xref: /dflybsd-src/sys/kern/kern_kinfo.c (revision dae741e33c840b92a8a53bf9f01157ede145e256)
1 /*-
2  * Copyright (c) 2007 The DragonFly Project.  All rights reserved.
3  *
4  * This code is derived from software contributed to The DragonFly Project
5  * by Simon 'corecode' Schubert <corecode@fs.ei.tum.de>
6  * by Thomas E. Spanjaard <tgen@netphreax.net>
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  * 2. Redistributions in binary form must reproduce the above copyright
15  *    notice, this list of conditions and the following disclaimer in
16  *    the documentation and/or other materials provided with the
17  *    distribution.
18  * 3. Neither the name of The DragonFly Project nor the names of its
19  *    contributors may be used to endorse or promote products derived
20  *    from this software without specific, prior written permission.
21  *
22  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
23  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
24  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
25  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE
26  * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
27  * INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING,
28  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
29  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
30  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
31  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
32  * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  *
35  * $DragonFly: src/sys/kern/kern_kinfo.c,v 1.17 2008/01/07 23:41:55 dillon Exp $
36  */
37 
38 /*
39  * This is a source file used by both the kernel and libkvm.
40  */
41 
42 #ifndef _KERNEL
43 #define _KERNEL_STRUCTURES
44 #endif
45 
46 #include <sys/proc.h>
47 #include <vm/vm_map.h>
48 #include <sys/kinfo.h>
49 #include <sys/tty.h>
50 #include <sys/conf.h>
51 #include <sys/jail.h>
52 #include <sys/mplock2.h>
53 #include <sys/globaldata.h>
54 #ifdef _KERNEL
55 #include <sys/systm.h>
56 #include <sys/sysref.h>
57 #include <sys/sysref2.h>
58 #else
59 #include <string.h>
60 
61 dev_t dev2udev(cdev_t dev);	/* kvm_proc.c */
62 #endif
63 
64 
65 /*
66  * Fill in a struct kinfo_proc.
67  *
68  * NOTE!  We may be asked to fill in kinfo_proc for a zombied process, and
69  * the process may be in the middle of being deallocated.  Check all pointers
70  * for NULL.
71  */
72 void
73 fill_kinfo_proc(struct proc *p, struct kinfo_proc *kp)
74 {
75 	struct session *sess;
76 	struct pgrp *pgrp;
77 	struct vmspace *vm;
78 
79 	pgrp = p->p_pgrp;
80 	sess = pgrp ? pgrp->pg_session : NULL;
81 
82 	bzero(kp, sizeof(*kp));
83 
84 	kp->kp_paddr = (uintptr_t)p;
85 	kp->kp_fd = (uintptr_t)p->p_fd;
86 
87 	kp->kp_flags = p->p_flag;
88 	kp->kp_stat = p->p_stat;
89 	kp->kp_lock = p->p_lock;
90 	kp->kp_acflag = p->p_acflag;
91 	kp->kp_traceflag = p->p_traceflag;
92 	kp->kp_siglist = p->p_siglist;
93 	if (p->p_sigacts) {
94 		kp->kp_sigignore = p->p_sigignore;	/* p_sigacts-> */
95 		kp->kp_sigcatch = p->p_sigcatch;	/* p_sigacts-> */
96 		kp->kp_sigflag = p->p_sigacts->ps_flag;
97 	}
