user.h revision 207152
1139825Simp/*-
21541Srgrimes * Copyright (c) 1982, 1986, 1989, 1991, 1993
3174167Srwatson *	The Regents of the University of California.
4174167Srwatson * Copyright (c) 2007 Robert N. M. Watson
5174167Srwatson * All rights reserved.
61541Srgrimes *
71541Srgrimes * Redistribution and use in source and binary forms, with or without
81541Srgrimes * modification, are permitted provided that the following conditions
91541Srgrimes * are met:
101541Srgrimes * 1. Redistributions of source code must retain the above copyright
111541Srgrimes *    notice, this list of conditions and the following disclaimer.
121541Srgrimes * 2. Redistributions in binary form must reproduce the above copyright
131541Srgrimes *    notice, this list of conditions and the following disclaimer in the
141541Srgrimes *    documentation and/or other materials provided with the distribution.
151541Srgrimes * 4. Neither the name of the University nor the names of its contributors
161541Srgrimes *    may be used to endorse or promote products derived from this software
171541Srgrimes *    without specific prior written permission.
181541Srgrimes *
191541Srgrimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
201541Srgrimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
211541Srgrimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
221541Srgrimes * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
231541Srgrimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
241541Srgrimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
251541Srgrimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
261541Srgrimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
271541Srgrimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
281541Srgrimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
291541Srgrimes * SUCH DAMAGE.
301541Srgrimes *
311541Srgrimes *	@(#)user.h	8.2 (Berkeley) 9/23/93
3250477Speter * $FreeBSD: head/sys/sys/user.h 207152 2010-04-24 12:49:52Z kib $
331541Srgrimes */
341541Srgrimes
352165Spaul#ifndef _SYS_USER_H_
362165Spaul#define _SYS_USER_H_
372165Spaul
381541Srgrimes#include <machine/pcb.h>
3955205Speter#ifndef _KERNEL
401541Srgrimes/* stuff that *used* to be included by user.h, or is now needed */
4118207Sbde#include <sys/errno.h>
421541Srgrimes#include <sys/time.h>
431541Srgrimes#include <sys/resource.h>
441541Srgrimes#include <sys/ucred.h>
451541Srgrimes#include <sys/uio.h>
4692047Sdd#include <sys/queue.h>
4781202Sjhb#include <sys/_lock.h>
4876166Smarkm#include <sys/_mutex.h>
4911913Sphk#include <sys/proc.h>
5012685Speter#include <vm/vm.h>		/* XXX */
5112685Speter#include <vm/vm_param.h>	/* XXX */
5212685Speter#include <vm/pmap.h>		/* XXX */
5312685Speter#include <vm/vm_map.h>		/* XXX */
5455205Speter#endif /* !_KERNEL */
5534924Sbde#ifndef _SYS_RESOURCEVAR_H_
561541Srgrimes#include <sys/resourcevar.h>
5734924Sbde#endif
5834924Sbde#ifndef _SYS_SIGNALVAR_H_
591541Srgrimes#include <sys/signalvar.h>
6034924Sbde#endif
61174167Srwatson#ifndef _SYS_SOCKET_VAR_H_
62174167Srwatson#include <sys/socket.h>
63174167Srwatson#endif
641541Srgrimes
651541Srgrimes/*
6669896Smckusick * KERN_PROC subtype ops return arrays of selected proc structure entries:
6769896Smckusick *
68147188Sgad * This struct includes several arrays of spare space, with different arrays
69147188Sgad * for different standard C-types.  When adding new variables to this struct,
70147188Sgad * the space for byte-aligned data should be taken from the ki_sparestring,
71147188Sgad * pointers from ki_spareptrs, word-aligned data from ki_spareints, and
72147188Sgad * doubleword-aligned data from ki_sparelongs.  Make sure the space for new
73147188Sgad * variables come from the array which matches the size and alignment of
74147188Sgad * those variables on ALL hardware platforms, and then adjust the appropriate
75147188Sgad * KI_NSPARE_* value(s) to match.
76130825Sgad *
77147188Sgad * Always verify that sizeof(struct kinfo_proc) == KINFO_PROC_SIZE on all
78147188Sgad * platforms after you have added new variables.  Note that if you change
79147188Sgad * the value of KINFO_PROC_SIZE, then many userland programs will stop
80147188Sgad * working until they are recompiled!
