1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2011 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
36 #include <sys/ioctl.h>
37 #include <sys/inotify.h>
45 #include "sd-journal.h"
49 #include "logs-show.h"
51 #include "path-util.h"
58 #include "journal-internal.h"
59 #include "journal-def.h"
60 #include "journal-verify.h"
61 #include "journal-authenticate.h"
62 #include "journal-qrcode.h"
63 #include "journal-vacuum.h"
65 #include "unit-name.h"
69 #include "bus-error.h"
71 #define DEFAULT_FSS_INTERVAL_USEC (15*USEC_PER_MINUTE)
74 /* Special values for arg_lines */
75 ARG_LINES_DEFAULT = -2,
79 static OutputMode arg_output = OUTPUT_SHORT;
80 static bool arg_utc = false;
81 static bool arg_pager_end = false;
82 static bool arg_follow = false;
83 static bool arg_full = true;
84 static bool arg_all = false;
85 static bool arg_no_pager = false;
86 static int arg_lines = ARG_LINES_DEFAULT;
87 static bool arg_no_tail = false;
88 static bool arg_quiet = false;
89 static bool arg_merge = false;
90 static bool arg_boot = false;
91 static sd_id128_t arg_boot_id = {};
92 static int arg_boot_offset = 0;
93 static bool arg_dmesg = false;
94 static const char *arg_cursor = NULL;
95 static const char *arg_after_cursor = NULL;
96 static bool arg_show_cursor = false;
97 static const char *arg_directory = NULL;
98 static char **arg_file = NULL;
99 static int arg_priorities = 0xFF;
100 static const char *arg_verify_key = NULL;
102 static usec_t arg_interval = DEFAULT_FSS_INTERVAL_USEC;
103 static bool arg_force = false;
105 static usec_t arg_since, arg_until;
106 static bool arg_since_set = false, arg_until_set = false;
107 static char **arg_syslog_identifier = NULL;
108 static char **arg_system_units = NULL;
109 static char **arg_user_units = NULL;
110 static const char *arg_field = NULL;
111 static bool arg_catalog = false;
112 static bool arg_reverse = false;
113 static int arg_journal_type = 0;
114 static const char *arg_root = NULL;
115 static const char *arg_machine = NULL;
116 static off_t arg_vacuum_size = (off_t) -1;
117 static usec_t arg_vacuum_time = USEC_INFINITY;
128 ACTION_UPDATE_CATALOG,
132 } arg_action = ACTION_SHOW;
134 typedef struct boot_id_t {
140 static void pager_open_if_enabled(void) {
145 pager_open(arg_pager_end);
148 static char *format_timestamp_maybe_utc(char *buf, size_t l, usec_t t) {
151 return format_timestamp_utc(buf, l, t);
153 return format_timestamp(buf, l, t);
156 static int parse_boot_descriptor(const char *x, sd_id128_t *boot_id, int *offset) {
157 sd_id128_t id = SD_ID128_NULL;
160 if (strlen(x) >= 32) {
164 r = sd_id128_from_string(t, &id);
168 if (*x != '-' && *x != '+' && *x != 0)
172 r = safe_atoi(x, &off);
177 r = safe_atoi(x, &off);
191 static void help(void) {
193 pager_open_if_enabled();
195 printf("%s [OPTIONS...] [MATCHES...]\n\n"
196 "Query the journal.\n\n"
198 " --system Show the system journal\n"
199 " --user Show the user journal for the current user\n"
200 " -M --machine=CONTAINER Operate on local container\n"
201 " --since=DATE Show entries not older than the specified date\n"
202 " --until=DATE Show entries not newer than the specified date\n"
203 " -c --cursor=CURSOR Show entries starting at the specified cursor\n"
204 " --after-cursor=CURSOR Show entries after the specified cursor\n"
205 " --show-cursor Print the cursor after all the entries\n"
206 " -b --boot[=ID] Show current boot or the specified boot\n"
207 " --list-boots Show terse information about recorded boots\n"
208 " -k --dmesg Show kernel message log from the current boot\n"
209 " -u --unit=UNIT Show logs from the specified unit\n"
210 " --user-unit=UNIT Show logs from the specified user unit\n"
211 " -t --identifier=STRING Show entries with the specified syslog identifier\n"
212 " -p --priority=RANGE Show entries with the specified priority\n"
213 " -e --pager-end Immediately jump to the end in the pager\n"
214 " -f --follow Follow the journal\n"
215 " -n --lines[=INTEGER] Number of journal entries to show\n"
216 " --no-tail Show all lines, even in follow mode\n"
217 " -r --reverse Show the newest entries first\n"
218 " -o --output=STRING Change journal output mode (short, short-iso,\n"
219 " short-precise, short-monotonic, verbose,\n"
220 " export, json, json-pretty, json-sse, cat)\n"
221 " --utc Express time in Coordinated Universal Time (UTC)\n"
222 " -x --catalog Add message explanations where available\n"
223 " --no-full Ellipsize fields\n"
224 " -a --all Show all fields, including long and unprintable\n"
225 " -q --quiet Do not show privilege warning\n"
226 " --no-pager Do not pipe output into a pager\n"
227 " -m --merge Show entries from all available journals\n"
228 " -D --directory=PATH Show journal files from directory\n"
229 " --file=PATH Show journal file\n"
