blob: 37333570ded556e9b7be3c48fb2811bbfb57f496 [file] [log] [blame]
Mark Salyzyn018a96d2016-03-01 13:45:42 -08001/*
2 * Copyright (C) 2007-2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Tom Cherry2ec6a532020-01-27 08:35:13 -080017#include "logger_write.h"
18
Mark Salyzyn018a96d2016-03-01 13:45:42 -080019#include <errno.h>
Tom Cherry349b0c42020-01-08 14:47:42 -080020#include <inttypes.h>
Tom Cherry69ee5dd2020-01-22 07:48:42 -080021#include <libgen.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080022#include <stdlib.h>
23#include <string.h>
24#include <sys/time.h>
25
26#ifdef __BIONIC__
27#include <android/set_abort_message.h>
28#endif
29
Tom Cherry349b0c42020-01-08 14:47:42 -080030#include <shared_mutex>
31
Tom Cherry121292d2020-01-14 09:52:10 -080032#include <android-base/macros.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080033#include <private/android_filesystem_config.h>
34#include <private/android_logger.h>
35
Tom Cherry349b0c42020-01-08 14:47:42 -080036#include "android/log.h"
Tom Cherry69ee5dd2020-01-22 07:48:42 -080037#include "log/log_read.h"
Mark Salyzyn018a96d2016-03-01 13:45:42 -080038#include "logger.h"
Tom Cherry349b0c42020-01-08 14:47:42 -080039#include "rwlock.h"
Tom Cherry6f6ef392019-01-16 14:17:08 -080040#include "uio.h"
Mark Salyzyn018a96d2016-03-01 13:45:42 -080041
Tom Cherry97ec4ee2019-10-02 10:52:55 -070042#if (FAKE_LOG_DEVICE == 0)
Tom Cherry21bb36c2020-01-08 15:18:26 -080043#include "logd_writer.h"
44#include "pmsg_writer.h"
Tom Cherry97ec4ee2019-10-02 10:52:55 -070045#else
Tom Cherry21bb36c2020-01-08 15:18:26 -080046#include "fake_log_device.h"
Tom Cherry97ec4ee2019-10-02 10:52:55 -070047#endif
Tom Cherry2beabe52019-10-01 13:05:58 -070048
Tom Cherry349b0c42020-01-08 14:47:42 -080049#if defined(__APPLE__)
50#include <pthread.h>
51#elif defined(__linux__) && !defined(__ANDROID__)
52#include <syscall.h>
53#elif defined(_WIN32)
54#include <windows.h>
55#endif
56
Tom Cherry21bb36c2020-01-08 15:18:26 -080057#define LOG_BUF_SIZE 1024
58
Dan Willemsen0910d2d2016-11-29 13:39:55 -080059#if defined(__ANDROID__)
Tom Cherry06e0fce2019-12-11 14:26:37 -080060static int check_log_uid_permissions() {
Tom Cherryb47aa2a2020-01-08 15:34:14 -080061 uid_t uid = getuid();
Mark Salyzync33103c2016-03-28 16:20:29 -070062
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080063 /* Matches clientHasLogCredentials() in logd */
64 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) {
65 uid = geteuid();
Mark Salyzync33103c2016-03-28 16:20:29 -070066 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080067 gid_t gid = getgid();
68 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) {
69 gid = getegid();
70 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) {
71 int num_groups;
72 gid_t* groups;
Mark Salyzync33103c2016-03-28 16:20:29 -070073
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080074 num_groups = getgroups(0, NULL);
75 if (num_groups <= 0) {
76 return -EPERM;
77 }
Tom Cherry71ba1642019-01-10 10:37:36 -080078 groups = static_cast<gid_t*>(calloc(num_groups, sizeof(gid_t)));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080079 if (!groups) {
80 return -ENOMEM;
81 }
82 num_groups = getgroups(num_groups, groups);
83 while (num_groups > 0) {
84 if (groups[num_groups - 1] == AID_LOG) {
85 break;
Mark Salyzync33103c2016-03-28 16:20:29 -070086 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080087 --num_groups;
88 }
89 free(groups);
90 if (num_groups <= 0) {
91 return -EPERM;
92 }
Mark Salyzync33103c2016-03-28 16:20:29 -070093 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080094 }
Mark Salyzync33103c2016-03-28 16:20:29 -070095 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080096 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080097 return 0;
Mark Salyzync33103c2016-03-28 16:20:29 -070098}
Tom Cherry06e0fce2019-12-11 14:26:37 -080099#endif
Mark Salyzync33103c2016-03-28 16:20:29 -0700100
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700101/*
102 * Release any logger resources. A new log write will immediately re-acquire.
