10daf62d9SStanislav Sedov /*- 2df57947fSPedro F. Giffuni * SPDX-License-Identifier: BSD-4-Clause 3df57947fSPedro F. Giffuni * 486be94fcSTycho Nightingale * Copyright (c) 2017 Dell EMC 50daf62d9SStanislav Sedov * Copyright (c) 2009 Stanislav Sedov <stas@FreeBSD.org> 60daf62d9SStanislav Sedov * Copyright (c) 1988, 1993 70daf62d9SStanislav Sedov * The Regents of the University of California. All rights reserved. 80daf62d9SStanislav Sedov * 90daf62d9SStanislav Sedov * Redistribution and use in source and binary forms, with or without 100daf62d9SStanislav Sedov * modification, are permitted provided that the following conditions 110daf62d9SStanislav Sedov * are met: 120daf62d9SStanislav Sedov * 1. Redistributions of source code must retain the above copyright 130daf62d9SStanislav Sedov * notice, this list of conditions and the following disclaimer. 140daf62d9SStanislav Sedov * 2. Redistributions in binary form must reproduce the above copyright 150daf62d9SStanislav Sedov * notice, this list of conditions and the following disclaimer in the 160daf62d9SStanislav Sedov * documentation and/or other materials provided with the distribution. 170daf62d9SStanislav Sedov * 3. All advertising materials mentioning features or use of this software 180daf62d9SStanislav Sedov * must display the following acknowledgement: 190daf62d9SStanislav Sedov * This product includes software developed by the University of 200daf62d9SStanislav Sedov * California, Berkeley and its contributors. 210daf62d9SStanislav Sedov * 4. Neither the name of the University nor the names of its contributors 220daf62d9SStanislav Sedov * may be used to endorse or promote products derived from this software 230daf62d9SStanislav Sedov * without specific prior written permission. 240daf62d9SStanislav Sedov * 250daf62d9SStanislav Sedov * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 260daf62d9SStanislav Sedov * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 270daf62d9SStanislav Sedov * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 280daf62d9SStanislav Sedov * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 290daf62d9SStanislav Sedov * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 300daf62d9SStanislav Sedov * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 310daf62d9SStanislav Sedov * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 320daf62d9SStanislav Sedov * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 330daf62d9SStanislav Sedov * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 340daf62d9SStanislav Sedov * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 350daf62d9SStanislav Sedov * SUCH DAMAGE. 360daf62d9SStanislav Sedov */ 370daf62d9SStanislav Sedov 380daf62d9SStanislav Sedov #include <sys/cdefs.h> 390daf62d9SStanislav Sedov #include <sys/param.h> 402ff020d3SMikolaj Golub #include <sys/elf.h> 410daf62d9SStanislav Sedov #include <sys/time.h> 427cc0ebfdSMikolaj Golub #include <sys/resourcevar.h> 431f84c47eSMikolaj Golub #define _WANT_UCRED 441f84c47eSMikolaj Golub #include <sys/ucred.h> 451f84c47eSMikolaj Golub #undef _WANT_UCRED 460daf62d9SStanislav Sedov #include <sys/proc.h> 470daf62d9SStanislav Sedov #include <sys/user.h> 480daf62d9SStanislav Sedov #include <sys/stat.h> 490daf62d9SStanislav Sedov #include <sys/vnode.h> 500daf62d9SStanislav Sedov #include <sys/socket.h> 510e229f34SGleb Smirnoff #define _WANT_SOCKET 520daf62d9SStanislav Sedov #include <sys/socketvar.h> 530daf62d9SStanislav Sedov #include <sys/domain.h> 540daf62d9SStanislav Sedov #include <sys/protosw.h> 550daf62d9SStanislav Sedov #include <sys/un.h> 560e229f34SGleb Smirnoff #define _WANT_UNPCB 570daf62d9SStanislav Sedov #include <sys/unpcb.h> 580daf62d9SStanislav Sedov #include <sys/sysctl.h> 590daf62d9SStanislav Sedov #include <sys/tty.h> 600daf62d9SStanislav Sedov #include <sys/filedesc.h> 610daf62d9SStanislav Sedov #include <sys/queue.h> 620daf62d9SStanislav Sedov #define _WANT_FILE 630daf62d9SStanislav Sedov #include <sys/file.h> 640daf62d9SStanislav Sedov #include <sys/conf.h> 65958aa575SJohn Baldwin #include <sys/ksem.h> 66e506e182SJohn Baldwin #include <sys/mman.h> 67b881b8beSRobert Watson #include <sys/capsicum.h> 68a4ba6502STycho Nightingale #include <sys/ptrace.h> 69d485c77fSKonstantin Belousov #define _WANT_MOUNT 700daf62d9SStanislav Sedov #include <sys/mount.h> 719e5787d2SMatt Macy #include <sys/filedesc.h> 720daf62d9SStanislav Sedov #include <sys/pipe.h> 730daf62d9SStanislav Sedov #include <fs/devfs/devfs.h> 740daf62d9SStanislav Sedov #include <fs/devfs/devfs_int.h> 750daf62d9SStanislav Sedov #include <nfs/nfsproto.h> 760daf62d9SStanislav Sedov #include <nfsclient/nfs.h> 770daf62d9SStanislav Sedov #include <nfsclient/nfsnode.h> 780daf62d9SStanislav Sedov 790daf62d9SStanislav Sedov #include <vm/vm.h> 800daf62d9SStanislav Sedov #include <vm/vm_map.h> 810daf62d9SStanislav Sedov #include <vm/vm_object.h> 820daf62d9SStanislav Sedov 830daf62d9SStanislav Sedov #include <net/route.h> 840daf62d9SStanislav Sedov #include <netinet/in.h> 850daf62d9SStanislav Sedov #include <netinet/in_systm.h> 860daf62d9SStanislav Sedov #include <netinet/ip.h> 87cc65eb4eSGleb Smirnoff #define _WANT_INPCB 880daf62d9SStanislav Sedov #include <netinet/in_pcb.h> 890daf62d9SStanislav Sedov 900daf62d9SStanislav Sedov #include <assert.h> 910daf62d9SStanislav Sedov #include <ctype.h> 920daf62d9SStanislav Sedov #include <err.h> 930daf62d9SStanislav Sedov #include <fcntl.h> 940daf62d9SStanislav Sedov #include <kvm.h> 950daf62d9SStanislav Sedov #include <libutil.h> 960daf62d9SStanislav Sedov #include <limits.h> 970daf62d9SStanislav Sedov #include <paths.h> 980daf62d9SStanislav Sedov #include <pwd.h> 990daf62d9SStanislav Sedov #include <stdio.h> 1000daf62d9SStanislav Sedov #include <stdlib.h> 1010daf62d9SStanislav Sedov #include <stddef.h> 1020daf62d9SStanislav Sedov #include <string.h> 1030daf62d9SStanislav Sedov #include <unistd.h> 1040daf62d9SStanislav Sedov #include <netdb.h> 1050daf62d9SStanislav Sedov 1060daf62d9SStanislav Sedov #include <libprocstat.h> 1070daf62d9SStanislav Sedov #include "libprocstat_internal.h" 1080daf62d9SStanislav Sedov #include "common_kvm.h" 1097153ad2bSMikolaj Golub #include "core.h" 1100daf62d9SStanislav Sedov 1110daf62d9SStanislav Sedov int statfs(const char *, struct statfs *); /* XXX */ 1120daf62d9SStanislav Sedov 1130daf62d9SStanislav Sedov #define PROCSTAT_KVM 1 1140daf62d9SStanislav Sedov #define PROCSTAT_SYSCTL 2 1157153ad2bSMikolaj Golub #define PROCSTAT_CORE 3 1160daf62d9SStanislav Sedov 1174482b5e3SMikolaj Golub static char **getargv(struct procstat *procstat, struct kinfo_proc *kp, 1184482b5e3SMikolaj Golub size_t nchr, int env); 1190daf62d9SStanislav Sedov static char *getmnton(kvm_t *kd, struct mount *m); 12039680c7bSMikolaj Golub static struct kinfo_vmentry * kinfo_getvmmap_core(struct procstat_core *core, 12139680c7bSMikolaj Golub int *cntp); 1222ff020d3SMikolaj Golub static Elf_Auxinfo *procstat_getauxv_core(struct procstat_core *core, 1232ff020d3SMikolaj Golub unsigned int *cntp); 1242ff020d3SMikolaj Golub static Elf_Auxinfo *procstat_getauxv_sysctl(pid_t pid, unsigned int *cntp); 1250daf62d9SStanislav Sedov static struct filestat_list *procstat_getfiles_kvm( 1260daf62d9SStanislav Sedov struct procstat *procstat, struct kinfo_proc *kp, int mmapped); 1270daf62d9SStanislav Sedov static struct filestat_list *procstat_getfiles_sysctl( 1280daf62d9SStanislav Sedov struct procstat *procstat, struct kinfo_proc *kp, int mmapped); 1290daf62d9SStanislav Sedov static int procstat_get_pipe_info_sysctl(struct filestat *fst, 1300daf62d9SStanislav Sedov struct pipestat *pipe, char *errbuf); 1310daf62d9SStanislav Sedov static int procstat_get_pipe_info_kvm(kvm_t *kd, struct filestat *fst, 1320daf62d9SStanislav Sedov struct pipestat *pipe, char *errbuf); 1330daf62d9SStanislav Sedov static int procstat_get_pts_info_sysctl(struct filestat *fst, 1340daf62d9SStanislav Sedov struct ptsstat *pts, char *errbuf); 1350daf62d9SStanislav Sedov static int procstat_get_pts_info_kvm(kvm_t *kd, struct filestat *fst, 1360daf62d9SStanislav Sedov struct ptsstat *pts, char *errbuf); 137958aa575SJohn Baldwin static int procstat_get_sem_info_sysctl(struct filestat *fst, 138958aa575SJohn Baldwin struct semstat *sem, char *errbuf); 139958aa575SJohn Baldwin static int procstat_get_sem_info_kvm(kvm_t *kd, struct filestat *fst, 140958aa575SJohn Baldwin struct semstat *sem, char *errbuf); 141e506e182SJohn Baldwin static int procstat_get_shm_info_sysctl(struct filestat *fst, 142e506e182SJohn Baldwin struct shmstat *shm, char *errbuf); 143e506e182SJohn Baldwin static int procstat_get_shm_info_kvm(kvm_t *kd, struct filestat *fst, 144e506e182SJohn Baldwin struct shmstat *shm, char *errbuf); 1450daf62d9SStanislav Sedov static int procstat_get_socket_info_sysctl(struct filestat *fst, 1460daf62d9SStanislav Sedov struct sockstat *sock, char *errbuf); 1470daf62d9SStanislav Sedov static int procstat_get_socket_info_kvm(kvm_t *kd, struct filestat *fst, 1480daf62d9SStanislav Sedov struct sockstat *sock, char *errbuf); 1490daf62d9SStanislav Sedov static int to_filestat_flags(int flags); 1500daf62d9SStanislav Sedov static int procstat_get_vnode_info_kvm(kvm_t *kd, struct filestat *fst, 1510daf62d9SStanislav Sedov struct vnstat *vn, char *errbuf); 1520daf62d9SStanislav Sedov static int procstat_get_vnode_info_sysctl(struct filestat *fst, 1530daf62d9SStanislav Sedov struct vnstat *vn, char *errbuf); 1547f1d14e6SMikolaj Golub static gid_t *procstat_getgroups_core(struct procstat_core *core, 1557f1d14e6SMikolaj Golub unsigned int *count); 1561f84c47eSMikolaj Golub static gid_t * procstat_getgroups_kvm(kvm_t *kd, struct kinfo_proc *kp, 1571f84c47eSMikolaj Golub unsigned int *count); 1587f1d14e6SMikolaj Golub static gid_t *procstat_getgroups_sysctl(pid_t pid, unsigned int *count); 15989358231SMikolaj Golub static struct kinfo_kstack *procstat_getkstack_sysctl(pid_t pid, 16089358231SMikolaj Golub int *cntp); 1611f84c47eSMikolaj Golub static int procstat_getosrel_core(struct procstat_core *core, 1621f84c47eSMikolaj Golub int *osrelp); 1631f84c47eSMikolaj Golub static int procstat_getosrel_kvm(kvm_t *kd, struct kinfo_proc *kp, 1641f84c47eSMikolaj Golub int *osrelp); 1651f84c47eSMikolaj Golub static int procstat_getosrel_sysctl(pid_t pid, int *osrelp); 1664cdf9796SMikolaj Golub static int procstat_getpathname_core(struct procstat_core *core, 1674cdf9796SMikolaj Golub char *pathname, size_t maxlen); 1684cdf9796SMikolaj Golub static int procstat_getpathname_sysctl(pid_t pid, char *pathname, 1694cdf9796SMikolaj Golub size_t maxlen); 1707cc0ebfdSMikolaj Golub static int procstat_getrlimit_core(struct procstat_core *core, int which, 1717cc0ebfdSMikolaj Golub struct rlimit* rlimit); 1721f84c47eSMikolaj Golub static int procstat_getrlimit_kvm(kvm_t *kd, struct kinfo_proc *kp, 1731f84c47eSMikolaj Golub int which, struct rlimit* rlimit); 1747cc0ebfdSMikolaj Golub static int procstat_getrlimit_sysctl(pid_t pid, int which, 1757cc0ebfdSMikolaj Golub struct rlimit* rlimit); 1765b9bcba9SMikolaj Golub static int procstat_getumask_core(struct procstat_core *core, 1775b9bcba9SMikolaj Golub unsigned short *maskp); 1781f84c47eSMikolaj Golub static int procstat_getumask_kvm(kvm_t *kd, struct kinfo_proc *kp, 1791f84c47eSMikolaj Golub unsigned short *maskp); 1805b9bcba9SMikolaj Golub static int procstat_getumask_sysctl(pid_t pid, unsigned short *maskp); 1810daf62d9SStanislav Sedov static int vntype2psfsttype(int type); 1820daf62d9SStanislav Sedov 1830daf62d9SStanislav Sedov void 1840daf62d9SStanislav Sedov procstat_close(struct procstat *procstat) 1850daf62d9SStanislav Sedov { 1860daf62d9SStanislav Sedov 1870daf62d9SStanislav Sedov assert(procstat); 1880daf62d9SStanislav Sedov if (procstat->type == PROCSTAT_KVM) 1890daf62d9SStanislav Sedov kvm_close(procstat->kd); 1907153ad2bSMikolaj Golub else if (procstat->type == PROCSTAT_CORE) 1917153ad2bSMikolaj Golub procstat_core_close(procstat->core); 1924482b5e3SMikolaj Golub procstat_freeargv(procstat); 1934482b5e3SMikolaj Golub procstat_freeenvv(procstat); 194d7b666aeSSergey Kandaurov free(procstat); 1950daf62d9SStanislav Sedov } 1960daf62d9SStanislav Sedov 1970daf62d9SStanislav Sedov struct procstat * 1980daf62d9SStanislav Sedov procstat_open_sysctl(void) 1990daf62d9SStanislav Sedov { 2000daf62d9SStanislav Sedov struct procstat *procstat; 2010daf62d9SStanislav Sedov 2020daf62d9SStanislav Sedov procstat = calloc(1, sizeof(*procstat)); 2030daf62d9SStanislav Sedov if (procstat == NULL) { 2040daf62d9SStanislav Sedov warn("malloc()"); 2050daf62d9SStanislav Sedov return (NULL); 2060daf62d9SStanislav Sedov } 2070daf62d9SStanislav Sedov procstat->type = PROCSTAT_SYSCTL; 2080daf62d9SStanislav Sedov return (procstat); 2090daf62d9SStanislav Sedov } 2100daf62d9SStanislav Sedov 2110daf62d9SStanislav Sedov struct procstat * 2120daf62d9SStanislav Sedov procstat_open_kvm(const char *nlistf, const char *memf) 2130daf62d9SStanislav Sedov { 2140daf62d9SStanislav Sedov struct procstat *procstat; 2150daf62d9SStanislav Sedov kvm_t *kd; 2160daf62d9SStanislav Sedov char buf[_POSIX2_LINE_MAX]; 2170daf62d9SStanislav Sedov 2180daf62d9SStanislav Sedov procstat = calloc(1, sizeof(*procstat)); 2190daf62d9SStanislav Sedov if (procstat == NULL) { 2200daf62d9SStanislav Sedov warn("malloc()"); 2210daf62d9SStanislav Sedov return (NULL); 2220daf62d9SStanislav Sedov } 2230daf62d9SStanislav Sedov kd = kvm_openfiles(nlistf, memf, NULL, O_RDONLY, buf); 2240daf62d9SStanislav Sedov if (kd == NULL) { 2250daf62d9SStanislav Sedov warnx("kvm_openfiles(): %s", buf); 2260daf62d9SStanislav Sedov free(procstat); 2270daf62d9SStanislav Sedov return (NULL); 2280daf62d9SStanislav Sedov } 2290daf62d9SStanislav Sedov procstat->type = PROCSTAT_KVM; 2300daf62d9SStanislav Sedov procstat->kd = kd; 2310daf62d9SStanislav Sedov return (procstat); 2320daf62d9SStanislav Sedov } 2330daf62d9SStanislav Sedov 2347153ad2bSMikolaj Golub struct procstat * 2357153ad2bSMikolaj Golub procstat_open_core(const char *filename) 2367153ad2bSMikolaj Golub { 2377153ad2bSMikolaj Golub struct procstat *procstat; 2387153ad2bSMikolaj Golub struct procstat_core *core; 2397153ad2bSMikolaj Golub 2407153ad2bSMikolaj Golub procstat = calloc(1, sizeof(*procstat)); 2417153ad2bSMikolaj Golub if (procstat == NULL) { 2427153ad2bSMikolaj Golub warn("malloc()"); 2437153ad2bSMikolaj Golub return (NULL); 2447153ad2bSMikolaj Golub } 2457153ad2bSMikolaj Golub core = procstat_core_open(filename); 2467153ad2bSMikolaj Golub if (core == NULL) { 2477153ad2bSMikolaj Golub free(procstat); 2487153ad2bSMikolaj Golub return (NULL); 2497153ad2bSMikolaj Golub } 2507153ad2bSMikolaj Golub procstat->type = PROCSTAT_CORE; 2517153ad2bSMikolaj Golub procstat->core = core; 2527153ad2bSMikolaj Golub return (procstat); 2537153ad2bSMikolaj Golub } 2547153ad2bSMikolaj Golub 2550daf62d9SStanislav Sedov struct kinfo_proc * 2560daf62d9SStanislav Sedov procstat_getprocs(struct procstat *procstat, int what, int arg, 2570daf62d9SStanislav Sedov unsigned int *count) 2580daf62d9SStanislav Sedov { 2590daf62d9SStanislav Sedov struct kinfo_proc *p0, *p; 260608203fdSJohn Baldwin size_t len, olen; 2610daf62d9SStanislav Sedov int name[4]; 262391bdfb8SAndriy Gapon int cnt; 2630daf62d9SStanislav Sedov int error; 2640daf62d9SStanislav Sedov 2650daf62d9SStanislav Sedov assert(procstat); 2660daf62d9SStanislav Sedov assert(count); 2670daf62d9SStanislav Sedov p = NULL; 2680daf62d9SStanislav Sedov if (procstat->type == PROCSTAT_KVM) { 269391bdfb8SAndriy Gapon *count = 0; 270391bdfb8SAndriy Gapon p0 = kvm_getprocs(procstat->kd, what, arg, &cnt); 271391bdfb8SAndriy Gapon if (p0 == NULL || cnt <= 0) 2720daf62d9SStanislav Sedov return (NULL); 273391bdfb8SAndriy Gapon *count = cnt; 2740daf62d9SStanislav Sedov len = *count * sizeof(*p); 2750daf62d9SStanislav Sedov p = malloc(len); 2760daf62d9SStanislav Sedov if (p == NULL) { 27765869214SJilles Tjoelker warnx("malloc(%zu)", len); 2780daf62d9SStanislav Sedov goto fail; 2790daf62d9SStanislav Sedov } 2800daf62d9SStanislav Sedov bcopy(p0, p, len); 2810daf62d9SStanislav Sedov return (p); 2820daf62d9SStanislav Sedov } else if (procstat->type == PROCSTAT_SYSCTL) { 2830daf62d9SStanislav Sedov len = 0; 2840daf62d9SStanislav Sedov name[0] = CTL_KERN; 2850daf62d9SStanislav Sedov name[1] = KERN_PROC; 2860daf62d9SStanislav Sedov name[2] = what; 2870daf62d9SStanislav Sedov name[3] = arg; 28875b6a179SEnji Cooper error = sysctl(name, nitems(name), NULL, &len, NULL, 0); 2890daf62d9SStanislav Sedov if (error < 0 && errno != EPERM) { 2900daf62d9SStanislav Sedov warn("sysctl(kern.proc)"); 2910daf62d9SStanislav Sedov goto fail; 2920daf62d9SStanislav Sedov } 2930daf62d9SStanislav Sedov if (len == 0) { 2940daf62d9SStanislav Sedov warnx("no processes?"); 2950daf62d9SStanislav Sedov goto fail; 2960daf62d9SStanislav Sedov } 297608203fdSJohn Baldwin do { 298608203fdSJohn Baldwin len += len / 10; 299608203fdSJohn Baldwin p = reallocf(p, len); 3000daf62d9SStanislav Sedov if (p == NULL) { 301608203fdSJohn Baldwin warnx("reallocf(%zu)", len); 3020daf62d9SStanislav Sedov goto fail; 3030daf62d9SStanislav Sedov } 304608203fdSJohn Baldwin olen = len; 30575b6a179SEnji Cooper error = sysctl(name, nitems(name), p, &len, NULL, 0); 306608203fdSJohn Baldwin } while (error < 0 && errno == ENOMEM && olen == len); 3070daf62d9SStanislav Sedov if (error < 0 && errno != EPERM) { 3080daf62d9SStanislav Sedov warn("sysctl(kern.proc)"); 3090daf62d9SStanislav Sedov goto fail; 3100daf62d9SStanislav Sedov } 3110daf62d9SStanislav Sedov /* Perform simple consistency checks. */ 