2 * Copyright (c) 1988, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 static const char copyright[] =
36 "@(#) Copyright (c) 1988, 1993\n\
37 The Regents of the University of California. All rights reserved.\n";
42 static char sccsid[] = "@(#)fstat.c 8.3 (Berkeley) 5/2/95";
44 static const char rcsid[] =
48 #include <sys/param.h>
53 #include <sys/vnode.h>
54 #include <sys/socket.h>
55 #include <sys/socketvar.h>
56 #include <sys/domain.h>
57 #include <sys/protosw.h>
59 #include <sys/unpcb.h>
60 #include <sys/sysctl.h>
61 #include <sys/filedesc.h>
62 #include <sys/queue.h>
67 #include <ufs/ufs/quota.h>
68 #include <ufs/ufs/inode.h>
69 #include <sys/mount.h>
71 #include <nfs/nfsproto.h>
72 #include <nfs/rpcv2.h>
74 #include <nfs/nfsnode.h>
78 #include <vm/vm_map.h>
79 #include <vm/vm_object.h>
81 #include <net/route.h>
82 #include <netinet/in.h>
83 #include <netinet/in_systm.h>
84 #include <netinet/ip.h>
85 #include <netinet/in_pcb.h>
112 struct nlist nl[] = {
117 int fsflg, /* show files on same filesystem as file(s) argument */
118 pflg, /* show files open by a particular pid */
119 uflg; /* show files open by a particular (effective) user */
120 int checkfile; /* true if restricting to particular files or filesystems */
121 int nflg; /* (numerical) display f.s. and rdev as dev_t */
122 int vflg; /* display errors in locating kernel data objects etc... */
123 int mflg; /* include memory-mapped files */
126 struct file **ofiles; /* buffer of pointers to file structures */
128 #define ALLOC_OFILES(d) \
129 if ((d) > maxfiles) { \
131 ofiles = malloc((d) * sizeof(struct file *)); \
132 if (ofiles == NULL) { \
140 void dofiles __P((struct kinfo_proc *kp));
141 void dommap __P((struct kinfo_proc *kp));
142 void vtrans __P((struct vnode *vp, int i, int flag));
143 int ufs_filestat __P((struct vnode *vp, struct filestat *fsp));
144 int nfs_filestat __P((struct vnode *vp, struct filestat *fsp));
145 char *getmnton __P((struct mount *m));
146 void pipetrans __P((struct pipe *pi, int i, int flag));
147 void socktrans __P((struct socket *sock, int i));
148 void getinetproto __P((int number));
149 int getfname __P((char *filename));
150 void usage __P((void));
158 register struct passwd *passwd;
159 struct kinfo_proc *p, *plast;
162 char buf[_POSIX2_LINE_MAX];
166 what = KERN_PROC_ALL;
167 nlistf = memf = NULL;
168 while ((ch = getopt(argc, argv, "fmnp:u:vN:M:")) != -1)
188 if (!isdigit(*optarg)) {
189 warnx("-p requires a process id");
192 what = KERN_PROC_PID;
198 if (!(passwd = getpwnam(optarg)))
199 errx(1, "%s: unknown uid", optarg);
200 what = KERN_PROC_UID;
201 arg = passwd->pw_uid;
211 if (*(argv += optind)) {
212 for (; *argv; ++argv) {
216 if (!checkfile) /* file(s) specified, but none accessable */
220 ALLOC_OFILES(256); /* reserve space for file pointers */
222 if (fsflg && !checkfile) {
223 /* -f with no files means use wd */
224 if (getfname(".") == 0)
230 * Discard setgid privileges if not the running kernel so that bad
231 * guys can't print interesting stuff from kernel memory.
