blob: eb44b2942f82140844786aac5aeb9e5d68eb0a1a [file] [log] [blame]
Mark Salyzyn42958412013-11-22 10:50:27 -08001/*
Mark Salyzynd0a83fd2014-01-09 07:45:30 -08002** Copyright 2013-2014, The Android Open Source Project
Mark Salyzyn42958412013-11-22 10:50:27 -08003**
4** Licensed under the Apache License, Version 2.0 (the "License");
5** you may not use this file except in compliance with the License.
6** You may obtain a copy of the License at
7**
8** http://www.apache.org/licenses/LICENSE-2.0
9**
10** Unless required by applicable law or agreed to in writing, software
11** distributed under the License is distributed on an "AS IS" BASIS,
12** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13** See the License for the specific language governing permissions and
14** limitations under the License.
15*/
16
Mark Salyzyn42958412013-11-22 10:50:27 -080017#include <errno.h>
18#include <fcntl.h>
Mark Salyzynfa3716b2014-02-14 16:05:05 -080019#include <inttypes.h>
Mark Salyzyn696817d2014-04-18 14:49:28 -070020#include <poll.h>
Mark Salyzyn154f4602014-02-20 14:59:07 -080021#include <signal.h>
Mark Salyzyn6eef4172014-12-15 09:51:39 -080022#include <stdbool.h>
Mark Salyzyn154f4602014-02-20 14:59:07 -080023#include <stddef.h>
24#define NOMINMAX /* for windows to suppress definition of min in stdlib.h */
Mark Salyzyn42958412013-11-22 10:50:27 -080025#include <stdlib.h>
Mark Salyzyn154f4602014-02-20 14:59:07 -080026#include <string.h>
Mark Salyzyna04464a2014-04-30 08:50:53 -070027#include <sys/cdefs.h>
Mark Salyzyn154f4602014-02-20 14:59:07 -080028#include <unistd.h>
29
Mark Salyzyn42958412013-11-22 10:50:27 -080030#include <cutils/list.h>
Mark Salyzyn154f4602014-02-20 14:59:07 -080031#include <cutils/sockets.h>
Mark Salyzyn42958412013-11-22 10:50:27 -080032#include <log/log.h>
33#include <log/logger.h>
Mark Salyzyn6eef4172014-12-15 09:51:39 -080034#include <private/android_filesystem_config.h>
35#include <private/android_logger.h>
Mark Salyzyn42958412013-11-22 10:50:27 -080036
Mark Salyzyn154f4602014-02-20 14:59:07 -080037/* branchless on many architectures. */
38#define min(x,y) ((y) ^ (((x) ^ (y)) & -((x) < (y))))
Mark Salyzyn1345f382014-01-14 08:41:27 -080039
Elliott Hughesadbf4422015-07-29 17:45:24 -070040#if defined(_WIN32)
Mark Salyzyn95687052014-10-02 11:12:28 -070041#define WEAK static
42#else
Mark Salyzyn154f4602014-02-20 14:59:07 -080043#define WEAK __attribute__((weak))
Mark Salyzyn95687052014-10-02 11:12:28 -070044#endif
Mark Salyzyna04464a2014-04-30 08:50:53 -070045#ifndef __unused
46#define __unused __attribute__((unused))
47#endif
Mark Salyzyn1345f382014-01-14 08:41:27 -080048
Mark Salyzyn154f4602014-02-20 14:59:07 -080049/* Private copy of ../libcutils/socket_local_client.c prevent library loops */
Mark Salyzyn1345f382014-01-14 08:41:27 -080050
Elliott Hughesadbf4422015-07-29 17:45:24 -070051#if defined(_WIN32)
Mark Salyzyn42958412013-11-22 10:50:27 -080052
Mark Salyzyn154f4602014-02-20 14:59:07 -080053int WEAK socket_local_client(const char *name, int namespaceId, int type)
54{
55 errno = ENOSYS;
56 return -ENOSYS;
57}
Mark Salyzyn42958412013-11-22 10:50:27 -080058
Elliott Hughesadbf4422015-07-29 17:45:24 -070059#else /* !_WIN32 */
Mark Salyzyn154f4602014-02-20 14:59:07 -080060
61#include <sys/socket.h>
62#include <sys/un.h>
63#include <sys/select.h>
64#include <sys/types.h>
65
66/* Private copy of ../libcutils/socket_local.h prevent library loops */
67#define FILESYSTEM_SOCKET_PREFIX "/tmp/"
68#define ANDROID_RESERVED_SOCKET_PREFIX "/dev/socket/"
69/* End of ../libcutils/socket_local.h */
70
71#define LISTEN_BACKLOG 4
72
73/* Documented in header file. */
74int WEAK socket_make_sockaddr_un(const char *name, int namespaceId,
75 struct sockaddr_un *p_addr, socklen_t *alen)
76{
77 memset (p_addr, 0, sizeof (*p_addr));
78 size_t namelen;
79
80 switch (namespaceId) {
81 case ANDROID_SOCKET_NAMESPACE_ABSTRACT:
Elliott Hughes9768d242014-11-21 22:50:20 -080082#if defined(__linux__)
Mark Salyzyn154f4602014-02-20 14:59:07 -080083 namelen = strlen(name);
84
85 /* Test with length +1 for the *initial* '\0'. */
86 if ((namelen + 1) > sizeof(p_addr->sun_path)) {
87 goto error;
88 }
89
90 /*
91 * Note: The path in this case is *not* supposed to be
92 * '\0'-terminated. ("man 7 unix" for the gory details.)
