lowlevel.c revision 1f6eb0216cb17ca5fdff9563329f1dda47c8b801
/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License (the "License").
* You may not use this file except in compliance with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* or http://www.opensolaris.org/os/licensing.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
* Copyright 2008 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
/*
* This is the main implementation file for the low-level repository
* interface.
*/
#include "lowlevel_impl.h"
#include "repcache_protocol.h"
#include "scf_type.h"
#include <assert.h>
#include <alloca.h>
#include <door.h>
#include <errno.h>
#include <fcntl.h>
#include <fnmatch.h>
#include <libuutil.h>
#include <poll.h>
#include <pthread.h>
#include <stddef.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/mman.h>
#include <sys/sysmacros.h>
#include <unistd.h>
#define ENV_SCF_DEBUG "LIBSCF_DEBUG"
#define ENV_SCF_DOORPATH "LIBSCF_DOORPATH"
static uint32_t default_debug = 0;
static const char *default_door_path = REPOSITORY_DOOR_NAME;
#define CALL_FAILED -1
#define RESULT_TOO_BIG -2
#define NOT_BOUND -3
static pthread_mutex_t lowlevel_init_lock;
static int32_t lowlevel_inited;
static uu_list_pool_t *tran_entry_pool;
static uu_list_pool_t *datael_pool;
static uu_list_pool_t *iter_pool;
/*
* base32[] index32[] are used in base32 encoding and decoding.
*/
static char base32[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZ234567";
static char index32[128] = {
-1, -1, -1, -1, -1, -1, -1, -1, /* 0-7 */
-1, -1, -1, -1, -1, -1, -1, -1, /* 8-15 */
-1, -1, -1, -1, -1, -1, -1, -1, /* 16-23 */
-1, -1, -1, -1, -1, -1, -1, -1, /* 24-31 */
-1, -1, -1, -1, -1, -1, -1, -1, /* 32-39 */
-1, -1, -1, -1, -1, -1, -1, -1, /* 40-47 */
-1, -1, 26, 27, 28, 29, 30, 31, /* 48-55 */
-1, -1, -1, -1, -1, -1, -1, -1, /* 56-63 */
-1, 0, 1, 2, 3, 4, 5, 6, /* 64-71 */
7, 8, 9, 10, 11, 12, 13, 14, /* 72-79 */
15, 16, 17, 18, 19, 20, 21, 22, /* 80-87 */
23, 24, 25, -1, -1, -1, -1, -1, /* 88-95 */
-1, -1, -1, -1, -1, -1, -1, -1, /* 96-103 */
-1, -1, -1, -1, -1, -1, -1, -1, /* 104-111 */
-1, -1, -1, -1, -1, -1, -1, -1, /* 112-119 */
-1, -1, -1, -1, -1, -1, -1, -1 /* 120-127 */
};
#define DECODE32_GS (8) /* scf_decode32 group size */
/*
* We want MUTEX_HELD, but we also want pthreads.
*/
struct _lwp_mutex;
extern int _mutex_held(struct _lwp_mutex *);
#define MUTEX_HELD(m) _mutex_held((struct _lwp_mutex *)(m))
#ifdef lint
#define assert_nolint(x) (void)0
#else
#define assert_nolint(x) assert(x)
#endif
static void scf_iter_reset_locked(scf_iter_t *iter);
static void scf_value_reset_locked(scf_value_t *val, int and_destroy);
#define TYPE_VALUE (-100)
/*
* Hold and release subhandles. We only allow one thread access to the
* subhandles at a time, and he can use any subset, grabbing and releasing
* them in any order. The only restrictions are that you cannot hold an
* already-held subhandle, and all subhandles must be released before
* returning to the original caller.
*/
static void
handle_hold_subhandles(scf_handle_t *h, int mask)
{
assert(mask != 0 && (mask & ~RH_HOLD_ALL) == 0);
(void) pthread_mutex_lock(&h->rh_lock);
while (h->rh_hold_flags != 0 && h->rh_holder != pthread_self()) {
int cancel_state;
(void) pthread_setcancelstate(PTHREAD_CANCEL_DISABLE,
&cancel_state);
(void) pthread_cond_wait(&h->rh_cv, &h->rh_lock);
(void) pthread_setcancelstate(cancel_state, NULL);
}
if (h->rh_hold_flags == 0)
h->rh_holder = pthread_self();
assert(!(h->rh_hold_flags & mask));
h->rh_hold_flags |= mask;
(void) pthread_mutex_unlock(&h->rh_lock);
}
static void
handle_rele_subhandles(scf_handle_t *h, int mask)
{
assert(mask != 0 && (mask & ~RH_HOLD_ALL) == 0);
(void) pthread_mutex_lock(&h->rh_lock);
assert(h->rh_holder == pthread_self());
assert((h->rh_hold_flags & mask));
h->rh_hold_flags &= ~mask;
if (h->rh_hold_flags == 0)
(void) pthread_cond_signal(&h->rh_cv);
(void) pthread_mutex_unlock(&h->rh_lock);
}
#define HOLD_HANDLE(h, flag, field) \
(handle_hold_subhandles((h), (flag)), (h)->field)
#define RELE_HANDLE(h, flag) \
(handle_rele_subhandles((h), (flag)))
/*
* convenience macros, for functions that only need a one or two handles at
* any given time
*/
#define HANDLE_HOLD_ITER(h) HOLD_HANDLE((h), RH_HOLD_ITER, rh_iter)
#define HANDLE_HOLD_SCOPE(h) HOLD_HANDLE((h), RH_HOLD_SCOPE, rh_scope)
#define HANDLE_HOLD_SERVICE(h) HOLD_HANDLE((h), RH_HOLD_SERVICE, rh_service)
#define HANDLE_HOLD_INSTANCE(h) HOLD_HANDLE((h), RH_HOLD_INSTANCE, rh_instance)
#define HANDLE_HOLD_SNAPSHOT(h) HOLD_HANDLE((h), RH_HOLD_SNAPSHOT, rh_snapshot)
#define HANDLE_HOLD_SNAPLVL(h) HOLD_HANDLE((h), RH_HOLD_SNAPLVL, rh_snaplvl)
#define HANDLE_HOLD_PG(h) HOLD_HANDLE((h), RH_HOLD_PG, rh_pg)
#define HANDLE_HOLD_PROPERTY(h) HOLD_HANDLE((h), RH_HOLD_PROPERTY, rh_property)
#define HANDLE_HOLD_VALUE(h) HOLD_HANDLE((h), RH_HOLD_VALUE, rh_value)
#define HANDLE_RELE_ITER(h) RELE_HANDLE((h), RH_HOLD_ITER)
#define HANDLE_RELE_SCOPE(h) RELE_HANDLE((h), RH_HOLD_SCOPE)
#define HANDLE_RELE_SERVICE(h) RELE_HANDLE((h), RH_HOLD_SERVICE)
#define HANDLE_RELE_INSTANCE(h) RELE_HANDLE((h), RH_HOLD_INSTANCE)
#define HANDLE_RELE_SNAPSHOT(h) RELE_HANDLE((h), RH_HOLD_SNAPSHOT)
#define HANDLE_RELE_SNAPLVL(h) RELE_HANDLE((h), RH_HOLD_SNAPLVL)
#define HANDLE_RELE_PG(h) RELE_HANDLE((h), RH_HOLD_PG)
#define HANDLE_RELE_PROPERTY(h) RELE_HANDLE((h), RH_HOLD_PROPERTY)
#define HANDLE_RELE_VALUE(h) RELE_HANDLE((h), RH_HOLD_VALUE)
/*ARGSUSED*/
static int
transaction_entry_compare(const void *l_arg, const void *r_arg, void *private)
{
const char *l_prop =
((scf_transaction_entry_t *)l_arg)->entry_property;
const char *r_prop =
((scf_transaction_entry_t *)r_arg)->entry_property;
int ret;
ret = strcmp(l_prop, r_prop);
if (ret > 0)
return (1);
if (ret < 0)
return (-1);
return (0);
}
static int
datael_compare(const void *l_arg, const void *r_arg, void *private)
{
uint32_t l_id = ((scf_datael_t *)l_arg)->rd_entity;
uint32_t r_id = (r_arg != NULL) ? ((scf_datael_t *)r_arg)->rd_entity :
*(uint32_t *)private;
if (l_id > r_id)
return (1);
if (l_id < r_id)
return (-1);
return (0);
}
static int
iter_compare(const void *l_arg, const void *r_arg, void *private)
{
uint32_t l_id = ((scf_iter_t *)l_arg)->iter_id;
uint32_t r_id = (r_arg != NULL) ? ((scf_iter_t *)r_arg)->iter_id :
*(uint32_t *)private;
if (l_id > r_id)
return (1);
if (l_id < r_id)
return (-1);
return (0);
}
static int
lowlevel_init(void)
{
const char *debug;
const char *door_path;
(void) pthread_mutex_lock(&lowlevel_init_lock);
if (lowlevel_inited == 0) {
if (!issetugid() &&
(debug = getenv(ENV_SCF_DEBUG)) != NULL && debug[0] != 0 &&
uu_strtoint(debug, &default_debug, sizeof (default_debug),
0, 0, 0) == -1) {
(void) fprintf(stderr, "LIBSCF: $%s (%s): %s",
ENV_SCF_DEBUG, debug,
uu_strerror(uu_error()));
}
if (!issetugid() &&
(door_path = getenv(ENV_SCF_DOORPATH)) != NULL &&
door_path[0] != 0) {
default_door_path = strdup(door_path);
if (default_door_path == NULL)
default_door_path = door_path;
}
datael_pool = uu_list_pool_create("SUNW,libscf_datael",
sizeof (scf_datael_t), offsetof(scf_datael_t, rd_node),
datael_compare, UU_LIST_POOL_DEBUG);
iter_pool = uu_list_pool_create("SUNW,libscf_iter",
sizeof (scf_iter_t), offsetof(scf_iter_t, iter_node),
iter_compare, UU_LIST_POOL_DEBUG);
assert_nolint(offsetof(scf_transaction_entry_t,
entry_property) == 0);
tran_entry_pool = uu_list_pool_create(
"SUNW,libscf_transaction_entity",
sizeof (scf_transaction_entry_t),
offsetof(scf_transaction_entry_t, entry_link),
transaction_entry_compare, UU_LIST_POOL_DEBUG);
if (datael_pool == NULL || iter_pool == NULL ||
tran_entry_pool == NULL) {
lowlevel_inited = -1;
goto end;
}
if (!scf_setup_error()) {
lowlevel_inited = -1;
goto end;
}
lowlevel_inited = 1;
}
end:
(void) pthread_mutex_unlock(&lowlevel_init_lock);
if (lowlevel_inited > 0)
return (1);
return (0);
}
static const struct {
scf_type_t ti_type;
rep_protocol_value_type_t ti_proto_type;
const char *ti_name;
} scf_type_info[] = {
{SCF_TYPE_BOOLEAN, REP_PROTOCOL_TYPE_BOOLEAN, "boolean"},
{SCF_TYPE_COUNT, REP_PROTOCOL_TYPE_COUNT, "count"},
{SCF_TYPE_INTEGER, REP_PROTOCOL_TYPE_INTEGER, "integer"},
{SCF_TYPE_TIME, REP_PROTOCOL_TYPE_TIME, "time"},
{SCF_TYPE_ASTRING, REP_PROTOCOL_TYPE_STRING, "astring"},
{SCF_TYPE_OPAQUE, REP_PROTOCOL_TYPE_OPAQUE, "opaque"},
{SCF_TYPE_USTRING, REP_PROTOCOL_SUBTYPE_USTRING, "ustring"},
{SCF_TYPE_URI, REP_PROTOCOL_SUBTYPE_URI, "uri"},
{SCF_TYPE_FMRI, REP_PROTOCOL_SUBTYPE_FMRI, "fmri"},
{SCF_TYPE_HOST, REP_PROTOCOL_SUBTYPE_HOST, "host"},
{SCF_TYPE_HOSTNAME, REP_PROTOCOL_SUBTYPE_HOSTNAME, "hostname"},
{SCF_TYPE_NET_ADDR_V4, REP_PROTOCOL_SUBTYPE_NETADDR_V4,
"net_address_v4"},
{SCF_TYPE_NET_ADDR_V6, REP_PROTOCOL_SUBTYPE_NETADDR_V6,
"net_address_v6"}
};
#define SCF_TYPE_INFO_COUNT (sizeof (scf_type_info) / sizeof (*scf_type_info))
static rep_protocol_value_type_t
scf_type_to_protocol_type(scf_type_t t)
{
int i;
for (i = 0; i < SCF_TYPE_INFO_COUNT; i++)
if (scf_type_info[i].ti_type == t)
return (scf_type_info[i].ti_proto_type);
return (REP_PROTOCOL_TYPE_INVALID);
}
static scf_type_t
scf_protocol_type_to_type(rep_protocol_value_type_t t)
{
int i;
for (i = 0; i < SCF_TYPE_INFO_COUNT; i++)
if (scf_type_info[i].ti_proto_type == t)
return (scf_type_info[i].ti_type);
return (SCF_TYPE_INVALID);
}
const char *
scf_type_to_string(scf_type_t ty)
{
int i;
for (i = 0; i < SCF_TYPE_INFO_COUNT; i++)
if (scf_type_info[i].ti_type == ty)
return (scf_type_info[i].ti_name);
return ("unknown");
}
scf_type_t
scf_string_to_type(const char *name)
{
int i;
for (i = 0; i < sizeof (scf_type_info) / sizeof (*scf_type_info); i++)
if (strcmp(scf_type_info[i].ti_name, name) == 0)
return (scf_type_info[i].ti_type);
return (SCF_TYPE_INVALID);
}
int
scf_type_base_type(scf_type_t type, scf_type_t *out)
{
rep_protocol_value_type_t t = scf_type_to_protocol_type(type);
if (t == REP_PROTOCOL_TYPE_INVALID)
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
*out = scf_protocol_type_to_type(scf_proto_underlying_type(t));
return (SCF_SUCCESS);
}
/*
* Convert a protocol error code into an SCF_ERROR_* code.
*/
static scf_error_t
proto_error(rep_protocol_responseid_t e)
{
switch (e) {
case REP_PROTOCOL_FAIL_MISORDERED:
case REP_PROTOCOL_FAIL_UNKNOWN_ID:
case REP_PROTOCOL_FAIL_INVALID_TYPE:
case REP_PROTOCOL_FAIL_TRUNCATED:
case REP_PROTOCOL_FAIL_TYPE_MISMATCH:
case REP_PROTOCOL_FAIL_NOT_APPLICABLE:
case REP_PROTOCOL_FAIL_UNKNOWN:
return (SCF_ERROR_INTERNAL);
case REP_PROTOCOL_FAIL_BAD_TX:
return (SCF_ERROR_INVALID_ARGUMENT);
case REP_PROTOCOL_FAIL_BAD_REQUEST:
return (SCF_ERROR_INVALID_ARGUMENT);
case REP_PROTOCOL_FAIL_NO_RESOURCES:
return (SCF_ERROR_NO_RESOURCES);
case REP_PROTOCOL_FAIL_NOT_FOUND:
return (SCF_ERROR_NOT_FOUND);
case REP_PROTOCOL_FAIL_DELETED:
return (SCF_ERROR_DELETED);
case REP_PROTOCOL_FAIL_NOT_SET:
return (SCF_ERROR_NOT_SET);
case REP_PROTOCOL_FAIL_EXISTS:
return (SCF_ERROR_EXISTS);
case REP_PROTOCOL_FAIL_DUPLICATE_ID:
return (SCF_ERROR_EXISTS);
case REP_PROTOCOL_FAIL_PERMISSION_DENIED:
return (SCF_ERROR_PERMISSION_DENIED);
case REP_PROTOCOL_FAIL_BACKEND_ACCESS:
return (SCF_ERROR_BACKEND_ACCESS);
case REP_PROTOCOL_FAIL_BACKEND_READONLY:
return (SCF_ERROR_BACKEND_READONLY);
case REP_PROTOCOL_SUCCESS:
case REP_PROTOCOL_DONE:
case REP_PROTOCOL_FAIL_NOT_LATEST: /* TX code should handle this */
default:
#ifndef NDEBUG
uu_warn("%s:%d: Bad error code %d passed to proto_error().\n",
__FILE__, __LINE__, e);
#endif
abort();
/*NOTREACHED*/
}
}
ssize_t
scf_limit(uint32_t limit)
{
switch (limit) {
case SCF_LIMIT_MAX_NAME_LENGTH:
case SCF_LIMIT_MAX_PG_TYPE_LENGTH:
return (REP_PROTOCOL_NAME_LEN - 1);
case SCF_LIMIT_MAX_VALUE_LENGTH:
return (REP_PROTOCOL_VALUE_LEN - 1);
case SCF_LIMIT_MAX_FMRI_LENGTH:
return (SCF_FMRI_PREFIX_MAX_LEN +
sizeof (SCF_FMRI_SCOPE_PREFIX) - 1 +
sizeof (SCF_FMRI_SCOPE_SUFFIX) - 1 +
sizeof (SCF_FMRI_SERVICE_PREFIX) - 1 +
sizeof (SCF_FMRI_INSTANCE_PREFIX) - 1 +
sizeof (SCF_FMRI_PROPERTYGRP_PREFIX) - 1 +
sizeof (SCF_FMRI_PROPERTY_PREFIX) - 1 +
5 * (REP_PROTOCOL_NAME_LEN - 1));
default:
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
}
static size_t
scf_opaque_decode(char *out_arg, const char *in, size_t max_out)
{
char a, b;
char *out = out_arg;
while (max_out > 0 && (a = in[0]) != 0 && (b = in[1]) != 0) {
in += 2;
if (a >= '0' && a <= '9')
a -= '0';
else if (a >= 'a' && a <= 'f')
a = a - 'a' + 10;
else if (a >= 'A' && a <= 'F')
a = a - 'A' + 10;
else
break;
if (b >= '0' && b <= '9')
b -= '0';
else if (b >= 'a' && b <= 'f')
b = b - 'a' + 10;
else if (b >= 'A' && b <= 'F')
b = b - 'A' + 10;
else
break;
*out++ = (a << 4) | b;
max_out--;
}
return (out - out_arg);
}
static size_t
scf_opaque_encode(char *out_arg, const char *in_arg, size_t in_sz)
{
uint8_t *in = (uint8_t *)in_arg;
uint8_t *end = in + in_sz;
char *out = out_arg;
if (out == NULL)
return (2 * in_sz);
while (in < end) {
uint8_t c = *in++;
uint8_t a = (c & 0xf0) >> 4;
uint8_t b = (c & 0x0f);
if (a <= 9)
*out++ = a + '0';
else
*out++ = a + 'a' - 10;
if (b <= 9)
*out++ = b + '0';
else
*out++ = b + 'a' - 10;
}
*out = 0;
return (out - out_arg);
}
static void
handle_do_close(scf_handle_t *h)
{
assert(MUTEX_HELD(&h->rh_lock));
assert(h->rh_doorfd != -1);
/*
* if there are any active FD users, we just move the FD over
* to rh_doorfd_old -- they'll close it when they finish.
*/
if (h->rh_fd_users > 0) {
h->rh_doorfd_old = h->rh_doorfd;
h->rh_doorfd = -1;
} else {
assert(h->rh_doorfd_old == -1);
(void) close(h->rh_doorfd);
h->rh_doorfd = -1;
}
}
/*
* Check if a handle is currently bound. fork()ing implicitly unbinds
* the handle in the child.
*/
static int
handle_is_bound(scf_handle_t *h)
{
assert(MUTEX_HELD(&h->rh_lock));
if (h->rh_doorfd == -1)
return (0);
if (getpid() == h->rh_doorpid)
return (1);
/* forked since our last bind -- initiate handle close */
handle_do_close(h);
return (0);
}
static int
handle_has_server_locked(scf_handle_t *h)
{
door_info_t i;
assert(MUTEX_HELD(&h->rh_lock));
return (handle_is_bound(h) && door_info(h->rh_doorfd, &i) != -1 &&
i.di_target != -1);
}
static int
handle_has_server(scf_handle_t *h)
{
int ret;
(void) pthread_mutex_lock(&h->rh_lock);
ret = handle_has_server_locked(h);
(void) pthread_mutex_unlock(&h->rh_lock);
return (ret);
}
/*
* This makes a door request on the client door associated with handle h.
* It will automatically retry calls which fail on EINTR. If h is not bound,
* returns NOT_BOUND. If the door call fails or the server response is too
* small, returns CALL_FAILED. If the server response is too big, truncates the
* response and returns RESULT_TOO_BIG. Otherwise, the size of the result is
* returned.
*/
static ssize_t
make_door_call(scf_handle_t *h, const void *req, size_t req_sz,
void *res, size_t res_sz)
{
door_arg_t arg;
int r;
assert(MUTEX_HELD(&h->rh_lock));
if (!handle_is_bound(h)) {
return (NOT_BOUND);
}
arg.data_ptr = (void *)req;
arg.data_size = req_sz;
arg.desc_ptr = NULL;
arg.desc_num = 0;
arg.rbuf = res;
arg.rsize = res_sz;
while ((r = door_call(h->rh_doorfd, &arg)) < 0) {
if (errno != EINTR)
break;
}
if (r < 0) {
return (CALL_FAILED);
}
if (arg.desc_num > 0) {
while (arg.desc_num > 0) {
if (arg.desc_ptr->d_attributes & DOOR_DESCRIPTOR) {
int cfd = arg.desc_ptr->d_data.d_desc.d_id;
(void) close(cfd);
}
arg.desc_ptr++;
arg.desc_num--;
}
}
if (arg.data_ptr != res && arg.data_size > 0)
(void) memmove(res, arg.data_ptr, MIN(arg.data_size, res_sz));
if (arg.rbuf != res)
(void) munmap(arg.rbuf, arg.rsize);
if (arg.data_size > res_sz)
return (RESULT_TOO_BIG);
if (arg.data_size < sizeof (uint32_t))
return (CALL_FAILED);
return (arg.data_size);
}
/*
* Should only be used when r < 0.
*/
#define DOOR_ERRORS_BLOCK(r) { \
switch (r) { \
case NOT_BOUND: \
return (scf_set_error(SCF_ERROR_NOT_BOUND)); \
\
case CALL_FAILED: \
return (scf_set_error(SCF_ERROR_CONNECTION_BROKEN)); \
\
case RESULT_TOO_BIG: \
return (scf_set_error(SCF_ERROR_INTERNAL)); \
\
default: \
assert(r == NOT_BOUND || r == CALL_FAILED || \
r == RESULT_TOO_BIG); \
abort(); \
} \
}
/*
* Like make_door_call(), but takes an fd instead of a handle, and expects
* a single file descriptor, returned via res_fd.
*
* If no file descriptor is returned, *res_fd == -1.
*/
static int
make_door_call_retfd(int fd, const void *req, size_t req_sz, void *res,
size_t res_sz, int *res_fd)
{
door_arg_t arg;
int r;
char rbuf[256];
*res_fd = -1;
if (fd == -1)
return (NOT_BOUND);
arg.data_ptr = (void *)req;
arg.data_size = req_sz;
arg.desc_ptr = NULL;
arg.desc_num = 0;
arg.rbuf = rbuf;
arg.rsize = sizeof (rbuf);
while ((r = door_call(fd, &arg)) < 0) {
if (errno != EINTR)
break;
}
if (r < 0)
return (CALL_FAILED);
if (arg.desc_num > 1) {
while (arg.desc_num > 0) {
if (arg.desc_ptr->d_attributes & DOOR_DESCRIPTOR) {
int cfd =
arg.desc_ptr->d_data.d_desc.d_descriptor;
(void) close(cfd);
}
arg.desc_ptr++;
arg.desc_num--;
}
}
if (arg.desc_num == 1 && arg.desc_ptr->d_attributes & DOOR_DESCRIPTOR)
*res_fd = arg.desc_ptr->d_data.d_desc.d_descriptor;
if (arg.data_size > 0)
(void) memmove(res, arg.data_ptr, MIN(arg.data_size, res_sz));
if (arg.rbuf != rbuf)
(void) munmap(arg.rbuf, arg.rsize);
if (arg.data_size > res_sz)
return (RESULT_TOO_BIG);
if (arg.data_size < sizeof (uint32_t))
return (CALL_FAILED);
return (arg.data_size);
}
/*
* Fails with
* _VERSION_MISMATCH
* _NO_MEMORY
*/
scf_handle_t *
scf_handle_create(scf_version_t v)
{
scf_handle_t *ret;
int failed;
/*
* This will need to be revisited when we bump SCF_VERSION
*/
if (v != SCF_VERSION) {
(void) scf_set_error(SCF_ERROR_VERSION_MISMATCH);
return (NULL);
}
if (!lowlevel_init()) {
(void) scf_set_error(SCF_ERROR_NO_MEMORY);
return (NULL);
}
ret = uu_zalloc(sizeof (*ret));
if (ret == NULL) {
(void) scf_set_error(SCF_ERROR_NO_MEMORY);
return (NULL);
}
ret->rh_dataels = uu_list_create(datael_pool, ret, 0);
ret->rh_iters = uu_list_create(iter_pool, ret, 0);
if (ret->rh_dataels == NULL || ret->rh_iters == NULL) {
if (ret->rh_dataels != NULL)
uu_list_destroy(ret->rh_dataels);
if (ret->rh_iters != NULL)
uu_list_destroy(ret->rh_iters);
uu_free(ret);
(void) scf_set_error(SCF_ERROR_NO_MEMORY);
return (NULL);
}
ret->rh_doorfd = -1;
ret->rh_doorfd_old = -1;
(void) pthread_mutex_init(&ret->rh_lock, NULL);
handle_hold_subhandles(ret, RH_HOLD_ALL);
failed = ((ret->rh_iter = scf_iter_create(ret)) == NULL ||
(ret->rh_scope = scf_scope_create(ret)) == NULL ||
(ret->rh_service = scf_service_create(ret)) == NULL ||
(ret->rh_instance = scf_instance_create(ret)) == NULL ||
(ret->rh_snapshot = scf_snapshot_create(ret)) == NULL ||
(ret->rh_snaplvl = scf_snaplevel_create(ret)) == NULL ||
(ret->rh_pg = scf_pg_create(ret)) == NULL ||
(ret->rh_property = scf_property_create(ret)) == NULL ||
(ret->rh_value = scf_value_create(ret)) == NULL);
/*
* these subhandles count as internal references, not external ones.
