blob: 7fa3f436b60a2152c86ca66ffe4608c66c515f1c [file] [log] [blame]
Mark Salyzyn018a96d2016-03-01 13:45:42 -08001/*
2 * Copyright (C) 2007-2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <errno.h>
18#include <stdatomic.h>
19#include <stdlib.h>
20#include <string.h>
21#include <sys/time.h>
22
23#ifdef __BIONIC__
24#include <android/set_abort_message.h>
25#endif
26
27#include <log/event_tag_map.h>
Mark Salyzyn81321a72017-03-09 07:28:29 -080028#include <log/log_transport.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080029#include <private/android_filesystem_config.h>
30#include <private/android_logger.h>
31
Mark Salyzyn71002882016-03-08 16:18:26 -080032#include "config_read.h" /* __android_log_config_read_close() definition */
Mark Salyzyn018a96d2016-03-01 13:45:42 -080033#include "config_write.h"
34#include "log_portability.h"
35#include "logger.h"
Tom Cherry6f6ef392019-01-16 14:17:08 -080036#include "uio.h"
Mark Salyzyn018a96d2016-03-01 13:45:42 -080037
38#define LOG_BUF_SIZE 1024
39
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080040static int __write_to_log_init(log_id_t, struct iovec* vec, size_t nr);
Tom Cherry71ba1642019-01-10 10:37:36 -080041static int (*write_to_log)(log_id_t, struct iovec* vec, size_t nr) = __write_to_log_init;
Mark Salyzyn018a96d2016-03-01 13:45:42 -080042
43/*
44 * This is used by the C++ code to decide if it should write logs through
45 * the C code. Basically, if /dev/socket/logd is available, we're running in
46 * the simulator rather than a desktop tool and want to use the device.
47 */
Tom Cherry71ba1642019-01-10 10:37:36 -080048static enum { kLogUninitialized, kLogNotAvailable, kLogAvailable } g_log_status = kLogUninitialized;
Mark Salyzyn018a96d2016-03-01 13:45:42 -080049
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080050static int check_log_uid_permissions() {
Dan Willemsen0910d2d2016-11-29 13:39:55 -080051#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080052 uid_t uid = __android_log_uid();
Mark Salyzync33103c2016-03-28 16:20:29 -070053
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080054 /* Matches clientHasLogCredentials() in logd */
55 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) {
56 uid = geteuid();
Mark Salyzync33103c2016-03-28 16:20:29 -070057 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080058 gid_t gid = getgid();
59 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) {
60 gid = getegid();
61 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) {
62 int num_groups;
63 gid_t* groups;
Mark Salyzync33103c2016-03-28 16:20:29 -070064
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080065 num_groups = getgroups(0, NULL);
66 if (num_groups <= 0) {
67 return -EPERM;
68 }
Tom Cherry71ba1642019-01-10 10:37:36 -080069 groups = static_cast<gid_t*>(calloc(num_groups, sizeof(gid_t)));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080070 if (!groups) {
71 return -ENOMEM;
72 }
73 num_groups = getgroups(num_groups, groups);
74 while (num_groups > 0) {
75 if (groups[num_groups - 1] == AID_LOG) {
76 break;
Mark Salyzync33103c2016-03-28 16:20:29 -070077 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080078 --num_groups;
79 }
80 free(groups);
81 if (num_groups <= 0) {
82 return -EPERM;
83 }
Mark Salyzync33103c2016-03-28 16:20:29 -070084 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080085 }
Mark Salyzync33103c2016-03-28 16:20:29 -070086 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080087 }
Mark Salyzync33103c2016-03-28 16:20:29 -070088#endif
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080089 return 0;
Mark Salyzync33103c2016-03-28 16:20:29 -070090}
91
Tom Cherry71ba1642019-01-10 10:37:36 -080092static void __android_log_cache_available(struct android_log_transport_write* node) {
93 uint32_t i;
Mark Salyzync33103c2016-03-28 16:20:29 -070094
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080095 if (node->logMask) {
96 return;
97 }
Mark Salyzync33103c2016-03-28 16:20:29 -070098
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080099 for (i = LOG_ID_MIN; i < LOG_ID_MAX; ++i) {
100 if (node->write && (i != LOG_ID_KERNEL) &&
101 ((i != LOG_ID_SECURITY) || (check_log_uid_permissions() == 0)) &&
Tom Cherry71ba1642019-01-10 10:37:36 -0800102 (!node->available || ((*node->available)(static_cast<log_id_t>(i)) >= 0))) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800103 node->logMask |= 1 << i;
