blob: 7123f602a286a6182dec166b0b79254142ecb532 [file] [log] [blame]
Mark Salyzyn018a96d2016-03-01 13:45:42 -08001/*
2 * Copyright (C) 2007-2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Tom Cherry026ddde2019-11-18 15:13:47 -080017#include "logd_reader.h"
18
Mark Salyzyn018a96d2016-03-01 13:45:42 -080019#include <errno.h>
20#include <fcntl.h>
21#include <inttypes.h>
22#include <poll.h>
23#include <stdarg.h>
24#include <stdatomic.h>
25#include <stdio.h>
26#include <stdlib.h>
27#include <string.h>
Elliott Hughes6efbda72019-10-02 12:27:03 -070028#include <sys/param.h>
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080029#include <sys/socket.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080030#include <sys/stat.h>
31#include <sys/types.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080032#include <sys/un.h>
33#include <time.h>
34#include <unistd.h>
35
Tom Cherryed860ff2019-12-06 11:01:51 -080036#include <string>
37
Mark Salyzyn018a96d2016-03-01 13:45:42 -080038#include <private/android_logger.h>
39
Mark Salyzyn018a96d2016-03-01 13:45:42 -080040#include "logger.h"
41
Tom Cherry05de1ba2019-02-12 11:26:23 -080042// Connects to /dev/socket/<name> and returns the associated fd or returns -1 on error.
43// O_CLOEXEC is always set.
Tom Cherry0d847fb2020-08-04 17:41:47 -070044static int socket_local_client(const std::string& name, int type, bool timeout) {
Tom Cherry05de1ba2019-02-12 11:26:23 -080045 sockaddr_un addr = {.sun_family = AF_LOCAL};
Mark Salyzyn018a96d2016-03-01 13:45:42 -080046
Tom Cherry05de1ba2019-02-12 11:26:23 -080047 std::string path = "/dev/socket/" + name;
48 if (path.size() + 1 > sizeof(addr.sun_path)) {
49 return -1;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080050 }
Tom Cherry05de1ba2019-02-12 11:26:23 -080051 strlcpy(addr.sun_path, path.c_str(), sizeof(addr.sun_path));
Mark Salyzyn018a96d2016-03-01 13:45:42 -080052
Tom Cherry05de1ba2019-02-12 11:26:23 -080053 int fd = socket(AF_LOCAL, type | SOCK_CLOEXEC, 0);
Tom Cherry29d0e892019-10-08 10:18:20 -070054 if (fd == -1) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080055 return -1;
56 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -080057
Tom Cherry0d847fb2020-08-04 17:41:47 -070058 if (timeout) {
59 // Sending and receiving messages should be instantaneous, but we don't want to wait forever if
60 // logd is hung, so we set a gracious 2s timeout.
61 struct timeval t = {2, 0};
62 if (setsockopt(fd, SOL_SOCKET, SO_SNDTIMEO, &t, sizeof(t)) == -1) {
63 return -1;
64 }
65 if (setsockopt(fd, SOL_SOCKET, SO_RCVTIMEO, &t, sizeof(t)) == -1) {
66 return -1;
67 }
68 }
69
Tom Cherry05de1ba2019-02-12 11:26:23 -080070 if (connect(fd, reinterpret_cast<sockaddr*>(&addr), sizeof(addr)) == -1) {
71 close(fd);
72 return -1;
73 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -080074
Tom Cherry05de1ba2019-02-12 11:26:23 -080075 return fd;
76}
Mark Salyzyn018a96d2016-03-01 13:45:42 -080077
78/* worker for sending the command to the logger */
Tom Cherry9156c532019-11-14 08:56:39 -080079ssize_t SendLogdControlMessage(char* buf, size_t buf_size) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080080 ssize_t ret;
81 size_t len;
82 char* cp;
83 int errno_save = 0;
Tom Cherry0d847fb2020-08-04 17:41:47 -070084 int sock = socket_local_client("logd", SOCK_STREAM, true);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080085 if (sock < 0) {
86 return sock;
87 }
88
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080089 len = strlen(buf) + 1;
90 ret = TEMP_FAILURE_RETRY(write(sock, buf, len));
91 if (ret <= 0) {
92 goto done;
93 }
94
95 len = buf_size;
96 cp = buf;
97 while ((ret = TEMP_FAILURE_RETRY(read(sock, cp, len))) > 0) {
98 struct pollfd p;
99
100 if (((size_t)ret == len) || (buf_size < PAGE_SIZE)) {
101 break;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800102 }
103
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800104 len -= ret;
105 cp += ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800106
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800107 memset(&p, 0, sizeof(p));
108 p.fd = sock;
109 p.events = POLLIN;
110
111 /* Give other side 20ms to refill pipe */
112 ret = TEMP_FAILURE_RETRY(poll(&p, 1, 20));
113
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800114 if (ret <= 0) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800115 break;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800116 }
117
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800118 if (!(p.revents & POLLIN)) {
