xref: /illumos-gate/usr/src/uts/common/fs/proc/prvnops.c (revision 7b34a9a5df26271af0da06974fc361c468cd48d3)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright (c) 1989, 2010, Oracle and/or its affiliates. All rights reserved.
24  * Copyright (c) 2018, Joyent, Inc.
25  * Copyright (c) 2017 by Delphix. All rights reserved.
26  * Copyright 2020 OmniOS Community Edition (OmniOSce) Association.
27  */
28 
29 /*	Copyright (c) 1984,	 1986, 1987, 1988, 1989 AT&T	*/
30 /*	  All Rights Reserved	*/
31 
32 #include <sys/types.h>
33 #include <sys/param.h>
34 #include <sys/time.h>
35 #include <sys/cred.h>
36 #include <sys/policy.h>
37 #include <sys/debug.h>
38 #include <sys/dirent.h>
39 #include <sys/errno.h>
40 #include <sys/file.h>
41 #include <sys/inline.h>
42 #include <sys/kmem.h>
43 #include <sys/pathname.h>
44 #include <sys/proc.h>
45 #include <sys/brand.h>
46 #include <sys/signal.h>
47 #include <sys/stat.h>
48 #include <sys/sysmacros.h>
49 #include <sys/systm.h>
50 #include <sys/zone.h>
51 #include <sys/uio.h>
52 #include <sys/var.h>
53 #include <sys/mode.h>
54 #include <sys/poll.h>
55 #include <sys/user.h>
56 #include <sys/vfs.h>
57 #include <sys/vfs_opreg.h>
58 #include <sys/gfs.h>
59 #include <sys/vnode.h>
60 #include <sys/fault.h>
61 #include <sys/syscall.h>
62 #include <sys/procfs.h>
63 #include <sys/atomic.h>
64 #include <sys/cmn_err.h>
65 #include <sys/contract_impl.h>
66 #include <sys/ctfs.h>
67 #include <sys/avl.h>
68 #include <sys/ctype.h>
69 #include <fs/fs_subr.h>
70 #include <vm/rm.h>
71 #include <vm/as.h>
72 #include <vm/seg.h>
73 #include <vm/seg_vn.h>
74 #include <vm/hat.h>
75 #include <fs/proc/prdata.h>
76 #if defined(__sparc)
77 #include <sys/regset.h>
78 #endif
79 #if defined(__x86)
80 #include <sys/sysi86.h>
81 #endif
82 
83 /*
84  * Created by prinit.
85  */
86 vnodeops_t *prvnodeops;
87 
88 /*
89  * Directory characteristics (patterned after the s5 file system).
90  */
91 #define	PRROOTINO	2
92 
93 #define	PRDIRSIZE	14
94 struct prdirect {
95 	ushort_t	d_ino;
96 	char		d_name[PRDIRSIZE];
97 };
98 
99 #define	PRSDSIZE	(sizeof (struct prdirect))
100 
101 /*
102  * Directory characteristics.
103  */
104 typedef struct prdirent {
105 	ino64_t		d_ino;		/* "inode number" of entry */
106 	off64_t		d_off;		/* offset of disk directory entry */
107 	unsigned short	d_reclen;	/* length of this record */
108 	char		d_name[14];	/* name of file */
109 } prdirent_t;
110 
111 /*
112  * Contents of a /proc/<pid> directory.
113  * Reuse d_ino field for the /proc file type.
114  */
115 static prdirent_t piddir[] = {
116 	{ PR_PIDDIR,	 1 * sizeof (prdirent_t), sizeof (prdirent_t),
117 		"." },
118 	{ PR_PROCDIR,	 2 * sizeof (prdirent_t), sizeof (prdirent_t),
119 		".." },
120 	{ PR_AS,	 3 * sizeof (prdirent_t), sizeof (prdirent_t),
121 		"as" },
122 	{ PR_CTL,	 4 * sizeof (prdirent_t), sizeof (prdirent_t),
123 		"ctl" },
124 	{ PR_STATUS,	 5 * sizeof (prdirent_t), sizeof (prdirent_t),
125 		"status" },
126 	{ PR_LSTATUS,	 6 * sizeof (prdirent_t), sizeof (prdirent_t),
127 		"lstatus" },
128 	{ PR_PSINFO,	 7 * sizeof (prdirent_t), sizeof (prdirent_t),
129 		"psinfo" },
130 	{ PR_LPSINFO,	 8 * sizeof (prdirent_t), sizeof (prdirent_t),
131 		"lpsinfo" },
132 	{ PR_MAP,	 9 * sizeof (prdirent_t), sizeof (prdirent_t),
133 		"map" },
134 	{ PR_RMAP,	10 * sizeof (prdirent_t), sizeof (prdirent_t),
135 		"rmap" },
136 	{ PR_XMAP,	11 * sizeof (prdirent_t), sizeof (prdirent_t),
137 		"xmap" },
138 	{ PR_CRED,	12 * sizeof (prdirent_t), sizeof (prdirent_t),
139 		"cred" },
140 	{ PR_SIGACT,	13 * sizeof (prdirent_t), sizeof (prdirent_t),
141 		"sigact" },
142 	{ PR_AUXV,	14 * sizeof (prdirent_t), sizeof (prdirent_t),
143 		"auxv" },
144 	{ PR_USAGE,	15 * sizeof (prdirent_t), sizeof (prdirent_t),
145 		"usage" },
146 	{ PR_LUSAGE,	16 * sizeof (prdirent_t), sizeof (prdirent_t),
147 		"lusage" },
148 	{ PR_PAGEDATA,	17 * sizeof (prdirent_t), sizeof (prdirent_t),
149 		"pagedata" },
150 	{ PR_WATCH,	18 * sizeof (prdirent_t), sizeof (prdirent_t),
151 		"watch" },
152 	{ PR_CURDIR,	19 * sizeof (prdirent_t), sizeof (prdirent_t),
153 		"cwd" },
154 	{ PR_ROOTDIR,	20 * sizeof (prdirent_t), sizeof (prdirent_t),
155 		"root" },
156 	{ PR_FDDIR,	21 * sizeof (prdirent_t), sizeof (prdirent_t),
157 		"fd" },
158 	{ PR_FDINFODIR,	22 * sizeof (prdirent_t), sizeof (prdirent_t),
159 		"fdinfo" },
160 	{ PR_OBJECTDIR,	23 * sizeof (prdirent_t), sizeof (prdirent_t),
161 		"object" },
162 	{ PR_LWPDIR,	24 * sizeof (prdirent_t), sizeof (prdirent_t),
163 		"lwp" },
164 	{ PR_PRIV,	25 * sizeof (prdirent_t), sizeof (prdirent_t),
165 		"priv" },
166 	{ PR_PATHDIR,	26 * sizeof (prdirent_t), sizeof (prdirent_t),
167 		"path" },
168 	{ PR_CTDIR,	27 * sizeof (prdirent_t), sizeof (prdirent_t),
169 		"contracts" },
170 	{ PR_SECFLAGS,	28 * sizeof (prdirent_t), sizeof (prdirent_t),
171 		"secflags" },
172 #if defined(__x86)
173 	{ PR_LDT,	29 * sizeof (prdirent_t), sizeof (prdirent_t),
174 		"ldt" },
175 #endif
176 };
177 
178 #define	NPIDDIRFILES	(sizeof (piddir) / sizeof (piddir[0]) - 2)
179 
180 /*
181  * Contents of a /proc/<pid>/lwp/<lwpid> directory.
182  */
183 static prdirent_t lwpiddir[] = {
184 	{ PR_LWPIDDIR,	 1 * sizeof (prdirent_t), sizeof (prdirent_t),
185 		"." },
186 	{ PR_LWPDIR,	 2 * sizeof (prdirent_t), sizeof (prdirent_t),
187 		".." },
188 	{ PR_LWPCTL,	 3 * sizeof (prdirent_t), sizeof (prdirent_t),
189 		"lwpctl" },
190 	{ PR_LWPNAME,	 4 * sizeof (prdirent_t), sizeof (prdirent_t),
191 		"lwpname" },
192 	{ PR_LWPSTATUS,	 5 * sizeof (prdirent_t), sizeof (prdirent_t),
193 		"lwpstatus" },
194 	{ PR_LWPSINFO,	 6 * sizeof (prdirent_t), sizeof (prdirent_t),
195 		"lwpsinfo" },
196 	{ PR_LWPUSAGE,	 7 * sizeof (prdirent_t), sizeof (prdirent_t),
197 		"lwpusage" },
198 	{ PR_XREGS,	 8 * sizeof (prdirent_t), sizeof (prdirent_t),
199 		"xregs" },
200 	{ PR_TMPLDIR,	 9 * sizeof (prdirent_t), sizeof (prdirent_t),
201 		"templates" },
202 	{ PR_SPYMASTER,	 10 * sizeof (prdirent_t), sizeof (prdirent_t),
203 		"spymaster" },
204 #if defined(__sparc)
205 	{ PR_GWINDOWS,	11 * sizeof (prdirent_t), sizeof (prdirent_t),
206 		"gwindows" },
207 	{ PR_ASRS,	12 * sizeof (prdirent_t), sizeof (prdirent_t),
208 		"asrs" },
209 #endif
210 };
211 
212 #define	NLWPIDDIRFILES	(sizeof (lwpiddir) / sizeof (lwpiddir[0]) - 2)
213 
214 /*
215  * Span of entries in the array files (lstatus, lpsinfo, lusage).
216  * We make the span larger than the size of the structure on purpose,
217  * to make sure that programs cannot use the structure size by mistake.
218  * Align _ILP32 structures at 8 bytes, _LP64 structures at 16 bytes.
219  */
220 #ifdef _LP64
221 #define	LSPAN(type)	(round16(sizeof (type)) + 16)
222 #define	LSPAN32(type)	(round8(sizeof (type)) + 8)
223 #else
224 #define	LSPAN(type)	(round8(sizeof (type)) + 8)
225 #endif
226 
227 static void rebuild_objdir(struct as *);
228 static void prfreecommon(prcommon_t *);
229 static int praccess(vnode_t *, int, int, cred_t *, caller_context_t *);
230 
231 static int
232 propen(vnode_t **vpp, int flag, cred_t *cr, caller_context_t *ct)
233 {
234 	vnode_t *vp = *vpp;
235 	prnode_t *pnp = VTOP(vp);
236 	prcommon_t *pcp = pnp->pr_pcommon;
237 	prnodetype_t type = pnp->pr_type;
238 	vnode_t *rvp;
239 	vtype_t vtype;
240 	proc_t *p;
241 	int error = 0;
242 	prnode_t *npnp = NULL;
243 
244 	/*
245 	 * Nothing to do for the /proc directory itself.
246 	 */
247 	if (type == PR_PROCDIR)
248 		return (0);
249 
250 	/*
251 	 * If we are opening an underlying mapped object, reject opens
252 	 * for writing regardless of the objects's access modes.
253 	 * If we are opening a file in the /proc/pid/fd directory,
254 	 * reject the open for any but a regular file or directory.
255 	 * Just do it if we are opening the current or root directory.
256 	 */
257 	switch (type) {
258 	case PR_OBJECT:
259 	case PR_FD:
260 	case PR_CURDIR:
261 	case PR_ROOTDIR:
262 		rvp = pnp->pr_realvp;
263 		vtype = rvp->v_type;
264 		if ((type == PR_OBJECT && (flag & FWRITE)) ||
265 		    (type == PR_FD && vtype != VREG && vtype != VDIR))
266 			error = EACCES;
267 		else {
268 			/*
269 			 * Need to hold rvp since VOP_OPEN() may release it.
270 			 */
271 			VN_HOLD(rvp);
272 			error = VOP_OPEN(&rvp, flag, cr, ct);
273 			if (error) {
274 				VN_RELE(rvp);
275 			} else {
276 				*vpp = rvp;
277 				VN_RELE(vp);
278 			}
279 		}
280 		return (error);
281 	default:
282 		break;
283 	}
284 
285 	/*
286 	 * If we are opening the pagedata file, allocate a prnode now
287 	 * to avoid calling kmem_alloc() while holding p->p_lock.
288 	 */
289 	if (type == PR_PAGEDATA || type == PR_OPAGEDATA)
290 		npnp = prgetnode(vp, type);
291 
292 	/*
293 	 * If the process exists, lock it now.
294 	 * Otherwise we have a race condition with prclose().
295 	 */
296 	p = pr_p_lock(pnp);
297 	mutex_exit(&pr_pidlock);
298 	if (p == NULL) {
299 		if (npnp != NULL)
300 			prfreenode(npnp);
301 		return (ENOENT);
302 	}
303 	ASSERT(p == pcp->prc_proc);
304 	ASSERT(p->p_proc_flag & P_PR_LOCK);
305 
306 	/*
307 	 * Maintain a count of opens for write.  Allow exactly one
308 	 * O_WRITE|O_EXCL request and fail subsequent ones.
309 	 * Don't fail opens of old (bletch!) /proc lwp files.
310 	 * Special case for open by the process itself:
311 	 * Always allow the open by self and discount this
312 	 * open for other opens for writing.
313 	 */
314 	if (flag & FWRITE) {
315 		if (p == curproc) {
316 			pcp->prc_selfopens++;
317 			pnp->pr_flags |= PR_ISSELF;
318 		} else if (type == PR_LWPIDFILE) {
319 			/* EMPTY */;
320 		} else if (flag & FEXCL) {
321 			if (pcp->prc_writers > pcp->prc_selfopens) {
322 				error = EBUSY;
323 				goto out;
324 			}
325 			/* semantic for old /proc interface */
326 			if (type == PR_PIDDIR)
327 				pcp->prc_flags |= PRC_EXCL;
328 		} else if (pcp->prc_flags & PRC_EXCL) {
329 			ASSERT(pcp->prc_writers > pcp->prc_selfopens);
330 			error = secpolicy_proc_excl_open(cr);
331 			if (error)
332 				goto out;
333 		}
334 		pcp->prc_writers++;
335 		/*
336 		 * The vnode may have become invalid between the
337 		 * VOP_LOOKUP() of the /proc vnode and the VOP_OPEN().
338 		 * If so, do now what prinvalidate() should have done.
339 		 */
340 		if ((pnp->pr_flags & PR_INVAL) ||
341 		    (type == PR_PIDDIR &&
342 		    (VTOP(pnp->pr_pidfile)->pr_flags & PR_INVAL))) {
343 			if (p != curproc)
344 				pcp->prc_selfopens++;
345 			ASSERT(pcp->prc_selfopens <= pcp->prc_writers);
346 			if (pcp->prc_selfopens == pcp->prc_writers)
347 				pcp->prc_flags &= ~PRC_EXCL;
348 		}
349 	}
350 
351 	/*
352 	 * If this is a large file open, indicate that in our flags -- some
353 	 * procfs structures are not off_t-neutral (e.g., priovec_t), and
354 	 * the open will need to be differentiated where 32-bit processes
355 	 * pass these structures across the user/kernel boundary.
356 	 */
357 	if (flag & FOFFMAX)
358 		pnp->pr_flags |= PR_OFFMAX;
359 
360 	/*
361 	 * Do file-specific things.
362 	 */
363 	switch (type) {
364 	default:
365 		break;
366 	case PR_PAGEDATA:
367 	case PR_OPAGEDATA:
368 		/*
369 		 * Enable data collection for page data file;
370 		 * get unique id from the hat layer.
371 		 */
372 		{
373 			int id;
374 
375 			/*
376 			 * Drop p->p_lock to call hat_startstat()
377 			 */
378 			mutex_exit(&p->p_lock);
379 			if ((p->p_flag & SSYS) || p->p_as == &kas ||
380 			    (id = hat_startstat(p->p_as)) == -1) {
381 				mutex_enter(&p->p_lock);
382 				error = ENOMEM;
383 			} else if (pnp->pr_hatid == 0) {
384 				mutex_enter(&p->p_lock);
385 				pnp->pr_hatid = (uint_t)id;
386 			} else {
387 				mutex_enter(&p->p_lock);
388 				/*
389 				 * Use our newly allocated prnode.
390 				 */
391 				npnp->pr_hatid = (uint_t)id;
392 				/*
393 				 * prgetnode() initialized most of the prnode.
394 				 * Duplicate the remainder.
395 				 */
396 				npnp->pr_ino = pnp->pr_ino;
397 				npnp->pr_common = pnp->pr_common;
398 				npnp->pr_pcommon = pnp->pr_pcommon;
399 				npnp->pr_parent = pnp->pr_parent;
400 				VN_HOLD(npnp->pr_parent);
401 				npnp->pr_index = pnp->pr_index;
402 
403 				npnp->pr_next = p->p_plist;
404 				p->p_plist = PTOV(npnp);
405 
406 				VN_RELE(PTOV(pnp));
407 				pnp = npnp;
408 				npnp = NULL;
409 				*vpp = PTOV(pnp);
410 			}
411 		}
412 		break;
413 	}
414 
415 out:
416 	prunlock(pnp);
417 
418 	if (npnp != NULL)
419 		prfreenode(npnp);
420 	return (error);
421 }
422 
423 /* ARGSUSED */
424 static int
425 prclose(vnode_t *vp, int flag, int count, offset_t offset, cred_t *cr,
426     caller_context_t *ct)
427 {
428 	prnode_t *pnp = VTOP(vp);
429 	prcommon_t *pcp = pnp->pr_pcommon;
430 	prnodetype_t type = pnp->pr_type;
431 	proc_t *p;
432 	kthread_t *t;
433 	user_t *up;
434 
435 	/*
436 	 * Nothing to do for the /proc directory itself.
437 	 */
438 	if (type == PR_PROCDIR)
439 		return (0);
440 
441 	ASSERT(type != PR_OBJECT && type != PR_FD &&
442 	    type != PR_CURDIR && type != PR_ROOTDIR);
443 
444 	/*
445 	 * If the process exists, lock it now.
446 	 * Otherwise we have a race condition with propen().
447 	 * Hold pr_pidlock across the reference to prc_selfopens,
448 	 * and prc_writers in case there is no process anymore,
449 	 * to cover the case of concurrent calls to prclose()
450 	 * after the process has been reaped by freeproc().
451 	 */
452 	p = pr_p_lock(pnp);
453 
454 	/*
455 	 * There is nothing more to do until the last close of
456 	 * the file table entry except to clear the pr_owner
457 	 * field of the prnode and notify any waiters
458 	 * (their file descriptor may have just been closed).
459 	 */
460 	if (count > 1) {
461 		mutex_exit(&pr_pidlock);
462 		if (pnp->pr_owner == curproc && !fisopen(vp))
463 			pnp->pr_owner = NULL;
464 		if (p != NULL) {
465 			prnotify(vp);
466 			prunlock(pnp);
467 		}
468 		return (0);
469 	}
470 
471 	/*
472 	 * Decrement the count of self-opens for writing.
473 	 * Decrement the total count of opens for writing.
474 	 * Cancel exclusive opens when only self-opens remain.
475 	 */
476 	if (flag & FWRITE) {
477 		/*
478 		 * prc_selfopens also contains the count of
479 		 * invalid writers.  See prinvalidate().
480 		 */
481 		if ((pnp->pr_flags & (PR_ISSELF|PR_INVAL)) ||
482 		    (type == PR_PIDDIR &&
483 		    (VTOP(pnp->pr_pidfile)->pr_flags & PR_INVAL))) {
484 			ASSERT(pcp->prc_selfopens != 0);
485 			--pcp->prc_selfopens;
486 		}
487 		ASSERT(pcp->prc_writers != 0);
488 		if (--pcp->prc_writers == pcp->prc_selfopens)
489 			pcp->prc_flags &= ~PRC_EXCL;
490 	}
491 	ASSERT(pcp->prc_writers >= pcp->prc_selfopens);
492 	mutex_exit(&pr_pidlock);
493 	if (pnp->pr_owner == curproc && !fisopen(vp))
494 		pnp->pr_owner = NULL;
495 
496 	/*
497 	 * If there is no process, there is nothing more to do.
498 	 */
499 	if (p == NULL)
500 		return (0);
501 
502 	ASSERT(p == pcp->prc_proc);
503 	prnotify(vp);	/* notify waiters */
504 
505 	/*
506 	 * Do file-specific things.
507 	 */
508 	switch (type) {
509 	default:
510 		break;
511 	case PR_PAGEDATA:
512 	case PR_OPAGEDATA:
513 		/*
514 		 * This is a page data file.
515 		 * Free the hat level statistics.
516 		 * Drop p->p_lock before calling hat_freestat().
517 		 */
518 		mutex_exit(&p->p_lock);
519 		if (p->p_as != &kas && pnp->pr_hatid != 0)
520 			hat_freestat(p->p_as, pnp->pr_hatid);
521 		mutex_enter(&p->p_lock);
522 		pnp->pr_hatid = 0;
523 		break;
524 	}
525 
526 	/*
527 	 * On last close of all writable file descriptors,
528 	 * perform run-on-last-close and/or kill-on-last-close logic.
529 	 * Can't do this is the /proc agent lwp still exists.
530 	 */
531 	if (pcp->prc_writers == 0 &&
532 	    p->p_agenttp == NULL &&
533 	    !(pcp->prc_flags & PRC_DESTROY) &&
534 	    p->p_stat != SZOMB &&
535 	    (p->p_proc_flag & (P_PR_RUNLCL|P_PR_KILLCL))) {
536 		int killproc;
537 
538 		/*
539 		 * Cancel any watchpoints currently in effect.
540 		 * The process might disappear during this operation.
541 		 */
542 		if (pr_cancel_watch(pnp) == NULL)
543 			return (0);
544 		/*
545 		 * If any tracing flags are set, clear them.
546 		 */
547 		if (p->p_proc_flag & P_PR_TRACE) {
548 			up = PTOU(p);
549 			premptyset(&up->u_entrymask);
550 			premptyset(&up->u_exitmask);
551 			up->u_systrap = 0;
552 		}
553 		premptyset(&p->p_sigmask);
554 		premptyset(&p->p_fltmask);
555 		killproc = (p->p_proc_flag & P_PR_KILLCL);
556 		p->p_proc_flag &= ~(P_PR_RUNLCL|P_PR_KILLCL|P_PR_TRACE);
557 		/*
558 		 * Cancel any outstanding single-step requests.
559 		 */
560 		if ((t = p->p_tlist) != NULL) {
561 			/*
562 			 * Drop p_lock because prnostep() touches the stack.
563 			 * The loop is safe because the process is P_PR_LOCK'd.
564 			 */
565 			mutex_exit(&p->p_lock);
566 			do {
567 				prnostep(ttolwp(t));
568 			} while ((t = t->t_forw) != p->p_tlist);
569 			mutex_enter(&p->p_lock);
570 		}
571 		/*
572 		 * Set runnable all lwps stopped by /proc.
573 		 */
574 		if (killproc)
575 			sigtoproc(p, NULL, SIGKILL);
576 		else
577 			allsetrun(p);
578 	}
579 
580 	prunlock(pnp);
581 	return (0);
582 }
583 
584 /*
585  * Array of read functions, indexed by /proc file type.
586  */
587 static int pr_read_inval(), pr_read_as(), pr_read_status(),
588 	pr_read_lstatus(), pr_read_psinfo(), pr_read_lpsinfo(),
589 	pr_read_map(), pr_read_rmap(), pr_read_xmap(),
590 	pr_read_cred(), pr_read_sigact(), pr_read_auxv(),
591 #if defined(__x86)
592 	pr_read_ldt(),
593 #endif
594 	pr_read_usage(), pr_read_lusage(), pr_read_pagedata(),
595 	pr_read_watch(), pr_read_lwpstatus(), pr_read_lwpsinfo(),
596 	pr_read_lwpusage(), pr_read_lwpname(),
597 	pr_read_xregs(), pr_read_priv(),
598 	pr_read_spymaster(), pr_read_secflags(),
599 #if defined(__sparc)
600 	pr_read_gwindows(), pr_read_asrs(),
601 #endif
602 	pr_read_piddir(), pr_read_pidfile(), pr_read_opagedata(),
603 	pr_read_fdinfo();
604 
605 static int (*pr_read_function[PR_NFILES])() = {
606 	pr_read_inval,		/* /proc				*/
607 	pr_read_inval,		/* /proc/self				*/
608 	pr_read_piddir,		/* /proc/<pid> (old /proc read())	*/
609 	pr_read_as,		/* /proc/<pid>/as			*/
610 	pr_read_inval,		/* /proc/<pid>/ctl			*/
611 	pr_read_status,		/* /proc/<pid>/status			*/
612 	pr_read_lstatus,	/* /proc/<pid>/lstatus			*/
613 	pr_read_psinfo,		/* /proc/<pid>/psinfo			*/
614 	pr_read_lpsinfo,	/* /proc/<pid>/lpsinfo			*/
615 	pr_read_map,		/* /proc/<pid>/map			*/
616 	pr_read_rmap,		/* /proc/<pid>/rmap			*/
617 	pr_read_xmap,		/* /proc/<pid>/xmap			*/
618 	pr_read_cred,		/* /proc/<pid>/cred			*/
619 	pr_read_sigact,		/* /proc/<pid>/sigact			*/
620 	pr_read_auxv,		/* /proc/<pid>/auxv			*/
621 #if defined(__x86)
622 	pr_read_ldt,		/* /proc/<pid>/ldt			*/
623 #endif
624 	pr_read_usage,		/* /proc/<pid>/usage			*/
625 	pr_read_lusage,		/* /proc/<pid>/lusage			*/
626 	pr_read_pagedata,	/* /proc/<pid>/pagedata			*/
627 	pr_read_watch,		/* /proc/<pid>/watch			*/
628 	pr_read_inval,		/* /proc/<pid>/cwd			*/
629 	pr_read_inval,		/* /proc/<pid>/root			*/
630 	pr_read_inval,		/* /proc/<pid>/fd			*/
631 	pr_read_inval,		/* /proc/<pid>/fd/nn			*/
632 	pr_read_inval,		/* /proc/<pid>/fdinfo			*/
633 	pr_read_fdinfo,		/* /proc/<pid>/fdinfo/nn		*/
634 	pr_read_inval,		/* /proc/<pid>/object			*/
635 	pr_read_inval,		/* /proc/<pid>/object/xxx		*/
636 	pr_read_inval,		/* /proc/<pid>/lwp			*/
637 	pr_read_inval,		/* /proc/<pid>/lwp/<lwpid>		*/
638 	pr_read_inval,		/* /proc/<pid>/lwp/<lwpid>/lwpctl	*/
639 	pr_read_lwpname,	/* /proc/<pid>/lwp/<lwpid>/lwpname	*/
640 	pr_read_lwpstatus,	/* /proc/<pid>/lwp/<lwpid>/lwpstatus	*/
641 	pr_read_lwpsinfo,	/* /proc/<pid>/lwp/<lwpid>/lwpsinfo	*/
642 	pr_read_lwpusage,	/* /proc/<pid>/lwp/<lwpid>/lwpusage	*/
643 	pr_read_xregs,		/* /proc/<pid>/lwp/<lwpid>/xregs	*/
644 	pr_read_inval,		/* /proc/<pid>/lwp/<lwpid>/templates	*/
645 	pr_read_inval,		/* /proc/<pid>/lwp/<lwpid>/templates/<id> */
646 	pr_read_spymaster,	/* /proc/<pid>/lwp/<lwpid>/spymaster	*/
647 #if defined(__sparc)
648 	pr_read_gwindows,	/* /proc/<pid>/lwp/<lwpid>/gwindows	*/
649 	pr_read_asrs,		/* /proc/<pid>/lwp/<lwpid>/asrs		*/
650 #endif
651 	pr_read_priv,		/* /proc/<pid>/priv			*/
652 	pr_read_inval,		/* /proc/<pid>/path			*/
653 	pr_read_inval,		/* /proc/<pid>/path/xxx			*/
654 	pr_read_inval,		/* /proc/<pid>/contracts		*/
655 	pr_read_inval,		/* /proc/<pid>/contracts/<ctid>		*/
656 	pr_read_secflags,	/* /proc/<pid>/secflags			*/
657 	pr_read_pidfile,	/* old process file			*/
658 	pr_read_pidfile,	/* old lwp file				*/
659 	pr_read_opagedata,	/* old pagedata file			*/
660 };
661 
662 /* ARGSUSED */
663 static int
664 pr_read_inval(prnode_t *pnp, uio_t *uiop, cred_t *cr)
665 {
666 	/*
667 	 * No read() on any /proc directory, use getdents(2) instead.
668 	 * Cannot read a control file either.
669 	 * An underlying mapped object file cannot get here.
670 	 */
671 	return (EINVAL);
672 }
673 
674 static int
675 pr_uioread(void *base, long count, uio_t *uiop)
676 {
677 	int error = 0;
678 
679 	ASSERT(count >= 0);
680 	count -= uiop->uio_offset;
681 	if (count > 0 && uiop->uio_offset >= 0) {
682 		error = uiomove((char *)base + uiop->uio_offset,
683 		    count, UIO_READ, uiop);
684 	}
685 
686 	return (error);
687 }
688 
689 static int
690 pr_read_as(prnode_t *pnp, uio_t *uiop)
691 {
692 	int error;
693 
694 	ASSERT(pnp->pr_type == PR_AS);
695 
696 	if ((error = prlock(pnp, ZNO)) == 0) {
697 		proc_t *p = pnp->pr_common->prc_proc;
698 		struct as *as = p->p_as;
699 
700 		/*
701 		 * /proc I/O cannot be done to a system process.
702 		 * A 32-bit process cannot read a 64-bit process.
703 		 */
704 		if ((p->p_flag & SSYS) || as == &kas) {
705 			error = 0;
706 #ifdef _SYSCALL32_IMPL
707 		} else if (curproc->p_model == DATAMODEL_ILP32 &&
708 		    PROCESS_NOT_32BIT(p)) {
709 			error = EOVERFLOW;
710 #endif
711 		} else {
712 			/*
713 			 * We don't hold p_lock over an i/o operation because
714 			 * that could lead to deadlock with the clock thread.
715 			 */
716 			mutex_exit(&p->p_lock);
717 			error = prusrio(p, UIO_READ, uiop, 0);
718 			mutex_enter(&p->p_lock);
719 		}
720 		prunlock(pnp);
721 	}
722 
723 	return (error);
724 }
725 
726 static int
727 pr_read_status(prnode_t *pnp, uio_t *uiop, cred_t *cr)
728 {
729 	pstatus_t *sp;
730 	int error;
731 
732 	ASSERT(pnp->pr_type == PR_STATUS);
733 
734 	/*
735 	 * We kmem_alloc() the pstatus structure because
736 	 * it is so big it might blow the kernel stack.
737 	 */
738 	sp = kmem_alloc(sizeof (*sp), KM_SLEEP);
739 	if ((error = prlock(pnp, ZNO)) == 0) {
740 		prgetstatus(pnp->pr_common->prc_proc, sp, VTOZONE(PTOV(pnp)));
741 		prunlock(pnp);
742 		error = pr_uioread(sp, sizeof (*sp), uiop);
743 	}
744 	kmem_free(sp, sizeof (*sp));
745 	return (error);
746 }
747 
748 static int
749 pr_read_lstatus(prnode_t *pnp, uio_t *uiop, cred_t *cr)
750 {
751 	proc_t *p;
752 	kthread_t *t;
753 	lwpdir_t *ldp;
754 	size_t size;
755 	prheader_t *php;
756 	lwpstatus_t *sp;
757 	int error;
758 	int nlwp;
759 	int i;
760 
761 	ASSERT(pnp->pr_type == PR_LSTATUS);
762 
763 	if ((error = prlock(pnp, ZNO)) != 0)
764 		return (error);
765 	p = pnp->pr_common->prc_proc;
766 	nlwp = p->p_lwpcnt;
767 	size = sizeof (prheader_t) + nlwp * LSPAN(lwpstatus_t);
768 
769 	/* drop p->p_lock to do kmem_alloc(KM_SLEEP) */
770 	mutex_exit(&p->p_lock);
771 	php = kmem_zalloc(size, KM_SLEEP);
772 	mutex_enter(&p->p_lock);
773 	/* p->p_lwpcnt can't change while process is locked */
774 	ASSERT(nlwp == p->p_lwpcnt);
775 
776 	php->pr_nent = nlwp;
777 	php->pr_entsize = LSPAN(lwpstatus_t);
778 
779 	sp = (lwpstatus_t *)(php + 1);
780 	for (ldp = p->p_lwpdir, i = 0; i < p->p_lwpdir_sz; i++, ldp++) {
781 		if (ldp->ld_entry == NULL ||
782 		    (t = ldp->ld_entry->le_thread) == NULL)
783 			continue;
784 		prgetlwpstatus(t, sp, VTOZONE(PTOV(pnp)));
785 		sp = (lwpstatus_t *)((caddr_t)sp + LSPAN(lwpstatus_t));
786 	}
787 	prunlock(pnp);
788 
789 	error = pr_uioread(php, size, uiop);
790 	kmem_free(php, size);
791 	return (error);
792 }
793 
794 static int
795 pr_read_psinfo(prnode_t *pnp, uio_t *uiop, cred_t *cr)
796 {
797 	psinfo_t psinfo;
798 	proc_t *p;
799 	int error = 0;
800 
801 	ASSERT(pnp->pr_type == PR_PSINFO);
802 
803 	/*
804 	 * We don't want the full treatment of prlock(pnp) here.
