xref: /freebsd/lib/libprocstat/libprocstat.c (revision 1c3d6532ca29c7aa7d26edd4074bc91671ac1bc2)
10daf62d9SStanislav Sedov /*-
2df57947fSPedro F. Giffuni  * SPDX-License-Identifier: BSD-4-Clause
3df57947fSPedro F. Giffuni  *
486be94fcSTycho Nightingale  * Copyright (c) 2017 Dell EMC
50daf62d9SStanislav Sedov  * Copyright (c) 2009 Stanislav Sedov <stas@FreeBSD.org>
60daf62d9SStanislav Sedov  * Copyright (c) 1988, 1993
70daf62d9SStanislav Sedov  *      The Regents of the University of California.  All rights reserved.
80daf62d9SStanislav Sedov  *
90daf62d9SStanislav Sedov  * Redistribution and use in source and binary forms, with or without
100daf62d9SStanislav Sedov  * modification, are permitted provided that the following conditions
110daf62d9SStanislav Sedov  * are met:
120daf62d9SStanislav Sedov  * 1. Redistributions of source code must retain the above copyright
130daf62d9SStanislav Sedov  *    notice, this list of conditions and the following disclaimer.
140daf62d9SStanislav Sedov  * 2. Redistributions in binary form must reproduce the above copyright
150daf62d9SStanislav Sedov  *    notice, this list of conditions and the following disclaimer in the
160daf62d9SStanislav Sedov  *    documentation and/or other materials provided with the distribution.
170daf62d9SStanislav Sedov  * 3. All advertising materials mentioning features or use of this software
180daf62d9SStanislav Sedov  *    must display the following acknowledgement:
190daf62d9SStanislav Sedov  *      This product includes software developed by the University of
200daf62d9SStanislav Sedov  *      California, Berkeley and its contributors.
210daf62d9SStanislav Sedov  * 4. Neither the name of the University nor the names of its contributors
220daf62d9SStanislav Sedov  *    may be used to endorse or promote products derived from this software
230daf62d9SStanislav Sedov  *    without specific prior written permission.
240daf62d9SStanislav Sedov  *
250daf62d9SStanislav Sedov  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
260daf62d9SStanislav Sedov  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
270daf62d9SStanislav Sedov  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
280daf62d9SStanislav Sedov  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
290daf62d9SStanislav Sedov  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
300daf62d9SStanislav Sedov  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
310daf62d9SStanislav Sedov  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
320daf62d9SStanislav Sedov  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
330daf62d9SStanislav Sedov  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
340daf62d9SStanislav Sedov  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
350daf62d9SStanislav Sedov  * SUCH DAMAGE.
360daf62d9SStanislav Sedov  */
370daf62d9SStanislav Sedov 
380daf62d9SStanislav Sedov #include <sys/param.h>
392ff020d3SMikolaj Golub #include <sys/elf.h>
400daf62d9SStanislav Sedov #include <sys/time.h>
417cc0ebfdSMikolaj Golub #include <sys/resourcevar.h>
421f84c47eSMikolaj Golub #define	_WANT_UCRED
431f84c47eSMikolaj Golub #include <sys/ucred.h>
441f84c47eSMikolaj Golub #undef _WANT_UCRED
450daf62d9SStanislav Sedov #include <sys/proc.h>
460daf62d9SStanislav Sedov #include <sys/user.h>
470daf62d9SStanislav Sedov #include <sys/stat.h>
480daf62d9SStanislav Sedov #include <sys/vnode.h>
490daf62d9SStanislav Sedov #include <sys/socket.h>
500e229f34SGleb Smirnoff #define	_WANT_SOCKET
510daf62d9SStanislav Sedov #include <sys/socketvar.h>
520daf62d9SStanislav Sedov #include <sys/domain.h>
53fe5a6266SGleb Smirnoff #define	_WANT_PROTOSW
540daf62d9SStanislav Sedov #include <sys/protosw.h>
550daf62d9SStanislav Sedov #include <sys/un.h>
560e229f34SGleb Smirnoff #define	_WANT_UNPCB
570daf62d9SStanislav Sedov #include <sys/unpcb.h>
580daf62d9SStanislav Sedov #include <sys/sysctl.h>
590daf62d9SStanislav Sedov #include <sys/tty.h>
600daf62d9SStanislav Sedov #include <sys/filedesc.h>
610daf62d9SStanislav Sedov #include <sys/queue.h>
620daf62d9SStanislav Sedov #define	_WANT_FILE
630daf62d9SStanislav Sedov #include <sys/file.h>
640daf62d9SStanislav Sedov #include <sys/conf.h>
65958aa575SJohn Baldwin #include <sys/ksem.h>
66e506e182SJohn Baldwin #include <sys/mman.h>
67b881b8beSRobert Watson #include <sys/capsicum.h>
68a4ba6502STycho Nightingale #include <sys/ptrace.h>
69d485c77fSKonstantin Belousov #define	_WANT_MOUNT
700daf62d9SStanislav Sedov #include <sys/mount.h>
719e5787d2SMatt Macy #include <sys/filedesc.h>
720daf62d9SStanislav Sedov #include <sys/pipe.h>
730daf62d9SStanislav Sedov #include <fs/devfs/devfs.h>
740daf62d9SStanislav Sedov #include <fs/devfs/devfs_int.h>
750daf62d9SStanislav Sedov #include <nfs/nfsproto.h>
760daf62d9SStanislav Sedov #include <nfsclient/nfs.h>
770daf62d9SStanislav Sedov #include <nfsclient/nfsnode.h>
780daf62d9SStanislav Sedov 
790daf62d9SStanislav Sedov #include <vm/vm.h>
800daf62d9SStanislav Sedov #include <vm/vm_map.h>
810daf62d9SStanislav Sedov #include <vm/vm_object.h>
820daf62d9SStanislav Sedov 
830daf62d9SStanislav Sedov #include <net/route.h>
840daf62d9SStanislav Sedov #include <netinet/in.h>
850daf62d9SStanislav Sedov #include <netinet/in_systm.h>
860daf62d9SStanislav Sedov #include <netinet/ip.h>
870daf62d9SStanislav Sedov 
880daf62d9SStanislav Sedov #include <assert.h>
890daf62d9SStanislav Sedov #include <ctype.h>
900daf62d9SStanislav Sedov #include <err.h>
910daf62d9SStanislav Sedov #include <fcntl.h>
920daf62d9SStanislav Sedov #include <kvm.h>
930daf62d9SStanislav Sedov #include <libutil.h>
940daf62d9SStanislav Sedov #include <limits.h>
950daf62d9SStanislav Sedov #include <paths.h>
960daf62d9SStanislav Sedov #include <pwd.h>
970daf62d9SStanislav Sedov #include <stdio.h>
980daf62d9SStanislav Sedov #include <stdlib.h>
990daf62d9SStanislav Sedov #include <stddef.h>
1000daf62d9SStanislav Sedov #include <string.h>
1010daf62d9SStanislav Sedov #include <unistd.h>
1020daf62d9SStanislav Sedov #include <netdb.h>
1030daf62d9SStanislav Sedov 
1040daf62d9SStanislav Sedov #include <libprocstat.h>
1050daf62d9SStanislav Sedov #include "libprocstat_internal.h"
1060daf62d9SStanislav Sedov #include "common_kvm.h"
1077153ad2bSMikolaj Golub #include "core.h"
1080daf62d9SStanislav Sedov 
1090daf62d9SStanislav Sedov int     statfs(const char *, struct statfs *);	/* XXX */
1100daf62d9SStanislav Sedov 
1110daf62d9SStanislav Sedov #define	PROCSTAT_KVM	1
1120daf62d9SStanislav Sedov #define	PROCSTAT_SYSCTL	2
1137153ad2bSMikolaj Golub #define	PROCSTAT_CORE	3
1140daf62d9SStanislav Sedov 
1154482b5e3SMikolaj Golub static char	**getargv(struct procstat *procstat, struct kinfo_proc *kp,
1164482b5e3SMikolaj Golub     size_t nchr, int env);
1170daf62d9SStanislav Sedov static char	*getmnton(kvm_t *kd, struct mount *m);
11839680c7bSMikolaj Golub static struct kinfo_vmentry *	kinfo_getvmmap_core(struct procstat_core *core,
11939680c7bSMikolaj Golub     int *cntp);
1202ff020d3SMikolaj Golub static Elf_Auxinfo	*procstat_getauxv_core(struct procstat_core *core,
1212ff020d3SMikolaj Golub     unsigned int *cntp);
1222ff020d3SMikolaj Golub static Elf_Auxinfo	*procstat_getauxv_sysctl(pid_t pid, unsigned int *cntp);
1230daf62d9SStanislav Sedov static struct filestat_list	*procstat_getfiles_kvm(
1240daf62d9SStanislav Sedov     struct procstat *procstat, struct kinfo_proc *kp, int mmapped);
1250daf62d9SStanislav Sedov static struct filestat_list	*procstat_getfiles_sysctl(
1260daf62d9SStanislav Sedov     struct procstat *procstat, struct kinfo_proc *kp, int mmapped);
1270daf62d9SStanislav Sedov static int	procstat_get_pipe_info_sysctl(struct filestat *fst,
1280daf62d9SStanislav Sedov     struct pipestat *pipe, char *errbuf);
1290daf62d9SStanislav Sedov static int	procstat_get_pipe_info_kvm(kvm_t *kd, struct filestat *fst,
1300daf62d9SStanislav Sedov     struct pipestat *pipe, char *errbuf);
1310daf62d9SStanislav Sedov static int	procstat_get_pts_info_sysctl(struct filestat *fst,
1320daf62d9SStanislav Sedov     struct ptsstat *pts, char *errbuf);
1330daf62d9SStanislav Sedov static int	procstat_get_pts_info_kvm(kvm_t *kd, struct filestat *fst,
1340daf62d9SStanislav Sedov     struct ptsstat *pts, char *errbuf);
135958aa575SJohn Baldwin static int	procstat_get_sem_info_sysctl(struct filestat *fst,
136958aa575SJohn Baldwin     struct semstat *sem, char *errbuf);
137958aa575SJohn Baldwin static int	procstat_get_sem_info_kvm(kvm_t *kd, struct filestat *fst,
138958aa575SJohn Baldwin     struct semstat *sem, char *errbuf);
139e506e182SJohn Baldwin static int	procstat_get_shm_info_sysctl(struct filestat *fst,
140e506e182SJohn Baldwin     struct shmstat *shm, char *errbuf);
141e506e182SJohn Baldwin static int	procstat_get_shm_info_kvm(kvm_t *kd, struct filestat *fst,
142e506e182SJohn Baldwin     struct shmstat *shm, char *errbuf);
1430daf62d9SStanislav Sedov static int	procstat_get_socket_info_sysctl(struct filestat *fst,
1440daf62d9SStanislav Sedov     struct sockstat *sock, char *errbuf);
1450daf62d9SStanislav Sedov static int	procstat_get_socket_info_kvm(kvm_t *kd, struct filestat *fst,
1460daf62d9SStanislav Sedov     struct sockstat *sock, char *errbuf);
1470daf62d9SStanislav Sedov static int	to_filestat_flags(int flags);
1480daf62d9SStanislav Sedov static int	procstat_get_vnode_info_kvm(kvm_t *kd, struct filestat *fst,
1490daf62d9SStanislav Sedov     struct vnstat *vn, char *errbuf);
1500daf62d9SStanislav Sedov static int	procstat_get_vnode_info_sysctl(struct filestat *fst,
1510daf62d9SStanislav Sedov     struct vnstat *vn, char *errbuf);
1527f1d14e6SMikolaj Golub static gid_t	*procstat_getgroups_core(struct procstat_core *core,
1537f1d14e6SMikolaj Golub     unsigned int *count);
1541f84c47eSMikolaj Golub static gid_t *	procstat_getgroups_kvm(kvm_t *kd, struct kinfo_proc *kp,
1551f84c47eSMikolaj Golub     unsigned int *count);
1567f1d14e6SMikolaj Golub static gid_t	*procstat_getgroups_sysctl(pid_t pid, unsigned int *count);
15789358231SMikolaj Golub static struct kinfo_kstack	*procstat_getkstack_sysctl(pid_t pid,
15889358231SMikolaj Golub     int *cntp);
1591f84c47eSMikolaj Golub static int	procstat_getosrel_core(struct procstat_core *core,
1601f84c47eSMikolaj Golub     int *osrelp);
1611f84c47eSMikolaj Golub static int	procstat_getosrel_kvm(kvm_t *kd, struct kinfo_proc *kp,
1621f84c47eSMikolaj Golub     int *osrelp);
1631f84c47eSMikolaj Golub static int	procstat_getosrel_sysctl(pid_t pid, int *osrelp);
1644cdf9796SMikolaj Golub static int	procstat_getpathname_core(struct procstat_core *core,
1654cdf9796SMikolaj Golub     char *pathname, size_t maxlen);
1664cdf9796SMikolaj Golub static int	procstat_getpathname_sysctl(pid_t pid, char *pathname,
1674cdf9796SMikolaj Golub     size_t maxlen);
1687cc0ebfdSMikolaj Golub static int	procstat_getrlimit_core(struct procstat_core *core, int which,
1697cc0ebfdSMikolaj Golub     struct rlimit* rlimit);
1701f84c47eSMikolaj Golub static int	procstat_getrlimit_kvm(kvm_t *kd, struct kinfo_proc *kp,
1711f84c47eSMikolaj Golub     int which, struct rlimit* rlimit);
1727cc0ebfdSMikolaj Golub static int	procstat_getrlimit_sysctl(pid_t pid, int which,
1737cc0ebfdSMikolaj Golub     struct rlimit* rlimit);
1745b9bcba9SMikolaj Golub static int	procstat_getumask_core(struct procstat_core *core,
1755b9bcba9SMikolaj Golub     unsigned short *maskp);
1761f84c47eSMikolaj Golub static int	procstat_getumask_kvm(kvm_t *kd, struct kinfo_proc *kp,
1771f84c47eSMikolaj Golub     unsigned short *maskp);
1785b9bcba9SMikolaj Golub static int	procstat_getumask_sysctl(pid_t pid, unsigned short *maskp);
1790daf62d9SStanislav Sedov static int	vntype2psfsttype(int type);
1800daf62d9SStanislav Sedov 
1810daf62d9SStanislav Sedov void
procstat_close(struct procstat * procstat)1820daf62d9SStanislav Sedov procstat_close(struct procstat *procstat)
1830daf62d9SStanislav Sedov {
1840daf62d9SStanislav Sedov 
1850daf62d9SStanislav Sedov 	assert(procstat);
1860daf62d9SStanislav Sedov 	if (procstat->type == PROCSTAT_KVM)
1870daf62d9SStanislav Sedov 		kvm_close(procstat->kd);
1887153ad2bSMikolaj Golub 	else if (procstat->type == PROCSTAT_CORE)
1897153ad2bSMikolaj Golub 		procstat_core_close(procstat->core);
1904482b5e3SMikolaj Golub 	procstat_freeargv(procstat);
1914482b5e3SMikolaj Golub 	procstat_freeenvv(procstat);
192d7b666aeSSergey Kandaurov 	free(procstat);
1930daf62d9SStanislav Sedov }
1940daf62d9SStanislav Sedov 
1950daf62d9SStanislav Sedov struct procstat *
procstat_open_sysctl(void)1960daf62d9SStanislav Sedov procstat_open_sysctl(void)
1970daf62d9SStanislav Sedov {
1980daf62d9SStanislav Sedov 	struct procstat *procstat;
1990daf62d9SStanislav Sedov 
2000daf62d9SStanislav Sedov 	procstat = calloc(1, sizeof(*procstat));
2010daf62d9SStanislav Sedov 	if (procstat == NULL) {
2020daf62d9SStanislav Sedov 		warn("malloc()");
2030daf62d9SStanislav Sedov 		return (NULL);
2040daf62d9SStanislav Sedov 	}
2050daf62d9SStanislav Sedov 	procstat->type = PROCSTAT_SYSCTL;
2060daf62d9SStanislav Sedov 	return (procstat);
2070daf62d9SStanislav Sedov }
2080daf62d9SStanislav Sedov 
2090daf62d9SStanislav Sedov struct procstat *
procstat_open_kvm(const char * nlistf,const char * memf)2100daf62d9SStanislav Sedov procstat_open_kvm(const char *nlistf, const char *memf)
2110daf62d9SStanislav Sedov {
2120daf62d9SStanislav Sedov 	struct procstat *procstat;
2130daf62d9SStanislav Sedov 	kvm_t *kd;
2140daf62d9SStanislav Sedov 	char buf[_POSIX2_LINE_MAX];
2150daf62d9SStanislav Sedov 
2160daf62d9SStanislav Sedov 	procstat = calloc(1, sizeof(*procstat));
2170daf62d9SStanislav Sedov 	if (procstat == NULL) {
2180daf62d9SStanislav Sedov 		warn("malloc()");
2190daf62d9SStanislav Sedov 		return (NULL);
2200daf62d9SStanislav Sedov 	}
2210daf62d9SStanislav Sedov 	kd = kvm_openfiles(nlistf, memf, NULL, O_RDONLY, buf);
2220daf62d9SStanislav Sedov 	if (kd == NULL) {
2230daf62d9SStanislav Sedov 		warnx("kvm_openfiles(): %s", buf);
2240daf62d9SStanislav Sedov 		free(procstat);
2250daf62d9SStanislav Sedov 		return (NULL);
2260daf62d9SStanislav Sedov 	}
2270daf62d9SStanislav Sedov 	procstat->type = PROCSTAT_KVM;
2280daf62d9SStanislav Sedov 	procstat->kd = kd;
2290daf62d9SStanislav Sedov 	return (procstat);
2300daf62d9SStanislav Sedov }
2310daf62d9SStanislav Sedov 
2327153ad2bSMikolaj Golub struct procstat *
procstat_open_core(const char * filename)2337153ad2bSMikolaj Golub procstat_open_core(const char *filename)
2347153ad2bSMikolaj Golub {
2357153ad2bSMikolaj Golub 	struct procstat *procstat;
2367153ad2bSMikolaj Golub 	struct procstat_core *core;
2377153ad2bSMikolaj Golub 
2387153ad2bSMikolaj Golub 	procstat = calloc(1, sizeof(*procstat));
2397153ad2bSMikolaj Golub 	if (procstat == NULL) {
2407153ad2bSMikolaj Golub 		warn("malloc()");
2417153ad2bSMikolaj Golub 		return (NULL);
2427153ad2bSMikolaj Golub 	}
2437153ad2bSMikolaj Golub 	core = procstat_core_open(filename);
2447153ad2bSMikolaj Golub 	if (core == NULL) {
2457153ad2bSMikolaj Golub 		free(procstat);
2467153ad2bSMikolaj Golub 		return (NULL);
2477153ad2bSMikolaj Golub 	}
2487153ad2bSMikolaj Golub 	procstat->type = PROCSTAT_CORE;
2497153ad2bSMikolaj Golub 	procstat->core = core;
2507153ad2bSMikolaj Golub 	return (procstat);
2517153ad2bSMikolaj Golub }
2527153ad2bSMikolaj Golub 
2530daf62d9SStanislav Sedov struct kinfo_proc *
procstat_getprocs(struct procstat * procstat,int what,int arg,unsigned int * count)2540daf62d9SStanislav Sedov procstat_getprocs(struct procstat *procstat, int what, int arg,
2550daf62d9SStanislav Sedov     unsigned int *count)
2560daf62d9SStanislav Sedov {
2570daf62d9SStanislav Sedov 	struct kinfo_proc *p0, *p;
258608203fdSJohn Baldwin 	size_t len, olen;
2590daf62d9SStanislav Sedov 	int name[4];
260391bdfb8SAndriy Gapon 	int cnt;
2610daf62d9SStanislav Sedov 	int error;
2620daf62d9SStanislav Sedov 
2630daf62d9SStanislav Sedov 	assert(procstat);
2640daf62d9SStanislav Sedov 	assert(count);
2650daf62d9SStanislav Sedov 	p = NULL;
2660daf62d9SStanislav Sedov 	if (procstat->type == PROCSTAT_KVM) {
267391bdfb8SAndriy Gapon 		*count = 0;
268391bdfb8SAndriy Gapon 		p0 = kvm_getprocs(procstat->kd, what, arg, &cnt);
269391bdfb8SAndriy Gapon 		if (p0 == NULL || cnt <= 0)
2700daf62d9SStanislav Sedov 			return (NULL);
271391bdfb8SAndriy Gapon 		*count = cnt;
2720daf62d9SStanislav Sedov 		len = *count * sizeof(*p);
2730daf62d9SStanislav Sedov 		p = malloc(len);
2740daf62d9SStanislav Sedov 		if (p == NULL) {
27565869214SJilles Tjoelker 			warnx("malloc(%zu)", len);
2760daf62d9SStanislav Sedov 			goto fail;
2770daf62d9SStanislav Sedov 		}
2780daf62d9SStanislav Sedov 		bcopy(p0, p, len);
2790daf62d9SStanislav Sedov 		return (p);
2800daf62d9SStanislav Sedov 	} else if (procstat->type == PROCSTAT_SYSCTL) {
2810daf62d9SStanislav Sedov 		len = 0;
2820daf62d9SStanislav Sedov 		name[0] = CTL_KERN;
2830daf62d9SStanislav Sedov 		name[1] = KERN_PROC;
2840daf62d9SStanislav Sedov 		name[2] = what;
2850daf62d9SStanislav Sedov 		name[3] = arg;
28675b6a179SEnji Cooper 		error = sysctl(name, nitems(name), NULL, &len, NULL, 0);
2870daf62d9SStanislav Sedov 		if (error < 0 && errno != EPERM) {
2880daf62d9SStanislav Sedov 			warn("sysctl(kern.proc)");
2890daf62d9SStanislav Sedov 			goto fail;
2900daf62d9SStanislav Sedov 		}
2910daf62d9SStanislav Sedov 		if (len == 0) {
2920daf62d9SStanislav Sedov 			warnx("no processes?");
2930daf62d9SStanislav Sedov 			goto fail;
2940daf62d9SStanislav Sedov 		}
295608203fdSJohn Baldwin 		do {
296608203fdSJohn Baldwin 			len += len / 10;
297608203fdSJohn Baldwin 			p = reallocf(p, len);
2980daf62d9SStanislav Sedov 			if (p == NULL) {
299608203fdSJohn Baldwin 				warnx("reallocf(%zu)", len);
3000daf62d9SStanislav Sedov 				goto fail;
3010daf62d9SStanislav Sedov 			}
302608203fdSJohn Baldwin 			olen = len;
30375b6a179SEnji Cooper 			error = sysctl(name, nitems(name), p, &len, NULL, 0);
304608203fdSJohn Baldwin 		} while (error < 0 && errno == ENOMEM && olen == len);
3050daf62d9SStanislav Sedov 		if (error < 0 && errno != EPERM) {
3060daf62d9SStanislav Sedov 			warn("sysctl(kern.proc)");
3070daf62d9SStanislav Sedov 			goto fail;
3080daf62d9SStanislav Sedov 		}
3090daf62d9SStanislav Sedov 		/* Perform simple consistency checks. */
3100daf62d9SStanislav Sedov 		if ((len % sizeof(*p)) != 0 || p->ki_structsize != sizeof(*p)) {
3117153ad2bSMikolaj Golub 			warnx("kinfo_proc structure size mismatch (len = %zu)", len);
3127153ad2bSMikolaj Golub 			goto fail;
3137153ad2bSMikolaj Golub 		}
3147153ad2bSMikolaj Golub 		*count = len / sizeof(*p);
3157153ad2bSMikolaj Golub 		return (p);
3167153ad2bSMikolaj Golub 	} else if (procstat->type == PROCSTAT_CORE) {
3177153ad2bSMikolaj Golub 		p = procstat_core_get(procstat->core, PSC_TYPE_PROC, NULL,
3187153ad2bSMikolaj Golub 		    &len);
3197153ad2bSMikolaj Golub 		if ((len % sizeof(*p)) != 0 || p->ki_structsize != sizeof(*p)) {
3200daf62d9SStanislav Sedov 			warnx("kinfo_proc structure size mismatch");
3210daf62d9SStanislav Sedov 			goto fail;
3220daf62d9SStanislav Sedov 		}
3230daf62d9SStanislav Sedov 		*count = len / sizeof(*p);
3240daf62d9SStanislav Sedov 		return (p);
3250daf62d9SStanislav Sedov 	} else {
32680905c35SJilles Tjoelker 		warnx("unknown access method: %d", procstat->type);
3270daf62d9SStanislav Sedov 		return (NULL);
3280daf62d9SStanislav Sedov 	}
3290daf62d9SStanislav Sedov fail:
3300daf62d9SStanislav Sedov 	if (p)
3310daf62d9SStanislav Sedov 		free(p);
3320daf62d9SStanislav Sedov 	return (NULL);
3330daf62d9SStanislav Sedov }
3340daf62d9SStanislav Sedov 
3350daf62d9SStanislav Sedov void
procstat_freeprocs(struct procstat * procstat __unused,struct kinfo_proc * p)3360daf62d9SStanislav Sedov procstat_freeprocs(struct procstat *procstat __unused, struct kinfo_proc *p)
3370daf62d9SStanislav Sedov {
3380daf62d9SStanislav Sedov 
3390daf62d9SStanislav Sedov 	if (p != NULL)
3400daf62d9SStanislav Sedov 		free(p);
3410daf62d9SStanislav Sedov 	p = NULL;
3420daf62d9SStanislav Sedov }
3430daf62d9SStanislav Sedov 
3440daf62d9SStanislav Sedov struct filestat_list *
procstat_getfiles(struct procstat * procstat,struct kinfo_proc * kp,int mmapped)3450daf62d9SStanislav Sedov procstat_getfiles(struct procstat *procstat, struct kinfo_proc *kp, int mmapped)
3460daf62d9SStanislav Sedov {
3470daf62d9SStanislav Sedov 
3487153ad2bSMikolaj Golub 	switch (procstat->type) {
3497153ad2bSMikolaj Golub 	case PROCSTAT_KVM:
3500daf62d9SStanislav Sedov 		return (procstat_getfiles_kvm(procstat, kp, mmapped));
3517153ad2bSMikolaj Golub 	case PROCSTAT_SYSCTL:
3527153ad2bSMikolaj Golub 	case PROCSTAT_CORE:
3537153ad2bSMikolaj Golub 		return (procstat_getfiles_sysctl(procstat, kp, mmapped));
3547153ad2bSMikolaj Golub 	default:
