1*9c423f23Shannken /* $NetBSD: pstat.c,v 1.134 2022/02/17 14:39:14 hannken Exp $ */
2484fdbbaSthorpej
3fe8f3aeeScgd /*-
4d8bc5f0aSmrg * Copyright (c) 1980, 1991, 1993, 1994
5fe8f3aeeScgd * The Regents of the University of California. All rights reserved.
6fe8f3aeeScgd *
7fe8f3aeeScgd * Redistribution and use in source and binary forms, with or without
8fe8f3aeeScgd * modification, are permitted provided that the following conditions
9fe8f3aeeScgd * are met:
10fe8f3aeeScgd * 1. Redistributions of source code must retain the above copyright
11fe8f3aeeScgd * notice, this list of conditions and the following disclaimer.
12fe8f3aeeScgd * 2. Redistributions in binary form must reproduce the above copyright
13fe8f3aeeScgd * notice, this list of conditions and the following disclaimer in the
14fe8f3aeeScgd * documentation and/or other materials provided with the distribution.
15326b2259Sagc * 3. Neither the name of the University nor the names of its contributors
16fe8f3aeeScgd * may be used to endorse or promote products derived from this software
17fe8f3aeeScgd * without specific prior written permission.
18fe8f3aeeScgd *
19fe8f3aeeScgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20fe8f3aeeScgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21fe8f3aeeScgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22fe8f3aeeScgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23fe8f3aeeScgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24fe8f3aeeScgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25fe8f3aeeScgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26fe8f3aeeScgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27fe8f3aeeScgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28fe8f3aeeScgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29fe8f3aeeScgd * SUCH DAMAGE.
30fe8f3aeeScgd */
31fe8f3aeeScgd
32aef41820Slukem #include <sys/cdefs.h>
33fe8f3aeeScgd #ifndef lint
349c194566Slukem __COPYRIGHT("@(#) Copyright (c) 1980, 1991, 1993, 1994\
359c194566Slukem The Regents of the University of California. All rights reserved.");
36fe8f3aeeScgd #endif /* not lint */
37fe8f3aeeScgd
38fe8f3aeeScgd #ifndef lint
39484fdbbaSthorpej #if 0
40d8bc5f0aSmrg static char sccsid[] = "@(#)pstat.c 8.16 (Berkeley) 5/9/95";
41484fdbbaSthorpej #else
42*9c423f23Shannken __RCSID("$NetBSD: pstat.c,v 1.134 2022/02/17 14:39:14 hannken Exp $");
43484fdbbaSthorpej #endif
44fe8f3aeeScgd #endif /* not lint */
45fe8f3aeeScgd
460565241bSad #define _KERNEL
470565241bSad #include <sys/types.h>
480565241bSad #undef _KERNEL
49fe8f3aeeScgd #include <sys/param.h>
50fe8f3aeeScgd #include <sys/time.h>
51fe8f3aeeScgd #include <sys/vnode.h>
52fe8f3aeeScgd #include <sys/ucred.h>
535bf65cf9She #include <stdbool.h>
54ae0b9c20Sjtc #define _KERNEL
55fe8f3aeeScgd #define NFS
56fe8f3aeeScgd #include <sys/mount.h>
57fe8f3aeeScgd #undef NFS
58d2979fb0Smlelstv #include <sys/file.h>
59d2979fb0Smlelstv #include <ufs/ufs/inode.h>
60d2979fb0Smlelstv #include <ufs/ufs/ufsmount.h>
61d8bc5f0aSmrg #include <sys/uio.h>
622285fa8eSenami #include <miscfs/genfs/layer.h>
63ae0b9c20Sjtc #undef _KERNEL
64fe8f3aeeScgd #include <sys/stat.h>
653afcb7a8Scgd #include <nfs/nfsproto.h>
663afcb7a8Scgd #include <nfs/rpcv2.h>
67d8bc5f0aSmrg #include <nfs/nfs.h>
68fe8f3aeeScgd #include <nfs/nfsnode.h>
69fe8f3aeeScgd #include <sys/ioctl.h>
70fe8f3aeeScgd #include <sys/tty.h>
71fe8f3aeeScgd #include <sys/conf.h>
72fe8f3aeeScgd
73fe8f3aeeScgd #include <sys/sysctl.h>
74fe8f3aeeScgd
75fe8f3aeeScgd #include <err.h>
76f950d3cfSapb #include <errno.h>
77fe8f3aeeScgd #include <kvm.h>
78fe8f3aeeScgd #include <limits.h>
79fe8f3aeeScgd #include <nlist.h>
80fe8f3aeeScgd #include <stdio.h>
81fe8f3aeeScgd #include <stdlib.h>
82fe8f3aeeScgd #include <string.h>
83fe8f3aeeScgd #include <unistd.h>
84fe8f3aeeScgd
854a5d7f4dSmrg #include "swapctl.h"
864a5d7f4dSmrg
87fe8f3aeeScgd struct nlist nl[] = {
8880e17de9Sad #define V_LRU_LIST 0
8980e17de9Sad { "_lru_list", 0, 0, 0, 0 } , /* address of lru lists. */
9080e17de9Sad #define V_NUMV 1
91aecc7237Slukem { "_numvnodes", 0, 0, 0, 0 },
9280e17de9Sad #define V_NEXT_OFFSET 2
93256581e1Shannken { "_vnode_offset_next_by_lru", 0, 0, 0, 0 },
9480e17de9Sad #define FNL_NFILE 3
95aecc7237Slukem { "_nfiles", 0, 0, 0, 0 },
9680e17de9Sad #define FNL_MAXFILE 4
97aecc7237Slukem { "_maxfiles", 0, 0, 0, 0 },
9880e17de9Sad #define TTY_NTTY 5
99aecc7237Slukem { "_tty_count", 0, 0, 0, 0 },
10080e17de9Sad #define TTY_TTYLIST 6
101aecc7237Slukem { "_ttylist", 0, 0, 0, 0 },
102956fd533Smrg #define NLMANDATORY TTY_TTYLIST /* names up to here are mandatory */
103aecc7237Slukem { "", 0, 0, 0, 0 }
104fe8f3aeeScgd };
105fe8f3aeeScgd
106fe8f3aeeScgd int usenumflag;
107fe8f3aeeScgd int totalflag;
10807871af1Smycroft int kflag;
1095fd013c4Smrg int hflag;
110fe8f3aeeScgd char *nlistf = NULL;
111fe8f3aeeScgd char *memf = NULL;
112fe8f3aeeScgd kvm_t *kd;
113fe8f3aeeScgd
114b30695cdSchristos static const char * const dtypes[] = { DTYPE_NAMES };
115b30695cdSchristos
116b30695cdSchristos
11701188cb4Sjdolecek static const struct {
118c4f3ebe6Senami u_int m_flag;
11911e29bdcSchristos u_int m_visible;
120d8bc5f0aSmrg const char *m_name;
121d8bc5f0aSmrg } mnt_flags[] = {
12211e29bdcSchristos __MNT_FLAGS
123d8bc5f0aSmrg };
124d8bc5f0aSmrg
125c4f3ebe6Senami struct flagbit_desc {
126c4f3ebe6Senami u_int fd_flags;
127c4f3ebe6Senami char fd_mark;
128c4f3ebe6Senami };
129c4f3ebe6Senami
130fe8f3aeeScgd #define SVAR(var) __STRING(var) /* to force expansion */
131fe8f3aeeScgd #define KGET(idx, var) \
132fe8f3aeeScgd KGET1(idx, &var, sizeof(var), SVAR(var))
133fe8f3aeeScgd #define KGET1(idx, p, s, msg) \
134fe8f3aeeScgd KGET2(nl[idx].n_value, p, s, msg)
135693aff02Senami #define KGET2(addr, p, s, msg) do { \
136fe8f3aeeScgd if (kvm_read(kd, (u_long)(addr), p, s) != s) \
137693aff02Senami warnx("cannot read %s: %s", msg, kvm_geterr(kd)); \
1386f4965e0Srillig } while (0)
139693aff02Senami #define KGETRET(addr, p, s, msg) do { \
140fe8f3aeeScgd if (kvm_read(kd, (u_long)(addr), p, s) != s) { \
141fe8f3aeeScgd warnx("cannot read %s: %s", msg, kvm_geterr(kd)); \
142fe8f3aeeScgd return (0); \
143693aff02Senami } \
1446f4965e0Srillig } while (0)
145fe8f3aeeScgd
14602501557Senami #if 1 /* This is copied from vmstat/vmstat.c */
14702501557Senami /*
14802501557Senami * Print single word. `ovflow' is number of characters didn't fit
14902501557Senami * on the last word. `fmt' is a format string to print this word.
