chiark / gitweb /
time: functions named "internal" really shouldn't be exported
[elogind.git] / src / journal / journalctl.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3 /***
4   This file is part of systemd.
5
6   Copyright 2011 Lennart Poettering
7
8   systemd is free software; you can redistribute it and/or modify it
9   under the terms of the GNU Lesser General Public License as published by
10   the Free Software Foundation; either version 2.1 of the License, or
11   (at your option) any later version.
12
13   systemd is distributed in the hope that it will be useful, but
14   WITHOUT ANY WARRANTY; without even the implied warranty of
15   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16   Lesser General Public License for more details.
17
18   You should have received a copy of the GNU Lesser General Public License
19   along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <locale.h>
23 #include <fcntl.h>
24 #include <fnmatch.h>
25 #include <errno.h>
26 #include <stddef.h>
27 #include <string.h>
28 #include <stdio.h>
29 #include <unistd.h>
30 #include <stdlib.h>
31 #include <time.h>
32 #include <getopt.h>
33 #include <signal.h>
34 #include <sys/stat.h>
35 #include <sys/ioctl.h>
36 #include <linux/fs.h>
37
38 #ifdef HAVE_ACL
39 #include <sys/acl.h>
40 #include "acl-util.h"
41 #endif
42
43 #include "systemd/sd-journal.h"
44
45 #include "log.h"
46 #include "logs-show.h"
47 #include "util.h"
48 #include "path-util.h"
49 #include "fileio.h"
50 #include "build.h"
51 #include "pager.h"
52 #include "strv.h"
53 #include "set.h"
54 #include "journal-internal.h"
55 #include "journal-def.h"
56 #include "journal-verify.h"
57 #include "journal-authenticate.h"
58 #include "journal-qrcode.h"
59 #include "fsprg.h"
60 #include "unit-name.h"
61 #include "catalog.h"
62
63 #define DEFAULT_FSS_INTERVAL_USEC (15*USEC_PER_MINUTE)
64
65 static OutputMode arg_output = OUTPUT_SHORT;
66 static bool arg_utc = false;
67 static bool arg_pager_end = false;
68 static bool arg_follow = false;
69 static bool arg_full = true;
70 static bool arg_all = false;
71 static bool arg_no_pager = false;
72 static int arg_lines = -2;
73 static bool arg_no_tail = false;
74 static bool arg_quiet = false;
75 static bool arg_merge = false;
76 static bool arg_boot = false;
77 static sd_id128_t arg_boot_id = {};
78 static int arg_boot_offset = 0;
79 static bool arg_dmesg = false;
80 static const char *arg_cursor = NULL;
81 static const char *arg_after_cursor = NULL;
82 static bool arg_show_cursor = false;
83 static const char *arg_directory = NULL;
84 static char **arg_file = NULL;
85 static int arg_priorities = 0xFF;
86 static const char *arg_verify_key = NULL;
87 #ifdef HAVE_GCRYPT
88 static usec_t arg_interval = DEFAULT_FSS_INTERVAL_USEC;
89 static bool arg_force = false;
90 #endif
91 static usec_t arg_since, arg_until;
92 static bool arg_since_set = false, arg_until_set = false;
93 static char **arg_syslog_identifier = NULL;
94 static char **arg_system_units = NULL;
95 static char **arg_user_units = NULL;
96 static const char *arg_field = NULL;
97 static bool arg_catalog = false;
98 static bool arg_reverse = false;
99 static int arg_journal_type = 0;
100 static const char *arg_root = NULL;
101 static const char *arg_machine = NULL;
102
103 static enum {
104         ACTION_SHOW,
105         ACTION_NEW_ID128,
106         ACTION_PRINT_HEADER,
107         ACTION_SETUP_KEYS,
108         ACTION_VERIFY,
109         ACTION_DISK_USAGE,
110         ACTION_LIST_CATALOG,
111         ACTION_DUMP_CATALOG,
112         ACTION_UPDATE_CATALOG,
113         ACTION_LIST_BOOTS,
114 } arg_action = ACTION_SHOW;
115
116 typedef struct boot_id_t {
117         sd_id128_t id;
118         uint64_t first;
119         uint64_t last;
120 } boot_id_t;
121
122 static void pager_open_if_enabled(void) {
123
124         if (arg_no_pager)
125                 return;
126
127         pager_open(arg_pager_end);
128 }
129
130 static char *format_timestamp_maybe_utc(char *buf, size_t l, usec_t t) {
131
132         if (arg_utc)
133                 return format_timestamp_utc(buf, l, t);
134
135         return format_timestamp(buf, l, t);
136 }
137
138 static int parse_boot_descriptor(const char *x, sd_id128_t *boot_id, int *offset) {
139         sd_id128_t id = SD_ID128_NULL;
140         int off = 0, r;
141
142         if (strlen(x) >= 32) {
143                 char *t;
144
145                 t = strndupa(x, 32);
146                 r = sd_id128_from_string(t, &id);
147                 if (r >= 0)
148                         x += 32;
149
150                 if (*x != '-' && *x != '+' && *x != 0)
151                         return -EINVAL;
152
153                 if (*x != 0) {
154                         r = safe_atoi(x, &off);
155                         if (r < 0)
156                                 return r;
157                 }
158         } else {
159                 r = safe_atoi(x, &off);
160                 if (r < 0)
161                         return r;
162         }
163
164         if (boot_id)
165                 *boot_id = id;
166
167         if (offset)
168                 *offset = off;
169
170         return 0;
171 }
172
173 static void help(void) {
174
175         pager_open_if_enabled();
176
177         printf("%s [OPTIONS...] [MATCHES...]\n\n"
178                "Query the journal.\n\n"
179                "Flags:\n"
180                "     --system              Show the system journal\n"
181                "     --user                Show the user journal for the current user\n"
182                "  -M --machine=CONTAINER   Operate on local container\n"
183                "     --since=DATE          Start showing entries on or newer than the specified date\n"
184                "     --until=DATE          Stop showing entries on or older than the specified date\n"
185                "  -c --cursor=CURSOR       Start showing entries from the specified cursor\n"
186                "     --after-cursor=CURSOR Start showing entries from after the specified cursor\n"
187                "     --show-cursor         Print the cursor after all the entries\n"
188                "  -b --boot[=ID]           Show data only from ID or, if unspecified, the current boot\n"
189                "     --list-boots          Show terse information about recorded boots\n"
190                "  -k --dmesg               Show kernel message log from the current boot\n"
191                "  -u --unit=UNIT           Show data only from the specified unit\n"
192                "     --user-unit=UNIT      Show data only from the specified user session unit\n"
193                "  -t --identifier=STRING   Show only messages with the specified syslog identifier\n"
194                "  -p --priority=RANGE      Show only messages within the specified priority range\n"
195                "  -e --pager-end           Immediately jump to end of the journal in the pager\n"
196                "  -f --follow              Follow the journal\n"
197                "  -n --lines[=INTEGER]     Number of journal entries to show\n"
198                "     --no-tail             Show all lines, even in follow mode\n"
199                "  -r --reverse             Show the newest entries first\n"
200                "  -o --output=STRING       Change journal output mode (short, short-iso,\n"
201                "                                   short-precise, short-monotonic, verbose,\n"
202                "                                   export, json, json-pretty, json-sse, cat)\n"
203                "     --utc                 Express time in Coordinated Universal Time (UTC)\n"
204                "  -x --catalog             Add message explanations where available\n"
205                "     --no-full             Ellipsize fields\n"
206                "  -a --all                 Show all fields, including long and unprintable\n"
207                "  -q --quiet               Do not show privilege warning\n"
208                "     --no-pager            Do not pipe output into a pager\n"
209                "  -m --merge               Show entries from all available journals\n"
210                "  -D --directory=PATH      Show journal files from directory\n"
211                "     --file=PATH           Show journal file\n"
212                "     --root=ROOT           Operate on catalog files underneath the root ROOT\n"
213 #ifdef HAVE_GCRYPT
214                "     --interval=TIME       Time interval for changing the FSS sealing key\n"
215                "     --verify-key=KEY      Specify FSS verification key\n"
216                "     --force               Force overriding of the FSS key pair with --setup-keys\n"
217 #endif
218                "\nCommands:\n"
219                "  -h --help                Show this help text\n"
220                "     --version             Show package version\n"
221                "     --new-id128           Generate a new 128-bit ID\n"
222                "     --header              Show journal header information\n"
223                "     --disk-usage          Show total disk usage of all journal files\n"
224                "  -F --field=FIELD         List all values that a specified field takes\n"
225                "     --list-catalog        Show message IDs of all entries in the message catalog\n"
226                "     --dump-catalog        Show entries in the message catalog\n"
227                "     --update-catalog      Update the message catalog database\n"
228 #ifdef HAVE_GCRYPT
229                "     --setup-keys          Generate a new FSS key pair\n"
230                "     --verify              Verify journal file consistency\n"
231 #endif
232                , program_invocation_short_name);
233 }
234
235 static int parse_argv(int argc, char *argv[]) {
236
237         enum {
238                 ARG_VERSION = 0x100,
239                 ARG_NO_PAGER,
240                 ARG_NO_FULL,
241                 ARG_NO_TAIL,
242                 ARG_NEW_ID128,
243                 ARG_LIST_BOOTS,
244                 ARG_USER,
245                 ARG_SYSTEM,
246                 ARG_ROOT,
247                 ARG_HEADER,
248                 ARG_SETUP_KEYS,
249                 ARG_FILE,
250                 ARG_INTERVAL,
251                 ARG_VERIFY,
252                 ARG_VERIFY_KEY,
253                 ARG_DISK_USAGE,
254                 ARG_SINCE,
255                 ARG_UNTIL,
256                 ARG_AFTER_CURSOR,
257                 ARG_SHOW_CURSOR,
258                 ARG_USER_UNIT,
259                 ARG_LIST_CATALOG,
260                 ARG_DUMP_CATALOG,
261                 ARG_UPDATE_CATALOG,
262                 ARG_FORCE,
263                 ARG_UTC,
264         };
265
266         static const struct option options[] = {
