xref: /freebsd/lib/libprocstat/libprocstat.c (revision 958aa57537952c7e7018518bb9d643b81e85e827)
10daf62d9SStanislav Sedov /*-
20daf62d9SStanislav Sedov  * Copyright (c) 2009 Stanislav Sedov <stas@FreeBSD.org>
30daf62d9SStanislav Sedov  * Copyright (c) 1988, 1993
40daf62d9SStanislav Sedov  *      The Regents of the University of California.  All rights reserved.
50daf62d9SStanislav Sedov  *
60daf62d9SStanislav Sedov  * Redistribution and use in source and binary forms, with or without
70daf62d9SStanislav Sedov  * modification, are permitted provided that the following conditions
80daf62d9SStanislav Sedov  * are met:
90daf62d9SStanislav Sedov  * 1. Redistributions of source code must retain the above copyright
100daf62d9SStanislav Sedov  *    notice, this list of conditions and the following disclaimer.
110daf62d9SStanislav Sedov  * 2. Redistributions in binary form must reproduce the above copyright
120daf62d9SStanislav Sedov  *    notice, this list of conditions and the following disclaimer in the
130daf62d9SStanislav Sedov  *    documentation and/or other materials provided with the distribution.
140daf62d9SStanislav Sedov  * 3. All advertising materials mentioning features or use of this software
150daf62d9SStanislav Sedov  *    must display the following acknowledgement:
160daf62d9SStanislav Sedov  *      This product includes software developed by the University of
170daf62d9SStanislav Sedov  *      California, Berkeley and its contributors.
180daf62d9SStanislav Sedov  * 4. Neither the name of the University nor the names of its contributors
190daf62d9SStanislav Sedov  *    may be used to endorse or promote products derived from this software
200daf62d9SStanislav Sedov  *    without specific prior written permission.
210daf62d9SStanislav Sedov  *
220daf62d9SStanislav Sedov  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
230daf62d9SStanislav Sedov  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
240daf62d9SStanislav Sedov  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
250daf62d9SStanislav Sedov  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
260daf62d9SStanislav Sedov  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
270daf62d9SStanislav Sedov  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
280daf62d9SStanislav Sedov  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
290daf62d9SStanislav Sedov  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
300daf62d9SStanislav Sedov  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
310daf62d9SStanislav Sedov  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
320daf62d9SStanislav Sedov  * SUCH DAMAGE.
330daf62d9SStanislav Sedov  */
340daf62d9SStanislav Sedov 
350daf62d9SStanislav Sedov #include <sys/cdefs.h>
360daf62d9SStanislav Sedov __FBSDID("$FreeBSD$");
370daf62d9SStanislav Sedov 
380daf62d9SStanislav Sedov #include <sys/param.h>
392ff020d3SMikolaj Golub #include <sys/elf.h>
400daf62d9SStanislav Sedov #include <sys/time.h>
417cc0ebfdSMikolaj Golub #include <sys/resourcevar.h>
421f84c47eSMikolaj Golub #define	_WANT_UCRED
431f84c47eSMikolaj Golub #include <sys/ucred.h>
441f84c47eSMikolaj Golub #undef _WANT_UCRED
450daf62d9SStanislav Sedov #include <sys/proc.h>
460daf62d9SStanislav Sedov #include <sys/user.h>
470daf62d9SStanislav Sedov #include <sys/stat.h>
480daf62d9SStanislav Sedov #include <sys/vnode.h>
490daf62d9SStanislav Sedov #include <sys/socket.h>
500daf62d9SStanislav Sedov #include <sys/socketvar.h>
510daf62d9SStanislav Sedov #include <sys/domain.h>
520daf62d9SStanislav Sedov #include <sys/protosw.h>
530daf62d9SStanislav Sedov #include <sys/un.h>
540daf62d9SStanislav Sedov #include <sys/unpcb.h>
550daf62d9SStanislav Sedov #include <sys/sysctl.h>
560daf62d9SStanislav Sedov #include <sys/tty.h>
570daf62d9SStanislav Sedov #include <sys/filedesc.h>
580daf62d9SStanislav Sedov #include <sys/queue.h>
590daf62d9SStanislav Sedov #define	_WANT_FILE
600daf62d9SStanislav Sedov #include <sys/file.h>
610daf62d9SStanislav Sedov #include <sys/conf.h>
62*958aa575SJohn Baldwin #include <sys/ksem.h>
63e506e182SJohn Baldwin #include <sys/mman.h>
640daf62d9SStanislav Sedov #define	_KERNEL
650daf62d9SStanislav Sedov #include <sys/mount.h>
660daf62d9SStanislav Sedov #include <sys/pipe.h>
670daf62d9SStanislav Sedov #include <ufs/ufs/quota.h>
680daf62d9SStanislav Sedov #include <ufs/ufs/inode.h>
690daf62d9SStanislav Sedov #include <fs/devfs/devfs.h>
700daf62d9SStanislav Sedov #include <fs/devfs/devfs_int.h>
710daf62d9SStanislav Sedov #undef _KERNEL
720daf62d9SStanislav Sedov #include <nfs/nfsproto.h>
730daf62d9SStanislav Sedov #include <nfsclient/nfs.h>
740daf62d9SStanislav Sedov #include <nfsclient/nfsnode.h>
750daf62d9SStanislav Sedov 
760daf62d9SStanislav Sedov #include <vm/vm.h>
770daf62d9SStanislav Sedov #include <vm/vm_map.h>
780daf62d9SStanislav Sedov #include <vm/vm_object.h>
790daf62d9SStanislav Sedov 
800daf62d9SStanislav Sedov #include <net/route.h>
810daf62d9SStanislav Sedov #include <netinet/in.h>
820daf62d9SStanislav Sedov #include <netinet/in_systm.h>
830daf62d9SStanislav Sedov #include <netinet/ip.h>
840daf62d9SStanislav Sedov #include <netinet/in_pcb.h>
850daf62d9SStanislav Sedov 
860daf62d9SStanislav Sedov #include <assert.h>
870daf62d9SStanislav Sedov #include <ctype.h>
880daf62d9SStanislav Sedov #include <err.h>
890daf62d9SStanislav Sedov #include <fcntl.h>
900daf62d9SStanislav Sedov #include <kvm.h>
910daf62d9SStanislav Sedov #include <libutil.h>
920daf62d9SStanislav Sedov #include <limits.h>
930daf62d9SStanislav Sedov #include <paths.h>
940daf62d9SStanislav Sedov #include <pwd.h>
950daf62d9SStanislav Sedov #include <stdio.h>
960daf62d9SStanislav Sedov #include <stdlib.h>
970daf62d9SStanislav Sedov #include <stddef.h>
980daf62d9SStanislav Sedov #include <string.h>
990daf62d9SStanislav Sedov #include <unistd.h>
1000daf62d9SStanislav Sedov #include <netdb.h>
1010daf62d9SStanislav Sedov 
1020daf62d9SStanislav Sedov #include <libprocstat.h>
1030daf62d9SStanislav Sedov #include "libprocstat_internal.h"
1040daf62d9SStanislav Sedov #include "common_kvm.h"
1057153ad2bSMikolaj Golub #include "core.h"
1060daf62d9SStanislav Sedov 
1070daf62d9SStanislav Sedov int     statfs(const char *, struct statfs *);	/* XXX */
1080daf62d9SStanislav Sedov 
1090daf62d9SStanislav Sedov #define	PROCSTAT_KVM	1
1100daf62d9SStanislav Sedov #define	PROCSTAT_SYSCTL	2
1117153ad2bSMikolaj Golub #define	PROCSTAT_CORE	3
1120daf62d9SStanislav Sedov 
1134482b5e3SMikolaj Golub static char	**getargv(struct procstat *procstat, struct kinfo_proc *kp,
1144482b5e3SMikolaj Golub     size_t nchr, int env);
1150daf62d9SStanislav Sedov static char	*getmnton(kvm_t *kd, struct mount *m);
11639680c7bSMikolaj Golub static struct kinfo_vmentry *	kinfo_getvmmap_core(struct procstat_core *core,
11739680c7bSMikolaj Golub     int *cntp);
1182ff020d3SMikolaj Golub static Elf_Auxinfo	*procstat_getauxv_core(struct procstat_core *core,
1192ff020d3SMikolaj Golub     unsigned int *cntp);
1202ff020d3SMikolaj Golub static Elf_Auxinfo	*procstat_getauxv_sysctl(pid_t pid, unsigned int *cntp);
1210daf62d9SStanislav Sedov static struct filestat_list	*procstat_getfiles_kvm(
1220daf62d9SStanislav Sedov     struct procstat *procstat, struct kinfo_proc *kp, int mmapped);
1230daf62d9SStanislav Sedov static struct filestat_list	*procstat_getfiles_sysctl(
1240daf62d9SStanislav Sedov     struct procstat *procstat, struct kinfo_proc *kp, int mmapped);
1250daf62d9SStanislav Sedov static int	procstat_get_pipe_info_sysctl(struct filestat *fst,
1260daf62d9SStanislav Sedov     struct pipestat *pipe, char *errbuf);
1270daf62d9SStanislav Sedov static int	procstat_get_pipe_info_kvm(kvm_t *kd, struct filestat *fst,
1280daf62d9SStanislav Sedov     struct pipestat *pipe, char *errbuf);
1290daf62d9SStanislav Sedov static int	procstat_get_pts_info_sysctl(struct filestat *fst,
1300daf62d9SStanislav Sedov     struct ptsstat *pts, char *errbuf);
1310daf62d9SStanislav Sedov static int	procstat_get_pts_info_kvm(kvm_t *kd, struct filestat *fst,
1320daf62d9SStanislav Sedov     struct ptsstat *pts, char *errbuf);
133*958aa575SJohn Baldwin static int	procstat_get_sem_info_sysctl(struct filestat *fst,
134*958aa575SJohn Baldwin     struct semstat *sem, char *errbuf);
135*958aa575SJohn Baldwin static int	procstat_get_sem_info_kvm(kvm_t *kd, struct filestat *fst,
136*958aa575SJohn Baldwin     struct semstat *sem, char *errbuf);
137e506e182SJohn Baldwin static int	procstat_get_shm_info_sysctl(struct filestat *fst,
138e506e182SJohn Baldwin     struct shmstat *shm, char *errbuf);
139e506e182SJohn Baldwin static int	procstat_get_shm_info_kvm(kvm_t *kd, struct filestat *fst,
140e506e182SJohn Baldwin     struct shmstat *shm, char *errbuf);
1410daf62d9SStanislav Sedov static int	procstat_get_socket_info_sysctl(struct filestat *fst,
1420daf62d9SStanislav Sedov     struct sockstat *sock, char *errbuf);
1430daf62d9SStanislav Sedov static int	procstat_get_socket_info_kvm(kvm_t *kd, struct filestat *fst,
1440daf62d9SStanislav Sedov     struct sockstat *sock, char *errbuf);
1450daf62d9SStanislav Sedov static int	to_filestat_flags(int flags);
1460daf62d9SStanislav Sedov static int	procstat_get_vnode_info_kvm(kvm_t *kd, struct filestat *fst,
1470daf62d9SStanislav Sedov     struct vnstat *vn, char *errbuf);
1480daf62d9SStanislav Sedov static int	procstat_get_vnode_info_sysctl(struct filestat *fst,
1490daf62d9SStanislav Sedov     struct vnstat *vn, char *errbuf);
1507f1d14e6SMikolaj Golub static gid_t	*procstat_getgroups_core(struct procstat_core *core,
1517f1d14e6SMikolaj Golub     unsigned int *count);
1521f84c47eSMikolaj Golub static gid_t *	procstat_getgroups_kvm(kvm_t *kd, struct kinfo_proc *kp,
1531f84c47eSMikolaj Golub     unsigned int *count);
1547f1d14e6SMikolaj Golub static gid_t	*procstat_getgroups_sysctl(pid_t pid, unsigned int *count);
15589358231SMikolaj Golub static struct kinfo_kstack	*procstat_getkstack_sysctl(pid_t pid,
15689358231SMikolaj Golub     int *cntp);
1571f84c47eSMikolaj Golub static int	procstat_getosrel_core(struct procstat_core *core,
1581f84c47eSMikolaj Golub     int *osrelp);
1591f84c47eSMikolaj Golub static int	procstat_getosrel_kvm(kvm_t *kd, struct kinfo_proc *kp,
1601f84c47eSMikolaj Golub     int *osrelp);
1611f84c47eSMikolaj Golub static int	procstat_getosrel_sysctl(pid_t pid, int *osrelp);
1624cdf9796SMikolaj Golub static int	procstat_getpathname_core(struct procstat_core *core,
1634cdf9796SMikolaj Golub     char *pathname, size_t maxlen);
1644cdf9796SMikolaj Golub static int	procstat_getpathname_sysctl(pid_t pid, char *pathname,
1654cdf9796SMikolaj Golub     size_t maxlen);
1667cc0ebfdSMikolaj Golub static int	procstat_getrlimit_core(struct procstat_core *core, int which,
1677cc0ebfdSMikolaj Golub     struct rlimit* rlimit);
1681f84c47eSMikolaj Golub static int	procstat_getrlimit_kvm(kvm_t *kd, struct kinfo_proc *kp,
1691f84c47eSMikolaj Golub     int which, struct rlimit* rlimit);
1707cc0ebfdSMikolaj Golub static int	procstat_getrlimit_sysctl(pid_t pid, int which,
1717cc0ebfdSMikolaj Golub     struct rlimit* rlimit);
1725b9bcba9SMikolaj Golub static int	procstat_getumask_core(struct procstat_core *core,
1735b9bcba9SMikolaj Golub     unsigned short *maskp);
1741f84c47eSMikolaj Golub static int	procstat_getumask_kvm(kvm_t *kd, struct kinfo_proc *kp,
1751f84c47eSMikolaj Golub     unsigned short *maskp);
1765b9bcba9SMikolaj Golub static int	procstat_getumask_sysctl(pid_t pid, unsigned short *maskp);
1770daf62d9SStanislav Sedov static int	vntype2psfsttype(int type);
1780daf62d9SStanislav Sedov 
1790daf62d9SStanislav Sedov void
1800daf62d9SStanislav Sedov procstat_close(struct procstat *procstat)
1810daf62d9SStanislav Sedov {
1820daf62d9SStanislav Sedov 
1830daf62d9SStanislav Sedov 	assert(procstat);
1840daf62d9SStanislav Sedov 	if (procstat->type == PROCSTAT_KVM)
1850daf62d9SStanislav Sedov 		kvm_close(procstat->kd);
1867153ad2bSMikolaj Golub 	else if (procstat->type == PROCSTAT_CORE)
1877153ad2bSMikolaj Golub 		procstat_core_close(procstat->core);
1884482b5e3SMikolaj Golub 	procstat_freeargv(procstat);
1894482b5e3SMikolaj Golub 	procstat_freeenvv(procstat);
190d7b666aeSSergey Kandaurov 	free(procstat);
1910daf62d9SStanislav Sedov }
1920daf62d9SStanislav Sedov 
1930daf62d9SStanislav Sedov struct procstat *
1940daf62d9SStanislav Sedov procstat_open_sysctl(void)
1950daf62d9SStanislav Sedov {
1960daf62d9SStanislav Sedov 	struct procstat *procstat;
1970daf62d9SStanislav Sedov 
1980daf62d9SStanislav Sedov 	procstat = calloc(1, sizeof(*procstat));
1990daf62d9SStanislav Sedov 	if (procstat == NULL) {
2000daf62d9SStanislav Sedov 		warn("malloc()");
2010daf62d9SStanislav Sedov 		return (NULL);
2020daf62d9SStanislav Sedov 	}
2030daf62d9SStanislav Sedov 	procstat->type = PROCSTAT_SYSCTL;
2040daf62d9SStanislav Sedov 	return (procstat);
2050daf62d9SStanislav Sedov }
2060daf62d9SStanislav Sedov 
2070daf62d9SStanislav Sedov struct procstat *
2080daf62d9SStanislav Sedov procstat_open_kvm(const char *nlistf, const char *memf)
2090daf62d9SStanislav Sedov {
2100daf62d9SStanislav Sedov 	struct procstat *procstat;
2110daf62d9SStanislav Sedov 	kvm_t *kd;
2120daf62d9SStanislav Sedov 	char buf[_POSIX2_LINE_MAX];
2130daf62d9SStanislav Sedov 
2140daf62d9SStanislav Sedov 	procstat = calloc(1, sizeof(*procstat));
2150daf62d9SStanislav Sedov 	if (procstat == NULL) {
2160daf62d9SStanislav Sedov 		warn("malloc()");
2170daf62d9SStanislav Sedov 		return (NULL);
2180daf62d9SStanislav Sedov 	}
2190daf62d9SStanislav Sedov 	kd = kvm_openfiles(nlistf, memf, NULL, O_RDONLY, buf);
2200daf62d9SStanislav Sedov 	if (kd == NULL) {
2210daf62d9SStanislav Sedov 		warnx("kvm_openfiles(): %s", buf);
2220daf62d9SStanislav Sedov 		free(procstat);
2230daf62d9SStanislav Sedov 		return (NULL);
2240daf62d9SStanislav Sedov 	}
2250daf62d9SStanislav Sedov 	procstat->type = PROCSTAT_KVM;
2260daf62d9SStanislav Sedov 	procstat->kd = kd;
2270daf62d9SStanislav Sedov 	return (procstat);
2280daf62d9SStanislav Sedov }
2290daf62d9SStanislav Sedov 
2307153ad2bSMikolaj Golub struct procstat *
2317153ad2bSMikolaj Golub procstat_open_core(const char *filename)
2327153ad2bSMikolaj Golub {
2337153ad2bSMikolaj Golub 	struct procstat *procstat;
2347153ad2bSMikolaj Golub 	struct procstat_core *core;
2357153ad2bSMikolaj Golub 
2367153ad2bSMikolaj Golub 	procstat = calloc(1, sizeof(*procstat));
2377153ad2bSMikolaj Golub 	if (procstat == NULL) {
2387153ad2bSMikolaj Golub 		warn("malloc()");
2397153ad2bSMikolaj Golub 		return (NULL);
2407153ad2bSMikolaj Golub 	}
2417153ad2bSMikolaj Golub 	core = procstat_core_open(filename);
2427153ad2bSMikolaj Golub 	if (core == NULL) {
2437153ad2bSMikolaj Golub 		free(procstat);
2447153ad2bSMikolaj Golub 		return (NULL);
2457153ad2bSMikolaj Golub 	}
2467153ad2bSMikolaj Golub 	procstat->type = PROCSTAT_CORE;
2477153ad2bSMikolaj Golub 	procstat->core = core;
2487153ad2bSMikolaj Golub 	return (procstat);
2497153ad2bSMikolaj Golub }
2507153ad2bSMikolaj Golub 
2510daf62d9SStanislav Sedov struct kinfo_proc *
2520daf62d9SStanislav Sedov procstat_getprocs(struct procstat *procstat, int what, int arg,
2530daf62d9SStanislav Sedov     unsigned int *count)
2540daf62d9SStanislav Sedov {
2550daf62d9SStanislav Sedov 	struct kinfo_proc *p0, *p;
2560daf62d9SStanislav Sedov 	size_t len;
2570daf62d9SStanislav Sedov 	int name[4];
258391bdfb8SAndriy Gapon 	int cnt;
2590daf62d9SStanislav Sedov 	int error;
2600daf62d9SStanislav Sedov 
2610daf62d9SStanislav Sedov 	assert(procstat);
2620daf62d9SStanislav Sedov 	assert(count);
2630daf62d9SStanislav Sedov 	p = NULL;
2640daf62d9SStanislav Sedov 	if (procstat->type == PROCSTAT_KVM) {
265391bdfb8SAndriy Gapon 		*count = 0;
266391bdfb8SAndriy Gapon 		p0 = kvm_getprocs(procstat->kd, what, arg, &cnt);
267391bdfb8SAndriy Gapon 		if (p0 == NULL || cnt <= 0)
2680daf62d9SStanislav Sedov 			return (NULL);
269391bdfb8SAndriy Gapon 		*count = cnt;
2700daf62d9SStanislav Sedov 		len = *count * sizeof(*p);
2710daf62d9SStanislav Sedov 		p = malloc(len);
2720daf62d9SStanislav Sedov 		if (p == NULL) {
27365869214SJilles Tjoelker 			warnx("malloc(%zu)", len);
2740daf62d9SStanislav Sedov 			goto fail;
2750daf62d9SStanislav Sedov 		}
2760daf62d9SStanislav Sedov 		bcopy(p0, p, len);
2770daf62d9SStanislav Sedov 		return (p);
2780daf62d9SStanislav Sedov 	} else if (procstat->type == PROCSTAT_SYSCTL) {
2790daf62d9SStanislav Sedov 		len = 0;
2800daf62d9SStanislav Sedov 		name[0] = CTL_KERN;
2810daf62d9SStanislav Sedov 		name[1] = KERN_PROC;
2820daf62d9SStanislav Sedov 		name[2] = what;
2830daf62d9SStanislav Sedov 		name[3] = arg;
2840daf62d9SStanislav Sedov 		error = sysctl(name, 4, NULL, &len, NULL, 0);
2850daf62d9SStanislav Sedov 		if (error < 0 && errno != EPERM) {
2860daf62d9SStanislav Sedov 			warn("sysctl(kern.proc)");
2870daf62d9SStanislav Sedov 			goto fail;
2880daf62d9SStanislav Sedov 		}
2890daf62d9SStanislav Sedov 		if (len == 0) {
2900daf62d9SStanislav Sedov 			warnx("no processes?");
2910daf62d9SStanislav Sedov 			goto fail;
2920daf62d9SStanislav Sedov 		}
2930daf62d9SStanislav Sedov 		p = malloc(len);
2940daf62d9SStanislav Sedov 		if (p == NULL) {
29565869214SJilles Tjoelker 			warnx("malloc(%zu)", len);
2960daf62d9SStanislav Sedov 			goto fail;
2970daf62d9SStanislav Sedov 		}
2980daf62d9SStanislav Sedov 		error = sysctl(name, 4, p, &len, NULL, 0);
2990daf62d9SStanislav Sedov 		if (error < 0 && errno != EPERM) {
3000daf62d9SStanislav Sedov 			warn("sysctl(kern.proc)");
