1 /*-
2 * SPDX-License-Identifier: BSD-3-Clause
3 *
4 * Copyright (c) 2002 Poul-Henning Kamp
5 * Copyright (c) 2002 Networks Associates Technology, Inc.
6 * All rights reserved.
7 *
8 * This software was developed for the FreeBSD Project by Poul-Henning Kamp
9 * and NAI Labs, the Security Research Division of Network Associates, Inc.
10 * under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the
11 * DARPA CHATS research program.
12 *
13 * Redistribution and use in source and binary forms, with or without
14 * modification, are permitted provided that the following conditions
15 * are met:
16 * 1. Redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer.
18 * 2. Redistributions in binary form must reproduce the above copyright
19 * notice, this list of conditions and the following disclaimer in the
20 * documentation and/or other materials provided with the distribution.
21 * 3. The names of the authors may not be used to endorse or promote
22 * products derived from this software without specific prior written
23 * permission.
24 *
25 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
26 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
27 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
28 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
30 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
31 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 * SUCH DAMAGE.
36 *
37 * Copyright (c) 1986, 1992, 1993
38 * The Regents of the University of California. All rights reserved.
39 *
40 * Redistribution and use in source and binary forms, with or without
41 * modification, are permitted provided that the following conditions
42 * are met:
43 * 1. Redistributions of source code must retain the above copyright
44 * notice, this list of conditions and the following disclaimer.
45 * 2. Redistributions in binary form must reproduce the above copyright
46 * notice, this list of conditions and the following disclaimer in the
47 * documentation and/or other materials provided with the distribution.
48 * 3. Neither the name of the University nor the names of its contributors
49 * may be used to endorse or promote products derived from this software
50 * without specific prior written permission.
51 *
52 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
53 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
54 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
55 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
56 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
57 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
58 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
59 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
60 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
61 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
62 * SUCH DAMAGE.
63 */
64
65 #include <sys/cdefs.h>
66 __FBSDID("$FreeBSD$");
67
68 #include <sys/param.h>
69 #include <sys/disk.h>
70 #include <sys/kerneldump.h>
71 #include <sys/mount.h>
72 #include <sys/stat.h>
73
74 #include <capsicum_helpers.h>
75 #include <ctype.h>
76 #include <errno.h>
77 #include <fcntl.h>
78 #include <fstab.h>
79 #include <paths.h>
80 #include <signal.h>
81 #include <stdarg.h>
82 #include <stdbool.h>
83 #include <stdio.h>
84 #include <stdlib.h>
85 #include <string.h>
86 #include <syslog.h>
87 #include <time.h>
88 #include <unistd.h>
89 #define Z_SOLO
90 #include <zlib.h>
91 #include <zstd.h>
92
93 #include <libcasper.h>
94 #include <casper/cap_fileargs.h>
95 #include <casper/cap_syslog.h>
96
97 #include <libxo/xo.h>
98
99 /* The size of the buffer used for I/O. */
100 #define BUFFERSIZE (1024*1024)
101
102 #define STATUS_BAD 0
103 #define STATUS_GOOD 1
104 #define STATUS_UNKNOWN 2
105
106 static cap_channel_t *capsyslog;
107 static fileargs_t *capfa;
108 static bool checkfor, compress, uncompress, clear, force, keep; /* flags */
109 static int verbose;
110 static int nfound, nsaved, nerr; /* statistics */
111 static int maxdumps;
112
113 extern FILE *zdopen(int, const char *);
114
115 static sig_atomic_t got_siginfo;
116 static void infohandler(int);
117
118 static void
logmsg(int pri,const char * fmt,...)119 logmsg(int pri, const char *fmt, ...)
120 {
121 va_list ap;
122
123 va_start(ap, fmt);
124 if (capsyslog != NULL)
125 cap_vsyslog(capsyslog, pri, fmt, ap);
126 else
127 vsyslog(pri, fmt, ap);
128 va_end(ap);
129 }
130
131 static FILE *
xfopenat(int dirfd,const char * path,int flags,const char * modestr,...)132 xfopenat(int dirfd, const char *path, int flags, const char *modestr, ...)
133 {
134 va_list ap;
135 FILE *fp;
136 mode_t mode;
137 int error, fd;
138
139 if ((flags & O_CREAT) == O_CREAT) {
140 va_start(ap, modestr);
141 mode = (mode_t)va_arg(ap, int);
142 va_end(ap);
143 } else
144 mode = 0;
145
146 fd = openat(dirfd, path, flags, mode);
147 if (fd < 0)
148 return (NULL);
149 fp = fdopen(fd, modestr);
150 if (fp == NULL) {
151 error = errno;
152 (void)close(fd);
153 errno = error;
154 }
155 return (fp);
156 }
157
158 static void
printheader(xo_handle_t * xo,const struct kerneldumpheader * h,const char * device,int bounds,const int status)159 printheader(xo_handle_t *xo, const struct kerneldumpheader *h,
160 const char *device, int bounds, const int status)
161 {
162 uint64_t dumplen;
163 time_t t;
164 struct tm tm;
165 char time_str[64];
166 const char *stat_str;
167 const char *comp_str;
168
169 xo_flush_h(xo);
170 xo_emit_h(xo, "{Lwc:Dump header from device}{:dump_device/%s}\n",
171 device);
172 xo_emit_h(xo, "{P: }{Lwc:Architecture}{:architecture/%s}\n",
173 h->architecture);
174 xo_emit_h(xo,
175 "{P: }{Lwc:Architecture Version}{:architecture_version/%u}\n",
176 dtoh32(h->architectureversion));
177 dumplen = dtoh64(h->dumplength);
178 xo_emit_h(xo, "{P: }{Lwc:Dump Length}{:dump_length_bytes/%lld}\n",
179 (long long)dumplen);
180 xo_emit_h(xo, "{P: }{Lwc:Blocksize}{:blocksize/%d}\n",
181 dtoh32(h->blocksize));
