blob: cf76b0ad9ecd4d3a25ccd82e11525c63f628d317 [file] [log] [blame]
Mark Salyzyn018a96d2016-03-01 13:45:42 -08001/*
2 * Copyright (C) 2007-2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <errno.h>
18#include <stdatomic.h>
19#include <stdlib.h>
20#include <string.h>
21#include <sys/time.h>
22
23#ifdef __BIONIC__
24#include <android/set_abort_message.h>
25#endif
26
27#include <log/event_tag_map.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080028#include <private/android_filesystem_config.h>
29#include <private/android_logger.h>
30
31#include "config_write.h"
32#include "log_portability.h"
33#include "logger.h"
Tom Cherry6f6ef392019-01-16 14:17:08 -080034#include "uio.h"
Mark Salyzyn018a96d2016-03-01 13:45:42 -080035
36#define LOG_BUF_SIZE 1024
37
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080038static int __write_to_log_init(log_id_t, struct iovec* vec, size_t nr);
Tom Cherry71ba1642019-01-10 10:37:36 -080039static int (*write_to_log)(log_id_t, struct iovec* vec, size_t nr) = __write_to_log_init;
Mark Salyzyn018a96d2016-03-01 13:45:42 -080040
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080041static int check_log_uid_permissions() {
Dan Willemsen0910d2d2016-11-29 13:39:55 -080042#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080043 uid_t uid = __android_log_uid();
Mark Salyzync33103c2016-03-28 16:20:29 -070044
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080045 /* Matches clientHasLogCredentials() in logd */
46 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) {
47 uid = geteuid();
Mark Salyzync33103c2016-03-28 16:20:29 -070048 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080049 gid_t gid = getgid();
50 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) {
51 gid = getegid();
52 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) {
53 int num_groups;
54 gid_t* groups;
Mark Salyzync33103c2016-03-28 16:20:29 -070055
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080056 num_groups = getgroups(0, NULL);
57 if (num_groups <= 0) {
58 return -EPERM;
59 }
Tom Cherry71ba1642019-01-10 10:37:36 -080060 groups = static_cast<gid_t*>(calloc(num_groups, sizeof(gid_t)));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080061 if (!groups) {
62 return -ENOMEM;
63 }
64 num_groups = getgroups(num_groups, groups);
65 while (num_groups > 0) {
66 if (groups[num_groups - 1] == AID_LOG) {
67 break;
Mark Salyzync33103c2016-03-28 16:20:29 -070068 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080069 --num_groups;
70 }
71 free(groups);
72 if (num_groups <= 0) {
73 return -EPERM;
74 }
Mark Salyzync33103c2016-03-28 16:20:29 -070075 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080076 }
Mark Salyzync33103c2016-03-28 16:20:29 -070077 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080078 }
Mark Salyzync33103c2016-03-28 16:20:29 -070079#endif
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080080 return 0;
Mark Salyzync33103c2016-03-28 16:20:29 -070081}
82
Tom Cherry71ba1642019-01-10 10:37:36 -080083static void __android_log_cache_available(struct android_log_transport_write* node) {
84 uint32_t i;
Mark Salyzync33103c2016-03-28 16:20:29 -070085
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080086 if (node->logMask) {
87 return;
88 }
Mark Salyzync33103c2016-03-28 16:20:29 -070089
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080090 for (i = LOG_ID_MIN; i < LOG_ID_MAX; ++i) {
91 if (node->write && (i != LOG_ID_KERNEL) &&
92 ((i != LOG_ID_SECURITY) || (check_log_uid_permissions() == 0)) &&
Tom Cherry71ba1642019-01-10 10:37:36 -080093 (!node->available || ((*node->available)(static_cast<log_id_t>(i)) >= 0))) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080094 node->logMask |= 1 << i;
Mark Salyzync33103c2016-03-28 16:20:29 -070095 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080096 }
Mark Salyzync33103c2016-03-28 16:20:29 -070097}
98
Dan Willemsen0910d2d2016-11-29 13:39:55 -080099#if defined(__ANDROID__)
Mark Salyzynba1a7982016-09-13 07:28:21 -0700100static atomic_uintptr_t tagMap;
101#endif
102
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700103/*
104 * Release any logger resources. A new log write will immediately re-acquire.