93 */
94
95 p_addr->sun_path[0] = 0;
96 memcpy(p_addr->sun_path + 1, name, namelen);
Elliott Hughes9768d242014-11-21 22:50:20 -080097#else
Mark Salyzyn154f4602014-02-20 14:59:07 -080098 /* this OS doesn't have the Linux abstract namespace */
99
100 namelen = strlen(name) + strlen(FILESYSTEM_SOCKET_PREFIX);
101 /* unix_path_max appears to be missing on linux */
102 if (namelen > sizeof(*p_addr)
103 - offsetof(struct sockaddr_un, sun_path) - 1) {
104 goto error;
105 }
106
107 strcpy(p_addr->sun_path, FILESYSTEM_SOCKET_PREFIX);
108 strcat(p_addr->sun_path, name);
Elliott Hughes9768d242014-11-21 22:50:20 -0800109#endif
Mark Salyzyn154f4602014-02-20 14:59:07 -0800110 break;
111
112 case ANDROID_SOCKET_NAMESPACE_RESERVED:
113 namelen = strlen(name) + strlen(ANDROID_RESERVED_SOCKET_PREFIX);
114 /* unix_path_max appears to be missing on linux */
115 if (namelen > sizeof(*p_addr)
116 - offsetof(struct sockaddr_un, sun_path) - 1) {
117 goto error;
118 }
119
120 strcpy(p_addr->sun_path, ANDROID_RESERVED_SOCKET_PREFIX);
121 strcat(p_addr->sun_path, name);
122 break;
123
124 case ANDROID_SOCKET_NAMESPACE_FILESYSTEM:
125 namelen = strlen(name);
126 /* unix_path_max appears to be missing on linux */
127 if (namelen > sizeof(*p_addr)
128 - offsetof(struct sockaddr_un, sun_path) - 1) {
129 goto error;
130 }
131
132 strcpy(p_addr->sun_path, name);
133 break;
134
135 default:
136 /* invalid namespace id */
137 return -1;
138 }
139
140 p_addr->sun_family = AF_LOCAL;
141 *alen = namelen + offsetof(struct sockaddr_un, sun_path) + 1;
142 return 0;
143error:
144 return -1;
145}
146
147/**
148 * connect to peer named "name" on fd
149 * returns same fd or -1 on error.
150 * fd is not closed on error. that's your job.
151 *
152 * Used by AndroidSocketImpl
153 */
154int WEAK socket_local_client_connect(int fd, const char *name, int namespaceId,
Mark Salyzyna04464a2014-04-30 08:50:53 -0700155 int type __unused)
Mark Salyzyn154f4602014-02-20 14:59:07 -0800156{
157 struct sockaddr_un addr;
158 socklen_t alen;
Mark Salyzyn154f4602014-02-20 14:59:07 -0800159 int err;
160
161 err = socket_make_sockaddr_un(name, namespaceId, &addr, &alen);
162
163 if (err < 0) {
164 goto error;
165 }
166
167 if(connect(fd, (struct sockaddr *) &addr, alen) < 0) {
168 goto error;
169 }
170
171 return fd;
172
173error:
174 return -1;
175}
176
177/**
178 * connect to peer named "name"
179 * returns fd or -1 on error
180 */
181int WEAK socket_local_client(const char *name, int namespaceId, int type)
182{
183 int s;
184
185 s = socket(AF_LOCAL, type, 0);
186 if(s < 0) return -1;
187
188 if ( 0 > socket_local_client_connect(s, name, namespaceId, type)) {
189 close(s);
190 return -1;
191 }
192
193 return s;
194}
195
Elliott Hughesadbf4422015-07-29 17:45:24 -0700196#endif /* !_WIN32 */
Mark Salyzyn154f4602014-02-20 14:59:07 -0800197/* End of ../libcutils/socket_local_client.c */
Mark Salyzyn42958412013-11-22 10:50:27 -0800198
199#define logger_for_each(logger, logger_list) \
200 for (logger = node_to_item((logger_list)->node.next, struct logger, node); \
201 logger != node_to_item(&(logger_list)->node, struct logger, node); \
202 logger = node_to_item((logger)->node.next, struct logger, node))
203
204/* In the future, we would like to make this list extensible */
205static const char *LOG_NAME[LOG_ID_MAX] = {
206 [LOG_ID_MAIN] = "main",
207 [LOG_ID_RADIO] = "radio",
208 [LOG_ID_EVENTS] = "events",
Mark Salyzyn99f47a92014-04-07 14:58:08 -0700209 [LOG_ID_SYSTEM] = "system",
210 [LOG_ID_CRASH] = "crash",
Mark Salyzyn083b0372015-12-04 10:59:45 -0800211 [LOG_ID_SECURITY] = "security",
Mark Salyzyn440e1092014-10-10 15:13:15 -0700212 [LOG_ID_KERNEL] = "kernel",
Mark Salyzyn42958412013-11-22 10:50:27 -0800213};
214
Mark Salyzyn154f4602014-02-20 14:59:07 -0800215const char *android_log_id_to_name(log_id_t log_id)
216{
