1 /* $NetBSD: subr_prf.c,v 1.174 2018/07/15 07:24:11 martin Exp $ */ 2 3 /*- 4 * Copyright (c) 1986, 1988, 1991, 1993 5 * The Regents of the University of California. All rights reserved. 6 * (c) UNIX System Laboratories, Inc. 7 * All or some portions of this file are derived from material licensed 8 * to the University of California by American Telephone and Telegraph 9 * Co. or Unix System Laboratories, Inc. and are reproduced herein with 10 * the permission of UNIX System Laboratories, Inc. 11 * 12 * Redistribution and use in source and binary forms, with or without 13 * modification, are permitted provided that the following conditions 14 * are met: 15 * 1. Redistributions of source code must retain the above copyright 16 * notice, this list of conditions and the following disclaimer. 17 * 2. Redistributions in binary form must reproduce the above copyright 18 * notice, this list of conditions and the following disclaimer in the 19 * documentation and/or other materials provided with the distribution. 20 * 3. Neither the name of the University nor the names of its contributors 21 * may be used to endorse or promote products derived from this software 22 * without specific prior written permission. 23 * 24 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 25 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 27 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 28 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 29 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 30 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 31 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 32 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 33 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 34 * SUCH DAMAGE. 35 * 36 * @(#)subr_prf.c 8.4 (Berkeley) 5/4/95 37 */ 38 39 #include <sys/cdefs.h> 40 __KERNEL_RCSID(0, "$NetBSD: subr_prf.c,v 1.174 2018/07/15 07:24:11 martin Exp $"); 41 42 #ifdef _KERNEL_OPT 43 #include "opt_ddb.h" 44 #include "opt_kgdb.h" 45 #include "opt_dump.h" 46 #include "opt_rnd_printf.h" 47 #endif 48 49 #include <sys/param.h> 50 #include <sys/stdint.h> 51 #include <sys/systm.h> 52 #include <sys/buf.h> 53 #include <sys/device.h> 54 #include <sys/reboot.h> 55 #include <sys/msgbuf.h> 56 #include <sys/proc.h> 57 #include <sys/ioctl.h> 58 #include <sys/vnode.h> 59 #include <sys/file.h> 60 #include <sys/tty.h> 61 #include <sys/tprintf.h> 62 #include <sys/spldebug.h> 63 #include <sys/syslog.h> 64 #include <sys/kprintf.h> 65 #include <sys/atomic.h> 66 #include <sys/kernel.h> 67 #include <sys/cpu.h> 68 #include <sys/sha2.h> 69 #include <sys/rndsource.h> 70 71 #include <dev/cons.h> 72 73 #include <net/if.h> 74 75 static kmutex_t kprintf_mtx; 76 static bool kprintf_inited = false; 77 78 #ifdef KGDB 79 #include <sys/kgdb.h> 80 #endif 81 82 #ifdef DDB 83 #include <ddb/ddbvar.h> /* db_panic */ 84 #include <ddb/db_output.h> /* db_printf, db_putchar prototypes */ 85 #endif 86 87 88 /* 89 * defines 90 */ 91 #define KLOG_PRI 0x80000000 92 93 94 /* 95 * local prototypes 96 */ 97 98 static void putchar(int, int, struct tty *); 99 100 101 /* 102 * globals 103 */ 104 105 extern struct tty *constty; /* pointer to console "window" tty */ 106 extern int log_open; /* subr_log: is /dev/klog open? */ 107 extern krndsource_t rnd_printf_source; 108 const char *panicstr; /* arg to first call to panic (used as a flag 109 to indicate that panic has already been called). */ 110 struct cpu_info *paniccpu; /* cpu that first paniced */ 111 long panicstart, panicend; /* position in the msgbuf of the start and 112 end of the formatted panicstr. */ 113 int doing_shutdown; /* set to indicate shutdown in progress */ 114 115 #ifdef RND_PRINTF 116 static bool kprintf_inited_callout = false; 117 static SHA512_CTX kprnd_sha; 118 static uint8_t kprnd_accum[SHA512_DIGEST_LENGTH]; 119 static int kprnd_added; 120 121 static struct callout kprnd_callout; 122 #endif 123 124 #ifndef DUMP_ON_PANIC 125 #define DUMP_ON_PANIC 1 126 #endif 127 int dumponpanic = DUMP_ON_PANIC; 128 129 /* 130 * v_putc: routine to putc on virtual console 131 * 132 * the v_putc pointer can be used to redirect the console cnputc elsewhere 133 * [e.g. to a "virtual console"]. 