Mark Salyzync33103c2016-03-28 16:20:29 -0700104 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800105 }
Mark Salyzync33103c2016-03-28 16:20:29 -0700106}
107
Tom Cherry2d9779e2019-02-08 11:46:19 -0800108extern "C" int __android_log_dev_available() {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800109 struct android_log_transport_write* node;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800110
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800111 if (list_empty(&__android_log_transport_write)) {
112 return kLogUninitialized;
113 }
Mark Salyzync33103c2016-03-28 16:20:29 -0700114
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800115 write_transport_for_each(node, &__android_log_transport_write) {
116 __android_log_cache_available(node);
117 if (node->logMask) {
118 return kLogAvailable;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800119 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800120 }
121 return kLogNotAvailable;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800122}
Mark Salyzynba1a7982016-09-13 07:28:21 -0700123
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800124#if defined(__ANDROID__)
Mark Salyzynba1a7982016-09-13 07:28:21 -0700125static atomic_uintptr_t tagMap;
126#endif
127
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700128/*
129 * Release any logger resources. A new log write will immediately re-acquire.
130 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800131void __android_log_close() {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800132 struct android_log_transport_write* transport;
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800133#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800134 EventTagMap* m;
Mark Salyzynba1a7982016-09-13 07:28:21 -0700135#endif
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700136
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800137 __android_log_lock();
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700138
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800139 write_to_log = __write_to_log_init;
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700140
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800141 /*
142 * Threads that are actively writing at this point are not held back
143 * by a lock and are at risk of dropping the messages with a return code
144 * -EBADF. Prefer to return error code than add the overhead of a lock to
145 * each log writing call to guarantee delivery. In addition, anyone
146 * calling this is doing so to release the logging resources and shut down,
147 * for them to do so with outstanding log requests in other threads is a
148 * disengenuous use of this function.
149 */
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700150
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800151 write_transport_for_each(transport, &__android_log_persist_write) {
152 if (transport->close) {
153 (*transport->close)();
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700154 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800155 }
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700156
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800157 write_transport_for_each(transport, &__android_log_transport_write) {
158 if (transport->close) {
159 (*transport->close)();
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700160 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800161 }
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700162
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800163 __android_log_config_write_close();
Mark Salyzyn71002882016-03-08 16:18:26 -0800164
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800165#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800166 /*
167 * Additional risk here somewhat mitigated by immediately unlock flushing
168 * the processor cache. The multi-threaded race that we choose to accept,
169 * to minimize locking, is an atomic_load in a writer picking up a value
170 * just prior to entering this routine. There will be an use after free.
171 *
172 * Again, anyone calling this is doing so to release the logging resources
173 * is most probably going to quiesce then shut down; or to restart after
174 * a fork so the risk should be non-existent. For this reason we
175 * choose a mitigation stance for efficiency instead of incuring the cost
176 * of a lock for every log write.