182 switch (h->compression) {
183 case KERNELDUMP_COMP_NONE:
184 comp_str = "none";
185 break;
186 case KERNELDUMP_COMP_GZIP:
187 comp_str = "gzip";
188 break;
189 case KERNELDUMP_COMP_ZSTD:
190 comp_str = "zstd";
191 break;
192 default:
193 comp_str = "???";
194 break;
195 }
196 xo_emit_h(xo, "{P: }{Lwc:Compression}{:compression/%s}\n", comp_str);
197 t = dtoh64(h->dumptime);
198 localtime_r(&t, &tm);
199 if (strftime(time_str, sizeof(time_str), "%F %T %z", &tm) == 0)
200 time_str[0] = '\0';
201 xo_emit_h(xo, "{P: }{Lwc:Dumptime}{:dumptime/%s}\n", time_str);
202 xo_emit_h(xo, "{P: }{Lwc:Hostname}{:hostname/%s}\n", h->hostname);
203 xo_emit_h(xo, "{P: }{Lwc:Magic}{:magic/%s}\n", h->magic);
204 xo_emit_h(xo, "{P: }{Lwc:Version String}{:version_string/%s}",
205 h->versionstring);
206 xo_emit_h(xo, "{P: }{Lwc:Panic String}{:panic_string/%s}\n",
207 h->panicstring);
208 xo_emit_h(xo, "{P: }{Lwc:Dump Parity}{:dump_parity/%u}\n", h->parity);
209 xo_emit_h(xo, "{P: }{Lwc:Bounds}{:bounds/%d}\n", bounds);
210
211 switch (status) {
212 case STATUS_BAD:
213 stat_str = "bad";
214 break;
215 case STATUS_GOOD:
216 stat_str = "good";
217 break;
218 default:
219 stat_str = "unknown";
220 break;
221 }
222 xo_emit_h(xo, "{P: }{Lwc:Dump Status}{:dump_status/%s}\n", stat_str);
223 xo_flush_h(xo);
224 }
225
226 static int
getbounds(int savedirfd)227 getbounds(int savedirfd)
228 {
229 FILE *fp;
230 char buf[6];
231 int ret;
232
233 /*
234 * If we are just checking, then we haven't done a chdir to the dump
235 * directory and we should not try to read a bounds file.
236 */
237 if (checkfor)
238 return (0);
239
240 ret = 0;
241
242 if ((fp = xfopenat(savedirfd, "bounds", O_RDONLY, "r")) == NULL) {
243 if (verbose)
244 printf("unable to open bounds file, using 0\n");
245 return (ret);
246 }
247 if (fgets(buf, sizeof(buf), fp) == NULL) {
248 if (feof(fp))
249 logmsg(LOG_WARNING, "bounds file is empty, using 0");
250 else
251 logmsg(LOG_WARNING, "bounds file: %s", strerror(errno));
252 fclose(fp);
253 return (ret);
254 }
255
256 errno = 0;
257 ret = (int)strtol(buf, NULL, 10);
258 if (ret == 0 && (errno == EINVAL || errno == ERANGE))
259 logmsg(LOG_WARNING, "invalid value found in bounds, using 0");
260 fclose(fp);
261 return (ret);
262 }
263
264 static void
writebounds(int savedirfd,int bounds)265 writebounds(int savedirfd, int bounds)
266 {
267 FILE *fp;
268
269 if ((fp = xfopenat(savedirfd, "bounds", O_WRONLY | O_CREAT | O_TRUNC,
270 "w", 0644)) == NULL) {
271 logmsg(LOG_WARNING, "unable to write to bounds file: %m");
272 return;
273 }
274
275 if (verbose)
276 printf("bounds number: %d\n", bounds);
277
278 fprintf(fp, "%d\n", bounds);
279 fclose(fp);
280 }
281
282 static bool
writekey(int savedirfd,const char * keyname,uint8_t * dumpkey,uint32_t dumpkeysize)283 writekey(int savedirfd, const char *keyname, uint8_t *dumpkey,
284 uint32_t dumpkeysize)
285 {
286 int fd;
287
288 fd = openat(savedirfd, keyname, O_WRONLY | O_CREAT | O_TRUNC, 0600);
289 if (fd == -1) {
290 logmsg(LOG_ERR, "Unable to open %s to write the key: %m.",
291 keyname);
292 return (false);
293 }
294
295 if (write(fd, dumpkey, dumpkeysize) != (ssize_t)dumpkeysize) {
296 logmsg(LOG_ERR, "Unable to write the key to %s: %m.", keyname);
297 close(fd);
298 return (false);
299 }
300
301 close(fd);
302 return (true);
303 }
304
305 static off_t
file_size(int savedirfd,const char * path)306 file_size(int savedirfd, const char *path)
307 {
308 struct stat sb;
309
310 /* Ignore all errors, this file may not exist. */
311 if (fstatat(savedirfd, path, &sb, 0) == -1)
312 return (0);
313 return (sb.st_size);
314 }
315
316 static off_t
saved_dump_size(int savedirfd,int bounds)317 saved_dump_size(int savedirfd, int bounds)
318 {
319 static char path[PATH_MAX];
320 off_t dumpsize;
321
322 dumpsize = 0;
323
324 (void)snprintf(path, sizeof(path), "info.%d", bounds);
325 dumpsize += file_size(savedirfd, path);
326 (void)snprintf(path, sizeof(path), "vmcore.%d", bounds);
327 dumpsize += file_size(savedirfd, path);
328 (void)snprintf(path, sizeof(path), "vmcore.%d.gz", bounds);
329 dumpsize += file_size(savedirfd, path);
330 (void)snprintf(path, sizeof(path), "vmcore.%d.zst", bounds);
331 dumpsize += file_size(savedirfd, path);
332 (void)snprintf(path, sizeof(path), "textdump.tar.%d", bounds);
333 dumpsize += file_size(savedirfd, path);
334 (void)snprintf(path, sizeof(path), "textdump.tar.%d.gz", bounds);
335 dumpsize += file_size(savedirfd, path);
336
337 return (dumpsize);
338 }
339
340 static void
saved_dump_remove(int savedirfd,int bounds)341 saved_dump_remove(int savedirfd, int bounds)
342 {
343 static char path[PATH_MAX];
344
345 (void)snprintf(path, sizeof(path), "info.%d", bounds);
346 (void)unlinkat(savedirfd, path, 0);
347 (void)snprintf(path, sizeof(path), "vmcore.%d", bounds);
348 (void)unlinkat(savedirfd, path, 0);
349 (void)snprintf(path, sizeof(path), "vmcore.%d.gz", bounds);
350 (void)unlinkat(savedirfd, path, 0);
351 (void)snprintf(path, sizeof(path), "vmcore.%d.zst", bounds);
352 (void)unlinkat(savedirfd, path, 0);
353 (void)snprintf(path, sizeof(path), "textdump.tar.%d", bounds);
354 (void)unlinkat(savedirfd, path, 0);
355 (void)snprintf(path, sizeof(path), "textdump.tar.%d.gz", bounds);
356 (void)unlinkat(savedirfd, path, 0);
357 }
358
359 static void
symlinks_remove(int savedirfd)360 symlinks_remove(int savedirfd)
361 {
362
363 (void)unlinkat(savedirfd, "info.last", 0);
364 (void)unlinkat(savedirfd, "key.last", 0);
365 (void)unlinkat(savedirfd, "vmcore.last", 0);
366 (void)unlinkat(savedirfd, "vmcore.last.gz", 0);
367 (void)unlinkat(savedirfd, "vmcore.last.zst", 0);
368 (void)unlinkat(savedirfd, "vmcore_encrypted.last", 0);
369 (void)unlinkat(savedirfd, "vmcore_encrypted.last.gz", 0);
370 (void)unlinkat(savedirfd, "textdump.tar.last", 0);
371 (void)unlinkat(savedirfd, "textdump.tar.last.gz", 0);
372 }
373
374 /*
375 * Check that sufficient space is available on the disk that holds the
376 * save directory.
