xref: /titanic_50/usr/src/uts/common/syscall/uadmin.c (revision ed0ee1acd17669b970ef56ec519cbd4e25ed9366)
17c478bd9Sstevel@tonic-gate /*
27c478bd9Sstevel@tonic-gate  * CDDL HEADER START
37c478bd9Sstevel@tonic-gate  *
47c478bd9Sstevel@tonic-gate  * The contents of this file are subject to the terms of the
53f2f09c1Sdp  * Common Development and Distribution License (the "License").
63f2f09c1Sdp  * You may not use this file except in compliance with the License.
77c478bd9Sstevel@tonic-gate  *
87c478bd9Sstevel@tonic-gate  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
97c478bd9Sstevel@tonic-gate  * or http://www.opensolaris.org/os/licensing.
107c478bd9Sstevel@tonic-gate  * See the License for the specific language governing permissions
117c478bd9Sstevel@tonic-gate  * and limitations under the License.
127c478bd9Sstevel@tonic-gate  *
137c478bd9Sstevel@tonic-gate  * When distributing Covered Code, include this CDDL HEADER in each
147c478bd9Sstevel@tonic-gate  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
157c478bd9Sstevel@tonic-gate  * If applicable, add the following below this CDDL HEADER, with the
167c478bd9Sstevel@tonic-gate  * fields enclosed by brackets "[]" replaced with your own identifying
177c478bd9Sstevel@tonic-gate  * information: Portions Copyright [yyyy] [name of copyright owner]
187c478bd9Sstevel@tonic-gate  *
197c478bd9Sstevel@tonic-gate  * CDDL HEADER END
207c478bd9Sstevel@tonic-gate  */
2197eda132Sraf 
227c478bd9Sstevel@tonic-gate /*
23ae115bc7Smrj  * Copyright 2007 Sun Microsystems, Inc.  All rights reserved.
247c478bd9Sstevel@tonic-gate  * Use is subject to license terms.
257c478bd9Sstevel@tonic-gate  */
267c478bd9Sstevel@tonic-gate 
277c478bd9Sstevel@tonic-gate #pragma ident	"%Z%%M%	%I%	%E% SMI"
287c478bd9Sstevel@tonic-gate 
297c478bd9Sstevel@tonic-gate #include <sys/param.h>
307c478bd9Sstevel@tonic-gate #include <sys/types.h>
317c478bd9Sstevel@tonic-gate #include <sys/sysmacros.h>
327c478bd9Sstevel@tonic-gate #include <sys/systm.h>
337c478bd9Sstevel@tonic-gate #include <sys/errno.h>
347c478bd9Sstevel@tonic-gate #include <sys/vfs.h>
357c478bd9Sstevel@tonic-gate #include <sys/vnode.h>
367c478bd9Sstevel@tonic-gate #include <sys/swap.h>
377c478bd9Sstevel@tonic-gate #include <sys/file.h>
387c478bd9Sstevel@tonic-gate #include <sys/proc.h>
397c478bd9Sstevel@tonic-gate #include <sys/var.h>
407c478bd9Sstevel@tonic-gate #include <sys/uadmin.h>
417c478bd9Sstevel@tonic-gate #include <sys/signal.h>
427c478bd9Sstevel@tonic-gate #include <sys/time.h>
437c478bd9Sstevel@tonic-gate #include <vm/seg_kmem.h>
447c478bd9Sstevel@tonic-gate #include <sys/modctl.h>
457c478bd9Sstevel@tonic-gate #include <sys/callb.h>
467c478bd9Sstevel@tonic-gate #include <sys/dumphdr.h>
477c478bd9Sstevel@tonic-gate #include <sys/debug.h>
487c478bd9Sstevel@tonic-gate #include <sys/ftrace.h>
497c478bd9Sstevel@tonic-gate #include <sys/cmn_err.h>
507c478bd9Sstevel@tonic-gate #include <sys/panic.h>
517c478bd9Sstevel@tonic-gate #include <sys/ddi.h>
527c478bd9Sstevel@tonic-gate #include <sys/sunddi.h>
537c478bd9Sstevel@tonic-gate #include <sys/policy.h>
547c478bd9Sstevel@tonic-gate #include <sys/zone.h>
55*ed0ee1acScg209009 #include <sys/condvar.h>
56*ed0ee1acScg209009 #include <sys/thread.h>
577c478bd9Sstevel@tonic-gate 
587c478bd9Sstevel@tonic-gate /*
597c478bd9Sstevel@tonic-gate  * Administrivia system call.  We provide this in two flavors: one for calling
607c478bd9Sstevel@tonic-gate  * from the system call path (uadmin), and the other for calling from elsewhere
617c478bd9Sstevel@tonic-gate  * within the kernel (kadmin).  Callers must beware that certain uadmin cmd
627c478bd9Sstevel@tonic-gate  * values (specifically A_SWAPCTL) are only supported by uadmin and not kadmin.