98 	kp->kp_start = p->p_start;
99 
100 	strncpy(kp->kp_comm, p->p_comm, sizeof(kp->kp_comm) - 1);
101 	kp->kp_comm[sizeof(kp->kp_comm) - 1] = 0;
102 
103 	if (p->p_ucred) {
104 		kp->kp_uid = p->p_ucred->cr_uid;
105 		kp->kp_ngroups = p->p_ucred->cr_ngroups;
106 		if (p->p_ucred->cr_groups) {
107 			bcopy(p->p_ucred->cr_groups, kp->kp_groups,
108 			      NGROUPS * sizeof(kp->kp_groups[0]));
109 		}
110 		kp->kp_ruid = p->p_ucred->cr_ruid;
111 		kp->kp_svuid = p->p_ucred->cr_svuid;
112 		kp->kp_rgid = p->p_ucred->cr_rgid;
113 		kp->kp_svgid = p->p_ucred->cr_svgid;
114 	}
115 
116 	kp->kp_pid = p->p_pid;
117 	if (p->p_oppid != 0)
118 		kp->kp_ppid = p->p_oppid;
119 	else
120 		kp->kp_ppid = p->p_pptr != NULL ? p->p_pptr->p_pid : -1;
121 	if (pgrp) {
122 		kp->kp_pgid = pgrp->pg_id;
123 		kp->kp_jobc = pgrp->pg_jobc;
124 	}
125 	if (sess) {
126 		kp->kp_sid = sess->s_sid;
127 		bcopy(sess->s_login, kp->kp_login, MAXLOGNAME);
128 		if (sess->s_ttyvp != NULL)
129 			kp->kp_auxflags |= KI_CTTY;
130 		if ((p->p_session != NULL) && SESS_LEADER(p))
131 			kp->kp_auxflags |= KI_SLEADER;
132 	}
133 	if (sess && (p->p_flag & P_CONTROLT) != 0 && sess->s_ttyp != NULL) {
134 		kp->kp_tdev = dev2udev(sess->s_ttyp->t_dev);
135 		if (sess->s_ttyp->t_pgrp != NULL)
136 			kp->kp_tpgid = sess->s_ttyp->t_pgrp->pg_id;
137 		else
138 			kp->kp_tpgid = -1;
139 		if (sess->s_ttyp->t_session != NULL)
140 			kp->kp_tsid = sess->s_ttyp->t_session->s_sid;
141 		else
142 			kp->kp_tsid = -1;
143 	} else {
144 		kp->kp_tdev = NOUDEV;
145 	}
146 	kp->kp_exitstat = p->p_xstat;
147 	kp->kp_nthreads = p->p_nthreads;
148 	kp->kp_nice = p->p_nice;
149 	kp->kp_swtime = p->p_swtime;
150 
151 	if ((vm = p->p_vmspace) != NULL) {
152 #ifdef _KERNEL
153 		sysref_get(&vm->vm_sysref);
154 		lwkt_gettoken(&vm->vm_map.token);
155 #endif
156 		kp->kp_vm_map_size = vm->vm_map.size;
157 		kp->kp_vm_rssize = vmspace_resident_count(vm);
158 #ifdef _KERNEL
159 		kp->kp_vm_prssize = vmspace_president_count(vm);
160 #endif
161 		kp->kp_vm_swrss = vm->vm_swrss;
162 		kp->kp_vm_tsize = vm->vm_tsize;
163 		kp->kp_vm_dsize = vm->vm_dsize;
164 		kp->kp_vm_ssize = vm->vm_ssize;
165 #ifdef _KERNEL
166 		lwkt_reltoken(&vm->vm_map.token);
167 		sysref_put(&vm->vm_sysref);
168 #endif
169 	}
170 
171 	if (p->p_ucred && jailed(p->p_ucred))
172 		kp->kp_jailid = p->p_ucred->cr_prison->pr_id;
173 
174 	kp->kp_ru = p->p_ru;
175 	kp->kp_cru = p->p_cru;
176 }
177 
178 /*
179  * Fill in a struct kinfo_lwp.
180  */
181 void
182 fill_kinfo_lwp(struct lwp *lwp, struct kinfo_lwp *kl)
183 {
184 	bzero(kl, sizeof(*kl));
185 
186 	kl->kl_pid = lwp->lwp_proc->p_pid;
187 	kl->kl_tid = lwp->lwp_tid;
188 
189 	kl->kl_flags = lwp->lwp_flag;
190 	kl->kl_stat = lwp->lwp_stat;
191 	kl->kl_lock = lwp->lwp_lock;
192 	kl->kl_tdflags = lwp->lwp_thread->td_flags;
193 
194 	/*
195 	 * The process/lwp stat may not reflect whether the process is
196 	 * actually sleeping or not if the related thread was directly
197 	 * descheduled by LWKT.  Adjust the stat if the thread is not
198 	 * runnable and not waiting to be scheduled on a cpu by the
199 	 * user process scheduler.
