10daf62d9SStanislav Sedov /*- 20daf62d9SStanislav Sedov * Copyright (c) 2009 Stanislav Sedov <stas@FreeBSD.org> 30daf62d9SStanislav Sedov * Copyright (c) 1988, 1993 40daf62d9SStanislav Sedov * The Regents of the University of California. All rights reserved. 50daf62d9SStanislav Sedov * 60daf62d9SStanislav Sedov * Redistribution and use in source and binary forms, with or without 70daf62d9SStanislav Sedov * modification, are permitted provided that the following conditions 80daf62d9SStanislav Sedov * are met: 90daf62d9SStanislav Sedov * 1. Redistributions of source code must retain the above copyright 100daf62d9SStanislav Sedov * notice, this list of conditions and the following disclaimer. 110daf62d9SStanislav Sedov * 2. Redistributions in binary form must reproduce the above copyright 120daf62d9SStanislav Sedov * notice, this list of conditions and the following disclaimer in the 130daf62d9SStanislav Sedov * documentation and/or other materials provided with the distribution. 140daf62d9SStanislav Sedov * 3. All advertising materials mentioning features or use of this software 150daf62d9SStanislav Sedov * must display the following acknowledgement: 160daf62d9SStanislav Sedov * This product includes software developed by the University of 170daf62d9SStanislav Sedov * California, Berkeley and its contributors. 180daf62d9SStanislav Sedov * 4. Neither the name of the University nor the names of its contributors 190daf62d9SStanislav Sedov * may be used to endorse or promote products derived from this software 200daf62d9SStanislav Sedov * without specific prior written permission. 210daf62d9SStanislav Sedov * 220daf62d9SStanislav Sedov * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 230daf62d9SStanislav Sedov * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 240daf62d9SStanislav Sedov * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 250daf62d9SStanislav Sedov * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 260daf62d9SStanislav Sedov * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 270daf62d9SStanislav Sedov * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 280daf62d9SStanislav Sedov * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 290daf62d9SStanislav Sedov * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 300daf62d9SStanislav Sedov * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 310daf62d9SStanislav Sedov * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 320daf62d9SStanislav Sedov * SUCH DAMAGE. 330daf62d9SStanislav Sedov */ 340daf62d9SStanislav Sedov 350daf62d9SStanislav Sedov #include <sys/cdefs.h> 360daf62d9SStanislav Sedov __FBSDID("$FreeBSD$"); 370daf62d9SStanislav Sedov 380daf62d9SStanislav Sedov #include <sys/param.h> 390daf62d9SStanislav Sedov #include <sys/time.h> 400daf62d9SStanislav Sedov #include <sys/proc.h> 410daf62d9SStanislav Sedov #include <sys/user.h> 420daf62d9SStanislav Sedov #include <sys/stat.h> 430daf62d9SStanislav Sedov #include <sys/vnode.h> 440daf62d9SStanislav Sedov #include <sys/socket.h> 450daf62d9SStanislav Sedov #include <sys/socketvar.h> 460daf62d9SStanislav Sedov #include <sys/domain.h> 470daf62d9SStanislav Sedov #include <sys/protosw.h> 480daf62d9SStanislav Sedov #include <sys/un.h> 490daf62d9SStanislav Sedov #include <sys/unpcb.h> 500daf62d9SStanislav Sedov #include <sys/sysctl.h> 510daf62d9SStanislav Sedov #include <sys/tty.h> 520daf62d9SStanislav Sedov #include <sys/filedesc.h> 530daf62d9SStanislav Sedov #include <sys/queue.h> 540daf62d9SStanislav Sedov #define _WANT_FILE 550daf62d9SStanislav Sedov #include <sys/file.h> 560daf62d9SStanislav Sedov #include <sys/conf.h> 57e506e182SJohn Baldwin #include <sys/mman.h> 580daf62d9SStanislav Sedov #define _KERNEL 590daf62d9SStanislav Sedov #include <sys/mount.h> 600daf62d9SStanislav Sedov #include <sys/pipe.h> 610daf62d9SStanislav Sedov #include <ufs/ufs/quota.h> 620daf62d9SStanislav Sedov #include <ufs/ufs/inode.h> 630daf62d9SStanislav Sedov #include <fs/devfs/devfs.h> 640daf62d9SStanislav Sedov #include <fs/devfs/devfs_int.h> 650daf62d9SStanislav Sedov #undef _KERNEL 660daf62d9SStanislav Sedov #include <nfs/nfsproto.h> 670daf62d9SStanislav Sedov #include <nfsclient/nfs.h> 680daf62d9SStanislav Sedov #include <nfsclient/nfsnode.h> 690daf62d9SStanislav Sedov 700daf62d9SStanislav Sedov #include <vm/vm.h> 710daf62d9SStanislav Sedov #include <vm/vm_map.h> 720daf62d9SStanislav Sedov #include <vm/vm_object.h> 730daf62d9SStanislav Sedov 740daf62d9SStanislav Sedov #include <net/route.h> 750daf62d9SStanislav Sedov #include <netinet/in.h> 760daf62d9SStanislav Sedov #include <netinet/in_systm.h> 770daf62d9SStanislav Sedov #include <netinet/ip.h> 780daf62d9SStanislav Sedov #include <netinet/in_pcb.h> 790daf62d9SStanislav Sedov 800daf62d9SStanislav Sedov #include <assert.h> 810daf62d9SStanislav Sedov #include <ctype.h> 820daf62d9SStanislav Sedov #include <err.h> 830daf62d9SStanislav Sedov #include <fcntl.h> 840daf62d9SStanislav Sedov #include <kvm.h> 850daf62d9SStanislav Sedov #include <libutil.h> 860daf62d9SStanislav Sedov #include <limits.h> 870daf62d9SStanislav Sedov #include <paths.h> 880daf62d9SStanislav Sedov #include <pwd.h> 890daf62d9SStanislav Sedov #include <stdio.h> 900daf62d9SStanislav Sedov #include <stdlib.h> 910daf62d9SStanislav Sedov #include <stddef.h> 920daf62d9SStanislav Sedov #include <string.h> 930daf62d9SStanislav Sedov #include <unistd.h> 940daf62d9SStanislav Sedov #include <netdb.h> 950daf62d9SStanislav Sedov 960daf62d9SStanislav Sedov #include <libprocstat.h> 970daf62d9SStanislav Sedov #include "libprocstat_internal.h" 980daf62d9SStanislav Sedov #include "common_kvm.h" 997153ad2bSMikolaj Golub #include "core.h" 1000daf62d9SStanislav Sedov 1010daf62d9SStanislav Sedov int statfs(const char *, struct statfs *); /* XXX */ 1020daf62d9SStanislav Sedov 1030daf62d9SStanislav Sedov #define PROCSTAT_KVM 1 1040daf62d9SStanislav Sedov #define PROCSTAT_SYSCTL 2 1057153ad2bSMikolaj Golub #define PROCSTAT_CORE 3 1060daf62d9SStanislav Sedov 1070daf62d9SStanislav Sedov static char *getmnton(kvm_t *kd, struct mount *m); 10839680c7bSMikolaj Golub static struct kinfo_vmentry * kinfo_getvmmap_core(struct procstat_core *core, 10939680c7bSMikolaj Golub int *cntp); 1100daf62d9SStanislav Sedov static struct filestat_list *procstat_getfiles_kvm( 1110daf62d9SStanislav Sedov struct procstat *procstat, struct kinfo_proc *kp, int mmapped); 1120daf62d9SStanislav Sedov static struct filestat_list *procstat_getfiles_sysctl( 1130daf62d9SStanislav Sedov struct procstat *procstat, struct kinfo_proc *kp, int mmapped); 1140daf62d9SStanislav Sedov static int procstat_get_pipe_info_sysctl(struct filestat *fst, 1150daf62d9SStanislav Sedov struct pipestat *pipe, char *errbuf); 1160daf62d9SStanislav Sedov static int procstat_get_pipe_info_kvm(kvm_t *kd, struct filestat *fst, 1170daf62d9SStanislav Sedov struct pipestat *pipe, char *errbuf); 1180daf62d9SStanislav Sedov static int procstat_get_pts_info_sysctl(struct filestat *fst, 1190daf62d9SStanislav Sedov struct ptsstat *pts, char *errbuf); 1200daf62d9SStanislav Sedov static int procstat_get_pts_info_kvm(kvm_t *kd, struct filestat *fst, 1210daf62d9SStanislav Sedov struct ptsstat *pts, char *errbuf); 122e506e182SJohn Baldwin static int procstat_get_shm_info_sysctl(struct filestat *fst, 123e506e182SJohn Baldwin struct shmstat *shm, char *errbuf); 124e506e182SJohn Baldwin static int procstat_get_shm_info_kvm(kvm_t *kd, struct filestat *fst, 125e506e182SJohn Baldwin struct shmstat *shm, char *errbuf); 1260daf62d9SStanislav Sedov static int procstat_get_socket_info_sysctl(struct filestat *fst, 1270daf62d9SStanislav Sedov struct sockstat *sock, char *errbuf); 1280daf62d9SStanislav Sedov static int procstat_get_socket_info_kvm(kvm_t *kd, struct filestat *fst, 1290daf62d9SStanislav Sedov struct sockstat *sock, char *errbuf); 1300daf62d9SStanislav Sedov static int to_filestat_flags(int flags); 1310daf62d9SStanislav Sedov static int procstat_get_vnode_info_kvm(kvm_t *kd, struct filestat *fst, 1320daf62d9SStanislav Sedov struct vnstat *vn, char *errbuf); 1330daf62d9SStanislav Sedov static int procstat_get_vnode_info_sysctl(struct filestat *fst, 1340daf62d9SStanislav Sedov struct vnstat *vn, char *errbuf); 1357f1d14e6SMikolaj Golub static gid_t *procstat_getgroups_core(struct procstat_core *core, 1367f1d14e6SMikolaj Golub unsigned int *count); 1377f1d14e6SMikolaj Golub static gid_t *procstat_getgroups_sysctl(pid_t pid, unsigned int *count); 138*5b9bcba9SMikolaj Golub static int procstat_getumask_core(struct procstat_core *core, 139*5b9bcba9SMikolaj Golub unsigned short *maskp); 140*5b9bcba9SMikolaj Golub static int procstat_getumask_sysctl(pid_t pid, unsigned short *maskp); 1410daf62d9SStanislav Sedov static int vntype2psfsttype(int type); 1420daf62d9SStanislav Sedov 1430daf62d9SStanislav Sedov void 1440daf62d9SStanislav Sedov procstat_close(struct procstat *procstat) 1450daf62d9SStanislav Sedov { 1460daf62d9SStanislav Sedov 1470daf62d9SStanislav Sedov assert(procstat); 1480daf62d9SStanislav Sedov if (procstat->type == PROCSTAT_KVM) 1490daf62d9SStanislav Sedov kvm_close(procstat->kd); 1507153ad2bSMikolaj Golub else if (procstat->type == PROCSTAT_CORE) 1517153ad2bSMikolaj Golub procstat_core_close(procstat->core); 152d7b666aeSSergey Kandaurov free(procstat); 1530daf62d9SStanislav Sedov } 1540daf62d9SStanislav Sedov 1550daf62d9SStanislav Sedov struct procstat * 1560daf62d9SStanislav Sedov procstat_open_sysctl(void) 1570daf62d9SStanislav Sedov { 1580daf62d9SStanislav Sedov struct procstat *procstat; 1590daf62d9SStanislav Sedov 1600daf62d9SStanislav Sedov procstat = calloc(1, sizeof(*procstat)); 1610daf62d9SStanislav Sedov if (procstat == NULL) { 1620daf62d9SStanislav Sedov warn("malloc()"); 1630daf62d9SStanislav Sedov return (NULL); 1640daf62d9SStanislav Sedov } 1650daf62d9SStanislav Sedov procstat->type = PROCSTAT_SYSCTL; 1660daf62d9SStanislav Sedov return (procstat); 1670daf62d9SStanislav Sedov } 1680daf62d9SStanislav Sedov 1690daf62d9SStanislav Sedov struct procstat * 1700daf62d9SStanislav Sedov procstat_open_kvm(const char *nlistf, const char *memf) 1710daf62d9SStanislav Sedov { 1720daf62d9SStanislav Sedov struct procstat *procstat; 1730daf62d9SStanislav Sedov kvm_t *kd; 1740daf62d9SStanislav Sedov char buf[_POSIX2_LINE_MAX]; 1750daf62d9SStanislav Sedov 1760daf62d9SStanislav Sedov procstat = calloc(1, sizeof(*procstat)); 1770daf62d9SStanislav Sedov if (procstat == NULL) { 1780daf62d9SStanislav Sedov warn("malloc()"); 1790daf62d9SStanislav Sedov return (NULL); 1800daf62d9SStanislav Sedov } 1810daf62d9SStanislav Sedov kd = kvm_openfiles(nlistf, memf, NULL, O_RDONLY, buf); 1820daf62d9SStanislav Sedov if (kd == NULL) { 1830daf62d9SStanislav Sedov warnx("kvm_openfiles(): %s", buf); 1840daf62d9SStanislav Sedov free(procstat); 1850daf62d9SStanislav Sedov return (NULL); 1860daf62d9SStanislav Sedov } 1870daf62d9SStanislav