blob: 4503219d3f6d720a52729d0438a7ec1fce657240 [file] [log] [blame]
Mark Salyzyn42958412013-11-22 10:50:27 -08001/*
Mark Salyzynd0a83fd2014-01-09 07:45:30 -08002** Copyright 2013-2014, The Android Open Source Project
Mark Salyzyn42958412013-11-22 10:50:27 -08003**
4** Licensed under the Apache License, Version 2.0 (the "License");
5** you may not use this file except in compliance with the License.
6** You may obtain a copy of the License at
7**
8** http://www.apache.org/licenses/LICENSE-2.0
9**
10** Unless required by applicable law or agreed to in writing, software
11** distributed under the License is distributed on an "AS IS" BASIS,
12** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13** See the License for the specific language governing permissions and
14** limitations under the License.
15*/
16
Mark Salyzyn42958412013-11-22 10:50:27 -080017#include <errno.h>
18#include <fcntl.h>
Mark Salyzynfa3716b2014-02-14 16:05:05 -080019#include <inttypes.h>
Mark Salyzyn696817d2014-04-18 14:49:28 -070020#include <poll.h>
Mark Salyzyn154f4602014-02-20 14:59:07 -080021#include <signal.h>
Mark Salyzyn6eef4172014-12-15 09:51:39 -080022#include <stdbool.h>
Mark Salyzyn154f4602014-02-20 14:59:07 -080023#include <stddef.h>
24#define NOMINMAX /* for windows to suppress definition of min in stdlib.h */
Mark Salyzyn42958412013-11-22 10:50:27 -080025#include <stdlib.h>
Mark Salyzyn154f4602014-02-20 14:59:07 -080026#include <string.h>
Mark Salyzyna04464a2014-04-30 08:50:53 -070027#include <sys/cdefs.h>
Mark Salyzyn154f4602014-02-20 14:59:07 -080028#include <unistd.h>
29
Mark Salyzyn42958412013-11-22 10:50:27 -080030#include <cutils/list.h>
Mark Salyzyn154f4602014-02-20 14:59:07 -080031#include <cutils/sockets.h>
Mark Salyzyn42958412013-11-22 10:50:27 -080032#include <log/log.h>
33#include <log/logger.h>
Mark Salyzyn6eef4172014-12-15 09:51:39 -080034#include <private/android_filesystem_config.h>
35#include <private/android_logger.h>
Mark Salyzyn42958412013-11-22 10:50:27 -080036
Mark Salyzyn154f4602014-02-20 14:59:07 -080037/* branchless on many architectures. */
38#define min(x,y) ((y) ^ (((x) ^ (y)) & -((x) < (y))))
Mark Salyzyn1345f382014-01-14 08:41:27 -080039
Elliott Hughesadbf4422015-07-29 17:45:24 -070040#if defined(_WIN32)
Mark Salyzyn95687052014-10-02 11:12:28 -070041#define WEAK static
42#else
Mark Salyzyn154f4602014-02-20 14:59:07 -080043#define WEAK __attribute__((weak))
Mark Salyzyn95687052014-10-02 11:12:28 -070044#endif
Mark Salyzyna04464a2014-04-30 08:50:53 -070045#ifndef __unused
46#define __unused __attribute__((unused))
47#endif
Mark Salyzyn1345f382014-01-14 08:41:27 -080048
Mark Salyzyn154f4602014-02-20 14:59:07 -080049/* Private copy of ../libcutils/socket_local_client.c prevent library loops */
Mark Salyzyn1345f382014-01-14 08:41:27 -080050
Elliott Hughesadbf4422015-07-29 17:45:24 -070051#if defined(_WIN32)
Mark Salyzyn42958412013-11-22 10:50:27 -080052
Mark Salyzyn154f4602014-02-20 14:59:07 -080053int WEAK socket_local_client(const char *name, int namespaceId, int type)
54{
55 errno = ENOSYS;
56 return -ENOSYS;
57}
Mark Salyzyn42958412013-11-22 10:50:27 -080058
Elliott Hughesadbf4422015-07-29 17:45:24 -070059#else /* !_WIN32 */
Mark Salyzyn154f4602014-02-20 14:59:07 -080060
61#include <sys/socket.h>
62#include <sys/un.h>
63#include <sys/select.h>
64#include <sys/types.h>
65
66/* Private copy of ../libcutils/socket_local.h prevent library loops */
67#define FILESYSTEM_SOCKET_PREFIX "/tmp/"
68#define ANDROID_RESERVED_SOCKET_PREFIX "/dev/socket/"
69/* End of ../libcutils/socket_local.h */
70
71#define LISTEN_BACKLOG 4
72
73/* Documented in header file. */
74int WEAK socket_make_sockaddr_un(const char *name, int namespaceId,
75 struct sockaddr_un *p_addr, socklen_t *alen)
76{
77 memset (p_addr, 0, sizeof (*p_addr));
78 size_t namelen;
79
80 switch (namespaceId) {
81 case ANDROID_SOCKET_NAMESPACE_ABSTRACT:
Elliott Hughes9768d242014-11-21 22:50:20 -080082#if defined(__linux__)
Mark Salyzyn154f4602014-02-20 14:59:07 -080083 namelen = strlen(name);
84
85 /* Test with length +1 for the *initial* '\0'. */
86 if ((namelen + 1) > sizeof(p_addr->sun_path)) {
87 goto error;
88 }
89
90 /*
91 * Note: The path in this case is *not* supposed to be
92 * '\0'-terminated. ("man 7 unix" for the gory details.)
