FreeBSD/Linux Kernel Cross Reference
sys/sys/user.h
1 /*-
2 * Copyright (c) 1982, 1986, 1989, 1991, 1993
3 * The Regents of the University of California.
4 * Copyright (c) 2007 Robert N. M. Watson
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 4. Neither the name of the University nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 *
31 * @(#)user.h 8.2 (Berkeley) 9/23/93
32 * $FreeBSD: releng/11.2/sys/sys/user.h 331722 2018-03-29 02:50:57Z eadler $
33 */
34
35 #ifndef _SYS_USER_H_
36 #define _SYS_USER_H_
37
38 #include <machine/pcb.h>
39 #ifndef _KERNEL
40 /* stuff that *used* to be included by user.h, or is now needed */
41 #include <sys/errno.h>
42 #include <sys/time.h>
43 #include <sys/resource.h>
44 #include <sys/ucred.h>
45 #include <sys/uio.h>
46 #include <sys/queue.h>
47 #include <sys/_lock.h>
48 #include <sys/_mutex.h>
49 #include <sys/proc.h>
50 #include <vm/vm.h> /* XXX */
51 #include <vm/vm_param.h> /* XXX */
52 #include <vm/pmap.h> /* XXX */
53 #include <vm/vm_map.h> /* XXX */
54 #endif /* !_KERNEL */
55 #ifndef _SYS_RESOURCEVAR_H_
56 #include <sys/resourcevar.h>
57 #endif
58 #ifndef _SYS_SIGNALVAR_H_
59 #include <sys/signalvar.h>
60 #endif
61 #ifndef _SYS_SOCKET_VAR_H_
62 #include <sys/socket.h>
63 #endif
64 #include <sys/caprights.h>
65
66 /*
67 * KERN_PROC subtype ops return arrays of selected proc structure entries:
68 *
69 * This struct includes several arrays of spare space, with different arrays
70 * for different standard C-types. When adding new variables to this struct,
71 * the space for byte-aligned data should be taken from the ki_sparestring,
72 * pointers from ki_spareptrs, word-aligned data from ki_spareints, and
73 * doubleword-aligned data from ki_sparelongs. Make sure the space for new
74 * variables come from the array which matches the size and alignment of
75 * those variables on ALL hardware platforms, and then adjust the appropriate
76 * KI_NSPARE_* value(s) to match.
77 *
78 * Always verify that sizeof(struct kinfo_proc) == KINFO_PROC_SIZE on all
79 * platforms after you have added new variables. Note that if you change
80 * the value of KINFO_PROC_SIZE, then many userland programs will stop
81 * working until they are recompiled!
82 *
83 * Once you have added the new field, you will need to add code to initialize
84 * it in two places: function fill_kinfo_proc in sys/kern/kern_proc.c and
85 * function kvm_proclist in lib/libkvm/kvm_proc.c .
86 */
87 #define KI_NSPARE_INT 4
88 #define KI_NSPARE_LONG 12
89 #define KI_NSPARE_PTR 6
90
91 #ifndef _KERNEL
92 #ifndef KINFO_PROC_SIZE
93 #error "Unknown architecture"
94 #endif
95 #endif /* !_KERNEL */
96
97 #define WMESGLEN 8 /* size of returned wchan message */
98 #define LOCKNAMELEN 8 /* size of returned lock name */
99 #define TDNAMLEN 16 /* size of returned thread name */
100 #define COMMLEN 19 /* size of returned ki_comm name */
101 #define KI_EMULNAMELEN 16 /* size of returned ki_emul */
102 #define KI_NGROUPS 16 /* number of groups in ki_groups */
103 #define LOGNAMELEN 17 /* size of returned ki_login */
104 #define LOGINCLASSLEN 17 /* size of returned ki_loginclass */
105
106 #ifndef BURN_BRIDGES
107 #define OCOMMLEN TDNAMLEN
108 #define ki_ocomm ki_tdname
109 #endif
110
111 /* Flags for the process credential. */
112 #define KI_CRF_CAPABILITY_MODE 0x00000001
113 /*
114 * Steal a bit from ki_cr_flags to indicate that the cred had more than
115 * KI_NGROUPS groups.
