xref: /freebsd/lib/libprocstat/libprocstat.c (revision 4cdf9796417c68c0f3cbd97a751a822202db0ffd)
10daf62d9SStanislav Sedov /*-
20daf62d9SStanislav Sedov  * Copyright (c) 2009 Stanislav Sedov <stas@FreeBSD.org>
30daf62d9SStanislav Sedov  * Copyright (c) 1988, 1993
40daf62d9SStanislav Sedov  *      The Regents of the University of California.  All rights reserved.
50daf62d9SStanislav Sedov  *
60daf62d9SStanislav Sedov  * Redistribution and use in source and binary forms, with or without
70daf62d9SStanislav Sedov  * modification, are permitted provided that the following conditions
80daf62d9SStanislav Sedov  * are met:
90daf62d9SStanislav Sedov  * 1. Redistributions of source code must retain the above copyright
100daf62d9SStanislav Sedov  *    notice, this list of conditions and the following disclaimer.
110daf62d9SStanislav Sedov  * 2. Redistributions in binary form must reproduce the above copyright
120daf62d9SStanislav Sedov  *    notice, this list of conditions and the following disclaimer in the
130daf62d9SStanislav Sedov  *    documentation and/or other materials provided with the distribution.
140daf62d9SStanislav Sedov  * 3. All advertising materials mentioning features or use of this software
150daf62d9SStanislav Sedov  *    must display the following acknowledgement:
160daf62d9SStanislav Sedov  *      This product includes software developed by the University of
170daf62d9SStanislav Sedov  *      California, Berkeley and its contributors.
180daf62d9SStanislav Sedov  * 4. Neither the name of the University nor the names of its contributors
190daf62d9SStanislav Sedov  *    may be used to endorse or promote products derived from this software
200daf62d9SStanislav Sedov  *    without specific prior written permission.
210daf62d9SStanislav Sedov  *
220daf62d9SStanislav Sedov  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
230daf62d9SStanislav Sedov  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
240daf62d9SStanislav Sedov  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
250daf62d9SStanislav Sedov  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
260daf62d9SStanislav Sedov  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
270daf62d9SStanislav Sedov  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
280daf62d9SStanislav Sedov  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
290daf62d9SStanislav Sedov  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
300daf62d9SStanislav Sedov  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
310daf62d9SStanislav Sedov  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
320daf62d9SStanislav Sedov  * SUCH DAMAGE.
330daf62d9SStanislav Sedov  */
340daf62d9SStanislav Sedov 
350daf62d9SStanislav Sedov #include <sys/cdefs.h>
360daf62d9SStanislav Sedov __FBSDID("$FreeBSD$");
370daf62d9SStanislav Sedov 
380daf62d9SStanislav Sedov #include <sys/param.h>
390daf62d9SStanislav Sedov #include <sys/time.h>
407cc0ebfdSMikolaj Golub #include <sys/resourcevar.h>
410daf62d9SStanislav Sedov #include <sys/proc.h>
420daf62d9SStanislav Sedov #include <sys/user.h>
430daf62d9SStanislav Sedov #include <sys/stat.h>
440daf62d9SStanislav Sedov #include <sys/vnode.h>
450daf62d9SStanislav Sedov #include <sys/socket.h>
460daf62d9SStanislav Sedov #include <sys/socketvar.h>
470daf62d9SStanislav Sedov #include <sys/domain.h>
480daf62d9SStanislav Sedov #include <sys/protosw.h>
490daf62d9SStanislav Sedov #include <sys/un.h>
500daf62d9SStanislav Sedov #include <sys/unpcb.h>
510daf62d9SStanislav Sedov #include <sys/sysctl.h>
520daf62d9SStanislav Sedov #include <sys/tty.h>
530daf62d9SStanislav Sedov #include <sys/filedesc.h>
540daf62d9SStanislav Sedov #include <sys/queue.h>
550daf62d9SStanislav Sedov #define	_WANT_FILE
560daf62d9SStanislav Sedov #include <sys/file.h>
570daf62d9SStanislav Sedov #include <sys/conf.h>
58e506e182SJohn Baldwin #include <sys/mman.h>
590daf62d9SStanislav Sedov #define	_KERNEL
600daf62d9SStanislav Sedov #include <sys/mount.h>
610daf62d9SStanislav Sedov #include <sys/pipe.h>
620daf62d9SStanislav Sedov #include <ufs/ufs/quota.h>
630daf62d9SStanislav Sedov #include <ufs/ufs/inode.h>
640daf62d9SStanislav Sedov #include <fs/devfs/devfs.h>
650daf62d9SStanislav Sedov #include <fs/devfs/devfs_int.h>
660daf62d9SStanislav Sedov #undef _KERNEL
670daf62d9SStanislav Sedov #include <nfs/nfsproto.h>
680daf62d9SStanislav Sedov #include <nfsclient/nfs.h>
690daf62d9SStanislav Sedov #include <nfsclient/nfsnode.h>
700daf62d9SStanislav Sedov 
710daf62d9SStanislav Sedov #include <vm/vm.h>
720daf62d9SStanislav Sedov #include <vm/vm_map.h>
730daf62d9SStanislav Sedov #include <vm/vm_object.h>
740daf62d9SStanislav Sedov 
750daf62d9SStanislav Sedov #include <net/route.h>
760daf62d9SStanislav Sedov #include <netinet/in.h>
770daf62d9SStanislav Sedov #include <netinet/in_systm.h>
780daf62d9SStanislav Sedov #include <netinet/ip.h>
790daf62d9SStanislav Sedov #include <netinet/in_pcb.h>
800daf62d9SStanislav Sedov 
810daf62d9SStanislav Sedov #include <assert.h>
820daf62d9SStanislav Sedov #include <ctype.h>
830daf62d9SStanislav Sedov #include <err.h>
840daf62d9SStanislav Sedov #include <fcntl.h>
850daf62d9SStanislav Sedov #include <kvm.h>
860daf62d9SStanislav Sedov #include <libutil.h>
870daf62d9SStanislav Sedov #include <limits.h>
880daf62d9SStanislav Sedov #include <paths.h>
890daf62d9SStanislav Sedov #include <pwd.h>
900daf62d9SStanislav Sedov #include <stdio.h>
910daf62d9SStanislav Sedov #include <stdlib.h>
920daf62d9SStanislav Sedov #include <stddef.h>
930daf62d9SStanislav Sedov #include <string.h>
940daf62d9SStanislav Sedov #include <unistd.h>
950daf62d9SStanislav Sedov #include <netdb.h>
960daf62d9SStanislav Sedov 
970daf62d9SStanislav Sedov #include <libprocstat.h>
980daf62d9SStanislav Sedov #include "libprocstat_internal.h"
990daf62d9SStanislav Sedov #include "common_kvm.h"
1007153ad2bSMikolaj Golub #include "core.h"
1010daf62d9SStanislav Sedov 
1020daf62d9SStanislav Sedov int     statfs(const char *, struct statfs *);	/* XXX */
1030daf62d9SStanislav Sedov 
1040daf62d9SStanislav Sedov #define	PROCSTAT_KVM	1
1050daf62d9SStanislav Sedov #define	PROCSTAT_SYSCTL	2
1067153ad2bSMikolaj Golub #define	PROCSTAT_CORE	3
1070daf62d9SStanislav Sedov 
1080daf62d9SStanislav Sedov static char	*getmnton(kvm_t *kd, struct mount *m);
10939680c7bSMikolaj Golub static struct kinfo_vmentry *	kinfo_getvmmap_core(struct procstat_core *core,
11039680c7bSMikolaj Golub     int *cntp);
1110daf62d9SStanislav Sedov static struct filestat_list	*procstat_getfiles_kvm(
1120daf62d9SStanislav Sedov     struct procstat *procstat, struct kinfo_proc *kp, int mmapped);
1130daf62d9SStanislav Sedov static struct filestat_list	*procstat_getfiles_sysctl(
1140daf62d9SStanislav Sedov     struct procstat *procstat, struct kinfo_proc *kp, int mmapped);
1150daf62d9SStanislav Sedov static int	procstat_get_pipe_info_sysctl(struct filestat *fst,
1160daf62d9SStanislav Sedov     struct pipestat *pipe, char *errbuf);
1170daf62d9SStanislav Sedov static int	procstat_get_pipe_info_kvm(kvm_t *kd, struct filestat *fst,
1180daf62d9SStanislav Sedov     struct pipestat *pipe, char *errbuf);
1190daf62d9SStanislav Sedov static int	procstat_get_pts_info_sysctl(struct filestat *fst,
1200daf62d9SStanislav Sedov     struct ptsstat *pts, char *errbuf);
1210daf62d9SStanislav Sedov static int	procstat_get_pts_info_kvm(kvm_t *kd, struct filestat *fst,
1220daf62d9SStanislav Sedov     struct ptsstat *pts, char *errbuf);
123e506e182SJohn Baldwin static int	procstat_get_shm_info_sysctl(struct filestat *fst,
124e506e182SJohn Baldwin     struct shmstat *shm, char *errbuf);
125e506e182SJohn Baldwin static int	procstat_get_shm_info_kvm(kvm_t *kd, struct filestat *fst,
126e506e182SJohn Baldwin     struct shmstat *shm, char *errbuf);
1270daf62d9SStanislav Sedov static int	procstat_get_socket_info_sysctl(struct filestat *fst,
1280daf62d9SStanislav Sedov     struct sockstat *sock, char *errbuf);
1290daf62d9SStanislav Sedov static int	procstat_get_socket_info_kvm(kvm_t *kd, struct filestat *fst,
1300daf62d9SStanislav Sedov     struct sockstat *sock, char *errbuf);
1310daf62d9SStanislav Sedov static int	to_filestat_flags(int flags);
1320daf62d9SStanislav Sedov static int	procstat_get_vnode_info_kvm(kvm_t *kd, struct filestat *fst,
1330daf62d9SStanislav Sedov     struct vnstat *vn, char *errbuf);
1340daf62d9SStanislav Sedov static int	procstat_get_vnode_info_sysctl(struct filestat *fst,
1350daf62d9SStanislav Sedov     struct vnstat *vn, char *errbuf);
1367f1d14e6SMikolaj Golub static gid_t	*procstat_getgroups_core(struct procstat_core *core,
1377f1d14e6SMikolaj Golub     unsigned int *count);
1387f1d14e6SMikolaj Golub static gid_t	*procstat_getgroups_sysctl(pid_t pid, unsigned int *count);
139*4cdf9796SMikolaj Golub static int	procstat_getpathname_core(struct procstat_core *core,
140*4cdf9796SMikolaj Golub     char *pathname, size_t maxlen);
141*4cdf9796SMikolaj Golub static int	procstat_getpathname_sysctl(pid_t pid, char *pathname,
142*4cdf9796SMikolaj Golub     size_t maxlen);
1437cc0ebfdSMikolaj Golub static int	procstat_getrlimit_core(struct procstat_core *core, int which,
1447cc0ebfdSMikolaj Golub     struct rlimit* rlimit);
1457cc0ebfdSMikolaj Golub static int	procstat_getrlimit_sysctl(pid_t pid, int which,
1467cc0ebfdSMikolaj Golub     struct rlimit* rlimit);
1475b9bcba9SMikolaj Golub static int	procstat_getumask_core(struct procstat_core *core,
1485b9bcba9SMikolaj Golub     unsigned short *maskp);
1495b9bcba9SMikolaj Golub static int	procstat_getumask_sysctl(pid_t pid, unsigned short *maskp);
1500daf62d9SStanislav Sedov static int	vntype2psfsttype(int type);
1510daf62d9SStanislav Sedov 
1520daf62d9SStanislav Sedov void
1530daf62d9SStanislav Sedov procstat_close(struct procstat *procstat)
1540daf62d9SStanislav Sedov {
1550daf62d9SStanislav Sedov 
1560daf62d9SStanislav Sedov 	assert(procstat);
1570daf62d9SStanislav Sedov 	if (procstat->type == PROCSTAT_KVM)
1580daf62d9SStanislav Sedov 		kvm_close(procstat->kd);
1597153ad2bSMikolaj Golub 	else if (procstat->type == PROCSTAT_CORE)
1607153ad2bSMikolaj Golub 		procstat_core_close(procstat->core);
161d7b666aeSSergey Kandaurov 	free(procstat);
1620daf62d9SStanislav Sedov }
1630daf62d9SStanislav Sedov 
1640daf62d9SStanislav Sedov struct procstat *
1650daf62d9SStanislav Sedov procstat_open_sysctl(void)
1660daf62d9SStanislav Sedov {
1670daf62d9SStanislav Sedov 	struct procstat *procstat;
1680daf62d9SStanislav Sedov 
1690daf62d9SStanislav Sedov 	procstat = calloc(1, sizeof(*procstat));
1700daf62d9SStanislav Sedov 	if (procstat == NULL) {
1710daf62d9SStanislav Sedov 		warn("malloc()");
1720daf62d9SStanislav Sedov 		return (NULL);
1730daf62d9SStanislav Sedov 	}
1740daf62d9SStanislav Sedov 	procstat->type = PROCSTAT_SYSCTL;
1750daf62d9SStanislav Sedov 	return (procstat);
1760daf62d9SStanislav Sedov }
1770daf62d9SStanislav Sedov 
1780daf62d9SStanislav Sedov struct procstat *
1790daf62d9SStanislav Sedov procstat_open_kvm(const char *nlistf, const char *memf)
1800daf62d9SStanislav Sedov {
1810daf62d9SStanislav Sedov 	struct procstat *procstat;
1820daf62d9SStanislav Sedov 	kvm_t *kd;
1830daf62d9SStanislav Sedov 	char buf[_POSIX2_LINE_MAX];
1840daf62d9SStanislav Sedov 
1850daf62d9SStanislav Sedov 	procstat = calloc(1, sizeof(*procstat));
1860daf62d9SStanislav Sedov 	if (procstat == NULL) {
1870daf62d9SStanislav Sedov 		warn("malloc()");
1880daf62d9SStanislav Sedov 		return (NULL);
1890daf62d9SStanislav Sedov 	}
1900daf62d9SStanislav Sedov 	kd = kvm_openfiles(nlistf, memf, NULL, O_RDONLY, buf);
1910daf62d9SStanislav Sedov 	if (kd == NULL) {
1920daf62d9SStanislav Sedov 		warnx("kvm_openfiles(): %s", buf);
1930daf62d9SStanislav Sedov 		free(procstat);
1940daf62d9SStanislav Sedov 		return (NULL);
1950daf62d9SStanislav Sedov 	}
1960daf62d9SStanislav Sedov 	procstat->type = PROCSTAT_KVM;
1970daf62d9SStanislav Sedov 	procstat->kd = kd;
1980daf62d9SStanislav Sedov 	return (procstat);
