hexdump.c revision 116664
156893Sfenner/*-
256893Sfenner * Copyright (c) 1986, 1988, 1991, 1993
356893Sfenner *	The Regents of the University of California.  All rights reserved.
4127668Sbms * (c) UNIX System Laboratories, Inc.
556893Sfenner * All or some portions of this file are derived from material licensed
656893Sfenner * to the University of California by American Telephone and Telegraph
756893Sfenner * Co. or Unix System Laboratories, Inc. and are reproduced herein with
856893Sfenner * the permission of UNIX System Laboratories, Inc.
956893Sfenner *
1056893Sfenner * Redistribution and use in source and binary forms, with or without
1156893Sfenner * modification, are permitted provided that the following conditions
1256893Sfenner * are met:
1356893Sfenner * 1. Redistributions of source code must retain the above copyright
1456893Sfenner *    notice, this list of conditions and the following disclaimer.
1556893Sfenner * 2. Redistributions in binary form must reproduce the above copyright
16127668Sbms *    notice, this list of conditions and the following disclaimer in the
1756893Sfenner *    documentation and/or other materials provided with the distribution.
1856893Sfenner * 3. All advertising materials mentioning features or use of this software
1956893Sfenner *    must display the following acknowledgement:
2056893Sfenner *	This product includes software developed by the University of
2156893Sfenner *	California, Berkeley and its contributors.
2256893Sfenner * 4. Neither the name of the University nor the names of its contributors
2356893Sfenner *    may be used to endorse or promote products derived from this software
2456893Sfenner *    without specific prior written permission.
2556893Sfenner *
2656893Sfenner * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
2756893Sfenner * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
2856893Sfenner * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
2956893Sfenner * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
3056893Sfenner * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
3156893Sfenner * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
3256893Sfenner * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
3356893Sfenner * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
3456893Sfenner * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
3556893Sfenner * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
3656893Sfenner * SUCH DAMAGE.
3756893Sfenner *
3856893Sfenner *	@(#)subr_prf.c	8.3 (Berkeley) 1/21/94
3956893Sfenner */
4056893Sfenner
4156893Sfenner#include <sys/cdefs.h>
42127668Sbms__FBSDID("$FreeBSD: head/sys/kern/subr_prf.c 116664 2003-06-22 03:20:24Z iedowse $");
4356893Sfenner
4456893Sfenner#include "opt_ddb.h"
45127668Sbms
46127668Sbms#include <sys/param.h>
4756893Sfenner#include <sys/systm.h>
4856893Sfenner#include <sys/lock.h>
4956893Sfenner#include <sys/mutex.h>
5056893Sfenner#include <sys/sx.h>
5156893Sfenner#include <sys/kernel.h>
5256893Sfenner#include <sys/msgbuf.h>
5356893Sfenner#include <sys/malloc.h>
5456893Sfenner#include <sys/proc.h>
5556893Sfenner#include <sys/stddef.h>
5656893Sfenner#include <sys/sysctl.h>
5756893Sfenner#include <sys/tty.h>
5856893Sfenner#include <sys/syslog.h>
5956893Sfenner#include <sys/cons.h>
6056893Sfenner#include <sys/uio.h>
6156893Sfenner
6256893Sfenner#ifdef DDB
6356893Sfenner#include <ddb/ddb.h>
6456893Sfenner#endif
6556893Sfenner
6656893Sfenner/*
6756893Sfenner * Note that stdarg.h and the ANSI style va_start macro is used for both
6856893Sfenner * ANSI and traditional C compilers.
