abrt/0004-koops-dump-oopses-from-systemd-journal.patch

1988 lines
63 KiB
Diff

From c036609d34dfbfded9891be83d5e43db0a9feae2 Mon Sep 17 00:00:00 2001
From: Jakub Filak <jfilak@redhat.com>
Date: Mon, 7 Jul 2014 18:11:13 +0200
Subject: [PATCH 4/9] koops: dump oopses from systemd-journal
Resolves rhbz#1059724
---
configure.ac | 3 +
doc/Makefile.am | 1 +
doc/abrt-dump-journal-oops.txt | 68 ++++++
init-scripts/abrt-oops.service | 4 +-
po/POTFILES.in | 2 +
src/include/libabrt.h | 19 ++
src/lib/kernel.c | 103 +++++----
src/plugins/Makefile.am | 23 ++
src/plugins/abrt-dump-journal-oops.c | 394 +++++++++++++++++++++++++++++++++++
src/plugins/abrt-dump-oops.c | 313 ++++------------------------
src/plugins/abrt-journal.c | 295 ++++++++++++++++++++++++++
src/plugins/abrt-journal.h | 110 ++++++++++
src/plugins/oops-utils.c | 279 +++++++++++++++++++++++++
src/plugins/oops-utils.h | 48 +++++
15 files changed, 1353 insertions(+), 310 deletions(-)
create mode 100644 doc/abrt-dump-journal-oops.txt
create mode 100644 src/plugins/abrt-dump-journal-oops.c
create mode 100644 src/plugins/abrt-journal.c
create mode 100644 src/plugins/abrt-journal.h
create mode 100644 src/plugins/oops-utils.c
create mode 100644 src/plugins/oops-utils.h
diff --git a/configure.ac b/configure.ac
index c051ec5..03882e9 100644
--- a/configure.ac
+++ b/configure.ac
@@ -140,6 +140,7 @@ PKG_CHECK_MODULES([LIBREPORT_GTK], [libreport-gtk])
PKG_CHECK_MODULES([POLKIT], [polkit-gobject-1])
PKG_CHECK_MODULES([GIO], [gio-2.0])
PKG_CHECK_MODULES([SATYR], [satyr])
+PKG_CHECK_MODULES([SYSTEMD_JOURNAL], [libsystemd-journal])
PKG_PROG_PKG_CONFIG
AC_ARG_WITH([systemdsystemunitdir],
@@ -167,6 +168,7 @@ AC_CHECK_HEADERS([locale.h])
CONF_DIR='${sysconfdir}/${PACKAGE_NAME}'
DEFAULT_CONF_DIR='${datadir}/${PACKAGE_NAME}/conf.d'
VAR_RUN='${localstatedir}/run'
+VAR_STATE='${localstatedir}/lib/${PACKAGE_NAME}'
PLUGINS_CONF_DIR='${sysconfdir}/${PACKAGE_NAME}/plugins'
DEFAULT_PLUGINS_CONF_DIR='${datadir}/${PACKAGE_NAME}/conf.d/plugins'
EVENTS_DIR='${datadir}/libreport/events'
@@ -255,6 +257,7 @@ AC_ARG_ENABLE([native-unwinder],
AC_SUBST(CONF_DIR)
AC_SUBST(DEFAULT_CONF_DIR)
AC_SUBST(VAR_RUN)
+AC_SUBST(VAR_STATE)
AC_SUBST(PLUGINS_CONF_DIR)
AC_SUBST(DEFAULT_PLUGINS_CONF_DIR)
AC_SUBST(EVENTS_CONF_DIR)
diff --git a/doc/Makefile.am b/doc/Makefile.am
index 55cb0f3..064e2ba 100644
--- a/doc/Makefile.am
+++ b/doc/Makefile.am
@@ -19,6 +19,7 @@ MAN1_TXT += abrt-action-perform-ccpp-analysis.txt
MAN1_TXT += abrt-action-notify.txt
MAN1_TXT += abrt-applet.txt
MAN1_TXT += abrt-dump-oops.txt
+MAN1_TXT += abrt-dump-journal-oops.txt
MAN1_TXT += abrt-dump-xorg.txt
MAN1_TXT += abrt-auto-reporting.txt
MAN1_TXT += abrt-retrace-client.txt
diff --git a/doc/abrt-dump-journal-oops.txt b/doc/abrt-dump-journal-oops.txt
new file mode 100644
index 0000000..e0b8d79
--- /dev/null
+++ b/doc/abrt-dump-journal-oops.txt
@@ -0,0 +1,68 @@
+abrt-dump-journal-oops(1)
+=========================
+
+NAME
+----
+abrt-dump-journal-oops - Extract oops from systemd-journal
+
+SYNOPSIS
+--------
+'abrt-dump-journal-oops' [-vsoxtf] [-e]/[-c CURSOR] [-d DIR]/[-D]
+
+DESCRIPTION
+-----------
+This tool creates problem directory from oops extracted from systemd-journal.
+The tool can follow systemd-journal and extract oopses in time of their
+occurrence.
+
+The following start from the last seen cursor. If the last seen cursor file
+does not exist, the following start by scanning the entire sytemd-journal or
+from the end if '-e' option is specified.
+
+FILES
+-----
+/etc/abrt/plugins/oops.conf::
+ Configuration file where user can disable detection of non-fatal MCEs
+
+/var/lib/abrt/abrt-dump-journal-oops.state::
+ State file where systemd-journal cursor to the last seen message is saved
+
+OPTIONS
+-------
+-v, --verbose::
+ Be more verbose. Can be given multiple times.
+
+-s::
+ Log to syslog
+
+-o::
+ Print found oopses on standard output
+
+-d DIR::
+ Create new problem directory in DIR for every oops found
+
+-D::
+ Same as -d DumpLocation, DumpLocation is specified in abrt.conf
+
+-s CURSOR::
+ Starts scannig systemd-journal from CURSOR
+
+-e::
+ Starts following systemd-journal from the end
+
+-x::
+ Make the problem directory world readable. Usable only with -d/-D
+
+-t::
+ Throttle problem directory creation to 1 per second
+
+-f::
+ Follow systemd-journal
+
+SEE ALSO
+--------
+abrt.conf(5)
+
+AUTHORS
+-------
+* ABRT team
diff --git a/init-scripts/abrt-oops.service b/init-scripts/abrt-oops.service
index d8ac028..69aaaa9 100644
--- a/init-scripts/abrt-oops.service
+++ b/init-scripts/abrt-oops.service
@@ -4,8 +4,8 @@ After=abrtd.service
Requisite=abrtd.service
[Service]
-# TODO: do we really need absolute paths here?