105 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800106void __android_log_close() {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800107 struct android_log_transport_write* transport;
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800108#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800109 EventTagMap* m;
Mark Salyzynba1a7982016-09-13 07:28:21 -0700110#endif
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700111
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800112 __android_log_lock();
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700113
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800114 write_to_log = __write_to_log_init;
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700115
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800116 /*
117 * Threads that are actively writing at this point are not held back
118 * by a lock and are at risk of dropping the messages with a return code
119 * -EBADF. Prefer to return error code than add the overhead of a lock to
120 * each log writing call to guarantee delivery. In addition, anyone
121 * calling this is doing so to release the logging resources and shut down,
122 * for them to do so with outstanding log requests in other threads is a
123 * disengenuous use of this function.
124 */
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700125
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800126 write_transport_for_each(transport, &__android_log_persist_write) {
127 if (transport->close) {
128 (*transport->close)();
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700129 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800130 }
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700131
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800132 write_transport_for_each(transport, &__android_log_transport_write) {
133 if (transport->close) {
134 (*transport->close)();
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700135 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800136 }
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700137
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800138 __android_log_config_write_close();
Mark Salyzyn71002882016-03-08 16:18:26 -0800139
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800140#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800141 /*
142 * Additional risk here somewhat mitigated by immediately unlock flushing
143 * the processor cache. The multi-threaded race that we choose to accept,
144 * to minimize locking, is an atomic_load in a writer picking up a value
145 * just prior to entering this routine. There will be an use after free.
146 *
147 * Again, anyone calling this is doing so to release the logging resources
148 * is most probably going to quiesce then shut down; or to restart after
149 * a fork so the risk should be non-existent. For this reason we
150 * choose a mitigation stance for efficiency instead of incuring the cost
151 * of a lock for every log write.
152 */
153 m = (EventTagMap*)atomic_exchange(&tagMap, (uintptr_t)0);
Mark Salyzynba1a7982016-09-13 07:28:21 -0700154#endif
155
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800156 __android_log_unlock();
Mark Salyzynba1a7982016-09-13 07:28:21 -0700157
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800158#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800159 if (m != (EventTagMap*)(uintptr_t)-1LL) android_closeEventTagMap(m);
Mark Salyzynba1a7982016-09-13 07:28:21 -0700160#endif
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700161}
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800162
163/* log_init_lock assumed */
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800164static int __write_to_log_initialize() {
165 struct android_log_transport_write* transport;
166 struct listnode* n;
167 int i = 0, ret = 0;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800168
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800169 __android_log_config_write();
170 write_transport_for_each_safe(transport, n, &__android_log_transport_write) {
171 __android_log_cache_available(transport);
172 if (!transport->logMask) {
173 list_remove(&transport->node);
174 continue;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800175 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800176 if (!transport->open || ((*transport->open)() < 0)) {
177 if (transport->close) {
178 (*transport->close)();
179 }
180 list_remove(&transport->node);
181 continue;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800182 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800183 ++ret;
184 }
185 write_transport_for_each_safe(transport, n, &__android_log_persist_write) {
186 __android_log_cache_available(transport);
187 if (!transport->logMask) {
188 list_remove(&transport->node);
189 continue;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800190 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800191 if (!transport->open || ((*transport->open)() < 0)) {
192 if (transport->close) {
193 (*transport->close)();
194 }
195 list_remove(&transport->node);
196 continue;
197 }
198 ++i;
199 }
200 if (!ret && !i) {
201 return -ENODEV;
202 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800203
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800204 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800205}
206
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800207static int __write_to_log_daemon(log_id_t log_id, struct iovec* vec, size_t nr) {
208 struct android_log_transport_write* node;
Mark Salyzyn72d37242018-03-07 10:42:06 -0800209 int ret, save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800210 struct timespec ts;
211 size_t len, i;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800212
