110 
4111 static void
4112 transaction_reset(scf_transaction_t *tran)
4113 {
4114 	assert(MUTEX_HELD(&tran->tran_pg.rd_d.rd_handle->rh_lock));
4115 
4116 	tran->tran_state = TRAN_STATE_NEW;
4117 	datael_reset_locked(&tran->tran_pg.rd_d);
4118 }
4119 
4120 static void
4121 scf_transaction_reset_impl(scf_transaction_t *tran, int and_destroy,
4122     int and_reset_value)
4123 {
4124 	scf_transaction_entry_t *cur;
4125 	void *cookie;
4126 
4127 	(void) pthread_mutex_lock(&tran->tran_pg.rd_d.rd_handle->rh_lock);
4128 	cookie = NULL;
4129 	while ((cur = uu_list_teardown(tran->tran_props, &cookie)) != NULL) {
4130 		cur->entry_tx = NULL;
4131 
4132 		assert(cur->entry_state == ENTRY_STATE_IN_TX_ACTION);
4133 		cur->entry_state = ENTRY_STATE_INVALID;
4134 
4135 		entry_invalidate(cur, and_destroy, and_reset_value);
4136 		if (and_destroy)
4137 			entry_destroy_locked(cur);
4138 	}
4139 	transaction_reset(tran);
4140 	handle_unrefed(tran->tran_pg.rd_d.rd_handle);
4141 }
4142 
4143 void
4144 scf_transaction_reset(scf_transaction_t *tran)
4145 {
4146 	scf_transaction_reset_impl(tran, 0, 0);
4147 }
4148 
4149 void
4150 scf_transaction_reset_all(scf_transaction_t *tran)
4151 {
4152 	scf_transaction_reset_impl(tran, 0, 1);
4153 }
4154 
4155 void
4156 scf_transaction_destroy(scf_transaction_t *val)
4157 {
4158 	if (val == NULL)
4159 		return;
4160 
4161 	scf_transaction_reset(val);
4162 
4163 	datael_destroy(&val->tran_pg.rd_d);
4164 
4165 	uu_list_destroy(val->tran_props);
4166 	uu_free(val);
4167 }
4168 
4169 void
4170 scf_transaction_destroy_children(scf_transaction_t *tran)
4171 {
4172 	if (tran == NULL)
4173 		return;
4174 
4175 	scf_transaction_reset_impl(tran, 1, 0);
4176 }
4177 
4178 scf_transaction_entry_t *
4179 scf_entry_create(scf_handle_t *h)
4180 {
4181 	scf_transaction_entry_t *ret;
4182 
4183 	if (h == NULL) {
4184 		(void) scf_set_error(SCF_ERROR_INVALID_ARGUMENT);
4185 		return (NULL);
4186 	}
4187 
4188 	ret = uu_zalloc(sizeof (scf_transaction_entry_t));
4189 	if (ret == NULL) {
4190 		(void) scf_set_error(SCF_ERROR_NO_MEMORY);
4191 		return (NULL);
4192 	}
4193 	ret->entry_action = REP_PROTOCOL_TX_ENTRY_INVALID;
4194 	ret->entry_handle = h;
4195 
4196 	(void) pthread_mutex_lock(&h->rh_lock);
4197 	if (h->rh_flags & HANDLE_DEAD) {
4198 		(void) pthread_mutex_unlock(&h->rh_lock);
4199 		uu_free(ret);
4200 		(void) scf_set_error(SCF_ERROR_HANDLE_DESTROYED);
4201 		return (NULL);
4202 	}
4203 	h->rh_entries++;
4204 	h->rh_extrefs++;
4205 	(void) pthread_mutex_unlock(&h->rh_lock);
4206 
4207 	uu_list_node_init(ret, &ret->entry_link, tran_entry_pool);
4208 
4209 	return (ret);
4210 }
4211 
4212 scf_handle_t *
4213 scf_entry_handle(const scf_transaction_entry_t *val)
4214 {
4215 	return (handle_get(val->entry_handle));
4216 }
4217 
4218 void
4219 scf_entry_reset(scf_transaction_entry_t *entry)
4220 {
4221 	scf_handle_t *h = entry->entry_handle;
4222 
4223 	(void) pthread_mutex_lock(&h->rh_lock);
4224 	entry_invalidate(entry, 0, 0);
4225 	(void) pthread_mutex_unlock(&h->rh_lock);
4226 }
4227 
4228 void
4229 scf_entry_destroy_children(scf_transaction_entry_t *entry)
4230 {
4231 	scf_handle_t *h = entry->entry_handle;
4232 
4233 	(void) pthread_mutex_lock(&h->rh_lock);
4234 	entry_invalidate(entry, 1, 0);
4235 	handle_unrefed(h);			/* drops h->rh_lock */
4236 }
4237 
4238 void
4239 scf_entry_destroy(scf_transaction_entry_t *entry)
4240 {
4241 	scf_handle_t *h;
4242 
4243 	if (entry == NULL)
4244 		return;
4245 
4246 	h = entry->entry_handle;
4247 
4248 	(void) pthread_mutex_lock(&h->rh_lock);
4249 	entry_destroy_locked(entry);
4250 	handle_unrefed(h);			/* drops h->rh_lock */
4251 }
4252 
4253 /*
4254  * Fails with
4255  *   _HANDLE_MISMATCH
4256  *   _NOT_SET - has not been added to a transaction
4257  *   _INTERNAL - entry is corrupt
4258  *   _INVALID_ARGUMENT - entry's transaction is not started or corrupt
4259  *			 entry is set to delete a property
4260  *			 v is reset or corrupt
4261  *   _TYPE_MISMATCH - entry & v's types aren't compatible
4262  *   _IN_USE - v has been added to another entry
4263  */
4264 int
4265 scf_entry_add_value(scf_transaction_entry_t *entry, scf_value_t *v)
4266 {
4267 	scf_handle_t *h = entry->entry_handle;
4268 
4269 	if (h != v->value_handle)
4270 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
4271 
4272 	(void) pthread_mutex_lock(&h->rh_lock);
4273 
4274 	if (entry->entry_state == ENTRY_STATE_INVALID) {
4275 		(void) pthread_mutex_unlock(&h->rh_lock);
4276 		return (scf_set_error(SCF_ERROR_NOT_SET));
4277 	}
4278 
4279 	if (entry->entry_state != ENTRY_STATE_IN_TX_ACTION) {
4280 		(void) pthread_mutex_unlock(&h->rh_lock);
4281 		return (scf_set_error(SCF_ERROR_INTERNAL));
4282 	}
4283 
4284 	if (entry->entry_tx->tran_state != TRAN_STATE_SETUP) {
4285 		(void) pthread_mutex_unlock(&h->rh_lock);
4286 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
4287 	}
4288 
4289 	if (entry->entry_action == REP_PROTOCOL_TX_ENTRY_DELETE) {
4290 		(void) pthread_mutex_unlock(&h->rh_lock);
4291 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
4292 	}
4293 
4294 	if (v->value_type == REP_PROTOCOL_TYPE_INVALID) {
4295 		(void) pthread_mutex_unlock(&h->rh_lock);
4296 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
4297 	}
4298 
4299 	if (!scf_is_compatible_protocol_type(entry->entry_type,
4300 	    v->value_type)) {
4301 		(void) pthread_mutex_unlock(&h->rh_lock);
4302 		return (scf_set_error(SCF_ERROR_TYPE_MISMATCH));
4303 	}
4304 
4305 	if (v->value_tx != NULL) {
4306 		(void) pthread_mutex_unlock(&h->rh_lock);
4307 		return (scf_set_error(SCF_ERROR_IN_USE));
4308 	}
4309 
4310 	v->value_tx = entry;
4311 	v->value_next = NULL;
4312 	if (entry->entry_head == NULL) {
4313 		entry->entry_head = v;
4314 		entry->entry_tail = v;
4315 	} else {
4316 		entry->entry_tail->value_next = v;
4317 		entry->entry_tail = v;
4318 	}
4319 
4320 	(void) pthread_mutex_unlock(&h->rh_lock);
4321 
4322 	return (SCF_SUCCESS);
4323 }
4324 
4325 /*
4326  * value functions
4327  */
4328 scf_value_t *
4329 scf_value_create(scf_handle_t *h)
4330 {
4331 	scf_value_t *ret;
4332 
4333 	if (h == NULL) {
4334 		(void) scf_set_error(SCF_ERROR_INVALID_ARGUMENT);
4335 		return (NULL);
4336 	}
4337 
4338 	ret = uu_zalloc(sizeof (*ret));
4339 	if (ret != NULL) {
4340 		ret->value_type = REP_PROTOCOL_TYPE_INVALID;
4341 		ret->value_handle = h;
4342 		(void) pthread_mutex_lock(&h->rh_lock);
4343 		if (h->rh_flags & HANDLE_DEAD) {
4344 			(void) pthread_mutex_unlock(&h->rh_lock);
4345 			uu_free(ret);
4346 			(void) scf_set_error(SCF_ERROR_HANDLE_DESTROYED);
4347 			return (NULL);
4348 		}
4349 		h->rh_values++;
4350 		h->rh_extrefs++;
4351 		(void) pthread_mutex_unlock(&h->rh_lock);
4352 	} else {
4353 		(void) scf_set_error(SCF_ERROR_NO_MEMORY);
4354 	}
4355 
4356 	return (ret);
4357 }
4358 
4359 static void
4360 scf_value_reset_locked(scf_value_t *val, int and_destroy)
4361 {
4362 	scf_value_t **curp;
4363 	scf_transaction_entry_t *te;
4364 
4365 	scf_handle_t *h = val->value_handle;
4366 	assert(MUTEX_HELD(&h->rh_lock));
4367 	if (val->value_tx != NULL) {
4368 		te = val->value_tx;
4369 		te->entry_tx->tran_invalid = 1;
4370 
4371 		val->value_tx = NULL;
4372 
4373 		for (curp = &te->entry_head; *curp != NULL;
4374 		    curp = &(*curp)->value_next) {
4375 			if (*curp == val) {
4376 				*curp = val->value_next;
4377 				curp = NULL;
4378 				break;
4379 			}
4380 		}
4381 		assert(curp == NULL);
4382 	}
4383 	val->value_type = REP_PROTOCOL_TYPE_INVALID;
4384 
4385 	if (and_destroy) {
4386 		val->value_handle = NULL;
4387 		assert(h->rh_values > 0);
4388 		--h->rh_values;
4389 		--h->rh_extrefs;
4390 		uu_free(val);
4391 	}
4392 }
4393 
4394 void
4395 scf_value_reset(scf_value_t *val)
4396 {
4397 	scf_handle_t *h = val->value_handle;
4398 
4399 	(void) pthread_mutex_lock(&h->rh_lock);
4400 	scf_value_reset_locked(val, 0);
4401 	(void) pthread_mutex_unlock(&h->rh_lock);
4402 }
4403 
4404 scf_handle_t *
4405 scf_value_handle(const scf_value_t *val)
4406 {
4407 	return (handle_get(val->value_handle));
4408 }
4409 
4410 void
4411 scf_value_destroy(scf_value_t *val)
4412 {
4413 	scf_handle_t *h;
4414 
4415 	if (val == NULL)
4416 		return;
4417 
4418 	h = val->value_handle;
4419 
4420 	(void) pthread_mutex_lock(&h->rh_lock);
4421 	scf_value_reset_locked(val, 1);
4422 	handle_unrefed(h);			/* drops h->rh_lock */
4423 }
4424 
4425 scf_type_t
4426 scf_value_base_type(const scf_value_t *val)
4427 {
4428 	rep_protocol_value_type_t t, cur;
4429 	scf_handle_t *h = val->value_handle;
4430 
4431 	(void) pthread_mutex_lock(&h->rh_lock);
4432 	t = val->value_type;
4433 	(void) pthread_mutex_unlock(&h->rh_lock);
4434 
4435 	for (;;) {
4436 		cur = scf_proto_underlying_type(t);
4437 		if (cur == t)
4438 			break;
4439 		t = cur;
4440 	}
4441 
4442 	return (scf_protocol_type_to_type(t));
4443 }
4444 
4445 scf_type_t
4446 scf_value_type(const scf_value_t *val)
4447 {
4448 	rep_protocol_value_type_t t;
4449 	scf_handle_t *h = val->value_handle;
4450 
4451 	(void) pthread_mutex_lock(&h->rh_lock);
4452 	t = val->value_type;
4453 	(void) pthread_mutex_unlock(&h->rh_lock);
4454 
4455 	return (scf_protocol_type_to_type(t));
4456 }
4457 
4458 int
4459 scf_value_is_type(const scf_value_t *val, scf_type_t base_arg)
4460 {
4461 	rep_protocol_value_type_t t;
4462 	rep_protocol_value_type_t base = scf_type_to_protocol_type(base_arg);
4463 	scf_handle_t *h = val->value_handle;
4464 
4465 	(void) pthread_mutex_lock(&h->rh_lock);
4466 	t = val->value_type;
4467 	(void) pthread_mutex_unlock(&h->rh_lock);
4468 
4469 	if (t == REP_PROTOCOL_TYPE_INVALID)
4470 		return (scf_set_error(SCF_ERROR_NOT_SET));
4471 	if (base == REP_PROTOCOL_TYPE_INVALID)
4472 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
4473 	if (!scf_is_compatible_protocol_type(base, t))
4474 		return (scf_set_error(SCF_ERROR_TYPE_MISMATCH));
4475 
4476 	return (SCF_SUCCESS);
4477 }
4478 
4479 /*
4480  * Fails with
4481  *   _NOT_SET - val is reset
4482  *   _TYPE_MISMATCH - val's type is not compatible with t
4483  */
4484 static int
4485 scf_value_check_type(const scf_value_t *val, rep_protocol_value_type_t t)
4486 {
4487 	if (val->value_type == REP_PROTOCOL_TYPE_INVALID) {
4488 		(void) scf_set_error(SCF_ERROR_NOT_SET);
4489 		return (0);
4490 	}
4491 	if (!scf_is_compatible_protocol_type(t, val->value_type)) {
4492 		(void) scf_set_error(SCF_ERROR_TYPE_MISMATCH);
4493 		return (0);
4494 	}
4495 	return (1);
4496 }
4497 
4498 /*
4499  * Fails with
4500  *   _NOT_SET - val is reset
4501  *   _TYPE_MISMATCH - val is not _TYPE_BOOLEAN
4502  */
4503 int
4504 scf_value_get_boolean(const scf_value_t *val, uint8_t *out)
4505 {
4506 	char c;
4507 	scf_handle_t *h = val->value_handle;
4508 	uint8_t o;
4509 
4510 	(void) pthread_mutex_lock(&h->rh_lock);
4511 	if (!scf_value_check_type(val, REP_PROTOCOL_TYPE_BOOLEAN)) {
4512 		(void) pthread_mutex_unlock(&h->rh_lock);
4513 		return (-1);
4514 	}
4515 
4516 	c = val->value_value[0];
4517 	assert((c == '0' || c == '1') && val->value_value[1] == 0);
4518 
4519 	o = (c != '0');
4520 	(void) pthread_mutex_unlock(&h->rh_lock);
4521 	if (out != NULL)
4522 		*out = o;
4523 	return (SCF_SUCCESS);
4524 }
4525 
4526 int
4527 scf_value_get_count(const scf_value_t *val, uint64_t *out)
4528 {
4529 	scf_handle_t *h = val->value_handle;
4530 	uint64_t o;
4531 
4532 	(void) pthread_mutex_lock(&h->rh_lock);
4533 	if (!scf_value_check_type(val, REP_PROTOCOL_TYPE_COUNT)) {
4534 		(void) pthread_mutex_unlock(&h->rh_lock);
4535 		return (-1);
4536 	}
4537 
4538 	o = strtoull(val->value_value, NULL, 10);
4539 	(void) pthread_mutex_unlock(&h->rh_lock);
4540 	if (out != NULL)
4541 		*out = o;
4542 	return (SCF_SUCCESS);
4543 }
4544 
4545 int
4546 scf_value_get_integer(const scf_value_t *val, int64_t *out)
4547 {
4548 	scf_handle_t *h = val->value_handle;
4549 	int64_t o;
4550 
4551 	(void) pthread_mutex_lock(&h->rh_lock);
4552 	if (!scf_value_check_type(val, REP_PROTOCOL_TYPE_INTEGER)) {
4553 		(void) pthread_mutex_unlock(&h->rh_lock);
4554 		return (-1);
4555 	}
4556 
4557 	o = strtoll(val->value_value, NULL, 10);
4558 	(void) pthread_mutex_unlock(&h->rh_lock);
4559 	if (out != NULL)
4560 		*out = o;
4561 	return (SCF_SUCCESS);
4562 }
4563 
4564 int
4565 scf_value_get_time(const scf_value_t *val, int64_t *sec_out, int32_t *nsec_out)
4566 {
4567 	scf_handle_t *h = val->value_handle;
4568 	char *p;
4569 	int64_t os;
4570 	int32_t ons;
4571 
4572 	(void) pthread_mutex_lock(&h->rh_lock);
4573 	if (!scf_value_check_type(val, REP_PROTOCOL_TYPE_TIME)) {
4574 		(void) pthread_mutex_unlock(&h->rh_lock);
4575 		return (-1);
4576 	}
4577 
4578 	os = strtoll(val->value_value, &p, 10);
4579 	if (*p == '.')
