2 * SPDX-License-Identifier: BSD-3-Clause
4 * Copyright (c) 1994 SigmaSoft, Th. Lockert <tholo@sigmasoft.com>
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. The name of the author may not be used to endorse or promote products
16 * derived from this software without specific prior written permission.
18 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
19 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
20 * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
21 * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
22 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
23 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
24 * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
25 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
26 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
27 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30 #include <sys/cdefs.h>
31 __FBSDID("$FreeBSD$");
33 #include <sys/param.h>
54 char *fmt_perm(u_short);
55 void cvt_time(time_t, char *);
57 uid_t user2uid(char *username);
59 void print_kmsqtotal(struct msginfo msginfo);
60 void print_kmsqheader(int option);
61 void print_kmsqptr(int i, int option, struct msqid_kernel *kmsqptr);
62 void print_kshmtotal(struct shminfo shminfo);
63 void print_kshmheader(int option);
64 void print_kshmptr(int i, int option, struct shmid_kernel *kshmptr);
65 void print_ksemtotal(struct seminfo seminfo);
66 void print_ksemheader(int option);
67 void print_ksemptr(int i, int option, struct semid_kernel *ksemaptr);
70 fmt_perm(u_short mode)
72 static char buffer[100];
76 buffer[2] = ((mode & 0400) ? 'r' : '-');
77 buffer[3] = ((mode & 0200) ? 'w' : '-');
78 buffer[4] = ((mode & 0100) ? 'a' : '-');
79 buffer[5] = ((mode & 0040) ? 'r' : '-');
80 buffer[6] = ((mode & 0020) ? 'w' : '-');
81 buffer[7] = ((mode & 0010) ? 'a' : '-');
82 buffer[8] = ((mode & 0004) ? 'r' : '-');
83 buffer[9] = ((mode & 0002) ? 'w' : '-');
84 buffer[10] = ((mode & 0001) ? 'a' : '-');
90 cvt_time(time_t t, char *buf)
95 strcpy(buf, "no-entry");
98 sprintf(buf, "%2d:%02d:%02d",
99 tm->tm_hour, tm->tm_min, tm->tm_sec);
105 #define OUTSTANDING 4
110 main(int argc, char *argv[])
112 int display = SHMINFO | MSGINFO | SEMINFO;
114 char *core = NULL, *user = NULL, *namelist = NULL;
115 char kvmoferr[_POSIX2_LINE_MAX]; /* Error buf for kvm_openfiles. */
120 while ((i = getopt(argc, argv, "MmQqSsabC:cN:optTu:y")) != -1)
123 option |= BIGGEST | CREATOR | OUTSTANDING | PID | TIME;
144 option |= OUTSTANDING;
162 display = SHMTOTAL | MSGTOTAL | SEMTOTAL;
169 uid = user2uid(user);
179 * If paths to the exec file or core file were specified, we
180 * aren't operating on the running kernel, so we can't use
183 if (namelist != NULL || core != NULL)
187 kd = kvm_openfiles(namelist, core, NULL, O_RDONLY, kvmoferr);
189 errx(1, "kvm_openfiles: %s", kvmoferr);
190 switch (kvm_nlist(kd, symbols)) {
194 errx(1, "unable to read kernel symbol table");
200 kget(X_MSGINFO, &msginfo, sizeof(msginfo));
201 if ((display & (MSGINFO | MSGTOTAL))) {
202 if (display & MSGTOTAL)
203 print_kmsqtotal(msginfo);
205 if (display & MSGINFO) {
206 struct msqid_kernel *kxmsqids;
210 sizeof(struct msqid_kernel) * msginfo.msgmni;
211 kxmsqids = malloc(kxmsqids_len);
212 kget(X_MSQIDS, kxmsqids, kxmsqids_len);
214 print_kmsqheader(option);
216 for (i = 0; i < msginfo.msgmni; i += 1) {
217 if (kxmsqids[i].u.msg_qbytes != 0) {
219 uid != kxmsqids[i].u.msg_perm.uid)
222 print_kmsqptr(i, option, &kxmsqids[i]);
230 if (display & (MSGINFO | MSGTOTAL)) {
232 "SVID messages facility "
233 "not configured in the system\n");