*/
ret->rh_intrefs = ret->rh_extrefs;
ret->rh_extrefs = 0;
handle_rele_subhandles(ret, RH_HOLD_ALL);
if (failed) {
scf_handle_destroy(ret);
(void) scf_set_error(SCF_ERROR_NO_MEMORY);
return (NULL);
}
scf_value_set_count(ret->rh_value, default_debug);
(void) scf_handle_decorate(ret, "debug", ret->rh_value);
return (ret);
}
int
scf_handle_decorate(scf_handle_t *handle, const char *name, scf_value_t *v)
{
if (v != SCF_DECORATE_CLEAR && handle != v->value_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
(void) pthread_mutex_lock(&handle->rh_lock);
if (handle_is_bound(handle)) {
(void) pthread_mutex_unlock(&handle->rh_lock);
return (scf_set_error(SCF_ERROR_IN_USE));
}
(void) pthread_mutex_unlock(&handle->rh_lock);
if (strcmp(name, "debug") == 0) {
if (v == SCF_DECORATE_CLEAR) {
(void) pthread_mutex_lock(&handle->rh_lock);
handle->rh_debug = 0;
(void) pthread_mutex_unlock(&handle->rh_lock);
} else {
uint64_t val;
if (scf_value_get_count(v, &val) < 0)
return (-1); /* error already set */
(void) pthread_mutex_lock(&handle->rh_lock);
handle->rh_debug = (uid_t)val;
(void) pthread_mutex_unlock(&handle->rh_lock);
}
return (0);
}
if (strcmp(name, "door_path") == 0) {
char name[sizeof (handle->rh_doorpath)];
if (v == SCF_DECORATE_CLEAR) {
(void) pthread_mutex_lock(&handle->rh_lock);
handle->rh_doorpath[0] = 0;
(void) pthread_mutex_unlock(&handle->rh_lock);
} else {
ssize_t len;
if ((len = scf_value_get_astring(v, name,
sizeof (name))) < 0) {
return (-1); /* error already set */
}
if (len == 0 || len >= sizeof (name)) {
return (scf_set_error(
SCF_ERROR_INVALID_ARGUMENT));
}
(void) pthread_mutex_lock(&handle->rh_lock);
(void) strlcpy(handle->rh_doorpath, name,
sizeof (handle->rh_doorpath));
(void) pthread_mutex_unlock(&handle->rh_lock);
}
return (0);
}
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
/*
* fails with INVALID_ARGUMENT and HANDLE_MISMATCH.
*/
int
_scf_handle_decorations(scf_handle_t *handle, scf_decoration_func *f,
scf_value_t *v, void *data)
{
scf_decoration_info_t i;
char name[sizeof (handle->rh_doorpath)];
uint64_t debug;
if (f == NULL || v == NULL)
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
if (v->value_handle != handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
i.sdi_name = (const char *)"debug";
i.sdi_type = SCF_TYPE_COUNT;
(void) pthread_mutex_lock(&handle->rh_lock);
debug = handle->rh_debug;
(void) pthread_mutex_unlock(&handle->rh_lock);
if (debug != 0) {
scf_value_set_count(v, debug);
i.sdi_value = v;
} else {
i.sdi_value = SCF_DECORATE_CLEAR;
}
if ((*f)(&i, data) == 0)
return (0);
i.sdi_name = (const char *)"door_path";
i.sdi_type = SCF_TYPE_ASTRING;
(void) pthread_mutex_lock(&handle->rh_lock);
(void) strlcpy(name, handle->rh_doorpath, sizeof (name));
(void) pthread_mutex_unlock(&handle->rh_lock);
if (name[0] != 0) {
(void) scf_value_set_astring(v, name);
i.sdi_value = v;
} else {
i.sdi_value = SCF_DECORATE_CLEAR;
}
if ((*f)(&i, data) == 0)
return (0);
return (1);
}
/*
* Fails if handle is not bound.
*/
static int
handle_unbind_unlocked(scf_handle_t *handle)
{
rep_protocol_request_t request;
rep_protocol_response_t response;
if (!handle_is_bound(handle))
return (-1);
request.rpr_request = REP_PROTOCOL_CLOSE;
(void) make_door_call(handle, &request, sizeof (request),
&response, sizeof (response));
handle_do_close(handle);
return (SCF_SUCCESS);
}
/*
* Fails with
* _HANDLE_DESTROYED - dp's handle has been destroyed
* _INTERNAL - server response too big
* entity already set up with different type
* _NO_RESOURCES - server out of memory
*/
static int
datael_attach(scf_datael_t *dp)
{
scf_handle_t *h = dp->rd_handle;
struct rep_protocol_entity_setup request;
rep_protocol_response_t response;
ssize_t r;
assert(MUTEX_HELD(&h->rh_lock));
dp->rd_reset = 0; /* setup implicitly resets */
if (h->rh_flags & HANDLE_DEAD)
return (scf_set_error(SCF_ERROR_HANDLE_DESTROYED));
if (!handle_is_bound(h))
return (SCF_SUCCESS); /* nothing to do */
request.rpr_request = REP_PROTOCOL_ENTITY_SETUP;
request.rpr_entityid = dp->rd_entity;
request.rpr_entitytype = dp->rd_type;
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
if (r == NOT_BOUND || r == CALL_FAILED)
return (SCF_SUCCESS);
if (r == RESULT_TOO_BIG)
return (scf_set_error(SCF_ERROR_INTERNAL));
if (response.rpr_response != REP_PROTOCOL_SUCCESS)
return (scf_set_error(proto_error(response.rpr_response)));
return (SCF_SUCCESS);
}
/*
* Fails with
* _HANDLE_DESTROYED - iter's handle has been destroyed
* _INTERNAL - server response too big
* iter already existed
* _NO_RESOURCES
*/
static int
iter_attach(scf_iter_t *iter)
{
scf_handle_t *h = iter->iter_handle;
struct rep_protocol_iter_request request;
struct rep_protocol_response response;
int r;
assert(MUTEX_HELD(&h->rh_lock));
if (h->rh_flags & HANDLE_DEAD)
return (scf_set_error(SCF_ERROR_HANDLE_DESTROYED));
if (!handle_is_bound(h))
return (SCF_SUCCESS); /* nothing to do */
request.rpr_request = REP_PROTOCOL_ITER_SETUP;
request.rpr_iterid = iter->iter_id;
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
if (r == NOT_BOUND || r == CALL_FAILED)
return (SCF_SUCCESS);
if (r == RESULT_TOO_BIG)
return (scf_set_error(SCF_ERROR_INTERNAL));
if (response.rpr_response != REP_PROTOCOL_SUCCESS)
return (scf_set_error(proto_error(response.rpr_response)));
return (SCF_SUCCESS);
}
/*
* Fails with
* _IN_USE - handle already bound
* _NO_SERVER - server door could not be open()ed
* door call failed
* door_info() failed
* _VERSION_MISMATCH - server returned bad file descriptor
* server claimed bad request
* server reported version mismatch
* server refused with unknown reason
* _INVALID_ARGUMENT
* _NO_RESOURCES - server is out of memory
* _PERMISSION_DENIED
* _INTERNAL - could not set up entities or iters
* server response too big
*
* perhaps this should try multiple times.
*/
int
scf_handle_bind(scf_handle_t *handle)
{
scf_datael_t *el;
scf_iter_t *iter;
pid_t pid;
int fd;
int res;
door_info_t info;
repository_door_request_t request;
repository_door_response_t response;
const char *door_name = default_door_path;
(void) pthread_mutex_lock(&handle->rh_lock);
if (handle_is_bound(handle)) {
(void) pthread_mutex_unlock(&handle->rh_lock);
return (scf_set_error(SCF_ERROR_IN_USE));
}
/* wait until any active fd users have cleared out */
while (handle->rh_fd_users > 0) {
int cancel_state;
(void) pthread_setcancelstate(PTHREAD_CANCEL_DISABLE,
&cancel_state);
(void) pthread_cond_wait(&handle->rh_cv, &handle->rh_lock);
(void) pthread_setcancelstate(cancel_state, NULL);
}
/* check again, since we had to drop the lock */
if (handle_is_bound(handle)) {
(void) pthread_mutex_unlock(&handle->rh_lock);
return (scf_set_error(SCF_ERROR_IN_USE));
}
assert(handle->rh_doorfd == -1 && handle->rh_doorfd_old == -1);
if (handle->rh_doorpath[0] != 0)
door_name = handle->rh_doorpath;
fd = open(door_name, O_RDONLY, 0);
if (fd == -1) {
(void) pthread_mutex_unlock(&handle->rh_lock);
return (scf_set_error(SCF_ERROR_NO_SERVER));
}
request.rdr_version = REPOSITORY_DOOR_VERSION;
request.rdr_request = REPOSITORY_DOOR_REQUEST_CONNECT;
request.rdr_flags = handle->rh_flags;
request.rdr_debug = handle->rh_debug;
pid = getpid();
res = make_door_call_retfd(fd, &request, sizeof (request),
&response, sizeof (response), &handle->rh_doorfd);
(void) close(fd);
if (res < 0) {
(void) pthread_mutex_unlock(&handle->rh_lock);
assert(res != NOT_BOUND);
if (res == CALL_FAILED)
return (scf_set_error(SCF_ERROR_NO_SERVER));
assert(res == RESULT_TOO_BIG);
return (scf_set_error(SCF_ERROR_INTERNAL));
}
if (handle->rh_doorfd < 0) {
(void) pthread_mutex_unlock(&handle->rh_lock);
switch (response.rdr_status) {
case REPOSITORY_DOOR_SUCCESS:
return (scf_set_error(SCF_ERROR_VERSION_MISMATCH));
case REPOSITORY_DOOR_FAIL_BAD_REQUEST:
return (scf_set_error(SCF_ERROR_VERSION_MISMATCH));
case REPOSITORY_DOOR_FAIL_VERSION_MISMATCH:
return (scf_set_error(SCF_ERROR_VERSION_MISMATCH));
case REPOSITORY_DOOR_FAIL_BAD_FLAG:
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
case REPOSITORY_DOOR_FAIL_NO_RESOURCES:
return (scf_set_error(SCF_ERROR_NO_RESOURCES));
case REPOSITORY_DOOR_FAIL_PERMISSION_DENIED:
return (scf_set_error(SCF_ERROR_PERMISSION_DENIED));
default:
return (scf_set_error(SCF_ERROR_VERSION_MISMATCH));
}
}
(void) fcntl(handle->rh_doorfd, F_SETFD, FD_CLOEXEC);
if (door_info(handle->rh_doorfd, &info) < 0) {
(void) close(handle->rh_doorfd);
handle->rh_doorfd = -1;
(void) pthread_mutex_unlock(&handle->rh_lock);
return (scf_set_error(SCF_ERROR_NO_SERVER));
}
handle->rh_doorpid = pid;
handle->rh_doorid = info.di_uniquifier;
/*
* Now, re-attach everything
*/
for (el = uu_list_first(handle->rh_dataels); el != NULL;
el = uu_list_next(handle->rh_dataels, el)) {
if (datael_attach(el) == -1) {
assert(scf_error() != SCF_ERROR_HANDLE_DESTROYED);
(void) handle_unbind_unlocked(handle);
(void) pthread_mutex_unlock(&handle->rh_lock);
return (-1);
}
}
for (iter = uu_list_first(handle->rh_iters); iter != NULL;
iter = uu_list_next(handle->rh_iters, iter)) {
if (iter_attach(iter) == -1) {
assert(scf_error() != SCF_ERROR_HANDLE_DESTROYED);
(void) handle_unbind_unlocked(handle);
(void) pthread_mutex_unlock(&handle->rh_lock);
return (-1);
}
}
(void) pthread_mutex_unlock(&handle->rh_lock);
return (SCF_SUCCESS);
}
int
scf_handle_unbind(scf_handle_t *handle)
{
int ret;
(void) pthread_mutex_lock(&handle->rh_lock);
ret = handle_unbind_unlocked(handle);
(void) pthread_mutex_unlock(&handle->rh_lock);
return (ret == SCF_SUCCESS ? ret : scf_set_error(SCF_ERROR_NOT_BOUND));
}
static scf_handle_t *
handle_get(scf_handle_t *h)
{
(void) pthread_mutex_lock(&h->rh_lock);
if (h->rh_flags & HANDLE_DEAD) {
(void) pthread_mutex_unlock(&h->rh_lock);
(void) scf_set_error(SCF_ERROR_HANDLE_DESTROYED);
return (NULL);
}
(void) pthread_mutex_unlock(&h->rh_lock);
return (h);
}
/*
* Called when an object is removed from the handle. On the last remove,
* cleans up and frees the handle.
*/
static void
handle_unrefed(scf_handle_t *handle)
{
scf_iter_t *iter;
scf_value_t *v;
scf_scope_t *sc;
scf_service_t *svc;
scf_instance_t *inst;
scf_snapshot_t *snap;
scf_snaplevel_t *snaplvl;
scf_propertygroup_t *pg;
scf_property_t *prop;
assert(MUTEX_HELD(&handle->rh_lock));
/*
* Don't do anything if the handle has not yet been destroyed, there
* are still external references, or we're already doing unrefed
* handling.
*/
if (!(handle->rh_flags & HANDLE_DEAD) ||
handle->rh_extrefs > 0 ||
handle->rh_fd_users > 0 ||
(handle->rh_flags & HANDLE_UNREFED)) {
(void) pthread_mutex_unlock(&handle->rh_lock);
return;
}
handle->rh_flags |= HANDLE_UNREFED;
/*
* Now that we know that there are no external references, and the
* HANDLE_DEAD flag keeps new ones from appearing, we can clean up
* our subhandles and destroy the handle completely.
*/
assert(handle->rh_intrefs >= 0);
handle->rh_extrefs = handle->rh_intrefs;
handle->rh_intrefs = 0;
(void) pthread_mutex_unlock(&handle->rh_lock);
handle_hold_subhandles(handle, RH_HOLD_ALL);
iter = handle->rh_iter;
sc = handle->rh_scope;
svc = handle->rh_service;
inst = handle->rh_instance;
snap = handle->rh_snapshot;
snaplvl = handle->rh_snaplvl;
pg = handle->rh_pg;
prop = handle->rh_property;
v = handle->rh_value;
handle->rh_iter = NULL;
handle->rh_scope = NULL;
handle->rh_service = NULL;
handle->rh_instance = NULL;
handle->rh_snapshot = NULL;
handle->rh_snaplvl = NULL;
handle->rh_pg = NULL;
handle->rh_property = NULL;
handle->rh_value = NULL;
if (iter != NULL)
scf_iter_destroy(iter);
if (sc != NULL)
scf_scope_destroy(sc);
if (svc != NULL)
scf_service_destroy(svc);
if (inst != NULL)
scf_instance_destroy(inst);
if (snap != NULL)
scf_snapshot_destroy(snap);
if (snaplvl != NULL)
scf_snaplevel_destroy(snaplvl);
if (pg != NULL)
scf_pg_destroy(pg);
if (prop != NULL)
scf_property_destroy(prop);
if (v != NULL)
scf_value_destroy(v);
(void) pthread_mutex_lock(&handle->rh_lock);
/* there should be no outstanding children at this point */
assert(handle->rh_extrefs == 0);
assert(handle->rh_intrefs == 0);
assert(handle->rh_values == 0);
assert(handle->rh_entries == 0);
assert(uu_list_numnodes(handle->rh_dataels) == 0);
assert(uu_list_numnodes(handle->rh_iters) == 0);
uu_list_destroy(handle->rh_dataels);
uu_list_destroy(handle->rh_iters);
handle->rh_dataels = NULL;
handle->rh_iters = NULL;
(void) pthread_mutex_unlock(&handle->rh_lock);
(void) pthread_mutex_destroy(&handle->rh_lock);
uu_free(handle);
}
void
scf_handle_destroy(scf_handle_t *handle)
{
if (handle == NULL)
return;
(void) pthread_mutex_lock(&handle->rh_lock);
if (handle->rh_flags & HANDLE_DEAD) {
/*
* This is an error (you are not allowed to reference the
* handle after it is destroyed), but we can't report it.
*/
(void) pthread_mutex_unlock(&handle->rh_lock);
return;
}
handle->rh_flags |= HANDLE_DEAD;
(void) handle_unbind_unlocked(handle);
handle_unrefed(handle);
}
ssize_t
scf_myname(scf_handle_t *h, char *out, size_t len)
{
char *cp;
if (!handle_has_server(h))
return (scf_set_error(SCF_ERROR_CONNECTION_BROKEN));
cp = getenv("SMF_FMRI");
if (cp == NULL)
return (scf_set_error(SCF_ERROR_NOT_SET));
return (strlcpy(out, cp, len));
}
static uint32_t
handle_alloc_entityid(scf_handle_t *h)
{
uint32_t nextid;
assert(MUTEX_HELD(&h->rh_lock));
if (uu_list_numnodes(h->rh_dataels) == UINT32_MAX)
return (0); /* no ids available */
/*
* The following loop assumes that there are not a huge number of
* outstanding entities when we've wrapped. If that ends up not
* being the case, the O(N^2) nature of this search will hurt a lot,
* and the data structure should be switched to an AVL tree.
*/
nextid = h->rh_nextentity + 1;
for (;;) {
scf_datael_t *cur;
if (nextid == 0) {
nextid++;
h->rh_flags |= HANDLE_WRAPPED_ENTITY;
}
if (!(h->rh_flags & HANDLE_WRAPPED_ENTITY))
break;
cur = uu_list_find(h->rh_dataels, NULL, &nextid, NULL);
if (cur == NULL)
break; /* not in use */
if (nextid == h->rh_nextentity)
return (0); /* wrapped around; no ids available */
nextid++;
}
h->rh_nextentity = nextid;
return (nextid);
}
static uint32_t
handle_alloc_iterid(scf_handle_t *h)
{
uint32_t nextid;
assert(MUTEX_HELD(&h->rh_lock));
if (uu_list_numnodes(h->rh_iters) == UINT32_MAX)
return (0); /* no ids available */
/* see the comment in handle_alloc_entityid */
nextid = h->rh_nextiter + 1;
for (;;) {
scf_iter_t *cur;
if (nextid == 0) {
nextid++;
h->rh_flags |= HANDLE_WRAPPED_ITER;
}
if (!(h->rh_flags & HANDLE_WRAPPED_ITER))
break; /* not yet wrapped */
cur = uu_list_find(h->rh_iters, NULL, &nextid, NULL);
if (cur == NULL)
break; /* not in use */
if (nextid == h->rh_nextiter)
return (0); /* wrapped around; no ids available */
nextid++;
}
h->rh_nextiter = nextid;
return (nextid);
}
static uint32_t
handle_next_changeid(scf_handle_t *handle)
{
uint32_t nextid;
assert(MUTEX_HELD(&handle->rh_lock));
nextid = ++handle->rh_nextchangeid;
if (nextid == 0)
nextid = ++handle->rh_nextchangeid;
return (nextid);
}
/*
* Fails with
* _INVALID_ARGUMENT - h is NULL
* _HANDLE_DESTROYED
* _INTERNAL - server response too big
* entity already set up with different type
* _NO_RESOURCES
*/
static int
datael_init(scf_datael_t *dp, scf_handle_t *h, uint32_t type)
{
int ret;
if (h == NULL)
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
uu_list_node_init(dp, &dp->rd_node, datael_pool);
dp->rd_handle = h;
dp->rd_type = type;
dp->rd_reset = 0;
(void) pthread_mutex_lock(&h->rh_lock);
if (h->rh_flags & HANDLE_DEAD) {
/*
* we're in undefined territory (the user cannot use a handle
* directly after it has been destroyed), but we don't want
* to allow any new references to happen, so we fail here.
*/
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_HANDLE_DESTROYED));
}
dp->rd_entity = handle_alloc_entityid(h);
if (dp->rd_entity == 0) {
(void) pthread_mutex_unlock(&h->rh_lock);
uu_list_node_fini(dp, &dp->rd_node, datael_pool);
return (scf_set_error(SCF_ERROR_NO_MEMORY));
}
ret = datael_attach(dp);
if (ret == 0) {
(void) uu_list_insert_before(h->rh_dataels, NULL, dp);
h->rh_extrefs++;
} else {
uu_list_node_fini(dp, &dp->rd_node, datael_pool);
}
(void) pthread_mutex_unlock(&h->rh_lock);
return (ret);
}
static void
datael_destroy(scf_datael_t *dp)
{
scf_handle_t *h = dp->rd_handle;
struct rep_protocol_entity_teardown request;
rep_protocol_response_t response;
(void) pthread_mutex_lock(&h->rh_lock);
uu_list_remove(h->rh_dataels, dp);
--h->rh_extrefs;
if (handle_is_bound(h)) {
request.rpr_request = REP_PROTOCOL_ENTITY_TEARDOWN;
request.rpr_entityid = dp->rd_entity;
(void) make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
}
handle_unrefed(h); /* drops h->rh_lock */
dp->rd_handle = NULL;
}
static scf_handle_t *
datael_handle(const scf_datael_t *dp)
{
return (handle_get(dp->rd_handle));
}
/*
* We delay ENTITY_RESETs until right before the entity is used. By doing
* them lazily, we remove quite a few unnecessary calls.
*/
static void
datael_do_reset_locked(scf_datael_t *dp)
{
scf_handle_t *h = dp->rd_handle;
struct rep_protocol_entity_reset request;
rep_protocol_response_t response;
assert(MUTEX_HELD(&h->rh_lock));
request.rpr_request = REP_PROTOCOL_ENTITY_RESET;
request.rpr_entityid = dp->rd_entity;
(void) make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
dp->rd_reset = 0;
}
static void
datael_reset_locked(scf_datael_t *dp)
{
assert(MUTEX_HELD(&dp->rd_handle->rh_lock));
dp->rd_reset = 1;
}
static void
datael_reset(scf_datael_t *dp)
{
scf_handle_t *h = dp->rd_handle;
(void) pthread_mutex_lock(&h->rh_lock);
dp->rd_reset = 1;
(void) pthread_mutex_unlock(&h->rh_lock);
}
static void
datael_finish_reset(const scf_datael_t *dp_arg)
{
scf_datael_t *dp = (scf_datael_t *)dp_arg;
if (dp->rd_reset)
datael_do_reset_locked(dp);
}
/*
* Fails with _NOT_BOUND, _CONNECTION_BROKEN, _INTERNAL (server response too
* big, bad entity id, request not applicable to entity, name too long for
* buffer), _NOT_SET, _DELETED, or _CONSTRAINT_VIOLATED (snaplevel is not of an
* instance).
*/
static ssize_t
datael_get_name(const scf_datael_t *dp, char *buf, size_t size, uint32_t type)
{
scf_handle_t *h = dp->rd_handle;
struct rep_protocol_entity_name request;
struct rep_protocol_name_response response;
ssize_t r;
(void) pthread_mutex_lock(&h->rh_lock);
request.rpr_request = REP_PROTOCOL_ENTITY_NAME;
request.rpr_entityid = dp->rd_entity;
request.rpr_answertype = type;
datael_finish_reset(dp);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
(void) pthread_mutex_unlock(&h->rh_lock);
if (r < 0)
DOOR_ERRORS_BLOCK(r);
if (response.rpr_response != REP_PROTOCOL_SUCCESS) {
assert(response.rpr_response != REP_PROTOCOL_FAIL_BAD_REQUEST);
if (response.rpr_response == REP_PROTOCOL_FAIL_NOT_FOUND)
return (scf_set_error(SCF_ERROR_CONSTRAINT_VIOLATED));
return (scf_set_error(proto_error(response.rpr_response)));
}
return (strlcpy(buf, response.rpr_name, size));
}
/*
* Fails with _HANDLE_MISMATCH, _NOT_BOUND, _CONNECTION_BROKEN, _INTERNAL
* (server response too big, bad element id), _EXISTS (elements have same id),
* _NOT_SET, _DELETED, _CONSTRAINT_VIOLATED, _NOT_FOUND (scope has no parent),
* or _SUCCESS.
*/
static int
datael_get_parent(const scf_datael_t *dp, scf_datael_t *pp)
{
scf_handle_t *h = dp->rd_handle;
struct rep_protocol_entity_parent request;
struct rep_protocol_response response;
ssize_t r;
if (h != pp->rd_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
(void) pthread_mutex_lock(&h->rh_lock);
request.rpr_request = REP_PROTOCOL_ENTITY_GET_PARENT;
request.rpr_entityid = dp->rd_entity;
request.rpr_outid = pp->rd_entity;
datael_finish_reset(dp);
datael_finish_reset(pp);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
(void) pthread_mutex_unlock(&h->rh_lock);
if (r < 0)
DOOR_ERRORS_BLOCK(r);
if (response.rpr_response != REP_PROTOCOL_SUCCESS) {
if (response.rpr_response == REP_PROTOCOL_FAIL_TYPE_MISMATCH)
return (scf_set_error(SCF_ERROR_CONSTRAINT_VIOLATED));
return (scf_set_error(proto_error(response.rpr_response)));
}
return (SCF_SUCCESS);
}
/*
* Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT (out does not have type type,
* name is invalid), _NOT_BOUND, _CONNECTION_BROKEN, _INTERNAL (server response
* too big, bad id, iter already exists, element cannot have children of type,
* type is invalid, iter was reset, sequence was bad, iter walks values, iter
* does not walk type entities), _NOT_SET, _DELETED, _NO_RESOURCES,
* _BACKEND_ACCESS, _NOT_FOUND.
*/
static int
datael_get_child_composed_locked(const scf_datael_t *dp, const char *name,
uint32_t type, scf_datael_t *out, scf_iter_t *iter)
{
struct rep_protocol_iter_start request;
struct rep_protocol_iter_read read_request;
struct rep_protocol_response response;
scf_handle_t *h = dp->rd_handle;
ssize_t r;
if (h != out->rd_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
if (out->rd_type != type)
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
assert(MUTEX_HELD(&h->rh_lock));
assert(iter != NULL);
scf_iter_reset_locked(iter);
iter->iter_type = type;
request.rpr_request = REP_PROTOCOL_ITER_START;
request.rpr_iterid = iter->iter_id;
request.rpr_entity = dp->rd_entity;
request.rpr_itertype = type;
request.rpr_flags = RP_ITER_START_EXACT | RP_ITER_START_COMPOSED;
if (name == NULL || strlcpy(request.rpr_pattern, name,
sizeof (request.rpr_pattern)) >= sizeof (request.rpr_pattern)) {
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
datael_finish_reset(dp);
datael_finish_reset(out);
/*
* We hold the handle lock across both door calls, so that they
* appear atomic.