805 	 * This file is world-readable and never goes invalid.
806 	 * It doesn't matter if we are in the middle of an exec().
807 	 */
808 	p = pr_p_lock(pnp);
809 	mutex_exit(&pr_pidlock);
810 	if (p == NULL)
811 		error = ENOENT;
812 	else {
813 		ASSERT(p == pnp->pr_common->prc_proc);
814 		prgetpsinfo(p, &psinfo);
815 		prunlock(pnp);
816 		error = pr_uioread(&psinfo, sizeof (psinfo), uiop);
817 	}
818 	return (error);
819 }
820 
821 static int
822 pr_read_fdinfo(prnode_t *pnp, uio_t *uiop, cred_t *cr)
823 {
824 	prfdinfo_t *fdinfo;
825 	list_t data;
826 	proc_t *p;
827 	vnode_t *vp;
828 	uint_t fd;
829 	file_t *fp;
830 	cred_t *file_cred;
831 	short ufp_flag;
832 	int error = 0;
833 
834 	ASSERT(pnp->pr_type == PR_FDINFO);
835 
836 	/*
837 	 * This is a guess at the size of the structure that needs to
838 	 * be returned. It's a balance between not allocating too much more
839 	 * space than is required and not requiring too many subsequent
840 	 * reallocations. Allocate it before acquiring the process lock.
841 	 */
842 	pr_iol_initlist(&data, sizeof (prfdinfo_t) + MAXPATHLEN + 2, 1);
843 
844 	if ((error = prlock(pnp, ZNO)) != 0) {
845 		pr_iol_freelist(&data);
846 		return (error);
847 	}
848 
849 	p = pnp->pr_common->prc_proc;
850 
851 	if ((p->p_flag & SSYS) || p->p_as == &kas) {
852 		prunlock(pnp);
853 		pr_iol_freelist(&data);
854 		return (0);
855 	}
856 
857 	fd = pnp->pr_index;
858 
859 	/* Fetch and lock the file_t for this descriptor */
860 	fp = pr_getf(p, fd, &ufp_flag);
861 
862 	if (fp == NULL) {
863 		error = ENOENT;
864 		prunlock(pnp);
865 		goto out;
866 	}
867 
868 	vp = fp->f_vnode;
869 	VN_HOLD(vp);
870 
871 	/*
872 	 * For fdinfo, we don't want to include the placeholder pr_misc at the
873 	 * end of the struct. We'll terminate the data with an empty pr_misc
874 	 * header before returning.
875 	 */
876 
877 	fdinfo = pr_iol_newbuf(&data, offsetof(prfdinfo_t, pr_misc));
878 	fdinfo->pr_fd = fd;
879 	fdinfo->pr_fdflags = ufp_flag;
880 	fdinfo->pr_fileflags = fp->f_flag2 << 16 | fp->f_flag;
881 	if ((fdinfo->pr_fileflags & (FSEARCH | FEXEC)) == 0)
882 		fdinfo->pr_fileflags += FOPEN;
883 	fdinfo->pr_offset = fp->f_offset;
884 	file_cred = fp->f_cred;
885 	crhold(file_cred);
886 	/*
887 	 * Information from the vnode (rather than the file_t) is retrieved
888 	 * later, in prgetfdinfo() - for example sock_getfasync()
889 	 */
890 	pr_releasef(p, fd);
891 
892 	prunlock(pnp);
893 
894 	error = prgetfdinfo(p, vp, fdinfo, cr, file_cred, &data);
895 
896 	crfree(file_cred);
897 
898 	VN_RELE(vp);
899 
900 out:
901 	if (error == 0)
902 		error = pr_iol_uiomove_and_free(&data, uiop, error);
903 	else
904 		pr_iol_freelist(&data);
905 
906 	return (error);
907 }
908 
909 static int
910 pr_read_lpsinfo(prnode_t *pnp, uio_t *uiop, cred_t *cr)
911 {
912 	proc_t *p;
913 	kthread_t *t;
914 	lwpdir_t *ldp;
915 	lwpent_t *lep;
916 	size_t size;
917 	prheader_t *php;
918 	lwpsinfo_t *sp;
919 	int error;
920 	int nlwp;
921 	int i;
922 
923 	ASSERT(pnp->pr_type == PR_LPSINFO);
924 
925 	/*
926 	 * We don't want the full treatment of prlock(pnp) here.
927 	 * This file is world-readable and never goes invalid.
928 	 * It doesn't matter if we are in the middle of an exec().
929 	 */
930 	p = pr_p_lock(pnp);
931 	mutex_exit(&pr_pidlock);
932 	if (p == NULL)
933 		return (ENOENT);
934 	ASSERT(p == pnp->pr_common->prc_proc);
935 	if ((nlwp = p->p_lwpcnt + p->p_zombcnt) == 0) {
936 		prunlock(pnp);
937 		return (ENOENT);
938 	}
939 	size = sizeof (prheader_t) + nlwp * LSPAN(lwpsinfo_t);
940 
941 	/* drop p->p_lock to do kmem_alloc(KM_SLEEP) */
942 	mutex_exit(&p->p_lock);
943 	php = kmem_zalloc(size, KM_SLEEP);
944 	mutex_enter(&p->p_lock);
945 	/* p->p_lwpcnt can't change while process is locked */
946 	ASSERT(nlwp == p->p_lwpcnt + p->p_zombcnt);
947 
948 	php->pr_nent = nlwp;
949 	php->pr_entsize = LSPAN(lwpsinfo_t);
950 
951 	sp = (lwpsinfo_t *)(php + 1);
952 	for (ldp = p->p_lwpdir, i = 0; i < p->p_lwpdir_sz; i++, ldp++) {
953 		if ((lep = ldp->ld_entry) == NULL)
954 			continue;
955 		if ((t = lep->le_thread) != NULL)
956 			prgetlwpsinfo(t, sp);
957 		else {
958 			bzero(sp, sizeof (*sp));
959 			sp->pr_lwpid = lep->le_lwpid;
960 			sp->pr_state = SZOMB;
961 			sp->pr_sname = 'Z';
962 			sp->pr_start.tv_sec = lep->le_start;
963 			sp->pr_bindpro = PBIND_NONE;
964 			sp->pr_bindpset = PS_NONE;
965 		}
966 		sp = (lwpsinfo_t *)((caddr_t)sp + LSPAN(lwpsinfo_t));
967 	}
968 	prunlock(pnp);
969 
970 	error = pr_uioread(php, size, uiop);
971 	kmem_free(php, size);
972 	return (error);
973 }
974 
975 static int
976 pr_read_map_common(prnode_t *pnp, uio_t *uiop, prnodetype_t type)
977 {
978 	proc_t *p;
979 	struct as *as;
980 	list_t iolhead;
981 	int error;
982 
983 readmap_common:
984 	if ((error = prlock(pnp, ZNO)) != 0)
985 		return (error);
986 
987 	p = pnp->pr_common->prc_proc;
988 	as = p->p_as;
989 
990 	if ((p->p_flag & SSYS) || as == &kas) {
991 		prunlock(pnp);
992 		return (0);
993 	}
994 
995 	if (!AS_LOCK_TRYENTER(as, RW_WRITER)) {
996 		prunlock(pnp);
997 		delay(1);
998 		goto readmap_common;
999 	}
1000 	mutex_exit(&p->p_lock);
1001 
1002 	switch (type) {
1003 	case PR_XMAP:
1004 		error = prgetxmap(p, &iolhead);
1005 		break;
1006 	case PR_RMAP:
1007 		error = prgetmap(p, 1, &iolhead);
1008 		break;
1009 	case PR_MAP:
1010 		error = prgetmap(p, 0, &iolhead);
1011 		break;
1012 	}
1013 
1014 	AS_LOCK_EXIT(as);
1015 	mutex_enter(&p->p_lock);
1016 	prunlock(pnp);
1017 
1018 	error = pr_iol_uiomove_and_free(&iolhead, uiop, error);
1019 
1020 	return (error);
1021 }
1022 
1023 static int
1024 pr_read_map(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1025 {
1026 	ASSERT(pnp->pr_type == PR_MAP);
1027 	return (pr_read_map_common(pnp, uiop, pnp->pr_type));
1028 }
1029 
1030 static int
1031 pr_read_rmap(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1032 {
1033 	ASSERT(pnp->pr_type == PR_RMAP);
1034 	return (pr_read_map_common(pnp, uiop, pnp->pr_type));
1035 }
1036 
1037 static int
1038 pr_read_xmap(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1039 {
1040 	ASSERT(pnp->pr_type == PR_XMAP);
1041 	return (pr_read_map_common(pnp, uiop, pnp->pr_type));
1042 }
1043 
1044 static int
1045 pr_read_cred(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1046 {
1047 	proc_t *p;
1048 	prcred_t *pcrp;
1049 	int error;
1050 	size_t count;
1051 
1052 	ASSERT(pnp->pr_type == PR_CRED);
1053 
1054 	/*
1055 	 * We kmem_alloc() the prcred_t structure because
1056 	 * the number of supplementary groups is variable.
1057 	 */
1058 	pcrp =
1059 	    kmem_alloc(sizeof (prcred_t) + sizeof (gid_t) * (ngroups_max - 1),
1060 	    KM_SLEEP);
1061 
1062 	if ((error = prlock(pnp, ZNO)) != 0)
1063 		goto out;
1064 	p = pnp->pr_common->prc_proc;
1065 	ASSERT(p != NULL);
1066 
1067 	prgetcred(p, pcrp);
1068 	prunlock(pnp);
1069 
1070 	count = sizeof (prcred_t);
1071 	if (pcrp->pr_ngroups > 1)
1072 		count += sizeof (gid_t) * (pcrp->pr_ngroups - 1);
1073 	error = pr_uioread(pcrp, count, uiop);
1074 out:
1075 	kmem_free(pcrp, sizeof (prcred_t) + sizeof (gid_t) * (ngroups_max - 1));
1076 	return (error);
1077 }
1078 
1079 static int
1080 pr_read_priv(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1081 {
1082 	proc_t *p;
1083 	size_t psize = prgetprivsize();
1084 	prpriv_t *ppriv = kmem_alloc(psize, KM_SLEEP);
1085 	int error;
1086 
1087 	ASSERT(pnp->pr_type == PR_PRIV);
1088 
1089 	if ((error = prlock(pnp, ZNO)) != 0)
1090 		goto out;
1091 	p = pnp->pr_common->prc_proc;
1092 	ASSERT(p != NULL);
1093 
1094 	prgetpriv(p, ppriv);
1095 	prunlock(pnp);
1096 
1097 	error = pr_uioread(ppriv, psize, uiop);
1098 out:
1099 	kmem_free(ppriv, psize);
1100 	return (error);
1101 }
1102 
1103 static int
1104 pr_read_sigact(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1105 {
1106 	int nsig = PROC_IS_BRANDED(curproc)? BROP(curproc)->b_nsig : NSIG;
1107 	proc_t *p;
1108 	struct sigaction *sap;
1109 	int sig;
1110 	int error;
1111 	user_t *up;
1112 
1113 	ASSERT(pnp->pr_type == PR_SIGACT);
1114 
1115 	/*
1116 	 * We kmem_alloc() the sigaction array because
1117 	 * it is so big it might blow the kernel stack.
1118 	 */
1119 	sap = kmem_alloc((nsig-1) * sizeof (struct sigaction), KM_SLEEP);
1120 
1121 	if ((error = prlock(pnp, ZNO)) != 0)
1122 		goto out;
1123 	p = pnp->pr_common->prc_proc;
1124 	ASSERT(p != NULL);
1125 
1126 	if (uiop->uio_offset >= (nsig-1)*sizeof (struct sigaction)) {
1127 		prunlock(pnp);
1128 		goto out;
1129 	}
1130 
1131 	up = PTOU(p);
1132 	for (sig = 1; sig < nsig; sig++)
1133 		prgetaction(p, up, sig, &sap[sig-1]);
1134 	prunlock(pnp);
1135 
1136 	error = pr_uioread(sap, (nsig - 1) * sizeof (struct sigaction), uiop);
1137 out:
1138 	kmem_free(sap, (nsig-1) * sizeof (struct sigaction));
1139 	return (error);
1140 }
1141 
1142 static int
1143 pr_read_auxv(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1144 {
1145 	auxv_t auxv[__KERN_NAUXV_IMPL];
1146 	proc_t *p;
1147 	user_t *up;
1148 	int error;
1149 
1150 	ASSERT(pnp->pr_type == PR_AUXV);
1151 
1152 	if ((error = prlock(pnp, ZNO)) != 0)
1153 		return (error);
1154 
1155 	if (uiop->uio_offset >= sizeof (auxv)) {
1156 		prunlock(pnp);
1157 		return (0);
1158 	}
1159 
1160 	p = pnp->pr_common->prc_proc;
1161 	up = PTOU(p);
1162 	bcopy(up->u_auxv, auxv, sizeof (auxv));
1163 	prunlock(pnp);
1164 
1165 	return (pr_uioread(auxv, sizeof (auxv), uiop));
1166 }
1167 
1168 #if defined(__x86)
1169 /*
1170  * XX64
1171  *	This is almost certainly broken for the amd64 kernel, because
1172  *	we have two kinds of LDT structures to export -- one for compatibility
1173  *	mode, and one for long mode, sigh.
1174  *
1175  *	For now let's just have a ldt of size 0 for 64-bit processes.
1176  */
1177 static int
1178 pr_read_ldt(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1179 {
1180 	proc_t *p;
1181 	struct ssd *ssd;
1182 	size_t size;
1183 	int error;
1184 
1185 	ASSERT(pnp->pr_type == PR_LDT);
1186 
1187 	if ((error = prlock(pnp, ZNO)) != 0)
1188 		return (error);
1189 	p = pnp->pr_common->prc_proc;
1190 
1191 	mutex_exit(&p->p_lock);
1192 	mutex_enter(&p->p_ldtlock);
1193 	size = prnldt(p) * sizeof (struct ssd);
1194 	if (uiop->uio_offset >= size) {
1195 		mutex_exit(&p->p_ldtlock);
1196 		mutex_enter(&p->p_lock);
1197 		prunlock(pnp);
1198 		return (0);
1199 	}
1200 
1201 	ssd = kmem_alloc(size, KM_SLEEP);
1202 	prgetldt(p, ssd);
1203 	mutex_exit(&p->p_ldtlock);
1204 	mutex_enter(&p->p_lock);
1205 	prunlock(pnp);
1206 
1207 	error = pr_uioread(ssd, size, uiop);
1208 	kmem_free(ssd, size);
1209 	return (error);
1210 }
1211 #endif	/* __x86 */
1212 
1213 static int
1214 pr_read_usage(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1215 {
1216 	prhusage_t *pup;
1217 	prusage_t *upup;
1218 	proc_t *p;
1219 	kthread_t *t;
1220 	int error;
1221 
1222 	ASSERT(pnp->pr_type == PR_USAGE);
1223 
1224 	/* allocate now, before locking the process */
1225 	pup = kmem_zalloc(sizeof (*pup), KM_SLEEP);
1226 	upup = kmem_alloc(sizeof (*upup), KM_SLEEP);
1227 
1228 	/*
1229 	 * We don't want the full treatment of prlock(pnp) here.
1230 	 * This file is world-readable and never goes invalid.
1231 	 * It doesn't matter if we are in the middle of an exec().
1232 	 */
1233 	p = pr_p_lock(pnp);
1234 	mutex_exit(&pr_pidlock);
1235 	if (p == NULL) {
1236 		error = ENOENT;
1237 		goto out;
1238 	}
1239 	ASSERT(p == pnp->pr_common->prc_proc);
1240 
1241 	if (uiop->uio_offset >= sizeof (prusage_t)) {
1242 		prunlock(pnp);
1243 		error = 0;
1244 		goto out;
1245 	}
1246 
1247 	pup->pr_tstamp = gethrtime();
1248 
1249 	pup->pr_count  = p->p_defunct;
1250 	pup->pr_create = p->p_mstart;
1251 	pup->pr_term   = p->p_mterm;
1252 
1253 	pup->pr_rtime    = p->p_mlreal;
1254 	pup->pr_utime    = p->p_acct[LMS_USER];
1255 	pup->pr_stime    = p->p_acct[LMS_SYSTEM];
1256 	pup->pr_ttime    = p->p_acct[LMS_TRAP];
1257 	pup->pr_tftime   = p->p_acct[LMS_TFAULT];
1258 	pup->pr_dftime   = p->p_acct[LMS_DFAULT];
1259 	pup->pr_kftime   = p->p_acct[LMS_KFAULT];
1260 	pup->pr_ltime    = p->p_acct[LMS_USER_LOCK];
1261 	pup->pr_slptime  = p->p_acct[LMS_SLEEP];
1262 	pup->pr_wtime    = p->p_acct[LMS_WAIT_CPU];
1263 	pup->pr_stoptime = p->p_acct[LMS_STOPPED];
1264 
1265 	pup->pr_minf  = p->p_ru.minflt;
1266 	pup->pr_majf  = p->p_ru.majflt;
1267 	pup->pr_nswap = p->p_ru.nswap;
1268 	pup->pr_inblk = p->p_ru.inblock;
1269 	pup->pr_oublk = p->p_ru.oublock;
1270 	pup->pr_msnd  = p->p_ru.msgsnd;
1271 	pup->pr_mrcv  = p->p_ru.msgrcv;
1272 	pup->pr_sigs  = p->p_ru.nsignals;
1273 	pup->pr_vctx  = p->p_ru.nvcsw;
1274 	pup->pr_ictx  = p->p_ru.nivcsw;
1275 	pup->pr_sysc  = p->p_ru.sysc;
1276 	pup->pr_ioch  = p->p_ru.ioch;
1277 
1278 	/*
1279 	 * Add the usage information for each active lwp.
1280 	 */
1281 	if ((t = p->p_tlist) != NULL &&
1282 	    !(pnp->pr_pcommon->prc_flags & PRC_DESTROY)) {
1283 		do {
1284 			if (t->t_proc_flag & TP_LWPEXIT)
1285 				continue;
1286 			pup->pr_count++;
1287 			praddusage(t, pup);
1288 		} while ((t = t->t_forw) != p->p_tlist);
1289 	}
1290 
1291 	prunlock(pnp);
1292 
1293 	prcvtusage(pup, upup);
1294 
1295 	error = pr_uioread(upup, sizeof (prusage_t), uiop);
1296 out:
1297 	kmem_free(pup, sizeof (*pup));
1298 	kmem_free(upup, sizeof (*upup));
1299 	return (error);
1300 }
1301 
1302 static int
1303 pr_read_lusage(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1304 {
1305 	int nlwp;
1306 	prhusage_t *pup;
1307 	prheader_t *php;
1308 	prusage_t *upup;
1309 	size_t size;
1310 	hrtime_t curtime;
1311 	proc_t *p;
1312 	kthread_t *t;
1313 	lwpdir_t *ldp;
1314 	int error;
1315 	int i;
1316 
1317 	ASSERT(pnp->pr_type == PR_LUSAGE);
1318 
1319 	/*
1320 	 * We don't want the full treatment of prlock(pnp) here.
1321 	 * This file is world-readable and never goes invalid.
1322 	 * It doesn't matter if we are in the middle of an exec().
1323 	 */
1324 	p = pr_p_lock(pnp);
1325 	mutex_exit(&pr_pidlock);
1326 	if (p == NULL)
1327 		return (ENOENT);
1328 	ASSERT(p == pnp->pr_common->prc_proc);
1329 	if ((nlwp = p->p_lwpcnt) == 0) {
1330 		prunlock(pnp);
1331 		return (ENOENT);
1332 	}
1333 
1334 	size = sizeof (prheader_t) + (nlwp + 1) * LSPAN(prusage_t);
1335 	if (uiop->uio_offset >= size) {
1336 		prunlock(pnp);
1337 		return (0);
1338 	}
1339 
1340 	/* drop p->p_lock to do kmem_alloc(KM_SLEEP) */
1341 	mutex_exit(&p->p_lock);
1342 	pup = kmem_zalloc(size + sizeof (prhusage_t), KM_SLEEP);
1343 	mutex_enter(&p->p_lock);
1344 	/* p->p_lwpcnt can't change while process is locked */
1345 	ASSERT(nlwp == p->p_lwpcnt);
1346 
1347 	php = (prheader_t *)(pup + 1);
1348 	upup = (prusage_t *)(php + 1);
1349 
1350 	php->pr_nent = nlwp + 1;
1351 	php->pr_entsize = LSPAN(prusage_t);
1352 
1353 	curtime = gethrtime();
1354 
1355 	/*
1356 	 * First the summation over defunct lwps.
1357 	 */
1358 	pup->pr_count  = p->p_defunct;
1359 	pup->pr_tstamp = curtime;
1360 	pup->pr_create = p->p_mstart;
1361 	pup->pr_term   = p->p_mterm;
1362 
1363 	pup->pr_rtime    = p->p_mlreal;
1364 	pup->pr_utime    = p->p_acct[LMS_USER];
1365 	pup->pr_stime    = p->p_acct[LMS_SYSTEM];
1366 	pup->pr_ttime    = p->p_acct[LMS_TRAP];
1367 	pup->pr_tftime   = p->p_acct[LMS_TFAULT];
1368 	pup->pr_dftime   = p->p_acct[LMS_DFAULT];
1369 	pup->pr_kftime   = p->p_acct[LMS_KFAULT];
1370 	pup->pr_ltime    = p->p_acct[LMS_USER_LOCK];
1371 	pup->pr_slptime  = p->p_acct[LMS_SLEEP];
1372 	pup->pr_wtime    = p->p_acct[LMS_WAIT_CPU];
1373 	pup->pr_stoptime = p->p_acct[LMS_STOPPED];
1374 
1375 	pup->pr_minf  = p->p_ru.minflt;
1376 	pup->pr_majf  = p->p_ru.majflt;
1377 	pup->pr_nswap = p->p_ru.nswap;
1378 	pup->pr_inblk = p->p_ru.inblock;
1379 	pup->pr_oublk = p->p_ru.oublock;
1380 	pup->pr_msnd  = p->p_ru.msgsnd;
1381 	pup->pr_mrcv  = p->p_ru.msgrcv;
1382 	pup->pr_sigs  = p->p_ru.nsignals;
1383 	pup->pr_vctx  = p->p_ru.nvcsw;
1384 	pup->pr_ictx  = p->p_ru.nivcsw;
1385 	pup->pr_sysc  = p->p_ru.sysc;
1386 	pup->pr_ioch  = p->p_ru.ioch;
1387 
1388 	prcvtusage(pup, upup);
1389 
1390 	/*
1391 	 * Fill one prusage struct for each active lwp.
1392 	 */
1393 	for (ldp = p->p_lwpdir, i = 0; i < p->p_lwpdir_sz; i++, ldp++) {
1394 		if (ldp->ld_entry == NULL ||
1395 		    (t = ldp->ld_entry->le_thread) == NULL)
1396 			continue;
1397 		ASSERT(!(t->t_proc_flag & TP_LWPEXIT));
1398 		ASSERT(nlwp > 0);
1399 		--nlwp;
1400 		upup = (prusage_t *)((caddr_t)upup + LSPAN(prusage_t));
1401 		prgetusage(t, pup);
1402 		prcvtusage(pup, upup);
1403 	}
1404 	ASSERT(nlwp == 0);
1405 
1406 	prunlock(pnp);
1407 
1408 	error = pr_uioread(php, size, uiop);
1409 	kmem_free(pup, size + sizeof (prhusage_t));
1410 	return (error);
1411 }
1412 
1413 static int
1414 pr_read_pagedata(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1415 {
1416 	proc_t *p;
1417 	int error;
1418 
1419 	ASSERT(pnp->pr_type == PR_PAGEDATA);
1420 
1421 	if ((error = prlock(pnp, ZNO)) != 0)
1422 		return (error);
1423 
1424 	p = pnp->pr_common->prc_proc;
1425 	if ((p->p_flag & SSYS) || p->p_as == &kas) {
1426 		prunlock(pnp);
1427 		return (0);
1428 	}
1429 
1430 	mutex_exit(&p->p_lock);
1431 	error = prpdread(p, pnp->pr_hatid, uiop);
1432 	mutex_enter(&p->p_lock);
1433 
1434 	prunlock(pnp);
1435 	return (error);
1436 }
1437 
1438 static int
1439 pr_read_opagedata(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1440 {
1441 	proc_t *p;
1442 	struct as *as;
1443 	int error;
1444 
1445 	ASSERT(pnp->pr_type == PR_OPAGEDATA);
1446 
1447 	if ((error = prlock(pnp, ZNO)) != 0)
1448 		return (error);
1449 
1450 	p = pnp->pr_common->prc_proc;
1451 	as = p->p_as;
1452 	if ((p->p_flag & SSYS) || as == &kas) {
1453 		prunlock(pnp);
1454 		return (0);
1455 	}
1456 
1457 	mutex_exit(&p->p_lock);
1458 	error = oprpdread(as, pnp->pr_hatid, uiop);
1459 	mutex_enter(&p->p_lock);
1460 
1461 	prunlock(pnp);
1462 	return (error);
1463 }
1464 
1465 static int
1466 pr_read_watch(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1467 {
1468 	proc_t *p;
1469 	int error;
1470 	prwatch_t *Bpwp;
1471 	size_t size;
1472 	prwatch_t *pwp;
1473 	int nwarea;
1474 	struct watched_area *pwarea;
1475 
1476 	ASSERT(pnp->pr_type == PR_WATCH);
1477 
1478 	if ((error = prlock(pnp, ZNO)) != 0)
1479 		return (error);
1480 
1481 	p = pnp->pr_common->prc_proc;
1482 	nwarea = avl_numnodes(&p->p_warea);
1483 	size = nwarea * sizeof (prwatch_t);
1484 	if (uiop->uio_offset >= size) {
1485 		prunlock(pnp);
1486 		return (0);
1487 	}
1488 
1489 	/* drop p->p_lock to do kmem_alloc(KM_SLEEP) */
1490 	mutex_exit(&p->p_lock);
1491 	Bpwp = pwp = kmem_zalloc(size, KM_SLEEP);
1492 	mutex_enter(&p->p_lock);
1493 	/* p->p_nwarea can't change while process is locked */
1494 	ASSERT(nwarea == avl_numnodes(&p->p_warea));
1495 
1496 	/* gather the watched areas */
1497 	for (pwarea = avl_first(&p->p_warea); pwarea != NULL;
1498 	    pwarea = AVL_NEXT(&p->p_warea, pwarea), pwp++) {
1499 		pwp->pr_vaddr = (uintptr_t)pwarea->wa_vaddr;
1500 		pwp->pr_size = pwarea->wa_eaddr - pwarea->wa_vaddr;
1501 		pwp->pr_wflags = (int)pwarea->wa_flags;
1502 	}
1503 
1504 	prunlock(pnp);
1505 
1506 	error = pr_uioread(Bpwp, size, uiop);
1507 	kmem_free(Bpwp, size);
1508 	return (error);
1509 }
1510 
1511 static int
1512 pr_read_lwpstatus(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1513 {
1514 	lwpstatus_t *sp;
1515 	int error;
1516 
1517 	ASSERT(pnp->pr_type == PR_LWPSTATUS);
1518 
1519 	/*
1520 	 * We kmem_alloc() the lwpstatus structure because
1521 	 * it is so big it might blow the kernel stack.
1522 	 */
1523 	sp = kmem_alloc(sizeof (*sp), KM_SLEEP);
1524 
1525 	if ((error = prlock(pnp, ZNO)) != 0)
1526 		goto out;
1527 
1528 	if (uiop->uio_offset >= sizeof (*sp)) {
1529 		prunlock(pnp);
1530 		goto out;
1531 	}
1532 
1533 	prgetlwpstatus(pnp->pr_common->prc_thread, sp, VTOZONE(PTOV(pnp)));
1534 	prunlock(pnp);
1535 
1536 	error = pr_uioread(sp, sizeof (*sp), uiop);
1537 out:
1538 	kmem_free(sp, sizeof (*sp));
1539 	return (error);
1540 }
1541 
1542 static int
1543 pr_read_lwpsinfo(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1544 {
1545 	lwpsinfo_t lwpsinfo;
1546 	proc_t *p;
1547 	kthread_t *t;
1548 	lwpent_t *lep;
1549 
1550 	ASSERT(pnp->pr_type == PR_LWPSINFO);
1551 
1552 	/*
1553 	 * We don't want the full treatment of prlock(pnp) here.
1554 	 * This file is world-readable and never goes invalid.
1555 	 * It doesn't matter if we are in the middle of an exec().
1556 	 */
1557 	p = pr_p_lock(pnp);
1558 	mutex_exit(&pr_pidlock);
1559 	if (p == NULL)
1560 		return (ENOENT);
1561 	ASSERT(p == pnp->pr_common->prc_proc);
1562 	if (pnp->pr_common->prc_tslot == -1) {
1563 		prunlock(pnp);
1564 		return (ENOENT);
1565 	}
1566 
1567 	if (uiop->uio_offset >= sizeof (lwpsinfo)) {
1568 		prunlock(pnp);
1569 		return (0);
1570 	}
1571 
1572 	if ((t = pnp->pr_common->prc_thread) != NULL)
1573 		prgetlwpsinfo(t, &lwpsinfo);
1574 	else {
1575 		lep = p->p_lwpdir[pnp->pr_common->prc_tslot].ld_entry;
1576 		bzero(&lwpsinfo, sizeof (lwpsinfo));
1577 		lwpsinfo.pr_lwpid = lep->le_lwpid;
1578 		lwpsinfo.pr_state = SZOMB;
1579 		lwpsinfo.pr_sname = 'Z';
1580 		lwpsinfo.pr_start.tv_sec = lep->le_start;
1581 		lwpsinfo.pr_bindpro = PBIND_NONE;
1582 		lwpsinfo.pr_bindpset = PS_NONE;
1583 	}
1584 	prunlock(pnp);
1585 
1586 	return (pr_uioread(&lwpsinfo, sizeof (lwpsinfo), uiop));
1587 }
1588 
1589 static int
1590 pr_read_lwpusage(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1591 {
1592 	prhusage_t *pup;
1593 	prusage_t *upup;
1594 	proc_t *p;
1595 	int error;
1596 
1597 	ASSERT(pnp->pr_type == PR_LWPUSAGE);
1598 
1599 	/* allocate now, before locking the process */
1600 	pup = kmem_zalloc(sizeof (*pup), KM_SLEEP);
1601 	upup = kmem_alloc(sizeof (*upup), KM_SLEEP);
1602 
1603 	/*
1604 	 * We don't want the full treatment of prlock(pnp) here.
1605 	 * This file is world-readable and never goes invalid.
1606 	 * It doesn't matter if we are in the middle of an exec().
