10daf62d9SStanislav Sedov /*- 20daf62d9SStanislav Sedov * Copyright (c) 2009 Stanislav Sedov <stas@FreeBSD.org> 30daf62d9SStanislav Sedov * Copyright (c) 1988, 1993 40daf62d9SStanislav Sedov * The Regents of the University of California. All rights reserved. 50daf62d9SStanislav Sedov * 60daf62d9SStanislav Sedov * Redistribution and use in source and binary forms, with or without 70daf62d9SStanislav Sedov * modification, are permitted provided that the following conditions 80daf62d9SStanislav Sedov * are met: 90daf62d9SStanislav Sedov * 1. Redistributions of source code must retain the above copyright 100daf62d9SStanislav Sedov * notice, this list of conditions and the following disclaimer. 110daf62d9SStanislav Sedov * 2. Redistributions in binary form must reproduce the above copyright 120daf62d9SStanislav Sedov * notice, this list of conditions and the following disclaimer in the 130daf62d9SStanislav Sedov * documentation and/or other materials provided with the distribution. 140daf62d9SStanislav Sedov * 3. All advertising materials mentioning features or use of this software 150daf62d9SStanislav Sedov * must display the following acknowledgement: 160daf62d9SStanislav Sedov * This product includes software developed by the University of 170daf62d9SStanislav Sedov * California, Berkeley and its contributors. 180daf62d9SStanislav Sedov * 4. Neither the name of the University nor the names of its contributors 190daf62d9SStanislav Sedov * may be used to endorse or promote products derived from this software 200daf62d9SStanislav Sedov * without specific prior written permission. 210daf62d9SStanislav Sedov * 220daf62d9SStanislav Sedov * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 230daf62d9SStanislav Sedov * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 240daf62d9SStanislav Sedov * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 250daf62d9SStanislav Sedov * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 260daf62d9SStanislav Sedov * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 270daf62d9SStanislav Sedov * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 280daf62d9SStanislav Sedov * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 290daf62d9SStanislav Sedov * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 300daf62d9SStanislav Sedov * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 310daf62d9SStanislav Sedov * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 320daf62d9SStanislav Sedov * SUCH DAMAGE. 330daf62d9SStanislav Sedov */ 340daf62d9SStanislav Sedov 350daf62d9SStanislav Sedov #include <sys/cdefs.h> 360daf62d9SStanislav Sedov __FBSDID("$FreeBSD$"); 370daf62d9SStanislav Sedov 380daf62d9SStanislav Sedov #include <sys/param.h> 392ff020d3SMikolaj Golub #include <sys/elf.h> 400daf62d9SStanislav Sedov #include <sys/time.h> 417cc0ebfdSMikolaj Golub #include <sys/resourcevar.h> 421f84c47eSMikolaj Golub #define _WANT_UCRED 431f84c47eSMikolaj Golub #include <sys/ucred.h> 441f84c47eSMikolaj Golub #undef _WANT_UCRED 450daf62d9SStanislav Sedov #include <sys/proc.h> 460daf62d9SStanislav Sedov #include <sys/user.h> 470daf62d9SStanislav Sedov #include <sys/stat.h> 480daf62d9SStanislav Sedov #include <sys/vnode.h> 490daf62d9SStanislav Sedov #include <sys/socket.h> 500daf62d9SStanislav Sedov #include <sys/socketvar.h> 510daf62d9SStanislav Sedov #include <sys/domain.h> 520daf62d9SStanislav Sedov #include <sys/protosw.h> 530daf62d9SStanislav Sedov #include <sys/un.h> 540daf62d9SStanislav Sedov #include <sys/unpcb.h> 550daf62d9SStanislav Sedov #include <sys/sysctl.h> 560daf62d9SStanislav Sedov #include <sys/tty.h> 570daf62d9SStanislav Sedov #include <sys/filedesc.h> 580daf62d9SStanislav Sedov #include <sys/queue.h> 590daf62d9SStanislav Sedov #define _WANT_FILE 600daf62d9SStanislav Sedov #include <sys/file.h> 610daf62d9SStanislav Sedov #include <sys/conf.h> 62e506e182SJohn Baldwin #include <sys/mman.h> 630daf62d9SStanislav Sedov #define _KERNEL 640daf62d9SStanislav Sedov #include <sys/mount.h> 650daf62d9SStanislav Sedov #include <sys/pipe.h> 660daf62d9SStanislav Sedov #include <ufs/ufs/quota.h> 670daf62d9SStanislav Sedov #include <ufs/ufs/inode.h> 680daf62d9SStanislav Sedov #include <fs/devfs/devfs.h> 690daf62d9SStanislav Sedov #include <fs/devfs/devfs_int.h> 700daf62d9SStanislav Sedov #undef _KERNEL 710daf62d9SStanislav Sedov #include <nfs/nfsproto.h> 720daf62d9SStanislav Sedov #include <nfsclient/nfs.h> 730daf62d9SStanislav Sedov #include <nfsclient/nfsnode.h> 740daf62d9SStanislav Sedov 750daf62d9SStanislav Sedov #include <vm/vm.h> 760daf62d9SStanislav Sedov #include <vm/vm_map.h> 770daf62d9SStanislav Sedov #include <vm/vm_object.h> 780daf62d9SStanislav Sedov 790daf62d9SStanislav Sedov #include <net/route.h> 800daf62d9SStanislav Sedov #include <netinet/in.h> 810daf62d9SStanislav Sedov #include <netinet/in_systm.h> 820daf62d9SStanislav Sedov #include <netinet/ip.h> 830daf62d9SStanislav Sedov #include <netinet/in_pcb.h> 840daf62d9SStanislav Sedov 850daf62d9SStanislav Sedov #include <assert.h> 860daf62d9SStanislav Sedov #include <ctype.h> 870daf62d9SStanislav Sedov #include <err.h> 880daf62d9SStanislav Sedov #include <fcntl.h> 890daf62d9SStanislav Sedov #include <kvm.h> 900daf62d9SStanislav Sedov #include <libutil.h> 910daf62d9SStanislav Sedov #include <limits.h> 920daf62d9SStanislav Sedov #include <paths.h> 930daf62d9SStanislav Sedov #include <pwd.h> 940daf62d9SStanislav Sedov #include <stdio.h> 950daf62d9SStanislav Sedov #include <stdlib.h> 960daf62d9SStanislav Sedov #include <stddef.h> 970daf62d9SStanislav Sedov #include <string.h> 980daf62d9SStanislav Sedov #include <unistd.h> 990daf62d9SStanislav Sedov #include <netdb.h> 1000daf62d9SStanislav Sedov 1010daf62d9SStanislav Sedov #include <libprocstat.h> 1020daf62d9SStanislav Sedov #include "libprocstat_internal.h" 1030daf62d9SStanislav Sedov #include "common_kvm.h" 1047153ad2bSMikolaj Golub #include "core.h" 1050daf62d9SStanislav Sedov 1060daf62d9SStanislav Sedov int statfs(const char *, struct statfs *); /* XXX */ 1070daf62d9SStanislav Sedov 1080daf62d9SStanislav Sedov #define PROCSTAT_KVM 1 1090daf62d9SStanislav Sedov #define PROCSTAT_SYSCTL 2 1107153ad2bSMikolaj Golub #define PROCSTAT_CORE 3 1110daf62d9SStanislav Sedov 1124482b5e3SMikolaj Golub static char **getargv(struct procstat *procstat, struct kinfo_proc *kp, 1134482b5e3SMikolaj Golub size_t nchr, int env); 1140daf62d9SStanislav Sedov static char *getmnton(kvm_t *kd, struct mount *m); 11539680c7bSMikolaj Golub static struct kinfo_vmentry * kinfo_getvmmap_core(struct procstat_core *core, 11639680c7bSMikolaj Golub int *cntp); 1172ff020d3SMikolaj Golub static Elf_Auxinfo *procstat_getauxv_core(struct procstat_core *core, 1182ff020d3SMikolaj Golub unsigned int *cntp); 1192ff020d3SMikolaj Golub static Elf_Auxinfo *procstat_getauxv_sysctl(pid_t pid, unsigned int *cntp); 1200daf62d9SStanislav Sedov static struct filestat_list *procstat_getfiles_kvm( 1210daf62d9SStanislav Sedov struct procstat *procstat, struct kinfo_proc *kp, int mmapped); 1220daf62d9SStanislav Sedov static struct filestat_list *procstat_getfiles_sysctl( 1230daf62d9SStanislav Sedov struct procstat *procstat, struct kinfo_proc *kp, int mmapped); 1240daf62d9SStanislav Sedov static int procstat_get_pipe_info_sysctl(struct filestat *fst, 1250daf62d9SStanislav Sedov struct pipestat *pipe, char *errbuf); 1260daf62d9SStanislav Sedov static int procstat_get_pipe_info_kvm(kvm_t *kd, struct filestat *fst, 1270daf62d9SStanislav Sedov struct pipestat *pipe, char *errbuf); 1280daf62d9SStanislav Sedov static int procstat_get_pts_info_sysctl(struct filestat *fst, 1290daf62d9SStanislav Sedov struct ptsstat *pts, char *errbuf); 1300daf62d9SStanislav Sedov static int procstat_get_pts_info_kvm(kvm_t *kd, struct filestat *fst, 1310daf62d9SStanislav Sedov struct ptsstat *pts, char *errbuf); 132e506e182SJohn Baldwin static int procstat_get_shm_info_sysctl(struct filestat *fst, 133e506e182SJohn Baldwin struct shmstat *shm, char *errbuf); 134e506e182SJohn Baldwin static int procstat_get_shm_info_kvm(kvm_t *kd, struct filestat *fst, 135e506e182SJohn Baldwin struct shmstat *shm, char *errbuf); 1360daf62d9SStanislav Sedov static int procstat_get_socket_info_sysctl(struct filestat *fst, 1370daf62d9SStanislav Sedov struct sockstat *sock, char *errbuf); 1380daf62d9SStanislav Sedov static int procstat_get_socket_info_kvm(kvm_t *kd, struct filestat *fst, 1390daf62d9SStanislav Sedov struct sockstat *sock, char *errbuf); 1400daf62d9SStanislav Sedov static int to_filestat_flags(int flags); 1410daf62d9SStanislav Sedov static int procstat_get_vnode_info_kvm(kvm_t *kd, struct filestat *fst, 1420daf62d9SStanislav Sedov struct vnstat *vn, char *errbuf); 1430daf62d9SStanislav Sedov static int procstat_get_vnode_info_sysctl(struct filestat *fst, 1440daf62d9SStanislav Sedov struct vnstat *vn, char *errbuf); 1457f1d14e6SMikolaj Golub static gid_t *procstat_getgroups_core(struct procstat_core *core, 1467f1d14e6SMikolaj Golub unsigned int *count); 1471f84c47eSMikolaj Golub static gid_t * procstat_getgroups_kvm(kvm_t *kd, struct kinfo_proc *kp, 1481f84c47eSMikolaj Golub unsigned int *count); 1497f1d14e6SMikolaj Golub static gid_t *procstat_getgroups_sysctl(pid_t pid, unsigned int *count); 15089358231SMikolaj Golub static struct kinfo_kstack *procstat_getkstack_sysctl(pid_t pid, 15189358231SMikolaj Golub int *cntp); 1521f84c47eSMikolaj Golub static int procstat_getosrel_core(struct procstat_core *core, 1531f84c47eSMikolaj Golub int *osrelp); 1541f84c47eSMikolaj Golub static int procstat_getosrel_kvm(kvm_t *kd, struct kinfo_proc *kp, 1551f84c47eSMikolaj Golub int *osrelp); 1561f84c47eSMikolaj Golub static int procstat_getosrel_sysctl(pid_t pid, int *osrelp); 1574cdf9796SMikolaj Golub static int procstat_getpathname_core(struct procstat_core *core, 1584cdf9796SMikolaj Golub char *pathname, size_t maxlen); 1594cdf9796SMikolaj Golub static int procstat_getpathname_sysctl(pid_t pid, char *pathname, 1604cdf9796SMikolaj Golub size_t maxlen); 1617cc0ebfdSMikolaj Golub static int procstat_getrlimit_core(struct procstat_core *core, int which, 1627cc0ebfdSMikolaj Golub struct rlimit* rlimit); 1631f84c47eSMikolaj Golub static int procstat_getrlimit_kvm(kvm_t *kd, struct kinfo_proc *kp, 1641f84c47eSMikolaj Golub int which, struct rlimit* rlimit); 1657cc0ebfdSMikolaj Golub static int procstat_getrlimit_sysctl(pid_t pid, int which, 1667cc0ebfdSMikolaj Golub struct rlimit* rlimit); 1675b9bcba9SMikolaj Golub static int procstat_getumask_core(struct procstat_core *core, 1685b9bcba9SMikolaj Golub unsigned short *maskp); 1691f84c47eSMikolaj Golub static int procstat_getumask_kvm(kvm_t *kd, struct kinfo_proc *kp, 1701f84c47eSMikolaj Golub unsigned short *maskp); 1715b9bcba9SMikolaj Golub static int procstat_getumask_sysctl(pid_t pid, unsigned short *maskp); 1720daf62d9SStanislav Sedov static int vntype2psfsttype(int type); 1730daf62d9SStanislav Sedov 1740daf62d9SStanislav Sedov void 1750daf62d9SStanislav Sedov procstat_close(struct procstat *procstat) 1760daf62d9SStanislav Sedov { 1770daf62d9SStanislav Sedov 1780daf62d9SStanislav Sedov assert(procstat); 1790daf62d9SStanislav Sedov if (procstat->type == PROCSTAT_KVM) 1800daf62d9SStanislav Sedov kvm_close(procstat->kd); 1817153ad2bSMikolaj Golub else if (procstat->type == PROCSTAT_CORE) 1827153ad2bSMikolaj Golub procstat_core_close(procstat->core); 1834482b5e3SMikolaj Golub procstat_freeargv(procstat); 1844482b5e3SMikolaj Golub procstat_freeenvv(procstat); 185d7b666aeSSergey Kandaurov free(procstat); 1860daf62d9SStanislav Sedov } 1870daf62d9SStanislav Sedov 1880daf62d9SStanislav Sedov struct procstat * 1890daf62d9SStanislav Sedov procstat_open_sysctl(void) 1900daf62d9SStanislav Sedov { 1910daf62d9SStanislav Sedov struct procstat *procstat; 1920daf62d9SStanislav Sedov 1930daf62d9SStanislav Sedov procstat = calloc(1, sizeof(*procstat)); 1940daf62d9SStanislav Sedov if (procstat == NULL) { 1950daf62d9SStanislav Sedov warn("malloc()"); 1960daf62d9SStanislav Sedov return (NULL); 1970daf62d9SStanislav Sedov } 1980daf62d9SStanislav Sedov procstat->type = PROCSTAT_SYSCTL; 1990daf62d9SStanislav Sedov return (procstat); 2000daf62d9SStanislav Sedov } 2010daf62d9SStanislav Sedov 2020daf62d9SStanislav Sedov struct procstat * 2030daf62d9SStanislav Sedov procstat_open_kvm(const char *nlistf, const char *memf) 2040daf62d9SStanislav Sedov { 2050daf62d9SStanislav Sedov struct procstat *procstat; 2060daf62d9SStanislav Sedov kvm_t *kd; 2070daf62d9SStanislav Sedov char buf[_POSIX2_LINE_MAX]; 2080daf62d9SStanislav Sedov 2090daf62d9SStanislav Sedov procstat = calloc(1, sizeof(*procstat)); 2100daf62d9SStanislav Sedov if (procstat == NULL) { 2110daf62d9SStanislav Sedov warn("malloc()"); 2120daf62d9SStanislav Sedov return (NULL); 2130daf62d9SStanislav Sedov } 2140daf62d9SStanislav Sedov kd = kvm_openfiles(nlistf, memf, NULL, O_RDONLY, buf); 2150daf62d9SStanislav Sedov if (kd == NULL) { 2160daf62d9SStanislav Sedov warnx("kvm_openfiles(): %s", buf); 2170daf62d9SStanislav Sedov free(procstat); 2180daf62d9SStanislav Sedov return (NULL); 2190daf62d9SStanislav Sedov } 2200daf62d9SStanislav Sedov procstat->type = PROCSTAT_KVM; 2210daf62d9SStanislav Sedov procstat->kd = kd; 2220daf62d9SStanislav Sedov return (procstat); 2230daf62d9SStanislav Sedov } 2240daf62d9SStanislav Sedov 2257153ad2bSMikolaj Golub struct procstat * 2267153ad2bSMikolaj Golub procstat_open_core(const char *filename) 2277153ad2bSMikolaj Golub { 2287153ad2bSMikolaj Golub struct procstat *procstat; 2297153ad2bSMikolaj Golub struct procstat_core *core; 2307153ad2bSMikolaj Golub 2317153ad2bSMikolaj Golub procstat = calloc(1, sizeof(*procstat)); 2327153ad2bSMikolaj Golub if (procstat == NULL) { 2337153ad2bSMikolaj Golub warn("malloc()"); 2347153ad2bSMikolaj Golub return (NULL); 2357153ad2bSMikolaj Golub } 2367153ad2bSMikolaj Golub core = procstat_core_open(filename); 2377153ad2bSMikolaj Golub if (core == NULL) { 2387153ad2bSMikolaj Golub free(procstat); 2397153ad2bSMikolaj Golub return (NULL); 2407153ad2bSMikolaj Golub } 2417153ad2bSMikolaj Golub procstat->type = PROCSTAT_CORE; 2427153ad2bSMikolaj Golub procstat->core = core; 2437153ad2bSMikolaj Golub return (procstat); 2447153ad2bSMikolaj Golub } 2457153ad2bSMikolaj Golub 2460daf62d9SStanislav Sedov struct kinfo_proc * 2470daf62d9SStanislav Sedov procstat_getprocs(struct procstat *procstat, int what, int arg, 2480daf62d9SStanislav Sedov unsigned int *count) 2490daf62d9SStanislav Sedov { 2500daf62d9SStanislav Sedov struct kinfo_proc *p0, *p; 2510daf62d9SStanislav Sedov size_t len; 2520daf62d9SStanislav Sedov int name[4]; 253391bdfb8SAndriy Gapon int cnt; 2540daf62d9SStanislav Sedov int error; 2550daf62d9SStanislav Sedov 2560daf62d9SStanislav Sedov assert(procstat); 2570daf62d9SStanislav Sedov assert(count); 2580daf62d9SStanislav Sedov p = NULL; 2590daf62d9SStanislav Sedov if (procstat->type == PROCSTAT_KVM) { 260391bdfb8SAndriy Gapon *count = 0; 261391bdfb8SAndriy Gapon p0 = kvm_getprocs(procstat->kd, what, arg, &cnt); 262391bdfb8SAndriy Gapon if (p0 == NULL || cnt <= 0) 2630daf62d9SStanislav Sedov return (NULL); 264391bdfb8SAndriy Gapon *count = cnt; 