*/
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
if (r < 0)
DOOR_ERRORS_BLOCK(r);
if (response.rpr_response != REP_PROTOCOL_SUCCESS)
return (scf_set_error(proto_error(response.rpr_response)));
iter->iter_sequence++;
read_request.rpr_request = REP_PROTOCOL_ITER_READ;
read_request.rpr_iterid = iter->iter_id;
read_request.rpr_sequence = iter->iter_sequence;
read_request.rpr_entityid = out->rd_entity;
r = make_door_call(h, &read_request, sizeof (read_request),
&response, sizeof (response));
scf_iter_reset_locked(iter);
if (r < 0)
DOOR_ERRORS_BLOCK(r);
if (response.rpr_response == REP_PROTOCOL_DONE) {
return (scf_set_error(SCF_ERROR_NOT_FOUND));
}
if (response.rpr_response != REP_PROTOCOL_SUCCESS) {
if (response.rpr_response == REP_PROTOCOL_FAIL_NOT_SET ||
response.rpr_response == REP_PROTOCOL_FAIL_BAD_REQUEST)
return (scf_set_error(SCF_ERROR_INTERNAL));
return (scf_set_error(proto_error(response.rpr_response)));
}
return (0);
}
/*
* Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT (out does not have type type,
* name is invalid), _NOT_BOUND, _CONNECTION_BROKEN, _INTERNAL (server response
* too big, bad id, element cannot have children of type, type is invalid),
* _NOT_SET, _DELETED, _NO_RESOURCES, _BACKEND_ACCESS.
*/
static int
datael_get_child_locked(const scf_datael_t *dp, const char *name,
uint32_t type, scf_datael_t *out)
{
struct rep_protocol_entity_get_child request;
struct rep_protocol_response response;
scf_handle_t *h = dp->rd_handle;
ssize_t r;
if (h != out->rd_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
if (out->rd_type != type)
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
assert(MUTEX_HELD(&h->rh_lock));
request.rpr_request = REP_PROTOCOL_ENTITY_GET_CHILD;
request.rpr_entityid = dp->rd_entity;
request.rpr_childid = out->rd_entity;
if (name == NULL || strlcpy(request.rpr_name, name,
sizeof (request.rpr_name)) >= sizeof (request.rpr_name)) {
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
datael_finish_reset(dp);
datael_finish_reset(out);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
if (r < 0)
DOOR_ERRORS_BLOCK(r);
if (response.rpr_response != REP_PROTOCOL_SUCCESS)
return (scf_set_error(proto_error(response.rpr_response)));
return (0);
}
/*
* Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT (out does not have type type,
* name is invalid), _NOT_BOUND, _CONNECTION_BROKEN, _INTERNAL (server response
* too big, bad id, iter already exists, element cannot have children of type,
* type is invalid, iter was reset, sequence was bad, iter walks values, iter
* does not walk type entities), _NOT_SET, _DELETED, _NO_RESOURCES,
* _BACKEND_ACCESS, _NOT_FOUND.
*/
static int
datael_get_child(const scf_datael_t *dp, const char *name, uint32_t type,
scf_datael_t *out, boolean_t composed)
{
scf_handle_t *h = dp->rd_handle;
uint32_t held = 0;
int ret;
scf_iter_t *iter = NULL;
if (composed)
iter = HANDLE_HOLD_ITER(h);
if (out == NULL) {
switch (type) {
case REP_PROTOCOL_ENTITY_SERVICE:
out = &HANDLE_HOLD_SERVICE(h)->rd_d;
held = RH_HOLD_SERVICE;
break;
case REP_PROTOCOL_ENTITY_INSTANCE:
out = &HANDLE_HOLD_INSTANCE(h)->rd_d;
held = RH_HOLD_INSTANCE;
break;
case REP_PROTOCOL_ENTITY_SNAPSHOT:
out = &HANDLE_HOLD_SNAPSHOT(h)->rd_d;
held = RH_HOLD_SNAPSHOT;
break;
case REP_PROTOCOL_ENTITY_SNAPLEVEL:
out = &HANDLE_HOLD_SNAPLVL(h)->rd_d;
held = RH_HOLD_SNAPLVL;
break;
case REP_PROTOCOL_ENTITY_PROPERTYGRP:
out = &HANDLE_HOLD_PG(h)->rd_d;
held = RH_HOLD_PG;
break;
case REP_PROTOCOL_ENTITY_PROPERTY:
out = &HANDLE_HOLD_PROPERTY(h)->rd_d;
held = RH_HOLD_PROPERTY;
break;
default:
assert(0);
abort();
}
}
(void) pthread_mutex_lock(&h->rh_lock);
if (composed)
ret = datael_get_child_composed_locked(dp, name, type, out,
iter);
else
ret = datael_get_child_locked(dp, name, type, out);
(void) pthread_mutex_unlock(&h->rh_lock);
if (composed)
HANDLE_RELE_ITER(h);
if (held)
handle_rele_subhandles(h, held);
return (ret);
}
/*
* Fails with
* _HANDLE_MISMATCH
* _INVALID_ARGUMENT - name is too long
* invalid changeid
* name is invalid
* cannot create children for dp's type of node
* _NOT_BOUND - handle is not bound
* _CONNECTION_BROKEN - server is not reachable
* _INTERNAL - server response too big
* dp or cp has unknown id
* type is _PROPERTYGRP
* type is invalid
* dp cannot have children of type type
* database is corrupt
* _EXISTS - dp & cp have the same id
* _EXISTS - child already exists
* _DELETED - dp has been deleted
* _NOT_SET - dp is reset
* _NO_RESOURCES
* _PERMISSION_DENIED
* _BACKEND_ACCESS
* _BACKEND_READONLY
*/
static int
datael_add_child(const scf_datael_t *dp, const char *name, uint32_t type,
scf_datael_t *cp)
{
scf_handle_t *h = dp->rd_handle;
struct rep_protocol_entity_create_child request;
struct rep_protocol_response response;
ssize_t r;
uint32_t held = 0;
if (cp == NULL) {
switch (type) {
case REP_PROTOCOL_ENTITY_SCOPE:
cp = &HANDLE_HOLD_SCOPE(h)->rd_d;
held = RH_HOLD_SCOPE;
break;
case REP_PROTOCOL_ENTITY_SERVICE:
cp = &HANDLE_HOLD_SERVICE(h)->rd_d;
held = RH_HOLD_SERVICE;
break;
case REP_PROTOCOL_ENTITY_INSTANCE:
cp = &HANDLE_HOLD_INSTANCE(h)->rd_d;
held = RH_HOLD_INSTANCE;
break;
case REP_PROTOCOL_ENTITY_SNAPSHOT:
default:
assert(0);
abort();
}
assert(h == cp->rd_handle);
} else if (h != cp->rd_handle) {
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
}
if (strlcpy(request.rpr_name, name, sizeof (request.rpr_name)) >=
sizeof (request.rpr_name)) {
r = scf_set_error(SCF_ERROR_INVALID_ARGUMENT);
goto err;
}
(void) pthread_mutex_lock(&h->rh_lock);
request.rpr_request = REP_PROTOCOL_ENTITY_CREATE_CHILD;
request.rpr_entityid = dp->rd_entity;
request.rpr_childtype = type;
request.rpr_childid = cp->rd_entity;
datael_finish_reset(dp);
request.rpr_changeid = handle_next_changeid(h);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
(void) pthread_mutex_unlock(&h->rh_lock);
if (held)
handle_rele_subhandles(h, held);
if (r < 0)
DOOR_ERRORS_BLOCK(r);
if (response.rpr_response != REP_PROTOCOL_SUCCESS)
return (scf_set_error(proto_error(response.rpr_response)));
return (SCF_SUCCESS);
err:
if (held)
handle_rele_subhandles(h, held);
return (r);
}
static int
datael_add_pg(const scf_datael_t *dp, const char *name, const char *type,
uint32_t flags, scf_datael_t *cp)
{
scf_handle_t *h = dp->rd_handle;
struct rep_protocol_entity_create_pg request;
struct rep_protocol_response response;
ssize_t r;
int holding_els = 0;
if (cp == NULL) {
holding_els = 1;
cp = &HANDLE_HOLD_PG(h)->rd_d;
assert(h == cp->rd_handle);
} else if (h != cp->rd_handle) {
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
}
request.rpr_request = REP_PROTOCOL_ENTITY_CREATE_PG;
if (name == NULL || strlcpy(request.rpr_name, name,
sizeof (request.rpr_name)) > sizeof (request.rpr_name)) {
r = scf_set_error(SCF_ERROR_INVALID_ARGUMENT);
goto err;
}
if (type == NULL || strlcpy(request.rpr_type, type,
sizeof (request.rpr_type)) > sizeof (request.rpr_type)) {
r = scf_set_error(SCF_ERROR_INVALID_ARGUMENT);
goto err;
}
(void) pthread_mutex_lock(&h->rh_lock);
request.rpr_entityid = dp->rd_entity;
request.rpr_childid = cp->rd_entity;
request.rpr_flags = flags;
datael_finish_reset(dp);
datael_finish_reset(cp);
request.rpr_changeid = handle_next_changeid(h);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
(void) pthread_mutex_unlock(&h->rh_lock);
if (holding_els)
HANDLE_RELE_PG(h);
if (r < 0)
DOOR_ERRORS_BLOCK(r);
if (response.rpr_response != REP_PROTOCOL_SUCCESS)
return (scf_set_error(proto_error(response.rpr_response)));
return (SCF_SUCCESS);
err:
if (holding_els)
HANDLE_RELE_PG(h);
return (r);
}
static int
datael_delete(const scf_datael_t *dp)
{
scf_handle_t *h = dp->rd_handle;
struct rep_protocol_entity_delete request;
struct rep_protocol_response response;
ssize_t r;
(void) pthread_mutex_lock(&h->rh_lock);
request.rpr_request = REP_PROTOCOL_ENTITY_DELETE;
request.rpr_entityid = dp->rd_entity;
datael_finish_reset(dp);
request.rpr_changeid = handle_next_changeid(h);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
(void) pthread_mutex_unlock(&h->rh_lock);
if (r < 0)
DOOR_ERRORS_BLOCK(r);
if (response.rpr_response != REP_PROTOCOL_SUCCESS)
return (scf_set_error(proto_error(response.rpr_response)));
return (SCF_SUCCESS);
}
/*
* Fails with
* _INVALID_ARGUMENT - h is NULL
* _NO_MEMORY
* _HANDLE_DESTROYED - h has been destroyed
* _INTERNAL - server response too big
* iter already exists
* _NO_RESOURCES
*/
scf_iter_t *
scf_iter_create(scf_handle_t *h)
{
scf_iter_t *iter;
if (h == NULL) {
(void) scf_set_error(SCF_ERROR_INVALID_ARGUMENT);
return (NULL);
}
iter = uu_zalloc(sizeof (*iter));
if (iter == NULL) {
(void) scf_set_error(SCF_ERROR_NO_MEMORY);
return (NULL);
}
uu_list_node_init(iter, &iter->iter_node, iter_pool);
iter->iter_handle = h;
iter->iter_sequence = 1;
iter->iter_type = REP_PROTOCOL_ENTITY_NONE;
(void) pthread_mutex_lock(&h->rh_lock);
iter->iter_id = handle_alloc_iterid(h);
if (iter->iter_id == 0) {
(void) pthread_mutex_unlock(&h->rh_lock);
uu_list_node_fini(iter, &iter->iter_node, iter_pool);
(void) scf_set_error(SCF_ERROR_NO_MEMORY);
uu_free(iter);
return (NULL);
}
if (iter_attach(iter) == -1) {
uu_list_node_fini(iter, &iter->iter_node, iter_pool);
(void) pthread_mutex_unlock(&h->rh_lock);
uu_free(iter);
return (NULL);
}
(void) uu_list_insert_before(h->rh_iters, NULL, iter);
h->rh_extrefs++;
(void) pthread_mutex_unlock(&h->rh_lock);
return (iter);
}
scf_handle_t *
scf_iter_handle(const scf_iter_t *iter)
{
return (handle_get(iter->iter_handle));
}
static void
scf_iter_reset_locked(scf_iter_t *iter)
{
struct rep_protocol_iter_request request;
struct rep_protocol_response response;
request.rpr_request = REP_PROTOCOL_ITER_RESET;
request.rpr_iterid = iter->iter_id;
assert(MUTEX_HELD(&iter->iter_handle->rh_lock));
(void) make_door_call(iter->iter_handle,
&request, sizeof (request), &response, sizeof (response));
iter->iter_type = REP_PROTOCOL_ENTITY_NONE;
iter->iter_sequence = 1;
}
void
scf_iter_reset(scf_iter_t *iter)
{
(void) pthread_mutex_lock(&iter->iter_handle->rh_lock);
scf_iter_reset_locked(iter);
(void) pthread_mutex_unlock(&iter->iter_handle->rh_lock);
}
void
scf_iter_destroy(scf_iter_t *iter)
{
scf_handle_t *handle;
struct rep_protocol_iter_request request;
struct rep_protocol_response response;
if (iter == NULL)
return;
handle = iter->iter_handle;
(void) pthread_mutex_lock(&handle->rh_lock);
request.rpr_request = REP_PROTOCOL_ITER_TEARDOWN;
request.rpr_iterid = iter->iter_id;
(void) make_door_call(handle, &request, sizeof (request),
&response, sizeof (response));
uu_list_remove(handle->rh_iters, iter);
--handle->rh_extrefs;
handle_unrefed(handle); /* drops h->rh_lock */
iter->iter_handle = NULL;
uu_list_node_fini(iter, &iter->iter_node, iter_pool);
uu_free(iter);
}
static int
handle_get_local_scope_locked(scf_handle_t *handle, scf_scope_t *out)
{
struct rep_protocol_entity_get request;
struct rep_protocol_name_response response;
ssize_t r;
assert(MUTEX_HELD(&handle->rh_lock));
if (handle != out->rd_d.rd_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
request.rpr_request = REP_PROTOCOL_ENTITY_GET;
request.rpr_entityid = out->rd_d.rd_entity;
request.rpr_object = RP_ENTITY_GET_MOST_LOCAL_SCOPE;
datael_finish_reset(&out->rd_d);
r = make_door_call(handle, &request, sizeof (request),
&response, sizeof (response));
if (r < 0)
DOOR_ERRORS_BLOCK(r);
if (response.rpr_response != REP_PROTOCOL_SUCCESS)
return (scf_set_error(proto_error(response.rpr_response)));
return (SCF_SUCCESS);
}
int
scf_iter_handle_scopes(scf_iter_t *iter, const scf_handle_t *handle)
{
scf_handle_t *h = iter->iter_handle;
if (h != handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
(void) pthread_mutex_lock(&h->rh_lock);
scf_iter_reset_locked(iter);
if (!handle_is_bound(h)) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_NOT_BOUND));
}
if (!handle_has_server_locked(h)) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_CONNECTION_BROKEN));
}
iter->iter_type = REP_PROTOCOL_ENTITY_SCOPE;
iter->iter_sequence = 1;
(void) pthread_mutex_unlock(&h->rh_lock);
return (0);
}
int
scf_iter_next_scope(scf_iter_t *iter, scf_scope_t *out)
{
int ret;
scf_handle_t *h = iter->iter_handle;
if (h != out->rd_d.rd_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
(void) pthread_mutex_lock(&h->rh_lock);
if (iter->iter_type == REP_PROTOCOL_ENTITY_NONE) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_NOT_SET));
}
if (iter->iter_type != REP_PROTOCOL_ENTITY_SCOPE) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
if (iter->iter_sequence == 1) {
if ((ret = handle_get_local_scope_locked(h, out)) ==
SCF_SUCCESS) {
iter->iter_sequence++;
ret = 1;
}
} else {
datael_reset_locked(&out->rd_d);
ret = 0;
}
(void) pthread_mutex_unlock(&h->rh_lock);
return (ret);
}
int
scf_handle_get_scope(scf_handle_t *h, const char *name, scf_scope_t *out)
{
int ret;
if (h != out->rd_d.rd_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
(void) pthread_mutex_lock(&h->rh_lock);
if (strcmp(name, SCF_SCOPE_LOCAL) == 0) {
ret = handle_get_local_scope_locked(h, out);
} else {
datael_reset_locked(&out->rd_d);
if (uu_check_name(name, 0) == -1)
ret = scf_set_error(SCF_ERROR_INVALID_ARGUMENT);
else
ret = scf_set_error(SCF_ERROR_NOT_FOUND);
}
(void) pthread_mutex_unlock(&h->rh_lock);
return (ret);
}
static int
datael_setup_iter(scf_iter_t *iter, const scf_datael_t *dp, uint32_t res_type,
boolean_t composed)
{
scf_handle_t *h = dp->rd_handle;
struct rep_protocol_iter_start request;
struct rep_protocol_response response;
ssize_t r;
if (h != iter->iter_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
(void) pthread_mutex_lock(&h->rh_lock);
scf_iter_reset_locked(iter);
iter->iter_type = res_type;
request.rpr_request = REP_PROTOCOL_ITER_START;
request.rpr_iterid = iter->iter_id;
request.rpr_entity = dp->rd_entity;
request.rpr_itertype = res_type;
request.rpr_flags = RP_ITER_START_ALL |
(composed ? RP_ITER_START_COMPOSED : 0);
request.rpr_pattern[0] = 0;
datael_finish_reset(dp);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
if (r < 0) {
(void) pthread_mutex_unlock(&h->rh_lock);
DOOR_ERRORS_BLOCK(r);
}
if (response.rpr_response != REP_PROTOCOL_SUCCESS) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(proto_error(response.rpr_response)));
}
iter->iter_sequence++;
(void) pthread_mutex_unlock(&h->rh_lock);
return (SCF_SUCCESS);
}
static int
datael_setup_iter_pgtyped(scf_iter_t *iter, const scf_datael_t *dp,
const char *pgtype, boolean_t composed)
{
scf_handle_t *h = dp->rd_handle;
struct rep_protocol_iter_start request;
struct rep_protocol_response response;
ssize_t r;
if (h != iter->iter_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
if (pgtype == NULL || strlcpy(request.rpr_pattern, pgtype,
sizeof (request.rpr_pattern)) >= sizeof (request.rpr_pattern)) {
scf_iter_reset(iter);
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
(void) pthread_mutex_lock(&h->rh_lock);
request.rpr_request = REP_PROTOCOL_ITER_START;
request.rpr_iterid = iter->iter_id;
request.rpr_entity = dp->rd_entity;
request.rpr_itertype = REP_PROTOCOL_ENTITY_PROPERTYGRP;
request.rpr_flags = RP_ITER_START_PGTYPE |
(composed ? RP_ITER_START_COMPOSED : 0);
datael_finish_reset(dp);
scf_iter_reset_locked(iter);
iter->iter_type = REP_PROTOCOL_ENTITY_PROPERTYGRP;
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
if (r < 0) {
(void) pthread_mutex_unlock(&h->rh_lock);
DOOR_ERRORS_BLOCK(r);
}
if (response.rpr_response != REP_PROTOCOL_SUCCESS) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(proto_error(response.rpr_response)));
}
iter->iter_sequence++;
(void) pthread_mutex_unlock(&h->rh_lock);
return (SCF_SUCCESS);
}
static int
datael_iter_next(scf_iter_t *iter, scf_datael_t *out)
{
scf_handle_t *h = iter->iter_handle;
struct rep_protocol_iter_read request;
struct rep_protocol_response response;
ssize_t r;
if (h != out->rd_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
(void) pthread_mutex_lock(&h->rh_lock);
if (iter->iter_type == REP_PROTOCOL_ENTITY_NONE ||
iter->iter_sequence == 1) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_NOT_SET));
}
if (out->rd_type != iter->iter_type) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
request.rpr_request = REP_PROTOCOL_ITER_READ;
request.rpr_iterid = iter->iter_id;
request.rpr_sequence = iter->iter_sequence;
request.rpr_entityid = out->rd_entity;
datael_finish_reset(out);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
if (r < 0) {
(void) pthread_mutex_unlock(&h->rh_lock);
DOOR_ERRORS_BLOCK(r);
}
if (response.rpr_response == REP_PROTOCOL_DONE) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (0);
}
if (response.rpr_response != REP_PROTOCOL_SUCCESS) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(proto_error(response.rpr_response)));
}
iter->iter_sequence++;
(void) pthread_mutex_unlock(&h->rh_lock);
return (1);
}
int
scf_iter_scope_services(scf_iter_t *iter, const scf_scope_t *s)
{
return (datael_setup_iter(iter, &s->rd_d,
REP_PROTOCOL_ENTITY_SERVICE, 0));
}
int
scf_iter_next_service(scf_iter_t *iter, scf_service_t *out)
{
return (datael_iter_next(iter, &out->rd_d));
}
int
scf_iter_service_instances(scf_iter_t *iter, const scf_service_t *svc)
{
return (datael_setup_iter(iter, &svc->rd_d,
REP_PROTOCOL_ENTITY_INSTANCE, 0));
}
int
scf_iter_next_instance(scf_iter_t *iter, scf_instance_t *out)
{
return (datael_iter_next(iter, &out->rd_d));
}
int
scf_iter_service_pgs(scf_iter_t *iter, const scf_service_t *svc)
{
return (datael_setup_iter(iter, &svc->rd_d,
REP_PROTOCOL_ENTITY_PROPERTYGRP, 0));
}
int
scf_iter_service_pgs_typed(scf_iter_t *iter, const scf_service_t *svc,
const char *type)
{
return (datael_setup_iter_pgtyped(iter, &svc->rd_d, type, 0));
}
int
scf_iter_instance_snapshots(scf_iter_t *iter, const scf_instance_t *inst)
{
return (datael_setup_iter(iter, &inst->rd_d,
REP_PROTOCOL_ENTITY_SNAPSHOT, 0));
}
int
scf_iter_next_snapshot(scf_iter_t *iter, scf_snapshot_t *out)
{
return (datael_iter_next(iter, &out->rd_d));
}
int
scf_iter_instance_pgs(scf_iter_t *iter, const scf_instance_t *inst)
{
return (datael_setup_iter(iter, &inst->rd_d,
REP_PROTOCOL_ENTITY_PROPERTYGRP, 0));
}
int
scf_iter_instance_pgs_typed(scf_iter_t *iter, const scf_instance_t *inst,
const char *type)
{
return (datael_setup_iter_pgtyped(iter, &inst->rd_d, type, 0));
}
int
scf_iter_instance_pgs_composed(scf_iter_t *iter, const scf_instance_t *inst,
const scf_snapshot_t *snap)
{
if (snap != NULL && inst->rd_d.rd_handle != snap->rd_d.rd_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
return (datael_setup_iter(iter, snap ? &snap->rd_d : &inst->rd_d,
REP_PROTOCOL_ENTITY_PROPERTYGRP, 1));
}
int
scf_iter_instance_pgs_typed_composed(scf_iter_t *iter,
const scf_instance_t *inst, const scf_snapshot_t *snap, const char *type)
{
if (snap != NULL && inst->rd_d.rd_handle != snap->rd_d.rd_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
return (datael_setup_iter_pgtyped(iter,
snap ? &snap->rd_d : &inst->rd_d, type, 1));
}
int
scf_iter_snaplevel_pgs(scf_iter_t *iter, const scf_snaplevel_t *inst)
{
return (datael_setup_iter(iter, &inst->rd_d,
REP_PROTOCOL_ENTITY_PROPERTYGRP, 0));
}
int
scf_iter_snaplevel_pgs_typed(scf_iter_t *iter, const scf_snaplevel_t *inst,
const char *type)
{
return (datael_setup_iter_pgtyped(iter, &inst->rd_d, type, 0));
}
int
scf_iter_next_pg(scf_iter_t *iter, scf_propertygroup_t *out)
{
return (datael_iter_next(iter, &out->rd_d));
}
int
scf_iter_pg_properties(scf_iter_t *iter, const scf_propertygroup_t *pg)
{
return (datael_setup_iter(iter, &pg->rd_d,
REP_PROTOCOL_ENTITY_PROPERTY, 0));
}
int
scf_iter_next_property(scf_iter_t *iter, scf_property_t *out)
{
return (datael_iter_next(iter, &out->rd_d));
}
/*
* Fails with
* _INVALID_ARGUMENT - handle is NULL
* _INTERNAL - server response too big
* entity already set up with different type
* _NO_RESOURCES
* _NO_MEMORY
*/
scf_scope_t *
scf_scope_create(scf_handle_t *handle)
{
scf_scope_t *ret;
ret = uu_zalloc(sizeof (*ret));
if (ret != NULL) {
if (datael_init(&ret->rd_d, handle,
REP_PROTOCOL_ENTITY_SCOPE) == -1) {
uu_free(ret);
return (NULL);
}
} else {
(void) scf_set_error(SCF_ERROR_NO_MEMORY);
}
return (ret);
}
scf_handle_t *
scf_scope_handle(const scf_scope_t *val)
{
return (datael_handle(&val->rd_d));
}
void
scf_scope_destroy(scf_scope_t *val)
{
if (val == NULL)
return;
datael_destroy(&val->rd_d);
uu_free(val);
}
ssize_t
scf_scope_get_name(const scf_scope_t *rep, char *out, size_t len)
{
return (datael_get_name(&rep->rd_d, out, len, RP_ENTITY_NAME_NAME));
}
/*ARGSUSED*/
int
scf_scope_get_parent(const scf_scope_t *child, scf_scope_t *parent)
{
char name[1];
/* fake up the side-effects */
datael_reset(&parent->rd_d);
if (scf_scope_get_name(child, name, sizeof (name)) < 0)
return (-1);
return (scf_set_error(SCF_ERROR_NOT_FOUND));
}
/*
* Fails with _INVALID_ARGUMENT (handle is NULL), _HANDLE_DESTROYED, _INTERNAL
* (bad server response or id in use), _NO_RESOURCES, or _NO_MEMORY.
*/
scf_service_t *
scf_service_create(scf_handle_t *handle)
{
scf_service_t *ret;
ret = uu_zalloc(sizeof (*ret));
if (ret != NULL) {
if (datael_init(&ret->rd_d, handle,
REP_PROTOCOL_ENTITY_SERVICE) == -1) {
uu_free(ret);
return (NULL);
}
} else {
(void) scf_set_error(SCF_ERROR_NO_MEMORY);
}
return (ret);
}
/*
* Fails with
* _HANDLE_MISMATCH
* _INVALID_ARGUMENT
* _NOT_BOUND
* _CONNECTION_BROKEN
* _INTERNAL
* _EXISTS
* _DELETED
* _NOT_SET
* _NO_RESOURCES
* _PERMISSION_DENIED
* _BACKEND_ACCESS
* _BACKEND_READONLY
*/
int
scf_scope_add_service(const scf_scope_t *scope, const char *name,
scf_service_t *svc)
{
return (datael_add_child(&scope->rd_d, name,
REP_PROTOCOL_ENTITY_SERVICE, (svc != NULL)? &svc->rd_d : NULL));
}
/*
* Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
* _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
* _BACKEND_ACCESS, _NOT_FOUND.