4580 		ons = strtoul(p + 1, NULL, 10);
4581 	else
4582 		ons = 0;
4583 	(void) pthread_mutex_unlock(&h->rh_lock);
4584 	if (sec_out != NULL)
4585 		*sec_out = os;
4586 	if (nsec_out != NULL)
4587 		*nsec_out = ons;
4588 
4589 	return (SCF_SUCCESS);
4590 }
4591 
4592 /*
4593  * Fails with
4594  *   _NOT_SET - val is reset
4595  *   _TYPE_MISMATCH - val's type is not compatible with _TYPE_STRING.
4596  */
4597 ssize_t
4598 scf_value_get_astring(const scf_value_t *val, char *out, size_t len)
4599 {
4600 	ssize_t ret;
4601 	scf_handle_t *h = val->value_handle;
4602 
4603 	(void) pthread_mutex_lock(&h->rh_lock);
4604 	if (!scf_value_check_type(val, REP_PROTOCOL_TYPE_STRING)) {
4605 		(void) pthread_mutex_unlock(&h->rh_lock);
4606 		return ((ssize_t)-1);
4607 	}
4608 	ret = (ssize_t)strlcpy(out, val->value_value, len);
4609 	(void) pthread_mutex_unlock(&h->rh_lock);
4610 	return (ret);
4611 }
4612 
4613 ssize_t
4614 scf_value_get_ustring(const scf_value_t *val, char *out, size_t len)
4615 {
4616 	ssize_t ret;
4617 	scf_handle_t *h = val->value_handle;
4618 
4619 	(void) pthread_mutex_lock(&h->rh_lock);
4620 	if (!scf_value_check_type(val, REP_PROTOCOL_SUBTYPE_USTRING)) {
4621 		(void) pthread_mutex_unlock(&h->rh_lock);
4622 		return ((ssize_t)-1);
4623 	}
4624 	ret = (ssize_t)strlcpy(out, val->value_value, len);
4625 	(void) pthread_mutex_unlock(&h->rh_lock);
4626 	return (ret);
4627 }
4628 
4629 ssize_t
4630 scf_value_get_opaque(const scf_value_t *v, void *out, size_t len)
4631 {
4632 	ssize_t ret;
4633 	scf_handle_t *h = v->value_handle;
4634 
4635 	(void) pthread_mutex_lock(&h->rh_lock);
4636 	if (!scf_value_check_type(v, REP_PROTOCOL_TYPE_OPAQUE)) {
4637 		(void) pthread_mutex_unlock(&h->rh_lock);
4638 		return ((ssize_t)-1);
4639 	}
4640 	if (len > v->value_size)
4641 		len = v->value_size;
4642 	ret = len;
4643 
4644 	(void) memcpy(out, v->value_value, len);
4645 	(void) pthread_mutex_unlock(&h->rh_lock);
4646 	return (ret);
4647 }
4648 
4649 void
4650 scf_value_set_boolean(scf_value_t *v, uint8_t new)
4651 {
4652 	scf_handle_t *h = v->value_handle;
4653 
4654 	(void) pthread_mutex_lock(&h->rh_lock);
4655 	scf_value_reset_locked(v, 0);
4656 	v->value_type = REP_PROTOCOL_TYPE_BOOLEAN;
4657 	(void) sprintf(v->value_value, "%d", (new != 0));
4658 	(void) pthread_mutex_unlock(&h->rh_lock);
4659 }
4660 
4661 void
4662 scf_value_set_count(scf_value_t *v, uint64_t new)
4663 {
4664 	scf_handle_t *h = v->value_handle;
4665 
4666 	(void) pthread_mutex_lock(&h->rh_lock);
4667 	scf_value_reset_locked(v, 0);
4668 	v->value_type = REP_PROTOCOL_TYPE_COUNT;
4669 	(void) sprintf(v->value_value, "%llu", (unsigned long long)new);
4670 	(void) pthread_mutex_unlock(&h->rh_lock);
4671 }
4672 
4673 void
4674 scf_value_set_integer(scf_value_t *v, int64_t new)
4675 {
4676 	scf_handle_t *h = v->value_handle;
4677 
4678 	(void) pthread_mutex_lock(&h->rh_lock);
4679 	scf_value_reset_locked(v, 0);
4680 	v->value_type = REP_PROTOCOL_TYPE_INTEGER;
4681 	(void) sprintf(v->value_value, "%lld", (long long)new);
4682 	(void) pthread_mutex_unlock(&h->rh_lock);
4683 }
4684 
4685 int
4686 scf_value_set_time(scf_value_t *v, int64_t new_sec, int32_t new_nsec)
4687 {
4688 	scf_handle_t *h = v->value_handle;
4689 
4690 	(void) pthread_mutex_lock(&h->rh_lock);
4691 	scf_value_reset_locked(v, 0);
4692 	if (new_nsec < 0 || new_nsec >= NANOSEC) {
4693 		(void) pthread_mutex_unlock(&h->rh_lock);
4694 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
4695 	}
4696 	v->value_type = REP_PROTOCOL_TYPE_TIME;
4697 	if (new_nsec == 0)
4698 		(void) sprintf(v->value_value, "%lld", (long long)new_sec);
4699 	else
4700 		(void) sprintf(v->value_value, "%lld.%09u", (long long)new_sec,
4701 		    (unsigned)new_nsec);
4702 	(void) pthread_mutex_unlock(&h->rh_lock);
4703 	return (0);
4704 }
4705 
4706 int
4707 scf_value_set_astring(scf_value_t *v, const char *new)
4708 {
4709 	scf_handle_t *h = v->value_handle;
4710 
4711 	(void) pthread_mutex_lock(&h->rh_lock);
4712 	scf_value_reset_locked(v, 0);
4713 	if (!scf_validate_encoded_value(REP_PROTOCOL_TYPE_STRING, new)) {
4714 		(void) pthread_mutex_unlock(&h->rh_lock);
4715 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
4716 	}
4717 	if (strlcpy(v->value_value, new, sizeof (v->value_value)) >=
4718 	    sizeof (v->value_value)) {
4719 		(void) pthread_mutex_unlock(&h->rh_lock);
4720 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
4721 	}
4722 	v->value_type = REP_PROTOCOL_TYPE_STRING;
4723 	(void) pthread_mutex_unlock(&h->rh_lock);
4724 	return (0);
4725 }
4726 
4727 int
4728 scf_value_set_ustring(scf_value_t *v, const char *new)
4729 {
4730 	scf_handle_t *h = v->value_handle;
4731 
4732 	(void) pthread_mutex_lock(&h->rh_lock);
4733 	scf_value_reset_locked(v, 0);
4734 	if (!scf_validate_encoded_value(REP_PROTOCOL_SUBTYPE_USTRING, new)) {
4735 		(void) pthread_mutex_unlock(&h->rh_lock);
4736 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
4737 	}
4738 	if (strlcpy(v->value_value, new, sizeof (v->value_value)) >=
4739 	    sizeof (v->value_value)) {
4740 		(void) pthread_mutex_unlock(&h->rh_lock);
4741 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
4742 	}
4743 	v->value_type = REP_PROTOCOL_SUBTYPE_USTRING;
4744 	(void) pthread_mutex_unlock(&h->rh_lock);
4745 	return (0);
4746 }
4747 
4748 int
4749 scf_value_set_opaque(scf_value_t *v, const void *new, size_t len)
4750 {
4751 	scf_handle_t *h = v->value_handle;
4752 
4753 	(void) pthread_mutex_lock(&h->rh_lock);
4754 	scf_value_reset_locked(v, 0);
4755 	if (len > sizeof (v->value_value)) {
4756 		(void) pthread_mutex_unlock(&h->rh_lock);
4757 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
4758 	}
4759 	(void) memcpy(v->value_value, new, len);
4760 	v->value_size = len;
4761 	v->value_type = REP_PROTOCOL_TYPE_OPAQUE;
4762 	(void) pthread_mutex_unlock(&h->rh_lock);
4763 	return (0);
4764 }
4765 
4766 /*
4767  * Fails with
4768  *   _NOT_SET - v_arg is reset
4769  *   _INTERNAL - v_arg is corrupt
4770  *
4771  * If t is not _TYPE_INVALID, fails with
4772  *   _TYPE_MISMATCH - v_arg's type is not compatible with t
4773  */
4774 static ssize_t
4775 scf_value_get_as_string_common(const scf_value_t *v_arg,
4776     rep_protocol_value_type_t t, char *buf, size_t bufsz)
4777 {
4778 	scf_handle_t *h = v_arg->value_handle;
4779 	scf_value_t v_s;
4780 	scf_value_t *v = &v_s;
4781 	ssize_t r;
4782 	uint8_t b;
4783 
4784 	(void) pthread_mutex_lock(&h->rh_lock);
4785 	if (t != REP_PROTOCOL_TYPE_INVALID && !scf_value_check_type(v_arg, t)) {
4786 		(void) pthread_mutex_unlock(&h->rh_lock);
4787 		return (-1);
4788 	}
4789 
4790 	v_s = *v_arg;			/* copy locally so we can unlock */
4791 	h->rh_values++;			/* keep the handle from going away */
4792 	h->rh_extrefs++;
4793 	(void) pthread_mutex_unlock(&h->rh_lock);
4794 
4795 
4796 	switch (REP_PROTOCOL_BASE_TYPE(v->value_type)) {
4797 	case REP_PROTOCOL_TYPE_BOOLEAN:
4798 		r = scf_value_get_boolean(v, &b);
4799 		assert(r == SCF_SUCCESS);
4800 
4801 		r = strlcpy(buf, b ? "true" : "false", bufsz);
4802 		break;
4803 
4804 	case REP_PROTOCOL_TYPE_COUNT:
4805 	case REP_PROTOCOL_TYPE_INTEGER:
4806 	case REP_PROTOCOL_TYPE_TIME:
4807 	case REP_PROTOCOL_TYPE_STRING:
4808 		r = strlcpy(buf, v->value_value, bufsz);
4809 		break;
4810 
4811 	case REP_PROTOCOL_TYPE_OPAQUE:
4812 		/*
4813 		 * Note that we only write out full hex bytes -- if they're
4814 		 * short, and bufsz is even, we'll only fill (bufsz - 2) bytes
4815 		 * with data.
4816 		 */
4817 		if (bufsz > 0)
4818 			(void) scf_opaque_encode(buf, v->value_value,
4819 			    MIN(v->value_size, (bufsz - 1)/2));
4820 		r = (v->value_size * 2);
4821 		break;
4822 
4823 	case REP_PROTOCOL_TYPE_INVALID:
4824 		r = scf_set_error(SCF_ERROR_NOT_SET);
4825 		break;
4826 
4827 	default:
4828 		r = (scf_set_error(SCF_ERROR_INTERNAL));
4829 		break;
4830 	}
4831 
4832 	(void) pthread_mutex_lock(&h->rh_lock);
4833 	h->rh_values--;
4834 	h->rh_extrefs--;
4835 	handle_unrefed(h);
4836 
4837 	return (r);
4838 }
4839 
4840 ssize_t
4841 scf_value_get_as_string(const scf_value_t *v, char *buf, size_t bufsz)
4842 {
4843 	return (scf_value_get_as_string_common(v, REP_PROTOCOL_TYPE_INVALID,
4844 	    buf, bufsz));
4845 }
4846 
4847 ssize_t
4848 scf_value_get_as_string_typed(const scf_value_t *v, scf_type_t type,
4849     char *buf, size_t bufsz)
4850 {
4851 	rep_protocol_value_type_t ty = scf_type_to_protocol_type(type);
4852 	if (ty == REP_PROTOCOL_TYPE_INVALID)
4853 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
4854 
4855 	return (scf_value_get_as_string_common(v, ty, buf, bufsz));
4856 }
4857 
4858 int
4859 scf_value_set_from_string(scf_value_t *v, scf_type_t type, const char *str)
4860 {
4861 	scf_handle_t *h = v->value_handle;
4862 	rep_protocol_value_type_t ty;
4863 
4864 	switch (type) {
4865 	case SCF_TYPE_BOOLEAN: {
4866 		uint8_t b;
4867 
4868 		if (strcmp(str, "true") == 0 || strcmp(str, "t") == 0 ||
4869 		    strcmp(str, "1") == 0)
4870 			b = 1;
4871 		else if (strcmp(str, "false") == 0 ||
4872 		    strcmp(str, "f") == 0 || strcmp(str, "0") == 0)
4873 			b = 0;
4874 		else {
4875 			goto bad;
4876 		}
4877 
4878 		scf_value_set_boolean(v, b);
4879 		return (0);
4880 	}
4881 
4882 	case SCF_TYPE_COUNT: {
4883 		uint64_t c;
4884 		char *endp;
4885 
4886 		errno = 0;
4887 		c = strtoull(str, &endp, 0);
4888 
4889 		if (errno != 0 || endp == str || *endp != '\0')
4890 			goto bad;
4891 
4892 		scf_value_set_count(v, c);
4893 		return (0);
4894 	}
4895 
4896 	case SCF_TYPE_INTEGER: {
4897 		int64_t i;
4898 		char *endp;
4899 
4900 		errno = 0;
4901 		i = strtoll(str, &endp, 0);
4902 
4903 		if (errno != 0 || endp == str || *endp != '\0')
4904 			goto bad;
4905 
4906 		scf_value_set_integer(v, i);
4907 		return (0);
4908 	}
4909 
4910 	case SCF_TYPE_TIME: {
4911 		int64_t s;
4912 		uint32_t ns = 0;
4913 		char *endp, *ns_str;
4914 		size_t len;
4915 
4916 		errno = 0;
4917 		s = strtoll(str, &endp, 10);
4918 		if (errno != 0 || endp == str ||
4919 		    (*endp != '\0' && *endp != '.'))