1607 	 */
1608 	p = pr_p_lock(pnp);
1609 	mutex_exit(&pr_pidlock);
1610 	if (p == NULL) {
1611 		error = ENOENT;
1612 		goto out;
1613 	}
1614 	ASSERT(p == pnp->pr_common->prc_proc);
1615 	if (pnp->pr_common->prc_thread == NULL) {
1616 		prunlock(pnp);
1617 		error = ENOENT;
1618 		goto out;
1619 	}
1620 	if (uiop->uio_offset >= sizeof (prusage_t)) {
1621 		prunlock(pnp);
1622 		error = 0;
1623 		goto out;
1624 	}
1625 
1626 	pup->pr_tstamp = gethrtime();
1627 	prgetusage(pnp->pr_common->prc_thread, pup);
1628 
1629 	prunlock(pnp);
1630 
1631 	prcvtusage(pup, upup);
1632 
1633 	error = pr_uioread(upup, sizeof (prusage_t), uiop);
1634 out:
1635 	kmem_free(pup, sizeof (*pup));
1636 	kmem_free(upup, sizeof (*upup));
1637 	return (error);
1638 }
1639 
1640 static int
1641 pr_read_lwpname(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1642 {
1643 	char lwpname[THREAD_NAME_MAX];
1644 	kthread_t *t;
1645 	int error;
1646 
1647 	ASSERT(pnp->pr_type == PR_LWPNAME);
1648 
1649 	if (uiop->uio_offset >= THREAD_NAME_MAX)
1650 		return (0);
1651 
1652 	if ((error = prlock(pnp, ZNO)) != 0)
1653 		return (error);
1654 
1655 	bzero(lwpname, sizeof (lwpname));
1656 
1657 	t = pnp->pr_common->prc_thread;
1658 
1659 	if (t->t_name != NULL)
1660 		(void) strlcpy(lwpname, t->t_name, sizeof (lwpname));
1661 
1662 	prunlock(pnp);
1663 
1664 	return (pr_uioread(lwpname, sizeof (lwpname), uiop));
1665 }
1666 
1667 /* ARGSUSED */
1668 static int
1669 pr_read_xregs(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1670 {
1671 #if defined(__sparc)
1672 	proc_t *p;
1673 	kthread_t *t;
1674 	int error;
1675 	char *xreg;
1676 	size_t size;
1677 
1678 	ASSERT(pnp->pr_type == PR_XREGS);
1679 
1680 	xreg = kmem_zalloc(sizeof (prxregset_t), KM_SLEEP);
1681 
1682 	if ((error = prlock(pnp, ZNO)) != 0)
1683 		goto out;
1684 
1685 	p = pnp->pr_common->prc_proc;
1686 	t = pnp->pr_common->prc_thread;
1687 
1688 	size = prhasx(p)? prgetprxregsize(p) : 0;
1689 	if (uiop->uio_offset >= size) {
1690 		prunlock(pnp);
1691 		goto out;
1692 	}
1693 
1694 	/* drop p->p_lock while (possibly) touching the stack */
1695 	mutex_exit(&p->p_lock);
1696 	prgetprxregs(ttolwp(t), xreg);
1697 	mutex_enter(&p->p_lock);
1698 	prunlock(pnp);
1699 
1700 	error = pr_uioread(xreg, size, uiop);
1701 out:
1702 	kmem_free(xreg, sizeof (prxregset_t));
1703 	return (error);
1704 #else
1705 	return (0);
1706 #endif
1707 }
1708 
1709 static int
1710 pr_read_spymaster(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1711 {
1712 	psinfo_t psinfo;
1713 	int error;
1714 	klwp_t *lwp;
1715 
1716 	ASSERT(pnp->pr_type == PR_SPYMASTER);
1717 
1718 	if ((error = prlock(pnp, ZNO)) != 0)
1719 		return (error);
1720 
1721 	if (pnp->pr_common->prc_thread == NULL) {
1722 		prunlock(pnp);
1723 		return (0);
1724 	}
1725 
1726 	lwp = pnp->pr_common->prc_thread->t_lwp;
1727 
1728 	if (lwp->lwp_spymaster == NULL) {
1729 		prunlock(pnp);
1730 		return (0);
1731 	}
1732 
1733 	bcopy(lwp->lwp_spymaster, &psinfo, sizeof (psinfo_t));
1734 	prunlock(pnp);
1735 
1736 	return (pr_uioread(&psinfo, sizeof (psinfo), uiop));
1737 }
1738 
1739 static int
1740 pr_read_secflags(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1741 {
1742 	prsecflags_t ret;
1743 	int error;
1744 	proc_t *p;
1745 
1746 	ASSERT(pnp->pr_type == PR_SECFLAGS);
1747 
1748 	if ((error = prlock(pnp, ZNO)) != 0)
1749 		return (error);
1750 
1751 	p = pnp->pr_common->prc_proc;
1752 	prgetsecflags(p, &ret);
1753 	prunlock(pnp);
1754 
1755 	return (pr_uioread(&ret, sizeof (ret), uiop));
1756 }
1757 
1758 #if defined(__sparc)
1759 
1760 static int
1761 pr_read_gwindows(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1762 {
1763 	proc_t *p;
1764 	kthread_t *t;
1765 	gwindows_t *gwp;
1766 	int error;
1767 	size_t size;
1768 
1769 	ASSERT(pnp->pr_type == PR_GWINDOWS);
1770 
1771 	gwp = kmem_zalloc(sizeof (gwindows_t), KM_SLEEP);
1772 
1773 	if ((error = prlock(pnp, ZNO)) != 0)
1774 		goto out;
1775 
1776 	p = pnp->pr_common->prc_proc;
1777 	t = pnp->pr_common->prc_thread;
1778 
1779 	/*
1780 	 * Drop p->p_lock while touching the stack.
1781 	 * The P_PR_LOCK flag prevents the lwp from
1782 	 * disappearing while we do this.
1783 	 */
1784 	mutex_exit(&p->p_lock);
1785 	if ((size = prnwindows(ttolwp(t))) != 0)
1786 		size = sizeof (gwindows_t) -
1787 		    (SPARC_MAXREGWINDOW - size) * sizeof (struct rwindow);
1788 	if (uiop->uio_offset >= size) {
1789 		mutex_enter(&p->p_lock);
1790 		prunlock(pnp);
1791 		goto out;
1792 	}
1793 	prgetwindows(ttolwp(t), gwp);
1794 	mutex_enter(&p->p_lock);
1795 	prunlock(pnp);
1796 
1797 	error = pr_uioread(gwp, size, uiop);
1798 out:
1799 	kmem_free(gwp, sizeof (gwindows_t));
1800 	return (error);
1801 }
1802 
1803 /* ARGSUSED */
1804 static int
1805 pr_read_asrs(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1806 {
1807 	int error;
1808 
1809 	ASSERT(pnp->pr_type == PR_ASRS);
1810 
1811 	/* the asrs file exists only for sparc v9 _LP64 processes */
1812 	if ((error = prlock(pnp, ZNO)) == 0) {
1813 		proc_t *p = pnp->pr_common->prc_proc;
1814 		kthread_t *t = pnp->pr_common->prc_thread;
1815 		asrset_t asrset;
1816 
1817 		if (p->p_model != DATAMODEL_LP64 ||
1818 		    uiop->uio_offset >= sizeof (asrset_t)) {
1819 			prunlock(pnp);
1820 			return (0);
1821 		}
1822 
1823 		/*
1824 		 * Drop p->p_lock while touching the stack.
1825 		 * The P_PR_LOCK flag prevents the lwp from
1826 		 * disappearing while we do this.
1827 		 */
1828 		mutex_exit(&p->p_lock);
1829 		prgetasregs(ttolwp(t), asrset);
1830 		mutex_enter(&p->p_lock);
1831 		prunlock(pnp);
1832 
1833 		error = pr_uioread(&asrset[0], sizeof (asrset_t), uiop);
1834 	}
1835 
1836 	return (error);
1837 }
1838 
1839 #endif	/* __sparc */
1840 
1841 static int
1842 pr_read_piddir(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1843 {
1844 	ASSERT(pnp->pr_type == PR_PIDDIR);
1845 	ASSERT(pnp->pr_pidfile != NULL);
1846 
1847 	/* use the underlying PR_PIDFILE to read the process */
1848 	pnp = VTOP(pnp->pr_pidfile);
1849 	ASSERT(pnp->pr_type == PR_PIDFILE);
1850 
1851 	return (pr_read_pidfile(pnp, uiop));
1852 }
1853 
1854 static int
1855 pr_read_pidfile(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1856 {
1857 	int error;
1858 
1859 	ASSERT(pnp->pr_type == PR_PIDFILE || pnp->pr_type == PR_LWPIDFILE);
1860 
1861 	if ((error = prlock(pnp, ZNO)) == 0) {
1862 		proc_t *p = pnp->pr_common->prc_proc;
1863 		struct as *as = p->p_as;
1864 
1865 		if ((p->p_flag & SSYS) || as == &kas) {
1866 			/*
1867 			 * /proc I/O cannot be done to a system process.
1868 			 */
1869 			error = EIO;	/* old /proc semantics */
1870 		} else {
1871 			/*
1872 			 * We drop p_lock because we don't want to hold
1873 			 * it over an I/O operation because that could
1874 			 * lead to deadlock with the clock thread.
1875 			 * The process will not disappear and its address
1876 			 * space will not change because it is marked P_PR_LOCK.
1877 			 */
1878 			mutex_exit(&p->p_lock);
1879 			error = prusrio(p, UIO_READ, uiop, 1);
1880 			mutex_enter(&p->p_lock);
1881 		}
1882 		prunlock(pnp);
1883 	}
1884 
1885 	return (error);
1886 }
1887 
1888 #ifdef _SYSCALL32_IMPL
1889 
1890 /*
1891  * Array of ILP32 read functions, indexed by /proc file type.
1892  */
1893 static int pr_read_status_32(),
1894 	pr_read_lstatus_32(), pr_read_psinfo_32(), pr_read_lpsinfo_32(),
1895 	pr_read_map_32(), pr_read_rmap_32(), pr_read_xmap_32(),
1896 	pr_read_sigact_32(), pr_read_auxv_32(),
1897 	pr_read_usage_32(), pr_read_lusage_32(), pr_read_pagedata_32(),
1898 	pr_read_watch_32(), pr_read_lwpstatus_32(), pr_read_lwpsinfo_32(),
1899 	pr_read_lwpusage_32(), pr_read_spymaster_32(),
1900 #if defined(__sparc)
1901 	pr_read_gwindows_32(),
1902 #endif
1903 	pr_read_opagedata_32();
1904 
1905 static int (*pr_read_function_32[PR_NFILES])() = {
1906 	pr_read_inval,		/* /proc				*/
1907 	pr_read_inval,		/* /proc/self				*/
1908 	pr_read_piddir,		/* /proc/<pid> (old /proc read())	*/
1909 	pr_read_as,		/* /proc/<pid>/as			*/
1910 	pr_read_inval,		/* /proc/<pid>/ctl			*/
1911 	pr_read_status_32,	/* /proc/<pid>/status			*/
1912 	pr_read_lstatus_32,	/* /proc/<pid>/lstatus			*/
1913 	pr_read_psinfo_32,	/* /proc/<pid>/psinfo			*/
1914 	pr_read_lpsinfo_32,	/* /proc/<pid>/lpsinfo			*/
1915 	pr_read_map_32,		/* /proc/<pid>/map			*/
1916 	pr_read_rmap_32,	/* /proc/<pid>/rmap			*/
1917 	pr_read_xmap_32,	/* /proc/<pid>/xmap			*/
1918 	pr_read_cred,		/* /proc/<pid>/cred			*/
1919 	pr_read_sigact_32,	/* /proc/<pid>/sigact			*/
1920 	pr_read_auxv_32,	/* /proc/<pid>/auxv			*/
1921 #if defined(__x86)
1922 	pr_read_ldt,		/* /proc/<pid>/ldt			*/
1923 #endif
1924 	pr_read_usage_32,	/* /proc/<pid>/usage			*/
1925 	pr_read_lusage_32,	/* /proc/<pid>/lusage			*/
1926 	pr_read_pagedata_32,	/* /proc/<pid>/pagedata			*/
1927 	pr_read_watch_32,	/* /proc/<pid>/watch			*/
1928 	pr_read_inval,		/* /proc/<pid>/cwd			*/
1929 	pr_read_inval,		/* /proc/<pid>/root			*/
1930 	pr_read_inval,		/* /proc/<pid>/fd			*/
1931 	pr_read_inval,		/* /proc/<pid>/fd/nn			*/
1932 	pr_read_inval,		/* /proc/<pid>/fdinfo			*/
1933 	pr_read_fdinfo,		/* /proc/<pid>/fdinfo/nn		*/
1934 	pr_read_inval,		/* /proc/<pid>/object			*/
1935 	pr_read_inval,		/* /proc/<pid>/object/xxx		*/
1936 	pr_read_inval,		/* /proc/<pid>/lwp			*/
1937 	pr_read_inval,		/* /proc/<pid>/lwp/<lwpid>		*/
1938 	pr_read_inval,		/* /proc/<pid>/lwp/<lwpid>/lwpctl	*/
1939 	pr_read_lwpname,	/* /proc/<pid>/lwp/<lwpid>/lwpname	*/
1940 	pr_read_lwpstatus_32,	/* /proc/<pid>/lwp/<lwpid>/lwpstatus	*/
1941 	pr_read_lwpsinfo_32,	/* /proc/<pid>/lwp/<lwpid>/lwpsinfo	*/
1942 	pr_read_lwpusage_32,	/* /proc/<pid>/lwp/<lwpid>/lwpusage	*/
1943 	pr_read_xregs,		/* /proc/<pid>/lwp/<lwpid>/xregs	*/
1944 	pr_read_inval,		/* /proc/<pid>/lwp/<lwpid>/templates	*/
1945 	pr_read_inval,		/* /proc/<pid>/lwp/<lwpid>/templates/<id> */
1946 	pr_read_spymaster_32,	/* /proc/<pid>/lwp/<lwpid>/spymaster	*/
1947 #if defined(__sparc)
1948 	pr_read_gwindows_32,	/* /proc/<pid>/lwp/<lwpid>/gwindows	*/
1949 	pr_read_asrs,		/* /proc/<pid>/lwp/<lwpid>/asrs		*/
1950 #endif
1951 	pr_read_priv,		/* /proc/<pid>/priv			*/
1952 	pr_read_inval,		/* /proc/<pid>/path			*/
1953 	pr_read_inval,		/* /proc/<pid>/path/xxx			*/
1954 	pr_read_inval,		/* /proc/<pid>/contracts		*/
1955 	pr_read_inval,		/* /proc/<pid>/contracts/<ctid>		*/
1956 	pr_read_secflags,	/* /proc/<pid>/secflags			*/
1957 	pr_read_pidfile,	/* old process file			*/
1958 	pr_read_pidfile,	/* old lwp file				*/
1959 	pr_read_opagedata_32,	/* old pagedata file			*/
1960 };
1961 
1962 static int
1963 pr_read_status_32(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1964 {
1965 	pstatus32_t *sp;
1966 	proc_t *p;
1967 	int error;
1968 
1969 	ASSERT(pnp->pr_type == PR_STATUS);
1970 
1971 	/*
1972 	 * We kmem_alloc() the pstatus structure because
1973 	 * it is so big it might blow the kernel stack.
1974 	 */
1975 	sp = kmem_alloc(sizeof (*sp), KM_SLEEP);
1976 	if ((error = prlock(pnp, ZNO)) == 0) {
1977 		/*
1978 		 * A 32-bit process cannot get the status of a 64-bit process.
1979 		 * The fields for the 64-bit quantities are not large enough.
1980 		 */
1981 		p = pnp->pr_common->prc_proc;
1982 		if (PROCESS_NOT_32BIT(p)) {
1983 			prunlock(pnp);
1984 			error = EOVERFLOW;
1985 		} else {
1986 			prgetstatus32(pnp->pr_common->prc_proc, sp,
1987 			    VTOZONE(PTOV(pnp)));
1988 			prunlock(pnp);
1989 			error = pr_uioread(sp, sizeof (*sp), uiop);
1990 		}
1991 	}
1992 	kmem_free((caddr_t)sp, sizeof (*sp));
1993 	return (error);
1994 }
1995 
1996 static int
1997 pr_read_lstatus_32(prnode_t *pnp, uio_t *uiop, cred_t *cr)
1998 {
1999 	proc_t *p;
2000 	kthread_t *t;
2001 	lwpdir_t *ldp;
2002 	size_t size;
2003 	prheader32_t *php;
2004 	lwpstatus32_t *sp;
2005 	int error;
2006 	int nlwp;
2007 	int i;
2008 
2009 	ASSERT(pnp->pr_type == PR_LSTATUS);
2010 
2011 	if ((error = prlock(pnp, ZNO)) != 0)
2012 		return (error);
2013 	p = pnp->pr_common->prc_proc;
2014 	/*
2015 	 * A 32-bit process cannot get the status of a 64-bit process.
2016 	 * The fields for the 64-bit quantities are not large enough.
2017 	 */
2018 	if (PROCESS_NOT_32BIT(p)) {
2019 		prunlock(pnp);
2020 		return (EOVERFLOW);
2021 	}
2022 	nlwp = p->p_lwpcnt;
2023 	size = sizeof (prheader32_t) + nlwp * LSPAN32(lwpstatus32_t);
2024 
2025 	/* drop p->p_lock to do kmem_alloc(KM_SLEEP) */
2026 	mutex_exit(&p->p_lock);
2027 	php = kmem_zalloc(size, KM_SLEEP);
2028 	mutex_enter(&p->p_lock);
2029 	/* p->p_lwpcnt can't change while process is locked */
2030 	ASSERT(nlwp == p->p_lwpcnt);
2031 
2032 	php->pr_nent = nlwp;
2033 	php->pr_entsize = LSPAN32(lwpstatus32_t);
2034 
2035 	sp = (lwpstatus32_t *)(php + 1);
2036 	for (ldp = p->p_lwpdir, i = 0; i < p->p_lwpdir_sz; i++, ldp++) {
2037 		if (ldp->ld_entry == NULL ||
2038 		    (t = ldp->ld_entry->le_thread) == NULL)
2039 			continue;
2040 		prgetlwpstatus32(t, sp, VTOZONE(PTOV(pnp)));
2041 		sp = (lwpstatus32_t *)((caddr_t)sp + LSPAN32(lwpstatus32_t));
2042 	}
2043 	prunlock(pnp);
2044 
2045 	error = pr_uioread(php, size, uiop);
2046 	kmem_free(php, size);
2047 	return (error);
2048 }
2049 
2050 static int
2051 pr_read_psinfo_32(prnode_t *pnp, uio_t *uiop, cred_t *cr)
2052 {
2053 	psinfo32_t psinfo;
2054 	proc_t *p;
2055 	int error = 0;
2056 
2057 	ASSERT(pnp->pr_type == PR_PSINFO);
2058 
2059 	/*
2060 	 * We don't want the full treatment of prlock(pnp) here.
2061 	 * This file is world-readable and never goes invalid.
2062 	 * It doesn't matter if we are in the middle of an exec().
2063 	 */
2064 	p = pr_p_lock(pnp);
2065 	mutex_exit(&pr_pidlock);
2066 	if (p == NULL)
2067 		error = ENOENT;
2068 	else {
2069 		ASSERT(p == pnp->pr_common->prc_proc);
2070 		prgetpsinfo32(p, &psinfo);
2071 		prunlock(pnp);
2072 		error = pr_uioread(&psinfo, sizeof (psinfo), uiop);
2073 	}
2074 	return (error);
2075 }
2076 
2077 static int
2078 pr_read_lpsinfo_32(prnode_t *pnp, uio_t *uiop, cred_t *cr)
2079 {
2080 	proc_t *p;
2081 	kthread_t *t;
2082 	lwpdir_t *ldp;
2083 	lwpent_t *lep;
2084 	size_t size;
2085 	prheader32_t *php;
2086 	lwpsinfo32_t *sp;
2087 	int error;
2088 	int nlwp;
2089 	int i;
2090 
2091 	ASSERT(pnp->pr_type == PR_LPSINFO);
2092 
2093 	/*
2094 	 * We don't want the full treatment of prlock(pnp) here.
2095 	 * This file is world-readable and never goes invalid.
2096 	 * It doesn't matter if we are in the middle of an exec().
2097 	 */
2098 	p = pr_p_lock(pnp);
2099 	mutex_exit(&pr_pidlock);
2100 	if (p == NULL)
2101 		return (ENOENT);
2102 	ASSERT(p == pnp->pr_common->prc_proc);
2103 	if ((nlwp = p->p_lwpcnt + p->p_zombcnt) == 0) {
2104 		prunlock(pnp);
2105 		return (ENOENT);
2106 	}
2107 	size = sizeof (prheader32_t) + nlwp * LSPAN32(lwpsinfo32_t);
2108 
2109 	/* drop p->p_lock to do kmem_alloc(KM_SLEEP) */
2110 	mutex_exit(&p->p_lock);
2111 	php = kmem_zalloc(size, KM_SLEEP);
2112 	mutex_enter(&p->p_lock);
2113 	/* p->p_lwpcnt can't change while process is locked */
2114 	ASSERT(nlwp == p->p_lwpcnt + p->p_zombcnt);
2115 
2116 	php->pr_nent = nlwp;
2117 	php->pr_entsize = LSPAN32(lwpsinfo32_t);
2118 
2119 	sp = (lwpsinfo32_t *)(php + 1);
2120 	for (ldp = p->p_lwpdir, i = 0; i < p->p_lwpdir_sz; i++, ldp++) {
2121 		if ((lep = ldp->ld_entry) == NULL)
2122 			continue;
2123 		if ((t = lep->le_thread) != NULL)
2124 			prgetlwpsinfo32(t, sp);
2125 		else {
2126 			bzero(sp, sizeof (*sp));
2127 			sp->pr_lwpid = lep->le_lwpid;
2128 			sp->pr_state = SZOMB;
2129 			sp->pr_sname = 'Z';
2130 			sp->pr_start.tv_sec = (time32_t)lep->le_start;
2131 		}
2132 		sp = (lwpsinfo32_t *)((caddr_t)sp + LSPAN32(lwpsinfo32_t));
2133 	}
2134 	prunlock(pnp);
2135 
2136 	error = pr_uioread(php, size, uiop);
2137 	kmem_free(php, size);
2138 	return (error);
2139 }
2140 
2141 static int
2142 pr_read_map_common_32(prnode_t *pnp, uio_t *uiop, prnodetype_t type)
2143 {
2144 	proc_t *p;
2145 	struct as *as;
2146 	list_t	iolhead;
2147 	int error;
2148 
2149 readmap32_common:
2150 	if ((error = prlock(pnp, ZNO)) != 0)
2151 		return (error);
2152 
2153 	p = pnp->pr_common->prc_proc;
2154 	as = p->p_as;
2155 
2156 	if ((p->p_flag & SSYS) || as == &kas) {
2157 		prunlock(pnp);
2158 		return (0);
2159 	}
2160 
2161 	if (PROCESS_NOT_32BIT(p)) {
2162 		prunlock(pnp);
2163 		return (EOVERFLOW);
2164 	}
2165 
2166 	if (!AS_LOCK_TRYENTER(as, RW_WRITER)) {
2167 		prunlock(pnp);
2168 		delay(1);
2169 		goto readmap32_common;
2170 	}
2171 	mutex_exit(&p->p_lock);
2172 
2173 	switch (type) {
2174 	case PR_XMAP:
2175 		error = prgetxmap32(p, &iolhead);
2176 		break;
2177 	case PR_RMAP:
2178 		error = prgetmap32(p, 1, &iolhead);
2179 		break;
2180 	case PR_MAP:
2181 		error = prgetmap32(p, 0, &iolhead);
2182 		break;
2183 	}
2184 	AS_LOCK_EXIT(as);
2185 	mutex_enter(&p->p_lock);
2186 	prunlock(pnp);
2187 
2188 	error = pr_iol_uiomove_and_free(&iolhead, uiop, error);
2189 
2190 	return (error);
2191 }
2192 
2193 static int
2194 pr_read_map_32(prnode_t *pnp, uio_t *uiop, cred_t *cr)
2195 {
2196 	ASSERT(pnp->pr_type == PR_MAP);
2197 	return (pr_read_map_common_32(pnp, uiop, pnp->pr_type));
2198 }
2199 
2200 static int
2201 pr_read_rmap_32(prnode_t *pnp, uio_t *uiop, cred_t *cr)
2202 {
2203 	ASSERT(pnp->pr_type == PR_RMAP);
2204 	return (pr_read_map_common_32(pnp, uiop, pnp->pr_type));
2205 }
2206 
2207 static int
2208 pr_read_xmap_32(prnode_t *pnp, uio_t *uiop, cred_t *cr)
2209 {
2210 	ASSERT(pnp->pr_type == PR_XMAP);
2211 	return (pr_read_map_common_32(pnp, uiop, pnp->pr_type));
2212 }
2213 
2214 static int
2215 pr_read_sigact_32(prnode_t *pnp, uio_t *uiop, cred_t *cr)
2216 {
2217 	int nsig = PROC_IS_BRANDED(curproc)? BROP(curproc)->b_nsig : NSIG;
2218 	proc_t *p;
2219 	struct sigaction32 *sap;
2220 	int sig;
2221 	int error;
2222 	user_t *up;
2223 
2224 	ASSERT(pnp->pr_type == PR_SIGACT);
2225 
2226 	/*
2227 	 * We kmem_alloc() the sigaction32 array because
2228 	 * it is so big it might blow the kernel stack.
2229 	 */
2230 	sap = kmem_alloc((nsig-1) * sizeof (struct sigaction32), KM_SLEEP);
2231 
2232 	if ((error = prlock(pnp, ZNO)) != 0)
2233 		goto out;
2234 	p = pnp->pr_common->prc_proc;
2235 
2236 	if (PROCESS_NOT_32BIT(p)) {
2237 		prunlock(pnp);
2238 		error = EOVERFLOW;
2239 		goto out;
2240 	}
2241 
2242 	if (uiop->uio_offset >= (nsig-1) * sizeof (struct sigaction32)) {
2243 		prunlock(pnp);
2244 		goto out;
2245 	}
2246 
2247 	up = PTOU(p);
2248 	for (sig = 1; sig < nsig; sig++)
2249 		prgetaction32(p, up, sig, &sap[sig-1]);
2250 	prunlock(pnp);
2251 
2252 	error = pr_uioread(sap, (nsig - 1) * sizeof (struct sigaction32), uiop);
2253 out:
2254 	kmem_free(sap, (nsig-1) * sizeof (struct sigaction32));
2255 	return (error);
2256 }
2257 
2258 static int
2259 pr_read_auxv_32(prnode_t *pnp, uio_t *uiop, cred_t *cr)
2260 {
2261 	auxv32_t auxv[__KERN_NAUXV_IMPL];
2262 	proc_t *p;
2263 	user_t *up;
2264 	int error;
2265 	int i;
2266 
2267 	ASSERT(pnp->pr_type == PR_AUXV);
2268 
2269 	if ((error = prlock(pnp, ZNO)) != 0)
2270 		return (error);
2271 	p = pnp->pr_common->prc_proc;
2272 
2273 	if (PROCESS_NOT_32BIT(p)) {
2274 		prunlock(pnp);
2275 		return (EOVERFLOW);
2276 	}
2277 
2278 	if (uiop->uio_offset >= sizeof (auxv)) {
2279 		prunlock(pnp);
2280 		return (0);
2281 	}
2282 
2283 	up = PTOU(p);
2284 	for (i = 0; i < __KERN_NAUXV_IMPL; i++) {
2285 		auxv[i].a_type = (int32_t)up->u_auxv[i].a_type;
2286 		auxv[i].a_un.a_val = (int32_t)up->u_auxv[i].a_un.a_val;
2287 	}
2288 	prunlock(pnp);
2289 
2290 	return (pr_uioread(auxv, sizeof (auxv), uiop));
2291 }
2292 
2293 static int
2294 pr_read_usage_32(prnode_t *pnp, uio_t *uiop, cred_t *cr)
2295 {
2296 	prhusage_t *pup;
2297 	prusage32_t *upup;
2298 	proc_t *p;
2299 	kthread_t *t;
2300 	int error;
2301 
2302 	ASSERT(pnp->pr_type == PR_USAGE);
2303 
2304 	/* allocate now, before locking the process */
2305 	pup = kmem_zalloc(sizeof (*pup), KM_SLEEP);
2306 	upup = kmem_alloc(sizeof (*upup), KM_SLEEP);
2307 
2308 	/*
2309 	 * We don't want the full treatment of prlock(pnp) here.
2310 	 * This file is world-readable and never goes invalid.
2311 	 * It doesn't matter if we are in the middle of an exec().
2312 	 */
2313 	p = pr_p_lock(pnp);
2314 	mutex_exit(&pr_pidlock);
2315 	if (p == NULL) {
2316 		error = ENOENT;
2317 		goto out;
2318 	}
2319 	ASSERT(p == pnp->pr_common->prc_proc);
2320 
2321 	if (uiop->uio_offset >= sizeof (prusage32_t)) {
2322 		prunlock(pnp);
2323 		error = 0;
2324 		goto out;
2325 	}
2326 
2327 	pup->pr_tstamp = gethrtime();
2328 
2329 	pup->pr_count  = p->p_defunct;
2330 	pup->pr_create = p->p_mstart;
2331 	pup->pr_term   = p->p_mterm;
2332 
2333 	pup->pr_rtime    = p->p_mlreal;
2334 	pup->pr_utime    = p->p_acct[LMS_USER];
2335 	pup->pr_stime    = p->p_acct[LMS_SYSTEM];
2336 	pup->pr_ttime    = p->p_acct[LMS_TRAP];
2337 	pup->pr_tftime   = p->p_acct[LMS_TFAULT];
2338 	pup->pr_dftime   = p->p_acct[LMS_DFAULT];
2339 	pup->pr_kftime   = p->p_acct[LMS_KFAULT];
2340 	pup->pr_ltime    = p->p_acct[LMS_USER_LOCK];
2341 	pup->pr_slptime  = p->p_acct[LMS_SLEEP];
2342 	pup->pr_wtime    = p->p_acct[LMS_WAIT_CPU];
2343 	pup->pr_stoptime = p->p_acct[LMS_STOPPED];
2344 
2345 	pup->pr_minf  = p->p_ru.minflt;
2346 	pup->pr_majf  = p->p_ru.majflt;
2347 	pup->pr_nswap = p->p_ru.nswap;
2348 	pup->pr_inblk = p->p_ru.inblock;
2349 	pup->pr_oublk = p->p_ru.oublock;
2350 	pup->pr_msnd  = p->p_ru.msgsnd;
2351 	pup->pr_mrcv  = p->p_ru.msgrcv;
2352 	pup->pr_sigs  = p->p_ru.nsignals;
2353 	pup->pr_vctx  = p->p_ru.nvcsw;
2354 	pup->pr_ictx  = p->p_ru.nivcsw;
2355 	pup->pr_sysc  = p->p_ru.sysc;
2356 	pup->pr_ioch  = p->p_ru.ioch;
2357 
2358 	/*
2359 	 * Add the usage information for each active lwp.
2360 	 */
2361 	if ((t = p->p_tlist) != NULL &&
2362 	    !(pnp->pr_pcommon->prc_flags & PRC_DESTROY)) {
2363 		do {
2364 			if (t->t_proc_flag & TP_LWPEXIT)
2365 				continue;
2366 			pup->pr_count++;
2367 			praddusage(t, pup);
2368 		} while ((t = t->t_forw) != p->p_tlist);
2369 	}
2370 
2371 	prunlock(pnp);
2372 
2373 	prcvtusage32(pup, upup);
2374 
2375 	error = pr_uioread(upup, sizeof (prusage32_t), uiop);
2376 out:
2377 	kmem_free(pup, sizeof (*pup));
2378 	kmem_free(upup, sizeof (*upup));
2379 	return (error);
2380 }
2381 
2382 static int
2383 pr_read_lusage_32(prnode_t *pnp, uio_t *uiop, cred_t *cr)
2384 {
2385 	int nlwp;
2386 	prhusage_t *pup;
2387 	prheader32_t *php;
2388 	prusage32_t *upup;
2389 	size_t size;
2390 	hrtime_t curtime;
2391 	proc_t *p;
2392 	kthread_t *t;
2393 	lwpdir_t *ldp;
2394 	int error;
2395 	int i;
2396 
2397 	ASSERT(pnp->pr_type == PR_LUSAGE);
2398 
2399 	/*
2400 	 * We don't want the full treatment of prlock(pnp) here.
2401 	 * This file is world-readable and never goes invalid.
2402 	 * It doesn't matter if we are in the middle of an exec().
2403 	 */
2404 	p = pr_p_lock(pnp);
2405 	mutex_exit(&pr_pidlock);
2406 	if (p == NULL)
2407 		return (ENOENT);
2408 	ASSERT(p == pnp->pr_common->prc_proc);
2409 	if ((nlwp = p->p_lwpcnt) == 0) {
2410 		prunlock(pnp);
2411 		return (ENOENT);
2412 	}
2413 
2414 	size = sizeof (prheader32_t) + (nlwp + 1) * LSPAN32(prusage32_t);
2415 	if (uiop->uio_offset >= size) {
2416 		prunlock(pnp);
2417 		return (0);
2418 	}
2419 
2420 	/* drop p->p_lock to do kmem_alloc(KM_SLEEP) */
2421 	mutex_exit(&p->p_lock);
2422 	pup = kmem_zalloc(size + sizeof (prhusage_t), KM_SLEEP);
2423 	mutex_enter(&p->p_lock);
2424 	/* p->p_lwpcnt can't change while process is locked */
2425 	ASSERT(nlwp == p->p_lwpcnt);
2426 
2427 	php = (prheader32_t *)(pup + 1);
2428 	upup = (prusage32_t *)(php + 1);
2429 
2430 	php->pr_nent = nlwp + 1;
2431 	php->pr_entsize = LSPAN32(prusage32_t);
2432 
2433 	curtime = gethrtime();
2434 
2435 	/*
2436 	 * First the summation over defunct lwps.