*/
int
scf_scope_get_service(const scf_scope_t *s, const char *name,
scf_service_t *svc)
{
return (datael_get_child(&s->rd_d, name, REP_PROTOCOL_ENTITY_SERVICE,
svc ? &svc->rd_d : NULL, 0));
}
scf_handle_t *
scf_service_handle(const scf_service_t *val)
{
return (datael_handle(&val->rd_d));
}
int
scf_service_delete(scf_service_t *svc)
{
return (datael_delete(&svc->rd_d));
}
int
scf_instance_delete(scf_instance_t *inst)
{
return (datael_delete(&inst->rd_d));
}
int
scf_pg_delete(scf_propertygroup_t *pg)
{
return (datael_delete(&pg->rd_d));
}
int
_scf_snapshot_delete(scf_snapshot_t *snap)
{
return (datael_delete(&snap->rd_d));
}
/*
* Fails with
* _HANDLE_MISMATCH
* _INVALID_ARGUMENT
* _NOT_BOUND
* _CONNECTION_BROKEN
* _INTERNAL
* _EXISTS
* _DELETED
* _NOT_SET
* _NO_RESOURCES
* _PERMISSION_DENIED
* _BACKEND_ACCESS
* _BACKEND_READONLY
*/
int
scf_service_add_instance(const scf_service_t *svc, const char *name,
scf_instance_t *instance)
{
return (datael_add_child(&svc->rd_d, name,
REP_PROTOCOL_ENTITY_INSTANCE,
(instance != NULL)? &instance->rd_d : NULL));
}
/*
* Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
* _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
* _BACKEND_ACCESS, _NOT_FOUND.
*/
int
scf_service_get_instance(const scf_service_t *svc, const char *name,
scf_instance_t *inst)
{
return (datael_get_child(&svc->rd_d, name, REP_PROTOCOL_ENTITY_INSTANCE,
inst ? &inst->rd_d : NULL, 0));
}
int
scf_service_add_pg(const scf_service_t *svc, const char *name,
const char *type, uint32_t flags, scf_propertygroup_t *pg)
{
return (datael_add_pg(&svc->rd_d, name, type, flags,
(pg != NULL)?&pg->rd_d : NULL));
}
/*
* Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
* _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
* _BACKEND_ACCESS, _NOT_FOUND.
*/
int
scf_service_get_pg(const scf_service_t *svc, const char *name,
scf_propertygroup_t *pg)
{
return (datael_get_child(&svc->rd_d, name,
REP_PROTOCOL_ENTITY_PROPERTYGRP, pg ? &pg->rd_d : NULL, 0));
}
int
scf_instance_add_pg(const scf_instance_t *inst, const char *name,
const char *type, uint32_t flags, scf_propertygroup_t *pg)
{
return (datael_add_pg(&inst->rd_d, name, type, flags,
(pg != NULL)?&pg->rd_d : NULL));
}
/*
* Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
* _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
* _BACKEND_ACCESS, _NOT_FOUND.
*/
int
scf_instance_get_snapshot(const scf_instance_t *inst, const char *name,
scf_snapshot_t *pg)
{
return (datael_get_child(&inst->rd_d, name,
REP_PROTOCOL_ENTITY_SNAPSHOT, pg ? &pg->rd_d : NULL, 0));
}
/*
* Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
* _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
* _BACKEND_ACCESS, _NOT_FOUND.
*/
int
scf_instance_get_pg(const scf_instance_t *inst, const char *name,
scf_propertygroup_t *pg)
{
return (datael_get_child(&inst->rd_d, name,
REP_PROTOCOL_ENTITY_PROPERTYGRP, pg ? &pg->rd_d : NULL, 0));
}
/*
* Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
* _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
* _BACKEND_ACCESS, _NOT_FOUND.
*/
int
scf_instance_get_pg_composed(const scf_instance_t *inst,
const scf_snapshot_t *snap, const char *name, scf_propertygroup_t *pg)
{
if (snap != NULL && inst->rd_d.rd_handle != snap->rd_d.rd_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
return (datael_get_child(snap ? &snap->rd_d : &inst->rd_d, name,
REP_PROTOCOL_ENTITY_PROPERTYGRP, pg ? &pg->rd_d : NULL, 1));
}
/*
* Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
* _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
* _BACKEND_ACCESS, _NOT_FOUND.
*/
int
scf_pg_get_property(const scf_propertygroup_t *pg, const char *name,
scf_property_t *prop)
{
return (datael_get_child(&pg->rd_d, name, REP_PROTOCOL_ENTITY_PROPERTY,
prop ? &prop->rd_d : NULL, 0));
}
void
scf_service_destroy(scf_service_t *val)
{
if (val == NULL)
return;
datael_destroy(&val->rd_d);
uu_free(val);
}
ssize_t
scf_service_get_name(const scf_service_t *rep, char *out, size_t len)
{
return (datael_get_name(&rep->rd_d, out, len, RP_ENTITY_NAME_NAME));
}
/*
* Fails with _INVALID_ARGUMENT (handle is NULL), _HANDLE_DESTROYED, _INTERNAL
* (bad server response or id in use), _NO_RESOURCES, or _NO_MEMORY.
*/
scf_instance_t *
scf_instance_create(scf_handle_t *handle)
{
scf_instance_t *ret;
ret = uu_zalloc(sizeof (*ret));
if (ret != NULL) {
if (datael_init(&ret->rd_d, handle,
REP_PROTOCOL_ENTITY_INSTANCE) == -1) {
uu_free(ret);
return (NULL);
}
} else {
(void) scf_set_error(SCF_ERROR_NO_MEMORY);
}
return (ret);
}
scf_handle_t *
scf_instance_handle(const scf_instance_t *val)
{
return (datael_handle(&val->rd_d));
}
void
scf_instance_destroy(scf_instance_t *val)
{
if (val == NULL)
return;
datael_destroy(&val->rd_d);
uu_free(val);
}
ssize_t
scf_instance_get_name(const scf_instance_t *rep, char *out, size_t len)
{
return (datael_get_name(&rep->rd_d, out, len, RP_ENTITY_NAME_NAME));
}
/*
* Fails with _INVALID_ARGUMENT (handle is NULL), _HANDLE_DESTROYED, _INTERNAL
* (bad server response or id in use), _NO_RESOURCES, or _NO_MEMORY.
*/
scf_snapshot_t *
scf_snapshot_create(scf_handle_t *handle)
{
scf_snapshot_t *ret;
ret = uu_zalloc(sizeof (*ret));
if (ret != NULL) {
if (datael_init(&ret->rd_d, handle,
REP_PROTOCOL_ENTITY_SNAPSHOT) == -1) {
uu_free(ret);
return (NULL);
}
} else {
(void) scf_set_error(SCF_ERROR_NO_MEMORY);
}
return (ret);
}
scf_handle_t *
scf_snapshot_handle(const scf_snapshot_t *val)
{
return (datael_handle(&val->rd_d));
}
void
scf_snapshot_destroy(scf_snapshot_t *val)
{
if (val == NULL)
return;
datael_destroy(&val->rd_d);
uu_free(val);
}
ssize_t
scf_snapshot_get_name(const scf_snapshot_t *rep, char *out, size_t len)
{
return (datael_get_name(&rep->rd_d, out, len, RP_ENTITY_NAME_NAME));
}
/*
* Fails with _INVALID_ARGUMENT (handle is NULL), _HANDLE_DESTROYED, _INTERNAL
* (bad server response or id in use), _NO_RESOURCES, _NO_MEMORY.
*/
scf_snaplevel_t *
scf_snaplevel_create(scf_handle_t *handle)
{
scf_snaplevel_t *ret;
ret = uu_zalloc(sizeof (*ret));
if (ret != NULL) {
if (datael_init(&ret->rd_d, handle,
REP_PROTOCOL_ENTITY_SNAPLEVEL) == -1) {
uu_free(ret);
return (NULL);
}
} else {
(void) scf_set_error(SCF_ERROR_NO_MEMORY);
}
return (ret);
}
scf_handle_t *
scf_snaplevel_handle(const scf_snaplevel_t *val)
{
return (datael_handle(&val->rd_d));
}
void
scf_snaplevel_destroy(scf_snaplevel_t *val)
{
if (val == NULL)
return;
datael_destroy(&val->rd_d);
uu_free(val);
}
ssize_t
scf_snaplevel_get_scope_name(const scf_snaplevel_t *rep, char *out, size_t len)
{
return (datael_get_name(&rep->rd_d, out, len,
RP_ENTITY_NAME_SNAPLEVEL_SCOPE));
}
ssize_t
scf_snaplevel_get_service_name(const scf_snaplevel_t *rep, char *out,
size_t len)
{
return (datael_get_name(&rep->rd_d, out, len,
RP_ENTITY_NAME_SNAPLEVEL_SERVICE));
}
ssize_t
scf_snaplevel_get_instance_name(const scf_snaplevel_t *rep, char *out,
size_t len)
{
return (datael_get_name(&rep->rd_d, out, len,
RP_ENTITY_NAME_SNAPLEVEL_INSTANCE));
}
/*
* Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
* _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
* _BACKEND_ACCESS, _NOT_FOUND.
*/
int
scf_snaplevel_get_pg(const scf_snaplevel_t *snap, const char *name,
scf_propertygroup_t *pg)
{
return (datael_get_child(&snap->rd_d, name,
REP_PROTOCOL_ENTITY_PROPERTYGRP, pg ? &pg->rd_d : NULL, 0));
}
static int
snaplevel_next(const scf_datael_t *src, scf_snaplevel_t *dst_arg)
{
scf_handle_t *h = src->rd_handle;
scf_snaplevel_t *dst = dst_arg;
struct rep_protocol_entity_pair request;
struct rep_protocol_response response;
int r;
int dups = 0;
if (h != dst->rd_d.rd_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
if (src == &dst->rd_d) {
dups = 1;
dst = HANDLE_HOLD_SNAPLVL(h);
}
(void) pthread_mutex_lock(&h->rh_lock);
request.rpr_request = REP_PROTOCOL_NEXT_SNAPLEVEL;
request.rpr_entity_src = src->rd_entity;
request.rpr_entity_dst = dst->rd_d.rd_entity;
datael_finish_reset(src);
datael_finish_reset(&dst->rd_d);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
/*
* if we succeeded, we need to swap dst and dst_arg's identity. We
* take advantage of the fact that the only in-library knowledge is
* their entity ids.
*/
if (dups && r >= 0 &&
(response.rpr_response == REP_PROTOCOL_SUCCESS ||
response.rpr_response == REP_PROTOCOL_DONE)) {
int entity = dst->rd_d.rd_entity;
dst->rd_d.rd_entity = dst_arg->rd_d.rd_entity;
dst_arg->rd_d.rd_entity = entity;
}
(void) pthread_mutex_unlock(&h->rh_lock);
if (dups)
HANDLE_RELE_SNAPLVL(h);
if (r < 0)
DOOR_ERRORS_BLOCK(r);
if (response.rpr_response != REP_PROTOCOL_SUCCESS &&
response.rpr_response != REP_PROTOCOL_DONE) {
return (scf_set_error(proto_error(response.rpr_response)));
}
return (response.rpr_response == REP_PROTOCOL_SUCCESS) ?
SCF_SUCCESS : SCF_COMPLETE;
}
int scf_snapshot_get_base_snaplevel(const scf_snapshot_t *base,
scf_snaplevel_t *out)
{
return (snaplevel_next(&base->rd_d, out));
}
int scf_snaplevel_get_next_snaplevel(const scf_snaplevel_t *base,
scf_snaplevel_t *out)
{
return (snaplevel_next(&base->rd_d, out));
}
/*
* Fails with _INVALID_ARGUMENT (handle is NULL), _HANDLE_DESTROYED, _INTERNAL
* (bad server response or id in use), _NO_RESOURCES, or _NO_MEMORY.
*/
scf_propertygroup_t *
scf_pg_create(scf_handle_t *handle)
{
scf_propertygroup_t *ret;
ret = uu_zalloc(sizeof (*ret));
if (ret != NULL) {
if (datael_init(&ret->rd_d, handle,
REP_PROTOCOL_ENTITY_PROPERTYGRP) == -1) {
uu_free(ret);
return (NULL);
}
} else {
(void) scf_set_error(SCF_ERROR_NO_MEMORY);
}
return (ret);
}
scf_handle_t *
scf_pg_handle(const scf_propertygroup_t *val)
{
return (datael_handle(&val->rd_d));
}
void
scf_pg_destroy(scf_propertygroup_t *val)
{
if (val == NULL)
return;
datael_destroy(&val->rd_d);
uu_free(val);
}
ssize_t
scf_pg_get_name(const scf_propertygroup_t *pg, char *out, size_t len)
{
return (datael_get_name(&pg->rd_d, out, len, RP_ENTITY_NAME_NAME));
}
ssize_t
scf_pg_get_type(const scf_propertygroup_t *pg, char *out, size_t len)
{
return (datael_get_name(&pg->rd_d, out, len, RP_ENTITY_NAME_PGTYPE));
}
int
scf_pg_get_flags(const scf_propertygroup_t *pg, uint32_t *out)
{
char buf[REP_PROTOCOL_NAME_LEN];
ssize_t res;
res = datael_get_name(&pg->rd_d, buf, sizeof (buf),
RP_ENTITY_NAME_PGFLAGS);
if (res == -1)
return (-1);
if (uu_strtouint(buf, out, sizeof (*out), 0, 0, UINT32_MAX) == -1)
return (scf_set_error(SCF_ERROR_INTERNAL));
return (0);
}
static int
datael_update(scf_datael_t *dp)
{
scf_handle_t *h = dp->rd_handle;
struct rep_protocol_entity_update request;
struct rep_protocol_response response;
int r;
(void) pthread_mutex_lock(&h->rh_lock);
request.rpr_request = REP_PROTOCOL_ENTITY_UPDATE;
request.rpr_entityid = dp->rd_entity;
datael_finish_reset(dp);
request.rpr_changeid = handle_next_changeid(h);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
(void) pthread_mutex_unlock(&h->rh_lock);
if (r < 0)
DOOR_ERRORS_BLOCK(r);
/*
* This should never happen but if it does something has
* gone terribly wrong and we should abort.
*/
if (response.rpr_response == REP_PROTOCOL_FAIL_BAD_REQUEST)
abort();
if (response.rpr_response != REP_PROTOCOL_SUCCESS &&
response.rpr_response != REP_PROTOCOL_DONE) {
return (scf_set_error(proto_error(response.rpr_response)));
}
return (response.rpr_response == REP_PROTOCOL_SUCCESS) ?
SCF_SUCCESS : SCF_COMPLETE;
}
int
scf_pg_update(scf_propertygroup_t *pg)
{
return (datael_update(&pg->rd_d));
}
int
scf_snapshot_update(scf_snapshot_t *snap)
{
return (datael_update(&snap->rd_d));
}
int
_scf_pg_wait(scf_propertygroup_t *pg, int timeout)
{
scf_handle_t *h = pg->rd_d.rd_handle;
struct rep_protocol_propertygrp_request request;
struct rep_protocol_response response;
struct pollfd pollfd;
int r;
(void) pthread_mutex_lock(&h->rh_lock);
request.rpr_request = REP_PROTOCOL_PROPERTYGRP_SETUP_WAIT;
request.rpr_entityid = pg->rd_d.rd_entity;
datael_finish_reset(&pg->rd_d);
if (!handle_is_bound(h)) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_CONNECTION_BROKEN));
}
r = make_door_call_retfd(h->rh_doorfd, &request, sizeof (request),
&response, sizeof (response), &pollfd.fd);
(void) pthread_mutex_unlock(&h->rh_lock);
if (r < 0)
DOOR_ERRORS_BLOCK(r);
assert((response.rpr_response == REP_PROTOCOL_SUCCESS) ==
(pollfd.fd != -1));
if (response.rpr_response == REP_PROTOCOL_FAIL_NOT_LATEST)
return (SCF_SUCCESS);
if (response.rpr_response != REP_PROTOCOL_SUCCESS)
return (scf_set_error(proto_error(response.rpr_response)));
pollfd.events = 0;
pollfd.revents = 0;
r = poll(&pollfd, 1, timeout * MILLISEC);
(void) close(pollfd.fd);
return (pollfd.revents ? SCF_SUCCESS : SCF_COMPLETE);
}
static int
scf_notify_add_pattern(scf_handle_t *h, int type, const char *name)
{
struct rep_protocol_notify_request request;
struct rep_protocol_response response;
int r;
(void) pthread_mutex_lock(&h->rh_lock);
request.rpr_request = REP_PROTOCOL_CLIENT_ADD_NOTIFY;
request.rpr_type = type;
(void) strlcpy(request.rpr_pattern, name, sizeof (request.rpr_pattern));
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
(void) pthread_mutex_unlock(&h->rh_lock);
if (r < 0)
DOOR_ERRORS_BLOCK(r);
if (response.rpr_response != REP_PROTOCOL_SUCCESS)
return (scf_set_error(proto_error(response.rpr_response)));
return (SCF_SUCCESS);
}
int
_scf_notify_add_pgname(scf_handle_t *h, const char *name)
{
return (scf_notify_add_pattern(h, REP_PROTOCOL_NOTIFY_PGNAME, name));
}
int
_scf_notify_add_pgtype(scf_handle_t *h, const char *type)
{
return (scf_notify_add_pattern(h, REP_PROTOCOL_NOTIFY_PGTYPE, type));
}
int
_scf_notify_wait(scf_propertygroup_t *pg, char *out, size_t sz)
{
struct rep_protocol_wait_request request;
struct rep_protocol_fmri_response response;
scf_handle_t *h = pg->rd_d.rd_handle;
int dummy;
int fd;
int r;
(void) pthread_mutex_lock(&h->rh_lock);
datael_finish_reset(&pg->rd_d);
if (!handle_is_bound(h)) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_CONNECTION_BROKEN));
}
fd = h->rh_doorfd;
++h->rh_fd_users;
assert(h->rh_fd_users > 0);
request.rpr_request = REP_PROTOCOL_CLIENT_WAIT;
request.rpr_entityid = pg->rd_d.rd_entity;
(void) pthread_mutex_unlock(&h->rh_lock);
r = make_door_call_retfd(fd, &request, sizeof (request),
&response, sizeof (response), &dummy);
(void) pthread_mutex_lock(&h->rh_lock);
assert(h->rh_fd_users > 0);
if (--h->rh_fd_users == 0) {
(void) pthread_cond_broadcast(&h->rh_cv);
/*
* check for a delayed close, now that there are no other
* users.
*/
if (h->rh_doorfd_old != -1) {
assert(h->rh_doorfd == -1);
assert(fd == h->rh_doorfd_old);
(void) close(h->rh_doorfd_old);
h->rh_doorfd_old = -1;
}
}
handle_unrefed(h); /* drops h->rh_lock */
if (r < 0)
DOOR_ERRORS_BLOCK(r);
if (response.rpr_response == REP_PROTOCOL_DONE)
return (scf_set_error(SCF_ERROR_NOT_SET));
if (response.rpr_response != REP_PROTOCOL_SUCCESS)
return (scf_set_error(proto_error(response.rpr_response)));
/* the following will be non-zero for delete notifications */
return (strlcpy(out, response.rpr_fmri, sz));
}
static int
_scf_snapshot_take(scf_instance_t *inst, const char *name,
scf_snapshot_t *snap, int flags)
{
scf_handle_t *h = inst->rd_d.rd_handle;
struct rep_protocol_snapshot_take request;
struct rep_protocol_response response;
int r;
if (h != snap->rd_d.rd_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
if (strlcpy(request.rpr_name, (name != NULL)? name : "",
sizeof (request.rpr_name)) >= sizeof (request.rpr_name))
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
(void) pthread_mutex_lock(&h->rh_lock);
request.rpr_request = REP_PROTOCOL_SNAPSHOT_TAKE;
request.rpr_entityid_src = inst->rd_d.rd_entity;
request.rpr_entityid_dest = snap->rd_d.rd_entity;
request.rpr_flags = flags;
datael_finish_reset(&inst->rd_d);
datael_finish_reset(&snap->rd_d);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
(void) pthread_mutex_unlock(&h->rh_lock);
if (r < 0)
DOOR_ERRORS_BLOCK(r);
if (response.rpr_response != REP_PROTOCOL_SUCCESS)
return (scf_set_error(proto_error(response.rpr_response)));
return (SCF_SUCCESS);
}
int
_scf_snapshot_take_new_named(scf_instance_t *inst,
const char *svcname, const char *instname, const char *snapname,
scf_snapshot_t *snap)
{
scf_handle_t *h = inst->rd_d.rd_handle;
struct rep_protocol_snapshot_take_named request;
struct rep_protocol_response response;
int r;
if (h != snap->rd_d.rd_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
if (strlcpy(request.rpr_svcname, svcname,
sizeof (request.rpr_svcname)) >= sizeof (request.rpr_svcname))
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
if (strlcpy(request.rpr_instname, instname,
sizeof (request.rpr_instname)) >= sizeof (request.rpr_instname))
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
if (strlcpy(request.rpr_name, snapname,
sizeof (request.rpr_name)) >= sizeof (request.rpr_name))
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
(void) pthread_mutex_lock(&h->rh_lock);
request.rpr_request = REP_PROTOCOL_SNAPSHOT_TAKE_NAMED;
request.rpr_entityid_src = inst->rd_d.rd_entity;
request.rpr_entityid_dest = snap->rd_d.rd_entity;
datael_finish_reset(&inst->rd_d);
datael_finish_reset(&snap->rd_d);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
(void) pthread_mutex_unlock(&h->rh_lock);
if (r < 0)
DOOR_ERRORS_BLOCK(r);
if (response.rpr_response != REP_PROTOCOL_SUCCESS) {
assert(response.rpr_response !=
REP_PROTOCOL_FAIL_TYPE_MISMATCH);
return (scf_set_error(proto_error(response.rpr_response)));
}
return (SCF_SUCCESS);
}
int
_scf_snapshot_take_new(scf_instance_t *inst, const char *name,
scf_snapshot_t *snap)
{
return (_scf_snapshot_take(inst, name, snap, REP_SNAPSHOT_NEW));
}
int
_scf_snapshot_take_attach(scf_instance_t *inst, scf_snapshot_t *snap)
{
return (_scf_snapshot_take(inst, NULL, snap, REP_SNAPSHOT_ATTACH));
}
int
_scf_snapshot_attach(scf_snapshot_t *src, scf_snapshot_t *dest)
{
scf_handle_t *h = dest->rd_d.rd_handle;
struct rep_protocol_snapshot_attach request;
struct rep_protocol_response response;
int r;
if (h != src->rd_d.rd_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
(void) pthread_mutex_lock(&h->rh_lock);
request.rpr_request = REP_PROTOCOL_SNAPSHOT_ATTACH;
request.rpr_entityid_src = src->rd_d.rd_entity;
request.rpr_entityid_dest = dest->rd_d.rd_entity;
datael_finish_reset(&src->rd_d);
datael_finish_reset(&dest->rd_d);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
(void) pthread_mutex_unlock(&h->rh_lock);
if (r < 0)
DOOR_ERRORS_BLOCK(r);
if (response.rpr_response != REP_PROTOCOL_SUCCESS)
return (scf_set_error(proto_error(response.rpr_response)));
return (SCF_SUCCESS);
}
/*
* Fails with _INVALID_ARGUMENT (handle is NULL), _HANDLE_DESTROYED, _INTERNAL
* (bad server response or id in use), _NO_RESOURCES, or _NO_MEMORY.
*/
scf_property_t *
scf_property_create(scf_handle_t *handle)
{
scf_property_t *ret;
ret = uu_zalloc(sizeof (*ret));
if (ret != NULL) {
if (datael_init(&ret->rd_d, handle,
REP_PROTOCOL_ENTITY_PROPERTY) == -1) {
uu_free(ret);
return (NULL);
}
} else {
(void) scf_set_error(SCF_ERROR_NO_MEMORY);
}
return (ret);
}
scf_handle_t *
scf_property_handle(const scf_property_t *val)
{
return (datael_handle(&val->rd_d));
}
void
scf_property_destroy(scf_property_t *val)
{
if (val == NULL)
return;
datael_destroy(&val->rd_d);
uu_free(val);
}
static int
property_type_locked(const scf_property_t *prop,
rep_protocol_value_type_t *out)
{
scf_handle_t *h = prop->rd_d.rd_handle;
struct rep_protocol_property_request request;
struct rep_protocol_integer_response response;
int r;
assert(MUTEX_HELD(&h->rh_lock));
request.rpr_request = REP_PROTOCOL_PROPERTY_GET_TYPE;
request.rpr_entityid = prop->rd_d.rd_entity;
datael_finish_reset(&prop->rd_d);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
if (r < 0)
DOOR_ERRORS_BLOCK(r);
if (response.rpr_response != REP_PROTOCOL_SUCCESS ||
r < sizeof (response)) {
return (scf_set_error(proto_error(response.rpr_response)));
}
*out = response.rpr_value;
return (SCF_SUCCESS);
}
int
scf_property_type(const scf_property_t *prop, scf_type_t *out)
{
scf_handle_t *h = prop->rd_d.rd_handle;
rep_protocol_value_type_t out_raw;
int ret;
(void) pthread_mutex_lock(&h->rh_lock);
ret = property_type_locked(prop, &out_raw);
(void) pthread_mutex_unlock(&h->rh_lock);
if (ret == SCF_SUCCESS)
*out = scf_protocol_type_to_type(out_raw);
return (ret);
}
int
scf_property_is_type(const scf_property_t *prop, scf_type_t base_arg)
{
scf_handle_t *h = prop->rd_d.rd_handle;
rep_protocol_value_type_t base = scf_type_to_protocol_type(base_arg);
rep_protocol_value_type_t type;
int ret;
if (base == REP_PROTOCOL_TYPE_INVALID)
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
(void) pthread_mutex_lock(&h->rh_lock);
ret = property_type_locked(prop, &type);
(void) pthread_mutex_unlock(&h->rh_lock);
if (ret == SCF_SUCCESS) {
if (!scf_is_compatible_type(base, type))
return (scf_set_error(SCF_ERROR_TYPE_MISMATCH));
}
return (ret);
}
ssize_t
scf_property_get_name(const scf_property_t *prop, char *out, size_t len)
{
return (datael_get_name(&prop->rd_d, out, len, RP_ENTITY_NAME_NAME));
}
/*
* transaction functions
*/
/*
* Fails with _NO_MEMORY, _INVALID_ARGUMENT (handle is NULL), _HANDLE_DESTROYED,
* _INTERNAL (bad server response or id in use), or _NO_RESOURCES.