377 */
378 static int
check_space(const char * savedir,int savedirfd,off_t dumpsize,int bounds)379 check_space(const char *savedir, int savedirfd, off_t dumpsize, int bounds)
380 {
381 char buf[100];
382 struct statfs fsbuf;
383 FILE *fp;
384 off_t available, minfree, spacefree, totfree, needed;
385
386 if (fstatfs(savedirfd, &fsbuf) < 0) {
387 logmsg(LOG_ERR, "%s: %m", savedir);
388 exit(1);
389 }
390 spacefree = ((off_t) fsbuf.f_bavail * fsbuf.f_bsize) / 1024;
391 totfree = ((off_t) fsbuf.f_bfree * fsbuf.f_bsize) / 1024;
392
393 if ((fp = xfopenat(savedirfd, "minfree", O_RDONLY, "r")) == NULL)
394 minfree = 0;
395 else {
396 if (fgets(buf, sizeof(buf), fp) == NULL)
397 minfree = 0;
398 else {
399 char *endp;
400
401 errno = 0;
402 minfree = strtoll(buf, &endp, 10);
403 if (minfree == 0 && errno != 0)
404 minfree = -1;
405 else {
406 while (*endp != '\0' && isspace(*endp))
407 endp++;
408 if (*endp != '\0' || minfree < 0)
409 minfree = -1;
410 }
411 if (minfree < 0)
412 logmsg(LOG_WARNING,
413 "`minfree` didn't contain a valid size "
414 "(`%s`). Defaulting to 0", buf);
415 }
416 (void)fclose(fp);
417 }
418
419 available = minfree > 0 ? spacefree - minfree : totfree;
420 needed = dumpsize / 1024 + 2; /* 2 for info file */
421 needed -= saved_dump_size(savedirfd, bounds);
422 if (available < needed) {
423 logmsg(LOG_WARNING,
424 "no dump: not enough free space on device (need at least "
425 "%jdkB for dump; %jdkB available; %jdkB reserved)",
426 (intmax_t)needed,
427 (intmax_t)available + minfree,
428 (intmax_t)minfree);
429 return (0);
430 }
431 if (spacefree - needed < 0)
432 logmsg(LOG_WARNING,
433 "dump performed, but free space threshold crossed");
434 return (1);
435 }
436
437 static bool
compare_magic(const struct kerneldumpheader * kdh,const char * magic)438 compare_magic(const struct kerneldumpheader *kdh, const char *magic)
439 {
440
441 return (strncmp(kdh->magic, magic, sizeof(kdh->magic)) == 0);
442 }
443
444 #define BLOCKSIZE (1<<12)
445 #define BLOCKMASK (~(BLOCKSIZE-1))
446
447 static size_t
sparsefwrite(const char * buf,size_t nr,FILE * fp)448 sparsefwrite(const char *buf, size_t nr, FILE *fp)
449 {
450 size_t nw, he, hs;
451
452 for (nw = 0; nw < nr; nw = he) {
453 /* find a contiguous block of zeroes */
454 for (hs = nw; hs < nr; hs += BLOCKSIZE) {
455 for (he = hs; he < nr && buf[he] == 0; ++he)
456 /* nothing */ ;
457 /* is the hole long enough to matter? */
458 if (he >= hs + BLOCKSIZE)
459 break;
460 }
461
462 /* back down to a block boundary */
463 he &= BLOCKMASK;
464
465 /*
466 * 1) Don't go beyond the end of the buffer.
467 * 2) If the end of the buffer is less than
468 * BLOCKSIZE bytes away, we're at the end
469 * of the file, so just grab what's left.
470 */
471 if (hs + BLOCKSIZE > nr)
472 hs = he = nr;
473
474 /*
475 * At this point, we have a partial ordering:
476 * nw <= hs <= he <= nr
477 * If hs > nw, buf[nw..hs] contains non-zero
478 * data. If he > hs, buf[hs..he] is all zeroes.
479 */
480 if (hs > nw)
481 if (fwrite(buf + nw, hs - nw, 1, fp) != 1)
482 break;
483 if (he > hs)
484 if (fseeko(fp, he - hs, SEEK_CUR) == -1)
485 break;
486 }
487
488 return (nw);
489 }
490
491 static char *zbuf;
492 static size_t zbufsize;
493
494 static ssize_t
GunzipWrite(z_stream * z,char * in,size_t insize,FILE * fp)495 GunzipWrite(z_stream *z, char *in, size_t insize, FILE *fp)
496 {
497 static bool firstblock = true; /* XXX not re-entrable/usable */
498 const size_t hdrlen = 10;
499 size_t nw = 0, w;
500 int rv;
501
502 z->next_in = in;
503 z->avail_in = insize;
504 /*
505 * Since contrib/zlib for some reason is compiled
506 * without GUNZIP define, we need to skip the gzip
507 * header manually. Kernel puts minimal 10 byte
508 * header, see sys/kern/subr_compressor.c:gz_reset().