Sedov procstat->type = PROCSTAT_KVM; 1880daf62d9SStanislav Sedov procstat->kd = kd; 1890daf62d9SStanislav Sedov return (procstat); 1900daf62d9SStanislav Sedov } 1910daf62d9SStanislav Sedov 1927153ad2bSMikolaj Golub struct procstat * 1937153ad2bSMikolaj Golub procstat_open_core(const char *filename) 1947153ad2bSMikolaj Golub { 1957153ad2bSMikolaj Golub struct procstat *procstat; 1967153ad2bSMikolaj Golub struct procstat_core *core; 1977153ad2bSMikolaj Golub 1987153ad2bSMikolaj Golub procstat = calloc(1, sizeof(*procstat)); 1997153ad2bSMikolaj Golub if (procstat == NULL) { 2007153ad2bSMikolaj Golub warn("malloc()"); 2017153ad2bSMikolaj Golub return (NULL); 2027153ad2bSMikolaj Golub } 2037153ad2bSMikolaj Golub core = procstat_core_open(filename); 2047153ad2bSMikolaj Golub if (core == NULL) { 2057153ad2bSMikolaj Golub free(procstat); 2067153ad2bSMikolaj Golub return (NULL); 2077153ad2bSMikolaj Golub } 2087153ad2bSMikolaj Golub procstat->type = PROCSTAT_CORE; 2097153ad2bSMikolaj Golub procstat->core = core; 2107153ad2bSMikolaj Golub return (procstat); 2117153ad2bSMikolaj Golub } 2127153ad2bSMikolaj Golub 2130daf62d9SStanislav Sedov struct kinfo_proc * 2140daf62d9SStanislav Sedov procstat_getprocs(struct procstat *procstat, int what, int arg, 2150daf62d9SStanislav Sedov unsigned int *count) 2160daf62d9SStanislav Sedov { 2170daf62d9SStanislav Sedov struct kinfo_proc *p0, *p; 2180daf62d9SStanislav Sedov size_t len; 2190daf62d9SStanislav Sedov int name[4]; 220391bdfb8SAndriy Gapon int cnt; 2210daf62d9SStanislav Sedov int error; 2220daf62d9SStanislav Sedov 2230daf62d9SStanislav Sedov assert(procstat); 2240daf62d9SStanislav Sedov assert(count); 2250daf62d9SStanislav Sedov p = NULL; 2260daf62d9SStanislav Sedov if (procstat->type == PROCSTAT_KVM) { 227391bdfb8SAndriy Gapon *count = 0; 228391bdfb8SAndriy Gapon p0 = kvm_getprocs(procstat->kd, what, arg, &cnt); 229391bdfb8SAndriy Gapon if (p0 == NULL || cnt <= 0) 2300daf62d9SStanislav Sedov return (NULL); 231391bdfb8SAndriy Gapon *count = cnt; 2320daf62d9SStanislav Sedov len = *count * sizeof(*p); 2330daf62d9SStanislav Sedov p = malloc(len); 2340daf62d9SStanislav Sedov if (p == NULL) { 23565869214SJilles Tjoelker warnx("malloc(%zu)", len); 2360daf62d9SStanislav Sedov goto fail; 2370daf62d9SStanislav Sedov } 2380daf62d9SStanislav Sedov bcopy(p0, p, len); 2390daf62d9SStanislav Sedov return (p); 2400daf62d9SStanislav Sedov } else if (procstat->type == PROCSTAT_SYSCTL) { 2410daf62d9SStanislav Sedov len = 0; 2420daf62d9SStanislav Sedov name[0] = CTL_KERN; 2430daf62d9SStanislav Sedov name[1] = KERN_PROC; 2440daf62d9SStanislav Sedov name[2] = what; 2450daf62d9SStanislav Sedov name[3] = arg; 2460daf62d9SStanislav Sedov error = sysctl(name, 4, NULL, &len, NULL, 0); 2470daf62d9SStanislav Sedov if (error < 0 && errno != EPERM) { 2480daf62d9SStanislav Sedov warn("sysctl(kern.proc)"); 2490daf62d9SStanislav Sedov goto fail; 2500daf62d9SStanislav Sedov } 2510daf62d9SStanislav Sedov if (len == 0) { 2520daf62d9SStanislav Sedov warnx("no processes?"); 2530daf62d9SStanislav Sedov goto fail; 2540daf62d9SStanislav Sedov } 2550daf62d9SStanislav Sedov p = malloc(len); 2560daf62d9SStanislav Sedov if (p == NULL) { 25765869214SJilles Tjoelker warnx("malloc(%zu)", len); 2580daf62d9SStanislav Sedov goto fail; 2590daf62d9SStanislav Sedov } 2600daf62d9SStanislav Sedov error = sysctl(name, 4, p, &len, NULL, 0); 2610daf62d9SStanislav Sedov if (error < 0 && errno != EPERM) { 2620daf62d9SStanislav Sedov warn("sysctl(kern.proc)"); 2630daf62d9SStanislav Sedov goto fail; 2640daf62d9SStanislav Sedov } 2650daf62d9SStanislav Sedov /* Perform simple consistency checks. */ 2660daf62d9SStanislav Sedov if ((len % sizeof(*p)) != 0 || p->ki_structsize != sizeof(*p)) { 2677153ad2bSMikolaj Golub warnx("kinfo_proc structure size mismatch (len = %zu)", len); 2687153ad2bSMikolaj Golub goto fail; 2697153ad2bSMikolaj Golub } 2707153ad2bSMikolaj Golub *count = len / sizeof(*p); 2717153ad2bSMikolaj Golub return (p); 2727153ad2bSMikolaj Golub } else if (procstat->type == PROCSTAT_CORE) { 2737153ad2bSMikolaj Golub p = procstat_core_get(procstat->core, PSC_TYPE_PROC, NULL, 2747153ad2bSMikolaj Golub &len); 2757153ad2bSMikolaj Golub if ((len % sizeof(*p)) != 0 || p->ki_structsize != sizeof(*p)) { 2760daf62d9SStanislav Sedov warnx("kinfo_proc structure size mismatch"); 2770daf62d9SStanislav Sedov goto fail; 2780daf62d9SStanislav Sedov } 2790daf62d9SStanislav Sedov *count = len / sizeof(*p); 2800daf62d9SStanislav Sedov return (p); 2810daf62d9SStanislav Sedov } else { 28280905c35SJilles Tjoelker warnx("unknown access method: %d", procstat->type); 2830daf62d9SStanislav Sedov return (NULL); 2840daf62d9SStanislav Sedov } 2850daf62d9SStanislav Sedov fail: 2860daf62d9SStanislav Sedov if (p) 2870daf62d9SStanislav Sedov free(p); 2880daf62d9SStanislav Sedov return (NULL); 2890daf62d9SStanislav Sedov } 2900daf62d9SStanislav Sedov 2910daf62d9SStanislav Sedov void 2920daf62d9SStanislav Sedov procstat_freeprocs(struct procstat *procstat __unused, struct kinfo_proc *p) 2930daf62d9SStanislav Sedov { 2940daf62d9SStanislav Sedov 2950daf62d9SStanislav Sedov if (p != NULL) 2960daf62d9SStanislav Sedov free(p); 2970daf62d9SStanislav Sedov p = NULL; 2980daf62d9SStanislav Sedov } 2990daf62d9SStanislav Sedov 3000daf62d9SStanislav Sedov struct filestat_list * 3010daf62d9SStanislav Sedov procstat_getfiles(struct procstat *procstat, struct kinfo_proc *kp, int mmapped) 3020daf62d9SStanislav Sedov { 3030daf62d9SStanislav Sedov 3047153ad2bSMikolaj Golub switch(procstat->type) { 3057153ad2bSMikolaj Golub case PROCSTAT_KVM: 3060daf62d9SStanislav Sedov return (procstat_getfiles_kvm(procstat, kp, mmapped)); 3077153ad2bSMikolaj Golub case PROCSTAT_SYSCTL: 3087153ad2bSMikolaj Golub case PROCSTAT_CORE: 3097153ad2bSMikolaj Golub return (procstat_getfiles_sysctl(procstat, kp, mmapped)); 3107153ad2bSMikolaj Golub default: 3117153ad2bSMikolaj Golub warnx("unknown access method: %d", procstat->type); 3120daf62d9SStanislav Sedov return (NULL); 3130daf62d9SStanislav Sedov } 3147153ad2bSMikolaj Golub } 3150daf62d9SStanislav Sedov 3160daf62d9SStanislav Sedov void 3170daf62d9SStanislav Sedov procstat_freefiles(struct procstat *procstat, struct filestat_list *head) 3180daf62d9SStanislav Sedov { 3190daf62d9SStanislav Sedov struct filestat *fst, *tmp; 3200daf62d9SStanislav Sedov 3210daf62d9SStanislav Sedov STAILQ_FOREACH_SAFE(fst, head, next, tmp) { 3220daf62d9SStanislav Sedov if (fst->fs_path != NULL) 3230daf62d9SStanislav Sedov free(fst->fs_path); 3240daf62d9SStanislav Sedov free(fst); 3250daf62d9SStanislav Sedov } 3260daf62d9SStanislav Sedov free(head); 3270daf62d9SStanislav Sedov if (procstat->vmentries != NULL) { 3280daf62d9SStanislav Sedov free(procstat->vmentries); 3290daf62d9SStanislav Sedov procstat->vmentries = NULL; 3300daf62d9SStanislav Sedov } 3310daf62d9SStanislav Sedov if (procstat->files != NULL) { 3320daf62d9SStanislav Sedov free(procstat->files); 3330daf62d9SStanislav Sedov procstat->files = NULL; 3340daf62d9SStanislav Sedov } 3350daf62d9SStanislav Sedov } 3360daf62d9SStanislav Sedov 3370daf62d9SStanislav Sedov static struct filestat * 3380daf62d9SStanislav Sedov filestat_new_entry(void *typedep, int type, int fd, int fflags, int uflags, 339d57486e2SRobert Watson int refcount, off_t offset, char *path, cap_rights_t cap_rights) 3400daf62d9SStanislav Sedov { 3410daf62d9SStanislav Sedov struct filestat *entry; 3420daf62d9SStanislav Sedov 3430daf62d9SStanislav Sedov entry = calloc(1, sizeof(*entry)); 3440daf62d9SStanislav Sedov if (entry == NULL) { 3450daf62d9SStanislav Sedov warn("malloc()"); 3460daf62d9SStanislav Sedov return (NULL); 3470daf62d9SStanislav Sedov } 3480daf62d9SStanislav Sedov entry->fs_typedep = typedep; 3490daf62d9SStanislav Sedov entry->fs_fflags = fflags; 3500daf62d9SStanislav Sedov entry->fs_uflags = uflags; 3510daf62d9SStanislav Sedov entry->fs_fd = fd; 3520daf62d9SStanislav Sedov entry->fs_type = type; 3530daf62d9SStanislav Sedov entry->fs_ref_count = refcount; 3540daf62d9SStanislav Sedov entry->fs_offset = offset; 3550daf62d9SStanislav Sedov entry->fs_path = path; 356d57486e2SRobert Watson entry->fs_cap_rights = cap_rights; 3570daf62d9SStanislav Sedov return (entry); 3580daf62d9SStanislav Sedov } 3590daf62d9SStanislav Sedov 3600daf62d9SStanislav Sedov static struct vnode * 3610daf62d9SStanislav Sedov getctty(kvm_t *kd, struct kinfo_proc *kp) 3620daf62d9SStanislav Sedov { 3630daf62d9SStanislav Sedov struct pgrp pgrp; 3640daf62d9SStanislav Sedov struct proc proc; 3650daf62d9SStanislav Sedov struct session sess; 3660daf62d9SStanislav Sedov int error; 3670daf62d9SStanislav Sedov 3680daf62d9SStanislav Sedov assert(kp); 3690daf62d9SStanislav Sedov error = kvm_read_all(kd, (unsigned long)kp->ki_paddr, &proc, 3700daf62d9SStanislav Sedov sizeof(proc)); 3710daf62d9SStanislav Sedov if (error == 0) { 3720daf62d9SStanislav Sedov warnx("can't read proc struct at %p for pid %d", 3730daf62d9SStanislav Sedov kp->ki_paddr, kp->ki_pid); 3740daf62d9SStanislav Sedov return (NULL); 3750daf62d9SStanislav Sedov } 3760daf62d9SStanislav Sedov if (proc.p_pgrp == NULL) 3770daf62d9SStanislav Sedov return (NULL); 3780daf62d9SStanislav Sedov error = kvm_read_all(kd, (unsigned long)proc.p_pgrp, &pgrp, 3790daf62d9SStanislav Sedov sizeof(pgrp)); 3800daf62d9SStanislav Sedov if (error == 0) { 3810daf62d9SStanislav Sedov warnx("can't read pgrp struct at %p for pid %d", 3820daf62d9SStanislav Sedov proc.p_pgrp, kp->ki_pid); 3830daf62d9SStanislav Sedov return (NULL); 3840daf62d9SStanislav Sedov } 3850daf62d9SStanislav Sedov error = kvm_read_all(kd, (unsigned long)pgrp.pg_session, &sess, 3860daf62d9SStanislav Sedov sizeof(sess)); 3870daf62d9SStanislav Sedov if (error == 0) { 3880daf62d9SStanislav Sedov warnx("can't read session struct at %p for pid %d", 3890daf62d9SStanislav Sedov pgrp.pg_session, kp->ki_pid); 3900daf62d9SStanislav Sedov return (NULL); 3910daf62d9SStanislav Sedov } 3920daf62d9SStanislav Sedov return (sess.s_ttyvp); 3930daf62d9SStanislav Sedov } 3940daf62d9SStanislav Sedov 3950daf62d9SStanislav Sedov static struct filestat_list * 3960daf62d9SStanislav Sedov procstat_getfiles_kvm(struct procstat *procstat, struct kinfo_proc *kp, int mmapped) 3970daf62d9SStanislav Sedov { 3980daf62d9SStanislav Sedov struct file file; 3990daf62d9SStanislav Sedov struct filedesc filed; 4000daf62d9SStanislav Sedov struct vm_map_entry vmentry; 4010daf62d9SStanislav Sedov struct vm_object object; 4020daf62d9SStanislav Sedov struct vmspace vmspace; 4030daf62d9SStanislav Sedov vm_map_entry_t entryp; 4040daf62d9SStanislav Sedov vm_map_t map; 4050daf62d9SStanislav Sedov vm_object_t objp; 4060daf62d9SStanislav Sedov struct vnode *vp; 4070daf62d9SStanislav Sedov struct file **ofiles; 4080daf62d9SStanislav Sedov struct filestat *entry; 4090daf62d9SStanislav Sedov struct filestat_list *head; 4100daf62d9SStanislav Sedov kvm_t *kd; 4110daf62d9SStanislav