134 */ 135 136 void (*v_putc)(int) = cnputc; /* start with cnputc (normal cons) */ 137 void (*v_flush)(void) = cnflush; /* start with cnflush (normal cons) */ 138 139 const char hexdigits[] = "0123456789abcdef"; 140 const char HEXDIGITS[] = "0123456789ABCDEF"; 141 142 143 /* 144 * functions 145 */ 146 147 #ifdef RND_PRINTF 148 static void kprintf_rnd_get(size_t bytes, void *priv) 149 { 150 if (kprnd_added) { 151 KASSERT(kprintf_inited); 152 if (mutex_tryenter(&kprintf_mtx)) { 153 SHA512_Final(kprnd_accum, &kprnd_sha); 154 rnd_add_data(&rnd_printf_source, 155 kprnd_accum, sizeof(kprnd_accum), 0); 156 kprnd_added = 0; 157 /* This, we must do, since we called _Final. */ 158 SHA512_Init(&kprnd_sha); 159 /* This is optional but seems useful. */ 160 SHA512_Update(&kprnd_sha, kprnd_accum, 161 sizeof(kprnd_accum)); 162 mutex_exit(&kprintf_mtx); 163 } 164 } 165 } 166 167 static void kprintf_rnd_callout(void *arg) 168 { 169 kprintf_rnd_get(0, NULL); 170 callout_schedule(&kprnd_callout, hz); 171 } 172 173 #endif 174 175 /* 176 * Locking is inited fairly early in MI bootstrap. Before that 177 * prints are done unlocked. But that doesn't really matter, 178 * since nothing can preempt us before interrupts are enabled. 179 */ 180 void 181 kprintf_init(void) 182 { 183 184 KASSERT(!kprintf_inited && cold); /* not foolproof, but ... */ 185 #ifdef RND_PRINTF 186 SHA512_Init(&kprnd_sha); 187 #endif 188 mutex_init(&kprintf_mtx, MUTEX_DEFAULT, IPL_HIGH); 189 kprintf_inited = true; 190 } 191 192 #ifdef RND_PRINTF 193 void 194 kprintf_init_callout(void) 195 { 196 KASSERT(!kprintf_inited_callout); 197 callout_init(&kprnd_callout, CALLOUT_MPSAFE); 198 callout_setfunc(&kprnd_callout, kprintf_rnd_callout, NULL); 199 callout_schedule(&kprnd_callout, hz); 200 kprintf_inited_callout = true; 201 } 202 #endif 203 204 void 205 kprintf_lock(void) 206 { 207 208 if (__predict_true(kprintf_inited)) 209 mutex_enter(&kprintf_mtx); 210 } 211 212 void 213 kprintf_unlock(void) 214 { 215 216 if (__predict_true(kprintf_inited)) { 217 /* assert kprintf wasn't somehow inited while we were in */ 218 KASSERT(mutex_owned(&kprintf_mtx)); 219 mutex_exit(&kprintf_mtx); 220 } 221 } 222 223 /* 224 * twiddle: spin a little propellor on the console. 225 */ 226 227 void 228 twiddle(void) 229 { 230 static const char twiddle_chars[] = "|/-\\"; 231 static int pos; 232 233 kprintf_lock(); 234 235 putchar(twiddle_chars[pos++ & 3], TOCONS, NULL); 236 putchar('\b', TOCONS, NULL); 237 238 kprintf_unlock(); 239 } 240 241 /* 242 * panic: handle an unresolvable fatal error 243 * 244 * prints "panic: <message>" and reboots. if called twice (i.e. recursive 245 * call) we avoid trying to dump and just reboot (to avoid recursive panics). 246 */ 247 248 void 249 panic(const char *fmt, ...) 250 { 251 va_list ap; 252 253 va_start(ap, fmt); 254 vpanic(fmt, ap); 255 va_end(ap); 256 } 257 258 void 259 vpanic(const char *fmt, va_list ap) 260 { 261 CPU_INFO_ITERATOR cii; 262 struct cpu_info *ci, *oci; 263 int bootopt; 264 static char scratchstr[384]; /* stores panic message */ 265 266 spldebug_stop(); 267 268 if (lwp0.l_cpu && curlwp) { 269 /* 270 * Disable preemption. If already panicing on another CPU, sit 271 * here and spin until the system is rebooted. Allow the CPU that 272 * first paniced to panic again. 273 */ 274 kpreempt_disable(); 275 ci = curcpu(); 276 oci = atomic_cas_ptr((void *)&paniccpu, NULL, ci); 277 if (oci != NULL && oci != ci) { 278 /* Give interrupts a chance to try and prevent deadlock. */ 279 for (;;) { 280 #ifndef _RUMPKERNEL /* XXXpooka: temporary build fix, see kern/40505 */ 281 DELAY(10); 282 #endif /* _RUMPKERNEL */ 283 } 284 } 285 286 /* 287 * Convert the current thread to a bound thread and prevent all 288 * CPUs from scheduling unbound jobs. Do so without taking any 289 * locks. 290 */ 291 curlwp->l_pflag |= LP_BOUND; 292 for (CPU_INFO_FOREACH(cii, ci)) { 293 ci->ci_schedstate.spc_flags |= SPCF_OFFLINE; 294 } 295 } 296 297 bootopt = RB_AUTOBOOT | RB_NOSYNC; 298 if (!doing_shutdown) { 299 if (dumponpanic) 300 bootopt |= RB_DUMP; 301 } else 302 printf("Skipping crash dump on recursive panic\n"); 303 304 doing_shutdown = 1; 305 306 if (logenabled(msgbufp)) 307 panicstart = msgbufp->msg_bufx; 308 309 printf("panic: "); 310 if (panicstr == NULL) { 311 /* first time in panic - store fmt first for precaution */ 312 panicstr = fmt; 313 314 vsnprintf(scratchstr, sizeof(scratchstr), fmt, ap); 315 printf("%s", scratchstr); 316 panicstr = scratchstr; 317 } else { 318 vprintf(fmt, ap); 319 } 320 printf("\n"); 321 322 if (logenabled(msgbufp)) 323 panicend = msgbufp->msg_bufx; 324 325 #ifdef KGDB 326 kgdb_panic(); 327 #endif 328 #ifdef KADB 329 if (boothowto & RB_KDB) 330 kdbpanic(); 331 #endif 332 #ifdef DDB 333 db_panic(); 334 #endif 335 cpu_reboot(bootopt, NULL); 336 } 337 338 /* 339 * kernel logging functions: log, logpri, addlog 340 */ 341 342 /* 343 * log: write to the log buffer 344 * 345 * => will not sleep [so safe to call from interrupt] 346 * => will log to console if /dev/klog isn't open 347 */ 348 349 void 350 log(int level, const char *fmt, ...) 