xref: /titanic_51/usr/src/uts/common/syscall/rctlsys.c (revision 6fa77e955ba14dcaffbada2beecf867f5fd82d19)
17c478bd9Sstevel@tonic-gate /*
27c478bd9Sstevel@tonic-gate  * CDDL HEADER START
37c478bd9Sstevel@tonic-gate  *
47c478bd9Sstevel@tonic-gate  * The contents of this file are subject to the terms of the
5532877c4Srd117015  * Common Development and Distribution License (the "License").
6532877c4Srd117015  * You may not use this file except in compliance with the License.
77c478bd9Sstevel@tonic-gate  *
87c478bd9Sstevel@tonic-gate  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
97c478bd9Sstevel@tonic-gate  * or http://www.opensolaris.org/os/licensing.
107c478bd9Sstevel@tonic-gate  * See the License for the specific language governing permissions
117c478bd9Sstevel@tonic-gate  * and limitations under the License.
127c478bd9Sstevel@tonic-gate  *
137c478bd9Sstevel@tonic-gate  * When distributing Covered Code, include this CDDL HEADER in each
147c478bd9Sstevel@tonic-gate  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
157c478bd9Sstevel@tonic-gate  * If applicable, add the following below this CDDL HEADER, with the
167c478bd9Sstevel@tonic-gate  * fields enclosed by brackets "[]" replaced with your own identifying
177c478bd9Sstevel@tonic-gate  * information: Portions Copyright [yyyy] [name of copyright owner]
187c478bd9Sstevel@tonic-gate  *
197c478bd9Sstevel@tonic-gate  * CDDL HEADER END
207c478bd9Sstevel@tonic-gate  */
217c478bd9Sstevel@tonic-gate /*
22532877c4Srd117015  * Copyright 2007 Sun Microsystems, Inc.  All rights reserved.
237c478bd9Sstevel@tonic-gate  * Use is subject to license terms.
247c478bd9Sstevel@tonic-gate  */
257c478bd9Sstevel@tonic-gate 
267c478bd9Sstevel@tonic-gate #pragma ident	"%Z%%M%	%I%	%E% SMI"
277c478bd9Sstevel@tonic-gate 
287c478bd9Sstevel@tonic-gate #include <sys/types.h>
297c478bd9Sstevel@tonic-gate 
307c478bd9Sstevel@tonic-gate #include <sys/cmn_err.h>
317c478bd9Sstevel@tonic-gate #include <sys/cred.h>
327c478bd9Sstevel@tonic-gate #include <sys/errno.h>
337c478bd9Sstevel@tonic-gate #include <sys/rctl.h>
347c478bd9Sstevel@tonic-gate #include <sys/rctl_impl.h>
357c478bd9Sstevel@tonic-gate #include <sys/strlog.h>
367c478bd9Sstevel@tonic-gate #include <sys/syslog.h>
377c478bd9Sstevel@tonic-gate #include <sys/sysmacros.h>
387c478bd9Sstevel@tonic-gate #include <sys/systm.h>
397c478bd9Sstevel@tonic-gate #include <sys/policy.h>
407c478bd9Sstevel@tonic-gate #include <sys/proc.h>
417c478bd9Sstevel@tonic-gate #include <sys/task.h>
427c478bd9Sstevel@tonic-gate 
437c478bd9Sstevel@tonic-gate /*
447c478bd9Sstevel@tonic-gate  * setrctl(2), getrctl(2), and private rctlsys(2*) system calls
457c478bd9Sstevel@tonic-gate  *
467c478bd9Sstevel@tonic-gate  * Resource control block (rctlblk_ptr_t, rctl_opaque_t)
477c478bd9Sstevel@tonic-gate  *   The resource control system call interfaces present the resource control
487c478bd9Sstevel@tonic-gate  *   values and flags via the resource control block abstraction, made manifest
497c478bd9Sstevel@tonic-gate  *   via an opaque data type with strict type definitions.  Keeping the formal
507c478bd9Sstevel@tonic-gate  *   definitions in the rcontrol block allows us to be clever in the kernel,
517c478bd9Sstevel@tonic-gate  *   combining attributes where appropriate in the current implementation while
527c478bd9Sstevel@tonic-gate  *   preserving binary compatibility in the face of implementation changes.
537c478bd9Sstevel@tonic-gate  */
547c478bd9Sstevel@tonic-gate 
557c478bd9Sstevel@tonic-gate #define	RBX_TO_BLK	0x1
567c478bd9Sstevel@tonic-gate #define	RBX_FROM_BLK	0x2
577c478bd9Sstevel@tonic-gate #define	RBX_VAL		0x4
587c478bd9Sstevel@tonic-gate #define	RBX_CTL		0x8
597c478bd9Sstevel@tonic-gate 
607c478bd9Sstevel@tonic-gate static void
617c478bd9Sstevel@tonic-gate rctlsys_rblk_xfrm(rctl_opaque_t *blk, rctl_dict_entry_t *rde,
627c478bd9Sstevel@tonic-gate     rctl_val_t *val, int flags)
637c478bd9Sstevel@tonic-gate {
647c478bd9Sstevel@tonic-gate 	if (flags & RBX_FROM_BLK) {
657c478bd9Sstevel@tonic-gate 		if (flags & RBX_VAL) {
667c478bd9Sstevel@tonic-gate 			/*
677c478bd9Sstevel@tonic-gate 			 * Firing time cannot be set.
687c478bd9Sstevel@tonic-gate 			 */
697c478bd9Sstevel@tonic-gate 			val->rcv_privilege = blk->rcq_privilege;
707c478bd9Sstevel@tonic-gate 			val->rcv_value = blk->rcq_value;
717c478bd9Sstevel@tonic-gate 			val->rcv_flagaction = blk->rcq_local_flagaction;
727c478bd9Sstevel@tonic-gate 			val->rcv_action_signal = blk->rcq_local_signal;
737c478bd9Sstevel@tonic-gate 			val->rcv_action_recip_pid =
747c478bd9Sstevel@tonic-gate 			    blk->rcq_local_recipient_pid;
757c478bd9Sstevel@tonic-gate 		}
767c478bd9Sstevel@tonic-gate 		if (flags & RBX_CTL) {
777c478bd9Sstevel@tonic-gate 			rde->rcd_flagaction = blk->rcq_global_flagaction;
787c478bd9Sstevel@tonic-gate 			rde->rcd_syslog_level = blk->rcq_global_syslog_level;
797c478bd9Sstevel@tonic-gate 
807c478bd9Sstevel@tonic-gate 			/*
817c478bd9Sstevel@tonic-gate 			 * Because the strlog() interface supports fewer options
827c478bd9Sstevel@tonic-gate 			 * than are made available via the syslog() interface to
837c478bd9Sstevel@tonic-gate 			 * userland, we map the syslog level down to a smaller
847c478bd9Sstevel@tonic-gate 			 * set of distinct logging behaviours.
857c478bd9Sstevel@tonic-gate 			 */
867c478bd9Sstevel@tonic-gate 			rde->rcd_strlog_flags = 0;
877c478bd9Sstevel@tonic-gate 			switch (blk->rcq_global_syslog_level) {
887c478bd9Sstevel@tonic-gate 				case LOG_EMERG:
897c478bd9Sstevel@tonic-gate 				case LOG_ALERT:
907c478bd9Sstevel@tonic-gate 				case LOG_CRIT:
917c478bd9Sstevel@tonic-gate 					rde->rcd_strlog_flags |= SL_CONSOLE;
927c478bd9Sstevel@tonic-gate 					/*FALLTHROUGH*/
937c478bd9Sstevel@tonic-gate 				case LOG_ERR:
947c478bd9Sstevel@tonic-gate 					rde->rcd_strlog_flags |= SL_ERROR;
957c478bd9Sstevel@tonic-gate 					/*FALLTHROUGH*/
967c478bd9Sstevel@tonic-gate 				case LOG_WARNING:
977c478bd9Sstevel@tonic-gate 					rde->rcd_strlog_flags |= SL_WARN;
987c478bd9Sstevel@tonic-gate 					break;
997c478bd9Sstevel@tonic-gate 				case LOG_NOTICE:
1007c478bd9Sstevel@tonic-gate 					rde->rcd_strlog_flags |= SL_CONSOLE;
1017c478bd9Sstevel@tonic-gate 					/*FALLTHROUGH*/
1027c478bd9Sstevel@tonic-gate 				case LOG_INFO:	/* informational */
1037c478bd9Sstevel@tonic-gate 				case LOG_DEBUG:	/* debug-level messages */
1047c478bd9Sstevel@tonic-gate 				default:
1057c478bd9Sstevel@tonic-gate 					rde->rcd_strlog_flags |= SL_NOTE;
1067c478bd9Sstevel@tonic-gate 					break;
1077c478bd9Sstevel@tonic-gate 			}
1087c478bd9Sstevel@tonic-gate 		}
1097c478bd9Sstevel@tonic-gate 	} else {
1107c478bd9Sstevel@tonic-gate 		bzero(blk,  sizeof (rctl_opaque_t));
1117c478bd9Sstevel@tonic-gate 		if (flags & RBX_VAL) {
1127c478bd9Sstevel@tonic-gate 			blk->rcq_privilege = val->rcv_privilege;
1137c478bd9Sstevel@tonic-gate 			blk->rcq_value = val->rcv_value;
1147c478bd9Sstevel@tonic-gate 			blk->rcq_enforced_value = rctl_model_value(rde,
1157c478bd9Sstevel@tonic-gate 			    curproc, val->rcv_value);
1167c478bd9Sstevel@tonic-gate 			blk->rcq_local_flagaction = val->rcv_flagaction;
1177c478bd9Sstevel@tonic-gate 			blk->rcq_local_signal = val->rcv_action_signal;
1187c478bd9Sstevel@tonic-gate 			blk->rcq_firing_time = val->rcv_firing_time;
1197c478bd9Sstevel@tonic-gate 			blk->rcq_local_recipient_pid =
1207c478bd9Sstevel@tonic-gate 			    val->rcv_action_recip_pid;
1217c478bd9Sstevel@tonic-gate 		}
1227c478bd9Sstevel@tonic-gate 		if (flags & RBX_CTL) {
1237c478bd9Sstevel@tonic-gate 			blk->rcq_global_flagaction = rde->rcd_flagaction;
1247c478bd9Sstevel@tonic-gate 			blk->rcq_global_syslog_level = rde->rcd_syslog_level;
1257c478bd9Sstevel@tonic-gate 		}
1267c478bd9Sstevel@tonic-gate 	}
1277c478bd9Sstevel@tonic-gate }
1287c478bd9Sstevel@tonic-gate 
1297c478bd9Sstevel@tonic-gate /*
1307c478bd9Sstevel@tonic-gate  * int rctl_invalid_value(rctl_dict_entry_t *, rctl_val_t *)
1317c478bd9Sstevel@tonic-gate  *
1327c478bd9Sstevel@tonic-gate  * Overview
1337c478bd9Sstevel@tonic-gate  *   Perform basic validation of proposed new resource control value against the
1347c478bd9Sstevel@tonic-gate  *   global properties set on the control.  Any system call operation presented
1357c478bd9Sstevel@tonic-gate  *   with an invalid resource control value should return -1 and set errno to
1367c478bd9Sstevel@tonic-gate  *   EINVAL.