Sedov void *data; 4120daf62d9SStanislav Sedov int i, fflags; 4130daf62d9SStanislav Sedov int prot, type; 4140daf62d9SStanislav Sedov unsigned int nfiles; 4150daf62d9SStanislav Sedov 4160daf62d9SStanislav Sedov assert(procstat); 4170daf62d9SStanislav Sedov kd = procstat->kd; 4180daf62d9SStanislav Sedov if (kd == NULL) 4190daf62d9SStanislav Sedov return (NULL); 4200daf62d9SStanislav Sedov if (kp->ki_fd == NULL) 4210daf62d9SStanislav Sedov return (NULL); 4220daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)kp->ki_fd, &filed, 4230daf62d9SStanislav Sedov sizeof(filed))) { 4240daf62d9SStanislav Sedov warnx("can't read filedesc at %p", (void *)kp->ki_fd); 4250daf62d9SStanislav Sedov return (NULL); 4260daf62d9SStanislav Sedov } 4270daf62d9SStanislav Sedov 4280daf62d9SStanislav Sedov /* 4290daf62d9SStanislav Sedov * Allocate list head. 4300daf62d9SStanislav Sedov */ 4310daf62d9SStanislav Sedov head = malloc(sizeof(*head)); 4320daf62d9SStanislav Sedov if (head == NULL) 4330daf62d9SStanislav Sedov return (NULL); 4340daf62d9SStanislav Sedov STAILQ_INIT(head); 4350daf62d9SStanislav Sedov 4360daf62d9SStanislav Sedov /* root directory vnode, if one. */ 4370daf62d9SStanislav Sedov if (filed.fd_rdir) { 4380daf62d9SStanislav Sedov entry = filestat_new_entry(filed.fd_rdir, PS_FST_TYPE_VNODE, -1, 439d57486e2SRobert Watson PS_FST_FFLAG_READ, PS_FST_UFLAG_RDIR, 0, 0, NULL, 0); 4400daf62d9SStanislav Sedov if (entry != NULL) 4410daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 4420daf62d9SStanislav Sedov } 4430daf62d9SStanislav Sedov /* current working directory vnode. */ 4440daf62d9SStanislav Sedov if (filed.fd_cdir) { 4450daf62d9SStanislav Sedov entry = filestat_new_entry(filed.fd_cdir, PS_FST_TYPE_VNODE, -1, 446d57486e2SRobert Watson PS_FST_FFLAG_READ, PS_FST_UFLAG_CDIR, 0, 0, NULL, 0); 4470daf62d9SStanislav Sedov if (entry != NULL) 4480daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 4490daf62d9SStanislav Sedov } 4500daf62d9SStanislav Sedov /* jail root, if any. */ 4510daf62d9SStanislav Sedov if (filed.fd_jdir) { 4520daf62d9SStanislav Sedov entry = filestat_new_entry(filed.fd_jdir, PS_FST_TYPE_VNODE, -1, 453d57486e2SRobert Watson PS_FST_FFLAG_READ, PS_FST_UFLAG_JAIL, 0, 0, NULL, 0); 4540daf62d9SStanislav Sedov if (entry != NULL) 4550daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 4560daf62d9SStanislav Sedov } 4570daf62d9SStanislav Sedov /* ktrace vnode, if one */ 4580daf62d9SStanislav Sedov if (kp->ki_tracep) { 4590daf62d9SStanislav Sedov entry = filestat_new_entry(kp->ki_tracep, PS_FST_TYPE_VNODE, -1, 4600daf62d9SStanislav Sedov PS_FST_FFLAG_READ | PS_FST_FFLAG_WRITE, 461d57486e2SRobert Watson PS_FST_UFLAG_TRACE, 0, 0, NULL, 0); 4620daf62d9SStanislav Sedov if (entry != NULL) 4630daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 4640daf62d9SStanislav Sedov } 4650daf62d9SStanislav Sedov /* text vnode, if one */ 4660daf62d9SStanislav Sedov if (kp->ki_textvp) { 4670daf62d9SStanislav Sedov entry = filestat_new_entry(kp->ki_textvp, PS_FST_TYPE_VNODE, -1, 468d57486e2SRobert Watson PS_FST_FFLAG_READ, PS_FST_UFLAG_TEXT, 0, 0, NULL, 0); 4690daf62d9SStanislav Sedov if (entry != NULL) 4700daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 4710daf62d9SStanislav Sedov } 4720daf62d9SStanislav Sedov /* Controlling terminal. */ 4730daf62d9SStanislav Sedov if ((vp = getctty(kd, kp)) != NULL) { 4740daf62d9SStanislav Sedov entry = filestat_new_entry(vp, PS_FST_TYPE_VNODE, -1, 4750daf62d9SStanislav Sedov PS_FST_FFLAG_READ | PS_FST_FFLAG_WRITE, 476d57486e2SRobert Watson PS_FST_UFLAG_CTTY, 0, 0, NULL, 0); 4770daf62d9SStanislav Sedov if (entry != NULL) 4780daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 4790daf62d9SStanislav Sedov } 4800daf62d9SStanislav Sedov 4810daf62d9SStanislav Sedov nfiles = filed.fd_lastfile + 1; 4820daf62d9SStanislav Sedov ofiles = malloc(nfiles * sizeof(struct file *)); 4830daf62d9SStanislav Sedov if (ofiles == NULL) { 48465869214SJilles Tjoelker warn("malloc(%zu)", nfiles * sizeof(struct file *)); 4850daf62d9SStanislav Sedov goto do_mmapped; 4860daf62d9SStanislav Sedov } 4870daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)filed.fd_ofiles, ofiles, 4880daf62d9SStanislav Sedov nfiles * sizeof(struct file *))) { 4890daf62d9SStanislav Sedov warnx("cannot read file structures at %p", 4900daf62d9SStanislav Sedov (void *)filed.fd_ofiles); 4910daf62d9SStanislav Sedov free(ofiles); 4920daf62d9SStanislav Sedov goto do_mmapped; 4930daf62d9SStanislav Sedov } 4940daf62d9SStanislav Sedov for (i = 0; i <= filed.fd_lastfile; i++) { 4950daf62d9SStanislav Sedov if (ofiles[i] == NULL) 4960daf62d9SStanislav Sedov continue; 4970daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)ofiles[i], &file, 4980daf62d9SStanislav Sedov sizeof(struct file))) { 4990daf62d9SStanislav Sedov warnx("can't read file %d at %p", i, 5000daf62d9SStanislav Sedov (void *)ofiles[i]); 5010daf62d9SStanislav Sedov continue; 5020daf62d9SStanislav Sedov } 5030daf62d9SStanislav Sedov switch (file.f_type) { 5040daf62d9SStanislav Sedov case DTYPE_VNODE: 5050daf62d9SStanislav Sedov type = PS_FST_TYPE_VNODE; 5060daf62d9SStanislav Sedov data = file.f_vnode; 5070daf62d9SStanislav Sedov break; 5080daf62d9SStanislav Sedov case DTYPE_SOCKET: 5090daf62d9SStanislav Sedov type = PS_FST_TYPE_SOCKET; 5100daf62d9SStanislav Sedov data = file.f_data; 5110daf62d9SStanislav Sedov break; 5120daf62d9SStanislav Sedov case DTYPE_PIPE: 5130daf62d9SStanislav Sedov type = PS_FST_TYPE_PIPE; 5140daf62d9SStanislav Sedov data = file.f_data; 5150daf62d9SStanislav Sedov break; 5160daf62d9SStanislav Sedov case DTYPE_FIFO: 5170daf62d9SStanislav Sedov type = PS_FST_TYPE_FIFO; 5180daf62d9SStanislav Sedov data = file.f_vnode; 5190daf62d9SStanislav Sedov break; 5200daf62d9SStanislav Sedov #ifdef DTYPE_PTS 5210daf62d9SStanislav Sedov case DTYPE_PTS: 5220daf62d9SStanislav Sedov type = PS_FST_TYPE_PTS; 5230daf62d9SStanislav Sedov data = file.f_data; 5240daf62d9SStanislav Sedov break; 5250daf62d9SStanislav Sedov #endif 526e506e182SJohn Baldwin case DTYPE_SHM: 527e506e182SJohn Baldwin type = PS_FST_TYPE_SHM; 528e506e182SJohn Baldwin data = file.f_data; 529e506e182SJohn Baldwin break; 5300daf62d9SStanislav Sedov default: 5310daf62d9SStanislav Sedov continue; 5320daf62d9SStanislav Sedov } 533d57486e2SRobert Watson /* XXXRW: No capability rights support for kvm yet. */ 5340daf62d9SStanislav Sedov entry = filestat_new_entry(data, type, i, 535d57486e2SRobert Watson to_filestat_flags(file.f_flag), 0, 0, 0, NULL, 0); 5360daf62d9SStanislav Sedov if (entry != NULL) 5370daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 5380daf62d9SStanislav Sedov } 5390daf62d9SStanislav Sedov free(ofiles); 5400daf62d9SStanislav Sedov 5410daf62d9SStanislav Sedov do_mmapped: 5420daf62d9SStanislav Sedov 5430daf62d9SStanislav Sedov /* 5440daf62d9SStanislav Sedov * Process mmapped files if requested. 5450daf62d9SStanislav Sedov */ 5460daf62d9SStanislav Sedov if (mmapped) { 5470daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)kp->ki_vmspace, &vmspace, 5480daf62d9SStanislav Sedov sizeof(vmspace))) { 5490daf62d9SStanislav Sedov warnx("can't read vmspace at %p", 5500daf62d9SStanislav Sedov (void *)kp->ki_vmspace); 5510daf62d9SStanislav Sedov goto exit; 5520daf62d9SStanislav Sedov } 5530daf62d9SStanislav Sedov map = &vmspace.vm_map; 5540daf62d9SStanislav Sedov 5550daf62d9SStanislav Sedov for (entryp = map->header.next; 5560daf62d9SStanislav Sedov entryp != &kp->ki_vmspace->vm_map.header; 5570daf62d9SStanislav Sedov entryp = vmentry.next) { 5580daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)entryp, &vmentry, 5590daf62d9SStanislav Sedov sizeof(vmentry))) { 5600daf62d9SStanislav Sedov warnx("can't read vm_map_entry at %p", 5610daf62d9SStanislav Sedov (void *)entryp); 5620daf62d9SStanislav Sedov continue; 5630daf62d9SStanislav Sedov } 5640daf62d9SStanislav Sedov if (vmentry.eflags & MAP_ENTRY_IS_SUB_MAP) 5650daf62d9SStanislav Sedov continue; 5660daf62d9SStanislav Sedov if ((objp = vmentry.object.vm_object) == NULL) 5670daf62d9SStanislav Sedov continue; 5680daf62d9SStanislav Sedov for (; objp; objp = object.backing_object) { 5690daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)objp, 5700daf62d9SStanislav Sedov &object, sizeof(object))) { 5710daf62d9SStanislav Sedov warnx("can't read vm_object at %p", 5720daf62d9SStanislav Sedov (void *)objp); 5730daf62d9SStanislav Sedov break; 5740daf62d9SStanislav Sedov } 5750daf62d9SStanislav Sedov } 5760daf62d9SStanislav Sedov 5770daf62d9SStanislav Sedov /* We want only vnode objects. */ 5780daf62d9SStanislav Sedov if (object.type != OBJT_VNODE) 5790daf62d9SStanislav Sedov continue; 5800daf62d9SStanislav Sedov 5810daf62d9SStanislav Sedov prot = vmentry.protection; 5820daf62d9SStanislav Sedov fflags = 0; 5830daf62d9SStanislav Sedov if (prot & VM_PROT_READ) 5840daf62d9SStanislav Sedov fflags = PS_FST_FFLAG_READ; 585279a233dSJilles Tjoelker if ((vmentry.eflags & MAP_ENTRY_COW) == 0 && 586279a233dSJilles Tjoelker prot & VM_PROT_WRITE) 5870daf62d9SStanislav Sedov fflags |= PS_FST_FFLAG_WRITE; 5880daf62d9SStanislav Sedov 5890daf62d9SStanislav Sedov /* 5900daf62d9SStanislav Sedov * Create filestat entry. 5910daf62d9SStanislav Sedov */ 5920daf62d9SStanislav Sedov entry = filestat_new_entry(object.handle, 5930daf62d9SStanislav Sedov PS_FST_TYPE_VNODE, -1, fflags, 594d57486e2SRobert Watson PS_FST_UFLAG_MMAP, 0, 0, NULL, 0); 5950daf62d9SStanislav Sedov if (entry != NULL) 5960daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 5970daf62d9SStanislav Sedov } 5980daf62d9SStanislav Sedov } 5990daf62d9SStanislav Sedov exit: 6000daf62d9SStanislav Sedov return (head); 6010daf62d9SStanislav Sedov } 6020daf62d9SStanislav Sedov 6030daf62d9SStanislav Sedov /* 6040daf62d9SStanislav Sedov * kinfo types to filestat translation. 6050daf62d9SStanislav Sedov */ 6060daf62d9SStanislav Sedov static int 6070daf62d9SStanislav Sedov kinfo_type2fst(int kftype) 6080daf62d9SStanislav Sedov { 6090daf62d9SStanislav Sedov static struct { 6100daf62d9SStanislav Sedov int kf_type; 6110daf62d9SStanislav Sedov int fst_type; 6120daf62d9SStanislav Sedov } kftypes2fst[] = { 6130daf62d9SStanislav Sedov { KF_TYPE_CRYPTO, PS_FST_TYPE_CRYPTO }, 6140daf62d9SStanislav Sedov { KF_TYPE_FIFO, PS_FST_TYPE_FIFO }, 6150daf62d9SStanislav Sedov { KF_TYPE_KQUEUE, PS_FST_TYPE_KQUEUE }, 6160daf62d9SStanislav Sedov { KF_TYPE_MQUEUE, PS_FST_TYPE_MQUEUE }, 6170daf62d9SStanislav Sedov { KF_TYPE_NONE, PS_FST_TYPE_NONE }, 6180daf62d9SStanislav Sedov { KF_TYPE_PIPE, PS_FST_TYPE_PIPE }, 6190daf62d9SStanislav Sedov { KF_TYPE_PTS, PS_FST_TYPE_PTS }, 6200daf62d9SStanislav Sedov { KF_TYPE_SEM, PS_FST_TYPE_SEM }, 6210daf62d9SStanislav Sedov { KF_TYPE_SHM, PS_FST_TYPE_SHM }, 6220daf62d9SStanislav Sedov { KF_TYPE_SOCKET, PS_FST_TYPE_SOCKET }, 6230daf62d9SStanislav Sedov { KF_TYPE_VNODE, PS_FST_TYPE_VNODE }, 6240daf62d9SStanislav Sedov { KF_TYPE_UNKNOWN, PS_FST_TYPE_UNKNOWN } 6250daf62d9SStanislav Sedov }; 6260daf62d9SStanislav Sedov #define NKFTYPES (sizeof(kftypes2fst) / sizeof(*kftypes2fst)) 6270daf62d9SStanislav Sedov unsigned int i; 6280daf62d9SStanislav Sedov 6290daf62d9SStanislav Sedov for (i = 0; i < NKFTYPES; i++) 6300daf62d9SStanislav Sedov if (kftypes2fst[i].kf_type == kftype) 6310daf62d9SStanislav Sedov break; 6320daf62d9SStanislav Sedov if (i == NKFTYPES) 6330daf62d9SStanislav Sedov return (PS_FST_TYPE_UNKNOWN); 6340daf62d9SStanislav Sedov return (kftypes2fst[i].fst_type); 6350daf62d9SStanislav Sedov } 6360daf62d9SStanislav Sedov 6370daf62d9SStanislav Sedov /* 6380daf62d9SStanislav Sedov * kinfo flags to filestat translation. 