Mark Salyzyn42958412013-11-22 10:50:27 -0800217 if (log_id >= LOG_ID_MAX) {
218 log_id = LOG_ID_MAIN;
219 }
220 return LOG_NAME[log_id];
221}
222
Mark Salyzyn154f4602014-02-20 14:59:07 -0800223log_id_t android_name_to_log_id(const char *logName)
Mark Salyzyn42958412013-11-22 10:50:27 -0800224{
Mark Salyzyn42958412013-11-22 10:50:27 -0800225 const char *b;
Mark Salyzyn42958412013-11-22 10:50:27 -0800226 int ret;
227
228 if (!logName) {
229 return -1; /* NB: log_id_t is unsigned */
230 }
231 b = strrchr(logName, '/');
232 if (!b) {
233 b = logName;
234 } else {
235 ++b;
236 }
237
Mark Salyzyn42958412013-11-22 10:50:27 -0800238 for(ret = LOG_ID_MIN; ret < LOG_ID_MAX; ++ret) {
239 const char *l = LOG_NAME[ret];
240 if (l && !strcmp(b, l)) {
241 return ret;
242 }
243 }
244 return -1; /* should never happen */
245}
246
247struct logger_list {
248 struct listnode node;
249 int mode;
250 unsigned int tail;
Mark Salyzynfa3716b2014-02-14 16:05:05 -0800251 log_time start;
Mark Salyzyn42958412013-11-22 10:50:27 -0800252 pid_t pid;
Mark Salyzyn154f4602014-02-20 14:59:07 -0800253 int sock;
Mark Salyzyn42958412013-11-22 10:50:27 -0800254};
255
256struct logger {
257 struct listnode node;
258 struct logger_list *top;
Mark Salyzyn42958412013-11-22 10:50:27 -0800259 log_id_t id;
Mark Salyzyn42958412013-11-22 10:50:27 -0800260};
261
262/* android_logger_alloc unimplemented, no use case */
263/* android_logger_free not exported */
264static void android_logger_free(struct logger *logger)
265{
266 if (!logger) {
267 return;
268 }
269
Mark Salyzyn42958412013-11-22 10:50:27 -0800270 list_remove(&logger->node);
271
272 free(logger);
273}
274
Mark Salyzyn154f4602014-02-20 14:59:07 -0800275/* android_logger_alloc unimplemented, no use case */
276
277/* method for getting the associated sublog id */
Mark Salyzyn42958412013-11-22 10:50:27 -0800278log_id_t android_logger_get_id(struct logger *logger)
279{
280 return logger->id;
281}
282
283/* worker for sending the command to the logger */
Mark Salyzyn154f4602014-02-20 14:59:07 -0800284static ssize_t send_log_msg(struct logger *logger,
285 const char *msg, char *buf, size_t buf_size)
Mark Salyzyn42958412013-11-22 10:50:27 -0800286{
Mark Salyzyn154f4602014-02-20 14:59:07 -0800287 ssize_t ret;
Mark Salyzyn696817d2014-04-18 14:49:28 -0700288 size_t len;
289 char *cp;
Greg Hackmann8084a532014-03-17 13:08:31 -0700290 int errno_save = 0;
Mark Salyzyn154f4602014-02-20 14:59:07 -0800291 int sock = socket_local_client("logd", ANDROID_SOCKET_NAMESPACE_RESERVED,
292 SOCK_STREAM);
293 if (sock < 0) {
Greg Hackmann8084a532014-03-17 13:08:31 -0700294 return sock;
Mark Salyzyn42958412013-11-22 10:50:27 -0800295 }
296
Mark Salyzyn154f4602014-02-20 14:59:07 -0800297 if (msg) {
298 snprintf(buf, buf_size, msg, logger ? logger->id : (unsigned) -1);
Mark Salyzyn42958412013-11-22 10:50:27 -0800299 }
300
Mark Salyzyn696817d2014-04-18 14:49:28 -0700301 len = strlen(buf) + 1;
302 ret = TEMP_FAILURE_RETRY(write(sock, buf, len));
Mark Salyzyn154f4602014-02-20 14:59:07 -0800303 if (ret <= 0) {
304 goto done;
Mark Salyzyn42958412013-11-22 10:50:27 -0800305 }
306
Mark Salyzyn696817d2014-04-18 14:49:28 -0700307 len = buf_size;
308 cp = buf;
309 while ((ret = TEMP_FAILURE_RETRY(read(sock, cp, len))) > 0) {
310 struct pollfd p;
311
312 if (((size_t)ret == len) || (buf_size < PAGE_SIZE)) {
313 break;
314 }
315
316 len -= ret;
317 cp += ret;
318
319 memset(&p, 0, sizeof(p));
320 p.fd = sock;
321 p.events = POLLIN;
322
323 /* Give other side 20ms to refill pipe */
324 ret = TEMP_FAILURE_RETRY(poll(&p, 1, 20));
325
326 if (ret <= 0) {
327 break;
328 }
329
330 if (!(p.revents & POLLIN)) {
331 ret = 0;
332 break;
333 }
334 }
335
336 if (ret >= 0) {
337 ret += buf_size - len;
338 }
Mark Salyzyn154f4602014-02-20 14:59:07 -0800339
340done:
341 if ((ret == -1) && errno) {
