Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2007-2016 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
Elliott Hughes | bb9d064 | 2023-06-30 10:21:02 -0700 | [diff] [blame] | 17 | #define _POSIX_THREAD_SAFE_FUNCTIONS // For mingw localtime_r(). |
| 18 | |
Tom Cherry | 77ddcd3 | 2020-01-27 08:35:13 -0800 | [diff] [blame] | 19 | #include "logger_write.h" |
| 20 | |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 21 | #include <errno.h> |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 22 | #include <inttypes.h> |
Tom Cherry | 03abfe3 | 2020-01-22 07:48:42 -0800 | [diff] [blame] | 23 | #include <libgen.h> |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 24 | #include <stdlib.h> |
| 25 | #include <string.h> |
| 26 | #include <sys/time.h> |
| 27 | |
| 28 | #ifdef __BIONIC__ |
| 29 | #include <android/set_abort_message.h> |
| 30 | #endif |
| 31 | |
Tom Cherry | aca5990 | 2020-03-09 12:43:18 -0700 | [diff] [blame] | 32 | #include <atomic> |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 33 | |
Tom Cherry | e6830da | 2020-01-27 13:49:26 -0800 | [diff] [blame] | 34 | #include <android-base/errno_restorer.h> |
Tom Cherry | 5bdb9c9 | 2020-01-14 09:52:10 -0800 | [diff] [blame] | 35 | #include <android-base/macros.h> |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 36 | #include <private/android_filesystem_config.h> |
| 37 | #include <private/android_logger.h> |
| 38 | |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 39 | #include "android/log.h" |
Tom Cherry | 03abfe3 | 2020-01-22 07:48:42 -0800 | [diff] [blame] | 40 | #include "log/log_read.h" |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 41 | #include "logger.h" |
Tom Cherry | ebebf69 | 2019-01-16 14:17:08 -0800 | [diff] [blame] | 42 | #include "uio.h" |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 43 | |
Tom Cherry | c377c7d | 2020-01-27 15:45:52 -0800 | [diff] [blame] | 44 | #ifdef __ANDROID__ |
Tom Cherry | d7df098 | 2020-01-08 15:18:26 -0800 | [diff] [blame] | 45 | #include "logd_writer.h" |
| 46 | #include "pmsg_writer.h" |
Tom Cherry | 0bb0104 | 2019-10-02 10:52:55 -0700 | [diff] [blame] | 47 | #endif |
Tom Cherry | 519b611 | 2019-10-01 13:05:58 -0700 | [diff] [blame] | 48 | |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 49 | #if defined(__APPLE__) |
| 50 | #include <pthread.h> |
| 51 | #elif defined(__linux__) && !defined(__ANDROID__) |
| 52 | #include <syscall.h> |
| 53 | #elif defined(_WIN32) |
| 54 | #include <windows.h> |
| 55 | #endif |
| 56 | |
Jiyong Park | 52bd812 | 2022-09-07 22:53:28 +0900 | [diff] [blame] | 57 | // The preferred way to access system properties is using android::base::GetProperty in libbase. |
| 58 | // However, adding dependency to libbase requires that if liblog was statically linked to a client, |
| 59 | // that client now has additional dependency to libbase as well because static dependencies of |
| 60 | // static library is not exported. (users of liblog.so however is fine). |
| 61 | #ifdef __ANDROID__ |
| 62 | #include <sys/system_properties.h> |
| 63 | #endif |
| 64 | |
Tom Cherry | e6830da | 2020-01-27 13:49:26 -0800 | [diff] [blame] | 65 | using android::base::ErrnoRestorer; |
| 66 | |
Tom Cherry | d7df098 | 2020-01-08 15:18:26 -0800 | [diff] [blame] | 67 | #define LOG_BUF_SIZE 1024 |
| 68 | |
Dan Willemsen | a00f44a | 2016-11-29 13:39:55 -0800 | [diff] [blame] | 69 | #if defined(__ANDROID__) |
Tom Cherry | bbe3429 | 2019-12-11 14:26:37 -0800 | [diff] [blame] | 70 | static int check_log_uid_permissions() { |
Tom Cherry | 366afd8 | 2020-01-08 15:34:14 -0800 | [diff] [blame] | 71 | uid_t uid = getuid(); |
Mark Salyzyn | b3db3cf | 2016-03-28 16:20:29 -0700 | [diff] [blame] | 72 | |
Rubin Xu | 24f69a1 | 2022-05-11 21:41:26 +0100 | [diff] [blame] | 73 | /* Matches clientCanWriteSecurityLog() in logd */ |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 74 | if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) { |
| 75 | uid = geteuid(); |
Mark Salyzyn | b3db3cf | 2016-03-28 16:20:29 -0700 | [diff] [blame] | 76 | if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) { |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 77 | gid_t gid = getgid(); |
| 78 | if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) { |
| 79 | gid = getegid(); |
| 80 | if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) { |
| 81 | int num_groups; |
| 82 | gid_t* groups; |
Mark Salyzyn | b3db3cf | 2016-03-28 16:20:29 -0700 | [diff] [blame] | 83 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 84 | num_groups = getgroups(0, NULL); |