119 ret = 0;
120 break;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800121 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800122 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800123
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800124 if (ret >= 0) {
125 ret += buf_size - len;
126 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800127
128done:
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800129 if ((ret == -1) && errno) {
130 errno_save = errno;
131 }
132 close(sock);
133 if (errno_save) {
134 errno = errno_save;
135 }
136 return ret;
137}
138
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800139static int check_log_success(char* buf, ssize_t ret) {
140 if (ret < 0) {
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800141 return ret;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800142 }
143
144 if (strncmp(buf, "success", 7)) {
145 errno = EINVAL;
146 return -1;
147 }
148
149 return 0;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800150}
151
Tom Cherry9156c532019-11-14 08:56:39 -0800152int android_logger_clear(struct logger* logger) {
153 if (!android_logger_is_logd(logger)) {
154 return -EINVAL;
155 }
156 uint32_t log_id = android_logger_get_id(logger);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800157 char buf[512];
Tom Cherry9156c532019-11-14 08:56:39 -0800158 snprintf(buf, sizeof(buf), "clear %" PRIu32, log_id);
Mark Salyzync9e5f372016-09-21 09:24:13 -0700159
Tom Cherry9156c532019-11-14 08:56:39 -0800160 return check_log_success(buf, SendLogdControlMessage(buf, sizeof(buf)));
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800161}
162
163/* returns the total size of the log's ring buffer */
Tom Cherry9156c532019-11-14 08:56:39 -0800164long android_logger_get_log_size(struct logger* logger) {
165 if (!android_logger_is_logd(logger)) {
166 return -EINVAL;
167 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800168
Tom Cherry9156c532019-11-14 08:56:39 -0800169 uint32_t log_id = android_logger_get_id(logger);
170 char buf[512];
171 snprintf(buf, sizeof(buf), "getLogSize %" PRIu32, log_id);
172
173 ssize_t ret = SendLogdControlMessage(buf, sizeof(buf));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800174 if (ret < 0) {
175 return ret;
176 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800177
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800178 if ((buf[0] < '0') || ('9' < buf[0])) {
179 return -1;
180 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800181
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800182 return atol(buf);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800183}
184
Tom Cherry9156c532019-11-14 08:56:39 -0800185int android_logger_set_log_size(struct logger* logger, unsigned long size) {
186 if (!android_logger_is_logd(logger)) {
187 return -EINVAL;
188 }
189
190 uint32_t log_id = android_logger_get_id(logger);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800191 char buf[512];
Tom Cherry9156c532019-11-14 08:56:39 -0800192 snprintf(buf, sizeof(buf), "setLogSize %" PRIu32 " %lu", log_id, size);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800193
Tom Cherry9156c532019-11-14 08:56:39 -0800194 return check_log_success(buf, SendLogdControlMessage(buf, sizeof(buf)));
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800195}
196
197/*
198 * returns the readable size of the log's ring buffer (that is, amount of the
199 * log consumed)
200 */
Tom Cherry9156c532019-11-14 08:56:39 -0800201long android_logger_get_log_readable_size(struct logger* logger) {
202 if (!android_logger_is_logd(logger)) {
203 return -EINVAL;
204 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800205
Tom Cherry9156c532019-11-14 08:56:39 -0800206 uint32_t log_id = android_logger_get_id(logger);
207 char buf[512];
208 snprintf(buf, sizeof(buf), "getLogSizeUsed %" PRIu32, log_id);
209
210 ssize_t ret = SendLogdControlMessage(buf, sizeof(buf));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800211 if (ret < 0) {
212 return ret;
213 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800214
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800215 if ((buf[0] < '0') || ('9' < buf[0])) {
216 return -1;
217 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800218
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800219 return atol(buf);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800220}
221
Tom Cherry9156c532019-11-14 08:56:39 -0800222int android_logger_get_log_version(struct logger*) {