1990daf62d9SStanislav Sedov }
2000daf62d9SStanislav Sedov 
2017153ad2bSMikolaj Golub struct procstat *
2027153ad2bSMikolaj Golub procstat_open_core(const char *filename)
2037153ad2bSMikolaj Golub {
2047153ad2bSMikolaj Golub 	struct procstat *procstat;
2057153ad2bSMikolaj Golub 	struct procstat_core *core;
2067153ad2bSMikolaj Golub 
2077153ad2bSMikolaj Golub 	procstat = calloc(1, sizeof(*procstat));
2087153ad2bSMikolaj Golub 	if (procstat == NULL) {
2097153ad2bSMikolaj Golub 		warn("malloc()");
2107153ad2bSMikolaj Golub 		return (NULL);
2117153ad2bSMikolaj Golub 	}
2127153ad2bSMikolaj Golub 	core = procstat_core_open(filename);
2137153ad2bSMikolaj Golub 	if (core == NULL) {
2147153ad2bSMikolaj Golub 		free(procstat);
2157153ad2bSMikolaj Golub 		return (NULL);
2167153ad2bSMikolaj Golub 	}
2177153ad2bSMikolaj Golub 	procstat->type = PROCSTAT_CORE;
2187153ad2bSMikolaj Golub 	procstat->core = core;
2197153ad2bSMikolaj Golub 	return (procstat);
2207153ad2bSMikolaj Golub }
2217153ad2bSMikolaj Golub 
2220daf62d9SStanislav Sedov struct kinfo_proc *
2230daf62d9SStanislav Sedov procstat_getprocs(struct procstat *procstat, int what, int arg,
2240daf62d9SStanislav Sedov     unsigned int *count)
2250daf62d9SStanislav Sedov {
2260daf62d9SStanislav Sedov 	struct kinfo_proc *p0, *p;
2270daf62d9SStanislav Sedov 	size_t len;
2280daf62d9SStanislav Sedov 	int name[4];
229391bdfb8SAndriy Gapon 	int cnt;
2300daf62d9SStanislav Sedov 	int error;
2310daf62d9SStanislav Sedov 
2320daf62d9SStanislav Sedov 	assert(procstat);
2330daf62d9SStanislav Sedov 	assert(count);
2340daf62d9SStanislav Sedov 	p = NULL;
2350daf62d9SStanislav Sedov 	if (procstat->type == PROCSTAT_KVM) {
236391bdfb8SAndriy Gapon 		*count = 0;
237391bdfb8SAndriy Gapon 		p0 = kvm_getprocs(procstat->kd, what, arg, &cnt);
238391bdfb8SAndriy Gapon 		if (p0 == NULL || cnt <= 0)
2390daf62d9SStanislav Sedov 			return (NULL);
240391bdfb8SAndriy Gapon 		*count = cnt;
2410daf62d9SStanislav Sedov 		len = *count * sizeof(*p);
2420daf62d9SStanislav Sedov 		p = malloc(len);
2430daf62d9SStanislav Sedov 		if (p == NULL) {
24465869214SJilles Tjoelker 			warnx("malloc(%zu)", len);
2450daf62d9SStanislav Sedov 			goto fail;
2460daf62d9SStanislav Sedov 		}
2470daf62d9SStanislav Sedov 		bcopy(p0, p, len);
2480daf62d9SStanislav Sedov 		return (p);
2490daf62d9SStanislav Sedov 	} else if (procstat->type == PROCSTAT_SYSCTL) {
2500daf62d9SStanislav Sedov 		len = 0;
2510daf62d9SStanislav Sedov 		name[0] = CTL_KERN;
2520daf62d9SStanislav Sedov 		name[1] = KERN_PROC;
2530daf62d9SStanislav Sedov 		name[2] = what;
2540daf62d9SStanislav Sedov 		name[3] = arg;
2550daf62d9SStanislav Sedov 		error = sysctl(name, 4, NULL, &len, NULL, 0);
2560daf62d9SStanislav Sedov 		if (error < 0 && errno != EPERM) {
2570daf62d9SStanislav Sedov 			warn("sysctl(kern.proc)");
2580daf62d9SStanislav Sedov 			goto fail;
2590daf62d9SStanislav Sedov 		}
2600daf62d9SStanislav Sedov 		if (len == 0) {
2610daf62d9SStanislav Sedov 			warnx("no processes?");
2620daf62d9SStanislav Sedov 			goto fail;
2630daf62d9SStanislav Sedov 		}
2640daf62d9SStanislav Sedov 		p = malloc(len);
2650daf62d9SStanislav Sedov 		if (p == NULL) {
26665869214SJilles Tjoelker 			warnx("malloc(%zu)", len);
2670daf62d9SStanislav Sedov 			goto fail;
2680daf62d9SStanislav Sedov 		}
2690daf62d9SStanislav Sedov 		error = sysctl(name, 4, p, &len, NULL, 0);
2700daf62d9SStanislav Sedov 		if (error < 0 && errno != EPERM) {
2710daf62d9SStanislav Sedov 			warn("sysctl(kern.proc)");
2720daf62d9SStanislav Sedov 			goto fail;
2730daf62d9SStanislav Sedov 		}
2740daf62d9SStanislav Sedov 		/* Perform simple consistency checks. */
2750daf62d9SStanislav Sedov 		if ((len % sizeof(*p)) != 0 || p->ki_structsize != sizeof(*p)) {
2767153ad2bSMikolaj Golub 			warnx("kinfo_proc structure size mismatch (len = %zu)", len);
2777153ad2bSMikolaj Golub 			goto fail;
2787153ad2bSMikolaj Golub 		}
2797153ad2bSMikolaj Golub 		*count = len / sizeof(*p);
2807153ad2bSMikolaj Golub 		return (p);
2817153ad2bSMikolaj Golub 	} else if (procstat->type == PROCSTAT_CORE) {
2827153ad2bSMikolaj Golub 		p = procstat_core_get(procstat->core, PSC_TYPE_PROC, NULL,
2837153ad2bSMikolaj Golub 		    &len);
2847153ad2bSMikolaj Golub 		if ((len % sizeof(*p)) != 0 || p->ki_structsize != sizeof(*p)) {
2850daf62d9SStanislav Sedov 			warnx("kinfo_proc structure size mismatch");
2860daf62d9SStanislav Sedov 			goto fail;
2870daf62d9SStanislav Sedov 		}
2880daf62d9SStanislav Sedov 		*count = len / sizeof(*p);
2890daf62d9SStanislav Sedov 		return (p);
2900daf62d9SStanislav Sedov 	} else {
29180905c35SJilles Tjoelker 		warnx("unknown access method: %d", procstat->type);
2920daf62d9SStanislav Sedov 		return (NULL);
2930daf62d9SStanislav Sedov 	}
2940daf62d9SStanislav Sedov fail:
2950daf62d9SStanislav Sedov 	if (p)
2960daf62d9SStanislav Sedov 		free(p);
2970daf62d9SStanislav Sedov 	return (NULL);
2980daf62d9SStanislav Sedov }
2990daf62d9SStanislav Sedov 
3000daf62d9SStanislav Sedov void
3010daf62d9SStanislav Sedov procstat_freeprocs(struct procstat *procstat __unused, struct kinfo_proc *p)
3020daf62d9SStanislav Sedov {
3030daf62d9SStanislav Sedov 
3040daf62d9SStanislav Sedov 	if (p != NULL)
3050daf62d9SStanislav Sedov 		free(p);
3060daf62d9SStanislav Sedov 	p = NULL;
3070daf62d9SStanislav Sedov }
3080daf62d9SStanislav Sedov 
3090daf62d9SStanislav Sedov struct filestat_list *
3100daf62d9SStanislav Sedov procstat_getfiles(struct procstat *procstat, struct kinfo_proc *kp, int mmapped)
3110daf62d9SStanislav Sedov {
3120daf62d9SStanislav Sedov 
3137153ad2bSMikolaj Golub 	switch(procstat->type) {
3147153ad2bSMikolaj Golub 	case PROCSTAT_KVM:
3150daf62d9SStanislav Sedov 		return (procstat_getfiles_kvm(procstat, kp, mmapped));
3167153ad2bSMikolaj Golub 	case PROCSTAT_SYSCTL:
3177153ad2bSMikolaj Golub 	case PROCSTAT_CORE:
3187153ad2bSMikolaj Golub 		return (procstat_getfiles_sysctl(procstat, kp, mmapped));
3197153ad2bSMikolaj Golub 	default:
3207153ad2bSMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
3210daf62d9SStanislav Sedov 		return (NULL);
3220daf62d9SStanislav Sedov 	}
3237153ad2bSMikolaj Golub }
3240daf62d9SStanislav Sedov 
3250daf62d9SStanislav Sedov void
3260daf62d9SStanislav Sedov procstat_freefiles(struct procstat *procstat, struct filestat_list *head)
3270daf62d9SStanislav Sedov {
3280daf62d9SStanislav Sedov 	struct filestat *fst, *tmp;
3290daf62d9SStanislav Sedov 
3300daf62d9SStanislav Sedov 	STAILQ_FOREACH_SAFE(fst, head, next, tmp) {
3310daf62d9SStanislav Sedov 		if (fst->fs_path != NULL)
3320daf62d9SStanislav Sedov 			free(fst->fs_path);
3330daf62d9SStanislav Sedov 		free(fst);
3340daf62d9SStanislav Sedov 	}
3350daf62d9SStanislav Sedov 	free(head);
3360daf62d9SStanislav Sedov 	if (procstat->vmentries != NULL) {
3370daf62d9SStanislav Sedov 		free(procstat->vmentries);
3380daf62d9SStanislav Sedov 		procstat->vmentries = NULL;
3390daf62d9SStanislav Sedov 	}
3400daf62d9SStanislav Sedov 	if (procstat->files != NULL) {
3410daf62d9SStanislav Sedov 		free(procstat->files);
3420daf62d9SStanislav Sedov 		procstat->files = NULL;
3430daf62d9SStanislav Sedov 	}
3440daf62d9SStanislav Sedov }
3450daf62d9SStanislav Sedov 
3460daf62d9SStanislav Sedov static struct filestat *
3470daf62d9SStanislav Sedov filestat_new_entry(void *typedep, int type, int fd, int fflags, int uflags,
348d57486e2SRobert Watson     int refcount, off_t offset, char *path, cap_rights_t cap_rights)
3490daf62d9SStanislav Sedov {
3500daf62d9SStanislav Sedov 	struct filestat *entry;
3510daf62d9SStanislav Sedov 
3520daf62d9SStanislav Sedov 	entry = calloc(1, sizeof(*entry));
3530daf62d9SStanislav Sedov 	if (entry == NULL) {
3540daf62d9SStanislav Sedov 		warn("malloc()");
3550daf62d9SStanislav Sedov 		return (NULL);
3560daf62d9SStanislav Sedov 	}
3570daf62d9SStanislav Sedov 	entry->fs_typedep = typedep;
3580daf62d9SStanislav Sedov 	entry->fs_fflags = fflags;
3590daf62d9SStanislav Sedov 	entry->fs_uflags = uflags;
3600daf62d9SStanislav Sedov 	entry->fs_fd = fd;
3610daf62d9SStanislav Sedov 	entry->fs_type = type;
3620daf62d9SStanislav Sedov 	entry->fs_ref_count = refcount;
3630daf62d9SStanislav Sedov 	entry->fs_offset = offset;
3640daf62d9SStanislav Sedov 	entry->fs_path = path;
365d57486e2SRobert Watson 	entry->fs_cap_rights = cap_rights;
3660daf62d9SStanislav Sedov 	return (entry);
3670daf62d9SStanislav Sedov }
3680daf62d9SStanislav Sedov 
3690daf62d9SStanislav Sedov static struct vnode *
3700daf62d9SStanislav Sedov getctty(kvm_t *kd, struct kinfo_proc *kp)
3710daf62d9SStanislav Sedov {
3720daf62d9SStanislav Sedov 	struct pgrp pgrp;
3730daf62d9SStanislav Sedov 	struct proc proc;
3740daf62d9SStanislav Sedov 	struct session sess;
3750daf62d9SStanislav Sedov 	int error;
3760daf62d9SStanislav Sedov 
3770daf62d9SStanislav Sedov 	assert(kp);
3780daf62d9SStanislav Sedov 	error = kvm_read_all(kd, (unsigned long)kp->ki_paddr, &proc,
3790daf62d9SStanislav Sedov 	    sizeof(proc));
3800daf62d9SStanislav Sedov 	if (error == 0) {
3810daf62d9SStanislav Sedov 		warnx("can't read proc struct at %p for pid %d",
3820daf62d9SStanislav Sedov 		    kp->ki_paddr, kp->ki_pid);
3830daf62d9SStanislav Sedov 		return (NULL);
3840daf62d9SStanislav Sedov 	}
3850daf62d9SStanislav Sedov 	if (proc.p_pgrp == NULL)
3860daf62d9SStanislav Sedov 		return (NULL);
3870daf62d9SStanislav Sedov 	error = kvm_read_all(kd, (unsigned long)proc.p_pgrp, &pgrp,
3880daf62d9SStanislav Sedov 	    sizeof(pgrp));
3890daf62d9SStanislav Sedov 	if (error == 0) {
3900daf62d9SStanislav Sedov 		warnx("can't read pgrp struct at %p for pid %d",
3910daf62d9SStanislav Sedov 		    proc.p_pgrp, kp->ki_pid);
3920daf62d9SStanislav Sedov 		return (NULL);
3930daf62d9SStanislav Sedov 	}
3940daf62d9SStanislav Sedov 	error = kvm_read_all(kd, (unsigned long)pgrp.pg_session, &sess,
3950daf62d9SStanislav Sedov 	    sizeof(sess));
3960daf62d9SStanislav Sedov 	if (error == 0) {
3970daf62d9SStanislav Sedov 		warnx("can't read session struct at %p for pid %d",
3980daf62d9SStanislav Sedov 		    pgrp.pg_session, kp->ki_pid);
3990daf62d9SStanislav Sedov 		return (NULL);
4000daf62d9SStanislav Sedov 	}
4010daf62d9SStanislav Sedov 	return (sess.s_ttyvp);
4020daf62d9SStanislav Sedov }
4030daf62d9SStanislav Sedov 
4040daf62d9SStanislav Sedov static struct filestat_list *
4050daf62d9SStanislav Sedov procstat_getfiles_kvm(struct procstat *procstat, struct kinfo_proc *kp, int mmapped)
4060daf62d9SStanislav Sedov {
4070daf62d9SStanislav Sedov 	struct file file;
4080daf62d9SStanislav Sedov 	struct filedesc filed;
4090daf62d9SStanislav Sedov 	struct vm_map_entry vmentry;
4100daf62d9SStanislav Sedov 	struct vm_object object;
4110daf62d9SStanislav Sedov 	struct vmspace vmspace;
4120daf62d9SStanislav Sedov 	vm_map_entry_t entryp;
4130daf62d9SStanislav Sedov 	vm_map_t map;
4140daf62d9SStanislav Sedov 	vm_object_t objp;
4150daf62d9SStanislav Sedov 	struct vnode *vp;
4160daf62d9SStanislav Sedov 	struct file **ofiles;
4170daf62d9SStanislav Sedov 	struct filestat *entry;
4180daf62d9SStanislav Sedov 	struct filestat_list *head;
4190daf62d9SStanislav Sedov 	kvm_t *kd;
4200daf62d9SStanislav Sedov 	void *data;
4210daf62d9SStanislav Sedov 	int i, fflags;
4220daf62d9SStanislav Sedov 	int prot, type;
4230daf62d9SStanislav Sedov 	unsigned int nfiles;
4240daf62d9SStanislav Sedov 
4250daf62d9SStanislav Sedov 	assert(procstat);
4260daf62d9SStanislav Sedov 	kd = procstat->kd;
4270daf62d9SStanislav Sedov 	if (kd == NULL)
4280daf62d9SStanislav Sedov 		return (NULL);
4290daf62d9SStanislav Sedov 	if (kp->ki_fd == NULL)
4300daf62d9SStanislav Sedov 		return (NULL);
4310daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)kp->ki_fd, &filed,
4320daf62d9SStanislav Sedov 	    sizeof(filed))) {
4330daf62d9SStanislav Sedov 		warnx("can't read filedesc at %p", (void *)kp->ki_fd);
4340daf62d9SStanislav Sedov 		return (NULL);
4350daf62d9SStanislav Sedov 	}
4360daf62d9SStanislav Sedov 
4370daf62d9SStanislav Sedov 	/*
4380daf62d9SStanislav Sedov 	 * Allocate list head.