3010daf62d9SStanislav Sedov 			goto fail;
3020daf62d9SStanislav Sedov 		}
3030daf62d9SStanislav Sedov 		/* Perform simple consistency checks. */
3040daf62d9SStanislav Sedov 		if ((len % sizeof(*p)) != 0 || p->ki_structsize != sizeof(*p)) {
3057153ad2bSMikolaj Golub 			warnx("kinfo_proc structure size mismatch (len = %zu)", len);
3067153ad2bSMikolaj Golub 			goto fail;
3077153ad2bSMikolaj Golub 		}
3087153ad2bSMikolaj Golub 		*count = len / sizeof(*p);
3097153ad2bSMikolaj Golub 		return (p);
3107153ad2bSMikolaj Golub 	} else if (procstat->type == PROCSTAT_CORE) {
3117153ad2bSMikolaj Golub 		p = procstat_core_get(procstat->core, PSC_TYPE_PROC, NULL,
3127153ad2bSMikolaj Golub 		    &len);
3137153ad2bSMikolaj Golub 		if ((len % sizeof(*p)) != 0 || p->ki_structsize != sizeof(*p)) {
3140daf62d9SStanislav Sedov 			warnx("kinfo_proc structure size mismatch");
3150daf62d9SStanislav Sedov 			goto fail;
3160daf62d9SStanislav Sedov 		}
3170daf62d9SStanislav Sedov 		*count = len / sizeof(*p);
3180daf62d9SStanislav Sedov 		return (p);
3190daf62d9SStanislav Sedov 	} else {
32080905c35SJilles Tjoelker 		warnx("unknown access method: %d", procstat->type);
3210daf62d9SStanislav Sedov 		return (NULL);
3220daf62d9SStanislav Sedov 	}
3230daf62d9SStanislav Sedov fail:
3240daf62d9SStanislav Sedov 	if (p)
3250daf62d9SStanislav Sedov 		free(p);
3260daf62d9SStanislav Sedov 	return (NULL);
3270daf62d9SStanislav Sedov }
3280daf62d9SStanislav Sedov 
3290daf62d9SStanislav Sedov void
3300daf62d9SStanislav Sedov procstat_freeprocs(struct procstat *procstat __unused, struct kinfo_proc *p)
3310daf62d9SStanislav Sedov {
3320daf62d9SStanislav Sedov 
3330daf62d9SStanislav Sedov 	if (p != NULL)
3340daf62d9SStanislav Sedov 		free(p);
3350daf62d9SStanislav Sedov 	p = NULL;
3360daf62d9SStanislav Sedov }
3370daf62d9SStanislav Sedov 
3380daf62d9SStanislav Sedov struct filestat_list *
3390daf62d9SStanislav Sedov procstat_getfiles(struct procstat *procstat, struct kinfo_proc *kp, int mmapped)
3400daf62d9SStanislav Sedov {
3410daf62d9SStanislav Sedov 
3427153ad2bSMikolaj Golub 	switch(procstat->type) {
3437153ad2bSMikolaj Golub 	case PROCSTAT_KVM:
3440daf62d9SStanislav Sedov 		return (procstat_getfiles_kvm(procstat, kp, mmapped));
3457153ad2bSMikolaj Golub 	case PROCSTAT_SYSCTL:
3467153ad2bSMikolaj Golub 	case PROCSTAT_CORE:
3477153ad2bSMikolaj Golub 		return (procstat_getfiles_sysctl(procstat, kp, mmapped));
3487153ad2bSMikolaj Golub 	default:
3497153ad2bSMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
3500daf62d9SStanislav Sedov 		return (NULL);
3510daf62d9SStanislav Sedov 	}
3527153ad2bSMikolaj Golub }
3530daf62d9SStanislav Sedov 
3540daf62d9SStanislav Sedov void
3550daf62d9SStanislav Sedov procstat_freefiles(struct procstat *procstat, struct filestat_list *head)
3560daf62d9SStanislav Sedov {
3570daf62d9SStanislav Sedov 	struct filestat *fst, *tmp;
3580daf62d9SStanislav Sedov 
3590daf62d9SStanislav Sedov 	STAILQ_FOREACH_SAFE(fst, head, next, tmp) {
3600daf62d9SStanislav Sedov 		if (fst->fs_path != NULL)
3610daf62d9SStanislav Sedov 			free(fst->fs_path);
3620daf62d9SStanislav Sedov 		free(fst);
3630daf62d9SStanislav Sedov 	}
3640daf62d9SStanislav Sedov 	free(head);
3650daf62d9SStanislav Sedov 	if (procstat->vmentries != NULL) {
3660daf62d9SStanislav Sedov 		free(procstat->vmentries);
3670daf62d9SStanislav Sedov 		procstat->vmentries = NULL;
3680daf62d9SStanislav Sedov 	}
3690daf62d9SStanislav Sedov 	if (procstat->files != NULL) {
3700daf62d9SStanislav Sedov 		free(procstat->files);
3710daf62d9SStanislav Sedov 		procstat->files = NULL;
3720daf62d9SStanislav Sedov 	}
3730daf62d9SStanislav Sedov }
3740daf62d9SStanislav Sedov 
3750daf62d9SStanislav Sedov static struct filestat *
3760daf62d9SStanislav Sedov filestat_new_entry(void *typedep, int type, int fd, int fflags, int uflags,
377d57486e2SRobert Watson     int refcount, off_t offset, char *path, cap_rights_t cap_rights)
3780daf62d9SStanislav Sedov {
3790daf62d9SStanislav Sedov 	struct filestat *entry;
3800daf62d9SStanislav Sedov 
3810daf62d9SStanislav Sedov 	entry = calloc(1, sizeof(*entry));
3820daf62d9SStanislav Sedov 	if (entry == NULL) {
3830daf62d9SStanislav Sedov 		warn("malloc()");
3840daf62d9SStanislav Sedov 		return (NULL);
3850daf62d9SStanislav Sedov 	}
3860daf62d9SStanislav Sedov 	entry->fs_typedep = typedep;
3870daf62d9SStanislav Sedov 	entry->fs_fflags = fflags;
3880daf62d9SStanislav Sedov 	entry->fs_uflags = uflags;
3890daf62d9SStanislav Sedov 	entry->fs_fd = fd;
3900daf62d9SStanislav Sedov 	entry->fs_type = type;
3910daf62d9SStanislav Sedov 	entry->fs_ref_count = refcount;
3920daf62d9SStanislav Sedov 	entry->fs_offset = offset;
3930daf62d9SStanislav Sedov 	entry->fs_path = path;
394d57486e2SRobert Watson 	entry->fs_cap_rights = cap_rights;
3950daf62d9SStanislav Sedov 	return (entry);
3960daf62d9SStanislav Sedov }
3970daf62d9SStanislav Sedov 
3980daf62d9SStanislav Sedov static struct vnode *
3990daf62d9SStanislav Sedov getctty(kvm_t *kd, struct kinfo_proc *kp)
4000daf62d9SStanislav Sedov {
4010daf62d9SStanislav Sedov 	struct pgrp pgrp;
4020daf62d9SStanislav Sedov 	struct proc proc;
4030daf62d9SStanislav Sedov 	struct session sess;
4040daf62d9SStanislav Sedov 	int error;
4050daf62d9SStanislav Sedov 
4060daf62d9SStanislav Sedov 	assert(kp);
4070daf62d9SStanislav Sedov 	error = kvm_read_all(kd, (unsigned long)kp->ki_paddr, &proc,
4080daf62d9SStanislav Sedov 	    sizeof(proc));
4090daf62d9SStanislav Sedov 	if (error == 0) {
4100daf62d9SStanislav Sedov 		warnx("can't read proc struct at %p for pid %d",
4110daf62d9SStanislav Sedov 		    kp->ki_paddr, kp->ki_pid);
4120daf62d9SStanislav Sedov 		return (NULL);
4130daf62d9SStanislav Sedov 	}
4140daf62d9SStanislav Sedov 	if (proc.p_pgrp == NULL)
4150daf62d9SStanislav Sedov 		return (NULL);
4160daf62d9SStanislav Sedov 	error = kvm_read_all(kd, (unsigned long)proc.p_pgrp, &pgrp,
4170daf62d9SStanislav Sedov 	    sizeof(pgrp));
4180daf62d9SStanislav Sedov 	if (error == 0) {
4190daf62d9SStanislav Sedov 		warnx("can't read pgrp struct at %p for pid %d",
4200daf62d9SStanislav Sedov 		    proc.p_pgrp, kp->ki_pid);
4210daf62d9SStanislav Sedov 		return (NULL);
4220daf62d9SStanislav Sedov 	}
4230daf62d9SStanislav Sedov 	error = kvm_read_all(kd, (unsigned long)pgrp.pg_session, &sess,
4240daf62d9SStanislav Sedov 	    sizeof(sess));
4250daf62d9SStanislav Sedov 	if (error == 0) {
4260daf62d9SStanislav Sedov 		warnx("can't read session struct at %p for pid %d",
4270daf62d9SStanislav Sedov 		    pgrp.pg_session, kp->ki_pid);
4280daf62d9SStanislav Sedov 		return (NULL);
4290daf62d9SStanislav Sedov 	}
4300daf62d9SStanislav Sedov 	return (sess.s_ttyvp);
4310daf62d9SStanislav Sedov }
4320daf62d9SStanislav Sedov 
4330daf62d9SStanislav Sedov static struct filestat_list *
4340daf62d9SStanislav Sedov procstat_getfiles_kvm(struct procstat *procstat, struct kinfo_proc *kp, int mmapped)
4350daf62d9SStanislav Sedov {
4360daf62d9SStanislav Sedov 	struct file file;
4370daf62d9SStanislav Sedov 	struct filedesc filed;
4380daf62d9SStanislav Sedov 	struct vm_map_entry vmentry;
4390daf62d9SStanislav Sedov 	struct vm_object object;
4400daf62d9SStanislav Sedov 	struct vmspace vmspace;
4410daf62d9SStanislav Sedov 	vm_map_entry_t entryp;
4420daf62d9SStanislav Sedov 	vm_map_t map;
4430daf62d9SStanislav Sedov 	vm_object_t objp;
4440daf62d9SStanislav Sedov 	struct vnode *vp;
4450daf62d9SStanislav Sedov 	struct file **ofiles;
4460daf62d9SStanislav Sedov 	struct filestat *entry;
4470daf62d9SStanislav Sedov 	struct filestat_list *head;
4480daf62d9SStanislav Sedov 	kvm_t *kd;
4490daf62d9SStanislav Sedov 	void *data;
4500daf62d9SStanislav Sedov 	int i, fflags;
4510daf62d9SStanislav Sedov 	int prot, type;
4520daf62d9SStanislav Sedov 	unsigned int nfiles;
4530daf62d9SStanislav Sedov 
4540daf62d9SStanislav Sedov 	assert(procstat);
4550daf62d9SStanislav Sedov 	kd = procstat->kd;
4560daf62d9SStanislav Sedov 	if (kd == NULL)
4570daf62d9SStanislav Sedov 		return (NULL);
4580daf62d9SStanislav Sedov 	if (kp->ki_fd == NULL)
4590daf62d9SStanislav Sedov 		return (NULL);
4600daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)kp->ki_fd, &filed,
4610daf62d9SStanislav Sedov 	    sizeof(filed))) {
4620daf62d9SStanislav Sedov 		warnx("can't read filedesc at %p", (void *)kp->ki_fd);
4630daf62d9SStanislav Sedov 		return (NULL);
4640daf62d9SStanislav Sedov 	}
4650daf62d9SStanislav Sedov 
4660daf62d9SStanislav Sedov 	/*
4670daf62d9SStanislav Sedov 	 * Allocate list head.
4680daf62d9SStanislav Sedov 	 */
4690daf62d9SStanislav Sedov 	head = malloc(sizeof(*head));
4700daf62d9SStanislav Sedov 	if (head == NULL)
4710daf62d9SStanislav Sedov 		return (NULL);
4720daf62d9SStanislav Sedov 	STAILQ_INIT(head);
4730daf62d9SStanislav Sedov 
4740daf62d9SStanislav Sedov 	/* root directory vnode, if one. */
4750daf62d9SStanislav Sedov 	if (filed.fd_rdir) {
4760daf62d9SStanislav Sedov 		entry = filestat_new_entry(filed.fd_rdir, PS_FST_TYPE_VNODE, -1,
477d57486e2SRobert Watson 		    PS_FST_FFLAG_READ, PS_FST_UFLAG_RDIR, 0, 0, NULL, 0);
4780daf62d9SStanislav Sedov 		if (entry != NULL)
4790daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
4800daf62d9SStanislav Sedov 	}
4810daf62d9SStanislav Sedov 	/* current working directory vnode. */
4820daf62d9SStanislav Sedov 	if (filed.fd_cdir) {
4830daf62d9SStanislav Sedov 		entry = filestat_new_entry(filed.fd_cdir, PS_FST_TYPE_VNODE, -1,
484d57486e2SRobert Watson 		    PS_FST_FFLAG_READ, PS_FST_UFLAG_CDIR, 0, 0, NULL, 0);
4850daf62d9SStanislav Sedov 		if (entry != NULL)
4860daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
4870daf62d9SStanislav Sedov 	}
4880daf62d9SStanislav Sedov 	/* jail root, if any. */
4890daf62d9SStanislav Sedov 	if (filed.fd_jdir) {
4900daf62d9SStanislav Sedov 		entry = filestat_new_entry(filed.fd_jdir, PS_FST_TYPE_VNODE, -1,
491d57486e2SRobert Watson 		    PS_FST_FFLAG_READ, PS_FST_UFLAG_JAIL, 0, 0, NULL, 0);
4920daf62d9SStanislav Sedov 		if (entry != NULL)
4930daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
4940daf62d9SStanislav Sedov 	}
4950daf62d9SStanislav Sedov 	/* ktrace vnode, if one */
4960daf62d9SStanislav Sedov 	if (kp->ki_tracep) {
4970daf62d9SStanislav Sedov 		entry = filestat_new_entry(kp->ki_tracep, PS_FST_TYPE_VNODE, -1,
4980daf62d9SStanislav Sedov 		    PS_FST_FFLAG_READ | PS_FST_FFLAG_WRITE,
499d57486e2SRobert Watson 		    PS_FST_UFLAG_TRACE, 0, 0, NULL, 0);
5000daf62d9SStanislav Sedov 		if (entry != NULL)
5010daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
5020daf62d9SStanislav Sedov 	}
5030daf62d9SStanislav Sedov 	/* text vnode, if one */
5040daf62d9SStanislav Sedov 	if (kp->ki_textvp) {
5050daf62d9SStanislav Sedov 		entry = filestat_new_entry(kp->ki_textvp, PS_FST_TYPE_VNODE, -1,
506d57486e2SRobert Watson 		    PS_FST_FFLAG_READ, PS_FST_UFLAG_TEXT, 0, 0, NULL, 0);
5070daf62d9SStanislav Sedov 		if (entry != NULL)
5080daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
5090daf62d9SStanislav Sedov 	}
5100daf62d9SStanislav Sedov 	/* Controlling terminal. */
5110daf62d9SStanislav Sedov 	if ((vp = getctty(kd, kp)) != NULL) {
5120daf62d9SStanislav Sedov 		entry = filestat_new_entry(vp, PS_FST_TYPE_VNODE, -1,
5130daf62d9SStanislav Sedov 		    PS_FST_FFLAG_READ | PS_FST_FFLAG_WRITE,
514d57486e2SRobert Watson 		    PS_FST_UFLAG_CTTY, 0, 0, NULL, 0);
5150daf62d9SStanislav Sedov 		if (entry != NULL)
5160daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
5170daf62d9SStanislav Sedov 	}
5180daf62d9SStanislav Sedov 
5190daf62d9SStanislav Sedov 	nfiles = filed.fd_lastfile + 1;
5200daf62d9SStanislav Sedov 	ofiles = malloc(nfiles * sizeof(struct file *));
5210daf62d9SStanislav Sedov 	if (ofiles == NULL) {
52265869214SJilles Tjoelker 		warn("malloc(%zu)", nfiles * sizeof(struct file *));
5230daf62d9SStanislav Sedov 		goto do_mmapped;
5240daf62d9SStanislav Sedov 	}
5250daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)filed.fd_ofiles, ofiles,
5260daf62d9SStanislav Sedov 	    nfiles * sizeof(struct file *))) {
5270daf62d9SStanislav Sedov 		warnx("cannot read file structures at %p",
5280daf62d9SStanislav Sedov 		    (void *)filed.fd_ofiles);
5290daf62d9SStanislav Sedov 		free(ofiles);
5300daf62d9SStanislav Sedov 		goto do_mmapped;
5310daf62d9SStanislav Sedov 	}
5320daf62d9SStanislav Sedov 	for (i = 0; i <= filed.fd_lastfile; i++) {
5330daf62d9SStanislav Sedov 		if (ofiles[i] == NULL)
5340daf62d9SStanislav Sedov 			continue;
5350daf62d9SStanislav Sedov 		if (!kvm_read_all(kd, (unsigned long)ofiles[i], &file,
5360daf62d9SStanislav Sedov 		    sizeof(struct file))) {
5370daf62d9SStanislav Sedov 			warnx("can't read file %d at %p", i,
5380daf62d9SStanislav Sedov 			    (void *)ofiles[i]);
5390daf62d9SStanislav Sedov 			continue;
5400daf62d9SStanislav Sedov 		}
5410daf62d9SStanislav Sedov 		switch (file.f_type) {
5420daf62d9SStanislav Sedov 		case DTYPE_VNODE:
5430daf62d9SStanislav Sedov 			type = PS_FST_TYPE_VNODE;
5440daf62d9SStanislav Sedov 			data = file.f_vnode;
5450daf62d9SStanislav Sedov 			break;
5460daf62d9SStanislav Sedov 		case DTYPE_SOCKET:
5470daf62d9SStanislav Sedov 			type = PS_FST_TYPE_SOCKET;
5480daf62d9SStanislav Sedov 			data = file.f_data;
5490daf62d9SStanislav Sedov 			break;
5500daf62d9SStanislav Sedov 		case DTYPE_PIPE:
5510daf62d9SStanislav Sedov 			type = PS_FST_TYPE_PIPE;
5520daf62d9SStanislav Sedov 			data = file.f_data;
5530daf62d9SStanislav Sedov 			break;
5540daf62d9SStanislav Sedov 		case DTYPE_FIFO:
5550daf62d9SStanislav Sedov 			type = PS_FST_TYPE_FIFO;
5560daf62d9SStanislav Sedov 			data = file.f_vnode;
5570daf62d9SStanislav Sedov 			break;
5580daf62d9SStanislav Sedov #ifdef DTYPE_PTS
5590daf62d9SStanislav Sedov 		case DTYPE_PTS:
5600daf62d9SStanislav Sedov 			type = PS_FST_TYPE_PTS;
5610daf62d9SStanislav Sedov 			data = file.f_data;
5620daf62d9SStanislav Sedov 			break;
5630daf62d9SStanislav Sedov #endif
564*958aa575SJohn Baldwin 		case DTYPE_SEM:
565*958aa575SJohn Baldwin 			type = PS_FST_TYPE_SEM;
566*958aa575SJohn Baldwin 			data = file.f_data;
567*958aa575SJohn Baldwin 			break;
568e506e182SJohn Baldwin 		case DTYPE_SHM:
569e506e182SJohn Baldwin 			type = PS_FST_TYPE_SHM;
570e506e182SJohn Baldwin 			data = file.f_data;
571e506e182SJohn Baldwin 			break;
5720daf62d9SStanislav Sedov 		default:
5730daf62d9SStanislav Sedov 			continue;
5740daf62d9SStanislav Sedov 		}
575d57486e2SRobert Watson 		/* XXXRW: No capability rights support for kvm yet. */
5760daf62d9SStanislav Sedov 		entry = filestat_new_entry(data, type, i,
577d57486e2SRobert Watson 		    to_filestat_flags(file.f_flag), 0, 0, 0, NULL, 0);
5780daf62d9SStanislav Sedov 		if (entry != NULL)
5790daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
5800daf62d9SStanislav Sedov 	}
5810daf62d9SStanislav Sedov 	free(ofiles);
5820daf62d9SStanislav Sedov 
5830daf62d9SStanislav Sedov do_mmapped:
5840daf62d9SStanislav Sedov 
5850daf62d9SStanislav Sedov 	/*
5860daf62d9SStanislav Sedov 	 * Process mmapped files if requested.
5870daf62d9SStanislav Sedov 	 */
5880daf62d9SStanislav Sedov 	if (mmapped) {
5890daf62d9SStanislav Sedov 		if (!kvm_read_all(kd, (unsigned long)kp->ki_vmspace, &vmspace,
5900daf62d9SStanislav Sedov 		    sizeof(vmspace))) {
5910daf62d9SStanislav Sedov 			warnx("can't read vmspace at %p",
5920daf62d9SStanislav Sedov 			    (void *)kp->ki_vmspace);
5930daf62d9SStanislav Sedov 			goto exit;
5940daf62d9SStanislav Sedov 		}
5950daf62d9SStanislav Sedov 		map = &vmspace.vm_map;
5960daf62d9SStanislav Sedov 
5970daf62d9SStanislav Sedov 		for (entryp = map->header.next;
5980daf62d9SStanislav Sedov 		    entryp != &kp->ki_vmspace->vm_map.header;
5990daf62d9SStanislav Sedov 		    entryp = vmentry.next) {
6000daf62d9SStanislav Sedov 			if (!kvm_read_all(kd, (unsigned long)entryp, &vmentry,
6010daf62d9SStanislav Sedov 			    sizeof(vmentry))) {
6020daf62d9SStanislav Sedov 				warnx("can't read vm_map_entry at %p",
6030daf62d9SStanislav Sedov 				    (void *)entryp);
6040daf62d9SStanislav Sedov 				continue;
6050daf62d9SStanislav Sedov 			}
6060daf62d9SStanislav Sedov 			if (vmentry.eflags & MAP_ENTRY_IS_SUB_MAP)
6070daf62d9SStanislav Sedov 				continue;
6080daf62d9SStanislav Sedov 			if ((objp = vmentry.object.vm_object) == NULL)
6090daf62d9SStanislav Sedov 				continue;
6100daf62d9SStanislav Sedov 			for (; objp; objp = object.backing_object) {
6110daf62d9SStanislav Sedov 				if (!kvm_read_all(kd, (unsigned long)objp,
6120daf62d9SStanislav Sedov 				    &object, sizeof(object))) {
6130daf62d9SStanislav Sedov 					warnx("can't read vm_object at %p",
6140daf62d9SStanislav Sedov 					    (void *)objp);
6150daf62d9SStanislav Sedov 					break;
6160daf62d9SStanislav Sedov 				}
6170daf62d9SStanislav Sedov 			}
6180daf62d9SStanislav Sedov 
6190daf62d9SStanislav Sedov 			/* We want only vnode objects. */
6200daf62d9SStanislav Sedov 			if (object.type != OBJT_VNODE)
6210daf62d9SStanislav Sedov 				continue;
6220daf62d9SStanislav Sedov 
6230daf62d9SStanislav Sedov 			prot = vmentry.protection;
6240daf62d9SStanislav Sedov 			fflags = 0;
6250daf62d9SStanislav Sedov 			if (prot & VM_PROT_READ)
6260daf62d9SStanislav Sedov 				fflags = PS_FST_FFLAG_READ;
627279a233dSJilles Tjoelker 			if ((vmentry.eflags & MAP_ENTRY_COW) == 0 &&
628279a233dSJilles Tjoelker 			    prot & VM_PROT_WRITE)
6290daf62d9SStanislav Sedov 				fflags |= PS_FST_FFLAG_WRITE;
6300daf62d9SStanislav Sedov 
6310daf62d9SStanislav Sedov 			/*
6320daf62d9SStanislav Sedov 			 * Create filestat entry.
