blob: e86d9ec13c419303309c92a18f3b23487c948071 [file] [log] [blame]
Mark Salyzyn018a96d2016-03-01 13:45:42 -08001/*
2 * Copyright (C) 2007-2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <errno.h>
Tom Cherry349b0c42020-01-08 14:47:42 -080018#include <inttypes.h>
Tom Cherry69ee5dd2020-01-22 07:48:42 -080019#include <libgen.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080020#include <stdlib.h>
21#include <string.h>
22#include <sys/time.h>
23
24#ifdef __BIONIC__
25#include <android/set_abort_message.h>
26#endif
27
Tom Cherry349b0c42020-01-08 14:47:42 -080028#include <shared_mutex>
29
Tom Cherry121292d2020-01-14 09:52:10 -080030#include <android-base/macros.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080031#include <private/android_filesystem_config.h>
32#include <private/android_logger.h>
33
Tom Cherry349b0c42020-01-08 14:47:42 -080034#include "android/log.h"
Tom Cherry69ee5dd2020-01-22 07:48:42 -080035#include "log/log_read.h"
Mark Salyzyn018a96d2016-03-01 13:45:42 -080036#include "logger.h"
Tom Cherry349b0c42020-01-08 14:47:42 -080037#include "rwlock.h"
Tom Cherry6f6ef392019-01-16 14:17:08 -080038#include "uio.h"
Mark Salyzyn018a96d2016-03-01 13:45:42 -080039
Tom Cherry97ec4ee2019-10-02 10:52:55 -070040#if (FAKE_LOG_DEVICE == 0)
Tom Cherry21bb36c2020-01-08 15:18:26 -080041#include "logd_writer.h"
42#include "pmsg_writer.h"
Tom Cherry97ec4ee2019-10-02 10:52:55 -070043#else
Tom Cherry21bb36c2020-01-08 15:18:26 -080044#include "fake_log_device.h"
Tom Cherry97ec4ee2019-10-02 10:52:55 -070045#endif
Tom Cherry2beabe52019-10-01 13:05:58 -070046
Tom Cherry349b0c42020-01-08 14:47:42 -080047#if defined(__APPLE__)
48#include <pthread.h>
49#elif defined(__linux__) && !defined(__ANDROID__)
50#include <syscall.h>
51#elif defined(_WIN32)
52#include <windows.h>
53#endif
54
Tom Cherry21bb36c2020-01-08 15:18:26 -080055#define LOG_BUF_SIZE 1024
56
Dan Willemsen0910d2d2016-11-29 13:39:55 -080057#if defined(__ANDROID__)
Tom Cherry06e0fce2019-12-11 14:26:37 -080058static int check_log_uid_permissions() {
Tom Cherryb47aa2a2020-01-08 15:34:14 -080059 uid_t uid = getuid();
Mark Salyzync33103c2016-03-28 16:20:29 -070060
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080061 /* Matches clientHasLogCredentials() in logd */
62 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) {
63 uid = geteuid();
Mark Salyzync33103c2016-03-28 16:20:29 -070064 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080065 gid_t gid = getgid();
66 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) {
67 gid = getegid();
68 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) {
69 int num_groups;
70 gid_t* groups;
Mark Salyzync33103c2016-03-28 16:20:29 -070071
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080072 num_groups = getgroups(0, NULL);
73 if (num_groups <= 0) {
74 return -EPERM;
75 }
Tom Cherry71ba1642019-01-10 10:37:36 -080076 groups = static_cast<gid_t*>(calloc(num_groups, sizeof(gid_t)));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080077 if (!groups) {
78 return -ENOMEM;
79 }
80 num_groups = getgroups(num_groups, groups);
81 while (num_groups > 0) {
82 if (groups[num_groups - 1] == AID_LOG) {
83 break;
Mark Salyzync33103c2016-03-28 16:20:29 -070084 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080085 --num_groups;
86 }
87 free(groups);
88 if (num_groups <= 0) {
89 return -EPERM;
90 }
Mark Salyzync33103c2016-03-28 16:20:29 -070091 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080092 }
Mark Salyzync33103c2016-03-28 16:20:29 -070093 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080094 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080095 return 0;
Mark Salyzync33103c2016-03-28 16:20:29 -070096}
Tom Cherry06e0fce2019-12-11 14:26:37 -080097#endif
Mark Salyzync33103c2016-03-28 16:20:29 -070098
Mark Salyzyndf7a4c62016-08-23 10:23:36 -070099/*
100 * Release any logger resources. A new log write will immediately re-acquire.