2650daf62d9SStanislav Sedov len = *count * sizeof(*p); 2660daf62d9SStanislav Sedov p = malloc(len); 2670daf62d9SStanislav Sedov if (p == NULL) { 26865869214SJilles Tjoelker warnx("malloc(%zu)", len); 2690daf62d9SStanislav Sedov goto fail; 2700daf62d9SStanislav Sedov } 2710daf62d9SStanislav Sedov bcopy(p0, p, len); 2720daf62d9SStanislav Sedov return (p); 2730daf62d9SStanislav Sedov } else if (procstat->type == PROCSTAT_SYSCTL) { 2740daf62d9SStanislav Sedov len = 0; 2750daf62d9SStanislav Sedov name[0] = CTL_KERN; 2760daf62d9SStanislav Sedov name[1] = KERN_PROC; 2770daf62d9SStanislav Sedov name[2] = what; 2780daf62d9SStanislav Sedov name[3] = arg; 2790daf62d9SStanislav Sedov error = sysctl(name, 4, NULL, &len, NULL, 0); 2800daf62d9SStanislav Sedov if (error < 0 && errno != EPERM) { 2810daf62d9SStanislav Sedov warn("sysctl(kern.proc)"); 2820daf62d9SStanislav Sedov goto fail; 2830daf62d9SStanislav Sedov } 2840daf62d9SStanislav Sedov if (len == 0) { 2850daf62d9SStanislav Sedov warnx("no processes?"); 2860daf62d9SStanislav Sedov goto fail; 2870daf62d9SStanislav Sedov } 2880daf62d9SStanislav Sedov p = malloc(len); 2890daf62d9SStanislav Sedov if (p == NULL) { 29065869214SJilles Tjoelker warnx("malloc(%zu)", len); 2910daf62d9SStanislav Sedov goto fail; 2920daf62d9SStanislav Sedov } 2930daf62d9SStanislav Sedov error = sysctl(name, 4, p, &len, NULL, 0); 2940daf62d9SStanislav Sedov if (error < 0 && errno != EPERM) { 2950daf62d9SStanislav Sedov warn("sysctl(kern.proc)"); 2960daf62d9SStanislav Sedov goto fail; 2970daf62d9SStanislav Sedov } 2980daf62d9SStanislav Sedov /* Perform simple consistency checks. */ 2990daf62d9SStanislav Sedov if ((len % sizeof(*p)) != 0 || p->ki_structsize != sizeof(*p)) { 3007153ad2bSMikolaj Golub warnx("kinfo_proc structure size mismatch (len = %zu)", len); 3017153ad2bSMikolaj Golub goto fail; 3027153ad2bSMikolaj Golub } 3037153ad2bSMikolaj Golub *count = len / sizeof(*p); 3047153ad2bSMikolaj Golub return (p); 3057153ad2bSMikolaj Golub } else if (procstat->type == PROCSTAT_CORE) { 3067153ad2bSMikolaj Golub p = procstat_core_get(procstat->core, PSC_TYPE_PROC, NULL, 3077153ad2bSMikolaj Golub &len); 3087153ad2bSMikolaj Golub if ((len % sizeof(*p)) != 0 || p->ki_structsize != sizeof(*p)) { 3090daf62d9SStanislav Sedov warnx("kinfo_proc structure size mismatch"); 3100daf62d9SStanislav Sedov goto fail; 3110daf62d9SStanislav Sedov } 3120daf62d9SStanislav Sedov *count = len / sizeof(*p); 3130daf62d9SStanislav Sedov return (p); 3140daf62d9SStanislav Sedov } else { 31580905c35SJilles Tjoelker warnx("unknown access method: %d", procstat->type); 3160daf62d9SStanislav Sedov return (NULL); 3170daf62d9SStanislav Sedov } 3180daf62d9SStanislav Sedov fail: 3190daf62d9SStanislav Sedov if (p) 3200daf62d9SStanislav Sedov free(p); 3210daf62d9SStanislav Sedov return (NULL); 3220daf62d9SStanislav Sedov } 3230daf62d9SStanislav Sedov 3240daf62d9SStanislav Sedov void 3250daf62d9SStanislav Sedov procstat_freeprocs(struct procstat *procstat __unused, struct kinfo_proc *p) 3260daf62d9SStanislav Sedov { 3270daf62d9SStanislav Sedov 3280daf62d9SStanislav Sedov if (p != NULL) 3290daf62d9SStanislav Sedov free(p); 3300daf62d9SStanislav Sedov p = NULL; 3310daf62d9SStanislav Sedov } 3320daf62d9SStanislav Sedov 3330daf62d9SStanislav Sedov struct filestat_list * 3340daf62d9SStanislav Sedov procstat_getfiles(struct procstat *procstat, struct kinfo_proc *kp, int mmapped) 3350daf62d9SStanislav Sedov { 3360daf62d9SStanislav Sedov 3377153ad2bSMikolaj Golub switch(procstat->type) { 3387153ad2bSMikolaj Golub case PROCSTAT_KVM: 3390daf62d9SStanislav Sedov return (procstat_getfiles_kvm(procstat, kp, mmapped)); 3407153ad2bSMikolaj Golub case PROCSTAT_SYSCTL: 3417153ad2bSMikolaj Golub case PROCSTAT_CORE: 3427153ad2bSMikolaj Golub return (procstat_getfiles_sysctl(procstat, kp, mmapped)); 3437153ad2bSMikolaj Golub default: 3447153ad2bSMikolaj Golub warnx("unknown access method: %d", procstat->type); 3450daf62d9SStanislav Sedov return (NULL); 3460daf62d9SStanislav Sedov } 3477153ad2bSMikolaj Golub } 3480daf62d9SStanislav Sedov 3490daf62d9SStanislav Sedov void 3500daf62d9SStanislav Sedov procstat_freefiles(struct procstat *procstat, struct filestat_list *head) 3510daf62d9SStanislav Sedov { 3520daf62d9SStanislav Sedov struct filestat *fst, *tmp; 3530daf62d9SStanislav Sedov 3540daf62d9SStanislav Sedov STAILQ_FOREACH_SAFE(fst, head, next, tmp) { 3550daf62d9SStanislav Sedov if (fst->fs_path != NULL) 3560daf62d9SStanislav Sedov free(fst->fs_path); 3570daf62d9SStanislav Sedov free(fst); 3580daf62d9SStanislav Sedov } 3590daf62d9SStanislav Sedov free(head); 3600daf62d9SStanislav Sedov if (procstat->vmentries != NULL) { 3610daf62d9SStanislav Sedov free(procstat->vmentries); 3620daf62d9SStanislav Sedov procstat->vmentries = NULL; 3630daf62d9SStanislav Sedov } 3640daf62d9SStanislav Sedov if (procstat->files != NULL) { 3650daf62d9SStanislav Sedov free(procstat->files); 3660daf62d9SStanislav Sedov procstat->files = NULL; 3670daf62d9SStanislav Sedov } 3680daf62d9SStanislav Sedov } 3690daf62d9SStanislav Sedov 3700daf62d9SStanislav Sedov static struct filestat * 3710daf62d9SStanislav Sedov filestat_new_entry(void *typedep, int type, int fd, int fflags, int uflags, 372d57486e2SRobert Watson int refcount, off_t offset, char *path, cap_rights_t cap_rights) 3730daf62d9SStanislav Sedov { 3740daf62d9SStanislav Sedov struct filestat *entry; 3750daf62d9SStanislav Sedov 3760daf62d9SStanislav Sedov entry = calloc(1, sizeof(*entry)); 3770daf62d9SStanislav Sedov if (entry == NULL) { 3780daf62d9SStanislav Sedov warn("malloc()"); 3790daf62d9SStanislav Sedov return (NULL); 3800daf62d9SStanislav Sedov } 3810daf62d9SStanislav Sedov entry->fs_typedep = typedep; 3820daf62d9SStanislav Sedov entry->fs_fflags = fflags; 3830daf62d9SStanislav Sedov entry->fs_uflags = uflags; 3840daf62d9SStanislav Sedov entry->fs_fd = fd; 3850daf62d9SStanislav Sedov entry->fs_type = type; 3860daf62d9SStanislav Sedov entry->fs_ref_count = refcount; 3870daf62d9SStanislav Sedov entry->fs_offset = offset; 3880daf62d9SStanislav Sedov entry->fs_path = path; 389d57486e2SRobert Watson entry->fs_cap_rights = cap_rights; 3900daf62d9SStanislav Sedov return (entry); 3910daf62d9SStanislav Sedov } 3920daf62d9SStanislav Sedov 3930daf62d9SStanislav Sedov static struct vnode * 3940daf62d9SStanislav Sedov getctty(kvm_t *kd, struct kinfo_proc *kp) 3950daf62d9SStanislav Sedov { 3960daf62d9SStanislav Sedov struct pgrp pgrp; 3970daf62d9SStanislav Sedov struct proc proc; 3980daf62d9SStanislav Sedov struct session sess; 3990daf62d9SStanislav Sedov int error; 4000daf62d9SStanislav Sedov 4010daf62d9SStanislav Sedov assert(kp); 4020daf62d9SStanislav Sedov error = kvm_read_all(kd, (unsigned long)kp->ki_paddr, &proc, 4030daf62d9SStanislav Sedov sizeof(proc)); 4040daf62d9SStanislav Sedov if (error == 0) { 4050daf62d9SStanislav Sedov warnx("can't read proc struct at %p for pid %d", 4060daf62d9SStanislav Sedov kp->ki_paddr, kp->ki_pid); 4070daf62d9SStanislav Sedov return (NULL); 4080daf62d9SStanislav Sedov } 4090daf62d9SStanislav Sedov if (proc.p_pgrp == NULL) 4100daf62d9SStanislav Sedov return (NULL); 4110daf62d9SStanislav Sedov error = kvm_read_all(kd, (unsigned long)proc.p_pgrp, &pgrp, 4120daf62d9SStanislav Sedov sizeof(pgrp)); 4130daf62d9SStanislav Sedov if (error == 0) { 4140daf62d9SStanislav Sedov warnx("can't read pgrp struct at %p for pid %d", 4150daf62d9SStanislav Sedov proc.p_pgrp, kp->ki_pid); 4160daf62d9SStanislav Sedov return (NULL); 4170daf62d9SStanislav Sedov } 4180daf62d9SStanislav Sedov error = kvm_read_all(kd, (unsigned long)pgrp.pg_session, &sess, 4190daf62d9SStanislav Sedov sizeof(sess)); 4200daf62d9SStanislav Sedov if (error == 0) { 4210daf62d9SStanislav Sedov warnx("can't read session struct at %p for pid %d", 4220daf62d9SStanislav Sedov pgrp.pg_session, kp->ki_pid); 4230daf62d9SStanislav Sedov return (NULL); 4240daf62d9SStanislav Sedov } 4250daf62d9SStanislav Sedov return (sess.s_ttyvp); 4260daf62d9SStanislav Sedov } 4270daf62d9SStanislav Sedov 4280daf62d9SStanislav Sedov static struct filestat_list * 4290daf62d9SStanislav Sedov procstat_getfiles_kvm(struct procstat *procstat, struct kinfo_proc *kp, int mmapped) 4300daf62d9SStanislav Sedov { 4310daf62d9SStanislav Sedov struct file file; 4320daf62d9SStanislav Sedov struct filedesc filed; 4330daf62d9SStanislav Sedov struct vm_map_entry vmentry; 4340daf62d9SStanislav Sedov struct vm_object object; 4350daf62d9SStanislav Sedov struct vmspace vmspace; 4360daf62d9SStanislav Sedov vm_map_entry_t entryp; 4370daf62d9SStanislav Sedov vm_map_t map; 4380daf62d9SStanislav Sedov vm_object_t objp; 4390daf62d9SStanislav Sedov struct vnode *vp; 4400daf62d9SStanislav Sedov struct file **ofiles; 4410daf62d9SStanislav Sedov struct filestat *entry; 4420daf62d9SStanislav Sedov struct filestat_list *head; 4430daf62d9SStanislav Sedov kvm_t *kd; 4440daf62d9SStanislav Sedov void *data; 4450daf62d9SStanislav Sedov int i, fflags; 4460daf62d9SStanislav Sedov int prot, type; 4470daf62d9SStanislav Sedov unsigned int nfiles; 4480daf62d9SStanislav Sedov 4490daf62d9SStanislav Sedov assert(procstat); 4500daf62d9SStanislav Sedov kd = procstat->kd; 4510daf62d9SStanislav Sedov if (kd == NULL) 4520daf62d9SStanislav Sedov return (NULL); 4530daf62d9SStanislav Sedov if (kp->ki_fd == NULL) 4540daf62d9SStanislav Sedov return (NULL); 4550daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)kp->ki_fd, &filed, 4560daf62d9SStanislav Sedov sizeof(filed))) { 4570daf62d9SStanislav Sedov warnx("can't read filedesc at %p", (void *)kp->ki_fd); 4580daf62d9SStanislav Sedov return (NULL); 4590daf62d9SStanislav Sedov } 4600daf62d9SStanislav Sedov 4610daf62d9SStanislav Sedov /* 4620daf62d9SStanislav Sedov * Allocate list head. 4630daf62d9SStanislav Sedov */ 4640daf62d9SStanislav Sedov head = malloc(sizeof(*head)); 4650daf62d9SStanislav Sedov if (head == NULL) 4660daf62d9SStanislav Sedov return (NULL); 4670daf62d9SStanislav Sedov STAILQ_INIT(head); 4680daf62d9SStanislav Sedov 4690daf62d9SStanislav Sedov /* root directory vnode, if one. */ 4700daf62d9SStanislav Sedov if (filed.fd_rdir) { 4710daf62d9SStanislav Sedov entry = filestat_new_entry(filed.fd_rdir, PS_FST_TYPE_VNODE, -1, 472d57486e2SRobert Watson PS_FST_FFLAG_READ, PS_FST_UFLAG_RDIR, 0, 0, NULL, 0); 4730daf62d9SStanislav Sedov if (entry != NULL) 4740daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 4750daf62d9SStanislav Sedov } 4760daf62d9SStanislav Sedov /* current working directory vnode. */ 4770daf62d9SStanislav Sedov if (filed.fd_cdir) { 4780daf62d9SStanislav Sedov entry = filestat_new_entry(filed.fd_cdir, PS_FST_TYPE_VNODE, -1, 479d57486e2SRobert Watson PS_FST_FFLAG_READ, PS_FST_UFLAG_CDIR, 0, 0, NULL, 0); 4800daf62d9SStanislav Sedov if (entry != NULL) 4810daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 4820daf62d9SStanislav Sedov } 4830daf62d9SStanislav Sedov /* jail root, if any. */ 4840daf62d9SStanislav Sedov if (filed.fd_jdir) { 4850daf62d9SStanislav Sedov entry = filestat_new_entry(filed.fd_jdir, PS_FST_TYPE_VNODE, -1, 486d57486e2SRobert Watson PS_FST_FFLAG_READ, PS_FST_UFLAG_JAIL, 0, 0, NULL, 0); 4870daf62d9SStanislav Sedov if (entry != NULL) 4880daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 4890daf62d9SStanislav Sedov } 4900daf62d9SStanislav Sedov /* ktrace vnode, if one */ 4910daf62d9SStanislav Sedov if (kp->ki_tracep) { 4920daf62d9SStanislav Sedov entry = filestat_new_entry(kp->ki_tracep, PS_FST_TYPE_VNODE, -1, 4930daf62d9SStanislav Sedov PS_FST_FFLAG_READ | PS_FST_FFLAG_WRITE, 494d57486e2SRobert Watson PS_FST_UFLAG_TRACE, 0, 0, NULL, 0); 4950daf62d9SStanislav Sedov if (entry != NULL) 4960daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 4970daf62d9SStanislav Sedov } 4980daf62d9SStanislav Sedov /* text vnode, if one */ 4990daf62d9SStanislav Sedov if (kp->ki_textvp) { 5000daf62d9SStanislav Sedov entry = filestat_new_entry(kp->ki_textvp, PS_FST_TYPE_VNODE, -1, 501d57486e2SRobert Watson PS_FST_FFLAG_READ, PS_FST_UFLAG_TEXT, 0, 0, NULL, 0); 5020daf62d9SStanislav Sedov if (entry != NULL) 5030daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 5040daf62d9SStanislav Sedov } 5050daf62d9SStanislav Sedov /* Controlling terminal. */ 5060daf62d9SStanislav Sedov if ((vp = getctty(kd, kp)) != NULL) { 5070daf62d9SStanislav Sedov entry = filestat_new_entry(vp, PS_FST_TYPE_VNODE, -1, 5080daf62d9SStanislav Sedov PS_FST_FFLAG_READ | PS_FST_FFLAG_WRITE, 509d57486e2SRobert Watson PS_FST_UFLAG_CTTY, 0, 0, NULL, 0); 5100daf62d9SStanislav Sedov if (entry != NULL) 5110daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 5120daf62d9SStanislav Sedov } 5130daf62d9SStanislav Sedov 5140daf62d9SStanislav Sedov nfiles = filed.fd_lastfile + 1; 5150daf62d9SStanislav Sedov ofiles = malloc(nfiles * sizeof(struct file *)); 5160daf62d9SStanislav Sedov if (ofiles == NULL) { 51765869214SJilles Tjoelker warn("malloc(%zu)", nfiles * sizeof(struct file *)); 5180daf62d9SStanislav Sedov goto do_mmapped; 5190daf62d9SStanislav Sedov } 5200daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)filed.fd_ofiles, ofiles, 5210daf62d9SStanislav Sedov nfiles * sizeof(struct file *))) { 5220daf62d9SStanislav Sedov warnx("cannot read file structures at %p", 5230daf62d9SStanislav Sedov (void *)filed.fd_ofiles); 5240daf62d9SStanislav Sedov free(ofiles); 5250daf62d9SStanislav Sedov goto do_mmapped; 5260daf62d9SStanislav Sedov } 5270daf62d9SStanislav Sedov for (i = 0; i <= filed.fd_lastfile; i++) { 5280daf62d9SStanislav Sedov if (ofiles[i] == NULL) 5290daf62d9SStanislav Sedov continue; 5300daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)ofiles[i], &file, 5310daf62d9SStanislav Sedov sizeof(struct file))) { 5320daf62d9SStanislav Sedov warnx("can't read file %d at %p", i, 5330daf62d9SStanislav Sedov (void *)ofiles[i]); 5340daf62d9SStanislav Sedov continue; 5350daf62d9SStanislav Sedov } 5360daf62d9SStanislav Sedov switch (file.f_type) { 5370daf62d9SStanislav Sedov case DTYPE_VNODE: 5380daf62d9SStanislav Sedov type = PS_FST_TYPE_VNODE; 5390daf62d9SStanislav Sedov data = file.f_vnode; 5400daf62d9SStanislav Sedov break; 5410daf62d9SStanislav Sedov case DTYPE_SOCKET: 5420daf62d9SStanislav Sedov type = PS_FST_TYPE_SOCKET; 5430daf62d9SStanislav Sedov data = file.f_data; 5440daf62d9SStanislav Sedov break; 5450daf62d9SStanislav Sedov case DTYPE_PIPE: 5460daf62d9SStanislav Sedov type = PS_FST_TYPE_PIPE; 5470daf62d9SStanislav Sedov data = file.f_data; 5480daf62d9SStanislav Sedov break; 5490daf62d9SStanislav Sedov case DTYPE_FIFO: 5500daf62d9SStanislav Sedov type = PS_FST_TYPE_FIFO; 5510daf62d9SStanislav Sedov data = file.f_vnode; 5520daf62d9SStanislav Sedov break; 5530daf62d9SStanislav Sedov #ifdef DTYPE_PTS 5540daf62d9SStanislav Sedov case DTYPE_PTS: 5550daf62d9SStanislav Sedov type = PS_FST_TYPE_PTS; 5560daf62d9SStanislav Sedov data = file.f_data; 5570daf62d9SStanislav Sedov break; 5580daf62d9SStanislav Sedov #endif 559e506e182SJohn Baldwin case DTYPE_SHM: 560e506e182SJohn Baldwin type = PS_FST_TYPE_SHM; 561e506e182SJohn Baldwin data = file.f_data; 562e506e182SJohn Baldwin break; 5630daf62d9SStanislav Sedov default: 5640daf62d9SStanislav Sedov continue; 5650daf62d9SStanislav Sedov } 566d57486e2SRobert Watson /* XXXRW: No capability rights support for kvm yet. */ 5670daf62d9SStanislav Sedov entry = filestat_new_entry(data, type, i, 568d57486e2SRobert Watson to_filestat_flags(file.f_flag), 0, 0, 0, NULL, 0); 5690daf62d9SStanislav Sedov if (entry != NULL) 5700daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 5710daf62d9SStanislav Sedov } 5720daf62d9SStanislav Sedov free(ofiles); 5730daf62d9SStanislav Sedov 5740daf62d9SStanislav Sedov do_mmapped: 5750daf62d9SStanislav Sedov 5760daf62d9SStanislav Sedov /* 5770daf62d9SStanislav Sedov * Process mmapped files if requested. 