93 */
94
95 p_addr->sun_path[0] = 0;
96 memcpy(p_addr->sun_path + 1, name, namelen);
Elliott Hughes9768d242014-11-21 22:50:20 -080097#else
Mark Salyzyn154f4602014-02-20 14:59:07 -080098 /* this OS doesn't have the Linux abstract namespace */
99
100 namelen = strlen(name) + strlen(FILESYSTEM_SOCKET_PREFIX);
101 /* unix_path_max appears to be missing on linux */
102 if (namelen > sizeof(*p_addr)
103 - offsetof(struct sockaddr_un, sun_path) - 1) {
104 goto error;
105 }
106
107 strcpy(p_addr->sun_path, FILESYSTEM_SOCKET_PREFIX);
108 strcat(p_addr->sun_path, name);
Elliott Hughes9768d242014-11-21 22:50:20 -0800109#endif
Mark Salyzyn154f4602014-02-20 14:59:07 -0800110 break;
111
112 case ANDROID_SOCKET_NAMESPACE_RESERVED:
113 namelen = strlen(name) + strlen(ANDROID_RESERVED_SOCKET_PREFIX);
114 /* unix_path_max appears to be missing on linux */
115 if (namelen > sizeof(*p_addr)
116 - offsetof(struct sockaddr_un, sun_path) - 1) {
117 goto error;
118 }
119
120 strcpy(p_addr->sun_path, ANDROID_RESERVED_SOCKET_PREFIX);
121 strcat(p_addr->sun_path, name);
122 break;
123
124 case ANDROID_SOCKET_NAMESPACE_FILESYSTEM:
125 namelen = strlen(name);
126 /* unix_path_max appears to be missing on linux */
127 if (namelen > sizeof(*p_addr)
128 - offsetof(struct sockaddr_un, sun_path) - 1) {
129 goto error;
130 }
131
132 strcpy(p_addr->sun_path, name);
133 break;
134
135 default:
136 /* invalid namespace id */
137 return -1;
138 }
139
140 p_addr->sun_family = AF_LOCAL;
141 *alen = namelen + offsetof(struct sockaddr_un, sun_path) + 1;
142 return 0;
143error:
144 return -1;
145}
146
147/**
148 * connect to peer named "name" on fd
149 * returns same fd or -1 on error.
150 * fd is not closed on error. that's your job.
151 *
152 * Used by AndroidSocketImpl
153 */
154int WEAK socket_local_client_connect(int fd, const char *name, int namespaceId,
Mark Salyzyna04464a2014-04-30 08:50:53 -0700155 int type __unused)
Mark Salyzyn154f4602014-02-20 14:59:07 -0800156{
157 struct sockaddr_un addr;
158 socklen_t alen;
Mark Salyzyn154f4602014-02-20 14:59:07 -0800159 int err;
160
161 err = socket_make_sockaddr_un(name, namespaceId, &addr, &alen);
162
163 if (err < 0) {
164 goto error;
165 }
166
167 if(connect(fd, (struct sockaddr *) &addr, alen) < 0) {
168 goto error;
169 }
170
171 return fd;
172
173error:
174 return -1;
175}
176
177/**
178 * connect to peer named "name"
179 * returns fd or -1 on error
180 */
181int WEAK socket_local_client(const char *name, int namespaceId, int type)
182{
183 int s;
184
185 s = socket(AF_LOCAL, type, 0);
186 if(s < 0) return -1;
187
188 if ( 0 > socket_local_client_connect(s, name, namespaceId, type)) {
189 close(s);
190 return -1;
191 }
192
193 return s;
194}
195
Elliott Hughesadbf4422015-07-29 17:45:24 -0700196#endif /* !_WIN32 */
Mark Salyzyn154f4602014-02-20 14:59:07 -0800197/* End of ../libcutils/socket_local_client.c */
Mark Salyzyn42958412013-11-22 10:50:27 -0800198
199#define logger_for_each(logger, logger_list) \
200 for (logger = node_to_item((logger_list)->node.next, struct logger, node); \
201 logger != node_to_item(&(logger_list)->node, struct logger, node); \
202 logger = node_to_item((logger)->node.next, struct logger, node))
203
204/* In the future, we would like to make this list extensible */
205static const char *LOG_NAME[LOG_ID_MAX] = {
206 [LOG_ID_MAIN] = "main",
207 [LOG_ID_RADIO] = "radio",
208 [LOG_ID_EVENTS] = "events",
Mark Salyzyn99f47a92014-04-07 14:58:08 -0700209 [LOG_ID_SYSTEM] = "system",
210 [LOG_ID_CRASH] = "crash",
Mark Salyzyn440e1092014-10-10 15:13:15 -0700211 [LOG_ID_KERNEL] = "kernel",
Mark Salyzyn42958412013-11-22 10:50:27 -0800212};
213
Mark Salyzyn154f4602014-02-20 14:59:07 -0800214const char *android_log_id_to_name(log_id_t log_id)
215{
Mark Salyzyn42958412013-11-22 10:50:27 -0800216 if (log_id >= LOG_ID_MAX) {
