blob: 611caedd87d39df49e1314ad82bde0252d4051c7 [file] [log] [blame]
Mark Salyzyn018a96d2016-03-01 13:45:42 -08001/*
2 * Copyright (C) 2007-2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Tom Cherry026ddde2019-11-18 15:13:47 -080017#include "logd_reader.h"
18
Mark Salyzyn018a96d2016-03-01 13:45:42 -080019#include <errno.h>
20#include <fcntl.h>
21#include <inttypes.h>
22#include <poll.h>
23#include <stdarg.h>
24#include <stdatomic.h>
25#include <stdio.h>
26#include <stdlib.h>
27#include <string.h>
Elliott Hughes6efbda72019-10-02 12:27:03 -070028#include <sys/param.h>
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080029#include <sys/socket.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080030#include <sys/stat.h>
31#include <sys/types.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080032#include <sys/un.h>
33#include <time.h>
34#include <unistd.h>
35
Tom Cherryed860ff2019-12-06 11:01:51 -080036#include <string>
37
Tom Cherry06e111a2020-08-05 11:22:44 -070038#include <android-base/parseint.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080039#include <private/android_logger.h>
40
Mark Salyzyn018a96d2016-03-01 13:45:42 -080041#include "logger.h"
42
Tom Cherry05de1ba2019-02-12 11:26:23 -080043// Connects to /dev/socket/<name> and returns the associated fd or returns -1 on error.
44// O_CLOEXEC is always set.
Tom Cherry0d847fb2020-08-04 17:41:47 -070045static int socket_local_client(const std::string& name, int type, bool timeout) {
Tom Cherry05de1ba2019-02-12 11:26:23 -080046 sockaddr_un addr = {.sun_family = AF_LOCAL};
Mark Salyzyn018a96d2016-03-01 13:45:42 -080047
Tom Cherry05de1ba2019-02-12 11:26:23 -080048 std::string path = "/dev/socket/" + name;
49 if (path.size() + 1 > sizeof(addr.sun_path)) {
50 return -1;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080051 }
Tom Cherry05de1ba2019-02-12 11:26:23 -080052 strlcpy(addr.sun_path, path.c_str(), sizeof(addr.sun_path));
Mark Salyzyn018a96d2016-03-01 13:45:42 -080053
Tom Cherry05de1ba2019-02-12 11:26:23 -080054 int fd = socket(AF_LOCAL, type | SOCK_CLOEXEC, 0);
Tom Cherry29d0e892019-10-08 10:18:20 -070055 if (fd == -1) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080056 return -1;
57 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -080058
Tom Cherry0d847fb2020-08-04 17:41:47 -070059 if (timeout) {
60 // Sending and receiving messages should be instantaneous, but we don't want to wait forever if
61 // logd is hung, so we set a gracious 2s timeout.
62 struct timeval t = {2, 0};
63 if (setsockopt(fd, SOL_SOCKET, SO_SNDTIMEO, &t, sizeof(t)) == -1) {
64 return -1;
65 }
66 if (setsockopt(fd, SOL_SOCKET, SO_RCVTIMEO, &t, sizeof(t)) == -1) {
67 return -1;
68 }
69 }
70
Tom Cherry05de1ba2019-02-12 11:26:23 -080071 if (connect(fd, reinterpret_cast<sockaddr*>(&addr), sizeof(addr)) == -1) {
72 close(fd);
73 return -1;
74 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -080075
Tom Cherry05de1ba2019-02-12 11:26:23 -080076 return fd;
77}
Mark Salyzyn018a96d2016-03-01 13:45:42 -080078
79/* worker for sending the command to the logger */
Tom Cherry9156c532019-11-14 08:56:39 -080080ssize_t SendLogdControlMessage(char* buf, size_t buf_size) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080081 ssize_t ret;
82 size_t len;
83 char* cp;
84 int errno_save = 0;
Tom Cherry0d847fb2020-08-04 17:41:47 -070085 int sock = socket_local_client("logd", SOCK_STREAM, true);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080086 if (sock < 0) {
87 return sock;
88 }
89
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080090 len = strlen(buf) + 1;
91 ret = TEMP_FAILURE_RETRY(write(sock, buf, len));
92 if (ret <= 0) {
93 goto done;
94 }
95
96 len = buf_size;
97 cp = buf;
98 while ((ret = TEMP_FAILURE_RETRY(read(sock, cp, len))) > 0) {
99 struct pollfd p;
100
101 if (((size_t)ret == len) || (buf_size < PAGE_SIZE)) {
102 break;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800103 }
104
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800105 len -= ret;
106 cp += ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800107
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800108 memset(&p, 0, sizeof(p));
109 p.fd = sock;
110 p.events = POLLIN;
111
112 /* Give other side 20ms to refill pipe */
113 ret = TEMP_FAILURE_RETRY(poll(&p, 1, 20));
114
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800115 if (ret <= 0) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800116 break;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800117 }
