2 * SPDX-License-Identifier: BSD-2-Clause
4 * Copyright (c) 2017 Dell EMC
5 * Copyright (c) 2007 Sandvine Incorporated
6 * Copyright (c) 1998 John D. Polstra
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
19 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
22 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 #include <sys/cdefs.h>
32 #include <sys/endian.h>
33 #include <sys/param.h>
34 #include <sys/procfs.h>
35 #include <sys/ptrace.h>
36 #include <sys/queue.h>
37 #include <sys/linker_set.h>
39 #include <sys/sysctl.h>
42 #include <machine/elf.h>
43 #include <vm/vm_param.h>
60 * Code for generating ELF core dumps.
64 struct map_entry *next;
70 typedef void (*segment_callback)(struct map_entry *, void *);
72 /* Closure for cb_put_phdr(). */
74 Elf_Phdr *phdr; /* Program header to fill in */
75 Elf_Off offset; /* Offset of segment in core file */
78 /* Closure for cb_size_segment(). */
80 int count; /* Count of writable segments. */
81 size_t size; /* Total size of all writable segments. */
84 #ifdef ELFCORE_COMPAT_32
85 typedef struct prpsinfo32 elfcore_prpsinfo_t;
87 typedef prpsinfo_t elfcore_prpsinfo_t;
90 typedef void* (*notefunc_t)(void *, size_t *);
92 static void cb_put_phdr(struct map_entry *, void *);
93 static void cb_size_segment(struct map_entry *, void *);
94 static void each_dumpable_segment(struct map_entry *, segment_callback,
96 static void elf_detach(void); /* atexit() handler. */
97 static void *elf_note_prpsinfo(void *, size_t *);
98 #if defined(__i386__) || defined(__amd64__)
99 static void *elf_note_x86_xstate(void *, size_t *);
101 #if defined(__powerpc__)
102 static void *elf_note_powerpc_vmx(void *, size_t *);
103 static void *elf_note_powerpc_vsx(void *, size_t *);
105 static void *elf_note_procstat_auxv(void *, size_t *);
106 static void *elf_note_procstat_files(void *, size_t *);
107 static void *elf_note_procstat_groups(void *, size_t *);
108 static void *elf_note_procstat_osrel(void *, size_t *);
109 static void *elf_note_procstat_proc(void *, size_t *);
110 static void *elf_note_procstat_psstrings(void *, size_t *);
111 static void *elf_note_procstat_rlimit(void *, size_t *);
112 static void *elf_note_procstat_umask(void *, size_t *);
113 static void *elf_note_procstat_vmmap(void *, size_t *);
114 static void elf_puthdr(int, pid_t, struct map_entry *, void *, size_t, size_t,
116 static void elf_putnote(int, notefunc_t, void *, struct sbuf *);
117 static void elf_putnotes(pid_t, struct sbuf *, size_t *);
118 static void elf_putregnote(int, lwpid_t, struct sbuf *);
119 static void freemap(struct map_entry *);
120 static struct map_entry *readmap(pid_t);
121 static void *procstat_sysctl(void *, int, size_t, size_t *sizep);
123 static pid_t g_pid; /* Pid being dumped, global for elf_detach */
124 static int g_status; /* proc status after ptrace attach */
127 elf_ident(int efd, pid_t pid __unused, char *binfile __unused)
133 cnt = read(efd, &hdr, sizeof(hdr));
134 if (cnt != sizeof(hdr))
138 switch (hdr.e_ident[EI_DATA]) {
140 machine = le16toh(hdr.e_machine);
143 machine = be16toh(hdr.e_machine);
148 if (!ELF_MACHINE_OK(machine))
162 * Forward any pending signals. SIGSTOP is generated by ptrace
163 * itself, so ignore it.
165 sig = WIFSTOPPED(g_status) ? WSTOPSIG(g_status) : 0;
168 ptrace(PT_DETACH, g_pid, (caddr_t)1, sig);
173 * Write an ELF coredump for the given pid to the given fd.