177 */
178 m = (EventTagMap*)atomic_exchange(&tagMap, (uintptr_t)0);
Mark Salyzynba1a7982016-09-13 07:28:21 -0700179#endif
180
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800181 __android_log_unlock();
Mark Salyzynba1a7982016-09-13 07:28:21 -0700182
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800183#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800184 if (m != (EventTagMap*)(uintptr_t)-1LL) android_closeEventTagMap(m);
Mark Salyzynba1a7982016-09-13 07:28:21 -0700185#endif
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700186}
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800187
188/* log_init_lock assumed */
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800189static int __write_to_log_initialize() {
190 struct android_log_transport_write* transport;
191 struct listnode* n;
192 int i = 0, ret = 0;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800193
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800194 __android_log_config_write();
195 write_transport_for_each_safe(transport, n, &__android_log_transport_write) {
196 __android_log_cache_available(transport);
197 if (!transport->logMask) {
198 list_remove(&transport->node);
199 continue;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800200 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800201 if (!transport->open || ((*transport->open)() < 0)) {
202 if (transport->close) {
203 (*transport->close)();
204 }
205 list_remove(&transport->node);
206 continue;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800207 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800208 ++ret;
209 }
210 write_transport_for_each_safe(transport, n, &__android_log_persist_write) {
211 __android_log_cache_available(transport);
212 if (!transport->logMask) {
213 list_remove(&transport->node);
214 continue;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800215 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800216 if (!transport->open || ((*transport->open)() < 0)) {
217 if (transport->close) {
218 (*transport->close)();
219 }
220 list_remove(&transport->node);
221 continue;
222 }
223 ++i;
224 }
225 if (!ret && !i) {
226 return -ENODEV;
227 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800228
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800229 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800230}
231
232/*
233 * Extract a 4-byte value from a byte stream. le32toh open coded
234 */
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800235static inline uint32_t get4LE(const uint8_t* src) {
236 return src[0] | (src[1] << 8) | (src[2] << 16) | (src[3] << 24);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800237}
238
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800239static int __write_to_log_daemon(log_id_t log_id, struct iovec* vec, size_t nr) {
240 struct android_log_transport_write* node;
Mark Salyzyn72d37242018-03-07 10:42:06 -0800241 int ret, save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800242 struct timespec ts;
243 size_t len, i;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800244
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800245 for (len = i = 0; i < nr; ++i) {
246 len += vec[i].iov_len;
247 }
248 if (!len) {
249 return -EINVAL;
250 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800251
Mark Salyzyn72d37242018-03-07 10:42:06 -0800252 save_errno = errno;
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800253#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800254 clock_gettime(android_log_clockid(), &ts);
Mark Salyzyn142b43d2016-12-28 10:30:57 -0800255
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800256 if (log_id == LOG_ID_SECURITY) {
257 if (vec[0].iov_len < 4) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800258 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800259 return -EINVAL;
260 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800261
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800262 ret = check_log_uid_permissions();
263 if (ret < 0) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800264 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800265 return ret;
266 }
267 if (!__android_log_security()) {
268 /* If only we could reset downstream logd counter */
Mark Salyzyn72d37242018-03-07 10:42:06 -0800269 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800270 return -EPERM;
271 }
Yao Chen025f05a2017-12-01 15:48:19 -0800272 } else if (log_id == LOG_ID_EVENTS || log_id == LOG_ID_STATS) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800273 const char* tag;
274 size_t len;
275 EventTagMap *m, *f;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800276
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800277 if (vec[0].iov_len < 4) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800278 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800279 return -EINVAL;
280 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800281
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800282 tag = NULL;
283 len = 0;
284 f = NULL;
285 m = (EventTagMap*)atomic_load(&tagMap);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800286
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800287 if (!m) {
288 ret = __android_log_trylock();
289 m = (EventTagMap*)atomic_load(&tagMap); /* trylock flush cache */