6956893Sfenner */
7056893Sfenner#include <machine/stdarg.h>
7156893Sfenner
7256893Sfenner#define TOCONS	0x01
7356893Sfenner#define TOTTY	0x02
7456893Sfenner#define TOLOG	0x04
7556893Sfenner
7656893Sfenner/* Max number conversion buffer length: a u_quad_t in base 2, plus NUL byte. */
7756893Sfenner#define MAXNBUF	(sizeof(intmax_t) * NBBY + 1)
7856893Sfenner
7956893Sfennerstruct putchar_arg {
8056893Sfenner	int	flags;
8156893Sfenner	int	pri;
8256893Sfenner	struct	tty *tty;
8356893Sfenner};
8456893Sfenner
8556893Sfennerstruct snprintf_arg {
8656893Sfenner	char	*str;
8756893Sfenner	size_t	remain;
8856893Sfenner};
8956893Sfenner
9056893Sfennerextern	int log_open;
9156893Sfenner
9256893Sfennerstatic void  msglogchar(int c, int pri);
9356893Sfennerstatic void  putchar(int ch, void *arg);
9456893Sfennerstatic char *ksprintn(char *nbuf, uintmax_t num, int base, int *len);
9556893Sfennerstatic void  snprintf_func(int ch, void *arg);
9656893Sfenner
9756893Sfennerstatic int consintr = 1;		/* Ok to handle console interrupts? */
9856893Sfennerstatic int msgbufmapped;		/* Set when safe to use msgbuf */
9956893Sfennerint msgbuftrigger;
10056893Sfenner
10156893Sfennerstatic int      log_console_output = 1;
10256893SfennerTUNABLE_INT("kern.log_console_output", &log_console_output);
10356893SfennerSYSCTL_INT(_kern, OID_AUTO, log_console_output, CTLFLAG_RW,
10456893Sfenner    &log_console_output, 0, "");
10556893Sfenner
10656893Sfenner/*
10756893Sfenner * Warn that a system table is full.
10856893Sfenner */
10956893Sfennervoid
11056893Sfennertablefull(const char *tab)
11156893Sfenner{
11256893Sfenner
11356893Sfenner	log(LOG_ERR, "%s: table is full\n", tab);
11456893Sfenner}
11556893Sfenner
11656893Sfenner/*
11756893Sfenner * Uprintf prints to the controlling terminal for the current process.
11856893Sfenner * It may block if the tty queue is overfull.  No message is printed if
11956893Sfenner * the queue does not clear in a reasonable time.
12056893Sfenner */
12156893Sfennerint
12256893Sfenneruprintf(const char *fmt, ...)
12356893Sfenner{
12456893Sfenner	struct thread *td = curthread;
12556893Sfenner	struct proc *p = td->td_proc;
12656893Sfenner	va_list ap;
127127668Sbms	struct putchar_arg pca;
12856893Sfenner	int retval;
12956893Sfenner
13056893Sfenner	if (td == NULL || td == PCPU_GET(idlethread))
13156893Sfenner		return (0);
13256893Sfenner
13356893Sfenner	p = td->td_proc;
13456893Sfenner	PROC_LOCK(p);
135127668Sbms	if ((p->p_flag & P_CONTROLT) == 0) {
13656893Sfenner		PROC_UNLOCK(p);
13756893Sfenner		return (0);
13856893Sfenner	}
139127668Sbms	SESS_LOCK(p->p_session);
14056893Sfenner	pca.tty = p->p_session->s_ttyp;
14156893Sfenner	SESS_UNLOCK(p->p_session);
14256893Sfenner	PROC_UNLOCK(p);
14356893Sfenner	if (pca.tty == NULL)
14456893Sfenner		return (0);
14556893Sfenner	pca.flags = TOTTY;
14656893Sfenner	va_start(ap, fmt);
14756893Sfenner	retval = kvprintf(fmt, putchar, &pca, 10, ap);
14856893Sfenner	va_end(ap);
14956893Sfenner
15056893Sfenner	return (retval);
15156893Sfenner}
15256893Sfenner
15356893Sfenner/*
15456893Sfenner * tprintf prints on the controlling terminal associated
15556893Sfenner * with the given session, possibly to the log as well.
15656893Sfenner */
15756893Sfennervoid
15875115Sfennertprintf(struct proc *p, int pri, const char *fmt, ...)