-ExecStart=/bin/sh -c '/bin/dmesg | /usr/bin/abrt-dump-oops -xD; exec /usr/bin/abrt-watch-log -F "`/usr/bin/abrt-dump-oops -m`" /var/log/messages -- /usr/bin/abrt-dump-oops -xtD'
+# systemd requires absolute paths to executables
+ExecStart=/usr/bin/abrt-dump-journal-oops -fxtD
[Install]
WantedBy=multi-user.target
diff --git a/po/POTFILES.in b/po/POTFILES.in
index ff9b97a..160cd8b 100644
--- a/po/POTFILES.in
+++ b/po/POTFILES.in
@@ -35,12 +35,14 @@ src/plugins/abrt-action-trim-files.c
src/plugins/abrt-gdb-exploitable
src/plugins/abrt-watch-log.c
src/plugins/abrt-dump-oops.c
+src/plugins/abrt-dump-journal-oops.c
src/plugins/abrt-dump-xorg.c
src/plugins/abrt-retrace-client.c
src/plugins/analyze_LocalGDB.xml.in
src/plugins/analyze_RetraceServer.xml.in
src/plugins/collect_xsession_errors.xml.in
src/plugins/https-utils.c
+src/plugins/oops-utils.c
src/plugins/bodhi.c
src/hooks/abrt-merge-pstoreoops.c
diff --git a/src/include/libabrt.h b/src/include/libabrt.h
index d6eb4a5..37704dd 100644
--- a/src/include/libabrt.h
+++ b/src/include/libabrt.h
@@ -109,8 +109,27 @@ char *kernel_tainted_long(const char *tainted_short);
int koops_hash_str_ext(char hash_str[SHA1_RESULT_LEN*2 + 1], const char *oops_buf, int frame_count, int duphas_flags);
#define koops_hash_str abrt_koops_hash_str
int koops_hash_str(char hash_str[SHA1_RESULT_LEN*2 + 1], const char *oops_buf);
+
+
+#define koops_line_skip_level abrt_koops_line_skip_level
+int koops_line_skip_level(const char **c);
+#define koops_line_skip_jiffies abrt_koops_line_skip_jiffies
+void koops_line_skip_jiffies(const char **c);
+
+/*
+ * extract_oops tries to find oops signatures in a log
+ */
+struct abrt_koops_line_info {
+ char *ptr;
+ int level;
+};
+
+#define koops_extract_oopses_from_lines abrt_koops_extract_oopses_from_lines
+void koops_extract_oopses_from_lines(GList **oops_list, const struct abrt_koops_line_info *lines_info, int lines_info_size);
#define koops_extract_oopses abrt_koops_extract_oopses
void koops_extract_oopses(GList **oops_list, char *buffer, size_t buflen);
+#define koops_suspicious_strings_list abrt_koops_suspicious_strings_list
+GList *koops_suspicious_strings_list(void);
#define koops_print_suspicious_strings abrt_koops_print_suspicious_strings
void koops_print_suspicious_strings(void);
/**
diff --git a/src/lib/kernel.c b/src/lib/kernel.c
index b2d72b6..be80cbc 100644
--- a/src/lib/kernel.c
+++ b/src/lib/kernel.c
@@ -22,21 +22,12 @@
#define _GNU_SOURCE 1 /* for strcasestr */
#include "libabrt.h"
-/*
- * extract_oops tries to find oops signatures in a log
- */
-
-struct line_info {
- char *ptr;
- char level;
-};
-
/* Used to be 100, but some MCE oopses are short:
* "CPU 0: Machine Check Exception: 0000000000000007"
*/
#define SANE_MIN_OOPS_LEN 30
-static void record_oops(GList **oops_list, struct line_info* lines_info, int oopsstart, int oopsend)
+static void record_oops(GList **oops_list, const struct abrt_koops_line_info* lines_info, int oopsstart, int oopsend)
{
int q;
int len;
@@ -161,6 +152,15 @@ void koops_print_suspicious_strings(void)
koops_print_suspicious_strings_filtered(NULL);
}
+GList *koops_suspicious_strings_list(void)
+{
+ GList *strings = NULL;
+ for (const char *const *str = s_koops_suspicious_strings; *str; ++str)
+ strings = g_list_prepend(strings, (gpointer)*str);
+
+ return strings;
+}
+
static bool match_any(const regex_t **res, const char *str)
{
for (const regex_t **r = res; *r != NULL; ++r)
@@ -189,12 +189,57 @@ void koops_print_suspicious_strings_filtered(const regex_t **filterout)
}
}
+
+void koops_line_skip_jiffies(const char **c)
+{
+ /* remove jiffies time stamp counter if present
+ * jiffies are unsigned long, so it can be 2^64 long, which is
+ * 20 decimal digits
+ */
+ if (**c == '[')
+ {
+ const char *c2 = strchr(*c, '.');
+ const char *c3 = strchr(*c, ']');
+ if (c2 && c3 && (c2 < c3) && (c3-*c) < 21)
+ {
+ *c = c3 + 1;
+ if (**c == ' ')
+ (*c)++;
+ }
+ }
+}
+
+int koops_line_skip_level(const char **c)
+{
+ int linelevel = 0;
+ if (**c == '<')
+ {
+ const char *ptr = *c + 1;
+ while (isdigit(*ptr))
+ ++ptr;
+
+ if (*ptr == '>' && (ptr - *c > 1))
+ {
+ const char *const bck = ptr + 1;
+ unsigned exp = 1;
+ while (--ptr != *c)
+ {
+ linelevel += (*ptr - '0') * exp;
+ exp *= 10;
+ }
+ *c = bck;
+ }
+ }
+
+ return linelevel;
+}
+
void koops_extract_oopses(GList **oops_list, char *buffer, size_t buflen)
{
char *c;
int linecount = 0;
int lines_info_size = 0;
- struct line_info *lines_info = NULL;
+ struct abrt_koops_line_info *lines_info = NULL;
/* Split buffer into lines */
@@ -254,28 +299,10 @@ void koops_extract_oopses(GList **oops_list, char *buffer, size_t buflen)
c = kernel_str + sizeof("kernel: ")-1;
}
- linelevel = 0;
/* store and remove kernel log level */
- if (*c == '<' && c[1] && c[2] == '>')
- {
- linelevel = c[1];
- c += 3;
- }
- /* remove jiffies time stamp counter if present
- * jiffies are unsigned long, so it can be 2^64 long, which is
- * 20 decimal digits
- */
- if (*c == '[')
- {
- char *c2 = strchr(c, '.');
- char *c3 = strchr(c, ']');
- if (c2 && c3 && (c2 < c3) && (c3-c) < 21)
- {
- c = c3 + 1;
- if (*c == ' ')
- c++;
- }
- }
+ linelevel = koops_line_skip_level((const char **)&c);
+ koops_line_skip_jiffies((const char **)&c);
+
if ((lines_info_size & 0xfff) == 0)
{
lines_info = xrealloc(lines_info, (lines_info_size + 0x1000) * sizeof(lines_info[0]));
@@ -287,6 +314,12 @@ next_line:
c = c9 + 1;
}
+ koops_extract_oopses_from_lines(oops_list, lines_info, lines_info_size);
+ free(lines_info);
+}
+
+void koops_extract_oopses_from_lines(GList **oops_list, const struct abrt_koops_line_info *lines_info, int lines_info_size)
+{
/* Analyze lines */
int i;
@@ -323,8 +356,6 @@ next_line:
{
/* debug information */
log_debug("Found oops at line %d: '%s'", oopsstart, lines_info[oopsstart].ptr);
- if (oopsstart != i)
- log_debug("Trigger line is %d: '%s'", i, c);
/* try to find the end marker */
int i2 = i + 1;
while (i2 < lines_info_size && i2 < (i+50))
@@ -471,10 +502,7 @@ next_line:
record_oops(oops_list, lines_info, oopsstart, oopsstart);
}
}
-
- free(lines_info);
}
-
int koops_hash_str_ext(char result[SHA1_RESULT_LEN*2 + 1], const char *oops_buf, int frame_count, int duphash_flags)
{
char *hash_str = NULL, *error = NULL;
@@ -507,6 +535,7 @@ int koops_hash_str_ext(char result[SHA1_RESULT_LEN*2 + 1], const char *oops_buf,
else
log("Nothing useful for duphash");
+
free(hash_str);
}
diff --git a/src/plugins/Makefile.am b/src/plugins/Makefile.am
index 14b6fe0..a804f82 100644
--- a/src/plugins/Makefile.am
+++ b/src/plugins/Makefile.am
@@ -15,6 +15,7 @@ bin_SCRIPTS = \
bin_PROGRAMS = \
abrt-watch-log \
abrt-dump-oops \
+ abrt-dump-journal-oops \
abrt-dump-xorg \
abrt-action-analyze-c \
abrt-action-analyze-python \
@@ -97,6 +98,8 @@ EXTRA_DIST = \
abrt-action-ureport \
abrt-gdb-exploitable \
https-utils.h \
+ oops-utils.h \
+ abrt-journal.h \
post_report.xml.in \
abrt-action-analyze-ccpp-local.in
@@ -120,6 +123,7 @@ abrt_watch_log_LDADD = \
../lib/libabrt.la
abrt_dump_oops_SOURCES = \
+ oops-utils.c \
abrt-dump-oops.c
abrt_dump_oops_CPPFLAGS = \
-I$(srcdir)/../include \
@@ -133,6 +137,25 @@ abrt_dump_oops_LDADD = \
$(LIBREPORT_LIBS) \
../lib/libabrt.la
+abrt_dump_journal_oops_SOURCES = \
+ oops-utils.c \
+ abrt-journal.c \
+ abrt-dump-journal-oops.c
+abrt_dump_journal_oops_CPPFLAGS = \
+ -I$(srcdir)/../include \
+ -I$(srcdir)/../lib \
+ $(GLIB_CFLAGS) \
+ $(LIBREPORT_CFLAGS) \
+ $(SYSTEMD_JOURNAL_CFLAGS) \
+ -DDEFAULT_DUMP_DIR_MODE=$(DEFAULT_DUMP_DIR_MODE) \
+ -DVAR_STATE=\"$(VAR_STATE)\" \
+ -D_GNU_SOURCE
+abrt_dump_journal_oops_LDADD = \
+ $(GLIB_LIBS) \
+ $(LIBREPORT_LIBS) \
+ $(SYSTEMD_JOURNAL_LIBS) \
+ ../lib/libabrt.la
+
abrt_dump_xorg_SOURCES = \
