blob: d6ef951f7fc7afbf6bffe50dc613dae4e010aa0f [file] [log] [blame]
Mark Salyzyn018a96d2016-03-01 13:45:42 -08001/*
2 * Copyright (C) 2007-2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <errno.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080018#include <stdlib.h>
19#include <string.h>
20#include <sys/time.h>
21
22#ifdef __BIONIC__
23#include <android/set_abort_message.h>
24#endif
25
Tom Cherry121292d2020-01-14 09:52:10 -080026#include <android-base/macros.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080027#include <private/android_filesystem_config.h>
28#include <private/android_logger.h>
29
Mark Salyzyn018a96d2016-03-01 13:45:42 -080030#include "logger.h"
Tom Cherry6f6ef392019-01-16 14:17:08 -080031#include "uio.h"
Mark Salyzyn018a96d2016-03-01 13:45:42 -080032
Tom Cherry97ec4ee2019-10-02 10:52:55 -070033#if (FAKE_LOG_DEVICE == 0)
Tom Cherry21bb36c2020-01-08 15:18:26 -080034#include "logd_writer.h"
35#include "pmsg_writer.h"
Tom Cherry97ec4ee2019-10-02 10:52:55 -070036#else
Tom Cherry21bb36c2020-01-08 15:18:26 -080037#include "fake_log_device.h"
Tom Cherry97ec4ee2019-10-02 10:52:55 -070038#endif
Tom Cherry2beabe52019-10-01 13:05:58 -070039
Tom Cherry21bb36c2020-01-08 15:18:26 -080040#define LOG_BUF_SIZE 1024
41
Dan Willemsen0910d2d2016-11-29 13:39:55 -080042#if defined(__ANDROID__)
Tom Cherry06e0fce2019-12-11 14:26:37 -080043static int check_log_uid_permissions() {
Tom Cherryb47aa2a2020-01-08 15:34:14 -080044 uid_t uid = getuid();
Mark Salyzync33103c2016-03-28 16:20:29 -070045
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080046 /* Matches clientHasLogCredentials() in logd */
47 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) {
48 uid = geteuid();
Mark Salyzync33103c2016-03-28 16:20:29 -070049 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080050 gid_t gid = getgid();
51 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) {
52 gid = getegid();
53 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) {
54 int num_groups;
55 gid_t* groups;
Mark Salyzync33103c2016-03-28 16:20:29 -070056
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080057 num_groups = getgroups(0, NULL);
58 if (num_groups <= 0) {
59 return -EPERM;
60 }
Tom Cherry71ba1642019-01-10 10:37:36 -080061 groups = static_cast<gid_t*>(calloc(num_groups, sizeof(gid_t)));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080062 if (!groups) {
63 return -ENOMEM;
64 }
65 num_groups = getgroups(num_groups, groups);
66 while (num_groups > 0) {
67 if (groups[num_groups - 1] == AID_LOG) {
68 break;
Mark Salyzync33103c2016-03-28 16:20:29 -070069 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080070 --num_groups;
71 }
72 free(groups);
73 if (num_groups <= 0) {
74 return -EPERM;
75 }
Mark Salyzync33103c2016-03-28 16:20:29 -070076 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080077 }
Mark Salyzync33103c2016-03-28 16:20:29 -070078 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080079 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080080 return 0;
Mark Salyzync33103c2016-03-28 16:20:29 -070081}
Tom Cherry06e0fce2019-12-11 14:26:37 -080082#endif
Mark Salyzync33103c2016-03-28 16:20:29 -070083
Mark Salyzyndf7a4c62016-08-23 10:23:36 -070084/*
85 * Release any logger resources. A new log write will immediately re-acquire.