6390daf62d9SStanislav Sedov */ 6400daf62d9SStanislav Sedov static int 6410daf62d9SStanislav Sedov kinfo_fflags2fst(int kfflags) 6420daf62d9SStanislav Sedov { 6430daf62d9SStanislav Sedov static struct { 6440daf62d9SStanislav Sedov int kf_flag; 6450daf62d9SStanislav Sedov int fst_flag; 6460daf62d9SStanislav Sedov } kfflags2fst[] = { 6470daf62d9SStanislav Sedov { KF_FLAG_APPEND, PS_FST_FFLAG_APPEND }, 6480daf62d9SStanislav Sedov { KF_FLAG_ASYNC, PS_FST_FFLAG_ASYNC }, 6490daf62d9SStanislav Sedov { KF_FLAG_CREAT, PS_FST_FFLAG_CREAT }, 6500daf62d9SStanislav Sedov { KF_FLAG_DIRECT, PS_FST_FFLAG_DIRECT }, 6510daf62d9SStanislav Sedov { KF_FLAG_EXCL, PS_FST_FFLAG_EXCL }, 6520daf62d9SStanislav Sedov { KF_FLAG_EXEC, PS_FST_FFLAG_EXEC }, 6530daf62d9SStanislav Sedov { KF_FLAG_EXLOCK, PS_FST_FFLAG_EXLOCK }, 6540daf62d9SStanislav Sedov { KF_FLAG_FSYNC, PS_FST_FFLAG_SYNC }, 6550daf62d9SStanislav Sedov { KF_FLAG_HASLOCK, PS_FST_FFLAG_HASLOCK }, 6560daf62d9SStanislav Sedov { KF_FLAG_NOFOLLOW, PS_FST_FFLAG_NOFOLLOW }, 6570daf62d9SStanislav Sedov { KF_FLAG_NONBLOCK, PS_FST_FFLAG_NONBLOCK }, 6580daf62d9SStanislav Sedov { KF_FLAG_READ, PS_FST_FFLAG_READ }, 6590daf62d9SStanislav Sedov { KF_FLAG_SHLOCK, PS_FST_FFLAG_SHLOCK }, 6600daf62d9SStanislav Sedov { KF_FLAG_TRUNC, PS_FST_FFLAG_TRUNC }, 6610daf62d9SStanislav Sedov { KF_FLAG_WRITE, PS_FST_FFLAG_WRITE } 6620daf62d9SStanislav Sedov }; 6630daf62d9SStanislav Sedov #define NKFFLAGS (sizeof(kfflags2fst) / sizeof(*kfflags2fst)) 6640daf62d9SStanislav Sedov unsigned int i; 6650daf62d9SStanislav Sedov int flags; 6660daf62d9SStanislav Sedov 6670daf62d9SStanislav Sedov flags = 0; 6680daf62d9SStanislav Sedov for (i = 0; i < NKFFLAGS; i++) 6690daf62d9SStanislav Sedov if ((kfflags & kfflags2fst[i].kf_flag) != 0) 6700daf62d9SStanislav Sedov flags |= kfflags2fst[i].fst_flag; 6710daf62d9SStanislav Sedov return (flags); 6720daf62d9SStanislav Sedov } 6730daf62d9SStanislav Sedov 6740daf62d9SStanislav Sedov static int 6750daf62d9SStanislav Sedov kinfo_uflags2fst(int fd) 6760daf62d9SStanislav Sedov { 6770daf62d9SStanislav Sedov 6780daf62d9SStanislav Sedov switch (fd) { 6790daf62d9SStanislav Sedov case KF_FD_TYPE_CTTY: 6800daf62d9SStanislav Sedov return (PS_FST_UFLAG_CTTY); 6810daf62d9SStanislav Sedov case KF_FD_TYPE_CWD: 6820daf62d9SStanislav Sedov return (PS_FST_UFLAG_CDIR); 6830daf62d9SStanislav Sedov case KF_FD_TYPE_JAIL: 6840daf62d9SStanislav Sedov return (PS_FST_UFLAG_JAIL); 6850daf62d9SStanislav Sedov case KF_FD_TYPE_TEXT: 6860daf62d9SStanislav Sedov return (PS_FST_UFLAG_TEXT); 6870daf62d9SStanislav Sedov case KF_FD_TYPE_TRACE: 6880daf62d9SStanislav Sedov return (PS_FST_UFLAG_TRACE); 6890daf62d9SStanislav Sedov case KF_FD_TYPE_ROOT: 6900daf62d9SStanislav Sedov return (PS_FST_UFLAG_RDIR); 6910daf62d9SStanislav Sedov } 6920daf62d9SStanislav Sedov return (0); 6930daf62d9SStanislav Sedov } 6940daf62d9SStanislav Sedov 6957153ad2bSMikolaj Golub static struct kinfo_file * 6967153ad2bSMikolaj Golub kinfo_getfile_core(struct procstat_core *core, int *cntp) 6977153ad2bSMikolaj Golub { 6987153ad2bSMikolaj Golub int cnt; 6997153ad2bSMikolaj Golub size_t len; 7007153ad2bSMikolaj Golub char *buf, *bp, *eb; 7017153ad2bSMikolaj Golub struct kinfo_file *kif, *kp, *kf; 7027153ad2bSMikolaj Golub 7037153ad2bSMikolaj Golub buf = procstat_core_get(core, PSC_TYPE_FILES, NULL, &len); 7047153ad2bSMikolaj Golub if (buf == NULL) 7057153ad2bSMikolaj Golub return (NULL); 7067153ad2bSMikolaj Golub /* 7077153ad2bSMikolaj Golub * XXXMG: The code below is just copy&past from libutil. 7087153ad2bSMikolaj Golub * The code duplication can be avoided if libutil 7097153ad2bSMikolaj Golub * is extended to provide something like: 7107153ad2bSMikolaj Golub * struct kinfo_file *kinfo_getfile_from_buf(const char *buf, 7117153ad2bSMikolaj Golub * size_t len, int *cntp); 7127153ad2bSMikolaj Golub */ 7137153ad2bSMikolaj Golub 7147153ad2bSMikolaj Golub /* Pass 1: count items */ 7157153ad2bSMikolaj Golub cnt = 0; 7167153ad2bSMikolaj Golub bp = buf; 7177153ad2bSMikolaj Golub eb = buf + len; 7187153ad2bSMikolaj Golub while (bp < eb) { 7197153ad2bSMikolaj Golub kf = (struct kinfo_file *)(uintptr_t)bp; 7207153ad2bSMikolaj Golub bp += kf->kf_structsize; 7217153ad2bSMikolaj Golub cnt++; 7227153ad2bSMikolaj Golub } 7237153ad2bSMikolaj Golub 7247153ad2bSMikolaj Golub kif = calloc(cnt, sizeof(*kif)); 7257153ad2bSMikolaj Golub if (kif == NULL) { 7267153ad2bSMikolaj Golub free(buf); 7277153ad2bSMikolaj Golub return (NULL); 7287153ad2bSMikolaj Golub } 7297153ad2bSMikolaj Golub bp = buf; 7307153ad2bSMikolaj Golub eb = buf + len; 7317153ad2bSMikolaj Golub kp = kif; 7327153ad2bSMikolaj Golub /* Pass 2: unpack */ 7337153ad2bSMikolaj Golub while (bp < eb) { 7347153ad2bSMikolaj Golub kf = (struct kinfo_file *)(uintptr_t)bp; 7357153ad2bSMikolaj Golub /* Copy/expand into pre-zeroed buffer */ 7367153ad2bSMikolaj Golub memcpy(kp, kf, kf->kf_structsize); 7377153ad2bSMikolaj Golub /* Advance to next packed record */ 7387153ad2bSMikolaj Golub bp += kf->kf_structsize; 7397153ad2bSMikolaj Golub /* Set field size to fixed length, advance */ 7407153ad2bSMikolaj Golub kp->kf_structsize = sizeof(*kp); 7417153ad2bSMikolaj Golub kp++; 7427153ad2bSMikolaj Golub } 7437153ad2bSMikolaj Golub free(buf); 7447153ad2bSMikolaj Golub *cntp = cnt; 7457153ad2bSMikolaj Golub return (kif); /* Caller must free() return value */ 7467153ad2bSMikolaj Golub } 7477153ad2bSMikolaj Golub 7480daf62d9SStanislav Sedov static struct filestat_list * 7497153ad2bSMikolaj Golub procstat_getfiles_sysctl(struct procstat *procstat, struct kinfo_proc *kp, 7507153ad2bSMikolaj Golub int mmapped) 7510daf62d9SStanislav Sedov { 7520daf62d9SStanislav Sedov struct kinfo_file *kif, *files; 7530daf62d9SStanislav Sedov struct kinfo_vmentry *kve, *vmentries; 7540daf62d9SStanislav Sedov struct filestat_list *head; 7550daf62d9SStanislav Sedov struct filestat *entry; 7560daf62d9SStanislav Sedov char *path; 7570daf62d9SStanislav Sedov off_t offset; 7580daf62d9SStanislav Sedov int cnt, fd, fflags; 7590daf62d9SStanislav Sedov int i, type, uflags; 7600daf62d9SStanislav Sedov int refcount; 761d57486e2SRobert Watson cap_rights_t cap_rights; 7620daf62d9SStanislav Sedov 7630daf62d9SStanislav Sedov assert(kp); 7640daf62d9SStanislav Sedov if (kp->ki_fd == NULL) 7650daf62d9SStanislav Sedov return (NULL); 7667153ad2bSMikolaj Golub switch(procstat->type) { 7677153ad2bSMikolaj Golub case PROCSTAT_SYSCTL: 7680daf62d9SStanislav Sedov files = kinfo_getfile(kp->ki_pid, &cnt); 7697153ad2bSMikolaj Golub break; 7707153ad2bSMikolaj Golub case PROCSTAT_CORE: 7717153ad2bSMikolaj Golub files = kinfo_getfile_core(procstat->core, &cnt); 7727153ad2bSMikolaj Golub break; 7737153ad2bSMikolaj Golub default: 7747153ad2bSMikolaj Golub assert(!"invalid type"); 7757153ad2bSMikolaj Golub } 7760daf62d9SStanislav Sedov if (files == NULL && errno != EPERM) { 7770daf62d9SStanislav Sedov warn("kinfo_getfile()"); 7780daf62d9SStanislav Sedov return (NULL); 7790daf62d9SStanislav Sedov } 7800daf62d9SStanislav Sedov procstat->files = files; 7810daf62d9SStanislav Sedov 7820daf62d9SStanislav Sedov /* 7830daf62d9SStanislav Sedov * Allocate list head. 7840daf62d9SStanislav Sedov */ 7850daf62d9SStanislav Sedov head = malloc(sizeof(*head)); 7860daf62d9SStanislav Sedov if (head == NULL) 7870daf62d9SStanislav Sedov return (NULL); 7880daf62d9SStanislav Sedov STAILQ_INIT(head); 7890daf62d9SStanislav Sedov for (i = 0; i < cnt; i++) { 7900daf62d9SStanislav Sedov kif = &files[i]; 7910daf62d9SStanislav Sedov 7920daf62d9SStanislav Sedov type = kinfo_type2fst(kif->kf_type); 7930daf62d9SStanislav Sedov fd = kif->kf_fd >= 0 ? kif->kf_fd : -1; 7940daf62d9SStanislav Sedov fflags = kinfo_fflags2fst(kif->kf_flags); 7950daf62d9SStanislav Sedov uflags = kinfo_uflags2fst(kif->kf_fd); 7960daf62d9SStanislav Sedov refcount = kif->kf_ref_count; 7970daf62d9SStanislav Sedov offset = kif->kf_offset; 7980daf62d9SStanislav Sedov if (*kif->kf_path != '\0') 7990daf62d9SStanislav Sedov path = strdup(kif->kf_path); 8000daf62d9SStanislav Sedov else 8010daf62d9SStanislav Sedov path = NULL; 802d57486e2SRobert Watson cap_rights = kif->kf_cap_rights; 8030daf62d9SStanislav Sedov 8040daf62d9SStanislav Sedov /* 8050daf62d9SStanislav Sedov * Create filestat entry. 8060daf62d9SStanislav Sedov */ 8070daf62d9SStanislav Sedov entry = filestat_new_entry(kif, type, fd, fflags, uflags, 808d57486e2SRobert Watson refcount, offset, path, cap_rights); 8090daf62d9SStanislav Sedov if (entry != NULL) 8100daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 8110daf62d9SStanislav Sedov } 8120daf62d9SStanislav Sedov if (mmapped != 0) { 81339680c7bSMikolaj Golub vmentries = procstat_getvmmap(procstat, kp, &cnt); 8140daf62d9SStanislav Sedov procstat->vmentries = vmentries; 8150daf62d9SStanislav Sedov if (vmentries == NULL || cnt == 0) 8160daf62d9SStanislav Sedov goto fail; 8170daf62d9SStanislav Sedov for (i = 0; i < cnt; i++) { 8180daf62d9SStanislav Sedov kve = &vmentries[i]; 8190daf62d9SStanislav Sedov if (kve->kve_type != KVME_TYPE_VNODE) 8200daf62d9SStanislav Sedov continue; 8210daf62d9SStanislav Sedov fflags = 0; 8220daf62d9SStanislav Sedov if (kve->kve_protection & KVME_PROT_READ) 8230daf62d9SStanislav Sedov fflags = PS_FST_FFLAG_READ; 824279a233dSJilles Tjoelker if ((kve->kve_flags & KVME_FLAG_COW) == 0 && 825279a233dSJilles Tjoelker kve->kve_protection & KVME_PROT_WRITE) 8260daf62d9SStanislav Sedov fflags |= PS_FST_FFLAG_WRITE; 8270daf62d9SStanislav Sedov offset = kve->kve_offset; 8280daf62d9SStanislav Sedov refcount = kve->kve_ref_count; 8290daf62d9SStanislav Sedov if (*kve->kve_path != '\0') 8300daf62d9SStanislav Sedov path = strdup(kve->kve_path); 8310daf62d9SStanislav Sedov else 8320daf62d9SStanislav Sedov path = NULL; 8330daf62d9SStanislav Sedov entry = filestat_new_entry(kve, PS_FST_TYPE_VNODE, -1, 834d57486e2SRobert Watson fflags, PS_FST_UFLAG_MMAP, refcount, offset, path, 835d57486e2SRobert Watson 0); 8360daf62d9SStanislav Sedov if (entry != NULL) 8370daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 8380daf62d9SStanislav Sedov } 8390daf62d9SStanislav Sedov } 8400daf62d9SStanislav Sedov fail: 8410daf62d9SStanislav Sedov return (head); 8420daf62d9SStanislav Sedov } 