blob: 319360f6321e2927cad4f0087f53c71a2b01051e [file] [log] [blame]
Mark Salyzyn018a96d2016-03-01 13:45:42 -08001/*
2 * Copyright (C) 2007-2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Tom Cherry21bb36c2020-01-08 15:18:26 -080017#include "pmsg_writer.h"
Mark Salyzyn018a96d2016-03-01 13:45:42 -080018
19#include <errno.h>
20#include <fcntl.h>
21#include <stdlib.h>
22#include <string.h>
23#include <sys/types.h>
24#include <time.h>
25
Tom Cherry2a6811b2019-12-11 12:56:01 -080026#include <shared_mutex>
27
Steven Moreland1f83aa42017-04-13 23:48:57 -070028#include <log/log_properties.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080029#include <private/android_logger.h>
30
Mark Salyzyn018a96d2016-03-01 13:45:42 -080031#include "log_portability.h"
32#include "logger.h"
Tom Cherry2a6811b2019-12-11 12:56:01 -080033#include "rwlock.h"
Tom Cherry6f6ef392019-01-16 14:17:08 -080034#include "uio.h"
Mark Salyzyn018a96d2016-03-01 13:45:42 -080035
Tom Cherry2a6811b2019-12-11 12:56:01 -080036static int pmsg_fd;
37static RwLock pmsg_fd_lock;
Mark Salyzyndb8a2662016-10-10 07:27:42 -070038
Tom Cherry2a6811b2019-12-11 12:56:01 -080039static void PmsgOpen() {
40 auto lock = std::unique_lock{pmsg_fd_lock};
41 if (pmsg_fd > 0) {
42 // Someone raced us and opened the socket already.
43 return;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080044 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -080045
Tom Cherry2a6811b2019-12-11 12:56:01 -080046 pmsg_fd = TEMP_FAILURE_RETRY(open("/dev/pmsg0", O_WRONLY | O_CLOEXEC));
Mark Salyzyn018a96d2016-03-01 13:45:42 -080047}
48
Tom Cherry21bb36c2020-01-08 15:18:26 -080049void PmsgClose() {
Tom Cherry2a6811b2019-12-11 12:56:01 -080050 auto lock = std::unique_lock{pmsg_fd_lock};
51 if (pmsg_fd > 0) {
52 close(pmsg_fd);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080053 }
Tom Cherry2a6811b2019-12-11 12:56:01 -080054 pmsg_fd = 0;
Mark Salyzyn018a96d2016-03-01 13:45:42 -080055}
56
Tom Cherry21bb36c2020-01-08 15:18:26 -080057int PmsgWrite(log_id_t logId, struct timespec* ts, struct iovec* vec, size_t nr) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080058 static const unsigned headerLength = 2;
59 struct iovec newVec[nr + headerLength];
60 android_log_header_t header;
61 android_pmsg_log_header_t pmsgHeader;
62 size_t i, payloadSize;
63 ssize_t ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -080064
Tom Cherry2a6811b2019-12-11 12:56:01 -080065 if (!__android_log_is_debuggable()) {
66 if (logId != LOG_ID_EVENTS && logId != LOG_ID_SECURITY) {
67 return -1;
Mark Salyzyn7ef52492016-03-25 15:50:46 -070068 }
69
Tom Cherry2a6811b2019-12-11 12:56:01 -080070 if (logId == LOG_ID_EVENTS) {
71 if (vec[0].iov_len < 4) {
72 return -EINVAL;
73 }
74
75 if (SNET_EVENT_LOG_TAG != *static_cast<uint32_t*>(vec[0].iov_base)) {
76 return -EPERM;
77 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -080078 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080079 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -080080
Tom Cherry2a6811b2019-12-11 12:56:01 -080081 auto lock = std::shared_lock{pmsg_fd_lock};
82
83 if (pmsg_fd <= 0) {
84 lock.unlock();
85 PmsgOpen();
86 lock.lock();
87 }
88
89 if (pmsg_fd <= 0) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080090 return -EBADF;
91 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -080092
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080093 /*
94 * struct {
95 * // what we provide to pstore
96 * android_pmsg_log_header_t pmsgHeader;
97 * // what we provide to file
98 * android_log_header_t header;
99 * // caller provides
100 * union {
101 * struct {
102 * char prio;
103 * char payload[];
104 * } string;
105 * struct {
106 * uint32_t tag
107 * char payload[];
108 * } binary;
109 * };
110 * };
111 */
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800112
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800113 pmsgHeader.magic = LOGGER_MAGIC;
114 pmsgHeader.len = sizeof(pmsgHeader) + sizeof(header);
Tom Cherryb47aa2a2020-01-08 15:34:14 -0800115 pmsgHeader.uid = getuid();
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800116 pmsgHeader.pid = getpid();
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800117
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800118 header.id = logId;
119 header.tid = gettid();
120 header.realtime.tv_sec = ts->tv_sec;
121 header.realtime.tv_nsec = ts->tv_nsec;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800122
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800123 newVec[0].iov_base = (unsigned char*)&pmsgHeader;
124 newVec[0].iov_len = sizeof(pmsgHeader);
125 newVec[1].iov_base = (unsigned char*)&header;
126 newVec[1].iov_len = sizeof(header);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800127
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800128 for (payloadSize = 0, i = headerLength; i < nr + headerLength; i++) {
129 newVec[i].iov_base = vec[i - headerLength].iov_base;
130 payloadSize += newVec[i].iov_len = vec[i - headerLength].iov_len;
131
132 if (payloadSize > LOGGER_ENTRY_MAX_PAYLOAD) {