267                 { "help",           no_argument,       NULL, 'h'                },
268                 { "version" ,       no_argument,       NULL, ARG_VERSION        },
269                 { "no-pager",       no_argument,       NULL, ARG_NO_PAGER       },
270                 { "pager-end",      no_argument,       NULL, 'e'                },
271                 { "follow",         no_argument,       NULL, 'f'                },
272                 { "force",          no_argument,       NULL, ARG_FORCE          },
273                 { "output",         required_argument, NULL, 'o'                },
274                 { "all",            no_argument,       NULL, 'a'                },
275                 { "full",           no_argument,       NULL, 'l'                },
276                 { "no-full",        no_argument,       NULL, ARG_NO_FULL        },
277                 { "lines",          optional_argument, NULL, 'n'                },
278                 { "no-tail",        no_argument,       NULL, ARG_NO_TAIL        },
279                 { "new-id128",      no_argument,       NULL, ARG_NEW_ID128      },
280                 { "quiet",          no_argument,       NULL, 'q'                },
281                 { "merge",          no_argument,       NULL, 'm'                },
282                 { "boot",           optional_argument, NULL, 'b'                },
283                 { "list-boots",     no_argument,       NULL, ARG_LIST_BOOTS     },
284                 { "this-boot",      optional_argument, NULL, 'b'                }, /* deprecated */
285                 { "dmesg",          no_argument,       NULL, 'k'                },
286                 { "system",         no_argument,       NULL, ARG_SYSTEM         },
287                 { "user",           no_argument,       NULL, ARG_USER           },
288                 { "directory",      required_argument, NULL, 'D'                },
289                 { "file",           required_argument, NULL, ARG_FILE           },
290                 { "root",           required_argument, NULL, ARG_ROOT           },
291                 { "header",         no_argument,       NULL, ARG_HEADER         },
292                 { "identifier",     required_argument, NULL, 't'                },
293                 { "priority",       required_argument, NULL, 'p'                },
294                 { "setup-keys",     no_argument,       NULL, ARG_SETUP_KEYS     },
295                 { "interval",       required_argument, NULL, ARG_INTERVAL       },
296                 { "verify",         no_argument,       NULL, ARG_VERIFY         },
297                 { "verify-key",     required_argument, NULL, ARG_VERIFY_KEY     },
298                 { "disk-usage",     no_argument,       NULL, ARG_DISK_USAGE     },
299                 { "cursor",         required_argument, NULL, 'c'                },
300                 { "after-cursor",   required_argument, NULL, ARG_AFTER_CURSOR   },
301                 { "show-cursor",    no_argument,       NULL, ARG_SHOW_CURSOR    },
302                 { "since",          required_argument, NULL, ARG_SINCE          },
303                 { "until",          required_argument, NULL, ARG_UNTIL          },
304                 { "unit",           required_argument, NULL, 'u'                },
305                 { "user-unit",      required_argument, NULL, ARG_USER_UNIT      },
306                 { "field",          required_argument, NULL, 'F'                },
307                 { "catalog",        no_argument,       NULL, 'x'                },
308                 { "list-catalog",   no_argument,       NULL, ARG_LIST_CATALOG   },
309                 { "dump-catalog",   no_argument,       NULL, ARG_DUMP_CATALOG   },
310                 { "update-catalog", no_argument,       NULL, ARG_UPDATE_CATALOG },
311                 { "reverse",        no_argument,       NULL, 'r'                },
312                 { "machine",        required_argument, NULL, 'M'                },
313                 { "utc",            no_argument,       NULL, ARG_UTC            },
314                 {}
315         };
316
317         int c, r;
318
319         assert(argc >= 0);
320         assert(argv);
321
322         while ((c = getopt_long(argc, argv, "hefo:aln::qmb::kD:p:c:t:u:F:xrM:", options, NULL)) >= 0)
323
324                 switch (c) {
325
326                 case 'h':
327                         help();
328                         return 0;
329
330                 case ARG_VERSION:
331                         puts(PACKAGE_STRING);
332                         puts(SYSTEMD_FEATURES);
333                         return 0;
334
335                 case ARG_NO_PAGER:
336                         arg_no_pager = true;
337                         break;
338
339                 case 'e':
340                         arg_pager_end = true;
341
342                         if (arg_lines < -1)
343                                 arg_lines = 1000;
344
345                         break;
346
347                 case 'f':
348                         arg_follow = true;
349                         break;
350
351                 case 'o':
352                         arg_output = output_mode_from_string(optarg);
353                         if (arg_output < 0) {
354                                 log_error("Unknown output format '%s'.", optarg);
355                                 return -EINVAL;
356                         }
357
358                         if (arg_output == OUTPUT_EXPORT ||
359                             arg_output == OUTPUT_JSON ||
360                             arg_output == OUTPUT_JSON_PRETTY ||
361                             arg_output == OUTPUT_JSON_SSE ||
362                             arg_output == OUTPUT_CAT)
363                                 arg_quiet = true;
364
365                         break;
366
367                 case 'l':
368                         arg_full = true;
369                         break;
370
371                 case ARG_NO_FULL:
372                         arg_full = false;
373                         break;
374
375                 case 'a':
376                         arg_all = true;
377                         break;
378
379                 case 'n':
380                         if (optarg) {
381                                 if (streq(optarg, "all"))
382                                         arg_lines = -1;
383                                 else {
384                                         r = safe_atoi(optarg, &arg_lines);
385                                         if (r < 0 || arg_lines < 0) {
386                                                 log_error("Failed to parse lines '%s'", optarg);
387                                                 return -EINVAL;
388                                         }
389                                 }
390                         } else {
391                                 arg_lines = 10;
392
393                                 /* Hmm, no argument? Maybe the next
394                                  * word on the command line is
395                                  * supposed to be the argument? Let's
396                                  * see if there is one, and is
397                                  * parsable. */
398                                 if (optind < argc) {
399                                         int n;
400                                         if (streq(argv[optind], "all")) {
401                                                 arg_lines = -1;
402                                                 optind++;
403                                         } else if (safe_atoi(argv[optind], &n) >= 0 && n >= 0) {
404                                                 arg_lines = n;
405                                                 optind++;
406                                         }
407                                 }
408                         }
409
410                         break;
411
412                 case ARG_NO_TAIL:
413                         arg_no_tail = true;
414                         break;
415
416                 case ARG_NEW_ID128:
417                         arg_action = ACTION_NEW_ID128;
418                         break;
419
420                 case 'q':
421                         arg_quiet = true;
422                         break;
423
424                 case 'm':
425                         arg_merge = true;
426                         break;
427
428                 case 'b':
429                         arg_boot = true;
430
431                         if (optarg) {
432                                 r =  parse_boot_descriptor(optarg, &arg_boot_id, &arg_boot_offset);
433                                 if (r < 0) {
434                                         log_error("Failed to parse boot descriptor '%s'", optarg);
435                                         return -EINVAL;
436                                 }
437                         } else {
438
439                                 /* Hmm, no argument? Maybe the next
440                                  * word on the command line is
441                                  * supposed to be the argument? Let's
442                                  * see if there is one and is parsable
443                                  * as a boot descriptor... */
444
445                                 if (optind < argc &&
446                                     parse_boot_descriptor(argv[optind], &arg_boot_id, &arg_boot_offset) >= 0)
447                                         optind++;
448                         }
449
450                         break;
451
452                 case ARG_LIST_BOOTS:
453                         arg_action = ACTION_LIST_BOOTS;
454                         break;
455
456                 case 'k':
457                         arg_boot = arg_dmesg = true;
458                         break;
459
460                 case ARG_SYSTEM:
461                         arg_journal_type |= SD_JOURNAL_SYSTEM;
462                         break;
463
464                 case ARG_USER:
465                         arg_journal_type |= SD_JOURNAL_CURRENT_USER;
466                         break;
467
468                 case 'M':
469                         arg_machine = optarg;
470                         break;
471
472                 case 'D':
473                         arg_directory = optarg;
474                         break;
475
476                 case ARG_FILE:
477                         r = glob_extend(&arg_file, optarg);
478                         if (r < 0) {
479                                 log_error("Failed to add paths: %s", strerror(-r));
480                                 return r;
481                         };
482                         break;
483
484                 case ARG_ROOT:
485                         arg_root = optarg;