3120daf62d9SStanislav Sedov if ((len % sizeof(*p)) != 0 || p->ki_structsize != sizeof(*p)) { 3137153ad2bSMikolaj Golub warnx("kinfo_proc structure size mismatch (len = %zu)", len); 3147153ad2bSMikolaj Golub goto fail; 3157153ad2bSMikolaj Golub } 3167153ad2bSMikolaj Golub *count = len / sizeof(*p); 3177153ad2bSMikolaj Golub return (p); 3187153ad2bSMikolaj Golub } else if (procstat->type == PROCSTAT_CORE) { 3197153ad2bSMikolaj Golub p = procstat_core_get(procstat->core, PSC_TYPE_PROC, NULL, 3207153ad2bSMikolaj Golub &len); 3217153ad2bSMikolaj Golub if ((len % sizeof(*p)) != 0 || p->ki_structsize != sizeof(*p)) { 3220daf62d9SStanislav Sedov warnx("kinfo_proc structure size mismatch"); 3230daf62d9SStanislav Sedov goto fail; 3240daf62d9SStanislav Sedov } 3250daf62d9SStanislav Sedov *count = len / sizeof(*p); 3260daf62d9SStanislav Sedov return (p); 3270daf62d9SStanislav Sedov } else { 32880905c35SJilles Tjoelker warnx("unknown access method: %d", procstat->type); 3290daf62d9SStanislav Sedov return (NULL); 3300daf62d9SStanislav Sedov } 3310daf62d9SStanislav Sedov fail: 3320daf62d9SStanislav Sedov if (p) 3330daf62d9SStanislav Sedov free(p); 3340daf62d9SStanislav Sedov return (NULL); 3350daf62d9SStanislav Sedov } 3360daf62d9SStanislav Sedov 3370daf62d9SStanislav Sedov void 3380daf62d9SStanislav Sedov procstat_freeprocs(struct procstat *procstat __unused, struct kinfo_proc *p) 3390daf62d9SStanislav Sedov { 3400daf62d9SStanislav Sedov 3410daf62d9SStanislav Sedov if (p != NULL) 3420daf62d9SStanislav Sedov free(p); 3430daf62d9SStanislav Sedov p = NULL; 3440daf62d9SStanislav Sedov } 3450daf62d9SStanislav Sedov 3460daf62d9SStanislav Sedov struct filestat_list * 3470daf62d9SStanislav Sedov procstat_getfiles(struct procstat *procstat, struct kinfo_proc *kp, int mmapped) 3480daf62d9SStanislav Sedov { 3490daf62d9SStanislav Sedov 3507153ad2bSMikolaj Golub switch (procstat->type) { 3517153ad2bSMikolaj Golub case PROCSTAT_KVM: 3520daf62d9SStanislav Sedov return (procstat_getfiles_kvm(procstat, kp, mmapped)); 3537153ad2bSMikolaj Golub case PROCSTAT_SYSCTL: 3547153ad2bSMikolaj Golub case PROCSTAT_CORE: 3557153ad2bSMikolaj Golub return (procstat_getfiles_sysctl(procstat, kp, mmapped)); 3567153ad2bSMikolaj Golub default: 3577153ad2bSMikolaj Golub warnx("unknown access method: %d", procstat->type); 3580daf62d9SStanislav Sedov return (NULL); 3590daf62d9SStanislav Sedov } 3607153ad2bSMikolaj Golub } 3610daf62d9SStanislav Sedov 3620daf62d9SStanislav Sedov void 3630daf62d9SStanislav Sedov procstat_freefiles(struct procstat *procstat, struct filestat_list *head) 3640daf62d9SStanislav Sedov { 3650daf62d9SStanislav Sedov struct filestat *fst, *tmp; 3660daf62d9SStanislav Sedov 3670daf62d9SStanislav Sedov STAILQ_FOREACH_SAFE(fst, head, next, tmp) { 3680daf62d9SStanislav Sedov if (fst->fs_path != NULL) 3690daf62d9SStanislav Sedov free(fst->fs_path); 3700daf62d9SStanislav Sedov free(fst); 3710daf62d9SStanislav Sedov } 3720daf62d9SStanislav Sedov free(head); 3730daf62d9SStanislav Sedov if (procstat->vmentries != NULL) { 3740daf62d9SStanislav Sedov free(procstat->vmentries); 3750daf62d9SStanislav Sedov procstat->vmentries = NULL; 3760daf62d9SStanislav Sedov } 3770daf62d9SStanislav Sedov if (procstat->files != NULL) { 3780daf62d9SStanislav Sedov free(procstat->files); 3790daf62d9SStanislav Sedov procstat->files = NULL; 3800daf62d9SStanislav Sedov } 3810daf62d9SStanislav Sedov } 3820daf62d9SStanislav Sedov 3830daf62d9SStanislav Sedov static struct filestat * 3840daf62d9SStanislav Sedov filestat_new_entry(void *typedep, int type, int fd, int fflags, int uflags, 3857008be5bSPawel Jakub Dawidek int refcount, off_t offset, char *path, cap_rights_t *cap_rightsp) 3860daf62d9SStanislav Sedov { 3870daf62d9SStanislav Sedov struct filestat *entry; 3880daf62d9SStanislav Sedov 3890daf62d9SStanislav Sedov entry = calloc(1, sizeof(*entry)); 3900daf62d9SStanislav Sedov if (entry == NULL) { 3910daf62d9SStanislav Sedov warn("malloc()"); 3920daf62d9SStanislav Sedov return (NULL); 3930daf62d9SStanislav Sedov } 3940daf62d9SStanislav Sedov entry->fs_typedep = typedep; 3950daf62d9SStanislav Sedov entry->fs_fflags = fflags; 3960daf62d9SStanislav Sedov entry->fs_uflags = uflags; 3970daf62d9SStanislav Sedov entry->fs_fd = fd; 3980daf62d9SStanislav Sedov entry->fs_type = type; 3990daf62d9SStanislav Sedov entry->fs_ref_count = refcount; 4000daf62d9SStanislav Sedov entry->fs_offset = offset; 4010daf62d9SStanislav Sedov entry->fs_path = path; 402772f6645SPawel Jakub Dawidek if (cap_rightsp != NULL) 4037008be5bSPawel Jakub Dawidek entry->fs_cap_rights = *cap_rightsp; 404772f6645SPawel Jakub Dawidek else 405772f6645SPawel Jakub Dawidek cap_rights_init(&entry->fs_cap_rights); 4060daf62d9SStanislav Sedov return (entry); 4070daf62d9SStanislav Sedov } 4080daf62d9SStanislav Sedov 4090daf62d9SStanislav Sedov static struct vnode * 4100daf62d9SStanislav Sedov getctty(kvm_t *kd, struct kinfo_proc *kp) 4110daf62d9SStanislav Sedov { 4120daf62d9SStanislav Sedov struct pgrp pgrp; 4130daf62d9SStanislav Sedov struct proc proc; 4140daf62d9SStanislav Sedov struct session sess; 4150daf62d9SStanislav Sedov int error; 4160daf62d9SStanislav Sedov 4170daf62d9SStanislav Sedov assert(kp); 4180daf62d9SStanislav Sedov error = kvm_read_all(kd, (unsigned long)kp->ki_paddr, &proc, 4190daf62d9SStanislav Sedov sizeof(proc)); 4200daf62d9SStanislav Sedov if (error == 0) { 4210daf62d9SStanislav Sedov warnx("can't read proc struct at %p for pid %d", 4220daf62d9SStanislav Sedov kp->ki_paddr, kp->ki_pid); 4230daf62d9SStanislav Sedov return (NULL); 4240daf62d9SStanislav Sedov } 4250daf62d9SStanislav Sedov if (proc.p_pgrp == NULL) 4260daf62d9SStanislav Sedov return (NULL); 4270daf62d9SStanislav Sedov error = kvm_read_all(kd, (unsigned long)proc.p_pgrp, &pgrp, 4280daf62d9SStanislav Sedov sizeof(pgrp)); 4290daf62d9SStanislav Sedov if (error == 0) { 4300daf62d9SStanislav Sedov warnx("can't read pgrp struct at %p for pid %d", 4310daf62d9SStanislav Sedov proc.p_pgrp, kp->ki_pid); 4320daf62d9SStanislav Sedov return (NULL); 4330daf62d9SStanislav Sedov } 4340daf62d9SStanislav Sedov error = kvm_read_all(kd, (unsigned long)pgrp.pg_session, &sess, 4350daf62d9SStanislav Sedov sizeof(sess)); 4360daf62d9SStanislav Sedov if (error == 0) { 4370daf62d9SStanislav Sedov warnx("can't read session struct at %p for pid %d", 4380daf62d9SStanislav Sedov pgrp.pg_session, kp->ki_pid); 4390daf62d9SStanislav Sedov return (NULL); 4400daf62d9SStanislav Sedov } 4410daf62d9SStanislav Sedov return (sess.s_ttyvp); 4420daf62d9SStanislav Sedov } 4430daf62d9SStanislav Sedov 4448b75b1adSDoug Moore static int 4458b75b1adSDoug Moore procstat_vm_map_reader(void *token, vm_map_entry_t addr, vm_map_entry_t dest) 4468b75b1adSDoug Moore { 4478b75b1adSDoug Moore kvm_t *kd; 4488b75b1adSDoug Moore 4498b75b1adSDoug Moore kd = (kvm_t *)token; 4508b75b1adSDoug Moore return (kvm_read_all(kd, (unsigned long)addr, dest, sizeof(*dest))); 4518b75b1adSDoug Moore } 4528b75b1adSDoug Moore 4530daf62d9SStanislav Sedov static struct filestat_list * 4540daf62d9SStanislav Sedov procstat_getfiles_kvm(struct procstat *procstat, struct kinfo_proc *kp, int mmapped) 4550daf62d9SStanislav Sedov { 4560daf62d9SStanislav Sedov struct file file; 4570daf62d9SStanislav Sedov struct filedesc filed; 45885078b85SConrad Meyer struct pwddesc pathsd; 459f1221c59SMateusz Guzik struct fdescenttbl *fdt; 4608d03b99bSMateusz Guzik struct pwd pwd; 461d2222aa0SMateusz Guzik unsigned long pwd_addr; 4620daf62d9SStanislav Sedov struct vm_map_entry vmentry; 4630daf62d9SStanislav Sedov struct vm_object object; 4640daf62d9SStanislav Sedov struct vmspace vmspace; 4650daf62d9SStanislav Sedov vm_map_entry_t entryp; 4660daf62d9SStanislav Sedov vm_object_t objp; 4670daf62d9SStanislav Sedov struct vnode *vp; 4680daf62d9SStanislav Sedov struct filestat *entry; 4690daf62d9SStanislav Sedov struct filestat_list *head; 4700daf62d9SStanislav Sedov kvm_t *kd; 4710daf62d9SStanislav Sedov void *data; 472f1221c59SMateusz Guzik int fflags; 473f1221c59SMateusz Guzik unsigned int i; 4740daf62d9SStanislav Sedov int prot, type; 475f1221c59SMateusz Guzik size_t fdt_size; 4760daf62d9SStanislav Sedov unsigned int nfiles; 4778d03b99bSMateusz Guzik bool haspwd; 4780daf62d9SStanislav Sedov 4790daf62d9SStanislav Sedov assert(procstat); 4800daf62d9SStanislav Sedov kd = procstat->kd; 4810daf62d9SStanislav Sedov if (kd == NULL) 4820daf62d9SStanislav Sedov return (NULL); 48385078b85SConrad Meyer if (kp->ki_fd == NULL || kp->ki_pd == NULL) 4840daf62d9SStanislav Sedov return (NULL); 4850daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)kp->ki_fd, &filed, 4860daf62d9SStanislav Sedov sizeof(filed))) { 4870daf62d9SStanislav Sedov warnx("can't read filedesc at %p", (void *)kp->ki_fd); 4880daf62d9SStanislav Sedov return (NULL); 4890daf62d9SStanislav Sedov } 49085078b85SConrad Meyer if (!kvm_read_all(kd, (unsigned long)kp->ki_pd, &pathsd, 49185078b85SConrad Meyer sizeof(pathsd))) { 49285078b85SConrad Meyer warnx("can't read pwddesc at %p", (void *)kp->ki_pd); 49385078b85SConrad Meyer return (NULL); 49485078b85SConrad Meyer } 4958d03b99bSMateusz Guzik haspwd = false; 49685078b85SConrad Meyer pwd_addr = (unsigned long)(PWDDESC_KVM_LOAD_PWD(&pathsd)); 497d2222aa0SMateusz Guzik if (pwd_addr != 0) { 498d2222aa0SMateusz Guzik if (!kvm_read_all(kd, pwd_addr, &pwd, sizeof(pwd))) { 499d2222aa0SMateusz Guzik warnx("can't read fd_pwd at %p", (void *)pwd_addr); 5008d03b99bSMateusz Guzik return (NULL); 5018d03b99bSMateusz Guzik } 5028d03b99bSMateusz Guzik haspwd = true; 5038d03b99bSMateusz Guzik } 5040daf62d9SStanislav Sedov 5050daf62d9SStanislav Sedov /* 5060daf62d9SStanislav Sedov * Allocate list head. 5070daf62d9SStanislav Sedov */ 5080daf62d9SStanislav Sedov head = malloc(sizeof(*head)); 5090daf62d9SStanislav Sedov if (head == NULL) 5100daf62d9SStanislav Sedov return (NULL); 5110daf62d9SStanislav Sedov STAILQ_INIT(head); 5120daf62d9SStanislav Sedov 5130daf62d9SStanislav Sedov /* root directory vnode, if one. */ 5148d03b99bSMateusz Guzik if (haspwd) { 5158d03b99bSMateusz Guzik if (pwd.pwd_rdir) { 5168d03b99bSMateusz Guzik entry = filestat_new_entry(pwd.pwd_rdir, PS_FST_TYPE_VNODE, -1, 517772f6645SPawel Jakub Dawidek PS_FST_FFLAG_READ, PS_FST_UFLAG_RDIR, 0, 0, NULL, NULL); 5180daf62d9SStanislav Sedov if (entry != NULL) 5190daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 5200daf62d9SStanislav Sedov } 5210daf62d9SStanislav Sedov /* current working directory vnode. */ 5228d03b99bSMateusz Guzik if (pwd.pwd_cdir) { 5238d03b99bSMateusz Guzik entry = filestat_new_entry(pwd.pwd_cdir, PS_FST_TYPE_VNODE, -1, 524772f6645SPawel Jakub Dawidek PS_FST_FFLAG_READ, PS_FST_UFLAG_CDIR, 0, 0, NULL, NULL); 5250daf62d9SStanislav Sedov if (entry != NULL) 5260daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 5270daf62d9SStanislav Sedov } 5280daf62d9SStanislav Sedov /* jail root, if any. */ 5298d03b99bSMateusz Guzik if (pwd.pwd_jdir) { 5308d03b99bSMateusz Guzik entry = filestat_new_entry(pwd.pwd_jdir, PS_FST_TYPE_VNODE, -1, 531772f6645SPawel Jakub Dawidek PS_FST_FFLAG_READ, PS_FST_UFLAG_JAIL, 0, 0, NULL, NULL); 5320daf62d9SStanislav Sedov if (entry != NULL) 5330daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 5340daf62d9SStanislav Sedov } 5358d03b99bSMateusz Guzik } 5360daf62d9SStanislav Sedov /* ktrace vnode, if one */ 5370daf62d9SStanislav Sedov if (kp->ki_tracep) { 5380daf62d9SStanislav Sedov entry = filestat_new_entry(kp->ki_tracep, PS_FST_TYPE_VNODE, -1, 5390daf62d9SStanislav Sedov PS_FST_FFLAG_READ | PS_FST_FFLAG_WRITE, 540772f6645SPawel Jakub Dawidek PS_FST_UFLAG_TRACE, 0, 0, NULL, NULL); 5410daf62d9SStanislav Sedov if (entry != NULL) 5420daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 5430daf62d9SStanislav Sedov } 5440daf62d9SStanislav Sedov /* text vnode, if one */ 5450daf62d9SStanislav Sedov if (kp->ki_textvp) { 5460daf62d9SStanislav Sedov entry = filestat_new_entry(kp->ki_textvp, PS_FST_TYPE_VNODE, -1, 547772f6645SPawel Jakub Dawidek PS_FST_FFLAG_READ, PS_FST_UFLAG_TEXT, 0, 0, NULL, NULL); 5480daf62d9SStanislav Sedov if (entry != NULL) 5490daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 5500daf62d9SStanislav Sedov } 5510daf62d9SStanislav Sedov /* Controlling terminal. */ 5520daf62d9SStanislav Sedov if ((vp = getctty(kd, kp)) != NULL) { 5530daf62d9SStanislav Sedov entry = filestat_new_entry(vp, PS_FST_TYPE_VNODE, -1, 5540daf62d9SStanislav Sedov PS_FST_FFLAG_READ | PS_FST_FFLAG_WRITE, 555772f6645SPawel Jakub Dawidek PS_FST_UFLAG_CTTY, 0, 0, NULL, NULL); 5560daf62d9SStanislav Sedov if (entry != NULL) 5570daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 5580daf62d9SStanislav Sedov } 5590daf62d9SStanislav Sedov 560f1221c59SMateusz Guzik if (!kvm_read_all(kd, (unsigned long)filed.fd_files, &nfiles, 561f1221c59SMateusz Guzik sizeof(nfiles))) { 562f1221c59SMateusz Guzik warnx("can't read fd_files at %p", (void *)filed.fd_files); 563f1221c59SMateusz Guzik return (NULL); 564f1221c59SMateusz Guzik } 565f1221c59SMateusz Guzik 566f1221c59SMateusz Guzik fdt_size = sizeof(*fdt) + nfiles * sizeof(struct filedescent); 567f1221c59SMateusz Guzik fdt = malloc(fdt_size); 568f1221c59SMateusz Guzik if (fdt == NULL) { 569f1221c59SMateusz Guzik warn("malloc(%zu)", fdt_size); 5700daf62d9SStanislav Sedov goto do_mmapped; 5710daf62d9SStanislav Sedov } 572f1221c59SMateusz Guzik if (!kvm_read_all(kd, (unsigned long)filed.fd_files, fdt, fdt_size)) { 573f1221c59SMateusz Guzik warnx("cannot read file structures at %p", (void *)filed.fd_files); 574f1221c59SMateusz Guzik free(fdt); 5750daf62d9SStanislav Sedov goto do_mmapped; 5760daf62d9SStanislav Sedov } 577f1221c59SMateusz Guzik for (i = 0; i < nfiles; i++) { 578f1221c59SMateusz Guzik if (fdt->fdt_ofiles[i].fde_file == NULL) { 5790daf62d9SStanislav Sedov continue; 580f1221c59SMateusz Guzik } 581f1221c59SMateusz Guzik if (!kvm_read_all(kd, (unsigned long)fdt->fdt_ofiles[i].fde_file, &file, 5820daf62d9SStanislav Sedov sizeof(struct file))) { 5830daf62d9SStanislav Sedov warnx("can't read file %d at %p", i, 584f1221c59SMateusz Guzik (void *)fdt->fdt_ofiles[i].fde_file); 5850daf62d9SStanislav Sedov continue; 5860daf62d9SStanislav Sedov } 5870daf62d9SStanislav Sedov switch (file.f_type) { 5880daf62d9SStanislav Sedov case DTYPE_VNODE: 5890daf62d9SStanislav Sedov type = PS_FST_TYPE_VNODE; 5900daf62d9SStanislav Sedov data = file.f_vnode; 5910daf62d9SStanislav Sedov break; 5920daf62d9SStanislav Sedov case DTYPE_SOCKET: 5930daf62d9SStanislav Sedov type = PS_FST_TYPE_SOCKET; 5940daf62d9SStanislav Sedov data = file.f_data; 5950daf62d9SStanislav Sedov break; 5960daf62d9SStanislav Sedov case DTYPE_PIPE: 5970daf62d9SStanislav Sedov type = PS_FST_TYPE_PIPE; 5980daf62d9SStanislav Sedov data = file.f_data; 5990daf62d9SStanislav Sedov break; 6000daf62d9SStanislav Sedov case DTYPE_FIFO: 6010daf62d9SStanislav Sedov type = PS_FST_TYPE_FIFO; 6020daf62d9SStanislav Sedov data = file.f_vnode; 6030daf62d9SStanislav Sedov break; 6040daf62d9SStanislav Sedov #ifdef DTYPE_PTS 6050daf62d9SStanislav Sedov case DTYPE_PTS: 6060daf62d9SStanislav Sedov type = PS_FST_TYPE_PTS; 6070daf62d9SStanislav Sedov data = file.f_data; 6080daf62d9SStanislav Sedov break; 6090daf62d9SStanislav Sedov #endif 610958aa575SJohn Baldwin case DTYPE_SEM: 611958aa575SJohn Baldwin type = PS_FST_TYPE_SEM; 612958aa575SJohn Baldwin data = file.f_data; 613958aa575SJohn Baldwin break; 614e506e182SJohn Baldwin case DTYPE_SHM: 615e506e182SJohn Baldwin type = PS_FST_TYPE_SHM; 616e506e182SJohn Baldwin data = file.f_data; 617e506e182SJohn Baldwin break; 6183cfa7c6eSEdward Tomasz Napierala case DTYPE_PROCDESC: 6193cfa7c6eSEdward Tomasz Napierala type = PS_FST_TYPE_PROCDESC; 6203cfa7c6eSEdward Tomasz Napierala data = file.f_data; 6213cfa7c6eSEdward Tomasz Napierala break; 622a66732deSKonstantin Belousov case DTYPE_DEV: 623a66732deSKonstantin Belousov type = PS_FST_TYPE_DEV; 624a66732deSKonstantin Belousov data = file.f_data; 625a66732deSKonstantin Belousov break; 62667af9abaSKonstantin Belousov case DTYPE_EVENTFD: 62767af9abaSKonstantin Belousov type = PS_FST_TYPE_EVENTFD; 62867af9abaSKonstantin Belousov data = file.f_data; 62967af9abaSKonstantin Belousov break; 6300daf62d9SStanislav Sedov default: 6310daf62d9SStanislav Sedov continue; 6320daf62d9SStanislav Sedov } 633d57486e2SRobert Watson /* XXXRW: No capability rights support for kvm yet. */ 6340daf62d9SStanislav Sedov entry = filestat_new_entry(data, type, i, 635772f6645SPawel Jakub Dawidek to_filestat_flags(file.f_flag), 0, 0, 0, NULL, NULL); 6360daf62d9SStanislav Sedov if (entry != NULL) 6370daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 6380daf62d9SStanislav Sedov } 639f1221c59SMateusz Guzik free(fdt); 6400daf62d9SStanislav Sedov 6410daf62d9SStanislav Sedov do_mmapped: 6420daf62d9SStanislav Sedov 6430daf62d9SStanislav Sedov /* 6440daf62d9SStanislav Sedov * Process mmapped files if requested. 