blob: c73fde845a6687477a2fdd3c0880fdc537b4221f [file] [log] [blame]
Mark Salyzyndd9094a2016-03-01 13:45:42 -08001/*
2 * Copyright (C) 2007-2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Tom Cherryf302b812019-11-18 15:13:47 -080017#include "logd_reader.h"
18
Mark Salyzyndd9094a2016-03-01 13:45:42 -080019#include <errno.h>
20#include <fcntl.h>
21#include <inttypes.h>
22#include <poll.h>
23#include <stdarg.h>
24#include <stdatomic.h>
25#include <stdio.h>
26#include <stdlib.h>
27#include <string.h>
Elliott Hughes764acf32019-10-02 12:27:03 -070028#include <sys/param.h>
Mark Salyzyn6e315682017-03-09 08:09:43 -080029#include <sys/socket.h>
Mark Salyzyndd9094a2016-03-01 13:45:42 -080030#include <sys/stat.h>
31#include <sys/types.h>
Mark Salyzyndd9094a2016-03-01 13:45:42 -080032#include <sys/un.h>
33#include <time.h>
34#include <unistd.h>
35
Tom Cherryc8c906e2019-12-06 11:01:51 -080036#include <string>
37
Tom Cherry9a92d572020-08-05 11:22:44 -070038#include <android-base/parseint.h>
Mark Salyzyndd9094a2016-03-01 13:45:42 -080039#include <private/android_logger.h>
40
Mark Salyzyndd9094a2016-03-01 13:45:42 -080041#include "logger.h"
42
Andrei Diea17379432023-10-11 15:04:17 +000043// Socket timeout in seconds. Accounts for tail operation which can take longer.
44#define LIBLOG_SOCK_TIMEOUT_S 5
45
Tom Cherry96e06ea2019-02-12 11:26:23 -080046// Connects to /dev/socket/<name> and returns the associated fd or returns -1 on error.
47// O_CLOEXEC is always set.
Tom Cherrye756d992020-08-04 17:41:47 -070048static int socket_local_client(const std::string& name, int type, bool timeout) {
Tom Cherry96e06ea2019-02-12 11:26:23 -080049 sockaddr_un addr = {.sun_family = AF_LOCAL};
Mark Salyzyndd9094a2016-03-01 13:45:42 -080050
Tom Cherry96e06ea2019-02-12 11:26:23 -080051 std::string path = "/dev/socket/" + name;
52 if (path.size() + 1 > sizeof(addr.sun_path)) {
53 return -1;
Mark Salyzyn6e315682017-03-09 08:09:43 -080054 }
Tom Cherry96e06ea2019-02-12 11:26:23 -080055 strlcpy(addr.sun_path, path.c_str(), sizeof(addr.sun_path));
Mark Salyzyndd9094a2016-03-01 13:45:42 -080056
Tom Cherry96e06ea2019-02-12 11:26:23 -080057 int fd = socket(AF_LOCAL, type | SOCK_CLOEXEC, 0);
Tom Cherry518ea212019-10-08 10:18:20 -070058 if (fd == -1) {
Mark Salyzyn6e315682017-03-09 08:09:43 -080059 return -1;
60 }
Mark Salyzyndd9094a2016-03-01 13:45:42 -080061
Tom Cherrye756d992020-08-04 17:41:47 -070062 if (timeout) {
63 // Sending and receiving messages should be instantaneous, but we don't want to wait forever if
Andrei Diea17379432023-10-11 15:04:17 +000064 // logd is hung, so we set a timeout.