*/
scf_transaction_t *
scf_transaction_create(scf_handle_t *handle)
{
scf_transaction_t *ret;
ret = uu_zalloc(sizeof (scf_transaction_t));
if (ret == NULL) {
(void) scf_set_error(SCF_ERROR_NO_MEMORY);
return (NULL);
}
if (datael_init(&ret->tran_pg.rd_d, handle,
REP_PROTOCOL_ENTITY_PROPERTYGRP) == -1) {
uu_free(ret);
return (NULL); /* error already set */
}
ret->tran_state = TRAN_STATE_NEW;
ret->tran_props = uu_list_create(tran_entry_pool, ret, UU_LIST_SORTED);
if (ret->tran_props == NULL) {
datael_destroy(&ret->tran_pg.rd_d);
uu_free(ret);
(void) scf_set_error(SCF_ERROR_NO_MEMORY);
return (NULL);
}
return (ret);
}
scf_handle_t *
scf_transaction_handle(const scf_transaction_t *val)
{
return (handle_get(val->tran_pg.rd_d.rd_handle));
}
int
scf_transaction_start(scf_transaction_t *tran, scf_propertygroup_t *pg)
{
scf_handle_t *h = tran->tran_pg.rd_d.rd_handle;
struct rep_protocol_transaction_start request;
struct rep_protocol_response response;
int r;
if (h != pg->rd_d.rd_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
(void) pthread_mutex_lock(&h->rh_lock);
if (tran->tran_state != TRAN_STATE_NEW) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_IN_USE));
}
request.rpr_request = REP_PROTOCOL_PROPERTYGRP_TX_START;
request.rpr_entityid_tx = tran->tran_pg.rd_d.rd_entity;
request.rpr_entityid = pg->rd_d.rd_entity;
datael_finish_reset(&tran->tran_pg.rd_d);
datael_finish_reset(&pg->rd_d);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
if (r < 0) {
(void) pthread_mutex_unlock(&h->rh_lock);
DOOR_ERRORS_BLOCK(r);
}
/* r < sizeof (response) cannot happen because sizeof (response) == 4 */
if (response.rpr_response != REP_PROTOCOL_SUCCESS ||
r < sizeof (response)) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(proto_error(response.rpr_response)));
}
tran->tran_state = TRAN_STATE_SETUP;
tran->tran_invalid = 0;
(void) pthread_mutex_unlock(&h->rh_lock);
return (SCF_SUCCESS);
}
static void
entry_invalidate(scf_transaction_entry_t *cur, int and_destroy,
int and_reset_value)
{
scf_value_t *v, *next;
scf_transaction_t *tx;
scf_handle_t *h = cur->entry_handle;
assert(MUTEX_HELD(&h->rh_lock));
if ((tx = cur->entry_tx) != NULL) {
tx->tran_invalid = 1;
uu_list_remove(tx->tran_props, cur);
cur->entry_tx = NULL;
}
cur->entry_property = NULL;
cur->entry_state = ENTRY_STATE_INVALID;
cur->entry_action = REP_PROTOCOL_TX_ENTRY_INVALID;
cur->entry_type = REP_PROTOCOL_TYPE_INVALID;
for (v = cur->entry_head; v != NULL; v = next) {
next = v->value_next;
v->value_tx = NULL;
v->value_next = NULL;
if (and_destroy || and_reset_value)
scf_value_reset_locked(v, and_destroy);
}
cur->entry_head = NULL;
cur->entry_tail = NULL;
}
static void
entry_destroy_locked(scf_transaction_entry_t *entry)
{
scf_handle_t *h = entry->entry_handle;
assert(MUTEX_HELD(&h->rh_lock));
entry_invalidate(entry, 0, 0);
entry->entry_handle = NULL;
assert(h->rh_entries > 0);
--h->rh_entries;
--h->rh_extrefs;
uu_list_node_fini(entry, &entry->entry_link, tran_entry_pool);
uu_free(entry);
}
/*
* Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
* _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
* _BACKEND_ACCESS, _IN_USE, _NOT_FOUND, _EXISTS, _TYPE_MISMATCH.
*/
static int
transaction_add(scf_transaction_t *tran, scf_transaction_entry_t *entry,
enum rep_protocol_transaction_action action,
const char *prop, rep_protocol_value_type_t type)
{
scf_handle_t *h = tran->tran_pg.rd_d.rd_handle;
scf_transaction_entry_t *old;
scf_property_t *prop_p;
rep_protocol_value_type_t oldtype;
scf_error_t error = SCF_ERROR_NONE;
int ret;
uu_list_index_t idx;
if (h != entry->entry_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
if (action == REP_PROTOCOL_TX_ENTRY_DELETE)
assert(type == REP_PROTOCOL_TYPE_INVALID);
else if (type == REP_PROTOCOL_TYPE_INVALID)
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
prop_p = HANDLE_HOLD_PROPERTY(h);
(void) pthread_mutex_lock(&h->rh_lock);
if (tran->tran_state != TRAN_STATE_SETUP) {
error = SCF_ERROR_NOT_SET;
goto error;
}
if (tran->tran_invalid) {
error = SCF_ERROR_NOT_SET;
goto error;
}
if (entry->entry_state != ENTRY_STATE_INVALID)
entry_invalidate(entry, 0, 0);
old = uu_list_find(tran->tran_props, &prop, NULL, &idx);
if (old != NULL) {
error = SCF_ERROR_IN_USE;
goto error;
}
ret = datael_get_child_locked(&tran->tran_pg.rd_d, prop,
REP_PROTOCOL_ENTITY_PROPERTY, &prop_p->rd_d);
if (ret == -1 && (error = scf_error()) != SCF_ERROR_NOT_FOUND) {
goto error;
}
switch (action) {
case REP_PROTOCOL_TX_ENTRY_DELETE:
if (ret == -1) {
error = SCF_ERROR_NOT_FOUND;
goto error;
}
break;
case REP_PROTOCOL_TX_ENTRY_NEW:
if (ret != -1) {
error = SCF_ERROR_EXISTS;
goto error;
}
break;
case REP_PROTOCOL_TX_ENTRY_CLEAR:
case REP_PROTOCOL_TX_ENTRY_REPLACE:
if (ret == -1) {
error = SCF_ERROR_NOT_FOUND;
goto error;
}
if (action == REP_PROTOCOL_TX_ENTRY_CLEAR) {
if (property_type_locked(prop_p, &oldtype) == -1) {
error = scf_error();
goto error;
}
if (oldtype != type) {
error = SCF_ERROR_TYPE_MISMATCH;
goto error;
}
}
break;
default:
assert(0);
abort();
}
(void) strlcpy(entry->entry_namebuf, prop,
sizeof (entry->entry_namebuf));
entry->entry_property = entry->entry_namebuf;
entry->entry_action = action;
entry->entry_type = type;
entry->entry_state = ENTRY_STATE_IN_TX_ACTION;
entry->entry_tx = tran;
uu_list_insert(tran->tran_props, entry, idx);
(void) pthread_mutex_unlock(&h->rh_lock);
HANDLE_RELE_PROPERTY(h);
return (SCF_SUCCESS);
error:
(void) pthread_mutex_unlock(&h->rh_lock);
HANDLE_RELE_PROPERTY(h);
return (scf_set_error(error));
}
/*
* Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
* _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
* _BACKEND_ACCESS, _IN_USE, _NOT_FOUND, _EXISTS, _TYPE_MISMATCH.
*/
int
scf_transaction_property_new(scf_transaction_t *tx,
scf_transaction_entry_t *entry, const char *prop, scf_type_t type)
{
return (transaction_add(tx, entry, REP_PROTOCOL_TX_ENTRY_NEW,
prop, scf_type_to_protocol_type(type)));
}
/*
* Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
* _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
* _BACKEND_ACCESS, _IN_USE, _NOT_FOUND, _EXISTS, _TYPE_MISMATCH.
*/
int
scf_transaction_property_change(scf_transaction_t *tx,
scf_transaction_entry_t *entry, const char *prop, scf_type_t type)
{
return (transaction_add(tx, entry, REP_PROTOCOL_TX_ENTRY_CLEAR,
prop, scf_type_to_protocol_type(type)));
}
/*
* Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
* _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
* _BACKEND_ACCESS, _IN_USE, _NOT_FOUND, _EXISTS, _TYPE_MISMATCH.
*/
int
scf_transaction_property_change_type(scf_transaction_t *tx,
scf_transaction_entry_t *entry, const char *prop, scf_type_t type)
{
return (transaction_add(tx, entry, REP_PROTOCOL_TX_ENTRY_REPLACE,
prop, scf_type_to_protocol_type(type)));
}
/*
* Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _NOT_BOUND,
* _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED, _NO_RESOURCES,
* _BACKEND_ACCESS, _IN_USE, _NOT_FOUND, _EXISTS, _TYPE_MISMATCH.
*/
int
scf_transaction_property_delete(scf_transaction_t *tx,
scf_transaction_entry_t *entry, const char *prop)
{
return (transaction_add(tx, entry, REP_PROTOCOL_TX_ENTRY_DELETE,
prop, REP_PROTOCOL_TYPE_INVALID));
}
#define BAD_SIZE (-1UL)
static size_t
commit_value(caddr_t data, scf_value_t *val, rep_protocol_value_type_t t)
{
size_t len;
assert(val->value_type == t);
if (t == REP_PROTOCOL_TYPE_OPAQUE) {
len = scf_opaque_encode(data, val->value_value,
val->value_size);
} else {
if (data != NULL)
len = strlcpy(data, val->value_value,
REP_PROTOCOL_VALUE_LEN);
else
len = strlen(val->value_value);
if (len >= REP_PROTOCOL_VALUE_LEN)
return (BAD_SIZE);
}
return (len + 1); /* count the '\0' */
}
static size_t
commit_process(scf_transaction_entry_t *cur,
struct rep_protocol_transaction_cmd *out)
{
scf_value_t *child;
size_t sz = 0;
size_t len;
caddr_t data = (caddr_t)out->rptc_data;
caddr_t val_data;
if (out != NULL) {
len = strlcpy(data, cur->entry_property, REP_PROTOCOL_NAME_LEN);
out->rptc_action = cur->entry_action;
out->rptc_type = cur->entry_type;
out->rptc_name_len = len + 1;
} else {
len = strlen(cur->entry_property);
}
if (len >= REP_PROTOCOL_NAME_LEN)
return (BAD_SIZE);
len = TX_SIZE(len + 1);
sz += len;
val_data = data + len;
for (child = cur->entry_head; child != NULL;
child = child->value_next) {
assert(cur->entry_action != REP_PROTOCOL_TX_ENTRY_DELETE);
if (out != NULL) {
len = commit_value(val_data + sizeof (uint32_t), child,
cur->entry_type);
/* LINTED alignment */
*(uint32_t *)val_data = len;
} else
len = commit_value(NULL, child, cur->entry_type);
if (len == BAD_SIZE)
return (BAD_SIZE);
len += sizeof (uint32_t);
len = TX_SIZE(len);
sz += len;
val_data += len;
}
assert(val_data - data == sz);
if (out != NULL)
out->rptc_size = REP_PROTOCOL_TRANSACTION_CMD_SIZE(sz);
return (REP_PROTOCOL_TRANSACTION_CMD_SIZE(sz));
}
int
scf_transaction_commit(scf_transaction_t *tran)
{
scf_handle_t *h = tran->tran_pg.rd_d.rd_handle;
struct rep_protocol_transaction_commit *request;
struct rep_protocol_response response;
uintptr_t cmd;
scf_transaction_entry_t *cur;
size_t total, size;
size_t request_size;
size_t new_total;
int r;
(void) pthread_mutex_lock(&h->rh_lock);
if (tran->tran_state != TRAN_STATE_SETUP ||
tran->tran_invalid) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
total = 0;
for (cur = uu_list_first(tran->tran_props); cur != NULL;
cur = uu_list_next(tran->tran_props, cur)) {
size = commit_process(cur, NULL);
if (size == BAD_SIZE) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_INTERNAL));
}
assert(TX_SIZE(size) == size);
total += size;
}
request_size = REP_PROTOCOL_TRANSACTION_COMMIT_SIZE(total);
request = alloca(request_size);
(void) memset(request, '\0', request_size);
request->rpr_request = REP_PROTOCOL_PROPERTYGRP_TX_COMMIT;
request->rpr_entityid = tran->tran_pg.rd_d.rd_entity;
request->rpr_size = request_size;
cmd = (uintptr_t)request->rpr_cmd;
datael_finish_reset(&tran->tran_pg.rd_d);
new_total = 0;
for (cur = uu_list_first(tran->tran_props); cur != NULL;
cur = uu_list_next(tran->tran_props, cur)) {
size = commit_process(cur, (void *)cmd);
if (size == BAD_SIZE) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_INTERNAL));
}
cmd += size;
new_total += size;
}
assert(new_total == total);
r = make_door_call(h, request, request_size,
&response, sizeof (response));
if (r < 0) {
(void) pthread_mutex_unlock(&h->rh_lock);
DOOR_ERRORS_BLOCK(r);
}
if (response.rpr_response != REP_PROTOCOL_SUCCESS &&
response.rpr_response != REP_PROTOCOL_FAIL_NOT_LATEST) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(proto_error(response.rpr_response)));
}
tran->tran_state = TRAN_STATE_COMMITTED;
(void) pthread_mutex_unlock(&h->rh_lock);
return (response.rpr_response == REP_PROTOCOL_SUCCESS);
}
static void
transaction_reset(scf_transaction_t *tran)
{
assert(MUTEX_HELD(&tran->tran_pg.rd_d.rd_handle->rh_lock));
tran->tran_state = TRAN_STATE_NEW;
datael_reset_locked(&tran->tran_pg.rd_d);
}
static void
scf_transaction_reset_impl(scf_transaction_t *tran, int and_destroy,
int and_reset_value)
{
scf_transaction_entry_t *cur;
void *cookie;
(void) pthread_mutex_lock(&tran->tran_pg.rd_d.rd_handle->rh_lock);
cookie = NULL;
while ((cur = uu_list_teardown(tran->tran_props, &cookie)) != NULL) {
cur->entry_tx = NULL;
assert(cur->entry_state == ENTRY_STATE_IN_TX_ACTION);
cur->entry_state = ENTRY_STATE_INVALID;
entry_invalidate(cur, and_destroy, and_reset_value);
if (and_destroy)
entry_destroy_locked(cur);
}
transaction_reset(tran);
handle_unrefed(tran->tran_pg.rd_d.rd_handle);
}
void
scf_transaction_reset(scf_transaction_t *tran)
{
scf_transaction_reset_impl(tran, 0, 0);
}
void
scf_transaction_reset_all(scf_transaction_t *tran)
{
scf_transaction_reset_impl(tran, 0, 1);
}
void
scf_transaction_destroy(scf_transaction_t *val)
{
if (val == NULL)
return;
scf_transaction_reset(val);
datael_destroy(&val->tran_pg.rd_d);
uu_list_destroy(val->tran_props);
uu_free(val);
}
void
scf_transaction_destroy_children(scf_transaction_t *tran)
{
scf_transaction_reset_impl(tran, 1, 0);
}
scf_transaction_entry_t *
scf_entry_create(scf_handle_t *h)
{
scf_transaction_entry_t *ret;
if (h == NULL) {
(void) scf_set_error(SCF_ERROR_INVALID_ARGUMENT);
return (NULL);
}
ret = uu_zalloc(sizeof (scf_transaction_entry_t));
if (ret == NULL) {
(void) scf_set_error(SCF_ERROR_NO_MEMORY);
return (NULL);
}
ret->entry_action = REP_PROTOCOL_TX_ENTRY_INVALID;
ret->entry_handle = h;
(void) pthread_mutex_lock(&h->rh_lock);
if (h->rh_flags & HANDLE_DEAD) {
(void) pthread_mutex_unlock(&h->rh_lock);
uu_free(ret);
(void) scf_set_error(SCF_ERROR_HANDLE_DESTROYED);
return (NULL);
}
h->rh_entries++;
h->rh_extrefs++;
(void) pthread_mutex_unlock(&h->rh_lock);
uu_list_node_init(ret, &ret->entry_link, tran_entry_pool);
return (ret);
}
scf_handle_t *
scf_entry_handle(const scf_transaction_entry_t *val)
{
return (handle_get(val->entry_handle));
}
void
scf_entry_reset(scf_transaction_entry_t *entry)
{
scf_handle_t *h = entry->entry_handle;
(void) pthread_mutex_lock(&h->rh_lock);
entry_invalidate(entry, 0, 0);
(void) pthread_mutex_unlock(&h->rh_lock);
}
void
scf_entry_destroy_children(scf_transaction_entry_t *entry)
{
scf_handle_t *h = entry->entry_handle;
(void) pthread_mutex_lock(&h->rh_lock);
entry_invalidate(entry, 1, 0);
handle_unrefed(h); /* drops h->rh_lock */
}
void
scf_entry_destroy(scf_transaction_entry_t *entry)
{
scf_handle_t *h;
if (entry == NULL)
return;
h = entry->entry_handle;
(void) pthread_mutex_lock(&h->rh_lock);
entry_destroy_locked(entry);
handle_unrefed(h); /* drops h->rh_lock */
}
/*
* Fails with
* _HANDLE_MISMATCH
* _NOT_SET - has not been added to a transaction
* _INTERNAL - entry is corrupt
* _INVALID_ARGUMENT - entry's transaction is not started or corrupt
* entry is set to delete a property
* v is reset or corrupt
* _TYPE_MISMATCH - entry & v's types aren't compatible
* _IN_USE - v has been added to another entry
*/
int
scf_entry_add_value(scf_transaction_entry_t *entry, scf_value_t *v)
{
scf_handle_t *h = entry->entry_handle;
if (h != v->value_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
(void) pthread_mutex_lock(&h->rh_lock);
if (entry->entry_state == ENTRY_STATE_INVALID) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_NOT_SET));
}
if (entry->entry_state != ENTRY_STATE_IN_TX_ACTION) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_INTERNAL));
}
if (entry->entry_tx->tran_state != TRAN_STATE_SETUP) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
if (entry->entry_action == REP_PROTOCOL_TX_ENTRY_DELETE) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
if (v->value_type == REP_PROTOCOL_TYPE_INVALID) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
if (!scf_is_compatible_type(entry->entry_type, v->value_type)) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_TYPE_MISMATCH));
}
if (v->value_tx != NULL) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_IN_USE));
}
v->value_tx = entry;
v->value_next = NULL;
if (entry->entry_head == NULL) {
entry->entry_head = v;
entry->entry_tail = v;
} else {
entry->entry_tail->value_next = v;
entry->entry_tail = v;
}
(void) pthread_mutex_unlock(&h->rh_lock);
return (SCF_SUCCESS);
}
/*
* value functions
*/
scf_value_t *
scf_value_create(scf_handle_t *h)
{
scf_value_t *ret;
if (h == NULL) {
(void) scf_set_error(SCF_ERROR_INVALID_ARGUMENT);
return (NULL);
}
ret = uu_zalloc(sizeof (*ret));
if (ret != NULL) {
ret->value_type = REP_PROTOCOL_TYPE_INVALID;
ret->value_handle = h;
(void) pthread_mutex_lock(&h->rh_lock);
if (h->rh_flags & HANDLE_DEAD) {
(void) pthread_mutex_unlock(&h->rh_lock);
uu_free(ret);
(void) scf_set_error(SCF_ERROR_HANDLE_DESTROYED);
return (NULL);
}
h->rh_values++;
h->rh_extrefs++;
(void) pthread_mutex_unlock(&h->rh_lock);
} else {
(void) scf_set_error(SCF_ERROR_NO_MEMORY);
}
return (ret);
}
static void
scf_value_reset_locked(scf_value_t *val, int and_destroy)
{
scf_value_t **curp;
scf_transaction_entry_t *te;
scf_handle_t *h = val->value_handle;
assert(MUTEX_HELD(&h->rh_lock));
if (val->value_tx != NULL) {
te = val->value_tx;
te->entry_tx->tran_invalid = 1;
val->value_tx = NULL;
for (curp = &te->entry_head; *curp != NULL;
curp = &(*curp)->value_next) {
if (*curp == val) {
*curp = val->value_next;
curp = NULL;
break;
}
}
assert(curp == NULL);
}
val->value_type = REP_PROTOCOL_TYPE_INVALID;
if (and_destroy) {
val->value_handle = NULL;
assert(h->rh_values > 0);
--h->rh_values;
--h->rh_extrefs;
uu_free(val);
}
}
void
scf_value_reset(scf_value_t *val)
{
scf_handle_t *h = val->value_handle;
(void) pthread_mutex_lock(&h->rh_lock);
scf_value_reset_locked(val, 0);
(void) pthread_mutex_unlock(&h->rh_lock);
}
scf_handle_t *
scf_value_handle(const scf_value_t *val)
{
return (handle_get(val->value_handle));
}
void
scf_value_destroy(scf_value_t *val)
{
scf_handle_t *h;
if (val == NULL)
return;
h = val->value_handle;
(void) pthread_mutex_lock(&h->rh_lock);
scf_value_reset_locked(val, 1);
handle_unrefed(h); /* drops h->rh_lock */
}
scf_type_t
scf_value_base_type(const scf_value_t *val)
{
rep_protocol_value_type_t t, cur;
scf_handle_t *h = val->value_handle;
(void) pthread_mutex_lock(&h->rh_lock);
t = val->value_type;
(void) pthread_mutex_unlock(&h->rh_lock);
for (;;) {
cur = scf_proto_underlying_type(t);
if (cur == t)
break;
t = cur;
}
return (scf_protocol_type_to_type(t));
}
scf_type_t
scf_value_type(const scf_value_t *val)
{
rep_protocol_value_type_t t;
scf_handle_t *h = val->value_handle;
(void) pthread_mutex_lock(&h->rh_lock);
t = val->value_type;
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_protocol_type_to_type(t));
}
int
scf_value_is_type(const scf_value_t *val, scf_type_t base_arg)
{
rep_protocol_value_type_t t;
rep_protocol_value_type_t base = scf_type_to_protocol_type(base_arg);
scf_handle_t *h = val->value_handle;
(void) pthread_mutex_lock(&h->rh_lock);
t = val->value_type;
(void) pthread_mutex_unlock(&h->rh_lock);
if (t == REP_PROTOCOL_TYPE_INVALID)
return (scf_set_error(SCF_ERROR_NOT_SET));
if (base == REP_PROTOCOL_TYPE_INVALID)
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
if (!scf_is_compatible_type(base, t))
return (scf_set_error(SCF_ERROR_TYPE_MISMATCH));
return (SCF_SUCCESS);
}
/*
* Fails with
* _NOT_SET - val is reset
* _TYPE_MISMATCH - val's type is not compatible with t
*/
static int
scf_value_check_type(const scf_value_t *val, rep_protocol_value_type_t t)
{
if (val->value_type == REP_PROTOCOL_TYPE_INVALID) {
(void) scf_set_error(SCF_ERROR_NOT_SET);
return (0);
}
if (!scf_is_compatible_type(t, val->value_type)) {
(void) scf_set_error(SCF_ERROR_TYPE_MISMATCH);
return (0);
}
return (1);
}
/*
* Fails with
* _NOT_SET - val is reset
* _TYPE_MISMATCH - val is not _TYPE_BOOLEAN
*/
int
scf_value_get_boolean(const scf_value_t *val, uint8_t *out)
{
char c;
scf_handle_t *h = val->value_handle;
uint8_t o;
(void) pthread_mutex_lock(&h->rh_lock);
if (!scf_value_check_type(val, REP_PROTOCOL_TYPE_BOOLEAN)) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (-1);
}
c = val->value_value[0];
assert((c == '0' || c == '1') && val->value_value[1] == 0);
o = (c != '0');
(void) pthread_mutex_unlock(&h->rh_lock);
if (out != NULL)
*out = o;
return (SCF_SUCCESS);
}
int
scf_value_get_count(const scf_value_t *val, uint64_t *out)
{
scf_handle_t *h = val->value_handle;
uint64_t o;
(void) pthread_mutex_lock(&h->rh_lock);
if (!scf_value_check_type(val, REP_PROTOCOL_TYPE_COUNT)) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (-1);
}
o = strtoull(val->value_value, NULL, 10);
(void) pthread_mutex_unlock(&h->rh_lock);
if (out != NULL)
*out = o;
return (SCF_SUCCESS);
}
int
scf_value_get_integer(const scf_value_t *val, int64_t *out)
{
scf_handle_t *h = val->value_handle;
int64_t o;
(void) pthread_mutex_lock(&h->rh_lock);
if (!scf_value_check_type(val, REP_PROTOCOL_TYPE_INTEGER)) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (-1);
}
o = strtoll(val->value_value, NULL, 10);
(void) pthread_mutex_unlock(&h->rh_lock);
if (out != NULL)
*out = o;
return (SCF_SUCCESS);
}
int
scf_value_get_time(const scf_value_t *val, int64_t *sec_out, int32_t *nsec_out)
{
scf_handle_t *h = val->value_handle;
char *p;
int64_t os;
int32_t ons;
(void) pthread_mutex_lock(&h->rh_lock);
if (!scf_value_check_type(val, REP_PROTOCOL_TYPE_TIME)) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (-1);
}
os = strtoll(val->value_value, &p, 10);
if (*p == '.')
ons = strtoul(p + 1, NULL, 10);
else
ons = 0;
(void) pthread_mutex_unlock(&h->rh_lock);
if (sec_out != NULL)
*sec_out = os;
if (nsec_out != NULL)
*nsec_out = ons;
return (SCF_SUCCESS);
}
/*
* Fails with
* _NOT_SET - val is reset
* _TYPE_MISMATCH - val's type is not compatible with _TYPE_STRING.