abrt-dump-xorg.c
abrt_dump_xorg_CPPFLAGS = \
diff --git a/src/plugins/abrt-dump-journal-oops.c b/src/plugins/abrt-dump-journal-oops.c
new file mode 100644
index 0000000..3f1f419
--- /dev/null
+++ b/src/plugins/abrt-dump-journal-oops.c
@@ -0,0 +1,394 @@
+/*
+ * Copyright (C) 2014 ABRT team
+ * Copyright (C) 2014 RedHat Inc
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ */
+#include "libabrt.h"
+#include "abrt-journal.h"
+#include "oops-utils.h"
+
+#define ABRT_JOURNAL_WATCH_STATE_FILE VAR_STATE"/abrt-dump-journal-oops.state"
+#define ABRT_JOURNAL_WATCH_STATE_FILE_MODE 0600
+#define ABRT_JOURNAL_WATCH_STATE_FILE_MAX_SZ (4 * 1024)
+
+/* Limit number of buffered lines */
+#define ABRT_JOURNAL_MAX_READ_LINES (1024 * 1024)
+
+/* Forward declarations */
+static void save_abrt_journal_watch_position(abrt_journal_t *journal, const char *file_name);
+
+/*
+ * Koops extractor
+ */
+
+static GList* abrt_journal_extract_kernel_oops(abrt_journal_t *journal)
+{
+ size_t lines_info_count = 0;
+ size_t lines_info_size = 32;
+ struct abrt_koops_line_info *lines_info = xmalloc(lines_info_size * sizeof(lines_info[0]));
+
+ do
+ {
+ const char *line = NULL;
+ if (abrt_journal_get_log_line(journal, &line) < 0)
+ error_msg_and_die(_("Cannot read journal data."));
+
+ if (lines_info_count == lines_info_size)
+ {
+ lines_info_size *= 2;
+ lines_info = xrealloc(lines_info, lines_info_size * sizeof(lines_info[0]));
+ }
+
+ lines_info[lines_info_count].level = koops_line_skip_level(&line);
+ koops_line_skip_jiffies(&line);
+
+ lines_info[lines_info_count].ptr = xstrdup(line);
+
+ ++lines_info_count;
+ }
+ while (lines_info_count < ABRT_JOURNAL_MAX_READ_LINES
+ && abrt_journal_next(journal) > 0);
+
+ GList *oops_list = NULL;
+ koops_extract_oopses_from_lines(&oops_list, lines_info, lines_info_count);
+
+ log_debug("Extracted: %d oopses", g_list_length(oops_list));
+
+ for (size_t i = 0; i < lines_info_count; ++i)
+ free(lines_info[i].ptr);
+
+ free(lines_info);
+
+ return oops_list;
+}
+
+/*
+ * An adatapter of abrt_journal_extract_kernel_oops for abrt_journal_watch_callback
+ */
+struct watch_journald_settings
+{
+ const char *dump_location;
+ int oops_utils_flags;
+};
+
+static void abrt_journal_watch_extract_kernel_oops(abrt_journal_watch_t *watch, void *data)
+{
+ const struct watch_journald_settings *conf = (const struct watch_journald_settings *)data;
+
+ abrt_journal_t *journal = abrt_journal_watch_get_journal(watch);
+
+ /* Give systemd-journal one second to suck in all kernel's strings */
+ if (abrt_oops_signaled_sleep(1) > 0)
+ {
+ abrt_journal_watch_stop(watch);
+ return;
+ }
+
+ GList *oopses = abrt_journal_extract_kernel_oops(journal);
+ abrt_oops_process_list(oopses, conf->dump_location, conf->oops_utils_flags);
+ g_list_free_full(oopses, (GDestroyNotify)free);
+
+ /* Skip stuff which appeared while processing oops as it is not necessary */
+ /* to catch all consecutive oopses (anyway such oopses are almost */
+ /* certainly duplicates of the already extracted ones) */
+ abrt_journal_seek_tail(journal);
+
+ /* In case of disaster, lets make sure we won't read the journal messages */
+ /* again. */
+ save_abrt_journal_watch_position(journal, ABRT_JOURNAL_WATCH_STATE_FILE);
+
+ if (g_abrt_oops_sleep_woke_up_on_signal > 0)
+ abrt_journal_watch_stop(watch);
+}
+
+/*
+ * Koops extractor end
+ */
+
+static void try_restore_abrt_journal_watch_position(abrt_journal_t *journal, const char *file_name)
+{
+ struct stat buf;
+ if (lstat(file_name, &buf) < 0)
+ {
+ if (errno == ENOENT)
+ {
+ /* Only notice because this is expected */
+ log_notice(_("Not restoring journal watch's position: file '%s' does not exist"), file_name);
+ return;
+ }
+
+ perror_msg(_("Cannot restore journal watch's position form file '%s'"), file_name);
+ return;
+ }
+
+ if (!(buf.st_mode & S_IFREG))
+ {
+ error_msg(_("Cannot restore journal watch's position: path '%s' is not regular file"), file_name);
+ return;
+ }
+
+ if (buf.st_size > ABRT_JOURNAL_WATCH_STATE_FILE_MAX_SZ)
+ {
+ error_msg(_("Cannot restore journal watch's position: file '%s' exceeds %dB size limit"),
+ file_name, ABRT_JOURNAL_WATCH_STATE_FILE_MAX_SZ);
+ return;
+ }
+
+ int state_fd = open(file_name, O_RDONLY | O_NOFOLLOW);
+ if (state_fd < 0)
+ {
+ perror_msg(_("Cannot restore journal watch's position: open('%s')"), file_name);
+ return;
+ }
+
+ char *crsr = xmalloc(buf.st_size + 1);
+
+ const int sz = full_read(state_fd, crsr, buf.st_size);
+ if (sz != buf.st_size)
+ {
+ error_msg(_("Cannot restore journal watch's position: cannot read entire file '%s'"), file_name);
+ close(state_fd);
+ return;
+ }
+
+ crsr[sz] = '\0';
+ close(state_fd);
+
+ const int r = abrt_journal_set_cursor(journal, crsr);
+ if (r < 0)
+ {
+ /* abrt_journal_set_cursor() prints error message in verbose mode */
+ error_msg(_("Failed to move the journal to a cursor from file '%s'"), file_name);
+ return;
+ }
+
+ free(crsr);
+}
+
+static void save_abrt_journal_watch_position(abrt_journal_t *journal, const char *file_name)
+{
+ char *crsr = NULL;
+ const int r = abrt_journal_get_cursor(journal, &crsr);
+
+ if (r < 0)
+ {
+ /* abrt_journal_set_cursor() prints error message in verbose mode */
+ error_msg(_("Cannot save journal watch's position"));
+ return;
+ }
+
+ int state_fd = open(file_name,
+ O_WRONLY | O_CREAT | O_TRUNC | O_NOFOLLOW,
+ ABRT_JOURNAL_WATCH_STATE_FILE_MODE);
+
+ if (state_fd < 0)
+ {
+ perror_msg(_("Cannot save journal watch's position: open('%s')"), file_name);
+ return;
+ }
+
+ full_write_str(state_fd, crsr);
+ close(state_fd);
+
+ free(crsr);
+}
+
+static void watch_journald(abrt_journal_t *journal, const char *dump_location, int flags)
+{
+ GList *koops_strings = koops_suspicious_strings_list();
+
+ char *oops_string_filter_regex = abrt_oops_string_filter_regex();
+ if (oops_string_filter_regex)
+ {
+ regex_t filter_re;
+ if (regcomp(&filter_re, oops_string_filter_regex, REG_NOSUB) != 0)
+ perror_msg_and_die(_("Failed to compile regex"));
+
+ GList *iter = koops_strings;
+ while(iter != NULL)
+ {
+ GList *next = g_list_next(iter);
+
+ const int reti = regexec(&filter_re, (const char *)iter->data, 0, NULL, 0);
+ if (reti == 0)
+ koops_strings = g_list_delete_link(koops_strings, iter);
+ else if (reti != REG_NOMATCH)
+ {
+ char msgbuf[100];
+ regerror(reti, &filter_re, msgbuf, sizeof(msgbuf));
+ error_msg_and_die("Regex match failed: %s", msgbuf);
+ }
+
+ iter = next;
+ }
+
+ regfree(&filter_re);
+ free(oops_string_filter_regex);
+ }
+
+ struct watch_journald_settings watch_conf = {
+ .dump_location = dump_location,
+ .oops_utils_flags = flags,
+ };
+
+ struct abrt_journal_watch_notify_strings notify_strings_conf = {
+ .decorated_cb = abrt_journal_watch_extract_kernel_oops,
+ .decorated_cb_data = &watch_conf,
+ .strings = koops_strings,
+ };
+
+ abrt_journal_watch_t *watch = NULL;
+ if (abrt_journal_watch_new(&watch, journal, abrt_journal_watch_notify_strings, &notify_strings_conf) < 0)
+ error_msg_and_die(_("Failed to initialize systemd-journal watch"));
+
+ abrt_journal_watch_run_sync(watch);
+ abrt_journal_watch_free(watch);
+
+ g_list_free(koops_strings);
+}
+
+int main(int argc, char *argv[])
+{
+ /* I18n */
+ setlocale(LC_ALL, "");
+#if ENABLE_NLS
+ bindtextdomain(PACKAGE, LOCALEDIR);
+ textdomain(PACKAGE);
+#endif
+
+ abrt_init(argv);
+
+ /* Can't keep these strings/structs static: _() doesn't support that */
+ const char *program_usage_string = _(
+ "& [-vsoxtf] [-e]/[-c CURSOR] [-d DIR]/[-D]\n"
+ "\n"
+ "Extract oops from systemd-journal\n"
+ "\n"
+ "-c and -e options conflicts because both specifies the first read message.\n"
+ "\n"
+ "-e is useful only for -f because the following of journal starts by reading \n"