486                         break;
487
488                 case 'c':
489                         arg_cursor = optarg;
490                         break;
491
492                 case ARG_AFTER_CURSOR:
493                         arg_after_cursor = optarg;
494                         break;
495
496                 case ARG_SHOW_CURSOR:
497                         arg_show_cursor = true;
498                         break;
499
500                 case ARG_HEADER:
501                         arg_action = ACTION_PRINT_HEADER;
502                         break;
503
504                 case ARG_VERIFY:
505                         arg_action = ACTION_VERIFY;
506                         break;
507
508                 case ARG_DISK_USAGE:
509                         arg_action = ACTION_DISK_USAGE;
510                         break;
511
512 #ifdef HAVE_GCRYPT
513                 case ARG_FORCE:
514                         arg_force = true;
515                         break;
516
517                 case ARG_SETUP_KEYS:
518                         arg_action = ACTION_SETUP_KEYS;
519                         break;
520
521
522                 case ARG_VERIFY_KEY:
523                         arg_action = ACTION_VERIFY;
524                         arg_verify_key = optarg;
525                         arg_merge = false;
526                         break;
527
528                 case ARG_INTERVAL:
529                         r = parse_sec(optarg, &arg_interval);
530                         if (r < 0 || arg_interval <= 0) {
531                                 log_error("Failed to parse sealing key change interval: %s", optarg);
532                                 return -EINVAL;
533                         }
534                         break;
535 #else
536                 case ARG_SETUP_KEYS:
537                 case ARG_VERIFY_KEY:
538                 case ARG_INTERVAL:
539                 case ARG_FORCE:
540                         log_error("Forward-secure sealing not available.");
541                         return -ENOTSUP;
542 #endif
543
544                 case 'p': {
545                         const char *dots;
546
547                         dots = strstr(optarg, "..");
548                         if (dots) {
549                                 char *a;
550                                 int from, to, i;
551
552                                 /* a range */
553                                 a = strndup(optarg, dots - optarg);
554                                 if (!a)
555                                         return log_oom();
556
557                                 from = log_level_from_string(a);
558                                 to = log_level_from_string(dots + 2);
559                                 free(a);
560
561                                 if (from < 0 || to < 0) {
562                                         log_error("Failed to parse log level range %s", optarg);
563                                         return -EINVAL;
564                                 }
565
566                                 arg_priorities = 0;
567
568                                 if (from < to) {
569                                         for (i = from; i <= to; i++)
570                                                 arg_priorities |= 1 << i;
571                                 } else {
572                                         for (i = to; i <= from; i++)
573                                                 arg_priorities |= 1 << i;
574                                 }
575
576                         } else {
577                                 int p, i;
578
579                                 p = log_level_from_string(optarg);
580                                 if (p < 0) {
581                                         log_error("Unknown log level %s", optarg);
582                                         return -EINVAL;
583                                 }
584
585                                 arg_priorities = 0;
586
587                                 for (i = 0; i <= p; i++)
588                                         arg_priorities |= 1 << i;
589                         }
590
591                         break;
592                 }
593
594                 case ARG_SINCE:
595                         r = parse_timestamp(optarg, &arg_since);
596                         if (r < 0) {
597                                 log_error("Failed to parse timestamp: %s", optarg);
598                                 return -EINVAL;
599                         }
600                         arg_since_set = true;
601                         break;
602
603                 case ARG_UNTIL:
604                         r = parse_timestamp(optarg, &arg_until);
605                         if (r < 0) {
606                                 log_error("Failed to parse timestamp: %s", optarg);
607                                 return -EINVAL;
608                         }
609                         arg_until_set = true;
610                         break;
611
612                 case 't':
613                         r = strv_extend(&arg_syslog_identifier, optarg);
614                         if (r < 0)
615                                 return log_oom();
616                         break;
617
618                 case 'u':
619                         r = strv_extend(&arg_system_units, optarg);
620                         if (r < 0)
621                                 return log_oom();
622                         break;
623
624                 case ARG_USER_UNIT:
625                         r = strv_extend(&arg_user_units, optarg);
626                         if (r < 0)
627                                 return log_oom();
628                         break;
629
630                 case 'F':
631                         arg_field = optarg;
632                         break;
633
634                 case 'x':
635                         arg_catalog = true;
636                         break;
637
638                 case ARG_LIST_CATALOG:
639                         arg_action = ACTION_LIST_CATALOG;
640                         break;
641
642                 case ARG_DUMP_CATALOG:
643                         arg_action = ACTION_DUMP_CATALOG;
644                         break;
645
646                 case ARG_UPDATE_CATALOG:
647                         arg_action = ACTION_UPDATE_CATALOG;
648                         break;
649
650                 case 'r':
651                         arg_reverse = true;
652                         break;
653
654                 case ARG_UTC:
655                         arg_utc = true;
656                         break;
657
658                 case '?':
659                         return -EINVAL;
660
661                 default:
662                         assert_not_reached("Unhandled option");
663                 }
664
665         if (arg_follow && !arg_no_tail && arg_lines < -1)
666                 arg_lines = 10;
667
668         if (!!arg_directory + !!arg_file + !!arg_machine > 1) {
669                 log_error("Please specify either -D/--directory= or --file= or -M/--machine=, not more than one.");
670                 return -EINVAL;
671         }
672
673         if (arg_since_set && arg_until_set && arg_since > arg_until) {
674                 log_error("--since= must be before --until=.");
675                 return -EINVAL;
676         }
677
678         if (!!arg_cursor + !!arg_after_cursor + !!arg_since_set > 1) {
679                 log_error("Please specify only one of --since=, --cursor=, and --after-cursor.");
680                 return -EINVAL;
681         }
682
683         if (arg_follow && arg_reverse) {
684                 log_error("Please specify either --reverse= or --follow=, not both.");
685                 return -EINVAL;
686         }
687
688         if (arg_action != ACTION_SHOW && optind < argc) {
689                 log_error("Extraneous arguments starting with '%s'", argv[optind]);
690                 return -EINVAL;
691         }
692
693         return 1;
694 }
695
696 static int generate_new_id128(void) {
697         sd_id128_t id;
698         int r;
699         unsigned i;
700
701         r = sd_id128_randomize(&id);
702         if (r < 0) {
703                 log_error("Failed to generate ID: %s", strerror(-r));
704                 return r;
705         }
706
707         printf("As string:\n"
708                SD_ID128_FORMAT_STR "\n\n"
709                "As UUID:\n"
710                "%02x%02x%02x%02x-%02x%02x-%02x%02x-%02x%02x-%02x%02x%02x%02x%02x%02x\n\n"
711                "As macro:\n"
712                "#define MESSAGE_XYZ SD_ID128_MAKE(",
713                SD_ID128_FORMAT_VAL(id),
714                SD_ID128_FORMAT_VAL(id));
715         for (i = 0; i < 16; i++)
716                 printf("%02x%s", id.bytes[i], i != 15 ? "," : "");
717         fputs(")\n\n", stdout);
718
719         printf("As Python constant:\n"
720                ">>> import uuid\n"
721                ">>> MESSAGE_XYZ = uuid.UUID('" SD_ID128_FORMAT_STR "')\n",
722                SD_ID128_FORMAT_VAL(id));
723
724         return 0;
725 }
726
727 static int add_matches(sd_journal *j, char **args) {
728         char **i;
729         bool have_term = false;
730
731         assert(j);
732
733         STRV_FOREACH(i, args) {
734                 int r;
735
736                 if (streq(*i, "+")) {
737                         if (!have_term)
738                                 break;
739                         r = sd_journal_add_disjunction(j);
740                         have_term = false;
741
742                 } else if (path_is_absolute(*i)) {
743                         _cleanup_free_ char *p, *t = NULL, *t2 = NULL;
744                         const char *path;
745                         _cleanup_free_ char *interpreter = NULL;
746                         struct stat st;
747
748                         p = canonicalize_file_name(*i);
749                         path = p ? p : *i;
750
751                         if (stat(path, &st) < 0)  {
752                                 log_error("Couldn't stat file: %m");
753                                 return -errno;
754                         }
755
756                         if (S_ISREG(st.st_mode) && (0111 & st.st_mode)) {
757                                 if (executable_is_script(path, &interpreter) > 0) {
758                                         _cleanup_free_ char *comm;
759
760                                         comm = strndup(basename(path), 15);
761                                         if (!comm)
762                                                 return log_oom();
763
764                                         t = strappend("_COMM=", comm);
765
766                                         /* Append _EXE only if the interpreter is not a link.