133 newVec[i].iov_len -= payloadSize - LOGGER_ENTRY_MAX_PAYLOAD;
134 if (newVec[i].iov_len) {
135 ++i;
136 }
137 payloadSize = LOGGER_ENTRY_MAX_PAYLOAD;
138 break;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800139 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800140 }
141 pmsgHeader.len += payloadSize;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800142
Tom Cherry2a6811b2019-12-11 12:56:01 -0800143 ret = TEMP_FAILURE_RETRY(writev(pmsg_fd, newVec, i));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800144 if (ret < 0) {
145 ret = errno ? -errno : -ENOTCONN;
146 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800147
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800148 if (ret > (ssize_t)(sizeof(header) + sizeof(pmsgHeader))) {
149 ret -= sizeof(header) - sizeof(pmsgHeader);
150 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800151
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800152 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800153}
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800154
155/*
156 * Virtual pmsg filesystem
157 *
158 * Payload will comprise the string "<basedir>:<basefile>\0<content>" to a
159 * maximum of LOGGER_ENTRY_MAX_PAYLOAD, but scaled to the last newline in the
160 * file.
161 *
162 * Will hijack the header.realtime.tv_nsec field for a sequence number in usec.
163 */
164
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800165static inline const char* strnrchr(const char* buf, size_t len, char c) {
166 const char* cp = buf + len;
167 while ((--cp > buf) && (*cp != c))
168 ;
169 if (cp <= buf) {
170 return buf + len;
171 }
172 return cp;
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800173}
174
175/* Write a buffer as filename references (tag = <basedir>:<basename>) */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800176ssize_t __android_log_pmsg_file_write(log_id_t logId, char prio, const char* filename,
177 const char* buf, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800178 size_t length, packet_len;
179 const char* tag;
180 char *cp, *slash;
181 struct timespec ts;
182 struct iovec vec[3];
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800183
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800184 /* Make sure the logId value is not a bad idea */
185 if ((logId == LOG_ID_KERNEL) || /* Verbotten */
186 (logId == LOG_ID_EVENTS) || /* Do not support binary content */
187 (logId == LOG_ID_SECURITY) || /* Bad idea to allow */
188 ((unsigned)logId >= 32)) { /* fit within logMask on arch32 */
189 return -EINVAL;
190 }
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800191
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800192 clock_gettime(android_log_clockid(), &ts);
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800193
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800194 cp = strdup(filename);
195 if (!cp) {
196 return -ENOMEM;
197 }
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800198
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800199 tag = cp;
200 slash = strrchr(cp, '/');
201 if (slash) {
202 *slash = ':';
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800203 slash = strrchr(cp, '/');
204 if (slash) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800205 tag = slash + 1;
206 }
207 }
208
209 length = strlen(tag) + 1;
210 packet_len = LOGGER_ENTRY_MAX_PAYLOAD - sizeof(char) - length;
211
212 vec[0].iov_base = &prio;
213 vec[0].iov_len = sizeof(char);
214 vec[1].iov_base = (unsigned char*)tag;
215 vec[1].iov_len = length;
216
Tom Cherry71ba1642019-01-10 10:37:36 -0800217 for (ts.tv_nsec = 0, length = len; length; ts.tv_nsec += ANDROID_LOG_PMSG_FILE_SEQUENCE) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800218 ssize_t ret;
219 size_t transfer;
220
Tom Cherry71ba1642019-01-10 10:37:36 -0800221 if ((ts.tv_nsec / ANDROID_LOG_PMSG_FILE_SEQUENCE) >= ANDROID_LOG_PMSG_FILE_MAX_SEQUENCE) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800222 len -= length;
223 break;
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800224 }
225
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800226 transfer = length;
227 if (transfer > packet_len) {
228 transfer = strnrchr(buf, packet_len - 1, '\n') - buf;
229 if ((transfer < length) && (buf[transfer] == '\n')) {
230 ++transfer;
231 }
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800232 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800233
234 vec[2].iov_base = (unsigned char*)buf;
235 vec[2].iov_len = transfer;
236
Tom Cherry2a6811b2019-12-11 12:56:01 -0800237 ret = PmsgWrite(logId, &ts, vec, sizeof(vec) / sizeof(vec[0]));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800238
239 if (ret <= 0) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800240 free(cp);
241 return ret ? ret : (len - length);
Mark Salyzyndb8a2662016-10-10 07:27:42 -0700242 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800243 length -= transfer;
244 buf += transfer;
245 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800246 free(cp);
247 return len;
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800248}