86 */
Tom Cherry2d9779e2019-02-08 11:46:19 -080087void __android_log_close() {
Tom Cherry21bb36c2020-01-08 15:18:26 -080088#if (FAKE_LOG_DEVICE == 0)
89 LogdClose();
90 PmsgClose();
91#else
92 FakeClose();
93#endif
Mark Salyzyndf7a4c62016-08-23 10:23:36 -070094}
Mark Salyzyn018a96d2016-03-01 13:45:42 -080095
Tom Cherry06e0fce2019-12-11 14:26:37 -080096static int write_to_log(log_id_t log_id, struct iovec* vec, size_t nr) {
Mark Salyzyn72d37242018-03-07 10:42:06 -080097 int ret, save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080098 struct timespec ts;
Mark Salyzyn018a96d2016-03-01 13:45:42 -080099
Mark Salyzyn72d37242018-03-07 10:42:06 -0800100 save_errno = errno;
Tom Cherry06e0fce2019-12-11 14:26:37 -0800101
102 if (log_id == LOG_ID_KERNEL) {
103 return -EINVAL;
104 }
105
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800106#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800107 clock_gettime(android_log_clockid(), &ts);
Mark Salyzyn142b43d2016-12-28 10:30:57 -0800108
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800109 if (log_id == LOG_ID_SECURITY) {
110 if (vec[0].iov_len < 4) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800111 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800112 return -EINVAL;
113 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800114
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800115 ret = check_log_uid_permissions();
116 if (ret < 0) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800117 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800118 return ret;
119 }
120 if (!__android_log_security()) {
121 /* If only we could reset downstream logd counter */
Mark Salyzyn72d37242018-03-07 10:42:06 -0800122 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800123 return -EPERM;
124 }
Yao Chen025f05a2017-12-01 15:48:19 -0800125 } else if (log_id == LOG_ID_EVENTS || log_id == LOG_ID_STATS) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800126 if (vec[0].iov_len < 4) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800127 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800128 return -EINVAL;
129 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800130 } else {
Tom Cherry2187a412019-10-01 17:13:43 -0700131 int prio = *static_cast<int*>(vec[0].iov_base);
132 const char* tag = static_cast<const char*>(vec[1].iov_base);
133 size_t len = vec[1].iov_len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800134
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800135 if (!__android_log_is_loggable_len(prio, tag, len - 1, ANDROID_LOG_VERBOSE)) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800136 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800137 return -EPERM;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800138 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800139 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800140#else
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800141 /* simulate clock_gettime(CLOCK_REALTIME, &ts); */
142 {
143 struct timeval tv;
144 gettimeofday(&tv, NULL);
145 ts.tv_sec = tv.tv_sec;
146 ts.tv_nsec = tv.tv_usec * 1000;
147 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800148#endif
149
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800150 ret = 0;
Tom Cherry2beabe52019-10-01 13:05:58 -0700151
Tom Cherry21bb36c2020-01-08 15:18:26 -0800152#if (FAKE_LOG_DEVICE == 0)
153 ret = LogdWrite(log_id, &ts, vec, nr);
154 PmsgWrite(log_id, &ts, vec, nr);
155#else
156 ret = FakeWrite(log_id, &ts, vec, nr);
157#endif
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800158
Mark Salyzyn72d37242018-03-07 10:42:06 -0800159 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800160 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800161}
162
Tom Cherry2d9779e2019-02-08 11:46:19 -0800163int __android_log_write(int prio, const char* tag, const char* msg) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800164 return __android_log_buf_write(LOG_ID_MAIN, prio, tag, msg);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800165}
166
Tom Cherry2d9779e2019-02-08 11:46:19 -0800167int __android_log_buf_write(int bufID, int prio, const char* tag, const char* msg) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800168 if (!tag) tag = "";
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800169
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800170#if __BIONIC__
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800171 if (prio == ANDROID_LOG_FATAL) {
172 android_set_abort_message(msg);
173 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800174#endif
175
Elliott Hughesde3ad1d2015-04-03 13:24:37 -0700176 struct iovec vec[3];
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800177 vec[0].iov_base = (unsigned char*)&prio;
178 vec[0].iov_len = 1;
179 vec[1].iov_base = (void*)tag;
180 vec[1].iov_len = strlen(tag) + 1;
181 vec[2].iov_base = (void*)msg;
182 vec[2].iov_len = strlen(msg) + 1;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800183
Tom Cherry71ba1642019-01-10 10:37:36 -0800184 return write_to_log(static_cast<log_id_t>(bufID), vec, 3);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800185}
186
Tom Cherry2d9779e2019-02-08 11:46:19 -0800187int __android_log_vprint(int prio, const char* tag, const char* fmt, va_list ap) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800188 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800189
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800190 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800191
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800192 return __android_log_write(prio, tag, buf);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800193}
194
Tom Cherry2d9779e2019-02-08 11:46:19 -0800195int __android_log_print(int prio, const char* tag, const char* fmt, ...) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800196 va_list ap;
197 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800198
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800199 va_start(ap, fmt);
200 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
201 va_end(ap);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800202
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800203 return __android_log_write(prio, tag, buf);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800204}
205
Tom Cherry2d9779e2019-02-08 11:46:19 -0800206int __android_log_buf_print(int bufID, int prio, const char* tag, const char* fmt, ...) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800207 va_list ap;
208 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800209
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800210 va_start(ap, fmt);
211 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
212 va_end(ap);
213
214 return __android_log_buf_write(bufID, prio, tag, buf);
215}
216
Tom Cherry2d9779e2019-02-08 11:46:19 -0800217void __android_log_assert(const char* cond, const char* tag, const char* fmt, ...) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800218 char buf[LOG_BUF_SIZE];
219
220 if (fmt) {
221 va_list ap;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800222 va_start(ap, fmt);
223 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
224 va_end(ap);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800225 } else {
226 /* Msg not provided, log condition. N.B. Do not use cond directly as
227 * format string as it could contain spurious '%' syntax (e.g.