217 log_id = LOG_ID_MAIN;
218 }
219 return LOG_NAME[log_id];
220}
221
Mark Salyzyn154f4602014-02-20 14:59:07 -0800222log_id_t android_name_to_log_id(const char *logName)
Mark Salyzyn42958412013-11-22 10:50:27 -0800223{
Mark Salyzyn42958412013-11-22 10:50:27 -0800224 const char *b;
Mark Salyzyn42958412013-11-22 10:50:27 -0800225 int ret;
226
227 if (!logName) {
228 return -1; /* NB: log_id_t is unsigned */
229 }
230 b = strrchr(logName, '/');
231 if (!b) {
232 b = logName;
233 } else {
234 ++b;
235 }
236
Mark Salyzyn42958412013-11-22 10:50:27 -0800237 for(ret = LOG_ID_MIN; ret < LOG_ID_MAX; ++ret) {
238 const char *l = LOG_NAME[ret];
239 if (l && !strcmp(b, l)) {
240 return ret;
241 }
242 }
243 return -1; /* should never happen */
244}
245
246struct logger_list {
247 struct listnode node;
248 int mode;
249 unsigned int tail;
Mark Salyzynfa3716b2014-02-14 16:05:05 -0800250 log_time start;
Mark Salyzyn42958412013-11-22 10:50:27 -0800251 pid_t pid;
Mark Salyzyn154f4602014-02-20 14:59:07 -0800252 int sock;
Mark Salyzyn42958412013-11-22 10:50:27 -0800253};
254
255struct logger {
256 struct listnode node;
257 struct logger_list *top;
Mark Salyzyn42958412013-11-22 10:50:27 -0800258 log_id_t id;
Mark Salyzyn42958412013-11-22 10:50:27 -0800259};
260
261/* android_logger_alloc unimplemented, no use case */
262/* android_logger_free not exported */
263static void android_logger_free(struct logger *logger)
264{
265 if (!logger) {
266 return;
267 }
268
Mark Salyzyn42958412013-11-22 10:50:27 -0800269 list_remove(&logger->node);
270
271 free(logger);
272}
273
Mark Salyzyn154f4602014-02-20 14:59:07 -0800274/* android_logger_alloc unimplemented, no use case */
275
276/* method for getting the associated sublog id */
Mark Salyzyn42958412013-11-22 10:50:27 -0800277log_id_t android_logger_get_id(struct logger *logger)
278{
279 return logger->id;
280}
281
282/* worker for sending the command to the logger */
Mark Salyzyn154f4602014-02-20 14:59:07 -0800283static ssize_t send_log_msg(struct logger *logger,
284 const char *msg, char *buf, size_t buf_size)
Mark Salyzyn42958412013-11-22 10:50:27 -0800285{
Mark Salyzyn154f4602014-02-20 14:59:07 -0800286 ssize_t ret;
Mark Salyzyn696817d2014-04-18 14:49:28 -0700287 size_t len;
288 char *cp;
Greg Hackmann8084a532014-03-17 13:08:31 -0700289 int errno_save = 0;
Mark Salyzyn154f4602014-02-20 14:59:07 -0800290 int sock = socket_local_client("logd", ANDROID_SOCKET_NAMESPACE_RESERVED,
291 SOCK_STREAM);
292 if (sock < 0) {
Greg Hackmann8084a532014-03-17 13:08:31 -0700293 return sock;
Mark Salyzyn42958412013-11-22 10:50:27 -0800294 }
295
Mark Salyzyn154f4602014-02-20 14:59:07 -0800296 if (msg) {
297 snprintf(buf, buf_size, msg, logger ? logger->id : (unsigned) -1);
Mark Salyzyn42958412013-11-22 10:50:27 -0800298 }
299
Mark Salyzyn696817d2014-04-18 14:49:28 -0700300 len = strlen(buf) + 1;
301 ret = TEMP_FAILURE_RETRY(write(sock, buf, len));
Mark Salyzyn154f4602014-02-20 14:59:07 -0800302 if (ret <= 0) {
303 goto done;
Mark Salyzyn42958412013-11-22 10:50:27 -0800304 }
305
Mark Salyzyn696817d2014-04-18 14:49:28 -0700306 len = buf_size;
307 cp = buf;
308 while ((ret = TEMP_FAILURE_RETRY(read(sock, cp, len))) > 0) {
309 struct pollfd p;
310
311 if (((size_t)ret == len) || (buf_size < PAGE_SIZE)) {
312 break;
313 }
314
315 len -= ret;
316 cp += ret;
317
318 memset(&p, 0, sizeof(p));
319 p.fd = sock;
320 p.events = POLLIN;
321
322 /* Give other side 20ms to refill pipe */
323 ret = TEMP_FAILURE_RETRY(poll(&p, 1, 20));
324
325 if (ret <= 0) {
326 break;
327 }
328
329 if (!(p.revents & POLLIN)) {
330 ret = 0;
331 break;
332 }
333 }
334
335 if (ret >= 0) {
336 ret += buf_size - len;
337 }
Mark Salyzyn154f4602014-02-20 14:59:07 -0800338
339done:
340 if ((ret == -1) && errno) {
Greg Hackmann8084a532014-03-17 13:08:31 -0700341 errno_save = errno;