290 if (!m) {
291 m = android_openEventTagMap(NULL);
292 if (ret) { /* trylock failed, use local copy, mark for close */
293 f = m;
294 } else {
295 if (!m) { /* One chance to open map file */
296 m = (EventTagMap*)(uintptr_t)-1LL;
297 }
298 atomic_store(&tagMap, (uintptr_t)m);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800299 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800300 }
301 if (!ret) { /* trylock succeeded, unlock */
302 __android_log_unlock();
303 }
304 }
305 if (m && (m != (EventTagMap*)(uintptr_t)-1LL)) {
Tom Cherry71ba1642019-01-10 10:37:36 -0800306 tag = android_lookupEventTag_len(m, &len, get4LE(static_cast<uint8_t*>(vec[0].iov_base)));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800307 }
Tom Cherry71ba1642019-01-10 10:37:36 -0800308 ret = __android_log_is_loggable_len(ANDROID_LOG_INFO, tag, len, ANDROID_LOG_VERBOSE);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800309 if (f) { /* local copy marked for close */
310 android_closeEventTagMap(f);
311 }
312 if (!ret) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800313 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800314 return -EPERM;
315 }
316 } else {
317 /* Validate the incoming tag, tag content can not split across iovec */
318 char prio = ANDROID_LOG_VERBOSE;
Tom Cherry71ba1642019-01-10 10:37:36 -0800319 const char* tag = static_cast<const char*>(vec[0].iov_base);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800320 size_t len = vec[0].iov_len;
321 if (!tag) {
322 len = 0;
323 }
324 if (len > 0) {
325 prio = *tag;
326 if (len > 1) {
327 --len;
328 ++tag;
329 } else {
330 len = vec[1].iov_len;
331 tag = ((const char*)vec[1].iov_base);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800332 if (!tag) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800333 len = 0;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800334 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800335 }
336 }
337 /* tag must be nul terminated */
338 if (tag && strnlen(tag, len) >= len) {
339 tag = NULL;
340 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800341
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800342 if (!__android_log_is_loggable_len(prio, tag, len - 1, ANDROID_LOG_VERBOSE)) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800343 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800344 return -EPERM;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800345 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800346 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800347#else
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800348 /* simulate clock_gettime(CLOCK_REALTIME, &ts); */
349 {
350 struct timeval tv;
351 gettimeofday(&tv, NULL);
352 ts.tv_sec = tv.tv_sec;
353 ts.tv_nsec = tv.tv_usec * 1000;
354 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800355#endif
356
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800357 ret = 0;
358 i = 1 << log_id;
359 write_transport_for_each(node, &__android_log_transport_write) {
360 if (node->logMask & i) {
361 ssize_t retval;
362 retval = (*node->write)(log_id, &ts, vec, nr);
363 if (ret >= 0) {
364 ret = retval;
365 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800366 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800367 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800368
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800369 write_transport_for_each(node, &__android_log_persist_write) {
370 if (node->logMask & i) {
371 (void)(*node->write)(log_id, &ts, vec, nr);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800372 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800373 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800374
Mark Salyzyn72d37242018-03-07 10:42:06 -0800375 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800376 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800377}
378
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800379static int __write_to_log_init(log_id_t log_id, struct iovec* vec, size_t nr) {
Mark Salyzyn72d37242018-03-07 10:42:06 -0800380 int ret, save_errno = errno;
381
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800382 __android_log_lock();
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800383
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800384 if (write_to_log == __write_to_log_init) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800385 ret = __write_to_log_initialize();
386 if (ret < 0) {
387 __android_log_unlock();
388 if (!list_empty(&__android_log_persist_write)) {
389 __write_to_log_daemon(log_id, vec, nr);
390 }
Mark Salyzyn72d37242018-03-07 10:42:06 -0800391 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800392 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800393 }
394
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800395 write_to_log = __write_to_log_daemon;
396 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800397
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800398 __android_log_unlock();
399
Mark Salyzyn72d37242018-03-07 10:42:06 -0800400 ret = write_to_log(log_id, vec, nr);
401 errno = save_errno;
402 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800403}
404