5780daf62d9SStanislav Sedov */ 5790daf62d9SStanislav Sedov if (mmapped) { 5800daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)kp->ki_vmspace, &vmspace, 5810daf62d9SStanislav Sedov sizeof(vmspace))) { 5820daf62d9SStanislav Sedov warnx("can't read vmspace at %p", 5830daf62d9SStanislav Sedov (void *)kp->ki_vmspace); 5840daf62d9SStanislav Sedov goto exit; 5850daf62d9SStanislav Sedov } 5860daf62d9SStanislav Sedov map = &vmspace.vm_map; 5870daf62d9SStanislav Sedov 5880daf62d9SStanislav Sedov for (entryp = map->header.next; 5890daf62d9SStanislav Sedov entryp != &kp->ki_vmspace->vm_map.header; 5900daf62d9SStanislav Sedov entryp = vmentry.next) { 5910daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)entryp, &vmentry, 5920daf62d9SStanislav Sedov sizeof(vmentry))) { 5930daf62d9SStanislav Sedov warnx("can't read vm_map_entry at %p", 5940daf62d9SStanislav Sedov (void *)entryp); 5950daf62d9SStanislav Sedov continue; 5960daf62d9SStanislav Sedov } 5970daf62d9SStanislav Sedov if (vmentry.eflags & MAP_ENTRY_IS_SUB_MAP) 5980daf62d9SStanislav Sedov continue; 5990daf62d9SStanislav Sedov if ((objp = vmentry.object.vm_object) == NULL) 6000daf62d9SStanislav Sedov continue; 6010daf62d9SStanislav Sedov for (; objp; objp = object.backing_object) { 6020daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)objp, 6030daf62d9SStanislav Sedov &object, sizeof(object))) { 6040daf62d9SStanislav Sedov warnx("can't read vm_object at %p", 6050daf62d9SStanislav Sedov (void *)objp); 6060daf62d9SStanislav Sedov break; 6070daf62d9SStanislav Sedov } 6080daf62d9SStanislav Sedov } 6090daf62d9SStanislav Sedov 6100daf62d9SStanislav Sedov /* We want only vnode objects. */ 6110daf62d9SStanislav Sedov if (object.type != OBJT_VNODE) 6120daf62d9SStanislav Sedov continue; 6130daf62d9SStanislav Sedov 6140daf62d9SStanislav Sedov prot = vmentry.protection; 6150daf62d9SStanislav Sedov fflags = 0; 6160daf62d9SStanislav Sedov if (prot & VM_PROT_READ) 6170daf62d9SStanislav Sedov fflags = PS_FST_FFLAG_READ; 618279a233dSJilles Tjoelker if ((vmentry.eflags & MAP_ENTRY_COW) == 0 && 619279a233dSJilles Tjoelker prot & VM_PROT_WRITE) 6200daf62d9SStanislav Sedov fflags |= PS_FST_FFLAG_WRITE; 6210daf62d9SStanislav Sedov 6220daf62d9SStanislav Sedov /* 6230daf62d9SStanislav Sedov * Create filestat entry. 6240daf62d9SStanislav Sedov */ 6250daf62d9SStanislav Sedov entry = filestat_new_entry(object.handle, 6260daf62d9SStanislav Sedov PS_FST_TYPE_VNODE, -1, fflags, 627d57486e2SRobert Watson PS_FST_UFLAG_MMAP, 0, 0, NULL, 0); 6280daf62d9SStanislav Sedov if (entry != NULL) 6290daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 6300daf62d9SStanislav Sedov } 6310daf62d9SStanislav Sedov } 6320daf62d9SStanislav Sedov exit: 6330daf62d9SStanislav Sedov return (head); 6340daf62d9SStanislav Sedov } 6350daf62d9SStanislav Sedov 6360daf62d9SStanislav Sedov /* 6370daf62d9SStanislav Sedov * kinfo types to filestat translation. 6380daf62d9SStanislav Sedov */ 6390daf62d9SStanislav Sedov static int 6400daf62d9SStanislav Sedov kinfo_type2fst(int kftype) 6410daf62d9SStanislav Sedov { 6420daf62d9SStanislav Sedov static struct { 6430daf62d9SStanislav Sedov int kf_type; 6440daf62d9SStanislav Sedov int fst_type; 6450daf62d9SStanislav Sedov } kftypes2fst[] = { 6460daf62d9SStanislav Sedov { KF_TYPE_CRYPTO, PS_FST_TYPE_CRYPTO }, 6470daf62d9SStanislav Sedov { KF_TYPE_FIFO, PS_FST_TYPE_FIFO }, 6480daf62d9SStanislav Sedov { KF_TYPE_KQUEUE, PS_FST_TYPE_KQUEUE }, 6490daf62d9SStanislav Sedov { KF_TYPE_MQUEUE, PS_FST_TYPE_MQUEUE }, 6500daf62d9SStanislav Sedov { KF_TYPE_NONE, PS_FST_TYPE_NONE }, 6510daf62d9SStanislav Sedov { KF_TYPE_PIPE, PS_FST_TYPE_PIPE }, 6520daf62d9SStanislav Sedov { KF_TYPE_PTS, PS_FST_TYPE_PTS }, 6530daf62d9SStanislav Sedov { KF_TYPE_SEM, PS_FST_TYPE_SEM }, 6540daf62d9SStanislav Sedov { KF_TYPE_SHM, PS_FST_TYPE_SHM }, 6550daf62d9SStanislav Sedov { KF_TYPE_SOCKET, PS_FST_TYPE_SOCKET }, 6560daf62d9SStanislav Sedov { KF_TYPE_VNODE, PS_FST_TYPE_VNODE }, 6570daf62d9SStanislav Sedov { KF_TYPE_UNKNOWN, PS_FST_TYPE_UNKNOWN } 6580daf62d9SStanislav Sedov }; 6590daf62d9SStanislav Sedov #define NKFTYPES (sizeof(kftypes2fst) / sizeof(*kftypes2fst)) 6600daf62d9SStanislav Sedov unsigned int i; 6610daf62d9SStanislav Sedov 6620daf62d9SStanislav Sedov for (i = 0; i < NKFTYPES; i++) 6630daf62d9SStanislav Sedov if (kftypes2fst[i].kf_type == kftype) 6640daf62d9SStanislav Sedov break; 6650daf62d9SStanislav Sedov if (i == NKFTYPES) 6660daf62d9SStanislav Sedov return (PS_FST_TYPE_UNKNOWN); 6670daf62d9SStanislav Sedov return (kftypes2fst[i].fst_type); 6680daf62d9SStanislav Sedov } 6690daf62d9SStanislav Sedov 6700daf62d9SStanislav Sedov /* 6710daf62d9SStanislav Sedov * kinfo flags to filestat translation. 6720daf62d9SStanislav Sedov */ 6730daf62d9SStanislav Sedov static int 6740daf62d9SStanislav Sedov kinfo_fflags2fst(int kfflags) 6750daf62d9SStanislav Sedov { 6760daf62d9SStanislav Sedov static struct { 6770daf62d9SStanislav Sedov int kf_flag; 6780daf62d9SStanislav Sedov int fst_flag; 6790daf62d9SStanislav Sedov } kfflags2fst[] = { 6800daf62d9SStanislav Sedov { KF_FLAG_APPEND, PS_FST_FFLAG_APPEND }, 6810daf62d9SStanislav Sedov { KF_FLAG_ASYNC, PS_FST_FFLAG_ASYNC }, 6820daf62d9SStanislav Sedov { KF_FLAG_CREAT, PS_FST_FFLAG_CREAT }, 6830daf62d9SStanislav Sedov { KF_FLAG_DIRECT, PS_FST_FFLAG_DIRECT }, 6840daf62d9SStanislav Sedov { KF_FLAG_EXCL, PS_FST_FFLAG_EXCL }, 6850daf62d9SStanislav Sedov { KF_FLAG_EXEC, PS_FST_FFLAG_EXEC }, 6860daf62d9SStanislav Sedov { KF_FLAG_EXLOCK, PS_FST_FFLAG_EXLOCK }, 6870daf62d9SStanislav Sedov { KF_FLAG_FSYNC, PS_FST_FFLAG_SYNC }, 6880daf62d9SStanislav Sedov { KF_FLAG_HASLOCK, PS_FST_FFLAG_HASLOCK }, 6890daf62d9SStanislav Sedov { KF_FLAG_NOFOLLOW, PS_FST_FFLAG_NOFOLLOW }, 6900daf62d9SStanislav Sedov { KF_FLAG_NONBLOCK, PS_FST_FFLAG_NONBLOCK }, 6910daf62d9SStanislav Sedov { KF_FLAG_READ, PS_FST_FFLAG_READ }, 6920daf62d9SStanislav Sedov { KF_FLAG_SHLOCK, PS_FST_FFLAG_SHLOCK }, 6930daf62d9SStanislav Sedov { KF_FLAG_TRUNC, PS_FST_FFLAG_TRUNC }, 6940daf62d9SStanislav Sedov { KF_FLAG_WRITE, PS_FST_FFLAG_WRITE } 6950daf62d9SStanislav Sedov }; 6960daf62d9SStanislav Sedov #define NKFFLAGS (sizeof(kfflags2fst) / sizeof(*kfflags2fst)) 6970daf62d9SStanislav Sedov unsigned int i; 6980daf62d9SStanislav Sedov int flags; 6990daf62d9SStanislav Sedov 7000daf62d9SStanislav Sedov flags = 0; 7010daf62d9SStanislav Sedov for (i = 0; i < NKFFLAGS; i++) 7020daf62d9SStanislav Sedov if ((kfflags & kfflags2fst[i].kf_flag) != 0) 7030daf62d9SStanislav Sedov flags |= kfflags2fst[i].fst_flag; 7040daf62d9SStanislav Sedov return (flags); 7050daf62d9SStanislav Sedov } 7060daf62d9SStanislav Sedov 7070daf62d9SStanislav Sedov static int 7080daf62d9SStanislav Sedov kinfo_uflags2fst(int fd) 7090daf62d9SStanislav Sedov { 7100daf62d9SStanislav Sedov 7110daf62d9SStanislav Sedov switch (fd) { 7120daf62d9SStanislav Sedov case KF_FD_TYPE_CTTY: 7130daf62d9SStanislav Sedov return (PS_FST_UFLAG_CTTY); 7140daf62d9SStanislav Sedov case KF_FD_TYPE_CWD: 7150daf62d9SStanislav Sedov return (PS_FST_UFLAG_CDIR); 7160daf62d9SStanislav Sedov case KF_FD_TYPE_JAIL: 7170daf62d9SStanislav Sedov return (PS_FST_UFLAG_JAIL); 7180daf62d9SStanislav Sedov case KF_FD_TYPE_TEXT: 7190daf62d9SStanislav Sedov return (PS_FST_UFLAG_TEXT); 7200daf62d9SStanislav Sedov case KF_FD_TYPE_TRACE: 7210daf62d9SStanislav Sedov return (PS_FST_UFLAG_TRACE); 7220daf62d9SStanislav Sedov case KF_FD_TYPE_ROOT: 7230daf62d9SStanislav Sedov return (PS_FST_UFLAG_RDIR); 7240daf62d9SStanislav Sedov } 7250daf62d9SStanislav Sedov return (0); 7260daf62d9SStanislav Sedov } 7270daf62d9SStanislav Sedov 7287153ad2bSMikolaj Golub static struct kinfo_file * 7297153ad2bSMikolaj Golub kinfo_getfile_core(struct procstat_core *core, int *cntp) 7307153ad2bSMikolaj Golub { 7317153ad2bSMikolaj Golub int cnt; 7327153ad2bSMikolaj Golub size_t len; 7337153ad2bSMikolaj Golub char *buf, *bp, *eb; 7347153ad2bSMikolaj Golub struct kinfo_file *kif, *kp, *kf; 7357153ad2bSMikolaj Golub 7367153ad2bSMikolaj Golub buf = procstat_core_get(core, PSC_TYPE_FILES, NULL, &len); 7377153ad2bSMikolaj Golub if (buf == NULL) 7387153ad2bSMikolaj Golub return (NULL); 7397153ad2bSMikolaj Golub /* 7407153ad2bSMikolaj Golub * XXXMG: The code below is just copy&past from libutil. 7417153ad2bSMikolaj Golub * The code duplication can be avoided if libutil 7427153ad2bSMikolaj Golub * is extended to provide something like: 7437153ad2bSMikolaj Golub * struct kinfo_file *kinfo_getfile_from_buf(const char *buf, 7447153ad2bSMikolaj Golub * size_t len, int *cntp); 7457153ad2bSMikolaj Golub */ 7467153ad2bSMikolaj Golub 7477153ad2bSMikolaj Golub /* Pass 1: count items */ 7487153ad2bSMikolaj Golub cnt = 0; 7497153ad2bSMikolaj Golub bp = buf; 7507153ad2bSMikolaj Golub eb = buf + len; 7517153ad2bSMikolaj Golub while (bp < eb) { 7527153ad2bSMikolaj Golub kf = (struct kinfo_file *)(uintptr_t)bp; 7537153ad2bSMikolaj Golub bp += kf->kf_structsize; 7547153ad2bSMikolaj Golub cnt++; 7557153ad2bSMikolaj Golub } 7567153ad2bSMikolaj Golub 7577153ad2bSMikolaj Golub kif = calloc(cnt, sizeof(*kif)); 7587153ad2bSMikolaj Golub if (kif == NULL) { 7597153ad2bSMikolaj Golub free(buf); 7607153ad2bSMikolaj Golub return (NULL); 7617153ad2bSMikolaj Golub } 7627153ad2bSMikolaj Golub bp = buf; 7637153ad2bSMikolaj Golub eb = buf + len; 7647153ad2bSMikolaj Golub kp = kif; 7657153ad2bSMikolaj Golub /* Pass 2: unpack */ 7667153ad2bSMikolaj Golub while (bp < eb) { 7677153ad2bSMikolaj Golub kf = (struct kinfo_file *)(uintptr_t)bp; 7687153ad2bSMikolaj Golub /* Copy/expand into pre-zeroed buffer */ 7697153ad2bSMikolaj Golub memcpy(kp, kf, kf->kf_structsize); 7707153ad2bSMikolaj Golub /* Advance to next packed record */ 7717153ad2bSMikolaj Golub bp += kf->kf_structsize; 7727153ad2bSMikolaj Golub /* Set field size to fixed length, advance */ 7737153ad2bSMikolaj Golub kp->kf_structsize = sizeof(*kp); 7747153ad2bSMikolaj Golub kp++; 7757153ad2bSMikolaj Golub } 7767153ad2bSMikolaj Golub free(buf); 7777153ad2bSMikolaj Golub *cntp = cnt; 7787153ad2bSMikolaj Golub return (kif); /* Caller must free() return value */ 7797153ad2bSMikolaj Golub } 7807153ad2bSMikolaj Golub 7810daf62d9SStanislav Sedov static struct filestat_list * 7827153ad2bSMikolaj Golub procstat_getfiles_sysctl(struct procstat *procstat, struct kinfo_proc *kp, 7837153ad2bSMikolaj Golub int mmapped) 7840daf62d9SStanislav Sedov { 7850daf62d9SStanislav Sedov struct kinfo_file *kif, *files; 7860daf62d9SStanislav Sedov struct kinfo_vmentry *kve, *vmentries; 7870daf62d9SStanislav Sedov struct filestat_list *head; 7880daf62d9SStanislav Sedov struct filestat *entry; 7890daf62d9SStanislav Sedov char *path; 7900daf62d9SStanislav Sedov off_t offset; 7910daf62d9SStanislav Sedov int cnt, fd, fflags; 7920daf62d9SStanislav Sedov int i, type, uflags; 7930daf62d9SStanislav Sedov int refcount; 794d57486e2SRobert Watson cap_rights_t cap_rights; 7950daf62d9SStanislav Sedov 7960daf62d9SStanislav Sedov assert(kp); 7970daf62d9SStanislav Sedov if (kp->ki_fd == NULL) 7980daf62d9SStanislav Sedov return (NULL); 7997153ad2bSMikolaj Golub switch(procstat->type) { 8007153ad2bSMikolaj Golub case PROCSTAT_SYSCTL: 8010daf62d9SStanislav Sedov files = kinfo_getfile(kp->ki_pid, &cnt); 8027153ad2bSMikolaj Golub break; 8037153ad2bSMikolaj Golub case PROCSTAT_CORE: 8047153ad2bSMikolaj Golub files = kinfo_getfile_core(procstat->core, &cnt); 8057153ad2bSMikolaj Golub break; 8067153ad2bSMikolaj Golub default: 8077153ad2bSMikolaj Golub assert(!"invalid type"); 8087153ad2bSMikolaj Golub } 8090daf62d9SStanislav Sedov if (files == NULL && errno != EPERM) { 8100daf62d9SStanislav Sedov warn("kinfo_getfile()"); 8110daf62d9SStanislav Sedov return (NULL); 8120daf62d9SStanislav Sedov } 8130daf62d9SStanislav Sedov procstat->files = files; 8140daf62d9SStanislav Sedov 8150daf62d9SStanislav Sedov /* 8160daf62d9SStanislav Sedov * Allocate list head. 8170daf62d9SStanislav Sedov */ 8180daf62d9SStanislav Sedov head = malloc(sizeof(*head)); 8190daf62d9SStanislav Sedov if (head == NULL) 8200daf62d9SStanislav Sedov return (NULL); 8210daf62d9SStanislav Sedov STAILQ_INIT(head); 8220daf62d9SStanislav Sedov for (i = 0; i < cnt; i++) { 8230daf62d9SStanislav Sedov kif = &files[i]; 8240daf62d9SStanislav Sedov 8250daf62d9SStanislav Sedov type = kinfo_type2fst(kif->kf_type); 8260daf62d9SStanislav Sedov fd = kif->kf_fd >= 0 ? kif->kf_fd : -1; 8270daf62d9SStanislav Sedov fflags = kinfo_fflags2fst(kif->kf_flags); 8280daf62d9SStanislav Sedov uflags = kinfo_uflags2fst(kif->kf_fd); 8290daf62d9SStanislav Sedov refcount = kif->kf_ref_count; 8300daf62d9SStanislav Sedov offset = kif->kf_offset; 8310daf62d9SStanislav Sedov if (*kif->kf_path != '\0') 8320daf62d9SStanislav Sedov path = strdup(kif->kf_path); 8330daf62d9SStanislav Sedov else 8340daf62d9SStanislav Sedov path = NULL; 835d57486e2SRobert Watson cap_rights = kif->kf_cap_rights; 8360daf62d9SStanislav Sedov 8370daf62d9SStanislav Sedov /* 8380daf62d9SStanislav Sedov * Create filestat entry. 