351 { 352 va_list ap; 353 354 kprintf_lock(); 355 356 klogpri(level); /* log the level first */ 357 va_start(ap, fmt); 358 kprintf(fmt, TOLOG, NULL, NULL, ap); 359 va_end(ap); 360 if (!log_open) { 361 va_start(ap, fmt); 362 kprintf(fmt, TOCONS, NULL, NULL, ap); 363 va_end(ap); 364 } 365 366 kprintf_unlock(); 367 368 logwakeup(); /* wake up anyone waiting for log msgs */ 369 } 370 371 /* 372 * vlog: write to the log buffer [already have va_list] 373 */ 374 375 void 376 vlog(int level, const char *fmt, va_list ap) 377 { 378 va_list cap; 379 380 va_copy(cap, ap); 381 kprintf_lock(); 382 383 klogpri(level); /* log the level first */ 384 kprintf(fmt, TOLOG, NULL, NULL, ap); 385 if (!log_open) 386 kprintf(fmt, TOCONS, NULL, NULL, cap); 387 388 kprintf_unlock(); 389 va_end(cap); 390 391 logwakeup(); /* wake up anyone waiting for log msgs */ 392 } 393 394 /* 395 * logpri: log the priority level to the klog 396 */ 397 398 void 399 logpri(int level) 400 { 401 402 kprintf_lock(); 403 klogpri(level); 404 kprintf_unlock(); 405 } 406 407 /* 408 * Note: we must be in the mutex here! 409 */ 410 void 411 klogpri(int level) 412 { 413 KASSERT((level & KLOG_PRI) == 0); 414 415 putchar(level | KLOG_PRI, TOLOG, NULL); 416 } 417 418 /* 419 * addlog: add info to previous log message 420 */ 421 422 void 423 addlog(const char *fmt, ...) 424 { 425 va_list ap; 426 427 kprintf_lock(); 428 429 va_start(ap, fmt); 430 kprintf(fmt, TOLOG, NULL, NULL, ap); 431 va_end(ap); 432 if (!log_open) { 433 va_start(ap, fmt); 434 kprintf(fmt, TOCONS, NULL, NULL, ap); 435 va_end(ap); 436 } 437 438 kprintf_unlock(); 439 440 logwakeup(); 441 } 442 443 static void 444 putone(int c, int flags, struct tty *tp) 445 { 446 if (panicstr) 447 constty = NULL; 448 449 if ((flags & TOCONS) && tp == NULL && constty) { 450 tp = constty; 451 flags |= TOTTY; 452 } 453 if ((flags & TOTTY) && tp && 454 tputchar(c, flags, tp) < 0 && 455 (flags & TOCONS) && tp == constty) 456 constty = NULL; 457 if ((flags & TOLOG) && 458 c != '\0' && c != '\r' && c != 0177) 459 logputchar(c); 460 if ((flags & TOCONS) && constty == NULL && c != '\0') 461 (*v_putc)(c); 462 } 463 464 static void 465 putlogpri(int level) 466 { 467 char *p; 468 char snbuf[KPRINTF_BUFSIZE]; 469 470 putone('<', TOLOG, NULL); 471 snprintf(snbuf, sizeof(snbuf), "%d", level); 472 for (p = snbuf ; *p ; p++) 473 putone(*p, TOLOG, NULL); 474 putone('>', TOLOG, NULL); 475 } 476 477 #ifndef KLOG_NOTIMESTAMP 478 static int needtstamp = 1; 479 int log_ts_prec = 7; 480 481 static void 482 addtstamp(int flags, struct tty *tp) 483 { 484 char buf[64]; 485 struct timespec ts; 486 int n, prec; 487 long fsec; 488 489 prec = log_ts_prec; 490 if (prec < 0) { 491 prec = 0; 492 log_ts_prec = prec; 493 } else if (prec > 9) { 494 prec = 9; 495 log_ts_prec = prec; 496 } 497 498 getnanouptime(&ts); 499 500 for (n = prec, fsec = ts.tv_nsec; n < 8; n++) 501 fsec /= 10; 502 if (n < 9) 503 fsec = (fsec / 10) + ((fsec % 10) >= 5); 504 505 n = snprintf(buf, sizeof(buf), "[% 4jd.%.*ld] ", 506 (intmax_t)ts.tv_sec, prec, fsec); 507 508 for (int i = 0; i < n; i++) 509 putone(buf[i], flags, tp); 510 } 511 #endif 512 513 /* 514 * putchar: print a single character on console or user terminal. 515 * 516 * => if console, then the last MSGBUFS chars are saved in msgbuf 517 * for inspection later (e.g. dmesg/syslog) 518 * => we must already be in the mutex! 519 */ 520 static void 521 putchar(int c, int flags, struct tty *tp) 522 { 523 if (c & KLOG_PRI) { 524 putlogpri(c & ~KLOG_PRI); 525 return; 526 } 527 528 #ifndef KLOG_NOTIMESTAMP 529 if (c != '\0' && c != '\n' && needtstamp) { 530 addtstamp(flags, tp); 531 needtstamp = 0; 532 } 533 534 if (c == '\n') 535 needtstamp = 1; 536 #endif 537 putone(c, flags, tp); 538 539 #ifdef DDB 540 if (flags & TODDB) { 541 db_putchar(c); 542 return; 543 } 544 #endif 545 546 #ifdef RND_PRINTF 547 if (__predict_true(kprintf_inited)) { 548 static uint8_t rbuf[SHA512_BLOCK_LENGTH]; 549 static int cursor; 550 551 rbuf[cursor] = c; 552 if (cursor == sizeof(rbuf) - 1) { 553 SHA512_Update(&kprnd_sha, rbuf, sizeof(rbuf)); 554 kprnd_added++; 555 cursor = 0; 556 } else { 557 cursor++; 558 } 559 } 560 #endif 561 } 562 563 /* 564 * tablefull: warn that a system table is full 565 */ 566 567 void 568 tablefull(const char *tab, const char *hint) 569 { 570 if (hint) 571 log(LOG_ERR, "%s: table is full - %s\n", tab, hint); 572 else 573 log(LOG_ERR, "%s: table is full\n", tab); 574 } 575 576 577 /* 578 * uprintf: print to the controlling tty of the current process 579 * 580 * => we may block if the tty queue is full 581 * => no message is printed if the queue doesn't clear in a reasonable 582 * time 583 */ 584 585 void 586 uprintf(const char *fmt, ...) 