8430daf62d9SStanislav Sedov 8440daf62d9SStanislav Sedov int 8450daf62d9SStanislav Sedov procstat_get_pipe_info(struct procstat *procstat, struct filestat *fst, 8460daf62d9SStanislav Sedov struct pipestat *ps, char *errbuf) 8470daf62d9SStanislav Sedov { 8480daf62d9SStanislav Sedov 8490daf62d9SStanislav Sedov assert(ps); 8500daf62d9SStanislav Sedov if (procstat->type == PROCSTAT_KVM) { 8510daf62d9SStanislav Sedov return (procstat_get_pipe_info_kvm(procstat->kd, fst, ps, 8520daf62d9SStanislav Sedov errbuf)); 8537153ad2bSMikolaj Golub } else if (procstat->type == PROCSTAT_SYSCTL || 8547153ad2bSMikolaj Golub procstat->type == PROCSTAT_CORE) { 8550daf62d9SStanislav Sedov return (procstat_get_pipe_info_sysctl(fst, ps, errbuf)); 8560daf62d9SStanislav Sedov } else { 85780905c35SJilles Tjoelker warnx("unknown access method: %d", procstat->type); 8580daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 8590daf62d9SStanislav Sedov return (1); 8600daf62d9SStanislav Sedov } 8610daf62d9SStanislav Sedov } 8620daf62d9SStanislav Sedov 8630daf62d9SStanislav Sedov static int 8640daf62d9SStanislav Sedov procstat_get_pipe_info_kvm(kvm_t *kd, struct filestat *fst, 8650daf62d9SStanislav Sedov struct pipestat *ps, char *errbuf) 8660daf62d9SStanislav Sedov { 8670daf62d9SStanislav Sedov struct pipe pi; 8680daf62d9SStanislav Sedov void *pipep; 8690daf62d9SStanislav Sedov 8700daf62d9SStanislav Sedov assert(kd); 8710daf62d9SStanislav Sedov assert(ps); 8720daf62d9SStanislav Sedov assert(fst); 8730daf62d9SStanislav Sedov bzero(ps, sizeof(*ps)); 8740daf62d9SStanislav Sedov pipep = fst->fs_typedep; 8750daf62d9SStanislav Sedov if (pipep == NULL) 8760daf62d9SStanislav Sedov goto fail; 8770daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)pipep, &pi, sizeof(struct pipe))) { 8780daf62d9SStanislav Sedov warnx("can't read pipe at %p", (void *)pipep); 8790daf62d9SStanislav Sedov goto fail; 8800daf62d9SStanislav Sedov } 8810daf62d9SStanislav Sedov ps->addr = (uintptr_t)pipep; 8820daf62d9SStanislav Sedov ps->peer = (uintptr_t)pi.pipe_peer; 8830daf62d9SStanislav Sedov ps->buffer_cnt = pi.pipe_buffer.cnt; 8840daf62d9SStanislav Sedov return (0); 8850daf62d9SStanislav Sedov 8860daf62d9SStanislav Sedov fail: 8870daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 8880daf62d9SStanislav Sedov return (1); 8890daf62d9SStanislav Sedov } 8900daf62d9SStanislav Sedov 8910daf62d9SStanislav Sedov static int 8920daf62d9SStanislav Sedov procstat_get_pipe_info_sysctl(struct filestat *fst, struct pipestat *ps, 8930daf62d9SStanislav Sedov char *errbuf __unused) 8940daf62d9SStanislav Sedov { 8950daf62d9SStanislav Sedov struct kinfo_file *kif; 8960daf62d9SStanislav Sedov 8970daf62d9SStanislav Sedov assert(ps); 8980daf62d9SStanislav Sedov assert(fst); 8990daf62d9SStanislav Sedov bzero(ps, sizeof(*ps)); 9000daf62d9SStanislav Sedov kif = fst->fs_typedep; 9010daf62d9SStanislav Sedov if (kif == NULL) 9020daf62d9SStanislav Sedov return (1); 9030daf62d9SStanislav Sedov ps->addr = kif->kf_un.kf_pipe.kf_pipe_addr; 9040daf62d9SStanislav Sedov ps->peer = kif->kf_un.kf_pipe.kf_pipe_peer; 9050daf62d9SStanislav Sedov ps->buffer_cnt = kif->kf_un.kf_pipe.kf_pipe_buffer_cnt; 9060daf62d9SStanislav Sedov return (0); 9070daf62d9SStanislav Sedov } 9080daf62d9SStanislav Sedov 9090daf62d9SStanislav Sedov int 9100daf62d9SStanislav Sedov procstat_get_pts_info(struct procstat *procstat, struct filestat *fst, 9110daf62d9SStanislav Sedov struct ptsstat *pts, char *errbuf) 9120daf62d9SStanislav Sedov { 9130daf62d9SStanislav Sedov 9140daf62d9SStanislav Sedov assert(pts); 9150daf62d9SStanislav Sedov if (procstat->type == PROCSTAT_KVM) { 9160daf62d9SStanislav Sedov return (procstat_get_pts_info_kvm(procstat->kd, fst, pts, 9170daf62d9SStanislav Sedov errbuf)); 9187153ad2bSMikolaj Golub } else if (procstat->type == PROCSTAT_SYSCTL || 9197153ad2bSMikolaj Golub procstat->type == PROCSTAT_CORE) { 9200daf62d9SStanislav Sedov return (procstat_get_pts_info_sysctl(fst, pts, errbuf)); 9210daf62d9SStanislav Sedov } else { 92280905c35SJilles Tjoelker warnx("unknown access method: %d", procstat->type); 9230daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 9240daf62d9SStanislav Sedov return (1); 9250daf62d9SStanislav Sedov } 9260daf62d9SStanislav Sedov } 9270daf62d9SStanislav Sedov 9280daf62d9SStanislav Sedov static int 9290daf62d9SStanislav Sedov procstat_get_pts_info_kvm(kvm_t *kd, struct filestat *fst, 9300daf62d9SStanislav Sedov struct ptsstat *pts, char *errbuf) 9310daf62d9SStanislav Sedov { 9320daf62d9SStanislav Sedov struct tty tty; 9330daf62d9SStanislav Sedov void *ttyp; 9340daf62d9SStanislav Sedov 9350daf62d9SStanislav Sedov assert(kd); 9360daf62d9SStanislav Sedov assert(pts); 9370daf62d9SStanislav Sedov assert(fst); 9380daf62d9SStanislav Sedov bzero(pts, sizeof(*pts)); 9390daf62d9SStanislav Sedov ttyp = fst->fs_typedep; 9400daf62d9SStanislav Sedov if (ttyp == NULL) 9410daf62d9SStanislav Sedov goto fail; 9420daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)ttyp, &tty, sizeof(struct tty))) { 9430daf62d9SStanislav Sedov warnx("can't read tty at %p", (void *)ttyp); 9440daf62d9SStanislav Sedov goto fail; 9450daf62d9SStanislav Sedov } 9460daf62d9SStanislav Sedov pts->dev = dev2udev(kd, tty.t_dev); 9470daf62d9SStanislav Sedov (void)kdevtoname(kd, tty.t_dev, pts->devname); 9480daf62d9SStanislav Sedov return (0); 9490daf62d9SStanislav Sedov 9500daf62d9SStanislav Sedov fail: 9510daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 9520daf62d9SStanislav Sedov return (1); 9530daf62d9SStanislav Sedov } 9540daf62d9SStanislav Sedov 9550daf62d9SStanislav Sedov static int 9560daf62d9SStanislav Sedov procstat_get_pts_info_sysctl(struct filestat *fst, struct ptsstat *pts, 9570daf62d9SStanislav Sedov char *errbuf __unused) 9580daf62d9SStanislav Sedov { 9590daf62d9SStanislav Sedov struct kinfo_file *kif; 9600daf62d9SStanislav Sedov 9610daf62d9SStanislav Sedov assert(pts); 9620daf62d9SStanislav Sedov assert(fst); 9630daf62d9SStanislav Sedov bzero(pts, sizeof(*pts)); 9640daf62d9SStanislav Sedov kif = fst->fs_typedep; 9650daf62d9SStanislav Sedov if (kif == NULL) 9660daf62d9SStanislav Sedov return (0); 9670daf62d9SStanislav Sedov pts->dev = kif->kf_un.kf_pts.kf_pts_dev; 9680daf62d9SStanislav Sedov strlcpy(pts->devname, kif->kf_path, sizeof(pts->devname)); 9690daf62d9SStanislav Sedov return (0); 9700daf62d9SStanislav Sedov } 9710daf62d9SStanislav Sedov 9720daf62d9SStanislav Sedov int 973e506e182SJohn Baldwin procstat_get_shm_info(struct procstat *procstat, struct filestat *fst, 974e506e182SJohn Baldwin struct shmstat *shm, char *errbuf) 975e506e182SJohn Baldwin { 976e506e182SJohn Baldwin 977e506e182SJohn Baldwin assert(shm); 978e506e182SJohn Baldwin if (procstat->type == PROCSTAT_KVM) { 979e506e182SJohn Baldwin return (procstat_get_shm_info_kvm(procstat->kd, fst, shm, 980e506e182SJohn Baldwin errbuf)); 9817153ad2bSMikolaj Golub } else if (procstat->type == PROCSTAT_SYSCTL || 9827153ad2bSMikolaj Golub procstat->type == PROCSTAT_CORE) { 983e506e182SJohn Baldwin return (procstat_get_shm_info_sysctl(fst, shm, errbuf)); 984e506e182SJohn Baldwin } else { 985e506e182SJohn Baldwin warnx("unknown access method: %d", procstat->type); 986e506e182SJohn Baldwin snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 987e506e182SJohn Baldwin return (1); 988e506e182SJohn Baldwin } 989e506e182SJohn Baldwin } 990e506e182SJohn Baldwin 991e506e182SJohn Baldwin static int 992e506e182SJohn Baldwin procstat_get_shm_info_kvm(kvm_t *kd, struct filestat *fst, 993e506e182SJohn Baldwin struct shmstat *shm, char *errbuf) 994e506e182SJohn Baldwin { 995e506e182SJohn Baldwin struct shmfd shmfd; 996e506e182SJohn Baldwin void *shmfdp; 997a9f5e425SJohn Baldwin char *path; 998a9f5e425SJohn Baldwin int i; 999e506e182SJohn Baldwin 1000e506e182SJohn Baldwin assert(kd); 1001e506e182SJohn Baldwin assert(shm); 1002e506e182SJohn Baldwin assert(fst); 1003e506e182SJohn Baldwin bzero(shm, sizeof(*shm)); 1004e506e182SJohn Baldwin shmfdp = fst->fs_typedep; 1005e506e182SJohn Baldwin if (shmfdp == NULL) 1006e506e182SJohn Baldwin goto fail; 1007e506e182SJohn Baldwin if (!kvm_read_all(kd, (unsigned long)shmfdp, &shmfd, 1008e506e182SJohn Baldwin sizeof(struct shmfd))) { 1009e506e182SJohn Baldwin warnx("can't read shmfd at %p", (void *)shmfdp); 1010e506e182SJohn Baldwin goto fail; 1011e506e182SJohn Baldwin } 1012e506e182SJohn Baldwin shm->mode = S_IFREG | shmfd.shm_mode; 1013e506e182SJohn Baldwin shm->size = shmfd.shm_size; 1014a9f5e425SJohn Baldwin if (fst->fs_path == NULL && shmfd.shm_path != NULL) { 1015a9f5e425SJohn Baldwin path = malloc(MAXPATHLEN); 1016a9f5e425SJohn Baldwin for (i = 0; i < MAXPATHLEN - 1; i++) { 1017a9f5e425SJohn Baldwin if (!kvm_read_all(kd, (unsigned long)shmfd.shm_path + i, 1018a9f5e425SJohn Baldwin path + i, 1)) 1019a9f5e425SJohn Baldwin break; 1020a9f5e425SJohn Baldwin if (path[i] == '\0') 1021a9f5e425SJohn Baldwin break; 1022a9f5e425SJohn Baldwin } 1023a9f5e425SJohn Baldwin path[i] = '\0'; 1024a9f5e425SJohn Baldwin if (i == 0) 1025a9f5e425SJohn Baldwin free(path); 1026a9f5e425SJohn Baldwin else 1027a9f5e425SJohn Baldwin fst->fs_path = path; 1028a9f5e425SJohn Baldwin } 1029e506e182SJohn Baldwin return (0); 1030e506e182SJohn Baldwin 1031e506e182SJohn Baldwin fail: 1032e506e182SJohn Baldwin snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 1033e506e182SJohn Baldwin return (1); 1034e506e182SJohn Baldwin } 1035e506e182SJohn Baldwin 1036e506e182SJohn Baldwin static int 1037e506e182SJohn Baldwin procstat_get_shm_info_sysctl(struct filestat *fst, struct shmstat *shm, 1038e506e182SJohn Baldwin char *errbuf __unused) 1039e506e182SJohn Baldwin { 1040e506e182SJohn Baldwin struct kinfo_file *kif; 1041e506e182SJohn Baldwin 1042e506e182SJohn Baldwin assert(shm); 1043e506e182SJohn Baldwin assert(fst); 1044e506e182SJohn Baldwin bzero(shm, sizeof(*shm)); 1045e506e182SJohn Baldwin kif = fst->fs_typedep; 1046e506e182SJohn Baldwin if (kif == NULL) 1047e506e182SJohn Baldwin return (0); 1048e506e182SJohn Baldwin shm->size = kif->kf_un.kf_file.kf_file_size; 1049e506e182SJohn Baldwin shm->mode = kif->kf_un.kf_file.kf_file_mode; 1050e506e182SJohn Baldwin return (0); 1051e506e182SJohn Baldwin } 1052e506e182SJohn Baldwin 1053e506e182SJohn Baldwin int 10540daf62d9SStanislav Sedov procstat_get_vnode_info(struct procstat *procstat, struct filestat *fst, 10550daf62d9SStanislav Sedov struct vnstat *vn, char *errbuf) 10560daf62d9SStanislav Sedov { 10570daf62d9SStanislav Sedov 10580daf62d9SStanislav Sedov assert(vn); 10590daf62d9SStanislav Sedov if (procstat->type == PROCSTAT_KVM) { 10600daf62d9SStanislav Sedov return (procstat_get_vnode_info_kvm(procstat->kd, fst, vn, 10610daf62d9SStanislav Sedov errbuf)); 10627153ad2bSMikolaj Golub } else if (procstat->type == PROCSTAT_SYSCTL || 10637153ad2bSMikolaj Golub procstat->type == PROCSTAT_CORE) { 10640daf62d9SStanislav Sedov return (procstat_get_vnode_info_sysctl(fst, vn, errbuf)); 