| 85 | if (num_groups <= 0) { |
| 86 | return -EPERM; |
| 87 | } |
Tom Cherry | f623f02 | 2019-01-10 10:37:36 -0800 | [diff] [blame] | 88 | groups = static_cast<gid_t*>(calloc(num_groups, sizeof(gid_t))); |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 89 | if (!groups) { |
| 90 | return -ENOMEM; |
| 91 | } |
| 92 | num_groups = getgroups(num_groups, groups); |
| 93 | while (num_groups > 0) { |
Rubin Xu | 24f69a1 | 2022-05-11 21:41:26 +0100 | [diff] [blame] | 94 | if (groups[num_groups - 1] == AID_LOG || |
| 95 | groups[num_groups - 1] == AID_SECURITY_LOG_WRITER) { |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 96 | break; |
Mark Salyzyn | b3db3cf | 2016-03-28 16:20:29 -0700 | [diff] [blame] | 97 | } |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 98 | --num_groups; |
| 99 | } |
| 100 | free(groups); |
| 101 | if (num_groups <= 0) { |
| 102 | return -EPERM; |
| 103 | } |
Mark Salyzyn | b3db3cf | 2016-03-28 16:20:29 -0700 | [diff] [blame] | 104 | } |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 105 | } |
Mark Salyzyn | b3db3cf | 2016-03-28 16:20:29 -0700 | [diff] [blame] | 106 | } |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 107 | } |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 108 | return 0; |
Mark Salyzyn | b3db3cf | 2016-03-28 16:20:29 -0700 | [diff] [blame] | 109 | } |
Tom Cherry | bbe3429 | 2019-12-11 14:26:37 -0800 | [diff] [blame] | 110 | #endif |
Mark Salyzyn | b3db3cf | 2016-03-28 16:20:29 -0700 | [diff] [blame] | 111 | |
Mark Salyzyn | acf1f66 | 2016-08-23 10:23:36 -0700 | [diff] [blame] | 112 | /* |
| 113 | * Release any logger resources. A new log write will immediately re-acquire. |
| 114 | */ |
Tom Cherry | 3d6a878 | 2019-02-08 11:46:19 -0800 | [diff] [blame] | 115 | void __android_log_close() { |
Tom Cherry | c377c7d | 2020-01-27 15:45:52 -0800 | [diff] [blame] | 116 | #ifdef __ANDROID__ |
Tom Cherry | d7df098 | 2020-01-08 15:18:26 -0800 | [diff] [blame] | 117 | LogdClose(); |
| 118 | PmsgClose(); |
Tom Cherry | d7df098 | 2020-01-08 15:18:26 -0800 | [diff] [blame] | 119 | #endif |
Mark Salyzyn | acf1f66 | 2016-08-23 10:23:36 -0700 | [diff] [blame] | 120 | } |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 121 | |
Colin Cross | da4d6df | 2021-07-14 15:04:20 -0700 | [diff] [blame] | 122 | // BSD-based systems like Android/macOS have getprogname(). Others need us to provide one. |
| 123 | #if !defined(__APPLE__) && !defined(__BIONIC__) |
Tom Cherry | 03abfe3 | 2020-01-22 07:48:42 -0800 | [diff] [blame] | 124 | static const char* getprogname() { |
Colin Cross | da4d6df | 2021-07-14 15:04:20 -0700 | [diff] [blame] | 125 | #ifdef _WIN32 |
Tom Cherry | 03abfe3 | 2020-01-22 07:48:42 -0800 | [diff] [blame] | 126 | static bool first = true; |
| 127 | static char progname[MAX_PATH] = {}; |
| 128 | |
| 129 | if (first) { |
| 130 | char path[PATH_MAX + 1]; |
| 131 | DWORD result = GetModuleFileName(nullptr, path, sizeof(path) - 1); |
| 132 | if (result == 0 || result == sizeof(path) - 1) return ""; |
| 133 | path[PATH_MAX - 1] = 0; |
| 134 | |
| 135 | char* path_basename = basename(path); |
| 136 | |
| 137 | snprintf(progname, sizeof(progname), "%s", path_basename); |
| 138 | first = false; |
| 139 | } |
| 140 | |
| 141 | return progname; |
Colin Cross | da4d6df | 2021-07-14 15:04:20 -0700 | [diff] [blame] | 142 | #else |
| 143 | return program_invocation_short_name; |
Tom Cherry | 03abfe3 | 2020-01-22 07:48:42 -0800 | [diff] [blame] | 144 | #endif |
| 145 | } |
| 146 | #endif |
| 147 | |
| 148 | // It's possible for logging to happen during static initialization before our globals are |
| 149 | // initialized, so we place this std::string in a function such that it is initialized on the first |
Elliott Hughes | f5c76cd | 2021-03-04 16:17:53 -0800 | [diff] [blame] | 150 | // call. We use a pointer to avoid exit time destructors. |
Tom Cherry | 77ddcd3 | 2020-01-27 08:35:13 -0800 | [diff] [blame] | 151 | std::string& GetDefaultTag() { |
Elliott Hughes | f5c76cd | 2021-03-04 16:17:53 -0800 | [diff] [blame] | 152 | static std::string* default_tag = new std::string(getprogname()); |
| 153 | return *default_tag; |
Tom Cherry | 03abfe3 | 2020-01-22 07:48:42 -0800 | [diff] [blame] | 154 | } |
Tom Cherry | 03abfe3 | 2020-01-22 07:48:42 -0800 | [diff] [blame] | 155 | |
| 156 | void __android_log_set_default_tag(const char* tag) { |