1377c478bd9Sstevel@tonic-gate  *
1387c478bd9Sstevel@tonic-gate  * Return values
1397c478bd9Sstevel@tonic-gate  *   0 if valid, 1 if invalid.
1407c478bd9Sstevel@tonic-gate  *
1417c478bd9Sstevel@tonic-gate  * Caller's context
1427c478bd9Sstevel@tonic-gate  *   No restriction on context.
1437c478bd9Sstevel@tonic-gate  */
1447c478bd9Sstevel@tonic-gate int
1457c478bd9Sstevel@tonic-gate rctl_invalid_value(rctl_dict_entry_t *rde, rctl_val_t *rval)
1467c478bd9Sstevel@tonic-gate {
1477c478bd9Sstevel@tonic-gate 	rctl_val_t *sys_rval;
1487c478bd9Sstevel@tonic-gate 
1497c478bd9Sstevel@tonic-gate 	if (rval->rcv_privilege != RCPRIV_BASIC &&
1507c478bd9Sstevel@tonic-gate 	    rval->rcv_privilege != RCPRIV_PRIVILEGED &&
1517c478bd9Sstevel@tonic-gate 	    rval->rcv_privilege != RCPRIV_SYSTEM)
1527c478bd9Sstevel@tonic-gate 		return (1);
1537c478bd9Sstevel@tonic-gate 
1547c478bd9Sstevel@tonic-gate 	if (rval->rcv_flagaction & ~RCTL_LOCAL_MASK)
1557c478bd9Sstevel@tonic-gate 		return (1);
1567c478bd9Sstevel@tonic-gate 
1577c478bd9Sstevel@tonic-gate 	if (rval->rcv_privilege == RCPRIV_BASIC &&
1587c478bd9Sstevel@tonic-gate 	    (rde->rcd_flagaction & RCTL_GLOBAL_NOBASIC) != 0)
1597c478bd9Sstevel@tonic-gate 		return (1);
1607c478bd9Sstevel@tonic-gate 
1617c478bd9Sstevel@tonic-gate 	if ((rval->rcv_flagaction & RCTL_LOCAL_DENY) == 0 &&
1627c478bd9Sstevel@tonic-gate 	    (rde->rcd_flagaction & RCTL_GLOBAL_DENY_ALWAYS) != 0)
1637c478bd9Sstevel@tonic-gate 		return (1);
1647c478bd9Sstevel@tonic-gate 
1657c478bd9Sstevel@tonic-gate 	if ((rval->rcv_flagaction & RCTL_LOCAL_DENY) &&
1667c478bd9Sstevel@tonic-gate 	    (rde->rcd_flagaction & RCTL_GLOBAL_DENY_NEVER))
1677c478bd9Sstevel@tonic-gate 		return (1);
1687c478bd9Sstevel@tonic-gate 
1697c478bd9Sstevel@tonic-gate 	if ((rval->rcv_flagaction & RCTL_LOCAL_SIGNAL) &&
1707c478bd9Sstevel@tonic-gate 	    (rde->rcd_flagaction & RCTL_GLOBAL_SIGNAL_NEVER))
1717c478bd9Sstevel@tonic-gate 		return (1);
1727c478bd9Sstevel@tonic-gate 
1737c478bd9Sstevel@tonic-gate 	if ((rval->rcv_flagaction & RCTL_LOCAL_SIGNAL) &&
1747c478bd9Sstevel@tonic-gate 	    rval->rcv_action_signal == 0)
1757c478bd9Sstevel@tonic-gate 		return (1);
1767c478bd9Sstevel@tonic-gate 
1777c478bd9Sstevel@tonic-gate 	if (rval->rcv_action_signal == SIGXCPU &&
1787c478bd9Sstevel@tonic-gate 	    (rde->rcd_flagaction & RCTL_GLOBAL_CPU_TIME) == 0)
1797c478bd9Sstevel@tonic-gate 		return (1);
1807c478bd9Sstevel@tonic-gate 	else if (rval->rcv_action_signal == SIGXFSZ &&
1817c478bd9Sstevel@tonic-gate 	    (rde->rcd_flagaction & RCTL_GLOBAL_FILE_SIZE) == 0)
1827c478bd9Sstevel@tonic-gate 		return (1);
1837c478bd9Sstevel@tonic-gate 	else if (rval->rcv_action_signal != SIGHUP &&
1847c478bd9Sstevel@tonic-gate 	    rval->rcv_action_signal != SIGABRT &&
1857c478bd9Sstevel@tonic-gate 	    rval->rcv_action_signal != SIGKILL &&
1867c478bd9Sstevel@tonic-gate 	    rval->rcv_action_signal != SIGTERM &&
1877c478bd9Sstevel@tonic-gate 	    rval->rcv_action_signal != SIGSTOP &&
1887c478bd9Sstevel@tonic-gate 	    rval->rcv_action_signal != SIGXCPU &&
1897c478bd9Sstevel@tonic-gate 	    rval->rcv_action_signal != SIGXFSZ &&
1907c478bd9Sstevel@tonic-gate 	    rval->rcv_action_signal != SIGXRES &&
1917c478bd9Sstevel@tonic-gate 	    rval->rcv_action_signal != 0)	/* That is, no signal is ok. */
1927c478bd9Sstevel@tonic-gate 		return (1);
1937c478bd9Sstevel@tonic-gate 
1947c478bd9Sstevel@tonic-gate 	sys_rval = rde->rcd_default_value;
1957c478bd9Sstevel@tonic-gate 	while (sys_rval->rcv_privilege != RCPRIV_SYSTEM)
1967c478bd9Sstevel@tonic-gate 		sys_rval = sys_rval->rcv_next;
1977c478bd9Sstevel@tonic-gate 
1987c478bd9Sstevel@tonic-gate 	if (rval->rcv_value > sys_rval->rcv_value)
1997c478bd9Sstevel@tonic-gate 		return (1);
2007c478bd9Sstevel@tonic-gate 
2017c478bd9Sstevel@tonic-gate 	return (0);
2027c478bd9Sstevel@tonic-gate }
2037c478bd9Sstevel@tonic-gate 
2047c478bd9Sstevel@tonic-gate /*
2057c478bd9Sstevel@tonic-gate  * static long rctlsys_get(char *name, rctl_opaque_t *old_rblk,
2067c478bd9Sstevel@tonic-gate  *   rctl_opaque_t *new_rblk, int flags)
2077c478bd9Sstevel@tonic-gate  *
2087c478bd9Sstevel@tonic-gate  * Overview
2097c478bd9Sstevel@tonic-gate  *   rctlsys_get() is the implementation of the core logic of getrctl(2), the
2107c478bd9Sstevel@tonic-gate  *   public system call for fetching resource control values.  Two mutually
2117c478bd9Sstevel@tonic-gate  *   exclusive flag values are supported:  RCTL_FIRST and RCTL_NEXT.  When
2127c478bd9Sstevel@tonic-gate  *   RCTL_FIRST is presented, the value of old_rblk is ignored, and the first
2137c478bd9Sstevel@tonic-gate  *   value in the resource control value sequence for the named control is
2147c478bd9Sstevel@tonic-gate  *   transformed and placed in the user memory location at new_rblk.  In the
2157c478bd9Sstevel@tonic-gate  *   RCTL_NEXT case, the value of old_rblk is examined, and the next value in
2167c478bd9Sstevel@tonic-gate  *   the sequence is transformed and placed at new_rblk.
