1 #include "config.h"
2 
3 #include "log_manager.hpp"
4 
5 #include "elog_entry.hpp"
6 #include "elog_meta.hpp"
7 #include "elog_serialize.hpp"
8 #include "extensions.hpp"
9 #include "util.hpp"
10 
11 #include <poll.h>
12 #include <sys/inotify.h>
13 #include <systemd/sd-bus.h>
14 #include <systemd/sd-journal.h>
15 #include <unistd.h>
16 
17 #include <phosphor-logging/lg2.hpp>
18 #include <sdbusplus/vtable.hpp>
19 #include <xyz/openbmc_project/State/Host/server.hpp>
20 
21 #include <cassert>
22 #include <chrono>
23 #include <cstdio>
24 #include <cstring>
25 #include <fstream>
26 #include <functional>
27 #include <future>
28 #include <iostream>
29 #include <map>
30 #include <set>
31 #include <string>
32 #include <string_view>
33 #include <vector>
34 
35 using namespace std::chrono;
36 extern const std::map<
37     phosphor::logging::metadata::Metadata,
38     std::function<phosphor::logging::metadata::associations::Type>>
39     meta;
40 
41 namespace phosphor
42 {
43 namespace logging
44 {
45 namespace internal
46 {
47 inline auto getLevel(const std::string& errMsg)
48 {
49     auto reqLevel = Entry::Level::Error; // Default to Error
50 
51     auto levelmap = g_errLevelMap.find(errMsg);
52     if (levelmap != g_errLevelMap.end())
53     {
54         reqLevel = static_cast<Entry::Level>(levelmap->second);
55     }
56 
57     return reqLevel;
58 }
59 
60 int Manager::getRealErrSize()
61 {
62     return realErrors.size();
63 }
64 
65 int Manager::getInfoErrSize()
66 {
67     return infoErrors.size();
68 }
69 
70 uint32_t Manager::commit(uint64_t transactionId, std::string errMsg)
71 {
72     auto level = getLevel(errMsg);
73     _commit(transactionId, std::move(errMsg), level);
74     return entryId;
75 }
76 
77 uint32_t Manager::commitWithLvl(uint64_t transactionId, std::string errMsg,
78                                 uint32_t errLvl)
79 {
80     _commit(transactionId, std::move(errMsg),
81             static_cast<Entry::Level>(errLvl));
82     return entryId;
83 }
84 
85 void Manager::_commit(uint64_t transactionId [[maybe_unused]],
86                       std::string&& errMsg, Entry::Level errLvl)
87 {
88     std::vector<std::string> additionalData{};
89 
90     // When running as a test-case, the system may have a LOT of journal
91     // data and we may not have permissions to do some of the journal sync
92     // operations.  Just skip over them.
93     if (!IS_UNIT_TEST)
94     {
95         static constexpr auto transactionIdVar =
96             std::string_view{"TRANSACTION_ID"};
97         // Length of 'TRANSACTION_ID' string.
98         static constexpr auto transactionIdVarSize = transactionIdVar.size();
99         // Length of 'TRANSACTION_ID=' string.
100         static constexpr auto transactionIdVarOffset = transactionIdVarSize + 1;
101 
102         // Flush all the pending log messages into the journal
103         journalSync();
104 
105         sd_journal* j = nullptr;
106         int rc = sd_journal_open(&j, SD_JOURNAL_LOCAL_ONLY);
107         if (rc < 0)
108         {
109             lg2::error("Failed to open journal: {ERROR}", "ERROR",
110                        strerror(-rc));
111             return;
112         }
113 
114         std::string transactionIdStr = std::to_string(transactionId);
115         std::set<std::string> metalist;
116         auto metamap = g_errMetaMap.find(errMsg);
117         if (metamap != g_errMetaMap.end())
118         {
119             metalist.insert(metamap->second.begin(), metamap->second.end());
120         }
121 
122         // Add _PID field information in AdditionalData.
123         metalist.insert("_PID");
124 
125         // Read the journal from the end to get the most recent entry first.
126         // The result from the sd_journal_get_data() is of the form
127         // VARIABLE=value.