101 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800102void __android_log_close() {
Tom Cherry21bb36c2020-01-08 15:18:26 -0800103#if (FAKE_LOG_DEVICE == 0)
104 LogdClose();
105 PmsgClose();
106#else
107 FakeClose();
108#endif
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700109}
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800110
Tom Cherry69ee5dd2020-01-22 07:48:42 -0800111#if defined(__GLIBC__) || defined(_WIN32)
112static const char* getprogname() {
113#if defined(__GLIBC__)
114 return program_invocation_short_name;
115#elif defined(_WIN32)
116 static bool first = true;
117 static char progname[MAX_PATH] = {};
118
119 if (first) {
120 char path[PATH_MAX + 1];
121 DWORD result = GetModuleFileName(nullptr, path, sizeof(path) - 1);
122 if (result == 0 || result == sizeof(path) - 1) return "";
123 path[PATH_MAX - 1] = 0;
124
125 char* path_basename = basename(path);
126
127 snprintf(progname, sizeof(progname), "%s", path_basename);
128 first = false;
129 }
130
131 return progname;
132#endif
133}
134#endif
135
136// It's possible for logging to happen during static initialization before our globals are
137// initialized, so we place this std::string in a function such that it is initialized on the first
138// call.
139static std::string& GetDefaultTag() {
140 static std::string default_tag = getprogname();
141 return default_tag;
142}
143static RwLock default_tag_lock;
144
145void __android_log_set_default_tag(const char* tag) {
146 auto lock = std::unique_lock{default_tag_lock};
147 GetDefaultTag().assign(tag, 0, LOGGER_ENTRY_MAX_PAYLOAD);
148}
149
Tom Cherry0391a872020-01-16 15:58:02 -0800150static int minimum_log_priority = ANDROID_LOG_DEFAULT;
151int __android_log_set_minimum_priority(int priority) {
152 int old_minimum_log_priority = minimum_log_priority;
153 minimum_log_priority = priority;
154 return old_minimum_log_priority;
155}
156
157int __android_log_get_minimum_priority() {
158 return minimum_log_priority;
159}
160
Tom Cherry349b0c42020-01-08 14:47:42 -0800161#ifdef __ANDROID__
162static __android_logger_function logger_function = __android_log_logd_logger;
163#else
164static __android_logger_function logger_function = __android_log_stderr_logger;
165#endif
166static RwLock logger_function_lock;
167
168void __android_log_set_logger(__android_logger_function logger) {
169 auto lock = std::unique_lock{logger_function_lock};
170 logger_function = logger;
171}
172
173void __android_log_default_aborter(const char* abort_message) {
174#ifdef __ANDROID__
175 android_set_abort_message(abort_message);
176#else
177 UNUSED(abort_message);
178#endif
179 abort();
180}
181
182static __android_aborter_function aborter_function = __android_log_default_aborter;
183static RwLock aborter_function_lock;
184
185void __android_log_set_aborter(__android_aborter_function aborter) {
186 auto lock = std::unique_lock{aborter_function_lock};
187 aborter_function = aborter;
188}
189
190void __android_log_call_aborter(const char* abort_message) {
191 auto lock = std::shared_lock{aborter_function_lock};
192 aborter_function(abort_message);
193}
194
195#ifdef __ANDROID__
Tom Cherry06e0fce2019-12-11 14:26:37 -0800196static int write_to_log(log_id_t log_id, struct iovec* vec, size_t nr) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800197 int ret, save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800198 struct timespec ts;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800199
Mark Salyzyn72d37242018-03-07 10:42:06 -0800200 save_errno = errno;
Tom Cherry06e0fce2019-12-11 14:26:37 -0800201
202 if (log_id == LOG_ID_KERNEL) {
203 return -EINVAL;
204 }
205
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800206 clock_gettime(android_log_clockid(), &ts);
Mark Salyzyn142b43d2016-12-28 10:30:57 -0800207
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800208 if (log_id == LOG_ID_SECURITY) {
209 if (vec[0].iov_len < 4) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800210 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800211 return -EINVAL;
212 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800213
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800214 ret = check_log_uid_permissions();
215 if (ret < 0) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800216 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800217 return ret;
218 }
219 if (!__android_log_security()) {
220 /* If only we could reset downstream logd counter */
Mark Salyzyn72d37242018-03-07 10:42:06 -0800221 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800222 return -EPERM;
223 }
Yao Chen025f05a2017-12-01 15:48:19 -0800224 } else if (log_id == LOG_ID_EVENTS || log_id == LOG_ID_STATS) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800225 if (vec[0].iov_len < 4) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800226 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800227 return -EINVAL;
228 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800229 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800230
Tom Cherry21bb36c2020-01-08 15:18:26 -0800231 ret = LogdWrite(log_id, &ts, vec, nr);
232 PmsgWrite(log_id, &ts, vec, nr);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800233
Mark Salyzyn72d37242018-03-07 10:42:06 -0800234 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800235 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800236}
Tom Cherry349b0c42020-01-08 14:47:42 -0800237#else
238static int write_to_log(log_id_t, struct iovec*, size_t) {
239 // Non-Android text logs should go to __android_log_stderr_logger, not here.