230 " --root=ROOT Operate on catalog files underneath the root ROOT\n"
232 " --interval=TIME Time interval for changing the FSS sealing key\n"
233 " --verify-key=KEY Specify FSS verification key\n"
234 " --force Override of the FSS key pair with --setup-keys\n"
237 " -h --help Show this help text\n"
238 " --version Show package version\n"
239 " -F --field=FIELD List all values that a specified field takes\n"
240 " --new-id128 Generate a new 128-bit ID\n"
241 " --disk-usage Show total disk usage of all journal files\n"
242 " --vacuum-size=BYTES Reduce disk usage below specified size\n"
243 " --vacuum-time=TIME Remove journal files older than specified date\n"
244 " --flush Flush all journal data from /run into /var\n"
245 " --header Show journal header information\n"
246 " --list-catalog Show all message IDs in the catalog\n"
247 " --dump-catalog Show entries in the message catalog\n"
248 " --update-catalog Update the message catalog database\n"
250 " --setup-keys Generate a new FSS key pair\n"
251 " --verify Verify journal file consistency\n"
253 , program_invocation_short_name);
256 static int parse_argv(int argc, char *argv[]) {
290 static const struct option options[] = {
291 { "help", no_argument, NULL, 'h' },
292 { "version" , no_argument, NULL, ARG_VERSION },
293 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
294 { "pager-end", no_argument, NULL, 'e' },
295 { "follow", no_argument, NULL, 'f' },
296 { "force", no_argument, NULL, ARG_FORCE },
297 { "output", required_argument, NULL, 'o' },
298 { "all", no_argument, NULL, 'a' },
299 { "full", no_argument, NULL, 'l' },
300 { "no-full", no_argument, NULL, ARG_NO_FULL },
301 { "lines", optional_argument, NULL, 'n' },
302 { "no-tail", no_argument, NULL, ARG_NO_TAIL },
303 { "new-id128", no_argument, NULL, ARG_NEW_ID128 },
304 { "quiet", no_argument, NULL, 'q' },
305 { "merge", no_argument, NULL, 'm' },
306 { "boot", optional_argument, NULL, 'b' },
307 { "list-boots", no_argument, NULL, ARG_LIST_BOOTS },
308 { "this-boot", optional_argument, NULL, 'b' }, /* deprecated */
309 { "dmesg", no_argument, NULL, 'k' },
310 { "system", no_argument, NULL, ARG_SYSTEM },
311 { "user", no_argument, NULL, ARG_USER },
312 { "directory", required_argument, NULL, 'D' },
313 { "file", required_argument, NULL, ARG_FILE },
314 { "root", required_argument, NULL, ARG_ROOT },
315 { "header", no_argument, NULL, ARG_HEADER },
316 { "identifier", required_argument, NULL, 't' },
317 { "priority", required_argument, NULL, 'p' },
318 { "setup-keys", no_argument, NULL, ARG_SETUP_KEYS },
319 { "interval", required_argument, NULL, ARG_INTERVAL },
320 { "verify", no_argument, NULL, ARG_VERIFY },
321 { "verify-key", required_argument, NULL, ARG_VERIFY_KEY },
322 { "disk-usage", no_argument, NULL, ARG_DISK_USAGE },
323 { "cursor", required_argument, NULL, 'c' },
324 { "after-cursor", required_argument, NULL, ARG_AFTER_CURSOR },
325 { "show-cursor", no_argument, NULL, ARG_SHOW_CURSOR },
326 { "since", required_argument, NULL, ARG_SINCE },
327 { "until", required_argument, NULL, ARG_UNTIL },
328 { "unit", required_argument, NULL, 'u' },
329 { "user-unit", required_argument, NULL, ARG_USER_UNIT },
330 { "field", required_argument, NULL, 'F' },
331 { "catalog", no_argument, NULL, 'x' },
332 { "list-catalog", no_argument, NULL, ARG_LIST_CATALOG },
333 { "dump-catalog", no_argument, NULL, ARG_DUMP_CATALOG },
334 { "update-catalog", no_argument, NULL, ARG_UPDATE_CATALOG },
335 { "reverse", no_argument, NULL, 'r' },
336 { "machine", required_argument, NULL, 'M' },
337 { "utc", no_argument, NULL, ARG_UTC },
338 { "flush", no_argument, NULL, ARG_FLUSH },
339 { "vacuum-size", required_argument, NULL, ARG_VACUUM_SIZE },
340 { "vacuum-time", required_argument, NULL, ARG_VACUUM_TIME },
349 while ((c = getopt_long(argc, argv, "hefo:aln::qmb::kD:p:c:t:u:F:xrM:", options, NULL)) >= 0)
358 puts(PACKAGE_STRING);
359 puts(SYSTEMD_FEATURES);
367 arg_pager_end = true;
369 if (arg_lines == ARG_LINES_DEFAULT)
379 arg_output = output_mode_from_string(optarg);
380 if (arg_output < 0) {
381 log_error("Unknown output format '%s'.", optarg);
385 if (arg_output == OUTPUT_EXPORT ||
386 arg_output == OUTPUT_JSON ||
387 arg_output == OUTPUT_JSON_PRETTY ||
388 arg_output == OUTPUT_JSON_SSE ||
389 arg_output == OUTPUT_CAT)
408 if (streq(optarg, "all"))
409 arg_lines = ARG_LINES_ALL;
411 r = safe_atoi(optarg, &arg_lines);
412 if (r < 0 || arg_lines < 0) {
413 log_error("Failed to parse lines '%s'", optarg);
420 /* Hmm, no argument? Maybe the next
421 * word on the command line is
422 * supposed to be the argument? Let's
423 * see if there is one, and is
427 if (streq(argv[optind], "all")) {
428 arg_lines = ARG_LINES_ALL;
430 } else if (safe_atoi(argv[optind], &n) >= 0 && n >= 0) {
444 arg_action = ACTION_NEW_ID128;
459 r = parse_boot_descriptor(optarg, &arg_boot_id, &arg_boot_offset);