*/
ssize_t
scf_value_get_astring(const scf_value_t *val, char *out, size_t len)
{
ssize_t ret;
scf_handle_t *h = val->value_handle;
(void) pthread_mutex_lock(&h->rh_lock);
if (!scf_value_check_type(val, REP_PROTOCOL_TYPE_STRING)) {
(void) pthread_mutex_unlock(&h->rh_lock);
return ((ssize_t)-1);
}
ret = (ssize_t)strlcpy(out, val->value_value, len);
(void) pthread_mutex_unlock(&h->rh_lock);
return (ret);
}
ssize_t
scf_value_get_ustring(const scf_value_t *val, char *out, size_t len)
{
ssize_t ret;
scf_handle_t *h = val->value_handle;
(void) pthread_mutex_lock(&h->rh_lock);
if (!scf_value_check_type(val, REP_PROTOCOL_SUBTYPE_USTRING)) {
(void) pthread_mutex_unlock(&h->rh_lock);
return ((ssize_t)-1);
}
ret = (ssize_t)strlcpy(out, val->value_value, len);
(void) pthread_mutex_unlock(&h->rh_lock);
return (ret);
}
ssize_t
scf_value_get_opaque(const scf_value_t *v, void *out, size_t len)
{
ssize_t ret;
scf_handle_t *h = v->value_handle;
(void) pthread_mutex_lock(&h->rh_lock);
if (!scf_value_check_type(v, REP_PROTOCOL_TYPE_OPAQUE)) {
(void) pthread_mutex_unlock(&h->rh_lock);
return ((ssize_t)-1);
}
if (len > v->value_size)
len = v->value_size;
ret = len;
(void) memcpy(out, v->value_value, len);
(void) pthread_mutex_unlock(&h->rh_lock);
return (ret);
}
void
scf_value_set_boolean(scf_value_t *v, uint8_t new)
{
scf_handle_t *h = v->value_handle;
(void) pthread_mutex_lock(&h->rh_lock);
scf_value_reset_locked(v, 0);
v->value_type = REP_PROTOCOL_TYPE_BOOLEAN;
(void) sprintf(v->value_value, "%d", (new != 0));
(void) pthread_mutex_unlock(&h->rh_lock);
}
void
scf_value_set_count(scf_value_t *v, uint64_t new)
{
scf_handle_t *h = v->value_handle;
(void) pthread_mutex_lock(&h->rh_lock);
scf_value_reset_locked(v, 0);
v->value_type = REP_PROTOCOL_TYPE_COUNT;
(void) sprintf(v->value_value, "%llu", (unsigned long long)new);
(void) pthread_mutex_unlock(&h->rh_lock);
}
void
scf_value_set_integer(scf_value_t *v, int64_t new)
{
scf_handle_t *h = v->value_handle;
(void) pthread_mutex_lock(&h->rh_lock);
scf_value_reset_locked(v, 0);
v->value_type = REP_PROTOCOL_TYPE_INTEGER;
(void) sprintf(v->value_value, "%lld", (long long)new);
(void) pthread_mutex_unlock(&h->rh_lock);
}
int
scf_value_set_time(scf_value_t *v, int64_t new_sec, int32_t new_nsec)
{
scf_handle_t *h = v->value_handle;
(void) pthread_mutex_lock(&h->rh_lock);
scf_value_reset_locked(v, 0);
if (new_nsec < 0 || new_nsec >= NANOSEC) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
v->value_type = REP_PROTOCOL_TYPE_TIME;
if (new_nsec == 0)
(void) sprintf(v->value_value, "%lld", (long long)new_sec);
else
(void) sprintf(v->value_value, "%lld.%09u", (long long)new_sec,
(unsigned)new_nsec);
(void) pthread_mutex_unlock(&h->rh_lock);
return (0);
}
int
scf_value_set_astring(scf_value_t *v, const char *new)
{
scf_handle_t *h = v->value_handle;
(void) pthread_mutex_lock(&h->rh_lock);
scf_value_reset_locked(v, 0);
if (!scf_validate_encoded_value(REP_PROTOCOL_TYPE_STRING, new)) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
if (strlcpy(v->value_value, new, sizeof (v->value_value)) >=
sizeof (v->value_value)) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
v->value_type = REP_PROTOCOL_TYPE_STRING;
(void) pthread_mutex_unlock(&h->rh_lock);
return (0);
}
int
scf_value_set_ustring(scf_value_t *v, const char *new)
{
scf_handle_t *h = v->value_handle;
(void) pthread_mutex_lock(&h->rh_lock);
scf_value_reset_locked(v, 0);
if (!scf_validate_encoded_value(REP_PROTOCOL_SUBTYPE_USTRING, new)) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
if (strlcpy(v->value_value, new, sizeof (v->value_value)) >=
sizeof (v->value_value)) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
v->value_type = REP_PROTOCOL_SUBTYPE_USTRING;
(void) pthread_mutex_unlock(&h->rh_lock);
return (0);
}
int
scf_value_set_opaque(scf_value_t *v, const void *new, size_t len)
{
scf_handle_t *h = v->value_handle;
(void) pthread_mutex_lock(&h->rh_lock);
scf_value_reset_locked(v, 0);
if (len > sizeof (v->value_value)) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
(void) memcpy(v->value_value, new, len);
v->value_size = len;
v->value_type = REP_PROTOCOL_TYPE_OPAQUE;
(void) pthread_mutex_unlock(&h->rh_lock);
return (0);
}
/*
* Fails with
* _NOT_SET - v_arg is reset
* _INTERNAL - v_arg is corrupt
*
* If t is not _TYPE_INVALID, fails with
* _TYPE_MISMATCH - v_arg's type is not compatible with t
*/
static ssize_t
scf_value_get_as_string_common(const scf_value_t *v_arg,
rep_protocol_value_type_t t, char *buf, size_t bufsz)
{
scf_handle_t *h = v_arg->value_handle;
scf_value_t v_s;
scf_value_t *v = &v_s;
ssize_t r;
uint8_t b;
(void) pthread_mutex_lock(&h->rh_lock);
if (t != REP_PROTOCOL_TYPE_INVALID && !scf_value_check_type(v_arg, t)) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (-1);
}
v_s = *v_arg; /* copy locally so we can unlock */
h->rh_values++; /* keep the handle from going away */
h->rh_extrefs++;
(void) pthread_mutex_unlock(&h->rh_lock);
switch (REP_PROTOCOL_BASE_TYPE(v->value_type)) {
case REP_PROTOCOL_TYPE_BOOLEAN:
r = scf_value_get_boolean(v, &b);
assert(r == SCF_SUCCESS);
r = strlcpy(buf, b ? "true" : "false", bufsz);
break;
case REP_PROTOCOL_TYPE_COUNT:
case REP_PROTOCOL_TYPE_INTEGER:
case REP_PROTOCOL_TYPE_TIME:
case REP_PROTOCOL_TYPE_STRING:
r = strlcpy(buf, v->value_value, bufsz);
break;
case REP_PROTOCOL_TYPE_OPAQUE:
/*
* Note that we only write out full hex bytes -- if they're
* short, and bufsz is even, we'll only fill (bufsz - 2) bytes
* with data.
*/
if (bufsz > 0)
(void) scf_opaque_encode(buf, v->value_value,
MIN(v->value_size, (bufsz - 1)/2));
r = (v->value_size * 2);
break;
case REP_PROTOCOL_TYPE_INVALID:
r = scf_set_error(SCF_ERROR_NOT_SET);
break;
default:
r = (scf_set_error(SCF_ERROR_INTERNAL));
break;
}
(void) pthread_mutex_lock(&h->rh_lock);
h->rh_values--;
h->rh_extrefs--;
handle_unrefed(h);
return (r);
}
ssize_t
scf_value_get_as_string(const scf_value_t *v, char *buf, size_t bufsz)
{
return (scf_value_get_as_string_common(v, REP_PROTOCOL_TYPE_INVALID,
buf, bufsz));
}
ssize_t
scf_value_get_as_string_typed(const scf_value_t *v, scf_type_t type,
char *buf, size_t bufsz)
{
rep_protocol_value_type_t ty = scf_type_to_protocol_type(type);
if (ty == REP_PROTOCOL_TYPE_INVALID)
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
return (scf_value_get_as_string_common(v, ty, buf, bufsz));
}
int
scf_value_set_from_string(scf_value_t *v, scf_type_t type, const char *str)
{
scf_handle_t *h = v->value_handle;
rep_protocol_value_type_t ty;
switch (type) {
case SCF_TYPE_BOOLEAN: {
uint8_t b;
if (strcmp(str, "true") == 0 || strcmp(str, "t") == 0 ||
strcmp(str, "1") == 0)
b = 1;
else if (strcmp(str, "false") == 0 ||
strcmp(str, "f") == 0 || strcmp(str, "0") == 0)
b = 0;
else {
goto bad;
}
scf_value_set_boolean(v, b);
return (0);
}
case SCF_TYPE_COUNT: {
uint64_t c;
char *endp;
errno = 0;
c = strtoull(str, &endp, 0);
if (errno != 0 || endp == str || *endp != '\0')
goto bad;
scf_value_set_count(v, c);
return (0);
}
case SCF_TYPE_INTEGER: {
int64_t i;
char *endp;
errno = 0;
i = strtoll(str, &endp, 0);
if (errno != 0 || endp == str || *endp != '\0')
goto bad;
scf_value_set_integer(v, i);
return (0);
}
case SCF_TYPE_TIME: {
int64_t s;
uint32_t ns = 0;
char *endp, *ns_str;
size_t len;
errno = 0;
s = strtoll(str, &endp, 10);
if (errno != 0 || endp == str ||
(*endp != '\0' && *endp != '.'))
goto bad;
if (*endp == '.') {
ns_str = endp + 1;
len = strlen(ns_str);
if (len == 0 || len > 9)
goto bad;
ns = strtoul(ns_str, &endp, 10);
if (errno != 0 || endp == ns_str || *endp != '\0')
goto bad;
while (len++ < 9)
ns *= 10;
assert(ns < NANOSEC);
}
return (scf_value_set_time(v, s, ns));
}
case SCF_TYPE_ASTRING:
case SCF_TYPE_USTRING:
case SCF_TYPE_OPAQUE:
case SCF_TYPE_URI:
case SCF_TYPE_FMRI:
case SCF_TYPE_HOST:
case SCF_TYPE_HOSTNAME:
case SCF_TYPE_NET_ADDR_V4:
case SCF_TYPE_NET_ADDR_V6:
ty = scf_type_to_protocol_type(type);
(void) pthread_mutex_lock(&h->rh_lock);
scf_value_reset_locked(v, 0);
if (type == SCF_TYPE_OPAQUE) {
v->value_size = scf_opaque_decode(v->value_value,
str, sizeof (v->value_value));
if (!scf_validate_encoded_value(ty, str)) {
(void) pthread_mutex_lock(&h->rh_lock);
goto bad;
}
} else {
(void) strlcpy(v->value_value, str,
sizeof (v->value_value));
if (!scf_validate_encoded_value(ty, v->value_value)) {
(void) pthread_mutex_lock(&h->rh_lock);
goto bad;
}
}
v->value_type = ty;
(void) pthread_mutex_unlock(&h->rh_lock);
return (SCF_SUCCESS);
case REP_PROTOCOL_TYPE_INVALID:
default:
scf_value_reset(v);
return (scf_set_error(SCF_ERROR_TYPE_MISMATCH));
}
bad:
scf_value_reset(v);
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
int
scf_iter_property_values(scf_iter_t *iter, const scf_property_t *prop)
{
return (datael_setup_iter(iter, &prop->rd_d,
REP_PROTOCOL_ENTITY_VALUE, 0));
}
int
scf_iter_next_value(scf_iter_t *iter, scf_value_t *v)
{
scf_handle_t *h = iter->iter_handle;
struct rep_protocol_iter_read_value request;
struct rep_protocol_value_response response;
int r;
if (h != v->value_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
(void) pthread_mutex_lock(&h->rh_lock);
scf_value_reset_locked(v, 0);
if (iter->iter_type == REP_PROTOCOL_ENTITY_NONE) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_NOT_SET));
}
if (iter->iter_type != REP_PROTOCOL_ENTITY_VALUE) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
request.rpr_request = REP_PROTOCOL_ITER_READ_VALUE;
request.rpr_iterid = iter->iter_id;
request.rpr_sequence = iter->iter_sequence;
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
if (r < 0) {
(void) pthread_mutex_unlock(&h->rh_lock);
DOOR_ERRORS_BLOCK(r);
}
if (response.rpr_response == REP_PROTOCOL_DONE) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (0);
}
if (response.rpr_response != REP_PROTOCOL_SUCCESS) {
(void) pthread_mutex_unlock(&h->rh_lock);
return (scf_set_error(proto_error(response.rpr_response)));
}
iter->iter_sequence++;
v->value_type = response.rpr_type;
assert(scf_validate_encoded_value(response.rpr_type,
response.rpr_value));
if (v->value_type != REP_PROTOCOL_TYPE_OPAQUE) {
(void) strlcpy(v->value_value, response.rpr_value,
sizeof (v->value_value));
} else {
v->value_size = scf_opaque_decode(v->value_value,
response.rpr_value, sizeof (v->value_value));
}
(void) pthread_mutex_unlock(&h->rh_lock);
return (1);
}
int
scf_property_get_value(const scf_property_t *prop, scf_value_t *v)
{
scf_handle_t *h = prop->rd_d.rd_handle;
struct rep_protocol_property_request request;
struct rep_protocol_value_response response;
int r;
if (h != v->value_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
(void) pthread_mutex_lock(&h->rh_lock);
request.rpr_request = REP_PROTOCOL_PROPERTY_GET_VALUE;
request.rpr_entityid = prop->rd_d.rd_entity;
scf_value_reset_locked(v, 0);
datael_finish_reset(&prop->rd_d);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
if (r < 0) {
(void) pthread_mutex_unlock(&h->rh_lock);
DOOR_ERRORS_BLOCK(r);
}
if (response.rpr_response != REP_PROTOCOL_SUCCESS &&
response.rpr_response != REP_PROTOCOL_FAIL_TRUNCATED) {
(void) pthread_mutex_unlock(&h->rh_lock);
assert(response.rpr_response !=
REP_PROTOCOL_FAIL_TYPE_MISMATCH);
return (scf_set_error(proto_error(response.rpr_response)));
}
v->value_type = response.rpr_type;
if (v->value_type != REP_PROTOCOL_TYPE_OPAQUE) {
(void) strlcpy(v->value_value, response.rpr_value,
sizeof (v->value_value));
} else {
v->value_size = scf_opaque_decode(v->value_value,
response.rpr_value, sizeof (v->value_value));
}
(void) pthread_mutex_unlock(&h->rh_lock);
return ((response.rpr_response == REP_PROTOCOL_SUCCESS)?
SCF_SUCCESS : scf_set_error(SCF_ERROR_CONSTRAINT_VIOLATED));
}
int
scf_pg_get_parent_service(const scf_propertygroup_t *pg, scf_service_t *svc)
{
return (datael_get_parent(&pg->rd_d, &svc->rd_d));
}
int
scf_pg_get_parent_instance(const scf_propertygroup_t *pg, scf_instance_t *inst)
{
return (datael_get_parent(&pg->rd_d, &inst->rd_d));
}
int
scf_pg_get_parent_snaplevel(const scf_propertygroup_t *pg,
scf_snaplevel_t *level)
{
return (datael_get_parent(&pg->rd_d, &level->rd_d));
}
int
scf_service_get_parent(const scf_service_t *svc, scf_scope_t *s)
{
return (datael_get_parent(&svc->rd_d, &s->rd_d));
}
int
scf_instance_get_parent(const scf_instance_t *inst, scf_service_t *svc)
{
return (datael_get_parent(&inst->rd_d, &svc->rd_d));
}
int
scf_snapshot_get_parent(const scf_snapshot_t *inst, scf_instance_t *svc)
{
return (datael_get_parent(&inst->rd_d, &svc->rd_d));
}
int
scf_snaplevel_get_parent(const scf_snaplevel_t *inst, scf_snapshot_t *svc)
{
return (datael_get_parent(&inst->rd_d, &svc->rd_d));
}
/*
* FMRI functions
*
* Note: In the scf_parse_svc_fmri(), scf_parse_file_fmri() and
* scf_parse_fmri(), fmri isn't const because that would require
* allocating memory. Also, note that scope, at least, is not necessarily
* in the passed in fmri.
*/
int
scf_parse_svc_fmri(char *fmri, const char **scope, const char **service,
const char **instance, const char **propertygroup, const char **property)
{
char *s, *e, *te, *tpg;
char *my_s = NULL, *my_i = NULL, *my_pg = NULL, *my_p = NULL;
if (scope != NULL)
*scope = NULL;
if (service != NULL)
*service = NULL;
if (instance != NULL)
*instance = NULL;
if (propertygroup != NULL)
*propertygroup = NULL;
if (property != NULL)
*property = NULL;
s = fmri;
e = strchr(s, '\0');
if (strncmp(s, SCF_FMRI_SVC_PREFIX,
sizeof (SCF_FMRI_SVC_PREFIX) - 1) == 0)
s += sizeof (SCF_FMRI_SVC_PREFIX) - 1;
if (strncmp(s, SCF_FMRI_SCOPE_PREFIX,
sizeof (SCF_FMRI_SCOPE_PREFIX) - 1) == 0) {
char *my_scope;
s += sizeof (SCF_FMRI_SCOPE_PREFIX) - 1;
te = strstr(s, SCF_FMRI_SERVICE_PREFIX);
if (te == NULL)
te = e;
*te = 0;
my_scope = s;
s = te;
if (s < e)
s += sizeof (SCF_FMRI_SERVICE_PREFIX) - 1;
/* If the scope ends with the suffix, remove it. */
te = strstr(my_scope, SCF_FMRI_SCOPE_SUFFIX);
if (te != NULL && te[sizeof (SCF_FMRI_SCOPE_SUFFIX) - 1] == 0)
*te = 0;
/* Validate the scope. */
if (my_scope[0] == '\0')
my_scope = SCF_FMRI_LOCAL_SCOPE;
else if (uu_check_name(my_scope, 0) == -1) {
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
if (scope != NULL)
*scope = my_scope;
} else {
if (scope != NULL)
*scope = SCF_FMRI_LOCAL_SCOPE;
}
if (s[0] != 0) {
if (strncmp(s, SCF_FMRI_SERVICE_PREFIX,
sizeof (SCF_FMRI_SERVICE_PREFIX) - 1) == 0)
s += sizeof (SCF_FMRI_SERVICE_PREFIX) - 1;
/*
* Can't validate service here because it might not be null
* terminated.
*/
my_s = s;
}
tpg = strstr(s, SCF_FMRI_PROPERTYGRP_PREFIX);
te = strstr(s, SCF_FMRI_INSTANCE_PREFIX);
if (te != NULL && (tpg == NULL || te < tpg)) {
*te = 0;
te += sizeof (SCF_FMRI_INSTANCE_PREFIX) - 1;
/* Can't validate instance here either. */
my_i = s = te;
te = strstr(s, SCF_FMRI_PROPERTYGRP_PREFIX);
} else {
te = tpg;
}
if (te != NULL) {
*te = 0;
te += sizeof (SCF_FMRI_PROPERTYGRP_PREFIX) - 1;
my_pg = s = te;
te = strstr(s, SCF_FMRI_PROPERTY_PREFIX);
if (te != NULL) {
*te = 0;
te += sizeof (SCF_FMRI_PROPERTY_PREFIX) - 1;
my_p = te;
s = te;
}
}
if (my_s != NULL) {
if (uu_check_name(my_s, UU_NAME_DOMAIN | UU_NAME_PATH) == -1)
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
if (service != NULL)
*service = my_s;
}
if (my_i != NULL) {
if (uu_check_name(my_i, UU_NAME_DOMAIN) == -1)
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
if (instance != NULL)
*instance = my_i;
}
if (my_pg != NULL) {
if (uu_check_name(my_pg, UU_NAME_DOMAIN) == -1)
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
if (propertygroup != NULL)
*propertygroup = my_pg;
}
if (my_p != NULL) {
if (uu_check_name(my_p, UU_NAME_DOMAIN) == -1)
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
if (property != NULL)
*property = my_p;
}
return (0);
}
int
scf_parse_file_fmri(char *fmri, const char **scope, const char **path)
{
char *s, *e, *te;
if (scope != NULL)
*scope = NULL;
s = fmri;
e = strchr(s, '\0');
if (strncmp(s, SCF_FMRI_FILE_PREFIX,
sizeof (SCF_FMRI_FILE_PREFIX) - 1) == 0)
s += sizeof (SCF_FMRI_FILE_PREFIX) - 1;
if (strncmp(s, SCF_FMRI_SCOPE_PREFIX,
sizeof (SCF_FMRI_SCOPE_PREFIX) - 1) == 0) {
char *my_scope;
s += sizeof (SCF_FMRI_SCOPE_PREFIX) - 1;
te = strstr(s, SCF_FMRI_SERVICE_PREFIX);
if (te == NULL)
te = e;
*te = 0;
my_scope = s;
s = te;
/* Validate the scope. */
if (my_scope[0] != '\0' &&
strcmp(my_scope, SCF_FMRI_LOCAL_SCOPE) != 0) {
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
if (scope != NULL)
*scope = my_scope;
} else {
/*
* FMRI paths must be absolute
*/
if (s[0] != '/')
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
}
s += sizeof (SCF_FMRI_SERVICE_PREFIX) - 1;
if (s >= e)
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
/*
* If the user requests it, return the full path of the file.
*/
if (path != NULL) {
assert(s > fmri);
s[-1] = '/';
*path = s - 1;
}
return (0);
}
int
scf_parse_fmri(char *fmri, int *type, const char **scope, const char **service,
const char **instance, const char **propertygroup, const char **property)
{
if (strncmp(fmri, SCF_FMRI_SVC_PREFIX,
sizeof (SCF_FMRI_SVC_PREFIX) - 1) == 0) {
if (type)
*type = SCF_FMRI_TYPE_SVC;
return (scf_parse_svc_fmri(fmri, scope, service, instance,
propertygroup, property));
} else if (strncmp(fmri, SCF_FMRI_FILE_PREFIX,
sizeof (SCF_FMRI_FILE_PREFIX) - 1) == 0) {
if (type)
*type = SCF_FMRI_TYPE_FILE;
return (scf_parse_file_fmri(fmri, scope, NULL));
} else {
/*
* Parse as a svc if the fmri type is not explicitly
* specified.
*/
if (type)
*type = SCF_FMRI_TYPE_SVC;
return (scf_parse_svc_fmri(fmri, scope, service, instance,
propertygroup, property));
}
}
/*
* Fails with _INVALID_ARGUMENT. fmri and buf may be equal.
*/
ssize_t
scf_canonify_fmri(const char *fmri, char *buf, size_t bufsz)
{
const char *scope, *service, *instance, *pg, *property;
char local[6 * REP_PROTOCOL_NAME_LEN];
int r;
size_t len;
if (strlcpy(local, fmri, sizeof (local)) >= sizeof (local)) {
/* Should this be CONSTRAINT_VIOLATED? */
(void) scf_set_error(SCF_ERROR_INVALID_ARGUMENT);
return (-1);
}
r = scf_parse_svc_fmri(local, &scope, &service, &instance, &pg,
&property);
if (r != 0)
return (-1);
len = strlcpy(buf, "svc:/", bufsz);
if (scope != NULL && strcmp(scope, SCF_SCOPE_LOCAL) != 0) {
len += strlcat(buf, "/", bufsz);
len += strlcat(buf, scope, bufsz);
}
if (service)
len += strlcat(buf, service, bufsz);
if (instance) {
len += strlcat(buf, ":", bufsz);
len += strlcat(buf, instance, bufsz);
}
if (pg) {
len += strlcat(buf, "/:properties/", bufsz);
len += strlcat(buf, pg, bufsz);
}
if (property) {
len += strlcat(buf, "/", bufsz);
len += strlcat(buf, property, bufsz);
}
return (len);
}
/*
* Fails with _HANDLE_MISMATCH, _INVALID_ARGUMENT, _CONSTRAINT_VIOLATED,
* _NOT_FOUND, _NOT_BOUND, _CONNECTION_BROKEN, _INTERNAL, _NOT_SET, _DELETED,
* _NO_RESOURCES, _BACKEND_ACCESS.
*/
int
scf_handle_decode_fmri(scf_handle_t *h, const char *fmri, scf_scope_t *sc,
scf_service_t *svc, scf_instance_t *inst, scf_propertygroup_t *pg,
scf_property_t *prop, int flags)
{
const char *scope, *service, *instance, *propertygroup, *property;
int last;
char local[6 * REP_PROTOCOL_NAME_LEN];
int ret;
const uint32_t holds = RH_HOLD_SCOPE | RH_HOLD_SERVICE |
RH_HOLD_INSTANCE | RH_HOLD_PG | RH_HOLD_PROPERTY;
/*
* verify that all handles match
*/
if ((sc != NULL && h != sc->rd_d.rd_handle) ||
(svc != NULL && h != svc->rd_d.rd_handle) ||
(inst != NULL && h != inst->rd_d.rd_handle) ||
(pg != NULL && h != pg->rd_d.rd_handle) ||
(prop != NULL && h != prop->rd_d.rd_handle))
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
if (strlcpy(local, fmri, sizeof (local)) >= sizeof (local)) {
ret = scf_set_error(SCF_ERROR_INVALID_ARGUMENT);
goto reset_args;
}
/*
* We can simply return from an error in parsing, because
* scf_parse_fmri sets the error code correctly.
*/
if (scf_parse_svc_fmri(local, &scope, &service, &instance,
&propertygroup, &property) == -1) {
ret = -1;
goto reset_args;
}
/*
* the FMRI looks valid at this point -- do constraint checks.
*/
if (instance != NULL && (flags & SCF_DECODE_FMRI_REQUIRE_NO_INSTANCE)) {
ret = scf_set_error(SCF_ERROR_CONSTRAINT_VIOLATED);
goto reset_args;
}
if (instance == NULL && (flags & SCF_DECODE_FMRI_REQUIRE_INSTANCE)) {
ret = scf_set_error(SCF_ERROR_CONSTRAINT_VIOLATED);
goto reset_args;
}
if (prop != NULL)
last = REP_PROTOCOL_ENTITY_PROPERTY;
else if (pg != NULL)
last = REP_PROTOCOL_ENTITY_PROPERTYGRP;
else if (inst != NULL)
last = REP_PROTOCOL_ENTITY_INSTANCE;
else if (svc != NULL)
last = REP_PROTOCOL_ENTITY_SERVICE;
else if (sc != NULL)
last = REP_PROTOCOL_ENTITY_SCOPE;
else
last = REP_PROTOCOL_ENTITY_NONE;
if (flags & SCF_DECODE_FMRI_EXACT) {
int last_fmri;
if (property != NULL)
last_fmri = REP_PROTOCOL_ENTITY_PROPERTY;
else if (propertygroup != NULL)
last_fmri = REP_PROTOCOL_ENTITY_PROPERTYGRP;
else if (instance != NULL)
last_fmri = REP_PROTOCOL_ENTITY_INSTANCE;
else if (service != NULL)
last_fmri = REP_PROTOCOL_ENTITY_SERVICE;
else if (scope != NULL)
last_fmri = REP_PROTOCOL_ENTITY_SCOPE;
else
last_fmri = REP_PROTOCOL_ENTITY_NONE;
if (last != last_fmri) {
ret = scf_set_error(SCF_ERROR_CONSTRAINT_VIOLATED);
goto reset_args;
}
}
if ((flags & SCF_DECODE_FMRI_TRUNCATE) &&
last == REP_PROTOCOL_ENTITY_NONE) {
ret = 0; /* nothing to do */
goto reset_args;
}
if (!(flags & SCF_DECODE_FMRI_TRUNCATE))
last = REP_PROTOCOL_ENTITY_NONE; /* never stop */
/*
* passed the constraint checks -- try to grab the thing itself.
*/
handle_hold_subhandles(h, holds);
if (sc == NULL)
sc = h->rh_scope;
else
datael_reset(&sc->rd_d);
if (svc == NULL)
svc = h->rh_service;
else
datael_reset(&svc->rd_d);
if (inst == NULL)
inst = h->rh_instance;
else
datael_reset(&inst->rd_d);
if (pg == NULL)
pg = h->rh_pg;
else
datael_reset(&pg->rd_d);
if (prop == NULL)
prop = h->rh_property;
else
datael_reset(&prop->rd_d);
/*
* We only support local scopes, but we check *after* getting
* the local scope, so that any repository-related errors take
* precedence.