509 */
510 if (firstblock) {
511 z->next_in += hdrlen;
512 z->avail_in -= hdrlen;
513 firstblock = false;
514 }
515 do {
516 z->next_out = zbuf;
517 z->avail_out = zbufsize;
518 rv = inflate(z, Z_NO_FLUSH);
519 if (rv != Z_OK && rv != Z_STREAM_END) {
520 logmsg(LOG_ERR, "decompression failed: %s", z->msg);
521 return (-1);
522 }
523 w = sparsefwrite(zbuf, zbufsize - z->avail_out, fp);
524 if (w < zbufsize - z->avail_out)
525 return (-1);
526 nw += w;
527 } while (z->avail_in > 0 && rv != Z_STREAM_END);
528
529 return (nw);
530 }
531
532 static ssize_t
ZstdWrite(ZSTD_DCtx * Zctx,char * in,size_t insize,FILE * fp)533 ZstdWrite(ZSTD_DCtx *Zctx, char *in, size_t insize, FILE *fp)
534 {
535 ZSTD_inBuffer Zin;
536 ZSTD_outBuffer Zout;
537 size_t nw = 0, w;
538 int rv;
539
540 Zin.src = in;
541 Zin.size = insize;
542 Zin.pos = 0;
543 do {
544 Zout.dst = zbuf;
545 Zout.size = zbufsize;
546 Zout.pos = 0;
547 rv = ZSTD_decompressStream(Zctx, &Zout, &Zin);
548 if (ZSTD_isError(rv)) {
549 logmsg(LOG_ERR, "decompression failed: %s",
550 ZSTD_getErrorName(rv));
551 return (-1);
552 }
553 w = sparsefwrite(zbuf, Zout.pos, fp);
554 if (w < Zout.pos)
555 return (-1);
556 nw += w;
557 } while (Zin.pos < Zin.size && rv != 0);
558
559 return (nw);
560 }
561
562 static int
DoRegularFile(int fd,off_t dumpsize,u_int sectorsize,bool sparse,uint8_t compression,char * buf,const char * device,const char * filename,FILE * fp)563 DoRegularFile(int fd, off_t dumpsize, u_int sectorsize, bool sparse,
564 uint8_t compression, char *buf, const char *device,
565 const char *filename, FILE *fp)
566 {
567 size_t nr, wl;
568 ssize_t nw;
569 off_t dmpcnt, origsize;
570 z_stream z; /* gzip */
571 ZSTD_DCtx *Zctx; /* zstd */
572
573 dmpcnt = 0;
574 origsize = dumpsize;
575 if (compression == KERNELDUMP_COMP_GZIP) {
576 memset(&z, 0, sizeof(z));
577 z.zalloc = Z_NULL;
578 z.zfree = Z_NULL;
579 if (inflateInit2(&z, -MAX_WBITS) != Z_OK) {
580 logmsg(LOG_ERR, "failed to initialize zlib: %s", z.msg);
581 return (-1);
582 }
583 zbufsize = BUFFERSIZE;
584 } else if (compression == KERNELDUMP_COMP_ZSTD) {
585 if ((Zctx = ZSTD_createDCtx()) == NULL) {
586 logmsg(LOG_ERR, "failed to initialize zstd");
587 return (-1);
588 }
589 zbufsize = ZSTD_DStreamOutSize();
590 }
591 if (zbufsize > 0)
592 if ((zbuf = malloc(zbufsize)) == NULL) {
593 logmsg(LOG_ERR, "failed to alloc decompression buffer");
594 return (-1);
595 }
596
597 while (dumpsize > 0) {
598 wl = BUFFERSIZE;
599 if (wl > (size_t)dumpsize)
600 wl = dumpsize;
601 nr = read(fd, buf, roundup(wl, sectorsize));
602 if (nr != roundup(wl, sectorsize)) {
603 if (nr == 0)
604 logmsg(LOG_WARNING,
605 "WARNING: EOF on dump device");
606 else
607 logmsg(LOG_ERR, "read error on %s: %m", device);
608 nerr++;
609 return (-1);
610 }
611 if (compression == KERNELDUMP_COMP_GZIP)
612 nw = GunzipWrite(&z, buf, nr, fp);
613 else if (compression == KERNELDUMP_COMP_ZSTD)
614 nw = ZstdWrite(Zctx, buf, nr, fp);
615 else if (!sparse)
616 nw = fwrite(buf, 1, wl, fp);
617 else
618 nw = sparsefwrite(buf, wl, fp);
619 if (nw < 0 || (compression == KERNELDUMP_COMP_NONE &&
620 (size_t)nw != wl)) {
621 logmsg(LOG_ERR,
622 "write error on %s file: %m", filename);
623 logmsg(LOG_WARNING,
624 "WARNING: vmcore may be incomplete");
625 nerr++;
626 return (-1);
627 }
628 if (verbose) {
629 dmpcnt += wl;
630 printf("%llu\r", (unsigned long long)dmpcnt);
631 fflush(stdout);
632 }
633 dumpsize -= wl;
634 if (got_siginfo) {
635 printf("%s %.1lf%%\n", filename, (100.0 - (100.0 *
636 (double)dumpsize / (double)origsize)));
637 got_siginfo = 0;
638 }
639 }
640 return (0);
641 }
642
643 /*
644 * Specialized version of dump-reading logic for use with textdumps, which
645 * are written backwards from the end of the partition, and must be reversed
646 * before being written to the file. Textdumps are small, so do a bit less
647 * work to optimize/sparsify.