6330daf62d9SStanislav Sedov 			 */
6340daf62d9SStanislav Sedov 			entry = filestat_new_entry(object.handle,
6350daf62d9SStanislav Sedov 			    PS_FST_TYPE_VNODE, -1, fflags,
636d57486e2SRobert Watson 			    PS_FST_UFLAG_MMAP, 0, 0, NULL, 0);
6370daf62d9SStanislav Sedov 			if (entry != NULL)
6380daf62d9SStanislav Sedov 				STAILQ_INSERT_TAIL(head, entry, next);
6390daf62d9SStanislav Sedov 		}
6400daf62d9SStanislav Sedov 	}
6410daf62d9SStanislav Sedov exit:
6420daf62d9SStanislav Sedov 	return (head);
6430daf62d9SStanislav Sedov }
6440daf62d9SStanislav Sedov 
6450daf62d9SStanislav Sedov /*
6460daf62d9SStanislav Sedov  * kinfo types to filestat translation.
6470daf62d9SStanislav Sedov  */
6480daf62d9SStanislav Sedov static int
6490daf62d9SStanislav Sedov kinfo_type2fst(int kftype)
6500daf62d9SStanislav Sedov {
6510daf62d9SStanislav Sedov 	static struct {
6520daf62d9SStanislav Sedov 		int	kf_type;
6530daf62d9SStanislav Sedov 		int	fst_type;
6540daf62d9SStanislav Sedov 	} kftypes2fst[] = {
6550daf62d9SStanislav Sedov 		{ KF_TYPE_CRYPTO, PS_FST_TYPE_CRYPTO },
6560daf62d9SStanislav Sedov 		{ KF_TYPE_FIFO, PS_FST_TYPE_FIFO },
6570daf62d9SStanislav Sedov 		{ KF_TYPE_KQUEUE, PS_FST_TYPE_KQUEUE },
6580daf62d9SStanislav Sedov 		{ KF_TYPE_MQUEUE, PS_FST_TYPE_MQUEUE },
6590daf62d9SStanislav Sedov 		{ KF_TYPE_NONE, PS_FST_TYPE_NONE },
6600daf62d9SStanislav Sedov 		{ KF_TYPE_PIPE, PS_FST_TYPE_PIPE },
6610daf62d9SStanislav Sedov 		{ KF_TYPE_PTS, PS_FST_TYPE_PTS },
6620daf62d9SStanislav Sedov 		{ KF_TYPE_SEM, PS_FST_TYPE_SEM },
6630daf62d9SStanislav Sedov 		{ KF_TYPE_SHM, PS_FST_TYPE_SHM },
6640daf62d9SStanislav Sedov 		{ KF_TYPE_SOCKET, PS_FST_TYPE_SOCKET },
6650daf62d9SStanislav Sedov 		{ KF_TYPE_VNODE, PS_FST_TYPE_VNODE },
6660daf62d9SStanislav Sedov 		{ KF_TYPE_UNKNOWN, PS_FST_TYPE_UNKNOWN }
6670daf62d9SStanislav Sedov 	};
6680daf62d9SStanislav Sedov #define NKFTYPES	(sizeof(kftypes2fst) / sizeof(*kftypes2fst))
6690daf62d9SStanislav Sedov 	unsigned int i;
6700daf62d9SStanislav Sedov 
6710daf62d9SStanislav Sedov 	for (i = 0; i < NKFTYPES; i++)
6720daf62d9SStanislav Sedov 		if (kftypes2fst[i].kf_type == kftype)
6730daf62d9SStanislav Sedov 			break;
6740daf62d9SStanislav Sedov 	if (i == NKFTYPES)
6750daf62d9SStanislav Sedov 		return (PS_FST_TYPE_UNKNOWN);
6760daf62d9SStanislav Sedov 	return (kftypes2fst[i].fst_type);
6770daf62d9SStanislav Sedov }
6780daf62d9SStanislav Sedov 
6790daf62d9SStanislav Sedov /*
6800daf62d9SStanislav Sedov  * kinfo flags to filestat translation.
6810daf62d9SStanislav Sedov  */
6820daf62d9SStanislav Sedov static int
6830daf62d9SStanislav Sedov kinfo_fflags2fst(int kfflags)
6840daf62d9SStanislav Sedov {
6850daf62d9SStanislav Sedov 	static struct {
6860daf62d9SStanislav Sedov 		int	kf_flag;
6870daf62d9SStanislav Sedov 		int	fst_flag;
6880daf62d9SStanislav Sedov 	} kfflags2fst[] = {
6890daf62d9SStanislav Sedov 		{ KF_FLAG_APPEND, PS_FST_FFLAG_APPEND },
6900daf62d9SStanislav Sedov 		{ KF_FLAG_ASYNC, PS_FST_FFLAG_ASYNC },
6910daf62d9SStanislav Sedov 		{ KF_FLAG_CREAT, PS_FST_FFLAG_CREAT },
6920daf62d9SStanislav Sedov 		{ KF_FLAG_DIRECT, PS_FST_FFLAG_DIRECT },
6930daf62d9SStanislav Sedov 		{ KF_FLAG_EXCL, PS_FST_FFLAG_EXCL },
6940daf62d9SStanislav Sedov 		{ KF_FLAG_EXEC, PS_FST_FFLAG_EXEC },
6950daf62d9SStanislav Sedov 		{ KF_FLAG_EXLOCK, PS_FST_FFLAG_EXLOCK },
6960daf62d9SStanislav Sedov 		{ KF_FLAG_FSYNC, PS_FST_FFLAG_SYNC },
6970daf62d9SStanislav Sedov 		{ KF_FLAG_HASLOCK, PS_FST_FFLAG_HASLOCK },
6980daf62d9SStanislav Sedov 		{ KF_FLAG_NOFOLLOW, PS_FST_FFLAG_NOFOLLOW },
6990daf62d9SStanislav Sedov 		{ KF_FLAG_NONBLOCK, PS_FST_FFLAG_NONBLOCK },
7000daf62d9SStanislav Sedov 		{ KF_FLAG_READ, PS_FST_FFLAG_READ },
7010daf62d9SStanislav Sedov 		{ KF_FLAG_SHLOCK, PS_FST_FFLAG_SHLOCK },
7020daf62d9SStanislav Sedov 		{ KF_FLAG_TRUNC, PS_FST_FFLAG_TRUNC },
7030daf62d9SStanislav Sedov 		{ KF_FLAG_WRITE, PS_FST_FFLAG_WRITE }
7040daf62d9SStanislav Sedov 	};
7050daf62d9SStanislav Sedov #define NKFFLAGS	(sizeof(kfflags2fst) / sizeof(*kfflags2fst))
7060daf62d9SStanislav Sedov 	unsigned int i;
7070daf62d9SStanislav Sedov 	int flags;
7080daf62d9SStanislav Sedov 
7090daf62d9SStanislav Sedov 	flags = 0;
7100daf62d9SStanislav Sedov 	for (i = 0; i < NKFFLAGS; i++)
7110daf62d9SStanislav Sedov 		if ((kfflags & kfflags2fst[i].kf_flag) != 0)
7120daf62d9SStanislav Sedov 			flags |= kfflags2fst[i].fst_flag;
7130daf62d9SStanislav Sedov 	return (flags);
7140daf62d9SStanislav Sedov }
7150daf62d9SStanislav Sedov 
7160daf62d9SStanislav Sedov static int
7170daf62d9SStanislav Sedov kinfo_uflags2fst(int fd)
7180daf62d9SStanislav Sedov {
7190daf62d9SStanislav Sedov 
7200daf62d9SStanislav Sedov 	switch (fd) {
7210daf62d9SStanislav Sedov 	case KF_FD_TYPE_CTTY:
7220daf62d9SStanislav Sedov 		return (PS_FST_UFLAG_CTTY);
7230daf62d9SStanislav Sedov 	case KF_FD_TYPE_CWD:
7240daf62d9SStanislav Sedov 		return (PS_FST_UFLAG_CDIR);
7250daf62d9SStanislav Sedov 	case KF_FD_TYPE_JAIL:
7260daf62d9SStanislav Sedov 		return (PS_FST_UFLAG_JAIL);
7270daf62d9SStanislav Sedov 	case KF_FD_TYPE_TEXT:
7280daf62d9SStanislav Sedov 		return (PS_FST_UFLAG_TEXT);
7290daf62d9SStanislav Sedov 	case KF_FD_TYPE_TRACE:
7300daf62d9SStanislav Sedov 		return (PS_FST_UFLAG_TRACE);
7310daf62d9SStanislav Sedov 	case KF_FD_TYPE_ROOT:
7320daf62d9SStanislav Sedov 		return (PS_FST_UFLAG_RDIR);
7330daf62d9SStanislav Sedov 	}
7340daf62d9SStanislav Sedov 	return (0);
7350daf62d9SStanislav Sedov }
7360daf62d9SStanislav Sedov 
7377153ad2bSMikolaj Golub static struct kinfo_file *
7387153ad2bSMikolaj Golub kinfo_getfile_core(struct procstat_core *core, int *cntp)
7397153ad2bSMikolaj Golub {
7407153ad2bSMikolaj Golub 	int cnt;
7417153ad2bSMikolaj Golub 	size_t len;
7427153ad2bSMikolaj Golub 	char *buf, *bp, *eb;
7437153ad2bSMikolaj Golub 	struct kinfo_file *kif, *kp, *kf;
7447153ad2bSMikolaj Golub 
7457153ad2bSMikolaj Golub 	buf = procstat_core_get(core, PSC_TYPE_FILES, NULL, &len);
7467153ad2bSMikolaj Golub 	if (buf == NULL)
7477153ad2bSMikolaj Golub 		return (NULL);
7487153ad2bSMikolaj Golub 	/*
7497153ad2bSMikolaj Golub 	 * XXXMG: The code below is just copy&past from libutil.
7507153ad2bSMikolaj Golub 	 * The code duplication can be avoided if libutil
7517153ad2bSMikolaj Golub 	 * is extended to provide something like:
7527153ad2bSMikolaj Golub 	 *   struct kinfo_file *kinfo_getfile_from_buf(const char *buf,
7537153ad2bSMikolaj Golub 	 *       size_t len, int *cntp);
7547153ad2bSMikolaj Golub 	 */
7557153ad2bSMikolaj Golub 
7567153ad2bSMikolaj Golub 	/* Pass 1: count items */
7577153ad2bSMikolaj Golub 	cnt = 0;
7587153ad2bSMikolaj Golub 	bp = buf;
7597153ad2bSMikolaj Golub 	eb = buf + len;
7607153ad2bSMikolaj Golub 	while (bp < eb) {
7617153ad2bSMikolaj Golub 		kf = (struct kinfo_file *)(uintptr_t)bp;
7627153ad2bSMikolaj Golub 		bp += kf->kf_structsize;
7637153ad2bSMikolaj Golub 		cnt++;
7647153ad2bSMikolaj Golub 	}
7657153ad2bSMikolaj Golub 
7667153ad2bSMikolaj Golub 	kif = calloc(cnt, sizeof(*kif));
7677153ad2bSMikolaj Golub 	if (kif == NULL) {
7687153ad2bSMikolaj Golub 		free(buf);
7697153ad2bSMikolaj Golub 		return (NULL);
7707153ad2bSMikolaj Golub 	}
7717153ad2bSMikolaj Golub 	bp = buf;
7727153ad2bSMikolaj Golub 	eb = buf + len;
7737153ad2bSMikolaj Golub 	kp = kif;
7747153ad2bSMikolaj Golub 	/* Pass 2: unpack */
7757153ad2bSMikolaj Golub 	while (bp < eb) {
7767153ad2bSMikolaj Golub 		kf = (struct kinfo_file *)(uintptr_t)bp;
7777153ad2bSMikolaj Golub 		/* Copy/expand into pre-zeroed buffer */
7787153ad2bSMikolaj Golub 		memcpy(kp, kf, kf->kf_structsize);
7797153ad2bSMikolaj Golub 		/* Advance to next packed record */
7807153ad2bSMikolaj Golub 		bp += kf->kf_structsize;
7817153ad2bSMikolaj Golub 		/* Set field size to fixed length, advance */
7827153ad2bSMikolaj Golub 		kp->kf_structsize = sizeof(*kp);
7837153ad2bSMikolaj Golub 		kp++;
7847153ad2bSMikolaj Golub 	}
7857153ad2bSMikolaj Golub 	free(buf);
7867153ad2bSMikolaj Golub 	*cntp = cnt;
7877153ad2bSMikolaj Golub 	return (kif);	/* Caller must free() return value */
7887153ad2bSMikolaj Golub }
7897153ad2bSMikolaj Golub 
7900daf62d9SStanislav Sedov static struct filestat_list *
7917153ad2bSMikolaj Golub procstat_getfiles_sysctl(struct procstat *procstat, struct kinfo_proc *kp,
7927153ad2bSMikolaj Golub     int mmapped)
7930daf62d9SStanislav Sedov {
7940daf62d9SStanislav Sedov 	struct kinfo_file *kif, *files;
7950daf62d9SStanislav Sedov 	struct kinfo_vmentry *kve, *vmentries;
7960daf62d9SStanislav Sedov 	struct filestat_list *head;
7970daf62d9SStanislav Sedov 	struct filestat *entry;
7980daf62d9SStanislav Sedov 	char *path;
7990daf62d9SStanislav Sedov 	off_t offset;
8000daf62d9SStanislav Sedov 	int cnt, fd, fflags;
8010daf62d9SStanislav Sedov 	int i, type, uflags;
8020daf62d9SStanislav Sedov 	int refcount;
803d57486e2SRobert Watson 	cap_rights_t cap_rights;
8040daf62d9SStanislav Sedov 
8050daf62d9SStanislav Sedov 	assert(kp);
8060daf62d9SStanislav Sedov 	if (kp->ki_fd == NULL)
8070daf62d9SStanislav Sedov 		return (NULL);
8087153ad2bSMikolaj Golub 	switch(procstat->type) {
8097153ad2bSMikolaj Golub 	case PROCSTAT_SYSCTL:
8100daf62d9SStanislav Sedov 		files = kinfo_getfile(kp->ki_pid, &cnt);
8117153ad2bSMikolaj Golub 		break;
8127153ad2bSMikolaj Golub 	case PROCSTAT_CORE:
8137153ad2bSMikolaj Golub 		files = kinfo_getfile_core(procstat->core, &cnt);
8147153ad2bSMikolaj Golub 		break;
8157153ad2bSMikolaj Golub 	default:
8167153ad2bSMikolaj Golub 		assert(!"invalid type");
8177153ad2bSMikolaj Golub 	}
8180daf62d9SStanislav Sedov 	if (files == NULL && errno != EPERM) {
8190daf62d9SStanislav Sedov 		warn("kinfo_getfile()");
8200daf62d9SStanislav Sedov 		return (NULL);
8210daf62d9SStanislav Sedov 	}
8220daf62d9SStanislav Sedov 	procstat->files = files;
8230daf62d9SStanislav Sedov 
8240daf62d9SStanislav Sedov 	/*
8250daf62d9SStanislav Sedov 	 * Allocate list head.
8260daf62d9SStanislav Sedov 	 */
8270daf62d9SStanislav Sedov 	head = malloc(sizeof(*head));
8280daf62d9SStanislav Sedov 	if (head == NULL)
8290daf62d9SStanislav Sedov 		return (NULL);
8300daf62d9SStanislav Sedov 	STAILQ_INIT(head);
8310daf62d9SStanislav Sedov 	for (i = 0; i < cnt; i++) {
8320daf62d9SStanislav Sedov 		kif = &files[i];
8330daf62d9SStanislav Sedov 
8340daf62d9SStanislav Sedov 		type = kinfo_type2fst(kif->kf_type);
8350daf62d9SStanislav Sedov 		fd = kif->kf_fd >= 0 ? kif->kf_fd : -1;
8360daf62d9SStanislav Sedov 		fflags = kinfo_fflags2fst(kif->kf_flags);
8370daf62d9SStanislav Sedov 		uflags = kinfo_uflags2fst(kif->kf_fd);
8380daf62d9SStanislav Sedov 		refcount = kif->kf_ref_count;
8390daf62d9SStanislav Sedov 		offset = kif->kf_offset;
8400daf62d9SStanislav Sedov 		if (*kif->kf_path != '\0')
8410daf62d9SStanislav Sedov 			path = strdup(kif->kf_path);
8420daf62d9SStanislav Sedov 		else
8430daf62d9SStanislav Sedov 			path = NULL;
844d57486e2SRobert Watson 		cap_rights = kif->kf_cap_rights;
8450daf62d9SStanislav Sedov 
8460daf62d9SStanislav Sedov 		/*
8470daf62d9SStanislav Sedov 		 * Create filestat entry.
