1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2011 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
35 #include <sys/ioctl.h>
43 #include "systemd/sd-journal.h"
46 #include "logs-show.h"
48 #include "path-util.h"
54 #include "journal-internal.h"
55 #include "journal-def.h"
56 #include "journal-verify.h"
57 #include "journal-authenticate.h"
58 #include "journal-qrcode.h"
60 #include "unit-name.h"
63 #define DEFAULT_FSS_INTERVAL_USEC (15*USEC_PER_MINUTE)
65 static OutputMode arg_output = OUTPUT_SHORT;
66 static bool arg_utc = false;
67 static bool arg_pager_end = false;
68 static bool arg_follow = false;
69 static bool arg_full = true;
70 static bool arg_all = false;
71 static bool arg_no_pager = false;
72 static int arg_lines = -2;
73 static bool arg_no_tail = false;
74 static bool arg_quiet = false;
75 static bool arg_merge = false;
76 static bool arg_boot = false;
77 static sd_id128_t arg_boot_id = {};
78 static int arg_boot_offset = 0;
79 static bool arg_dmesg = false;
80 static const char *arg_cursor = NULL;
81 static const char *arg_after_cursor = NULL;
82 static bool arg_show_cursor = false;
83 static const char *arg_directory = NULL;
84 static char **arg_file = NULL;
85 static int arg_priorities = 0xFF;
86 static const char *arg_verify_key = NULL;
88 static usec_t arg_interval = DEFAULT_FSS_INTERVAL_USEC;
89 static bool arg_force = false;
91 static usec_t arg_since, arg_until;
92 static bool arg_since_set = false, arg_until_set = false;
93 static char **arg_syslog_identifier = NULL;
94 static char **arg_system_units = NULL;
95 static char **arg_user_units = NULL;
96 static const char *arg_field = NULL;
97 static bool arg_catalog = false;
98 static bool arg_reverse = false;
99 static int arg_journal_type = 0;
100 static const char *arg_root = NULL;
101 static const char *arg_machine = NULL;
112 ACTION_UPDATE_CATALOG,
114 } arg_action = ACTION_SHOW;
116 typedef struct boot_id_t {
122 static void pager_open_if_enabled(void) {
127 pager_open(arg_pager_end);
130 static char *format_timestamp_maybe_utc(char *buf, size_t l, usec_t t) {
133 return format_timestamp_utc(buf, l, t);
135 return format_timestamp(buf, l, t);
138 static int parse_boot_descriptor(const char *x, sd_id128_t *boot_id, int *offset) {
139 sd_id128_t id = SD_ID128_NULL;
142 if (strlen(x) >= 32) {
146 r = sd_id128_from_string(t, &id);
150 if (*x != '-' && *x != '+' && *x != 0)
154 r = safe_atoi(x, &off);
159 r = safe_atoi(x, &off);
173 static void help(void) {
175 pager_open_if_enabled();
177 printf("%s [OPTIONS...] [MATCHES...]\n\n"
178 "Query the journal.\n\n"
180 " --system Show the system journal\n"
181 " --user Show the user journal for the current user\n"
182 " -M --machine=CONTAINER Operate on local container\n"
183 " --since=DATE Start showing entries on or newer than the specified date\n"
184 " --until=DATE Stop showing entries on or older than the specified date\n"
185 " -c --cursor=CURSOR Start showing entries from the specified cursor\n"
186 " --after-cursor=CURSOR Start showing entries from after the specified cursor\n"
187 " --show-cursor Print the cursor after all the entries\n"
188 " -b --boot[=ID] Show data only from ID or, if unspecified, the current boot\n"
189 " --list-boots Show terse information about recorded boots\n"
190 " -k --dmesg Show kernel message log from the current boot\n"
191 " -u --unit=UNIT Show data only from the specified unit\n"
192 " --user-unit=UNIT Show data only from the specified user session unit\n"
193 " -t --identifier=STRING Show only messages with the specified syslog identifier\n"
194 " -p --priority=RANGE Show only messages within the specified priority range\n"
195 " -e --pager-end Immediately jump to end of the journal in the pager\n"
196 " -f --follow Follow the journal\n"
197 " -n --lines[=INTEGER] Number of journal entries to show\n"
198 " --no-tail Show all lines, even in follow mode\n"
199 " -r --reverse Show the newest entries first\n"
200 " -o --output=STRING Change journal output mode (short, short-iso,\n"
201 " short-precise, short-monotonic, verbose,\n"
202 " export, json, json-pretty, json-sse, cat)\n"
203 " --utc Express time in Coordinated Universal Time (UTC)\n"
204 " -x --catalog Add message explanations where available\n"
205 " --no-full Ellipsize fields\n"
206 " -a --all Show all fields, including long and unprintable\n"
207 " -q --quiet Do not show privilege warning\n"
208 " --no-pager Do not pipe output into a pager\n"
