2 * Copyright (c) 1988, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * @(#) Copyright (c) 1988, 1993 The Regents of the University of California. All rights reserved.
34 * @(#)fstat.c 8.3 (Berkeley) 5/2/95
35 * $FreeBSD: src/usr.bin/fstat/fstat.c,v 1.21.2.7 2001/11/21 10:49:37 dwmalone Exp $
36 * $DragonFly: src/usr.bin/fstat/fstat.c,v 1.6 2003/10/04 20:36:44 hmp Exp $
39 #define _KERNEL_STRUCTURES
41 #include <sys/param.h>
46 #include <sys/vnode.h>
47 #include <sys/socket.h>
48 #include <sys/socketvar.h>
49 #include <sys/domain.h>
50 #include <sys/protosw.h>
52 #include <sys/unpcb.h>
53 #include <sys/sysctl.h>
54 #include <sys/filedesc.h>
55 #include <sys/queue.h>
59 #include <vfs/ufs/quota.h>
60 #include <vfs/ufs/inode.h>
61 #include <sys/mount.h>
62 #include <nfs/nfsproto.h>
63 #include <nfs/rpcv2.h>
65 #include <nfs/nfsnode.h>
69 #include <vm/vm_map.h>
70 #include <vm/vm_object.h>
72 #include <net/route.h>
73 #include <netinet/in.h>
74 #include <netinet/in_systm.h>
75 #include <netinet/ip.h>
76 #include <netinet/in_pcb.h>
103 struct nlist nl[] = {
108 int fsflg, /* show files on same filesystem as file(s) argument */
109 pflg, /* show files open by a particular pid */
110 uflg; /* show files open by a particular (effective) user */
111 int checkfile; /* true if restricting to particular files or filesystems */
112 int nflg; /* (numerical) display f.s. and rdev as dev_t */
113 int vflg; /* display errors in locating kernel data objects etc... */
114 int mflg; /* include memory-mapped files */
117 struct file **ofiles; /* buffer of pointers to file structures */
119 #define ALLOC_OFILES(d) \
120 if ((d) > maxfiles) { \
122 ofiles = malloc((d) * sizeof(struct file *)); \
123 if (ofiles == NULL) { \
131 void dofiles(struct kinfo_proc *kp);
132 void dommap(struct kinfo_proc *kp);
133 void vtrans(struct vnode *vp, int i, int flag);
134 int ufs_filestat(struct vnode *vp, struct filestat *fsp);
135 int nfs_filestat(struct vnode *vp, struct filestat *fsp);
136 char *getmnton(struct mount *m);
137 void pipetrans(struct pipe *pi, int i, int flag);
138 void socktrans(struct socket *sock, int i);
139 void getinetproto(int number);
140 int getfname(char *filename);
145 main(int argc, char **argv)
147 register struct passwd *passwd;
148 struct kinfo_proc *p, *plast;
151 char buf[_POSIX2_LINE_MAX];
155 what = KERN_PROC_ALL;
156 nlistf = memf = NULL;
157 while ((ch = getopt(argc, argv, "fmnp:u:vN:M:")) != -1)
177 if (!isdigit(*optarg)) {
178 warnx("-p requires a process id");
181 what = KERN_PROC_PID;
187 if (!(passwd = getpwnam(optarg)))
188 errx(1, "%s: unknown uid", optarg);
189 what = KERN_PROC_UID;
190 arg = passwd->pw_uid;
200 if (*(argv += optind)) {
201 for (; *argv; ++argv) {
205 if (!checkfile) /* file(s) specified, but none accessable */
209 ALLOC_OFILES(256); /* reserve space for file pointers */
211 if (fsflg && !checkfile) {
212 /* -f with no files means use wd */
213 if (getfname(".") == 0)
219 * Discard setgid privileges if not the running kernel so that bad
220 * guys can't print interesting stuff from kernel memory.
