1 #include "config.h" 2 3 #include "log_manager.hpp" 4 5 #include "elog_entry.hpp" 6 #include "elog_meta.hpp" 7 #include "elog_serialize.hpp" 8 #include "extensions.hpp" 9 #include "util.hpp" 10 11 #include <poll.h> 12 #include <sys/inotify.h> 13 #include <systemd/sd-bus.h> 14 #include <systemd/sd-journal.h> 15 #include <unistd.h> 16 17 #include <cassert> 18 #include <chrono> 19 #include <cstdio> 20 #include <cstring> 21 #include <fstream> 22 #include <functional> 23 #include <future> 24 #include <iostream> 25 #include <map> 26 #include <phosphor-logging/lg2.hpp> 27 #include <sdbusplus/vtable.hpp> 28 #include <set> 29 #include <string> 30 #include <string_view> 31 #include <vector> 32 #include <xyz/openbmc_project/State/Host/server.hpp> 33 34 using namespace std::chrono; 35 extern const std::map< 36 phosphor::logging::metadata::Metadata, 37 std::function<phosphor::logging::metadata::associations::Type>> 38 meta; 39 40 namespace phosphor 41 { 42 namespace logging 43 { 44 namespace internal 45 { 46 inline auto getLevel(const std::string& errMsg) 47 { 48 auto reqLevel = Entry::Level::Error; // Default to Error 49 50 auto levelmap = g_errLevelMap.find(errMsg); 51 if (levelmap != g_errLevelMap.end()) 52 { 53 reqLevel = static_cast<Entry::Level>(levelmap->second); 54 } 55 56 return reqLevel; 57 } 58 59 int Manager::getRealErrSize() 60 { 61 return realErrors.size(); 62 } 63 64 int Manager::getInfoErrSize() 65 { 66 return infoErrors.size(); 67 } 68 69 uint32_t Manager::commit(uint64_t transactionId, std::string errMsg) 70 { 71 auto level = getLevel(errMsg); 72 _commit(transactionId, std::move(errMsg), level); 73 return entryId; 74 } 75 76 uint32_t Manager::commitWithLvl(uint64_t transactionId, std::string errMsg, 77 uint32_t errLvl) 78 { 79 _commit(transactionId, std::move(errMsg), 80 static_cast<Entry::Level>(errLvl)); 81 return entryId; 82 } 83 84 void Manager::_commit(uint64_t transactionId [[maybe_unused]], 85 std::string&& errMsg, Entry::Level errLvl) 86 { 87 std::vector<std::string> additionalData{}; 88 89 // When running as a test-case, the system may have a LOT of journal 90 // data and we may not have permissions to do some of the journal sync 91 // operations. Just skip over them. 92 if (!IS_UNIT_TEST) 93 { 94 static constexpr auto transactionIdVar = 95 std::string_view{"TRANSACTION_ID"}; 96 // Length of 'TRANSACTION_ID' string. 97 static constexpr auto transactionIdVarSize = transactionIdVar.size(); 98 // Length of 'TRANSACTION_ID=' string. 99 static constexpr auto transactionIdVarOffset = transactionIdVarSize + 1; 100 101 // Flush all the pending log messages into the journal 102 journalSync(); 103 104 sd_journal* j = nullptr; 105 int rc = sd_journal_open(&j, SD_JOURNAL_LOCAL_ONLY); 106 if (rc < 0) 107 { 108 lg2::error("Failed to open journal: {ERROR}", "ERROR", 109 strerror(-rc)); 110 return; 111 } 112 113 std::string transactionIdStr = std::to_string(transactionId); 114 std::set<std::string> metalist; 115 auto metamap = g_errMetaMap.find(errMsg); 116 if (metamap != g_errMetaMap.end()) 117 { 118 metalist.insert(metamap->second.begin(), metamap->second.end()); 119 } 120 121 // Add _PID field information in AdditionalData. 122 metalist.insert("_PID"); 123 124 // Read the journal from the end to get the most recent entry first. 125 // The result from the sd_journal_get_data() is of the form 126 // VARIABLE=value. 127 SD_JOURNAL_FOREACH_BACKWARDS(j) 128 { 129 const char* data = nullptr; 130 size_t length = 0; 131 132 // Look for the transaction id metadata variable 133 rc = sd_journal_get_data(j, transactionIdVar.data(), 134 (const void**)&data, &length); 135 if (rc < 0) 136 { 137 // This journal entry does not have the TRANSACTION_ID 138 // metadata variable. 