Tom Cherry | 03abfe3 | 2020-01-22 07:48:42 -0800 | [diff] [blame] | 157 | GetDefaultTag().assign(tag, 0, LOGGER_ENTRY_MAX_PAYLOAD); |
| 158 | } |
| 159 | |
Tom Cherry | 6be0c70 | 2020-03-12 11:07:07 -0700 | [diff] [blame] | 160 | static std::atomic_int32_t minimum_log_priority = ANDROID_LOG_DEFAULT; |
| 161 | int32_t __android_log_set_minimum_priority(int32_t priority) { |
Tom Cherry | aca5990 | 2020-03-09 12:43:18 -0700 | [diff] [blame] | 162 | return minimum_log_priority.exchange(priority, std::memory_order_relaxed); |
Tom Cherry | 4004460 | 2020-01-16 15:58:02 -0800 | [diff] [blame] | 163 | } |
| 164 | |
Tom Cherry | 6be0c70 | 2020-03-12 11:07:07 -0700 | [diff] [blame] | 165 | int32_t __android_log_get_minimum_priority() { |
Tom Cherry | 4004460 | 2020-01-16 15:58:02 -0800 | [diff] [blame] | 166 | return minimum_log_priority; |
| 167 | } |
| 168 | |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 169 | #ifdef __ANDROID__ |
Jiyong Park | e68cbee | 2023-06-19 13:41:26 +0900 | [diff] [blame] | 170 | static __android_logger_function logger_function = __android_log_logd_logger; |
Jiyong Park | 52bd812 | 2022-09-07 22:53:28 +0900 | [diff] [blame] | 171 | #else |
Jiyong Park | e68cbee | 2023-06-19 13:41:26 +0900 | [diff] [blame] | 172 | static __android_logger_function logger_function = __android_log_stderr_logger; |
Jiyong Park | 52bd812 | 2022-09-07 22:53:28 +0900 | [diff] [blame] | 173 | #endif |
Jiyong Park | 52bd812 | 2022-09-07 22:53:28 +0900 | [diff] [blame] | 174 | |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 175 | void __android_log_set_logger(__android_logger_function logger) { |
Jiyong Park | e68cbee | 2023-06-19 13:41:26 +0900 | [diff] [blame] | 176 | logger_function = logger; |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 177 | } |
| 178 | |
| 179 | void __android_log_default_aborter(const char* abort_message) { |
| 180 | #ifdef __ANDROID__ |
| 181 | android_set_abort_message(abort_message); |
| 182 | #else |
| 183 | UNUSED(abort_message); |
| 184 | #endif |
| 185 | abort(); |
| 186 | } |
| 187 | |
| 188 | static __android_aborter_function aborter_function = __android_log_default_aborter; |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 189 | |
| 190 | void __android_log_set_aborter(__android_aborter_function aborter) { |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 191 | aborter_function = aborter; |
| 192 | } |
| 193 | |
| 194 | void __android_log_call_aborter(const char* abort_message) { |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 195 | aborter_function(abort_message); |
| 196 | } |
| 197 | |
| 198 | #ifdef __ANDROID__ |
Tom Cherry | bbe3429 | 2019-12-11 14:26:37 -0800 | [diff] [blame] | 199 | static int write_to_log(log_id_t log_id, struct iovec* vec, size_t nr) { |
Tom Cherry | e6830da | 2020-01-27 13:49:26 -0800 | [diff] [blame] | 200 | int ret; |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 201 | struct timespec ts; |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 202 | |
Tom Cherry | bbe3429 | 2019-12-11 14:26:37 -0800 | [diff] [blame] | 203 | if (log_id == LOG_ID_KERNEL) { |
| 204 | return -EINVAL; |
| 205 | } |
| 206 | |
Tom Cherry | a5ff7ae | 2020-04-08 14:36:05 -0700 | [diff] [blame] | 207 | clock_gettime(CLOCK_REALTIME, &ts); |
Mark Salyzyn | 2bc1048 | 2016-12-28 10:30:57 -0800 | [diff] [blame] | 208 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 209 | if (log_id == LOG_ID_SECURITY) { |
| 210 | if (vec[0].iov_len < 4) { |
| 211 | return -EINVAL; |
| 212 | } |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 213 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 214 | ret = check_log_uid_permissions(); |
| 215 | if (ret < 0) { |
| 216 | return ret; |
| 217 | } |
| 218 | if (!__android_log_security()) { |
| 219 | /* If only we could reset downstream logd counter */ |
| 220 | return -EPERM; |
| 221 | } |
Yao Chen | 36eacf8 | 2017-12-01 15:48:19 -0800 | [diff] [blame] | 222 | } else if (log_id == LOG_ID_EVENTS || log_id == LOG_ID_STATS) { |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 223 | if (vec[0].iov_len < 4) { |
| 224 | return -EINVAL; |
| 225 | } |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 226 | } |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 227 | |
Tom Cherry | d7df098 | 2020-01-08 15:18:26 -0800 | [diff] [blame] | 228 | ret = LogdWrite(log_id, &ts, vec, nr); |
| 229 | PmsgWrite(log_id, &ts, vec, nr); |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 230 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 231 | return ret; |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 232 | } |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 233 | #else |