4920 			goto bad;
4921 
4922 		if (*endp == '.') {
4923 			ns_str = endp + 1;
4924 			len = strlen(ns_str);
4925 			if (len == 0 || len > 9)
4926 				goto bad;
4927 
4928 			ns = strtoul(ns_str, &endp, 10);
4929 			if (errno != 0 || endp == ns_str || *endp != '\0')
4930 				goto bad;
4931 
4932 			while (len++ < 9)
4933 				ns *= 10;
4934 			assert(ns < NANOSEC);
4935 		}
4936 
4937 		return (scf_value_set_time(v, s, ns));
4938 	}
4939 
4940 	case SCF_TYPE_ASTRING:
4941 	case SCF_TYPE_USTRING:
4942 	case SCF_TYPE_OPAQUE:
4943 	case SCF_TYPE_URI:
4944 	case SCF_TYPE_FMRI:
4945 	case SCF_TYPE_HOST:
4946 	case SCF_TYPE_HOSTNAME:
4947 	case SCF_TYPE_NET_ADDR:
4948 	case SCF_TYPE_NET_ADDR_V4:
4949 	case SCF_TYPE_NET_ADDR_V6:
4950 		ty = scf_type_to_protocol_type(type);
4951 
4952 		(void) pthread_mutex_lock(&h->rh_lock);
4953 		scf_value_reset_locked(v, 0);
4954 		if (type == SCF_TYPE_OPAQUE) {
4955 			v->value_size = scf_opaque_decode(v->value_value,
4956 			    str, sizeof (v->value_value));
4957 			if (!scf_validate_encoded_value(ty, str)) {
4958 				(void) pthread_mutex_lock(&h->rh_lock);
4959 				goto bad;
4960 			}
4961 		} else {
4962 			(void) strlcpy(v->value_value, str,
4963 			    sizeof (v->value_value));
4964 			if (!scf_validate_encoded_value(ty, v->value_value)) {
4965 				(void) pthread_mutex_lock(&h->rh_lock);
4966 				goto bad;
4967 			}
4968 		}
4969 		v->value_type = ty;
4970 		(void) pthread_mutex_unlock(&h->rh_lock);
4971 		return (SCF_SUCCESS);
4972 
4973 	case REP_PROTOCOL_TYPE_INVALID:
4974 	default:
4975 		scf_value_reset(v);
4976 		return (scf_set_error(SCF_ERROR_TYPE_MISMATCH));
4977 	}
4978 bad:
4979 	scf_value_reset(v);
4980 	return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
4981 }
4982 
4983 int
4984 scf_iter_property_values(scf_iter_t *iter, const scf_property_t *prop)
4985 {
4986 	return (datael_setup_iter(iter, &prop->rd_d,
4987 	    REP_PROTOCOL_ENTITY_VALUE, 0));
4988 }
4989 
4990 int
4991 scf_iter_next_value(scf_iter_t *iter, scf_value_t *v)
4992 {
4993 	scf_handle_t *h = iter->iter_handle;
4994 
4995 	struct rep_protocol_iter_read_value request;
4996 	struct rep_protocol_value_response response;
4997 
4998 	int r;
4999 
5000 	if (h != v->value_handle)
5001 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
5002 
5003 	(void) pthread_mutex_lock(&h->rh_lock);
5004 
5005 	scf_value_reset_locked(v, 0);
5006 
5007 	if (iter->iter_type == REP_PROTOCOL_ENTITY_NONE) {
5008 		(void) pthread_mutex_unlock(&h->rh_lock);
5009 		return (scf_set_error(SCF_ERROR_NOT_SET));
5010 	}
5011 
5012 	if (iter->iter_type != REP_PROTOCOL_ENTITY_VALUE) {
5013 		(void) pthread_mutex_unlock(&h->rh_lock);
5014 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
5015 	}
5016 
5017 	request.rpr_request = REP_PROTOCOL_ITER_READ_VALUE;
5018 	request.rpr_iterid = iter->iter_id;
5019 	request.rpr_sequence = iter->iter_sequence;
5020 
5021 	r = make_door_call(h, &request, sizeof (request),
5022 	    &response, sizeof (response));
5023 
5024 	if (r < 0) {
5025 		(void) pthread_mutex_unlock(&h->rh_lock);
5026 		DOOR_ERRORS_BLOCK(r);
5027 	}
5028 
5029 	if (response.rpr_response == REP_PROTOCOL_DONE) {
5030 		(void) pthread_mutex_unlock(&h->rh_lock);
5031 		return (0);
5032 	}
5033 	if (response.rpr_response != REP_PROTOCOL_SUCCESS) {
5034 		(void) pthread_mutex_unlock(&h->rh_lock);
5035 		return (scf_set_error(proto_error(response.rpr_response)));
5036 	}
5037 	iter->iter_sequence++;
5038 
5039 	v->value_type = response.rpr_type;
5040 
5041 	assert(scf_validate_encoded_value(response.rpr_type,
5042 	    response.rpr_value));
5043 
5044 	if (v->value_type != REP_PROTOCOL_TYPE_OPAQUE) {
5045 		(void) strlcpy(v->value_value, response.rpr_value,
5046 		    sizeof (v->value_value));
5047 	} else {
5048 		v->value_size = scf_opaque_decode(v->value_value,
5049 		    response.rpr_value, sizeof (v->value_value));
5050 	}
5051 	(void) pthread_mutex_unlock(&h->rh_lock);
5052 
5053 	return (1);
5054 }
5055 
5056 int
5057 scf_property_get_value(const scf_property_t *prop, scf_value_t *v)
5058 {
5059 	scf_handle_t *h = prop->rd_d.rd_handle;
5060 	struct rep_protocol_property_request request;
5061 	struct rep_protocol_value_response response;
5062 	int r;
5063 
5064 	if (h != v->value_handle)
5065 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
5066 
5067 	(void) pthread_mutex_lock(&h->rh_lock);
5068 
5069 	request.rpr_request = REP_PROTOCOL_PROPERTY_GET_VALUE;
5070 	request.rpr_entityid = prop->rd_d.rd_entity;
5071 
5072 	scf_value_reset_locked(v, 0);
5073 	datael_finish_reset(&prop->rd_d);
5074 
5075 	r = make_door_call(h, &request, sizeof (request),
5076 	    &response, sizeof (response));
5077 
5078 	if (r < 0) {
5079 		(void) pthread_mutex_unlock(&h->rh_lock);
5080 		DOOR_ERRORS_BLOCK(r);
5081 	}
5082 
5083 	if (response.rpr_response != REP_PROTOCOL_SUCCESS &&
5084 	    response.rpr_response != REP_PROTOCOL_FAIL_TRUNCATED) {
5085 		(void) pthread_mutex_unlock(&h->rh_lock);
5086 		assert(response.rpr_response !=
5087 		    REP_PROTOCOL_FAIL_TYPE_MISMATCH);
5088 		return (scf_set_error(proto_error(response.rpr_response)));
5089 	}
5090 
5091 	v->value_type = response.rpr_type;
5092 	if (v->value_type != REP_PROTOCOL_TYPE_OPAQUE) {
5093 		(void) strlcpy(v->value_value, response.rpr_value,
5094 		    sizeof (v->value_value));
5095 	} else {
5096 		v->value_size = scf_opaque_decode(v->value_value,
5097 		    response.rpr_value, sizeof (v->value_value));
5098 	}
5099 	(void) pthread_mutex_unlock(&h->rh_lock);
5100 	return ((response.rpr_response == REP_PROTOCOL_SUCCESS)?
5101 	    SCF_SUCCESS : scf_set_error(SCF_ERROR_CONSTRAINT_VIOLATED));
5102 }
5103 
5104 int
5105 scf_pg_get_parent_service(const scf_propertygroup_t *pg, scf_service_t *svc)
5106 {
5107 	return (datael_get_parent(&pg->rd_d, &svc->rd_d));
5108 }
5109 
5110 int
5111 scf_pg_get_parent_instance(const scf_propertygroup_t *pg, scf_instance_t *inst)
5112 {
5113 	return (datael_get_parent(&pg->rd_d, &inst->rd_d));
5114 }
5115 
5116 int
5117 scf_pg_get_parent_snaplevel(const scf_propertygroup_t *pg,
5118     scf_snaplevel_t *level)
5119 {
5120 	return (datael_get_parent(&pg->rd_d, &level->rd_d));
5121 }
5122 
5123 int
5124 scf_service_get_parent(const scf_service_t *svc, scf_scope_t *s)
5125 {
5126 	return (datael_get_parent(&svc->rd_d, &s->rd_d));
5127 }
5128 
5129 int
5130 scf_instance_get_parent(const scf_instance_t *inst, scf_service_t *svc)
5131 {
5132 	return (datael_get_parent(&inst->rd_d, &svc->rd_d));
5133 }
5134 
5135 int
5136 scf_snapshot_get_parent(const scf_snapshot_t *inst, scf_instance_t *svc)
5137 {
5138 	return (datael_get_parent(&inst->rd_d, &svc->rd_d));
5139 }
5140 
5141 int
5142 scf_snaplevel_get_parent(const scf_snaplevel_t *inst, scf_snapshot_t *svc)
5143 {
5144 	return (datael_get_parent(&inst->rd_d, &svc->rd_d));
5145 }
5146 
5147 /*
5148  * FMRI functions
5149  *
5150  * Note: In the scf_parse_svc_fmri(), scf_parse_file_fmri() and
5151  * scf_parse_fmri(), fmri isn't const because that would require
5152  * allocating memory. Also, note that scope, at least, is not necessarily
5153  * in the passed in fmri.
5154  */
5155 
5156 int
5157 scf_parse_svc_fmri(char *fmri, const char **scope, const char **service,
5158     const char **instance, const char **propertygroup, const char **property)
5159 {
5160 	char *s, *e, *te, *tpg;
5161 	char *my_s = NULL, *my_i = NULL, *my_pg = NULL, *my_p = NULL;
5162 
5163 	if (scope != NULL)
5164 		*scope = NULL;
5165 	if (service != NULL)
5166 		*service = NULL;
5167 	if (instance != NULL)
5168 		*instance = NULL;
5169 	if (propertygroup != NULL)
5170 		*propertygroup = NULL;
5171 	if (property != NULL)
5172 		*property = NULL;
5173 
5174 	s = fmri;
5175 	e = strchr(s, '\0');
5176 
5177 	if (strncmp(s, SCF_FMRI_SVC_PREFIX,
5178 	    sizeof (SCF_FMRI_SVC_PREFIX) - 1) == 0)
5179 		s += sizeof (SCF_FMRI_SVC_PREFIX) - 1;
5180 
5181 	if (strncmp(s, SCF_FMRI_SCOPE_PREFIX,
5182 	    sizeof (SCF_FMRI_SCOPE_PREFIX) - 1) == 0) {
5183 		char *my_scope;
5184 
5185 		s += sizeof (SCF_FMRI_SCOPE_PREFIX) - 1;
5186 		te = strstr(s, SCF_FMRI_SERVICE_PREFIX);
5187 		if (te == NULL)
5188 			te = e;
5189 
5190 		*te = 0;
5191 		my_scope = s;
5192 
5193 		s = te;
5194 		if (s < e)
5195 			s += sizeof (SCF_FMRI_SERVICE_PREFIX) - 1;
5196 
5197 		/* If the scope ends with the suffix, remove it. */
5198 		te = strstr(my_scope, SCF_FMRI_SCOPE_SUFFIX);
5199 		if (te != NULL && te[sizeof (SCF_FMRI_SCOPE_SUFFIX) - 1] == 0)
5200 			*te = 0;
5201 
5202 		/* Validate the scope. */
5203 		if (my_scope[0] == '\0')
5204 			my_scope = SCF_FMRI_LOCAL_SCOPE;
5205 		else if (uu_check_name(my_scope, 0) == -1) {
5206 			return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
5207 		}
5208 
5209 		if (scope != NULL)
5210 			*scope = my_scope;
5211 	} else {
5212 		if (scope != NULL)
5213 			*scope = SCF_FMRI_LOCAL_SCOPE;
5214 	}
5215 
5216 	if (s[0] != 0) {
5217 		if (strncmp(s, SCF_FMRI_SERVICE_PREFIX,
5218 		    sizeof (SCF_FMRI_SERVICE_PREFIX) - 1) == 0)
5219 			s += sizeof (SCF_FMRI_SERVICE_PREFIX) - 1;
5220 
5221 		/*
5222 		 * Can't validate service here because it might not be null
5223 		 * terminated.
5224 		 */
5225 		my_s = s;
5226 	}
5227 
5228 	tpg = strstr(s, SCF_FMRI_PROPERTYGRP_PREFIX);
5229 	te = strstr(s, SCF_FMRI_INSTANCE_PREFIX);
5230 	if (te != NULL && (tpg == NULL || te < tpg)) {
5231 		*te = 0;
5232 		te += sizeof (SCF_FMRI_INSTANCE_PREFIX) - 1;
5233 
5234 		/* Can't validate instance here either. */
5235 		my_i = s = te;
5236 
5237 		te = strstr(s, SCF_FMRI_PROPERTYGRP_PREFIX);
5238 	} else {
5239 		te = tpg;
5240 	}
5241 
5242 	if (te != NULL) {
5243 		*te = 0;
5244 		te += sizeof (SCF_FMRI_PROPERTYGRP_PREFIX) - 1;
5245 
5246 		my_pg = s = te;
5247 		te = strstr(s, SCF_FMRI_PROPERTY_PREFIX);
5248 		if (te != NULL) {
5249 			*te = 0;
5250 			te += sizeof (SCF_FMRI_PROPERTY_PREFIX) - 1;
5251 
5252 			my_p = te;
5253 			s = te;
5254 		}
5255 	}
5256 
5257 	if (my_s != NULL) {
5258 		if (uu_check_name(my_s, UU_NAME_DOMAIN | UU_NAME_PATH) == -1)
5259 			return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
5260 
5261 		if (service != NULL)
5262 			*service = my_s;
5263 	}
5264 
5265 	if (my_i != NULL) {
5266 		if (uu_check_name(my_i, UU_NAME_DOMAIN) == -1)
5267 			return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
5268 
5269 		if (instance != NULL)
5270 			*instance = my_i;
5271 	}
5272 
5273 	if (my_pg != NULL) {
5274 		if (uu_check_name(my_pg, UU_NAME_DOMAIN) == -1)
5275 			return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
5276 
5277 		if (propertygroup != NULL)
5278 			*propertygroup = my_pg;
5279 	}
5280 
5281 	if (my_p != NULL) {
5282 		if (uu_check_name(my_p, UU_NAME_DOMAIN) == -1)
5283 			return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
5284 
5285 		if (property != NULL)
5286 			*property = my_p;
5287 	}
5288 
5289 	return (0);
5290 }
5291 
5292 int
5293 scf_parse_file_fmri(char *fmri, const char **scope, const char **path)
5294 {
5295 	char *s, *e, *te;
5296 
5297 	if (scope != NULL)
5298 		*scope = NULL;
5299 
5300 	s = fmri;
5301 	e = strchr(s, '\0');
5302 
5303 	if (strncmp(s, SCF_FMRI_FILE_PREFIX,
5304 	    sizeof (SCF_FMRI_FILE_PREFIX) - 1) == 0)
5305 		s += sizeof (SCF_FMRI_FILE_PREFIX) - 1;
5306 
5307 	if (strncmp(s, SCF_FMRI_SCOPE_PREFIX,
5308 	    sizeof (SCF_FMRI_SCOPE_PREFIX) - 1) == 0) {
5309 		char *my_scope;
5310 
5311 		s += sizeof (SCF_FMRI_SCOPE_PREFIX) - 1;
5312 		te = strstr(s, SCF_FMRI_SERVICE_PREFIX);
5313 		if (te == NULL)
5314 			te = e;
5315 
5316 		*te = 0;
5317 		my_scope = s;
5318 
5319 		s = te;
5320 
5321 		/* Validate the scope. */
5322 		if (my_scope[0] != '\0' &&
5323 		    strcmp(my_scope, SCF_FMRI_LOCAL_SCOPE) != 0) {
5324 			return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
5325 		}
5326 
5327 		if (scope != NULL)
5328 			*scope = my_scope;
5329 	} else {
5330 		/*
5331 		 * FMRI paths must be absolute
5332 		 */
5333 		if (s[0] != '/')
5334 			return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
5335 	}
5336 
5337 	s += sizeof (SCF_FMRI_SERVICE_PREFIX) - 1;
5338 
5339 	if (s >= e)
5340 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
5341 
5342 	/*
5343 	 * If the user requests it, return the full path of the file.
5344 	 */
5345 	if (path != NULL) {
5346 		assert(s > fmri);
5347 		s[-1] = '/';
5348 		*path = s - 1;
5349 	}
5350 
5351 	return (0);
5352 }
5353 
5354 int
5355 scf_parse_fmri(char *fmri, int *type, const char **scope, const char **service,
5356     const char **instance, const char **propertygroup, const char **property)
5357 {
5358 	if (strncmp(fmri, SCF_FMRI_SVC_PREFIX,
5359 	    sizeof (SCF_FMRI_SVC_PREFIX) - 1) == 0) {
5360 		if (type)
5361 			*type = SCF_FMRI_TYPE_SVC;
5362 		return (scf_parse_svc_fmri(fmri, scope, service, instance,
5363 		    propertygroup, property));
5364 	} else if (strncmp(fmri, SCF_FMRI_FILE_PREFIX,
5365 	    sizeof (SCF_FMRI_FILE_PREFIX) - 1) == 0) {
5366 		if (type)
5367 			*type = SCF_FMRI_TYPE_FILE;
5368 		return (scf_parse_file_fmri(fmri, scope, NULL));
5369 	} else {
5370 		/*
5371 		 * Parse as a svc if the fmri type is not explicitly
5372 		 * specified.
5373 		 */
5374 		if (type)
5375 			*type = SCF_FMRI_TYPE_SVC;
5376 		return (scf_parse_svc_fmri(fmri, scope, service, instance,
5377 		    propertygroup, property));
5378 	}
5379 }
5380 
5381 /*
5382  * Fails with _INVALID_ARGUMENT.  fmri and buf may be equal.
