blob: 54980d9fea993c4f0ca33f82975a3bc513507e19 [file] [log] [blame]
Mark Salyzyn018a96d2016-03-01 13:45:42 -08001/*
2 * Copyright (C) 2007-2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17/*
18 * pmsg write handler
19 */
20
21#include <errno.h>
22#include <fcntl.h>
23#include <stdlib.h>
24#include <string.h>
25#include <sys/types.h>
26#include <time.h>
27
Steven Moreland1f83aa42017-04-13 23:48:57 -070028#include <log/log_properties.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080029#include <private/android_filesystem_config.h>
30#include <private/android_logger.h>
31
Mark Salyzyn018a96d2016-03-01 13:45:42 -080032#include "log_portability.h"
33#include "logger.h"
Tom Cherry6f6ef392019-01-16 14:17:08 -080034#include "uio.h"
Mark Salyzyn018a96d2016-03-01 13:45:42 -080035
36static int pmsgOpen();
37static void pmsgClose();
38static int pmsgAvailable(log_id_t logId);
Tom Cherry71ba1642019-01-10 10:37:36 -080039static int pmsgWrite(log_id_t logId, struct timespec* ts, struct iovec* vec, size_t nr);
Mark Salyzyn018a96d2016-03-01 13:45:42 -080040
Tom Cherry2d9779e2019-02-08 11:46:19 -080041struct android_log_transport_write pmsgLoggerWrite = {
Tom Cherry71ba1642019-01-10 10:37:36 -080042 .name = "pmsg",
Tom Cherry2beabe52019-10-01 13:05:58 -070043 .logMask = 0,
44 .context.fd = -1,
Tom Cherry71ba1642019-01-10 10:37:36 -080045 .available = pmsgAvailable,
46 .open = pmsgOpen,
47 .close = pmsgClose,
48 .write = pmsgWrite,
Mark Salyzyn018a96d2016-03-01 13:45:42 -080049};
50
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080051static int pmsgOpen() {
52 int fd = atomic_load(&pmsgLoggerWrite.context.fd);
53 if (fd < 0) {
54 int i;
Mark Salyzyndb8a2662016-10-10 07:27:42 -070055
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080056 fd = TEMP_FAILURE_RETRY(open("/dev/pmsg0", O_WRONLY | O_CLOEXEC));
57 i = atomic_exchange(&pmsgLoggerWrite.context.fd, fd);
58 if ((i >= 0) && (i != fd)) {
59 close(i);
Mark Salyzyn018a96d2016-03-01 13:45:42 -080060 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080061 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -080062
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080063 return fd;
Mark Salyzyn018a96d2016-03-01 13:45:42 -080064}
65
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080066static void pmsgClose() {
67 int fd = atomic_exchange(&pmsgLoggerWrite.context.fd, -1);
68 if (fd >= 0) {
69 close(fd);
70 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -080071}
72
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080073static int pmsgAvailable(log_id_t logId) {
74 if (logId > LOG_ID_SECURITY) {
75 return -EINVAL;
76 }
Tom Cherry71ba1642019-01-10 10:37:36 -080077 if ((logId != LOG_ID_SECURITY) && (logId != LOG_ID_EVENTS) && !__android_log_is_debuggable()) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080078 return -EINVAL;
79 }
80 if (atomic_load(&pmsgLoggerWrite.context.fd) < 0) {
81 if (access("/dev/pmsg0", W_OK) == 0) {
82 return 0;
Mark Salyzyn018a96d2016-03-01 13:45:42 -080083 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080084 return -EBADF;
85 }
86 return 1;
Mark Salyzyn018a96d2016-03-01 13:45:42 -080087}
88
Tom Cherry71ba1642019-01-10 10:37:36 -080089static int pmsgWrite(log_id_t logId, struct timespec* ts, struct iovec* vec, size_t nr) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080090 static const unsigned headerLength = 2;
91 struct iovec newVec[nr + headerLength];
92 android_log_header_t header;
93 android_pmsg_log_header_t pmsgHeader;
94 size_t i, payloadSize;
95 ssize_t ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -080096
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080097 if ((logId == LOG_ID_EVENTS) && !__android_log_is_debuggable()) {
98 if (vec[0].iov_len < 4) {
99 return -EINVAL;
Mark Salyzyn7ef52492016-03-25 15:50:46 -0700100 }
101
Tom Cherryd1ad8952019-10-01 16:24:55 -0700102 if (SNET_EVENT_LOG_TAG != *static_cast<uint32_t*>(vec[0].iov_base)) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800103 return -EPERM;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800104 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800105 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800106
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800107 if (atomic_load(&pmsgLoggerWrite.context.fd) < 0) {
108 return -EBADF;
109 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800110
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800111 /*
112 * struct {
113 * // what we provide to pstore
114 * android_pmsg_log_header_t pmsgHeader;
115 * // what we provide to file
116 * android_log_header_t header;
117 * // caller provides
118 * union {
119 * struct {
120 * char prio;
121 * char payload[];
122 * } string;
123 * struct {
124 * uint32_t tag
125 * char payload[];
126 * } binary;
127 * };
128 * };
129 */
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800130
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800131 pmsgHeader.magic = LOGGER_MAGIC;
132 pmsgHeader.len = sizeof(pmsgHeader) + sizeof(header);
133 pmsgHeader.uid = __android_log_uid();
134 pmsgHeader.pid = getpid();
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800135
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800136 header.id = logId;
137 header.tid = gettid();
138 header.realtime.tv_sec = ts->tv_sec;
139 header.realtime.tv_nsec = ts->tv_nsec;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800140
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800141 newVec[0].iov_base = (unsigned char*)&pmsgHeader;
142 newVec[0].iov_len = sizeof(pmsgHeader);
143 newVec[1].iov_base = (unsigned char*)&header;
144 newVec[1].iov_len = sizeof(header);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800145
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800146 for (payloadSize = 0, i = headerLength; i < nr + headerLength; i++) {
147 newVec[i].iov_base = vec[i - headerLength].iov_base;
148 payloadSize += newVec[i].iov_len = vec[i - headerLength].iov_len;
149
150 if (payloadSize > LOGGER_ENTRY_MAX_PAYLOAD) {
151 newVec[i].iov_len -= payloadSize - LOGGER_ENTRY_MAX_PAYLOAD;
152 if (newVec[i].iov_len) {
153 ++i;
154 }
155 payloadSize = LOGGER_ENTRY_MAX_PAYLOAD;
156 break;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800157 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800158 }
159 pmsgHeader.len += payloadSize;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800160
Tom Cherry71ba1642019-01-10 10:37:36 -0800161 ret = TEMP_FAILURE_RETRY(writev(atomic_load(&pmsgLoggerWrite.context.fd), newVec, i));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800162 if (ret < 0) {
163 ret = errno ? -errno : -ENOTCONN;
164 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800165
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800166 if (ret > (ssize_t)(sizeof(header) + sizeof(pmsgHeader))) {
167 ret -= sizeof(header) - sizeof(pmsgHeader);
168 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800169
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800170 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800171}
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800172
173/*
174 * Virtual pmsg filesystem
175 *
176 * Payload will comprise the string "<basedir>:<basefile>\0<content>" to a
177 * maximum of LOGGER_ENTRY_MAX_PAYLOAD, but scaled to the last newline in the
178 * file.