637c478bd9Sstevel@tonic-gate  */
647c478bd9Sstevel@tonic-gate 
657c478bd9Sstevel@tonic-gate extern ksema_t fsflush_sema;
667c478bd9Sstevel@tonic-gate kmutex_t ualock;
67*ed0ee1acScg209009 kcondvar_t uacond;
68*ed0ee1acScg209009 kthread_t *ua_shutdown_thread = NULL;
697c478bd9Sstevel@tonic-gate 
70facf4a8dSllai1 int sys_shutdown = 0;
717c478bd9Sstevel@tonic-gate 
727c478bd9Sstevel@tonic-gate /*
737c478bd9Sstevel@tonic-gate  * Kill all user processes in said zone.  A special argument of ALL_ZONES is
747c478bd9Sstevel@tonic-gate  * passed in when the system as a whole is shutting down.  The lack of per-zone
757c478bd9Sstevel@tonic-gate  * process lists is likely to make the following a performance bottleneck on a
767c478bd9Sstevel@tonic-gate  * system with many zones.
777c478bd9Sstevel@tonic-gate  */
787c478bd9Sstevel@tonic-gate void
797c478bd9Sstevel@tonic-gate killall(zoneid_t zoneid)
807c478bd9Sstevel@tonic-gate {
817c478bd9Sstevel@tonic-gate 	proc_t *p;
827c478bd9Sstevel@tonic-gate 
837c478bd9Sstevel@tonic-gate 	ASSERT(zoneid != GLOBAL_ZONEID);
847c478bd9Sstevel@tonic-gate 	/*
857c478bd9Sstevel@tonic-gate 	 * Kill all processes except kernel daemons and ourself.
867c478bd9Sstevel@tonic-gate 	 * Make a first pass to stop all processes so they won't
877c478bd9Sstevel@tonic-gate 	 * be trying to restart children as we kill them.