240 // Non-Android binary logs are always dropped.
241 return 1;
242}
243#endif
244
245// Copied from base/threads.cpp
246static uint64_t GetThreadId() {
247#if defined(__BIONIC__)
248 return gettid();
249#elif defined(__APPLE__)
250 uint64_t tid;
251 pthread_threadid_np(NULL, &tid);
252 return tid;
253#elif defined(__linux__)
254 return syscall(__NR_gettid);
255#elif defined(_WIN32)
256 return GetCurrentThreadId();
257#endif
258}
259
260void __android_log_stderr_logger(const struct __android_logger_data* logger_data,
261 const char* message) {
262 struct tm now;
263 time_t t = time(nullptr);
264
265#if defined(_WIN32)
266 localtime_s(&now, &t);
267#else
268 localtime_r(&t, &now);
269#endif
270
271 char timestamp[32];
272 strftime(timestamp, sizeof(timestamp), "%m-%d %H:%M:%S", &now);
273
274 static const char log_characters[] = "XXVDIWEF";
275 static_assert(arraysize(log_characters) - 1 == ANDROID_LOG_SILENT,
276 "Mismatch in size of log_characters and values in android_LogPriority");
277 int priority =
278 logger_data->priority > ANDROID_LOG_SILENT ? ANDROID_LOG_FATAL : logger_data->priority;
279 char priority_char = log_characters[priority];
280 uint64_t tid = GetThreadId();
281
282 if (logger_data->file != nullptr) {
283 fprintf(stderr, "%s %c %s %5d %5" PRIu64 " %s:%u] %s\n",
284 logger_data->tag ? logger_data->tag : "nullptr", priority_char, timestamp, getpid(),
285 tid, logger_data->file, logger_data->line, message);
286 } else {
287 fprintf(stderr, "%s %c %s %5d %5" PRIu64 " %s\n",
288 logger_data->tag ? logger_data->tag : "nullptr", priority_char, timestamp, getpid(),
289 tid, message);
290 }
291}
292
293void __android_log_logd_logger(const struct __android_logger_data* logger_data,
294 const char* message) {
295 int buffer_id = logger_data->buffer_id == LOG_ID_DEFAULT ? LOG_ID_MAIN : logger_data->buffer_id;
296
297 struct iovec vec[3];
298 vec[0].iov_base =
299 const_cast<unsigned char*>(reinterpret_cast<const unsigned char*>(&logger_data->priority));
300 vec[0].iov_len = 1;
301 vec[1].iov_base = const_cast<void*>(static_cast<const void*>(logger_data->tag));
302 vec[1].iov_len = strlen(logger_data->tag) + 1;
303 vec[2].iov_base = const_cast<void*>(static_cast<const void*>(message));
304 vec[2].iov_len = strlen(message) + 1;
305
306 write_to_log(static_cast<log_id_t>(buffer_id), vec, 3);
307}
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800308
Tom Cherry2d9779e2019-02-08 11:46:19 -0800309int __android_log_write(int prio, const char* tag, const char* msg) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800310 return __android_log_buf_write(LOG_ID_MAIN, prio, tag, msg);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800311}
312
Tom Cherry349b0c42020-01-08 14:47:42 -0800313void __android_log_write_logger_data(__android_logger_data* logger_data, const char* msg) {
Tom Cherry69ee5dd2020-01-22 07:48:42 -0800314 auto tag_lock = std::shared_lock{default_tag_lock, std::defer_lock};
315 if (logger_data->tag == nullptr) {
316 tag_lock.lock();
317 logger_data->tag = GetDefaultTag().c_str();
318 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800319
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800320#if __BIONIC__
Tom Cherry349b0c42020-01-08 14:47:42 -0800321 if (logger_data->priority == ANDROID_LOG_FATAL) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800322 android_set_abort_message(msg);
323 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800324#endif
325
Tom Cherry349b0c42020-01-08 14:47:42 -0800326 auto lock = std::shared_lock{logger_function_lock};
327 logger_function(logger_data, msg);
328}
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800329