Tom Cherry2d9779e2019-02-08 11:46:19 -0800405int __android_log_write(int prio, const char* tag, const char* msg) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800406 return __android_log_buf_write(LOG_ID_MAIN, prio, tag, msg);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800407}
408
Tom Cherry2d9779e2019-02-08 11:46:19 -0800409int __android_log_buf_write(int bufID, int prio, const char* tag, const char* msg) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800410 struct iovec vec[3];
411 char tmp_tag[32];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800412
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800413 if (!tag) tag = "";
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800414
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800415 /* XXX: This needs to go! */
Yi Kongdd2ea5f2019-03-18 22:16:14 -0700416#pragma clang diagnostic push
417#pragma clang diagnostic ignored "-Wstring-plus-int"
Mark Salyzyn525b34d2017-03-28 09:49:53 -0700418 if (bufID != LOG_ID_RADIO) {
419 switch (tag[0]) {
420 case 'H':
421 if (strcmp(tag + 1, "HTC_RIL" + 1)) break;
422 goto inform;
423 case 'R':
424 /* Any log tag with "RIL" as the prefix */
425 if (strncmp(tag + 1, "RIL" + 1, strlen("RIL") - 1)) break;
426 goto inform;
427 case 'Q':
428 /* Any log tag with "QC_RIL" as the prefix */
429 if (strncmp(tag + 1, "QC_RIL" + 1, strlen("QC_RIL") - 1)) break;
430 goto inform;
431 case 'I':
432 /* Any log tag with "IMS" as the prefix */
433 if (strncmp(tag + 1, "IMS" + 1, strlen("IMS") - 1)) break;
434 goto inform;
435 case 'A':
436 if (strcmp(tag + 1, "AT" + 1)) break;
437 goto inform;
438 case 'G':
439 if (strcmp(tag + 1, "GSM" + 1)) break;
440 goto inform;
441 case 'S':
442 if (strcmp(tag + 1, "STK" + 1) && strcmp(tag + 1, "SMS" + 1)) break;
443 goto inform;
444 case 'C':
445 if (strcmp(tag + 1, "CDMA" + 1)) break;
446 goto inform;
447 case 'P':
448 if (strcmp(tag + 1, "PHONE" + 1)) break;
449 /* FALLTHRU */
450 inform:
451 bufID = LOG_ID_RADIO;
452 snprintf(tmp_tag, sizeof(tmp_tag), "use-Rlog/RLOG-%s", tag);
453 tag = tmp_tag;
Tom Cherry71ba1642019-01-10 10:37:36 -0800454 [[fallthrough]];
Mark Salyzyn525b34d2017-03-28 09:49:53 -0700455 default:
456 break;
457 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800458 }
Yi Kongdd2ea5f2019-03-18 22:16:14 -0700459#pragma clang diagnostic pop
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800460
461#if __BIONIC__
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800462 if (prio == ANDROID_LOG_FATAL) {
463 android_set_abort_message(msg);
464 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800465#endif
466
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800467 vec[0].iov_base = (unsigned char*)&prio;
468 vec[0].iov_len = 1;
469 vec[1].iov_base = (void*)tag;
470 vec[1].iov_len = strlen(tag) + 1;
471 vec[2].iov_base = (void*)msg;
472 vec[2].iov_len = strlen(msg) + 1;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800473
Tom Cherry71ba1642019-01-10 10:37:36 -0800474 return write_to_log(static_cast<log_id_t>(bufID), vec, 3);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800475}
476
Tom Cherry2d9779e2019-02-08 11:46:19 -0800477int __android_log_vprint(int prio, const char* tag, const char* fmt, va_list ap) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800478 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800479
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800480 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800481
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800482 return __android_log_write(prio, tag, buf);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800483}
484
Tom Cherry2d9779e2019-02-08 11:46:19 -0800485int __android_log_print(int prio, const char* tag, const char* fmt, ...) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800486 va_list ap;
487 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800488
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800489 va_start(ap, fmt);
490 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
491 va_end(ap);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800492
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800493 return __android_log_write(prio, tag, buf);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800494}
495
Tom Cherry2d9779e2019-02-08 11:46:19 -0800496int __android_log_buf_print(int bufID, int prio, const char* tag, const char* fmt, ...) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800497 va_list ap;
498 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800499
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800500 va_start(ap, fmt);
501 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
502 va_end(ap);
503
504 return __android_log_buf_write(bufID, prio, tag, buf);
505}
506
Tom Cherry2d9779e2019-02-08 11:46:19 -0800507void __android_log_assert(const char* cond, const char* tag, const char* fmt, ...) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800508 char buf[LOG_BUF_SIZE];
509
510 if (fmt) {
511 va_list ap;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800512 va_start(ap, fmt);
513 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
514 va_end(ap);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800515 } else {
516 /* Msg not provided, log condition. N.B. Do not use cond directly as
517 * format string as it could contain spurious '%' syntax (e.g.