2177c478bd9Sstevel@tonic-gate  */
2187c478bd9Sstevel@tonic-gate static long
2197c478bd9Sstevel@tonic-gate rctlsys_get(char *name, rctl_opaque_t *old_rblk, rctl_opaque_t *new_rblk,
2207c478bd9Sstevel@tonic-gate     int flags)
2217c478bd9Sstevel@tonic-gate {
2227c478bd9Sstevel@tonic-gate 	rctl_val_t *nval;
2237c478bd9Sstevel@tonic-gate 	rctl_opaque_t *nblk;
2247c478bd9Sstevel@tonic-gate 	rctl_hndl_t hndl;
2257c478bd9Sstevel@tonic-gate 	char *kname;
2267c478bd9Sstevel@tonic-gate 	size_t klen;
2277c478bd9Sstevel@tonic-gate 	rctl_dict_entry_t *krde;
2287c478bd9Sstevel@tonic-gate 	int ret;
2297c478bd9Sstevel@tonic-gate 	int action = flags & (~RCTLSYS_ACTION_MASK);
2307c478bd9Sstevel@tonic-gate 
2317c478bd9Sstevel@tonic-gate 	if (flags & (~RCTLSYS_MASK))
2327c478bd9Sstevel@tonic-gate 		return (set_errno(EINVAL));
2337c478bd9Sstevel@tonic-gate 
2347c478bd9Sstevel@tonic-gate 	if (action != RCTL_FIRST && action != RCTL_NEXT &&
2357c478bd9Sstevel@tonic-gate 	    action != RCTL_USAGE)
2367c478bd9Sstevel@tonic-gate 		return (set_errno(EINVAL));
2377c478bd9Sstevel@tonic-gate 
2387c478bd9Sstevel@tonic-gate 	if (new_rblk == NULL || name == NULL)
2397c478bd9Sstevel@tonic-gate 		return (set_errno(EFAULT));
2407c478bd9Sstevel@tonic-gate 
2417c478bd9Sstevel@tonic-gate 	kname = kmem_alloc(MAXPATHLEN, KM_SLEEP);
2427c478bd9Sstevel@tonic-gate 	krde = kmem_alloc(sizeof (rctl_dict_entry_t), KM_SLEEP);
2437c478bd9Sstevel@tonic-gate 
2447c478bd9Sstevel@tonic-gate 	if (copyinstr(name, kname, MAXPATHLEN, &klen) != 0) {
2457c478bd9Sstevel@tonic-gate 		kmem_free(kname, MAXPATHLEN);
2467c478bd9Sstevel@tonic-gate 		kmem_free(krde, sizeof (rctl_dict_entry_t));
2477c478bd9Sstevel@tonic-gate 		return (set_errno(EFAULT));
2487c478bd9Sstevel@tonic-gate 	}
2497c478bd9Sstevel@tonic-gate 
2507c478bd9Sstevel@tonic-gate 	if ((hndl = rctl_hndl_lookup(kname)) == -1) {
2517c478bd9Sstevel@tonic-gate 		kmem_free(kname, MAXPATHLEN);
2527c478bd9Sstevel@tonic-gate 		kmem_free(krde, sizeof (rctl_dict_entry_t));
2537c478bd9Sstevel@tonic-gate 		return (set_errno(EINVAL));
2547c478bd9Sstevel@tonic-gate 	}
2557c478bd9Sstevel@tonic-gate 
2567c478bd9Sstevel@tonic-gate 	if (rctl_global_get(kname, krde) == -1) {
2577c478bd9Sstevel@tonic-gate 		kmem_free(kname, MAXPATHLEN);
2587c478bd9Sstevel@tonic-gate 		kmem_free(krde, sizeof (rctl_dict_entry_t));
2597c478bd9Sstevel@tonic-gate 		return (set_errno(ESRCH));
2607c478bd9Sstevel@tonic-gate 	}
2617c478bd9Sstevel@tonic-gate 
2627c478bd9Sstevel@tonic-gate 	kmem_free(kname, MAXPATHLEN);
2637c478bd9Sstevel@tonic-gate 
2647c478bd9Sstevel@tonic-gate 	nval = kmem_cache_alloc(rctl_val_cache, KM_SLEEP);
2657c478bd9Sstevel@tonic-gate 
2667c478bd9Sstevel@tonic-gate 	if (action == RCTL_USAGE) {
2677c478bd9Sstevel@tonic-gate 		kmem_cache_free(rctl_val_cache, nval);
2687c478bd9Sstevel@tonic-gate 		kmem_free(krde, sizeof (rctl_dict_entry_t));
2697c478bd9Sstevel@tonic-gate 		return (set_errno(ENOTSUP));
2707c478bd9Sstevel@tonic-gate 	} else if (action == RCTL_FIRST) {
2717c478bd9Sstevel@tonic-gate 
2727c478bd9Sstevel@tonic-gate 		mutex_enter(&curproc->p_lock);
2737c478bd9Sstevel@tonic-gate 		if (ret = rctl_local_get(hndl, NULL, nval, curproc)) {
2747c478bd9Sstevel@tonic-gate 			mutex_exit(&curproc->p_lock);
2757c478bd9Sstevel@tonic-gate 			kmem_cache_free(rctl_val_cache, nval);
2767c478bd9Sstevel@tonic-gate 			kmem_free(krde, sizeof (rctl_dict_entry_t));
2777c478bd9Sstevel@tonic-gate 			return (set_errno(ret));
2787c478bd9Sstevel@tonic-gate 		}
2797c478bd9Sstevel@tonic-gate 		mutex_exit(&curproc->p_lock);
2807c478bd9Sstevel@tonic-gate 	} else {
2817c478bd9Sstevel@tonic-gate 		/*
2827c478bd9Sstevel@tonic-gate 		 * RCTL_NEXT
2837c478bd9Sstevel@tonic-gate 		 */
2847c478bd9Sstevel@tonic-gate 		rctl_val_t *oval;
2857c478bd9Sstevel@tonic-gate 		rctl_opaque_t *oblk;
2867c478bd9Sstevel@tonic-gate 
2877c478bd9Sstevel@tonic-gate 		oblk = kmem_alloc(sizeof (rctl_opaque_t), KM_SLEEP);
2887c478bd9Sstevel@tonic-gate 
2897c478bd9Sstevel@tonic-gate 		if (copyin(old_rblk, oblk, sizeof (rctl_opaque_t)) == -1) {
2907c478bd9Sstevel@tonic-gate 			kmem_cache_free(rctl_val_cache, nval);
2917c478bd9Sstevel@tonic-gate 			kmem_free(oblk, sizeof (rctl_opaque_t));
2927c478bd9Sstevel@tonic-gate 			kmem_free(krde, sizeof (rctl_dict_entry_t));
2937c478bd9Sstevel@tonic-gate 			return (set_errno(EFAULT));
2947c478bd9Sstevel@tonic-gate 		}
2957c478bd9Sstevel@tonic-gate 
2967c478bd9Sstevel@tonic-gate 		oval = kmem_cache_alloc(rctl_val_cache, KM_SLEEP);
2977c478bd9Sstevel@tonic-gate 
2987c478bd9Sstevel@tonic-gate 		rctlsys_rblk_xfrm(oblk, NULL, oval, RBX_FROM_BLK | RBX_VAL);
2997c478bd9Sstevel@tonic-gate 		mutex_enter(&curproc->p_lock);
3007c478bd9Sstevel@tonic-gate 		ret = rctl_local_get(hndl, oval, nval, curproc);
3017c478bd9Sstevel@tonic-gate 		mutex_exit(&curproc->p_lock);
3027c478bd9Sstevel@tonic-gate 
3037c478bd9Sstevel@tonic-gate 		kmem_cache_free(rctl_val_cache, oval);
3047c478bd9Sstevel@tonic-gate 		kmem_free(oblk, sizeof (rctl_opaque_t));
3057c478bd9Sstevel@tonic-gate 
3067c478bd9Sstevel@tonic-gate 		if (ret != 0) {
3077c478bd9Sstevel@tonic-gate 			kmem_cache_free(rctl_val_cache, nval);
3087c478bd9Sstevel@tonic-gate 			kmem_free(krde, sizeof (rctl_dict_entry_t));
3097c478bd9Sstevel@tonic-gate 			return (set_errno(ret));
3107c478bd9Sstevel@tonic-gate 		}
3117c478bd9Sstevel@tonic-gate 	}
3127c478bd9Sstevel@tonic-gate 
3137c478bd9Sstevel@tonic-gate 	nblk = kmem_alloc(sizeof (rctl_opaque_t), KM_SLEEP);
3147c478bd9Sstevel@tonic-gate 
3157c478bd9Sstevel@tonic-gate 	rctlsys_rblk_xfrm(nblk, krde, nval, RBX_TO_BLK | RBX_VAL | RBX_CTL);
3167c478bd9Sstevel@tonic-gate 
3177c478bd9Sstevel@tonic-gate 	kmem_free(krde, sizeof (rctl_dict_entry_t));
3187c478bd9Sstevel@tonic-gate 	kmem_cache_free(rctl_val_cache, nval);
3197c478bd9Sstevel@tonic-gate 
3207c478bd9Sstevel@tonic-gate 	if (copyout(nblk, new_rblk, sizeof (rctl_opaque_t)) == -1) {
3217c478bd9Sstevel@tonic-gate 		kmem_free(nblk, sizeof (rctl_opaque_t));
3227c478bd9Sstevel@tonic-gate 		return (set_errno(EFAULT));
3237c478bd9Sstevel@tonic-gate 	}
3247c478bd9Sstevel@tonic-gate 
3257c478bd9Sstevel@tonic-gate 	kmem_free(nblk, sizeof (rctl_opaque_t));
3267c478bd9Sstevel@tonic-gate 
3277c478bd9Sstevel@tonic-gate 	return (0);
3287c478bd9Sstevel@tonic-gate }
3297c478bd9Sstevel@tonic-gate 
3307c478bd9Sstevel@tonic-gate /*
3317c478bd9Sstevel@tonic-gate  * static long rctlsys_set(char *name, rctl_opaque_t *old_rblk,
3327c478bd9Sstevel@tonic-gate  *   rctl_opaque_t *new_rblk, int flags)
3337c478bd9Sstevel@tonic-gate  *
3347c478bd9Sstevel@tonic-gate  * Overview
3357c478bd9Sstevel@tonic-gate  *   rctlsys_set() is the implementation of the core login of setrctl(2), which
3367c478bd9Sstevel@tonic-gate  *   allows the establishment of resource control values.  Flags may take on any
3377c478bd9Sstevel@tonic-gate  *   of three exclusive values:  RCTL_INSERT, RCTL_DELETE, and RCTL_REPLACE.
3387c478bd9Sstevel@tonic-gate  *   RCTL_INSERT ignores old_rblk and inserts the value in the appropriate
3397c478bd9Sstevel@tonic-gate  *   position in the ordered sequence of resource control values.  RCTL_DELETE
3407c478bd9Sstevel@tonic-gate  *   ignores old_rblk and deletes the first resource control value matching
3417c478bd9Sstevel@tonic-gate  *   (value, priority) in the given resource block.  If no matching value is
3427c478bd9Sstevel@tonic-gate  *   found, -1 is returned and errno is set to ENOENT.  Finally, in the case of
3437c478bd9Sstevel@tonic-gate  *   RCTL_REPLACE, old_rblk is used to match (value, priority); the matching
3447c478bd9Sstevel@tonic-gate  *   resource control value in the sequence is replaced with the contents of
3457c478bd9Sstevel@tonic-gate  *   new_rblk.  Again, if no match is found, -1 is returned and errno is set to
3467c478bd9Sstevel@tonic-gate  *   ENOENT.
3477c478bd9Sstevel@tonic-gate  *
3487c478bd9Sstevel@tonic-gate  *   rctlsys_set() causes a cursor test, which can reactivate resource controls
3497c478bd9Sstevel@tonic-gate  *   that have previously fired.
