blob: 2754e6e74c007bc80ba1a6d105d60938e0821d68 [file] [log] [blame]
Mark Salyzyn018a96d2016-03-01 13:45:42 -08001/*
2 * Copyright (C) 2007-2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <errno.h>
18#include <stdatomic.h>
19#include <stdlib.h>
20#include <string.h>
21#include <sys/time.h>
22
23#ifdef __BIONIC__
24#include <android/set_abort_message.h>
25#endif
26
27#include <log/event_tag_map.h>
Mark Salyzyn81321a72017-03-09 07:28:29 -080028#include <log/log_transport.h>
Mark Salyzyn018a96d2016-03-01 13:45:42 -080029#include <private/android_filesystem_config.h>
30#include <private/android_logger.h>
31
Mark Salyzyn71002882016-03-08 16:18:26 -080032#include "config_read.h" /* __android_log_config_read_close() definition */
Mark Salyzyn018a96d2016-03-01 13:45:42 -080033#include "config_write.h"
34#include "log_portability.h"
35#include "logger.h"
36
37#define LOG_BUF_SIZE 1024
38
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080039static int __write_to_log_init(log_id_t, struct iovec* vec, size_t nr);
40static int (*write_to_log)(log_id_t, struct iovec* vec,
41 size_t nr) = __write_to_log_init;
Mark Salyzyn018a96d2016-03-01 13:45:42 -080042
43/*
44 * This is used by the C++ code to decide if it should write logs through
45 * the C code. Basically, if /dev/socket/logd is available, we're running in
46 * the simulator rather than a desktop tool and want to use the device.
47 */
48static enum {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080049 kLogUninitialized,
50 kLogNotAvailable,
51 kLogAvailable
Mark Salyzyn018a96d2016-03-01 13:45:42 -080052} g_log_status = kLogUninitialized;
53
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080054static int check_log_uid_permissions() {
Dan Willemsen0910d2d2016-11-29 13:39:55 -080055#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080056 uid_t uid = __android_log_uid();
Mark Salyzync33103c2016-03-28 16:20:29 -070057
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080058 /* Matches clientHasLogCredentials() in logd */
59 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) {
60 uid = geteuid();
Mark Salyzync33103c2016-03-28 16:20:29 -070061 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080062 gid_t gid = getgid();
63 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) {
64 gid = getegid();
65 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) {
66 int num_groups;
67 gid_t* groups;
Mark Salyzync33103c2016-03-28 16:20:29 -070068
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080069 num_groups = getgroups(0, NULL);
70 if (num_groups <= 0) {
71 return -EPERM;
72 }
73 groups = calloc(num_groups, sizeof(gid_t));
74 if (!groups) {
75 return -ENOMEM;
76 }
77 num_groups = getgroups(num_groups, groups);
78 while (num_groups > 0) {
79 if (groups[num_groups - 1] == AID_LOG) {
80 break;
Mark Salyzync33103c2016-03-28 16:20:29 -070081 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080082 --num_groups;
83 }
84 free(groups);
85 if (num_groups <= 0) {
86 return -EPERM;
87 }
Mark Salyzync33103c2016-03-28 16:20:29 -070088 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080089 }
Mark Salyzync33103c2016-03-28 16:20:29 -070090 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080091 }
Mark Salyzync33103c2016-03-28 16:20:29 -070092#endif
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080093 return 0;
Mark Salyzync33103c2016-03-28 16:20:29 -070094}
95
96static void __android_log_cache_available(
Mark Salyzyn2ed51d72017-03-09 08:09:43 -080097 struct android_log_transport_write* node) {
98 size_t i;
Mark Salyzync33103c2016-03-28 16:20:29 -070099
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800100 if (node->logMask) {
101 return;
102 }
Mark Salyzync33103c2016-03-28 16:20:29 -0700103
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800104 for (i = LOG_ID_MIN; i < LOG_ID_MAX; ++i) {
105 if (node->write && (i != LOG_ID_KERNEL) &&
106 ((i != LOG_ID_SECURITY) || (check_log_uid_permissions() == 0)) &&
107 (!node->available || ((*node->available)(i) >= 0))) {
108 node->logMask |= 1 << i;
Mark Salyzync33103c2016-03-28 16:20:29 -0700109 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800110 }
Mark Salyzync33103c2016-03-28 16:20:29 -0700111}
112
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800113LIBLOG_ABI_PUBLIC int __android_log_dev_available() {
114 struct android_log_transport_write* node;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800115
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800116 if (list_empty(&__android_log_transport_write)) {
117 return kLogUninitialized;
118 }
Mark Salyzync33103c2016-03-28 16:20:29 -0700119
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800120 write_transport_for_each(node, &__android_log_transport_write) {
121 __android_log_cache_available(node);
122 if (node->logMask) {
123 return kLogAvailable;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800124 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800125 }
126 return kLogNotAvailable;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800127}
Mark Salyzynba1a7982016-09-13 07:28:21 -0700128
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800129#if defined(__ANDROID__)
Mark Salyzynba1a7982016-09-13 07:28:21 -0700130static atomic_uintptr_t tagMap;
131#endif
132
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700133/*
134 * Release any logger resources. A new log write will immediately re-acquire.
