blob: bf0e4fe1f657e0b6a73354536a145ed0b8b00ae5 [file] [log] [blame]
Mark Salyzyn018a96d2016-03-01 13:45:42 -08001/*
2 * Copyright (C) 2007-2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Mark Salyzyn864e8e82016-03-14 14:15:50 -070017#include <ctype.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080018#include <errno.h>
19#include <fcntl.h>
20#include <stdbool.h>
Mark Salyzyn864e8e82016-03-14 14:15:50 -070021#include <stdlib.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080022#include <string.h>
23#include <sys/types.h>
24
25#include <private/android_filesystem_config.h>
26#include <private/android_logger.h>
27
28#include "config_read.h"
29#include "logger.h"
30
31static int pmsgAvailable(log_id_t logId);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080032static int pmsgVersion(struct android_log_logger* logger,
33 struct android_log_transport_context* transp);
34static int pmsgRead(struct android_log_logger_list* logger_list,
35 struct android_log_transport_context* transp,
36 struct log_msg* log_msg);
37static void pmsgClose(struct android_log_logger_list* logger_list,
38 struct android_log_transport_context* transp);
39static int pmsgClear(struct android_log_logger* logger,
40 struct android_log_transport_context* transp);
Mark Salyzyn018a96d2016-03-01 13:45:42 -080041
42LIBLOG_HIDDEN struct android_log_transport_read pmsgLoggerRead = {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080043 .node = { &pmsgLoggerRead.node, &pmsgLoggerRead.node },
44 .name = "pmsg",
45 .available = pmsgAvailable,
46 .version = pmsgVersion,
47 .read = pmsgRead,
48 .poll = NULL,
49 .close = pmsgClose,
50 .clear = pmsgClear,
51 .setSize = NULL,
52 .getSize = NULL,
53 .getReadableSize = NULL,
54 .getPrune = NULL,
55 .setPrune = NULL,
56 .getStats = NULL,
Mark Salyzyn018a96d2016-03-01 13:45:42 -080057};
58
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080059static int pmsgAvailable(log_id_t logId) {
60 if (logId > LOG_ID_SECURITY) {
61 return -EINVAL;
62 }
63 if (access("/dev/pmsg0", W_OK) == 0) {
64 return 0;
65 }
66 return -EBADF;
Mark Salyzyn018a96d2016-03-01 13:45:42 -080067}
68
69/* Determine the credentials of the caller */
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080070static bool uid_has_log_permission(uid_t uid) {
71 return (uid == AID_SYSTEM) || (uid == AID_LOG) || (uid == AID_ROOT) ||
72 (uid == AID_LOGD);
Mark Salyzyn018a96d2016-03-01 13:45:42 -080073}
74
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080075static uid_t get_best_effective_uid() {
76 uid_t euid;
77 uid_t uid;
78 gid_t gid;
79 ssize_t i;
80 static uid_t last_uid = (uid_t)-1;
Mark Salyzyn018a96d2016-03-01 13:45:42 -080081
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080082 if (last_uid != (uid_t)-1) {
83 return last_uid;
84 }
85 uid = __android_log_uid();
86 if (uid_has_log_permission(uid)) {
Mark Salyzyn018a96d2016-03-01 13:45:42 -080087 return last_uid = uid;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080088 }
89 euid = geteuid();
90 if (uid_has_log_permission(euid)) {
91 return last_uid = euid;
92 }
93 gid = getgid();
94 if (uid_has_log_permission(gid)) {
95 return last_uid = gid;
96 }
97 gid = getegid();
98 if (uid_has_log_permission(gid)) {
99 return last_uid = gid;
100 }
101 i = getgroups((size_t)0, NULL);
102 if (i > 0) {
103 gid_t list[i];
104
105 getgroups(i, list);
106 while (--i >= 0) {
107 if (uid_has_log_permission(list[i])) {
108 return last_uid = list[i];
109 }
110 }
111 }
112 return last_uid = uid;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800113}
114
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800115static int pmsgClear(struct android_log_logger* logger __unused,
116 struct android_log_transport_context* transp __unused) {
117 if (uid_has_log_permission(get_best_effective_uid())) {
118 return unlink("/sys/fs/pstore/pmsg-ramoops-0");
119 }
120 errno = EPERM;
121 return -1;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800122}