118
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800119 if (!(p.revents & POLLIN)) {
120 ret = 0;
121 break;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800122 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800123 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800124
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800125 if (ret >= 0) {
126 ret += buf_size - len;
127 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800128
129done:
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800130 if ((ret == -1) && errno) {
131 errno_save = errno;
132 }
133 close(sock);
134 if (errno_save) {
135 errno = errno_save;
136 }
137 return ret;
138}
139
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800140static int check_log_success(char* buf, ssize_t ret) {
141 if (ret < 0) {
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800142 return ret;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800143 }
144
145 if (strncmp(buf, "success", 7)) {
146 errno = EINVAL;
147 return -1;
148 }
149
150 return 0;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800151}
152
Tom Cherry9156c532019-11-14 08:56:39 -0800153int android_logger_clear(struct logger* logger) {
154 if (!android_logger_is_logd(logger)) {
155 return -EINVAL;
156 }
157 uint32_t log_id = android_logger_get_id(logger);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800158 char buf[512];
Tom Cherry9156c532019-11-14 08:56:39 -0800159 snprintf(buf, sizeof(buf), "clear %" PRIu32, log_id);
Mark Salyzync9e5f372016-09-21 09:24:13 -0700160
Tom Cherry9156c532019-11-14 08:56:39 -0800161 return check_log_success(buf, SendLogdControlMessage(buf, sizeof(buf)));
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800162}
163
Tom Cherry06e111a2020-08-05 11:22:44 -0700164enum class LogSizeType : uint32_t {
165 kAllotted = 0,
166 kReadable,
167 kConsumed,
168};
169
170static long GetLogSize(struct logger* logger, LogSizeType type) {
Tom Cherry9156c532019-11-14 08:56:39 -0800171 if (!android_logger_is_logd(logger)) {
172 return -EINVAL;
173 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800174
Tom Cherry9156c532019-11-14 08:56:39 -0800175 uint32_t log_id = android_logger_get_id(logger);
176 char buf[512];
Tom Cherry06e111a2020-08-05 11:22:44 -0700177 switch (type) {
178 case LogSizeType::kAllotted:
179 snprintf(buf, sizeof(buf), "getLogSize %" PRIu32, log_id);
180 break;
181 case LogSizeType::kReadable:
182 snprintf(buf, sizeof(buf), "getLogSizeReadable %" PRIu32, log_id);
183 break;
184 case LogSizeType::kConsumed:
185 snprintf(buf, sizeof(buf), "getLogSizeUsed %" PRIu32, log_id);
186 break;
187 default:
188 abort();
189 }
Tom Cherry9156c532019-11-14 08:56:39 -0800190
191 ssize_t ret = SendLogdControlMessage(buf, sizeof(buf));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800192 if (ret < 0) {
193 return ret;
194 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800195
Tom Cherry06e111a2020-08-05 11:22:44 -0700196 long size;
197 if (!android::base::ParseInt(buf, &size)) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800198 return -1;
199 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800200
Tom Cherry06e111a2020-08-05 11:22:44 -0700201 return size;
202}
203
204long android_logger_get_log_size(struct logger* logger) {
205 return GetLogSize(logger, LogSizeType::kAllotted);
206}
207
208long android_logger_get_log_readable_size(struct logger* logger) {
209 return GetLogSize(logger, LogSizeType::kReadable);
210}
211
212long android_logger_get_log_consumed_size(struct logger* logger) {
213 return GetLogSize(logger, LogSizeType::kConsumed);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800214}
215
Tom Cherry9156c532019-11-14 08:56:39 -0800216int android_logger_set_log_size(struct logger* logger, unsigned long size) {
217 if (!android_logger_is_logd(logger)) {
218 return -EINVAL;
219 }
220
221 uint32_t log_id = android_logger_get_id(logger);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800222 char buf[512];
Tom Cherry9156c532019-11-14 08:56:39 -0800223 snprintf(buf, sizeof(buf), "setLogSize %" PRIu32 " %lu", log_id, size);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800224
Tom Cherry9156c532019-11-14 08:56:39 -0800225 return check_log_success(buf, SendLogdControlMessage(buf, sizeof(buf)));
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800226}
227
Tom Cherry9156c532019-11-14 08:56:39 -0800228int android_logger_get_log_version(struct logger*) {