209 " -m --merge Show entries from all available journals\n"
210 " -D --directory=PATH Show journal files from directory\n"
211 " --file=PATH Show journal file\n"
212 " --root=ROOT Operate on catalog files underneath the root ROOT\n"
214 " --interval=TIME Time interval for changing the FSS sealing key\n"
215 " --verify-key=KEY Specify FSS verification key\n"
216 " --force Force overriding of the FSS key pair with --setup-keys\n"
219 " -h --help Show this help text\n"
220 " --version Show package version\n"
221 " --new-id128 Generate a new 128-bit ID\n"
222 " --header Show journal header information\n"
223 " --disk-usage Show total disk usage of all journal files\n"
224 " -F --field=FIELD List all values that a specified field takes\n"
225 " --list-catalog Show message IDs of all entries in the message catalog\n"
226 " --dump-catalog Show entries in the message catalog\n"
227 " --update-catalog Update the message catalog database\n"
229 " --setup-keys Generate a new FSS key pair\n"
230 " --verify Verify journal file consistency\n"
232 , program_invocation_short_name);
235 static int parse_argv(int argc, char *argv[]) {
266 static const struct option options[] = {
267 { "help", no_argument, NULL, 'h' },
268 { "version" , no_argument, NULL, ARG_VERSION },
269 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
270 { "pager-end", no_argument, NULL, 'e' },
271 { "follow", no_argument, NULL, 'f' },
272 { "force", no_argument, NULL, ARG_FORCE },
273 { "output", required_argument, NULL, 'o' },
274 { "all", no_argument, NULL, 'a' },
275 { "full", no_argument, NULL, 'l' },
276 { "no-full", no_argument, NULL, ARG_NO_FULL },
277 { "lines", optional_argument, NULL, 'n' },
278 { "no-tail", no_argument, NULL, ARG_NO_TAIL },
279 { "new-id128", no_argument, NULL, ARG_NEW_ID128 },
280 { "quiet", no_argument, NULL, 'q' },
281 { "merge", no_argument, NULL, 'm' },
282 { "boot", optional_argument, NULL, 'b' },
283 { "list-boots", no_argument, NULL, ARG_LIST_BOOTS },
284 { "this-boot", optional_argument, NULL, 'b' }, /* deprecated */
285 { "dmesg", no_argument, NULL, 'k' },
286 { "system", no_argument, NULL, ARG_SYSTEM },
287 { "user", no_argument, NULL, ARG_USER },
288 { "directory", required_argument, NULL, 'D' },
289 { "file", required_argument, NULL, ARG_FILE },
290 { "root", required_argument, NULL, ARG_ROOT },
291 { "header", no_argument, NULL, ARG_HEADER },
292 { "identifier", required_argument, NULL, 't' },
293 { "priority", required_argument, NULL, 'p' },
294 { "setup-keys", no_argument, NULL, ARG_SETUP_KEYS },
295 { "interval", required_argument, NULL, ARG_INTERVAL },
296 { "verify", no_argument, NULL, ARG_VERIFY },
297 { "verify-key", required_argument, NULL, ARG_VERIFY_KEY },
298 { "disk-usage", no_argument, NULL, ARG_DISK_USAGE },
299 { "cursor", required_argument, NULL, 'c' },
300 { "after-cursor", required_argument, NULL, ARG_AFTER_CURSOR },
301 { "show-cursor", no_argument, NULL, ARG_SHOW_CURSOR },
302 { "since", required_argument, NULL, ARG_SINCE },
303 { "until", required_argument, NULL, ARG_UNTIL },
304 { "unit", required_argument, NULL, 'u' },
305 { "user-unit", required_argument, NULL, ARG_USER_UNIT },
306 { "field", required_argument, NULL, 'F' },
307 { "catalog", no_argument, NULL, 'x' },
308 { "list-catalog", no_argument, NULL, ARG_LIST_CATALOG },
309 { "dump-catalog", no_argument, NULL, ARG_DUMP_CATALOG },
310 { "update-catalog", no_argument, NULL, ARG_UPDATE_CATALOG },
311 { "reverse", no_argument, NULL, 'r' },
312 { "machine", required_argument, NULL, 'M' },
313 { "utc", no_argument, NULL, ARG_UTC },
322 while ((c = getopt_long(argc, argv, "hefo:aln::qmb::kD:p:c:t:u:F:xrM:", options, NULL)) >= 0)
331 puts(PACKAGE_STRING);
332 puts(SYSTEMD_FEATURES);
340 arg_pager_end = true;
352 arg_output = output_mode_from_string(optarg);
353 if (arg_output < 0) {
354 log_error("Unknown output format '%s'.", optarg);
358 if (arg_output == OUTPUT_EXPORT ||
359 arg_output == OUTPUT_JSON ||
360 arg_output == OUTPUT_JSON_PRETTY ||
361 arg_output == OUTPUT_JSON_SSE ||
362 arg_output == OUTPUT_CAT)
381 if (streq(optarg, "all"))
384 r = safe_atoi(optarg, &arg_lines);
385 if (r < 0 || arg_lines < 0) {
386 log_error("Failed to parse lines '%s'", optarg);
393 /* Hmm, no argument? Maybe the next
394 * word on the command line is
395 * supposed to be the argument? Let's
396 * see if there is one, and is
400 if (streq(argv[optind], "all")) {
403 } else if (safe_atoi(argv[optind], &n) >= 0 && n >= 0) {