887c478bd9Sstevel@tonic-gate 	 */
897c478bd9Sstevel@tonic-gate 	mutex_enter(&pidlock);
907c478bd9Sstevel@tonic-gate 	for (p = practive; p != NULL; p = p->p_next) {
917c478bd9Sstevel@tonic-gate 		if ((zoneid == ALL_ZONES || p->p_zone->zone_id == zoneid) &&
927c478bd9Sstevel@tonic-gate 		    p->p_exec != NULLVP &&	/* kernel daemons */
937c478bd9Sstevel@tonic-gate 		    p->p_as != &kas &&
947c478bd9Sstevel@tonic-gate 		    p->p_stat != SZOMB) {
957c478bd9Sstevel@tonic-gate 			mutex_enter(&p->p_lock);
967c478bd9Sstevel@tonic-gate 			p->p_flag |= SNOWAIT;
977c478bd9Sstevel@tonic-gate 			sigtoproc(p, NULL, SIGSTOP);
987c478bd9Sstevel@tonic-gate 			mutex_exit(&p->p_lock);
997c478bd9Sstevel@tonic-gate 		}
1007c478bd9Sstevel@tonic-gate 	}
1017c478bd9Sstevel@tonic-gate 	p = practive;
1027c478bd9Sstevel@tonic-gate 	while (p != NULL) {
1037c478bd9Sstevel@tonic-gate 		if ((zoneid == ALL_ZONES || p->p_zone->zone_id == zoneid) &&
1047c478bd9Sstevel@tonic-gate 		    p->p_exec != NULLVP &&	/* kernel daemons */
1057c478bd9Sstevel@tonic-gate 		    p->p_as != &kas &&
1067c478bd9Sstevel@tonic-gate 		    p->p_stat != SIDL &&
1077c478bd9Sstevel@tonic-gate 		    p->p_stat != SZOMB) {
1087c478bd9Sstevel@tonic-gate 			mutex_enter(&p->p_lock);
1097c478bd9Sstevel@tonic-gate 			if (sigismember(&p->p_sig, SIGKILL)) {
1107c478bd9Sstevel@tonic-gate 				mutex_exit(&p->p_lock);
1117c478bd9Sstevel@tonic-gate 				p = p->p_next;
1127c478bd9Sstevel@tonic-gate 			} else {
1137c478bd9Sstevel@tonic-gate 				sigtoproc(p, NULL, SIGKILL);
1147c478bd9Sstevel@tonic-gate 				mutex_exit(&p->p_lock);
1153f2f09c1Sdp 				(void) cv_timedwait(&p->p_srwchan_cv, &pidlock,
1163f2f09c1Sdp 				    lbolt + hz);
1177c478bd9Sstevel@tonic-gate 				p = practive;
1187c478bd9Sstevel@tonic-gate 			}
1197c478bd9Sstevel@tonic-gate 		} else {
1207c478bd9Sstevel@tonic-gate 			p = p->p_next;
1217c478bd9Sstevel@tonic-gate 		}
1227c478bd9Sstevel@tonic-gate 	}
1237c478bd9Sstevel@tonic-gate 	mutex_exit(&pidlock);
1247c478bd9Sstevel@tonic-gate }
1257c478bd9Sstevel@tonic-gate 
1267c478bd9Sstevel@tonic-gate int
1277c478bd9Sstevel@tonic-gate kadmin(int cmd, int fcn, void *mdep, cred_t *credp)
1287c478bd9Sstevel@tonic-gate {
1297c478bd9Sstevel@tonic-gate 	int error = 0;
1307c478bd9Sstevel@tonic-gate 	char *buf;
1317c478bd9Sstevel@tonic-gate 	size_t buflen = 0;
132edc40228Sachartre 	boolean_t invoke_cb = B_FALSE;
1337c478bd9Sstevel@tonic-gate 
1347c478bd9Sstevel@tonic-gate 	/*
1357c478bd9Sstevel@tonic-gate 	 * We might be called directly by the kernel's fault-handling code, so
1367c478bd9Sstevel@tonic-gate 	 * we can't assert that the caller is in the global zone.
1377c478bd9Sstevel@tonic-gate 	 */
1387c478bd9Sstevel@tonic-gate 
1397c478bd9Sstevel@tonic-gate 	/*
1407c478bd9Sstevel@tonic-gate 	 * Make sure that cmd is one of the valid <sys/uadmin.h> command codes
1417c478bd9Sstevel@tonic-gate 	 * and that we have appropriate privileges for this action.