222 if (nlistf != NULL || memf != NULL)
225 if ((kd = kvm_openfiles(nlistf, memf, NULL, O_RDONLY, buf)) == NULL)
228 if (kvm_nlist(kd, nl) != 0)
229 errx(1, "no namelist: %s", kvm_geterr(kd));
231 if ((p = kvm_getprocs(kd, what, arg, &cnt)) == NULL)
232 errx(1, "%s", kvm_geterr(kd));
235 "USER CMD PID FD DEV INUM MODE SZ|DV R/W");
238 "USER CMD PID FD MOUNT INUM MODE SZ|DV R/W");
239 if (checkfile && fsflg == 0)
244 for (plast = &p[cnt]; p < plast; ++p) {
245 if (p->kp_proc.p_stat == SZOMB)
257 #define PREFIX(i) printf("%-8.8s %-10s %5d", Uname, Comm, Pid); \
280 * print open files attributed to this process
283 dofiles(struct kinfo_proc *kp)
287 struct filedesc0 filed0;
288 #define filed filed0.fd_fd
289 struct proc *p = &kp->kp_proc;
290 struct eproc *ep = &kp->kp_eproc;
292 Uname = user_from_uid(ep->e_ucred.cr_uid, 0);
294 Comm = kp->kp_thread.td_comm;
298 if (!KVM_READ(p->p_fd, &filed0, sizeof (filed0))) {
299 dprintf(stderr, "can't read filedesc at %p for pid %d\n",
300 (void *)p->p_fd, Pid);
304 * root directory vnode, if one
307 vtrans(filed.fd_rdir, RDIR, FREAD);
309 * current working directory vnode
311 vtrans(filed.fd_cdir, CDIR, FREAD);
313 * ktrace vnode, if one
316 vtrans(p->p_tracep, TRACE, FREAD|FWRITE);
321 vtrans(p->p_textvp, TEXT, FREAD);
325 #define FPSIZE (sizeof (struct file *))
326 ALLOC_OFILES(filed.fd_lastfile+1);
327 if (filed.fd_nfiles > NDFILE) {
328 if (!KVM_READ(filed.fd_ofiles, ofiles,
329 (filed.fd_lastfile+1) * FPSIZE)) {
331 "can't read file structures at %p for pid %d\n",
332 (void *)filed.fd_ofiles, Pid);
336 bcopy(filed0.fd_dfiles, ofiles, (filed.fd_lastfile+1) * FPSIZE);
337 for (i = 0; i <= filed.fd_lastfile; i++) {
338 if (ofiles[i] == NULL)
340 if (!KVM_READ(ofiles[i], &file, sizeof (struct file))) {
341 dprintf(stderr, "can't read file %d at %p for pid %d\n",
342 i, (void *)ofiles[i], Pid);
345 if (file.f_type == DTYPE_VNODE)
346 vtrans((struct vnode *)file.f_data, i, file.f_flag);
347 else if (file.f_type == DTYPE_SOCKET) {
349 socktrans((struct socket *)file.f_data, i);
352 else if (file.f_type == DTYPE_PIPE) {
354 pipetrans((struct pipe *)file.f_data, i,
359 else if (file.f_type == DTYPE_FIFO) {
361 vtrans((struct vnode *)file.f_data, i,
367 "unknown file type %d for file %d of pid %d\n",
368 file.f_type, i, Pid);
374 dommap(struct kinfo_proc *kp)
376 struct proc *p = &kp->kp_proc;
377 struct vmspace vmspace;
379 struct vm_map_entry entry;
380 vm_map_entry_t entryp;
381 struct vm_object object;
385 if (!KVM_READ(p->p_vmspace, &vmspace, sizeof(vmspace))) {
386 dprintf(stderr, "can't read vmspace at %p for pid %d\n",
387 (void *)p->p_vmspace, Pid);
391 map = &vmspace.vm_map;
393 for (entryp = map->header.next; entryp != &p->p_vmspace->vm_map.header;
394 entryp = entry.next) {
395 if (!KVM_READ(entryp, &entry, sizeof(entry))) {
397 "can't read vm_map_entry at %p for pid %d\n",
398 (void *)entryp, Pid);
402 if (entry.eflags & MAP_ENTRY_IS_SUB_MAP)
405 if ((objp = entry.object.vm_object) == NULL)
408 for (; objp; objp = object.backing_object) {
409 if (!KVM_READ(objp, &object, sizeof(object))) {
411 "can't read vm_object at %p for pid %d\n",
417 prot = entry.protection;
