blob: de0e64a56141081209ad5d52e63f607aef4ff7e0 [file] [log] [blame]
Mark Salyzyn12bac902014-02-26 09:50:16 -08001/*
2 * Copyright (C) 2012-2013 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Mark Salyzyn9addf592014-02-14 16:05:05 -080017#include <ctype.h>
Mark Salyzynbe90ba42016-12-29 07:26:30 -080018#include <inttypes.h>
Mark Salyzyn12bac902014-02-26 09:50:16 -080019#include <poll.h>
Tom Cherryc5c9eba2020-10-06 10:22:35 -070020#include <sched.h>
Mark Salyzyn4e5efdc2014-04-28 14:07:23 -070021#include <sys/prctl.h>
Mark Salyzyn12bac902014-02-26 09:50:16 -080022#include <sys/socket.h>
Mark Salyzyn2296d332016-02-23 08:55:43 -080023#include <sys/types.h>
Mark Salyzyn3f6151e2014-03-24 10:26:47 -070024
Tom Cherry5ecfbf02020-05-11 16:29:29 -070025#include <chrono>
26
Tom Cherry7e12f592020-06-03 09:23:49 -070027#include <android-base/logging.h>
Tom Cherryadf2e442020-05-14 19:25:05 -070028#include <android-base/stringprintf.h>
Wenhao Wangb1f6c6c2021-11-19 16:42:43 -080029#include <binder/IServiceManager.h>
30#include <binder/ProcessState.h>
Mark Salyzyn12bac902014-02-26 09:50:16 -080031#include <cutils/sockets.h>
Tom Cherry0281b202020-05-12 13:16:41 -070032#include <private/android_filesystem_config.h>
Mark Salyzyn8b8bfd22016-09-30 13:30:33 -070033#include <private/android_logger.h>
Mark Salyzyn12bac902014-02-26 09:50:16 -080034
Wenhao Wangb1f6c6c2021-11-19 16:42:43 -080035#include "LogdNativeService.h"
Mark Salyzyn1d21d542016-02-23 08:55:43 -080036#include "LogBuffer.h"
37#include "LogBufferElement.h"
Tom Cherry134096f2020-05-15 10:13:38 -070038#include "LogPermissions.h"
Mark Salyzyn1d21d542016-02-23 08:55:43 -080039#include "LogReader.h"
40#include "LogUtils.h"
Tom Cherryadf2e442020-05-14 19:25:05 -070041#include "LogWriter.h"
Mark Salyzyn12bac902014-02-26 09:50:16 -080042
Wenhao Wangb1f6c6c2021-11-19 16:42:43 -080043using android::defaultServiceManager;
44using android::ProcessState;
45using android::sp;
46using android::String16;
47
Tom Cherry3086c182020-05-04 11:13:55 -070048static bool CanReadSecurityLogs(SocketClient* client) {
49 return client->getUid() == AID_SYSTEM || client->getGid() == AID_SYSTEM;
50}
51
Tom Cherryadf2e442020-05-14 19:25:05 -070052static std::string SocketClientToName(SocketClient* client) {
53 return android::base::StringPrintf("pid %d, fd %d", client->getPid(), client->getSocket());
54}
55
Wenhao Wangb1f6c6c2021-11-19 16:42:43 -080056static bool InitLogdBinderServiceStatus(LogReaderList* reader_list) {
57 sp<LogdNativeService> service = new LogdNativeService(reader_list);
58 auto service_status = defaultServiceManager()->addService(String16("logd"), service);
59 if (service_status != android::OK) {
60 LOG(ERROR) << "Failed to add logd binder service.";
61 return false;
62 }
63
64 sp<ProcessState> proc(ProcessState::self());
65 proc->startThreadPool();
66 return true;
67}
68
69static bool GetLogdBinderServiceStatus(LogReaderList* reader_list) {
70 static bool service_status = InitLogdBinderServiceStatus(reader_list);
71 return service_status;
72}
73
Tom Cherryadf2e442020-05-14 19:25:05 -070074class SocketLogWriter : public LogWriter {
75 public:
Tom Cherry106b3a32020-05-28 21:03:43 -070076 SocketLogWriter(LogReader* reader, SocketClient* client, bool privileged)
77 : LogWriter(client->getUid(), privileged), reader_(reader), client_(client) {}
Tom Cherryadf2e442020-05-14 19:25:05 -070078
79 bool Write(const logger_entry& entry, const char* msg) override {
80 struct iovec iovec[2];
81 iovec[0].iov_base = const_cast<logger_entry*>(&entry);
82 iovec[0].iov_len = entry.hdr_size;
83 iovec[1].iov_base = const_cast<char*>(msg);
84 iovec[1].iov_len = entry.len;
85
86 return client_->sendDatav(iovec, 1 + (entry.len != 0)) == 0;
87 }
88
89 void Release() override {
90 reader_->release(client_);
91 client_->decRef();
92 }
93
94 void Shutdown() override { shutdown(client_->getSocket(), SHUT_RDWR); }
95
96 std::string name() const override { return SocketClientToName(client_); }
97
98 private:
99 LogReader* reader_;
100 SocketClient* client_;
101};
102
Tom Cherry5ecfbf02020-05-11 16:29:29 -0700103LogReader::LogReader(LogBuffer* logbuf, LogReaderList* reader_list)
104 : SocketListener(getLogSocket(), true), log_buffer_(logbuf), reader_list_(reader_list) {}
Mark Salyzyn12bac902014-02-26 09:50:16 -0800105
Tom Cherry06e478b2018-10-08 17:33:50 -0700106// Note returning false will release the SocketClient instance.