10650daf62d9SStanislav Sedov } else { 106680905c35SJilles Tjoelker warnx("unknown access method: %d", procstat->type); 10670daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 10680daf62d9SStanislav Sedov return (1); 10690daf62d9SStanislav Sedov } 10700daf62d9SStanislav Sedov } 10710daf62d9SStanislav Sedov 10720daf62d9SStanislav Sedov static int 10730daf62d9SStanislav Sedov procstat_get_vnode_info_kvm(kvm_t *kd, struct filestat *fst, 10740daf62d9SStanislav Sedov struct vnstat *vn, char *errbuf) 10750daf62d9SStanislav Sedov { 10760daf62d9SStanislav Sedov /* Filesystem specific handlers. */ 10770daf62d9SStanislav Sedov #define FSTYPE(fst) {#fst, fst##_filestat} 10780daf62d9SStanislav Sedov struct { 10790daf62d9SStanislav Sedov const char *tag; 10800daf62d9SStanislav Sedov int (*handler)(kvm_t *kd, struct vnode *vp, 10810daf62d9SStanislav Sedov struct vnstat *vn); 10820daf62d9SStanislav Sedov } fstypes[] = { 10830daf62d9SStanislav Sedov FSTYPE(devfs), 10840daf62d9SStanislav Sedov FSTYPE(isofs), 10850daf62d9SStanislav Sedov FSTYPE(msdosfs), 10860daf62d9SStanislav Sedov FSTYPE(nfs), 10870daf62d9SStanislav Sedov FSTYPE(udf), 10880daf62d9SStanislav Sedov FSTYPE(ufs), 108959ea47d0SStanislav Sedov #ifdef LIBPROCSTAT_ZFS 10900daf62d9SStanislav Sedov FSTYPE(zfs), 10910daf62d9SStanislav Sedov #endif 10920daf62d9SStanislav Sedov }; 10930daf62d9SStanislav Sedov #define NTYPES (sizeof(fstypes) / sizeof(*fstypes)) 10940daf62d9SStanislav Sedov struct vnode vnode; 10950daf62d9SStanislav Sedov char tagstr[12]; 10960daf62d9SStanislav Sedov void *vp; 10970daf62d9SStanislav Sedov int error, found; 10980daf62d9SStanislav Sedov unsigned int i; 10990daf62d9SStanislav Sedov 11000daf62d9SStanislav Sedov assert(kd); 11010daf62d9SStanislav Sedov assert(vn); 11020daf62d9SStanislav Sedov assert(fst); 11030daf62d9SStanislav Sedov vp = fst->fs_typedep; 11040daf62d9SStanislav Sedov if (vp == NULL) 11050daf62d9SStanislav Sedov goto fail; 11060daf62d9SStanislav Sedov error = kvm_read_all(kd, (unsigned long)vp, &vnode, sizeof(vnode)); 11070daf62d9SStanislav Sedov if (error == 0) { 11080daf62d9SStanislav Sedov warnx("can't read vnode at %p", (void *)vp); 11090daf62d9SStanislav Sedov goto fail; 11100daf62d9SStanislav Sedov } 11110daf62d9SStanislav Sedov bzero(vn, sizeof(*vn)); 11120daf62d9SStanislav Sedov vn->vn_type = vntype2psfsttype(vnode.v_type); 11130daf62d9SStanislav Sedov if (vnode.v_type == VNON || vnode.v_type == VBAD) 11140daf62d9SStanislav Sedov return (0); 11150daf62d9SStanislav Sedov error = kvm_read_all(kd, (unsigned long)vnode.v_tag, tagstr, 11160daf62d9SStanislav Sedov sizeof(tagstr)); 11170daf62d9SStanislav Sedov if (error == 0) { 11180daf62d9SStanislav Sedov warnx("can't read v_tag at %p", (void *)vp); 11190daf62d9SStanislav Sedov goto fail; 11200daf62d9SStanislav Sedov } 11210daf62d9SStanislav Sedov tagstr[sizeof(tagstr) - 1] = '\0'; 11220daf62d9SStanislav Sedov 11230daf62d9SStanislav Sedov /* 11240daf62d9SStanislav Sedov * Find appropriate handler. 11250daf62d9SStanislav Sedov */ 11260daf62d9SStanislav Sedov for (i = 0, found = 0; i < NTYPES; i++) 11270daf62d9SStanislav Sedov if (!strcmp(fstypes[i].tag, tagstr)) { 11280daf62d9SStanislav Sedov if (fstypes[i].handler(kd, &vnode, vn) != 0) { 11290daf62d9SStanislav Sedov goto fail; 11300daf62d9SStanislav Sedov } 11310daf62d9SStanislav Sedov break; 11320daf62d9SStanislav Sedov } 11330daf62d9SStanislav Sedov if (i == NTYPES) { 11340daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "?(%s)", tagstr); 11350daf62d9SStanislav Sedov return (1); 11360daf62d9SStanislav Sedov } 11370daf62d9SStanislav Sedov vn->vn_mntdir = getmnton(kd, vnode.v_mount); 11380daf62d9SStanislav Sedov if ((vnode.v_type == VBLK || vnode.v_type == VCHR) && 11390daf62d9SStanislav Sedov vnode.v_rdev != NULL){ 11400daf62d9SStanislav Sedov vn->vn_dev = dev2udev(kd, vnode.v_rdev); 11410daf62d9SStanislav Sedov (void)kdevtoname(kd, vnode.v_rdev, vn->vn_devname); 11420daf62d9SStanislav Sedov } else { 11430daf62d9SStanislav Sedov vn->vn_dev = -1; 11440daf62d9SStanislav Sedov } 11450daf62d9SStanislav Sedov return (0); 11460daf62d9SStanislav Sedov 11470daf62d9SStanislav Sedov fail: 11480daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 11490daf62d9SStanislav Sedov return (1); 11500daf62d9SStanislav Sedov } 11510daf62d9SStanislav Sedov 11520daf62d9SStanislav Sedov /* 11530daf62d9SStanislav Sedov * kinfo vnode type to filestat translation. 11540daf62d9SStanislav Sedov */ 11550daf62d9SStanislav Sedov static int 11560daf62d9SStanislav Sedov kinfo_vtype2fst(int kfvtype) 11570daf62d9SStanislav Sedov { 11580daf62d9SStanislav Sedov static struct { 11590daf62d9SStanislav Sedov int kf_vtype; 11600daf62d9SStanislav Sedov int fst_vtype; 11610daf62d9SStanislav Sedov } kfvtypes2fst[] = { 11620daf62d9SStanislav Sedov { KF_VTYPE_VBAD, PS_FST_VTYPE_VBAD }, 11630daf62d9SStanislav Sedov { KF_VTYPE_VBLK, PS_FST_VTYPE_VBLK }, 11640daf62d9SStanislav Sedov { KF_VTYPE_VCHR, PS_FST_VTYPE_VCHR }, 11650daf62d9SStanislav Sedov { KF_VTYPE_VDIR, PS_FST_VTYPE_VDIR }, 11660daf62d9SStanislav Sedov { KF_VTYPE_VFIFO, PS_FST_VTYPE_VFIFO }, 11670daf62d9SStanislav Sedov { KF_VTYPE_VLNK, PS_FST_VTYPE_VLNK }, 11680daf62d9SStanislav Sedov { KF_VTYPE_VNON, PS_FST_VTYPE_VNON }, 11690daf62d9SStanislav Sedov { KF_VTYPE_VREG, PS_FST_VTYPE_VREG }, 11700daf62d9SStanislav Sedov { KF_VTYPE_VSOCK, PS_FST_VTYPE_VSOCK } 11710daf62d9SStanislav Sedov }; 11720daf62d9SStanislav Sedov #define NKFVTYPES (sizeof(kfvtypes2fst) / sizeof(*kfvtypes2fst)) 11730daf62d9SStanislav Sedov unsigned int i; 11740daf62d9SStanislav Sedov 11750daf62d9SStanislav Sedov for (i = 0; i < NKFVTYPES; i++) 11760daf62d9SStanislav Sedov if (kfvtypes2fst[i].kf_vtype == kfvtype) 11770daf62d9SStanislav Sedov break; 11780daf62d9SStanislav Sedov if (i == NKFVTYPES) 11790daf62d9SStanislav Sedov return (PS_FST_VTYPE_UNKNOWN); 11800daf62d9SStanislav Sedov return (kfvtypes2fst[i].fst_vtype); 11810daf62d9SStanislav Sedov } 11820daf62d9SStanislav Sedov 11830daf62d9SStanislav Sedov static int 11840daf62d9SStanislav Sedov procstat_get_vnode_info_sysctl(struct filestat *fst, struct vnstat *vn, 11850daf62d9SStanislav Sedov char *errbuf) 11860daf62d9SStanislav Sedov { 11870daf62d9SStanislav Sedov struct statfs stbuf; 11880daf62d9SStanislav Sedov struct kinfo_file *kif; 11890daf62d9SStanislav Sedov struct kinfo_vmentry *kve; 11900daf62d9SStanislav Sedov uint64_t fileid; 11910daf62d9SStanislav Sedov uint64_t size; 11920daf62d9SStanislav Sedov char *name, *path; 11930daf62d9SStanislav Sedov uint32_t fsid; 11940daf62d9SStanislav Sedov uint16_t mode; 11950daf62d9SStanislav Sedov uint32_t rdev; 11960daf62d9SStanislav Sedov int vntype; 11970daf62d9SStanislav Sedov int status; 11980daf62d9SStanislav Sedov 11990daf62d9SStanislav Sedov assert(fst); 12000daf62d9SStanislav Sedov assert(vn); 12010daf62d9SStanislav Sedov bzero(vn, sizeof(*vn)); 12020daf62d9SStanislav Sedov if (fst->fs_typedep == NULL) 12030daf62d9SStanislav Sedov return (1); 12040daf62d9SStanislav Sedov if (fst->fs_uflags & PS_FST_UFLAG_MMAP) { 12050daf62d9SStanislav Sedov kve = fst->fs_typedep; 12060daf62d9SStanislav Sedov fileid = kve->kve_vn_fileid; 12070daf62d9SStanislav Sedov fsid = kve->kve_vn_fsid; 12080daf62d9SStanislav Sedov mode = kve->kve_vn_mode; 12090daf62d9SStanislav Sedov path = kve->kve_path; 12100daf62d9SStanislav Sedov rdev = kve->kve_vn_rdev; 12110daf62d9SStanislav Sedov size = kve->kve_vn_size; 12120daf62d9SStanislav Sedov vntype = kinfo_vtype2fst(kve->kve_vn_type); 12130daf62d9SStanislav Sedov status = kve->kve_status; 12140daf62d9SStanislav Sedov } else { 12150daf62d9SStanislav Sedov kif = fst->fs_typedep; 12160daf62d9SStanislav Sedov fileid = kif->kf_un.kf_file.kf_file_fileid; 12170daf62d9SStanislav Sedov fsid = kif->kf_un.kf_file.kf_file_fsid; 12180daf62d9SStanislav Sedov mode = kif->kf_un.kf_file.kf_file_mode; 12190daf62d9SStanislav Sedov path = kif->kf_path; 12200daf62d9SStanislav Sedov rdev = kif->kf_un.kf_file.kf_file_rdev; 12210daf62d9SStanislav Sedov size = kif->kf_un.kf_file.kf_file_size; 12220daf62d9SStanislav Sedov vntype = kinfo_vtype2fst(kif->kf_vnode_type); 12230daf62d9SStanislav Sedov status = kif->kf_status; 12240daf62d9SStanislav Sedov } 12250daf62d9SStanislav Sedov vn->vn_type = vntype; 12260daf62d9SStanislav Sedov if (vntype == PS_FST_VTYPE_VNON || vntype == PS_FST_VTYPE_VBAD) 12270daf62d9SStanislav Sedov return (0); 12280daf62d9SStanislav Sedov if ((status & KF_ATTR_VALID) == 0) { 12290daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "? (no info available)"); 12300daf62d9SStanislav Sedov return (1); 12310daf62d9SStanislav Sedov } 12320daf62d9SStanislav Sedov if (path && *path) { 12330daf62d9SStanislav Sedov statfs(path, &stbuf); 12340daf62d9SStanislav Sedov vn->vn_mntdir = strdup(stbuf.f_mntonname); 12350daf62d9SStanislav Sedov } else 12360daf62d9SStanislav Sedov vn->vn_mntdir = strdup("-"); 12370daf62d9SStanislav Sedov vn->vn_dev = rdev; 12380daf62d9SStanislav Sedov if (vntype == PS_FST_VTYPE_VBLK) { 12390daf62d9SStanislav Sedov name = devname(rdev, S_IFBLK); 12400daf62d9SStanislav Sedov if (name != NULL) 12410daf62d9SStanislav Sedov strlcpy(vn->vn_devname, name, 12420daf62d9SStanislav Sedov sizeof(vn->vn_devname)); 12430daf62d9SStanislav Sedov } else if (vntype == PS_FST_VTYPE_VCHR) { 12440daf62d9SStanislav Sedov name = devname(vn->vn_dev, S_IFCHR); 12450daf62d9SStanislav Sedov if (name != NULL) 12460daf62d9SStanislav Sedov strlcpy(vn->vn_devname, name, 12470daf62d9SStanislav Sedov sizeof(vn->vn_devname)); 12480daf62d9SStanislav Sedov } 12490daf62d9SStanislav Sedov vn->vn_fsid = fsid; 12500daf62d9SStanislav Sedov vn->vn_fileid = fileid; 12510daf62d9SStanislav Sedov vn->vn_size = size; 12520daf62d9SStanislav Sedov vn->vn_mode = mode; 12530daf62d9SStanislav Sedov return (0); 12540daf62d9SStanislav Sedov } 12550daf62d9SStanislav Sedov 12560daf62d9SStanislav Sedov int 12570daf62d9SStanislav Sedov procstat_get_socket_info(struct procstat *procstat, struct filestat *fst, 12580daf62d9SStanislav Sedov struct sockstat *sock, char *errbuf) 12590daf62d9SStanislav Sedov { 12600daf62d9SStanislav Sedov 12610daf62d9SStanislav Sedov assert(sock); 12620daf62d9SStanislav Sedov if (procstat->type == PROCSTAT_KVM) { 12630daf62d9SStanislav Sedov return (procstat_get_socket_info_kvm(procstat->kd, fst, sock, 12640daf62d9SStanislav Sedov errbuf)); 12657153ad2bSMikolaj Golub } else if (procstat->type == PROCSTAT_SYSCTL || 12667153ad2bSMikolaj Golub procstat->type == PROCSTAT_CORE) { 12670daf62d9SStanislav Sedov return (procstat_get_socket_info_sysctl(fst, sock, errbuf)); 12680daf62d9SStanislav Sedov } else { 126980905c35SJilles Tjoelker warnx("unknown access method: %d", procstat->type); 12700daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 12710daf62d9SStanislav Sedov return (1); 12720daf62d9SStanislav Sedov } 12730daf62d9SStanislav Sedov } 12740daf62d9SStanislav