1 /* $OpenBSD: subr_log.c,v 1.80 2024/12/30 02:46:00 guenther Exp $ */ 2 /* $NetBSD: subr_log.c,v 1.11 1996/03/30 22:24:44 christos Exp $ */ 3 4 /* 5 * Copyright (c) 1982, 1986, 1993 6 * The Regents of the University of California. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. Neither the name of the University nor the names of its contributors 17 * may be used to endorse or promote products derived from this software 18 * without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 * 32 * @(#)subr_log.c 8.1 (Berkeley) 6/10/93 33 */ 34 35 /* 36 * Error log buffer for kernel printf's. 37 */ 38 39 #include <sys/param.h> 40 #include <sys/systm.h> 41 #include <sys/proc.h> 42 #include <sys/vnode.h> 43 #include <sys/ioctl.h> 44 #include <sys/msgbuf.h> 45 #include <sys/file.h> 46 #include <sys/tty.h> 47 #include <sys/signalvar.h> 48 #include <sys/syslog.h> 49 #include <sys/malloc.h> 50 #include <sys/filedesc.h> 51 #include <sys/socket.h> 52 #include <sys/socketvar.h> 53 #include <sys/event.h> 54 #include <sys/fcntl.h> 55 #include <sys/mutex.h> 56 #include <sys/timeout.h> 57 58 #ifdef KTRACE 59 #include <sys/ktrace.h> 60 #endif 61 62 #include <sys/mount.h> 63 #include <sys/syscallargs.h> 64 65 #include <dev/cons.h> 66 67 #define LOG_RDPRI (PZERO + 1) 68 #define LOG_TICK 50 /* log tick interval in msec */ 69 70 #define LOG_ASYNC 0x04 71 #define LOG_RDWAIT 0x08 72 73 /* 74 * Locking: 75 * L log_mtx 76 * Q log_kq_mtx 77 */ 78 struct logsoftc { 79 int sc_state; /* [L] see above for possibilities */ 80 struct klist sc_klist; /* [Q] process waiting on kevent call */ 81 struct sigio_ref sc_sigio; /* async I/O registration */ 82 int sc_need_wakeup; /* if set, wake up waiters */ 83 struct timeout sc_tick; /* wakeup poll timeout */ 84 } logsoftc; 85 86 int log_open; /* also used in log() */ 87 int msgbufmapped; /* is the message buffer mapped */ 88 struct msgbuf *msgbufp; /* the mapped buffer, itself. */ 89 struct msgbuf *consbufp; /* console message buffer. */ 90 91 struct file *syslogf; 92 struct rwlock syslogf_rwlock = RWLOCK_INITIALIZER("syslogf"); 93 94 /* 95 * Lock that serializes access to log message buffers. 96 * This should be kept as a leaf lock in order not to constrain where 97 * printf(9) can be used. 98 */ 99 struct mutex log_mtx = 100 MUTEX_INITIALIZER_FLAGS(IPL_HIGH, "logmtx", MTX_NOWITNESS); 101 struct mutex log_kq_mtx = 102 MUTEX_INITIALIZER_FLAGS(IPL_HIGH, "logkqmtx", MTX_NOWITNESS); 103 104 void filt_logrdetach(struct knote *kn); 105 int filt_logread(struct knote *kn, long hint); 106 int filt_logmodify(struct kevent *, struct knote *); 107 int filt_logprocess(struct knote *, struct kevent *); 108 109 const struct filterops logread_filtops = { 110 .f_flags = FILTEROP_ISFD | FILTEROP_MPSAFE, 111 .f_attach = NULL, 112 .f_detach = filt_logrdetach, 113 .f_event = filt_logread, 114 .f_modify = filt_logmodify, 115 .f_process = filt_logprocess, 116 }; 117 118 int dosendsyslog(struct proc *, const char *, size_t, int, enum uio_seg); 119 void logtick(void *); 120 size_t msgbuf_getlen(struct msgbuf *); 121 void msgbuf_putchar_locked(struct msgbuf *, const char); 122 123 void 124 