Mark Salyzyn42958412013-11-22 10:50:27 -0800342 }
Mark Salyzyn154f4602014-02-20 14:59:07 -0800343 close(sock);
Greg Hackmann8084a532014-03-17 13:08:31 -0700344 if (errno_save) {
345 errno = errno_save;
346 }
Mark Salyzyn42958412013-11-22 10:50:27 -0800347 return ret;
348}
349
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800350static int check_log_success(char *buf, ssize_t ret)
Mark Salyzyn42958412013-11-22 10:50:27 -0800351{
Mark Salyzyn154f4602014-02-20 14:59:07 -0800352 if (ret < 0) {
353 return ret;
354 }
355
356 if (strncmp(buf, "success", 7)) {
Greg Hackmann8084a532014-03-17 13:08:31 -0700357 errno = EINVAL;
Mark Salyzyn154f4602014-02-20 14:59:07 -0800358 return -1;
359 }
360
361 return 0;
Mark Salyzyn42958412013-11-22 10:50:27 -0800362}
363
Mark Salyzyn6eef4172014-12-15 09:51:39 -0800364/* Determine the credentials of the caller */
365static bool uid_has_log_permission(uid_t uid)
366{
367 return (uid == AID_SYSTEM) || (uid == AID_LOG) || (uid == AID_ROOT);
368}
369
370static uid_t get_best_effective_uid()
371{
372 uid_t euid;
373 uid_t uid;
374 gid_t gid;
375 ssize_t i;
376 static uid_t last_uid = (uid_t) -1;
377
378 if (last_uid != (uid_t) -1) {
379 return last_uid;
380 }
381 uid = getuid();
382 if (uid_has_log_permission(uid)) {
383 return last_uid = uid;
384 }
385 euid = geteuid();
386 if (uid_has_log_permission(euid)) {
387 return last_uid = euid;
388 }
389 gid = getgid();
390 if (uid_has_log_permission(gid)) {
391 return last_uid = gid;
392 }
393 gid = getegid();
394 if (uid_has_log_permission(gid)) {
395 return last_uid = gid;
396 }
397 i = getgroups((size_t) 0, NULL);
398 if (i > 0) {
399 gid_t list[i];
400
401 getgroups(i, list);
402 while (--i >= 0) {
403 if (uid_has_log_permission(list[i])) {
404 return last_uid = list[i];
405 }
406 }
407 }
408 return last_uid = uid;
409}
410
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800411int android_logger_clear(struct logger *logger)
412{
413 char buf[512];
414
Mark Salyzyn6eef4172014-12-15 09:51:39 -0800415 if (logger->top->mode & ANDROID_LOG_PSTORE) {
416 if (uid_has_log_permission(get_best_effective_uid())) {
417 return unlink("/sys/fs/pstore/pmsg-ramoops-0");
418 }
419 errno = EPERM;
420 return -1;
421 }
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800422 return check_log_success(buf,
423 send_log_msg(logger, "clear %d", buf, sizeof(buf)));
424}
425
Mark Salyzyn42958412013-11-22 10:50:27 -0800426/* returns the total size of the log's ring buffer */
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800427long android_logger_get_log_size(struct logger *logger)
Mark Salyzyn42958412013-11-22 10:50:27 -0800428{
Mark Salyzyn154f4602014-02-20 14:59:07 -0800429 char buf[512];
430
431 ssize_t ret = send_log_msg(logger, "getLogSize %d", buf, sizeof(buf));
432 if (ret < 0) {
433 return ret;
434 }
435
436 if ((buf[0] < '0') || ('9' < buf[0])) {
437 return -1;
438 }
439
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800440 return atol(buf);
Mark Salyzyn42958412013-11-22 10:50:27 -0800441}
442
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800443int android_logger_set_log_size(struct logger *logger, unsigned long size)
444{
445 char buf[512];
446
447 snprintf(buf, sizeof(buf), "setLogSize %d %lu",
448 logger ? logger->id : (unsigned) -1, size);
449
450 return check_log_success(buf, send_log_msg(NULL, NULL, buf, sizeof(buf)));
451}
452
Mark Salyzyn42958412013-11-22 10:50:27 -0800453/*
454 * returns the readable size of the log's ring buffer (that is, amount of the
455 * log consumed)
456 */
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800457long android_logger_get_log_readable_size(struct logger *logger)
Mark Salyzyn42958412013-11-22 10:50:27 -0800458{
Mark Salyzyn154f4602014-02-20 14:59:07 -0800459 char buf[512];
460
461 ssize_t ret = send_log_msg(logger, "getLogSizeUsed %d", buf, sizeof(buf));