767                                            Otherwise, it might be outdated often. */
768                                         if (lstat(interpreter, &st) == 0 &&
769                                             !S_ISLNK(st.st_mode)) {
770                                                 t2 = strappend("_EXE=", interpreter);
771                                                 if (!t2)
772                                                         return log_oom();
773                                         }
774                                 } else
775                                         t = strappend("_EXE=", path);
776                         } else if (S_ISCHR(st.st_mode)) {
777                                 if (asprintf(&t, "_KERNEL_DEVICE=c%u:%u",
778                                              major(st.st_rdev),
779                                              minor(st.st_rdev)) < 0)
780                                         return -ENOMEM;
781                         } else if (S_ISBLK(st.st_mode)) {
782                                 if (asprintf(&t, "_KERNEL_DEVICE=b%u:%u",
783                                              major(st.st_rdev),
784                                              minor(st.st_rdev)) < 0)
785                                         return -ENOMEM;
786                         } else {
787                                 log_error("File is neither a device node, nor regular file, nor executable: %s", *i);
788                                 return -EINVAL;
789                         }
790
791                         if (!t)
792                                 return log_oom();
793
794                         r = sd_journal_add_match(j, t, 0);
795                         if (t2)
796                                 r = sd_journal_add_match(j, t2, 0);
797                         have_term = true;
798
799                 } else {
800                         r = sd_journal_add_match(j, *i, 0);
801                         have_term = true;
802                 }
803
804                 if (r < 0) {
805                         log_error("Failed to add match '%s': %s", *i, strerror(-r));
806                         return r;
807                 }
808         }
809
810         if (!strv_isempty(args) && !have_term) {
811                 log_error("\"+\" can only be used between terms");
812                 return -EINVAL;
813         }
814
815         return 0;
816 }
817
818 static int boot_id_cmp(const void *a, const void *b) {
819         uint64_t _a, _b;
820
821         _a = ((const boot_id_t *)a)->first;
822         _b = ((const boot_id_t *)b)->first;
823
824         return _a < _b ? -1 : (_a > _b ? 1 : 0);
825 }
826
827 static int list_boots(sd_journal *j) {
828         int r;
829         const void *data;
830         unsigned int count = 0;
831         int w, i;
832         size_t length, allocated = 0;
833         boot_id_t *id;
834         _cleanup_free_ boot_id_t *all_ids = NULL;
835
836         r = sd_journal_query_unique(j, "_BOOT_ID");
837         if (r < 0)
838                 return r;
839
840         SD_JOURNAL_FOREACH_UNIQUE(j, data, length) {
841                 if (length < strlen("_BOOT_ID="))
842                         continue;
843
844                 if (!GREEDY_REALLOC(all_ids, allocated, count + 1))
845                         return log_oom();
846
847                 id = &all_ids[count];
848
849                 r = sd_id128_from_string(((const char *)data) + strlen("_BOOT_ID="), &id->id);
850                 if (r < 0)
851                         continue;
852
853                 r = sd_journal_add_match(j, data, length);
854                 if (r < 0)
855                         return r;
856
857                 r = sd_journal_seek_head(j);
858                 if (r < 0)
859                         return r;
860
861                 r = sd_journal_next(j);
862                 if (r < 0)
863                         return r;
864                 else if (r == 0)
865                         goto flush;
866
867                 r = sd_journal_get_realtime_usec(j, &id->first);
868                 if (r < 0)
869                         return r;
870
871                 r = sd_journal_seek_tail(j);
872                 if (r < 0)
873                         return r;
874
875                 r = sd_journal_previous(j);
876                 if (r < 0)
877                         return r;
878                 else if (r == 0)
879                         goto flush;
880
881                 r = sd_journal_get_realtime_usec(j, &id->last);
882                 if (r < 0)
883                         return r;
884
885                 count++;
886         flush:
887                 sd_journal_flush_matches(j);
888         }
889
890         qsort_safe(all_ids, count, sizeof(boot_id_t), boot_id_cmp);
891
892         /* numbers are one less, but we need an extra char for the sign */
893         w = DECIMAL_STR_WIDTH(count - 1) + 1;
894
895         for (id = all_ids, i = 0; id < all_ids + count; id++, i++) {
896                 char a[FORMAT_TIMESTAMP_MAX], b[FORMAT_TIMESTAMP_MAX];
897
898                 printf("% *i " SD_ID128_FORMAT_STR " %s—%s\n",
899                        w, i - count + 1,
900                        SD_ID128_FORMAT_VAL(id->id),
901                        format_timestamp_maybe_utc(a, sizeof(a), id->first),
902                        format_timestamp_maybe_utc(b, sizeof(b), id->last));
903         }
904
905         return 0;
906 }
907
908 static int get_relative_boot_id(sd_journal *j, sd_id128_t *boot_id, int relative) {
909         int r;
910         const void *data;
911         unsigned int count = 0;
912         size_t length, allocated = 0;
913         boot_id_t ref_boot_id = {SD_ID128_NULL}, *id;
914         _cleanup_free_ boot_id_t *all_ids = NULL;
915
916         assert(j);
917         assert(boot_id);
918
919         r = sd_journal_query_unique(j, "_BOOT_ID");
920         if (r < 0)
921                 return r;
922
923         SD_JOURNAL_FOREACH_UNIQUE(j, data, length) {
924                 if (length < strlen("_BOOT_ID="))
925                         continue;
926
927                 if (!GREEDY_REALLOC(all_ids, allocated, count + 1))
928                         return log_oom();
929
930                 id = &all_ids[count];
931
932                 r = sd_id128_from_string(((const char *)data) + strlen("_BOOT_ID="), &id->id);
933                 if (r < 0)
934                         continue;
935
936                 r = sd_journal_add_match(j, data, length);
937                 if (r < 0)
938                         return r;
939
940                 r = sd_journal_seek_head(j);
941                 if (r < 0)
942                         return r;
943
944                 r = sd_journal_next(j);
945                 if (r < 0)
946                         return r;
947                 else if (r == 0)
948                         goto flush;
949
950                 r = sd_journal_get_realtime_usec(j, &id->first);
951                 if (r < 0)
952                         return r;
953
954                 if (sd_id128_equal(id->id, *boot_id))
955                         ref_boot_id = *id;
956
957                 count++;
958         flush:
959                 sd_journal_flush_matches(j);
960         }
961
962         qsort_safe(all_ids, count, sizeof(boot_id_t), boot_id_cmp);
963
964         if (sd_id128_equal(*boot_id, SD_ID128_NULL)) {
965                 if (relative > (int) count || relative <= -(int)count)
966                         return -EADDRNOTAVAIL;
967
968                 *boot_id = all_ids[(relative <= 0)*count + relative - 1].id;
969         } else {
970                 id = bsearch(&ref_boot_id, all_ids, count, sizeof(boot_id_t), boot_id_cmp);
971
972                 if (!id ||
973                     relative <= 0 ? (id - all_ids) + relative < 0 :
974                                     (id - all_ids) + relative >= (int) count)
975                         return -EADDRNOTAVAIL;
976
977                 *boot_id = (id + relative)->id;
978         }
979
980         return 0;
981 }
982
983 static int add_boot(sd_journal *j) {
984         char match[9+32+1] = "_BOOT_ID=";
985         int r;
986
987         assert(j);
988
989         if (!arg_boot)
990                 return 0;
991
992         if (arg_boot_offset == 0 && sd_id128_equal(arg_boot_id, SD_ID128_NULL))
993                 return add_match_this_boot(j, arg_machine);
994
995         r = get_relative_boot_id(j, &arg_boot_id, arg_boot_offset);
996         if (r < 0) {
997                 if (sd_id128_equal(arg_boot_id, SD_ID128_NULL))
998                         log_error("Failed to look up boot %+i: %s", arg_boot_offset, strerror(-r));
999                 else
1000                         log_error("Failed to look up boot ID "SD_ID128_FORMAT_STR"%+i: %s",
1001                                   SD_ID128_FORMAT_VAL(arg_boot_id), arg_boot_offset, strerror(-r));
1002                 return r;
1003         }
1004
1005         sd_id128_to_string(arg_boot_id, match + 9);
1006
1007         r = sd_journal_add_match(j, match, sizeof(match) - 1);
1008         if (r < 0) {
1009                 log_error("Failed to add match: %s", strerror(-r));
1010                 return r;
1011         }
1012
1013         r = sd_journal_add_conjunction(j);
1014         if (r < 0)
1015                 return r;
1016