3557153ad2bSMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
3560daf62d9SStanislav Sedov 		return (NULL);
3570daf62d9SStanislav Sedov 	}
3587153ad2bSMikolaj Golub }
3590daf62d9SStanislav Sedov 
3600daf62d9SStanislav Sedov void
procstat_freefiles(struct procstat * procstat,struct filestat_list * head)3610daf62d9SStanislav Sedov procstat_freefiles(struct procstat *procstat, struct filestat_list *head)
3620daf62d9SStanislav Sedov {
3630daf62d9SStanislav Sedov 	struct filestat *fst, *tmp;
3640daf62d9SStanislav Sedov 
3650daf62d9SStanislav Sedov 	STAILQ_FOREACH_SAFE(fst, head, next, tmp) {
3660daf62d9SStanislav Sedov 		if (fst->fs_path != NULL)
3670daf62d9SStanislav Sedov 			free(fst->fs_path);
3680daf62d9SStanislav Sedov 		free(fst);
3690daf62d9SStanislav Sedov 	}
3700daf62d9SStanislav Sedov 	free(head);
3710daf62d9SStanislav Sedov 	if (procstat->vmentries != NULL) {
3720daf62d9SStanislav Sedov 		free(procstat->vmentries);
3730daf62d9SStanislav Sedov 		procstat->vmentries = NULL;
3740daf62d9SStanislav Sedov 	}
3750daf62d9SStanislav Sedov 	if (procstat->files != NULL) {
3760daf62d9SStanislav Sedov 		free(procstat->files);
3770daf62d9SStanislav Sedov 		procstat->files = NULL;
3780daf62d9SStanislav Sedov 	}
3790daf62d9SStanislav Sedov }
3800daf62d9SStanislav Sedov 
3810daf62d9SStanislav Sedov static struct filestat *
filestat_new_entry(void * typedep,int type,int fd,int fflags,int uflags,int refcount,off_t offset,char * path,cap_rights_t * cap_rightsp)3820daf62d9SStanislav Sedov filestat_new_entry(void *typedep, int type, int fd, int fflags, int uflags,
3837008be5bSPawel Jakub Dawidek     int refcount, off_t offset, char *path, cap_rights_t *cap_rightsp)
3840daf62d9SStanislav Sedov {
3850daf62d9SStanislav Sedov 	struct filestat *entry;
3860daf62d9SStanislav Sedov 
3870daf62d9SStanislav Sedov 	entry = calloc(1, sizeof(*entry));
3880daf62d9SStanislav Sedov 	if (entry == NULL) {
3890daf62d9SStanislav Sedov 		warn("malloc()");
3900daf62d9SStanislav Sedov 		return (NULL);
3910daf62d9SStanislav Sedov 	}
3920daf62d9SStanislav Sedov 	entry->fs_typedep = typedep;
3930daf62d9SStanislav Sedov 	entry->fs_fflags = fflags;
3940daf62d9SStanislav Sedov 	entry->fs_uflags = uflags;
3950daf62d9SStanislav Sedov 	entry->fs_fd = fd;
3960daf62d9SStanislav Sedov 	entry->fs_type = type;
3970daf62d9SStanislav Sedov 	entry->fs_ref_count = refcount;
3980daf62d9SStanislav Sedov 	entry->fs_offset = offset;
3990daf62d9SStanislav Sedov 	entry->fs_path = path;
400772f6645SPawel Jakub Dawidek 	if (cap_rightsp != NULL)
4017008be5bSPawel Jakub Dawidek 		entry->fs_cap_rights = *cap_rightsp;
402772f6645SPawel Jakub Dawidek 	else
403772f6645SPawel Jakub Dawidek 		cap_rights_init(&entry->fs_cap_rights);
4040daf62d9SStanislav Sedov 	return (entry);
4050daf62d9SStanislav Sedov }
4060daf62d9SStanislav Sedov 
4070daf62d9SStanislav Sedov static struct vnode *
getctty(kvm_t * kd,struct kinfo_proc * kp)4080daf62d9SStanislav Sedov getctty(kvm_t *kd, struct kinfo_proc *kp)
4090daf62d9SStanislav Sedov {
4100daf62d9SStanislav Sedov 	struct pgrp pgrp;
4110daf62d9SStanislav Sedov 	struct proc proc;
4120daf62d9SStanislav Sedov 	struct session sess;
4130daf62d9SStanislav Sedov 	int error;
4140daf62d9SStanislav Sedov 
4150daf62d9SStanislav Sedov 	assert(kp);
4160daf62d9SStanislav Sedov 	error = kvm_read_all(kd, (unsigned long)kp->ki_paddr, &proc,
4170daf62d9SStanislav Sedov 	    sizeof(proc));
4180daf62d9SStanislav Sedov 	if (error == 0) {
4190daf62d9SStanislav Sedov 		warnx("can't read proc struct at %p for pid %d",
4200daf62d9SStanislav Sedov 		    kp->ki_paddr, kp->ki_pid);
4210daf62d9SStanislav Sedov 		return (NULL);
4220daf62d9SStanislav Sedov 	}
4230daf62d9SStanislav Sedov 	if (proc.p_pgrp == NULL)
4240daf62d9SStanislav Sedov 		return (NULL);
4250daf62d9SStanislav Sedov 	error = kvm_read_all(kd, (unsigned long)proc.p_pgrp, &pgrp,
4260daf62d9SStanislav Sedov 	    sizeof(pgrp));
4270daf62d9SStanislav Sedov 	if (error == 0) {
4280daf62d9SStanislav Sedov 		warnx("can't read pgrp struct at %p for pid %d",
4290daf62d9SStanislav Sedov 		    proc.p_pgrp, kp->ki_pid);
4300daf62d9SStanislav Sedov 		return (NULL);
4310daf62d9SStanislav Sedov 	}
4320daf62d9SStanislav Sedov 	error = kvm_read_all(kd, (unsigned long)pgrp.pg_session, &sess,
4330daf62d9SStanislav Sedov 	    sizeof(sess));
4340daf62d9SStanislav Sedov 	if (error == 0) {
4350daf62d9SStanislav Sedov 		warnx("can't read session struct at %p for pid %d",
4360daf62d9SStanislav Sedov 		    pgrp.pg_session, kp->ki_pid);
4370daf62d9SStanislav Sedov 		return (NULL);
4380daf62d9SStanislav Sedov 	}
4390daf62d9SStanislav Sedov 	return (sess.s_ttyvp);
4400daf62d9SStanislav Sedov }
4410daf62d9SStanislav Sedov 
4428b75b1adSDoug Moore static int
procstat_vm_map_reader(void * token,vm_map_entry_t addr,vm_map_entry_t dest)4438b75b1adSDoug Moore procstat_vm_map_reader(void *token, vm_map_entry_t addr, vm_map_entry_t dest)
4448b75b1adSDoug Moore {
4458b75b1adSDoug Moore 	kvm_t *kd;
4468b75b1adSDoug Moore 
4478b75b1adSDoug Moore 	kd = (kvm_t *)token;
4488b75b1adSDoug Moore 	return (kvm_read_all(kd, (unsigned long)addr, dest, sizeof(*dest)));
4498b75b1adSDoug Moore }
4508b75b1adSDoug Moore 
4510daf62d9SStanislav Sedov static struct filestat_list *
procstat_getfiles_kvm(struct procstat * procstat,struct kinfo_proc * kp,int mmapped)4520daf62d9SStanislav Sedov procstat_getfiles_kvm(struct procstat *procstat, struct kinfo_proc *kp, int mmapped)
4530daf62d9SStanislav Sedov {
4540daf62d9SStanislav Sedov 	struct file file;
4550daf62d9SStanislav Sedov 	struct filedesc filed;
45685078b85SConrad Meyer 	struct pwddesc pathsd;
457f1221c59SMateusz Guzik 	struct fdescenttbl *fdt;
4588d03b99bSMateusz Guzik 	struct pwd pwd;
459d2222aa0SMateusz Guzik 	unsigned long pwd_addr;
4600daf62d9SStanislav Sedov 	struct vm_map_entry vmentry;
4610daf62d9SStanislav Sedov 	struct vm_object object;
4620daf62d9SStanislav Sedov 	struct vmspace vmspace;
4630daf62d9SStanislav Sedov 	vm_map_entry_t entryp;
4640daf62d9SStanislav Sedov 	vm_object_t objp;
4650daf62d9SStanislav Sedov 	struct vnode *vp;
4660daf62d9SStanislav Sedov 	struct filestat *entry;
4670daf62d9SStanislav Sedov 	struct filestat_list *head;
4680daf62d9SStanislav Sedov 	kvm_t *kd;
4690daf62d9SStanislav Sedov 	void *data;
470f1221c59SMateusz Guzik 	int fflags;
471f1221c59SMateusz Guzik 	unsigned int i;
4720daf62d9SStanislav Sedov 	int prot, type;
473f1221c59SMateusz Guzik 	size_t fdt_size;
4740daf62d9SStanislav Sedov 	unsigned int nfiles;
4758d03b99bSMateusz Guzik 	bool haspwd;
4760daf62d9SStanislav Sedov 
4770daf62d9SStanislav Sedov 	assert(procstat);
4780daf62d9SStanislav Sedov 	kd = procstat->kd;
4790daf62d9SStanislav Sedov 	if (kd == NULL)
4800daf62d9SStanislav Sedov 		return (NULL);
48185078b85SConrad Meyer 	if (kp->ki_fd == NULL || kp->ki_pd == NULL)
4820daf62d9SStanislav Sedov 		return (NULL);
4830daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)kp->ki_fd, &filed,
4840daf62d9SStanislav Sedov 	    sizeof(filed))) {
4850daf62d9SStanislav Sedov 		warnx("can't read filedesc at %p", (void *)kp->ki_fd);
4860daf62d9SStanislav Sedov 		return (NULL);
4870daf62d9SStanislav Sedov 	}
48885078b85SConrad Meyer 	if (!kvm_read_all(kd, (unsigned long)kp->ki_pd, &pathsd,
48985078b85SConrad Meyer 	    sizeof(pathsd))) {
49085078b85SConrad Meyer 		warnx("can't read pwddesc at %p", (void *)kp->ki_pd);
49185078b85SConrad Meyer 		return (NULL);
49285078b85SConrad Meyer 	}
4938d03b99bSMateusz Guzik 	haspwd = false;
49485078b85SConrad Meyer 	pwd_addr = (unsigned long)(PWDDESC_KVM_LOAD_PWD(&pathsd));
495d2222aa0SMateusz Guzik 	if (pwd_addr != 0) {
496d2222aa0SMateusz Guzik 		if (!kvm_read_all(kd, pwd_addr, &pwd, sizeof(pwd))) {
497d2222aa0SMateusz Guzik 			warnx("can't read fd_pwd at %p", (void *)pwd_addr);
4988d03b99bSMateusz Guzik 			return (NULL);
4998d03b99bSMateusz Guzik 		}
5008d03b99bSMateusz Guzik 		haspwd = true;
5018d03b99bSMateusz Guzik 	}
5020daf62d9SStanislav Sedov 
5030daf62d9SStanislav Sedov 	/*
5040daf62d9SStanislav Sedov 	 * Allocate list head.
5050daf62d9SStanislav Sedov 	 */
5060daf62d9SStanislav Sedov 	head = malloc(sizeof(*head));
5070daf62d9SStanislav Sedov 	if (head == NULL)
5080daf62d9SStanislav Sedov 		return (NULL);
5090daf62d9SStanislav Sedov 	STAILQ_INIT(head);
5100daf62d9SStanislav Sedov 
5110daf62d9SStanislav Sedov 	/* root directory vnode, if one. */
5128d03b99bSMateusz Guzik 	if (haspwd) {
5138d03b99bSMateusz Guzik 		if (pwd.pwd_rdir) {
5148d03b99bSMateusz Guzik 			entry = filestat_new_entry(pwd.pwd_rdir, PS_FST_TYPE_VNODE, -1,
515772f6645SPawel Jakub Dawidek 			    PS_FST_FFLAG_READ, PS_FST_UFLAG_RDIR, 0, 0, NULL, NULL);
5160daf62d9SStanislav Sedov 			if (entry != NULL)
5170daf62d9SStanislav Sedov 				STAILQ_INSERT_TAIL(head, entry, next);
5180daf62d9SStanislav Sedov 		}
5190daf62d9SStanislav Sedov 		/* current working directory vnode. */
5208d03b99bSMateusz Guzik 		if (pwd.pwd_cdir) {
5218d03b99bSMateusz Guzik 			entry = filestat_new_entry(pwd.pwd_cdir, PS_FST_TYPE_VNODE, -1,
522772f6645SPawel Jakub Dawidek 			    PS_FST_FFLAG_READ, PS_FST_UFLAG_CDIR, 0, 0, NULL, NULL);
5230daf62d9SStanislav Sedov 			if (entry != NULL)
5240daf62d9SStanislav Sedov 				STAILQ_INSERT_TAIL(head, entry, next);
5250daf62d9SStanislav Sedov 		}
5260daf62d9SStanislav Sedov 		/* jail root, if any. */
5278d03b99bSMateusz Guzik 		if (pwd.pwd_jdir) {
5288d03b99bSMateusz Guzik 			entry = filestat_new_entry(pwd.pwd_jdir, PS_FST_TYPE_VNODE, -1,
529772f6645SPawel Jakub Dawidek 			    PS_FST_FFLAG_READ, PS_FST_UFLAG_JAIL, 0, 0, NULL, NULL);
5300daf62d9SStanislav Sedov 			if (entry != NULL)
5310daf62d9SStanislav Sedov 				STAILQ_INSERT_TAIL(head, entry, next);
5320daf62d9SStanislav Sedov 		}
5338d03b99bSMateusz Guzik 	}
5340daf62d9SStanislav Sedov 	/* ktrace vnode, if one */
5350daf62d9SStanislav Sedov 	if (kp->ki_tracep) {
5360daf62d9SStanislav Sedov 		entry = filestat_new_entry(kp->ki_tracep, PS_FST_TYPE_VNODE, -1,
5370daf62d9SStanislav Sedov 		    PS_FST_FFLAG_READ | PS_FST_FFLAG_WRITE,
538772f6645SPawel Jakub Dawidek 		    PS_FST_UFLAG_TRACE, 0, 0, NULL, NULL);
5390daf62d9SStanislav Sedov 		if (entry != NULL)
5400daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
5410daf62d9SStanislav Sedov 	}
5420daf62d9SStanislav Sedov 	/* text vnode, if one */
5430daf62d9SStanislav Sedov 	if (kp->ki_textvp) {
5440daf62d9SStanislav Sedov 		entry = filestat_new_entry(kp->ki_textvp, PS_FST_TYPE_VNODE, -1,
545772f6645SPawel Jakub Dawidek 		    PS_FST_FFLAG_READ, PS_FST_UFLAG_TEXT, 0, 0, NULL, NULL);
5460daf62d9SStanislav Sedov 		if (entry != NULL)
5470daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
5480daf62d9SStanislav Sedov 	}
5490daf62d9SStanislav Sedov 	/* Controlling terminal. */
5500daf62d9SStanislav Sedov 	if ((vp = getctty(kd, kp)) != NULL) {
5510daf62d9SStanislav Sedov 		entry = filestat_new_entry(vp, PS_FST_TYPE_VNODE, -1,
5520daf62d9SStanislav Sedov 		    PS_FST_FFLAG_READ | PS_FST_FFLAG_WRITE,
553772f6645SPawel Jakub Dawidek 		    PS_FST_UFLAG_CTTY, 0, 0, NULL, NULL);
5540daf62d9SStanislav Sedov 		if (entry != NULL)
5550daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
5560daf62d9SStanislav Sedov 	}
5570daf62d9SStanislav Sedov 
558f1221c59SMateusz Guzik 	if (!kvm_read_all(kd, (unsigned long)filed.fd_files, &nfiles,
559f1221c59SMateusz Guzik 	    sizeof(nfiles))) {
560f1221c59SMateusz Guzik 		warnx("can't read fd_files at %p", (void *)filed.fd_files);
561f1221c59SMateusz Guzik 		return (NULL);
562f1221c59SMateusz Guzik 	}
563f1221c59SMateusz Guzik 
564f1221c59SMateusz Guzik 	fdt_size = sizeof(*fdt) + nfiles * sizeof(struct filedescent);
565f1221c59SMateusz Guzik 	fdt = malloc(fdt_size);
566f1221c59SMateusz Guzik 	if (fdt == NULL) {
567f1221c59SMateusz Guzik 		warn("malloc(%zu)", fdt_size);
5680daf62d9SStanislav Sedov 		goto do_mmapped;
5690daf62d9SStanislav Sedov 	}
570f1221c59SMateusz Guzik 	if (!kvm_read_all(kd, (unsigned long)filed.fd_files, fdt, fdt_size)) {
571f1221c59SMateusz Guzik 		warnx("cannot read file structures at %p", (void *)filed.fd_files);
572f1221c59SMateusz Guzik 		free(fdt);
5730daf62d9SStanislav Sedov 		goto do_mmapped;
5740daf62d9SStanislav Sedov 	}
575f1221c59SMateusz Guzik 	for (i = 0; i < nfiles; i++) {
576f1221c59SMateusz Guzik 		if (fdt->fdt_ofiles[i].fde_file == NULL) {
5770daf62d9SStanislav Sedov 			continue;
578f1221c59SMateusz Guzik 		}
579f1221c59SMateusz Guzik 		if (!kvm_read_all(kd, (unsigned long)fdt->fdt_ofiles[i].fde_file, &file,
5800daf62d9SStanislav Sedov 		    sizeof(struct file))) {
5810daf62d9SStanislav Sedov 			warnx("can't read file %d at %p", i,
582f1221c59SMateusz Guzik 			    (void *)fdt->fdt_ofiles[i].fde_file);
5830daf62d9SStanislav Sedov 			continue;
5840daf62d9SStanislav Sedov 		}
5850daf62d9SStanislav Sedov 		switch (file.f_type) {
5860daf62d9SStanislav Sedov 		case DTYPE_VNODE:
5870daf62d9SStanislav Sedov 			type = PS_FST_TYPE_VNODE;
5880daf62d9SStanislav Sedov 			data = file.f_vnode;
5890daf62d9SStanislav Sedov 			break;
5900daf62d9SStanislav Sedov 		case DTYPE_SOCKET:
5910daf62d9SStanislav Sedov 			type = PS_FST_TYPE_SOCKET;
5920daf62d9SStanislav Sedov 			data = file.f_data;
5930daf62d9SStanislav Sedov 			break;
5940daf62d9SStanislav Sedov 		case DTYPE_PIPE:
5950daf62d9SStanislav Sedov 			type = PS_FST_TYPE_PIPE;
5960daf62d9SStanislav Sedov 			data = file.f_data;
5970daf62d9SStanislav Sedov 			break;
5980daf62d9SStanislav Sedov 		case DTYPE_FIFO:
5990daf62d9SStanislav Sedov 			type = PS_FST_TYPE_FIFO;
6000daf62d9SStanislav Sedov 			data = file.f_vnode;
6010daf62d9SStanislav Sedov 			break;
6020daf62d9SStanislav Sedov #ifdef DTYPE_PTS
6030daf62d9SStanislav Sedov 		case DTYPE_PTS:
6040daf62d9SStanislav Sedov 			type = PS_FST_TYPE_PTS;
6050daf62d9SStanislav Sedov 			data = file.f_data;
6060daf62d9SStanislav Sedov 			break;
6070daf62d9SStanislav Sedov #endif
608958aa575SJohn Baldwin 		case DTYPE_SEM:
609958aa575SJohn Baldwin 			type = PS_FST_TYPE_SEM;
610958aa575SJohn Baldwin 			data = file.f_data;
611958aa575SJohn Baldwin 			break;
612e506e182SJohn Baldwin 		case DTYPE_SHM:
613e506e182SJohn Baldwin 			type = PS_FST_TYPE_SHM;
614e506e182SJohn Baldwin 			data = file.f_data;
615e506e182SJohn Baldwin 			break;
6163cfa7c6eSEdward Tomasz Napierala 		case DTYPE_PROCDESC:
6173cfa7c6eSEdward Tomasz Napierala 			type = PS_FST_TYPE_PROCDESC;
6183cfa7c6eSEdward Tomasz Napierala 			data = file.f_data;
6193cfa7c6eSEdward Tomasz Napierala 			break;
620a66732deSKonstantin Belousov 		case DTYPE_DEV:
621a66732deSKonstantin Belousov 			type = PS_FST_TYPE_DEV;
622a66732deSKonstantin Belousov 			data = file.f_data;
623a66732deSKonstantin Belousov 			break;
62467af9abaSKonstantin Belousov 		case DTYPE_EVENTFD:
62567af9abaSKonstantin Belousov 			type = PS_FST_TYPE_EVENTFD;
62667af9abaSKonstantin Belousov 			data = file.f_data;
62767af9abaSKonstantin Belousov 			break;
6280daf62d9SStanislav Sedov 		default:
6290daf62d9SStanislav Sedov 			continue;
6300daf62d9SStanislav Sedov 		}
631d57486e2SRobert Watson 		/* XXXRW: No capability rights support for kvm yet. */
6320daf62d9SStanislav Sedov 		entry = filestat_new_entry(data, type, i,
633772f6645SPawel Jakub Dawidek 		    to_filestat_flags(file.f_flag), 0, 0, 0, NULL, NULL);
6340daf62d9SStanislav Sedov 		if (entry != NULL)
6350daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
6360daf62d9SStanislav Sedov 	}
637f1221c59SMateusz Guzik 	free(fdt);
6380daf62d9SStanislav Sedov 
6390daf62d9SStanislav Sedov do_mmapped:
6400daf62d9SStanislav Sedov 
6410daf62d9SStanislav Sedov 	/*
6420daf62d9SStanislav Sedov 	 * Process mmapped files if requested.
6430daf62d9SStanislav Sedov 	 */
6440daf62d9SStanislav Sedov 	if (mmapped) {
6450daf62d9SStanislav Sedov 		if (!kvm_read_all(kd, (unsigned long)kp->ki_vmspace, &vmspace,
6460daf62d9SStanislav Sedov 		    sizeof(vmspace))) {
6470daf62d9SStanislav Sedov 			warnx("can't read vmspace at %p",
6480daf62d9SStanislav Sedov 			    (void *)kp->ki_vmspace);
6490daf62d9SStanislav Sedov 			goto exit;
6500daf62d9SStanislav Sedov 		}
6510daf62d9SStanislav Sedov 
6528b75b1adSDoug Moore 		vmentry = vmspace.vm_map.header;
6538b75b1adSDoug Moore 		for (entryp = vm_map_entry_read_succ(kd, &vmentry, procstat_vm_map_reader);
6548b75b1adSDoug Moore 		    entryp != NULL && entryp != &kp->ki_vmspace->vm_map.header;
6558b75b1adSDoug Moore 		     entryp = vm_map_entry_read_succ(kd, &vmentry, procstat_vm_map_reader)) {
6560daf62d9SStanislav Sedov 			if (vmentry.eflags & MAP_ENTRY_IS_SUB_MAP)
6570daf62d9SStanislav Sedov 				continue;
6580daf62d9SStanislav Sedov 			if ((objp = vmentry.object.vm_object) == NULL)
6590daf62d9SStanislav Sedov 				continue;
6600daf62d9SStanislav Sedov 			for (; objp; objp = object.backing_object) {
6610daf62d9SStanislav Sedov 				if (!kvm_read_all(kd, (unsigned long)objp,
6620daf62d9SStanislav Sedov 				    &object, sizeof(object))) {
6630daf62d9SStanislav Sedov 					warnx("can't read vm_object at %p",
6640daf62d9SStanislav Sedov 					    (void *)objp);
6650daf62d9SStanislav Sedov 					break;
6660daf62d9SStanislav Sedov 				}
6670daf62d9SStanislav Sedov 			}
6680daf62d9SStanislav Sedov 
6690daf62d9SStanislav Sedov 			/* We want only vnode objects. */
6700daf62d9SStanislav Sedov 			if (object.type != OBJT_VNODE)
6710daf62d9SStanislav Sedov 				continue;
6720daf62d9SStanislav Sedov 
6730daf62d9SStanislav Sedov 			prot = vmentry.protection;
6740daf62d9SStanislav Sedov 			fflags = 0;
6750daf62d9SStanislav Sedov 			if (prot & VM_PROT_READ)
6760daf62d9SStanislav Sedov 				fflags = PS_FST_FFLAG_READ;
677279a233dSJilles Tjoelker 			if ((vmentry.eflags & MAP_ENTRY_COW) == 0 &&
678279a233dSJilles Tjoelker 			    prot & VM_PROT_WRITE)
6790daf62d9SStanislav Sedov 				fflags |= PS_FST_FFLAG_WRITE;
6800daf62d9SStanislav Sedov 
6810daf62d9SStanislav Sedov 			/*
6820daf62d9SStanislav Sedov 			 * Create filestat entry.
6830daf62d9SStanislav Sedov 			 */
6840daf62d9SStanislav Sedov 			entry = filestat_new_entry(object.handle,
6850daf62d9SStanislav Sedov 			    PS_FST_TYPE_VNODE, -1, fflags,
686772f6645SPawel Jakub Dawidek 			    PS_FST_UFLAG_MMAP, 0, 0, NULL, NULL);
6870daf62d9SStanislav Sedov 			if (entry != NULL)
6880daf62d9SStanislav Sedov 				STAILQ_INSERT_TAIL(head, entry, next);
6890daf62d9SStanislav Sedov 		}
6908b75b1adSDoug Moore 		if (entryp == NULL)
6918b75b1adSDoug Moore 			warnx("can't read vm_map_entry");
6920daf62d9SStanislav Sedov 	}
6930daf62d9SStanislav Sedov exit:
6940daf62d9SStanislav Sedov 	return (head);
6950daf62d9SStanislav Sedov }
6960daf62d9SStanislav Sedov 
6970daf62d9SStanislav Sedov /*
6980daf62d9SStanislav Sedov  * kinfo types to filestat translation.
6990daf62d9SStanislav Sedov  */
7000daf62d9SStanislav Sedov static int
kinfo_type2fst(int kftype)7010daf62d9SStanislav Sedov kinfo_type2fst(int kftype)
7020daf62d9SStanislav Sedov {
7030daf62d9SStanislav Sedov 	static struct {
7040daf62d9SStanislav Sedov 		int	kf_type;
7050daf62d9SStanislav Sedov 		int	fst_type;
7060daf62d9SStanislav Sedov 	} kftypes2fst[] = {
7073cfa7c6eSEdward Tomasz Napierala 		{ KF_TYPE_PROCDESC, PS_FST_TYPE_PROCDESC },
708a66732deSKonstantin Belousov 		{ KF_TYPE_DEV, PS_FST_TYPE_DEV },
7090daf62d9SStanislav Sedov 		{ KF_TYPE_FIFO, PS_FST_TYPE_FIFO },
7100daf62d9SStanislav Sedov 		{ KF_TYPE_KQUEUE, PS_FST_TYPE_KQUEUE },
7110daf62d9SStanislav Sedov 		{ KF_TYPE_MQUEUE, PS_FST_TYPE_MQUEUE },
7120daf62d9SStanislav Sedov 		{ KF_TYPE_NONE, PS_FST_TYPE_NONE },
7130daf62d9SStanislav Sedov 		{ KF_TYPE_PIPE, PS_FST_TYPE_PIPE },
7140daf62d9SStanislav Sedov 		{ KF_TYPE_PTS, PS_FST_TYPE_PTS },
7150daf62d9SStanislav Sedov 		{ KF_TYPE_SEM, PS_FST_TYPE_SEM },
7160daf62d9SStanislav Sedov 		{ KF_TYPE_SHM, PS_FST_TYPE_SHM },
7170daf62d9SStanislav Sedov 		{ KF_TYPE_SOCKET, PS_FST_TYPE_SOCKET },
7180daf62d9SStanislav Sedov 		{ KF_TYPE_VNODE, PS_FST_TYPE_VNODE },
71967af9abaSKonstantin Belousov 		{ KF_TYPE_EVENTFD, PS_FST_TYPE_EVENTFD },
7200daf62d9SStanislav Sedov 		{ KF_TYPE_UNKNOWN, PS_FST_TYPE_UNKNOWN }
7210daf62d9SStanislav Sedov 	};
7220daf62d9SStanislav Sedov #define NKFTYPES	(sizeof(kftypes2fst) / sizeof(*kftypes2fst))
7230daf62d9SStanislav Sedov 	unsigned int i;
7240daf62d9SStanislav Sedov 
7250daf62d9SStanislav Sedov 	for (i = 0; i < NKFTYPES; i++)
7260daf62d9SStanislav Sedov 		if (kftypes2fst[i].kf_type == kftype)
7270daf62d9SStanislav Sedov 			break;
7280daf62d9SStanislav Sedov 	if (i == NKFTYPES)
7290daf62d9SStanislav Sedov 		return (PS_FST_TYPE_UNKNOWN);
7300daf62d9SStanislav Sedov 	return (kftypes2fst[i].fst_type);
7310daf62d9SStanislav Sedov }
7320daf62d9SStanislav Sedov 
7330daf62d9SStanislav Sedov /*
7340daf62d9SStanislav Sedov  * kinfo flags to filestat translation.