116 */
117 #define KI_CRF_GRP_OVERFLOW 0x80000000
118
119 struct kinfo_proc {
120 int ki_structsize; /* size of this structure */
121 int ki_layout; /* reserved: layout identifier */
122 struct pargs *ki_args; /* address of command arguments */
123 struct proc *ki_paddr; /* address of proc */
124 struct user *ki_addr; /* kernel virtual addr of u-area */
125 struct vnode *ki_tracep; /* pointer to trace file */
126 struct vnode *ki_textvp; /* pointer to executable file */
127 struct filedesc *ki_fd; /* pointer to open file info */
128 struct vmspace *ki_vmspace; /* pointer to kernel vmspace struct */
129 void *ki_wchan; /* sleep address */
130 pid_t ki_pid; /* Process identifier */
131 pid_t ki_ppid; /* parent process id */
132 pid_t ki_pgid; /* process group id */
133 pid_t ki_tpgid; /* tty process group id */
134 pid_t ki_sid; /* Process session ID */
135 pid_t ki_tsid; /* Terminal session ID */
136 short ki_jobc; /* job control counter */
137 short ki_spare_short1; /* unused (just here for alignment) */
138 dev_t ki_tdev; /* controlling tty dev */
139 sigset_t ki_siglist; /* Signals arrived but not delivered */
140 sigset_t ki_sigmask; /* Current signal mask */
141 sigset_t ki_sigignore; /* Signals being ignored */
142 sigset_t ki_sigcatch; /* Signals being caught by user */
143 uid_t ki_uid; /* effective user id */
144 uid_t ki_ruid; /* Real user id */
145 uid_t ki_svuid; /* Saved effective user id */
146 gid_t ki_rgid; /* Real group id */
147 gid_t ki_svgid; /* Saved effective group id */
148 short ki_ngroups; /* number of groups */
149 short ki_spare_short2; /* unused (just here for alignment) */
150 gid_t ki_groups[KI_NGROUPS]; /* groups */
151 vm_size_t ki_size; /* virtual size */
152 segsz_t ki_rssize; /* current resident set size in pages */
153 segsz_t ki_swrss; /* resident set size before last swap */
154 segsz_t ki_tsize; /* text size (pages) XXX */
155 segsz_t ki_dsize; /* data size (pages) XXX */
156 segsz_t ki_ssize; /* stack size (pages) */
157 u_short ki_xstat; /* Exit status for wait & stop signal */
158 u_short ki_acflag; /* Accounting flags */
159 fixpt_t ki_pctcpu; /* %cpu for process during ki_swtime */
160 u_int ki_estcpu; /* Time averaged value of ki_cpticks */
161 u_int ki_slptime; /* Time since last blocked */
162 u_int ki_swtime; /* Time swapped in or out */
163 u_int ki_cow; /* number of copy-on-write faults */
164 u_int64_t ki_runtime; /* Real time in microsec */
165 struct timeval ki_start; /* starting time */
166 struct timeval ki_childtime; /* time used by process children */
167 long ki_flag; /* P_* flags */
168 long ki_kiflag; /* KI_* flags (below) */
169 int ki_traceflag; /* Kernel trace points */
170 char ki_stat; /* S* process status */
171 signed char ki_nice; /* Process "nice" value */
172 char ki_lock; /* Process lock (prevent swap) count */
173 char ki_rqindex; /* Run queue index */
174 u_char ki_oncpu_old; /* Which cpu we are on (legacy) */
175 u_char ki_lastcpu_old; /* Last cpu we were on (legacy) */
176 char ki_tdname[TDNAMLEN+1]; /* thread name */
177 char ki_wmesg[WMESGLEN+1]; /* wchan message */
178 char ki_login[LOGNAMELEN+1]; /* setlogin name */
179 char ki_lockname[LOCKNAMELEN+1]; /* lock name */
180 char ki_comm[COMMLEN+1]; /* command name */
181 char ki_emul[KI_EMULNAMELEN+1]; /* emulation name */
182 char ki_loginclass[LOGINCLASSLEN+1]; /* login class */
183 char ki_moretdname[MAXCOMLEN-TDNAMLEN+1]; /* more thread name */
184 /*
185 * When adding new variables, take space for char-strings from the
186 * front of ki_sparestrings, and ints from the end of ki_spareints.
187 * That way the spare room from both arrays will remain contiguous.