+ "the entire journal if the last seen possition is not available.\n"
+ "\n"
+ "The last seen position is saved in "ABRT_JOURNAL_WATCH_STATE_FILE"\n"
+ );
+ enum {
+ OPT_v = 1 << 0,
+ OPT_s = 1 << 1,
+ OPT_o = 1 << 2,
+ OPT_d = 1 << 3,
+ OPT_D = 1 << 4,
+ OPT_x = 1 << 5,
+ OPT_t = 1 << 6,
+ OPT_c = 1 << 7,
+ OPT_e = 1 << 8,
+ OPT_f = 1 << 9,
+ };
+
+ char *cursor = NULL;
+ char *dump_location = NULL;
+
+ /* Keep enum above and order of options below in sync! */
+ struct options program_options[] = {
+ OPT__VERBOSE(&g_verbose),
+ OPT_BOOL( 's', NULL, NULL, _("Log to syslog")),
+ OPT_BOOL( 'o', NULL, NULL, _("Print found oopses on standard output")),
+ /* oopses don't contain any sensitive info, and even
+ * the old koops app was showing the oopses to all users
+ */
+ OPT_STRING('d', NULL, &dump_location, "DIR", _("Create new problem directory in DIR for every oops found")),
+ OPT_BOOL( 'D', NULL, NULL, _("Same as -d DumpLocation, DumpLocation is specified in abrt.conf")),
+ OPT_BOOL( 'x', NULL, NULL, _("Make the problem directory world readable")),
+ OPT_BOOL( 't', NULL, NULL, _("Throttle problem directory creation to 1 per second")),
+ OPT_STRING('c', NULL, &cursor, "CURSOR", _("Start reading systemd-journal from the CURSOR position")),
+ OPT_BOOL( 'e', NULL, NULL, _("Start reading systemd-journal from the end")),
+ OPT_BOOL( 'f', NULL, NULL, _("Follow systemd-journal from the last seen position (if available)")),
+ OPT_END()
+ };
+ unsigned opts = parse_opts(argc, argv, program_options, program_usage_string);
+
+ export_abrt_envvars(0);
+
+ msg_prefix = g_progname;
+ if ((opts & OPT_s) || getenv("ABRT_SYSLOG"))
+ {
+ logmode = LOGMODE_JOURNAL;
+ }
+
+ if ((opts & OPT_c) && (opts & OPT_e))
+ error_msg_and_die(_("You need to specify either -c CURSOR or -e"));
+
+ if (opts & OPT_D)
+ {
+ if (opts & OPT_d)
+ show_usage_and_die(program_usage_string, program_options);
+ load_abrt_conf();
+ dump_location = g_settings_dump_location;
+ g_settings_dump_location = NULL;
+ free_abrt_conf_data();
+ }
+
+ int oops_utils_flags = 0;
+ if ((opts & OPT_x))
+ oops_utils_flags |= ABRT_OOPS_WORLD_READABLE;
+
+ if ((opts & OPT_t))
+ oops_utils_flags |= ABRT_OOPS_THROTTLE_CREATION;
+
+ if ((opts & OPT_o))
+ oops_utils_flags |= ABRT_OOPS_PRINT_STDOUT;
+
+ const char *const env_journal_filter = getenv("ABRT_DUMP_JOURNAL_OOPS_DEBUG_FILTER");
+ static const char *kernel_journal_filter[2] = { 0 };
+ kernel_journal_filter[0] = (env_journal_filter ? env_journal_filter : "SYSLOG_IDENTIFIER=kernel");
+ log_debug("Using journal match: '%s'", kernel_journal_filter[0]);
+
+ abrt_journal_t *journal = NULL;
+ if (abrt_journal_new(&journal))
+ error_msg_and_die(_("Cannot open systemd-journal"));
+
+ if (abrt_journal_set_journal_filter(journal, kernel_journal_filter) < 0)
+ error_msg_and_die(_("Cannot filter systemd-journal to kernel data only"));
+
+ if ((opts & OPT_e) && abrt_journal_seek_tail(journal) < 0)
+ error_msg_and_die(_("Cannot seek to the end of journal"));
+
+ if ((opts & OPT_f))
+ {
+ if (!cursor)
+ try_restore_abrt_journal_watch_position(journal, ABRT_JOURNAL_WATCH_STATE_FILE);
+ else if(abrt_journal_set_cursor(journal, cursor))
+ error_msg_and_die(_("Failed to start watch from cursor '%s'"), cursor);
+
+ watch_journald(journal, dump_location, oops_utils_flags);
+
+ save_abrt_journal_watch_position(journal, ABRT_JOURNAL_WATCH_STATE_FILE);
+ }
+ else
+ {
+ if (cursor && abrt_journal_set_cursor(journal, cursor))
+ error_msg_and_die(_("Failed to set systemd-journal cursor '%s'"), cursor);
+
+ /* Compatibility hack, a watch's callback gets the journal already moved
+ * to a next message.*/
+ abrt_journal_next(journal);
+
+ GList *oopses = abrt_journal_extract_kernel_oops(journal);
+ const int errors = abrt_oops_process_list(oopses, dump_location, oops_utils_flags);
+ g_list_free_full(oopses, (GDestroyNotify)free);
+
+ return errors;
+ }
+
+ abrt_journal_free(journal);
+
+ return EXIT_SUCCESS;
+}
diff --git a/src/plugins/abrt-dump-oops.c b/src/plugins/abrt-dump-oops.c
index 9f0dc87..b1031ea 100644
--- a/src/plugins/abrt-dump-oops.c
+++ b/src/plugins/abrt-dump-oops.c
@@ -1,6 +1,6 @@
/*
- Copyright (C) 2011 ABRT team
- Copyright (C) 2011 RedHat Inc
+ Copyright (C) 2011,2014 ABRT team
+ Copyright (C) 2011,2014 RedHat Inc
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
@@ -18,16 +18,7 @@
*/
#include <syslog.h>
#include "libabrt.h"
-
-/* How many problem dirs to create at most?
- * Also causes cooldown sleep with -t if exceeded -
- * useful when called from a log watcher.
- */
-#define MAX_DUMPED_DD_COUNT 5
-
-static bool world_readable_dump = false;
-static bool throttle_dd_creation = false;
-static const char *debug_dumps_dir = ".";
+#include "oops-utils.h"
#define MAX_SCAN_BLOCK (4*1024*1024)
#define READ_AHEAD (10*1024)
@@ -69,175 +60,6 @@ static void scan_syslog_file(GList **oops_list, int fd)
free(buffer);
}
-static char *list_of_tainted_modules(const char *proc_modules)
-{
- struct strbuf *result = strbuf_new();
-
- const char *p = proc_modules;
- for (;;)
- {
- const char *end = strchrnul(p, '\n');
- const char *paren = strchrnul(p, '(');
- /* We look for a line with this format:
- * "kvm_intel 126289 0 - Live 0xf829e000 (taint_flags)"
- * where taint_flags have letters
- * (flags '+' and '-' indicate (un)loading, we must ignore them).
- */
- while (++paren < end)
- {
- if ((unsigned)(toupper(*paren) - 'A') <= 'Z'-'A')
- {
- strbuf_append_strf(result, result->len == 0 ? "%.*s" : ",%.*s",
- (int)(strchrnul(p,' ') - p), p
- );
- break;
- }
- if (*paren == ')')
- break;
- }
-
- if (*end == '\0')
- break;
- p = end + 1;
- }
-
- if (result->len == 0)
- {
- strbuf_free(result);
- return NULL;
- }
- return strbuf_free_nobuf(result);
-}
-
-static void save_oops_data_in_dump_dir(struct dump_dir *dd, char *oops, const char *proc_modules)
-{
- char *first_line = oops;
- char *second_line = (char*)strchr(first_line, '\n'); /* never NULL */
- *second_line++ = '\0';
-
- if (first_line[0])
- dd_save_text(dd, FILENAME_KERNEL, first_line);
- dd_save_text(dd, FILENAME_BACKTRACE, second_line);
-
- /* check if trace doesn't have line: 'Your BIOS is broken' */
- if (strstr(second_line, "Your BIOS is broken"))
- dd_save_text(dd, FILENAME_NOT_REPORTABLE,
- _("A kernel problem occurred because of broken BIOS. "
- "Unfortunately, such problems are not fixable by kernel maintainers."));
- /* check if trace doesn't have line: 'Your hardware is unsupported' */
- else if (strstr(second_line, "Your hardware is unsupported"))
- dd_save_text(dd, FILENAME_NOT_REPORTABLE,
- _("A kernel problem occurred, but your hardware is unsupported, "
- "therefore kernel maintainers are unable to fix this problem."));
- else
- {
- char *tainted_short = kernel_tainted_short(second_line);
- if (tainted_short)
- {
- log_notice("Kernel is tainted '%s'", tainted_short);
- dd_save_text(dd, FILENAME_TAINTED_SHORT, tainted_short);
-
- char *tnt_long = kernel_tainted_long(tainted_short);
- dd_save_text(dd, FILENAME_TAINTED_LONG, tnt_long);
- free(tnt_long);
-
- struct strbuf *reason = strbuf_new();
- const char *fmt = _("A kernel problem occurred, but your kernel has been "
- "tainted (flags:%s). Kernel maintainers are unable to "
- "diagnose tainted reports.");
- strbuf_append_strf(reason, fmt, tainted_short);
-
- char *modlist = !proc_modules ? NULL : list_of_tainted_modules(proc_modules);
- if (modlist)
- {
- strbuf_append_strf(reason, _(" Tainted modules: %s."), modlist);
- free(modlist);
- }
-
- dd_save_text(dd, FILENAME_NOT_REPORTABLE, reason->buf);
- strbuf_free(reason);
- free(tainted_short);
- }
- }
-
- // TODO: add "Kernel oops: " prefix, so that all oopses have recognizable FILENAME_REASON?