103 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800104void __android_log_close() {
Tom Cherry21bb36c2020-01-08 15:18:26 -0800105#if (FAKE_LOG_DEVICE == 0)
106 LogdClose();
107 PmsgClose();
108#else
109 FakeClose();
110#endif
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700111}
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800112
Tom Cherry69ee5dd2020-01-22 07:48:42 -0800113#if defined(__GLIBC__) || defined(_WIN32)
114static const char* getprogname() {
115#if defined(__GLIBC__)
116 return program_invocation_short_name;
117#elif defined(_WIN32)
118 static bool first = true;
119 static char progname[MAX_PATH] = {};
120
121 if (first) {
122 char path[PATH_MAX + 1];
123 DWORD result = GetModuleFileName(nullptr, path, sizeof(path) - 1);
124 if (result == 0 || result == sizeof(path) - 1) return "";
125 path[PATH_MAX - 1] = 0;
126
127 char* path_basename = basename(path);
128
129 snprintf(progname, sizeof(progname), "%s", path_basename);
130 first = false;
131 }
132
133 return progname;
134#endif
135}
136#endif
137
138// It's possible for logging to happen during static initialization before our globals are
139// initialized, so we place this std::string in a function such that it is initialized on the first
140// call.
Tom Cherry2ec6a532020-01-27 08:35:13 -0800141std::string& GetDefaultTag() {
Tom Cherry69ee5dd2020-01-22 07:48:42 -0800142 static std::string default_tag = getprogname();
143 return default_tag;
144}
Tom Cherry2ec6a532020-01-27 08:35:13 -0800145RwLock default_tag_lock;
Tom Cherry69ee5dd2020-01-22 07:48:42 -0800146
147void __android_log_set_default_tag(const char* tag) {
148 auto lock = std::unique_lock{default_tag_lock};
149 GetDefaultTag().assign(tag, 0, LOGGER_ENTRY_MAX_PAYLOAD);
150}
151
Tom Cherry0391a872020-01-16 15:58:02 -0800152static int minimum_log_priority = ANDROID_LOG_DEFAULT;
153int __android_log_set_minimum_priority(int priority) {
154 int old_minimum_log_priority = minimum_log_priority;
155 minimum_log_priority = priority;
156 return old_minimum_log_priority;
157}
158
159int __android_log_get_minimum_priority() {
160 return minimum_log_priority;
161}
162
Tom Cherry349b0c42020-01-08 14:47:42 -0800163#ifdef __ANDROID__
164static __android_logger_function logger_function = __android_log_logd_logger;
165#else
166static __android_logger_function logger_function = __android_log_stderr_logger;
167#endif
168static RwLock logger_function_lock;
169
170void __android_log_set_logger(__android_logger_function logger) {
171 auto lock = std::unique_lock{logger_function_lock};
172 logger_function = logger;
173}
174
175void __android_log_default_aborter(const char* abort_message) {
176#ifdef __ANDROID__
177 android_set_abort_message(abort_message);
178#else
179 UNUSED(abort_message);
180#endif
181 abort();
182}
183
184static __android_aborter_function aborter_function = __android_log_default_aborter;
185static RwLock aborter_function_lock;
186
187void __android_log_set_aborter(__android_aborter_function aborter) {
188 auto lock = std::unique_lock{aborter_function_lock};
189 aborter_function = aborter;
190}
191
192void __android_log_call_aborter(const char* abort_message) {
193 auto lock = std::shared_lock{aborter_function_lock};
194 aborter_function(abort_message);
195}
196
197#ifdef __ANDROID__
Tom Cherry06e0fce2019-12-11 14:26:37 -0800198static int write_to_log(log_id_t log_id, struct iovec* vec, size_t nr) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800199 int ret, save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800200 struct timespec ts;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800201
Mark Salyzyn72d37242018-03-07 10:42:06 -0800202 save_errno = errno;
Tom Cherry06e0fce2019-12-11 14:26:37 -0800203
204 if (log_id == LOG_ID_KERNEL) {
205 return -EINVAL;
206 }
207
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800208 clock_gettime(android_log_clockid(), &ts);
Mark Salyzyn142b43d2016-12-28 10:30:57 -0800209
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800210 if (log_id == LOG_ID_SECURITY) {
211 if (vec[0].iov_len < 4) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800212 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800213 return -EINVAL;
214 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800215
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800216 ret = check_log_uid_permissions();
217 if (ret < 0) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800218 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800219 return ret;
220 }
221 if (!__android_log_security()) {
222 /* If only we could reset downstream logd counter */
Mark Salyzyn72d37242018-03-07 10:42:06 -0800223 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800224 return -EPERM;
225 }
Yao Chen025f05a2017-12-01 15:48:19 -0800226 } else if (log_id == LOG_ID_EVENTS || log_id == LOG_ID_STATS) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800227 if (vec[0].iov_len < 4) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800228 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800229 return -EINVAL;
230 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800231 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800232
Tom Cherry21bb36c2020-01-08 15:18:26 -0800233 ret = LogdWrite(log_id, &ts, vec, nr);
234 PmsgWrite(log_id, &ts, vec, nr);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800235
Mark Salyzyn72d37242018-03-07 10:42:06 -0800236 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800237 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800238}
Tom Cherry349b0c42020-01-08 14:47:42 -0800239#else
240static int write_to_log(log_id_t, struct iovec*, size_t) {
241 // Non-Android text logs should go to __android_log_stderr_logger, not here.