648 */
649 static int
DoTextdumpFile(int fd,off_t dumpsize,off_t lasthd,char * buf,const char * device,const char * filename,FILE * fp)650 DoTextdumpFile(int fd, off_t dumpsize, off_t lasthd, char *buf,
651 const char *device, const char *filename, FILE *fp)
652 {
653 int nr, nw, wl;
654 off_t dmpcnt, totsize;
655
656 totsize = dumpsize;
657 dmpcnt = 0;
658 wl = 512;
659 if ((dumpsize % wl) != 0) {
660 logmsg(LOG_ERR, "textdump uneven multiple of 512 on %s",
661 device);
662 nerr++;
663 return (-1);
664 }
665 while (dumpsize > 0) {
666 nr = pread(fd, buf, wl, lasthd - (totsize - dumpsize) - wl);
667 if (nr != wl) {
668 if (nr == 0)
669 logmsg(LOG_WARNING,
670 "WARNING: EOF on dump device");
671 else
672 logmsg(LOG_ERR, "read error on %s: %m", device);
673 nerr++;
674 return (-1);
675 }
676 nw = fwrite(buf, 1, wl, fp);
677 if (nw != wl) {
678 logmsg(LOG_ERR,
679 "write error on %s file: %m", filename);
680 logmsg(LOG_WARNING,
681 "WARNING: textdump may be incomplete");
682 nerr++;
683 return (-1);
684 }
685 if (verbose) {
686 dmpcnt += wl;
687 printf("%llu\r", (unsigned long long)dmpcnt);
688 fflush(stdout);
689 }
690 dumpsize -= wl;
691 }
692 return (0);
693 }
694
695 static void
DoFile(const char * savedir,int savedirfd,const char * device)696 DoFile(const char *savedir, int savedirfd, const char *device)
697 {
698 xo_handle_t *xostdout, *xoinfo;
699 static char infoname[PATH_MAX], corename[PATH_MAX], linkname[PATH_MAX];
700 static char keyname[PATH_MAX];
701 static char *buf = NULL;
702 char *temp = NULL;
703 struct kerneldumpheader kdhf, kdhl;
704 uint8_t *dumpkey;
705 off_t mediasize, dumpextent, dumplength, firsthd, lasthd;
706 FILE *core, *info;
707 int fdcore, fddev, error;
708 int bounds, status;
709 u_int sectorsize, xostyle;
710 uint32_t dumpkeysize;
711 bool iscompressed, isencrypted, istextdump, ret;
712
713 bounds = getbounds(savedirfd);
714 dumpkey = NULL;
715 mediasize = 0;
716 status = STATUS_UNKNOWN;
717
718 xostdout = xo_create_to_file(stdout, XO_STYLE_TEXT, 0);
719 if (xostdout == NULL) {
720 logmsg(LOG_ERR, "%s: %m", infoname);
721 return;
722 }
723
724 if (maxdumps > 0 && bounds == maxdumps)
725 bounds = 0;
726
727 if (buf == NULL) {
728 buf = malloc(BUFFERSIZE);
729 if (buf == NULL) {
730 logmsg(LOG_ERR, "%m");
731 return;
732 }
733 }
734
735 if (verbose)
736 printf("checking for kernel dump on device %s\n", device);
737
738 fddev = fileargs_open(capfa, device);
739 if (fddev < 0) {
740 logmsg(LOG_ERR, "%s: %m", device);
741 return;
742 }
743
744 error = ioctl(fddev, DIOCGMEDIASIZE, &mediasize);
745 if (!error)
746 error = ioctl(fddev, DIOCGSECTORSIZE, §orsize);
747 if (error) {
748 logmsg(LOG_ERR,
749 "couldn't find media and/or sector size of %s: %m", device);
750 goto closefd;
751 }
752
753 if (verbose) {
754 printf("mediasize = %lld bytes\n", (long long)mediasize);
755 printf("sectorsize = %u bytes\n", sectorsize);
756 }
757
758 if (sectorsize < sizeof(kdhl)) {
759 logmsg(LOG_ERR,
760 "Sector size is less the kernel dump header %zu",
761 sizeof(kdhl));
762 goto closefd;
763 }
764
765 lasthd = mediasize - sectorsize;
766 temp = malloc(sectorsize);
767 if (temp == NULL) {
768 logmsg(LOG_ERR, "%m");
769 goto closefd;
770 }
771 if (lseek(fddev, lasthd, SEEK_SET) != lasthd ||
772 read(fddev, temp, sectorsize) != (ssize_t)sectorsize) {
773 logmsg(LOG_ERR,
774 "error reading last dump header at offset %lld in %s: %m",
775 (long long)lasthd, device);
776 goto closefd;
777 }
778 memcpy(&kdhl, temp, sizeof(kdhl));
779 iscompressed = istextdump = false;
780 if (compare_magic(&kdhl, TEXTDUMPMAGIC)) {
781 if (verbose)
782 printf("textdump magic on last dump header on %s\n",
783 device);
784 istextdump = true;
785 if (dtoh32(kdhl.version) != KERNELDUMP_TEXT_VERSION) {
786 logmsg(LOG_ERR,
787 "unknown version (%d) in last dump header on %s",
788 dtoh32(kdhl.version), device);
789
790 status = STATUS_BAD;
791 if (!force)
792 goto closefd;
793 }
794 } else if (compare_magic(&kdhl, KERNELDUMPMAGIC)) {
795 if (dtoh32(kdhl.version) != KERNELDUMPVERSION) {
796 logmsg(LOG_ERR,
797 "unknown version (%d) in last dump header on %s",
798 dtoh32(kdhl.version), device);
799
800 status = STATUS_BAD;
801 if (!force)
802 goto closefd;
803 }
804 switch (kdhl.compression) {
805 case KERNELDUMP_COMP_NONE:
806 uncompress = false;
807 break;
808 case KERNELDUMP_COMP_GZIP:
809 case KERNELDUMP_COMP_ZSTD:
810 if (compress && verbose)