1017         return 0;
1018 }
1019
1020 static int add_dmesg(sd_journal *j) {
1021         int r;
1022         assert(j);
1023
1024         if (!arg_dmesg)
1025                 return 0;
1026
1027         r = sd_journal_add_match(j, "_TRANSPORT=kernel", strlen("_TRANSPORT=kernel"));
1028         if (r < 0) {
1029                 log_error("Failed to add match: %s", strerror(-r));
1030                 return r;
1031         }
1032
1033         r = sd_journal_add_conjunction(j);
1034         if (r < 0)
1035                 return r;
1036
1037         return 0;
1038 }
1039
1040 static int get_possible_units(sd_journal *j,
1041                               const char *fields,
1042                               char **patterns,
1043                               Set **units) {
1044         _cleanup_set_free_free_ Set *found;
1045         const char *field;
1046         int r;
1047
1048         found = set_new(&string_hash_ops);
1049         if (!found)
1050                 return log_oom();
1051
1052         NULSTR_FOREACH(field, fields) {
1053                 const void *data;
1054                 size_t size;
1055
1056                 r = sd_journal_query_unique(j, field);
1057                 if (r < 0)
1058                         return r;
1059
1060                 SD_JOURNAL_FOREACH_UNIQUE(j, data, size) {
1061                         char **pattern, *eq;
1062                         size_t prefix;
1063                         _cleanup_free_ char *u = NULL;
1064
1065                         eq = memchr(data, '=', size);
1066                         if (eq)
1067                                 prefix = eq - (char*) data + 1;
1068                         else
1069                                 prefix = 0;
1070
1071                         u = strndup((char*) data + prefix, size - prefix);
1072                         if (!u)
1073                                 return log_oom();
1074
1075                         STRV_FOREACH(pattern, patterns)
1076                                 if (fnmatch(*pattern, u, FNM_NOESCAPE) == 0) {
1077                                         log_debug("Matched %s with pattern %s=%s", u, field, *pattern);
1078
1079                                         r = set_consume(found, u);
1080                                         u = NULL;
1081                                         if (r < 0 && r != -EEXIST)
1082                                                 return r;
1083
1084                                         break;
1085                                 }
1086                 }
1087         }
1088
1089         *units = found;
1090         found = NULL;
1091         return 0;
1092 }
1093
1094 /* This list is supposed to return the superset of unit names
1095  * possibly matched by rules added with add_matches_for_unit... */
1096 #define SYSTEM_UNITS                 \
1097         "_SYSTEMD_UNIT\0"            \
1098         "COREDUMP_UNIT\0"            \
1099         "UNIT\0"                     \
1100         "OBJECT_SYSTEMD_UNIT\0"      \
1101         "_SYSTEMD_SLICE\0"
1102
1103 /* ... and add_matches_for_user_unit */
1104 #define USER_UNITS                   \
1105         "_SYSTEMD_USER_UNIT\0"       \
1106         "USER_UNIT\0"                \
1107         "COREDUMP_USER_UNIT\0"       \
1108         "OBJECT_SYSTEMD_USER_UNIT\0"
1109
1110 static int add_units(sd_journal *j) {
1111         _cleanup_strv_free_ char **patterns = NULL;
1112         int r, count = 0;
1113         char **i;
1114
1115         assert(j);
1116
1117         STRV_FOREACH(i, arg_system_units) {
1118                 _cleanup_free_ char *u = NULL;
1119
1120                 u = unit_name_mangle(*i, MANGLE_GLOB);
1121                 if (!u)
1122                         return log_oom();
1123
1124                 if (string_is_glob(u)) {
1125                         r = strv_push(&patterns, u);
1126                         if (r < 0)
1127                                 return r;
1128                         u = NULL;
1129                 } else {
1130                         r = add_matches_for_unit(j, u);
1131                         if (r < 0)
1132                                 return r;
1133                         r = sd_journal_add_disjunction(j);
1134                         if (r < 0)
1135                                 return r;
1136                         count ++;
1137                 }
1138         }
1139
1140         if (!strv_isempty(patterns)) {
1141                 _cleanup_set_free_free_ Set *units = NULL;
1142                 Iterator it;
1143                 char *u;
1144
1145                 r = get_possible_units(j, SYSTEM_UNITS, patterns, &units);
1146                 if (r < 0)
1147                         return r;
1148
1149                 SET_FOREACH(u, units, it) {
1150                         r = add_matches_for_unit(j, u);
1151                         if (r < 0)
1152                                 return r;
1153                         r = sd_journal_add_disjunction(j);
1154                         if (r < 0)
1155                                 return r;
1156                         count ++;
1157                 }
1158         }
1159
1160         strv_free(patterns);
1161         patterns = NULL;
1162
1163         STRV_FOREACH(i, arg_user_units) {
1164                 _cleanup_free_ char *u = NULL;
1165
1166                 u = unit_name_mangle(*i, MANGLE_GLOB);
1167                 if (!u)
1168                         return log_oom();
1169
1170                 if (string_is_glob(u)) {
1171                         r = strv_push(&patterns, u);
1172                         if (r < 0)
1173                                 return r;
1174                         u = NULL;
1175                 } else {
1176                         r = add_matches_for_user_unit(j, u, getuid());
1177                         if (r < 0)
1178                                 return r;
1179                         r = sd_journal_add_disjunction(j);
1180                         if (r < 0)
1181                                 return r;
1182                         count ++;
1183                 }
1184         }
1185
1186         if (!strv_isempty(patterns)) {
1187                 _cleanup_set_free_free_ Set *units = NULL;
1188                 Iterator it;
1189                 char *u;
1190
1191                 r = get_possible_units(j, USER_UNITS, patterns, &units);
1192                 if (r < 0)
1193                         return r;
1194
1195                 SET_FOREACH(u, units, it) {
1196                         r = add_matches_for_user_unit(j, u, getuid());
1197                         if (r < 0)
1198                                 return r;
1199                         r = sd_journal_add_disjunction(j);
1200                         if (r < 0)
1201                                 return r;
1202                         count ++;
1203                 }
1204         }
1205
1206         /* Complain if the user request matches but nothing whatsoever was
1207          * found, since otherwise everything would be matched. */
1208         if (!(strv_isempty(arg_system_units) && strv_isempty(arg_user_units)) && count == 0)
1209                 return -ENODATA;
1210
1211         r = sd_journal_add_conjunction(j);
1212         if (r < 0)
1213                 return r;
1214
1215         return 0;
1216 }
1217
1218 static int add_priorities(sd_journal *j) {
1219         char match[] = "PRIORITY=0";
1220         int i, r;
1221         assert(j);
1222
1223         if (arg_priorities == 0xFF)
1224                 return 0;
1225
1226         for (i = LOG_EMERG; i <= LOG_DEBUG; i++)
1227                 if (arg_priorities & (1 << i)) {
1228                         match[sizeof(match)-2] = '0' + i;
1229
1230                         r = sd_journal_add_match(j, match, strlen(match));
1231                         if (r < 0) {
1232                                 log_error("Failed to add match: %s", strerror(-r));
1233                                 return r;
1234                         }
1235                 }
1236
1237         r = sd_journal_add_conjunction(j);
1238         if (r < 0)
1239                 return r;
1240
1241         return 0;
1242 }
1243
1244
1245 static int add_syslog_identifier(sd_journal *j) {
1246         int r;
1247         char **i;
1248
1249         assert(j);
1250
1251         STRV_FOREACH(i, arg_syslog_identifier) {
1252                 char *u;
1253
1254                 u = strappenda("SYSLOG_IDENTIFIER=", *i);
1255                 r = sd_journal_add_match(j, u, 0);
1256                 if (r < 0)
1257                         return r;
1258                 r = sd_journal_add_disjunction(j);
1259                 if (r < 0)
1260                         return r;
1261         }
1262
1263         r = sd_journal_add_conjunction(j);
1264         if (r < 0)
1265                 return r;
1266
1267         return 0;
1268 }
1269
1270 static int setup_keys(void) {
1271 #ifdef HAVE_GCRYPT
1272         size_t mpk_size, seed_size, state_size, i;
1273         uint8_t *mpk, *seed, *state;
1274         ssize_t l;
1275         int fd = -1, r, attr = 0;
1276         sd_id128_t machine, boot;
1277         char *p = NULL, *k = NULL;
1278         struct FSSHeader h;
1279         uint64_t n;
1280         struct stat st;
1281
1282         r = stat("/var/log/journal", &st);
1283         if (r < 0 && errno != ENOENT && errno != ENOTDIR) {
