]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - sbin/savecore/savecore.c
Merge ACPICA 20170929.
[FreeBSD/FreeBSD.git] / sbin / savecore / savecore.c
1 /*-
2  * Copyright (c) 2002 Poul-Henning Kamp
3  * Copyright (c) 2002 Networks Associates Technology, Inc.
4  * All rights reserved.
5  *
6  * This software was developed for the FreeBSD Project by Poul-Henning Kamp
7  * and NAI Labs, the Security Research Division of Network Associates, Inc.
8  * under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the
9  * DARPA CHATS research program.
10  *
11  * Redistribution and use in source and binary forms, with or without
12  * modification, are permitted provided that the following conditions
13  * are met:
14  * 1. Redistributions of source code must retain the above copyright
15  *    notice, this list of conditions and the following disclaimer.
16  * 2. Redistributions in binary form must reproduce the above copyright
17  *    notice, this list of conditions and the following disclaimer in the
18  *    documentation and/or other materials provided with the distribution.
19  * 3. The names of the authors may not be used to endorse or promote
20  *    products derived from this software without specific prior written
21  *    permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  *
35  * Copyright (c) 1986, 1992, 1993
36  *      The Regents of the University of California.  All rights reserved.
37  *
38  * Redistribution and use in source and binary forms, with or without
39  * modification, are permitted provided that the following conditions
40  * are met:
41  * 1. Redistributions of source code must retain the above copyright
42  *    notice, this list of conditions and the following disclaimer.
43  * 2. Redistributions in binary form must reproduce the above copyright
44  *    notice, this list of conditions and the following disclaimer in the
45  *    documentation and/or other materials provided with the distribution.
46  * 3. Neither the name of the University nor the names of its contributors
47  *    may be used to endorse or promote products derived from this software
48  *    without specific prior written permission.
49  *
50  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
51  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
52  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
53  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
54  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
55  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
56  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
57  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
58  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
59  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
60  * SUCH DAMAGE.
61  */
62
63 #include <sys/cdefs.h>
64 __FBSDID("$FreeBSD$");
65
66 #include <sys/param.h>
67 #include <sys/disk.h>
68 #include <sys/kerneldump.h>
69 #include <sys/mount.h>
70 #include <sys/stat.h>
71 #include <ctype.h>
72 #include <errno.h>
73 #include <fcntl.h>
74 #include <fstab.h>
75 #include <paths.h>
76 #include <signal.h>
77 #include <stdarg.h>
78 #include <stdbool.h>
79 #include <stdio.h>
80 #include <stdlib.h>
81 #include <string.h>
82 #include <syslog.h>
83 #include <time.h>
84 #include <unistd.h>
85 #include <libxo/xo.h>
86
87 /* The size of the buffer used for I/O. */
88 #define BUFFERSIZE      (1024*1024)
89
90 #define STATUS_BAD      0
91 #define STATUS_GOOD     1
92 #define STATUS_UNKNOWN  2
93
94 static int checkfor, compress, clear, force, keep, verbose;     /* flags */
95 static int nfound, nsaved, nerr;                        /* statistics */
96 static int maxdumps;
97
98 extern FILE *zopen(const char *, const char *);
99
100 static sig_atomic_t got_siginfo;
101 static void infohandler(int);
102
103 static void
104 printheader(xo_handle_t *xo, const struct kerneldumpheader *h,
105     const char *device, int bounds, const int status)
106 {
107         uint64_t dumplen;
108         time_t t;
109         const char *stat_str;
110
111         xo_flush_h(xo);
112         xo_emit_h(xo, "{Lwc:Dump header from device}{:dump_device/%s}\n",
113             device);
114         xo_emit_h(xo, "{P:  }{Lwc:Architecture}{:architecture/%s}\n",
115             h->architecture);
116         xo_emit_h(xo,
117             "{P:  }{Lwc:Architecture Version}{:architecture_version/%u}\n",
118             dtoh32(h->architectureversion));
119         dumplen = dtoh64(h->dumplength);
120         xo_emit_h(xo, "{P:  }{Lwc:Dump Length}{:dump_length_bytes/%lld}\n",
121             (long long)dumplen);
122         xo_emit_h(xo, "{P:  }{Lwc:Blocksize}{:blocksize/%d}\n",
123             dtoh32(h->blocksize));
124
125         t = dtoh64(h->dumptime);
126         xo_emit_h(xo, "{P:  }{Lwc:Dumptime}{:dumptime/%s}", ctime(&t));
127         xo_emit_h(xo, "{P:  }{Lwc:Hostname}{:hostname/%s}\n", h->hostname);