3507c478bd9Sstevel@tonic-gate  */
3517c478bd9Sstevel@tonic-gate static long
3527c478bd9Sstevel@tonic-gate rctlsys_set(char *name, rctl_opaque_t *old_rblk, rctl_opaque_t *new_rblk,
3537c478bd9Sstevel@tonic-gate     int flags)
3547c478bd9Sstevel@tonic-gate {
3557c478bd9Sstevel@tonic-gate 	rctl_val_t *nval;
3567c478bd9Sstevel@tonic-gate 	rctl_dict_entry_t *rde;
3577c478bd9Sstevel@tonic-gate 	rctl_opaque_t *nblk;
3587c478bd9Sstevel@tonic-gate 	rctl_hndl_t hndl;
3597c478bd9Sstevel@tonic-gate 	char *kname;
3607c478bd9Sstevel@tonic-gate 	size_t klen;
3617c478bd9Sstevel@tonic-gate 	long ret = 0;
3627c478bd9Sstevel@tonic-gate 	proc_t *pp = NULL;
3637c478bd9Sstevel@tonic-gate 	pid_t pid;
3647c478bd9Sstevel@tonic-gate 	int action = flags & (~RCTLSYS_ACTION_MASK);
3657c478bd9Sstevel@tonic-gate 	rctl_val_t *oval;
3667c478bd9Sstevel@tonic-gate 	rctl_val_t *rval1;
3677c478bd9Sstevel@tonic-gate 	rctl_val_t *rval2;
3687c478bd9Sstevel@tonic-gate 	rctl_val_t *tval;
3697c478bd9Sstevel@tonic-gate 	rctl_opaque_t *oblk;
3707c478bd9Sstevel@tonic-gate 
3717c478bd9Sstevel@tonic-gate 	if (flags & (~RCTLSYS_MASK))
3727c478bd9Sstevel@tonic-gate 		return (set_errno(EINVAL));
3737c478bd9Sstevel@tonic-gate 
3747c478bd9Sstevel@tonic-gate 	if (action != RCTL_INSERT &&
3757c478bd9Sstevel@tonic-gate 	    action != RCTL_DELETE &&
3767c478bd9Sstevel@tonic-gate 	    action != RCTL_REPLACE)
3777c478bd9Sstevel@tonic-gate 		return (set_errno(EINVAL));
3787c478bd9Sstevel@tonic-gate 
3797c478bd9Sstevel@tonic-gate 	if (new_rblk == NULL || name == NULL)
3807c478bd9Sstevel@tonic-gate 		return (set_errno(EFAULT));
3817c478bd9Sstevel@tonic-gate 
3827c478bd9Sstevel@tonic-gate 	kname = kmem_alloc(MAXPATHLEN, KM_SLEEP);
3837c478bd9Sstevel@tonic-gate 	if (copyinstr(name, kname, MAXPATHLEN, &klen) != 0) {
3847c478bd9Sstevel@tonic-gate 		kmem_free(kname, MAXPATHLEN);
3857c478bd9Sstevel@tonic-gate 		return (set_errno(EFAULT));
3867c478bd9Sstevel@tonic-gate 	}
3877c478bd9Sstevel@tonic-gate 
3887c478bd9Sstevel@tonic-gate 	if ((hndl = rctl_hndl_lookup(kname)) == -1) {
3897c478bd9Sstevel@tonic-gate 		kmem_free(kname, MAXPATHLEN);
3907c478bd9Sstevel@tonic-gate 		return (set_errno(EINVAL));
3917c478bd9Sstevel@tonic-gate 	}
3927c478bd9Sstevel@tonic-gate 
3937c478bd9Sstevel@tonic-gate 	kmem_free(kname, MAXPATHLEN);
3947c478bd9Sstevel@tonic-gate 
3957c478bd9Sstevel@tonic-gate 	rde = rctl_dict_lookup_hndl(hndl);
3967c478bd9Sstevel@tonic-gate 
3977c478bd9Sstevel@tonic-gate 	nblk = kmem_alloc(sizeof (rctl_opaque_t), KM_SLEEP);
3987c478bd9Sstevel@tonic-gate 
3997c478bd9Sstevel@tonic-gate 	if (copyin(new_rblk, nblk, sizeof (rctl_opaque_t)) == -1) {
4007c478bd9Sstevel@tonic-gate 		kmem_free(nblk, sizeof (rctl_opaque_t));
4017c478bd9Sstevel@tonic-gate 		return (set_errno(EFAULT));
4027c478bd9Sstevel@tonic-gate 	}
4037c478bd9Sstevel@tonic-gate 
4047c478bd9Sstevel@tonic-gate 	nval = kmem_cache_alloc(rctl_val_cache, KM_SLEEP);
4057c478bd9Sstevel@tonic-gate 
4067c478bd9Sstevel@tonic-gate 	rctlsys_rblk_xfrm(nblk, NULL, nval, RBX_FROM_BLK | RBX_VAL);
4077c478bd9Sstevel@tonic-gate 
4087c478bd9Sstevel@tonic-gate 	if (rctl_invalid_value(rde, nval)) {
4097c478bd9Sstevel@tonic-gate 		kmem_free(nblk, sizeof (rctl_opaque_t));
4107c478bd9Sstevel@tonic-gate 		kmem_cache_free(rctl_val_cache, nval);
4117c478bd9Sstevel@tonic-gate 		return (set_errno(EINVAL));
4127c478bd9Sstevel@tonic-gate 	}
4137c478bd9Sstevel@tonic-gate 
4147c478bd9Sstevel@tonic-gate 	/* allocate what we might need before potentially grabbing p_lock */
4157c478bd9Sstevel@tonic-gate 	oblk = kmem_alloc(sizeof (rctl_opaque_t), KM_SLEEP);
4167c478bd9Sstevel@tonic-gate 	oval = kmem_cache_alloc(rctl_val_cache, KM_SLEEP);
4177c478bd9Sstevel@tonic-gate 	rval1 = kmem_cache_alloc(rctl_val_cache, KM_SLEEP);
4187c478bd9Sstevel@tonic-gate 	rval2 = kmem_cache_alloc(rctl_val_cache, KM_SLEEP);
4197c478bd9Sstevel@tonic-gate 
4207c478bd9Sstevel@tonic-gate 	if (nval->rcv_privilege == RCPRIV_BASIC) {
4217c478bd9Sstevel@tonic-gate 		if (flags & RCTL_USE_RECIPIENT_PID) {
4227c478bd9Sstevel@tonic-gate 			pid = nval->rcv_action_recip_pid;
4237c478bd9Sstevel@tonic-gate 
4247c478bd9Sstevel@tonic-gate 			/* case for manipulating rctl values on other procs */
4257c478bd9Sstevel@tonic-gate 			if (pid != curproc->p_pid) {
4267c478bd9Sstevel@tonic-gate 				/* cannot be other pid on process rctls */
4277c478bd9Sstevel@tonic-gate 				if (rde->rcd_entity == RCENTITY_PROCESS) {
4287c478bd9Sstevel@tonic-gate 					ret = set_errno(EINVAL);
4297c478bd9Sstevel@tonic-gate 					goto rctlsys_out;
4307c478bd9Sstevel@tonic-gate 				}
4317c478bd9Sstevel@tonic-gate 				/*
4327c478bd9Sstevel@tonic-gate 				 * must have privilege to manipulate controls
4337c478bd9Sstevel@tonic-gate 				 * on other processes
4347c478bd9Sstevel@tonic-gate 				 */
4357c478bd9Sstevel@tonic-gate 				if (secpolicy_rctlsys(CRED(), B_FALSE) != 0) {
4367c478bd9Sstevel@tonic-gate 					ret = set_errno(EACCES);
4377c478bd9Sstevel@tonic-gate 					goto rctlsys_out;
4387c478bd9Sstevel@tonic-gate 				}
4397c478bd9Sstevel@tonic-gate 
4407c478bd9Sstevel@tonic-gate 				pid = nval->rcv_action_recip_pid;
4417c478bd9Sstevel@tonic-gate 				mutex_enter(&pidlock);
4427c478bd9Sstevel@tonic-gate 				pp = prfind(pid);
4437c478bd9Sstevel@tonic-gate 				if (!pp) {
4447c478bd9Sstevel@tonic-gate 					mutex_exit(&pidlock);
4457c478bd9Sstevel@tonic-gate 					ret = set_errno(ESRCH);
4467c478bd9Sstevel@tonic-gate 					goto rctlsys_out;
4477c478bd9Sstevel@tonic-gate 				}
4487c478bd9Sstevel@tonic-gate 
4497c478bd9Sstevel@tonic-gate 				/*
4507c478bd9Sstevel@tonic-gate 				 * idle or zombie procs have either not yet
4517c478bd9Sstevel@tonic-gate 				 * set up their rctls or have already done
4527c478bd9Sstevel@tonic-gate 				 * their rctl_set_tearoff's.
4537c478bd9Sstevel@tonic-gate 				 */
4547c478bd9Sstevel@tonic-gate 				if (pp->p_stat == SZOMB ||
4557c478bd9Sstevel@tonic-gate 				    pp->p_stat == SIDL) {
4567c478bd9Sstevel@tonic-gate 					mutex_exit(&pidlock);
4577c478bd9Sstevel@tonic-gate 					ret = set_errno(ESRCH);
4587c478bd9Sstevel@tonic-gate 					goto rctlsys_out;
4597c478bd9Sstevel@tonic-gate 				}
4607c478bd9Sstevel@tonic-gate 
4617c478bd9Sstevel@tonic-gate 				/*
4627c478bd9Sstevel@tonic-gate 				 * hold this pp's p_lock to ensure that
4637c478bd9Sstevel@tonic-gate 				 * it does not do it's rctl_set_tearoff
4647c478bd9Sstevel@tonic-gate 				 * If we did not do this, we could
4657c478bd9Sstevel@tonic-gate 				 * potentially add rctls to the entity
4667c478bd9Sstevel@tonic-gate 				 * with a recipient that is a process
4677c478bd9Sstevel@tonic-gate 				 * that has exited.
4687c478bd9Sstevel@tonic-gate 				 */
4697c478bd9Sstevel@tonic-gate 				mutex_enter(&pp->p_lock);
4707c478bd9Sstevel@tonic-gate 				mutex_exit(&pidlock);
4717c478bd9Sstevel@tonic-gate 
4727c478bd9Sstevel@tonic-gate 				/*
4737c478bd9Sstevel@tonic-gate 				 * We know that curproc's task, project,
4747c478bd9Sstevel@tonic-gate 				 * and zone pointers will not change
4757c478bd9Sstevel@tonic-gate 				 * because functions that change them
4767c478bd9Sstevel@tonic-gate 				 * call holdlwps(SHOLDFORK1) first.
4777c478bd9Sstevel@tonic-gate 				 */
4787c478bd9Sstevel@tonic-gate 
4797c478bd9Sstevel@tonic-gate 				/*
4807c478bd9Sstevel@tonic-gate 				 * verify that the found pp is in the
4817c478bd9Sstevel@tonic-gate 				 * current task.  If it is, then it
4827c478bd9Sstevel@tonic-gate 				 * is also within the current project
4837c478bd9Sstevel@tonic-gate 				 * and zone.