461 log_error("Failed to parse boot descriptor '%s'", optarg);
466 /* Hmm, no argument? Maybe the next
467 * word on the command line is
468 * supposed to be the argument? Let's
469 * see if there is one and is parsable
470 * as a boot descriptor... */
473 parse_boot_descriptor(argv[optind], &arg_boot_id, &arg_boot_offset) >= 0)
480 arg_action = ACTION_LIST_BOOTS;
484 arg_boot = arg_dmesg = true;
488 arg_journal_type |= SD_JOURNAL_SYSTEM;
492 arg_journal_type |= SD_JOURNAL_CURRENT_USER;
496 arg_machine = optarg;
500 arg_directory = optarg;
504 r = glob_extend(&arg_file, optarg);
506 return log_error_errno(r, "Failed to add paths: %m");
517 case ARG_AFTER_CURSOR:
518 arg_after_cursor = optarg;
521 case ARG_SHOW_CURSOR:
522 arg_show_cursor = true;
526 arg_action = ACTION_PRINT_HEADER;
530 arg_action = ACTION_VERIFY;
534 arg_action = ACTION_DISK_USAGE;
537 case ARG_VACUUM_SIZE:
538 r = parse_size(optarg, 1024, &arg_vacuum_size);
540 log_error("Failed to parse vacuum size: %s", optarg);
544 arg_action = ACTION_VACUUM;
547 case ARG_VACUUM_TIME:
548 r = parse_sec(optarg, &arg_vacuum_time);
550 log_error("Failed to parse vacuum time: %s", optarg);
554 arg_action = ACTION_VACUUM;
563 arg_action = ACTION_SETUP_KEYS;
568 arg_action = ACTION_VERIFY;
569 arg_verify_key = optarg;
574 r = parse_sec(optarg, &arg_interval);
575 if (r < 0 || arg_interval <= 0) {
576 log_error("Failed to parse sealing key change interval: %s", optarg);
585 log_error("Forward-secure sealing not available.");
592 dots = strstr(optarg, "..");
598 a = strndup(optarg, dots - optarg);
602 from = log_level_from_string(a);
603 to = log_level_from_string(dots + 2);
606 if (from < 0 || to < 0) {
607 log_error("Failed to parse log level range %s", optarg);
614 for (i = from; i <= to; i++)
615 arg_priorities |= 1 << i;
617 for (i = to; i <= from; i++)
618 arg_priorities |= 1 << i;
624 p = log_level_from_string(optarg);
626 log_error("Unknown log level %s", optarg);
632 for (i = 0; i <= p; i++)
633 arg_priorities |= 1 << i;
640 r = parse_timestamp(optarg, &arg_since);
642 log_error("Failed to parse timestamp: %s", optarg);
645 arg_since_set = true;
649 r = parse_timestamp(optarg, &arg_until);
651 log_error("Failed to parse timestamp: %s", optarg);
654 arg_until_set = true;
658 r = strv_extend(&arg_syslog_identifier, optarg);
664 r = strv_extend(&arg_system_units, optarg);
670 r = strv_extend(&arg_user_units, optarg);
683 case ARG_LIST_CATALOG:
684 arg_action = ACTION_LIST_CATALOG;
687 case ARG_DUMP_CATALOG:
688 arg_action = ACTION_DUMP_CATALOG;
691 case ARG_UPDATE_CATALOG:
692 arg_action = ACTION_UPDATE_CATALOG;
704 arg_action = ACTION_FLUSH;
711 assert_not_reached("Unhandled option");
714 if (arg_follow && !arg_no_tail && !arg_since && arg_lines == ARG_LINES_DEFAULT)
717 if (!!arg_directory + !!arg_file + !!arg_machine > 1) {
718 log_error("Please specify either -D/--directory= or --file= or -M/--machine=, not more than one.");
722 if (arg_since_set && arg_until_set && arg_since > arg_until) {
723 log_error("--since= must be before --until=.");
727 if (!!arg_cursor + !!arg_after_cursor + !!arg_since_set > 1) {
728 log_error("Please specify only one of --since=, --cursor=, and --after-cursor.");
732 if (arg_follow && arg_reverse) {
733 log_error("Please specify either --reverse= or --follow=, not both.");
737 if (arg_action != ACTION_SHOW && optind < argc) {
738 log_error("Extraneous arguments starting with '%s'", argv[optind]);
745 static int generate_new_id128(void) {
750 r = sd_id128_randomize(&id);
752 return log_error_errno(r, "Failed to generate ID: %m");
754 printf("As string:\n"
755 SD_ID128_FORMAT_STR "\n\n"
757 "%02x%02x%02x%02x-%02x%02x-%02x%02x-%02x%02x-%02x%02x%02x%02x%02x%02x\n\n"
759 "#define MESSAGE_XYZ SD_ID128_MAKE(",
760 SD_ID128_FORMAT_VAL(id),
761 SD_ID128_FORMAT_VAL(id));
762 for (i = 0; i < 16; i++)
763 printf("%02x%s", id.bytes[i], i != 15 ? "," : "");
764 fputs(")\n\n", stdout);
766 printf("As Python constant:\n"
768 ">>> MESSAGE_XYZ = uuid.UUID('" SD_ID128_FORMAT_STR "')\n",
769 SD_ID128_FORMAT_VAL(id));
774 static int add_matches(sd_journal *j, char **args) {
776 bool have_term = false;
780 STRV_FOREACH(i, args) {
783 if (streq(*i, "+")) {
786 r = sd_journal_add_disjunction(j);
789 } else if (path_is_absolute(*i)) {
790 _cleanup_free_ char *p, *t = NULL, *t2 = NULL;
792 _cleanup_free_ char *interpreter = NULL;
795 p = canonicalize_file_name(*i);
798 if (stat(path, &st) < 0)
799 return log_error_errno(errno, "Couldn't stat file: %m");
801 if (S_ISREG(st.st_mode) && (0111 & st.st_mode)) {
802 if (executable_is_script(path, &interpreter) > 0) {
803 _cleanup_free_ char *comm;
805 comm = strndup(basename(path), 15);
809 t = strappend("_COMM=", comm);
811 /* Append _EXE only if the interpreter is not a link.