| 234 | static int write_to_log(log_id_t, struct iovec*, size_t) { |
| 235 | // Non-Android text logs should go to __android_log_stderr_logger, not here. |
| 236 | // Non-Android binary logs are always dropped. |
| 237 | return 1; |
| 238 | } |
| 239 | #endif |
| 240 | |
| 241 | // Copied from base/threads.cpp |
| 242 | static uint64_t GetThreadId() { |
| 243 | #if defined(__BIONIC__) |
| 244 | return gettid(); |
| 245 | #elif defined(__APPLE__) |
| 246 | uint64_t tid; |
| 247 | pthread_threadid_np(NULL, &tid); |
| 248 | return tid; |
| 249 | #elif defined(__linux__) |
| 250 | return syscall(__NR_gettid); |
| 251 | #elif defined(_WIN32) |
| 252 | return GetCurrentThreadId(); |
| 253 | #endif |
| 254 | } |
| 255 | |
Jiyong Park | 52bd812 | 2022-09-07 22:53:28 +0900 | [diff] [blame] | 256 | static void filestream_logger(const struct __android_log_message* log_message, FILE* stream) { |
Jiyong Park | 207934d | 2023-06-23 13:51:53 +0900 | [diff] [blame] | 257 | struct timespec ts; |
| 258 | clock_gettime(CLOCK_REALTIME, &ts); |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 259 | |
Elliott Hughes | bb9d064 | 2023-06-30 10:21:02 -0700 | [diff] [blame] | 260 | struct tm now; |
Jiyong Park | 207934d | 2023-06-23 13:51:53 +0900 | [diff] [blame] | 261 | localtime_r(&ts.tv_sec, &now); |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 262 | |
Jiyong Park | 207934d | 2023-06-23 13:51:53 +0900 | [diff] [blame] | 263 | char timestamp[sizeof("mm-DD HH::MM::SS.mmm\0")]; |
| 264 | size_t n = strftime(timestamp, sizeof(timestamp), "%m-%d %H:%M:%S", &now); |
| 265 | snprintf(timestamp + n, sizeof(timestamp) - n, ".%03ld", ts.tv_nsec / (1000 * 1000)); |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 266 | |
| 267 | static const char log_characters[] = "XXVDIWEF"; |
| 268 | static_assert(arraysize(log_characters) - 1 == ANDROID_LOG_SILENT, |
| 269 | "Mismatch in size of log_characters and values in android_LogPriority"); |
Tom Cherry | 6be0c70 | 2020-03-12 11:07:07 -0700 | [diff] [blame] | 270 | int32_t priority = |
Tom Cherry | 781ee66 | 2020-03-11 11:07:13 -0700 | [diff] [blame] | 271 | log_message->priority > ANDROID_LOG_SILENT ? ANDROID_LOG_FATAL : log_message->priority; |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 272 | char priority_char = log_characters[priority]; |
| 273 | uint64_t tid = GetThreadId(); |
Jiyong Park | 207934d | 2023-06-23 13:51:53 +0900 | [diff] [blame] | 274 | const char* tag = log_message->tag ? log_message->tag : " nullptr"; |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 275 | |
Tom Cherry | 781ee66 | 2020-03-11 11:07:13 -0700 | [diff] [blame] | 276 | if (log_message->file != nullptr) { |
Jiyong Park | 207934d | 2023-06-23 13:51:53 +0900 | [diff] [blame] | 277 | fprintf(stream, "%s %5d %5" PRIu64 " %c %-8s: %s:%u %s\n", timestamp, getpid(), tid, |
| 278 | priority_char, tag, log_message->file, log_message->line, log_message->message); |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 279 | } else { |
Jiyong Park | 207934d | 2023-06-23 13:51:53 +0900 | [diff] [blame] | 280 | fprintf(stream, "%s %5d %5" PRIu64 " %c %-8s: %s\n", timestamp, getpid(), tid, priority_char, |
| 281 | tag, log_message->message); |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 282 | } |
| 283 | } |
| 284 | |
Jiyong Park | e68cbee | 2023-06-19 13:41:26 +0900 | [diff] [blame] | 285 | static const char* get_file_logger_path() { |
Jiyong Park | 52bd812 | 2022-09-07 22:53:28 +0900 | [diff] [blame] | 286 | #ifdef __ANDROID__ |
Jiyong Park | e68cbee | 2023-06-19 13:41:26 +0900 | [diff] [blame] | 287 | static const char* file_logger_path = []() { |
| 288 | static char path[PROP_VALUE_MAX] = {}; |
| 289 | if (__system_property_get("ro.log.file_logger.path", path) > 0) { |
| 290 | return path; |
Jiyong Park | 52bd812 | 2022-09-07 22:53:28 +0900 | [diff] [blame] | 291 | } |
Jiyong Park | e68cbee | 2023-06-19 13:41:26 +0900 | [diff] [blame] | 292 | return static_cast<char*>(nullptr); // means file_logger should not be used |
| 293 | }(); |
| 294 | return file_logger_path; |
| 295 | #else |
| 296 | return nullptr; |
Jiyong Park | 52bd812 | 2022-09-07 22:53:28 +0900 | [diff] [blame] | 297 | #endif |
Jiyong Park | e68cbee | 2023-06-19 13:41:26 +0900 | [diff] [blame] | 298 | } |
| 299 | |
| 300 | /* |
| 301 | * If ro.log.file_logger.path is set to a file, send log_message to the file instead. This is for |
