]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/journal/journalctl.c
feb53bd203a3fc55194fa6fdd9e79b3dc7f7c79f
[thirdparty/systemd.git] / src / journal / journalctl.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3 /***
4 This file is part of systemd.
5
6 Copyright 2011 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
17
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <locale.h>
23 #include <fcntl.h>
24 #include <fnmatch.h>
25 #include <errno.h>
26 #include <stddef.h>
27 #include <string.h>
28 #include <stdio.h>
29 #include <unistd.h>
30 #include <stdlib.h>
31 #include <time.h>
32 #include <getopt.h>
33 #include <signal.h>
34 #include <sys/stat.h>
35 #include <sys/ioctl.h>
36 #include <linux/fs.h>
37
38 #ifdef HAVE_ACL
39 #include <sys/acl.h>
40 #include "acl-util.h"
41 #endif
42
43 #include "systemd/sd-journal.h"
44
45 #include "log.h"
46 #include "logs-show.h"
47 #include "util.h"
48 #include "path-util.h"
49 #include "fileio.h"
50 #include "build.h"
51 #include "pager.h"
52 #include "strv.h"
53 #include "set.h"
54 #include "journal-internal.h"
55 #include "journal-def.h"
56 #include "journal-verify.h"
57 #include "journal-authenticate.h"
58 #include "journal-qrcode.h"
59 #include "fsprg.h"
60 #include "unit-name.h"
61 #include "catalog.h"
62
63 #define DEFAULT_FSS_INTERVAL_USEC (15*USEC_PER_MINUTE)
64
65 static OutputMode arg_output = OUTPUT_SHORT;
66 static bool arg_utc = false;
67 static bool arg_pager_end = false;
68 static bool arg_follow = false;
69 static bool arg_full = true;
70 static bool arg_all = false;
71 static bool arg_no_pager = false;
72 static int arg_lines = -2;
73 static bool arg_no_tail = false;
74 static bool arg_quiet = false;
75 static bool arg_merge = false;
76 static bool arg_boot = false;
77 static sd_id128_t arg_boot_id = {};
78 static int arg_boot_offset = 0;
79 static bool arg_dmesg = false;
80 static const char *arg_cursor = NULL;
81 static const char *arg_after_cursor = NULL;
82 static bool arg_show_cursor = false;
83 static const char *arg_directory = NULL;
84 static char **arg_file = NULL;
85 static int arg_priorities = 0xFF;
86 static const char *arg_verify_key = NULL;
87 #ifdef HAVE_GCRYPT
88 static usec_t arg_interval = DEFAULT_FSS_INTERVAL_USEC;
89 static bool arg_force = false;
90 #endif
91 static usec_t arg_since, arg_until;
92 static bool arg_since_set = false, arg_until_set = false;
93 static char **arg_syslog_identifier = NULL;
94 static char **arg_system_units = NULL;
95 static char **arg_user_units = NULL;
96 static const char *arg_field = NULL;
97 static bool arg_catalog = false;
98 static bool arg_reverse = false;
99 static int arg_journal_type = 0;
100 static const char *arg_root = NULL;
101 static const char *arg_machine = NULL;
102
103 static enum {
104 ACTION_SHOW,
105 ACTION_NEW_ID128,
106 ACTION_PRINT_HEADER,
107 ACTION_SETUP_KEYS,
108 ACTION_VERIFY,
109 ACTION_DISK_USAGE,
110 ACTION_LIST_CATALOG,
111 ACTION_DUMP_CATALOG,
112 ACTION_UPDATE_CATALOG,
113 ACTION_LIST_BOOTS,
114 } arg_action = ACTION_SHOW;
115
116 typedef struct boot_id_t {
117 sd_id128_t id;
118 uint64_t first;
119 uint64_t last;
120 } boot_id_t;
121
122 static void pager_open_if_enabled(void) {
123
124 if (arg_no_pager)
125 return;
126
127 pager_open(arg_pager_end);
128 }
129
130 static char *format_timestamp_maybe_utc(char *buf, size_t l, usec_t t) {
131
132 if (arg_utc)
133 return format_timestamp_utc(buf, l, t);
134
135 return format_timestamp(buf, l, t);
136 }
137
138 static int parse_boot_descriptor(const char *x, sd_id128_t *boot_id, int *offset) {
139 sd_id128_t id = SD_ID128_NULL;
140 int off = 0, r;
141
142 if (strlen(x) >= 32) {
143 char *t;
144
145 t = strndupa(x, 32);
146 r = sd_id128_from_string(t, &id);
147 if (r >= 0)
148 x += 32;
149
150 if (*x != '-' && *x != '+' && *x != 0)
151 return -EINVAL;
152
153 if (*x != 0) {
154 r = safe_atoi(x, &off);
155 if (r < 0)
156 return r;
157 }
158 } else {
159 r = safe_atoi(x, &off);
160 if (r < 0)
161 return r;
162 }
163
164 if (boot_id)
165 *boot_id = id;
166
167 if (offset)
168 *offset = off;
169
170 return 0;
171 }
172
173 static void help(void) {
174
175 pager_open_if_enabled();
176
177 printf("%s [OPTIONS...] [MATCHES...]\n\n"
178 "Query the journal.\n\n"
179 "Flags:\n"
180 " --system Show the system journal\n"
181 " --user Show the user journal for the current user\n"
182 " -M --machine=CONTAINER Operate on local container\n"
183 " --since=DATE Start showing entries on or newer than the specified date\n"
184 " --until=DATE Stop showing entries on or older than the specified date\n"
185 " -c --cursor=CURSOR Start showing entries from the specified cursor\n"
186 " --after-cursor=CURSOR Start showing entries from after the specified cursor\n"
187 " --show-cursor Print the cursor after all the entries\n"
188 " -b --boot[=ID] Show data only from ID or, if unspecified, the current boot\n"