15002501557Senami * It must contain asterisk for field width. `width' is a width
15102501557Senami * occupied by this word. `fixed' is a number of constant chars in
15202501557Senami * `fmt'. `val' is a value to be printed using format string `fmt'.
15302501557Senami */
15402501557Senami #define PRWORD(ovflw, fmt, width, fixed, val) do { \
15502501557Senami (ovflw) += printf((fmt), \
15602501557Senami (width) - (fixed) - (ovflw) > 0 ? \
15702501557Senami (width) - (fixed) - (ovflw) : 0, \
15802501557Senami (val)) - (width); \
15902501557Senami if ((ovflw) < 0) \
16002501557Senami (ovflw) = 0; \
1616f4965e0Srillig } while (0)
16202501557Senami #endif
16302501557Senami
1643f516538Srpaulo void filemode(void);
1653f516538Srpaulo int getfiles(char **, int *, char **);
1663f516538Srpaulo int getflags(const struct flagbit_desc *, char *, u_int);
167fe8f3aeeScgd struct mount *
1683f516538Srpaulo getmnt(struct mount *);
1693f516538Srpaulo char * kinfo_vnodes(int *);
1703f516538Srpaulo void layer_header(void);
1713f516538Srpaulo int layer_print(struct vnode *, int);
1723f516538Srpaulo char * loadvnodes(int *);
1733f516538Srpaulo void mount_print(struct mount *);
1743f516538Srpaulo void nfs_header(void);
1753f516538Srpaulo int nfs_print(struct vnode *, int);
1763f516538Srpaulo void ttymode(void);
1773f516538Srpaulo void ttyprt(struct tty *);
1783f516538Srpaulo void ufs_header(void);
1793f516538Srpaulo int ufs_print(struct vnode *, int);
1803f516538Srpaulo int ext2fs_print(struct vnode *, int);
181bec77c5fSjoerg __dead void usage(void);
1823f516538Srpaulo void vnode_header(void);
1833f516538Srpaulo int vnode_print(struct vnode *, struct vnode *);
1843f516538Srpaulo void vnodemode(void);
185fe8f3aeeScgd
186fe8f3aeeScgd int
main(int argc,char * argv[])1873f516538Srpaulo main(int argc, char *argv[])
188fe8f3aeeScgd {
1890dc4f151Srpaulo int ch, i, quit, ret, use_sysctl;
190fe8f3aeeScgd int fileflag, swapflag, ttyflag, vnodeflag;
191cdac2667Smrg gid_t egid = getegid();
192fe8f3aeeScgd char buf[_POSIX2_LINE_MAX];
193fe8f3aeeScgd
194cdac2667Smrg setegid(getgid());
195fe8f3aeeScgd fileflag = swapflag = ttyflag = vnodeflag = 0;
1969bf440d2Smrg while ((ch = getopt(argc, argv, "TM:N:fghikmnstv")) != -1)
197fe8f3aeeScgd switch (ch) {
198fe8f3aeeScgd case 'f':
199fe8f3aeeScgd fileflag = 1;
200fe8f3aeeScgd break;
201fe8f3aeeScgd case 'M':
202fe8f3aeeScgd memf = optarg;
203fe8f3aeeScgd break;
204fe8f3aeeScgd case 'N':
205fe8f3aeeScgd nlistf = optarg;
206fe8f3aeeScgd break;
207fe8f3aeeScgd case 'n':
208fe8f3aeeScgd usenumflag = 1;
209fe8f3aeeScgd break;
210fe8f3aeeScgd case 's':
211fe8f3aeeScgd swapflag = 1;
212fe8f3aeeScgd break;
213fe8f3aeeScgd case 'T':
214fe8f3aeeScgd totalflag = 1;
215fe8f3aeeScgd break;
216fe8f3aeeScgd case 't':
217fe8f3aeeScgd ttyflag = 1;
218fe8f3aeeScgd break;
21907871af1Smycroft case 'k':
22007871af1Smycroft kflag = 1;
22107871af1Smycroft break;
2229bf440d2Smrg case 'g':
2239bf440d2Smrg kflag = 3; /* 1k ^ 3 */
2249bf440d2Smrg break;
2255fd013c4Smrg case 'h':
2265fd013c4Smrg hflag = 1;
2275fd013c4Smrg break;
2289bf440d2Smrg case 'm':
2299bf440d2Smrg kflag = 2; /* 1k ^ 2 */
2309bf440d2Smrg break;
231fe8f3aeeScgd case 'v':
232fe8f3aeeScgd case 'i': /* Backward compatibility. */
233fe8f3aeeScgd vnodeflag = 1;
234fe8f3aeeScgd break;
235fe8f3aeeScgd default:
236fe8f3aeeScgd usage();
237fe8f3aeeScgd }
238fe8f3aeeScgd argc -= optind;
239fe8f3aeeScgd argv += optind;
240fe8f3aeeScgd
241fe8f3aeeScgd /*
242cdac2667Smrg * Discard setgid privileges. If not the running kernel, we toss
243cdac2667Smrg * them away totally so that bad guys can't print interesting stuff
244cdac2667Smrg * from kernel memory, otherwise switch back to kmem for the
245cdac2667Smrg * duration of the kvm_openfiles() call.