139 continue; 140 } 141 142 // journald does not guarantee that sd_journal_get_data() returns 143 // NULL terminated strings, so need to specify the size to use to 144 // compare, use the returned length instead of anything that relies 145 // on NULL terminators like strlen(). The data variable is in the 146 // form of 'TRANSACTION_ID=1234'. Remove the TRANSACTION_ID 147 // characters plus the (=) sign to do the comparison. 'data + 148 // transactionIdVarOffset' will be in the form of '1234'. 'length - 149 // transactionIdVarOffset' will be the length of '1234'. 150 if ((length <= (transactionIdVarOffset)) || 151 (transactionIdStr.compare( 152 0, transactionIdStr.size(), data + transactionIdVarOffset, 153 length - transactionIdVarOffset) != 0)) 154 { 155 // The value of the TRANSACTION_ID metadata is not the requested 156 // transaction id number. 157 continue; 158 } 159 160 // Search for all metadata variables in the current journal entry. 161 for (auto i = metalist.cbegin(); i != metalist.cend();) 162 { 163 rc = sd_journal_get_data(j, (*i).c_str(), (const void**)&data, 164 &length); 165 if (rc < 0) 166 { 167 // Metadata variable not found, check next metadata 168 // variable. 169 i++; 170 continue; 171 } 172 173 // Metadata variable found, save it and remove it from the set. 174 additionalData.emplace_back(data, length); 175 i = metalist.erase(i); 176 } 177 if (metalist.empty()) 178 { 179 // All metadata variables found, break out of journal loop. 180 break; 181 } 182 } 183 if (!metalist.empty()) 184 { 185 // Not all the metadata variables were found in the journal. 186 for (auto& metaVarStr : metalist) 187 { 188 lg2::info("Failed to find metadata: {META_FIELD}", "META_FIELD", 189 metaVarStr); 190 } 191 } 192 193 sd_journal_close(j); 194 } 195 createEntry(errMsg, errLvl, additionalData); 196 } 197 198 void Manager::createEntry(std::string errMsg, Entry::Level errLvl, 199 std::vector<std::string> additionalData, 200 const FFDCEntries& ffdc) 201 { 202 if (!Extensions::disableDefaultLogCaps()) 203 { 204 if (errLvl < Entry::sevLowerLimit) 205 { 206 if (realErrors.size() >= ERROR_CAP) 207 { 208 erase(realErrors.front()); 209 } 210 } 211 else 212 { 213 if (infoErrors.size() >= ERROR_INFO_CAP) 214 { 215 erase(infoErrors.front()); 216 } 217 } 218 } 219 220 entryId++; 221 if (errLvl >= Entry::sevLowerLimit) 222 { 223 infoErrors.push_back(entryId); 224 } 225 else 226 { 227 realErrors.push_back(entryId); 228 } 229 auto ms = std::chrono::duration_cast<std::chrono::milliseconds>( 230 std::chrono::system_clock::now().time_since_epoch()) 231 .count(); 232 auto objPath = std::string(OBJ_ENTRY) + '/' + std::to_string(entryId); 233 234 AssociationList objects{}; 235 processMetadata(errMsg, additionalData, objects); 236 237 auto e = std::make_unique<Entry>( 238 busLog, objPath, entryId, 239 ms, // Milliseconds since 1970 240 errLvl, std::move(errMsg), std::move(additionalData), 241 std::move(objects), fwVersion, getEntrySerializePath(entryId), *this); 242 243 serialize(*e); 244 245 if (isQuiesceOnErrorEnabled() && (errLvl < Entry::sevLowerLimit) && 246 isCalloutPresent(*e)) 247 { 248 quiesceOnError(entryId); 249 } 250 251 // Add entry before calling the extensions so that they have access to it 252 entries.insert(std::make_pair(entryId, std::move(e))); 253 254 doExtensionLogCreate(*entries.find(entryId)->second, ffdc); 255 256 // Note: No need to close the file descriptors in the FFDC. 257 } 258 259 bool Manager::isQuiesceOnErrorEnabled() 260 { 261 // When running under tests, the Logging.Settings service will not be 262 // present. Assume false. 