- // kernel oops 1st line may look quite puzzling otherwise...
- strchrnul(second_line, '\n')[0] = '\0';
- dd_save_text(dd, FILENAME_REASON, second_line);
-}
-
-/* returns number of errors */
-static unsigned create_oops_dump_dirs(GList *oops_list, unsigned oops_cnt)
-{
- unsigned countdown = MAX_DUMPED_DD_COUNT; /* do not report hundreds of oopses */
-
- log_notice("Saving %u oopses as problem dirs", oops_cnt >= countdown ? countdown : oops_cnt);
-
- char *cmdline_str = xmalloc_fopen_fgetline_fclose("/proc/cmdline");
- char *fips_enabled = xmalloc_fopen_fgetline_fclose("/proc/sys/crypto/fips_enabled");
- char *proc_modules = xmalloc_open_read_close("/proc/modules", /*maxsize:*/ NULL);
- char *suspend_stats = xmalloc_open_read_close("/sys/kernel/debug/suspend_stats", /*maxsize:*/ NULL);
-
- time_t t = time(NULL);
- const char *iso_date = iso_date_string(&t);
- /* dump should be readable by all if we're run with -x */
- uid_t my_euid = (uid_t)-1L;
- mode_t mode = DEFAULT_DUMP_DIR_MODE | S_IROTH;
- /* and readable only for the owner otherwise */
- if (!world_readable_dump)
- {
- mode = DEFAULT_DUMP_DIR_MODE;
- my_euid = geteuid();
- }
-
- pid_t my_pid = getpid();
- unsigned idx = 0;
- unsigned errors = 0;
- while (idx < oops_cnt)
- {
- char base[sizeof("oops-YYYY-MM-DD-hh:mm:ss-%lu-%lu") + 2 * sizeof(long)*3];
- sprintf(base, "oops-%s-%lu-%lu", iso_date, (long)my_pid, (long)idx);
- char *path = concat_path_file(debug_dumps_dir, base);
-
- struct dump_dir *dd = dd_create(path, /*uid:*/ my_euid, mode);
- if (dd)
- {
- dd_create_basic_files(dd, /*uid:*/ my_euid, NULL);
- save_oops_data_in_dump_dir(dd, (char*)g_list_nth_data(oops_list, idx++), proc_modules);
- dd_save_text(dd, FILENAME_ABRT_VERSION, VERSION);
- dd_save_text(dd, FILENAME_ANALYZER, "Kerneloops");
- dd_save_text(dd, FILENAME_TYPE, "Kerneloops");
- if (cmdline_str)
- dd_save_text(dd, FILENAME_CMDLINE, cmdline_str);
- if (proc_modules)
- dd_save_text(dd, "proc_modules", proc_modules);
- if (fips_enabled && strcmp(fips_enabled, "0") != 0)
- dd_save_text(dd, "fips_enabled", fips_enabled);
- if (suspend_stats)
- dd_save_text(dd, "suspend_stats", suspend_stats);
- dd_close(dd);
- notify_new_path(path);
- }
- else
- errors++;
-
- free(path);
-
- if (--countdown == 0)
- break;
-
- if (dd && throttle_dd_creation)
- sleep(1);
- }
-
- free(cmdline_str);
- free(proc_modules);
- free(fips_enabled);
- free(suspend_stats);
-
- return errors;
-}
-
int main(int argc, char **argv)
{
/* I18n */
@@ -267,6 +89,7 @@ int main(int argc, char **argv)
OPT_m = 1 << 8,
};
char *problem_dir = NULL;
+ char *dump_location = NULL;
/* Keep enum above and order of options below in sync! */
struct options program_options[] = {
OPT__VERBOSE(&g_verbose),
@@ -275,7 +98,7 @@ int main(int argc, char **argv)
/* oopses don't contain any sensitive info, and even
* the old koops app was showing the oopses to all users
*/
- OPT_STRING('d', NULL, &debug_dumps_dir, "DIR", _("Create new problem directory in DIR for every oops found")),
+ OPT_STRING('d', NULL, &dump_location, "DIR", _("Create new problem directory in DIR for every oops found")),
OPT_BOOL( 'D', NULL, NULL, _("Same as -d DumpLocation, DumpLocation is specified in abrt.conf")),
OPT_STRING('u', NULL, &problem_dir, "PROBLEM", _("Save the extracted information in PROBLEM")),
OPT_BOOL( 'x', NULL, NULL, _("Make the problem directory world readable")),
@@ -295,26 +118,19 @@ int main(int argc, char **argv)
if (opts & OPT_m)
{
- map_string_t *settings = new_map_string();
-
- load_abrt_plugin_conf_file("oops.conf", settings);
-
- int only_fatal_mce = 1;
- try_get_map_string_item_as_bool(settings, "OnlyFatalMCE", &only_fatal_mce);
-
- free_map_string(settings);
-
- if (only_fatal_mce)
+ char *oops_string_filter_regex = abrt_oops_string_filter_regex();
+ if (oops_string_filter_regex)
{
- regex_t mce_re;
- if (regcomp(&mce_re, "^Machine .*$", REG_NOSUB) != 0)
+ regex_t filter_re;
+ if (regcomp(&filter_re, oops_string_filter_regex, REG_NOSUB) != 0)
perror_msg_and_die(_("Failed to compile regex"));
- const regex_t *filter[] = { &mce_re, NULL };
+ const regex_t *filter[] = { &filter_re, NULL };
koops_print_suspicious_strings_filtered(filter);
- regfree(&mce_re);
+ regfree(&filter_re);
+ free(oops_string_filter_regex);
}
else
koops_print_suspicious_strings();
@@ -327,100 +143,55 @@ int main(int argc, char **argv)
if (opts & OPT_d)
show_usage_and_die(program_usage_string, program_options);
load_abrt_conf();
- debug_dumps_dir = g_settings_dump_location;
+ dump_location = g_settings_dump_location;
g_settings_dump_location = NULL;
free_abrt_conf_data();
}
+ int oops_utils_flags = 0;
+ if ((opts & OPT_x))
+ oops_utils_flags |= ABRT_OOPS_WORLD_READABLE;
+
+ if ((opts & OPT_t))
+ oops_utils_flags |= ABRT_OOPS_THROTTLE_CREATION;
+
+ if ((opts & OPT_o))
+ oops_utils_flags |= ABRT_OOPS_PRINT_STDOUT;
+
argv += optind;
if (argv[0])
xmove_fd(xopen(argv[0], O_RDONLY), STDIN_FILENO);
- world_readable_dump = (opts & OPT_x);
- throttle_dd_creation = (opts & OPT_t);
- unsigned errors = 0;
GList *oops_list = NULL;
scan_syslog_file(&oops_list, STDIN_FILENO);
- int oops_cnt = g_list_length(oops_list);
- if (oops_cnt != 0)
+ unsigned errors = 0;
+ if (opts & OPT_u)
{
- log("Found oopses: %d", oops_cnt);
- if (opts & OPT_o)
- {
- int i = 0;
- while (i < oops_cnt)
- {
- char *kernel_bt = (char*)g_list_nth_data(oops_list, i++);
- char *tainted_short = kernel_tainted_short(kernel_bt);
- if (tainted_short)
- log("Kernel is tainted '%s'", tainted_short);
-
- free(tainted_short);
- printf("\nVersion: %s", kernel_bt);
- }
- }
- if (opts & (OPT_d|OPT_D))
- {
- if (opts & OPT_D)
- {
- load_abrt_conf();
- debug_dumps_dir = g_settings_dump_location;
- }
-
- log("Creating problem directories");
- errors = create_oops_dump_dirs(oops_list, oops_cnt);
- if (errors)
- log("%d errors while dumping oopses", errors);
- /*
- * This marker in syslog file prevents us from
- * re-parsing old oopses. The only problem is that we
- * can't be sure here that the file we are watching
- * is the same file where syslog(xxx) stuff ends up.
