xref: /openbsd-src/lib/libkvm/kvm_proc.c (revision 6e552b66ad445dd5f584d3d1fd670496babbfc39)
1*6e552b66Sasou /*	$OpenBSD: kvm_proc.c,v 1.64 2024/05/10 06:46:14 asou Exp $	*/
23c8d4125Sart /*	$NetBSD: kvm_proc.c,v 1.30 1999/03/24 05:50:50 mrg Exp $	*/
33c8d4125Sart /*-
43c8d4125Sart  * Copyright (c) 1998 The NetBSD Foundation, Inc.
53c8d4125Sart  * All rights reserved.
63c8d4125Sart  *
73c8d4125Sart  * This code is derived from software contributed to The NetBSD Foundation
83c8d4125Sart  * by Charles M. Hannum.
93c8d4125Sart  *
103c8d4125Sart  * Redistribution and use in source and binary forms, with or without
113c8d4125Sart  * modification, are permitted provided that the following conditions
123c8d4125Sart  * are met:
133c8d4125Sart  * 1. Redistributions of source code must retain the above copyright
143c8d4125Sart  *    notice, this list of conditions and the following disclaimer.
153c8d4125Sart  * 2. Redistributions in binary form must reproduce the above copyright
163c8d4125Sart  *    notice, this list of conditions and the following disclaimer in the
173c8d4125Sart  *    documentation and/or other materials provided with the distribution.
183c8d4125Sart  *
193c8d4125Sart  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
203c8d4125Sart  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
213c8d4125Sart  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
223c8d4125Sart  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
233c8d4125Sart  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
243c8d4125Sart  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
253c8d4125Sart  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
263c8d4125Sart  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
273c8d4125Sart  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
283c8d4125Sart  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
293c8d4125Sart  * POSSIBILITY OF SUCH DAMAGE.
303c8d4125Sart  */
31df930be7Sderaadt /*-
32df930be7Sderaadt  * Copyright (c) 1994, 1995 Charles M. Hannum.  All rights reserved.
33df930be7Sderaadt  * Copyright (c) 1989, 1992, 1993
34df930be7Sderaadt  *	The Regents of the University of California.  All rights reserved.
35df930be7Sderaadt  *
36df930be7Sderaadt  * This code is derived from software developed by the Computer Systems
37df930be7Sderaadt  * Engineering group at Lawrence Berkeley Laboratory under DARPA contract
38df930be7Sderaadt  * BG 91-66 and contributed to Berkeley.
39df930be7Sderaadt  *
40df930be7Sderaadt  * Redistribution and use in source and binary forms, with or without
41df930be7Sderaadt  * modification, are permitted provided that the following conditions
42df930be7Sderaadt  * are met:
43df930be7Sderaadt  * 1. Redistributions of source code must retain the above copyright
44df930be7Sderaadt  *    notice, this list of conditions and the following disclaimer.
45df930be7Sderaadt  * 2. Redistributions in binary form must reproduce the above copyright
46df930be7Sderaadt  *    notice, this list of conditions and the following disclaimer in the
47df930be7Sderaadt  *    documentation and/or other materials provided with the distribution.
486580fee3Smillert  * 3. Neither the name of the University nor the names of its contributors
49df930be7Sderaadt  *    may be used to endorse or promote products derived from this software
50df930be7Sderaadt  *    without specific prior written permission.
51df930be7Sderaadt  *
52df930be7Sderaadt  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
53df930be7Sderaadt  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
54df930be7Sderaadt  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
55df930be7Sderaadt  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
56df930be7Sderaadt  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
57df930be7Sderaadt  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
58df930be7Sderaadt  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
59df930be7Sderaadt  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
60df930be7Sderaadt  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
61df930be7Sderaadt  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
62df930be7Sderaadt  * SUCH DAMAGE.
63df930be7Sderaadt  */
64df930be7Sderaadt 
65df930be7Sderaadt /*
66df930be7Sderaadt  * Proc traversal interface for kvm.  ps and w are (probably) the exclusive
67df930be7Sderaadt  * users of this code, so we've factored it out into a separate module.
68df930be7Sderaadt  * Thus, we keep this grunge out of the other kvm applications (i.e.,
69df930be7Sderaadt  * most other applications are interested only in open/close/read/nlist).