6450daf62d9SStanislav Sedov */ 6460daf62d9SStanislav Sedov if (mmapped) { 6470daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)kp->ki_vmspace, &vmspace, 6480daf62d9SStanislav Sedov sizeof(vmspace))) { 6490daf62d9SStanislav Sedov warnx("can't read vmspace at %p", 6500daf62d9SStanislav Sedov (void *)kp->ki_vmspace); 6510daf62d9SStanislav Sedov goto exit; 6520daf62d9SStanislav Sedov } 6530daf62d9SStanislav Sedov 6548b75b1adSDoug Moore vmentry = vmspace.vm_map.header; 6558b75b1adSDoug Moore for (entryp = vm_map_entry_read_succ(kd, &vmentry, procstat_vm_map_reader); 6568b75b1adSDoug Moore entryp != NULL && entryp != &kp->ki_vmspace->vm_map.header; 6578b75b1adSDoug Moore entryp = vm_map_entry_read_succ(kd, &vmentry, procstat_vm_map_reader)) { 6580daf62d9SStanislav Sedov if (vmentry.eflags & MAP_ENTRY_IS_SUB_MAP) 6590daf62d9SStanislav Sedov continue; 6600daf62d9SStanislav Sedov if ((objp = vmentry.object.vm_object) == NULL) 6610daf62d9SStanislav Sedov continue; 6620daf62d9SStanislav Sedov for (; objp; objp = object.backing_object) { 6630daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)objp, 6640daf62d9SStanislav Sedov &object, sizeof(object))) { 6650daf62d9SStanislav Sedov warnx("can't read vm_object at %p", 6660daf62d9SStanislav Sedov (void *)objp); 6670daf62d9SStanislav Sedov break; 6680daf62d9SStanislav Sedov } 6690daf62d9SStanislav Sedov } 6700daf62d9SStanislav Sedov 6710daf62d9SStanislav Sedov /* We want only vnode objects. */ 6720daf62d9SStanislav Sedov if (object.type != OBJT_VNODE) 6730daf62d9SStanislav Sedov continue; 6740daf62d9SStanislav Sedov 6750daf62d9SStanislav Sedov prot = vmentry.protection; 6760daf62d9SStanislav Sedov fflags = 0; 6770daf62d9SStanislav Sedov if (prot & VM_PROT_READ) 6780daf62d9SStanislav Sedov fflags = PS_FST_FFLAG_READ; 679279a233dSJilles Tjoelker if ((vmentry.eflags & MAP_ENTRY_COW) == 0 && 680279a233dSJilles Tjoelker prot & VM_PROT_WRITE) 6810daf62d9SStanislav Sedov fflags |= PS_FST_FFLAG_WRITE; 6820daf62d9SStanislav Sedov 6830daf62d9SStanislav Sedov /* 6840daf62d9SStanislav Sedov * Create filestat entry. 6850daf62d9SStanislav Sedov */ 6860daf62d9SStanislav Sedov entry = filestat_new_entry(object.handle, 6870daf62d9SStanislav Sedov PS_FST_TYPE_VNODE, -1, fflags, 688772f6645SPawel Jakub Dawidek PS_FST_UFLAG_MMAP, 0, 0, NULL, NULL); 6890daf62d9SStanislav Sedov if (entry != NULL) 6900daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 6910daf62d9SStanislav Sedov } 6928b75b1adSDoug Moore if (entryp == NULL) 6938b75b1adSDoug Moore warnx("can't read vm_map_entry"); 6940daf62d9SStanislav Sedov } 6950daf62d9SStanislav Sedov exit: 6960daf62d9SStanislav Sedov return (head); 6970daf62d9SStanislav Sedov } 6980daf62d9SStanislav Sedov 6990daf62d9SStanislav Sedov /* 7000daf62d9SStanislav Sedov * kinfo types to filestat translation. 7010daf62d9SStanislav Sedov */ 7020daf62d9SStanislav Sedov static int 7030daf62d9SStanislav Sedov kinfo_type2fst(int kftype) 7040daf62d9SStanislav Sedov { 7050daf62d9SStanislav Sedov static struct { 7060daf62d9SStanislav Sedov int kf_type; 7070daf62d9SStanislav Sedov int fst_type; 7080daf62d9SStanislav Sedov } kftypes2fst[] = { 7093cfa7c6eSEdward Tomasz Napierala { KF_TYPE_PROCDESC, PS_FST_TYPE_PROCDESC }, 710a66732deSKonstantin Belousov { KF_TYPE_DEV, PS_FST_TYPE_DEV }, 7110daf62d9SStanislav Sedov { KF_TYPE_FIFO, PS_FST_TYPE_FIFO }, 7120daf62d9SStanislav Sedov { KF_TYPE_KQUEUE, PS_FST_TYPE_KQUEUE }, 7130daf62d9SStanislav Sedov { KF_TYPE_MQUEUE, PS_FST_TYPE_MQUEUE }, 7140daf62d9SStanislav Sedov { KF_TYPE_NONE, PS_FST_TYPE_NONE }, 7150daf62d9SStanislav Sedov { KF_TYPE_PIPE, PS_FST_TYPE_PIPE }, 7160daf62d9SStanislav Sedov { KF_TYPE_PTS, PS_FST_TYPE_PTS }, 7170daf62d9SStanislav Sedov { KF_TYPE_SEM, PS_FST_TYPE_SEM }, 7180daf62d9SStanislav Sedov { KF_TYPE_SHM, PS_FST_TYPE_SHM }, 7190daf62d9SStanislav Sedov { KF_TYPE_SOCKET, PS_FST_TYPE_SOCKET }, 7200daf62d9SStanislav Sedov { KF_TYPE_VNODE, PS_FST_TYPE_VNODE }, 72167af9abaSKonstantin Belousov { KF_TYPE_EVENTFD, PS_FST_TYPE_EVENTFD }, 7220daf62d9SStanislav Sedov { KF_TYPE_UNKNOWN, PS_FST_TYPE_UNKNOWN } 7230daf62d9SStanislav Sedov }; 7240daf62d9SStanislav Sedov #define NKFTYPES (sizeof(kftypes2fst) / sizeof(*kftypes2fst)) 7250daf62d9SStanislav Sedov unsigned int i; 7260daf62d9SStanislav Sedov 7270daf62d9SStanislav Sedov for (i = 0; i < NKFTYPES; i++) 7280daf62d9SStanislav Sedov if (kftypes2fst[i].kf_type == kftype) 7290daf62d9SStanislav Sedov break; 7300daf62d9SStanislav Sedov if (i == NKFTYPES) 7310daf62d9SStanislav Sedov return (PS_FST_TYPE_UNKNOWN); 7320daf62d9SStanislav Sedov return (kftypes2fst[i].fst_type); 7330daf62d9SStanislav Sedov } 7340daf62d9SStanislav Sedov 7350daf62d9SStanislav Sedov /* 7360daf62d9SStanislav Sedov * kinfo flags to filestat translation. 7370daf62d9SStanislav Sedov */ 7380daf62d9SStanislav Sedov static int 7390daf62d9SStanislav Sedov kinfo_fflags2fst(int kfflags) 7400daf62d9SStanislav Sedov { 7410daf62d9SStanislav Sedov static struct { 7420daf62d9SStanislav Sedov int kf_flag; 7430daf62d9SStanislav Sedov int fst_flag; 7440daf62d9SStanislav Sedov } kfflags2fst[] = { 7450daf62d9SStanislav Sedov { KF_FLAG_APPEND, PS_FST_FFLAG_APPEND }, 7460daf62d9SStanislav Sedov { KF_FLAG_ASYNC, PS_FST_FFLAG_ASYNC }, 7470daf62d9SStanislav Sedov { KF_FLAG_CREAT, PS_FST_FFLAG_CREAT }, 7480daf62d9SStanislav Sedov { KF_FLAG_DIRECT, PS_FST_FFLAG_DIRECT }, 7490daf62d9SStanislav Sedov { KF_FLAG_EXCL, PS_FST_FFLAG_EXCL }, 7500daf62d9SStanislav Sedov { KF_FLAG_EXEC, PS_FST_FFLAG_EXEC }, 7510daf62d9SStanislav Sedov { KF_FLAG_EXLOCK, PS_FST_FFLAG_EXLOCK }, 7520daf62d9SStanislav Sedov { KF_FLAG_FSYNC, PS_FST_FFLAG_SYNC }, 7530daf62d9SStanislav Sedov { KF_FLAG_HASLOCK, PS_FST_FFLAG_HASLOCK }, 7540daf62d9SStanislav Sedov { KF_FLAG_NOFOLLOW, PS_FST_FFLAG_NOFOLLOW }, 7550daf62d9SStanislav Sedov { KF_FLAG_NONBLOCK, PS_FST_FFLAG_NONBLOCK }, 7560daf62d9SStanislav Sedov { KF_FLAG_READ, PS_FST_FFLAG_READ }, 7570daf62d9SStanislav Sedov { KF_FLAG_SHLOCK, PS_FST_FFLAG_SHLOCK }, 7580daf62d9SStanislav Sedov { KF_FLAG_TRUNC, PS_FST_FFLAG_TRUNC }, 7590daf62d9SStanislav Sedov { KF_FLAG_WRITE, PS_FST_FFLAG_WRITE } 7600daf62d9SStanislav Sedov }; 7610daf62d9SStanislav Sedov #define NKFFLAGS (sizeof(kfflags2fst) / sizeof(*kfflags2fst)) 7620daf62d9SStanislav Sedov unsigned int i; 7630daf62d9SStanislav Sedov int flags; 7640daf62d9SStanislav Sedov 7650daf62d9SStanislav Sedov flags = 0; 7660daf62d9SStanislav Sedov for (i = 0; i < NKFFLAGS; i++) 7670daf62d9SStanislav Sedov if ((kfflags & kfflags2fst[i].kf_flag) != 0) 7680daf62d9SStanislav Sedov flags |= kfflags2fst[i].fst_flag; 7690daf62d9SStanislav Sedov return (flags); 7700daf62d9SStanislav Sedov } 7710daf62d9SStanislav Sedov 7720daf62d9SStanislav Sedov static int 7730daf62d9SStanislav Sedov kinfo_uflags2fst(int fd) 7740daf62d9SStanislav Sedov { 7750daf62d9SStanislav Sedov 7760daf62d9SStanislav Sedov switch (fd) { 7770daf62d9SStanislav Sedov case KF_FD_TYPE_CTTY: 7780daf62d9SStanislav Sedov return (PS_FST_UFLAG_CTTY); 7790daf62d9SStanislav Sedov case KF_FD_TYPE_CWD: 7800daf62d9SStanislav Sedov return (PS_FST_UFLAG_CDIR); 7810daf62d9SStanislav Sedov case KF_FD_TYPE_JAIL: 7820daf62d9SStanislav Sedov return (PS_FST_UFLAG_JAIL); 7830daf62d9SStanislav Sedov case KF_FD_TYPE_TEXT: 7840daf62d9SStanislav Sedov return (PS_FST_UFLAG_TEXT); 7850daf62d9SStanislav Sedov case KF_FD_TYPE_TRACE: 7860daf62d9SStanislav Sedov return (PS_FST_UFLAG_TRACE); 7870daf62d9SStanislav Sedov case KF_FD_TYPE_ROOT: 7880daf62d9SStanislav Sedov return (PS_FST_UFLAG_RDIR); 7890daf62d9SStanislav Sedov } 7900daf62d9SStanislav Sedov return (0); 7910daf62d9SStanislav Sedov } 7920daf62d9SStanislav Sedov 7937153ad2bSMikolaj Golub static struct kinfo_file * 7947153ad2bSMikolaj Golub kinfo_getfile_core(struct procstat_core *core, int *cntp) 7957153ad2bSMikolaj Golub { 7967153ad2bSMikolaj Golub int cnt; 7977153ad2bSMikolaj Golub size_t len; 7987153ad2bSMikolaj Golub char *buf, *bp, *eb; 7997153ad2bSMikolaj Golub struct kinfo_file *kif, *kp, *kf; 8007153ad2bSMikolaj Golub 8017153ad2bSMikolaj Golub buf = procstat_core_get(core, PSC_TYPE_FILES, NULL, &len); 8027153ad2bSMikolaj Golub if (buf == NULL) 8037153ad2bSMikolaj Golub return (NULL); 8047153ad2bSMikolaj Golub /* 8057153ad2bSMikolaj Golub * XXXMG: The code below is just copy&past from libutil. 8067153ad2bSMikolaj Golub * The code duplication can be avoided if libutil 8077153ad2bSMikolaj Golub * is extended to provide something like: 8087153ad2bSMikolaj Golub * struct kinfo_file *kinfo_getfile_from_buf(const char *buf, 8097153ad2bSMikolaj Golub * size_t len, int *cntp); 8107153ad2bSMikolaj Golub */ 8117153ad2bSMikolaj Golub 8127153ad2bSMikolaj Golub /* Pass 1: count items */ 8137153ad2bSMikolaj Golub cnt = 0; 8147153ad2bSMikolaj Golub bp = buf; 8157153ad2bSMikolaj Golub eb = buf + len; 8167153ad2bSMikolaj Golub while (bp < eb) { 8177153ad2bSMikolaj Golub kf = (struct kinfo_file *)(uintptr_t)bp; 81814bdbaf2SConrad Meyer if (kf->kf_structsize == 0) 81914bdbaf2SConrad Meyer break; 8207153ad2bSMikolaj Golub bp += kf->kf_structsize; 8217153ad2bSMikolaj Golub cnt++; 8227153ad2bSMikolaj Golub } 8237153ad2bSMikolaj Golub 8247153ad2bSMikolaj Golub kif = calloc(cnt, sizeof(*kif)); 8257153ad2bSMikolaj Golub if (kif == NULL) { 8267153ad2bSMikolaj Golub free(buf); 8277153ad2bSMikolaj Golub return (NULL); 8287153ad2bSMikolaj Golub } 8297153ad2bSMikolaj Golub bp = buf; 8307153ad2bSMikolaj Golub eb = buf + len; 8317153ad2bSMikolaj Golub kp = kif; 8327153ad2bSMikolaj Golub /* Pass 2: unpack */ 8337153ad2bSMikolaj Golub while (bp < eb) { 8347153ad2bSMikolaj Golub kf = (struct kinfo_file *)(uintptr_t)bp; 83514bdbaf2SConrad Meyer if (kf->kf_structsize == 0) 83614bdbaf2SConrad Meyer break; 8377153ad2bSMikolaj Golub /* Copy/expand into pre-zeroed buffer */ 8387153ad2bSMikolaj Golub memcpy(kp, kf, kf->kf_structsize); 8397153ad2bSMikolaj Golub /* Advance to next packed record */ 8407153ad2bSMikolaj Golub bp += kf->kf_structsize; 8417153ad2bSMikolaj Golub /* Set field size to fixed length, advance */ 8427153ad2bSMikolaj Golub kp->kf_structsize = sizeof(*kp); 8437153ad2bSMikolaj Golub kp++; 8447153ad2bSMikolaj Golub } 8457153ad2bSMikolaj Golub free(buf); 8467153ad2bSMikolaj Golub *cntp = cnt; 8477153ad2bSMikolaj Golub return (kif); /* Caller must free() return value */ 8487153ad2bSMikolaj Golub } 8497153ad2bSMikolaj Golub 8500daf62d9SStanislav Sedov static struct filestat_list * 8517153ad2bSMikolaj Golub procstat_getfiles_sysctl(struct procstat *procstat, struct kinfo_proc *kp, 8527153ad2bSMikolaj Golub int mmapped) 8530daf62d9SStanislav Sedov { 8540daf62d9SStanislav Sedov struct kinfo_file *kif, *files; 8550daf62d9SStanislav Sedov struct kinfo_vmentry *kve, *vmentries; 8560daf62d9SStanislav Sedov struct filestat_list *head; 8570daf62d9SStanislav Sedov struct filestat *entry; 8580daf62d9SStanislav Sedov char *path; 8590daf62d9SStanislav Sedov off_t offset; 8600daf62d9SStanislav Sedov int cnt, fd, fflags; 8610daf62d9SStanislav Sedov int i, type, uflags; 8620daf62d9SStanislav Sedov int refcount; 863d57486e2SRobert Watson cap_rights_t cap_rights; 8640daf62d9SStanislav Sedov 8650daf62d9SStanislav Sedov assert(kp); 8667153ad2bSMikolaj Golub switch (procstat->type) { 8677153ad2bSMikolaj Golub case PROCSTAT_SYSCTL: 8680daf62d9SStanislav Sedov files = kinfo_getfile(kp->ki_pid, &cnt); 8697153ad2bSMikolaj Golub break; 8707153ad2bSMikolaj Golub case PROCSTAT_CORE: 8717153ad2bSMikolaj Golub files = kinfo_getfile_core(procstat->core, &cnt); 8727153ad2bSMikolaj Golub break; 8737153ad2bSMikolaj Golub default: 8747153ad2bSMikolaj Golub assert(!"invalid type"); 8757153ad2bSMikolaj Golub } 8760daf62d9SStanislav Sedov if (files == NULL && errno != EPERM) { 8770daf62d9SStanislav Sedov warn("kinfo_getfile()"); 8780daf62d9SStanislav Sedov return (NULL); 8790daf62d9SStanislav Sedov } 8800daf62d9SStanislav Sedov procstat->files = files; 8810daf62d9SStanislav Sedov 8820daf62d9SStanislav Sedov /* 8830daf62d9SStanislav Sedov * Allocate list head. 8840daf62d9SStanislav Sedov */ 8850daf62d9SStanislav Sedov head = malloc(sizeof(*head)); 8860daf62d9SStanislav Sedov if (head == NULL) 8870daf62d9SStanislav Sedov return (NULL); 8880daf62d9SStanislav Sedov STAILQ_INIT(head); 8890daf62d9SStanislav Sedov for (i = 0; i < cnt; i++) { 8900daf62d9SStanislav Sedov kif = &files[i]; 8910daf62d9SStanislav Sedov 8920daf62d9SStanislav Sedov type = kinfo_type2fst(kif->kf_type); 8930daf62d9SStanislav Sedov fd = kif->kf_fd >= 0 ? kif->kf_fd : -1; 8940daf62d9SStanislav Sedov fflags = kinfo_fflags2fst(kif->kf_flags); 8950daf62d9SStanislav Sedov uflags = kinfo_uflags2fst(kif->kf_fd); 8960daf62d9SStanislav Sedov refcount = kif->kf_ref_count; 8970daf62d9SStanislav Sedov offset = kif->kf_offset; 8980daf62d9SStanislav Sedov if (*kif->kf_path != '\0') 8990daf62d9SStanislav Sedov path = strdup(kif->kf_path); 9000daf62d9SStanislav Sedov else 9010daf62d9SStanislav Sedov path = NULL; 902d57486e2SRobert Watson cap_rights = kif->kf_cap_rights; 9030daf62d9SStanislav Sedov 9040daf62d9SStanislav Sedov /* 9050daf62d9SStanislav Sedov * Create filestat entry. 9060daf62d9SStanislav Sedov */ 9070daf62d9SStanislav Sedov entry = filestat_new_entry(kif, type, fd, fflags, uflags, 9087008be5bSPawel Jakub Dawidek refcount, offset, path, &cap_rights); 9090daf62d9SStanislav Sedov if (entry != NULL) 9100daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 9110daf62d9SStanislav Sedov } 9120daf62d9SStanislav Sedov if (mmapped != 0) { 91339680c7bSMikolaj Golub vmentries = procstat_getvmmap(procstat, kp, &cnt); 9140daf62d9SStanislav Sedov procstat->vmentries = vmentries; 9150daf62d9SStanislav Sedov if (vmentries == NULL || cnt == 0) 9160daf62d9SStanislav Sedov goto fail; 9170daf62d9SStanislav Sedov for (i = 0; i < cnt; i++) { 9180daf62d9SStanislav Sedov kve = &vmentries[i]; 9190daf62d9SStanislav Sedov if (kve->kve_type != KVME_TYPE_VNODE) 9200daf62d9SStanislav Sedov continue; 9210daf62d9SStanislav Sedov fflags = 0; 9220daf62d9SStanislav Sedov if (kve->kve_protection & KVME_PROT_READ) 9230daf62d9SStanislav Sedov fflags = PS_FST_FFLAG_READ; 924279a233dSJilles Tjoelker if ((kve->kve_flags & KVME_FLAG_COW) == 0 && 925279a233dSJilles Tjoelker kve->kve_protection & KVME_PROT_WRITE) 9260daf62d9SStanislav Sedov fflags |= PS_FST_FFLAG_WRITE; 9270daf62d9SStanislav Sedov offset = kve->kve_offset; 9280daf62d9SStanislav Sedov refcount = kve->kve_ref_count; 9290daf62d9SStanislav Sedov if (*kve->kve_path != '\0') 9300daf62d9SStanislav Sedov path = strdup(kve->kve_path); 9310daf62d9SStanislav Sedov else 9320daf62d9SStanislav Sedov path = NULL; 9330daf62d9SStanislav Sedov entry = filestat_new_entry(kve, PS_FST_TYPE_VNODE, -1, 934d57486e2SRobert Watson fflags, PS_FST_UFLAG_MMAP, refcount, offset, path, 935772f6645SPawel Jakub Dawidek NULL); 9360daf62d9SStanislav Sedov if (entry != NULL) 9370daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 9380daf62d9SStanislav Sedov } 9390daf62d9SStanislav Sedov } 9400daf62d9SStanislav Sedov fail: 9410daf62d9SStanislav Sedov return (head); 9420daf62d9SStanislav Sedov } 9430daf62d9SStanislav Sedov 9440daf62d9SStanislav Sedov int 9450daf62d9SStanislav Sedov procstat_get_pipe_info(struct procstat *procstat, struct filestat *fst, 9460daf62d9SStanislav Sedov struct pipestat *ps, char *errbuf) 9470daf62d9SStanislav Sedov { 9480daf62d9SStanislav Sedov 9490daf62d9SStanislav Sedov assert(ps); 9500daf62d9SStanislav Sedov if (procstat->type == PROCSTAT_KVM) { 9510daf62d9SStanislav Sedov return (procstat_get_pipe_info_kvm(procstat->kd, fst, ps, 9520daf62d9SStanislav Sedov errbuf)); 9537153ad2bSMikolaj Golub } else if (procstat->type == PROCSTAT_SYSCTL || 9547153ad2bSMikolaj Golub procstat->type == PROCSTAT_CORE) { 9550daf62d9SStanislav Sedov return (procstat_get_pipe_info_sysctl(fst, ps, errbuf)); 9560daf62d9SStanislav Sedov } else { 95780905c35SJilles Tjoelker warnx("unknown access method: %d", procstat->type); 958467112b4SMikolaj Golub if (errbuf != NULL) 9590daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 9600daf62d9SStanislav Sedov return (1); 9610daf62d9SStanislav Sedov } 9620daf62d9SStanislav Sedov } 9630daf62d9SStanislav Sedov 9640daf62d9SStanislav Sedov static int 9650daf62d9SStanislav Sedov procstat_get_pipe_info_kvm(kvm_t *kd, struct filestat *fst, 9660daf62d9SStanislav Sedov struct pipestat *ps, char *errbuf) 9670daf62d9SStanislav Sedov { 9680daf62d9SStanislav Sedov struct pipe pi; 9690daf62d9SStanislav Sedov void *pipep; 9700daf62d9SStanislav Sedov 9710daf62d9SStanislav Sedov assert(kd); 9720daf62d9SStanislav Sedov assert(ps); 9730daf62d9SStanislav Sedov assert(fst); 9740daf62d9SStanislav Sedov bzero(ps, sizeof(*ps)); 9750daf62d9SStanislav Sedov pipep = fst->fs_typedep; 9760daf62d9SStanislav Sedov if (pipep == NULL) 9770daf62d9SStanislav Sedov goto fail; 9780daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)pipep, &pi, sizeof(struct pipe))) { 9790daf62d9SStanislav Sedov warnx("can't read pipe at %p", (void *)pipep); 9800daf62d9SStanislav Sedov goto fail; 9810daf62d9SStanislav Sedov } 9820daf62d9SStanislav Sedov ps->addr = (uintptr_t)pipep; 9830daf62d9SStanislav Sedov ps->peer = (uintptr_t)pi.pipe_peer; 9840daf62d9SStanislav Sedov ps->buffer_cnt = pi.pipe_buffer.cnt; 9850daf62d9SStanislav Sedov return (0); 9860daf62d9SStanislav Sedov 9870daf62d9SStanislav Sedov fail: 988467112b4SMikolaj Golub if (errbuf != NULL) 9890daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 9900daf62d9SStanislav Sedov return (1); 9910daf62d9SStanislav Sedov } 9920daf62d9SStanislav Sedov 9930daf62d9SStanislav Sedov static int 9940daf62d9SStanislav Sedov procstat_get_pipe_info_sysctl(struct filestat *fst, struct pipestat *ps, 9950daf62d9SStanislav Sedov char *errbuf __unused) 9960daf62d9SStanislav Sedov { 9970daf62d9SStanislav Sedov struct kinfo_file *kif; 9980daf62d9SStanislav Sedov 9990daf62d9SStanislav Sedov assert(ps); 10000daf62d9SStanislav Sedov assert(fst); 10010daf62d9SStanislav Sedov bzero(ps, sizeof(*ps)); 10020daf62d9SStanislav Sedov kif = fst->fs_typedep; 10030daf62d9SStanislav Sedov if (kif == NULL) 10040daf62d9SStanislav Sedov return (1); 10050daf62d9SStanislav Sedov ps->addr = kif->kf_un.kf_pipe.kf_pipe_addr; 10060daf62d9SStanislav Sedov ps->peer = kif->kf_un.kf_pipe.kf_pipe_peer; 10070daf62d9SStanislav Sedov