1284                 log_error("stat(\"%s\") failed: %m", "/var/log/journal");
1285                 return -errno;
1286         }
1287
1288         if (r < 0 || !S_ISDIR(st.st_mode)) {
1289                 log_error("%s is not a directory, must be using persistent logging for FSS.",
1290                           "/var/log/journal");
1291                 return r < 0 ? -errno : -ENOTDIR;
1292         }
1293
1294         r = sd_id128_get_machine(&machine);
1295         if (r < 0) {
1296                 log_error("Failed to get machine ID: %s", strerror(-r));
1297                 return r;
1298         }
1299
1300         r = sd_id128_get_boot(&boot);
1301         if (r < 0) {
1302                 log_error("Failed to get boot ID: %s", strerror(-r));
1303                 return r;
1304         }
1305
1306         if (asprintf(&p, "/var/log/journal/" SD_ID128_FORMAT_STR "/fss",
1307                      SD_ID128_FORMAT_VAL(machine)) < 0)
1308                 return log_oom();
1309
1310         if (access(p, F_OK) >= 0) {
1311                 if (arg_force) {
1312                         r = unlink(p);
1313                         if (r < 0) {
1314                                 log_error("unlink(\"%s\") failed: %m", p);
1315                                 r = -errno;
1316                                 goto finish;
1317                         }
1318                 } else {
1319                         log_error("Sealing key file %s exists already. (--force to recreate)", p);
1320                         r = -EEXIST;
1321                         goto finish;
1322                 }
1323         }
1324
1325         if (asprintf(&k, "/var/log/journal/" SD_ID128_FORMAT_STR "/fss.tmp.XXXXXX",
1326                      SD_ID128_FORMAT_VAL(machine)) < 0) {
1327                 r = log_oom();
1328                 goto finish;
1329         }
1330
1331         mpk_size = FSPRG_mskinbytes(FSPRG_RECOMMENDED_SECPAR);
1332         mpk = alloca(mpk_size);
1333
1334         seed_size = FSPRG_RECOMMENDED_SEEDLEN;
1335         seed = alloca(seed_size);
1336
1337         state_size = FSPRG_stateinbytes(FSPRG_RECOMMENDED_SECPAR);
1338         state = alloca(state_size);
1339
1340         fd = open("/dev/random", O_RDONLY|O_CLOEXEC|O_NOCTTY);
1341         if (fd < 0) {
1342                 log_error("Failed to open /dev/random: %m");
1343                 r = -errno;
1344                 goto finish;
1345         }
1346
1347         log_info("Generating seed...");
1348         l = loop_read(fd, seed, seed_size, true);
1349         if (l < 0 || (size_t) l != seed_size) {
1350                 log_error("Failed to read random seed: %s", strerror(EIO));
1351                 r = -EIO;
1352                 goto finish;
1353         }
1354
1355         log_info("Generating key pair...");
1356         FSPRG_GenMK(NULL, mpk, seed, seed_size, FSPRG_RECOMMENDED_SECPAR);
1357
1358         log_info("Generating sealing key...");
1359         FSPRG_GenState0(state, mpk, seed, seed_size);
1360
1361         assert(arg_interval > 0);
1362
1363         n = now(CLOCK_REALTIME);
1364         n /= arg_interval;
1365
1366         safe_close(fd);
1367         fd = mkostemp_safe(k, O_WRONLY|O_CLOEXEC);
1368         if (fd < 0) {
1369                 log_error("Failed to open %s: %m", k);
1370                 r = -errno;
1371                 goto finish;
1372         }
1373
1374         /* Enable secure remove, exclusion from dump, synchronous
1375          * writing and in-place updating */
1376         if (ioctl(fd, FS_IOC_GETFLAGS, &attr) < 0)
1377                 log_warning("FS_IOC_GETFLAGS failed: %m");
1378
1379         attr |= FS_SECRM_FL|FS_NODUMP_FL|FS_SYNC_FL|FS_NOCOW_FL;
1380
1381         if (ioctl(fd, FS_IOC_SETFLAGS, &attr) < 0)
1382                 log_warning("FS_IOC_SETFLAGS failed: %m");
1383
1384         zero(h);
1385         memcpy(h.signature, "KSHHRHLP", 8);
1386         h.machine_id = machine;
1387         h.boot_id = boot;
1388         h.header_size = htole64(sizeof(h));
1389         h.start_usec = htole64(n * arg_interval);
1390         h.interval_usec = htole64(arg_interval);
1391         h.fsprg_secpar = htole16(FSPRG_RECOMMENDED_SECPAR);
1392         h.fsprg_state_size = htole64(state_size);
1393
1394         l = loop_write(fd, &h, sizeof(h), false);
1395         if (l < 0 || (size_t) l != sizeof(h)) {
1396                 log_error("Failed to write header: %s", strerror(EIO));
1397                 r = -EIO;
1398                 goto finish;
1399         }
1400
1401         l = loop_write(fd, state, state_size, false);
1402         if (l < 0 || (size_t) l != state_size) {
1403                 log_error("Failed to write state: %s", strerror(EIO));
1404                 r = -EIO;
1405                 goto finish;
1406         }
1407
1408         if (link(k, p) < 0) {
1409                 log_error("Failed to link file: %m");
1410                 r = -errno;
1411                 goto finish;
1412         }
1413
1414         if (on_tty()) {
1415                 fprintf(stderr,
1416                         "\n"
1417                         "The new key pair has been generated. The " ANSI_HIGHLIGHT_ON "secret sealing key" ANSI_HIGHLIGHT_OFF " has been written to\n"
1418                         "the following local file. This key file is automatically updated when the\n"
1419                         "sealing key is advanced. It should not be used on multiple hosts.\n"
1420                         "\n"
1421                         "\t%s\n"
1422                         "\n"
1423                         "Please write down the following " ANSI_HIGHLIGHT_ON "secret verification key" ANSI_HIGHLIGHT_OFF ". It should be stored\n"
1424                         "at a safe location and should not be saved locally on disk.\n"
1425                         "\n\t" ANSI_HIGHLIGHT_RED_ON, p);
1426                 fflush(stderr);
1427         }
1428         for (i = 0; i < seed_size; i++) {
1429                 if (i > 0 && i % 3 == 0)
1430                         putchar('-');
1431                 printf("%02x", ((uint8_t*) seed)[i]);
1432         }
1433
1434         printf("/%llx-%llx\n", (unsigned long long) n, (unsigned long long) arg_interval);
1435
1436         if (on_tty()) {
1437                 char tsb[FORMAT_TIMESPAN_MAX], *hn;
1438
1439                 fprintf(stderr,
1440                         ANSI_HIGHLIGHT_OFF "\n"
1441                         "The sealing key is automatically changed every %s.\n",
1442                         format_timespan(tsb, sizeof(tsb), arg_interval, 0));
1443
1444                 hn = gethostname_malloc();
1445
1446                 if (hn) {
1447                         hostname_cleanup(hn, false);
1448                         fprintf(stderr, "\nThe keys have been generated for host %s/" SD_ID128_FORMAT_STR ".\n", hn, SD_ID128_FORMAT_VAL(machine));
1449                 } else
1450                         fprintf(stderr, "\nThe keys have been generated for host " SD_ID128_FORMAT_STR ".\n", SD_ID128_FORMAT_VAL(machine));
1451
1452 #ifdef HAVE_QRENCODE
1453                 /* If this is not an UTF-8 system don't print any QR codes */
1454                 if (is_locale_utf8()) {
1455                         fputs("\nTo transfer the verification key to your phone please scan the QR code below:\n\n", stderr);
1456                         print_qr_code(stderr, seed, seed_size, n, arg_interval, hn, machine);
1457                 }
1458 #endif
1459                 free(hn);
1460         }
1461
1462         r = 0;
1463
1464 finish:
1465         safe_close(fd);
1466
1467         if (k) {
1468                 unlink(k);
1469                 free(k);
1470         }
1471
1472         free(p);
1473
1474         return r;
1475 #else
1476         log_error("Forward-secure sealing not available.");
1477         return -ENOTSUP;
1478 #endif
1479 }
1480
1481 static int verify(sd_journal *j) {
1482         int r = 0;
1483         Iterator i;
1484         JournalFile *f;
1485
1486         assert(j);
1487
1488         log_show_color(true);
1489
1490         HASHMAP_FOREACH(f, j->files, i) {
1491                 int k;
1492                 usec_t first, validated, last;
1493
1494 #ifdef HAVE_GCRYPT
1495                 if (!arg_verify_key && JOURNAL_HEADER_SEALED(f->header))
1496                         log_notice("Journal file %s has sealing enabled but verification key has not been passed using --verify-key=.", f->path);
1497 #endif
1498
1499                 k = journal_file_verify(f, arg_verify_key, &first, &validated, &last, true);
1500                 if (k == -EINVAL) {
1501                         /* If the key was invalid give up right-away. */
1502                         return k;
1503                 } else if (k < 0) {
1504                         log_warning("FAIL: %s (%s)", f->path, strerror(-k));
1505                         r = k;
1506                 } else {
1507                         char a[FORMAT_TIMESTAMP_MAX], b[FORMAT_TIMESTAMP_MAX], c[FORMAT_TIMESPAN_MAX];
1508                         log_info("PASS: %s", f->path);
1509
1510                         if (arg_verify_key && JOURNAL_HEADER_SEALED(f->header)) {
1511                                 if (validated > 0) {
1512                                         log_info("=> Validated from %s to %s, final %s entries not sealed.",
