]> git.saurik.com Git - apple/system_cmds.git/blame - lsmp.tproj/task_details.c
system_cmds-805.200.21.tar.gz
[apple/system_cmds.git] / lsmp.tproj / task_details.c
CommitLineData
1a7e3f61 1/*
cf37c299 2 * Copyright (c) 2002-2016 Apple Inc. All rights reserved.
1a7e3f61
A
3 *
4 * @APPLE_LICENSE_HEADER_START@
5 *
6 * The contents of this file constitute Original Code as defined in and
7 * are subject to the Apple Public Source License Version 1.1 (the
8 * "License"). You may not use this file except in compliance with the
9 * License. Please obtain a copy of the License at
10 * http://www.apple.com/publicsource and read it before using this file.
11 *
12 * This Original Code and all software distributed under the License are
13 * distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, EITHER
14 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
15 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
16 * FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. Please see the
17 * License for the specific language governing rights and limitations
18 * under the License.
19 *
20 * @APPLE_LICENSE_HEADER_END@
21 */
22
23#include <unistd.h>
24#include <mach/mach.h>
25#include <mach/mach_error.h>
26#include <mach_debug/ipc_info.h>
27#include <stdio.h>
28#include <stdlib.h>
29#include <libproc.h>
cf37c299 30#include <assert.h>
1a7e3f61
A
31
32#include "common.h"
33
cf37c299
A
34#pragma mark kobject to name hash table implementation
35
36#if (K2N_TABLE_SIZE & (K2N_TABLE_SIZE - 1) != 0)
37#error K2N_TABLE_SIZE must be a power of two
38#endif
39
40#define K2N_TABLE_MASK (K2N_TABLE_SIZE - 1)
41
42static uint32_t k2n_hash(natural_t kobject) {
43 return (uint64_t)kobject * 2654435761 >> 32;
44}
45
530d02b6 46static struct k2n_table_node *k2n_table_lookup_next_internal(struct k2n_table_node *node, natural_t kobject) {
cf37c299
A
47 while (node) {
48 if (kobject == node->kobject)
49 return node;
50
51 node = node->next;
52 }
53
54 return NULL;
55}
56
530d02b6
A
57struct k2n_table_node *k2n_table_lookup_next(struct k2n_table_node *node, natural_t kobject) {
58 if (!node) {
59 return NULL;
60 }
61 return k2n_table_lookup_next_internal(node->next, kobject);
62}
63
cf37c299
A
64struct k2n_table_node *k2n_table_lookup(struct k2n_table_node **table, natural_t kobject) {
65 uint32_t hv;
66 struct k2n_table_node *node;
67
68 hv = k2n_hash(kobject);
69
70 node = table[hv & K2N_TABLE_MASK];
71
530d02b6 72 return k2n_table_lookup_next_internal(node, kobject);
cf37c299
A
73}
74
75static void k2n_table_enter(struct k2n_table_node **table, natural_t kobject, ipc_info_name_t *info_name) {
76 uint32_t hv;
77 struct k2n_table_node *node;
78
79 hv = k2n_hash(kobject);
80
81 node = malloc(sizeof (struct k2n_table_node));
82 assert(node);
83
84 node->kobject = kobject;
85 node->info_name = info_name;
530d02b6 86 assert(kobject == info_name->iin_object);
cf37c299
A
87
88 node->next = table[hv & K2N_TABLE_MASK];
89 table[hv & K2N_TABLE_MASK] = node;
90}
91
92#pragma mark -
93
1a7e3f61
A
