2 * Copyright (c) 2006-2007,2009-2010,2012-2014 Apple Inc. All Rights Reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
25 * debugging.h - non-trivial debug support
29 * CONFIGURING DEFAULT DEBUG SCOPES
31 * Default debug "scope" inclusion / exclusion is configured in com.apple.securityd.plist (iOS) and
32 * com.apple.secd.plist (OSX) in the Environmental Variable "DEBUGSCOPE". The current value for that
33 * variable begins with a dash ("-") indicating an "exclusion list". If you add a scope for a
34 * secnotice, etc that you don't want to always be "on" add the new string to the DEBUGSCOPE variable
38 #ifndef _SECURITY_UTILITIES_DEBUGGING_H_
39 #define _SECURITY_UTILITIES_DEBUGGING_H_
41 #include <TargetConditionals.h>
44 #include <libkern/libkern.h>
45 #define secalert(format, ...) printf((format), ## __VA_ARGS__)
46 #define secemergency(format, ...) printf((format), ## __VA_ARGS__)
47 #define seccritical(format, ...) printf((format), ## __VA_ARGS__)
48 #define secerror(format, ...) printf((format), ## __VA_ARGS__)
49 #define secwarning(format, ...) printf((format), ## __VA_ARGS__)
50 #define secnotice(scope, format, ...) printf((format), ## __VA_ARGS__)
51 #define secnoticeq(scope, format, ...) printf((format), ## __VA_ARGS__)
52 #define secinfo(scope, format, ...) printf((format), ## __VA_ARGS__)
55 #define secdebug(scope, format, ...) printf((format), ## __VA_ARGS__)
57 #define secdebug(scope, format, ...) /* nothing */
61 #include <CoreFoundation/CFString.h>
66 #define SECLOG_LEVEL_EMERG 0
67 #define SECLOG_LEVEL_ALERT 1
68 #define SECLOG_LEVEL_CRIT 2
69 #define SECLOG_LEVEL_ERR 3
70 #define SECLOG_LEVEL_WARNING 4
71 #define SECLOG_LEVEL_NOTICE 5
72 #define SECLOG_LEVEL_INFO 6
73 #define SECLOG_LEVEL_DEBUG 7
75 #include <os/log_private.h>
76 extern os_log_t
secLogObjForScope(const char *scope
);
77 extern os_log_t
secLogObjForCFScope(CFStringRef scope
);
78 extern bool secLogEnabled(void);
79 extern void secLogDisable(void);
80 extern void secLogEnable(void);
83 // Downstream projects link these, but we no longer use them internally. Keep them here for now.
84 // <rdar://problem/31765903> Remove weak-linked os_log functions
85 void weak_os_log_impl(void *dso
, os_log_t log
, os_log_type_t type
, const char *format
, uint8_t *buf
, unsigned int size
);
86 os_log_t
weak_os_log_create(const char *subsystem
, const char *category
);
87 bool weak_os_log_type_enabled(os_log_t oslog
, os_log_type_t type
);
88 #endif // TARGET_OS_OSX
90 CFStringRef
SecLogAPICreate(bool apiIn
, const char *api
, CFStringRef format
, ...)
91 CF_FORMAT_FUNCTION(3, 4);
93 extern const char *api_trace
;
95 #define sec_trace_enter_api(format...) { \
96 CFStringRef info = SecLogAPICreate(true, __FUNCTION__, format, NULL); \
97 secinfo(api_trace, "%@", info); CFReleaseNull(info); \
100 #define sec_trace_return_api(rtype, body, format...) { \
102 CFStringRef info = SecLogAPICreate(true, __FUNCTION__, format, _r); \
103 secinfo(api_trace, "%@", info); \
104 CFReleaseNull(info); return _r; \
107 #define sec_trace_return_bool_api(body, format...) { \
109 CFStringRef info = SecLogAPICreate(true, __FUNCTION__, format ? format : CFSTR("return=%d"), _r); \
110 secinfo(api_trace, "%@", info); \
111 CFReleaseNull(info); return _r; \
114 #define secemergency(format, ...) os_log_error(secLogObjForScope("SecEmergency"), format, ## __VA_ARGS__)
115 #define secalert(format, ...) os_log_error(secLogObjForScope("SecAlert"), format, ## __VA_ARGS__)
116 #define seccritical(format, ...) os_log(secLogObjForScope("SecCritical"), format, ## __VA_ARGS__)
117 #define secerror(format, ...) os_log(secLogObjForScope("SecError"), format, ## __VA_ARGS__)
118 #define secerrorq(format, ...) os_log(secLogObjForScope("SecError"), format, ## __VA_ARGS__)
119 #define secwarning(format, ...) os_log(secLogObjForScope("SecWarning"), format, ## __VA_ARGS__)
120 #define secnotice(scope, format, ...) os_log(secLogObjForScope(scope), format, ## __VA_ARGS__)
121 #define secnoticeq(scope, format, ...) os_log(secLogObjForScope(scope), format, ## __VA_ARGS__)
122 #define secinfo(scope, format, ...) os_log_debug(secLogObjForScope(scope), format, ## __VA_ARGS__)
124 #define secinfoenabled(scope) os_log_debug_enabled(secLogObjForScope(scope))
126 // secdebug is used for things that might not be privacy safe at all, so only debug builds can have these traces
129 #define secdebug(scope, format, ...) os_log_debug(secLogObjForScope(scope), format, ## __VA_ARGS__)
131 # define secdebug(scope,...) /* nothing */
134 typedef void (^security_log_handler
)(int level
, CFStringRef scope
, const char *function
,
135 const char *file
, int line
, CFStringRef message
);
137 /* To simulate a process crash in some conditions */
138 void __security_simulatecrash(CFStringRef reason
, uint32_t code
);
139 void __security_stackshotreport(CFStringRef reason
, uint32_t code
);
141 /* predefined simulate crash exception codes */
142 #define __sec_exception_code(x) (0x53c00000+x)
143 /* 1 was __sec_exception_code_CorruptDb */
144 #define __sec_exception_code_CorruptItem __sec_exception_code(2)
145 #define __sec_exception_code_OTRError __sec_exception_code(3)
146 #define __sec_exception_code_DbItemDescribe __sec_exception_code(4)
147 #define __sec_exception_code_TwiceCorruptDb(db) __sec_exception_code(5|((db)<<8))
148 #define __sec_exception_code_AuthLoop __sec_exception_code(6)
149 #define __sec_exception_code_MissingEntitlements __sec_exception_code(7)
150 #define __sec_exception_code_LostInMist __sec_exception_code(8)
151 #define __sec_exception_code_CKD_nil_pending_keys __sec_exception_code(9)
152 #define __sec_exception_code_SQLiteBusy __sec_exception_code(10)
153 #define __sec_exception_code_CorruptDb(rc) __sec_exception_code(11|((rc)<<8))
154 #define __sec_exception_code_Watchdog __sec_exception_code(12)
156 /* For testing only, turns off/on simulated crashes, when turning on, returns number of
157 simulated crashes which were not reported since last turned off. */
158 int __security_simulatecrash_enable(bool enable
);
160 /* Logging control functions */
163 kScopeIDEnvironment
= 0,
164 kScopeIDDefaults
= 1,
171 void ApplyScopeListForID(CFStringRef scopeList
, SecDebugScopeID whichID
);
172 void ApplyScopeDictionaryForID(CFDictionaryRef scopeList
, SecDebugScopeID whichID
);
173 CFPropertyListRef
CopyCurrentScopePlist(void);
179 #endif /* _SECURITY_UTILITIES_DEBUGGING_H_ */