1427c478bd9Sstevel@tonic-gate 	 */
1437c478bd9Sstevel@tonic-gate 	switch (cmd) {
1447c478bd9Sstevel@tonic-gate 	case A_FTRACE:
1457c478bd9Sstevel@tonic-gate 	case A_SHUTDOWN:
1467c478bd9Sstevel@tonic-gate 	case A_REBOOT:
1477c478bd9Sstevel@tonic-gate 	case A_REMOUNT:
1487c478bd9Sstevel@tonic-gate 	case A_FREEZE:
1497c478bd9Sstevel@tonic-gate 	case A_DUMP:
1507c478bd9Sstevel@tonic-gate 		if (secpolicy_sys_config(credp, B_FALSE) != 0)
1517c478bd9Sstevel@tonic-gate 			return (EPERM);
1527c478bd9Sstevel@tonic-gate 		break;
1537c478bd9Sstevel@tonic-gate 
1547c478bd9Sstevel@tonic-gate 	default:
1557c478bd9Sstevel@tonic-gate 		return (EINVAL);
1567c478bd9Sstevel@tonic-gate 	}
1577c478bd9Sstevel@tonic-gate 
1587c478bd9Sstevel@tonic-gate 	/*
159*ed0ee1acScg209009 	 * Serialize these operations on ualock.  If it is held, the
160*ed0ee1acScg209009 	 * system should shutdown, reboot, or remount shortly, unless there is
161*ed0ee1acScg209009 	 * an error.  We need a cv rather than just a mutex because proper
162*ed0ee1acScg209009 	 * functioning of A_REBOOT relies on being able to interrupt blocked
163*ed0ee1acScg209009 	 * userland callers.
164*ed0ee1acScg209009 	 *
165*ed0ee1acScg209009 	 * We only clear ua_shutdown_thread after A_REMOUNT, because A_SHUTDOWN
166*ed0ee1acScg209009 	 * and A_REBOOT should never return.
1677c478bd9Sstevel@tonic-gate 	 */
1687c478bd9Sstevel@tonic-gate 	if (cmd == A_SHUTDOWN || cmd == A_REBOOT || cmd == A_REMOUNT) {
169*ed0ee1acScg209009 		mutex_enter(&ualock);
170*ed0ee1acScg209009 		while (ua_shutdown_thread != NULL) {
171*ed0ee1acScg209009 			if (cv_wait_sig(&uacond, &ualock) == 0) {
172*ed0ee1acScg209009 				/*
173*ed0ee1acScg209009 				 * If we were interrupted, leave, and handle
174*ed0ee1acScg209009 				 * the signal (or exit, depending on what
175*ed0ee1acScg209009 				 * happened)
176*ed0ee1acScg209009 				 */
177*ed0ee1acScg209009 				mutex_exit(&ualock);
178*ed0ee1acScg209009 				return (EINTR);
179*ed0ee1acScg209009 			}
180*ed0ee1acScg209009 		}
181*ed0ee1acScg209009 		ua_shutdown_thread = curthread;
182*ed0ee1acScg209009 		mutex_exit(&ualock);
1837c478bd9Sstevel@tonic-gate 	}
1847c478bd9Sstevel@tonic-gate 
1857c478bd9Sstevel@tonic-gate 	switch (cmd) {
1867c478bd9Sstevel@tonic-gate 	case A_SHUTDOWN:
1877c478bd9Sstevel@tonic-gate 	{
1887c478bd9Sstevel@tonic-gate 		proc_t *p = ttoproc(curthread);
1897c478bd9Sstevel@tonic-gate 
1907c478bd9Sstevel@tonic-gate 		/*
1917c478bd9Sstevel@tonic-gate 		 * Release (almost) all of our own resources if we are called
1927c478bd9Sstevel@tonic-gate 		 * from a user context, however if we are calling kadmin() from
1937c478bd9Sstevel@tonic-gate 		 * a kernel context then we do not release these resources.
1947c478bd9Sstevel@tonic-gate 		 */
19597eda132Sraf 		if (p != &p0) {
19697eda132Sraf 			proc_is_exiting(p);
1978c9fe657Scg209009 			if ((error = exitlwps(0)) != 0) {
198*ed0ee1acScg209009 				/*
199*ed0ee1acScg209009 				 * Another thread in this process also called
200*ed0ee1acScg209009 				 * exitlwps().