15956893Sfenner{
16056893Sfenner	struct tty *tp = NULL;
16156893Sfenner	int flags = 0;
16275115Sfenner	va_list ap;
16375115Sfenner	struct putchar_arg pca;
16456893Sfenner	struct session *sess = NULL;
16556893Sfenner
16656893Sfenner	if (pri != -1)
16756893Sfenner		flags |= TOLOG;
16856893Sfenner	if (p != NULL) {
16956893Sfenner		PROC_LOCK(p);
17056893Sfenner		if (p->p_flag & P_CONTROLT && p->p_session->s_ttyvp) {
17156893Sfenner			sess = p->p_session;
17256893Sfenner			SESS_LOCK(sess);
17356893Sfenner			PROC_UNLOCK(p);
17456893Sfenner			SESSHOLD(sess);
17556893Sfenner			tp = sess->s_ttyp;
17656893Sfenner			SESS_UNLOCK(sess);
177127668Sbms			if (ttycheckoutq(tp, 0))
17856893Sfenner				flags |= TOTTY;
17956893Sfenner			else
18056893Sfenner				tp = NULL;
18156893Sfenner		} else
18256893Sfenner			PROC_UNLOCK(p);
18356893Sfenner	}
18456893Sfenner	pca.pri = pri;
18556893Sfenner	pca.tty = tp;
18656893Sfenner	pca.flags = flags;
18756893Sfenner	va_start(ap, fmt);
18856893Sfenner	kvprintf(fmt, putchar, &pca, 10, ap);
18956893Sfenner	va_end(ap);
19056893Sfenner	if (sess != NULL) {
19156893Sfenner		SESS_LOCK(sess);
19256893Sfenner		SESSRELE(sess);
19356893Sfenner		SESS_UNLOCK(sess);
19456893Sfenner	}
19556893Sfenner	msgbuftrigger = 1;
19656893Sfenner}
19756893Sfenner
19856893Sfenner/*
19956893Sfenner * Ttyprintf displays a message on a tty; it should be used only by
20056893Sfenner * the tty driver, or anything that knows the underlying tty will not
20156893Sfenner * be revoke(2)'d away.  Other callers should use tprintf.
20256893Sfenner */
20356893Sfennerint
20456893Sfennerttyprintf(struct tty *tp, const char *fmt, ...)
20556893Sfenner{
20656893Sfenner	va_list ap;
20756893Sfenner	struct putchar_arg pca;
20856893Sfenner	int retval;
20956893Sfenner
21056893Sfenner	va_start(ap, fmt);
21156893Sfenner	pca.tty = tp;
21256893Sfenner	pca.flags = TOTTY;
21356893Sfenner	retval = kvprintf(fmt, putchar, &pca, 10, ap);
21456893Sfenner	va_end(ap);
21556893Sfenner	return (retval);
21656893Sfenner}
21756893Sfenner
21856893Sfenner/*
21975115Sfenner * Log writes to the log buffer, and guarantees not to sleep (so can be
22056893Sfenner * called by interrupt routines).  If there is no process reading the
22156893Sfenner * log yet, it writes to the console also.
22256893Sfenner */
22356893Sfennervoid
22456893Sfennerlog(int level, const char *fmt, ...)