8390daf62d9SStanislav Sedov */ 8400daf62d9SStanislav Sedov entry = filestat_new_entry(kif, type, fd, fflags, uflags, 841d57486e2SRobert Watson refcount, offset, path, cap_rights); 8420daf62d9SStanislav Sedov if (entry != NULL) 8430daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 8440daf62d9SStanislav Sedov } 8450daf62d9SStanislav Sedov if (mmapped != 0) { 84639680c7bSMikolaj Golub vmentries = procstat_getvmmap(procstat, kp, &cnt); 8470daf62d9SStanislav Sedov procstat->vmentries = vmentries; 8480daf62d9SStanislav Sedov if (vmentries == NULL || cnt == 0) 8490daf62d9SStanislav Sedov goto fail; 8500daf62d9SStanislav Sedov for (i = 0; i < cnt; i++) { 8510daf62d9SStanislav Sedov kve = &vmentries[i]; 8520daf62d9SStanislav Sedov if (kve->kve_type != KVME_TYPE_VNODE) 8530daf62d9SStanislav Sedov continue; 8540daf62d9SStanislav Sedov fflags = 0; 8550daf62d9SStanislav Sedov if (kve->kve_protection & KVME_PROT_READ) 8560daf62d9SStanislav Sedov fflags = PS_FST_FFLAG_READ; 857279a233dSJilles Tjoelker if ((kve->kve_flags & KVME_FLAG_COW) == 0 && 858279a233dSJilles Tjoelker kve->kve_protection & KVME_PROT_WRITE) 8590daf62d9SStanislav Sedov fflags |= PS_FST_FFLAG_WRITE; 8600daf62d9SStanislav Sedov offset = kve->kve_offset; 8610daf62d9SStanislav Sedov refcount = kve->kve_ref_count; 8620daf62d9SStanislav Sedov if (*kve->kve_path != '\0') 8630daf62d9SStanislav Sedov path = strdup(kve->kve_path); 8640daf62d9SStanislav Sedov else 8650daf62d9SStanislav Sedov path = NULL; 8660daf62d9SStanislav Sedov entry = filestat_new_entry(kve, PS_FST_TYPE_VNODE, -1, 867d57486e2SRobert Watson fflags, PS_FST_UFLAG_MMAP, refcount, offset, path, 868d57486e2SRobert Watson 0); 8690daf62d9SStanislav Sedov if (entry != NULL) 8700daf62d9SStanislav Sedov STAILQ_INSERT_TAIL(head, entry, next); 8710daf62d9SStanislav Sedov } 8720daf62d9SStanislav Sedov } 8730daf62d9SStanislav Sedov fail: 8740daf62d9SStanislav Sedov return (head); 8750daf62d9SStanislav Sedov } 8760daf62d9SStanislav Sedov 8770daf62d9SStanislav Sedov int 8780daf62d9SStanislav Sedov procstat_get_pipe_info(struct procstat *procstat, struct filestat *fst, 8790daf62d9SStanislav Sedov struct pipestat *ps, char *errbuf) 8800daf62d9SStanislav Sedov { 8810daf62d9SStanislav Sedov 8820daf62d9SStanislav Sedov assert(ps); 8830daf62d9SStanislav Sedov if (procstat->type == PROCSTAT_KVM) { 8840daf62d9SStanislav Sedov return (procstat_get_pipe_info_kvm(procstat->kd, fst, ps, 8850daf62d9SStanislav Sedov errbuf)); 8867153ad2bSMikolaj Golub } else if (procstat->type == PROCSTAT_SYSCTL || 8877153ad2bSMikolaj Golub procstat->type == PROCSTAT_CORE) { 8880daf62d9SStanislav Sedov return (procstat_get_pipe_info_sysctl(fst, ps, errbuf)); 8890daf62d9SStanislav Sedov } else { 89080905c35SJilles Tjoelker warnx("unknown access method: %d", procstat->type); 8910daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 8920daf62d9SStanislav Sedov return (1); 8930daf62d9SStanislav Sedov } 8940daf62d9SStanislav Sedov } 8950daf62d9SStanislav Sedov 8960daf62d9SStanislav Sedov static int 8970daf62d9SStanislav Sedov procstat_get_pipe_info_kvm(kvm_t *kd, struct filestat *fst, 8980daf62d9SStanislav Sedov struct pipestat *ps, char *errbuf) 8990daf62d9SStanislav Sedov { 9000daf62d9SStanislav Sedov struct pipe pi; 9010daf62d9SStanislav Sedov void *pipep; 9020daf62d9SStanislav Sedov 9030daf62d9SStanislav Sedov assert(kd); 9040daf62d9SStanislav Sedov assert(ps); 9050daf62d9SStanislav Sedov assert(fst); 9060daf62d9SStanislav Sedov bzero(ps, sizeof(*ps)); 9070daf62d9SStanislav Sedov pipep = fst->fs_typedep; 9080daf62d9SStanislav Sedov if (pipep == NULL) 9090daf62d9SStanislav Sedov goto fail; 9100daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)pipep, &pi, sizeof(struct pipe))) { 9110daf62d9SStanislav Sedov warnx("can't read pipe at %p", (void *)pipep); 9120daf62d9SStanislav Sedov goto fail; 9130daf62d9SStanislav Sedov } 9140daf62d9SStanislav Sedov ps->addr = (uintptr_t)pipep; 9150daf62d9SStanislav Sedov ps->peer = (uintptr_t)pi.pipe_peer; 9160daf62d9SStanislav Sedov ps->buffer_cnt = pi.pipe_buffer.cnt; 9170daf62d9SStanislav Sedov return (0); 9180daf62d9SStanislav Sedov 9190daf62d9SStanislav Sedov fail: 9200daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 9210daf62d9SStanislav Sedov return (1); 9220daf62d9SStanislav Sedov } 9230daf62d9SStanislav Sedov 9240daf62d9SStanislav Sedov static int 9250daf62d9SStanislav Sedov procstat_get_pipe_info_sysctl(struct filestat *fst, struct pipestat *ps, 9260daf62d9SStanislav Sedov char *errbuf __unused) 9270daf62d9SStanislav Sedov { 9280daf62d9SStanislav Sedov struct kinfo_file *kif; 9290daf62d9SStanislav Sedov 9300daf62d9SStanislav Sedov assert(ps); 9310daf62d9SStanislav Sedov assert(fst); 9320daf62d9SStanislav Sedov bzero(ps, sizeof(*ps)); 9330daf62d9SStanislav Sedov kif = fst->fs_typedep; 9340daf62d9SStanislav Sedov if (kif == NULL) 9350daf62d9SStanislav Sedov return (1); 9360daf62d9SStanislav Sedov ps->addr = kif->kf_un.kf_pipe.kf_pipe_addr; 9370daf62d9SStanislav Sedov ps->peer = kif->kf_un.kf_pipe.kf_pipe_peer; 9380daf62d9SStanislav Sedov ps->buffer_cnt = kif->kf_un.kf_pipe.kf_pipe_buffer_cnt; 9390daf62d9SStanislav Sedov return (0); 9400daf62d9SStanislav Sedov } 9410daf62d9SStanislav Sedov 9420daf62d9SStanislav Sedov int 9430daf62d9SStanislav Sedov procstat_get_pts_info(struct procstat *procstat, struct filestat *fst, 9440daf62d9SStanislav Sedov struct ptsstat *pts, char *errbuf) 9450daf62d9SStanislav Sedov { 9460daf62d9SStanislav Sedov 9470daf62d9SStanislav Sedov assert(pts); 9480daf62d9SStanislav Sedov if (procstat->type == PROCSTAT_KVM) { 9490daf62d9SStanislav Sedov return (procstat_get_pts_info_kvm(procstat->kd, fst, pts, 9500daf62d9SStanislav Sedov errbuf)); 9517153ad2bSMikolaj Golub } else if (procstat->type == PROCSTAT_SYSCTL || 9527153ad2bSMikolaj Golub procstat->type == PROCSTAT_CORE) { 9530daf62d9SStanislav Sedov return (procstat_get_pts_info_sysctl(fst, pts, errbuf)); 9540daf62d9SStanislav Sedov } else { 95580905c35SJilles Tjoelker warnx("unknown access method: %d", procstat->type); 9560daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 9570daf62d9SStanislav Sedov return (1); 9580daf62d9SStanislav Sedov } 9590daf62d9SStanislav Sedov } 9600daf62d9SStanislav Sedov 9610daf62d9SStanislav Sedov static int 9620daf62d9SStanislav Sedov procstat_get_pts_info_kvm(kvm_t *kd, struct filestat *fst, 9630daf62d9SStanislav Sedov struct ptsstat *pts, char *errbuf) 9640daf62d9SStanislav Sedov { 9650daf62d9SStanislav Sedov struct tty tty; 9660daf62d9SStanislav Sedov void *ttyp; 9670daf62d9SStanislav Sedov 9680daf62d9SStanislav Sedov assert(kd); 9690daf62d9SStanislav Sedov assert(pts); 9700daf62d9SStanislav Sedov assert(fst); 9710daf62d9SStanislav Sedov bzero(pts, sizeof(*pts)); 9720daf62d9SStanislav Sedov ttyp = fst->fs_typedep; 9730daf62d9SStanislav Sedov if (ttyp == NULL) 9740daf62d9SStanislav Sedov goto fail; 9750daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)ttyp, &tty, sizeof(struct tty))) { 9760daf62d9SStanislav Sedov warnx("can't read tty at %p", (void *)ttyp); 9770daf62d9SStanislav Sedov goto fail; 9780daf62d9SStanislav Sedov } 9790daf62d9SStanislav Sedov pts->dev = dev2udev(kd, tty.t_dev); 9800daf62d9SStanislav Sedov (void)kdevtoname(kd, tty.t_dev, pts->devname); 9810daf62d9SStanislav Sedov return (0); 9820daf62d9SStanislav Sedov 9830daf62d9SStanislav Sedov fail: 9840daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 9850daf62d9SStanislav Sedov return (1); 9860daf62d9SStanislav Sedov } 9870daf62d9SStanislav Sedov 9880daf62d9SStanislav Sedov static int 9890daf62d9SStanislav Sedov procstat_get_pts_info_sysctl(struct filestat *fst, struct ptsstat *pts, 9900daf62d9SStanislav Sedov char *errbuf __unused) 9910daf62d9SStanislav Sedov { 9920daf62d9SStanislav Sedov struct kinfo_file *kif; 9930daf62d9SStanislav Sedov 9940daf62d9SStanislav Sedov assert(pts); 9950daf62d9SStanislav Sedov assert(fst); 9960daf62d9SStanislav Sedov bzero(pts, sizeof(*pts)); 9970daf62d9SStanislav Sedov kif = fst->fs_typedep; 9980daf62d9SStanislav Sedov if (kif == NULL) 9990daf62d9SStanislav Sedov return (0); 10000daf62d9SStanislav Sedov pts->dev = kif->kf_un.kf_pts.kf_pts_dev; 10010daf62d9SStanislav Sedov strlcpy(pts->devname, kif->kf_path, sizeof(pts->devname)); 10020daf62d9SStanislav Sedov return (0); 10030daf62d9SStanislav Sedov } 10040daf62d9SStanislav Sedov 10050daf62d9SStanislav Sedov int 1006e506e182SJohn Baldwin procstat_get_shm_info(struct procstat *procstat, struct filestat *fst, 1007e506e182SJohn Baldwin struct shmstat *shm, char *errbuf) 1008e506e182SJohn Baldwin { 1009e506e182SJohn Baldwin 1010e506e182SJohn Baldwin assert(shm); 1011e506e182SJohn Baldwin if (procstat->type == PROCSTAT_KVM) { 1012e506e182SJohn Baldwin return (procstat_get_shm_info_kvm(procstat->kd, fst, shm, 1013e506e182SJohn Baldwin errbuf)); 10147153ad2bSMikolaj Golub } else if (procstat->type == PROCSTAT_SYSCTL || 10157153ad2bSMikolaj Golub procstat->type == PROCSTAT_CORE) { 1016e506e182SJohn Baldwin return (procstat_get_shm_info_sysctl(fst, shm, errbuf)); 1017e506e182SJohn Baldwin } else { 1018e506e182SJohn Baldwin warnx("unknown access method: %d", procstat->type); 1019e506e182SJohn Baldwin snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 1020e506e182SJohn Baldwin return (1); 1021e506e182SJohn Baldwin } 1022e506e182SJohn Baldwin } 1023e506e182SJohn Baldwin 1024e506e182SJohn Baldwin static int 1025e506e182SJohn Baldwin procstat_get_shm_info_kvm(kvm_t *kd, struct filestat *fst, 1026e506e182SJohn Baldwin struct shmstat *shm, char *errbuf) 1027e506e182SJohn Baldwin { 1028e506e182SJohn Baldwin struct shmfd shmfd; 1029e506e182SJohn Baldwin void *shmfdp; 1030a9f5e425SJohn Baldwin char *path; 1031a9f5e425SJohn Baldwin int i; 1032e506e182SJohn Baldwin 1033e506e182SJohn Baldwin assert(kd); 1034e506e182SJohn Baldwin assert(shm); 1035e506e182SJohn Baldwin assert(fst); 1036e506e182SJohn Baldwin bzero(shm, sizeof(*shm)); 1037e506e182SJohn Baldwin shmfdp = fst->fs_typedep; 1038e506e182SJohn Baldwin if (shmfdp == NULL) 1039e506e182SJohn Baldwin goto fail; 1040e506e182SJohn Baldwin if (!kvm_read_all(kd, (unsigned long)shmfdp, &shmfd, 1041e506e182SJohn Baldwin sizeof(struct shmfd))) { 1042e506e182SJohn Baldwin warnx("can't read shmfd at %p", (void *)shmfdp); 1043e506e182SJohn Baldwin goto fail; 1044e506e182SJohn Baldwin } 1045e506e182SJohn Baldwin shm->mode = S_IFREG | shmfd.shm_mode; 1046e506e182SJohn Baldwin shm->size = shmfd.shm_size; 1047a9f5e425SJohn Baldwin if (fst->fs_path == NULL && shmfd.shm_path != NULL) { 1048a9f5e425SJohn Baldwin path = malloc(MAXPATHLEN); 1049a9f5e425SJohn Baldwin for (i = 0; i < MAXPATHLEN - 1; i++) { 1050a9f5e425SJohn Baldwin if (!kvm_read_all(kd, (unsigned long)shmfd.shm_path + i, 1051a9f5e425SJohn Baldwin path + i, 1)) 1052a9f5e425SJohn Baldwin break; 1053a9f5e425SJohn Baldwin if (path[i] == '\0') 1054a9f5e425SJohn Baldwin break; 1055a9f5e425SJohn Baldwin } 1056a9f5e425SJohn Baldwin path[i] = '\0'; 1057a9f5e425SJohn Baldwin if (i == 0) 1058a9f5e425SJohn Baldwin free(path); 1059a9f5e425SJohn Baldwin else 1060a9f5e425SJohn Baldwin fst->fs_path = path; 1061a9f5e425SJohn Baldwin } 1062e506e182SJohn Baldwin return (0); 1063e506e182SJohn Baldwin 1064e506e182SJohn Baldwin fail: 1065e506e182SJohn Baldwin snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 1066e506e182SJohn Baldwin return (1); 1067e506e182SJohn Baldwin } 1068e506e182SJohn Baldwin 1069e506e182SJohn Baldwin static int 1070e506e182SJohn Baldwin procstat_get_shm_info_sysctl(struct filestat *fst, struct shmstat *shm, 1071e506e182SJohn Baldwin char *errbuf __unused) 1072e506e182SJohn Baldwin { 1073e506e182SJohn Baldwin struct kinfo_file *kif; 1074e506e182SJohn Baldwin 1075e506e182SJohn Baldwin assert(shm); 1076e506e182SJohn Baldwin assert(fst); 1077e506e182SJohn Baldwin bzero(shm, sizeof(*shm)); 1078e506e182SJohn Baldwin kif = fst->fs_typedep; 1079e506e182SJohn Baldwin if (kif == NULL) 1080e506e182SJohn Baldwin return (0); 1081e506e182SJohn Baldwin shm->size = kif->kf_un.kf_file.kf_file_size; 1082e506e182SJohn Baldwin shm->mode = kif->kf_un.kf_file.kf_file_mode; 1083e506e182SJohn Baldwin return (0); 1084e506e182SJohn Baldwin } 1085e506e182SJohn Baldwin 1086e506e182SJohn Baldwin int 10870daf62d9SStanislav Sedov procstat_get_vnode_info(struct procstat *procstat, struct filestat *fst, 10880daf62d9SStanislav Sedov struct vnstat *vn, char *errbuf) 10890daf62d9SStanislav Sedov { 10900daf62d9SStanislav Sedov 10910daf62d9SStanislav Sedov assert(vn); 10920daf62d9SStanislav Sedov if (procstat->type == PROCSTAT_KVM) { 10930daf62d9SStanislav Sedov return (procstat_get_vnode_info_kvm(procstat->kd, fst, vn, 10940daf62d9SStanislav Sedov errbuf)); 10957153ad2bSMikolaj Golub } else if (procstat->type == PROCSTAT_SYSCTL || 10967153ad2bSMikolaj Golub procstat->type == PROCSTAT_CORE) { 10970daf62d9SStanislav Sedov return (procstat_get_vnode_info_sysctl(fst, vn, errbuf)); 10980daf62d9SStanislav Sedov } else { 109980905c35SJilles Tjoelker warnx("unknown access method: %d", procstat->type); 11000daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 11010daf62d9SStanislav Sedov return (1); 11020daf62d9SStanislav Sedov } 11030daf62d9SStanislav Sedov } 11040daf62d9SStanislav Sedov 11050daf62d9SStanislav Sedov static int 11060daf62d9SStanislav Sedov procstat_get_vnode_info_kvm(kvm_t *kd, struct filestat *fst, 11070daf62d9SStanislav Sedov struct vnstat *vn, char *errbuf) 11080daf62d9SStanislav Sedov { 11090daf62d9SStanislav Sedov /* Filesystem specific handlers. */ 11100daf62d9SStanislav Sedov #define FSTYPE(fst) {#fst, fst##_filestat} 11110daf62d9SStanislav Sedov struct { 11120daf62d9SStanislav Sedov const char *tag; 11130daf62d9SStanislav Sedov int (*handler)(kvm_t *kd, struct vnode *vp, 11140daf62d9SStanislav Sedov struct vnstat *vn); 11150daf62d9SStanislav Sedov } fstypes[] = { 11160daf62d9SStanislav Sedov FSTYPE(devfs), 11170daf62d9SStanislav Sedov FSTYPE(isofs), 11180daf62d9SStanislav Sedov FSTYPE(msdosfs), 11190daf62d9SStanislav Sedov FSTYPE(nfs), 11200daf62d9SStanislav Sedov FSTYPE(udf), 11210daf62d9SStanislav Sedov FSTYPE(ufs), 112259ea47d0SStanislav Sedov #ifdef LIBPROCSTAT_ZFS 11230daf62d9SStanislav Sedov FSTYPE(zfs), 11240daf62d9SStanislav Sedov #endif 11250daf62d9SStanislav Sedov }; 11260daf62d9SStanislav Sedov #define NTYPES (sizeof(fstypes) / sizeof(*fstypes)) 11270daf62d9SStanislav Sedov struct vnode vnode; 11280daf62d9SStanislav Sedov char tagstr[12]; 11290daf62d9SStanislav Sedov void *vp; 11300daf62d9SStanislav Sedov int error, found; 11310daf62d9SStanislav Sedov unsigned int i; 11320daf62d9SStanislav Sedov 11330daf62d9SStanislav Sedov assert(kd); 11340daf62d9SStanislav Sedov assert(vn); 11350daf62d9SStanislav Sedov assert(fst); 11360daf62d9SStanislav Sedov vp = fst->fs_typedep; 11370daf62d9SStanislav Sedov if (vp == NULL) 11380daf62d9SStanislav Sedov goto fail; 11390daf62d9SStanislav Sedov error = kvm_read_all(kd, (unsigned long)vp, &vnode, sizeof(vnode)); 11400daf62d9SStanislav Sedov if (error == 0) { 11410daf62d9SStanislav Sedov warnx("can't read vnode at %p", (void *)vp); 11420daf62d9SStanislav Sedov goto fail; 11430daf62d9SStanislav Sedov } 11440daf62d9SStanislav Sedov bzero(vn, sizeof(*vn)); 11450daf62d9SStanislav Sedov vn->vn_type = vntype2psfsttype(vnode.v_type); 11460daf62d9SStanislav Sedov if (vnode.v_type == VNON || vnode.v_type == VBAD) 11470daf62d9SStanislav Sedov return (0); 11480daf62d9SStanislav Sedov error = kvm_read_all(kd, (unsigned long)vnode.v_tag, tagstr, 11490daf62d9SStanislav Sedov sizeof(tagstr)); 11500daf62d9SStanislav Sedov if (error == 0) { 11510daf62d9SStanislav Sedov warnx("can't read v_tag at %p", (void *)vp); 11520daf62d9SStanislav Sedov goto fail; 11530daf62d9SStanislav Sedov } 11540daf62d9SStanislav Sedov tagstr[sizeof(tagstr) - 1] = '\0'; 11550daf62d9SStanislav Sedov 11560daf62d9SStanislav Sedov /* 11570daf62d9SStanislav Sedov * Find appropriate handler. 11580daf62d9SStanislav Sedov */ 11590daf62d9SStanislav Sedov for (i = 0, found = 0; i < NTYPES; i++) 11600daf62d9SStanislav Sedov if (!strcmp(fstypes[i].tag, tagstr)) { 11610daf62d9SStanislav Sedov if (fstypes[i].handler(kd, &vnode, vn) != 0) { 11620daf62d9SStanislav Sedov goto fail; 11630daf62d9SStanislav Sedov } 11640daf62d9SStanislav Sedov break; 11650daf62d9SStanislav Sedov } 11660daf62d9SStanislav Sedov if (i == NTYPES) { 11670daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "?(%s)", tagstr); 11680daf62d9SStanislav Sedov return (1); 11690daf62d9SStanislav Sedov } 11700daf62d9SStanislav Sedov vn->vn_mntdir = getmnton(kd, vnode.v_mount); 11710daf62d9SStanislav Sedov if ((vnode.v_type == VBLK || vnode.v_type == VCHR) && 11720daf62d9SStanislav Sedov vnode.v_rdev != NULL){ 11730daf62d9SStanislav Sedov vn->vn_dev = dev2udev(kd, vnode.v_rdev); 11740daf62d9SStanislav Sedov (void)kdevtoname(kd, vnode.v_rdev, vn->vn_devname); 11750daf62d9SStanislav Sedov } else { 11760daf62d9SStanislav Sedov vn->vn_dev = -1; 11770daf62d9SStanislav Sedov } 11780daf62d9SStanislav Sedov return (0); 11790daf62d9SStanislav Sedov 11800daf62d9SStanislav Sedov fail: 11810daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 11820daf62d9SStanislav Sedov return (1); 11830daf62d9SStanislav Sedov } 11840daf62d9SStanislav Sedov 11850daf62d9SStanislav Sedov /* 11860daf62d9SStanislav Sedov * kinfo vnode type to filestat translation. 11870daf62d9SStanislav Sedov */ 11880daf62d9SStanislav Sedov static int 11890daf62d9SStanislav Sedov kinfo_vtype2fst(int kfvtype) 11900daf62d9SStanislav Sedov { 11910daf62d9SStanislav Sedov static struct { 11920daf62d9SStanislav Sedov int kf_vtype; 11930daf62d9SStanislav Sedov int fst_vtype; 11940daf62d9SStanislav Sedov } kfvtypes2fst[] = { 11950daf62d9SStanislav Sedov { KF_VTYPE_VBAD, PS_FST_VTYPE_VBAD }, 11960daf62d9SStanislav Sedov { KF_VTYPE_VBLK, PS_FST_VTYPE_VBLK }, 11970daf62d9SStanislav Sedov { KF_VTYPE_VCHR, PS_FST_VTYPE_VCHR }, 11980daf62d9SStanislav Sedov { KF_VTYPE_VDIR, PS_FST_VTYPE_VDIR }, 11990daf62d9SStanislav Sedov { KF_VTYPE_VFIFO, PS_FST_VTYPE_VFIFO }, 12000daf62d9SStanislav Sedov { KF_VTYPE_VLNK, PS_FST_VTYPE_VLNK }, 12010daf62d9SStanislav Sedov { KF_VTYPE_VNON, PS_FST_VTYPE_VNON }, 12020daf62d9SStanislav Sedov { KF_VTYPE_VREG, PS_FST_VTYPE_VREG }, 12030daf62d9SStanislav Sedov { KF_VTYPE_VSOCK, PS_FST_VTYPE_VSOCK } 12040daf62d9SStanislav Sedov }; 12050daf62d9SStanislav Sedov #define NKFVTYPES (sizeof(kfvtypes2fst) / sizeof(*kfvtypes2fst)) 12060daf62d9SStanislav Sedov unsigned int i; 12070daf62d9SStanislav Sedov 12080daf62d9SStanislav Sedov for (i = 0; i < NKFVTYPES; i++) 12090daf62d9SStanislav Sedov if (kfvtypes2fst[i].kf_vtype == kfvtype) 12100daf62d9SStanislav Sedov break; 12110daf62d9SStanislav Sedov if (i == NKFVTYPES) 12120daf62d9SStanislav Sedov return (PS_FST_VTYPE_UNKNOWN); 12130daf62d9SStanislav Sedov return (kfvtypes2fst[i].fst_vtype); 12140daf62d9SStanislav Sedov } 12150daf62d9SStanislav Sedov 12160daf62d9SStanislav Sedov static int 12170daf62d9SStanislav Sedov procstat_get_vnode_info_sysctl(struct filestat *fst, struct vnstat *vn, 12180daf62d9SStanislav Sedov char *errbuf) 12190daf62d9SStanislav Sedov { 12200daf62d9SStanislav Sedov struct statfs stbuf; 12210daf62d9SStanislav Sedov struct kinfo_file *kif; 12220daf62d9SStanislav Sedov struct kinfo_vmentry *kve; 12230daf62d9SStanislav Sedov uint64_t fileid; 12240daf62d9SStanislav Sedov uint64_t size; 12250daf62d9SStanislav Sedov char *name, *path; 12260daf62d9SStanislav Sedov uint32_t fsid; 12270daf62d9SStanislav Sedov uint16_t mode; 12280daf62d9SStanislav Sedov uint32_t rdev; 12290daf62d9SStanislav Sedov int vntype; 12300daf62d9SStanislav Sedov int status; 12310daf62d9SStanislav Sedov 12320daf62d9SStanislav Sedov assert(fst); 12330daf62d9SStanislav Sedov assert(vn); 12340daf62d9SStanislav Sedov bzero(vn, sizeof(*vn)); 12350daf62d9SStanislav Sedov if (fst->fs_typedep == NULL) 12360daf62d9SStanislav Sedov return (1); 12370daf62d9SStanislav Sedov if (fst->fs_uflags & PS_FST_UFLAG_MMAP) { 12380daf62d9SStanislav Sedov kve = fst->fs_typedep; 12390daf62d9SStanislav Sedov fileid = kve->kve_vn_fileid; 12400daf62d9SStanislav Sedov fsid = kve->kve_vn_fsid; 12410daf62d9SStanislav Sedov mode = kve->kve_vn_mode; 12420daf62d9SStanislav Sedov path = kve->kve_path; 12430daf62d9SStanislav Sedov rdev = kve->kve_vn_rdev; 12440daf62d9SStanislav Sedov size = kve->kve_vn_size; 12450daf62d9SStanislav Sedov vntype = kinfo_vtype2fst(kve->kve_vn_type); 12460daf62d9SStanislav Sedov status = kve->kve_status; 12470daf62d9SStanislav Sedov } else { 12480daf62d9SStanislav Sedov kif = fst->fs_typedep; 12490daf62d9SStanislav Sedov fileid = kif->kf_un.kf_file.kf_file_fileid; 12500daf62d9SStanislav Sedov fsid = kif->kf_un.kf_file.kf_file_fsid; 12510daf62d9SStanislav Sedov mode = kif->kf_un.kf_file.kf_file_mode; 12520daf62d9SStanislav Sedov path = kif->kf_path; 12530daf62d9SStanislav Sedov rdev = kif->kf_un.kf_file.kf_file_rdev; 12540daf62d9SStanislav Sedov size = kif->kf_un.kf_file.kf_file_size; 12550daf62d9SStanislav Sedov vntype = kinfo_vtype2fst(kif->kf_vnode_type); 12560daf62d9SStanislav Sedov status = kif->kf_status; 12570daf62d9SStanislav Sedov } 12580daf62d9SStanislav Sedov vn->vn_type = vntype; 12590daf62d9SStanislav Sedov if (vntype == PS_FST_VTYPE_VNON || vntype == PS_FST_VTYPE_VBAD) 12600daf62d9SStanislav Sedov return (0); 12610daf62d9SStanislav Sedov if ((status & KF_ATTR_VALID) == 0) { 12620daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "? (no info available)"); 12630daf62d9SStanislav Sedov return (1); 12640daf62d9SStanislav Sedov } 12650daf62d9SStanislav Sedov if (path && *path) { 12660daf62d9SStanislav Sedov statfs(path, &stbuf); 12670daf62d9SStanislav Sedov vn->vn_mntdir = strdup(stbuf.f_mntonname); 12680daf62d9SStanislav Sedov } else 12690daf62d9SStanislav Sedov vn->vn_mntdir = strdup("-"); 12700daf62d9SStanislav Sedov vn->vn_dev = rdev; 12710daf62d9SStanislav Sedov if (vntype == PS_FST_VTYPE_VBLK) { 12720daf62d9SStanislav Sedov name = devname(rdev, S_IFBLK); 12730daf62d9SStanislav Sedov if (name != NULL) 12740daf62d9SStanislav Sedov strlcpy(vn->vn_devname, name, 12750daf62d9SStanislav Sedov sizeof(vn->vn_devname)); 12760daf62d9SStanislav Sedov } else if (vntype == PS_FST_VTYPE_VCHR) { 12770daf62d9SStanislav Sedov name = devname(vn->vn_dev, S_IFCHR); 12780daf62d9SStanislav Sedov if (name != NULL) 12790daf62d9SStanislav Sedov strlcpy(vn->vn_devname, name, 12800daf62d9SStanislav Sedov sizeof(vn->vn_devname)); 12810daf62d9SStanislav Sedov } 12820daf62d9SStanislav Sedov vn->vn_fsid = fsid; 12830daf62d9SStanislav Sedov vn->vn_fileid = fileid; 12840daf62d9SStanislav Sedov vn->vn_size = size; 12850daf62d9SStanislav Sedov vn->vn_mode = mode; 12860daf62d9SStanislav Sedov return (0); 12870daf62d9SStanislav Sedov } 12880daf62d9SStanislav Sedov 12890daf62d9SStanislav Sedov int 12900daf62d9SStanislav Sedov procstat_get_socket_info(struct procstat *procstat, struct filestat *fst, 12910daf62d9SStanislav Sedov struct sockstat *sock, char *errbuf) 12920daf62d9SStanislav Sedov { 12930daf62d9SStanislav Sedov 12940daf62d9SStanislav Sedov assert(sock); 12950daf62d9SStanislav Sedov if (procstat->type == PROCSTAT_KVM) { 12960daf62d9SStanislav Sedov return (procstat_get_socket_info_kvm(procstat->kd, fst, sock, 12970daf62d9SStanislav Sedov errbuf)); 12987153ad2bSMikolaj Golub } else if (procstat->type == PROCSTAT_SYSCTL || 12997153ad2bSMikolaj Golub procstat->type == PROCSTAT_CORE) { 13000daf62d9SStanislav Sedov return (procstat_get_socket_info_sysctl(fst, sock, errbuf)); 13010daf62d9SStanislav Sedov } else { 130280905c35SJilles Tjoelker warnx("unknown access method: %d", procstat->type); 13030daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 13040daf62d9SStanislav Sedov return (1); 13050daf62d9SStanislav Sedov } 13060daf62d9SStanislav Sedov } 13070daf62d9SStanislav Sedov 13080daf62d9SStanislav Sedov static int 13090daf62d9SStanislav Sedov procstat_get_socket_info_kvm(kvm_t *kd, struct filestat *fst, 13100daf62d9SStanislav Sedov struct sockstat *sock, char *errbuf) 13110daf62d9SStanislav Sedov { 13120daf62d9SStanislav Sedov struct domain dom; 13130daf62d9SStanislav Sedov struct inpcb inpcb; 13140daf62d9SStanislav Sedov struct protosw proto; 13150daf62d9SStanislav Sedov struct socket s; 13160daf62d9SStanislav Sedov struct unpcb unpcb; 13170daf62d9SStanislav Sedov ssize_t len; 13180daf62d9SStanislav Sedov void *so; 13190daf62d9SStanislav Sedov 13200daf62d9SStanislav Sedov assert(kd); 13210daf62d9SStanislav Sedov assert(sock); 13220daf62d9SStanislav Sedov assert(fst); 13230daf62d9SStanislav Sedov bzero(sock, sizeof(*sock)); 13240daf62d9SStanislav Sedov so = fst->fs_typedep; 13250daf62d9SStanislav Sedov if (so == NULL) 13260daf62d9SStanislav Sedov goto fail; 13270daf62d9SStanislav Sedov sock->so_addr = (uintptr_t)so; 13280daf62d9SStanislav Sedov /* fill in socket */ 13290daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)so, &s, 13300daf62d9SStanislav Sedov sizeof(struct socket))) { 13310daf62d9SStanislav Sedov warnx("can't read sock at %p", (void *)so); 13320daf62d9SStanislav Sedov goto fail; 13330daf62d9SStanislav Sedov } 13340daf62d9SStanislav Sedov /* fill in protosw entry */ 13350daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)s.so_proto, &proto, 13360daf62d9SStanislav Sedov sizeof(struct protosw))) { 13370daf62d9SStanislav Sedov warnx("can't read protosw at %p", (void *)s.so_proto); 13380daf62d9SStanislav Sedov goto fail; 13390daf62d9SStanislav Sedov } 13400daf62d9SStanislav Sedov /* fill in domain */ 13410daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)proto.pr_domain, &dom, 13420daf62d9SStanislav Sedov sizeof(struct domain))) { 13430daf62d9SStanislav Sedov warnx("can't read domain at %p", 13440daf62d9SStanislav Sedov (void *)proto.pr_domain); 13450daf62d9SStanislav Sedov goto fail; 13460daf62d9SStanislav Sedov } 13470daf62d9SStanislav Sedov if ((len = kvm_read(kd, (unsigned long)dom.dom_name, sock->dname, 13480daf62d9SStanislav Sedov sizeof(sock->dname) - 1)) < 0) { 13490daf62d9SStanislav Sedov warnx("can't read domain name at %p", (void *)dom.dom_name); 13500daf62d9SStanislav Sedov sock->dname[0] = '\0'; 13510daf62d9SStanislav Sedov } 13520daf62d9SStanislav Sedov else 13530daf62d9SStanislav Sedov sock->dname[len] = '\0'; 13540daf62d9SStanislav Sedov 13550daf62d9SStanislav Sedov /* 13560daf62d9SStanislav Sedov * Fill in known data. 13570daf62d9SStanislav Sedov */ 13580daf62d9SStanislav Sedov sock->type = s.so_type; 13590daf62d9SStanislav Sedov sock->proto = proto.pr_protocol; 13600daf62d9SStanislav Sedov sock->dom_family = dom.dom_family; 13610daf62d9SStanislav Sedov sock->so_pcb = (uintptr_t)s.so_pcb; 13620daf62d9SStanislav Sedov 13630daf62d9SStanislav Sedov /* 13640daf62d9SStanislav Sedov * Protocol specific data. 13650daf62d9SStanislav Sedov */ 13660daf62d9SStanislav Sedov switch(dom.dom_family) { 13670daf62d9SStanislav Sedov case AF_INET: 13680daf62d9SStanislav Sedov case AF_INET6: 13690daf62d9SStanislav Sedov if (proto.pr_protocol == IPPROTO_TCP) { 13700daf62d9SStanislav Sedov if (s.so_pcb) { 13710daf62d9SStanislav Sedov if (kvm_read(kd, (u_long)s.so_pcb, 13720daf62d9SStanislav Sedov (char *)&inpcb, sizeof(struct inpcb)) 13730daf62d9SStanislav Sedov != sizeof(struct inpcb)) { 13740daf62d9SStanislav Sedov warnx("can't read inpcb at %p", 13750daf62d9SStanislav Sedov (void *)s.so_pcb); 13760daf62d9SStanislav Sedov } else 13770daf62d9SStanislav Sedov sock->inp_ppcb = 13780daf62d9SStanislav Sedov (uintptr_t)inpcb.inp_ppcb; 13790daf62d9SStanislav Sedov } 13800daf62d9SStanislav Sedov } 13810daf62d9SStanislav Sedov break; 13820daf62d9SStanislav Sedov case AF_UNIX: 13830daf62d9SStanislav Sedov if (s.so_pcb) { 13840daf62d9SStanislav Sedov if (kvm_read(kd, (u_long)s.so_pcb, (char *)&unpcb, 13850daf62d9SStanislav Sedov sizeof(struct unpcb)) != sizeof(struct unpcb)){ 13860daf62d9SStanislav Sedov warnx("can't read unpcb at %p", 13870daf62d9SStanislav Sedov (void *)s.so_pcb); 13880daf62d9SStanislav Sedov } else if (unpcb.unp_conn) { 13890daf62d9SStanislav Sedov sock->so_rcv_sb_state = s.so_rcv.sb_state; 13900daf62d9SStanislav Sedov sock->so_snd_sb_state = s.so_snd.sb_state; 13910daf62d9SStanislav Sedov sock->unp_conn = (uintptr_t)unpcb.unp_conn; 13920daf62d9SStanislav Sedov } 13930daf62d9SStanislav Sedov } 13940daf62d9SStanislav Sedov break; 13950daf62d9SStanislav Sedov default: 13960daf62d9SStanislav Sedov break; 13970daf62d9SStanislav Sedov } 13980daf62d9SStanislav Sedov return (0); 13990daf62d9SStanislav Sedov 14000daf62d9SStanislav Sedov fail: 14010daf62d9SStanislav Sedov snprintf(errbuf, _POSIX2_LINE_MAX, "error"); 14020daf62d9SStanislav Sedov return (1); 14030daf62d9SStanislav Sedov } 14040daf62d9SStanislav Sedov 14050daf62d9SStanislav Sedov static int 14060daf62d9SStanislav Sedov procstat_get_socket_info_sysctl(struct filestat *fst, struct sockstat *sock, 14070daf62d9SStanislav Sedov char *errbuf __unused) 14080daf62d9SStanislav Sedov { 14090daf62d9SStanislav Sedov struct kinfo_file *kif; 14100daf62d9SStanislav Sedov 14110daf62d9SStanislav Sedov assert(sock); 14120daf62d9SStanislav Sedov assert(fst); 14130daf62d9SStanislav Sedov bzero(sock, sizeof(*sock)); 14140daf62d9SStanislav Sedov kif = fst->fs_typedep; 14150daf62d9SStanislav Sedov if (kif == NULL) 14160daf62d9SStanislav Sedov return (0); 14170daf62d9SStanislav Sedov 14180daf62d9SStanislav Sedov /* 14190daf62d9SStanislav Sedov * Fill in known data. 14200daf62d9SStanislav Sedov */ 14210daf62d9SStanislav Sedov sock->type = kif->kf_sock_type; 14220daf62d9SStanislav Sedov sock->proto = kif->kf_sock_protocol; 14230daf62d9SStanislav Sedov sock->dom_family = kif->kf_sock_domain; 14240daf62d9SStanislav Sedov sock->so_pcb = kif->kf_un.kf_sock.kf_sock_pcb; 14250daf62d9SStanislav Sedov strlcpy(sock->dname, kif->kf_path, sizeof(sock->dname)); 14260daf62d9SStanislav Sedov bcopy(&kif->kf_sa_local, &sock->sa_local, kif->kf_sa_local.ss_len); 14270daf62d9SStanislav Sedov bcopy(&kif->kf_sa_peer, &sock->sa_peer, kif->kf_sa_peer.ss_len); 14280daf62d9SStanislav Sedov 14290daf62d9SStanislav Sedov /* 14300daf62d9SStanislav Sedov * Protocol specific data. 14310daf62d9SStanislav Sedov */ 14320daf62d9SStanislav Sedov switch(sock->dom_family) { 14330daf62d9SStanislav Sedov case AF_INET: 14340daf62d9SStanislav Sedov case AF_INET6: 14350daf62d9SStanislav Sedov if (sock->proto == IPPROTO_TCP) 14360daf62d9SStanislav Sedov sock->inp_ppcb = kif->kf_un.kf_sock.kf_sock_inpcb; 14370daf62d9SStanislav Sedov break; 14380daf62d9SStanislav Sedov case AF_UNIX: 14390daf62d9SStanislav Sedov if (kif->kf_un.kf_sock.kf_sock_unpconn != 0) { 14400daf62d9SStanislav Sedov sock->so_rcv_sb_state = 14410daf62d9SStanislav Sedov kif->kf_un.kf_sock.kf_sock_rcv_sb_state; 14420daf62d9SStanislav Sedov sock->so_snd_sb_state = 14430daf62d9SStanislav Sedov kif->kf_un.kf_sock.kf_sock_snd_sb_state; 14440daf62d9SStanislav Sedov sock->unp_conn = 14450daf62d9SStanislav Sedov kif->kf_un.kf_sock.kf_sock_unpconn; 14460daf62d9SStanislav Sedov } 14470daf62d9SStanislav Sedov break; 14480daf62d9SStanislav Sedov default: 14490daf62d9SStanislav Sedov break; 14500daf62d9SStanislav Sedov } 14510daf62d9SStanislav Sedov return (0); 14520daf62d9SStanislav Sedov } 14530daf62d9SStanislav Sedov 14540daf62d9SStanislav Sedov /* 14550daf62d9SStanislav Sedov * Descriptor flags to filestat translation. 