417 arg_action = ACTION_NEW_ID128;
432 r = parse_boot_descriptor(optarg, &arg_boot_id, &arg_boot_offset);
434 log_error("Failed to parse boot descriptor '%s'", optarg);
439 /* Hmm, no argument? Maybe the next
440 * word on the command line is
441 * supposed to be the argument? Let's
442 * see if there is one and is parsable
443 * as a boot descriptor... */
446 parse_boot_descriptor(argv[optind], &arg_boot_id, &arg_boot_offset) >= 0)
453 arg_action = ACTION_LIST_BOOTS;
457 arg_boot = arg_dmesg = true;
461 arg_journal_type |= SD_JOURNAL_SYSTEM;
465 arg_journal_type |= SD_JOURNAL_CURRENT_USER;
469 arg_machine = optarg;
473 arg_directory = optarg;
477 r = glob_extend(&arg_file, optarg);
479 log_error("Failed to add paths: %s", strerror(-r));
492 case ARG_AFTER_CURSOR:
493 arg_after_cursor = optarg;
496 case ARG_SHOW_CURSOR:
497 arg_show_cursor = true;
501 arg_action = ACTION_PRINT_HEADER;
505 arg_action = ACTION_VERIFY;
509 arg_action = ACTION_DISK_USAGE;
518 arg_action = ACTION_SETUP_KEYS;
523 arg_action = ACTION_VERIFY;
524 arg_verify_key = optarg;
529 r = parse_sec(optarg, &arg_interval);
530 if (r < 0 || arg_interval <= 0) {
531 log_error("Failed to parse sealing key change interval: %s", optarg);
540 log_error("Forward-secure sealing not available.");
547 dots = strstr(optarg, "..");
553 a = strndup(optarg, dots - optarg);
557 from = log_level_from_string(a);
558 to = log_level_from_string(dots + 2);
561 if (from < 0 || to < 0) {
562 log_error("Failed to parse log level range %s", optarg);
569 for (i = from; i <= to; i++)
570 arg_priorities |= 1 << i;
572 for (i = to; i <= from; i++)
573 arg_priorities |= 1 << i;
579 p = log_level_from_string(optarg);
581 log_error("Unknown log level %s", optarg);
587 for (i = 0; i <= p; i++)
588 arg_priorities |= 1 << i;
595 r = parse_timestamp(optarg, &arg_since);
597 log_error("Failed to parse timestamp: %s", optarg);
600 arg_since_set = true;
604 r = parse_timestamp(optarg, &arg_until);
606 log_error("Failed to parse timestamp: %s", optarg);
609 arg_until_set = true;
613 r = strv_extend(&arg_syslog_identifier, optarg);
619 r = strv_extend(&arg_system_units, optarg);
625 r = strv_extend(&arg_user_units, optarg);
638 case ARG_LIST_CATALOG:
639 arg_action = ACTION_LIST_CATALOG;
642 case ARG_DUMP_CATALOG:
643 arg_action = ACTION_DUMP_CATALOG;
646 case ARG_UPDATE_CATALOG:
647 arg_action = ACTION_UPDATE_CATALOG;
662 assert_not_reached("Unhandled option");
665 if (arg_follow && !arg_no_tail && arg_lines < -1)
668 if (!!arg_directory + !!arg_file + !!arg_machine > 1) {
669 log_error("Please specify either -D/--directory= or --file= or -M/--machine=, not more than one.");
673 if (arg_since_set && arg_until_set && arg_since > arg_until) {
674 log_error("--since= must be before --until=.");
678 if (!!arg_cursor + !!arg_after_cursor + !!arg_since_set > 1) {
679 log_error("Please specify only one of --since=, --cursor=, and --after-cursor.");
683 if (arg_follow && arg_reverse) {
684 log_error("Please specify either --reverse= or --follow=, not both.");
688 if (arg_action != ACTION_SHOW && optind < argc) {
689 log_error("Extraneous arguments starting with '%s'", argv[optind]);
696 static int generate_new_id128(void) {
701 r = sd_id128_randomize(&id);
703 log_error("Failed to generate ID: %s", strerror(-r));
707 printf("As string:\n"
708 SD_ID128_FORMAT_STR "\n\n"
710 "%02x%02x%02x%02x-%02x%02x-%02x%02x-%02x%02x-%02x%02x%02x%02x%02x%02x\n\n"
712 "#define MESSAGE_XYZ SD_ID128_MAKE(",
713 SD_ID128_FORMAT_VAL(id),
714 SD_ID128_FORMAT_VAL(id));
715 for (i = 0; i < 16; i++)
716 printf("%02x%s", id.bytes[i], i != 15 ? "," : "");
717 fputs(")\n\n", stdout);
719 printf("As Python constant:\n"
721 ">>> MESSAGE_XYZ = uuid.UUID('" SD_ID128_FORMAT_STR "')\n",
722 SD_ID128_FORMAT_VAL(id));
727 static int add_matches(sd_journal *j, char **args) {
729 bool have_term = false;
733 STRV_FOREACH(i, args) {
736 if (streq(*i, "+")) {
739 r = sd_journal_add_disjunction(j);
742 } else if (path_is_absolute(*i)) {
743 _cleanup_free_ char *p, *t = NULL, *t2 = NULL;
745 _cleanup_free_ char *interpreter = NULL;
748 p = canonicalize_file_name(*i);
751 if (stat(path, &st) < 0) {
752 log_error("Couldn't stat file: %m");
756 if (S_ISREG(st.st_mode) && (0111 & st.st_mode)) {
757 if (executable_is_script(path, &interpreter) > 0) {
758 _cleanup_free_ char *comm;
760 comm = strndup(basename(path), 15);
764 t = strappend("_COMM=", comm);
766 /* Append _EXE only if the interpreter is not a link.
