blob: 4fbab4b15bee3e46cb845747142f06685e3542e2 [file] [log] [blame]
Mark Salyzyn018a96d2016-03-01 13:45:42 -08001/*
2 * Copyright (C) 2007-2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <errno.h>
18#include <stdatomic.h>
19#include <stdlib.h>
20#include <string.h>
21#include <sys/time.h>
22
23#ifdef __BIONIC__
24#include <android/set_abort_message.h>
25#endif
26
27#include <log/event_tag_map.h>
Mark Salyzyn81321a72017-03-09 07:28:29 -080028#include <log/log_transport.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080029#include <private/android_filesystem_config.h>
30#include <private/android_logger.h>
31
32#include "config_write.h"
33#include "log_portability.h"
34#include "logger.h"
Tom Cherry6f6ef392019-01-16 14:17:08 -080035#include "uio.h"
Mark Salyzyn018a96d2016-03-01 13:45:42 -080036
37#define LOG_BUF_SIZE 1024
38
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080039static int __write_to_log_init(log_id_t, struct iovec* vec, size_t nr);
Tom Cherry71ba1642019-01-10 10:37:36 -080040static int (*write_to_log)(log_id_t, struct iovec* vec, size_t nr) = __write_to_log_init;
Mark Salyzyn018a96d2016-03-01 13:45:42 -080041
42/*
43 * This is used by the C++ code to decide if it should write logs through
44 * the C code. Basically, if /dev/socket/logd is available, we're running in
45 * the simulator rather than a desktop tool and want to use the device.
46 */
Tom Cherry71ba1642019-01-10 10:37:36 -080047static enum { kLogUninitialized, kLogNotAvailable, kLogAvailable } g_log_status = kLogUninitialized;
Mark Salyzyn018a96d2016-03-01 13:45:42 -080048
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080049static int check_log_uid_permissions() {
Dan Willemsen0910d2d2016-11-29 13:39:55 -080050#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080051 uid_t uid = __android_log_uid();
Mark Salyzync33103c2016-03-28 16:20:29 -070052
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080053 /* Matches clientHasLogCredentials() in logd */
54 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) {
55 uid = geteuid();
Mark Salyzync33103c2016-03-28 16:20:29 -070056 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080057 gid_t gid = getgid();
58 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) {
59 gid = getegid();
60 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) {
61 int num_groups;
62 gid_t* groups;
Mark Salyzync33103c2016-03-28 16:20:29 -070063
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080064 num_groups = getgroups(0, NULL);
65 if (num_groups <= 0) {
66 return -EPERM;
67 }
Tom Cherry71ba1642019-01-10 10:37:36 -080068 groups = static_cast<gid_t*>(calloc(num_groups, sizeof(gid_t)));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080069 if (!groups) {
70 return -ENOMEM;
71 }
72 num_groups = getgroups(num_groups, groups);
73 while (num_groups > 0) {
74 if (groups[num_groups - 1] == AID_LOG) {
75 break;
Mark Salyzync33103c2016-03-28 16:20:29 -070076 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080077 --num_groups;
78 }
79 free(groups);
80 if (num_groups <= 0) {
81 return -EPERM;
82 }
Mark Salyzync33103c2016-03-28 16:20:29 -070083 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080084 }
Mark Salyzync33103c2016-03-28 16:20:29 -070085 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080086 }
Mark Salyzync33103c2016-03-28 16:20:29 -070087#endif
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080088 return 0;
Mark Salyzync33103c2016-03-28 16:20:29 -070089}
90
Tom Cherry71ba1642019-01-10 10:37:36 -080091static void __android_log_cache_available(struct android_log_transport_write* node) {
92 uint32_t i;
Mark Salyzync33103c2016-03-28 16:20:29 -070093
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080094 if (node->logMask) {
95 return;
96 }
Mark Salyzync33103c2016-03-28 16:20:29 -070097
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080098 for (i = LOG_ID_MIN; i < LOG_ID_MAX; ++i) {
99 if (node->write && (i != LOG_ID_KERNEL) &&
100 ((i != LOG_ID_SECURITY) || (check_log_uid_permissions() == 0)) &&
Tom Cherry71ba1642019-01-10 10:37:36 -0800101 (!node->available || ((*node->available)(static_cast<log_id_t>(i)) >= 0))) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800102 node->logMask |= 1 << i;
Mark Salyzync33103c2016-03-28 16:20:29 -0700103 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800104 }
Mark Salyzync33103c2016-03-28 16:20:29 -0700105}
106
Tom Cherry2d9779e2019-02-08 11:46:19 -0800107extern "C" int __android_log_dev_available() {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800108 struct android_log_transport_write* node;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800109
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800110 if (list_empty(&__android_log_transport_write)) {
111 return kLogUninitialized;
112 }
Mark Salyzync33103c2016-03-28 16:20:29 -0700113
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800114 write_transport_for_each(node, &__android_log_transport_write) {
115 __android_log_cache_available(node);
116 if (node->logMask) {
117 return kLogAvailable;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800118 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800119 }
120 return kLogNotAvailable;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800121}
Mark Salyzynba1a7982016-09-13 07:28:21 -0700122
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800123#if defined(__ANDROID__)
Mark Salyzynba1a7982016-09-13 07:28:21 -0700124static atomic_uintptr_t tagMap;
125#endif
126
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700127/*
128 * Release any logger resources. A new log write will immediately re-acquire.