128         xo_emit_h(xo, "{P:  }{Lwc:Magic}{:magic/%s}\n", h->magic);
129         xo_emit_h(xo, "{P:  }{Lwc:Version String}{:version_string/%s}",
130             h->versionstring);
131         xo_emit_h(xo, "{P:  }{Lwc:Panic String}{:panic_string/%s}\n",
132             h->panicstring);
133         xo_emit_h(xo, "{P:  }{Lwc:Dump Parity}{:dump_parity/%u}\n", h->parity);
134         xo_emit_h(xo, "{P:  }{Lwc:Bounds}{:bounds/%d}\n", bounds);
135
136         switch (status) {
137         case STATUS_BAD:
138                 stat_str = "bad";
139                 break;
140         case STATUS_GOOD:
141                 stat_str = "good";
142                 break;
143         default:
144                 stat_str = "unknown";
145                 break;
146         }
147         xo_emit_h(xo, "{P:  }{Lwc:Dump Status}{:dump_status/%s}\n", stat_str);
148         xo_flush_h(xo);
149 }
150
151 static int
152 getbounds(void)
153 {
154         FILE *fp;
155         char buf[6];
156         int ret;
157
158         ret = 0;
159
160         if ((fp = fopen("bounds", "r")) == NULL) {
161                 if (verbose)
162                         printf("unable to open bounds file, using 0\n");
163                 return (ret);
164         }
165
166         if (fgets(buf, sizeof buf, fp) == NULL) {
167                 if (feof(fp))
168                         syslog(LOG_WARNING, "bounds file is empty, using 0");
169                 else
170                         syslog(LOG_WARNING, "bounds file: %s", strerror(errno));
171                 fclose(fp);
172                 return (ret);
173         }
174
175         errno = 0;
176         ret = (int)strtol(buf, NULL, 10);
177         if (ret == 0 && (errno == EINVAL || errno == ERANGE))
178                 syslog(LOG_WARNING, "invalid value found in bounds, using 0");
179         fclose(fp);
180         return (ret);
181 }
182
183 static void
184 writebounds(int bounds)
185 {
186         FILE *fp;
187
188         if ((fp = fopen("bounds", "w")) == NULL) {
189                 syslog(LOG_WARNING, "unable to write to bounds file: %m");
190                 return;
191         }
192
193         if (verbose)
194                 printf("bounds number: %d\n", bounds);
195
196         fprintf(fp, "%d\n", bounds);
197         fclose(fp);
198 }
199
200 static bool
201 writekey(const char *keyname, uint8_t *dumpkey, uint32_t dumpkeysize)
202 {
203         int fd;
204
205         fd = open(keyname, O_WRONLY | O_CREAT | O_TRUNC, 0600);
206         if (fd == -1) {
207                 syslog(LOG_ERR, "Unable to open %s to write the key: %m.",
208                     keyname);
209                 return (false);
210         }
211
212         if (write(fd, dumpkey, dumpkeysize) != (ssize_t)dumpkeysize) {
213                 syslog(LOG_ERR, "Unable to write the key to %s: %m.", keyname);
214                 close(fd);
215                 return (false);
216         }
217
218         close(fd);
219         return (true);
220 }
221
222 static off_t
223 file_size(const char *path)
224 {
225         struct stat sb;
226
227         /* Ignore all errors, those file may not exists. */
228         if (stat(path, &sb) == -1)
229                 return (0);
230         return (sb.st_size);
231 }
232
233 static off_t
234 saved_dump_size(int bounds)
235 {
236         static char path[PATH_MAX];
237         off_t dumpsize;
238
239         dumpsize = 0;
240
241         (void)snprintf(path, sizeof(path), "info.%d", bounds);
242         dumpsize += file_size(path);
243         (void)snprintf(path, sizeof(path), "vmcore.%d", bounds);
244         dumpsize += file_size(path);
245         (void)snprintf(path, sizeof(path), "vmcore.%d.gz", bounds);
246         dumpsize += file_size(path);
247         (void)snprintf(path, sizeof(path), "textdump.tar.%d", bounds);
248         dumpsize += file_size(path);
249         (void)snprintf(path, sizeof(path), "textdump.tar.%d.gz", bounds);
250         dumpsize += file_size(path);
251
252         return (dumpsize);
253 }
254
255 static void
256 saved_dump_remove(int bounds)
257 {
258         static char path[PATH_MAX];
259
260         (void)snprintf(path, sizeof(path), "info.%d", bounds);
261         (void)unlink(path);
262         (void)snprintf(path, sizeof(path), "vmcore.%d", bounds);
263         (void)unlink(path);
264         (void)snprintf(path, sizeof(path), "vmcore.%d.gz", bounds);
265         (void)unlink(path);
266         (void)snprintf(path, sizeof(path), "textdump.tar.%d", bounds);
267         (void)unlink(path);
268         (void)snprintf(path, sizeof(path), "textdump.tar.%d.gz", bounds);
269         (void)unlink(path);
270 }
271
272 static void
273 symlinks_remove(void)
274 {
275
276         (void)unlink("info.last");
277         (void)unlink("key.last");
278         (void)unlink("vmcore.last");
279         (void)unlink("vmcore.last.gz");
280         (void)unlink("vmcore_encrypted.last");
281         (void)unlink("vmcore_encrypted.last.gz");