7350daf62d9SStanislav Sedov  */
7360daf62d9SStanislav Sedov static int
kinfo_fflags2fst(int kfflags)7370daf62d9SStanislav Sedov kinfo_fflags2fst(int kfflags)
7380daf62d9SStanislav Sedov {
7390daf62d9SStanislav Sedov 	static struct {
7400daf62d9SStanislav Sedov 		int	kf_flag;
7410daf62d9SStanislav Sedov 		int	fst_flag;
7420daf62d9SStanislav Sedov 	} kfflags2fst[] = {
7430daf62d9SStanislav Sedov 		{ KF_FLAG_APPEND, PS_FST_FFLAG_APPEND },
7440daf62d9SStanislav Sedov 		{ KF_FLAG_ASYNC, PS_FST_FFLAG_ASYNC },
7450daf62d9SStanislav Sedov 		{ KF_FLAG_CREAT, PS_FST_FFLAG_CREAT },
7460daf62d9SStanislav Sedov 		{ KF_FLAG_DIRECT, PS_FST_FFLAG_DIRECT },
7470daf62d9SStanislav Sedov 		{ KF_FLAG_EXCL, PS_FST_FFLAG_EXCL },
7480daf62d9SStanislav Sedov 		{ KF_FLAG_EXEC, PS_FST_FFLAG_EXEC },
7490daf62d9SStanislav Sedov 		{ KF_FLAG_EXLOCK, PS_FST_FFLAG_EXLOCK },
7500daf62d9SStanislav Sedov 		{ KF_FLAG_FSYNC, PS_FST_FFLAG_SYNC },
7510daf62d9SStanislav Sedov 		{ KF_FLAG_HASLOCK, PS_FST_FFLAG_HASLOCK },
7520daf62d9SStanislav Sedov 		{ KF_FLAG_NOFOLLOW, PS_FST_FFLAG_NOFOLLOW },
7530daf62d9SStanislav Sedov 		{ KF_FLAG_NONBLOCK, PS_FST_FFLAG_NONBLOCK },
7540daf62d9SStanislav Sedov 		{ KF_FLAG_READ, PS_FST_FFLAG_READ },
7550daf62d9SStanislav Sedov 		{ KF_FLAG_SHLOCK, PS_FST_FFLAG_SHLOCK },
7560daf62d9SStanislav Sedov 		{ KF_FLAG_TRUNC, PS_FST_FFLAG_TRUNC },
7570daf62d9SStanislav Sedov 		{ KF_FLAG_WRITE, PS_FST_FFLAG_WRITE }
7580daf62d9SStanislav Sedov 	};
7590daf62d9SStanislav Sedov #define NKFFLAGS	(sizeof(kfflags2fst) / sizeof(*kfflags2fst))
7600daf62d9SStanislav Sedov 	unsigned int i;
7610daf62d9SStanislav Sedov 	int flags;
7620daf62d9SStanislav Sedov 
7630daf62d9SStanislav Sedov 	flags = 0;
7640daf62d9SStanislav Sedov 	for (i = 0; i < NKFFLAGS; i++)
7650daf62d9SStanislav Sedov 		if ((kfflags & kfflags2fst[i].kf_flag) != 0)
7660daf62d9SStanislav Sedov 			flags |= kfflags2fst[i].fst_flag;
7670daf62d9SStanislav Sedov 	return (flags);
7680daf62d9SStanislav Sedov }
7690daf62d9SStanislav Sedov 
7700daf62d9SStanislav Sedov static int
kinfo_uflags2fst(int fd)7710daf62d9SStanislav Sedov kinfo_uflags2fst(int fd)
7720daf62d9SStanislav Sedov {
7730daf62d9SStanislav Sedov 
7740daf62d9SStanislav Sedov 	switch (fd) {
7750daf62d9SStanislav Sedov 	case KF_FD_TYPE_CTTY:
7760daf62d9SStanislav Sedov 		return (PS_FST_UFLAG_CTTY);
7770daf62d9SStanislav Sedov 	case KF_FD_TYPE_CWD:
7780daf62d9SStanislav Sedov 		return (PS_FST_UFLAG_CDIR);
7790daf62d9SStanislav Sedov 	case KF_FD_TYPE_JAIL:
7800daf62d9SStanislav Sedov 		return (PS_FST_UFLAG_JAIL);
7810daf62d9SStanislav Sedov 	case KF_FD_TYPE_TEXT:
7820daf62d9SStanislav Sedov 		return (PS_FST_UFLAG_TEXT);
7830daf62d9SStanislav Sedov 	case KF_FD_TYPE_TRACE:
7840daf62d9SStanislav Sedov 		return (PS_FST_UFLAG_TRACE);
7850daf62d9SStanislav Sedov 	case KF_FD_TYPE_ROOT:
7860daf62d9SStanislav Sedov 		return (PS_FST_UFLAG_RDIR);
7870daf62d9SStanislav Sedov 	}
7880daf62d9SStanislav Sedov 	return (0);
7890daf62d9SStanislav Sedov }
7900daf62d9SStanislav Sedov 
7917153ad2bSMikolaj Golub static struct kinfo_file *
kinfo_getfile_core(struct procstat_core * core,int * cntp)7927153ad2bSMikolaj Golub kinfo_getfile_core(struct procstat_core *core, int *cntp)
7937153ad2bSMikolaj Golub {
7947153ad2bSMikolaj Golub 	int cnt;
7957153ad2bSMikolaj Golub 	size_t len;
7967153ad2bSMikolaj Golub 	char *buf, *bp, *eb;
7977153ad2bSMikolaj Golub 	struct kinfo_file *kif, *kp, *kf;
7987153ad2bSMikolaj Golub 
7997153ad2bSMikolaj Golub 	buf = procstat_core_get(core, PSC_TYPE_FILES, NULL, &len);
8007153ad2bSMikolaj Golub 	if (buf == NULL)
8017153ad2bSMikolaj Golub 		return (NULL);
8027153ad2bSMikolaj Golub 	/*
8037153ad2bSMikolaj Golub 	 * XXXMG: The code below is just copy&past from libutil.
8047153ad2bSMikolaj Golub 	 * The code duplication can be avoided if libutil
8057153ad2bSMikolaj Golub 	 * is extended to provide something like:
8067153ad2bSMikolaj Golub 	 *   struct kinfo_file *kinfo_getfile_from_buf(const char *buf,
8077153ad2bSMikolaj Golub 	 *       size_t len, int *cntp);
8087153ad2bSMikolaj Golub 	 */
8097153ad2bSMikolaj Golub 
8107153ad2bSMikolaj Golub 	/* Pass 1: count items */
8117153ad2bSMikolaj Golub 	cnt = 0;
8127153ad2bSMikolaj Golub 	bp = buf;
8137153ad2bSMikolaj Golub 	eb = buf + len;
8147153ad2bSMikolaj Golub 	while (bp < eb) {
8157153ad2bSMikolaj Golub 		kf = (struct kinfo_file *)(uintptr_t)bp;
81614bdbaf2SConrad Meyer 		if (kf->kf_structsize == 0)
81714bdbaf2SConrad Meyer 			break;
8187153ad2bSMikolaj Golub 		bp += kf->kf_structsize;
8197153ad2bSMikolaj Golub 		cnt++;
8207153ad2bSMikolaj Golub 	}
8217153ad2bSMikolaj Golub 
8227153ad2bSMikolaj Golub 	kif = calloc(cnt, sizeof(*kif));
8237153ad2bSMikolaj Golub 	if (kif == NULL) {
8247153ad2bSMikolaj Golub 		free(buf);
8257153ad2bSMikolaj Golub 		return (NULL);
8267153ad2bSMikolaj Golub 	}
8277153ad2bSMikolaj Golub 	bp = buf;
8287153ad2bSMikolaj Golub 	eb = buf + len;
8297153ad2bSMikolaj Golub 	kp = kif;
8307153ad2bSMikolaj Golub 	/* Pass 2: unpack */
8317153ad2bSMikolaj Golub 	while (bp < eb) {
8327153ad2bSMikolaj Golub 		kf = (struct kinfo_file *)(uintptr_t)bp;
83314bdbaf2SConrad Meyer 		if (kf->kf_structsize == 0)
83414bdbaf2SConrad Meyer 			break;
8357153ad2bSMikolaj Golub 		/* Copy/expand into pre-zeroed buffer */
8367153ad2bSMikolaj Golub 		memcpy(kp, kf, kf->kf_structsize);
8377153ad2bSMikolaj Golub 		/* Advance to next packed record */
8387153ad2bSMikolaj Golub 		bp += kf->kf_structsize;
8397153ad2bSMikolaj Golub 		/* Set field size to fixed length, advance */
8407153ad2bSMikolaj Golub 		kp->kf_structsize = sizeof(*kp);
8417153ad2bSMikolaj Golub 		kp++;
8427153ad2bSMikolaj Golub 	}
8437153ad2bSMikolaj Golub 	free(buf);
8447153ad2bSMikolaj Golub 	*cntp = cnt;
8457153ad2bSMikolaj Golub 	return (kif);	/* Caller must free() return value */
8467153ad2bSMikolaj Golub }
8477153ad2bSMikolaj Golub 
8480daf62d9SStanislav Sedov static struct filestat_list *
procstat_getfiles_sysctl(struct procstat * procstat,struct kinfo_proc * kp,int mmapped)8497153ad2bSMikolaj Golub procstat_getfiles_sysctl(struct procstat *procstat, struct kinfo_proc *kp,
8507153ad2bSMikolaj Golub     int mmapped)
8510daf62d9SStanislav Sedov {
8520daf62d9SStanislav Sedov 	struct kinfo_file *kif, *files;
8530daf62d9SStanislav Sedov 	struct kinfo_vmentry *kve, *vmentries;
8540daf62d9SStanislav Sedov 	struct filestat_list *head;
8550daf62d9SStanislav Sedov 	struct filestat *entry;
8560daf62d9SStanislav Sedov 	char *path;
8570daf62d9SStanislav Sedov 	off_t offset;
8580daf62d9SStanislav Sedov 	int cnt, fd, fflags;
8590daf62d9SStanislav Sedov 	int i, type, uflags;
8600daf62d9SStanislav Sedov 	int refcount;
861d57486e2SRobert Watson 	cap_rights_t cap_rights;
8620daf62d9SStanislav Sedov 
8630daf62d9SStanislav Sedov 	assert(kp);
8647153ad2bSMikolaj Golub 	switch (procstat->type) {
8657153ad2bSMikolaj Golub 	case PROCSTAT_SYSCTL:
8660daf62d9SStanislav Sedov 		files = kinfo_getfile(kp->ki_pid, &cnt);
8677153ad2bSMikolaj Golub 		break;
8687153ad2bSMikolaj Golub 	case PROCSTAT_CORE:
8697153ad2bSMikolaj Golub 		files = kinfo_getfile_core(procstat->core, &cnt);
8707153ad2bSMikolaj Golub 		break;
8717153ad2bSMikolaj Golub 	default:
8727153ad2bSMikolaj Golub 		assert(!"invalid type");
8737153ad2bSMikolaj Golub 	}
8740daf62d9SStanislav Sedov 	if (files == NULL && errno != EPERM) {
8750daf62d9SStanislav Sedov 		warn("kinfo_getfile()");
8760daf62d9SStanislav Sedov 		return (NULL);
8770daf62d9SStanislav Sedov 	}
8780daf62d9SStanislav Sedov 	procstat->files = files;
8790daf62d9SStanislav Sedov 
8800daf62d9SStanislav Sedov 	/*
8810daf62d9SStanislav Sedov 	 * Allocate list head.
8820daf62d9SStanislav Sedov 	 */
8830daf62d9SStanislav Sedov 	head = malloc(sizeof(*head));
8840daf62d9SStanislav Sedov 	if (head == NULL)
8850daf62d9SStanislav Sedov 		return (NULL);
8860daf62d9SStanislav Sedov 	STAILQ_INIT(head);
8870daf62d9SStanislav Sedov 	for (i = 0; i < cnt; i++) {
8880daf62d9SStanislav Sedov 		kif = &files[i];
8890daf62d9SStanislav Sedov 
8900daf62d9SStanislav Sedov 		type = kinfo_type2fst(kif->kf_type);
8910daf62d9SStanislav Sedov 		fd = kif->kf_fd >= 0 ? kif->kf_fd : -1;
8920daf62d9SStanislav Sedov 		fflags = kinfo_fflags2fst(kif->kf_flags);
8930daf62d9SStanislav Sedov 		uflags = kinfo_uflags2fst(kif->kf_fd);
8940daf62d9SStanislav Sedov 		refcount = kif->kf_ref_count;
8950daf62d9SStanislav Sedov 		offset = kif->kf_offset;
8960daf62d9SStanislav Sedov 		if (*kif->kf_path != '\0')
8970daf62d9SStanislav Sedov 			path = strdup(kif->kf_path);
8980daf62d9SStanislav Sedov 		else
8990daf62d9SStanislav Sedov 			path = NULL;
900d57486e2SRobert Watson 		cap_rights = kif->kf_cap_rights;
9010daf62d9SStanislav Sedov 
9020daf62d9SStanislav Sedov 		/*
9030daf62d9SStanislav Sedov 		 * Create filestat entry.
9040daf62d9SStanislav Sedov 		 */
9050daf62d9SStanislav Sedov 		entry = filestat_new_entry(kif, type, fd, fflags, uflags,
9067008be5bSPawel Jakub Dawidek 		    refcount, offset, path, &cap_rights);
9070daf62d9SStanislav Sedov 		if (entry != NULL)
9080daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
9090daf62d9SStanislav Sedov 	}
9100daf62d9SStanislav Sedov 	if (mmapped != 0) {
91139680c7bSMikolaj Golub 		vmentries = procstat_getvmmap(procstat, kp, &cnt);
9120daf62d9SStanislav Sedov 		procstat->vmentries = vmentries;
9130daf62d9SStanislav Sedov 		if (vmentries == NULL || cnt == 0)
9140daf62d9SStanislav Sedov 			goto fail;
9150daf62d9SStanislav Sedov 		for (i = 0; i < cnt; i++) {
9160daf62d9SStanislav Sedov 			kve = &vmentries[i];
9170daf62d9SStanislav Sedov 			if (kve->kve_type != KVME_TYPE_VNODE)
9180daf62d9SStanislav Sedov 				continue;
9190daf62d9SStanislav Sedov 			fflags = 0;
9200daf62d9SStanislav Sedov 			if (kve->kve_protection & KVME_PROT_READ)
9210daf62d9SStanislav Sedov 				fflags = PS_FST_FFLAG_READ;
922279a233dSJilles Tjoelker 			if ((kve->kve_flags & KVME_FLAG_COW) == 0 &&
923279a233dSJilles Tjoelker 			    kve->kve_protection & KVME_PROT_WRITE)
9240daf62d9SStanislav Sedov 				fflags |= PS_FST_FFLAG_WRITE;
9250daf62d9SStanislav Sedov 			offset = kve->kve_offset;
9260daf62d9SStanislav Sedov 			refcount = kve->kve_ref_count;
9270daf62d9SStanislav Sedov 			if (*kve->kve_path != '\0')
9280daf62d9SStanislav Sedov 				path = strdup(kve->kve_path);
9290daf62d9SStanislav Sedov 			else
9300daf62d9SStanislav Sedov 				path = NULL;
9310daf62d9SStanislav Sedov 			entry = filestat_new_entry(kve, PS_FST_TYPE_VNODE, -1,
932d57486e2SRobert Watson 			    fflags, PS_FST_UFLAG_MMAP, refcount, offset, path,
933772f6645SPawel Jakub Dawidek 			    NULL);
9340daf62d9SStanislav Sedov 			if (entry != NULL)
9350daf62d9SStanislav Sedov 				STAILQ_INSERT_TAIL(head, entry, next);
9360daf62d9SStanislav Sedov 		}
9370daf62d9SStanislav Sedov 	}
9380daf62d9SStanislav Sedov fail:
9390daf62d9SStanislav Sedov 	return (head);
9400daf62d9SStanislav Sedov }
9410daf62d9SStanislav Sedov 
9420daf62d9SStanislav Sedov int
procstat_get_pipe_info(struct procstat * procstat,struct filestat * fst,struct pipestat * ps,char * errbuf)9430daf62d9SStanislav Sedov procstat_get_pipe_info(struct procstat *procstat, struct filestat *fst,
9440daf62d9SStanislav Sedov     struct pipestat *ps, char *errbuf)
9450daf62d9SStanislav Sedov {
9460daf62d9SStanislav Sedov 
9470daf62d9SStanislav Sedov 	assert(ps);
9480daf62d9SStanislav Sedov 	if (procstat->type == PROCSTAT_KVM) {
9490daf62d9SStanislav Sedov 		return (procstat_get_pipe_info_kvm(procstat->kd, fst, ps,
9500daf62d9SStanislav Sedov 		    errbuf));
9517153ad2bSMikolaj Golub 	} else if (procstat->type == PROCSTAT_SYSCTL ||
9527153ad2bSMikolaj Golub 		procstat->type == PROCSTAT_CORE) {
9530daf62d9SStanislav Sedov 		return (procstat_get_pipe_info_sysctl(fst, ps, errbuf));
9540daf62d9SStanislav Sedov 	} else {
95580905c35SJilles Tjoelker 		warnx("unknown access method: %d", procstat->type);
956467112b4SMikolaj Golub 		if (errbuf != NULL)
9570daf62d9SStanislav Sedov 			snprintf(errbuf, _POSIX2_LINE_MAX, "error");
9580daf62d9SStanislav Sedov 		return (1);
9590daf62d9SStanislav Sedov 	}
9600daf62d9SStanislav Sedov }
9610daf62d9SStanislav Sedov 
9620daf62d9SStanislav Sedov static int
procstat_get_pipe_info_kvm(kvm_t * kd,struct filestat * fst,struct pipestat * ps,char * errbuf)9630daf62d9SStanislav Sedov procstat_get_pipe_info_kvm(kvm_t *kd, struct filestat *fst,
9640daf62d9SStanislav Sedov     struct pipestat *ps, char *errbuf)
9650daf62d9SStanislav Sedov {
9660daf62d9SStanislav Sedov 	struct pipe pi;
9670daf62d9SStanislav Sedov 	void *pipep;
9680daf62d9SStanislav Sedov 
9690daf62d9SStanislav Sedov 	assert(kd);
9700daf62d9SStanislav Sedov 	assert(ps);
9710daf62d9SStanislav Sedov 	assert(fst);
9720daf62d9SStanislav Sedov 	bzero(ps, sizeof(*ps));
9730daf62d9SStanislav Sedov 	pipep = fst->fs_typedep;
9740daf62d9SStanislav Sedov 	if (pipep == NULL)
9750daf62d9SStanislav Sedov 		goto fail;
9760daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)pipep, &pi, sizeof(struct pipe))) {
9770daf62d9SStanislav Sedov 		warnx("can't read pipe at %p", (void *)pipep);
9780daf62d9SStanislav Sedov 		goto fail;
9790daf62d9SStanislav Sedov 	}
9800daf62d9SStanislav Sedov 	ps->addr = (uintptr_t)pipep;
9810daf62d9SStanislav Sedov 	ps->peer = (uintptr_t)pi.pipe_peer;
9820daf62d9SStanislav Sedov 	ps->buffer_cnt = pi.pipe_buffer.cnt;
9830daf62d9SStanislav Sedov 	return (0);
9840daf62d9SStanislav Sedov 
9850daf62d9SStanislav Sedov fail:
986467112b4SMikolaj Golub 	if (errbuf != NULL)
9870daf62d9SStanislav Sedov 		snprintf(errbuf, _POSIX2_LINE_MAX, "error");
9880daf62d9SStanislav Sedov 	return (1);
9890daf62d9SStanislav Sedov }
9900daf62d9SStanislav Sedov 
9910daf62d9SStanislav Sedov static int
procstat_get_pipe_info_sysctl(struct filestat * fst,struct pipestat * ps,char * errbuf __unused)9920daf62d9SStanislav Sedov procstat_get_pipe_info_sysctl(struct filestat *fst, struct pipestat *ps,
9930daf62d9SStanislav Sedov     char *errbuf __unused)
9940daf62d9SStanislav Sedov {
9950daf62d9SStanislav Sedov 	struct kinfo_file *kif;
9960daf62d9SStanislav Sedov 
9970daf62d9SStanislav Sedov 	assert(ps);
9980daf62d9SStanislav Sedov 	assert(fst);
9990daf62d9SStanislav Sedov 	bzero(ps, sizeof(*ps));
10000daf62d9SStanislav Sedov 	kif = fst->fs_typedep;
10010daf62d9SStanislav Sedov 	if (kif == NULL)
10020daf62d9SStanislav Sedov 		return (1);
10030daf62d9SStanislav Sedov 	ps->addr = kif->kf_un.kf_pipe.kf_pipe_addr;
10040daf62d9SStanislav Sedov 	ps->peer = kif->kf_un.kf_pipe.kf_pipe_peer;
10050daf62d9SStanislav Sedov 	ps->buffer_cnt = kif->kf_un.kf_pipe.kf_pipe_buffer_cnt;
10060daf62d9SStanislav Sedov 	return (0);
10070daf62d9SStanislav Sedov }
10080daf62d9SStanislav Sedov 
10090daf62d9SStanislav Sedov int
procstat_get_pts_info(struct procstat * procstat,struct filestat * fst,struct ptsstat * pts,char * errbuf)10100daf62d9SStanislav Sedov procstat_get_pts_info(struct procstat *procstat, struct filestat *fst,
10110daf62d9SStanislav Sedov     struct ptsstat *pts, char *errbuf)
10120daf62d9SStanislav Sedov {
10130daf62d9SStanislav Sedov 
10140daf62d9SStanislav Sedov 	assert(pts);
10150daf62d9SStanislav Sedov 	if (procstat->type == PROCSTAT_KVM) {
10160daf62d9SStanislav Sedov 		return (procstat_get_pts_info_kvm(procstat->kd, fst, pts,
10170daf62d9SStanislav Sedov 		    errbuf));
10187153ad2bSMikolaj Golub 	} else if (procstat->type == PROCSTAT_SYSCTL ||
10197153ad2bSMikolaj Golub 		procstat->type == PROCSTAT_CORE) {
10200daf62d9SStanislav Sedov 		return (procstat_get_pts_info_sysctl(fst, pts, errbuf));
10210daf62d9SStanislav Sedov 	} else {
102280905c35SJilles Tjoelker 		warnx("unknown access method: %d", procstat->type);
1023467112b4SMikolaj Golub 		if (errbuf != NULL)
10240daf62d9SStanislav Sedov 			snprintf(errbuf, _POSIX2_LINE_MAX, "error");
10250daf62d9SStanislav Sedov 		return (1);
10260daf62d9SStanislav Sedov 	}
10270daf62d9SStanislav Sedov }
10280daf62d9SStanislav Sedov 
10290daf62d9SStanislav Sedov static int
procstat_get_pts_info_kvm(kvm_t * kd,struct filestat * fst,struct ptsstat * pts,char * errbuf)10300daf62d9SStanislav Sedov procstat_get_pts_info_kvm(kvm_t *kd, struct filestat *fst,
10310daf62d9SStanislav Sedov     struct ptsstat *pts, char *errbuf)
10320daf62d9SStanislav Sedov {
10330daf62d9SStanislav Sedov 	struct tty tty;
10340daf62d9SStanislav Sedov 	void *ttyp;
10350daf62d9SStanislav Sedov 
10360daf62d9SStanislav Sedov 	assert(kd);
10370daf62d9SStanislav Sedov 	assert(pts);
10380daf62d9SStanislav Sedov 	assert(fst);
10390daf62d9SStanislav Sedov 	bzero(pts, sizeof(*pts));
10400daf62d9SStanislav Sedov 	ttyp = fst->fs_typedep;
10410daf62d9SStanislav Sedov 	if (ttyp == NULL)
10420daf62d9SStanislav Sedov 		goto fail;
10430daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)ttyp, &tty, sizeof(struct tty))) {
10440daf62d9SStanislav Sedov 		warnx("can't read tty at %p", (void *)ttyp);
10450daf62d9SStanislav Sedov 		goto fail;
10460daf62d9SStanislav Sedov 	}
10470daf62d9SStanislav Sedov 	pts->dev = dev2udev(kd, tty.t_dev);
10480daf62d9SStanislav Sedov 	(void)kdevtoname(kd, tty.t_dev, pts->devname);
10490daf62d9SStanislav Sedov 	return (0);
10500daf62d9SStanislav Sedov 
10510daf62d9SStanislav Sedov fail:
1052467112b4SMikolaj Golub 	if (errbuf != NULL)
10530daf62d9SStanislav Sedov 		snprintf(errbuf, _POSIX2_LINE_MAX, "error");
10540daf62d9SStanislav Sedov 	return (1);
10550daf62d9SStanislav Sedov }
10560daf62d9SStanislav Sedov 
10570daf62d9SStanislav Sedov static int
procstat_get_pts_info_sysctl(struct filestat * fst,struct ptsstat * pts,char * errbuf __unused)10580daf62d9SStanislav Sedov procstat_get_pts_info_sysctl(struct filestat *fst, struct ptsstat *pts,
10590daf62d9SStanislav Sedov     char *errbuf __unused)
10600daf62d9SStanislav Sedov {
10610daf62d9SStanislav Sedov 	struct kinfo_file *kif;
10620daf62d9SStanislav Sedov 
10630daf62d9SStanislav Sedov 	assert(pts);
10640daf62d9SStanislav Sedov 	assert(fst);
10650daf62d9SStanislav Sedov 	bzero(pts, sizeof(*pts));
10660daf62d9SStanislav Sedov 	kif = fst->fs_typedep;
10670daf62d9SStanislav Sedov 	if (kif == NULL)
10680daf62d9SStanislav Sedov 		return (0);
10690daf62d9SStanislav Sedov 	pts->dev = kif->kf_un.kf_pts.kf_pts_dev;
10700daf62d9SStanislav Sedov 	strlcpy(pts->devname, kif->kf_path, sizeof(pts->devname));
10710daf62d9SStanislav Sedov 	return (0);
10720daf62d9SStanislav Sedov }
10730daf62d9SStanislav Sedov 
10740daf62d9SStanislav Sedov int
procstat_get_sem_info(struct procstat * procstat,struct filestat * fst,struct semstat * sem,char * errbuf)1075958aa575SJohn Baldwin procstat_get_sem_info(struct procstat *procstat, struct filestat *fst,
1076958aa575SJohn Baldwin     struct semstat *sem, char *errbuf)
1077958aa575SJohn Baldwin {
1078958aa575SJohn Baldwin 
1079958aa575SJohn Baldwin 	assert(sem);
1080958aa575SJohn Baldwin 	if (procstat->type == PROCSTAT_KVM) {
1081958aa575SJohn Baldwin 		return (procstat_get_sem_info_kvm(procstat->kd, fst, sem,
1082958aa575SJohn Baldwin 		    errbuf));
1083958aa575SJohn Baldwin 	} else if (procstat->type == PROCSTAT_SYSCTL ||
1084958aa575SJohn Baldwin 	    procstat->type == PROCSTAT_CORE) {
1085958aa575SJohn Baldwin 		return (procstat_get_sem_info_sysctl(fst, sem, errbuf));
1086958aa575SJohn Baldwin 	} else {
1087958aa575SJohn Baldwin 		warnx("unknown access method: %d", procstat->type);
1088467112b4SMikolaj Golub 		if (errbuf != NULL)
1089958aa575SJohn Baldwin 			snprintf(errbuf, _POSIX2_LINE_MAX, "error");
1090958aa575SJohn Baldwin 		return (1);
1091958aa575SJohn Baldwin 	}
1092958aa575SJohn Baldwin }
1093958aa575SJohn Baldwin 
1094958aa575SJohn Baldwin static int
procstat_get_sem_info_kvm(kvm_t * kd,struct filestat * fst,struct semstat * sem,char * errbuf)1095958aa575SJohn Baldwin procstat_get_sem_info_kvm(kvm_t *kd, struct filestat *fst,
1096958aa575SJohn Baldwin     struct semstat *sem, char *errbuf)
1097958aa575SJohn Baldwin {
1098958aa575SJohn Baldwin 	struct ksem ksem;
1099958aa575SJohn Baldwin 	void *ksemp;
1100958aa575SJohn Baldwin 	char *path;
1101958aa575SJohn Baldwin 	int i;
1102958aa575SJohn Baldwin 
1103958aa575SJohn Baldwin 	assert(kd);
1104958aa575SJohn Baldwin 	assert(sem);
1105958aa575SJohn Baldwin 	assert(fst);
1106958aa575SJohn Baldwin 	bzero(sem, sizeof(*sem));
1107958aa575SJohn Baldwin 	ksemp = fst->fs_typedep;
1108958aa575SJohn Baldwin 	if (ksemp == NULL)
1109958aa575SJohn Baldwin 		goto fail;
1110958aa575SJohn Baldwin 	if (!kvm_read_all(kd, (unsigned long)ksemp, &ksem,
1111958aa575SJohn Baldwin 	    sizeof(struct ksem))) {
1112958aa575SJohn Baldwin 		warnx("can't read ksem at %p", (void *)ksemp);
1113958aa575SJohn Baldwin 		goto fail;
1114958aa575SJohn Baldwin 	}
1115958aa575SJohn Baldwin 	sem->mode = S_IFREG | ksem.ks_mode;
1116958aa575SJohn Baldwin 	sem->value = ksem.ks_value;
1117958aa575SJohn Baldwin 	if (fst->fs_path == NULL && ksem.ks_path != NULL) {
1118958aa575SJohn Baldwin 		path = malloc(MAXPATHLEN);
1119958aa575SJohn Baldwin 		for (i = 0; i < MAXPATHLEN - 1; i++) {
1120958aa575SJohn Baldwin 			if (!kvm_read_all(kd, (unsigned long)ksem.ks_path + i,
1121958aa575SJohn Baldwin 			    path + i, 1))
1122958aa575SJohn Baldwin 				break;
1123958aa575SJohn Baldwin 			if (path[i] == '\0')
1124958aa575SJohn Baldwin 				break;
1125958aa575SJohn Baldwin 		}
1126958aa575SJohn Baldwin 		path[i] = '\0';