123
124/*
125 * returns the logger version
126 */
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800127static int pmsgVersion(struct android_log_logger* logger __unused,
128 struct android_log_transport_context* transp __unused) {
129 return 4;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800130}
131
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800132static int pmsgRead(struct android_log_logger_list* logger_list,
133 struct android_log_transport_context* transp,
134 struct log_msg* log_msg) {
135 ssize_t ret;
136 off_t current, next;
137 uid_t uid;
138 struct android_log_logger* logger;
139 struct __attribute__((__packed__)) {
140 android_pmsg_log_header_t p;
141 android_log_header_t l;
142 uint8_t prio;
143 } buf;
144 static uint8_t preread_count;
145 bool is_system;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800146
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800147 memset(log_msg, 0, sizeof(*log_msg));
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800148
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800149 if (atomic_load(&transp->context.fd) <= 0) {
150 int i, fd = open("/sys/fs/pstore/pmsg-ramoops-0", O_RDONLY | O_CLOEXEC);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800151
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800152 if (fd < 0) {
153 return -errno;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800154 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800155 if (fd == 0) { /* Argggg */
156 fd = open("/sys/fs/pstore/pmsg-ramoops-0", O_RDONLY | O_CLOEXEC);
157 close(0);
158 if (fd < 0) {
159 return -errno;
160 }
161 }
162 i = atomic_exchange(&transp->context.fd, fd);
163 if ((i > 0) && (i != fd)) {
164 close(i);
165 }
166 preread_count = 0;
167 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800168
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800169 while (1) {
170 int fd;
Mark Salyzyndb8a2662016-10-10 07:27:42 -0700171
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800172 if (preread_count < sizeof(buf)) {
173 fd = atomic_load(&transp->context.fd);
174 if (fd <= 0) {
175 return -EBADF;
176 }
177 ret = TEMP_FAILURE_RETRY(
178 read(fd, &buf.p.magic + preread_count, sizeof(buf) - preread_count));
179 if (ret < 0) {
180 return -errno;
181 }
182 preread_count += ret;
183 }
184 if (preread_count != sizeof(buf)) {
185 return preread_count ? -EIO : -EAGAIN;
186 }
187 if ((buf.p.magic != LOGGER_MAGIC) || (buf.p.len <= sizeof(buf)) ||
188 (buf.p.len > (sizeof(buf) + LOGGER_ENTRY_MAX_PAYLOAD)) ||
189 (buf.l.id >= LOG_ID_MAX) || (buf.l.realtime.tv_nsec >= NS_PER_SEC) ||
190 ((buf.l.id != LOG_ID_EVENTS) && (buf.l.id != LOG_ID_SECURITY) &&
191 ((buf.prio == ANDROID_LOG_UNKNOWN) ||
192 (buf.prio == ANDROID_LOG_DEFAULT) ||
193 (buf.prio >= ANDROID_LOG_SILENT)))) {
194 do {
195 memmove(&buf.p.magic, &buf.p.magic + 1, --preread_count);
196 } while (preread_count && (buf.p.magic != LOGGER_MAGIC));
197 continue;
198 }
199 preread_count = 0;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800200
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800201 if ((transp->logMask & (1 << buf.l.id)) &&
202 ((!logger_list->start.tv_sec && !logger_list->start.tv_nsec) ||
203 ((logger_list->start.tv_sec <= buf.l.realtime.tv_sec) &&
204 ((logger_list->start.tv_sec != buf.l.realtime.tv_sec) ||
205 (logger_list->start.tv_nsec <= buf.l.realtime.tv_nsec)))) &&
206 (!logger_list->pid || (logger_list->pid == buf.p.pid))) {
207 uid = get_best_effective_uid();
208 is_system = uid_has_log_permission(uid);
209 if (is_system || (uid == buf.p.uid)) {
210 char* msg = is_system ? log_msg->entry_v4.msg : log_msg->entry_v3.msg;
211 *msg = buf.prio;
Mark Salyzyndb8a2662016-10-10 07:27:42 -0700212 fd = atomic_load(&transp->context.fd);
213 if (fd <= 0) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800214 return -EBADF;
Mark Salyzyndb8a2662016-10-10 07:27:42 -0700215 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800216 ret = TEMP_FAILURE_RETRY(