246fe8f3aeeScgd */
247fe8f3aeeScgd if (nlistf != NULL || memf != NULL)
248fe8f3aeeScgd (void)setgid(getgid());
249cdac2667Smrg else
250cdac2667Smrg (void)setegid(egid);
251fe8f3aeeScgd
2520dc4f151Srpaulo use_sysctl = (nlistf == NULL && memf == NULL);
2530dc4f151Srpaulo
254fe8f3aeeScgd if ((kd = kvm_openfiles(nlistf, memf, NULL, O_RDONLY, buf)) == 0)
255fe8f3aeeScgd errx(1, "kvm_openfiles: %s", buf);
256cdac2667Smrg
257cdac2667Smrg /* get rid of it now anyway */
258cdac2667Smrg if (nlistf == NULL && memf == NULL)
259cdac2667Smrg (void)setgid(getgid());
260fe8f3aeeScgd if ((ret = kvm_nlist(kd, nl)) != 0) {
261fe8f3aeeScgd if (ret == -1)
262fe8f3aeeScgd errx(1, "kvm_nlist: %s", kvm_geterr(kd));
263fe8f3aeeScgd for (i = quit = 0; i <= NLMANDATORY; i++)
264fe8f3aeeScgd if (!nl[i].n_value) {
265fe8f3aeeScgd quit = 1;
2666b52790dScgd warnx("undefined symbol: %s", nl[i].n_name);
267fe8f3aeeScgd }
268fe8f3aeeScgd if (quit)
269fe8f3aeeScgd exit(1);
270fe8f3aeeScgd }
271fe8f3aeeScgd if (!(fileflag | vnodeflag | ttyflag | swapflag | totalflag))
272fe8f3aeeScgd usage();
273fe8f3aeeScgd if (fileflag || totalflag)
274fe8f3aeeScgd filemode();
275fe8f3aeeScgd if (vnodeflag || totalflag)
276fe8f3aeeScgd vnodemode();
277fe8f3aeeScgd if (ttyflag)
278fe8f3aeeScgd ttymode();
279fe8f3aeeScgd if (swapflag || totalflag)
2800dc4f151Srpaulo if (use_sysctl)
2815fd013c4Smrg list_swap(0, kflag, 0, totalflag, 1, hflag);
282fe8f3aeeScgd exit(0);
283fe8f3aeeScgd }
284fe8f3aeeScgd
285d80b31fdSenami #define VPTRSZ sizeof(struct vnode *)
286d80b31fdSenami #define VNODESZ sizeof(struct vnode)
287c4f3ebe6Senami #define PTRSTRWIDTH ((int)sizeof(void *) * 2) /* Width of resulting string
288c4f3ebe6Senami when pointer is printed
289c4f3ebe6Senami in hexadecimal. */
290fe8f3aeeScgd
29107b8d9f3Schristos static void
devprintf(char * buf,size_t buflen,dev_t dev)29207b8d9f3Schristos devprintf(char *buf, size_t buflen, dev_t dev)
29307b8d9f3Schristos {
29407b8d9f3Schristos (void)snprintf(buf, buflen, "%llu,%llu",
29507b8d9f3Schristos (unsigned long long)major(dev),
29607b8d9f3Schristos (unsigned long long)minor(dev));
29707b8d9f3Schristos }
29807b8d9f3Schristos
299fe8f3aeeScgd void
vnodemode(void)3003f516538Srpaulo vnodemode(void)
301fe8f3aeeScgd {
302d80b31fdSenami char *e_vnodebase, *endvnode, *evp;
303d8bc5f0aSmrg struct vnode *vp;
304d8bc5f0aSmrg struct mount *maddr, *mp;
30502501557Senami int numvnodes, ovflw;
3063f516538Srpaulo int (*vnode_fsprint) (struct vnode *, int); /* per-fs data printer */
307fe8f3aeeScgd
308aef41820Slukem mp = NULL;
3093b06b649Smrg e_vnodebase = loadvnodes(&numvnodes);
310fe8f3aeeScgd if (totalflag) {
311fe8f3aeeScgd (void)printf("%7d vnodes\n", numvnodes);
3123b06b649Smrg goto out;
313fe8f3aeeScgd }
314d80b31fdSenami endvnode = e_vnodebase + numvnodes * (VPTRSZ + VNODESZ);
315fe8f3aeeScgd (void)printf("%d active vnodes\n", numvnodes);
316fe8f3aeeScgd
317fe8f3aeeScgd #define ST mp->mnt_stat
3182ca792dfSenami #define FSTYPE_IS(mp, name) \
3199e211aafSchristos (strncmp((mp)->mnt_stat.f_fstypename, (name), \
3209e211aafSchristos sizeof((mp)->mnt_stat.f_fstypename)) == 0)
321fe8f3aeeScgd maddr = NULL;
3222ca792dfSenami vnode_fsprint = NULL;
323d80b31fdSenami for (evp = e_vnodebase; evp < endvnode; evp += VPTRSZ + VNODESZ) {
324d80b31fdSenami vp = (struct vnode *)(evp + VPTRSZ);
325fe8f3aeeScgd if (vp->v_mount != maddr) {
326fe8f3aeeScgd /*
327fe8f3aeeScgd * New filesystem
328fe8f3aeeScgd */
329fe8f3aeeScgd if ((mp = getmnt(vp->v_mount)) == NULL)
330fe8f3aeeScgd continue;
331fe8f3aeeScgd maddr = vp->v_mount;
332fe8f3aeeScgd mount_print(mp);
333fe8f3aeeScgd vnode_header();
334e1383560Sdholland /*
335e1383560Sdholland * XXX do this in a more fs-independent way
336e1383560Sdholland */
3372ca792dfSenami if (FSTYPE_IS(mp, MOUNT_FFS) ||
3382ca792dfSenami FSTYPE_IS(mp, MOUNT_MFS)) {
339fe8f3aeeScgd ufs_header();
3402ca792dfSenami vnode_fsprint = ufs_print;
3412ca792dfSenami } else if (FSTYPE_IS(mp, MOUNT_NFS)) {
342fe8f3aeeScgd nfs_header();
3432ca792dfSenami vnode_fsprint = nfs_print;
3442ca792dfSenami } else if (FSTYPE_IS(mp, MOUNT_EXT2FS)) {
345558f2d0eSbouyer ufs_header();
3462ca792dfSenami vnode_fsprint = ext2fs_print;
3472285fa8eSenami } else if (FSTYPE_IS(mp, MOUNT_NULL) ||
3482285fa8eSenami FSTYPE_IS(mp, MOUNT_OVERLAY) ||
3492285fa8eSenami FSTYPE_IS(mp, MOUNT_UMAP)) {
3502285fa8eSenami layer_header();
3512285fa8eSenami vnode_fsprint = layer_print;
3522ca792dfSenami } else
3532ca792dfSenami vnode_fsprint = NULL;
354fe8f3aeeScgd (void)printf("\n");
355fe8f3aeeScgd }
35602501557Senami ovflw = vnode_print(*(struct vnode **)evp, vp);
3572ca792dfSenami if (VTOI(vp) != NULL && vnode_fsprint != NULL)
35802501557Senami (*vnode_fsprint)(vp, ovflw);
359fe8f3aeeScgd (void)printf("\n");
360fe8f3aeeScgd }
3613b06b649Smrg
3623b06b649Smrg out:
363644890e9Sbriggs if (e_vnodebase)
364fe8f3aeeScgd free(e_vnodebase);
365fe8f3aeeScgd }
366fe8f3aeeScgd
367c4f3ebe6Senami int
getflags(const struct flagbit_desc * fd,char * p,u_int flags)3683f516538Srpaulo getflags(const struct flagbit_desc *fd, char *p, u_int flags)