767 Otherwise, it might be outdated often. */
768 if (lstat(interpreter, &st) == 0 &&
769 !S_ISLNK(st.st_mode)) {
770 t2 = strappend("_EXE=", interpreter);
775 t = strappend("_EXE=", path);
776 } else if (S_ISCHR(st.st_mode)) {
777 if (asprintf(&t, "_KERNEL_DEVICE=c%u:%u",
779 minor(st.st_rdev)) < 0)
781 } else if (S_ISBLK(st.st_mode)) {
782 if (asprintf(&t, "_KERNEL_DEVICE=b%u:%u",
784 minor(st.st_rdev)) < 0)
787 log_error("File is neither a device node, nor regular file, nor executable: %s", *i);
794 r = sd_journal_add_match(j, t, 0);
796 r = sd_journal_add_match(j, t2, 0);
800 r = sd_journal_add_match(j, *i, 0);
805 log_error("Failed to add match '%s': %s", *i, strerror(-r));
810 if (!strv_isempty(args) && !have_term) {
811 log_error("\"+\" can only be used between terms");
818 static int boot_id_cmp(const void *a, const void *b) {
821 _a = ((const boot_id_t *)a)->first;
822 _b = ((const boot_id_t *)b)->first;
824 return _a < _b ? -1 : (_a > _b ? 1 : 0);
827 static int list_boots(sd_journal *j) {
830 unsigned int count = 0;
832 size_t length, allocated = 0;
834 _cleanup_free_ boot_id_t *all_ids = NULL;
836 r = sd_journal_query_unique(j, "_BOOT_ID");
840 pager_open_if_enabled();
842 SD_JOURNAL_FOREACH_UNIQUE(j, data, length) {
843 assert(startswith(data, "_BOOT_ID="));
845 if (!GREEDY_REALLOC(all_ids, allocated, count + 1))
848 id = &all_ids[count];
850 r = sd_id128_from_string(((const char *)data) + strlen("_BOOT_ID="), &id->id);
854 r = sd_journal_add_match(j, data, length);
858 r = sd_journal_seek_head(j);
862 r = sd_journal_next(j);
868 r = sd_journal_get_realtime_usec(j, &id->first);
872 r = sd_journal_seek_tail(j);
876 r = sd_journal_previous(j);
882 r = sd_journal_get_realtime_usec(j, &id->last);
888 sd_journal_flush_matches(j);
891 qsort_safe(all_ids, count, sizeof(boot_id_t), boot_id_cmp);
893 /* numbers are one less, but we need an extra char for the sign */
894 w = DECIMAL_STR_WIDTH(count - 1) + 1;
896 for (id = all_ids, i = 0; id < all_ids + count; id++, i++) {
897 char a[FORMAT_TIMESTAMP_MAX], b[FORMAT_TIMESTAMP_MAX];
899 printf("% *i " SD_ID128_FORMAT_STR " %s—%s\n",
901 SD_ID128_FORMAT_VAL(id->id),
902 format_timestamp_maybe_utc(a, sizeof(a), id->first),
903 format_timestamp_maybe_utc(b, sizeof(b), id->last));
909 static int get_relative_boot_id(sd_journal *j, sd_id128_t *boot_id, int relative) {
912 unsigned int count = 0;
913 size_t length, allocated = 0;
914 boot_id_t ref_boot_id = {SD_ID128_NULL}, *id;
915 _cleanup_free_ boot_id_t *all_ids = NULL;
920 r = sd_journal_query_unique(j, "_BOOT_ID");
924 SD_JOURNAL_FOREACH_UNIQUE(j, data, length) {
925 if (length < strlen("_BOOT_ID="))
928 if (!GREEDY_REALLOC(all_ids, allocated, count + 1))
931 id = &all_ids[count];
933 r = sd_id128_from_string(((const char *)data) + strlen("_BOOT_ID="), &id->id);
937 r = sd_journal_add_match(j, data, length);
941 r = sd_journal_seek_head(j);
945 r = sd_journal_next(j);
951 r = sd_journal_get_realtime_usec(j, &id->first);
955 if (sd_id128_equal(id->id, *boot_id))
960 sd_journal_flush_matches(j);
963 qsort_safe(all_ids, count, sizeof(boot_id_t), boot_id_cmp);
965 if (sd_id128_equal(*boot_id, SD_ID128_NULL)) {
966 if (relative > (int) count || relative <= -(int)count)
967 return -EADDRNOTAVAIL;
969 *boot_id = all_ids[(relative <= 0)*count + relative - 1].id;
971 id = bsearch(&ref_boot_id, all_ids, count, sizeof(boot_id_t), boot_id_cmp);
974 relative <= 0 ? (id - all_ids) + relative < 0 :
975 (id - all_ids) + relative >= (int) count)
976 return -EADDRNOTAVAIL;
978 *boot_id = (id + relative)->id;
984 static int add_boot(sd_journal *j) {
985 char match[9+32+1] = "_BOOT_ID=";
993 if (arg_boot_offset == 0 && sd_id128_equal(arg_boot_id, SD_ID128_NULL))
994 return add_match_this_boot(j, arg_machine);
996 r = get_relative_boot_id(j, &arg_boot_id, arg_boot_offset);
998 if (sd_id128_equal(arg_boot_id, SD_ID128_NULL))
999 log_error("Failed to look up boot %+i: %s", arg_boot_offset, strerror(-r));
1001 log_error("Failed to look up boot ID "SD_ID128_FORMAT_STR"%+i: %s",
1002 SD_ID128_FORMAT_VAL(arg_boot_id), arg_boot_offset, strerror(-r));
1006 sd_id128_to_string(arg_boot_id, match + 9);
1008 r = sd_journal_add_match(j, match, sizeof(match) - 1);
1010 log_error("Failed to add match: %s", strerror(-r));
1014 r = sd_journal_add_conjunction(j);
1021 static int add_dmesg(sd_journal *j) {
1028 r = sd_journal_add_match(j, "_TRANSPORT=kernel", strlen("_TRANSPORT=kernel"));
1030 log_error("Failed to add match: %s", strerror(-r));