587 { 588 struct proc *p = curproc; 589 va_list ap; 590 591 /* mutex_enter(proc_lock); XXXSMP */ 592 593 if (p->p_lflag & PL_CONTROLT && p->p_session->s_ttyvp) { 594 /* No mutex needed; going to process TTY. */ 595 va_start(ap, fmt); 596 kprintf(fmt, TOTTY, p->p_session->s_ttyp, NULL, ap); 597 va_end(ap); 598 } 599 600 /* mutex_exit(proc_lock); XXXSMP */ 601 } 602 603 void 604 uprintf_locked(const char *fmt, ...) 605 { 606 struct proc *p = curproc; 607 va_list ap; 608 609 if (p->p_lflag & PL_CONTROLT && p->p_session->s_ttyvp) { 610 /* No mutex needed; going to process TTY. */ 611 va_start(ap, fmt); 612 kprintf(fmt, TOTTY, p->p_session->s_ttyp, NULL, ap); 613 va_end(ap); 614 } 615 } 616 617 /* 618 * tprintf functions: used to send messages to a specific process 619 * 620 * usage: 621 * get a tpr_t handle on a process "p" by using "tprintf_open(p)" 622 * use the handle when calling "tprintf" 623 * when done, do a "tprintf_close" to drop the handle 624 */ 625 626 /* 627 * tprintf_open: get a tprintf handle on a process "p" 628 * 629 * => returns NULL if process can't be printed to 630 */ 631 632 tpr_t 633 tprintf_open(struct proc *p) 634 { 635 tpr_t cookie; 636 637 cookie = NULL; 638 639 mutex_enter(proc_lock); 640 if (p->p_lflag & PL_CONTROLT && p->p_session->s_ttyvp) { 641 proc_sesshold(p->p_session); 642 cookie = (tpr_t)p->p_session; 643 } 644 mutex_exit(proc_lock); 645 646 return cookie; 647 } 648 649 /* 650 * tprintf_close: dispose of a tprintf handle obtained with tprintf_open 651 */ 652 653 void 654 tprintf_close(tpr_t sess) 655 { 656 657 if (sess) { 658 mutex_enter(proc_lock); 659 /* Releases proc_lock. */ 660 proc_sessrele((struct session *)sess); 661 } 662 } 663 664 /* 665 * tprintf: given tprintf handle to a process [obtained with tprintf_open], 666 * send a message to the controlling tty for that process. 667 * 668 * => also sends message to /dev/klog 669 */ 670 void 671 tprintf(tpr_t tpr, const char *fmt, ...) 672 { 673 struct session *sess = (struct session *)tpr; 674 struct tty *tp = NULL; 675 int flags = TOLOG; 676 va_list ap; 677 678 /* mutex_enter(proc_lock); XXXSMP */ 679 if (sess && sess->s_ttyvp && ttycheckoutq(sess->s_ttyp, 0)) { 680 flags |= TOTTY; 681 tp = sess->s_ttyp; 682 } 683 684 kprintf_lock(); 685 686 klogpri(LOG_INFO); 687 va_start(ap, fmt); 688 kprintf(fmt, flags, tp, NULL, ap); 689 va_end(ap); 690 691 kprintf_unlock(); 692 /* mutex_exit(proc_lock); XXXSMP */ 693 694 logwakeup(); 695 } 696 697 698 /* 699 * ttyprintf: send a message to a specific tty 700 * 701 * => should be used only by tty driver or anything that knows the 702 * underlying tty will not be revoked(2)'d away. [otherwise, 703 * use tprintf] 704 */ 705 void 706 ttyprintf(struct tty *tp, const char *fmt, ...) 707 { 708 va_list ap; 709 710 /* No mutex needed; going to process TTY. */ 711 va_start(ap, fmt); 712 kprintf(fmt, TOTTY, tp, NULL, ap); 713 va_end(ap); 714 } 715 716 #ifdef DDB 717 718 /* 719 * db_printf: printf for DDB (via db_putchar) 720 */ 721 722 void 723 db_printf(const char *fmt, ...) 724 { 725 va_list ap; 726 727 /* No mutex needed; DDB pauses all processors. */ 728 va_start(ap, fmt); 729 kprintf(fmt, TODDB, NULL, NULL, ap); 730 va_end(ap); 731 732 if (db_tee_msgbuf) { 733 va_start(ap, fmt); 734 kprintf(fmt, TOLOG, NULL, NULL, ap); 735 va_end(ap); 736 } 737 } 738 739 void 740 db_vprintf(const char *fmt, va_list ap) 741 { 742 va_list cap; 743 744 va_copy(cap, ap); 745 /* No mutex needed; DDB pauses all processors. */ 746 kprintf(fmt, TODDB, NULL, NULL, ap); 747 if (db_tee_msgbuf) 748 kprintf(fmt, TOLOG, NULL, NULL, cap); 749 va_end(cap); 750 } 751 752 #endif /* DDB */ 753 754 static void 755 kprintf_internal(const char *fmt, int oflags, void *vp, char *sbuf, ...) 756 { 757 va_list ap; 758 759 va_start(ap, sbuf); 760 (void)kprintf(fmt, oflags, vp, sbuf, ap); 761 va_end(ap); 762 } 763 764 /* 765 * Device autoconfiguration printf routines. These change their 766 * behavior based on the AB_* flags in boothowto. If AB_SILENT 767 * is set, messages never go to the console (but they still always 768 * go to the log). AB_VERBOSE overrides AB_SILENT. 769 */ 770 771 /* 772 * aprint_normal: Send to console unless AB_QUIET. Always goes 773 * to the log. 774 */ 775 static void 776 aprint_normal_internal(const char *prefix, const char *fmt, va_list ap) 777 { 778 int flags = TOLOG; 779 780 if ((boothowto & (AB_SILENT|AB_QUIET)) == 0 || 781 (boothowto & AB_VERBOSE) != 0) 782 flags |= TOCONS; 783 784 kprintf_lock(); 785 786 if (prefix) 787 kprintf_internal("%s: ", flags, NULL, NULL, prefix); 788 kprintf(fmt, flags, NULL, NULL, ap); 789 790 kprintf_unlock(); 791 792 if (!panicstr) 793 logwakeup(); 794 } 795 796 void 797 aprint_normal(const char *fmt, ...) 798 { 799 va_list ap; 800 801 va_start(ap, fmt); 802 aprint_normal_internal(NULL, fmt, ap); 803 va_end(ap); 804 } 805 806 void 807 aprint_normal_dev(device_t dv, const char *fmt, ...) 