initmsgbuf(caddr_t buf, size_t bufsize) 125 { 126 struct msgbuf *mbp; 127 long new_bufs; 128 129 /* Sanity-check the given size. */ 130 if (bufsize < sizeof(struct msgbuf)) 131 return; 132 133 mbp = msgbufp = (struct msgbuf *)buf; 134 135 new_bufs = bufsize - offsetof(struct msgbuf, msg_bufc); 136 if ((mbp->msg_magic != MSG_MAGIC) || (mbp->msg_bufs != new_bufs) || 137 (mbp->msg_bufr < 0) || (mbp->msg_bufr >= mbp->msg_bufs) || 138 (mbp->msg_bufx < 0) || (mbp->msg_bufx >= mbp->msg_bufs)) { 139 /* 140 * If the buffer magic number is wrong, has changed 141 * size (which shouldn't happen often), or is 142 * internally inconsistent, initialize it. 143 */ 144 145 memset(buf, 0, bufsize); 146 mbp->msg_magic = MSG_MAGIC; 147 mbp->msg_bufs = new_bufs; 148 } 149 150 /* 151 * Always start new buffer data on a new line. 152 * Avoid using log_mtx because mutexes do not work during early boot 153 * on some architectures. 154 */ 155 if (mbp->msg_bufx > 0 && mbp->msg_bufc[mbp->msg_bufx - 1] != '\n') 156 msgbuf_putchar_locked(mbp, '\n'); 157 158 /* mark it as ready for use. */ 159 msgbufmapped = 1; 160 } 161 162 void 163 initconsbuf(void) 164 { 165 /* Set up a buffer to collect /dev/console output */ 166 consbufp = malloc(CONSBUFSIZE, M_TTYS, M_WAITOK | M_ZERO); 167 consbufp->msg_magic = MSG_MAGIC; 168 consbufp->msg_bufs = CONSBUFSIZE - offsetof(struct msgbuf, msg_bufc); 169 } 170 171 void 172 msgbuf_putchar(struct msgbuf *mbp, const char c) 173 { 174 if (mbp->msg_magic != MSG_MAGIC) 175 /* Nothing we can do */ 176 return; 177 178 mtx_enter(&log_mtx); 179 msgbuf_putchar_locked(mbp, c); 180 mtx_leave(&log_mtx); 181 } 182 183 void 184 msgbuf_putchar_locked(struct msgbuf *mbp, const char c) 185 { 186 mbp->msg_bufc[mbp->msg_bufx++] = c; 187 if (mbp->msg_bufx < 0 || mbp->msg_bufx >= mbp->msg_bufs) 188 mbp->msg_bufx = 0; 189 /* If the buffer is full, keep the most recent data. */ 190 if (mbp->msg_bufr == mbp->msg_bufx) { 191 if (++mbp->msg_bufr >= mbp->msg_bufs) 192 mbp->msg_bufr = 0; 193 mbp->msg_bufd++; 194 } 195 } 196 197 size_t 198 msgbuf_getlen(struct msgbuf *mbp) 199 { 200 long len; 201 202 len = mbp->msg_bufx - mbp->msg_bufr; 203 if (len < 0) 204 len += mbp->msg_bufs; 205 return (len); 206 } 207 208 int 209 logopen(dev_t dev, int flags, int mode, struct proc *p) 210 { 211 if (log_open) 212 return (EBUSY); 213 log_open = 1; 214 klist_init_mutex(&logsoftc.sc_klist, &log_kq_mtx); 215 sigio_init(&logsoftc.sc_sigio); 216 timeout_set(&logsoftc.sc_tick, logtick, NULL); 217 timeout_add_msec(&logsoftc.sc_tick, LOG_TICK); 218 return (0); 219 } 220 221 int 222 logclose(dev_t dev, int flag, int mode, struct proc *p) 223 { 224 struct file *fp; 225 226 rw_enter_write(&syslogf_rwlock); 227 fp = syslogf; 228 syslogf = NULL; 229 rw_exit(&syslogf_rwlock); 230 231 if (fp) 232 FRELE(fp, p); 233 log_open = 0; 234 timeout_del(&logsoftc.sc_tick); 235 236 klist_invalidate(&logsoftc.sc_klist); 237 klist_free(&logsoftc.sc_klist); 238 239 logsoftc.sc_state = 0; 240 sigio_free(&logsoftc.sc_sigio); 241 return (0); 242 } 243 244 int 245 logread(dev_t dev, struct uio *uio, int flag) 246 { 247 struct msgbuf *mbp = msgbufp; 248 size_t l, rpos; 