1034 r = sd_journal_add_conjunction(j);
1041 static int get_possible_units(sd_journal *j,
1045 _cleanup_set_free_free_ Set *found;
1049 found = set_new(&string_hash_ops);
1053 NULSTR_FOREACH(field, fields) {
1057 r = sd_journal_query_unique(j, field);
1061 SD_JOURNAL_FOREACH_UNIQUE(j, data, size) {
1062 char **pattern, *eq;
1064 _cleanup_free_ char *u = NULL;
1066 eq = memchr(data, '=', size);
1068 prefix = eq - (char*) data + 1;
1072 u = strndup((char*) data + prefix, size - prefix);
1076 STRV_FOREACH(pattern, patterns)
1077 if (fnmatch(*pattern, u, FNM_NOESCAPE) == 0) {
1078 log_debug("Matched %s with pattern %s=%s", u, field, *pattern);
1080 r = set_consume(found, u);
1082 if (r < 0 && r != -EEXIST)
1095 /* This list is supposed to return the superset of unit names
1096 * possibly matched by rules added with add_matches_for_unit... */
1097 #define SYSTEM_UNITS \
1101 "OBJECT_SYSTEMD_UNIT\0" \
1104 /* ... and add_matches_for_user_unit */
1105 #define USER_UNITS \
1106 "_SYSTEMD_USER_UNIT\0" \
1108 "COREDUMP_USER_UNIT\0" \
1109 "OBJECT_SYSTEMD_USER_UNIT\0"
1111 static int add_units(sd_journal *j) {
1112 _cleanup_strv_free_ char **patterns = NULL;
1118 STRV_FOREACH(i, arg_system_units) {
1119 _cleanup_free_ char *u = NULL;
1121 u = unit_name_mangle(*i, MANGLE_GLOB);
1125 if (string_is_glob(u)) {
1126 r = strv_push(&patterns, u);
1131 r = add_matches_for_unit(j, u);
1134 r = sd_journal_add_disjunction(j);
1141 if (!strv_isempty(patterns)) {
1142 _cleanup_set_free_free_ Set *units = NULL;
1146 r = get_possible_units(j, SYSTEM_UNITS, patterns, &units);
1150 SET_FOREACH(u, units, it) {
1151 r = add_matches_for_unit(j, u);
1154 r = sd_journal_add_disjunction(j);
1161 strv_free(patterns);
1164 STRV_FOREACH(i, arg_user_units) {
1165 _cleanup_free_ char *u = NULL;
1167 u = unit_name_mangle(*i, MANGLE_GLOB);
1171 if (string_is_glob(u)) {
1172 r = strv_push(&patterns, u);
1177 r = add_matches_for_user_unit(j, u, getuid());
1180 r = sd_journal_add_disjunction(j);
1187 if (!strv_isempty(patterns)) {
1188 _cleanup_set_free_free_ Set *units = NULL;
1192 r = get_possible_units(j, USER_UNITS, patterns, &units);
1196 SET_FOREACH(u, units, it) {
1197 r = add_matches_for_user_unit(j, u, getuid());
1200 r = sd_journal_add_disjunction(j);
1207 /* Complain if the user request matches but nothing whatsoever was
1208 * found, since otherwise everything would be matched. */
1209 if (!(strv_isempty(arg_system_units) && strv_isempty(arg_user_units)) && count == 0)
1212 r = sd_journal_add_conjunction(j);
1219 static int add_priorities(sd_journal *j) {
1220 char match[] = "PRIORITY=0";
1224 if (arg_priorities == 0xFF)
1227 for (i = LOG_EMERG; i <= LOG_DEBUG; i++)
1228 if (arg_priorities & (1 << i)) {
1229 match[sizeof(match)-2] = '0' + i;
1231 r = sd_journal_add_match(j, match, strlen(match));
1233 log_error("Failed to add match: %s", strerror(-r));
1238 r = sd_journal_add_conjunction(j);
1246 static int add_syslog_identifier(sd_journal *j) {
1252 STRV_FOREACH(i, arg_syslog_identifier) {
1255 u = strappenda("SYSLOG_IDENTIFIER=", *i);
1256 r = sd_journal_add_match(j, u, 0);
1259 r = sd_journal_add_disjunction(j);
1264 r = sd_journal_add_conjunction(j);
1271 static int setup_keys(void) {
1273 size_t mpk_size, seed_size, state_size, i;
1274 uint8_t *mpk, *seed, *state;
1276 int fd = -1, r, attr = 0;
1277 sd_id128_t machine, boot;
1278 char *p = NULL, *k = NULL;
1283 r = stat("/var/log/journal", &st);
1284 if (r < 0 && errno != ENOENT && errno != ENOTDIR) {
1285 log_error("stat(\"%s\") failed: %m", "/var/log/journal");
1289 if (r < 0 || !S_ISDIR(st.st_mode)) {
1290 log_error("%s is not a directory, must be using persistent logging for FSS.",
1291 "/var/log/journal");
1292 return r < 0 ? -errno : -ENOTDIR;
1295 r = sd_id128_get_machine(&machine);
1297 log_error("Failed to get machine ID: %s", strerror(-r));
1301 r = sd_id128_get_boot(&boot);
1303 log_error("Failed to get boot ID: %s", strerror(-r));
1307 if (asprintf(&p, "/var/log/journal/" SD_ID128_FORMAT_STR "/fss",
1308 SD_ID128_FORMAT_VAL(machine)) < 0)
1311 if (access(p, F_OK) >= 0) {
1315 log_error("unlink(\"%s\") failed: %m", p);
1320 log_error("Sealing key file %s exists already. (--force to recreate)", p);
1326 if (asprintf(&k, "/var/log/journal/" SD_ID128_FORMAT_STR "/fss.tmp.XXXXXX",
1327 SD_ID128_FORMAT_VAL(machine)) < 0) {
1332 mpk_size = FSPRG_mskinbytes(FSPRG_RECOMMENDED_SECPAR);
1333 mpk = alloca(mpk_size);
1335 seed_size = FSPRG_RECOMMENDED_SEEDLEN;