129 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800130void __android_log_close() {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800131 struct android_log_transport_write* transport;
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800132#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800133 EventTagMap* m;
Mark Salyzynba1a7982016-09-13 07:28:21 -0700134#endif
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700135
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800136 __android_log_lock();
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700137
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800138 write_to_log = __write_to_log_init;
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700139
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800140 /*
141 * Threads that are actively writing at this point are not held back
142 * by a lock and are at risk of dropping the messages with a return code
143 * -EBADF. Prefer to return error code than add the overhead of a lock to
144 * each log writing call to guarantee delivery. In addition, anyone
145 * calling this is doing so to release the logging resources and shut down,
146 * for them to do so with outstanding log requests in other threads is a
147 * disengenuous use of this function.
148 */
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700149
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800150 write_transport_for_each(transport, &__android_log_persist_write) {
151 if (transport->close) {
152 (*transport->close)();
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700153 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800154 }
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700155
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800156 write_transport_for_each(transport, &__android_log_transport_write) {
157 if (transport->close) {
158 (*transport->close)();
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700159 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800160 }
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700161
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800162 __android_log_config_write_close();
Mark Salyzyn71002882016-03-08 16:18:26 -0800163
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800164#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800165 /*
166 * Additional risk here somewhat mitigated by immediately unlock flushing
167 * the processor cache. The multi-threaded race that we choose to accept,
168 * to minimize locking, is an atomic_load in a writer picking up a value
169 * just prior to entering this routine. There will be an use after free.
170 *
171 * Again, anyone calling this is doing so to release the logging resources
172 * is most probably going to quiesce then shut down; or to restart after
173 * a fork so the risk should be non-existent. For this reason we
174 * choose a mitigation stance for efficiency instead of incuring the cost
175 * of a lock for every log write.
176 */
177 m = (EventTagMap*)atomic_exchange(&tagMap, (uintptr_t)0);
Mark Salyzynba1a7982016-09-13 07:28:21 -0700178#endif
179
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800180 __android_log_unlock();
Mark Salyzynba1a7982016-09-13 07:28:21 -0700181
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800182#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800183 if (m != (EventTagMap*)(uintptr_t)-1LL) android_closeEventTagMap(m);
Mark Salyzynba1a7982016-09-13 07:28:21 -0700184#endif
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700185}
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800186
187/* log_init_lock assumed */
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800188static int __write_to_log_initialize() {
189 struct android_log_transport_write* transport;
190 struct listnode* n;
191 int i = 0, ret = 0;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800192
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800193 __android_log_config_write();
194 write_transport_for_each_safe(transport, n, &__android_log_transport_write) {
195 __android_log_cache_available(transport);
196 if (!transport->logMask) {
197 list_remove(&transport->node);
198 continue;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800199 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800200 if (!transport->open || ((*transport->open)() < 0)) {
201 if (transport->close) {
202 (*transport->close)();
203 }
204 list_remove(&transport->node);
205 continue;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800206 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800207 ++ret;
208 }
209 write_transport_for_each_safe(transport, n, &__android_log_persist_write) {
210 __android_log_cache_available(transport);
211 if (!transport->logMask) {
212 list_remove(&transport->node);
213 continue;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800214 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800215 if (!transport->open || ((*transport->open)() < 0)) {
216 if (transport->close) {
217 (*transport->close)();
218 }
219 list_remove(&transport->node);
220 continue;
221 }
222 ++i;
223 }
224 if (!ret && !i) {
225 return -ENODEV;
226 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800227
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800228 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800229}
230
231/*
232 * Extract a 4-byte value from a byte stream. le32toh open coded
233 */
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800234static inline uint32_t get4LE(const uint8_t* src) {
235 return src[0] | (src[1] << 8) | (src[2] << 16) | (src[3] << 24);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800236}
237