Greg Hackmann8084a532014-03-17 13:08:31 -0700342 errno_save = errno;
Mark Salyzyn42958412013-11-22 10:50:27 -0800343 }
Mark Salyzyn154f4602014-02-20 14:59:07 -0800344 close(sock);
Greg Hackmann8084a532014-03-17 13:08:31 -0700345 if (errno_save) {
346 errno = errno_save;
347 }
Mark Salyzyn42958412013-11-22 10:50:27 -0800348 return ret;
349}
350
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800351static int check_log_success(char *buf, ssize_t ret)
Mark Salyzyn42958412013-11-22 10:50:27 -0800352{
Mark Salyzyn154f4602014-02-20 14:59:07 -0800353 if (ret < 0) {
354 return ret;
355 }
356
357 if (strncmp(buf, "success", 7)) {
Greg Hackmann8084a532014-03-17 13:08:31 -0700358 errno = EINVAL;
Mark Salyzyn154f4602014-02-20 14:59:07 -0800359 return -1;
360 }
361
362 return 0;
Mark Salyzyn42958412013-11-22 10:50:27 -0800363}
364
Mark Salyzyn6eef4172014-12-15 09:51:39 -0800365/* Determine the credentials of the caller */
366static bool uid_has_log_permission(uid_t uid)
367{
368 return (uid == AID_SYSTEM) || (uid == AID_LOG) || (uid == AID_ROOT);
369}
370
371static uid_t get_best_effective_uid()
372{
373 uid_t euid;
374 uid_t uid;
375 gid_t gid;
376 ssize_t i;
377 static uid_t last_uid = (uid_t) -1;
378
379 if (last_uid != (uid_t) -1) {
380 return last_uid;
381 }
382 uid = getuid();
383 if (uid_has_log_permission(uid)) {
384 return last_uid = uid;
385 }
386 euid = geteuid();
387 if (uid_has_log_permission(euid)) {
388 return last_uid = euid;
389 }
390 gid = getgid();
391 if (uid_has_log_permission(gid)) {
392 return last_uid = gid;
393 }
394 gid = getegid();
395 if (uid_has_log_permission(gid)) {
396 return last_uid = gid;
397 }
398 i = getgroups((size_t) 0, NULL);
399 if (i > 0) {
400 gid_t list[i];
401
402 getgroups(i, list);
403 while (--i >= 0) {
404 if (uid_has_log_permission(list[i])) {
405 return last_uid = list[i];
406 }
407 }
408 }
409 return last_uid = uid;
410}
411
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800412int android_logger_clear(struct logger *logger)
413{
414 char buf[512];
415
Mark Salyzyn6eef4172014-12-15 09:51:39 -0800416 if (logger->top->mode & ANDROID_LOG_PSTORE) {
417 if (uid_has_log_permission(get_best_effective_uid())) {
418 return unlink("/sys/fs/pstore/pmsg-ramoops-0");
419 }
420 errno = EPERM;
421 return -1;
422 }
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800423 return check_log_success(buf,
424 send_log_msg(logger, "clear %d", buf, sizeof(buf)));
425}
426
Mark Salyzyn42958412013-11-22 10:50:27 -0800427/* returns the total size of the log's ring buffer */
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800428long android_logger_get_log_size(struct logger *logger)
Mark Salyzyn42958412013-11-22 10:50:27 -0800429{
Mark Salyzyn154f4602014-02-20 14:59:07 -0800430 char buf[512];
431
432 ssize_t ret = send_log_msg(logger, "getLogSize %d", buf, sizeof(buf));
433 if (ret < 0) {
434 return ret;
435 }
436
437 if ((buf[0] < '0') || ('9' < buf[0])) {
438 return -1;
439 }
440
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800441 return atol(buf);
Mark Salyzyn42958412013-11-22 10:50:27 -0800442}
443
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800444int android_logger_set_log_size(struct logger *logger, unsigned long size)
445{
446 char buf[512];
447
448 snprintf(buf, sizeof(buf), "setLogSize %d %lu",
449 logger ? logger->id : (unsigned) -1, size);
450
451 return check_log_success(buf, send_log_msg(NULL, NULL, buf, sizeof(buf)));
452}
453
Mark Salyzyn42958412013-11-22 10:50:27 -0800454/*
455 * returns the readable size of the log's ring buffer (that is, amount of the
456 * log consumed)
457 */
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800458long android_logger_get_log_readable_size(struct logger *logger)
Mark Salyzyn42958412013-11-22 10:50:27 -0800459{
Mark Salyzyn154f4602014-02-20 14:59:07 -0800460 char buf[512];
461