217 read(fd, msg + sizeof(buf.prio), buf.p.len - sizeof(buf)));
218 if (ret < 0) {
219 return -errno;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800220 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800221 if (ret != (ssize_t)(buf.p.len - sizeof(buf))) {
222 return -EIO;
Mark Salyzyndb8a2662016-10-10 07:27:42 -0700223 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800224
225 log_msg->entry_v4.len = buf.p.len - sizeof(buf) + sizeof(buf.prio);
226 log_msg->entry_v4.hdr_size =
227 is_system ? sizeof(log_msg->entry_v4) : sizeof(log_msg->entry_v3);
228 log_msg->entry_v4.pid = buf.p.pid;
229 log_msg->entry_v4.tid = buf.l.tid;
230 log_msg->entry_v4.sec = buf.l.realtime.tv_sec;
231 log_msg->entry_v4.nsec = buf.l.realtime.tv_nsec;
232 log_msg->entry_v4.lid = buf.l.id;
233 if (is_system) {
234 log_msg->entry_v4.uid = buf.p.uid;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800235 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800236
237 return ret + sizeof(buf.prio) + log_msg->entry_v4.hdr_size;
238 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800239 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800240
241 fd = atomic_load(&transp->context.fd);
242 if (fd <= 0) {
243 return -EBADF;
244 }
245 current = TEMP_FAILURE_RETRY(lseek(fd, (off_t)0, SEEK_CUR));
246 if (current < 0) {
247 return -errno;
248 }
249 fd = atomic_load(&transp->context.fd);
250 if (fd <= 0) {
251 return -EBADF;
252 }
253 next = TEMP_FAILURE_RETRY(
254 lseek(fd, (off_t)(buf.p.len - sizeof(buf)), SEEK_CUR));
255 if (next < 0) {
256 return -errno;
257 }
258 if ((next - current) != (ssize_t)(buf.p.len - sizeof(buf))) {
259 return -EIO;
260 }
261 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800262}
263
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800264static void pmsgClose(struct android_log_logger_list* logger_list __unused,
265 struct android_log_transport_context* transp) {
266 int fd = atomic_exchange(&transp->context.fd, 0);
267 if (fd > 0) {
268 close(fd);
269 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800270}
Mark Salyzyn864e8e82016-03-14 14:15:50 -0700271
George Burgess IV559387d2018-10-03 14:10:00 -0700272static void* realloc_or_free(void* ptr, size_t new_size) {
273 void* result = realloc(ptr, new_size);
274 if (!result) {
275 free(ptr);
276 }
277 return result;
278}
279
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800280LIBLOG_ABI_PRIVATE ssize_t
281__android_log_pmsg_file_read(log_id_t logId, char prio, const char* prefix,
282 __android_log_pmsg_file_read_fn fn, void* arg) {
283 ssize_t ret;
284 struct android_log_logger_list logger_list;
285 struct android_log_transport_context transp;
286 struct content {
287 struct listnode node;
288 union {
289 struct logger_entry_v4 entry;
290 struct logger_entry_v4 entry_v4;
291 struct logger_entry_v3 entry_v3;
292 struct logger_entry_v2 entry_v2;
293 struct logger_entry entry_v1;
294 };
295 } * content;
296 struct names {
297 struct listnode node;
298 struct listnode content;
299 log_id_t id;
300 char prio;
301 char name[];
302 } * names;
303 struct listnode name_list;
304 struct listnode *node, *n;
305 size_t len, prefix_len;
Mark Salyzyn864e8e82016-03-14 14:15:50 -0700306
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800307 if (!fn) {
308 return -EINVAL;
309 }
310
311 /* Add just enough clues in logger_list and transp to make API function */
312 memset(&logger_list, 0, sizeof(logger_list));
313 memset(&transp, 0, sizeof(transp));
314
315 logger_list.mode =
316 ANDROID_LOG_PSTORE | ANDROID_LOG_NONBLOCK | ANDROID_LOG_RDONLY;
317 transp.logMask = (unsigned)-1;
318 if (logId != LOG_ID_ANY) {
319 transp.logMask = (1 << logId);
320 }
321 transp.logMask &=
322 ~((1 << LOG_ID_KERNEL) | (1 << LOG_ID_EVENTS) | (1 << LOG_ID_SECURITY));
323 if (!transp.logMask) {
324 return -EINVAL;
325 }
326
327 /* Initialize name list */
328 list_init(&name_list);
329
330 ret = SSIZE_MAX;