128         SD_JOURNAL_FOREACH_BACKWARDS(j)
129         {
130             const char* data = nullptr;
131             size_t length = 0;
132 
133             // Look for the transaction id metadata variable
134             rc = sd_journal_get_data(j, transactionIdVar.data(),
135                                      (const void**)&data, &length);
136             if (rc < 0)
137             {
138                 // This journal entry does not have the TRANSACTION_ID
139                 // metadata variable.
140                 continue;
141             }
142 
143             // journald does not guarantee that sd_journal_get_data() returns
144             // NULL terminated strings, so need to specify the size to use to
145             // compare, use the returned length instead of anything that relies
146             // on NULL terminators like strlen(). The data variable is in the
147             // form of 'TRANSACTION_ID=1234'. Remove the TRANSACTION_ID
148             // characters plus the (=) sign to do the comparison. 'data +
149             // transactionIdVarOffset' will be in the form of '1234'. 'length -
150             // transactionIdVarOffset' will be the length of '1234'.
151             if ((length <= (transactionIdVarOffset)) ||
152                 (transactionIdStr.compare(
153                      0, transactionIdStr.size(), data + transactionIdVarOffset,
154                      length - transactionIdVarOffset) != 0))
155             {
156                 // The value of the TRANSACTION_ID metadata is not the requested
157                 // transaction id number.
158                 continue;
159             }
160 
161             // Search for all metadata variables in the current journal entry.
162             for (auto i = metalist.cbegin(); i != metalist.cend();)
163             {
164                 rc = sd_journal_get_data(j, (*i).c_str(), (const void**)&data,
165                                          &length);
166                 if (rc < 0)
167                 {
168                     // Metadata variable not found, check next metadata
169                     // variable.
170                     i++;
171                     continue;
172                 }
173 
174                 // Metadata variable found, save it and remove it from the set.
175                 additionalData.emplace_back(data, length);
176                 i = metalist.erase(i);
177             }
178             if (metalist.empty())
179             {
180                 // All metadata variables found, break out of journal loop.
181                 break;
182             }
183         }
184         if (!metalist.empty())
185         {
186             // Not all the metadata variables were found in the journal.
187             for (auto& metaVarStr : metalist)
188             {
189                 lg2::info("Failed to find metadata: {META_FIELD}", "META_FIELD",
190                           metaVarStr);
191             }
192         }
193 
194         sd_journal_close(j);
195     }
196     createEntry(errMsg, errLvl, additionalData);
197 }
198 
199 void Manager::createEntry(std::string errMsg, Entry::Level errLvl,
200                           std::vector<std::string> additionalData,
201                           const FFDCEntries& ffdc)
202 {
203     if (!Extensions::disableDefaultLogCaps())
204     {
205         if (errLvl < Entry::sevLowerLimit)
206         {
207             if (realErrors.size() >= ERROR_CAP)
208             {
209                 erase(realErrors.front());
210             }
211         }
212         else
213         {
214             if (infoErrors.size() >= ERROR_INFO_CAP)
215             {
216                 erase(infoErrors.front());
217             }
218         }
219     }
220 
221     entryId++;
222     if (errLvl >= Entry::sevLowerLimit)
223     {
224         infoErrors.push_back(entryId);
225     }
226     else
227     {
228         realErrors.push_back(entryId);
229     }
230     auto ms = std::chrono::duration_cast<std::chrono::milliseconds>(
231                   std::chrono::system_clock::now().time_since_epoch())
232                   .count();
233     auto objPath = std::string(OBJ_ENTRY) + '/' + std::to_string(entryId);
234 
235     AssociationList objects{};
236     processMetadata(errMsg, additionalData, objects);
237 
238     auto e = std::make_unique<Entry>(
239         busLog, objPath, entryId,
240         ms, // Milliseconds since 1970
241         errLvl, std::move(errMsg), std::move(additionalData),
242         std::move(objects), fwVersion, getEntrySerializePath(entryId), *this);
243 
244     serialize(*e);
245 
246     if (isQuiesceOnErrorEnabled() && (errLvl < Entry::sevLowerLimit) &&
247         isCalloutPresent(*e))
248     {
249         quiesceOnError(entryId);
250     }
251 
252     // Add entry before calling the extensions so that they have access to it
253     entries.insert(std::make_pair(entryId, std::move(e)));
254 
255     doExtensionLogCreate(*entries.find(entryId)->second, ffdc);
256 
257     // Note: No need to close the file descriptors in the FFDC.