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800213 for (len = i = 0; i < nr; ++i) {
214 len += vec[i].iov_len;
215 }
216 if (!len) {
217 return -EINVAL;
218 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800219
Mark Salyzyn72d37242018-03-07 10:42:06 -0800220 save_errno = errno;
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800221#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800222 clock_gettime(android_log_clockid(), &ts);
Mark Salyzyn142b43d2016-12-28 10:30:57 -0800223
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800224 if (log_id == LOG_ID_SECURITY) {
225 if (vec[0].iov_len < 4) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800226 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800227 return -EINVAL;
228 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800229
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800230 ret = check_log_uid_permissions();
231 if (ret < 0) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800232 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800233 return ret;
234 }
235 if (!__android_log_security()) {
236 /* If only we could reset downstream logd counter */
Mark Salyzyn72d37242018-03-07 10:42:06 -0800237 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800238 return -EPERM;
239 }
Yao Chen025f05a2017-12-01 15:48:19 -0800240 } else if (log_id == LOG_ID_EVENTS || log_id == LOG_ID_STATS) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800241 const char* tag;
242 size_t len;
243 EventTagMap *m, *f;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800244
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800245 if (vec[0].iov_len < 4) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800246 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800247 return -EINVAL;
248 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800249
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800250 tag = NULL;
251 len = 0;
252 f = NULL;
253 m = (EventTagMap*)atomic_load(&tagMap);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800254
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800255 if (!m) {
256 ret = __android_log_trylock();
257 m = (EventTagMap*)atomic_load(&tagMap); /* trylock flush cache */
258 if (!m) {
259 m = android_openEventTagMap(NULL);
260 if (ret) { /* trylock failed, use local copy, mark for close */
261 f = m;
262 } else {
263 if (!m) { /* One chance to open map file */
264 m = (EventTagMap*)(uintptr_t)-1LL;
265 }
266 atomic_store(&tagMap, (uintptr_t)m);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800267 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800268 }
269 if (!ret) { /* trylock succeeded, unlock */
270 __android_log_unlock();
271 }
272 }
273 if (m && (m != (EventTagMap*)(uintptr_t)-1LL)) {
Tom Cherry7d045f62019-09-30 12:58:55 -0700274 tag = android_lookupEventTag_len(m, &len, *static_cast<uint32_t*>(vec[0].iov_base));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800275 }
Tom Cherry71ba1642019-01-10 10:37:36 -0800276 ret = __android_log_is_loggable_len(ANDROID_LOG_INFO, tag, len, ANDROID_LOG_VERBOSE);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800277 if (f) { /* local copy marked for close */
278 android_closeEventTagMap(f);
279 }
280 if (!ret) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800281 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800282 return -EPERM;
283 }
284 } else {
285 /* Validate the incoming tag, tag content can not split across iovec */
286 char prio = ANDROID_LOG_VERBOSE;
Tom Cherry71ba1642019-01-10 10:37:36 -0800287 const char* tag = static_cast<const char*>(vec[0].iov_base);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800288 size_t len = vec[0].iov_len;
289 if (!tag) {
290 len = 0;
291 }
292 if (len > 0) {
293 prio = *tag;
294 if (len > 1) {
295 --len;
296 ++tag;
297 } else {
298 len = vec[1].iov_len;
299 tag = ((const char*)vec[1].iov_base);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800300 if (!tag) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800301 len = 0;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800302 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800303 }
304 }
305 /* tag must be nul terminated */
306 if (tag && strnlen(tag, len) >= len) {
307 tag = NULL;
308 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800309
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800310 if (!__android_log_is_loggable_len(prio, tag, len - 1, ANDROID_LOG_VERBOSE)) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800311 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800312 return -EPERM;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800313 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800314 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800315#else
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800316 /* simulate clock_gettime(CLOCK_REALTIME, &ts); */
317 {
318 struct timeval tv;
319 gettimeofday(&tv, NULL);
320 ts.tv_sec = tv.tv_sec;
321 ts.tv_nsec = tv.tv_usec * 1000;
322 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800323#endif
324
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800325 ret = 0;
326 i = 1 << log_id;
327 write_transport_for_each(node, &__android_log_transport_write) {
328 if (node->logMask & i) {
329 ssize_t retval;
330 retval = (*node->write)(log_id, &ts, vec, nr);
331 if (ret >= 0) {
332 ret = retval;
333 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800334 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800335 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800336
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800337 write_transport_for_each(node, &__android_log_persist_write) {
338 if (node->logMask & i) {