811 printf("dump is already compressed\n");
812 if (uncompress && verbose)
813 printf("dump to be uncompressed\n");
814 compress = false;
815 iscompressed = true;
816 break;
817 default:
818 logmsg(LOG_ERR, "unknown compression type %d on %s",
819 kdhl.compression, device);
820 break;
821 }
822 } else {
823 if (verbose)
824 printf("magic mismatch on last dump header on %s\n",
825 device);
826
827 status = STATUS_BAD;
828 if (!force)
829 goto closefd;
830
831 if (compare_magic(&kdhl, KERNELDUMPMAGIC_CLEARED)) {
832 if (verbose)
833 printf("forcing magic on %s\n", device);
834 memcpy(kdhl.magic, KERNELDUMPMAGIC, sizeof(kdhl.magic));
835 } else {
836 logmsg(LOG_ERR, "unable to force dump - bad magic");
837 goto closefd;
838 }
839 if (dtoh32(kdhl.version) != KERNELDUMPVERSION) {
840 logmsg(LOG_ERR,
841 "unknown version (%d) in last dump header on %s",
842 dtoh32(kdhl.version), device);
843
844 status = STATUS_BAD;
845 if (!force)
846 goto closefd;
847 }
848 }
849
850 nfound++;
851 if (clear)
852 goto nuke;
853
854 if (kerneldump_parity(&kdhl)) {
855 logmsg(LOG_ERR,
856 "parity error on last dump header on %s", device);
857 nerr++;
858 status = STATUS_BAD;
859 if (!force)
860 goto closefd;
861 }
862 dumpextent = dtoh64(kdhl.dumpextent);
863 dumplength = dtoh64(kdhl.dumplength);
864 dumpkeysize = dtoh32(kdhl.dumpkeysize);
865 firsthd = lasthd - dumpextent - sectorsize - dumpkeysize;
866 if (lseek(fddev, firsthd, SEEK_SET) != firsthd ||
867 read(fddev, temp, sectorsize) != (ssize_t)sectorsize) {
868 logmsg(LOG_ERR,
869 "error reading first dump header at offset %lld in %s: %m",
870 (long long)firsthd, device);
871 nerr++;
872 goto closefd;
873 }
874 memcpy(&kdhf, temp, sizeof(kdhf));
875
876 if (verbose >= 2) {
877 printf("First dump headers:\n");
878 printheader(xostdout, &kdhf, device, bounds, -1);
879
880 printf("\nLast dump headers:\n");
881 printheader(xostdout, &kdhl, device, bounds, -1);
882 printf("\n");
883 }
884
885 if (memcmp(&kdhl, &kdhf, sizeof(kdhl))) {
886 logmsg(LOG_ERR,
887 "first and last dump headers disagree on %s", device);
888 nerr++;
889 status = STATUS_BAD;
890 if (!force)
891 goto closefd;
892 } else {
893 status = STATUS_GOOD;
894 }
895
896 if (checkfor) {
897 printf("A dump exists on %s\n", device);
898 close(fddev);
899 exit(0);
900 }
901
902 if (kdhl.panicstring[0] != '\0')
903 logmsg(LOG_ALERT, "reboot after panic: %.*s",
904 (int)sizeof(kdhl.panicstring), kdhl.panicstring);
905 else
906 logmsg(LOG_ALERT, "reboot");
907
908 if (verbose)
909 printf("Checking for available free space\n");
910
911 if (!check_space(savedir, savedirfd, dumplength, bounds)) {
912 nerr++;
913 goto closefd;
914 }
915
916 writebounds(savedirfd, bounds + 1);
917
918 saved_dump_remove(savedirfd, bounds);
919
920 snprintf(infoname, sizeof(infoname), "info.%d", bounds);
921
922 /*
923 * Create or overwrite any existing dump header files.
924 */
925 if ((info = xfopenat(savedirfd, infoname,
926 O_WRONLY | O_CREAT | O_TRUNC, "w", 0600)) == NULL) {
927 logmsg(LOG_ERR, "open(%s): %m", infoname);
928 nerr++;
929 goto closefd;
930 }
931
932 isencrypted = (dumpkeysize > 0);
933 if (compress)
934 snprintf(corename, sizeof(corename), "%s.%d.gz",
935 istextdump ? "textdump.tar" :
936 (isencrypted ? "vmcore_encrypted" : "vmcore"), bounds);
937 else if (iscompressed && !isencrypted && !uncompress)
938 snprintf(corename, sizeof(corename), "vmcore.%d.%s", bounds,
939 (kdhl.compression == KERNELDUMP_COMP_GZIP) ? "gz" : "zst");
940 else
941 snprintf(corename, sizeof(corename), "%s.%d",
942 istextdump ? "textdump.tar" :
943 (isencrypted ? "vmcore_encrypted" : "vmcore"), bounds);
944 fdcore = openat(savedirfd, corename, O_WRONLY | O_CREAT | O_TRUNC,
945 0600);
946 if (fdcore < 0) {
947 logmsg(LOG_ERR, "open(%s): %m", corename);
948 fclose(info);
949 nerr++;
950 goto closefd;
951 }
952
953 if (compress)
954 core = zdopen(fdcore, "w");
955 else
956 core = fdopen(fdcore, "w");
957 if (core == NULL) {
958 logmsg(LOG_ERR, "%s: %m", corename);
959 (void)close(fdcore);
960 (void)fclose(info);
961 nerr++;
962 goto closefd;
963 }
964 fdcore = -1;
965
966 xostyle = xo_get_style(NULL);
967 xoinfo = xo_create_to_file(info, xostyle, 0);
968 if (xoinfo == NULL) {
969 logmsg(LOG_ERR, "%s: %m", infoname);
970 fclose(info);
971 nerr++;
972 goto closeall;
973 }
974 xo_open_container_h(xoinfo, "crashdump");
975
976 if (verbose)
977 printheader(xostdout, &kdhl, device, bounds, status);
978