1513                                                  format_timestamp_maybe_utc(a, sizeof(a), first),
1514                                                  format_timestamp_maybe_utc(b, sizeof(b), validated),
1515                                                  format_timespan(c, sizeof(c), last > validated ? last - validated : 0, 0));
1516                                 } else if (last > 0)
1517                                         log_info("=> No sealing yet, %s of entries not sealed.",
1518                                                  format_timespan(c, sizeof(c), last - first, 0));
1519                                 else
1520                                         log_info("=> No sealing yet, no entries in file.");
1521                         }
1522                 }
1523         }
1524
1525         return r;
1526 }
1527
1528 #ifdef HAVE_ACL
1529 static int access_check_var_log_journal(sd_journal *j) {
1530         _cleanup_strv_free_ char **g = NULL;
1531         bool have_access;
1532         int r;
1533
1534         assert(j);
1535
1536         have_access = in_group("systemd-journal") > 0;
1537
1538         if (!have_access) {
1539                 /* Let's enumerate all groups from the default ACL of
1540                  * the directory, which generally should allow access
1541                  * to most journal files too */
1542                 r = search_acl_groups(&g, "/var/log/journal/", &have_access);
1543                 if (r < 0)
1544                         return r;
1545         }
1546
1547         if (!have_access) {
1548
1549                 if (strv_isempty(g))
1550                         log_notice("Hint: You are currently not seeing messages from other users and the system.\n"
1551                                    "      Users in the 'systemd-journal' group can see all messages. Pass -q to\n"
1552                                    "      turn off this notice.");
1553                 else {
1554                         _cleanup_free_ char *s = NULL;
1555
1556                         r = strv_extend(&g, "systemd-journal");
1557                         if (r < 0)
1558                                 return log_oom();
1559
1560                         strv_sort(g);
1561                         strv_uniq(g);
1562
1563                         s = strv_join(g, "', '");
1564                         if (!s)
1565                                 return log_oom();
1566
1567                         log_notice("Hint: You are currently not seeing messages from other users and the system.\n"
1568                                    "      Users in the groups '%s' can see all messages.\n"
1569                                    "      Pass -q to turn off this notice.", s);
1570                 }
1571         }
1572
1573         return 0;
1574 }
1575 #endif
1576
1577 static int access_check(sd_journal *j) {
1578         Iterator it;
1579         void *code;
1580         int r = 0;
1581
1582         assert(j);
1583
1584         if (set_isempty(j->errors)) {
1585                 if (hashmap_isempty(j->files))
1586                         log_notice("No journal files were found.");
1587                 return 0;
1588         }
1589
1590         if (set_contains(j->errors, INT_TO_PTR(-EACCES))) {
1591 #ifdef HAVE_ACL
1592                 /* If /var/log/journal doesn't even exist,
1593                  * unprivileged users have no access at all */
1594                 if (access("/var/log/journal", F_OK) < 0 &&
1595                     geteuid() != 0 &&
1596                     in_group("systemd-journal") <= 0) {
1597                         log_error("Unprivileged users cannot access messages, unless persistent log storage is\n"
1598                                   "enabled. Users in the 'systemd-journal' group may always access messages.");
1599                         return -EACCES;
1600                 }
1601
1602                 /* If /var/log/journal exists, try to pring a nice
1603                    notice if the user lacks access to it */
1604                 if (!arg_quiet && geteuid() != 0) {
1605                         r = access_check_var_log_journal(j);
1606                         if (r < 0)
1607                                 return r;
1608                 }
1609 #else
1610                 if (geteuid() != 0 && in_group("systemd-journal") <= 0) {
1611                         log_error("Unprivileged users cannot access messages. Users in the 'systemd-journal' group\n"
1612                                   "group may access messages.");
1613                         return -EACCES;
1614                 }
1615 #endif
1616
1617                 if (hashmap_isempty(j->files)) {
1618                         log_error("No journal files were opened due to insufficient permissions.");
1619                         r = -EACCES;
1620                 }
1621         }
1622
1623         SET_FOREACH(code, j->errors, it) {
1624                 int err;
1625
1626                 err = -PTR_TO_INT(code);
1627                 assert(err > 0);
1628
1629                 if (err != EACCES)
1630                         log_warning("Error was encountered while opening journal files: %s",
1631                                     strerror(err));
1632         }
1633
1634         return r;
1635 }
1636
1637 int main(int argc, char *argv[]) {
1638         int r;
1639         _cleanup_journal_close_ sd_journal *j = NULL;
1640         bool need_seek = false;
1641         sd_id128_t previous_boot_id;
1642         bool previous_boot_id_valid = false, first_line = true;
1643         int n_shown = 0;
1644         bool ellipsized = false;
1645
1646         setlocale(LC_ALL, "");
1647         log_parse_environment();
1648         log_open();
1649
1650         r = parse_argv(argc, argv);
1651         if (r <= 0)
1652                 goto finish;
1653
1654         signal(SIGWINCH, columns_lines_cache_reset);
1655
1656         if (arg_action == ACTION_NEW_ID128) {
1657                 r = generate_new_id128();
1658                 goto finish;
1659         }
1660
1661         if (arg_action == ACTION_SETUP_KEYS) {
1662                 r = setup_keys();
1663                 goto finish;
1664         }
1665
1666         if (arg_action == ACTION_UPDATE_CATALOG ||
1667             arg_action == ACTION_LIST_CATALOG ||
1668             arg_action == ACTION_DUMP_CATALOG) {
1669
1670                 _cleanup_free_ char *database;
1671
1672                 database = path_join(arg_root, CATALOG_DATABASE, NULL);
1673                 if (!database) {
1674                         r = log_oom();
1675                         goto finish;
1676                 }
1677
1678                 if (arg_action == ACTION_UPDATE_CATALOG) {
1679                         r = catalog_update(database, arg_root, catalog_file_dirs);
1680                         if (r < 0)
1681                                 log_error("Failed to list catalog: %s", strerror(-r));
1682                 } else {
1683                         bool oneline = arg_action == ACTION_LIST_CATALOG;
1684
1685                         if (optind < argc)
1686                                 r = catalog_list_items(stdout, database,
1687                                                        oneline, argv + optind);
1688                         else
1689                                 r = catalog_list(stdout, database, oneline);
1690                         if (r < 0)
1691                                 log_error("Failed to list catalog: %s", strerror(-r));
1692                 }
1693
1694                 goto finish;
1695         }
1696
1697         if (arg_directory)
1698                 r = sd_journal_open_directory(&j, arg_directory, arg_journal_type);
1699         else if (arg_file)
1700                 r = sd_journal_open_files(&j, (const char**) arg_file, 0);
1701         else if (arg_machine)
1702                 r = sd_journal_open_container(&j, arg_machine, 0);
1703         else
1704                 r = sd_journal_open(&j, !arg_merge*SD_JOURNAL_LOCAL_ONLY + arg_journal_type);
1705         if (r < 0) {
1706                 log_error("Failed to open %s: %s",
1707                           arg_directory ? arg_directory : arg_file ? "files" : "journal",
1708                           strerror(-r));
1709                 return EXIT_FAILURE;
1710         }
1711
1712         r = access_check(j);
1713         if (r < 0)
1714                 return EXIT_FAILURE;
1715
1716         if (arg_action == ACTION_VERIFY) {
1717                 r = verify(j);
1718                 goto finish;
1719         }
1720
1721         if (arg_action == ACTION_PRINT_HEADER) {
1722                 journal_print_header(j);
1723                 return EXIT_SUCCESS;
1724         }
1725
1726         if (arg_action == ACTION_DISK_USAGE) {
1727                 uint64_t bytes = 0;
1728                 char sbytes[FORMAT_BYTES_MAX];
1729
1730                 r = sd_journal_get_usage(j, &bytes);
1731                 if (r < 0)
1732                         return EXIT_FAILURE;
1733
1734                 printf("Journals take up %s on disk.\n",
1735                        format_bytes(sbytes, sizeof(sbytes), bytes));
1736                 return EXIT_SUCCESS;
1737         }
1738
1739         if (arg_action == ACTION_LIST_BOOTS) {
1740                 r = list_boots(j);
1741                 goto finish;
1742         }
1743
1744         /* add_boot() must be called first!