233 if (nlistf != NULL || memf != NULL)
236 if ((kd = kvm_openfiles(nlistf, memf, NULL, O_RDONLY, buf)) == NULL)
239 if (kvm_nlist(kd, nl) != 0)
240 errx(1, "no namelist: %s", kvm_geterr(kd));
242 if ((p = kvm_getprocs(kd, what, arg, &cnt)) == NULL)
243 errx(1, "%s", kvm_geterr(kd));
246 "USER CMD PID FD DEV INUM MODE SZ|DV R/W");
249 "USER CMD PID FD MOUNT INUM MODE SZ|DV R/W");
250 if (checkfile && fsflg == 0)
255 for (plast = &p[cnt]; p < plast; ++p) {
256 if (p->ki_stat == SZOMB)
268 #define PREFIX(i) printf("%-8.8s %-10s %5d", Uname, Comm, Pid); \
291 * print open files attributed to this process
295 struct kinfo_proc *kp;
299 struct filedesc0 filed0;
300 #define filed filed0.fd_fd
302 Uname = user_from_uid(kp->ki_uid, 0);
306 if (kp->ki_fd == NULL)
308 if (!KVM_READ(kp->ki_fd, &filed0, sizeof (filed0))) {
309 dprintf(stderr, "can't read filedesc at %p for pid %d\n",
310 (void *)kp->ki_fd, Pid);
314 * root directory vnode, if one
317 vtrans(filed.fd_rdir, RDIR, FREAD);
319 * current working directory vnode
321 vtrans(filed.fd_cdir, CDIR, FREAD);
323 * ktrace vnode, if one
326 vtrans(kp->ki_tracep, TRACE, FREAD|FWRITE);
331 vtrans(kp->ki_textvp, TEXT, FREAD);
335 #define FPSIZE (sizeof (struct file *))
336 ALLOC_OFILES(filed.fd_lastfile+1);
337 if (filed.fd_nfiles > NDFILE) {
338 if (!KVM_READ(filed.fd_ofiles, ofiles,
339 (filed.fd_lastfile+1) * FPSIZE)) {
341 "can't read file structures at %p for pid %d\n",
342 (void *)filed.fd_ofiles, Pid);
346 bcopy(filed0.fd_dfiles, ofiles, (filed.fd_lastfile+1) * FPSIZE);
347 for (i = 0; i <= filed.fd_lastfile; i++) {
348 if (ofiles[i] == NULL)
350 if (!KVM_READ(ofiles[i], &file, sizeof (struct file))) {
351 dprintf(stderr, "can't read file %d at %p for pid %d\n",
352 i, (void *)ofiles[i], Pid);
355 if (file.f_type == DTYPE_VNODE)
356 vtrans((struct vnode *)file.f_data, i, file.f_flag);
357 else if (file.f_type == DTYPE_SOCKET) {
359 socktrans((struct socket *)file.f_data, i);
362 else if (file.f_type == DTYPE_PIPE) {
364 pipetrans((struct pipe *)file.f_data, i,
370 "unknown file type %d for file %d of pid %d\n",
371 file.f_type, i, Pid);
378 struct kinfo_proc *kp;
381 struct vmspace vmspace;
382 struct vm_map_entry entry;
383 vm_map_entry_t entryp;
384 struct vm_object object;
388 if (!KVM_READ(kp->ki_vmspace, &vmspace, sizeof(vmspace))) {
390 "can't read vmspace at %p for pid %d\n",
391 (void *)kp->ki_vmspace, Pid);
394 map = &vmspace.vm_map;
396 for (entryp = map->header.next; entryp != &vmspace.vm_map.header;
397 entryp = entry.next) {
398 if (!KVM_READ(entryp, &entry, sizeof(entry))) {
400 "can't read vm_map_entry at %p for pid %d\n",
401 (void *)entryp, Pid);
405 if (entry.eflags & MAP_ENTRY_IS_SUB_MAP)
408 if ((objp = entry.object.vm_object) == NULL)
411 for (; objp; objp = object.backing_object) {
412 if (!KVM_READ(objp, &object, sizeof(object))) {
414 "can't read vm_object at %p for pid %d\n",
420 prot = entry.protection;
421 fflags = (prot & VM_PROT_READ ? FREAD : 0) |
422 (prot & VM_PROT_WRITE ? FWRITE : 0);
