xref: /titanic_52/usr/src/cmd/mdb/common/modules/genunix/vfs.c (revision b24ab6762772a3f6a89393947930c7fa61306783)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #include <mdb/mdb_modapi.h>
27 #include <mdb/mdb_ks.h>
28 
29 #include <sys/types.h>
30 #include <sys/systm.h>
31 #include <sys/door.h>
32 #include <sys/file.h>
33 #include <sys/mount.h>
34 #include <sys/proc.h>
35 #include <sys/procfs.h>
36 #include <sys/proc/prdata.h>
37 #include <sys/stat.h>
38 #include <sys/vfs.h>
39 #include <sys/vnode.h>
40 #include <sys/fs/snode.h>
41 #include <sys/fs/fifonode.h>
42 #include <sys/fs/namenode.h>
43 #include <sys/socket.h>
44 #include <sys/stropts.h>
45 #include <sys/socketvar.h>
46 #include <sys/strsubr.h>
47 #include <sys/un.h>
48 #include <fs/sockfs/socktpi_impl.h>
49 #include <inet/ipclassifier.h>
50 #include <inet/ip_if.h>
51 #include <inet/sctp/sctp_impl.h>
52 #include <inet/sctp/sctp_addr.h>
53 
54 int
55 vfs_walk_init(mdb_walk_state_t *wsp)
56 {
57 	if (wsp->walk_addr == NULL &&
58 	    mdb_readvar(&wsp->walk_addr, "rootvfs") == -1) {
59 		mdb_warn("failed to read 'rootvfs'");
60 		return (WALK_ERR);
61 	}
62 
63 	wsp->walk_data = (void *)wsp->walk_addr;
64 	return (WALK_NEXT);
65 }
66 
67 int
68 vfs_walk_step(mdb_walk_state_t *wsp)
69 {
70 	vfs_t vfs;
71 	int status;
72 
73 	if (mdb_vread(&vfs, sizeof (vfs), wsp->walk_addr) == -1) {
74 		mdb_warn("failed to read vfs_t at %p", wsp->walk_addr);
75 		return (WALK_DONE);
76 	}
77 
78 	status = wsp->walk_callback(wsp->walk_addr, &vfs, wsp->walk_cbdata);
79 
80 	if (vfs.vfs_next == wsp->walk_data)
81 		return (WALK_DONE);
82 
83 	wsp->walk_addr = (uintptr_t)vfs.vfs_next;
84 
85 	return (status);
86 }
87 
88 /*
89  * Utility routine to read in a filesystem name given a vfs pointer.  If
90  * no vfssw entry for the vfs is available (as is the case with some pseudo-
91  * filesystems), we check against some known problem fs's: doorfs and
92  * portfs.  If that fails, we try to guess the filesystem name using
93  * symbol names.  fsname should be a buffer of size _ST_FSTYPSZ.
94  */
95 static int
96 read_fsname(uintptr_t vfsp, char *fsname)
97 {
98 	vfs_t vfs;
99 	struct vfssw vfssw_entry;
100 	GElf_Sym vfssw_sym, test_sym;
101 	char testname[MDB_SYM_NAMLEN];
102 
103 	if (mdb_vread(&vfs, sizeof (vfs), vfsp) == -1) {
104 		mdb_warn("failed to read vfs %p", vfsp);
105 		return (-1);
106 	}
107 
108 	if (mdb_lookup_by_name("vfssw", &vfssw_sym) == -1) {
109 		mdb_warn("failed to find vfssw");
110 		return (-1);
111 	}
112 
113 	/*
114 	 * vfssw is an array; we need vfssw[vfs.vfs_fstype].
115 	 */
116 	if (mdb_vread(&vfssw_entry, sizeof (vfssw_entry),
117 	    vfssw_sym.st_value + (sizeof (struct vfssw) * vfs.vfs_fstype))
118 	    == -1) {
119 		mdb_warn("failed to read vfssw index %d", vfs.vfs_fstype);
120 		return (-1);
121 	}
122 
123 	if (vfs.vfs_fstype != 0) {
124 		if (mdb_readstr(fsname, _ST_FSTYPSZ,
125 		    (uintptr_t)vfssw_entry.vsw_name) == -1) {
126 			mdb_warn("failed to find fs name %p",
127 			    vfssw_entry.vsw_name);
128 			return (-1);
129 		}
130 		return (0);
131 	}
132 
133 	/*
134 	 * Do precise detection for certain filesystem types that we
135 	 * know do not appear in vfssw[], and that we depend upon in other
136 	 * parts of the code: doorfs and portfs.
137 	 */
138 	if (mdb_lookup_by_name("door_vfs", &test_sym) != -1) {
139 		if (test_sym.st_value == vfsp) {
140 			strcpy(fsname, "doorfs");
141 			return (0);
142 		}
143 	}
144 	if (mdb_lookup_by_name("port_vfs", &test_sym) != -1) {
145 		if (test_sym.st_value == vfsp) {
146 			strcpy(fsname, "portfs");
147 			return (0);
148 		}
149 	}
150 
151 	/*
152 	 * Heuristic detection for other filesystems that don't have a
153 	 * vfssw[] entry.  These tend to be named <fsname>_vfs, so we do a
154 	 * lookup_by_addr and see if we find a symbol of that name.
155 	 */
156 	if (mdb_lookup_by_addr(vfsp, MDB_SYM_EXACT, testname, sizeof (testname),
157 	    &test_sym) != -1) {
158 		if ((strlen(testname) > 4) &&
159 		    (strcmp(testname + strlen(testname) - 4, "_vfs") == 0)) {
160 			testname[strlen(testname) - 4] = '\0';
161 			strncpy(fsname, testname, _ST_FSTYPSZ);
162 			return (0);
163 		}
164 	}
165 
166 	mdb_warn("unknown filesystem type for vfs %p", vfsp);
167 	return (-1);
168 }
169 
170 /*
171  * Column widths for mount point display in ::fsinfo output.