176 elf_coredump(int efd, int fd, pid_t pid)
178 struct map_entry *map;
179 struct sseg_closure seginfo;
182 size_t hdrsize, notesz, segoff;
187 /* Attach to process to dump. */
189 if (atexit(elf_detach) != 0)
192 ptrace(PT_ATTACH, pid, NULL, 0);
195 if (waitpid(pid, &g_status, 0) == -1)
198 /* Get the program's memory map. */
201 /* Size the program segments. */
204 each_dumpable_segment(map, cb_size_segment, &seginfo);
207 * Build the header and the notes using sbuf and write to the file.
209 sb = sbuf_new_auto();
210 hdrsize = sizeof(Elf_Ehdr) + sizeof(Elf_Phdr) * (1 + seginfo.count);
211 if (seginfo.count + 1 >= PN_XNUM)
212 hdrsize += sizeof(Elf_Shdr);
213 /* Start header + notes section. */
214 sbuf_start_section(sb, NULL);
215 /* Make empty header subsection. */
216 sbuf_start_section(sb, &old_len);
218 sbuf_end_section(sb, old_len, hdrsize, 0);
220 elf_putnotes(pid, sb, ¬esz);
221 /* Align up to a page boundary for the program segments. */
222 sbuf_end_section(sb, -1, getpagesize(), 0);
223 if (sbuf_finish(sb) != 0)
224 err(1, "sbuf_finish");
226 segoff = sbuf_len(sb);
227 /* Fill in the header. */
228 elf_puthdr(efd, pid, map, hdr, hdrsize, notesz, segoff, seginfo.count);
230 n = write(fd, hdr, segoff);
234 errx(1, "short write");
236 /* Write the contents of all of the writable segments. */
237 php = (Elf_Phdr *)((char *)hdr + sizeof(Elf_Ehdr)) + 1;
238 for (i = 0; i < seginfo.count; i++) {
239 struct ptrace_io_desc iorequest;
240 uintmax_t nleft = php->p_filesz;
242 iorequest.piod_op = PIOD_READ_D;
243 iorequest.piod_offs = (caddr_t)(uintptr_t)php->p_vaddr;
249 if (nleft > sizeof(buf))
253 iorequest.piod_addr = buf;
254 iorequest.piod_len = nwant;
255 ptrace(PT_IO, pid, (caddr_t)&iorequest, 0);
256 ngot = iorequest.piod_len;
257 if ((size_t)ngot < nwant)
258 errx(1, "short read wanted %zu, got %zd",
260 ngot = write(fd, buf, nwant);
262 err(1, "write of segment %d failed", i);
263 if ((size_t)ngot != nwant)
264 errx(1, "short write");
266 iorequest.piod_offs += ngot;
275 * A callback for each_dumpable_segment() to write out the segment's
276 * program header entry.
279 cb_put_phdr(struct map_entry *entry, void *closure)
281 struct phdr_closure *phc = (struct phdr_closure *)closure;
282 Elf_Phdr *phdr = phc->phdr;
285 page_size = getpagesize();
286 phc->offset = roundup2(phc->offset, page_size);
288 phdr->p_type = PT_LOAD;
289 phdr->p_offset = phc->offset;
290 phdr->p_vaddr = entry->start;
292 phdr->p_filesz = phdr->p_memsz = entry->end - entry->start;
293 phdr->p_align = page_size;
295 if (entry->protection & VM_PROT_READ)
296 phdr->p_flags |= PF_R;
297 if (entry->protection & VM_PROT_WRITE)
298 phdr->p_flags |= PF_W;
299 if (entry->protection & VM_PROT_EXECUTE)
300 phdr->p_flags |= PF_X;
302 phc->offset += phdr->p_filesz;
307 * A callback for each_dumpable_segment() to gather information about
308 * the number of segments and their total size.