| 302 | * Android-like environments where logd is not available; e.g. Microdroid. If the file is not |
| 303 | * accessible (but ro.log.file_logger.path is set anyway), stderr is chosen as the fallback. |
| 304 | * |
| 305 | * Returns true if log was sent to file. false, if not. |
| 306 | */ |
| 307 | static bool log_to_file_if_overridden(const struct __android_log_message* log_message) { |
| 308 | const char* file_logger_path = get_file_logger_path(); |
| 309 | if (file_logger_path == nullptr) return false; |
| 310 | |
| 311 | static FILE* stream = [&file_logger_path]() { |
| 312 | FILE* f = fopen(file_logger_path, "ae"); |
| 313 | if (f != nullptr) return f; |
| 314 | using namespace std::string_literals; |
| 315 | std::string err_msg = "Cannot open "s + file_logger_path + " for logging: (" + strerror(errno) + |
| 316 | "). Falling back to stderr"; |
| 317 | __android_log_message m = {sizeof(__android_log_message), |
| 318 | LOG_ID_DEFAULT, |
| 319 | ANDROID_LOG_WARN, |
| 320 | "liblog", |
| 321 | __FILE__, |
| 322 | __LINE__, |
| 323 | err_msg.c_str()}; |
| 324 | filestream_logger(&m, stderr); |
Jiyong Park | 52bd812 | 2022-09-07 22:53:28 +0900 | [diff] [blame] | 325 | return stderr; |
| 326 | }(); |
| 327 | filestream_logger(log_message, stream); |
Jiyong Park | e68cbee | 2023-06-19 13:41:26 +0900 | [diff] [blame] | 328 | return true; |
Jiyong Park | 52bd812 | 2022-09-07 22:53:28 +0900 | [diff] [blame] | 329 | } |
| 330 | |
| 331 | void __android_log_stderr_logger(const struct __android_log_message* log_message) { |
| 332 | filestream_logger(log_message, stderr); |
| 333 | } |
| 334 | |
Tom Cherry | 781ee66 | 2020-03-11 11:07:13 -0700 | [diff] [blame] | 335 | void __android_log_logd_logger(const struct __android_log_message* log_message) { |
Jiyong Park | e68cbee | 2023-06-19 13:41:26 +0900 | [diff] [blame] | 336 | if (log_to_file_if_overridden(log_message)) return; |
| 337 | |
Tom Cherry | 781ee66 | 2020-03-11 11:07:13 -0700 | [diff] [blame] | 338 | int buffer_id = log_message->buffer_id == LOG_ID_DEFAULT ? LOG_ID_MAIN : log_message->buffer_id; |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 339 | |
| 340 | struct iovec vec[3]; |
| 341 | vec[0].iov_base = |
Tom Cherry | 781ee66 | 2020-03-11 11:07:13 -0700 | [diff] [blame] | 342 | const_cast<unsigned char*>(reinterpret_cast<const unsigned char*>(&log_message->priority)); |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 343 | vec[0].iov_len = 1; |
Tom Cherry | 781ee66 | 2020-03-11 11:07:13 -0700 | [diff] [blame] | 344 | vec[1].iov_base = const_cast<void*>(static_cast<const void*>(log_message->tag)); |
| 345 | vec[1].iov_len = strlen(log_message->tag) + 1; |
| 346 | vec[2].iov_base = const_cast<void*>(static_cast<const void*>(log_message->message)); |
| 347 | vec[2].iov_len = strlen(log_message->message) + 1; |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 348 | |
| 349 | write_to_log(static_cast<log_id_t>(buffer_id), vec, 3); |
| 350 | } |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 351 | |
Tom Cherry | 3d6a878 | 2019-02-08 11:46:19 -0800 | [diff] [blame] | 352 | int __android_log_write(int prio, const char* tag, const char* msg) { |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 353 | return __android_log_buf_write(LOG_ID_MAIN, prio, tag, msg); |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 354 | } |
| 355 | |
Tom Cherry | 781ee66 | 2020-03-11 11:07:13 -0700 | [diff] [blame] | 356 | void __android_log_write_log_message(__android_log_message* log_message) { |
Tom Cherry | e6830da | 2020-01-27 13:49:26 -0800 | [diff] [blame] | 357 | ErrnoRestorer errno_restorer; |
| 358 | |
Tom Cherry | 781ee66 | 2020-03-11 11:07:13 -0700 | [diff] [blame] | 359 | if (log_message->buffer_id != LOG_ID_DEFAULT && log_message->buffer_id != LOG_ID_MAIN && |
| 360 | log_message->buffer_id != LOG_ID_SYSTEM && log_message->buffer_id != LOG_ID_RADIO && |
| 361 | log_message->buffer_id != LOG_ID_CRASH) { |
Tom Cherry | cbad0b9 | 2020-01-28 13:06:29 -0800 | [diff] [blame] | 362 | return; |
| 363 | } |
| 364 | |
Tom Cherry | 781ee66 | 2020-03-11 11:07:13 -0700 | [diff] [blame] | 365 | if (log_message->tag == nullptr) { |
Tom Cherry | 781ee66 | 2020-03-11 11:07:13 -0700 | [diff] [blame] | 366 | log_message->tag = GetDefaultTag().c_str(); |
Tom Cherry | 03abfe3 | 2020-01-22 07:48:42 -0800 | [diff] [blame] | 367 | } |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 368 | |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 369 | #if __BIONIC__ |