249 int error = 0; 250 251 mtx_enter(&log_mtx); 252 while (mbp->msg_bufr == mbp->msg_bufx) { 253 if (flag & IO_NDELAY) { 254 error = EWOULDBLOCK; 255 goto out; 256 } 257 logsoftc.sc_state |= LOG_RDWAIT; 258 mtx_leave(&log_mtx); 259 /* 260 * Set up and enter sleep manually instead of using msleep() 261 * to keep log_mtx as a leaf lock. 262 */ 263 sleep_setup(mbp, LOG_RDPRI | PCATCH, "klog"); 264 error = sleep_finish(0, logsoftc.sc_state & LOG_RDWAIT); 265 mtx_enter(&log_mtx); 266 if (error) 267 goto out; 268 } 269 270 if (mbp->msg_bufd > 0) { 271 char buf[64]; 272 long ndropped; 273 274 ndropped = mbp->msg_bufd; 275 mtx_leave(&log_mtx); 276 l = snprintf(buf, sizeof(buf), 277 "<%d>klog: dropped %ld byte%s, message buffer full\n", 278 LOG_KERN|LOG_WARNING, ndropped, 279 ndropped == 1 ? "" : "s"); 280 error = uiomove(buf, ulmin(l, sizeof(buf) - 1), uio); 281 mtx_enter(&log_mtx); 282 if (error) 283 goto out; 284 mbp->msg_bufd -= ndropped; 285 } 286 287 while (uio->uio_resid > 0) { 288 if (mbp->msg_bufx >= mbp->msg_bufr) 289 l = mbp->msg_bufx - mbp->msg_bufr; 290 else 291 l = mbp->msg_bufs - mbp->msg_bufr; 292 l = ulmin(l, uio->uio_resid); 293 if (l == 0) 294 break; 295 rpos = mbp->msg_bufr; 296 mtx_leave(&log_mtx); 297 /* Ignore that concurrent readers may consume the same data. */ 298 error = uiomove(&mbp->msg_bufc[rpos], l, uio); 299 mtx_enter(&log_mtx); 300 if (error) 301 break; 302 mbp->msg_bufr += l; 303 if (mbp->msg_bufr < 0 || mbp->msg_bufr >= mbp->msg_bufs) 304 mbp->msg_bufr = 0; 305 } 306 out: 307 mtx_leave(&log_mtx); 308 return (error); 309 } 310 311 int 312 logkqfilter(dev_t dev, struct knote *kn) 313 { 314 struct klist *klist; 315 316 switch (kn->kn_filter) { 317 case EVFILT_READ: 318 klist = &logsoftc.sc_klist; 319 kn->kn_fop = &logread_filtops; 320 break; 321 default: 322 return (EINVAL); 323 } 324 325 kn->kn_hook = (void *)msgbufp; 326 klist_insert(klist, kn); 327 328 return (0); 329 } 330 331 void 332 filt_logrdetach(struct knote *kn) 333 { 334 klist_remove(&logsoftc.sc_klist, kn); 335 } 336 337 int 338 filt_logread(struct knote *kn, long hint) 339 { 340 struct msgbuf *mbp = kn->kn_hook; 341 342 mtx_enter(&log_mtx); 343 kn->kn_data = msgbuf_getlen(mbp); 344 mtx_leave(&log_mtx); 345 return (kn->kn_data != 0); 346 } 347 348 int 349 filt_logmodify(struct kevent *kev, struct knote *kn) 350 { 351 int active; 352 353 mtx_enter(&log_kq_mtx); 354 active = knote_modify(kev, kn); 355 mtx_leave(&log_kq_mtx); 356 357 return (active); 358 } 359 360 int 361 filt_logprocess(struct knote *kn, struct kevent *kev) 362 { 363 int active; 364 365 mtx_enter(&log_kq_mtx); 366 active = knote_process(kn, kev); 367 mtx_leave(&log_kq_mtx); 368 369 return (active); 370 } 371 372 void 373 logwakeup(void) 374 { 375 /* 376 * The actual wakeup has to be deferred because logwakeup() can be 377 * called in very varied contexts. 378 * Keep the print routines usable in as many situations as possible 379 * by not using locking here. 380 */ 381 382 /* 383 * Ensure that preceding stores become visible to other CPUs 384 * before the flag. 385 */ 386 membar_producer(); 387 388 logsoftc.sc_need_wakeup = 1; 389 } 390 391 void 392 logtick(void *arg) 393 { 394 int state; 395 396 if (!log_open) 397 return; 398 399 if (!logsoftc.sc_need_wakeup) 400 goto out; 401 logsoftc.sc_need_wakeup = 0; 402 403 /* 404 * sc_need_wakeup has to be cleared before handling the wakeup. 