229 return 4;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800230}
231
Tom Cherry9156c532019-11-14 08:56:39 -0800232ssize_t android_logger_get_statistics(struct logger_list* logger_list, char* buf, size_t len) {
233 if (logger_list->mode & ANDROID_LOG_PSTORE) {
234 return -EINVAL;
235 }
236
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800237 char* cp = buf;
238 size_t remaining = len;
239 size_t n;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800240
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800241 n = snprintf(cp, remaining, "getStatistics");
Elliott Hughes6efbda72019-10-02 12:27:03 -0700242 n = MIN(n, remaining);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800243 remaining -= n;
244 cp += n;
245
Tom Cherry9156c532019-11-14 08:56:39 -0800246 for (size_t log_id = 0; log_id < LOG_ID_MAX; ++log_id) {
247 if ((1 << log_id) & logger_list->log_mask) {
248 n = snprintf(cp, remaining, " %zu", log_id);
249 n = MIN(n, remaining);
250 remaining -= n;
251 cp += n;
252 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800253 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800254
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800255 if (logger_list->pid) {
256 snprintf(cp, remaining, " pid=%u", logger_list->pid);
257 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800258
Tom Cherry9156c532019-11-14 08:56:39 -0800259 return SendLogdControlMessage(buf, len);
260}
261ssize_t android_logger_get_prune_list(struct logger_list* logger_list, char* buf, size_t len) {
262 if (logger_list->mode & ANDROID_LOG_PSTORE) {
263 return -EINVAL;
264 }
265
266 snprintf(buf, len, "getPruneList");
267 return SendLogdControlMessage(buf, len);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800268}
269
Tom Cherryed860ff2019-12-06 11:01:51 -0800270int android_logger_set_prune_list(struct logger_list* logger_list, const char* buf, size_t len) {
Tom Cherry9156c532019-11-14 08:56:39 -0800271 if (logger_list->mode & ANDROID_LOG_PSTORE) {
272 return -EINVAL;
273 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800274
Tom Cherryed860ff2019-12-06 11:01:51 -0800275 std::string cmd = "setPruneList " + std::string{buf, len};
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800276
Tom Cherryed860ff2019-12-06 11:01:51 -0800277 return check_log_success(cmd.data(), SendLogdControlMessage(cmd.data(), cmd.size()));
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800278}
279
Tom Cherry026ddde2019-11-18 15:13:47 -0800280static int logdOpen(struct logger_list* logger_list) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800281 char buffer[256], *cp, c;
Tom Cherry53980212019-10-08 09:05:26 -0700282 int ret, remaining, sock;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800283
Tom Cherry026ddde2019-11-18 15:13:47 -0800284 sock = atomic_load(&logger_list->fd);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800285 if (sock > 0) {
286 return sock;
287 }
Mark Salyzyndb8a2662016-10-10 07:27:42 -0700288
Tom Cherry0d847fb2020-08-04 17:41:47 -0700289 sock = socket_local_client("logdr", SOCK_SEQPACKET, false);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800290 if (sock <= 0) {
291 if ((sock == -1) && errno) {
292 return -errno;
Mark Salyzyndb8a2662016-10-10 07:27:42 -0700293 }
294 return sock;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800295 }
296
Tom Cherry71ba1642019-01-10 10:37:36 -0800297 strcpy(buffer, (logger_list->mode & ANDROID_LOG_NONBLOCK) ? "dumpAndClose" : "stream");
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800298 cp = buffer + strlen(buffer);
299
300 strcpy(cp, " lids");
301 cp += 5;
302 c = '=';
303 remaining = sizeof(buffer) - (cp - buffer);
Tom Cherry9156c532019-11-14 08:56:39 -0800304
305 for (size_t log_id = 0; log_id < LOG_ID_MAX; ++log_id) {
306 if ((1 << log_id) & logger_list->log_mask) {
307 ret = snprintf(cp, remaining, "%c%zu", c, log_id);
308 ret = MIN(ret, remaining);
309 remaining -= ret;
310 cp += ret;
311 c = ',';
312 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800313 }
314
315 if (logger_list->tail) {
316 ret = snprintf(cp, remaining, " tail=%u", logger_list->tail);
Elliott Hughes6efbda72019-10-02 12:27:03 -0700317 ret = MIN(ret, remaining);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800318 remaining -= ret;
319 cp += ret;
320 }
321
322 if (logger_list->start.tv_sec || logger_list->start.tv_nsec) {
323 if (logger_list->mode & ANDROID_LOG_WRAP) {
324 // ToDo: alternate API to allow timeout to be adjusted.