1127958aa575SJohn Baldwin 		if (i == 0)
1128958aa575SJohn Baldwin 			free(path);
1129958aa575SJohn Baldwin 		else
1130958aa575SJohn Baldwin 			fst->fs_path = path;
1131958aa575SJohn Baldwin 	}
1132958aa575SJohn Baldwin 	return (0);
1133958aa575SJohn Baldwin 
1134958aa575SJohn Baldwin fail:
1135467112b4SMikolaj Golub 	if (errbuf != NULL)
1136958aa575SJohn Baldwin 		snprintf(errbuf, _POSIX2_LINE_MAX, "error");
1137958aa575SJohn Baldwin 	return (1);
1138958aa575SJohn Baldwin }
1139958aa575SJohn Baldwin 
1140958aa575SJohn Baldwin static int
procstat_get_sem_info_sysctl(struct filestat * fst,struct semstat * sem,char * errbuf __unused)1141958aa575SJohn Baldwin procstat_get_sem_info_sysctl(struct filestat *fst, struct semstat *sem,
1142958aa575SJohn Baldwin     char *errbuf __unused)
1143958aa575SJohn Baldwin {
1144958aa575SJohn Baldwin 	struct kinfo_file *kif;
1145958aa575SJohn Baldwin 
1146958aa575SJohn Baldwin 	assert(sem);
1147958aa575SJohn Baldwin 	assert(fst);
1148958aa575SJohn Baldwin 	bzero(sem, sizeof(*sem));
1149958aa575SJohn Baldwin 	kif = fst->fs_typedep;
1150958aa575SJohn Baldwin 	if (kif == NULL)
1151958aa575SJohn Baldwin 		return (0);
1152958aa575SJohn Baldwin 	sem->value = kif->kf_un.kf_sem.kf_sem_value;
1153958aa575SJohn Baldwin 	sem->mode = kif->kf_un.kf_sem.kf_sem_mode;
1154958aa575SJohn Baldwin 	return (0);
1155958aa575SJohn Baldwin }
1156958aa575SJohn Baldwin 
1157958aa575SJohn Baldwin int
procstat_get_shm_info(struct procstat * procstat,struct filestat * fst,struct shmstat * shm,char * errbuf)1158e506e182SJohn Baldwin procstat_get_shm_info(struct procstat *procstat, struct filestat *fst,
1159e506e182SJohn Baldwin     struct shmstat *shm, char *errbuf)
1160e506e182SJohn Baldwin {
1161e506e182SJohn Baldwin 
1162e506e182SJohn Baldwin 	assert(shm);
1163e506e182SJohn Baldwin 	if (procstat->type == PROCSTAT_KVM) {
1164e506e182SJohn Baldwin 		return (procstat_get_shm_info_kvm(procstat->kd, fst, shm,
1165e506e182SJohn Baldwin 		    errbuf));
11667153ad2bSMikolaj Golub 	} else if (procstat->type == PROCSTAT_SYSCTL ||
11677153ad2bSMikolaj Golub 	    procstat->type == PROCSTAT_CORE) {
1168e506e182SJohn Baldwin 		return (procstat_get_shm_info_sysctl(fst, shm, errbuf));
1169e506e182SJohn Baldwin 	} else {
1170e506e182SJohn Baldwin 		warnx("unknown access method: %d", procstat->type);
1171467112b4SMikolaj Golub 		if (errbuf != NULL)
1172e506e182SJohn Baldwin 			snprintf(errbuf, _POSIX2_LINE_MAX, "error");
1173e506e182SJohn Baldwin 		return (1);
1174e506e182SJohn Baldwin 	}
1175e506e182SJohn Baldwin }
1176e506e182SJohn Baldwin 
1177e506e182SJohn Baldwin static int
procstat_get_shm_info_kvm(kvm_t * kd,struct filestat * fst,struct shmstat * shm,char * errbuf)1178e506e182SJohn Baldwin procstat_get_shm_info_kvm(kvm_t *kd, struct filestat *fst,
1179e506e182SJohn Baldwin     struct shmstat *shm, char *errbuf)
1180e506e182SJohn Baldwin {
1181e506e182SJohn Baldwin 	struct shmfd shmfd;
1182e506e182SJohn Baldwin 	void *shmfdp;
1183a9f5e425SJohn Baldwin 	char *path;
1184a9f5e425SJohn Baldwin 	int i;
1185e506e182SJohn Baldwin 
1186e506e182SJohn Baldwin 	assert(kd);
1187e506e182SJohn Baldwin 	assert(shm);
1188e506e182SJohn Baldwin 	assert(fst);
1189e506e182SJohn Baldwin 	bzero(shm, sizeof(*shm));
1190e506e182SJohn Baldwin 	shmfdp = fst->fs_typedep;
1191e506e182SJohn Baldwin 	if (shmfdp == NULL)
1192e506e182SJohn Baldwin 		goto fail;
1193e506e182SJohn Baldwin 	if (!kvm_read_all(kd, (unsigned long)shmfdp, &shmfd,
1194e506e182SJohn Baldwin 	    sizeof(struct shmfd))) {
1195e506e182SJohn Baldwin 		warnx("can't read shmfd at %p", (void *)shmfdp);
1196e506e182SJohn Baldwin 		goto fail;
1197e506e182SJohn Baldwin 	}
1198e506e182SJohn Baldwin 	shm->mode = S_IFREG | shmfd.shm_mode;
1199e506e182SJohn Baldwin 	shm->size = shmfd.shm_size;
1200a9f5e425SJohn Baldwin 	if (fst->fs_path == NULL && shmfd.shm_path != NULL) {
1201a9f5e425SJohn Baldwin 		path = malloc(MAXPATHLEN);
1202a9f5e425SJohn Baldwin 		for (i = 0; i < MAXPATHLEN - 1; i++) {
1203a9f5e425SJohn Baldwin 			if (!kvm_read_all(kd, (unsigned long)shmfd.shm_path + i,
1204a9f5e425SJohn Baldwin 			    path + i, 1))
1205a9f5e425SJohn Baldwin 				break;
1206a9f5e425SJohn Baldwin 			if (path[i] == '\0')
1207a9f5e425SJohn Baldwin 				break;
1208a9f5e425SJohn Baldwin 		}
1209a9f5e425SJohn Baldwin 		path[i] = '\0';
1210a9f5e425SJohn Baldwin 		if (i == 0)
1211a9f5e425SJohn Baldwin 			free(path);
1212a9f5e425SJohn Baldwin 		else
1213a9f5e425SJohn Baldwin 			fst->fs_path = path;
1214a9f5e425SJohn Baldwin 	}
1215e506e182SJohn Baldwin 	return (0);
1216e506e182SJohn Baldwin 
1217e506e182SJohn Baldwin fail:
1218467112b4SMikolaj Golub 	if (errbuf != NULL)
1219e506e182SJohn Baldwin 		snprintf(errbuf, _POSIX2_LINE_MAX, "error");
1220e506e182SJohn Baldwin 	return (1);
1221e506e182SJohn Baldwin }
1222e506e182SJohn Baldwin 
1223e506e182SJohn Baldwin static int
procstat_get_shm_info_sysctl(struct filestat * fst,struct shmstat * shm,char * errbuf __unused)1224e506e182SJohn Baldwin procstat_get_shm_info_sysctl(struct filestat *fst, struct shmstat *shm,
1225e506e182SJohn Baldwin     char *errbuf __unused)
1226e506e182SJohn Baldwin {
1227e506e182SJohn Baldwin 	struct kinfo_file *kif;
1228e506e182SJohn Baldwin 
1229e506e182SJohn Baldwin 	assert(shm);
1230e506e182SJohn Baldwin 	assert(fst);
1231e506e182SJohn Baldwin 	bzero(shm, sizeof(*shm));
1232e506e182SJohn Baldwin 	kif = fst->fs_typedep;
1233e506e182SJohn Baldwin 	if (kif == NULL)
1234e506e182SJohn Baldwin 		return (0);
1235e506e182SJohn Baldwin 	shm->size = kif->kf_un.kf_file.kf_file_size;
1236e506e182SJohn Baldwin 	shm->mode = kif->kf_un.kf_file.kf_file_mode;
1237e506e182SJohn Baldwin 	return (0);
1238e506e182SJohn Baldwin }
1239e506e182SJohn Baldwin 
1240e506e182SJohn Baldwin int
procstat_get_vnode_info(struct procstat * procstat,struct filestat * fst,struct vnstat * vn,char * errbuf)12410daf62d9SStanislav Sedov procstat_get_vnode_info(struct procstat *procstat, struct filestat *fst,
12420daf62d9SStanislav Sedov     struct vnstat *vn, char *errbuf)
12430daf62d9SStanislav Sedov {
12440daf62d9SStanislav Sedov 
12450daf62d9SStanislav Sedov 	assert(vn);
12460daf62d9SStanislav Sedov 	if (procstat->type == PROCSTAT_KVM) {
12470daf62d9SStanislav Sedov 		return (procstat_get_vnode_info_kvm(procstat->kd, fst, vn,
12480daf62d9SStanislav Sedov 		    errbuf));
12497153ad2bSMikolaj Golub 	} else if (procstat->type == PROCSTAT_SYSCTL ||
12507153ad2bSMikolaj Golub 		procstat->type == PROCSTAT_CORE) {
12510daf62d9SStanislav Sedov 		return (procstat_get_vnode_info_sysctl(fst, vn, errbuf));
12520daf62d9SStanislav Sedov 	} else {
125380905c35SJilles Tjoelker 		warnx("unknown access method: %d", procstat->type);
1254467112b4SMikolaj Golub 		if (errbuf != NULL)
12550daf62d9SStanislav Sedov 			snprintf(errbuf, _POSIX2_LINE_MAX, "error");
12560daf62d9SStanislav Sedov 		return (1);
12570daf62d9SStanislav Sedov 	}
12580daf62d9SStanislav Sedov }
12590daf62d9SStanislav Sedov 
12600daf62d9SStanislav Sedov static int
procstat_get_vnode_info_kvm(kvm_t * kd,struct filestat * fst,struct vnstat * vn,char * errbuf)12610daf62d9SStanislav Sedov procstat_get_vnode_info_kvm(kvm_t *kd, struct filestat *fst,
12620daf62d9SStanislav Sedov     struct vnstat *vn, char *errbuf)
12630daf62d9SStanislav Sedov {
12640daf62d9SStanislav Sedov 	/* Filesystem specific handlers. */
12650daf62d9SStanislav Sedov 	#define FSTYPE(fst)     {#fst, fst##_filestat}
12660daf62d9SStanislav Sedov 	struct {
12670daf62d9SStanislav Sedov 		const char	*tag;
12680daf62d9SStanislav Sedov 		int		(*handler)(kvm_t *kd, struct vnode *vp,
12690daf62d9SStanislav Sedov 		    struct vnstat *vn);
12700daf62d9SStanislav Sedov 	} fstypes[] = {
12710daf62d9SStanislav Sedov 		FSTYPE(devfs),
12720daf62d9SStanislav Sedov 		FSTYPE(isofs),
12730daf62d9SStanislav Sedov 		FSTYPE(msdosfs),
12740daf62d9SStanislav Sedov 		FSTYPE(nfs),
1275237abf0cSDavide Italiano 		FSTYPE(smbfs),
12760daf62d9SStanislav Sedov 		FSTYPE(udf),
12770daf62d9SStanislav Sedov 		FSTYPE(ufs),
127859ea47d0SStanislav Sedov #ifdef LIBPROCSTAT_ZFS
12790daf62d9SStanislav Sedov 		FSTYPE(zfs),
12800daf62d9SStanislav Sedov #endif
12810daf62d9SStanislav Sedov 	};
12820daf62d9SStanislav Sedov #define	NTYPES	(sizeof(fstypes) / sizeof(*fstypes))
12830daf62d9SStanislav Sedov 	struct vnode vnode;
12840daf62d9SStanislav Sedov 	char tagstr[12];
12850daf62d9SStanislav Sedov 	void *vp;
1286a770b4d8SMarcelo Araujo 	int error;
12870daf62d9SStanislav Sedov 	unsigned int i;
12880daf62d9SStanislav Sedov 
12890daf62d9SStanislav Sedov 	assert(kd);
12900daf62d9SStanislav Sedov 	assert(vn);
12910daf62d9SStanislav Sedov 	assert(fst);
12920daf62d9SStanislav Sedov 	vp = fst->fs_typedep;
12930daf62d9SStanislav Sedov 	if (vp == NULL)
12940daf62d9SStanislav Sedov 		goto fail;
12950daf62d9SStanislav Sedov 	error = kvm_read_all(kd, (unsigned long)vp, &vnode, sizeof(vnode));
12960daf62d9SStanislav Sedov 	if (error == 0) {
12970daf62d9SStanislav Sedov 		warnx("can't read vnode at %p", (void *)vp);
12980daf62d9SStanislav Sedov 		goto fail;
12990daf62d9SStanislav Sedov 	}
13000daf62d9SStanislav Sedov 	bzero(vn, sizeof(*vn));
13010daf62d9SStanislav Sedov 	vn->vn_type = vntype2psfsttype(vnode.v_type);
13020daf62d9SStanislav Sedov 	if (vnode.v_type == VNON || vnode.v_type == VBAD)
13030daf62d9SStanislav Sedov 		return (0);
1304630cb9c5SMateusz Guzik 	error = kvm_read_all(kd, (unsigned long)vnode.v_lock.lock_object.lo_name,
1305630cb9c5SMateusz Guzik 	    tagstr, sizeof(tagstr));
13060daf62d9SStanislav Sedov 	if (error == 0) {
1307630cb9c5SMateusz Guzik 		warnx("can't read lo_name at %p", (void *)vp);
13080daf62d9SStanislav Sedov 		goto fail;
13090daf62d9SStanislav Sedov 	}
13100daf62d9SStanislav Sedov 	tagstr[sizeof(tagstr) - 1] = '\0';
13110daf62d9SStanislav Sedov 
13120daf62d9SStanislav Sedov 	/*
13130daf62d9SStanislav Sedov 	 * Find appropriate handler.
13140daf62d9SStanislav Sedov 	 */
1315a770b4d8SMarcelo Araujo 	for (i = 0; i < NTYPES; i++)
13160daf62d9SStanislav Sedov 		if (!strcmp(fstypes[i].tag, tagstr)) {
13170daf62d9SStanislav Sedov 			if (fstypes[i].handler(kd, &vnode, vn) != 0) {
13180daf62d9SStanislav Sedov 				goto fail;
13190daf62d9SStanislav Sedov 			}
13200daf62d9SStanislav Sedov 			break;
13210daf62d9SStanislav Sedov 		}
13220daf62d9SStanislav Sedov 	if (i == NTYPES) {
1323467112b4SMikolaj Golub 		if (errbuf != NULL)
13240daf62d9SStanislav Sedov 			snprintf(errbuf, _POSIX2_LINE_MAX, "?(%s)", tagstr);
13250daf62d9SStanislav Sedov 		return (1);
13260daf62d9SStanislav Sedov 	}
13270daf62d9SStanislav Sedov 	vn->vn_mntdir = getmnton(kd, vnode.v_mount);
13280daf62d9SStanislav Sedov 	if ((vnode.v_type == VBLK || vnode.v_type == VCHR) &&
13290daf62d9SStanislav Sedov 	    vnode.v_rdev != NULL){
13300daf62d9SStanislav Sedov 		vn->vn_dev = dev2udev(kd, vnode.v_rdev);
13310daf62d9SStanislav Sedov 		(void)kdevtoname(kd, vnode.v_rdev, vn->vn_devname);
13320daf62d9SStanislav Sedov 	} else {
13330daf62d9SStanislav Sedov 		vn->vn_dev = -1;
13340daf62d9SStanislav Sedov 	}
13350daf62d9SStanislav Sedov 	return (0);
13360daf62d9SStanislav Sedov 
13370daf62d9SStanislav Sedov fail:
1338467112b4SMikolaj Golub 	if (errbuf != NULL)
13390daf62d9SStanislav Sedov 		snprintf(errbuf, _POSIX2_LINE_MAX, "error");
13400daf62d9SStanislav Sedov 	return (1);
13410daf62d9SStanislav Sedov }
13420daf62d9SStanislav Sedov 
13430daf62d9SStanislav Sedov /*
13440daf62d9SStanislav Sedov  * kinfo vnode type to filestat translation.
13450daf62d9SStanislav Sedov  */
13460daf62d9SStanislav Sedov static int
kinfo_vtype2fst(int kfvtype)13470daf62d9SStanislav Sedov kinfo_vtype2fst(int kfvtype)
13480daf62d9SStanislav Sedov {
13490daf62d9SStanislav Sedov 	static struct {
13500daf62d9SStanislav Sedov 		int	kf_vtype;
13510daf62d9SStanislav Sedov 		int	fst_vtype;
13520daf62d9SStanislav Sedov 	} kfvtypes2fst[] = {
13530daf62d9SStanislav Sedov 		{ KF_VTYPE_VBAD, PS_FST_VTYPE_VBAD },
13540daf62d9SStanislav Sedov 		{ KF_VTYPE_VBLK, PS_FST_VTYPE_VBLK },
13550daf62d9SStanislav Sedov 		{ KF_VTYPE_VCHR, PS_FST_VTYPE_VCHR },
13560daf62d9SStanislav Sedov 		{ KF_VTYPE_VDIR, PS_FST_VTYPE_VDIR },
13570daf62d9SStanislav Sedov 		{ KF_VTYPE_VFIFO, PS_FST_VTYPE_VFIFO },
13580daf62d9SStanislav Sedov 		{ KF_VTYPE_VLNK, PS_FST_VTYPE_VLNK },
13590daf62d9SStanislav Sedov 		{ KF_VTYPE_VNON, PS_FST_VTYPE_VNON },
13600daf62d9SStanislav Sedov 		{ KF_VTYPE_VREG, PS_FST_VTYPE_VREG },
13610daf62d9SStanislav Sedov 		{ KF_VTYPE_VSOCK, PS_FST_VTYPE_VSOCK }
13620daf62d9SStanislav Sedov 	};
13630daf62d9SStanislav Sedov #define	NKFVTYPES	(sizeof(kfvtypes2fst) / sizeof(*kfvtypes2fst))
13640daf62d9SStanislav Sedov 	unsigned int i;
13650daf62d9SStanislav Sedov 
13660daf62d9SStanislav Sedov 	for (i = 0; i < NKFVTYPES; i++)
13670daf62d9SStanislav Sedov 		if (kfvtypes2fst[i].kf_vtype == kfvtype)
13680daf62d9SStanislav Sedov 			break;
13690daf62d9SStanislav Sedov 	if (i == NKFVTYPES)
13700daf62d9SStanislav Sedov 		return (PS_FST_VTYPE_UNKNOWN);
13710daf62d9SStanislav Sedov 	return (kfvtypes2fst[i].fst_vtype);
13720daf62d9SStanislav Sedov }
13730daf62d9SStanislav Sedov 
13740daf62d9SStanislav Sedov static int
procstat_get_vnode_info_sysctl(struct filestat * fst,struct vnstat * vn,char * errbuf)13750daf62d9SStanislav Sedov procstat_get_vnode_info_sysctl(struct filestat *fst, struct vnstat *vn,
13760daf62d9SStanislav Sedov     char *errbuf)
13770daf62d9SStanislav Sedov {
13780daf62d9SStanislav Sedov 	struct statfs stbuf;
13790daf62d9SStanislav Sedov 	struct kinfo_file *kif;
13800daf62d9SStanislav Sedov 	struct kinfo_vmentry *kve;
138169921123SKonstantin Belousov 	char *name, *path;
13820daf62d9SStanislav Sedov 	uint64_t fileid;
13830daf62d9SStanislav Sedov 	uint64_t size;
138469921123SKonstantin Belousov 	uint64_t fsid;
138569921123SKonstantin Belousov 	uint64_t rdev;
13860daf62d9SStanislav Sedov 	uint16_t mode;
13870daf62d9SStanislav Sedov 	int vntype;
13880daf62d9SStanislav Sedov 	int status;
13890daf62d9SStanislav Sedov 
13900daf62d9SStanislav Sedov 	assert(fst);
13910daf62d9SStanislav Sedov 	assert(vn);
13920daf62d9SStanislav Sedov 	bzero(vn, sizeof(*vn));
13930daf62d9SStanislav Sedov 	if (fst->fs_typedep == NULL)
13940daf62d9SStanislav Sedov 		return (1);
13950daf62d9SStanislav Sedov 	if (fst->fs_uflags & PS_FST_UFLAG_MMAP) {
13960daf62d9SStanislav Sedov 		kve = fst->fs_typedep;
13970daf62d9SStanislav Sedov 		fileid = kve->kve_vn_fileid;
13980daf62d9SStanislav Sedov 		fsid = kve->kve_vn_fsid;
13990daf62d9SStanislav Sedov 		mode = kve->kve_vn_mode;
14000daf62d9SStanislav Sedov 		path = kve->kve_path;
14010daf62d9SStanislav Sedov 		rdev = kve->kve_vn_rdev;
14020daf62d9SStanislav Sedov 		size = kve->kve_vn_size;
14030daf62d9SStanislav Sedov 		vntype = kinfo_vtype2fst(kve->kve_vn_type);
14040daf62d9SStanislav Sedov 		status = kve->kve_status;
14050daf62d9SStanislav Sedov 	} else {
14060daf62d9SStanislav Sedov 		kif = fst->fs_typedep;
14070daf62d9SStanislav Sedov 		fileid = kif->kf_un.kf_file.kf_file_fileid;
14080daf62d9SStanislav Sedov 		fsid = kif->kf_un.kf_file.kf_file_fsid;
14090daf62d9SStanislav Sedov 		mode = kif->kf_un.kf_file.kf_file_mode;
14100daf62d9SStanislav Sedov 		path = kif->kf_path;
14110daf62d9SStanislav Sedov 		rdev = kif->kf_un.kf_file.kf_file_rdev;
14120daf62d9SStanislav Sedov 		size = kif->kf_un.kf_file.kf_file_size;
14130daf62d9SStanislav Sedov 		vntype = kinfo_vtype2fst(kif->kf_vnode_type);
14140daf62d9SStanislav Sedov 		status = kif->kf_status;
14150daf62d9SStanislav Sedov 	}
14160daf62d9SStanislav Sedov 	vn->vn_type = vntype;
14170daf62d9SStanislav Sedov 	if (vntype == PS_FST_VTYPE_VNON || vntype == PS_FST_VTYPE_VBAD)
14180daf62d9SStanislav Sedov 		return (0);
14190daf62d9SStanislav Sedov 	if ((status & KF_ATTR_VALID) == 0) {
1420467112b4SMikolaj Golub 		if (errbuf != NULL) {
1421467112b4SMikolaj Golub 			snprintf(errbuf, _POSIX2_LINE_MAX,
1422467112b4SMikolaj Golub 			    "? (no info available)");
1423467112b4SMikolaj Golub 		}
14240daf62d9SStanislav Sedov 		return (1);
14250daf62d9SStanislav Sedov 	}
14260daf62d9SStanislav Sedov 	if (path && *path) {
14270daf62d9SStanislav Sedov 		statfs(path, &stbuf);
14280daf62d9SStanislav Sedov 		vn->vn_mntdir = strdup(stbuf.f_mntonname);
14290daf62d9SStanislav Sedov 	} else
14300daf62d9SStanislav Sedov 		vn->vn_mntdir = strdup("-");
14310daf62d9SStanislav Sedov 	vn->vn_dev = rdev;
14320daf62d9SStanislav Sedov 	if (vntype == PS_FST_VTYPE_VBLK) {
14330daf62d9SStanislav Sedov 		name = devname(rdev, S_IFBLK);
14340daf62d9SStanislav Sedov 		if (name != NULL)
14350daf62d9SStanislav Sedov 			strlcpy(vn->vn_devname, name,
14360daf62d9SStanislav Sedov 			    sizeof(vn->vn_devname));
14370daf62d9SStanislav Sedov 	} else if (vntype == PS_FST_VTYPE_VCHR) {
14380daf62d9SStanislav Sedov 		name = devname(vn->vn_dev, S_IFCHR);
14390daf62d9SStanislav Sedov 		if (name != NULL)
14400daf62d9SStanislav Sedov 			strlcpy(vn->vn_devname, name,
14410daf62d9SStanislav Sedov 			    sizeof(vn->vn_devname));
14420daf62d9SStanislav Sedov 	}
14430daf62d9SStanislav Sedov 	vn->vn_fsid = fsid;
14440daf62d9SStanislav Sedov 	vn->vn_fileid = fileid;
14450daf62d9SStanislav Sedov 	vn->vn_size = size;
14460daf62d9SStanislav Sedov 	vn->vn_mode = mode;
14470daf62d9SStanislav Sedov 	return (0);
14480daf62d9SStanislav Sedov }
14490daf62d9SStanislav Sedov 
14500daf62d9SStanislav Sedov int
procstat_get_socket_info(struct procstat * procstat,struct filestat * fst,struct sockstat * sock,char * errbuf)14510daf62d9SStanislav Sedov procstat_get_socket_info(struct procstat *procstat, struct filestat *fst,
14520daf62d9SStanislav Sedov     struct sockstat *sock, char *errbuf)
14530daf62d9SStanislav Sedov {
14540daf62d9SStanislav Sedov 
14550daf62d9SStanislav Sedov 	assert(sock);
14560daf62d9SStanislav Sedov 	if (procstat->type == PROCSTAT_KVM) {
14570daf62d9SStanislav Sedov 		return (procstat_get_socket_info_kvm(procstat->kd, fst, sock,
14580daf62d9SStanislav Sedov 		    errbuf));
14597153ad2bSMikolaj Golub 	} else if (procstat->type == PROCSTAT_SYSCTL ||
14607153ad2bSMikolaj Golub 		procstat->type == PROCSTAT_CORE) {
14610daf62d9SStanislav Sedov 		return (procstat_get_socket_info_sysctl(fst, sock, errbuf));
14620daf62d9SStanislav Sedov 	} else {
146380905c35SJilles Tjoelker 		warnx("unknown access method: %d", procstat->type);
1464467112b4SMikolaj Golub 		if (errbuf != NULL)
14650daf62d9SStanislav Sedov 			snprintf(errbuf, _POSIX2_LINE_MAX, "error");
14660daf62d9SStanislav Sedov 		return (1);
14670daf62d9SStanislav Sedov 	}
14680daf62d9SStanislav Sedov }
14690daf62d9SStanislav Sedov 
14700daf62d9SStanislav Sedov static int
procstat_get_socket_info_kvm(kvm_t * kd,struct filestat * fst,struct sockstat * sock,char * errbuf)14710daf62d9SStanislav Sedov procstat_get_socket_info_kvm(kvm_t *kd, struct filestat *fst,
14720daf62d9SStanislav Sedov     struct sockstat *sock, char *errbuf)
14730daf62d9SStanislav Sedov {
14740daf62d9SStanislav Sedov 	struct domain dom;
14750daf62d9SStanislav Sedov 	struct protosw proto;
14760daf62d9SStanislav Sedov 	struct socket s;
14770daf62d9SStanislav Sedov 	struct unpcb unpcb;
14780daf62d9SStanislav Sedov 	ssize_t len;
14790daf62d9SStanislav Sedov 	void *so;
14800daf62d9SStanislav Sedov 
14810daf62d9SStanislav Sedov 	assert(kd);
14820daf62d9SStanislav Sedov 	assert(sock);
14830daf62d9SStanislav Sedov 	assert(fst);
14840daf62d9SStanislav Sedov 	bzero(sock, sizeof(*sock));
14850daf62d9SStanislav Sedov 	so = fst->fs_typedep;
14860daf62d9SStanislav Sedov 	if (so == NULL)
14870daf62d9SStanislav Sedov 		goto fail;
14880daf62d9SStanislav Sedov 	sock->so_addr = (uintptr_t)so;
14890daf62d9SStanislav Sedov 	/* fill in socket */
14900daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)so, &s,
14910daf62d9SStanislav Sedov 	    sizeof(struct socket))) {
14920daf62d9SStanislav Sedov 		warnx("can't read sock at %p", (void *)so);
14930daf62d9SStanislav Sedov 		goto fail;
14940daf62d9SStanislav Sedov 	}
14950daf62d9SStanislav Sedov 	/* fill in protosw entry */
14960daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)s.so_proto, &proto,
14970daf62d9SStanislav Sedov 	    sizeof(struct protosw))) {
14980daf62d9SStanislav Sedov 		warnx("can't read protosw at %p", (void *)s.so_proto);
14990daf62d9SStanislav Sedov 		goto fail;
15000daf62d9SStanislav Sedov 	}
15010daf62d9SStanislav Sedov 	/* fill in domain */
15020daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)proto.pr_domain, &dom,
15030daf62d9SStanislav Sedov 	    sizeof(struct domain))) {
15040daf62d9SStanislav Sedov 		warnx("can't read domain at %p",
15050daf62d9SStanislav Sedov 		    (void *)proto.pr_domain);
15060daf62d9SStanislav Sedov 		goto fail;
15070daf62d9SStanislav Sedov 	}
15080daf62d9SStanislav Sedov 	if ((len = kvm_read(kd, (unsigned long)dom.dom_name, sock->dname,
15090daf62d9SStanislav Sedov 	    sizeof(sock->dname) - 1)) < 0) {
15100daf62d9SStanislav Sedov 		warnx("can't read domain name at %p", (void *)dom.dom_name);
15110daf62d9SStanislav Sedov 		sock->dname[0] = '\0';
15120daf62d9SStanislav Sedov 	}
15130daf62d9SStanislav Sedov 	else
15140daf62d9SStanislav Sedov 		sock->dname[len] = '\0';
15150daf62d9SStanislav Sedov 
15160daf62d9SStanislav Sedov 	/*
15170daf62d9SStanislav Sedov 	 * Fill in known data.