242 // Non-Android binary logs are always dropped.
243 return 1;
244}
245#endif
246
247// Copied from base/threads.cpp
248static uint64_t GetThreadId() {
249#if defined(__BIONIC__)
250 return gettid();
251#elif defined(__APPLE__)
252 uint64_t tid;
253 pthread_threadid_np(NULL, &tid);
254 return tid;
255#elif defined(__linux__)
256 return syscall(__NR_gettid);
257#elif defined(_WIN32)
258 return GetCurrentThreadId();
259#endif
260}
261
262void __android_log_stderr_logger(const struct __android_logger_data* logger_data,
263 const char* message) {
264 struct tm now;
265 time_t t = time(nullptr);
266
267#if defined(_WIN32)
268 localtime_s(&now, &t);
269#else
270 localtime_r(&t, &now);
271#endif
272
273 char timestamp[32];
274 strftime(timestamp, sizeof(timestamp), "%m-%d %H:%M:%S", &now);
275
276 static const char log_characters[] = "XXVDIWEF";
277 static_assert(arraysize(log_characters) - 1 == ANDROID_LOG_SILENT,
278 "Mismatch in size of log_characters and values in android_LogPriority");
279 int priority =
280 logger_data->priority > ANDROID_LOG_SILENT ? ANDROID_LOG_FATAL : logger_data->priority;
281 char priority_char = log_characters[priority];
282 uint64_t tid = GetThreadId();
283
284 if (logger_data->file != nullptr) {
285 fprintf(stderr, "%s %c %s %5d %5" PRIu64 " %s:%u] %s\n",
286 logger_data->tag ? logger_data->tag : "nullptr", priority_char, timestamp, getpid(),
287 tid, logger_data->file, logger_data->line, message);
288 } else {
289 fprintf(stderr, "%s %c %s %5d %5" PRIu64 " %s\n",
290 logger_data->tag ? logger_data->tag : "nullptr", priority_char, timestamp, getpid(),
291 tid, message);
292 }
293}
294
295void __android_log_logd_logger(const struct __android_logger_data* logger_data,
296 const char* message) {
297 int buffer_id = logger_data->buffer_id == LOG_ID_DEFAULT ? LOG_ID_MAIN : logger_data->buffer_id;
298
299 struct iovec vec[3];
300 vec[0].iov_base =
301 const_cast<unsigned char*>(reinterpret_cast<const unsigned char*>(&logger_data->priority));
302 vec[0].iov_len = 1;
303 vec[1].iov_base = const_cast<void*>(static_cast<const void*>(logger_data->tag));
304 vec[1].iov_len = strlen(logger_data->tag) + 1;
305 vec[2].iov_base = const_cast<void*>(static_cast<const void*>(message));
306 vec[2].iov_len = strlen(message) + 1;
307
308 write_to_log(static_cast<log_id_t>(buffer_id), vec, 3);
309}
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800310
Tom Cherry2d9779e2019-02-08 11:46:19 -0800311int __android_log_write(int prio, const char* tag, const char* msg) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800312 return __android_log_buf_write(LOG_ID_MAIN, prio, tag, msg);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800313}
314
Tom Cherry349b0c42020-01-08 14:47:42 -0800315void __android_log_write_logger_data(__android_logger_data* logger_data, const char* msg) {
Tom Cherry69ee5dd2020-01-22 07:48:42 -0800316 auto tag_lock = std::shared_lock{default_tag_lock, std::defer_lock};
317 if (logger_data->tag == nullptr) {
318 tag_lock.lock();
319 logger_data->tag = GetDefaultTag().c_str();
320 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800321
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800322#if __BIONIC__
Tom Cherry349b0c42020-01-08 14:47:42 -0800323 if (logger_data->priority == ANDROID_LOG_FATAL) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800324 android_set_abort_message(msg);
325 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800326#endif
327
Tom Cherry349b0c42020-01-08 14:47:42 -0800328 auto lock = std::shared_lock{logger_function_lock};
329 logger_function(logger_data, msg);
330}
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800331