201*ed0ee1acScg209009 				 */
202*ed0ee1acScg209009 				mutex_enter(&ualock);
203*ed0ee1acScg209009 				ua_shutdown_thread = NULL;
204*ed0ee1acScg209009 				cv_signal(&uacond);
2058c9fe657Scg209009 				mutex_exit(&ualock);
2067c478bd9Sstevel@tonic-gate 				return (error);
2078c9fe657Scg209009 			}
2087c478bd9Sstevel@tonic-gate 			mutex_enter(&p->p_lock);
2097c478bd9Sstevel@tonic-gate 			p->p_flag |= SNOWAIT;
2107c478bd9Sstevel@tonic-gate 			sigfillset(&p->p_ignore);
2117c478bd9Sstevel@tonic-gate 			curthread->t_lwp->lwp_cursig = 0;
2127c478bd9Sstevel@tonic-gate 			curthread->t_lwp->lwp_extsig = 0;
2137c478bd9Sstevel@tonic-gate 			if (p->p_exec) {
2147c478bd9Sstevel@tonic-gate 				vnode_t *exec_vp = p->p_exec;
2157c478bd9Sstevel@tonic-gate 				p->p_exec = NULLVP;
2167c478bd9Sstevel@tonic-gate 				mutex_exit(&p->p_lock);
2177c478bd9Sstevel@tonic-gate 				VN_RELE(exec_vp);
2187c478bd9Sstevel@tonic-gate 			} else {
2197c478bd9Sstevel@tonic-gate 				mutex_exit(&p->p_lock);
2207c478bd9Sstevel@tonic-gate 			}
2217c478bd9Sstevel@tonic-gate 
2227c478bd9Sstevel@tonic-gate 			pollcleanup();
2237c478bd9Sstevel@tonic-gate 			closeall(P_FINFO(curproc));
2247c478bd9Sstevel@tonic-gate 			relvm();
2257c478bd9Sstevel@tonic-gate 
2267c478bd9Sstevel@tonic-gate 		} else {
2277c478bd9Sstevel@tonic-gate 			/*
2287c478bd9Sstevel@tonic-gate 			 * Reset t_cred if not set because much of the
2297c478bd9Sstevel@tonic-gate 			 * filesystem code depends on CRED() being valid.
2307c478bd9Sstevel@tonic-gate 			 */
2317c478bd9Sstevel@tonic-gate 			if (curthread->t_cred == NULL)
2327c478bd9Sstevel@tonic-gate 				curthread->t_cred = kcred;
2337c478bd9Sstevel@tonic-gate 		}
2347c478bd9Sstevel@tonic-gate 
235facf4a8dSllai1 		/* indicate shutdown in progress */
236facf4a8dSllai1 		sys_shutdown = 1;
237facf4a8dSllai1 
2387c478bd9Sstevel@tonic-gate 		/*
2397c478bd9Sstevel@tonic-gate 		 * Communcate that init shouldn't be restarted.
2407c478bd9Sstevel@tonic-gate 		 */
2417c478bd9Sstevel@tonic-gate 		zone_shutdown_global();
2427c478bd9Sstevel@tonic-gate 
2437c478bd9Sstevel@tonic-gate 		killall(ALL_ZONES);
2447c478bd9Sstevel@tonic-gate 		/*
2457c478bd9Sstevel@tonic-gate 		 * If we are calling kadmin() from a kernel context then we
2467c478bd9Sstevel@tonic-gate 		 * do not release these resources.
2477c478bd9Sstevel@tonic-gate 		 */
2487c478bd9Sstevel@tonic-gate 		if (ttoproc(curthread) != &p0) {
249ae115bc7Smrj 			VN_RELE(PTOU(curproc)->u_cdir);
250ae115bc7Smrj 			if (PTOU(curproc)->u_rdir)
251ae115bc7Smrj 				VN_RELE(PTOU(curproc)->u_rdir);
252ae115bc7Smrj 			if (PTOU(curproc)->u_cwd)
253ae115bc7Smrj 				refstr_rele(PTOU(curproc)->u_cwd);
2547c478bd9Sstevel@tonic-gate 
255ae115bc7Smrj 			PTOU(curproc)->u_cdir = rootdir;
256ae115bc7Smrj 			PTOU(curproc)->u_rdir = NULL;
257ae115bc7Smrj 			PTOU(curproc)->u_cwd = NULL;
2587c478bd9Sstevel@tonic-gate 		}
2597c478bd9Sstevel@tonic-gate 
2607c478bd9Sstevel@tonic-gate 		/*
2617c478bd9Sstevel@tonic-gate 		 * Allow the reboot/halt/poweroff code a chance to do
2627c478bd9Sstevel@tonic-gate 		 * anything it needs to whilst we still have filesystems
2637c478bd9Sstevel@tonic-gate 		 * mounted, like loading any modules necessary for later
2647c478bd9Sstevel@tonic-gate 		 * performing the actual poweroff.