8480daf62d9SStanislav Sedov 		 */
8490daf62d9SStanislav Sedov 		entry = filestat_new_entry(kif, type, fd, fflags, uflags,
850d57486e2SRobert Watson 		    refcount, offset, path, cap_rights);
8510daf62d9SStanislav Sedov 		if (entry != NULL)
8520daf62d9SStanislav Sedov 			STAILQ_INSERT_TAIL(head, entry, next);
8530daf62d9SStanislav Sedov 	}
8540daf62d9SStanislav Sedov 	if (mmapped != 0) {
85539680c7bSMikolaj Golub 		vmentries = procstat_getvmmap(procstat, kp, &cnt);
8560daf62d9SStanislav Sedov 		procstat->vmentries = vmentries;
8570daf62d9SStanislav Sedov 		if (vmentries == NULL || cnt == 0)
8580daf62d9SStanislav Sedov 			goto fail;
8590daf62d9SStanislav Sedov 		for (i = 0; i < cnt; i++) {
8600daf62d9SStanislav Sedov 			kve = &vmentries[i];
8610daf62d9SStanislav Sedov 			if (kve->kve_type != KVME_TYPE_VNODE)
8620daf62d9SStanislav Sedov 				continue;
8630daf62d9SStanislav Sedov 			fflags = 0;
8640daf62d9SStanislav Sedov 			if (kve->kve_protection & KVME_PROT_READ)
8650daf62d9SStanislav Sedov 				fflags = PS_FST_FFLAG_READ;
866279a233dSJilles Tjoelker 			if ((kve->kve_flags & KVME_FLAG_COW) == 0 &&
867279a233dSJilles Tjoelker 			    kve->kve_protection & KVME_PROT_WRITE)
8680daf62d9SStanislav Sedov 				fflags |= PS_FST_FFLAG_WRITE;
8690daf62d9SStanislav Sedov 			offset = kve->kve_offset;
8700daf62d9SStanislav Sedov 			refcount = kve->kve_ref_count;
8710daf62d9SStanislav Sedov 			if (*kve->kve_path != '\0')
8720daf62d9SStanislav Sedov 				path = strdup(kve->kve_path);
8730daf62d9SStanislav Sedov 			else
8740daf62d9SStanislav Sedov 				path = NULL;
8750daf62d9SStanislav Sedov 			entry = filestat_new_entry(kve, PS_FST_TYPE_VNODE, -1,
876d57486e2SRobert Watson 			    fflags, PS_FST_UFLAG_MMAP, refcount, offset, path,
877d57486e2SRobert Watson 			    0);
8780daf62d9SStanislav Sedov 			if (entry != NULL)
8790daf62d9SStanislav Sedov 				STAILQ_INSERT_TAIL(head, entry, next);
8800daf62d9SStanislav Sedov 		}
8810daf62d9SStanislav Sedov 	}
8820daf62d9SStanislav Sedov fail:
8830daf62d9SStanislav Sedov 	return (head);
8840daf62d9SStanislav Sedov }
8850daf62d9SStanislav Sedov 
8860daf62d9SStanislav Sedov int
8870daf62d9SStanislav Sedov procstat_get_pipe_info(struct procstat *procstat, struct filestat *fst,
8880daf62d9SStanislav Sedov     struct pipestat *ps, char *errbuf)
8890daf62d9SStanislav Sedov {
8900daf62d9SStanislav Sedov 
8910daf62d9SStanislav Sedov 	assert(ps);
8920daf62d9SStanislav Sedov 	if (procstat->type == PROCSTAT_KVM) {
8930daf62d9SStanislav Sedov 		return (procstat_get_pipe_info_kvm(procstat->kd, fst, ps,
8940daf62d9SStanislav Sedov 		    errbuf));
8957153ad2bSMikolaj Golub 	} else if (procstat->type == PROCSTAT_SYSCTL ||
8967153ad2bSMikolaj Golub 		procstat->type == PROCSTAT_CORE) {
8970daf62d9SStanislav Sedov 		return (procstat_get_pipe_info_sysctl(fst, ps, errbuf));
8980daf62d9SStanislav Sedov 	} else {
89980905c35SJilles Tjoelker 		warnx("unknown access method: %d", procstat->type);
9000daf62d9SStanislav Sedov 		snprintf(errbuf, _POSIX2_LINE_MAX, "error");
9010daf62d9SStanislav Sedov 		return (1);
9020daf62d9SStanislav Sedov 	}
9030daf62d9SStanislav Sedov }
9040daf62d9SStanislav Sedov 
9050daf62d9SStanislav Sedov static int
9060daf62d9SStanislav Sedov procstat_get_pipe_info_kvm(kvm_t *kd, struct filestat *fst,
9070daf62d9SStanislav Sedov     struct pipestat *ps, char *errbuf)
9080daf62d9SStanislav Sedov {
9090daf62d9SStanislav Sedov 	struct pipe pi;
9100daf62d9SStanislav Sedov 	void *pipep;
9110daf62d9SStanislav Sedov 
9120daf62d9SStanislav Sedov 	assert(kd);
9130daf62d9SStanislav Sedov 	assert(ps);
9140daf62d9SStanislav Sedov 	assert(fst);
9150daf62d9SStanislav Sedov 	bzero(ps, sizeof(*ps));
9160daf62d9SStanislav Sedov 	pipep = fst->fs_typedep;
9170daf62d9SStanislav Sedov 	if (pipep == NULL)
9180daf62d9SStanislav Sedov 		goto fail;
9190daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)pipep, &pi, sizeof(struct pipe))) {
9200daf62d9SStanislav Sedov 		warnx("can't read pipe at %p", (void *)pipep);
9210daf62d9SStanislav Sedov 		goto fail;
9220daf62d9SStanislav Sedov 	}
9230daf62d9SStanislav Sedov 	ps->addr = (uintptr_t)pipep;
9240daf62d9SStanislav Sedov 	ps->peer = (uintptr_t)pi.pipe_peer;
9250daf62d9SStanislav Sedov 	ps->buffer_cnt = pi.pipe_buffer.cnt;
9260daf62d9SStanislav Sedov 	return (0);
9270daf62d9SStanislav Sedov 
9280daf62d9SStanislav Sedov fail:
9290daf62d9SStanislav Sedov 	snprintf(errbuf, _POSIX2_LINE_MAX, "error");
9300daf62d9SStanislav Sedov 	return (1);
9310daf62d9SStanislav Sedov }
9320daf62d9SStanislav Sedov 
9330daf62d9SStanislav Sedov static int
9340daf62d9SStanislav Sedov procstat_get_pipe_info_sysctl(struct filestat *fst, struct pipestat *ps,
9350daf62d9SStanislav Sedov     char *errbuf __unused)
9360daf62d9SStanislav Sedov {
9370daf62d9SStanislav Sedov 	struct kinfo_file *kif;
9380daf62d9SStanislav Sedov 
9390daf62d9SStanislav Sedov 	assert(ps);
9400daf62d9SStanislav Sedov 	assert(fst);
9410daf62d9SStanislav Sedov 	bzero(ps, sizeof(*ps));
9420daf62d9SStanislav Sedov 	kif = fst->fs_typedep;
9430daf62d9SStanislav Sedov 	if (kif == NULL)
9440daf62d9SStanislav Sedov 		return (1);
9450daf62d9SStanislav Sedov 	ps->addr = kif->kf_un.kf_pipe.kf_pipe_addr;
9460daf62d9SStanislav Sedov 	ps->peer = kif->kf_un.kf_pipe.kf_pipe_peer;
9470daf62d9SStanislav Sedov 	ps->buffer_cnt = kif->kf_un.kf_pipe.kf_pipe_buffer_cnt;
9480daf62d9SStanislav Sedov 	return (0);
9490daf62d9SStanislav Sedov }
9500daf62d9SStanislav Sedov 
9510daf62d9SStanislav Sedov int
9520daf62d9SStanislav Sedov procstat_get_pts_info(struct procstat *procstat, struct filestat *fst,
9530daf62d9SStanislav Sedov     struct ptsstat *pts, char *errbuf)
9540daf62d9SStanislav Sedov {
9550daf62d9SStanislav Sedov 
9560daf62d9SStanislav Sedov 	assert(pts);
9570daf62d9SStanislav Sedov 	if (procstat->type == PROCSTAT_KVM) {
9580daf62d9SStanislav Sedov 		return (procstat_get_pts_info_kvm(procstat->kd, fst, pts,
9590daf62d9SStanislav Sedov 		    errbuf));
9607153ad2bSMikolaj Golub 	} else if (procstat->type == PROCSTAT_SYSCTL ||
9617153ad2bSMikolaj Golub 		procstat->type == PROCSTAT_CORE) {
9620daf62d9SStanislav Sedov 		return (procstat_get_pts_info_sysctl(fst, pts, errbuf));
9630daf62d9SStanislav Sedov 	} else {
96480905c35SJilles Tjoelker 		warnx("unknown access method: %d", procstat->type);
9650daf62d9SStanislav Sedov 		snprintf(errbuf, _POSIX2_LINE_MAX, "error");
9660daf62d9SStanislav Sedov 		return (1);
9670daf62d9SStanislav Sedov 	}
9680daf62d9SStanislav Sedov }
9690daf62d9SStanislav Sedov 
9700daf62d9SStanislav Sedov static int
9710daf62d9SStanislav Sedov procstat_get_pts_info_kvm(kvm_t *kd, struct filestat *fst,
9720daf62d9SStanislav Sedov     struct ptsstat *pts, char *errbuf)
9730daf62d9SStanislav Sedov {
9740daf62d9SStanislav Sedov 	struct tty tty;
9750daf62d9SStanislav Sedov 	void *ttyp;
9760daf62d9SStanislav Sedov 
9770daf62d9SStanislav Sedov 	assert(kd);
9780daf62d9SStanislav Sedov 	assert(pts);
9790daf62d9SStanislav Sedov 	assert(fst);
9800daf62d9SStanislav Sedov 	bzero(pts, sizeof(*pts));
9810daf62d9SStanislav Sedov 	ttyp = fst->fs_typedep;
9820daf62d9SStanislav Sedov 	if (ttyp == NULL)
9830daf62d9SStanislav Sedov 		goto fail;
9840daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)ttyp, &tty, sizeof(struct tty))) {
9850daf62d9SStanislav Sedov 		warnx("can't read tty at %p", (void *)ttyp);
9860daf62d9SStanislav Sedov 		goto fail;
9870daf62d9SStanislav Sedov 	}
9880daf62d9SStanislav Sedov 	pts->dev = dev2udev(kd, tty.t_dev);
9890daf62d9SStanislav Sedov 	(void)kdevtoname(kd, tty.t_dev, pts->devname);
9900daf62d9SStanislav Sedov 	return (0);
9910daf62d9SStanislav Sedov 
9920daf62d9SStanislav Sedov fail:
9930daf62d9SStanislav Sedov 	snprintf(errbuf, _POSIX2_LINE_MAX, "error");
9940daf62d9SStanislav Sedov 	return (1);
9950daf62d9SStanislav Sedov }
9960daf62d9SStanislav Sedov 
9970daf62d9SStanislav Sedov static int
9980daf62d9SStanislav Sedov procstat_get_pts_info_sysctl(struct filestat *fst, struct ptsstat *pts,
9990daf62d9SStanislav Sedov     char *errbuf __unused)
10000daf62d9SStanislav Sedov {
10010daf62d9SStanislav Sedov 	struct kinfo_file *kif;
10020daf62d9SStanislav Sedov 
10030daf62d9SStanislav Sedov 	assert(pts);
10040daf62d9SStanislav Sedov 	assert(fst);
10050daf62d9SStanislav Sedov 	bzero(pts, sizeof(*pts));
10060daf62d9SStanislav Sedov 	kif = fst->fs_typedep;
10070daf62d9SStanislav Sedov 	if (kif == NULL)
10080daf62d9SStanislav Sedov 		return (0);
10090daf62d9SStanislav Sedov 	pts->dev = kif->kf_un.kf_pts.kf_pts_dev;
10100daf62d9SStanislav Sedov 	strlcpy(pts->devname, kif->kf_path, sizeof(pts->devname));
10110daf62d9SStanislav Sedov 	return (0);
10120daf62d9SStanislav Sedov }
10130daf62d9SStanislav Sedov 
10140daf62d9SStanislav Sedov int
1015*958aa575SJohn Baldwin procstat_get_sem_info(struct procstat *procstat, struct filestat *fst,
1016*958aa575SJohn Baldwin     struct semstat *sem, char *errbuf)
1017*958aa575SJohn Baldwin {
1018*958aa575SJohn Baldwin 
1019*958aa575SJohn Baldwin 	assert(sem);
1020*958aa575SJohn Baldwin 	if (procstat->type == PROCSTAT_KVM) {
1021*958aa575SJohn Baldwin 		return (procstat_get_sem_info_kvm(procstat->kd, fst, sem,
1022*958aa575SJohn Baldwin 		    errbuf));
1023*958aa575SJohn Baldwin 	} else if (procstat->type == PROCSTAT_SYSCTL ||
1024*958aa575SJohn Baldwin 	    procstat->type == PROCSTAT_CORE) {
1025*958aa575SJohn Baldwin 		return (procstat_get_sem_info_sysctl(fst, sem, errbuf));
1026*958aa575SJohn Baldwin 	} else {
1027*958aa575SJohn Baldwin 		warnx("unknown access method: %d", procstat->type);
1028*958aa575SJohn Baldwin 		snprintf(errbuf, _POSIX2_LINE_MAX, "error");
1029*958aa575SJohn Baldwin 		return (1);
1030*958aa575SJohn Baldwin 	}
1031*958aa575SJohn Baldwin }
1032*958aa575SJohn Baldwin 
1033*958aa575SJohn Baldwin static int
1034*958aa575SJohn Baldwin procstat_get_sem_info_kvm(kvm_t *kd, struct filestat *fst,
1035*958aa575SJohn Baldwin     struct semstat *sem, char *errbuf)
1036*958aa575SJohn Baldwin {
1037*958aa575SJohn Baldwin 	struct ksem ksem;
1038*958aa575SJohn Baldwin 	void *ksemp;
1039*958aa575SJohn Baldwin 	char *path;
1040*958aa575SJohn Baldwin 	int i;
1041*958aa575SJohn Baldwin 
1042*958aa575SJohn Baldwin 	assert(kd);
1043*958aa575SJohn Baldwin 	assert(sem);
1044*958aa575SJohn Baldwin 	assert(fst);
1045*958aa575SJohn Baldwin 	bzero(sem, sizeof(*sem));
1046*958aa575SJohn Baldwin 	ksemp = fst->fs_typedep;
1047*958aa575SJohn Baldwin 	if (ksemp == NULL)
1048*958aa575SJohn Baldwin 		goto fail;
1049*958aa575SJohn Baldwin 	if (!kvm_read_all(kd, (unsigned long)ksemp, &ksem,
1050*958aa575SJohn Baldwin 	    sizeof(struct ksem))) {
1051*958aa575SJohn Baldwin 		warnx("can't read ksem at %p", (void *)ksemp);
1052*958aa575SJohn Baldwin 		goto fail;
1053*958aa575SJohn Baldwin 	}
1054*958aa575SJohn Baldwin 	sem->mode = S_IFREG | ksem.ks_mode;
1055*958aa575SJohn Baldwin 	sem->value = ksem.ks_value;
1056*958aa575SJohn Baldwin 	if (fst->fs_path == NULL && ksem.ks_path != NULL) {
1057*958aa575SJohn Baldwin 		path = malloc(MAXPATHLEN);
1058*958aa575SJohn Baldwin 		for (i = 0; i < MAXPATHLEN - 1; i++) {
1059*958aa575SJohn Baldwin 			if (!kvm_read_all(kd, (unsigned long)ksem.ks_path + i,
1060*958aa575SJohn Baldwin 			    path + i, 1))
1061*958aa575SJohn Baldwin 				break;
1062*958aa575SJohn Baldwin 			if (path[i] == '\0')
1063*958aa575SJohn Baldwin 				break;
1064*958aa575SJohn Baldwin 		}
1065*958aa575SJohn Baldwin 		path[i] = '\0';
1066*958aa575SJohn Baldwin 		if (i == 0)
1067*958aa575SJohn Baldwin 			free(path);
1068*958aa575SJohn Baldwin 		else
1069*958aa575SJohn Baldwin 			fst->fs_path = path;
1070*958aa575SJohn Baldwin 	}
1071*958aa575SJohn Baldwin 	return (0);
1072*958aa575SJohn Baldwin 
1073*958aa575SJohn Baldwin fail:
1074*958aa575SJohn Baldwin 	snprintf(errbuf, _POSIX2_LINE_MAX, "error");
1075*958aa575SJohn Baldwin 	return (1);
1076*958aa575SJohn Baldwin }
1077*958aa575SJohn Baldwin 
1078*958aa575SJohn Baldwin static int
1079*958aa575SJohn Baldwin procstat_get_sem_info_sysctl(struct filestat *fst, struct semstat *sem,
1080*958aa575SJohn Baldwin     char *errbuf __unused)
1081*958aa575SJohn Baldwin {
1082*958aa575SJohn Baldwin 	struct kinfo_file *kif;
1083*958aa575SJohn Baldwin 
1084*958aa575SJohn Baldwin 	assert(sem);
1085*958aa575SJohn Baldwin 	assert(fst);
1086*958aa575SJohn Baldwin 	bzero(sem, sizeof(*sem));
1087*958aa575SJohn Baldwin 	kif = fst->fs_typedep;
1088*958aa575SJohn Baldwin 	if (kif == NULL)
1089*958aa575SJohn Baldwin 		return (0);
1090*958aa575SJohn Baldwin 	sem->value = kif->kf_un.kf_sem.kf_sem_value;
1091*958aa575SJohn Baldwin 	sem->mode = kif->kf_un.kf_sem.kf_sem_mode;
1092*958aa575SJohn Baldwin 	return (0);
1093*958aa575SJohn Baldwin }
1094*958aa575SJohn Baldwin 
1095*958aa575SJohn Baldwin int
1096e506e182SJohn Baldwin procstat_get_shm_info(struct procstat *procstat, struct filestat *fst,
1097e506e182SJohn Baldwin     struct shmstat *shm, char *errbuf)
1098e506e182SJohn Baldwin {
1099e506e182SJohn Baldwin 
1100e506e182SJohn Baldwin 	assert(shm);
1101e506e182SJohn Baldwin 	if (procstat->type == PROCSTAT_KVM) {
1102e506e182SJohn Baldwin 		return (procstat_get_shm_info_kvm(procstat->kd, fst, shm,
1103e506e182SJohn Baldwin 		    errbuf));
11047153ad2bSMikolaj Golub 	} else if (procstat->type == PROCSTAT_SYSCTL ||
11057153ad2bSMikolaj Golub 	    procstat->type == PROCSTAT_CORE) {
1106e506e182SJohn Baldwin 		return (procstat_get_shm_info_sysctl(fst, shm, errbuf));
1107e506e182SJohn Baldwin 	} else {
1108e506e182SJohn Baldwin 		warnx("unknown access method: %d", procstat->type);
1109e506e182SJohn Baldwin 		snprintf(errbuf, _POSIX2_LINE_MAX, "error");
1110e506e182SJohn Baldwin 		return (1);
1111e506e182SJohn Baldwin 	}
1112e506e182SJohn Baldwin }
1113e506e182SJohn Baldwin 
1114e506e182SJohn Baldwin static int
1115e506e182SJohn Baldwin procstat_get_shm_info_kvm(kvm_t *kd, struct filestat *fst,
1116e506e182SJohn Baldwin     struct shmstat *shm, char *errbuf)
1117e506e182SJohn Baldwin {
1118e506e182SJohn Baldwin 	struct shmfd shmfd;
1119e506e182SJohn Baldwin 	void *shmfdp;
1120a9f5e425SJohn Baldwin 	char *path;
1121a9f5e425SJohn Baldwin 	int i;
1122e506e182SJohn Baldwin 
1123e506e182SJohn Baldwin 	assert(kd);
1124e506e182SJohn Baldwin 	assert(shm);
1125e506e182SJohn Baldwin 	assert(fst);
1126e506e182SJohn Baldwin 	bzero(shm, sizeof(*shm));
1127e506e182SJohn Baldwin 	shmfdp = fst->fs_typedep;
1128e506e182SJohn Baldwin 	if (shmfdp == NULL)
1129e506e182SJohn Baldwin 		goto fail;
1130e506e182SJohn Baldwin 	if (!kvm_read_all(kd, (unsigned long)shmfdp, &shmfd,
1131e506e182SJohn Baldwin 	    sizeof(struct shmfd))) {
1132e506e182SJohn Baldwin 		warnx("can't read shmfd at %p", (void *)shmfdp);
1133e506e182SJohn Baldwin 		goto fail;
1134e506e182SJohn Baldwin 	}
1135e506e182SJohn Baldwin 	shm->mode = S_IFREG | shmfd.shm_mode;
1136e506e182SJohn Baldwin 	shm->size = shmfd.shm_size;
1137a9f5e425SJohn Baldwin 	if (fst->fs_path == NULL && shmfd.shm_path != NULL) {
1138a9f5e425SJohn Baldwin 		path = malloc(MAXPATHLEN);
1139a9f5e425SJohn Baldwin 		for (i = 0; i < MAXPATHLEN - 1; i++) {
1140a9f5e425SJohn Baldwin 			if (!kvm_read_all(kd, (unsigned long)shmfd.shm_path + i,
1141a9f5e425SJohn Baldwin 			    path + i, 1))
1142a9f5e425SJohn Baldwin 				break;
1143a9f5e425SJohn Baldwin 			if (path[i] == '\0')
1144a9f5e425SJohn Baldwin 				break;
1145a9f5e425SJohn Baldwin 		}
1146a9f5e425SJohn Baldwin 		path[i] = '\0';
1147a9f5e425SJohn Baldwin 		if (i == 0)
1148a9f5e425SJohn Baldwin 			free(path);
1149a9f5e425SJohn Baldwin 		else
1150a9f5e425SJohn Baldwin 			fst->fs_path = path;
1151a9f5e425SJohn Baldwin 	}
1152e506e182SJohn Baldwin 	return (0);
1153e506e182SJohn Baldwin 
1154e506e182SJohn Baldwin fail:
1155e506e182SJohn Baldwin 	snprintf(errbuf, _POSIX2_LINE_MAX, "error");
1156e506e182SJohn Baldwin 	return (1);
1157e506e182SJohn Baldwin }
1158e506e182SJohn Baldwin 
1159e506e182SJohn Baldwin static int
1160e506e182SJohn Baldwin procstat_get_shm_info_sysctl(struct filestat *fst, struct shmstat *shm,
1161e506e182SJohn Baldwin     char *errbuf __unused)
1162e506e182SJohn Baldwin {
1163e506e182SJohn Baldwin 	struct kinfo_file *kif;
1164e506e182SJohn Baldwin 
1165e506e182SJohn Baldwin 	assert(shm);
1166e506e182SJohn Baldwin 	assert(fst);
1167e506e182SJohn Baldwin 	bzero(shm, sizeof(*shm));
1168e506e182SJohn Baldwin 	kif = fst->fs_typedep;
1169e506e182SJohn Baldwin 	if (kif == NULL)
1170e506e182SJohn Baldwin 		return (0);
1171e506e182SJohn Baldwin 	shm->size = kif->kf_un.kf_file.kf_file_size;
1172e506e182SJohn Baldwin 	shm->mode = kif->kf_un.kf_file.kf_file_mode;
1173e506e182SJohn Baldwin 	return (0);
1174e506e182SJohn Baldwin }
1175e506e182SJohn Baldwin 
1176e506e182SJohn Baldwin int
11770daf62d9SStanislav Sedov procstat_get_vnode_info(struct procstat *procstat, struct filestat *fst,
11780daf62d9SStanislav Sedov     struct vnstat *vn, char *errbuf)
11790daf62d9SStanislav Sedov {
11800daf62d9SStanislav Sedov 
11810daf62d9SStanislav Sedov 	assert(vn);
11820daf62d9SStanislav Sedov 	if (procstat->type == PROCSTAT_KVM) {
11830daf62d9SStanislav Sedov 		return (procstat_get_vnode_info_kvm(procstat->kd, fst, vn,
11840daf62d9SStanislav Sedov 		    errbuf));
11857153ad2bSMikolaj Golub 	} else if (procstat->type == PROCSTAT_SYSCTL ||
11867153ad2bSMikolaj Golub 		procstat->type == PROCSTAT_CORE) {
11870daf62d9SStanislav Sedov 		return (procstat_get_vnode_info_sysctl(fst, vn, errbuf));
11880daf62d9SStanislav Sedov 	} else {
118980905c35SJilles Tjoelker 		warnx("unknown access method: %d", procstat->type);
11900daf62d9SStanislav Sedov 		snprintf(errbuf, _POSIX2_LINE_MAX, "error");
11910daf62d9SStanislav Sedov 		return (1);
11920daf62d9SStanislav Sedov 	}
11930daf62d9SStanislav Sedov }
11940daf62d9SStanislav Sedov 
11950daf62d9SStanislav Sedov static int
11960daf62d9SStanislav Sedov procstat_get_vnode_info_kvm(kvm_t *kd, struct filestat *fst,
11970daf62d9SStanislav Sedov     struct vnstat *vn, char *errbuf)
11980daf62d9SStanislav Sedov {
11990daf62d9SStanislav Sedov 	/* Filesystem specific handlers. */
12000daf62d9SStanislav Sedov 	#define FSTYPE(fst)     {#fst, fst##_filestat}
12010daf62d9SStanislav Sedov 	struct {
12020daf62d9SStanislav Sedov 		const char	*tag;
12030daf62d9SStanislav Sedov 		int		(*handler)(kvm_t *kd, struct vnode *vp,
12040daf62d9SStanislav Sedov 		    struct vnstat *vn);
12050daf62d9SStanislav Sedov 	} fstypes[] = {
12060daf62d9SStanislav Sedov 		FSTYPE(devfs),
12070daf62d9SStanislav Sedov 		FSTYPE(isofs),
12080daf62d9SStanislav Sedov 		FSTYPE(msdosfs),
12090daf62d9SStanislav Sedov 		FSTYPE(nfs),
12100daf62d9SStanislav Sedov 		FSTYPE(udf),
12110daf62d9SStanislav Sedov 		FSTYPE(ufs),
121259ea47d0SStanislav Sedov #ifdef LIBPROCSTAT_ZFS
12130daf62d9SStanislav Sedov 		FSTYPE(zfs),
12140daf62d9SStanislav Sedov #endif
12150daf62d9SStanislav Sedov 	};
12160daf62d9SStanislav Sedov #define	NTYPES	(sizeof(fstypes) / sizeof(*fstypes))
12170daf62d9SStanislav Sedov 	struct vnode vnode;
12180daf62d9SStanislav Sedov 	char tagstr[12];
12190daf62d9SStanislav Sedov 	void *vp;
12200daf62d9SStanislav Sedov 	int error, found;
12210daf62d9SStanislav Sedov 	unsigned int i;
12220daf62d9SStanislav Sedov 
12230daf62d9SStanislav Sedov 	assert(kd);
12240daf62d9SStanislav Sedov 	assert(vn);
12250daf62d9SStanislav Sedov 	assert(fst);
12260daf62d9SStanislav Sedov 	vp = fst->fs_typedep;
12270daf62d9SStanislav Sedov 	if (vp == NULL)
12280daf62d9SStanislav Sedov 		goto fail;
12290daf62d9SStanislav Sedov 	error = kvm_read_all(kd, (unsigned long)vp, &vnode, sizeof(vnode));
12300daf62d9SStanislav Sedov 	if (error == 0) {
12310daf62d9SStanislav Sedov 		warnx("can't read vnode at %p", (void *)vp);
12320daf62d9SStanislav Sedov 		goto fail;
12330daf62d9SStanislav Sedov 	}
12340daf62d9SStanislav Sedov 	bzero(vn, sizeof(*vn));
12350daf62d9SStanislav Sedov 	vn->vn_type = vntype2psfsttype(vnode.v_type);
12360daf62d9SStanislav Sedov 	if (vnode.v_type == VNON || vnode.v_type == VBAD)
12370daf62d9SStanislav Sedov 		return (0);
12380daf62d9SStanislav Sedov 	error = kvm_read_all(kd, (unsigned long)vnode.v_tag, tagstr,
12390daf62d9SStanislav Sedov 	    sizeof(tagstr));
12400daf62d9SStanislav Sedov 	if (error == 0) {
12410daf62d9SStanislav Sedov 		warnx("can't read v_tag at %p", (void *)vp);
12420daf62d9SStanislav Sedov 		goto fail;
12430daf62d9SStanislav Sedov 	}
12440daf62d9SStanislav Sedov 	tagstr[sizeof(tagstr) - 1] = '\0';
12450daf62d9SStanislav Sedov 
12460daf62d9SStanislav Sedov 	/*
12470daf62d9SStanislav Sedov 	 * Find appropriate handler.