Tom Cherry349b0c42020-01-08 14:47:42 -0800332int __android_log_buf_write(int bufID, int prio, const char* tag, const char* msg) {
Tom Cherry96e7ef52020-01-22 08:20:03 -0800333 if (!__android_log_is_loggable(prio, tag, ANDROID_LOG_VERBOSE)) {
334 return 0;
335 }
336
Tom Cherry349b0c42020-01-08 14:47:42 -0800337 __android_logger_data logger_data = {sizeof(__android_logger_data), bufID, prio, tag, nullptr, 0};
338 __android_log_write_logger_data(&logger_data, msg);
339 return 1;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800340}
341
Tom Cherry2d9779e2019-02-08 11:46:19 -0800342int __android_log_vprint(int prio, const char* tag, const char* fmt, va_list ap) {
Tom Cherry96e7ef52020-01-22 08:20:03 -0800343 if (!__android_log_is_loggable(prio, tag, ANDROID_LOG_VERBOSE)) {
344 return 0;
345 }
346
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800347 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800348
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800349 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800350
Tom Cherry96e7ef52020-01-22 08:20:03 -0800351 __android_logger_data logger_data = {
352 sizeof(__android_logger_data), LOG_ID_MAIN, prio, tag, nullptr, 0};
353 __android_log_write_logger_data(&logger_data, buf);
354 return 1;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800355}
356
Tom Cherry2d9779e2019-02-08 11:46:19 -0800357int __android_log_print(int prio, const char* tag, const char* fmt, ...) {
Tom Cherry96e7ef52020-01-22 08:20:03 -0800358 if (!__android_log_is_loggable(prio, tag, ANDROID_LOG_VERBOSE)) {
359 return 0;
360 }
361
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800362 va_list ap;
363 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800364
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800365 va_start(ap, fmt);
366 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
367 va_end(ap);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800368
Tom Cherry96e7ef52020-01-22 08:20:03 -0800369 __android_logger_data logger_data = {
370 sizeof(__android_logger_data), LOG_ID_MAIN, prio, tag, nullptr, 0};
371 __android_log_write_logger_data(&logger_data, buf);
372 return 1;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800373}
374
Tom Cherry2d9779e2019-02-08 11:46:19 -0800375int __android_log_buf_print(int bufID, int prio, const char* tag, const char* fmt, ...) {
Tom Cherry96e7ef52020-01-22 08:20:03 -0800376 if (!__android_log_is_loggable(prio, tag, ANDROID_LOG_VERBOSE)) {
377 return 0;
378 }
379
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800380 va_list ap;
381 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800382
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800383 va_start(ap, fmt);
384 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
385 va_end(ap);
386
Tom Cherry96e7ef52020-01-22 08:20:03 -0800387 __android_logger_data logger_data = {sizeof(__android_logger_data), bufID, prio, tag, nullptr, 0};
388 __android_log_write_logger_data(&logger_data, buf);
389 return 1;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800390}
391
Tom Cherry2d9779e2019-02-08 11:46:19 -0800392void __android_log_assert(const char* cond, const char* tag, const char* fmt, ...) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800393 char buf[LOG_BUF_SIZE];
394
395 if (fmt) {
396 va_list ap;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800397 va_start(ap, fmt);
398 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
399 va_end(ap);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800400 } else {
401 /* Msg not provided, log condition. N.B. Do not use cond directly as
402 * format string as it could contain spurious '%' syntax (e.g.
403 * "%d" in "blocks%devs == 0").