70df930be7Sderaadt  */
71df930be7Sderaadt 
72644b4788Sguenther #define __need_process
734ec73a12Sderaadt #include <sys/param.h>	/* VM_MIN_ADDRESS PAGE_SIZE */
740b082c0eSderaadt #include <sys/types.h>
750b082c0eSderaadt #include <sys/signal.h>
76df930be7Sderaadt #include <sys/proc.h>
77df930be7Sderaadt #include <sys/exec.h>
78df930be7Sderaadt #include <sys/stat.h>
79df930be7Sderaadt #include <sys/ioctl.h>
80df930be7Sderaadt #include <sys/tty.h>
8159133b9fSzhuk #include <stddef.h>
82df930be7Sderaadt #include <stdlib.h>
83df930be7Sderaadt #include <string.h>
84df930be7Sderaadt #include <unistd.h>
85df930be7Sderaadt #include <nlist.h>
86df930be7Sderaadt #include <kvm.h>
8701002944Sderaadt #include <errno.h>
88df930be7Sderaadt 
893c8d4125Sart #include <uvm/uvm_extern.h>
903c8d4125Sart #include <uvm/uvm_amap.h>
918ddd2e29Sart #include <machine/vmparam.h>
92992921d7Shugh #include <machine/pmap.h>
93df930be7Sderaadt 
94df930be7Sderaadt #include <sys/sysctl.h>
95df930be7Sderaadt 
96df930be7Sderaadt #include <limits.h>
97df930be7Sderaadt #include <db.h>
98df930be7Sderaadt #include <paths.h>
99df930be7Sderaadt 
100df930be7Sderaadt #include "kvm_private.h"
101df930be7Sderaadt 
1020b082c0eSderaadt #define MINIMUM(a, b)	(((a) < (b)) ? (a) : (b))
1030b082c0eSderaadt #define MAXIMUM(a, b)	(((a) > (b)) ? (a) : (b))
1043c298e91Smillert 
105dc06f3f4Sguenther static char	*_kvm_ureadm(kvm_t *, const struct kinfo_proc *, u_long, u_long *);
106dc06f3f4Sguenther static ssize_t	kvm_ureadm(kvm_t *, const struct kinfo_proc *, u_long, char *, size_t);
1073c298e91Smillert 
10859133b9fSzhuk static char	**kvm_argv(kvm_t *, const struct kinfo_proc *, u_long, int, int, int);
1093c298e91Smillert 
11059133b9fSzhuk static char	**kvm_doargv(kvm_t *, const struct kinfo_proc *, int, int,
111f3c3a9c6Smillert 		    void (*)(struct ps_strings *, u_long *, int *));
112dc06f3f4Sguenther static int	proc_verify(kvm_t *, const struct kinfo_proc *);
113c72b5b24Smillert static void	ps_str_a(struct ps_strings *, u_long *, int *);
114c72b5b24Smillert static void	ps_str_e(struct ps_strings *, u_long *, int *);
115df930be7Sderaadt 
1161dd3716cSstefan static struct vm_anon *
_kvm_findanon(kvm_t * kd,struct vm_amap * amapp,int slot)1171dd3716cSstefan _kvm_findanon(kvm_t *kd, struct vm_amap *amapp, int slot)
1181dd3716cSstefan {
1191dd3716cSstefan 	u_long addr;
1201dd3716cSstefan 	int bucket;
1211dd3716cSstefan 	struct vm_amap amap;
1221dd3716cSstefan 	struct vm_amap_chunk chunk, *chunkp;
1231dd3716cSstefan 	struct vm_anon *anonp;
1241dd3716cSstefan 
1251dd3716cSstefan 	addr = (u_long)amapp;
1261dd3716cSstefan 	if (KREAD(kd, addr, &amap))
1271dd3716cSstefan 		return (NULL);
1281dd3716cSstefan 
1291dd3716cSstefan 	/* sanity-check slot number */
1301dd3716cSstefan 	if (slot > amap.am_nslot)
1311dd3716cSstefan 		return (NULL);
1321dd3716cSstefan 
1331dd3716cSstefan 	if (UVM_AMAP_SMALL(&amap))
1341dd3716cSstefan 		chunkp = &amapp->am_small;
1351dd3716cSstefan 	else {
1361dd3716cSstefan 		bucket = UVM_AMAP_BUCKET(&amap, slot);
1371dd3716cSstefan 		addr = (u_long)(amap.am_buckets + bucket);