Tom Cherry349b0c42020-01-08 14:47:42 -0800330int __android_log_buf_write(int bufID, int prio, const char* tag, const char* msg) {
Tom Cherry96e7ef52020-01-22 08:20:03 -0800331 if (!__android_log_is_loggable(prio, tag, ANDROID_LOG_VERBOSE)) {
332 return 0;
333 }
334
Tom Cherry349b0c42020-01-08 14:47:42 -0800335 __android_logger_data logger_data = {sizeof(__android_logger_data), bufID, prio, tag, nullptr, 0};
336 __android_log_write_logger_data(&logger_data, msg);
337 return 1;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800338}
339
Tom Cherry2d9779e2019-02-08 11:46:19 -0800340int __android_log_vprint(int prio, const char* tag, const char* fmt, va_list ap) {
Tom Cherry96e7ef52020-01-22 08:20:03 -0800341 if (!__android_log_is_loggable(prio, tag, ANDROID_LOG_VERBOSE)) {
342 return 0;
343 }
344
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800345 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800346
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800347 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800348
Tom Cherry96e7ef52020-01-22 08:20:03 -0800349 __android_logger_data logger_data = {
350 sizeof(__android_logger_data), LOG_ID_MAIN, prio, tag, nullptr, 0};
351 __android_log_write_logger_data(&logger_data, buf);
352 return 1;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800353}
354
Tom Cherry2d9779e2019-02-08 11:46:19 -0800355int __android_log_print(int prio, const char* tag, const char* fmt, ...) {
Tom Cherry96e7ef52020-01-22 08:20:03 -0800356 if (!__android_log_is_loggable(prio, tag, ANDROID_LOG_VERBOSE)) {
357 return 0;
358 }
359
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800360 va_list ap;
361 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800362
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800363 va_start(ap, fmt);
364 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
365 va_end(ap);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800366
Tom Cherry96e7ef52020-01-22 08:20:03 -0800367 __android_logger_data logger_data = {
368 sizeof(__android_logger_data), LOG_ID_MAIN, prio, tag, nullptr, 0};
369 __android_log_write_logger_data(&logger_data, buf);
370 return 1;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800371}
372
Tom Cherry2d9779e2019-02-08 11:46:19 -0800373int __android_log_buf_print(int bufID, int prio, const char* tag, const char* fmt, ...) {
Tom Cherry96e7ef52020-01-22 08:20:03 -0800374 if (!__android_log_is_loggable(prio, tag, ANDROID_LOG_VERBOSE)) {
375 return 0;
376 }
377
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800378 va_list ap;
379 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800380
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800381 va_start(ap, fmt);
382 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
383 va_end(ap);
384
Tom Cherry96e7ef52020-01-22 08:20:03 -0800385 __android_logger_data logger_data = {sizeof(__android_logger_data), bufID, prio, tag, nullptr, 0};
386 __android_log_write_logger_data(&logger_data, buf);
387 return 1;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800388}
389
Tom Cherry2d9779e2019-02-08 11:46:19 -0800390void __android_log_assert(const char* cond, const char* tag, const char* fmt, ...) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800391 char buf[LOG_BUF_SIZE];
392
393 if (fmt) {
394 va_list ap;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800395 va_start(ap, fmt);
396 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
397 va_end(ap);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800398 } else {
399 /* Msg not provided, log condition. N.B. Do not use cond directly as
400 * format string as it could contain spurious '%' syntax (e.g.
401 * "%d" in "blocks%devs == 0").