5383  */
5384 ssize_t
5385 scf_canonify_fmri(const char *fmri, char *buf, size_t bufsz)
5386 {
5387 	const char *scope, *service, *instance, *pg, *property;
5388 	char local[6 * REP_PROTOCOL_NAME_LEN];
5389 	int r;
5390 	size_t len;
5391 
5392 	if (strlcpy(local, fmri, sizeof (local)) >= sizeof (local)) {
5393 		/* Should this be CONSTRAINT_VIOLATED? */
5394 		(void) scf_set_error(SCF_ERROR_INVALID_ARGUMENT);
5395 		return (-1);
5396 	}
5397 
5398 
5399 	r = scf_parse_svc_fmri(local, &scope, &service, &instance, &pg,
5400 	    &property);
5401 	if (r != 0)
5402 		return (-1);
5403 
5404 	len = strlcpy(buf, "svc:/", bufsz);
5405 
5406 	if (scope != NULL && strcmp(scope, SCF_SCOPE_LOCAL) != 0) {
5407 		len += strlcat(buf, "/", bufsz);
5408 		len += strlcat(buf, scope, bufsz);
5409 	}
5410 
5411 	if (service)
5412 		len += strlcat(buf, service, bufsz);
5413 
5414 	if (instance) {
5415 		len += strlcat(buf, ":", bufsz);
5416 		len += strlcat(buf, instance, bufsz);
5417 	}
5418 
5419 	if (pg) {
5420 		len += strlcat(buf, "/:properties/", bufsz);
5421 		len += strlcat(buf, pg, bufsz);
5422 	}
5423 
5424 	if (property) {
5425 		len += strlcat(buf, "/", bufsz);
5426 		len += strlcat(buf, property, bufsz);
5427 	}
5428 
5429 	return (len);
5430 }
5431 
5432 /*
5433  * Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _CONSTRAINT_VIOLATED,
5434  * _NOT_FOUND, _NOT_BOUND, _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED,
5435  * _NO_RESOURCES, _BACKEND_ACCESS.
5436  */
5437 int
5438 scf_handle_decode_fmri(scf_handle_t *h, const char *fmri, scf_scope_t *sc,
5439     scf_service_t *svc, scf_instance_t *inst, scf_propertygroup_t *pg,
5440     scf_property_t *prop, int flags)
5441 {
5442 	const char *scope, *service, *instance, *propertygroup, *property;
5443 	int last;
5444 	char local[6 * REP_PROTOCOL_NAME_LEN];
5445 	int ret;
5446 	const uint32_t holds = RH_HOLD_SCOPE | RH_HOLD_SERVICE |
5447 	    RH_HOLD_INSTANCE | RH_HOLD_PG | RH_HOLD_PROPERTY;
5448 
5449 	/*
5450 	 * verify that all handles match
5451 	 */
5452 	if ((sc != NULL && h != sc->rd_d.rd_handle) ||
5453 	    (svc != NULL && h != svc->rd_d.rd_handle) ||
5454 	    (inst != NULL && h != inst->rd_d.rd_handle) ||
5455 	    (pg != NULL && h != pg->rd_d.rd_handle) ||
5456 	    (prop != NULL && h != prop->rd_d.rd_handle))
5457 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
5458 
5459 	if (strlcpy(local, fmri, sizeof (local)) >= sizeof (local)) {
5460 		ret = scf_set_error(SCF_ERROR_INVALID_ARGUMENT);
5461 		goto reset_args;
5462 	}
5463 
5464 	/*
5465 	 * We can simply return from an error in parsing, because
5466 	 * scf_parse_fmri sets the error code correctly.
5467 	 */
5468 	if (scf_parse_svc_fmri(local, &scope, &service, &instance,
5469 	    &propertygroup, &property) == -1) {
5470 		ret = -1;
5471 		goto reset_args;
5472 	}
5473 
5474 	/*
5475 	 * the FMRI looks valid at this point -- do constraint checks.
5476 	 */
5477 
5478 	if (instance != NULL && (flags & SCF_DECODE_FMRI_REQUIRE_NO_INSTANCE)) {
5479 		ret = scf_set_error(SCF_ERROR_CONSTRAINT_VIOLATED);
5480 		goto reset_args;
5481 	}
5482 	if (instance == NULL && (flags & SCF_DECODE_FMRI_REQUIRE_INSTANCE)) {
5483 		ret = scf_set_error(SCF_ERROR_CONSTRAINT_VIOLATED);
5484 		goto reset_args;
5485 	}
5486 
5487 	if (prop != NULL)
5488 		last = REP_PROTOCOL_ENTITY_PROPERTY;
5489 	else if (pg != NULL)
5490 		last = REP_PROTOCOL_ENTITY_PROPERTYGRP;
5491 	else if (inst != NULL)
5492 		last = REP_PROTOCOL_ENTITY_INSTANCE;
5493 	else if (svc != NULL)
5494 		last = REP_PROTOCOL_ENTITY_SERVICE;
5495 	else if (sc != NULL)
5496 		last = REP_PROTOCOL_ENTITY_SCOPE;
5497 	else
5498 		last = REP_PROTOCOL_ENTITY_NONE;
5499 
5500 	if (flags & SCF_DECODE_FMRI_EXACT) {
5501 		int last_fmri;
5502 
5503 		if (property != NULL)
5504 			last_fmri = REP_PROTOCOL_ENTITY_PROPERTY;
5505 		else if (propertygroup != NULL)
5506 			last_fmri = REP_PROTOCOL_ENTITY_PROPERTYGRP;
5507 		else if (instance != NULL)
5508 			last_fmri = REP_PROTOCOL_ENTITY_INSTANCE;
5509 		else if (service != NULL)
5510 			last_fmri = REP_PROTOCOL_ENTITY_SERVICE;
5511 		else if (scope != NULL)
5512 			last_fmri = REP_PROTOCOL_ENTITY_SCOPE;
5513 		else
5514 			last_fmri = REP_PROTOCOL_ENTITY_NONE;
5515 
5516 		if (last != last_fmri) {
5517 			ret = scf_set_error(SCF_ERROR_CONSTRAINT_VIOLATED);
5518 			goto reset_args;
5519 		}
5520 	}
5521 
5522 	if ((flags & SCF_DECODE_FMRI_TRUNCATE) &&
5523 	    last == REP_PROTOCOL_ENTITY_NONE) {
5524 		ret = 0;				/* nothing to do */
5525 		goto reset_args;
5526 	}
5527 
5528 	if (!(flags & SCF_DECODE_FMRI_TRUNCATE))
5529 		last = REP_PROTOCOL_ENTITY_NONE;	/* never stop */
5530 
5531 	/*
5532 	 * passed the constraint checks -- try to grab the thing itself.
5533 	 */
5534 
5535 	handle_hold_subhandles(h, holds);
5536 	if (sc == NULL)
5537 		sc = h->rh_scope;
5538 	else
5539 		datael_reset(&sc->rd_d);
5540 
5541 	if (svc == NULL)
5542 		svc = h->rh_service;
5543 	else
5544 		datael_reset(&svc->rd_d);
5545 
5546 	if (inst == NULL)
5547 		inst = h->rh_instance;
5548 	else
5549 		datael_reset(&inst->rd_d);
5550 
5551 	if (pg == NULL)
5552 		pg = h->rh_pg;
5553 	else
5554 		datael_reset(&pg->rd_d);
5555 
5556 	if (prop == NULL)
5557 		prop = h->rh_property;
5558 	else
5559 		datael_reset(&prop->rd_d);
5560 
5561 	/*
5562 	 * We only support local scopes, but we check *after* getting
5563 	 * the local scope, so that any repository-related errors take
5564 	 * precedence.
5565 	 */
5566 	if (scf_handle_get_scope(h, SCF_SCOPE_LOCAL, sc) == -1) {
5567 		handle_rele_subhandles(h, holds);
5568 		ret = -1;
5569 		goto reset_args;
5570 	}
5571 
5572 	if (scope != NULL && strcmp(scope, SCF_FMRI_LOCAL_SCOPE) != 0) {
5573 		handle_rele_subhandles(h, holds);
5574 		ret = scf_set_error(SCF_ERROR_NOT_FOUND);
5575 		goto reset_args;
5576 	}
5577 
5578 
5579 	if (service == NULL || last == REP_PROTOCOL_ENTITY_SCOPE) {
5580 		handle_rele_subhandles(h, holds);
5581 		return (0);
5582 	}
5583 
5584 	if (scf_scope_get_service(sc, service, svc) == -1) {
5585 		handle_rele_subhandles(h, holds);
5586 		ret = -1;
5587 		assert(scf_error() != SCF_ERROR_NOT_SET);
5588 		if (scf_error() == SCF_ERROR_DELETED)
5589 			(void) scf_set_error(SCF_ERROR_NOT_FOUND);
5590 		goto reset_args;
5591 	}
5592 
5593 	if (last == REP_PROTOCOL_ENTITY_SERVICE) {
5594 		handle_rele_subhandles(h, holds);
5595 		return (0);
5596 	}
5597 
5598 	if (instance == NULL) {
5599 		if (propertygroup == NULL ||
5600 		    last == REP_PROTOCOL_ENTITY_INSTANCE) {
5601 			handle_rele_subhandles(h, holds);
5602 			return (0);
5603 		}
5604 
5605 		if (scf_service_get_pg(svc, propertygroup, pg) == -1) {
5606 			handle_rele_subhandles(h, holds);
5607 			ret = -1;
5608 			assert(scf_error() != SCF_ERROR_NOT_SET);
5609 			if (scf_error() == SCF_ERROR_DELETED)
5610 				(void) scf_set_error(SCF_ERROR_NOT_FOUND);
5611 			goto reset_args;
5612 		}
5613 	} else {
5614 		if (scf_service_get_instance(svc, instance, inst) == -1) {
5615 			handle_rele_subhandles(h, holds);
5616 			ret = -1;
5617 			assert(scf_error() != SCF_ERROR_NOT_SET);
5618 			if (scf_error() == SCF_ERROR_DELETED)
5619 				(void) scf_set_error(SCF_ERROR_NOT_FOUND);
5620 			goto reset_args;
5621 		}
5622 
5623 		if (propertygroup == NULL ||
5624 		    last == REP_PROTOCOL_ENTITY_INSTANCE) {
5625 			handle_rele_subhandles(h, holds);
5626 			return (0);
5627 		}
5628 
5629 		if (scf_instance_get_pg(inst, propertygroup, pg) == -1) {
5630 			handle_rele_subhandles(h, holds);
5631 			ret = -1;
5632 			assert(scf_error() != SCF_ERROR_NOT_SET);
5633 			if (scf_error() == SCF_ERROR_DELETED)
5634 				(void) scf_set_error(SCF_ERROR_NOT_FOUND);
5635 			goto reset_args;
5636 		}
5637 	}
5638 
5639 	if (property == NULL || last == REP_PROTOCOL_ENTITY_PROPERTYGRP) {
5640 		handle_rele_subhandles(h, holds);
5641 		return (0);
5642 	}
5643 
5644 	if (scf_pg_get_property(pg, property, prop) == -1) {
5645 		handle_rele_subhandles(h, holds);
5646 		ret = -1;
5647 		assert(scf_error() != SCF_ERROR_NOT_SET);
5648 		if (scf_error() == SCF_ERROR_DELETED)
5649 			(void) scf_set_error(SCF_ERROR_NOT_FOUND);
5650 		goto reset_args;
5651 	}
5652 
5653 	handle_rele_subhandles(h, holds);
5654 	return (0);
5655 
5656 reset_args:
5657 	if (sc != NULL)
5658 		datael_reset(&sc->rd_d);
5659 	if (svc != NULL)
5660 		datael_reset(&svc->rd_d);
5661 	if (inst != NULL)
5662 		datael_reset(&inst->rd_d);
5663 	if (pg != NULL)
5664 		datael_reset(&pg->rd_d);
5665 	if (prop != NULL)
5666 		datael_reset(&prop->rd_d);
5667 
5668 	return (ret);
5669 }
5670 
5671 /*
5672  * Fails with _NOT_BOUND, _CONNECTION_BROKEN, _INTERNAL (server response too
5673  * big, bad entity id, request not applicable to entity, name too long for
5674  * buffer), _NOT_SET, or _DELETED.
