1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: t -*-
3 * Copyright (c) 2005-2008, The Android Open Source Project
4 * Copyright (c) 2012-2013 Samsung Electronics Co., Ltd.
6 * Licensed under the Apache License, Version 2.0 (the License);
7 * you may not use this file except in compliance with the License.
8 * You may obtain a copy of the License at
10 * http://www.apache.org/licenses/LICENSE-2.0
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
31 #include <dynamic_config.h>
33 #include <logcommon.h>
34 #include "logconfig.h"
35 #include "loglimiter.h"
37 #define DEFAULT_CONFIG_LIMITER false
38 #define DEFAULT_CONFIG_PLOG true
39 #define DEFAULT_CONFIG_DEBUGMODE 0
40 #define DEFAULT_CONFIG_LIMITER_APPLY_TO_ALL_BUFFERS 0
43 * @brief Points to a function which writes a log message
44 * @details The function pointed to depends on the backend used
45 * @param[in] log_id ID of the buffer to log to. Belongs to (LOG_ID_INVALID, LOG_ID_MAX) non-inclusive
46 * @param[in] prio Priority of the message.
47 * @param[in] tag The message tag, identifies the sender.
48 * @param[in] msg The contents of the message.
49 * @return Returns the number of bytes written on success and a negative error value on error.
50 * @see __dlog_init_backend
52 int (*write_to_log)(log_id_t log_id, log_priority prio, const char *tag, const char *msg) = NULL;
53 void (*destroy_backend)();
55 pthread_rwlock_t log_limiter_lock = PTHREAD_RWLOCK_INITIALIZER;
56 static pthread_mutex_t log_construction_lock = PTHREAD_MUTEX_INITIALIZER;
57 static bool is_initialized = false;
59 extern void __dlog_init_pipe(const struct log_config *conf);
60 extern void __dlog_init_android(const struct log_config *conf);
63 static bool dynamic_config;
64 static bool plog[LOG_ID_MAX];
65 static bool plog_default_values[LOG_ID_MAX];
68 static int fatal_assert;
69 static int limiter_apply_to_all_buffers;
71 static void __configure_limiter(struct log_config *config)
78 limiter = __log_limiter_create(config);
81 static int __configure_backend(struct log_config *config)
85 const char *const backend = log_config_get(config, "backend");
89 if (!strcmp(backend, "pipe"))
90 __dlog_init_pipe(config);
91 else if (!strcmp(backend, "logger"))
92 __dlog_init_android(config);
99 static void __set_plog_default_values()
101 for (int i = 0; i < NELEMS(plog); ++i)
102 plog_default_values[i] = plog[i];
105 static void __initialize_plog(const struct log_config *config)
109 const bool plog_default = log_config_get_boolean(config, "plog", DEFAULT_CONFIG_PLOG);
110 for (int i = 0; i < NELEMS(plog); ++i)
111 plog[i] = plog_default;
112 plog[LOG_ID_APPS] = true; // the default does not apply here for backward compatibility reasons.
113 __set_plog_default_values();
116 static void __configure_parameters(struct log_config *config)
120 __initialize_plog(config);
121 __update_plog(config);
122 __set_plog_default_values();
124 debugmode = log_config_get_int(config, "debugmode", DEFAULT_CONFIG_DEBUGMODE);
125 fatal_assert = access(DEBUGMODE_FILE, F_OK) != -1;
126 limiter = log_config_get_boolean(config, "limiter", DEFAULT_CONFIG_LIMITER);
127 limiter_apply_to_all_buffers = log_config_get_int(config,
128 "limiter_apply_to_all_buffers",
129 DEFAULT_CONFIG_LIMITER_APPLY_TO_ALL_BUFFERS);
132 void __update_plog(const struct log_config *conf)
136 for (int i = 0; i < NELEMS(plog); ++i) {
137 char key[MAX_CONF_KEY_LEN];
138 const int r = snprintf(key, sizeof key, "enable_%s", log_name_by_id((log_id_t)i));
141 plog[i] = log_config_get_boolean(conf, key, plog_default_values[i]);
146 * @brief Configure the library
147 * @details Reads relevant config values
148 * @remarks This is more or less a constructor, but there are some obstacles
149 * to using it as such (i.e. with attribute constructor):
151 * - some important pieces of the system link to dlog, they start very early
152 * such that dlog can't properly initialize (which lasts for program lifetime)
153 * but don't actually log anything until later on and would be fine under lazy
154 * initialisation. The way to do it "properly" would be to expose this function
155 * into the API so that people can manually call it when they're ready, but
156 * one of the design goals of the current API is that it requires absolutely no
157 * other calls than `dlog_print`. Changing it would require somebody with a
158 * bird's eye view of the system to produce a design so I wouldn't count on it.