4847c478bd9Sstevel@tonic-gate 				 */
4857c478bd9Sstevel@tonic-gate 				if (rde->rcd_entity == RCENTITY_TASK &&
4867c478bd9Sstevel@tonic-gate 				    pp->p_task != curproc->p_task) {
4877c478bd9Sstevel@tonic-gate 					ret = set_errno(ESRCH);
4887c478bd9Sstevel@tonic-gate 					goto rctlsys_out;
4897c478bd9Sstevel@tonic-gate 				}
4907c478bd9Sstevel@tonic-gate 
4917c478bd9Sstevel@tonic-gate 				ASSERT(pp->p_task->tk_proj ==
4927c478bd9Sstevel@tonic-gate 				    curproc->p_task->tk_proj);
4937c478bd9Sstevel@tonic-gate 				ASSERT(pp->p_zone == curproc->p_zone);
4947c478bd9Sstevel@tonic-gate 
4957c478bd9Sstevel@tonic-gate 
4967c478bd9Sstevel@tonic-gate 				nval->rcv_action_recipient = pp;
4977c478bd9Sstevel@tonic-gate 				nval->rcv_action_recip_pid = pid;
4987c478bd9Sstevel@tonic-gate 
4997c478bd9Sstevel@tonic-gate 			} else {
5007c478bd9Sstevel@tonic-gate 				/* for manipulating rctl values on this proc */
5017c478bd9Sstevel@tonic-gate 				mutex_enter(&curproc->p_lock);
5027c478bd9Sstevel@tonic-gate 				pp = curproc;
5037c478bd9Sstevel@tonic-gate 				nval->rcv_action_recipient = curproc;
5047c478bd9Sstevel@tonic-gate 				nval->rcv_action_recip_pid = curproc->p_pid;
5057c478bd9Sstevel@tonic-gate 			}
5067c478bd9Sstevel@tonic-gate 
5077c478bd9Sstevel@tonic-gate 		} else {
5087c478bd9Sstevel@tonic-gate 			/* RCTL_USE_RECIPIENT_PID not set, use this proc */
5097c478bd9Sstevel@tonic-gate 			mutex_enter(&curproc->p_lock);
5107c478bd9Sstevel@tonic-gate 			pp = curproc;
5117c478bd9Sstevel@tonic-gate 			nval->rcv_action_recipient = curproc;
5127c478bd9Sstevel@tonic-gate 			nval->rcv_action_recip_pid = curproc->p_pid;
5137c478bd9Sstevel@tonic-gate 		}
5147c478bd9Sstevel@tonic-gate 
5157c478bd9Sstevel@tonic-gate 	} else {
5167c478bd9Sstevel@tonic-gate 		/* privileged controls have no recipient pid */
5177c478bd9Sstevel@tonic-gate 		mutex_enter(&curproc->p_lock);
5187c478bd9Sstevel@tonic-gate 		pp = curproc;
5197c478bd9Sstevel@tonic-gate 		nval->rcv_action_recipient = NULL;
5207c478bd9Sstevel@tonic-gate 		nval->rcv_action_recip_pid = -1;
5217c478bd9Sstevel@tonic-gate 	}
5227c478bd9Sstevel@tonic-gate 
5237c478bd9Sstevel@tonic-gate 	nval->rcv_firing_time = 0;
5247c478bd9Sstevel@tonic-gate 
5257c478bd9Sstevel@tonic-gate 	if (action == RCTL_REPLACE) {
5267c478bd9Sstevel@tonic-gate 
5277c478bd9Sstevel@tonic-gate 		if (copyin(old_rblk, oblk, sizeof (rctl_opaque_t)) == -1) {
5287c478bd9Sstevel@tonic-gate 			ret = set_errno(EFAULT);
5297c478bd9Sstevel@tonic-gate 			goto rctlsys_out;
5307c478bd9Sstevel@tonic-gate 		}
5317c478bd9Sstevel@tonic-gate 
5327c478bd9Sstevel@tonic-gate 		rctlsys_rblk_xfrm(oblk, NULL, oval, RBX_FROM_BLK | RBX_VAL);
5337c478bd9Sstevel@tonic-gate 
5347c478bd9Sstevel@tonic-gate 		if (rctl_invalid_value(rde, oval)) {
5357c478bd9Sstevel@tonic-gate 			ret = set_errno(EINVAL);
5367c478bd9Sstevel@tonic-gate 			goto rctlsys_out;
5377c478bd9Sstevel@tonic-gate 		}
5387c478bd9Sstevel@tonic-gate 
5397c478bd9Sstevel@tonic-gate 		if (oval->rcv_privilege == RCPRIV_BASIC) {
5407c478bd9Sstevel@tonic-gate 			if (!(flags & RCTL_USE_RECIPIENT_PID)) {
5417c478bd9Sstevel@tonic-gate 				oval->rcv_action_recipient = curproc;
5427c478bd9Sstevel@tonic-gate 				oval->rcv_action_recip_pid = curproc->p_pid;
5437c478bd9Sstevel@tonic-gate 			}
5447c478bd9Sstevel@tonic-gate 		} else {
5457c478bd9Sstevel@tonic-gate 			oval->rcv_action_recipient = NULL;
5467c478bd9Sstevel@tonic-gate 			oval->rcv_action_recip_pid = -1;
5477c478bd9Sstevel@tonic-gate 		}
5487c478bd9Sstevel@tonic-gate 
5497c478bd9Sstevel@tonic-gate 		/*
5507c478bd9Sstevel@tonic-gate 		 * Find the real value we're attempting to replace on the
5517c478bd9Sstevel@tonic-gate 		 * sequence, rather than trusting the one delivered from
5527c478bd9Sstevel@tonic-gate 		 * userland.
5537c478bd9Sstevel@tonic-gate 		 */
5547c478bd9Sstevel@tonic-gate 		if (ret = rctl_local_get(hndl, NULL, rval1, pp)) {
5557c478bd9Sstevel@tonic-gate 			(void) set_errno(ret);
5567c478bd9Sstevel@tonic-gate 			goto rctlsys_out;
5577c478bd9Sstevel@tonic-gate 		}
5587c478bd9Sstevel@tonic-gate 
5597c478bd9Sstevel@tonic-gate 		do {
5607c478bd9Sstevel@tonic-gate 			if (rval1->rcv_privilege == RCPRIV_SYSTEM ||
5617c478bd9Sstevel@tonic-gate 			    rctl_val_cmp(oval, rval1, 0) == 0)
5627c478bd9Sstevel@tonic-gate 				break;
5637c478bd9Sstevel@tonic-gate 
5647c478bd9Sstevel@tonic-gate 			tval = rval1;
5657c478bd9Sstevel@tonic-gate 			rval1 = rval2;
5667c478bd9Sstevel@tonic-gate 			rval2 = tval;
5677c478bd9Sstevel@tonic-gate 		} while (rctl_local_get(hndl, rval2, rval1, pp) == 0);
5687c478bd9Sstevel@tonic-gate 
5697c478bd9Sstevel@tonic-gate 		if (rval1->rcv_privilege == RCPRIV_SYSTEM) {
5707c478bd9Sstevel@tonic-gate 			if (rctl_val_cmp(oval, rval1, 1) == 0)
5717c478bd9Sstevel@tonic-gate 				ret = set_errno(EPERM);
5727c478bd9Sstevel@tonic-gate 			else
5737c478bd9Sstevel@tonic-gate 				ret = set_errno(ESRCH);
5747c478bd9Sstevel@tonic-gate 
5757c478bd9Sstevel@tonic-gate 			goto rctlsys_out;
5767c478bd9Sstevel@tonic-gate 		}
5777c478bd9Sstevel@tonic-gate 
5787c478bd9Sstevel@tonic-gate 		bcopy(rval1, oval, sizeof (rctl_val_t));
5797c478bd9Sstevel@tonic-gate 
5807c478bd9Sstevel@tonic-gate 		/*
5817c478bd9Sstevel@tonic-gate 		 * System controls are immutable.
5827c478bd9Sstevel@tonic-gate 		 */
5837c478bd9Sstevel@tonic-gate 		if (nval->rcv_privilege == RCPRIV_SYSTEM) {
5847c478bd9Sstevel@tonic-gate 			ret = set_errno(EPERM);
5857c478bd9Sstevel@tonic-gate 			goto rctlsys_out;
5867c478bd9Sstevel@tonic-gate 		}
5877c478bd9Sstevel@tonic-gate 
5887c478bd9Sstevel@tonic-gate 		/*
5897c478bd9Sstevel@tonic-gate 		 * Only privileged processes in the global zone can modify
5907c478bd9Sstevel@tonic-gate 		 * privileged rctls of type RCENTITY_ZONE; replacing privileged
5917c478bd9Sstevel@tonic-gate 		 * controls with basic ones are not allowed either.  Lowering a
5927c478bd9Sstevel@tonic-gate 		 * lowerable one might be OK for privileged processes in a
5937c478bd9Sstevel@tonic-gate 		 * non-global zone, but lowerable rctls probably don't make
5947c478bd9Sstevel@tonic-gate 		 * sense for zones (hence, not modifiable from within a zone).
5957c478bd9Sstevel@tonic-gate 		 */
5967c478bd9Sstevel@tonic-gate 		if (rde->rcd_entity == RCENTITY_ZONE &&
5977c478bd9Sstevel@tonic-gate 		    (nval->rcv_privilege == RCPRIV_PRIVILEGED ||
5987c478bd9Sstevel@tonic-gate 		    oval->rcv_privilege == RCPRIV_PRIVILEGED) &&
5997c478bd9Sstevel@tonic-gate 		    secpolicy_rctlsys(CRED(), B_TRUE) != 0) {
6007c478bd9Sstevel@tonic-gate 			ret = set_errno(EACCES);
6017c478bd9Sstevel@tonic-gate 			goto rctlsys_out;
6027c478bd9Sstevel@tonic-gate 		}
6037c478bd9Sstevel@tonic-gate 
6047c478bd9Sstevel@tonic-gate 		/*
6057c478bd9Sstevel@tonic-gate 		 * Must be privileged to replace a privileged control with
6067c478bd9Sstevel@tonic-gate 		 * a basic one.