Tom Cherry71ba1642019-01-10 10:37:36 -0800325 ret = snprintf(cp, remaining, " timeout=%u", ANDROID_LOG_WRAP_DEFAULT_TIMEOUT);
Elliott Hughes6efbda72019-10-02 12:27:03 -0700326 ret = MIN(ret, remaining);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800327 remaining -= ret;
328 cp += ret;
329 }
Tom Cherry71ba1642019-01-10 10:37:36 -0800330 ret = snprintf(cp, remaining, " start=%" PRIu32 ".%09" PRIu32, logger_list->start.tv_sec,
331 logger_list->start.tv_nsec);
Elliott Hughes6efbda72019-10-02 12:27:03 -0700332 ret = MIN(ret, remaining);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800333 remaining -= ret;
334 cp += ret;
335 }
336
337 if (logger_list->pid) {
338 ret = snprintf(cp, remaining, " pid=%u", logger_list->pid);
Elliott Hughes6efbda72019-10-02 12:27:03 -0700339 ret = MIN(ret, remaining);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800340 cp += ret;
341 }
342
Tom Cherry53980212019-10-08 09:05:26 -0700343 ret = TEMP_FAILURE_RETRY(write(sock, buffer, cp - buffer));
344 int write_errno = errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800345
346 if (ret <= 0) {
347 close(sock);
Tom Cherry53980212019-10-08 09:05:26 -0700348 if (ret == -1) {
349 return -write_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800350 }
351 if (ret == 0) {
352 return -EIO;
353 }
354 return ret;
355 }
356
Tom Cherry026ddde2019-11-18 15:13:47 -0800357 ret = atomic_exchange(&logger_list->fd, sock);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800358 if ((ret > 0) && (ret != sock)) {
359 close(ret);
360 }
361 return sock;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800362}
363
364/* Read from the selected logs */
Tom Cherry026ddde2019-11-18 15:13:47 -0800365int LogdRead(struct logger_list* logger_list, struct log_msg* log_msg) {
366 int ret = logdOpen(logger_list);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800367 if (ret < 0) {
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800368 return ret;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800369 }
370
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800371 /* NOTE: SOCK_SEQPACKET guarantees we read exactly one full entry */
Tom Cherry53980212019-10-08 09:05:26 -0700372 ret = TEMP_FAILURE_RETRY(recv(ret, log_msg, LOGGER_ENTRY_MAX_LEN, 0));
373 if ((logger_list->mode & ANDROID_LOG_NONBLOCK) && ret == 0) {
374 return -EAGAIN;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800375 }
376
Tom Cherry53980212019-10-08 09:05:26 -0700377 if (ret == -1) {
378 return -errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800379 }
380 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800381}
382
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800383/* Close all the logs */
Tom Cherry026ddde2019-11-18 15:13:47 -0800384void LogdClose(struct logger_list* logger_list) {
385 int sock = atomic_exchange(&logger_list->fd, -1);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800386 if (sock > 0) {
387 close(sock);
388 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800389}