282         (void)unlink("textdump.tar.last");
283         (void)unlink("textdump.tar.last.gz");
284 }
285
286 /*
287  * Check that sufficient space is available on the disk that holds the
288  * save directory.
289  */
290 static int
291 check_space(const char *savedir, off_t dumpsize, int bounds)
292 {
293         FILE *fp;
294         off_t available, minfree, spacefree, totfree, needed;
295         struct statfs fsbuf;
296         char buf[100];
297
298         if (statfs(".", &fsbuf) < 0) {
299                 syslog(LOG_ERR, "%s: %m", savedir);
300                 exit(1);
301         }
302         spacefree = ((off_t) fsbuf.f_bavail * fsbuf.f_bsize) / 1024;
303         totfree = ((off_t) fsbuf.f_bfree * fsbuf.f_bsize) / 1024;
304
305         if ((fp = fopen("minfree", "r")) == NULL)
306                 minfree = 0;
307         else {
308                 if (fgets(buf, sizeof(buf), fp) == NULL)
309                         minfree = 0;
310                 else {
311                         char *endp;
312
313                         errno = 0;
314                         minfree = strtoll(buf, &endp, 10);
315                         if (minfree == 0 && errno != 0)
316                                 minfree = -1;
317                         else {
318                                 while (*endp != '\0' && isspace(*endp))
319                                         endp++;
320                                 if (*endp != '\0' || minfree < 0)
321                                         minfree = -1;
322                         }
323                         if (minfree < 0)
324                                 syslog(LOG_WARNING,
325                                     "`minfree` didn't contain a valid size "
326                                     "(`%s`). Defaulting to 0", buf);
327                 }
328                 (void)fclose(fp);
329         }
330
331         available = minfree > 0 ? spacefree - minfree : totfree;
332         needed = dumpsize / 1024 + 2;   /* 2 for info file */
333         needed -= saved_dump_size(bounds);
334         if (available < needed) {
335                 syslog(LOG_WARNING,
336                     "no dump: not enough free space on device (need at least "
337                     "%jdkB for dump; %jdkB available; %jdkB reserved)",
338                     (intmax_t)needed,
339                     (intmax_t)available + minfree,
340                     (intmax_t)minfree);
341                 return (0);
342         }
343         if (spacefree - needed < 0)
344                 syslog(LOG_WARNING,
345                     "dump performed, but free space threshold crossed");
346         return (1);
347 }
348
349 static bool
350 compare_magic(const struct kerneldumpheader *kdh, const char *magic)
351 {
352
353         return (strncmp(kdh->magic, magic, sizeof(kdh->magic)) == 0);
354 }
355
356 #define BLOCKSIZE (1<<12)
357 #define BLOCKMASK (~(BLOCKSIZE-1))
358
359 static int
360 DoRegularFile(int fd, bool isencrypted, off_t dumpsize, char *buf,
361     const char *device, const char *filename, FILE *fp)
362 {
363         int he, hs, nr, nw, wl;
364         off_t dmpcnt, origsize;
365
366         dmpcnt = 0;
367         origsize = dumpsize;
368         he = 0;
369         while (dumpsize > 0) {
370                 wl = BUFFERSIZE;
371                 if (wl > dumpsize)
372                         wl = dumpsize;
373                 nr = read(fd, buf, wl);
374                 if (nr != wl) {
375                         if (nr == 0)
376                                 syslog(LOG_WARNING,
377                                     "WARNING: EOF on dump device");
378                         else
379                                 syslog(LOG_ERR, "read error on %s: %m", device);
380                         nerr++;
381                         return (-1);
382                 }
383                 if (compress || isencrypted) {
384                         nw = fwrite(buf, 1, wl, fp);
385                 } else {
386                         for (nw = 0; nw < nr; nw = he) {
387                                 /* find a contiguous block of zeroes */
388                                 for (hs = nw; hs < nr; hs += BLOCKSIZE) {
389                                         for (he = hs; he < nr && buf[he] == 0;
390                                             ++he)
391                                                 /* nothing */ ;
392                                         /* is the hole long enough to matter? */
393                                         if (he >= hs + BLOCKSIZE)
394                                                 break;
395                                 }
396
397                                 /* back down to a block boundary */
398                                 he &= BLOCKMASK;
399
400                                 /*
401                                  * 1) Don't go beyond the end of the buffer.