263 if (IS_UNIT_TEST) 264 { 265 return false; 266 } 267 268 std::variant<bool> property; 269 270 auto method = this->busLog.new_method_call( 271 "xyz.openbmc_project.Settings", "/xyz/openbmc_project/logging/settings", 272 "org.freedesktop.DBus.Properties", "Get"); 273 274 method.append("xyz.openbmc_project.Logging.Settings", "QuiesceOnHwError"); 275 276 try 277 { 278 auto reply = this->busLog.call(method); 279 reply.read(property); 280 } 281 catch (const sdbusplus::exception_t& e) 282 { 283 lg2::error("Error reading QuiesceOnHwError property: {ERROR}", "ERROR", 284 e); 285 throw; 286 } 287 288 return std::get<bool>(property); 289 } 290 291 bool Manager::isCalloutPresent(const Entry& entry) 292 { 293 for (const auto& c : entry.additionalData()) 294 { 295 if (c.find("CALLOUT_") != std::string::npos) 296 { 297 return true; 298 } 299 } 300 301 return false; 302 } 303 304 void Manager::findAndRemoveResolvedBlocks() 305 { 306 for (auto& entry : entries) 307 { 308 if (entry.second->resolved()) 309 { 310 checkAndRemoveBlockingError(entry.first); 311 } 312 } 313 } 314 315 void Manager::onEntryResolve(sdbusplus::message_t& msg) 316 { 317 using Interface = std::string; 318 using Property = std::string; 319 using Value = std::string; 320 using Properties = std::map<Property, std::variant<Value>>; 321 322 Interface interface; 323 Properties properties; 324 325 msg.read(interface, properties); 326 327 for (const auto& p : properties) 328 { 329 if (p.first == "Resolved") 330 { 331 findAndRemoveResolvedBlocks(); 332 return; 333 } 334 } 335 } 336 337 void Manager::checkAndQuiesceHost() 338 { 339 using Host = sdbusplus::xyz::openbmc_project::State::server::Host; 340 341 // First check host state 342 std::variant<Host::HostState> property; 343 344 auto method = this->busLog.new_method_call( 345 "xyz.openbmc_project.State.Host", "/xyz/openbmc_project/state/host0", 346 "org.freedesktop.DBus.Properties", "Get"); 347 348 method.append("xyz.openbmc_project.State.Host", "CurrentHostState"); 349 350 try 351 { 352 auto reply = this->busLog.call(method); 353 reply.read(property); 354 } 355 catch (const sdbusplus::exception_t& e) 356 { 357 // Quiescing the host is a "best effort" type function. If unable to 358 // read the host state or it comes back empty, just return. 359 // The boot block object will still be created and the associations to 360 // find the log will be present. Don't want a dependency with 361 // phosphor-state-manager service 362 lg2::info("Error reading QuiesceOnHwError property: {ERROR}", "ERROR", 363 e); 364 return; 365 } 366 367 auto hostState = std::get<Host::HostState>(property); 368 if (hostState != Host::HostState::Running) 369 { 370 return; 371 } 372 373 auto quiesce = this->busLog.new_method_call( 374 "org.freedesktop.systemd1", "/org/freedesktop/systemd1", 375 "org.freedesktop.systemd1.Manager", "StartUnit"); 376 377 quiesce.append("obmc-host-graceful-quiesce@0.target"); 378 quiesce.append("replace"); 379 380 this->busLog.call_noreply(quiesce); 381 } 382 383 void Manager::quiesceOnError(const uint32_t entryId) 384 { 385 // Verify we don't already have this entry blocking 386 auto it = find_if( 387 this->blockingErrors.begin(), this->blockingErrors.end(), 388 [&](std::unique_ptr<Block>& obj) { return obj->entryId == entryId; }); 389 if (it != this->blockingErrors.end()) 390 { 391 // Already recorded