Mark Salyzyn65059532017-03-10 14:31:54 -0800107bool LogReader::onDataAvailable(SocketClient* cli) {
Mark Salyzynb4853952015-03-17 07:56:32 -0700108 static bool name_set;
109 if (!name_set) {
110 prctl(PR_SET_NAME, "logd.reader");
111 name_set = true;
112 }
Mark Salyzyn4e5efdc2014-04-28 14:07:23 -0700113
Mark Salyzyn12bac902014-02-26 09:50:16 -0800114 char buffer[255];
115
116 int len = read(cli->getSocket(), buffer, sizeof(buffer) - 1);
117 if (len <= 0) {
Tom Cherryadf2e442020-05-14 19:25:05 -0700118 DoSocketDelete(cli);
Mark Salyzyn12bac902014-02-26 09:50:16 -0800119 return false;
120 }
121 buffer[len] = '\0';
122
Tom Cherryadf2e442020-05-14 19:25:05 -0700123 // Clients are only allowed to send one command, disconnect them if they send another.
124 if (DoSocketDelete(cli)) {
125 return false;
Tom Cherry06e478b2018-10-08 17:33:50 -0700126 }
Tom Cherry06e478b2018-10-08 17:33:50 -0700127
Mark Salyzyn12bac902014-02-26 09:50:16 -0800128 unsigned long tail = 0;
129 static const char _tail[] = " tail=";
Mark Salyzyn65059532017-03-10 14:31:54 -0800130 char* cp = strstr(buffer, _tail);
Mark Salyzyn12bac902014-02-26 09:50:16 -0800131 if (cp) {
132 tail = atol(cp + sizeof(_tail) - 1);
133 }
134
Mark Salyzyn9addf592014-02-14 16:05:05 -0800135 log_time start(log_time::EPOCH);
136 static const char _start[] = " start=";
137 cp = strstr(buffer, _start);
138 if (cp) {
139 // Parse errors will result in current time
140 start.strptime(cp + sizeof(_start) - 1, "%s.%q");
141 }
142
Tom Cherry5ecfbf02020-05-11 16:29:29 -0700143 std::chrono::steady_clock::time_point deadline = {};
Mark Salyzync959c642015-11-30 11:35:56 -0800144 static const char _timeout[] = " timeout=";
145 cp = strstr(buffer, _timeout);
146 if (cp) {
Tom Cherry5ecfbf02020-05-11 16:29:29 -0700147 long timeout_seconds = atol(cp + sizeof(_timeout) - 1);
148 deadline = std::chrono::steady_clock::now() + std::chrono::seconds(timeout_seconds);
Mark Salyzync959c642015-11-30 11:35:56 -0800149 }
150
Mark Salyzyn12bac902014-02-26 09:50:16 -0800151 unsigned int logMask = -1;
152 static const char _logIds[] = " lids=";
153 cp = strstr(buffer, _logIds);
154 if (cp) {
155 logMask = 0;
156 cp += sizeof(_logIds) - 1;
Tom Cherry17b77582020-06-17 11:40:55 -0700157 while (*cp != '\0') {
Mark Salyzyn12bac902014-02-26 09:50:16 -0800158 int val = 0;
Mark Salyzyn9addf592014-02-14 16:05:05 -0800159 while (isdigit(*cp)) {
160 val = val * 10 + *cp - '0';
Mark Salyzyn12bac902014-02-26 09:50:16 -0800161 ++cp;
162 }
163 logMask |= 1 << val;
164 if (*cp != ',') {
165 break;
166 }
167 ++cp;
168 }
169 }
170
171 pid_t pid = 0;
172 static const char _pid[] = " pid=";
173 cp = strstr(buffer, _pid);
174 if (cp) {
175 pid = atol(cp + sizeof(_pid) - 1);
176 }
177
178 bool nonBlock = false;
Mark Salyzyn3eeec052016-12-02 10:08:48 -0800179 if (!fastcmp<strncmp>(buffer, "dumpAndClose", 12)) {
Mark Salyzyn1f068e92014-09-16 09:19:47 -0700180 // Allow writer to get some cycles, and wait for pending notifications
181 sched_yield();
Tom Cherryc5c9eba2020-10-06 10:22:35 -0700182 logd_lock.lock();
183 logd_lock.unlock();
Mark Salyzyn1f068e92014-09-16 09:19:47 -0700184 sched_yield();
Mark Salyzyn12bac902014-02-26 09:50:16 -0800185 nonBlock = true;
186 }
187
