#include <sys/types.h>
#include <sys/time.h>
#include <sys/ucred.h>
#define _KERNEL
#include <sys/mount.h>
#undef _KERNEL
#include <sys/lock.h>
#include <sys/vnode.h>
#include <sys/sysctl.h>
#include <sys/specdev.h>
#include <crypto/siphash.h>
#include <isofs/udf/ecma167-udf.h>
#include <isofs/udf/udf.h>
#include <stdint.h>
#include <limits.h>
#include <kvm.h>
#include <db.h>
#include "kvm_private.h"
#include "kvm_file.h"
static mode_t
udf_permtomode(struct unode *up)
{
uint32_t perm;
uint16_t flags;
mode_t mode;
perm = letoh32(up->u_fentry->perm);
flags = letoh16(up->u_fentry->icbtag.flags);
mode = perm & UDF_FENTRY_PERM_USER_MASK;
mode |= ((perm & UDF_FENTRY_PERM_GRP_MASK) >> 2);
mode |= ((perm & UDF_FENTRY_PERM_OWNER_MASK) >> 4);
mode |= ((flags & UDF_ICB_TAG_FLAGS_STICKY) << 4);
mode |= ((flags & UDF_ICB_TAG_FLAGS_SETGID) << 6);
mode |= ((flags & UDF_ICB_TAG_FLAGS_SETUID) << 8);
return (mode);
}
int
_kvm_stat_udf(kvm_t *kd, struct kinfo_file *kf, struct vnode *vp)
{
struct unode up;
struct file_entry fentry;
struct umount um;
if (KREAD(kd, (u_long)VTOU(vp), &up)) {
_kvm_err(kd, kd->program, "can't read unode at %p", VTOU(vp));
return (-1);
}
if (KREAD(kd, (u_long)up.u_fentry, &fentry)) {
_kvm_err(kd, kd->program, "can't read file_entry at %p",
up.u_fentry);
return (-1);
}
if (KREAD(kd, (u_long)up.u_ump, &um)) {
_kvm_err(kd, kd->program, "can't read umount at %p",
up.u_ump);
return (-1);
}
kf->va_fsid = up.u_dev;
kf->va_fileid = (long)up.u_ino;
kf->va_mode = udf_permtomode(&up);
kf->va_rdev = 0;
kf->va_nlink = letoh16(fentry.link_cnt);
if (vp->v_type & VDIR) {
if (fentry.logblks_rec != 0) {
kf->va_size =
letoh64(fentry.logblks_rec) * um.um_bsize;
} else {
kf->va_size = um.um_bsize;
}
} else {
kf->va_size = letoh64(fentry.inf_len);
}
return (0);
}