135 */
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800136LIBLOG_ABI_PUBLIC void __android_log_close() {
137 struct android_log_transport_write* transport;
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800138#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800139 EventTagMap* m;
Mark Salyzynba1a7982016-09-13 07:28:21 -0700140#endif
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700141
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800142 __android_log_lock();
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700143
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800144 write_to_log = __write_to_log_init;
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700145
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800146 /*
147 * Threads that are actively writing at this point are not held back
148 * by a lock and are at risk of dropping the messages with a return code
149 * -EBADF. Prefer to return error code than add the overhead of a lock to
150 * each log writing call to guarantee delivery. In addition, anyone
151 * calling this is doing so to release the logging resources and shut down,
152 * for them to do so with outstanding log requests in other threads is a
153 * disengenuous use of this function.
154 */
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700155
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800156 write_transport_for_each(transport, &__android_log_persist_write) {
157 if (transport->close) {
158 (*transport->close)();
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700159 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800160 }
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700161
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800162 write_transport_for_each(transport, &__android_log_transport_write) {
163 if (transport->close) {
164 (*transport->close)();
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700165 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800166 }
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700167
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800168 __android_log_config_write_close();
Mark Salyzyn71002882016-03-08 16:18:26 -0800169
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800170#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800171 /*
172 * Additional risk here somewhat mitigated by immediately unlock flushing
173 * the processor cache. The multi-threaded race that we choose to accept,
174 * to minimize locking, is an atomic_load in a writer picking up a value
175 * just prior to entering this routine. There will be an use after free.
176 *
177 * Again, anyone calling this is doing so to release the logging resources
178 * is most probably going to quiesce then shut down; or to restart after
179 * a fork so the risk should be non-existent. For this reason we
180 * choose a mitigation stance for efficiency instead of incuring the cost
181 * of a lock for every log write.
