blob: 09aaffb0940da950e3ef8e69c08a7a61b8e7eabc [file] [log] [blame]
Mark Salyzyn018a96d2016-03-01 13:45:42 -08001/*
2 * Copyright (C) 2007-2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Mark Salyzyn018a96d2016-03-01 13:45:42 -080017#include <errno.h>
18#include <fcntl.h>
19#include <inttypes.h>
20#include <poll.h>
21#include <stdarg.h>
22#include <stdatomic.h>
23#include <stdio.h>
24#include <stdlib.h>
25#include <string.h>
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080026#include <sys/socket.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080027#include <sys/stat.h>
28#include <sys/types.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080029#include <sys/un.h>
30#include <time.h>
31#include <unistd.h>
32
33#include <cutils/sockets.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080034#include <private/android_filesystem_config.h>
35#include <private/android_logger.h>
36
Mark Salyzyn018a96d2016-03-01 13:45:42 -080037#include "log_portability.h"
38#include "logger.h"
Tom Cherry6f6ef392019-01-16 14:17:08 -080039#include "uio.h"
Mark Salyzyn018a96d2016-03-01 13:45:42 -080040
41/* branchless on many architectures. */
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080042#define min(x, y) ((y) ^ (((x) ^ (y)) & -((x) < (y))))
Mark Salyzyn018a96d2016-03-01 13:45:42 -080043
44static int logdAvailable(log_id_t LogId);
45static int logdOpen();
46static void logdClose();
Tom Cherry71ba1642019-01-10 10:37:36 -080047static int logdWrite(log_id_t logId, struct timespec* ts, struct iovec* vec, size_t nr);
Mark Salyzyn018a96d2016-03-01 13:45:42 -080048
Tom Cherry2d9779e2019-02-08 11:46:19 -080049struct android_log_transport_write logdLoggerWrite = {
Tom Cherry71ba1642019-01-10 10:37:36 -080050 .name = "logd",
Tom Cherry2beabe52019-10-01 13:05:58 -070051 .logMask = 0,
52 .context.sock = -EBADF,
Tom Cherry71ba1642019-01-10 10:37:36 -080053 .available = logdAvailable,
54 .open = logdOpen,
55 .close = logdClose,
56 .write = logdWrite,
Mark Salyzyn018a96d2016-03-01 13:45:42 -080057};
58
59/* log_init_lock assumed */
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080060static int logdOpen() {
61 int i, ret = 0;
Mark Salyzyn018a96d2016-03-01 13:45:42 -080062
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080063 i = atomic_load(&logdLoggerWrite.context.sock);
64 if (i < 0) {
Tom Cherry71ba1642019-01-10 10:37:36 -080065 int sock = TEMP_FAILURE_RETRY(socket(PF_UNIX, SOCK_DGRAM | SOCK_CLOEXEC | SOCK_NONBLOCK, 0));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080066 if (sock < 0) {
67 ret = -errno;
68 } else {
69 struct sockaddr_un un;
70 memset(&un, 0, sizeof(struct sockaddr_un));
71 un.sun_family = AF_UNIX;
72 strcpy(un.sun_path, "/dev/socket/logdw");
Mark Salyzyn018a96d2016-03-01 13:45:42 -080073
Tom Cherry71ba1642019-01-10 10:37:36 -080074 if (TEMP_FAILURE_RETRY(connect(sock, (struct sockaddr*)&un, sizeof(struct sockaddr_un))) <
75 0) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080076 ret = -errno;
77 switch (ret) {
78 case -ENOTCONN:
79 case -ECONNREFUSED:
80 case -ENOENT:
81 i = atomic_exchange(&logdLoggerWrite.context.sock, ret);
Tom Cherry71ba1642019-01-10 10:37:36 -080082 [[fallthrough]];
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080083 default:
Mark Salyzyn018a96d2016-03-01 13:45:42 -080084 break;
85 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080086 close(sock);
87 } else {
88 ret = atomic_exchange(&logdLoggerWrite.context.sock, sock);
89 if ((ret >= 0) && (ret != sock)) {
90 close(ret);
91 }
92 ret = 0;
93 }
94 }
95 }
96
