blob: e8511008b4b198735cbd2b885eafd3fea84510fe [file] [log] [blame]
Mark Salyzyn018a96d2016-03-01 13:45:42 -08001/*
2 * Copyright (C) 2007-2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17/*
18 * pmsg write handler
19 */
20
21#include <errno.h>
22#include <fcntl.h>
Mark Salyzyndb8a2662016-10-10 07:27:42 -070023#include <stdbool.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080024#include <stdlib.h>
25#include <string.h>
26#include <sys/types.h>
27#include <time.h>
28
Steven Moreland1f83aa42017-04-13 23:48:57 -070029#include <log/log_properties.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080030#include <private/android_filesystem_config.h>
31#include <private/android_logger.h>
32
33#include "config_write.h"
34#include "log_portability.h"
35#include "logger.h"
Tom Cherry6f6ef392019-01-16 14:17:08 -080036#include "uio.h"
Mark Salyzyn018a96d2016-03-01 13:45:42 -080037
38static int pmsgOpen();
39static void pmsgClose();
40static int pmsgAvailable(log_id_t logId);
Tom Cherry71ba1642019-01-10 10:37:36 -080041static int pmsgWrite(log_id_t logId, struct timespec* ts, struct iovec* vec, size_t nr);
Mark Salyzyn018a96d2016-03-01 13:45:42 -080042
Tom Cherry2d9779e2019-02-08 11:46:19 -080043struct android_log_transport_write pmsgLoggerWrite = {
Tom Cherry71ba1642019-01-10 10:37:36 -080044 .node = {&pmsgLoggerWrite.node, &pmsgLoggerWrite.node},
45 .context.fd = -1,
46 .name = "pmsg",
47 .available = pmsgAvailable,
48 .open = pmsgOpen,
49 .close = pmsgClose,
50 .write = pmsgWrite,
Mark Salyzyn018a96d2016-03-01 13:45:42 -080051};
52
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080053static int pmsgOpen() {
54 int fd = atomic_load(&pmsgLoggerWrite.context.fd);
55 if (fd < 0) {
56 int i;
Mark Salyzyndb8a2662016-10-10 07:27:42 -070057
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080058 fd = TEMP_FAILURE_RETRY(open("/dev/pmsg0", O_WRONLY | O_CLOEXEC));
59 i = atomic_exchange(&pmsgLoggerWrite.context.fd, fd);
60 if ((i >= 0) && (i != fd)) {
61 close(i);
Mark Salyzyn018a96d2016-03-01 13:45:42 -080062 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080063 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -080064
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080065 return fd;
Mark Salyzyn018a96d2016-03-01 13:45:42 -080066}
67
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080068static void pmsgClose() {
69 int fd = atomic_exchange(&pmsgLoggerWrite.context.fd, -1);
70 if (fd >= 0) {
71 close(fd);
72 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -080073}
74
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080075static int pmsgAvailable(log_id_t logId) {
76 if (logId > LOG_ID_SECURITY) {
77 return -EINVAL;
78 }
Tom Cherry71ba1642019-01-10 10:37:36 -080079 if ((logId != LOG_ID_SECURITY) && (logId != LOG_ID_EVENTS) && !__android_log_is_debuggable()) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080080 return -EINVAL;
81 }
82 if (atomic_load(&pmsgLoggerWrite.context.fd) < 0) {
83 if (access("/dev/pmsg0", W_OK) == 0) {
84 return 0;
Mark Salyzyn018a96d2016-03-01 13:45:42 -080085 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080086 return -EBADF;
87 }
88 return 1;
Mark Salyzyn018a96d2016-03-01 13:45:42 -080089}
90
Mark Salyzyn7ef52492016-03-25 15:50:46 -070091/*
92 * Extract a 4-byte value from a byte stream.