- */
- syslog(LOG_WARNING,
- "Reported %u kernel oopses to Abrt",
- oops_cnt
- );
- }
- if (opts & OPT_u)
+ log("Updating problem directory");
+ switch (g_list_length(oops_list))
{
- log("Updating problem directory");
- switch (oops_cnt)
- {
- case 1:
+ case 1:
+ {
+ struct dump_dir *dd = dd_opendir(problem_dir, /*open for writing*/0);
+ if (dd)
{
- struct dump_dir *dd = dd_opendir(problem_dir, /*open for writing*/0);
- if (dd)
- {
- save_oops_data_in_dump_dir(dd, (char *)oops_list->data, /*no proc modules*/NULL);
- dd_close(dd);
- }
+ abrt_oops_save_data_in_dump_dir(dd, (char *)oops_list->data, /*no proc modules*/NULL);
+ dd_close(dd);
}
- break;
- default:
- error_msg(_("Can't update the problem: more than one oops found"));
- break;
- }
+ }
+ break;
+ default:
+ error_msg(_("Can't update the problem: more than one oops found"));
+ errors = 1;
+ break;
}
}
+ else
+ errors = abrt_oops_process_list(oops_list, dump_location, oops_utils_flags);
+
list_free_with_free(oops_list);
//oops_list = NULL;
- /* If we are run by a log watcher, this delays log rescan
- * (because log watcher waits to us to terminate)
- * and possibly prevents dreaded "abrt storm".
- */
- int unreported_cnt = oops_cnt - MAX_DUMPED_DD_COUNT;
- if (unreported_cnt > 0 && throttle_dd_creation)
- {
- /* Quadratic throttle time growth, but careful to not overflow in "n*n" */
- int n = unreported_cnt > 30 ? 30 : unreported_cnt;
- n = n * n;
- if (n > 9)
- log(_("Sleeping for %d seconds"), n);
- sleep(n); /* max 15 mins */
- }
-
return errors;
}
diff --git a/src/plugins/abrt-journal.c b/src/plugins/abrt-journal.c
new file mode 100644
index 0000000..472357d
--- /dev/null
+++ b/src/plugins/abrt-journal.c
@@ -0,0 +1,295 @@
+/*
+ * Copyright (C) 2014 ABRT team
+ * Copyright (C) 2014 RedHat Inc
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ */
+#include <unistd.h>
+#include <signal.h>
+#include <poll.h>
+#include <stdlib.h>
+#include <abrt/libabrt.h>
+#include <stdio.h>
+
+#include "abrt-journal.h"
+
+#include <systemd/sd-journal.h>
+
+
+struct abrt_journal
+{
+ sd_journal *j;
+};
+
+int abrt_journal_new(abrt_journal_t **journal)
+{
+ sd_journal *j;
+ const int r = sd_journal_open(&j, SD_JOURNAL_LOCAL_ONLY);
+ if (r < 0)
+ {
+ log_notice("Failed to open journal: %s", strerror(-r));
+ return r;
+ }
+
+ *journal = xzalloc(sizeof(**journal));
+ (*journal)->j = j;
+
+ return 0;
+}
+
+void abrt_journal_free(abrt_journal_t *journal)
+{
+ sd_journal_close(journal->j);
+ journal->j = (void *)0xDEADBEAF;
+
+ free(journal);
+}
+
+int abrt_journal_set_journal_filter(abrt_journal_t *journal, const char *const *journal_filter_list)
+{
+ const char *const *cursor = journal_filter_list;
+
+ while (*cursor)
+ {
+ const int r = sd_journal_add_match(journal->j, *cursor, strlen(*cursor));
+ if (r < 0)
+ {
+ log_notice("Failed to set journal filter: %s", strerror(-r));
+ return r;
+ }
+
+ ++cursor;
+ }
+
+ return 0;
+}
+
+int abrt_journal_get_field(abrt_journal_t *journal, const char *field, const void **value, size_t *value_len)
+{
+ const int r = sd_journal_get_data(journal->j, field, value, value_len);
+ if (r < 0)
+ {
+ log_notice("Failed to read '%s' field: %s", field, strerror(-r));
+ return r;
+ }
+
+ return 0;
+}
+
+int abrt_journal_get_string_field(abrt_journal_t *journal, const char *field, const char **value)
+{
+ size_t value_len;
+ const int r = abrt_journal_get_field(journal, field, (const void **)value, &value_len);
+ if (r < 0)
+ {
+ return r;
+ }
+
+ const size_t pfx_len = strlen(field) + 1;
+ if (value_len < pfx_len)
+ {
+ error_msg("Invalid data format from journal: field data are not prefixed with field name");
+ return -EBADMSG;
+ }
+
+ *value += pfx_len;
+ return 0;
+}
+
+int abrt_journal_get_log_line(abrt_journal_t *journal, const char **line)
+{
+ const int r = abrt_journal_get_string_field(journal, "MESSAGE", line);
+ if (r < 0)
+ log_notice("Cannot read journal data. Exiting");
+
+ return r;
+}
+
+int abrt_journal_get_cursor(abrt_journal_t *journal, char **cursor)
+{
+ const int r = sd_journal_get_cursor(journal->j, cursor);
+
+ if (r < 0)
+ {
+ log_notice("Could not get journal cursor: '%s'", strerror(-r));
+ return r;
+ }
+
+ return 0;
+}
+
+int abrt_journal_set_cursor(abrt_journal_t *journal, const char *cursor)
+{
+ const int r = sd_journal_seek_cursor(journal->j, cursor);
+ if (r < 0)
+ {
+ log_notice("Failed to seek journal to cursor '%s': %s\n", cursor, strerror(-r));
+ return r;
+ }
+
+ return 0;
+}
+
+int abrt_journal_seek_tail(abrt_journal_t *journal)
+{
+ const int r = sd_journal_seek_tail(journal->j);
+ if (r < 0)
+ {
+ log_notice("Failed to seek journal to the end: %s\n", strerror(-r));
+ return r;
+ }
+
+ /* BUG: https://bugzilla.redhat.com/show_bug.cgi?id=979487 */
+ sd_journal_previous_skip(journal->j, 1);
+ return 0;
+}
+
+int abrt_journal_next(abrt_journal_t *journal)
+{
+ const int r = sd_journal_next(journal->j);
+ if (r < 0)
+ log_notice("Failed to iterate to next entry: %s", strerror(-r));
+ return r;
+}
+
+/*
+ * ABRT systemd-journal wrapper end
+ */
+
+static volatile int s_loop_terminated;
+void signal_loop_to_terminate(int signum)
+{
+ signum = signum;
+ s_loop_terminated = 1;
+}
+
+enum abrt_journal_watch_state
+{
+ ABRT_JOURNAL_WATCH_READY,
+ ABRT_JOURNAL_WATCH_STOPPED,
+};
+
+struct abrt_journal_watch
+{
+ abrt_journal_t *j;
+ int state;
+
+ abrt_journal_watch_callback callback;
+ void *callback_data;
+};
+
+int abrt_journal_watch_new(abrt_journal_watch_t **watch, abrt_journal_t *journal, abrt_journal_watch_callback callback, void *callback_data)
+{
+ assert(callback != NULL || !"ABRT watch needs valid callback ptr");
+
+ *watch = xzalloc(sizeof(**watch));
+ (*watch)->j = journal;
+ (*watch)->callback = callback;
+ (*watch)->callback_data = callback_data;
+
+ return 0;
+}
+
+void abrt_journal_watch_free(abrt_journal_watch_t *watch)
+{
+ watch->j = (void *)0xDEADBEAF;
+ free(watch);
+}
+
+abrt_journal_t *abrt_journal_watch_get_journal(abrt_journal_watch_t *watch)
+{
+ return watch->j;
+}
+
+int abrt_journal_watch_run_sync(abrt_journal_watch_t *watch)
+{
+ sigset_t mask;
+ sigfillset(&mask);
+
+ /* Exit gracefully: */