15180daf62d9SStanislav Sedov 	 */
15190daf62d9SStanislav Sedov 	sock->type = s.so_type;
15200daf62d9SStanislav Sedov 	sock->proto = proto.pr_protocol;
15210daf62d9SStanislav Sedov 	sock->dom_family = dom.dom_family;
15220daf62d9SStanislav Sedov 	sock->so_pcb = (uintptr_t)s.so_pcb;
15231a8d1764SGleb Smirnoff 	sock->sendq = s.so_snd.sb_ccc;
15241a8d1764SGleb Smirnoff 	sock->recvq = s.so_rcv.sb_ccc;
15251a8d1764SGleb Smirnoff 	sock->so_rcv_sb_state = s.so_rcv.sb_state;
15261a8d1764SGleb Smirnoff 	sock->so_snd_sb_state = s.so_snd.sb_state;
15270daf62d9SStanislav Sedov 
15280daf62d9SStanislav Sedov 	/*
15290daf62d9SStanislav Sedov 	 * Protocol specific data.
15300daf62d9SStanislav Sedov 	 */
15310daf62d9SStanislav Sedov 	switch (dom.dom_family) {
15320daf62d9SStanislav Sedov 	case AF_UNIX:
15330daf62d9SStanislav Sedov 		if (s.so_pcb) {
15340daf62d9SStanislav Sedov 			if (kvm_read(kd, (u_long)s.so_pcb, (char *)&unpcb,
15350daf62d9SStanislav Sedov 			    sizeof(struct unpcb)) != sizeof(struct unpcb)){
15360daf62d9SStanislav Sedov 				warnx("can't read unpcb at %p",
15370daf62d9SStanislav Sedov 				    (void *)s.so_pcb);
15380daf62d9SStanislav Sedov 			} else if (unpcb.unp_conn) {
15390daf62d9SStanislav Sedov 				sock->unp_conn = (uintptr_t)unpcb.unp_conn;
15400daf62d9SStanislav Sedov 			}
15410daf62d9SStanislav Sedov 		}
15420daf62d9SStanislav Sedov 		break;
15430daf62d9SStanislav Sedov 	default:
15440daf62d9SStanislav Sedov 		break;
15450daf62d9SStanislav Sedov 	}
15460daf62d9SStanislav Sedov 	return (0);
15470daf62d9SStanislav Sedov 
15480daf62d9SStanislav Sedov fail:
1549467112b4SMikolaj Golub 	if (errbuf != NULL)
15500daf62d9SStanislav Sedov 		snprintf(errbuf, _POSIX2_LINE_MAX, "error");
15510daf62d9SStanislav Sedov 	return (1);
15520daf62d9SStanislav Sedov }
15530daf62d9SStanislav Sedov 
15540daf62d9SStanislav Sedov static int
procstat_get_socket_info_sysctl(struct filestat * fst,struct sockstat * sock,char * errbuf __unused)15550daf62d9SStanislav Sedov procstat_get_socket_info_sysctl(struct filestat *fst, struct sockstat *sock,
15560daf62d9SStanislav Sedov     char *errbuf __unused)
15570daf62d9SStanislav Sedov {
15580daf62d9SStanislav Sedov 	struct kinfo_file *kif;
15590daf62d9SStanislav Sedov 
15600daf62d9SStanislav Sedov 	assert(sock);
15610daf62d9SStanislav Sedov 	assert(fst);
15620daf62d9SStanislav Sedov 	bzero(sock, sizeof(*sock));
15630daf62d9SStanislav Sedov 	kif = fst->fs_typedep;
15640daf62d9SStanislav Sedov 	if (kif == NULL)
15650daf62d9SStanislav Sedov 		return (0);
15660daf62d9SStanislav Sedov 
15670daf62d9SStanislav Sedov 	/*
15680daf62d9SStanislav Sedov 	 * Fill in known data.
15690daf62d9SStanislav Sedov 	 */
15700daf62d9SStanislav Sedov 	sock->type = kif->kf_sock_type;
15710daf62d9SStanislav Sedov 	sock->proto = kif->kf_sock_protocol;
15720daf62d9SStanislav Sedov 	sock->dom_family = kif->kf_sock_domain;
15730daf62d9SStanislav Sedov 	sock->so_pcb = kif->kf_un.kf_sock.kf_sock_pcb;
15740daf62d9SStanislav Sedov 	strlcpy(sock->dname, kif->kf_path, sizeof(sock->dname));
157569921123SKonstantin Belousov 	bcopy(&kif->kf_un.kf_sock.kf_sa_local, &sock->sa_local,
157669921123SKonstantin Belousov 	    kif->kf_un.kf_sock.kf_sa_local.ss_len);
157769921123SKonstantin Belousov 	bcopy(&kif->kf_un.kf_sock.kf_sa_peer, &sock->sa_peer,
157869921123SKonstantin Belousov 	    kif->kf_un.kf_sock.kf_sa_peer.ss_len);
15790daf62d9SStanislav Sedov 
15800daf62d9SStanislav Sedov 	/*
15810daf62d9SStanislav Sedov 	 * Protocol specific data.
15820daf62d9SStanislav Sedov 	 */
15830daf62d9SStanislav Sedov 	switch (sock->dom_family) {
15840daf62d9SStanislav Sedov 	case AF_INET:
15850daf62d9SStanislav Sedov 	case AF_INET6:
158695b97895SConrad Meyer 		if (sock->proto == IPPROTO_TCP) {
158795b97895SConrad Meyer 			sock->sendq = kif->kf_un.kf_sock.kf_sock_sendq;
158895b97895SConrad Meyer 			sock->recvq = kif->kf_un.kf_sock.kf_sock_recvq;
158995b97895SConrad Meyer 		}
15900daf62d9SStanislav Sedov 		break;
15910daf62d9SStanislav Sedov 	case AF_UNIX:
15920daf62d9SStanislav Sedov 		if (kif->kf_un.kf_sock.kf_sock_unpconn != 0) {
15930daf62d9SStanislav Sedov 			sock->so_rcv_sb_state =
15940daf62d9SStanislav Sedov 			    kif->kf_un.kf_sock.kf_sock_rcv_sb_state;
15950daf62d9SStanislav Sedov 			sock->so_snd_sb_state =
15960daf62d9SStanislav Sedov 			    kif->kf_un.kf_sock.kf_sock_snd_sb_state;
15970daf62d9SStanislav Sedov 			sock->unp_conn =
15980daf62d9SStanislav Sedov 			    kif->kf_un.kf_sock.kf_sock_unpconn;
159995b97895SConrad Meyer 			sock->sendq = kif->kf_un.kf_sock.kf_sock_sendq;
160095b97895SConrad Meyer 			sock->recvq = kif->kf_un.kf_sock.kf_sock_recvq;
16010daf62d9SStanislav Sedov 		}
16020daf62d9SStanislav Sedov 		break;
16030daf62d9SStanislav Sedov 	default:
16040daf62d9SStanislav Sedov 		break;
16050daf62d9SStanislav Sedov 	}
16060daf62d9SStanislav Sedov 	return (0);
16070daf62d9SStanislav Sedov }
16080daf62d9SStanislav Sedov 
16090daf62d9SStanislav Sedov /*
16100daf62d9SStanislav Sedov  * Descriptor flags to filestat translation.
16110daf62d9SStanislav Sedov  */
16120daf62d9SStanislav Sedov static int
to_filestat_flags(int flags)16130daf62d9SStanislav Sedov to_filestat_flags(int flags)
16140daf62d9SStanislav Sedov {
16150daf62d9SStanislav Sedov 	static struct {
16160daf62d9SStanislav Sedov 		int flag;
16170daf62d9SStanislav Sedov 		int fst_flag;
16180daf62d9SStanislav Sedov 	} fstflags[] = {
16190daf62d9SStanislav Sedov 		{ FREAD, PS_FST_FFLAG_READ },
16200daf62d9SStanislav Sedov 		{ FWRITE, PS_FST_FFLAG_WRITE },
16210daf62d9SStanislav Sedov 		{ O_APPEND, PS_FST_FFLAG_APPEND },
16220daf62d9SStanislav Sedov 		{ O_ASYNC, PS_FST_FFLAG_ASYNC },
16230daf62d9SStanislav Sedov 		{ O_CREAT, PS_FST_FFLAG_CREAT },
16240daf62d9SStanislav Sedov 		{ O_DIRECT, PS_FST_FFLAG_DIRECT },
16250daf62d9SStanislav Sedov 		{ O_EXCL, PS_FST_FFLAG_EXCL },
16260daf62d9SStanislav Sedov 		{ O_EXEC, PS_FST_FFLAG_EXEC },
16270daf62d9SStanislav Sedov 		{ O_EXLOCK, PS_FST_FFLAG_EXLOCK },
16280daf62d9SStanislav Sedov 		{ O_NOFOLLOW, PS_FST_FFLAG_NOFOLLOW },
16290daf62d9SStanislav Sedov 		{ O_NONBLOCK, PS_FST_FFLAG_NONBLOCK },
16300daf62d9SStanislav Sedov 		{ O_SHLOCK, PS_FST_FFLAG_SHLOCK },
16310daf62d9SStanislav Sedov 		{ O_SYNC, PS_FST_FFLAG_SYNC },
16320daf62d9SStanislav Sedov 		{ O_TRUNC, PS_FST_FFLAG_TRUNC }
16330daf62d9SStanislav Sedov 	};
16340daf62d9SStanislav Sedov #define NFSTFLAGS	(sizeof(fstflags) / sizeof(*fstflags))
16350daf62d9SStanislav Sedov 	int fst_flags;
16360daf62d9SStanislav Sedov 	unsigned int i;
16370daf62d9SStanislav Sedov 
16380daf62d9SStanislav Sedov 	fst_flags = 0;
16390daf62d9SStanislav Sedov 	for (i = 0; i < NFSTFLAGS; i++)
16400daf62d9SStanislav Sedov 		if (flags & fstflags[i].flag)
16410daf62d9SStanislav Sedov 			fst_flags |= fstflags[i].fst_flag;
16420daf62d9SStanislav Sedov 	return (fst_flags);
16430daf62d9SStanislav Sedov }
16440daf62d9SStanislav Sedov 
16450daf62d9SStanislav Sedov /*
16460daf62d9SStanislav Sedov  * Vnode type to filestate translation.
16470daf62d9SStanislav Sedov  */
16480daf62d9SStanislav Sedov static int
vntype2psfsttype(int type)16490daf62d9SStanislav Sedov vntype2psfsttype(int type)
16500daf62d9SStanislav Sedov {
16510daf62d9SStanislav Sedov 	static struct {
16520daf62d9SStanislav Sedov 		int	vtype;
16530daf62d9SStanislav Sedov 		int	fst_vtype;
16540daf62d9SStanislav Sedov 	} vt2fst[] = {
16550daf62d9SStanislav Sedov 		{ VBAD, PS_FST_VTYPE_VBAD },
16560daf62d9SStanislav Sedov 		{ VBLK, PS_FST_VTYPE_VBLK },
16570daf62d9SStanislav Sedov 		{ VCHR, PS_FST_VTYPE_VCHR },
16580daf62d9SStanislav Sedov 		{ VDIR, PS_FST_VTYPE_VDIR },
16590daf62d9SStanislav Sedov 		{ VFIFO, PS_FST_VTYPE_VFIFO },
16600daf62d9SStanislav Sedov 		{ VLNK, PS_FST_VTYPE_VLNK },
16610daf62d9SStanislav Sedov 		{ VNON, PS_FST_VTYPE_VNON },
16620daf62d9SStanislav Sedov 		{ VREG, PS_FST_VTYPE_VREG },
16630daf62d9SStanislav Sedov 		{ VSOCK, PS_FST_VTYPE_VSOCK }
16640daf62d9SStanislav Sedov 	};
16650daf62d9SStanislav Sedov #define	NVFTYPES	(sizeof(vt2fst) / sizeof(*vt2fst))
16660daf62d9SStanislav Sedov 	unsigned int i, fst_type;
16670daf62d9SStanislav Sedov 
16680daf62d9SStanislav Sedov 	fst_type = PS_FST_VTYPE_UNKNOWN;
16690daf62d9SStanislav Sedov 	for (i = 0; i < NVFTYPES; i++) {
16700daf62d9SStanislav Sedov 		if (type == vt2fst[i].vtype) {
16710daf62d9SStanislav Sedov 			fst_type = vt2fst[i].fst_vtype;
16720daf62d9SStanislav Sedov 			break;
16730daf62d9SStanislav Sedov 		}
16740daf62d9SStanislav Sedov 	}
16750daf62d9SStanislav Sedov 	return (fst_type);
16760daf62d9SStanislav Sedov }
16770daf62d9SStanislav Sedov 
16780daf62d9SStanislav Sedov static char *
getmnton(kvm_t * kd,struct mount * m)16790daf62d9SStanislav Sedov getmnton(kvm_t *kd, struct mount *m)
16800daf62d9SStanislav Sedov {
16815f301949SBen Laurie 	struct mount mnt;
16820daf62d9SStanislav Sedov 	static struct mtab {
16830daf62d9SStanislav Sedov 		struct mtab *next;
16840daf62d9SStanislav Sedov 		struct mount *m;
16850daf62d9SStanislav Sedov 		char mntonname[MNAMELEN + 1];
16860daf62d9SStanislav Sedov 	} *mhead = NULL;
16870daf62d9SStanislav Sedov 	struct mtab *mt;
16880daf62d9SStanislav Sedov 
16890daf62d9SStanislav Sedov 	for (mt = mhead; mt != NULL; mt = mt->next)
16900daf62d9SStanislav Sedov 		if (m == mt->m)
16910daf62d9SStanislav Sedov 			return (mt->mntonname);
16920daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)m, &mnt, sizeof(struct mount))) {
16930daf62d9SStanislav Sedov 		warnx("can't read mount table at %p", (void *)m);
16940daf62d9SStanislav Sedov 		return (NULL);
16950daf62d9SStanislav Sedov 	}
16960daf62d9SStanislav Sedov 	if ((mt = malloc(sizeof (struct mtab))) == NULL)
16970daf62d9SStanislav Sedov 		err(1, NULL);
16980daf62d9SStanislav Sedov 	mt->m = m;
16990daf62d9SStanislav Sedov 	bcopy(&mnt.mnt_stat.f_mntonname[0], &mt->mntonname[0], MNAMELEN);
17005f301949SBen Laurie 	mt->mntonname[MNAMELEN] = '\0';
17010daf62d9SStanislav Sedov 	mt->next = mhead;
17020daf62d9SStanislav Sedov 	mhead = mt;
17030daf62d9SStanislav Sedov 	return (mt->mntonname);
17040daf62d9SStanislav Sedov }
17057153ad2bSMikolaj Golub 
17064482b5e3SMikolaj Golub /*
17074482b5e3SMikolaj Golub  * Auxiliary structures and functions to get process environment or
17084482b5e3SMikolaj Golub  * command line arguments.
17094482b5e3SMikolaj Golub  */
17104482b5e3SMikolaj Golub struct argvec {
17114482b5e3SMikolaj Golub 	char	*buf;
17124482b5e3SMikolaj Golub 	size_t	bufsize;
17134482b5e3SMikolaj Golub 	char	**argv;
17144482b5e3SMikolaj Golub 	size_t	argc;
17154482b5e3SMikolaj Golub };
17164482b5e3SMikolaj Golub 
17174482b5e3SMikolaj Golub static struct argvec *
argvec_alloc(size_t bufsize)17184482b5e3SMikolaj Golub argvec_alloc(size_t bufsize)
17194482b5e3SMikolaj Golub {
17204482b5e3SMikolaj Golub 	struct argvec *av;
17214482b5e3SMikolaj Golub 
17224482b5e3SMikolaj Golub 	av = malloc(sizeof(*av));
17234482b5e3SMikolaj Golub 	if (av == NULL)
17244482b5e3SMikolaj Golub 		return (NULL);
17254482b5e3SMikolaj Golub 	av->bufsize = bufsize;
17264482b5e3SMikolaj Golub 	av->buf = malloc(av->bufsize);
17274482b5e3SMikolaj Golub 	if (av->buf == NULL) {
17284482b5e3SMikolaj Golub 		free(av);
17294482b5e3SMikolaj Golub 		return (NULL);
17304482b5e3SMikolaj Golub 	}
17314482b5e3SMikolaj Golub 	av->argc = 32;
17324482b5e3SMikolaj Golub 	av->argv = malloc(sizeof(char *) * av->argc);
17334482b5e3SMikolaj Golub 	if (av->argv == NULL) {
17344482b5e3SMikolaj Golub 		free(av->buf);
17354482b5e3SMikolaj Golub 		free(av);
17364482b5e3SMikolaj Golub 		return (NULL);
17374482b5e3SMikolaj Golub 	}
17384482b5e3SMikolaj Golub 	return av;
17394482b5e3SMikolaj Golub }
17404482b5e3SMikolaj Golub 
17414482b5e3SMikolaj Golub static void
argvec_free(struct argvec * av)17424482b5e3SMikolaj Golub argvec_free(struct argvec * av)
17434482b5e3SMikolaj Golub {
17444482b5e3SMikolaj Golub 
17454482b5e3SMikolaj Golub 	free(av->argv);
17464482b5e3SMikolaj Golub 	free(av->buf);
17474482b5e3SMikolaj Golub 	free(av);
17484482b5e3SMikolaj Golub }
17494482b5e3SMikolaj Golub 
17504482b5e3SMikolaj Golub static char **
getargv(struct procstat * procstat,struct kinfo_proc * kp,size_t nchr,int env)17514482b5e3SMikolaj Golub getargv(struct procstat *procstat, struct kinfo_proc *kp, size_t nchr, int env)
17524482b5e3SMikolaj Golub {
17534482b5e3SMikolaj Golub 	int error, name[4], argc, i;
17544482b5e3SMikolaj Golub 	struct argvec *av, **avp;
17554482b5e3SMikolaj Golub 	enum psc_type type;
17564482b5e3SMikolaj Golub 	size_t len;
17574482b5e3SMikolaj Golub 	char *p, **argv;
17584482b5e3SMikolaj Golub 
17594482b5e3SMikolaj Golub 	assert(procstat);
17604482b5e3SMikolaj Golub 	assert(kp);
17614482b5e3SMikolaj Golub 	if (procstat->type == PROCSTAT_KVM) {
17624482b5e3SMikolaj Golub 		warnx("can't use kvm access method");
17634482b5e3SMikolaj Golub 		return (NULL);
17644482b5e3SMikolaj Golub 	}
17654482b5e3SMikolaj Golub 	if (procstat->type != PROCSTAT_SYSCTL &&
17664482b5e3SMikolaj Golub 	    procstat->type != PROCSTAT_CORE) {
17674482b5e3SMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
17684482b5e3SMikolaj Golub 		return (NULL);
17694482b5e3SMikolaj Golub 	}
17704482b5e3SMikolaj Golub 
17714482b5e3SMikolaj Golub 	if (nchr == 0 || nchr > ARG_MAX)
17724482b5e3SMikolaj Golub 		nchr = ARG_MAX;
17734482b5e3SMikolaj Golub 
17744482b5e3SMikolaj Golub 	avp = (struct argvec **)(env ? &procstat->argv : &procstat->envv);
17754482b5e3SMikolaj Golub 	av = *avp;
17764482b5e3SMikolaj Golub 
17774482b5e3SMikolaj Golub 	if (av == NULL)
17784482b5e3SMikolaj Golub 	{
17794482b5e3SMikolaj Golub 		av = argvec_alloc(nchr);
17804482b5e3SMikolaj Golub 		if (av == NULL)
17814482b5e3SMikolaj Golub 		{
17824482b5e3SMikolaj Golub 			warn("malloc(%zu)", nchr);
17834482b5e3SMikolaj Golub 			return (NULL);
17844482b5e3SMikolaj Golub 		}
17854482b5e3SMikolaj Golub 		*avp = av;
17864482b5e3SMikolaj Golub 	} else if (av->bufsize < nchr) {
17874482b5e3SMikolaj Golub 		av->buf = reallocf(av->buf, nchr);
17884482b5e3SMikolaj Golub 		if (av->buf == NULL) {
17894482b5e3SMikolaj Golub 			warn("malloc(%zu)", nchr);
17904482b5e3SMikolaj Golub 			return (NULL);
17914482b5e3SMikolaj Golub 		}
17924482b5e3SMikolaj Golub 	}
17934482b5e3SMikolaj Golub 	if (procstat->type == PROCSTAT_SYSCTL) {
17944482b5e3SMikolaj Golub 		name[0] = CTL_KERN;
17954482b5e3SMikolaj Golub 		name[1] = KERN_PROC;
17964482b5e3SMikolaj Golub 		name[2] = env ? KERN_PROC_ENV : KERN_PROC_ARGS;
17974482b5e3SMikolaj Golub 		name[3] = kp->ki_pid;
17984482b5e3SMikolaj Golub 		len = nchr;
179975b6a179SEnji Cooper 		error = sysctl(name, nitems(name), av->buf, &len, NULL, 0);
18004482b5e3SMikolaj Golub 		if (error != 0 && errno != ESRCH && errno != EPERM)
18014482b5e3SMikolaj Golub 			warn("sysctl(kern.proc.%s)", env ? "env" : "args");
18024482b5e3SMikolaj Golub 		if (error != 0 || len == 0)
18034482b5e3SMikolaj Golub 			return (NULL);
18044482b5e3SMikolaj Golub 	} else /* procstat->type == PROCSTAT_CORE */ {
18054482b5e3SMikolaj Golub 		type = env ? PSC_TYPE_ENVV : PSC_TYPE_ARGV;
18064482b5e3SMikolaj Golub 		len = nchr;
18074482b5e3SMikolaj Golub 		if (procstat_core_get(procstat->core, type, av->buf, &len)
18084482b5e3SMikolaj Golub 		    == NULL) {
18094482b5e3SMikolaj Golub 			return (NULL);
18104482b5e3SMikolaj Golub 		}
18114482b5e3SMikolaj Golub 	}
18124482b5e3SMikolaj Golub 
18134482b5e3SMikolaj Golub 	argv = av->argv;
18144482b5e3SMikolaj Golub 	argc = av->argc;
18154482b5e3SMikolaj Golub 	i = 0;
18164482b5e3SMikolaj Golub 	for (p = av->buf; p < av->buf + len; p += strlen(p) + 1) {
18174482b5e3SMikolaj Golub 		argv[i++] = p;
18184482b5e3SMikolaj Golub 		if (i < argc)
18194482b5e3SMikolaj Golub 			continue;
18204482b5e3SMikolaj Golub 		/* Grow argv. */
18214482b5e3SMikolaj Golub 		argc += argc;
18224482b5e3SMikolaj Golub 		argv = realloc(argv, sizeof(char *) * argc);
18234482b5e3SMikolaj Golub 		if (argv == NULL) {
18244482b5e3SMikolaj Golub 			warn("malloc(%zu)", sizeof(char *) * argc);
18254482b5e3SMikolaj Golub 			return (NULL);
18264482b5e3SMikolaj Golub 		}
18274482b5e3SMikolaj Golub 		av->argv = argv;
18284482b5e3SMikolaj Golub 		av->argc = argc;
18294482b5e3SMikolaj Golub 	}
18304482b5e3SMikolaj Golub 	argv[i] = NULL;
18314482b5e3SMikolaj Golub 
18324482b5e3SMikolaj Golub 	return (argv);
18334482b5e3SMikolaj Golub }
18344482b5e3SMikolaj Golub 
18354482b5e3SMikolaj Golub /*
18364482b5e3SMikolaj Golub  * Return process command line arguments.