1381dd3716cSstefan 		if (KREAD(kd, addr, &chunkp))
1391dd3716cSstefan 			return (NULL);
1401dd3716cSstefan 
1411dd3716cSstefan 		while (chunkp != NULL) {
1421dd3716cSstefan 			addr = (u_long)chunkp;
1431dd3716cSstefan 			if (KREAD(kd, addr, &chunk))
1441dd3716cSstefan 				return (NULL);
1451dd3716cSstefan 
1461dd3716cSstefan 			if (UVM_AMAP_BUCKET(&amap, chunk.ac_baseslot) !=
1471dd3716cSstefan 			    bucket)
1481dd3716cSstefan 				return (NULL);
1491dd3716cSstefan 			if (slot >= chunk.ac_baseslot &&
1501dd3716cSstefan 			    slot < chunk.ac_baseslot + chunk.ac_nslot)
1511dd3716cSstefan 				break;
1521dd3716cSstefan 
1531dd3716cSstefan 			chunkp = TAILQ_NEXT(&chunk, ac_list);
1541dd3716cSstefan 		}
1551dd3716cSstefan 		if (chunkp == NULL)
1561dd3716cSstefan 			return (NULL);
1571dd3716cSstefan 	}
1581dd3716cSstefan 
1591dd3716cSstefan 	addr = (u_long)&chunkp->ac_anon[UVM_AMAP_SLOTIDX(slot)];
1601dd3716cSstefan 	if (KREAD(kd, addr, &anonp))
1611dd3716cSstefan 		return (NULL);
1621dd3716cSstefan 
1631dd3716cSstefan 	return (anonp);
1641dd3716cSstefan }
1651dd3716cSstefan 
1663c298e91Smillert static char *
_kvm_ureadm(kvm_t * kd,const struct kinfo_proc * p,u_long va,u_long * cnt)167dc06f3f4Sguenther _kvm_ureadm(kvm_t *kd, const struct kinfo_proc *p, u_long va, u_long *cnt)
168df930be7Sderaadt {
169aecbb8abSariane 	u_long addr, offset, slot;
170146016d8Sguenther 	struct vmspace vm;
171551fad64Sderaadt 	struct vm_anon *anonp, anon;
172df930be7Sderaadt 	struct vm_map_entry vme;
1733c8d4125Sart 	struct vm_page pg;
174815ff53bSdlg 	unsigned long rboff;
175df930be7Sderaadt 
176df930be7Sderaadt 	if (kd->swapspc == 0) {
1779db2f38bSderaadt 		kd->swapspc = _kvm_malloc(kd, kd->nbpg);
178df930be7Sderaadt 		if (kd->swapspc == 0)
179aecbb8abSariane 			return (NULL);
180df930be7Sderaadt 	}
181df930be7Sderaadt 
182815ff53bSdlg 	rboff = (unsigned long)&vme.daddrs.addr_entry - (unsigned long)&vme;
183815ff53bSdlg 
184df930be7Sderaadt 	/*
185df930be7Sderaadt 	 * Look through the address map for the memory object
186df930be7Sderaadt 	 * that corresponds to the given virtual address.
187df930be7Sderaadt 	 */
188146016d8Sguenther 	if (KREAD(kd, (u_long)p->p_vmspace, &vm))
189146016d8Sguenther 		return (NULL);
190*6e552b66Sasou 	addr = (u_long)vm.vm_map.addr.rbh_root.rbt_root;
191df930be7Sderaadt 	while (1) {
192aecbb8abSariane 		if (addr == 0)
193aecbb8abSariane 			return (NULL);
194815ff53bSdlg 		addr -= rboff;
195df930be7Sderaadt 		if (KREAD(kd, addr, &vme))
196aecbb8abSariane 			return (NULL);
197df930be7Sderaadt 
198aecbb8abSariane 		if (va < vme.start)
199815ff53bSdlg 			addr = (u_long)vme.daddrs.addr_entry.rbt_left;
200aecbb8abSariane 		else if (va >= vme.end + vme.guard + vme.fspace)
201815ff53bSdlg 			addr = (u_long)vme.daddrs.addr_entry.rbt_right;
202aecbb8abSariane 		else if (va >= vme.end)
203aecbb8abSariane 			return (NULL);
204aecbb8abSariane 		else
2053c8d4125Sart 			break;
206df930be7Sderaadt 	}
207df930be7Sderaadt 
2083c8d4125Sart 	/*
2093c8d4125Sart 	 * we found the map entry, now to find the object...