12480daf62d9SStanislav Sedov 	 */
12490daf62d9SStanislav Sedov 	for (i = 0, found = 0; i < NTYPES; i++)
12500daf62d9SStanislav Sedov 		if (!strcmp(fstypes[i].tag, tagstr)) {
12510daf62d9SStanislav Sedov 			if (fstypes[i].handler(kd, &vnode, vn) != 0) {
12520daf62d9SStanislav Sedov 				goto fail;
12530daf62d9SStanislav Sedov 			}
12540daf62d9SStanislav Sedov 			break;
12550daf62d9SStanislav Sedov 		}
12560daf62d9SStanislav Sedov 	if (i == NTYPES) {
12570daf62d9SStanislav Sedov 		snprintf(errbuf, _POSIX2_LINE_MAX, "?(%s)", tagstr);
12580daf62d9SStanislav Sedov 		return (1);
12590daf62d9SStanislav Sedov 	}
12600daf62d9SStanislav Sedov 	vn->vn_mntdir = getmnton(kd, vnode.v_mount);
12610daf62d9SStanislav Sedov 	if ((vnode.v_type == VBLK || vnode.v_type == VCHR) &&
12620daf62d9SStanislav Sedov 	    vnode.v_rdev != NULL){
12630daf62d9SStanislav Sedov 		vn->vn_dev = dev2udev(kd, vnode.v_rdev);
12640daf62d9SStanislav Sedov 		(void)kdevtoname(kd, vnode.v_rdev, vn->vn_devname);
12650daf62d9SStanislav Sedov 	} else {
12660daf62d9SStanislav Sedov 		vn->vn_dev = -1;
12670daf62d9SStanislav Sedov 	}
12680daf62d9SStanislav Sedov 	return (0);
12690daf62d9SStanislav Sedov 
12700daf62d9SStanislav Sedov fail:
12710daf62d9SStanislav Sedov 	snprintf(errbuf, _POSIX2_LINE_MAX, "error");
12720daf62d9SStanislav Sedov 	return (1);
12730daf62d9SStanislav Sedov }
12740daf62d9SStanislav Sedov 
12750daf62d9SStanislav Sedov /*
12760daf62d9SStanislav Sedov  * kinfo vnode type to filestat translation.
12770daf62d9SStanislav Sedov  */
12780daf62d9SStanislav Sedov static int
12790daf62d9SStanislav Sedov kinfo_vtype2fst(int kfvtype)
12800daf62d9SStanislav Sedov {
12810daf62d9SStanislav Sedov 	static struct {
12820daf62d9SStanislav Sedov 		int	kf_vtype;
12830daf62d9SStanislav Sedov 		int	fst_vtype;
12840daf62d9SStanislav Sedov 	} kfvtypes2fst[] = {
12850daf62d9SStanislav Sedov 		{ KF_VTYPE_VBAD, PS_FST_VTYPE_VBAD },
12860daf62d9SStanislav Sedov 		{ KF_VTYPE_VBLK, PS_FST_VTYPE_VBLK },
12870daf62d9SStanislav Sedov 		{ KF_VTYPE_VCHR, PS_FST_VTYPE_VCHR },
12880daf62d9SStanislav Sedov 		{ KF_VTYPE_VDIR, PS_FST_VTYPE_VDIR },
12890daf62d9SStanislav Sedov 		{ KF_VTYPE_VFIFO, PS_FST_VTYPE_VFIFO },
12900daf62d9SStanislav Sedov 		{ KF_VTYPE_VLNK, PS_FST_VTYPE_VLNK },
12910daf62d9SStanislav Sedov 		{ KF_VTYPE_VNON, PS_FST_VTYPE_VNON },
12920daf62d9SStanislav Sedov 		{ KF_VTYPE_VREG, PS_FST_VTYPE_VREG },
12930daf62d9SStanislav Sedov 		{ KF_VTYPE_VSOCK, PS_FST_VTYPE_VSOCK }
12940daf62d9SStanislav Sedov 	};
12950daf62d9SStanislav Sedov #define	NKFVTYPES	(sizeof(kfvtypes2fst) / sizeof(*kfvtypes2fst))
12960daf62d9SStanislav Sedov 	unsigned int i;
12970daf62d9SStanislav Sedov 
12980daf62d9SStanislav Sedov 	for (i = 0; i < NKFVTYPES; i++)
12990daf62d9SStanislav Sedov 		if (kfvtypes2fst[i].kf_vtype == kfvtype)
13000daf62d9SStanislav Sedov 			break;
13010daf62d9SStanislav Sedov 	if (i == NKFVTYPES)
13020daf62d9SStanislav Sedov 		return (PS_FST_VTYPE_UNKNOWN);
13030daf62d9SStanislav Sedov 	return (kfvtypes2fst[i].fst_vtype);
13040daf62d9SStanislav Sedov }
13050daf62d9SStanislav Sedov 
13060daf62d9SStanislav Sedov static int
13070daf62d9SStanislav Sedov procstat_get_vnode_info_sysctl(struct filestat *fst, struct vnstat *vn,
13080daf62d9SStanislav Sedov     char *errbuf)
13090daf62d9SStanislav Sedov {
13100daf62d9SStanislav Sedov 	struct statfs stbuf;
13110daf62d9SStanislav Sedov 	struct kinfo_file *kif;
13120daf62d9SStanislav Sedov 	struct kinfo_vmentry *kve;
13130daf62d9SStanislav Sedov 	uint64_t fileid;
13140daf62d9SStanislav Sedov 	uint64_t size;
13150daf62d9SStanislav Sedov 	char *name, *path;
13160daf62d9SStanislav Sedov 	uint32_t fsid;
13170daf62d9SStanislav Sedov 	uint16_t mode;
13180daf62d9SStanislav Sedov 	uint32_t rdev;
13190daf62d9SStanislav Sedov 	int vntype;
13200daf62d9SStanislav Sedov 	int status;
13210daf62d9SStanislav Sedov 
13220daf62d9SStanislav Sedov 	assert(fst);
13230daf62d9SStanislav Sedov 	assert(vn);
13240daf62d9SStanislav Sedov 	bzero(vn, sizeof(*vn));
13250daf62d9SStanislav Sedov 	if (fst->fs_typedep == NULL)
13260daf62d9SStanislav Sedov 		return (1);
13270daf62d9SStanislav Sedov 	if (fst->fs_uflags & PS_FST_UFLAG_MMAP) {
13280daf62d9SStanislav Sedov 		kve = fst->fs_typedep;
13290daf62d9SStanislav Sedov 		fileid = kve->kve_vn_fileid;
13300daf62d9SStanislav Sedov 		fsid = kve->kve_vn_fsid;
13310daf62d9SStanislav Sedov 		mode = kve->kve_vn_mode;
13320daf62d9SStanislav Sedov 		path = kve->kve_path;
13330daf62d9SStanislav Sedov 		rdev = kve->kve_vn_rdev;
13340daf62d9SStanislav Sedov 		size = kve->kve_vn_size;
13350daf62d9SStanislav Sedov 		vntype = kinfo_vtype2fst(kve->kve_vn_type);
13360daf62d9SStanislav Sedov 		status = kve->kve_status;
13370daf62d9SStanislav Sedov 	} else {
13380daf62d9SStanislav Sedov 		kif = fst->fs_typedep;
13390daf62d9SStanislav Sedov 		fileid = kif->kf_un.kf_file.kf_file_fileid;
13400daf62d9SStanislav Sedov 		fsid = kif->kf_un.kf_file.kf_file_fsid;
13410daf62d9SStanislav Sedov 		mode = kif->kf_un.kf_file.kf_file_mode;
13420daf62d9SStanislav Sedov 		path = kif->kf_path;
13430daf62d9SStanislav Sedov 		rdev = kif->kf_un.kf_file.kf_file_rdev;
13440daf62d9SStanislav Sedov 		size = kif->kf_un.kf_file.kf_file_size;
13450daf62d9SStanislav Sedov 		vntype = kinfo_vtype2fst(kif->kf_vnode_type);
13460daf62d9SStanislav Sedov 		status = kif->kf_status;
13470daf62d9SStanislav Sedov 	}
13480daf62d9SStanislav Sedov 	vn->vn_type = vntype;
13490daf62d9SStanislav Sedov 	if (vntype == PS_FST_VTYPE_VNON || vntype == PS_FST_VTYPE_VBAD)
13500daf62d9SStanislav Sedov 		return (0);
13510daf62d9SStanislav Sedov 	if ((status & KF_ATTR_VALID) == 0) {
13520daf62d9SStanislav Sedov 		snprintf(errbuf, _POSIX2_LINE_MAX, "? (no info available)");
13530daf62d9SStanislav Sedov 		return (1);
13540daf62d9SStanislav Sedov 	}
13550daf62d9SStanislav Sedov 	if (path && *path) {
13560daf62d9SStanislav Sedov 		statfs(path, &stbuf);
13570daf62d9SStanislav Sedov 		vn->vn_mntdir = strdup(stbuf.f_mntonname);
13580daf62d9SStanislav Sedov 	} else
13590daf62d9SStanislav Sedov 		vn->vn_mntdir = strdup("-");
13600daf62d9SStanislav Sedov 	vn->vn_dev = rdev;
13610daf62d9SStanislav Sedov 	if (vntype == PS_FST_VTYPE_VBLK) {
13620daf62d9SStanislav Sedov 		name = devname(rdev, S_IFBLK);
13630daf62d9SStanislav Sedov 		if (name != NULL)
13640daf62d9SStanislav Sedov 			strlcpy(vn->vn_devname, name,
13650daf62d9SStanislav Sedov 			    sizeof(vn->vn_devname));
13660daf62d9SStanislav Sedov 	} else if (vntype == PS_FST_VTYPE_VCHR) {
13670daf62d9SStanislav Sedov 		name = devname(vn->vn_dev, S_IFCHR);
13680daf62d9SStanislav Sedov 		if (name != NULL)
13690daf62d9SStanislav Sedov 			strlcpy(vn->vn_devname, name,
13700daf62d9SStanislav Sedov 			    sizeof(vn->vn_devname));
13710daf62d9SStanislav Sedov 	}
13720daf62d9SStanislav Sedov 	vn->vn_fsid = fsid;
13730daf62d9SStanislav Sedov 	vn->vn_fileid = fileid;
13740daf62d9SStanislav Sedov 	vn->vn_size = size;
13750daf62d9SStanislav Sedov 	vn->vn_mode = mode;
13760daf62d9SStanislav Sedov 	return (0);
13770daf62d9SStanislav Sedov }
13780daf62d9SStanislav Sedov 
13790daf62d9SStanislav Sedov int
13800daf62d9SStanislav Sedov procstat_get_socket_info(struct procstat *procstat, struct filestat *fst,
13810daf62d9SStanislav Sedov     struct sockstat *sock, char *errbuf)
13820daf62d9SStanislav Sedov {
13830daf62d9SStanislav Sedov 
13840daf62d9SStanislav Sedov 	assert(sock);
13850daf62d9SStanislav Sedov 	if (procstat->type == PROCSTAT_KVM) {
13860daf62d9SStanislav Sedov 		return (procstat_get_socket_info_kvm(procstat->kd, fst, sock,
13870daf62d9SStanislav Sedov 		    errbuf));
13887153ad2bSMikolaj Golub 	} else if (procstat->type == PROCSTAT_SYSCTL ||
13897153ad2bSMikolaj Golub 		procstat->type == PROCSTAT_CORE) {
13900daf62d9SStanislav Sedov 		return (procstat_get_socket_info_sysctl(fst, sock, errbuf));
13910daf62d9SStanislav Sedov 	} else {
139280905c35SJilles Tjoelker 		warnx("unknown access method: %d", procstat->type);
13930daf62d9SStanislav Sedov 		snprintf(errbuf, _POSIX2_LINE_MAX, "error");
13940daf62d9SStanislav Sedov 		return (1);
13950daf62d9SStanislav Sedov 	}
13960daf62d9SStanislav Sedov }
13970daf62d9SStanislav Sedov 
13980daf62d9SStanislav Sedov static int
13990daf62d9SStanislav Sedov procstat_get_socket_info_kvm(kvm_t *kd, struct filestat *fst,
14000daf62d9SStanislav Sedov     struct sockstat *sock, char *errbuf)
14010daf62d9SStanislav Sedov {
14020daf62d9SStanislav Sedov 	struct domain dom;
14030daf62d9SStanislav Sedov 	struct inpcb inpcb;
14040daf62d9SStanislav Sedov 	struct protosw proto;
14050daf62d9SStanislav Sedov 	struct socket s;
14060daf62d9SStanislav Sedov 	struct unpcb unpcb;
14070daf62d9SStanislav Sedov 	ssize_t len;
14080daf62d9SStanislav Sedov 	void *so;
14090daf62d9SStanislav Sedov 
14100daf62d9SStanislav Sedov 	assert(kd);
14110daf62d9SStanislav Sedov 	assert(sock);
14120daf62d9SStanislav Sedov 	assert(fst);
14130daf62d9SStanislav Sedov 	bzero(sock, sizeof(*sock));
14140daf62d9SStanislav Sedov 	so = fst->fs_typedep;
14150daf62d9SStanislav Sedov 	if (so == NULL)
14160daf62d9SStanislav Sedov 		goto fail;
14170daf62d9SStanislav Sedov 	sock->so_addr = (uintptr_t)so;
14180daf62d9SStanislav Sedov 	/* fill in socket */
14190daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)so, &s,
14200daf62d9SStanislav Sedov 	    sizeof(struct socket))) {
14210daf62d9SStanislav Sedov 		warnx("can't read sock at %p", (void *)so);
14220daf62d9SStanislav Sedov 		goto fail;
14230daf62d9SStanislav Sedov 	}
14240daf62d9SStanislav Sedov 	/* fill in protosw entry */
14250daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)s.so_proto, &proto,
14260daf62d9SStanislav Sedov 	    sizeof(struct protosw))) {
14270daf62d9SStanislav Sedov 		warnx("can't read protosw at %p", (void *)s.so_proto);
14280daf62d9SStanislav Sedov 		goto fail;
14290daf62d9SStanislav Sedov 	}
14300daf62d9SStanislav Sedov 	/* fill in domain */
14310daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)proto.pr_domain, &dom,
14320daf62d9SStanislav Sedov 	    sizeof(struct domain))) {
14330daf62d9SStanislav Sedov 		warnx("can't read domain at %p",
14340daf62d9SStanislav Sedov 		    (void *)proto.pr_domain);
14350daf62d9SStanislav Sedov 		goto fail;
14360daf62d9SStanislav Sedov 	}
14370daf62d9SStanislav Sedov 	if ((len = kvm_read(kd, (unsigned long)dom.dom_name, sock->dname,
14380daf62d9SStanislav Sedov 	    sizeof(sock->dname) - 1)) < 0) {
14390daf62d9SStanislav Sedov 		warnx("can't read domain name at %p", (void *)dom.dom_name);
14400daf62d9SStanislav Sedov 		sock->dname[0] = '\0';
14410daf62d9SStanislav Sedov 	}
14420daf62d9SStanislav Sedov 	else
14430daf62d9SStanislav Sedov 		sock->dname[len] = '\0';
14440daf62d9SStanislav Sedov 
14450daf62d9SStanislav Sedov 	/*
14460daf62d9SStanislav Sedov 	 * Fill in known data.
14470daf62d9SStanislav Sedov 	 */
14480daf62d9SStanislav Sedov 	sock->type = s.so_type;
14490daf62d9SStanislav Sedov 	sock->proto = proto.pr_protocol;
14500daf62d9SStanislav Sedov 	sock->dom_family = dom.dom_family;
14510daf62d9SStanislav Sedov 	sock->so_pcb = (uintptr_t)s.so_pcb;
14520daf62d9SStanislav Sedov 
14530daf62d9SStanislav Sedov 	/*
14540daf62d9SStanislav Sedov 	 * Protocol specific data.
14550daf62d9SStanislav Sedov 	 */
14560daf62d9SStanislav Sedov 	switch(dom.dom_family) {
14570daf62d9SStanislav Sedov 	case AF_INET:
14580daf62d9SStanislav Sedov 	case AF_INET6:
14590daf62d9SStanislav Sedov 		if (proto.pr_protocol == IPPROTO_TCP) {
14600daf62d9SStanislav Sedov 			if (s.so_pcb) {
14610daf62d9SStanislav Sedov 				if (kvm_read(kd, (u_long)s.so_pcb,
14620daf62d9SStanislav Sedov 				    (char *)&inpcb, sizeof(struct inpcb))
14630daf62d9SStanislav Sedov 				    != sizeof(struct inpcb)) {
14640daf62d9SStanislav Sedov 					warnx("can't read inpcb at %p",
14650daf62d9SStanislav Sedov 					    (void *)s.so_pcb);
14660daf62d9SStanislav Sedov 				} else
14670daf62d9SStanislav Sedov 					sock->inp_ppcb =
14680daf62d9SStanislav Sedov 					    (uintptr_t)inpcb.inp_ppcb;
14690daf62d9SStanislav Sedov 			}
14700daf62d9SStanislav Sedov 		}
14710daf62d9SStanislav Sedov 		break;
14720daf62d9SStanislav Sedov 	case AF_UNIX:
14730daf62d9SStanislav Sedov 		if (s.so_pcb) {
14740daf62d9SStanislav Sedov 			if (kvm_read(kd, (u_long)s.so_pcb, (char *)&unpcb,
14750daf62d9SStanislav Sedov 			    sizeof(struct unpcb)) != sizeof(struct unpcb)){
14760daf62d9SStanislav Sedov 				warnx("can't read unpcb at %p",
14770daf62d9SStanislav Sedov 				    (void *)s.so_pcb);
14780daf62d9SStanislav Sedov 			} else if (unpcb.unp_conn) {
14790daf62d9SStanislav Sedov 				sock->so_rcv_sb_state = s.so_rcv.sb_state;
14800daf62d9SStanislav Sedov 				sock->so_snd_sb_state = s.so_snd.sb_state;
14810daf62d9SStanislav Sedov 				sock->unp_conn = (uintptr_t)unpcb.unp_conn;
14820daf62d9SStanislav Sedov 			}
14830daf62d9SStanislav Sedov 		}
14840daf62d9SStanislav Sedov 		break;
14850daf62d9SStanislav Sedov 	default:
14860daf62d9SStanislav Sedov 		break;
14870daf62d9SStanislav Sedov 	}
14880daf62d9SStanislav Sedov 	return (0);
14890daf62d9SStanislav Sedov 
14900daf62d9SStanislav Sedov fail:
14910daf62d9SStanislav Sedov 	snprintf(errbuf, _POSIX2_LINE_MAX, "error");
14920daf62d9SStanislav Sedov 	return (1);
14930daf62d9SStanislav Sedov }
14940daf62d9SStanislav Sedov 
14950daf62d9SStanislav Sedov static int
14960daf62d9SStanislav Sedov procstat_get_socket_info_sysctl(struct filestat *fst, struct sockstat *sock,
14970daf62d9SStanislav Sedov     char *errbuf __unused)
14980daf62d9SStanislav Sedov {
14990daf62d9SStanislav Sedov 	struct kinfo_file *kif;
15000daf62d9SStanislav Sedov 
15010daf62d9SStanislav Sedov 	assert(sock);
15020daf62d9SStanislav Sedov 	assert(fst);
15030daf62d9SStanislav Sedov 	bzero(sock, sizeof(*sock));
15040daf62d9SStanislav Sedov 	kif = fst->fs_typedep;
15050daf62d9SStanislav Sedov 	if (kif == NULL)
15060daf62d9SStanislav Sedov 		return (0);
15070daf62d9SStanislav Sedov 
15080daf62d9SStanislav Sedov 	/*
15090daf62d9SStanislav Sedov 	 * Fill in known data.
15100daf62d9SStanislav Sedov 	 */
15110daf62d9SStanislav Sedov 	sock->type = kif->kf_sock_type;
15120daf62d9SStanislav Sedov 	sock->proto = kif->kf_sock_protocol;
15130daf62d9SStanislav Sedov 	sock->dom_family = kif->kf_sock_domain;
15140daf62d9SStanislav Sedov 	sock->so_pcb = kif->kf_un.kf_sock.kf_sock_pcb;
15150daf62d9SStanislav Sedov 	strlcpy(sock->dname, kif->kf_path, sizeof(sock->dname));
15160daf62d9SStanislav Sedov 	bcopy(&kif->kf_sa_local, &sock->sa_local, kif->kf_sa_local.ss_len);
15170daf62d9SStanislav Sedov 	bcopy(&kif->kf_sa_peer, &sock->sa_peer, kif->kf_sa_peer.ss_len);
15180daf62d9SStanislav Sedov 
15190daf62d9SStanislav Sedov 	/*
15200daf62d9SStanislav Sedov 	 * Protocol specific data.
15210daf62d9SStanislav Sedov 	 */
15220daf62d9SStanislav Sedov 	switch(sock->dom_family) {
15230daf62d9SStanislav Sedov 	case AF_INET:
15240daf62d9SStanislav Sedov 	case AF_INET6:
15250daf62d9SStanislav Sedov 		if (sock->proto == IPPROTO_TCP)
15260daf62d9SStanislav Sedov 			sock->inp_ppcb = kif->kf_un.kf_sock.kf_sock_inpcb;
15270daf62d9SStanislav Sedov 		break;
15280daf62d9SStanislav Sedov 	case AF_UNIX:
15290daf62d9SStanislav Sedov 		if (kif->kf_un.kf_sock.kf_sock_unpconn != 0) {
15300daf62d9SStanislav Sedov 				sock->so_rcv_sb_state =
15310daf62d9SStanislav Sedov 				    kif->kf_un.kf_sock.kf_sock_rcv_sb_state;
15320daf62d9SStanislav Sedov 				sock->so_snd_sb_state =
15330daf62d9SStanislav Sedov 				    kif->kf_un.kf_sock.kf_sock_snd_sb_state;
15340daf62d9SStanislav Sedov 				sock->unp_conn =
15350daf62d9SStanislav Sedov 				    kif->kf_un.kf_sock.kf_sock_unpconn;
15360daf62d9SStanislav Sedov 		}
15370daf62d9SStanislav Sedov 		break;
15380daf62d9SStanislav Sedov 	default:
15390daf62d9SStanislav Sedov 		break;
15400daf62d9SStanislav Sedov 	}
15410daf62d9SStanislav Sedov 	return (0);
15420daf62d9SStanislav Sedov }
15430daf62d9SStanislav Sedov 
15440daf62d9SStanislav Sedov /*
15450daf62d9SStanislav Sedov  * Descriptor flags to filestat translation.