18374482b5e3SMikolaj Golub  */
18384482b5e3SMikolaj Golub char **
procstat_getargv(struct procstat * procstat,struct kinfo_proc * p,size_t nchr)18394482b5e3SMikolaj Golub procstat_getargv(struct procstat *procstat, struct kinfo_proc *p, size_t nchr)
18404482b5e3SMikolaj Golub {
18414482b5e3SMikolaj Golub 
18424482b5e3SMikolaj Golub 	return (getargv(procstat, p, nchr, 0));
18434482b5e3SMikolaj Golub }
18444482b5e3SMikolaj Golub 
18454482b5e3SMikolaj Golub /*
18464482b5e3SMikolaj Golub  * Free the buffer allocated by procstat_getargv().
18474482b5e3SMikolaj Golub  */
18484482b5e3SMikolaj Golub void
procstat_freeargv(struct procstat * procstat)18494482b5e3SMikolaj Golub procstat_freeargv(struct procstat *procstat)
18504482b5e3SMikolaj Golub {
18514482b5e3SMikolaj Golub 
18524482b5e3SMikolaj Golub 	if (procstat->argv != NULL) {
18534482b5e3SMikolaj Golub 		argvec_free(procstat->argv);
18544482b5e3SMikolaj Golub 		procstat->argv = NULL;
18554482b5e3SMikolaj Golub 	}
18564482b5e3SMikolaj Golub }
18574482b5e3SMikolaj Golub 
18584482b5e3SMikolaj Golub /*
18594482b5e3SMikolaj Golub  * Return process environment.
18604482b5e3SMikolaj Golub  */
18614482b5e3SMikolaj Golub char **
procstat_getenvv(struct procstat * procstat,struct kinfo_proc * p,size_t nchr)18624482b5e3SMikolaj Golub procstat_getenvv(struct procstat *procstat, struct kinfo_proc *p, size_t nchr)
18634482b5e3SMikolaj Golub {
18644482b5e3SMikolaj Golub 
18654482b5e3SMikolaj Golub 	return (getargv(procstat, p, nchr, 1));
18664482b5e3SMikolaj Golub }
18674482b5e3SMikolaj Golub 
18684482b5e3SMikolaj Golub /*
18694482b5e3SMikolaj Golub  * Free the buffer allocated by procstat_getenvv().
18704482b5e3SMikolaj Golub  */
18714482b5e3SMikolaj Golub void
procstat_freeenvv(struct procstat * procstat)18724482b5e3SMikolaj Golub procstat_freeenvv(struct procstat *procstat)
18734482b5e3SMikolaj Golub {
18744482b5e3SMikolaj Golub 	if (procstat->envv != NULL) {
18754482b5e3SMikolaj Golub 		argvec_free(procstat->envv);
18764482b5e3SMikolaj Golub 		procstat->envv = NULL;
18774482b5e3SMikolaj Golub 	}
18784482b5e3SMikolaj Golub }
18794482b5e3SMikolaj Golub 
188039680c7bSMikolaj Golub static struct kinfo_vmentry *
kinfo_getvmmap_core(struct procstat_core * core,int * cntp)188139680c7bSMikolaj Golub kinfo_getvmmap_core(struct procstat_core *core, int *cntp)
188239680c7bSMikolaj Golub {
188339680c7bSMikolaj Golub 	int cnt;
188439680c7bSMikolaj Golub 	size_t len;
188539680c7bSMikolaj Golub 	char *buf, *bp, *eb;
188639680c7bSMikolaj Golub 	struct kinfo_vmentry *kiv, *kp, *kv;
188739680c7bSMikolaj Golub 
188839680c7bSMikolaj Golub 	buf = procstat_core_get(core, PSC_TYPE_VMMAP, NULL, &len);
188939680c7bSMikolaj Golub 	if (buf == NULL)
189039680c7bSMikolaj Golub 		return (NULL);
189139680c7bSMikolaj Golub 
189239680c7bSMikolaj Golub 	/*
189339680c7bSMikolaj Golub 	 * XXXMG: The code below is just copy&past from libutil.
189439680c7bSMikolaj Golub 	 * The code duplication can be avoided if libutil
189539680c7bSMikolaj Golub 	 * is extended to provide something like:
189639680c7bSMikolaj Golub 	 *   struct kinfo_vmentry *kinfo_getvmmap_from_buf(const char *buf,
189739680c7bSMikolaj Golub 	 *       size_t len, int *cntp);
189839680c7bSMikolaj Golub 	 */
189939680c7bSMikolaj Golub 
190039680c7bSMikolaj Golub 	/* Pass 1: count items */
190139680c7bSMikolaj Golub 	cnt = 0;
190239680c7bSMikolaj Golub 	bp = buf;
190339680c7bSMikolaj Golub 	eb = buf + len;
190439680c7bSMikolaj Golub 	while (bp < eb) {
190539680c7bSMikolaj Golub 		kv = (struct kinfo_vmentry *)(uintptr_t)bp;
1906e6b95927SConrad Meyer 		if (kv->kve_structsize == 0)
1907e6b95927SConrad Meyer 			break;
190839680c7bSMikolaj Golub 		bp += kv->kve_structsize;
190939680c7bSMikolaj Golub 		cnt++;
191039680c7bSMikolaj Golub 	}
191139680c7bSMikolaj Golub 
191239680c7bSMikolaj Golub 	kiv = calloc(cnt, sizeof(*kiv));
191339680c7bSMikolaj Golub 	if (kiv == NULL) {
191439680c7bSMikolaj Golub 		free(buf);
191539680c7bSMikolaj Golub 		return (NULL);
191639680c7bSMikolaj Golub 	}
191739680c7bSMikolaj Golub 	bp = buf;
191839680c7bSMikolaj Golub 	eb = buf + len;
191939680c7bSMikolaj Golub 	kp = kiv;
192039680c7bSMikolaj Golub 	/* Pass 2: unpack */
192139680c7bSMikolaj Golub 	while (bp < eb) {
192239680c7bSMikolaj Golub 		kv = (struct kinfo_vmentry *)(uintptr_t)bp;
1923e6b95927SConrad Meyer 		if (kv->kve_structsize == 0)
1924e6b95927SConrad Meyer 			break;
192539680c7bSMikolaj Golub 		/* Copy/expand into pre-zeroed buffer */
192639680c7bSMikolaj Golub 		memcpy(kp, kv, kv->kve_structsize);
192739680c7bSMikolaj Golub 		/* Advance to next packed record */
192839680c7bSMikolaj Golub 		bp += kv->kve_structsize;
192939680c7bSMikolaj Golub 		/* Set field size to fixed length, advance */
193039680c7bSMikolaj Golub 		kp->kve_structsize = sizeof(*kp);
193139680c7bSMikolaj Golub 		kp++;
193239680c7bSMikolaj Golub 	}
193339680c7bSMikolaj Golub 	free(buf);
193439680c7bSMikolaj Golub 	*cntp = cnt;
193539680c7bSMikolaj Golub 	return (kiv);	/* Caller must free() return value */
193639680c7bSMikolaj Golub }
193739680c7bSMikolaj Golub 
193839680c7bSMikolaj Golub struct kinfo_vmentry *
procstat_getvmmap(struct procstat * procstat,struct kinfo_proc * kp,unsigned int * cntp)193939680c7bSMikolaj Golub procstat_getvmmap(struct procstat *procstat, struct kinfo_proc *kp,
194039680c7bSMikolaj Golub     unsigned int *cntp)
194139680c7bSMikolaj Golub {
194289358231SMikolaj Golub 
194339680c7bSMikolaj Golub 	switch (procstat->type) {
194439680c7bSMikolaj Golub 	case PROCSTAT_KVM:
194539680c7bSMikolaj Golub 		warnx("kvm method is not supported");
194639680c7bSMikolaj Golub 		return (NULL);
194739680c7bSMikolaj Golub 	case PROCSTAT_SYSCTL:
194839680c7bSMikolaj Golub 		return (kinfo_getvmmap(kp->ki_pid, cntp));
194939680c7bSMikolaj Golub 	case PROCSTAT_CORE:
195039680c7bSMikolaj Golub 		return (kinfo_getvmmap_core(procstat->core, cntp));
195139680c7bSMikolaj Golub 	default:
195239680c7bSMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
195339680c7bSMikolaj Golub 		return (NULL);
195439680c7bSMikolaj Golub 	}
195539680c7bSMikolaj Golub }
195639680c7bSMikolaj Golub 
195739680c7bSMikolaj Golub void
procstat_freevmmap(struct procstat * procstat __unused,struct kinfo_vmentry * vmmap)195839680c7bSMikolaj Golub procstat_freevmmap(struct procstat *procstat __unused,
195939680c7bSMikolaj Golub     struct kinfo_vmentry *vmmap)
196039680c7bSMikolaj Golub {
196139680c7bSMikolaj Golub 
196239680c7bSMikolaj Golub 	free(vmmap);
196339680c7bSMikolaj Golub }
19647f1d14e6SMikolaj Golub 
19657f1d14e6SMikolaj Golub static gid_t *
procstat_getgroups_kvm(kvm_t * kd,struct kinfo_proc * kp,unsigned int * cntp)19661f84c47eSMikolaj Golub procstat_getgroups_kvm(kvm_t *kd, struct kinfo_proc *kp, unsigned int *cntp)
19671f84c47eSMikolaj Golub {
19681f84c47eSMikolaj Golub 	struct proc proc;
19691f84c47eSMikolaj Golub 	struct ucred ucred;
19701f84c47eSMikolaj Golub 	gid_t *groups;
19711f84c47eSMikolaj Golub 	size_t len;
19721f84c47eSMikolaj Golub 
19731f84c47eSMikolaj Golub 	assert(kd != NULL);
19741f84c47eSMikolaj Golub 	assert(kp != NULL);
19751f84c47eSMikolaj Golub 	if (!kvm_read_all(kd, (unsigned long)kp->ki_paddr, &proc,
19761f84c47eSMikolaj Golub 	    sizeof(proc))) {
19771f84c47eSMikolaj Golub 		warnx("can't read proc struct at %p for pid %d",
19781f84c47eSMikolaj Golub 		    kp->ki_paddr, kp->ki_pid);
19791f84c47eSMikolaj Golub 		return (NULL);
19801f84c47eSMikolaj Golub 	}
19811f84c47eSMikolaj Golub 	if (proc.p_ucred == NOCRED)
19821f84c47eSMikolaj Golub 		return (NULL);
19831f84c47eSMikolaj Golub 	if (!kvm_read_all(kd, (unsigned long)proc.p_ucred, &ucred,
19841f84c47eSMikolaj Golub 	    sizeof(ucred))) {
19851f84c47eSMikolaj Golub 		warnx("can't read ucred struct at %p for pid %d",
19861f84c47eSMikolaj Golub 		    proc.p_ucred, kp->ki_pid);
19871f84c47eSMikolaj Golub 		return (NULL);
19881f84c47eSMikolaj Golub 	}
19891f84c47eSMikolaj Golub 	len = ucred.cr_ngroups * sizeof(gid_t);
19901f84c47eSMikolaj Golub 	groups = malloc(len);
19911f84c47eSMikolaj Golub 	if (groups == NULL) {
19921f84c47eSMikolaj Golub 		warn("malloc(%zu)", len);
19931f84c47eSMikolaj Golub 		return (NULL);
19941f84c47eSMikolaj Golub 	}
19951f84c47eSMikolaj Golub 	if (!kvm_read_all(kd, (unsigned long)ucred.cr_groups, groups, len)) {
19961f84c47eSMikolaj Golub 		warnx("can't read groups at %p for pid %d",
19971f84c47eSMikolaj Golub 		    ucred.cr_groups, kp->ki_pid);
19981f84c47eSMikolaj Golub 		free(groups);
19991f84c47eSMikolaj Golub 		return (NULL);
20001f84c47eSMikolaj Golub 	}
20011f84c47eSMikolaj Golub 	*cntp = ucred.cr_ngroups;
20021f84c47eSMikolaj Golub 	return (groups);
20031f84c47eSMikolaj Golub }
20041f84c47eSMikolaj Golub 
20051f84c47eSMikolaj Golub static gid_t *
procstat_getgroups_sysctl(pid_t pid,unsigned int * cntp)20067f1d14e6SMikolaj Golub procstat_getgroups_sysctl(pid_t pid, unsigned int *cntp)
20077f1d14e6SMikolaj Golub {
20087f1d14e6SMikolaj Golub 	int mib[4];
20097f1d14e6SMikolaj Golub 	size_t len;
20107f1d14e6SMikolaj Golub 	gid_t *groups;
20117f1d14e6SMikolaj Golub 
20127f1d14e6SMikolaj Golub 	mib[0] = CTL_KERN;
20137f1d14e6SMikolaj Golub 	mib[1] = KERN_PROC;
20147f1d14e6SMikolaj Golub 	mib[2] = KERN_PROC_GROUPS;
20157f1d14e6SMikolaj Golub 	mib[3] = pid;
20167f1d14e6SMikolaj Golub 	len = (sysconf(_SC_NGROUPS_MAX) + 1) * sizeof(gid_t);
20177f1d14e6SMikolaj Golub 	groups = malloc(len);
20187f1d14e6SMikolaj Golub 	if (groups == NULL) {
20197f1d14e6SMikolaj Golub 		warn("malloc(%zu)", len);
20207f1d14e6SMikolaj Golub 		return (NULL);
20217f1d14e6SMikolaj Golub 	}
202275b6a179SEnji Cooper 	if (sysctl(mib, nitems(mib), groups, &len, NULL, 0) == -1) {
20237f1d14e6SMikolaj Golub 		warn("sysctl: kern.proc.groups: %d", pid);
20247f1d14e6SMikolaj Golub 		free(groups);
20257f1d14e6SMikolaj Golub 		return (NULL);
20267f1d14e6SMikolaj Golub 	}
20277f1d14e6SMikolaj Golub 	*cntp = len / sizeof(gid_t);
20287f1d14e6SMikolaj Golub 	return (groups);
20297f1d14e6SMikolaj Golub }
20307f1d14e6SMikolaj Golub 
20317f1d14e6SMikolaj Golub static gid_t *
procstat_getgroups_core(struct procstat_core * core,unsigned int * cntp)20327f1d14e6SMikolaj Golub procstat_getgroups_core(struct procstat_core *core, unsigned int *cntp)
20337f1d14e6SMikolaj Golub {
20347f1d14e6SMikolaj Golub 	size_t len;
20357f1d14e6SMikolaj Golub 	gid_t *groups;
20367f1d14e6SMikolaj Golub 
20377f1d14e6SMikolaj Golub 	groups = procstat_core_get(core, PSC_TYPE_GROUPS, NULL, &len);
20387f1d14e6SMikolaj Golub 	if (groups == NULL)
20397f1d14e6SMikolaj Golub 		return (NULL);
20407f1d14e6SMikolaj Golub 	*cntp = len / sizeof(gid_t);
20417f1d14e6SMikolaj Golub 	return (groups);
20427f1d14e6SMikolaj Golub }
20437f1d14e6SMikolaj Golub 
20447f1d14e6SMikolaj Golub gid_t *
procstat_getgroups(struct procstat * procstat,struct kinfo_proc * kp,unsigned int * cntp)20457f1d14e6SMikolaj Golub procstat_getgroups(struct procstat *procstat, struct kinfo_proc *kp,
20467f1d14e6SMikolaj Golub     unsigned int *cntp)
20477f1d14e6SMikolaj Golub {
20487f1d14e6SMikolaj Golub 	switch (procstat->type) {
20497f1d14e6SMikolaj Golub 	case PROCSTAT_KVM:
20501f84c47eSMikolaj Golub 		return (procstat_getgroups_kvm(procstat->kd, kp, cntp));
20517f1d14e6SMikolaj Golub 	case PROCSTAT_SYSCTL:
20527f1d14e6SMikolaj Golub 		return (procstat_getgroups_sysctl(kp->ki_pid, cntp));
20537f1d14e6SMikolaj Golub 	case PROCSTAT_CORE:
20547f1d14e6SMikolaj Golub 		return (procstat_getgroups_core(procstat->core, cntp));
20557f1d14e6SMikolaj Golub 	default:
20567f1d14e6SMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
20577f1d14e6SMikolaj Golub 		return (NULL);
20587f1d14e6SMikolaj Golub 	}
20597f1d14e6SMikolaj Golub }
20607f1d14e6SMikolaj Golub 
20617f1d14e6SMikolaj Golub void
procstat_freegroups(struct procstat * procstat __unused,gid_t * groups)20627f1d14e6SMikolaj Golub procstat_freegroups(struct procstat *procstat __unused, gid_t *groups)
20637f1d14e6SMikolaj Golub {
20647f1d14e6SMikolaj Golub 
20657f1d14e6SMikolaj Golub 	free(groups);
20667f1d14e6SMikolaj Golub }
20675b9bcba9SMikolaj Golub 
20685b9bcba9SMikolaj Golub static int
procstat_getumask_kvm(kvm_t * kd,struct kinfo_proc * kp,unsigned short * maskp)20691f84c47eSMikolaj Golub procstat_getumask_kvm(kvm_t *kd, struct kinfo_proc *kp, unsigned short *maskp)
20701f84c47eSMikolaj Golub {
207185078b85SConrad Meyer 	struct pwddesc pd;
20721f84c47eSMikolaj Golub 
20731f84c47eSMikolaj Golub 	assert(kd != NULL);
20741f84c47eSMikolaj Golub 	assert(kp != NULL);
207585078b85SConrad Meyer 	if (kp->ki_pd == NULL)
20761f84c47eSMikolaj Golub 		return (-1);
207785078b85SConrad Meyer 	if (!kvm_read_all(kd, (unsigned long)kp->ki_pd, &pd, sizeof(pd))) {
207885078b85SConrad Meyer 		warnx("can't read pwddesc at %p for pid %d", kp->ki_pd,
20791f84c47eSMikolaj Golub 		    kp->ki_pid);
20801f84c47eSMikolaj Golub 		return (-1);
20811f84c47eSMikolaj Golub 	}
208285078b85SConrad Meyer 	*maskp = pd.pd_cmask;
20831f84c47eSMikolaj Golub 	return (0);
20841f84c47eSMikolaj Golub }
20851f84c47eSMikolaj Golub 
20861f84c47eSMikolaj Golub static int
procstat_getumask_sysctl(pid_t pid,unsigned short * maskp)20875b9bcba9SMikolaj Golub procstat_getumask_sysctl(pid_t pid, unsigned short *maskp)
20885b9bcba9SMikolaj Golub {
20895b9bcba9SMikolaj Golub 	int error;
20905b9bcba9SMikolaj Golub 	int mib[4];
20915b9bcba9SMikolaj Golub 	size_t len;
20925b9bcba9SMikolaj Golub 
20935b9bcba9SMikolaj Golub 	mib[0] = CTL_KERN;
20945b9bcba9SMikolaj Golub 	mib[1] = KERN_PROC;
20955b9bcba9SMikolaj Golub 	mib[2] = KERN_PROC_UMASK;
20965b9bcba9SMikolaj Golub 	mib[3] = pid;
20975b9bcba9SMikolaj Golub 	len = sizeof(*maskp);
209875b6a179SEnji Cooper 	error = sysctl(mib, nitems(mib), maskp, &len, NULL, 0);
209909b46be1SRobert Watson 	if (error != 0 && errno != ESRCH && errno != EPERM)
21005b9bcba9SMikolaj Golub 		warn("sysctl: kern.proc.umask: %d", pid);
21015b9bcba9SMikolaj Golub 	return (error);
21025b9bcba9SMikolaj Golub }
21035b9bcba9SMikolaj Golub 
21045b9bcba9SMikolaj Golub static int
procstat_getumask_core(struct procstat_core * core,unsigned short * maskp)21055b9bcba9SMikolaj Golub procstat_getumask_core(struct procstat_core *core, unsigned short *maskp)
21065b9bcba9SMikolaj Golub {
21075b9bcba9SMikolaj Golub 	size_t len;
21085b9bcba9SMikolaj Golub 	unsigned short *buf;
21095b9bcba9SMikolaj Golub 
21105b9bcba9SMikolaj Golub 	buf = procstat_core_get(core, PSC_TYPE_UMASK, NULL, &len);
21115b9bcba9SMikolaj Golub 	if (buf == NULL)
21125b9bcba9SMikolaj Golub 		return (-1);
21135b9bcba9SMikolaj Golub 	if (len < sizeof(*maskp)) {
21145b9bcba9SMikolaj Golub 		free(buf);
21155b9bcba9SMikolaj Golub 		return (-1);
21165b9bcba9SMikolaj Golub 	}
21175b9bcba9SMikolaj Golub 	*maskp = *buf;
21185b9bcba9SMikolaj Golub 	free(buf);
21195b9bcba9SMikolaj Golub 	return (0);
21205b9bcba9SMikolaj Golub }
21215b9bcba9SMikolaj Golub 
21225b9bcba9SMikolaj Golub int
procstat_getumask(struct procstat * procstat,struct kinfo_proc * kp,unsigned short * maskp)21235b9bcba9SMikolaj Golub procstat_getumask(struct procstat *procstat, struct kinfo_proc *kp,
21245b9bcba9SMikolaj Golub     unsigned short *maskp)
21255b9bcba9SMikolaj Golub {
21265b9bcba9SMikolaj Golub 	switch (procstat->type) {
21275b9bcba9SMikolaj Golub 	case PROCSTAT_KVM:
21281f84c47eSMikolaj Golub 		return (procstat_getumask_kvm(procstat->kd, kp, maskp));
21295b9bcba9SMikolaj Golub 	case PROCSTAT_SYSCTL:
21305b9bcba9SMikolaj Golub 		return (procstat_getumask_sysctl(kp->ki_pid, maskp));
21315b9bcba9SMikolaj Golub 	case PROCSTAT_CORE:
21325b9bcba9SMikolaj Golub 		return (procstat_getumask_core(procstat->core, maskp));
21335b9bcba9SMikolaj Golub 	default:
21345b9bcba9SMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
21355b9bcba9SMikolaj Golub 		return (-1);
21365b9bcba9SMikolaj Golub 	}
21375b9bcba9SMikolaj Golub }
21387cc0ebfdSMikolaj Golub 
21397cc0ebfdSMikolaj Golub static int