22556893Sfenner{
22656893Sfenner	va_list ap;
22756893Sfenner	struct putchar_arg pca;
22856893Sfenner
22956893Sfenner	pca.tty = NULL;
23056893Sfenner	pca.pri = level;
23156893Sfenner	pca.flags = log_open ? TOLOG : TOCONS;
23256893Sfenner
23356893Sfenner	va_start(ap, fmt);
23456893Sfenner	kvprintf(fmt, putchar, &pca, 10, ap);
23556893Sfenner	va_end(ap);
23656893Sfenner
23756893Sfenner	msgbuftrigger = 1;
23856893Sfenner}
23956893Sfenner
24056893Sfenner#define CONSCHUNK 128
24156893Sfenner
24256893Sfennervoid
24356893Sfennerlog_console(struct uio *uio)
24456893Sfenner{
24556893Sfenner	int c, i, error, iovlen, nl;
24656893Sfenner	struct uio muio;
24756893Sfenner	struct iovec *miov = NULL;
24856893Sfenner	char *consbuffer;
24956893Sfenner	int pri;
25056893Sfenner
25156893Sfenner	if (!log_console_output)
25256893Sfenner		return;
25356893Sfenner
25456893Sfenner	pri = LOG_INFO | LOG_CONSOLE;
25556893Sfenner	muio = *uio;
25656893Sfenner	iovlen = uio->uio_iovcnt * sizeof (struct iovec);
25756893Sfenner	MALLOC(miov, struct iovec *, iovlen, M_TEMP, M_WAITOK);
25856893Sfenner	MALLOC(consbuffer, char *, CONSCHUNK, M_TEMP, M_WAITOK);
25975115Sfenner	bcopy(muio.uio_iov, miov, iovlen);
26056893Sfenner	muio.uio_iov = miov;
26156893Sfenner	uio = &muio;
26256893Sfenner
26356893Sfenner	nl = 0;
26456893Sfenner	while (uio->uio_resid > 0) {
26556893Sfenner		c = imin(uio->uio_resid, CONSCHUNK);
26656893Sfenner		error = uiomove(consbuffer, c, uio);
26756893Sfenner		if (error != 0)
26856893Sfenner			break;
26956893Sfenner		for (i = 0; i < c; i++) {
27056893Sfenner			msglogchar(consbuffer[i], pri);
27156893Sfenner			if (consbuffer[i] == '\n')
27256893Sfenner				nl = 1;
27356893Sfenner			else
27456893Sfenner				nl = 0;
27575115Sfenner		}
27656893Sfenner	}
27756893Sfenner	if (!nl)
27856893Sfenner		msglogchar('\n', pri);
27956893Sfenner	msgbuftrigger = 1;
28056893Sfenner	FREE(miov, M_TEMP);
28156893Sfenner	FREE(consbuffer, M_TEMP);
282	return;
283}
284
285int
286printf(const char *fmt, ...)
287{
288	va_list ap;
289	int savintr;
290	struct putchar_arg pca;
291	int retval;
292
293	savintr = consintr;		/* disable interrupts */
294	consintr = 0;
295	va_start(ap, fmt);
296	pca.tty = NULL;
297	pca.flags = TOCONS | TOLOG;
298	pca.pri = -1;
299	retval = kvprintf(fmt, putchar, &pca, 10, ap);
300	va_end(ap);
301	if (!panicstr)
302		msgbuftrigger = 1;
303	consintr = savintr;		/* reenable interrupts */
304	return (retval);
305}
306
307int
308vprintf(const char *fmt, va_list ap)
309{
310	int savintr;
311	struct putchar_arg pca;
312	int retval;
313
314	savintr = consintr;		/* disable interrupts */
315	consintr = 0;
316	pca.tty = NULL;
317	pca.flags = TOCONS | TOLOG;
318	pca.pri = -1;
319	retval = kvprintf(fmt, putchar, &pca, 10, ap);
320	if (!panicstr)
321		msgbuftrigger = 1;
322	consintr = savintr;		/* reenable interrupts */
323	return (retval);
324}
325
326/*
327 * Print a character on console or users terminal.  If destination is
328 * the console then the last bunch of characters are saved in msgbuf for
329 * inspection later.
330 */
331static void
332putchar(int c, void *arg)
333{
334	struct putchar_arg *ap = (struct putchar_arg*) arg;
335	struct tty *tp = ap->tty;
336	int consdirect, flags = ap->flags;
337
338	consdirect = ((flags & TOCONS) && constty == NULL);
339	/* Don't use the tty code after a panic or while in ddb. */
340	if (panicstr)
341		consdirect = 1;
342#ifdef DDB
343	if (db_active)
344		consdirect = 1;
345#endif
346	if (consdirect) {
347		if (c != '\0')
348			cnputc(c);
349	} else {
350		if ((flags & TOTTY) && tp != NULL)
351			tputchar(c, tp);
352		if ((flags & TOCONS) && constty != NULL)
353			msgbuf_addchar(&consmsgbuf, c);
354	}
355	if ((flags & TOLOG))
356		msglogchar(c, ap->pri);
357}
358
359/*
360 * Scaled down version of sprintf(3).