189 " --list-boots Show terse information about recorded boots\n"
190 " -k --dmesg Show kernel message log from the current boot\n"
191 " -u --unit=UNIT Show data only from the specified unit\n"
192 " --user-unit=UNIT Show data only from the specified user session unit\n"
193 " -t --identifier=STRING Show only messages with the specified syslog identifier\n"
194 " -p --priority=RANGE Show only messages within the specified priority range\n"
195 " -e --pager-end Immediately jump to end of the journal in the pager\n"
196 " -f --follow Follow the journal\n"
197 " -n --lines[=INTEGER] Number of journal entries to show\n"
198 " --no-tail Show all lines, even in follow mode\n"
199 " -r --reverse Show the newest entries first\n"
200 " -o --output=STRING Change journal output mode (short, short-iso,\n"
201 " short-precise, short-monotonic, verbose,\n"
202 " export, json, json-pretty, json-sse, cat)\n"
203 " --utc Express time in Coordinated Universal Time (UTC)\n"
204 " -x --catalog Add message explanations where available\n"
205 " --no-full Ellipsize fields\n"
206 " -a --all Show all fields, including long and unprintable\n"
207 " -q --quiet Do not show privilege warning\n"
208 " --no-pager Do not pipe output into a pager\n"
209 " -m --merge Show entries from all available journals\n"
210 " -D --directory=PATH Show journal files from directory\n"
211 " --file=PATH Show journal file\n"
212 " --root=ROOT Operate on catalog files underneath the root ROOT\n"
213 #ifdef HAVE_GCRYPT
214 " --interval=TIME Time interval for changing the FSS sealing key\n"
215 " --verify-key=KEY Specify FSS verification key\n"
216 " --force Force overriding of the FSS key pair with --setup-keys\n"
217 #endif
218 "\nCommands:\n"
219 " -h --help Show this help text\n"
220 " --version Show package version\n"
221 " --new-id128 Generate a new 128-bit ID\n"
222 " --header Show journal header information\n"
223 " --disk-usage Show total disk usage of all journal files\n"
224 " -F --field=FIELD List all values that a specified field takes\n"
225 " --list-catalog Show message IDs of all entries in the message catalog\n"
226 " --dump-catalog Show entries in the message catalog\n"
227 " --update-catalog Update the message catalog database\n"
228 #ifdef HAVE_GCRYPT
229 " --setup-keys Generate a new FSS key pair\n"
230 " --verify Verify journal file consistency\n"
231 #endif
232 , program_invocation_short_name);
233 }
234
235 static int parse_argv(int argc, char *argv[]) {
236
237 enum {
238 ARG_VERSION = 0x100,
239 ARG_NO_PAGER,
240 ARG_NO_FULL,
241 ARG_NO_TAIL,
242 ARG_NEW_ID128,
243 ARG_LIST_BOOTS,
244 ARG_USER,
245 ARG_SYSTEM,
246 ARG_ROOT,
247 ARG_HEADER,
248 ARG_SETUP_KEYS,
249 ARG_FILE,
250 ARG_INTERVAL,
251 ARG_VERIFY,
252 ARG_VERIFY_KEY,
253 ARG_DISK_USAGE,
254 ARG_SINCE,
255 ARG_UNTIL,
256 ARG_AFTER_CURSOR,
257 ARG_SHOW_CURSOR,
258 ARG_USER_UNIT,
259 ARG_LIST_CATALOG,
260 ARG_DUMP_CATALOG,
261 ARG_UPDATE_CATALOG,
262 ARG_FORCE,
263 ARG_UTC,
264 };
265
266 static const struct option options[] = {
267 { "help", no_argument, NULL, 'h' },
268 { "version" , no_argument, NULL, ARG_VERSION },
269 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
270 { "pager-end", no_argument, NULL, 'e' },
271 { "follow", no_argument, NULL, 'f' },
272 { "force", no_argument, NULL, ARG_FORCE },
273 { "output", required_argument, NULL, 'o' },
274 { "all", no_argument, NULL, 'a' },
275 { "full", no_argument, NULL, 'l' },
276 { "no-full", no_argument, NULL, ARG_NO_FULL },
277 { "lines", optional_argument, NULL, 'n' },
278 { "no-tail", no_argument, NULL, ARG_NO_TAIL },
279 { "new-id128", no_argument, NULL, ARG_NEW_ID128 },
280 { "quiet", no_argument, NULL, 'q' },
281 { "merge", no_argument, NULL, 'm' },
282 { "boot", optional_argument, NULL, 'b' },
283 { "list-boots", no_argument, NULL, ARG_LIST_BOOTS },
284 { "this-boot", optional_argument, NULL, 'b' }, /* deprecated */
285 { "dmesg", no_argument, NULL, 'k' },
286 { "system", no_argument, NULL, ARG_SYSTEM },
287 { "user", no_argument, NULL, ARG_USER },
288 { "directory", required_argument, NULL, 'D' },
289 { "file", required_argument, NULL, ARG_FILE },
290 { "root", required_argument, NULL, ARG_ROOT },
291 { "header", no_argument, NULL, ARG_HEADER },
292 { "identifier", required_argument, NULL, 't' },
293 { "priority", required_argument, NULL, 'p' },
294 { "setup-keys", no_argument, NULL, ARG_SETUP_KEYS },
295 { "interval", required_argument, NULL, ARG_INTERVAL },
296 { "verify", no_argument, NULL, ARG_VERIFY },
297 { "verify-key", required_argument, NULL, ARG_VERIFY_KEY },
298 { "disk-usage", no_argument, NULL, ARG_DISK_USAGE },
299 { "cursor", required_argument, NULL, 'c' },
300 { "after-cursor", required_argument, NULL, ARG_AFTER_CURSOR },
301 { "show-cursor", no_argument, NULL, ARG_SHOW_CURSOR },
302 { "since", required_argument, NULL, ARG_SINCE },
303 { "until", required_argument, NULL, ARG_UNTIL },
304 { "unit", required_argument, NULL, 'u' },