1745          * It may need to seek the journal to find parent boot IDs. */
1746         r = add_boot(j);
1747         if (r < 0)
1748                 return EXIT_FAILURE;
1749
1750         r = add_dmesg(j);
1751         if (r < 0)
1752                 return EXIT_FAILURE;
1753
1754         r = add_units(j);
1755         strv_free(arg_system_units);
1756         strv_free(arg_user_units);
1757
1758         if (r < 0) {
1759                 log_error("Failed to add filter for units: %s", strerror(-r));
1760                 return EXIT_FAILURE;
1761         }
1762
1763         r = add_syslog_identifier(j);
1764         if (r < 0) {
1765                 log_error("Failed to add filter for syslog identifiers: %s", strerror(-r));
1766                 return EXIT_FAILURE;
1767         }
1768
1769         r = add_priorities(j);
1770         if (r < 0) {
1771                 log_error("Failed to add filter for priorities: %s", strerror(-r));
1772                 return EXIT_FAILURE;
1773         }
1774
1775         r = add_matches(j, argv + optind);
1776         if (r < 0) {
1777                 log_error("Failed to add filters: %s", strerror(-r));
1778                 return EXIT_FAILURE;
1779         }
1780
1781         if (_unlikely_(log_get_max_level() >= LOG_PRI(LOG_DEBUG))) {
1782                 _cleanup_free_ char *filter;
1783
1784                 filter = journal_make_match_string(j);
1785                 log_debug("Journal filter: %s", filter);
1786         }
1787
1788         if (arg_field) {
1789                 const void *data;
1790                 size_t size;
1791
1792                 r = sd_journal_set_data_threshold(j, 0);
1793                 if (r < 0) {
1794                         log_error("Failed to unset data size threshold");
1795                         return EXIT_FAILURE;
1796                 }
1797
1798                 r = sd_journal_query_unique(j, arg_field);
1799                 if (r < 0) {
1800                         log_error("Failed to query unique data objects: %s", strerror(-r));
1801                         return EXIT_FAILURE;
1802                 }
1803
1804                 SD_JOURNAL_FOREACH_UNIQUE(j, data, size) {
1805                         const void *eq;
1806
1807                         if (arg_lines >= 0 && n_shown >= arg_lines)
1808                                 break;
1809
1810                         eq = memchr(data, '=', size);
1811                         if (eq)
1812                                 printf("%.*s\n", (int) (size - ((const uint8_t*) eq - (const uint8_t*) data + 1)), (const char*) eq + 1);
1813                         else
1814                                 printf("%.*s\n", (int) size, (const char*) data);
1815
1816                         n_shown ++;
1817                 }
1818
1819                 return EXIT_SUCCESS;
1820         }
1821
1822         /* Opening the fd now means the first sd_journal_wait() will actually wait */
1823         if (arg_follow) {
1824                 r = sd_journal_get_fd(j);
1825                 if (r < 0)
1826                         return EXIT_FAILURE;
1827         }
1828
1829         if (arg_cursor || arg_after_cursor) {
1830                 r = sd_journal_seek_cursor(j, arg_cursor ?: arg_after_cursor);
1831                 if (r < 0) {
1832                         log_error("Failed to seek to cursor: %s", strerror(-r));
1833                         return EXIT_FAILURE;
1834                 }
1835                 if (!arg_reverse)
1836                         r = sd_journal_next_skip(j, 1 + !!arg_after_cursor);
1837                 else
1838                         r = sd_journal_previous_skip(j, 1 + !!arg_after_cursor);
1839
1840                 if (arg_after_cursor && r < 2 && !arg_follow)
1841                         /* We couldn't find the next entry after the cursor. */
1842                         arg_lines = 0;
1843
1844         } else if (arg_since_set && !arg_reverse) {
1845                 r = sd_journal_seek_realtime_usec(j, arg_since);
1846                 if (r < 0) {
1847                         log_error("Failed to seek to date: %s", strerror(-r));
1848                         return EXIT_FAILURE;
1849                 }
1850                 r = sd_journal_next(j);
1851
1852         } else if (arg_until_set && arg_reverse) {
1853                 r = sd_journal_seek_realtime_usec(j, arg_until);
1854                 if (r < 0) {
1855                         log_error("Failed to seek to date: %s", strerror(-r));
1856                         return EXIT_FAILURE;
1857                 }
1858                 r = sd_journal_previous(j);
1859
1860         } else if (arg_lines >= 0) {
1861                 r = sd_journal_seek_tail(j);
1862                 if (r < 0) {
1863                         log_error("Failed to seek to tail: %s", strerror(-r));
1864                         return EXIT_FAILURE;
1865                 }
1866
1867                 r = sd_journal_previous_skip(j, arg_lines);
1868
1869         } else if (arg_reverse) {
1870                 r = sd_journal_seek_tail(j);
1871                 if (r < 0) {
1872                         log_error("Failed to seek to tail: %s", strerror(-r));
1873                         return EXIT_FAILURE;
1874                 }
1875
1876                 r = sd_journal_previous(j);
1877
1878         } else {
1879                 r = sd_journal_seek_head(j);
1880                 if (r < 0) {
1881                         log_error("Failed to seek to head: %s", strerror(-r));
1882                         return EXIT_FAILURE;
1883                 }
1884
1885                 r = sd_journal_next(j);
1886         }
1887
1888         if (r < 0) {
1889                 log_error("Failed to iterate through journal: %s", strerror(-r));
1890                 return EXIT_FAILURE;
1891         }
1892
1893         if (!arg_follow)
1894                 pager_open_if_enabled();
1895
1896         if (!arg_quiet) {
1897                 usec_t start, end;
1898                 char start_buf[FORMAT_TIMESTAMP_MAX], end_buf[FORMAT_TIMESTAMP_MAX];
1899
1900                 r = sd_journal_get_cutoff_realtime_usec(j, &start, &end);
1901                 if (r < 0) {
1902                         log_error("Failed to get cutoff: %s", strerror(-r));
1903                         goto finish;
1904                 }
1905
1906                 if (r > 0) {
1907                         if (arg_follow)
1908                                 printf("-- Logs begin at %s. --\n",
1909                                        format_timestamp_maybe_utc(start_buf, sizeof(start_buf), start));
1910                         else
1911                                 printf("-- Logs begin at %s, end at %s. --\n",
1912                                        format_timestamp_maybe_utc(start_buf, sizeof(start_buf), start),
1913                                        format_timestamp_maybe_utc(end_buf, sizeof(end_buf), end));
1914                 }
1915         }
1916
1917         for (;;) {
1918                 while (arg_lines < 0 || n_shown < arg_lines || (arg_follow && !first_line)) {
1919                         int flags;
1920
1921                         if (need_seek) {
1922                                 if (!arg_reverse)
1923                                         r = sd_journal_next(j);
1924                                 else
1925                                         r = sd_journal_previous(j);
1926                                 if (r < 0) {
1927                                         log_error("Failed to iterate through journal: %s", strerror(-r));
1928                                         goto finish;
1929                                 }
1930                                 if (r == 0)
1931                                         break;
1932                         }
1933
1934                         if (arg_until_set && !arg_reverse) {
1935                                 usec_t usec;
1936
1937                                 r = sd_journal_get_realtime_usec(j, &usec);
1938                                 if (r < 0) {
1939                                         log_error("Failed to determine timestamp: %s", strerror(-r));
1940                                         goto finish;
1941                                 }
1942                                 if (usec > arg_until)
1943                                         goto finish;
1944                         }
1945
1946                         if (arg_since_set && arg_reverse) {
1947                                 usec_t usec;
1948
1949                                 r = sd_journal_get_realtime_usec(j, &usec);
1950                                 if (r < 0) {
1951                                         log_error("Failed to determine timestamp: %s", strerror(-r));
1952                                         goto finish;
1953                                 }
1954                                 if (usec < arg_since)
1955                                         goto finish;
1956                         }
1957
1958                         if (!arg_merge && !arg_quiet) {
1959                                 sd_id128_t boot_id;
1960
1961                                 r = sd_journal_get_monotonic_usec(j, NULL, &boot_id);
1962                                 if (r >= 0) {
1963                                         if (previous_boot_id_valid &&
1964                                             !sd_id128_equal(boot_id, previous_boot_id))
1965                                                 printf("%s-- Reboot --%s\n",
1966                                                        ansi_highlight(), ansi_highlight_off());
1967
1968                                         previous_boot_id = boot_id;
1969                                         previous_boot_id_valid = true;
1970                                 }
1971                         }
1972
1973                         flags =
1974                                 arg_all * OUTPUT_SHOW_ALL |
1975                                 arg_full * OUTPUT_FULL_WIDTH |
1976                                 on_tty() * OUTPUT_COLOR |
1977                                 arg_catalog * OUTPUT_CATALOG |
1978                                 arg_utc * OUTPUT_UTC;
1979
1980                         r = output_journal(stdout, j, arg_output, 0, flags, &ellipsized);
1981                         need_seek = true;
1982                         if (r == -EADDRNOTAVAIL)
1983                                 break;
1984                         else if (r < 0 || ferror(stdout))
1985                                 goto finish;
1986
1987                         n_shown++;
1988                 }
1989
1990                 if (!arg_follow) {
1991                         if (arg_show_cursor) {
1992                                 _cleanup_free_ char *cursor = NULL;
1993
1994                                 r = sd_journal_get_cursor(j, &cursor);
1995                                 if (r < 0 && r != -EADDRNOTAVAIL)
1996                                         log_error("Failed to get cursor: %s", strerror(-r));
1997                                 else if (r >= 0)
1998                                         printf("-- cursor: %s\n", cursor);
1999                         }
2000
2001                         break;
2002                 }
2003
2004                 r = sd_journal_wait(j, (uint64_t) -1);
2005                 if (r < 0) {
2006                         log_error("Couldn't wait for journal event: %s", strerror(-r));
2007                         goto finish;
2008                 }
2009
2010                 first_line = false;
2011         }
2012
2013 finish:
2014         pager_close();
2015
2016         strv_free(arg_file);
2017
2018         return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
2019 }