2437 	 */
2438 	pup->pr_count  = p->p_defunct;
2439 	pup->pr_tstamp = curtime;
2440 	pup->pr_create = p->p_mstart;
2441 	pup->pr_term   = p->p_mterm;
2442 
2443 	pup->pr_rtime    = p->p_mlreal;
2444 	pup->pr_utime    = p->p_acct[LMS_USER];
2445 	pup->pr_stime    = p->p_acct[LMS_SYSTEM];
2446 	pup->pr_ttime    = p->p_acct[LMS_TRAP];
2447 	pup->pr_tftime   = p->p_acct[LMS_TFAULT];
2448 	pup->pr_dftime   = p->p_acct[LMS_DFAULT];
2449 	pup->pr_kftime   = p->p_acct[LMS_KFAULT];
2450 	pup->pr_ltime    = p->p_acct[LMS_USER_LOCK];
2451 	pup->pr_slptime  = p->p_acct[LMS_SLEEP];
2452 	pup->pr_wtime    = p->p_acct[LMS_WAIT_CPU];
2453 	pup->pr_stoptime = p->p_acct[LMS_STOPPED];
2454 
2455 	pup->pr_minf  = p->p_ru.minflt;
2456 	pup->pr_majf  = p->p_ru.majflt;
2457 	pup->pr_nswap = p->p_ru.nswap;
2458 	pup->pr_inblk = p->p_ru.inblock;
2459 	pup->pr_oublk = p->p_ru.oublock;
2460 	pup->pr_msnd  = p->p_ru.msgsnd;
2461 	pup->pr_mrcv  = p->p_ru.msgrcv;
2462 	pup->pr_sigs  = p->p_ru.nsignals;
2463 	pup->pr_vctx  = p->p_ru.nvcsw;
2464 	pup->pr_ictx  = p->p_ru.nivcsw;
2465 	pup->pr_sysc  = p->p_ru.sysc;
2466 	pup->pr_ioch  = p->p_ru.ioch;
2467 
2468 	prcvtusage32(pup, upup);
2469 
2470 	/*
2471 	 * Fill one prusage struct for each active lwp.
2472 	 */
2473 	for (ldp = p->p_lwpdir, i = 0; i < p->p_lwpdir_sz; i++, ldp++) {
2474 		if (ldp->ld_entry == NULL ||
2475 		    (t = ldp->ld_entry->le_thread) == NULL)
2476 			continue;
2477 		ASSERT(!(t->t_proc_flag & TP_LWPEXIT));
2478 		ASSERT(nlwp > 0);
2479 		--nlwp;
2480 		upup = (prusage32_t *)
2481 		    ((caddr_t)upup + LSPAN32(prusage32_t));
2482 		prgetusage(t, pup);
2483 		prcvtusage32(pup, upup);
2484 	}
2485 	ASSERT(nlwp == 0);
2486 
2487 	prunlock(pnp);
2488 
2489 	error = pr_uioread(php, size, uiop);
2490 	kmem_free(pup, size + sizeof (prhusage_t));
2491 	return (error);
2492 }
2493 
2494 static int
2495 pr_read_pagedata_32(prnode_t *pnp, uio_t *uiop, cred_t *cr)
2496 {
2497 	proc_t *p;
2498 	int error;
2499 
2500 	ASSERT(pnp->pr_type == PR_PAGEDATA);
2501 
2502 	if ((error = prlock(pnp, ZNO)) != 0)
2503 		return (error);
2504 
2505 	p = pnp->pr_common->prc_proc;
2506 	if ((p->p_flag & SSYS) || p->p_as == &kas) {
2507 		prunlock(pnp);
2508 		return (0);
2509 	}
2510 
2511 	if (PROCESS_NOT_32BIT(p)) {
2512 		prunlock(pnp);
2513 		return (EOVERFLOW);
2514 	}
2515 
2516 	mutex_exit(&p->p_lock);
2517 	error = prpdread32(p, pnp->pr_hatid, uiop);
2518 	mutex_enter(&p->p_lock);
2519 
2520 	prunlock(pnp);
2521 	return (error);
2522 }
2523 
2524 static int
2525 pr_read_opagedata_32(prnode_t *pnp, uio_t *uiop, cred_t *cr)
2526 {
2527 	proc_t *p;
2528 	struct as *as;
2529 	int error;
2530 
2531 	ASSERT(pnp->pr_type == PR_OPAGEDATA);
2532 
2533 	if ((error = prlock(pnp, ZNO)) != 0)
2534 		return (error);
2535 
2536 	p = pnp->pr_common->prc_proc;
2537 	as = p->p_as;
2538 
2539 	if ((p->p_flag & SSYS) || as == &kas) {
2540 		prunlock(pnp);
2541 		return (0);
2542 	}
2543 
2544 	if (PROCESS_NOT_32BIT(p)) {
2545 		prunlock(pnp);
2546 		return (EOVERFLOW);
2547 	}
2548 
2549 	mutex_exit(&p->p_lock);
2550 	error = oprpdread32(as, pnp->pr_hatid, uiop);
2551 	mutex_enter(&p->p_lock);
2552 
2553 	prunlock(pnp);
2554 	return (error);
2555 }
2556 
2557 static int
2558 pr_read_watch_32(prnode_t *pnp, uio_t *uiop, cred_t *cr)
2559 {
2560 	proc_t *p;
2561 	int error;
2562 	prwatch32_t *Bpwp;
2563 	size_t size;
2564 	prwatch32_t *pwp;
2565 	int nwarea;
2566 	struct watched_area *pwarea;
2567 
2568 	ASSERT(pnp->pr_type == PR_WATCH);
2569 
2570 	if ((error = prlock(pnp, ZNO)) != 0)
2571 		return (error);
2572 
2573 	p = pnp->pr_common->prc_proc;
2574 	if (PROCESS_NOT_32BIT(p)) {
2575 		prunlock(pnp);
2576 		return (EOVERFLOW);
2577 	}
2578 	nwarea = avl_numnodes(&p->p_warea);
2579 	size = nwarea * sizeof (prwatch32_t);
2580 	if (uiop->uio_offset >= size) {
2581 		prunlock(pnp);
2582 		return (0);
2583 	}
2584 
2585 	/* drop p->p_lock to do kmem_alloc(KM_SLEEP) */
2586 	mutex_exit(&p->p_lock);
2587 	Bpwp = pwp = kmem_zalloc(size, KM_SLEEP);
2588 	mutex_enter(&p->p_lock);
2589 	/* p->p_nwarea can't change while process is locked */
2590 	ASSERT(nwarea == avl_numnodes(&p->p_warea));
2591 
2592 	/* gather the watched areas */
2593 	for (pwarea = avl_first(&p->p_warea); pwarea != NULL;
2594 	    pwarea = AVL_NEXT(&p->p_warea, pwarea), pwp++) {
2595 		pwp->pr_vaddr = (caddr32_t)(uintptr_t)pwarea->wa_vaddr;
2596 		pwp->pr_size = (size32_t)(pwarea->wa_eaddr - pwarea->wa_vaddr);
2597 		pwp->pr_wflags = (int)pwarea->wa_flags;
2598 	}
2599 
2600 	prunlock(pnp);
2601 
2602 	error = pr_uioread(Bpwp, size, uiop);
2603 	kmem_free(Bpwp, size);
2604 	return (error);
2605 }
2606 
2607 static int
2608 pr_read_lwpstatus_32(prnode_t *pnp, uio_t *uiop, cred_t *cr)
2609 {
2610 	lwpstatus32_t *sp;
2611 	proc_t *p;
2612 	int error;
2613 
2614 	ASSERT(pnp->pr_type == PR_LWPSTATUS);
2615 
2616 	/*
2617 	 * We kmem_alloc() the lwpstatus structure because
2618 	 * it is so big it might blow the kernel stack.
2619 	 */
2620 	sp = kmem_alloc(sizeof (*sp), KM_SLEEP);
2621 
2622 	if ((error = prlock(pnp, ZNO)) != 0)
2623 		goto out;
2624 
2625 	/*
2626 	 * A 32-bit process cannot get the status of a 64-bit process.
2627 	 * The fields for the 64-bit quantities are not large enough.
2628 	 */
2629 	p = pnp->pr_common->prc_proc;
2630 	if (PROCESS_NOT_32BIT(p)) {
2631 		prunlock(pnp);
2632 		error = EOVERFLOW;
2633 		goto out;
2634 	}
2635 
2636 	if (uiop->uio_offset >= sizeof (*sp)) {
2637 		prunlock(pnp);
2638 		goto out;
2639 	}
2640 
2641 	prgetlwpstatus32(pnp->pr_common->prc_thread, sp, VTOZONE(PTOV(pnp)));
2642 	prunlock(pnp);
2643 
2644 	error = pr_uioread(sp, sizeof (*sp), uiop);
2645 out:
2646 	kmem_free(sp, sizeof (*sp));
2647 	return (error);
2648 }
2649 
2650 static int
2651 pr_read_lwpsinfo_32(prnode_t *pnp, uio_t *uiop, cred_t *cr)
2652 {
2653 	lwpsinfo32_t lwpsinfo;
2654 	proc_t *p;
2655 	kthread_t *t;
2656 	lwpent_t *lep;
2657 
2658 	ASSERT(pnp->pr_type == PR_LWPSINFO);
2659 
2660 	/*
2661 	 * We don't want the full treatment of prlock(pnp) here.
2662 	 * This file is world-readable and never goes invalid.
2663 	 * It doesn't matter if we are in the middle of an exec().
2664 	 */
2665 	p = pr_p_lock(pnp);
2666 	mutex_exit(&pr_pidlock);
2667 	if (p == NULL)
2668 		return (ENOENT);
2669 	ASSERT(p == pnp->pr_common->prc_proc);
2670 	if (pnp->pr_common->prc_tslot == -1) {
2671 		prunlock(pnp);
2672 		return (ENOENT);
2673 	}
2674 
2675 	if (uiop->uio_offset >= sizeof (lwpsinfo)) {
2676 		prunlock(pnp);
2677 		return (0);
2678 	}
2679 
2680 	if ((t = pnp->pr_common->prc_thread) != NULL)
2681 		prgetlwpsinfo32(t, &lwpsinfo);
2682 	else {
2683 		lep = p->p_lwpdir[pnp->pr_common->prc_tslot].ld_entry;
2684 		bzero(&lwpsinfo, sizeof (lwpsinfo));
2685 		lwpsinfo.pr_lwpid = lep->le_lwpid;
2686 		lwpsinfo.pr_state = SZOMB;
2687 		lwpsinfo.pr_sname = 'Z';
2688 		lwpsinfo.pr_start.tv_sec = (time32_t)lep->le_start;
2689 	}
2690 	prunlock(pnp);
2691 
2692 	return (pr_uioread(&lwpsinfo, sizeof (lwpsinfo), uiop));
2693 }
2694 
2695 static int
2696 pr_read_lwpusage_32(prnode_t *pnp, uio_t *uiop, cred_t *cr)
2697 {
2698 	prhusage_t *pup;
2699 	prusage32_t *upup;
2700 	proc_t *p;
2701 	int error;
2702 
2703 	ASSERT(pnp->pr_type == PR_LWPUSAGE);
2704 
2705 	/* allocate now, before locking the process */
2706 	pup = kmem_zalloc(sizeof (*pup), KM_SLEEP);
2707 	upup = kmem_alloc(sizeof (*upup), KM_SLEEP);
2708 
2709 	/*
2710 	 * We don't want the full treatment of prlock(pnp) here.
2711 	 * This file is world-readable and never goes invalid.
2712 	 * It doesn't matter if we are in the middle of an exec().
2713 	 */
2714 	p = pr_p_lock(pnp);
2715 	mutex_exit(&pr_pidlock);
2716 	if (p == NULL) {
2717 		error = ENOENT;
2718 		goto out;
2719 	}
2720 	ASSERT(p == pnp->pr_common->prc_proc);
2721 	if (pnp->pr_common->prc_thread == NULL) {
2722 		prunlock(pnp);
2723 		error = ENOENT;
2724 		goto out;
2725 	}
2726 	if (uiop->uio_offset >= sizeof (prusage32_t)) {
2727 		prunlock(pnp);
2728 		error = 0;
2729 		goto out;
2730 	}
2731 
2732 	pup->pr_tstamp = gethrtime();
2733 	prgetusage(pnp->pr_common->prc_thread, pup);
2734 
2735 	prunlock(pnp);
2736 
2737 	prcvtusage32(pup, upup);
2738 
2739 	error = pr_uioread(upup, sizeof (prusage32_t), uiop);
2740 out:
2741 	kmem_free(pup, sizeof (*pup));
2742 	kmem_free(upup, sizeof (*upup));
2743 	return (error);
2744 }
2745 
2746 static int
2747 pr_read_spymaster_32(prnode_t *pnp, uio_t *uiop, cred_t *cr)
2748 {
2749 	psinfo32_t psinfo;
2750 	int error;
2751 	klwp_t *lwp;
2752 
2753 	ASSERT(pnp->pr_type == PR_SPYMASTER);
2754 
2755 	if ((error = prlock(pnp, ZNO)) != 0)
2756 		return (error);
2757 
2758 	if (pnp->pr_common->prc_thread == NULL) {
2759 		prunlock(pnp);
2760 		return (0);
2761 	}
2762 
2763 	lwp = pnp->pr_common->prc_thread->t_lwp;
2764 
2765 	if (lwp->lwp_spymaster == NULL) {
2766 		prunlock(pnp);
2767 		return (0);
2768 	}
2769 
2770 	psinfo_kto32(lwp->lwp_spymaster, &psinfo);
2771 	prunlock(pnp);
2772 
2773 	return (pr_uioread(&psinfo, sizeof (psinfo), uiop));
2774 }
2775 
2776 #if defined(__sparc)
2777 static int
2778 pr_read_gwindows_32(prnode_t *pnp, uio_t *uiop, cred_t *cr)
2779 {
2780 	proc_t *p;
2781 	kthread_t *t;
2782 	gwindows32_t *gwp;
2783 	int error;
2784 	size_t size;
2785 
2786 	ASSERT(pnp->pr_type == PR_GWINDOWS);
2787 
2788 	gwp = kmem_zalloc(sizeof (gwindows32_t), KM_SLEEP);
2789 
2790 	if ((error = prlock(pnp, ZNO)) != 0)
2791 		goto out;
2792 
2793 	p = pnp->pr_common->prc_proc;
2794 	t = pnp->pr_common->prc_thread;
2795 
2796 	if (PROCESS_NOT_32BIT(p)) {
2797 		prunlock(pnp);
2798 		error = EOVERFLOW;
2799 		goto out;
2800 	}
2801 
2802 	/*
2803 	 * Drop p->p_lock while touching the stack.
2804 	 * The P_PR_LOCK flag prevents the lwp from
2805 	 * disappearing while we do this.
2806 	 */
2807 	mutex_exit(&p->p_lock);
2808 	if ((size = prnwindows(ttolwp(t))) != 0)
2809 		size = sizeof (gwindows32_t) -
2810 		    (SPARC_MAXREGWINDOW - size) * sizeof (struct rwindow32);
2811 	if (uiop->uio_offset >= size) {
2812 		mutex_enter(&p->p_lock);
2813 		prunlock(pnp);
2814 		goto out;
2815 	}
2816 	prgetwindows32(ttolwp(t), gwp);
2817 	mutex_enter(&p->p_lock);
2818 	prunlock(pnp);
2819 
2820 	error = pr_uioread(gwp, size, uiop);
2821 out:
2822 	kmem_free(gwp, sizeof (gwindows32_t));
2823 	return (error);
2824 }
2825 #endif	/* __sparc */
2826 
2827 #endif	/* _SYSCALL32_IMPL */
2828 
2829 /* ARGSUSED */
2830 static int
2831 prread(vnode_t *vp, uio_t *uiop, int ioflag, cred_t *cr, caller_context_t *ct)
2832 {
2833 	prnode_t *pnp = VTOP(vp);
2834 
2835 	ASSERT(pnp->pr_type < PR_NFILES);
2836 
2837 #ifdef _SYSCALL32_IMPL
2838 	/*
2839 	 * What is read from the /proc files depends on the data
2840 	 * model of the caller.  An LP64 process will see LP64
2841 	 * data.  An ILP32 process will see ILP32 data.
2842 	 */
2843 	if (curproc->p_model == DATAMODEL_LP64)
2844 		return (pr_read_function[pnp->pr_type](pnp, uiop, cr));
2845 	else
2846 		return (pr_read_function_32[pnp->pr_type](pnp, uiop, cr));
2847 #else
2848 	return (pr_read_function[pnp->pr_type](pnp, uiop, cr));
2849 #endif
2850 }
2851 
2852 /* Note we intentionally don't handle partial writes/updates. */
2853 static int
2854 pr_write_lwpname(prnode_t *pnp, uio_t *uiop)
2855 {
2856 	kthread_t *t = NULL;
2857 	char *lwpname;
2858 	int error;
2859 
2860 	lwpname = kmem_zalloc(THREAD_NAME_MAX, KM_SLEEP);
2861 
2862 	if ((error = uiomove(lwpname, THREAD_NAME_MAX, UIO_WRITE, uiop)) != 0) {
2863 		kmem_free(lwpname, THREAD_NAME_MAX);
2864 		return (error);
2865 	}
2866 
2867 	/* Somebody tried to write too long a thread name... */
2868 	if (lwpname[THREAD_NAME_MAX - 1] != '\0' || uiop->uio_resid > 0) {
2869 		kmem_free(lwpname, THREAD_NAME_MAX);
2870 		return (EIO);
2871 	}
2872 
2873 	VERIFY3U(lwpname[THREAD_NAME_MAX - 1], ==, '\0');
2874 
2875 	for (size_t i = 0; lwpname[i] != '\0'; i++) {
2876 		if (!ISPRINT(lwpname[i])) {
2877 			kmem_free(lwpname, THREAD_NAME_MAX);
2878 			return (EINVAL);
2879 		}
2880 	}
2881 
2882 	/* Equivalent of thread_setname(), but with the ZNO magic. */
2883 	if ((error = prlock(pnp, ZNO)) != 0) {
2884 		kmem_free(lwpname, THREAD_NAME_MAX);
2885 		return (error);
2886 	}
2887 
2888 	t = pnp->pr_common->prc_thread;
2889 	if (t->t_name == NULL) {
2890 		t->t_name = lwpname;
2891 	} else {
2892 		(void) strlcpy(t->t_name, lwpname, THREAD_NAME_MAX);
2893 		kmem_free(lwpname, THREAD_NAME_MAX);
2894 	}
2895 
2896 	prunlock(pnp);
2897 	return (0);
2898 }
2899 
2900 /* ARGSUSED */
2901 static int
2902 prwrite(vnode_t *vp, uio_t *uiop, int ioflag, cred_t *cr, caller_context_t *ct)
2903 {
2904 	prnode_t *pnp = VTOP(vp);
2905 	int old = 0;
2906 	int error;
2907 	ssize_t resid;
2908 
2909 	ASSERT(pnp->pr_type < PR_NFILES);
2910 
2911 	/*
2912 	 * Only a handful of /proc files are writable, enumerate them here.
2913 	 */
2914 	switch (pnp->pr_type) {
2915 	case PR_PIDDIR:		/* directory write()s: visceral revulsion. */
2916 		ASSERT(pnp->pr_pidfile != NULL);
2917 		/* use the underlying PR_PIDFILE to write the process */
2918 		vp = pnp->pr_pidfile;
2919 		pnp = VTOP(vp);
2920 		ASSERT(pnp->pr_type == PR_PIDFILE);
2921 		/* FALLTHROUGH */
2922 	case PR_PIDFILE:
2923 	case PR_LWPIDFILE:
2924 		old = 1;
2925 		/* FALLTHROUGH */
2926 	case PR_AS:
2927 		if ((error = prlock(pnp, ZNO)) == 0) {
2928 			proc_t *p = pnp->pr_common->prc_proc;
2929 			struct as *as = p->p_as;
2930 
2931 			if ((p->p_flag & SSYS) || as == &kas) {
2932 				/*
2933 				 * /proc I/O cannot be done to a system process.
2934 				 */
2935 				error = EIO;
2936 #ifdef _SYSCALL32_IMPL
2937 			} else if (curproc->p_model == DATAMODEL_ILP32 &&
2938 			    PROCESS_NOT_32BIT(p)) {
2939 				error = EOVERFLOW;
2940 #endif
2941 			} else {
2942 				/*
2943 				 * See comments above (pr_read_pidfile)
2944 				 * about this locking dance.
2945 				 */
2946 				mutex_exit(&p->p_lock);
2947 				error = prusrio(p, UIO_WRITE, uiop, old);
2948 				mutex_enter(&p->p_lock);
2949 			}
2950 			prunlock(pnp);
2951 		}
2952 		return (error);
2953 
2954 	case PR_CTL:
2955 	case PR_LWPCTL:
2956 		resid = uiop->uio_resid;
2957 		/*
2958 		 * Perform the action on the control file
2959 		 * by passing curthreads credentials
2960 		 * and not target process's credentials.
2961 		 */
2962 #ifdef _SYSCALL32_IMPL
2963 		if (curproc->p_model == DATAMODEL_ILP32)
2964 			error = prwritectl32(vp, uiop, CRED());
2965 		else
2966 			error = prwritectl(vp, uiop, CRED());
2967 #else
2968 		error = prwritectl(vp, uiop, CRED());
2969 #endif
2970 		/*
2971 		 * This hack makes sure that the EINTR is passed
2972 		 * all the way back to the caller's write() call.
2973 		 */
2974 		if (error == EINTR)
2975 			uiop->uio_resid = resid;
2976 		return (error);
2977 
2978 	case PR_LWPNAME:
2979 		return (pr_write_lwpname(pnp, uiop));
2980 
2981 	default:
2982 		return ((vp->v_type == VDIR)? EISDIR : EBADF);
2983 	}
2984 	/* NOTREACHED */
2985 }
2986 
2987 static int
2988 prgetattr(vnode_t *vp, vattr_t *vap, int flags, cred_t *cr,
2989     caller_context_t *ct)
2990 {
2991 	prnode_t *pnp = VTOP(vp);
2992 	prnodetype_t type = pnp->pr_type;
2993 	prcommon_t *pcp;
2994 	proc_t *p;
2995 	struct as *as;
2996 	int error;
2997 	vnode_t *rvp;
2998 	timestruc_t now;
2999 	extern uint_t nproc;
3000 	int ngroups;
3001 	int nsig;
3002 
3003 	/*
3004 	 * This ugly bit of code allows us to keep both versions of this
3005 	 * function from the same source.
3006 	 */
3007 #ifdef _LP64
3008 	int iam32bit = (curproc->p_model == DATAMODEL_ILP32);
3009 #define	PR_OBJSIZE(obj32, obj64)	\
3010 	(iam32bit ? sizeof (obj32) : sizeof (obj64))
3011 #define	PR_OBJSPAN(obj32, obj64)	\
3012 	(iam32bit ? LSPAN32(obj32) : LSPAN(obj64))
3013 #else
3014 #define	PR_OBJSIZE(obj32, obj64)	\
3015 	(sizeof (obj64))
3016 #define	PR_OBJSPAN(obj32, obj64)	\
3017 	(LSPAN(obj64))
3018 #endif
3019 
3020 	/*
3021 	 * Return all the attributes.  Should be refined
3022 	 * so that it returns only those asked for.
3023 	 * Most of this is complete fakery anyway.
3024 	 */
3025 
3026 	/*
3027 	 * For files in the /proc/<pid>/object directory,
3028 	 * return the attributes of the underlying object.
3029 	 * For files in the /proc/<pid>/fd directory,
3030 	 * return the attributes of the underlying file, but
3031 	 * make it look inaccessible if it is not a regular file.
3032 	 * Make directories look like symlinks.
3033 	 */
3034 	switch (type) {
3035 	case PR_CURDIR:
3036 	case PR_ROOTDIR:
3037 		if (!(flags & ATTR_REAL))
3038 			break;
3039 		/* restrict full knowledge of the attributes to owner or root */
3040 		if ((error = praccess(vp, 0, 0, cr, ct)) != 0)
3041 			return (error);
3042 		/* FALLTHROUGH */
3043 	case PR_OBJECT:
3044 	case PR_FD:
3045 		rvp = pnp->pr_realvp;
3046 		error = VOP_GETATTR(rvp, vap, flags, cr, ct);
3047 		if (error)
3048 			return (error);
3049 		if (type == PR_FD) {
3050 			if (rvp->v_type != VREG && rvp->v_type != VDIR)
3051 				vap->va_mode = 0;
3052 			else
3053 				vap->va_mode &= pnp->pr_mode;
3054 		}
3055 		if (type == PR_OBJECT)
3056 			vap->va_mode &= 07555;
3057 		if (rvp->v_type == VDIR && !(flags & ATTR_REAL)) {
3058 			vap->va_type = VLNK;
3059 			vap->va_size = 0;
3060 			vap->va_nlink = 1;
3061 		}
3062 		return (0);
3063 	default:
3064 		break;
3065 	}
3066 
3067 	bzero(vap, sizeof (*vap));
3068 	/*
3069 	 * Large Files: Internally proc now uses VPROC to indicate
3070 	 * a proc file. Since we have been returning VREG through
3071 	 * VOP_GETATTR() until now, we continue to do this so as
3072 	 * not to break apps depending on this return value.
3073 	 */
3074 	vap->va_type = (vp->v_type == VPROC) ? VREG : vp->v_type;
3075 	vap->va_mode = pnp->pr_mode;
3076 	vap->va_fsid = vp->v_vfsp->vfs_dev;
3077 	vap->va_blksize = DEV_BSIZE;
3078 	vap->va_rdev = 0;
3079 	vap->va_seq = 0;
3080 
3081 	if (type == PR_PROCDIR) {
3082 		vap->va_uid = 0;
3083 		vap->va_gid = 0;
3084 		vap->va_nlink = nproc + 2;
3085 		vap->va_nodeid = (ino64_t)PRROOTINO;
3086 		gethrestime(&now);
3087 		vap->va_atime = vap->va_mtime = vap->va_ctime = now;
3088 		vap->va_size = (v.v_proc + 2) * PRSDSIZE;
3089 		vap->va_nblocks = btod(vap->va_size);
3090 		return (0);
3091 	}
3092 
3093 	/*
3094 	 * /proc/<pid>/self is a symbolic link, and has no prcommon member
3095 	 */
3096 	if (type == PR_SELF) {
3097 		vap->va_uid = crgetruid(CRED());
3098 		vap->va_gid = crgetrgid(CRED());
3099 		vap->va_nodeid = (ino64_t)PR_SELF;
3100 		gethrestime(&now);
3101 		vap->va_atime = vap->va_mtime = vap->va_ctime = now;
3102 		vap->va_nlink = 1;
3103 		vap->va_type = VLNK;
3104 		vap->va_size = 0;
3105 		return (0);
3106 	}
3107 
3108 	p = pr_p_lock(pnp);
3109 	mutex_exit(&pr_pidlock);
3110 	if (p == NULL)
3111 		return (ENOENT);
3112 	pcp = pnp->pr_common;
3113 
3114 	mutex_enter(&p->p_crlock);
3115 	vap->va_uid = crgetruid(p->p_cred);
3116 	vap->va_gid = crgetrgid(p->p_cred);
3117 	mutex_exit(&p->p_crlock);
3118 
3119 	vap->va_nlink = 1;
3120 	vap->va_nodeid = pnp->pr_ino? pnp->pr_ino :
3121 	    pmkino(pcp->prc_tslot, pcp->prc_slot, pnp->pr_type);
3122 	if ((pcp->prc_flags & PRC_LWP) && pcp->prc_tslot != -1) {
3123 		vap->va_atime.tv_sec = vap->va_mtime.tv_sec =
3124 		    vap->va_ctime.tv_sec =
3125 		    p->p_lwpdir[pcp->prc_tslot].ld_entry->le_start;
3126 		vap->va_atime.tv_nsec = vap->va_mtime.tv_nsec =
3127 		    vap->va_ctime.tv_nsec = 0;
3128 	} else {
3129 		user_t *up = PTOU(p);
3130 		vap->va_atime.tv_sec = vap->va_mtime.tv_sec =
3131 		    vap->va_ctime.tv_sec = up->u_start.tv_sec;
3132 		vap->va_atime.tv_nsec = vap->va_mtime.tv_nsec =
3133 		    vap->va_ctime.tv_nsec = up->u_start.tv_nsec;
3134 	}
3135 
3136 	switch (type) {
3137 	case PR_PIDDIR:
3138 		/* va_nlink: count 'lwp', 'object' and 'fd' directory links */
3139 		vap->va_nlink = 5;
3140 		vap->va_size = sizeof (piddir);
3141 		break;
3142 	case PR_OBJECTDIR:
3143 		if ((p->p_flag & SSYS) || (as = p->p_as) == &kas)
3144 			vap->va_size = 2 * PRSDSIZE;
3145 		else {
3146 			mutex_exit(&p->p_lock);
3147 			AS_LOCK_ENTER(as, RW_WRITER);
3148 			if (as->a_updatedir)
3149 				rebuild_objdir(as);
3150 			vap->va_size = (as->a_sizedir + 2) * PRSDSIZE;
3151 			AS_LOCK_EXIT(as);
3152 			mutex_enter(&p->p_lock);
3153 		}
3154 		vap->va_nlink = 2;
3155 		break;
3156 	case PR_PATHDIR:
3157 		if ((p->p_flag & SSYS) || (as = p->p_as) == &kas)
3158 			vap->va_size = (P_FINFO(p)->fi_nfiles + 4) * PRSDSIZE;
3159 		else {
3160 			mutex_exit(&p->p_lock);
3161 			AS_LOCK_ENTER(as, RW_WRITER);
3162 			if (as->a_updatedir)
3163 				rebuild_objdir(as);
3164 			vap->va_size = (as->a_sizedir + 4 +
3165 			    P_FINFO(p)->fi_nfiles) * PRSDSIZE;
3166 			AS_LOCK_EXIT(as);
3167 			mutex_enter(&p->p_lock);
3168 		}
3169 		vap->va_nlink = 2;
3170 		break;
3171 	case PR_PATH:
3172 	case PR_CURDIR:
3173 	case PR_ROOTDIR:
3174 	case PR_CT:
3175 		vap->va_type = VLNK;
3176 		vap->va_size = 0;
3177 		break;
3178 	case PR_FDDIR:
3179 	case PR_FDINFODIR:
3180 		vap->va_nlink = 2;
3181 		vap->va_size = (P_FINFO(p)->fi_nfiles + 2) * PRSDSIZE;
3182 		break;
3183 	case PR_FDINFO: {
3184 		file_t *fp;
3185 		vnode_t *vp;
3186 		int fd = pnp->pr_index;
3187 
3188 		fp = pr_getf(p, fd, NULL);
3189 		if (fp == NULL) {
3190 			prunlock(pnp);
3191 			return (ENOENT);
3192 		}
3193 		vp = fp->f_vnode;
3194 		VN_HOLD(vp);
3195 		pr_releasef(p, fd);
3196 		prunlock(pnp);
3197 		vap->va_size = prgetfdinfosize(p, vp, cr);
3198 		VN_RELE(vp);
3199 		vap->va_nblocks = (fsblkcnt64_t)btod(vap->va_size);
3200 		return (0);
3201 	}
3202 	case PR_LWPDIR:
3203 		/*
3204 		 * va_nlink: count each lwp as a directory link.