procstat_getrlimit_kvm(kvm_t * kd,struct kinfo_proc * kp,int which,struct rlimit * rlimit)21401f84c47eSMikolaj Golub procstat_getrlimit_kvm(kvm_t *kd, struct kinfo_proc *kp, int which,
21411f84c47eSMikolaj Golub     struct rlimit* rlimit)
21421f84c47eSMikolaj Golub {
21431f84c47eSMikolaj Golub 	struct proc proc;
21441f84c47eSMikolaj Golub 	unsigned long offset;
21451f84c47eSMikolaj Golub 
21461f84c47eSMikolaj Golub 	assert(kd != NULL);
21471f84c47eSMikolaj Golub 	assert(kp != NULL);
21481f84c47eSMikolaj Golub 	assert(which >= 0 && which < RLIM_NLIMITS);
21491f84c47eSMikolaj Golub 	if (!kvm_read_all(kd, (unsigned long)kp->ki_paddr, &proc,
21501f84c47eSMikolaj Golub 	    sizeof(proc))) {
21511f84c47eSMikolaj Golub 		warnx("can't read proc struct at %p for pid %d",
21521f84c47eSMikolaj Golub 		    kp->ki_paddr, kp->ki_pid);
21531f84c47eSMikolaj Golub 		return (-1);
21541f84c47eSMikolaj Golub 	}
21551f84c47eSMikolaj Golub 	if (proc.p_limit == NULL)
21561f84c47eSMikolaj Golub 		return (-1);
21571f84c47eSMikolaj Golub 	offset = (unsigned long)proc.p_limit + sizeof(struct rlimit) * which;
21581f84c47eSMikolaj Golub 	if (!kvm_read_all(kd, offset, rlimit, sizeof(*rlimit))) {
21591f84c47eSMikolaj Golub 		warnx("can't read rlimit struct at %p for pid %d",
21601f84c47eSMikolaj Golub 		    (void *)offset, kp->ki_pid);
21611f84c47eSMikolaj Golub 		return (-1);
21621f84c47eSMikolaj Golub 	}
21631f84c47eSMikolaj Golub 	return (0);
21641f84c47eSMikolaj Golub }
21651f84c47eSMikolaj Golub 
21661f84c47eSMikolaj Golub static int
procstat_getrlimit_sysctl(pid_t pid,int which,struct rlimit * rlimit)21677cc0ebfdSMikolaj Golub procstat_getrlimit_sysctl(pid_t pid, int which, struct rlimit* rlimit)
21687cc0ebfdSMikolaj Golub {
21697cc0ebfdSMikolaj Golub 	int error, name[5];
21707cc0ebfdSMikolaj Golub 	size_t len;
21717cc0ebfdSMikolaj Golub 
21727cc0ebfdSMikolaj Golub 	name[0] = CTL_KERN;
21737cc0ebfdSMikolaj Golub 	name[1] = KERN_PROC;
21747cc0ebfdSMikolaj Golub 	name[2] = KERN_PROC_RLIMIT;
21757cc0ebfdSMikolaj Golub 	name[3] = pid;
21767cc0ebfdSMikolaj Golub 	name[4] = which;
21777cc0ebfdSMikolaj Golub 	len = sizeof(struct rlimit);
217875b6a179SEnji Cooper 	error = sysctl(name, nitems(name), rlimit, &len, NULL, 0);
21797cc0ebfdSMikolaj Golub 	if (error < 0 && errno != ESRCH) {
21807cc0ebfdSMikolaj Golub 		warn("sysctl: kern.proc.rlimit: %d", pid);
21817cc0ebfdSMikolaj Golub 		return (-1);
21827cc0ebfdSMikolaj Golub 	}
21837cc0ebfdSMikolaj Golub 	if (error < 0 || len != sizeof(struct rlimit))
21847cc0ebfdSMikolaj Golub 		return (-1);
21857cc0ebfdSMikolaj Golub 	return (0);
21867cc0ebfdSMikolaj Golub }
21877cc0ebfdSMikolaj Golub 
21887cc0ebfdSMikolaj Golub static int
procstat_getrlimit_core(struct procstat_core * core,int which,struct rlimit * rlimit)21897cc0ebfdSMikolaj Golub procstat_getrlimit_core(struct procstat_core *core, int which,
21907cc0ebfdSMikolaj Golub     struct rlimit* rlimit)
21917cc0ebfdSMikolaj Golub {
21927cc0ebfdSMikolaj Golub 	size_t len;
21937cc0ebfdSMikolaj Golub 	struct rlimit* rlimits;
21947cc0ebfdSMikolaj Golub 
21957cc0ebfdSMikolaj Golub 	if (which < 0 || which >= RLIM_NLIMITS) {
21967cc0ebfdSMikolaj Golub 		errno = EINVAL;
21977cc0ebfdSMikolaj Golub 		warn("getrlimit: which");
21987cc0ebfdSMikolaj Golub 		return (-1);
21997cc0ebfdSMikolaj Golub 	}
22007cc0ebfdSMikolaj Golub 	rlimits = procstat_core_get(core, PSC_TYPE_RLIMIT, NULL, &len);
22017cc0ebfdSMikolaj Golub 	if (rlimits == NULL)
22027cc0ebfdSMikolaj Golub 		return (-1);
22037cc0ebfdSMikolaj Golub 	if (len < sizeof(struct rlimit) * RLIM_NLIMITS) {
22047cc0ebfdSMikolaj Golub 		free(rlimits);
22057cc0ebfdSMikolaj Golub 		return (-1);
22067cc0ebfdSMikolaj Golub 	}
22077cc0ebfdSMikolaj Golub 	*rlimit = rlimits[which];
22089b207441SEric van Gyzen 	free(rlimits);
22097cc0ebfdSMikolaj Golub 	return (0);
22107cc0ebfdSMikolaj Golub }
22117cc0ebfdSMikolaj Golub 
22127cc0ebfdSMikolaj Golub int
procstat_getrlimit(struct procstat * procstat,struct kinfo_proc * kp,int which,struct rlimit * rlimit)22137cc0ebfdSMikolaj Golub procstat_getrlimit(struct procstat *procstat, struct kinfo_proc *kp, int which,
22147cc0ebfdSMikolaj Golub     struct rlimit* rlimit)
22157cc0ebfdSMikolaj Golub {
22167cc0ebfdSMikolaj Golub 	switch (procstat->type) {
22177cc0ebfdSMikolaj Golub 	case PROCSTAT_KVM:
22181f84c47eSMikolaj Golub 		return (procstat_getrlimit_kvm(procstat->kd, kp, which,
22191f84c47eSMikolaj Golub 		    rlimit));
22207cc0ebfdSMikolaj Golub 	case PROCSTAT_SYSCTL:
22217cc0ebfdSMikolaj Golub 		return (procstat_getrlimit_sysctl(kp->ki_pid, which, rlimit));
22227cc0ebfdSMikolaj Golub 	case PROCSTAT_CORE:
22237cc0ebfdSMikolaj Golub 		return (procstat_getrlimit_core(procstat->core, which, rlimit));
22247cc0ebfdSMikolaj Golub 	default:
22257cc0ebfdSMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
22267cc0ebfdSMikolaj Golub 		return (-1);
22277cc0ebfdSMikolaj Golub 	}
22287cc0ebfdSMikolaj Golub }
22294cdf9796SMikolaj Golub 
22304cdf9796SMikolaj Golub static int
procstat_getpathname_sysctl(pid_t pid,char * pathname,size_t maxlen)22314cdf9796SMikolaj Golub procstat_getpathname_sysctl(pid_t pid, char *pathname, size_t maxlen)
22324cdf9796SMikolaj Golub {
22334cdf9796SMikolaj Golub 	int error, name[4];
22344cdf9796SMikolaj Golub 	size_t len;
22354cdf9796SMikolaj Golub 
22364cdf9796SMikolaj Golub 	name[0] = CTL_KERN;
22374cdf9796SMikolaj Golub 	name[1] = KERN_PROC;
22384cdf9796SMikolaj Golub 	name[2] = KERN_PROC_PATHNAME;
22394cdf9796SMikolaj Golub 	name[3] = pid;
22404cdf9796SMikolaj Golub 	len = maxlen;
224175b6a179SEnji Cooper 	error = sysctl(name, nitems(name), pathname, &len, NULL, 0);
22424cdf9796SMikolaj Golub 	if (error != 0 && errno != ESRCH)
22434cdf9796SMikolaj Golub 		warn("sysctl: kern.proc.pathname: %d", pid);
22444cdf9796SMikolaj Golub 	if (len == 0)
22454cdf9796SMikolaj Golub 		pathname[0] = '\0';
22464cdf9796SMikolaj Golub 	return (error);
22474cdf9796SMikolaj Golub }
22484cdf9796SMikolaj Golub 
22494cdf9796SMikolaj Golub static int
procstat_getpathname_core(struct procstat_core * core,char * pathname,size_t maxlen)22504cdf9796SMikolaj Golub procstat_getpathname_core(struct procstat_core *core, char *pathname,
22514cdf9796SMikolaj Golub     size_t maxlen)
22524cdf9796SMikolaj Golub {
22534cdf9796SMikolaj Golub 	struct kinfo_file *files;
22544cdf9796SMikolaj Golub 	int cnt, i, result;
22554cdf9796SMikolaj Golub 
22564cdf9796SMikolaj Golub 	files = kinfo_getfile_core(core, &cnt);
22574cdf9796SMikolaj Golub 	if (files == NULL)
22584cdf9796SMikolaj Golub 		return (-1);
22594cdf9796SMikolaj Golub 	result = -1;
22604cdf9796SMikolaj Golub 	for (i = 0; i < cnt; i++) {
22614cdf9796SMikolaj Golub 		if (files[i].kf_fd != KF_FD_TYPE_TEXT)
22624cdf9796SMikolaj Golub 			continue;
22634cdf9796SMikolaj Golub 		strncpy(pathname, files[i].kf_path, maxlen);
22644cdf9796SMikolaj Golub 		result = 0;
22654cdf9796SMikolaj Golub 		break;
22664cdf9796SMikolaj Golub 	}
22674cdf9796SMikolaj Golub 	free(files);
22684cdf9796SMikolaj Golub 	return (result);
22694cdf9796SMikolaj Golub }
22704cdf9796SMikolaj Golub 
22714cdf9796SMikolaj Golub int
procstat_getpathname(struct procstat * procstat,struct kinfo_proc * kp,char * pathname,size_t maxlen)22724cdf9796SMikolaj Golub procstat_getpathname(struct procstat *procstat, struct kinfo_proc *kp,
22734cdf9796SMikolaj Golub     char *pathname, size_t maxlen)
22744cdf9796SMikolaj Golub {
22754cdf9796SMikolaj Golub 	switch (procstat->type) {
22764cdf9796SMikolaj Golub 	case PROCSTAT_KVM:
2277dd70ad64SMikolaj Golub 		/* XXX: Return empty string. */
2278dd70ad64SMikolaj Golub 		if (maxlen > 0)
2279dd70ad64SMikolaj Golub 			pathname[0] = '\0';
2280dd70ad64SMikolaj Golub 		return (0);
22814cdf9796SMikolaj Golub 	case PROCSTAT_SYSCTL:
22824cdf9796SMikolaj Golub 		return (procstat_getpathname_sysctl(kp->ki_pid, pathname,
22834cdf9796SMikolaj Golub 		    maxlen));
22844cdf9796SMikolaj Golub 	case PROCSTAT_CORE:
22854cdf9796SMikolaj Golub 		return (procstat_getpathname_core(procstat->core, pathname,
22864cdf9796SMikolaj Golub 		    maxlen));
22874cdf9796SMikolaj Golub 	default:
22884cdf9796SMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
22894cdf9796SMikolaj Golub 		return (-1);
22904cdf9796SMikolaj Golub 	}
22914cdf9796SMikolaj Golub }
2292eec6cb1cSMikolaj Golub 
2293eec6cb1cSMikolaj Golub static int
procstat_getosrel_kvm(kvm_t * kd,struct kinfo_proc * kp,int * osrelp)22941f84c47eSMikolaj Golub procstat_getosrel_kvm(kvm_t *kd, struct kinfo_proc *kp, int *osrelp)
22951f84c47eSMikolaj Golub {
22961f84c47eSMikolaj Golub 	struct proc proc;
22971f84c47eSMikolaj Golub 
22981f84c47eSMikolaj Golub 	assert(kd != NULL);
22991f84c47eSMikolaj Golub 	assert(kp != NULL);
23001f84c47eSMikolaj Golub 	if (!kvm_read_all(kd, (unsigned long)kp->ki_paddr, &proc,
23011f84c47eSMikolaj Golub 	    sizeof(proc))) {
23021f84c47eSMikolaj Golub 		warnx("can't read proc struct at %p for pid %d",
23031f84c47eSMikolaj Golub 		    kp->ki_paddr, kp->ki_pid);
23041f84c47eSMikolaj Golub 		return (-1);
23051f84c47eSMikolaj Golub 	}
23061f84c47eSMikolaj Golub 	*osrelp = proc.p_osrel;
23071f84c47eSMikolaj Golub 	return (0);
23081f84c47eSMikolaj Golub }
23091f84c47eSMikolaj Golub 
23101f84c47eSMikolaj Golub static int
procstat_getosrel_sysctl(pid_t pid,int * osrelp)2311eec6cb1cSMikolaj Golub procstat_getosrel_sysctl(pid_t pid, int *osrelp)
2312eec6cb1cSMikolaj Golub {
2313eec6cb1cSMikolaj Golub 	int error, name[4];
2314eec6cb1cSMikolaj Golub 	size_t len;
2315eec6cb1cSMikolaj Golub 
2316eec6cb1cSMikolaj Golub 	name[0] = CTL_KERN;
2317eec6cb1cSMikolaj Golub 	name[1] = KERN_PROC;
2318eec6cb1cSMikolaj Golub 	name[2] = KERN_PROC_OSREL;
2319eec6cb1cSMikolaj Golub 	name[3] = pid;
2320eec6cb1cSMikolaj Golub 	len = sizeof(*osrelp);
232175b6a179SEnji Cooper 	error = sysctl(name, nitems(name), osrelp, &len, NULL, 0);
2322eec6cb1cSMikolaj Golub 	if (error != 0 && errno != ESRCH)
2323eec6cb1cSMikolaj Golub 		warn("sysctl: kern.proc.osrel: %d", pid);
2324eec6cb1cSMikolaj Golub 	return (error);
2325eec6cb1cSMikolaj Golub }
2326eec6cb1cSMikolaj Golub 
2327eec6cb1cSMikolaj Golub static int
procstat_getosrel_core(struct procstat_core * core,int * osrelp)2328eec6cb1cSMikolaj Golub procstat_getosrel_core(struct procstat_core *core, int *osrelp)
2329eec6cb1cSMikolaj Golub {
2330eec6cb1cSMikolaj Golub 	size_t len;
2331eec6cb1cSMikolaj Golub 	int *buf;
2332eec6cb1cSMikolaj Golub 
2333eec6cb1cSMikolaj Golub 	buf = procstat_core_get(core, PSC_TYPE_OSREL, NULL, &len);
2334eec6cb1cSMikolaj Golub 	if (buf == NULL)
2335eec6cb1cSMikolaj Golub 		return (-1);
2336eec6cb1cSMikolaj Golub 	if (len < sizeof(*osrelp)) {
2337eec6cb1cSMikolaj Golub 		free(buf);
2338eec6cb1cSMikolaj Golub 		return (-1);
2339eec6cb1cSMikolaj Golub 	}
2340eec6cb1cSMikolaj Golub 	*osrelp = *buf;
2341eec6cb1cSMikolaj Golub 	free(buf);
2342eec6cb1cSMikolaj Golub 	return (0);
2343eec6cb1cSMikolaj Golub }
2344eec6cb1cSMikolaj Golub 
2345eec6cb1cSMikolaj Golub int
procstat_getosrel(struct procstat * procstat,struct kinfo_proc * kp,int * osrelp)2346eec6cb1cSMikolaj Golub procstat_getosrel(struct procstat *procstat, struct kinfo_proc *kp, int *osrelp)
2347eec6cb1cSMikolaj Golub {
2348eec6cb1cSMikolaj Golub 	switch (procstat->type) {
2349eec6cb1cSMikolaj Golub 	case PROCSTAT_KVM:
23501f84c47eSMikolaj Golub 		return (procstat_getosrel_kvm(procstat->kd, kp, osrelp));
2351eec6cb1cSMikolaj Golub 	case PROCSTAT_SYSCTL:
2352eec6cb1cSMikolaj Golub 		return (procstat_getosrel_sysctl(kp->ki_pid, osrelp));
2353eec6cb1cSMikolaj Golub 	case PROCSTAT_CORE:
2354eec6cb1cSMikolaj Golub 		return (procstat_getosrel_core(procstat->core, osrelp));
2355eec6cb1cSMikolaj Golub 	default:
2356eec6cb1cSMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
2357eec6cb1cSMikolaj Golub 		return (-1);
2358eec6cb1cSMikolaj Golub 	}
2359eec6cb1cSMikolaj Golub }
23602ff020d3SMikolaj Golub 
23612ff020d3SMikolaj Golub #define PROC_AUXV_MAX	256
23622ff020d3SMikolaj Golub 
2363248fe3d3SBrooks Davis #ifdef PS_ARCH_HAS_FREEBSD32
23642ff020d3SMikolaj Golub static const char *elf32_sv_names[] = {
23652ff020d3SMikolaj Golub 	"Linux ELF32",
23662ff020d3SMikolaj Golub 	"FreeBSD ELF32",
23672ff020d3SMikolaj Golub };
23682ff020d3SMikolaj Golub 
23692ff020d3SMikolaj Golub static int
is_elf32_sysctl(pid_t pid)23702ff020d3SMikolaj Golub is_elf32_sysctl(pid_t pid)
23712ff020d3SMikolaj Golub {
23722ff020d3SMikolaj Golub 	int error, name[4];
23732ff020d3SMikolaj Golub 	size_t len, i;
237472a4ee26SBrooks Davis 	char sv_name[32];
23752ff020d3SMikolaj Golub 
23762ff020d3SMikolaj Golub 	name[0] = CTL_KERN;
23772ff020d3SMikolaj Golub 	name[1] = KERN_PROC;
23782ff020d3SMikolaj Golub 	name[2] = KERN_PROC_SV_NAME;
23792ff020d3SMikolaj Golub 	name[3] = pid;
23802ff020d3SMikolaj Golub 	len = sizeof(sv_name);
238175b6a179SEnji Cooper 	error = sysctl(name, nitems(name), sv_name, &len, NULL, 0);
23822ff020d3SMikolaj Golub 	if (error != 0 || len == 0)
23832ff020d3SMikolaj Golub 		return (0);
23842ff020d3SMikolaj Golub 	for (i = 0; i < sizeof(elf32_sv_names) / sizeof(*elf32_sv_names); i++) {
23852ff020d3SMikolaj Golub 		if (strncmp(sv_name, elf32_sv_names[i], sizeof(sv_name)) == 0)
23862ff020d3SMikolaj Golub 			return (1);
23872ff020d3SMikolaj Golub 	}
23882ff020d3SMikolaj Golub 	return (0);
23892ff020d3SMikolaj Golub }
23902ff020d3SMikolaj Golub 
23912ff020d3SMikolaj Golub static Elf_Auxinfo *
procstat_getauxv32_sysctl(pid_t pid,unsigned int * cntp)23922ff020d3SMikolaj Golub procstat_getauxv32_sysctl(pid_t pid, unsigned int *cntp)
23932ff020d3SMikolaj Golub {
23942ff020d3SMikolaj Golub 	Elf_Auxinfo *auxv;
23952ff020d3SMikolaj Golub 	Elf32_Auxinfo *auxv32;
23962ff020d3SMikolaj Golub 	size_t len;
23972ff020d3SMikolaj Golub 	unsigned int i, count;
23982ff020d3SMikolaj Golub 	int name[4];
23992ff020d3SMikolaj Golub 
24002ff020d3SMikolaj Golub 	name[0] = CTL_KERN;
24012ff020d3SMikolaj Golub 	name[1] = KERN_PROC;
24022ff020d3SMikolaj Golub 	name[2] = KERN_PROC_AUXV;
24032ff020d3SMikolaj Golub 	name[3] = pid;
24042ff020d3SMikolaj Golub 	len = PROC_AUXV_MAX * sizeof(Elf32_Auxinfo);
24052ff020d3SMikolaj Golub 	auxv = NULL;
24062ff020d3SMikolaj Golub 	auxv32 = malloc(len);
24072ff020d3SMikolaj Golub 	if (auxv32 == NULL) {
24082ff020d3SMikolaj Golub 		warn("malloc(%zu)", len);
24092ff020d3SMikolaj Golub 		goto out;
24102ff020d3SMikolaj Golub 	}
241175b6a179SEnji Cooper 	if (sysctl(name, nitems(name), auxv32, &len, NULL, 0) == -1) {
24122ff020d3SMikolaj Golub 		if (errno != ESRCH && errno != EPERM)
24132ff020d3SMikolaj Golub 			warn("sysctl: kern.proc.auxv: %d: %d", pid, errno);
24142ff020d3SMikolaj Golub 		goto out;
24152ff020d3SMikolaj Golub 	}
24168f06fabeSBrooks Davis 	count = len / sizeof(Elf32_Auxinfo);
24172ff020d3SMikolaj Golub 	auxv = malloc(count * sizeof(Elf_Auxinfo));
24182ff020d3SMikolaj Golub 	if (auxv == NULL) {
24192ff020d3SMikolaj Golub 		warn("malloc(%zu)", count * sizeof(Elf_Auxinfo));
24202ff020d3SMikolaj Golub 		goto out;
24212ff020d3SMikolaj Golub 	}
24222ff020d3SMikolaj Golub 	for (i = 0; i < count; i++) {
24232ff020d3SMikolaj Golub 		/*
24242ff020d3SMikolaj Golub 		 * XXX: We expect that values for a_type on a 32-bit platform
24252ff020d3SMikolaj Golub 		 * are directly mapped to values on 64-bit one, which is not
24262ff020d3SMikolaj Golub 		 * necessarily true.
24272ff020d3SMikolaj Golub 		 */
24282ff020d3SMikolaj Golub 		auxv[i].a_type = auxv32[i].a_type;
24299735cc0eSBrooks Davis 		/*
24309735cc0eSBrooks Davis 		 * Don't sign extend values.  Existing entries are positive
24319735cc0eSBrooks Davis 		 * integers or pointers.  Under freebsd32, programs typically
24329735cc0eSBrooks Davis 		 * have a full [0, 2^32) address space (perhaps minus the last
24339735cc0eSBrooks Davis 		 * page) and treating this as a signed integer would be
24349735cc0eSBrooks Davis 		 * confusing since these are not kernel pointers.
24359735cc0eSBrooks Davis 		 *
24369735cc0eSBrooks Davis 		 * XXX: A more complete translation would be ABI and
24379735cc0eSBrooks Davis 		 * type-aware.