182 */
183 m = (EventTagMap*)atomic_exchange(&tagMap, (uintptr_t)0);
Mark Salyzynba1a7982016-09-13 07:28:21 -0700184#endif
185
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800186 __android_log_unlock();
Mark Salyzynba1a7982016-09-13 07:28:21 -0700187
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800188#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800189 if (m != (EventTagMap*)(uintptr_t)-1LL) android_closeEventTagMap(m);
Mark Salyzynba1a7982016-09-13 07:28:21 -0700190#endif
Mark Salyzyndf7a4c62016-08-23 10:23:36 -0700191}
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800192
193/* log_init_lock assumed */
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800194static int __write_to_log_initialize() {
195 struct android_log_transport_write* transport;
196 struct listnode* n;
197 int i = 0, ret = 0;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800198
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800199 __android_log_config_write();
200 write_transport_for_each_safe(transport, n, &__android_log_transport_write) {
201 __android_log_cache_available(transport);
202 if (!transport->logMask) {
203 list_remove(&transport->node);
204 continue;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800205 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800206 if (!transport->open || ((*transport->open)() < 0)) {
207 if (transport->close) {
208 (*transport->close)();
209 }
210 list_remove(&transport->node);
211 continue;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800212 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800213 ++ret;
214 }
215 write_transport_for_each_safe(transport, n, &__android_log_persist_write) {
216 __android_log_cache_available(transport);
217 if (!transport->logMask) {
218 list_remove(&transport->node);
219 continue;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800220 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800221 if (!transport->open || ((*transport->open)() < 0)) {
222 if (transport->close) {
223 (*transport->close)();
224 }
225 list_remove(&transport->node);
226 continue;
227 }
228 ++i;
229 }
230 if (!ret && !i) {
231 return -ENODEV;
232 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800233
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800234 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800235}
236
237/*
238 * Extract a 4-byte value from a byte stream. le32toh open coded
239 */
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800240static inline uint32_t get4LE(const uint8_t* src) {
241 return src[0] | (src[1] << 8) | (src[2] << 16) | (src[3] << 24);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800242}
243
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800244static int __write_to_log_daemon(log_id_t log_id, struct iovec* vec, size_t nr) {
245 struct android_log_transport_write* node;
Mark Salyzyndf7a6222018-03-07 10:42:06 -0800246 int ret, save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800247 struct timespec ts;
248 size_t len, i;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800249
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800250 for (len = i = 0; i < nr; ++i) {
251 len += vec[i].iov_len;
252 }
253 if (!len) {
254 return -EINVAL;
255 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800256
Mark Salyzyndf7a6222018-03-07 10:42:06 -0800257 save_errno = errno;
Dan Willemsen0910d2d2016-11-29 13:39:55 -0800258#if defined(__ANDROID__)
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800259 clock_gettime(android_log_clockid(), &ts);
Mark Salyzyn142b43d2016-12-28 10:30:57 -0800260
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800261 if (log_id == LOG_ID_SECURITY) {
262 if (vec[0].iov_len < 4) {
Mark Salyzyndf7a6222018-03-07 10:42:06 -0800263 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800264 return -EINVAL;
265 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800266
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800267 ret = check_log_uid_permissions();
268 if (ret < 0) {
Mark Salyzyndf7a6222018-03-07 10:42:06 -0800269 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800270 return ret;
271 }
272 if (!__android_log_security()) {
273 /* If only we could reset downstream logd counter */
Mark Salyzyndf7a6222018-03-07 10:42:06 -0800274 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800275 return -EPERM;
276 }
Yao Chen025f05a2017-12-01 15:48:19 -0800277 } else if (log_id == LOG_ID_EVENTS || log_id == LOG_ID_STATS) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800278 const char* tag;
279 size_t len;
280 EventTagMap *m, *f;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800281
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800282 if (vec[0].iov_len < 4) {
Mark Salyzyndf7a6222018-03-07 10:42:06 -0800283 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800284 return -EINVAL;
285 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800286
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800287 tag = NULL;
288 len = 0;
289 f = NULL;
290 m = (EventTagMap*)atomic_load(&tagMap);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800291
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800292 if (!m) {