172  */
173 #ifdef _LP64
174 #define	FSINFO_MNTLEN	48
175 #else
176 #define	FSINFO_MNTLEN	56
177 #endif
178 
179 /* ARGSUSED */
180 int
181 fsinfo(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
182 {
183 	vfs_t vfs;
184 	int len;
185 	int opt_v = 0;
186 	char buf[MAXPATHLEN];
187 	char fsname[_ST_FSTYPSZ];
188 	mntopt_t *mntopts;
189 	size_t size;
190 	int i;
191 	int first = 1;
192 	char opt[MAX_MNTOPT_STR];
193 	uintptr_t global_zone;
194 
195 	if (!(flags & DCMD_ADDRSPEC)) {
196 		if (mdb_walk_dcmd("vfs", "fsinfo", argc, argv) == -1) {
197 			mdb_warn("failed to walk file system list");
198 			return (DCMD_ERR);
199 		}
200 		return (DCMD_OK);
201 	}
202 
203 	if (mdb_getopts(argc, argv,
204 	    'v', MDB_OPT_SETBITS, TRUE, &opt_v, NULL) != argc)
205 		return (DCMD_USAGE);
206 
207 	if (DCMD_HDRSPEC(flags))
208 		mdb_printf("%<u>%?s %-15s %s%</u>\n",
209 		    "VFSP", "FS", "MOUNT");
210 
211 	if (mdb_vread(&vfs, sizeof (vfs), addr) == -1) {
212 		mdb_warn("failed to read vfs_t %p", addr);
213 		return (DCMD_ERR);
214 	}
215 
216 	if ((len = mdb_read_refstr((uintptr_t)vfs.vfs_mntpt, buf,
217 	    sizeof (buf))) <= 0)
218 		strcpy(buf, "??");
219 
220 	else if (!opt_v && (len >= FSINFO_MNTLEN))
221 		/*
222 		 * In normal mode, we truncate the path to keep the output
223 		 * clean.  In -v mode, we just print the full path.
224 		 */
225 		strcpy(&buf[FSINFO_MNTLEN - 4], "...");
226 
227 	if (read_fsname(addr, fsname) == -1)
228 		return (DCMD_ERR);
229 
230 	mdb_printf("%0?p %-15s %s\n", addr, fsname, buf);
231 
232 	if (!opt_v)
233 		return (DCMD_OK);
234 
235 	/*
236 	 * Print 'resource' string; this shows what we're mounted upon.
237 	 */
238 	if (mdb_read_refstr((uintptr_t)vfs.vfs_resource, buf,
239 	    MAXPATHLEN) <= 0)
240 		strcpy(buf, "??");
241 
242 	mdb_printf("%?s %s\n", "R:", buf);
243 
244 	/*
245 	 * Print mount options array; it sucks to be a mimic, but we copy
246 	 * the same logic as in mntvnops.c for adding zone= tags, and we
247 	 * don't bother with the obsolete dev= option.
248 	 */
249 	size = vfs.vfs_mntopts.mo_count * sizeof (mntopt_t);
250 	mntopts = mdb_alloc(size, UM_SLEEP | UM_GC);
251 
252 	if (mdb_vread(mntopts, size,
253 	    (uintptr_t)vfs.vfs_mntopts.mo_list) == -1) {
254 		mdb_warn("failed to read mntopts %p", vfs.vfs_mntopts.mo_list);
255 		return (DCMD_ERR);
256 	}
257 
258 	for (i = 0; i < vfs.vfs_mntopts.mo_count; i++) {
259 		if (mntopts[i].mo_flags & MO_SET) {
260 			if (mdb_readstr(opt, sizeof (opt),
261 			    (uintptr_t)mntopts[i].mo_name) == -1) {
262 				mdb_warn("failed to read mntopt name %p",
263 				    mntopts[i].mo_name);
264 				return (DCMD_ERR);
265 			}
266 			if (first) {
267 				mdb_printf("%?s ", "O:");
268 				first = 0;
269 			} else {
270 				mdb_printf(",");
271 			}
272 			mdb_printf("%s", opt);
273 			if (mntopts[i].mo_flags & MO_HASVALUE) {
274 				if (mdb_readstr(opt, sizeof (opt),
275 				    (uintptr_t)mntopts[i].mo_arg) == -1) {
276 					mdb_warn("failed to read mntopt "
277 					    "value %p", mntopts[i].mo_arg);
278 					return (DCMD_ERR);
279 				}
280 				mdb_printf("=%s", opt);
281 			}
282 		}
283 	}
284 
285 	if (mdb_readvar(&global_zone, "global_zone") == -1) {
286 		mdb_warn("failed to locate global_zone");
287 		return (DCMD_ERR);
288 	}
289 
290 	if ((vfs.vfs_zone != NULL) &&
291 	    ((uintptr_t)vfs.vfs_zone != global_zone)) {
292 		zone_t z;
293 
294 		if (mdb_vread(&z, sizeof (z), (uintptr_t)vfs.vfs_zone) == -1) {
295 			mdb_warn("failed to read zone");
296 			return (DCMD_ERR);
297 		}
298 		/*
299 		 * zone names are much shorter than MAX_MNTOPT_STR
300 		 */
301 		if (mdb_readstr(opt, sizeof (opt),
302 		    (uintptr_t)z.zone_name) == -1) {
303 			mdb_warn("failed to read zone name");
304 			return (DCMD_ERR);
305 		}
306 		if (first) {
307 			mdb_printf("%?s ", "O:");
308 		} else {
309 			mdb_printf(",");
310 		}
311 		mdb_printf("zone=%s", opt);
312 	}
313 	return (DCMD_OK);
314 }
315 
316 
317 #define	REALVP_DONE	0
318 #define	REALVP_ERR	1
319 #define	REALVP_CONTINUE	2
320 
321 static int
322 next_realvp(uintptr_t invp, struct vnode *outvn, uintptr_t *outvp)
323 {
324 	char fsname[_ST_FSTYPSZ];
325 
326 	*outvp = invp;
327 	if (mdb_vread(outvn, sizeof (struct vnode), invp) == -1) {
328 		mdb_warn("failed to read vnode at %p", invp);
329 		return (REALVP_ERR);
330 	}
331 
332 	if (read_fsname((uintptr_t)outvn->v_vfsp, fsname) == -1)
333 		return (REALVP_ERR);
334 
335 	/*
336 	 * We know how to do 'realvp' for as many filesystems as possible;
337 	 * for all other filesystems, we assume that the vp we are given
338 	 * is the realvp.  In the kernel, a realvp operation will sometimes
339 	 * dig through multiple layers.  Here, we only fetch the pointer
340 	 * to the next layer down.  This allows dcmds to print out the
341 	 * various layers.