812 Otherwise, it might be outdated often. */
813 if (lstat(interpreter, &st) == 0 &&
814 !S_ISLNK(st.st_mode)) {
815 t2 = strappend("_EXE=", interpreter);
820 t = strappend("_EXE=", path);
821 } else if (S_ISCHR(st.st_mode)) {
822 if (asprintf(&t, "_KERNEL_DEVICE=c%u:%u",
824 minor(st.st_rdev)) < 0)
826 } else if (S_ISBLK(st.st_mode)) {
827 if (asprintf(&t, "_KERNEL_DEVICE=b%u:%u",
829 minor(st.st_rdev)) < 0)
832 log_error("File is neither a device node, nor regular file, nor executable: %s", *i);
839 r = sd_journal_add_match(j, t, 0);
841 r = sd_journal_add_match(j, t2, 0);
845 r = sd_journal_add_match(j, *i, 0);
850 return log_error_errno(r, "Failed to add match '%s': %m", *i);
853 if (!strv_isempty(args) && !have_term) {
854 log_error("\"+\" can only be used between terms");
861 static int boot_id_cmp(const void *a, const void *b) {
864 _a = ((const boot_id_t *)a)->first;
865 _b = ((const boot_id_t *)b)->first;
867 return _a < _b ? -1 : (_a > _b ? 1 : 0);
870 static int get_boots(sd_journal *j,
873 boot_id_t *query_ref_boot) {
876 size_t length, allocated = 0;
882 r = sd_journal_query_unique(j, "_BOOT_ID");
887 SD_JOURNAL_FOREACH_UNIQUE(j, data, length) {
890 assert(startswith(data, "_BOOT_ID="));
892 if (!GREEDY_REALLOC(*boots, allocated, *count + 1))
895 id = *boots + *count;
897 r = sd_id128_from_string(((const char *)data) + strlen("_BOOT_ID="), &id->id);
901 r = sd_journal_add_match(j, data, length);
905 r = sd_journal_seek_head(j);
909 r = sd_journal_next(j);
915 r = sd_journal_get_realtime_usec(j, &id->first);
919 if (query_ref_boot) {
921 if (sd_id128_equal(id->id, query_ref_boot->id))
922 *query_ref_boot = *id;
924 r = sd_journal_seek_tail(j);
928 r = sd_journal_previous(j);
934 r = sd_journal_get_realtime_usec(j, &id->last);
941 sd_journal_flush_matches(j);
944 qsort_safe(*boots, *count, sizeof(boot_id_t), boot_id_cmp);
948 static int list_boots(sd_journal *j) {
952 _cleanup_free_ boot_id_t *all_ids = NULL;
956 r = get_boots(j, &all_ids, &count, NULL);
960 pager_open_if_enabled();
962 /* numbers are one less, but we need an extra char for the sign */
963 w = DECIMAL_STR_WIDTH(count - 1) + 1;
965 for (id = all_ids, i = 0; id < all_ids + count; id++, i++) {
966 char a[FORMAT_TIMESTAMP_MAX], b[FORMAT_TIMESTAMP_MAX];
968 printf("% *i " SD_ID128_FORMAT_STR " %s—%s\n",
970 SD_ID128_FORMAT_VAL(id->id),
971 format_timestamp_maybe_utc(a, sizeof(a), id->first),
972 format_timestamp_maybe_utc(b, sizeof(b), id->last));
978 static int get_boot_id_by_offset(sd_journal *j, sd_id128_t *boot_id, int offset) {
981 boot_id_t ref_boot_id = {}, *id;
982 _cleanup_free_ boot_id_t *all_ids = NULL;
987 ref_boot_id.id = *boot_id;
988 r = get_boots(j, &all_ids, &count, &ref_boot_id);
992 if (sd_id128_equal(*boot_id, SD_ID128_NULL)) {
993 if (offset > (int) count || offset <= -(int)count)
994 return -EADDRNOTAVAIL;
996 *boot_id = all_ids[(offset <= 0)*count + offset - 1].id;
998 id = bsearch(&ref_boot_id, all_ids, count, sizeof(boot_id_t), boot_id_cmp);
1001 offset <= 0 ? (id - all_ids) + offset < 0 :
1002 (id - all_ids) + offset >= (int) count)
1003 return -EADDRNOTAVAIL;
1005 *boot_id = (id + offset)->id;
1011 static int add_boot(sd_journal *j) {
1012 char match[9+32+1] = "_BOOT_ID=";
1020 if (arg_boot_offset == 0 && sd_id128_equal(arg_boot_id, SD_ID128_NULL))
1021 return add_match_this_boot(j, arg_machine);
1023 r = get_boot_id_by_offset(j, &arg_boot_id, arg_boot_offset);
1025 if (sd_id128_equal(arg_boot_id, SD_ID128_NULL))
1026 log_error_errno(r, "Failed to look up boot %+i: %m", arg_boot_offset);
1028 log_error("Failed to look up boot ID "SD_ID128_FORMAT_STR"%+i: %s",
1029 SD_ID128_FORMAT_VAL(arg_boot_id), arg_boot_offset, strerror(-r));
1033 sd_id128_to_string(arg_boot_id, match + 9);
1035 r = sd_journal_add_match(j, match, sizeof(match) - 1);
1037 return log_error_errno(r, "Failed to add match: %m");
1039 r = sd_journal_add_conjunction(j);
1046 static int add_dmesg(sd_journal *j) {
1053 r = sd_journal_add_match(j, "_TRANSPORT=kernel", strlen("_TRANSPORT=kernel"));
1055 return log_error_errno(r, "Failed to add match: %m");
1057 r = sd_journal_add_conjunction(j);
1064 static int get_possible_units(sd_journal *j,
1068 _cleanup_set_free_free_ Set *found;
1072 found = set_new(&string_hash_ops);
1076 NULSTR_FOREACH(field, fields) {
1080 r = sd_journal_query_unique(j, field);
1084 SD_JOURNAL_FOREACH_UNIQUE(j, data, size) {
1085 char **pattern, *eq;
1087 _cleanup_free_ char *u = NULL;
1089 eq = memchr(data, '=', size);
1091 prefix = eq - (char*) data + 1;
1095 u = strndup((char*) data + prefix, size - prefix);
1099 STRV_FOREACH(pattern, patterns)
1100 if (fnmatch(*pattern, u, FNM_NOESCAPE) == 0) {
1101 log_debug("Matched %s with pattern %s=%s", u, field, *pattern);
1103 r = set_consume(found, u);
1105 if (r < 0 && r != -EEXIST)
1118 /* This list is supposed to return the superset of unit names