305 { "user-unit", required_argument, NULL, ARG_USER_UNIT },
306 { "field", required_argument, NULL, 'F' },
307 { "catalog", no_argument, NULL, 'x' },
308 { "list-catalog", no_argument, NULL, ARG_LIST_CATALOG },
309 { "dump-catalog", no_argument, NULL, ARG_DUMP_CATALOG },
310 { "update-catalog", no_argument, NULL, ARG_UPDATE_CATALOG },
311 { "reverse", no_argument, NULL, 'r' },
312 { "machine", required_argument, NULL, 'M' },
313 { "utc", no_argument, NULL, ARG_UTC },
314 {}
315 };
316
317 int c, r;
318
319 assert(argc >= 0);
320 assert(argv);
321
322 while ((c = getopt_long(argc, argv, "hefo:aln::qmb::kD:p:c:t:u:F:xrM:", options, NULL)) >= 0)
323
324 switch (c) {
325
326 case 'h':
327 help();
328 return 0;
329
330 case ARG_VERSION:
331 puts(PACKAGE_STRING);
332 puts(SYSTEMD_FEATURES);
333 return 0;
334
335 case ARG_NO_PAGER:
336 arg_no_pager = true;
337 break;
338
339 case 'e':
340 arg_pager_end = true;
341
342 if (arg_lines < -1)
343 arg_lines = 1000;
344
345 break;
346
347 case 'f':
348 arg_follow = true;
349 break;
350
351 case 'o':
352 arg_output = output_mode_from_string(optarg);
353 if (arg_output < 0) {
354 log_error("Unknown output format '%s'.", optarg);
355 return -EINVAL;
356 }
357
358 if (arg_output == OUTPUT_EXPORT ||
359 arg_output == OUTPUT_JSON ||
360 arg_output == OUTPUT_JSON_PRETTY ||
361 arg_output == OUTPUT_JSON_SSE ||
362 arg_output == OUTPUT_CAT)
363 arg_quiet = true;
364
365 break;
366
367 case 'l':
368 arg_full = true;
369 break;
370
371 case ARG_NO_FULL:
372 arg_full = false;
373 break;
374
375 case 'a':
376 arg_all = true;
377 break;
378
379 case 'n':
380 if (optarg) {
381 if (streq(optarg, "all"))
382 arg_lines = -1;
383 else {
384 r = safe_atoi(optarg, &arg_lines);
385 if (r < 0 || arg_lines < 0) {
386 log_error("Failed to parse lines '%s'", optarg);
387 return -EINVAL;
388 }
389 }
390 } else {
391 arg_lines = 10;
392
393 /* Hmm, no argument? Maybe the next
394 * word on the command line is
395 * supposed to be the argument? Let's
396 * see if there is one, and is
397 * parsable. */
398 if (optind < argc) {
399 int n;
400 if (streq(argv[optind], "all")) {
401 arg_lines = -1;
402 optind++;
403 } else if (safe_atoi(argv[optind], &n) >= 0 && n >= 0) {
404 arg_lines = n;
405 optind++;
406 }
407 }
408 }
409
410 break;
411
412 case ARG_NO_TAIL:
413 arg_no_tail = true;
414 break;
415
416 case ARG_NEW_ID128:
417 arg_action = ACTION_NEW_ID128;
418 break;
419
420 case 'q':
421 arg_quiet = true;
422 break;
423
424 case 'm':
425 arg_merge = true;
426 break;
427
428 case 'b':
429 arg_boot = true;
430
431 if (optarg) {
432 r = parse_boot_descriptor(optarg, &arg_boot_id, &arg_boot_offset);
433 if (r < 0) {
434 log_error("Failed to parse boot descriptor '%s'", optarg);
435 return -EINVAL;
436 }
437 } else {
438
439 /* Hmm, no argument? Maybe the next
440 * word on the command line is
441 * supposed to be the argument? Let's
442 * see if there is one and is parsable
443 * as a boot descriptor... */
444
445 if (optind < argc &&
446 parse_boot_descriptor(argv[optind], &arg_boot_id, &arg_boot_offset) >= 0)
447 optind++;
448 }
449
450 break;
451
452 case ARG_LIST_BOOTS:
453 arg_action = ACTION_LIST_BOOTS;
454 break;
455
456 case 'k':
457 arg_boot = arg_dmesg = true;
458 break;
459
460 case ARG_SYSTEM:
461 arg_journal_type |= SD_JOURNAL_SYSTEM;
462 break;
463
464 case ARG_USER:
465 arg_journal_type |= SD_JOURNAL_CURRENT_USER;
466 break;
467
468 case 'M':
469 arg_machine = optarg;
470 break;
471
472 case 'D':
473 arg_directory = optarg;
474 break;
475
476 case ARG_FILE:
477 r = glob_extend(&arg_file, optarg);
478 if (r < 0) {
479 log_error("Failed to add paths: %s", strerror(-r));
480 return r;
481 };
482 break;
483
484 case ARG_ROOT:
485 arg_root = optarg;
486 break;
487
488 case 'c':
489 arg_cursor = optarg;
490 break;
491
492 case ARG_AFTER_CURSOR:
493 arg_after_cursor = optarg;
494 break;
495
496 case ARG_SHOW_CURSOR:
497 arg_show_cursor = true;
498 break;
499
500 case ARG_HEADER:
501 arg_action = ACTION_PRINT_HEADER;
502 break;
503
504 case ARG_VERIFY:
505 arg_action = ACTION_VERIFY;
506 break;
507
508 case ARG_DISK_USAGE:
509 arg_action = ACTION_DISK_USAGE;
510 break;
511
512 #ifdef HAVE_GCRYPT
513 case ARG_FORCE:
514 arg_force = true;
515 break;
516
517 case ARG_SETUP_KEYS:
518 arg_action = ACTION_SETUP_KEYS;
519 break;
520
521
522 case ARG_VERIFY_KEY:
523 arg_action = ACTION_VERIFY;
524 arg_verify_key = optarg;
525 arg_merge = false;
526 break;
527
528 case ARG_INTERVAL:
529 r = parse_sec(optarg, &arg_interval);
530 if (r < 0 || arg_interval <= 0) {
531 log_error("Failed to parse sealing key change interval: %s", optarg);
532 return -EINVAL;
533 }
534 break;
535 #else
536 case ARG_SETUP_KEYS:
537 case ARG_VERIFY_KEY:
538 case ARG_INTERVAL:
539 case ARG_FORCE:
540 log_error("Forward-secure sealing not available.");
541 return -ENOTSUP;
542 #endif
543
544 case 'p': {
545 const char *dots;