462 if (ret < 0) {
463 return ret;
464 }
465
466 if ((buf[0] < '0') || ('9' < buf[0])) {
467 return -1;
468 }
469
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800470 return atol(buf);
Mark Salyzyn42958412013-11-22 10:50:27 -0800471}
472
473/*
474 * returns the logger version
475 */
Mark Salyzyna04464a2014-04-30 08:50:53 -0700476int android_logger_get_log_version(struct logger *logger __unused)
Mark Salyzyn42958412013-11-22 10:50:27 -0800477{
Mark Salyzyn154f4602014-02-20 14:59:07 -0800478 return 3;
Mark Salyzyn42958412013-11-22 10:50:27 -0800479}
480
Mark Salyzyn34facab2014-02-06 14:48:50 -0800481/*
482 * returns statistics
483 */
484ssize_t android_logger_get_statistics(struct logger_list *logger_list,
485 char *buf, size_t len)
486{
Mark Salyzyn34facab2014-02-06 14:48:50 -0800487 struct logger *logger;
488 char *cp = buf;
489 size_t remaining = len;
490 size_t n;
491
492 n = snprintf(cp, remaining, "getStatistics");
493 n = min(n, remaining);
494 remaining -= n;
495 cp += n;
496
497 logger_for_each(logger, logger_list) {
498 n = snprintf(cp, remaining, " %d", logger->id);
499 n = min(n, remaining);
500 remaining -= n;
501 cp += n;
502 }
503 return send_log_msg(NULL, NULL, buf, len);
504}
505
Mark Salyzyna04464a2014-04-30 08:50:53 -0700506ssize_t android_logger_get_prune_list(struct logger_list *logger_list __unused,
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800507 char *buf, size_t len)
508{
509 return send_log_msg(NULL, "getPruneList", buf, len);
510}
511
Mark Salyzyna04464a2014-04-30 08:50:53 -0700512int android_logger_set_prune_list(struct logger_list *logger_list __unused,
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800513 char *buf, size_t len)
514{
515 const char cmd[] = "setPruneList ";
516 const size_t cmdlen = sizeof(cmd) - 1;
517
518 if (strlen(buf) > (len - cmdlen)) {
519 return -ENOMEM; /* KISS */
520 }
521 memmove(buf + cmdlen, buf, len - cmdlen);
522 buf[len - 1] = '\0';
523 memcpy(buf, cmd, cmdlen);
524
525 return check_log_success(buf, send_log_msg(NULL, NULL, buf, len));
526}
527
Mark Salyzyn42958412013-11-22 10:50:27 -0800528struct logger_list *android_logger_list_alloc(int mode,
529 unsigned int tail,
530 pid_t pid)
531{
532 struct logger_list *logger_list;
533
534 logger_list = calloc(1, sizeof(*logger_list));
535 if (!logger_list) {
536 return NULL;
537 }
Mark Salyzyn154f4602014-02-20 14:59:07 -0800538
Mark Salyzyn42958412013-11-22 10:50:27 -0800539 list_init(&logger_list->node);
540 logger_list->mode = mode;
Mark Salyzynfa3716b2014-02-14 16:05:05 -0800541 logger_list->start.tv_sec = 0;
542 logger_list->start.tv_nsec = 0;
Mark Salyzyn42958412013-11-22 10:50:27 -0800543 logger_list->tail = tail;
544 logger_list->pid = pid;
Mark Salyzyn154f4602014-02-20 14:59:07 -0800545 logger_list->sock = -1;
546
Mark Salyzyn42958412013-11-22 10:50:27 -0800547 return logger_list;
548}
549
Mark Salyzynfa3716b2014-02-14 16:05:05 -0800550struct logger_list *android_logger_list_alloc_time(int mode,
551 log_time start,
552 pid_t pid)
553{
554 struct logger_list *logger_list;
555
556 logger_list = calloc(1, sizeof(*logger_list));
557 if (!logger_list) {
558 return NULL;
559 }
560
561 list_init(&logger_list->node);
562 logger_list->mode = mode;
563 logger_list->start = start;
564 logger_list->tail = 0;
565 logger_list->pid = pid;
566 logger_list->sock = -1;
567
568 return logger_list;
569}
570
Mark Salyzyn42958412013-11-22 10:50:27 -0800571/* android_logger_list_register unimplemented, no use case */
572/* android_logger_list_unregister unimplemented, no use case */
573
574/* Open the named log and add it to the logger list */
575struct logger *android_logger_open(struct logger_list *logger_list,
576 log_id_t id)
577{
Mark Salyzyn42958412013-11-22 10:50:27 -0800578 struct logger *logger;