311 cb_size_segment(struct map_entry *entry, void *closure)
313 struct sseg_closure *ssc = (struct sseg_closure *)closure;
316 ssc->size += entry->end - entry->start;
320 * For each segment in the given memory map, call the given function
321 * with a pointer to the map entry and some arbitrary caller-supplied
325 each_dumpable_segment(struct map_entry *map, segment_callback func,
328 struct map_entry *entry;
330 for (entry = map; entry != NULL; entry = entry->next)
331 (*func)(entry, closure);
335 elf_putnotes(pid_t pid, struct sbuf *sb, size_t *sizep)
338 size_t threads, old_len;
343 threads = ptrace(PT_GETNUMLWPS, pid, NULL, 0);
345 err(1, "PT_GETNUMLWPS");
346 tids = malloc(threads * sizeof(*tids));
348 errx(1, "out of memory");
350 ptrace(PT_GETLWPLIST, pid, (void *)tids, threads);
352 err(1, "PT_GETLWPLIST");
354 sbuf_start_section(sb, &old_len);
355 elf_putnote(NT_PRPSINFO, elf_note_prpsinfo, &pid, sb);
357 for (i = 0; i < threads; ++i) {
358 elf_putregnote(NT_PRSTATUS, tids[i], sb);
359 elf_putregnote(NT_FPREGSET, tids[i], sb);
360 elf_putregnote(NT_THRMISC, tids[i], sb);
361 elf_putregnote(NT_PTLWPINFO, tids[i], sb);
362 #if defined(__aarch64__) || defined(__arm__)
363 elf_putregnote(NT_ARM_TLS, tids[i], sb);
365 #if (defined(ELFCORE_COMPAT_32) && defined(__aarch64__)) || defined(__arm__)
366 elf_putregnote(NT_ARM_VFP, tids[i], sb);
368 #if defined(__i386__) || defined(__amd64__)
369 elf_putregnote(NT_X86_SEGBASES, tids[i], sb);
370 elf_putnote(NT_X86_XSTATE, elf_note_x86_xstate, tids + i, sb);
372 #if defined(__powerpc__)
373 elf_putnote(NT_PPC_VMX, elf_note_powerpc_vmx, tids + i, sb);
375 elf_putnote(NT_PPC_VSX, elf_note_powerpc_vsx, tids + i, sb);
380 #ifndef ELFCORE_COMPAT_32
381 elf_putnote(NT_PROCSTAT_PROC, elf_note_procstat_proc, &pid, sb);
382 elf_putnote(NT_PROCSTAT_FILES, elf_note_procstat_files, &pid, sb);
383 elf_putnote(NT_PROCSTAT_VMMAP, elf_note_procstat_vmmap, &pid, sb);
384 elf_putnote(NT_PROCSTAT_GROUPS, elf_note_procstat_groups, &pid, sb);
385 elf_putnote(NT_PROCSTAT_UMASK, elf_note_procstat_umask, &pid, sb);
386 elf_putnote(NT_PROCSTAT_RLIMIT, elf_note_procstat_rlimit, &pid, sb);
387 elf_putnote(NT_PROCSTAT_OSREL, elf_note_procstat_osrel, &pid, sb);
388 elf_putnote(NT_PROCSTAT_PSSTRINGS, elf_note_procstat_psstrings, &pid,
390 elf_putnote(NT_PROCSTAT_AUXV, elf_note_procstat_auxv, &pid, sb);
393 size = sbuf_end_section(sb, old_len, 1, 0);
395 err(1, "sbuf_end_section");
401 * Emit one register set note section to sbuf.
404 elf_putregnote(int type, lwpid_t tid, struct sbuf *sb)
412 if (ptrace(PT_GETREGSET, tid, (void *)&iov, type) != 0)
414 iov.iov_base = calloc(1, iov.iov_len);
415 if (iov.iov_base == NULL)
416 errx(1, "out of memory");
417 if (ptrace(PT_GETREGSET, tid, (void *)&iov, type) != 0)
418 errx(1, "failed to fetch register set %d", type);
420 note.n_namesz = 8; /* strlen("FreeBSD") + 1 */
421 note.n_descsz = iov.iov_len;
424 sbuf_bcat(sb, ¬e, sizeof(note));
425 sbuf_start_section(sb, &old_len);
426 sbuf_bcat(sb, "FreeBSD", note.n_namesz);
427 sbuf_end_section(sb, old_len, sizeof(Elf32_Size), 0);
428 sbuf_start_section(sb, &old_len);
429 sbuf_bcat(sb, iov.iov_base, iov.iov_len);
430 sbuf_end_section(sb, old_len, sizeof(Elf32_Size), 0);
435 * Emit one note section to sbuf.