ps->buffer_cnt = kif->kf_un.kf_pipe.kf_pipe_buffer_cnt; 10080daf62d9SStanislav Sedov return (0); 10090daf62d9SStanislav Sedov } 10100daf62d9SStanislav Sedov 10110daf62d9SStanislav Sedov int 10120daf62d9SStanislav Sedov procstat_get_pts_info(struct procstat *procstat, struct filestat *fst, 10130daf62d9SStanislav Sedov struct ptsstat *pts, char *errbuf) 10140daf62d9SStanislav Sedov { 10150daf62d9SStanislav Sedov 10160daf62d9SStanislav Sedov assert(pts); 10170daf62d9SStanislav Sedov if (procstat->type == PROCSTAT_KVM) { 10180daf62d9SStanislav Sedov return (procstat_get_pts_info_kvm(procstat->kd, fst, pts, 10190daf62d9SStanislav Sedov errbuf)); 10207153ad2bSMikolaj Golub } else if (procstat->type == PROCSTAT_SYSCTL || 10217153ad2bSMikolaj Golub procstat->type == PROCSTAT_CORE) { 10220daf62d9SStanislav Sedov return (procstat_get_pts_info_sysctl(fst, pts, errbuf)); 10230daf62d9SStanislav Sedov } else { 102480905c35SJilles Tjoelker warnx("unknown access method: %d", procstat->type); 1025467112b4SMikolaj Golub if (errbuf != NULL) 10260daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 10270daf62d9SStanislav Sedov return (1); 10280daf62d9SStanislav Sedov } 10290daf62d9SStanislav Sedov } 10300daf62d9SStanislav Sedov 10310daf62d9SStanislav Sedov static int 10320daf62d9SStanislav Sedov procstat_get_pts_info_kvm(kvm_t *kd, struct filestat *fst, 10330daf62d9SStanislav Sedov struct ptsstat *pts, char *errbuf) 10340daf62d9SStanislav Sedov { 10350daf62d9SStanislav Sedov struct tty tty; 10360daf62d9SStanislav Sedov void *ttyp; 10370daf62d9SStanislav Sedov 10380daf62d9SStanislav Sedov assert(kd); 10390daf62d9SStanislav Sedov assert(pts); 10400daf62d9SStanislav Sedov assert(fst); 10410daf62d9SStanislav Sedov bzero(pts, sizeof(*pts)); 10420daf62d9SStanislav Sedov ttyp = fst->fs_typedep; 10430daf62d9SStanislav Sedov if (ttyp == NULL) 10440daf62d9SStanislav Sedov goto fail; 10450daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)ttyp, &tty, sizeof(struct tty))) { 10460daf62d9SStanislav Sedov warnx("can't read tty at %p", (void *)ttyp); 10470daf62d9SStanislav Sedov goto fail; 10480daf62d9SStanislav Sedov } 10490daf62d9SStanislav Sedov pts->dev = dev2udev(kd, tty.t_dev); 10500daf62d9SStanislav Sedov (void)kdevtoname(kd, tty.t_dev, pts->devname); 10510daf62d9SStanislav Sedov return (0); 10520daf62d9SStanislav Sedov 10530daf62d9SStanislav Sedov fail: 1054467112b4SMikolaj Golub if (errbuf != NULL) 10550daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 10560daf62d9SStanislav Sedov return (1); 10570daf62d9SStanislav Sedov } 10580daf62d9SStanislav Sedov 10590daf62d9SStanislav Sedov static int 10600daf62d9SStanislav Sedov procstat_get_pts_info_sysctl(struct filestat *fst, struct ptsstat *pts, 10610daf62d9SStanislav Sedov char *errbuf __unused) 10620daf62d9SStanislav Sedov { 10630daf62d9SStanislav Sedov struct kinfo_file *kif; 10640daf62d9SStanislav Sedov 10650daf62d9SStanislav Sedov assert(pts); 10660daf62d9SStanislav Sedov assert(fst); 10670daf62d9SStanislav Sedov bzero(pts, sizeof(*pts)); 10680daf62d9SStanislav Sedov kif = fst->fs_typedep; 10690daf62d9SStanislav Sedov if (kif == NULL) 10700daf62d9SStanislav Sedov return (0); 10710daf62d9SStanislav Sedov pts->dev = kif->kf_un.kf_pts.kf_pts_dev; 10720daf62d9SStanislav Sedov strlcpy(pts->devname, kif->kf_path, sizeof(pts->devname)); 10730daf62d9SStanislav Sedov return (0); 10740daf62d9SStanislav Sedov } 10750daf62d9SStanislav Sedov 10760daf62d9SStanislav Sedov int 1077958aa575SJohn Baldwin procstat_get_sem_info(struct procstat *procstat, struct filestat *fst, 1078958aa575SJohn Baldwin struct semstat *sem, char *errbuf) 1079958aa575SJohn Baldwin { 1080958aa575SJohn Baldwin 1081958aa575SJohn Baldwin assert(sem); 1082958aa575SJohn Baldwin if (procstat->type == PROCSTAT_KVM) { 1083958aa575SJohn Baldwin return (procstat_get_sem_info_kvm(procstat->kd, fst, sem, 1084958aa575SJohn Baldwin errbuf)); 1085958aa575SJohn Baldwin } else if (procstat->type == PROCSTAT_SYSCTL || 1086958aa575SJohn Baldwin procstat->type == PROCSTAT_CORE) { 1087958aa575SJohn Baldwin return (procstat_get_sem_info_sysctl(fst, sem, errbuf)); 1088958aa575SJohn Baldwin } else { 1089958aa575SJohn Baldwin warnx("unknown access method: %d", procstat->type); 1090467112b4SMikolaj Golub if (errbuf != NULL) 1091958aa575SJohn Baldwin snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 1092958aa575SJohn Baldwin return (1); 1093958aa575SJohn Baldwin } 1094958aa575SJohn Baldwin } 1095958aa575SJohn Baldwin 1096958aa575SJohn Baldwin static int 1097958aa575SJohn Baldwin procstat_get_sem_info_kvm(kvm_t *kd, struct filestat *fst, 1098958aa575SJohn Baldwin struct semstat *sem, char *errbuf) 1099958aa575SJohn Baldwin { 1100958aa575SJohn Baldwin struct ksem ksem; 1101958aa575SJohn Baldwin void *ksemp; 1102958aa575SJohn Baldwin char *path; 1103958aa575SJohn Baldwin int i; 1104958aa575SJohn Baldwin 1105958aa575SJohn Baldwin assert(kd); 1106958aa575SJohn Baldwin assert(sem); 1107958aa575SJohn Baldwin assert(fst); 1108958aa575SJohn Baldwin bzero(sem, sizeof(*sem)); 1109958aa575SJohn Baldwin ksemp = fst->fs_typedep; 1110958aa575SJohn Baldwin if (ksemp == NULL) 1111958aa575SJohn Baldwin goto fail; 1112958aa575SJohn Baldwin if (!kvm_read_all(kd, (unsigned long)ksemp, &ksem, 1113958aa575SJohn Baldwin sizeof(struct ksem))) { 1114958aa575SJohn Baldwin warnx("can't read ksem at %p", (void *)ksemp); 1115958aa575SJohn Baldwin goto fail; 1116958aa575SJohn Baldwin } 1117958aa575SJohn Baldwin sem->mode = S_IFREG | ksem.ks_mode; 1118958aa575SJohn Baldwin sem->value = ksem.ks_value; 1119958aa575SJohn Baldwin if (fst->fs_path == NULL && ksem.ks_path != NULL) { 1120958aa575SJohn Baldwin path = malloc(MAXPATHLEN); 1121958aa575SJohn Baldwin for (i = 0; i < MAXPATHLEN - 1; i++) { 1122958aa575SJohn Baldwin if (!kvm_read_all(kd, (unsigned long)ksem.ks_path + i, 1123958aa575SJohn Baldwin path + i, 1)) 1124958aa575SJohn Baldwin break; 1125958aa575SJohn Baldwin if (path[i] == '\0') 1126958aa575SJohn Baldwin break; 1127958aa575SJohn Baldwin } 1128958aa575SJohn Baldwin path[i] = '\0'; 1129958aa575SJohn Baldwin if (i == 0) 1130958aa575SJohn Baldwin free(path); 1131958aa575SJohn Baldwin else 1132958aa575SJohn Baldwin fst->fs_path = path; 1133958aa575SJohn Baldwin } 1134958aa575SJohn Baldwin return (0); 1135958aa575SJohn Baldwin 1136958aa575SJohn Baldwin fail: 1137467112b4SMikolaj Golub if (errbuf != NULL) 1138958aa575SJohn Baldwin snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 1139958aa575SJohn Baldwin return (1); 1140958aa575SJohn Baldwin } 1141958aa575SJohn Baldwin 1142958aa575SJohn Baldwin static int 1143958aa575SJohn Baldwin procstat_get_sem_info_sysctl(struct filestat *fst, struct semstat *sem, 1144958aa575SJohn Baldwin char *errbuf __unused) 1145958aa575SJohn Baldwin { 1146958aa575SJohn Baldwin struct kinfo_file *kif; 1147958aa575SJohn Baldwin 1148958aa575SJohn Baldwin assert(sem); 1149958aa575SJohn Baldwin assert(fst); 1150958aa575SJohn Baldwin bzero(sem, sizeof(*sem)); 1151958aa575SJohn Baldwin kif = fst->fs_typedep; 1152958aa575SJohn Baldwin if (kif == NULL) 1153958aa575SJohn Baldwin return (0); 1154958aa575SJohn Baldwin sem->value = kif->kf_un.kf_sem.kf_sem_value; 1155958aa575SJohn Baldwin sem->mode = kif->kf_un.kf_sem.kf_sem_mode; 1156958aa575SJohn Baldwin return (0); 1157958aa575SJohn Baldwin } 1158958aa575SJohn Baldwin 1159958aa575SJohn Baldwin int 1160e506e182SJohn Baldwin procstat_get_shm_info(struct procstat *procstat, struct filestat *fst, 1161e506e182SJohn Baldwin struct shmstat *shm, char *errbuf) 1162e506e182SJohn Baldwin { 1163e506e182SJohn Baldwin 1164e506e182SJohn Baldwin assert(shm); 1165e506e182SJohn Baldwin if (procstat->type == PROCSTAT_KVM) { 1166e506e182SJohn Baldwin return (procstat_get_shm_info_kvm(procstat->kd, fst, shm, 1167e506e182SJohn Baldwin errbuf)); 11687153ad2bSMikolaj Golub } else if (procstat->type == PROCSTAT_SYSCTL || 11697153ad2bSMikolaj Golub procstat->type == PROCSTAT_CORE) { 1170e506e182SJohn Baldwin return (procstat_get_shm_info_sysctl(fst, shm, errbuf)); 1171e506e182SJohn Baldwin } else { 1172e506e182SJohn Baldwin warnx("unknown access method: %d", procstat->type); 1173467112b4SMikolaj Golub if (errbuf != NULL) 1174e506e182SJohn Baldwin snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 1175e506e182SJohn Baldwin return (1); 1176e506e182SJohn Baldwin } 1177e506e182SJohn Baldwin } 1178e506e182SJohn Baldwin 1179e506e182SJohn Baldwin static int 1180e506e182SJohn Baldwin procstat_get_shm_info_kvm(kvm_t *kd, struct filestat *fst, 1181e506e182SJohn Baldwin struct shmstat *shm, char *errbuf) 1182e506e182SJohn Baldwin { 1183e506e182SJohn Baldwin struct shmfd shmfd; 1184e506e182SJohn Baldwin void *shmfdp; 1185a9f5e425SJohn Baldwin char *path; 1186a9f5e425SJohn Baldwin int i; 1187e506e182SJohn Baldwin 1188e506e182SJohn Baldwin assert(kd); 1189e506e182SJohn Baldwin assert(shm); 1190e506e182SJohn Baldwin assert(fst); 1191e506e182SJohn Baldwin bzero(shm, sizeof(*shm)); 1192e506e182SJohn Baldwin shmfdp = fst->fs_typedep; 1193e506e182SJohn Baldwin if (shmfdp == NULL) 1194e506e182SJohn Baldwin goto fail; 1195e506e182SJohn Baldwin if (!kvm_read_all(kd, (unsigned long)shmfdp, &shmfd, 1196e506e182SJohn Baldwin sizeof(struct shmfd))) { 1197e506e182SJohn Baldwin warnx("can't read shmfd at %p", (void *)shmfdp); 1198e506e182SJohn Baldwin goto fail; 1199e506e182SJohn Baldwin } 1200e506e182SJohn Baldwin shm->mode = S_IFREG | shmfd.shm_mode; 1201e506e182SJohn Baldwin shm->size = shmfd.shm_size; 1202a9f5e425SJohn Baldwin if (fst->fs_path == NULL && shmfd.shm_path != NULL) { 1203a9f5e425SJohn Baldwin path = malloc(MAXPATHLEN); 1204a9f5e425SJohn Baldwin for (i = 0; i < MAXPATHLEN - 1; i++) { 1205a9f5e425SJohn Baldwin if (!kvm_read_all(kd, (unsigned long)shmfd.shm_path + i, 1206a9f5e425SJohn Baldwin path + i, 1)) 1207a9f5e425SJohn Baldwin break; 1208a9f5e425SJohn Baldwin if (path[i] == '\0') 1209a9f5e425SJohn Baldwin break; 1210a9f5e425SJohn Baldwin } 1211a9f5e425SJohn Baldwin path[i] = '\0'; 1212a9f5e425SJohn Baldwin if (i == 0) 1213a9f5e425SJohn Baldwin free(path); 1214a9f5e425SJohn Baldwin else 1215a9f5e425SJohn Baldwin fst->fs_path = path; 1216a9f5e425SJohn Baldwin } 1217e506e182SJohn Baldwin return (0); 1218e506e182SJohn Baldwin 1219e506e182SJohn Baldwin fail: 1220467112b4SMikolaj Golub if (errbuf != NULL) 1221e506e182SJohn Baldwin snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 1222e506e182SJohn Baldwin return (1); 1223e506e182SJohn Baldwin } 1224e506e182SJohn Baldwin 1225e506e182SJohn Baldwin static int 1226e506e182SJohn Baldwin procstat_get_shm_info_sysctl(struct filestat *fst, struct shmstat *shm, 1227e506e182SJohn Baldwin char *errbuf __unused) 1228e506e182SJohn Baldwin { 1229e506e182SJohn Baldwin struct kinfo_file *kif; 1230e506e182SJohn Baldwin 1231e506e182SJohn Baldwin assert(shm); 1232e506e182SJohn Baldwin assert(fst); 1233e506e182SJohn Baldwin bzero(shm, sizeof(*shm)); 1234e506e182SJohn Baldwin kif = fst->fs_typedep; 1235e506e182SJohn Baldwin if (kif == NULL) 1236e506e182SJohn Baldwin return (0); 1237e506e182SJohn Baldwin shm->size = kif->kf_un.kf_file.kf_file_size; 1238e506e182SJohn Baldwin shm->mode = kif->kf_un.kf_file.kf_file_mode; 1239e506e182SJohn Baldwin return (0); 1240e506e182SJohn Baldwin } 1241e506e182SJohn Baldwin 1242e506e182SJohn Baldwin int 12430daf62d9SStanislav Sedov procstat_get_vnode_info(struct procstat *procstat, struct filestat *fst, 12440daf62d9SStanislav Sedov struct vnstat *vn, char *errbuf) 12450daf62d9SStanislav Sedov { 12460daf62d9SStanislav Sedov 12470daf62d9SStanislav Sedov assert(vn); 12480daf62d9SStanislav Sedov if (procstat->type == PROCSTAT_KVM) { 12490daf62d9SStanislav Sedov return (procstat_get_vnode_info_kvm(procstat->kd, fst, vn, 12500daf62d9SStanislav Sedov errbuf)); 12517153ad2bSMikolaj Golub } else if (procstat->type == PROCSTAT_SYSCTL || 12527153ad2bSMikolaj Golub procstat->type == PROCSTAT_CORE) { 12530daf62d9SStanislav Sedov return (procstat_get_vnode_info_sysctl(fst, vn, errbuf)); 12540daf62d9SStanislav Sedov } else { 125580905c35SJilles Tjoelker warnx("unknown access method: %d", procstat->type); 1256467112b4SMikolaj Golub if (errbuf != NULL) 12570daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 12580daf62d9SStanislav Sedov return (1); 12590daf62d9SStanislav Sedov } 12600daf62d9SStanislav Sedov } 12610daf62d9SStanislav Sedov 12620daf62d9SStanislav Sedov static int 12630daf62d9SStanislav Sedov procstat_get_vnode_info_kvm(kvm_t *kd, struct filestat *fst, 12640daf62d9SStanislav Sedov struct vnstat *vn, char *errbuf) 12650daf62d9SStanislav Sedov { 12660daf62d9SStanislav Sedov /* Filesystem specific handlers. */ 12670daf62d9SStanislav Sedov #define FSTYPE(fst) {#fst, fst##_filestat} 12680daf62d9SStanislav Sedov struct { 12690daf62d9SStanislav Sedov const char *tag; 12700daf62d9SStanislav Sedov int (*handler)(kvm_t *kd, struct vnode *vp, 12710daf62d9SStanislav Sedov struct vnstat *vn); 12720daf62d9SStanislav Sedov } fstypes[] = { 12730daf62d9SStanislav Sedov FSTYPE(devfs), 12740daf62d9SStanislav Sedov FSTYPE(isofs), 12750daf62d9SStanislav Sedov FSTYPE(msdosfs), 12760daf62d9SStanislav Sedov FSTYPE(nfs), 1277237abf0cSDavide Italiano FSTYPE(smbfs), 12780daf62d9SStanislav Sedov FSTYPE(udf), 12790daf62d9SStanislav Sedov FSTYPE(ufs), 128059ea47d0SStanislav Sedov #ifdef LIBPROCSTAT_ZFS 12810daf62d9SStanislav Sedov FSTYPE(zfs), 12820daf62d9SStanislav Sedov #endif 12830daf62d9SStanislav Sedov }; 12840daf62d9SStanislav Sedov #define NTYPES (sizeof(fstypes) / sizeof(*fstypes)) 12850daf62d9SStanislav Sedov struct vnode vnode; 12860daf62d9SStanislav Sedov char tagstr[12]; 12870daf62d9SStanislav Sedov void *vp; 1288a770b4d8SMarcelo Araujo int error; 12890daf62d9SStanislav Sedov unsigned int i; 12900daf62d9SStanislav Sedov 12910daf62d9SStanislav Sedov assert(kd); 12920daf62d9SStanislav Sedov assert(vn); 12930daf62d9SStanislav Sedov assert(fst); 12940daf62d9SStanislav Sedov vp = fst->fs_typedep; 12950daf62d9SStanislav Sedov if (vp == NULL) 12960daf62d9SStanislav Sedov goto fail; 12970daf62d9SStanislav Sedov error = kvm_read_all(kd, (unsigned long)vp, &vnode, sizeof(vnode)); 12980daf62d9SStanislav Sedov if (error == 0) { 12990daf62d9SStanislav Sedov warnx("can't read vnode at %p", (void *)vp); 13000daf62d9SStanislav Sedov goto fail; 13010daf62d9SStanislav Sedov } 13020daf62d9SStanislav Sedov bzero(vn, sizeof(*vn)); 13030daf62d9SStanislav Sedov vn->vn_type = vntype2psfsttype(vnode.v_type); 13040daf62d9SStanislav Sedov if (vnode.v_type == VNON || vnode.v_type == VBAD) 13050daf62d9SStanislav Sedov return (0); 1306630cb9c5SMateusz Guzik error = kvm_read_all(kd, (unsigned long)vnode.v_lock.lock_object.lo_name, 1307630cb9c5SMateusz Guzik tagstr, sizeof(tagstr)); 13080daf62d9SStanislav Sedov if (error == 0) { 1309630cb9c5SMateusz Guzik warnx("can't read lo_name at %p", (void *)vp); 13100daf62d9SStanislav Sedov goto fail; 13110daf62d9SStanislav Sedov } 13120daf62d9SStanislav Sedov tagstr[sizeof(tagstr) - 1] = '\0'; 13130daf62d9SStanislav Sedov 13140daf62d9SStanislav Sedov /* 13150daf62d9SStanislav Sedov * Find appropriate handler. 13160daf62d9SStanislav Sedov */ 1317a770b4d8SMarcelo Araujo for (i = 0; i < NTYPES; i++) 13180daf62d9SStanislav Sedov if (!strcmp(fstypes[i].tag, tagstr)) { 13190daf62d9SStanislav Sedov if (fstypes[i].handler(kd, &vnode, vn) != 0) { 13200daf62d9SStanislav Sedov goto fail; 13210daf62d9SStanislav Sedov } 13220daf62d9SStanislav Sedov break; 13230daf62d9SStanislav Sedov } 13240daf62d9SStanislav Sedov if (i == NTYPES) { 1325467112b4SMikolaj Golub if (errbuf != NULL) 13260daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "?(%s)", tagstr); 13270daf62d9SStanislav Sedov return (1); 13280daf62d9SStanislav Sedov } 13290daf62d9SStanislav Sedov vn->vn_mntdir = getmnton(kd, vnode.v_mount); 13300daf62d9SStanislav Sedov if ((vnode.v_type == VBLK || vnode.v_type == VCHR) && 13310daf62d9SStanislav Sedov vnode.v_rdev != NULL){ 13320daf62d9SStanislav Sedov vn->vn_dev = dev2udev(kd, vnode.v_rdev); 13330daf62d9SStanislav Sedov (void)kdevtoname(kd, vnode.v_rdev, vn->vn_devname); 13340daf62d9SStanislav Sedov } else { 13350daf62d9SStanislav Sedov vn->vn_dev = -1; 13360daf62d9SStanislav Sedov } 13370daf62d9SStanislav Sedov return (0); 13380daf62d9SStanislav Sedov 13390daf62d9SStanislav Sedov fail: 1340467112b4SMikolaj Golub if (errbuf != NULL) 13410daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 13420daf62d9SStanislav Sedov return (1); 13430daf62d9SStanislav Sedov } 13440daf62d9SStanislav Sedov 13450daf62d9SStanislav Sedov /* 13460daf62d9SStanislav Sedov * kinfo vnode type to filestat translation. 