*/
if (scf_handle_get_scope(h, SCF_SCOPE_LOCAL, sc) == -1) {
handle_rele_subhandles(h, holds);
ret = -1;
goto reset_args;
}
if (scope != NULL && strcmp(scope, SCF_FMRI_LOCAL_SCOPE) != 0) {
handle_rele_subhandles(h, holds);
ret = scf_set_error(SCF_ERROR_NOT_FOUND);
goto reset_args;
}
if (service == NULL || last == REP_PROTOCOL_ENTITY_SCOPE) {
handle_rele_subhandles(h, holds);
return (0);
}
if (scf_scope_get_service(sc, service, svc) == -1) {
handle_rele_subhandles(h, holds);
ret = -1;
assert(scf_error() != SCF_ERROR_NOT_SET);
if (scf_error() == SCF_ERROR_DELETED)
(void) scf_set_error(SCF_ERROR_NOT_FOUND);
goto reset_args;
}
if (last == REP_PROTOCOL_ENTITY_SERVICE) {
handle_rele_subhandles(h, holds);
return (0);
}
if (instance == NULL) {
if (propertygroup == NULL ||
last == REP_PROTOCOL_ENTITY_INSTANCE) {
handle_rele_subhandles(h, holds);
return (0);
}
if (scf_service_get_pg(svc, propertygroup, pg) == -1) {
handle_rele_subhandles(h, holds);
ret = -1;
assert(scf_error() != SCF_ERROR_NOT_SET);
if (scf_error() == SCF_ERROR_DELETED)
(void) scf_set_error(SCF_ERROR_NOT_FOUND);
goto reset_args;
}
} else {
if (scf_service_get_instance(svc, instance, inst) == -1) {
handle_rele_subhandles(h, holds);
ret = -1;
assert(scf_error() != SCF_ERROR_NOT_SET);
if (scf_error() == SCF_ERROR_DELETED)
(void) scf_set_error(SCF_ERROR_NOT_FOUND);
goto reset_args;
}
if (propertygroup == NULL ||
last == REP_PROTOCOL_ENTITY_INSTANCE) {
handle_rele_subhandles(h, holds);
return (0);
}
if (scf_instance_get_pg(inst, propertygroup, pg) == -1) {
handle_rele_subhandles(h, holds);
ret = -1;
assert(scf_error() != SCF_ERROR_NOT_SET);
if (scf_error() == SCF_ERROR_DELETED)
(void) scf_set_error(SCF_ERROR_NOT_FOUND);
goto reset_args;
}
}
if (property == NULL || last == REP_PROTOCOL_ENTITY_PROPERTYGRP) {
handle_rele_subhandles(h, holds);
return (0);
}
if (scf_pg_get_property(pg, property, prop) == -1) {
handle_rele_subhandles(h, holds);
ret = -1;
assert(scf_error() != SCF_ERROR_NOT_SET);
if (scf_error() == SCF_ERROR_DELETED)
(void) scf_set_error(SCF_ERROR_NOT_FOUND);
goto reset_args;
}
handle_rele_subhandles(h, holds);
return (0);
reset_args:
if (sc != NULL)
datael_reset(&sc->rd_d);
if (svc != NULL)
datael_reset(&svc->rd_d);
if (inst != NULL)
datael_reset(&inst->rd_d);
if (pg != NULL)
datael_reset(&pg->rd_d);
if (prop != NULL)
datael_reset(&prop->rd_d);
return (ret);
}
/*
* Fails with _NOT_BOUND, _CONNECTION_BROKEN, _INTERNAL (server response too
* big, bad entity id, request not applicable to entity, name too long for
* buffer), _NOT_SET, or _DELETED.
*/
ssize_t
scf_scope_to_fmri(const scf_scope_t *scope, char *out, size_t sz)
{
ssize_t r, len;
char tmp[REP_PROTOCOL_NAME_LEN];
r = scf_scope_get_name(scope, tmp, sizeof (tmp));
if (r <= 0)
return (r);
len = strlcpy(out, SCF_FMRI_SVC_PREFIX, sz);
if (strcmp(tmp, SCF_FMRI_LOCAL_SCOPE) != 0) {
if (len >= sz)
return (len + r + sizeof (SCF_FMRI_SCOPE_SUFFIX) - 1);
len = strlcat(out, tmp, sz);
if (len >= sz)
return (len + sizeof (SCF_FMRI_SCOPE_SUFFIX) - 1);
len = strlcat(out,
SCF_FMRI_SCOPE_SUFFIX SCF_FMRI_SERVICE_PREFIX, sz);
}
return (len);
}
/*
* Fails with _NOT_BOUND, _CONNECTION_BROKEN, _INTERNAL (server response too
* big, bad element id, bad ids, bad types, scope has no parent, request not
* applicable to entity, name too long), _NOT_SET, _DELETED,
*/
ssize_t
scf_service_to_fmri(const scf_service_t *svc, char *out, size_t sz)
{
scf_handle_t *h = svc->rd_d.rd_handle;
scf_scope_t *scope = HANDLE_HOLD_SCOPE(h);
ssize_t r, len;
char tmp[REP_PROTOCOL_NAME_LEN];
r = datael_get_parent(&svc->rd_d, &scope->rd_d);
if (r != SCF_SUCCESS) {
HANDLE_RELE_SCOPE(h);
assert(scf_error() != SCF_ERROR_HANDLE_MISMATCH);
return (-1);
}
if (out != NULL && sz > 0)
len = scf_scope_to_fmri(scope, out, sz);
else
len = scf_scope_to_fmri(scope, tmp, 2);
HANDLE_RELE_SCOPE(h);
if (len < 0)
return (-1);
if (out == NULL || len >= sz)
len += sizeof (SCF_FMRI_SERVICE_PREFIX) - 1;
else
len = strlcat(out, SCF_FMRI_SERVICE_PREFIX, sz);
r = scf_service_get_name(svc, tmp, sizeof (tmp));
if (r < 0)
return (r);
if (out == NULL || len >= sz)
len += r;
else
len = strlcat(out, tmp, sz);
return (len);
}
ssize_t
scf_instance_to_fmri(const scf_instance_t *inst, char *out, size_t sz)
{
scf_handle_t *h = inst->rd_d.rd_handle;
scf_service_t *svc = HANDLE_HOLD_SERVICE(h);
ssize_t r, len;
char tmp[REP_PROTOCOL_NAME_LEN];
r = datael_get_parent(&inst->rd_d, &svc->rd_d);
if (r != SCF_SUCCESS) {
HANDLE_RELE_SERVICE(h);
return (-1);
}
len = scf_service_to_fmri(svc, out, sz);
HANDLE_RELE_SERVICE(h);
if (len < 0)
return (len);
if (len >= sz)
len += sizeof (SCF_FMRI_INSTANCE_PREFIX) - 1;
else
len = strlcat(out, SCF_FMRI_INSTANCE_PREFIX, sz);
r = scf_instance_get_name(inst, tmp, sizeof (tmp));
if (r < 0)
return (r);
if (len >= sz)
len += r;
else
len = strlcat(out, tmp, sz);
return (len);
}
ssize_t
scf_pg_to_fmri(const scf_propertygroup_t *pg, char *out, size_t sz)
{
scf_handle_t *h = pg->rd_d.rd_handle;
struct rep_protocol_entity_parent_type request;
struct rep_protocol_integer_response response;
char tmp[REP_PROTOCOL_NAME_LEN];
ssize_t len, r;
(void) pthread_mutex_lock(&h->rh_lock);
request.rpr_request = REP_PROTOCOL_ENTITY_PARENT_TYPE;
request.rpr_entityid = pg->rd_d.rd_entity;
datael_finish_reset(&pg->rd_d);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
(void) pthread_mutex_unlock(&h->rh_lock);
if (r < 0)
DOOR_ERRORS_BLOCK(r);
if (response.rpr_response != REP_PROTOCOL_SUCCESS ||
r < sizeof (response)) {
return (scf_set_error(proto_error(response.rpr_response)));
}
switch (response.rpr_value) {
case REP_PROTOCOL_ENTITY_SERVICE: {
scf_service_t *svc;
svc = HANDLE_HOLD_SERVICE(h);
r = datael_get_parent(&pg->rd_d, &svc->rd_d);
if (r == SCF_SUCCESS)
len = scf_service_to_fmri(svc, out, sz);
HANDLE_RELE_SERVICE(h);
break;
}
case REP_PROTOCOL_ENTITY_INSTANCE: {
scf_instance_t *inst;
inst = HANDLE_HOLD_INSTANCE(h);
r = datael_get_parent(&pg->rd_d, &inst->rd_d);
if (r == SCF_SUCCESS)
len = scf_instance_to_fmri(inst, out, sz);
HANDLE_RELE_INSTANCE(h);
break;
}
case REP_PROTOCOL_ENTITY_SNAPLEVEL: {
scf_instance_t *inst = HANDLE_HOLD_INSTANCE(h);
scf_snapshot_t *snap = HANDLE_HOLD_SNAPSHOT(h);
scf_snaplevel_t *level = HANDLE_HOLD_SNAPLVL(h);
r = datael_get_parent(&pg->rd_d, &level->rd_d);
if (r == SCF_SUCCESS)
r = datael_get_parent(&level->rd_d, &snap->rd_d);
if (r == SCF_SUCCESS)
r = datael_get_parent(&snap->rd_d, &inst->rd_d);
if (r == SCF_SUCCESS)
len = scf_instance_to_fmri(inst, out, sz);
HANDLE_RELE_INSTANCE(h);
HANDLE_RELE_SNAPSHOT(h);
HANDLE_RELE_SNAPLVL(h);
break;
}
default:
return (scf_set_error(SCF_ERROR_INTERNAL));
}
if (r != SCF_SUCCESS)
return (r);
if (len >= sz)
len += sizeof (SCF_FMRI_PROPERTYGRP_PREFIX) - 1;
else
len = strlcat(out, SCF_FMRI_PROPERTYGRP_PREFIX, sz);
r = scf_pg_get_name(pg, tmp, sizeof (tmp));
if (r < 0)
return (r);
if (len >= sz)
len += r;
else
len = strlcat(out, tmp, sz);
return (len);
}
ssize_t
scf_property_to_fmri(const scf_property_t *prop, char *out, size_t sz)
{
scf_handle_t *h = prop->rd_d.rd_handle;
scf_propertygroup_t *pg = HANDLE_HOLD_PG(h);
char tmp[REP_PROTOCOL_NAME_LEN];
ssize_t len;
int r;
r = datael_get_parent(&prop->rd_d, &pg->rd_d);
if (r != SCF_SUCCESS) {
HANDLE_RELE_PG(h);
return (-1);
}
len = scf_pg_to_fmri(pg, out, sz);
HANDLE_RELE_PG(h);
if (len >= sz)
len += sizeof (SCF_FMRI_PROPERTY_PREFIX) - 1;
else
len = strlcat(out, SCF_FMRI_PROPERTY_PREFIX, sz);
r = scf_property_get_name(prop, tmp, sizeof (tmp));
if (r < 0)
return (r);
if (len >= sz)
len += r;
else
len = strlcat(out, tmp, sz);
return (len);
}
/*
* Fails with _HANDLE_MISMATCH, _NOT_BOUND, _CONNECTION_BROKEN, _INTERNAL
* (server response too big, bad entity id, request not applicable to entity,
* name too long for buffer, bad element id, iter already exists, element
* cannot have children of type, type is invalid, iter was reset, sequence
* was bad, iter walks values, iter does not walk type entities),
* _NOT_SET, _DELETED, or _CONSTRAINT_VIOLATED,
* _NOT_FOUND (scope has no parent), _INVALID_ARGUMENT, _NO_RESOURCES,
* _BACKEND_ACCESS.
*/
int
scf_pg_get_underlying_pg(const scf_propertygroup_t *pg,
scf_propertygroup_t *out)
{
scf_handle_t *h = pg->rd_d.rd_handle;
scf_service_t *svc;
scf_instance_t *inst;
char me[REP_PROTOCOL_NAME_LEN];
int r;
if (h != out->rd_d.rd_handle)
return (scf_set_error(SCF_ERROR_HANDLE_MISMATCH));
r = scf_pg_get_name(pg, me, sizeof (me));
if (r < 0)
return (r);
svc = HANDLE_HOLD_SERVICE(h);
inst = HANDLE_HOLD_INSTANCE(h);
r = datael_get_parent(&pg->rd_d, &inst->rd_d);
if (r == SCF_SUCCESS) {
r = datael_get_parent(&inst->rd_d, &svc->rd_d);
if (r != SCF_SUCCESS) {
goto out;
}
r = scf_service_get_pg(svc, me, out);
} else {
r = scf_set_error(SCF_ERROR_NOT_FOUND);
}
out:
HANDLE_RELE_SERVICE(h);
HANDLE_RELE_INSTANCE(h);
return (r);
}
#define LEGACY_SCHEME "lrc:"
#define LEGACY_UNKNOWN "unknown"
/*
* Implementation of scf_walk_fmri()
*
* This is a little tricky due to the many-to-many relationship between patterns
* and matches. We need to be able to satisfy the following requirements:
*
* 1) Detect patterns which match more than one FMRI, and be able to
* report which FMRIs have been matched.
* 2) Detect patterns which have not matched any FMRIs
* 3) Visit each matching FMRI exactly once across all patterns
* 4) Ignore FMRIs which have only been matched due to multiply-matching
* patterns.
*
* We maintain an array of scf_pattern_t structures, one for each argument, and
* maintain a linked list of scf_match_t structures for each one. We first
* qualify each pattern's type:
*
* PATTERN_INVALID The argument is invalid (too long).
*
* PATTERN_EXACT The pattern is a complete FMRI. The list of
* matches contains only a single entry.
*
* PATTERN_GLOB The pattern will be matched against all
* FMRIs via fnmatch() in the second phase.
* Matches will be added to the pattern's list
* as they are found.
*
* PATTERN_PARTIAL Everything else. We will assume that this is
* an abbreviated FMRI, and match according to
* our abbreviated FMRI rules. Matches will be
* added to the pattern's list as they are found.
*
* The first pass searches for arguments that are complete FMRIs. These are
* classified as EXACT patterns and do not necessitate searching the entire
* tree.
*
* Once this is done, if we have any GLOB or PARTIAL patterns (or if no
* arguments were given), we iterate over all services and instances in the
* repository, looking for matches.
*
* When a match is found, we add the match to the pattern's list. We also enter
* the match into a hash table, resulting in something like this:
*
* scf_pattern_t scf_match_t
* +---------------+ +-------+ +-------+
* | pattern 'foo' |----->| match |---->| match |
* +---------------+ +-------+ +-------+
* | |
* scf_match_key_t | |
* +--------------+ | |
* | FMRI bar/foo |<----+ |
* +--------------+ |
* | FMRI baz/foo |<------------------+
* +--------------+
*
* Once we have all of this set up, we do one pass to report patterns matching
* multiple FMRIs (if SCF_WALK_MULTIPLE is not set) and patterns for which no
* match was found.
*
* Finally, we walk through all valid patterns, and for each match, if we
* haven't already seen the match (as recorded in the hash table), then we
* execute the callback.
*/
struct scf_matchkey;
struct scf_match;
/*
* scf_matchkey_t
*/
typedef struct scf_matchkey {
char *sk_fmri; /* Matching FMRI */
char *sk_legacy; /* Legacy name */
int sk_seen; /* If we've been seen */
struct scf_matchkey *sk_next; /* Next in hash chain */
} scf_matchkey_t;
/*
* scf_match_t
*/
typedef struct scf_match {
scf_matchkey_t *sm_key;
struct scf_match *sm_next;
} scf_match_t;
#define WALK_HTABLE_SIZE 123
/*
* scf_get_key()
*
* Given an FMRI and a hash table, returns the scf_matchkey_t corresponding to
* this FMRI. If the FMRI does not exist, it is added to the hash table. If a
* new entry cannot be allocated due to lack of memory, NULL is returned.
*/
static scf_matchkey_t *
scf_get_key(scf_matchkey_t **htable, const char *fmri, const char *legacy)
{
uint_t h = 0, g;
const char *p, *k;
scf_matchkey_t *key;
k = strstr(fmri, ":/");
assert(k != NULL);
k += 2;
/*
* Generic hash function from uts/common/os/modhash.c.
*/
for (p = k; *p != '\0'; ++p) {
h = (h << 4) + *p;
if ((g = (h & 0xf0000000)) != 0) {
h ^= (g >> 24);
h ^= g;
}
}
h %= WALK_HTABLE_SIZE;
/*
* Search for an existing key
*/
for (key = htable[h]; key != NULL; key = key->sk_next) {
if (strcmp(key->sk_fmri, fmri) == 0)
return (key);
}
if ((key = calloc(sizeof (scf_matchkey_t), 1)) == NULL)
return (NULL);
/*
* Add new key to hash table.
*/
if ((key->sk_fmri = strdup(fmri)) == NULL) {
free(key);
return (NULL);
}
if (legacy == NULL) {
key->sk_legacy = NULL;
} else if ((key->sk_legacy = strdup(legacy)) == NULL) {
free(key->sk_fmri);
free(key);
return (NULL);
}
key->sk_next = htable[h];
htable[h] = key;
return (key);
}
/*
* Given an FMRI, insert it into the pattern's list appropriately.
* svc_explicit indicates whether matching services should take
* precedence over matching instances.
*/
static scf_error_t
scf_add_match(scf_matchkey_t **htable, const char *fmri, const char *legacy,
scf_pattern_t *pattern, int svc_explicit)
{
scf_match_t *match;
/*
* If svc_explicit is set, enforce the constaint that matching
* instances take precedence over matching services. Otherwise,
* matching services take precedence over matching instances.
*/
if (svc_explicit) {
scf_match_t *next, *prev;
/*
* If we match an instance, check to see if we must remove
* any matching services (for SCF_WALK_EXPLICIT).
*/
for (prev = match = pattern->sp_matches; match != NULL;
match = next) {
size_t len = strlen(match->sm_key->sk_fmri);
next = match->sm_next;
if (strncmp(match->sm_key->sk_fmri, fmri, len) == 0 &&
fmri[len] == ':') {
if (prev == match)
pattern->sp_matches = match->sm_next;
else
prev->sm_next = match->sm_next;
pattern->sp_matchcount--;
free(match);
} else
prev = match;
}
} else {
/*
* If we've matched a service don't add any instances (for
* SCF_WALK_SERVICE).
*/
for (match = pattern->sp_matches; match != NULL;
match = match->sm_next) {
size_t len = strlen(match->sm_key->sk_fmri);
if (strncmp(match->sm_key->sk_fmri, fmri, len) == 0 &&
fmri[len] == ':')
return (0);
}
}
if ((match = malloc(sizeof (scf_match_t))) == NULL)
return (SCF_ERROR_NO_MEMORY);
if ((match->sm_key = scf_get_key(htable, fmri, legacy)) == NULL) {
free(match);
return (SCF_ERROR_NO_MEMORY);
}
match->sm_next = pattern->sp_matches;
pattern->sp_matches = match;
pattern->sp_matchcount++;
return (0);
}
/*
* Returns 1 if the fmri matches the given pattern, 0 otherwise.
*/
int
scf_cmp_pattern(char *fmri, scf_pattern_t *pattern)
{
char *tmp;
if (pattern->sp_type == PATTERN_GLOB) {
if (fnmatch(pattern->sp_arg, fmri, 0) == 0)
return (1);
} else if (pattern->sp_type == PATTERN_PARTIAL &&
(tmp = strstr(fmri, pattern->sp_arg)) != NULL) {
/*
* We only allow partial matches anchored on the end of
* a service or instance, and beginning on an element
* boundary.
*/
if (tmp != fmri && tmp[-1] != '/' && tmp[-1] != ':' &&
tmp[0] != ':')
return (0);
tmp += strlen(pattern->sp_arg);
if (tmp != fmri + strlen(fmri) && tmp[0] != ':' &&
tmp[-1] != ':')
return (0);
/*
* If the user has supplied a short pattern that matches
* 'svc:/' or 'lrc:/', ignore it.
*/
if (tmp <= fmri + 4)
return (0);
return (1);
}
return (0);
}
/*
* Attempts to match the given FMRI against a set of patterns, keeping track of
* the results.
*/
static scf_error_t
scf_pattern_match(scf_matchkey_t **htable, char *fmri, const char *legacy,
int npattern, scf_pattern_t *pattern, int svc_explicit)
{
int i;
int ret = 0;
for (i = 0; i < npattern; i++) {
if (scf_cmp_pattern(fmri, &pattern[i]) &&
(ret = scf_add_match(htable, fmri,
legacy, &pattern[i], svc_explicit)) != 0)
return (ret);
}
return (0);
}
/*
* Fails with _INVALID_ARGUMENT, _HANDLE_DESTROYED, _INTERNAL (bad server
* response or id in use), _NO_MEMORY, _HANDLE_MISMATCH, _CONSTRAINT_VIOLATED,
* _NOT_FOUND, _NOT_BOUND, _CONNECTION_BROKEN, _NOT_SET, _DELETED,
* _NO_RESOURCES, _BACKEND_ACCESS, _TYPE_MISMATCH.
*/
scf_error_t
scf_walk_fmri(scf_handle_t *h, int argc, char **argv, int flags,
scf_walk_callback callback, void *data, int *err,
void (*errfunc)(const char *, ...))
{
scf_pattern_t *pattern = NULL;
int i;
char *fmri = NULL;
ssize_t max_fmri_length;
scf_service_t *svc = NULL;
scf_instance_t *inst = NULL;
scf_iter_t *iter = NULL, *sciter = NULL, *siter = NULL;
scf_scope_t *scope = NULL;
scf_propertygroup_t *pg = NULL;
scf_property_t *prop = NULL;
scf_value_t *value = NULL;
int ret = 0;
scf_matchkey_t **htable = NULL;
int pattern_search = 0;
ssize_t max_name_length;
char *pgname = NULL;
scf_walkinfo_t info;
#ifndef NDEBUG
if (flags & SCF_WALK_EXPLICIT)
assert(flags & SCF_WALK_SERVICE);
if (flags & SCF_WALK_NOINSTANCE)
assert(flags & SCF_WALK_SERVICE);
if (flags & SCF_WALK_PROPERTY)
assert(!(flags & SCF_WALK_LEGACY));
#endif
/*
* Setup initial variables
*/
max_fmri_length = scf_limit(SCF_LIMIT_MAX_FMRI_LENGTH);
assert(max_fmri_length != -1);
max_name_length = scf_limit(SCF_LIMIT_MAX_NAME_LENGTH);
assert(max_name_length != -1);
if ((fmri = malloc(max_fmri_length + 1)) == NULL ||
(pgname = malloc(max_name_length + 1)) == NULL) {
ret = SCF_ERROR_NO_MEMORY;
goto error;
}
if (argc == 0) {
pattern = NULL;
} else if ((pattern = calloc(argc, sizeof (scf_pattern_t)))
== NULL) {
ret = SCF_ERROR_NO_MEMORY;
goto error;
}
if ((htable = calloc(WALK_HTABLE_SIZE, sizeof (void *))) == NULL) {
ret = SCF_ERROR_NO_MEMORY;
goto error;
}
if ((inst = scf_instance_create(h)) == NULL ||
(svc = scf_service_create(h)) == NULL ||
(iter = scf_iter_create(h)) == NULL ||
(sciter = scf_iter_create(h)) == NULL ||
(siter = scf_iter_create(h)) == NULL ||
(scope = scf_scope_create(h)) == NULL ||
(pg = scf_pg_create(h)) == NULL ||
(prop = scf_property_create(h)) == NULL ||
(value = scf_value_create(h)) == NULL) {
ret = scf_error();
goto error;
}
/*
* For each fmri given, we first check to see if it's a full service,
* instance, property group, or property FMRI. This avoids having to do
* the (rather expensive) walk of all instances. Any element which does
* not match a full fmri is identified as a globbed pattern or a partial
* fmri and stored in a private array when walking instances.
*/
for (i = 0; i < argc; i++) {
const char *scope_name, *svc_name, *inst_name, *pg_name;
const char *prop_name;
if (strlen(argv[i]) > max_fmri_length) {
errfunc(scf_get_msg(SCF_MSG_ARGTOOLONG), argv[i]);
if (err != NULL)
*err = UU_EXIT_FATAL;
continue;
}
(void) strcpy(fmri, argv[i]);
if (scf_parse_svc_fmri(fmri, &scope_name, &svc_name, &inst_name,
&pg_name, &prop_name) != SCF_SUCCESS)
goto badfmri;
/*
* If the user has specified SCF_WALK_PROPERTY, allow property
* groups and properties.
*/
if (pg_name != NULL || prop_name != NULL) {
if (!(flags & SCF_WALK_PROPERTY))
goto badfmri;
if (scf_handle_decode_fmri(h, argv[i], NULL, NULL,
NULL, pg, prop, 0) != 0)
goto badfmri;
if (scf_pg_get_name(pg, NULL, 0) < 0 &&
scf_property_get_name(prop, NULL, 0) < 0)
goto badfmri;
if (scf_canonify_fmri(argv[i], fmri, max_fmri_length)
<= 0) {
/*
* scf_parse_fmri() should have caught this.
*/
abort();
}
if ((ret = scf_add_match(htable, fmri, NULL,
&pattern[i], flags & SCF_WALK_EXPLICIT)) != 0)
goto error;
if ((pattern[i].sp_arg = strdup(argv[i])) == NULL) {
ret = SCF_ERROR_NO_MEMORY;
goto error;
}
pattern[i].sp_type = PATTERN_EXACT;
}
/*
* We need at least a service name
*/
if (scope_name == NULL || svc_name == NULL)
goto badfmri;
/*
* If we have a fully qualified instance, add it to our list of
* fmris to watch.
*/
if (inst_name != NULL) {
if (flags & SCF_WALK_NOINSTANCE)
goto badfmri;
if (scf_handle_decode_fmri(h, argv[i], NULL, NULL,
inst, NULL, NULL, SCF_DECODE_FMRI_EXACT) != 0)
goto badfmri;
if (scf_canonify_fmri(argv[i], fmri, max_fmri_length)
<= 0)
goto badfmri;
if ((ret = scf_add_match(htable, fmri, NULL,
&pattern[i], flags & SCF_WALK_EXPLICIT)) != 0)
goto error;
if ((pattern[i].sp_arg = strdup(argv[i])) == NULL) {
ret = SCF_ERROR_NO_MEMORY;
goto error;
}
pattern[i].sp_type = PATTERN_EXACT;
continue;
}
if (scf_handle_decode_fmri(h, argv[i], NULL, svc,
NULL, NULL, NULL, SCF_DECODE_FMRI_EXACT) !=
SCF_SUCCESS)
goto badfmri;
/*
* If the user allows for bare services, then simply
* pass this service on.
*/
if (flags & SCF_WALK_SERVICE) {
if (scf_service_to_fmri(svc, fmri,
max_fmri_length + 1) <= 0) {
ret = scf_error();
goto error;
}
if ((ret = scf_add_match(htable, fmri, NULL,
&pattern[i], flags & SCF_WALK_EXPLICIT)) != 0)
goto error;
if ((pattern[i].sp_arg = strdup(argv[i]))
== NULL) {
ret = SCF_ERROR_NO_MEMORY;
goto error;
}
pattern[i].sp_type = PATTERN_EXACT;
continue;
}
if (flags & SCF_WALK_NOINSTANCE)
goto badfmri;
/*
* Otherwise, iterate over all instances in the service.