so just return 392 lg2::debug( 393 "QuiesceOnError set and callout present but entry already logged"); 394 return; 395 } 396 397 lg2::info("QuiesceOnError set and callout present"); 398 399 auto blockPath = 400 std::string(OBJ_LOGGING) + "/block" + std::to_string(entryId); 401 auto blockObj = std::make_unique<Block>(this->busLog, blockPath, entryId); 402 this->blockingErrors.push_back(std::move(blockObj)); 403 404 // Register call back if log is resolved 405 using namespace sdbusplus::bus::match::rules; 406 auto entryPath = std::string(OBJ_ENTRY) + '/' + std::to_string(entryId); 407 auto callback = std::make_unique<sdbusplus::bus::match_t>( 408 this->busLog, 409 propertiesChanged(entryPath, "xyz.openbmc_project.Logging.Entry"), 410 std::bind(std::mem_fn(&Manager::onEntryResolve), this, 411 std::placeholders::_1)); 412 413 propChangedEntryCallback.insert( 414 std::make_pair(entryId, std::move(callback))); 415 416 checkAndQuiesceHost(); 417 } 418 419 void Manager::doExtensionLogCreate(const Entry& entry, const FFDCEntries& ffdc) 420 { 421 // Make the association <endpointpath>/<endpointtype> paths 422 std::vector<std::string> assocs; 423 for (const auto& [forwardType, reverseType, endpoint] : 424 entry.associations()) 425 { 426 std::string e{endpoint}; 427 e += '/' + reverseType; 428 assocs.push_back(e); 429 } 430 431 for (auto& create : Extensions::getCreateFunctions()) 432 { 433 try 434 { 435 create(entry.message(), entry.id(), entry.timestamp(), 436 entry.severity(), entry.additionalData(), assocs, ffdc); 437 } 438 catch (const std::exception& e) 439 { 440 lg2::error( 441 "An extension's create function threw an exception: {ERROR}", 442 "ERROR", e); 443 } 444 } 445 } 446 447 void Manager::processMetadata(const std::string& /*errorName*/, 448 const std::vector<std::string>& additionalData, 449 AssociationList& objects) const 450 { 451 // additionalData is a list of "metadata=value" 452 constexpr auto separator = '='; 453 for (const auto& entryItem : additionalData) 454 { 455 auto found = entryItem.find(separator); 456 if (std::string::npos != found) 457 { 458 auto metadata = entryItem.substr(0, found); 459 auto iter = meta.find(metadata); 460 if (meta.end() != iter) 461 { 462 (iter->second)(metadata, additionalData, objects); 463 } 464 } 465 } 466 } 467 468 void Manager::checkAndRemoveBlockingError(uint32_t entryId) 469 { 470 // First look for blocking object and remove 471 auto it = find_if( 472 blockingErrors.begin(), blockingErrors.end(), 473 [&](std::unique_ptr<Block>& obj) { return obj->entryId == entryId; }); 474 if (it != blockingErrors.end()) 475 { 476 blockingErrors.erase(it); 477 } 478 479 // Now remove the callback looking for the error to be resolved 480 auto resolveFind = propChangedEntryCallback.find(entryId); 481 if (resolveFind != propChangedEntryCallback.end()) 482 { 483 propChangedEntryCallback.erase(resolveFind); 484 } 485 486 return; 487 } 488 489 void Manager::erase(uint32_t entryId) 490 { 491 auto entryFound = entries.find(entryId); 492 if (entries.end() != entryFound) 493 { 494 for (auto& func : Extensions::getDeleteProhibitedFunctions()) 495 { 496 try 497 { 498 bool prohibited = false; 499 func(entryId, prohibited); 500 if (prohibited) 501 { 502 // Future work remains to throw an error here. 503 return; 504 } 505 } 506 catch (const std::exception& e) 507 { 508 lg2::error("An extension's deleteProhibited function threw an " 509 "exception: {ERROR}", 510 "ERROR", e); 511 } 512 } 513 514 // Delete the persistent representation of this error. 