13470daf62d9SStanislav Sedov */ 13480daf62d9SStanislav Sedov static int 13490daf62d9SStanislav Sedov kinfo_vtype2fst(int kfvtype) 13500daf62d9SStanislav Sedov { 13510daf62d9SStanislav Sedov static struct { 13520daf62d9SStanislav Sedov int kf_vtype; 13530daf62d9SStanislav Sedov int fst_vtype; 13540daf62d9SStanislav Sedov } kfvtypes2fst[] = { 13550daf62d9SStanislav Sedov { KF_VTYPE_VBAD, PS_FST_VTYPE_VBAD }, 13560daf62d9SStanislav Sedov { KF_VTYPE_VBLK, PS_FST_VTYPE_VBLK }, 13570daf62d9SStanislav Sedov { KF_VTYPE_VCHR, PS_FST_VTYPE_VCHR }, 13580daf62d9SStanislav Sedov { KF_VTYPE_VDIR, PS_FST_VTYPE_VDIR }, 13590daf62d9SStanislav Sedov { KF_VTYPE_VFIFO, PS_FST_VTYPE_VFIFO }, 13600daf62d9SStanislav Sedov { KF_VTYPE_VLNK, PS_FST_VTYPE_VLNK }, 13610daf62d9SStanislav Sedov { KF_VTYPE_VNON, PS_FST_VTYPE_VNON }, 13620daf62d9SStanislav Sedov { KF_VTYPE_VREG, PS_FST_VTYPE_VREG }, 13630daf62d9SStanislav Sedov { KF_VTYPE_VSOCK, PS_FST_VTYPE_VSOCK } 13640daf62d9SStanislav Sedov }; 13650daf62d9SStanislav Sedov #define NKFVTYPES (sizeof(kfvtypes2fst) / sizeof(*kfvtypes2fst)) 13660daf62d9SStanislav Sedov unsigned int i; 13670daf62d9SStanislav Sedov 13680daf62d9SStanislav Sedov for (i = 0; i < NKFVTYPES; i++) 13690daf62d9SStanislav Sedov if (kfvtypes2fst[i].kf_vtype == kfvtype) 13700daf62d9SStanislav Sedov break; 13710daf62d9SStanislav Sedov if (i == NKFVTYPES) 13720daf62d9SStanislav Sedov return (PS_FST_VTYPE_UNKNOWN); 13730daf62d9SStanislav Sedov return (kfvtypes2fst[i].fst_vtype); 13740daf62d9SStanislav Sedov } 13750daf62d9SStanislav Sedov 13760daf62d9SStanislav Sedov static int 13770daf62d9SStanislav Sedov procstat_get_vnode_info_sysctl(struct filestat *fst, struct vnstat *vn, 13780daf62d9SStanislav Sedov char *errbuf) 13790daf62d9SStanislav Sedov { 13800daf62d9SStanislav Sedov struct statfs stbuf; 13810daf62d9SStanislav Sedov struct kinfo_file *kif; 13820daf62d9SStanislav Sedov struct kinfo_vmentry *kve; 138369921123SKonstantin Belousov char *name, *path; 13840daf62d9SStanislav Sedov uint64_t fileid; 13850daf62d9SStanislav Sedov uint64_t size; 138669921123SKonstantin Belousov uint64_t fsid; 138769921123SKonstantin Belousov uint64_t rdev; 13880daf62d9SStanislav Sedov uint16_t mode; 13890daf62d9SStanislav Sedov int vntype; 13900daf62d9SStanislav Sedov int status; 13910daf62d9SStanislav Sedov 13920daf62d9SStanislav Sedov assert(fst); 13930daf62d9SStanislav Sedov assert(vn); 13940daf62d9SStanislav Sedov bzero(vn, sizeof(*vn)); 13950daf62d9SStanislav Sedov if (fst->fs_typedep == NULL) 13960daf62d9SStanislav Sedov return (1); 13970daf62d9SStanislav Sedov if (fst->fs_uflags & PS_FST_UFLAG_MMAP) { 13980daf62d9SStanislav Sedov kve = fst->fs_typedep; 13990daf62d9SStanislav Sedov fileid = kve->kve_vn_fileid; 14000daf62d9SStanislav Sedov fsid = kve->kve_vn_fsid; 14010daf62d9SStanislav Sedov mode = kve->kve_vn_mode; 14020daf62d9SStanislav Sedov path = kve->kve_path; 14030daf62d9SStanislav Sedov rdev = kve->kve_vn_rdev; 14040daf62d9SStanislav Sedov size = kve->kve_vn_size; 14050daf62d9SStanislav Sedov vntype = kinfo_vtype2fst(kve->kve_vn_type); 14060daf62d9SStanislav Sedov status = kve->kve_status; 14070daf62d9SStanislav Sedov } else { 14080daf62d9SStanislav Sedov kif = fst->fs_typedep; 14090daf62d9SStanislav Sedov fileid = kif->kf_un.kf_file.kf_file_fileid; 14100daf62d9SStanislav Sedov fsid = kif->kf_un.kf_file.kf_file_fsid; 14110daf62d9SStanislav Sedov mode = kif->kf_un.kf_file.kf_file_mode; 14120daf62d9SStanislav Sedov path = kif->kf_path; 14130daf62d9SStanislav Sedov rdev = kif->kf_un.kf_file.kf_file_rdev; 14140daf62d9SStanislav Sedov size = kif->kf_un.kf_file.kf_file_size; 14150daf62d9SStanislav Sedov vntype = kinfo_vtype2fst(kif->kf_vnode_type); 14160daf62d9SStanislav Sedov status = kif->kf_status; 14170daf62d9SStanislav Sedov } 14180daf62d9SStanislav Sedov vn->vn_type = vntype; 14190daf62d9SStanislav Sedov if (vntype == PS_FST_VTYPE_VNON || vntype == PS_FST_VTYPE_VBAD) 14200daf62d9SStanislav Sedov return (0); 14210daf62d9SStanislav Sedov if ((status & KF_ATTR_VALID) == 0) { 1422467112b4SMikolaj Golub if (errbuf != NULL) { 1423467112b4SMikolaj Golub snprintf(errbuf, _POSIX2_LINE_MAX, 1424467112b4SMikolaj Golub "? (no info available)"); 1425467112b4SMikolaj Golub } 14260daf62d9SStanislav Sedov return (1); 14270daf62d9SStanislav Sedov } 14280daf62d9SStanislav Sedov if (path && *path) { 14290daf62d9SStanislav Sedov statfs(path, &stbuf); 14300daf62d9SStanislav Sedov vn->vn_mntdir = strdup(stbuf.f_mntonname); 14310daf62d9SStanislav Sedov } else 14320daf62d9SStanislav Sedov vn->vn_mntdir = strdup("-"); 14330daf62d9SStanislav Sedov vn->vn_dev = rdev; 14340daf62d9SStanislav Sedov if (vntype == PS_FST_VTYPE_VBLK) { 14350daf62d9SStanislav Sedov name = devname(rdev, S_IFBLK); 14360daf62d9SStanislav Sedov if (name != NULL) 14370daf62d9SStanislav Sedov strlcpy(vn->vn_devname, name, 14380daf62d9SStanislav Sedov sizeof(vn->vn_devname)); 14390daf62d9SStanislav Sedov } else if (vntype == PS_FST_VTYPE_VCHR) { 14400daf62d9SStanislav Sedov name = devname(vn->vn_dev, S_IFCHR); 14410daf62d9SStanislav Sedov if (name != NULL) 14420daf62d9SStanislav Sedov strlcpy(vn->vn_devname, name, 14430daf62d9SStanislav Sedov sizeof(vn->vn_devname)); 14440daf62d9SStanislav Sedov } 14450daf62d9SStanislav Sedov vn->vn_fsid = fsid; 14460daf62d9SStanislav Sedov vn->vn_fileid = fileid; 14470daf62d9SStanislav Sedov vn->vn_size = size; 14480daf62d9SStanislav Sedov vn->vn_mode = mode; 14490daf62d9SStanislav Sedov return (0); 14500daf62d9SStanislav Sedov } 14510daf62d9SStanislav Sedov 14520daf62d9SStanislav Sedov int 14530daf62d9SStanislav Sedov procstat_get_socket_info(struct procstat *procstat, struct filestat *fst, 14540daf62d9SStanislav Sedov struct sockstat *sock, char *errbuf) 14550daf62d9SStanislav Sedov { 14560daf62d9SStanislav Sedov 14570daf62d9SStanislav Sedov assert(sock); 14580daf62d9SStanislav Sedov if (procstat->type == PROCSTAT_KVM) { 14590daf62d9SStanislav Sedov return (procstat_get_socket_info_kvm(procstat->kd, fst, sock, 14600daf62d9SStanislav Sedov errbuf)); 14617153ad2bSMikolaj Golub } else if (procstat->type == PROCSTAT_SYSCTL || 14627153ad2bSMikolaj Golub procstat->type == PROCSTAT_CORE) { 14630daf62d9SStanislav Sedov return (procstat_get_socket_info_sysctl(fst, sock, errbuf)); 14640daf62d9SStanislav Sedov } else { 146580905c35SJilles Tjoelker warnx("unknown access method: %d", procstat->type); 1466467112b4SMikolaj Golub if (errbuf != NULL) 14670daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 14680daf62d9SStanislav Sedov return (1); 14690daf62d9SStanislav Sedov } 14700daf62d9SStanislav Sedov } 14710daf62d9SStanislav Sedov 14720daf62d9SStanislav Sedov static int 14730daf62d9SStanislav Sedov procstat_get_socket_info_kvm(kvm_t *kd, struct filestat *fst, 14740daf62d9SStanislav Sedov struct sockstat *sock, char *errbuf) 14750daf62d9SStanislav Sedov { 14760daf62d9SStanislav Sedov struct domain dom; 14770daf62d9SStanislav Sedov struct inpcb inpcb; 14780daf62d9SStanislav Sedov struct protosw proto; 14790daf62d9SStanislav Sedov struct socket s; 14800daf62d9SStanislav Sedov struct unpcb unpcb; 14810daf62d9SStanislav Sedov ssize_t len; 14820daf62d9SStanislav Sedov void *so; 14830daf62d9SStanislav Sedov 14840daf62d9SStanislav Sedov assert(kd); 14850daf62d9SStanislav Sedov assert(sock); 14860daf62d9SStanislav Sedov assert(fst); 14870daf62d9SStanislav Sedov bzero(sock, sizeof(*sock)); 14880daf62d9SStanislav Sedov so = fst->fs_typedep; 14890daf62d9SStanislav Sedov if (so == NULL) 14900daf62d9SStanislav Sedov goto fail; 14910daf62d9SStanislav Sedov sock->so_addr = (uintptr_t)so; 14920daf62d9SStanislav Sedov /* fill in socket */ 14930daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)so, &s, 14940daf62d9SStanislav Sedov sizeof(struct socket))) { 14950daf62d9SStanislav Sedov warnx("can't read sock at %p", (void *)so); 14960daf62d9SStanislav Sedov goto fail; 14970daf62d9SStanislav Sedov } 14980daf62d9SStanislav Sedov /* fill in protosw entry */ 14990daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)s.so_proto, &proto, 15000daf62d9SStanislav Sedov sizeof(struct protosw))) { 15010daf62d9SStanislav Sedov warnx("can't read protosw at %p", (void *)s.so_proto); 15020daf62d9SStanislav Sedov goto fail; 15030daf62d9SStanislav Sedov } 15040daf62d9SStanislav Sedov /* fill in domain */ 15050daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)proto.pr_domain, &dom, 15060daf62d9SStanislav Sedov sizeof(struct domain))) { 15070daf62d9SStanislav Sedov warnx("can't read domain at %p", 15080daf62d9SStanislav Sedov (void *)proto.pr_domain); 15090daf62d9SStanislav Sedov goto fail; 15100daf62d9SStanislav Sedov } 15110daf62d9SStanislav Sedov if ((len = kvm_read(kd, (unsigned long)dom.dom_name, sock->dname, 15120daf62d9SStanislav Sedov sizeof(sock->dname) - 1)) < 0) { 15130daf62d9SStanislav Sedov warnx("can't read domain name at %p", (void *)dom.dom_name); 15140daf62d9SStanislav Sedov sock->dname[0] = '\0'; 15150daf62d9SStanislav Sedov } 15160daf62d9SStanislav Sedov else 15170daf62d9SStanislav Sedov sock->dname[len] = '\0'; 15180daf62d9SStanislav Sedov 15190daf62d9SStanislav Sedov /* 15200daf62d9SStanislav Sedov * Fill in known data. 15210daf62d9SStanislav Sedov */ 15220daf62d9SStanislav Sedov sock->type = s.so_type; 15230daf62d9SStanislav Sedov sock->proto = proto.pr_protocol; 15240daf62d9SStanislav Sedov sock->dom_family = dom.dom_family; 15250daf62d9SStanislav Sedov sock->so_pcb = (uintptr_t)s.so_pcb; 15260daf62d9SStanislav Sedov 15270daf62d9SStanislav Sedov /* 15280daf62d9SStanislav Sedov * Protocol specific data. 15290daf62d9SStanislav Sedov */ 15300daf62d9SStanislav Sedov switch (dom.dom_family) { 15310daf62d9SStanislav Sedov case AF_INET: 15320daf62d9SStanislav Sedov case AF_INET6: 15330daf62d9SStanislav Sedov if (proto.pr_protocol == IPPROTO_TCP) { 15340daf62d9SStanislav Sedov if (s.so_pcb) { 15350daf62d9SStanislav Sedov if (kvm_read(kd, (u_long)s.so_pcb, 15360daf62d9SStanislav Sedov (char *)&inpcb, sizeof(struct inpcb)) 15370daf62d9SStanislav Sedov != sizeof(struct inpcb)) { 15380daf62d9SStanislav Sedov warnx("can't read inpcb at %p", 15390daf62d9SStanislav Sedov (void *)s.so_pcb); 15400daf62d9SStanislav Sedov } else 15410daf62d9SStanislav Sedov sock->inp_ppcb = 15420daf62d9SStanislav Sedov (uintptr_t)inpcb.inp_ppcb; 154395b97895SConrad Meyer sock->sendq = s.so_snd.sb_ccc; 154495b97895SConrad Meyer sock->recvq = s.so_rcv.sb_ccc; 15450daf62d9SStanislav Sedov } 15460daf62d9SStanislav Sedov } 15470daf62d9SStanislav Sedov break; 15480daf62d9SStanislav Sedov case AF_UNIX: 15490daf62d9SStanislav Sedov if (s.so_pcb) { 15500daf62d9SStanislav Sedov if (kvm_read(kd, (u_long)s.so_pcb, (char *)&unpcb, 15510daf62d9SStanislav Sedov sizeof(struct unpcb)) != sizeof(struct unpcb)){ 15520daf62d9SStanislav Sedov warnx("can't read unpcb at %p", 15530daf62d9SStanislav Sedov (void *)s.so_pcb); 15540daf62d9SStanislav Sedov } else if (unpcb.unp_conn) { 15550daf62d9SStanislav Sedov sock->so_rcv_sb_state = s.so_rcv.sb_state; 15560daf62d9SStanislav Sedov sock->so_snd_sb_state = s.so_snd.sb_state; 15570daf62d9SStanislav Sedov sock->unp_conn = (uintptr_t)unpcb.unp_conn; 155895b97895SConrad Meyer sock->sendq = s.so_snd.sb_ccc; 155995b97895SConrad Meyer sock->recvq = s.so_rcv.sb_ccc; 15600daf62d9SStanislav Sedov } 15610daf62d9SStanislav Sedov } 15620daf62d9SStanislav Sedov break; 15630daf62d9SStanislav Sedov default: 15640daf62d9SStanislav Sedov break; 15650daf62d9SStanislav Sedov } 15660daf62d9SStanislav Sedov return (0); 15670daf62d9SStanislav Sedov 15680daf62d9SStanislav Sedov fail: 1569467112b4SMikolaj Golub if (errbuf != NULL) 15700daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 15710daf62d9SStanislav Sedov return (1); 15720daf62d9SStanislav Sedov } 15730daf62d9SStanislav Sedov 15740daf62d9SStanislav Sedov static int 15750daf62d9SStanislav Sedov procstat_get_socket_info_sysctl(struct filestat *fst, struct sockstat *sock, 15760daf62d9SStanislav Sedov char *errbuf __unused) 15770daf62d9SStanislav Sedov { 15780daf62d9SStanislav Sedov struct kinfo_file *kif; 15790daf62d9SStanislav Sedov 15800daf62d9SStanislav Sedov assert(sock); 15810daf62d9SStanislav Sedov assert(fst); 15820daf62d9SStanislav Sedov bzero(sock, sizeof(*sock)); 15830daf62d9SStanislav Sedov kif = fst->fs_typedep; 15840daf62d9SStanislav Sedov if (kif == NULL) 15850daf62d9SStanislav Sedov return (0); 15860daf62d9SStanislav Sedov 15870daf62d9SStanislav Sedov /* 15880daf62d9SStanislav Sedov * Fill in known data. 15890daf62d9SStanislav Sedov */ 15900daf62d9SStanislav Sedov sock->type = kif->kf_sock_type; 15910daf62d9SStanislav Sedov sock->proto = kif->kf_sock_protocol; 15920daf62d9SStanislav Sedov sock->dom_family = kif->kf_sock_domain; 15930daf62d9SStanislav Sedov sock->so_pcb = kif->kf_un.kf_sock.kf_sock_pcb; 15940daf62d9SStanislav Sedov strlcpy(sock->dname, kif->kf_path, sizeof(sock->dname)); 159569921123SKonstantin Belousov bcopy(&kif->kf_un.kf_sock.kf_sa_local, &sock->sa_local, 159669921123SKonstantin Belousov kif->kf_un.kf_sock.kf_sa_local.ss_len); 159769921123SKonstantin Belousov bcopy(&kif->kf_un.kf_sock.kf_sa_peer, &sock->sa_peer, 159869921123SKonstantin Belousov kif->kf_un.kf_sock.kf_sa_peer.ss_len); 15990daf62d9SStanislav Sedov 16000daf62d9SStanislav Sedov /* 16010daf62d9SStanislav Sedov * Protocol specific data. 16020daf62d9SStanislav Sedov */ 16030daf62d9SStanislav Sedov switch (sock->dom_family) { 16040daf62d9SStanislav Sedov case AF_INET: 16050daf62d9SStanislav Sedov case AF_INET6: 160695b97895SConrad Meyer if (sock->proto == IPPROTO_TCP) { 16070daf62d9SStanislav Sedov sock->inp_ppcb = kif->kf_un.kf_sock.kf_sock_inpcb; 160895b97895SConrad Meyer sock->sendq = kif->kf_un.kf_sock.kf_sock_sendq; 160995b97895SConrad Meyer sock->recvq = kif->kf_un.kf_sock.kf_sock_recvq; 161095b97895SConrad Meyer } 16110daf62d9SStanislav Sedov break; 16120daf62d9SStanislav Sedov case AF_UNIX: 16130daf62d9SStanislav Sedov if (kif->kf_un.kf_sock.kf_sock_unpconn != 0) { 16140daf62d9SStanislav Sedov sock->so_rcv_sb_state = 16150daf62d9SStanislav Sedov kif->kf_un.kf_sock.kf_sock_rcv_sb_state; 16160daf62d9SStanislav Sedov sock->so_snd_sb_state = 16170daf62d9SStanislav Sedov kif->kf_un.kf_sock.kf_sock_snd_sb_state; 16180daf62d9SStanislav Sedov sock->unp_conn = 16190daf62d9SStanislav Sedov kif->kf_un.kf_sock.kf_sock_unpconn; 162095b97895SConrad Meyer sock->sendq = kif->kf_un.kf_sock.kf_sock_sendq; 162195b97895SConrad Meyer sock->recvq = kif->kf_un.kf_sock.kf_sock_recvq; 16220daf62d9SStanislav Sedov } 16230daf62d9SStanislav Sedov break; 16240daf62d9SStanislav Sedov default: 16250daf62d9SStanislav Sedov break; 16260daf62d9SStanislav Sedov } 16270daf62d9SStanislav Sedov return (0); 16280daf62d9SStanislav Sedov } 16290daf62d9SStanislav Sedov 16300daf62d9SStanislav Sedov /* 16310daf62d9SStanislav Sedov * Descriptor flags to filestat translation. 16320daf62d9SStanislav Sedov */ 16330daf62d9SStanislav Sedov static int 16340daf62d9SStanislav Sedov to_filestat_flags(int flags) 16350daf62d9SStanislav Sedov { 16360daf62d9SStanislav Sedov static struct { 16370daf62d9SStanislav Sedov int flag; 16380daf62d9SStanislav Sedov int fst_flag; 16390daf62d9SStanislav Sedov } fstflags[] = { 16400daf62d9SStanislav Sedov { FREAD, PS_FST_FFLAG_READ }, 16410daf62d9SStanislav Sedov { FWRITE, PS_FST_FFLAG_WRITE }, 16420daf62d9SStanislav Sedov { O_APPEND, PS_FST_FFLAG_APPEND }, 16430daf62d9SStanislav Sedov { O_ASYNC, PS_FST_FFLAG_ASYNC }, 16440daf62d9SStanislav Sedov { O_CREAT, PS_FST_FFLAG_CREAT }, 16450daf62d9SStanislav Sedov { O_DIRECT, PS_FST_FFLAG_DIRECT }, 16460daf62d9SStanislav Sedov { O_EXCL, PS_FST_FFLAG_EXCL }, 16470daf62d9SStanislav Sedov { O_EXEC, PS_FST_FFLAG_EXEC }, 16480daf62d9SStanislav Sedov { O_EXLOCK, PS_FST_FFLAG_EXLOCK }, 16490daf62d9SStanislav Sedov { O_NOFOLLOW, PS_FST_FFLAG_NOFOLLOW }, 16500daf62d9SStanislav Sedov { O_NONBLOCK, PS_FST_FFLAG_NONBLOCK }, 16510daf62d9SStanislav Sedov { O_SHLOCK, PS_FST_FFLAG_SHLOCK }, 16520daf62d9SStanislav Sedov { O_SYNC, PS_FST_FFLAG_SYNC }, 16530daf62d9SStanislav Sedov { O_TRUNC, PS_FST_FFLAG_TRUNC } 16540daf62d9SStanislav Sedov }; 16550daf62d9SStanislav Sedov #define NFSTFLAGS (sizeof(fstflags) / sizeof(*fstflags)) 16560daf62d9SStanislav Sedov int fst_flags; 16570daf62d9SStanislav Sedov unsigned int i; 16580daf62d9SStanislav Sedov 16590daf62d9SStanislav Sedov fst_flags = 0; 16600daf62d9SStanislav Sedov for (i = 0; i < NFSTFLAGS; i++) 16610daf62d9SStanislav Sedov if (flags & fstflags[i].flag) 16620daf62d9SStanislav Sedov fst_flags |= fstflags[i].fst_flag; 16630daf62d9SStanislav Sedov return (fst_flags); 16640daf62d9SStanislav Sedov } 16650daf62d9SStanislav Sedov 16660daf62d9SStanislav Sedov /* 16670daf62d9SStanislav Sedov * Vnode type to filestate translation. 16680daf62d9SStanislav Sedov */ 16690daf62d9SStanislav Sedov static int 16700daf62d9SStanislav Sedov vntype2psfsttype(int type) 16710daf62d9SStanislav Sedov { 16720daf62d9SStanislav Sedov static struct { 16730daf62d9SStanislav Sedov int vtype; 16740daf62d9SStanislav Sedov int fst_vtype; 16750daf62d9SStanislav Sedov } vt2fst[] = { 16760daf62d9SStanislav Sedov { VBAD, PS_FST_VTYPE_VBAD }, 16770daf62d9SStanislav Sedov { VBLK, PS_FST_VTYPE_VBLK }, 16780daf62d9SStanislav Sedov { VCHR, PS_FST_VTYPE_VCHR }, 16790daf62d9SStanislav Sedov { VDIR, PS_FST_VTYPE_VDIR }, 16800daf62d9SStanislav Sedov { VFIFO, PS_FST_VTYPE_VFIFO }, 16810daf62d9SStanislav Sedov { VLNK, PS_FST_VTYPE_VLNK }, 16820daf62d9SStanislav Sedov { VNON, PS_FST_VTYPE_VNON }, 16830daf62d9SStanislav Sedov { VREG, PS_FST_VTYPE_VREG }, 16840daf62d9SStanislav Sedov { VSOCK, PS_FST_VTYPE_VSOCK } 16850daf62d9SStanislav Sedov }; 16860daf62d9SStanislav Sedov #define NVFTYPES (sizeof(vt2fst) / sizeof(*vt2fst)) 16870daf62d9SStanislav Sedov unsigned int i, fst_type; 16880daf62d9SStanislav Sedov 16890daf62d9SStanislav Sedov fst_type = PS_FST_VTYPE_UNKNOWN; 16900daf62d9SStanislav Sedov for (i = 0; i < NVFTYPES; i++) { 16910daf62d9SStanislav Sedov if (type == vt2fst[i].vtype) { 16920daf62d9SStanislav Sedov fst_type = vt2fst[i].fst_vtype; 16930daf62d9SStanislav Sedov break; 16940daf62d9SStanislav Sedov } 16950daf62d9SStanislav Sedov } 16960daf62d9SStanislav Sedov return (fst_type); 16970daf62d9SStanislav Sedov } 16980daf62d9SStanislav Sedov 16990daf62d9SStanislav Sedov static char * 17000daf62d9SStanislav Sedov getmnton(kvm_t *kd, struct mount *m) 17010daf62d9SStanislav Sedov { 17025f301949SBen Laurie struct mount mnt; 17030daf62d9SStanislav Sedov static struct mtab { 17040daf62d9SStanislav Sedov struct mtab *next; 17050daf62d9SStanislav Sedov struct mount *m; 17060daf62d9SStanislav Sedov char mntonname[MNAMELEN + 1]; 17070daf62d9SStanislav Sedov } *mhead = NULL; 17080daf62d9SStanislav Sedov struct mtab *mt; 17090daf62d9SStanislav Sedov 17100daf62d9SStanislav Sedov for (mt = mhead; mt != NULL; mt = mt->next) 17110daf62d9SStanislav Sedov if (m == mt->m) 17120daf62d9SStanislav Sedov return (mt->mntonname); 17130daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)m, &mnt, sizeof(struct mount))) { 17140daf62d9SStanislav Sedov warnx("can't read mount table at %p", (void *)m); 17150daf62d9SStanislav Sedov return (NULL); 17160daf62d9SStanislav Sedov } 17170daf62d9SStanislav Sedov if ((mt = malloc(sizeof (struct mtab))) == NULL) 17180daf62d9SStanislav Sedov err(1, NULL); 17190daf62d9SStanislav Sedov mt->m = m; 17200daf62d9SStanislav Sedov bcopy(&mnt.mnt_stat.f_mntonname[0], &mt->mntonname[0], MNAMELEN); 17215f301949SBen Laurie mt->mntonname[MNAMELEN] = '\0'; 17220daf62d9SStanislav Sedov mt->next = mhead; 17230daf62d9SStanislav Sedov mhead = mt; 17240daf62d9SStanislav Sedov return (mt->mntonname); 17250daf62d9SStanislav Sedov } 17267153ad2bSMikolaj Golub 17274482b5e3SMikolaj Golub /* 17284482b5e3SMikolaj Golub * Auxiliary structures and functions to get process environment or 17294482b5e3SMikolaj Golub * command line arguments. 