402                                  * 2) If the end of the buffer is less than
403                                  *    BLOCKSIZE bytes away, we're at the end
404                                  *    of the file, so just grab what's left.
405                                  */
406                                 if (hs + BLOCKSIZE > nr)
407                                         hs = he = nr;
408
409                                 /*
410                                  * At this point, we have a partial ordering:
411                                  *     nw <= hs <= he <= nr
412                                  * If hs > nw, buf[nw..hs] contains non-zero
413                                  * data. If he > hs, buf[hs..he] is all zeroes.
414                                  */
415                                 if (hs > nw)
416                                         if (fwrite(buf + nw, hs - nw, 1, fp)
417                                             != 1)
418                                         break;
419                                 if (he > hs)
420                                         if (fseeko(fp, he - hs, SEEK_CUR) == -1)
421                                                 break;
422                         }
423                 }
424                 if (nw != wl) {
425                         syslog(LOG_ERR,
426                             "write error on %s file: %m", filename);
427                         syslog(LOG_WARNING,
428                             "WARNING: vmcore may be incomplete");
429                         nerr++;
430                         return (-1);
431                 }
432                 if (verbose) {
433                         dmpcnt += wl;
434                         printf("%llu\r", (unsigned long long)dmpcnt);
435                         fflush(stdout);
436                 }
437                 dumpsize -= wl;
438                 if (got_siginfo) {
439                         printf("%s %.1lf%%\n", filename, (100.0 - (100.0 *
440                             (double)dumpsize / (double)origsize)));
441                         got_siginfo = 0;
442                 }
443         }
444         return (0);
445 }
446
447 /*
448  * Specialized version of dump-reading logic for use with textdumps, which
449  * are written backwards from the end of the partition, and must be reversed
450  * before being written to the file.  Textdumps are small, so do a bit less
451  * work to optimize/sparsify.