4390daf62d9SStanislav Sedov 	 */
4400daf62d9SStanislav Sedov 	head = malloc(sizeof(*head));
4410daf62d9SStanislav Sedov 	if (head == NULL)
4420daf62d9SStanislav Sedov 		return (NULL);
4430daf62d9SStanislav Sedov 	STAILQ_INIT(head);
4440daf62d9SStanislav Sedov 
4450daf62d9SStanislav Sedov 	/* root directory vnode, if one. */
4460daf62d9SStanislav Sedov 	if (filed.fd_rdir) {
4470daf62d9SStanislav Sedov 		entry = filestat_new_entry(filed.fd_rdir, PS_FST_TYPE_VNODE, -1,
448d57486e2SRobert Watson 		    PS_FST_FFLAG_READ, PS_FST_UFLAG_RDIR, 0, 0, NULL, 0);
4490daf62d9SStanislav Sedov 		if (entry != NULL)
4500daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
4510daf62d9SStanislav Sedov 	}
4520daf62d9SStanislav Sedov 	/* current working directory vnode. */
4530daf62d9SStanislav Sedov 	if (filed.fd_cdir) {
4540daf62d9SStanislav Sedov 		entry = filestat_new_entry(filed.fd_cdir, PS_FST_TYPE_VNODE, -1,
455d57486e2SRobert Watson 		    PS_FST_FFLAG_READ, PS_FST_UFLAG_CDIR, 0, 0, NULL, 0);
4560daf62d9SStanislav Sedov 		if (entry != NULL)
4570daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
4580daf62d9SStanislav Sedov 	}
4590daf62d9SStanislav Sedov 	/* jail root, if any. */
4600daf62d9SStanislav Sedov 	if (filed.fd_jdir) {
4610daf62d9SStanislav Sedov 		entry = filestat_new_entry(filed.fd_jdir, PS_FST_TYPE_VNODE, -1,
462d57486e2SRobert Watson 		    PS_FST_FFLAG_READ, PS_FST_UFLAG_JAIL, 0, 0, NULL, 0);
4630daf62d9SStanislav Sedov 		if (entry != NULL)
4640daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
4650daf62d9SStanislav Sedov 	}
4660daf62d9SStanislav Sedov 	/* ktrace vnode, if one */
4670daf62d9SStanislav Sedov 	if (kp->ki_tracep) {
4680daf62d9SStanislav Sedov 		entry = filestat_new_entry(kp->ki_tracep, PS_FST_TYPE_VNODE, -1,
4690daf62d9SStanislav Sedov 		    PS_FST_FFLAG_READ | PS_FST_FFLAG_WRITE,
470d57486e2SRobert Watson 		    PS_FST_UFLAG_TRACE, 0, 0, NULL, 0);
4710daf62d9SStanislav Sedov 		if (entry != NULL)
4720daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
4730daf62d9SStanislav Sedov 	}
4740daf62d9SStanislav Sedov 	/* text vnode, if one */
4750daf62d9SStanislav Sedov 	if (kp->ki_textvp) {
4760daf62d9SStanislav Sedov 		entry = filestat_new_entry(kp->ki_textvp, PS_FST_TYPE_VNODE, -1,
477d57486e2SRobert Watson 		    PS_FST_FFLAG_READ, PS_FST_UFLAG_TEXT, 0, 0, NULL, 0);
4780daf62d9SStanislav Sedov 		if (entry != NULL)
4790daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
4800daf62d9SStanislav Sedov 	}
4810daf62d9SStanislav Sedov 	/* Controlling terminal. */
4820daf62d9SStanislav Sedov 	if ((vp = getctty(kd, kp)) != NULL) {
4830daf62d9SStanislav Sedov 		entry = filestat_new_entry(vp, PS_FST_TYPE_VNODE, -1,
4840daf62d9SStanislav Sedov 		    PS_FST_FFLAG_READ | PS_FST_FFLAG_WRITE,
485d57486e2SRobert Watson 		    PS_FST_UFLAG_CTTY, 0, 0, NULL, 0);
4860daf62d9SStanislav Sedov 		if (entry != NULL)
4870daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
4880daf62d9SStanislav Sedov 	}
4890daf62d9SStanislav Sedov 
4900daf62d9SStanislav Sedov 	nfiles = filed.fd_lastfile + 1;
4910daf62d9SStanislav Sedov 	ofiles = malloc(nfiles * sizeof(struct file *));
4920daf62d9SStanislav Sedov 	if (ofiles == NULL) {
49365869214SJilles Tjoelker 		warn("malloc(%zu)", nfiles * sizeof(struct file *));
4940daf62d9SStanislav Sedov 		goto do_mmapped;
4950daf62d9SStanislav Sedov 	}
4960daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)filed.fd_ofiles, ofiles,
4970daf62d9SStanislav Sedov 	    nfiles * sizeof(struct file *))) {
4980daf62d9SStanislav Sedov 		warnx("cannot read file structures at %p",
4990daf62d9SStanislav Sedov 		    (void *)filed.fd_ofiles);
5000daf62d9SStanislav Sedov 		free(ofiles);
5010daf62d9SStanislav Sedov 		goto do_mmapped;
5020daf62d9SStanislav Sedov 	}
5030daf62d9SStanislav Sedov 	for (i = 0; i <= filed.fd_lastfile; i++) {
5040daf62d9SStanislav Sedov 		if (ofiles[i] == NULL)
5050daf62d9SStanislav Sedov 			continue;
5060daf62d9SStanislav Sedov 		if (!kvm_read_all(kd, (unsigned long)ofiles[i], &file,
5070daf62d9SStanislav Sedov 		    sizeof(struct file))) {
5080daf62d9SStanislav Sedov 			warnx("can't read file %d at %p", i,
5090daf62d9SStanislav Sedov 			    (void *)ofiles[i]);
5100daf62d9SStanislav Sedov 			continue;
5110daf62d9SStanislav Sedov 		}
5120daf62d9SStanislav Sedov 		switch (file.f_type) {
5130daf62d9SStanislav Sedov 		case DTYPE_VNODE:
5140daf62d9SStanislav Sedov 			type = PS_FST_TYPE_VNODE;
5150daf62d9SStanislav Sedov 			data = file.f_vnode;
5160daf62d9SStanislav Sedov 			break;
5170daf62d9SStanislav Sedov 		case DTYPE_SOCKET:
5180daf62d9SStanislav Sedov 			type = PS_FST_TYPE_SOCKET;
5190daf62d9SStanislav Sedov 			data = file.f_data;
5200daf62d9SStanislav Sedov 			break;
5210daf62d9SStanislav Sedov 		case DTYPE_PIPE:
5220daf62d9SStanislav Sedov 			type = PS_FST_TYPE_PIPE;
5230daf62d9SStanislav Sedov 			data = file.f_data;
5240daf62d9SStanislav Sedov 			break;
5250daf62d9SStanislav Sedov 		case DTYPE_FIFO:
5260daf62d9SStanislav Sedov 			type = PS_FST_TYPE_FIFO;
5270daf62d9SStanislav Sedov 			data = file.f_vnode;
5280daf62d9SStanislav Sedov 			break;
5290daf62d9SStanislav Sedov #ifdef DTYPE_PTS
5300daf62d9SStanislav Sedov 		case DTYPE_PTS:
5310daf62d9SStanislav Sedov 			type = PS_FST_TYPE_PTS;
5320daf62d9SStanislav Sedov 			data = file.f_data;
5330daf62d9SStanislav Sedov 			break;
5340daf62d9SStanislav Sedov #endif
535e506e182SJohn Baldwin 		case DTYPE_SHM:
536e506e182SJohn Baldwin 			type = PS_FST_TYPE_SHM;
537e506e182SJohn Baldwin 			data = file.f_data;
538e506e182SJohn Baldwin 			break;
5390daf62d9SStanislav Sedov 		default:
5400daf62d9SStanislav Sedov 			continue;
5410daf62d9SStanislav Sedov 		}
542d57486e2SRobert Watson 		/* XXXRW: No capability rights support for kvm yet. */
5430daf62d9SStanislav Sedov 		entry = filestat_new_entry(data, type, i,
544d57486e2SRobert Watson 		    to_filestat_flags(file.f_flag), 0, 0, 0, NULL, 0);
5450daf62d9SStanislav Sedov 		if (entry != NULL)
5460daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
5470daf62d9SStanislav Sedov 	}
5480daf62d9SStanislav Sedov 	free(ofiles);
5490daf62d9SStanislav Sedov 
5500daf62d9SStanislav Sedov do_mmapped:
5510daf62d9SStanislav Sedov 
5520daf62d9SStanislav Sedov 	/*
5530daf62d9SStanislav Sedov 	 * Process mmapped files if requested.
5540daf62d9SStanislav Sedov 	 */
5550daf62d9SStanislav Sedov 	if (mmapped) {
5560daf62d9SStanislav Sedov 		if (!kvm_read_all(kd, (unsigned long)kp->ki_vmspace, &vmspace,
5570daf62d9SStanislav Sedov 		    sizeof(vmspace))) {
5580daf62d9SStanislav Sedov 			warnx("can't read vmspace at %p",
5590daf62d9SStanislav Sedov 			    (void *)kp->ki_vmspace);
5600daf62d9SStanislav Sedov 			goto exit;
5610daf62d9SStanislav Sedov 		}
5620daf62d9SStanislav Sedov 		map = &vmspace.vm_map;
5630daf62d9SStanislav Sedov 
5640daf62d9SStanislav Sedov 		for (entryp = map->header.next;
5650daf62d9SStanislav Sedov 		    entryp != &kp->ki_vmspace->vm_map.header;
5660daf62d9SStanislav Sedov 		    entryp = vmentry.next) {
5670daf62d9SStanislav Sedov 			if (!kvm_read_all(kd, (unsigned long)entryp, &vmentry,
5680daf62d9SStanislav Sedov 			    sizeof(vmentry))) {
5690daf62d9SStanislav Sedov 				warnx("can't read vm_map_entry at %p",
5700daf62d9SStanislav Sedov 				    (void *)entryp);
5710daf62d9SStanislav Sedov 				continue;
5720daf62d9SStanislav Sedov 			}
5730daf62d9SStanislav Sedov 			if (vmentry.eflags & MAP_ENTRY_IS_SUB_MAP)
5740daf62d9SStanislav Sedov 				continue;
5750daf62d9SStanislav Sedov 			if ((objp = vmentry.object.vm_object) == NULL)
5760daf62d9SStanislav Sedov 				continue;
5770daf62d9SStanislav Sedov 			for (; objp; objp = object.backing_object) {
5780daf62d9SStanislav Sedov 				if (!kvm_read_all(kd, (unsigned long)objp,
5790daf62d9SStanislav Sedov 				    &object, sizeof(object))) {
5800daf62d9SStanislav Sedov 					warnx("can't read vm_object at %p",
5810daf62d9SStanislav Sedov 					    (void *)objp);
5820daf62d9SStanislav Sedov 					break;
5830daf62d9SStanislav Sedov 				}
5840daf62d9SStanislav Sedov 			}
5850daf62d9SStanislav Sedov 
5860daf62d9SStanislav Sedov 			/* We want only vnode objects. */
5870daf62d9SStanislav Sedov 			if (object.type != OBJT_VNODE)
5880daf62d9SStanislav Sedov 				continue;
5890daf62d9SStanislav Sedov 
5900daf62d9SStanislav Sedov 			prot = vmentry.protection;
5910daf62d9SStanislav Sedov 			fflags = 0;
5920daf62d9SStanislav Sedov 			if (prot & VM_PROT_READ)
5930daf62d9SStanislav Sedov 				fflags = PS_FST_FFLAG_READ;
594279a233dSJilles Tjoelker 			if ((vmentry.eflags & MAP_ENTRY_COW) == 0 &&
595279a233dSJilles Tjoelker 			    prot & VM_PROT_WRITE)
5960daf62d9SStanislav Sedov 				fflags |= PS_FST_FFLAG_WRITE;
5970daf62d9SStanislav Sedov 
5980daf62d9SStanislav Sedov 			/*
5990daf62d9SStanislav Sedov 			 * Create filestat entry.
6000daf62d9SStanislav Sedov 			 */
6010daf62d9SStanislav Sedov 			entry = filestat_new_entry(object.handle,
6020daf62d9SStanislav Sedov 			    PS_FST_TYPE_VNODE, -1, fflags,
603d57486e2SRobert Watson 			    PS_FST_UFLAG_MMAP, 0, 0, NULL, 0);
6040daf62d9SStanislav Sedov 			if (entry != NULL)
6050daf62d9SStanislav Sedov 				STAILQ_INSERT_TAIL(head, entry, next);
6060daf62d9SStanislav Sedov 		}
6070daf62d9SStanislav Sedov 	}
6080daf62d9SStanislav Sedov exit:
6090daf62d9SStanislav Sedov 	return (head);
6100daf62d9SStanislav Sedov }
6110daf62d9SStanislav Sedov 
6120daf62d9SStanislav Sedov /*
6130daf62d9SStanislav Sedov  * kinfo types to filestat translation.
6140daf62d9SStanislav Sedov  */
6150daf62d9SStanislav Sedov static int
6160daf62d9SStanislav Sedov kinfo_type2fst(int kftype)
6170daf62d9SStanislav Sedov {
6180daf62d9SStanislav Sedov 	static struct {
6190daf62d9SStanislav Sedov 		int	kf_type;
6200daf62d9SStanislav Sedov 		int	fst_type;
6210daf62d9SStanislav Sedov 	} kftypes2fst[] = {
6220daf62d9SStanislav Sedov 		{ KF_TYPE_CRYPTO, PS_FST_TYPE_CRYPTO },
6230daf62d9SStanislav Sedov 		{ KF_TYPE_FIFO, PS_FST_TYPE_FIFO },
6240daf62d9SStanislav Sedov 		{ KF_TYPE_KQUEUE, PS_FST_TYPE_KQUEUE },
6250daf62d9SStanislav Sedov 		{ KF_TYPE_MQUEUE, PS_FST_TYPE_MQUEUE },
6260daf62d9SStanislav Sedov 		{ KF_TYPE_NONE, PS_FST_TYPE_NONE },
6270daf62d9SStanislav Sedov 		{ KF_TYPE_PIPE, PS_FST_TYPE_PIPE },
6280daf62d9SStanislav Sedov 		{ KF_TYPE_PTS, PS_FST_TYPE_PTS },
6290daf62d9SStanislav Sedov 		{ KF_TYPE_SEM, PS_FST_TYPE_SEM },
6300daf62d9SStanislav Sedov 		{ KF_TYPE_SHM, PS_FST_TYPE_SHM },
6310daf62d9SStanislav Sedov 		{ KF_TYPE_SOCKET, PS_FST_TYPE_SOCKET },
6320daf62d9SStanislav Sedov 		{ KF_TYPE_VNODE, PS_FST_TYPE_VNODE },
6330daf62d9SStanislav Sedov 		{ KF_TYPE_UNKNOWN, PS_FST_TYPE_UNKNOWN }
6340daf62d9SStanislav Sedov 	};
6350daf62d9SStanislav Sedov #define NKFTYPES	(sizeof(kftypes2fst) / sizeof(*kftypes2fst))
6360daf62d9SStanislav Sedov 	unsigned int i;
6370daf62d9SStanislav Sedov 
6380daf62d9SStanislav Sedov 	for (i = 0; i < NKFTYPES; i++)
6390daf62d9SStanislav Sedov 		if (kftypes2fst[i].kf_type == kftype)
6400daf62d9SStanislav Sedov 			break;
6410daf62d9SStanislav Sedov 	if (i == NKFTYPES)
6420daf62d9SStanislav Sedov 		return (PS_FST_TYPE_UNKNOWN);
6430daf62d9SStanislav Sedov 	return (kftypes2fst[i].fst_type);
6440daf62d9SStanislav Sedov }
6450daf62d9SStanislav Sedov 
6460daf62d9SStanislav Sedov /*
6470daf62d9SStanislav Sedov  * kinfo flags to filestat translation.
6480daf62d9SStanislav Sedov  */
6490daf62d9SStanislav Sedov static int
6500daf62d9SStanislav Sedov kinfo_fflags2fst(int kfflags)
6510daf62d9SStanislav Sedov {
6520daf62d9SStanislav Sedov 	static struct {
6530daf62d9SStanislav Sedov 		int	kf_flag;
6540daf62d9SStanislav Sedov 		int	fst_flag;
6550daf62d9SStanislav Sedov 	} kfflags2fst[] = {
6560daf62d9SStanislav Sedov 		{ KF_FLAG_APPEND, PS_FST_FFLAG_APPEND },
6570daf62d9SStanislav Sedov 		{ KF_FLAG_ASYNC, PS_FST_FFLAG_ASYNC },
6580daf62d9SStanislav Sedov 		{ KF_FLAG_CREAT, PS_FST_FFLAG_CREAT },
6590daf62d9SStanislav Sedov 		{ KF_FLAG_DIRECT, PS_FST_FFLAG_DIRECT },
6600daf62d9SStanislav Sedov 		{ KF_FLAG_EXCL, PS_FST_FFLAG_EXCL },
6610daf62d9SStanislav Sedov 		{ KF_FLAG_EXEC, PS_FST_FFLAG_EXEC },
6620daf62d9SStanislav Sedov 		{ KF_FLAG_EXLOCK, PS_FST_FFLAG_EXLOCK },
6630daf62d9SStanislav Sedov 		{ KF_FLAG_FSYNC, PS_FST_FFLAG_SYNC },
6640daf62d9SStanislav Sedov 		{ KF_FLAG_HASLOCK, PS_FST_FFLAG_HASLOCK },
6650daf62d9SStanislav Sedov 		{ KF_FLAG_NOFOLLOW, PS_FST_FFLAG_NOFOLLOW },
6660daf62d9SStanislav Sedov 		{ KF_FLAG_NONBLOCK, PS_FST_FFLAG_NONBLOCK },
6670daf62d9SStanislav Sedov 		{ KF_FLAG_READ, PS_FST_FFLAG_READ },
6680daf62d9SStanislav Sedov 		{ KF_FLAG_SHLOCK, PS_FST_FFLAG_SHLOCK },
6690daf62d9SStanislav Sedov 		{ KF_FLAG_TRUNC, PS_FST_FFLAG_TRUNC },
6700daf62d9SStanislav Sedov 		{ KF_FLAG_WRITE, PS_FST_FFLAG_WRITE }
6710daf62d9SStanislav Sedov 	};
6720daf62d9SStanislav Sedov #define NKFFLAGS	(sizeof(kfflags2fst) / sizeof(*kfflags2fst))
6730daf62d9SStanislav Sedov 	unsigned int i;
6740daf62d9SStanislav Sedov 	int flags;
6750daf62d9SStanislav Sedov 
6760daf62d9SStanislav Sedov 	flags = 0;
6770daf62d9SStanislav Sedov 	for (i = 0; i < NKFFLAGS; i++)
6780daf62d9SStanislav Sedov 		if ((kfflags & kfflags2fst[i].kf_flag) != 0)
6790daf62d9SStanislav Sedov 			flags |= kfflags2fst[i].fst_flag;
6800daf62d9SStanislav Sedov 	return (flags);
6810daf62d9SStanislav Sedov }
6820daf62d9SStanislav Sedov 
6830daf62d9SStanislav Sedov static int
6840daf62d9SStanislav Sedov kinfo_uflags2fst(int fd)
6850daf62d9SStanislav Sedov {
6860daf62d9SStanislav Sedov 
6870daf62d9SStanislav Sedov 	switch (fd) {
6880daf62d9SStanislav Sedov 	case KF_FD_TYPE_CTTY:
6890daf62d9SStanislav Sedov 		return (PS_FST_UFLAG_CTTY);
6900daf62d9SStanislav Sedov 	case KF_FD_TYPE_CWD:
6910daf62d9SStanislav Sedov 		return (PS_FST_UFLAG_CDIR);
6920daf62d9SStanislav Sedov 	case KF_FD_TYPE_JAIL:
6930daf62d9SStanislav Sedov 		return (PS_FST_UFLAG_JAIL);
6940daf62d9SStanislav Sedov 	case KF_FD_TYPE_TEXT:
6950daf62d9SStanislav Sedov 		return (PS_FST_UFLAG_TEXT);
6960daf62d9SStanislav Sedov 	case KF_FD_TYPE_TRACE:
6970daf62d9SStanislav Sedov 		return (PS_FST_UFLAG_TRACE);
6980daf62d9SStanislav Sedov 	case KF_FD_TYPE_ROOT:
6990daf62d9SStanislav Sedov 		return (PS_FST_UFLAG_RDIR);
7000daf62d9SStanislav Sedov 	}
7010daf62d9SStanislav Sedov 	return (0);
7020daf62d9SStanislav Sedov }
7030daf62d9SStanislav Sedov 
7047153ad2bSMikolaj Golub static struct kinfo_file *
7057153ad2bSMikolaj Golub kinfo_getfile_core(struct procstat_core *core, int *cntp)
7067153ad2bSMikolaj Golub {
7077153ad2bSMikolaj Golub 	int cnt;
7087153ad2bSMikolaj Golub 	size_t len;
7097153ad2bSMikolaj Golub 	char *buf, *bp, *eb;
7107153ad2bSMikolaj Golub 	struct kinfo_file *kif, *kp, *kf;
7117153ad2bSMikolaj Golub 
7127153ad2bSMikolaj Golub 	buf = procstat_core_get(core, PSC_TYPE_FILES, NULL, &len);
7137153ad2bSMikolaj Golub 	if (buf == NULL)
7147153ad2bSMikolaj Golub 		return (NULL);
7157153ad2bSMikolaj Golub 	/*
7167153ad2bSMikolaj Golub 	 * XXXMG: The code below is just copy&past from libutil.