3205 		 * va_size: size of p_lwpdir + 2
3206 		 */
3207 		vap->va_nlink = p->p_lwpcnt + p->p_zombcnt + 2;
3208 		vap->va_size = (p->p_lwpdir_sz + 2) * PRSDSIZE;
3209 		break;
3210 	case PR_LWPIDDIR:
3211 		vap->va_nlink = 2;
3212 		vap->va_size = sizeof (lwpiddir);
3213 		break;
3214 	case PR_CTDIR:
3215 		vap->va_nlink = 2;
3216 		vap->va_size = (avl_numnodes(&p->p_ct_held) + 2) * PRSDSIZE;
3217 		break;
3218 	case PR_TMPLDIR:
3219 		vap->va_nlink = 2;
3220 		vap->va_size = (ct_ntypes + 2) * PRSDSIZE;
3221 		break;
3222 	case PR_AS:
3223 	case PR_PIDFILE:
3224 	case PR_LWPIDFILE:
3225 		if ((p->p_flag & SSYS) || (as = p->p_as) == &kas)
3226 			vap->va_size = 0;
3227 		else
3228 			vap->va_size = as->a_resvsize;
3229 		break;
3230 	case PR_STATUS:
3231 		vap->va_size = PR_OBJSIZE(pstatus32_t, pstatus_t);
3232 		break;
3233 	case PR_LSTATUS:
3234 		vap->va_size = PR_OBJSIZE(prheader32_t, prheader_t) +
3235 		    p->p_lwpcnt * PR_OBJSPAN(lwpstatus32_t, lwpstatus_t);
3236 		break;
3237 	case PR_PSINFO:
3238 		vap->va_size = PR_OBJSIZE(psinfo32_t, psinfo_t);
3239 		break;
3240 	case PR_LPSINFO:
3241 		vap->va_size = PR_OBJSIZE(prheader32_t, prheader_t) +
3242 		    (p->p_lwpcnt + p->p_zombcnt) *
3243 		    PR_OBJSPAN(lwpsinfo32_t, lwpsinfo_t);
3244 		break;
3245 	case PR_MAP:
3246 	case PR_RMAP:
3247 	case PR_XMAP:
3248 		if ((p->p_flag & SSYS) || (as = p->p_as) == &kas)
3249 			vap->va_size = 0;
3250 		else {
3251 			mutex_exit(&p->p_lock);
3252 			AS_LOCK_ENTER(as, RW_WRITER);
3253 			if (type == PR_MAP)
3254 				vap->va_mtime = as->a_updatetime;
3255 			if (type == PR_XMAP)
3256 				vap->va_size = prnsegs(as, 0) *
3257 				    PR_OBJSIZE(prxmap32_t, prxmap_t);
3258 			else
3259 				vap->va_size = prnsegs(as, type == PR_RMAP) *
3260 				    PR_OBJSIZE(prmap32_t, prmap_t);
3261 			AS_LOCK_EXIT(as);
3262 			mutex_enter(&p->p_lock);
3263 		}
3264 		break;
3265 	case PR_CRED:
3266 		mutex_enter(&p->p_crlock);
3267 		vap->va_size = sizeof (prcred_t);
3268 		ngroups = crgetngroups(p->p_cred);
3269 		if (ngroups > 1)
3270 			vap->va_size += (ngroups - 1) * sizeof (gid_t);
3271 		mutex_exit(&p->p_crlock);
3272 		break;
3273 	case PR_PRIV:
3274 		vap->va_size = prgetprivsize();
3275 		break;
3276 	case PR_SECFLAGS:
3277 		vap->va_size = sizeof (prsecflags_t);
3278 		break;
3279 	case PR_SIGACT:
3280 		nsig = PROC_IS_BRANDED(curproc)? BROP(curproc)->b_nsig : NSIG;
3281 		vap->va_size = (nsig-1) *
3282 		    PR_OBJSIZE(struct sigaction32, struct sigaction);
3283 		break;
3284 	case PR_AUXV:
3285 		vap->va_size = __KERN_NAUXV_IMPL * PR_OBJSIZE(auxv32_t, auxv_t);
3286 		break;
3287 #if defined(__x86)
3288 	case PR_LDT:
3289 		mutex_exit(&p->p_lock);
3290 		mutex_enter(&p->p_ldtlock);
3291 		vap->va_size = prnldt(p) * sizeof (struct ssd);
3292 		mutex_exit(&p->p_ldtlock);
3293 		mutex_enter(&p->p_lock);
3294 		break;
3295 #endif
3296 	case PR_USAGE:
3297 		vap->va_size = PR_OBJSIZE(prusage32_t, prusage_t);
3298 		break;
3299 	case PR_LUSAGE:
3300 		vap->va_size = PR_OBJSIZE(prheader32_t, prheader_t) +
3301 		    (p->p_lwpcnt + 1) * PR_OBJSPAN(prusage32_t, prusage_t);
3302 		break;
3303 	case PR_PAGEDATA:
3304 		if ((p->p_flag & SSYS) || (as = p->p_as) == &kas)
3305 			vap->va_size = 0;
3306 		else {
3307 			/*
3308 			 * We can drop p->p_lock before grabbing the
3309 			 * address space lock because p->p_as will not
3310 			 * change while the process is marked P_PR_LOCK.
3311 			 */
3312 			mutex_exit(&p->p_lock);
3313 			AS_LOCK_ENTER(as, RW_WRITER);
3314 #ifdef _LP64
3315 			vap->va_size = iam32bit?
3316 			    prpdsize32(as) : prpdsize(as);
3317 #else
3318 			vap->va_size = prpdsize(as);
3319 #endif
3320 			AS_LOCK_EXIT(as);
3321 			mutex_enter(&p->p_lock);
3322 		}
3323 		break;
3324 	case PR_OPAGEDATA:
3325 		if ((p->p_flag & SSYS) || (as = p->p_as) == &kas)
3326 			vap->va_size = 0;
3327 		else {
3328 			mutex_exit(&p->p_lock);
3329 			AS_LOCK_ENTER(as, RW_WRITER);
3330 #ifdef _LP64
3331 			vap->va_size = iam32bit?
3332 			    oprpdsize32(as) : oprpdsize(as);
3333 #else
3334 			vap->va_size = oprpdsize(as);
3335 #endif
3336 			AS_LOCK_EXIT(as);
3337 			mutex_enter(&p->p_lock);
3338 		}
3339 		break;
3340 	case PR_WATCH:
3341 		vap->va_size = avl_numnodes(&p->p_warea) *
3342 		    PR_OBJSIZE(prwatch32_t, prwatch_t);
3343 		break;
3344 	case PR_LWPSTATUS:
3345 		vap->va_size = PR_OBJSIZE(lwpstatus32_t, lwpstatus_t);
3346 		break;
3347 	case PR_LWPSINFO:
3348 		vap->va_size = PR_OBJSIZE(lwpsinfo32_t, lwpsinfo_t);
3349 		break;
3350 	case PR_LWPUSAGE:
3351 		vap->va_size = PR_OBJSIZE(prusage32_t, prusage_t);
3352 		break;
3353 	case PR_XREGS:
3354 		if (prhasx(p))
3355 			vap->va_size = prgetprxregsize(p);
3356 		else
3357 			vap->va_size = 0;
3358 		break;
3359 	case PR_SPYMASTER:
3360 		if (pnp->pr_common->prc_thread != NULL &&
3361 		    pnp->pr_common->prc_thread->t_lwp->lwp_spymaster != NULL) {
3362 			vap->va_size = PR_OBJSIZE(psinfo32_t, psinfo_t);
3363 		} else {
3364 			vap->va_size = 0;
3365 		}
3366 		break;
3367 #if defined(__sparc)
3368 	case PR_GWINDOWS:
3369 	{
3370 		kthread_t *t;
3371 		int n;
3372 
3373 		/*
3374 		 * If there is no lwp then just make the size zero.
3375 		 * This can happen if the lwp exits between the VOP_LOOKUP()
3376 		 * of the /proc/<pid>/lwp/<lwpid>/gwindows file and the
3377 		 * VOP_GETATTR() of the resulting vnode.
3378 		 */
3379 		if ((t = pcp->prc_thread) == NULL) {
3380 			vap->va_size = 0;
3381 			break;
3382 		}
3383 		/*
3384 		 * Drop p->p_lock while touching the stack.
3385 		 * The P_PR_LOCK flag prevents the lwp from
3386 		 * disappearing while we do this.
3387 		 */
3388 		mutex_exit(&p->p_lock);
3389 		if ((n = prnwindows(ttolwp(t))) == 0)
3390 			vap->va_size = 0;
3391 		else
3392 			vap->va_size = PR_OBJSIZE(gwindows32_t, gwindows_t) -
3393 			    (SPARC_MAXREGWINDOW - n) *
3394 			    PR_OBJSIZE(struct rwindow32, struct rwindow);
3395 		mutex_enter(&p->p_lock);
3396 		break;
3397 	}
3398 	case PR_ASRS:
3399 #ifdef _LP64
3400 		if (p->p_model == DATAMODEL_LP64)
3401 			vap->va_size = sizeof (asrset_t);
3402 		else
3403 #endif
3404 			vap->va_size = 0;
3405 		break;
3406 #endif
3407 	case PR_CTL:
3408 	case PR_LWPCTL:
3409 	default:
3410 		vap->va_size = 0;
3411 		break;
3412 	}
3413 
3414 	prunlock(pnp);
3415 	vap->va_nblocks = (fsblkcnt64_t)btod(vap->va_size);
3416 	return (0);
3417 }
3418 
3419 static int
3420 praccess(vnode_t *vp, int mode, int flags, cred_t *cr, caller_context_t *ct)
3421 {
3422 	prnode_t *pnp = VTOP(vp);
3423 	prnodetype_t type = pnp->pr_type;
3424 	int vmode;
3425 	vtype_t vtype;
3426 	proc_t *p;
3427 	int error = 0;
3428 	vnode_t *rvp;
3429 	vnode_t *xvp;
3430 
3431 	if ((mode & VWRITE) && vn_is_readonly(vp))
3432 		return (EROFS);
3433 
3434 	switch (type) {
3435 	case PR_PROCDIR:
3436 		break;
3437 
3438 	case PR_OBJECT:
3439 	case PR_FD:
3440 		/*
3441 		 * Disallow write access to the underlying objects.
3442 		 * Disallow access to underlying non-regular-file fds.
3443 		 * Disallow access to fds with other than existing open modes.
3444 		 */
3445 		rvp = pnp->pr_realvp;
3446 		vtype = rvp->v_type;
3447 		vmode = pnp->pr_mode;
3448 		if ((type == PR_OBJECT && (mode & VWRITE)) ||
3449 		    (type == PR_FD && vtype != VREG && vtype != VDIR) ||
3450 		    (type == PR_FD && (vmode & mode) != mode &&
3451 		    secpolicy_proc_access(cr) != 0))
3452 			return (EACCES);
3453 		return (VOP_ACCESS(rvp, mode, flags, cr, ct));
3454 
3455 	case PR_PSINFO:		/* these files can be read by anyone */
3456 	case PR_LPSINFO:
3457 	case PR_LWPSINFO:
3458 	case PR_LWPDIR:
3459 	case PR_LWPIDDIR:
3460 	case PR_USAGE:
3461 	case PR_LUSAGE:
3462 	case PR_LWPUSAGE:
3463 		p = pr_p_lock(pnp);
3464 		mutex_exit(&pr_pidlock);
3465 		if (p == NULL)
3466 			return (ENOENT);
3467 		prunlock(pnp);
3468 		break;
3469 
3470 	default:
3471 		/*
3472 		 * Except for the world-readable files above,
3473 		 * only /proc/pid exists if the process is a zombie.
3474 		 */
3475 		if ((error = prlock(pnp,
3476 		    (type == PR_PIDDIR)? ZYES : ZNO)) != 0)
3477 			return (error);
3478 		p = pnp->pr_common->prc_proc;
3479 		if (p != curproc)
3480 			error = priv_proc_cred_perm(cr, p, NULL, mode);
3481 
3482 		if (error != 0 || p == curproc || (p->p_flag & SSYS) ||
3483 		    p->p_as == &kas || (xvp = p->p_exec) == NULL) {
3484 			prunlock(pnp);
3485 		} else {
3486 			/*
3487 			 * Determine if the process's executable is readable.
3488 			 * We have to drop p->p_lock before the secpolicy
3489 			 * and VOP operation.
3490 			 */
3491 			VN_HOLD(xvp);
3492 			prunlock(pnp);
3493 			if (secpolicy_proc_access(cr) != 0)
3494 				error = VOP_ACCESS(xvp, VREAD, 0, cr, ct);
3495 			VN_RELE(xvp);
3496 		}
3497 		if (error)
3498 			return (error);
3499 		break;
3500 	}
3501 
3502 	if (type == PR_CURDIR || type == PR_ROOTDIR) {
3503 		/*
3504 		 * Final access check on the underlying directory vnode.
3505 		 */
3506 		return (VOP_ACCESS(pnp->pr_realvp, mode, flags, cr, ct));
3507 	}
3508 
3509 	/*
3510 	 * Visceral revulsion:  For compatibility with old /proc,
3511 	 * allow the /proc/<pid> directory to be opened for writing.
3512 	 */
3513 	vmode = pnp->pr_mode;
3514 	if (type == PR_PIDDIR)
3515 		vmode |= VWRITE;
3516 	if ((vmode & mode) != mode)
3517 		error = secpolicy_proc_access(cr);
3518 	return (error);
3519 }
3520 
3521 /*
3522  * Array of lookup functions, indexed by /proc file type.
3523  */
3524 static vnode_t *pr_lookup_notdir(), *pr_lookup_procdir(), *pr_lookup_piddir(),
3525 	*pr_lookup_objectdir(), *pr_lookup_lwpdir(), *pr_lookup_lwpiddir(),
3526 	*pr_lookup_fddir(), *pr_lookup_fdinfodir(), *pr_lookup_pathdir(),
3527 	*pr_lookup_tmpldir(), *pr_lookup_ctdir();
3528 
3529 static vnode_t *(*pr_lookup_function[PR_NFILES])() = {
3530 	pr_lookup_procdir,	/* /proc				*/
3531 	pr_lookup_notdir,	/* /proc/self				*/
3532 	pr_lookup_piddir,	/* /proc/<pid>				*/
3533 	pr_lookup_notdir,	/* /proc/<pid>/as			*/
3534 	pr_lookup_notdir,	/* /proc/<pid>/ctl			*/
3535 	pr_lookup_notdir,	/* /proc/<pid>/status			*/
3536 	pr_lookup_notdir,	/* /proc/<pid>/lstatus			*/
3537 	pr_lookup_notdir,	/* /proc/<pid>/psinfo			*/
3538 	pr_lookup_notdir,	/* /proc/<pid>/lpsinfo			*/
3539 	pr_lookup_notdir,	/* /proc/<pid>/map			*/
3540 	pr_lookup_notdir,	/* /proc/<pid>/rmap			*/
3541 	pr_lookup_notdir,	/* /proc/<pid>/xmap			*/
3542 	pr_lookup_notdir,	/* /proc/<pid>/cred			*/
3543 	pr_lookup_notdir,	/* /proc/<pid>/sigact			*/
3544 	pr_lookup_notdir,	/* /proc/<pid>/auxv			*/
3545 #if defined(__x86)
3546 	pr_lookup_notdir,	/* /proc/<pid>/ldt			*/
3547 #endif
3548 	pr_lookup_notdir,	/* /proc/<pid>/usage			*/
3549 	pr_lookup_notdir,	/* /proc/<pid>/lusage			*/
3550 	pr_lookup_notdir,	/* /proc/<pid>/pagedata			*/
3551 	pr_lookup_notdir,	/* /proc/<pid>/watch			*/
3552 	pr_lookup_notdir,	/* /proc/<pid>/cwd			*/
3553 	pr_lookup_notdir,	/* /proc/<pid>/root			*/
3554 	pr_lookup_fddir,	/* /proc/<pid>/fd			*/
3555 	pr_lookup_notdir,	/* /proc/<pid>/fd/nn			*/
3556 	pr_lookup_fdinfodir,	/* /proc/<pid>/fdinfo			*/
3557 	pr_lookup_notdir,	/* /proc/<pid>/fdinfo/nn		*/
3558 	pr_lookup_objectdir,	/* /proc/<pid>/object			*/
3559 	pr_lookup_notdir,	/* /proc/<pid>/object/xxx		*/
3560 	pr_lookup_lwpdir,	/* /proc/<pid>/lwp			*/
3561 	pr_lookup_lwpiddir,	/* /proc/<pid>/lwp/<lwpid>		*/
3562 	pr_lookup_notdir,	/* /proc/<pid>/lwp/<lwpid>/lwpctl	*/
3563 	pr_lookup_notdir,	/* /proc/<pid>/lwp/<lwpid>/lwpname	*/
3564 	pr_lookup_notdir,	/* /proc/<pid>/lwp/<lwpid>/lwpstatus	*/
3565 	pr_lookup_notdir,	/* /proc/<pid>/lwp/<lwpid>/lwpsinfo	*/
3566 	pr_lookup_notdir,	/* /proc/<pid>/lwp/<lwpid>/lwpusage	*/
3567 	pr_lookup_notdir,	/* /proc/<pid>/lwp/<lwpid>/xregs	*/
3568 	pr_lookup_tmpldir,	/* /proc/<pid>/lwp/<lwpid>/templates	*/
3569 	pr_lookup_notdir,	/* /proc/<pid>/lwp/<lwpid>/templates/<id> */
3570 	pr_lookup_notdir,	/* /proc/<pid>/lwp/<lwpid>/spymaster	*/
3571 #if defined(__sparc)
3572 	pr_lookup_notdir,	/* /proc/<pid>/lwp/<lwpid>/gwindows	*/
3573 	pr_lookup_notdir,	/* /proc/<pid>/lwp/<lwpid>/asrs		*/
3574 #endif
3575 	pr_lookup_notdir,	/* /proc/<pid>/priv			*/
3576 	pr_lookup_pathdir,	/* /proc/<pid>/path			*/
3577 	pr_lookup_notdir,	/* /proc/<pid>/path/xxx			*/
3578 	pr_lookup_ctdir,	/* /proc/<pid>/contracts		*/
3579 	pr_lookup_notdir,	/* /proc/<pid>/contracts/<ctid>		*/
3580 	pr_lookup_notdir,	/* /proc/<pid>/secflags			*/
3581 	pr_lookup_notdir,	/* old process file			*/
3582 	pr_lookup_notdir,	/* old lwp file				*/
3583 	pr_lookup_notdir,	/* old pagedata file			*/
3584 };
3585 
3586 static int
3587 prlookup(vnode_t *dp, char *comp, vnode_t **vpp, pathname_t *pathp,
3588     int flags, vnode_t *rdir, cred_t *cr, caller_context_t *ct,
3589     int *direntflags, pathname_t *realpnp)
3590 {
3591 	prnode_t *pnp = VTOP(dp);
3592 	prnodetype_t type = pnp->pr_type;
3593 	int error;
3594 
3595 	ASSERT(dp->v_type == VDIR);
3596 	ASSERT(type < PR_NFILES);
3597 
3598 	if (type != PR_PROCDIR && strcmp(comp, "..") == 0) {
3599 		VN_HOLD(pnp->pr_parent);
3600 		*vpp = pnp->pr_parent;
3601 		return (0);
3602 	}
3603 
3604 	if (*comp == '\0' ||
3605 	    strcmp(comp, ".") == 0 || strcmp(comp, "..") == 0) {
3606 		VN_HOLD(dp);
3607 		*vpp = dp;
3608 		return (0);
3609 	}
3610 
3611 	switch (type) {
3612 	case PR_CURDIR:
3613 	case PR_ROOTDIR:
3614 		/* restrict lookup permission to owner or root */
3615 		if ((error = praccess(dp, VEXEC, 0, cr, ct)) != 0)
3616 			return (error);
3617 		/* FALLTHROUGH */
3618 	case PR_FD:
3619 		/*
3620 		 * Performing a VOP_LOOKUP on the underlying vnode and emitting
3621 		 * the resulting vnode, without encapsulation, as our own is a
3622 		 * very special case when it comes to the assumptions built
3623 		 * into VFS.
3624 		 *
3625 		 * Since the resulting vnode is highly likely to be at some
3626 		 * abitrary position in another filesystem, we insist that the
3627 		 * VTRAVERSE flag is set on the parent.  This prevents things
3628 		 * such as the v_path freshness logic from mistaking the
3629 		 * resulting vnode as a "real" child of the parent, rather than
3630 		 * a consequence of this "procfs wormhole".
3631 		 *
3632 		 * Failure to establish such protections can lead to
3633 		 * incorrectly calculated v_paths being set on nodes reached
3634 		 * through these lookups.
3635 		 */
3636 		ASSERT((dp->v_flag & VTRAVERSE) != 0);
3637 
3638 		dp = pnp->pr_realvp;
3639 		return (VOP_LOOKUP(dp, comp, vpp, pathp, flags, rdir, cr, ct,
3640 		    direntflags, realpnp));
3641 	default:
3642 		break;
3643 	}
3644 
3645 	if ((type == PR_OBJECTDIR || type == PR_FDDIR ||
3646 	    type == PR_FDINFODIR || type == PR_PATHDIR) &&
3647 	    (error = praccess(dp, VEXEC, 0, cr, ct)) != 0)
3648 		return (error);
3649 
3650 	/* XXX - Do we need to pass ct, direntflags, or realpnp? */
3651 	*vpp = (pr_lookup_function[type](dp, comp));
3652 
3653 	return ((*vpp == NULL) ? ENOENT : 0);
3654 }
3655 
3656 /* ARGSUSED */
3657 static int
3658 prcreate(vnode_t *dp, char *comp, vattr_t *vap, vcexcl_t excl,
3659     int mode, vnode_t **vpp, cred_t *cr, int flag, caller_context_t *ct,
3660     vsecattr_t *vsecp)
3661 {
3662 	int error;
3663 
3664 	if ((error = prlookup(dp, comp, vpp, NULL, 0, NULL, cr,
3665 	    ct, NULL, NULL)) != 0) {
3666 		if (error == ENOENT) {
3667 			/* One can't O_CREAT nonexistent files in /proc. */
3668 			error = EACCES;
3669 		}
3670 		return (error);
3671 	}
3672 
3673 	if (excl == EXCL) {
3674 		/* Disallow the O_EXCL case */
3675 		error = EEXIST;
3676 	} else if ((error = praccess(*vpp, mode, 0, cr, ct)) == 0) {
3677 		/* Before proceeding, handle O_TRUNC if necessary. */
3678 		if (vap->va_mask & AT_SIZE) {
3679 			vnode_t *vp = *vpp;
3680 
3681 			if (vp->v_type == VDIR) {
3682 				/* Only allow O_TRUNC on files */
3683 				error = EISDIR;
3684 			} else if (vp->v_type != VPROC ||
3685 			    VTOP(vp)->pr_type != PR_FD) {
3686 				/*
3687 				 * Disallow for files outside of the
3688 				 * /proc/<pid>/fd/<n> entries
3689 				 */
3690 				error = EACCES;
3691 			} else {
3692 				uint_t mask;
3693 
3694 				vp = VTOP(vp)->pr_realvp;
3695 				mask = vap->va_mask;
3696 				vap->va_mask = AT_SIZE;
3697 				error = VOP_SETATTR(vp, vap, 0, cr, ct);
3698 				vap->va_mask = mask;
3699 			}
3700 		}
3701 	}
3702 
3703 	if (error) {
3704 		VN_RELE(*vpp);
3705 		*vpp = NULL;
3706 	}
3707 	return (error);
3708 }
3709 
3710 /* ARGSUSED */
3711 static vnode_t *
3712 pr_lookup_notdir(vnode_t *dp, char *comp)
3713 {
3714 	return (NULL);
3715 }
3716 
3717 /*
3718  * Find or construct a process vnode for the given pid.
3719  */
3720 static vnode_t *
3721 pr_lookup_procdir(vnode_t *dp, char *comp)
3722 {
3723 	pid_t pid;
3724 	prnode_t *pnp;
3725 	prcommon_t *pcp;
3726 	vnode_t *vp;
3727 	proc_t *p;
3728 	int c;
3729 
3730 	ASSERT(VTOP(dp)->pr_type == PR_PROCDIR);
3731 
3732 	if (strcmp(comp, "self") == 0) {
3733 		pnp = prgetnode(dp, PR_SELF);
3734 		return (PTOV(pnp));
3735 	} else {
3736 		pid = 0;
3737 		while ((c = *comp++) != '\0') {
3738 			if (c < '0' || c > '9')
3739 				return (NULL);
3740 			pid = 10*pid + c - '0';
3741 			if (pid > maxpid)
3742 				return (NULL);
3743 		}
3744 	}
3745 
3746 	pnp = prgetnode(dp, PR_PIDDIR);
3747 
3748 	mutex_enter(&pidlock);
3749 	if ((p = prfind(pid)) == NULL || p->p_stat == SIDL) {
3750 		mutex_exit(&pidlock);
3751 		prfreenode(pnp);
3752 		return (NULL);
3753 	}
3754 	ASSERT(p->p_stat != 0);
3755 
3756 	/* NOTE: we're holding pidlock across the policy call. */
3757 	if (secpolicy_basic_procinfo(CRED(), p, curproc) != 0) {
3758 		mutex_exit(&pidlock);
3759 		prfreenode(pnp);
3760 		return (NULL);
3761 	}
3762 
3763 	mutex_enter(&p->p_lock);
3764 	mutex_exit(&pidlock);
3765 
3766 	/*
3767 	 * If a process vnode already exists and it is not invalid
3768 	 * and it was created by the current process and it belongs
3769 	 * to the same /proc mount point as our parent vnode, then
3770 	 * just use it and discard the newly-allocated prnode.
3771 	 */
3772 	for (vp = p->p_trace; vp != NULL; vp = VTOP(vp)->pr_next) {
3773 		if (!(VTOP(VTOP(vp)->pr_pidfile)->pr_flags & PR_INVAL) &&
3774 		    VTOP(vp)->pr_owner == curproc &&
3775 		    vp->v_vfsp == dp->v_vfsp) {
3776 			ASSERT(!(VTOP(vp)->pr_flags & PR_INVAL));
3777 			VN_HOLD(vp);
3778 			prfreenode(pnp);
3779 			mutex_exit(&p->p_lock);
3780 			return (vp);
3781 		}
3782 	}
3783 	pnp->pr_owner = curproc;
3784 
3785 	/*
3786 	 * prgetnode() initialized most of the prnode.
3787 	 * Finish the job.
3788 	 */
3789 	pcp = pnp->pr_common;	/* the newly-allocated prcommon struct */
3790 	if ((vp = p->p_trace) != NULL) {
3791 		/* discard the new prcommon and use the existing prcommon */
3792 		prfreecommon(pcp);
3793 		pcp = VTOP(vp)->pr_common;
3794 		mutex_enter(&pcp->prc_mutex);
3795 		ASSERT(pcp->prc_refcnt > 0);
3796 		pcp->prc_refcnt++;
3797 		mutex_exit(&pcp->prc_mutex);
3798 		pnp->pr_common = pcp;
3799 	} else {
3800 		/* initialize the new prcommon struct */
3801 		if ((p->p_flag & SSYS) || p->p_as == &kas)
3802 			pcp->prc_flags |= PRC_SYS;
3803 		if (p->p_stat == SZOMB || (p->p_flag & SEXITING) != 0)
3804 			pcp->prc_flags |= PRC_DESTROY;
3805 		pcp->prc_proc = p;
3806 		pcp->prc_datamodel = p->p_model;
3807 		pcp->prc_pid = p->p_pid;
3808 		pcp->prc_slot = p->p_slot;
3809 	}
3810 	pnp->pr_pcommon = pcp;
3811 	pnp->pr_parent = dp;
3812 	VN_HOLD(dp);
3813 	/*
3814 	 * Link in the old, invalid directory vnode so we
3815 	 * can later determine the last close of the file.
3816 	 */
3817 	pnp->pr_next = p->p_trace;
3818 	p->p_trace = dp = PTOV(pnp);
3819 
3820 	/*
3821 	 * Kludge for old /proc: initialize the PR_PIDFILE as well.
3822 	 */
3823 	vp = pnp->pr_pidfile;
3824 	pnp = VTOP(vp);
3825 	pnp->pr_ino = ptoi(pcp->prc_pid);
3826 	pnp->pr_common = pcp;
3827 	pnp->pr_pcommon = pcp;
3828 	pnp->pr_parent = dp;
3829 	pnp->pr_next = p->p_plist;
3830 	p->p_plist = vp;
3831 
3832 	mutex_exit(&p->p_lock);
3833 	return (dp);
3834 }
3835 
3836 static vnode_t *
3837 pr_lookup_piddir(vnode_t *dp, char *comp)
3838 {
3839 	prnode_t *dpnp = VTOP(dp);
3840 	vnode_t *vp;
3841 	prnode_t *pnp;
3842 	proc_t *p;
3843 	user_t *up;
3844 	prdirent_t *dirp;
3845 	int i;
3846 	enum prnodetype type;
3847 
3848 	ASSERT(dpnp->pr_type == PR_PIDDIR);
3849 
3850 	for (i = 0; i < NPIDDIRFILES; i++) {
3851 		/* Skip "." and ".." */
3852 		dirp = &piddir[i+2];
3853 		if (strcmp(comp, dirp->d_name) == 0)
3854 			break;
3855 	}
3856 
3857 	if (i >= NPIDDIRFILES)
3858 		return (NULL);
3859 
3860 	type = (int)dirp->d_ino;
3861 	pnp = prgetnode(dp, type);
3862 
3863 	p = pr_p_lock(dpnp);
3864 	mutex_exit(&pr_pidlock);
3865 	if (p == NULL) {
3866 		prfreenode(pnp);
3867 		return (NULL);
3868 	}
3869 	if (dpnp->pr_pcommon->prc_flags & PRC_DESTROY) {
3870 		switch (type) {
3871 		case PR_PSINFO:
3872 		case PR_USAGE:
3873 			break;
3874 		default:
3875 			prunlock(dpnp);
3876 			prfreenode(pnp);
3877 			return (NULL);
3878 		}
3879 	}
3880 
3881 	switch (type) {
3882 	case PR_CURDIR:
3883 	case PR_ROOTDIR:
3884 		up = PTOU(p);
3885 		vp = (type == PR_CURDIR)? up->u_cdir :
3886 		    (up->u_rdir? up->u_rdir : rootdir);
3887 
3888 		if (vp == NULL) {
3889 			/* can't happen(?) */
3890 			prunlock(dpnp);
3891 			prfreenode(pnp);
3892 			return (NULL);
3893 		}
3894 		/*
3895 		 * Fill in the prnode so future references will
3896 		 * be able to find the underlying object's vnode.
3897 		 */
3898 		VN_HOLD(vp);
3899 		pnp->pr_realvp = vp;
3900 		PTOV(pnp)->v_flag |= VTRAVERSE;
3901 		break;
3902 	default:
3903 		break;
3904 	}
3905 
3906 	mutex_enter(&dpnp->pr_mutex);
3907 
3908 	if ((vp = dpnp->pr_files[i]) != NULL &&
3909 	    !(VTOP(vp)->pr_flags & PR_INVAL)) {
3910 		VN_HOLD(vp);
3911 		mutex_exit(&dpnp->pr_mutex);
3912 		prunlock(dpnp);
3913 		prfreenode(pnp);
3914 		return (vp);
3915 	}
3916 
3917 	/*
3918 	 * prgetnode() initialized most of the prnode.
3919 	 * Finish the job.
3920 	 */
3921 	pnp->pr_common = dpnp->pr_common;
3922 	pnp->pr_pcommon = dpnp->pr_pcommon;
3923 	pnp->pr_parent = dp;
3924 	VN_HOLD(dp);
3925 	pnp->pr_index = i;
3926 
3927 	dpnp->pr_files[i] = vp = PTOV(pnp);
3928 
3929 	/*
3930 	 * Link new vnode into list of all /proc vnodes for the process.
3931 	 */
3932 	if (vp->v_type == VPROC) {
3933 		pnp->pr_next = p->p_plist;
3934 		p->p_plist = vp;
3935 	}
3936 	mutex_exit(&dpnp->pr_mutex);
3937 	prunlock(dpnp);
3938 	return (vp);
3939 }
3940 
3941 static vnode_t *
3942 pr_lookup_objectdir(vnode_t *dp, char *comp)
3943 {
3944 	prnode_t *dpnp = VTOP(dp);
3945 	prnode_t *pnp;
3946 	proc_t *p;
3947 	struct seg *seg;
3948 	struct as *as;
3949 	vnode_t *vp;
3950 	vattr_t vattr;
3951 
3952 	ASSERT(dpnp->pr_type == PR_OBJECTDIR);
3953 
3954 	pnp = prgetnode(dp, PR_OBJECT);
3955 
3956 	if (prlock(dpnp, ZNO) != 0) {
3957 		prfreenode(pnp);
3958 		return (NULL);
3959 	}
3960 	p = dpnp->pr_common->prc_proc;
3961 	if ((p->p_flag & SSYS) || (as = p->p_as) == &kas) {
3962 		prunlock(dpnp);
3963 		prfreenode(pnp);
3964 		return (NULL);
3965 	}
3966 
3967 	/*
3968 	 * We drop p_lock before grabbing the address space lock
3969 	 * in order to avoid a deadlock with the clock thread.