808 { 809 va_list ap; 810 811 va_start(ap, fmt); 812 aprint_normal_internal(device_xname(dv), fmt, ap); 813 va_end(ap); 814 } 815 816 void 817 aprint_normal_ifnet(struct ifnet *ifp, const char *fmt, ...) 818 { 819 va_list ap; 820 821 va_start(ap, fmt); 822 aprint_normal_internal(ifp->if_xname, fmt, ap); 823 va_end(ap); 824 } 825 826 /* 827 * aprint_error: Send to console unless AB_QUIET. Always goes 828 * to the log. Also counts the number of times called so other 829 * parts of the kernel can report the number of errors during a 830 * given phase of system startup. 831 */ 832 static int aprint_error_count; 833 834 int 835 aprint_get_error_count(void) 836 { 837 int count; 838 839 kprintf_lock(); 840 841 count = aprint_error_count; 842 aprint_error_count = 0; 843 844 kprintf_unlock(); 845 846 return (count); 847 } 848 849 static void 850 aprint_error_internal(const char *prefix, const char *fmt, va_list ap) 851 { 852 int flags = TOLOG; 853 854 if ((boothowto & (AB_SILENT|AB_QUIET)) == 0 || 855 (boothowto & AB_VERBOSE) != 0) 856 flags |= TOCONS; 857 858 kprintf_lock(); 859 860 aprint_error_count++; 861 862 if (prefix) 863 kprintf_internal("%s: ", flags, NULL, NULL, prefix); 864 kprintf_internal("autoconfiguration error: ", TOLOG, NULL, NULL); 865 kprintf(fmt, flags, NULL, NULL, ap); 866 867 kprintf_unlock(); 868 869 if (!panicstr) 870 logwakeup(); 871 } 872 873 void 874 aprint_error(const char *fmt, ...) 875 { 876 va_list ap; 877 878 va_start(ap, fmt); 879 aprint_error_internal(NULL, fmt, ap); 880 va_end(ap); 881 } 882 883 void 884 aprint_error_dev(device_t dv, const char *fmt, ...) 885 { 886 va_list ap; 887 888 va_start(ap, fmt); 889 aprint_error_internal(device_xname(dv), fmt, ap); 890 va_end(ap); 891 } 892 893 void 894 aprint_error_ifnet(struct ifnet *ifp, const char *fmt, ...) 895 { 896 va_list ap; 897 898 va_start(ap, fmt); 899 aprint_error_internal(ifp->if_xname, fmt, ap); 900 va_end(ap); 901 } 902 903 /* 904 * aprint_naive: Send to console only if AB_QUIET. Never goes 905 * to the log. 906 */ 907 static void 908 aprint_naive_internal(const char *prefix, const char *fmt, va_list ap) 909 { 910 if ((boothowto & (AB_QUIET|AB_SILENT|AB_VERBOSE)) != AB_QUIET) 911 return; 912 913 kprintf_lock(); 914 915 if (prefix) 916 kprintf_internal("%s: ", TOCONS, NULL, NULL, prefix); 917 kprintf(fmt, TOCONS, NULL, NULL, ap); 918 919 kprintf_unlock(); 920 } 921 922 void 923 aprint_naive(const char *fmt, ...) 924 { 925 va_list ap; 926 927 va_start(ap, fmt); 928 aprint_naive_internal(NULL, fmt, ap); 929 va_end(ap); 930 } 931 932 void 933 aprint_naive_dev(device_t dv, const char *fmt, ...) 934 { 935 va_list ap; 936 937 va_start(ap, fmt); 938 aprint_naive_internal(device_xname(dv), fmt, ap); 939 va_end(ap); 940 } 941 942 void 943 aprint_naive_ifnet(struct ifnet *ifp, const char *fmt, ...) 944 { 945 va_list ap; 946 947 va_start(ap, fmt); 948 aprint_naive_internal(ifp->if_xname, fmt, ap); 949 va_end(ap); 950 } 951 952 /* 953 * aprint_verbose: Send to console only if AB_VERBOSE. Always 954 * goes to the log. 955 */ 956 static void 957 aprint_verbose_internal(const char *prefix, const char *fmt, va_list ap) 958 { 959 int flags = TOLOG; 960 961 if (boothowto & AB_VERBOSE) 962 flags |= TOCONS; 963 964 kprintf_lock(); 965 966 if (prefix) 967 kprintf_internal("%s: ", flags, NULL, NULL, prefix); 968 kprintf(fmt, flags, NULL, NULL, ap); 969 970 kprintf_unlock(); 971 972 if (!panicstr) 973 logwakeup(); 974 } 975 976 void 977 aprint_verbose(const char *fmt, ...) 978 { 979 va_list ap; 980 981 va_start(ap, fmt); 982 aprint_verbose_internal(NULL, fmt, ap); 983 va_end(ap); 984 } 985 986 void 987 aprint_verbose_dev(device_t dv, const char *fmt, ...) 988 { 989 va_list ap; 990 991 va_start(ap, fmt); 992 aprint_verbose_internal(device_xname(dv), fmt, ap); 993 va_end(ap); 994 } 995 996 void 997 aprint_verbose_ifnet(struct ifnet *ifp, const char *fmt, ...) 998 { 999 va_list ap; 1000 1001 va_start(ap, fmt); 1002 aprint_verbose_internal(ifp->if_xname, fmt, ap); 1003 va_end(ap); 1004 } 1005 1006 /* 1007 * aprint_debug: Send to console and log only if AB_DEBUG. 1008 */ 1009 static void 1010 aprint_debug_internal(const char *prefix, const char *fmt, va_list ap) 1011 { 1012 if ((boothowto & AB_DEBUG) == 0) 1013 return; 1014 1015 kprintf_lock(); 1016 1017 if (prefix) 1018 kprintf_internal("%s: ", TOCONS | TOLOG, NULL, NULL, prefix); 1019 kprintf(fmt, TOCONS | TOLOG, NULL, NULL, ap); 1020 1021 kprintf_unlock(); 1022 } 1023 1024 void 1025 aprint_debug(const char *fmt, ...) 1026 { 1027 va_list ap; 1028 1029 va_start(ap, fmt); 1030 aprint_debug_internal(NULL, fmt, ap); 1031 va_end(ap); 1032 } 1033 1034 void 1035 aprint_debug_dev(device_t dv, const char *fmt, ...) 