Sedov 12750daf62d9SStanislav Sedov static int 12760daf62d9SStanislav Sedov procstat_get_socket_info_kvm(kvm_t *kd, struct filestat *fst, 12770daf62d9SStanislav Sedov struct sockstat *sock, char *errbuf) 12780daf62d9SStanislav Sedov { 12790daf62d9SStanislav Sedov struct domain dom; 12800daf62d9SStanislav Sedov struct inpcb inpcb; 12810daf62d9SStanislav Sedov struct protosw proto; 12820daf62d9SStanislav Sedov struct socket s; 12830daf62d9SStanislav Sedov struct unpcb unpcb; 12840daf62d9SStanislav Sedov ssize_t len; 12850daf62d9SStanislav Sedov void *so; 12860daf62d9SStanislav Sedov 12870daf62d9SStanislav Sedov assert(kd); 12880daf62d9SStanislav Sedov assert(sock); 12890daf62d9SStanislav Sedov assert(fst); 12900daf62d9SStanislav Sedov bzero(sock, sizeof(*sock)); 12910daf62d9SStanislav Sedov so = fst->fs_typedep; 12920daf62d9SStanislav Sedov if (so == NULL) 12930daf62d9SStanislav Sedov goto fail; 12940daf62d9SStanislav Sedov sock->so_addr = (uintptr_t)so; 12950daf62d9SStanislav Sedov /* fill in socket */ 12960daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)so, &s, 12970daf62d9SStanislav Sedov sizeof(struct socket))) { 12980daf62d9SStanislav Sedov warnx("can't read sock at %p", (void *)so); 12990daf62d9SStanislav Sedov goto fail; 13000daf62d9SStanislav Sedov } 13010daf62d9SStanislav Sedov /* fill in protosw entry */ 13020daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)s.so_proto, &proto, 13030daf62d9SStanislav Sedov sizeof(struct protosw))) { 13040daf62d9SStanislav Sedov warnx("can't read protosw at %p", (void *)s.so_proto); 13050daf62d9SStanislav Sedov goto fail; 13060daf62d9SStanislav Sedov } 13070daf62d9SStanislav Sedov /* fill in domain */ 13080daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)proto.pr_domain, &dom, 13090daf62d9SStanislav Sedov sizeof(struct domain))) { 13100daf62d9SStanislav Sedov warnx("can't read domain at %p", 13110daf62d9SStanislav Sedov (void *)proto.pr_domain); 13120daf62d9SStanislav Sedov goto fail; 13130daf62d9SStanislav Sedov } 13140daf62d9SStanislav Sedov if ((len = kvm_read(kd, (unsigned long)dom.dom_name, sock->dname, 13150daf62d9SStanislav Sedov sizeof(sock->dname) - 1)) < 0) { 13160daf62d9SStanislav Sedov warnx("can't read domain name at %p", (void *)dom.dom_name); 13170daf62d9SStanislav Sedov sock->dname[0] = '\0'; 13180daf62d9SStanislav Sedov } 13190daf62d9SStanislav Sedov else 13200daf62d9SStanislav Sedov sock->dname[len] = '\0'; 13210daf62d9SStanislav Sedov 13220daf62d9SStanislav Sedov /* 13230daf62d9SStanislav Sedov * Fill in known data. 13240daf62d9SStanislav Sedov */ 13250daf62d9SStanislav Sedov sock->type = s.so_type; 13260daf62d9SStanislav Sedov sock->proto = proto.pr_protocol; 13270daf62d9SStanislav Sedov sock->dom_family = dom.dom_family; 13280daf62d9SStanislav Sedov sock->so_pcb = (uintptr_t)s.so_pcb; 13290daf62d9SStanislav Sedov 13300daf62d9SStanislav Sedov /* 13310daf62d9SStanislav Sedov * Protocol specific data. 13320daf62d9SStanislav Sedov */ 13330daf62d9SStanislav Sedov switch(dom.dom_family) { 13340daf62d9SStanislav Sedov case AF_INET: 13350daf62d9SStanislav Sedov case AF_INET6: 13360daf62d9SStanislav Sedov if (proto.pr_protocol == IPPROTO_TCP) { 13370daf62d9SStanislav Sedov if (s.so_pcb) { 13380daf62d9SStanislav Sedov if (kvm_read(kd, (u_long)s.so_pcb, 13390daf62d9SStanislav Sedov (char *)&inpcb, sizeof(struct inpcb)) 13400daf62d9SStanislav Sedov != sizeof(struct inpcb)) { 13410daf62d9SStanislav Sedov warnx("can't read inpcb at %p", 13420daf62d9SStanislav Sedov (void *)s.so_pcb); 13430daf62d9SStanislav Sedov } else 13440daf62d9SStanislav Sedov sock->inp_ppcb = 13450daf62d9SStanislav Sedov (uintptr_t)inpcb.inp_ppcb; 13460daf62d9SStanislav Sedov } 13470daf62d9SStanislav Sedov } 13480daf62d9SStanislav Sedov break; 13490daf62d9SStanislav Sedov case AF_UNIX: 13500daf62d9SStanislav Sedov if (s.so_pcb) { 13510daf62d9SStanislav Sedov if (kvm_read(kd, (u_long)s.so_pcb, (char *)&unpcb, 13520daf62d9SStanislav Sedov sizeof(struct unpcb)) != sizeof(struct unpcb)){ 13530daf62d9SStanislav Sedov warnx("can't read unpcb at %p", 13540daf62d9SStanislav Sedov (void *)s.so_pcb); 13550daf62d9SStanislav Sedov } else if (unpcb.unp_conn) { 13560daf62d9SStanislav Sedov sock->so_rcv_sb_state = s.so_rcv.sb_state; 13570daf62d9SStanislav Sedov sock->so_snd_sb_state = s.so_snd.sb_state; 13580daf62d9SStanislav Sedov sock->unp_conn = (uintptr_t)unpcb.unp_conn; 13590daf62d9SStanislav Sedov } 13600daf62d9SStanislav Sedov } 13610daf62d9SStanislav Sedov break; 13620daf62d9SStanislav Sedov default: 13630daf62d9SStanislav Sedov break; 13640daf62d9SStanislav Sedov } 13650daf62d9SStanislav Sedov return (0); 13660daf62d9SStanislav Sedov 13670daf62d9SStanislav Sedov fail: 13680daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 13690daf62d9SStanislav Sedov return (1); 13700daf62d9SStanislav Sedov } 13710daf62d9SStanislav Sedov 13720daf62d9SStanislav Sedov static int 13730daf62d9SStanislav Sedov procstat_get_socket_info_sysctl(struct filestat *fst, struct sockstat *sock, 13740daf62d9SStanislav Sedov char *errbuf __unused) 13750daf62d9SStanislav Sedov { 13760daf62d9SStanislav Sedov struct kinfo_file *kif; 13770daf62d9SStanislav Sedov 13780daf62d9SStanislav Sedov assert(sock); 13790daf62d9SStanislav Sedov assert(fst); 13800daf62d9SStanislav Sedov bzero(sock, sizeof(*sock)); 13810daf62d9SStanislav Sedov kif = fst->fs_typedep; 13820daf62d9SStanislav Sedov if (kif == NULL) 13830daf62d9SStanislav Sedov return (0); 13840daf62d9SStanislav Sedov 13850daf62d9SStanislav Sedov /* 13860daf62d9SStanislav Sedov * Fill in known data. 13870daf62d9SStanislav Sedov */ 13880daf62d9SStanislav Sedov sock->type = kif->kf_sock_type; 13890daf62d9SStanislav Sedov sock->proto = kif->kf_sock_protocol; 13900daf62d9SStanislav Sedov sock->dom_family = kif->kf_sock_domain; 13910daf62d9SStanislav Sedov sock->so_pcb = kif->kf_un.kf_sock.kf_sock_pcb; 13920daf62d9SStanislav Sedov strlcpy(sock->dname, kif->kf_path, sizeof(sock->dname)); 13930daf62d9SStanislav Sedov bcopy(&kif->kf_sa_local, &sock->sa_local, kif->kf_sa_local.ss_len); 13940daf62d9SStanislav Sedov bcopy(&kif->kf_sa_peer, &sock->sa_peer, kif->kf_sa_peer.ss_len); 13950daf62d9SStanislav Sedov 13960daf62d9SStanislav Sedov /* 13970daf62d9SStanislav Sedov * Protocol specific data. 13980daf62d9SStanislav Sedov */ 13990daf62d9SStanislav Sedov switch(sock->dom_family) { 14000daf62d9SStanislav Sedov case AF_INET: 14010daf62d9SStanislav Sedov case AF_INET6: 14020daf62d9SStanislav Sedov if (sock->proto == IPPROTO_TCP) 14030daf62d9SStanislav Sedov sock->inp_ppcb = kif->kf_un.kf_sock.kf_sock_inpcb; 14040daf62d9SStanislav Sedov break; 14050daf62d9SStanislav Sedov case AF_UNIX: 14060daf62d9SStanislav Sedov if (kif->kf_un.kf_sock.kf_sock_unpconn != 0) { 14070daf62d9SStanislav Sedov sock->so_rcv_sb_state = 14080daf62d9SStanislav Sedov kif->kf_un.kf_sock.kf_sock_rcv_sb_state; 14090daf62d9SStanislav Sedov sock->so_snd_sb_state = 14100daf62d9SStanislav Sedov kif->kf_un.kf_sock.kf_sock_snd_sb_state; 14110daf62d9SStanislav Sedov sock->unp_conn = 14120daf62d9SStanislav Sedov kif->kf_un.kf_sock.kf_sock_unpconn; 14130daf62d9SStanislav Sedov } 14140daf62d9SStanislav Sedov break; 14150daf62d9SStanislav Sedov default: 14160daf62d9SStanislav Sedov break; 14170daf62d9SStanislav Sedov } 14180daf62d9SStanislav Sedov return (0); 14190daf62d9SStanislav Sedov } 14200daf62d9SStanislav Sedov 14210daf62d9SStanislav Sedov /* 14220daf62d9SStanislav Sedov * Descriptor flags to filestat translation. 14230daf62d9SStanislav Sedov */ 14240daf62d9SStanislav Sedov static int 14250daf62d9SStanislav Sedov to_filestat_flags(int flags) 14260daf62d9SStanislav Sedov { 14270daf62d9SStanislav Sedov static struct { 14280daf62d9SStanislav Sedov int flag; 14290daf62d9SStanislav Sedov int fst_flag; 14300daf62d9SStanislav Sedov } fstflags[] = { 14310daf62d9SStanislav Sedov { FREAD, PS_FST_FFLAG_READ }, 14320daf62d9SStanislav Sedov { FWRITE, PS_FST_FFLAG_WRITE }, 14330daf62d9SStanislav Sedov { O_APPEND, PS_FST_FFLAG_APPEND }, 14340daf62d9SStanislav Sedov { O_ASYNC, PS_FST_FFLAG_ASYNC }, 14350daf62d9SStanislav Sedov { O_CREAT, PS_FST_FFLAG_CREAT }, 14360daf62d9SStanislav Sedov { O_DIRECT, PS_FST_FFLAG_DIRECT }, 14370daf62d9SStanislav Sedov { O_EXCL, PS_FST_FFLAG_EXCL }, 14380daf62d9SStanislav Sedov { O_EXEC, PS_FST_FFLAG_EXEC }, 14390daf62d9SStanislav Sedov { O_EXLOCK, PS_FST_FFLAG_EXLOCK }, 14400daf62d9SStanislav Sedov { O_NOFOLLOW, PS_FST_FFLAG_NOFOLLOW }, 14410daf62d9SStanislav Sedov { O_NONBLOCK, PS_FST_FFLAG_NONBLOCK }, 14420daf62d9SStanislav Sedov { O_SHLOCK, PS_FST_FFLAG_SHLOCK }, 14430daf62d9SStanislav Sedov { O_SYNC, PS_FST_FFLAG_SYNC }, 14440daf62d9SStanislav Sedov { O_TRUNC, PS_FST_FFLAG_TRUNC } 14450daf62d9SStanislav Sedov }; 14460daf62d9SStanislav Sedov #define NFSTFLAGS (sizeof(fstflags) / sizeof(*fstflags)) 14470daf62d9SStanislav Sedov int fst_flags; 14480daf62d9SStanislav Sedov unsigned int i; 14490daf62d9SStanislav Sedov 14500daf62d9SStanislav Sedov fst_flags = 0; 14510daf62d9SStanislav Sedov for (i = 0; i < NFSTFLAGS; i++) 14520daf62d9SStanislav Sedov if (flags & fstflags[i].flag) 14530daf62d9SStanislav Sedov fst_flags |= fstflags[i].fst_flag; 14540daf62d9SStanislav Sedov return (fst_flags); 14550daf62d9SStanislav Sedov } 14560daf62d9SStanislav Sedov 14570daf62d9SStanislav Sedov /* 14580daf62d9SStanislav Sedov * Vnode type to filestate translation. 