188 */
189 char ki_sparestrings[46]; /* spare string space */
190 int ki_spareints[KI_NSPARE_INT]; /* spare room for growth */
191 int ki_oncpu; /* Which cpu we are on */
192 int ki_lastcpu; /* Last cpu we were on */
193 int ki_tracer; /* Pid of tracing process */
194 int ki_flag2; /* P2_* flags */
195 int ki_fibnum; /* Default FIB number */
196 u_int ki_cr_flags; /* Credential flags */
197 int ki_jid; /* Process jail ID */
198 int ki_numthreads; /* XXXKSE number of threads in total */
199 lwpid_t ki_tid; /* XXXKSE thread id */
200 struct priority ki_pri; /* process priority */
201 struct rusage ki_rusage; /* process rusage statistics */
202 /* XXX - most fields in ki_rusage_ch are not (yet) filled in */
203 struct rusage ki_rusage_ch; /* rusage of children processes */
204 struct pcb *ki_pcb; /* kernel virtual addr of pcb */
205 void *ki_kstack; /* kernel virtual addr of stack */
206 void *ki_udata; /* User convenience pointer */
207 struct thread *ki_tdaddr; /* address of thread */
208 /*
209 * When adding new variables, take space for pointers from the
210 * front of ki_spareptrs, and longs from the end of ki_sparelongs.
211 * That way the spare room from both arrays will remain contiguous.
212 */
213 void *ki_spareptrs[KI_NSPARE_PTR]; /* spare room for growth */
214 long ki_sparelongs[KI_NSPARE_LONG]; /* spare room for growth */
215 long ki_sflag; /* PS_* flags */
216 long ki_tdflags; /* XXXKSE kthread flag */
217 };
218 void fill_kinfo_proc(struct proc *, struct kinfo_proc *);
219 /* XXX - the following two defines are temporary */
220 #define ki_childstime ki_rusage_ch.ru_stime
221 #define ki_childutime ki_rusage_ch.ru_utime
222
223 /*
224 * Legacy PS_ flag. This moved to p_flag but is maintained for
225 * compatibility.
226 */
227 #define PS_INMEM 0x00001 /* Loaded into memory. */
228
229 /* ki_sessflag values */
230 #define KI_CTTY 0x00000001 /* controlling tty vnode active */
231 #define KI_SLEADER 0x00000002 /* session leader */
232 #define KI_LOCKBLOCK 0x00000004 /* proc blocked on lock ki_lockname */
233
234 /*
235 * This used to be the per-process structure containing data that
236 * isn't needed in core when the process is swapped out, but now it
237 * remains only for the benefit of a.out core dumps.
238 */
239 struct user {
240 struct pstats u_stats; /* *p_stats */
241 struct kinfo_proc u_kproc; /* eproc */
242 };
243
244 /*
245 * The KERN_PROC_FILE sysctl allows a process to dump the file descriptor
246 * array of another process.
247 */
248 #define KF_ATTR_VALID 0x0001
249
250 #define KF_TYPE_NONE 0
251 #define KF_TYPE_VNODE 1
252 #define KF_TYPE_SOCKET 2
253 #define KF_TYPE_PIPE 3
254 #define KF_TYPE_FIFO 4
255 #define KF_TYPE_KQUEUE 5
256 #define KF_TYPE_CRYPTO 6
257 #define KF_TYPE_MQUEUE 7
258 #define KF_TYPE_SHM 8
259 #define KF_TYPE_SEM 9
260 #define KF_TYPE_PTS 10
261 #define KF_TYPE_PROCDESC 11
262 #define KF_TYPE_UNKNOWN 255
263
264 #define KF_VTYPE_VNON 0
265 #define KF_VTYPE_VREG 1
266 #define KF_VTYPE_VDIR 2
267 #define KF_VTYPE_VBLK 3
268 #define KF_VTYPE_VCHR 4
269 #define KF_VTYPE_VLNK 5
270 #define KF_VTYPE_VSOCK 6
271 #define KF_VTYPE_VFIFO 7
272 #define KF_VTYPE_VBAD 8
273 #define KF_VTYPE_UNKNOWN 255
274
275 #define KF_FD_TYPE_CWD -1 /* Current working directory */
276 #define KF_FD_TYPE_ROOT -2 /* Root directory */
277 #define KF_FD_TYPE_JAIL -3 /* Jail directory */
278 #define KF_FD_TYPE_TRACE -4 /* Ktrace vnode */
279 #define KF_FD_TYPE_TEXT -5 /* Text vnode */
280 #define KF_FD_TYPE_CTTY -6 /* Controlling terminal */
281
282 #define KF_FLAG_READ 0x00000001
283 #define KF_FLAG_WRITE 0x00000002
284 #define KF_FLAG_APPEND 0x00000004
285 #define KF_FLAG_ASYNC 0x00000008
286 #define KF_FLAG_FSYNC 0x00000010
287 #define KF_FLAG_NONBLOCK 0x00000020
288 #define KF_FLAG_DIRECT 0x00000040
289 #define KF_FLAG_HASLOCK 0x00000080
290 #define KF_FLAG_SHLOCK 0x00000100
291 #define KF_FLAG_EXLOCK 0x00000200
292 #define KF_FLAG_NOFOLLOW 0x00000400
293 #define KF_FLAG_CREAT 0x00000800
294 #define KF_FLAG_TRUNC 0x00001000
295 #define KF_FLAG_EXCL 0x00002000
296 #define KF_FLAG_EXEC 0x00004000
297
298 /*
299 * Old format. Has variable hidden padding due to alignment.