258 }
259 
260 bool Manager::isQuiesceOnErrorEnabled()
261 {
262     // When running under tests, the Logging.Settings service will not be
263     // present.  Assume false.
264     if (IS_UNIT_TEST)
265     {
266         return false;
267     }
268 
269     std::variant<bool> property;
270 
271     auto method = this->busLog.new_method_call(
272         "xyz.openbmc_project.Settings", "/xyz/openbmc_project/logging/settings",
273         "org.freedesktop.DBus.Properties", "Get");
274 
275     method.append("xyz.openbmc_project.Logging.Settings", "QuiesceOnHwError");
276 
277     try
278     {
279         auto reply = this->busLog.call(method);
280         reply.read(property);
281     }
282     catch (const sdbusplus::exception_t& e)
283     {
284         lg2::error("Error reading QuiesceOnHwError property: {ERROR}", "ERROR",
285                    e);
286         throw;
287     }
288 
289     return std::get<bool>(property);
290 }
291 
292 bool Manager::isCalloutPresent(const Entry& entry)
293 {
294     for (const auto& c : entry.additionalData())
295     {
296         if (c.find("CALLOUT_") != std::string::npos)
297         {
298             return true;
299         }
300     }
301 
302     return false;
303 }
304 
305 void Manager::findAndRemoveResolvedBlocks()
306 {
307     for (auto& entry : entries)
308     {
309         if (entry.second->resolved())
310         {
311             checkAndRemoveBlockingError(entry.first);
312         }
313     }
314 }
315 
316 void Manager::onEntryResolve(sdbusplus::message_t& msg)
317 {
318     using Interface = std::string;
319     using Property = std::string;
320     using Value = std::string;
321     using Properties = std::map<Property, std::variant<Value>>;
322 
323     Interface interface;
324     Properties properties;
325 
326     msg.read(interface, properties);
327 
328     for (const auto& p : properties)
329     {
330         if (p.first == "Resolved")
331         {
332             findAndRemoveResolvedBlocks();
333             return;
334         }
335     }
336 }
337 
338 void Manager::checkAndQuiesceHost()
339 {
340     using Host = sdbusplus::xyz::openbmc_project::State::server::Host;
341 
342     // First check host state
343     std::variant<Host::HostState> property;
344 
345     auto method = this->busLog.new_method_call(
346         "xyz.openbmc_project.State.Host", "/xyz/openbmc_project/state/host0",
347         "org.freedesktop.DBus.Properties", "Get");
348 
349     method.append("xyz.openbmc_project.State.Host", "CurrentHostState");
350 
351     try
352     {
353         auto reply = this->busLog.call(method);
354         reply.read(property);
355     }
356     catch (const sdbusplus::exception_t& e)
357     {
358         // Quiescing the host is a "best effort" type function. If unable to
359         // read the host state or it comes back empty, just return.
360         // The boot block object will still be created and the associations to
361         // find the log will be present. Don't want a dependency with
362         // phosphor-state-manager service
363         lg2::info("Error reading QuiesceOnHwError property: {ERROR}", "ERROR",
364                   e);
365         return;
366     }
367 
368     auto hostState = std::get<Host::HostState>(property);
369     if (hostState != Host::HostState::Running)
370     {
371         return;
372     }
373 
374     auto quiesce = this->busLog.new_method_call(
375         "org.freedesktop.systemd1", "/org/freedesktop/systemd1",
376         "org.freedesktop.systemd1.Manager", "StartUnit");
377 
378     quiesce.append("obmc-host-graceful-quiesce@0.target");
379     quiesce.append("replace");
380 
381     this->busLog.call_noreply(quiesce);
382 }
383 
384 void Manager::quiesceOnError(const uint32_t entryId)
385 {
386     // Verify we don't already have this entry blocking
387     auto it = find_if(this->blockingErrors.begin(), this->blockingErrors.end(),
388                       [&](const std::unique_ptr<Block>& obj) {
389                           return obj->entryId == entryId;
390                       });
391     if (it != this->blockingErrors.end())
392     {
393         // Already recorded so just return
394         lg2::debug(
395             "QuiesceOnError set and callout present but entry already logged");
396         return;
397     }
398 