342 	 */
343 	if (strcmp(fsname, "fifofs") == 0) {
344 		fifonode_t fn;
345 		if (mdb_vread(&fn, sizeof (fn),
346 		    (uintptr_t)outvn->v_data) == -1) {
347 			mdb_warn("failed to read fifonode");
348 			return (REALVP_ERR);
349 		}
350 		*outvp = (uintptr_t)fn.fn_realvp;
351 
352 	} else if (strcmp(fsname, "namefs") == 0) {
353 		struct namenode nn;
354 		if (mdb_vread(&nn, sizeof (nn),
355 		    (uintptr_t)outvn->v_data) == -1) {
356 			mdb_warn("failed to read namenode");
357 			return (REALVP_ERR);
358 		}
359 		*outvp = (uintptr_t)nn.nm_filevp;
360 
361 	} else if (outvn->v_type == VSOCK && outvn->v_stream != NULL) {
362 		struct stdata stream;
363 
364 		/*
365 		 * Sockets have a strange and different layering scheme; we
366 		 * hop over into the sockfs vnode (accessible via the stream
367 		 * head) if possible.
368 		 */
369 		if (mdb_vread(&stream, sizeof (stream),
370 		    (uintptr_t)outvn->v_stream) == -1) {
371 			mdb_warn("failed to read stream data");
372 			return (REALVP_ERR);
373 		}
374 		*outvp = (uintptr_t)stream.sd_vnode;
375 	}
376 
377 	if (*outvp == invp || *outvp == NULL)
378 		return (REALVP_DONE);
379 
380 	return (REALVP_CONTINUE);
381 }
382 
383 static void
384 pfiles_print_addr(struct sockaddr *addr)
385 {
386 	struct sockaddr_in *s_in;
387 	struct sockaddr_un *s_un;
388 	struct sockaddr_in6 *s_in6;
389 	in_port_t port;
390 
391 	switch (addr->sa_family) {
392 	case AF_INET:
393 		/* LINTED: alignment */
394 		s_in = (struct sockaddr_in *)addr;
395 		mdb_nhconvert(&port, &s_in->sin_port, sizeof (port));
396 		mdb_printf("AF_INET %I %d ", s_in->sin_addr.s_addr, port);
397 		break;
398 
399 	case AF_INET6:
400 		/* LINTED: alignment */
401 		s_in6 = (struct sockaddr_in6 *)addr;
402 		mdb_nhconvert(&port, &s_in6->sin6_port, sizeof (port));
403 		mdb_printf("AF_INET6 %N %d ", &(s_in6->sin6_addr), port);
404 		break;
405 
406 	case AF_UNIX:
407 		s_un = (struct sockaddr_un *)addr;
408 		mdb_printf("AF_UNIX %s ", s_un->sun_path);
409 		break;
410 	default:
411 		mdb_printf("AF_?? (%d) ", addr->sa_family);
412 		break;
413 	}
414 }
415 
416 static int
417 pfiles_get_sonode(vnode_t *v_sock, struct sonode *sonode)
418 {
419 	if (mdb_vread(sonode, sizeof (struct sonode),
420 	    (uintptr_t)v_sock->v_data) == -1) {
421 		mdb_warn("failed to read sonode");
422 		return (-1);
423 	}
424 
425 	return (0);
426 }
427 
428 static int
429 pfiles_get_tpi_sonode(vnode_t *v_sock, sotpi_sonode_t *sotpi_sonode)
430 {
431 
432 	struct stdata stream;
433 
434 	if (mdb_vread(&stream, sizeof (stream),
435 	    (uintptr_t)v_sock->v_stream) == -1) {
436 		mdb_warn("failed to read stream data");
437 		return (-1);
438 	}
439 
440 	if (mdb_vread(v_sock, sizeof (vnode_t),
441 	    (uintptr_t)stream.sd_vnode) == -1) {
442 		mdb_warn("failed to read stream vnode");
443 		return (-1);
444 	}
445 
446 	if (mdb_vread(sotpi_sonode, sizeof (sotpi_sonode_t),
447 	    (uintptr_t)v_sock->v_data) == -1) {
448 		mdb_warn("failed to read sotpi_sonode");
449 		return (-1);
450 	}
451 
452 	return (0);
453 }
454 
455 /*
456  * Do some digging to get a reasonable pathname for this vnode. 'path'
457  * should point at a buffer of MAXPATHLEN in size.