1119 * possibly matched by rules added with add_matches_for_unit... */
1120 #define SYSTEM_UNITS \
1124 "OBJECT_SYSTEMD_UNIT\0" \
1127 /* ... and add_matches_for_user_unit */
1128 #define USER_UNITS \
1129 "_SYSTEMD_USER_UNIT\0" \
1131 "COREDUMP_USER_UNIT\0" \
1132 "OBJECT_SYSTEMD_USER_UNIT\0"
1134 static int add_units(sd_journal *j) {
1135 _cleanup_strv_free_ char **patterns = NULL;
1141 STRV_FOREACH(i, arg_system_units) {
1142 _cleanup_free_ char *u = NULL;
1144 u = unit_name_mangle(*i, MANGLE_GLOB);
1148 if (string_is_glob(u)) {
1149 r = strv_push(&patterns, u);
1154 r = add_matches_for_unit(j, u);
1157 r = sd_journal_add_disjunction(j);
1164 if (!strv_isempty(patterns)) {
1165 _cleanup_set_free_free_ Set *units = NULL;
1169 r = get_possible_units(j, SYSTEM_UNITS, patterns, &units);
1173 SET_FOREACH(u, units, it) {
1174 r = add_matches_for_unit(j, u);
1177 r = sd_journal_add_disjunction(j);
1184 strv_free(patterns);
1187 STRV_FOREACH(i, arg_user_units) {
1188 _cleanup_free_ char *u = NULL;
1190 u = unit_name_mangle(*i, MANGLE_GLOB);
1194 if (string_is_glob(u)) {
1195 r = strv_push(&patterns, u);
1200 r = add_matches_for_user_unit(j, u, getuid());
1203 r = sd_journal_add_disjunction(j);
1210 if (!strv_isempty(patterns)) {
1211 _cleanup_set_free_free_ Set *units = NULL;
1215 r = get_possible_units(j, USER_UNITS, patterns, &units);
1219 SET_FOREACH(u, units, it) {
1220 r = add_matches_for_user_unit(j, u, getuid());
1223 r = sd_journal_add_disjunction(j);
1230 /* Complain if the user request matches but nothing whatsoever was
1231 * found, since otherwise everything would be matched. */
1232 if (!(strv_isempty(arg_system_units) && strv_isempty(arg_user_units)) && count == 0)
1235 r = sd_journal_add_conjunction(j);
1242 static int add_priorities(sd_journal *j) {
1243 char match[] = "PRIORITY=0";
1247 if (arg_priorities == 0xFF)
1250 for (i = LOG_EMERG; i <= LOG_DEBUG; i++)
1251 if (arg_priorities & (1 << i)) {
1252 match[sizeof(match)-2] = '0' + i;
1254 r = sd_journal_add_match(j, match, strlen(match));
1256 return log_error_errno(r, "Failed to add match: %m");
1259 r = sd_journal_add_conjunction(j);
1267 static int add_syslog_identifier(sd_journal *j) {
1273 STRV_FOREACH(i, arg_syslog_identifier) {
1276 u = strappenda("SYSLOG_IDENTIFIER=", *i);
1277 r = sd_journal_add_match(j, u, 0);
1280 r = sd_journal_add_disjunction(j);
1285 r = sd_journal_add_conjunction(j);
1292 static int setup_keys(void) {
1294 size_t mpk_size, seed_size, state_size, i;
1295 uint8_t *mpk, *seed, *state;
1298 sd_id128_t machine, boot;
1299 char *p = NULL, *k = NULL;
1304 r = stat("/var/log/journal", &st);
1305 if (r < 0 && errno != ENOENT && errno != ENOTDIR)
1306 return log_error_errno(errno, "stat(\"%s\") failed: %m", "/var/log/journal");
1308 if (r < 0 || !S_ISDIR(st.st_mode)) {
1309 log_error("%s is not a directory, must be using persistent logging for FSS.",
1310 "/var/log/journal");
1311 return r < 0 ? -errno : -ENOTDIR;
1314 r = sd_id128_get_machine(&machine);
1316 return log_error_errno(r, "Failed to get machine ID: %m");
1318 r = sd_id128_get_boot(&boot);
1320 return log_error_errno(r, "Failed to get boot ID: %m");
1322 if (asprintf(&p, "/var/log/journal/" SD_ID128_FORMAT_STR "/fss",
1323 SD_ID128_FORMAT_VAL(machine)) < 0)
1326 if (access(p, F_OK) >= 0) {
1330 log_error_errno(errno, "unlink(\"%s\") failed: %m", p);
1335 log_error("Sealing key file %s exists already. (--force to recreate)", p);
1341 if (asprintf(&k, "/var/log/journal/" SD_ID128_FORMAT_STR "/fss.tmp.XXXXXX",
1342 SD_ID128_FORMAT_VAL(machine)) < 0) {
1347 mpk_size = FSPRG_mskinbytes(FSPRG_RECOMMENDED_SECPAR);
1348 mpk = alloca(mpk_size);
1350 seed_size = FSPRG_RECOMMENDED_SEEDLEN;
1351 seed = alloca(seed_size);
1353 state_size = FSPRG_stateinbytes(FSPRG_RECOMMENDED_SECPAR);
1354 state = alloca(state_size);
1356 fd = open("/dev/random", O_RDONLY|O_CLOEXEC|O_NOCTTY);
1358 log_error_errno(errno, "Failed to open /dev/random: %m");
1363 log_info("Generating seed...");
1364 l = loop_read(fd, seed, seed_size, true);
1365 if (l < 0 || (size_t) l != seed_size) {
1366 log_error_errno(EIO, "Failed to read random seed: %m");
1371 log_info("Generating key pair...");
1372 FSPRG_GenMK(NULL, mpk, seed, seed_size, FSPRG_RECOMMENDED_SECPAR);
1374 log_info("Generating sealing key...");
1375 FSPRG_GenState0(state, mpk, seed, seed_size);
1377 assert(arg_interval > 0);
1379 n = now(CLOCK_REALTIME);
1383 fd = mkostemp_safe(k, O_WRONLY|O_CLOEXEC);
1385 log_error_errno(errno, "Failed to open %s: %m", k);
1390 /* Enable secure remove, exclusion from dump, synchronous
1391 * writing and in-place updating */
1392 r = chattr_fd(fd, true, FS_SECRM_FL|FS_NODUMP_FL|FS_SYNC_FL|FS_NOCOW_FL);
1394 log_warning_errno(errno, "Failed to set file attributes: %m");
1397 memcpy(h.signature, "KSHHRHLP", 8);
1398 h.machine_id = machine;
1400 h.header_size = htole64(sizeof(h));