418 fflags = (prot & VM_PROT_READ ? FREAD : 0) |
419 (prot & VM_PROT_WRITE ? FWRITE : 0);
421 switch (object.type) {
423 vtrans((struct vnode *)object.handle, MMAP, fflags);
432 vtrans(struct vnode *vp, int i, int flag)
436 char rw[3], mode[15];
437 char *badtype = NULL, *filename, *getmnton();
439 filename = badtype = NULL;
440 if (!KVM_READ(vp, &vn, sizeof (struct vnode))) {
441 dprintf(stderr, "can't read vnode at %p for pid %d\n",
445 if (vn.v_type == VNON || vn.v_tag == VT_NON)
447 else if (vn.v_type == VBAD)
452 if (!ufs_filestat(&vn, &fst))
456 if (!ufs_filestat(&vn, &fst))
460 if (!nfs_filestat(&vn, &fst))
465 if (!msdosfs_filestat(&vn, &fst))
470 if (!isofs_filestat(&vn, &fst))
475 static char unknown[10];
476 sprintf(badtype = unknown, "?(%x)", vn.v_tag);
486 for (d = devs; d != NULL; d = d->next)
487 if (d->fsid == fst.fsid) {
489 if (d->ino == fst.fileid) {
494 if (fsmatch == 0 || (filename == NULL && fsflg == 0))
499 (void)printf(" - - %10s -\n", badtype);
503 (void)printf(" %2d,%-2d", major(fst.fsid), minor(fst.fsid));
505 (void)printf(" %-8s", getmnton(vn.v_mount));
507 (void)sprintf(mode, "%o", fst.mode);
509 strmode(fst.mode, mode);
510 (void)printf(" %6ld %10s", fst.fileid, mode);
516 if (nflg || ((name = devname(fst.rdev, vn.v_type == VCHR ?
517 S_IFCHR : S_IFBLK)) == NULL))
518 printf(" %2d,%-2d", major(fst.rdev), minor(fst.rdev));
520 printf(" %6s", name);
524 printf(" %6lu", fst.size);
532 if (filename && !fsflg)
533 printf(" %s", filename);
538 ufs_filestat(struct vnode *vp, struct filestat *fsp)
542 if (!KVM_READ(VTOI(vp), &inode, sizeof (inode))) {
543 dprintf(stderr, "can't read inode at %p for pid %d\n",
544 (void *)VTOI(vp), Pid);
548 * The st_dev from stat(2) is a udev_t. These kernel structures
549 * contain dev_t structures. We need to convert to udev to make
552 fsp->fsid = dev2udev(inode.i_dev);
553 fsp->fileid = (long)inode.i_number;
554 fsp->mode = (mode_t)inode.i_mode;
555 fsp->size = (u_long)inode.i_size;
556 fsp->rdev = inode.i_rdev;
562 nfs_filestat(struct vnode *vp, struct filestat *fsp)
564 struct nfsnode nfsnode;
565 register mode_t mode;
567 if (!KVM_READ(VTONFS(vp), &nfsnode, sizeof (nfsnode))) {
568 dprintf(stderr, "can't read nfsnode at %p for pid %d\n",
569 (void *)VTONFS(vp), Pid);
572 fsp->fsid = nfsnode.n_vattr.va_fsid;
573 fsp->fileid = nfsnode.n_vattr.va_fileid;
574 fsp->size = nfsnode.n_size;
575 fsp->rdev = nfsnode.n_vattr.va_rdev;
576 mode = (mode_t)nfsnode.n_vattr.va_mode;
577 switch (vp->v_type) {
610 getmnton(struct mount *m)
612 static struct mount mount;
616 char mntonname[MNAMELEN];
618 register struct mtab *mt;
620 for (mt = mhead; mt != NULL; mt = mt->next)
622 return (mt->mntonname);
623 if (!KVM_READ(m, &mount, sizeof(struct mount))) {
624 warnx("can't read mount table at %p", (void *)m);
627 if ((mt = malloc(sizeof (struct mtab))) == NULL)
630 bcopy(&mount.mnt_stat.f_mntonname[0], &mt->mntonname[0], MNAMELEN);
633 return (mt->mntonname);
637 pipetrans(struct pipe *pi, int i, int flag)
645 if (!KVM_READ(pi, &pip, sizeof(struct pipe))) {
646 dprintf(stderr, "can't read pipe at %p\n", (void *)pi);