17304482b5e3SMikolaj Golub */ 17314482b5e3SMikolaj Golub struct argvec { 17324482b5e3SMikolaj Golub char *buf; 17334482b5e3SMikolaj Golub size_t bufsize; 17344482b5e3SMikolaj Golub char **argv; 17354482b5e3SMikolaj Golub size_t argc; 17364482b5e3SMikolaj Golub }; 17374482b5e3SMikolaj Golub 17384482b5e3SMikolaj Golub static struct argvec * 17394482b5e3SMikolaj Golub argvec_alloc(size_t bufsize) 17404482b5e3SMikolaj Golub { 17414482b5e3SMikolaj Golub struct argvec *av; 17424482b5e3SMikolaj Golub 17434482b5e3SMikolaj Golub av = malloc(sizeof(*av)); 17444482b5e3SMikolaj Golub if (av == NULL) 17454482b5e3SMikolaj Golub return (NULL); 17464482b5e3SMikolaj Golub av->bufsize = bufsize; 17474482b5e3SMikolaj Golub av->buf = malloc(av->bufsize); 17484482b5e3SMikolaj Golub if (av->buf == NULL) { 17494482b5e3SMikolaj Golub free(av); 17504482b5e3SMikolaj Golub return (NULL); 17514482b5e3SMikolaj Golub } 17524482b5e3SMikolaj Golub av->argc = 32; 17534482b5e3SMikolaj Golub av->argv = malloc(sizeof(char *) * av->argc); 17544482b5e3SMikolaj Golub if (av->argv == NULL) { 17554482b5e3SMikolaj Golub free(av->buf); 17564482b5e3SMikolaj Golub free(av); 17574482b5e3SMikolaj Golub return (NULL); 17584482b5e3SMikolaj Golub } 17594482b5e3SMikolaj Golub return av; 17604482b5e3SMikolaj Golub } 17614482b5e3SMikolaj Golub 17624482b5e3SMikolaj Golub static void 17634482b5e3SMikolaj Golub argvec_free(struct argvec * av) 17644482b5e3SMikolaj Golub { 17654482b5e3SMikolaj Golub 17664482b5e3SMikolaj Golub free(av->argv); 17674482b5e3SMikolaj Golub free(av->buf); 17684482b5e3SMikolaj Golub free(av); 17694482b5e3SMikolaj Golub } 17704482b5e3SMikolaj Golub 17714482b5e3SMikolaj Golub static char ** 17724482b5e3SMikolaj Golub getargv(struct procstat *procstat, struct kinfo_proc *kp, size_t nchr, int env) 17734482b5e3SMikolaj Golub { 17744482b5e3SMikolaj Golub int error, name[4], argc, i; 17754482b5e3SMikolaj Golub struct argvec *av, **avp; 17764482b5e3SMikolaj Golub enum psc_type type; 17774482b5e3SMikolaj Golub size_t len; 17784482b5e3SMikolaj Golub char *p, **argv; 17794482b5e3SMikolaj Golub 17804482b5e3SMikolaj Golub assert(procstat); 17814482b5e3SMikolaj Golub assert(kp); 17824482b5e3SMikolaj Golub if (procstat->type == PROCSTAT_KVM) { 17834482b5e3SMikolaj Golub warnx("can't use kvm access method"); 17844482b5e3SMikolaj Golub return (NULL); 17854482b5e3SMikolaj Golub } 17864482b5e3SMikolaj Golub if (procstat->type != PROCSTAT_SYSCTL && 17874482b5e3SMikolaj Golub procstat->type != PROCSTAT_CORE) { 17884482b5e3SMikolaj Golub warnx("unknown access method: %d", procstat->type); 17894482b5e3SMikolaj Golub return (NULL); 17904482b5e3SMikolaj Golub } 17914482b5e3SMikolaj Golub 17924482b5e3SMikolaj Golub if (nchr == 0 || nchr > ARG_MAX) 17934482b5e3SMikolaj Golub nchr = ARG_MAX; 17944482b5e3SMikolaj Golub 17954482b5e3SMikolaj Golub avp = (struct argvec **)(env ? &procstat->argv : &procstat->envv); 17964482b5e3SMikolaj Golub av = *avp; 17974482b5e3SMikolaj Golub 17984482b5e3SMikolaj Golub if (av == NULL) 17994482b5e3SMikolaj Golub { 18004482b5e3SMikolaj Golub av = argvec_alloc(nchr); 18014482b5e3SMikolaj Golub if (av == NULL) 18024482b5e3SMikolaj Golub { 18034482b5e3SMikolaj Golub warn("malloc(%zu)", nchr); 18044482b5e3SMikolaj Golub return (NULL); 18054482b5e3SMikolaj Golub } 18064482b5e3SMikolaj Golub *avp = av; 18074482b5e3SMikolaj Golub } else if (av->bufsize < nchr) { 18084482b5e3SMikolaj Golub av->buf = reallocf(av->buf, nchr); 18094482b5e3SMikolaj Golub if (av->buf == NULL) { 18104482b5e3SMikolaj Golub warn("malloc(%zu)", nchr); 18114482b5e3SMikolaj Golub return (NULL); 18124482b5e3SMikolaj Golub } 18134482b5e3SMikolaj Golub } 18144482b5e3SMikolaj Golub if (procstat->type == PROCSTAT_SYSCTL) { 18154482b5e3SMikolaj Golub name[0] = CTL_KERN; 18164482b5e3SMikolaj Golub name[1] = KERN_PROC; 18174482b5e3SMikolaj Golub name[2] = env ? KERN_PROC_ENV : KERN_PROC_ARGS; 18184482b5e3SMikolaj Golub name[3] = kp->ki_pid; 18194482b5e3SMikolaj Golub len = nchr; 182075b6a179SEnji Cooper error = sysctl(name, nitems(name), av->buf, &len, NULL, 0); 18214482b5e3SMikolaj Golub if (error != 0 && errno != ESRCH && errno != EPERM) 18224482b5e3SMikolaj Golub warn("sysctl(kern.proc.%s)", env ? "env" : "args"); 18234482b5e3SMikolaj Golub if (error != 0 || len == 0) 18244482b5e3SMikolaj Golub return (NULL); 18254482b5e3SMikolaj Golub } else /* procstat->type == PROCSTAT_CORE */ { 18264482b5e3SMikolaj Golub type = env ? PSC_TYPE_ENVV : PSC_TYPE_ARGV; 18274482b5e3SMikolaj Golub len = nchr; 18284482b5e3SMikolaj Golub if (procstat_core_get(procstat->core, type, av->buf, &len) 18294482b5e3SMikolaj Golub == NULL) { 18304482b5e3SMikolaj Golub return (NULL); 18314482b5e3SMikolaj Golub } 18324482b5e3SMikolaj Golub } 18334482b5e3SMikolaj Golub 18344482b5e3SMikolaj Golub argv = av->argv; 18354482b5e3SMikolaj Golub argc = av->argc; 18364482b5e3SMikolaj Golub i = 0; 18374482b5e3SMikolaj Golub for (p = av->buf; p < av->buf + len; p += strlen(p) + 1) { 18384482b5e3SMikolaj Golub argv[i++] = p; 18394482b5e3SMikolaj Golub if (i < argc) 18404482b5e3SMikolaj Golub continue; 18414482b5e3SMikolaj Golub /* Grow argv. */ 18424482b5e3SMikolaj Golub argc += argc; 18434482b5e3SMikolaj Golub argv = realloc(argv, sizeof(char *) * argc); 18444482b5e3SMikolaj Golub if (argv == NULL) { 18454482b5e3SMikolaj Golub warn("malloc(%zu)", sizeof(char *) * argc); 18464482b5e3SMikolaj Golub return (NULL); 18474482b5e3SMikolaj Golub } 18484482b5e3SMikolaj Golub av->argv = argv; 18494482b5e3SMikolaj Golub av->argc = argc; 18504482b5e3SMikolaj Golub } 18514482b5e3SMikolaj Golub argv[i] = NULL; 18524482b5e3SMikolaj Golub 18534482b5e3SMikolaj Golub return (argv); 18544482b5e3SMikolaj Golub } 18554482b5e3SMikolaj Golub 18564482b5e3SMikolaj Golub /* 18574482b5e3SMikolaj Golub * Return process command line arguments. 18584482b5e3SMikolaj Golub */ 18594482b5e3SMikolaj Golub char ** 18604482b5e3SMikolaj Golub procstat_getargv(struct procstat *procstat, struct kinfo_proc *p, size_t nchr) 18614482b5e3SMikolaj Golub { 18624482b5e3SMikolaj Golub 18634482b5e3SMikolaj Golub return (getargv(procstat, p, nchr, 0)); 18644482b5e3SMikolaj Golub } 18654482b5e3SMikolaj Golub 18664482b5e3SMikolaj Golub /* 18674482b5e3SMikolaj Golub * Free the buffer allocated by procstat_getargv(). 18684482b5e3SMikolaj Golub */ 18694482b5e3SMikolaj Golub void 18704482b5e3SMikolaj Golub procstat_freeargv(struct procstat *procstat) 18714482b5e3SMikolaj Golub { 18724482b5e3SMikolaj Golub 18734482b5e3SMikolaj Golub if (procstat->argv != NULL) { 18744482b5e3SMikolaj Golub argvec_free(procstat->argv); 18754482b5e3SMikolaj Golub procstat->argv = NULL; 18764482b5e3SMikolaj Golub } 18774482b5e3SMikolaj Golub } 18784482b5e3SMikolaj Golub 18794482b5e3SMikolaj Golub /* 18804482b5e3SMikolaj Golub * Return process environment. 18814482b5e3SMikolaj Golub */ 18824482b5e3SMikolaj Golub char ** 18834482b5e3SMikolaj Golub procstat_getenvv(struct procstat *procstat, struct kinfo_proc *p, size_t nchr) 18844482b5e3SMikolaj Golub { 18854482b5e3SMikolaj Golub 18864482b5e3SMikolaj Golub return (getargv(procstat, p, nchr, 1)); 18874482b5e3SMikolaj Golub } 18884482b5e3SMikolaj Golub 18894482b5e3SMikolaj Golub /* 18904482b5e3SMikolaj Golub * Free the buffer allocated by procstat_getenvv(). 18914482b5e3SMikolaj Golub */ 18924482b5e3SMikolaj Golub void 18934482b5e3SMikolaj Golub procstat_freeenvv(struct procstat *procstat) 18944482b5e3SMikolaj Golub { 18954482b5e3SMikolaj Golub if (procstat->envv != NULL) { 18964482b5e3SMikolaj Golub argvec_free(procstat->envv); 18974482b5e3SMikolaj Golub procstat->envv = NULL; 18984482b5e3SMikolaj Golub } 18994482b5e3SMikolaj Golub } 19004482b5e3SMikolaj Golub 190139680c7bSMikolaj Golub static struct kinfo_vmentry * 190239680c7bSMikolaj Golub kinfo_getvmmap_core(struct procstat_core *core, int *cntp) 190339680c7bSMikolaj Golub { 190439680c7bSMikolaj Golub int cnt; 190539680c7bSMikolaj Golub size_t len; 190639680c7bSMikolaj Golub char *buf, *bp, *eb; 190739680c7bSMikolaj Golub struct kinfo_vmentry *kiv, *kp, *kv; 190839680c7bSMikolaj Golub 190939680c7bSMikolaj Golub buf = procstat_core_get(core, PSC_TYPE_VMMAP, NULL, &len); 191039680c7bSMikolaj Golub if (buf == NULL) 191139680c7bSMikolaj Golub return (NULL); 191239680c7bSMikolaj Golub 191339680c7bSMikolaj Golub /* 191439680c7bSMikolaj Golub * XXXMG: The code below is just copy&past from libutil. 191539680c7bSMikolaj Golub * The code duplication can be avoided if libutil 191639680c7bSMikolaj Golub * is extended to provide something like: 191739680c7bSMikolaj Golub * struct kinfo_vmentry *kinfo_getvmmap_from_buf(const char *buf, 191839680c7bSMikolaj Golub * size_t len, int *cntp); 191939680c7bSMikolaj Golub */ 192039680c7bSMikolaj Golub 192139680c7bSMikolaj Golub /* Pass 1: count items */ 192239680c7bSMikolaj Golub cnt = 0; 192339680c7bSMikolaj Golub bp = buf; 192439680c7bSMikolaj Golub eb = buf + len; 192539680c7bSMikolaj Golub while (bp < eb) { 192639680c7bSMikolaj Golub kv = (struct kinfo_vmentry *)(uintptr_t)bp; 1927e6b95927SConrad Meyer if (kv->kve_structsize == 0) 1928e6b95927SConrad Meyer break; 192939680c7bSMikolaj Golub bp += kv->kve_structsize; 193039680c7bSMikolaj Golub cnt++; 193139680c7bSMikolaj Golub } 193239680c7bSMikolaj Golub 193339680c7bSMikolaj Golub kiv = calloc(cnt, sizeof(*kiv)); 193439680c7bSMikolaj Golub if (kiv == NULL) { 193539680c7bSMikolaj Golub free(buf); 193639680c7bSMikolaj Golub return (NULL); 193739680c7bSMikolaj Golub } 193839680c7bSMikolaj Golub bp = buf; 193939680c7bSMikolaj Golub eb = buf + len; 194039680c7bSMikolaj Golub kp = kiv; 194139680c7bSMikolaj Golub /* Pass 2: unpack */ 194239680c7bSMikolaj Golub while (bp < eb) { 194339680c7bSMikolaj Golub kv = (struct kinfo_vmentry *)(uintptr_t)bp; 1944e6b95927SConrad Meyer if (kv->kve_structsize == 0) 1945e6b95927SConrad Meyer break; 194639680c7bSMikolaj Golub /* Copy/expand into pre-zeroed buffer */ 194739680c7bSMikolaj Golub memcpy(kp, kv, kv->kve_structsize); 194839680c7bSMikolaj Golub /* Advance to next packed record */ 194939680c7bSMikolaj Golub bp += kv->kve_structsize; 195039680c7bSMikolaj Golub /* Set field size to fixed length, advance */ 195139680c7bSMikolaj Golub kp->kve_structsize = sizeof(*kp); 195239680c7bSMikolaj Golub kp++; 195339680c7bSMikolaj Golub } 195439680c7bSMikolaj Golub free(buf); 195539680c7bSMikolaj Golub *cntp = cnt; 195639680c7bSMikolaj Golub return (kiv); /* Caller must free() return value */ 195739680c7bSMikolaj Golub } 195839680c7bSMikolaj Golub 195939680c7bSMikolaj Golub struct kinfo_vmentry * 196039680c7bSMikolaj Golub procstat_getvmmap(struct procstat *procstat, struct kinfo_proc *kp, 196139680c7bSMikolaj Golub unsigned int *cntp) 196239680c7bSMikolaj Golub { 196389358231SMikolaj Golub 196439680c7bSMikolaj Golub switch (procstat->type) { 196539680c7bSMikolaj Golub case PROCSTAT_KVM: 196639680c7bSMikolaj Golub warnx("kvm method is not supported"); 196739680c7bSMikolaj Golub return (NULL); 196839680c7bSMikolaj Golub case PROCSTAT_SYSCTL: 196939680c7bSMikolaj Golub return (kinfo_getvmmap(kp->ki_pid, cntp)); 197039680c7bSMikolaj Golub case PROCSTAT_CORE: 197139680c7bSMikolaj Golub return (kinfo_getvmmap_core(procstat->core, cntp)); 197239680c7bSMikolaj Golub default: 197339680c7bSMikolaj Golub warnx("unknown access method: %d", procstat->type); 197439680c7bSMikolaj Golub return (NULL); 197539680c7bSMikolaj Golub } 197639680c7bSMikolaj Golub } 197739680c7bSMikolaj Golub 197839680c7bSMikolaj Golub void 197939680c7bSMikolaj Golub procstat_freevmmap(struct procstat *procstat __unused, 198039680c7bSMikolaj Golub struct kinfo_vmentry *vmmap) 198139680c7bSMikolaj Golub { 198239680c7bSMikolaj Golub 198339680c7bSMikolaj Golub free(vmmap); 198439680c7bSMikolaj Golub } 19857f1d14e6SMikolaj Golub 19867f1d14e6SMikolaj Golub static gid_t * 19871f84c47eSMikolaj Golub procstat_getgroups_kvm(kvm_t *kd, struct kinfo_proc *kp, unsigned int *cntp) 19881f84c47eSMikolaj Golub { 19891f84c47eSMikolaj Golub struct proc proc; 19901f84c47eSMikolaj Golub struct ucred ucred; 19911f84c47eSMikolaj Golub gid_t *groups; 19921f84c47eSMikolaj Golub size_t len; 19931f84c47eSMikolaj Golub 19941f84c47eSMikolaj Golub assert(kd != NULL); 19951f84c47eSMikolaj Golub assert(kp != NULL); 19961f84c47eSMikolaj Golub if (!kvm_read_all(kd, (unsigned long)kp->ki_paddr, &proc, 19971f84c47eSMikolaj Golub sizeof(proc))) { 19981f84c47eSMikolaj Golub warnx("can't read proc struct at %p for pid %d", 19991f84c47eSMikolaj Golub kp->ki_paddr, kp->ki_pid); 20001f84c47eSMikolaj Golub return (NULL); 20011f84c47eSMikolaj Golub } 20021f84c47eSMikolaj Golub if (proc.p_ucred == NOCRED) 20031f84c47eSMikolaj Golub return (NULL); 20041f84c47eSMikolaj Golub if (!kvm_read_all(kd, (unsigned long)proc.p_ucred, &ucred, 20051f84c47eSMikolaj Golub sizeof(ucred))) { 20061f84c47eSMikolaj Golub warnx("can't read ucred struct at %p for pid %d", 20071f84c47eSMikolaj Golub proc.p_ucred, kp->ki_pid); 20081f84c47eSMikolaj Golub return (NULL); 20091f84c47eSMikolaj Golub } 20101f84c47eSMikolaj Golub len = ucred.cr_ngroups * sizeof(gid_t); 20111f84c47eSMikolaj Golub groups = malloc(len); 20121f84c47eSMikolaj Golub if (groups == NULL) { 20131f84c47eSMikolaj Golub warn("malloc(%zu)", len); 20141f84c47eSMikolaj Golub return (NULL); 20151f84c47eSMikolaj Golub } 20161f84c47eSMikolaj Golub if (!kvm_read_all(kd, (unsigned long)ucred.cr_groups, groups, len)) { 20171f84c47eSMikolaj Golub warnx("can't read groups at %p for pid %d", 20181f84c47eSMikolaj Golub ucred.cr_groups, kp->ki_pid); 20191f84c47eSMikolaj Golub free(groups); 20201f84c47eSMikolaj Golub return (NULL); 20211f84c47eSMikolaj Golub } 20221f84c47eSMikolaj Golub *cntp = ucred.cr_ngroups; 20231f84c47eSMikolaj Golub return (groups); 20241f84c47eSMikolaj Golub } 20251f84c47eSMikolaj Golub 20261f84c47eSMikolaj Golub static gid_t * 20277f1d14e6SMikolaj Golub procstat_getgroups_sysctl(pid_t pid, unsigned int *cntp) 20287f1d14e6SMikolaj Golub { 20297f1d14e6SMikolaj Golub int mib[4]; 20307f1d14e6SMikolaj Golub size_t len; 20317f1d14e6SMikolaj Golub gid_t *groups; 20327f1d14e6SMikolaj Golub 20337f1d14e6SMikolaj Golub mib[0] = CTL_KERN; 20347f1d14e6SMikolaj Golub mib[1] = KERN_PROC; 20357f1d14e6SMikolaj Golub mib[2] = KERN_PROC_GROUPS; 20367f1d14e6SMikolaj Golub mib[3] = pid; 20377f1d14e6SMikolaj Golub len = (sysconf(_SC_NGROUPS_MAX) + 1) * sizeof(gid_t); 20387f1d14e6SMikolaj Golub groups = malloc(len); 20397f1d14e6SMikolaj Golub if (groups == NULL) { 20407f1d14e6SMikolaj Golub warn("malloc(%zu)", len); 20417f1d14e6SMikolaj Golub return (NULL); 20427f1d14e6SMikolaj Golub } 204375b6a179SEnji Cooper if (sysctl(mib, nitems(mib), groups, &len, NULL, 0) == -1) { 20447f1d14e6SMikolaj Golub warn("sysctl: kern.proc.groups: %d", pid); 20457f1d14e6SMikolaj Golub free(groups); 20467f1d14e6SMikolaj Golub return (NULL); 20477f1d14e6SMikolaj Golub } 20487f1d14e6SMikolaj Golub *cntp = len / sizeof(gid_t); 20497f1d14e6SMikolaj Golub return (groups); 20507f1d14e6SMikolaj Golub } 20517f1d14e6SMikolaj Golub 20527f1d14e6SMikolaj Golub static gid_t * 20537f1d14e6SMikolaj Golub procstat_getgroups_core(struct procstat_core *core, unsigned int *cntp) 20547f1d14e6SMikolaj Golub { 20557f1d14e6SMikolaj Golub size_t len; 20567f1d14e6SMikolaj Golub gid_t *groups; 20577f1d14e6SMikolaj Golub 20587f1d14e6SMikolaj Golub groups = procstat_core_get(core, PSC_TYPE_GROUPS, NULL, &len); 20597f1d14e6SMikolaj Golub if (groups == NULL) 20607f1d14e6SMikolaj Golub return (NULL); 20617f1d14e6SMikolaj Golub *cntp = len / sizeof(gid_t); 20627f1d14e6SMikolaj Golub return (groups); 20637f1d14e6SMikolaj Golub } 20647f1d14e6SMikolaj Golub 20657f1d14e6SMikolaj Golub gid_t * 20667f1d14e6SMikolaj Golub procstat_getgroups(struct procstat *procstat, struct kinfo_proc *kp, 20677f1d14e6SMikolaj Golub unsigned int *cntp) 20687f1d14e6SMikolaj Golub { 20697f1d14e6SMikolaj Golub switch (procstat->type) { 20707f1d14e6SMikolaj Golub case PROCSTAT_KVM: 20711f84c47eSMikolaj Golub return (procstat_getgroups_kvm(procstat->kd, kp, cntp)); 20727f1d14e6SMikolaj Golub case PROCSTAT_SYSCTL: 20737f1d14e6SMikolaj Golub return (procstat_getgroups_sysctl(kp->ki_pid, cntp)); 20747f1d14e6SMikolaj Golub case PROCSTAT_CORE: 20757f1d14e6SMikolaj Golub return (procstat_getgroups_core(procstat->core, cntp)); 