979 printheader(xoinfo, &kdhl, device, bounds, status);
980 xo_close_container_h(xoinfo, "crashdump");
981 xo_flush_h(xoinfo);
982 xo_finish_h(xoinfo);
983 fclose(info);
984
985 if (isencrypted) {
986 dumpkey = calloc(1, dumpkeysize);
987 if (dumpkey == NULL) {
988 logmsg(LOG_ERR, "Unable to allocate kernel dump key.");
989 nerr++;
990 goto closeall;
991 }
992
993 if (read(fddev, dumpkey, dumpkeysize) != (ssize_t)dumpkeysize) {
994 logmsg(LOG_ERR, "Unable to read kernel dump key: %m.");
995 nerr++;
996 goto closeall;
997 }
998
999 snprintf(keyname, sizeof(keyname), "key.%d", bounds);
1000 ret = writekey(savedirfd, keyname, dumpkey, dumpkeysize);
1001 explicit_bzero(dumpkey, dumpkeysize);
1002 if (!ret) {
1003 nerr++;
1004 goto closeall;
1005 }
1006 }
1007
1008 logmsg(LOG_NOTICE, "writing %s%score to %s/%s",
1009 isencrypted ? "encrypted " : "", compress ? "compressed " : "",
1010 savedir, corename);
1011
1012 if (istextdump) {
1013 if (DoTextdumpFile(fddev, dumplength, lasthd, buf, device,
1014 corename, core) < 0)
1015 goto closeall;
1016 } else {
1017 if (DoRegularFile(fddev, dumplength, sectorsize,
1018 !(compress || iscompressed || isencrypted),
1019 uncompress ? kdhl.compression : KERNELDUMP_COMP_NONE,
1020 buf, device, corename, core) < 0) {
1021 goto closeall;
1022 }
1023 }
1024 if (verbose)
1025 printf("\n");
1026
1027 if (fclose(core) < 0) {
1028 logmsg(LOG_ERR, "error on %s: %m", corename);
1029 nerr++;
1030 goto closefd;
1031 }
1032
1033 symlinks_remove(savedirfd);
1034 if (symlinkat(infoname, savedirfd, "info.last") == -1) {
1035 logmsg(LOG_WARNING, "unable to create symlink %s/%s: %m",
1036 savedir, "info.last");
1037 }
1038 if (isencrypted) {
1039 if (symlinkat(keyname, savedirfd, "key.last") == -1) {
1040 logmsg(LOG_WARNING,
1041 "unable to create symlink %s/%s: %m", savedir,
1042 "key.last");
1043 }
1044 }
1045 if ((iscompressed && !uncompress) || compress) {
1046 snprintf(linkname, sizeof(linkname), "%s.last.%s",
1047 istextdump ? "textdump.tar" :
1048 (isencrypted ? "vmcore_encrypted" : "vmcore"),
1049 (kdhl.compression == KERNELDUMP_COMP_ZSTD) ? "zst" : "gz");
1050 } else {
1051 snprintf(linkname, sizeof(linkname), "%s.last",
1052 istextdump ? "textdump.tar" :
1053 (isencrypted ? "vmcore_encrypted" : "vmcore"));
1054 }
1055 if (symlinkat(corename, savedirfd, linkname) == -1) {
1056 logmsg(LOG_WARNING, "unable to create symlink %s/%s: %m",
1057 savedir, linkname);
1058 }
1059
1060 nsaved++;
1061
1062 if (verbose)
1063 printf("dump saved\n");
1064
1065 nuke:
1066 if (!keep) {
1067 if (verbose)
1068 printf("clearing dump header\n");
1069 memcpy(kdhl.magic, KERNELDUMPMAGIC_CLEARED, sizeof(kdhl.magic));
1070 memcpy(temp, &kdhl, sizeof(kdhl));
1071 if (lseek(fddev, lasthd, SEEK_SET) != lasthd ||
1072 write(fddev, temp, sectorsize) != (ssize_t)sectorsize)
1073 logmsg(LOG_ERR,
1074 "error while clearing the dump header: %m");
1075 }
1076 xo_close_container_h(xostdout, "crashdump");
1077 xo_finish_h(xostdout);
1078 free(dumpkey);
1079 free(temp);
1080 close(fddev);
1081 return;
1082
1083 closeall:
1084 fclose(core);
1085
1086 closefd:
1087 free(dumpkey);
1088 free(temp);
1089 close(fddev);
1090 }
1091
1092 /* Prepend "/dev/" to any arguments that don't already have it */
1093 static char **
devify(int argc,char ** argv)1094 devify(int argc, char **argv)
1095 {
1096 char **devs;
1097 int i, l;
1098
1099 devs = malloc(argc * sizeof(*argv));
1100 if (devs == NULL) {
1101 logmsg(LOG_ERR, "malloc(): %m");
1102 exit(1);
1103 }
1104 for (i = 0; i < argc; i++) {
1105 if (strncmp(argv[i], _PATH_DEV, sizeof(_PATH_DEV) - 1) == 0)
1106 devs[i] = strdup(argv[i]);
1107 else {
1108 char *fullpath;
1109
1110 fullpath = malloc(PATH_MAX);
1111 if (fullpath == NULL) {
1112 logmsg(LOG_ERR, "malloc(): %m");
1113 exit(1);
1114 }
1115 l = snprintf(fullpath, PATH_MAX, "%s%s", _PATH_DEV,
1116 argv[i]);
1117 if (l < 0) {
1118 logmsg(LOG_ERR, "snprintf(): %m");
1119 exit(1);
1120 } else if (l >= PATH_MAX) {
1121 logmsg(LOG_ERR, "device name too long");
1122 exit(1);
1123 }
1124 devs[i] = fullpath;
1125 }
1126 }
1127 return (devs);
1128 }
1129
1130 static char **
enum_dumpdevs(int * argcp)1131 enum_dumpdevs(int *argcp)
1132 {
1133 struct fstab *fsp;
1134 char **argv;
1135 int argc, n;
1136
1137 /*
1138 * We cannot use getfsent(3) in capability mode, so we must
1139 * scan /etc/fstab and build up a list of candidate devices
1140 * before proceeding.