293 ret = __android_log_trylock();
294 m = (EventTagMap*)atomic_load(&tagMap); /* trylock flush cache */
295 if (!m) {
296 m = android_openEventTagMap(NULL);
297 if (ret) { /* trylock failed, use local copy, mark for close */
298 f = m;
299 } else {
300 if (!m) { /* One chance to open map file */
301 m = (EventTagMap*)(uintptr_t)-1LL;
302 }
303 atomic_store(&tagMap, (uintptr_t)m);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800304 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800305 }
306 if (!ret) { /* trylock succeeded, unlock */
307 __android_log_unlock();
308 }
309 }
310 if (m && (m != (EventTagMap*)(uintptr_t)-1LL)) {
311 tag = android_lookupEventTag_len(m, &len, get4LE(vec[0].iov_base));
312 }
313 ret = __android_log_is_loggable_len(ANDROID_LOG_INFO, tag, len,
314 ANDROID_LOG_VERBOSE);
315 if (f) { /* local copy marked for close */
316 android_closeEventTagMap(f);
317 }
318 if (!ret) {
Mark Salyzyndf7a6222018-03-07 10:42:06 -0800319 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800320 return -EPERM;
321 }
322 } else {
323 /* Validate the incoming tag, tag content can not split across iovec */
324 char prio = ANDROID_LOG_VERBOSE;
325 const char* tag = vec[0].iov_base;
326 size_t len = vec[0].iov_len;
327 if (!tag) {
328 len = 0;
329 }
330 if (len > 0) {
331 prio = *tag;
332 if (len > 1) {
333 --len;
334 ++tag;
335 } else {
336 len = vec[1].iov_len;
337 tag = ((const char*)vec[1].iov_base);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800338 if (!tag) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800339 len = 0;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800340 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800341 }
342 }
343 /* tag must be nul terminated */
344 if (tag && strnlen(tag, len) >= len) {
345 tag = NULL;
346 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800347
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800348 if (!__android_log_is_loggable_len(prio, tag, len - 1, ANDROID_LOG_VERBOSE)) {
Mark Salyzyndf7a6222018-03-07 10:42:06 -0800349 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800350 return -EPERM;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800351 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800352 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800353#else
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800354 /* simulate clock_gettime(CLOCK_REALTIME, &ts); */
355 {
356 struct timeval tv;
357 gettimeofday(&tv, NULL);
358 ts.tv_sec = tv.tv_sec;
359 ts.tv_nsec = tv.tv_usec * 1000;
360 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800361#endif
362
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800363 ret = 0;
364 i = 1 << log_id;
365 write_transport_for_each(node, &__android_log_transport_write) {
366 if (node->logMask & i) {
367 ssize_t retval;
368 retval = (*node->write)(log_id, &ts, vec, nr);
369 if (ret >= 0) {
370 ret = retval;
371 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800372 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800373 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800374
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800375 write_transport_for_each(node, &__android_log_persist_write) {
376 if (node->logMask & i) {
377 (void)(*node->write)(log_id, &ts, vec, nr);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800378 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800379 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800380
Mark Salyzyndf7a6222018-03-07 10:42:06 -0800381 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800382 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800383}
384
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800385static int __write_to_log_init(log_id_t log_id, struct iovec* vec, size_t nr) {
Mark Salyzyndf7a6222018-03-07 10:42:06 -0800386 int ret, save_errno = errno;
387
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800388 __android_log_lock();
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800389
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800390 if (write_to_log == __write_to_log_init) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800391 ret = __write_to_log_initialize();
392 if (ret < 0) {
393 __android_log_unlock();
394 if (!list_empty(&__android_log_persist_write)) {
395 __write_to_log_daemon(log_id, vec, nr);
396 }
Mark Salyzyndf7a6222018-03-07 10:42:06 -0800397 errno = save_errno;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800398 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800399 }
400
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800401 write_to_log = __write_to_log_daemon;
402 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800403
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800404 __android_log_unlock();
405
Mark Salyzyndf7a6222018-03-07 10:42:06 -0800406 ret = write_to_log(log_id, vec, nr);
407 errno = save_errno;
408 return ret;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800409}
410
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800411LIBLOG_ABI_PUBLIC int __android_log_write(int prio, const char* tag,
412 const char* msg) {