14560daf62d9SStanislav Sedov */ 14570daf62d9SStanislav Sedov static int 14580daf62d9SStanislav Sedov to_filestat_flags(int flags) 14590daf62d9SStanislav Sedov { 14600daf62d9SStanislav Sedov static struct { 14610daf62d9SStanislav Sedov int flag; 14620daf62d9SStanislav Sedov int fst_flag; 14630daf62d9SStanislav Sedov } fstflags[] = { 14640daf62d9SStanislav Sedov { FREAD, PS_FST_FFLAG_READ }, 14650daf62d9SStanislav Sedov { FWRITE, PS_FST_FFLAG_WRITE }, 14660daf62d9SStanislav Sedov { O_APPEND, PS_FST_FFLAG_APPEND }, 14670daf62d9SStanislav Sedov { O_ASYNC, PS_FST_FFLAG_ASYNC }, 14680daf62d9SStanislav Sedov { O_CREAT, PS_FST_FFLAG_CREAT }, 14690daf62d9SStanislav Sedov { O_DIRECT, PS_FST_FFLAG_DIRECT }, 14700daf62d9SStanislav Sedov { O_EXCL, PS_FST_FFLAG_EXCL }, 14710daf62d9SStanislav Sedov { O_EXEC, PS_FST_FFLAG_EXEC }, 14720daf62d9SStanislav Sedov { O_EXLOCK, PS_FST_FFLAG_EXLOCK }, 14730daf62d9SStanislav Sedov { O_NOFOLLOW, PS_FST_FFLAG_NOFOLLOW }, 14740daf62d9SStanislav Sedov { O_NONBLOCK, PS_FST_FFLAG_NONBLOCK }, 14750daf62d9SStanislav Sedov { O_SHLOCK, PS_FST_FFLAG_SHLOCK }, 14760daf62d9SStanislav Sedov { O_SYNC, PS_FST_FFLAG_SYNC }, 14770daf62d9SStanislav Sedov { O_TRUNC, PS_FST_FFLAG_TRUNC } 14780daf62d9SStanislav Sedov }; 14790daf62d9SStanislav Sedov #define NFSTFLAGS (sizeof(fstflags) / sizeof(*fstflags)) 14800daf62d9SStanislav Sedov int fst_flags; 14810daf62d9SStanislav Sedov unsigned int i; 14820daf62d9SStanislav Sedov 14830daf62d9SStanislav Sedov fst_flags = 0; 14840daf62d9SStanislav Sedov for (i = 0; i < NFSTFLAGS; i++) 14850daf62d9SStanislav Sedov if (flags & fstflags[i].flag) 14860daf62d9SStanislav Sedov fst_flags |= fstflags[i].fst_flag; 14870daf62d9SStanislav Sedov return (fst_flags); 14880daf62d9SStanislav Sedov } 14890daf62d9SStanislav Sedov 14900daf62d9SStanislav Sedov /* 14910daf62d9SStanislav Sedov * Vnode type to filestate translation. 14920daf62d9SStanislav Sedov */ 14930daf62d9SStanislav Sedov static int 14940daf62d9SStanislav Sedov vntype2psfsttype(int type) 14950daf62d9SStanislav Sedov { 14960daf62d9SStanislav Sedov static struct { 14970daf62d9SStanislav Sedov int vtype; 14980daf62d9SStanislav Sedov int fst_vtype; 14990daf62d9SStanislav Sedov } vt2fst[] = { 15000daf62d9SStanislav Sedov { VBAD, PS_FST_VTYPE_VBAD }, 15010daf62d9SStanislav Sedov { VBLK, PS_FST_VTYPE_VBLK }, 15020daf62d9SStanislav Sedov { VCHR, PS_FST_VTYPE_VCHR }, 15030daf62d9SStanislav Sedov { VDIR, PS_FST_VTYPE_VDIR }, 15040daf62d9SStanislav Sedov { VFIFO, PS_FST_VTYPE_VFIFO }, 15050daf62d9SStanislav Sedov { VLNK, PS_FST_VTYPE_VLNK }, 15060daf62d9SStanislav Sedov { VNON, PS_FST_VTYPE_VNON }, 15070daf62d9SStanislav Sedov { VREG, PS_FST_VTYPE_VREG }, 15080daf62d9SStanislav Sedov { VSOCK, PS_FST_VTYPE_VSOCK } 15090daf62d9SStanislav Sedov }; 15100daf62d9SStanislav Sedov #define NVFTYPES (sizeof(vt2fst) / sizeof(*vt2fst)) 15110daf62d9SStanislav Sedov unsigned int i, fst_type; 15120daf62d9SStanislav Sedov 15130daf62d9SStanislav Sedov fst_type = PS_FST_VTYPE_UNKNOWN; 15140daf62d9SStanislav Sedov for (i = 0; i < NVFTYPES; i++) { 15150daf62d9SStanislav Sedov if (type == vt2fst[i].vtype) { 15160daf62d9SStanislav Sedov fst_type = vt2fst[i].fst_vtype; 15170daf62d9SStanislav Sedov break; 15180daf62d9SStanislav Sedov } 15190daf62d9SStanislav Sedov } 15200daf62d9SStanislav Sedov return (fst_type); 15210daf62d9SStanislav Sedov } 15220daf62d9SStanislav Sedov 15230daf62d9SStanislav Sedov static char * 15240daf62d9SStanislav Sedov getmnton(kvm_t *kd, struct mount *m) 15250daf62d9SStanislav Sedov { 15265f301949SBen Laurie struct mount mnt; 15270daf62d9SStanislav Sedov static struct mtab { 15280daf62d9SStanislav Sedov struct mtab *next; 15290daf62d9SStanislav Sedov struct mount *m; 15300daf62d9SStanislav Sedov char mntonname[MNAMELEN + 1]; 15310daf62d9SStanislav Sedov } *mhead = NULL; 15320daf62d9SStanislav Sedov struct mtab *mt; 15330daf62d9SStanislav Sedov 15340daf62d9SStanislav Sedov for (mt = mhead; mt != NULL; mt = mt->next) 15350daf62d9SStanislav Sedov if (m == mt->m) 15360daf62d9SStanislav Sedov return (mt->mntonname); 15370daf62d9SStanislav Sedov if (!kvm_read_all(kd, (unsigned long)m, &mnt, sizeof(struct mount))) { 15380daf62d9SStanislav Sedov warnx("can't read mount table at %p", (void *)m); 15390daf62d9SStanislav Sedov return (NULL); 15400daf62d9SStanislav Sedov } 15410daf62d9SStanislav Sedov if ((mt = malloc(sizeof (struct mtab))) == NULL) 15420daf62d9SStanislav Sedov err(1, NULL); 15430daf62d9SStanislav Sedov mt->m = m; 15440daf62d9SStanislav Sedov bcopy(&mnt.mnt_stat.f_mntonname[0], &mt->mntonname[0], MNAMELEN); 15455f301949SBen Laurie mt->mntonname[MNAMELEN] = '\0'; 15460daf62d9SStanislav Sedov mt->next = mhead; 15470daf62d9SStanislav Sedov mhead = mt; 15480daf62d9SStanislav Sedov return (mt->mntonname); 15490daf62d9SStanislav Sedov } 15507153ad2bSMikolaj Golub 15514482b5e3SMikolaj Golub /* 15524482b5e3SMikolaj Golub * Auxiliary structures and functions to get process environment or 15534482b5e3SMikolaj Golub * command line arguments. 15544482b5e3SMikolaj Golub */ 15554482b5e3SMikolaj Golub struct argvec { 15564482b5e3SMikolaj Golub char *buf; 15574482b5e3SMikolaj Golub size_t bufsize; 15584482b5e3SMikolaj Golub char **argv; 15594482b5e3SMikolaj Golub size_t argc; 15604482b5e3SMikolaj Golub }; 15614482b5e3SMikolaj Golub 15624482b5e3SMikolaj Golub static struct argvec * 15634482b5e3SMikolaj Golub argvec_alloc(size_t bufsize) 15644482b5e3SMikolaj Golub { 15654482b5e3SMikolaj Golub struct argvec *av; 15664482b5e3SMikolaj Golub 15674482b5e3SMikolaj Golub av = malloc(sizeof(*av)); 15684482b5e3SMikolaj Golub if (av == NULL) 15694482b5e3SMikolaj Golub return (NULL); 15704482b5e3SMikolaj Golub av->bufsize = bufsize; 15714482b5e3SMikolaj Golub av->buf = malloc(av->bufsize); 15724482b5e3SMikolaj Golub if (av->buf == NULL) { 15734482b5e3SMikolaj Golub free(av); 15744482b5e3SMikolaj Golub return (NULL); 15754482b5e3SMikolaj Golub } 15764482b5e3SMikolaj Golub av->argc = 32; 15774482b5e3SMikolaj Golub av->argv = malloc(sizeof(char *) * av->argc); 15784482b5e3SMikolaj Golub if (av->argv == NULL) { 15794482b5e3SMikolaj Golub free(av->buf); 15804482b5e3SMikolaj Golub free(av); 15814482b5e3SMikolaj Golub return (NULL); 15824482b5e3SMikolaj Golub } 15834482b5e3SMikolaj Golub return av; 15844482b5e3SMikolaj Golub } 15854482b5e3SMikolaj Golub 15864482b5e3SMikolaj Golub static void 15874482b5e3SMikolaj Golub argvec_free(struct argvec * av) 15884482b5e3SMikolaj Golub { 15894482b5e3SMikolaj Golub 15904482b5e3SMikolaj Golub free(av->argv); 15914482b5e3SMikolaj Golub free(av->buf); 15924482b5e3SMikolaj Golub free(av); 15934482b5e3SMikolaj Golub } 15944482b5e3SMikolaj Golub 15954482b5e3SMikolaj Golub static char ** 15964482b5e3SMikolaj Golub getargv(struct procstat *procstat, struct kinfo_proc *kp, size_t nchr, int env) 15974482b5e3SMikolaj Golub { 15984482b5e3SMikolaj Golub int error, name[4], argc, i; 15994482b5e3SMikolaj Golub struct argvec *av, **avp; 16004482b5e3SMikolaj Golub enum psc_type type; 16014482b5e3SMikolaj Golub size_t len; 16024482b5e3SMikolaj Golub char *p, **argv; 16034482b5e3SMikolaj Golub 16044482b5e3SMikolaj Golub assert(procstat); 16054482b5e3SMikolaj Golub assert(kp); 16064482b5e3SMikolaj Golub if (procstat->type == PROCSTAT_KVM) { 16074482b5e3SMikolaj Golub warnx("can't use kvm access method"); 16084482b5e3SMikolaj Golub return (NULL); 16094482b5e3SMikolaj Golub } 16104482b5e3SMikolaj Golub if (procstat->type != PROCSTAT_SYSCTL && 16114482b5e3SMikolaj Golub procstat->type != PROCSTAT_CORE) { 16124482b5e3SMikolaj Golub warnx("unknown access method: %d", procstat->type); 16134482b5e3SMikolaj Golub return (NULL); 16144482b5e3SMikolaj Golub } 16154482b5e3SMikolaj Golub 16164482b5e3SMikolaj Golub if (nchr == 0 || nchr > ARG_MAX) 16174482b5e3SMikolaj Golub nchr = ARG_MAX; 16184482b5e3SMikolaj Golub 16194482b5e3SMikolaj Golub avp = (struct argvec **)(env ? &procstat->argv : &procstat->envv); 16204482b5e3SMikolaj Golub av = *avp; 16214482b5e3SMikolaj Golub 16224482b5e3SMikolaj Golub if (av == NULL) 16234482b5e3SMikolaj Golub { 16244482b5e3SMikolaj Golub av = argvec_alloc(nchr); 16254482b5e3SMikolaj Golub if (av == NULL) 16264482b5e3SMikolaj Golub { 16274482b5e3SMikolaj Golub warn("malloc(%zu)", nchr); 16284482b5e3SMikolaj Golub return (NULL); 16294482b5e3SMikolaj Golub } 16304482b5e3SMikolaj Golub *avp = av; 16314482b5e3SMikolaj Golub } else if (av->bufsize < nchr) { 16324482b5e3SMikolaj Golub av->buf = reallocf(av->buf, nchr); 16334482b5e3SMikolaj Golub if (av->buf == NULL) { 16344482b5e3SMikolaj Golub warn("malloc(%zu)", nchr); 16354482b5e3SMikolaj Golub return (NULL); 16364482b5e3SMikolaj Golub } 16374482b5e3SMikolaj Golub } 16384482b5e3SMikolaj Golub if (procstat->type == PROCSTAT_SYSCTL) { 16394482b5e3SMikolaj Golub name[0] = CTL_KERN; 16404482b5e3SMikolaj Golub name[1] = KERN_PROC; 16414482b5e3SMikolaj Golub name[2] = env ? KERN_PROC_ENV : KERN_PROC_ARGS; 16424482b5e3SMikolaj Golub name[3] = kp->ki_pid; 16434482b5e3SMikolaj Golub len = nchr; 16444482b5e3SMikolaj Golub error = sysctl(name, 4, av->buf, &len, NULL, 0); 16454482b5e3SMikolaj Golub if (error != 0 && errno != ESRCH && errno != EPERM) 16464482b5e3SMikolaj Golub warn("sysctl(kern.proc.%s)", env ? "env" : "args"); 16474482b5e3SMikolaj Golub if (error != 0 || len == 0) 16484482b5e3SMikolaj Golub return (NULL); 16494482b5e3SMikolaj Golub } else /* procstat->type == PROCSTAT_CORE */ { 16504482b5e3SMikolaj Golub type = env ? PSC_TYPE_ENVV : PSC_TYPE_ARGV; 16514482b5e3SMikolaj Golub len = nchr; 16524482b5e3SMikolaj Golub if (procstat_core_get(procstat->core, type, av->buf, &len) 16534482b5e3SMikolaj Golub == NULL) { 16544482b5e3SMikolaj Golub return (NULL); 16554482b5e3SMikolaj Golub } 16564482b5e3SMikolaj Golub } 16574482b5e3SMikolaj Golub 16584482b5e3SMikolaj Golub argv = av->argv; 16594482b5e3SMikolaj Golub argc = av->argc; 16604482b5e3SMikolaj Golub i = 0; 16614482b5e3SMikolaj Golub for (p = av->buf; p < av->buf + len; p += strlen(p) + 1) { 16624482b5e3SMikolaj Golub argv[i++] = p; 16634482b5e3SMikolaj Golub if (i < argc) 16644482b5e3SMikolaj Golub continue; 16654482b5e3SMikolaj Golub /* Grow argv. */ 16664482b5e3SMikolaj Golub argc += argc; 16674482b5e3SMikolaj Golub argv = realloc(argv, sizeof(char *) * argc); 16684482b5e3SMikolaj Golub if (argv == NULL) { 16694482b5e3SMikolaj Golub warn("malloc(%zu)", sizeof(char *) * argc); 16704482b5e3SMikolaj Golub return (NULL); 16714482b5e3SMikolaj Golub } 16724482b5e3SMikolaj Golub av->argv = argv; 16734482b5e3SMikolaj Golub av->argc = argc; 16744482b5e3SMikolaj Golub } 16754482b5e3SMikolaj Golub argv[i] = NULL; 16764482b5e3SMikolaj Golub 16774482b5e3SMikolaj Golub return (argv); 16784482b5e3SMikolaj Golub } 16794482b5e3SMikolaj Golub 16804482b5e3SMikolaj Golub /* 16814482b5e3SMikolaj Golub * Return process command line arguments. 16824482b5e3SMikolaj Golub */ 16834482b5e3SMikolaj Golub char ** 16844482b5e3SMikolaj Golub procstat_getargv(struct procstat *procstat, struct kinfo_proc *p, size_t nchr) 16854482b5e3SMikolaj Golub { 16864482b5e3SMikolaj Golub 16874482b5e3SMikolaj Golub return (getargv(procstat, p, nchr, 0)); 16884482b5e3SMikolaj Golub } 16894482b5e3SMikolaj Golub 16904482b5e3SMikolaj Golub /* 16914482b5e3SMikolaj Golub * Free the buffer allocated by procstat_getargv(). 16924482b5e3SMikolaj Golub */ 16934482b5e3SMikolaj Golub void 16944482b5e3SMikolaj Golub procstat_freeargv(struct procstat *procstat) 16954482b5e3SMikolaj Golub { 16964482b5e3SMikolaj Golub 16974482b5e3SMikolaj Golub if (procstat->argv != NULL) { 16984482b5e3SMikolaj Golub argvec_free(procstat->argv); 16994482b5e3SMikolaj Golub procstat->argv = NULL; 17004482b5e3SMikolaj Golub } 17014482b5e3SMikolaj Golub } 17024482b5e3SMikolaj Golub 17034482b5e3SMikolaj Golub /* 17044482b5e3SMikolaj Golub * Return process environment. 17054482b5e3SMikolaj Golub */ 17064482b5e3SMikolaj Golub char ** 17074482b5e3SMikolaj Golub procstat_getenvv(struct procstat *procstat, struct kinfo_proc *p, size_t nchr) 17084482b5e3SMikolaj Golub { 17094482b5e3SMikolaj Golub 17104482b5e3SMikolaj Golub return (getargv(procstat, p, nchr, 1)); 17114482b5e3SMikolaj Golub } 17124482b5e3SMikolaj Golub 17134482b5e3SMikolaj Golub /* 17144482b5e3SMikolaj Golub * Free the buffer allocated by procstat_getenvv(). 17154482b5e3SMikolaj Golub */ 17164482b5e3SMikolaj Golub void 17174482b5e3SMikolaj Golub procstat_freeenvv(struct procstat *procstat) 17184482b5e3SMikolaj Golub { 17194482b5e3SMikolaj Golub if (procstat->envv != NULL) { 17204482b5e3SMikolaj Golub argvec_free(procstat->envv); 17214482b5e3SMikolaj Golub procstat->envv = NULL; 17224482b5e3SMikolaj Golub } 17234482b5e3SMikolaj Golub } 17244482b5e3SMikolaj Golub 172539680c7bSMikolaj Golub static struct kinfo_vmentry * 172639680c7bSMikolaj Golub kinfo_getvmmap_core(struct procstat_core *core, int *cntp) 172739680c7bSMikolaj Golub { 172839680c7bSMikolaj Golub int cnt; 172939680c7bSMikolaj Golub size_t len; 173039680c7bSMikolaj Golub char *buf, *bp, *eb; 173139680c7bSMikolaj Golub struct kinfo_vmentry *kiv, *kp, *kv; 173239680c7bSMikolaj Golub 173339680c7bSMikolaj Golub buf = procstat_core_get(core, PSC_TYPE_VMMAP, NULL, &len); 173439680c7bSMikolaj Golub if (buf == NULL) 173539680c7bSMikolaj Golub return (NULL); 173639680c7bSMikolaj Golub 173739680c7bSMikolaj Golub /* 173839680c7bSMikolaj Golub * XXXMG: The code below is just copy&past from libutil. 173939680c7bSMikolaj Golub * The code duplication can be avoided if libutil 174039680c7bSMikolaj Golub * is extended to provide something like: 174139680c7bSMikolaj Golub * struct kinfo_vmentry *kinfo_getvmmap_from_buf(const char *buf, 174239680c7bSMikolaj Golub * size_t len, int *cntp); 174339680c7bSMikolaj Golub */ 174439680c7bSMikolaj Golub 174539680c7bSMikolaj Golub /* Pass 1: count items */ 174639680c7bSMikolaj Golub cnt = 0; 174739680c7bSMikolaj Golub bp = buf; 174839680c7bSMikolaj Golub eb = buf + len; 174939680c7bSMikolaj Golub while (bp < eb) { 175039680c7bSMikolaj Golub kv = (struct kinfo_vmentry *)(uintptr_t)bp; 175139680c7bSMikolaj Golub bp += kv->kve_structsize; 175239680c7bSMikolaj Golub cnt++; 175339680c7bSMikolaj Golub } 175439680c7bSMikolaj Golub 175539680c7bSMikolaj Golub kiv = calloc(cnt, sizeof(*kiv)); 175639680c7bSMikolaj Golub if (kiv == NULL) { 175739680c7bSMikolaj Golub free(buf); 175839680c7bSMikolaj Golub return (NULL); 175939680c7bSMikolaj Golub } 176039680c7bSMikolaj Golub bp = buf; 176139680c7bSMikolaj Golub eb = buf + len; 176239680c7bSMikolaj Golub kp = kiv; 176339680c7bSMikolaj Golub /* Pass 2: unpack */ 176439680c7bSMikolaj Golub while (bp < eb) { 176539680c7bSMikolaj Golub kv = (struct kinfo_vmentry *)(uintptr_t)bp; 176639680c7bSMikolaj Golub /* Copy/expand into pre-zeroed buffer */ 176739680c7bSMikolaj Golub memcpy(kp, kv, kv->kve_structsize); 176839680c7bSMikolaj Golub /* Advance to next packed record */ 176939680c7bSMikolaj Golub bp += kv->kve_structsize; 177039680c7bSMikolaj Golub /* Set field size to fixed length, advance */ 177139680c7bSMikolaj Golub kp->kve_structsize = sizeof(*kp); 177239680c7bSMikolaj Golub kp++; 177339680c7bSMikolaj Golub } 177439680c7bSMikolaj Golub free(buf); 177539680c7bSMikolaj Golub *cntp = cnt; 177639680c7bSMikolaj Golub return (kiv); /* Caller must free() return value */ 177739680c7bSMikolaj Golub } 177839680c7bSMikolaj Golub 177939680c7bSMikolaj Golub struct kinfo_vmentry * 178039680c7bSMikolaj Golub procstat_getvmmap(struct procstat *procstat, struct kinfo_proc *kp, 178139680c7bSMikolaj Golub unsigned int *cntp) 178239680c7bSMikolaj Golub { 178389358231SMikolaj Golub 178439680c7bSMikolaj Golub switch(procstat->type) { 178539680c7bSMikolaj Golub case PROCSTAT_KVM: 178639680c7bSMikolaj Golub warnx("kvm method is not supported"); 178739680c7bSMikolaj