summaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorKarel Klic <kklic@redhat.com>2010-04-13 14:57:20 +0200
committerKarel Klic <kklic@redhat.com>2010-04-13 14:57:20 +0200
commita6daecbb32cf5fb0f71bdc14dddd35e7422dd4bb (patch)
tree76707e8942c0917328b421193f8fbffcd79efb0d /src
parentb56efc2b943e5d4e9af7d01626e7e7ee55fd8dad (diff)
downloadabrt-a6daecbb32cf5fb0f71bdc14dddd35e7422dd4bb.tar.gz
abrt-a6daecbb32cf5fb0f71bdc14dddd35e7422dd4bb.tar.xz
abrt-a6daecbb32cf5fb0f71bdc14dddd35e7422dd4bb.zip
do not catch perl/python crashes when the script is not of known package origin
Diffstat (limited to 'src')
-rw-r--r--src/Daemon/MiddleWare.cpp60
1 files changed, 38 insertions, 22 deletions
diff --git a/src/Daemon/MiddleWare.cpp b/src/Daemon/MiddleWare.cpp
index a0ead478..5c9ecb76 100644
--- a/src/Daemon/MiddleWare.cpp
+++ b/src/Daemon/MiddleWare.cpp
@@ -594,43 +594,51 @@ void LoadOpenGPGPublicKey(const char* key)
}
/**
- * Get a package name from executable name and save
- * package description to particular debugdump directory of a crash.
- * @param pExecutable A name of crashed application.
- * @param pDebugDumpDir A debugdump dir containing all necessary data.
- * @return It return results of operation. See mw_result_t.
+ * Returns the first full path argument in the command line or NULL.
+ * Skips options are in form "-XXX".
+ * Caller must delete the returned string using free().
*/
static char *get_argv1_if_full_path(const char* cmdline)
{
- char *argv1 = (char*) strchr(cmdline, ' ');
+ const char *argv1 = strpbrk(cmdline, " \t");
while (argv1 != NULL)
{
/* we found space in cmdline, so it might contain
* path to some script like:
* /usr/bin/python [-XXX] /usr/bin/system-control-network
*/
- argv1++;
- if (*argv1 == '-')
+ argv1++; /* skip the space */
+ if (*argv1 == '-') /* skip arguments */
{
/* looks like -XXX in "perl -XXX /usr/bin/script.pl", skip */
- argv1 = strchr(argv1, ' ');
+ argv1 = strpbrk(argv1, " \t");
continue;
}
- /* if the string following the space doesn't start
- * with '/' it's probably not a full path to script
- * and we can't use it to determine the package name
- */
- if (*argv1 != '/')
+ else if (*argv1 == ' ' || *argv1 == '\t') /* skip multiple spaces */
+ continue;
+ else if (*argv1 != '/')
{
- return NULL;
+ /* if the string following the space doesn't start
+ * with '/' it's probably not a full path to script
+ * and we can't use it to determine the package name
+ */
+ break;
}
+
+ /* cut the rest of cmdline arguments */
int len = strchrnul(argv1, ' ') - argv1;
- /* cut the cmdline arguments */
- argv1 = xstrndup(argv1, len);
- break;
+ return xstrndup(argv1, len);
}
- return argv1;
+ return NULL;
}
+
+/**
+ * Get a package name from executable name and save
+ * package description to particular debugdump directory of a crash.
+ * @param pExecutable A name of crashed application.
+ * @param pDebugDumpDir A debugdump dir containing all necessary data.
+ * @return It return results of operation. See mw_result_t.
+ */
static mw_result_t SavePackageDescriptionToDebugDump(
const char *pExecutable,
const char *cmdline,
@@ -692,6 +700,7 @@ static mw_result_t SavePackageDescriptionToDebugDump(
* This will work only if the cmdline contains the whole path.
* Example: python /usr/bin/system-control-network
*/
+ bool knownOrigin = false;
char *script_name = get_argv1_if_full_path(cmdline);
if (script_name)
{
@@ -707,9 +716,16 @@ static mw_result_t SavePackageDescriptionToDebugDump(
rpm_pkg = script_pkg;
scriptName = script_name;
pExecutable = scriptName.c_str();
+ knownOrigin = true;
}
free(script_name);
}
+
+ if (!knownOrigin && !g_settings_bProcessUnpackaged)
+ {
+ log("Interpreter crashed, but no packaged script detected: '%s'", cmdline);
+ return MW_PACKAGE_ERROR;
+ }
}
package = rpm_pkg;
@@ -717,7 +733,7 @@ static mw_result_t SavePackageDescriptionToDebugDump(
VERB2 log("Package:'%s' short:'%s'", rpm_pkg, packageName.c_str());
free(rpm_pkg);
- if (g_setBlackList.find(packageName) != g_setBlackList.end())
+ if (g_setBlackList.find(packageName) != g_setBlackList.end())
{
log("Blacklisted package '%s'", packageName.c_str());
return MW_BLACKLISTED;
@@ -838,8 +854,8 @@ static void RunAnalyzerActions(const char *pAnalyzer, const char *pDebugDumpDir,
if (!action)
{
/* GetAction() already complained if no such plugin.
- * If plugin exists but isn't an Action, it's not an error.
- */
+ * If plugin exists but isn't an Action, it's not an error.
+ */
continue;
}
try