462 ssize_t ret = send_log_msg(logger, "getLogSizeUsed %d", buf, sizeof(buf));
463 if (ret < 0) {
464 return ret;
465 }
466
467 if ((buf[0] < '0') || ('9' < buf[0])) {
468 return -1;
469 }
470
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800471 return atol(buf);
Mark Salyzyn42958412013-11-22 10:50:27 -0800472}
473
474/*
475 * returns the logger version
476 */
Mark Salyzyna04464a2014-04-30 08:50:53 -0700477int android_logger_get_log_version(struct logger *logger __unused)
Mark Salyzyn42958412013-11-22 10:50:27 -0800478{
Mark Salyzyn154f4602014-02-20 14:59:07 -0800479 return 3;
Mark Salyzyn42958412013-11-22 10:50:27 -0800480}
481
Mark Salyzyn34facab2014-02-06 14:48:50 -0800482/*
483 * returns statistics
484 */
485ssize_t android_logger_get_statistics(struct logger_list *logger_list,
486 char *buf, size_t len)
487{
Mark Salyzyn34facab2014-02-06 14:48:50 -0800488 struct logger *logger;
489 char *cp = buf;
490 size_t remaining = len;
491 size_t n;
492
493 n = snprintf(cp, remaining, "getStatistics");
494 n = min(n, remaining);
495 remaining -= n;
496 cp += n;
497
498 logger_for_each(logger, logger_list) {
499 n = snprintf(cp, remaining, " %d", logger->id);
500 n = min(n, remaining);
501 remaining -= n;
502 cp += n;
503 }
504 return send_log_msg(NULL, NULL, buf, len);
505}
506
Mark Salyzyna04464a2014-04-30 08:50:53 -0700507ssize_t android_logger_get_prune_list(struct logger_list *logger_list __unused,
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800508 char *buf, size_t len)
509{
510 return send_log_msg(NULL, "getPruneList", buf, len);
511}
512
Mark Salyzyna04464a2014-04-30 08:50:53 -0700513int android_logger_set_prune_list(struct logger_list *logger_list __unused,
Mark Salyzyndfa7a072014-02-11 12:29:31 -0800514 char *buf, size_t len)
515{
516 const char cmd[] = "setPruneList ";
517 const size_t cmdlen = sizeof(cmd) - 1;
518
519 if (strlen(buf) > (len - cmdlen)) {
520 return -ENOMEM; /* KISS */
521 }
522 memmove(buf + cmdlen, buf, len - cmdlen);
523 buf[len - 1] = '\0';
524 memcpy(buf, cmd, cmdlen);
525
526 return check_log_success(buf, send_log_msg(NULL, NULL, buf, len));
527}
528
Mark Salyzyn42958412013-11-22 10:50:27 -0800529struct logger_list *android_logger_list_alloc(int mode,
530 unsigned int tail,
531 pid_t pid)
532{
533 struct logger_list *logger_list;
534
535 logger_list = calloc(1, sizeof(*logger_list));
536 if (!logger_list) {
537 return NULL;
538 }
Mark Salyzyn154f4602014-02-20 14:59:07 -0800539
Mark Salyzyn42958412013-11-22 10:50:27 -0800540 list_init(&logger_list->node);
541 logger_list->mode = mode;
Mark Salyzynfa3716b2014-02-14 16:05:05 -0800542 logger_list->start.tv_sec = 0;
543 logger_list->start.tv_nsec = 0;
Mark Salyzyn42958412013-11-22 10:50:27 -0800544 logger_list->tail = tail;
545 logger_list->pid = pid;
Mark Salyzyn154f4602014-02-20 14:59:07 -0800546 logger_list->sock = -1;
547
Mark Salyzyn42958412013-11-22 10:50:27 -0800548 return logger_list;
549}
550
Mark Salyzynfa3716b2014-02-14 16:05:05 -0800551struct logger_list *android_logger_list_alloc_time(int mode,
552 log_time start,
553 pid_t pid)
554{
555 struct logger_list *logger_list;
556
557 logger_list = calloc(1, sizeof(*logger_list));
558 if (!logger_list) {
559 return NULL;
560 }
561
562 list_init(&logger_list->node);
563 logger_list->mode = mode;
564 logger_list->start = start;
565 logger_list->tail = 0;
566 logger_list->pid = pid;
567 logger_list->sock = -1;
568
569 return logger_list;
570}
571
Mark Salyzyn42958412013-11-22 10:50:27 -0800572/* android_logger_list_register unimplemented, no use case */
573/* android_logger_list_unregister unimplemented, no use case */
574
575/* Open the named log and add it to the logger list */
576struct logger *android_logger_open(struct logger_list *logger_list,
577 log_id_t id)
578{
Mark Salyzyn42958412013-11-22 10:50:27 -0800579 struct logger *logger;