*/
if (scf_iter_service_instances(iter, svc) !=
SCF_SUCCESS) {
ret = scf_error();
goto error;
}
for (;;) {
ret = scf_iter_next_instance(iter, inst);
if (ret == 0)
break;
if (ret != 1) {
ret = scf_error();
goto error;
}
if (scf_instance_to_fmri(inst, fmri,
max_fmri_length + 1) == -1)
goto badfmri;
if ((ret = scf_add_match(htable, fmri, NULL,
&pattern[i], flags & SCF_WALK_EXPLICIT)) != 0)
goto error;
}
if ((pattern[i].sp_arg = strdup(argv[i])) == NULL) {
ret = SCF_ERROR_NO_MEMORY;
goto error;
}
pattern[i].sp_type = PATTERN_EXACT;
continue;
badfmri:
/*
* If we got here because of a fatal error, bail out
* immediately.
*/
if (scf_error() == SCF_ERROR_CONNECTION_BROKEN) {
ret = scf_error();
goto error;
}
/*
* At this point we failed to interpret the argument as a
* complete fmri, so mark it as a partial or globbed FMRI for
* later processing.
*/
if (strpbrk(argv[i], "*?[") != NULL) {
/*
* Prepend svc:/ to patterns which don't begin with * or
* svc: or lrc:.
*/
pattern[i].sp_type = PATTERN_GLOB;
if (argv[i][0] == '*' ||
(strlen(argv[i]) >= 4 && argv[i][3] == ':'))
pattern[i].sp_arg = strdup(argv[i]);
else {
pattern[i].sp_arg = malloc(strlen(argv[i]) + 6);
if (pattern[i].sp_arg != NULL)
(void) snprintf(pattern[i].sp_arg,
strlen(argv[i]) + 6, "svc:/%s",
argv[i]);
}
} else {
pattern[i].sp_type = PATTERN_PARTIAL;
pattern[i].sp_arg = strdup(argv[i]);
}
pattern_search = 1;
if (pattern[i].sp_arg == NULL) {
ret = SCF_ERROR_NO_MEMORY;
goto error;
}
}
if (pattern_search || argc == 0) {
/*
* We have a set of patterns to search for. Iterate over all
* instances and legacy services searching for matches.
*/
if (scf_handle_get_local_scope(h, scope) != 0) {
ret = scf_error();
goto error;
}
if (scf_iter_scope_services(sciter, scope) != 0) {
ret = scf_error();
goto error;
}
for (;;) {
ret = scf_iter_next_service(sciter, svc);
if (ret == 0)
break;
if (ret != 1) {
ret = scf_error();
goto error;
}
if (flags & SCF_WALK_SERVICE) {
/*
* If the user is requesting bare services, try
* to match the service first.
*/
if (scf_service_to_fmri(svc, fmri,
max_fmri_length + 1) < 0) {
ret = scf_error();
goto error;
}
if (argc == 0) {
info.fmri = fmri;
info.scope = scope;
info.svc = svc;
info.inst = NULL;
info.pg = NULL;
info.prop = NULL;
if ((ret = callback(data, &info)) != 0)
goto error;
continue;
} else if ((ret = scf_pattern_match(htable,
fmri, NULL, argc, pattern,
flags & SCF_WALK_EXPLICIT)) != 0) {
goto error;
}
}
if (flags & SCF_WALK_NOINSTANCE)
continue;
/*
* Iterate over all instances in the service.
*/
if (scf_iter_service_instances(siter, svc) != 0) {
if (scf_error() != SCF_ERROR_DELETED) {
ret = scf_error();
goto error;
}
continue;
}
for (;;) {
ret = scf_iter_next_instance(siter, inst);
if (ret == 0)
break;
if (ret != 1) {
if (scf_error() != SCF_ERROR_DELETED) {
ret = scf_error();
goto error;
}
break;
}
if (scf_instance_to_fmri(inst, fmri,
max_fmri_length + 1) < 0) {
ret = scf_error();
goto error;
}
/*
* Without arguments, execute the callback
* immediately.
*/
if (argc == 0) {
info.fmri = fmri;
info.scope = scope;
info.svc = svc;
info.inst = inst;
info.pg = NULL;
info.prop = NULL;
if ((ret = callback(data, &info)) != 0)
goto error;
} else if ((ret = scf_pattern_match(htable,
fmri, NULL, argc, pattern,
flags & SCF_WALK_EXPLICIT)) != 0) {
goto error;
}
}
}
/*
* Search legacy services
*/
if ((flags & SCF_WALK_LEGACY)) {
if (scf_scope_get_service(scope, SCF_LEGACY_SERVICE,
svc) != 0) {
if (scf_error() != SCF_ERROR_NOT_FOUND) {
ret = scf_error();
goto error;
}
goto nolegacy;
}
if (scf_iter_service_pgs_typed(iter, svc,
SCF_GROUP_FRAMEWORK) != SCF_SUCCESS) {
ret = scf_error();
goto error;
}
(void) strcpy(fmri, LEGACY_SCHEME);
for (;;) {
ret = scf_iter_next_pg(iter, pg);
if (ret == -1) {
ret = scf_error();
goto error;
}
if (ret == 0)
break;
if (scf_pg_get_property(pg,
SCF_LEGACY_PROPERTY_NAME, prop) == -1) {
ret = scf_error();
if (ret == SCF_ERROR_DELETED ||
ret == SCF_ERROR_NOT_FOUND) {
ret = 0;
continue;
}
goto error;
}
if (scf_property_is_type(prop, SCF_TYPE_ASTRING)
!= SCF_SUCCESS) {
if (scf_error() == SCF_ERROR_DELETED)
continue;
ret = scf_error();
goto error;
}
if (scf_property_get_value(prop, value) !=
SCF_SUCCESS)
continue;
if (scf_value_get_astring(value,
fmri + sizeof (LEGACY_SCHEME) - 1,
max_fmri_length + 2 -
sizeof (LEGACY_SCHEME)) <= 0)
continue;
if (scf_pg_get_name(pg, pgname,
max_name_length + 1) <= 0) {
if (scf_error() == SCF_ERROR_DELETED)
continue;
ret = scf_error();
goto error;
}
if (argc == 0) {
info.fmri = fmri;
info.scope = scope;
info.svc = NULL;
info.inst = NULL;
info.pg = pg;
info.prop = NULL;
if ((ret = callback(data, &info)) != 0)
goto error;
} else if ((ret = scf_pattern_match(htable,
fmri, pgname, argc, pattern,
flags & SCF_WALK_EXPLICIT)) != 0)
goto error;
}
}
}
nolegacy:
ret = 0;
if (argc == 0)
goto error;
/*
* Check all patterns, and see if we have that any that didn't match
* or any that matched multiple instances. For svcprop, add up the
* total number of matching keys.
*/
info.count = 0;
for (i = 0; i < argc; i++) {
scf_match_t *match;
if (pattern[i].sp_type == PATTERN_INVALID)
continue;
if (pattern[i].sp_matchcount == 0) {
scf_msg_t msgid;
/*
* Provide a useful error message based on the argument
* and the type of entity requested.
*/
if (!(flags & SCF_WALK_LEGACY) &&
strncmp(pattern[i].sp_arg, "lrc:/", 5) == 0)
msgid = SCF_MSG_PATTERN_LEGACY;
else if (flags & SCF_WALK_PROPERTY)
msgid = SCF_MSG_PATTERN_NOENTITY;
else if (flags & SCF_WALK_NOINSTANCE)
msgid = SCF_MSG_PATTERN_NOSERVICE;
else if (flags & SCF_WALK_SERVICE)
msgid = SCF_MSG_PATTERN_NOINSTSVC;
else
msgid = SCF_MSG_PATTERN_NOINSTANCE;
errfunc(scf_get_msg(msgid), pattern[i].sp_arg);
if (err)
*err = UU_EXIT_FATAL;
} else if (!(flags & SCF_WALK_MULTIPLE) &&
pattern[i].sp_matchcount > 1) {
size_t len, off;
char *msg;
/*
* Construct a message with all possible FMRIs before
* passing off to error handling function.
*
* Note that strlen(scf_get_msg(...)) includes the
* length of '%s', which accounts for the terminating
* null byte.
*/
len = strlen(scf_get_msg(SCF_MSG_PATTERN_MULTIMATCH)) +
strlen(pattern[i].sp_arg);
for (match = pattern[i].sp_matches; match != NULL;
match = match->sm_next) {
len += strlen(match->sm_key->sk_fmri) + 2;
}
if ((msg = malloc(len)) == NULL) {
ret = SCF_ERROR_NO_MEMORY;
goto error;
}
/* LINTED - format argument */
(void) snprintf(msg, len,
scf_get_msg(SCF_MSG_PATTERN_MULTIMATCH),
pattern[i].sp_arg);
off = strlen(msg);
for (match = pattern[i].sp_matches; match != NULL;
match = match->sm_next) {
off += snprintf(msg + off, len - off, "\t%s\n",
match->sm_key->sk_fmri);
}
errfunc(msg);
if (err != NULL)
*err = UU_EXIT_FATAL;
free(msg);
} else {
for (match = pattern[i].sp_matches; match != NULL;
match = match->sm_next) {
if (!match->sm_key->sk_seen)
info.count++;
match->sm_key->sk_seen = 1;
}
}
}
/*
* Clear 'sk_seen' for all keys.
*/
for (i = 0; i < WALK_HTABLE_SIZE; i++) {
scf_matchkey_t *key;
for (key = htable[i]; key != NULL; key = key->sk_next)
key->sk_seen = 0;
}
/*
* Iterate over all the FMRIs in our hash table and execute the
* callback.
*/
for (i = 0; i < argc; i++) {
scf_match_t *match;
scf_matchkey_t *key;
/*
* Ignore patterns which didn't match anything or matched too
* many FMRIs.
*/
if (pattern[i].sp_matchcount == 0 ||
(!(flags & SCF_WALK_MULTIPLE) &&
pattern[i].sp_matchcount > 1))
continue;
for (match = pattern[i].sp_matches; match != NULL;
match = match->sm_next) {
key = match->sm_key;
if (key->sk_seen)
continue;
key->sk_seen = 1;
if (key->sk_legacy != NULL) {
if (scf_scope_get_service(scope,
"smf/legacy_run", svc) != 0) {
ret = scf_error();
goto error;
}
if (scf_service_get_pg(svc, key->sk_legacy,
pg) != 0)
continue;
info.fmri = key->sk_fmri;
info.scope = scope;
info.svc = NULL;
info.inst = NULL;
info.pg = pg;
info.prop = NULL;
if ((ret = callback(data, &info)) != 0)
goto error;
} else {
if (scf_handle_decode_fmri(h, key->sk_fmri,
scope, svc, inst, pg, prop, 0) !=
SCF_SUCCESS)
continue;
info.fmri = key->sk_fmri;
info.scope = scope;
info.svc = svc;
if (scf_instance_get_name(inst, NULL, 0) < 0) {
if (scf_error() ==
SCF_ERROR_CONNECTION_BROKEN) {
ret = scf_error();
goto error;
}
info.inst = NULL;
} else {
info.inst = inst;
}
if (scf_pg_get_name(pg, NULL, 0) < 0) {
if (scf_error() ==
SCF_ERROR_CONNECTION_BROKEN) {
ret = scf_error();
goto error;
}
info.pg = NULL;
} else {
info.pg = pg;
}
if (scf_property_get_name(prop, NULL, 0) < 0) {
if (scf_error() ==
SCF_ERROR_CONNECTION_BROKEN) {
ret = scf_error();
goto error;
}
info.prop = NULL;
} else {
info.prop = prop;
}
if ((ret = callback(data, &info)) != 0)
goto error;
}
}
}
error:
if (htable) {
scf_matchkey_t *key, *next;
for (i = 0; i < WALK_HTABLE_SIZE; i++) {
for (key = htable[i]; key != NULL;
key = next) {
next = key->sk_next;
if (key->sk_fmri != NULL)
free(key->sk_fmri);
if (key->sk_legacy != NULL)
free(key->sk_legacy);
free(key);
}
}
free(htable);
}
if (pattern != NULL) {
for (i = 0; i < argc; i++) {
scf_match_t *match, *next;
if (pattern[i].sp_arg != NULL)
free(pattern[i].sp_arg);
for (match = pattern[i].sp_matches; match != NULL;
match = next) {
next = match->sm_next;
free(match);
}
}
free(pattern);
}
free(fmri);
free(pgname);
scf_value_destroy(value);
scf_property_destroy(prop);
scf_pg_destroy(pg);
scf_scope_destroy(scope);
scf_iter_destroy(siter);
scf_iter_destroy(sciter);
scf_iter_destroy(iter);
scf_instance_destroy(inst);
scf_service_destroy(svc);
return (ret);
}
/*
* scf_encode32() is an implementation of Base32 encoding as described in
* section 6 of RFC 4648 - "The Base16, Base32, and Base64 Data
* Encodings". See http://www.ietf.org/rfc/rfc4648.txt?number=4648. The
* input stream is divided into groups of 5 characters (40 bits). Each
* group is encoded into 8 output characters where each output character
* represents 5 bits of input.
*
* If the input is not an even multiple of 5 characters, the output will be
* padded so that the output is an even multiple of 8 characters. The
* standard specifies that the pad character is '='. Unfortunately, '=' is
* not a legal character in SMF property names. Thus, the caller can
* specify an alternate pad character with the pad argument. If pad is 0,
* scf_encode32() will use '='. Note that use of anything other than '='
* produces output that is not in conformance with RFC 4648. It is
* suitable, however, for internal use of SMF software. When the encoded
* data is used as part of an SMF property name, SCF_ENCODE32_PAD should be
* used as the pad character.
*
* Arguments:
* input - Address of the buffer to be encoded.
* inlen - Number of characters at input.
* output - Address of the buffer to receive the encoded data.
* outmax - Size of the buffer at output.
* outlen - If it is not NULL, outlen receives the number of
* bytes placed in output.
* pad - Alternate padding character.
*
* Returns:
* 0 Buffer was successfully encoded.
* -1 Indicates output buffer too small, or pad is one of the
* standard encoding characters.
*/
int
scf_encode32(const char *input, size_t inlen, char *output, size_t outmax,
size_t *outlen, char pad)
{
uint_t group_size = 5;
uint_t i;
const unsigned char *in = (const unsigned char *)input;
size_t olen;
uchar_t *out = (uchar_t *)output;
uint_t oval;
uint_t pad_count;
/* Verify that there is enough room for the output. */
olen = ((inlen + (group_size - 1)) / group_size) * 8;
if (outlen)
*outlen = olen;
if (olen > outmax)
return (-1);
/* If caller did not provide pad character, use the default. */
if (pad == 0) {
pad = '=';
} else {
/*
* Make sure that caller's pad is not one of the encoding
* characters.
*/
for (i = 0; i < sizeof (base32) - 1; i++) {
if (pad == base32[i])
return (-1);
}
}
/* Process full groups capturing 5 bits per output character. */
for (; inlen >= group_size; in += group_size, inlen -= group_size) {
/*
* The comments in this section number the bits in an
* 8 bit byte 0 to 7. The high order bit is bit 7 and
* the low order bit is bit 0.
*/
/* top 5 bits (7-3) from in[0] */
*out++ = base32[in[0] >> 3];
/* bits 2-0 from in[0] and top 2 (7-6) from in[1] */
*out++ = base32[((in[0] << 2) & 0x1c) | (in[1] >> 6)];
/* 5 bits (5-1) from in[1] */
*out++ = base32[(in[1] >> 1) & 0x1f];
/* low bit (0) from in[1] and top 4 (7-4) from in[2] */
*out++ = base32[((in[1] << 4) & 0x10) | ((in[2] >> 4) & 0xf)];
/* low 4 (3-0) from in[2] and top bit (7) from in[3] */
*out++ = base32[((in[2] << 1) & 0x1e) | (in[3] >> 7)];
/* 5 bits (6-2) from in[3] */
*out++ = base32[(in[3] >> 2) & 0x1f];
/* low 2 (1-0) from in[3] and top 3 (7-5) from in[4] */
*out++ = base32[((in[3] << 3) & 0x18) | (in[4] >> 5)];
/* low 5 (4-0) from in[4] */
*out++ = base32[in[4] & 0x1f];
}
/* Take care of final input bytes. */
pad_count = 0;
if (inlen) {
/* top 5 bits (7-3) from in[0] */
*out++ = base32[in[0] >> 3];
/*
* low 3 (2-0) from in[0] and top 2 (7-6) from in[1] if
* available.
*/
oval = (in[0] << 2) & 0x1c;
if (inlen == 1) {
*out++ = base32[oval];
pad_count = 6;
goto padout;
}
oval |= in[1] >> 6;
*out++ = base32[oval];
/* 5 bits (5-1) from in[1] */
*out++ = base32[(in[1] >> 1) & 0x1f];
/*
* low bit (0) from in[1] and top 4 (7-4) from in[2] if
* available.
*/
oval = (in[1] << 4) & 0x10;
if (inlen == 2) {
*out++ = base32[oval];
pad_count = 4;
goto padout;
}
oval |= in[2] >> 4;
*out++ = base32[oval];
/*
* low 4 (3-0) from in[2] and top 1 (7) from in[3] if
* available.
*/
oval = (in[2] << 1) & 0x1e;
if (inlen == 3) {
*out++ = base32[oval];
pad_count = 3;
goto padout;
}
oval |= in[3] >> 7;
*out++ = base32[oval];
/* 5 bits (6-2) from in[3] */
*out++ = base32[(in[3] >> 2) & 0x1f];
/* low 2 bits (1-0) from in[3] */
*out++ = base32[(in[3] << 3) & 0x18];
pad_count = 1;
}
padout:
/*
* Pad the output so that it is a multiple of 8 bytes.
*/
for (; pad_count > 0; pad_count--) {
*out++ = pad;
}
/*
* Null terminate the output if there is enough room.
*/
if (olen < outmax)
*out = 0;
return (0);
}
/*
* scf_decode32() is an implementation of Base32 decoding as described in
* section 6 of RFC 4648 - "The Base16, Base32, and Base64 Data
* Encodings". See http://www.ietf.org/rfc/rfc4648.txt?number=4648. The
* input stream is divided into groups of 8 encoded characters. Each
* encoded character represents 5 bits of data. Thus, the 8 encoded
* characters are used to produce 40 bits or 5 bytes of unencoded data in
* outbuf.
*
* If the encoder did not have enough data to generate a mulitple of 8
* characters of encoded data, it used a pad character to get to the 8
* character boundry. The standard specifies that the pad character is '='.
* Unfortunately, '=' is not a legal character in SMF property names.
* Thus, the caller can specify an alternate pad character with the pad
* argument. If pad is 0, scf_decode32() will use '='. Note that use of
* anything other than '=' is not in conformance with RFC 4648. It is
* suitable, however, for internal use of SMF software. When the encoded
* data is used in SMF property names, SCF_ENCODE32_PAD should be used as
* the pad character.
*
* Arguments:
* in - Buffer of encoded characters.
* inlen - Number of characters at in.
* outbuf - Buffer to receive the decoded bytes. It can be the
* same buffer as in.
* outmax - Size of the buffer at outbuf.
* outlen - If it is not NULL, outlen receives the number of
* bytes placed in output.
* pad - Alternate padding character.
*
* Returns:
* 0 Buffer was successfully decoded.
* -1 Indicates an invalid input character, output buffer too
* small, or pad is one of the standard encoding characters.
*/
int
scf_decode32(const char *in, size_t inlen, char *outbuf, size_t outmax,
size_t *outlen, char pad)
{
char *bufend = outbuf + outmax;
char c;
uint_t count;
uint32_t g[DECODE32_GS];
size_t i;
uint_t j;
char *out = outbuf;
boolean_t pad_seen = B_FALSE;
/* If caller did not provide pad character, use the default. */
if (pad == 0) {
pad = '=';
} else {
/*
* Make sure that caller's pad is not one of the encoding
* characters.
*/
for (i = 0; i < sizeof (base32) - 1; i++) {
if (pad == base32[i])
return (-1);
}
}
i = 0;
while ((i < inlen) && (out < bufend)) {
/* Get a group of input characters. */
for (j = 0, count = 0;
(j < DECODE32_GS) && (i < inlen);
i++) {
c = in[i];
/*
* RFC 4648 allows for the encoded data to be split
* into multiple lines, so skip carriage returns
* and new lines.
*/
if ((c == '\r') || (c == '\n'))
continue;
if ((pad_seen == B_TRUE) && (c != pad)) {
/* Group not completed by pads */
return (-1);
}
if ((c < 0) || (c >= sizeof (index32))) {
/* Illegal character. */
return (-1);
}
if (c == pad) {
pad_seen = B_TRUE;
continue;
}
if ((g[j++] = index32[c]) == 0xff) {
/* Illegal character */
return (-1);
}
count++;
}
/* Pack the group into five 8 bit bytes. */
if ((count >= 2) && (out < bufend)) {
/*
* Output byte 0:
* 5 bits (7-3) from g[0]
* 3 bits (2-0) from g[1] (4-2)
*/
*out++ = (g[0] << 3) | ((g[1] >> 2) & 0x7);
}
if ((count >= 4) && (out < bufend)) {
/*
* Output byte 1:
* 2 bits (7-6) from g[1] (1-0)
* 5 bits (5-1) from g[2] (4-0)
* 1 bit (0) from g[3] (4)
*/
*out++ = (g[1] << 6) | (g[2] << 1) | \
((g[3] >> 4) & 0x1);
}
if ((count >= 5) && (out < bufend)) {
/*
* Output byte 2:
* 4 bits (7-4) from g[3] (3-0)
* 4 bits (3-0) from g[4] (4-1)
*/
*out++ = (g[3] << 4) | ((g[4] >> 1) & 0xf);
}
if ((count >= 7) && (out < bufend)) {
/*
* Output byte 3:
* 1 bit (7) from g[4] (0)
* 5 bits (6-2) from g[5] (4-0)
* 2 bits (0-1) from g[6] (4-3)
*/
*out++ = (g[4] << 7) | (g[5] << 2) |
((g[6] >> 3) & 0x3);
}
if ((count == 8) && (out < bufend)) {
/*
* Output byte 4;
* 3 bits (7-5) from g[6] (2-0)
* 5 bits (4-0) from g[7] (4-0)
*/
*out++ = (g[6] << 5) | g[7];
}
}
if (i < inlen) {
/* Did not process all input characters. */
return (-1);
}
if (outlen)
*outlen = out - outbuf;
/* Null terminate the output if there is room. */
if (out < bufend)
*out = 0;
return (0);
}
/*
* _scf_request_backup: a simple wrapper routine
*/
int
_scf_request_backup(scf_handle_t *h, const char *name)
{
struct rep_protocol_backup_request request;
struct rep_protocol_response response;
int r;
if (strlcpy(request.rpr_name, name, sizeof (request.rpr_name)) >=
sizeof (request.rpr_name))
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
(void) pthread_mutex_lock(&h->rh_lock);
request.rpr_request = REP_PROTOCOL_BACKUP;
request.rpr_changeid = handle_next_changeid(h);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
(void) pthread_mutex_unlock(&h->rh_lock);
if (r < 0) {
DOOR_ERRORS_BLOCK(r);
}
if (response.rpr_response != REP_PROTOCOL_SUCCESS)
return (scf_set_error(proto_error(response.rpr_response)));
return (SCF_SUCCESS);
}
/*
* Request svc.configd daemon to switch repository database.
*
* Can fail:
*
* _NOT_BOUND handle is not bound
* _CONNECTION_BROKEN server is not reachable
* _INTERNAL file operation error
* the server response is too big
* _PERMISSION_DENIED not enough privileges to do request
* _BACKEND_READONLY backend is not writable
* _BACKEND_ACCESS backend access fails
* _NO_RESOURCES svc.configd is out of memory
*/
int
_scf_repository_switch(scf_handle_t *h, int scf_sw)
{
struct rep_protocol_switch_request request;
struct rep_protocol_response response;
int r;
/*
* Setup request protocol and make door call
* Hold rh_lock lock before handle_next_changeid call
*/
(void) pthread_mutex_lock(&h->rh_lock);
request.rpr_flag = scf_sw;
request.rpr_request = REP_PROTOCOL_SWITCH;
request.rpr_changeid = handle_next_changeid(h);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
(void) pthread_mutex_unlock(&h->rh_lock);
if (r < 0) {
DOOR_ERRORS_BLOCK(r);
}
/*
* Pass protocol error up
*/
if (response.rpr_response != REP_PROTOCOL_SUCCESS)
return (scf_set_error(proto_error(response.rpr_response)));
return (SCF_SUCCESS);
}
int
_scf_pg_is_read_protected(const scf_propertygroup_t *pg, boolean_t *out)
{
char buf[REP_PROTOCOL_NAME_LEN];
ssize_t res;
res = datael_get_name(&pg->rd_d, buf, sizeof (buf),
RP_ENTITY_NAME_PGREADPROT);
if (res == -1)
return (-1);
if (uu_strtouint(buf, out, sizeof (*out), 0, 0, 1) == -1)
return (scf_set_error(SCF_ERROR_INTERNAL));
return (SCF_SUCCESS);
}
/*
* _scf_set_annotation: a wrapper to set the annotation fields for SMF
* security auditing.
*
* Fails with following in scf_error_key thread specific data:
* _INVALID_ARGUMENT - operation or file too large
* _NOT_BOUND
* _CONNECTION_BROKEN
* _INTERNAL
* _NO_RESOURCES
*/
int
_scf_set_annotation(scf_handle_t *h, const char *operation, const char *file)
{
struct rep_protocol_annotation request;
struct rep_protocol_response response;
size_t copied;
int r;
request.rpr_request = REP_PROTOCOL_SET_AUDIT_ANNOTATION;
copied = strlcpy(request.rpr_operation,
(operation == NULL) ? "" : operation,
sizeof (request.rpr_operation));
if (copied >= sizeof (request.rpr_operation))
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
copied = strlcpy(request.rpr_file,
(file == NULL) ? "" : file,
sizeof (request.rpr_file));
if (copied >= sizeof (request.rpr_operation))
return (scf_set_error(SCF_ERROR_INVALID_ARGUMENT));
(void) pthread_mutex_lock(&h->rh_lock);
r = make_door_call(h, &request, sizeof (request),
&response, sizeof (response));
(void) pthread_mutex_unlock(&h->rh_lock);
if (r < 0) {
DOOR_ERRORS_BLOCK(r);
}
if (response.rpr_response != REP_PROTOCOL_SUCCESS)
return (scf_set_error(proto_error(response.rpr_response)));
return (0);
}