236 kget(X_SHMINFO, &shminfo, sizeof(shminfo));
237 if ((display & (SHMINFO | SHMTOTAL))) {
239 if (display & SHMTOTAL)
240 print_kshmtotal(shminfo);
242 if (display & SHMINFO) {
243 struct shmid_kernel *kxshmids;
247 sizeof(struct shmid_kernel) * shminfo.shmmni;
248 kxshmids = malloc(kxshmids_len);
249 kget(X_SHMSEGS, kxshmids, kxshmids_len);
251 print_kshmheader(option);
253 for (shmidx = 0; shmidx < shminfo.shmmni; shmidx += 1) {
254 if (kxshmids[shmidx].u.shm_perm.mode & 0x0800) {
256 uid != kxshmids[shmidx].u.shm_perm.uid)
259 print_kshmptr(shmidx, option, &kxshmids[shmidx]);
265 if (display & (SHMINFO | SHMTOTAL)) {
267 "SVID shared memory facility "
268 "not configured in the system\n");
271 kget(X_SEMINFO, &seminfo, sizeof(seminfo));
272 if ((display & (SEMINFO | SEMTOTAL))) {
273 struct semid_kernel *kxsema;
276 if (display & SEMTOTAL)
277 print_ksemtotal(seminfo);
279 if (display & SEMINFO) {
281 sizeof(struct semid_kernel) * seminfo.semmni;
282 kxsema = malloc(kxsema_len);
283 kget(X_SEMA, kxsema, kxsema_len);
285 print_ksemheader(option);
287 for (i = 0; i < seminfo.semmni; i += 1) {
288 if ((kxsema[i].u.sem_perm.mode & SEM_ALLOC)
291 uid != kxsema[i].u.sem_perm.uid)
294 print_ksemptr(i, option, &kxsema[i]);
302 if (display & (SEMINFO | SEMTOTAL)) {
304 "SVID semaphores facility "
305 "not configured in the system\n");
315 print_kmsqtotal(struct msginfo local_msginfo)
318 printf("msginfo:\n");
319 printf("\tmsgmax: %12d\t(max characters in a message)\n",
320 local_msginfo.msgmax);
321 printf("\tmsgmni: %12d\t(# of message queues)\n",
322 local_msginfo.msgmni);
323 printf("\tmsgmnb: %12d\t(max characters in a message queue)\n",
324 local_msginfo.msgmnb);
325 printf("\tmsgtql: %12d\t(max # of messages in system)\n",
326 local_msginfo.msgtql);
327 printf("\tmsgssz: %12d\t(size of a message segment)\n",
328 local_msginfo.msgssz);
329 printf("\tmsgseg: %12d\t(# of message segments in system)\n\n",
330 local_msginfo.msgseg);
333 void print_kmsqheader(int option)
336 printf("Message Queues:\n");
337 printf("T %12s %12s %-11s %-8s %-8s",
338 "ID", "KEY", "MODE", "OWNER", "GROUP");
339 if (option & CREATOR)
340 printf(" %-8s %-8s", "CREATOR", "CGROUP");
341 if (option & OUTSTANDING)
342 printf(" %20s %20s", "CBYTES", "QNUM");
343 if (option & BIGGEST)
344 printf(" %20s", "QBYTES");
346 printf(" %12s %12s", "LSPID", "LRPID");
348 printf(" %-8s %-8s %-8s", "STIME", "RTIME", "CTIME");
353 print_kmsqptr(int i, int option, struct msqid_kernel *kmsqptr)
355 char stime_buf[100], rtime_buf[100], ctime_buf[100];
357 cvt_time(kmsqptr->u.msg_stime, stime_buf);
358 cvt_time(kmsqptr->u.msg_rtime, rtime_buf);
359 cvt_time(kmsqptr->u.msg_ctime, ctime_buf);
361 printf("q %12d %12d %s %-8s %-8s",
362 IXSEQ_TO_IPCID(i, kmsqptr->u.msg_perm),
363 (int)kmsqptr->u.msg_perm.key,
364 fmt_perm(kmsqptr->u.msg_perm.mode),
365 user_from_uid(kmsqptr->u.msg_perm.uid, 0),
366 group_from_gid(kmsqptr->u.msg_perm.gid, 0));
368 if (option & CREATOR)
370 user_from_uid(kmsqptr->u.msg_perm.cuid, 0),
371 group_from_gid(kmsqptr->u.msg_perm.cgid, 0));
373 if (option & OUTSTANDING)
374 printf(" %12lu %12lu",
375 kmsqptr->u.msg_cbytes,
376 kmsqptr->u.msg_qnum);
378 if (option & BIGGEST)
379 printf(" %20lu", kmsqptr->u.msg_qbytes);
383 kmsqptr->u.msg_lspid,
384 kmsqptr->u.msg_lrpid);
396 print_kshmtotal(struct shminfo local_shminfo)
399 printf("shminfo:\n");
400 printf("\tshmmax: %12lu\t(max shared memory segment size)\n",
401 local_shminfo.shmmax);
402 printf("\tshmmin: %12lu\t(min shared memory segment size)\n",
403 local_shminfo.shmmin);
404 printf("\tshmmni: %12lu\t(max number of shared memory identifiers)\n",