Golub return (NULL); 178839680c7bSMikolaj Golub case PROCSTAT_SYSCTL: 178939680c7bSMikolaj Golub return (kinfo_getvmmap(kp->ki_pid, cntp)); 179039680c7bSMikolaj Golub case PROCSTAT_CORE: 179139680c7bSMikolaj Golub return (kinfo_getvmmap_core(procstat->core, cntp)); 179239680c7bSMikolaj Golub default: 179339680c7bSMikolaj Golub warnx("unknown access method: %d", procstat->type); 179439680c7bSMikolaj Golub return (NULL); 179539680c7bSMikolaj Golub } 179639680c7bSMikolaj Golub } 179739680c7bSMikolaj Golub 179839680c7bSMikolaj Golub void 179939680c7bSMikolaj Golub procstat_freevmmap(struct procstat *procstat __unused, 180039680c7bSMikolaj Golub struct kinfo_vmentry *vmmap) 180139680c7bSMikolaj Golub { 180239680c7bSMikolaj Golub 180339680c7bSMikolaj Golub free(vmmap); 180439680c7bSMikolaj Golub } 18057f1d14e6SMikolaj Golub 18067f1d14e6SMikolaj Golub static gid_t * 18071f84c47eSMikolaj Golub procstat_getgroups_kvm(kvm_t *kd, struct kinfo_proc *kp, unsigned int *cntp) 18081f84c47eSMikolaj Golub { 18091f84c47eSMikolaj Golub struct proc proc; 18101f84c47eSMikolaj Golub struct ucred ucred; 18111f84c47eSMikolaj Golub gid_t *groups; 18121f84c47eSMikolaj Golub size_t len; 18131f84c47eSMikolaj Golub 18141f84c47eSMikolaj Golub assert(kd != NULL); 18151f84c47eSMikolaj Golub assert(kp != NULL); 18161f84c47eSMikolaj Golub if (!kvm_read_all(kd, (unsigned long)kp->ki_paddr, &proc, 18171f84c47eSMikolaj Golub sizeof(proc))) { 18181f84c47eSMikolaj Golub warnx("can't read proc struct at %p for pid %d", 18191f84c47eSMikolaj Golub kp->ki_paddr, kp->ki_pid); 18201f84c47eSMikolaj Golub return (NULL); 18211f84c47eSMikolaj Golub } 18221f84c47eSMikolaj Golub if (proc.p_ucred == NOCRED) 18231f84c47eSMikolaj Golub return (NULL); 18241f84c47eSMikolaj Golub if (!kvm_read_all(kd, (unsigned long)proc.p_ucred, &ucred, 18251f84c47eSMikolaj Golub sizeof(ucred))) { 18261f84c47eSMikolaj Golub warnx("can't read ucred struct at %p for pid %d", 18271f84c47eSMikolaj Golub proc.p_ucred, kp->ki_pid); 18281f84c47eSMikolaj Golub return (NULL); 18291f84c47eSMikolaj Golub } 18301f84c47eSMikolaj Golub len = ucred.cr_ngroups * sizeof(gid_t); 18311f84c47eSMikolaj Golub groups = malloc(len); 18321f84c47eSMikolaj Golub if (groups == NULL) { 18331f84c47eSMikolaj Golub warn("malloc(%zu)", len); 18341f84c47eSMikolaj Golub return (NULL); 18351f84c47eSMikolaj Golub } 18361f84c47eSMikolaj Golub if (!kvm_read_all(kd, (unsigned long)ucred.cr_groups, groups, len)) { 18371f84c47eSMikolaj Golub warnx("can't read groups at %p for pid %d", 18381f84c47eSMikolaj Golub ucred.cr_groups, kp->ki_pid); 18391f84c47eSMikolaj Golub free(groups); 18401f84c47eSMikolaj Golub return (NULL); 18411f84c47eSMikolaj Golub } 18421f84c47eSMikolaj Golub *cntp = ucred.cr_ngroups; 18431f84c47eSMikolaj Golub return (groups); 18441f84c47eSMikolaj Golub } 18451f84c47eSMikolaj Golub 18461f84c47eSMikolaj Golub static gid_t * 18477f1d14e6SMikolaj Golub procstat_getgroups_sysctl(pid_t pid, unsigned int *cntp) 18487f1d14e6SMikolaj Golub { 18497f1d14e6SMikolaj Golub int mib[4]; 18507f1d14e6SMikolaj Golub size_t len; 18517f1d14e6SMikolaj Golub gid_t *groups; 18527f1d14e6SMikolaj Golub 18537f1d14e6SMikolaj Golub mib[0] = CTL_KERN; 18547f1d14e6SMikolaj Golub mib[1] = KERN_PROC; 18557f1d14e6SMikolaj Golub mib[2] = KERN_PROC_GROUPS; 18567f1d14e6SMikolaj Golub mib[3] = pid; 18577f1d14e6SMikolaj Golub len = (sysconf(_SC_NGROUPS_MAX) + 1) * sizeof(gid_t); 18587f1d14e6SMikolaj Golub groups = malloc(len); 18597f1d14e6SMikolaj Golub if (groups == NULL) { 18607f1d14e6SMikolaj Golub warn("malloc(%zu)", len); 18617f1d14e6SMikolaj Golub return (NULL); 18627f1d14e6SMikolaj Golub } 18637f1d14e6SMikolaj Golub if (sysctl(mib, 4, groups, &len, NULL, 0) == -1) { 18647f1d14e6SMikolaj Golub warn("sysctl: kern.proc.groups: %d", pid); 18657f1d14e6SMikolaj Golub free(groups); 18667f1d14e6SMikolaj Golub return (NULL); 18677f1d14e6SMikolaj Golub } 18687f1d14e6SMikolaj Golub *cntp = len / sizeof(gid_t); 18697f1d14e6SMikolaj Golub return (groups); 18707f1d14e6SMikolaj Golub } 18717f1d14e6SMikolaj Golub 18727f1d14e6SMikolaj Golub static gid_t * 18737f1d14e6SMikolaj Golub procstat_getgroups_core(struct procstat_core *core, unsigned int *cntp) 18747f1d14e6SMikolaj Golub { 18757f1d14e6SMikolaj Golub size_t len; 18767f1d14e6SMikolaj Golub gid_t *groups; 18777f1d14e6SMikolaj Golub 18787f1d14e6SMikolaj Golub groups = procstat_core_get(core, PSC_TYPE_GROUPS, NULL, &len); 18797f1d14e6SMikolaj Golub if (groups == NULL) 18807f1d14e6SMikolaj Golub return (NULL); 18817f1d14e6SMikolaj Golub *cntp = len / sizeof(gid_t); 18827f1d14e6SMikolaj Golub return (groups); 18837f1d14e6SMikolaj Golub } 18847f1d14e6SMikolaj Golub 18857f1d14e6SMikolaj Golub gid_t * 18867f1d14e6SMikolaj Golub procstat_getgroups(struct procstat *procstat, struct kinfo_proc *kp, 18877f1d14e6SMikolaj Golub unsigned int *cntp) 18887f1d14e6SMikolaj Golub { 18897f1d14e6SMikolaj Golub switch(procstat->type) { 18907f1d14e6SMikolaj Golub case PROCSTAT_KVM: 18911f84c47eSMikolaj Golub return (procstat_getgroups_kvm(procstat->kd, kp, cntp)); 18927f1d14e6SMikolaj Golub case PROCSTAT_SYSCTL: 18937f1d14e6SMikolaj Golub return (procstat_getgroups_sysctl(kp->ki_pid, cntp)); 18947f1d14e6SMikolaj Golub case PROCSTAT_CORE: 18957f1d14e6SMikolaj Golub return (procstat_getgroups_core(procstat->core, cntp)); 18967f1d14e6SMikolaj Golub default: 18977f1d14e6SMikolaj Golub warnx("unknown access method: %d", procstat->type); 18987f1d14e6SMikolaj Golub return (NULL); 18997f1d14e6SMikolaj Golub } 19007f1d14e6SMikolaj Golub } 19017f1d14e6SMikolaj Golub 19027f1d14e6SMikolaj Golub void 19037f1d14e6SMikolaj Golub procstat_freegroups(struct procstat *procstat __unused, gid_t *groups) 19047f1d14e6SMikolaj Golub { 19057f1d14e6SMikolaj Golub 19067f1d14e6SMikolaj Golub free(groups); 19077f1d14e6SMikolaj Golub } 19085b9bcba9SMikolaj Golub 19095b9bcba9SMikolaj Golub static int 19101f84c47eSMikolaj Golub procstat_getumask_kvm(kvm_t *kd, struct kinfo_proc *kp, unsigned short *maskp) 19111f84c47eSMikolaj Golub { 19121f84c47eSMikolaj Golub struct filedesc fd; 19131f84c47eSMikolaj Golub 19141f84c47eSMikolaj Golub assert(kd != NULL); 19151f84c47eSMikolaj Golub assert(kp != NULL); 19161f84c47eSMikolaj Golub if (kp->ki_fd == NULL) 19171f84c47eSMikolaj Golub return (-1); 19181f84c47eSMikolaj Golub if (!kvm_read_all(kd, (unsigned long)kp->ki_fd, &fd, sizeof(fd))) { 19191f84c47eSMikolaj Golub warnx("can't read filedesc at %p for pid %d", kp->ki_fd, 19201f84c47eSMikolaj Golub kp->ki_pid); 19211f84c47eSMikolaj Golub return (-1); 19221f84c47eSMikolaj Golub } 19231f84c47eSMikolaj Golub *maskp = fd.fd_cmask; 19241f84c47eSMikolaj Golub return (0); 19251f84c47eSMikolaj Golub } 19261f84c47eSMikolaj Golub 19271f84c47eSMikolaj Golub static int 19285b9bcba9SMikolaj Golub procstat_getumask_sysctl(pid_t pid, unsigned short *maskp) 19295b9bcba9SMikolaj Golub { 19305b9bcba9SMikolaj Golub int error; 19315b9bcba9SMikolaj Golub int mib[4]; 19325b9bcba9SMikolaj Golub size_t len; 19335b9bcba9SMikolaj Golub 19345b9bcba9SMikolaj Golub mib[0] = CTL_KERN; 19355b9bcba9SMikolaj Golub mib[1] = KERN_PROC; 19365b9bcba9SMikolaj Golub mib[2] = KERN_PROC_UMASK; 19375b9bcba9SMikolaj Golub mib[3] = pid; 19385b9bcba9SMikolaj Golub len = sizeof(*maskp); 19395b9bcba9SMikolaj Golub error = sysctl(mib, 4, maskp, &len, NULL, 0); 19405b9bcba9SMikolaj Golub if (error != 0 && errno != ESRCH) 19415b9bcba9SMikolaj Golub warn("sysctl: kern.proc.umask: %d", pid); 19425b9bcba9SMikolaj Golub return (error); 19435b9bcba9SMikolaj Golub } 19445b9bcba9SMikolaj Golub 19455b9bcba9SMikolaj Golub static int 19465b9bcba9SMikolaj Golub procstat_getumask_core(struct procstat_core *core, unsigned short *maskp) 19475b9bcba9SMikolaj Golub { 19485b9bcba9SMikolaj Golub size_t len; 19495b9bcba9SMikolaj Golub unsigned short *buf; 19505b9bcba9SMikolaj Golub 19515b9bcba9SMikolaj Golub buf = procstat_core_get(core, PSC_TYPE_UMASK, NULL, &len); 19525b9bcba9SMikolaj Golub if (buf == NULL) 19535b9bcba9SMikolaj Golub return (-1); 19545b9bcba9SMikolaj Golub if (len < sizeof(*maskp)) { 19555b9bcba9SMikolaj Golub free(buf); 19565b9bcba9SMikolaj Golub return (-1); 19575b9bcba9SMikolaj Golub } 19585b9bcba9SMikolaj Golub *maskp = *buf; 19595b9bcba9SMikolaj Golub free(buf); 19605b9bcba9SMikolaj Golub return (0); 19615b9bcba9SMikolaj Golub } 19625b9bcba9SMikolaj Golub 19635b9bcba9SMikolaj Golub int 19645b9bcba9SMikolaj Golub procstat_getumask(struct procstat *procstat, struct kinfo_proc *kp, 19655b9bcba9SMikolaj Golub unsigned short *maskp) 19665b9bcba9SMikolaj Golub { 19675b9bcba9SMikolaj Golub switch(procstat->type) { 19685b9bcba9SMikolaj Golub case PROCSTAT_KVM: 19691f84c47eSMikolaj Golub return (procstat_getumask_kvm(procstat->kd, kp, maskp)); 19705b9bcba9SMikolaj Golub case PROCSTAT_SYSCTL: 19715b9bcba9SMikolaj Golub return (procstat_getumask_sysctl(kp->ki_pid, maskp)); 19725b9bcba9SMikolaj Golub case PROCSTAT_CORE: 19735b9bcba9SMikolaj Golub return (procstat_getumask_core(procstat->core, maskp)); 19745b9bcba9SMikolaj Golub default: 19755b9bcba9SMikolaj Golub warnx("unknown access method: %d", procstat->type); 19765b9bcba9SMikolaj Golub return (-1); 19775b9bcba9SMikolaj Golub } 19785b9bcba9SMikolaj Golub } 19797cc0ebfdSMikolaj Golub 19807cc0ebfdSMikolaj Golub static int 19811f84c47eSMikolaj Golub procstat_getrlimit_kvm(kvm_t *kd, struct kinfo_proc *kp, int which, 19821f84c47eSMikolaj Golub struct rlimit* rlimit) 19831f84c47eSMikolaj Golub { 19841f84c47eSMikolaj Golub struct proc proc; 19851f84c47eSMikolaj Golub unsigned long offset; 19861f84c47eSMikolaj Golub 19871f84c47eSMikolaj Golub assert(kd != NULL); 19881f84c47eSMikolaj Golub assert(kp != NULL); 19891f84c47eSMikolaj Golub assert(which >= 0 && which < RLIM_NLIMITS); 19901f84c47eSMikolaj Golub if (!kvm_read_all(kd, (unsigned long)kp->ki_paddr, &proc, 19911f84c47eSMikolaj Golub sizeof(proc))) { 19921f84c47eSMikolaj Golub warnx("can't read proc struct at %p for pid %d", 19931f84c47eSMikolaj Golub kp->ki_paddr, kp->ki_pid); 19941f84c47eSMikolaj Golub return (-1); 19951f84c47eSMikolaj Golub } 19961f84c47eSMikolaj Golub if (proc.p_limit == NULL) 19971f84c47eSMikolaj Golub return (-1); 19981f84c47eSMikolaj Golub offset = (unsigned long)proc.p_limit + sizeof(struct rlimit) * which; 19991f84c47eSMikolaj Golub if (!kvm_read_all(kd, offset, rlimit, sizeof(*rlimit))) { 20001f84c47eSMikolaj Golub warnx("can't read rlimit struct at %p for pid %d", 20011f84c47eSMikolaj Golub (void *)offset, kp->ki_pid); 20021f84c47eSMikolaj Golub return (-1); 20031f84c47eSMikolaj Golub } 20041f84c47eSMikolaj Golub return (0); 20051f84c47eSMikolaj Golub } 20061f84c47eSMikolaj Golub 20071f84c47eSMikolaj Golub static int 20087cc0ebfdSMikolaj Golub procstat_getrlimit_sysctl(pid_t pid, int which, struct rlimit* rlimit) 20097cc0ebfdSMikolaj Golub { 20107cc0ebfdSMikolaj Golub int error, name[5]; 20117cc0ebfdSMikolaj Golub size_t len; 20127cc0ebfdSMikolaj Golub 20137cc0ebfdSMikolaj Golub name[0] = CTL_KERN; 20147cc0ebfdSMikolaj Golub name[1] = KERN_PROC; 20157cc0ebfdSMikolaj Golub name[2] = KERN_PROC_RLIMIT; 20167cc0ebfdSMikolaj Golub name[3] = pid; 20177cc0ebfdSMikolaj Golub name[4] = which; 20187cc0ebfdSMikolaj Golub len = sizeof(struct rlimit); 20197cc0ebfdSMikolaj Golub error = sysctl(name, 5, rlimit, &len, NULL, 0); 20207cc0ebfdSMikolaj Golub if (error < 0 && errno != ESRCH) { 20217cc0ebfdSMikolaj Golub warn("sysctl: kern.proc.rlimit: %d", pid); 20227cc0ebfdSMikolaj Golub return (-1); 20237cc0ebfdSMikolaj Golub } 20247cc0ebfdSMikolaj Golub if (error < 0 || len != sizeof(struct rlimit)) 20257cc0ebfdSMikolaj Golub return (-1); 20267cc0ebfdSMikolaj Golub return (0); 20277cc0ebfdSMikolaj Golub } 20287cc0ebfdSMikolaj Golub 20297cc0ebfdSMikolaj Golub static int 20307cc0ebfdSMikolaj Golub procstat_getrlimit_core(struct procstat_core *core, int which, 20317cc0ebfdSMikolaj Golub struct rlimit* rlimit) 20327cc0ebfdSMikolaj Golub { 20337cc0ebfdSMikolaj Golub size_t len; 20347cc0ebfdSMikolaj Golub struct rlimit* rlimits; 20357cc0ebfdSMikolaj Golub 20367cc0ebfdSMikolaj Golub if (which < 0 || which >= RLIM_NLIMITS) { 20377cc0ebfdSMikolaj Golub errno = EINVAL; 20387cc0ebfdSMikolaj Golub warn("getrlimit: which"); 20397cc0ebfdSMikolaj Golub return (-1); 20407cc0ebfdSMikolaj Golub } 20417cc0ebfdSMikolaj Golub rlimits = procstat_core_get(core, PSC_TYPE_RLIMIT, NULL, &len); 20427cc0ebfdSMikolaj Golub if (rlimits == NULL) 20437cc0ebfdSMikolaj Golub return (-1); 20447cc0ebfdSMikolaj Golub if (len < sizeof(struct rlimit) * RLIM_NLIMITS) { 20457cc0ebfdSMikolaj Golub free(rlimits); 20467cc0ebfdSMikolaj Golub return (-1); 20477cc0ebfdSMikolaj Golub } 20487cc0ebfdSMikolaj Golub *rlimit = rlimits[which]; 20497cc0ebfdSMikolaj Golub return (0); 20507cc0ebfdSMikolaj Golub } 20517cc0ebfdSMikolaj Golub 20527cc0ebfdSMikolaj Golub int 20537cc0ebfdSMikolaj Golub procstat_getrlimit(struct procstat *procstat, struct kinfo_proc *kp, int which, 20547cc0ebfdSMikolaj Golub struct rlimit* rlimit) 20557cc0ebfdSMikolaj Golub { 20567cc0ebfdSMikolaj Golub switch(procstat->type) { 20577cc0ebfdSMikolaj Golub case PROCSTAT_KVM: 20581f84c47eSMikolaj Golub return (procstat_getrlimit_kvm(procstat->kd, kp, which, 20591f84c47eSMikolaj Golub rlimit)); 20607cc0ebfdSMikolaj Golub case PROCSTAT_SYSCTL: 20617cc0ebfdSMikolaj Golub return (procstat_getrlimit_sysctl(kp->ki_pid, which, rlimit)); 20627cc0ebfdSMikolaj Golub case PROCSTAT_CORE: 20637cc0ebfdSMikolaj Golub return (procstat_getrlimit_core(procstat->core, which, rlimit)); 20647cc0ebfdSMikolaj Golub default: 20657cc0ebfdSMikolaj Golub warnx("unknown access method: %d", procstat->type); 20667cc0ebfdSMikolaj Golub return (-1); 20677cc0ebfdSMikolaj Golub } 20687cc0ebfdSMikolaj Golub } 20694cdf9796SMikolaj Golub 20704cdf9796SMikolaj Golub static int 20714cdf9796SMikolaj Golub procstat_getpathname_sysctl(pid_t pid, char *pathname, size_t maxlen) 20724cdf9796SMikolaj Golub { 20734cdf9796SMikolaj Golub int error, name[4]; 20744cdf9796SMikolaj Golub size_t len; 20754cdf9796SMikolaj Golub 20764cdf9796SMikolaj Golub name[0] = CTL_KERN; 20774cdf9796SMikolaj Golub name[1] = KERN_PROC; 20784cdf9796SMikolaj Golub name[2] = KERN_PROC_PATHNAME; 20794cdf9796SMikolaj Golub name[3] = pid; 20804cdf9796SMikolaj Golub len = maxlen; 20814cdf9796SMikolaj Golub error = sysctl(name, 4, pathname, &len, NULL, 0); 20824cdf9796SMikolaj Golub if (error != 0 && errno != ESRCH) 20834cdf9796SMikolaj Golub warn("sysctl: kern.proc.pathname: %d", pid); 20844cdf9796SMikolaj Golub if (len == 0) 20854cdf9796SMikolaj Golub pathname[0] = '\0'; 20864cdf9796SMikolaj Golub return (error); 20874cdf9796SMikolaj Golub } 20884cdf9796SMikolaj Golub 20894cdf9796SMikolaj Golub static int 20904cdf9796SMikolaj Golub procstat_getpathname_core(struct procstat_core *core, char *pathname, 20914cdf9796SMikolaj Golub size_t maxlen) 20924cdf9796SMikolaj Golub { 20934cdf9796SMikolaj Golub struct kinfo_file *files; 20944cdf9796SMikolaj Golub int cnt, i, result; 20954cdf9796SMikolaj Golub 20964cdf9796SMikolaj Golub files = kinfo_getfile_core(core, &cnt); 20974cdf9796SMikolaj Golub if (files == NULL) 20984cdf9796SMikolaj Golub return (-1); 20994cdf9796SMikolaj