458  */
459 static int
460 pfiles_dig_pathname(uintptr_t vp, char *path)
461 {
462 	vnode_t v;
463 
464 	bzero(path, MAXPATHLEN);
465 
466 	if (mdb_vread(&v, sizeof (v), vp) == -1) {
467 		mdb_warn("failed to read vnode");
468 		return (-1);
469 	}
470 
471 	if (v.v_path == NULL) {
472 		/*
473 		 * fifo's and doors are special.   Some have pathnames, and
474 		 * some do not.  And for these, it is pointless to go off to
475 		 * mdb_vnode2path, which is very slow.
476 		 *
477 		 * Event ports never have a pathname.
478 		 */
479 		if (v.v_type == VFIFO || v.v_type == VDOOR || v.v_type == VPORT)
480 			return (0);
481 
482 		/*
483 		 * For sockets, we won't find a path unless we print the path
484 		 * associated with transport's STREAM device.
485 		 */
486 		if (v.v_type == VSOCK) {
487 			struct sonode sonode;
488 			struct sockparams sockparams;
489 
490 			if (pfiles_get_sonode(&v, &sonode) == -1) {
491 				return (-1);
492 			}
493 			if (mdb_vread(&sockparams, sizeof (sockparams),
494 			    (uintptr_t)sonode.so_sockparams) == -1) {
495 				mdb_warn("failed to read sockparams");
496 				return (-1);
497 			}
498 
499 			if (!SOCK_IS_NONSTR(&sonode)) {
500 				vp = (uintptr_t)
501 				    sockparams.sp_sdev_info.sd_vnode;
502 			} else {
503 				vp = NULL;
504 			}
505 		}
506 	}
507 
508 
509 	/*
510 	 * mdb_vnode2path will print an error for us as needed, but not
511 	 * finding a pathname is not really an error, so we plow on.
512 	 */
513 	(void) mdb_vnode2path(vp, path, MAXPATHLEN);
514 
515 	/*
516 	 * A common problem is that device pathnames are prefixed with
517 	 * /dev/../devices/.  We just clean those up slightly:
518 	 * 	/dev/../devices/<mumble> --> /devices/<mumble>
519 	 * 	/dev/pts/../../devices/<mumble> --> /devices/<mumble>
520 	 */
521 	if (strncmp("/dev/../devices/", path, strlen("/dev/../devices/")) == 0)
522 		strcpy(path, path + 7);
523 
524 	if (strncmp("/dev/pts/../../devices/", path,
525 	    strlen("/dev/pts/../../devices/")) == 0)
526 		strcpy(path, path + 14);
527 
528 	return (0);
529 }
530 
531 const struct fs_type {
532 	int type;
533 	const char *name;
534 } fs_types[] = {
535 	{ VNON,   "NON" },
536 	{ VREG,   "REG" },
537 	{ VDIR,   "DIR" },
538 	{ VBLK,   "BLK" },
539 	{ VCHR,   "CHR" },
540 	{ VLNK,   "LNK" },
541 	{ VFIFO,  "FIFO" },
542 	{ VDOOR,  "DOOR" },
543 	{ VPROC,  "PROC" },
544 	{ VSOCK,  "SOCK" },
545 	{ VPORT,  "PORT" },
546 	{ VBAD,   "BAD" }
547 };
548 
549 #define	NUM_FS_TYPES (sizeof (fs_types) / sizeof (struct fs_type))
550 
551 struct pfiles_cbdata {
552 	int opt_p;
553 	int fd;
554 };
555 
556 #define	list_d2l(a, obj) ((list_node_t *)(((char *)obj) + (a)->list_offset))
557 #define	list_object(a, node) ((void *)(((char *)node) - (a)->list_offset))
558 
559 /*
560  * SCTP interface for geting the first source address of a sctp_t.
561  */
562 int
563 sctp_getsockaddr(sctp_t *sctp, struct sockaddr *addr)
564 {
565 	int			err = -1;
566 	int			i;
567 	int			l;
568 	sctp_saddr_ipif_t	*pobj;
569 	sctp_saddr_ipif_t	obj;
570 	size_t			added = 0;
571 	sin6_t			*sin6;
572 	sin_t			*sin4;
573 	int			scanned = 0;
574 	boolean_t		skip_lback = B_FALSE;
575 
576 	addr->sa_family = sctp->sctp_family;
577 	if (sctp->sctp_nsaddrs == 0)
578 		goto done;
579 
580 	/*
581 	 * Skip loopback addresses for non-loopback assoc.
582 	 */
583 	if (sctp->sctp_state >= SCTPS_ESTABLISHED && !sctp->sctp_loopback) {
584 		skip_lback = B_TRUE;
585 	}
586 
587 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
588 		if (sctp->sctp_saddrs[i].ipif_count == 0)
589 			continue;
590 
591 		pobj = list_object(&sctp->sctp_saddrs[i].sctp_ipif_list,
592 		    sctp->sctp_saddrs[i].sctp_ipif_list.list_head.list_next);
593 		if (mdb_vread(&obj, sizeof (sctp_saddr_ipif_t),
594 		    (uintptr_t)pobj) == -1) {
595 			mdb_warn("failed to read sctp_saddr_ipif_t");
596 			return (err);
597 		}
598 
599 		for (l = 0; l < sctp->sctp_saddrs[i].ipif_count; l++) {
600 			sctp_ipif_t	ipif;
601 			in6_addr_t	laddr;
602 			list_node_t 	*pnode;
603 			list_node_t	node;
604 
605 			if (mdb_vread(&ipif, sizeof (sctp_ipif_t),
606 			    (uintptr_t)obj.saddr_ipifp) == -1) {
607 				mdb_warn("failed to read sctp_ipif_t");
608 				return (err);
609 			}
610 			laddr = ipif.sctp_ipif_saddr;
611 
612 			scanned++;
613 			if ((ipif.sctp_ipif_state == SCTP_IPIFS_CONDEMNED) ||
614 			    SCTP_DONT_SRC(&obj) ||
615 			    (ipif.sctp_ipif_ill->sctp_ill_flags &
616 			    PHYI_LOOPBACK) && skip_lback) {
617 				if (scanned >= sctp->sctp_nsaddrs)
618 					goto done;
619 
620 				/* LINTED: alignment */
621 				pnode = list_d2l(&sctp->sctp_saddrs[i].