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800238static int __write_to_log_daemon(log_id_t log_id, struct iovec* vec, size_t nr) {
239 struct android_log_transport_write* node;
Mark Salyzyn72d37242018-03-07 10:42:06 -0800240 int ret, save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800241 struct timespec ts;
242 size_t len, i;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800243
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800244 for (len = i = 0; i < nr; ++i) {
245 len += vec[i].iov_len;
246 }
247 if (!len) {
248 return -EINVAL;
249 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800250
Mark Salyzyn72d37242018-03-07 10:42:06 -0800251 save_errno = errno;
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800252#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800253 clock_gettime(android_log_clockid(), &ts);
Mark Salyzyn142b43d2016-12-28 10:30:57 -0800254
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800255 if (log_id == LOG_ID_SECURITY) {
256 if (vec[0].iov_len < 4) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800257 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800258 return -EINVAL;
259 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800260
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800261 ret = check_log_uid_permissions();
262 if (ret < 0) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800263 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800264 return ret;
265 }
266 if (!__android_log_security()) {
267 /* If only we could reset downstream logd counter */
Mark Salyzyn72d37242018-03-07 10:42:06 -0800268 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800269 return -EPERM;
270 }
Yao Chen025f05a2017-12-01 15:48:19 -0800271 } else if (log_id == LOG_ID_EVENTS || log_id == LOG_ID_STATS) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800272 const char* tag;
273 size_t len;
274 EventTagMap *m, *f;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800275
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800276 if (vec[0].iov_len < 4) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800277 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800278 return -EINVAL;
279 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800280
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800281 tag = NULL;
282 len = 0;
283 f = NULL;
284 m = (EventTagMap*)atomic_load(&tagMap);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800285
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800286 if (!m) {
287 ret = __android_log_trylock();
288 m = (EventTagMap*)atomic_load(&tagMap); /* trylock flush cache */
289 if (!m) {
290 m = android_openEventTagMap(NULL);
291 if (ret) { /* trylock failed, use local copy, mark for close */
292 f = m;
293 } else {
294 if (!m) { /* One chance to open map file */
295 m = (EventTagMap*)(uintptr_t)-1LL;
296 }
297 atomic_store(&tagMap, (uintptr_t)m);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800298 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800299 }
300 if (!ret) { /* trylock succeeded, unlock */
301 __android_log_unlock();
302 }
303 }
304 if (m && (m != (EventTagMap*)(uintptr_t)-1LL)) {
Tom Cherry71ba1642019-01-10 10:37:36 -0800305 tag = android_lookupEventTag_len(m, &len, get4LE(static_cast<uint8_t*>(vec[0].iov_base)));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800306 }
Tom Cherry71ba1642019-01-10 10:37:36 -0800307 ret = __android_log_is_loggable_len(ANDROID_LOG_INFO, tag, len, ANDROID_LOG_VERBOSE);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800308 if (f) { /* local copy marked for close */
309 android_closeEventTagMap(f);
310 }
311 if (!ret) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800312 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800313 return -EPERM;
314 }
315 } else {
316 /* Validate the incoming tag, tag content can not split across iovec */
317 char prio = ANDROID_LOG_VERBOSE;
Tom Cherry71ba1642019-01-10 10:37:36 -0800318 const char* tag = static_cast<const char*>(vec[0].iov_base);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800319 size_t len = vec[0].iov_len;
320 if (!tag) {
321 len = 0;
322 }
323 if (len > 0) {
324 prio = *tag;
325 if (len > 1) {
326 --len;
327 ++tag;
328 } else {
329 len = vec[1].iov_len;
330 tag = ((const char*)vec[1].iov_base);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800331 if (!tag) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800332 len = 0;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800333 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800334 }
335 }
336 /* tag must be nul terminated */
337 if (tag && strnlen(tag, len) >= len) {
338 tag = NULL;
339 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800340
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800341 if (!__android_log_is_loggable_len(prio, tag, len - 1, ANDROID_LOG_VERBOSE)) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800342 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800343 return -EPERM;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800344 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800345 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800346#else
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800347 /* simulate clock_gettime(CLOCK_REALTIME, &ts); */
348 {
349 struct timeval tv;
350 gettimeofday(&tv, NULL);
351 ts.tv_sec = tv.tv_sec;
352 ts.tv_nsec = tv.tv_usec * 1000;
353 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800354#endif
355
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800356 ret = 0;
357 i = 1 << log_id;
358 write_transport_for_each(node, &__android_log_transport_write) {
359 if (node->logMask & i) {
360 ssize_t retval;
361 retval = (*node->write)(log_id, &ts, vec, nr);
362 if (ret >= 0) {