402 */
403 if (cond)
404 snprintf(buf, LOG_BUF_SIZE, "Assertion failed: %s", cond);
405 else
406 strcpy(buf, "Unspecified assertion failed");
407 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800408
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800409 // Log assertion failures to stderr for the benefit of "adb shell" users
410 // and gtests (http://b/23675822).
Tom Cherry6f6ef392019-01-16 14:17:08 -0800411 TEMP_FAILURE_RETRY(write(2, buf, strlen(buf)));
412 TEMP_FAILURE_RETRY(write(2, "\n", 1));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800413
414 __android_log_write(ANDROID_LOG_FATAL, tag, buf);
Tom Cherry349b0c42020-01-08 14:47:42 -0800415 __android_log_call_aborter(buf);
416 abort();
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800417}
418
Tom Cherry2d9779e2019-02-08 11:46:19 -0800419int __android_log_bwrite(int32_t tag, const void* payload, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800420 struct iovec vec[2];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800421
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800422 vec[0].iov_base = &tag;
423 vec[0].iov_len = sizeof(tag);
424 vec[1].iov_base = (void*)payload;
425 vec[1].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800426
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800427 return write_to_log(LOG_ID_EVENTS, vec, 2);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800428}
429
Tom Cherry2d9779e2019-02-08 11:46:19 -0800430int __android_log_stats_bwrite(int32_t tag, const void* payload, size_t len) {
Stefan Lafon701a0652017-08-24 20:14:06 -0700431 struct iovec vec[2];
432
433 vec[0].iov_base = &tag;
434 vec[0].iov_len = sizeof(tag);
435 vec[1].iov_base = (void*)payload;
436 vec[1].iov_len = len;
437
438 return write_to_log(LOG_ID_STATS, vec, 2);
439}
440
Tom Cherry2d9779e2019-02-08 11:46:19 -0800441int __android_log_security_bwrite(int32_t tag, const void* payload, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800442 struct iovec vec[2];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800443
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800444 vec[0].iov_base = &tag;
445 vec[0].iov_len = sizeof(tag);
446 vec[1].iov_base = (void*)payload;
447 vec[1].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800448
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800449 return write_to_log(LOG_ID_SECURITY, vec, 2);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800450}
451
452/*
453 * Like __android_log_bwrite, but takes the type as well. Doesn't work
454 * for the general case where we're generating lists of stuff, but very
455 * handy if we just want to dump an integer into the log.
456 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800457int __android_log_btwrite(int32_t tag, char type, const void* payload, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800458 struct iovec vec[3];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800459
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800460 vec[0].iov_base = &tag;
461 vec[0].iov_len = sizeof(tag);
462 vec[1].iov_base = &type;
463 vec[1].iov_len = sizeof(type);
464 vec[2].iov_base = (void*)payload;
465 vec[2].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800466
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800467 return write_to_log(LOG_ID_EVENTS, vec, 3);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800468}
469
470/*
471 * Like __android_log_bwrite, but used for writing strings to the
472 * event log.
473 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800474int __android_log_bswrite(int32_t tag, const char* payload) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800475 struct iovec vec[4];
476 char type = EVENT_TYPE_STRING;
477 uint32_t len = strlen(payload);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800478
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800479 vec[0].iov_base = &tag;
480 vec[0].iov_len = sizeof(tag);
481 vec[1].iov_base = &type;
482 vec[1].iov_len = sizeof(type);
483 vec[2].iov_base = &len;
484 vec[2].iov_len = sizeof(len);
485 vec[3].iov_base = (void*)payload;
486 vec[3].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800487
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800488 return write_to_log(LOG_ID_EVENTS, vec, 4);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800489}
490
491/*
492 * Like __android_log_security_bwrite, but used for writing strings to the
493 * security log.
494 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800495int __android_log_security_bswrite(int32_t tag, const char* payload) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800496 struct iovec vec[4];
497 char type = EVENT_TYPE_STRING;
498 uint32_t len = strlen(payload);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800499
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800500 vec[0].iov_base = &tag;
501 vec[0].iov_len = sizeof(tag);
502 vec[1].iov_base = &type;
503 vec[1].iov_len = sizeof(type);
504 vec[2].iov_base = &len;
505 vec[2].iov_len = sizeof(len);
506 vec[3].iov_base = (void*)payload;
507 vec[3].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800508
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800509 return write_to_log(LOG_ID_SECURITY, vec, 4);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800510}