7177153ad2bSMikolaj Golub 	 * The code duplication can be avoided if libutil
7187153ad2bSMikolaj Golub 	 * is extended to provide something like:
7197153ad2bSMikolaj Golub 	 *   struct kinfo_file *kinfo_getfile_from_buf(const char *buf,
7207153ad2bSMikolaj Golub 	 *       size_t len, int *cntp);
7217153ad2bSMikolaj Golub 	 */
7227153ad2bSMikolaj Golub 
7237153ad2bSMikolaj Golub 	/* Pass 1: count items */
7247153ad2bSMikolaj Golub 	cnt = 0;
7257153ad2bSMikolaj Golub 	bp = buf;
7267153ad2bSMikolaj Golub 	eb = buf + len;
7277153ad2bSMikolaj Golub 	while (bp < eb) {
7287153ad2bSMikolaj Golub 		kf = (struct kinfo_file *)(uintptr_t)bp;
7297153ad2bSMikolaj Golub 		bp += kf->kf_structsize;
7307153ad2bSMikolaj Golub 		cnt++;
7317153ad2bSMikolaj Golub 	}
7327153ad2bSMikolaj Golub 
7337153ad2bSMikolaj Golub 	kif = calloc(cnt, sizeof(*kif));
7347153ad2bSMikolaj Golub 	if (kif == NULL) {
7357153ad2bSMikolaj Golub 		free(buf);
7367153ad2bSMikolaj Golub 		return (NULL);
7377153ad2bSMikolaj Golub 	}
7387153ad2bSMikolaj Golub 	bp = buf;
7397153ad2bSMikolaj Golub 	eb = buf + len;
7407153ad2bSMikolaj Golub 	kp = kif;
7417153ad2bSMikolaj Golub 	/* Pass 2: unpack */
7427153ad2bSMikolaj Golub 	while (bp < eb) {
7437153ad2bSMikolaj Golub 		kf = (struct kinfo_file *)(uintptr_t)bp;
7447153ad2bSMikolaj Golub 		/* Copy/expand into pre-zeroed buffer */
7457153ad2bSMikolaj Golub 		memcpy(kp, kf, kf->kf_structsize);
7467153ad2bSMikolaj Golub 		/* Advance to next packed record */
7477153ad2bSMikolaj Golub 		bp += kf->kf_structsize;
7487153ad2bSMikolaj Golub 		/* Set field size to fixed length, advance */
7497153ad2bSMikolaj Golub 		kp->kf_structsize = sizeof(*kp);
7507153ad2bSMikolaj Golub 		kp++;
7517153ad2bSMikolaj Golub 	}
7527153ad2bSMikolaj Golub 	free(buf);
7537153ad2bSMikolaj Golub 	*cntp = cnt;
7547153ad2bSMikolaj Golub 	return (kif);	/* Caller must free() return value */
7557153ad2bSMikolaj Golub }
7567153ad2bSMikolaj Golub 
7570daf62d9SStanislav Sedov static struct filestat_list *
7587153ad2bSMikolaj Golub procstat_getfiles_sysctl(struct procstat *procstat, struct kinfo_proc *kp,
7597153ad2bSMikolaj Golub     int mmapped)
7600daf62d9SStanislav Sedov {
7610daf62d9SStanislav Sedov 	struct kinfo_file *kif, *files;
7620daf62d9SStanislav Sedov 	struct kinfo_vmentry *kve, *vmentries;
7630daf62d9SStanislav Sedov 	struct filestat_list *head;
7640daf62d9SStanislav Sedov 	struct filestat *entry;
7650daf62d9SStanislav Sedov 	char *path;
7660daf62d9SStanislav Sedov 	off_t offset;
7670daf62d9SStanislav Sedov 	int cnt, fd, fflags;
7680daf62d9SStanislav Sedov 	int i, type, uflags;
7690daf62d9SStanislav Sedov 	int refcount;
770d57486e2SRobert Watson 	cap_rights_t cap_rights;
7710daf62d9SStanislav Sedov 
7720daf62d9SStanislav Sedov 	assert(kp);
7730daf62d9SStanislav Sedov 	if (kp->ki_fd == NULL)
7740daf62d9SStanislav Sedov 		return (NULL);
7757153ad2bSMikolaj Golub 	switch(procstat->type) {
7767153ad2bSMikolaj Golub 	case PROCSTAT_SYSCTL:
7770daf62d9SStanislav Sedov 		files = kinfo_getfile(kp->ki_pid, &cnt);
7787153ad2bSMikolaj Golub 		break;
7797153ad2bSMikolaj Golub 	case PROCSTAT_CORE:
7807153ad2bSMikolaj Golub 		files = kinfo_getfile_core(procstat->core, &cnt);
7817153ad2bSMikolaj Golub 		break;
7827153ad2bSMikolaj Golub 	default:
7837153ad2bSMikolaj Golub 		assert(!"invalid type");
7847153ad2bSMikolaj Golub 	}
7850daf62d9SStanislav Sedov 	if (files == NULL && errno != EPERM) {
7860daf62d9SStanislav Sedov 		warn("kinfo_getfile()");
7870daf62d9SStanislav Sedov 		return (NULL);
7880daf62d9SStanislav Sedov 	}
7890daf62d9SStanislav Sedov 	procstat->files = files;
7900daf62d9SStanislav Sedov 
7910daf62d9SStanislav Sedov 	/*
7920daf62d9SStanislav Sedov 	 * Allocate list head.
7930daf62d9SStanislav Sedov 	 */
7940daf62d9SStanislav Sedov 	head = malloc(sizeof(*head));
7950daf62d9SStanislav Sedov 	if (head == NULL)
7960daf62d9SStanislav Sedov 		return (NULL);
7970daf62d9SStanislav Sedov 	STAILQ_INIT(head);
7980daf62d9SStanislav Sedov 	for (i = 0; i < cnt; i++) {
7990daf62d9SStanislav Sedov 		kif = &files[i];
8000daf62d9SStanislav Sedov 
8010daf62d9SStanislav Sedov 		type = kinfo_type2fst(kif->kf_type);
8020daf62d9SStanislav Sedov 		fd = kif->kf_fd >= 0 ? kif->kf_fd : -1;
8030daf62d9SStanislav Sedov 		fflags = kinfo_fflags2fst(kif->kf_flags);
8040daf62d9SStanislav Sedov 		uflags = kinfo_uflags2fst(kif->kf_fd);
8050daf62d9SStanislav Sedov 		refcount = kif->kf_ref_count;
8060daf62d9SStanislav Sedov 		offset = kif->kf_offset;
8070daf62d9SStanislav Sedov 		if (*kif->kf_path != '\0')
8080daf62d9SStanislav Sedov 			path = strdup(kif->kf_path);
8090daf62d9SStanislav Sedov 		else
8100daf62d9SStanislav Sedov 			path = NULL;
811d57486e2SRobert Watson 		cap_rights = kif->kf_cap_rights;
8120daf62d9SStanislav Sedov 
8130daf62d9SStanislav Sedov 		/*
8140daf62d9SStanislav Sedov 		 * Create filestat entry.
8150daf62d9SStanislav Sedov 		 */
8160daf62d9SStanislav Sedov 		entry = filestat_new_entry(kif, type, fd, fflags, uflags,
817d57486e2SRobert Watson 		    refcount, offset, path, cap_rights);
8180daf62d9SStanislav Sedov 		if (entry != NULL)
8190daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
8200daf62d9SStanislav Sedov 	}
8210daf62d9SStanislav Sedov 	if (mmapped != 0) {
82239680c7bSMikolaj Golub 		vmentries = procstat_getvmmap(procstat, kp, &cnt);
8230daf62d9SStanislav Sedov 		procstat->vmentries = vmentries;
8240daf62d9SStanislav Sedov 		if (vmentries == NULL || cnt == 0)
8250daf62d9SStanislav Sedov 			goto fail;
8260daf62d9SStanislav Sedov 		for (i = 0; i < cnt; i++) {
8270daf62d9SStanislav Sedov 			kve = &vmentries[i];
8280daf62d9SStanislav Sedov 			if (kve->kve_type != KVME_TYPE_VNODE)
8290daf62d9SStanislav Sedov 				continue;
8300daf62d9SStanislav Sedov 			fflags = 0;
8310daf62d9SStanislav Sedov 			if (kve->kve_protection & KVME_PROT_READ)
8320daf62d9SStanislav Sedov 				fflags = PS_FST_FFLAG_READ;
833279a233dSJilles Tjoelker 			if ((kve->kve_flags & KVME_FLAG_COW) == 0 &&
834279a233dSJilles Tjoelker 			    kve->kve_protection & KVME_PROT_WRITE)
8350daf62d9SStanislav Sedov 				fflags |= PS_FST_FFLAG_WRITE;
8360daf62d9SStanislav Sedov 			offset = kve->kve_offset;
8370daf62d9SStanislav Sedov 			refcount = kve->kve_ref_count;
8380daf62d9SStanislav Sedov 			if (*kve->kve_path != '\0')
8390daf62d9SStanislav Sedov 				path = strdup(kve->kve_path);
8400daf62d9SStanislav Sedov 			else
8410daf62d9SStanislav Sedov 				path = NULL;
8420daf62d9SStanislav Sedov 			entry = filestat_new_entry(kve, PS_FST_TYPE_VNODE, -1,
843d57486e2SRobert Watson 			    fflags, PS_FST_UFLAG_MMAP, refcount, offset, path,
844d57486e2SRobert Watson 			    0);
8450daf62d9SStanislav Sedov 			if (entry != NULL)
8460daf62d9SStanislav Sedov 				STAILQ_INSERT_TAIL(head, entry, next);
8470daf62d9SStanislav Sedov 		}
8480daf62d9SStanislav Sedov 	}
8490daf62d9SStanislav Sedov fail:
8500daf62d9SStanislav Sedov 	return (head);
8510daf62d9SStanislav Sedov }
8520daf62d9SStanislav Sedov 
8530daf62d9SStanislav Sedov int
8540daf62d9SStanislav Sedov procstat_get_pipe_info(struct procstat *procstat, struct filestat *fst,
8550daf62d9SStanislav Sedov     struct pipestat *ps, char *errbuf)
8560daf62d9SStanislav Sedov {
8570daf62d9SStanislav Sedov 
8580daf62d9SStanislav Sedov 	assert(ps);
8590daf62d9SStanislav Sedov 	if (procstat->type == PROCSTAT_KVM) {
8600daf62d9SStanislav Sedov 		return (procstat_get_pipe_info_kvm(procstat->kd, fst, ps,
8610daf62d9SStanislav Sedov 		    errbuf));
8627153ad2bSMikolaj Golub 	} else if (procstat->type == PROCSTAT_SYSCTL ||
8637153ad2bSMikolaj Golub 		procstat->type == PROCSTAT_CORE) {
8640daf62d9SStanislav Sedov 		return (procstat_get_pipe_info_sysctl(fst, ps, errbuf));
8650daf62d9SStanislav Sedov 	} else {
86680905c35SJilles Tjoelker 		warnx("unknown access method: %d", procstat->type);
8670daf62d9SStanislav Sedov 		snprintf(errbuf, _POSIX2_LINE_MAX, "error");
8680daf62d9SStanislav Sedov 		return (1);
8690daf62d9SStanislav Sedov 	}
8700daf62d9SStanislav Sedov }
8710daf62d9SStanislav Sedov 
8720daf62d9SStanislav Sedov static int
8730daf62d9SStanislav Sedov procstat_get_pipe_info_kvm(kvm_t *kd, struct filestat *fst,
8740daf62d9SStanislav Sedov     struct pipestat *ps, char *errbuf)
8750daf62d9SStanislav Sedov {
8760daf62d9SStanislav Sedov 	struct pipe pi;
8770daf62d9SStanislav Sedov 	void *pipep;
8780daf62d9SStanislav Sedov 
8790daf62d9SStanislav Sedov 	assert(kd);
8800daf62d9SStanislav Sedov 	assert(ps);
8810daf62d9SStanislav Sedov 	assert(fst);
8820daf62d9SStanislav Sedov 	bzero(ps, sizeof(*ps));
8830daf62d9SStanislav Sedov 	pipep = fst->fs_typedep;
8840daf62d9SStanislav Sedov 	if (pipep == NULL)
8850daf62d9SStanislav Sedov 		goto fail;
8860daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)pipep, &pi, sizeof(struct pipe))) {
8870daf62d9SStanislav Sedov 		warnx("can't read pipe at %p", (void *)pipep);
8880daf62d9SStanislav Sedov 		goto fail;
8890daf62d9SStanislav Sedov 	}
8900daf62d9SStanislav Sedov 	ps->addr = (uintptr_t)pipep;
8910daf62d9SStanislav Sedov 	ps->peer = (uintptr_t)pi.pipe_peer;
8920daf62d9SStanislav Sedov 	ps->buffer_cnt = pi.pipe_buffer.cnt;
8930daf62d9SStanislav Sedov 	return (0);
8940daf62d9SStanislav Sedov 
8950daf62d9SStanislav Sedov fail:
8960daf62d9SStanislav Sedov 	snprintf(errbuf, _POSIX2_LINE_MAX, "error");
8970daf62d9SStanislav Sedov 	return (1);
8980daf62d9SStanislav Sedov }
8990daf62d9SStanislav Sedov 
9000daf62d9SStanislav Sedov static int
9010daf62d9SStanislav Sedov procstat_get_pipe_info_sysctl(struct filestat *fst, struct pipestat *ps,
9020daf62d9SStanislav Sedov     char *errbuf __unused)
9030daf62d9SStanislav Sedov {
9040daf62d9SStanislav Sedov 	struct kinfo_file *kif;
9050daf62d9SStanislav Sedov 
9060daf62d9SStanislav Sedov 	assert(ps);
9070daf62d9SStanislav Sedov 	assert(fst);
9080daf62d9SStanislav Sedov 	bzero(ps, sizeof(*ps));
9090daf62d9SStanislav Sedov 	kif = fst->fs_typedep;
9100daf62d9SStanislav Sedov 	if (kif == NULL)
9110daf62d9SStanislav Sedov 		return (1);
9120daf62d9SStanislav Sedov 	ps->addr = kif->kf_un.kf_pipe.kf_pipe_addr;
9130daf62d9SStanislav Sedov 	ps->peer = kif->kf_un.kf_pipe.kf_pipe_peer;
9140daf62d9SStanislav Sedov 	ps->buffer_cnt = kif->kf_un.kf_pipe.kf_pipe_buffer_cnt;
9150daf62d9SStanislav Sedov 	return (0);
9160daf62d9SStanislav Sedov }
9170daf62d9SStanislav Sedov 
9180daf62d9SStanislav Sedov int
9190daf62d9SStanislav Sedov procstat_get_pts_info(struct procstat *procstat, struct filestat *fst,
9200daf62d9SStanislav Sedov     struct ptsstat *pts, char *errbuf)
9210daf62d9SStanislav Sedov {
9220daf62d9SStanislav Sedov 
9230daf62d9SStanislav Sedov 	assert(pts);
9240daf62d9SStanislav Sedov 	if (procstat->type == PROCSTAT_KVM) {
9250daf62d9SStanislav Sedov 		return (procstat_get_pts_info_kvm(procstat->kd, fst, pts,
9260daf62d9SStanislav Sedov 		    errbuf));
9277153ad2bSMikolaj Golub 	} else if (procstat->type == PROCSTAT_SYSCTL ||
9287153ad2bSMikolaj Golub 		procstat->type == PROCSTAT_CORE) {
9290daf62d9SStanislav Sedov 		return (procstat_get_pts_info_sysctl(fst, pts, errbuf));
9300daf62d9SStanislav Sedov 	} else {
93180905c35SJilles Tjoelker 		warnx("unknown access method: %d", procstat->type);
9320daf62d9SStanislav Sedov 		snprintf(errbuf, _POSIX2_LINE_MAX, "error");
9330daf62d9SStanislav Sedov 		return (1);
9340daf62d9SStanislav Sedov 	}
9350daf62d9SStanislav Sedov }
9360daf62d9SStanislav Sedov 
9370daf62d9SStanislav Sedov static int