2103c8d4125Sart 	 */
2113c8d4125Sart 	if (vme.aref.ar_amap == NULL)
212551fad64Sderaadt 		return (NULL);
2133c8d4125Sart 
2143c8d4125Sart 	offset = va - vme.start;
2153c8d4125Sart 	slot = offset / kd->nbpg + vme.aref.ar_pageoff;
2163c8d4125Sart 
2171dd3716cSstefan 	anonp = _kvm_findanon(kd, vme.aref.ar_amap, slot);
2181dd3716cSstefan 	if (anonp == NULL)
219551fad64Sderaadt 		return (NULL);
2203c8d4125Sart 
2213c8d4125Sart 	addr = (u_long)anonp;
2223c8d4125Sart 	if (KREAD(kd, addr, &anon))
223551fad64Sderaadt 		return (NULL);
2243c8d4125Sart 
2258d0b5bafSpedro 	addr = (u_long)anon.an_page;
2263c8d4125Sart 	if (addr) {
2273c8d4125Sart 		if (KREAD(kd, addr, &pg))
228551fad64Sderaadt 			return (NULL);
2293c8d4125Sart 
230551fad64Sderaadt 		if (_kvm_pread(kd, kd->pmfd, (void *)kd->swapspc,
231*6e552b66Sasou 		    (size_t)kd->nbpg, _kvm_pa2off(kd, pg.phys_addr)) != kd->nbpg)
232551fad64Sderaadt 			return (NULL);
2333c8d4125Sart 	} else {
234cbe3564fSmiod 		if (kd->swfd == -1 ||
235cbe3564fSmiod 		    _kvm_pread(kd, kd->swfd, (void *)kd->swapspc,
236551fad64Sderaadt 		    (size_t)kd->nbpg,
237551fad64Sderaadt 		    (off_t)(anon.an_swslot * kd->nbpg)) != kd->nbpg)
238551fad64Sderaadt 			return (NULL);
2393c8d4125Sart 	}
2403c8d4125Sart 
241df930be7Sderaadt 	/* Found the page. */
242df930be7Sderaadt 	offset %= kd->nbpg;
243df930be7Sderaadt 	*cnt = kd->nbpg - offset;
244df930be7Sderaadt 	return (&kd->swapspc[offset]);
245df930be7Sderaadt }
246df930be7Sderaadt 
247df930be7Sderaadt void *
_kvm_reallocarray(kvm_t * kd,void * p,size_t i,size_t n)248f4ccacb3Sderaadt _kvm_reallocarray(kvm_t *kd, void *p, size_t i, size_t n)
249df930be7Sderaadt {
250f4ccacb3Sderaadt 	void *np = reallocarray(p, i, n);
251df930be7Sderaadt 
252df930be7Sderaadt 	if (np == 0)
253df930be7Sderaadt 		_kvm_err(kd, kd->program, "out of memory");
254df930be7Sderaadt 	return (np);
255df930be7Sderaadt }
256df930be7Sderaadt 
257df930be7Sderaadt /*
258df930be7Sderaadt  * Read in an argument vector from the user address space of process p.
259df930be7Sderaadt  * addr if the user-space base address of narg null-terminated contiguous
260df930be7Sderaadt  * strings.  This is used to read in both the command arguments and
261df930be7Sderaadt  * environment strings.  Read at most maxcnt characters of strings.
262df930be7Sderaadt  */
263df930be7Sderaadt static char **
kvm_argv(kvm_t * kd,const struct kinfo_proc * p,u_long addr,int narg,int maxcnt,int isenv)264dc06f3f4Sguenther kvm_argv(kvm_t *kd, const struct kinfo_proc *p, u_long addr, int narg,
26559133b9fSzhuk     int maxcnt, int isenv)
266df930be7Sderaadt {
26759133b9fSzhuk 	char *np, *cp, *ep, *ap, **argv, ***pargv, **pargspc, **pargbuf;
2683c8d4125Sart 	u_long oaddr = -1;
26959133b9fSzhuk 	int len, cc, *parglen, *pargc;
27059133b9fSzhuk 	size_t argc;
271df930be7Sderaadt 
272df930be7Sderaadt 	/*
27309431e5cSguenther 	 * Check that there aren't an unreasonable number of arguments,
274df930be7Sderaadt 	 * and that the address is in user space.