452  */
453 static int
454 DoTextdumpFile(int fd, off_t dumpsize, off_t lasthd, char *buf,
455     const char *device, const char *filename, FILE *fp)
456 {
457         int nr, nw, wl;
458         off_t dmpcnt, totsize;
459
460         totsize = dumpsize;
461         dmpcnt = 0;
462         wl = 512;
463         if ((dumpsize % wl) != 0) {
464                 syslog(LOG_ERR, "textdump uneven multiple of 512 on %s",
465                     device);
466                 nerr++;
467                 return (-1);
468         }
469         while (dumpsize > 0) {
470                 nr = pread(fd, buf, wl, lasthd - (totsize - dumpsize) - wl);
471                 if (nr != wl) {
472                         if (nr == 0)
473                                 syslog(LOG_WARNING,
474                                     "WARNING: EOF on dump device");
475                         else
476                                 syslog(LOG_ERR, "read error on %s: %m", device);
477                         nerr++;
478                         return (-1);
479                 }
480                 nw = fwrite(buf, 1, wl, fp);
481                 if (nw != wl) {
482                         syslog(LOG_ERR,
483                             "write error on %s file: %m", filename);
484                         syslog(LOG_WARNING,
485                             "WARNING: textdump may be incomplete");
486                         nerr++;
487                         return (-1);
488                 }
489                 if (verbose) {
490                         dmpcnt += wl;
491                         printf("%llu\r", (unsigned long long)dmpcnt);
492                         fflush(stdout);
493                 }
494                 dumpsize -= wl;
495         }
496         return (0);
497 }
498
499 static void
500 DoFile(const char *savedir, const char *device)
501 {
502         xo_handle_t *xostdout, *xoinfo;
503         static char infoname[PATH_MAX], corename[PATH_MAX], linkname[PATH_MAX];
504         static char keyname[PATH_MAX];
505         static char *buf = NULL;
506         char *temp = NULL;
507         struct kerneldumpheader kdhf, kdhl;
508         uint8_t *dumpkey;
509         off_t mediasize, dumpsize, firsthd, lasthd;
510         FILE *info, *fp;
511         mode_t oumask;
512         int fd, fdinfo, error;
513         int bounds, status;
514         u_int sectorsize, xostyle;
515         int istextdump;
516         uint32_t dumpkeysize;
517         bool isencrypted, ret;
518
519         bounds = getbounds();
520         dumpkey = NULL;
521         mediasize = 0;
522         status = STATUS_UNKNOWN;
523
524         xostdout = xo_create_to_file(stdout, XO_STYLE_TEXT, 0);
525         if (xostdout == NULL) {
526                 syslog(LOG_ERR, "%s: %m", infoname);
527                 return;
528         }
529
530         if (maxdumps > 0 && bounds == maxdumps)
531                 bounds = 0;
532
533         if (buf == NULL) {
534                 buf = malloc(BUFFERSIZE);
535                 if (buf == NULL) {
536                         syslog(LOG_ERR, "%m");
537                         return;
538                 }
539         }
540
541         if (verbose)
542                 printf("checking for kernel dump on device %s\n", device);
543
544         fd = open(device, (checkfor || keep) ? O_RDONLY : O_RDWR);
545         if (fd < 0) {
546                 syslog(LOG_ERR, "%s: %m", device);
547                 return;
548         }
549
550         error = ioctl(fd, DIOCGMEDIASIZE, &mediasize);
551         if (!error)
552                 error = ioctl(fd, DIOCGSECTORSIZE, &sectorsize);
553         if (error) {
554                 syslog(LOG_ERR,
555                     "couldn't find media and/or sector size of %s: %m", device);
556                 goto closefd;
557         }
558
559         if (verbose) {
560                 printf("mediasize = %lld bytes\n", (long long)mediasize);
561                 printf("sectorsize = %u bytes\n", sectorsize);
562         }
563
564         if (sectorsize < sizeof(kdhl)) {
565                 syslog(LOG_ERR,
566                     "Sector size is less the kernel dump header %zu",
567                     sizeof(kdhl));
568                 goto closefd;
569         }
570
571         lasthd = mediasize - sectorsize;
572         temp = malloc(sectorsize);
573         if (temp == NULL) {
574                 syslog(LOG_ERR, "%m");
575                 goto closefd;
576         }
577         if (lseek(fd, lasthd, SEEK_SET) != lasthd ||
578             read(fd, temp, sectorsize) != (ssize_t)sectorsize) {
579                 syslog(LOG_ERR,
580                     "error reading last dump header at offset %lld in %s: %m",
581                     (long long)lasthd, device);
582                 goto closefd;
583         }
584         memcpy(&kdhl, temp, sizeof(kdhl));
585         istextdump = 0;
586         if (compare_magic(&kdhl, TEXTDUMPMAGIC)) {