97 return ret;
98}
99
100static void __logdClose(int negative_errno) {
101 int sock = atomic_exchange(&logdLoggerWrite.context.sock, negative_errno);
102 if (sock >= 0) {
103 close(sock);
104 }
105}
106
107static void logdClose() {
108 __logdClose(-EBADF);
109}
110
111static int logdAvailable(log_id_t logId) {
112 if (logId >= LOG_ID_MAX || logId == LOG_ID_KERNEL) {
113 return -EINVAL;
114 }
115 if (atomic_load(&logdLoggerWrite.context.sock) < 0) {
116 if (access("/dev/socket/logdw", W_OK) == 0) {
117 return 0;
118 }
119 return -EBADF;
120 }
121 return 1;
122}
123
Tom Cherry71ba1642019-01-10 10:37:36 -0800124static int logdWrite(log_id_t logId, struct timespec* ts, struct iovec* vec, size_t nr) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800125 ssize_t ret;
126 int sock;
127 static const unsigned headerLength = 1;
128 struct iovec newVec[nr + headerLength];
129 android_log_header_t header;
130 size_t i, payloadSize;
Tom Cherry71ba1642019-01-10 10:37:36 -0800131 static atomic_int dropped;
132 static atomic_int droppedSecurity;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800133
134 sock = atomic_load(&logdLoggerWrite.context.sock);
135 if (sock < 0) switch (sock) {
136 case -ENOTCONN:
137 case -ECONNREFUSED:
138 case -ENOENT:
139 break;
140 default:
141 return -EBADF;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800142 }
143
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800144 /* logd, after initialization and priv drop */
145 if (__android_log_uid() == AID_LOGD) {
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800146 /*
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800147 * ignore log messages we send to ourself (logd).
148 * Such log messages are often generated by libraries we depend on
149 * which use standard Android logging.
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800150 */
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800151 return 0;
152 }
153
154 /*
155 * struct {
156 * // what we provide to socket
157 * android_log_header_t header;
158 * // caller provides
159 * union {
160 * struct {
161 * char prio;
162 * char payload[];
163 * } string;
164 * struct {
165 * uint32_t tag
166 * char payload[];
167 * } binary;
168 * };
169 * };
170 */
171
172 header.tid = gettid();
173 header.realtime.tv_sec = ts->tv_sec;
174 header.realtime.tv_nsec = ts->tv_nsec;
175
176 newVec[0].iov_base = (unsigned char*)&header;
177 newVec[0].iov_len = sizeof(header);
178
179 if (sock >= 0) {
Tom Cherry71ba1642019-01-10 10:37:36 -0800180 int32_t snapshot = atomic_exchange_explicit(&droppedSecurity, 0, memory_order_relaxed);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800181 if (snapshot) {
182 android_log_event_int_t buffer;
183
184 header.id = LOG_ID_SECURITY;
Tom Cherry4c63e042019-09-30 14:33:46 -0700185 buffer.header.tag = LIBLOG_LOG_TAG;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800186 buffer.payload.type = EVENT_TYPE_INT;
Tom Cherry4c63e042019-09-30 14:33:46 -0700187 buffer.payload.data = snapshot;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800188
189 newVec[headerLength].iov_base = &buffer;
190 newVec[headerLength].iov_len = sizeof(buffer);
191
192 ret = TEMP_FAILURE_RETRY(writev(sock, newVec, 2));
193 if (ret != (ssize_t)(sizeof(header) + sizeof(buffer))) {
Tom Cherry71ba1642019-01-10 10:37:36 -0800194 atomic_fetch_add_explicit(&droppedSecurity, snapshot, memory_order_relaxed);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800195 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800196 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800197 snapshot = atomic_exchange_explicit(&dropped, 0, memory_order_relaxed);