424 switch (object.type) {
426 vtrans((struct vnode *)object.handle, MMAP, fflags);
442 char rw[3], mode[15];
443 char *badtype = NULL, *filename, *getmnton();
445 filename = badtype = NULL;
446 if (!KVM_READ(vp, &vn, sizeof (struct vnode))) {
447 dprintf(stderr, "can't read vnode at %p for pid %d\n",
451 if (vn.v_type == VNON || vn.v_tag == VT_NON)
453 else if (vn.v_type == VBAD)
458 if (!ufs_filestat(&vn, &fst))
462 if (!ufs_filestat(&vn, &fst))
466 if (!nfs_filestat(&vn, &fst))
471 if (!msdosfs_filestat(&vn, &fst))
476 if (!isofs_filestat(&vn, &fst))
481 static char unknown[10];
482 sprintf(badtype = unknown, "?(%x)", vn.v_tag);
492 for (d = devs; d != NULL; d = d->next)
493 if (d->fsid == fst.fsid) {
495 if (d->ino == fst.fileid) {
500 if (fsmatch == 0 || (filename == NULL && fsflg == 0))
505 (void)printf(" - - %10s -\n", badtype);
509 (void)printf(" %2d,%-2d", major(fst.fsid), minor(fst.fsid));
511 (void)printf(" %-8s", getmnton(vn.v_mount));
513 (void)sprintf(mode, "%o", fst.mode);
515 strmode(fst.mode, mode);
516 (void)printf(" %6ld %10s", fst.fileid, mode);
522 if (nflg || ((name = devname(fst.rdev, vn.v_type == VCHR ?
523 S_IFCHR : S_IFBLK)) == NULL))
524 printf(" %2d,%-2d", major(fst.rdev), minor(fst.rdev));
526 printf(" %6s", name);
530 printf(" %6lu", fst.size);
538 if (filename && !fsflg)
539 printf(" %s", filename);
544 ufs_filestat(vp, fsp)
546 struct filestat *fsp;
550 if (!KVM_READ(VTOI(vp), &inode, sizeof (inode))) {
551 dprintf(stderr, "can't read inode at %p for pid %d\n",
552 (void *)VTOI(vp), Pid);
556 * The st_dev from stat(2) is a udev_t. These kernel structures
557 * contain dev_t structures. We need to convert to udev to make
560 fsp->fsid = dev2udev(inode.i_dev) & 0xffff;
561 fsp->fileid = (long)inode.i_number;
562 fsp->mode = (mode_t)inode.i_mode;
563 fsp->size = (u_long)inode.i_size;
564 fsp->rdev = inode.i_rdev;
570 nfs_filestat(vp, fsp)
572 struct filestat *fsp;
574 struct nfsnode nfsnode;
575 register mode_t mode;
577 if (!KVM_READ(VTONFS(vp), &nfsnode, sizeof (nfsnode))) {
578 dprintf(stderr, "can't read nfsnode at %p for pid %d\n",
579 (void *)VTONFS(vp), Pid);
582 fsp->fsid = nfsnode.n_vattr.va_fsid;
583 fsp->fileid = nfsnode.n_vattr.va_fileid;
584 fsp->size = nfsnode.n_size;
585 fsp->rdev = nfsnode.n_vattr.va_rdev;
586 mode = (mode_t)nfsnode.n_vattr.va_mode;
587 switch (vp->v_type) {
623 static struct mount mount;
627 char mntonname[MNAMELEN];
629 register struct mtab *mt;
631 for (mt = mhead; mt != NULL; mt = mt->next)
633 return (mt->mntonname);
634 if (!KVM_READ(m, &mount, sizeof(struct mount))) {
635 warnx("can't read mount table at %p", (void *)m);
638 if ((mt = malloc(sizeof (struct mtab))) == NULL)
641 bcopy(&mount.mnt_stat.f_mntonname[0], &mt->mntonname[0], MNAMELEN);
644 return (mt->mntonname);
648 pipetrans(pi, i, flag)
659 if (!KVM_READ(pi, &pip, sizeof(struct pipe))) {
660 dprintf(stderr, "can't read pipe at %p\n", (void *)pi);
664 printf("* pipe %8x <-> %8x", (int)pi, (int)pip.pipe_peer);