15460daf62d9SStanislav Sedov  */
15470daf62d9SStanislav Sedov static int
15480daf62d9SStanislav Sedov to_filestat_flags(int flags)
15490daf62d9SStanislav Sedov {
15500daf62d9SStanislav Sedov 	static struct {
15510daf62d9SStanislav Sedov 		int flag;
15520daf62d9SStanislav Sedov 		int fst_flag;
15530daf62d9SStanislav Sedov 	} fstflags[] = {
15540daf62d9SStanislav Sedov 		{ FREAD, PS_FST_FFLAG_READ },
15550daf62d9SStanislav Sedov 		{ FWRITE, PS_FST_FFLAG_WRITE },
15560daf62d9SStanislav Sedov 		{ O_APPEND, PS_FST_FFLAG_APPEND },
15570daf62d9SStanislav Sedov 		{ O_ASYNC, PS_FST_FFLAG_ASYNC },
15580daf62d9SStanislav Sedov 		{ O_CREAT, PS_FST_FFLAG_CREAT },
15590daf62d9SStanislav Sedov 		{ O_DIRECT, PS_FST_FFLAG_DIRECT },
15600daf62d9SStanislav Sedov 		{ O_EXCL, PS_FST_FFLAG_EXCL },
15610daf62d9SStanislav Sedov 		{ O_EXEC, PS_FST_FFLAG_EXEC },
15620daf62d9SStanislav Sedov 		{ O_EXLOCK, PS_FST_FFLAG_EXLOCK },
15630daf62d9SStanislav Sedov 		{ O_NOFOLLOW, PS_FST_FFLAG_NOFOLLOW },
15640daf62d9SStanislav Sedov 		{ O_NONBLOCK, PS_FST_FFLAG_NONBLOCK },
15650daf62d9SStanislav Sedov 		{ O_SHLOCK, PS_FST_FFLAG_SHLOCK },
15660daf62d9SStanislav Sedov 		{ O_SYNC, PS_FST_FFLAG_SYNC },
15670daf62d9SStanislav Sedov 		{ O_TRUNC, PS_FST_FFLAG_TRUNC }
15680daf62d9SStanislav Sedov 	};
15690daf62d9SStanislav Sedov #define NFSTFLAGS	(sizeof(fstflags) / sizeof(*fstflags))
15700daf62d9SStanislav Sedov 	int fst_flags;
15710daf62d9SStanislav Sedov 	unsigned int i;
15720daf62d9SStanislav Sedov 
15730daf62d9SStanislav Sedov 	fst_flags = 0;
15740daf62d9SStanislav Sedov 	for (i = 0; i < NFSTFLAGS; i++)
15750daf62d9SStanislav Sedov 		if (flags & fstflags[i].flag)
15760daf62d9SStanislav Sedov 			fst_flags |= fstflags[i].fst_flag;
15770daf62d9SStanislav Sedov 	return (fst_flags);
15780daf62d9SStanislav Sedov }
15790daf62d9SStanislav Sedov 
15800daf62d9SStanislav Sedov /*
15810daf62d9SStanislav Sedov  * Vnode type to filestate translation.
15820daf62d9SStanislav Sedov  */
15830daf62d9SStanislav Sedov static int
15840daf62d9SStanislav Sedov vntype2psfsttype(int type)
15850daf62d9SStanislav Sedov {
15860daf62d9SStanislav Sedov 	static struct {
15870daf62d9SStanislav Sedov 		int	vtype;
15880daf62d9SStanislav Sedov 		int	fst_vtype;
15890daf62d9SStanislav Sedov 	} vt2fst[] = {
15900daf62d9SStanislav Sedov 		{ VBAD, PS_FST_VTYPE_VBAD },
15910daf62d9SStanislav Sedov 		{ VBLK, PS_FST_VTYPE_VBLK },
15920daf62d9SStanislav Sedov 		{ VCHR, PS_FST_VTYPE_VCHR },
15930daf62d9SStanislav Sedov 		{ VDIR, PS_FST_VTYPE_VDIR },
15940daf62d9SStanislav Sedov 		{ VFIFO, PS_FST_VTYPE_VFIFO },
15950daf62d9SStanislav Sedov 		{ VLNK, PS_FST_VTYPE_VLNK },
15960daf62d9SStanislav Sedov 		{ VNON, PS_FST_VTYPE_VNON },
15970daf62d9SStanislav Sedov 		{ VREG, PS_FST_VTYPE_VREG },
15980daf62d9SStanislav Sedov 		{ VSOCK, PS_FST_VTYPE_VSOCK }
15990daf62d9SStanislav Sedov 	};
16000daf62d9SStanislav Sedov #define	NVFTYPES	(sizeof(vt2fst) / sizeof(*vt2fst))
16010daf62d9SStanislav Sedov 	unsigned int i, fst_type;
16020daf62d9SStanislav Sedov 
16030daf62d9SStanislav Sedov 	fst_type = PS_FST_VTYPE_UNKNOWN;
16040daf62d9SStanislav Sedov 	for (i = 0; i < NVFTYPES; i++) {
16050daf62d9SStanislav Sedov 		if (type == vt2fst[i].vtype) {
16060daf62d9SStanislav Sedov 			fst_type = vt2fst[i].fst_vtype;
16070daf62d9SStanislav Sedov 			break;
16080daf62d9SStanislav Sedov 		}
16090daf62d9SStanislav Sedov 	}
16100daf62d9SStanislav Sedov 	return (fst_type);
16110daf62d9SStanislav Sedov }
16120daf62d9SStanislav Sedov 
16130daf62d9SStanislav Sedov static char *
16140daf62d9SStanislav Sedov getmnton(kvm_t *kd, struct mount *m)
16150daf62d9SStanislav Sedov {
16165f301949SBen Laurie 	struct mount mnt;
16170daf62d9SStanislav Sedov 	static struct mtab {
16180daf62d9SStanislav Sedov 		struct mtab *next;
16190daf62d9SStanislav Sedov 		struct mount *m;
16200daf62d9SStanislav Sedov 		char mntonname[MNAMELEN + 1];
16210daf62d9SStanislav Sedov 	} *mhead = NULL;
16220daf62d9SStanislav Sedov 	struct mtab *mt;
16230daf62d9SStanislav Sedov 
16240daf62d9SStanislav Sedov 	for (mt = mhead; mt != NULL; mt = mt->next)
16250daf62d9SStanislav Sedov 		if (m == mt->m)
16260daf62d9SStanislav Sedov 			return (mt->mntonname);
16270daf62d9SStanislav Sedov 	if (!kvm_read_all(kd, (unsigned long)m, &mnt, sizeof(struct mount))) {
16280daf62d9SStanislav Sedov 		warnx("can't read mount table at %p", (void *)m);
16290daf62d9SStanislav Sedov 		return (NULL);
16300daf62d9SStanislav Sedov 	}
16310daf62d9SStanislav Sedov 	if ((mt = malloc(sizeof (struct mtab))) == NULL)
16320daf62d9SStanislav Sedov 		err(1, NULL);
16330daf62d9SStanislav Sedov 	mt->m = m;
16340daf62d9SStanislav Sedov 	bcopy(&mnt.mnt_stat.f_mntonname[0], &mt->mntonname[0], MNAMELEN);
16355f301949SBen Laurie 	mt->mntonname[MNAMELEN] = '\0';
16360daf62d9SStanislav Sedov 	mt->next = mhead;
16370daf62d9SStanislav Sedov 	mhead = mt;
16380daf62d9SStanislav Sedov 	return (mt->mntonname);
16390daf62d9SStanislav Sedov }
16407153ad2bSMikolaj Golub 
16414482b5e3SMikolaj Golub /*
16424482b5e3SMikolaj Golub  * Auxiliary structures and functions to get process environment or
16434482b5e3SMikolaj Golub  * command line arguments.
16444482b5e3SMikolaj Golub  */
16454482b5e3SMikolaj Golub struct argvec {
16464482b5e3SMikolaj Golub 	char	*buf;
16474482b5e3SMikolaj Golub 	size_t	bufsize;
16484482b5e3SMikolaj Golub 	char	**argv;
16494482b5e3SMikolaj Golub 	size_t	argc;
16504482b5e3SMikolaj Golub };
16514482b5e3SMikolaj Golub 
16524482b5e3SMikolaj Golub static struct argvec *
16534482b5e3SMikolaj Golub argvec_alloc(size_t bufsize)
16544482b5e3SMikolaj Golub {
16554482b5e3SMikolaj Golub 	struct argvec *av;
16564482b5e3SMikolaj Golub 
16574482b5e3SMikolaj Golub 	av = malloc(sizeof(*av));
16584482b5e3SMikolaj Golub 	if (av == NULL)
16594482b5e3SMikolaj Golub 		return (NULL);
16604482b5e3SMikolaj Golub 	av->bufsize = bufsize;
16614482b5e3SMikolaj Golub 	av->buf = malloc(av->bufsize);
16624482b5e3SMikolaj Golub 	if (av->buf == NULL) {
16634482b5e3SMikolaj Golub 		free(av);
16644482b5e3SMikolaj Golub 		return (NULL);
16654482b5e3SMikolaj Golub 	}
16664482b5e3SMikolaj Golub 	av->argc = 32;
16674482b5e3SMikolaj Golub 	av->argv = malloc(sizeof(char *) * av->argc);
16684482b5e3SMikolaj Golub 	if (av->argv == NULL) {
16694482b5e3SMikolaj Golub 		free(av->buf);
16704482b5e3SMikolaj Golub 		free(av);
16714482b5e3SMikolaj Golub 		return (NULL);
16724482b5e3SMikolaj Golub 	}
16734482b5e3SMikolaj Golub 	return av;
16744482b5e3SMikolaj Golub }
16754482b5e3SMikolaj Golub 
16764482b5e3SMikolaj Golub static void
16774482b5e3SMikolaj Golub argvec_free(struct argvec * av)
16784482b5e3SMikolaj Golub {
16794482b5e3SMikolaj Golub 
16804482b5e3SMikolaj Golub 	free(av->argv);
16814482b5e3SMikolaj Golub 	free(av->buf);
16824482b5e3SMikolaj Golub 	free(av);
16834482b5e3SMikolaj Golub }
16844482b5e3SMikolaj Golub 
16854482b5e3SMikolaj Golub static char **
16864482b5e3SMikolaj Golub getargv(struct procstat *procstat, struct kinfo_proc *kp, size_t nchr, int env)
16874482b5e3SMikolaj Golub {
16884482b5e3SMikolaj Golub 	int error, name[4], argc, i;
16894482b5e3SMikolaj Golub 	struct argvec *av, **avp;
16904482b5e3SMikolaj Golub 	enum psc_type type;
16914482b5e3SMikolaj Golub 	size_t len;
16924482b5e3SMikolaj Golub 	char *p, **argv;
16934482b5e3SMikolaj Golub 
16944482b5e3SMikolaj Golub 	assert(procstat);
16954482b5e3SMikolaj Golub 	assert(kp);
16964482b5e3SMikolaj Golub 	if (procstat->type == PROCSTAT_KVM) {
16974482b5e3SMikolaj Golub 		warnx("can't use kvm access method");
16984482b5e3SMikolaj Golub 		return (NULL);
16994482b5e3SMikolaj Golub 	}
17004482b5e3SMikolaj Golub 	if (procstat->type != PROCSTAT_SYSCTL &&
17014482b5e3SMikolaj Golub 	    procstat->type != PROCSTAT_CORE) {
17024482b5e3SMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
17034482b5e3SMikolaj Golub 		return (NULL);
17044482b5e3SMikolaj Golub 	}
17054482b5e3SMikolaj Golub 
17064482b5e3SMikolaj Golub 	if (nchr == 0 || nchr > ARG_MAX)
17074482b5e3SMikolaj Golub 		nchr = ARG_MAX;
17084482b5e3SMikolaj Golub 
17094482b5e3SMikolaj Golub 	avp = (struct argvec **)(env ? &procstat->argv : &procstat->envv);
17104482b5e3SMikolaj Golub 	av = *avp;
17114482b5e3SMikolaj Golub 
17124482b5e3SMikolaj Golub 	if (av == NULL)
17134482b5e3SMikolaj Golub 	{
17144482b5e3SMikolaj Golub 		av = argvec_alloc(nchr);
17154482b5e3SMikolaj Golub 		if (av == NULL)
17164482b5e3SMikolaj Golub 		{
17174482b5e3SMikolaj Golub 			warn("malloc(%zu)", nchr);
17184482b5e3SMikolaj Golub 			return (NULL);
17194482b5e3SMikolaj Golub 		}
17204482b5e3SMikolaj Golub 		*avp = av;
17214482b5e3SMikolaj Golub 	} else if (av->bufsize < nchr) {
17224482b5e3SMikolaj Golub 		av->buf = reallocf(av->buf, nchr);
17234482b5e3SMikolaj Golub 		if (av->buf == NULL) {
17244482b5e3SMikolaj Golub 			warn("malloc(%zu)", nchr);
17254482b5e3SMikolaj Golub 			return (NULL);
17264482b5e3SMikolaj Golub 		}
17274482b5e3SMikolaj Golub 	}
17284482b5e3SMikolaj Golub 	if (procstat->type == PROCSTAT_SYSCTL) {
17294482b5e3SMikolaj Golub 		name[0] = CTL_KERN;
17304482b5e3SMikolaj Golub 		name[1] = KERN_PROC;
17314482b5e3SMikolaj Golub 		name[2] = env ? KERN_PROC_ENV : KERN_PROC_ARGS;
17324482b5e3SMikolaj Golub 		name[3] = kp->ki_pid;
17334482b5e3SMikolaj Golub 		len = nchr;
17344482b5e3SMikolaj Golub 		error = sysctl(name, 4, av->buf, &len, NULL, 0);
17354482b5e3SMikolaj Golub 		if (error != 0 && errno != ESRCH && errno != EPERM)
17364482b5e3SMikolaj Golub 			warn("sysctl(kern.proc.%s)", env ? "env" : "args");
17374482b5e3SMikolaj Golub 		if (error != 0 || len == 0)
17384482b5e3SMikolaj Golub 			return (NULL);
17394482b5e3SMikolaj Golub 	} else /* procstat->type == PROCSTAT_CORE */ {
17404482b5e3SMikolaj Golub 		type = env ? PSC_TYPE_ENVV : PSC_TYPE_ARGV;
17414482b5e3SMikolaj Golub 		len = nchr;
17424482b5e3SMikolaj Golub 		if (procstat_core_get(procstat->core, type, av->buf, &len)
17434482b5e3SMikolaj Golub 		    == NULL) {
17444482b5e3SMikolaj Golub 			return (NULL);
17454482b5e3SMikolaj Golub 		}
17464482b5e3SMikolaj Golub 	}
17474482b5e3SMikolaj Golub 
17484482b5e3SMikolaj Golub 	argv = av->argv;
17494482b5e3SMikolaj Golub 	argc = av->argc;
17504482b5e3SMikolaj Golub 	i = 0;
17514482b5e3SMikolaj Golub 	for (p = av->buf; p < av->buf + len; p += strlen(p) + 1) {
17524482b5e3SMikolaj Golub 		argv[i++] = p;
17534482b5e3SMikolaj Golub 		if (i < argc)
17544482b5e3SMikolaj Golub 			continue;
17554482b5e3SMikolaj Golub 		/* Grow argv. */
17564482b5e3SMikolaj Golub 		argc += argc;
17574482b5e3SMikolaj Golub 		argv = realloc(argv, sizeof(char *) * argc);
17584482b5e3SMikolaj Golub 		if (argv == NULL) {
17594482b5e3SMikolaj Golub 			warn("malloc(%zu)", sizeof(char *) * argc);
17604482b5e3SMikolaj Golub 			return (NULL);
17614482b5e3SMikolaj Golub 		}
17624482b5e3SMikolaj Golub 		av->argv = argv;
17634482b5e3SMikolaj Golub 		av->argc = argc;
17644482b5e3SMikolaj Golub 	}
17654482b5e3SMikolaj Golub 	argv[i] = NULL;
17664482b5e3SMikolaj Golub 
17674482b5e3SMikolaj Golub 	return (argv);
17684482b5e3SMikolaj Golub }
17694482b5e3SMikolaj Golub 
17704482b5e3SMikolaj Golub /*
17714482b5e3SMikolaj Golub  * Return process command line arguments.
17724482b5e3SMikolaj Golub  */
17734482b5e3SMikolaj Golub char **
17744482b5e3SMikolaj Golub procstat_getargv(struct procstat *procstat, struct kinfo_proc *p, size_t nchr)
17754482b5e3SMikolaj Golub {
17764482b5e3SMikolaj Golub 
17774482b5e3SMikolaj Golub 	return (getargv(procstat, p, nchr, 0));
17784482b5e3SMikolaj Golub }
17794482b5e3SMikolaj Golub 
17804482b5e3SMikolaj Golub /*
17814482b5e3SMikolaj Golub  * Free the buffer allocated by procstat_getargv().
17824482b5e3SMikolaj Golub  */
17834482b5e3SMikolaj Golub void
17844482b5e3SMikolaj Golub procstat_freeargv(struct procstat *procstat)
17854482b5e3SMikolaj Golub {
17864482b5e3SMikolaj Golub 
17874482b5e3SMikolaj Golub 	if (procstat->argv != NULL) {
17884482b5e3SMikolaj Golub 		argvec_free(procstat->argv);
17894482b5e3SMikolaj Golub 		procstat->argv = NULL;
17904482b5e3SMikolaj Golub 	}
17914482b5e3SMikolaj Golub }
17924482b5e3SMikolaj Golub 
17934482b5e3SMikolaj Golub /*
17944482b5e3SMikolaj Golub  * Return process environment.
17954482b5e3SMikolaj Golub  */
17964482b5e3SMikolaj Golub char **
17974482b5e3SMikolaj Golub procstat_getenvv(struct procstat *procstat, struct kinfo_proc *p, size_t nchr)
17984482b5e3SMikolaj Golub {
17994482b5e3SMikolaj Golub 
18004482b5e3SMikolaj Golub 	return (getargv(procstat, p, nchr, 1));
18014482b5e3SMikolaj Golub }
18024482b5e3SMikolaj Golub 
18034482b5e3SMikolaj Golub /*
18044482b5e3SMikolaj Golub  * Free the buffer allocated by procstat_getenvv().
18054482b5e3SMikolaj Golub  */
18064482b5e3SMikolaj Golub void
18074482b5e3SMikolaj Golub procstat_freeenvv(struct procstat *procstat)
18084482b5e3SMikolaj Golub {
18094482b5e3SMikolaj Golub 	if (procstat->envv != NULL) {
18104482b5e3SMikolaj Golub 		argvec_free(procstat->envv);
18114482b5e3SMikolaj Golub 		procstat->envv = NULL;
18124482b5e3SMikolaj Golub 	}
18134482b5e3SMikolaj Golub }
18144482b5e3SMikolaj Golub 
181539680c7bSMikolaj Golub static struct kinfo_vmentry *
181639680c7bSMikolaj Golub kinfo_getvmmap_core(struct procstat_core *core, int *cntp)
181739680c7bSMikolaj Golub {
181839680c7bSMikolaj Golub 	int cnt;
181939680c7bSMikolaj Golub 	size_t len;
182039680c7bSMikolaj Golub 	char *buf, *bp, *eb;
182139680c7bSMikolaj Golub 	struct kinfo_vmentry *kiv, *kp, *kv;
182239680c7bSMikolaj Golub 
182339680c7bSMikolaj Golub 	buf = procstat_core_get(core, PSC_TYPE_VMMAP, NULL, &len);
182439680c7bSMikolaj Golub 	if (buf == NULL)
182539680c7bSMikolaj Golub 		return (NULL);
182639680c7bSMikolaj Golub 
182739680c7bSMikolaj Golub 	/*
182839680c7bSMikolaj Golub 	 * XXXMG: The code below is just copy&past from libutil.