413 return __android_log_buf_write(LOG_ID_MAIN, prio, tag, msg);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800414}
415
416LIBLOG_ABI_PUBLIC int __android_log_buf_write(int bufID, int prio,
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800417 const char* tag, const char* msg) {
418 struct iovec vec[3];
419 char tmp_tag[32];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800420
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800421 if (!tag) tag = "";
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800422
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800423 /* XXX: This needs to go! */
Mark Salyzyn525b34d2017-03-28 09:49:53 -0700424 if (bufID != LOG_ID_RADIO) {
425 switch (tag[0]) {
426 case 'H':
427 if (strcmp(tag + 1, "HTC_RIL" + 1)) break;
428 goto inform;
429 case 'R':
430 /* Any log tag with "RIL" as the prefix */
431 if (strncmp(tag + 1, "RIL" + 1, strlen("RIL") - 1)) break;
432 goto inform;
433 case 'Q':
434 /* Any log tag with "QC_RIL" as the prefix */
435 if (strncmp(tag + 1, "QC_RIL" + 1, strlen("QC_RIL") - 1)) break;
436 goto inform;
437 case 'I':
438 /* Any log tag with "IMS" as the prefix */
439 if (strncmp(tag + 1, "IMS" + 1, strlen("IMS") - 1)) break;
440 goto inform;
441 case 'A':
442 if (strcmp(tag + 1, "AT" + 1)) break;
443 goto inform;
444 case 'G':
445 if (strcmp(tag + 1, "GSM" + 1)) break;
446 goto inform;
447 case 'S':
448 if (strcmp(tag + 1, "STK" + 1) && strcmp(tag + 1, "SMS" + 1)) break;
449 goto inform;
450 case 'C':
451 if (strcmp(tag + 1, "CDMA" + 1)) break;
452 goto inform;
453 case 'P':
454 if (strcmp(tag + 1, "PHONE" + 1)) break;
455 /* FALLTHRU */
456 inform:
457 bufID = LOG_ID_RADIO;
458 snprintf(tmp_tag, sizeof(tmp_tag), "use-Rlog/RLOG-%s", tag);
459 tag = tmp_tag;
460 /* FALLTHRU */
461 default:
462 break;
463 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800464 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800465
466#if __BIONIC__
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800467 if (prio == ANDROID_LOG_FATAL) {
468 android_set_abort_message(msg);
469 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800470#endif
471
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800472 vec[0].iov_base = (unsigned char*)&prio;
473 vec[0].iov_len = 1;
474 vec[1].iov_base = (void*)tag;
475 vec[1].iov_len = strlen(tag) + 1;
476 vec[2].iov_base = (void*)msg;
477 vec[2].iov_len = strlen(msg) + 1;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800478
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800479 return write_to_log(bufID, vec, 3);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800480}
481
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800482LIBLOG_ABI_PUBLIC int __android_log_vprint(int prio, const char* tag,
483 const char* fmt, va_list ap) {
484 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800485
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800486 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800487
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800488 return __android_log_write(prio, tag, buf);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800489}
490
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800491LIBLOG_ABI_PUBLIC int __android_log_print(int prio, const char* tag,
492 const char* fmt, ...) {
493 va_list ap;
494 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800495
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800496 va_start(ap, fmt);
497 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
498 va_end(ap);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800499
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800500 return __android_log_write(prio, tag, buf);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800501}
502
503LIBLOG_ABI_PUBLIC int __android_log_buf_print(int bufID, int prio,
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800504 const char* tag, const char* fmt,
505 ...) {
506 va_list ap;
507 char buf[LOG_BUF_SIZE];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800508
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800509 va_start(ap, fmt);
510 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
511 va_end(ap);
512
513 return __android_log_buf_write(bufID, prio, tag, buf);
514}
515
516LIBLOG_ABI_PUBLIC void __android_log_assert(const char* cond, const char* tag,
517 const char* fmt, ...) {
518 char buf[LOG_BUF_SIZE];
519
520 if (fmt) {
521 va_list ap;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800522 va_start(ap, fmt);
523 vsnprintf(buf, LOG_BUF_SIZE, fmt, ap);
524 va_end(ap);
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800525 } else {
526 /* Msg not provided, log condition. N.B. Do not use cond directly as
527 * format string as it could contain spurious '%' syntax (e.g.
528 * "%d" in "blocks%devs == 0").
529 */
530 if (cond)
531 snprintf(buf, LOG_BUF_SIZE, "Assertion failed: %s", cond);
532 else
533 strcpy(buf, "Unspecified assertion failed");
534 }
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800535
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800536 // Log assertion failures to stderr for the benefit of "adb shell" users
537 // and gtests (http://b/23675822).