331
332 /* Validate incoming prefix, shift until it contains only 0 or 1 : or / */
333 prefix_len = 0;
334 if (prefix) {
335 const char *prev = NULL, *last = NULL, *cp = prefix;
336 while ((cp = strpbrk(cp, "/:"))) {
337 prev = last;
338 last = cp;
339 cp = cp + 1;
340 }
341 if (prev) {
342 prefix = prev + 1;
343 }
344 prefix_len = strlen(prefix);
345 }
346
347 /* Read the file content */
348 while (pmsgRead(&logger_list, &transp, &transp.logMsg) > 0) {
349 char* cp;
350 size_t hdr_size = transp.logMsg.entry.hdr_size
351 ? transp.logMsg.entry.hdr_size
352 : sizeof(transp.logMsg.entry_v1);
353 char* msg = (char*)&transp.logMsg + hdr_size;
354 char* split = NULL;
355
356 if ((hdr_size < sizeof(transp.logMsg.entry_v1)) ||
357 (hdr_size > sizeof(transp.logMsg.entry))) {
358 continue;
359 }
360 /* Check for invalid sequence number */
361 if ((transp.logMsg.entry.nsec % ANDROID_LOG_PMSG_FILE_SEQUENCE) ||
362 ((transp.logMsg.entry.nsec / ANDROID_LOG_PMSG_FILE_SEQUENCE) >=
363 ANDROID_LOG_PMSG_FILE_MAX_SEQUENCE)) {
364 continue;
Mark Salyzyn864e8e82016-03-14 14:15:50 -0700365 }
366
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800367 /* Determine if it has <dirbase>:<filebase> format for tag */
368 len = transp.logMsg.entry.len - sizeof(prio);
369 for (cp = msg + sizeof(prio); *cp && isprint(*cp) && !isspace(*cp) && --len;
370 ++cp) {
371 if (*cp == ':') {
372 if (split) {
373 break;
374 }
375 split = cp;
376 }
Mark Salyzyn864e8e82016-03-14 14:15:50 -0700377 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800378 if (*cp || !split) {
379 continue;
Mark Salyzyn864e8e82016-03-14 14:15:50 -0700380 }
381
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800382 /* Filters */
383 if (prefix_len && strncmp(msg + sizeof(prio), prefix, prefix_len)) {
384 size_t offset;
385 /*
386 * Allow : to be a synonym for /
387 * Things we do dealing with const char * and do not alloc
388 */
389 split = strchr(prefix, ':');
390 if (split) {
391 continue;
392 }
393 split = strchr(prefix, '/');
394 if (!split) {
395 continue;
396 }
397 offset = split - prefix;
398 if ((msg[offset + sizeof(prio)] != ':') ||
399 strncmp(msg + sizeof(prio), prefix, offset)) {
400 continue;
401 }
402 ++offset;
403 if ((prefix_len > offset) && strncmp(&msg[offset + sizeof(prio)],
404 split + 1, prefix_len - offset)) {
405 continue;
406 }
Mark Salyzyn864e8e82016-03-14 14:15:50 -0700407 }
408
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800409 if ((prio != ANDROID_LOG_ANY) && (*msg < prio)) {
410 continue;
Mark Salyzyn864e8e82016-03-14 14:15:50 -0700411 }
Mark Salyzyn864e8e82016-03-14 14:15:50 -0700412
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800413 /* check if there is an existing entry */
414 list_for_each(node, &name_list) {
415 names = node_to_item(node, struct names, node);
416 if (!strcmp(names->name, msg + sizeof(prio)) &&
417 (names->id == transp.logMsg.entry.lid) && (names->prio == *msg)) {
418 break;
419 }
Mark Salyzyn864e8e82016-03-14 14:15:50 -0700420 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800421
422 /* We do not have an existing entry, create and add one */
423 if (node == &name_list) {
424 static const char numbers[] = "0123456789";
425 unsigned long long nl;
426
427 len = strlen(msg + sizeof(prio)) + 1;
428 names = calloc(1, sizeof(*names) + len);
429 if (!names) {
430 ret = -ENOMEM;
431 break;
432 }
433 strcpy(names->name, msg + sizeof(prio));
434 names->id = transp.logMsg.entry.lid;
435 names->prio = *msg;
436 list_init(&names->content);
437 /*
438 * Insert in reverse numeric _then_ alpha sorted order as
439 * representative of log rotation:
440 *
441 * log.10
442 * klog.10
443 * . . .
444 * log.2
445 * klog.2
446 * log.1
447 * klog.1
448 * log
449 * klog
450 *
451 * thus when we present the content, we are provided the oldest
452 * first, which when 'refreshed' could spill off the end of the
453 * pmsg FIFO but retaining the newest data for last with best
454 * chances to survive.