665 printf(" %6d", (int)pip.pipe_buffer.cnt);
684 static char *stypename[] = {
694 struct protosw proto;
699 char dname[32], *strcpy();
704 if (!KVM_READ(sock, &so, sizeof(struct socket))) {
705 dprintf(stderr, "can't read sock at %p\n", (void *)sock);
709 /* fill in protosw entry */
710 if (!KVM_READ(so.so_proto, &proto, sizeof(struct protosw))) {
711 dprintf(stderr, "can't read protosw at %p",
712 (void *)so.so_proto);
717 if (!KVM_READ(proto.pr_domain, &dom, sizeof(struct domain))) {
718 dprintf(stderr, "can't read domain at %p\n",
719 (void *)proto.pr_domain);
723 if ((len = kvm_read(kd, (u_long)dom.dom_name, dname,
724 sizeof(dname) - 1)) < 0) {
725 dprintf(stderr, "can't read domain name at %p\n",
726 (void *)dom.dom_name);
732 if ((u_short)so.so_type > STYPEMAX)
733 printf("* %s ?%d", dname, so.so_type);
735 printf("* %s %s", dname, stypename[so.so_type]);
738 * protocol specific formatting
740 * Try to find interesting things to print. For tcp, the interesting
741 * thing is the address of the tcpcb, for udp and others, just the
742 * inpcb (socket pcb). For unix domain, its the address of the socket
743 * pcb and the address of the connected pcb (if connected). Otherwise
744 * just print the protocol number and address of the socket itself.
745 * The idea is not to duplicate netstat, but to make available enough
746 * information for further analysis.
748 switch(dom.dom_family) {
751 getinetproto(proto.pr_protocol);
752 if (proto.pr_protocol == IPPROTO_TCP ) {
754 if (kvm_read(kd, (u_long)so.so_pcb,
755 (char *)&inpcb, sizeof(struct inpcb))
756 != sizeof(struct inpcb)) {
758 "can't read inpcb at %p\n",
762 printf(" %x", (int)inpcb.inp_ppcb);
766 printf(" %x", (int)so.so_pcb);
769 /* print address of pcb and connected pcb */
771 printf(" %x", (int)so.so_pcb);
772 if (kvm_read(kd, (u_long)so.so_pcb, (char *)&unpcb,
773 sizeof(struct unpcb)) != sizeof(struct unpcb)){
774 dprintf(stderr, "can't read unpcb at %p\n",
778 if (unpcb.unp_conn) {
779 char shoconn[4], *cp;
782 if (!(so.so_state & SS_CANTRCVMORE))
785 if (!(so.so_state & SS_CANTSENDMORE))
788 printf(" %s %x", shoconn,
789 (int)unpcb.unp_conn);
794 /* print protocol number and socket address */
795 printf(" %d %x", proto.pr_protocol, (int)sock);
805 * Read the specinfo structure in the kernel (as pointed to by a dev_t)
806 * in order to work out the associated udev_t
814 if (KVM_READ(dev, &si, sizeof si)) {
817 dprintf(stderr, "can't convert dev_t %p to a udev_t\n",
825 * print name of protocol number
832 register struct protoent *pe;
835 setprotoent(++isopen);
836 if ((pe = getprotobynumber(number)) != NULL)
837 printf(" %s", pe->p_name);
839 printf(" %d", number);
849 if (stat(filename, &statbuf)) {
850 warn("%s", filename);
853 if ((cur = malloc(sizeof(DEVS))) == NULL)
858 cur->ino = statbuf.st_ino;
859 cur->fsid = statbuf.st_dev & 0xffff;
860 cur->name = filename;
867 (void)fprintf(stderr,
868 "usage: fstat [-fmnv] [-p pid] [-u user] [-N system] [-M core] [file ...]\n");