9380daf62d9SStanislav Sedov procstat_get_pts_info_kvm(kvm_t *kd, struct filestat *fst,
9390daf62d9SStanislav Sedov     struct ptsstat *pts, char *errbuf)
9400daf62d9SStanislav Sedov {
9410daf62d9SStanislav Sedov 	struct tty tty;
9420daf62d9SStanislav Sedov 	void *ttyp;
9430daf62d9SStanislav Sedov 
9440daf62d9SStanislav Sedov 	assert(kd);
9450daf62d9SStanislav Sedov 	assert(pts);
9460daf62d9SStanislav Sedov 	assert(fst);
9470daf62d9SStanislav Sedov 	bzero(pts, sizeof(*pts));
9480daf62d9SStanislav Sedov 	ttyp = fst->fs_typedep;
9490daf62d9SStanislav Sedov 	if (ttyp == NULL)
9500daf62d9SStanislav Sedov 		goto fail;
9510daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)ttyp, &tty, sizeof(struct tty))) {
9520daf62d9SStanislav Sedov 		warnx("can't read tty at %p", (void *)ttyp);
9530daf62d9SStanislav Sedov 		goto fail;
9540daf62d9SStanislav Sedov 	}
9550daf62d9SStanislav Sedov 	pts->dev = dev2udev(kd, tty.t_dev);
9560daf62d9SStanislav Sedov 	(void)kdevtoname(kd, tty.t_dev, pts->devname);
9570daf62d9SStanislav Sedov 	return (0);
9580daf62d9SStanislav Sedov 
9590daf62d9SStanislav Sedov fail:
9600daf62d9SStanislav Sedov 	snprintf(errbuf, _POSIX2_LINE_MAX, "error");
9610daf62d9SStanislav Sedov 	return (1);
9620daf62d9SStanislav Sedov }
9630daf62d9SStanislav Sedov 
9640daf62d9SStanislav Sedov static int
9650daf62d9SStanislav Sedov procstat_get_pts_info_sysctl(struct filestat *fst, struct ptsstat *pts,
9660daf62d9SStanislav Sedov     char *errbuf __unused)
9670daf62d9SStanislav Sedov {
9680daf62d9SStanislav Sedov 	struct kinfo_file *kif;
9690daf62d9SStanislav Sedov 
9700daf62d9SStanislav Sedov 	assert(pts);
9710daf62d9SStanislav Sedov 	assert(fst);
9720daf62d9SStanislav Sedov 	bzero(pts, sizeof(*pts));
9730daf62d9SStanislav Sedov 	kif = fst->fs_typedep;
9740daf62d9SStanislav Sedov 	if (kif == NULL)
9750daf62d9SStanislav Sedov 		return (0);
9760daf62d9SStanislav Sedov 	pts->dev = kif->kf_un.kf_pts.kf_pts_dev;
9770daf62d9SStanislav Sedov 	strlcpy(pts->devname, kif->kf_path, sizeof(pts->devname));
9780daf62d9SStanislav Sedov 	return (0);
9790daf62d9SStanislav Sedov }
9800daf62d9SStanislav Sedov 
9810daf62d9SStanislav Sedov int
982e506e182SJohn Baldwin procstat_get_shm_info(struct procstat *procstat, struct filestat *fst,
983e506e182SJohn Baldwin     struct shmstat *shm, char *errbuf)
984e506e182SJohn Baldwin {
985e506e182SJohn Baldwin 
986e506e182SJohn Baldwin 	assert(shm);
987e506e182SJohn Baldwin 	if (procstat->type == PROCSTAT_KVM) {
988e506e182SJohn Baldwin 		return (procstat_get_shm_info_kvm(procstat->kd, fst, shm,
989e506e182SJohn Baldwin 		    errbuf));
9907153ad2bSMikolaj Golub 	} else if (procstat->type == PROCSTAT_SYSCTL ||
9917153ad2bSMikolaj Golub 	    procstat->type == PROCSTAT_CORE) {
992e506e182SJohn Baldwin 		return (procstat_get_shm_info_sysctl(fst, shm, errbuf));
993e506e182SJohn Baldwin 	} else {
994e506e182SJohn Baldwin 		warnx("unknown access method: %d", procstat->type);
995e506e182SJohn Baldwin 		snprintf(errbuf, _POSIX2_LINE_MAX, "error");
996e506e182SJohn Baldwin 		return (1);
997e506e182SJohn Baldwin 	}
998e506e182SJohn Baldwin }
999e506e182SJohn Baldwin 
1000e506e182SJohn Baldwin static int
1001e506e182SJohn Baldwin procstat_get_shm_info_kvm(kvm_t *kd, struct filestat *fst,
1002e506e182SJohn Baldwin     struct shmstat *shm, char *errbuf)
1003e506e182SJohn Baldwin {
1004e506e182SJohn Baldwin 	struct shmfd shmfd;
1005e506e182SJohn Baldwin 	void *shmfdp;
1006a9f5e425SJohn Baldwin 	char *path;
1007a9f5e425SJohn Baldwin 	int i;
1008e506e182SJohn Baldwin 
1009e506e182SJohn Baldwin 	assert(kd);
1010e506e182SJohn Baldwin 	assert(shm);
1011e506e182SJohn Baldwin 	assert(fst);
1012e506e182SJohn Baldwin 	bzero(shm, sizeof(*shm));
1013e506e182SJohn Baldwin 	shmfdp = fst->fs_typedep;
1014e506e182SJohn Baldwin 	if (shmfdp == NULL)
1015e506e182SJohn Baldwin 		goto fail;
1016e506e182SJohn Baldwin 	if (!kvm_read_all(kd, (unsigned long)shmfdp, &shmfd,
1017e506e182SJohn Baldwin 	    sizeof(struct shmfd))) {
1018e506e182SJohn Baldwin 		warnx("can't read shmfd at %p", (void *)shmfdp);
1019e506e182SJohn Baldwin 		goto fail;
1020e506e182SJohn Baldwin 	}
1021e506e182SJohn Baldwin 	shm->mode = S_IFREG | shmfd.shm_mode;
1022e506e182SJohn Baldwin 	shm->size = shmfd.shm_size;
1023a9f5e425SJohn Baldwin 	if (fst->fs_path == NULL && shmfd.shm_path != NULL) {
1024a9f5e425SJohn Baldwin 		path = malloc(MAXPATHLEN);
1025a9f5e425SJohn Baldwin 		for (i = 0; i < MAXPATHLEN - 1; i++) {
1026a9f5e425SJohn Baldwin 			if (!kvm_read_all(kd, (unsigned long)shmfd.shm_path + i,
1027a9f5e425SJohn Baldwin 			    path + i, 1))
1028a9f5e425SJohn Baldwin 				break;
1029a9f5e425SJohn Baldwin 			if (path[i] == '\0')
1030a9f5e425SJohn Baldwin 				break;
1031a9f5e425SJohn Baldwin 		}
1032a9f5e425SJohn Baldwin 		path[i] = '\0';
1033a9f5e425SJohn Baldwin 		if (i == 0)
1034a9f5e425SJohn Baldwin 			free(path);
1035a9f5e425SJohn Baldwin 		else
1036a9f5e425SJohn Baldwin 			fst->fs_path = path;
1037a9f5e425SJohn Baldwin 	}
1038e506e182SJohn Baldwin 	return (0);
1039e506e182SJohn Baldwin 
1040e506e182SJohn Baldwin fail:
1041e506e182SJohn Baldwin 	snprintf(errbuf, _POSIX2_LINE_MAX, "error");
1042e506e182SJohn Baldwin 	return (1);
1043e506e182SJohn Baldwin }
1044e506e182SJohn Baldwin 
1045e506e182SJohn Baldwin static int
1046e506e182SJohn Baldwin procstat_get_shm_info_sysctl(struct filestat *fst, struct shmstat *shm,
1047e506e182SJohn Baldwin     char *errbuf __unused)
1048e506e182SJohn Baldwin {
1049e506e182SJohn Baldwin 	struct kinfo_file *kif;
1050e506e182SJohn Baldwin 
1051e506e182SJohn Baldwin 	assert(shm);
1052e506e182SJohn Baldwin 	assert(fst);
1053e506e182SJohn Baldwin 	bzero(shm, sizeof(*shm));
1054e506e182SJohn Baldwin 	kif = fst->fs_typedep;
1055e506e182SJohn Baldwin 	if (kif == NULL)
1056e506e182SJohn Baldwin 		return (0);
1057e506e182SJohn Baldwin 	shm->size = kif->kf_un.kf_file.kf_file_size;
1058e506e182SJohn Baldwin 	shm->mode = kif->kf_un.kf_file.kf_file_mode;
1059e506e182SJohn Baldwin 	return (0);
1060e506e182SJohn Baldwin }
1061e506e182SJohn Baldwin 
1062e506e182SJohn Baldwin int
10630daf62d9SStanislav Sedov procstat_get_vnode_info(struct procstat *procstat, struct filestat *fst,
10640daf62d9SStanislav Sedov     struct vnstat *vn, char *errbuf)
10650daf62d9SStanislav Sedov {
10660daf62d9SStanislav Sedov 
10670daf62d9SStanislav Sedov 	assert(vn);
10680daf62d9SStanislav Sedov 	if (procstat->type == PROCSTAT_KVM) {
10690daf62d9SStanislav Sedov 		return (procstat_get_vnode_info_kvm(procstat->kd, fst, vn,
10700daf62d9SStanislav Sedov 		    errbuf));
10717153ad2bSMikolaj Golub 	} else if (procstat->type == PROCSTAT_SYSCTL ||
10727153ad2bSMikolaj Golub 		procstat->type == PROCSTAT_CORE) {
10730daf62d9SStanislav Sedov 		return (procstat_get_vnode_info_sysctl(fst, vn, errbuf));
10740daf62d9SStanislav Sedov 	} else {
107580905c35SJilles Tjoelker 		warnx("unknown access method: %d", procstat->type);
10760daf62d9SStanislav Sedov 		snprintf(errbuf, _POSIX2_LINE_MAX, "error");
10770daf62d9SStanislav Sedov 		return (1);
10780daf62d9SStanislav Sedov 	}
10790daf62d9SStanislav Sedov }
10800daf62d9SStanislav Sedov 
10810daf62d9SStanislav Sedov static int
10820daf62d9SStanislav Sedov procstat_get_vnode_info_kvm(kvm_t *kd, struct filestat *fst,
10830daf62d9SStanislav Sedov     struct vnstat *vn, char *errbuf)
10840daf62d9SStanislav Sedov {
10850daf62d9SStanislav Sedov 	/* Filesystem specific handlers. */
10860daf62d9SStanislav Sedov 	#define FSTYPE(fst)     {#fst, fst##_filestat}
10870daf62d9SStanislav Sedov 	struct {
10880daf62d9SStanislav Sedov 		const char	*tag;
10890daf62d9SStanislav Sedov 		int		(*handler)(kvm_t *kd, struct vnode *vp,
10900daf62d9SStanislav Sedov 		    struct vnstat *vn);
10910daf62d9SStanislav Sedov 	} fstypes[] = {
10920daf62d9SStanislav Sedov 		FSTYPE(devfs),
10930daf62d9SStanislav Sedov 		FSTYPE(isofs),
10940daf62d9SStanislav Sedov 		FSTYPE(msdosfs),
10950daf62d9SStanislav Sedov 		FSTYPE(nfs),
10960daf62d9SStanislav Sedov 		FSTYPE(udf),
10970daf62d9SStanislav Sedov 		FSTYPE(ufs),
109859ea47d0SStanislav Sedov #ifdef LIBPROCSTAT_ZFS
10990daf62d9SStanislav Sedov 		FSTYPE(zfs),
11000daf62d9SStanislav Sedov #endif
11010daf62d9SStanislav Sedov 	};
11020daf62d9SStanislav Sedov #define	NTYPES	(sizeof(fstypes) / sizeof(*fstypes))
11030daf62d9SStanislav Sedov 	struct vnode vnode;
11040daf62d9SStanislav Sedov 	char tagstr[12];
11050daf62d9SStanislav Sedov 	void *vp;
11060daf62d9SStanislav Sedov 	int error, found;
11070daf62d9SStanislav Sedov 	unsigned int i;
11080daf62d9SStanislav Sedov 
11090daf62d9SStanislav Sedov 	assert(kd);
11100daf62d9SStanislav Sedov 	assert(vn);
11110daf62d9SStanislav Sedov 	assert(fst);
11120daf62d9SStanislav Sedov 	vp = fst->fs_typedep;
11130daf62d9SStanislav Sedov 	if (vp == NULL)
11140daf62d9SStanislav Sedov 		goto fail;
11150daf62d9SStanislav Sedov 	error = kvm_read_all(kd, (unsigned long)vp, &vnode, sizeof(vnode));
11160daf62d9SStanislav Sedov 	if (error == 0) {
11170daf62d9SStanislav Sedov 		warnx("can't read vnode at %p", (void *)vp);
11180daf62d9SStanislav Sedov 		goto fail;
11190daf62d9SStanislav Sedov 	}
11200daf62d9SStanislav Sedov 	bzero(vn, sizeof(*vn));
11210daf62d9SStanislav Sedov 	vn->vn_type = vntype2psfsttype(vnode.v_type);
11220daf62d9SStanislav Sedov 	if (vnode.v_type == VNON || vnode.v_type == VBAD)
11230daf62d9SStanislav Sedov 		return (0);
11240daf62d9SStanislav Sedov 	error = kvm_read_all(kd, (unsigned long)vnode.v_tag, tagstr,
11250daf62d9SStanislav Sedov 	    sizeof(tagstr));
11260daf62d9SStanislav Sedov 	if (error == 0) {
11270daf62d9SStanislav Sedov 		warnx("can't read v_tag at %p", (void *)vp);
11280daf62d9SStanislav Sedov 		goto fail;
11290daf62d9SStanislav Sedov 	}
11300daf62d9SStanislav Sedov 	tagstr[sizeof(tagstr) - 1] = '\0';
11310daf62d9SStanislav Sedov 
11320daf62d9SStanislav Sedov 	/*
11330daf62d9SStanislav Sedov 	 * Find appropriate handler.
11340daf62d9SStanislav Sedov 	 */
11350daf62d9SStanislav Sedov 	for (i = 0, found = 0; i < NTYPES; i++)
11360daf62d9SStanislav Sedov 		if (!strcmp(fstypes[i].tag, tagstr)) {
11370daf62d9SStanislav Sedov 			if (fstypes[i].handler(kd, &vnode, vn) != 0) {
11380daf62d9SStanislav Sedov 				goto fail;
11390daf62d9SStanislav Sedov 			}
11400daf62d9SStanislav Sedov 			break;
11410daf62d9SStanislav Sedov 		}
11420daf62d9SStanislav Sedov 	if (i == NTYPES) {
11430daf62d9SStanislav Sedov 		snprintf(errbuf, _POSIX2_LINE_MAX, "?(%s)", tagstr);
11440daf62d9SStanislav Sedov 		return (1);
11450daf62d9SStanislav Sedov 	}
11460daf62d9SStanislav Sedov 	vn->vn_mntdir = getmnton(kd, vnode.v_mount);
11470daf62d9SStanislav Sedov 	if ((vnode.v_type == VBLK || vnode.v_type == VCHR) &&
11480daf62d9SStanislav Sedov 	    vnode.v_rdev != NULL){
11490daf62d9SStanislav Sedov 		vn->vn_dev = dev2udev(kd, vnode.v_rdev);
11500daf62d9SStanislav Sedov 		(void)kdevtoname(kd, vnode.v_rdev, vn->vn_devname);
11510daf62d9SStanislav Sedov 	} else {
11520daf62d9SStanislav Sedov 		vn->vn_dev = -1;
11530daf62d9SStanislav Sedov 	}
11540daf62d9SStanislav Sedov 	return (0);
11550daf62d9SStanislav Sedov 
11560daf62d9SStanislav Sedov fail:
11570daf62d9SStanislav Sedov 	snprintf(errbuf, _POSIX2_LINE_MAX, "error");
11580daf62d9SStanislav Sedov 	return (1);
11590daf62d9SStanislav Sedov }
11600daf62d9SStanislav Sedov 
11610daf62d9SStanislav Sedov /*
11620daf62d9SStanislav Sedov  * kinfo vnode type to filestat translation.