179 *
180 * Will hijack the header.realtime.tv_nsec field for a sequence number in usec.
181 */
182
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800183static inline const char* strnrchr(const char* buf, size_t len, char c) {
184 const char* cp = buf + len;
185 while ((--cp > buf) && (*cp != c))
186 ;
187 if (cp <= buf) {
188 return buf + len;
189 }
190 return cp;
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800191}
192
193/* Write a buffer as filename references (tag = <basedir>:<basename>) */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800194ssize_t __android_log_pmsg_file_write(log_id_t logId, char prio, const char* filename,
195 const char* buf, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800196 bool weOpened;
197 size_t length, packet_len;
198 const char* tag;
199 char *cp, *slash;
200 struct timespec ts;
201 struct iovec vec[3];
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800202
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800203 /* Make sure the logId value is not a bad idea */
204 if ((logId == LOG_ID_KERNEL) || /* Verbotten */
205 (logId == LOG_ID_EVENTS) || /* Do not support binary content */
206 (logId == LOG_ID_SECURITY) || /* Bad idea to allow */
207 ((unsigned)logId >= 32)) { /* fit within logMask on arch32 */
208 return -EINVAL;
209 }
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800210
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800211 clock_gettime(android_log_clockid(), &ts);
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800212
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800213 cp = strdup(filename);
214 if (!cp) {
215 return -ENOMEM;
216 }
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800217
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800218 tag = cp;
219 slash = strrchr(cp, '/');
220 if (slash) {
221 *slash = ':';
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800222 slash = strrchr(cp, '/');
223 if (slash) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800224 tag = slash + 1;
225 }
226 }
227
228 length = strlen(tag) + 1;
229 packet_len = LOGGER_ENTRY_MAX_PAYLOAD - sizeof(char) - length;
230
231 vec[0].iov_base = &prio;
232 vec[0].iov_len = sizeof(char);
233 vec[1].iov_base = (unsigned char*)tag;
234 vec[1].iov_len = length;
235
236 weOpened = false;
Tom Cherry71ba1642019-01-10 10:37:36 -0800237 for (ts.tv_nsec = 0, length = len; length; ts.tv_nsec += ANDROID_LOG_PMSG_FILE_SEQUENCE) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800238 ssize_t ret;
239 size_t transfer;
240
Tom Cherry71ba1642019-01-10 10:37:36 -0800241 if ((ts.tv_nsec / ANDROID_LOG_PMSG_FILE_SEQUENCE) >= ANDROID_LOG_PMSG_FILE_MAX_SEQUENCE) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800242 len -= length;
243 break;
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800244 }
245
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800246 transfer = length;
247 if (transfer > packet_len) {
248 transfer = strnrchr(buf, packet_len - 1, '\n') - buf;
249 if ((transfer < length) && (buf[transfer] == '\n')) {
250 ++transfer;
251 }
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800252 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800253
254 vec[2].iov_base = (unsigned char*)buf;
255 vec[2].iov_len = transfer;
256
257 if (atomic_load(&pmsgLoggerWrite.context.fd) < 0) {
258 if (!weOpened) { /* Impossible for weOpened = true here */
259 __android_log_lock();
260 }
261 weOpened = atomic_load(&pmsgLoggerWrite.context.fd) < 0;
262 if (!weOpened) {
263 __android_log_unlock();
264 } else if (pmsgOpen() < 0) {
265 __android_log_unlock();
266 free(cp);
267 return -EBADF;
268 }
269 }
270
271 ret = pmsgWrite(logId, &ts, vec, sizeof(vec) / sizeof(vec[0]));
272
273 if (ret <= 0) {
274 if (weOpened) {
Mark Salyzyndb8a2662016-10-10 07:27:42 -0700275 pmsgClose();
276 __android_log_unlock();
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800277 }
278 free(cp);
279 return ret ? ret : (len - length);
Mark Salyzyndb8a2662016-10-10 07:27:42 -0700280 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800281 length -= transfer;
282 buf += transfer;
283 }
284 if (weOpened) {
285 pmsgClose();
286 __android_log_unlock();
287 }
288 free(cp);
289 return len;
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800290}