94static my_per_task_info_t NOT_FOUND_TASK_INFO = {
95 .task = NULL,
96 .task_kobject = NULL,
97 .pid = -1,
98 .info = {0,0,0,0,0,0},
99 .table = NULL,
100 .tableCount = 0,
101 .tree = NULL,
102 .treeCount = 0,
103 .valid = FALSE,
cf37c299 104 .k2ntable = {0},
1a7e3f61 105 .processName = "Unknown",
ac27e6b4
A
106 .exceptionInfo = {0},
107 .threadInfos = NULL,
108 .threadCount = 0,
109 .threadExceptionInfos = NULL
1a7e3f61
A
110};
111
112char * get_task_name_by_pid(pid_t pid);
113
114static void proc_pid_to_name(int pid, char *pname){
115 if (0 == proc_name(pid, pname, PROC_NAME_LEN)) {
116 strcpy(pname, "Unknown Process");
117 }
118}
119
120static my_per_task_info_t *global_taskinfo = NULL;
121static uint32_t global_taskcount = 0;
122
123my_per_task_info_t * allocate_taskinfo_memory(uint32_t taskCount)
124{
125 my_per_task_info_t * retval = malloc(taskCount * sizeof(my_per_task_info_t));
126 if (retval) {
127 bzero((void *)retval, taskCount * sizeof(my_per_task_info_t));
128 }
129 global_taskcount = taskCount;
130 global_taskinfo = retval;
131 return retval;
132}
133
134void deallocate_taskinfo_memory(my_per_task_info_t *data){
135 if (data) {
136 free(data);
137 global_taskinfo = NULL;
138 global_taskcount = 0;
139 }
140}
141
142kern_return_t collect_per_task_info(my_per_task_info_t *taskinfo, task_t target_task)
143{
cf37c299 144 int i;
1a7e3f61
A
145 kern_return_t ret = KERN_SUCCESS;
146 unsigned int kotype = 0;
147 vm_offset_t kobject = (vm_offset_t)0;
cf37c299 148
1a7e3f61
A
149 taskinfo->task = target_task;
150 pid_for_task(target_task, &taskinfo->pid);
ac27e6b4
A
151
152 ret = task_get_exception_ports(taskinfo->task, EXC_MASK_ALL, taskinfo->exceptionInfo.masks, &taskinfo->exceptionInfo.count, taskinfo->exceptionInfo.ports, taskinfo->exceptionInfo.behaviors, taskinfo->exceptionInfo.flavors);
153
154 if (ret != KERN_SUCCESS) {
155 fprintf(stderr, "task_get_exception_ports() failed: pid:%d error: %s\n",taskinfo->pid, mach_error_string(ret));
156 taskinfo->pid = 0;
157 }
158
159 /* collect threads port as well */
160 taskinfo->threadCount = 0;
161 thread_act_array_t threadPorts;
162 ret = task_threads(taskinfo->task, &threadPorts, &taskinfo->threadCount);
163
164 if (ret != KERN_SUCCESS) {
165 fprintf(stderr, "task_threads() failed: pid:%d error: %s\n",taskinfo->pid, mach_error_string(ret));
166 taskinfo->threadCount = 0;
167 } else {
168 /* collect the thread information */
169 taskinfo->threadInfos = (struct my_per_thread_info *)malloc(sizeof(struct my_per_thread_info) * taskinfo->threadCount);
170 bzero(taskinfo->threadInfos, sizeof(struct my_per_thread_info) * taskinfo->threadCount);
171
172 /* now collect exception ports for each of those threads as well */
173 taskinfo->threadExceptionInfos = (struct exc_port_info *) malloc(sizeof(struct exc_port_info) * taskinfo->threadCount);
174 boolean_t found_exception = false;
175 for (int i = 0; i < taskinfo->threadCount; i++) {
176 unsigned th_kobject = 0;
177 unsigned th_kotype = 0;
178 ipc_voucher_t th_voucher = IPC_VOUCHER_NULL;