538 struct iovec iov[2] = {
539 { buf, strlen(buf) }, { (char*)"\n", 1 },
540 };
541 TEMP_FAILURE_RETRY(writev(2, iov, 2));
542
543 __android_log_write(ANDROID_LOG_FATAL, tag, buf);
544 abort(); /* abort so we have a chance to debug the situation */
545 /* NOTREACHED */
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800546}
547
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800548LIBLOG_ABI_PUBLIC int __android_log_bwrite(int32_t tag, const void* payload,
549 size_t len) {
550 struct iovec vec[2];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800551
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800552 vec[0].iov_base = &tag;
553 vec[0].iov_len = sizeof(tag);
554 vec[1].iov_base = (void*)payload;
555 vec[1].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800556
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800557 return write_to_log(LOG_ID_EVENTS, vec, 2);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800558}
559
Stefan Lafon701a0652017-08-24 20:14:06 -0700560LIBLOG_ABI_PUBLIC int __android_log_stats_bwrite(int32_t tag,
561 const void* payload,
562 size_t len) {
563 struct iovec vec[2];
564
565 vec[0].iov_base = &tag;
566 vec[0].iov_len = sizeof(tag);
567 vec[1].iov_base = (void*)payload;
568 vec[1].iov_len = len;
569
570 return write_to_log(LOG_ID_STATS, vec, 2);
571}
572
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800573LIBLOG_ABI_PUBLIC int __android_log_security_bwrite(int32_t tag,
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800574 const void* payload,
575 size_t len) {
576 struct iovec vec[2];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800577
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800578 vec[0].iov_base = &tag;
579 vec[0].iov_len = sizeof(tag);
580 vec[1].iov_base = (void*)payload;
581 vec[1].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800582
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800583 return write_to_log(LOG_ID_SECURITY, vec, 2);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800584}
585
586/*
587 * Like __android_log_bwrite, but takes the type as well. Doesn't work
588 * for the general case where we're generating lists of stuff, but very
589 * handy if we just want to dump an integer into the log.
590 */
591LIBLOG_ABI_PUBLIC int __android_log_btwrite(int32_t tag, char type,
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800592 const void* payload, size_t len) {
593 struct iovec vec[3];
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800594
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800595 vec[0].iov_base = &tag;
596 vec[0].iov_len = sizeof(tag);
597 vec[1].iov_base = &type;
598 vec[1].iov_len = sizeof(type);
599 vec[2].iov_base = (void*)payload;
600 vec[2].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800601
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800602 return write_to_log(LOG_ID_EVENTS, vec, 3);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800603}
604
605/*
606 * Like __android_log_bwrite, but used for writing strings to the
607 * event log.
608 */
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800609LIBLOG_ABI_PUBLIC int __android_log_bswrite(int32_t tag, const char* payload) {
610 struct iovec vec[4];
611 char type = EVENT_TYPE_STRING;
612 uint32_t len = strlen(payload);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800613
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800614 vec[0].iov_base = &tag;
615 vec[0].iov_len = sizeof(tag);
616 vec[1].iov_base = &type;
617 vec[1].iov_len = sizeof(type);
618 vec[2].iov_base = &len;
619 vec[2].iov_len = sizeof(len);
620 vec[3].iov_base = (void*)payload;
621 vec[3].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800622
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800623 return write_to_log(LOG_ID_EVENTS, vec, 4);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800624}
625
626/*
627 * Like __android_log_security_bwrite, but used for writing strings to the
628 * security log.