369c4f3ebe6Senami {
370c4f3ebe6Senami char *q = p;
371c4f3ebe6Senami
372c4f3ebe6Senami if (flags == 0) {
373c4f3ebe6Senami *p++ = '-';
374c4f3ebe6Senami *p = '\0';
375c4f3ebe6Senami return (0);
376c4f3ebe6Senami }
377c4f3ebe6Senami
378c4f3ebe6Senami for (; fd->fd_flags != 0; fd++)
379c4f3ebe6Senami if ((flags & fd->fd_flags) != 0)
380c4f3ebe6Senami *p++ = fd->fd_mark;
381c4f3ebe6Senami *p = '\0';
382c4f3ebe6Senami return (p - q);
383c4f3ebe6Senami }
384c4f3ebe6Senami
385c4f3ebe6Senami const struct flagbit_desc vnode_flags[] = {
3867dad9f73Sad { VV_ROOT, 'R' },
3877dad9f73Sad { VI_TEXT, 'T' },
3887dad9f73Sad { VV_SYSTEM, 'S' },
3897dad9f73Sad { VV_ISTTY, 'I' },
3907dad9f73Sad { VI_EXECMAP, 'E' },
3917dad9f73Sad { VU_DIROP, 'D' },
3927dad9f73Sad { VI_ONWORKLST, 'O' },
393d1120cd8Sad { VV_MPSAFE, 'M' },
394c4f3ebe6Senami { 0, '\0' },
395c4f3ebe6Senami };
396c4f3ebe6Senami
397fe8f3aeeScgd void
vnode_header(void)3983f516538Srpaulo vnode_header(void)
399fe8f3aeeScgd {
400041d1aa9Senami
40102501557Senami (void)printf("%-*s TYP VFLAG USE HOLD TAG NPAGE",
402c31a571eSenami PTRSTRWIDTH, "ADDR");
403fe8f3aeeScgd }
404fe8f3aeeScgd
40502501557Senami int
vnode_print(struct vnode * avnode,struct vnode * vp)4063f516538Srpaulo vnode_print(struct vnode *avnode, struct vnode *vp)
407fe8f3aeeScgd {
408aecc7237Slukem const char *type;
409aecc7237Slukem char flags[sizeof(vnode_flags) / sizeof(vnode_flags[0])];
410c4f3ebe6Senami int ovflw;
411fe8f3aeeScgd
412fe8f3aeeScgd /*
413fe8f3aeeScgd * set type
414fe8f3aeeScgd */
415fe8f3aeeScgd switch (vp->v_type) {
416fe8f3aeeScgd case VNON:
417fe8f3aeeScgd type = "non"; break;
418fe8f3aeeScgd case VREG:
419fe8f3aeeScgd type = "reg"; break;
420fe8f3aeeScgd case VDIR:
421fe8f3aeeScgd type = "dir"; break;
422fe8f3aeeScgd case VBLK:
423fe8f3aeeScgd type = "blk"; break;
424fe8f3aeeScgd case VCHR:
425fe8f3aeeScgd type = "chr"; break;
426fe8f3aeeScgd case VLNK:
427fe8f3aeeScgd type = "lnk"; break;
428fe8f3aeeScgd case VSOCK:
429fe8f3aeeScgd type = "soc"; break;
430fe8f3aeeScgd case VFIFO:
431fe8f3aeeScgd type = "fif"; break;
432fe8f3aeeScgd case VBAD:
433fe8f3aeeScgd type = "bad"; break;
434fe8f3aeeScgd default:
435fe8f3aeeScgd type = "unk"; break;
436fe8f3aeeScgd }
437fe8f3aeeScgd /*
438fe8f3aeeScgd * gather flags
439fe8f3aeeScgd */
4407dad9f73Sad (void)getflags(vnode_flags, flags,
4417dad9f73Sad vp->v_uflag | vp->v_iflag | vp->v_vflag);
44202501557Senami
44302501557Senami ovflw = 0;
444c31a571eSenami PRWORD(ovflw, "%*lx", PTRSTRWIDTH, 0, (long)avnode);
44502501557Senami PRWORD(ovflw, " %*s", 4, 1, type);
44602501557Senami PRWORD(ovflw, " %*s", 6, 1, flags);
447*9c423f23Shannken #define VUSECOUNT_MASK 0x3fffffff /* XXX: kernel private */
4481f8ba1a6Schristos PRWORD(ovflw, " %*d", 5, 1, vp->v_usecount & VUSECOUNT_MASK);
4491f8ba1a6Schristos PRWORD(ovflw, " %*d", 5, 1, vp->v_holdcnt);
45002501557Senami PRWORD(ovflw, " %*d", 4, 1, vp->v_tag);
45102501557Senami PRWORD(ovflw, " %*d", 6, 1, vp->v_uobj.uo_npages);
45202501557Senami return (ovflw);
453fe8f3aeeScgd }
454fe8f3aeeScgd
455c4f3ebe6Senami const struct flagbit_desc ufs_flags[] = {
456c4f3ebe6Senami { IN_ACCESS, 'A' },
457c4f3ebe6Senami { IN_CHANGE, 'C' },
458c4f3ebe6Senami { IN_UPDATE, 'U' },
459c4f3ebe6Senami { IN_MODIFIED, 'M' },
460c4f3ebe6Senami { IN_ACCESSED, 'a' },
461c4f3ebe6Senami { IN_SHLOCK, 'S' },
462c4f3ebe6Senami { IN_EXLOCK, 'E' },
463c4f3ebe6Senami { IN_SPACECOUNTED, 's' },
464c4f3ebe6Senami { 0, '\0' },
465c4f3ebe6Senami };
466558f2d0eSbouyer
467558f2d0eSbouyer void
ufs_header(void)4683f516538Srpaulo ufs_header(void)
469558f2d0eSbouyer {
470041d1aa9Senami
471558f2d0eSbouyer (void)printf(" FILEID IFLAG RDEV|SZ");
472558f2d0eSbouyer }
473558f2d0eSbouyer
474558f2d0eSbouyer int
ufs_print(struct vnode * vp,int ovflw)4753f516538Srpaulo ufs_print(struct vnode *vp, int ovflw)
476558f2d0eSbouyer {
477558f2d0eSbouyer struct inode inode, *ip = &inode;
47842614ed3Sfvdl union dinode {
47942614ed3Sfvdl struct ufs1_dinode dp1;
48042614ed3Sfvdl struct ufs2_dinode dp2;
48142614ed3Sfvdl } dip;
482d2979fb0Smlelstv struct ufsmount ump;
483c4f3ebe6Senami char flags[sizeof(ufs_flags) / sizeof(ufs_flags[0])];
484dcf8481aSmrg char dev[4 + 1 + 7 + 1]; /* 12bit major + 20bit minor */
485c4f3ebe6Senami char *name;
486558f2d0eSbouyer mode_t type;
48742614ed3Sfvdl dev_t rdev;
488558f2d0eSbouyer
489558f2d0eSbouyer KGETRET(VTOI(vp), &inode, sizeof(struct inode), "vnode's inode");
490d2979fb0Smlelstv KGETRET(ip->i_ump, &ump, sizeof(struct ufsmount),
491d2979fb0Smlelstv "vnode's mount point");
492d2979fb0Smlelstv
493d2979fb0Smlelstv if (ump.um_fstype == UFS1) {
49442614ed3Sfvdl KGETRET(ip->i_din.ffs1_din, &dip, sizeof (struct ufs1_dinode),
49542614ed3Sfvdl "inode's dinode");
49629551a29Senami rdev = (uint32_t)dip.dp1.di_rdev;
497d2979fb0Smlelstv } else {
498d2979fb0Smlelstv KGETRET(ip->i_din.ffs2_din, &dip, sizeof (struct ufs2_dinode),
49942614ed3Sfvdl "inode's UFS2 dinode");
50042614ed3Sfvdl rdev = dip.dp2.di_rdev;
50142614ed3Sfvdl }
502c4f3ebe6Senami
503c4f3ebe6Senami /*
504c4f3ebe6Senami * XXX need to to locking state.