455 */
456 nl = 0;
457 cp = strpbrk(names->name, numbers);
458 if (cp) {
459 nl = strtoull(cp, NULL, 10);
460 }
461 list_for_each_reverse(node, &name_list) {
462 struct names* a_name = node_to_item(node, struct names, node);
463 const char* r = a_name->name;
464 int compare = 0;
465
466 unsigned long long nr = 0;
467 cp = strpbrk(r, numbers);
468 if (cp) {
469 nr = strtoull(cp, NULL, 10);
470 }
471 if (nr != nl) {
472 compare = (nl > nr) ? 1 : -1;
473 }
474 if (compare == 0) {
475 compare = strcmp(names->name, r);
476 }
477 if (compare <= 0) {
478 break;
479 }
480 }
481 list_add_head(node, &names->node);
482 }
483
484 /* Remove any file fragments that match our sequence number */
485 list_for_each_safe(node, n, &names->content) {
486 content = node_to_item(node, struct content, node);
487 if (transp.logMsg.entry.nsec == content->entry.nsec) {
488 list_remove(&content->node);
489 free(content);
490 }
491 }
492
493 /* Add content */
494 content =
495 calloc(1, sizeof(content->node) + hdr_size + transp.logMsg.entry.len);
496 if (!content) {
497 ret = -ENOMEM;
498 break;
499 }
500 memcpy(&content->entry, &transp.logMsg.entry,
501 hdr_size + transp.logMsg.entry.len);
502
503 /* Insert in sequence number sorted order, to ease reconstruction */
504 list_for_each_reverse(node, &names->content) {
505 if ((node_to_item(node, struct content, node))->entry.nsec <
506 transp.logMsg.entry.nsec) {
507 break;
508 }
509 }
510 list_add_head(node, &content->node);
511 }
512 pmsgClose(&logger_list, &transp);
513
514 /* Progress through all the collected files */
515 list_for_each_safe(node, n, &name_list) {
516 struct listnode *content_node, *m;
517 char* buf;
518 size_t sequence, tag_len;
519
520 names = node_to_item(node, struct names, node);
521
522 /* Construct content into a linear buffer */
523 buf = NULL;
524 len = 0;
525 sequence = 0;
526 tag_len = strlen(names->name) + sizeof(char); /* tag + nul */
527 list_for_each_safe(content_node, m, &names->content) {
528 ssize_t add_len;
529
530 content = node_to_item(content_node, struct content, node);
531 add_len = content->entry.len - tag_len - sizeof(prio);
532 if (add_len <= 0) {
533 list_remove(content_node);
534 free(content);
535 continue;
536 }
537
538 if (!buf) {
539 buf = malloc(sizeof(char));
540 if (!buf) {
541 ret = -ENOMEM;
542 list_remove(content_node);
543 free(content);
544 continue;
545 }
546 *buf = '\0';
547 }
548
549 /* Missing sequence numbers */
550 while (sequence < content->entry.nsec) {
551 /* plus space for enforced nul */
George Burgess IV559387d2018-10-03 14:10:00 -0700552 buf = realloc_or_free(buf, len + sizeof(char) + sizeof(char));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800553 if (!buf) {
554 break;
555 }
556 buf[len] = '\f'; /* Mark missing content with a form feed */
557 buf[++len] = '\0';
558 sequence += ANDROID_LOG_PMSG_FILE_SEQUENCE;
559 }
560 if (!buf) {
561 ret = -ENOMEM;
562 list_remove(content_node);
563 free(content);
564 continue;
565 }
566 /* plus space for enforced nul */
George Burgess IV559387d2018-10-03 14:10:00 -0700567 buf = realloc_or_free(buf, len + add_len + sizeof(char));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800568 if (!buf) {
569 ret = -ENOMEM;
570 list_remove(content_node);
571 free(content);
572 continue;
573 }
574 memcpy(buf + len,
575 (char*)&content->entry + content->entry.hdr_size + tag_len +
576 sizeof(prio),
577 add_len);
578 len += add_len;
579 buf[len] = '\0'; /* enforce trailing hidden nul */
580 sequence = content->entry.nsec + ANDROID_LOG_PMSG_FILE_SEQUENCE;
581
582 list_remove(content_node);
583 free(content);
584 }
585 if (buf) {
586 if (len) {
587 /* Buffer contains enforced trailing nul just beyond length */
588 ssize_t r;
589 *strchr(names->name, ':') = '/'; /* Convert back to filename */
590 r = (*fn)(names->id, names->prio, names->name, buf, len, arg);
591 if ((ret >= 0) && (r > 0)) {
592 if (ret == SSIZE_MAX) {
593 ret = r;
594 } else {
595 ret += r;
596 }
597 } else if (r < ret) {
598 ret = r;
599 }
600 }
601 free(buf);
602 }
603 list_remove(node);
604 free(names);
605 }
606 return (ret == SSIZE_MAX) ? -ENOENT : ret;
Mark Salyzyn864e8e82016-03-14 14:15:50 -0700607}