1401 h.start_usec = htole64(n * arg_interval);
1402 h.interval_usec = htole64(arg_interval);
1403 h.fsprg_secpar = htole16(FSPRG_RECOMMENDED_SECPAR);
1404 h.fsprg_state_size = htole64(state_size);
1406 r = loop_write(fd, &h, sizeof(h), false);
1408 log_error_errno(r, "Failed to write header: %m");
1412 r = loop_write(fd, state, state_size, false);
1414 log_error_errno(r, "Failed to write state: %m");
1418 if (link(k, p) < 0) {
1419 log_error_errno(errno, "Failed to link file: %m");
1427 "The new key pair has been generated. The " ANSI_HIGHLIGHT_ON "secret sealing key" ANSI_HIGHLIGHT_OFF " has been written to\n"
1428 "the following local file. This key file is automatically updated when the\n"
1429 "sealing key is advanced. It should not be used on multiple hosts.\n"
1433 "Please write down the following " ANSI_HIGHLIGHT_ON "secret verification key" ANSI_HIGHLIGHT_OFF ". It should be stored\n"
1434 "at a safe location and should not be saved locally on disk.\n"
1435 "\n\t" ANSI_HIGHLIGHT_RED_ON, p);
1438 for (i = 0; i < seed_size; i++) {
1439 if (i > 0 && i % 3 == 0)
1441 printf("%02x", ((uint8_t*) seed)[i]);
1444 printf("/%llx-%llx\n", (unsigned long long) n, (unsigned long long) arg_interval);
1447 char tsb[FORMAT_TIMESPAN_MAX], *hn;
1450 ANSI_HIGHLIGHT_OFF "\n"
1451 "The sealing key is automatically changed every %s.\n",
1452 format_timespan(tsb, sizeof(tsb), arg_interval, 0));
1454 hn = gethostname_malloc();
1457 hostname_cleanup(hn, false);
1458 fprintf(stderr, "\nThe keys have been generated for host %s/" SD_ID128_FORMAT_STR ".\n", hn, SD_ID128_FORMAT_VAL(machine));
1460 fprintf(stderr, "\nThe keys have been generated for host " SD_ID128_FORMAT_STR ".\n", SD_ID128_FORMAT_VAL(machine));
1462 #ifdef HAVE_QRENCODE
1463 /* If this is not an UTF-8 system don't print any QR codes */
1464 if (is_locale_utf8()) {
1465 fputs("\nTo transfer the verification key to your phone please scan the QR code below:\n\n", stderr);
1466 print_qr_code(stderr, seed, seed_size, n, arg_interval, hn, machine);
1486 log_error("Forward-secure sealing not available.");
1491 static int verify(sd_journal *j) {
1498 log_show_color(true);
1500 ORDERED_HASHMAP_FOREACH(f, j->files, i) {
1502 usec_t first, validated, last;
1505 if (!arg_verify_key && JOURNAL_HEADER_SEALED(f->header))
1506 log_notice("Journal file %s has sealing enabled but verification key has not been passed using --verify-key=.", f->path);
1509 k = journal_file_verify(f, arg_verify_key, &first, &validated, &last, true);
1511 /* If the key was invalid give up right-away. */
1514 log_warning("FAIL: %s (%s)", f->path, strerror(-k));
1517 char a[FORMAT_TIMESTAMP_MAX], b[FORMAT_TIMESTAMP_MAX], c[FORMAT_TIMESPAN_MAX];
1518 log_info("PASS: %s", f->path);
1520 if (arg_verify_key && JOURNAL_HEADER_SEALED(f->header)) {
1521 if (validated > 0) {
1522 log_info("=> Validated from %s to %s, final %s entries not sealed.",
1523 format_timestamp_maybe_utc(a, sizeof(a), first),
1524 format_timestamp_maybe_utc(b, sizeof(b), validated),
1525 format_timespan(c, sizeof(c), last > validated ? last - validated : 0, 0));
1526 } else if (last > 0)
1527 log_info("=> No sealing yet, %s of entries not sealed.",
1528 format_timespan(c, sizeof(c), last - first, 0));
1530 log_info("=> No sealing yet, no entries in file.");
1539 static int access_check_var_log_journal(sd_journal *j) {
1540 _cleanup_strv_free_ char **g = NULL;
1546 have_access = in_group("systemd-journal") > 0;
1549 /* Let's enumerate all groups from the default ACL of
1550 * the directory, which generally should allow access
1551 * to most journal files too */
1552 r = search_acl_groups(&g, "/var/log/journal/", &have_access);
1559 if (strv_isempty(g))
1560 log_notice("Hint: You are currently not seeing messages from other users and the system.\n"
1561 " Users in the 'systemd-journal' group can see all messages. Pass -q to\n"
1562 " turn off this notice.");
1564 _cleanup_free_ char *s = NULL;
1566 r = strv_extend(&g, "systemd-journal");
1573 s = strv_join(g, "', '");
1577 log_notice("Hint: You are currently not seeing messages from other users and the system.\n"
1578 " Users in the groups '%s' can see all messages.\n"
1579 " Pass -q to turn off this notice.", s);
1587 static int access_check(sd_journal *j) {
1594 if (set_isempty(j->errors)) {
1595 if (ordered_hashmap_isempty(j->files))
1596 log_notice("No journal files were found.");
1600 if (set_contains(j->errors, INT_TO_PTR(-EACCES))) {
1602 /* If /var/log/journal doesn't even exist,
1603 * unprivileged users have no access at all */
1604 if (access("/var/log/journal", F_OK) < 0 &&
1606 in_group("systemd-journal") <= 0) {
1607 log_error("Unprivileged users cannot access messages, unless persistent log storage is\n"
1608 "enabled. Users in the 'systemd-journal' group may always access messages.");
1612 /* If /var/log/journal exists, try to pring a nice