81147188Sgad *
82147188Sgad * Once you have added the new field, you will need to add code to initialize
83147188Sgad * it in two places: function fill_kinfo_proc in sys/kern/kern_proc.c and
84147188Sgad * function kvm_proclist in lib/libkvm/kvm_proc.c .
8511865Sphk */
86193255Srwatson#define	KI_NSPARE_INT	9
87147188Sgad#define	KI_NSPARE_LONG	12
88195843Sbrooks#define	KI_NSPARE_PTR	7
89130825Sgad
90207152Skib#ifndef _KERNEL
91130825Sgad#ifndef KINFO_PROC_SIZE
92130825Sgad#error "Unknown architecture"
93130825Sgad#endif
94207152Skib#endif /* !_KERNEL */
95130825Sgad
9669896Smckusick#define	WMESGLEN	8		/* size of returned wchan message */
97104387Sjhb#define	LOCKNAMELEN	8		/* size of returned lock name */
98154535Sjulian#define	OCOMMLEN	16		/* size of returned thread name */
9981759Speter#define	COMMLEN		19		/* size of returned ki_comm name */
100130726Sgad#define	KI_EMULNAMELEN	16		/* size of returned ki_emul */
101195843Sbrooks#define KI_NGROUPS	16		/* number of groups in ki_groups */
10281759Speter#define	LOGNAMELEN	17		/* size of returned ki_login */
10369896Smckusick
104195843Sbrooks/*
105195843Sbrooks * Steal a bit from ki_cr_flags (cr_flags is never used) to indicate
106195843Sbrooks * that the cred had more than KI_NGROUPS groups.
107195843Sbrooks */
108195843Sbrooks#define KI_CRF_GRP_OVERFLOW	0x80000000
109195843Sbrooks
11011865Sphkstruct kinfo_proc {
11169896Smckusick	int	ki_structsize;		/* size of this structure */
11272415Sphk	int	ki_layout;		/* reserved: layout identifier */
11369896Smckusick	struct	pargs *ki_args;		/* address of command arguments */
11469896Smckusick	struct	proc *ki_paddr;		/* address of proc */
11569896Smckusick	struct	user *ki_addr;		/* kernel virtual addr of u-area */
11669896Smckusick	struct	vnode *ki_tracep;	/* pointer to trace file */
11769896Smckusick	struct	vnode *ki_textvp;	/* pointer to executable file */
11869896Smckusick	struct	filedesc *ki_fd;	/* pointer to open file info */
11969896Smckusick	struct	vmspace *ki_vmspace;	/* pointer to kernel vmspace struct */
12069896Smckusick	void	*ki_wchan;		/* sleep address */
12169896Smckusick	pid_t	ki_pid;			/* Process identifier */
12269896Smckusick	pid_t	ki_ppid;		/* parent process id */
12369896Smckusick	pid_t	ki_pgid;		/* process group id */
12469896Smckusick	pid_t	ki_tpgid;		/* tty process group id */
12569896Smckusick	pid_t	ki_sid;			/* Process session ID */
12669896Smckusick	pid_t	ki_tsid;		/* Terminal session ID */
12769896Smckusick	short	ki_jobc;		/* job control counter */
128130726Sgad	short	ki_spare_short1;	/* unused (just here for alignment) */
129130640Sphk	dev_t	ki_tdev;		/* controlling tty dev */
13069896Smckusick	sigset_t ki_siglist;		/* Signals arrived but not delivered */
13169896Smckusick	sigset_t ki_sigmask;		/* Current signal mask */
13269896Smckusick	sigset_t ki_sigignore;		/* Signals being ignored */
13369896Smckusick	sigset_t ki_sigcatch;		/* Signals being caught by user */
13469896Smckusick	uid_t	ki_uid;			/* effective user id */
13569896Smckusick	uid_t	ki_ruid;		/* Real user id */
13669896Smckusick	uid_t	ki_svuid;		/* Saved effective user id */
13769896Smckusick	gid_t	ki_rgid;		/* Real group id */
13869896Smckusick	gid_t	ki_svgid;		/* Saved effective group id */
13969896Smckusick	short	ki_ngroups;		/* number of groups */
140130726Sgad	short	ki_spare_short2;	/* unused (just here for alignment) */
141195843Sbrooks	gid_t 	ki_groups[KI_NGROUPS];	/* groups */