65 struct timeval t = {LIBLOG_SOCK_TIMEOUT_S, 0};
Tom Cherrye756d992020-08-04 17:41:47 -070066 if (setsockopt(fd, SOL_SOCKET, SO_SNDTIMEO, &t, sizeof(t)) == -1) {
67 return -1;
68 }
69 if (setsockopt(fd, SOL_SOCKET, SO_RCVTIMEO, &t, sizeof(t)) == -1) {
70 return -1;
71 }
72 }
73
Tom Cherry96e06ea2019-02-12 11:26:23 -080074 if (connect(fd, reinterpret_cast<sockaddr*>(&addr), sizeof(addr)) == -1) {
75 close(fd);
76 return -1;
77 }
Mark Salyzyndd9094a2016-03-01 13:45:42 -080078
Tom Cherry96e06ea2019-02-12 11:26:23 -080079 return fd;
80}
Mark Salyzyndd9094a2016-03-01 13:45:42 -080081
82/* worker for sending the command to the logger */
Tom Cherryf459c582019-11-14 08:56:39 -080083ssize_t SendLogdControlMessage(char* buf, size_t buf_size) {
Mark Salyzyn6e315682017-03-09 08:09:43 -080084 ssize_t ret;
85 size_t len;
86 char* cp;
87 int errno_save = 0;
Tom Cherrye756d992020-08-04 17:41:47 -070088 int sock = socket_local_client("logd", SOCK_STREAM, true);
Mark Salyzyn6e315682017-03-09 08:09:43 -080089 if (sock < 0) {
90 return sock;
91 }
92
Mark Salyzyn6e315682017-03-09 08:09:43 -080093 len = strlen(buf) + 1;
94 ret = TEMP_FAILURE_RETRY(write(sock, buf, len));
95 if (ret <= 0) {
96 goto done;
97 }
98
99 len = buf_size;
100 cp = buf;
101 while ((ret = TEMP_FAILURE_RETRY(read(sock, cp, len))) > 0) {
Kalesh Singh262664f2023-08-09 13:10:45 -0700102 if ((size_t)ret == len) {
Mark Salyzyn6e315682017-03-09 08:09:43 -0800103 break;
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800104 }
105
Mark Salyzyn6e315682017-03-09 08:09:43 -0800106 len -= ret;
107 cp += ret;
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800108
Elliott Hughesa2c0c692021-11-16 18:31:45 -0800109 // Give other side 20ms to refill pipe.
110 struct pollfd p = {.fd = sock, .events = POLLIN};
Mark Salyzyn6e315682017-03-09 08:09:43 -0800111 ret = TEMP_FAILURE_RETRY(poll(&p, 1, 20));
112
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800113 if (ret <= 0) {
Mark Salyzyn6e315682017-03-09 08:09:43 -0800114 break;
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800115 }
116
Mark Salyzyn6e315682017-03-09 08:09:43 -0800117 if (!(p.revents & POLLIN)) {
118 ret = 0;
119 break;
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800120 }
Mark Salyzyn6e315682017-03-09 08:09:43 -0800121 }
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800122
Mark Salyzyn6e315682017-03-09 08:09:43 -0800123 if (ret >= 0) {
124 ret += buf_size - len;
125 }
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800126
127done:
Mark Salyzyn6e315682017-03-09 08:09:43 -0800128 if ((ret == -1) && errno) {
129 errno_save = errno;
130 }
131 close(sock);
132 if (errno_save) {
133 errno = errno_save;
134 }
135 return ret;
136}
137
Mark Salyzyn6e315682017-03-09 08:09:43 -0800138static int check_log_success(char* buf, ssize_t ret) {
139 if (ret < 0) {
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800140 return ret;
Mark Salyzyn6e315682017-03-09 08:09:43 -0800141 }
142
143 if (strncmp(buf, "success", 7)) {
144 errno = EINVAL;
145 return -1;
146 }
147
148 return 0;
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800149}
150
Tom Cherryf459c582019-11-14 08:56:39 -0800151int android_logger_clear(struct logger* logger) {
152 if (!android_logger_is_logd(logger)) {
153 return -EINVAL;
154 }
155 uint32_t log_id = android_logger_get_id(logger);
Mark Salyzyn6e315682017-03-09 08:09:43 -0800156 char buf[512];
Tom Cherryf459c582019-11-14 08:56:39 -0800157 snprintf(buf, sizeof(buf), "clear %" PRIu32, log_id);
Mark Salyzyn777ea342016-09-21 09:24:13 -0700158
Tom Cherryf459c582019-11-14 08:56:39 -0800159 return check_log_success(buf, SendLogdControlMessage(buf, sizeof(buf)));
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800160}
161