515 fs::path errorPath(ERRLOG_PERSIST_PATH); 516 errorPath /= std::to_string(entryId); 517 fs::remove(errorPath); 518 519 auto removeId = [](std::list<uint32_t>& ids, uint32_t id) { 520 auto it = std::find(ids.begin(), ids.end(), id); 521 if (it != ids.end()) 522 { 523 ids.erase(it); 524 } 525 }; 526 if (entryFound->second->severity() >= Entry::sevLowerLimit) 527 { 528 removeId(infoErrors, entryId); 529 } 530 else 531 { 532 removeId(realErrors, entryId); 533 } 534 entries.erase(entryFound); 535 536 checkAndRemoveBlockingError(entryId); 537 538 for (auto& remove : Extensions::getDeleteFunctions()) 539 { 540 try 541 { 542 remove(entryId); 543 } 544 catch (const std::exception& e) 545 { 546 lg2::error("An extension's delete function threw an exception: " 547 "{ERROR}", 548 "ERROR", e); 549 } 550 } 551 } 552 else 553 { 554 lg2::error("Invalid entry ID ({ID}) to delete", "ID", entryId); 555 } 556 } 557 558 void Manager::restore() 559 { 560 auto sanity = [](const auto& id, const auto& restoredId) { 561 return id == restoredId; 562 }; 563 564 fs::path dir(ERRLOG_PERSIST_PATH); 565 if (!fs::exists(dir) || fs::is_empty(dir)) 566 { 567 return; 568 } 569 570 for (auto& file : fs::directory_iterator(dir)) 571 { 572 auto id = file.path().filename().c_str(); 573 auto idNum = std::stol(id); 574 auto e = std::make_unique<Entry>( 575 busLog, std::string(OBJ_ENTRY) + '/' + id, idNum, *this); 576 if (deserialize(file.path(), *e)) 577 { 578 // validate the restored error entry id 579 if (sanity(static_cast<uint32_t>(idNum), e->id())) 580 { 581 e->path(file.path(), true); 582 if (e->severity() >= Entry::sevLowerLimit) 583 { 584 infoErrors.push_back(idNum); 585 } 586 else 587 { 588 realErrors.push_back(idNum); 589 } 590 591 entries.insert(std::make_pair(idNum, std::move(e))); 592 } 593 else 594 { 595 lg2::error( 596 "Failed in sanity check while restoring error entry. " 597 "Ignoring error entry {ID_NUM}/{ENTRY_ID}.", 598 "ID_NUM", idNum, "ENTRY_ID", e->id()); 599 } 600 } 601 } 602 603 if (!entries.empty()) 604 { 605 entryId = entries.rbegin()->first; 606 } 607 } 608 609 void Manager::journalSync() 610 { 611 bool syncRequested = false; 612 auto fd = -1; 613 auto rc = -1; 614 auto wd = -1; 615 auto bus = sdbusplus::bus::new_default(); 616 617 auto start = 618 duration_cast<microseconds>(steady_clock::now().time_since_epoch()) 619 .count(); 620 621 // Each time an error log is committed, a request to sync the journal 622 // must occur and block that error log commit until it completes. A 5sec 623 // block is done to allow sufficient time for the journal to be synced. 624 // 625 // Number of loop iterations = 3 for the following reasons: 626 // Iteration #1: Requests a journal sync by killing the journald service. 627 // Iteration #2: Setup an inotify watch to monitor the synced file that 628 // journald updates with the timestamp the last time the 629 // journal was flushed. 630 // Iteration #3: Poll to wait until inotify reports an event which blocks 631 // the error log from being commited until the sync completes. 632 constexpr auto maxRetry = 3; 633 for (int i = 0; i < maxRetry; i++) 634 { 635 // Read timestamp from synced file 636 constexpr auto syncedPath = "/run/systemd/journal/synced"; 637 std::ifstream syncedFile(syncedPath); 638 if (syncedFile.fail()) 639 { 640 // If the synced file doesn't exist, a sync request will create it. 641 if (errno != ENOENT) 642 { 643 lg2::error( 644 "Failed to open journal synced file {FILENAME}: {ERROR}", 645 "FILENAME", syncedPath, "ERROR", strerror(errno)); 646 return; 647 } 648 } 649 else 650 { 651 // Only read the synced file if it exists. 