223 return 4;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800224}
225
Tom Cherry9156c532019-11-14 08:56:39 -0800226ssize_t android_logger_get_statistics(struct logger_list* logger_list, char* buf, size_t len) {
227 if (logger_list->mode & ANDROID_LOG_PSTORE) {
228 return -EINVAL;
229 }
230
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800231 char* cp = buf;
232 size_t remaining = len;
233 size_t n;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800234
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800235 n = snprintf(cp, remaining, "getStatistics");
Elliott Hughes6efbda72019-10-02 12:27:03 -0700236 n = MIN(n, remaining);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800237 remaining -= n;
238 cp += n;
239
Tom Cherry9156c532019-11-14 08:56:39 -0800240 for (size_t log_id = 0; log_id < LOG_ID_MAX; ++log_id) {
241 if ((1 << log_id) & logger_list->log_mask) {
242 n = snprintf(cp, remaining, " %zu", log_id);
243 n = MIN(n, remaining);
244 remaining -= n;
245 cp += n;
246 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800247 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800248
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800249 if (logger_list->pid) {
250 snprintf(cp, remaining, " pid=%u", logger_list->pid);
251 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800252
Tom Cherry9156c532019-11-14 08:56:39 -0800253 return SendLogdControlMessage(buf, len);
254}
255ssize_t android_logger_get_prune_list(struct logger_list* logger_list, char* buf, size_t len) {
256 if (logger_list->mode & ANDROID_LOG_PSTORE) {
257 return -EINVAL;
258 }
259
260 snprintf(buf, len, "getPruneList");
261 return SendLogdControlMessage(buf, len);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800262}
263
Tom Cherryed860ff2019-12-06 11:01:51 -0800264int android_logger_set_prune_list(struct logger_list* logger_list, const char* buf, size_t len) {
Tom Cherry9156c532019-11-14 08:56:39 -0800265 if (logger_list->mode & ANDROID_LOG_PSTORE) {
266 return -EINVAL;
267 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800268
Tom Cherryed860ff2019-12-06 11:01:51 -0800269 std::string cmd = "setPruneList " + std::string{buf, len};
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800270
Tom Cherryed860ff2019-12-06 11:01:51 -0800271 return check_log_success(cmd.data(), SendLogdControlMessage(cmd.data(), cmd.size()));
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800272}
273
Tom Cherry026ddde2019-11-18 15:13:47 -0800274static int logdOpen(struct logger_list* logger_list) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800275 char buffer[256], *cp, c;
Tom Cherry53980212019-10-08 09:05:26 -0700276 int ret, remaining, sock;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800277
Tom Cherry026ddde2019-11-18 15:13:47 -0800278 sock = atomic_load(&logger_list->fd);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800279 if (sock > 0) {
280 return sock;
281 }
Mark Salyzyndb8a2662016-10-10 07:27:42 -0700282
Tom Cherry0d847fb2020-08-04 17:41:47 -0700283 sock = socket_local_client("logdr", SOCK_SEQPACKET, false);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800284 if (sock <= 0) {
285 if ((sock == -1) && errno) {
286 return -errno;
Mark Salyzyndb8a2662016-10-10 07:27:42 -0700287 }
288 return sock;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800289 }
290
Tom Cherry71ba1642019-01-10 10:37:36 -0800291 strcpy(buffer, (logger_list->mode & ANDROID_LOG_NONBLOCK) ? "dumpAndClose" : "stream");
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800292 cp = buffer + strlen(buffer);
293
294 strcpy(cp, " lids");
295 cp += 5;
296 c = '=';
297 remaining = sizeof(buffer) - (cp - buffer);
Tom Cherry9156c532019-11-14 08:56:39 -0800298
299 for (size_t log_id = 0; log_id < LOG_ID_MAX; ++log_id) {
300 if ((1 << log_id) & logger_list->log_mask) {
301 ret = snprintf(cp, remaining, "%c%zu", c, log_id);
302 ret = MIN(ret, remaining);
303 remaining -= ret;
304 cp += ret;
305 c = ',';
306 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800307 }
308
309 if (logger_list->tail) {
310 ret = snprintf(cp, remaining, " tail=%u", logger_list->tail);
Elliott Hughes6efbda72019-10-02 12:27:03 -0700311 ret = MIN(ret, remaining);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800312 remaining -= ret;
313 cp += ret;
314 }
315
316 if (logger_list->start.tv_sec || logger_list->start.tv_nsec) {
317 if (logger_list->mode & ANDROID_LOG_WRAP) {
318 // ToDo: alternate API to allow timeout to be adjusted.