622 				    sctp_ipif_list, pobj);
623 				if (mdb_vread(&node, sizeof (list_node_t),
624 				    (uintptr_t)pnode) == -1) {
625 					mdb_warn("failed to read list_node_t");
626 					return (err);
627 				}
628 				pobj = list_object(&sctp->sctp_saddrs[i].
629 				    sctp_ipif_list, node.list_next);
630 				if (mdb_vread(&obj, sizeof (sctp_saddr_ipif_t),
631 				    (uintptr_t)pobj) == -1) {
632 					mdb_warn("failed to read "
633 					    "sctp_saddr_ipif_t");
634 					return (err);
635 				}
636 				continue;
637 			}
638 
639 			switch (sctp->sctp_family) {
640 			case AF_INET:
641 				/* LINTED: alignment */
642 				sin4 = (sin_t *)addr;
643 				if ((sctp->sctp_state <= SCTPS_LISTEN) &&
644 				    sctp->sctp_bound_to_all) {
645 					sin4->sin_addr.s_addr = INADDR_ANY;
646 					sin4->sin_port = sctp->sctp_lport;
647 				} else {
648 					sin4 += added;
649 					sin4->sin_family = AF_INET;
650 					sin4->sin_port = sctp->sctp_lport;
651 					IN6_V4MAPPED_TO_INADDR(&laddr,
652 					    &sin4->sin_addr);
653 				}
654 				break;
655 
656 			case AF_INET6:
657 				/* LINTED: alignment */
658 				sin6 = (sin6_t *)addr;
659 				if ((sctp->sctp_state <= SCTPS_LISTEN) &&
660 				    sctp->sctp_bound_to_all) {
661 					bzero(&sin6->sin6_addr,
662 					    sizeof (sin6->sin6_addr));
663 					sin6->sin6_port = sctp->sctp_lport;
664 				} else {
665 					sin6 += added;
666 					sin6->sin6_family = AF_INET6;
667 					sin6->sin6_port = sctp->sctp_lport;
668 					sin6->sin6_addr = laddr;
669 				}
670 				sin6->sin6_flowinfo = sctp->sctp_ip6h->ip6_vcf &
671 				    ~IPV6_VERS_AND_FLOW_MASK;
672 				sin6->sin6_scope_id = 0;
673 				sin6->__sin6_src_id = 0;
674 				break;
675 			}
676 			added++;
677 			if (added >= 1) {
678 				err = 0;
679 				goto done;
680 			}
681 			if (scanned >= sctp->sctp_nsaddrs)
682 				goto done;
683 
684 			/* LINTED: alignment */
685 			pnode = list_d2l(&sctp->sctp_saddrs[i].sctp_ipif_list,
686 			    pobj);
687 			if (mdb_vread(&node, sizeof (list_node_t),
688 			    (uintptr_t)pnode) == -1) {
689 				mdb_warn("failed to read list_node_t");
690 				return (err);
691 			}
692 			pobj = list_object(&sctp->sctp_saddrs[i].
693 			    sctp_ipif_list, node.list_next);
694 			if (mdb_vread(&obj, sizeof (sctp_saddr_ipif_t),
695 			    (uintptr_t)pobj) == -1) {
696 				mdb_warn("failed to read sctp_saddr_ipif_t");
697 				return (err);
698 			}
699 		}
700 	}
701 done:
702 	return (err);
703 }
704 
705 /*
706  * SCTP interface for geting the primary peer address of a sctp_t.
707  */
708 static int
709 sctp_getpeeraddr(sctp_t *sctp, struct sockaddr *addr)
710 {
711 	struct sockaddr_in	*sin4;
712 	struct sockaddr_in6	*sin6;
713 	sctp_faddr_t		sctp_primary;
714 	in6_addr_t		faddr;
715 
716 	if (sctp->sctp_faddrs == NULL)
717 		return (-1);
718 
719 	addr->sa_family = sctp->sctp_family;
720 	if (mdb_vread(&sctp_primary, sizeof (sctp_faddr_t),
721 	    (uintptr_t)sctp->sctp_primary) == -1) {
722 		mdb_warn("failed to read sctp primary faddr");
723 		return (-1);
724 	}
725 	faddr = sctp_primary.faddr;
726 
727 	switch (sctp->sctp_family) {
728 	case AF_INET:
729 		/* LINTED: alignment */
730 		sin4 = (struct sockaddr_in *)addr;
731 		IN6_V4MAPPED_TO_INADDR(&faddr, &sin4->sin_addr);
732 		sin4->sin_port = sctp->sctp_fport;
733 		sin4->sin_family = AF_INET;
734 		break;
735 
736 	case AF_INET6:
737 		/* LINTED: alignment */
738 		sin6 = (struct sockaddr_in6 *)addr;
739 		sin6->sin6_addr = faddr;
740 		sin6->sin6_port = sctp->sctp_fport;
741 		sin6->sin6_family = AF_INET6;
742 		sin6->sin6_flowinfo = 0;
743 		sin6->sin6_scope_id = 0;
744 		sin6->__sin6_src_id = 0;
745 		break;
746 	}
747 
748 	return (0);
749 }
750 
751 static int
752 tpi_sock_print(sotpi_sonode_t *sotpi_sonode)