300 * This is a compatibility hack for pre-build 7.1 packages.
301 */
302 #if defined(__amd64__)
303 #define KINFO_OFILE_SIZE 1328
304 #endif
305 #if defined(__i386__)
306 #define KINFO_OFILE_SIZE 1324
307 #endif
308
309 struct kinfo_ofile {
310 int kf_structsize; /* Size of kinfo_file. */
311 int kf_type; /* Descriptor type. */
312 int kf_fd; /* Array index. */
313 int kf_ref_count; /* Reference count. */
314 int kf_flags; /* Flags. */
315 /* XXX Hidden alignment padding here on amd64 */
316 off_t kf_offset; /* Seek location. */
317 int kf_vnode_type; /* Vnode type. */
318 int kf_sock_domain; /* Socket domain. */
319 int kf_sock_type; /* Socket type. */
320 int kf_sock_protocol; /* Socket protocol. */
321 char kf_path[PATH_MAX]; /* Path to file, if any. */
322 struct sockaddr_storage kf_sa_local; /* Socket address. */
323 struct sockaddr_storage kf_sa_peer; /* Peer address. */
324 };
325
326 #if defined(__amd64__) || defined(__i386__)
327 /*
328 * This size should never be changed. If you really need to, you must provide
329 * backward ABI compatibility by allocating a new sysctl MIB that will return
330 * the new structure. The current structure has to be returned by the current
331 * sysctl MIB. See how it is done for the kinfo_ofile structure.
332 */
333 #define KINFO_FILE_SIZE 1392
334 #endif
335
336 struct kinfo_file {
337 int kf_structsize; /* Variable size of record. */
338 int kf_type; /* Descriptor type. */
339 int kf_fd; /* Array index. */
340 int kf_ref_count; /* Reference count. */
341 int kf_flags; /* Flags. */
342 int kf_pad0; /* Round to 64 bit alignment. */
343 int64_t kf_offset; /* Seek location. */
344 int kf_vnode_type; /* Vnode type. */
345 int kf_sock_domain; /* Socket domain. */
346 int kf_sock_type; /* Socket type. */
347 int kf_sock_protocol; /* Socket protocol. */
348 struct sockaddr_storage kf_sa_local; /* Socket address. */
349 struct sockaddr_storage kf_sa_peer; /* Peer address. */
350 union {
351 struct {
352 /* Address of so_pcb. */
353 uint64_t kf_sock_pcb;
354 /* Address of inp_ppcb. */
355 uint64_t kf_sock_inpcb;
356 /* Address of unp_conn. */
357 uint64_t kf_sock_unpconn;
358 /* Send buffer state. */
359 uint16_t kf_sock_snd_sb_state;
360 /* Receive buffer state. */
361 uint16_t kf_sock_rcv_sb_state;
362 /* Round to 64 bit alignment. */
363 uint32_t kf_sock_pad0;
364 } kf_sock;
365 struct {
366 /* Global file id. */
367 uint64_t kf_file_fileid;
368 /* File size. */
369 uint64_t kf_file_size;
370 /* Vnode filesystem id. */
371 uint32_t kf_file_fsid;
372 /* File device. */
373 uint32_t kf_file_rdev;
374 /* File mode. */
375 uint16_t kf_file_mode;
376 /* Round to 64 bit alignment. */
377 uint16_t kf_file_pad0;
378 uint32_t kf_file_pad1;
379 } kf_file;
380 struct {
381 uint32_t kf_sem_value;
382 uint16_t kf_sem_mode;
383 } kf_sem;
384 struct {
385 uint64_t kf_pipe_addr;
386 uint64_t kf_pipe_peer;
387 uint32_t kf_pipe_buffer_cnt;
388 /* Round to 64 bit alignment. */
389 uint32_t kf_pipe_pad0[3];
390 } kf_pipe;
391 struct {
392 uint32_t kf_pts_dev;
393 /* Round to 64 bit alignment. */
394 uint32_t kf_pts_pad0[7];
395 } kf_pts;
396 struct {
397 pid_t kf_pid;
398 } kf_proc;
399 } kf_un;
400 uint16_t kf_status; /* Status flags. */
401 uint16_t kf_pad1; /* Round to 32 bit alignment. */
402 int _kf_ispare0; /* Space for more stuff. */
403 cap_rights_t kf_cap_rights; /* Capability rights. */
404 uint64_t _kf_cap_spare; /* Space for future cap_rights_t. */
405 /* Truncated before copyout in sysctl */
406 char kf_path[PATH_MAX]; /* Path to file, if any. */
407 };
408
409 /*
410 * The KERN_PROC_VMMAP sysctl allows a process to dump the VM layout of
411 * another process as a series of entries.