361 */
362int
363sprintf(char *buf, const char *cfmt, ...)
364{
365	int retval;
366	va_list ap;
367
368	va_start(ap, cfmt);
369	retval = kvprintf(cfmt, NULL, (void *)buf, 10, ap);
370	buf[retval] = '\0';
371	va_end(ap);
372	return (retval);
373}
374
375/*
376 * Scaled down version of vsprintf(3).
377 */
378int
379vsprintf(char *buf, const char *cfmt, va_list ap)
380{
381	int retval;
382
383	retval = kvprintf(cfmt, NULL, (void *)buf, 10, ap);
384	buf[retval] = '\0';
385	return (retval);
386}
387
388/*
389 * Scaled down version of snprintf(3).
390 */
391int
392snprintf(char *str, size_t size, const char *format, ...)
393{
394	int retval;
395	va_list ap;
396
397	va_start(ap, format);
398	retval = vsnprintf(str, size, format, ap);
399	va_end(ap);
400	return(retval);
401}
402
403/*
404 * Scaled down version of vsnprintf(3).
405 */
406int
407vsnprintf(char *str, size_t size, const char *format, va_list ap)
408{
409	struct snprintf_arg info;
410	int retval;
411
412	info.str = str;
413	info.remain = size;
414	retval = kvprintf(format, snprintf_func, &info, 10, ap);
415	if (info.remain >= 1)
416		*info.str++ = '\0';
417	return (retval);
418}
419
420/*
421 * Kernel version which takes radix argument vsnprintf(3).
422 */
423int
424vsnrprintf(char *str, size_t size, int radix, const char *format, va_list ap)
425{
426	struct snprintf_arg info;
427	int retval;
428
429	info.str = str;
430	info.remain = size;
431	retval = kvprintf(format, snprintf_func, &info, radix, ap);
432	if (info.remain >= 1)
433		*info.str++ = '\0';
434	return (retval);
435}
436
437static void
438snprintf_func(int ch, void *arg)
439{
440	struct snprintf_arg *const info = arg;
441
442	if (info->remain >= 2) {
443		*info->str++ = ch;
444		info->remain--;
445	}
446}
447
448/*
449 * Put a NUL-terminated ASCII number (base <= 36) in a buffer in reverse
450 * order; return an optional length and a pointer to the last character
451 * written in the buffer (i.e., the first character of the string).
452 * The buffer pointed to by `nbuf' must have length >= MAXNBUF.
453 */
454static char *
455ksprintn(char *nbuf, uintmax_t num, int base, int *lenp)
456{
457	char *p;
458
459	p = nbuf;
460	*p = '\0';
461	do {
462		*++p = hex2ascii(num % base);
463	} while (num /= base);
464	if (lenp)
465		*lenp = p - nbuf;
466	return (p);
467}
468
469/*
470 * Scaled down version of printf(3).
471 *
472 * Two additional formats:
473 *
474 * The format %b is supported to decode error registers.
475 * Its usage is:
476 *
477 *	printf("reg=%b\n", regval, "<base><arg>*");
478 *
479 * where <base> is the output base expressed as a control character, e.g.
480 * \10 gives octal; \20 gives hex.  Each arg is a sequence of characters,
481 * the first of which gives the bit number to be inspected (origin 1), and
482 * the next characters (up to a control character, i.e. a character <= 32),
483 * give the name of the register.  Thus:
484 *
485 *	kvprintf("reg=%b\n", 3, "\10\2BITTWO\1BITONE\n");
486 *
487 * would produce output:
488 *
489 *	reg=3<BITTWO,BITONE>
490 *
491 * XXX:  %D  -- Hexdump, takes pointer and separator string:
492 *		("%6D", ptr, ":")   -> XX:XX:XX:XX:XX:XX
493 *		("%*D", len, ptr, " " -> XX XX XX XX ...