160 * - the constructor would need to have as high of a priority as possible (so as
161 * to minimize the risk of another library's constructor using uninitialized data)
162 * but at the same time others might want some room to wrap functions before
163 * dlog uses them (think mprobe/mcheck). This would also require a design pass.
168 bool __configure(void)
170 __attribute__((cleanup(log_config_free))) struct log_config config;
172 if (log_config_read(&config) < 0)
175 dynamic_config = __dynamic_config_create(&config);
177 __configure_parameters(&config);
179 if (!__configure_backend(&config)) {
180 __dynamic_config_destroy();
181 dynamic_config = false;
185 __configure_limiter(&config);
189 static bool first = true;
190 static bool initialize()
195 /* The mutex acts as a barrier, but otherwise the C language's
196 * machine abstraction is single-threaded. This means that the
197 * compiler is free to rearrange calls inside the mutex according
198 * to the as-if rule because it doesn't care if another thread can
199 * access it in parallel. In particular, `is_initialized = true`
200 * directly after `__configure()` could be rearranged to go in
201 * front of it because it is not touched inside that function
202 * if the compiler thinks it helps somehow (not unlikely: since
203 * it is checked before the mutex, it is very probable for it to
204 * still be in the CPU register or something like that). On top
205 * of that, some architectures (in particular, armv7l) don't have
206 * strict memory guarantees and can reorder actual memory stores
207 * on their own, even if the compiler didn't do anything fancy
208 * when creating machine code. For more info about the issue,
209 * see https://www.aristeia.com/Papers/DDJ_Jul_Aug_2004_revised.pdf
211 * Ultimately this means that there needs to be some sort of
212 * barrier between `__configure` and `is_initialized = true`,
213 * and the simplest way to achieve that is to just wait until
214 * the second entry into the mutex. */
217 pthread_mutex_lock(&log_construction_lock);
219 first = !__configure();
221 is_initialized = true;
223 pthread_mutex_unlock(&log_construction_lock);
228 * @brief Fatal assertion
229 * @details Conditionally crash the sucka who sent the log
230 * @param[in] prio Priority of the log
232 static void __dlog_fatal_assert(int prio)
234 assert(!fatal_assert || (prio != DLOG_FATAL));
238 * @brief Check log validity
239 * @details Checks whether the log is valid and eligible for printing
240 * @param[in] log_id The target buffer ID
241 * @param[in] prio The log's priority
242 * @param[in] tag The log's tag
243 * @return DLOG_ERROR_NONE on success, else an error code.
244 * @retval DLOG_ERROR_INVALID_PARAMETER Invalid parameter
246 static int dlog_check_validity(log_id_t log_id, int prio, const char *tag)
249 return DLOG_ERROR_INVALID_PARAMETER;
251 if (log_id <= LOG_ID_INVALID || LOG_ID_MAX <= log_id)
252 return DLOG_ERROR_INVALID_PARAMETER;
254 return DLOG_ERROR_NONE;
258 * @brief Check log against limiter rules
259 * @details Checks whether the log passes current limiter rules
260 * @param[in] log_id The target buffer ID
261 * @param[in] prio The log's priority
262 * @param[in] tag The log's tag
263 * @return DLOG_ERROR_NONE on success, else an error code.
264 * @retval DLOG_ERROR_NOT_PERMITTED Not permitted
266 static int dlog_check_limiter(log_id_t log_id, int prio, const char *tag)
268 if (!debugmode && prio <= DLOG_DEBUG)
269 return DLOG_ERROR_NOT_PERMITTED;
272 __dynamic_config_update();
276 if (!pthread_rwlock_rdlock(&log_limiter_lock)) {
277 should_log = __log_limiter_pass_log(tag, prio);
278 pthread_rwlock_unlock(&log_limiter_lock);
282 return DLOG_ERROR_NOT_PERMITTED;
283 } else if (should_log < 0) {
284 write_to_log(log_id, prio, tag,
285 "Your log has been blocked due to limit of log lines per minute.");
286 return DLOG_ERROR_NOT_PERMITTED;
290 /* This can change due to __dynamic_config_update(), but is atomic and its
291 * value implies nothing else so does not need to be under a lock. */
293 return DLOG_ERROR_NOT_PERMITTED;
295 return DLOG_ERROR_NONE;
298 static int __write_to_log_critical_section(log_id_t log_id, int prio, const char *tag, const char *fmt, va_list ap, bool check_should_log)
300 if ((check_should_log || limiter_apply_to_all_buffers) && (dlog_check_limiter(log_id, prio, tag) < 0))
301 return DLOG_ERROR_NONE;
303 char buf[LOG_MAX_PAYLOAD_SIZE];
304 vsnprintf(buf, sizeof buf, fmt, ap);
305 return write_to_log(log_id, prio, tag, buf);
308 static int __write_to_log(log_id_t log_id, int prio, const char *tag, const char *fmt, va_list ap, bool check_should_log)
310 int ret = dlog_check_validity(log_id, prio, tag);
314 /* Threads can be cancelled before they give up a lock.