412 */
413 #define KVME_TYPE_NONE 0
414 #define KVME_TYPE_DEFAULT 1
415 #define KVME_TYPE_VNODE 2
416 #define KVME_TYPE_SWAP 3
417 #define KVME_TYPE_DEVICE 4
418 #define KVME_TYPE_PHYS 5
419 #define KVME_TYPE_DEAD 6
420 #define KVME_TYPE_SG 7
421 #define KVME_TYPE_MGTDEVICE 8
422 #define KVME_TYPE_UNKNOWN 255
423
424 #define KVME_PROT_READ 0x00000001
425 #define KVME_PROT_WRITE 0x00000002
426 #define KVME_PROT_EXEC 0x00000004
427
428 #define KVME_FLAG_COW 0x00000001
429 #define KVME_FLAG_NEEDS_COPY 0x00000002
430 #define KVME_FLAG_NOCOREDUMP 0x00000004
431 #define KVME_FLAG_SUPER 0x00000008
432 #define KVME_FLAG_GROWS_UP 0x00000010
433 #define KVME_FLAG_GROWS_DOWN 0x00000020
434
435 #if defined(__amd64__)
436 #define KINFO_OVMENTRY_SIZE 1168
437 #endif
438 #if defined(__i386__)
439 #define KINFO_OVMENTRY_SIZE 1128
440 #endif
441
442 struct kinfo_ovmentry {
443 int kve_structsize; /* Size of kinfo_vmmapentry. */
444 int kve_type; /* Type of map entry. */
445 void *kve_start; /* Starting address. */
446 void *kve_end; /* Finishing address. */
447 int kve_flags; /* Flags on map entry. */
448 int kve_resident; /* Number of resident pages. */
449 int kve_private_resident; /* Number of private pages. */
450 int kve_protection; /* Protection bitmask. */
451 int kve_ref_count; /* VM obj ref count. */
452 int kve_shadow_count; /* VM obj shadow count. */
453 char kve_path[PATH_MAX]; /* Path to VM obj, if any. */
454 void *_kve_pspare[8]; /* Space for more stuff. */
455 off_t kve_offset; /* Mapping offset in object */
456 uint64_t kve_fileid; /* inode number if vnode */
457 dev_t kve_fsid; /* dev_t of vnode location */
458 int _kve_ispare[3]; /* Space for more stuff. */
459 };
460
461 #if defined(__amd64__) || defined(__i386__)
462 #define KINFO_VMENTRY_SIZE 1160
463 #endif
464
465 struct kinfo_vmentry {
466 int kve_structsize; /* Variable size of record. */
467 int kve_type; /* Type of map entry. */
468 uint64_t kve_start; /* Starting address. */
469 uint64_t kve_end; /* Finishing address. */
470 uint64_t kve_offset; /* Mapping offset in object */
471 uint64_t kve_vn_fileid; /* inode number if vnode */
472 uint32_t kve_vn_fsid; /* dev_t of vnode location */
473 int kve_flags; /* Flags on map entry. */
474 int kve_resident; /* Number of resident pages. */
475 int kve_private_resident; /* Number of private pages. */
476 int kve_protection; /* Protection bitmask. */
477 int kve_ref_count; /* VM obj ref count. */
478 int kve_shadow_count; /* VM obj shadow count. */
479 int kve_vn_type; /* Vnode type. */
480 uint64_t kve_vn_size; /* File size. */
481 uint32_t kve_vn_rdev; /* Device id if device. */
482 uint16_t kve_vn_mode; /* File mode. */
483 uint16_t kve_status; /* Status flags. */
484 int _kve_ispare[12]; /* Space for more stuff. */
485 /* Truncated before copyout in sysctl */
486 char kve_path[PATH_MAX]; /* Path to VM obj, if any. */
487 };
488
489 /*
490 * The "vm.objects" sysctl provides a list of all VM objects in the system
491 * via an array of these entries.