Tom Cherry9a92d572020-08-05 11:22:44 -0700162enum class LogSizeType : uint32_t {
163 kAllotted = 0,
164 kReadable,
165 kConsumed,
166};
167
168static long GetLogSize(struct logger* logger, LogSizeType type) {
Tom Cherryf459c582019-11-14 08:56:39 -0800169 if (!android_logger_is_logd(logger)) {
170 return -EINVAL;
171 }
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800172
Tom Cherryf459c582019-11-14 08:56:39 -0800173 uint32_t log_id = android_logger_get_id(logger);
174 char buf[512];
Tom Cherry9a92d572020-08-05 11:22:44 -0700175 switch (type) {
176 case LogSizeType::kAllotted:
177 snprintf(buf, sizeof(buf), "getLogSize %" PRIu32, log_id);
178 break;
179 case LogSizeType::kReadable:
180 snprintf(buf, sizeof(buf), "getLogSizeReadable %" PRIu32, log_id);
181 break;
182 case LogSizeType::kConsumed:
183 snprintf(buf, sizeof(buf), "getLogSizeUsed %" PRIu32, log_id);
184 break;
185 default:
186 abort();
187 }
Tom Cherryf459c582019-11-14 08:56:39 -0800188
189 ssize_t ret = SendLogdControlMessage(buf, sizeof(buf));
Mark Salyzyn6e315682017-03-09 08:09:43 -0800190 if (ret < 0) {
191 return ret;
192 }
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800193
Tom Cherry9a92d572020-08-05 11:22:44 -0700194 long size;
195 if (!android::base::ParseInt(buf, &size)) {
Mark Salyzyn6e315682017-03-09 08:09:43 -0800196 return -1;
197 }
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800198
Tom Cherry9a92d572020-08-05 11:22:44 -0700199 return size;
200}
201
202long android_logger_get_log_size(struct logger* logger) {
203 return GetLogSize(logger, LogSizeType::kAllotted);
204}
205
206long android_logger_get_log_readable_size(struct logger* logger) {
207 return GetLogSize(logger, LogSizeType::kReadable);
208}
209
210long android_logger_get_log_consumed_size(struct logger* logger) {
211 return GetLogSize(logger, LogSizeType::kConsumed);
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800212}
213
Tom Cherryf459c582019-11-14 08:56:39 -0800214int android_logger_set_log_size(struct logger* logger, unsigned long size) {
215 if (!android_logger_is_logd(logger)) {
216 return -EINVAL;
217 }
218
219 uint32_t log_id = android_logger_get_id(logger);
Mark Salyzyn6e315682017-03-09 08:09:43 -0800220 char buf[512];
Tom Cherryf459c582019-11-14 08:56:39 -0800221 snprintf(buf, sizeof(buf), "setLogSize %" PRIu32 " %lu", log_id, size);
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800222
Tom Cherryf459c582019-11-14 08:56:39 -0800223 return check_log_success(buf, SendLogdControlMessage(buf, sizeof(buf)));
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800224}
225
Tom Cherryf459c582019-11-14 08:56:39 -0800226int android_logger_get_log_version(struct logger*) {
227 return 4;
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800228}
229
Tom Cherryf459c582019-11-14 08:56:39 -0800230ssize_t android_logger_get_statistics(struct logger_list* logger_list, char* buf, size_t len) {
231 if (logger_list->mode & ANDROID_LOG_PSTORE) {
232 return -EINVAL;
233 }
234
Mark Salyzyn6e315682017-03-09 08:09:43 -0800235 char* cp = buf;
236 size_t remaining = len;
237 size_t n;
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800238
Mark Salyzyn6e315682017-03-09 08:09:43 -0800239 n = snprintf(cp, remaining, "getStatistics");
Elliott Hughes764acf32019-10-02 12:27:03 -0700240 n = MIN(n, remaining);
Mark Salyzyn6e315682017-03-09 08:09:43 -0800241 remaining -= n;
242 cp += n;
243
Tom Cherryf459c582019-11-14 08:56:39 -0800244 for (size_t log_id = 0; log_id < LOG_ID_MAX; ++log_id) {
245 if ((1 << log_id) & logger_list->log_mask) {
246 n = snprintf(cp, remaining, " %zu", log_id);
247 n = MIN(n, remaining);
248 remaining -= n;
249 cp += n;
250 }
Mark Salyzyn6e315682017-03-09 08:09:43 -0800251 }
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800252