14269896Smckusick	vm_size_t ki_size;		/* virtual size */
14369896Smckusick	segsz_t ki_rssize;		/* current resident set size in pages */
14469896Smckusick	segsz_t ki_swrss;		/* resident set size before last swap */
14569896Smckusick	segsz_t ki_tsize;		/* text size (pages) XXX */
14669896Smckusick	segsz_t ki_dsize;		/* data size (pages) XXX */
14769896Smckusick	segsz_t ki_ssize;		/* stack size (pages) */
14869896Smckusick	u_short	ki_xstat;		/* Exit status for wait & stop signal */
14969896Smckusick	u_short	ki_acflag;		/* Accounting flags */
15069896Smckusick	fixpt_t	ki_pctcpu;	 	/* %cpu for process during ki_swtime */
15169896Smckusick	u_int	ki_estcpu;	 	/* Time averaged value of ki_cpticks */
15269896Smckusick	u_int	ki_slptime;	 	/* Time since last blocked */
15369896Smckusick	u_int	ki_swtime;	 	/* Time swapped in or out */
154147188Sgad	int	ki_spareint1;	 	/* unused (just here for alignment) */
15569896Smckusick	u_int64_t ki_runtime;		/* Real time in microsec */
15669896Smckusick	struct	timeval ki_start;	/* starting time */
15769896Smckusick	struct	timeval ki_childtime;	/* time used by process children */
15869896Smckusick	long	ki_flag;		/* P_* flags */
15969896Smckusick	long	ki_kiflag;		/* KI_* flags (below) */
16069896Smckusick	int	ki_traceflag;		/* Kernel trace points */
16169896Smckusick	char	ki_stat;		/* S* process status */
162124829Sgrehan	signed char ki_nice;		/* Process "nice" value */
16369896Smckusick	char	ki_lock;		/* Process lock (prevent swap) count */
16469896Smckusick	char	ki_rqindex;		/* Run queue index */
16569896Smckusick	u_char	ki_oncpu;		/* Which cpu we are on */
16669896Smckusick	u_char	ki_lastcpu;		/* Last cpu we were on */
167154535Sjulian	char	ki_ocomm[OCOMMLEN+1];	/* thread name */
16869896Smckusick	char	ki_wmesg[WMESGLEN+1];	/* wchan message */
16981759Speter	char	ki_login[LOGNAMELEN+1];	/* setlogin name */
170104387Sjhb	char	ki_lockname[LOCKNAMELEN+1]; /* lock name */
17181759Speter	char	ki_comm[COMMLEN+1];	/* command name */
172130726Sgad	char	ki_emul[KI_EMULNAMELEN+1];  /* emulation name */
173147188Sgad	/*
174147188Sgad	 * When adding new variables, take space for char-strings from the
175147188Sgad	 * front of ki_sparestrings, and ints from the end of ki_spareints.
176147188Sgad	 * That way the spare room from both arrays will remain contiguous.
177147188Sgad	 */
178130726Sgad	char	ki_sparestrings[68];	/* spare string space */
179147188Sgad	int	ki_spareints[KI_NSPARE_INT];	/* spare room for growth */
180193255Srwatson	u_int	ki_cr_flags;		/* Credential flags */
181147188Sgad	int	ki_jid;			/* Process jail ID */
182147188Sgad	int	ki_numthreads;		/* XXXKSE number of threads in total */
183147188Sgad	lwpid_t	ki_tid;			/* XXXKSE thread id */
184147188Sgad	struct	priority ki_pri;	/* process priority */
18569896Smckusick	struct	rusage ki_rusage;	/* process rusage statistics */
186147188Sgad	/* XXX - most fields in ki_rusage_ch are not (yet) filled in */
187147188Sgad	struct	rusage ki_rusage_ch;	/* rusage of children processes */
18883366Sjulian	struct	pcb *ki_pcb;		/* kernel virtual addr of pcb */
18983366Sjulian	void	*ki_kstack;		/* kernel virtual addr of stack */
190132014Salfred	void	*ki_udata;		/* User convenience pointer */
191147188Sgad	/*
192147188Sgad	 * When adding new variables, take space for pointers from the
193147188Sgad	 * front of ki_spareptrs, and longs from the end of ki_sparelongs.
194147188Sgad	 * That way the spare room from both arrays will remain contiguous.