518 * "%d" in "blocks%devs == 0").
519 */
520 if (cond)
521 snprintf(buf, LOG_BUF_SIZE, "Assertion failed: %s", cond);
522 else
523 strcpy(buf, "Unspecified assertion failed");
524 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800525
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800526 // Log assertion failures to stderr for the benefit of "adb shell" users
527 // and gtests (http://b/23675822).
Tom Cherry6f6ef392019-01-16 14:17:08 -0800528 TEMP_FAILURE_RETRY(write(2, buf, strlen(buf)));
529 TEMP_FAILURE_RETRY(write(2, "\n", 1));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800530
531 __android_log_write(ANDROID_LOG_FATAL, tag, buf);
532 abort(); /* abort so we have a chance to debug the situation */
533 /* NOTREACHED */
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800534}
535
Tom Cherry2d9779e2019-02-08 11:46:19 -0800536int __android_log_bwrite(int32_t tag, const void* payload, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800537 struct iovec vec[2];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800538
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800539 vec[0].iov_base = &tag;
540 vec[0].iov_len = sizeof(tag);
541 vec[1].iov_base = (void*)payload;
542 vec[1].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800543
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800544 return write_to_log(LOG_ID_EVENTS, vec, 2);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800545}
546
Tom Cherry2d9779e2019-02-08 11:46:19 -0800547int __android_log_stats_bwrite(int32_t tag, const void* payload, size_t len) {
Stefan Lafon701a0652017-08-24 20:14:06 -0700548 struct iovec vec[2];
549
550 vec[0].iov_base = &tag;
551 vec[0].iov_len = sizeof(tag);
552 vec[1].iov_base = (void*)payload;
553 vec[1].iov_len = len;
554
555 return write_to_log(LOG_ID_STATS, vec, 2);
556}
557
Tom Cherry2d9779e2019-02-08 11:46:19 -0800558int __android_log_security_bwrite(int32_t tag, const void* payload, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800559 struct iovec vec[2];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800560
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800561 vec[0].iov_base = &tag;
562 vec[0].iov_len = sizeof(tag);
563 vec[1].iov_base = (void*)payload;
564 vec[1].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800565
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800566 return write_to_log(LOG_ID_SECURITY, vec, 2);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800567}
568
569/*
570 * Like __android_log_bwrite, but takes the type as well. Doesn't work
571 * for the general case where we're generating lists of stuff, but very
572 * handy if we just want to dump an integer into the log.
573 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800574int __android_log_btwrite(int32_t tag, char type, const void* payload, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800575 struct iovec vec[3];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800576
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800577 vec[0].iov_base = &tag;
578 vec[0].iov_len = sizeof(tag);
579 vec[1].iov_base = &type;
580 vec[1].iov_len = sizeof(type);
581 vec[2].iov_base = (void*)payload;
582 vec[2].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800583
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800584 return write_to_log(LOG_ID_EVENTS, vec, 3);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800585}
586
587/*
588 * Like __android_log_bwrite, but used for writing strings to the
589 * event log.
590 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800591int __android_log_bswrite(int32_t tag, const char* payload) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800592 struct iovec vec[4];
593 char type = EVENT_TYPE_STRING;
594 uint32_t len = strlen(payload);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800595
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800596 vec[0].iov_base = &tag;
597 vec[0].iov_len = sizeof(tag);
598 vec[1].iov_base = &type;
599 vec[1].iov_len = sizeof(type);
600 vec[2].iov_base = &len;
601 vec[2].iov_len = sizeof(len);
602 vec[3].iov_base = (void*)payload;
603 vec[3].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800604
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800605 return write_to_log(LOG_ID_EVENTS, vec, 4);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800606}
607
608/*
609 * Like __android_log_security_bwrite, but used for writing strings to the
610 * security log.