1141 */
1142 argc = 0;
1143 n = 8;
1144 argv = malloc(n * sizeof(*argv));
1145 if (argv == NULL) {
1146 logmsg(LOG_ERR, "malloc(): %m");
1147 exit(1);
1148 }
1149 for (;;) {
1150 fsp = getfsent();
1151 if (fsp == NULL)
1152 break;
1153 if (strcmp(fsp->fs_vfstype, "swap") != 0 &&
1154 strcmp(fsp->fs_vfstype, "dump") != 0)
1155 continue;
1156 if (argc >= n) {
1157 n *= 2;
1158 argv = realloc(argv, n * sizeof(*argv));
1159 if (argv == NULL) {
1160 logmsg(LOG_ERR, "realloc(): %m");
1161 exit(1);
1162 }
1163 }
1164 argv[argc] = strdup(fsp->fs_spec);
1165 if (argv[argc] == NULL) {
1166 logmsg(LOG_ERR, "strdup(): %m");
1167 exit(1);
1168 }
1169 argc++;
1170 }
1171 *argcp = argc;
1172 return (argv);
1173 }
1174
1175 static void
init_caps(int argc,char ** argv)1176 init_caps(int argc, char **argv)
1177 {
1178 cap_rights_t rights;
1179 cap_channel_t *capcas;
1180
1181 capcas = cap_init();
1182 if (capcas == NULL) {
1183 logmsg(LOG_ERR, "cap_init(): %m");
1184 exit(1);
1185 }
1186 /*
1187 * The fileargs capability does not currently provide a way to limit
1188 * ioctls.
1189 */
1190 (void)cap_rights_init(&rights, CAP_PREAD, CAP_WRITE, CAP_IOCTL);
1191 capfa = fileargs_init(argc, argv, checkfor || keep ? O_RDONLY : O_RDWR,
1192 0, &rights, FA_OPEN);
1193 if (capfa == NULL) {
1194 logmsg(LOG_ERR, "fileargs_init(): %m");
1195 exit(1);
1196 }
1197 caph_cache_catpages();
1198 caph_cache_tzdata();
1199 if (caph_enter_casper() != 0) {
1200 logmsg(LOG_ERR, "caph_enter_casper(): %m");
1201 exit(1);
1202 }
1203 capsyslog = cap_service_open(capcas, "system.syslog");
1204 if (capsyslog == NULL) {
1205 logmsg(LOG_ERR, "cap_service_open(system.syslog): %m");
1206 exit(1);
1207 }
1208 cap_close(capcas);
1209 }
1210
1211 static void
usage(void)1212 usage(void)
1213 {
1214 xo_error("%s\n%s\n%s\n",
1215 "usage: savecore -c [-v] [device ...]",
1216 " savecore -C [-v] [device ...]",
1217 " savecore [-fkvz] [-m maxdumps] [directory [device ...]]");
1218 exit(1);
1219 }
1220
1221 int
main(int argc,char ** argv)1222 main(int argc, char **argv)
1223 {
1224 cap_rights_t rights;
1225 const char *savedir;
1226 char **devs;
1227 int i, ch, error, savedirfd;
1228
1229 checkfor = compress = clear = force = keep = false;
1230 verbose = 0;
1231 nfound = nsaved = nerr = 0;
1232 savedir = ".";
1233
1234 openlog("savecore", LOG_PERROR, LOG_DAEMON);
1235 signal(SIGINFO, infohandler);
1236
1237 argc = xo_parse_args(argc, argv);
1238 if (argc < 0)
1239 exit(1);
1240
1241 while ((ch = getopt(argc, argv, "Ccfkm:uvz")) != -1)
1242 switch(ch) {
1243 case 'C':
1244 checkfor = true;
1245 break;
1246 case 'c':
1247 clear = true;
1248 break;
1249 case 'f':
1250 force = true;
1251 break;
1252 case 'k':
1253 keep = true;
1254 break;
1255 case 'm':
1256 maxdumps = atoi(optarg);
1257 if (maxdumps <= 0) {
1258 logmsg(LOG_ERR, "Invalid maxdump value");
1259 exit(1);
1260 }
1261 break;
1262 case 'u':
1263 uncompress = true;
1264 break;
1265 case 'v':
1266 verbose++;
1267 break;
1268 case 'z':
1269 compress = true;
1270 break;
1271 case '?':
1272 default:
1273 usage();
1274 }
1275 if (checkfor && (clear || force || keep))
1276 usage();
1277 if (clear && (compress || keep))
1278 usage();
1279 if (maxdumps > 0 && (checkfor || clear))
1280 usage();
1281 if (compress && uncompress)
1282 usage();
1283 argc -= optind;
1284 argv += optind;
1285 if (argc >= 1 && !checkfor && !clear) {
1286 error = chdir(argv[0]);
1287 if (error) {
1288 logmsg(LOG_ERR, "chdir(%s): %m", argv[0]);
1289 exit(1);
1290 }
1291 savedir = argv[0];
1292 argc--;
1293 argv++;
1294 }
1295 if (argc == 0)
1296 devs = enum_dumpdevs(&argc);
1297 else
1298 devs = devify(argc, argv);
1299
1300 savedirfd = open(savedir, O_RDONLY | O_DIRECTORY);
1301 if (savedirfd < 0) {
1302 logmsg(LOG_ERR, "open(%s): %m", savedir);
1303 exit(1);
1304 }
1305 (void)cap_rights_init(&rights, CAP_CREATE, CAP_FCNTL, CAP_FSTATAT,
1306 CAP_FSTATFS, CAP_PREAD, CAP_SYMLINKAT, CAP_FTRUNCATE, CAP_UNLINKAT,
1307 CAP_WRITE);
1308 if (caph_rights_limit(savedirfd, &rights) < 0) {
1309 logmsg(LOG_ERR, "cap_rights_limit(): %m");
1310 exit(1);
1311 }
1312
1313 /* Enter capability mode. */
1314 init_caps(argc, devs);
1315
1316 for (i = 0; i < argc; i++)
1317 DoFile(savedir, savedirfd, devs[i]);
1318
1319 /* Emit minimal output. */
1320 if (nfound == 0) {
1321 if (checkfor) {
1322 if (verbose)
1323 printf("No dump exists\n");
1324 exit(1);
1325 }
1326 if (verbose)
1327 logmsg(LOG_WARNING, "no dumps found");
1328 } else if (nsaved == 0) {
1329 if (nerr != 0) {
1330 if (verbose)
1331 logmsg(LOG_WARNING,
1332 "unsaved dumps found but not saved");
1333 exit(1);
1334 } else if (verbose)
1335 logmsg(LOG_WARNING, "no unsaved dumps found");
1336 }
1337
1338 return (0);
1339 }
1340
1341 static void
infohandler(int sig __unused)1342 infohandler(int sig __unused)
1343 {
1344 got_siginfo = 1;
1345 }
1346