1036 { 1037 va_list ap; 1038 1039 va_start(ap, fmt); 1040 aprint_debug_internal(device_xname(dv), fmt, ap); 1041 va_end(ap); 1042 } 1043 1044 void 1045 aprint_debug_ifnet(struct ifnet *ifp, const char *fmt, ...) 1046 { 1047 va_list ap; 1048 1049 va_start(ap, fmt); 1050 aprint_debug_internal(ifp->if_xname, fmt, ap); 1051 va_end(ap); 1052 } 1053 1054 void 1055 printf_tolog(const char *fmt, ...) 1056 { 1057 va_list ap; 1058 1059 kprintf_lock(); 1060 1061 va_start(ap, fmt); 1062 kprintf(fmt, TOLOG, NULL, NULL, ap); 1063 va_end(ap); 1064 1065 kprintf_unlock(); 1066 } 1067 1068 /* 1069 * printf_nolog: Like printf(), but does not send message to the log. 1070 */ 1071 1072 void 1073 printf_nolog(const char *fmt, ...) 1074 { 1075 va_list ap; 1076 1077 kprintf_lock(); 1078 1079 va_start(ap, fmt); 1080 kprintf(fmt, TOCONS, NULL, NULL, ap); 1081 va_end(ap); 1082 1083 kprintf_unlock(); 1084 } 1085 1086 /* 1087 * normal kernel printf functions: printf, vprintf, snprintf, vsnprintf 1088 */ 1089 1090 /* 1091 * printf: print a message to the console and the log 1092 */ 1093 void 1094 printf(const char *fmt, ...) 1095 { 1096 va_list ap; 1097 1098 kprintf_lock(); 1099 1100 va_start(ap, fmt); 1101 kprintf(fmt, TOCONS | TOLOG, NULL, NULL, ap); 1102 va_end(ap); 1103 1104 kprintf_unlock(); 1105 1106 if (!panicstr) 1107 logwakeup(); 1108 } 1109 1110 /* 1111 * vprintf: print a message to the console and the log [already have 1112 * va_list] 1113 */ 1114 1115 void 1116 vprintf(const char *fmt, va_list ap) 1117 { 1118 kprintf_lock(); 1119 1120 kprintf(fmt, TOCONS | TOLOG, NULL, NULL, ap); 1121 1122 kprintf_unlock(); 1123 1124 if (!panicstr) 1125 logwakeup(); 1126 } 1127 1128 /* 1129 * snprintf: print a message to a buffer 1130 */ 1131 int 1132 snprintf(char *bf, size_t size, const char *fmt, ...) 1133 { 1134 int retval; 1135 va_list ap; 1136 1137 va_start(ap, fmt); 1138 retval = vsnprintf(bf, size, fmt, ap); 1139 va_end(ap); 1140 1141 return retval; 1142 } 1143 1144 /* 1145 * vsnprintf: print a message to a buffer [already have va_list] 1146 */ 1147 int 1148 vsnprintf(char *bf, size_t size, const char *fmt, va_list ap) 1149 { 1150 int retval; 1151 char *p; 1152 1153 p = bf + size; 1154 retval = kprintf(fmt, TOBUFONLY, &p, bf, ap); 1155 if (bf && size > 0) { 1156 /* nul terminate */ 1157 if (size <= (size_t)retval) 1158 bf[size - 1] = '\0'; 1159 else 1160 bf[retval] = '\0'; 1161 } 1162 return retval; 1163 } 1164 1165 /* 1166 * kprintf: scaled down version of printf(3). 1167 * 1168 * this version based on vfprintf() from libc which was derived from 1169 * software contributed to Berkeley by Chris Torek. 1170 * 1171 * NOTE: The kprintf mutex must be held if we're going TOBUF or TOCONS! 1172 */ 1173 1174 /* 1175 * macros for converting digits to letters and vice versa 1176 */ 1177 #define to_digit(c) ((c) - '0') 1178 #define is_digit(c) ((unsigned)to_digit(c) <= 9) 1179 #define to_char(n) ((n) + '0') 1180 1181 /* 1182 * flags used during conversion. 1183 */ 1184 #define ALT 0x001 /* alternate form */ 1185 #define HEXPREFIX 0x002 /* add 0x or 0X prefix */ 1186 #define LADJUST 0x004 /* left adjustment */ 1187 #define LONGDBL 0x008 /* long double; unimplemented */ 1188 #define LONGINT 0x010 /* long integer */ 1189 #define QUADINT 0x020 /* quad integer */ 1190 #define SHORTINT 0x040 /* short integer */ 1191 #define MAXINT 0x080 /* intmax_t */ 1192 #define PTRINT 0x100 /* intptr_t */ 1193 #define SIZEINT 0x200 /* size_t */ 1194 #define ZEROPAD 0x400 /* zero (as opposed to blank) pad */ 1195 #define FPT 0x800 /* Floating point number */ 1196 1197 /* 1198 * To extend shorts properly, we need both signed and unsigned 1199 * argument extraction methods. 1200 */ 1201 #define SARG() \ 1202 (flags&MAXINT ? va_arg(ap, intmax_t) : \ 1203 flags&PTRINT ? va_arg(ap, intptr_t) : \ 1204 flags&SIZEINT ? va_arg(ap, ssize_t) : /* XXX */ \ 1205 flags&QUADINT ? va_arg(ap, quad_t) : \ 1206 flags&LONGINT ? va_arg(ap, long) : \ 1207 flags&SHORTINT ? (long)(short)va_arg(ap, int) : \ 1208 (long)va_arg(ap, int)) 1209 #define UARG() \ 1210 (flags&MAXINT ? va_arg(ap, uintmax_t) : \ 1211 flags&PTRINT ? va_arg(ap, uintptr_t) : \ 1212 flags&SIZEINT ? va_arg(ap, size_t) : \ 1213 flags&QUADINT ? va_arg(ap, u_quad_t) : \ 1214 flags&LONGINT ? va_arg(ap, u_long) : \ 1215 flags&SHORTINT ? (u_long)(u_short)va_arg(ap, int) : \ 1216 (u_long)va_arg(ap, u_int)) 1217 1218 #define KPRINTF_PUTCHAR(C) { \ 1219 if (oflags == TOBUFONLY) { \ 1220 if (sbuf && ((vp == NULL) || (sbuf < tailp))) \ 1221 *sbuf++ = (C); \ 1222 } else { \ 1223 putchar((C), oflags, vp); \ 1224 } \ 1225 } 1226 1227 void 1228 device_printf(device_t dev, const char *fmt, ...) 