5675  */
5676 ssize_t
5677 scf_scope_to_fmri(const scf_scope_t *scope, char *out, size_t sz)
5678 {
5679 	ssize_t r, len;
5680 
5681 	char tmp[REP_PROTOCOL_NAME_LEN];
5682 
5683 	r = scf_scope_get_name(scope, tmp, sizeof (tmp));
5684 
5685 	if (r <= 0)
5686 		return (r);
5687 
5688 	len = strlcpy(out, SCF_FMRI_SVC_PREFIX, sz);
5689 	if (strcmp(tmp, SCF_FMRI_LOCAL_SCOPE) != 0) {
5690 		if (len >= sz)
5691 			return (len + r + sizeof (SCF_FMRI_SCOPE_SUFFIX) - 1);
5692 
5693 		len = strlcat(out, tmp, sz);
5694 		if (len >= sz)
5695 			return (len + sizeof (SCF_FMRI_SCOPE_SUFFIX) - 1);
5696 		len = strlcat(out,
5697 		    SCF_FMRI_SCOPE_SUFFIX SCF_FMRI_SERVICE_PREFIX, sz);
5698 	}
5699 
5700 	return (len);
5701 }
5702 
5703 /*
5704  * Fails with _NOT_BOUND, _CONNECTION_BROKEN, _INTERNAL (server response too
5705  * big, bad element id, bad ids, bad types, scope has no parent, request not
5706  * applicable to entity, name too long), _NOT_SET, _DELETED,
5707  */
5708 ssize_t
5709 scf_service_to_fmri(const scf_service_t *svc, char *out, size_t sz)
5710 {
5711 	scf_handle_t *h = svc->rd_d.rd_handle;
5712 	scf_scope_t *scope = HANDLE_HOLD_SCOPE(h);
5713 	ssize_t r, len;
5714 
5715 	char tmp[REP_PROTOCOL_NAME_LEN];
5716 
5717 	r = datael_get_parent(&svc->rd_d, &scope->rd_d);
5718 	if (r != SCF_SUCCESS) {
5719 		HANDLE_RELE_SCOPE(h);
5720 
5721 		assert(scf_error() != SCF_ERROR_HANDLE_MISMATCH);
5722 		return (-1);
5723 	}
5724 	if (out != NULL && sz > 0)
5725 		len = scf_scope_to_fmri(scope, out, sz);
5726 	else
5727 		len = scf_scope_to_fmri(scope, tmp, 2);
5728 
5729 	HANDLE_RELE_SCOPE(h);
5730 
5731 	if (len < 0)
5732 		return (-1);
5733 
5734 	if (out == NULL || len >= sz)
5735 		len += sizeof (SCF_FMRI_SERVICE_PREFIX) - 1;
5736 	else
5737 		len = strlcat(out, SCF_FMRI_SERVICE_PREFIX, sz);
5738 
5739 	r = scf_service_get_name(svc, tmp, sizeof (tmp));
5740 	if (r < 0)
5741 		return (r);
5742 
5743 	if (out == NULL || len >= sz)
5744 		len += r;
5745 	else
5746 		len = strlcat(out, tmp, sz);
5747 
5748 	return (len);
5749 }
5750 
5751 ssize_t
5752 scf_instance_to_fmri(const scf_instance_t *inst, char *out, size_t sz)
5753 {
5754 	scf_handle_t *h = inst->rd_d.rd_handle;
5755 	scf_service_t *svc = HANDLE_HOLD_SERVICE(h);
5756 	ssize_t r, len;
5757 
5758 	char tmp[REP_PROTOCOL_NAME_LEN];
5759 
5760 	r = datael_get_parent(&inst->rd_d, &svc->rd_d);
5761 	if (r != SCF_SUCCESS) {
5762 		HANDLE_RELE_SERVICE(h);
5763 		return (-1);
5764 	}
5765 
5766 	len = scf_service_to_fmri(svc, out, sz);
5767 
5768 	HANDLE_RELE_SERVICE(h);
5769 
5770 	if (len < 0)
5771 		return (len);
5772 
5773 	if (len >= sz)
5774 		len += sizeof (SCF_FMRI_INSTANCE_PREFIX) - 1;
5775 	else
5776 		len = strlcat(out, SCF_FMRI_INSTANCE_PREFIX, sz);
5777 
5778 	r = scf_instance_get_name(inst, tmp, sizeof (tmp));
5779 	if (r < 0)
5780 		return (r);
5781 
5782 	if (len >= sz)
5783 		len += r;
5784 	else
5785 		len = strlcat(out, tmp, sz);
5786 
5787 	return (len);
5788 }
5789 
5790 ssize_t
5791 scf_pg_to_fmri(const scf_propertygroup_t *pg, char *out, size_t sz)
5792 {
5793 	scf_handle_t *h = pg->rd_d.rd_handle;
5794 
5795 	struct rep_protocol_entity_parent_type request;
5796 	struct rep_protocol_integer_response response;
5797 
5798 	char tmp[REP_PROTOCOL_NAME_LEN];
5799 	ssize_t len, r;
5800 
5801 	(void) pthread_mutex_lock(&h->rh_lock);
5802 	request.rpr_request = REP_PROTOCOL_ENTITY_PARENT_TYPE;
5803 	request.rpr_entityid = pg->rd_d.rd_entity;
5804 
5805 	datael_finish_reset(&pg->rd_d);
5806 	r = make_door_call(h, &request, sizeof (request),
5807 	    &response, sizeof (response));
5808 	(void) pthread_mutex_unlock(&h->rh_lock);
5809 
5810 	if (r < 0)
5811 		DOOR_ERRORS_BLOCK(r);
5812 
5813 	if (response.rpr_response != REP_PROTOCOL_SUCCESS ||
5814 	    r < sizeof (response)) {
5815 		return (scf_set_error(proto_error(response.rpr_response)));
5816 	}
5817 
5818 	switch (response.rpr_value) {
5819 	case REP_PROTOCOL_ENTITY_SERVICE: {
5820 		scf_service_t *svc;
5821 
5822 		svc = HANDLE_HOLD_SERVICE(h);
5823 
5824 		r = datael_get_parent(&pg->rd_d, &svc->rd_d);
5825 
5826 		if (r == SCF_SUCCESS)
5827 			len = scf_service_to_fmri(svc, out, sz);
5828 
5829 		HANDLE_RELE_SERVICE(h);
5830 		break;
5831 	}
5832 
5833 	case REP_PROTOCOL_ENTITY_INSTANCE: {
5834 		scf_instance_t *inst;
5835 
5836 		inst = HANDLE_HOLD_INSTANCE(h);
5837 
5838 		r = datael_get_parent(&pg->rd_d, &inst->rd_d);
5839 
5840 		if (r == SCF_SUCCESS)
5841 			len = scf_instance_to_fmri(inst, out, sz);
5842 
5843 		HANDLE_RELE_INSTANCE(h);
5844 		break;
5845 	}
5846 
5847 	case REP_PROTOCOL_ENTITY_SNAPLEVEL: {
5848 		scf_instance_t *inst = HANDLE_HOLD_INSTANCE(h);
5849 		scf_snapshot_t *snap = HANDLE_HOLD_SNAPSHOT(h);
5850 		scf_snaplevel_t *level = HANDLE_HOLD_SNAPLVL(h);
5851 
5852 		r = datael_get_parent(&pg->rd_d, &level->rd_d);
5853 
5854 		if (r == SCF_SUCCESS)
5855 			r = datael_get_parent(&level->rd_d, &snap->rd_d);
5856 
5857 		if (r == SCF_SUCCESS)
5858 			r = datael_get_parent(&snap->rd_d, &inst->rd_d);
5859 
5860 		if (r == SCF_SUCCESS)
5861 			len = scf_instance_to_fmri(inst, out, sz);
5862 
5863 		HANDLE_RELE_INSTANCE(h);
5864 		HANDLE_RELE_SNAPSHOT(h);
5865 		HANDLE_RELE_SNAPLVL(h);
5866 		break;
5867 	}
5868 
5869 	default:
5870 		return (scf_set_error(SCF_ERROR_INTERNAL));
5871 	}
5872 
5873 	if (r != SCF_SUCCESS)
5874 		return (r);
5875 
5876 	if (len >= sz)
5877 		len += sizeof (SCF_FMRI_PROPERTYGRP_PREFIX) - 1;
5878 	else
5879 		len = strlcat(out, SCF_FMRI_PROPERTYGRP_PREFIX, sz);
5880 
5881 	r = scf_pg_get_name(pg, tmp, sizeof (tmp));
5882 
5883 	if (r < 0)
5884 		return (r);
5885 
5886 	if (len >= sz)
5887 		len += r;
5888 	else
5889 		len = strlcat(out, tmp, sz);
5890 
5891 	return (len);
5892 }
5893 
5894 ssize_t
5895 scf_property_to_fmri(const scf_property_t *prop, char *out, size_t sz)
5896 {
5897 	scf_handle_t *h = prop->rd_d.rd_handle;
5898 	scf_propertygroup_t *pg = HANDLE_HOLD_PG(h);
5899 
5900 	char tmp[REP_PROTOCOL_NAME_LEN];
5901 	ssize_t len;
5902 	int r;
5903 
5904 	r = datael_get_parent(&prop->rd_d, &pg->rd_d);
5905 	if (r != SCF_SUCCESS) {
5906 		HANDLE_RELE_PG(h);
5907 		return (-1);
5908 	}
5909 
5910 	len = scf_pg_to_fmri(pg, out, sz);
5911 
5912 	HANDLE_RELE_PG(h);
5913 
5914 	if (len >= sz)
5915 		len += sizeof (SCF_FMRI_PROPERTY_PREFIX) - 1;
5916 	else
5917 		len = strlcat(out, SCF_FMRI_PROPERTY_PREFIX, sz);
5918 
5919 	r = scf_property_get_name(prop, tmp, sizeof (tmp));
5920 
5921 	if (r < 0)
5922 		return (r);
5923 
5924 	if (len >= sz)
5925 		len += r;
5926 	else
5927 		len = strlcat(out, tmp, sz);
5928 
5929 	return (len);
5930 }
5931 
5932 /*
5933  * Fails with _HANDLE_MISMATCH, _NOT_BOUND, _CONNECTION_BROKEN, _INTERNAL
5934  * (server response too big, bad entity id, request not applicable to entity,
5935  * name too long for buffer, bad element id, iter already exists, element
5936  * cannot have children of type, type is invalid, iter was reset, sequence
5937  * was bad, iter walks values, iter does not walk type entities),
5938  * _NOT_SET, _DELETED, or _CONSTRAINT_VIOLATED,
5939  * _NOT_FOUND (scope has no parent),  _INVALID_ARGUMENT, _NO_RESOURCES,
5940  * _BACKEND_ACCESS.
5941  */
5942 int
5943 scf_pg_get_underlying_pg(const scf_propertygroup_t *pg,
5944     scf_propertygroup_t *out)
5945 {
5946 	scf_handle_t *h = pg->rd_d.rd_handle;
5947 	scf_service_t *svc;
5948 	scf_instance_t *inst;
5949 
5950 	char me[REP_PROTOCOL_NAME_LEN];
5951 	int r;
5952 
5953 	if (h != out->rd_d.rd_handle)
5954 		return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
5955 
5956 	r = scf_pg_get_name(pg, me, sizeof (me));
5957 
5958 	if (r < 0)
5959 		return (r);
5960 
5961 	svc = HANDLE_HOLD_SERVICE(h);
5962 	inst = HANDLE_HOLD_INSTANCE(h);
5963 
5964 	r = datael_get_parent(&pg->rd_d, &inst->rd_d);
5965 
5966 	if (r == SCF_SUCCESS) {
5967 		r = datael_get_parent(&inst->rd_d, &svc->rd_d);
5968 		if (r != SCF_SUCCESS) {
5969 			goto out;
5970 		}
5971 		r = scf_service_get_pg(svc, me, out);
5972 	} else {
5973 		r = scf_set_error(SCF_ERROR_NOT_FOUND);
5974 	}
5975 
5976 out:
5977 	HANDLE_RELE_SERVICE(h);
5978 	HANDLE_RELE_INSTANCE(h);
5979 	return (r);
5980 }
5981 
5982 #define	LEGACY_SCHEME	"lrc:"
5983 #define	LEGACY_UNKNOWN	"unknown"
5984 
5985 /*
5986  * Implementation of scf_walk_fmri()
5987  *
5988  * This is a little tricky due to the many-to-many relationship between patterns
5989  * and matches.  We need to be able to satisfy the following requirements:
5990  *
5991  * 	1) Detect patterns which match more than one FMRI, and be able to
5992  *         report which FMRIs have been matched.
5993  * 	2) Detect patterns which have not matched any FMRIs
5994  * 	3) Visit each matching FMRI exactly once across all patterns
5995  * 	4) Ignore FMRIs which have only been matched due to multiply-matching
5996  *         patterns.
5997  *
5998  * We maintain an array of scf_pattern_t structures, one for each argument, and
5999  * maintain a linked list of scf_match_t structures for each one.  We first
6000  * qualify each pattern's type:
6001  *
6002  *	PATTERN_INVALID		The argument is invalid (too long).
6003  *
6004  *	PATTERN_EXACT		The pattern is a complete FMRI.  The list of
6005  *				matches contains only a single entry.
6006  *
6007  * 	PATTERN_GLOB		The pattern will be matched against all
6008  * 				FMRIs via fnmatch() in the second phase.
6009  * 				Matches will be added to the pattern's list
6010  * 				as they are found.
6011  *
6012  * 	PATTERN_PARTIAL		Everything else.  We will assume that this is
6013  * 				an abbreviated FMRI, and match according to
6014  * 				our abbreviated FMRI rules.  Matches will be
6015  * 				added to the pattern's list as they are found.
6016  *
6017  * The first pass searches for arguments that are complete FMRIs.  These are
6018  * classified as EXACT patterns and do not necessitate searching the entire
6019  * tree.
6020  *
6021  * Once this is done, if we have any GLOB or PARTIAL patterns (or if no
6022  * arguments were given), we iterate over all services and instances in the
6023  * repository, looking for matches.
6024  *
6025  * When a match is found, we add the match to the pattern's list.  We also enter
6026  * the match into a hash table, resulting in something like this:
6027  *
6028  *       scf_pattern_t       scf_match_t
6029  *     +---------------+      +-------+     +-------+
6030  *     | pattern 'foo' |----->| match |---->| match |
6031  *     +---------------+      +-------+     +-------+
6032  *                                |             |
6033  *           scf_match_key_t      |             |
6034  *           +--------------+     |             |
6035  *           | FMRI bar/foo |<----+             |
6036  *           +--------------+                   |
6037  *           | FMRI baz/foo |<------------------+
6038  *           +--------------+
6039  *
6040  * Once we have all of this set up, we do one pass to report patterns matching
6041  * multiple FMRIs (if SCF_WALK_MULTIPLE is not set) and patterns for which no
6042  * match was found.
6043  *
6044  * Finally, we walk through all valid patterns, and for each match, if we
6045  * haven't already seen the match (as recorded in the hash table), then we
6046  * execute the callback.
6047  */
6048 
6049 struct scf_matchkey;
6050 struct scf_match;
6051 
6052 /*
6053  * scf_matchkey_t
6054  */
6055 typedef struct scf_matchkey {
6056 	char			*sk_fmri;	/* Matching FMRI */
6057 	char			*sk_legacy;	/* Legacy name */
6058 	int			sk_seen;	/* If we've been seen */
6059 	struct scf_matchkey	*sk_next;	/* Next in hash chain */
6060 } scf_matchkey_t;
6061 
6062 /*
6063  * scf_match_t
6064  */
6065 typedef struct scf_match {
6066 	scf_matchkey_t		*sm_key;
6067 	struct scf_match	*sm_next;
6068 } scf_match_t;
6069 
6070 #define	WALK_HTABLE_SIZE	123
6071 
6072 /*
6073  * scf_get_key()
6074  *
6075  * Given an FMRI and a hash table, returns the scf_matchkey_t corresponding to
6076  * this FMRI.  If the FMRI does not exist, it is added to the hash table.  If a
6077  * new entry cannot be allocated due to lack of memory, NULL is returned.
6078  */
6079 static scf_matchkey_t *
6080 scf_get_key(scf_matchkey_t **htable, const char *fmri, const char *legacy)
6081 {
6082 	uint_t h = 0, g;
6083 	const char *p, *k;
6084 	scf_matchkey_t *key;
6085 
6086 	k = strstr(fmri, ":/");
6087 	assert(k != NULL);
6088 	k += 2;
6089 
6090 	/*
6091 	 * Generic hash function from uts/common/os/modhash.c.
6092 	 */
6093 	for (p = k; *p != '\0'; ++p) {
6094 		h = (h << 4) + *p;
6095 		if ((g = (h & 0xf0000000)) != 0) {
6096 			h ^= (g >> 24);
6097 			h ^= g;
6098 		}
6099 	}
6100 
6101 	h %= WALK_HTABLE_SIZE;
6102 
6103 	/*
6104 	 * Search for an existing key
6105 	 */
6106 	for (key = htable[h]; key != NULL; key = key->sk_next) {
6107 		if (strcmp(key->sk_fmri, fmri) == 0)
6108 			return (key);
6109 	}
6110 
6111 	if ((key = calloc(sizeof (scf_matchkey_t), 1)) == NULL)
6112 		return (NULL);
6113 
6114 	/*
6115 	 * Add new key to hash table.
6116 	 */
6117 	if ((key->sk_fmri = strdup(fmri)) == NULL) {
6118 		free(key);
6119 		return (NULL);
6120 	}
6121 
6122 	if (legacy == NULL) {
6123 		key->sk_legacy = NULL;
6124 	} else if ((key->sk_legacy = strdup(legacy)) == NULL) {
6125 		free(key->sk_fmri);
6126 		free(key);
6127 		return (NULL);
6128 	}
6129 
6130 	key->sk_next = htable[h];
6131 	htable[h] = key;
6132 
6133 	return (key);
6134 }
6135 
6136 /*
6137  * Given an FMRI, insert it into the pattern's list appropriately.
6138  * svc_explicit indicates whether matching services should take
6139  * precedence over matching instances.
6140  */
6141 static scf_error_t
6142 scf_add_match(scf_matchkey_t **htable, const char *fmri, const char *legacy,
6143     scf_pattern_t *pattern, int svc_explicit)
6144 {
6145 	scf_match_t *match;
6146 
6147 	/*
6148 	 * If svc_explicit is set, enforce the constaint that matching
6149 	 * instances take precedence over matching services. Otherwise,
6150 	 * matching services take precedence over matching instances.
6151 	 */
6152 	if (svc_explicit) {
6153 		scf_match_t *next, *prev;
6154 		/*
6155 		 * If we match an instance, check to see if we must remove
6156 		 * any matching services (for SCF_WALK_EXPLICIT).
6157 		 */
6158 		for (prev = match = pattern->sp_matches; match != NULL;
6159 		    match = next) {
6160 			size_t len = strlen(match->sm_key->sk_fmri);
6161 			next = match->sm_next;
6162 			if (strncmp(match->sm_key->sk_fmri, fmri, len) == 0 &&
6163 			    fmri[len] == ':') {
6164 				if (prev == match)
6165 					pattern->sp_matches = match->sm_next;
6166 				else
6167 					prev->sm_next = match->sm_next;
6168 				pattern->sp_matchcount--;
6169 				free(match);
6170 			} else
6171 				prev = match;
6172 		}
6173 	} else {
6174 		/*
6175 		 * If we've matched a service don't add any instances (for
6176 		 * SCF_WALK_SERVICE).
6177 		 */
6178 		for (match = pattern->sp_matches; match != NULL;
6179 		    match = match->sm_next) {
6180 			size_t len = strlen(match->sm_key->sk_fmri);
6181 			if (strncmp(match->sm_key->sk_fmri, fmri, len) == 0 &&
6182 			    fmri[len] == ':')
6183 				return (0);
6184 		}
6185 	}
6186 
6187 	if ((match = malloc(sizeof (scf_match_t))) == NULL)
6188 		return (SCF_ERROR_NO_MEMORY);
6189 
6190 	if ((match->sm_key = scf_get_key(htable, fmri, legacy)) == NULL) {
6191 		free(match);
6192 		return (SCF_ERROR_NO_MEMORY);
6193 	}
6194 
6195 	match->sm_next = pattern->sp_matches;
6196 	pattern->sp_matches = match;
6197 	pattern->sp_matchcount++;
6198 
6199 	return (0);
6200 }
6201 
6202 /*
6203  * Returns 1 if the fmri matches the given pattern, 0 otherwise.