195147188Sgad	 */
196147188Sgad	void	*ki_spareptrs[KI_NSPARE_PTR];	/* spare room for growth */
197147188Sgad	long	ki_sparelongs[KI_NSPARE_LONG];	/* spare room for growth */
198147188Sgad	long	ki_sflag;		/* PS_* flags */
199147188Sgad	long	ki_tdflags;		/* XXXKSE kthread flag */
20011865Sphk};
20192719Salfredvoid fill_kinfo_proc(struct proc *, struct kinfo_proc *);
202147188Sgad/* XXX - the following two defines are temporary */
203147188Sgad#define	ki_childstime	ki_rusage_ch.ru_stime
204147188Sgad#define	ki_childutime	ki_rusage_ch.ru_utime
20511865Sphk
206172207Sjeff/*
207172207Sjeff *  Legacy PS_ flag.  This moved to p_flag but is maintained for
208172207Sjeff *  compatibility.
209172207Sjeff */
210172207Sjeff#define	PS_INMEM	0x00001		/* Loaded into memory. */
211172207Sjeff
21269896Smckusick/* ki_sessflag values */
21369896Smckusick#define	KI_CTTY		0x00000001	/* controlling tty vnode active */
21469896Smckusick#define	KI_SLEADER	0x00000002	/* session leader */
215104387Sjhb#define	KI_LOCKBLOCK	0x00000004	/* proc blocked on lock ki_lockname */
21611865Sphk
21711865Sphk/*
218137920Sdas * This used to be the per-process structure containing data that
219137920Sdas * isn't needed in core when the process is swapped out, but now it
220137920Sdas * remains only for the benefit of a.out core dumps.
2211541Srgrimes */
22283421Sobrienstruct user {
22383366Sjulian	struct	pstats u_stats;		/* *p_stats */
22483366Sjulian	struct	kinfo_proc u_kproc;	/* eproc */
2251541Srgrimes};
2261541Srgrimes
227174167Srwatson/*
228176124Smarcus * The KERN_PROC_FILE sysctl allows a process to dump the file descriptor
229174167Srwatson * array of another process.
230174167Srwatson */
231174167Srwatson#define	KF_TYPE_NONE	0
232174167Srwatson#define	KF_TYPE_VNODE	1
233174167Srwatson#define	KF_TYPE_SOCKET	2
234174167Srwatson#define	KF_TYPE_PIPE	3
235174167Srwatson#define	KF_TYPE_FIFO	4
236174167Srwatson#define	KF_TYPE_KQUEUE	5
237174167Srwatson#define	KF_TYPE_CRYPTO	6
238174167Srwatson#define	KF_TYPE_MQUEUE	7
239175514Srwatson#define	KF_TYPE_SHM	8
240180059Sjhb#define	KF_TYPE_SEM	9
241181905Sed#define	KF_TYPE_PTS	10
242174167Srwatson#define	KF_TYPE_UNKNOWN	255
243174167Srwatson
244174167Srwatson#define	KF_VTYPE_VNON	0
245174167Srwatson#define	KF_VTYPE_VREG	1
246174167Srwatson#define	KF_VTYPE_VDIR	2
247174167Srwatson#define	KF_VTYPE_VBLK	3
248174167Srwatson#define	KF_VTYPE_VCHR	4
249174167Srwatson#define	KF_VTYPE_VLNK	5
250174167Srwatson#define	KF_VTYPE_VSOCK	6
251174167Srwatson#define	KF_VTYPE_VFIFO	7
252174167Srwatson#define	KF_VTYPE_VBAD	8
253174167Srwatson#define	KF_VTYPE_UNKNOWN	255
254174167Srwatson
255176124Smarcus#define	KF_FD_TYPE_CWD	-1	/* Current working directory */
256176124Smarcus#define	KF_FD_TYPE_ROOT	-2	/* Root directory */
257176124Smarcus#define	KF_FD_TYPE_JAIL	-3	/* Jail directory */
258176124Smarcus
259174167Srwatson#define	KF_FLAG_READ		0x00000001
260174167Srwatson#define	KF_FLAG_WRITE		0x00000002
261174167Srwatson#define	KF_FLAG_APPEND		0x00000004
262174167Srwatson#define	KF_FLAG_ASYNC		0x00000008
263174167Srwatson#define	KF_FLAG_FSYNC		0x00000010
264174167Srwatson#define	KF_FLAG_NONBLOCK	0x00000020
265174167Srwatson#define	KF_FLAG_DIRECT		0x00000040
266174167Srwatson#define	KF_FLAG_HASLOCK		0x00000080
267174167Srwatson
268185548Speter/*
269185548Speter * Old format.  Has variable hidden padding due to alignment.
270185548Speter * This is a compatability hack for pre-build 7.1 packages.