753 {
754 	if (sotpi_sonode->st_info.sti_laddr_valid == 1) {
755 		struct sockaddr *laddr =
756 		    mdb_alloc(sotpi_sonode->st_info.sti_laddr_len, UM_SLEEP);
757 		if (mdb_vread(laddr, sotpi_sonode->st_info.sti_laddr_len,
758 		    (uintptr_t)sotpi_sonode->st_info.sti_laddr_sa) == -1) {
759 			mdb_warn("failed to read sotpi_sonode socket addr");
760 			return (-1);
761 		}
762 
763 		mdb_printf("socket: ");
764 		pfiles_print_addr(laddr);
765 	}
766 
767 	if (sotpi_sonode->st_info.sti_faddr_valid == 1) {
768 		struct sockaddr *faddr =
769 		    mdb_alloc(sotpi_sonode->st_info.sti_faddr_len, UM_SLEEP);
770 		if (mdb_vread(faddr, sotpi_sonode->st_info.sti_faddr_len,
771 		    (uintptr_t)sotpi_sonode->st_info.sti_faddr_sa) == -1) {
772 			mdb_warn("failed to read sotpi_sonode remote addr");
773 			return (-1);
774 		}
775 
776 		mdb_printf("remote: ");
777 		pfiles_print_addr(faddr);
778 	}
779 
780 	return (0);
781 }
782 
783 static int
784 tcpip_sock_print(struct sonode *socknode)
785 {
786 	switch (socknode->so_family) {
787 	case AF_INET:
788 	{
789 		conn_t conn_t;
790 		in_port_t port;
791 
792 		if (mdb_vread(&conn_t, sizeof (conn_t),
793 		    (uintptr_t)socknode->so_proto_handle) == -1) {
794 			mdb_warn("failed to read conn_t V4");
795 			return (-1);
796 		}
797 
798 		mdb_printf("socket: ");
799 		mdb_nhconvert(&port, &conn_t.conn_lport, sizeof (port));
800 		mdb_printf("AF_INET %I %d ", conn_t.conn_src, port);
801 
802 		/*
803 		 * If this is a listening socket, we don't print
804 		 * the remote address.
805 		 */
806 		if (IPCL_IS_TCP(&conn_t) && IPCL_IS_BOUND(&conn_t) == 0 ||
807 		    IPCL_IS_UDP(&conn_t) && IPCL_IS_CONNECTED(&conn_t)) {
808 			mdb_printf("remote: ");
809 			mdb_nhconvert(&port, &conn_t.conn_fport, sizeof (port));
810 			mdb_printf("AF_INET %I %d ", conn_t.conn_rem, port);
811 		}
812 
813 		break;
814 	}
815 
816 	case AF_INET6:
817 	{
818 		conn_t conn_t;
819 		in_port_t port;
820 
821 		if (mdb_vread(&conn_t, sizeof (conn_t),
822 		    (uintptr_t)socknode->so_proto_handle) == -1) {
823 			mdb_warn("failed to read conn_t V6");
824 			return (-1);
825 		}
826 
827 		mdb_printf("socket: ");
828 		mdb_nhconvert(&port, &conn_t.conn_lport, sizeof (port));
829 		mdb_printf("AF_INET6 %N %d ", &conn_t.conn_srcv6, port);
830 
831 		/*
832 		 * If this is a listening socket, we don't print
833 		 * the remote address.
834 		 */
835 		if (IPCL_IS_TCP(&conn_t) && IPCL_IS_BOUND(&conn_t) == 0 ||
836 		    IPCL_IS_UDP(&conn_t) && IPCL_IS_CONNECTED(&conn_t)) {
837 			mdb_printf("remote: ");
838 			mdb_nhconvert(&port, &conn_t.conn_fport, sizeof (port));
839 			mdb_printf("AF_INET6 %N %d ", &conn_t.conn_remv6, port);
840 		}
841 
842 		break;
843 	}
844 
845 	default:
846 		mdb_printf("AF_?? (%d)", socknode->so_family);
847 		break;
848 	}
849 
850 	return (0);
851 }
852 
853 static int
854 sctp_sock_print(struct sonode *socknode)
855 {
856 	sctp_t sctp_t;
857 
858 	struct sockaddr *laddr = mdb_alloc(sizeof (struct sockaddr), UM_SLEEP);
859 	struct sockaddr *faddr = mdb_alloc(sizeof (struct sockaddr), UM_SLEEP);
860 
861 	if (mdb_vread(&sctp_t, sizeof (sctp_t),
862 	    (uintptr_t)socknode->so_proto_handle) == -1) {
863 		mdb_warn("failed to read sctp_t");
864 		return (-1);
865 	}
866 
867 	if (sctp_getsockaddr(&sctp_t, laddr) == 0) {
868 		mdb_printf("socket:");
869 		pfiles_print_addr(laddr);
870 	}
871 	if (sctp_getpeeraddr(&sctp_t, faddr) == 0) {
872 		mdb_printf("remote:");
873 		pfiles_print_addr(faddr);
874 	}
875 
876 	return (0);
877 }
878 
879 /* ARGSUSED */
880 static int
881 sdp_sock_print(struct sonode *socknode)
882 {
883 	return (0);
884 }
885 
886 struct sock_print {
887 	int	family;
888 	int	type;
889 	int	pro;
890 	int	(*print)(struct sonode *socknode);