Mark Salyzyn42958412013-11-22 10:50:27 -0800579
580 if (!logger_list || (id >= LOG_ID_MAX)) {
581 goto err;
582 }
583
584 logger_for_each(logger, logger_list) {
585 if (logger->id == id) {
586 goto ok;
587 }
588 }
589
590 logger = calloc(1, sizeof(*logger));
591 if (!logger) {
592 goto err;
593 }
594
Mark Salyzyn42958412013-11-22 10:50:27 -0800595 logger->id = id;
Mark Salyzyn42958412013-11-22 10:50:27 -0800596 list_add_tail(&logger_list->node, &logger->node);
597 logger->top = logger_list;
Mark Salyzyn42958412013-11-22 10:50:27 -0800598 goto ok;
599
Mark Salyzyn42958412013-11-22 10:50:27 -0800600err:
601 logger = NULL;
602ok:
603 return logger;
604}
605
606/* Open the single named log and make it part of a new logger list */
607struct logger_list *android_logger_list_open(log_id_t id,
608 int mode,
609 unsigned int tail,
610 pid_t pid)
611{
612 struct logger_list *logger_list = android_logger_list_alloc(mode, tail, pid);
613 if (!logger_list) {
614 return NULL;
615 }
616
617 if (!android_logger_open(logger_list, id)) {
618 android_logger_list_free(logger_list);
619 return NULL;
620 }
621
622 return logger_list;
623}
624
Mark Salyzyn6eef4172014-12-15 09:51:39 -0800625static int android_logger_list_read_pstore(struct logger_list *logger_list,
626 struct log_msg *log_msg)
627{
628 ssize_t ret;
629 off_t current, next;
630 uid_t uid;
631 struct logger *logger;
632 struct __attribute__((__packed__)) {
633 android_pmsg_log_header_t p;
634 android_log_header_t l;
635 } buf;
636 static uint8_t preread_count;
Mark Salyzyn8646a542015-12-07 08:45:12 -0800637 bool is_system;
Mark Salyzyn6eef4172014-12-15 09:51:39 -0800638
639 memset(log_msg, 0, sizeof(*log_msg));
640
641 if (logger_list->sock < 0) {
642 int fd = open("/sys/fs/pstore/pmsg-ramoops-0", O_RDONLY);
643
644 if (fd < 0) {
645 return -errno;
646 }
647 logger_list->sock = fd;
648 preread_count = 0;
649 }
650
651 ret = 0;
652 while(1) {
653 if (preread_count < sizeof(buf)) {
654 ret = TEMP_FAILURE_RETRY(read(logger_list->sock,
655 &buf.p.magic + preread_count,
656 sizeof(buf) - preread_count));
657 if (ret < 0) {
658 return -errno;
659 }
660 preread_count += ret;
661 }
662 if (preread_count != sizeof(buf)) {
663 return preread_count ? -EIO : -EAGAIN;
664 }
665 if ((buf.p.magic != LOGGER_MAGIC)
666 || (buf.p.len <= sizeof(buf))
667 || (buf.p.len > (sizeof(buf) + LOGGER_ENTRY_MAX_PAYLOAD))
668 || (buf.l.id >= LOG_ID_MAX)
669 || (buf.l.realtime.tv_nsec >= NS_PER_SEC)) {
670 do {
671 memmove(&buf.p.magic, &buf.p.magic + 1, --preread_count);
672 } while (preread_count && (buf.p.magic != LOGGER_MAGIC));
673 continue;
674 }
675 preread_count = 0;
676
677 logger_for_each(logger, logger_list) {
678 if (buf.l.id != logger->id) {
679 continue;
680 }
681
682 if ((logger_list->start.tv_sec || logger_list->start.tv_nsec)
683 && ((logger_list->start.tv_sec > buf.l.realtime.tv_sec)
684 || ((logger_list->start.tv_sec == buf.l.realtime.tv_sec)
685 && (logger_list->start.tv_nsec > buf.l.realtime.tv_nsec)))) {
686 break;
687 }
688
689 if (logger_list->pid && (logger_list->pid != buf.p.pid)) {
690 break;
691 }
692
693 uid = get_best_effective_uid();
Mark Salyzyn8646a542015-12-07 08:45:12 -0800694 is_system = uid_has_log_permission(uid);
695 if (!is_system && (uid != buf.p.uid)) {
Mark Salyzyn6eef4172014-12-15 09:51:39 -0800696 break;
697 }
698
699 ret = TEMP_FAILURE_RETRY(read(logger_list->sock,
Mark Salyzyn8646a542015-12-07 08:45:12 -0800700 is_system ?
701 log_msg->entry_v4.msg :
702 log_msg->entry_v3.msg,
Mark Salyzyn6eef4172014-12-15 09:51:39 -0800703 buf.p.len - sizeof(buf)));
704 if (ret < 0) {
705 return -errno;
706 }
707 if (ret != (ssize_t)(buf.p.len - sizeof(buf))) {
708 return -EIO;
709 }
710
Mark Salyzyn8646a542015-12-07 08:45:12 -0800711 log_msg->entry_v4.len = buf.p.len - sizeof(buf);
712 log_msg->entry_v4.hdr_size = is_system ?