405 * Visiting log_mtx ensures the proper order. 406 */ 407 408 mtx_enter(&log_mtx); 409 state = logsoftc.sc_state; 410 if (logsoftc.sc_state & LOG_RDWAIT) 411 logsoftc.sc_state &= ~LOG_RDWAIT; 412 mtx_leave(&log_mtx); 413 414 knote(&logsoftc.sc_klist, 0); 415 416 if (state & LOG_ASYNC) 417 pgsigio(&logsoftc.sc_sigio, SIGIO, 0); 418 if (state & LOG_RDWAIT) 419 wakeup(msgbufp); 420 out: 421 timeout_add_msec(&logsoftc.sc_tick, LOG_TICK); 422 } 423 424 int 425 logioctl(dev_t dev, u_long com, caddr_t data, int flag, struct proc *p) 426 { 427 struct file *fp, *newfp; 428 int error; 429 430 switch (com) { 431 432 /* return number of characters immediately available */ 433 case FIONREAD: 434 mtx_enter(&log_mtx); 435 *(int *)data = (int)msgbuf_getlen(msgbufp); 436 mtx_leave(&log_mtx); 437 break; 438 439 case FIOASYNC: 440 mtx_enter(&log_mtx); 441 if (*(int *)data) 442 logsoftc.sc_state |= LOG_ASYNC; 443 else 444 logsoftc.sc_state &= ~LOG_ASYNC; 445 mtx_leave(&log_mtx); 446 break; 447 448 case FIOSETOWN: 449 case TIOCSPGRP: 450 return (sigio_setown(&logsoftc.sc_sigio, com, data)); 451 452 case FIOGETOWN: 453 case TIOCGPGRP: 454 sigio_getown(&logsoftc.sc_sigio, com, data); 455 break; 456 457 case LIOCSFD: 458 if ((error = suser(p)) != 0) 459 return (error); 460 if ((error = getsock(p, *(int *)data, &newfp)) != 0) 461 return (error); 462 463 rw_enter_write(&syslogf_rwlock); 464 fp = syslogf; 465 syslogf = newfp; 466 rw_exit(&syslogf_rwlock); 467 468 if (fp) 469 FRELE(fp, p); 470 break; 471 472 default: 473 return (ENOTTY); 474 } 475 return (0); 476 } 477 478 /* 479 * If syslogd is not running, temporarily store a limited amount of messages 480 * in kernel. After log stash is full, drop messages and count them. When 481 * syslogd is available again, next log message will flush the stashed 482 * messages and insert a message with drop count. Calls to malloc(9) and 483 * copyin(9) may sleep, protect data structures with rwlock. 484 */ 485 486 #define LOGSTASH_SIZE 100 487 struct logstash_message { 488 char *lgs_buffer; 489 size_t lgs_size; 490 } logstash_messages[LOGSTASH_SIZE]; 491 492 struct logstash_message *logstash_in = &logstash_messages[0]; 493 struct logstash_message *logstash_out = &logstash_messages[0]; 494 495 struct rwlock logstash_rwlock = RWLOCK_INITIALIZER("logstash"); 496 497 int logstash_dropped, logstash_error, logstash_pid; 498 499 int logstash_insert(const char *, size_t, int, pid_t); 500 void logstash_remove(void); 501 int logstash_sendsyslog(struct proc *); 502 503 static inline int 504 logstash_full(void) 505 { 506 rw_assert_anylock(&logstash_rwlock); 507 508 return logstash_out->lgs_buffer != NULL && 509 logstash_in == logstash_out; 510 } 511 512 static inline void 513 logstash_increment(struct logstash_message **msg) 514 { 515 rw_assert_wrlock(&logstash_rwlock); 516 517 KASSERT((*msg) >= &logstash_messages[0]); 518 