587                 if (verbose)
588                         printf("textdump magic on last dump header on %s\n",
589                             device);
590                 istextdump = 1;
591                 if (dtoh32(kdhl.version) != KERNELDUMP_TEXT_VERSION) {
592                         syslog(LOG_ERR,
593                             "unknown version (%d) in last dump header on %s",
594                             dtoh32(kdhl.version), device);
595
596                         status = STATUS_BAD;
597                         if (force == 0)
598                                 goto closefd;
599                 }
600         } else if (compare_magic(&kdhl, KERNELDUMPMAGIC)) {
601                 if (dtoh32(kdhl.version) != KERNELDUMPVERSION) {
602                         syslog(LOG_ERR,
603                             "unknown version (%d) in last dump header on %s",
604                             dtoh32(kdhl.version), device);
605
606                         status = STATUS_BAD;
607                         if (force == 0)
608                                 goto closefd;
609                 }
610         } else {
611                 if (verbose)
612                         printf("magic mismatch on last dump header on %s\n",
613                             device);
614
615                 status = STATUS_BAD;
616                 if (force == 0)
617                         goto closefd;
618
619                 if (compare_magic(&kdhl, KERNELDUMPMAGIC_CLEARED)) {
620                         if (verbose)
621                                 printf("forcing magic on %s\n", device);
622                         memcpy(kdhl.magic, KERNELDUMPMAGIC,
623                             sizeof kdhl.magic);
624                 } else {
625                         syslog(LOG_ERR, "unable to force dump - bad magic");
626                         goto closefd;
627                 }
628                 if (dtoh32(kdhl.version) != KERNELDUMPVERSION) {
629                         syslog(LOG_ERR,
630                             "unknown version (%d) in last dump header on %s",
631                             dtoh32(kdhl.version), device);
632
633                         status = STATUS_BAD;
634                         if (force == 0)
635                                 goto closefd;
636                 }
637         }
638
639         nfound++;
640         if (clear)
641                 goto nuke;
642
643         if (kerneldump_parity(&kdhl)) {
644                 syslog(LOG_ERR,
645                     "parity error on last dump header on %s", device);
646                 nerr++;
647                 status = STATUS_BAD;
648                 if (force == 0)
649                         goto closefd;
650         }
651         dumpsize = dtoh64(kdhl.dumplength);
652         dumpkeysize = dtoh32(kdhl.dumpkeysize);
653         firsthd = lasthd - dumpsize - sectorsize - dumpkeysize;
654         if (lseek(fd, firsthd, SEEK_SET) != firsthd ||
655             read(fd, temp, sectorsize) != (ssize_t)sectorsize) {
656                 syslog(LOG_ERR,
657                     "error reading first dump header at offset %lld in %s: %m",
658                     (long long)firsthd, device);
659                 nerr++;
660                 goto closefd;
661         }
662         memcpy(&kdhf, temp, sizeof(kdhf));
663
664         if (verbose >= 2) {
665                 printf("First dump headers:\n");
666                 printheader(xostdout, &kdhf, device, bounds, -1);
667
668                 printf("\nLast dump headers:\n");
669                 printheader(xostdout, &kdhl, device, bounds, -1);
670                 printf("\n");
671         }
672
673         if (memcmp(&kdhl, &kdhf, sizeof(kdhl))) {
674                 syslog(LOG_ERR,
675                     "first and last dump headers disagree on %s", device);
676                 nerr++;
677                 status = STATUS_BAD;
678                 if (force == 0)
679                         goto closefd;
680         } else {
681                 status = STATUS_GOOD;
682         }
683
684         if (checkfor) {
685                 printf("A dump exists on %s\n", device);
686                 close(fd);
687                 exit(0);
688         }
689
690         if (kdhl.panicstring[0] != '\0')
691                 syslog(LOG_ALERT, "reboot after panic: %.*s",
692                     (int)sizeof(kdhl.panicstring), kdhl.panicstring);
693         else
694                 syslog(LOG_ALERT, "reboot");
695
696         if (verbose)
697                 printf("Checking for available free space\n");
698
699         if (!check_space(savedir, dumpsize, bounds)) {
700                 nerr++;
701                 goto closefd;
702         }
703
704         writebounds(bounds + 1);
705
706         saved_dump_remove(bounds);
707
708         snprintf(infoname, sizeof(infoname), "info.%d", bounds);
709
710         /*
711          * Create or overwrite any existing dump header files.