438 elf_putnote(int type, notefunc_t notefunc, void *arg, struct sbuf *sb)
445 desc = notefunc(arg, &descsz);
446 note.n_namesz = 8; /* strlen("FreeBSD") + 1 */
447 note.n_descsz = descsz;
450 sbuf_bcat(sb, ¬e, sizeof(note));
451 sbuf_start_section(sb, &old_len);
452 sbuf_bcat(sb, "FreeBSD", note.n_namesz);
453 sbuf_end_section(sb, old_len, sizeof(Elf32_Size), 0);
456 sbuf_start_section(sb, &old_len);
457 sbuf_bcat(sb, desc, descsz);
458 sbuf_end_section(sb, old_len, sizeof(Elf32_Size), 0);
463 * Generate the ELF coredump header.
466 elf_puthdr(int efd, pid_t pid, struct map_entry *map, void *hdr, size_t hdrsize,
467 size_t notesz, size_t segoff, int numsegs)
469 Elf_Ehdr *ehdr, binhdr;
472 struct phdr_closure phc;
475 cnt = read(efd, &binhdr, sizeof(binhdr));
477 err(1, "Failed to re-read ELF header");
478 else if (cnt != sizeof(binhdr))
479 errx(1, "Failed to re-read ELF header");
481 ehdr = (Elf_Ehdr *)hdr;
483 ehdr->e_ident[EI_MAG0] = ELFMAG0;
484 ehdr->e_ident[EI_MAG1] = ELFMAG1;
485 ehdr->e_ident[EI_MAG2] = ELFMAG2;
486 ehdr->e_ident[EI_MAG3] = ELFMAG3;
487 ehdr->e_ident[EI_CLASS] = ELF_CLASS;
488 ehdr->e_ident[EI_DATA] = ELF_DATA;
489 ehdr->e_ident[EI_VERSION] = EV_CURRENT;
490 ehdr->e_ident[EI_OSABI] = ELFOSABI_FREEBSD;
491 ehdr->e_ident[EI_ABIVERSION] = 0;
492 ehdr->e_ident[EI_PAD] = 0;
493 ehdr->e_type = ET_CORE;
494 ehdr->e_machine = binhdr.e_machine;
495 ehdr->e_version = EV_CURRENT;
497 ehdr->e_phoff = sizeof(Elf_Ehdr);
498 ehdr->e_flags = binhdr.e_flags;
499 ehdr->e_ehsize = sizeof(Elf_Ehdr);
500 ehdr->e_phentsize = sizeof(Elf_Phdr);
501 ehdr->e_shentsize = sizeof(Elf_Shdr);
502 ehdr->e_shstrndx = SHN_UNDEF;
503 if (numsegs + 1 < PN_XNUM) {
504 ehdr->e_phnum = numsegs + 1;
507 ehdr->e_phnum = PN_XNUM;
510 ehdr->e_shoff = ehdr->e_phoff +
511 (numsegs + 1) * ehdr->e_phentsize;
513 shdr = (Elf_Shdr *)((char *)hdr + ehdr->e_shoff);
514 memset(shdr, 0, sizeof(*shdr));
516 * A special first section is used to hold large segment and
517 * section counts. This was proposed by Sun Microsystems in
518 * Solaris and has been adopted by Linux; the standard ELF
519 * tools are already familiar with the technique.
521 * See table 7-7 of the Solaris "Linker and Libraries Guide"
522 * (or 12-7 depending on the version of the document) for more
525 shdr->sh_type = SHT_NULL;
526 shdr->sh_size = ehdr->e_shnum;
527 shdr->sh_link = ehdr->e_shstrndx;
528 shdr->sh_info = numsegs + 1;
532 * Fill in the program header entries.
534 phdr = (Elf_Phdr *)((char *)hdr + ehdr->e_phoff);
536 /* The note segment. */
537 phdr->p_type = PT_NOTE;
538 phdr->p_offset = hdrsize;
541 phdr->p_filesz = notesz;
543 phdr->p_flags = PF_R;
544 phdr->p_align = sizeof(Elf32_Size);
547 /* All the writable segments from the program. */
550 each_dumpable_segment(map, cb_put_phdr, &phc);
554 * Free the memory map.