KASSERT((*msg) < &logstash_messages[LOGSTASH_SIZE]); 519 if ((*msg) == &logstash_messages[LOGSTASH_SIZE - 1]) 520 (*msg) = &logstash_messages[0]; 521 else 522 (*msg)++; 523 } 524 525 int 526 logstash_insert(const char *buf, size_t nbyte, int logerror, pid_t pid) 527 { 528 int error; 529 530 rw_enter_write(&logstash_rwlock); 531 532 if (logstash_full()) { 533 if (logstash_dropped == 0) { 534 logstash_error = logerror; 535 logstash_pid = pid; 536 } 537 logstash_dropped++; 538 539 rw_exit(&logstash_rwlock); 540 return (0); 541 } 542 543 logstash_in->lgs_buffer = malloc(nbyte, M_LOG, M_WAITOK); 544 error = copyin(buf, logstash_in->lgs_buffer, nbyte); 545 if (error) { 546 free(logstash_in->lgs_buffer, M_LOG, nbyte); 547 logstash_in->lgs_buffer = NULL; 548 549 rw_exit(&logstash_rwlock); 550 return (error); 551 } 552 logstash_in->lgs_size = nbyte; 553 logstash_increment(&logstash_in); 554 555 rw_exit(&logstash_rwlock); 556 return (0); 557 } 558 559 void 560 logstash_remove(void) 561 { 562 rw_assert_wrlock(&logstash_rwlock); 563 564 KASSERT(logstash_out->lgs_buffer != NULL); 565 free(logstash_out->lgs_buffer, M_LOG, logstash_out->lgs_size); 566 logstash_out->lgs_buffer = NULL; 567 logstash_increment(&logstash_out); 568 569 /* Insert dropped message in sequence where messages were dropped. */ 570 if (logstash_dropped) { 571 size_t l, nbyte; 572 char buf[80]; 573 574 l = snprintf(buf, sizeof(buf), 575 "<%d>sendsyslog: dropped %d message%s, error %d, pid %d", 576 LOG_KERN|LOG_WARNING, logstash_dropped, 577 logstash_dropped == 1 ? "" : "s", 578 logstash_error, logstash_pid); 579 logstash_dropped = 0; 580 logstash_error = 0; 581 logstash_pid = 0; 582 583 /* Cannot fail, we have just freed a slot. */ 584 KASSERT(!logstash_full()); 585 nbyte = ulmin(l, sizeof(buf) - 1); 586 logstash_in->lgs_buffer = malloc(nbyte, M_LOG, M_WAITOK); 587 memcpy(logstash_in->lgs_buffer, buf, nbyte); 588 logstash_in->lgs_size = nbyte; 589 logstash_increment(&logstash_in); 590 } 591 } 592 593 int 594 logstash_sendsyslog(struct proc *p) 595 { 596 int error; 597 598 rw_enter_write(&logstash_rwlock); 599 600 while (logstash_out->lgs_buffer != NULL) { 601 error = dosendsyslog(p, logstash_out->lgs_buffer, 602 logstash_out->lgs_size, 0, UIO_SYSSPACE); 603 if (error) { 604 rw_exit(&logstash_rwlock); 605 return (error); 606 } 607 logstash_remove(); 608 } 609 610 rw_exit(&logstash_rwlock); 611 return (0); 612 } 613 614 /* 615 * Send syslog(3) message from userland to socketpair(2) created by syslogd(8). 616 * Store message in kernel log stash for later if syslogd(8) is not available 617 * or sending fails. Send to console if LOG_CONS is set and syslogd(8) socket 618 * does not exist. 