6077c478bd9Sstevel@tonic-gate 		 */
6087c478bd9Sstevel@tonic-gate 		if (oval->rcv_privilege == RCPRIV_PRIVILEGED &&
6097c478bd9Sstevel@tonic-gate 		    nval->rcv_privilege != RCPRIV_PRIVILEGED &&
6107c478bd9Sstevel@tonic-gate 		    secpolicy_rctlsys(CRED(), B_FALSE) != 0) {
6117c478bd9Sstevel@tonic-gate 			ret = set_errno(EACCES);
6127c478bd9Sstevel@tonic-gate 			goto rctlsys_out;
6137c478bd9Sstevel@tonic-gate 		}
6147c478bd9Sstevel@tonic-gate 
6157c478bd9Sstevel@tonic-gate 		/*
6167c478bd9Sstevel@tonic-gate 		 * Must have lowerable global property for non-privileged
6177c478bd9Sstevel@tonic-gate 		 * to lower the value of a privileged control; otherwise must
6187c478bd9Sstevel@tonic-gate 		 * have sufficient privileges to modify privileged controls
6197c478bd9Sstevel@tonic-gate 		 * at all.
6207c478bd9Sstevel@tonic-gate 		 */
6217c478bd9Sstevel@tonic-gate 		if (oval->rcv_privilege == RCPRIV_PRIVILEGED &&
6227c478bd9Sstevel@tonic-gate 		    nval->rcv_privilege == RCPRIV_PRIVILEGED &&
6237c478bd9Sstevel@tonic-gate 		    ((((rde->rcd_flagaction & RCTL_GLOBAL_LOWERABLE) == 0) ||
6247c478bd9Sstevel@tonic-gate 		    oval->rcv_flagaction != nval->rcv_flagaction ||
6257c478bd9Sstevel@tonic-gate 		    oval->rcv_action_signal != nval->rcv_action_signal ||
6267c478bd9Sstevel@tonic-gate 		    oval->rcv_value < nval->rcv_value)) &&
6277c478bd9Sstevel@tonic-gate 		    secpolicy_rctlsys(CRED(), B_FALSE) != 0) {
6287c478bd9Sstevel@tonic-gate 			ret = set_errno(EACCES);
6297c478bd9Sstevel@tonic-gate 			goto rctlsys_out;
6307c478bd9Sstevel@tonic-gate 		}
6317c478bd9Sstevel@tonic-gate 
6327c478bd9Sstevel@tonic-gate 		if (ret = rctl_local_replace(hndl, oval, nval, pp)) {
6337c478bd9Sstevel@tonic-gate 			(void) set_errno(ret);
6347c478bd9Sstevel@tonic-gate 			goto rctlsys_out;
6357c478bd9Sstevel@tonic-gate 		}
6367c478bd9Sstevel@tonic-gate 
6377c478bd9Sstevel@tonic-gate 		/* ensure that nval is not freed */
6387c478bd9Sstevel@tonic-gate 		nval = NULL;
6397c478bd9Sstevel@tonic-gate 
6407c478bd9Sstevel@tonic-gate 	} else if (action == RCTL_INSERT) {
6417c478bd9Sstevel@tonic-gate 		/*
6427c478bd9Sstevel@tonic-gate 		 * System controls are immutable.
6437c478bd9Sstevel@tonic-gate 		 */
6447c478bd9Sstevel@tonic-gate 		if (nval->rcv_privilege == RCPRIV_SYSTEM) {
6457c478bd9Sstevel@tonic-gate 			ret = set_errno(EPERM);
6467c478bd9Sstevel@tonic-gate 			goto rctlsys_out;
6477c478bd9Sstevel@tonic-gate 		}
6487c478bd9Sstevel@tonic-gate 
6497c478bd9Sstevel@tonic-gate 		/*
6507c478bd9Sstevel@tonic-gate 		 * Only privileged processes in the global zone may add
6517c478bd9Sstevel@tonic-gate 		 * privileged zone.* rctls.  Only privileged processes
6527c478bd9Sstevel@tonic-gate 		 * may add other privileged rctls.
6537c478bd9Sstevel@tonic-gate 		 */
6547c478bd9Sstevel@tonic-gate 		if (nval->rcv_privilege == RCPRIV_PRIVILEGED) {
6557c478bd9Sstevel@tonic-gate 			if ((rde->rcd_entity == RCENTITY_ZONE &&
6567c478bd9Sstevel@tonic-gate 			    secpolicy_rctlsys(CRED(), B_TRUE) != 0) ||
6577c478bd9Sstevel@tonic-gate 			    (rde->rcd_entity != RCENTITY_ZONE &&
6587c478bd9Sstevel@tonic-gate 			    secpolicy_rctlsys(CRED(), B_FALSE) != 0)) {
6597c478bd9Sstevel@tonic-gate 				ret = set_errno(EACCES);
6607c478bd9Sstevel@tonic-gate 				goto rctlsys_out;
6617c478bd9Sstevel@tonic-gate 			}
6627c478bd9Sstevel@tonic-gate 		}
6637c478bd9Sstevel@tonic-gate 
6647c478bd9Sstevel@tonic-gate 		/*
6657c478bd9Sstevel@tonic-gate 		 * Only one basic control is allowed per rctl.
6667c478bd9Sstevel@tonic-gate 		 * If a basic control is being inserted, delete
6677c478bd9Sstevel@tonic-gate 		 * any other basic control.
6687c478bd9Sstevel@tonic-gate 		 */
6697c478bd9Sstevel@tonic-gate 		if ((nval->rcv_privilege == RCPRIV_BASIC) &&
6707c478bd9Sstevel@tonic-gate 		    (rctl_local_get(hndl, NULL, rval1, pp) == 0)) {
6717c478bd9Sstevel@tonic-gate 			do {
6727c478bd9Sstevel@tonic-gate 				if (rval1->rcv_privilege == RCPRIV_BASIC &&
6737c478bd9Sstevel@tonic-gate 				    rval1->rcv_action_recipient == curproc) {
6747c478bd9Sstevel@tonic-gate 					(void) rctl_local_delete(hndl, rval1,
6757c478bd9Sstevel@tonic-gate 					    pp);
6767c478bd9Sstevel@tonic-gate 					if (rctl_local_get(hndl, NULL, rval1,
6777c478bd9Sstevel@tonic-gate 					    pp) != 0)
6787c478bd9Sstevel@tonic-gate 						break;
6797c478bd9Sstevel@tonic-gate 				}
6807c478bd9Sstevel@tonic-gate 
6817c478bd9Sstevel@tonic-gate 				tval = rval1;
6827c478bd9Sstevel@tonic-gate 				rval1 = rval2;
6837c478bd9Sstevel@tonic-gate 				rval2 = tval;
6847c478bd9Sstevel@tonic-gate 			} while (rctl_local_get(hndl, rval2, rval1, pp)
6857c478bd9Sstevel@tonic-gate 			    == 0);
6867c478bd9Sstevel@tonic-gate 		}
6877c478bd9Sstevel@tonic-gate 
6887c478bd9Sstevel@tonic-gate 
6897c478bd9Sstevel@tonic-gate 		if (ret = rctl_local_insert(hndl, nval, pp)) {
6907c478bd9Sstevel@tonic-gate 			(void) set_errno(ret);
6917c478bd9Sstevel@tonic-gate 			goto rctlsys_out;
6927c478bd9Sstevel@tonic-gate 		}
6937c478bd9Sstevel@tonic-gate 
6947c478bd9Sstevel@tonic-gate 		/* ensure that nval is not freed */
6957c478bd9Sstevel@tonic-gate 		nval = NULL;
6967c478bd9Sstevel@tonic-gate 
6977c478bd9Sstevel@tonic-gate 	} else {
6987c478bd9Sstevel@tonic-gate 		/*
6997c478bd9Sstevel@tonic-gate 		 * RCTL_DELETE
7007c478bd9Sstevel@tonic-gate 		 */
7017c478bd9Sstevel@tonic-gate 		if (nval->rcv_privilege == RCPRIV_SYSTEM) {
7027c478bd9Sstevel@tonic-gate 			ret = set_errno(EPERM);
7037c478bd9Sstevel@tonic-gate 			goto rctlsys_out;
7047c478bd9Sstevel@tonic-gate 		}
7057c478bd9Sstevel@tonic-gate 
7067c478bd9Sstevel@tonic-gate 		if (nval->rcv_privilege == RCPRIV_PRIVILEGED) {
7077c478bd9Sstevel@tonic-gate 			if ((rde->rcd_entity == RCENTITY_ZONE &&
7087c478bd9Sstevel@tonic-gate 			    secpolicy_rctlsys(CRED(), B_TRUE) != 0) ||
7097c478bd9Sstevel@tonic-gate 			    (rde->rcd_entity != RCENTITY_ZONE &&
7107c478bd9Sstevel@tonic-gate 			    secpolicy_rctlsys(CRED(), B_FALSE) != 0)) {
7117c478bd9Sstevel@tonic-gate 				ret = set_errno(EACCES);
7127c478bd9Sstevel@tonic-gate 				goto rctlsys_out;
7137c478bd9Sstevel@tonic-gate 			}
7147c478bd9Sstevel@tonic-gate 		}
7157c478bd9Sstevel@tonic-gate 
7167c478bd9Sstevel@tonic-gate 		if (ret = rctl_local_delete(hndl, nval, pp)) {
7177c478bd9Sstevel@tonic-gate 			(void) set_errno(ret);
7187c478bd9Sstevel@tonic-gate 			goto rctlsys_out;
7197c478bd9Sstevel@tonic-gate 		}
7207c478bd9Sstevel@tonic-gate 	}
7217c478bd9Sstevel@tonic-gate 
7227c478bd9Sstevel@tonic-gate rctlsys_out:
7237c478bd9Sstevel@tonic-gate 
7247c478bd9Sstevel@tonic-gate 	if (pp)
7257c478bd9Sstevel@tonic-gate 		mutex_exit(&pp->p_lock);
7267c478bd9Sstevel@tonic-gate 