339 (void)(*node->write)(log_id, &ts, vec, nr);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800340 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800341 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800342
Mark Salyzyn72d37242018-03-07 10:42:06 -0800343 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800344 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800345}
346
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800347static int __write_to_log_init(log_id_t log_id, struct iovec* vec, size_t nr) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800348 int ret, save_errno = errno;
349
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800350 __android_log_lock();
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800351
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800352 if (write_to_log == __write_to_log_init) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800353 ret = __write_to_log_initialize();
354 if (ret < 0) {
355 __android_log_unlock();
356 if (!list_empty(&__android_log_persist_write)) {
357 __write_to_log_daemon(log_id, vec, nr);
358 }
Mark Salyzyn72d37242018-03-07 10:42:06 -0800359 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800360 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800361 }
362
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800363 write_to_log = __write_to_log_daemon;
364 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800365
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800366 __android_log_unlock();
367
Mark Salyzyn72d37242018-03-07 10:42:06 -0800368 ret = write_to_log(log_id, vec, nr);
369 errno = save_errno;
370 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800371}
372
Tom Cherry2d9779e2019-02-08 11:46:19 -0800373int __android_log_write(int prio, const char* tag, const char* msg) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800374 return __android_log_buf_write(LOG_ID_MAIN, prio, tag, msg);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800375}
376
Tom Cherry2d9779e2019-02-08 11:46:19 -0800377int __android_log_buf_write(int bufID, int prio, const char* tag, const char* msg) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800378 if (!tag) tag = "";
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800379
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800380#if __BIONIC__
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800381 if (prio == ANDROID_LOG_FATAL) {
382 android_set_abort_message(msg);
383 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800384#endif
385
Elliott Hughesde3ad1d2015-04-03 13:24:37 -0700386 struct iovec vec[3];
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800387 vec[0].iov_base = (unsigned char*)&prio;
388 vec[0].iov_len = 1;
389 vec[1].iov_base = (void*)tag;
390 vec[1].iov_len = strlen(tag) + 1;
391 vec[2].iov_base = (void*)msg;
392 vec[2].iov_len = strlen(msg) + 1;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800393
Tom Cherry71ba1642019-01-10 10:37:36 -0800394 return write_to_log(static_cast<log_id_t>(bufID), vec, 3);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800395}
396
Tom Cherry2d9779e2019-02-08 11:46:19 -0800397int __android_log_vprint(int prio, const char* tag, const char* fmt, va_list ap) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800398 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800399
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800400 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800401
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800402 return __android_log_write(prio, tag, buf);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800403}
404
Tom Cherry2d9779e2019-02-08 11:46:19 -0800405int __android_log_print(int prio, const char* tag, const char* fmt, ...) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800406 va_list ap;
407 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800408
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800409 va_start(ap, fmt);
410 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
411 va_end(ap);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800412
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800413 return __android_log_write(prio, tag, buf);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800414}
415
Tom Cherry2d9779e2019-02-08 11:46:19 -0800416int __android_log_buf_print(int bufID, int prio, const char* tag, const char* fmt, ...) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800417 va_list ap;
418 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800419
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800420 va_start(ap, fmt);
421 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
422 va_end(ap);
423
424 return __android_log_buf_write(bufID, prio, tag, buf);
425}
426
Tom Cherry2d9779e2019-02-08 11:46:19 -0800427void __android_log_assert(const char* cond, const char* tag, const char* fmt, ...) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800428 char buf[LOG_BUF_SIZE];
429
430 if (fmt) {
431 va_list ap;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800432 va_start(ap, fmt);
433 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
434 va_end(ap);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800435 } else {
436 /* Msg not provided, log condition. N.B. Do not use cond directly as
437 * format string as it could contain spurious '%' syntax (e.g.
438 * "%d" in "blocks%devs == 0").
439 */
440 if (cond)
441 snprintf(buf, LOG_BUF_SIZE, "Assertion failed: %s", cond);
442 else
443 strcpy(buf, "Unspecified assertion failed");
444 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800445
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800446 // Log assertion failures to stderr for the benefit of "adb shell" users
447 // and gtests (http://b/23675822).