+ /* services usually exit on SIGTERM and SIGHUP */
+ sigdelset(&mask, SIGTERM);
+ signal(SIGTERM, signal_loop_to_terminate);
+ sigdelset(&mask, SIGHUP);
+ signal(SIGHUP, signal_loop_to_terminate);
+ /* Ctrl-C for easier debugging */
+ sigdelset(&mask, SIGINT);
+ signal(SIGINT, signal_loop_to_terminate);
+
+ /* Die on kill $PID */
+ sigdelset(&mask, SIGKILL);
+
+ struct pollfd pollfd;
+ pollfd.fd = sd_journal_get_fd(watch->j->j);
+ pollfd.events = sd_journal_get_events(watch->j->j);
+
+ int r = 0;
+
+ while (!s_loop_terminated && watch->state == ABRT_JOURNAL_WATCH_READY)
+ {
+ r = sd_journal_next(watch->j->j);
+ if (r < 0)
+ {
+ log_warning("Failed to iterate to next entry: %s", strerror(-r));
+ break;
+ }
+ else if (r == 0)
+ {
+ ppoll(&pollfd, 1, NULL, &mask);
+ r = sd_journal_process(watch->j->j);
+ if (r < 0)
+ {
+ log_warning("Failed to get journal changes: %s\n", strerror(-r));
+ break;
+ }
+ continue;
+ }
+
+ watch->callback(watch, watch->callback_data);
+ }
+
+ return r;
+}
+
+void abrt_journal_watch_stop(abrt_journal_watch_t *watch)
+{
+ watch->state = ABRT_JOURNAL_WATCH_STOPPED;
+}
+
+/*
+ * ABRT systemd-journal watch - end
+ */
+
+void abrt_journal_watch_notify_strings(abrt_journal_watch_t *watch, void *data)
+{
+ struct abrt_journal_watch_notify_strings *conf = (struct abrt_journal_watch_notify_strings *)data;
+
+ const char *message = NULL;
+
+ if (abrt_journal_get_string_field(abrt_journal_watch_get_journal(watch), "MESSAGE", &message) < 0)
+ error_msg_and_die("Cannot read journal data.");
+
+ GList *cur = conf->strings;
+ while (cur)
+ {
+ if (strstr(message, cur->data) != NULL)
+ break;
+
+ cur = g_list_next(cur);
+ }
+
+ if (cur)
+ conf->decorated_cb(watch, conf->decorated_cb_data);
+}
+
+/*
+ * ABRT systemd-journal strings notifier - end
+ */
diff --git a/src/plugins/abrt-journal.h b/src/plugins/abrt-journal.h
new file mode 100644
index 0000000..219cf60
--- /dev/null
+++ b/src/plugins/abrt-journal.h
@@ -0,0 +1,110 @@
+/*
+ * Copyright (C) 2014 ABRT team
+ * Copyright (C) 2014 RedHat Inc
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ */
+#ifndef _ABRT_JOURNAL_H_
+#define _ABRT_JOURNAL_H_
+
+#include <glib.h>
+
+#ifdef __cplusplus
+extern "C" {
+#endif
+
+/*
+ * A systemd-journal wrapper
+ * (isolates systemd API in a single compile unit)
+ */
+struct abrt_journal;
+typedef struct abrt_journal abrt_journal_t;
+
+int abrt_journal_new(abrt_journal_t **journal);
+
+void abrt_journal_free(abrt_journal_t *journal);
+
+int abrt_journal_set_journal_filter(abrt_journal_t *journal,
+ const char *const *journal_filter_list);
+
+int abrt_journal_get_field(abrt_journal_t *journal,
+ const char *field,
+ const void **value,
+ size_t *value_len);
+
+int abrt_journal_get_string_field(abrt_journal_t *journal,
+ const char *field,
+ const char **value);
+
+int abrt_journal_get_log_line(abrt_journal_t *journal, const char **line);
+
+int abrt_journal_get_cursor(abrt_journal_t *journal, char **cursor);
+
+int abrt_journal_set_cursor(abrt_journal_t *journal, const char *cursor);
+
+int abrt_journal_seek_tail(abrt_journal_t *journal);
+
+int abrt_journal_next(abrt_journal_t *journal);
+
+/*
+ * A systemd-journal listener which waits for new messages a loop and notifies
+ * them via a call back
+ */
+struct abrt_journal_watch;
+typedef struct abrt_journal_watch abrt_journal_watch_t;
+
+typedef void (* abrt_journal_watch_callback)(struct abrt_journal_watch *watch,
+ void *data);
+
+int abrt_journal_watch_new(abrt_journal_watch_t **watch,
+ abrt_journal_t *journal,
+ abrt_journal_watch_callback callback,
+ void *callback_data);
+
+void abrt_journal_watch_free(abrt_journal_watch_t *watch);
+
+/*
+ * Returns the watched journal.
+ */
+abrt_journal_t *abrt_journal_watch_get_journal(abrt_journal_watch_t *watch);
+
+/*
+ * Starts reading journal messages and waiting for new messages in a loop.
+ *
+ * SIGTERM and SIGINT terminates the loop gracefully.
+ */
+int abrt_journal_watch_run_sync(abrt_journal_watch_t *watch);
+
+/*
+ * Can be used to terminate the loop in abrt_journal_watch_run_sync()
+ */
+void abrt_journal_watch_stop(abrt_journal_watch_t *watch);
+
+
+/*
+ * A decorator for abrt_journal_watch call backs which calls the decorated call
+ * back in case where journal message contains a string from the interested
+ * list.
+ */
+struct abrt_journal_watch_notify_strings
+{
+ abrt_journal_watch_callback decorated_cb;
+ void *decorated_cb_data;
+ GList *strings;
+};
+
+void abrt_journal_watch_notify_strings(abrt_journal_watch_t *watch, void *data);
+
+#ifdef __cplusplus
+}
+#endif
+
+#endif /*_ABRT_JOURNAL_H_*/
diff --git a/src/plugins/oops-utils.c b/src/plugins/oops-utils.c
new file mode 100644
index 0000000..9e2355e
--- /dev/null
+++ b/src/plugins/oops-utils.c
@@ -0,0 +1,279 @@
+/*
+ * Copyright (C) 2014 ABRT team
+ * Copyright (C) 2014 RedHat Inc
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ */
+#include "oops-utils.h"
+#include "libabrt.h"
+
+int abrt_oops_process_list(GList *oops_list, const char *dump_location, int flags)
+{
+ unsigned errors = 0;
+
+ int oops_cnt = g_list_length(oops_list);
+ if (oops_cnt != 0)
+ {
+ log("Found oopses: %d", oops_cnt);
+ if ((flags & ABRT_OOPS_PRINT_STDOUT))
+ {
+ int i = 0;
+ while (i < oops_cnt)
+ {
+ char *kernel_bt = (char*)g_list_nth_data(oops_list, i++);
+ char *tainted_short = kernel_tainted_short(kernel_bt);
+ if (tainted_short)
+ log("Kernel is tainted '%s'", tainted_short);
+
+ free(tainted_short);
+ printf("\nVersion: %s", kernel_bt);
+ }
+ }
+ if (dump_location != NULL)
+ {
+ log("Creating problem directories");
+ errors = abrt_oops_create_dump_dirs(oops_list, dump_location, flags);
+ if (errors)
+ log("%d errors while dumping oopses", errors);
+ /*
+ * This marker in syslog file prevents us from
+ * re-parsing old oopses. The only problem is that we
+ * can't be sure here that the file we are watching
+ * is the same file where syslog(xxx) stuff ends up.
+ */
+ syslog(LOG_WARNING,
+ "Reported %u kernel oopses to Abrt",
+ oops_cnt
+ );
+ }
+ }
+
+ /* If we are run by a log watcher, this delays log rescan
+ * (because log watcher waits to us to terminate)
+ * and possibly prevents dreaded "abrt storm".