275df930be7Sderaadt 	 */
276df930be7Sderaadt 	if (narg > ARG_MAX || addr < VM_MIN_ADDRESS || addr >= VM_MAXUSER_ADDRESS)
277df930be7Sderaadt 		return (0);
278df930be7Sderaadt 
27959133b9fSzhuk 	if (isenv) {
28059133b9fSzhuk 		pargspc = &kd->envspc;
28159133b9fSzhuk 		pargbuf = &kd->envbuf;
28259133b9fSzhuk 		parglen = &kd->envlen;
28359133b9fSzhuk 		pargv = &kd->envp;
28459133b9fSzhuk 		pargc = &kd->envc;
28559133b9fSzhuk 	} else {
28659133b9fSzhuk 		pargspc = &kd->argspc;
28759133b9fSzhuk 		pargbuf = &kd->argbuf;
28859133b9fSzhuk 		parglen = &kd->arglen;
28959133b9fSzhuk 		pargv = &kd->argv;
29059133b9fSzhuk 		pargc = &kd->argc;
291df930be7Sderaadt 	}
29259133b9fSzhuk 
29359133b9fSzhuk 	if (*pargv == 0)
2940b082c0eSderaadt 		argc = MAXIMUM(narg + 1, 32);
29559133b9fSzhuk 	else if (narg + 1 > *pargc)
2960b082c0eSderaadt 		argc = MAXIMUM(2 * (*pargc), narg + 1);
29759133b9fSzhuk 	else
29859133b9fSzhuk 		goto argv_allocated;
29959133b9fSzhuk 	argv = _kvm_reallocarray(kd, *pargv, argc, sizeof(**pargv));
30059133b9fSzhuk 	if (argv == 0)
301df930be7Sderaadt 		return (0);
30259133b9fSzhuk 	*pargv = argv;
30359133b9fSzhuk 	*pargc = argc;
30459133b9fSzhuk 
30559133b9fSzhuk argv_allocated:
30659133b9fSzhuk 	if (*pargspc == 0) {
30759133b9fSzhuk 		*pargspc = _kvm_malloc(kd, kd->nbpg);
30859133b9fSzhuk 		if (*pargspc == 0)
30959133b9fSzhuk 			return (0);
31059133b9fSzhuk 		*parglen = kd->nbpg;
311df930be7Sderaadt 	}
31259133b9fSzhuk 	if (*pargbuf == 0) {
31359133b9fSzhuk 		*pargbuf = _kvm_malloc(kd, kd->nbpg);
31459133b9fSzhuk 		if (*pargbuf == 0)
315df930be7Sderaadt 			return (0);
316df930be7Sderaadt 	}
317df930be7Sderaadt 	cc = sizeof(char *) * narg;
31859133b9fSzhuk 	if (kvm_ureadm(kd, p, addr, (char *)*pargv, cc) != cc)
319df930be7Sderaadt 		return (0);
32059133b9fSzhuk 	ap = np = *pargspc;
32159133b9fSzhuk 	argv = *pargv;
322df930be7Sderaadt 	len = 0;
323551fad64Sderaadt 
324df930be7Sderaadt 	/*
325df930be7Sderaadt 	 * Loop over pages, filling in the argument vector.
326df930be7Sderaadt 	 */
32759133b9fSzhuk 	while (argv < *pargv + narg && *argv != 0) {
328df930be7Sderaadt 		addr = (u_long)*argv & ~(kd->nbpg - 1);
329df930be7Sderaadt 		if (addr != oaddr) {
33059133b9fSzhuk 			if (kvm_ureadm(kd, p, addr, *pargbuf, kd->nbpg) !=
331df930be7Sderaadt 			    kd->nbpg)
332df930be7Sderaadt 				return (0);
333df930be7Sderaadt 			oaddr = addr;
334df930be7Sderaadt 		}
335df930be7Sderaadt 		addr = (u_long)*argv & (kd->nbpg - 1);
33659133b9fSzhuk 		cp = *pargbuf + addr;
337df930be7Sderaadt 		cc = kd->nbpg - addr;
338df930be7Sderaadt 		if (maxcnt > 0 && cc > maxcnt - len)
3397b425235Smillert 			cc = maxcnt - len;
340df930be7Sderaadt 		ep = memchr(cp, '\0', cc);
341df930be7Sderaadt 		if (ep != 0)
342df930be7Sderaadt 			cc = ep - cp + 1;
34359133b9fSzhuk 		if (len + cc > *parglen) {
34459133b9fSzhuk 			ptrdiff_t off;
3453c8d4125Sart 			char **pp;
34659133b9fSzhuk 			char *op = *pargspc;
34749c41439Sguenther 			char *newp;
348df930be7Sderaadt 
34959133b9fSzhuk 			newp = _kvm_reallocarray(kd, *pargspc,
35059133b9fSzhuk 			    *parglen, 2);
35149c41439Sguenther 			if (newp == 0)
352df930be7Sderaadt 				return (0);
35359133b9fSzhuk 			*pargspc = newp;
35459133b9fSzhuk 			*parglen *= 2;
355df930be7Sderaadt 			/*
356df930be7Sderaadt 			 * Adjust argv pointers in case realloc moved
357df930be7Sderaadt 			 * the string space.