546
547 dots = strstr(optarg, "..");
548 if (dots) {
549 char *a;
550 int from, to, i;
551
552 /* a range */
553 a = strndup(optarg, dots - optarg);
554 if (!a)
555 return log_oom();
556
557 from = log_level_from_string(a);
558 to = log_level_from_string(dots + 2);
559 free(a);
560
561 if (from < 0 || to < 0) {
562 log_error("Failed to parse log level range %s", optarg);
563 return -EINVAL;
564 }
565
566 arg_priorities = 0;
567
568 if (from < to) {
569 for (i = from; i <= to; i++)
570 arg_priorities |= 1 << i;
571 } else {
572 for (i = to; i <= from; i++)
573 arg_priorities |= 1 << i;
574 }
575
576 } else {
577 int p, i;
578
579 p = log_level_from_string(optarg);
580 if (p < 0) {
581 log_error("Unknown log level %s", optarg);
582 return -EINVAL;
583 }
584
585 arg_priorities = 0;
586
587 for (i = 0; i <= p; i++)
588 arg_priorities |= 1 << i;
589 }
590
591 break;
592 }
593
594 case ARG_SINCE:
595 r = parse_timestamp(optarg, &arg_since);
596 if (r < 0) {
597 log_error("Failed to parse timestamp: %s", optarg);
598 return -EINVAL;
599 }
600 arg_since_set = true;
601 break;
602
603 case ARG_UNTIL:
604 r = parse_timestamp(optarg, &arg_until);
605 if (r < 0) {
606 log_error("Failed to parse timestamp: %s", optarg);
607 return -EINVAL;
608 }
609 arg_until_set = true;
610 break;
611
612 case 't':
613 r = strv_extend(&arg_syslog_identifier, optarg);
614 if (r < 0)
615 return log_oom();
616 break;
617
618 case 'u':
619 r = strv_extend(&arg_system_units, optarg);
620 if (r < 0)
621 return log_oom();
622 break;
623
624 case ARG_USER_UNIT:
625 r = strv_extend(&arg_user_units, optarg);
626 if (r < 0)
627 return log_oom();
628 break;
629
630 case 'F':
631 arg_field = optarg;
632 break;
633
634 case 'x':
635 arg_catalog = true;
636 break;
637
638 case ARG_LIST_CATALOG:
639 arg_action = ACTION_LIST_CATALOG;
640 break;
641
642 case ARG_DUMP_CATALOG:
643 arg_action = ACTION_DUMP_CATALOG;
644 break;
645
646 case ARG_UPDATE_CATALOG:
647 arg_action = ACTION_UPDATE_CATALOG;
648 break;
649
650 case 'r':
651 arg_reverse = true;
652 break;
653
654 case ARG_UTC:
655 arg_utc = true;
656 break;
657
658 case '?':
659 return -EINVAL;
660
661 default:
662 assert_not_reached("Unhandled option");
663 }
664
665 if (arg_follow && !arg_no_tail && arg_lines < -1)
666 arg_lines = 10;
667
668 if (!!arg_directory + !!arg_file + !!arg_machine > 1) {
669 log_error("Please specify either -D/--directory= or --file= or -M/--machine=, not more than one.");
670 return -EINVAL;
671 }
672
673 if (arg_since_set && arg_until_set && arg_since > arg_until) {
674 log_error("--since= must be before --until=.");
675 return -EINVAL;
676 }
677
678 if (!!arg_cursor + !!arg_after_cursor + !!arg_since_set > 1) {
679 log_error("Please specify only one of --since=, --cursor=, and --after-cursor.");
680 return -EINVAL;
681 }
682
683 if (arg_follow && arg_reverse) {
684 log_error("Please specify either --reverse= or --follow=, not both.");
685 return -EINVAL;
686 }
687
688 if (arg_action != ACTION_SHOW && optind < argc) {
689 log_error("Extraneous arguments starting with '%s'", argv[optind]);
690 return -EINVAL;
691 }
692
693 return 1;
694 }
695
696 static int generate_new_id128(void) {
697 sd_id128_t id;
698 int r;
699 unsigned i;
700
701 r = sd_id128_randomize(&id);
702 if (r < 0) {
703 log_error("Failed to generate ID: %s", strerror(-r));
704 return r;
705 }
706
707 printf("As string:\n"
708 SD_ID128_FORMAT_STR "\n\n"
709 "As UUID:\n"
710 "%02x%02x%02x%02x-%02x%02x-%02x%02x-%02x%02x-%02x%02x%02x%02x%02x%02x\n\n"
711 "As macro:\n"
712 "#define MESSAGE_XYZ SD_ID128_MAKE(",
713 SD_ID128_FORMAT_VAL(id),
714 SD_ID128_FORMAT_VAL(id));
715 for (i = 0; i < 16; i++)
716 printf("%02x%s", id.bytes[i], i != 15 ? "," : "");
717 fputs(")\n\n", stdout);
718
719 printf("As Python constant:\n"
720 ">>> import uuid\n"
721 ">>> MESSAGE_XYZ = uuid.UUID('" SD_ID128_FORMAT_STR "')\n",
722 SD_ID128_FORMAT_VAL(id));
723
724 return 0;
725 }
726
727 static int add_matches(sd_journal *j, char **args) {
728 char **i;
729 bool have_term = false;
730
731 assert(j);
732
733 STRV_FOREACH(i, args) {
734 int r;
735
736 if (streq(*i, "+")) {
737 if (!have_term)
738 break;
739 r = sd_journal_add_disjunction(j);
740 have_term = false;
741
742 } else if (path_is_absolute(*i)) {
743 _cleanup_free_ char *p, *t = NULL, *t2 = NULL;
744 const char *path;
745 _cleanup_free_ char *interpreter = NULL;
746 struct stat st;
747
748 p = canonicalize_file_name(*i);
749 path = p ? p : *i;
750
751 if (stat(path, &st) < 0) {
752 log_error("Couldn't stat file: %m");
753 return -errno;
754 }
755
756 if (S_ISREG(st.st_mode) && (0111 & st.st_mode)) {
757 if (executable_is_script(path, &interpreter) > 0) {
758 _cleanup_free_ char *comm;
759
760 comm = strndup(basename(path), 15);
761 if (!comm)
762 return log_oom();
763
764 t = strappend("_COMM=", comm);
765
766 /* Append _EXE only if the interpreter is not a link.