712          */
713         fdinfo = open(infoname, O_WRONLY | O_CREAT | O_TRUNC, 0600);
714         if (fdinfo < 0) {
715                 syslog(LOG_ERR, "%s: %m", infoname);
716                 nerr++;
717                 goto closefd;
718         }
719
720         oumask = umask(S_IRWXG|S_IRWXO); /* Restrict access to the core file. */
721         isencrypted = (dumpkeysize > 0);
722         if (compress) {
723                 snprintf(corename, sizeof(corename), "%s.%d.gz",
724                     istextdump ? "textdump.tar" :
725                     (isencrypted ? "vmcore_encrypted" : "vmcore"), bounds);
726                 fp = zopen(corename, "w");
727         } else {
728                 snprintf(corename, sizeof(corename), "%s.%d",
729                     istextdump ? "textdump.tar" :
730                     (isencrypted ? "vmcore_encrypted" : "vmcore"), bounds);
731                 fp = fopen(corename, "w");
732         }
733         if (fp == NULL) {
734                 syslog(LOG_ERR, "%s: %m", corename);
735                 close(fdinfo);
736                 nerr++;
737                 goto closefd;
738         }
739         (void)umask(oumask);
740
741         info = fdopen(fdinfo, "w");
742
743         if (info == NULL) {
744                 syslog(LOG_ERR, "fdopen failed: %m");
745                 nerr++;
746                 goto closeall;
747         }
748
749         xostyle = xo_get_style(NULL);
750         xoinfo = xo_create_to_file(info, xostyle, 0);
751         if (xoinfo == NULL) {
752                 syslog(LOG_ERR, "%s: %m", infoname);
753                 nerr++;
754                 goto closeall;
755         }
756         xo_open_container_h(xoinfo, "crashdump");
757
758         if (verbose)
759                 printheader(xostdout, &kdhl, device, bounds, status);
760
761         printheader(xoinfo, &kdhl, device, bounds, status);
762         xo_close_container_h(xoinfo, "crashdump");
763         xo_flush_h(xoinfo);
764         xo_finish_h(xoinfo);
765         fclose(info);
766
767         if (isencrypted) {
768                 dumpkey = calloc(1, dumpkeysize);
769                 if (dumpkey == NULL) {
770                         syslog(LOG_ERR, "Unable to allocate kernel dump key.");
771                         nerr++;
772                         goto closeall;
773                 }
774
775                 if (read(fd, dumpkey, dumpkeysize) != (ssize_t)dumpkeysize) {
776                         syslog(LOG_ERR, "Unable to read kernel dump key: %m.");
777                         nerr++;
778                         goto closeall;
779                 }
780
781                 snprintf(keyname, sizeof(keyname), "key.%d", bounds);
782                 ret = writekey(keyname, dumpkey, dumpkeysize);
783                 explicit_bzero(dumpkey, dumpkeysize);
784                 if (!ret) {
785                         nerr++;
786                         goto closeall;
787                 }
788         }
789
790         syslog(LOG_NOTICE, "writing %s%score to %s/%s",
791             isencrypted ? "encrypted " : "", compress ? "compressed " : "",
792             savedir, corename);
793
794         if (istextdump) {
795                 if (DoTextdumpFile(fd, dumpsize, lasthd, buf, device,
796                     corename, fp) < 0)
797                         goto closeall;
798         } else {
799                 if (DoRegularFile(fd, isencrypted, dumpsize, buf, device,
800                     corename, fp) < 0) {
801                         goto closeall;
802                 }
803         }
804         if (verbose)
805                 printf("\n");
806
807         if (fclose(fp) < 0) {
808                 syslog(LOG_ERR, "error on %s: %m", corename);
809                 nerr++;
810                 goto closefd;
811         }
812
813         symlinks_remove();
814         if (symlink(infoname, "info.last") == -1) {
815                 syslog(LOG_WARNING, "unable to create symlink %s/%s: %m",
816                     savedir, "info.last");
817         }
818         if (isencrypted) {
819                 if (symlink(keyname, "key.last") == -1) {
820                         syslog(LOG_WARNING,
821                             "unable to create symlink %s/%s: %m", savedir,
822                             "key.last");
823                 }
824         }
825         if (compress) {
826                 snprintf(linkname, sizeof(linkname), "%s.last.gz",
827                     istextdump ? "textdump.tar" :
828                     (isencrypted ? "vmcore_encrypted" : "vmcore"));
829         } else {
830                 snprintf(linkname, sizeof(linkname), "%s.last",
831                     istextdump ? "textdump.tar" :
832                     (isencrypted ? "vmcore_encrypted" : "vmcore"));
833         }
834         if (symlink(corename, linkname) == -1) {
835                 syslog(LOG_WARNING, "unable to create symlink %s/%s: %m",
836                     savedir, linkname);
837         }
838
839         nsaved++;
840
841         if (verbose)