Mark Salyzyn42958412013-11-22 10:50:27 -0800580
581 if (!logger_list || (id >= LOG_ID_MAX)) {
582 goto err;
583 }
584
585 logger_for_each(logger, logger_list) {
586 if (logger->id == id) {
587 goto ok;
588 }
589 }
590
591 logger = calloc(1, sizeof(*logger));
592 if (!logger) {
593 goto err;
594 }
595
Mark Salyzyn42958412013-11-22 10:50:27 -0800596 logger->id = id;
Mark Salyzyn42958412013-11-22 10:50:27 -0800597 list_add_tail(&logger_list->node, &logger->node);
598 logger->top = logger_list;
Mark Salyzyn42958412013-11-22 10:50:27 -0800599 goto ok;
600
Mark Salyzyn42958412013-11-22 10:50:27 -0800601err:
602 logger = NULL;
603ok:
604 return logger;
605}
606
607/* Open the single named log and make it part of a new logger list */
608struct logger_list *android_logger_list_open(log_id_t id,
609 int mode,
610 unsigned int tail,
611 pid_t pid)
612{
613 struct logger_list *logger_list = android_logger_list_alloc(mode, tail, pid);
614 if (!logger_list) {
615 return NULL;
616 }
617
618 if (!android_logger_open(logger_list, id)) {
619 android_logger_list_free(logger_list);
620 return NULL;
621 }
622
623 return logger_list;
624}
625
Mark Salyzyn6eef4172014-12-15 09:51:39 -0800626static int android_logger_list_read_pstore(struct logger_list *logger_list,
627 struct log_msg *log_msg)
628{
629 ssize_t ret;
630 off_t current, next;
631 uid_t uid;
632 struct logger *logger;
633 struct __attribute__((__packed__)) {
634 android_pmsg_log_header_t p;
635 android_log_header_t l;
636 } buf;
637 static uint8_t preread_count;
Mark Salyzyn8646a542015-12-07 08:45:12 -0800638 bool is_system;
Mark Salyzyn6eef4172014-12-15 09:51:39 -0800639
640 memset(log_msg, 0, sizeof(*log_msg));
641
642 if (logger_list->sock < 0) {
643 int fd = open("/sys/fs/pstore/pmsg-ramoops-0", O_RDONLY);
644
645 if (fd < 0) {
646 return -errno;
647 }
648 logger_list->sock = fd;
649 preread_count = 0;
650 }
651
652 ret = 0;
653 while(1) {
654 if (preread_count < sizeof(buf)) {
655 ret = TEMP_FAILURE_RETRY(read(logger_list->sock,
656 &buf.p.magic + preread_count,
657 sizeof(buf) - preread_count));
658 if (ret < 0) {
659 return -errno;
660 }
661 preread_count += ret;
662 }
663 if (preread_count != sizeof(buf)) {
664 return preread_count ? -EIO : -EAGAIN;
665 }
666 if ((buf.p.magic != LOGGER_MAGIC)
667 || (buf.p.len <= sizeof(buf))
668 || (buf.p.len > (sizeof(buf) + LOGGER_ENTRY_MAX_PAYLOAD))
669 || (buf.l.id >= LOG_ID_MAX)
670 || (buf.l.realtime.tv_nsec >= NS_PER_SEC)) {
671 do {
672 memmove(&buf.p.magic, &buf.p.magic + 1, --preread_count);
673 } while (preread_count && (buf.p.magic != LOGGER_MAGIC));
674 continue;
675 }
676 preread_count = 0;
677
678 logger_for_each(logger, logger_list) {
679 if (buf.l.id != logger->id) {
680 continue;
681 }
682
683 if ((logger_list->start.tv_sec || logger_list->start.tv_nsec)
684 && ((logger_list->start.tv_sec > buf.l.realtime.tv_sec)
685 || ((logger_list->start.tv_sec == buf.l.realtime.tv_sec)
686 && (logger_list->start.tv_nsec > buf.l.realtime.tv_nsec)))) {
687 break;
688 }
689
690 if (logger_list->pid && (logger_list->pid != buf.p.pid)) {
691 break;
692 }
693
694 uid = get_best_effective_uid();
Mark Salyzyn8646a542015-12-07 08:45:12 -0800695 is_system = uid_has_log_permission(uid);
696 if (!is_system && (uid != buf.p.uid)) {
Mark Salyzyn6eef4172014-12-15 09:51:39 -0800697 break;
698 }
699
700 ret = TEMP_FAILURE_RETRY(read(logger_list->sock,
Mark Salyzyn8646a542015-12-07 08:45:12 -0800701 is_system ?
702 log_msg->entry_v4.msg :
703 log_msg->entry_v3.msg,
Mark Salyzyn6eef4172014-12-15 09:51:39 -0800704 buf.p.len - sizeof(buf)));
705 if (ret < 0) {
706 return -errno;
707 }
708 if (ret != (ssize_t)(buf.p.len - sizeof(buf))) {
709 return -EIO;
710 }
711
Mark Salyzyn8646a542015-12-07 08:45:12 -0800712 log_msg->entry_v4.len = buf.p.len - sizeof(buf);
713 log_msg->entry_v4.hdr_size = is_system ?