505c4f3ebe6Senami */
506c4f3ebe6Senami
507c4f3ebe6Senami (void)getflags(ufs_flags, flags, ip->i_flag);
508c4ee9f6dSchristos PRWORD(ovflw, " %*llu", 7, 1, (unsigned long long)ip->i_number);
509c4f3ebe6Senami PRWORD(ovflw, " %*s", 6, 1, flags);
51042614ed3Sfvdl type = ip->i_mode & S_IFMT;
51142614ed3Sfvdl if (S_ISCHR(ip->i_mode) || S_ISBLK(ip->i_mode)) {
512041d1aa9Senami if (usenumflag ||
51342614ed3Sfvdl (name = devname(rdev, type)) == NULL) {
51407b8d9f3Schristos devprintf(dev, sizeof(dev), rdev);
515c4f3ebe6Senami name = dev;
51602501557Senami }
51702501557Senami PRWORD(ovflw, " %*s", 8, 1, name);
51802501557Senami } else
51942614ed3Sfvdl PRWORD(ovflw, " %*lld", 8, 1, (long long)ip->i_size);
52042614ed3Sfvdl return 0;
521558f2d0eSbouyer }
522558f2d0eSbouyer
523558f2d0eSbouyer int
ext2fs_print(struct vnode * vp,int ovflw)5243f516538Srpaulo ext2fs_print(struct vnode *vp, int ovflw)
525558f2d0eSbouyer {
526558f2d0eSbouyer struct inode inode, *ip = &inode;
52783aa19e1Sdaniel struct ext2fs_dinode dip;
528c4f3ebe6Senami char flags[sizeof(ufs_flags) / sizeof(ufs_flags[0])];
529dcf8481aSmrg char dev[4 + 1 + 7 + 1]; /* 12bit major + 20bit minor */
530c4f3ebe6Senami char *name;
531558f2d0eSbouyer mode_t type;
532558f2d0eSbouyer
533558f2d0eSbouyer KGETRET(VTOI(vp), &inode, sizeof(struct inode), "vnode's inode");
53483aa19e1Sdaniel KGETRET(ip->i_din.e2fs_din, &dip, sizeof (struct ext2fs_dinode),
53583aa19e1Sdaniel "inode's dinode");
536c4f3ebe6Senami
537c4f3ebe6Senami /*
538c4f3ebe6Senami * XXX need to to locking state.
539c4f3ebe6Senami */
540c4f3ebe6Senami
541c4f3ebe6Senami (void)getflags(ufs_flags, flags, ip->i_flag);
542c4ee9f6dSchristos PRWORD(ovflw, " %*llu", 7, 1, (unsigned long long)ip->i_number);
543c4f3ebe6Senami PRWORD(ovflw, " %*s", 6, 1, flags);
54483aa19e1Sdaniel type = dip.e2di_mode & S_IFMT;
54583aa19e1Sdaniel if (S_ISCHR(dip.e2di_mode) || S_ISBLK(dip.e2di_mode)) {
546041d1aa9Senami if (usenumflag ||
54783aa19e1Sdaniel (name = devname(dip.e2di_rdev, type)) == NULL) {
54807b8d9f3Schristos devprintf(dev, sizeof(dev), dip.e2di_rdev);
549c4f3ebe6Senami name = dev;
55002501557Senami }
55102501557Senami PRWORD(ovflw, " %*s", 8, 1, name);
55202501557Senami } else
55383aa19e1Sdaniel PRWORD(ovflw, " %*u", 8, 1, (u_int)dip.e2di_size);
554fe8f3aeeScgd return (0);
555fe8f3aeeScgd }
556fe8f3aeeScgd
557c4f3ebe6Senami const struct flagbit_desc nfs_flags[] = {
558c4f3ebe6Senami { NFLUSHWANT, 'W' },
559c4f3ebe6Senami { NFLUSHINPROG, 'P' },
560c4f3ebe6Senami { NMODIFIED, 'M' },
561c4f3ebe6Senami { NWRITEERR, 'E' },
562c4f3ebe6Senami { NACC, 'A' },
563c4f3ebe6Senami { NUPD, 'U' },
564c4f3ebe6Senami { NCHG, 'C' },
565c4f3ebe6Senami { 0, '\0' },
566c4f3ebe6Senami };
567c4f3ebe6Senami
568fe8f3aeeScgd void
nfs_header(void)5693f516538Srpaulo nfs_header(void)
570fe8f3aeeScgd {
571041d1aa9Senami
572fe8f3aeeScgd (void)printf(" FILEID NFLAG RDEV|SZ");
573fe8f3aeeScgd }
574fe8f3aeeScgd
575fe8f3aeeScgd int
nfs_print(struct vnode * vp,int ovflw)5763f516538Srpaulo nfs_print(struct vnode *vp, int ovflw)
577fe8f3aeeScgd {
578fe8f3aeeScgd struct nfsnode nfsnode, *np = &nfsnode;
579c4f3ebe6Senami char flags[sizeof(nfs_flags) / sizeof(nfs_flags[0])];
580dcf8481aSmrg char dev[4 + 1 + 7 + 1]; /* 12bit major + 20bit minor */
58141e3b9d2Sdrochner struct vattr va;
582fe8f3aeeScgd char *name;
583fe8f3aeeScgd mode_t type;
584fe8f3aeeScgd
585fe8f3aeeScgd KGETRET(VTONFS(vp), &nfsnode, sizeof(nfsnode), "vnode's nfsnode");
586c4f3ebe6Senami (void)getflags(nfs_flags, flags, np->n_flag);
587fe8f3aeeScgd
58841e3b9d2Sdrochner KGETRET(np->n_vattr, &va, sizeof(va), "vnode attr");
58902501557Senami PRWORD(ovflw, " %*ld", 7, 1, (long)va.va_fileid);
590c4f3ebe6Senami PRWORD(ovflw, " %*s", 6, 1, flags);
5917ec21d44Senami switch (va.va_type) {
5927ec21d44Senami case VCHR:
5937ec21d44Senami type = S_IFCHR;
5947ec21d44Senami goto device;
5957ec21d44Senami
5967ec21d44Senami case VBLK:
5977ec21d44Senami type = S_IFBLK;
5987ec21d44Senami device:
59902501557Senami if (usenumflag || (name = devname(va.va_rdev, type)) == NULL) {
60007b8d9f3Schristos devprintf(dev, sizeof(dev), va.va_rdev);
601c4f3ebe6Senami name = dev;
60202501557Senami }
60302501557Senami PRWORD(ovflw, " %*s", 8, 1, name);
6047ec21d44Senami break;
6057ec21d44Senami default:
60602501557Senami PRWORD(ovflw, " %*lld", 8, 1, (long long)np->n_size);
6077ec21d44Senami break;
6087ec21d44Senami }
609fe8f3aeeScgd return (0);
610fe8f3aeeScgd }
611fe8f3aeeScgd
612d8bc5f0aSmrg void
layer_header(void)6133f516538Srpaulo layer_header(void)
6142285fa8eSenami {
6152285fa8eSenami
616c31a571eSenami (void)printf(" %*s", PTRSTRWIDTH, "LOWER");
6172285fa8eSenami }
6182285fa8eSenami
6192285fa8eSenami int
layer_print(struct vnode * vp,int ovflw)6203f516538Srpaulo layer_print(struct vnode *vp, int ovflw)
6212285fa8eSenami {
6222285fa8eSenami struct layer_node lnode, *lp = &lnode;
6232285fa8eSenami
6242285fa8eSenami KGETRET(VTOLAYER(vp), &lnode, sizeof(lnode), "layer vnode");
6252285fa8eSenami
626c31a571eSenami PRWORD(ovflw, " %*lx", PTRSTRWIDTH + 1, 1, (long)lp->layer_lowervp);
6272285fa8eSenami return (0);
6282285fa8eSenami }
6292285fa8eSenami
630fe8f3aeeScgd /*
631fe8f3aeeScgd * Given a pointer to a mount structure in kernel space,
632fe8f3aeeScgd * read it in and return a usable pointer to it.