6204  */
6205 int
6206 scf_cmp_pattern(char *fmri, scf_pattern_t *pattern)
6207 {
6208 	char *tmp;
6209 
6210 	if (pattern->sp_type == PATTERN_GLOB) {
6211 		if (fnmatch(pattern->sp_arg, fmri, 0) == 0)
6212 			return (1);
6213 	} else if (pattern->sp_type == PATTERN_PARTIAL &&
6214 	    (tmp = strstr(fmri, pattern->sp_arg)) != NULL) {
6215 		/*
6216 		 * We only allow partial matches anchored on the end of
6217 		 * a service or instance, and beginning on an element
6218 		 * boundary.
6219 		 */
6220 		if (tmp != fmri && tmp[-1] != '/' && tmp[-1] != ':' &&
6221 		    tmp[0] != ':')
6222 			return (0);
6223 		tmp += strlen(pattern->sp_arg);
6224 		if (tmp != fmri + strlen(fmri) && tmp[0] != ':' &&
6225 		    tmp[-1] != ':')
6226 			return (0);
6227 
6228 		/*
6229 		 * If the user has supplied a short pattern that matches
6230 		 * 'svc:/' or 'lrc:/', ignore it.
6231 		 */
6232 		if (tmp <= fmri + 4)
6233 			return (0);
6234 
6235 		return (1);
6236 	}
6237 
6238 	return (0);
6239 }
6240 
6241 /*
6242  * Attempts to match the given FMRI against a set of patterns, keeping track of
6243  * the results.
6244  */
6245 static scf_error_t
6246 scf_pattern_match(scf_matchkey_t **htable, char *fmri, const char *legacy,
6247     int npattern, scf_pattern_t *pattern, int svc_explicit)
6248 {
6249 	int i;
6250 	int ret = 0;
6251 
6252 	for (i = 0; i < npattern; i++) {
6253 		if (scf_cmp_pattern(fmri, &pattern[i]) &&
6254 		    (ret = scf_add_match(htable, fmri,
6255 		    legacy, &pattern[i], svc_explicit)) != 0)
6256 			return (ret);
6257 	}
6258 
6259 	return (0);
6260 }
6261 
6262 /*
6263  * Fails with _INVALID_ARGUMENT, _HANDLE_DESTROYED, _INTERNAL (bad server
6264  * response or id in use), _NO_MEMORY, _HANDLE_MISMATCH, _CONSTRAINT_VIOLATED,
6265  * _NOT_FOUND, _NOT_BOUND, _CONNECTION_BROKEN, _NOT_SET, _DELETED,
6266  * _NO_RESOURCES, _BACKEND_ACCESS, _TYPE_MISMATCH.
6267  */
6268 scf_error_t
6269 scf_walk_fmri(scf_handle_t *h, int argc, char **argv, int flags,
6270     scf_walk_callback callback, void *data, int *err,
6271     void (*errfunc)(const char *, ...))
6272 {
6273 	scf_pattern_t *pattern = NULL;
6274 	int i;
6275 	char *fmri = NULL;
6276 	ssize_t max_fmri_length;
6277 	scf_service_t *svc = NULL;
6278 	scf_instance_t *inst = NULL;
6279 	scf_iter_t *iter = NULL, *sciter = NULL, *siter = NULL;
6280 	scf_scope_t *scope = NULL;
6281 	scf_propertygroup_t *pg = NULL;
6282 	scf_property_t *prop = NULL;
6283 	scf_value_t *value = NULL;
6284 	int ret = 0;
6285 	scf_matchkey_t **htable = NULL;
6286 	int pattern_search = 0;
6287 	ssize_t max_name_length;
6288 	char *pgname = NULL;
6289 	scf_walkinfo_t info;
6290 	boolean_t partial_fmri = B_FALSE;
6291 	boolean_t wildcard_fmri = B_FALSE;
6292 
6293 #ifndef NDEBUG
6294 	if (flags & SCF_WALK_EXPLICIT)
6295 		assert(flags & SCF_WALK_SERVICE);
6296 	if (flags & SCF_WALK_NOINSTANCE)
6297 		assert(flags & SCF_WALK_SERVICE);
6298 	if (flags & SCF_WALK_PROPERTY)
6299 		assert(!(flags & SCF_WALK_LEGACY));
6300 #endif
6301 
6302 	/*
6303 	 * Setup initial variables
6304 	 */
6305 	max_fmri_length = scf_limit(SCF_LIMIT_MAX_FMRI_LENGTH);
6306 	assert(max_fmri_length != -1);
6307 	max_name_length = scf_limit(SCF_LIMIT_MAX_NAME_LENGTH);
6308 	assert(max_name_length != -1);
6309 
6310 	if ((fmri = malloc(max_fmri_length + 1)) == NULL ||
6311 	    (pgname = malloc(max_name_length + 1)) == NULL) {
6312 		ret = SCF_ERROR_NO_MEMORY;
6313 		goto error;
6314 	}
6315 
6316 	if (argc == 0) {
6317 		pattern = NULL;
6318 	} else if ((pattern = calloc(argc, sizeof (scf_pattern_t)))
6319 	    == NULL) {
6320 		ret = SCF_ERROR_NO_MEMORY;
6321 		goto error;
6322 	}
6323 
6324 	if ((htable = calloc(WALK_HTABLE_SIZE, sizeof (void *))) == NULL) {
6325 		ret = SCF_ERROR_NO_MEMORY;
6326 		goto error;
6327 	}
6328 
6329 	if ((inst = scf_instance_create(h)) == NULL ||
6330 	    (svc = scf_service_create(h)) == NULL ||
6331 	    (iter = scf_iter_create(h)) == NULL ||
6332 	    (sciter = scf_iter_create(h)) == NULL ||
6333 	    (siter = scf_iter_create(h)) == NULL ||
6334 	    (scope = scf_scope_create(h)) == NULL ||
6335 	    (pg = scf_pg_create(h)) == NULL ||
6336 	    (prop = scf_property_create(h)) == NULL ||
6337 	    (value = scf_value_create(h)) == NULL) {
6338 		ret = scf_error();
6339 		goto error;
6340 	}
6341 
6342 	/*
6343 	 * For each fmri given, we first check to see if it's a full service,
6344 	 * instance, property group, or property FMRI.  This avoids having to do
6345 	 * the (rather expensive) walk of all instances.  Any element which does
6346 	 * not match a full fmri is identified as a globbed pattern or a partial
6347 	 * fmri and stored in a private array when walking instances.
6348 	 */
6349 	for (i = 0; i < argc; i++) {
6350 		const char *scope_name, *svc_name, *inst_name, *pg_name;
6351 		const char *prop_name;
6352 
6353 		if (strlen(argv[i]) > max_fmri_length) {
6354 			errfunc(scf_get_msg(SCF_MSG_ARGTOOLONG), argv[i]);
6355 			if (err != NULL)
6356 				*err = UU_EXIT_FATAL;
6357 			continue;
6358 		}
6359 
6360 		(void) strcpy(fmri, argv[i]);
6361 		if (scf_parse_svc_fmri(fmri, &scope_name, &svc_name, &inst_name,
6362 		    &pg_name, &prop_name) != SCF_SUCCESS)
6363 			goto badfmri;
6364 
6365 		/*
6366 		 * If the user has specified SCF_WALK_PROPERTY, allow property
6367 		 * groups and properties.
6368 		 */
6369 		if (pg_name != NULL || prop_name != NULL) {
6370 			if (!(flags & SCF_WALK_PROPERTY))
6371 				goto badfmri;
6372 
6373 			if (scf_handle_decode_fmri(h, argv[i], NULL, NULL,
6374 			    NULL, pg, prop, 0) != 0)
6375 				goto badfmri;
6376 
6377 			if (scf_pg_get_name(pg, NULL, 0) < 0 &&
6378 			    scf_property_get_name(prop, NULL, 0) < 0)
6379 				goto badfmri;
6380 
6381 			if (scf_canonify_fmri(argv[i], fmri, max_fmri_length)
6382 			    <= 0) {
6383 				/*
6384 				 * scf_parse_fmri() should have caught this.
6385 				 */
6386 				abort();
6387 			}
6388 
6389 			if ((ret = scf_add_match(htable, fmri, NULL,
6390 			    &pattern[i], flags & SCF_WALK_EXPLICIT)) != 0)
6391 				goto error;
6392 
6393 			if ((pattern[i].sp_arg = strdup(argv[i])) == NULL) {
6394 				ret = SCF_ERROR_NO_MEMORY;
6395 				goto error;
6396 			}
6397 			pattern[i].sp_type = PATTERN_EXACT;
6398 		}
6399 
6400 		/*
6401 		 * We need at least a service name
6402 		 */
6403 		if (scope_name == NULL || svc_name == NULL)
6404 			goto badfmri;
6405 
6406 		/*
6407 		 * If we have a fully qualified instance, add it to our list of
6408 		 * fmris to watch.
6409 		 */
6410 		if (inst_name != NULL) {
6411 			if (flags & SCF_WALK_NOINSTANCE)
6412 				goto badfmri;
6413 
6414 			if (scf_handle_decode_fmri(h, argv[i], NULL, NULL,
6415 			    inst, NULL, NULL, SCF_DECODE_FMRI_EXACT) != 0)
6416 				goto badfmri;
6417 
6418 			if (scf_canonify_fmri(argv[i], fmri, max_fmri_length)
6419 			    <= 0)
6420 				goto badfmri;
6421 
6422 			if ((ret = scf_add_match(htable, fmri, NULL,
6423 			    &pattern[i], flags & SCF_WALK_EXPLICIT)) != 0)
6424 				goto error;
6425 
6426 			if ((pattern[i].sp_arg = strdup(argv[i])) == NULL) {
6427 				ret = SCF_ERROR_NO_MEMORY;
6428 				goto error;
6429 			}
6430 			pattern[i].sp_type = PATTERN_EXACT;
6431 
6432 			continue;
6433 		}
6434 
6435 		if (scf_handle_decode_fmri(h, argv[i], NULL, svc,
6436 		    NULL, NULL, NULL, SCF_DECODE_FMRI_EXACT) !=
6437 		    SCF_SUCCESS)
6438 			goto badfmri;
6439 
6440 		/*
6441 		 * If the user allows for bare services, then simply
6442 		 * pass this service on.
6443 		 */
6444 		if (flags & SCF_WALK_SERVICE) {
6445 			if (scf_service_to_fmri(svc, fmri,
6446 			    max_fmri_length + 1) <= 0) {
6447 				ret = scf_error();
6448 				goto error;
6449 			}
6450 
6451 			if ((ret = scf_add_match(htable, fmri, NULL,
6452 			    &pattern[i], flags & SCF_WALK_EXPLICIT)) != 0)
6453 				goto error;
6454 
6455 			if ((pattern[i].sp_arg = strdup(argv[i]))
6456 			    == NULL) {
6457 				ret = SCF_ERROR_NO_MEMORY;
6458 				goto error;
6459 			}
6460 			pattern[i].sp_type = PATTERN_EXACT;
6461 			continue;
6462 		}
6463 
6464 		if (flags & SCF_WALK_NOINSTANCE)
6465 			goto badfmri;
6466 
6467 		/*
6468 		 * Otherwise, iterate over all instances in the service.
6469 		 */
6470 		if (scf_iter_service_instances(iter, svc) !=
6471 		    SCF_SUCCESS) {
6472 			ret = scf_error();
6473 			goto error;
6474 		}
6475 
6476 		for (;;) {
6477 			ret = scf_iter_next_instance(iter, inst);
6478 			if (ret == 0)
6479 				break;
6480 			if (ret != 1) {
6481 				ret = scf_error();
6482 				goto error;
6483 			}
6484 
6485 			if (scf_instance_to_fmri(inst, fmri,
6486 			    max_fmri_length + 1) == -1)
6487 				goto badfmri;
6488 
6489 			if ((ret = scf_add_match(htable, fmri, NULL,
6490 			    &pattern[i], flags & SCF_WALK_EXPLICIT)) != 0)
6491 				goto error;
6492 		}
6493 
6494 		if ((pattern[i].sp_arg = strdup(argv[i])) == NULL) {
6495 			ret = SCF_ERROR_NO_MEMORY;
6496 			goto error;
6497 		}
6498 		pattern[i].sp_type = PATTERN_EXACT;
6499 		partial_fmri = B_TRUE;	/* we just iterated all instances */
6500 
6501 		continue;
6502 
6503 badfmri:
6504 
6505 		/*
6506 		 * If we got here because of a fatal error, bail out
6507 		 * immediately.
6508 		 */
6509 		if (scf_error() == SCF_ERROR_CONNECTION_BROKEN) {
6510 			ret = scf_error();
6511 			goto error;
6512 		}
6513 
6514 		/*
6515 		 * At this point we failed to interpret the argument as a
6516 		 * complete fmri, so mark it as a partial or globbed FMRI for
6517 		 * later processing.
6518 		 */
6519 		if (strpbrk(argv[i], "*?[") != NULL) {
6520 			/*
6521 			 * Prepend svc:/ to patterns which don't begin with * or
6522 			 * svc: or lrc:.
6523 			 */
6524 			wildcard_fmri = B_TRUE;
6525 			pattern[i].sp_type = PATTERN_GLOB;
6526 			if (argv[i][0] == '*' ||
6527 			    (strlen(argv[i]) >= 4 && argv[i][3] == ':'))
6528 				pattern[i].sp_arg = strdup(argv[i]);
6529 			else {
6530 				pattern[i].sp_arg = malloc(strlen(argv[i]) + 6);
6531 				if (pattern[i].sp_arg != NULL)
6532 					(void) snprintf(pattern[i].sp_arg,
6533 					    strlen(argv[i]) + 6, "svc:/%s",
6534 					    argv[i]);
6535 			}
6536 		} else {
6537 			partial_fmri = B_TRUE;
6538 			pattern[i].sp_type = PATTERN_PARTIAL;
6539 			pattern[i].sp_arg = strdup(argv[i]);
6540 		}
6541 		pattern_search = 1;
6542 		if (pattern[i].sp_arg == NULL) {
6543 			ret = SCF_ERROR_NO_MEMORY;
6544 			goto error;
6545 		}
6546 	}
6547 
6548 	if (pattern_search || argc == 0) {
6549 		/*
6550 		 * We have a set of patterns to search for.  Iterate over all
6551 		 * instances and legacy services searching for matches.
6552 		 */
6553 		if (scf_handle_get_local_scope(h, scope) != 0) {
6554 			ret = scf_error();
6555 			goto error;
6556 		}
6557 
6558 		if (scf_iter_scope_services(sciter, scope) != 0) {
6559 			ret = scf_error();
6560 			goto error;
6561 		}
6562 
6563 		for (;;) {
6564 			ret = scf_iter_next_service(sciter, svc);
6565 			if (ret == 0)
6566 				break;
6567 			if (ret != 1) {
6568 				ret = scf_error();
6569 				goto error;
6570 			}
6571 
6572 			if (flags & SCF_WALK_SERVICE) {
6573 				/*
6574 				 * If the user is requesting bare services, try
6575 				 * to match the service first.
6576 				 */
6577 				if (scf_service_to_fmri(svc, fmri,
6578 				    max_fmri_length + 1) < 0) {
6579 					ret = scf_error();
6580 					goto error;
6581 				}
6582 
6583 				if (argc == 0) {
6584 					info.fmri = fmri;
6585 					info.scope = scope;
6586 					info.svc = svc;
6587 					info.inst = NULL;
6588 					info.pg = NULL;
6589 					info.prop = NULL;
6590 					if ((ret = callback(data, &info)) != 0)
6591 						goto error;
6592 					continue;
6593 				} else if ((ret = scf_pattern_match(htable,
6594 				    fmri, NULL, argc, pattern,
6595 				    flags & SCF_WALK_EXPLICIT)) != 0) {
6596 					goto error;
6597 				}
6598 			}
6599 
6600 			if (flags & SCF_WALK_NOINSTANCE)
6601 				continue;
6602 
6603 			/*
6604 			 * Iterate over all instances in the service.