358df930be7Sderaadt 			 */
35959133b9fSzhuk 			off = *pargspc - op;
36059133b9fSzhuk 			for (pp = *pargv; pp < argv; pp++)
361df930be7Sderaadt 				*pp += off;
362df930be7Sderaadt 			ap += off;
363df930be7Sderaadt 			np += off;
364df930be7Sderaadt 		}
365df930be7Sderaadt 		memcpy(np, cp, cc);
366df930be7Sderaadt 		np += cc;
367df930be7Sderaadt 		len += cc;
368df930be7Sderaadt 		if (ep != 0) {
369df930be7Sderaadt 			*argv++ = ap;
370df930be7Sderaadt 			ap = np;
371df930be7Sderaadt 		} else
372df930be7Sderaadt 			*argv += cc;
373df930be7Sderaadt 		if (maxcnt > 0 && len >= maxcnt) {
374df930be7Sderaadt 			/*
375df930be7Sderaadt 			 * We're stopping prematurely.  Terminate the
376df930be7Sderaadt 			 * current string.
377df930be7Sderaadt 			 */
378df930be7Sderaadt 			if (ep == 0) {
379df930be7Sderaadt 				*np = '\0';
380df930be7Sderaadt 				*argv++ = ap;
381df930be7Sderaadt 			}
382df930be7Sderaadt 			break;
383df930be7Sderaadt 		}
384df930be7Sderaadt 	}
385df930be7Sderaadt 	/* Make sure argv is terminated. */
386df930be7Sderaadt 	*argv = 0;
38759133b9fSzhuk 	return (*pargv);
388df930be7Sderaadt }
389df930be7Sderaadt 
390df930be7Sderaadt static void
ps_str_a(struct ps_strings * p,u_long * addr,int * n)391551fad64Sderaadt ps_str_a(struct ps_strings *p, u_long *addr, int *n)
392df930be7Sderaadt {
393df930be7Sderaadt 	*addr = (u_long)p->ps_argvstr;
394df930be7Sderaadt 	*n = p->ps_nargvstr;
395df930be7Sderaadt }
396df930be7Sderaadt 
397df930be7Sderaadt static void
ps_str_e(struct ps_strings * p,u_long * addr,int * n)398551fad64Sderaadt ps_str_e(struct ps_strings *p, u_long *addr, int *n)
399df930be7Sderaadt {
400df930be7Sderaadt 	*addr = (u_long)p->ps_envstr;
401df930be7Sderaadt 	*n = p->ps_nenvstr;
402df930be7Sderaadt }
403df930be7Sderaadt 
404df930be7Sderaadt /*
405df930be7Sderaadt  * Determine if the proc indicated by p is still active.
406df930be7Sderaadt  * This test is not 100% foolproof in theory, but chances of
407df930be7Sderaadt  * being wrong are very low.
408df930be7Sderaadt  */
409df930be7Sderaadt static int
proc_verify(kvm_t * kd,const struct kinfo_proc * p)410dc06f3f4Sguenther proc_verify(kvm_t *kd, const struct kinfo_proc *p)
411df930be7Sderaadt {
412df930be7Sderaadt 	struct proc kernproc;
413644b4788Sguenther 	struct process kernprocess;
414644b4788Sguenther 
415644b4788Sguenther 	if (p->p_psflags & (PS_EMBRYO | PS_ZOMBIE))
416644b4788Sguenther 		return (0);
417df930be7Sderaadt 
418df930be7Sderaadt 	/*
419df930be7Sderaadt 	 * Just read in the whole proc.  It's not that big relative
420df930be7Sderaadt 	 * to the cost of the read system call.