20767f1d14e6SMikolaj Golub default: 20777f1d14e6SMikolaj Golub warnx("unknown access method: %d", procstat->type); 20787f1d14e6SMikolaj Golub return (NULL); 20797f1d14e6SMikolaj Golub } 20807f1d14e6SMikolaj Golub } 20817f1d14e6SMikolaj Golub 20827f1d14e6SMikolaj Golub void 20837f1d14e6SMikolaj Golub procstat_freegroups(struct procstat *procstat __unused, gid_t *groups) 20847f1d14e6SMikolaj Golub { 20857f1d14e6SMikolaj Golub 20867f1d14e6SMikolaj Golub free(groups); 20877f1d14e6SMikolaj Golub } 20885b9bcba9SMikolaj Golub 20895b9bcba9SMikolaj Golub static int 20901f84c47eSMikolaj Golub procstat_getumask_kvm(kvm_t *kd, struct kinfo_proc *kp, unsigned short *maskp) 20911f84c47eSMikolaj Golub { 209285078b85SConrad Meyer struct pwddesc pd; 20931f84c47eSMikolaj Golub 20941f84c47eSMikolaj Golub assert(kd != NULL); 20951f84c47eSMikolaj Golub assert(kp != NULL); 209685078b85SConrad Meyer if (kp->ki_pd == NULL) 20971f84c47eSMikolaj Golub return (-1); 209885078b85SConrad Meyer if (!kvm_read_all(kd, (unsigned long)kp->ki_pd, &pd, sizeof(pd))) { 209985078b85SConrad Meyer warnx("can't read pwddesc at %p for pid %d", kp->ki_pd, 21001f84c47eSMikolaj Golub kp->ki_pid); 21011f84c47eSMikolaj Golub return (-1); 21021f84c47eSMikolaj Golub } 210385078b85SConrad Meyer *maskp = pd.pd_cmask; 21041f84c47eSMikolaj Golub return (0); 21051f84c47eSMikolaj Golub } 21061f84c47eSMikolaj Golub 21071f84c47eSMikolaj Golub static int 21085b9bcba9SMikolaj Golub procstat_getumask_sysctl(pid_t pid, unsigned short *maskp) 21095b9bcba9SMikolaj Golub { 21105b9bcba9SMikolaj Golub int error; 21115b9bcba9SMikolaj Golub int mib[4]; 21125b9bcba9SMikolaj Golub size_t len; 21135b9bcba9SMikolaj Golub 21145b9bcba9SMikolaj Golub mib[0] = CTL_KERN; 21155b9bcba9SMikolaj Golub mib[1] = KERN_PROC; 21165b9bcba9SMikolaj Golub mib[2] = KERN_PROC_UMASK; 21175b9bcba9SMikolaj Golub mib[3] = pid; 21185b9bcba9SMikolaj Golub len = sizeof(*maskp); 211975b6a179SEnji Cooper error = sysctl(mib, nitems(mib), maskp, &len, NULL, 0); 212009b46be1SRobert Watson if (error != 0 && errno != ESRCH && errno != EPERM) 21215b9bcba9SMikolaj Golub warn("sysctl: kern.proc.umask: %d", pid); 21225b9bcba9SMikolaj Golub return (error); 21235b9bcba9SMikolaj Golub } 21245b9bcba9SMikolaj Golub 21255b9bcba9SMikolaj Golub static int 21265b9bcba9SMikolaj Golub procstat_getumask_core(struct procstat_core *core, unsigned short *maskp) 21275b9bcba9SMikolaj Golub { 21285b9bcba9SMikolaj Golub size_t len; 21295b9bcba9SMikolaj Golub unsigned short *buf; 21305b9bcba9SMikolaj Golub 21315b9bcba9SMikolaj Golub buf = procstat_core_get(core, PSC_TYPE_UMASK, NULL, &len); 21325b9bcba9SMikolaj Golub if (buf == NULL) 21335b9bcba9SMikolaj Golub return (-1); 21345b9bcba9SMikolaj Golub if (len < sizeof(*maskp)) { 21355b9bcba9SMikolaj Golub free(buf); 21365b9bcba9SMikolaj Golub return (-1); 21375b9bcba9SMikolaj Golub } 21385b9bcba9SMikolaj Golub *maskp = *buf; 21395b9bcba9SMikolaj Golub free(buf); 21405b9bcba9SMikolaj Golub return (0); 21415b9bcba9SMikolaj Golub } 21425b9bcba9SMikolaj Golub 21435b9bcba9SMikolaj Golub int 21445b9bcba9SMikolaj Golub procstat_getumask(struct procstat *procstat, struct kinfo_proc *kp, 21455b9bcba9SMikolaj Golub unsigned short *maskp) 21465b9bcba9SMikolaj Golub { 21475b9bcba9SMikolaj Golub switch (procstat->type) { 21485b9bcba9SMikolaj Golub case PROCSTAT_KVM: 21491f84c47eSMikolaj Golub return (procstat_getumask_kvm(procstat->kd, kp, maskp)); 21505b9bcba9SMikolaj Golub case PROCSTAT_SYSCTL: 21515b9bcba9SMikolaj Golub return (procstat_getumask_sysctl(kp->ki_pid, maskp)); 21525b9bcba9SMikolaj Golub case PROCSTAT_CORE: 21535b9bcba9SMikolaj Golub return (procstat_getumask_core(procstat->core, maskp)); 21545b9bcba9SMikolaj Golub default: 21555b9bcba9SMikolaj Golub warnx("unknown access method: %d", procstat->type); 21565b9bcba9SMikolaj Golub return (-1); 21575b9bcba9SMikolaj Golub } 21585b9bcba9SMikolaj Golub } 21597cc0ebfdSMikolaj Golub 21607cc0ebfdSMikolaj Golub static int 21611f84c47eSMikolaj Golub procstat_getrlimit_kvm(kvm_t *kd, struct kinfo_proc *kp, int which, 21621f84c47eSMikolaj Golub struct rlimit* rlimit) 21631f84c47eSMikolaj Golub { 21641f84c47eSMikolaj Golub struct proc proc; 21651f84c47eSMikolaj Golub unsigned long offset; 21661f84c47eSMikolaj Golub 21671f84c47eSMikolaj Golub assert(kd != NULL); 21681f84c47eSMikolaj Golub assert(kp != NULL); 21691f84c47eSMikolaj Golub assert(which >= 0 && which < RLIM_NLIMITS); 21701f84c47eSMikolaj Golub if (!kvm_read_all(kd, (unsigned long)kp->ki_paddr, &proc, 21711f84c47eSMikolaj Golub sizeof(proc))) { 21721f84c47eSMikolaj Golub warnx("can't read proc struct at %p for pid %d", 21731f84c47eSMikolaj Golub kp->ki_paddr, kp->ki_pid); 21741f84c47eSMikolaj Golub return (-1); 21751f84c47eSMikolaj Golub } 21761f84c47eSMikolaj Golub if (proc.p_limit == NULL) 21771f84c47eSMikolaj Golub return (-1); 21781f84c47eSMikolaj Golub offset = (unsigned long)proc.p_limit + sizeof(struct rlimit) * which; 21791f84c47eSMikolaj Golub if (!kvm_read_all(kd, offset, rlimit, sizeof(*rlimit))) { 21801f84c47eSMikolaj Golub warnx("can't read rlimit struct at %p for pid %d", 21811f84c47eSMikolaj Golub (void *)offset, kp->ki_pid); 21821f84c47eSMikolaj Golub return (-1); 21831f84c47eSMikolaj Golub } 21841f84c47eSMikolaj Golub return (0); 21851f84c47eSMikolaj Golub } 21861f84c47eSMikolaj Golub 21871f84c47eSMikolaj Golub static int 21887cc0ebfdSMikolaj Golub procstat_getrlimit_sysctl(pid_t pid, int which, struct rlimit* rlimit) 21897cc0ebfdSMikolaj Golub { 21907cc0ebfdSMikolaj Golub int error, name[5]; 21917cc0ebfdSMikolaj Golub size_t len; 21927cc0ebfdSMikolaj Golub 21937cc0ebfdSMikolaj Golub name[0] = CTL_KERN; 21947cc0ebfdSMikolaj Golub name[1] = KERN_PROC; 21957cc0ebfdSMikolaj Golub name[2] = KERN_PROC_RLIMIT; 21967cc0ebfdSMikolaj Golub name[3] = pid; 21977cc0ebfdSMikolaj Golub name[4] = which; 21987cc0ebfdSMikolaj Golub len = sizeof(struct rlimit); 219975b6a179SEnji Cooper error = sysctl(name, nitems(name), rlimit, &len, NULL, 0); 22007cc0ebfdSMikolaj Golub if (error < 0 && errno != ESRCH) { 22017cc0ebfdSMikolaj Golub warn("sysctl: kern.proc.rlimit: %d", pid); 22027cc0ebfdSMikolaj Golub return (-1); 22037cc0ebfdSMikolaj Golub } 22047cc0ebfdSMikolaj Golub if (error < 0 || len != sizeof(struct rlimit)) 22057cc0ebfdSMikolaj Golub return (-1); 22067cc0ebfdSMikolaj Golub return (0); 22077cc0ebfdSMikolaj Golub } 22087cc0ebfdSMikolaj Golub 22097cc0ebfdSMikolaj Golub static int 22107cc0ebfdSMikolaj Golub procstat_getrlimit_core(struct procstat_core *core, int which, 22117cc0ebfdSMikolaj Golub struct rlimit* rlimit) 22127cc0ebfdSMikolaj Golub { 22137cc0ebfdSMikolaj Golub size_t len; 22147cc0ebfdSMikolaj Golub struct rlimit* rlimits; 22157cc0ebfdSMikolaj Golub 22167cc0ebfdSMikolaj Golub if (which < 0 || which >= RLIM_NLIMITS) { 22177cc0ebfdSMikolaj Golub errno = EINVAL; 22187cc0ebfdSMikolaj Golub warn("getrlimit: which"); 22197cc0ebfdSMikolaj Golub return (-1); 22207cc0ebfdSMikolaj Golub } 22217cc0ebfdSMikolaj Golub rlimits = procstat_core_get(core, PSC_TYPE_RLIMIT, NULL, &len); 22227cc0ebfdSMikolaj Golub if (rlimits == NULL) 22237cc0ebfdSMikolaj Golub return (-1); 22247cc0ebfdSMikolaj Golub if (len < sizeof(struct rlimit) * RLIM_NLIMITS) { 22257cc0ebfdSMikolaj Golub free(rlimits); 22267cc0ebfdSMikolaj Golub return (-1); 22277cc0ebfdSMikolaj Golub } 22287cc0ebfdSMikolaj Golub *rlimit = rlimits[which]; 22299b207441SEric van Gyzen free(rlimits); 22307cc0ebfdSMikolaj Golub return (0); 22317cc0ebfdSMikolaj Golub } 22327cc0ebfdSMikolaj Golub 22337cc0ebfdSMikolaj Golub int 22347cc0ebfdSMikolaj Golub procstat_getrlimit(struct procstat *procstat, struct kinfo_proc *kp, int which, 22357cc0ebfdSMikolaj Golub struct rlimit* rlimit) 22367cc0ebfdSMikolaj Golub { 22377cc0ebfdSMikolaj Golub switch (procstat->type) { 22387cc0ebfdSMikolaj Golub case PROCSTAT_KVM: 22391f84c47eSMikolaj Golub return (procstat_getrlimit_kvm(procstat->kd, kp, which, 22401f84c47eSMikolaj Golub rlimit)); 22417cc0ebfdSMikolaj Golub case PROCSTAT_SYSCTL: 22427cc0ebfdSMikolaj Golub return (procstat_getrlimit_sysctl(kp->ki_pid, which, rlimit)); 22437cc0ebfdSMikolaj Golub case PROCSTAT_CORE: 22447cc0ebfdSMikolaj Golub return (procstat_getrlimit_core(procstat->core, which, rlimit)); 22457cc0ebfdSMikolaj Golub default: 22467cc0ebfdSMikolaj Golub warnx("unknown access method: %d", procstat->type); 22477cc0ebfdSMikolaj Golub return (-1); 22487cc0ebfdSMikolaj Golub } 22497cc0ebfdSMikolaj Golub } 22504cdf9796SMikolaj Golub 22514cdf9796SMikolaj Golub static int 22524cdf9796SMikolaj Golub procstat_getpathname_sysctl(pid_t pid, char *pathname, size_t maxlen) 22534cdf9796SMikolaj Golub { 22544cdf9796SMikolaj Golub int error, name[4]; 22554cdf9796SMikolaj Golub size_t len; 22564cdf9796SMikolaj Golub 22574cdf9796SMikolaj Golub name[0] = CTL_KERN; 22584cdf9796SMikolaj Golub name[1] = KERN_PROC; 22594cdf9796SMikolaj Golub name[2] = KERN_PROC_PATHNAME; 22604cdf9796SMikolaj Golub name[3] = pid; 22614cdf9796SMikolaj Golub len = maxlen; 226275b6a179SEnji Cooper error = sysctl(name, nitems(name), pathname, &len, NULL, 0); 22634cdf9796SMikolaj Golub if (error != 0 && errno != ESRCH) 22644cdf9796SMikolaj Golub warn("sysctl: kern.proc.pathname: %d", pid); 22654cdf9796SMikolaj Golub if (len == 0) 22664cdf9796SMikolaj Golub pathname[0] = '\0'; 22674cdf9796SMikolaj Golub return (error); 22684cdf9796SMikolaj Golub } 22694cdf9796SMikolaj Golub 22704cdf9796SMikolaj Golub static int 22714cdf9796SMikolaj Golub procstat_getpathname_core(struct procstat_core *core, char *pathname, 22724cdf9796SMikolaj Golub size_t maxlen) 22734cdf9796SMikolaj Golub { 22744cdf9796SMikolaj Golub struct kinfo_file *files; 22754cdf9796SMikolaj Golub int cnt, i, result; 22764cdf9796SMikolaj Golub 22774cdf9796SMikolaj Golub files = kinfo_getfile_core(core, &cnt); 22784cdf9796SMikolaj Golub if (files == NULL) 22794cdf9796SMikolaj Golub return (-1); 22804cdf9796SMikolaj Golub result = -1; 22814cdf9796SMikolaj Golub for (i = 0; i < cnt; i++) { 22824cdf9796SMikolaj Golub if (files[i].kf_fd != KF_FD_TYPE_TEXT) 22834cdf9796SMikolaj Golub continue; 22844cdf9796SMikolaj Golub strncpy(pathname, files[i].kf_path, maxlen); 22854cdf9796SMikolaj Golub result = 0; 22864cdf9796SMikolaj Golub break; 22874cdf9796SMikolaj Golub } 22884cdf9796SMikolaj Golub free(files); 22894cdf9796SMikolaj Golub return (result); 22904cdf9796SMikolaj Golub } 22914cdf9796SMikolaj Golub 22924cdf9796SMikolaj Golub int 22934cdf9796SMikolaj Golub procstat_getpathname(struct procstat *procstat, struct kinfo_proc *kp, 22944cdf9796SMikolaj Golub char *pathname, size_t maxlen) 22954cdf9796SMikolaj Golub { 22964cdf9796SMikolaj Golub switch (procstat->type) { 22974cdf9796SMikolaj Golub case PROCSTAT_KVM: 2298dd70ad64SMikolaj Golub /* XXX: Return empty string. */ 2299dd70ad64SMikolaj Golub if (maxlen > 0) 2300dd70ad64SMikolaj Golub pathname[0] = '\0'; 2301dd70ad64SMikolaj Golub return (0); 23024cdf9796SMikolaj Golub case PROCSTAT_SYSCTL: 23034cdf9796SMikolaj Golub return (procstat_getpathname_sysctl(kp->ki_pid, pathname, 23044cdf9796SMikolaj Golub maxlen)); 23054cdf9796SMikolaj Golub case PROCSTAT_CORE: 23064cdf9796SMikolaj Golub return (procstat_getpathname_core(procstat->core, pathname, 23074cdf9796SMikolaj Golub maxlen)); 23084cdf9796SMikolaj Golub default: 23094cdf9796SMikolaj Golub warnx("unknown access method: %d", procstat->type); 23104cdf9796SMikolaj Golub return (-1); 23114cdf9796SMikolaj Golub } 23124cdf9796SMikolaj Golub } 2313eec6cb1cSMikolaj Golub 2314eec6cb1cSMikolaj Golub static int 23151f84c47eSMikolaj Golub procstat_getosrel_kvm(kvm_t *kd, struct kinfo_proc *kp, int *osrelp) 23161f84c47eSMikolaj Golub { 23171f84c47eSMikolaj Golub struct proc proc; 23181f84c47eSMikolaj Golub 23191f84c47eSMikolaj Golub assert(kd != NULL); 23201f84c47eSMikolaj Golub assert(kp != NULL); 23211f84c47eSMikolaj Golub if (!kvm_read_all(kd, (unsigned long)kp->ki_paddr, &proc, 23221f84c47eSMikolaj Golub sizeof(proc))) { 23231f84c47eSMikolaj Golub warnx("can't read proc struct at %p for pid %d", 23241f84c47eSMikolaj Golub kp->ki_paddr, kp->ki_pid); 23251f84c47eSMikolaj Golub return (-1); 23261f84c47eSMikolaj Golub } 23271f84c47eSMikolaj Golub *osrelp = proc.p_osrel; 23281f84c47eSMikolaj Golub return (0); 23291f84c47eSMikolaj Golub } 23301f84c47eSMikolaj Golub 23311f84c47eSMikolaj Golub static int 2332eec6cb1cSMikolaj Golub procstat_getosrel_sysctl(pid_t pid, int *osrelp) 2333eec6cb1cSMikolaj Golub { 2334eec6cb1cSMikolaj Golub int error, name[4]; 2335eec6cb1cSMikolaj Golub size_t len; 2336eec6cb1cSMikolaj Golub 2337eec6cb1cSMikolaj Golub name[0] = CTL_KERN; 2338eec6cb1cSMikolaj Golub name[1] = KERN_PROC; 2339eec6cb1cSMikolaj Golub name[2] = KERN_PROC_OSREL; 2340eec6cb1cSMikolaj Golub name[3] = pid; 2341eec6cb1cSMikolaj Golub len = sizeof(*osrelp); 234275b6a179SEnji Cooper error = sysctl(name, nitems(name), osrelp, &len, NULL, 0); 2343eec6cb1cSMikolaj Golub if (error != 0 && errno != ESRCH) 2344eec6cb1cSMikolaj Golub warn("sysctl: kern.proc.osrel: %d", pid); 2345eec6cb1cSMikolaj Golub return (error); 2346eec6cb1cSMikolaj Golub } 2347eec6cb1cSMikolaj Golub 2348eec6cb1cSMikolaj Golub static int 2349eec6cb1cSMikolaj Golub procstat_getosrel_core(struct procstat_core *core, int *osrelp) 2350eec6cb1cSMikolaj Golub { 2351eec6cb1cSMikolaj Golub size_t len; 2352eec6cb1cSMikolaj Golub int *buf; 2353eec6cb1cSMikolaj Golub 2354eec6cb1cSMikolaj Golub buf = procstat_core_get(core, PSC_TYPE_OSREL, NULL, &len); 2355eec6cb1cSMikolaj Golub if (buf == NULL) 2356eec6cb1cSMikolaj Golub return (-1); 2357eec6cb1cSMikolaj Golub if (len < sizeof(*osrelp)) { 2358eec6cb1cSMikolaj Golub free(buf); 2359eec6cb1cSMikolaj Golub return (-1); 2360eec6cb1cSMikolaj Golub } 2361eec6cb1cSMikolaj Golub *osrelp = *buf; 2362eec6cb1cSMikolaj Golub free(buf); 2363eec6cb1cSMikolaj Golub return (0); 2364eec6cb1cSMikolaj Golub } 2365eec6cb1cSMikolaj Golub 2366eec6cb1cSMikolaj Golub int 2367eec6cb1cSMikolaj Golub procstat_getosrel(struct procstat *procstat, struct kinfo_proc *kp, int *osrelp) 2368eec6cb1cSMikolaj Golub { 2369eec6cb1cSMikolaj Golub switch (procstat->type) { 2370eec6cb1cSMikolaj Golub case PROCSTAT_KVM: 23711f84c47eSMikolaj Golub return (procstat_getosrel_kvm(procstat->kd, kp, osrelp)); 2372eec6cb1cSMikolaj Golub case PROCSTAT_SYSCTL: 2373eec6cb1cSMikolaj Golub return (procstat_getosrel_sysctl(kp->ki_pid, osrelp)); 2374eec6cb1cSMikolaj Golub case PROCSTAT_CORE: 2375eec6cb1cSMikolaj Golub return (procstat_getosrel_core(procstat->core, osrelp)); 2376eec6cb1cSMikolaj Golub default: 2377eec6cb1cSMikolaj Golub warnx("unknown access method: %d", procstat->type); 2378eec6cb1cSMikolaj Golub return (-1); 2379eec6cb1cSMikolaj Golub } 2380eec6cb1cSMikolaj Golub } 23812ff020d3SMikolaj Golub 23822ff020d3SMikolaj Golub #define PROC_AUXV_MAX 256 23832ff020d3SMikolaj Golub 23842ff020d3SMikolaj Golub #if __ELF_WORD_SIZE == 64 23852ff020d3SMikolaj Golub static const char *elf32_sv_names[] = { 23862ff020d3SMikolaj Golub "Linux ELF32", 23872ff020d3SMikolaj Golub "FreeBSD ELF32", 23882ff020d3SMikolaj Golub }; 23892ff020d3SMikolaj Golub 23902ff020d3SMikolaj Golub static int 23912ff020d3SMikolaj Golub is_elf32_sysctl(pid_t pid) 23922ff020d3SMikolaj Golub { 23932ff020d3SMikolaj Golub int error, name[4]; 23942ff020d3SMikolaj Golub size_t len, i; 2395*72a4ee26SBrooks Davis char sv_name[32]; 23962ff020d3SMikolaj Golub 23972ff020d3SMikolaj Golub name[0] = CTL_KERN; 23982ff020d3SMikolaj Golub name[1] = KERN_PROC; 23992ff020d3SMikolaj Golub name[2] = KERN_PROC_SV_NAME; 24002ff020d3SMikolaj Golub name[3] = pid; 24012ff020d3SMikolaj Golub len = sizeof(sv_name); 240275b6a179SEnji Cooper error = sysctl(name, nitems(name), sv_name, &len, NULL, 0); 24032ff020d3SMikolaj Golub if (error != 0 || len == 0) 24042ff020d3SMikolaj Golub return (0); 24052ff020d3SMikolaj Golub for (i = 0; i < sizeof(elf32_sv_names) / sizeof(*elf32_sv_names); i++) { 24062ff020d3SMikolaj Golub if (strncmp(sv_name, elf32_sv_names[i], sizeof(sv_name)) == 0) 24072ff020d3SMikolaj Golub return (1); 24082ff020d3SMikolaj Golub } 24092ff020d3SMikolaj Golub return (0); 24102ff020d3SMikolaj Golub } 24112ff020d3SMikolaj Golub 24122ff020d3SMikolaj Golub static Elf_Auxinfo * 24132ff020d3SMikolaj Golub procstat_getauxv32_sysctl(pid_t pid, unsigned int *cntp) 24142ff020d3SMikolaj Golub { 24152ff020d3SMikolaj Golub Elf_Auxinfo *auxv; 24162ff020d3SMikolaj Golub Elf32_Auxinfo *auxv32; 24172ff020d3SMikolaj Golub size_t len; 24182ff020d3SMikolaj Golub unsigned int i, count; 24192ff020d3SMikolaj Golub int name[4]; 24202ff020d3SMikolaj Golub 24212ff020d3SMikolaj Golub name[0] = CTL_KERN; 24222ff020d3SMikolaj Golub name[1] = KERN_PROC; 24232ff020d3SMikolaj Golub name[2] = KERN_PROC_AUXV; 24242ff020d3SMikolaj Golub name[3] = pid; 24252ff020d3SMikolaj Golub len = PROC_AUXV_MAX * sizeof(Elf32_Auxinfo); 24262ff020d3SMikolaj Golub auxv = NULL; 24272ff020d3SMikolaj Golub auxv32 = malloc(len); 24282ff020d3SMikolaj Golub if (auxv32 == NULL) { 24292ff020d3SMikolaj Golub warn("malloc(%zu)", len); 24302ff020d3SMikolaj Golub goto out; 24312ff020d3SMikolaj Golub } 243275b6a179SEnji Cooper if (sysctl(name, nitems(name), auxv32, &len, NULL, 0) == -1) { 24332ff020d3SMikolaj Golub if (errno != ESRCH && errno != EPERM) 24342ff020d3SMikolaj Golub warn("sysctl: kern.proc.auxv: %d: %d", pid, errno); 24352ff020d3SMikolaj Golub goto out; 24362ff020d3SMikolaj Golub } 24372ff020d3SMikolaj Golub count = len / sizeof(Elf_Auxinfo); 24382ff020d3SMikolaj Golub auxv = malloc(count * sizeof(Elf_Auxinfo)); 24392ff020d3SMikolaj Golub if (auxv == NULL) { 24402ff020d3SMikolaj Golub warn("malloc(%zu)", count * sizeof(Elf_Auxinfo)); 24412ff020d3SMikolaj Golub goto out; 24422ff020d3SMikolaj Golub } 24432ff020d3SMikolaj Golub for (i = 0; i < count; i++) { 24442ff020d3SMikolaj Golub /* 24452ff020d3SMikolaj Golub * XXX: We expect that values for a_type on a 32-bit platform 24462ff020d3SMikolaj Golub * are directly mapped to values on 64-bit one, which is not 24472ff020d3SMikolaj Golub * necessarily true. 24482ff020d3SMikolaj Golub */ 24492ff020d3SMikolaj Golub auxv[i].a_type = auxv32[i].a_type; 24509735cc0eSBrooks Davis /* 24519735cc0eSBrooks Davis * Don't sign extend values. Existing entries are positive 24529735cc0eSBrooks Davis * integers or pointers. Under freebsd32, programs typically 24539735cc0eSBrooks Davis * have a full [0, 2^32) address space (perhaps minus the last 24549735cc0eSBrooks Davis * page) and treating this as a signed integer would be 24559735cc0eSBrooks Davis * confusing since these are not kernel pointers. 