650 printf("* pipe %8lx <-> %8lx", (u_long)pi, (u_long)pip.pipe_peer);
651 printf(" %6d", (int)pip.pipe_buffer.cnt);
666 socktrans(struct socket *sock, int i)
668 static char *stypename[] = {
678 struct protosw proto;
683 char dname[32], *strcpy();
688 if (!KVM_READ(sock, &so, sizeof(struct socket))) {
689 dprintf(stderr, "can't read sock at %p\n", (void *)sock);
693 /* fill in protosw entry */
694 if (!KVM_READ(so.so_proto, &proto, sizeof(struct protosw))) {
695 dprintf(stderr, "can't read protosw at %p",
696 (void *)so.so_proto);
701 if (!KVM_READ(proto.pr_domain, &dom, sizeof(struct domain))) {
702 dprintf(stderr, "can't read domain at %p\n",
703 (void *)proto.pr_domain);
707 if ((len = kvm_read(kd, (u_long)dom.dom_name, dname,
708 sizeof(dname) - 1)) < 0) {
709 dprintf(stderr, "can't read domain name at %p\n",
710 (void *)dom.dom_name);
716 if ((u_short)so.so_type > STYPEMAX)
717 printf("* %s ?%d", dname, so.so_type);
719 printf("* %s %s", dname, stypename[so.so_type]);
722 * protocol specific formatting
724 * Try to find interesting things to print. For tcp, the interesting
725 * thing is the address of the tcpcb, for udp and others, just the
726 * inpcb (socket pcb). For unix domain, its the address of the socket
727 * pcb and the address of the connected pcb (if connected). Otherwise
728 * just print the protocol number and address of the socket itself.
729 * The idea is not to duplicate netstat, but to make available enough
730 * information for further analysis.
732 switch(dom.dom_family) {
735 getinetproto(proto.pr_protocol);
736 if (proto.pr_protocol == IPPROTO_TCP ) {
738 if (kvm_read(kd, (u_long)so.so_pcb,
739 (char *)&inpcb, sizeof(struct inpcb))
740 != sizeof(struct inpcb)) {
742 "can't read inpcb at %p\n",
746 printf(" %lx", (u_long)inpcb.inp_ppcb);
750 printf(" %lx", (u_long)so.so_pcb);
753 /* print address of pcb and connected pcb */
755 printf(" %lx", (u_long)so.so_pcb);
756 if (kvm_read(kd, (u_long)so.so_pcb, (char *)&unpcb,
757 sizeof(struct unpcb)) != sizeof(struct unpcb)){
758 dprintf(stderr, "can't read unpcb at %p\n",
762 if (unpcb.unp_conn) {
763 char shoconn[4], *cp;
766 if (!(so.so_state & SS_CANTRCVMORE))
769 if (!(so.so_state & SS_CANTSENDMORE))
772 printf(" %s %lx", shoconn,
773 (u_long)unpcb.unp_conn);
778 /* print protocol number and socket address */
779 printf(" %d %lx", proto.pr_protocol, (u_long)sock);
789 * Read the specinfo structure in the kernel (as pointed to by a dev_t)
790 * in order to work out the associated udev_t
797 if (KVM_READ(dev, &si, sizeof si)) {
800 dprintf(stderr, "can't convert dev_t %x to a udev_t\n", dev);
807 * print name of protocol number
810 getinetproto(int number)
813 register struct protoent *pe;
816 setprotoent(++isopen);
817 if ((pe = getprotobynumber(number)) != NULL)
818 printf(" %s", pe->p_name);
820 printf(" %d", number);
824 getfname(char *filename)
829 if (stat(filename, &statbuf)) {
830 warn("%s", filename);
833 if ((cur = malloc(sizeof(DEVS))) == NULL)
838 cur->ino = statbuf.st_ino;
839 cur->fsid = statbuf.st_dev;
840 cur->name = filename;
847 (void)fprintf(stderr,
848 "usage: fstat [-fmnv] [-p pid] [-u user] [-N system] [-M core] [file ...]\n");