Tom Cherry | 781ee66 | 2020-03-11 11:07:13 -0700 | [diff] [blame] | 370 | if (log_message->priority == ANDROID_LOG_FATAL) { |
| 371 | android_set_abort_message(log_message->message); |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 372 | } |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 373 | #endif |
| 374 | |
Jiyong Park | e68cbee | 2023-06-19 13:41:26 +0900 | [diff] [blame] | 375 | logger_function(log_message); |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 376 | } |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 377 | |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 378 | int __android_log_buf_write(int bufID, int prio, const char* tag, const char* msg) { |
Tom Cherry | e6830da | 2020-01-27 13:49:26 -0800 | [diff] [blame] | 379 | ErrnoRestorer errno_restorer; |
| 380 | |
Tom Cherry | b9e0d5e | 2020-01-22 08:20:03 -0800 | [diff] [blame] | 381 | if (!__android_log_is_loggable(prio, tag, ANDROID_LOG_VERBOSE)) { |
Tom Cherry | bc593cb | 2020-04-16 11:20:29 -0700 | [diff] [blame] | 382 | return -EPERM; |
Tom Cherry | b9e0d5e | 2020-01-22 08:20:03 -0800 | [diff] [blame] | 383 | } |
| 384 | |
Tom Cherry | 781ee66 | 2020-03-11 11:07:13 -0700 | [diff] [blame] | 385 | __android_log_message log_message = { |
| 386 | sizeof(__android_log_message), bufID, prio, tag, nullptr, 0, msg}; |
| 387 | __android_log_write_log_message(&log_message); |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 388 | return 1; |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 389 | } |
| 390 | |
Tom Cherry | 3d6a878 | 2019-02-08 11:46:19 -0800 | [diff] [blame] | 391 | int __android_log_vprint(int prio, const char* tag, const char* fmt, va_list ap) { |
Tom Cherry | e6830da | 2020-01-27 13:49:26 -0800 | [diff] [blame] | 392 | ErrnoRestorer errno_restorer; |
| 393 | |
Tom Cherry | b9e0d5e | 2020-01-22 08:20:03 -0800 | [diff] [blame] | 394 | if (!__android_log_is_loggable(prio, tag, ANDROID_LOG_VERBOSE)) { |
Tom Cherry | bc593cb | 2020-04-16 11:20:29 -0700 | [diff] [blame] | 395 | return -EPERM; |
Tom Cherry | b9e0d5e | 2020-01-22 08:20:03 -0800 | [diff] [blame] | 396 | } |
| 397 | |
Tom Cherry | 99d7cc3 | 2020-02-21 15:06:46 -0800 | [diff] [blame] | 398 | __attribute__((uninitialized)) char buf[LOG_BUF_SIZE]; |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 399 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 400 | vsnprintf(buf, LOG_BUF_SIZE, fmt, ap); |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 401 | |
Tom Cherry | 781ee66 | 2020-03-11 11:07:13 -0700 | [diff] [blame] | 402 | __android_log_message log_message = { |
| 403 | sizeof(__android_log_message), LOG_ID_MAIN, prio, tag, nullptr, 0, buf}; |
| 404 | __android_log_write_log_message(&log_message); |
Tom Cherry | b9e0d5e | 2020-01-22 08:20:03 -0800 | [diff] [blame] | 405 | return 1; |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 406 | } |
| 407 | |
Tom Cherry | 3d6a878 | 2019-02-08 11:46:19 -0800 | [diff] [blame] | 408 | int __android_log_print(int prio, const char* tag, const char* fmt, ...) { |
Tom Cherry | e6830da | 2020-01-27 13:49:26 -0800 | [diff] [blame] | 409 | ErrnoRestorer errno_restorer; |
| 410 | |
Tom Cherry | b9e0d5e | 2020-01-22 08:20:03 -0800 | [diff] [blame] | 411 | if (!__android_log_is_loggable(prio, tag, ANDROID_LOG_VERBOSE)) { |
Tom Cherry | bc593cb | 2020-04-16 11:20:29 -0700 | [diff] [blame] | 412 | return -EPERM; |
Tom Cherry | b9e0d5e | 2020-01-22 08:20:03 -0800 | [diff] [blame] | 413 | } |
| 414 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 415 | va_list ap; |
Tom Cherry | 99d7cc3 | 2020-02-21 15:06:46 -0800 | [diff] [blame] | 416 | __attribute__((uninitialized)) char buf[LOG_BUF_SIZE]; |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 417 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 418 | va_start(ap, fmt); |
| 419 | vsnprintf(buf, LOG_BUF_SIZE, fmt, ap); |
| 420 | va_end(ap); |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 421 | |
Tom Cherry | 781ee66 | 2020-03-11 11:07:13 -0700 | [diff] [blame] | 422 | __android_log_message log_message = { |
| 423 | sizeof(__android_log_message), LOG_ID_MAIN, prio, tag, nullptr, 0, buf}; |
| 424 | __android_log_write_log_message(&log_message); |
Tom Cherry | b9e0d5e | 2020-01-22 08:20:03 -0800 | [diff] [blame] | 425 | return 1; |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 426 | } |
| 427 | |