179 thread_identifier_info_data_t th_info;
180 mach_msg_type_number_t th_info_count = THREAD_IDENTIFIER_INFO_COUNT;
181 struct exc_port_info *excinfo = &(taskinfo->threadExceptionInfos[i]);
182
183 ret = thread_get_exception_ports(threadPorts[i], EXC_MASK_ALL, excinfo->masks, &excinfo->count, excinfo->ports, excinfo->behaviors, excinfo->flavors);
184 if (ret != KERN_SUCCESS){
185 fprintf(stderr, "thread_get_exception_ports() failed: pid: %d thread: %d error %s\n", taskinfo->pid, threadPorts[i], mach_error_string(ret));
186 }
187
188 if (excinfo->count != 0) {
189 found_exception = true;
190 }
191
192 taskinfo->threadInfos[i].thread = threadPorts[i];
193
194 if (KERN_SUCCESS == mach_port_kernel_object(mach_task_self(), threadPorts[i], &th_kotype, &th_kobject)) {
195 taskinfo->threadInfos[i].th_kobject = th_kobject;
196 if (KERN_SUCCESS == thread_info(threadPorts[i], THREAD_IDENTIFIER_INFO, (thread_info_t)&th_info, &th_info_count)) {
197 taskinfo->threadInfos[i].th_id = th_info.thread_id;
198 }
199 }
200
201 if (KERN_SUCCESS == thread_get_mach_voucher(threadPorts[i], 0, &th_voucher) && th_voucher != IPC_VOUCHER_NULL) {
887d5eed 202 char *detail = copy_voucher_detail(mach_task_self(), th_voucher, NULL);
ac27e6b4
A
203 taskinfo->threadInfos[i].voucher_detail = strndup(detail, VOUCHER_DETAIL_MAXLEN);
204 free(detail);
205
206 mach_port_deallocate(mach_task_self(), th_voucher);
207 }
208
209 mach_port_deallocate(mach_task_self(), threadPorts[i]);
210 threadPorts[i] = MACH_PORT_NULL;
211 }
212
213 if (found_exception == false) {
214 free(taskinfo->threadExceptionInfos);
215 taskinfo->threadExceptionInfos = NULL;
216 }
217
218 }
219
220 vm_deallocate(mach_task_self(), threadPorts, taskinfo->threadCount * sizeof(thread_act_t));
221 threadPorts = NULL;
cf37c299 222
ac27e6b4 223 ret = mach_port_space_info(target_task, &taskinfo->info, &taskinfo->table, &taskinfo->tableCount, &taskinfo->tree, &taskinfo->treeCount);
cf37c299 224
1a7e3f61
A
225 if (ret != KERN_SUCCESS) {
226 fprintf(stderr, "mach_port_space_info() failed: pid:%d error: %s\n",taskinfo->pid, mach_error_string(ret));
227 taskinfo->pid = 0;
228 return ret;
229 }
cf37c299
A
230
231 bzero(taskinfo->k2ntable, K2N_TABLE_SIZE * sizeof (struct k2n_table_node *));
232 for (i = 0; i < taskinfo->tableCount; i++) {
233 k2n_table_enter(taskinfo->k2ntable, taskinfo->table[i].iin_object, &taskinfo->table[i]);
234 }
235
1a7e3f61 236 proc_pid_to_name(taskinfo->pid, taskinfo->processName);
ac27e6b4 237
1a7e3f61 238 ret = mach_port_kernel_object(mach_task_self(), taskinfo->task, &kotype, (unsigned *)&kobject);
cf37c299 239
1a7e3f61
A
240 if (ret == KERN_SUCCESS && kotype == IKOT_TASK) {
241 taskinfo->task_kobject = kobject;
242 taskinfo->valid = TRUE;
243 }
cf37c299 244
1a7e3f61
A
245 return ret;
246}
247
1a7e3f61
A
248void get_exc_behavior_string(exception_behavior_t b, char *out_string, size_t len)
249{
250 out_string[0]='\0';
cf37c299 251
1a7e3f61 252 if (b & MACH_EXCEPTION_CODES)
530d02b6 253 strlcat(out_string, "MACH +", len);
1a7e3f61