891 } sock_prints[] = {
892 	{ 2,	2,	0,	tcpip_sock_print },	/* /dev/tcp	*/
893 	{ 2,	2,	6,	tcpip_sock_print },	/* /dev/tcp	*/
894 	{ 26,	2,	0,	tcpip_sock_print },	/* /dev/tcp6	*/
895 	{ 26,	2,	6,	tcpip_sock_print },	/* /dev/tcp6	*/
896 	{ 2,	1,	0,	tcpip_sock_print },	/* /dev/udp	*/
897 	{ 2,	1,	17,	tcpip_sock_print },	/* /dev/udp	*/
898 	{ 26,	1,	0,	tcpip_sock_print },	/* /dev/udp6	*/
899 	{ 26,	1,	17,	tcpip_sock_print },	/* /dev/udp6	*/
900 	{ 2,	4,	0,	tcpip_sock_print },	/* /dev/rawip	*/
901 	{ 26,	4,	0,	tcpip_sock_print },	/* /dev/rawip6	*/
902 	{ 2,	2,	132,	sctp_sock_print },	/* /dev/sctp	*/
903 	{ 26,	2,	132,	sctp_sock_print },	/* /dev/sctp6	*/
904 	{ 2,	6,	132,	sctp_sock_print },	/* /dev/sctp	*/
905 	{ 26,	6,	132,	sctp_sock_print },	/* /dev/sctp6	*/
906 	{ 24,	4,	0,	tcpip_sock_print },	/* /dev/rts	*/
907 	{ 2,	2,	257,	sdp_sock_print },	/* /dev/sdp	*/
908 	{ 26,	2,	257,	sdp_sock_print },	/* /dev/sdp	*/
909 };
910 
911 #define	NUM_SOCK_PRINTS                                         \
912 	(sizeof (sock_prints) / sizeof (struct sock_print))
913 
914 static int
915 pfile_callback(uintptr_t addr, const struct file *f, struct pfiles_cbdata *cb)
916 {
917 	vnode_t v, layer_vn;
918 	int myfd = cb->fd;
919 	const char *type;
920 	char path[MAXPATHLEN];
921 	uintptr_t top_vnodep, realvpp;
922 	char fsname[_ST_FSTYPSZ];
923 	int err, i;
924 
925 	cb->fd++;
926 
927 	if (addr == NULL) {
928 		return (WALK_NEXT);
929 	}
930 
931 	top_vnodep = realvpp = (uintptr_t)f->f_vnode;
932 
933 	if (mdb_vread(&v, sizeof (v), realvpp) == -1) {
934 		mdb_warn("failed to read vnode");
935 		return (DCMD_ERR);
936 	}
937 
938 	type = "?";
939 	for (i = 0; i <= NUM_FS_TYPES; i++) {
940 		if (fs_types[i].type == v.v_type)
941 			type = fs_types[i].name;
942 	}
943 
944 	do {
945 		uintptr_t next_realvpp;
946 
947 		err = next_realvp(realvpp, &layer_vn, &next_realvpp);
948 		if (next_realvpp != NULL)
949 			realvpp = next_realvpp;
950 
951 	} while (err == REALVP_CONTINUE);
952 
953 	if (err == REALVP_ERR) {
954 		mdb_warn("failed to do realvp() for %p", realvpp);
955 		return (DCMD_ERR);
956 	}
957 
958 	if (read_fsname((uintptr_t)layer_vn.v_vfsp, fsname) == -1)
959 		return (DCMD_ERR);
960 
961 	mdb_printf("%4d %4s %?0p ", myfd, type, top_vnodep);
962 
963 	if (cb->opt_p) {
964 		if (pfiles_dig_pathname(top_vnodep, path) == -1)
965 			return (DCMD_ERR);
966 
967 		mdb_printf("%s\n", path);
968 		return (DCMD_OK);
969 	}
970 
971 	/*
972 	 * Sockets generally don't have interesting pathnames; we only
973 	 * show those in the '-p' view.
974 	 */
975 	path[0] = '\0';
976 	if (v.v_type != VSOCK) {
977 		if (pfiles_dig_pathname(top_vnodep, path) == -1)
978 			return (DCMD_ERR);
979 	}
980 	mdb_printf("%s%s", path, path[0] == '\0' ? "" : " ");
981 
982 	switch (v.v_type) {
983 	case VDOOR:
984 	{
985 		door_node_t doornode;
986 		proc_t pr;
987 
988 		if (mdb_vread(&doornode, sizeof (doornode),
989 		    (uintptr_t)layer_vn.v_data) == -1) {
990 			mdb_warn("failed to read door_node");
991 			return (DCMD_ERR);
992 		}
993 
994 		if (mdb_vread(&pr, sizeof (pr),
995 		    (uintptr_t)doornode.door_target) == -1) {
996 			mdb_warn("failed to read door server process %p",
997 			    doornode.door_target);
998 			return (DCMD_ERR);
999 		}
1000 		mdb_printf("[door to '%s' (proc=%p)]", pr.p_user.u_comm,
1001 		    doornode.door_target);
1002 		break;
1003 	}
1004 
1005 	case VSOCK:
1006 	{
1007 		vnode_t v_sock;
1008 		struct sonode so;
1009 
1010 		if (mdb_vread(&v_sock, sizeof (v_sock), realvpp) == -1) {
1011 			mdb_warn("failed to read socket vnode");
1012 			return (DCMD_ERR);
1013 		}
1014 
1015 		/*
1016 		 * Sockets can be non-stream or stream, they have to be dealed
1017 		 * with differently.