399     lg2::info("QuiesceOnError set and callout present");
400 
401     auto blockPath = std::string(OBJ_LOGGING) + "/block" +
402                      std::to_string(entryId);
403     auto blockObj = std::make_unique<Block>(this->busLog, blockPath, entryId);
404     this->blockingErrors.push_back(std::move(blockObj));
405 
406     // Register call back if log is resolved
407     using namespace sdbusplus::bus::match::rules;
408     auto entryPath = std::string(OBJ_ENTRY) + '/' + std::to_string(entryId);
409     auto callback = std::make_unique<sdbusplus::bus::match_t>(
410         this->busLog,
411         propertiesChanged(entryPath, "xyz.openbmc_project.Logging.Entry"),
412         std::bind(std::mem_fn(&Manager::onEntryResolve), this,
413                   std::placeholders::_1));
414 
415     propChangedEntryCallback.insert(
416         std::make_pair(entryId, std::move(callback)));
417 
418     checkAndQuiesceHost();
419 }
420 
421 void Manager::doExtensionLogCreate(const Entry& entry, const FFDCEntries& ffdc)
422 {
423     // Make the association <endpointpath>/<endpointtype> paths
424     std::vector<std::string> assocs;
425     for (const auto& [forwardType, reverseType, endpoint] :
426          entry.associations())
427     {
428         std::string e{endpoint};
429         e += '/' + reverseType;
430         assocs.push_back(e);
431     }
432 
433     for (auto& create : Extensions::getCreateFunctions())
434     {
435         try
436         {
437             create(entry.message(), entry.id(), entry.timestamp(),
438                    entry.severity(), entry.additionalData(), assocs, ffdc);
439         }
440         catch (const std::exception& e)
441         {
442             lg2::error(
443                 "An extension's create function threw an exception: {ERROR}",
444                 "ERROR", e);
445         }
446     }
447 }
448 
449 void Manager::processMetadata(const std::string& /*errorName*/,
450                               const std::vector<std::string>& additionalData,
451                               AssociationList& objects) const
452 {
453     // additionalData is a list of "metadata=value"
454     constexpr auto separator = '=';
455     for (const auto& entryItem : additionalData)
456     {
457         auto found = entryItem.find(separator);
458         if (std::string::npos != found)
459         {
460             auto metadata = entryItem.substr(0, found);
461             auto iter = meta.find(metadata);
462             if (meta.end() != iter)
463             {
464                 (iter->second)(metadata, additionalData, objects);
465             }
466         }
467     }
468 }
469 
470 void Manager::checkAndRemoveBlockingError(uint32_t entryId)
471 {
472     // First look for blocking object and remove
473     auto it = find_if(blockingErrors.begin(), blockingErrors.end(),
474                       [&](const std::unique_ptr<Block>& obj) {
475                           return obj->entryId == entryId;
476                       });
477     if (it != blockingErrors.end())
478     {
479         blockingErrors.erase(it);
480     }
481 
482     // Now remove the callback looking for the error to be resolved
483     auto resolveFind = propChangedEntryCallback.find(entryId);
484     if (resolveFind != propChangedEntryCallback.end())
485     {
486         propChangedEntryCallback.erase(resolveFind);
487     }
488 
489     return;
490 }
491 
492 void Manager::erase(uint32_t entryId)
493 {
494     auto entryFound = entries.find(entryId);
495     if (entries.end() != entryFound)
496     {
497         for (auto& func : Extensions::getDeleteProhibitedFunctions())
498         {
499             try
500             {
501                 bool prohibited = false;
502                 func(entryId, prohibited);
503                 if (prohibited)
504                 {
505                     // Future work remains to throw an error here.
506                     return;
507                 }
508             }
509             catch (const std::exception& e)
510             {
511                 lg2::error("An extension's deleteProhibited function threw an "
512                            "exception: {ERROR}",
513                            "ERROR", e);
514             }
515         }
516 
517         // Delete the persistent representation of this error.