Tom Cherry3086c182020-05-04 11:13:55 -0700188 bool privileged = clientHasLogCredentials(cli);
189 bool can_read_security = CanReadSecurityLogs(cli);
Tom Cherry106b3a32020-05-28 21:03:43 -0700190 if (!can_read_security) {
191 logMask &= ~(1 << LOG_ID_SECURITY);
192 }
Tom Cherry3086c182020-05-04 11:13:55 -0700193
Tom Cherry106b3a32020-05-28 21:03:43 -0700194 std::unique_ptr<LogWriter> socket_log_writer(new SocketLogWriter(this, cli, privileged));
Tom Cherryadf2e442020-05-14 19:25:05 -0700195
Tom Cherryac228f12019-08-21 14:16:34 -0700196 uint64_t sequence = 1;
197 // Convert realtime to sequence number
198 if (start != log_time::EPOCH) {
Tom Cherrye7c73ef2020-05-04 17:25:34 -0700199 bool start_time_set = false;
Tom Cherrye7c73ef2020-05-04 17:25:34 -0700200 uint64_t last = sequence;
Tom Cherryd444ab42020-05-28 12:38:21 -0700201 auto log_find_start = [pid, start, &sequence, &start_time_set, &last](
202 log_id_t, pid_t element_pid, uint64_t element_sequence,
Tom Cherryca4b25d2020-05-28 20:02:42 -0700203 log_time element_realtime) -> FilterResult {
Tom Cherrybaa25a22020-05-27 14:43:19 -0700204 if (pid && pid != element_pid) {
Tom Cherryc92cbf62020-05-27 10:46:37 -0700205 return FilterResult::kSkip;
Mark Salyzyn69459632014-02-19 07:33:12 -0800206 }
Tom Cherrybaa25a22020-05-27 14:43:19 -0700207 if (start == element_realtime) {
208 sequence = element_sequence;
Tom Cherrye7c73ef2020-05-04 17:25:34 -0700209 start_time_set = true;
Tom Cherryc92cbf62020-05-27 10:46:37 -0700210 return FilterResult::kStop;
Tom Cherrya5ff7ae2020-04-08 14:36:05 -0700211 } else {
Tom Cherrybaa25a22020-05-27 14:43:19 -0700212 if (start < element_realtime) {
Tom Cherrye7c73ef2020-05-04 17:25:34 -0700213 sequence = last;
214 start_time_set = true;
Tom Cherryc92cbf62020-05-27 10:46:37 -0700215 return FilterResult::kStop;
Tom Cherrye7c73ef2020-05-04 17:25:34 -0700216 }
Tom Cherrybaa25a22020-05-27 14:43:19 -0700217 last = element_sequence;
Tom Cherrye7c73ef2020-05-04 17:25:34 -0700218 }
Tom Cherryc92cbf62020-05-27 10:46:37 -0700219 return FilterResult::kSkip;
Tom Cherrye7c73ef2020-05-04 17:25:34 -0700220 };
Tom Cherryc5c9eba2020-10-06 10:22:35 -0700221 auto lock = std::lock_guard{logd_lock};
Tom Cherryd444ab42020-05-28 12:38:21 -0700222 auto flush_to_state = log_buffer_->CreateFlushToState(sequence, logMask);
223 log_buffer_->FlushTo(socket_log_writer.get(), *flush_to_state, log_find_start);
Mark Salyzyn69459632014-02-19 07:33:12 -0800224
Tom Cherrye7c73ef2020-05-04 17:25:34 -0700225 if (!start_time_set) {
Tom Cherryac228f12019-08-21 14:16:34 -0700226 if (nonBlock) {
Tom Cherryac228f12019-08-21 14:16:34 -0700227 return false;
228 }
Tom Cherry0bf66db2020-05-21 13:56:33 -0700229 sequence = log_buffer_->sequence();
Mark Salyzyn69459632014-02-19 07:33:12 -0800230 }
Mark Salyzyn9addf592014-02-14 16:05:05 -0800231 }
232
Tom Cherry7e12f592020-06-03 09:23:49 -0700233 LOG(INFO) << android::base::StringPrintf(
Tom Cherryac228f12019-08-21 14:16:34 -0700234 "logdr: UID=%d GID=%d PID=%d %c tail=%lu logMask=%x pid=%d "
Tom Cherry7e12f592020-06-03 09:23:49 -0700235 "start=%" PRIu64 "ns deadline=%" PRIi64 "ns",
Tom Cherryac228f12019-08-21 14:16:34 -0700236 cli->getUid(), cli->getGid(), cli->getPid(), nonBlock ? 'n' : 'b', tail, logMask,