93 */
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080094static inline uint32_t get4LE(const uint8_t* src) {
95 return src[0] | (src[1] << 8) | (src[2] << 16) | (src[3] << 24);
Mark Salyzyn7ef52492016-03-25 15:50:46 -070096}
97
Tom Cherry71ba1642019-01-10 10:37:36 -080098static int pmsgWrite(log_id_t logId, struct timespec* ts, struct iovec* vec, size_t nr) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080099 static const unsigned headerLength = 2;
100 struct iovec newVec[nr + headerLength];
101 android_log_header_t header;
102 android_pmsg_log_header_t pmsgHeader;
103 size_t i, payloadSize;
104 ssize_t ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800105
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800106 if ((logId == LOG_ID_EVENTS) && !__android_log_is_debuggable()) {
107 if (vec[0].iov_len < 4) {
108 return -EINVAL;
Mark Salyzyn7ef52492016-03-25 15:50:46 -0700109 }
110
Tom Cherry71ba1642019-01-10 10:37:36 -0800111 if (SNET_EVENT_LOG_TAG != get4LE(static_cast<uint8_t*>(vec[0].iov_base))) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800112 return -EPERM;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800113 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800114 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800115
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800116 if (atomic_load(&pmsgLoggerWrite.context.fd) < 0) {
117 return -EBADF;
118 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800119
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800120 /*
121 * struct {
122 * // what we provide to pstore
123 * android_pmsg_log_header_t pmsgHeader;
124 * // what we provide to file
125 * android_log_header_t header;
126 * // caller provides
127 * union {
128 * struct {
129 * char prio;
130 * char payload[];
131 * } string;
132 * struct {
133 * uint32_t tag
134 * char payload[];
135 * } binary;
136 * };
137 * };
138 */
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800139
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800140 pmsgHeader.magic = LOGGER_MAGIC;
141 pmsgHeader.len = sizeof(pmsgHeader) + sizeof(header);
142 pmsgHeader.uid = __android_log_uid();
143 pmsgHeader.pid = getpid();
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800144
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800145 header.id = logId;
146 header.tid = gettid();
147 header.realtime.tv_sec = ts->tv_sec;
148 header.realtime.tv_nsec = ts->tv_nsec;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800149
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800150 newVec[0].iov_base = (unsigned char*)&pmsgHeader;
151 newVec[0].iov_len = sizeof(pmsgHeader);
152 newVec[1].iov_base = (unsigned char*)&header;
153 newVec[1].iov_len = sizeof(header);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800154
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800155 for (payloadSize = 0, i = headerLength; i < nr + headerLength; i++) {
156 newVec[i].iov_base = vec[i - headerLength].iov_base;
157 payloadSize += newVec[i].iov_len = vec[i - headerLength].iov_len;
158
159 if (payloadSize > LOGGER_ENTRY_MAX_PAYLOAD) {
160 newVec[i].iov_len -= payloadSize - LOGGER_ENTRY_MAX_PAYLOAD;
161 if (newVec[i].iov_len) {
162 ++i;
163 }
164 payloadSize = LOGGER_ENTRY_MAX_PAYLOAD;
165 break;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800166 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800167 }
168 pmsgHeader.len += payloadSize;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800169
Tom Cherry71ba1642019-01-10 10:37:36 -0800170 ret = TEMP_FAILURE_RETRY(writev(atomic_load(&pmsgLoggerWrite.context.fd), newVec, i));
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800171 if (ret < 0) {
172 ret = errno ? -errno : -ENOTCONN;
173 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800174
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800175 if (ret > (ssize_t)(sizeof(header) + sizeof(pmsgHeader))) {
176 ret -= sizeof(header) - sizeof(pmsgHeader);
177 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800178
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800179 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800180}
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800181
182/*
183 * Virtual pmsg filesystem
184 *
185 * Payload will comprise the string "<basedir>:<basefile>\0<content>" to a
186 * maximum of LOGGER_ENTRY_MAX_PAYLOAD, but scaled to the last newline in the
187 * file.
188 *
189 * Will hijack the header.realtime.tv_nsec field for a sequence number in usec.