363 ret = retval;
364 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800365 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800366 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800367
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800368 write_transport_for_each(node, &__android_log_persist_write) {
369 if (node->logMask & i) {
370 (void)(*node->write)(log_id, &ts, vec, nr);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800371 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800372 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800373
Mark Salyzyn72d37242018-03-07 10:42:06 -0800374 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800375 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800376}
377
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800378static int __write_to_log_init(log_id_t log_id, struct iovec* vec, size_t nr) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800379 int ret, save_errno = errno;
380
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800381 __android_log_lock();
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800382
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800383 if (write_to_log == __write_to_log_init) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800384 ret = __write_to_log_initialize();
385 if (ret < 0) {
386 __android_log_unlock();
387 if (!list_empty(&__android_log_persist_write)) {
388 __write_to_log_daemon(log_id, vec, nr);
389 }
Mark Salyzyn72d37242018-03-07 10:42:06 -0800390 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800391 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800392 }
393
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800394 write_to_log = __write_to_log_daemon;
395 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800396
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800397 __android_log_unlock();
398
Mark Salyzyn72d37242018-03-07 10:42:06 -0800399 ret = write_to_log(log_id, vec, nr);
400 errno = save_errno;
401 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800402}
403
Tom Cherry2d9779e2019-02-08 11:46:19 -0800404int __android_log_write(int prio, const char* tag, const char* msg) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800405 return __android_log_buf_write(LOG_ID_MAIN, prio, tag, msg);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800406}
407
Tom Cherry2d9779e2019-02-08 11:46:19 -0800408int __android_log_buf_write(int bufID, int prio, const char* tag, const char* msg) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800409 if (!tag) tag = "";
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800410
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800411#if __BIONIC__
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800412 if (prio == ANDROID_LOG_FATAL) {
413 android_set_abort_message(msg);
414 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800415#endif
416
Elliott Hughesde3ad1d2015-04-03 13:24:37 -0700417 struct iovec vec[3];
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800418 vec[0].iov_base = (unsigned char*)&prio;
419 vec[0].iov_len = 1;
420 vec[1].iov_base = (void*)tag;
421 vec[1].iov_len = strlen(tag) + 1;
422 vec[2].iov_base = (void*)msg;
423 vec[2].iov_len = strlen(msg) + 1;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800424
Tom Cherry71ba1642019-01-10 10:37:36 -0800425 return write_to_log(static_cast<log_id_t>(bufID), vec, 3);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800426}
427
Tom Cherry2d9779e2019-02-08 11:46:19 -0800428int __android_log_vprint(int prio, const char* tag, const char* fmt, va_list ap) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800429 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800430
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800431 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800432
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800433 return __android_log_write(prio, tag, buf);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800434}
435
Tom Cherry2d9779e2019-02-08 11:46:19 -0800436int __android_log_print(int prio, const char* tag, const char* fmt, ...) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800437 va_list ap;
438 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800439
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800440 va_start(ap, fmt);
441 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
442 va_end(ap);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800443
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800444 return __android_log_write(prio, tag, buf);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800445}
446
Tom Cherry2d9779e2019-02-08 11:46:19 -0800447int __android_log_buf_print(int bufID, int prio, const char* tag, const char* fmt, ...) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800448 va_list ap;
449 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800450
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800451 va_start(ap, fmt);
452 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
453 va_end(ap);
454
455 return __android_log_buf_write(bufID, prio, tag, buf);
456}
457
Tom Cherry2d9779e2019-02-08 11:46:19 -0800458void __android_log_assert(const char* cond, const char* tag, const char* fmt, ...) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800459 char buf[LOG_BUF_SIZE];
460
461 if (fmt) {
462 va_list ap;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800463 va_start(ap, fmt);
464 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
465 va_end(ap);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800466 } else {
467 /* Msg not provided, log condition. N.B. Do not use cond directly as
468 * format string as it could contain spurious '%' syntax (e.g.