271185548Speter */
272185548Speter#if defined(__amd64__)
273185548Speter#define	KINFO_OFILE_SIZE	1328
274185548Speter#endif
275185548Speter#if defined(__i386__)
276185548Speter#define	KINFO_OFILE_SIZE	1324
277185548Speter#endif
278185548Speter
279185548Speterstruct kinfo_ofile {
280174167Srwatson	int	kf_structsize;			/* Size of kinfo_file. */
281174167Srwatson	int	kf_type;			/* Descriptor type. */
282174167Srwatson	int	kf_fd;				/* Array index. */
283174167Srwatson	int	kf_ref_count;			/* Reference count. */
284174167Srwatson	int	kf_flags;			/* Flags. */
285185548Speter	/* XXX Hidden alignment padding here on amd64 */
286174167Srwatson	off_t	kf_offset;			/* Seek location. */
287174167Srwatson	int	kf_vnode_type;			/* Vnode type. */
288174167Srwatson	int	kf_sock_domain;			/* Socket domain. */
289174167Srwatson	int	kf_sock_type;			/* Socket type. */
290174167Srwatson	int	kf_sock_protocol;		/* Socket protocol. */
291185548Speter	char	kf_path[PATH_MAX];	/* Path to file, if any. */
292174167Srwatson	struct sockaddr_storage kf_sa_local;	/* Socket address. */
293174167Srwatson	struct sockaddr_storage	kf_sa_peer;	/* Peer address. */
294174167Srwatson};
295174167Srwatson
296185548Speter#if defined(__amd64__) || defined(__i386__)
297185548Speter#define	KINFO_FILE_SIZE	1392
298185548Speter#endif
299185548Speter
300185548Speterstruct kinfo_file {
301185548Speter	int	kf_structsize;			/* Variable size of record. */
302185548Speter	int	kf_type;			/* Descriptor type. */
303185548Speter	int	kf_fd;				/* Array index. */
304185548Speter	int	kf_ref_count;			/* Reference count. */
305185548Speter	int	kf_flags;			/* Flags. */
306185548Speter	int	_kf_pad0;			/* Round to 64 bit alignment */
307185554Speter	int64_t	kf_offset;			/* Seek location. */
308185548Speter	int	kf_vnode_type;			/* Vnode type. */
309185548Speter	int	kf_sock_domain;			/* Socket domain. */
310185548Speter	int	kf_sock_type;			/* Socket type. */
311185548Speter	int	kf_sock_protocol;		/* Socket protocol. */
312185548Speter	struct sockaddr_storage kf_sa_local;	/* Socket address. */
313185548Speter	struct sockaddr_storage	kf_sa_peer;	/* Peer address. */
314185548Speter	int	_kf_ispare[16];			/* Space for more stuff. */
315185548Speter	/* Truncated before copyout in sysctl */
316185548Speter	char	kf_path[PATH_MAX];		/* Path to file, if any. */
317185548Speter};
318185548Speter
319174167Srwatson/*
320174167Srwatson * The KERN_PROC_VMMAP sysctl allows a process to dump the VM layout of
321174167Srwatson * another process as a series of entries.