3970 	 * The process will not disappear and its address space
3971 	 * will not change because it is marked P_PR_LOCK.
3972 	 */
3973 	mutex_exit(&p->p_lock);
3974 	AS_LOCK_ENTER(as, RW_READER);
3975 	if ((seg = AS_SEGFIRST(as)) == NULL) {
3976 		vp = NULL;
3977 		goto out;
3978 	}
3979 	if (strcmp(comp, "a.out") == 0) {
3980 		vp = p->p_exec;
3981 		goto out;
3982 	}
3983 	do {
3984 		/*
3985 		 * Manufacture a filename for the "object" directory.
3986 		 */
3987 		vattr.va_mask = AT_FSID|AT_NODEID;
3988 		if (seg->s_ops == &segvn_ops &&
3989 		    SEGOP_GETVP(seg, seg->s_base, &vp) == 0 &&
3990 		    vp != NULL && vp->v_type == VREG &&
3991 		    VOP_GETATTR(vp, &vattr, 0, CRED(), NULL) == 0) {
3992 			char name[64];
3993 
3994 			if (vp == p->p_exec)	/* "a.out" */
3995 				continue;
3996 			pr_object_name(name, vp, &vattr);
3997 			if (strcmp(name, comp) == 0)
3998 				goto out;
3999 		}
4000 	} while ((seg = AS_SEGNEXT(as, seg)) != NULL);
4001 
4002 	vp = NULL;
4003 out:
4004 	if (vp != NULL) {
4005 		VN_HOLD(vp);
4006 	}
4007 	AS_LOCK_EXIT(as);
4008 	mutex_enter(&p->p_lock);
4009 	prunlock(dpnp);
4010 
4011 	if (vp == NULL)
4012 		prfreenode(pnp);
4013 	else {
4014 		/*
4015 		 * Fill in the prnode so future references will
4016 		 * be able to find the underlying object's vnode.
4017 		 * Don't link this prnode into the list of all
4018 		 * prnodes for the process; this is a one-use node.
4019 		 * Its use is entirely to catch and fail opens for writing.
4020 		 */
4021 		pnp->pr_realvp = vp;
4022 		vp = PTOV(pnp);
4023 	}
4024 
4025 	return (vp);
4026 }
4027 
4028 /*
4029  * Find or construct an lwp vnode for the given lwpid.
4030  */
4031 static vnode_t *
4032 pr_lookup_lwpdir(vnode_t *dp, char *comp)
4033 {
4034 	id_t tid;	/* same type as t->t_tid */
4035 	int want_agent;
4036 	prnode_t *dpnp = VTOP(dp);
4037 	prnode_t *pnp;
4038 	prcommon_t *pcp;
4039 	vnode_t *vp;
4040 	proc_t *p;
4041 	kthread_t *t;
4042 	lwpdir_t *ldp;
4043 	lwpent_t *lep;
4044 	int tslot;
4045 	int c;
4046 
4047 	ASSERT(dpnp->pr_type == PR_LWPDIR);
4048 
4049 	tid = 0;
4050 	if (strcmp(comp, "agent") == 0)
4051 		want_agent = 1;
4052 	else {
4053 		want_agent = 0;
4054 		while ((c = *comp++) != '\0') {
4055 			id_t otid;
4056 
4057 			if (c < '0' || c > '9')
4058 				return (NULL);
4059 			otid = tid;
4060 			tid = 10*tid + c - '0';
4061 			if (tid/10 != otid)	/* integer overflow */
4062 				return (NULL);
4063 		}
4064 	}
4065 
4066 	pnp = prgetnode(dp, PR_LWPIDDIR);
4067 
4068 	p = pr_p_lock(dpnp);
4069 	mutex_exit(&pr_pidlock);
4070 	if (p == NULL) {
4071 		prfreenode(pnp);
4072 		return (NULL);
4073 	}
4074 
4075 	if (want_agent) {
4076 		if ((t = p->p_agenttp) == NULL)
4077 			lep = NULL;
4078 		else {
4079 			tid = t->t_tid;
4080 			tslot = t->t_dslot;
4081 			lep = p->p_lwpdir[tslot].ld_entry;
4082 		}
4083 	} else {
4084 		if ((ldp = lwp_hash_lookup(p, tid)) == NULL)
4085 			lep = NULL;
4086 		else {
4087 			tslot = (int)(ldp - p->p_lwpdir);
4088 			lep = ldp->ld_entry;
4089 		}
4090 	}
4091 
4092 	if (lep == NULL) {
4093 		prunlock(dpnp);
4094 		prfreenode(pnp);
4095 		return (NULL);
4096 	}
4097 
4098 	/*
4099 	 * If an lwp vnode already exists and it is not invalid
4100 	 * and it was created by the current process and it belongs
4101 	 * to the same /proc mount point as our parent vnode, then
4102 	 * just use it and discard the newly-allocated prnode.
4103 	 */
4104 	for (vp = lep->le_trace; vp != NULL; vp = VTOP(vp)->pr_next) {
4105 		if (!(VTOP(vp)->pr_flags & PR_INVAL) &&
4106 		    VTOP(vp)->pr_owner == curproc &&
4107 		    vp->v_vfsp == dp->v_vfsp) {
4108 			VN_HOLD(vp);
4109 			prunlock(dpnp);
4110 			prfreenode(pnp);
4111 			return (vp);
4112 		}
4113 	}
4114 	pnp->pr_owner = curproc;
4115 
4116 	/*
4117 	 * prgetnode() initialized most of the prnode.
4118 	 * Finish the job.
4119 	 */
4120 	pcp = pnp->pr_common;	/* the newly-allocated prcommon struct */
4121 	if ((vp = lep->le_trace) != NULL) {
4122 		/* discard the new prcommon and use the existing prcommon */
4123 		prfreecommon(pcp);
4124 		pcp = VTOP(vp)->pr_common;
4125 		mutex_enter(&pcp->prc_mutex);
4126 		ASSERT(pcp->prc_refcnt > 0);
4127 		pcp->prc_refcnt++;
4128 		mutex_exit(&pcp->prc_mutex);
4129 		pnp->pr_common = pcp;
4130 	} else {
4131 		/* initialize the new prcommon struct */
4132 		pcp->prc_flags |= PRC_LWP;
4133 		if ((p->p_flag & SSYS) || p->p_as == &kas)
4134 			pcp->prc_flags |= PRC_SYS;
4135 		if ((t = lep->le_thread) == NULL)
4136 			pcp->prc_flags |= PRC_DESTROY;
4137 		pcp->prc_proc = p;
4138 		pcp->prc_datamodel = dpnp->pr_pcommon->prc_datamodel;
4139 		pcp->prc_pid = p->p_pid;
4140 		pcp->prc_slot = p->p_slot;
4141 		pcp->prc_thread = t;
4142 		pcp->prc_tid = tid;
4143 		pcp->prc_tslot = tslot;
4144 	}
4145 	pnp->pr_pcommon = dpnp->pr_pcommon;
4146 	pnp->pr_parent = dp;
4147 	VN_HOLD(dp);
4148 	/*
4149 	 * Link in the old, invalid directory vnode so we
4150 	 * can later determine the last close of the file.
4151 	 */
4152 	pnp->pr_next = lep->le_trace;
4153 	lep->le_trace = vp = PTOV(pnp);
4154 	prunlock(dpnp);
4155 	return (vp);
4156 }
4157 
4158 static vnode_t *
4159 pr_lookup_lwpiddir(vnode_t *dp, char *comp)
4160 {
4161 	prnode_t *dpnp = VTOP(dp);
4162 	vnode_t *vp;
4163 	prnode_t *pnp;
4164 	proc_t *p;
4165 	prdirent_t *dirp;
4166 	int i;
4167 	enum prnodetype type;
4168 
4169 	ASSERT(dpnp->pr_type == PR_LWPIDDIR);
4170 
4171 	for (i = 0; i < NLWPIDDIRFILES; i++) {
4172 		/* Skip "." and ".." */
4173 		dirp = &lwpiddir[i+2];
4174 		if (strcmp(comp, dirp->d_name) == 0)
4175 			break;
4176 	}
4177 
4178 	if (i >= NLWPIDDIRFILES)
4179 		return (NULL);
4180 
4181 	type = (int)dirp->d_ino;
4182 	pnp = prgetnode(dp, type);
4183 
4184 	p = pr_p_lock(dpnp);
4185 	mutex_exit(&pr_pidlock);
4186 	if (p == NULL) {
4187 		prfreenode(pnp);
4188 		return (NULL);
4189 	}
4190 	if (dpnp->pr_common->prc_flags & PRC_DESTROY) {
4191 		/*
4192 		 * Only the lwpsinfo file is present for zombie lwps.
4193 		 * Nothing is present if the lwp has been reaped.
4194 		 */
4195 		if (dpnp->pr_common->prc_tslot == -1 ||
4196 		    type != PR_LWPSINFO) {
4197 			prunlock(dpnp);
4198 			prfreenode(pnp);
4199 			return (NULL);
4200 		}
4201 	}
4202 
4203 #if defined(__sparc)
4204 	/* the asrs file exists only for sparc v9 _LP64 processes */
4205 	if (type == PR_ASRS && p->p_model != DATAMODEL_LP64) {
4206 		prunlock(dpnp);
4207 		prfreenode(pnp);
4208 		return (NULL);
4209 	}
4210 #endif
4211 
4212 	mutex_enter(&dpnp->pr_mutex);
4213 
4214 	if ((vp = dpnp->pr_files[i]) != NULL &&
4215 	    !(VTOP(vp)->pr_flags & PR_INVAL)) {
4216 		VN_HOLD(vp);
4217 		mutex_exit(&dpnp->pr_mutex);
4218 		prunlock(dpnp);
4219 		prfreenode(pnp);
4220 		return (vp);
4221 	}
4222 
4223 	/*
4224 	 * prgetnode() initialized most of the prnode.
4225 	 * Finish the job.
4226 	 */
4227 	pnp->pr_common = dpnp->pr_common;
4228 	pnp->pr_pcommon = dpnp->pr_pcommon;
4229 	pnp->pr_parent = dp;
4230 	VN_HOLD(dp);
4231 	pnp->pr_index = i;
4232 
4233 	dpnp->pr_files[i] = vp = PTOV(pnp);
4234 
4235 	/*
4236 	 * Link new vnode into list of all /proc vnodes for the process.
4237 	 */
4238 	if (vp->v_type == VPROC) {
4239 		pnp->pr_next = p->p_plist;
4240 		p->p_plist = vp;
4241 	}
4242 	mutex_exit(&dpnp->pr_mutex);
4243 	prunlock(dpnp);
4244 	return (vp);
4245 }
4246 
4247 /*
4248  * Lookup one of the process's open files.
4249  */
4250 static vnode_t *
4251 pr_lookup_fddir(vnode_t *dp, char *comp)
4252 {
4253 	prnode_t *dpnp = VTOP(dp);
4254 	prnode_t *pnp;
4255 	vnode_t *vp = NULL;
4256 	proc_t *p;
4257 	file_t *fp;
4258 	uint_t fd;
4259 	int c;
4260 
4261 	ASSERT(dpnp->pr_type == PR_FDDIR);
4262 
4263 	fd = 0;
4264 	while ((c = *comp++) != '\0') {
4265 		int ofd;
4266 		if (c < '0' || c > '9')
4267 			return (NULL);
4268 		ofd = fd;
4269 		fd = 10 * fd + c - '0';
4270 		if (fd / 10 != ofd)	/* integer overflow */
4271 			return (NULL);
4272 	}
4273 
4274 	pnp = prgetnode(dp, PR_FD);
4275 
4276 	if (prlock(dpnp, ZNO) != 0) {
4277 		prfreenode(pnp);
4278 		return (NULL);
4279 	}
4280 	p = dpnp->pr_common->prc_proc;
4281 	if ((p->p_flag & SSYS) || p->p_as == &kas) {
4282 		prunlock(dpnp);
4283 		prfreenode(pnp);
4284 		return (NULL);
4285 	}
4286 
4287 	if ((fp = pr_getf(p, fd, NULL)) != NULL) {
4288 		pnp->pr_mode = 07111;
4289 		if (fp->f_flag & FREAD)
4290 			pnp->pr_mode |= 0444;
4291 		if (fp->f_flag & FWRITE)
4292 			pnp->pr_mode |= 0222;
4293 		vp = fp->f_vnode;
4294 		VN_HOLD(vp);
4295 		pr_releasef(p, fd);
4296 	}
4297 
4298 	prunlock(dpnp);
4299 
4300 	if (vp == NULL) {
4301 		prfreenode(pnp);
4302 		return (NULL);
4303 	}
4304 
4305 	/*
4306 	 * Fill in the prnode so future references will
4307 	 * be able to find the underlying object's vnode.
4308 	 * Don't link this prnode into the list of all
4309 	 * prnodes for the process; this is a one-use node.
4310 	 */
4311 	pnp->pr_realvp = vp;
4312 	pnp->pr_parent = dp;		/* needed for prlookup */
4313 	VN_HOLD(dp);
4314 	vp = PTOV(pnp);
4315 	if (pnp->pr_realvp->v_type == VDIR) {
4316 		vp->v_type = VDIR;
4317 		vp->v_flag |= VTRAVERSE;
4318 	}
4319 
4320 	return (vp);
4321 }
4322 
4323 static vnode_t *
4324 pr_lookup_fdinfodir(vnode_t *dp, char *comp)
4325 {
4326 	prnode_t *dpnp = VTOP(dp);
4327 	prnode_t *pnp;
4328 	vnode_t *vp = NULL;
4329 	proc_t *p;
4330 	uint_t fd;
4331 	int c;
4332 
4333 	ASSERT(dpnp->pr_type == PR_FDINFODIR);
4334 
4335 	fd = 0;
4336 	while ((c = *comp++) != '\0') {
4337 		int ofd;
4338 		if (c < '0' || c > '9')
4339 			return (NULL);
4340 		ofd = fd;
4341 		fd = 10 * fd + c - '0';
4342 		if (fd / 10 != ofd)	/* integer overflow */
4343 			return (NULL);
4344 	}
4345 
4346 	pnp = prgetnode(dp, PR_FDINFO);
4347 
4348 	if (prlock(dpnp, ZNO) != 0) {
4349 		prfreenode(pnp);
4350 		return (NULL);
4351 	}
4352 	p = dpnp->pr_common->prc_proc;
4353 	if ((p->p_flag & SSYS) || p->p_as == &kas) {
4354 		prunlock(dpnp);
4355 		prfreenode(pnp);
4356 		return (NULL);
4357 	}
4358 
4359 	/*
4360 	 * Don't link this prnode into the list of all
4361 	 * prnodes for the process; this is a one-use node.
4362 	 * Unlike the FDDIR case, the underlying vnode is not stored in
4363 	 * pnp->pr_realvp. Instead, the fd number is stored in pnp->pr_index
4364 	 * and used by pr_read_fdinfo() to return information for the right
4365 	 * file descriptor.
4366 	 */
4367 	pnp->pr_common = dpnp->pr_common;
4368 	pnp->pr_pcommon = dpnp->pr_pcommon;
4369 	pnp->pr_parent = dp;
4370 	pnp->pr_index = fd;
4371 	VN_HOLD(dp);
4372 	prunlock(dpnp);
4373 	vp = PTOV(pnp);
4374 
4375 	return (vp);
4376 }
4377 
4378 static vnode_t *
4379 pr_lookup_pathdir(vnode_t *dp, char *comp)
4380 {
4381 	prnode_t *dpnp = VTOP(dp);
4382 	prnode_t *pnp;
4383 	vnode_t *vp = NULL;
4384 	proc_t *p;
4385 	uint_t fd, flags = 0;
4386 	int c;
4387 	uf_entry_t *ufp;
4388 	uf_info_t *fip;
4389 	enum { NAME_FD, NAME_OBJECT, NAME_ROOT, NAME_CWD, NAME_UNKNOWN } type;
4390 	char *tmp;
4391 	int idx;
4392 	struct seg *seg;
4393 	struct as *as = NULL;
4394 	vattr_t vattr;
4395 
4396 	ASSERT(dpnp->pr_type == PR_PATHDIR);
4397 
4398 	/*
4399 	 * First, check if this is a numeric entry, in which case we have a
4400 	 * file descriptor.
4401 	 */
4402 	fd = 0;
4403 	type = NAME_FD;
4404 	tmp = comp;
4405 	while ((c = *tmp++) != '\0') {
4406 		int ofd;
4407 		if (c < '0' || c > '9') {
4408 			type = NAME_UNKNOWN;
4409 			break;
4410 		}
4411 		ofd = fd;
4412 		fd = 10*fd + c - '0';
4413 		if (fd/10 != ofd) {	/* integer overflow */
4414 			type = NAME_UNKNOWN;
4415 			break;
4416 		}
4417 	}
4418 
4419 	/*
4420 	 * Next, see if it is one of the special values {root, cwd}.
4421 	 */
4422 	if (type == NAME_UNKNOWN) {
4423 		if (strcmp(comp, "root") == 0)
4424 			type = NAME_ROOT;
4425 		else if (strcmp(comp, "cwd") == 0)
4426 			type = NAME_CWD;
4427 	}
4428 
4429 	/*
4430 	 * Grab the necessary data from the process
4431 	 */
4432 	if (prlock(dpnp, ZNO) != 0)
4433 		return (NULL);
4434 	p = dpnp->pr_common->prc_proc;
4435 
4436 	fip = P_FINFO(p);
4437 
4438 	switch (type) {
4439 	case NAME_ROOT:
4440 		if ((vp = PTOU(p)->u_rdir) == NULL)
4441 			vp = p->p_zone->zone_rootvp;
4442 		VN_HOLD(vp);
4443 		break;
4444 	case NAME_CWD:
4445 		vp = PTOU(p)->u_cdir;
4446 		VN_HOLD(vp);
4447 		break;
4448 	default:
4449 		if ((p->p_flag & SSYS) || (as = p->p_as) == &kas) {
4450 			prunlock(dpnp);
4451 			return (NULL);
4452 		}
4453 	}
4454 	mutex_exit(&p->p_lock);
4455 
4456 	/*
4457 	 * Determine if this is an object entry
4458 	 */
4459 	if (type == NAME_UNKNOWN) {
4460 		/*
4461 		 * Start with the inode index immediately after the number of
4462 		 * files.
4463 		 */
4464 		mutex_enter(&fip->fi_lock);
4465 		idx = fip->fi_nfiles + 4;
4466 		mutex_exit(&fip->fi_lock);
4467 
4468 		if (strcmp(comp, "a.out") == 0) {
4469 			if (p->p_execdir != NULL) {
4470 				vp = p->p_execdir;
4471 				VN_HOLD(vp);
4472 				type = NAME_OBJECT;
4473 				flags |= PR_AOUT;
4474 			} else {
4475 				vp = p->p_exec;
4476 				VN_HOLD(vp);
4477 				type = NAME_OBJECT;
4478 			}
4479 		} else {
4480 			AS_LOCK_ENTER(as, RW_READER);
4481 			if ((seg = AS_SEGFIRST(as)) != NULL) {
4482 				do {
4483 					/*
4484 					 * Manufacture a filename for the
4485 					 * "object" directory.
4486 					 */
4487 					vattr.va_mask = AT_FSID|AT_NODEID;
4488 					if (seg->s_ops == &segvn_ops &&
4489 					    SEGOP_GETVP(seg, seg->s_base, &vp)
4490 					    == 0 &&
4491 					    vp != NULL && vp->v_type == VREG &&
4492 					    VOP_GETATTR(vp, &vattr, 0, CRED(),
4493 					    NULL) == 0) {
4494 						char name[64];
4495 
4496 						if (vp == p->p_exec)
4497 							continue;
4498 						idx++;
4499 						pr_object_name(name, vp,
4500 						    &vattr);
4501 						if (strcmp(name, comp) == 0)
4502 							break;
4503 					}
4504 				} while ((seg = AS_SEGNEXT(as, seg)) != NULL);
4505 			}
4506 
4507 			if (seg == NULL) {
4508 				vp = NULL;
4509 			} else {
4510 				VN_HOLD(vp);
4511 				type = NAME_OBJECT;
4512 			}
4513 
4514 			AS_LOCK_EXIT(as);
4515 		}
4516 	}
4517 
4518 
4519 	switch (type) {
4520 	case NAME_FD:
4521 		mutex_enter(&fip->fi_lock);
4522 		if (fd < fip->fi_nfiles) {
4523 			UF_ENTER(ufp, fip, fd);
4524 			if (ufp->uf_file != NULL) {
4525 				vp = ufp->uf_file->f_vnode;
4526 				VN_HOLD(vp);
4527 			}
4528 			UF_EXIT(ufp);
4529 		}
4530 		mutex_exit(&fip->fi_lock);
4531 		idx = fd + 4;
4532 		break;
4533 	case NAME_ROOT:
4534 		idx = 2;
4535 		break;
4536 	case NAME_CWD:
4537 		idx = 3;
4538 		break;
4539 	case NAME_OBJECT:
4540 	case NAME_UNKNOWN:
4541 		/* Nothing to do */
4542 		break;
4543 	}
4544 
4545 	mutex_enter(&p->p_lock);
4546 	prunlock(dpnp);
4547 
4548 	if (vp != NULL) {
4549 		pnp = prgetnode(dp, PR_PATH);
4550 
4551 		pnp->pr_flags |= flags;
4552 		pnp->pr_common = dpnp->pr_common;
4553 		pnp->pr_pcommon = dpnp->pr_pcommon;
4554 		pnp->pr_realvp = vp;
4555 		pnp->pr_parent = dp;		/* needed for prlookup */
4556 		pnp->pr_ino = pmkino(idx, dpnp->pr_common->prc_slot, PR_PATH);
4557 		VN_HOLD(dp);
4558 		vp = PTOV(pnp);
4559 		vp->v_type = VLNK;
4560 	}
4561 
4562 	return (vp);
4563 }
4564 
4565 /*
4566  * Look up one of the process's active templates.
4567  */
4568 static vnode_t *
4569 pr_lookup_tmpldir(vnode_t *dp, char *comp)
4570 {
4571 	prnode_t *dpnp = VTOP(dp);
4572 	prnode_t *pnp;
4573 	vnode_t *vp = NULL;
4574 	proc_t *p;
4575 	int i;
4576 
4577 	ASSERT(dpnp->pr_type == PR_TMPLDIR);
4578 
4579 	for (i = 0; i < ct_ntypes; i++)
4580 		if (strcmp(comp, ct_types[i]->ct_type_name) == 0)
4581 			break;
4582 	if (i == ct_ntypes)
4583 		return (NULL);
4584 
4585 	pnp = prgetnode(dp, PR_TMPL);
4586 
4587 	if (prlock(dpnp, ZNO) != 0) {
4588 		prfreenode(pnp);
4589 		return (NULL);
4590 	}
4591 	p = dpnp->pr_common->prc_proc;
4592 	if ((p->p_flag & SSYS) || p->p_as == &kas ||
4593 	    (dpnp->pr_common->prc_flags & (PRC_DESTROY | PRC_LWP)) != PRC_LWP) {
4594 		prunlock(dpnp);
4595 		prfreenode(pnp);
4596 		return (NULL);
4597 	}
4598 	if (ttolwp(dpnp->pr_common->prc_thread)->lwp_ct_active[i] != NULL) {
4599 		pnp->pr_common = dpnp->pr_common;
4600 		pnp->pr_pcommon = dpnp->pr_pcommon;
4601 		pnp->pr_parent = dp;
4602 		pnp->pr_cttype = i;
4603 		VN_HOLD(dp);
4604 		vp = PTOV(pnp);
4605 	} else {
4606 		prfreenode(pnp);
4607 	}
4608 	prunlock(dpnp);
4609 
4610 	return (vp);
4611 }
4612 
4613 /*
4614  * Look up one of the contracts owned by the process.
4615  */
4616 static vnode_t *
4617 pr_lookup_ctdir(vnode_t *dp, char *comp)
4618 {
4619 	prnode_t *dpnp = VTOP(dp);
4620 	prnode_t *pnp;
4621 	vnode_t *vp = NULL;
4622 	proc_t *p;
4623 	id_t id = 0;
4624 	contract_t *ct;
4625 	int c;
4626 
4627 	ASSERT(dpnp->pr_type == PR_CTDIR);
4628 
4629 	while ((c = *comp++) != '\0') {
4630 		id_t oid;
4631 		if (c < '0' || c > '9')
4632 			return (NULL);
4633 		oid = id;
4634 		id = 10 * id + c - '0';
4635 		if (id / 10 != oid)	/* integer overflow */
4636 			return (NULL);
4637 	}
4638 
4639 	/*
4640 	 * Search all contracts; we'll filter below.
4641 	 */
4642 	ct = contract_ptr(id, GLOBAL_ZONEUNIQID);
4643 	if (ct == NULL)
4644 		return (NULL);
4645 
4646 	pnp = prgetnode(dp, PR_CT);
4647 
4648 	if (prlock(dpnp, ZNO) != 0) {
4649 		prfreenode(pnp);
4650 		contract_rele(ct);
4651 		return (NULL);
4652 	}
4653 	p = dpnp->pr_common->prc_proc;
4654 	/*
4655 	 * We only allow lookups of contracts owned by this process, or,
4656 	 * if we are zsched and this is a zone's procfs, contracts on
4657 	 * stuff in the zone which are held by processes or contracts
4658 	 * outside the zone.  (see logic in contract_status_common)
4659 	 */
4660 	if ((ct->ct_owner != p) &&
4661 	    !(p == VTOZONE(dp)->zone_zsched && ct->ct_state < CTS_ORPHAN &&
4662 	    VTOZONE(dp)->zone_uniqid == contract_getzuniqid(ct) &&
4663 	    VTOZONE(dp)->zone_uniqid != GLOBAL_ZONEUNIQID &&
4664 	    ct->ct_czuniqid == GLOBAL_ZONEUNIQID)) {
4665 		prunlock(dpnp);
4666 		prfreenode(pnp);
4667 		contract_rele(ct);
4668 		return (NULL);
4669 	}
4670 	pnp->pr_common = dpnp->pr_common;
4671 	pnp->pr_pcommon = dpnp->pr_pcommon;
4672 	pnp->pr_contract = ct;
4673 	pnp->pr_parent = dp;
4674 	pnp->pr_ino = pmkino(id, pnp->pr_common->prc_slot, PR_CT);
4675 	VN_HOLD(dp);
4676 	prunlock(dpnp);
4677 	vp = PTOV(pnp);
4678 
4679 	return (vp);
4680 }
4681 
4682 /*
4683  * Construct an lwp vnode for the old /proc interface.
4684  * We stand on our head to make the /proc plumbing correct.
4685  */
4686 vnode_t *
4687 prlwpnode(prnode_t *pnp, uint_t tid)
4688 {
4689 	char comp[12];
4690 	vnode_t *dp;
4691 	vnode_t *vp;
4692 	prcommon_t *pcp;
4693 	proc_t *p;
4694 
4695 	/*
4696 	 * Lookup the /proc/<pid>/lwp/<lwpid> directory vnode.
4697 	 */
4698 	if (pnp->pr_type == PR_PIDFILE) {
4699 		dp = pnp->pr_parent;		/* /proc/<pid> */
4700 		VN_HOLD(dp);
4701 		vp = pr_lookup_piddir(dp, "lwp");
4702 		VN_RELE(dp);
4703 		if ((dp = vp) == NULL)		/* /proc/<pid>/lwp */
4704 			return (NULL);
4705 	} else if (pnp->pr_type == PR_LWPIDFILE) {
4706 		dp = pnp->pr_parent;		/* /proc/<pid>/lwp/<lwpid> */
4707 		dp = VTOP(dp)->pr_parent;	/* /proc/<pid>/lwp */
4708 		VN_HOLD(dp);
4709 	} else {
4710 		return (NULL);
4711 	}
4712 
4713 	(void) pr_u32tos(tid, comp, sizeof (comp));
4714 	vp = pr_lookup_lwpdir(dp, comp);
4715 	VN_RELE(dp);
4716 	if ((dp = vp) == NULL)
4717 		return (NULL);
4718 
4719 	pnp = prgetnode(dp, PR_LWPIDFILE);
4720 	vp = PTOV(pnp);
4721 
4722 	/*
4723 	 * prgetnode() initialized most of the prnode.
4724 	 * Finish the job.
4725 	 */
4726 	pcp = VTOP(dp)->pr_common;
4727 	pnp->pr_ino = ptoi(pcp->prc_pid);
4728 	pnp->pr_common = pcp;
4729 	pnp->pr_pcommon = VTOP(dp)->pr_pcommon;
4730 	pnp->pr_parent = dp;
4731 	/*
4732 	 * Link new vnode into list of all /proc vnodes for the process.
4733 	 */
4734 	p = pr_p_lock(pnp);
4735 	mutex_exit(&pr_pidlock);
4736 	if (p == NULL) {
4737 		VN_RELE(dp);
4738 		prfreenode(pnp);
4739 		vp = NULL;
4740 	} else if (pcp->prc_thread == NULL) {
4741 		prunlock(pnp);
4742 		VN_RELE(dp);
4743 		prfreenode(pnp);
4744 		vp = NULL;
4745 	} else {
4746 		pnp->pr_next = p->p_plist;
4747 		p->p_plist = vp;
4748 		prunlock(pnp);
4749 	}
4750 
4751 	return (vp);
4752 }
4753 
4754 #if defined(DEBUG)
4755 
4756 static	uint32_t nprnode;
4757 static	uint32_t nprcommon;
4758 
4759 #define	INCREMENT(x)	atomic_inc_32(&x);
4760 #define	DECREMENT(x)	atomic_dec_32(&x);
4761 
4762 #else
4763 
4764 #define	INCREMENT(x)
4765 #define	DECREMENT(x)
4766 
4767 #endif	/* DEBUG */
4768 
4769 /*
4770  * New /proc vnode required; allocate it and fill in most of the fields.
4771  */
4772 prnode_t *
4773 prgetnode(vnode_t *dp, prnodetype_t type)
4774 {
4775 	prnode_t *pnp;
4776 	prcommon_t *pcp;
4777 	vnode_t *vp;
4778 	ulong_t nfiles;
4779 
4780 	INCREMENT(nprnode);
4781 	pnp = kmem_zalloc(sizeof (prnode_t), KM_SLEEP);
4782 
4783 	mutex_init(&pnp->pr_mutex, NULL, MUTEX_DEFAULT, NULL);
4784 	pnp->pr_type = type;
4785 
4786 	pnp->pr_vnode = vn_alloc(KM_SLEEP);
4787 
4788 	vp = PTOV(pnp);
4789 	vp->v_flag = VNOCACHE|VNOMAP|VNOSWAP|VNOMOUNT;
4790 	vn_setops(vp, prvnodeops);
4791 	vp->v_vfsp = dp->v_vfsp;
4792 	vp->v_type = VPROC;
4793 	vp->v_data = (caddr_t)pnp;
4794 
4795 	switch (type) {
4796 	case PR_PIDDIR:
4797 	case PR_LWPIDDIR:
4798 		/*
4799 		 * We need a prcommon and a files array for each of these.
4800 		 */
4801 		INCREMENT(nprcommon);
4802 
4803 		pcp = kmem_zalloc(sizeof (prcommon_t), KM_SLEEP);
4804 		pcp->prc_refcnt = 1;
4805 		pnp->pr_common = pcp;
4806 		mutex_init(&pcp->prc_mutex, NULL, MUTEX_DEFAULT, NULL);
4807 		cv_init(&pcp->prc_wait, NULL, CV_DEFAULT, NULL);
4808 
4809 		nfiles = (type == PR_PIDDIR)? NPIDDIRFILES : NLWPIDDIRFILES;
4810 		pnp->pr_files =
4811 		    kmem_zalloc(nfiles * sizeof (vnode_t *), KM_SLEEP);
4812 
4813 		vp->v_type = VDIR;
4814 		/*
4815 		 * Mode should be read-search by all, but we cannot so long
4816 		 * as we must support compatibility mode with old /proc.
4817 		 * Make /proc/<pid> be read by owner only, search by all.
4818 		 * Make /proc/<pid>/lwp/<lwpid> read-search by all.  Also,
4819 		 * set VDIROPEN on /proc/<pid> so it can be opened for writing.