629 */
630LIBLOG_ABI_PUBLIC int __android_log_security_bswrite(int32_t tag,
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800631 const char* payload) {
632 struct iovec vec[4];
633 char type = EVENT_TYPE_STRING;
634 uint32_t len = strlen(payload);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800635
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800636 vec[0].iov_base = &tag;
637 vec[0].iov_len = sizeof(tag);
638 vec[1].iov_base = &type;
639 vec[1].iov_len = sizeof(type);
640 vec[2].iov_base = &len;
641 vec[2].iov_len = sizeof(len);
642 vec[3].iov_base = (void*)payload;
643 vec[3].iov_len = len;
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800644
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800645 return write_to_log(LOG_ID_SECURITY, vec, 4);
Mark Salyzyn018a96d2016-03-01 13:45:42 -0800646}
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800647
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800648static int __write_to_log_null(log_id_t log_id, struct iovec* vec, size_t nr) {
649 size_t len, i;
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800650
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800651 if ((log_id < LOG_ID_MIN) || (log_id >= LOG_ID_MAX)) {
652 return -EINVAL;
653 }
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800654
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800655 for (len = i = 0; i < nr; ++i) {
656 len += vec[i].iov_len;
657 }
658 if (!len) {
659 return -EINVAL;
660 }
661 return len;
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800662}
663
664/* Following functions need access to our internal write_to_log status */
665
Mark Salyzyn81321a72017-03-09 07:28:29 -0800666LIBLOG_HIDDEN int __android_log_transport;
Mark Salyzyn71002882016-03-08 16:18:26 -0800667
Mark Salyzyn81321a72017-03-09 07:28:29 -0800668LIBLOG_ABI_PUBLIC int android_set_log_transport(int transport_flag) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800669 int retval;
Mark Salyzyn71002882016-03-08 16:18:26 -0800670
Mark Salyzyn81321a72017-03-09 07:28:29 -0800671 if (transport_flag < 0) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800672 return -EINVAL;
673 }
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800674
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800675 retval = LOGGER_NULL;
Mark Salyzyn71002882016-03-08 16:18:26 -0800676
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800677 __android_log_lock();
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800678
Mark Salyzyn81321a72017-03-09 07:28:29 -0800679 if (transport_flag & LOGGER_NULL) {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800680 write_to_log = __write_to_log_null;
Mark Salyzyn71002882016-03-08 16:18:26 -0800681
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800682 __android_log_unlock();
683
Mark Salyzyn71002882016-03-08 16:18:26 -0800684 return retval;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800685 }
686
Mark Salyzyn81321a72017-03-09 07:28:29 -0800687 __android_log_transport &= LOGGER_LOCAL | LOGGER_LOGD | LOGGER_STDERR;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800688
Mark Salyzyn81321a72017-03-09 07:28:29 -0800689 transport_flag &= LOGGER_LOCAL | LOGGER_LOGD | LOGGER_STDERR;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800690
Mark Salyzyn81321a72017-03-09 07:28:29 -0800691 if (__android_log_transport != transport_flag) {
692 __android_log_transport = transport_flag;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800693 __android_log_config_write_close();
694 __android_log_config_read_close();
695
696 write_to_log = __write_to_log_init;
697 /* generically we only expect these two values for write_to_log */
698 } else if ((write_to_log != __write_to_log_init) &&
699 (write_to_log != __write_to_log_daemon)) {
700 write_to_log = __write_to_log_init;
701 }
702
Mark Salyzyn81321a72017-03-09 07:28:29 -0800703 retval = __android_log_transport;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800704
705 __android_log_unlock();
706
707 return retval;
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800708}
709
Mark Salyzyn81321a72017-03-09 07:28:29 -0800710LIBLOG_ABI_PUBLIC int android_get_log_transport() {
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800711 int ret = LOGGER_DEFAULT;
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800712
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800713 __android_log_lock();
714 if (write_to_log == __write_to_log_null) {
715 ret = LOGGER_NULL;
716 } else {
Mark Salyzyn81321a72017-03-09 07:28:29 -0800717 __android_log_transport &= LOGGER_LOCAL | LOGGER_LOGD | LOGGER_STDERR;
718 ret = __android_log_transport;
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800719 if ((write_to_log != __write_to_log_init) &&
720 (write_to_log != __write_to_log_daemon)) {
721 ret = -EINVAL;
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800722 }
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800723 }
724 __android_log_unlock();
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800725
Mark Salyzyn2ed51d72017-03-09 08:09:43 -0800726 return ret;
Mark Salyzyn850d06e2015-02-04 12:39:57 -0800727}