404 */
405 if (cond)
406 snprintf(buf, LOG_BUF_SIZE, "Assertion failed: %s", cond);
407 else
408 strcpy(buf, "Unspecified assertion failed");
409 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800410
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800411 // Log assertion failures to stderr for the benefit of "adb shell" users
412 // and gtests (http://b/23675822).
Tom Cherry6f6ef392019-01-16 14:17:08 -0800413 TEMP_FAILURE_RETRY(write(2, buf, strlen(buf)));
414 TEMP_FAILURE_RETRY(write(2, "\n", 1));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800415
416 __android_log_write(ANDROID_LOG_FATAL, tag, buf);
Tom Cherry349b0c42020-01-08 14:47:42 -0800417 __android_log_call_aborter(buf);
418 abort();
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800419}
420
Tom Cherry2d9779e2019-02-08 11:46:19 -0800421int __android_log_bwrite(int32_t tag, const void* payload, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800422 struct iovec vec[2];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800423
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800424 vec[0].iov_base = &tag;
425 vec[0].iov_len = sizeof(tag);
426 vec[1].iov_base = (void*)payload;
427 vec[1].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800428
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800429 return write_to_log(LOG_ID_EVENTS, vec, 2);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800430}
431
Tom Cherry2d9779e2019-02-08 11:46:19 -0800432int __android_log_stats_bwrite(int32_t tag, const void* payload, size_t len) {
Stefan Lafon701a0652017-08-24 20:14:06 -0700433 struct iovec vec[2];
434
435 vec[0].iov_base = &tag;
436 vec[0].iov_len = sizeof(tag);
437 vec[1].iov_base = (void*)payload;
438 vec[1].iov_len = len;
439
440 return write_to_log(LOG_ID_STATS, vec, 2);
441}
442
Tom Cherry2d9779e2019-02-08 11:46:19 -0800443int __android_log_security_bwrite(int32_t tag, const void* payload, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800444 struct iovec vec[2];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800445
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800446 vec[0].iov_base = &tag;
447 vec[0].iov_len = sizeof(tag);
448 vec[1].iov_base = (void*)payload;
449 vec[1].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800450
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800451 return write_to_log(LOG_ID_SECURITY, vec, 2);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800452}
453
454/*
455 * Like __android_log_bwrite, but takes the type as well. Doesn't work
456 * for the general case where we're generating lists of stuff, but very
457 * handy if we just want to dump an integer into the log.
458 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800459int __android_log_btwrite(int32_t tag, char type, const void* payload, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800460 struct iovec vec[3];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800461
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800462 vec[0].iov_base = &tag;
463 vec[0].iov_len = sizeof(tag);
464 vec[1].iov_base = &type;
465 vec[1].iov_len = sizeof(type);
466 vec[2].iov_base = (void*)payload;
467 vec[2].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800468
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800469 return write_to_log(LOG_ID_EVENTS, vec, 3);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800470}
471
472/*
473 * Like __android_log_bwrite, but used for writing strings to the
474 * event log.
475 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800476int __android_log_bswrite(int32_t tag, const char* payload) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800477 struct iovec vec[4];
478 char type = EVENT_TYPE_STRING;
479 uint32_t len = strlen(payload);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800480
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800481 vec[0].iov_base = &tag;
482 vec[0].iov_len = sizeof(tag);
483 vec[1].iov_base = &type;
484 vec[1].iov_len = sizeof(type);
485 vec[2].iov_base = &len;
486 vec[2].iov_len = sizeof(len);
487 vec[3].iov_base = (void*)payload;
488 vec[3].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800489
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800490 return write_to_log(LOG_ID_EVENTS, vec, 4);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800491}
492
493/*
494 * Like __android_log_security_bwrite, but used for writing strings to the
495 * security log.
496 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800497int __android_log_security_bswrite(int32_t tag, const char* payload) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800498 struct iovec vec[4];
499 char type = EVENT_TYPE_STRING;
500 uint32_t len = strlen(payload);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800501
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800502 vec[0].iov_base = &tag;
503 vec[0].iov_len = sizeof(tag);
504 vec[1].iov_base = &type;
505 vec[1].iov_len = sizeof(type);
506 vec[2].iov_base = &len;
507 vec[2].iov_len = sizeof(len);
508 vec[3].iov_base = (void*)payload;
509 vec[3].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800510
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800511 return write_to_log(LOG_ID_SECURITY, vec, 4);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800512}