713 sizeof(log_msg->entry_v4) :
714 sizeof(log_msg->entry_v3);
715 log_msg->entry_v4.pid = buf.p.pid;
716 log_msg->entry_v4.tid = buf.l.tid;
717 log_msg->entry_v4.sec = buf.l.realtime.tv_sec;
718 log_msg->entry_v4.nsec = buf.l.realtime.tv_nsec;
719 log_msg->entry_v4.lid = buf.l.id;
720 if (is_system) {
721 log_msg->entry_v4.uid = buf.p.uid;
722 }
Mark Salyzyn6eef4172014-12-15 09:51:39 -0800723
724 return ret;
725 }
726
727 current = TEMP_FAILURE_RETRY(lseek(logger_list->sock,
728 (off_t)0, SEEK_CUR));
729 if (current < 0) {
730 return -errno;
731 }
732 next = TEMP_FAILURE_RETRY(lseek(logger_list->sock,
733 (off_t)(buf.p.len - sizeof(buf)),
734 SEEK_CUR));
735 if (next < 0) {
736 return -errno;
737 }
738 if ((next - current) != (ssize_t)(buf.p.len - sizeof(buf))) {
739 return -EIO;
740 }
741 }
742}
743
Mark Salyzyna04464a2014-04-30 08:50:53 -0700744static void caught_signal(int signum __unused)
Mark Salyzyn42958412013-11-22 10:50:27 -0800745{
Mark Salyzyn42958412013-11-22 10:50:27 -0800746}
747
748/* Read from the selected logs */
749int android_logger_list_read(struct logger_list *logger_list,
750 struct log_msg *log_msg)
751{
Mark Salyzyn154f4602014-02-20 14:59:07 -0800752 int ret, e;
Mark Salyzyn42958412013-11-22 10:50:27 -0800753 struct logger *logger;
Mark Salyzyn154f4602014-02-20 14:59:07 -0800754 struct sigaction ignore;
755 struct sigaction old_sigaction;
756 unsigned int old_alarm = 0;
Mark Salyzyn42958412013-11-22 10:50:27 -0800757
758 if (!logger_list) {
Mark Salyzyn154f4602014-02-20 14:59:07 -0800759 return -EINVAL;
Mark Salyzyn42958412013-11-22 10:50:27 -0800760 }
761
Mark Salyzyn6eef4172014-12-15 09:51:39 -0800762 if (logger_list->mode & ANDROID_LOG_PSTORE) {
763 return android_logger_list_read_pstore(logger_list, log_msg);
764 }
765
Mark Salyzyn2d3f38a2015-01-26 10:46:44 -0800766 if (logger_list->mode & ANDROID_LOG_NONBLOCK) {
Mark Salyzyn154f4602014-02-20 14:59:07 -0800767 memset(&ignore, 0, sizeof(ignore));
768 ignore.sa_handler = caught_signal;
769 sigemptyset(&ignore.sa_mask);
Mark Salyzyn42958412013-11-22 10:50:27 -0800770 }
771
Mark Salyzyn154f4602014-02-20 14:59:07 -0800772 if (logger_list->sock < 0) {
773 char buffer[256], *cp, c;
Mark Salyzyn42958412013-11-22 10:50:27 -0800774
Mark Salyzyn154f4602014-02-20 14:59:07 -0800775 int sock = socket_local_client("logdr",
776 ANDROID_SOCKET_NAMESPACE_RESERVED,
777 SOCK_SEQPACKET);
778 if (sock < 0) {
779 if ((sock == -1) && errno) {
780 return -errno;
Mark Salyzyn42958412013-11-22 10:50:27 -0800781 }
Mark Salyzyn154f4602014-02-20 14:59:07 -0800782 return sock;
Mark Salyzyn42958412013-11-22 10:50:27 -0800783 }
784
Mark Salyzyn154f4602014-02-20 14:59:07 -0800785 strcpy(buffer,
Mark Salyzyn2d3f38a2015-01-26 10:46:44 -0800786 (logger_list->mode & ANDROID_LOG_NONBLOCK) ? "dumpAndClose" : "stream");
Mark Salyzyn154f4602014-02-20 14:59:07 -0800787 cp = buffer + strlen(buffer);
Mark Salyzyn42958412013-11-22 10:50:27 -0800788
Mark Salyzyn154f4602014-02-20 14:59:07 -0800789 strcpy(cp, " lids");
790 cp += 5;
791 c = '=';
792 int remaining = sizeof(buffer) - (cp - buffer);
Mark Salyzyn42958412013-11-22 10:50:27 -0800793 logger_for_each(logger, logger_list) {
Mark Salyzyn154f4602014-02-20 14:59:07 -0800794 ret = snprintf(cp, remaining, "%c%u", c, logger->id);
795 ret = min(ret, remaining);
796 remaining -= ret;
797 cp += ret;
798 c = ',';
799 }
Mark Salyzyn42958412013-11-22 10:50:27 -0800800
Mark Salyzyn154f4602014-02-20 14:59:07 -0800801 if (logger_list->tail) {
802 ret = snprintf(cp, remaining, " tail=%u", logger_list->tail);
803 ret = min(ret, remaining);
804 remaining -= ret;
805 cp += ret;
806 }
807
Mark Salyzynfa3716b2014-02-14 16:05:05 -0800808 if (logger_list->start.tv_sec || logger_list->start.tv_nsec) {
Mark Salyzynf8e546e2015-11-30 11:36:09 -0800809 if (logger_list->mode & ANDROID_LOG_WRAP) {
810 // ToDo: alternate API to allow timeout to be adjusted.