315 * Therefore cancellation is temporarily disabled.
316 * This solution is comparatively simple and cheap.
317 * The other solutions (cleanup handlers, robust mutexes)
318 * would be much more complicated and also inflict larger
319 * runtime costs. The downside of disabling cancellation
320 * is not a problem in our case because it is temporary
321 * and very brief so we don't keep an obsolete thread
322 * for much longer than we otherwise would. */
323 int old_cancel_state;
324 pthread_setcancelstate(PTHREAD_CANCEL_DISABLE, &old_cancel_state);
326 /* The only thing that needs to be protected here is `write_to_log` since
327 * all other resources already have their own specific locks (and even the
328 * pointer could be made to point at a null handler instead of a true NULL)
329 * but giving this guarantee makes everything a lot simpler as it removes
330 * the risk of something suddenly becoming NULL during processing. */
331 ret = !initialize() || !write_to_log
332 ? DLOG_ERROR_NOT_PERMITTED
333 : __write_to_log_critical_section(log_id, prio, tag, fmt, ap, check_should_log)
336 pthread_setcancelstate(old_cancel_state, NULL);
341 int __critical_log_append_timestamp(char *buf, size_t buflen)
343 /* NB: the timestamp may slightly differ from the one that gets
344 * added onto the copy that goes into the regular buffer, and
345 * timestamp acquisition is duplicated. This would ideally be
346 * solved, but timestamps are currently added fairly deep in
347 * backend-specific functions so for now this will have to do.
348 * Also, since we're the sender, there is just this one set of
349 * timestamps, i.e. the send timestamp! The usual alternative
350 * set of receive timestamps will never have the opportunity
351 * to get added to the entry since this log is supposed to end
352 * up straight in the file (there's potentially the trusted
353 * writer binary but we're trying to keep the set of actions
354 * it needs to do to the minimum and those timestamps would
355 * in practice be the same anyway). */
358 clock_gettime(CLOCK_REALTIME, &ts);
359 const time_t tt = ts.tv_sec;
360 const long int real_millisec = ts.tv_nsec / 1000000;
361 clock_gettime(CLOCK_MONOTONIC, &ts);
362 #ifdef HAVE_LOCALTIME_R
364 struct tm *const ptm = localtime_r(&tt, &tmBuf);
366 struct tm *const ptm = localtime(&tt);
368 assert(ptm); // we're in a short lived fork so asserts are fine and make things simple
370 int len = strftime(buf, buflen, "%m-%d %H:%M:%S", ptm);
373 int tmp_len = snprintf(buf + len, buflen - len, ".%03ld", real_millisec);
375 assert(tmp_len < buflen - len);
378 tmp_len = strftime(buf + len, buflen - len, "%z ", ptm);
379 assert(tmp_len != 0);
382 tmp_len = snprintf(buf + len, buflen - len, "%5lu.%03ld", ts.tv_sec, ts.tv_nsec / 1000000);
384 assert(tmp_len < buflen - len);
390 int __critical_log_build_msg(char *buf, size_t buflen, pid_t main_pid, pid_t main_tid, log_id_t log_id, int prio, const char *tag, const char *fmt, va_list ap)
392 int len = __critical_log_append_timestamp(buf, buflen);
393 const int metadata_len = snprintf(buf + len, buflen - len, " P%5d T%5d B%-6s %c/%-8s: ",
396 log_name_by_id(log_id),
397 filter_pri_to_char(prio),
398 tag ?: "CRITICAL_NO_TAG");
399 assert(metadata_len > 0);
400 if (metadata_len >= buflen - len)
401 return buflen - 1; // can genuinely happen with an exceedingly large tag
404 const int content_len = vsnprintf(buf + len, buflen - len, fmt, ap);
405 assert(content_len >= 0); // 0 is legit with format == ""
406 if (content_len >= buflen - len)
414 __attribute__ ((noreturn))
416 void __critical_log_child(pid_t main_pid, pid_t main_tid, log_id_t log_id, int prio, const char *tag, const char *fmt, va_list ap)
418 char buf[LOG_MAX_PAYLOAD_SIZE + 128]; // extra space for some metadata
419 const int len = __critical_log_build_msg(buf, sizeof buf - 1, main_pid, main_tid, log_id, prio, tag, fmt, ap);
423 static const char *const path = "/usr/libexec/dlog-log-critical";
424 execl(path, path /* argv[0] convention */, buf, (char *) NULL);
427 /* Compilers are sometimes smart enough to recognize _exit's
428 * noreturn attribute, even if we wrap it with something that
429 * returns. This causes it to behave in unexpected ways, for
430 * example it can blow up the program regardless or it can
431 * optimize some conditionals out (and incorrectly enter them
432 * after the exit call fails to actually exit). This makes it
433 * unsuitable for tests. */
435 _exit(1); // not the regular `exit` so as not to trigger any `atexit` handlers prematurely
439 #ifndef UNIT_TEST // contains forks and exits, these don't work well with wrapping (see above)
440 void __critical_log(log_id_t log_id, int prio, const char *tag, const char *fmt, va_list ap)
442 /* Critical log functionality is mostly done in a separate binary
443 * to handle security correctly (else every process would have to
444 * possess the necessary privilege to write onto that file, which
445 * would be opening a fairly nasty can of worms from the security
446 * point of view). Our use of exec() is why a simple thread would
447 * not suffice and we're resorting to a fork.