Tom Cherry6f6ef392019-01-16 14:17:08 -0800448 TEMP_FAILURE_RETRY(write(2, buf, strlen(buf)));
449 TEMP_FAILURE_RETRY(write(2, "\n", 1));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800450
451 __android_log_write(ANDROID_LOG_FATAL, tag, buf);
452 abort(); /* abort so we have a chance to debug the situation */
453 /* NOTREACHED */
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800454}
455
Tom Cherry2d9779e2019-02-08 11:46:19 -0800456int __android_log_bwrite(int32_t tag, const void* payload, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800457 struct iovec vec[2];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800458
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800459 vec[0].iov_base = &tag;
460 vec[0].iov_len = sizeof(tag);
461 vec[1].iov_base = (void*)payload;
462 vec[1].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800463
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800464 return write_to_log(LOG_ID_EVENTS, vec, 2);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800465}
466
Tom Cherry2d9779e2019-02-08 11:46:19 -0800467int __android_log_stats_bwrite(int32_t tag, const void* payload, size_t len) {
Stefan Lafon701a0652017-08-24 20:14:06 -0700468 struct iovec vec[2];
469
470 vec[0].iov_base = &tag;
471 vec[0].iov_len = sizeof(tag);
472 vec[1].iov_base = (void*)payload;
473 vec[1].iov_len = len;
474
475 return write_to_log(LOG_ID_STATS, vec, 2);
476}
477
Tom Cherry2d9779e2019-02-08 11:46:19 -0800478int __android_log_security_bwrite(int32_t tag, const void* payload, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800479 struct iovec vec[2];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800480
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800481 vec[0].iov_base = &tag;
482 vec[0].iov_len = sizeof(tag);
483 vec[1].iov_base = (void*)payload;
484 vec[1].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800485
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800486 return write_to_log(LOG_ID_SECURITY, vec, 2);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800487}
488
489/*
490 * Like __android_log_bwrite, but takes the type as well. Doesn't work
491 * for the general case where we're generating lists of stuff, but very
492 * handy if we just want to dump an integer into the log.
493 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800494int __android_log_btwrite(int32_t tag, char type, const void* payload, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800495 struct iovec vec[3];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800496
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800497 vec[0].iov_base = &tag;
498 vec[0].iov_len = sizeof(tag);
499 vec[1].iov_base = &type;
500 vec[1].iov_len = sizeof(type);
501 vec[2].iov_base = (void*)payload;
502 vec[2].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800503
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800504 return write_to_log(LOG_ID_EVENTS, vec, 3);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800505}
506
507/*
508 * Like __android_log_bwrite, but used for writing strings to the
509 * event log.
510 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800511int __android_log_bswrite(int32_t tag, const char* payload) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800512 struct iovec vec[4];
513 char type = EVENT_TYPE_STRING;
514 uint32_t len = strlen(payload);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800515
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800516 vec[0].iov_base = &tag;
517 vec[0].iov_len = sizeof(tag);
518 vec[1].iov_base = &type;
519 vec[1].iov_len = sizeof(type);
520 vec[2].iov_base = &len;
521 vec[2].iov_len = sizeof(len);
522 vec[3].iov_base = (void*)payload;
523 vec[3].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800524
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800525 return write_to_log(LOG_ID_EVENTS, vec, 4);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800526}
527
528/*
529 * Like __android_log_security_bwrite, but used for writing strings to the
530 * security log.
531 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800532int __android_log_security_bswrite(int32_t tag, const char* payload) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800533 struct iovec vec[4];
534 char type = EVENT_TYPE_STRING;
535 uint32_t len = strlen(payload);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800536
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800537 vec[0].iov_base = &tag;
538 vec[0].iov_len = sizeof(tag);
539 vec[1].iov_base = &type;
540 vec[1].iov_len = sizeof(type);
541 vec[2].iov_base = &len;
542 vec[2].iov_len = sizeof(len);
543 vec[3].iov_base = (void*)payload;
544 vec[3].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800545
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800546 return write_to_log(LOG_ID_SECURITY, vec, 4);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800547}