421df930be7Sderaadt 	 */
422644b4788Sguenther 	if (KREAD(kd, (u_long)p->p_paddr, &kernproc))
423df930be7Sderaadt 		return (0);
424644b4788Sguenther 	if (KREAD(kd, (u_long)kernproc.p_p, &kernprocess))
425644b4788Sguenther 		return (0);
4263b7181b7Sguenther 	if (p->p_pid != kernprocess.ps_pid)
4273b7181b7Sguenther 		return (0);
428644b4788Sguenther 	return ((kernprocess.ps_flags & (PS_EMBRYO | PS_ZOMBIE)) == 0);
429df930be7Sderaadt }
430df930be7Sderaadt 
431df930be7Sderaadt static char **
kvm_doargv(kvm_t * kd,const struct kinfo_proc * p,int nchr,int isenv,void (* info)(struct ps_strings *,u_long *,int *))43259133b9fSzhuk kvm_doargv(kvm_t *kd, const struct kinfo_proc *p, int nchr, int isenv,
433551fad64Sderaadt     void (*info)(struct ps_strings *, u_long *, int *))
434df930be7Sderaadt {
435*6e552b66Sasou 	struct proc pp;
436*6e552b66Sasou 	struct process pr;
437*6e552b66Sasou 	struct ps_strings *ps;
438551fad64Sderaadt 	struct ps_strings arginfo;
439551fad64Sderaadt 	u_long addr;
440551fad64Sderaadt 	char **ap;
441551fad64Sderaadt 	int cnt;
4423989e386Sderaadt 
443*6e552b66Sasou 	/* get ps_strings address */
444*6e552b66Sasou 	if (KREAD(kd, (u_long)p->p_paddr, &pp))
445*6e552b66Sasou 		return (0);
446*6e552b66Sasou 	if (KREAD(kd, (u_long)pp.p_p, &pr))
447*6e552b66Sasou 		return (0);
448*6e552b66Sasou 	ps = (struct ps_strings *)pr.ps_strings;
449df930be7Sderaadt 
450df930be7Sderaadt 	/*
451df930be7Sderaadt 	 * Pointers are stored at the top of the user stack.
452df930be7Sderaadt 	 */
453644b4788Sguenther 	if (p->p_psflags & (PS_EMBRYO | PS_ZOMBIE) ||
4543c298e91Smillert 	    kvm_ureadm(kd, p, (u_long)ps, (char *)&arginfo,
455df930be7Sderaadt 	    sizeof(arginfo)) != sizeof(arginfo))
456df930be7Sderaadt 		return (0);
457df930be7Sderaadt 
458df930be7Sderaadt 	(*info)(&arginfo, &addr, &cnt);
459df930be7Sderaadt 	if (cnt == 0)
460df930be7Sderaadt 		return (0);
46159133b9fSzhuk 	ap = kvm_argv(kd, p, addr, cnt, nchr, isenv);
462df930be7Sderaadt 	/*
463df930be7Sderaadt 	 * For live kernels, make sure this process didn't go away.
464df930be7Sderaadt 	 */
4653c298e91Smillert 	if (ap != 0 && ISALIVE(kd) && !proc_verify(kd, p))
466df930be7Sderaadt 		ap = 0;
467df930be7Sderaadt 	return (ap);
468df930be7Sderaadt }
469df930be7Sderaadt 
47054040b04Sart static char **
kvm_arg_sysctl(kvm_t * kd,pid_t pid,int nchr,int isenv)47159133b9fSzhuk kvm_arg_sysctl(kvm_t *kd, pid_t pid, int nchr, int isenv)
47254040b04Sart {
47354040b04Sart 	size_t len, orglen;
474551fad64Sderaadt 	int mib[4], ret;
47559133b9fSzhuk 	char *buf, **pargbuf;
47654040b04Sart 
47759133b9fSzhuk 	if (isenv) {
47859133b9fSzhuk 		pargbuf = &kd->envbuf;
47959133b9fSzhuk 		orglen = kd->nbpg;
48059133b9fSzhuk 	} else {
48159133b9fSzhuk 		pargbuf = &kd->argbuf;
48259133b9fSzhuk 		orglen = 8 * kd->nbpg;	/* XXX - should be ARG_MAX */
48359133b9fSzhuk 	}
48459133b9fSzhuk 	if (*pargbuf == NULL &&
48559133b9fSzhuk 	    (*pargbuf = _kvm_malloc(kd, orglen)) == NULL)
48654040b04Sart 		return (NULL);
48754040b04Sart 
488df1de12aSart again:
48954040b04Sart 	mib[0] = CTL_KERN;
49054040b04Sart 	mib[1] = KERN_PROC_ARGS;