449 * The double fork, much like a double barreled 12 gauge shotgun,
450 * is an elegant solution designed to stop a zombie army. We'd be
451 * creating zombie processes if we didn't wait() for the children
452 * we spawn, but we don't really want to do that since it results
453 * in a needless delay. Instead, the writer process is actually a
454 * grandchild, with our direct child exiting immediately just for
455 * us to have something to wait on that is guaranteed not to take
456 * too long. The orphaned grandchild is adopted by init, who will
457 * take care to reap it when it dies. In addition to avoiding the
458 * delay, the client will not have any unexpected children (which
459 * could ruin logic in its own waits).
462 * ┌───────┐ ┌─────────┐ ┌─────────────┐ ┌────────┐
463 * │ pid 1 ├──>│ libdlog ├──>│ immediately ├──>│ execs │
464 * │ init │ │ client │ │ exits │ │ writer │
465 * └───────┘ └─────────┘ └─────────────┘ └────────┘
467 * Afterwards, libdlog has no children:
468 * ┌───────┐ ┌─────────┐ ┌────────┐
469 * │ pid 1 ├──>│ libdlog │ ┌─────────>│ writer │
470 * │ init ├─┐ │ client │ │ │ binary │
471 * └───────┘ │ └─────────┘ │ └────────┘
472 * └──────────────────────┘
475 const pid_t main_pid = getpid();
476 const pid_t main_tid = gettid();
478 const int temporary_exiter_pid = fork();
479 if (temporary_exiter_pid < 0)
481 if (temporary_exiter_pid != 0) {
482 waitpid(temporary_exiter_pid, NULL, 0);
486 const int child_pid = fork();
492 __critical_log_child(main_pid, main_tid, log_id, prio, tag, fmt, ap);
495 int __dlog_critical_print(log_id_t log_id, int prio, const char *tag, const char *fmt, ...)
500 __critical_log(log_id, prio, tag, fmt, ap);
504 int ret = __dlog_vprint(log_id, prio, tag, fmt, ap);
513 * @details Print a log line
514 * @param[in] log_id The target buffer ID
515 * @param[in] prio Priority
517 * @param[in] fmt Format (same as printf)
518 * @param[in] ap Argument list
519 * @return Bytes written, or negative error
521 int __dlog_vprint(log_id_t log_id, int prio, const char *tag, const char *fmt, va_list ap)
523 int ret = __write_to_log(log_id, prio, tag, fmt, ap, true);
524 __dlog_fatal_assert(prio);
531 * @details Print a log line
532 * @param[in] log_id The target buffer ID
533 * @param[in] prio Priority
535 * @param[in] fmt Format (same as printf)
536 * @return Bytes written, or negative error
538 int __dlog_print(log_id_t log_id, int prio, const char *tag, const char *fmt, ...)
543 int ret = __dlog_vprint(log_id, prio, tag, fmt, ap);
551 * @details Print a log line
552 * @param[in] log_id The target buffer ID
553 * @param[in] prio Priority
555 * @param[in] fmt Format (same as printf)
556 * @return Bytes written, or negative error
558 int __dlog_sec_print(log_id_t log_id, int prio, const char *tag, const char *fmt, ...)
563 int ret = __dlog_vprint(log_id, prio, tag, fmt, ap);
569 int dlog_vprint(log_priority prio, const char *tag, const char *fmt, va_list ap)
571 return __write_to_log(LOG_ID_APPS, prio, tag, fmt, ap, false);
574 int dlog_print(log_priority prio, const char *tag, const char *fmt, ...)
579 int ret = dlog_vprint(prio, tag, fmt, ap);
586 * @brief Finalize DLog
587 * @details Finalizes and deallocates the library
588 * @notes Used directly in tests; brings back the pre-init state
590 void __dlog_fini(void)
592 if (destroy_backend) {
594 destroy_backend = NULL;
597 is_initialized = false;
600 __log_limiter_destroy();
601 __dynamic_config_destroy();