190 */
191
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800192static inline const char* strnrchr(const char* buf, size_t len, char c) {
193 const char* cp = buf + len;
194 while ((--cp > buf) && (*cp != c))
195 ;
196 if (cp <= buf) {
197 return buf + len;
198 }
199 return cp;
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800200}
201
202/* Write a buffer as filename references (tag = <basedir>:<basename>) */
Tom Cherry2d9779e2019-02-08 11:46:19 -0800203ssize_t __android_log_pmsg_file_write(log_id_t logId, char prio, const char* filename,
204 const char* buf, size_t len) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800205 bool weOpened;
206 size_t length, packet_len;
207 const char* tag;
208 char *cp, *slash;
209 struct timespec ts;
210 struct iovec vec[3];
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800211
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800212 /* Make sure the logId value is not a bad idea */
213 if ((logId == LOG_ID_KERNEL) || /* Verbotten */
214 (logId == LOG_ID_EVENTS) || /* Do not support binary content */
215 (logId == LOG_ID_SECURITY) || /* Bad idea to allow */
216 ((unsigned)logId >= 32)) { /* fit within logMask on arch32 */
217 return -EINVAL;
218 }
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800219
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800220 clock_gettime(android_log_clockid(), &ts);
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800221
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800222 cp = strdup(filename);
223 if (!cp) {
224 return -ENOMEM;
225 }
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800226
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800227 tag = cp;
228 slash = strrchr(cp, '/');
229 if (slash) {
230 *slash = ':';
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800231 slash = strrchr(cp, '/');
232 if (slash) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800233 tag = slash + 1;
234 }
235 }
236
237 length = strlen(tag) + 1;
238 packet_len = LOGGER_ENTRY_MAX_PAYLOAD - sizeof(char) - length;
239
240 vec[0].iov_base = &prio;
241 vec[0].iov_len = sizeof(char);
242 vec[1].iov_base = (unsigned char*)tag;
243 vec[1].iov_len = length;
244
245 weOpened = false;
Tom Cherry71ba1642019-01-10 10:37:36 -0800246 for (ts.tv_nsec = 0, length = len; length; ts.tv_nsec += ANDROID_LOG_PMSG_FILE_SEQUENCE) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800247 ssize_t ret;
248 size_t transfer;
249
Tom Cherry71ba1642019-01-10 10:37:36 -0800250 if ((ts.tv_nsec / ANDROID_LOG_PMSG_FILE_SEQUENCE) >= ANDROID_LOG_PMSG_FILE_MAX_SEQUENCE) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800251 len -= length;
252 break;
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800253 }
254
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800255 transfer = length;
256 if (transfer > packet_len) {
257 transfer = strnrchr(buf, packet_len - 1, '\n') - buf;
258 if ((transfer < length) && (buf[transfer] == '\n')) {
259 ++transfer;
260 }
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800261 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800262
263 vec[2].iov_base = (unsigned char*)buf;
264 vec[2].iov_len = transfer;
265
266 if (atomic_load(&pmsgLoggerWrite.context.fd) < 0) {
267 if (!weOpened) { /* Impossible for weOpened = true here */
268 __android_log_lock();
269 }
270 weOpened = atomic_load(&pmsgLoggerWrite.context.fd) < 0;
271 if (!weOpened) {
272 __android_log_unlock();
273 } else if (pmsgOpen() < 0) {
274 __android_log_unlock();
275 free(cp);
276 return -EBADF;
277 }
278 }
279
280 ret = pmsgWrite(logId, &ts, vec, sizeof(vec) / sizeof(vec[0]));
281
282 if (ret <= 0) {
283 if (weOpened) {
Mark Salyzyndb8a2662016-10-10 07:27:42 -0700284 pmsgClose();
285 __android_log_unlock();
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800286 }
287 free(cp);
288 return ret ? ret : (len - length);
Mark Salyzyndb8a2662016-10-10 07:27:42 -0700289 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800290 length -= transfer;
291 buf += transfer;
292 }
293 if (weOpened) {
294 pmsgClose();
295 __android_log_unlock();
296 }
297 free(cp);
298 return len;
Mark Salyzynd4b061b2016-03-10 09:50:08 -0800299}