405 local_shminfo.shmmni);
406 printf("\tshmseg: %12lu\t(max shared memory segments per process)\n",
407 local_shminfo.shmseg);
408 printf("\tshmall: %12lu\t(max amount of shared memory in pages)\n\n",
409 local_shminfo.shmall);
413 print_kshmheader(int option)
416 printf("Shared Memory:\n");
417 printf("T %12s %12s %-11s %-8s %-8s",
418 "ID", "KEY", "MODE", "OWNER", "GROUP");
419 if (option & CREATOR)
420 printf(" %-8s %-8s", "CREATOR", "CGROUP");
421 if (option & OUTSTANDING)
422 printf(" %12s", "NATTCH");
423 if (option & BIGGEST)
424 printf(" %12s", "SEGSZ");
426 printf(" %12s %12s", "CPID", "LPID");
428 printf(" %-8s %-8s %-8s", "ATIME", "DTIME", "CTIME");
433 print_kshmptr(int i, int option, struct shmid_kernel *kshmptr)
435 char atime_buf[100], dtime_buf[100], ctime_buf[100];
437 cvt_time(kshmptr->u.shm_atime, atime_buf);
438 cvt_time(kshmptr->u.shm_dtime, dtime_buf);
439 cvt_time(kshmptr->u.shm_ctime, ctime_buf);
441 printf("m %12d %12d %s %-8s %-8s",
442 IXSEQ_TO_IPCID(i, kshmptr->u.shm_perm),
443 (int)kshmptr->u.shm_perm.key,
444 fmt_perm(kshmptr->u.shm_perm.mode),
445 user_from_uid(kshmptr->u.shm_perm.uid, 0),
446 group_from_gid(kshmptr->u.shm_perm.gid, 0));
448 if (option & CREATOR)
450 user_from_uid(kshmptr->u.shm_perm.cuid, 0),
451 group_from_gid(kshmptr->u.shm_perm.cgid, 0));
453 if (option & OUTSTANDING)
455 kshmptr->u.shm_nattch);
457 if (option & BIGGEST)
459 kshmptr->u.shm_segsz);
464 kshmptr->u.shm_lpid);
476 print_ksemtotal(struct seminfo local_seminfo)
479 printf("seminfo:\n");
480 printf("\tsemmni: %12d\t(# of semaphore identifiers)\n",
481 local_seminfo.semmni);
482 printf("\tsemmns: %12d\t(# of semaphores in system)\n",
483 local_seminfo.semmns);
484 printf("\tsemmnu: %12d\t(# of undo structures in system)\n",
485 local_seminfo.semmnu);
486 printf("\tsemmsl: %12d\t(max # of semaphores per id)\n",
487 local_seminfo.semmsl);
488 printf("\tsemopm: %12d\t(max # of operations per semop call)\n",
489 local_seminfo.semopm);
490 printf("\tsemume: %12d\t(max # of undo entries per process)\n",
491 local_seminfo.semume);
492 printf("\tsemusz: %12d\t(size in bytes of undo structure)\n",
493 local_seminfo.semusz);
494 printf("\tsemvmx: %12d\t(semaphore maximum value)\n",
495 local_seminfo.semvmx);
496 printf("\tsemaem: %12d\t(adjust on exit max value)\n\n",
497 local_seminfo.semaem);
501 print_ksemheader(int option)
504 printf("Semaphores:\n");
505 printf("T %12s %12s %-11s %-8s %-8s",
506 "ID", "KEY", "MODE", "OWNER", "GROUP");
507 if (option & CREATOR)
508 printf(" %-8s %-8s", "CREATOR", "CGROUP");
509 if (option & BIGGEST)
510 printf(" %12s", "NSEMS");
512 printf(" %-8s %-8s", "OTIME", "CTIME");
517 print_ksemptr(int i, int option, struct semid_kernel *ksemaptr)
519 char ctime_buf[100], otime_buf[100];
521 cvt_time(ksemaptr->u.sem_otime, otime_buf);
522 cvt_time(ksemaptr->u.sem_ctime, ctime_buf);
524 printf("s %12d %12d %s %-8s %-8s",
525 IXSEQ_TO_IPCID(i, ksemaptr->u.sem_perm),
526 (int)ksemaptr->u.sem_perm.key,
527 fmt_perm(ksemaptr->u.sem_perm.mode),
528 user_from_uid(ksemaptr->u.sem_perm.uid, 0),
529 group_from_gid(ksemaptr->u.sem_perm.gid, 0));
531 if (option & CREATOR)
533 user_from_uid(ksemaptr->u.sem_perm.cuid, 0),
534 group_from_gid(ksemaptr->u.sem_perm.cgid, 0));
536 if (option & BIGGEST)
538 ksemaptr->u.sem_nsems);
549 user2uid(char *username)
555 uid = strtoul(username, &r, 0);
556 if (!*r && r != username)
558 if ((pwd = getpwnam(username)) == NULL)
559 errx(1, "getpwnam failed: No such user");
561 return (pwd->pw_uid);
570 "ipcs [-abcmopqstyMQST] [-C corefile] [-N namelist] [-u user]\n");