494 */
495int
496kvprintf(char const *fmt, void (*func)(int, void*), void *arg, int radix, va_list ap)
497{
498#define PCHAR(c) {int cc=(c); if (func) (*func)(cc,arg); else *d++ = cc; retval++; }
499	char nbuf[MAXNBUF];
500	char *d;
501	const char *p, *percent, *q;
502	u_char *up;
503	int ch, n;
504	uintmax_t num;
505	int base, lflag, qflag, tmp, width, ladjust, sharpflag, neg, sign, dot;
506	int jflag, tflag, zflag;
507	int dwidth;
508	char padc;
509	int retval = 0;
510
511	num = 0;
512	if (!func)
513		d = (char *) arg;
514	else
515		d = NULL;
516
517	if (fmt == NULL)
518		fmt = "(fmt null)\n";
519
520	if (radix < 2 || radix > 36)
521		radix = 10;
522
523	for (;;) {
524		padc = ' ';
525		width = 0;
526		while ((ch = (u_char)*fmt++) != '%') {
527			if (ch == '\0')
528				return (retval);
529			PCHAR(ch);
530		}
531		percent = fmt - 1;
532		qflag = 0; lflag = 0; ladjust = 0; sharpflag = 0; neg = 0;
533		sign = 0; dot = 0; dwidth = 0;
534		jflag = 0; tflag = 0; zflag = 0;
535reswitch:	switch (ch = (u_char)*fmt++) {
536		case '.':
537			dot = 1;
538			goto reswitch;
539		case '#':
540			sharpflag = 1;
541			goto reswitch;
542		case '+':
543			sign = 1;
544			goto reswitch;
545		case '-':
546			ladjust = 1;
547			goto reswitch;
548		case '%':
549			PCHAR(ch);
550			break;
551		case '*':
552			if (!dot) {
553				width = va_arg(ap, int);
554				if (width < 0) {
555					ladjust = !ladjust;
556					width = -width;
557				}
558			} else {
559				dwidth = va_arg(ap, int);
560			}
561			goto reswitch;
562		case '0':
563			if (!dot) {
564				padc = '0';
565				goto reswitch;
566			}
567		case '1': case '2': case '3': case '4':
568		case '5': case '6': case '7': case '8': case '9':
569				for (n = 0;; ++fmt) {
570					n = n * 10 + ch - '0';
571					ch = *fmt;
572					if (ch < '0' || ch > '9')
573						break;
574				}
575			if (dot)
576				dwidth = n;
577			else
578				width = n;
579			goto reswitch;
580		case 'b':
581			num = (u_int)va_arg(ap, int);
582			p = va_arg(ap, char *);
583			for (q = ksprintn(nbuf, num, *p++, NULL); *q;)
584				PCHAR(*q--);
585
586			if (num == 0)
587				break;
588
589			for (tmp = 0; *p;) {
590				n = *p++;
591				if (num & (1 << (n - 1))) {
592					PCHAR(tmp ? ',' : '<');
593					for (; (n = *p) > ' '; ++p)
594						PCHAR(n);
595					tmp = 1;
596				} else
597					for (; *p > ' '; ++p)
598						continue;
599			}
600			if (tmp)
601				PCHAR('>');
602			break;
603		case 'c':
604			PCHAR(va_arg(ap, int));
605			break;
606		case 'D':
607			up = va_arg(ap, u_char *);
608			p = va_arg(ap, char *);
609			if (!width)
610				width = 16;
611			while(width--) {
612				PCHAR(hex2ascii(*up >> 4));
613				PCHAR(hex2ascii(*up & 0x0f));
614				up++;
615				if (width)
616					for (q=p;*q;q++)
617						PCHAR(*q);
618			}
619			break;
620		case 'd':
621		case 'i':
622			base = 10;
623			sign = 1;
624			goto handle_sign;
625		case 'j':
626			jflag = 1;
627			goto reswitch;
628		case 'l':
629			if (lflag) {
630				lflag = 0;
631				qflag = 1;
632			} else
633				lflag = 1;
634			goto reswitch;
635		case 'n':