633fe8f3aeeScgd */
634fe8f3aeeScgd struct mount *
getmnt(struct mount * maddr)6353f516538Srpaulo getmnt(struct mount *maddr)
636fe8f3aeeScgd {
637fe8f3aeeScgd static struct mtab {
638fe8f3aeeScgd struct mtab *next;
639fe8f3aeeScgd struct mount *maddr;
640fe8f3aeeScgd struct mount mount;
641fe8f3aeeScgd } *mhead = NULL;
642d8bc5f0aSmrg struct mtab *mt;
643fb0d3353Schristos struct mount mb;
644fe8f3aeeScgd
645fe8f3aeeScgd for (mt = mhead; mt != NULL; mt = mt->next)
646fe8f3aeeScgd if (maddr == mt->maddr)
647fe8f3aeeScgd return (&mt->mount);
648fb0d3353Schristos KGETRET(maddr, &mb, sizeof(struct mount), "mount table");
649fe8f3aeeScgd if ((mt = malloc(sizeof(struct mtab))) == NULL)
650aef41820Slukem err(1, "malloc");
651fb0d3353Schristos mt->mount = mb;
652fe8f3aeeScgd mt->maddr = maddr;
653fe8f3aeeScgd mt->next = mhead;
654fe8f3aeeScgd mhead = mt;
655fe8f3aeeScgd return (&mt->mount);
656fe8f3aeeScgd }
657fe8f3aeeScgd
658fe8f3aeeScgd void
mount_print(struct mount * mp)6593f516538Srpaulo mount_print(struct mount *mp)
660fe8f3aeeScgd {
661d8bc5f0aSmrg int flags;
662fe8f3aeeScgd
663d8bc5f0aSmrg (void)printf("*** MOUNT %s %s on %s", ST.f_fstypename,
6644ef6083eScgd ST.f_mntfromname, ST.f_mntonname);
665aef41820Slukem if ((flags = mp->mnt_flag) != 0) {
666aecc7237Slukem size_t i;
667d8bc5f0aSmrg const char *sep = " (";
668fe8f3aeeScgd
6697d1c72d8Selad for (i = 0; i < sizeof mnt_flags / sizeof mnt_flags[0]; i++) {
670d8bc5f0aSmrg if (flags & mnt_flags[i].m_flag) {
671d8bc5f0aSmrg (void)printf("%s%s", sep, mnt_flags[i].m_name);
672d8bc5f0aSmrg flags &= ~mnt_flags[i].m_flag;
673d8bc5f0aSmrg sep = ",";
674fe8f3aeeScgd }
675fe8f3aeeScgd }
676fe8f3aeeScgd if (flags)
677d8bc5f0aSmrg (void)printf("%sunknown_flags:%x", sep, flags);
678fe8f3aeeScgd (void)printf(")");
679fe8f3aeeScgd }
680fe8f3aeeScgd (void)printf("\n");
681fe8f3aeeScgd }
682fe8f3aeeScgd
6833b06b649Smrg char *
loadvnodes(int * avnodes)6843f516538Srpaulo loadvnodes(int *avnodes)
685fe8f3aeeScgd {
686fe8f3aeeScgd int mib[2];
687f950d3cfSapb int status;
6880a77b69aSchristos size_t copysize;
6890a77b69aSchristos #if 0
6900a77b69aSchristos size_t oldsize;
6910a77b69aSchristos #endif
6923b06b649Smrg char *vnodebase;
693fe8f3aeeScgd
694644890e9Sbriggs if (totalflag) {
695644890e9Sbriggs KGET(V_NUMV, *avnodes);
696644890e9Sbriggs return NULL;
697644890e9Sbriggs }
698fe8f3aeeScgd if (memf != NULL) {
699fe8f3aeeScgd /*
700fe8f3aeeScgd * do it by hand
701fe8f3aeeScgd */
7023b06b649Smrg return (kinfo_vnodes(avnodes));
703fe8f3aeeScgd }
704fe8f3aeeScgd mib[0] = CTL_KERN;
705fe8f3aeeScgd mib[1] = KERN_VNODE;
706f950d3cfSapb /*
707f950d3cfSapb * First sysctl call gets the necessary buffer size; second
708f950d3cfSapb * sysctl call gets the data. We allow for some growth in the
709f950d3cfSapb * data size between the two sysctl calls (increases of a few
710f950d3cfSapb * thousand vnodes in between the two calls have been observed).
711f950d3cfSapb * We ignore ENOMEM from the second sysctl call, which can
712f950d3cfSapb * happen if the kernel's data grew by even more than we allowed
713f950d3cfSapb * for.
714f950d3cfSapb */
715fe8f3aeeScgd if (sysctl(mib, 2, NULL, ©size, NULL, 0) == -1)
716fe8f3aeeScgd err(1, "sysctl: KERN_VNODE");
7170a77b69aSchristos #if 0
718f950d3cfSapb oldsize = copysize;
7190a77b69aSchristos #endif
720f950d3cfSapb copysize += 100 * sizeof(struct vnode) + copysize / 20;
7213b06b649Smrg if ((vnodebase = malloc(copysize)) == NULL)
722aef41820Slukem err(1, "malloc");
723f950d3cfSapb status = sysctl(mib, 2, vnodebase, ©size, NULL, 0);
724f950d3cfSapb if (status == -1 && errno != ENOMEM)
725fe8f3aeeScgd err(1, "sysctl: KERN_VNODE");
726f950d3cfSapb #if 0 /* for debugging the amount of growth allowed for */
727f950d3cfSapb if (copysize != oldsize) {
728f950d3cfSapb warnx("count changed from %ld to %ld (%+ld)%s",
729f950d3cfSapb (long)(oldsize / sizeof(struct vnode)),
730f950d3cfSapb (long)(copysize / sizeof(struct vnode)),
731f950d3cfSapb (long)(copysize / sizeof(struct vnode)) -
732f950d3cfSapb (long)(oldsize / sizeof(struct vnode)),
733f950d3cfSapb (status == 0 ? "" : ", and errno = ENOMEM"));
734f950d3cfSapb }
735f950d3cfSapb #endif
736d80b31fdSenami if (copysize % (VPTRSZ + VNODESZ))
737fe8f3aeeScgd errx(1, "vnode size mismatch");
7383b06b649Smrg *avnodes = copysize / (VPTRSZ + VNODESZ);
7393b06b649Smrg
7403b06b649Smrg return (vnodebase);
741fe8f3aeeScgd }
742fe8f3aeeScgd
743fe8f3aeeScgd /*
744fe8f3aeeScgd * simulate what a running kernel does in in kinfo_vnode
745fe8f3aeeScgd */
746256581e1Shannken static int
vnode_cmp(const void * p1,const void * p2)747256581e1Shannken vnode_cmp(const void *p1, const void *p2)
748256581e1Shannken {
749256581e1Shannken const char *s1 = (const char *)p1;
750256581e1Shannken const char *s2 = (const char *)p2;
751256581e1Shannken const struct vnode *v1 = (const struct vnode *)(s1 + VPTRSZ);
752256581e1Shannken const struct vnode *v2 = (const struct vnode *)(s2 + VPTRSZ);
753256581e1Shannken
754256581e1Shannken return (v2->v_mount - v1->v_mount);
755256581e1Shannken }
756256581e1Shannken
7573b06b649Smrg char *
kinfo_vnodes(int * avnodes)7583f516538Srpaulo kinfo_vnodes(int *avnodes)
759fe8f3aeeScgd {
760256581e1Shannken int i;
761d80b31fdSenami char *beg, *bp, *ep;
762dcc198a3Shannken int numvnodes, next_offset;
763fe8f3aeeScgd
764fe8f3aeeScgd KGET(V_NUMV, numvnodes);
765d80b31fdSenami if ((bp = malloc((numvnodes + 20) * (VPTRSZ + VNODESZ))) == NULL)
766aef41820Slukem err(1, "malloc");
767d80b31fdSenami beg = bp;
768d80b31fdSenami ep = bp + (numvnodes + 20) * (VPTRSZ + VNODESZ);
769dcc198a3Shannken KGET(V_NEXT_OFFSET, next_offset);
770256581e1Shannken
77180e17de9Sad for (i = 0; i < 3; i++) {
772256581e1Shannken TAILQ_HEAD(vnodelst, vnode) lru_head;