4820 		 */
4821 		if (type == PR_PIDDIR) {
4822 			/* kludge for old /proc interface */
4823 			prnode_t *xpnp = prgetnode(dp, PR_PIDFILE);
4824 			pnp->pr_pidfile = PTOV(xpnp);
4825 			pnp->pr_mode = 0511;
4826 			vp->v_flag |= VDIROPEN;
4827 		} else {
4828 			pnp->pr_mode = 0555;
4829 		}
4830 
4831 		break;
4832 
4833 	case PR_CURDIR:
4834 	case PR_ROOTDIR:
4835 	case PR_FDDIR:
4836 	case PR_FDINFODIR:
4837 	case PR_OBJECTDIR:
4838 	case PR_PATHDIR:
4839 	case PR_CTDIR:
4840 	case PR_TMPLDIR:
4841 		vp->v_type = VDIR;
4842 		pnp->pr_mode = 0500;	/* read-search by owner only */
4843 		break;
4844 
4845 	case PR_CT:
4846 		vp->v_type = VLNK;
4847 		pnp->pr_mode = 0500;	/* read-search by owner only */
4848 		break;
4849 
4850 	case PR_PATH:
4851 	case PR_SELF:
4852 		vp->v_type = VLNK;
4853 		pnp->pr_mode = 0777;
4854 		break;
4855 
4856 	case PR_LWPDIR:
4857 		vp->v_type = VDIR;
4858 		pnp->pr_mode = 0555;	/* read-search by all */
4859 		break;
4860 
4861 	case PR_AS:
4862 	case PR_TMPL:
4863 		pnp->pr_mode = 0600;	/* read-write by owner only */
4864 		break;
4865 
4866 	case PR_CTL:
4867 	case PR_LWPCTL:
4868 		pnp->pr_mode = 0200;	/* write-only by owner only */
4869 		break;
4870 
4871 	case PR_PIDFILE:
4872 	case PR_LWPIDFILE:
4873 		pnp->pr_mode = 0600;	/* read-write by owner only */
4874 		break;
4875 
4876 	case PR_LWPNAME:
4877 		pnp->pr_mode = 0644;	/* readable by all + owner can write */
4878 		break;
4879 
4880 	case PR_PSINFO:
4881 	case PR_LPSINFO:
4882 	case PR_LWPSINFO:
4883 	case PR_USAGE:
4884 	case PR_LUSAGE:
4885 	case PR_LWPUSAGE:
4886 		pnp->pr_mode = 0444;	/* read-only by all */
4887 		break;
4888 
4889 	default:
4890 		pnp->pr_mode = 0400;	/* read-only by owner only */
4891 		break;
4892 	}
4893 	vn_exists(vp);
4894 	return (pnp);
4895 }
4896 
4897 /*
4898  * Free the storage obtained from prgetnode().
4899  */
4900 void
4901 prfreenode(prnode_t *pnp)
4902 {
4903 	vnode_t *vp;
4904 	ulong_t nfiles;
4905 
4906 	vn_invalid(PTOV(pnp));
4907 	vn_free(PTOV(pnp));
4908 	mutex_destroy(&pnp->pr_mutex);
4909 
4910 	switch (pnp->pr_type) {
4911 	case PR_PIDDIR:
4912 		/* kludge for old /proc interface */
4913 		if (pnp->pr_pidfile != NULL) {
4914 			prfreenode(VTOP(pnp->pr_pidfile));
4915 			pnp->pr_pidfile = NULL;
4916 		}
4917 		/* FALLTHROUGH */
4918 	case PR_LWPIDDIR:
4919 		/*
4920 		 * We allocated a prcommon and a files array for each of these.
4921 		 */
4922 		prfreecommon(pnp->pr_common);
4923 		nfiles = (pnp->pr_type == PR_PIDDIR)?
4924 		    NPIDDIRFILES : NLWPIDDIRFILES;
4925 		kmem_free(pnp->pr_files, nfiles * sizeof (vnode_t *));
4926 		break;
4927 	default:
4928 		break;
4929 	}
4930 	/*
4931 	 * If there is an underlying vnode, be sure
4932 	 * to release it after freeing the prnode.
4933 	 */
4934 	vp = pnp->pr_realvp;
4935 	kmem_free(pnp, sizeof (*pnp));
4936 	DECREMENT(nprnode);
4937 	if (vp != NULL) {
4938 		VN_RELE(vp);
4939 	}
4940 }
4941 
4942 /*
4943  * Free a prcommon structure, if the reference count reaches zero.
4944  */
4945 static void
4946 prfreecommon(prcommon_t *pcp)
4947 {
4948 	mutex_enter(&pcp->prc_mutex);
4949 	ASSERT(pcp->prc_refcnt > 0);
4950 	if (--pcp->prc_refcnt != 0)
4951 		mutex_exit(&pcp->prc_mutex);
4952 	else {
4953 		mutex_exit(&pcp->prc_mutex);
4954 		ASSERT(pcp->prc_pollhead.ph_list == NULL);
4955 		ASSERT(pcp->prc_refcnt == 0);
4956 		ASSERT(pcp->prc_selfopens == 0 && pcp->prc_writers == 0);
4957 		mutex_destroy(&pcp->prc_mutex);
4958 		cv_destroy(&pcp->prc_wait);
4959 		kmem_free(pcp, sizeof (prcommon_t));
4960 		DECREMENT(nprcommon);
4961 	}
4962 }
4963 
4964 /*
4965  * Array of readdir functions, indexed by /proc file type.
4966  */
4967 static int pr_readdir_notdir(), pr_readdir_procdir(), pr_readdir_piddir(),
4968 	pr_readdir_objectdir(), pr_readdir_lwpdir(), pr_readdir_lwpiddir(),
4969 	pr_readdir_fddir(), pr_readdir_fdinfodir(), pr_readdir_pathdir(),
4970 	pr_readdir_tmpldir(), pr_readdir_ctdir();
4971 
4972 static int (*pr_readdir_function[PR_NFILES])() = {
4973 	pr_readdir_procdir,	/* /proc				*/
4974 	pr_readdir_notdir,	/* /proc/self				*/
4975 	pr_readdir_piddir,	/* /proc/<pid>				*/
4976 	pr_readdir_notdir,	/* /proc/<pid>/as			*/
4977 	pr_readdir_notdir,	/* /proc/<pid>/ctl			*/
4978 	pr_readdir_notdir,	/* /proc/<pid>/status			*/
4979 	pr_readdir_notdir,	/* /proc/<pid>/lstatus			*/
4980 	pr_readdir_notdir,	/* /proc/<pid>/psinfo			*/
4981 	pr_readdir_notdir,	/* /proc/<pid>/lpsinfo			*/
4982 	pr_readdir_notdir,	/* /proc/<pid>/map			*/
4983 	pr_readdir_notdir,	/* /proc/<pid>/rmap			*/
4984 	pr_readdir_notdir,	/* /proc/<pid>/xmap			*/
4985 	pr_readdir_notdir,	/* /proc/<pid>/cred			*/
4986 	pr_readdir_notdir,	/* /proc/<pid>/sigact			*/
4987 	pr_readdir_notdir,	/* /proc/<pid>/auxv			*/
4988 #if defined(__x86)
4989 	pr_readdir_notdir,	/* /proc/<pid>/ldt			*/
4990 #endif
4991 	pr_readdir_notdir,	/* /proc/<pid>/usage			*/
4992 	pr_readdir_notdir,	/* /proc/<pid>/lusage			*/
4993 	pr_readdir_notdir,	/* /proc/<pid>/pagedata			*/
4994 	pr_readdir_notdir,	/* /proc/<pid>/watch			*/
4995 	pr_readdir_notdir,	/* /proc/<pid>/cwd			*/
4996 	pr_readdir_notdir,	/* /proc/<pid>/root			*/
4997 	pr_readdir_fddir,	/* /proc/<pid>/fd			*/
4998 	pr_readdir_notdir,	/* /proc/<pid>/fd/nn			*/
4999 	pr_readdir_fdinfodir,	/* /proc/<pid>/fdinfo			*/
5000 	pr_readdir_notdir,	/* /proc/<pid>/fdinfo/nn		*/
5001 	pr_readdir_objectdir,	/* /proc/<pid>/object			*/
5002 	pr_readdir_notdir,	/* /proc/<pid>/object/xxx		*/
5003 	pr_readdir_lwpdir,	/* /proc/<pid>/lwp			*/
5004 	pr_readdir_lwpiddir,	/* /proc/<pid>/lwp/<lwpid>		*/
5005 	pr_readdir_notdir,	/* /proc/<pid>/lwp/<lwpid>/lwpctl	*/
5006 	pr_readdir_notdir,	/* /proc/<pid>/lwp/<lwpid>/lwpname	*/
5007 	pr_readdir_notdir,	/* /proc/<pid>/lwp/<lwpid>/lwpstatus	*/
5008 	pr_readdir_notdir,	/* /proc/<pid>/lwp/<lwpid>/lwpsinfo	*/
5009 	pr_readdir_notdir,	/* /proc/<pid>/lwp/<lwpid>/lwpusage	*/
5010 	pr_readdir_notdir,	/* /proc/<pid>/lwp/<lwpid>/xregs	*/
5011 	pr_readdir_tmpldir,	/* /proc/<pid>/lwp/<lwpid>/templates	*/
5012 	pr_readdir_notdir,	/* /proc/<pid>/lwp/<lwpid>/templates/<id> */
5013 	pr_readdir_notdir,	/* /proc/<pid>/lwp/<lwpid>/spymaster	*/
5014 #if defined(__sparc)
5015 	pr_readdir_notdir,	/* /proc/<pid>/lwp/<lwpid>/gwindows	*/
5016 	pr_readdir_notdir,	/* /proc/<pid>/lwp/<lwpid>/asrs		*/
5017 #endif
5018 	pr_readdir_notdir,	/* /proc/<pid>/priv			*/
5019 	pr_readdir_pathdir,	/* /proc/<pid>/path			*/
5020 	pr_readdir_notdir,	/* /proc/<pid>/path/xxx			*/
5021 	pr_readdir_ctdir,	/* /proc/<pid>/contracts		*/
5022 	pr_readdir_notdir,	/* /proc/<pid>/contracts/<ctid>		*/
5023 	pr_readdir_notdir,	/* /proc/<pid>/secflags			*/
5024 	pr_readdir_notdir,	/* old process file			*/
5025 	pr_readdir_notdir,	/* old lwp file				*/
5026 	pr_readdir_notdir,	/* old pagedata file			*/
5027 };
5028 
5029 /* ARGSUSED */
5030 static int
5031 prreaddir(vnode_t *vp, uio_t *uiop, cred_t *cr, int *eofp,
5032     caller_context_t *ct, int flags)
5033 {
5034 	prnode_t *pnp = VTOP(vp);
5035 
5036 	ASSERT(pnp->pr_type < PR_NFILES);
5037 
5038 	/* XXX - Do we need to pass ct and flags? */
5039 	return (pr_readdir_function[pnp->pr_type](pnp, uiop, eofp));
5040 }
5041 
5042 /* ARGSUSED */
5043 static int
5044 pr_readdir_notdir(prnode_t *pnp, uio_t *uiop, int *eofp)
5045 {
5046 	return (ENOTDIR);
5047 }
5048 
5049 /* ARGSUSED */
5050 static int
5051 pr_readdir_procdir(prnode_t *pnp, uio_t *uiop, int *eofp)
5052 {
5053 	zoneid_t zoneid;
5054 	gfs_readdir_state_t gstate;
5055 	int error, eof = 0;
5056 	offset_t n;
5057 
5058 	ASSERT(pnp->pr_type == PR_PROCDIR);
5059 
5060 	zoneid = VTOZONE(PTOV(pnp))->zone_id;
5061 
5062 	if ((error = gfs_readdir_init(&gstate, PNSIZ, PRSDSIZE, uiop,
5063 	    PRROOTINO, PRROOTINO, 0)) != 0)
5064 		return (error);
5065 
5066 	/*
5067 	 * Loop until user's request is satisfied or until all processes
5068 	 * have been examined.
5069 	 */
5070 	while ((error = gfs_readdir_pred(&gstate, uiop, &n)) == 0) {
5071 		uint_t pid;
5072 		int pslot;
5073 		proc_t *p;
5074 
5075 		/*
5076 		 * Find next entry.  Skip processes not visible where
5077 		 * this /proc was mounted.
5078 		 */
5079 		mutex_enter(&pidlock);
5080 		while (n < v.v_proc &&
5081 		    ((p = pid_entry(n)) == NULL || p->p_stat == SIDL ||
5082 		    (zoneid != GLOBAL_ZONEID && p->p_zone->zone_id != zoneid) ||
5083 		    secpolicy_basic_procinfo(CRED(), p, curproc) != 0))
5084 			n++;
5085 
5086 		/*
5087 		 * Stop when entire proc table has been examined.
5088 		 */
5089 		if (n >= v.v_proc) {
5090 			mutex_exit(&pidlock);
5091 			eof = 1;
5092 			break;
5093 		}
5094 
5095 		ASSERT(p->p_stat != 0);
5096 		pid = p->p_pid;
5097 		pslot = p->p_slot;
5098 		mutex_exit(&pidlock);
5099 		error = gfs_readdir_emitn(&gstate, uiop, n,
5100 		    pmkino(0, pslot, PR_PIDDIR), pid);
5101 		if (error)
5102 			break;
5103 	}
5104 
5105 	return (gfs_readdir_fini(&gstate, error, eofp, eof));
5106 }
5107 
5108 /* ARGSUSED */
5109 static int
5110 pr_readdir_piddir(prnode_t *pnp, uio_t *uiop, int *eofp)
5111 {
5112 	int zombie = ((pnp->pr_pcommon->prc_flags & PRC_DESTROY) != 0);
5113 	prdirent_t dirent;
5114 	prdirent_t *dirp;
5115 	offset_t off;
5116 	int error;
5117 
5118 	ASSERT(pnp->pr_type == PR_PIDDIR);
5119 
5120 	if (uiop->uio_offset < 0 ||
5121 	    uiop->uio_offset % sizeof (prdirent_t) != 0 ||
5122 	    uiop->uio_resid < sizeof (prdirent_t))
5123 		return (EINVAL);
5124 	if (pnp->pr_pcommon->prc_proc == NULL)
5125 		return (ENOENT);
5126 	if (uiop->uio_offset >= sizeof (piddir))
5127 		goto out;
5128 
5129 	/*
5130 	 * Loop until user's request is satisfied, omitting some
5131 	 * files along the way if the process is a zombie.
5132 	 */
5133 	for (dirp = &piddir[uiop->uio_offset / sizeof (prdirent_t)];
5134 	    uiop->uio_resid >= sizeof (prdirent_t) &&
5135 	    dirp < &piddir[NPIDDIRFILES+2];
5136 	    uiop->uio_offset = off + sizeof (prdirent_t), dirp++) {
5137 		off = uiop->uio_offset;
5138 		if (zombie) {
5139 			switch (dirp->d_ino) {
5140 			case PR_PIDDIR:
5141 			case PR_PROCDIR:
5142 			case PR_PSINFO:
5143 			case PR_USAGE:
5144 				break;
5145 			default:
5146 				continue;
5147 			}
5148 		}
5149 		bcopy(dirp, &dirent, sizeof (prdirent_t));
5150 		if (dirent.d_ino == PR_PROCDIR)
5151 			dirent.d_ino = PRROOTINO;
5152 		else
5153 			dirent.d_ino = pmkino(0, pnp->pr_pcommon->prc_slot,
5154 			    dirent.d_ino);
5155 		if ((error = uiomove((caddr_t)&dirent, sizeof (prdirent_t),
5156 		    UIO_READ, uiop)) != 0)
5157 			return (error);
5158 	}
5159 out:
5160 	if (eofp)
5161 		*eofp = (uiop->uio_offset >= sizeof (piddir));
5162 	return (0);
5163 }
5164 
5165 static void
5166 rebuild_objdir(struct as *as)
5167 {
5168 	struct seg *seg;
5169 	vnode_t *vp;
5170 	vattr_t vattr;
5171 	vnode_t **dir;
5172 	ulong_t nalloc;
5173 	ulong_t nentries;
5174 	int i, j;
5175 	ulong_t nold, nnew;
5176 
5177 	ASSERT(AS_WRITE_HELD(as));
5178 
5179 	if (as->a_updatedir == 0 && as->a_objectdir != NULL)
5180 		return;
5181 	as->a_updatedir = 0;
5182 
5183 	if ((nalloc = avl_numnodes(&as->a_segtree)) == 0 ||
5184 	    (seg = AS_SEGFIRST(as)) == NULL)	/* can't happen? */
5185 		return;
5186 
5187 	/*
5188 	 * Allocate space for the new object directory.
5189 	 * (This is usually about two times too many entries.)
5190 	 */
5191 	nalloc = (nalloc + 0xf) & ~0xf;		/* multiple of 16 */
5192 	dir = kmem_zalloc(nalloc * sizeof (vnode_t *), KM_SLEEP);
5193 
5194 	/* fill in the new directory with desired entries */
5195 	nentries = 0;
5196 	do {
5197 		vattr.va_mask = AT_FSID|AT_NODEID;
5198 		if (seg->s_ops == &segvn_ops &&
5199 		    SEGOP_GETVP(seg, seg->s_base, &vp) == 0 &&
5200 		    vp != NULL && vp->v_type == VREG &&
5201 		    VOP_GETATTR(vp, &vattr, 0, CRED(), NULL) == 0) {
5202 			for (i = 0; i < nentries; i++)
5203 				if (vp == dir[i])
5204 					break;
5205 			if (i == nentries) {
5206 				ASSERT(nentries < nalloc);
5207 				dir[nentries++] = vp;
5208 			}
5209 		}
5210 	} while ((seg = AS_SEGNEXT(as, seg)) != NULL);
5211 
5212 	if (as->a_objectdir == NULL) {	/* first time */
5213 		as->a_objectdir = dir;
5214 		as->a_sizedir = nalloc;
5215 		return;
5216 	}
5217 
5218 	/*
5219 	 * Null out all of the defunct entries in the old directory.
5220 	 */
5221 	nold = 0;
5222 	nnew = nentries;
5223 	for (i = 0; i < as->a_sizedir; i++) {
5224 		if ((vp = as->a_objectdir[i]) != NULL) {
5225 			for (j = 0; j < nentries; j++) {
5226 				if (vp == dir[j]) {
5227 					dir[j] = NULL;
5228 					nnew--;
5229 					break;
5230 				}
5231 			}
5232 			if (j == nentries)
5233 				as->a_objectdir[i] = NULL;
5234 			else
5235 				nold++;
5236 		}
5237 	}
5238 
5239 	if (nold + nnew > as->a_sizedir) {
5240 		/*
5241 		 * Reallocate the old directory to have enough
5242 		 * space for the old and new entries combined.
5243 		 * Round up to the next multiple of 16.
5244 		 */
5245 		ulong_t newsize = (nold + nnew + 0xf) & ~0xf;
5246 		vnode_t **newdir = kmem_zalloc(newsize * sizeof (vnode_t *),
5247 		    KM_SLEEP);
5248 		bcopy(as->a_objectdir, newdir,
5249 		    as->a_sizedir * sizeof (vnode_t *));
5250 		kmem_free(as->a_objectdir, as->a_sizedir * sizeof (vnode_t *));
5251 		as->a_objectdir = newdir;
5252 		as->a_sizedir = newsize;
5253 	}
5254 
5255 	/*
5256 	 * Move all new entries to the old directory and
5257 	 * deallocate the space used by the new directory.
5258 	 */
5259 	if (nnew) {
5260 		for (i = 0, j = 0; i < nentries; i++) {
5261 			if ((vp = dir[i]) == NULL)
5262 				continue;
5263 			for (; j < as->a_sizedir; j++) {
5264 				if (as->a_objectdir[j] != NULL)
5265 					continue;
5266 				as->a_objectdir[j++] = vp;
5267 				break;
5268 			}
5269 		}
5270 	}
5271 	kmem_free(dir, nalloc * sizeof (vnode_t *));
5272 }
5273 
5274 /*
5275  * Return the vnode from a slot in the process's object directory.
5276  * The caller must have locked the process's address space.
5277  * The only caller is below, in pr_readdir_objectdir().
5278  */
5279 static vnode_t *
5280 obj_entry(struct as *as, int slot)
5281 {
5282 	ASSERT(AS_LOCK_HELD(as));
5283 	if (as->a_objectdir == NULL)
5284 		return (NULL);
5285 	ASSERT(slot < as->a_sizedir);
5286 	return (as->a_objectdir[slot]);
5287 }
5288 
5289 /* ARGSUSED */
5290 static int
5291 pr_readdir_objectdir(prnode_t *pnp, uio_t *uiop, int *eofp)
5292 {
5293 	gfs_readdir_state_t gstate;
5294 	int error, eof = 0;
5295 	offset_t n;
5296 	int pslot;
5297 	size_t objdirsize;
5298 	proc_t *p;
5299 	struct as *as;
5300 	vnode_t *vp;
5301 
5302 	ASSERT(pnp->pr_type == PR_OBJECTDIR);
5303 
5304 	if ((error = prlock(pnp, ZNO)) != 0)
5305 		return (error);
5306 	p = pnp->pr_common->prc_proc;
5307 	pslot = p->p_slot;
5308 
5309 	/*
5310 	 * We drop p_lock before grabbing the address space lock
5311 	 * in order to avoid a deadlock with the clock thread.
5312 	 * The process will not disappear and its address space
5313 	 * will not change because it is marked P_PR_LOCK.
5314 	 */
5315 	mutex_exit(&p->p_lock);
5316 
5317 	if ((error = gfs_readdir_init(&gstate, 64, PRSDSIZE, uiop,
5318 	    pmkino(0, pslot, PR_PIDDIR),
5319 	    pmkino(0, pslot, PR_OBJECTDIR), 0)) != 0) {
5320 		mutex_enter(&p->p_lock);
5321 		prunlock(pnp);
5322 		return (error);
5323 	}
5324 
5325 	if ((p->p_flag & SSYS) || (as = p->p_as) == &kas) {
5326 		as = NULL;
5327 		objdirsize = 0;
5328 	}
5329 
5330 	/*
5331 	 * Loop until user's request is satisfied or until
5332 	 * all mapped objects have been examined. Cannot hold
5333 	 * the address space lock for the following call as
5334 	 * gfs_readdir_pred() utimately causes a call to uiomove().
5335 	 */
5336 	while ((error = gfs_readdir_pred(&gstate, uiop, &n)) == 0) {
5337 		vattr_t vattr;
5338 		char str[64];
5339 
5340 		/*
5341 		 * Set the correct size of the directory just
5342 		 * in case the process has changed it's address
5343 		 * space via mmap/munmap calls.
5344 		 */
5345 		if (as != NULL) {
5346 			AS_LOCK_ENTER(as, RW_WRITER);
5347 			if (as->a_updatedir)
5348 				rebuild_objdir(as);
5349 			objdirsize = as->a_sizedir;
5350 		}
5351 
5352 		/*
5353 		 * Find next object.
5354 		 */
5355 		vattr.va_mask = AT_FSID | AT_NODEID;
5356 		while (n < objdirsize && (((vp = obj_entry(as, n)) == NULL) ||
5357 		    (VOP_GETATTR(vp, &vattr, 0, CRED(), NULL)
5358 		    != 0))) {
5359 			vattr.va_mask = AT_FSID | AT_NODEID;
5360 			n++;
5361 		}
5362 
5363 		if (as != NULL)
5364 			AS_LOCK_EXIT(as);
5365 
5366 		/*
5367 		 * Stop when all objects have been reported.
5368 		 */
5369 		if (n >= objdirsize) {
5370 			eof = 1;
5371 			break;
5372 		}
5373 
5374 		if (vp == p->p_exec)
5375 			(void) strcpy(str, "a.out");
5376 		else
5377 			pr_object_name(str, vp, &vattr);
5378 
5379 		error = gfs_readdir_emit(&gstate, uiop, n, vattr.va_nodeid,
5380 		    str, 0);
5381 
5382 		if (error)
5383 			break;
5384 	}
5385 
5386 	mutex_enter(&p->p_lock);
5387 	prunlock(pnp);
5388 
5389 	return (gfs_readdir_fini(&gstate, error, eofp, eof));
5390 }
5391 
5392 /* ARGSUSED */
5393 static int
5394 pr_readdir_lwpdir(prnode_t *pnp, uio_t *uiop, int *eofp)
5395 {
5396 	gfs_readdir_state_t gstate;
5397 	int error, eof = 0;
5398 	offset_t tslot;
5399 	proc_t *p;
5400 	int pslot;
5401 	lwpdir_t *lwpdir;
5402 	int lwpdirsize;
5403 
5404 	ASSERT(pnp->pr_type == PR_LWPDIR);
5405 
5406 	p = pr_p_lock(pnp);
5407 	mutex_exit(&pr_pidlock);
5408 	if (p == NULL)
5409 		return (ENOENT);
5410 	ASSERT(p == pnp->pr_common->prc_proc);
5411 	pslot = p->p_slot;
5412 	lwpdir = p->p_lwpdir;
5413 	lwpdirsize = p->p_lwpdir_sz;
5414 
5415 	/*
5416 	 * Drop p->p_lock so we can safely do uiomove().
5417 	 * The lwp directory will not change because
5418 	 * we have the process locked with P_PR_LOCK.
5419 	 */
5420 	mutex_exit(&p->p_lock);
5421 
5422 
5423 	if ((error = gfs_readdir_init(&gstate, PLNSIZ, PRSDSIZE, uiop,
5424 	    pmkino(0, pslot, PR_PIDDIR),
5425 	    pmkino(0, pslot, PR_LWPDIR), 0)) != 0) {
5426 		mutex_enter(&p->p_lock);
5427 		prunlock(pnp);
5428 		return (error);
5429 	}
5430 
5431 	/*
5432 	 * Loop until user's request is satisfied or until all lwps
5433 	 * have been examined.
5434 	 */
5435 	while ((error = gfs_readdir_pred(&gstate, uiop, &tslot)) == 0) {
5436 		lwpent_t *lep;
5437 		uint_t tid;
5438 
5439 		/*
5440 		 * Find next LWP.
5441 		 */
5442 		while (tslot < lwpdirsize &&
5443 		    ((lep = lwpdir[tslot].ld_entry) == NULL))
5444 			tslot++;
5445 		/*
5446 		 * Stop when all lwps have been reported.
5447 		 */
5448 		if (tslot >= lwpdirsize) {
5449 			eof = 1;
5450 			break;
5451 		}
5452 
5453 		tid = lep->le_lwpid;
5454 		error = gfs_readdir_emitn(&gstate, uiop, tslot,
5455 		    pmkino(tslot, pslot, PR_LWPIDDIR), tid);
5456 		if (error)
5457 			break;
5458 	}
5459 
5460 	mutex_enter(&p->p_lock);
5461 	prunlock(pnp);
5462 
5463 	return (gfs_readdir_fini(&gstate, error, eofp, eof));
5464 }
5465 
5466 /* ARGSUSED */
5467 static int
5468 pr_readdir_lwpiddir(prnode_t *pnp, uio_t *uiop, int *eofp)
5469 {
5470 	prcommon_t *pcp = pnp->pr_common;
5471 	int zombie = ((pcp->prc_flags & PRC_DESTROY) != 0);
5472 	prdirent_t dirent;
5473 	prdirent_t *dirp;
5474 	offset_t off;
5475 	int error;
5476 	int pslot;
5477 	int tslot;
5478 
5479 	ASSERT(pnp->pr_type == PR_LWPIDDIR);
5480 
5481 	if (uiop->uio_offset < 0 ||
5482 	    uiop->uio_offset % sizeof (prdirent_t) != 0 ||
5483 	    uiop->uio_resid < sizeof (prdirent_t))
5484 		return (EINVAL);
5485 	if (pcp->prc_proc == NULL || pcp->prc_tslot == -1)
5486 		return (ENOENT);
5487 	if (uiop->uio_offset >= sizeof (lwpiddir))
5488 		goto out;
5489 
5490 	/*
5491 	 * Loop until user's request is satisfied, omitting some files
5492 	 * along the way if the lwp is a zombie and also depending
5493 	 * on the data model of the process.
5494 	 */
5495 	pslot = pcp->prc_slot;
5496 	tslot = pcp->prc_tslot;
5497 	for (dirp = &lwpiddir[uiop->uio_offset / sizeof (prdirent_t)];
5498 	    uiop->uio_resid >= sizeof (prdirent_t) &&
5499 	    dirp < &lwpiddir[NLWPIDDIRFILES+2];
5500 	    uiop->uio_offset = off + sizeof (prdirent_t), dirp++) {
5501 		off = uiop->uio_offset;
5502 		if (zombie) {
5503 			switch (dirp->d_ino) {
5504 			case PR_LWPIDDIR:
5505 			case PR_LWPDIR:
5506 			case PR_LWPSINFO:
5507 				break;
5508 			default:
5509 				continue;
5510 			}
5511 		}
5512 #if defined(__sparc)
5513 		/* the asrs file exists only for sparc v9 _LP64 processes */
5514 		if (dirp->d_ino == PR_ASRS &&
5515 		    pcp->prc_datamodel != DATAMODEL_LP64)
5516 			continue;
5517 #endif
5518 		bcopy(dirp, &dirent, sizeof (prdirent_t));
5519 		if (dirent.d_ino == PR_LWPDIR)
5520 			dirent.d_ino = pmkino(0, pslot, dirp->d_ino);
5521 		else
5522 			dirent.d_ino = pmkino(tslot, pslot, dirp->d_ino);
5523 		if ((error = uiomove((caddr_t)&dirent, sizeof (prdirent_t),
5524 		    UIO_READ, uiop)) != 0)
5525 			return (error);
5526 	}
5527 out:
5528 	if (eofp)
5529 		*eofp = (uiop->uio_offset >= sizeof (lwpiddir));
5530 	return (0);
5531 }
5532 
5533 /*
5534  * Helper function for reading a directory which lists open file desciptors
5535  */
5536 static int
5537 pr_readdir_fdlist(prnode_t *pnp, uio_t *uiop, int *eofp,
5538     prnodetype_t dirtype, prnodetype_t entrytype)
5539 {
5540 	gfs_readdir_state_t gstate;
5541 	int error, eof = 0;
5542 	offset_t n;
5543 	proc_t *p;
5544 	int pslot;
5545 	int fddirsize;
5546 	uf_info_t *fip;
5547 
5548 	if ((error = prlock(pnp, ZNO)) != 0)
5549 		return (error);
5550 	p = pnp->pr_common->prc_proc;
5551 	pslot = p->p_slot;
5552 	fip = P_FINFO(p);
5553 	mutex_exit(&p->p_lock);
5554 
5555 	if ((error = gfs_readdir_init(&gstate, PLNSIZ, PRSDSIZE, uiop,
5556 	    pmkino(0, pslot, PR_PIDDIR), pmkino(0, pslot, dirtype), 0)) != 0) {
5557 		mutex_enter(&p->p_lock);
5558 		prunlock(pnp);
5559 		return (error);
5560 	}
5561 
5562 	mutex_enter(&fip->fi_lock);
5563 	if ((p->p_flag & SSYS) || p->p_as == &kas)
5564 		fddirsize = 0;
5565 	else
5566 		fddirsize = fip->fi_nfiles;
5567 
5568 	/*
5569 	 * Loop until user's request is satisfied or until
5570 	 * all file descriptors have been examined.
5571 	 */
5572 	while ((error = gfs_readdir_pred(&gstate, uiop, &n)) == 0) {
5573 		/*
5574 		 * Find next fd.
5575 		 */
5576 		while (n < fddirsize && fip->fi_list[n].uf_file == NULL)
5577 			n++;
5578 		/*
5579 		 * Stop when all fds have been reported.