714 sizeof(log_msg->entry_v4) :
715 sizeof(log_msg->entry_v3);
716 log_msg->entry_v4.pid = buf.p.pid;
717 log_msg->entry_v4.tid = buf.l.tid;
718 log_msg->entry_v4.sec = buf.l.realtime.tv_sec;
719 log_msg->entry_v4.nsec = buf.l.realtime.tv_nsec;
720 log_msg->entry_v4.lid = buf.l.id;
721 if (is_system) {
722 log_msg->entry_v4.uid = buf.p.uid;
723 }
Mark Salyzyn6eef4172014-12-15 09:51:39 -0800724
725 return ret;
726 }
727
728 current = TEMP_FAILURE_RETRY(lseek(logger_list->sock,
729 (off_t)0, SEEK_CUR));
730 if (current < 0) {
731 return -errno;
732 }
733 next = TEMP_FAILURE_RETRY(lseek(logger_list->sock,
734 (off_t)(buf.p.len - sizeof(buf)),
735 SEEK_CUR));
736 if (next < 0) {
737 return -errno;
738 }
739 if ((next - current) != (ssize_t)(buf.p.len - sizeof(buf))) {
740 return -EIO;
741 }
742 }
743}
744
Mark Salyzyna04464a2014-04-30 08:50:53 -0700745static void caught_signal(int signum __unused)
Mark Salyzyn42958412013-11-22 10:50:27 -0800746{
Mark Salyzyn42958412013-11-22 10:50:27 -0800747}
748
749/* Read from the selected logs */
750int android_logger_list_read(struct logger_list *logger_list,
751 struct log_msg *log_msg)
752{
Mark Salyzyn154f4602014-02-20 14:59:07 -0800753 int ret, e;
Mark Salyzyn42958412013-11-22 10:50:27 -0800754 struct logger *logger;
Mark Salyzyn154f4602014-02-20 14:59:07 -0800755 struct sigaction ignore;
756 struct sigaction old_sigaction;
757 unsigned int old_alarm = 0;
Mark Salyzyn42958412013-11-22 10:50:27 -0800758
759 if (!logger_list) {
Mark Salyzyn154f4602014-02-20 14:59:07 -0800760 return -EINVAL;
Mark Salyzyn42958412013-11-22 10:50:27 -0800761 }
762
Mark Salyzyn6eef4172014-12-15 09:51:39 -0800763 if (logger_list->mode & ANDROID_LOG_PSTORE) {
764 return android_logger_list_read_pstore(logger_list, log_msg);
765 }
766
Mark Salyzyn2d3f38a2015-01-26 10:46:44 -0800767 if (logger_list->mode & ANDROID_LOG_NONBLOCK) {
Mark Salyzyn154f4602014-02-20 14:59:07 -0800768 memset(&ignore, 0, sizeof(ignore));
769 ignore.sa_handler = caught_signal;
770 sigemptyset(&ignore.sa_mask);
Mark Salyzyn42958412013-11-22 10:50:27 -0800771 }
772
Mark Salyzyn154f4602014-02-20 14:59:07 -0800773 if (logger_list->sock < 0) {
774 char buffer[256], *cp, c;
Mark Salyzyn42958412013-11-22 10:50:27 -0800775
Mark Salyzyn154f4602014-02-20 14:59:07 -0800776 int sock = socket_local_client("logdr",
777 ANDROID_SOCKET_NAMESPACE_RESERVED,
778 SOCK_SEQPACKET);
779 if (sock < 0) {
780 if ((sock == -1) && errno) {
781 return -errno;
Mark Salyzyn42958412013-11-22 10:50:27 -0800782 }
Mark Salyzyn154f4602014-02-20 14:59:07 -0800783 return sock;
Mark Salyzyn42958412013-11-22 10:50:27 -0800784 }
785
Mark Salyzyn154f4602014-02-20 14:59:07 -0800786 strcpy(buffer,
Mark Salyzyn2d3f38a2015-01-26 10:46:44 -0800787 (logger_list->mode & ANDROID_LOG_NONBLOCK) ? "dumpAndClose" : "stream");
Mark Salyzyn154f4602014-02-20 14:59:07 -0800788 cp = buffer + strlen(buffer);
Mark Salyzyn42958412013-11-22 10:50:27 -0800789
Mark Salyzyn154f4602014-02-20 14:59:07 -0800790 strcpy(cp, " lids");
791 cp += 5;
792 c = '=';
793 int remaining = sizeof(buffer) - (cp - buffer);
Mark Salyzyn42958412013-11-22 10:50:27 -0800794 logger_for_each(logger, logger_list) {
Mark Salyzyn154f4602014-02-20 14:59:07 -0800795 ret = snprintf(cp, remaining, "%c%u", c, logger->id);
796 ret = min(ret, remaining);
797 remaining -= ret;
798 cp += ret;
799 c = ',';
800 }
Mark Salyzyn42958412013-11-22 10:50:27 -0800801
Mark Salyzyn154f4602014-02-20 14:59:07 -0800802 if (logger_list->tail) {
803 ret = snprintf(cp, remaining, " tail=%u", logger_list->tail);
804 ret = min(ret, remaining);
805 remaining -= ret;
806 cp += ret;
807 }
808
Mark Salyzynfa3716b2014-02-14 16:05:05 -0800809 if (logger_list->start.tv_sec || logger_list->start.tv_nsec) {
Mark Salyzynf8e546e2015-11-30 11:36:09 -0800810 if (logger_list->mode & ANDROID_LOG_WRAP) {
811 // ToDo: alternate API to allow timeout to be adjusted.