1336 seed = alloca(seed_size);
1338 state_size = FSPRG_stateinbytes(FSPRG_RECOMMENDED_SECPAR);
1339 state = alloca(state_size);
1341 fd = open("/dev/random", O_RDONLY|O_CLOEXEC|O_NOCTTY);
1343 log_error("Failed to open /dev/random: %m");
1348 log_info("Generating seed...");
1349 l = loop_read(fd, seed, seed_size, true);
1350 if (l < 0 || (size_t) l != seed_size) {
1351 log_error("Failed to read random seed: %s", strerror(EIO));
1356 log_info("Generating key pair...");
1357 FSPRG_GenMK(NULL, mpk, seed, seed_size, FSPRG_RECOMMENDED_SECPAR);
1359 log_info("Generating sealing key...");
1360 FSPRG_GenState0(state, mpk, seed, seed_size);
1362 assert(arg_interval > 0);
1364 n = now(CLOCK_REALTIME);
1368 fd = mkostemp_safe(k, O_WRONLY|O_CLOEXEC);
1370 log_error("Failed to open %s: %m", k);
1375 /* Enable secure remove, exclusion from dump, synchronous
1376 * writing and in-place updating */
1377 if (ioctl(fd, FS_IOC_GETFLAGS, &attr) < 0)
1378 log_warning("FS_IOC_GETFLAGS failed: %m");
1380 attr |= FS_SECRM_FL|FS_NODUMP_FL|FS_SYNC_FL|FS_NOCOW_FL;
1382 if (ioctl(fd, FS_IOC_SETFLAGS, &attr) < 0)
1383 log_warning("FS_IOC_SETFLAGS failed: %m");
1386 memcpy(h.signature, "KSHHRHLP", 8);
1387 h.machine_id = machine;
1389 h.header_size = htole64(sizeof(h));
1390 h.start_usec = htole64(n * arg_interval);
1391 h.interval_usec = htole64(arg_interval);
1392 h.fsprg_secpar = htole16(FSPRG_RECOMMENDED_SECPAR);
1393 h.fsprg_state_size = htole64(state_size);
1395 l = loop_write(fd, &h, sizeof(h), false);
1396 if (l < 0 || (size_t) l != sizeof(h)) {
1397 log_error("Failed to write header: %s", strerror(EIO));
1402 l = loop_write(fd, state, state_size, false);
1403 if (l < 0 || (size_t) l != state_size) {
1404 log_error("Failed to write state: %s", strerror(EIO));
1409 if (link(k, p) < 0) {
1410 log_error("Failed to link file: %m");
1418 "The new key pair has been generated. The " ANSI_HIGHLIGHT_ON "secret sealing key" ANSI_HIGHLIGHT_OFF " has been written to\n"
1419 "the following local file. This key file is automatically updated when the\n"
1420 "sealing key is advanced. It should not be used on multiple hosts.\n"
1424 "Please write down the following " ANSI_HIGHLIGHT_ON "secret verification key" ANSI_HIGHLIGHT_OFF ". It should be stored\n"
1425 "at a safe location and should not be saved locally on disk.\n"
1426 "\n\t" ANSI_HIGHLIGHT_RED_ON, p);
1429 for (i = 0; i < seed_size; i++) {
1430 if (i > 0 && i % 3 == 0)
1432 printf("%02x", ((uint8_t*) seed)[i]);
1435 printf("/%llx-%llx\n", (unsigned long long) n, (unsigned long long) arg_interval);
1438 char tsb[FORMAT_TIMESPAN_MAX], *hn;
1441 ANSI_HIGHLIGHT_OFF "\n"
1442 "The sealing key is automatically changed every %s.\n",
1443 format_timespan(tsb, sizeof(tsb), arg_interval, 0));
1445 hn = gethostname_malloc();
1448 hostname_cleanup(hn, false);
1449 fprintf(stderr, "\nThe keys have been generated for host %s/" SD_ID128_FORMAT_STR ".\n", hn, SD_ID128_FORMAT_VAL(machine));
1451 fprintf(stderr, "\nThe keys have been generated for host " SD_ID128_FORMAT_STR ".\n", SD_ID128_FORMAT_VAL(machine));
1453 #ifdef HAVE_QRENCODE
1454 /* If this is not an UTF-8 system don't print any QR codes */
1455 if (is_locale_utf8()) {
1456 fputs("\nTo transfer the verification key to your phone please scan the QR code below:\n\n", stderr);
1457 print_qr_code(stderr, seed, seed_size, n, arg_interval, hn, machine);
1477 log_error("Forward-secure sealing not available.");
1482 static int verify(sd_journal *j) {
1489 log_show_color(true);
1491 HASHMAP_FOREACH(f, j->files, i) {
1493 usec_t first, validated, last;
1496 if (!arg_verify_key && JOURNAL_HEADER_SEALED(f->header))
1497 log_notice("Journal file %s has sealing enabled but verification key has not been passed using --verify-key=.", f->path);
1500 k = journal_file_verify(f, arg_verify_key, &first, &validated, &last, true);
1502 /* If the key was invalid give up right-away. */
1505 log_warning("FAIL: %s (%s)", f->path, strerror(-k));
1508 char a[FORMAT_TIMESTAMP_MAX], b[FORMAT_TIMESTAMP_MAX], c[FORMAT_TIMESPAN_MAX];
1509 log_info("PASS: %s", f->path);
1511 if (arg_verify_key && JOURNAL_HEADER_SEALED(f->header)) {
1512 if (validated > 0) {
1513 log_info("=> Validated from %s to %s, final %s entries not sealed.",
1514 format_timestamp_maybe_utc(a, sizeof(a), first),
1515 format_timestamp_maybe_utc(b, sizeof(b), validated),
1516 format_timespan(c, sizeof(c), last > validated ? last - validated : 0, 0));
1517 } else if (last > 0)