7277c478bd9Sstevel@tonic-gate 	kmem_free(nblk, sizeof (rctl_opaque_t));
7287c478bd9Sstevel@tonic-gate 	kmem_free(oblk, sizeof (rctl_opaque_t));
7297c478bd9Sstevel@tonic-gate 
7307c478bd9Sstevel@tonic-gate 	/* only free nval if we did not rctl_local_insert it */
7317c478bd9Sstevel@tonic-gate 	if (nval)
7327c478bd9Sstevel@tonic-gate 		kmem_cache_free(rctl_val_cache, nval);
7337c478bd9Sstevel@tonic-gate 
7347c478bd9Sstevel@tonic-gate 	kmem_cache_free(rctl_val_cache, oval);
7357c478bd9Sstevel@tonic-gate 	kmem_cache_free(rctl_val_cache, rval1);
7367c478bd9Sstevel@tonic-gate 	kmem_cache_free(rctl_val_cache, rval2);
7377c478bd9Sstevel@tonic-gate 
7387c478bd9Sstevel@tonic-gate 	return (ret);
7397c478bd9Sstevel@tonic-gate }
7407c478bd9Sstevel@tonic-gate 
7417c478bd9Sstevel@tonic-gate static long
7427c478bd9Sstevel@tonic-gate rctlsys_lst(char *ubuf, size_t ubufsz)
7437c478bd9Sstevel@tonic-gate {
7447c478bd9Sstevel@tonic-gate 	char *kbuf;
7457c478bd9Sstevel@tonic-gate 	size_t kbufsz;
7467c478bd9Sstevel@tonic-gate 
7477c478bd9Sstevel@tonic-gate 	kbufsz = rctl_build_name_buf(&kbuf);
7487c478bd9Sstevel@tonic-gate 
7497c478bd9Sstevel@tonic-gate 	if (kbufsz <= ubufsz &&
7507c478bd9Sstevel@tonic-gate 	    copyout(kbuf, ubuf, kbufsz) != 0) {
7517c478bd9Sstevel@tonic-gate 		kmem_free(kbuf, kbufsz);
7527c478bd9Sstevel@tonic-gate 		return (set_errno(EFAULT));
7537c478bd9Sstevel@tonic-gate 	}
7547c478bd9Sstevel@tonic-gate 
7557c478bd9Sstevel@tonic-gate 	kmem_free(kbuf, kbufsz);
7567c478bd9Sstevel@tonic-gate 
7577c478bd9Sstevel@tonic-gate 	return (kbufsz);
7587c478bd9Sstevel@tonic-gate }
7597c478bd9Sstevel@tonic-gate 
7607c478bd9Sstevel@tonic-gate static long
7617c478bd9Sstevel@tonic-gate rctlsys_ctl(char *name, rctl_opaque_t *rblk, int flags)
7627c478bd9Sstevel@tonic-gate {
7637c478bd9Sstevel@tonic-gate 	rctl_dict_entry_t *krde;
7647c478bd9Sstevel@tonic-gate 	rctl_opaque_t *krblk;
7657c478bd9Sstevel@tonic-gate 	char *kname;
7667c478bd9Sstevel@tonic-gate 	size_t klen;
7677c478bd9Sstevel@tonic-gate 
7687c478bd9Sstevel@tonic-gate 	kname = kmem_alloc(MAXPATHLEN, KM_SLEEP);
7697c478bd9Sstevel@tonic-gate 
7707c478bd9Sstevel@tonic-gate 	if (name == NULL || copyinstr(name, kname, MAXPATHLEN, &klen) != 0) {
7717c478bd9Sstevel@tonic-gate 		kmem_free(kname, MAXPATHLEN);
7727c478bd9Sstevel@tonic-gate 		return (set_errno(EFAULT));
7737c478bd9Sstevel@tonic-gate 	}
7747c478bd9Sstevel@tonic-gate 
7757c478bd9Sstevel@tonic-gate 	switch (flags) {
7767c478bd9Sstevel@tonic-gate 	case RCTLCTL_GET:
7777c478bd9Sstevel@tonic-gate 		krde = kmem_alloc(sizeof (rctl_dict_entry_t), KM_SLEEP);
7787c478bd9Sstevel@tonic-gate 		krblk = kmem_zalloc(sizeof (rctl_opaque_t), KM_SLEEP);
7797c478bd9Sstevel@tonic-gate 
7807c478bd9Sstevel@tonic-gate 		if (rctl_global_get(kname, krde) == -1) {
7817c478bd9Sstevel@tonic-gate 			kmem_free(krde, sizeof (rctl_dict_entry_t));
7827c478bd9Sstevel@tonic-gate 			kmem_free(krblk, sizeof (rctl_opaque_t));
7837c478bd9Sstevel@tonic-gate 			kmem_free(kname, MAXPATHLEN);
7847c478bd9Sstevel@tonic-gate 			return (set_errno(ESRCH));
7857c478bd9Sstevel@tonic-gate 		}
7867c478bd9Sstevel@tonic-gate 
7877c478bd9Sstevel@tonic-gate 		rctlsys_rblk_xfrm(krblk, krde, NULL, RBX_TO_BLK | RBX_CTL);
7887c478bd9Sstevel@tonic-gate 
7897c478bd9Sstevel@tonic-gate 		if (copyout(krblk, rblk, sizeof (rctl_opaque_t)) != 0) {
7907c478bd9Sstevel@tonic-gate 			kmem_free(krde, sizeof (rctl_dict_entry_t));
7917c478bd9Sstevel@tonic-gate 			kmem_free(krblk, sizeof (rctl_opaque_t));
7927c478bd9Sstevel@tonic-gate 			kmem_free(kname, MAXPATHLEN);
7937c478bd9Sstevel@tonic-gate 			return (set_errno(EFAULT));
7947c478bd9Sstevel@tonic-gate 		}
7957c478bd9Sstevel@tonic-gate 
7967c478bd9Sstevel@tonic-gate 		kmem_free(krde, sizeof (rctl_dict_entry_t));
7977c478bd9Sstevel@tonic-gate 		kmem_free(krblk, sizeof (rctl_opaque_t));
7987c478bd9Sstevel@tonic-gate 		kmem_free(kname, MAXPATHLEN);
7997c478bd9Sstevel@tonic-gate 		break;
8007c478bd9Sstevel@tonic-gate 	case RCTLCTL_SET:
8017c478bd9Sstevel@tonic-gate 		if (secpolicy_rctlsys(CRED(), B_TRUE) != 0) {
8027c478bd9Sstevel@tonic-gate 			kmem_free(kname, MAXPATHLEN);
8037c478bd9Sstevel@tonic-gate 			return (set_errno(EPERM));
8047c478bd9Sstevel@tonic-gate 		}
8057c478bd9Sstevel@tonic-gate 
8067c478bd9Sstevel@tonic-gate 		krde = kmem_alloc(sizeof (rctl_dict_entry_t), KM_SLEEP);
8077c478bd9Sstevel@tonic-gate 		krblk = kmem_zalloc(sizeof (rctl_opaque_t), KM_SLEEP);
8087c478bd9Sstevel@tonic-gate 
8097c478bd9Sstevel@tonic-gate 		if (rctl_global_get(kname, krde) == -1) {
8107c478bd9Sstevel@tonic-gate 			kmem_free(krde, sizeof (rctl_dict_entry_t));
8117c478bd9Sstevel@tonic-gate 			kmem_free(krblk, sizeof (rctl_opaque_t));
8127c478bd9Sstevel@tonic-gate 			kmem_free(kname, MAXPATHLEN);
8137c478bd9Sstevel@tonic-gate 			return (set_errno(ESRCH));
8147c478bd9Sstevel@tonic-gate 		}
8157c478bd9Sstevel@tonic-gate 
8167c478bd9Sstevel@tonic-gate 		if (copyin(rblk, krblk, sizeof (rctl_opaque_t)) != 0) {
8177c478bd9Sstevel@tonic-gate 			kmem_free(krde, sizeof (rctl_dict_entry_t));
8187c478bd9Sstevel@tonic-gate 			kmem_free(krblk, sizeof (rctl_opaque_t));
8197c478bd9Sstevel@tonic-gate 			kmem_free(kname, MAXPATHLEN);
8207c478bd9Sstevel@tonic-gate 			return (set_errno(EFAULT));
8217c478bd9Sstevel@tonic-gate 		}
8227c478bd9Sstevel@tonic-gate 
8237c478bd9Sstevel@tonic-gate 		rctlsys_rblk_xfrm(krblk, krde, NULL, RBX_FROM_BLK | RBX_CTL);
8247c478bd9Sstevel@tonic-gate 
8257c478bd9Sstevel@tonic-gate 		if (rctl_global_set(kname, krde) == -1) {
8267c478bd9Sstevel@tonic-gate 			kmem_free(krde, sizeof (rctl_dict_entry_t));
8277c478bd9Sstevel@tonic-gate 			kmem_free(krblk, sizeof (rctl_opaque_t));
8287c478bd9Sstevel@tonic-gate 			kmem_free(kname, MAXPATHLEN);
8297c478bd9Sstevel@tonic-gate 			return (set_errno(ESRCH));
8307c478bd9Sstevel@tonic-gate 		}
8317c478bd9Sstevel@tonic-gate 
8327c478bd9Sstevel@tonic-gate 		kmem_free(krde, sizeof (rctl_dict_entry_t));
8337c478bd9Sstevel@tonic-gate 		kmem_free(krblk, sizeof (rctl_opaque_t));
8347c478bd9Sstevel@tonic-gate 		kmem_free(kname, MAXPATHLEN);
8357c478bd9Sstevel@tonic-gate 
8367c478bd9Sstevel@tonic-gate 		break;
8377c478bd9Sstevel@tonic-gate 	default:
8387c478bd9Sstevel@tonic-gate 		kmem_free(kname, MAXPATHLEN);
8397c478bd9Sstevel@tonic-gate 		return (set_errno(EINVAL));
8407c478bd9Sstevel@tonic-gate 	}
8417c478bd9Sstevel@tonic-gate 
8427c478bd9Sstevel@tonic-gate 	return (0);
8437c478bd9Sstevel@tonic-gate }
8447c478bd9Sstevel@tonic-gate 
845532877c4Srd117015 /*
846532877c4Srd117015  * The arbitrary maximum number of rctl_opaque_t that we can pass to
847532877c4Srd117015  * rctl_projset().