Tom Cherry71ba1642019-01-10 10:37:36 -0800198 if (snapshot && __android_log_is_loggable_len(ANDROID_LOG_INFO, "liblog", strlen("liblog"),
199 ANDROID_LOG_VERBOSE)) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800200 android_log_event_int_t buffer;
201
202 header.id = LOG_ID_EVENTS;
Tom Cherry4c63e042019-09-30 14:33:46 -0700203 buffer.header.tag = LIBLOG_LOG_TAG;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800204 buffer.payload.type = EVENT_TYPE_INT;
Tom Cherry4c63e042019-09-30 14:33:46 -0700205 buffer.payload.data = snapshot;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800206
207 newVec[headerLength].iov_base = &buffer;
208 newVec[headerLength].iov_len = sizeof(buffer);
209
210 ret = TEMP_FAILURE_RETRY(writev(sock, newVec, 2));
211 if (ret != (ssize_t)(sizeof(header) + sizeof(buffer))) {
212 atomic_fetch_add_explicit(&dropped, snapshot, memory_order_relaxed);
213 }
214 }
215 }
216
217 header.id = logId;
218
219 for (payloadSize = 0, i = headerLength; i < nr + headerLength; i++) {
220 newVec[i].iov_base = vec[i - headerLength].iov_base;
221 payloadSize += newVec[i].iov_len = vec[i - headerLength].iov_len;
222
223 if (payloadSize > LOGGER_ENTRY_MAX_PAYLOAD) {
224 newVec[i].iov_len -= payloadSize - LOGGER_ENTRY_MAX_PAYLOAD;
225 if (newVec[i].iov_len) {
226 ++i;
227 }
228 break;
229 }
230 }
231
232 /*
233 * The write below could be lost, but will never block.
234 *
235 * ENOTCONN occurs if logd has died.
236 * ENOENT occurs if logd is not running and socket is missing.
237 * ECONNREFUSED occurs if we can not reconnect to logd.
238 * EAGAIN occurs if logd is overloaded.
239 */
240 if (sock < 0) {
241 ret = sock;
242 } else {
243 ret = TEMP_FAILURE_RETRY(writev(sock, newVec, i));
244 if (ret < 0) {
245 ret = -errno;
246 }
247 }
248 switch (ret) {
Mark Salyzyn65e1e622017-01-03 13:28:18 -0800249 case -ENOTCONN:
250 case -ECONNREFUSED:
251 case -ENOENT:
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800252 if (__android_log_trylock()) {
253 return ret; /* in a signal handler? try again when less stressed */
254 }
255 __logdClose(ret);
256 ret = logdOpen();
257 __android_log_unlock();
Mark Salyzyn65e1e622017-01-03 13:28:18 -0800258
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800259 if (ret < 0) {
260 return ret;
261 }
Mark Salyzyn65e1e622017-01-03 13:28:18 -0800262
Tom Cherry71ba1642019-01-10 10:37:36 -0800263 ret = TEMP_FAILURE_RETRY(writev(atomic_load(&logdLoggerWrite.context.sock), newVec, i));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800264 if (ret < 0) {
265 ret = -errno;
266 }
Tom Cherry71ba1642019-01-10 10:37:36 -0800267 [[fallthrough]];
Mark Salyzyn65e1e622017-01-03 13:28:18 -0800268 default:
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800269 break;
270 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800271
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800272 if (ret > (ssize_t)sizeof(header)) {
273 ret -= sizeof(header);
274 } else if (ret == -EAGAIN) {
275 atomic_fetch_add_explicit(&dropped, 1, memory_order_relaxed);
276 if (logId == LOG_ID_SECURITY) {
277 atomic_fetch_add_explicit(&droppedSecurity, 1, memory_order_relaxed);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800278 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800279 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800280
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800281 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800282}