228 * "%d" in "blocks%devs == 0").
229 */
230 if (cond)
231 snprintf(buf, LOG_BUF_SIZE, "Assertion failed: %s", cond);
232 else
233 strcpy(buf, "Unspecified assertion failed");
234 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800235
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800236 // Log assertion failures to stderr for the benefit of "adb shell" users
237 // and gtests (http://b/23675822).
Tom Cherry6f6ef392019-01-16 14:17:08 -0800238 TEMP_FAILURE_RETRY(write(2, buf, strlen(buf)));
239 TEMP_FAILURE_RETRY(write(2, "\n", 1));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800240
241 __android_log_write(ANDROID_LOG_FATAL, tag, buf);
242 abort(); /* abort so we have a chance to debug the situation */
243 /* NOTREACHED */
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800244}
245
Tom Cherry2d9779e2019-02-08 11:46:19 -0800246int __android_log_bwrite(int32_t tag, const void* payload, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800247 struct iovec vec[2];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800248
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800249 vec[0].iov_base = &tag;
250 vec[0].iov_len = sizeof(tag);
251 vec[1].iov_base = (void*)payload;
252 vec[1].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800253
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800254 return write_to_log(LOG_ID_EVENTS, vec, 2);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800255}
256
Tom Cherry2d9779e2019-02-08 11:46:19 -0800257int __android_log_stats_bwrite(int32_t tag, const void* payload, size_t len) {
Stefan Lafon701a0652017-08-24 20:14:06 -0700258 struct iovec vec[2];
259
260 vec[0].iov_base = &tag;
261 vec[0].iov_len = sizeof(tag);
262 vec[1].iov_base = (void*)payload;
263 vec[1].iov_len = len;
264
265 return write_to_log(LOG_ID_STATS, vec, 2);
266}
267
Tom Cherry2d9779e2019-02-08 11:46:19 -0800268int __android_log_security_bwrite(int32_t tag, const void* payload, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800269 struct iovec vec[2];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800270
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800271 vec[0].iov_base = &tag;
272 vec[0].iov_len = sizeof(tag);
273 vec[1].iov_base = (void*)payload;
274 vec[1].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800275
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800276 return write_to_log(LOG_ID_SECURITY, vec, 2);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800277}
278
279/*
280 * Like __android_log_bwrite, but takes the type as well. Doesn't work
281 * for the general case where we're generating lists of stuff, but very
282 * handy if we just want to dump an integer into the log.
283 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800284int __android_log_btwrite(int32_t tag, char type, const void* payload, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800285 struct iovec vec[3];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800286
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800287 vec[0].iov_base = &tag;
288 vec[0].iov_len = sizeof(tag);
289 vec[1].iov_base = &type;
290 vec[1].iov_len = sizeof(type);
291 vec[2].iov_base = (void*)payload;
292 vec[2].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800293
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800294 return write_to_log(LOG_ID_EVENTS, vec, 3);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800295}
296
297/*
298 * Like __android_log_bwrite, but used for writing strings to the
299 * event log.
300 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800301int __android_log_bswrite(int32_t tag, const char* payload) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800302 struct iovec vec[4];
303 char type = EVENT_TYPE_STRING;
304 uint32_t len = strlen(payload);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800305
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800306 vec[0].iov_base = &tag;
307 vec[0].iov_len = sizeof(tag);
308 vec[1].iov_base = &type;
309 vec[1].iov_len = sizeof(type);
310 vec[2].iov_base = &len;
311 vec[2].iov_len = sizeof(len);
312 vec[3].iov_base = (void*)payload;
313 vec[3].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800314
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800315 return write_to_log(LOG_ID_EVENTS, vec, 4);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800316}
317
318/*
319 * Like __android_log_security_bwrite, but used for writing strings to the
320 * security log.
321 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800322int __android_log_security_bswrite(int32_t tag, const char* payload) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800323 struct iovec vec[4];
324 char type = EVENT_TYPE_STRING;
325 uint32_t len = strlen(payload);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800326
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800327 vec[0].iov_base = &tag;
328 vec[0].iov_len = sizeof(tag);
329 vec[1].iov_base = &type;
330 vec[1].iov_len = sizeof(type);
331 vec[2].iov_base = &len;
332 vec[2].iov_len = sizeof(len);
333 vec[3].iov_base = (void*)payload;
334 vec[3].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800335
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800336 return write_to_log(LOG_ID_SECURITY, vec, 4);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800337}