636			if (jflag)
637				*(va_arg(ap, intmax_t *)) = retval;
638			else if (qflag)
639				*(va_arg(ap, quad_t *)) = retval;
640			else if (lflag)
641				*(va_arg(ap, long *)) = retval;
642			else if (zflag)
643				*(va_arg(ap, size_t *)) = retval;
644			else
645				*(va_arg(ap, int *)) = retval;
646			break;
647		case 'o':
648			base = 8;
649			goto handle_nosign;
650		case 'p':
651			base = 16;
652			sharpflag = (width == 0);
653			sign = 0;
654			num = (uintptr_t)va_arg(ap, void *);
655			goto number;
656		case 'q':
657			qflag = 1;
658			goto reswitch;
659		case 'r':
660			base = radix;
661			if (sign)
662				goto handle_sign;
663			goto handle_nosign;
664		case 's':
665			p = va_arg(ap, char *);
666			if (p == NULL)
667				p = "(null)";
668			if (!dot)
669				n = strlen (p);
670			else
671				for (n = 0; n < dwidth && p[n]; n++)
672					continue;
673
674			width -= n;
675
676			if (!ladjust && width > 0)
677				while (width--)
678					PCHAR(padc);
679			while (n--)
680				PCHAR(*p++);
681			if (ladjust && width > 0)
682				while (width--)
683					PCHAR(padc);
684			break;
685		case 't':
686			tflag = 1;
687			goto reswitch;
688		case 'u':
689			base = 10;
690			goto handle_nosign;
691		case 'x':
692		case 'X':
693			base = 16;
694			goto handle_nosign;
695		case 'y':
696			base = 16;
697			sign = 1;
698			goto handle_sign;
699		case 'z':
700			zflag = 1;
701			goto reswitch;
702handle_nosign:
703			sign = 0;
704			if (jflag)
705				num = va_arg(ap, uintmax_t);
706			else if (qflag)
707				num = va_arg(ap, u_quad_t);
708			else if (tflag)
709				num = va_arg(ap, ptrdiff_t);
710			else if (lflag)
711				num = va_arg(ap, u_long);
712			else if (zflag)
713				num = va_arg(ap, size_t);
714			else
715				num = va_arg(ap, u_int);
716			goto number;
717handle_sign:
718			if (jflag)
719				num = va_arg(ap, intmax_t);
720			else if (qflag)
721				num = va_arg(ap, quad_t);
722			else if (tflag)
723				num = va_arg(ap, ptrdiff_t);
724			else if (lflag)
725				num = va_arg(ap, long);
726			else if (zflag)
727				num = va_arg(ap, size_t);
728			else
729				num = va_arg(ap, int);
730number:
731			if (sign && (intmax_t)num < 0) {
732				neg = 1;
733				num = -(intmax_t)num;
734			}
735			p = ksprintn(nbuf, num, base, &tmp);
736			if (sharpflag && num != 0) {
737				if (base == 8)
738					tmp++;
739				else if (base == 16)
740					tmp += 2;
741			}
742			if (neg)
743				tmp++;
744
745			if (!ladjust && width && (width -= tmp) > 0)
746				while (width--)
747					PCHAR(padc);
748			if (neg)
749				PCHAR('-');
750			if (sharpflag && num != 0) {
751				if (base == 8) {
752					PCHAR('0');
753				} else if (base == 16) {
754					PCHAR('0');
755					PCHAR('x');
756				}
757			}
758
759			while (*p)
760				PCHAR(*p--);
761
762			if (ladjust && width && (width -= tmp) > 0)
763				while (width--)
764					PCHAR(padc);
765
766			break;
767		default:
768			while (percent < fmt)
769				PCHAR(*percent++);
770			break;
771		}
772	}
773#undef PCHAR
774}
775
776/*
777 * Put character in log buffer with a particular priority.