6605 			 */
6606 			if (scf_iter_service_instances(siter, svc) != 0) {
6607 				if (scf_error() != SCF_ERROR_DELETED) {
6608 					ret = scf_error();
6609 					goto error;
6610 				}
6611 				continue;
6612 			}
6613 
6614 			for (;;) {
6615 				ret = scf_iter_next_instance(siter, inst);
6616 				if (ret == 0)
6617 					break;
6618 				if (ret != 1) {
6619 					if (scf_error() != SCF_ERROR_DELETED) {
6620 						ret = scf_error();
6621 						goto error;
6622 					}
6623 					break;
6624 				}
6625 
6626 				if (scf_instance_to_fmri(inst, fmri,
6627 				    max_fmri_length + 1) < 0) {
6628 					ret = scf_error();
6629 					goto error;
6630 				}
6631 
6632 				/*
6633 				 * Without arguments, execute the callback
6634 				 * immediately.
6635 				 */
6636 				if (argc == 0) {
6637 					info.fmri = fmri;
6638 					info.scope = scope;
6639 					info.svc = svc;
6640 					info.inst = inst;
6641 					info.pg = NULL;
6642 					info.prop = NULL;
6643 					if ((ret = callback(data, &info)) != 0)
6644 						goto error;
6645 				} else if ((ret = scf_pattern_match(htable,
6646 				    fmri, NULL, argc, pattern,
6647 				    flags & SCF_WALK_EXPLICIT)) != 0) {
6648 					goto error;
6649 				}
6650 			}
6651 		}
6652 
6653 		/*
6654 		 * Search legacy services
6655 		 */
6656 		if ((flags & SCF_WALK_LEGACY)) {
6657 			if (scf_scope_get_service(scope, SCF_LEGACY_SERVICE,
6658 			    svc) != 0) {
6659 				if (scf_error() != SCF_ERROR_NOT_FOUND) {
6660 					ret = scf_error();
6661 					goto error;
6662 				}
6663 
6664 				goto nolegacy;
6665 			}
6666 
6667 			if (scf_iter_service_pgs_typed(iter, svc,
6668 			    SCF_GROUP_FRAMEWORK) != SCF_SUCCESS) {
6669 				ret = scf_error();
6670 				goto error;
6671 			}
6672 
6673 			(void) strcpy(fmri, LEGACY_SCHEME);
6674 
6675 			for (;;) {
6676 				ret = scf_iter_next_pg(iter, pg);
6677 				if (ret == -1) {
6678 					ret = scf_error();
6679 					goto error;
6680 				}
6681 				if (ret == 0)
6682 					break;
6683 
6684 				if (scf_pg_get_property(pg,
6685 				    SCF_LEGACY_PROPERTY_NAME, prop) == -1) {
6686 					ret = scf_error();
6687 					if (ret == SCF_ERROR_DELETED ||
6688 					    ret == SCF_ERROR_NOT_FOUND) {
6689 						ret = 0;
6690 						continue;
6691 					}
6692 					goto error;
6693 				}
6694 
6695 				if (scf_property_is_type(prop, SCF_TYPE_ASTRING)
6696 				    != SCF_SUCCESS) {
6697 					if (scf_error() == SCF_ERROR_DELETED)
6698 						continue;
6699 					ret = scf_error();
6700 					goto error;
6701 				}
6702 
6703 				if (scf_property_get_value(prop, value) !=
6704 				    SCF_SUCCESS)
6705 					continue;
6706 
6707 				if (scf_value_get_astring(value,
6708 				    fmri + sizeof (LEGACY_SCHEME) - 1,
6709 				    max_fmri_length + 2 -
6710 				    sizeof (LEGACY_SCHEME)) <= 0)
6711 					continue;
6712 
6713 				if (scf_pg_get_name(pg, pgname,
6714 				    max_name_length + 1) <= 0) {
6715 					if (scf_error() == SCF_ERROR_DELETED)
6716 						continue;
6717 					ret = scf_error();
6718 					goto error;
6719 				}
6720 
6721 				if (argc == 0) {
6722 					info.fmri = fmri;
6723 					info.scope = scope;
6724 					info.svc = NULL;
6725 					info.inst = NULL;
6726 					info.pg = pg;
6727 					info.prop = NULL;
6728 					if ((ret = callback(data, &info)) != 0)
6729 						goto error;
6730 				} else if ((ret = scf_pattern_match(htable,
6731 				    fmri, pgname, argc, pattern,
6732 				    flags & SCF_WALK_EXPLICIT)) != 0)
6733 					goto error;
6734 			}
6735 
6736 		}
6737 	}
6738 nolegacy:
6739 	ret = 0;
6740 
6741 	if (argc == 0)
6742 		goto error;
6743 
6744 	/*
6745 	 * Check all patterns, and see if we have that any that didn't match
6746 	 * or any that matched multiple instances.  For svcprop, add up the
6747 	 * total number of matching keys.
6748 	 */
6749 	info.count = 0;
6750 	for (i = 0; i < argc; i++) {
6751 		scf_match_t *match;
6752 
6753 		if (pattern[i].sp_type == PATTERN_INVALID)
6754 			continue;
6755 		if (pattern[i].sp_matchcount == 0) {
6756 			scf_msg_t msgid;
6757 			/*
6758 			 * Provide a useful error message based on the argument
6759 			 * and the type of entity requested.
6760 			 */
6761 			if (!(flags & SCF_WALK_LEGACY) &&
6762 			    strncmp(pattern[i].sp_arg, "lrc:/", 5) == 0)
6763 				msgid = SCF_MSG_PATTERN_LEGACY;
6764 			else if (flags & SCF_WALK_PROPERTY)
6765 				msgid = SCF_MSG_PATTERN_NOENTITY;
6766 			else if (flags & SCF_WALK_NOINSTANCE)
6767 				msgid = SCF_MSG_PATTERN_NOSERVICE;
6768 			else if (flags & SCF_WALK_SERVICE)
6769 				msgid = SCF_MSG_PATTERN_NOINSTSVC;
6770 			else
6771 				msgid = SCF_MSG_PATTERN_NOINSTANCE;
6772 
6773 			errfunc(scf_get_msg(msgid), pattern[i].sp_arg);
6774 			if (err)
6775 				*err = UU_EXIT_FATAL;
6776 		} else if (!(flags & SCF_WALK_MULTIPLE) &&
6777 		    pattern[i].sp_matchcount > 1) {
6778 			size_t len, off;
6779 			char *msg;
6780 
6781 			/*
6782 			 * Construct a message with all possible FMRIs before
6783 			 * passing off to error handling function.
6784 			 *
6785 			 * Note that strlen(scf_get_msg(...)) includes the
6786 			 * length of '%s', which accounts for the terminating
6787 			 * null byte.
6788 			 */
6789 			len = strlen(scf_get_msg(SCF_MSG_PATTERN_MULTIMATCH)) +
6790 			    strlen(pattern[i].sp_arg);
6791 			for (match = pattern[i].sp_matches; match != NULL;
6792 			    match = match->sm_next) {
6793 				len += strlen(match->sm_key->sk_fmri) + 2;
6794 			}
6795 			if ((msg = malloc(len)) == NULL) {
6796 				ret = SCF_ERROR_NO_MEMORY;
6797 				goto error;
6798 			}
6799 
6800 			/* LINTED - format argument */
6801 			(void) snprintf(msg, len,
6802 			    scf_get_msg(SCF_MSG_PATTERN_MULTIMATCH),
6803 			    pattern[i].sp_arg);
6804 			off = strlen(msg);
6805 			for (match = pattern[i].sp_matches; match != NULL;
6806 			    match = match->sm_next) {
6807 				off += snprintf(msg + off, len - off, "\t%s\n",
6808 				    match->sm_key->sk_fmri);
6809 			}
6810 
6811 			errfunc(msg);
6812 			if (err != NULL)
6813 				*err = UU_EXIT_FATAL;
6814 
6815 			free(msg);
6816 		} else {
6817 			for (match = pattern[i].sp_matches; match != NULL;
6818 			    match = match->sm_next) {
6819 				if (!match->sm_key->sk_seen)
6820 					info.count++;
6821 				match->sm_key->sk_seen = 1;
6822 			}
6823 		}
6824 	}
6825 
6826 	if (flags & SCF_WALK_UNIPARTIAL && info.count > 1) {
6827 		/*
6828 		 * If the SCF_WALK_UNIPARTIAL flag was passed in and we have
6829 		 * more than one fmri, then this is an error if we matched
6830 		 * because of a partial fmri parameter, unless we also matched
6831 		 * more than one fmri because of wildcards in the parameters.
6832 		 * That is, the presence of wildcards indicates that it is ok
6833 		 * to match more than one fmri in this case.
6834 		 * For example, a parameter of 'foo' that matches more than
6835 		 * one fmri is an error, but parameters of 'foo *bar*' that
6836 		 * matches more than one is fine.
6837 		 */
6838 		if (partial_fmri && !wildcard_fmri) {
6839 			errfunc(scf_get_msg(SCF_MSG_PATTERN_MULTIPARTIAL));
6840 			if (err != NULL)
6841 				*err = UU_EXIT_FATAL;
6842 			goto error;
6843 		}
6844 	}
6845 
6846 	/*
6847 	 * Clear 'sk_seen' for all keys.
6848 	 */
6849 	for (i = 0; i < WALK_HTABLE_SIZE; i++) {
6850 		scf_matchkey_t *key;
6851 		for (key = htable[i]; key != NULL; key = key->sk_next)
6852 			key->sk_seen = 0;
6853 	}
6854 
6855 	/*
6856 	 * Iterate over all the FMRIs in our hash table and execute the
6857 	 * callback.
6858 	 */
6859 	for (i = 0; i < argc; i++) {
6860 		scf_match_t *match;
6861 		scf_matchkey_t *key;
6862 
6863 		/*
6864 		 * Ignore patterns which didn't match anything or matched too
6865 		 * many FMRIs.
6866 		 */
6867 		if (pattern[i].sp_matchcount == 0 ||
6868 		    (!(flags & SCF_WALK_MULTIPLE) &&
6869 		    pattern[i].sp_matchcount > 1))
6870 			continue;
6871 
6872 		for (match = pattern[i].sp_matches; match != NULL;
6873 		    match = match->sm_next) {
6874 
6875 			key = match->sm_key;
6876 			if (key->sk_seen)
6877 				continue;
6878 
6879 			key->sk_seen = 1;
6880 
6881 			if (key->sk_legacy != NULL) {
6882 				if (scf_scope_get_service(scope,
6883 				    "smf/legacy_run", svc) != 0) {
6884 					ret = scf_error();
6885 					goto error;
6886 				}
6887 
6888 				if (scf_service_get_pg(svc, key->sk_legacy,
6889 				    pg) != 0)
6890 					continue;
6891 
6892 				info.fmri = key->sk_fmri;
6893 				info.scope = scope;
6894 				info.svc = NULL;
6895 				info.inst = NULL;
6896 				info.pg = pg;
6897 				info.prop = NULL;
6898 				if ((ret = callback(data, &info)) != 0)
6899 					goto error;
6900 			} else {
6901 				if (scf_handle_decode_fmri(h, key->sk_fmri,
6902 				    scope, svc, inst, pg, prop, 0) !=
6903 				    SCF_SUCCESS)
6904 					continue;
6905 
6906 				info.fmri = key->sk_fmri;
6907 				info.scope = scope;
6908 				info.svc = svc;
6909 				if (scf_instance_get_name(inst, NULL, 0) < 0) {
6910 					if (scf_error() ==
6911 					    SCF_ERROR_CONNECTION_BROKEN) {
6912 						ret = scf_error();
6913 						goto error;
6914 					}
6915 					info.inst = NULL;
6916 				} else {
6917 					info.inst = inst;
6918 				}
6919 				if (scf_pg_get_name(pg, NULL, 0) < 0) {
6920 					if (scf_error() ==
6921 					    SCF_ERROR_CONNECTION_BROKEN) {
6922 						ret = scf_error();
6923 						goto error;
6924 					}
6925 					info.pg = NULL;
6926 				} else {
6927 					info.pg = pg;
6928 				}
6929 				if (scf_property_get_name(prop, NULL, 0) < 0) {
6930 					if (scf_error() ==
6931 					    SCF_ERROR_CONNECTION_BROKEN) {
6932 						ret = scf_error();
6933 						goto error;
6934 					}
6935 					info.prop = NULL;
6936 				} else {
6937 					info.prop = prop;
6938 				}
6939 
6940 				if ((ret = callback(data, &info)) != 0)
6941 					goto error;
6942 			}
6943 		}
6944 	}
6945 
6946 error:
6947 	if (htable) {
6948 		scf_matchkey_t *key, *next;
6949 
6950 		for (i = 0; i < WALK_HTABLE_SIZE; i++) {
6951 
6952 			for (key = htable[i]; key != NULL;
6953 			    key = next) {
6954 
6955 				next = key->sk_next;
6956 
6957 				if (key->sk_fmri != NULL)
6958 					free(key->sk_fmri);
6959 				if (key->sk_legacy != NULL)
6960 					free(key->sk_legacy);
6961 				free(key);
6962 			}
6963 		}
6964 		free(htable);
6965 	}
6966 	if (pattern != NULL) {
6967 		for (i = 0; i < argc; i++) {
6968 			scf_match_t *match, *next;
6969 
6970 			if (pattern[i].sp_arg != NULL)
6971 				free(pattern[i].sp_arg);
6972 
6973 			for (match = pattern[i].sp_matches; match != NULL;
6974 			    match = next) {
6975 
6976 				next = match->sm_next;
6977 
6978 				free(match);
6979 			}
6980 		}
6981 		free(pattern);
6982 	}
6983 
6984 	free(fmri);
6985 	free(pgname);
6986 
6987 	scf_value_destroy(value);
6988 	scf_property_destroy(prop);
6989 	scf_pg_destroy(pg);
6990 	scf_scope_destroy(scope);
6991 	scf_iter_destroy(siter);
6992 	scf_iter_destroy(sciter);
6993 	scf_iter_destroy(iter);
6994 	scf_instance_destroy(inst);
6995 	scf_service_destroy(svc);
6996 
6997 	return (ret);
6998 }
6999 
7000 /*
7001  * scf_encode32() is an implementation of Base32 encoding as described in
7002  * section 6 of RFC 4648 - "The Base16, Base32, and Base64 Data
7003  * Encodings". See http://www.ietf.org/rfc/rfc4648.txt?number=4648.  The
7004  * input stream is divided into groups of 5 characters (40 bits).  Each
7005  * group is encoded into 8 output characters where each output character
7006  * represents 5 bits of input.
7007  *
7008  * If the input is not an even multiple of 5 characters, the output will be
7009  * padded so that the output is an even multiple of 8 characters.  The
7010  * standard specifies that the pad character is '='.  Unfortunately, '=' is
7011  * not a legal character in SMF property names.  Thus, the caller can
7012  * specify an alternate pad character with the pad argument.  If pad is 0,
7013  * scf_encode32() will use '='.  Note that use of anything other than '='
7014  * produces output that is not in conformance with RFC 4648.  It is
7015  * suitable, however, for internal use of SMF software.  When the encoded
7016  * data is used as part of an SMF property name, SCF_ENCODE32_PAD should be
7017  * used as the pad character.
7018  *
7019  * Arguments:
7020  *	input -		Address of the buffer to be encoded.
7021  *	inlen -		Number of characters at input.
7022  *	output -	Address of the buffer to receive the encoded data.
7023  *	outmax -	Size of the buffer at output.
7024  *	outlen -	If it is not NULL, outlen receives the number of
7025  *			bytes placed in output.
7026  *	pad -		Alternate padding character.
7027  *
7028  * Returns:
7029  *	0	Buffer was successfully encoded.
7030  *	-1	Indicates output buffer too small, or pad is one of the
7031  *		standard encoding characters.
7032  */
7033 int
7034 scf_encode32(const char *input, size_t inlen, char *output, size_t outmax,
7035     size_t *outlen, char pad)
7036 {
7037 	uint_t group_size = 5;
7038 	uint_t i;
7039 	const unsigned char *in = (const unsigned char *)input;
7040 	size_t olen;
7041 	uchar_t *out = (uchar_t *)output;
7042 	uint_t oval;
7043 	uint_t pad_count;
7044 
7045 	/* Verify that there is enough room for the output. */
7046 	olen = ((inlen + (group_size - 1)) / group_size) * 8;
7047 	if (outlen)
7048 		*outlen = olen;
7049 	if (olen > outmax)
7050 		return (-1);
7051 
7052 	/* If caller did not provide pad character, use the default. */
7053 	if (pad == 0) {
7054 		pad = '=';
7055 	} else {
7056 		/*
7057 		 * Make sure that caller's pad is not one of the encoding
7058 		 * characters.