1518 log_info("=> No sealing yet, %s of entries not sealed.",
1519 format_timespan(c, sizeof(c), last - first, 0));
1521 log_info("=> No sealing yet, no entries in file.");
1530 static int access_check_var_log_journal(sd_journal *j) {
1531 _cleanup_strv_free_ char **g = NULL;
1537 have_access = in_group("systemd-journal") > 0;
1540 /* Let's enumerate all groups from the default ACL of
1541 * the directory, which generally should allow access
1542 * to most journal files too */
1543 r = search_acl_groups(&g, "/var/log/journal/", &have_access);
1550 if (strv_isempty(g))
1551 log_notice("Hint: You are currently not seeing messages from other users and the system.\n"
1552 " Users in the 'systemd-journal' group can see all messages. Pass -q to\n"
1553 " turn off this notice.");
1555 _cleanup_free_ char *s = NULL;
1557 r = strv_extend(&g, "systemd-journal");
1564 s = strv_join(g, "', '");
1568 log_notice("Hint: You are currently not seeing messages from other users and the system.\n"
1569 " Users in the groups '%s' can see all messages.\n"
1570 " Pass -q to turn off this notice.", s);
1578 static int access_check(sd_journal *j) {
1585 if (set_isempty(j->errors)) {
1586 if (hashmap_isempty(j->files))
1587 log_notice("No journal files were found.");
1591 if (set_contains(j->errors, INT_TO_PTR(-EACCES))) {
1593 /* If /var/log/journal doesn't even exist,
1594 * unprivileged users have no access at all */
1595 if (access("/var/log/journal", F_OK) < 0 &&
1597 in_group("systemd-journal") <= 0) {
1598 log_error("Unprivileged users cannot access messages, unless persistent log storage is\n"
1599 "enabled. Users in the 'systemd-journal' group may always access messages.");
1603 /* If /var/log/journal exists, try to pring a nice
1604 notice if the user lacks access to it */
1605 if (!arg_quiet && geteuid() != 0) {
1606 r = access_check_var_log_journal(j);
1611 if (geteuid() != 0 && in_group("systemd-journal") <= 0) {
1612 log_error("Unprivileged users cannot access messages. Users in the 'systemd-journal' group\n"
1613 "group may access messages.");
1618 if (hashmap_isempty(j->files)) {
1619 log_error("No journal files were opened due to insufficient permissions.");
1624 SET_FOREACH(code, j->errors, it) {
1627 err = -PTR_TO_INT(code);
1631 log_warning("Error was encountered while opening journal files: %s",
1638 int main(int argc, char *argv[]) {
1640 _cleanup_journal_close_ sd_journal *j = NULL;
1641 bool need_seek = false;
1642 sd_id128_t previous_boot_id;
1643 bool previous_boot_id_valid = false, first_line = true;
1645 bool ellipsized = false;
1647 setlocale(LC_ALL, "");
1648 log_parse_environment();
1651 r = parse_argv(argc, argv);
1655 signal(SIGWINCH, columns_lines_cache_reset);
1657 if (arg_action == ACTION_NEW_ID128) {
1658 r = generate_new_id128();
1662 if (arg_action == ACTION_SETUP_KEYS) {
1667 if (arg_action == ACTION_UPDATE_CATALOG ||
1668 arg_action == ACTION_LIST_CATALOG ||
1669 arg_action == ACTION_DUMP_CATALOG) {
1671 _cleanup_free_ char *database;
1673 database = path_join(arg_root, CATALOG_DATABASE, NULL);
1679 if (arg_action == ACTION_UPDATE_CATALOG) {
1680 r = catalog_update(database, arg_root, catalog_file_dirs);
1682 log_error("Failed to list catalog: %s", strerror(-r));
1684 bool oneline = arg_action == ACTION_LIST_CATALOG;
1687 r = catalog_list_items(stdout, database,
1688 oneline, argv + optind);
1690 r = catalog_list(stdout, database, oneline);
1692 log_error("Failed to list catalog: %s", strerror(-r));
1699 r = sd_journal_open_directory(&j, arg_directory, arg_journal_type);
1701 r = sd_journal_open_files(&j, (const char**) arg_file, 0);
1702 else if (arg_machine)
1703 r = sd_journal_open_container(&j, arg_machine, 0);
1705 r = sd_journal_open(&j, !arg_merge*SD_JOURNAL_LOCAL_ONLY + arg_journal_type);
1707 log_error("Failed to open %s: %s",
1708 arg_directory ? arg_directory : arg_file ? "files" : "journal",
1710 return EXIT_FAILURE;
1713 r = access_check(j);
1715 return EXIT_FAILURE;
1717 if (arg_action == ACTION_VERIFY) {
1722 if (arg_action == ACTION_PRINT_HEADER) {
1723 journal_print_header(j);
1724 return EXIT_SUCCESS;
1727 if (arg_action == ACTION_DISK_USAGE) {
1729 char sbytes[FORMAT_BYTES_MAX];
1731 r = sd_journal_get_usage(j, &bytes);
1733 return EXIT_FAILURE;
1735 printf("Journals take up %s on disk.\n",
1736 format_bytes(sbytes, sizeof(sbytes), bytes));
1737 return EXIT_SUCCESS;
1740 if (arg_action == ACTION_LIST_BOOTS) {
1745 /* add_boot() must be called first!