2657c478bd9Sstevel@tonic-gate 		 */
2667c478bd9Sstevel@tonic-gate 		if ((mdep != NULL) && (*(char *)mdep == '/')) {
2677c478bd9Sstevel@tonic-gate 			buf = i_convert_boot_device_name(mdep, NULL, &buflen);
2687c478bd9Sstevel@tonic-gate 			mdpreboot(cmd, fcn, buf);
2697c478bd9Sstevel@tonic-gate 		} else
2707c478bd9Sstevel@tonic-gate 			mdpreboot(cmd, fcn, mdep);
2717c478bd9Sstevel@tonic-gate 
2727c478bd9Sstevel@tonic-gate 		/*
2737c478bd9Sstevel@tonic-gate 		 * Allow fsflush to finish running and then prevent it
2747c478bd9Sstevel@tonic-gate 		 * from ever running again so that vfs_unmountall() and
2757c478bd9Sstevel@tonic-gate 		 * vfs_syncall() can acquire the vfs locks they need.
2767c478bd9Sstevel@tonic-gate 		 */
2777c478bd9Sstevel@tonic-gate 		sema_p(&fsflush_sema);
2787c478bd9Sstevel@tonic-gate 		(void) callb_execute_class(CB_CL_UADMIN_PRE_VFS, NULL);
2797c478bd9Sstevel@tonic-gate 
2807c478bd9Sstevel@tonic-gate 		vfs_unmountall();
2817c478bd9Sstevel@tonic-gate 		(void) VFS_MOUNTROOT(rootvfs, ROOT_UNMOUNT);
2827c478bd9Sstevel@tonic-gate 		vfs_syncall();
2837c478bd9Sstevel@tonic-gate 
2847c478bd9Sstevel@tonic-gate 		dump_ereports();
2857c478bd9Sstevel@tonic-gate 		dump_messages();
2867c478bd9Sstevel@tonic-gate 
287edc40228Sachartre 		invoke_cb = B_TRUE;
288edc40228Sachartre 
2897c478bd9Sstevel@tonic-gate 		/* FALLTHROUGH */
2907c478bd9Sstevel@tonic-gate 	}
2917c478bd9Sstevel@tonic-gate 
2927c478bd9Sstevel@tonic-gate 	case A_REBOOT:
2937c478bd9Sstevel@tonic-gate 		if ((mdep != NULL) && (*(char *)mdep == '/')) {
2947c478bd9Sstevel@tonic-gate 			buf = i_convert_boot_device_name(mdep, NULL, &buflen);
295edc40228Sachartre 			mdboot(cmd, fcn, buf, invoke_cb);
2967c478bd9Sstevel@tonic-gate 		} else
297edc40228Sachartre 			mdboot(cmd, fcn, mdep, invoke_cb);
2987c478bd9Sstevel@tonic-gate 		/* no return expected */
2997c478bd9Sstevel@tonic-gate 		break;
3007c478bd9Sstevel@tonic-gate 
3017c478bd9Sstevel@tonic-gate 	case A_REMOUNT:
3027c478bd9Sstevel@tonic-gate 		(void) VFS_MOUNTROOT(rootvfs, ROOT_REMOUNT);
303*ed0ee1acScg209009 		/* Let other threads enter the shutdown path now */
304*ed0ee1acScg209009 		mutex_enter(&ualock);
305*ed0ee1acScg209009 		ua_shutdown_thread = NULL;
306*ed0ee1acScg209009 		cv_signal(&uacond);
307*ed0ee1acScg209009 		mutex_exit(&ualock);
3087c478bd9Sstevel@tonic-gate 		break;
3097c478bd9Sstevel@tonic-gate 
3107c478bd9Sstevel@tonic-gate 	case A_FREEZE:
3117c478bd9Sstevel@tonic-gate 	{
3127c478bd9Sstevel@tonic-gate 		/* XXX: declare in some header file */
3137c478bd9Sstevel@tonic-gate 		extern int cpr(int);
3147c478bd9Sstevel@tonic-gate 
3157c478bd9Sstevel@tonic-gate 		if (modload("misc", "cpr") == -1)