492 */
493 struct kinfo_vmobject {
494 int kvo_structsize; /* Variable size of record. */
495 int kvo_type; /* Object type: KVME_TYPE_*. */
496 uint64_t kvo_size; /* Object size in pages. */
497 uint64_t kvo_vn_fileid; /* inode number if vnode. */
498 uint32_t kvo_vn_fsid; /* dev_t of vnode location. */
499 int kvo_ref_count; /* Reference count. */
500 int kvo_shadow_count; /* Shadow count. */
501 int kvo_memattr; /* Memory attribute. */
502 uint64_t kvo_resident; /* Number of resident pages. */
503 uint64_t kvo_active; /* Number of active pages. */
504 uint64_t kvo_inactive; /* Number of inactive pages. */
505 uint64_t _kvo_qspare[8];
506 uint32_t _kvo_ispare[8];
507 char kvo_path[PATH_MAX]; /* Pathname, if any. */
508 };
509
510 /*
511 * The KERN_PROC_KSTACK sysctl allows a process to dump the kernel stacks of
512 * another process as a series of entries. Each stack is represented by a
513 * series of symbol names and offsets as generated by stack_sbuf_print(9).
514 */
515 #define KKST_MAXLEN 1024
516
517 #define KKST_STATE_STACKOK 0 /* Stack is valid. */
518 #define KKST_STATE_SWAPPED 1 /* Stack swapped out. */
519 #define KKST_STATE_RUNNING 2 /* Stack ephemeral. */
520
521 #if defined(__amd64__) || defined(__i386__)
522 #define KINFO_KSTACK_SIZE 1096
523 #endif
524
525 struct kinfo_kstack {
526 lwpid_t kkst_tid; /* ID of thread. */
527 int kkst_state; /* Validity of stack. */
528 char kkst_trace[KKST_MAXLEN]; /* String representing stack. */
529 int _kkst_ispare[16]; /* Space for more stuff. */
530 };
531
532 struct kinfo_sigtramp {
533 void *ksigtramp_start;
534 void *ksigtramp_end;
535 void *ksigtramp_spare[4];
536 };
537
538 #ifdef _KERNEL
539 /* Flags for kern_proc_out function. */
540 #define KERN_PROC_NOTHREADS 0x1
541 #define KERN_PROC_MASK32 0x2
542
543 /* Flags for kern_proc_filedesc_out. */
544 #define KERN_FILEDESC_PACK_KINFO 0x00000001U
545
546 /* Flags for kern_proc_vmmap_out. */
547 #define KERN_VMMAP_PACK_KINFO 0x00000001U
548 struct sbuf;
549
550 /*
551 * The kern_proc out functions are helper functions to dump process
552 * miscellaneous kinfo structures to sbuf. The main consumers are KERN_PROC
553 * sysctls but they may also be used by other kernel subsystems.
554 *
555 * The functions manipulate the process locking state and expect the process
556 * to be locked on enter. On return the process is unlocked.
557 */
558
559 int kern_proc_filedesc_out(struct proc *p, struct sbuf *sb, ssize_t maxlen,
560 int flags);
561 int kern_proc_cwd_out(struct proc *p, struct sbuf *sb, ssize_t maxlen);
562 int kern_proc_out(struct proc *p, struct sbuf *sb, int flags);
563 int kern_proc_vmmap_out(struct proc *p, struct sbuf *sb, ssize_t maxlen,
564 int flags);
565
566 int vntype_to_kinfo(int vtype);
567 #endif /* !_KERNEL */
568
569 #endif
Cache object: dbae9b9706ebfe7269205ca4bee82229
|