182939680c7bSMikolaj Golub 	 * The code duplication can be avoided if libutil
183039680c7bSMikolaj Golub 	 * is extended to provide something like:
183139680c7bSMikolaj Golub 	 *   struct kinfo_vmentry *kinfo_getvmmap_from_buf(const char *buf,
183239680c7bSMikolaj Golub 	 *       size_t len, int *cntp);
183339680c7bSMikolaj Golub 	 */
183439680c7bSMikolaj Golub 
183539680c7bSMikolaj Golub 	/* Pass 1: count items */
183639680c7bSMikolaj Golub 	cnt = 0;
183739680c7bSMikolaj Golub 	bp = buf;
183839680c7bSMikolaj Golub 	eb = buf + len;
183939680c7bSMikolaj Golub 	while (bp < eb) {
184039680c7bSMikolaj Golub 		kv = (struct kinfo_vmentry *)(uintptr_t)bp;
184139680c7bSMikolaj Golub 		bp += kv->kve_structsize;
184239680c7bSMikolaj Golub 		cnt++;
184339680c7bSMikolaj Golub 	}
184439680c7bSMikolaj Golub 
184539680c7bSMikolaj Golub 	kiv = calloc(cnt, sizeof(*kiv));
184639680c7bSMikolaj Golub 	if (kiv == NULL) {
184739680c7bSMikolaj Golub 		free(buf);
184839680c7bSMikolaj Golub 		return (NULL);
184939680c7bSMikolaj Golub 	}
185039680c7bSMikolaj Golub 	bp = buf;
185139680c7bSMikolaj Golub 	eb = buf + len;
185239680c7bSMikolaj Golub 	kp = kiv;
185339680c7bSMikolaj Golub 	/* Pass 2: unpack */
185439680c7bSMikolaj Golub 	while (bp < eb) {
185539680c7bSMikolaj Golub 		kv = (struct kinfo_vmentry *)(uintptr_t)bp;
185639680c7bSMikolaj Golub 		/* Copy/expand into pre-zeroed buffer */
185739680c7bSMikolaj Golub 		memcpy(kp, kv, kv->kve_structsize);
185839680c7bSMikolaj Golub 		/* Advance to next packed record */
185939680c7bSMikolaj Golub 		bp += kv->kve_structsize;
186039680c7bSMikolaj Golub 		/* Set field size to fixed length, advance */
186139680c7bSMikolaj Golub 		kp->kve_structsize = sizeof(*kp);
186239680c7bSMikolaj Golub 		kp++;
186339680c7bSMikolaj Golub 	}
186439680c7bSMikolaj Golub 	free(buf);
186539680c7bSMikolaj Golub 	*cntp = cnt;
186639680c7bSMikolaj Golub 	return (kiv);	/* Caller must free() return value */
186739680c7bSMikolaj Golub }
186839680c7bSMikolaj Golub 
186939680c7bSMikolaj Golub struct kinfo_vmentry *
187039680c7bSMikolaj Golub procstat_getvmmap(struct procstat *procstat, struct kinfo_proc *kp,
187139680c7bSMikolaj Golub     unsigned int *cntp)
187239680c7bSMikolaj Golub {
187389358231SMikolaj Golub 
187439680c7bSMikolaj Golub 	switch(procstat->type) {
187539680c7bSMikolaj Golub 	case PROCSTAT_KVM:
187639680c7bSMikolaj Golub 		warnx("kvm method is not supported");
187739680c7bSMikolaj Golub 		return (NULL);
187839680c7bSMikolaj Golub 	case PROCSTAT_SYSCTL:
187939680c7bSMikolaj Golub 		return (kinfo_getvmmap(kp->ki_pid, cntp));
188039680c7bSMikolaj Golub 	case PROCSTAT_CORE:
188139680c7bSMikolaj Golub 		return (kinfo_getvmmap_core(procstat->core, cntp));
188239680c7bSMikolaj Golub 	default:
188339680c7bSMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
188439680c7bSMikolaj Golub 		return (NULL);
188539680c7bSMikolaj Golub 	}
188639680c7bSMikolaj Golub }
188739680c7bSMikolaj Golub 
188839680c7bSMikolaj Golub void
188939680c7bSMikolaj Golub procstat_freevmmap(struct procstat *procstat __unused,
189039680c7bSMikolaj Golub     struct kinfo_vmentry *vmmap)
189139680c7bSMikolaj Golub {
189239680c7bSMikolaj Golub 
189339680c7bSMikolaj Golub 	free(vmmap);
189439680c7bSMikolaj Golub }
18957f1d14e6SMikolaj Golub 
18967f1d14e6SMikolaj Golub static gid_t *
18971f84c47eSMikolaj Golub procstat_getgroups_kvm(kvm_t *kd, struct kinfo_proc *kp, unsigned int *cntp)
18981f84c47eSMikolaj Golub {
18991f84c47eSMikolaj Golub 	struct proc proc;
19001f84c47eSMikolaj Golub 	struct ucred ucred;
19011f84c47eSMikolaj Golub 	gid_t *groups;
19021f84c47eSMikolaj Golub 	size_t len;
19031f84c47eSMikolaj Golub 
19041f84c47eSMikolaj Golub 	assert(kd != NULL);
19051f84c47eSMikolaj Golub 	assert(kp != NULL);
19061f84c47eSMikolaj Golub 	if (!kvm_read_all(kd, (unsigned long)kp->ki_paddr, &proc,
19071f84c47eSMikolaj Golub 	    sizeof(proc))) {
19081f84c47eSMikolaj Golub 		warnx("can't read proc struct at %p for pid %d",
19091f84c47eSMikolaj Golub 		    kp->ki_paddr, kp->ki_pid);
19101f84c47eSMikolaj Golub 		return (NULL);
19111f84c47eSMikolaj Golub 	}
19121f84c47eSMikolaj Golub 	if (proc.p_ucred == NOCRED)
19131f84c47eSMikolaj Golub 		return (NULL);
19141f84c47eSMikolaj Golub 	if (!kvm_read_all(kd, (unsigned long)proc.p_ucred, &ucred,
19151f84c47eSMikolaj Golub 	    sizeof(ucred))) {
19161f84c47eSMikolaj Golub 		warnx("can't read ucred struct at %p for pid %d",
19171f84c47eSMikolaj Golub 		    proc.p_ucred, kp->ki_pid);
19181f84c47eSMikolaj Golub 		return (NULL);
19191f84c47eSMikolaj Golub 	}
19201f84c47eSMikolaj Golub 	len = ucred.cr_ngroups * sizeof(gid_t);
19211f84c47eSMikolaj Golub 	groups = malloc(len);
19221f84c47eSMikolaj Golub 	if (groups == NULL) {
19231f84c47eSMikolaj Golub 		warn("malloc(%zu)", len);
19241f84c47eSMikolaj Golub 		return (NULL);
19251f84c47eSMikolaj Golub 	}
19261f84c47eSMikolaj Golub 	if (!kvm_read_all(kd, (unsigned long)ucred.cr_groups, groups, len)) {
19271f84c47eSMikolaj Golub 		warnx("can't read groups at %p for pid %d",
19281f84c47eSMikolaj Golub 		    ucred.cr_groups, kp->ki_pid);
19291f84c47eSMikolaj Golub 		free(groups);
19301f84c47eSMikolaj Golub 		return (NULL);
19311f84c47eSMikolaj Golub 	}
19321f84c47eSMikolaj Golub 	*cntp = ucred.cr_ngroups;
19331f84c47eSMikolaj Golub 	return (groups);
19341f84c47eSMikolaj Golub }
19351f84c47eSMikolaj Golub 
19361f84c47eSMikolaj Golub static gid_t *
19377f1d14e6SMikolaj Golub procstat_getgroups_sysctl(pid_t pid, unsigned int *cntp)
19387f1d14e6SMikolaj Golub {
19397f1d14e6SMikolaj Golub 	int mib[4];
19407f1d14e6SMikolaj Golub 	size_t len;
19417f1d14e6SMikolaj Golub 	gid_t *groups;
19427f1d14e6SMikolaj Golub 
19437f1d14e6SMikolaj Golub 	mib[0] = CTL_KERN;
19447f1d14e6SMikolaj Golub 	mib[1] = KERN_PROC;
19457f1d14e6SMikolaj Golub 	mib[2] = KERN_PROC_GROUPS;
19467f1d14e6SMikolaj Golub 	mib[3] = pid;
19477f1d14e6SMikolaj Golub 	len = (sysconf(_SC_NGROUPS_MAX) + 1) * sizeof(gid_t);
19487f1d14e6SMikolaj Golub 	groups = malloc(len);
19497f1d14e6SMikolaj Golub 	if (groups == NULL) {
19507f1d14e6SMikolaj Golub 		warn("malloc(%zu)", len);
19517f1d14e6SMikolaj Golub 		return (NULL);
19527f1d14e6SMikolaj Golub 	}
19537f1d14e6SMikolaj Golub 	if (sysctl(mib, 4, groups, &len, NULL, 0) == -1) {
19547f1d14e6SMikolaj Golub 		warn("sysctl: kern.proc.groups: %d", pid);
19557f1d14e6SMikolaj Golub 		free(groups);
19567f1d14e6SMikolaj Golub 		return (NULL);
19577f1d14e6SMikolaj Golub 	}
19587f1d14e6SMikolaj Golub 	*cntp = len / sizeof(gid_t);
19597f1d14e6SMikolaj Golub 	return (groups);
19607f1d14e6SMikolaj Golub }
19617f1d14e6SMikolaj Golub 
19627f1d14e6SMikolaj Golub static gid_t *
19637f1d14e6SMikolaj Golub procstat_getgroups_core(struct procstat_core *core, unsigned int *cntp)
19647f1d14e6SMikolaj Golub {
19657f1d14e6SMikolaj Golub 	size_t len;
19667f1d14e6SMikolaj Golub 	gid_t *groups;
19677f1d14e6SMikolaj Golub 
19687f1d14e6SMikolaj Golub 	groups = procstat_core_get(core, PSC_TYPE_GROUPS, NULL, &len);
19697f1d14e6SMikolaj Golub 	if (groups == NULL)
19707f1d14e6SMikolaj Golub 		return (NULL);
19717f1d14e6SMikolaj Golub 	*cntp = len / sizeof(gid_t);
19727f1d14e6SMikolaj Golub 	return (groups);
19737f1d14e6SMikolaj Golub }
19747f1d14e6SMikolaj Golub 
19757f1d14e6SMikolaj Golub gid_t *
19767f1d14e6SMikolaj Golub procstat_getgroups(struct procstat *procstat, struct kinfo_proc *kp,
19777f1d14e6SMikolaj Golub     unsigned int *cntp)
19787f1d14e6SMikolaj Golub {
19797f1d14e6SMikolaj Golub 	switch(procstat->type) {
19807f1d14e6SMikolaj Golub 	case PROCSTAT_KVM:
19811f84c47eSMikolaj Golub 		return (procstat_getgroups_kvm(procstat->kd, kp, cntp));
19827f1d14e6SMikolaj Golub 	case PROCSTAT_SYSCTL:
19837f1d14e6SMikolaj Golub 		return (procstat_getgroups_sysctl(kp->ki_pid, cntp));
19847f1d14e6SMikolaj Golub 	case PROCSTAT_CORE:
19857f1d14e6SMikolaj Golub 		return (procstat_getgroups_core(procstat->core, cntp));
19867f1d14e6SMikolaj Golub 	default:
19877f1d14e6SMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
19887f1d14e6SMikolaj Golub 		return (NULL);
19897f1d14e6SMikolaj Golub 	}
19907f1d14e6SMikolaj Golub }
19917f1d14e6SMikolaj Golub 
19927f1d14e6SMikolaj Golub void
19937f1d14e6SMikolaj Golub procstat_freegroups(struct procstat *procstat __unused, gid_t *groups)
19947f1d14e6SMikolaj Golub {
19957f1d14e6SMikolaj Golub 
19967f1d14e6SMikolaj Golub 	free(groups);
19977f1d14e6SMikolaj Golub }
19985b9bcba9SMikolaj Golub 
19995b9bcba9SMikolaj Golub static int
20001f84c47eSMikolaj Golub procstat_getumask_kvm(kvm_t *kd, struct kinfo_proc *kp, unsigned short *maskp)
20011f84c47eSMikolaj Golub {
20021f84c47eSMikolaj Golub 	struct filedesc fd;
20031f84c47eSMikolaj Golub 
20041f84c47eSMikolaj Golub 	assert(kd != NULL);
20051f84c47eSMikolaj Golub 	assert(kp != NULL);
20061f84c47eSMikolaj Golub 	if (kp->ki_fd == NULL)
20071f84c47eSMikolaj Golub 		return (-1);
20081f84c47eSMikolaj Golub 	if (!kvm_read_all(kd, (unsigned long)kp->ki_fd, &fd, sizeof(fd))) {
20091f84c47eSMikolaj Golub 		warnx("can't read filedesc at %p for pid %d", kp->ki_fd,
20101f84c47eSMikolaj Golub 		    kp->ki_pid);
20111f84c47eSMikolaj Golub 		return (-1);
20121f84c47eSMikolaj Golub 	}
20131f84c47eSMikolaj Golub 	*maskp = fd.fd_cmask;
20141f84c47eSMikolaj Golub 	return (0);
20151f84c47eSMikolaj Golub }
20161f84c47eSMikolaj Golub 
20171f84c47eSMikolaj Golub static int
20185b9bcba9SMikolaj Golub procstat_getumask_sysctl(pid_t pid, unsigned short *maskp)
20195b9bcba9SMikolaj Golub {
20205b9bcba9SMikolaj Golub 	int error;
20215b9bcba9SMikolaj Golub 	int mib[4];
20225b9bcba9SMikolaj Golub 	size_t len;
20235b9bcba9SMikolaj Golub 
20245b9bcba9SMikolaj Golub 	mib[0] = CTL_KERN;
20255b9bcba9SMikolaj Golub 	mib[1] = KERN_PROC;
20265b9bcba9SMikolaj Golub 	mib[2] = KERN_PROC_UMASK;
20275b9bcba9SMikolaj Golub 	mib[3] = pid;
20285b9bcba9SMikolaj Golub 	len = sizeof(*maskp);
20295b9bcba9SMikolaj Golub 	error = sysctl(mib, 4, maskp, &len, NULL, 0);
20305b9bcba9SMikolaj Golub 	if (error != 0 && errno != ESRCH)
20315b9bcba9SMikolaj Golub 		warn("sysctl: kern.proc.umask: %d", pid);
20325b9bcba9SMikolaj Golub 	return (error);
20335b9bcba9SMikolaj Golub }
20345b9bcba9SMikolaj Golub 
20355b9bcba9SMikolaj Golub static int
20365b9bcba9SMikolaj Golub procstat_getumask_core(struct procstat_core *core, unsigned short *maskp)
20375b9bcba9SMikolaj Golub {
20385b9bcba9SMikolaj Golub 	size_t len;
20395b9bcba9SMikolaj Golub 	unsigned short *buf;
20405b9bcba9SMikolaj Golub 
20415b9bcba9SMikolaj Golub 	buf = procstat_core_get(core, PSC_TYPE_UMASK, NULL, &len);
20425b9bcba9SMikolaj Golub 	if (buf == NULL)
20435b9bcba9SMikolaj Golub 		return (-1);
20445b9bcba9SMikolaj Golub 	if (len < sizeof(*maskp)) {
20455b9bcba9SMikolaj Golub 		free(buf);
20465b9bcba9SMikolaj Golub 		return (-1);
20475b9bcba9SMikolaj Golub 	}
20485b9bcba9SMikolaj Golub 	*maskp = *buf;
20495b9bcba9SMikolaj Golub 	free(buf);
20505b9bcba9SMikolaj Golub 	return (0);
20515b9bcba9SMikolaj Golub }
20525b9bcba9SMikolaj Golub 
20535b9bcba9SMikolaj Golub int
20545b9bcba9SMikolaj Golub procstat_getumask(struct procstat *procstat, struct kinfo_proc *kp,
20555b9bcba9SMikolaj Golub     unsigned short *maskp)
20565b9bcba9SMikolaj Golub {
20575b9bcba9SMikolaj Golub 	switch(procstat->type) {
20585b9bcba9SMikolaj Golub 	case PROCSTAT_KVM:
20591f84c47eSMikolaj Golub 		return (procstat_getumask_kvm(procstat->kd, kp, maskp));
20605b9bcba9SMikolaj Golub 	case PROCSTAT_SYSCTL:
20615b9bcba9SMikolaj Golub 		return (procstat_getumask_sysctl(kp->ki_pid, maskp));
20625b9bcba9SMikolaj Golub 	case PROCSTAT_CORE:
20635b9bcba9SMikolaj Golub 		return (procstat_getumask_core(procstat->core, maskp));
20645b9bcba9SMikolaj Golub 	default:
20655b9bcba9SMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
20665b9bcba9SMikolaj Golub 		return (-1);
20675b9bcba9SMikolaj Golub 	}
20685b9bcba9SMikolaj Golub }
20697cc0ebfdSMikolaj Golub 
20707cc0ebfdSMikolaj Golub static int
20711f84c47eSMikolaj Golub procstat_getrlimit_kvm(kvm_t *kd, struct kinfo_proc *kp, int which,
20721f84c47eSMikolaj Golub     struct rlimit* rlimit)
20731f84c47eSMikolaj Golub {
20741f84c47eSMikolaj Golub 	struct proc proc;
20751f84c47eSMikolaj Golub 	unsigned long offset;
20761f84c47eSMikolaj Golub 
20771f84c47eSMikolaj Golub 	assert(kd != NULL);
20781f84c47eSMikolaj Golub 	assert(kp != NULL);
20791f84c47eSMikolaj Golub 	assert(which >= 0 && which < RLIM_NLIMITS);
20801f84c47eSMikolaj Golub 	if (!kvm_read_all(kd, (unsigned long)kp->ki_paddr, &proc,
20811f84c47eSMikolaj Golub 	    sizeof(proc))) {
20821f84c47eSMikolaj Golub 		warnx("can't read proc struct at %p for pid %d",
20831f84c47eSMikolaj Golub 		    kp->ki_paddr, kp->ki_pid);
20841f84c47eSMikolaj Golub 		return (-1);
20851f84c47eSMikolaj Golub 	}
20861f84c47eSMikolaj Golub 	if (proc.p_limit == NULL)
20871f84c47eSMikolaj Golub 		return (-1);
20881f84c47eSMikolaj Golub 	offset = (unsigned long)proc.p_limit + sizeof(struct rlimit) * which;
20891f84c47eSMikolaj Golub 	if (!kvm_read_all(kd, offset, rlimit, sizeof(*rlimit))) {
20901f84c47eSMikolaj Golub 		warnx("can't read rlimit struct at %p for pid %d",
20911f84c47eSMikolaj Golub 		    (void *)offset, kp->ki_pid);
20921f84c47eSMikolaj Golub 		return (-1);
20931f84c47eSMikolaj Golub 	}
20941f84c47eSMikolaj Golub 	return (0);
20951f84c47eSMikolaj Golub }
20961f84c47eSMikolaj Golub 
20971f84c47eSMikolaj Golub static int
20987cc0ebfdSMikolaj Golub procstat_getrlimit_sysctl(pid_t pid, int which, struct rlimit* rlimit)
20997cc0ebfdSMikolaj Golub {
21007cc0ebfdSMikolaj Golub 	int error, name[5];
21017cc0ebfdSMikolaj Golub 	size_t len;
21027cc0ebfdSMikolaj Golub 
21037cc0ebfdSMikolaj Golub 	name[0] = CTL_KERN;
21047cc0ebfdSMikolaj Golub 	name[1] = KERN_PROC;
21057cc0ebfdSMikolaj Golub 	name[2] = KERN_PROC_RLIMIT;
21067cc0ebfdSMikolaj Golub 	name[3] = pid;
21077cc0ebfdSMikolaj Golub 	name[4] = which;
21087cc0ebfdSMikolaj Golub 	len = sizeof(struct rlimit);
21097cc0ebfdSMikolaj Golub 	error = sysctl(name, 5, rlimit, &len, NULL, 0);
21107cc0ebfdSMikolaj Golub 	if (error < 0 && errno != ESRCH) {
21117cc0ebfdSMikolaj Golub 		warn("sysctl: kern.proc.rlimit: %d", pid);
21127cc0ebfdSMikolaj Golub 		return (-1);
21137cc0ebfdSMikolaj Golub 	}
21147cc0ebfdSMikolaj Golub 	if (error < 0 || len != sizeof(struct rlimit))
21157cc0ebfdSMikolaj Golub 		return (-1);
21167cc0ebfdSMikolaj Golub 	return (0);
21177cc0ebfdSMikolaj Golub }
21187cc0ebfdSMikolaj Golub 
21197cc0ebfdSMikolaj Golub static int
21207cc0ebfdSMikolaj Golub procstat_getrlimit_core(struct procstat_core *core, int which,
21217cc0ebfdSMikolaj Golub     struct rlimit* rlimit)
21227cc0ebfdSMikolaj Golub {
21237cc0ebfdSMikolaj Golub 	size_t len;
21247cc0ebfdSMikolaj Golub 	struct rlimit* rlimits;
21257cc0ebfdSMikolaj Golub 
21267cc0ebfdSMikolaj Golub 	if (which < 0 || which >= RLIM_NLIMITS) {
21277cc0ebfdSMikolaj Golub 		errno = EINVAL;
21287cc0ebfdSMikolaj Golub 		warn("getrlimit: which");
21297cc0ebfdSMikolaj Golub 		return (-1);
21307cc0ebfdSMikolaj Golub 	}
21317cc0ebfdSMikolaj Golub 	rlimits = procstat_core_get(core, PSC_TYPE_RLIMIT, NULL, &len);
21327cc0ebfdSMikolaj Golub 	if (rlimits == NULL)
21337cc0ebfdSMikolaj Golub 		return (-1);
21347cc0ebfdSMikolaj Golub 	if (len < sizeof(struct rlimit) * RLIM_NLIMITS) {
21357cc0ebfdSMikolaj Golub 		free(rlimits);
21367cc0ebfdSMikolaj Golub 		return (-1);
21377cc0ebfdSMikolaj Golub 	}
21387cc0ebfdSMikolaj Golub 	*rlimit = rlimits[which];
21397cc0ebfdSMikolaj Golub 	return (0);
21407cc0ebfdSMikolaj Golub }
21417cc0ebfdSMikolaj Golub 
21427cc0ebfdSMikolaj Golub int
21437cc0ebfdSMikolaj Golub procstat_getrlimit(struct procstat *procstat, struct kinfo_proc *kp, int which,
21447cc0ebfdSMikolaj Golub     struct rlimit* rlimit)
21457cc0ebfdSMikolaj Golub {
21467cc0ebfdSMikolaj Golub 	switch(procstat->type) {
21477cc0ebfdSMikolaj Golub 	case PROCSTAT_KVM:
21481f84c47eSMikolaj Golub 		return (procstat_getrlimit_kvm(procstat->kd, kp, which,
21491f84c47eSMikolaj Golub 		    rlimit));
21507cc0ebfdSMikolaj Golub 	case PROCSTAT_SYSCTL:
21517cc0ebfdSMikolaj Golub 		return (procstat_getrlimit_sysctl(kp->ki_pid, which, rlimit));
21527cc0ebfdSMikolaj Golub 	case PROCSTAT_CORE:
21537cc0ebfdSMikolaj Golub 		return (procstat_getrlimit_core(procstat->core, which, rlimit));
21547cc0ebfdSMikolaj Golub 	default:
21557cc0ebfdSMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
21567cc0ebfdSMikolaj Golub 		return (-1);
21577cc0ebfdSMikolaj Golub 	}
21587cc0ebfdSMikolaj Golub }
21594cdf9796SMikolaj Golub 
21604cdf9796SMikolaj Golub static int
21614cdf9796SMikolaj Golub procstat_getpathname_sysctl(pid_t pid, char *pathname, size_t maxlen)
21624cdf9796SMikolaj Golub {
21634cdf9796SMikolaj Golub 	int error, name[4];