1613 notice if the user lacks access to it */
1614 if (!arg_quiet && geteuid() != 0) {
1615 r = access_check_var_log_journal(j);
1620 if (geteuid() != 0 && in_group("systemd-journal") <= 0) {
1621 log_error("Unprivileged users cannot access messages. Users in the 'systemd-journal' group\n"
1622 "group may access messages.");
1627 if (ordered_hashmap_isempty(j->files)) {
1628 log_error("No journal files were opened due to insufficient permissions.");
1633 SET_FOREACH(code, j->errors, it) {
1636 err = -PTR_TO_INT(code);
1640 log_warning_errno(err, "Error was encountered while opening journal files: %m");
1646 static int flush_to_var(void) {
1647 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
1648 _cleanup_bus_close_unref_ sd_bus *bus = NULL;
1649 _cleanup_close_ int watch_fd = -1;
1653 if (access("/run/systemd/journal/flushed", F_OK) >= 0)
1656 /* OK, let's actually do the full logic, send SIGUSR1 to the
1657 * daemon and set up inotify to wait for the flushed file to appear */
1658 r = bus_open_system_systemd(&bus);
1660 return log_error_errno(r, "Failed to get D-Bus connection: %m");
1662 r = sd_bus_call_method(
1664 "org.freedesktop.systemd1",
1665 "/org/freedesktop/systemd1",
1666 "org.freedesktop.systemd1.Manager",
1670 "ssi", "systemd-journald.service", "main", SIGUSR1);
1672 log_error("Failed to kill journal service: %s", bus_error_message(&error, r));
1676 mkdir_p("/run/systemd/journal", 0755);
1678 watch_fd = inotify_init1(IN_NONBLOCK|IN_CLOEXEC);
1680 return log_error_errno(errno, "Failed to create inotify watch: %m");
1682 r = inotify_add_watch(watch_fd, "/run/systemd/journal", IN_CREATE|IN_DONT_FOLLOW|IN_ONLYDIR);
1684 return log_error_errno(errno, "Failed to watch journal directory: %m");
1687 if (access("/run/systemd/journal/flushed", F_OK) >= 0)
1690 if (errno != ENOENT)
1691 return log_error_errno(errno, "Failed to check for existence of /run/systemd/journal/flushed: %m");
1693 r = fd_wait_for_event(watch_fd, POLLIN, USEC_INFINITY);
1695 return log_error_errno(r, "Failed to wait for event: %m");
1697 r = flush_fd(watch_fd);
1699 return log_error_errno(r, "Failed to flush inotify events: %m");
1705 int main(int argc, char *argv[]) {
1707 _cleanup_journal_close_ sd_journal *j = NULL;
1708 bool need_seek = false;
1709 sd_id128_t previous_boot_id;
1710 bool previous_boot_id_valid = false, first_line = true;
1712 bool ellipsized = false;
1714 setlocale(LC_ALL, "");
1715 log_parse_environment();
1718 r = parse_argv(argc, argv);
1722 signal(SIGWINCH, columns_lines_cache_reset);
1725 /* Increase max number of open files to 16K if we can, we
1726 * might needs this when browsing journal files, which might
1727 * be split up into many files. */
1728 setrlimit_closest(RLIMIT_NOFILE, &RLIMIT_MAKE_CONST(16384));
1730 if (arg_action == ACTION_NEW_ID128) {
1731 r = generate_new_id128();
1735 if (arg_action == ACTION_FLUSH) {
1740 if (arg_action == ACTION_SETUP_KEYS) {
1745 if (arg_action == ACTION_UPDATE_CATALOG ||
1746 arg_action == ACTION_LIST_CATALOG ||
1747 arg_action == ACTION_DUMP_CATALOG) {
1749 _cleanup_free_ char *database;
1751 database = path_join(arg_root, CATALOG_DATABASE, NULL);
1757 if (arg_action == ACTION_UPDATE_CATALOG) {
1758 r = catalog_update(database, arg_root, catalog_file_dirs);
1760 log_error_errno(r, "Failed to list catalog: %m");
1762 bool oneline = arg_action == ACTION_LIST_CATALOG;
1765 r = catalog_list_items(stdout, database,
1766 oneline, argv + optind);
1768 r = catalog_list(stdout, database, oneline);
1770 log_error_errno(r, "Failed to list catalog: %m");
1777 r = sd_journal_open_directory(&j, arg_directory, arg_journal_type);
1779 r = sd_journal_open_files(&j, (const char**) arg_file, 0);
1780 else if (arg_machine)
1781 r = sd_journal_open_container(&j, arg_machine, 0);
1783 r = sd_journal_open(&j, !arg_merge*SD_JOURNAL_LOCAL_ONLY + arg_journal_type);
1785 log_error_errno(r, "Failed to open %s: %m",
1786 arg_directory ? arg_directory : arg_file ? "files" : "journal");
1787 return EXIT_FAILURE;
1790 r = access_check(j);
1792 return EXIT_FAILURE;
1794 if (arg_action == ACTION_VERIFY) {
1799 if (arg_action == ACTION_PRINT_HEADER) {
1800 journal_print_header(j);
1801 return EXIT_SUCCESS;
1804 if (arg_action == ACTION_DISK_USAGE) {
1806 char sbytes[FORMAT_BYTES_MAX];
1808 r = sd_journal_get_usage(j, &bytes);
1810 return EXIT_FAILURE;
1812 printf("Archived and active journals take up %s on disk.\n",
1813 format_bytes(sbytes, sizeof(sbytes), bytes));
1814 return EXIT_SUCCESS;
1817 if (arg_action == ACTION_VACUUM) {
1821 HASHMAP_FOREACH(d, j->directories_by_path, i) {
1827 q = journal_directory_vacuum(d->path, arg_vacuum_size, arg_vacuum_time, NULL, true);
1829 log_error_errno(q, "Failed to vacuum: %m");
1834 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
1837 if (arg_action == ACTION_LIST_BOOTS) {
1842 /* add_boot() must be called first!