557 freemap(struct map_entry *map)
559 struct map_entry *next;
561 while (map != NULL) {
569 * Read the process's memory map using kinfo_getvmmap(), and return a list of
570 * VM map entries. Only the non-device read/writable segments are
571 * returned. The map entries in the list aren't fully filled in; only
572 * the items we need are present.
574 static struct map_entry *
577 struct map_entry *ent, **linkp, *map;
578 struct kinfo_vmentry *vmentl, *kve;
581 vmentl = kinfo_getvmmap(pid, &nitems);
583 err(1, "cannot retrieve mappings for %u process", pid);
587 for (i = 0; i < nitems; i++) {
591 * Ignore 'malformed' segments or ones representing memory
592 * mapping with MAP_NOCORE on.
593 * If the 'full' support is disabled, just dump the most
594 * meaningful data segments.
596 if ((kve->kve_protection & KVME_PROT_READ) == 0 ||
597 (kve->kve_flags & KVME_FLAG_NOCOREDUMP) != 0 ||
598 kve->kve_type == KVME_TYPE_DEAD ||
599 kve->kve_type == KVME_TYPE_UNKNOWN ||
600 ((pflags & PFLAGS_FULL) == 0 &&
601 kve->kve_type != KVME_TYPE_DEFAULT &&
602 kve->kve_type != KVME_TYPE_VNODE &&
603 kve->kve_type != KVME_TYPE_SWAP &&
604 kve->kve_type != KVME_TYPE_PHYS))
607 ent = calloc(1, sizeof(*ent));
609 errx(1, "out of memory");
610 ent->start = (vm_offset_t)kve->kve_start;
611 ent->end = (vm_offset_t)kve->kve_end;
612 ent->protection = VM_PROT_READ;
613 if ((kve->kve_protection & KVME_PROT_WRITE) != 0)
614 ent->protection |= VM_PROT_WRITE;
615 if ((kve->kve_protection & KVME_PROT_EXEC) != 0)
616 ent->protection |= VM_PROT_EXECUTE;
626 * Miscellaneous note out functions.
630 elf_note_prpsinfo(void *arg, size_t *sizep)
634 elfcore_prpsinfo_t *psinfo;
635 struct kinfo_proc kip;
640 psinfo = calloc(1, sizeof(*psinfo));
642 errx(1, "out of memory");
643 psinfo->pr_version = PRPSINFO_VERSION;
644 psinfo->pr_psinfosz = sizeof(*psinfo);
648 name[2] = KERN_PROC_PID;
651 if (sysctl(name, 4, &kip, &len, NULL, 0) == -1)
652 err(1, "kern.proc.pid.%u", pid);
653 if (kip.ki_pid != pid)
654 err(1, "kern.proc.pid.%u", pid);
655 strlcpy(psinfo->pr_fname, kip.ki_comm, sizeof(psinfo->pr_fname));
656 name[2] = KERN_PROC_ARGS;
657 len = sizeof(psinfo->pr_psargs) - 1;
658 if (sysctl(name, 4, psinfo->pr_psargs, &len, NULL, 0) == 0 && len > 0) {
659 cp = psinfo->pr_psargs;
662 cp = memchr(cp, '\0', end - cp);
668 strlcpy(psinfo->pr_psargs, kip.ki_comm,
669 sizeof(psinfo->pr_psargs));
670 psinfo->pr_pid = pid;
672 *sizep = sizeof(*psinfo);
676 #if defined(__i386__) || defined(__amd64__)
678 elf_note_x86_xstate(void *arg, size_t *sizep)
682 static bool xsave_checked = false;
683 static struct ptrace_xstate_info info;
685 tid = *(lwpid_t *)arg;
686 if (!xsave_checked) {
687 if (ptrace(PT_GETXSTATE_INFO, tid, (void *)&info,
690 xsave_checked = true;
692 if (info.xsave_len == 0) {
696 xstate = calloc(1, info.xsave_len);
697 ptrace(PT_GETXSTATE, tid, xstate, 0);
698 *(uint64_t *)(xstate + X86_XSTATE_XCR0_OFFSET) = info.xsave_mask;
699 *sizep = info.xsave_len;