24569735cc0eSBrooks Davis * 24579735cc0eSBrooks Davis * XXX: A more complete translation would be ABI and 24589735cc0eSBrooks Davis * type-aware. 24599735cc0eSBrooks Davis */ 24609735cc0eSBrooks Davis auxv[i].a_un.a_val = (uint32_t)auxv32[i].a_un.a_val; 24612ff020d3SMikolaj Golub } 24622ff020d3SMikolaj Golub *cntp = count; 24632ff020d3SMikolaj Golub out: 24642ff020d3SMikolaj Golub free(auxv32); 24652ff020d3SMikolaj Golub return (auxv); 24662ff020d3SMikolaj Golub } 24672ff020d3SMikolaj Golub #endif /* __ELF_WORD_SIZE == 64 */ 24682ff020d3SMikolaj Golub 24692ff020d3SMikolaj Golub static Elf_Auxinfo * 24702ff020d3SMikolaj Golub procstat_getauxv_sysctl(pid_t pid, unsigned int *cntp) 24712ff020d3SMikolaj Golub { 24722ff020d3SMikolaj Golub Elf_Auxinfo *auxv; 24732ff020d3SMikolaj Golub int name[4]; 24742ff020d3SMikolaj Golub size_t len; 24752ff020d3SMikolaj Golub 24762ff020d3SMikolaj Golub #if __ELF_WORD_SIZE == 64 24772ff020d3SMikolaj Golub if (is_elf32_sysctl(pid)) 24782ff020d3SMikolaj Golub return (procstat_getauxv32_sysctl(pid, cntp)); 24792ff020d3SMikolaj Golub #endif 24802ff020d3SMikolaj Golub name[0] = CTL_KERN; 24812ff020d3SMikolaj Golub name[1] = KERN_PROC; 24822ff020d3SMikolaj Golub name[2] = KERN_PROC_AUXV; 24832ff020d3SMikolaj Golub name[3] = pid; 24842ff020d3SMikolaj Golub len = PROC_AUXV_MAX * sizeof(Elf_Auxinfo); 24852ff020d3SMikolaj Golub auxv = malloc(len); 24862ff020d3SMikolaj Golub if (auxv == NULL) { 24872ff020d3SMikolaj Golub warn("malloc(%zu)", len); 24882ff020d3SMikolaj Golub return (NULL); 24892ff020d3SMikolaj Golub } 249075b6a179SEnji Cooper if (sysctl(name, nitems(name), auxv, &len, NULL, 0) == -1) { 24912ff020d3SMikolaj Golub if (errno != ESRCH && errno != EPERM) 24922ff020d3SMikolaj Golub warn("sysctl: kern.proc.auxv: %d: %d", pid, errno); 24932ff020d3SMikolaj Golub free(auxv); 24942ff020d3SMikolaj Golub return (NULL); 24952ff020d3SMikolaj Golub } 24962ff020d3SMikolaj Golub *cntp = len / sizeof(Elf_Auxinfo); 24972ff020d3SMikolaj Golub return (auxv); 24982ff020d3SMikolaj Golub } 24992ff020d3SMikolaj Golub 25002ff020d3SMikolaj Golub static Elf_Auxinfo * 25012ff020d3SMikolaj Golub procstat_getauxv_core(struct procstat_core *core, unsigned int *cntp) 25022ff020d3SMikolaj Golub { 25032ff020d3SMikolaj Golub Elf_Auxinfo *auxv; 25042ff020d3SMikolaj Golub size_t len; 25052ff020d3SMikolaj Golub 25062ff020d3SMikolaj Golub auxv = procstat_core_get(core, PSC_TYPE_AUXV, NULL, &len); 25072ff020d3SMikolaj Golub if (auxv == NULL) 25082ff020d3SMikolaj Golub return (NULL); 25092ff020d3SMikolaj Golub *cntp = len / sizeof(Elf_Auxinfo); 25102ff020d3SMikolaj Golub return (auxv); 25112ff020d3SMikolaj Golub } 25122ff020d3SMikolaj Golub 25132ff020d3SMikolaj Golub Elf_Auxinfo * 25142ff020d3SMikolaj Golub procstat_getauxv(struct procstat *procstat, struct kinfo_proc *kp, 25152ff020d3SMikolaj Golub unsigned int *cntp) 25162ff020d3SMikolaj Golub { 25172ff020d3SMikolaj Golub switch (procstat->type) { 25182ff020d3SMikolaj Golub case PROCSTAT_KVM: 25192ff020d3SMikolaj Golub warnx("kvm method is not supported"); 25202ff020d3SMikolaj Golub return (NULL); 25212ff020d3SMikolaj Golub case PROCSTAT_SYSCTL: 25222ff020d3SMikolaj Golub return (procstat_getauxv_sysctl(kp->ki_pid, cntp)); 25232ff020d3SMikolaj Golub case PROCSTAT_CORE: 25242ff020d3SMikolaj Golub return (procstat_getauxv_core(procstat->core, cntp)); 25252ff020d3SMikolaj Golub default: 25262ff020d3SMikolaj Golub warnx("unknown access method: %d", procstat->type); 25272ff020d3SMikolaj Golub return (NULL); 25282ff020d3SMikolaj Golub } 25292ff020d3SMikolaj Golub } 25302ff020d3SMikolaj Golub 25312ff020d3SMikolaj Golub void 25322ff020d3SMikolaj Golub procstat_freeauxv(struct procstat *procstat __unused, Elf_Auxinfo *auxv) 25332ff020d3SMikolaj Golub { 25342ff020d3SMikolaj Golub 25352ff020d3SMikolaj Golub free(auxv); 25362ff020d3SMikolaj Golub } 253789358231SMikolaj Golub 253886be94fcSTycho Nightingale static struct ptrace_lwpinfo * 253986be94fcSTycho Nightingale procstat_getptlwpinfo_core(struct procstat_core *core, unsigned int *cntp) 254086be94fcSTycho Nightingale { 254186be94fcSTycho Nightingale void *buf; 254286be94fcSTycho Nightingale struct ptrace_lwpinfo *pl; 254386be94fcSTycho Nightingale unsigned int cnt; 254486be94fcSTycho Nightingale size_t len; 254586be94fcSTycho Nightingale 254686be94fcSTycho Nightingale cnt = procstat_core_note_count(core, PSC_TYPE_PTLWPINFO); 254786be94fcSTycho Nightingale if (cnt == 0) 254886be94fcSTycho Nightingale return (NULL); 254986be94fcSTycho Nightingale 255086be94fcSTycho Nightingale len = cnt * sizeof(*pl); 255186be94fcSTycho Nightingale buf = calloc(1, len); 255286be94fcSTycho Nightingale pl = procstat_core_get(core, PSC_TYPE_PTLWPINFO, buf, &len); 255386be94fcSTycho Nightingale if (pl == NULL) { 255486be94fcSTycho Nightingale free(buf); 255586be94fcSTycho Nightingale return (NULL); 255686be94fcSTycho Nightingale } 255786be94fcSTycho Nightingale *cntp = len / sizeof(*pl); 255886be94fcSTycho Nightingale return (pl); 255986be94fcSTycho Nightingale } 256086be94fcSTycho Nightingale 256186be94fcSTycho Nightingale struct ptrace_lwpinfo * 256286be94fcSTycho Nightingale procstat_getptlwpinfo(struct procstat *procstat, unsigned int *cntp) 256386be94fcSTycho Nightingale { 256486be94fcSTycho Nightingale switch (procstat->type) { 2565a2ae08e7SEnji Cooper case PROCSTAT_KVM: 2566a2ae08e7SEnji Cooper warnx("kvm method is not supported"); 2567a2ae08e7SEnji Cooper return (NULL); 2568a2ae08e7SEnji Cooper case PROCSTAT_SYSCTL: 2569a2ae08e7SEnji Cooper warnx("sysctl method is not supported"); 2570a2ae08e7SEnji Cooper return (NULL); 257186be94fcSTycho Nightingale case PROCSTAT_CORE: 257286be94fcSTycho Nightingale return (procstat_getptlwpinfo_core(procstat->core, cntp)); 257386be94fcSTycho Nightingale default: 257486be94fcSTycho Nightingale warnx("unknown access method: %d", procstat->type); 257586be94fcSTycho Nightingale return (NULL); 257686be94fcSTycho Nightingale } 257786be94fcSTycho Nightingale } 257886be94fcSTycho Nightingale 257986be94fcSTycho Nightingale void 258086be94fcSTycho Nightingale procstat_freeptlwpinfo(struct procstat *procstat __unused, 258186be94fcSTycho Nightingale struct ptrace_lwpinfo *pl) 258286be94fcSTycho Nightingale { 258386be94fcSTycho Nightingale free(pl); 258486be94fcSTycho Nightingale } 258586be94fcSTycho Nightingale 258689358231SMikolaj Golub static struct kinfo_kstack * 258789358231SMikolaj Golub procstat_getkstack_sysctl(pid_t pid, int *cntp) 258889358231SMikolaj Golub { 258989358231SMikolaj Golub struct kinfo_kstack *kkstp; 259089358231SMikolaj Golub int error, name[4]; 259189358231SMikolaj Golub size_t len; 259289358231SMikolaj Golub 259389358231SMikolaj Golub name[0] = CTL_KERN; 259489358231SMikolaj Golub name[1] = KERN_PROC; 259589358231SMikolaj Golub name[2] = KERN_PROC_KSTACK; 259689358231SMikolaj Golub name[3] = pid; 259789358231SMikolaj Golub 259889358231SMikolaj Golub len = 0; 259975b6a179SEnji Cooper error = sysctl(name, nitems(name), NULL, &len, NULL, 0); 260089358231SMikolaj Golub if (error < 0 && errno != ESRCH && errno != EPERM && errno != ENOENT) { 260189358231SMikolaj Golub warn("sysctl: kern.proc.kstack: %d", pid); 260289358231SMikolaj Golub return (NULL); 260389358231SMikolaj Golub } 260489358231SMikolaj Golub if (error == -1 && errno == ENOENT) { 260589358231SMikolaj Golub warnx("sysctl: kern.proc.kstack unavailable" 260689358231SMikolaj Golub " (options DDB or options STACK required in kernel)"); 260789358231SMikolaj Golub return (NULL); 260889358231SMikolaj Golub } 260989358231SMikolaj Golub if (error == -1) 261089358231SMikolaj Golub return (NULL); 261189358231SMikolaj Golub kkstp = malloc(len); 261289358231SMikolaj Golub if (kkstp == NULL) { 261389358231SMikolaj Golub warn("malloc(%zu)", len); 261489358231SMikolaj Golub return (NULL); 261589358231SMikolaj Golub } 2616427f12f1SEric van Gyzen if (sysctl(name, nitems(name), kkstp, &len, NULL, 0) == -1 && 2617427f12f1SEric van Gyzen errno != ENOMEM) { 261889358231SMikolaj Golub warn("sysctl: kern.proc.pid: %d", pid); 261989358231SMikolaj Golub free(kkstp); 262089358231SMikolaj Golub return (NULL); 262189358231SMikolaj Golub } 262289358231SMikolaj Golub *cntp = len / sizeof(*kkstp); 262389358231SMikolaj Golub 262489358231SMikolaj Golub return (kkstp); 262589358231SMikolaj Golub } 262689358231SMikolaj Golub 262789358231SMikolaj Golub struct kinfo_kstack * 262889358231SMikolaj Golub procstat_getkstack(struct procstat *procstat, struct kinfo_proc *kp, 262989358231SMikolaj Golub unsigned int *cntp) 263089358231SMikolaj Golub { 263189358231SMikolaj Golub switch (procstat->type) { 263289358231SMikolaj Golub case PROCSTAT_KVM: 263389358231SMikolaj Golub warnx("kvm method is not supported"); 263489358231SMikolaj Golub return (NULL); 263589358231SMikolaj Golub case PROCSTAT_SYSCTL: 263689358231SMikolaj Golub return (procstat_getkstack_sysctl(kp->ki_pid, cntp)); 263789358231SMikolaj Golub case PROCSTAT_CORE: 263889358231SMikolaj Golub warnx("core method is not supported"); 263989358231SMikolaj Golub return (NULL); 264089358231SMikolaj Golub default: 264189358231SMikolaj Golub warnx("unknown access method: %d", procstat->type); 264289358231SMikolaj Golub return (NULL); 264389358231SMikolaj Golub } 264489358231SMikolaj Golub } 264589358231SMikolaj Golub 264689358231SMikolaj Golub void 264789358231SMikolaj Golub procstat_freekstack(struct procstat *procstat __unused, 264889358231SMikolaj Golub struct kinfo_kstack *kkstp) 264989358231SMikolaj Golub { 265089358231SMikolaj Golub 265189358231SMikolaj Golub free(kkstp); 265289358231SMikolaj Golub } 2653039d1496SKonstantin Belousov 2654039d1496SKonstantin Belousov static struct advlock_list * 2655039d1496SKonstantin Belousov procstat_getadvlock_sysctl(struct procstat *procstat __unused) 2656039d1496SKonstantin Belousov { 2657039d1496SKonstantin Belousov struct advlock_list *res; 2658039d1496SKonstantin Belousov struct advlock *a; 2659039d1496SKonstantin Belousov void *buf; 2660039d1496SKonstantin Belousov char *c; 2661039d1496SKonstantin Belousov struct kinfo_lockf *kl; 2662039d1496SKonstantin Belousov size_t buf_len; 2663039d1496SKonstantin Belousov int error; 2664039d1496SKonstantin Belousov static const int kl_name[] = { CTL_KERN, KERN_LOCKF }; 2665039d1496SKonstantin Belousov 2666039d1496SKonstantin Belousov res = malloc(sizeof(*res)); 2667039d1496SKonstantin Belousov if (res == NULL) 2668039d1496SKonstantin Belousov return (NULL); 2669039d1496SKonstantin Belousov STAILQ_INIT(res); 2670039d1496SKonstantin Belousov buf = NULL; 2671039d1496SKonstantin Belousov 2672039d1496SKonstantin Belousov buf_len = 0; 2673039d1496SKonstantin Belousov error = sysctl(kl_name, nitems(kl_name), NULL, &buf_len, NULL, 0); 2674039d1496SKonstantin Belousov if (error != 0) { 2675039d1496SKonstantin Belousov warn("sysctl KERN_LOCKF size"); 2676039d1496SKonstantin Belousov goto fail; 2677039d1496SKonstantin Belousov } 2678039d1496SKonstantin Belousov buf_len *= 2; 2679039d1496SKonstantin Belousov buf = malloc(buf_len); 2680039d1496SKonstantin Belousov if (buf == NULL) { 2681039d1496SKonstantin Belousov warn("malloc"); 2682039d1496SKonstantin Belousov goto fail; 2683039d1496SKonstantin Belousov } 2684039d1496SKonstantin Belousov error = sysctl(kl_name, nitems(kl_name), buf, &buf_len, NULL, 0); 2685039d1496SKonstantin Belousov if (error != 0) { 2686039d1496SKonstantin Belousov warn("sysctl KERN_LOCKF data"); 2687039d1496SKonstantin Belousov goto fail; 2688039d1496SKonstantin Belousov } 2689039d1496SKonstantin Belousov 2690039d1496SKonstantin Belousov for (c = buf; (char *)c < (char *)buf + buf_len; 2691039d1496SKonstantin Belousov c += kl->kl_structsize) { 2692039d1496SKonstantin Belousov kl = (struct kinfo_lockf *)(void *)c; 2693039d1496SKonstantin Belousov if (sizeof(*kl) < (size_t)kl->kl_structsize) { 2694039d1496SKonstantin Belousov warn("ABI broken"); 2695039d1496SKonstantin Belousov goto fail; 2696039d1496SKonstantin Belousov } 2697039d1496SKonstantin Belousov a = malloc(sizeof(*a)); 2698039d1496SKonstantin Belousov if (a == NULL) { 2699039d1496SKonstantin Belousov warn("malloc advlock"); 2700039d1496SKonstantin Belousov goto fail; 2701039d1496SKonstantin Belousov } 2702039d1496SKonstantin Belousov switch (kl->kl_rw) { 2703039d1496SKonstantin Belousov case KLOCKF_RW_READ: 2704039d1496SKonstantin Belousov a->rw = PS_ADVLOCK_RO; 2705039d1496SKonstantin Belousov break; 2706039d1496SKonstantin Belousov case KLOCKF_RW_WRITE: 2707039d1496SKonstantin Belousov a->rw = PS_ADVLOCK_RW; 2708039d1496SKonstantin Belousov break; 2709039d1496SKonstantin Belousov default: 2710039d1496SKonstantin Belousov warn("ABI broken"); 2711039d1496SKonstantin Belousov free(a); 2712039d1496SKonstantin Belousov goto fail; 2713039d1496SKonstantin Belousov } 2714039d1496SKonstantin Belousov switch (kl->kl_type) { 2715039d1496SKonstantin Belousov case KLOCKF_TYPE_FLOCK: 2716039d1496SKonstantin Belousov a->type = PS_ADVLOCK_TYPE_FLOCK; 2717039d1496SKonstantin Belousov break; 2718039d1496SKonstantin Belousov case KLOCKF_TYPE_PID: 2719039d1496SKonstantin Belousov a->type = PS_ADVLOCK_TYPE_PID; 2720039d1496SKonstantin Belousov break; 2721039d1496SKonstantin Belousov case KLOCKF_TYPE_REMOTE: 2722039d1496SKonstantin Belousov a->type = PS_ADVLOCK_TYPE_REMOTE; 2723039d1496SKonstantin Belousov break; 2724039d1496SKonstantin Belousov default: 2725039d1496SKonstantin Belousov warn("ABI broken"); 2726039d1496SKonstantin Belousov free(a); 2727039d1496SKonstantin Belousov goto fail; 2728039d1496SKonstantin Belousov } 2729039d1496SKonstantin Belousov a->pid = kl->kl_pid; 2730039d1496SKonstantin Belousov a->sysid = kl->kl_sysid; 2731039d1496SKonstantin Belousov a->file_fsid = kl->kl_file_fsid; 2732039d1496SKonstantin Belousov a->file_rdev = kl->kl_file_rdev; 2733039d1496SKonstantin Belousov a->file_fileid = kl->kl_file_fileid; 2734039d1496SKonstantin Belousov a->start = kl->kl_start; 2735039d1496SKonstantin Belousov a->len = kl->kl_len; 2736039d1496SKonstantin Belousov if (kl->kl_path[0] != '\0') { 2737039d1496SKonstantin Belousov a->path = strdup(kl->kl_path); 2738039d1496SKonstantin Belousov if (a->path == NULL) { 2739039d1496SKonstantin Belousov warn("malloc"); 2740039d1496SKonstantin Belousov free(a); 2741039d1496SKonstantin Belousov goto fail; 2742039d1496SKonstantin Belousov } 2743039d1496SKonstantin Belousov } else 2744039d1496SKonstantin Belousov a->path = NULL; 2745039d1496SKonstantin Belousov STAILQ_INSERT_TAIL(res, a, next); 2746039d1496SKonstantin Belousov } 2747039d1496SKonstantin Belousov 2748039d1496SKonstantin Belousov free(buf); 2749039d1496SKonstantin Belousov return (res); 2750039d1496SKonstantin Belousov 2751039d1496SKonstantin Belousov fail: 2752039d1496SKonstantin Belousov free(buf); 2753039d1496SKonstantin Belousov procstat_freeadvlock(procstat, res); 2754039d1496SKonstantin Belousov return (NULL); 2755039d1496SKonstantin Belousov } 2756039d1496SKonstantin Belousov 2757039d1496SKonstantin Belousov struct advlock_list * 2758039d1496SKonstantin Belousov procstat_getadvlock(struct procstat *procstat) 2759039d1496SKonstantin Belousov { 2760039d1496SKonstantin Belousov switch (procstat->type) { 2761039d1496SKonstantin Belousov case PROCSTAT_KVM: 2762039d1496SKonstantin Belousov warnx("kvm method is not supported"); 2763039d1496SKonstantin Belousov return (NULL); 2764039d1496SKonstantin Belousov case PROCSTAT_SYSCTL: 2765039d1496SKonstantin Belousov return (procstat_getadvlock_sysctl(procstat)); 2766039d1496SKonstantin Belousov case PROCSTAT_CORE: 2767039d1496SKonstantin Belousov warnx("core method is not supported"); 2768039d1496SKonstantin Belousov return (NULL); 2769039d1496SKonstantin Belousov default: 2770039d1496SKonstantin Belousov warnx("unknown access method: %d", procstat->type); 2771039d1496SKonstantin Belousov return (NULL); 2772039d1496SKonstantin Belousov } 2773039d1496SKonstantin Belousov } 2774039d1496SKonstantin Belousov 2775039d1496SKonstantin Belousov void 2776039d1496SKonstantin Belousov procstat_freeadvlock(struct procstat *procstat __unused, 2777039d1496SKonstantin Belousov struct advlock_list *lst) 2778039d1496SKonstantin Belousov { 2779039d1496SKonstantin Belousov struct advlock *a, *a1; 2780039d1496SKonstantin Belousov 2781039d1496SKonstantin Belousov STAILQ_FOREACH_SAFE(a, lst, next, a1) { 2782039d1496SKonstantin Belousov free(__DECONST(char *, a->path)); 2783039d1496SKonstantin Belousov free(a); 2784039d1496SKonstantin Belousov } 2785039d1496SKonstantin Belousov free(lst); 2786039d1496SKonstantin Belousov } 2787039d1496SKonstantin Belousov 2788