A
254 switch (b & ~MACH_EXCEPTION_CODES) {
255 case EXCEPTION_DEFAULT:
530d02b6 256 strlcat(out_string, " DEFAULT", len);
1a7e3f61
A
257 break;
258 case EXCEPTION_STATE:
530d02b6 259 strlcat(out_string, " STATE", len);
1a7e3f61
A
260 break;
261 case EXCEPTION_STATE_IDENTITY:
530d02b6 262 strlcat(out_string, " IDENTITY", len);
1a7e3f61
A
263 break;
264 default:
530d02b6 265 strlcat(out_string, " UNKNOWN", len);
1a7e3f61
A
266 }
267}
268
269void get_exc_mask_string(exception_mask_t m, char *out_string, size_t len)
270{
271 out_string[0]='\0';
cf37c299 272
1a7e3f61 273 if (m & (1<<EXC_BAD_ACCESS))
530d02b6 274 strlcat(out_string, " BAD_ACCESS", len);
1a7e3f61 275 if (m & (1<<EXC_BAD_INSTRUCTION))
530d02b6 276 strlcat(out_string," BAD_INSTRUCTION", len);
1a7e3f61 277 if (m & (1<<EXC_ARITHMETIC))
530d02b6 278 strlcat(out_string," ARITHMETIC", len);
1a7e3f61 279 if (m & (1<<EXC_EMULATION))
530d02b6 280 strlcat(out_string," EMULATION", len);
1a7e3f61 281 if (m & (1<<EXC_SOFTWARE))
530d02b6 282 strlcat(out_string," SOFTWARE", len);
1a7e3f61 283 if (m & (1<<EXC_BREAKPOINT))
530d02b6 284 strlcat(out_string," BREAKPOINT", len);
1a7e3f61 285 if (m & (1<<EXC_SYSCALL))
530d02b6 286 strlcat(out_string," SYSCALL", len);
1a7e3f61 287 if (m & (1<<EXC_MACH_SYSCALL))
530d02b6 288 strlcat(out_string," MACH_SYSCALL", len);
1a7e3f61 289 if (m & (1<<EXC_RPC_ALERT))
530d02b6 290 strlcat(out_string," RPC_ALERT", len);
1a7e3f61 291 if (m & (1<<EXC_CRASH))
530d02b6 292 strlcat(out_string," CRASH", len);
1a7e3f61 293 if (m & (1<<EXC_RESOURCE))
530d02b6 294 strlcat(out_string," RESOURCE", len);
1a7e3f61 295 if (m & (1<<EXC_GUARD))
530d02b6 296 strlcat(out_string," GUARD", len);
1a7e3f61
A
297}
298
887d5eed 299kern_return_t print_task_exception_info(my_per_task_info_t *taskinfo, JSON_t json)
1a7e3f61 300{
ac27e6b4 301
1a7e3f61
A
302 char behavior_string[30];
303 char mask_string[200];
ac27e6b4 304
887d5eed
A
305 JSON_KEY(json, exception_ports);
306 JSON_ARRAY_BEGIN(json);
307
1a7e3f61 308 boolean_t header_required = TRUE;
ac27e6b4
A
309 for (int i = 0; i < taskinfo->exceptionInfo.count; i++) {
310 if (taskinfo->exceptionInfo.ports[i] != MACH_PORT_NULL) {
1a7e3f61 311 if (header_required) {
ac27e6b4
A
312
313 printf(" exc_port flavor <behaviors> mask \n");
1a7e3f61
A
314 header_required = FALSE;
315 }
ac27e6b4 316 get_exc_behavior_string(taskinfo->exceptionInfo.behaviors[i], behavior_string, sizeof(behavior_string));
530d02b6 317 get_exc_mask_string(taskinfo->exceptionInfo.masks[i], mask_string, sizeof(mask_string));
887d5eed
A
318
319 JSON_OBJECT_BEGIN(json);
320 JSON_OBJECT_SET(json, port, "0x%08x", taskinfo->exceptionInfo.ports[i]);
321 JSON_OBJECT_SET(json, flavor, "0x%03x", taskinfo->exceptionInfo.flavors[i]);
322 JSON_OBJECT_SET(json, behavior, "%s", behavior_string);
323 JSON_OBJECT_SET(json, mask, "%s", mask_string);
324 JSON_OBJECT_END(json); // exception port
325
ac27e6b4 326 printf(" 0x%08x 0x%03x <%s> %s \n" , taskinfo->exceptionInfo.ports[i], taskinfo->exceptionInfo.flavors[i], behavior_string, mask_string);