767 Otherwise, it might be outdated often. */
768 if (lstat(interpreter, &st) == 0 &&
769 !S_ISLNK(st.st_mode)) {
770 t2 = strappend("_EXE=", interpreter);
771 if (!t2)
772 return log_oom();
773 }
774 } else
775 t = strappend("_EXE=", path);
776 } else if (S_ISCHR(st.st_mode)) {
777 if (asprintf(&t, "_KERNEL_DEVICE=c%u:%u",
778 major(st.st_rdev),
779 minor(st.st_rdev)) < 0)
780 return -ENOMEM;
781 } else if (S_ISBLK(st.st_mode)) {
782 if (asprintf(&t, "_KERNEL_DEVICE=b%u:%u",
783 major(st.st_rdev),
784 minor(st.st_rdev)) < 0)
785 return -ENOMEM;
786 } else {
787 log_error("File is neither a device node, nor regular file, nor executable: %s", *i);
788 return -EINVAL;
789 }
790
791 if (!t)
792 return log_oom();
793
794 r = sd_journal_add_match(j, t, 0);
795 if (t2)
796 r = sd_journal_add_match(j, t2, 0);
797 have_term = true;
798
799 } else {
800 r = sd_journal_add_match(j, *i, 0);
801 have_term = true;
802 }
803
804 if (r < 0) {
805 log_error("Failed to add match '%s': %s", *i, strerror(-r));
806 return r;
807 }
808 }
809
810 if (!strv_isempty(args) && !have_term) {
811 log_error("\"+\" can only be used between terms");
812 return -EINVAL;
813 }
814
815 return 0;
816 }
817
818 static int boot_id_cmp(const void *a, const void *b) {
819 uint64_t _a, _b;
820
821 _a = ((const boot_id_t *)a)->first;
822 _b = ((const boot_id_t *)b)->first;
823
824 return _a < _b ? -1 : (_a > _b ? 1 : 0);
825 }
826
827 static int list_boots(sd_journal *j) {
828 int r;
829 const void *data;
830 unsigned int count = 0;
831 int w, i;
832 size_t length, allocated = 0;
833 boot_id_t *id;
834 _cleanup_free_ boot_id_t *all_ids = NULL;
835
836 r = sd_journal_query_unique(j, "_BOOT_ID");
837 if (r < 0)
838 return r;
839
840 SD_JOURNAL_FOREACH_UNIQUE(j, data, length) {
841 if (length < strlen("_BOOT_ID="))
842 continue;
843
844 if (!GREEDY_REALLOC(all_ids, allocated, count + 1))
845 return log_oom();
846
847 id = &all_ids[count];
848
849 r = sd_id128_from_string(((const char *)data) + strlen("_BOOT_ID="), &id->id);
850 if (r < 0)
851 continue;
852
853 r = sd_journal_add_match(j, data, length);
854 if (r < 0)
855 return r;
856
857 r = sd_journal_seek_head(j);
858 if (r < 0)
859 return r;
860
861 r = sd_journal_next(j);
862 if (r < 0)
863 return r;
864 else if (r == 0)
865 goto flush;
866
867 r = sd_journal_get_realtime_usec(j, &id->first);
868 if (r < 0)
869 return r;
870
871 r = sd_journal_seek_tail(j);
872 if (r < 0)
873 return r;
874
875 r = sd_journal_previous(j);
876 if (r < 0)
877 return r;
878 else if (r == 0)
879 goto flush;
880
881 r = sd_journal_get_realtime_usec(j, &id->last);
882 if (r < 0)
883 return r;
884
885 count++;
886 flush:
887 sd_journal_flush_matches(j);
888 }
889
890 qsort_safe(all_ids, count, sizeof(boot_id_t), boot_id_cmp);
891
892 /* numbers are one less, but we need an extra char for the sign */
893 w = DECIMAL_STR_WIDTH(count - 1) + 1;
894
895 for (id = all_ids, i = 0; id < all_ids + count; id++, i++) {
896 char a[FORMAT_TIMESTAMP_MAX], b[FORMAT_TIMESTAMP_MAX];
897
898 printf("% *i " SD_ID128_FORMAT_STR " %s—%s\n",
899 w, i - count + 1,
900 SD_ID128_FORMAT_VAL(id->id),
901 format_timestamp_maybe_utc(a, sizeof(a), id->first),
902 format_timestamp_maybe_utc(b, sizeof(b), id->last));
903 }
904
905 return 0;
906 }
907
908 static int get_relative_boot_id(sd_journal *j, sd_id128_t *boot_id, int relative) {
909 int r;
910 const void *data;
911 unsigned int count = 0;
912 size_t length, allocated = 0;
913 boot_id_t ref_boot_id = {SD_ID128_NULL}, *id;
914 _cleanup_free_ boot_id_t *all_ids = NULL;
915
916 assert(j);
917 assert(boot_id);
918
919 r = sd_journal_query_unique(j, "_BOOT_ID");
920 if (r < 0)
921 return r;
922
923 SD_JOURNAL_FOREACH_UNIQUE(j, data, length) {
924 if (length < strlen("_BOOT_ID="))
925 continue;
926
927 if (!GREEDY_REALLOC(all_ids, allocated, count + 1))
928 return log_oom();
929
930 id = &all_ids[count];
931
932 r = sd_id128_from_string(((const char *)data) + strlen("_BOOT_ID="), &id->id);
933 if (r < 0)
934 continue;
935
936 r = sd_journal_add_match(j, data, length);
937 if (r < 0)
938 return r;
939
940 r = sd_journal_seek_head(j);
941 if (r < 0)
942 return r;
943
944 r = sd_journal_next(j);
945 if (r < 0)
946 return r;
947 else if (r == 0)
948 goto flush;
949
950 r = sd_journal_get_realtime_usec(j, &id->first);
951 if (r < 0)
952 return r;
953
954 if (sd_id128_equal(id->id, *boot_id))
955 ref_boot_id = *id;
956
957 count++;
958 flush:
959 sd_journal_flush_matches(j);
960 }
961