518         fs::path errorPath(ERRLOG_PERSIST_PATH);
519         errorPath /= std::to_string(entryId);
520         fs::remove(errorPath);
521 
522         auto removeId = [](std::list<uint32_t>& ids, uint32_t id) {
523             auto it = std::find(ids.begin(), ids.end(), id);
524             if (it != ids.end())
525             {
526                 ids.erase(it);
527             }
528         };
529         if (entryFound->second->severity() >= Entry::sevLowerLimit)
530         {
531             removeId(infoErrors, entryId);
532         }
533         else
534         {
535             removeId(realErrors, entryId);
536         }
537         entries.erase(entryFound);
538 
539         checkAndRemoveBlockingError(entryId);
540 
541         for (auto& remove : Extensions::getDeleteFunctions())
542         {
543             try
544             {
545                 remove(entryId);
546             }
547             catch (const std::exception& e)
548             {
549                 lg2::error("An extension's delete function threw an exception: "
550                            "{ERROR}",
551                            "ERROR", e);
552             }
553         }
554     }
555     else
556     {
557         lg2::error("Invalid entry ID ({ID}) to delete", "ID", entryId);
558     }
559 }
560 
561 void Manager::restore()
562 {
563     auto sanity = [](const auto& id, const auto& restoredId) {
564         return id == restoredId;
565     };
566 
567     fs::path dir(ERRLOG_PERSIST_PATH);
568     if (!fs::exists(dir) || fs::is_empty(dir))
569     {
570         return;
571     }
572 
573     for (auto& file : fs::directory_iterator(dir))
574     {
575         auto id = file.path().filename().c_str();
576         auto idNum = std::stol(id);
577         auto e = std::make_unique<Entry>(
578             busLog, std::string(OBJ_ENTRY) + '/' + id, idNum, *this);
579         if (deserialize(file.path(), *e))
580         {
581             // validate the restored error entry id
582             if (sanity(static_cast<uint32_t>(idNum), e->id()))
583             {
584                 e->path(file.path(), true);
585                 if (e->severity() >= Entry::sevLowerLimit)
586                 {
587                     infoErrors.push_back(idNum);
588                 }
589                 else
590                 {
591                     realErrors.push_back(idNum);
592                 }
593 
594                 entries.insert(std::make_pair(idNum, std::move(e)));
595             }
596             else
597             {
598                 lg2::error(
599                     "Failed in sanity check while restoring error entry. "
600                     "Ignoring error entry {ID_NUM}/{ENTRY_ID}.",
601                     "ID_NUM", idNum, "ENTRY_ID", e->id());
602             }
603         }
604     }
605 
606     if (!entries.empty())
607     {
608         entryId = entries.rbegin()->first;
609     }
610 }
611 
612 void Manager::journalSync()
613 {
614     bool syncRequested = false;
615     auto fd = -1;
616     auto rc = -1;
617     auto wd = -1;
618     auto bus = sdbusplus::bus::new_default();
619 
620     auto start =
621         duration_cast<microseconds>(steady_clock::now().time_since_epoch())
622             .count();
623 
624     // Each time an error log is committed, a request to sync the journal
625     // must occur and block that error log commit until it completes. A 5sec
626     // block is done to allow sufficient time for the journal to be synced.
627     //
628     // Number of loop iterations = 3 for the following reasons:
629     // Iteration #1: Requests a journal sync by killing the journald service.
630     // Iteration #2: Setup an inotify watch to monitor the synced file that
631     //               journald updates with the timestamp the last time the
632     //               journal was flushed.
633     // Iteration #3: Poll to wait until inotify reports an event which blocks
634     //               the error log from being commited until the sync completes.
635     constexpr auto maxRetry = 3;
636     for (int i = 0; i < maxRetry; i++)
637     {
638         // Read timestamp from synced file
639         constexpr auto syncedPath = "/run/systemd/journal/synced";
640         std::ifstream syncedFile(syncedPath);
641         if (syncedFile.fail())
642         {
643             // If the synced file doesn't exist, a sync request will create it.
644             if (errno != ENOENT)
645             {
646                 lg2::error(
647                     "Failed to open journal synced file {FILENAME}: {ERROR}",
648                     "FILENAME", syncedPath, "ERROR", strerror(errno));
649                 return;
650             }
651         }
652         else
653         {
654             // Only read the synced file if it exists.