Mark Salyzyn6e315682017-03-09 08:09:43 -0800253 if (logger_list->pid) {
254 snprintf(cp, remaining, " pid=%u", logger_list->pid);
255 }
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800256
Tom Cherryf459c582019-11-14 08:56:39 -0800257 return SendLogdControlMessage(buf, len);
258}
259ssize_t android_logger_get_prune_list(struct logger_list* logger_list, char* buf, size_t len) {
260 if (logger_list->mode & ANDROID_LOG_PSTORE) {
261 return -EINVAL;
262 }
263
264 snprintf(buf, len, "getPruneList");
265 return SendLogdControlMessage(buf, len);
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800266}
267
Tom Cherryc8c906e2019-12-06 11:01:51 -0800268int android_logger_set_prune_list(struct logger_list* logger_list, const char* buf, size_t len) {
Tom Cherryf459c582019-11-14 08:56:39 -0800269 if (logger_list->mode & ANDROID_LOG_PSTORE) {
270 return -EINVAL;
271 }
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800272
Tom Cherryc8c906e2019-12-06 11:01:51 -0800273 std::string cmd = "setPruneList " + std::string{buf, len};
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800274
Tom Cherryc8c906e2019-12-06 11:01:51 -0800275 return check_log_success(cmd.data(), SendLogdControlMessage(cmd.data(), cmd.size()));
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800276}
277
Tom Cherryf302b812019-11-18 15:13:47 -0800278static int logdOpen(struct logger_list* logger_list) {
Mark Salyzyn6e315682017-03-09 08:09:43 -0800279 char buffer[256], *cp, c;
Tom Cherryfc9d5c02019-10-08 09:05:26 -0700280 int ret, remaining, sock;
Andrei Diea6c602462023-09-05 08:49:24 +0000281 bool set_timeout;
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800282
Tom Cherryf302b812019-11-18 15:13:47 -0800283 sock = atomic_load(&logger_list->fd);
Mark Salyzyn6e315682017-03-09 08:09:43 -0800284 if (sock > 0) {
285 return sock;
286 }
Mark Salyzynceee2f52016-10-10 07:27:42 -0700287
Andrei Diea6c602462023-09-05 08:49:24 +0000288 /* Set timeouts for non-blocking mode but not if wrapping mode is also set.
289 * Wrapping mode intructs logd to wake the client when the log is about to
290 * wrap(get pruned) to minimize CPU usage so the socket should stay open for
291 * up to 2hours.*/
292 set_timeout = (logger_list->mode & ANDROID_LOG_NONBLOCK) &&
293 !(logger_list->mode & ANDROID_LOG_WRAP);
294
295 sock = socket_local_client("logdr", SOCK_SEQPACKET, set_timeout);
296
Mark Salyzyn6e315682017-03-09 08:09:43 -0800297 if (sock <= 0) {
298 if ((sock == -1) && errno) {
299 return -errno;
Mark Salyzynceee2f52016-10-10 07:27:42 -0700300 }
301 return sock;
Mark Salyzyn6e315682017-03-09 08:09:43 -0800302 }
303
Tom Cherryf623f022019-01-10 10:37:36 -0800304 strcpy(buffer, (logger_list->mode & ANDROID_LOG_NONBLOCK) ? "dumpAndClose" : "stream");
Mark Salyzyn6e315682017-03-09 08:09:43 -0800305 cp = buffer + strlen(buffer);
306
307 strcpy(cp, " lids");
308 cp += 5;
309 c = '=';
310 remaining = sizeof(buffer) - (cp - buffer);
Tom Cherryf459c582019-11-14 08:56:39 -0800311
312 for (size_t log_id = 0; log_id < LOG_ID_MAX; ++log_id) {
313 if ((1 << log_id) & logger_list->log_mask) {
314 ret = snprintf(cp, remaining, "%c%zu", c, log_id);
315 ret = MIN(ret, remaining);
316 remaining -= ret;
317 cp += ret;
318 c = ',';
319 }
Mark Salyzyn6e315682017-03-09 08:09:43 -0800320 }
321
322 if (logger_list->tail) {
323 ret = snprintf(cp, remaining, " tail=%u", logger_list->tail);
Elliott Hughes764acf32019-10-02 12:27:03 -0700324 ret = MIN(ret, remaining);
Mark Salyzyn6e315682017-03-09 08:09:43 -0800325 remaining -= ret;
326 cp += ret;
327 }
328
329 if (logger_list->start.tv_sec || logger_list->start.tv_nsec) {
330 if (logger_list->mode & ANDROID_LOG_WRAP) {
331 // ToDo: alternate API to allow timeout to be adjusted.