962 qsort_safe(all_ids, count, sizeof(boot_id_t), boot_id_cmp);
963
964 if (sd_id128_equal(*boot_id, SD_ID128_NULL)) {
965 if (relative > (int) count || relative <= -(int)count)
966 return -EADDRNOTAVAIL;
967
968 *boot_id = all_ids[(relative <= 0)*count + relative - 1].id;
969 } else {
970 id = bsearch(&ref_boot_id, all_ids, count, sizeof(boot_id_t), boot_id_cmp);
971
972 if (!id ||
973 relative <= 0 ? (id - all_ids) + relative < 0 :
974 (id - all_ids) + relative >= (int) count)
975 return -EADDRNOTAVAIL;
976
977 *boot_id = (id + relative)->id;
978 }
979
980 return 0;
981 }
982
983 static int add_boot(sd_journal *j) {
984 char match[9+32+1] = "_BOOT_ID=";
985 int r;
986
987 assert(j);
988
989 if (!arg_boot)
990 return 0;
991
992 if (arg_boot_offset == 0 && sd_id128_equal(arg_boot_id, SD_ID128_NULL))
993 return add_match_this_boot(j, arg_machine);
994
995 r = get_relative_boot_id(j, &arg_boot_id, arg_boot_offset);
996 if (r < 0) {
997 if (sd_id128_equal(arg_boot_id, SD_ID128_NULL))
998 log_error("Failed to look up boot %+i: %s", arg_boot_offset, strerror(-r));
999 else
1000 log_error("Failed to look up boot ID "SD_ID128_FORMAT_STR"%+i: %s",
1001 SD_ID128_FORMAT_VAL(arg_boot_id), arg_boot_offset, strerror(-r));
1002 return r;
1003 }
1004
1005 sd_id128_to_string(arg_boot_id, match + 9);
1006
1007 r = sd_journal_add_match(j, match, sizeof(match) - 1);
1008 if (r < 0) {
1009 log_error("Failed to add match: %s", strerror(-r));
1010 return r;
1011 }
1012
1013 r = sd_journal_add_conjunction(j);
1014 if (r < 0)
1015 return r;
1016
1017 return 0;
1018 }
1019
1020 static int add_dmesg(sd_journal *j) {
1021 int r;
1022 assert(j);
1023
1024 if (!arg_dmesg)
1025 return 0;
1026
1027 r = sd_journal_add_match(j, "_TRANSPORT=kernel", strlen("_TRANSPORT=kernel"));
1028 if (r < 0) {
1029 log_error("Failed to add match: %s", strerror(-r));
1030 return r;
1031 }
1032
1033 r = sd_journal_add_conjunction(j);
1034 if (r < 0)
1035 return r;
1036
1037 return 0;
1038 }
1039
1040 static int get_possible_units(sd_journal *j,
1041 const char *fields,
1042 char **patterns,
1043 Set **units) {
1044 _cleanup_set_free_free_ Set *found;
1045 const char *field;
1046 int r;
1047
1048 found = set_new(&string_hash_ops);
1049 if (!found)
1050 return log_oom();
1051
1052 NULSTR_FOREACH(field, fields) {
1053 const void *data;
1054 size_t size;
1055
1056 r = sd_journal_query_unique(j, field);
1057 if (r < 0)
1058 return r;
1059
1060 SD_JOURNAL_FOREACH_UNIQUE(j, data, size) {
1061 char **pattern, *eq;
1062 size_t prefix;
1063 _cleanup_free_ char *u = NULL;
1064
1065 eq = memchr(data, '=', size);
1066 if (eq)
1067 prefix = eq - (char*) data + 1;
1068 else
1069 prefix = 0;
1070
1071 u = strndup((char*) data + prefix, size - prefix);
1072 if (!u)
1073 return log_oom();
1074
1075 STRV_FOREACH(pattern, patterns)
1076 if (fnmatch(*pattern, u, FNM_NOESCAPE) == 0) {
1077 log_debug("Matched %s with pattern %s=%s", u, field, *pattern);
1078
1079 r = set_consume(found, u);
1080 u = NULL;
1081 if (r < 0 && r != -EEXIST)
1082 return r;
1083
1084 break;
1085 }
1086 }
1087 }
1088
1089 *units = found;
1090 found = NULL;
1091 return 0;
1092 }
1093
1094 /* This list is supposed to return the superset of unit names
1095 * possibly matched by rules added with add_matches_for_unit... */
1096 #define SYSTEM_UNITS \
1097 "_SYSTEMD_UNIT\0" \
1098 "COREDUMP_UNIT\0" \
1099 "UNIT\0" \
1100 "OBJECT_SYSTEMD_UNIT\0" \
1101 "_SYSTEMD_SLICE\0"
1102
1103 /* ... and add_matches_for_user_unit */
1104 #define USER_UNITS \
1105 "_SYSTEMD_USER_UNIT\0" \
1106 "USER_UNIT\0" \
1107 "COREDUMP_USER_UNIT\0" \
1108 "OBJECT_SYSTEMD_USER_UNIT\0"
1109
1110 static int add_units(sd_journal *j) {
1111 _cleanup_strv_free_ char **patterns = NULL;
1112 int r, count = 0;
1113 char **i;
1114
1115 assert(j);
1116
1117 STRV_FOREACH(i, arg_system_units) {
1118 _cleanup_free_ char *u = NULL;
1119
1120 u = unit_name_mangle(*i, MANGLE_GLOB);
1121 if (!u)
1122 return log_oom();
1123
1124 if (string_is_glob(u)) {
1125 r = strv_push(&patterns, u);
1126 if (r < 0)
1127 return r;
1128 u = NULL;
1129 } else {
1130 r = add_matches_for_unit(j, u);
1131 if (r < 0)
1132 return r;
1133 r = sd_journal_add_disjunction(j);
1134 if (r < 0)
1135 return r;
1136 count ++;
1137 }
1138 }
1139
1140 if (!strv_isempty(patterns)) {
1141 _cleanup_set_free_free_ Set *units = NULL;
1142 Iterator it;
1143 char *u;
1144
1145 r = get_possible_units(j, SYSTEM_UNITS, patterns, &units);
1146 if (r < 0)
1147 return r;
1148