619 */ 620 621 int 622 sys_sendsyslog(struct proc *p, void *v, register_t *retval) 623 { 624 struct sys_sendsyslog_args /* { 625 syscallarg(const char *) buf; 626 syscallarg(size_t) nbyte; 627 syscallarg(int) flags; 628 } */ *uap = v; 629 size_t nbyte; 630 int error; 631 632 nbyte = SCARG(uap, nbyte); 633 if (nbyte > LOG_MAXLINE) 634 nbyte = LOG_MAXLINE; 635 636 logstash_sendsyslog(p); 637 error = dosendsyslog(p, SCARG(uap, buf), nbyte, SCARG(uap, flags), 638 UIO_USERSPACE); 639 if (error && error != EFAULT) 640 logstash_insert(SCARG(uap, buf), nbyte, error, p->p_p->ps_pid); 641 return (error); 642 } 643 644 int 645 dosendsyslog(struct proc *p, const char *buf, size_t nbyte, int flags, 646 enum uio_seg sflg) 647 { 648 #ifdef KTRACE 649 struct iovec ktriov; 650 #endif 651 struct file *fp; 652 char pri[6], *kbuf; 653 struct iovec aiov; 654 struct uio auio; 655 size_t i, len; 656 int error; 657 658 /* Global variable syslogf may change during sleep, use local copy. */ 659 rw_enter_read(&syslogf_rwlock); 660 fp = syslogf; 661 if (fp) 662 FREF(fp); 663 rw_exit(&syslogf_rwlock); 664 665 if (fp == NULL) { 666 if (!ISSET(flags, LOG_CONS)) 667 return (ENOTCONN); 668 /* 669 * Strip off syslog priority when logging to console. 670 * LOG_PRIMASK | LOG_FACMASK is 0x03ff, so at most 4 671 * decimal digits may appear in priority as <1023>. 672 */ 673 len = MIN(nbyte, sizeof(pri)); 674 if (sflg == UIO_USERSPACE) { 675 if ((error = copyin(buf, pri, len))) 676 return (error); 677 } else 678 memcpy(pri, buf, len); 679 if (0 < len && pri[0] == '<') { 680 for (i = 1; i < len; i++) { 681 if (pri[i] < '0' || pri[i] > '9') 682 break; 683 } 684 if (i < len && pri[i] == '>') { 685 i++; 686 /* There must be at least one digit <0>. */ 687 if (i >= 3) { 688 buf += i; 689 nbyte -= i; 690 } 691 } 692 } 693 } 694 695 aiov.iov_base = (char *)buf; 696 aiov.iov_len = nbyte; 697 auio.uio_iov = &aiov; 698 auio.uio_iovcnt = 1; 699 auio.uio_segflg = sflg; 700 auio.uio_rw = UIO_WRITE; 701 auio.uio_procp = p; 702 auio.uio_offset = 0; 703 auio.uio_resid = aiov.iov_len; 704 #ifdef KTRACE 705 if (sflg == UIO_USERSPACE && KTRPOINT(p, KTR_GENIO)) 706 ktriov = aiov; 707 else 708 ktriov.iov_len = 0; 709 #endif 710 711 len = auio.uio_resid; 712 if (fp) { 713 int flags = (fp->f_flag & FNONBLOCK) ? MSG_DONTWAIT : 0; 714 error = sosend(fp->f_data, NULL, &auio, NULL, NULL, flags); 715 if (error == 0) 716 len -= auio.uio_resid; 717 } else { 718 KERNEL_LOCK(); 719 if (constty || cn_devvp) { 720 error = cnwrite(0, &auio, 0); 721 if (error == 0) 722 len -= auio.uio_resid; 723 aiov.iov_base = "\r\n"; 724 aiov.iov_len = 2; 725 auio.uio_iov = &aiov; 726 auio.uio_iovcnt = 1; 727 auio.uio_segflg = UIO_SYSSPACE; 728 auio.uio_rw = UIO_WRITE; 729 auio.uio_procp = p; 730 auio.uio_offset = 0; 731 auio.uio_resid = aiov.iov_len; 732 cnwrite(0, &auio, 0); 733 } else { 734 /* XXX console redirection breaks down... */ 735 if (sflg == UIO_USERSPACE) { 736 kbuf = malloc(len, M_TEMP, M_WAITOK); 737 error = copyin(aiov.iov_base, kbuf, len); 738 } else { 739 kbuf = aiov.iov_base; 740 error = 0; 741 } 742 if (error == 0) 743 for (i = 0; i < len; i++) { 744 if (kbuf[i] == '\0') 745 break; 746 cnputc(kbuf[i]); 747 auio.uio_resid--; 748 } 749 if (sflg == UIO_USERSPACE) 750 free(kbuf, M_TEMP, len); 751 if (error == 0) 752 len -= auio.uio_resid; 753 cnputc('\n'); 754 } 755 KERNEL_UNLOCK(); 756 } 757 758 #ifdef KTRACE 759 if (error == 0 && ktriov.iov_len != 0) 760 ktrgenio(p, -1, UIO_WRITE, &ktriov, len); 761 #endif 762 if (fp) 763 FRELE(fp, p); 764 else if (error != EFAULT) 765 error = ENOTCONN; 766 return (error); 767 } 768