611 */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800612int __android_log_security_bswrite(int32_t tag, const char* payload) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800613 struct iovec vec[4];
614 char type = EVENT_TYPE_STRING;
615 uint32_t len = strlen(payload);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800616
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800617 vec[0].iov_base = &tag;
618 vec[0].iov_len = sizeof(tag);
619 vec[1].iov_base = &type;
620 vec[1].iov_len = sizeof(type);
621 vec[2].iov_base = &len;
622 vec[2].iov_len = sizeof(len);
623 vec[3].iov_base = (void*)payload;
624 vec[3].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800625
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800626 return write_to_log(LOG_ID_SECURITY, vec, 4);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800627}
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800628
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800629static int __write_to_log_null(log_id_t log_id, struct iovec* vec, size_t nr) {
630 size_t len, i;
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800631
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800632 if ((log_id < LOG_ID_MIN) || (log_id >= LOG_ID_MAX)) {
633 return -EINVAL;
634 }
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800635
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800636 for (len = i = 0; i < nr; ++i) {
637 len += vec[i].iov_len;
638 }
639 if (!len) {
640 return -EINVAL;
641 }
642 return len;
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800643}
644
645/* Following functions need access to our internal write_to_log status */
646
Tom Cherry2d9779e2019-02-08 11:46:19 -0800647int __android_log_transport;
Mark Salyzyn71002882016-03-08 16:18:26 -0800648
Tom Cherry2d9779e2019-02-08 11:46:19 -0800649int android_set_log_transport(int transport_flag) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800650 int retval;
Mark Salyzyn71002882016-03-08 16:18:26 -0800651
Mark Salyzyn81321a72017-03-09 07:28:29 -0800652 if (transport_flag < 0) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800653 return -EINVAL;
654 }
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800655
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800656 retval = LOGGER_NULL;
Mark Salyzyn71002882016-03-08 16:18:26 -0800657
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800658 __android_log_lock();
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800659
Mark Salyzyn81321a72017-03-09 07:28:29 -0800660 if (transport_flag & LOGGER_NULL) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800661 write_to_log = __write_to_log_null;
Mark Salyzyn71002882016-03-08 16:18:26 -0800662
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800663 __android_log_unlock();
664
Mark Salyzyn71002882016-03-08 16:18:26 -0800665 return retval;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800666 }
667
Tom Cherryd1febd32019-01-09 13:35:43 -0800668 __android_log_transport &= LOGGER_LOGD | LOGGER_STDERR;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800669
Tom Cherryd1febd32019-01-09 13:35:43 -0800670 transport_flag &= LOGGER_LOGD | LOGGER_STDERR;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800671
Mark Salyzyn81321a72017-03-09 07:28:29 -0800672 if (__android_log_transport != transport_flag) {
673 __android_log_transport = transport_flag;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800674 __android_log_config_write_close();
675 __android_log_config_read_close();
676
677 write_to_log = __write_to_log_init;
678 /* generically we only expect these two values for write_to_log */
Tom Cherry71ba1642019-01-10 10:37:36 -0800679 } else if ((write_to_log != __write_to_log_init) && (write_to_log != __write_to_log_daemon)) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800680 write_to_log = __write_to_log_init;
681 }
682
Mark Salyzyn81321a72017-03-09 07:28:29 -0800683 retval = __android_log_transport;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800684
685 __android_log_unlock();
686
687 return retval;
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800688}
689
Tom Cherry2d9779e2019-02-08 11:46:19 -0800690int android_get_log_transport() {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800691 int ret = LOGGER_DEFAULT;
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800692
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800693 __android_log_lock();
694 if (write_to_log == __write_to_log_null) {
695 ret = LOGGER_NULL;
696 } else {
Tom Cherryd1febd32019-01-09 13:35:43 -0800697 __android_log_transport &= LOGGER_LOGD | LOGGER_STDERR;
Mark Salyzyn81321a72017-03-09 07:28:29 -0800698 ret = __android_log_transport;
Tom Cherry71ba1642019-01-10 10:37:36 -0800699 if ((write_to_log != __write_to_log_init) && (write_to_log != __write_to_log_daemon)) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800700 ret = -EINVAL;
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800701 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800702 }
703 __android_log_unlock();
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800704
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800705 return ret;
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800706}