11630daf62d9SStanislav Sedov  */
11640daf62d9SStanislav Sedov static int
11650daf62d9SStanislav Sedov kinfo_vtype2fst(int kfvtype)
11660daf62d9SStanislav Sedov {
11670daf62d9SStanislav Sedov 	static struct {
11680daf62d9SStanislav Sedov 		int	kf_vtype;
11690daf62d9SStanislav Sedov 		int	fst_vtype;
11700daf62d9SStanislav Sedov 	} kfvtypes2fst[] = {
11710daf62d9SStanislav Sedov 		{ KF_VTYPE_VBAD, PS_FST_VTYPE_VBAD },
11720daf62d9SStanislav Sedov 		{ KF_VTYPE_VBLK, PS_FST_VTYPE_VBLK },
11730daf62d9SStanislav Sedov 		{ KF_VTYPE_VCHR, PS_FST_VTYPE_VCHR },
11740daf62d9SStanislav Sedov 		{ KF_VTYPE_VDIR, PS_FST_VTYPE_VDIR },
11750daf62d9SStanislav Sedov 		{ KF_VTYPE_VFIFO, PS_FST_VTYPE_VFIFO },
11760daf62d9SStanislav Sedov 		{ KF_VTYPE_VLNK, PS_FST_VTYPE_VLNK },
11770daf62d9SStanislav Sedov 		{ KF_VTYPE_VNON, PS_FST_VTYPE_VNON },
11780daf62d9SStanislav Sedov 		{ KF_VTYPE_VREG, PS_FST_VTYPE_VREG },
11790daf62d9SStanislav Sedov 		{ KF_VTYPE_VSOCK, PS_FST_VTYPE_VSOCK }
11800daf62d9SStanislav Sedov 	};
11810daf62d9SStanislav Sedov #define	NKFVTYPES	(sizeof(kfvtypes2fst) / sizeof(*kfvtypes2fst))
11820daf62d9SStanislav Sedov 	unsigned int i;
11830daf62d9SStanislav Sedov 
11840daf62d9SStanislav Sedov 	for (i = 0; i < NKFVTYPES; i++)
11850daf62d9SStanislav Sedov 		if (kfvtypes2fst[i].kf_vtype == kfvtype)
11860daf62d9SStanislav Sedov 			break;
11870daf62d9SStanislav Sedov 	if (i == NKFVTYPES)
11880daf62d9SStanislav Sedov 		return (PS_FST_VTYPE_UNKNOWN);
11890daf62d9SStanislav Sedov 	return (kfvtypes2fst[i].fst_vtype);
11900daf62d9SStanislav Sedov }
11910daf62d9SStanislav Sedov 
11920daf62d9SStanislav Sedov static int
11930daf62d9SStanislav Sedov procstat_get_vnode_info_sysctl(struct filestat *fst, struct vnstat *vn,
11940daf62d9SStanislav Sedov     char *errbuf)
11950daf62d9SStanislav Sedov {
11960daf62d9SStanislav Sedov 	struct statfs stbuf;
11970daf62d9SStanislav Sedov 	struct kinfo_file *kif;
11980daf62d9SStanislav Sedov 	struct kinfo_vmentry *kve;
11990daf62d9SStanislav Sedov 	uint64_t fileid;
12000daf62d9SStanislav Sedov 	uint64_t size;
12010daf62d9SStanislav Sedov 	char *name, *path;
12020daf62d9SStanislav Sedov 	uint32_t fsid;
12030daf62d9SStanislav Sedov 	uint16_t mode;
12040daf62d9SStanislav Sedov 	uint32_t rdev;
12050daf62d9SStanislav Sedov 	int vntype;
12060daf62d9SStanislav Sedov 	int status;
12070daf62d9SStanislav Sedov 
12080daf62d9SStanislav Sedov 	assert(fst);
12090daf62d9SStanislav Sedov 	assert(vn);
12100daf62d9SStanislav Sedov 	bzero(vn, sizeof(*vn));
12110daf62d9SStanislav Sedov 	if (fst->fs_typedep == NULL)
12120daf62d9SStanislav Sedov 		return (1);
12130daf62d9SStanislav Sedov 	if (fst->fs_uflags & PS_FST_UFLAG_MMAP) {
12140daf62d9SStanislav Sedov 		kve = fst->fs_typedep;
12150daf62d9SStanislav Sedov 		fileid = kve->kve_vn_fileid;
12160daf62d9SStanislav Sedov 		fsid = kve->kve_vn_fsid;
12170daf62d9SStanislav Sedov 		mode = kve->kve_vn_mode;
12180daf62d9SStanislav Sedov 		path = kve->kve_path;
12190daf62d9SStanislav Sedov 		rdev = kve->kve_vn_rdev;
12200daf62d9SStanislav Sedov 		size = kve->kve_vn_size;
12210daf62d9SStanislav Sedov 		vntype = kinfo_vtype2fst(kve->kve_vn_type);
12220daf62d9SStanislav Sedov 		status = kve->kve_status;
12230daf62d9SStanislav Sedov 	} else {
12240daf62d9SStanislav Sedov 		kif = fst->fs_typedep;
12250daf62d9SStanislav Sedov 		fileid = kif->kf_un.kf_file.kf_file_fileid;
12260daf62d9SStanislav Sedov 		fsid = kif->kf_un.kf_file.kf_file_fsid;
12270daf62d9SStanislav Sedov 		mode = kif->kf_un.kf_file.kf_file_mode;
12280daf62d9SStanislav Sedov 		path = kif->kf_path;
12290daf62d9SStanislav Sedov 		rdev = kif->kf_un.kf_file.kf_file_rdev;
12300daf62d9SStanislav Sedov 		size = kif->kf_un.kf_file.kf_file_size;
12310daf62d9SStanislav Sedov 		vntype = kinfo_vtype2fst(kif->kf_vnode_type);
12320daf62d9SStanislav Sedov 		status = kif->kf_status;
12330daf62d9SStanislav Sedov 	}
12340daf62d9SStanislav Sedov 	vn->vn_type = vntype;
12350daf62d9SStanislav Sedov 	if (vntype == PS_FST_VTYPE_VNON || vntype == PS_FST_VTYPE_VBAD)
12360daf62d9SStanislav Sedov 		return (0);
12370daf62d9SStanislav Sedov 	if ((status & KF_ATTR_VALID) == 0) {
12380daf62d9SStanislav Sedov 		snprintf(errbuf, _POSIX2_LINE_MAX, "? (no info available)");
12390daf62d9SStanislav Sedov 		return (1);
12400daf62d9SStanislav Sedov 	}
12410daf62d9SStanislav Sedov 	if (path && *path) {
12420daf62d9SStanislav Sedov 		statfs(path, &stbuf);
12430daf62d9SStanislav Sedov 		vn->vn_mntdir = strdup(stbuf.f_mntonname);
12440daf62d9SStanislav Sedov 	} else
12450daf62d9SStanislav Sedov 		vn->vn_mntdir = strdup("-");
12460daf62d9SStanislav Sedov 	vn->vn_dev = rdev;
12470daf62d9SStanislav Sedov 	if (vntype == PS_FST_VTYPE_VBLK) {
12480daf62d9SStanislav Sedov 		name = devname(rdev, S_IFBLK);
12490daf62d9SStanislav Sedov 		if (name != NULL)
12500daf62d9SStanislav Sedov 			strlcpy(vn->vn_devname, name,
12510daf62d9SStanislav Sedov 			    sizeof(vn->vn_devname));
12520daf62d9SStanislav Sedov 	} else if (vntype == PS_FST_VTYPE_VCHR) {
12530daf62d9SStanislav Sedov 		name = devname(vn->vn_dev, S_IFCHR);
12540daf62d9SStanislav Sedov 		if (name != NULL)
12550daf62d9SStanislav Sedov 			strlcpy(vn->vn_devname, name,
12560daf62d9SStanislav Sedov 			    sizeof(vn->vn_devname));
12570daf62d9SStanislav Sedov 	}
12580daf62d9SStanislav Sedov 	vn->vn_fsid = fsid;
12590daf62d9SStanislav Sedov 	vn->vn_fileid = fileid;
12600daf62d9SStanislav Sedov 	vn->vn_size = size;
12610daf62d9SStanislav Sedov 	vn->vn_mode = mode;
12620daf62d9SStanislav Sedov 	return (0);
12630daf62d9SStanislav Sedov }
12640daf62d9SStanislav Sedov 
12650daf62d9SStanislav Sedov int
12660daf62d9SStanislav Sedov procstat_get_socket_info(struct procstat *procstat, struct filestat *fst,
12670daf62d9SStanislav Sedov     struct sockstat *sock, char *errbuf)
12680daf62d9SStanislav Sedov {
12690daf62d9SStanislav Sedov 
12700daf62d9SStanislav Sedov 	assert(sock);
12710daf62d9SStanislav Sedov 	if (procstat->type == PROCSTAT_KVM) {
12720daf62d9SStanislav Sedov 		return (procstat_get_socket_info_kvm(procstat->kd, fst, sock,
12730daf62d9SStanislav Sedov 		    errbuf));
12747153ad2bSMikolaj Golub 	} else if (procstat->type == PROCSTAT_SYSCTL ||
12757153ad2bSMikolaj Golub 		procstat->type == PROCSTAT_CORE) {
12760daf62d9SStanislav Sedov 		return (procstat_get_socket_info_sysctl(fst, sock, errbuf));
12770daf62d9SStanislav Sedov 	} else {
127880905c35SJilles Tjoelker 		warnx("unknown access method: %d", procstat->type);
12790daf62d9SStanislav Sedov 		snprintf(errbuf, _POSIX2_LINE_MAX, "error");
12800daf62d9SStanislav Sedov 		return (1);
12810daf62d9SStanislav Sedov 	}
12820daf62d9SStanislav Sedov }
12830daf62d9SStanislav Sedov 
12840daf62d9SStanislav Sedov static int
12850daf62d9SStanislav Sedov procstat_get_socket_info_kvm(kvm_t *kd, struct filestat *fst,
12860daf62d9SStanislav Sedov     struct sockstat *sock, char *errbuf)
12870daf62d9SStanislav Sedov {
12880daf62d9SStanislav Sedov 	struct domain dom;
12890daf62d9SStanislav Sedov 	struct inpcb inpcb;
12900daf62d9SStanislav Sedov 	struct protosw proto;
12910daf62d9SStanislav Sedov 	struct socket s;
12920daf62d9SStanislav Sedov 	struct unpcb unpcb;
12930daf62d9SStanislav Sedov 	ssize_t len;
12940daf62d9SStanislav Sedov 	void *so;
12950daf62d9SStanislav Sedov 
12960daf62d9SStanislav Sedov 	assert(kd);
12970daf62d9SStanislav Sedov 	assert(sock);
12980daf62d9SStanislav Sedov 	assert(fst);
12990daf62d9SStanislav Sedov 	bzero(sock, sizeof(*sock));
13000daf62d9SStanislav Sedov 	so = fst->fs_typedep;
13010daf62d9SStanislav Sedov 	if (so == NULL)
13020daf62d9SStanislav Sedov 		goto fail;
13030daf62d9SStanislav Sedov 	sock->so_addr = (uintptr_t)so;
13040daf62d9SStanislav Sedov 	/* fill in socket */
13050daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)so, &s,
13060daf62d9SStanislav Sedov 	    sizeof(struct socket))) {
13070daf62d9SStanislav Sedov 		warnx("can't read sock at %p", (void *)so);
13080daf62d9SStanislav Sedov 		goto fail;
13090daf62d9SStanislav Sedov 	}
13100daf62d9SStanislav Sedov 	/* fill in protosw entry */
13110daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)s.so_proto, &proto,
13120daf62d9SStanislav Sedov 	    sizeof(struct protosw))) {
13130daf62d9SStanislav Sedov 		warnx("can't read protosw at %p", (void *)s.so_proto);
13140daf62d9SStanislav Sedov 		goto fail;
13150daf62d9SStanislav Sedov 	}
13160daf62d9SStanislav Sedov 	/* fill in domain */
13170daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)proto.pr_domain, &dom,
13180daf62d9SStanislav Sedov 	    sizeof(struct domain))) {
13190daf62d9SStanislav Sedov 		warnx("can't read domain at %p",
13200daf62d9SStanislav Sedov 		    (void *)proto.pr_domain);
13210daf62d9SStanislav Sedov 		goto fail;
13220daf62d9SStanislav Sedov 	}
13230daf62d9SStanislav Sedov 	if ((len = kvm_read(kd, (unsigned long)dom.dom_name, sock->dname,
13240daf62d9SStanislav Sedov 	    sizeof(sock->dname) - 1)) < 0) {
13250daf62d9SStanislav Sedov 		warnx("can't read domain name at %p", (void *)dom.dom_name);
13260daf62d9SStanislav Sedov 		sock->dname[0] = '\0';
13270daf62d9SStanislav Sedov 	}
13280daf62d9SStanislav Sedov 	else
13290daf62d9SStanislav Sedov 		sock->dname[len] = '\0';
13300daf62d9SStanislav Sedov 
13310daf62d9SStanislav Sedov 	/*
13320daf62d9SStanislav Sedov 	 * Fill in known data.
13330daf62d9SStanislav Sedov 	 */
13340daf62d9SStanislav Sedov 	sock->type = s.so_type;
13350daf62d9SStanislav Sedov 	sock->proto = proto.pr_protocol;
13360daf62d9SStanislav Sedov 	sock->dom_family = dom.dom_family;
13370daf62d9SStanislav Sedov 	sock->so_pcb = (uintptr_t)s.so_pcb;
13380daf62d9SStanislav Sedov 
13390daf62d9SStanislav Sedov 	/*
13400daf62d9SStanislav Sedov 	 * Protocol specific data.
13410daf62d9SStanislav Sedov 	 */
13420daf62d9SStanislav Sedov 	switch(dom.dom_family) {
13430daf62d9SStanislav Sedov 	case AF_INET:
13440daf62d9SStanislav Sedov 	case AF_INET6:
13450daf62d9SStanislav Sedov 		if (proto.pr_protocol == IPPROTO_TCP) {
13460daf62d9SStanislav Sedov 			if (s.so_pcb) {
13470daf62d9SStanislav Sedov 				if (kvm_read(kd, (u_long)s.so_pcb,
13480daf62d9SStanislav Sedov 				    (char *)&inpcb, sizeof(struct inpcb))
13490daf62d9SStanislav Sedov 				    != sizeof(struct inpcb)) {
13500daf62d9SStanislav Sedov 					warnx("can't read inpcb at %p",
13510daf62d9SStanislav Sedov 					    (void *)s.so_pcb);
13520daf62d9SStanislav Sedov 				} else
13530daf62d9SStanislav Sedov 					sock->inp_ppcb =
13540daf62d9SStanislav Sedov 					    (uintptr_t)inpcb.inp_ppcb;
13550daf62d9SStanislav Sedov 			}
13560daf62d9SStanislav Sedov 		}
13570daf62d9SStanislav Sedov 		break;
13580daf62d9SStanislav Sedov 	case AF_UNIX:
13590daf62d9SStanislav Sedov 		if (s.so_pcb) {
13600daf62d9SStanislav Sedov 			if (kvm_read(kd, (u_long)s.so_pcb, (char *)&unpcb,
13610daf62d9SStanislav Sedov 			    sizeof(struct unpcb)) != sizeof(struct unpcb)){
13620daf62d9SStanislav Sedov 				warnx("can't read unpcb at %p",
13630daf62d9SStanislav Sedov 				    (void *)s.so_pcb);
13640daf62d9SStanislav Sedov 			} else if (unpcb.unp_conn) {
13650daf62d9SStanislav Sedov 				sock->so_rcv_sb_state = s.so_rcv.sb_state;
13660daf62d9SStanislav Sedov 				sock->so_snd_sb_state = s.so_snd.sb_state;
13670daf62d9SStanislav Sedov 				sock->unp_conn = (uintptr_t)unpcb.unp_conn;
13680daf62d9SStanislav Sedov 			}
13690daf62d9SStanislav Sedov 		}
13700daf62d9SStanislav Sedov 		break;
13710daf62d9SStanislav Sedov 	default:
13720daf62d9SStanislav Sedov 		break;
13730daf62d9SStanislav Sedov 	}
13740daf62d9SStanislav Sedov 	return (0);
13750daf62d9SStanislav Sedov 
13760daf62d9SStanislav Sedov fail:
13770daf62d9SStanislav Sedov 	snprintf(errbuf, _POSIX2_LINE_MAX, "error");
13780daf62d9SStanislav Sedov 	return (1);
13790daf62d9SStanislav Sedov }
13800daf62d9SStanislav Sedov 
13810daf62d9SStanislav Sedov static int
13820daf62d9SStanislav Sedov procstat_get_socket_info_sysctl(struct filestat *fst, struct sockstat *sock,
13830daf62d9SStanislav Sedov     char *errbuf __unused)
13840daf62d9SStanislav Sedov {
13850daf62d9SStanislav Sedov 	struct kinfo_file *kif;
13860daf62d9SStanislav Sedov 
13870daf62d9SStanislav Sedov 	assert(sock);
13880daf62d9SStanislav Sedov 	assert(fst);
13890daf62d9SStanislav Sedov 	bzero(sock, sizeof(*sock));
13900daf62d9SStanislav Sedov 	kif = fst->fs_typedep;
13910daf62d9SStanislav Sedov 	if (kif == NULL)
13920daf62d9SStanislav Sedov 		return (0);
13930daf62d9SStanislav Sedov 
13940daf62d9SStanislav Sedov 	/*
13950daf62d9SStanislav Sedov 	 * Fill in known data.