200 	 */
201 	if (kl->kl_stat == LSRUN) {
202 		if ((kl->kl_tdflags & TDF_RUNQ) == 0 &&
203 		    (lwp->lwp_flag & LWP_ONRUNQ) == 0) {
204 			kl->kl_stat = LSSLEEP;
205 		}
206 	}
207 #ifdef SMP
208 	kl->kl_mpcount = get_mplock_count(lwp->lwp_thread);
209 #else
210 	kl->kl_mpcount = 0;
211 #endif
212 
213 	kl->kl_prio = lwp->lwp_usdata.bsd4.priority;	/* XXX TGEN dangerous assumption */
214 	kl->kl_tdprio = lwp->lwp_thread->td_pri;
215 	kl->kl_rtprio = lwp->lwp_rtprio;
216 
217 	kl->kl_uticks = lwp->lwp_thread->td_uticks;
218 	kl->kl_sticks = lwp->lwp_thread->td_sticks;
219 	kl->kl_iticks = lwp->lwp_thread->td_iticks;
220 	kl->kl_cpticks = lwp->lwp_cpticks;
221 	kl->kl_pctcpu = lwp->lwp_pctcpu;
222 	kl->kl_slptime = lwp->lwp_slptime;
223 	kl->kl_origcpu = lwp->lwp_usdata.bsd4.batch;
224 	kl->kl_estcpu = lwp->lwp_usdata.bsd4.estcpu;
225 	kl->kl_cpuid = lwp->lwp_thread->td_gd->gd_cpuid;
226 
227 	kl->kl_ru = lwp->lwp_ru;
228 
229 	kl->kl_siglist = lwp->lwp_siglist;
230 	kl->kl_sigmask = lwp->lwp_sigmask;
231 
232 	kl->kl_wchan = (uintptr_t)lwp->lwp_thread->td_wchan;
233 	if (lwp->lwp_thread->td_wmesg) {
234 		strncpy(kl->kl_wmesg, lwp->lwp_thread->td_wmesg, WMESGLEN);
235 		kl->kl_wmesg[WMESGLEN] = 0;
236 	}
237 }
238 
239 /*
240  * Fill in a struct kinfo_proc for kernel threads (i.e. those without proc).
241  */
242 void
243 fill_kinfo_proc_kthread(struct thread *td, struct kinfo_proc *kp)
244 {
245 	bzero(kp, sizeof(*kp));
246 
247 	/*
248 	 * Fill in fake proc information and semi-fake lwp info.
249 	 */
250 	kp->kp_pid = -1;
251 	kp->kp_tdev = NOUDEV;
252 	strncpy(kp->kp_comm, td->td_comm, sizeof(kp->kp_comm) - 1);
253 	kp->kp_comm[sizeof(kp->kp_comm) - 1] = 0;
254 	kp->kp_flags = P_SYSTEM;
255 	kp->kp_stat = SACTIVE;
256 
257 	kp->kp_lwp.kl_pid = -1;
258 	kp->kp_lwp.kl_tid = -1;
259 	kp->kp_lwp.kl_tdflags = td->td_flags;
260 #ifdef SMP
261 	kp->kp_lwp.kl_mpcount = get_mplock_count(td);
262 #else /* !SMP */
263 	kp->kp_lwp.kl_mpcount = 0;
264 #endif /* SMP */
265 
266 	kp->kp_lwp.kl_tdprio = td->td_pri;
267 	kp->kp_lwp.kl_rtprio.type = RTP_PRIO_THREAD;
268 	kp->kp_lwp.kl_rtprio.prio = td->td_pri;
269 
270 	kp->kp_lwp.kl_uticks = td->td_uticks;
271 	kp->kp_lwp.kl_sticks = td->td_sticks;
272 	kp->kp_lwp.kl_iticks = td->td_iticks;
273 	kp->kp_lwp.kl_cpuid = td->td_gd->gd_cpuid;
274 
275 	kp->kp_lwp.kl_wchan = (uintptr_t)td->td_wchan;
276 	if (td->td_flags & TDF_RUNQ)
277 		kp->kp_lwp.kl_stat = LSRUN;
278 	else
279 		kp->kp_lwp.kl_stat = LSSLEEP;
280 	if (td->td_wmesg) {
281 		strncpy(kp->kp_lwp.kl_wmesg, td->td_wmesg, WMESGLEN);
282 		kp->kp_lwp.kl_wmesg[WMESGLEN] = 0;
283 	}
284 }
285