Golub result = -1; 21004cdf9796SMikolaj Golub for (i = 0; i < cnt; i++) { 21014cdf9796SMikolaj Golub if (files[i].kf_fd != KF_FD_TYPE_TEXT) 21024cdf9796SMikolaj Golub continue; 21034cdf9796SMikolaj Golub strncpy(pathname, files[i].kf_path, maxlen); 21044cdf9796SMikolaj Golub result = 0; 21054cdf9796SMikolaj Golub break; 21064cdf9796SMikolaj Golub } 21074cdf9796SMikolaj Golub free(files); 21084cdf9796SMikolaj Golub return (result); 21094cdf9796SMikolaj Golub } 21104cdf9796SMikolaj Golub 21114cdf9796SMikolaj Golub int 21124cdf9796SMikolaj Golub procstat_getpathname(struct procstat *procstat, struct kinfo_proc *kp, 21134cdf9796SMikolaj Golub char *pathname, size_t maxlen) 21144cdf9796SMikolaj Golub { 21154cdf9796SMikolaj Golub switch(procstat->type) { 21164cdf9796SMikolaj Golub case PROCSTAT_KVM: 2117*dd70ad64SMikolaj Golub /* XXX: Return empty string. */ 2118*dd70ad64SMikolaj Golub if (maxlen > 0) 2119*dd70ad64SMikolaj Golub pathname[0] = '\0'; 2120*dd70ad64SMikolaj Golub return (0); 21214cdf9796SMikolaj Golub case PROCSTAT_SYSCTL: 21224cdf9796SMikolaj Golub return (procstat_getpathname_sysctl(kp->ki_pid, pathname, 21234cdf9796SMikolaj Golub maxlen)); 21244cdf9796SMikolaj Golub case PROCSTAT_CORE: 21254cdf9796SMikolaj Golub return (procstat_getpathname_core(procstat->core, pathname, 21264cdf9796SMikolaj Golub maxlen)); 21274cdf9796SMikolaj Golub default: 21284cdf9796SMikolaj Golub warnx("unknown access method: %d", procstat->type); 21294cdf9796SMikolaj Golub return (-1); 21304cdf9796SMikolaj Golub } 21314cdf9796SMikolaj Golub } 2132eec6cb1cSMikolaj Golub 2133eec6cb1cSMikolaj Golub static int 21341f84c47eSMikolaj Golub procstat_getosrel_kvm(kvm_t *kd, struct kinfo_proc *kp, int *osrelp) 21351f84c47eSMikolaj Golub { 21361f84c47eSMikolaj Golub struct proc proc; 21371f84c47eSMikolaj Golub 21381f84c47eSMikolaj Golub assert(kd != NULL); 21391f84c47eSMikolaj Golub assert(kp != NULL); 21401f84c47eSMikolaj Golub if (!kvm_read_all(kd, (unsigned long)kp->ki_paddr, &proc, 21411f84c47eSMikolaj Golub sizeof(proc))) { 21421f84c47eSMikolaj Golub warnx("can't read proc struct at %p for pid %d", 21431f84c47eSMikolaj Golub kp->ki_paddr, kp->ki_pid); 21441f84c47eSMikolaj Golub return (-1); 21451f84c47eSMikolaj Golub } 21461f84c47eSMikolaj Golub *osrelp = proc.p_osrel; 21471f84c47eSMikolaj Golub return (0); 21481f84c47eSMikolaj Golub } 21491f84c47eSMikolaj Golub 21501f84c47eSMikolaj Golub static int 2151eec6cb1cSMikolaj Golub procstat_getosrel_sysctl(pid_t pid, int *osrelp) 2152eec6cb1cSMikolaj Golub { 2153eec6cb1cSMikolaj Golub int error, name[4]; 2154eec6cb1cSMikolaj Golub size_t len; 2155eec6cb1cSMikolaj Golub 2156eec6cb1cSMikolaj Golub name[0] = CTL_KERN; 2157eec6cb1cSMikolaj Golub name[1] = KERN_PROC; 2158eec6cb1cSMikolaj Golub name[2] = KERN_PROC_OSREL; 2159eec6cb1cSMikolaj Golub name[3] = pid; 2160eec6cb1cSMikolaj Golub len = sizeof(*osrelp); 2161eec6cb1cSMikolaj Golub error = sysctl(name, 4, osrelp, &len, NULL, 0); 2162eec6cb1cSMikolaj Golub if (error != 0 && errno != ESRCH) 2163eec6cb1cSMikolaj Golub warn("sysctl: kern.proc.osrel: %d", pid); 2164eec6cb1cSMikolaj Golub return (error); 2165eec6cb1cSMikolaj Golub } 2166eec6cb1cSMikolaj Golub 2167eec6cb1cSMikolaj Golub static int 2168eec6cb1cSMikolaj Golub procstat_getosrel_core(struct procstat_core *core, int *osrelp) 2169eec6cb1cSMikolaj Golub { 2170eec6cb1cSMikolaj Golub size_t len; 2171eec6cb1cSMikolaj Golub int *buf; 2172eec6cb1cSMikolaj Golub 2173eec6cb1cSMikolaj Golub buf = procstat_core_get(core, PSC_TYPE_OSREL, NULL, &len); 2174eec6cb1cSMikolaj Golub if (buf == NULL) 2175eec6cb1cSMikolaj Golub return (-1); 2176eec6cb1cSMikolaj Golub if (len < sizeof(*osrelp)) { 2177eec6cb1cSMikolaj Golub free(buf); 2178eec6cb1cSMikolaj Golub return (-1); 2179eec6cb1cSMikolaj Golub } 2180eec6cb1cSMikolaj Golub *osrelp = *buf; 2181eec6cb1cSMikolaj Golub free(buf); 2182eec6cb1cSMikolaj Golub return (0); 2183eec6cb1cSMikolaj Golub } 2184eec6cb1cSMikolaj Golub 2185eec6cb1cSMikolaj Golub int 2186eec6cb1cSMikolaj Golub procstat_getosrel(struct procstat *procstat, struct kinfo_proc *kp, int *osrelp) 2187eec6cb1cSMikolaj Golub { 2188eec6cb1cSMikolaj Golub switch(procstat->type) { 2189eec6cb1cSMikolaj Golub case PROCSTAT_KVM: 21901f84c47eSMikolaj Golub return (procstat_getosrel_kvm(procstat->kd, kp, osrelp)); 2191eec6cb1cSMikolaj Golub case PROCSTAT_SYSCTL: 2192eec6cb1cSMikolaj Golub return (procstat_getosrel_sysctl(kp->ki_pid, osrelp)); 2193eec6cb1cSMikolaj Golub case PROCSTAT_CORE: 2194eec6cb1cSMikolaj Golub return (procstat_getosrel_core(procstat->core, osrelp)); 2195eec6cb1cSMikolaj Golub default: 2196eec6cb1cSMikolaj Golub warnx("unknown access method: %d", procstat->type); 2197eec6cb1cSMikolaj Golub return (-1); 2198eec6cb1cSMikolaj Golub } 2199eec6cb1cSMikolaj Golub } 22002ff020d3SMikolaj Golub 22012ff020d3SMikolaj Golub #define PROC_AUXV_MAX 256 22022ff020d3SMikolaj Golub 22032ff020d3SMikolaj Golub #if __ELF_WORD_SIZE == 64 22042ff020d3SMikolaj Golub static const char *elf32_sv_names[] = { 22052ff020d3SMikolaj Golub "Linux ELF32", 22062ff020d3SMikolaj Golub "FreeBSD ELF32", 22072ff020d3SMikolaj Golub }; 22082ff020d3SMikolaj Golub 22092ff020d3SMikolaj Golub static int 22102ff020d3SMikolaj Golub is_elf32_sysctl(pid_t pid) 22112ff020d3SMikolaj Golub { 22122ff020d3SMikolaj Golub int error, name[4]; 22132ff020d3SMikolaj Golub size_t len, i; 22142ff020d3SMikolaj Golub static char sv_name[256]; 22152ff020d3SMikolaj Golub 22162ff020d3SMikolaj Golub name[0] = CTL_KERN; 22172ff020d3SMikolaj Golub name[1] = KERN_PROC; 22182ff020d3SMikolaj Golub name[2] = KERN_PROC_SV_NAME; 22192ff020d3SMikolaj Golub name[3] = pid; 22202ff020d3SMikolaj Golub len = sizeof(sv_name); 22212ff020d3SMikolaj Golub error = sysctl(name, 4, sv_name, &len, NULL, 0); 22222ff020d3SMikolaj Golub if (error != 0 || len == 0) 22232ff020d3SMikolaj Golub return (0); 22242ff020d3SMikolaj Golub for (i = 0; i < sizeof(elf32_sv_names) / sizeof(*elf32_sv_names); i++) { 22252ff020d3SMikolaj Golub if (strncmp(sv_name, elf32_sv_names[i], sizeof(sv_name)) == 0) 22262ff020d3SMikolaj Golub return (1); 22272ff020d3SMikolaj Golub } 22282ff020d3SMikolaj Golub return (0); 22292ff020d3SMikolaj Golub } 22302ff020d3SMikolaj Golub 22312ff020d3SMikolaj Golub static Elf_Auxinfo * 22322ff020d3SMikolaj Golub procstat_getauxv32_sysctl(pid_t pid, unsigned int *cntp) 22332ff020d3SMikolaj Golub { 22342ff020d3SMikolaj Golub Elf_Auxinfo *auxv; 22352ff020d3SMikolaj Golub Elf32_Auxinfo *auxv32; 22362ff020d3SMikolaj Golub void *ptr; 22372ff020d3SMikolaj Golub size_t len; 22382ff020d3SMikolaj Golub unsigned int i, count; 22392ff020d3SMikolaj Golub int name[4]; 22402ff020d3SMikolaj Golub 22412ff020d3SMikolaj Golub name[0] = CTL_KERN; 22422ff020d3SMikolaj Golub name[1] = KERN_PROC; 22432ff020d3SMikolaj Golub name[2] = KERN_PROC_AUXV; 22442ff020d3SMikolaj Golub name[3] = pid; 22452ff020d3SMikolaj Golub len = PROC_AUXV_MAX * sizeof(Elf32_Auxinfo); 22462ff020d3SMikolaj Golub auxv = NULL; 22472ff020d3SMikolaj Golub auxv32 = malloc(len); 22482ff020d3SMikolaj Golub if (auxv32 == NULL) { 22492ff020d3SMikolaj Golub warn("malloc(%zu)", len); 22502ff020d3SMikolaj Golub goto out; 22512ff020d3SMikolaj Golub } 22522ff020d3SMikolaj Golub if (sysctl(name, 4, auxv32, &len, NULL, 0) == -1) { 22532ff020d3SMikolaj Golub if (errno != ESRCH && errno != EPERM) 22542ff020d3SMikolaj Golub warn("sysctl: kern.proc.auxv: %d: %d", pid, errno); 22552ff020d3SMikolaj Golub goto out; 22562ff020d3SMikolaj Golub } 22572ff020d3SMikolaj Golub count = len / sizeof(Elf_Auxinfo); 22582ff020d3SMikolaj Golub auxv = malloc(count * sizeof(Elf_Auxinfo)); 22592ff020d3SMikolaj Golub if (auxv == NULL) { 22602ff020d3SMikolaj Golub warn("malloc(%zu)", count * sizeof(Elf_Auxinfo)); 22612ff020d3SMikolaj Golub goto out; 22622ff020d3SMikolaj Golub } 22632ff020d3SMikolaj Golub for (i = 0; i < count; i++) { 22642ff020d3SMikolaj Golub /* 22652ff020d3SMikolaj Golub * XXX: We expect that values for a_type on a 32-bit platform 22662ff020d3SMikolaj Golub * are directly mapped to values on 64-bit one, which is not 22672ff020d3SMikolaj Golub * necessarily true. 22682ff020d3SMikolaj Golub */ 22692ff020d3SMikolaj Golub auxv[i].a_type = auxv32[i].a_type; 22702ff020d3SMikolaj Golub ptr = &auxv32[i].a_un; 22712ff020d3SMikolaj Golub auxv[i].a_un.a_val = *((uint32_t *)ptr); 22722ff020d3SMikolaj Golub } 22732ff020d3SMikolaj Golub *cntp = count; 22742ff020d3SMikolaj Golub out: 22752ff020d3SMikolaj Golub free(auxv32); 22762ff020d3SMikolaj Golub return (auxv); 22772ff020d3SMikolaj Golub } 22782ff020d3SMikolaj Golub #endif /* __ELF_WORD_SIZE == 64 */ 22792ff020d3SMikolaj Golub 22802ff020d3SMikolaj Golub static Elf_Auxinfo * 22812ff020d3SMikolaj Golub procstat_getauxv_sysctl(pid_t pid, unsigned int *cntp) 22822ff020d3SMikolaj Golub { 22832ff020d3SMikolaj Golub Elf_Auxinfo *auxv; 22842ff020d3SMikolaj Golub int name[4]; 22852ff020d3SMikolaj Golub size_t len; 22862ff020d3SMikolaj Golub 22872ff020d3SMikolaj Golub #if __ELF_WORD_SIZE == 64 22882ff020d3SMikolaj Golub if (is_elf32_sysctl(pid)) 22892ff020d3SMikolaj Golub return (procstat_getauxv32_sysctl(pid, cntp)); 22902ff020d3SMikolaj Golub #endif 22912ff020d3SMikolaj Golub name[0] = CTL_KERN; 22922ff020d3SMikolaj Golub name[1] = KERN_PROC; 22932ff020d3SMikolaj Golub name[2] = KERN_PROC_AUXV; 22942ff020d3SMikolaj Golub name[3] = pid; 22952ff020d3SMikolaj Golub len = PROC_AUXV_MAX * sizeof(Elf_Auxinfo); 22962ff020d3SMikolaj Golub auxv = malloc(len); 22972ff020d3SMikolaj Golub if (auxv == NULL) { 22982ff020d3SMikolaj Golub warn("malloc(%zu)", len); 22992ff020d3SMikolaj Golub return (NULL); 23002ff020d3SMikolaj Golub } 23012ff020d3SMikolaj Golub if (sysctl(name, 4, auxv, &len, NULL, 0) == -1) { 23022ff020d3SMikolaj Golub if (errno != ESRCH && errno != EPERM) 23032ff020d3SMikolaj Golub warn("sysctl: kern.proc.auxv: %d: %d", pid, errno); 23042ff020d3SMikolaj Golub free(auxv); 23052ff020d3SMikolaj Golub return (NULL); 23062ff020d3SMikolaj Golub } 23072ff020d3SMikolaj Golub *cntp = len / sizeof(Elf_Auxinfo); 23082ff020d3SMikolaj Golub return (auxv); 23092ff020d3SMikolaj Golub } 23102ff020d3SMikolaj Golub 23112ff020d3SMikolaj Golub static Elf_Auxinfo * 23122ff020d3SMikolaj Golub procstat_getauxv_core(struct procstat_core *core, unsigned int *cntp) 23132ff020d3SMikolaj Golub { 23142ff020d3SMikolaj Golub Elf_Auxinfo *auxv; 23152ff020d3SMikolaj Golub size_t len; 23162ff020d3SMikolaj Golub 23172ff020d3SMikolaj Golub auxv = procstat_core_get(core, PSC_TYPE_AUXV, NULL, &len); 23182ff020d3SMikolaj Golub if (auxv == NULL) 23192ff020d3SMikolaj Golub return (NULL); 23202ff020d3SMikolaj Golub *cntp = len / sizeof(Elf_Auxinfo); 23212ff020d3SMikolaj Golub return (auxv); 23222ff020d3SMikolaj Golub } 23232ff020d3SMikolaj Golub 23242ff020d3SMikolaj Golub Elf_Auxinfo * 23252ff020d3SMikolaj Golub procstat_getauxv(struct procstat *procstat, struct kinfo_proc *kp, 23262ff020d3SMikolaj Golub unsigned int *cntp) 23272ff020d3SMikolaj Golub { 23282ff020d3SMikolaj Golub switch(procstat->type) { 23292ff020d3SMikolaj Golub case PROCSTAT_KVM: 23302ff020d3SMikolaj Golub warnx("kvm method is not supported"); 23312ff020d3SMikolaj Golub return (NULL); 23322ff020d3SMikolaj Golub case PROCSTAT_SYSCTL: 23332ff020d3SMikolaj Golub return (procstat_getauxv_sysctl(kp->ki_pid, cntp)); 23342ff020d3SMikolaj Golub case PROCSTAT_CORE: 23352ff020d3SMikolaj Golub return (procstat_getauxv_core(procstat->core, cntp)); 23362ff020d3SMikolaj Golub default: 23372ff020d3SMikolaj Golub warnx("unknown access method: %d", procstat->type); 23382ff020d3SMikolaj Golub return (NULL); 23392ff020d3SMikolaj Golub } 23402ff020d3SMikolaj Golub } 23412ff020d3SMikolaj Golub 23422ff020d3SMikolaj Golub void 23432ff020d3SMikolaj Golub procstat_freeauxv(struct procstat *procstat __unused, Elf_Auxinfo *auxv) 23442ff020d3SMikolaj Golub { 23452ff020d3SMikolaj Golub 23462ff020d3SMikolaj Golub free(auxv); 23472ff020d3SMikolaj Golub } 234889358231SMikolaj Golub 234989358231SMikolaj Golub static struct kinfo_kstack * 235089358231SMikolaj Golub procstat_getkstack_sysctl(pid_t pid, int *cntp) 235189358231SMikolaj Golub { 235289358231SMikolaj Golub struct kinfo_kstack *kkstp; 235389358231SMikolaj Golub int error, name[4]; 235489358231SMikolaj Golub size_t len; 235589358231SMikolaj Golub 235689358231SMikolaj Golub name[0] = CTL_KERN; 235789358231SMikolaj Golub name[1] = KERN_PROC; 235889358231SMikolaj Golub name[2] = KERN_PROC_KSTACK; 235989358231SMikolaj Golub name[3] = pid; 236089358231SMikolaj Golub 236189358231SMikolaj Golub len = 0; 236289358231SMikolaj Golub error = sysctl(name, 4, NULL, &len, NULL, 0); 236389358231SMikolaj Golub if (error < 0 && errno != ESRCH && errno != EPERM && errno != ENOENT) { 236489358231SMikolaj Golub warn("sysctl: kern.proc.kstack: %d", pid); 236589358231SMikolaj Golub return (NULL); 236689358231SMikolaj Golub } 236789358231SMikolaj Golub if (error == -1 && errno == ENOENT) { 236889358231SMikolaj Golub warnx("sysctl: kern.proc.kstack unavailable" 236989358231SMikolaj Golub " (options DDB or options STACK required in kernel)"); 237089358231SMikolaj Golub return (NULL); 237189358231SMikolaj Golub } 237289358231SMikolaj Golub if (error == -1) 237389358231SMikolaj Golub return (NULL); 237489358231SMikolaj Golub kkstp = malloc(len); 237589358231SMikolaj Golub if (kkstp == NULL) { 237689358231SMikolaj Golub warn("malloc(%zu)", len); 237789358231SMikolaj Golub return (NULL); 237889358231SMikolaj Golub } 237989358231SMikolaj Golub if (sysctl(name, 4, kkstp, &len, NULL, 0) == -1) { 238089358231SMikolaj Golub warn("sysctl: kern.proc.pid: %d", pid); 238189358231SMikolaj Golub free(kkstp); 238289358231SMikolaj Golub return (NULL); 238389358231SMikolaj Golub } 238489358231SMikolaj Golub *cntp = len / sizeof(*kkstp); 238589358231SMikolaj Golub 238689358231SMikolaj Golub return (kkstp); 238789358231SMikolaj Golub } 238889358231SMikolaj Golub 238989358231SMikolaj Golub struct kinfo_kstack * 239089358231SMikolaj Golub procstat_getkstack(struct procstat *procstat, struct kinfo_proc *kp, 239189358231SMikolaj Golub unsigned int *cntp) 239289358231SMikolaj Golub { 239389358231SMikolaj Golub switch(procstat->type) { 239489358231SMikolaj Golub case PROCSTAT_KVM: 239589358231SMikolaj Golub warnx("kvm method is not supported"); 239689358231SMikolaj Golub return (NULL); 239789358231SMikolaj Golub case PROCSTAT_SYSCTL: 239889358231SMikolaj Golub return (procstat_getkstack_sysctl(kp->ki_pid, cntp)); 239989358231SMikolaj Golub case PROCSTAT_CORE: 240089358231SMikolaj Golub warnx("core method is not supported"); 240189358231SMikolaj Golub return (NULL); 240289358231SMikolaj Golub default: 240389358231SMikolaj Golub warnx("unknown access method: %d", procstat->type); 240489358231SMikolaj Golub return (NULL); 240589358231SMikolaj Golub } 240689358231SMikolaj Golub } 240789358231SMikolaj Golub 240889358231SMikolaj Golub void 240989358231SMikolaj Golub procstat_freekstack(struct procstat *procstat __unused, 241089358231SMikolaj Golub struct kinfo_kstack *kkstp) 241189358231SMikolaj Golub { 241289358231SMikolaj Golub 241389358231SMikolaj Golub free(kkstp); 241489358231SMikolaj Golub } 2415