469 * "%d" in "blocks%devs == 0").
470 */
471 if (cond)
472 snprintf(buf, LOG_BUF_SIZE, "Assertion failed: %s", cond);
473 else
474 strcpy(buf, "Unspecified assertion failed");
475 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800476
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800477 // Log assertion failures to stderr for the benefit of "adb shell" users
478 // and gtests (http://b/23675822).
Tom Cherry6f6ef392019-01-16 14:17:08 -0800479 TEMP_FAILURE_RETRY(write(2, buf, strlen(buf)));
480 TEMP_FAILURE_RETRY(write(2, "\n", 1));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800481
482 __android_log_write(ANDROID_LOG_FATAL, tag, buf);
483 abort(); /* abort so we have a chance to debug the situation */
484 /* NOTREACHED */
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800485}
486
Tom Cherry2d9779e2019-02-08 11:46:19 -0800487int __android_log_bwrite(int32_t tag, const void* payload, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800488 struct iovec vec[2];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800489
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800490 vec[0].iov_base = &tag;
491 vec[0].iov_len = sizeof(tag);
492 vec[1].iov_base = (void*)payload;
493 vec[1].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800494
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800495 return write_to_log(LOG_ID_EVENTS, vec, 2);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800496}
497
Tom Cherry2d9779e2019-02-08 11:46:19 -0800498int __android_log_stats_bwrite(int32_t tag, const void* payload, size_t len) {
Stefan Lafon701a0652017-08-24 20:14:06 -0700499 struct iovec vec[2];
500
501 vec[0].iov_base = &tag;
502 vec[0].iov_len = sizeof(tag);
503 vec[1].iov_base = (void*)payload;
504 vec[1].iov_len = len;
505
506 return write_to_log(LOG_ID_STATS, vec, 2);
507}
508
Tom Cherry2d9779e2019-02-08 11:46:19 -0800509int __android_log_security_bwrite(int32_t tag, const void* payload, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800510 struct iovec vec[2];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800511
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800512 vec[0].iov_base = &tag;
513 vec[0].iov_len = sizeof(tag);
514 vec[1].iov_base = (void*)payload;
515 vec[1].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800516
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800517 return write_to_log(LOG_ID_SECURITY, vec, 2);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800518}
519
520/*
521 * Like __android_log_bwrite, but takes the type as well. Doesn't work
522 * for the general case where we're generating lists of stuff, but very
523 * handy if we just want to dump an integer into the log.
524 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800525int __android_log_btwrite(int32_t tag, char type, const void* payload, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800526 struct iovec vec[3];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800527
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800528 vec[0].iov_base = &tag;
529 vec[0].iov_len = sizeof(tag);
530 vec[1].iov_base = &type;
531 vec[1].iov_len = sizeof(type);
532 vec[2].iov_base = (void*)payload;
533 vec[2].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800534
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800535 return write_to_log(LOG_ID_EVENTS, vec, 3);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800536}
537
538/*
539 * Like __android_log_bwrite, but used for writing strings to the
540 * event log.
541 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800542int __android_log_bswrite(int32_t tag, const char* payload) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800543 struct iovec vec[4];
544 char type = EVENT_TYPE_STRING;
545 uint32_t len = strlen(payload);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800546
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800547 vec[0].iov_base = &tag;
548 vec[0].iov_len = sizeof(tag);
549 vec[1].iov_base = &type;
550 vec[1].iov_len = sizeof(type);
551 vec[2].iov_base = &len;
552 vec[2].iov_len = sizeof(len);
553 vec[3].iov_base = (void*)payload;
554 vec[3].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800555
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800556 return write_to_log(LOG_ID_EVENTS, vec, 4);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800557}
558
559/*
560 * Like __android_log_security_bwrite, but used for writing strings to the
561 * security log.