1149 SET_FOREACH(u, units, it) {
1150 r = add_matches_for_unit(j, u);
1151 if (r < 0)
1152 return r;
1153 r = sd_journal_add_disjunction(j);
1154 if (r < 0)
1155 return r;
1156 count ++;
1157 }
1158 }
1159
1160 strv_free(patterns);
1161 patterns = NULL;
1162
1163 STRV_FOREACH(i, arg_user_units) {
1164 _cleanup_free_ char *u = NULL;
1165
1166 u = unit_name_mangle(*i, MANGLE_GLOB);
1167 if (!u)
1168 return log_oom();
1169
1170 if (string_is_glob(u)) {
1171 r = strv_push(&patterns, u);
1172 if (r < 0)
1173 return r;
1174 u = NULL;
1175 } else {
1176 r = add_matches_for_user_unit(j, u, getuid());
1177 if (r < 0)
1178 return r;
1179 r = sd_journal_add_disjunction(j);
1180 if (r < 0)
1181 return r;
1182 count ++;
1183 }
1184 }
1185
1186 if (!strv_isempty(patterns)) {
1187 _cleanup_set_free_free_ Set *units = NULL;
1188 Iterator it;
1189 char *u;
1190
1191 r = get_possible_units(j, USER_UNITS, patterns, &units);
1192 if (r < 0)
1193 return r;
1194
1195 SET_FOREACH(u, units, it) {
1196 r = add_matches_for_user_unit(j, u, getuid());
1197 if (r < 0)
1198 return r;
1199 r = sd_journal_add_disjunction(j);
1200 if (r < 0)
1201 return r;
1202 count ++;
1203 }
1204 }
1205
1206 /* Complain if the user request matches but nothing whatsoever was
1207 * found, since otherwise everything would be matched. */
1208 if (!(strv_isempty(arg_system_units) && strv_isempty(arg_user_units)) && count == 0)
1209 return -ENODATA;
1210
1211 r = sd_journal_add_conjunction(j);
1212 if (r < 0)
1213 return r;
1214
1215 return 0;
1216 }
1217
1218 static int add_priorities(sd_journal *j) {
1219 char match[] = "PRIORITY=0";
1220 int i, r;
1221 assert(j);
1222
1223 if (arg_priorities == 0xFF)
1224 return 0;
1225
1226 for (i = LOG_EMERG; i <= LOG_DEBUG; i++)
1227 if (arg_priorities & (1 << i)) {
1228 match[sizeof(match)-2] = '0' + i;
1229
1230 r = sd_journal_add_match(j, match, strlen(match));
1231 if (r < 0) {
1232 log_error("Failed to add match: %s", strerror(-r));
1233 return r;
1234 }
1235 }
1236
1237 r = sd_journal_add_conjunction(j);
1238 if (r < 0)
1239 return r;
1240
1241 return 0;
1242 }
1243
1244
1245 static int add_syslog_identifier(sd_journal *j) {
1246 int r;
1247 char **i;
1248
1249 assert(j);
1250
1251 STRV_FOREACH(i, arg_syslog_identifier) {
1252 char *u;
1253
1254 u = strappenda("SYSLOG_IDENTIFIER=", *i);
1255 r = sd_journal_add_match(j, u, 0);
1256 if (r < 0)
1257 return r;
1258 r = sd_journal_add_disjunction(j);
1259 if (r < 0)
1260 return r;
1261 }
1262
1263 r = sd_journal_add_conjunction(j);
1264 if (r < 0)
1265 return r;
1266
1267 return 0;
1268 }
1269
1270 static int setup_keys(void) {
1271 #ifdef HAVE_GCRYPT
1272 size_t mpk_size, seed_size, state_size, i;
1273 uint8_t *mpk, *seed, *state;
1274 ssize_t l;
1275 int fd = -1, r, attr = 0;
1276 sd_id128_t machine, boot;
1277 char *p = NULL, *k = NULL;
1278 struct FSSHeader h;
1279 uint64_t n;
1280 struct stat st;
1281
1282 r = stat("/var/log/journal", &st);
1283 if (r < 0 && errno != ENOENT && errno != ENOTDIR) {
1284 log_error("stat(\"%s\") failed: %m", "/var/log/journal");
1285 return -errno;
1286 }
1287
1288 if (r < 0 || !S_ISDIR(st.st_mode)) {
1289 log_error("%s is not a directory, must be using persistent logging for FSS.",
1290 "/var/log/journal");
1291 return r < 0 ? -errno : -ENOTDIR;
1292 }
1293
1294 r = sd_id128_get_machine(&machine);
1295 if (r < 0) {
1296 log_error("Failed to get machine ID: %s", strerror(-r));
1297 return r;
1298 }
1299
1300 r = sd_id128_get_boot(&boot);
1301 if (r < 0) {
1302 log_error("Failed to get boot ID: %s", strerror(-r));
1303 return r;
1304 }
1305
1306 if (asprintf(&p, "/var/log/journal/" SD_ID128_FORMAT_STR "/fss",
1307 SD_ID128_FORMAT_VAL(machine)) < 0)
1308 return log_oom();
1309
1310 if (access(p, F_OK) >= 0) {
1311 if (arg_force) {
1312 r = unlink(p);
1313 if (r < 0) {
1314 log_error("unlink(\"%s\") failed: %m", p);
1315 r = -errno;
1316 goto finish;
1317 }
1318 } else {
1319 log_error("Sealing key file %s exists already. (--force to recreate)", p);
1320 r = -EEXIST;
1321 goto finish;
1322 }
1323 }
1324
1325 if (asprintf(&k, "/var/log/journal/" SD_ID128_FORMAT_STR "/fss.tmp.XXXXXX",
1326 SD_ID128_FORMAT_VAL(machine)) < 0) {
1327 r = log_oom();
1328 goto finish;
1329 }
1330
1331 mpk_size = FSPRG_mskinbytes(FSPRG_RECOMMENDED_SECPAR);
1332 mpk = alloca(mpk_size);
1333
1334 seed_size = FSPRG_RECOMMENDED_SEEDLEN;
1335 seed = alloca(seed_size);
1336
1337 state_size = FSPRG_stateinbytes(FSPRG_RECOMMENDED_SECPAR);
1338 state = alloca(state_size);