+ */
+ int unreported_cnt = oops_cnt - ABRT_OOPS_MAX_DUMPED_COUNT;
+ if (g_abrt_oops_sleep_woke_up_on_signal <= 0 &&
+ (unreported_cnt > 0 && (flags & ABRT_OOPS_THROTTLE_CREATION)))
+ {
+ /* Quadratic throttle time growth, but careful to not overflow in "n*n" */
+ int n = unreported_cnt > 30 ? 30 : unreported_cnt;
+ n = n * n;
+ if (n > 9)
+ log(_("Sleeping for %d seconds"), n);
+ abrt_oops_signaled_sleep(n); /* max 15 mins */
+ }
+
+ return errors;
+}
+
+/* returns number of errors */
+unsigned abrt_oops_create_dump_dirs(GList *oops_list, const char *dump_location, int flags)
+{
+ const int oops_cnt = g_list_length(oops_list);
+ unsigned countdown = ABRT_OOPS_MAX_DUMPED_COUNT; /* do not report hundreds of oopses */
+
+ log_notice("Saving %u oopses as problem dirs", oops_cnt >= countdown ? countdown : oops_cnt);
+
+ char *cmdline_str = xmalloc_fopen_fgetline_fclose("/proc/cmdline");
+ char *fips_enabled = xmalloc_fopen_fgetline_fclose("/proc/sys/crypto/fips_enabled");
+ char *proc_modules = xmalloc_open_read_close("/proc/modules", /*maxsize:*/ NULL);
+ char *suspend_stats = xmalloc_open_read_close("/sys/kernel/debug/suspend_stats", /*maxsize:*/ NULL);
+
+ time_t t = time(NULL);
+ const char *iso_date = iso_date_string(&t);
+ /* dump should be readable by all if we're run with -x */
+ uid_t my_euid = (uid_t)-1L;
+ mode_t mode = DEFAULT_DUMP_DIR_MODE | S_IROTH;
+ /* and readable only for the owner otherwise */
+ if (!(flags & ABRT_OOPS_WORLD_READABLE))
+ {
+ mode = DEFAULT_DUMP_DIR_MODE;
+ my_euid = geteuid();
+ }
+
+ pid_t my_pid = getpid();
+ unsigned idx = 0;
+ unsigned errors = 0;
+ while (idx < oops_cnt)
+ {
+ char base[sizeof("oops-YYYY-MM-DD-hh:mm:ss-%lu-%lu") + 2 * sizeof(long)*3];
+ sprintf(base, "oops-%s-%lu-%lu", iso_date, (long)my_pid, (long)idx);
+ char *path = concat_path_file(dump_location, base);
+
+ struct dump_dir *dd = dd_create(path, /*uid:*/ my_euid, mode);
+ if (dd)
+ {
+ dd_create_basic_files(dd, /*uid:*/ my_euid, NULL);
+ abrt_oops_save_data_in_dump_dir(dd, (char*)g_list_nth_data(oops_list, idx++), proc_modules);
+ dd_save_text(dd, FILENAME_ABRT_VERSION, VERSION);
+ dd_save_text(dd, FILENAME_ANALYZER, "Kerneloops");
+ dd_save_text(dd, FILENAME_TYPE, "Kerneloops");
+ if (cmdline_str)
+ dd_save_text(dd, FILENAME_CMDLINE, cmdline_str);
+ if (proc_modules)
+ dd_save_text(dd, "proc_modules", proc_modules);
+ if (fips_enabled && strcmp(fips_enabled, "0") != 0)
+ dd_save_text(dd, "fips_enabled", fips_enabled);
+ if (suspend_stats)
+ dd_save_text(dd, "suspend_stats", suspend_stats);
+ dd_close(dd);
+ notify_new_path(path);
+ }
+ else
+ errors++;
+
+ free(path);
+
+ if (--countdown == 0)
+ break;
+
+ if (dd && (flags & ABRT_OOPS_THROTTLE_CREATION))
+ if (abrt_oops_signaled_sleep(1) > 0)
+ break;
+ }
+
+ free(cmdline_str);
+ free(proc_modules);
+ free(fips_enabled);
+ free(suspend_stats);
+
+ return errors;
+}
+
+static char *abrt_oops_list_of_tainted_modules(const char *proc_modules)
+{
+ struct strbuf *result = strbuf_new();
+
+ const char *p = proc_modules;
+ for (;;)
+ {
+ const char *end = strchrnul(p, '\n');
+ const char *paren = strchrnul(p, '(');
+ /* We look for a line with this format:
+ * "kvm_intel 126289 0 - Live 0xf829e000 (taint_flags)"
+ * where taint_flags have letters
+ * (flags '+' and '-' indicate (un)loading, we must ignore them).
+ */
+ while (++paren < end)
+ {
+ if ((unsigned)(toupper(*paren) - 'A') <= 'Z'-'A')
+ {
+ strbuf_append_strf(result, result->len == 0 ? "%.*s" : ",%.*s",
+ (int)(strchrnul(p,' ') - p), p
+ );
+ break;
+ }
+ if (*paren == ')')
+ break;
+ }
+
+ if (*end == '\0')
+ break;
+ p = end + 1;
+ }
+
+ if (result->len == 0)
+ {
+ strbuf_free(result);
+ return NULL;
+ }
+ return strbuf_free_nobuf(result);
+}
+
+void abrt_oops_save_data_in_dump_dir(struct dump_dir *dd, char *oops, const char *proc_modules)
+{
+ char *first_line = oops;
+ char *second_line = (char*)strchr(first_line, '\n'); /* never NULL */
+ *second_line++ = '\0';
+
+ if (first_line[0])
+ dd_save_text(dd, FILENAME_KERNEL, first_line);
+ dd_save_text(dd, FILENAME_BACKTRACE, second_line);
+
+ /* check if trace doesn't have line: 'Your BIOS is broken' */
+ if (strstr(second_line, "Your BIOS is broken"))
+ dd_save_text(dd, FILENAME_NOT_REPORTABLE,
+ _("A kernel problem occurred because of broken BIOS. "
+ "Unfortunately, such problems are not fixable by kernel maintainers."));
+ /* check if trace doesn't have line: 'Your hardware is unsupported' */
+ else if (strstr(second_line, "Your hardware is unsupported"))
+ dd_save_text(dd, FILENAME_NOT_REPORTABLE,
+ _("A kernel problem occurred, but your hardware is unsupported, "
+ "therefore kernel maintainers are unable to fix this problem."));
+ else
+ {
+ char *tainted_short = kernel_tainted_short(second_line);
+ if (tainted_short)
+ {
+ log_notice("Kernel is tainted '%s'", tainted_short);
+ dd_save_text(dd, FILENAME_TAINTED_SHORT, tainted_short);
+
+ char *tnt_long = kernel_tainted_long(tainted_short);
+ dd_save_text(dd, FILENAME_TAINTED_LONG, tnt_long);
+ free(tnt_long);
+
+ struct strbuf *reason = strbuf_new();
+ const char *fmt = _("A kernel problem occurred, but your kernel has been "
+ "tainted (flags:%s). Kernel maintainers are unable to "
+ "diagnose tainted reports.");
+ strbuf_append_strf(reason, fmt, tainted_short);
+
+ char *modlist = !proc_modules ? NULL : abrt_oops_list_of_tainted_modules(proc_modules);
+ if (modlist)
+ {
+ strbuf_append_strf(reason, _(" Tainted modules: %s."), modlist);
+ free(modlist);
+ }
+
+ dd_save_text(dd, FILENAME_NOT_REPORTABLE, reason->buf);
+ strbuf_free(reason);
+ free(tainted_short);
+ }
+ }
+
+ // TODO: add "Kernel oops: " prefix, so that all oopses have recognizable FILENAME_REASON?
+ // kernel oops 1st line may look quite puzzling otherwise...
+ strchrnul(second_line, '\n')[0] = '\0';
+ dd_save_text(dd, FILENAME_REASON, second_line);
+}
+
+int abrt_oops_signaled_sleep(int seconds)
+{
+ sigset_t set;
+ sigemptyset(&set);
+ sigaddset(&set, SIGTERM);
+ sigaddset(&set, SIGINT);
+ sigaddset(&set, SIGHUP);
+
+ struct timespec timeout;
+ timeout.tv_sec = seconds;
+ timeout.tv_nsec = 0;
+
+ return g_abrt_oops_sleep_woke_up_on_signal = sigtimedwait(&set, NULL, &timeout);
+}
+
+char *abrt_oops_string_filter_regex(void)
+{
+ map_string_t *settings = new_map_string();
+
+ load_abrt_plugin_conf_file("oops.conf", settings);
+
+ int only_fatal_mce = 1;
+ try_get_map_string_item_as_bool(settings, "OnlyFatalMCE", &only_fatal_mce);
+
+ free_map_string(settings);
+
+ if (only_fatal_mce)
+ return xstrdup("^Machine .*$");
+
+ return NULL;
+}
diff --git a/src/plugins/oops-utils.h b/src/plugins/oops-utils.h
new file mode 100644
index 0000000..947f652
--- /dev/null
+++ b/src/plugins/oops-utils.h
@@ -0,0 +1,48 @@
+/*
+ * Copyright (C) 2014 ABRT team
+ * Copyright (C) 2014 RedHat Inc
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ */
+#ifndef _ABRT_OOPS_UTILS_H_
+#define _ABRT_OOPS_UTILS_H_
+
+#include "libabrt.h"
+
+/* How many problem dirs to create at most?
+ * Also causes cooldown sleep with -t if exceeded -
+ * useful when called from a log watcher.
+ */
+#define ABRT_OOPS_MAX_DUMPED_COUNT 5
+
+#ifdef __cplusplus
+extern "C" {
+#endif
+
+enum {
+ ABRT_OOPS_THROTTLE_CREATION = 1 << 0,
+ ABRT_OOPS_WORLD_READABLE = 1 << 1,
+ ABRT_OOPS_PRINT_STDOUT = 1 << 2,
+};
+
+int g_abrt_oops_sleep_woke_up_on_signal;
+
+int abrt_oops_process_list(GList *oops_list, const char *dump_location, int flags);
+unsigned abrt_oops_create_dump_dirs(GList *oops_list, const char *dump_location, int flags);
+void abrt_oops_save_data_in_dump_dir(struct dump_dir *dd, char *oops, const char *proc_modules);
+int abrt_oops_signaled_sleep(int seconds);
+char *abrt_oops_string_filter_regex(void);
+
+#ifdef __cplusplus
+}
+#endif
+
+#endif /*_ABRT_OOPS_UTILS_H_*/
--
1.9.3