811 ret = snprintf(cp, remaining, " timeout=%u",
812 ANDROID_LOG_WRAP_DEFAULT_TIMEOUT);
813 ret = min(ret, remaining);
814 remaining -= ret;
815 cp += ret;
816 }
Mark Salyzynfa3716b2014-02-14 16:05:05 -0800817 ret = snprintf(cp, remaining, " start=%" PRIu32 ".%09" PRIu32,
818 logger_list->start.tv_sec,
819 logger_list->start.tv_nsec);
820 ret = min(ret, remaining);
821 remaining -= ret;
822 cp += ret;
823 }
824
Mark Salyzyn154f4602014-02-20 14:59:07 -0800825 if (logger_list->pid) {
826 ret = snprintf(cp, remaining, " pid=%u", logger_list->pid);
827 ret = min(ret, remaining);
828 remaining -= ret;
829 cp += ret;
830 }
831
Mark Salyzyn2d3f38a2015-01-26 10:46:44 -0800832 if (logger_list->mode & ANDROID_LOG_NONBLOCK) {
Mark Salyzyn154f4602014-02-20 14:59:07 -0800833 /* Deal with an unresponsive logd */
834 sigaction(SIGALRM, &ignore, &old_sigaction);
835 old_alarm = alarm(30);
836 }
837 ret = write(sock, buffer, cp - buffer);
838 e = errno;
Mark Salyzyn2d3f38a2015-01-26 10:46:44 -0800839 if (logger_list->mode & ANDROID_LOG_NONBLOCK) {
Mark Salyzyn154f4602014-02-20 14:59:07 -0800840 if (e == EINTR) {
841 e = ETIMEDOUT;
Mark Salyzyn42958412013-11-22 10:50:27 -0800842 }
Mark Salyzyn154f4602014-02-20 14:59:07 -0800843 alarm(old_alarm);
844 sigaction(SIGALRM, &old_sigaction, NULL);
Mark Salyzyn42958412013-11-22 10:50:27 -0800845 }
846
847 if (ret <= 0) {
Mark Salyzyn154f4602014-02-20 14:59:07 -0800848 close(sock);
849 if ((ret == -1) && e) {
850 return -e;
Mark Salyzyn42958412013-11-22 10:50:27 -0800851 }
Mark Salyzyn154f4602014-02-20 14:59:07 -0800852 if (ret == 0) {
853 return -EIO;
854 }
855 return ret;
Mark Salyzyn42958412013-11-22 10:50:27 -0800856 }
Mark Salyzyn154f4602014-02-20 14:59:07 -0800857
858 logger_list->sock = sock;
Mark Salyzyn42958412013-11-22 10:50:27 -0800859 }
860
Mark Salyzyn154f4602014-02-20 14:59:07 -0800861 ret = 0;
862 while(1) {
863 memset(log_msg, 0, sizeof(*log_msg));
864
Mark Salyzyn2d3f38a2015-01-26 10:46:44 -0800865 if (logger_list->mode & ANDROID_LOG_NONBLOCK) {
Mark Salyzyn154f4602014-02-20 14:59:07 -0800866 /* particularily useful if tombstone is reporting for logd */
867 sigaction(SIGALRM, &ignore, &old_sigaction);
868 old_alarm = alarm(30);
869 }
870 /* NOTE: SOCK_SEQPACKET guarantees we read exactly one full entry */
871 ret = recv(logger_list->sock, log_msg, LOGGER_ENTRY_MAX_LEN, 0);
872 e = errno;
Mark Salyzyn2d3f38a2015-01-26 10:46:44 -0800873 if (logger_list->mode & ANDROID_LOG_NONBLOCK) {
Mark Salyzyn154f4602014-02-20 14:59:07 -0800874 if ((ret == 0) || (e == EINTR)) {
875 e = EAGAIN;
876 ret = -1;
877 }
878 alarm(old_alarm);
879 sigaction(SIGALRM, &old_sigaction, NULL);
880 }
881
882 if (ret <= 0) {
883 if ((ret == -1) && e) {
884 return -e;
885 }
886 return ret;
887 }
888
889 logger_for_each(logger, logger_list) {
890 if (log_msg->entry.lid == logger->id) {
891 return ret;
892 }
Mark Salyzyn42958412013-11-22 10:50:27 -0800893 }
894 }
Mark Salyzyn154f4602014-02-20 14:59:07 -0800895 /* NOTREACH */
Mark Salyzyn42958412013-11-22 10:50:27 -0800896 return ret;
897}
898
899/* Close all the logs */
900void android_logger_list_free(struct logger_list *logger_list)
901{
902 if (logger_list == NULL) {
903 return;
904 }
905
906 while (!list_empty(&logger_list->node)) {
907 struct listnode *node = list_head(&logger_list->node);
908 struct logger *logger = node_to_item(node, struct logger, node);
909 android_logger_free(logger);
910 }
911
Mark Salyzyn154f4602014-02-20 14:59:07 -0800912 if (logger_list->sock >= 0) {
913 close (logger_list->sock);
914 }
915
Mark Salyzyn42958412013-11-22 10:50:27 -0800916 free(logger_list);
917}