842                 printf("dump saved\n");
843
844 nuke:
845         if (!keep) {
846                 if (verbose)
847                         printf("clearing dump header\n");
848                 memcpy(kdhl.magic, KERNELDUMPMAGIC_CLEARED, sizeof(kdhl.magic));
849                 memcpy(temp, &kdhl, sizeof(kdhl));
850                 if (lseek(fd, lasthd, SEEK_SET) != lasthd ||
851                     write(fd, temp, sectorsize) != (ssize_t)sectorsize)
852                         syslog(LOG_ERR,
853                             "error while clearing the dump header: %m");
854         }
855         xo_close_container_h(xostdout, "crashdump");
856         xo_finish_h(xostdout);
857         free(dumpkey);
858         free(temp);
859         close(fd);
860         return;
861
862 closeall:
863         fclose(fp);
864
865 closefd:
866         free(dumpkey);
867         free(temp);
868         close(fd);
869 }
870
871 static void
872 usage(void)
873 {
874         xo_error("%s\n%s\n%s\n",
875             "usage: savecore -c [-v] [device ...]",
876             "       savecore -C [-v] [device ...]",
877             "       savecore [-fkvz] [-m maxdumps] [directory [device ...]]");
878         exit(1);
879 }
880
881 int
882 main(int argc, char **argv)
883 {
884         const char *savedir = ".";
885         struct fstab *fsp;
886         int i, ch, error;
887
888         checkfor = compress = clear = force = keep = verbose = 0;
889         nfound = nsaved = nerr = 0;
890
891         openlog("savecore", LOG_PERROR, LOG_DAEMON);
892         signal(SIGINFO, infohandler);
893
894         argc = xo_parse_args(argc, argv);
895         if (argc < 0)
896                 exit(1);
897
898         while ((ch = getopt(argc, argv, "Ccfkm:vz")) != -1)
899                 switch(ch) {
900                 case 'C':
901                         checkfor = 1;
902                         break;
903                 case 'c':
904                         clear = 1;
905                         break;
906                 case 'f':
907                         force = 1;
908                         break;
909                 case 'k':
910                         keep = 1;
911                         break;
912                 case 'm':
913                         maxdumps = atoi(optarg);
914                         if (maxdumps <= 0) {
915                                 syslog(LOG_ERR, "Invalid maxdump value");
916                                 exit(1);
917                         }
918                         break;
919                 case 'v':
920                         verbose++;
921                         break;
922                 case 'z':
923                         compress = 1;
924                         break;
925                 case '?':
926                 default:
927                         usage();
928                 }
929         if (checkfor && (clear || force || keep))
930                 usage();
931         if (clear && (compress || keep))
932                 usage();
933         if (maxdumps > 0 && (checkfor || clear))
934                 usage();
935         argc -= optind;
936         argv += optind;
937         if (argc >= 1 && !checkfor && !clear) {
938                 error = chdir(argv[0]);
939                 if (error) {
940                         syslog(LOG_ERR, "chdir(%s): %m", argv[0]);
941                         exit(1);
942                 }
943                 savedir = argv[0];
944                 argc--;
945                 argv++;
946         }
947         if (argc == 0) {
948                 for (;;) {
949                         fsp = getfsent();
950                         if (fsp == NULL)
951                                 break;
952                         if (strcmp(fsp->fs_vfstype, "swap") &&
953                             strcmp(fsp->fs_vfstype, "dump"))
954                                 continue;
955                         DoFile(savedir, fsp->fs_spec);
956                 }
957                 endfsent();
958         } else {
959                 for (i = 0; i < argc; i++)
960                         DoFile(savedir, argv[i]);
961         }
962
963         /* Emit minimal output. */
964         if (nfound == 0) {
965                 if (checkfor) {
966                         if (verbose)
967                                 printf("No dump exists\n");
968                         exit(1);
969                 }
970                 if (verbose)
971                         syslog(LOG_WARNING, "no dumps found");
972         } else if (nsaved == 0) {
973                 if (nerr != 0) {
974                         if (verbose)
975                                 syslog(LOG_WARNING,
976                                     "unsaved dumps found but not saved");
977                         exit(1);
978                 } else if (verbose)
979                         syslog(LOG_WARNING, "no unsaved dumps found");
980         }
981
982         return (0);
983 }
984
985 static void
986 infohandler(int sig __unused)
987 {
988         got_siginfo = 1;
989 }