3167c478bd9Sstevel@tonic-gate 			return (ENOTSUP);
3177c478bd9Sstevel@tonic-gate 		error = cpr(fcn);
3187c478bd9Sstevel@tonic-gate 		break;
3197c478bd9Sstevel@tonic-gate 	}
3207c478bd9Sstevel@tonic-gate 
3217c478bd9Sstevel@tonic-gate 	case A_FTRACE:
3227c478bd9Sstevel@tonic-gate 	{
3237c478bd9Sstevel@tonic-gate 		switch (fcn) {
3247c478bd9Sstevel@tonic-gate 		case AD_FTRACE_START:
3257c478bd9Sstevel@tonic-gate 			(void) FTRACE_START();
3267c478bd9Sstevel@tonic-gate 			break;
3277c478bd9Sstevel@tonic-gate 		case AD_FTRACE_STOP:
3287c478bd9Sstevel@tonic-gate 			(void) FTRACE_STOP();
3297c478bd9Sstevel@tonic-gate 			break;
3307c478bd9Sstevel@tonic-gate 		default:
3317c478bd9Sstevel@tonic-gate 			error = EINVAL;
3327c478bd9Sstevel@tonic-gate 		}
3337c478bd9Sstevel@tonic-gate 		break;
3347c478bd9Sstevel@tonic-gate 	}
3357c478bd9Sstevel@tonic-gate 
3367c478bd9Sstevel@tonic-gate 	case A_DUMP:
3377c478bd9Sstevel@tonic-gate 	{
3387c478bd9Sstevel@tonic-gate 		if (fcn == AD_NOSYNC) {
3397c478bd9Sstevel@tonic-gate 			in_sync = 1;
3407c478bd9Sstevel@tonic-gate 			break;
3417c478bd9Sstevel@tonic-gate 		}
3427c478bd9Sstevel@tonic-gate 
3437c478bd9Sstevel@tonic-gate 		panic_bootfcn = fcn;
3447c478bd9Sstevel@tonic-gate 		panic_forced = 1;
3457c478bd9Sstevel@tonic-gate 
3467c478bd9Sstevel@tonic-gate 		if ((mdep != NULL) && (*(char *)mdep == '/')) {
3477c478bd9Sstevel@tonic-gate 			panic_bootstr = i_convert_boot_device_name(mdep,
3487c478bd9Sstevel@tonic-gate 			    NULL, &buflen);
3497c478bd9Sstevel@tonic-gate 		} else
3507c478bd9Sstevel@tonic-gate 			panic_bootstr = mdep;
3517c478bd9Sstevel@tonic-gate 
3527c478bd9Sstevel@tonic-gate 		panic("forced crash dump initiated at user request");
3537c478bd9Sstevel@tonic-gate 		/*NOTREACHED*/
3547c478bd9Sstevel@tonic-gate 	}
3557c478bd9Sstevel@tonic-gate 
3567c478bd9Sstevel@tonic-gate 	default:
3577c478bd9Sstevel@tonic-gate 		error = EINVAL;
3587c478bd9Sstevel@tonic-gate 	}
3597c478bd9Sstevel@tonic-gate 
3607c478bd9Sstevel@tonic-gate 	return (error);
3617c478bd9Sstevel@tonic-gate }
3627c478bd9Sstevel@tonic-gate 
3637c478bd9Sstevel@tonic-gate int
3647c478bd9Sstevel@tonic-gate uadmin(int cmd, int fcn, uintptr_t mdep)
3657c478bd9Sstevel@tonic-gate {
3667c478bd9Sstevel@tonic-gate 	int error = 0, rv = 0;
3677c478bd9Sstevel@tonic-gate 	size_t nbytes = 0;
3687c478bd9Sstevel@tonic-gate 	cred_t *credp = CRED();
3693f2f09c1Sdp 	char *bootargs = NULL;
3707c478bd9Sstevel@tonic-gate 
3717c478bd9Sstevel@tonic-gate 	/*
3727c478bd9Sstevel@tonic-gate 	 * The swapctl system call doesn't have its own entry point: it uses
3737c478bd9Sstevel@tonic-gate 	 * uadmin as a wrapper so we just call it directly from here.