652 // See if a sync happened by now 653 std::string timestampStr; 654 std::getline(syncedFile, timestampStr); 655 auto timestamp = std::stoll(timestampStr); 656 if (timestamp >= start) 657 { 658 break; 659 } 660 } 661 662 // Let's ask for a sync, but only once 663 if (!syncRequested) 664 { 665 syncRequested = true; 666 667 constexpr auto JOURNAL_UNIT = "systemd-journald.service"; 668 auto signal = SIGRTMIN + 1; 669 670 auto method = bus.new_method_call(SYSTEMD_BUSNAME, SYSTEMD_PATH, 671 SYSTEMD_INTERFACE, "KillUnit"); 672 method.append(JOURNAL_UNIT, "main", signal); 673 bus.call(method); 674 if (method.is_method_error()) 675 { 676 lg2::error("Failed to kill journal service"); 677 break; 678 } 679 680 continue; 681 } 682 683 // Let's install the inotify watch, if we didn't do that yet. This watch 684 // monitors the syncedFile for when journald updates it with a newer 685 // timestamp. This means the journal has been flushed. 686 if (fd < 0) 687 { 688 fd = inotify_init1(IN_NONBLOCK | IN_CLOEXEC); 689 if (fd < 0) 690 { 691 lg2::error("Failed to create inotify watch: {ERROR}", "ERROR", 692 strerror(errno)); 693 return; 694 } 695 696 constexpr auto JOURNAL_RUN_PATH = "/run/systemd/journal"; 697 wd = inotify_add_watch(fd, JOURNAL_RUN_PATH, 698 IN_MOVED_TO | IN_DONT_FOLLOW | IN_ONLYDIR); 699 if (wd < 0) 700 { 701 lg2::error("Failed to watch journal directory: {PATH}: {ERROR}", 702 "PATH", JOURNAL_RUN_PATH, "ERROR", strerror(errno)); 703 close(fd); 704 return; 705 } 706 continue; 707 } 708 709 // Let's wait until inotify reports an event 710 struct pollfd fds = { 711 fd, 712 POLLIN, 713 0, 714 }; 715 constexpr auto pollTimeout = 5; // 5 seconds 716 rc = poll(&fds, 1, pollTimeout * 1000); 717 if (rc < 0) 718 { 719 lg2::error("Failed to add event: {ERROR}", "ERROR", 720 strerror(errno)); 721 inotify_rm_watch(fd, wd); 722 close(fd); 723 return; 724 } 725 else if (rc == 0) 726 { 727 lg2::info("Poll timeout ({TIMEOUT}), no new journal synced data", 728 "TIMEOUT", pollTimeout); 729 break; 730 } 731 732 // Read from the specified file descriptor until there is no new data, 733 // throwing away everything read since the timestamp will be read at the 734 // beginning of the loop. 735 constexpr auto maxBytes = 64; 736 uint8_t buffer[maxBytes]; 737 while (read(fd, buffer, maxBytes) > 0) 738 ; 739 } 740 741 if (fd != -1) 742 { 743 if (wd != -1) 744 { 745 inotify_rm_watch(fd, wd); 746 } 747 close(fd); 748 } 749 750 return; 751 } 752 753 std::string Manager::readFWVersion() 754 { 755 auto version = util::getOSReleaseValue("VERSION_ID"); 756 757 if (!version) 758 { 759 lg2::error("Unable to read BMC firmware version"); 760 } 761 762 return version.value_or(""); 763 } 764 765 void Manager::create(const std::string& message, Entry::Level severity, 766 const std::map<std::string, std::string>& additionalData) 767 { 768 // Convert the map into a vector of "key=value" strings 769 std::vector<std::string> ad; 770 metadata::associations::combine(additionalData, ad); 771 772 createEntry(message, severity, ad); 773 } 774 775 void Manager::createWithFFDC( 776 const std::string& message, Entry::Level severity, 777 const std::map<std::string, std::string>& additionalData, 778 const FFDCEntries& ffdc) 779 { 780 // Convert the map into a vector of "key=value" strings 781 std::vector<std::string> ad; 782 metadata::associations::combine(additionalData, ad); 783 784 createEntry(message, severity, ad, ffdc); 785 } 786 787 } // namespace internal 788 } // namespace logging 789 } // namespace phosphor 790