1229 { 1230 va_list ap; 1231 1232 va_start(ap, fmt); 1233 printf("%s: ", device_xname(dev)); 1234 vprintf(fmt, ap); 1235 va_end(ap); 1236 return; 1237 } 1238 1239 /* 1240 * Guts of kernel printf. Note, we already expect to be in a mutex! 1241 */ 1242 int 1243 kprintf(const char *fmt0, int oflags, void *vp, char *sbuf, va_list ap) 1244 { 1245 const char *fmt; /* format string */ 1246 int ch; /* character from fmt */ 1247 int n; /* handy integer (short term usage) */ 1248 char *cp; /* handy char pointer (short term usage) */ 1249 int flags; /* flags as above */ 1250 int ret; /* return value accumulator */ 1251 int width; /* width from format (%8d), or 0 */ 1252 int prec; /* precision from format (%.3d), or -1 */ 1253 char sign; /* sign prefix (' ', '+', '-', or \0) */ 1254 1255 u_quad_t _uquad; /* integer arguments %[diouxX] */ 1256 enum { OCT, DEC, HEX } base;/* base for [diouxX] conversion */ 1257 int dprec; /* a copy of prec if [diouxX], 0 otherwise */ 1258 int realsz; /* field size expanded by dprec */ 1259 int size; /* size of converted field or string */ 1260 const char *xdigs; /* digits for [xX] conversion */ 1261 char bf[KPRINTF_BUFSIZE]; /* space for %c, %[diouxX] */ 1262 char *tailp; /* tail pointer for snprintf */ 1263 1264 if (oflags == TOBUFONLY && (vp != NULL)) 1265 tailp = *(char **)vp; 1266 else 1267 tailp = NULL; 1268 1269 cp = NULL; /* XXX: shutup gcc */ 1270 size = 0; /* XXX: shutup gcc */ 1271 1272 fmt = fmt0; 1273 ret = 0; 1274 1275 xdigs = NULL; /* XXX: shut up gcc warning */ 1276 1277 /* 1278 * Scan the format for conversions (`%' character). 1279 */ 1280 for (;;) { 1281 for (; *fmt != '%' && *fmt; fmt++) { 1282 ret++; 1283 KPRINTF_PUTCHAR(*fmt); 1284 } 1285 if (*fmt == 0) 1286 goto done; 1287 1288 fmt++; /* skip over '%' */ 1289 1290 flags = 0; 1291 dprec = 0; 1292 width = 0; 1293 prec = -1; 1294 sign = '\0'; 1295 1296 rflag: ch = *fmt++; 1297 reswitch: switch (ch) { 1298 case ' ': 1299 /* 1300 * ``If the space and + flags both appear, the space 1301 * flag will be ignored.'' 1302 * -- ANSI X3J11 1303 */ 1304 if (!sign) 1305 sign = ' '; 1306 goto rflag; 1307 case '#': 1308 flags |= ALT; 1309 goto rflag; 1310 case '*': 1311 /* 1312 * ``A negative field width argument is taken as a 1313 * - flag followed by a positive field width.'' 1314 * -- ANSI X3J11 1315 * They don't exclude field widths read from args. 1316 */ 1317 if ((width = va_arg(ap, int)) >= 0) 1318 goto rflag; 1319 width = -width; 1320 /* FALLTHROUGH */ 1321 case '-': 1322 flags |= LADJUST; 1323 goto rflag; 1324 case '+': 1325 sign = '+'; 1326 goto rflag; 1327 case '.': 1328 if ((ch = *fmt++) == '*') { 1329 n = va_arg(ap, int); 1330 prec = n < 0 ? -1 : n; 1331 goto rflag; 1332 } 1333 n = 0; 1334 while (is_digit(ch)) { 1335 n = 10 * n + to_digit(ch); 1336 ch = *fmt++; 1337 } 1338 prec = n < 0 ? -1 : n; 1339 goto reswitch; 1340 case '0': 1341 /* 1342 * ``Note that 0 is taken as a flag, not as the 1343 * beginning of a field width.'' 1344 * -- ANSI X3J11 1345 */ 1346 flags |= ZEROPAD; 1347 goto rflag; 1348 case '1': case '2': case '3': case '4': 1349 case '5': case '6': case '7': case '8': case '9': 1350 n = 0; 1351 do { 1352 n = 10 * n + to_digit(ch); 1353 ch = *fmt++; 1354 } while (is_digit(ch)); 1355 width = n; 1356 goto reswitch; 1357 case 'h': 1358 flags |= SHORTINT; 1359 goto rflag; 1360 case 'j': 1361 flags |= MAXINT; 1362 goto rflag; 1363 case 'l': 1364 if (*fmt == 'l') { 1365 fmt++; 1366 flags |= QUADINT; 1367 } else { 1368 flags |= LONGINT; 1369 } 1370 goto rflag; 1371 case 'q': 1372 flags |= QUADINT; 1373 goto rflag; 1374 case 't': 1375 flags |= PTRINT; 1376 goto rflag; 1377 case 'z': 1378 flags |= SIZEINT; 1379 goto rflag; 1380 case 'c': 1381 *(cp = bf) = va_arg(ap, int); 1382 size = 1; 1383 sign = '\0'; 1384 break; 1385 case 'D': 1386 flags |= LONGINT; 1387 /*FALLTHROUGH*/ 1388 case 'd': 1389 case 'i': 1390 _uquad = SARG(); 1391 if ((quad_t)_uquad < 0) { 1392 _uquad = -_uquad; 1393 sign = '-'; 1394 } 1395 base = DEC; 1396 goto number; 1397 case 'n': 1398 if (flags & MAXINT) 1399 *va_arg(ap, intmax_t *) = ret; 1400 else if (flags & PTRINT) 1401 *va_arg(ap, intptr_t *) = ret; 1402 else if (flags & SIZEINT) 1403 *va_arg(ap, ssize_t *) = ret; 1404 else if (flags & QUADINT) 1405 *va_arg(ap, quad_t *) = ret; 1406 else if (flags & LONGINT) 1407 *va_arg(ap, long *) = ret; 1408 else if (flags & SHORTINT) 1409 *va_arg(ap, short *) = ret; 1410 else 1411 *va_arg(ap, int *) = ret; 1412 continue; /* no output */ 1413 case 'O': 1414 flags |= LONGINT; 1415 /*FALLTHROUGH*/ 1416 case 'o': 1417 _uquad = UARG(); 1418 base = OCT; 1419 goto nosign; 1420 case 'p': 1421 /* 1422 * ``The argument shall be a pointer to void. The 1423 * value of the pointer is converted to a sequence 1424 * of printable characters, in an implementation- 1425 * defined manner.'' 