773256581e1Shannken struct vnode *vp, vnode;
774256581e1Shannken
77580e17de9Sad KGET2((nl[V_LRU_LIST].n_value + sizeof(lru_head) * i), &lru_head,
77680e17de9Sad sizeof(lru_head), "lru_list");
777256581e1Shannken vp = TAILQ_FIRST(&lru_head);
778dcc198a3Shannken while (vp != NULL) {
779fe8f3aeeScgd KGET2(vp, &vnode, sizeof(vnode), "vnode");
780d80b31fdSenami if (bp + VPTRSZ + VNODESZ > ep)
781fe8f3aeeScgd /* XXX - should realloc */
782fe8f3aeeScgd errx(1, "no more room for vnodes");
783fe8f3aeeScgd memmove(bp, &vp, VPTRSZ);
784fe8f3aeeScgd bp += VPTRSZ;
785fe8f3aeeScgd memmove(bp, &vnode, VNODESZ);
786fe8f3aeeScgd bp += VNODESZ;
787dcc198a3Shannken KGET2((char *)vp + next_offset, &vp, sizeof(vp), "nvp");
788fe8f3aeeScgd }
789fe8f3aeeScgd }
790d80b31fdSenami *avnodes = (bp - beg) / (VPTRSZ + VNODESZ);
791256581e1Shannken /* Sort by mount like we get it from sysctl. */
792256581e1Shannken qsort(beg, *avnodes, VPTRSZ + VNODESZ, vnode_cmp);
7933b06b649Smrg return (beg);
794fe8f3aeeScgd }
795fe8f3aeeScgd
796fe8f3aeeScgd void
ttymode(void)7973f516538Srpaulo ttymode(void)
798fe8f3aeeScgd {
799aef41820Slukem int ntty;
800956fd533Smrg struct ttylist_head tty_head;
801956fd533Smrg struct tty *tp, tty;
802fe8f3aeeScgd
803956fd533Smrg KGET(TTY_NTTY, ntty);
804956fd533Smrg (void)printf("%d terminal device%s\n", ntty, ntty == 1 ? "" : "s");
805956fd533Smrg KGET(TTY_TTYLIST, tty_head);
806878dd0cdSenami (void)printf(
807878dd0cdSenami " LINE RAW CAN OUT HWT LWT COL STATE %-*s PGID DISC\n",
808878dd0cdSenami PTRSTRWIDTH, "SESS");
809956fd533Smrg for (tp = tty_head.tqh_first; tp; tp = tty.tty_link.tqe_next) {
810956fd533Smrg KGET2(tp, &tty, sizeof tty, "tty struct");
811956fd533Smrg ttyprt(&tty);
812b4b9d760Sderaadt }
813fe8f3aeeScgd }
814fe8f3aeeScgd
81501188cb4Sjdolecek static const struct flagbit_desc ttystates[] = {
816fe8f3aeeScgd { TS_ISOPEN, 'O'},
817553452c4Smycroft { TS_DIALOUT, '>'},
818fe8f3aeeScgd { TS_CARR_ON, 'C'},
819fe8f3aeeScgd { TS_TIMEOUT, 'T'},
820fe8f3aeeScgd { TS_FLUSH, 'F'},
821fe8f3aeeScgd { TS_BUSY, 'B'},
822fe8f3aeeScgd { TS_XCLUDE, 'X'},
823fe8f3aeeScgd { TS_TTSTOP, 'S'},
824fe8f3aeeScgd { TS_TBLOCK, 'K'},
825fe8f3aeeScgd { TS_ASYNC, 'Y'},
826fe8f3aeeScgd { TS_BKSL, 'D'},
827fe8f3aeeScgd { TS_ERASE, 'E'},
828fe8f3aeeScgd { TS_LNCH, 'L'},
829fe8f3aeeScgd { TS_TYPEN, 'P'},
830fe8f3aeeScgd { TS_CNTTB, 'N'},
831fe8f3aeeScgd { 0, '\0'},
832fe8f3aeeScgd };
833fe8f3aeeScgd
834fe8f3aeeScgd void
ttyprt(struct tty * tp)8353f516538Srpaulo ttyprt(struct tty *tp)
836fe8f3aeeScgd {
837c4f3ebe6Senami char state[sizeof(ttystates) / sizeof(ttystates[0]) + 1];
838dcf8481aSmrg char dev[4 + 1 + 7 + 1]; /* 12bit major + 20bit minor */
839dd8effeaStron struct linesw t_linesw;
84068a1fbb8Schristos const char *name;
84168a1fbb8Schristos char buffer;
842c4f3ebe6Senami pid_t pgid;
843878dd0cdSenami int n, ovflw;
844fe8f3aeeScgd
845878dd0cdSenami if (usenumflag || (name = devname(tp->t_dev, S_IFCHR)) == NULL) {
84607b8d9f3Schristos devprintf(dev, sizeof(dev), tp->t_dev);
847878dd0cdSenami name = dev;
848878dd0cdSenami }
849878dd0cdSenami ovflw = 0;
850878dd0cdSenami PRWORD(ovflw, "%-*s", 7, 0, name);
851878dd0cdSenami PRWORD(ovflw, " %*d", 3, 1, tp->t_rawq.c_cc);
852878dd0cdSenami PRWORD(ovflw, " %*d", 4, 1, tp->t_canq.c_cc);
853878dd0cdSenami PRWORD(ovflw, " %*d", 4, 1, tp->t_outq.c_cc);
854878dd0cdSenami PRWORD(ovflw, " %*d", 5, 1, tp->t_hiwat);
855878dd0cdSenami PRWORD(ovflw, " %*d", 4, 1, tp->t_lowat);
856878dd0cdSenami PRWORD(ovflw, " %*d", 8, 1, tp->t_column);
857c4f3ebe6Senami n = getflags(ttystates, state, tp->t_state);
858c4f3ebe6Senami if (tp->t_wopen) {
859c4f3ebe6Senami state[n++] = 'W';
860c4f3ebe6Senami state[n] = '\0';
861c4f3ebe6Senami }
862878dd0cdSenami PRWORD(ovflw, " %-*s", 7, 1, state);
863878dd0cdSenami PRWORD(ovflw, " %*lX", PTRSTRWIDTH + 1, 1, (u_long)tp->t_session);
864fe8f3aeeScgd pgid = 0;
865fe8f3aeeScgd if (tp->t_pgrp != NULL)
866fe8f3aeeScgd KGET2(&tp->t_pgrp->pg_id, &pgid, sizeof(pid_t), "pgid");
867878dd0cdSenami PRWORD(ovflw, " %*d", 6, 1, pgid);
868dd8effeaStron KGET2(tp->t_linesw, &t_linesw, sizeof(t_linesw),
869dd8effeaStron "line discipline switch table");
870dd8effeaStron name = t_linesw.l_name;
871878dd0cdSenami (void)putchar(' ');
872dd8effeaStron for (;;) {
873dd8effeaStron KGET2(name, &buffer, sizeof(buffer), "line discipline name");
874dd8effeaStron if (buffer == '\0')
875fe8f3aeeScgd break;
876dd8effeaStron (void)putchar(buffer);
877dd8effeaStron name++;
878fe8f3aeeScgd }
879dd8effeaStron (void)putchar('\n');
880fe8f3aeeScgd }
881fe8f3aeeScgd
88201188cb4Sjdolecek static const struct flagbit_desc filemode_flags[] = {
883c4f3ebe6Senami { FREAD, 'R' },
884c4f3ebe6Senami { FWRITE, 'W' },
885c4f3ebe6Senami { FAPPEND, 'A' },
886c4f3ebe6Senami #ifdef FSHLOCK /* currently gone */
887c4f3ebe6Senami { FSHLOCK, 'S' },
888c4f3ebe6Senami { FEXLOCK, 'X' },
889c4f3ebe6Senami #endif
890c4f3ebe6Senami { FASYNC, 'I' },
891c4f3ebe6Senami { 0, '\0' },
892c4f3ebe6Senami };
893c4f3ebe6Senami
894fe8f3aeeScgd void
filemode(void)8953f516538Srpaulo filemode(void)
896fe8f3aeeScgd {
89701a13dbaSmrg struct kinfo_file *ki;
898c4f3ebe6Senami char flags[sizeof(filemode_flags) / sizeof(filemode_flags[0])];
899d853cbbaSjdc char *buf, *offset;
900878dd0cdSenami int len, maxfile, nfile, ovflw;
901fe8f3aeeScgd
902fe8f3aeeScgd KGET(FNL_MAXFILE, maxfile);
903fe8f3aeeScgd if (totalflag) {
904fe8f3aeeScgd KGET(FNL_NFILE, nfile);
905fe8f3aeeScgd (void)printf("%3d/%3d files\n", nfile, maxfile);
906fe8f3aeeScgd return;
907fe8f3aeeScgd }
908d853cbbaSjdc if (getfiles(&buf, &len, &offset) == -1)
909fe8f3aeeScgd return;
910fe8f3aeeScgd /*
91101a13dbaSmrg * Getfiles returns in malloc'd memory to an array of kinfo_file2
91201a13dbaSmrg * structures.