322174167Srwatson */
323174167Srwatson#define	KVME_TYPE_NONE		0
324174167Srwatson#define	KVME_TYPE_DEFAULT	1
325174167Srwatson#define	KVME_TYPE_VNODE		2
326174167Srwatson#define	KVME_TYPE_SWAP		3
327174167Srwatson#define	KVME_TYPE_DEVICE	4
328174167Srwatson#define	KVME_TYPE_PHYS		5
329174167Srwatson#define	KVME_TYPE_DEAD		6
330195840Sjhb#define	KVME_TYPE_SG		7
331174167Srwatson#define	KVME_TYPE_UNKNOWN	255
332174167Srwatson
333174167Srwatson#define	KVME_PROT_READ		0x00000001
334174167Srwatson#define	KVME_PROT_WRITE		0x00000002
335174167Srwatson#define	KVME_PROT_EXEC		0x00000004
336174167Srwatson
337174167Srwatson#define	KVME_FLAG_COW		0x00000001
338174167Srwatson#define	KVME_FLAG_NEEDS_COPY	0x00000002
339174167Srwatson
340185548Speter#if defined(__amd64__)
341185548Speter#define	KINFO_OVMENTRY_SIZE	1168
342185548Speter#endif
343185548Speter#if defined(__i386__)
344185548Speter#define	KINFO_OVMENTRY_SIZE	1128
345185548Speter#endif
346185548Speter
347185548Speterstruct kinfo_ovmentry {
348174167Srwatson	int	 kve_structsize;		/* Size of kinfo_vmmapentry. */
349174167Srwatson	int	 kve_type;			/* Type of map entry. */
350185548Speter	void	*kve_start;			/* Starting address. */
351185548Speter	void	*kve_end;			/* Finishing address. */
352174167Srwatson	int	 kve_flags;			/* Flags on map entry. */
353174167Srwatson	int	 kve_resident;			/* Number of resident pages. */
354174167Srwatson	int	 kve_private_resident;		/* Number of private pages. */
355174167Srwatson	int	 kve_protection;		/* Protection bitmask. */
356174167Srwatson	int	 kve_ref_count;			/* VM obj ref count. */
357174167Srwatson	int	 kve_shadow_count;		/* VM obj shadow count. */
358174167Srwatson	char	 kve_path[PATH_MAX];		/* Path to VM obj, if any. */
359174167Srwatson	void	*_kve_pspare[8];		/* Space for more stuff. */
360184492Speter	off_t	 kve_offset;			/* Mapping offset in object */
361185548Speter	uint64_t kve_fileid;			/* inode number if vnode */
362184492Speter	dev_t	 kve_fsid;			/* dev_t of vnode location */
363184492Speter	int	 _kve_ispare[3];		/* Space for more stuff. */
364174167Srwatson};
365174167Srwatson
366185548Speter#if defined(__amd64__) || defined(__i386__)
367185548Speter#define	KINFO_VMENTRY_SIZE	1160
368185548Speter#endif
369185548Speter
370185548Speterstruct kinfo_vmentry {
371185548Speter	int	 kve_structsize;		/* Variable size of record. */
372185548Speter	int	 kve_type;			/* Type of map entry. */
373185548Speter	uint64_t kve_start;			/* Starting address. */
374185548Speter	uint64_t kve_end;			/* Finishing address. */
375185548Speter	uint64_t kve_offset;			/* Mapping offset in object */
376185548Speter	uint64_t kve_fileid;			/* inode number if vnode */
377185548Speter	uint32_t kve_fsid;			/* dev_t of vnode location */
378185548Speter	int	 kve_flags;			/* Flags on map entry. */
379185548Speter	int	 kve_resident;			/* Number of resident pages. */
380185548Speter	int	 kve_private_resident;		/* Number of private pages. */
381185548Speter	int	 kve_protection;		/* Protection bitmask. */
382185548Speter	int	 kve_ref_count;			/* VM obj ref count. */
383185548Speter	int	 kve_shadow_count;		/* VM obj shadow count. */
384185548Speter	int	 _kve_pad0;			/* 64bit align next field */
385185548Speter	int	 _kve_ispare[16];		/* Space for more stuff. */
386185548Speter	/* Truncated before copyout in sysctl */
387185548Speter	char	 kve_path[PATH_MAX];		/* Path to VM obj, if any. */
388185548Speter};
389185548Speter
390174197Srwatson/*
391174197Srwatson * The KERN_PROC_KSTACK sysctl allows a process to dump the kernel stacks of
392174197Srwatson * another process as a series of entries.  Each stack is represented by a
393174197Srwatson * series of symbol names and offsets as generated by stack_sbuf_print(9).
394174197Srwatson */
395174197Srwatson#define	KKST_MAXLEN	1024
396174197Srwatson
397174197Srwatson#define	KKST_STATE_STACKOK	0		/* Stack is valid. */
398174197Srwatson#define	KKST_STATE_SWAPPED	1		/* Stack swapped out. */
399174197Srwatson#define	KKST_STATE_RUNNING	2		/* Stack ephemeral. */
400174197Srwatson
401185548Speter#if defined(__amd64__) || defined(__i386__)
402185548Speter#define	KINFO_KSTACK_SIZE	1096
403185548Speter#endif
404185548Speter
405174197Srwatsonstruct kinfo_kstack {
406174197Srwatson	lwpid_t	 kkst_tid;			/* ID of thread. */
407174197Srwatson	int	 kkst_state;			/* Validity of stack. */
408174197Srwatson	char	 kkst_trace[KKST_MAXLEN];	/* String representing stack. */
409185548Speter	int	 _kkst_ispare[16];		/* Space for more stuff. */
410174197Srwatson};
411174197Srwatson
41237689Sdfr#endif
413