1426 * -- ANSI X3J11 1427 */ 1428 /* NOSTRICT */ 1429 _uquad = (u_long)va_arg(ap, void *); 1430 base = HEX; 1431 xdigs = hexdigits; 1432 flags |= HEXPREFIX; 1433 ch = 'x'; 1434 goto nosign; 1435 case 's': 1436 if ((cp = va_arg(ap, char *)) == NULL) 1437 /*XXXUNCONST*/ 1438 cp = __UNCONST("(null)"); 1439 if (prec >= 0) { 1440 /* 1441 * can't use strlen; can only look for the 1442 * NUL in the first `prec' characters, and 1443 * strlen() will go further. 1444 */ 1445 char *p = memchr(cp, 0, prec); 1446 1447 if (p != NULL) { 1448 size = p - cp; 1449 if (size > prec) 1450 size = prec; 1451 } else 1452 size = prec; 1453 } else 1454 size = strlen(cp); 1455 sign = '\0'; 1456 break; 1457 case 'U': 1458 flags |= LONGINT; 1459 /*FALLTHROUGH*/ 1460 case 'u': 1461 _uquad = UARG(); 1462 base = DEC; 1463 goto nosign; 1464 case 'X': 1465 xdigs = HEXDIGITS; 1466 goto hex; 1467 case 'x': 1468 xdigs = hexdigits; 1469 hex: _uquad = UARG(); 1470 base = HEX; 1471 /* leading 0x/X only if non-zero */ 1472 if (flags & ALT && _uquad != 0) 1473 flags |= HEXPREFIX; 1474 1475 /* unsigned conversions */ 1476 nosign: sign = '\0'; 1477 /* 1478 * ``... diouXx conversions ... if a precision is 1479 * specified, the 0 flag will be ignored.'' 1480 * -- ANSI X3J11 1481 */ 1482 number: if ((dprec = prec) >= 0) 1483 flags &= ~ZEROPAD; 1484 1485 /* 1486 * ``The result of converting a zero value with an 1487 * explicit precision of zero is no characters.'' 1488 * -- ANSI X3J11 1489 */ 1490 cp = bf + KPRINTF_BUFSIZE; 1491 if (_uquad != 0 || prec != 0) { 1492 /* 1493 * Unsigned mod is hard, and unsigned mod 1494 * by a constant is easier than that by 1495 * a variable; hence this switch. 1496 */ 1497 switch (base) { 1498 case OCT: 1499 do { 1500 *--cp = to_char(_uquad & 7); 1501 _uquad >>= 3; 1502 } while (_uquad); 1503 /* handle octal leading 0 */ 1504 if (flags & ALT && *cp != '0') 1505 *--cp = '0'; 1506 break; 1507 1508 case DEC: 1509 /* many numbers are 1 digit */ 1510 while (_uquad >= 10) { 1511 *--cp = to_char(_uquad % 10); 1512 _uquad /= 10; 1513 } 1514 *--cp = to_char(_uquad); 1515 break; 1516 1517 case HEX: 1518 do { 1519 *--cp = xdigs[_uquad & 15]; 1520 _uquad >>= 4; 1521 } while (_uquad); 1522 break; 1523 1524 default: 1525 /*XXXUNCONST*/ 1526 cp = __UNCONST("bug in kprintf: bad base"); 1527 size = strlen(cp); 1528 goto skipsize; 1529 } 1530 } 1531 size = bf + KPRINTF_BUFSIZE - cp; 1532 skipsize: 1533 break; 1534 default: /* "%?" prints ?, unless ? is NUL */ 1535 if (ch == '\0') 1536 goto done; 1537 /* pretend it was %c with argument ch */ 1538 cp = bf; 1539 *cp = ch; 1540 size = 1; 1541 sign = '\0'; 1542 break; 1543 } 1544 1545 /* 1546 * All reasonable formats wind up here. At this point, `cp' 1547 * points to a string which (if not flags&LADJUST) should be 1548 * padded out to `width' places. If flags&ZEROPAD, it should 1549 * first be prefixed by any sign or other prefix; otherwise, 1550 * it should be blank padded before the prefix is emitted. 1551 * After any left-hand padding and prefixing, emit zeroes 1552 * required by a decimal [diouxX] precision, then print the 1553 * string proper, then emit zeroes required by any leftover 1554 * floating precision; finally, if LADJUST, pad with blanks. 1555 * 1556 * Compute actual size, so we know how much to pad. 1557 * size excludes decimal prec; realsz includes it. 1558 */ 1559 realsz = dprec > size ? dprec : size; 1560 if (sign) 1561 realsz++; 1562 else if (flags & HEXPREFIX) 1563 realsz+= 2; 1564 1565 /* adjust ret */ 1566 ret += width > realsz ? width : realsz; 1567 1568 /* right-adjusting blank padding */ 1569 if ((flags & (LADJUST|ZEROPAD)) == 0) { 1570 n = width - realsz; 1571 while (n-- > 0) 1572 KPRINTF_PUTCHAR(' '); 1573 } 1574 1575 /* prefix */ 1576 if (sign) { 1577 KPRINTF_PUTCHAR(sign); 1578 } else if (flags & HEXPREFIX) { 1579 KPRINTF_PUTCHAR('0'); 1580 KPRINTF_PUTCHAR(ch); 1581 } 1582 1583 /* right-adjusting zero padding */ 1584 if ((flags & (LADJUST|ZEROPAD)) == ZEROPAD) { 1585 n = width - realsz; 1586 while (n-- > 0) 1587 KPRINTF_PUTCHAR('0'); 1588 } 1589 1590 /* leading zeroes from decimal precision */ 1591 n = dprec - size; 1592 while (n-- > 0) 1593 KPRINTF_PUTCHAR('0'); 1594 1595 /* the string or number proper */ 1596 for (; size--; cp++) 1597 KPRINTF_PUTCHAR(*cp); 1598 /* left-adjusting padding (always blank) */ 1599 if (flags & LADJUST) { 1600 n = width - realsz; 1601 while (n-- > 0) 1602 KPRINTF_PUTCHAR(' '); 1603 } 1604 } 1605 1606 done: 1607 if ((oflags == TOBUFONLY) && (vp != NULL)) 1608 *(char **)vp = sbuf; 1609 (*v_flush)(); 1610 1611 #ifdef RND_PRINTF 1612 if (!cold) { 1613 struct timespec ts; 1614 (void)nanotime(&ts); 1615 SHA512_Update(&kprnd_sha, (char *)&ts, sizeof(ts)); 1616 } 1617 #endif 1618 return ret; 1619 } 1620