4913c298e91Smillert 	mib[2] = (int)pid;
49259133b9fSzhuk 	mib[3] = isenv ? KERN_PROC_ENV : KERN_PROC_ARGV;
49354040b04Sart 
49454040b04Sart 	len = orglen;
495df69c215Sderaadt 	ret = (sysctl(mib, 4, *pargbuf, &len, NULL, 0) == -1);
496a650071eSmillert 	if (ret && errno == ENOMEM) {
49759133b9fSzhuk 		buf = _kvm_reallocarray(kd, *pargbuf, orglen, 2);
49854040b04Sart 		if (buf == NULL)
49954040b04Sart 			return (NULL);
500f4ccacb3Sderaadt 		orglen *= 2;
50159133b9fSzhuk 		*pargbuf = buf;
502df1de12aSart 		goto again;
503df1de12aSart 	}
50454040b04Sart 
50554040b04Sart 	if (ret) {
50659133b9fSzhuk 		free(*pargbuf);
50759133b9fSzhuk 		*pargbuf = NULL;
50854040b04Sart 		_kvm_syserr(kd, kd->program, "kvm_arg_sysctl");
50954040b04Sart 		return (NULL);
51054040b04Sart 	}
51154040b04Sart #if 0
51259133b9fSzhuk 	for (argv = (char **)*pargbuf; *argv != NULL; argv++)
51354040b04Sart 		if (strlen(*argv) > nchr)
51454040b04Sart 			*argv[nchr] = '\0';
51554040b04Sart #endif
51654040b04Sart 
51759133b9fSzhuk 	return (char **)(*pargbuf);
51854040b04Sart }
51954040b04Sart 
520df930be7Sderaadt /*
521df930be7Sderaadt  * Get the command args.  This code is now machine independent.
522df930be7Sderaadt  */
523df930be7Sderaadt char **
kvm_getargv(kvm_t * kd,const struct kinfo_proc * kp,int nchr)524551fad64Sderaadt kvm_getargv(kvm_t *kd, const struct kinfo_proc *kp, int nchr)
525df930be7Sderaadt {
52654040b04Sart 	if (ISALIVE(kd))
52709431e5cSguenther 		return (kvm_arg_sysctl(kd, kp->p_pid, nchr, 0));
52859133b9fSzhuk 	return (kvm_doargv(kd, kp, nchr, 0, ps_str_a));
529df930be7Sderaadt }
530df930be7Sderaadt 
531df930be7Sderaadt char **
kvm_getenvv(kvm_t * kd,const struct kinfo_proc * kp,int nchr)532551fad64Sderaadt kvm_getenvv(kvm_t *kd, const struct kinfo_proc *kp, int nchr)
533df930be7Sderaadt {
53454040b04Sart 	if (ISALIVE(kd))
53509431e5cSguenther 		return (kvm_arg_sysctl(kd, kp->p_pid, nchr, 1));
53659133b9fSzhuk 	return (kvm_doargv(kd, kp, nchr, 1, ps_str_e));
5373c298e91Smillert }
5383c298e91Smillert 
539df930be7Sderaadt /*
540df930be7Sderaadt  * Read from user space.  The user context is given by p.
541df930be7Sderaadt  */
5423c298e91Smillert static ssize_t
kvm_ureadm(kvm_t * kd,const struct kinfo_proc * p,u_long uva,char * buf,size_t len)543dc06f3f4Sguenther kvm_ureadm(kvm_t *kd, const struct kinfo_proc *p, u_long uva, char *buf,
544551fad64Sderaadt     size_t len)
545df930be7Sderaadt {
546551fad64Sderaadt 	char *cp = buf;
547df930be7Sderaadt 
548df930be7Sderaadt 	while (len > 0) {
549551fad64Sderaadt 		u_long cnt;
5503c298e91Smillert 		size_t cc;
5513c8d4125Sart 		char *dp;
552df930be7Sderaadt 
5533c298e91Smillert 		dp = _kvm_ureadm(kd, p, uva, &cnt);
554df930be7Sderaadt 		if (dp == 0) {
55503f48ff6Sniklas 			_kvm_err(kd, 0, "invalid address (%lx)", uva);
556df930be7Sderaadt 			return (0);
557df930be7Sderaadt 		}
5580b082c0eSderaadt 		cc = (size_t)MINIMUM(cnt, len);
55929105a07Stedu 		memcpy(cp, dp, cc);
560df930be7Sderaadt 		cp += cc;
561df930be7Sderaadt 		uva += cc;
562df930be7Sderaadt 		len -= cc;
563df930be7Sderaadt 	}
564df930be7Sderaadt 	return (ssize_t)(cp - buf);
565df930be7Sderaadt }
566