13960daf62d9SStanislav Sedov 	 */
13970daf62d9SStanislav Sedov 	sock->type = kif->kf_sock_type;
13980daf62d9SStanislav Sedov 	sock->proto = kif->kf_sock_protocol;
13990daf62d9SStanislav Sedov 	sock->dom_family = kif->kf_sock_domain;
14000daf62d9SStanislav Sedov 	sock->so_pcb = kif->kf_un.kf_sock.kf_sock_pcb;
14010daf62d9SStanislav Sedov 	strlcpy(sock->dname, kif->kf_path, sizeof(sock->dname));
14020daf62d9SStanislav Sedov 	bcopy(&kif->kf_sa_local, &sock->sa_local, kif->kf_sa_local.ss_len);
14030daf62d9SStanislav Sedov 	bcopy(&kif->kf_sa_peer, &sock->sa_peer, kif->kf_sa_peer.ss_len);
14040daf62d9SStanislav Sedov 
14050daf62d9SStanislav Sedov 	/*
14060daf62d9SStanislav Sedov 	 * Protocol specific data.
14070daf62d9SStanislav Sedov 	 */
14080daf62d9SStanislav Sedov 	switch(sock->dom_family) {
14090daf62d9SStanislav Sedov 	case AF_INET:
14100daf62d9SStanislav Sedov 	case AF_INET6:
14110daf62d9SStanislav Sedov 		if (sock->proto == IPPROTO_TCP)
14120daf62d9SStanislav Sedov 			sock->inp_ppcb = kif->kf_un.kf_sock.kf_sock_inpcb;
14130daf62d9SStanislav Sedov 		break;
14140daf62d9SStanislav Sedov 	case AF_UNIX:
14150daf62d9SStanislav Sedov 		if (kif->kf_un.kf_sock.kf_sock_unpconn != 0) {
14160daf62d9SStanislav Sedov 				sock->so_rcv_sb_state =
14170daf62d9SStanislav Sedov 				    kif->kf_un.kf_sock.kf_sock_rcv_sb_state;
14180daf62d9SStanislav Sedov 				sock->so_snd_sb_state =
14190daf62d9SStanislav Sedov 				    kif->kf_un.kf_sock.kf_sock_snd_sb_state;
14200daf62d9SStanislav Sedov 				sock->unp_conn =
14210daf62d9SStanislav Sedov 				    kif->kf_un.kf_sock.kf_sock_unpconn;
14220daf62d9SStanislav Sedov 		}
14230daf62d9SStanislav Sedov 		break;
14240daf62d9SStanislav Sedov 	default:
14250daf62d9SStanislav Sedov 		break;
14260daf62d9SStanislav Sedov 	}
14270daf62d9SStanislav Sedov 	return (0);
14280daf62d9SStanislav Sedov }
14290daf62d9SStanislav Sedov 
14300daf62d9SStanislav Sedov /*
14310daf62d9SStanislav Sedov  * Descriptor flags to filestat translation.
14320daf62d9SStanislav Sedov  */
14330daf62d9SStanislav Sedov static int
14340daf62d9SStanislav Sedov to_filestat_flags(int flags)
14350daf62d9SStanislav Sedov {
14360daf62d9SStanislav Sedov 	static struct {
14370daf62d9SStanislav Sedov 		int flag;
14380daf62d9SStanislav Sedov 		int fst_flag;
14390daf62d9SStanislav Sedov 	} fstflags[] = {
14400daf62d9SStanislav Sedov 		{ FREAD, PS_FST_FFLAG_READ },
14410daf62d9SStanislav Sedov 		{ FWRITE, PS_FST_FFLAG_WRITE },
14420daf62d9SStanislav Sedov 		{ O_APPEND, PS_FST_FFLAG_APPEND },
14430daf62d9SStanislav Sedov 		{ O_ASYNC, PS_FST_FFLAG_ASYNC },
14440daf62d9SStanislav Sedov 		{ O_CREAT, PS_FST_FFLAG_CREAT },
14450daf62d9SStanislav Sedov 		{ O_DIRECT, PS_FST_FFLAG_DIRECT },
14460daf62d9SStanislav Sedov 		{ O_EXCL, PS_FST_FFLAG_EXCL },
14470daf62d9SStanislav Sedov 		{ O_EXEC, PS_FST_FFLAG_EXEC },
14480daf62d9SStanislav Sedov 		{ O_EXLOCK, PS_FST_FFLAG_EXLOCK },
14490daf62d9SStanislav Sedov 		{ O_NOFOLLOW, PS_FST_FFLAG_NOFOLLOW },
14500daf62d9SStanislav Sedov 		{ O_NONBLOCK, PS_FST_FFLAG_NONBLOCK },
14510daf62d9SStanislav Sedov 		{ O_SHLOCK, PS_FST_FFLAG_SHLOCK },
14520daf62d9SStanislav Sedov 		{ O_SYNC, PS_FST_FFLAG_SYNC },
14530daf62d9SStanislav Sedov 		{ O_TRUNC, PS_FST_FFLAG_TRUNC }
14540daf62d9SStanislav Sedov 	};
14550daf62d9SStanislav Sedov #define NFSTFLAGS	(sizeof(fstflags) / sizeof(*fstflags))
14560daf62d9SStanislav Sedov 	int fst_flags;
14570daf62d9SStanislav Sedov 	unsigned int i;
14580daf62d9SStanislav Sedov 
14590daf62d9SStanislav Sedov 	fst_flags = 0;
14600daf62d9SStanislav Sedov 	for (i = 0; i < NFSTFLAGS; i++)
14610daf62d9SStanislav Sedov 		if (flags & fstflags[i].flag)
14620daf62d9SStanislav Sedov 			fst_flags |= fstflags[i].fst_flag;
14630daf62d9SStanislav Sedov 	return (fst_flags);
14640daf62d9SStanislav Sedov }
14650daf62d9SStanislav Sedov 
14660daf62d9SStanislav Sedov /*
14670daf62d9SStanislav Sedov  * Vnode type to filestate translation.
14680daf62d9SStanislav Sedov  */
14690daf62d9SStanislav Sedov static int
14700daf62d9SStanislav Sedov vntype2psfsttype(int type)
14710daf62d9SStanislav Sedov {
14720daf62d9SStanislav Sedov 	static struct {
14730daf62d9SStanislav Sedov 		int	vtype;
14740daf62d9SStanislav Sedov 		int	fst_vtype;
14750daf62d9SStanislav Sedov 	} vt2fst[] = {
14760daf62d9SStanislav Sedov 		{ VBAD, PS_FST_VTYPE_VBAD },
14770daf62d9SStanislav Sedov 		{ VBLK, PS_FST_VTYPE_VBLK },
14780daf62d9SStanislav Sedov 		{ VCHR, PS_FST_VTYPE_VCHR },
14790daf62d9SStanislav Sedov 		{ VDIR, PS_FST_VTYPE_VDIR },
14800daf62d9SStanislav Sedov 		{ VFIFO, PS_FST_VTYPE_VFIFO },
14810daf62d9SStanislav Sedov 		{ VLNK, PS_FST_VTYPE_VLNK },
14820daf62d9SStanislav Sedov 		{ VNON, PS_FST_VTYPE_VNON },
14830daf62d9SStanislav Sedov 		{ VREG, PS_FST_VTYPE_VREG },
14840daf62d9SStanislav Sedov 		{ VSOCK, PS_FST_VTYPE_VSOCK }
14850daf62d9SStanislav Sedov 	};
14860daf62d9SStanislav Sedov #define	NVFTYPES	(sizeof(vt2fst) / sizeof(*vt2fst))
14870daf62d9SStanislav Sedov 	unsigned int i, fst_type;
14880daf62d9SStanislav Sedov 
14890daf62d9SStanislav Sedov 	fst_type = PS_FST_VTYPE_UNKNOWN;
14900daf62d9SStanislav Sedov 	for (i = 0; i < NVFTYPES; i++) {
14910daf62d9SStanislav Sedov 		if (type == vt2fst[i].vtype) {
14920daf62d9SStanislav Sedov 			fst_type = vt2fst[i].fst_vtype;
14930daf62d9SStanislav Sedov 			break;
14940daf62d9SStanislav Sedov 		}
14950daf62d9SStanislav Sedov 	}
14960daf62d9SStanislav Sedov 	return (fst_type);
14970daf62d9SStanislav Sedov }
14980daf62d9SStanislav Sedov 
14990daf62d9SStanislav Sedov static char *
15000daf62d9SStanislav Sedov getmnton(kvm_t *kd, struct mount *m)
15010daf62d9SStanislav Sedov {
15025f301949SBen Laurie 	struct mount mnt;
15030daf62d9SStanislav Sedov 	static struct mtab {
15040daf62d9SStanislav Sedov 		struct mtab *next;
15050daf62d9SStanislav Sedov 		struct mount *m;
15060daf62d9SStanislav Sedov 		char mntonname[MNAMELEN + 1];
15070daf62d9SStanislav Sedov 	} *mhead = NULL;
15080daf62d9SStanislav Sedov 	struct mtab *mt;
15090daf62d9SStanislav Sedov 
15100daf62d9SStanislav Sedov 	for (mt = mhead; mt != NULL; mt = mt->next)
15110daf62d9SStanislav Sedov 		if (m == mt->m)
15120daf62d9SStanislav Sedov 			return (mt->mntonname);
15130daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)m, &mnt, sizeof(struct mount))) {
15140daf62d9SStanislav Sedov 		warnx("can't read mount table at %p", (void *)m);
15150daf62d9SStanislav Sedov 		return (NULL);
15160daf62d9SStanislav Sedov 	}
15170daf62d9SStanislav Sedov 	if ((mt = malloc(sizeof (struct mtab))) == NULL)
15180daf62d9SStanislav Sedov 		err(1, NULL);
15190daf62d9SStanislav Sedov 	mt->m = m;
15200daf62d9SStanislav Sedov 	bcopy(&mnt.mnt_stat.f_mntonname[0], &mt->mntonname[0], MNAMELEN);
15215f301949SBen Laurie 	mt->mntonname[MNAMELEN] = '\0';
15220daf62d9SStanislav Sedov 	mt->next = mhead;
15230daf62d9SStanislav Sedov 	mhead = mt;
15240daf62d9SStanislav Sedov 	return (mt->mntonname);
15250daf62d9SStanislav Sedov }
15267153ad2bSMikolaj Golub 
152739680c7bSMikolaj Golub static struct kinfo_vmentry *
152839680c7bSMikolaj Golub kinfo_getvmmap_core(struct procstat_core *core, int *cntp)
152939680c7bSMikolaj Golub {
153039680c7bSMikolaj Golub 	int cnt;
153139680c7bSMikolaj Golub 	size_t len;
153239680c7bSMikolaj Golub 	char *buf, *bp, *eb;
153339680c7bSMikolaj Golub 	struct kinfo_vmentry *kiv, *kp, *kv;
153439680c7bSMikolaj Golub 
153539680c7bSMikolaj Golub 	buf = procstat_core_get(core, PSC_TYPE_VMMAP, NULL, &len);
153639680c7bSMikolaj Golub 	if (buf == NULL)
153739680c7bSMikolaj Golub 		return (NULL);
153839680c7bSMikolaj Golub 
153939680c7bSMikolaj Golub 	/*
154039680c7bSMikolaj Golub 	 * XXXMG: The code below is just copy&past from libutil.