7059 		 */
7060 		for (i = 0; i < sizeof (base32) - 1; i++) {
7061 			if (pad == base32[i])
7062 				return (-1);
7063 		}
7064 	}
7065 
7066 	/* Process full groups capturing 5 bits per output character. */
7067 	for (; inlen >= group_size; in += group_size, inlen -= group_size) {
7068 		/*
7069 		 * The comments in this section number the bits in an
7070 		 * 8 bit byte 0 to 7.  The high order bit is bit 7 and
7071 		 * the low order bit is bit 0.
7072 		 */
7073 
7074 		/* top 5 bits (7-3) from in[0] */
7075 		*out++ = base32[in[0] >> 3];
7076 		/* bits 2-0 from in[0] and top 2 (7-6) from in[1] */
7077 		*out++ = base32[((in[0] << 2) & 0x1c) | (in[1] >> 6)];
7078 		/* 5 bits (5-1) from in[1] */
7079 		*out++ = base32[(in[1] >> 1) & 0x1f];
7080 		/* low bit (0) from in[1] and top 4 (7-4) from in[2] */
7081 		*out++ = base32[((in[1] << 4) & 0x10) | ((in[2] >> 4) & 0xf)];
7082 		/* low 4 (3-0) from in[2] and top bit (7) from in[3] */
7083 		*out++ = base32[((in[2] << 1) & 0x1e) | (in[3] >> 7)];
7084 		/* 5 bits (6-2) from in[3] */
7085 		*out++ = base32[(in[3] >> 2) & 0x1f];
7086 		/* low 2 (1-0) from in[3] and top 3 (7-5) from in[4] */
7087 		*out++ = base32[((in[3] << 3) & 0x18) | (in[4] >> 5)];
7088 		/* low 5 (4-0) from in[4] */
7089 		*out++ = base32[in[4] & 0x1f];
7090 	}
7091 
7092 	/* Take care of final input bytes. */
7093 	pad_count = 0;
7094 	if (inlen) {
7095 		/* top 5 bits (7-3) from in[0] */
7096 		*out++ = base32[in[0] >> 3];
7097 		/*
7098 		 * low 3 (2-0) from in[0] and top 2 (7-6) from in[1] if
7099 		 * available.
7100 		 */
7101 		oval = (in[0] << 2) & 0x1c;
7102 		if (inlen == 1) {
7103 			*out++ = base32[oval];
7104 			pad_count = 6;
7105 			goto padout;
7106 		}
7107 		oval |= in[1] >> 6;
7108 		*out++ = base32[oval];
7109 		/* 5 bits (5-1) from in[1] */
7110 		*out++ = base32[(in[1] >> 1) & 0x1f];
7111 		/*
7112 		 * low bit (0) from in[1] and top 4 (7-4) from in[2] if
7113 		 * available.
7114 		 */
7115 		oval = (in[1] << 4) & 0x10;
7116 		if (inlen == 2) {
7117 			*out++ = base32[oval];
7118 			pad_count = 4;
7119 			goto padout;
7120 		}
7121 		oval |= in[2] >> 4;
7122 		*out++ = base32[oval];
7123 		/*
7124 		 * low 4 (3-0) from in[2] and top 1 (7) from in[3] if
7125 		 * available.
7126 		 */
7127 		oval = (in[2] << 1) & 0x1e;
7128 		if (inlen == 3) {
7129 			*out++ = base32[oval];
7130 			pad_count = 3;
7131 			goto padout;
7132 		}
7133 		oval |= in[3] >> 7;
7134 		*out++ = base32[oval];
7135 		/* 5 bits (6-2) from in[3] */
7136 		*out++ = base32[(in[3] >> 2) & 0x1f];
7137 		/* low 2 bits (1-0) from in[3] */
7138 		*out++ = base32[(in[3] << 3) & 0x18];
7139 		pad_count = 1;
7140 	}
7141 padout:
7142 	/*
7143 	 * Pad the output so that it is a multiple of 8 bytes.
7144 	 */
7145 	for (; pad_count > 0; pad_count--) {
7146 		*out++ = pad;
7147 	}
7148 
7149 	/*
7150 	 * Null terminate the output if there is enough room.
7151 	 */
7152 	if (olen < outmax)
7153 		*out = 0;
7154 
7155 	return (0);
7156 }
7157 
7158 /*
7159  * scf_decode32() is an implementation of Base32 decoding as described in
7160  * section 6 of RFC 4648 - "The Base16, Base32, and Base64 Data
7161  * Encodings". See http://www.ietf.org/rfc/rfc4648.txt?number=4648.  The
7162  * input stream is divided into groups of 8 encoded characters.  Each
7163  * encoded character represents 5 bits of data.  Thus, the 8 encoded
7164  * characters are used to produce 40 bits or 5 bytes of unencoded data in
7165  * outbuf.
7166  *
7167  * If the encoder did not have enough data to generate a mulitple of 8
7168  * characters of encoded data, it used a pad character to get to the 8
7169  * character boundry. The standard specifies that the pad character is '='.
7170  * Unfortunately, '=' is not a legal character in SMF property names.
7171  * Thus, the caller can specify an alternate pad character with the pad
7172  * argument.  If pad is 0, scf_decode32() will use '='.  Note that use of
7173  * anything other than '=' is not in conformance with RFC 4648.  It is
7174  * suitable, however, for internal use of SMF software.  When the encoded
7175  * data is used in SMF property names, SCF_ENCODE32_PAD should be used as
7176  * the pad character.
7177  *
7178  * Arguments:
7179  *	in -		Buffer of encoded characters.
7180  *	inlen -		Number of characters at in.
7181  *	outbuf -	Buffer to receive the decoded bytes.  It can be the
7182  *			same buffer as in.
7183  *	outmax -	Size of the buffer at outbuf.
7184  *	outlen -	If it is not NULL, outlen receives the number of
7185  *			bytes placed in output.
7186  *	pad -		Alternate padding character.
7187  *
7188  * Returns:
7189  *	0	Buffer was successfully decoded.
7190  *	-1	Indicates an invalid input character, output buffer too
7191  *		small, or pad is one of the standard encoding characters.
7192  */
7193 int
7194 scf_decode32(const char *in, size_t inlen, char *outbuf, size_t outmax,
7195     size_t *outlen, char pad)
7196 {
7197 	char *bufend = outbuf + outmax;
7198 	char c;
7199 	uint_t count;
7200 	uint32_t g[DECODE32_GS];
7201 	size_t i;
7202 	uint_t j;
7203 	char *out = outbuf;
7204 	boolean_t pad_seen = B_FALSE;
7205 
7206 	/* If caller did not provide pad character, use the default. */
7207 	if (pad == 0) {
7208 		pad = '=';
7209 	} else {
7210 		/*
7211 		 * Make sure that caller's pad is not one of the encoding
7212 		 * characters.
7213 		 */
7214 		for (i = 0; i < sizeof (base32) - 1; i++) {
7215 			if (pad == base32[i])
7216 				return (-1);
7217 		}
7218 	}
7219 
7220 	i = 0;
7221 	while ((i < inlen) && (out < bufend)) {
7222 		/* Get a group of input characters. */
7223 		for (j = 0, count = 0;
7224 		    (j < DECODE32_GS) && (i < inlen);
7225 		    i++) {
7226 			c = in[i];
7227 			/*
7228 			 * RFC 4648 allows for the encoded data to be split
7229 			 * into multiple lines, so skip carriage returns
7230 			 * and new lines.
7231 			 */
7232 			if ((c == '\r') || (c == '\n'))
7233 				continue;
7234 			if ((pad_seen == B_TRUE) && (c != pad)) {
7235 				/* Group not completed by pads */
7236 				return (-1);
7237 			}
7238 			if ((c < 0) || (c >= sizeof (index32))) {
7239 				/* Illegal character. */
7240 				return (-1);
7241 			}
7242 			if (c == pad) {
7243 				pad_seen = B_TRUE;
7244 				continue;
7245 			}
7246 			if ((g[j++] = index32[c]) == 0xff) {
7247 				/* Illegal character */
7248 				return (-1);
7249 			}
7250 			count++;
7251 		}
7252 
7253 		/* Pack the group into five 8 bit bytes. */
7254 		if ((count >= 2) && (out < bufend)) {
7255 			/*
7256 			 * Output byte 0:
7257 			 *	5 bits (7-3) from g[0]
7258 			 *	3 bits (2-0) from g[1] (4-2)
7259 			 */
7260 			*out++ = (g[0] << 3) | ((g[1] >> 2) & 0x7);
7261 		}
7262 		if ((count >= 4) && (out < bufend)) {
7263 			/*
7264 			 * Output byte 1:
7265 			 *	2 bits (7-6) from g[1] (1-0)
7266 			 *	5 bits (5-1) from g[2] (4-0)
7267 			 *	1 bit (0) from g[3] (4)
7268 			 */
7269 			*out++ = (g[1] << 6) | (g[2] << 1) | \
7270 			    ((g[3] >> 4) & 0x1);
7271 		}
7272 		if ((count >= 5) && (out < bufend)) {
7273 			/*
7274 			 * Output byte 2:
7275 			 *	4 bits (7-4) from g[3] (3-0)
7276 			 *	4 bits (3-0) from g[4] (4-1)
7277 			 */
7278 			*out++ = (g[3] << 4) | ((g[4] >> 1) & 0xf);
7279 		}
7280 		if ((count >= 7) && (out < bufend)) {
7281 			/*
7282 			 * Output byte 3:
7283 			 *	1 bit (7) from g[4] (0)
7284 			 *	5 bits (6-2) from g[5] (4-0)
7285 			 *	2 bits (0-1) from g[6] (4-3)
7286 			 */
7287 			*out++ = (g[4] << 7) | (g[5] << 2) |
7288 			    ((g[6] >> 3) & 0x3);
7289 		}
7290 		if ((count == 8) && (out < bufend)) {
7291 			/*
7292 			 * Output byte 4;
7293 			 *	3 bits (7-5) from g[6] (2-0)
7294 			 *	5 bits (4-0) from g[7] (4-0)
7295 			 */
7296 			*out++ = (g[6] << 5) | g[7];
7297 		}
7298 	}
7299 	if (i < inlen) {
7300 		/* Did not process all input characters. */
7301 		return (-1);
7302 	}
7303 	if (outlen)
7304 		*outlen = out - outbuf;
7305 	/* Null terminate the output if there is room. */
7306 	if (out < bufend)
7307 		*out = 0;
7308 	return (0);
7309 }
7310 
7311 
7312 /*
7313  * _scf_request_backup:  a simple wrapper routine
7314  */
7315 int
7316 _scf_request_backup(scf_handle_t *h, const char *name)
7317 {
7318 	struct rep_protocol_backup_request request;
7319 	struct rep_protocol_response response;
7320 
7321 	int r;
7322 
7323 	if (strlcpy(request.rpr_name, name, sizeof (request.rpr_name)) >=
7324 	    sizeof (request.rpr_name))
7325 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
7326 
7327 	(void) pthread_mutex_lock(&h->rh_lock);
7328 	request.rpr_request = REP_PROTOCOL_BACKUP;
7329 	request.rpr_changeid = handle_next_changeid(h);
7330 
7331 	r = make_door_call(h, &request, sizeof (request),
7332 	    &response, sizeof (response));
7333 	(void) pthread_mutex_unlock(&h->rh_lock);
7334 
7335 	if (r < 0) {
7336 		DOOR_ERRORS_BLOCK(r);
7337 	}
7338 
7339 	if (response.rpr_response != REP_PROTOCOL_SUCCESS)
7340 		return (scf_set_error(proto_error(response.rpr_response)));
7341 	return (SCF_SUCCESS);
7342 }
7343 
7344 /*
7345  * Request svc.configd daemon to switch repository database.
7346  *
7347  * Can fail:
7348  *
7349  *	_NOT_BOUND		handle is not bound
7350  *	_CONNECTION_BROKEN	server is not reachable
7351  *	_INTERNAL		file operation error
7352  *				the server response is too big
7353  *	_PERMISSION_DENIED	not enough privileges to do request
7354  *	_BACKEND_READONLY	backend is not writable
7355  *	_BACKEND_ACCESS		backend access fails
7356  *	_NO_RESOURCES		svc.configd is out of memory
7357  */
7358 int
7359 _scf_repository_switch(scf_handle_t *h, int scf_sw)
7360 {
7361 	struct rep_protocol_switch_request request;
7362 	struct rep_protocol_response response;
7363 	int	r;
7364 
7365 	/*
7366 	 * Setup request protocol and make door call
7367 	 * Hold rh_lock lock before handle_next_changeid call
7368 	 */
7369 	(void) pthread_mutex_lock(&h->rh_lock);
7370 
7371 	request.rpr_flag = scf_sw;
7372 	request.rpr_request = REP_PROTOCOL_SWITCH;
7373 	request.rpr_changeid = handle_next_changeid(h);
7374 
7375 	r = make_door_call(h, &request, sizeof (request),
7376 	    &response, sizeof (response));
7377 
7378 	(void) pthread_mutex_unlock(&h->rh_lock);
7379 
7380 	if (r < 0) {
7381 		DOOR_ERRORS_BLOCK(r);
7382 	}
7383 
7384 	/*
7385 	 * Pass protocol error up
7386 	 */
7387 	if (response.rpr_response != REP_PROTOCOL_SUCCESS)
7388 		return (scf_set_error(proto_error(response.rpr_response)));
7389 
7390 	return (SCF_SUCCESS);
7391 }
7392 
7393 int
7394 _scf_pg_is_read_protected(const scf_propertygroup_t *pg, boolean_t *out)
7395 {
7396 	char buf[REP_PROTOCOL_NAME_LEN];
7397 	ssize_t res;
7398 
7399 	res = datael_get_name(&pg->rd_d, buf, sizeof (buf),
7400 	    RP_ENTITY_NAME_PGREADPROT);
7401 
7402 	if (res == -1)
7403 		return (-1);
7404 
7405 	if (uu_strtouint(buf, out, sizeof (*out), 0, 0, 1) == -1)
7406 		return (scf_set_error(SCF_ERROR_INTERNAL));
7407 	return (SCF_SUCCESS);
7408 }
7409 
7410 /*
7411  * _scf_set_annotation: a wrapper to set the annotation fields for SMF
7412  * security auditing.
7413  *
7414  * Fails with following in scf_error_key thread specific data:
7415  *	_INVALID_ARGUMENT - operation or file too large
7416  *	_NOT_BOUND
7417  *	_CONNECTION_BROKEN
7418  *	_INTERNAL
7419  *	_NO_RESOURCES
7420  */
7421 int
7422 _scf_set_annotation(scf_handle_t *h, const char *operation, const char *file)
7423 {
7424 	struct rep_protocol_annotation request;
7425 	struct rep_protocol_response response;
7426 	size_t copied;
7427 	int r;
7428 
7429 	if (h == NULL) {
7430 		/* We can't do anything if the handle is destroyed. */
7431 		return (scf_set_error(SCF_ERROR_HANDLE_DESTROYED));
7432 	}
7433 
7434 	request.rpr_request = REP_PROTOCOL_SET_AUDIT_ANNOTATION;
7435 	copied = strlcpy(request.rpr_operation,
7436 	    (operation == NULL) ? "" : operation,
7437 	    sizeof (request.rpr_operation));
7438 	if (copied >= sizeof (request.rpr_operation))
7439 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
7440 
7441 	copied = strlcpy(request.rpr_file,
7442 	    (file == NULL) ? "" : file,
7443 	    sizeof (request.rpr_file));
7444 	if (copied >= sizeof (request.rpr_file))
7445 		return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
7446 
7447 	(void) pthread_mutex_lock(&h->rh_lock);
7448 	r = make_door_call(h, &request, sizeof (request),
7449 	    &response, sizeof (response));
7450 	(void) pthread_mutex_unlock(&h->rh_lock);
7451 
7452 	if (r < 0) {
7453 		DOOR_ERRORS_BLOCK(r);
7454 	}
7455 
7456 	if (response.rpr_response != REP_PROTOCOL_SUCCESS)
7457 		return (scf_set_error(proto_error(response.rpr_response)));
7458 	return (0);
7459 }
7460