Tom Cherry5ecfbf02020-05-11 16:29:29 -0700237 (int)pid, start.nsec(), static_cast<int64_t>(deadline.time_since_epoch().count()));
Mark Salyzynbe90ba42016-12-29 07:26:30 -0800238
Tom Cherryac228f12019-08-21 14:16:34 -0700239 if (start == log_time::EPOCH) {
Tom Cherry5ecfbf02020-05-11 16:29:29 -0700240 deadline = {};
Tom Cherry38656ef2018-10-19 13:51:35 -0700241 }
242
Tom Cherryc5c9eba2020-10-06 10:22:35 -0700243 auto lock = std::lock_guard{logd_lock};
Tom Cherryadf2e442020-05-14 19:25:05 -0700244 auto entry = std::make_unique<LogReaderThread>(log_buffer_, reader_list_,
245 std::move(socket_log_writer), nonBlock, tail,
246 logMask, pid, start, sequence, deadline);
Tom Cherry06e478b2018-10-08 17:33:50 -0700247 // release client and entry reference counts once done
248 cli->incRef();
Wenhao Wangb1f6c6c2021-11-19 16:42:43 -0800249
250 entry->set_pending_reader_thread_key(cli->getUid(), cli->getGid(), cli->getPid(),
251 cli->getSocket());
252
253 bool only_read_event_logs = (logMask ^ (1 << LOG_ID_EVENTS)) == 0;
Wenhao Wang9b132732022-02-08 08:13:15 -0800254
255 // The logd access will be granted when any of the following three
256 // conditions is satisfied:
257 // 1. the client (native processes) is exempted from user consent check.
258 // 2. the client doesn't have log credentials and so can only access its own log data anyway
259 // 3. the client (for EventLog API) only wants to access the event log.
260 if (clientIsExemptedFromUserConsent(cli) || !clientHasLogCredentials(cli) ||
261 only_read_event_logs) {
262 reader_list_->AddAndRunThread(std::move(entry));
263 } else {
Wenhao Wangb1f6c6c2021-11-19 16:42:43 -0800264 if (GetLogdBinderServiceStatus(reader_list_)) {
265 reader_list_->AddPendingThread(std::move(entry));
266 } else {
267 // The logd binder service is not available, we are not able to
268 // check user consent. So we revoke the privileges.
269 entry->Revoke();
270 reader_list_->AddAndRunThread(std::move(entry));
271 }
Wenhao Wangb1f6c6c2021-11-19 16:42:43 -0800272 }
Mark Salyzyn2296d332016-02-23 08:55:43 -0800273
274 // Set acceptable upper limit to wait for slow reader processing b/27242723
275 struct timeval t = { LOGD_SNDTIMEO, 0 };
Mark Salyzyn65059532017-03-10 14:31:54 -0800276 setsockopt(cli->getSocket(), SOL_SOCKET, SO_SNDTIMEO, (const char*)&t,
277 sizeof(t));
Mark Salyzyn2296d332016-02-23 08:55:43 -0800278
Mark Salyzyn12bac902014-02-26 09:50:16 -0800279 return true;
280}
281
Tom Cherryadf2e442020-05-14 19:25:05 -0700282bool LogReader::DoSocketDelete(SocketClient* cli) {
283 auto cli_name = SocketClientToName(cli);
Tom Cherryc5c9eba2020-10-06 10:22:35 -0700284 auto lock = std::lock_guard{logd_lock};
Wenhao Wangb1f6c6c2021-11-19 16:42:43 -0800285 return reader_list_->ReleaseThreadByName(cli_name);
Mark Salyzyn12bac902014-02-26 09:50:16 -0800286}
Mark Salyzyn3f6151e2014-03-24 10:26:47 -0700287
288int LogReader::getLogSocket() {
289 static const char socketName[] = "logdr";
290 int sock = android_get_control_socket(socketName);
291
292 if (sock < 0) {
Mark Salyzyn65059532017-03-10 14:31:54 -0800293 sock = socket_local_server(
294 socketName, ANDROID_SOCKET_NAMESPACE_RESERVED, SOCK_SEQPACKET);
Mark Salyzyn3f6151e2014-03-24 10:26:47 -0700295 }
296
297 return sock;
298}