Tom Cherryf623f022019-01-10 10:37:36 -0800332 ret = snprintf(cp, remaining, " timeout=%u", ANDROID_LOG_WRAP_DEFAULT_TIMEOUT);
Elliott Hughes764acf32019-10-02 12:27:03 -0700333 ret = MIN(ret, remaining);
Mark Salyzyn6e315682017-03-09 08:09:43 -0800334 remaining -= ret;
335 cp += ret;
336 }
Tom Cherryf623f022019-01-10 10:37:36 -0800337 ret = snprintf(cp, remaining, " start=%" PRIu32 ".%09" PRIu32, logger_list->start.tv_sec,
338 logger_list->start.tv_nsec);
Elliott Hughes764acf32019-10-02 12:27:03 -0700339 ret = MIN(ret, remaining);
Mark Salyzyn6e315682017-03-09 08:09:43 -0800340 remaining -= ret;
341 cp += ret;
342 }
343
344 if (logger_list->pid) {
345 ret = snprintf(cp, remaining, " pid=%u", logger_list->pid);
Elliott Hughes764acf32019-10-02 12:27:03 -0700346 ret = MIN(ret, remaining);
Mark Salyzyn6e315682017-03-09 08:09:43 -0800347 cp += ret;
348 }
349
Tom Cherryfc9d5c02019-10-08 09:05:26 -0700350 ret = TEMP_FAILURE_RETRY(write(sock, buffer, cp - buffer));
351 int write_errno = errno;
Mark Salyzyn6e315682017-03-09 08:09:43 -0800352
353 if (ret <= 0) {
354 close(sock);
Tom Cherryfc9d5c02019-10-08 09:05:26 -0700355 if (ret == -1) {
356 return -write_errno;
Mark Salyzyn6e315682017-03-09 08:09:43 -0800357 }
358 if (ret == 0) {
359 return -EIO;
360 }
361 return ret;
362 }
363
Tom Cherryf302b812019-11-18 15:13:47 -0800364 ret = atomic_exchange(&logger_list->fd, sock);
Mark Salyzyn6e315682017-03-09 08:09:43 -0800365 if ((ret > 0) && (ret != sock)) {
366 close(ret);
367 }
368 return sock;
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800369}
370
371/* Read from the selected logs */
Tom Cherryf302b812019-11-18 15:13:47 -0800372int LogdRead(struct logger_list* logger_list, struct log_msg* log_msg) {
373 int ret = logdOpen(logger_list);
Mark Salyzyn6e315682017-03-09 08:09:43 -0800374 if (ret < 0) {
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800375 return ret;
Mark Salyzyn6e315682017-03-09 08:09:43 -0800376 }
377
Mark Salyzyn6e315682017-03-09 08:09:43 -0800378 /* NOTE: SOCK_SEQPACKET guarantees we read exactly one full entry */
Tom Cherryfc9d5c02019-10-08 09:05:26 -0700379 ret = TEMP_FAILURE_RETRY(recv(ret, log_msg, LOGGER_ENTRY_MAX_LEN, 0));
380 if ((logger_list->mode & ANDROID_LOG_NONBLOCK) && ret == 0) {
381 return -EAGAIN;
Mark Salyzyn6e315682017-03-09 08:09:43 -0800382 }
383
Tom Cherryfc9d5c02019-10-08 09:05:26 -0700384 if (ret == -1) {
385 return -errno;
Mark Salyzyn6e315682017-03-09 08:09:43 -0800386 }
387 return ret;
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800388}
389
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800390/* Close all the logs */
Tom Cherryf302b812019-11-18 15:13:47 -0800391void LogdClose(struct logger_list* logger_list) {
392 int sock = atomic_exchange(&logger_list->fd, -1);
Mark Salyzyn6e315682017-03-09 08:09:43 -0800393 if (sock > 0) {
394 close(sock);
395 }
Mark Salyzyndd9094a2016-03-01 13:45:42 -0800396}