Tom Cherry | 3d6a878 | 2019-02-08 11:46:19 -0800 | [diff] [blame] | 428 | int __android_log_buf_print(int bufID, int prio, const char* tag, const char* fmt, ...) { |
Tom Cherry | e6830da | 2020-01-27 13:49:26 -0800 | [diff] [blame] | 429 | ErrnoRestorer errno_restorer; |
| 430 | |
Tom Cherry | b9e0d5e | 2020-01-22 08:20:03 -0800 | [diff] [blame] | 431 | if (!__android_log_is_loggable(prio, tag, ANDROID_LOG_VERBOSE)) { |
Tom Cherry | bc593cb | 2020-04-16 11:20:29 -0700 | [diff] [blame] | 432 | return -EPERM; |
Tom Cherry | b9e0d5e | 2020-01-22 08:20:03 -0800 | [diff] [blame] | 433 | } |
| 434 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 435 | va_list ap; |
Tom Cherry | 99d7cc3 | 2020-02-21 15:06:46 -0800 | [diff] [blame] | 436 | __attribute__((uninitialized)) char buf[LOG_BUF_SIZE]; |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 437 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 438 | va_start(ap, fmt); |
| 439 | vsnprintf(buf, LOG_BUF_SIZE, fmt, ap); |
| 440 | va_end(ap); |
| 441 | |
Tom Cherry | 781ee66 | 2020-03-11 11:07:13 -0700 | [diff] [blame] | 442 | __android_log_message log_message = { |
| 443 | sizeof(__android_log_message), bufID, prio, tag, nullptr, 0, buf}; |
| 444 | __android_log_write_log_message(&log_message); |
Tom Cherry | b9e0d5e | 2020-01-22 08:20:03 -0800 | [diff] [blame] | 445 | return 1; |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 446 | } |
| 447 | |
Tom Cherry | 3d6a878 | 2019-02-08 11:46:19 -0800 | [diff] [blame] | 448 | void __android_log_assert(const char* cond, const char* tag, const char* fmt, ...) { |
Tom Cherry | 99d7cc3 | 2020-02-21 15:06:46 -0800 | [diff] [blame] | 449 | __attribute__((uninitialized)) char buf[LOG_BUF_SIZE]; |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 450 | |
| 451 | if (fmt) { |
| 452 | va_list ap; |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 453 | va_start(ap, fmt); |
| 454 | vsnprintf(buf, LOG_BUF_SIZE, fmt, ap); |
| 455 | va_end(ap); |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 456 | } else { |
| 457 | /* Msg not provided, log condition. N.B. Do not use cond directly as |
| 458 | * format string as it could contain spurious '%' syntax (e.g. |
| 459 | * "%d" in "blocks%devs == 0"). |
| 460 | */ |
| 461 | if (cond) |
| 462 | snprintf(buf, LOG_BUF_SIZE, "Assertion failed: %s", cond); |
| 463 | else |
| 464 | strcpy(buf, "Unspecified assertion failed"); |
| 465 | } |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 466 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 467 | // Log assertion failures to stderr for the benefit of "adb shell" users |
| 468 | // and gtests (http://b/23675822). |
Tom Cherry | ebebf69 | 2019-01-16 14:17:08 -0800 | [diff] [blame] | 469 | TEMP_FAILURE_RETRY(write(2, buf, strlen(buf))); |
| 470 | TEMP_FAILURE_RETRY(write(2, "\n", 1)); |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 471 | |
| 472 | __android_log_write(ANDROID_LOG_FATAL, tag, buf); |
Tom Cherry | c17613c | 2020-01-08 14:47:42 -0800 | [diff] [blame] | 473 | __android_log_call_aborter(buf); |
| 474 | abort(); |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 475 | } |
| 476 | |
Tom Cherry | 3d6a878 | 2019-02-08 11:46:19 -0800 | [diff] [blame] | 477 | int __android_log_bwrite(int32_t tag, const void* payload, size_t len) { |
Tom Cherry | e6830da | 2020-01-27 13:49:26 -0800 | [diff] [blame] | 478 | ErrnoRestorer errno_restorer; |
| 479 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 480 | struct iovec vec[2]; |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 481 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 482 | vec[0].iov_base = &tag; |
| 483 | vec[0].iov_len = sizeof(tag); |
| 484 | vec[1].iov_base = (void*)payload; |
| 485 | vec[1].iov_len = len; |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 486 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 487 | return write_to_log(LOG_ID_EVENTS, vec, 2); |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 488 | } |
| 489 | |
Tom Cherry | 3d6a878 | 2019-02-08 11:46:19 -0800 | [diff] [blame] | 490 | int __android_log_stats_bwrite(int32_t tag, const void* payload, size_t len) { |
Tom Cherry | e6830da | 2020-01-27 13:49:26 -0800 | [diff] [blame] | 491 | ErrnoRestorer errno_restorer; |
| 492 | |
Stefan Lafon | 5f25ab9 | 2017-08-24 20:14:06 -0700 | [diff] [blame] | 493 | struct iovec vec[2]; |
| 494 | |
| 495 | vec[0].iov_base = &tag; |
| 496 | vec[0].iov_len = sizeof(tag); |
| 497 | vec[1].iov_base = (void*)payload; |
| 498 | vec[1].iov_len = len; |
| 499 | |
| 500 | return write_to_log(LOG_ID_STATS, vec, 2); |