1a7e3f61 327 }
cf37c299 328
1a7e3f61 329 }
cf37c299 330
887d5eed
A
331 JSON_ARRAY_END(json); // exception ports
332
ac27e6b4 333 return KERN_SUCCESS;
1a7e3f61
A
334}
335
336
887d5eed 337kern_return_t print_task_threads_special_ports(my_per_task_info_t *taskinfo, JSON_t json)
1a7e3f61
A
338{
339 kern_return_t kret = KERN_SUCCESS;
ac27e6b4 340 mach_msg_type_number_t threadcount = taskinfo->threadCount;
1a7e3f61
A
341 boolean_t header_required = TRUE;
342 boolean_t newline_required = TRUE;
ac27e6b4 343 struct my_per_thread_info * info = NULL;
cf37c299 344
887d5eed
A
345 JSON_KEY(json, threads);
346 JSON_ARRAY_BEGIN(json);
347
1a7e3f61 348 for (int i = 0; i < threadcount; i++) {
887d5eed
A
349 JSON_OBJECT_BEGIN(json);
350
ac27e6b4 351 info = &taskinfo->threadInfos[i];
1a7e3f61 352 if (header_required) {
ac27e6b4 353 printf("Thread_KObject Thread-ID Port Description.");
1a7e3f61
A
354 header_required = FALSE;
355 }
cf37c299 356
1a7e3f61
A
357 if (newline_required) {
358 printf("\n");
359 }
360 newline_required = TRUE;
cf37c299 361
ac27e6b4 362 if (info->th_kobject != 0) {
1a7e3f61 363 /* TODO: Should print tid and stuff */
ac27e6b4
A
364 printf("0x%08x ", info->th_kobject);
365 printf("0x%llx ", info->th_id);
887d5eed
A
366
367 JSON_OBJECT_SET(json, kobject, "0x%08x", info->th_kobject);
368 JSON_OBJECT_SET(json, tid, "0x%llx", info->th_id);
1a7e3f61
A
369 }
370
ac27e6b4 371 if (info->voucher_detail != NULL) {
887d5eed 372 /* TODO: include voucher detail in JSON */
ac27e6b4
A
373 printf("%s\n", info->voucher_detail);
374 }
375
887d5eed
A
376 JSON_KEY(json, exception_ports);
377 JSON_ARRAY_BEGIN(json);
378
ac27e6b4
A
379 /* print the thread exception ports also */
380 if (taskinfo->threadExceptionInfos != NULL)
381 {
382
383 struct exc_port_info *excinfo = &taskinfo->threadExceptionInfos[i];
384 char behavior_string[30];
385 char mask_string[200];
386
387 if (excinfo->count > 0) {
388 boolean_t header_required = TRUE;
389 for (int i = 0; i < excinfo->count; i++) {
887d5eed
A
390 JSON_OBJECT_BEGIN(json);
391
ac27e6b4
A
392 if (excinfo->ports[i] != MACH_PORT_NULL) {
393 if (header_required) {
394 printf("\n exc_port flavor <behaviors> mask -> name owner\n");
395 header_required = FALSE;
396 }
397 get_exc_behavior_string(excinfo->behaviors[i], behavior_string, sizeof(behavior_string));
398 get_exc_mask_string(excinfo->masks[i], mask_string, sizeof(mask_string));
887d5eed
A
399
400 JSON_OBJECT_SET(json, port, "0x%08x", excinfo->ports[i]);
401 JSON_OBJECT_SET(json, flavor, "0x%03x", excinfo->flavors[i]);
402 JSON_OBJECT_SET(json, behavior, "%s", behavior_string);
403 JSON_OBJECT_SET(json, mask, "%s", mask_string);
404
ac27e6b4
A
405 printf(" 0x%08x 0x%03x <%s> %s " , excinfo->ports[i], excinfo->flavors[i], behavior_string, mask_string);
406
407 ipc_info_name_t actual_sendinfo;
408 if (KERN_SUCCESS == get_ipc_info_from_lsmp_spaceinfo(excinfo->ports[i], &actual_sendinfo)) {
409 my_per_task_info_t *recv_holder_taskinfo;
410 mach_port_name_t recv_name = MACH_PORT_NULL;