24389735cc0eSBrooks Davis 		 */
24399735cc0eSBrooks Davis 		auxv[i].a_un.a_val = (uint32_t)auxv32[i].a_un.a_val;
24402ff020d3SMikolaj Golub 	}
24412ff020d3SMikolaj Golub 	*cntp = count;
24422ff020d3SMikolaj Golub out:
24432ff020d3SMikolaj Golub 	free(auxv32);
24442ff020d3SMikolaj Golub 	return (auxv);
24452ff020d3SMikolaj Golub }
2446248fe3d3SBrooks Davis #endif /* PS_ARCH_HAS_FREEBSD32 */
24472ff020d3SMikolaj Golub 
24482ff020d3SMikolaj Golub static Elf_Auxinfo *
procstat_getauxv_sysctl(pid_t pid,unsigned int * cntp)24492ff020d3SMikolaj Golub procstat_getauxv_sysctl(pid_t pid, unsigned int *cntp)
24502ff020d3SMikolaj Golub {
24512ff020d3SMikolaj Golub 	Elf_Auxinfo *auxv;
24522ff020d3SMikolaj Golub 	int name[4];
24532ff020d3SMikolaj Golub 	size_t len;
24542ff020d3SMikolaj Golub 
2455248fe3d3SBrooks Davis #ifdef PS_ARCH_HAS_FREEBSD32
24562ff020d3SMikolaj Golub 	if (is_elf32_sysctl(pid))
24572ff020d3SMikolaj Golub 		return (procstat_getauxv32_sysctl(pid, cntp));
24582ff020d3SMikolaj Golub #endif
24592ff020d3SMikolaj Golub 	name[0] = CTL_KERN;
24602ff020d3SMikolaj Golub 	name[1] = KERN_PROC;
24612ff020d3SMikolaj Golub 	name[2] = KERN_PROC_AUXV;
24622ff020d3SMikolaj Golub 	name[3] = pid;
24632ff020d3SMikolaj Golub 	len = PROC_AUXV_MAX * sizeof(Elf_Auxinfo);
24642ff020d3SMikolaj Golub 	auxv = malloc(len);
24652ff020d3SMikolaj Golub 	if (auxv == NULL) {
24662ff020d3SMikolaj Golub 		warn("malloc(%zu)", len);
24672ff020d3SMikolaj Golub 		return (NULL);
24682ff020d3SMikolaj Golub 	}
246975b6a179SEnji Cooper 	if (sysctl(name, nitems(name), auxv, &len, NULL, 0) == -1) {
24702ff020d3SMikolaj Golub 		if (errno != ESRCH && errno != EPERM)
24712ff020d3SMikolaj Golub 			warn("sysctl: kern.proc.auxv: %d: %d", pid, errno);
24722ff020d3SMikolaj Golub 		free(auxv);
24732ff020d3SMikolaj Golub 		return (NULL);
24742ff020d3SMikolaj Golub 	}
24752ff020d3SMikolaj Golub 	*cntp = len / sizeof(Elf_Auxinfo);
24762ff020d3SMikolaj Golub 	return (auxv);
24772ff020d3SMikolaj Golub }
24782ff020d3SMikolaj Golub 
24792ff020d3SMikolaj Golub static Elf_Auxinfo *
procstat_getauxv_core(struct procstat_core * core,unsigned int * cntp)24802ff020d3SMikolaj Golub procstat_getauxv_core(struct procstat_core *core, unsigned int *cntp)
24812ff020d3SMikolaj Golub {
24822ff020d3SMikolaj Golub 	Elf_Auxinfo *auxv;
24832ff020d3SMikolaj Golub 	size_t len;
24842ff020d3SMikolaj Golub 
24852ff020d3SMikolaj Golub 	auxv = procstat_core_get(core, PSC_TYPE_AUXV, NULL, &len);
24862ff020d3SMikolaj Golub 	if (auxv == NULL)
24872ff020d3SMikolaj Golub 		return (NULL);
24882ff020d3SMikolaj Golub 	*cntp = len / sizeof(Elf_Auxinfo);
24892ff020d3SMikolaj Golub 	return (auxv);
24902ff020d3SMikolaj Golub }
24912ff020d3SMikolaj Golub 
24922ff020d3SMikolaj Golub Elf_Auxinfo *
procstat_getauxv(struct procstat * procstat,struct kinfo_proc * kp,unsigned int * cntp)24932ff020d3SMikolaj Golub procstat_getauxv(struct procstat *procstat, struct kinfo_proc *kp,
24942ff020d3SMikolaj Golub     unsigned int *cntp)
24952ff020d3SMikolaj Golub {
24962ff020d3SMikolaj Golub 	switch (procstat->type) {
24972ff020d3SMikolaj Golub 	case PROCSTAT_KVM:
24982ff020d3SMikolaj Golub 		warnx("kvm method is not supported");
24992ff020d3SMikolaj Golub 		return (NULL);
25002ff020d3SMikolaj Golub 	case PROCSTAT_SYSCTL:
25012ff020d3SMikolaj Golub 		return (procstat_getauxv_sysctl(kp->ki_pid, cntp));
25022ff020d3SMikolaj Golub 	case PROCSTAT_CORE:
25032ff020d3SMikolaj Golub 		return (procstat_getauxv_core(procstat->core, cntp));
25042ff020d3SMikolaj Golub 	default:
25052ff020d3SMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
25062ff020d3SMikolaj Golub 		return (NULL);
25072ff020d3SMikolaj Golub 	}
25082ff020d3SMikolaj Golub }
25092ff020d3SMikolaj Golub 
25102ff020d3SMikolaj Golub void
procstat_freeauxv(struct procstat * procstat __unused,Elf_Auxinfo * auxv)25112ff020d3SMikolaj Golub procstat_freeauxv(struct procstat *procstat __unused, Elf_Auxinfo *auxv)
25122ff020d3SMikolaj Golub {
25132ff020d3SMikolaj Golub 
25142ff020d3SMikolaj Golub 	free(auxv);
25152ff020d3SMikolaj Golub }
251689358231SMikolaj Golub 
251786be94fcSTycho Nightingale static struct ptrace_lwpinfo *
procstat_getptlwpinfo_core(struct procstat_core * core,unsigned int * cntp)251886be94fcSTycho Nightingale procstat_getptlwpinfo_core(struct procstat_core *core, unsigned int *cntp)
251986be94fcSTycho Nightingale {
252086be94fcSTycho Nightingale 	void *buf;
252186be94fcSTycho Nightingale 	struct ptrace_lwpinfo *pl;
252286be94fcSTycho Nightingale 	unsigned int cnt;
252386be94fcSTycho Nightingale 	size_t len;
252486be94fcSTycho Nightingale 
252586be94fcSTycho Nightingale 	cnt = procstat_core_note_count(core, PSC_TYPE_PTLWPINFO);
252686be94fcSTycho Nightingale 	if (cnt == 0)
252786be94fcSTycho Nightingale 		return (NULL);
252886be94fcSTycho Nightingale 
252986be94fcSTycho Nightingale 	len = cnt * sizeof(*pl);
253086be94fcSTycho Nightingale 	buf = calloc(1, len);
253186be94fcSTycho Nightingale 	pl = procstat_core_get(core, PSC_TYPE_PTLWPINFO, buf, &len);
253286be94fcSTycho Nightingale 	if (pl == NULL) {
253386be94fcSTycho Nightingale 		free(buf);
253486be94fcSTycho Nightingale 		return (NULL);
253586be94fcSTycho Nightingale 	}
253686be94fcSTycho Nightingale 	*cntp = len / sizeof(*pl);
253786be94fcSTycho Nightingale 	return (pl);
253886be94fcSTycho Nightingale }
253986be94fcSTycho Nightingale 
254086be94fcSTycho Nightingale struct ptrace_lwpinfo *
procstat_getptlwpinfo(struct procstat * procstat,unsigned int * cntp)254186be94fcSTycho Nightingale procstat_getptlwpinfo(struct procstat *procstat, unsigned int *cntp)
254286be94fcSTycho Nightingale {
254386be94fcSTycho Nightingale 	switch (procstat->type) {
2544a2ae08e7SEnji Cooper 	case PROCSTAT_KVM:
2545a2ae08e7SEnji Cooper 		warnx("kvm method is not supported");
2546a2ae08e7SEnji Cooper 		return (NULL);
2547a2ae08e7SEnji Cooper 	case PROCSTAT_SYSCTL:
2548a2ae08e7SEnji Cooper 		warnx("sysctl method is not supported");
2549a2ae08e7SEnji Cooper 		return (NULL);
255086be94fcSTycho Nightingale 	case PROCSTAT_CORE:
255186be94fcSTycho Nightingale 	 	return (procstat_getptlwpinfo_core(procstat->core, cntp));
255286be94fcSTycho Nightingale 	default:
255386be94fcSTycho Nightingale 		warnx("unknown access method: %d", procstat->type);
255486be94fcSTycho Nightingale 		return (NULL);
255586be94fcSTycho Nightingale 	}
255686be94fcSTycho Nightingale }
255786be94fcSTycho Nightingale 
255886be94fcSTycho Nightingale void
procstat_freeptlwpinfo(struct procstat * procstat __unused,struct ptrace_lwpinfo * pl)255986be94fcSTycho Nightingale procstat_freeptlwpinfo(struct procstat *procstat __unused,
256086be94fcSTycho Nightingale     struct ptrace_lwpinfo *pl)
256186be94fcSTycho Nightingale {
256286be94fcSTycho Nightingale 	free(pl);
256386be94fcSTycho Nightingale }
256486be94fcSTycho Nightingale 
256589358231SMikolaj Golub static struct kinfo_kstack *
procstat_getkstack_sysctl(pid_t pid,int * cntp)256689358231SMikolaj Golub procstat_getkstack_sysctl(pid_t pid, int *cntp)
256789358231SMikolaj Golub {
256889358231SMikolaj Golub 	struct kinfo_kstack *kkstp;
256989358231SMikolaj Golub 	int error, name[4];
257089358231SMikolaj Golub 	size_t len;
257189358231SMikolaj Golub 
257289358231SMikolaj Golub 	name[0] = CTL_KERN;
257389358231SMikolaj Golub 	name[1] = KERN_PROC;
257489358231SMikolaj Golub 	name[2] = KERN_PROC_KSTACK;
257589358231SMikolaj Golub 	name[3] = pid;
257689358231SMikolaj Golub 
257789358231SMikolaj Golub 	len = 0;
257875b6a179SEnji Cooper 	error = sysctl(name, nitems(name), NULL, &len, NULL, 0);
257989358231SMikolaj Golub 	if (error < 0 && errno != ESRCH && errno != EPERM && errno != ENOENT) {
258089358231SMikolaj Golub 		warn("sysctl: kern.proc.kstack: %d", pid);
258189358231SMikolaj Golub 		return (NULL);
258289358231SMikolaj Golub 	}
258389358231SMikolaj Golub 	if (error == -1 && errno == ENOENT) {
258489358231SMikolaj Golub 		warnx("sysctl: kern.proc.kstack unavailable"
258589358231SMikolaj Golub 		    " (options DDB or options STACK required in kernel)");
258689358231SMikolaj Golub 		return (NULL);
258789358231SMikolaj Golub 	}
258889358231SMikolaj Golub 	if (error == -1)
258989358231SMikolaj Golub 		return (NULL);
259089358231SMikolaj Golub 	kkstp = malloc(len);
259189358231SMikolaj Golub 	if (kkstp == NULL) {
259289358231SMikolaj Golub 		warn("malloc(%zu)", len);
259389358231SMikolaj Golub 		return (NULL);
259489358231SMikolaj Golub 	}
2595427f12f1SEric van Gyzen 	if (sysctl(name, nitems(name), kkstp, &len, NULL, 0) == -1 &&
2596427f12f1SEric van Gyzen 	    errno != ENOMEM) {
259789358231SMikolaj Golub 		warn("sysctl: kern.proc.pid: %d", pid);
259889358231SMikolaj Golub 		free(kkstp);
259989358231SMikolaj Golub 		return (NULL);
260089358231SMikolaj Golub 	}
260189358231SMikolaj Golub 	*cntp = len / sizeof(*kkstp);
260289358231SMikolaj Golub 
260389358231SMikolaj Golub 	return (kkstp);
260489358231SMikolaj Golub }
260589358231SMikolaj Golub 
260689358231SMikolaj Golub struct kinfo_kstack *
procstat_getkstack(struct procstat * procstat,struct kinfo_proc * kp,unsigned int * cntp)260789358231SMikolaj Golub procstat_getkstack(struct procstat *procstat, struct kinfo_proc *kp,
260889358231SMikolaj Golub     unsigned int *cntp)
260989358231SMikolaj Golub {
261089358231SMikolaj Golub 	switch (procstat->type) {
261189358231SMikolaj Golub 	case PROCSTAT_KVM:
261289358231SMikolaj Golub 		warnx("kvm method is not supported");
261389358231SMikolaj Golub 		return (NULL);
261489358231SMikolaj Golub 	case PROCSTAT_SYSCTL:
261589358231SMikolaj Golub 		return (procstat_getkstack_sysctl(kp->ki_pid, cntp));
261689358231SMikolaj Golub 	case PROCSTAT_CORE:
261789358231SMikolaj Golub 		warnx("core method is not supported");
261889358231SMikolaj Golub 		return (NULL);
261989358231SMikolaj Golub 	default:
262089358231SMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
262189358231SMikolaj Golub 		return (NULL);
262289358231SMikolaj Golub 	}
262389358231SMikolaj Golub }
262489358231SMikolaj Golub 
262589358231SMikolaj Golub void
procstat_freekstack(struct procstat * procstat __unused,struct kinfo_kstack * kkstp)262689358231SMikolaj Golub procstat_freekstack(struct procstat *procstat __unused,
262789358231SMikolaj Golub     struct kinfo_kstack *kkstp)
262889358231SMikolaj Golub {
262989358231SMikolaj Golub 
263089358231SMikolaj Golub 	free(kkstp);
263189358231SMikolaj Golub }
2632039d1496SKonstantin Belousov 
2633039d1496SKonstantin Belousov static struct advlock_list *
procstat_getadvlock_sysctl(struct procstat * procstat __unused)2634039d1496SKonstantin Belousov procstat_getadvlock_sysctl(struct procstat *procstat __unused)
2635039d1496SKonstantin Belousov {
2636039d1496SKonstantin Belousov 	struct advlock_list *res;
2637039d1496SKonstantin Belousov 	struct advlock *a;
2638039d1496SKonstantin Belousov 	void *buf;
2639039d1496SKonstantin Belousov 	char *c;
2640039d1496SKonstantin Belousov 	struct kinfo_lockf *kl;
2641039d1496SKonstantin Belousov 	size_t buf_len;
2642039d1496SKonstantin Belousov 	int error;
2643039d1496SKonstantin Belousov 	static const int kl_name[] = { CTL_KERN, KERN_LOCKF };
2644039d1496SKonstantin Belousov 
2645039d1496SKonstantin Belousov 	res = malloc(sizeof(*res));
2646039d1496SKonstantin Belousov 	if (res == NULL)
2647039d1496SKonstantin Belousov 		return (NULL);
2648039d1496SKonstantin Belousov 	STAILQ_INIT(res);
2649039d1496SKonstantin Belousov 	buf = NULL;
2650039d1496SKonstantin Belousov 
2651039d1496SKonstantin Belousov 	buf_len = 0;
2652039d1496SKonstantin Belousov 	error = sysctl(kl_name, nitems(kl_name), NULL, &buf_len, NULL, 0);
2653039d1496SKonstantin Belousov 	if (error != 0) {
2654039d1496SKonstantin Belousov 		warn("sysctl KERN_LOCKF size");
2655039d1496SKonstantin Belousov 		goto fail;
2656039d1496SKonstantin Belousov 	}
2657039d1496SKonstantin Belousov 	buf_len *= 2;
2658039d1496SKonstantin Belousov 	buf = malloc(buf_len);
2659039d1496SKonstantin Belousov 	if (buf == NULL) {
2660039d1496SKonstantin Belousov 		warn("malloc");
2661039d1496SKonstantin Belousov 		goto fail;
2662039d1496SKonstantin Belousov 	}
2663039d1496SKonstantin Belousov 	error = sysctl(kl_name, nitems(kl_name), buf, &buf_len, NULL, 0);
2664039d1496SKonstantin Belousov 	if (error != 0) {
2665039d1496SKonstantin Belousov 		warn("sysctl KERN_LOCKF data");
2666039d1496SKonstantin Belousov 		goto fail;
2667039d1496SKonstantin Belousov 	}
2668039d1496SKonstantin Belousov 
2669039d1496SKonstantin Belousov 	for (c = buf; (char *)c < (char *)buf + buf_len;
2670039d1496SKonstantin Belousov 	    c += kl->kl_structsize) {
2671039d1496SKonstantin Belousov 		kl = (struct kinfo_lockf *)(void *)c;
2672039d1496SKonstantin Belousov 		if (sizeof(*kl) < (size_t)kl->kl_structsize) {
2673039d1496SKonstantin Belousov 			warn("ABI broken");
2674039d1496SKonstantin Belousov 			goto fail;
2675039d1496SKonstantin Belousov 		}
2676039d1496SKonstantin Belousov 		a = malloc(sizeof(*a));
2677039d1496SKonstantin Belousov 		if (a == NULL) {
2678039d1496SKonstantin Belousov 			warn("malloc advlock");
2679039d1496SKonstantin Belousov 			goto fail;
2680039d1496SKonstantin Belousov 		}
2681039d1496SKonstantin Belousov 		switch (kl->kl_rw) {
2682039d1496SKonstantin Belousov 		case KLOCKF_RW_READ:
2683039d1496SKonstantin Belousov 			a->rw = PS_ADVLOCK_RO;
2684039d1496SKonstantin Belousov 			break;
2685039d1496SKonstantin Belousov 		case KLOCKF_RW_WRITE:
2686039d1496SKonstantin Belousov 			a->rw = PS_ADVLOCK_RW;
2687039d1496SKonstantin Belousov 			break;
2688039d1496SKonstantin Belousov 		default:
2689039d1496SKonstantin Belousov 			warn("ABI broken");
2690039d1496SKonstantin Belousov 			free(a);
2691039d1496SKonstantin Belousov 			goto fail;
2692039d1496SKonstantin Belousov 		}
2693039d1496SKonstantin Belousov 		switch (kl->kl_type) {
2694039d1496SKonstantin Belousov 		case KLOCKF_TYPE_FLOCK:
2695039d1496SKonstantin Belousov 			a->type = PS_ADVLOCK_TYPE_FLOCK;
2696039d1496SKonstantin Belousov 			break;
2697039d1496SKonstantin Belousov 		case KLOCKF_TYPE_PID:
2698039d1496SKonstantin Belousov 			a->type = PS_ADVLOCK_TYPE_PID;
2699039d1496SKonstantin Belousov 			break;
2700039d1496SKonstantin Belousov 		case KLOCKF_TYPE_REMOTE:
2701039d1496SKonstantin Belousov 			a->type = PS_ADVLOCK_TYPE_REMOTE;
2702039d1496SKonstantin Belousov 			break;
2703039d1496SKonstantin Belousov 		default:
2704039d1496SKonstantin Belousov 			warn("ABI broken");
2705039d1496SKonstantin Belousov 			free(a);
2706039d1496SKonstantin Belousov 			goto fail;
2707039d1496SKonstantin Belousov 		}
2708039d1496SKonstantin Belousov 		a->pid = kl->kl_pid;
2709039d1496SKonstantin Belousov 		a->sysid = kl->kl_sysid;
2710039d1496SKonstantin Belousov 		a->file_fsid = kl->kl_file_fsid;
2711039d1496SKonstantin Belousov 		a->file_rdev = kl->kl_file_rdev;
2712039d1496SKonstantin Belousov 		a->file_fileid = kl->kl_file_fileid;
2713039d1496SKonstantin Belousov 		a->start = kl->kl_start;
2714039d1496SKonstantin Belousov 		a->len = kl->kl_len;
2715039d1496SKonstantin Belousov 		if (kl->kl_path[0] != '\0') {
2716039d1496SKonstantin Belousov 			a->path = strdup(kl->kl_path);
2717039d1496SKonstantin Belousov 			if (a->path == NULL) {
2718039d1496SKonstantin Belousov 				warn("malloc");
2719039d1496SKonstantin Belousov 				free(a);
2720039d1496SKonstantin Belousov 				goto fail;
2721039d1496SKonstantin Belousov 			}
2722039d1496SKonstantin Belousov 		} else
2723039d1496SKonstantin Belousov 			a->path = NULL;
2724039d1496SKonstantin Belousov 		STAILQ_INSERT_TAIL(res, a, next);
2725039d1496SKonstantin Belousov 	}
2726039d1496SKonstantin Belousov 
2727039d1496SKonstantin Belousov 	free(buf);
2728039d1496SKonstantin Belousov 	return (res);
2729039d1496SKonstantin Belousov 
2730039d1496SKonstantin Belousov fail:
2731039d1496SKonstantin Belousov 	free(buf);
2732039d1496SKonstantin Belousov 	procstat_freeadvlock(procstat, res);
2733039d1496SKonstantin Belousov 	return (NULL);
2734039d1496SKonstantin Belousov }
2735039d1496SKonstantin Belousov 
2736039d1496SKonstantin Belousov struct advlock_list *
procstat_getadvlock(struct procstat * procstat)2737039d1496SKonstantin Belousov procstat_getadvlock(struct procstat *procstat)
2738039d1496SKonstantin Belousov {
2739039d1496SKonstantin Belousov 	switch (procstat->type) {
2740039d1496SKonstantin Belousov 	case PROCSTAT_KVM:
2741039d1496SKonstantin Belousov 		warnx("kvm method is not supported");
2742039d1496SKonstantin Belousov 		return (NULL);
2743039d1496SKonstantin Belousov 	case PROCSTAT_SYSCTL:
2744039d1496SKonstantin Belousov 		return (procstat_getadvlock_sysctl(procstat));
2745039d1496SKonstantin Belousov 	case PROCSTAT_CORE:
2746039d1496SKonstantin Belousov 		warnx("core method is not supported");
2747039d1496SKonstantin Belousov 		return (NULL);
2748039d1496SKonstantin Belousov 	default:
2749039d1496SKonstantin Belousov 		warnx("unknown access method: %d", procstat->type);
2750039d1496SKonstantin Belousov 		return (NULL);
2751039d1496SKonstantin Belousov 	}
2752039d1496SKonstantin Belousov }
2753039d1496SKonstantin Belousov 
2754039d1496SKonstantin Belousov void
procstat_freeadvlock(struct procstat * procstat __unused,struct advlock_list * lst)2755039d1496SKonstantin Belousov procstat_freeadvlock(struct procstat *procstat __unused,
2756039d1496SKonstantin Belousov     struct advlock_list *lst)
2757039d1496SKonstantin Belousov {
2758039d1496SKonstantin Belousov 	struct advlock *a, *a1;
2759039d1496SKonstantin Belousov 
2760039d1496SKonstantin Belousov 	STAILQ_FOREACH_SAFE(a, lst, next, a1) {
2761039d1496SKonstantin Belousov 		free(__DECONST(char *, a->path));
2762039d1496SKonstantin Belousov 		free(a);
2763039d1496SKonstantin Belousov 	}
2764039d1496SKonstantin Belousov 	free(lst);
2765039d1496SKonstantin Belousov }
2766039d1496SKonstantin Belousov 
27676126f4eaSKonstantin Belousov static rlim_t *
procstat_getrlimitusage_sysctl(pid_t pid,unsigned * cntp)27686126f4eaSKonstantin Belousov procstat_getrlimitusage_sysctl(pid_t pid, unsigned *cntp)
27696126f4eaSKonstantin Belousov {
27706126f4eaSKonstantin Belousov 	int error, name[4];
27716126f4eaSKonstantin Belousov 	rlim_t *val;
27726126f4eaSKonstantin Belousov 	size_t len;
27736126f4eaSKonstantin Belousov 
27746126f4eaSKonstantin Belousov 	name[0] = CTL_KERN;
27756126f4eaSKonstantin Belousov 	name[1] = KERN_PROC;
27766126f4eaSKonstantin Belousov 	name[2] = KERN_PROC_RLIMIT_USAGE;
27776126f4eaSKonstantin Belousov 	name[3] = pid;
27786126f4eaSKonstantin Belousov 
27796126f4eaSKonstantin Belousov 	len = 0;
27806126f4eaSKonstantin Belousov 	error = sysctl(name, nitems(name), NULL, &len, NULL, 0);
27816126f4eaSKonstantin Belousov 	if (error == -1)
27826126f4eaSKonstantin Belousov 		return (NULL);
27836126f4eaSKonstantin Belousov 	val = malloc(len);
27846126f4eaSKonstantin Belousov 	if (val == NULL)
27856126f4eaSKonstantin Belousov 		return (NULL);
27866126f4eaSKonstantin Belousov 
27876126f4eaSKonstantin Belousov 	error = sysctl(name, nitems(name), val, &len, NULL, 0);
27886126f4eaSKonstantin Belousov 	if (error == -1) {
27896126f4eaSKonstantin Belousov 		free(val);
27906126f4eaSKonstantin Belousov 		return (NULL);
27916126f4eaSKonstantin Belousov 	}
27926126f4eaSKonstantin Belousov 	*cntp = len / sizeof(rlim_t);
27936126f4eaSKonstantin Belousov 	return (val);
27946126f4eaSKonstantin Belousov }
27956126f4eaSKonstantin Belousov 
27966126f4eaSKonstantin Belousov rlim_t *
procstat_getrlimitusage(struct procstat * procstat,struct kinfo_proc * kp,unsigned int * cntp)27976126f4eaSKonstantin Belousov procstat_getrlimitusage(struct procstat *procstat, struct kinfo_proc *kp,
27986126f4eaSKonstantin Belousov     unsigned int *cntp)
27996126f4eaSKonstantin Belousov {
28006126f4eaSKonstantin Belousov 	switch (procstat->type) {
28016126f4eaSKonstantin Belousov 	case PROCSTAT_KVM:
28026126f4eaSKonstantin Belousov 		warnx("kvm method is not supported");
28036126f4eaSKonstantin Belousov 		return (NULL);
28046126f4eaSKonstantin Belousov 	case PROCSTAT_SYSCTL:
28056126f4eaSKonstantin Belousov 		return (procstat_getrlimitusage_sysctl(kp->ki_pid, cntp));
28066126f4eaSKonstantin Belousov 	case PROCSTAT_CORE:
28076126f4eaSKonstantin Belousov 		warnx("core method is not supported");
28086126f4eaSKonstantin Belousov 		return (NULL);
28096126f4eaSKonstantin Belousov 	default:
28106126f4eaSKonstantin Belousov 		warnx("unknown access method: %d", procstat->type);
28116126f4eaSKonstantin Belousov 		return (NULL);
28126126f4eaSKonstantin Belousov 	}
28136126f4eaSKonstantin Belousov }
28146126f4eaSKonstantin Belousov 
28156126f4eaSKonstantin Belousov void
procstat_freerlimitusage(struct procstat * procstat __unused,rlim_t * resusage)28166126f4eaSKonstantin Belousov procstat_freerlimitusage(struct procstat *procstat __unused, rlim_t *resusage)
28176126f4eaSKonstantin Belousov {
28186126f4eaSKonstantin Belousov 	free(resusage);
28196126f4eaSKonstantin Belousov }
2820bf46aec4SKonstantin Belousov 
2821bf46aec4SKonstantin Belousov static struct kinfo_knote *
procstat_get_kqueue_info_sysctl(pid_t pid,int kqfd,unsigned int * cntp,char * errbuf)2822bf46aec4SKonstantin Belousov procstat_get_kqueue_info_sysctl(pid_t pid, int kqfd, unsigned int *cntp,
2823bf46aec4SKonstantin Belousov     char *errbuf)
2824bf46aec4SKonstantin Belousov {
2825bf46aec4SKonstantin Belousov 	int error, name[5];
2826bf46aec4SKonstantin Belousov 	struct kinfo_knote *val;
2827bf46aec4SKonstantin Belousov 	size_t len;
2828bf46aec4SKonstantin Belousov 
2829bf46aec4SKonstantin Belousov 	name[0] = CTL_KERN;
2830bf46aec4SKonstantin Belousov 	name[1] = KERN_PROC;
2831bf46aec4SKonstantin Belousov 	name[2] = KERN_PROC_KQUEUE;
2832bf46aec4SKonstantin Belousov 	name[3] = pid;
2833bf46aec4SKonstantin Belousov 	name[4] = kqfd;
2834bf46aec4SKonstantin Belousov 
2835bf46aec4SKonstantin Belousov 	len = 0;
2836bf46aec4SKonstantin Belousov 	error = sysctl(name, nitems(name), NULL, &len, NULL, 0);
2837bf46aec4SKonstantin Belousov 	if (error == -1) {
2838bf46aec4SKonstantin Belousov 		snprintf(errbuf, _POSIX2_LINE_MAX,
2839bf46aec4SKonstantin Belousov 		    "KERN_PROC_KQUEUE.pid<%d>.kq<%d> (size q) failed: %s",
2840bf46aec4SKonstantin Belousov 		    pid, kqfd, strerror(errno));
2841bf46aec4SKonstantin Belousov 		return (NULL);
2842bf46aec4SKonstantin Belousov 	}
2843bf46aec4SKonstantin Belousov 	val = malloc(len);
2844bf46aec4SKonstantin Belousov 	if (val == NULL) {
2845bf46aec4SKonstantin Belousov 		snprintf(errbuf, _POSIX2_LINE_MAX, "no memory");
2846bf46aec4SKonstantin Belousov 		return (NULL);
2847bf46aec4SKonstantin Belousov 	}
2848bf46aec4SKonstantin Belousov 
2849bf46aec4SKonstantin Belousov 	error = sysctl(name, nitems(name), val, &len, NULL, 0);
2850bf46aec4SKonstantin Belousov 	if (error == -1) {
2851bf46aec4SKonstantin Belousov 		snprintf(errbuf, _POSIX2_LINE_MAX,
2852bf46aec4SKonstantin Belousov 		    "KERN_PROC_KQUEUE.pid<%d>.kq<%d> failed: %s",
2853bf46aec4SKonstantin Belousov 		    pid, kqfd, strerror(errno));
2854bf46aec4SKonstantin Belousov 		free(val);
2855bf46aec4SKonstantin Belousov 		return (NULL);
2856bf46aec4SKonstantin Belousov 	}
2857bf46aec4SKonstantin Belousov 	*cntp = len / sizeof(*val);
2858bf46aec4SKonstantin Belousov 	return (val);
2859bf46aec4SKonstantin Belousov }
2860bf46aec4SKonstantin Belousov 
2861bf46aec4SKonstantin Belousov struct kinfo_knote *
procstat_get_kqueue_info(struct procstat * procstat,struct kinfo_proc * kp,int kqfd,unsigned int * count,char * errbuf)2862bf46aec4SKonstantin Belousov procstat_get_kqueue_info(struct procstat *procstat,
2863bf46aec4SKonstantin Belousov     struct kinfo_proc *kp, int kqfd, unsigned int *count, char *errbuf)
2864bf46aec4SKonstantin Belousov {
2865*1c3d6532SKonstantin Belousov 	struct kinfo_knote *kn, *k, *res, *rn;
2866*1c3d6532SKonstantin Belousov 	size_t len, kqn;
2867*1c3d6532SKonstantin Belousov 
2868bf46aec4SKonstantin Belousov 	switch (procstat->type) {
2869bf46aec4SKonstantin Belousov 	case PROCSTAT_KVM:
2870bf46aec4SKonstantin Belousov 		warnx("kvm method is not supported");
2871bf46aec4SKonstantin Belousov 		return (NULL);
2872bf46aec4SKonstantin Belousov 	case PROCSTAT_SYSCTL:
2873bf46aec4SKonstantin Belousov 		return (procstat_get_kqueue_info_sysctl(kp->ki_pid, kqfd,
2874bf46aec4SKonstantin Belousov 		    count, errbuf));
2875bf46aec4SKonstantin Belousov 	case PROCSTAT_CORE:
2876*1c3d6532SKonstantin Belousov 		k = procstat_core_get(procstat->core, PSC_TYPE_KQUEUES,
2877*1c3d6532SKonstantin Belousov 		    NULL, &len);
2878*1c3d6532SKonstantin Belousov 		if (k == NULL) {
2879*1c3d6532SKonstantin Belousov 			snprintf(errbuf, _POSIX2_LINE_MAX,
2880*1c3d6532SKonstantin Belousov 			    "getting NT_PROCSTAT_KQUEUES note failed");
2881*1c3d6532SKonstantin Belousov 			*count = 0;
2882bf46aec4SKonstantin Belousov 			return (NULL);
2883*1c3d6532SKonstantin Belousov 		}
2884*1c3d6532SKonstantin Belousov 		for (kqn = 0, kn = k; kn < k + len / sizeof(*kn); kn++) {
2885*1c3d6532SKonstantin Belousov 			if (kn->knt_kq_fd == kqfd)
2886*1c3d6532SKonstantin Belousov 				kqn++;
2887*1c3d6532SKonstantin Belousov 		}
2888*1c3d6532SKonstantin Belousov 		res = calloc(kqn, sizeof(*res));
2889*1c3d6532SKonstantin Belousov 		if (res == NULL) {
2890*1c3d6532SKonstantin Belousov 			free(k);
2891*1c3d6532SKonstantin Belousov 			snprintf(errbuf, _POSIX2_LINE_MAX,
2892*1c3d6532SKonstantin Belousov 			    "no memory");
2893*1c3d6532SKonstantin Belousov 			return (NULL);
2894*1c3d6532SKonstantin Belousov 		}
2895*1c3d6532SKonstantin Belousov 		for (kn = k, rn = res; kn < k + len / sizeof(*kn); kn++) {
2896*1c3d6532SKonstantin Belousov 			if (kn->knt_kq_fd != kqfd)
2897*1c3d6532SKonstantin Belousov 				continue;
2898*1c3d6532SKonstantin Belousov 			*rn = *kn;
2899*1c3d6532SKonstantin Belousov 			rn++;
2900*1c3d6532SKonstantin Belousov 		}
2901*1c3d6532SKonstantin Belousov 		*count = kqn;
2902*1c3d6532SKonstantin Belousov 		free(k);
2903*1c3d6532SKonstantin Belousov 		return (res);
2904bf46aec4SKonstantin Belousov 	default:
2905bf46aec4SKonstantin Belousov 		warnx("unknown access method: %d", procstat->type);
2906bf46aec4SKonstantin Belousov 		return (NULL);
2907bf46aec4SKonstantin Belousov 	}
2908bf46aec4SKonstantin Belousov }
2909bf46aec4SKonstantin Belousov 
2910bf46aec4SKonstantin Belousov void
procstat_freekqinfo(struct procstat * procstat __unused,struct kinfo_knote * v)2911bf46aec4SKonstantin Belousov procstat_freekqinfo(struct procstat *procstat __unused, struct kinfo_knote *v)
2912bf46aec4SKonstantin Belousov {
2913bf46aec4SKonstantin Belousov 	free(v);
2914bf46aec4SKonstantin Belousov }
2915