21644cdf9796SMikolaj Golub 	size_t len;
21654cdf9796SMikolaj Golub 
21664cdf9796SMikolaj Golub 	name[0] = CTL_KERN;
21674cdf9796SMikolaj Golub 	name[1] = KERN_PROC;
21684cdf9796SMikolaj Golub 	name[2] = KERN_PROC_PATHNAME;
21694cdf9796SMikolaj Golub 	name[3] = pid;
21704cdf9796SMikolaj Golub 	len = maxlen;
21714cdf9796SMikolaj Golub 	error = sysctl(name, 4, pathname, &len, NULL, 0);
21724cdf9796SMikolaj Golub 	if (error != 0 && errno != ESRCH)
21734cdf9796SMikolaj Golub 		warn("sysctl: kern.proc.pathname: %d", pid);
21744cdf9796SMikolaj Golub 	if (len == 0)
21754cdf9796SMikolaj Golub 		pathname[0] = '\0';
21764cdf9796SMikolaj Golub 	return (error);
21774cdf9796SMikolaj Golub }
21784cdf9796SMikolaj Golub 
21794cdf9796SMikolaj Golub static int
21804cdf9796SMikolaj Golub procstat_getpathname_core(struct procstat_core *core, char *pathname,
21814cdf9796SMikolaj Golub     size_t maxlen)
21824cdf9796SMikolaj Golub {
21834cdf9796SMikolaj Golub 	struct kinfo_file *files;
21844cdf9796SMikolaj Golub 	int cnt, i, result;
21854cdf9796SMikolaj Golub 
21864cdf9796SMikolaj Golub 	files = kinfo_getfile_core(core, &cnt);
21874cdf9796SMikolaj Golub 	if (files == NULL)
21884cdf9796SMikolaj Golub 		return (-1);
21894cdf9796SMikolaj Golub 	result = -1;
21904cdf9796SMikolaj Golub 	for (i = 0; i < cnt; i++) {
21914cdf9796SMikolaj Golub 		if (files[i].kf_fd != KF_FD_TYPE_TEXT)
21924cdf9796SMikolaj Golub 			continue;
21934cdf9796SMikolaj Golub 		strncpy(pathname, files[i].kf_path, maxlen);
21944cdf9796SMikolaj Golub 		result = 0;
21954cdf9796SMikolaj Golub 		break;
21964cdf9796SMikolaj Golub 	}
21974cdf9796SMikolaj Golub 	free(files);
21984cdf9796SMikolaj Golub 	return (result);
21994cdf9796SMikolaj Golub }
22004cdf9796SMikolaj Golub 
22014cdf9796SMikolaj Golub int
22024cdf9796SMikolaj Golub procstat_getpathname(struct procstat *procstat, struct kinfo_proc *kp,
22034cdf9796SMikolaj Golub     char *pathname, size_t maxlen)
22044cdf9796SMikolaj Golub {
22054cdf9796SMikolaj Golub 	switch(procstat->type) {
22064cdf9796SMikolaj Golub 	case PROCSTAT_KVM:
2207dd70ad64SMikolaj Golub 		/* XXX: Return empty string. */
2208dd70ad64SMikolaj Golub 		if (maxlen > 0)
2209dd70ad64SMikolaj Golub 			pathname[0] = '\0';
2210dd70ad64SMikolaj Golub 		return (0);
22114cdf9796SMikolaj Golub 	case PROCSTAT_SYSCTL:
22124cdf9796SMikolaj Golub 		return (procstat_getpathname_sysctl(kp->ki_pid, pathname,
22134cdf9796SMikolaj Golub 		    maxlen));
22144cdf9796SMikolaj Golub 	case PROCSTAT_CORE:
22154cdf9796SMikolaj Golub 		return (procstat_getpathname_core(procstat->core, pathname,
22164cdf9796SMikolaj Golub 		    maxlen));
22174cdf9796SMikolaj Golub 	default:
22184cdf9796SMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
22194cdf9796SMikolaj Golub 		return (-1);
22204cdf9796SMikolaj Golub 	}
22214cdf9796SMikolaj Golub }
2222eec6cb1cSMikolaj Golub 
2223eec6cb1cSMikolaj Golub static int
22241f84c47eSMikolaj Golub procstat_getosrel_kvm(kvm_t *kd, struct kinfo_proc *kp, int *osrelp)
22251f84c47eSMikolaj Golub {
22261f84c47eSMikolaj Golub 	struct proc proc;
22271f84c47eSMikolaj Golub 
22281f84c47eSMikolaj Golub 	assert(kd != NULL);
22291f84c47eSMikolaj Golub 	assert(kp != NULL);
22301f84c47eSMikolaj Golub 	if (!kvm_read_all(kd, (unsigned long)kp->ki_paddr, &proc,
22311f84c47eSMikolaj Golub 	    sizeof(proc))) {
22321f84c47eSMikolaj Golub 		warnx("can't read proc struct at %p for pid %d",
22331f84c47eSMikolaj Golub 		    kp->ki_paddr, kp->ki_pid);
22341f84c47eSMikolaj Golub 		return (-1);
22351f84c47eSMikolaj Golub 	}
22361f84c47eSMikolaj Golub 	*osrelp = proc.p_osrel;
22371f84c47eSMikolaj Golub 	return (0);
22381f84c47eSMikolaj Golub }
22391f84c47eSMikolaj Golub 
22401f84c47eSMikolaj Golub static int
2241eec6cb1cSMikolaj Golub procstat_getosrel_sysctl(pid_t pid, int *osrelp)
2242eec6cb1cSMikolaj Golub {
2243eec6cb1cSMikolaj Golub 	int error, name[4];
2244eec6cb1cSMikolaj Golub 	size_t len;
2245eec6cb1cSMikolaj Golub 
2246eec6cb1cSMikolaj Golub 	name[0] = CTL_KERN;
2247eec6cb1cSMikolaj Golub 	name[1] = KERN_PROC;
2248eec6cb1cSMikolaj Golub 	name[2] = KERN_PROC_OSREL;
2249eec6cb1cSMikolaj Golub 	name[3] = pid;
2250eec6cb1cSMikolaj Golub 	len = sizeof(*osrelp);
2251eec6cb1cSMikolaj Golub 	error = sysctl(name, 4, osrelp, &len, NULL, 0);
2252eec6cb1cSMikolaj Golub 	if (error != 0 && errno != ESRCH)
2253eec6cb1cSMikolaj Golub 		warn("sysctl: kern.proc.osrel: %d", pid);
2254eec6cb1cSMikolaj Golub 	return (error);
2255eec6cb1cSMikolaj Golub }
2256eec6cb1cSMikolaj Golub 
2257eec6cb1cSMikolaj Golub static int
2258eec6cb1cSMikolaj Golub procstat_getosrel_core(struct procstat_core *core, int *osrelp)
2259eec6cb1cSMikolaj Golub {
2260eec6cb1cSMikolaj Golub 	size_t len;
2261eec6cb1cSMikolaj Golub 	int *buf;
2262eec6cb1cSMikolaj Golub 
2263eec6cb1cSMikolaj Golub 	buf = procstat_core_get(core, PSC_TYPE_OSREL, NULL, &len);
2264eec6cb1cSMikolaj Golub 	if (buf == NULL)
2265eec6cb1cSMikolaj Golub 		return (-1);
2266eec6cb1cSMikolaj Golub 	if (len < sizeof(*osrelp)) {
2267eec6cb1cSMikolaj Golub 		free(buf);
2268eec6cb1cSMikolaj Golub 		return (-1);
2269eec6cb1cSMikolaj Golub 	}
2270eec6cb1cSMikolaj Golub 	*osrelp = *buf;
2271eec6cb1cSMikolaj Golub 	free(buf);
2272eec6cb1cSMikolaj Golub 	return (0);
2273eec6cb1cSMikolaj Golub }
2274eec6cb1cSMikolaj Golub 
2275eec6cb1cSMikolaj Golub int
2276eec6cb1cSMikolaj Golub procstat_getosrel(struct procstat *procstat, struct kinfo_proc *kp, int *osrelp)
2277eec6cb1cSMikolaj Golub {
2278eec6cb1cSMikolaj Golub 	switch(procstat->type) {
2279eec6cb1cSMikolaj Golub 	case PROCSTAT_KVM:
22801f84c47eSMikolaj Golub 		return (procstat_getosrel_kvm(procstat->kd, kp, osrelp));
2281eec6cb1cSMikolaj Golub 	case PROCSTAT_SYSCTL:
2282eec6cb1cSMikolaj Golub 		return (procstat_getosrel_sysctl(kp->ki_pid, osrelp));
2283eec6cb1cSMikolaj Golub 	case PROCSTAT_CORE:
2284eec6cb1cSMikolaj Golub 		return (procstat_getosrel_core(procstat->core, osrelp));
2285eec6cb1cSMikolaj Golub 	default:
2286eec6cb1cSMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
2287eec6cb1cSMikolaj Golub 		return (-1);
2288eec6cb1cSMikolaj Golub 	}
2289eec6cb1cSMikolaj Golub }
22902ff020d3SMikolaj Golub 
22912ff020d3SMikolaj Golub #define PROC_AUXV_MAX	256
22922ff020d3SMikolaj Golub 
22932ff020d3SMikolaj Golub #if __ELF_WORD_SIZE == 64
22942ff020d3SMikolaj Golub static const char *elf32_sv_names[] = {
22952ff020d3SMikolaj Golub 	"Linux ELF32",
22962ff020d3SMikolaj Golub 	"FreeBSD ELF32",
22972ff020d3SMikolaj Golub };
22982ff020d3SMikolaj Golub 
22992ff020d3SMikolaj Golub static int
23002ff020d3SMikolaj Golub is_elf32_sysctl(pid_t pid)
23012ff020d3SMikolaj Golub {
23022ff020d3SMikolaj Golub 	int error, name[4];
23032ff020d3SMikolaj Golub 	size_t len, i;
23042ff020d3SMikolaj Golub 	static char sv_name[256];
23052ff020d3SMikolaj Golub 
23062ff020d3SMikolaj Golub 	name[0] = CTL_KERN;
23072ff020d3SMikolaj Golub 	name[1] = KERN_PROC;
23082ff020d3SMikolaj Golub 	name[2] = KERN_PROC_SV_NAME;
23092ff020d3SMikolaj Golub 	name[3] = pid;
23102ff020d3SMikolaj Golub 	len = sizeof(sv_name);
23112ff020d3SMikolaj Golub 	error = sysctl(name, 4, sv_name, &len, NULL, 0);
23122ff020d3SMikolaj Golub 	if (error != 0 || len == 0)
23132ff020d3SMikolaj Golub 		return (0);
23142ff020d3SMikolaj Golub 	for (i = 0; i < sizeof(elf32_sv_names) / sizeof(*elf32_sv_names); i++) {
23152ff020d3SMikolaj Golub 		if (strncmp(sv_name, elf32_sv_names[i], sizeof(sv_name)) == 0)
23162ff020d3SMikolaj Golub 			return (1);
23172ff020d3SMikolaj Golub 	}
23182ff020d3SMikolaj Golub 	return (0);
23192ff020d3SMikolaj Golub }
23202ff020d3SMikolaj Golub 
23212ff020d3SMikolaj Golub static Elf_Auxinfo *
23222ff020d3SMikolaj Golub procstat_getauxv32_sysctl(pid_t pid, unsigned int *cntp)
23232ff020d3SMikolaj Golub {
23242ff020d3SMikolaj Golub 	Elf_Auxinfo *auxv;
23252ff020d3SMikolaj Golub 	Elf32_Auxinfo *auxv32;
23262ff020d3SMikolaj Golub 	void *ptr;
23272ff020d3SMikolaj Golub 	size_t len;
23282ff020d3SMikolaj Golub 	unsigned int i, count;
23292ff020d3SMikolaj Golub 	int name[4];
23302ff020d3SMikolaj Golub 
23312ff020d3SMikolaj Golub 	name[0] = CTL_KERN;
23322ff020d3SMikolaj Golub 	name[1] = KERN_PROC;
23332ff020d3SMikolaj Golub 	name[2] = KERN_PROC_AUXV;
23342ff020d3SMikolaj Golub 	name[3] = pid;
23352ff020d3SMikolaj Golub 	len = PROC_AUXV_MAX * sizeof(Elf32_Auxinfo);
23362ff020d3SMikolaj Golub 	auxv = NULL;
23372ff020d3SMikolaj Golub 	auxv32 = malloc(len);
23382ff020d3SMikolaj Golub 	if (auxv32 == NULL) {
23392ff020d3SMikolaj Golub 		warn("malloc(%zu)", len);
23402ff020d3SMikolaj Golub 		goto out;
23412ff020d3SMikolaj Golub 	}
23422ff020d3SMikolaj Golub 	if (sysctl(name, 4, auxv32, &len, NULL, 0) == -1) {
23432ff020d3SMikolaj Golub 		if (errno != ESRCH && errno != EPERM)
23442ff020d3SMikolaj Golub 			warn("sysctl: kern.proc.auxv: %d: %d", pid, errno);
23452ff020d3SMikolaj Golub 		goto out;
23462ff020d3SMikolaj Golub 	}
23472ff020d3SMikolaj Golub 	count = len / sizeof(Elf_Auxinfo);
23482ff020d3SMikolaj Golub 	auxv = malloc(count  * sizeof(Elf_Auxinfo));
23492ff020d3SMikolaj Golub 	if (auxv == NULL) {
23502ff020d3SMikolaj Golub 		warn("malloc(%zu)", count * sizeof(Elf_Auxinfo));
23512ff020d3SMikolaj Golub 		goto out;
23522ff020d3SMikolaj Golub 	}
23532ff020d3SMikolaj Golub 	for (i = 0; i < count; i++) {
23542ff020d3SMikolaj Golub 		/*
23552ff020d3SMikolaj Golub 		 * XXX: We expect that values for a_type on a 32-bit platform
23562ff020d3SMikolaj Golub 		 * are directly mapped to values on 64-bit one, which is not
23572ff020d3SMikolaj Golub 		 * necessarily true.
23582ff020d3SMikolaj Golub 		 */
23592ff020d3SMikolaj Golub 		auxv[i].a_type = auxv32[i].a_type;
23602ff020d3SMikolaj Golub 		ptr = &auxv32[i].a_un;
23612ff020d3SMikolaj Golub 		auxv[i].a_un.a_val = *((uint32_t *)ptr);
23622ff020d3SMikolaj Golub 	}
23632ff020d3SMikolaj Golub 	*cntp = count;
23642ff020d3SMikolaj Golub out:
23652ff020d3SMikolaj Golub 	free(auxv32);
23662ff020d3SMikolaj Golub 	return (auxv);
23672ff020d3SMikolaj Golub }
23682ff020d3SMikolaj Golub #endif /* __ELF_WORD_SIZE == 64 */
23692ff020d3SMikolaj Golub 
23702ff020d3SMikolaj Golub static Elf_Auxinfo *
23712ff020d3SMikolaj Golub procstat_getauxv_sysctl(pid_t pid, unsigned int *cntp)
23722ff020d3SMikolaj Golub {
23732ff020d3SMikolaj Golub 	Elf_Auxinfo *auxv;
23742ff020d3SMikolaj Golub 	int name[4];
23752ff020d3SMikolaj Golub 	size_t len;
23762ff020d3SMikolaj Golub 
23772ff020d3SMikolaj Golub #if __ELF_WORD_SIZE == 64
23782ff020d3SMikolaj Golub 	if (is_elf32_sysctl(pid))
23792ff020d3SMikolaj Golub 		return (procstat_getauxv32_sysctl(pid, cntp));
23802ff020d3SMikolaj Golub #endif
23812ff020d3SMikolaj Golub 	name[0] = CTL_KERN;
23822ff020d3SMikolaj Golub 	name[1] = KERN_PROC;
23832ff020d3SMikolaj Golub 	name[2] = KERN_PROC_AUXV;
23842ff020d3SMikolaj Golub 	name[3] = pid;
23852ff020d3SMikolaj Golub 	len = PROC_AUXV_MAX * sizeof(Elf_Auxinfo);
23862ff020d3SMikolaj Golub 	auxv = malloc(len);
23872ff020d3SMikolaj Golub 	if (auxv == NULL) {
23882ff020d3SMikolaj Golub 		warn("malloc(%zu)", len);
23892ff020d3SMikolaj Golub 		return (NULL);
23902ff020d3SMikolaj Golub 	}
23912ff020d3SMikolaj Golub 	if (sysctl(name, 4, auxv, &len, NULL, 0) == -1) {
23922ff020d3SMikolaj Golub 		if (errno != ESRCH && errno != EPERM)
23932ff020d3SMikolaj Golub 			warn("sysctl: kern.proc.auxv: %d: %d", pid, errno);
23942ff020d3SMikolaj Golub 		free(auxv);
23952ff020d3SMikolaj Golub 		return (NULL);
23962ff020d3SMikolaj Golub 	}
23972ff020d3SMikolaj Golub 	*cntp = len / sizeof(Elf_Auxinfo);
23982ff020d3SMikolaj Golub 	return (auxv);
23992ff020d3SMikolaj Golub }
24002ff020d3SMikolaj Golub 
24012ff020d3SMikolaj Golub static Elf_Auxinfo *
24022ff020d3SMikolaj Golub procstat_getauxv_core(struct procstat_core *core, unsigned int *cntp)
24032ff020d3SMikolaj Golub {
24042ff020d3SMikolaj Golub 	Elf_Auxinfo *auxv;
24052ff020d3SMikolaj Golub 	size_t len;
24062ff020d3SMikolaj Golub 
24072ff020d3SMikolaj Golub 	auxv = procstat_core_get(core, PSC_TYPE_AUXV, NULL, &len);
24082ff020d3SMikolaj Golub 	if (auxv == NULL)
24092ff020d3SMikolaj Golub 		return (NULL);
24102ff020d3SMikolaj Golub 	*cntp = len / sizeof(Elf_Auxinfo);
24112ff020d3SMikolaj Golub 	return (auxv);
24122ff020d3SMikolaj Golub }
24132ff020d3SMikolaj Golub 
24142ff020d3SMikolaj Golub Elf_Auxinfo *
24152ff020d3SMikolaj Golub procstat_getauxv(struct procstat *procstat, struct kinfo_proc *kp,
24162ff020d3SMikolaj Golub     unsigned int *cntp)
24172ff020d3SMikolaj Golub {
24182ff020d3SMikolaj Golub 	switch(procstat->type) {
24192ff020d3SMikolaj Golub 	case PROCSTAT_KVM:
24202ff020d3SMikolaj Golub 		warnx("kvm method is not supported");
24212ff020d3SMikolaj Golub 		return (NULL);
24222ff020d3SMikolaj Golub 	case PROCSTAT_SYSCTL:
24232ff020d3SMikolaj Golub 		return (procstat_getauxv_sysctl(kp->ki_pid, cntp));
24242ff020d3SMikolaj Golub 	case PROCSTAT_CORE:
24252ff020d3SMikolaj Golub 		return (procstat_getauxv_core(procstat->core, cntp));
24262ff020d3SMikolaj Golub 	default:
24272ff020d3SMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
24282ff020d3SMikolaj Golub 		return (NULL);
24292ff020d3SMikolaj Golub 	}
24302ff020d3SMikolaj Golub }
24312ff020d3SMikolaj Golub 
24322ff020d3SMikolaj Golub void
24332ff020d3SMikolaj Golub procstat_freeauxv(struct procstat *procstat __unused, Elf_Auxinfo *auxv)
24342ff020d3SMikolaj Golub {
24352ff020d3SMikolaj Golub 
24362ff020d3SMikolaj Golub 	free(auxv);
24372ff020d3SMikolaj Golub }
243889358231SMikolaj Golub 
243989358231SMikolaj Golub static struct kinfo_kstack *
244089358231SMikolaj Golub procstat_getkstack_sysctl(pid_t pid, int *cntp)
244189358231SMikolaj Golub {
244289358231SMikolaj Golub 	struct kinfo_kstack *kkstp;
244389358231SMikolaj Golub 	int error, name[4];
244489358231SMikolaj Golub 	size_t len;
244589358231SMikolaj Golub 
244689358231SMikolaj Golub 	name[0] = CTL_KERN;
244789358231SMikolaj Golub 	name[1] = KERN_PROC;
244889358231SMikolaj Golub 	name[2] = KERN_PROC_KSTACK;
244989358231SMikolaj Golub 	name[3] = pid;
245089358231SMikolaj Golub 
245189358231SMikolaj Golub 	len = 0;
245289358231SMikolaj Golub 	error = sysctl(name, 4, NULL, &len, NULL, 0);
245389358231SMikolaj Golub 	if (error < 0 && errno != ESRCH && errno != EPERM && errno != ENOENT) {
245489358231SMikolaj Golub 		warn("sysctl: kern.proc.kstack: %d", pid);
245589358231SMikolaj Golub 		return (NULL);
245689358231SMikolaj Golub 	}
245789358231SMikolaj Golub 	if (error == -1 && errno == ENOENT) {
245889358231SMikolaj Golub 		warnx("sysctl: kern.proc.kstack unavailable"
245989358231SMikolaj Golub 		    " (options DDB or options STACK required in kernel)");
246089358231SMikolaj Golub 		return (NULL);
246189358231SMikolaj Golub 	}
246289358231SMikolaj Golub 	if (error == -1)
246389358231SMikolaj Golub 		return (NULL);
246489358231SMikolaj Golub 	kkstp = malloc(len);
246589358231SMikolaj Golub 	if (kkstp == NULL) {
246689358231SMikolaj Golub 		warn("malloc(%zu)", len);
246789358231SMikolaj Golub 		return (NULL);
246889358231SMikolaj Golub 	}
246989358231SMikolaj Golub 	if (sysctl(name, 4, kkstp, &len, NULL, 0) == -1) {
247089358231SMikolaj Golub 		warn("sysctl: kern.proc.pid: %d", pid);
247189358231SMikolaj Golub 		free(kkstp);
247289358231SMikolaj Golub 		return (NULL);
247389358231SMikolaj Golub 	}
247489358231SMikolaj Golub 	*cntp = len / sizeof(*kkstp);
247589358231SMikolaj Golub 
247689358231SMikolaj Golub 	return (kkstp);
247789358231SMikolaj Golub }
247889358231SMikolaj Golub 
247989358231SMikolaj Golub struct kinfo_kstack *
248089358231SMikolaj Golub procstat_getkstack(struct procstat *procstat, struct kinfo_proc *kp,
248189358231SMikolaj Golub     unsigned int *cntp)
248289358231SMikolaj Golub {
248389358231SMikolaj Golub 	switch(procstat->type) {
248489358231SMikolaj Golub 	case PROCSTAT_KVM:
248589358231SMikolaj Golub 		warnx("kvm method is not supported");
248689358231SMikolaj Golub 		return (NULL);
248789358231SMikolaj Golub 	case PROCSTAT_SYSCTL:
248889358231SMikolaj Golub 		return (procstat_getkstack_sysctl(kp->ki_pid, cntp));
248989358231SMikolaj Golub 	case PROCSTAT_CORE:
249089358231SMikolaj Golub 		warnx("core method is not supported");
249189358231SMikolaj Golub 		return (NULL);
249289358231SMikolaj Golub 	default:
249389358231SMikolaj Golub 		warnx("unknown access method: %d", procstat->type);
249489358231SMikolaj Golub 		return (NULL);
249589358231SMikolaj Golub 	}
249689358231SMikolaj Golub }
249789358231SMikolaj Golub 
249889358231SMikolaj Golub void
249989358231SMikolaj Golub procstat_freekstack(struct procstat *procstat __unused,
250089358231SMikolaj Golub     struct kinfo_kstack *kkstp)
250189358231SMikolaj Golub {
250289358231SMikolaj Golub 
250389358231SMikolaj Golub 	free(kkstp);
250489358231SMikolaj Golub }
2505