1746 * It may need to seek the journal to find parent boot IDs. */
1749 return EXIT_FAILURE;
1753 return EXIT_FAILURE;
1756 strv_free(arg_system_units);
1757 strv_free(arg_user_units);
1760 log_error("Failed to add filter for units: %s", strerror(-r));
1761 return EXIT_FAILURE;
1764 r = add_syslog_identifier(j);
1766 log_error("Failed to add filter for syslog identifiers: %s", strerror(-r));
1767 return EXIT_FAILURE;
1770 r = add_priorities(j);
1772 log_error("Failed to add filter for priorities: %s", strerror(-r));
1773 return EXIT_FAILURE;
1776 r = add_matches(j, argv + optind);
1778 log_error("Failed to add filters: %s", strerror(-r));
1779 return EXIT_FAILURE;
1782 if (_unlikely_(log_get_max_level() >= LOG_PRI(LOG_DEBUG))) {
1783 _cleanup_free_ char *filter;
1785 filter = journal_make_match_string(j);
1786 log_debug("Journal filter: %s", filter);
1793 r = sd_journal_set_data_threshold(j, 0);
1795 log_error("Failed to unset data size threshold");
1796 return EXIT_FAILURE;
1799 r = sd_journal_query_unique(j, arg_field);
1801 log_error("Failed to query unique data objects: %s", strerror(-r));
1802 return EXIT_FAILURE;
1805 SD_JOURNAL_FOREACH_UNIQUE(j, data, size) {
1808 if (arg_lines >= 0 && n_shown >= arg_lines)
1811 eq = memchr(data, '=', size);
1813 printf("%.*s\n", (int) (size - ((const uint8_t*) eq - (const uint8_t*) data + 1)), (const char*) eq + 1);
1815 printf("%.*s\n", (int) size, (const char*) data);
1820 return EXIT_SUCCESS;
1823 /* Opening the fd now means the first sd_journal_wait() will actually wait */
1825 r = sd_journal_get_fd(j);
1827 return EXIT_FAILURE;
1830 if (arg_cursor || arg_after_cursor) {
1831 r = sd_journal_seek_cursor(j, arg_cursor ?: arg_after_cursor);
1833 log_error("Failed to seek to cursor: %s", strerror(-r));
1834 return EXIT_FAILURE;
1837 r = sd_journal_next_skip(j, 1 + !!arg_after_cursor);
1839 r = sd_journal_previous_skip(j, 1 + !!arg_after_cursor);
1841 if (arg_after_cursor && r < 2 && !arg_follow)
1842 /* We couldn't find the next entry after the cursor. */
1845 } else if (arg_since_set && !arg_reverse) {
1846 r = sd_journal_seek_realtime_usec(j, arg_since);
1848 log_error("Failed to seek to date: %s", strerror(-r));
1849 return EXIT_FAILURE;
1851 r = sd_journal_next(j);
1853 } else if (arg_until_set && arg_reverse) {
1854 r = sd_journal_seek_realtime_usec(j, arg_until);
1856 log_error("Failed to seek to date: %s", strerror(-r));
1857 return EXIT_FAILURE;
1859 r = sd_journal_previous(j);
1861 } else if (arg_lines >= 0) {
1862 r = sd_journal_seek_tail(j);
1864 log_error("Failed to seek to tail: %s", strerror(-r));
1865 return EXIT_FAILURE;
1868 r = sd_journal_previous_skip(j, arg_lines);
1870 } else if (arg_reverse) {
1871 r = sd_journal_seek_tail(j);
1873 log_error("Failed to seek to tail: %s", strerror(-r));
1874 return EXIT_FAILURE;
1877 r = sd_journal_previous(j);
1880 r = sd_journal_seek_head(j);
1882 log_error("Failed to seek to head: %s", strerror(-r));
1883 return EXIT_FAILURE;
1886 r = sd_journal_next(j);
1890 log_error("Failed to iterate through journal: %s", strerror(-r));
1891 return EXIT_FAILURE;
1895 pager_open_if_enabled();
1899 char start_buf[FORMAT_TIMESTAMP_MAX], end_buf[FORMAT_TIMESTAMP_MAX];
1901 r = sd_journal_get_cutoff_realtime_usec(j, &start, &end);
1903 log_error("Failed to get cutoff: %s", strerror(-r));
1909 printf("-- Logs begin at %s. --\n",
1910 format_timestamp_maybe_utc(start_buf, sizeof(start_buf), start));
1912 printf("-- Logs begin at %s, end at %s. --\n",
1913 format_timestamp_maybe_utc(start_buf, sizeof(start_buf), start),
1914 format_timestamp_maybe_utc(end_buf, sizeof(end_buf), end));
1919 while (arg_lines < 0 || n_shown < arg_lines || (arg_follow && !first_line)) {
1924 r = sd_journal_next(j);
1926 r = sd_journal_previous(j);
1928 log_error("Failed to iterate through journal: %s", strerror(-r));
1935 if (arg_until_set && !arg_reverse) {
1938 r = sd_journal_get_realtime_usec(j, &usec);
1940 log_error("Failed to determine timestamp: %s", strerror(-r));
1943 if (usec > arg_until)
1947 if (arg_since_set && arg_reverse) {
1950 r = sd_journal_get_realtime_usec(j, &usec);
1952 log_error("Failed to determine timestamp: %s", strerror(-r));
1955 if (usec < arg_since)
1959 if (!arg_merge && !arg_quiet) {
1962 r = sd_journal_get_monotonic_usec(j, NULL, &boot_id);
1964 if (previous_boot_id_valid &&
1965 !sd_id128_equal(boot_id, previous_boot_id))
1966 printf("%s-- Reboot --%s\n",
1967 ansi_highlight(), ansi_highlight_off());
1969 previous_boot_id = boot_id;
1970 previous_boot_id_valid = true;
1975 arg_all * OUTPUT_SHOW_ALL |
1976 arg_full * OUTPUT_FULL_WIDTH |
1977 on_tty() * OUTPUT_COLOR |
1978 arg_catalog * OUTPUT_CATALOG |
1979 arg_utc * OUTPUT_UTC;
1981 r = output_journal(stdout, j, arg_output, 0, flags, &ellipsized);
1983 if (r == -EADDRNOTAVAIL)
1985 else if (r < 0 || ferror(stdout))
1992 if (arg_show_cursor) {
1993 _cleanup_free_ char *cursor = NULL;
1995 r = sd_journal_get_cursor(j, &cursor);
1996 if (r < 0 && r != -EADDRNOTAVAIL)
1997 log_error("Failed to get cursor: %s", strerror(-r));
1999 printf("-- cursor: %s\n", cursor);
2005 r = sd_journal_wait(j, (uint64_t) -1);
2007 log_error("Couldn't wait for journal event: %s", strerror(-r));
2017 strv_free(arg_file);
2019 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;