| 501 | } |
| 502 | |
Tom Cherry | 3d6a878 | 2019-02-08 11:46:19 -0800 | [diff] [blame] | 503 | int __android_log_security_bwrite(int32_t tag, const void* payload, size_t len) { |
Tom Cherry | e6830da | 2020-01-27 13:49:26 -0800 | [diff] [blame] | 504 | ErrnoRestorer errno_restorer; |
| 505 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 506 | struct iovec vec[2]; |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 507 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 508 | vec[0].iov_base = &tag; |
| 509 | vec[0].iov_len = sizeof(tag); |
| 510 | vec[1].iov_base = (void*)payload; |
| 511 | vec[1].iov_len = len; |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 512 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 513 | return write_to_log(LOG_ID_SECURITY, vec, 2); |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 514 | } |
| 515 | |
| 516 | /* |
| 517 | * Like __android_log_bwrite, but takes the type as well. Doesn't work |
| 518 | * for the general case where we're generating lists of stuff, but very |
| 519 | * handy if we just want to dump an integer into the log. |
| 520 | */ |
Tom Cherry | 3d6a878 | 2019-02-08 11:46:19 -0800 | [diff] [blame] | 521 | int __android_log_btwrite(int32_t tag, char type, const void* payload, size_t len) { |
Tom Cherry | e6830da | 2020-01-27 13:49:26 -0800 | [diff] [blame] | 522 | ErrnoRestorer errno_restorer; |
| 523 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 524 | struct iovec vec[3]; |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 525 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 526 | vec[0].iov_base = &tag; |
| 527 | vec[0].iov_len = sizeof(tag); |
| 528 | vec[1].iov_base = &type; |
| 529 | vec[1].iov_len = sizeof(type); |
| 530 | vec[2].iov_base = (void*)payload; |
| 531 | vec[2].iov_len = len; |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 532 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 533 | return write_to_log(LOG_ID_EVENTS, vec, 3); |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 534 | } |
| 535 | |
| 536 | /* |
| 537 | * Like __android_log_bwrite, but used for writing strings to the |
| 538 | * event log. |
| 539 | */ |
Tom Cherry | 3d6a878 | 2019-02-08 11:46:19 -0800 | [diff] [blame] | 540 | int __android_log_bswrite(int32_t tag, const char* payload) { |
Tom Cherry | e6830da | 2020-01-27 13:49:26 -0800 | [diff] [blame] | 541 | ErrnoRestorer errno_restorer; |
| 542 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 543 | struct iovec vec[4]; |
| 544 | char type = EVENT_TYPE_STRING; |
| 545 | uint32_t len = strlen(payload); |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 546 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 547 | vec[0].iov_base = &tag; |
| 548 | vec[0].iov_len = sizeof(tag); |
| 549 | vec[1].iov_base = &type; |
| 550 | vec[1].iov_len = sizeof(type); |
| 551 | vec[2].iov_base = &len; |
| 552 | vec[2].iov_len = sizeof(len); |
| 553 | vec[3].iov_base = (void*)payload; |
| 554 | vec[3].iov_len = len; |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 555 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 556 | return write_to_log(LOG_ID_EVENTS, vec, 4); |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 557 | } |
| 558 | |
| 559 | /* |
| 560 | * Like __android_log_security_bwrite, but used for writing strings to the |
| 561 | * security log. |
| 562 | */ |
Tom Cherry | 3d6a878 | 2019-02-08 11:46:19 -0800 | [diff] [blame] | 563 | int __android_log_security_bswrite(int32_t tag, const char* payload) { |
Tom Cherry | e6830da | 2020-01-27 13:49:26 -0800 | [diff] [blame] | 564 | ErrnoRestorer errno_restorer; |
| 565 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 566 | struct iovec vec[4]; |
| 567 | char type = EVENT_TYPE_STRING; |
| 568 | uint32_t len = strlen(payload); |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 569 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 570 | vec[0].iov_base = &tag; |
| 571 | vec[0].iov_len = sizeof(tag); |
| 572 | vec[1].iov_base = &type; |
| 573 | vec[1].iov_len = sizeof(type); |
| 574 | vec[2].iov_base = &len; |
| 575 | vec[2].iov_len = sizeof(len); |
| 576 | vec[3].iov_base = (void*)payload; |
| 577 | vec[3].iov_len = len; |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 578 | |
Mark Salyzyn | 6e31568 | 2017-03-09 08:09:43 -0800 | [diff] [blame] | 579 | return write_to_log(LOG_ID_SECURITY, vec, 4); |
Mark Salyzyn | dd9094a | 2016-03-01 13:45:42 -0800 | [diff] [blame] | 580 | } |