1843 * It may need to seek the journal to find parent boot IDs. */
1846 return EXIT_FAILURE;
1850 return EXIT_FAILURE;
1853 strv_free(arg_system_units);
1854 strv_free(arg_user_units);
1857 log_error_errno(r, "Failed to add filter for units: %m");
1858 return EXIT_FAILURE;
1861 r = add_syslog_identifier(j);
1863 log_error_errno(r, "Failed to add filter for syslog identifiers: %m");
1864 return EXIT_FAILURE;
1867 r = add_priorities(j);
1869 log_error_errno(r, "Failed to add filter for priorities: %m");
1870 return EXIT_FAILURE;
1873 r = add_matches(j, argv + optind);
1875 log_error_errno(r, "Failed to add filters: %m");
1876 return EXIT_FAILURE;
1879 if (_unlikely_(log_get_max_level() >= LOG_DEBUG)) {
1880 _cleanup_free_ char *filter;
1882 filter = journal_make_match_string(j);
1883 log_debug("Journal filter: %s", filter);
1890 r = sd_journal_set_data_threshold(j, 0);
1892 log_error("Failed to unset data size threshold");
1893 return EXIT_FAILURE;
1896 r = sd_journal_query_unique(j, arg_field);
1898 log_error_errno(r, "Failed to query unique data objects: %m");
1899 return EXIT_FAILURE;
1902 SD_JOURNAL_FOREACH_UNIQUE(j, data, size) {
1905 if (arg_lines >= 0 && n_shown >= arg_lines)
1908 eq = memchr(data, '=', size);
1910 printf("%.*s\n", (int) (size - ((const uint8_t*) eq - (const uint8_t*) data + 1)), (const char*) eq + 1);
1912 printf("%.*s\n", (int) size, (const char*) data);
1917 return EXIT_SUCCESS;
1920 /* Opening the fd now means the first sd_journal_wait() will actually wait */
1922 r = sd_journal_get_fd(j);
1924 return EXIT_FAILURE;
1927 if (arg_cursor || arg_after_cursor) {
1928 r = sd_journal_seek_cursor(j, arg_cursor ?: arg_after_cursor);
1930 log_error_errno(r, "Failed to seek to cursor: %m");
1931 return EXIT_FAILURE;
1934 r = sd_journal_next_skip(j, 1 + !!arg_after_cursor);
1936 r = sd_journal_previous_skip(j, 1 + !!arg_after_cursor);
1938 if (arg_after_cursor && r < 2) {
1939 /* We couldn't find the next entry after the cursor. */
1946 } else if (arg_since_set && !arg_reverse) {
1947 r = sd_journal_seek_realtime_usec(j, arg_since);
1949 log_error_errno(r, "Failed to seek to date: %m");
1950 return EXIT_FAILURE;
1952 r = sd_journal_next(j);
1954 } else if (arg_until_set && arg_reverse) {
1955 r = sd_journal_seek_realtime_usec(j, arg_until);
1957 log_error_errno(r, "Failed to seek to date: %m");
1958 return EXIT_FAILURE;
1960 r = sd_journal_previous(j);
1962 } else if (arg_lines >= 0) {
1963 r = sd_journal_seek_tail(j);
1965 log_error_errno(r, "Failed to seek to tail: %m");
1966 return EXIT_FAILURE;
1969 r = sd_journal_previous_skip(j, arg_lines);
1971 } else if (arg_reverse) {
1972 r = sd_journal_seek_tail(j);
1974 log_error_errno(r, "Failed to seek to tail: %m");
1975 return EXIT_FAILURE;
1978 r = sd_journal_previous(j);
1981 r = sd_journal_seek_head(j);
1983 log_error_errno(r, "Failed to seek to head: %m");
1984 return EXIT_FAILURE;
1987 r = sd_journal_next(j);
1991 log_error_errno(r, "Failed to iterate through journal: %m");
1992 return EXIT_FAILURE;
1996 pager_open_if_enabled();
2000 char start_buf[FORMAT_TIMESTAMP_MAX], end_buf[FORMAT_TIMESTAMP_MAX];
2002 r = sd_journal_get_cutoff_realtime_usec(j, &start, &end);
2004 log_error_errno(r, "Failed to get cutoff: %m");
2010 printf("-- Logs begin at %s. --\n",
2011 format_timestamp_maybe_utc(start_buf, sizeof(start_buf), start));
2013 printf("-- Logs begin at %s, end at %s. --\n",
2014 format_timestamp_maybe_utc(start_buf, sizeof(start_buf), start),
2015 format_timestamp_maybe_utc(end_buf, sizeof(end_buf), end));
2020 while (arg_lines < 0 || n_shown < arg_lines || (arg_follow && !first_line)) {
2025 r = sd_journal_next(j);
2027 r = sd_journal_previous(j);
2029 log_error_errno(r, "Failed to iterate through journal: %m");
2036 if (arg_until_set && !arg_reverse) {
2039 r = sd_journal_get_realtime_usec(j, &usec);
2041 log_error_errno(r, "Failed to determine timestamp: %m");
2044 if (usec > arg_until)
2048 if (arg_since_set && arg_reverse) {
2051 r = sd_journal_get_realtime_usec(j, &usec);
2053 log_error_errno(r, "Failed to determine timestamp: %m");
2056 if (usec < arg_since)
2060 if (!arg_merge && !arg_quiet) {
2063 r = sd_journal_get_monotonic_usec(j, NULL, &boot_id);
2065 if (previous_boot_id_valid &&
2066 !sd_id128_equal(boot_id, previous_boot_id))
2067 printf("%s-- Reboot --%s\n",
2068 ansi_highlight(), ansi_highlight_off());
2070 previous_boot_id = boot_id;
2071 previous_boot_id_valid = true;
2076 arg_all * OUTPUT_SHOW_ALL |
2077 arg_full * OUTPUT_FULL_WIDTH |
2078 on_tty() * OUTPUT_COLOR |
2079 arg_catalog * OUTPUT_CATALOG |
2080 arg_utc * OUTPUT_UTC;
2082 r = output_journal(stdout, j, arg_output, 0, flags, &ellipsized);
2084 if (r == -EADDRNOTAVAIL)
2086 else if (r < 0 || ferror(stdout))
2093 if (arg_show_cursor) {
2094 _cleanup_free_ char *cursor = NULL;
2096 r = sd_journal_get_cursor(j, &cursor);
2097 if (r < 0 && r != -EADDRNOTAVAIL)
2098 log_error_errno(r, "Failed to get cursor: %m");
2100 printf("-- cursor: %s\n", cursor);
2106 r = sd_journal_wait(j, (uint64_t) -1);
2108 log_error_errno(r, "Couldn't wait for journal event: %m");
2118 strv_free(arg_file);
2120 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;