Tom Cherry71ba1642019-01-10 10:37:36 -0800319 ret = snprintf(cp, remaining, " timeout=%u", ANDROID_LOG_WRAP_DEFAULT_TIMEOUT);
Elliott Hughes6efbda72019-10-02 12:27:03 -0700320 ret = MIN(ret, remaining);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800321 remaining -= ret;
322 cp += ret;
323 }
Tom Cherry71ba1642019-01-10 10:37:36 -0800324 ret = snprintf(cp, remaining, " start=%" PRIu32 ".%09" PRIu32, logger_list->start.tv_sec,
325 logger_list->start.tv_nsec);
Elliott Hughes6efbda72019-10-02 12:27:03 -0700326 ret = MIN(ret, remaining);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800327 remaining -= ret;
328 cp += ret;
329 }
330
331 if (logger_list->pid) {
332 ret = snprintf(cp, remaining, " pid=%u", logger_list->pid);
Elliott Hughes6efbda72019-10-02 12:27:03 -0700333 ret = MIN(ret, remaining);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800334 cp += ret;
335 }
336
Tom Cherry53980212019-10-08 09:05:26 -0700337 ret = TEMP_FAILURE_RETRY(write(sock, buffer, cp - buffer));
338 int write_errno = errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800339
340 if (ret <= 0) {
341 close(sock);
Tom Cherry53980212019-10-08 09:05:26 -0700342 if (ret == -1) {
343 return -write_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800344 }
345 if (ret == 0) {
346 return -EIO;
347 }
348 return ret;
349 }
350
Tom Cherry026ddde2019-11-18 15:13:47 -0800351 ret = atomic_exchange(&logger_list->fd, sock);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800352 if ((ret > 0) && (ret != sock)) {
353 close(ret);
354 }
355 return sock;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800356}
357
358/* Read from the selected logs */
Tom Cherry026ddde2019-11-18 15:13:47 -0800359int LogdRead(struct logger_list* logger_list, struct log_msg* log_msg) {
360 int ret = logdOpen(logger_list);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800361 if (ret < 0) {
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800362 return ret;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800363 }
364
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800365 /* NOTE: SOCK_SEQPACKET guarantees we read exactly one full entry */
Tom Cherry53980212019-10-08 09:05:26 -0700366 ret = TEMP_FAILURE_RETRY(recv(ret, log_msg, LOGGER_ENTRY_MAX_LEN, 0));
367 if ((logger_list->mode & ANDROID_LOG_NONBLOCK) && ret == 0) {
368 return -EAGAIN;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800369 }
370
Tom Cherry53980212019-10-08 09:05:26 -0700371 if (ret == -1) {
372 return -errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800373 }
374 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800375}
376
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800377/* Close all the logs */
Tom Cherry026ddde2019-11-18 15:13:47 -0800378void LogdClose(struct logger_list* logger_list) {
379 int sock = atomic_exchange(&logger_list->fd, -1);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800380 if (sock > 0) {
381 close(sock);
382 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800383}