5580 		 */
5581 		if (n >= fddirsize) {
5582 			eof = 1;
5583 			break;
5584 		}
5585 
5586 		error = gfs_readdir_emitn(&gstate, uiop, n,
5587 		    pmkino(n, pslot, entrytype), n);
5588 		if (error)
5589 			break;
5590 	}
5591 
5592 	mutex_exit(&fip->fi_lock);
5593 	mutex_enter(&p->p_lock);
5594 	prunlock(pnp);
5595 
5596 	return (gfs_readdir_fini(&gstate, error, eofp, eof));
5597 }
5598 
5599 static int
5600 pr_readdir_fddir(prnode_t *pnp, uio_t *uiop, int *eofp)
5601 {
5602 
5603 	ASSERT(pnp->pr_type == PR_FDDIR);
5604 
5605 	return (pr_readdir_fdlist(pnp, uiop, eofp, pnp->pr_type, PR_FD));
5606 }
5607 
5608 static int
5609 pr_readdir_fdinfodir(prnode_t *pnp, uio_t *uiop, int *eofp)
5610 {
5611 
5612 	ASSERT(pnp->pr_type == PR_FDINFODIR);
5613 
5614 	return (pr_readdir_fdlist(pnp, uiop, eofp, pnp->pr_type, PR_FDINFO));
5615 }
5616 
5617 /* ARGSUSED */
5618 static int
5619 pr_readdir_pathdir(prnode_t *pnp, uio_t *uiop, int *eofp)
5620 {
5621 	longlong_t bp[DIRENT64_RECLEN(64) / sizeof (longlong_t)];
5622 	dirent64_t *dirent = (dirent64_t *)bp;
5623 	int reclen;
5624 	ssize_t oresid;
5625 	offset_t off, idx;
5626 	int error = 0;
5627 	proc_t *p;
5628 	int fd, obj;
5629 	int pslot;
5630 	int fddirsize;
5631 	uf_info_t *fip;
5632 	struct as *as = NULL;
5633 	size_t objdirsize;
5634 	vattr_t vattr;
5635 	vnode_t *vp;
5636 
5637 	ASSERT(pnp->pr_type == PR_PATHDIR);
5638 
5639 	if (uiop->uio_offset < 0 ||
5640 	    uiop->uio_resid <= 0 ||
5641 	    (uiop->uio_offset % PRSDSIZE) != 0)
5642 		return (EINVAL);
5643 	oresid = uiop->uio_resid;
5644 	bzero(bp, sizeof (bp));
5645 
5646 	if ((error = prlock(pnp, ZNO)) != 0)
5647 		return (error);
5648 	p = pnp->pr_common->prc_proc;
5649 	fip = P_FINFO(p);
5650 	pslot = p->p_slot;
5651 	mutex_exit(&p->p_lock);
5652 
5653 	if ((p->p_flag & SSYS) || (as = p->p_as) == &kas) {
5654 		as = NULL;
5655 		objdirsize = 0;
5656 	} else {
5657 		AS_LOCK_ENTER(as, RW_WRITER);
5658 		if (as->a_updatedir)
5659 			rebuild_objdir(as);
5660 		objdirsize = as->a_sizedir;
5661 		AS_LOCK_EXIT(as);
5662 		as = NULL;
5663 	}
5664 
5665 	mutex_enter(&fip->fi_lock);
5666 	if ((p->p_flag & SSYS) || p->p_as == &kas)
5667 		fddirsize = 0;
5668 	else
5669 		fddirsize = fip->fi_nfiles;
5670 
5671 	for (; uiop->uio_resid > 0; uiop->uio_offset = off + PRSDSIZE) {
5672 		/*
5673 		 * There are 4 special files in the path directory: ".", "..",
5674 		 * "root", and "cwd".  We handle those specially here.
5675 		 */
5676 		off = uiop->uio_offset;
5677 		idx = off / PRSDSIZE;
5678 		if (off == 0) {				/* "." */
5679 			dirent->d_ino = pmkino(0, pslot, PR_PATHDIR);
5680 			dirent->d_name[0] = '.';
5681 			dirent->d_name[1] = '\0';
5682 			reclen = DIRENT64_RECLEN(1);
5683 		} else if (idx == 1) {			/* ".." */
5684 			dirent->d_ino = pmkino(0, pslot, PR_PIDDIR);
5685 			dirent->d_name[0] = '.';
5686 			dirent->d_name[1] = '.';
5687 			dirent->d_name[2] = '\0';
5688 			reclen = DIRENT64_RECLEN(2);
5689 		} else if (idx == 2) {			/* "root" */
5690 			dirent->d_ino = pmkino(idx, pslot, PR_PATH);
5691 			(void) strcpy(dirent->d_name, "root");
5692 			reclen = DIRENT64_RECLEN(4);
5693 		} else if (idx == 3) {			/* "cwd" */
5694 			dirent->d_ino = pmkino(idx, pslot, PR_PATH);
5695 			(void) strcpy(dirent->d_name, "cwd");
5696 			reclen = DIRENT64_RECLEN(3);
5697 		} else if (idx < 4 + fddirsize) {
5698 			/*
5699 			 * In this case, we have one of the file descriptors.
5700 			 */
5701 			fd = idx - 4;
5702 			if (fip->fi_list[fd].uf_file == NULL)
5703 				continue;
5704 			dirent->d_ino = pmkino(idx, pslot, PR_PATH);
5705 			(void) pr_u32tos(fd, dirent->d_name, PLNSIZ+1);
5706 			reclen = DIRENT64_RECLEN(PLNSIZ);
5707 		} else if (idx < 4 + fddirsize + objdirsize) {
5708 			if (fip != NULL) {
5709 				mutex_exit(&fip->fi_lock);
5710 				fip = NULL;
5711 			}
5712 
5713 			/*
5714 			 * We drop p_lock before grabbing the address space lock
5715 			 * in order to avoid a deadlock with the clock thread.
5716 			 * The process will not disappear and its address space
5717 			 * will not change because it is marked P_PR_LOCK.
5718 			 */
5719 			if (as == NULL) {
5720 				as = p->p_as;
5721 				AS_LOCK_ENTER(as, RW_WRITER);
5722 			}
5723 
5724 			if (as->a_updatedir) {
5725 				rebuild_objdir(as);
5726 				objdirsize = as->a_sizedir;
5727 			}
5728 
5729 			obj = idx - 4 - fddirsize;
5730 			if ((vp = obj_entry(as, obj)) == NULL)
5731 				continue;
5732 			vattr.va_mask = AT_FSID|AT_NODEID;
5733 			if (VOP_GETATTR(vp, &vattr, 0, CRED(), NULL) != 0)
5734 				continue;
5735 			if (vp == p->p_exec)
5736 				(void) strcpy(dirent->d_name, "a.out");
5737 			else
5738 				pr_object_name(dirent->d_name, vp, &vattr);
5739 			dirent->d_ino = pmkino(idx, pslot, PR_PATH);
5740 			reclen = DIRENT64_RECLEN(strlen(dirent->d_name));
5741 		} else {
5742 			break;
5743 		}
5744 
5745 		dirent->d_off = uiop->uio_offset + PRSDSIZE;
5746 		dirent->d_reclen = (ushort_t)reclen;
5747 		if (reclen > uiop->uio_resid) {
5748 			/*
5749 			 * Error if no entries have been returned yet.
5750 			 */
5751 			if (uiop->uio_resid == oresid)
5752 				error = EINVAL;
5753 			break;
5754 		}
5755 		/*
5756 		 * Drop the address space lock to do the uiomove().
5757 		 */
5758 		if (as != NULL)
5759 			AS_LOCK_EXIT(as);
5760 
5761 		error = uiomove((caddr_t)dirent, reclen, UIO_READ, uiop);
5762 		if (as != NULL)
5763 			AS_LOCK_ENTER(as, RW_WRITER);
5764 
5765 		if (error)
5766 			break;
5767 	}
5768 
5769 	if (error == 0 && eofp)
5770 		*eofp = (uiop->uio_offset >= (fddirsize + 2) * PRSDSIZE);
5771 
5772 	if (fip != NULL)
5773 		mutex_exit(&fip->fi_lock);
5774 	if (as != NULL)
5775 		AS_LOCK_EXIT(as);
5776 	mutex_enter(&p->p_lock);
5777 	prunlock(pnp);
5778 	return (error);
5779 }
5780 
5781 static int
5782 pr_readdir_tmpldir(prnode_t *pnp, uio_t *uiop, int *eofp)
5783 {
5784 	proc_t *p;
5785 	int pslot, tslot;
5786 	gfs_readdir_state_t gstate;
5787 	int error, eof = 0;
5788 	offset_t n;
5789 
5790 	ASSERT(pnp->pr_type == PR_TMPLDIR);
5791 
5792 	if ((error = prlock(pnp, ZNO)) != 0)
5793 		return (error);
5794 	p = pnp->pr_common->prc_proc;
5795 	pslot = pnp->pr_common->prc_slot;
5796 	tslot = pnp->pr_common->prc_tslot;
5797 	mutex_exit(&p->p_lock);
5798 
5799 	if ((error = gfs_readdir_init(&gstate, PRDIRSIZE, PRSDSIZE, uiop,
5800 	    pmkino(tslot, pslot, PR_LWPDIR),
5801 	    pmkino(tslot, pslot, PR_TMPLDIR), 0)) != 0) {
5802 		mutex_enter(&p->p_lock);
5803 		prunlock(pnp);
5804 		return (error);
5805 	}
5806 
5807 	while ((error = gfs_readdir_pred(&gstate, uiop, &n)) == 0) {
5808 		/*
5809 		 * Check for an active template.  Reading a directory's
5810 		 * contents is already racy, so we don't bother taking
5811 		 * any locks.
5812 		 */
5813 		while (n < ct_ntypes &&
5814 		    pnp->pr_common->prc_thread->t_lwp->lwp_ct_active[n] == NULL)
5815 			n++;
5816 		/*
5817 		 * Stop when all types have been reported.
5818 		 */
5819 		if (n >= ct_ntypes) {
5820 			eof = 1;
5821 			break;
5822 		}
5823 		/*
5824 		 * The pmkino invocation below will need to be updated
5825 		 * when we create our fifth contract type.
5826 		 */
5827 		ASSERT(ct_ntypes <= 4);
5828 		error = gfs_readdir_emit(&gstate, uiop, n,
5829 		    pmkino((tslot << 2) | n, pslot, PR_TMPL),
5830 		    ct_types[n]->ct_type_name, 0);
5831 		if (error)
5832 			break;
5833 	}
5834 
5835 	mutex_enter(&p->p_lock);
5836 	prunlock(pnp);
5837 
5838 	return (gfs_readdir_fini(&gstate, error, eofp, eof));
5839 }
5840 
5841 static int
5842 pr_readdir_ctdir(prnode_t *pnp, uio_t *uiop, int *eofp)
5843 {
5844 	proc_t *p;
5845 	int pslot;
5846 	gfs_readdir_state_t gstate;
5847 	int error, eof = 0;
5848 	offset_t n;
5849 	uint64_t zid;
5850 
5851 	ASSERT(pnp->pr_type == PR_CTDIR);
5852 
5853 	if ((error = prlock(pnp, ZNO)) != 0)
5854 		return (error);
5855 	p = pnp->pr_common->prc_proc;
5856 	pslot = p->p_slot;
5857 	mutex_exit(&p->p_lock);
5858 
5859 	if ((error = gfs_readdir_init(&gstate, PRDIRSIZE, PRSDSIZE, uiop,
5860 	    pmkino(0, pslot, PR_PIDDIR), pmkino(0, pslot, PR_CTDIR), 0)) != 0) {
5861 		mutex_enter(&p->p_lock);
5862 		prunlock(pnp);
5863 		return (error);
5864 	}
5865 
5866 	zid = VTOZONE(pnp->pr_vnode)->zone_uniqid;
5867 	while ((error = gfs_readdir_pred(&gstate, uiop, &n)) == 0) {
5868 		id_t next = contract_plookup(p, n, zid);
5869 		if (next == -1) {
5870 			eof = 1;
5871 			break;
5872 		}
5873 		error = gfs_readdir_emitn(&gstate, uiop, next,
5874 		    pmkino(next, pslot, PR_CT), next);
5875 		if (error)
5876 			break;
5877 	}
5878 
5879 	mutex_enter(&p->p_lock);
5880 	prunlock(pnp);
5881 
5882 	return (gfs_readdir_fini(&gstate, error, eofp, eof));
5883 }
5884 
5885 /* ARGSUSED */
5886 static int
5887 prfsync(vnode_t *vp, int syncflag, cred_t *cr, caller_context_t *ct)
5888 {
5889 	return (0);
5890 }
5891 
5892 /*
5893  * Utility: remove a /proc vnode from a linked list, threaded through pr_next.
5894  */
5895 static void
5896 pr_list_unlink(vnode_t *pvp, vnode_t **listp)
5897 {
5898 	vnode_t *vp;
5899 	prnode_t *pnp;
5900 
5901 	while ((vp = *listp) != NULL) {
5902 		pnp = VTOP(vp);
5903 		if (vp == pvp) {
5904 			*listp = pnp->pr_next;
5905 			pnp->pr_next = NULL;
5906 			break;
5907 		}
5908 		listp = &pnp->pr_next;
5909 	}
5910 }
5911 
5912 /* ARGSUSED */
5913 static void
5914 prinactive(vnode_t *vp, cred_t *cr, caller_context_t *ct)
5915 {
5916 	prnode_t *pnp = VTOP(vp);
5917 	prnodetype_t type = pnp->pr_type;
5918 	proc_t *p;
5919 	vnode_t *dp;
5920 	vnode_t *ovp = NULL;
5921 	prnode_t *opnp = NULL;
5922 
5923 	switch (type) {
5924 	case PR_OBJECT:
5925 	case PR_FD:
5926 	case PR_FDINFO:
5927 	case PR_SELF:
5928 	case PR_PATH:
5929 		/* These are not linked into the usual lists */
5930 		ASSERT(vp->v_count == 1);
5931 		if ((dp = pnp->pr_parent) != NULL)
5932 			VN_RELE(dp);
5933 		prfreenode(pnp);
5934 		return;
5935 	default:
5936 		break;
5937 	}
5938 
5939 	mutex_enter(&pr_pidlock);
5940 	if (pnp->pr_pcommon == NULL)
5941 		p = NULL;
5942 	else if ((p = pnp->pr_pcommon->prc_proc) != NULL)
5943 		mutex_enter(&p->p_lock);
5944 	mutex_enter(&vp->v_lock);
5945 
5946 	if (type == PR_PROCDIR || vp->v_count > 1) {
5947 		VN_RELE_LOCKED(vp);
5948 		mutex_exit(&vp->v_lock);
5949 		if (p != NULL)
5950 			mutex_exit(&p->p_lock);
5951 		mutex_exit(&pr_pidlock);
5952 		return;
5953 	}
5954 
5955 	if ((dp = pnp->pr_parent) != NULL) {
5956 		prnode_t *dpnp;
5957 
5958 		switch (type) {
5959 		case PR_PIDFILE:
5960 		case PR_LWPIDFILE:
5961 		case PR_OPAGEDATA:
5962 			break;
5963 		default:
5964 			dpnp = VTOP(dp);
5965 			mutex_enter(&dpnp->pr_mutex);
5966 			if (dpnp->pr_files != NULL &&
5967 			    dpnp->pr_files[pnp->pr_index] == vp)
5968 				dpnp->pr_files[pnp->pr_index] = NULL;
5969 			mutex_exit(&dpnp->pr_mutex);
5970 			break;
5971 		}
5972 		pnp->pr_parent = NULL;
5973 	}
5974 
5975 	ASSERT(vp->v_count == 1);
5976 
5977 	/*
5978 	 * If we allocated an old /proc/pid node, free it too.
5979 	 */
5980 	if (pnp->pr_pidfile != NULL) {
5981 		ASSERT(type == PR_PIDDIR);
5982 		ovp = pnp->pr_pidfile;
5983 		opnp = VTOP(ovp);
5984 		ASSERT(opnp->pr_type == PR_PIDFILE);
5985 		pnp->pr_pidfile = NULL;
5986 	}
5987 
5988 	mutex_exit(&pr_pidlock);
5989 
5990 	if (p != NULL) {
5991 		/*
5992 		 * Remove the vnodes from the lists of
5993 		 * /proc vnodes for the process.
5994 		 */
5995 		int slot;
5996 
5997 		switch (type) {
5998 		case PR_PIDDIR:
5999 			pr_list_unlink(vp, &p->p_trace);
6000 			break;
6001 		case PR_LWPIDDIR:
6002 			if ((slot = pnp->pr_common->prc_tslot) != -1) {
6003 				lwpent_t *lep = p->p_lwpdir[slot].ld_entry;
6004 				pr_list_unlink(vp, &lep->le_trace);
6005 			}
6006 			break;
6007 		default:
6008 			pr_list_unlink(vp, &p->p_plist);
6009 			break;
6010 		}
6011 		if (ovp != NULL)
6012 			pr_list_unlink(ovp, &p->p_plist);
6013 		mutex_exit(&p->p_lock);
6014 	}
6015 
6016 	mutex_exit(&vp->v_lock);
6017 
6018 	if (type == PR_CT && pnp->pr_contract != NULL) {
6019 		contract_rele(pnp->pr_contract);
6020 		pnp->pr_contract = NULL;
6021 	}
6022 
6023 	if (opnp != NULL)
6024 		prfreenode(opnp);
6025 	prfreenode(pnp);
6026 	if (dp != NULL) {
6027 		VN_RELE(dp);
6028 	}
6029 }
6030 
6031 /* ARGSUSED */
6032 static int
6033 prseek(vnode_t *vp, offset_t ooff, offset_t *noffp, caller_context_t *ct)
6034 {
6035 	return (0);
6036 }
6037 
6038 /*
6039  * We use the p_execdir member of proc_t to expand the %d token in core file
6040  * paths (the directory path for the executable that dumped core; see
6041  * coreadm(1M) for details). We'd like gcore(1) to be able to expand %d in
6042  * the same way as core dumping from the kernel, but there's no convenient
6043  * and comprehensible way to export the path name for p_execdir. To solve
6044  * this, we try to find the actual path to the executable that was used. In
6045  * pr_lookup_pathdir(), we mark the a.out path name vnode with the PR_AOUT
6046  * flag, and use that here to indicate that more work is needed beyond the
6047  * call to vnodetopath().
6048  */
6049 static int
6050 prreadlink_lookup(prnode_t *pnp, char *buf, size_t size, cred_t *cr)
6051 {
6052 	proc_t *p;
6053 	vnode_t *vp, *execvp, *vrootp;
6054 	int ret;
6055 	size_t len;
6056 	dirent64_t *dp;
6057 	size_t dlen = DIRENT64_RECLEN(MAXPATHLEN);
6058 	char *dbuf;
6059 
6060 	p = curproc;
6061 	mutex_enter(&p->p_lock);
6062 	if ((vrootp = PTOU(p)->u_rdir) == NULL)
6063 		vrootp = rootdir;
6064 	VN_HOLD(vrootp);
6065 	mutex_exit(&p->p_lock);
6066 
6067 	ret = vnodetopath(vrootp, pnp->pr_realvp, buf, size, cr);
6068 
6069 	/*
6070 	 * If PR_AOUT isn't set, then we looked up the path for the vnode;
6071 	 * otherwise, we looked up the path for (what we believe to be) the
6072 	 * containing directory.
6073 	 */
6074 	if ((pnp->pr_flags & PR_AOUT) == 0) {
6075 		VN_RELE(vrootp);
6076 		return (ret);
6077 	}
6078 
6079 	/*
6080 	 * Fail if there's a problem locking the process. This will only
6081 	 * occur if the process is changing so the information we would
6082 	 * report would already be invalid.
6083 	 */
6084 	if (prlock(pnp, ZNO) != 0) {
6085 		VN_RELE(vrootp);
6086 		return (EIO);
6087 	}
6088 
6089 	p = pnp->pr_common->prc_proc;
6090 	mutex_exit(&p->p_lock);
6091 
6092 	execvp = p->p_exec;
6093 	VN_HOLD(execvp);
6094 
6095 	/*
6096 	 * If our initial lookup of the directory failed, fall back to
6097 	 * the path name information for p_exec.
6098 	 */
6099 	if (ret != 0) {
6100 		mutex_enter(&p->p_lock);
6101 		prunlock(pnp);
6102 		ret = vnodetopath(vrootp, execvp, buf, size, cr);
6103 		VN_RELE(execvp);
6104 		VN_RELE(vrootp);
6105 		return (ret);
6106 	}
6107 
6108 	len = strlen(buf);
6109 
6110 	/*
6111 	 * We use u_comm as a guess for the last component of the full
6112 	 * executable path name. If there isn't going to be enough space
6113 	 * we fall back to using the p_exec so that we can have _an_
6114 	 * answer even if it's not perfect.
6115 	 */
6116 	if (strlen(PTOU(p)->u_comm) + len + 1 < size) {
6117 		buf[len] = '/';
6118 		(void) strcpy(buf + len + 1, PTOU(p)->u_comm);
6119 		mutex_enter(&p->p_lock);
6120 		prunlock(pnp);
6121 
6122 		/*
6123 		 * Do a forward lookup of our u_comm guess.
6124 		 */
6125 		if (lookupnameat(buf + len + 1, UIO_SYSSPACE, FOLLOW, NULLVPP,
6126 		    &vp, pnp->pr_realvp) == 0) {
6127 			if (vn_compare(vp, execvp)) {
6128 				VN_RELE(vp);
6129 				VN_RELE(execvp);
6130 				VN_RELE(vrootp);
6131 				return (0);
6132 			}
6133 
6134 			VN_RELE(vp);
6135 		}
6136 	} else {
6137 		mutex_enter(&p->p_lock);
6138 		prunlock(pnp);
6139 	}
6140 
6141 	dbuf = kmem_alloc(dlen, KM_SLEEP);
6142 
6143 	/*
6144 	 * Try to find a matching vnode by iterating through the directory's
6145 	 * entries. If that fails, fall back to the path information for
6146 	 * p_exec.
6147 	 */
6148 	if ((ret = dirfindvp(vrootp, pnp->pr_realvp, execvp, cr, dbuf,
6149 	    dlen, &dp)) == 0 && strlen(dp->d_name) + len + 1 < size) {
6150 		buf[len] = '/';
6151 		(void) strcpy(buf + len + 1, dp->d_name);
6152 	} else {
6153 		ret = vnodetopath(vrootp, execvp, buf, size, cr);
6154 	}
6155 
6156 	kmem_free(dbuf, dlen);
6157 	VN_RELE(execvp);
6158 	VN_RELE(vrootp);
6159 
6160 	return (ret);
6161 }
6162 
6163 /* ARGSUSED */
6164 static int
6165 prreadlink(vnode_t *vp, uio_t *uiop, cred_t *cr, caller_context_t *ctp)
6166 {
6167 	prnode_t *pnp = VTOP(vp);
6168 	char *buf;
6169 	int ret = EINVAL;
6170 	char idbuf[16];
6171 	int length, rlength;
6172 	contract_t *ct;
6173 
6174 	switch (pnp->pr_type) {
6175 	case PR_SELF:
6176 		(void) snprintf(idbuf, sizeof (idbuf), "%d", curproc->p_pid);
6177 		ret = uiomove(idbuf, strlen(idbuf), UIO_READ, uiop);
6178 		break;
6179 	case PR_OBJECT:
6180 	case PR_FD:
6181 	case PR_CURDIR:
6182 	case PR_ROOTDIR:
6183 		if (pnp->pr_realvp->v_type == VDIR)
6184 			ret = 0;
6185 		break;
6186 	case PR_PATH:
6187 		buf = kmem_alloc(MAXPATHLEN, KM_SLEEP);
6188 
6189 		if ((ret = prreadlink_lookup(pnp, buf, MAXPATHLEN, cr)) == 0)
6190 			ret = uiomove(buf, strlen(buf), UIO_READ, uiop);
6191 
6192 		kmem_free(buf, MAXPATHLEN);
6193 		break;
6194 	case PR_CT:
6195 		ASSERT(pnp->pr_contract != NULL);
6196 		ct = pnp->pr_contract;
6197 		length = sizeof (CTFS_ROOT "//") + sizeof (idbuf) +
6198 		    strlen(ct->ct_type->ct_type_name);
6199 		buf = kmem_alloc(length, KM_SLEEP);
6200 		rlength = snprintf(buf, length, CTFS_ROOT "/%s/%d",
6201 		    ct->ct_type->ct_type_name, ct->ct_id);
6202 		ASSERT(rlength < length);
6203 		ret = uiomove(buf, rlength, UIO_READ, uiop);
6204 		kmem_free(buf, length);
6205 		break;
6206 	default:
6207 		break;
6208 	}
6209 
6210 	return (ret);
6211 }
6212 
6213 /*ARGSUSED2*/
6214 static int
6215 prcmp(vnode_t *vp1, vnode_t *vp2, caller_context_t *ct)
6216 {
6217 	prnode_t *pp1, *pp2;
6218 
6219 	if (vp1 == vp2)
6220 		return (1);
6221 
6222 	if (!vn_matchops(vp1, prvnodeops) || !vn_matchops(vp2, prvnodeops))
6223 		return (0);
6224 
6225 	pp1 = VTOP(vp1);
6226 	pp2 = VTOP(vp2);
6227 
6228 	if (pp1->pr_type != pp2->pr_type)
6229 		return (0);
6230 	if (pp1->pr_type == PR_PROCDIR)
6231 		return (1);
6232 	if (pp1->pr_ino || pp2->pr_ino)
6233 		return (pp2->pr_ino == pp1->pr_ino);
6234 
6235 	if (pp1->pr_common == NULL || pp2->pr_common == NULL)
6236 		return (0);
6237 
6238 	return (pp1->pr_common->prc_slot == pp2->pr_common->prc_slot &&
6239 	    pp1->pr_common->prc_tslot == pp2->pr_common->prc_tslot);
6240 }
6241 
6242 static int
6243 prrealvp(vnode_t *vp, vnode_t **vpp, caller_context_t *ct)
6244 {
6245 	vnode_t *rvp;
6246 
6247 	if ((rvp = VTOP(vp)->pr_realvp) != NULL) {
6248 		vp = rvp;
6249 		if (VOP_REALVP(vp, &rvp, ct) == 0)
6250 			vp = rvp;
6251 	}
6252 
6253 	*vpp = vp;
6254 	return (0);
6255 }
6256 
6257 /*
6258  * Return the answer requested to poll().
6259  * POLLIN, POLLRDNORM, and POLLOUT are recognized as in fs_poll().
6260  * In addition, these have special meaning for /proc files:
6261  *	POLLPRI		process or lwp stopped on an event of interest
6262  *	POLLERR		/proc file descriptor is invalid
6263  *	POLLHUP		process or lwp has terminated
6264  */
6265 /*ARGSUSED5*/
6266 static int
6267 prpoll(vnode_t *vp, short events, int anyyet, short *reventsp,
6268     pollhead_t **phpp, caller_context_t *ct)
6269 {
6270 	prnode_t *pnp = VTOP(vp);
6271 	prcommon_t *pcp = pnp->pr_common;
6272 	pollhead_t *php = &pcp->prc_pollhead;
6273 	proc_t *p;
6274 	short revents;
6275 	int error;
6276 	int lockstate;
6277 
6278 	ASSERT(pnp->pr_type < PR_NFILES);
6279 
6280 	/*
6281 	 * Support for old /proc interface.
6282 	 */
6283 	if (pnp->pr_pidfile != NULL) {
6284 		vp = pnp->pr_pidfile;
6285 		pnp = VTOP(vp);
6286 		ASSERT(pnp->pr_type == PR_PIDFILE);
6287 		ASSERT(pnp->pr_common == pcp);
6288 	}
6289 
6290 	*reventsp = revents = 0;
6291 	*phpp = (pollhead_t *)NULL;
6292 
6293 	if (vp->v_type == VDIR) {
6294 		*reventsp |= POLLNVAL;
6295 		return (0);
6296 	}
6297 
6298 	/* avoid deadlock with prnotify() */
6299 	if (pollunlock(&lockstate) != 0) {
6300 		*reventsp = POLLNVAL;
6301 		return (0);
6302 	}
6303 
6304 	if ((error = prlock(pnp, ZNO)) != 0) {
6305 		pollrelock(lockstate);
6306 		switch (error) {
6307 		case ENOENT:		/* process or lwp died */
6308 			*reventsp = POLLHUP;
6309 			error = 0;
6310 			break;
6311 		case EAGAIN:		/* invalidated */
6312 			*reventsp = POLLERR;
6313 			error = 0;
6314 			break;
6315 		}
6316 		return (error);
6317 	}
6318 
6319 	/*
6320 	 * We have the process marked locked (P_PR_LOCK) and we are holding
6321 	 * its p->p_lock.  We want to unmark the process but retain
6322 	 * exclusive control w.r.t. other /proc controlling processes
6323 	 * before reacquiring the polling locks.
6324 	 *
6325 	 * prunmark() does this for us.  It unmarks the process
6326 	 * but retains p->p_lock so we still have exclusive control.
6327 	 * We will drop p->p_lock at the end to relinquish control.
6328 	 *
6329 	 * We cannot call prunlock() at the end to relinquish control
6330 	 * because prunlock(), like prunmark(), may drop and reacquire
6331 	 * p->p_lock and that would lead to a lock order violation
6332 	 * w.r.t. the polling locks we are about to reacquire.
6333 	 */
6334 	p = pcp->prc_proc;
6335 	ASSERT(p != NULL);
6336 	prunmark(p);
6337 
6338 	pollrelock(lockstate);		/* reacquire dropped poll locks */
6339 
6340 	if ((p->p_flag & SSYS) || p->p_as == &kas)
6341 		revents = POLLNVAL;
6342 	else {
6343 		short ev;
6344 
6345 		if ((ev = (events & (POLLIN|POLLRDNORM))) != 0)
6346 			revents |= ev;
6347 		/*
6348 		 * POLLWRNORM (same as POLLOUT) really should not be
6349 		 * used to indicate that the process or lwp stopped.
6350 		 * However, USL chose to use POLLWRNORM rather than
6351 		 * POLLPRI to indicate this, so we just accept either
6352 		 * requested event to indicate stopped.  (grr...)
6353 		 */
6354 		if ((ev = (events & (POLLPRI|POLLOUT|POLLWRNORM))) != 0) {
6355 			kthread_t *t;
6356 
6357 			if (pcp->prc_flags & PRC_LWP) {
6358 				t = pcp->prc_thread;
6359 				ASSERT(t != NULL);
6360 				thread_lock(t);
6361 			} else {
6362 				t = prchoose(p);	/* returns locked t */
6363 				ASSERT(t != NULL);
6364 			}
6365 
6366 			if (ISTOPPED(t) || VSTOPPED(t))
6367 				revents |= ev;
6368 			thread_unlock(t);
6369 		}
6370 	}
6371 
6372 	*reventsp = revents;
6373 	if ((!anyyet && revents == 0) || (events & POLLET)) {
6374 		/*
6375 		 * Arrange to wake up the polling lwp when
6376 		 * the target process/lwp stops or terminates
6377 		 * or when the file descriptor becomes invalid.
6378 		 */
6379 		pcp->prc_flags |= PRC_POLL;
6380 		*phpp = php;
6381 	}
6382 	mutex_exit(&p->p_lock);
6383 	return (0);
6384 }
6385 
6386 /* in prioctl.c */
6387 extern int prioctl(vnode_t *, int, intptr_t, int, cred_t *, int *,
6388 	caller_context_t *);
6389 
6390 /*
6391  * /proc vnode operations vector
6392  */
6393 const fs_operation_def_t pr_vnodeops_template[] = {
6394 	VOPNAME_OPEN,		{ .vop_open = propen },
6395 	VOPNAME_CLOSE,		{ .vop_close = prclose },
6396 	VOPNAME_READ,		{ .vop_read = prread },
6397 	VOPNAME_WRITE,		{ .vop_write = prwrite },
6398 	VOPNAME_IOCTL,		{ .vop_ioctl = prioctl },
6399 	VOPNAME_GETATTR,	{ .vop_getattr = prgetattr },
6400 	VOPNAME_ACCESS,		{ .vop_access = praccess },
6401 	VOPNAME_LOOKUP,		{ .vop_lookup = prlookup },
6402 	VOPNAME_CREATE,		{ .vop_create = prcreate },
6403 	VOPNAME_READDIR,	{ .vop_readdir = prreaddir },
6404 	VOPNAME_READLINK,	{ .vop_readlink = prreadlink },
6405 	VOPNAME_FSYNC,		{ .vop_fsync = prfsync },
6406 	VOPNAME_INACTIVE,	{ .vop_inactive = prinactive },
6407 	VOPNAME_SEEK,		{ .vop_seek = prseek },
6408 	VOPNAME_CMP,		{ .vop_cmp = prcmp },
6409 	VOPNAME_FRLOCK,		{ .error = fs_error },
6410 	VOPNAME_REALVP,		{ .vop_realvp = prrealvp },
6411 	VOPNAME_POLL,		{ .vop_poll = prpoll },
6412 	VOPNAME_DISPOSE,	{ .error = fs_error },
6413 	VOPNAME_SHRLOCK,	{ .error = fs_error },
6414 	NULL,			NULL
6415 };
6416