562 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800563int __android_log_security_bswrite(int32_t tag, const char* payload) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800564 struct iovec vec[4];
565 char type = EVENT_TYPE_STRING;
566 uint32_t len = strlen(payload);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800567
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800568 vec[0].iov_base = &tag;
569 vec[0].iov_len = sizeof(tag);
570 vec[1].iov_base = &type;
571 vec[1].iov_len = sizeof(type);
572 vec[2].iov_base = &len;
573 vec[2].iov_len = sizeof(len);
574 vec[3].iov_base = (void*)payload;
575 vec[3].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800576
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800577 return write_to_log(LOG_ID_SECURITY, vec, 4);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800578}
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800579
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800580static int __write_to_log_null(log_id_t log_id, struct iovec* vec, size_t nr) {
581 size_t len, i;
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800582
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800583 if ((log_id < LOG_ID_MIN) || (log_id >= LOG_ID_MAX)) {
584 return -EINVAL;
585 }
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800586
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800587 for (len = i = 0; i < nr; ++i) {
588 len += vec[i].iov_len;
589 }
590 if (!len) {
591 return -EINVAL;
592 }
593 return len;
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800594}
595
596/* Following functions need access to our internal write_to_log status */
597
Tom Cherry2d9779e2019-02-08 11:46:19 -0800598int __android_log_transport;
Mark Salyzyn71002882016-03-08 16:18:26 -0800599
Tom Cherry2d9779e2019-02-08 11:46:19 -0800600int android_set_log_transport(int transport_flag) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800601 int retval;
Mark Salyzyn71002882016-03-08 16:18:26 -0800602
Mark Salyzyn81321a72017-03-09 07:28:29 -0800603 if (transport_flag < 0) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800604 return -EINVAL;
605 }
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800606
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800607 retval = LOGGER_NULL;
Mark Salyzyn71002882016-03-08 16:18:26 -0800608
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800609 __android_log_lock();
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800610
Mark Salyzyn81321a72017-03-09 07:28:29 -0800611 if (transport_flag & LOGGER_NULL) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800612 write_to_log = __write_to_log_null;
Mark Salyzyn71002882016-03-08 16:18:26 -0800613
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800614 __android_log_unlock();
615
Mark Salyzyn71002882016-03-08 16:18:26 -0800616 return retval;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800617 }
618
Tom Cherryd1febd32019-01-09 13:35:43 -0800619 __android_log_transport &= LOGGER_LOGD | LOGGER_STDERR;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800620
Tom Cherryd1febd32019-01-09 13:35:43 -0800621 transport_flag &= LOGGER_LOGD | LOGGER_STDERR;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800622
Mark Salyzyn81321a72017-03-09 07:28:29 -0800623 if (__android_log_transport != transport_flag) {
624 __android_log_transport = transport_flag;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800625 __android_log_config_write_close();
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800626
627 write_to_log = __write_to_log_init;
628 /* generically we only expect these two values for write_to_log */
Tom Cherry71ba1642019-01-10 10:37:36 -0800629 } else if ((write_to_log != __write_to_log_init) && (write_to_log != __write_to_log_daemon)) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800630 write_to_log = __write_to_log_init;
631 }
632
Mark Salyzyn81321a72017-03-09 07:28:29 -0800633 retval = __android_log_transport;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800634
635 __android_log_unlock();
636
637 return retval;
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800638}
639
Tom Cherry2d9779e2019-02-08 11:46:19 -0800640int android_get_log_transport() {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800641 int ret = LOGGER_DEFAULT;
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800642
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800643 __android_log_lock();
644 if (write_to_log == __write_to_log_null) {
645 ret = LOGGER_NULL;
646 } else {
Tom Cherryd1febd32019-01-09 13:35:43 -0800647 __android_log_transport &= LOGGER_LOGD | LOGGER_STDERR;
Mark Salyzyn81321a72017-03-09 07:28:29 -0800648 ret = __android_log_transport;
Tom Cherry71ba1642019-01-10 10:37:36 -0800649 if ((write_to_log != __write_to_log_init) && (write_to_log != __write_to_log_daemon)) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800650 ret = -EINVAL;
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800651 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800652 }
653 __android_log_unlock();
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800654
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800655 return ret;
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800656}