913fe8f3aeeScgd */
91401a13dbaSmrg nfile = len / sizeof(struct kinfo_file);
915fe8f3aeeScgd
916fe8f3aeeScgd (void)printf("%d/%d open files\n", nfile, maxfile);
91764da32e6Sad (void)printf("%*s%s%*s TYPE FLG CNT MSG %*s%s%*s IFLG OFFSET\n",
918878dd0cdSenami (PTRSTRWIDTH - 4) / 2, "", " LOC", (PTRSTRWIDTH - 4) / 2, "",
919878dd0cdSenami (PTRSTRWIDTH - 4) / 2, "", "DATA", (PTRSTRWIDTH - 4) / 2, "");
92001a13dbaSmrg for (ki = (struct kinfo_file *)offset; nfile--; ki++) {
92101a13dbaSmrg if ((unsigned)ki->ki_ftype >= sizeof(dtypes) / sizeof(dtypes[0]))
922fe8f3aeeScgd continue;
923878dd0cdSenami ovflw = 0;
92401a13dbaSmrg (void)getflags(filemode_flags, flags, ki->ki_flag);
92501a13dbaSmrg PRWORD(ovflw, "%*lx", PTRSTRWIDTH, 0, (long)ki->ki_fileaddr);
92601a13dbaSmrg PRWORD(ovflw, " %-*s", 9, 1, dtypes[ki->ki_ftype]);
927878dd0cdSenami PRWORD(ovflw, " %*s", 6, 1, flags);
92801a13dbaSmrg PRWORD(ovflw, " %*d", 5, 1, ki->ki_count);
92901a13dbaSmrg PRWORD(ovflw, " %*d", 5, 1, ki->ki_msgcount);
93001a13dbaSmrg PRWORD(ovflw, " %*lx", PTRSTRWIDTH + 1, 2, (long)ki->ki_fdata);
93169f9e170Sad PRWORD(ovflw, " %*x", 5, 1, 0);
932aecc7237Slukem if ((off_t)ki->ki_foffset < 0)
933d853cbbaSjdc PRWORD(ovflw, " %-*lld\n", PTRSTRWIDTH + 1, 2,
93401a13dbaSmrg (long long)ki->ki_foffset);
935fe8f3aeeScgd else
936878dd0cdSenami PRWORD(ovflw, " %-*lld\n", PTRSTRWIDTH + 1, 2,
93701a13dbaSmrg (long long)ki->ki_foffset);
938fe8f3aeeScgd }
939fe8f3aeeScgd free(buf);
940fe8f3aeeScgd }
941fe8f3aeeScgd
942fe8f3aeeScgd int
getfiles(char ** abuf,int * alen,char ** aoffset)9433f516538Srpaulo getfiles(char **abuf, int *alen, char **aoffset)
944fe8f3aeeScgd {
945fe8f3aeeScgd size_t len;
94601a13dbaSmrg int mib[6];
947fe8f3aeeScgd char *buf;
948d853cbbaSjdc size_t offset;
949fe8f3aeeScgd
950fe8f3aeeScgd /*
951fe8f3aeeScgd * XXX
952fe8f3aeeScgd * Add emulation of KINFO_FILE here.
953fe8f3aeeScgd */
954fe8f3aeeScgd if (memf != NULL)
955773c9cf9Sad errx(1, "files on dead kernel, not implemented");
956fe8f3aeeScgd
957fe8f3aeeScgd mib[0] = CTL_KERN;
95801a13dbaSmrg mib[1] = KERN_FILE2;
95901a13dbaSmrg mib[2] = KERN_FILE_BYFILE;
96001a13dbaSmrg mib[3] = 0;
96101a13dbaSmrg mib[4] = sizeof(struct kinfo_file);
96201a13dbaSmrg mib[5] = 0;
96301a13dbaSmrg if (sysctl(mib, 6, NULL, &len, NULL, 0) == -1) {
96401a13dbaSmrg warn("sysctl: KERN_FILE2");
965fe8f3aeeScgd return (-1);
966fe8f3aeeScgd }
96701a13dbaSmrg /* We need to align (struct kinfo_file *) in the buffer. */
968d853cbbaSjdc offset = len % sizeof(off_t);
96901a13dbaSmrg mib[5] = len / sizeof(struct kinfo_file);
970d853cbbaSjdc if ((buf = malloc(len + offset)) == NULL)
971aef41820Slukem err(1, "malloc");
97201a13dbaSmrg if (sysctl(mib, 6, buf + offset, &len, NULL, 0) == -1) {
97301a13dbaSmrg warn("sysctl: 2nd KERN_FILE2");
97489152edaSwiz free(buf);
975fe8f3aeeScgd return (-1);
976fe8f3aeeScgd }
977fe8f3aeeScgd *abuf = buf;
978fe8f3aeeScgd *alen = len;
979d853cbbaSjdc *aoffset = (buf + offset);
980fe8f3aeeScgd return (0);
981fe8f3aeeScgd }
982fe8f3aeeScgd
983fe8f3aeeScgd void
usage(void)9843f516538Srpaulo usage(void)
985fe8f3aeeScgd {
986041d1aa9Senami
987fe8f3aeeScgd (void)fprintf(stderr,
9889bf440d2Smrg "usage: %s [-T|-f|-s|-t|-v] [-ghkmn] [-M core] [-N system]\n",
989dd20cf83Senami getprogname());
990fe8f3aeeScgd exit(1);
991fe8f3aeeScgd }
992