411 if (KERN_SUCCESS == get_taskinfo_of_receiver_by_send_right(&actual_sendinfo, &recv_holder_taskinfo, &recv_name)) {
887d5eed
A
412
413 JSON_OBJECT_SET(json, name, "0x%08x", recv_name);
414 JSON_OBJECT_SET(json, ipc-object, "0x%08x", actual_sendinfo.iin_object);
415 JSON_OBJECT_SET(json, pid, %d, recv_holder_taskinfo->pid);
416 JSON_OBJECT_SET(json, process, "%s", recv_holder_taskinfo->processName);
417
ac27e6b4
A
418 printf(" -> 0x%08x 0x%08x (%d) %s\n",
419 recv_name,
420 actual_sendinfo.iin_object,
421 recv_holder_taskinfo->pid,
422 recv_holder_taskinfo->processName);
423 }
424
425 } else {
426 fprintf(stderr, "failed to find");
427 }
428
429 printf("\n");
430
431 }
887d5eed 432 JSON_OBJECT_END(json); // exception port
ac27e6b4
A
433 }
434 }
1a7e3f61 435 }
887d5eed
A
436 JSON_ARRAY_END(json); // exception ports
437 JSON_OBJECT_END(json); // thread
1a7e3f61 438 }
887d5eed
A
439
440 JSON_ARRAY_END(json); // threads
9726c137 441 printf("\n");
1a7e3f61
A
442 return kret;
443}
444
445char * get_task_name_by_pid(pid_t pid) {
446 char * retval = "Unknown";
447 for (int i = 0; i < global_taskcount; i++) {
448 if (pid == global_taskinfo[i].pid) {
449 return global_taskinfo[i].processName;
450 }
451 }
452 return retval;
453}
454
455my_per_task_info_t * get_taskinfo_by_kobject(natural_t kobj) {
456 my_per_task_info_t *retval = &NOT_FOUND_TASK_INFO;
457 for (int j = 0; j < global_taskcount; j++) {
458 if (global_taskinfo[j].task_kobject == kobj) {
459 retval = &global_taskinfo[j];
460 break;
461 }
462 }
463 return retval;
464}
465
466kern_return_t get_taskinfo_of_receiver_by_send_right(ipc_info_name_t *sendright, my_per_task_info_t **out_taskinfo, mach_port_name_t *out_recv_info)
467{
1a7e3f61 468 *out_taskinfo = &NOT_FOUND_TASK_INFO;
cf37c299
A
469 struct k2n_table_node *k2nnode;
470
471 for (int j = 0; j < global_taskcount; j++) {
472 if ((k2nnode = k2n_table_lookup(global_taskinfo[j].k2ntable, sendright->iin_object))) {
473 assert(k2nnode->info_name->iin_object == sendright->iin_object);
474
475 if (k2nnode->info_name->iin_type & MACH_PORT_TYPE_RECEIVE) {
1a7e3f61 476 *out_taskinfo = &global_taskinfo[j];
cf37c299
A
477 *out_recv_info = k2nnode->info_name->iin_name;
478 return KERN_SUCCESS;
1a7e3f61
A
479 }
480 }
481 }
cf37c299
A
482
483 return KERN_FAILURE;
1a7e3f61
A
484}
485
ac27e6b4
A
486kern_return_t get_ipc_info_from_lsmp_spaceinfo(mach_port_t port_name, ipc_info_name_t *out_sendright){
487 kern_return_t retval = KERN_FAILURE;
488 bzero(out_sendright, sizeof(ipc_info_name_t));
489 my_per_task_info_t *mytaskinfo = NULL;
490 for (int i = global_taskcount - 1; i >= 0; i--){
491 if (global_taskinfo[i].task == mach_task_self()){
492 mytaskinfo = &global_taskinfo[i];
493 break;
494 }
495 }
496 if (mytaskinfo) {
497 for (int k = 0; k < mytaskinfo->tableCount; k++) {
498 if (port_name == mytaskinfo->table[k].iin_name){
499 bcopy(&mytaskinfo->table[k], out_sendright, sizeof(ipc_info_name_t));
500 retval = KERN_SUCCESS;
501 break;
502 }
503 }
504 }
505 return retval;
506
507}