848532877c4Srd117015  */
849532877c4Srd117015 #define	RCTL_PROJSET_MAXSIZE	1024
850532877c4Srd117015 
851532877c4Srd117015 static long
852532877c4Srd117015 rctlsys_projset(char *name, rctl_opaque_t *rblk, size_t size, int flags)
853532877c4Srd117015 {
854532877c4Srd117015 	rctl_dict_entry_t *krde;
855532877c4Srd117015 	rctl_opaque_t *krblk;
856532877c4Srd117015 	char *kname;
857532877c4Srd117015 	size_t klen;
858532877c4Srd117015 	rctl_hndl_t hndl;
859532877c4Srd117015 	rctl_val_t *new_values = NULL;
860532877c4Srd117015 	rctl_val_t *alloc_values = NULL;
861532877c4Srd117015 	rctl_val_t *new_val;
862532877c4Srd117015 	rctl_val_t *alloc_val;
863532877c4Srd117015 	int error = 0;
864532877c4Srd117015 	int count;
865532877c4Srd117015 
866532877c4Srd117015 	kname = kmem_alloc(MAXPATHLEN, KM_SLEEP);
867532877c4Srd117015 
868532877c4Srd117015 	if (name == NULL || copyinstr(name, kname, MAXPATHLEN, &klen) != 0) {
869532877c4Srd117015 		kmem_free(kname, MAXPATHLEN);
870532877c4Srd117015 		return (set_errno(EFAULT));
871532877c4Srd117015 	}
872532877c4Srd117015 
873532877c4Srd117015 	if (size > RCTL_PROJSET_MAXSIZE) {
874532877c4Srd117015 		kmem_free(kname, MAXPATHLEN);
875532877c4Srd117015 		return (set_errno(EINVAL));
876532877c4Srd117015 	}
877532877c4Srd117015 
878532877c4Srd117015 	if ((hndl = rctl_hndl_lookup(kname)) == -1) {
879532877c4Srd117015 		kmem_free(kname, MAXPATHLEN);
880532877c4Srd117015 		return (set_errno(EINVAL));
881532877c4Srd117015 	}
882532877c4Srd117015 
883532877c4Srd117015 	krde = rctl_dict_lookup_hndl(hndl);
884532877c4Srd117015 
885532877c4Srd117015 	/* If not a project entity then exit */
886532877c4Srd117015 	if ((krde->rcd_entity != RCENTITY_PROJECT) || (size <= 0)) {
887532877c4Srd117015 		kmem_free(kname, MAXPATHLEN);
888532877c4Srd117015 		return (set_errno(EINVAL));
889532877c4Srd117015 	}
890532877c4Srd117015 
891*6fa77e95Srd117015 	if (secpolicy_rctlsys(CRED(), B_FALSE) != 0) {
892*6fa77e95Srd117015 		kmem_free(kname, MAXPATHLEN);
893*6fa77e95Srd117015 		return (set_errno(EPERM));
894*6fa77e95Srd117015 	}
895*6fa77e95Srd117015 
896532877c4Srd117015 	/* Allocate an array large enough for all resource control blocks */
897532877c4Srd117015 	krblk = kmem_zalloc(sizeof (rctl_opaque_t) * size, KM_SLEEP);
898532877c4Srd117015 
899532877c4Srd117015 	if (copyin(rblk, krblk, sizeof (rctl_opaque_t) * size) == 0) {
900532877c4Srd117015 
901532877c4Srd117015 		for (count = 0; (count < size) && (error == 0); count++) {
902532877c4Srd117015 			new_val = kmem_cache_alloc(rctl_val_cache, KM_SLEEP);
903532877c4Srd117015 			alloc_val = kmem_cache_alloc(rctl_val_cache, KM_SLEEP);
904532877c4Srd117015 
905532877c4Srd117015 			rctlsys_rblk_xfrm(&krblk[count], NULL, new_val,
906532877c4Srd117015 			    RBX_FROM_BLK | RBX_VAL);
907532877c4Srd117015 
908532877c4Srd117015 			/*
909532877c4Srd117015 			 * Project entity resource control values should always
910532877c4Srd117015 			 * be privileged
911532877c4Srd117015 			 */
912532877c4Srd117015 			if (new_val->rcv_privilege != RCPRIV_PRIVILEGED) {
913532877c4Srd117015 				kmem_cache_free(rctl_val_cache, new_val);
914532877c4Srd117015 				kmem_cache_free(rctl_val_cache, alloc_val);
915532877c4Srd117015 
916532877c4Srd117015 				error = EPERM;
917532877c4Srd117015 			} else if (rctl_invalid_value(krde, new_val) == 0) {
918532877c4Srd117015 
919532877c4Srd117015 				/*
920532877c4Srd117015 				 * This is a project entity; we do not set
921532877c4Srd117015 				 * rcv_action_recipient or rcv_action_recip_pid
922532877c4Srd117015 				 */
923532877c4Srd117015 				new_val->rcv_action_recipient = NULL;
924532877c4Srd117015 				new_val->rcv_action_recip_pid = -1;
925532877c4Srd117015 				new_val->rcv_flagaction |= RCTL_LOCAL_PROJDB;
926532877c4Srd117015 				new_val->rcv_firing_time = 0;
927532877c4Srd117015 
928532877c4Srd117015 				new_val->rcv_prev = NULL;
929532877c4Srd117015 				new_val->rcv_next = new_values;
930532877c4Srd117015 				new_values = new_val;
931532877c4Srd117015 
932532877c4Srd117015 				/*
933532877c4Srd117015 				 * alloc_val is left largely uninitialized, it
934532877c4Srd117015 				 * is a pre-allocated rctl_val_t which is used
935532877c4Srd117015 				 * later in rctl_local_replace_all() /
936532877c4Srd117015 				 * rctl_local_insert_all().
937532877c4Srd117015 				 */
938532877c4Srd117015 				alloc_val->rcv_prev = NULL;
939532877c4Srd117015 				alloc_val->rcv_next = alloc_values;
940532877c4Srd117015 				alloc_values = alloc_val;
941532877c4Srd117015 			} else {
942532877c4Srd117015 				kmem_cache_free(rctl_val_cache, new_val);
943532877c4Srd117015 				kmem_cache_free(rctl_val_cache, alloc_val);
944532877c4Srd117015 
945532877c4Srd117015 				error = EINVAL;
946532877c4Srd117015 			}
947532877c4Srd117015 		}
948532877c4Srd117015 
949532877c4Srd117015 		kmem_free(krblk, sizeof (rctl_opaque_t) * size);
950532877c4Srd117015 	} else {
951532877c4Srd117015 		error = EFAULT;
952532877c4Srd117015 	}
953532877c4Srd117015 
954532877c4Srd117015 	kmem_free(kname, MAXPATHLEN);
955532877c4Srd117015 
956532877c4Srd117015 	if (error) {
957532877c4Srd117015 		/*
958532877c4Srd117015 		 * We will have the same number of items in the alloc_values
959532877c4Srd117015 		 * linked list, as we have in new_values.  However, we remain
960532877c4Srd117015 		 * cautious, and teardown the linked lists individually.
961532877c4Srd117015 		 */
962532877c4Srd117015 		while (new_values != NULL) {
963532877c4Srd117015 			new_val = new_values;
964532877c4Srd117015 			new_values = new_values->rcv_next;
965532877c4Srd117015 			kmem_cache_free(rctl_val_cache, new_val);
966532877c4Srd117015 		}
967532877c4Srd117015 
968532877c4Srd117015 		while (alloc_values != NULL) {
969532877c4Srd117015 			alloc_val = alloc_values;
970532877c4Srd117015 			alloc_values = alloc_values->rcv_next;
971532877c4Srd117015 			kmem_cache_free(rctl_val_cache, alloc_val);
972532877c4Srd117015 		}
973532877c4Srd117015 
974532877c4Srd117015 		return (set_errno(error));
975532877c4Srd117015 	}
976532877c4Srd117015 
977532877c4Srd117015 	/*
978532877c4Srd117015 	 * We take the p_lock here to maintain consistency with other functions
979532877c4Srd117015 	 * - rctlsys_get() and rctlsys_set()
980532877c4Srd117015 	 */
981532877c4Srd117015 	mutex_enter(&curproc->p_lock);
982532877c4Srd117015 	if (flags & TASK_PROJ_PURGE)  {
983532877c4Srd117015 		(void) rctl_local_replace_all(hndl, new_values, alloc_values,
984532877c4Srd117015 		    curproc);
985532877c4Srd117015 	} else {
986532877c4Srd117015 		(void) rctl_local_insert_all(hndl, new_values, alloc_values,
987532877c4Srd117015 		    curproc);
988532877c4Srd117015 	}
989532877c4Srd117015 	mutex_exit(&curproc->p_lock);
990532877c4Srd117015 
991532877c4Srd117015 	return (0);
992532877c4Srd117015 }
993532877c4Srd117015 
9947c478bd9Sstevel@tonic-gate long
9957c478bd9Sstevel@tonic-gate rctlsys(int code, char *name, void *obuf, void *nbuf, size_t obufsz, int flags)
9967c478bd9Sstevel@tonic-gate {
9977c478bd9Sstevel@tonic-gate 	switch (code) {
9987c478bd9Sstevel@tonic-gate 	case 0:
9997c478bd9Sstevel@tonic-gate 		return (rctlsys_get(name, obuf, nbuf, flags));
10007c478bd9Sstevel@tonic-gate 
10017c478bd9Sstevel@tonic-gate 	case 1:
10027c478bd9Sstevel@tonic-gate 		return (rctlsys_set(name, obuf, nbuf, flags));
10037c478bd9Sstevel@tonic-gate 
10047c478bd9Sstevel@tonic-gate 	case 2:
10057c478bd9Sstevel@tonic-gate 		/*
10067c478bd9Sstevel@tonic-gate 		 * Private call for rctl_walk(3C).
10077c478bd9Sstevel@tonic-gate 		 */
10087c478bd9Sstevel@tonic-gate 		return (rctlsys_lst(obuf, obufsz));
10097c478bd9Sstevel@tonic-gate 
10107c478bd9Sstevel@tonic-gate 	case 3:
10117c478bd9Sstevel@tonic-gate 		/*
10127c478bd9Sstevel@tonic-gate 		 * Private code for rctladm(1M):  "rctlctl".
10137c478bd9Sstevel@tonic-gate 		 */
10147c478bd9Sstevel@tonic-gate 		return (rctlsys_ctl(name, obuf, flags));
1015532877c4Srd117015 	case 4:
1016532877c4Srd117015 		/*
1017532877c4Srd117015 		 * Private code for setproject(3PROJECT).
1018532877c4Srd117015 		 */
1019532877c4Srd117015 		return (rctlsys_projset(name, nbuf, obufsz, flags));
10207c478bd9Sstevel@tonic-gate 
10217c478bd9Sstevel@tonic-gate 	default:
10227c478bd9Sstevel@tonic-gate 		return (set_errno(EINVAL));
10237c478bd9Sstevel@tonic-gate 	}
10247c478bd9Sstevel@tonic-gate }
1025