14590daf62d9SStanislav Sedov */ 14600daf62d9SStanislav Sedov static int 14610daf62d9SStanislav Sedov vntype2psfsttype(int type) 14620daf62d9SStanislav Sedov { 14630daf62d9SStanislav Sedov static struct { 14640daf62d9SStanislav Sedov int vtype; 14650daf62d9SStanislav Sedov int fst_vtype; 14660daf62d9SStanislav Sedov } vt2fst[] = { 14670daf62d9SStanislav Sedov { VBAD, PS_FST_VTYPE_VBAD }, 14680daf62d9SStanislav Sedov { VBLK, PS_FST_VTYPE_VBLK }, 14690daf62d9SStanislav Sedov { VCHR, PS_FST_VTYPE_VCHR }, 14700daf62d9SStanislav Sedov { VDIR, PS_FST_VTYPE_VDIR }, 14710daf62d9SStanislav Sedov { VFIFO, PS_FST_VTYPE_VFIFO }, 14720daf62d9SStanislav Sedov { VLNK, PS_FST_VTYPE_VLNK }, 14730daf62d9SStanislav Sedov { VNON, PS_FST_VTYPE_VNON }, 14740daf62d9SStanislav Sedov { VREG, PS_FST_VTYPE_VREG }, 14750daf62d9SStanislav Sedov { VSOCK, PS_FST_VTYPE_VSOCK } 14760daf62d9SStanislav Sedov }; 14770daf62d9SStanislav Sedov #define NVFTYPES (sizeof(vt2fst) / sizeof(*vt2fst)) 14780daf62d9SStanislav Sedov unsigned int i, fst_type; 14790daf62d9SStanislav Sedov 14800daf62d9SStanislav Sedov fst_type = PS_FST_VTYPE_UNKNOWN; 14810daf62d9SStanislav Sedov for (i = 0; i < NVFTYPES; i++) { 14820daf62d9SStanislav Sedov if (type == vt2fst[i].vtype) { 14830daf62d9SStanislav Sedov fst_type = vt2fst[i].fst_vtype; 14840daf62d9SStanislav Sedov break; 14850daf62d9SStanislav Sedov } 14860daf62d9SStanislav Sedov } 14870daf62d9SStanislav Sedov return (fst_type); 14880daf62d9SStanislav Sedov } 14890daf62d9SStanislav Sedov 14900daf62d9SStanislav Sedov static char * 14910daf62d9SStanislav Sedov getmnton(kvm_t *kd, struct mount *m) 14920daf62d9SStanislav Sedov { 14935f301949SBen Laurie struct mount mnt; 14940daf62d9SStanislav Sedov static struct mtab { 14950daf62d9SStanislav Sedov struct mtab *next; 14960daf62d9SStanislav Sedov struct mount *m; 14970daf62d9SStanislav Sedov char mntonname[MNAMELEN + 1]; 14980daf62d9SStanislav Sedov } *mhead = NULL; 14990daf62d9SStanislav Sedov struct mtab *mt; 15000daf62d9SStanislav Sedov 15010daf62d9SStanislav Sedov for (mt = mhead; mt != NULL; mt = mt->next) 15020daf62d9SStanislav Sedov if (m == mt->m) 15030daf62d9SStanislav Sedov return (mt->mntonname); 15040daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)m, &mnt, sizeof(struct mount))) { 15050daf62d9SStanislav Sedov warnx("can't read mount table at %p", (void *)m); 15060daf62d9SStanislav Sedov return (NULL); 15070daf62d9SStanislav Sedov } 15080daf62d9SStanislav Sedov if ((mt = malloc(sizeof (struct mtab))) == NULL) 15090daf62d9SStanislav Sedov err(1, NULL); 15100daf62d9SStanislav Sedov mt->m = m; 15110daf62d9SStanislav Sedov bcopy(&mnt.mnt_stat.f_mntonname[0], &mt->mntonname[0], MNAMELEN); 15125f301949SBen Laurie mt->mntonname[MNAMELEN] = '\0'; 15130daf62d9SStanislav Sedov mt->next = mhead; 15140daf62d9SStanislav Sedov mhead = mt; 15150daf62d9SStanislav Sedov return (mt->mntonname); 15160daf62d9SStanislav Sedov } 15177153ad2bSMikolaj Golub 151839680c7bSMikolaj Golub static struct kinfo_vmentry * 151939680c7bSMikolaj Golub kinfo_getvmmap_core(struct procstat_core *core, int *cntp) 152039680c7bSMikolaj Golub { 152139680c7bSMikolaj Golub int cnt; 152239680c7bSMikolaj Golub size_t len; 152339680c7bSMikolaj Golub char *buf, *bp, *eb; 152439680c7bSMikolaj Golub struct kinfo_vmentry *kiv, *kp, *kv; 152539680c7bSMikolaj Golub 152639680c7bSMikolaj Golub buf = procstat_core_get(core, PSC_TYPE_VMMAP, NULL, &len); 152739680c7bSMikolaj Golub if (buf == NULL) 152839680c7bSMikolaj Golub return (NULL); 152939680c7bSMikolaj Golub 153039680c7bSMikolaj Golub /* 153139680c7bSMikolaj Golub * XXXMG: The code below is just copy&past from libutil. 153239680c7bSMikolaj Golub * The code duplication can be avoided if libutil 153339680c7bSMikolaj Golub * is extended to provide something like: 153439680c7bSMikolaj Golub * struct kinfo_vmentry *kinfo_getvmmap_from_buf(const char *buf, 153539680c7bSMikolaj Golub * size_t len, int *cntp); 153639680c7bSMikolaj Golub */ 153739680c7bSMikolaj Golub 153839680c7bSMikolaj Golub /* Pass 1: count items */ 153939680c7bSMikolaj Golub cnt = 0; 154039680c7bSMikolaj Golub bp = buf; 154139680c7bSMikolaj Golub eb = buf + len; 154239680c7bSMikolaj Golub while (bp < eb) { 154339680c7bSMikolaj Golub kv = (struct kinfo_vmentry *)(uintptr_t)bp; 154439680c7bSMikolaj Golub bp += kv->kve_structsize; 154539680c7bSMikolaj Golub cnt++; 154639680c7bSMikolaj Golub } 154739680c7bSMikolaj Golub 154839680c7bSMikolaj Golub kiv = calloc(cnt, sizeof(*kiv)); 154939680c7bSMikolaj Golub if (kiv == NULL) { 155039680c7bSMikolaj Golub free(buf); 155139680c7bSMikolaj Golub return (NULL); 155239680c7bSMikolaj Golub } 155339680c7bSMikolaj Golub bp = buf; 155439680c7bSMikolaj Golub eb = buf + len; 155539680c7bSMikolaj Golub kp = kiv; 155639680c7bSMikolaj Golub /* Pass 2: unpack */ 155739680c7bSMikolaj Golub while (bp < eb) { 155839680c7bSMikolaj Golub kv = (struct kinfo_vmentry *)(uintptr_t)bp; 155939680c7bSMikolaj Golub /* Copy/expand into pre-zeroed buffer */ 156039680c7bSMikolaj Golub memcpy(kp, kv, kv->kve_structsize); 156139680c7bSMikolaj Golub /* Advance to next packed record */ 156239680c7bSMikolaj Golub bp += kv->kve_structsize; 156339680c7bSMikolaj Golub /* Set field size to fixed length, advance */ 156439680c7bSMikolaj Golub kp->kve_structsize = sizeof(*kp); 156539680c7bSMikolaj Golub kp++; 156639680c7bSMikolaj Golub } 156739680c7bSMikolaj Golub free(buf); 156839680c7bSMikolaj Golub *cntp = cnt; 156939680c7bSMikolaj Golub return (kiv); /* Caller must free() return value */ 157039680c7bSMikolaj Golub } 157139680c7bSMikolaj Golub 157239680c7bSMikolaj Golub struct kinfo_vmentry * 157339680c7bSMikolaj Golub procstat_getvmmap(struct procstat *procstat, struct kinfo_proc *kp, 157439680c7bSMikolaj Golub unsigned int *cntp) 157539680c7bSMikolaj Golub { 157639680c7bSMikolaj Golub switch(procstat->type) { 157739680c7bSMikolaj Golub case PROCSTAT_KVM: 157839680c7bSMikolaj Golub warnx("kvm method is not supported"); 157939680c7bSMikolaj Golub return (NULL); 158039680c7bSMikolaj Golub case PROCSTAT_SYSCTL: 158139680c7bSMikolaj Golub return (kinfo_getvmmap(kp->ki_pid, cntp)); 158239680c7bSMikolaj Golub case PROCSTAT_CORE: 158339680c7bSMikolaj Golub return (kinfo_getvmmap_core(procstat->core, cntp)); 158439680c7bSMikolaj Golub default: 158539680c7bSMikolaj Golub warnx("unknown access method: %d", procstat->type); 158639680c7bSMikolaj Golub return (NULL); 158739680c7bSMikolaj Golub } 158839680c7bSMikolaj Golub } 158939680c7bSMikolaj Golub 159039680c7bSMikolaj Golub void 159139680c7bSMikolaj Golub procstat_freevmmap(struct procstat *procstat __unused, 159239680c7bSMikolaj Golub struct kinfo_vmentry *vmmap) 159339680c7bSMikolaj Golub { 159439680c7bSMikolaj Golub 159539680c7bSMikolaj Golub free(vmmap); 159639680c7bSMikolaj Golub } 15977f1d14e6SMikolaj Golub 15987f1d14e6SMikolaj Golub static gid_t * 15997f1d14e6SMikolaj Golub procstat_getgroups_sysctl(pid_t pid, unsigned int *cntp) 16007f1d14e6SMikolaj Golub { 16017f1d14e6SMikolaj Golub int mib[4]; 16027f1d14e6SMikolaj Golub size_t len; 16037f1d14e6SMikolaj Golub gid_t *groups; 16047f1d14e6SMikolaj Golub 16057f1d14e6SMikolaj Golub mib[0] = CTL_KERN; 16067f1d14e6SMikolaj Golub mib[1] = KERN_PROC; 16077f1d14e6SMikolaj Golub mib[2] = KERN_PROC_GROUPS; 16087f1d14e6SMikolaj Golub mib[3] = pid; 16097f1d14e6SMikolaj Golub len = (sysconf(_SC_NGROUPS_MAX) + 1) * sizeof(gid_t); 16107f1d14e6SMikolaj Golub groups = malloc(len); 16117f1d14e6SMikolaj Golub if (groups == NULL) { 16127f1d14e6SMikolaj Golub warn("malloc(%zu)", len); 16137f1d14e6SMikolaj Golub return (NULL); 16147f1d14e6SMikolaj Golub } 16157f1d14e6SMikolaj Golub if (sysctl(mib, 4, groups, &len, NULL, 0) == -1) { 16167f1d14e6SMikolaj Golub warn("sysctl: kern.proc.groups: %d", pid); 16177f1d14e6SMikolaj Golub free(groups); 16187f1d14e6SMikolaj Golub return (NULL); 16197f1d14e6SMikolaj Golub } 16207f1d14e6SMikolaj Golub *cntp = len / sizeof(gid_t); 16217f1d14e6SMikolaj Golub return (groups); 16227f1d14e6SMikolaj Golub } 16237f1d14e6SMikolaj Golub 16247f1d14e6SMikolaj Golub static gid_t * 16257f1d14e6SMikolaj Golub procstat_getgroups_core(struct procstat_core *core, unsigned int *cntp) 16267f1d14e6SMikolaj Golub { 16277f1d14e6SMikolaj Golub size_t len; 16287f1d14e6SMikolaj Golub gid_t *groups; 16297f1d14e6SMikolaj Golub 16307f1d14e6SMikolaj Golub groups = procstat_core_get(core, PSC_TYPE_GROUPS, NULL, &len); 16317f1d14e6SMikolaj Golub if (groups == NULL) 16327f1d14e6SMikolaj Golub return (NULL); 16337f1d14e6SMikolaj Golub *cntp = len / sizeof(gid_t); 16347f1d14e6SMikolaj Golub return (groups); 16357f1d14e6SMikolaj Golub } 16367f1d14e6SMikolaj Golub 16377f1d14e6SMikolaj Golub gid_t * 16387f1d14e6SMikolaj Golub procstat_getgroups(struct procstat *procstat, struct kinfo_proc *kp, 16397f1d14e6SMikolaj Golub unsigned int *cntp) 16407f1d14e6SMikolaj Golub { 16417f1d14e6SMikolaj Golub switch(procstat->type) { 16427f1d14e6SMikolaj Golub case PROCSTAT_KVM: 16437f1d14e6SMikolaj Golub warnx("kvm method is not supported"); 16447f1d14e6SMikolaj Golub return (NULL); 16457f1d14e6SMikolaj Golub case PROCSTAT_SYSCTL: 16467f1d14e6SMikolaj Golub return (procstat_getgroups_sysctl(kp->ki_pid, cntp)); 16477f1d14e6SMikolaj Golub case PROCSTAT_CORE: 16487f1d14e6SMikolaj Golub return (procstat_getgroups_core(procstat->core, cntp)); 16497f1d14e6SMikolaj Golub default: 16507f1d14e6SMikolaj Golub warnx("unknown access method: %d", procstat->type); 16517f1d14e6SMikolaj Golub return (NULL); 16527f1d14e6SMikolaj Golub } 16537f1d14e6SMikolaj Golub } 16547f1d14e6SMikolaj Golub 16557f1d14e6SMikolaj Golub void 16567f1d14e6SMikolaj Golub procstat_freegroups(struct procstat *procstat __unused, gid_t *groups) 16577f1d14e6SMikolaj Golub { 16587f1d14e6SMikolaj Golub 16597f1d14e6SMikolaj Golub free(groups); 16607f1d14e6SMikolaj Golub } 1661*5b9bcba9SMikolaj Golub 1662*5b9bcba9SMikolaj Golub static int 1663*5b9bcba9SMikolaj Golub procstat_getumask_sysctl(pid_t pid, unsigned short *maskp) 1664*5b9bcba9SMikolaj Golub { 1665*5b9bcba9SMikolaj Golub int error; 1666*5b9bcba9SMikolaj Golub int mib[4]; 1667*5b9bcba9SMikolaj Golub size_t len; 1668*5b9bcba9SMikolaj Golub 1669*5b9bcba9SMikolaj Golub mib[0] = CTL_KERN; 1670*5b9bcba9SMikolaj Golub mib[1] = KERN_PROC; 1671*5b9bcba9SMikolaj Golub mib[2] = KERN_PROC_UMASK; 1672*5b9bcba9SMikolaj Golub mib[3] = pid; 1673*5b9bcba9SMikolaj Golub len = sizeof(*maskp); 1674*5b9bcba9SMikolaj Golub error = sysctl(mib, 4, maskp, &len, NULL, 0); 1675*5b9bcba9SMikolaj Golub if (error != 0 && errno != ESRCH) 1676*5b9bcba9SMikolaj Golub warn("sysctl: kern.proc.umask: %d", pid); 1677*5b9bcba9SMikolaj Golub return (error); 1678*5b9bcba9SMikolaj Golub } 1679*5b9bcba9SMikolaj Golub 1680*5b9bcba9SMikolaj Golub static int 1681*5b9bcba9SMikolaj Golub procstat_getumask_core(struct procstat_core *core, unsigned short *maskp) 1682*5b9bcba9SMikolaj Golub { 1683*5b9bcba9SMikolaj Golub size_t len; 1684*5b9bcba9SMikolaj Golub unsigned short *buf; 1685*5b9bcba9SMikolaj Golub 1686*5b9bcba9SMikolaj Golub buf = procstat_core_get(core, PSC_TYPE_UMASK, NULL, &len); 1687*5b9bcba9SMikolaj Golub if (buf == NULL) 1688*5b9bcba9SMikolaj Golub return (-1); 1689*5b9bcba9SMikolaj Golub if (len < sizeof(*maskp)) { 1690*5b9bcba9SMikolaj Golub free(buf); 1691*5b9bcba9SMikolaj Golub return (-1); 1692*5b9bcba9SMikolaj Golub } 1693*5b9bcba9SMikolaj Golub *maskp = *buf; 1694*5b9bcba9SMikolaj Golub free(buf); 1695*5b9bcba9SMikolaj Golub return (0); 1696*5b9bcba9SMikolaj Golub } 1697*5b9bcba9SMikolaj Golub 1698*5b9bcba9SMikolaj Golub int 1699*5b9bcba9SMikolaj Golub procstat_getumask(struct procstat *procstat, struct kinfo_proc *kp, 1700*5b9bcba9SMikolaj Golub unsigned short *maskp) 1701*5b9bcba9SMikolaj Golub { 1702*5b9bcba9SMikolaj Golub switch(procstat->type) { 1703*5b9bcba9SMikolaj Golub case PROCSTAT_KVM: 1704*5b9bcba9SMikolaj Golub warnx("kvm method is not supported"); 1705*5b9bcba9SMikolaj Golub return (-1); 1706*5b9bcba9SMikolaj Golub case PROCSTAT_SYSCTL: 1707*5b9bcba9SMikolaj Golub return (procstat_getumask_sysctl(kp->ki_pid, maskp)); 1708*5b9bcba9SMikolaj Golub case PROCSTAT_CORE: 1709*5b9bcba9SMikolaj Golub return (procstat_getumask_core(procstat->core, maskp)); 1710*5b9bcba9SMikolaj Golub default: 1711*5b9bcba9SMikolaj Golub warnx("unknown access method: %d", procstat->type); 1712*5b9bcba9SMikolaj Golub return (-1); 1713*5b9bcba9SMikolaj Golub } 1714*5b9bcba9SMikolaj Golub } 1715