778 */
779static void
780msglogchar(int c, int pri)
781{
782	static int lastpri = -1;
783	static int dangling;
784	char nbuf[MAXNBUF];
785	char *p;
786
787	if (!msgbufmapped)
788		return;
789	if (c == '\0' || c == '\r')
790		return;
791	if (pri != -1 && pri != lastpri) {
792		if (dangling) {
793			msgbuf_addchar(msgbufp, '\n');
794			dangling = 0;
795		}
796		msgbuf_addchar(msgbufp, '<');
797		for (p = ksprintn(nbuf, (uintmax_t)pri, 10, NULL); *p;)
798			msgbuf_addchar(msgbufp, *p--);
799		msgbuf_addchar(msgbufp, '>');
800		lastpri = pri;
801	}
802	msgbuf_addchar(msgbufp, c);
803	if (c == '\n') {
804		dangling = 0;
805		lastpri = -1;
806	} else {
807		dangling = 1;
808	}
809}
810
811void
812msgbufinit(void *ptr, int size)
813{
814	char *cp;
815	static struct msgbuf *oldp = NULL;
816
817	size -= sizeof(*msgbufp);
818	cp = (char *)ptr;
819	msgbufp = (struct msgbuf *)(cp + size);
820	msgbuf_reinit(msgbufp, cp, size);
821	if (msgbufmapped && oldp != msgbufp)
822		msgbuf_copy(oldp, msgbufp);
823	msgbufmapped = 1;
824	oldp = msgbufp;
825}
826
827SYSCTL_DECL(_security_bsd);
828
829static int unprivileged_read_msgbuf = 1;
830SYSCTL_INT(_security_bsd, OID_AUTO, unprivileged_read_msgbuf,
831    CTLFLAG_RW, &unprivileged_read_msgbuf, 0,
832    "Unprivileged processes may read the kernel message buffer");
833
834/* Sysctls for accessing/clearing the msgbuf */
835static int
836sysctl_kern_msgbuf(SYSCTL_HANDLER_ARGS)
837{
838	char buf[128];
839	u_int seq;
840	int error, len;
841
842	if (!unprivileged_read_msgbuf) {
843		error = suser(req->td);
844		if (error)
845			return (error);
846	}
847
848	/* Read the whole buffer, one chunk at a time. */
849	msgbuf_peekbytes(msgbufp, NULL, 0, &seq);
850	while ((len = msgbuf_peekbytes(msgbufp, buf, sizeof(buf), &seq)) > 0) {
851		error = sysctl_handle_opaque(oidp, buf, len, req);
852		if (error)
853			return (error);
854	}
855	return (0);
856}
857
858SYSCTL_PROC(_kern, OID_AUTO, msgbuf, CTLTYPE_STRING | CTLFLAG_RD,
859    0, 0, sysctl_kern_msgbuf, "A", "Contents of kernel message buffer");
860
861static int msgbuf_clearflag;
862
863static int
864sysctl_kern_msgbuf_clear(SYSCTL_HANDLER_ARGS)
865{
866	int error;
867	error = sysctl_handle_int(oidp, oidp->oid_arg1, oidp->oid_arg2, req);
868	if (!error && req->newptr) {
869		msgbuf_clear(msgbufp);
870		msgbuf_clearflag = 0;
871	}
872	return (error);
873}
874
875SYSCTL_PROC(_kern, OID_AUTO, msgbuf_clear,
876    CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_SECURE, &msgbuf_clearflag, 0,
877    sysctl_kern_msgbuf_clear, "I", "Clear kernel message buffer");
878
879#ifdef DDB
880
881DB_SHOW_COMMAND(msgbuf, db_show_msgbuf)
882{
883	int i, j;
884
885	if (!msgbufmapped) {
886		db_printf("msgbuf not mapped yet\n");
887		return;
888	}
889	db_printf("msgbufp = %p\n", msgbufp);
890	db_printf("magic = %x, size = %d, r= %u, w = %u, ptr = %p, cksum= %u\n",
891	    msgbufp->msg_magic, msgbufp->msg_size, msgbufp->msg_rseq,
892	    msgbufp->msg_wseq, msgbufp->msg_ptr, msgbufp->msg_cksum);
893	for (i = 0; i < msgbufp->msg_size; i++) {
894		j = MSGBUF_SEQ_TO_POS(msgbufp, i + msgbufp->msg_rseq);
895		db_printf("%c", msgbufp->msg_ptr[j]);
896	}
897	db_printf("\n");
898}
899
900#endif /* DDB */
901