704 #if defined(__powerpc__)
706 elf_note_powerpc_vmx(void *arg, size_t *sizep)
710 static bool has_vmx = true;
713 tid = *(lwpid_t *)arg;
715 if (ptrace(PT_GETVRREGS, tid, (void *)&info,
723 vmx = calloc(1, sizeof(*vmx));
724 memcpy(vmx, &info, sizeof(*vmx));
725 *sizep = sizeof(*vmx);
730 elf_note_powerpc_vsx(void *arg, size_t *sizep)
734 static bool has_vsx = true;
737 tid = *(lwpid_t *)arg;
739 if (ptrace(PT_GETVSRREGS, tid, (void *)vshr,
747 vshr_data = calloc(1, sizeof(vshr));
748 memcpy(vshr_data, vshr, sizeof(vshr));
749 *sizep = sizeof(vshr);
755 procstat_sysctl(void *arg, int what, size_t structsz, size_t *sizep)
759 int name[4], structsize;
763 structsize = structsz;
769 if (sysctl(name, 4, NULL, &len, NULL, 0) == -1)
770 err(1, "kern.proc.%d.%u", what, pid);
771 buf = calloc(1, sizeof(structsize) + len * 4 / 3);
773 errx(1, "out of memory");
774 bcopy(&structsize, buf, sizeof(structsize));
775 p = (char *)buf + sizeof(structsize);
776 if (sysctl(name, 4, p, &len, NULL, 0) == -1)
777 err(1, "kern.proc.%d.%u", what, pid);
779 *sizep = sizeof(structsize) + len;
784 elf_note_procstat_proc(void *arg, size_t *sizep)
787 return (procstat_sysctl(arg, KERN_PROC_PID | KERN_PROC_INC_THREAD,
788 sizeof(struct kinfo_proc), sizep));
792 elf_note_procstat_files(void *arg, size_t *sizep)
795 return (procstat_sysctl(arg, KERN_PROC_FILEDESC,
796 sizeof(struct kinfo_file), sizep));
800 elf_note_procstat_vmmap(void *arg, size_t *sizep)
803 return (procstat_sysctl(arg, KERN_PROC_VMMAP,
804 sizeof(struct kinfo_vmentry), sizep));
808 elf_note_procstat_groups(void *arg, size_t *sizep)
811 return (procstat_sysctl(arg, KERN_PROC_GROUPS, sizeof(gid_t), sizep));
815 elf_note_procstat_umask(void *arg, size_t *sizep)
818 return (procstat_sysctl(arg, KERN_PROC_UMASK, sizeof(u_short), sizep));
822 elf_note_procstat_osrel(void *arg, size_t *sizep)
825 return (procstat_sysctl(arg, KERN_PROC_OSREL, sizeof(int), sizep));
829 elf_note_procstat_psstrings(void *arg, size_t *sizep)
832 return (procstat_sysctl(arg, KERN_PROC_PS_STRINGS,
833 sizeof(vm_offset_t), sizep));
837 elf_note_procstat_auxv(void *arg, size_t *sizep)
840 return (procstat_sysctl(arg, KERN_PROC_AUXV,
841 sizeof(Elf_Auxinfo), sizep));
845 elf_note_procstat_rlimit(void *arg, size_t *sizep)
849 int i, name[5], structsize;
853 structsize = sizeof(struct rlimit) * RLIM_NLIMITS;
854 buf = calloc(1, sizeof(structsize) + structsize);
856 errx(1, "out of memory");
857 bcopy(&structsize, buf, sizeof(structsize));
858 p = (char *)buf + sizeof(structsize);
861 name[2] = KERN_PROC_RLIMIT;
863 len = sizeof(struct rlimit);
864 for (i = 0; i < RLIM_NLIMITS; i++) {
866 if (sysctl(name, 5, p, &len, NULL, 0) == -1)
867 err(1, "kern.proc.rlimit.%u", pid);
868 if (len != sizeof(struct rlimit))
869 errx(1, "kern.proc.rlimit.%u: short read", pid);
873 *sizep = sizeof(structsize) + structsize;
877 struct dumpers __elfN(dump) = { elf_ident, elf_coredump };
878 TEXT_SET(dumpset, __elfN(dump));