1018 		 */
1019 		if (v_sock.v_stream == NULL) {
1020 			if (pfiles_get_sonode(&v_sock, &so) == -1)
1021 				return (DCMD_ERR);
1022 
1023 			/* Pick the proper methods. */
1024 			for (i = 0; i <= NUM_SOCK_PRINTS; i++) {
1025 				if ((sock_prints[i].family == so.so_family &&
1026 				    sock_prints[i].type == so.so_type &&
1027 				    sock_prints[i].pro == so.so_protocol) ||
1028 				    (sock_prints[i].family == so.so_family &&
1029 				    sock_prints[i].type == so.so_type &&
1030 				    so.so_type == SOCK_RAW)) {
1031 					if ((*sock_prints[i].print)(&so) == -1)
1032 						return (DCMD_ERR);
1033 				}
1034 			}
1035 		} else {
1036 			sotpi_sonode_t sotpi_sonode;
1037 
1038 			if (pfiles_get_sonode(&v_sock, &so) == -1)
1039 				return (DCMD_ERR);
1040 
1041 			/*
1042 			 * If the socket is a fallback socket, read its related
1043 			 * information separately; otherwise, read it as a whole
1044 			 * tpi socket.
1045 			 */
1046 			if (so.so_state & SS_FALLBACK_COMP) {
1047 				sotpi_sonode.st_sonode = so;
1048 
1049 				if (mdb_vread(&(sotpi_sonode.st_info),
1050 				    sizeof (sotpi_info_t),
1051 				    (uintptr_t)so.so_priv) == -1)
1052 					return (DCMD_ERR);
1053 			} else {
1054 				if (pfiles_get_tpi_sonode(&v_sock,
1055 				    &sotpi_sonode) == -1)
1056 					return (DCMD_ERR);
1057 			}
1058 
1059 			if (tpi_sock_print(&sotpi_sonode) == -1)
1060 				return (DCMD_ERR);
1061 		}
1062 
1063 		break;
1064 	}
1065 
1066 	case VPORT:
1067 		mdb_printf("[event port (port=%p)]", v.v_data);
1068 		break;
1069 
1070 	case VPROC:
1071 	{
1072 		prnode_t prnode;
1073 		prcommon_t prcommon;
1074 
1075 		if (mdb_vread(&prnode, sizeof (prnode),
1076 		    (uintptr_t)layer_vn.v_data) == -1) {
1077 			mdb_warn("failed to read prnode");
1078 			return (DCMD_ERR);
1079 		}
1080 
1081 		if (mdb_vread(&prcommon, sizeof (prcommon),
1082 		    (uintptr_t)prnode.pr_common) == -1) {
1083 			mdb_warn("failed to read prcommon %p",
1084 			    prnode.pr_common);
1085 			return (DCMD_ERR);
1086 		}
1087 
1088 		mdb_printf("(proc=%p)", prcommon.prc_proc);
1089 		break;
1090 	}
1091 
1092 	default:
1093 		break;
1094 	}
1095 
1096 	mdb_printf("\n");
1097 
1098 	return (WALK_NEXT);
1099 }
1100 
1101 static int
1102 file_t_callback(uintptr_t addr, const struct file *f, struct pfiles_cbdata *cb)
1103 {
1104 	int myfd = cb->fd;
1105 
1106 	cb->fd++;
1107 
1108 	if (addr == NULL) {
1109 		return (WALK_NEXT);
1110 	}
1111 
1112 	/*
1113 	 * We really need 20 digits to print a 64-bit offset_t, but this
1114 	 * is exceedingly rare, so we cheat and assume a column width of 10
1115 	 * digits, in order to fit everything cleanly into 80 columns.
1116 	 */
1117 	mdb_printf("%?0p %4d %8x %?0p %10lld %?0p %4d\n",
1118 	    addr, myfd, f->f_flag, f->f_vnode, f->f_offset, f->f_cred,
1119 	    f->f_count);
1120 
1121 	return (WALK_NEXT);
1122 }
1123 
1124 int
1125 pfiles(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
1126 {
1127 	int opt_f = 0;
1128 
1129 	struct pfiles_cbdata cb;
1130 
1131 	bzero(&cb, sizeof (cb));
1132 
1133 	if (!(flags & DCMD_ADDRSPEC))
1134 		return (DCMD_USAGE);
1135 
1136 	if (mdb_getopts(argc, argv,
1137 	    'p', MDB_OPT_SETBITS, TRUE, &cb.opt_p,
1138 	    'f', MDB_OPT_SETBITS, TRUE, &opt_f, NULL) != argc)
1139 		return (DCMD_USAGE);
1140 
1141 	if (opt_f) {
1142 		mdb_printf("%<u>%?s %4s %8s %?s %10s %?s %4s%</u>\n", "FILE",
1143 		    "FD", "FLAG", "VNODE", "OFFSET", "CRED", "CNT");
1144 		if (mdb_pwalk("allfile", (mdb_walk_cb_t)file_t_callback, &cb,
1145 		    addr) == -1) {
1146 			mdb_warn("failed to walk 'allfile'");
1147 			return (DCMD_ERR);
1148 		}
1149 	} else {
1150 		mdb_printf("%<u>%-4s %4s %?s ", "FD", "TYPE", "VNODE");
1151 		if (cb.opt_p)
1152 			mdb_printf("PATH");
1153 		else
1154 			mdb_printf("INFO");
1155 		mdb_printf("%</u>\n");
1156 
1157 		if (mdb_pwalk("allfile", (mdb_walk_cb_t)pfile_callback, &cb,
1158 		    addr) == -1) {
1159 			mdb_warn("failed to walk 'allfile'");
1160 			return (DCMD_ERR);
1161 		}
1162 	}
1163 
1164 
1165 	return (DCMD_OK);
1166 }
1167 
1168 void
1169 pfiles_help(void)
1170 {
1171 	mdb_printf(
1172 	    "Given the address of a process, print information about files\n"
1173 	    "which the process has open.  By default, this includes decoded\n"
1174 	    "information about the file depending on file and filesystem type\n"
1175 	    "\n"
1176 	    "\t-p\tPathnames; omit decoded information.  Only display "
1177 	    "pathnames\n"
1178 	    "\t-f\tfile_t view; show the file_t structure corresponding to "
1179 	    "the fd\n");
1180 }
1181