3747c478bd9Sstevel@tonic-gate 	 */
3757c478bd9Sstevel@tonic-gate 	if (cmd == A_SWAPCTL) {
3767c478bd9Sstevel@tonic-gate 		if (get_udatamodel() == DATAMODEL_NATIVE)
3777c478bd9Sstevel@tonic-gate 			error = swapctl(fcn, (void *)mdep, &rv);
3787c478bd9Sstevel@tonic-gate #if defined(_SYSCALL32_IMPL)
3797c478bd9Sstevel@tonic-gate 		else
3807c478bd9Sstevel@tonic-gate 			error = swapctl32(fcn, (void *)mdep, &rv);
3817c478bd9Sstevel@tonic-gate #endif /* _SYSCALL32_IMPL */
3827c478bd9Sstevel@tonic-gate 		return (error ? set_errno(error) : rv);
3837c478bd9Sstevel@tonic-gate 	}
3847c478bd9Sstevel@tonic-gate 
3857c478bd9Sstevel@tonic-gate 	/*
3863f2f09c1Sdp 	 * Certain subcommands intepret a non-NULL mdep value as a pointer to
3873f2f09c1Sdp 	 * a boot string.  We pull that in as bootargs, if applicable.
3887c478bd9Sstevel@tonic-gate 	 */
3893f2f09c1Sdp 	if (mdep != NULL &&
3903f2f09c1Sdp 	    (cmd == A_SHUTDOWN || cmd == A_REBOOT || cmd == A_DUMP)) {
3913f2f09c1Sdp 		bootargs = kmem_zalloc(BOOTARGS_MAX, KM_SLEEP);
3923f2f09c1Sdp 		if ((error = copyinstr((const char *)mdep, bootargs,
3933f2f09c1Sdp 		    BOOTARGS_MAX, &nbytes)) != 0) {
3943f2f09c1Sdp 			kmem_free(bootargs, BOOTARGS_MAX);
3953f2f09c1Sdp 			return (set_errno(error));
3963f2f09c1Sdp 		}
3977c478bd9Sstevel@tonic-gate 	}
3987c478bd9Sstevel@tonic-gate 
3997c478bd9Sstevel@tonic-gate 	/*
4003f2f09c1Sdp 	 * Invoke the appropriate kadmin() routine.
4017c478bd9Sstevel@tonic-gate 	 */
4023f2f09c1Sdp 	if (getzoneid() != GLOBAL_ZONEID)
4033f2f09c1Sdp 		error = zone_kadmin(cmd, fcn, bootargs, credp);
4043f2f09c1Sdp 	else
4053f2f09c1Sdp 		error = kadmin(cmd, fcn, bootargs, credp);
4067c478bd9Sstevel@tonic-gate 
4073f2f09c1Sdp 	if (bootargs != NULL)
4083f2f09c1Sdp 		kmem_free(bootargs, BOOTARGS_MAX);
4093f2f09c1Sdp 	return (error ? set_errno(error) : 0);
4107c478bd9Sstevel@tonic-gate }
411