154139680c7bSMikolaj Golub 	 * The code duplication can be avoided if libutil
154239680c7bSMikolaj Golub 	 * is extended to provide something like:
154339680c7bSMikolaj Golub 	 *   struct kinfo_vmentry *kinfo_getvmmap_from_buf(const char *buf,
154439680c7bSMikolaj Golub 	 *       size_t len, int *cntp);
154539680c7bSMikolaj Golub 	 */
154639680c7bSMikolaj Golub 
154739680c7bSMikolaj Golub 	/* Pass 1: count items */
154839680c7bSMikolaj Golub 	cnt = 0;
154939680c7bSMikolaj Golub 	bp = buf;
155039680c7bSMikolaj Golub 	eb = buf + len;
155139680c7bSMikolaj Golub 	while (bp < eb) {
155239680c7bSMikolaj Golub 		kv = (struct kinfo_vmentry *)(uintptr_t)bp;
155339680c7bSMikolaj Golub 		bp += kv->kve_structsize;
155439680c7bSMikolaj Golub 		cnt++;
155539680c7bSMikolaj Golub 	}
155639680c7bSMikolaj Golub 
155739680c7bSMikolaj Golub 	kiv = calloc(cnt, sizeof(*kiv));
155839680c7bSMikolaj Golub 	if (kiv == NULL) {
155939680c7bSMikolaj Golub 		free(buf);
156039680c7bSMikolaj Golub 		return (NULL);
156139680c7bSMikolaj Golub 	}
156239680c7bSMikolaj Golub 	bp = buf;
156339680c7bSMikolaj Golub 	eb = buf + len;
156439680c7bSMikolaj Golub 	kp = kiv;
156539680c7bSMikolaj Golub 	/* Pass 2: unpack */
156639680c7bSMikolaj Golub 	while (bp < eb) {
156739680c7bSMikolaj Golub 		kv = (struct kinfo_vmentry *)(uintptr_t)bp;
156839680c7bSMikolaj Golub 		/* Copy/expand into pre-zeroed buffer */
156939680c7bSMikolaj Golub 		memcpy(kp, kv, kv->kve_structsize);
157039680c7bSMikolaj Golub 		/* Advance to next packed record */
157139680c7bSMikolaj Golub 		bp += kv->kve_structsize;
157239680c7bSMikolaj Golub 		/* Set field size to fixed length, advance */
157339680c7bSMikolaj Golub 		kp->kve_structsize = sizeof(*kp);
157439680c7bSMikolaj Golub 		kp++;
157539680c7bSMikolaj Golub 	}
157639680c7bSMikolaj Golub 	free(buf);
157739680c7bSMikolaj Golub 	*cntp = cnt;
157839680c7bSMikolaj Golub 	return (kiv);	/* Caller must free() return value */
157939680c7bSMikolaj Golub }
158039680c7bSMikolaj Golub 
158139680c7bSMikolaj Golub struct kinfo_vmentry *
158239680c7bSMikolaj Golub procstat_getvmmap(struct procstat *procstat, struct kinfo_proc *kp,
158339680c7bSMikolaj Golub     unsigned int *cntp)
158439680c7bSMikolaj Golub {
158539680c7bSMikolaj Golub 	switch(procstat->type) {
158639680c7bSMikolaj Golub 	case PROCSTAT_KVM:
158739680c7bSMikolaj Golub 		warnx("kvm method is not supported");
158839680c7bSMikolaj Golub 		return (NULL);
158939680c7bSMikolaj Golub 	case PROCSTAT_SYSCTL:
159039680c7bSMikolaj Golub 		return (kinfo_getvmmap(kp->ki_pid, cntp));
159139680c7bSMikolaj Golub 	case PROCSTAT_CORE:
159239680c7bSMikolaj Golub 		return (kinfo_getvmmap_core(procstat->core, cntp));
159339680c7bSMikolaj Golub 	default:
159439680c7bSMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
159539680c7bSMikolaj Golub 		return (NULL);
159639680c7bSMikolaj Golub 	}
159739680c7bSMikolaj Golub }
159839680c7bSMikolaj Golub 
159939680c7bSMikolaj Golub void
160039680c7bSMikolaj Golub procstat_freevmmap(struct procstat *procstat __unused,
160139680c7bSMikolaj Golub     struct kinfo_vmentry *vmmap)
160239680c7bSMikolaj Golub {
160339680c7bSMikolaj Golub 
160439680c7bSMikolaj Golub 	free(vmmap);
160539680c7bSMikolaj Golub }
16067f1d14e6SMikolaj Golub 
16077f1d14e6SMikolaj Golub static gid_t *
16087f1d14e6SMikolaj Golub procstat_getgroups_sysctl(pid_t pid, unsigned int *cntp)
16097f1d14e6SMikolaj Golub {
16107f1d14e6SMikolaj Golub 	int mib[4];
16117f1d14e6SMikolaj Golub 	size_t len;
16127f1d14e6SMikolaj Golub 	gid_t *groups;
16137f1d14e6SMikolaj Golub 
16147f1d14e6SMikolaj Golub 	mib[0] = CTL_KERN;
16157f1d14e6SMikolaj Golub 	mib[1] = KERN_PROC;
16167f1d14e6SMikolaj Golub 	mib[2] = KERN_PROC_GROUPS;
16177f1d14e6SMikolaj Golub 	mib[3] = pid;
16187f1d14e6SMikolaj Golub 	len = (sysconf(_SC_NGROUPS_MAX) + 1) * sizeof(gid_t);
16197f1d14e6SMikolaj Golub 	groups = malloc(len);
16207f1d14e6SMikolaj Golub 	if (groups == NULL) {
16217f1d14e6SMikolaj Golub 		warn("malloc(%zu)", len);
16227f1d14e6SMikolaj Golub 		return (NULL);
16237f1d14e6SMikolaj Golub 	}
16247f1d14e6SMikolaj Golub 	if (sysctl(mib, 4, groups, &len, NULL, 0) == -1) {
16257f1d14e6SMikolaj Golub 		warn("sysctl: kern.proc.groups: %d", pid);
16267f1d14e6SMikolaj Golub 		free(groups);
16277f1d14e6SMikolaj Golub 		return (NULL);
16287f1d14e6SMikolaj Golub 	}
16297f1d14e6SMikolaj Golub 	*cntp = len / sizeof(gid_t);
16307f1d14e6SMikolaj Golub 	return (groups);
16317f1d14e6SMikolaj Golub }
16327f1d14e6SMikolaj Golub 
16337f1d14e6SMikolaj Golub static gid_t *
16347f1d14e6SMikolaj Golub procstat_getgroups_core(struct procstat_core *core, unsigned int *cntp)
16357f1d14e6SMikolaj Golub {
16367f1d14e6SMikolaj Golub 	size_t len;
16377f1d14e6SMikolaj Golub 	gid_t *groups;
16387f1d14e6SMikolaj Golub 
16397f1d14e6SMikolaj Golub 	groups = procstat_core_get(core, PSC_TYPE_GROUPS, NULL, &len);
16407f1d14e6SMikolaj Golub 	if (groups == NULL)
16417f1d14e6SMikolaj Golub 		return (NULL);
16427f1d14e6SMikolaj Golub 	*cntp = len / sizeof(gid_t);
16437f1d14e6SMikolaj Golub 	return (groups);
16447f1d14e6SMikolaj Golub }
16457f1d14e6SMikolaj Golub 
16467f1d14e6SMikolaj Golub gid_t *
16477f1d14e6SMikolaj Golub procstat_getgroups(struct procstat *procstat, struct kinfo_proc *kp,
16487f1d14e6SMikolaj Golub     unsigned int *cntp)
16497f1d14e6SMikolaj Golub {
16507f1d14e6SMikolaj Golub 	switch(procstat->type) {
16517f1d14e6SMikolaj Golub 	case PROCSTAT_KVM:
16527f1d14e6SMikolaj Golub 		warnx("kvm method is not supported");
16537f1d14e6SMikolaj Golub 		return (NULL);
16547f1d14e6SMikolaj Golub 	case PROCSTAT_SYSCTL:
16557f1d14e6SMikolaj Golub 		return (procstat_getgroups_sysctl(kp->ki_pid, cntp));
16567f1d14e6SMikolaj Golub 	case PROCSTAT_CORE:
16577f1d14e6SMikolaj Golub 		return (procstat_getgroups_core(procstat->core, cntp));
16587f1d14e6SMikolaj Golub 	default:
16597f1d14e6SMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
16607f1d14e6SMikolaj Golub 		return (NULL);
16617f1d14e6SMikolaj Golub 	}
16627f1d14e6SMikolaj Golub }
16637f1d14e6SMikolaj Golub 
16647f1d14e6SMikolaj Golub void
16657f1d14e6SMikolaj Golub procstat_freegroups(struct procstat *procstat __unused, gid_t *groups)
16667f1d14e6SMikolaj Golub {
16677f1d14e6SMikolaj Golub 
16687f1d14e6SMikolaj Golub 	free(groups);
16697f1d14e6SMikolaj Golub }
16705b9bcba9SMikolaj Golub 
16715b9bcba9SMikolaj Golub static int
16725b9bcba9SMikolaj Golub procstat_getumask_sysctl(pid_t pid, unsigned short *maskp)
16735b9bcba9SMikolaj Golub {
16745b9bcba9SMikolaj Golub 	int error;
16755b9bcba9SMikolaj Golub 	int mib[4];
16765b9bcba9SMikolaj Golub 	size_t len;
16775b9bcba9SMikolaj Golub 
16785b9bcba9SMikolaj Golub 	mib[0] = CTL_KERN;
16795b9bcba9SMikolaj Golub 	mib[1] = KERN_PROC;
16805b9bcba9SMikolaj Golub 	mib[2] = KERN_PROC_UMASK;
16815b9bcba9SMikolaj Golub 	mib[3] = pid;
16825b9bcba9SMikolaj Golub 	len = sizeof(*maskp);
16835b9bcba9SMikolaj Golub 	error = sysctl(mib, 4, maskp, &len, NULL, 0);
16845b9bcba9SMikolaj Golub 	if (error != 0 && errno != ESRCH)
16855b9bcba9SMikolaj Golub 		warn("sysctl: kern.proc.umask: %d", pid);
16865b9bcba9SMikolaj Golub 	return (error);
16875b9bcba9SMikolaj Golub }
16885b9bcba9SMikolaj Golub 
16895b9bcba9SMikolaj Golub static int
16905b9bcba9SMikolaj Golub procstat_getumask_core(struct procstat_core *core, unsigned short *maskp)
16915b9bcba9SMikolaj Golub {
16925b9bcba9SMikolaj Golub 	size_t len;
16935b9bcba9SMikolaj Golub 	unsigned short *buf;
16945b9bcba9SMikolaj Golub 
16955b9bcba9SMikolaj Golub 	buf = procstat_core_get(core, PSC_TYPE_UMASK, NULL, &len);
16965b9bcba9SMikolaj Golub 	if (buf == NULL)
16975b9bcba9SMikolaj Golub 		return (-1);
16985b9bcba9SMikolaj Golub 	if (len < sizeof(*maskp)) {
16995b9bcba9SMikolaj Golub 		free(buf);
17005b9bcba9SMikolaj Golub 		return (-1);
17015b9bcba9SMikolaj Golub 	}
17025b9bcba9SMikolaj Golub 	*maskp = *buf;
17035b9bcba9SMikolaj Golub 	free(buf);
17045b9bcba9SMikolaj Golub 	return (0);
17055b9bcba9SMikolaj Golub }
17065b9bcba9SMikolaj Golub 
17075b9bcba9SMikolaj Golub int
17085b9bcba9SMikolaj Golub procstat_getumask(struct procstat *procstat, struct kinfo_proc *kp,
17095b9bcba9SMikolaj Golub     unsigned short *maskp)
17105b9bcba9SMikolaj Golub {
17115b9bcba9SMikolaj Golub 	switch(procstat->type) {
17125b9bcba9SMikolaj Golub 	case PROCSTAT_KVM:
17135b9bcba9SMikolaj Golub 		warnx("kvm method is not supported");
17145b9bcba9SMikolaj Golub 		return (-1);
17155b9bcba9SMikolaj Golub 	case PROCSTAT_SYSCTL:
17165b9bcba9SMikolaj Golub 		return (procstat_getumask_sysctl(kp->ki_pid, maskp));
17175b9bcba9SMikolaj Golub 	case PROCSTAT_CORE:
17185b9bcba9SMikolaj Golub 		return (procstat_getumask_core(procstat->core, maskp));
17195b9bcba9SMikolaj Golub 	default:
17205b9bcba9SMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
17215b9bcba9SMikolaj Golub 		return (-1);
17225b9bcba9SMikolaj Golub 	}
17235b9bcba9SMikolaj Golub }
17247cc0ebfdSMikolaj Golub 
17257cc0ebfdSMikolaj Golub static int
17267cc0ebfdSMikolaj Golub procstat_getrlimit_sysctl(pid_t pid, int which, struct rlimit* rlimit)
17277cc0ebfdSMikolaj Golub {
17287cc0ebfdSMikolaj Golub 	int error, name[5];
17297cc0ebfdSMikolaj Golub 	size_t len;
17307cc0ebfdSMikolaj Golub 
17317cc0ebfdSMikolaj Golub 	name[0] = CTL_KERN;
17327cc0ebfdSMikolaj Golub 	name[1] = KERN_PROC;
17337cc0ebfdSMikolaj Golub 	name[2] = KERN_PROC_RLIMIT;
17347cc0ebfdSMikolaj Golub 	name[3] = pid;
17357cc0ebfdSMikolaj Golub 	name[4] = which;
17367cc0ebfdSMikolaj Golub 	len = sizeof(struct rlimit);
17377cc0ebfdSMikolaj Golub 	error = sysctl(name, 5, rlimit, &len, NULL, 0);
17387cc0ebfdSMikolaj Golub 	if (error < 0 && errno != ESRCH) {
17397cc0ebfdSMikolaj Golub 		warn("sysctl: kern.proc.rlimit: %d", pid);
17407cc0ebfdSMikolaj Golub 		return (-1);
17417cc0ebfdSMikolaj Golub 	}
17427cc0ebfdSMikolaj Golub 	if (error < 0 || len != sizeof(struct rlimit))
17437cc0ebfdSMikolaj Golub 		return (-1);
17447cc0ebfdSMikolaj Golub 	return (0);
17457cc0ebfdSMikolaj Golub }
17467cc0ebfdSMikolaj Golub 
17477cc0ebfdSMikolaj Golub static int
17487cc0ebfdSMikolaj Golub procstat_getrlimit_core(struct procstat_core *core, int which,
17497cc0ebfdSMikolaj Golub     struct rlimit* rlimit)
17507cc0ebfdSMikolaj Golub {
17517cc0ebfdSMikolaj Golub 	size_t len;
17527cc0ebfdSMikolaj Golub 	struct rlimit* rlimits;
17537cc0ebfdSMikolaj Golub 
17547cc0ebfdSMikolaj Golub 	if (which < 0 || which >= RLIM_NLIMITS) {
17557cc0ebfdSMikolaj Golub 		errno = EINVAL;
17567cc0ebfdSMikolaj Golub 		warn("getrlimit: which");
17577cc0ebfdSMikolaj Golub 		return (-1);
17587cc0ebfdSMikolaj Golub 	}
17597cc0ebfdSMikolaj Golub 	rlimits = procstat_core_get(core, PSC_TYPE_RLIMIT, NULL, &len);
17607cc0ebfdSMikolaj Golub 	if (rlimits == NULL)
17617cc0ebfdSMikolaj Golub 		return (-1);
17627cc0ebfdSMikolaj Golub 	if (len < sizeof(struct rlimit) * RLIM_NLIMITS) {
17637cc0ebfdSMikolaj Golub 		free(rlimits);
17647cc0ebfdSMikolaj Golub 		return (-1);
17657cc0ebfdSMikolaj Golub 	}
17667cc0ebfdSMikolaj Golub 	*rlimit = rlimits[which];
17677cc0ebfdSMikolaj Golub 	return (0);
17687cc0ebfdSMikolaj Golub }
17697cc0ebfdSMikolaj Golub 
17707cc0ebfdSMikolaj Golub int
17717cc0ebfdSMikolaj Golub procstat_getrlimit(struct procstat *procstat, struct kinfo_proc *kp, int which,
17727cc0ebfdSMikolaj Golub     struct rlimit* rlimit)
17737cc0ebfdSMikolaj Golub {
17747cc0ebfdSMikolaj Golub 	switch(procstat->type) {
17757cc0ebfdSMikolaj Golub 	case PROCSTAT_KVM:
17767cc0ebfdSMikolaj Golub 		warnx("kvm method is not supported");
17777cc0ebfdSMikolaj Golub 		return (-1);
17787cc0ebfdSMikolaj Golub 	case PROCSTAT_SYSCTL:
17797cc0ebfdSMikolaj Golub 		return (procstat_getrlimit_sysctl(kp->ki_pid, which, rlimit));
17807cc0ebfdSMikolaj Golub 	case PROCSTAT_CORE:
17817cc0ebfdSMikolaj Golub 		return (procstat_getrlimit_core(procstat->core, which, rlimit));
17827cc0ebfdSMikolaj Golub 	default:
17837cc0ebfdSMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
17847cc0ebfdSMikolaj Golub 		return (-1);
17857cc0ebfdSMikolaj Golub 	}
17867cc0ebfdSMikolaj Golub }
1787*4cdf9796SMikolaj Golub 
1788*4cdf9796SMikolaj Golub static int
1789*4cdf9796SMikolaj Golub procstat_getpathname_sysctl(pid_t pid, char *pathname, size_t maxlen)
1790*4cdf9796SMikolaj Golub {
1791*4cdf9796SMikolaj Golub 	int error, name[4];
1792*4cdf9796SMikolaj Golub 	size_t len;
1793*4cdf9796SMikolaj Golub 
1794*4cdf9796SMikolaj Golub 	name[0] = CTL_KERN;
1795*4cdf9796SMikolaj Golub 	name[1] = KERN_PROC;
1796*4cdf9796SMikolaj Golub 	name[2] = KERN_PROC_PATHNAME;
1797*4cdf9796SMikolaj Golub 	name[3] = pid;
1798*4cdf9796SMikolaj Golub 	len = maxlen;
1799*4cdf9796SMikolaj Golub 	error = sysctl(name, 4, pathname, &len, NULL, 0);
1800*4cdf9796SMikolaj Golub 	if (error != 0 && errno != ESRCH)
1801*4cdf9796SMikolaj Golub 		warn("sysctl: kern.proc.pathname: %d", pid);
1802*4cdf9796SMikolaj Golub 	if (len == 0)
1803*4cdf9796SMikolaj Golub 		pathname[0] = '\0';
1804*4cdf9796SMikolaj Golub 	return (error);
1805*4cdf9796SMikolaj Golub }
1806*4cdf9796SMikolaj Golub 
1807*4cdf9796SMikolaj Golub static int
1808*4cdf9796SMikolaj Golub procstat_getpathname_core(struct procstat_core *core, char *pathname,
1809*4cdf9796SMikolaj Golub     size_t maxlen)
1810*4cdf9796SMikolaj Golub {
1811*4cdf9796SMikolaj Golub 	struct kinfo_file *files;
1812*4cdf9796SMikolaj Golub 	int cnt, i, result;
1813*4cdf9796SMikolaj Golub 
1814*4cdf9796SMikolaj Golub 	files = kinfo_getfile_core(core, &cnt);
1815*4cdf9796SMikolaj Golub 	if (files == NULL)
1816*4cdf9796SMikolaj Golub 		return (-1);
1817*4cdf9796SMikolaj Golub 	result = -1;
1818*4cdf9796SMikolaj Golub 	for (i = 0; i < cnt; i++) {
1819*4cdf9796SMikolaj Golub 		if (files[i].kf_fd != KF_FD_TYPE_TEXT)
1820*4cdf9796SMikolaj Golub 			continue;
1821*4cdf9796SMikolaj Golub 		strncpy(pathname, files[i].kf_path, maxlen);
1822*4cdf9796SMikolaj Golub 		result = 0;
1823*4cdf9796SMikolaj Golub 		break;
1824*4cdf9796SMikolaj Golub 	}
1825*4cdf9796SMikolaj Golub 	free(files);
1826*4cdf9796SMikolaj Golub 	return (result);
1827*4cdf9796SMikolaj Golub }
1828*4cdf9796SMikolaj Golub 
1829*4cdf9796SMikolaj Golub int
1830*4cdf9796SMikolaj Golub procstat_getpathname(struct procstat *procstat, struct kinfo_proc *kp,
1831*4cdf9796SMikolaj Golub     char *pathname, size_t maxlen)
1832*4cdf9796SMikolaj Golub {
1833*4cdf9796SMikolaj Golub 	switch(procstat->type) {
1834*4cdf9796SMikolaj Golub 	case PROCSTAT_KVM:
1835*4cdf9796SMikolaj Golub 		warnx("kvm method is not supported");
1836*4cdf9796SMikolaj Golub 		return (-1);
1837*4cdf9796SMikolaj Golub 	case PROCSTAT_SYSCTL:
1838*4cdf9796SMikolaj Golub 		return (procstat_getpathname_sysctl(kp->ki_pid, pathname,
1839*4cdf9796SMikolaj Golub 		    maxlen));
1840*4cdf9796SMikolaj Golub 	case PROCSTAT_CORE:
1841*4cdf9796SMikolaj Golub 		return (procstat_getpathname_core(procstat->core, pathname,
1842*4cdf9796SMikolaj Golub 		    maxlen));
1843*4cdf9796SMikolaj Golub 	default:
1844*4cdf9796SMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
1845*4cdf9796SMikolaj Golub 		return (-1);
1846*4cdf9796SMikolaj Golub 	}
1847*4cdf9796SMikolaj Golub }
1848