812 ret = snprintf(cp, remaining, " timeout=%u",
813 ANDROID_LOG_WRAP_DEFAULT_TIMEOUT);
814 ret = min(ret, remaining);
815 remaining -= ret;
816 cp += ret;
817 }
Mark Salyzynfa3716b2014-02-14 16:05:05 -0800818 ret = snprintf(cp, remaining, " start=%" PRIu32 ".%09" PRIu32,
819 logger_list->start.tv_sec,
820 logger_list->start.tv_nsec);
821 ret = min(ret, remaining);
822 remaining -= ret;
823 cp += ret;
824 }
825
Mark Salyzyn154f4602014-02-20 14:59:07 -0800826 if (logger_list->pid) {
827 ret = snprintf(cp, remaining, " pid=%u", logger_list->pid);
828 ret = min(ret, remaining);
829 remaining -= ret;
830 cp += ret;
831 }
832
Mark Salyzyn2d3f38a2015-01-26 10:46:44 -0800833 if (logger_list->mode & ANDROID_LOG_NONBLOCK) {
Mark Salyzyn154f4602014-02-20 14:59:07 -0800834 /* Deal with an unresponsive logd */
835 sigaction(SIGALRM, &ignore, &old_sigaction);
836 old_alarm = alarm(30);
837 }
838 ret = write(sock, buffer, cp - buffer);
839 e = errno;
Mark Salyzyn2d3f38a2015-01-26 10:46:44 -0800840 if (logger_list->mode & ANDROID_LOG_NONBLOCK) {
Mark Salyzyn154f4602014-02-20 14:59:07 -0800841 if (e == EINTR) {
842 e = ETIMEDOUT;
Mark Salyzyn42958412013-11-22 10:50:27 -0800843 }
Mark Salyzyn154f4602014-02-20 14:59:07 -0800844 alarm(old_alarm);
845 sigaction(SIGALRM, &old_sigaction, NULL);
Mark Salyzyn42958412013-11-22 10:50:27 -0800846 }
847
848 if (ret <= 0) {
Mark Salyzyn154f4602014-02-20 14:59:07 -0800849 close(sock);
850 if ((ret == -1) && e) {
851 return -e;
Mark Salyzyn42958412013-11-22 10:50:27 -0800852 }
Mark Salyzyn154f4602014-02-20 14:59:07 -0800853 if (ret == 0) {
854 return -EIO;
855 }
856 return ret;
Mark Salyzyn42958412013-11-22 10:50:27 -0800857 }
Mark Salyzyn154f4602014-02-20 14:59:07 -0800858
859 logger_list->sock = sock;
Mark Salyzyn42958412013-11-22 10:50:27 -0800860 }
861
Mark Salyzyn154f4602014-02-20 14:59:07 -0800862 ret = 0;
863 while(1) {
864 memset(log_msg, 0, sizeof(*log_msg));
865
Mark Salyzyn2d3f38a2015-01-26 10:46:44 -0800866 if (logger_list->mode & ANDROID_LOG_NONBLOCK) {
Mark Salyzyn154f4602014-02-20 14:59:07 -0800867 /* particularily useful if tombstone is reporting for logd */
868 sigaction(SIGALRM, &ignore, &old_sigaction);
869 old_alarm = alarm(30);
870 }
871 /* NOTE: SOCK_SEQPACKET guarantees we read exactly one full entry */
872 ret = recv(logger_list->sock, log_msg, LOGGER_ENTRY_MAX_LEN, 0);
873 e = errno;
Mark Salyzyn2d3f38a2015-01-26 10:46:44 -0800874 if (logger_list->mode & ANDROID_LOG_NONBLOCK) {
Mark Salyzyn154f4602014-02-20 14:59:07 -0800875 if ((ret == 0) || (e == EINTR)) {
876 e = EAGAIN;
877 ret = -1;
878 }
879 alarm(old_alarm);
880 sigaction(SIGALRM, &old_sigaction, NULL);
881 }
882
Mark Salyzyn43e92812015-02-26 11:21:47 -0800883 if ((ret == -1) && e) {
884 return -e;
Mark Salyzyn154f4602014-02-20 14:59:07 -0800885 }
Mark Salyzyn43e92812015-02-26 11:21:47 -0800886 return ret;
Mark Salyzyn42958412013-11-22 10:50:27 -0800887 }
Mark Salyzyn154f4602014-02-20 14:59:07 -0800888 /* NOTREACH */
Mark Salyzyn42958412013-11-22 10:50:27 -0800889 return ret;
890}
891
892/* Close all the logs */
893void android_logger_list_free(struct logger_list *logger_list)
894{
895 if (logger_list == NULL) {
896 return;
897 }
898
899 while (!list_empty(&logger_list->node)) {
900 struct listnode *node = list_head(&logger_list->node);
901 struct logger *logger = node_to_item(node, struct logger, node);
902 android_logger_free(logger);
903 }
904
Mark Salyzyn154f4602014-02-20 14:59:07 -0800905 if (logger_list->sock >= 0) {
906 close (logger_list->sock);
907 }
908
Mark Salyzyn42958412013-11-22 10:50:27 -0800909 free(logger_list);
910}