655             // See if a sync happened by now
656             std::string timestampStr;
657             std::getline(syncedFile, timestampStr);
658             auto timestamp = std::stoll(timestampStr);
659             if (timestamp >= start)
660             {
661                 break;
662             }
663         }
664 
665         // Let's ask for a sync, but only once
666         if (!syncRequested)
667         {
668             syncRequested = true;
669 
670             constexpr auto JOURNAL_UNIT = "systemd-journald.service";
671             auto signal = SIGRTMIN + 1;
672 
673             auto method = bus.new_method_call(SYSTEMD_BUSNAME, SYSTEMD_PATH,
674                                               SYSTEMD_INTERFACE, "KillUnit");
675             method.append(JOURNAL_UNIT, "main", signal);
676             bus.call(method);
677             if (method.is_method_error())
678             {
679                 lg2::error("Failed to kill journal service");
680                 break;
681             }
682 
683             continue;
684         }
685 
686         // Let's install the inotify watch, if we didn't do that yet. This watch
687         // monitors the syncedFile for when journald updates it with a newer
688         // timestamp. This means the journal has been flushed.
689         if (fd < 0)
690         {
691             fd = inotify_init1(IN_NONBLOCK | IN_CLOEXEC);
692             if (fd < 0)
693             {
694                 lg2::error("Failed to create inotify watch: {ERROR}", "ERROR",
695                            strerror(errno));
696                 return;
697             }
698 
699             constexpr auto JOURNAL_RUN_PATH = "/run/systemd/journal";
700             wd = inotify_add_watch(fd, JOURNAL_RUN_PATH,
701                                    IN_MOVED_TO | IN_DONT_FOLLOW | IN_ONLYDIR);
702             if (wd < 0)
703             {
704                 lg2::error("Failed to watch journal directory: {PATH}: {ERROR}",
705                            "PATH", JOURNAL_RUN_PATH, "ERROR", strerror(errno));
706                 close(fd);
707                 return;
708             }
709             continue;
710         }
711 
712         // Let's wait until inotify reports an event
713         struct pollfd fds = {
714             fd,
715             POLLIN,
716             0,
717         };
718         constexpr auto pollTimeout = 5; // 5 seconds
719         rc = poll(&fds, 1, pollTimeout * 1000);
720         if (rc < 0)
721         {
722             lg2::error("Failed to add event: {ERROR}", "ERROR",
723                        strerror(errno));
724             inotify_rm_watch(fd, wd);
725             close(fd);
726             return;
727         }
728         else if (rc == 0)
729         {
730             lg2::info("Poll timeout ({TIMEOUT}), no new journal synced data",
731                       "TIMEOUT", pollTimeout);
732             break;
733         }
734 
735         // Read from the specified file descriptor until there is no new data,
736         // throwing away everything read since the timestamp will be read at the
737         // beginning of the loop.
738         constexpr auto maxBytes = 64;
739         uint8_t buffer[maxBytes];
740         while (read(fd, buffer, maxBytes) > 0)
741             ;
742     }
743 
744     if (fd != -1)
745     {
746         if (wd != -1)
747         {
748             inotify_rm_watch(fd, wd);
749         }
750         close(fd);
751     }
752 
753     return;
754 }
755 
756 std::string Manager::readFWVersion()
757 {
758     auto version = util::getOSReleaseValue("VERSION_ID");
759 
760     if (!version)
761     {
762         lg2::error("Unable to read BMC firmware version");
763     }
764 
765     return version.value_or("");
766 }
767 
768 void Manager::create(const std::string& message, Entry::Level severity,
769                      const std::map<std::string, std::string>& additionalData)
770 {
771     // Convert the map into a vector of "key=value" strings
772     std::vector<std::string> ad;
773     metadata::associations::combine(additionalData, ad);
774 
775     createEntry(message, severity, ad);
776 }
777 
778 void Manager::createWithFFDC(
779     const std::string& message, Entry::Level severity,
780     const std::map<std::string, std::string>& additionalData,
781     const FFDCEntries& ffdc)
782 {
783     // Convert the map into a vector of "key=value" strings
784     std::vector<std::string> ad;
785     metadata::associations::combine(additionalData, ad);
786 
787     createEntry(message, severity, ad, ffdc);
788 }
789 
790 } // namespace internal
791 } // namespace logging
792 } // namespace phosphor
793