1339
1340 fd = open("/dev/random", O_RDONLY|O_CLOEXEC|O_NOCTTY);
1341 if (fd < 0) {
1342 log_error("Failed to open /dev/random: %m");
1343 r = -errno;
1344 goto finish;
1345 }
1346
1347 log_info("Generating seed...");
1348 l = loop_read(fd, seed, seed_size, true);
1349 if (l < 0 || (size_t) l != seed_size) {
1350 log_error("Failed to read random seed: %s", strerror(EIO));
1351 r = -EIO;
1352 goto finish;
1353 }
1354
1355 log_info("Generating key pair...");
1356 FSPRG_GenMK(NULL, mpk, seed, seed_size, FSPRG_RECOMMENDED_SECPAR);
1357
1358 log_info("Generating sealing key...");
1359 FSPRG_GenState0(state, mpk, seed, seed_size);
1360
1361 assert(arg_interval > 0);
1362
1363 n = now(CLOCK_REALTIME);
1364 n /= arg_interval;
1365
1366 safe_close(fd);
1367 fd = mkostemp_safe(k, O_WRONLY|O_CLOEXEC);
1368 if (fd < 0) {
1369 log_error("Failed to open %s: %m", k);
1370 r = -errno;
1371 goto finish;
1372 }
1373
1374 /* Enable secure remove, exclusion from dump, synchronous
1375 * writing and in-place updating */
1376 if (ioctl(fd, FS_IOC_GETFLAGS, &attr) < 0)
1377 log_warning("FS_IOC_GETFLAGS failed: %m");
1378
1379 attr |= FS_SECRM_FL|FS_NODUMP_FL|FS_SYNC_FL|FS_NOCOW_FL;
1380
1381 if (ioctl(fd, FS_IOC_SETFLAGS, &attr) < 0)
1382 log_warning("FS_IOC_SETFLAGS failed: %m");
1383
1384 zero(h);
1385 memcpy(h.signature, "KSHHRHLP", 8);
1386 h.machine_id = machine;
1387 h.boot_id = boot;
1388 h.header_size = htole64(sizeof(h));
1389 h.start_usec = htole64(n * arg_interval);
1390 h.interval_usec = htole64(arg_interval);
1391 h.fsprg_secpar = htole16(FSPRG_RECOMMENDED_SECPAR);
1392 h.fsprg_state_size = htole64(state_size);
1393
1394 l = loop_write(fd, &h, sizeof(h), false);
1395 if (l < 0 || (size_t) l != sizeof(h)) {
1396 log_error("Failed to write header: %s", strerror(EIO));
1397 r = -EIO;
1398 goto finish;
1399 }
1400
1401 l = loop_write(fd, state, state_size, false);
1402 if (l < 0 || (size_t) l != state_size) {
1403 log_error("Failed to write state: %s", strerror(EIO));
1404 r = -EIO;
1405 goto finish;
1406 }
1407
1408 if (link(k, p) < 0) {
1409 log_error("Failed to link file: %m");
1410 r = -errno;
1411 goto finish;
1412 }
1413
1414 if (on_tty()) {
1415 fprintf(stderr,
1416 "\n"
1417 "The new key pair has been generated. The " ANSI_HIGHLIGHT_ON "secret sealing key" ANSI_HIGHLIGHT_OFF " has been written to\n"
1418 "the following local file. This key file is automatically updated when the\n"
1419 "sealing key is advanced. It should not be used on multiple hosts.\n"
1420 "\n"
1421 "\t%s\n"
1422 "\n"
1423 "Please write down the following " ANSI_HIGHLIGHT_ON "secret verification key" ANSI_HIGHLIGHT_OFF ". It should be stored\n"
1424 "at a safe location and should not be saved locally on disk.\n"
1425 "\n\t" ANSI_HIGHLIGHT_RED_ON, p);
1426 fflush(stderr);
1427 }
1428 for (i = 0; i < seed_size; i++) {
1429 if (i > 0 && i % 3 == 0)
1430 putchar('-');
1431 printf("%02x", ((uint8_t*) seed)[i]);
1432 }
1433
1434 printf("/%llx-%llx\n", (unsigned long long) n, (unsigned long long) arg_interval);
1435
1436 if (on_tty()) {
1437 char tsb[FORMAT_TIMESPAN_MAX], *hn;
1438
1439 fprintf(stderr,
1440 ANSI_HIGHLIGHT_OFF "\n"
1441 "The sealing key is automatically changed every %s.\n",
1442 format_timespan(tsb, sizeof(tsb), arg_interval, 0));
1443
1444 hn = gethostname_malloc();
1445
1446 if (hn) {
1447 hostname_cleanup(hn, false);
1448 fprintf(stderr, "\nThe keys have been generated for host %s/" SD_ID128_FORMAT_STR ".\n", hn, SD_ID128_FORMAT_VAL(machine));
1449 } else
1450 fprintf(stderr, "\nThe keys have been generated for host " SD_ID128_FORMAT_STR ".\n", SD_ID128_FORMAT_VAL(machine));
1451
1452 #ifdef HAVE_QRENCODE
1453 /* If this is not an UTF-8 system don't print any QR codes */
1454 if (is_locale_utf8()) {
1455 fputs("\nTo transfer the verification key to your phone please scan the QR code below:\n\n", stderr);
1456 print_qr_code(stderr, seed, seed_size, n, arg_interval, hn, machine);
1457 }
1458 #endif
1459 free(hn);
1460 }
1461
1462 r = 0;
1463
1464 finish:
1465 safe_close(fd);
1466
1467 if (k) {
1468 unlink(k);
1469 free(k);
1470 }
1471
1472 free(p);
1473
1474 return r;
1475 #else
1476 log_error("Forward-secure sealing not available.");
1477 return -ENOTSUP;
1478 #endif
1479 }
1480
1481 static int verify(sd_journal *j) {
1482 int r = 0;
1483 Iterator i;
1484 JournalFile *f;
1485
1486 assert(j);
1487
1488 log_show_color(true);
1489
1490 HASHMAP_FOREACH(f, j->files, i) {
1491 int k;
1492 usec_t first, validated, last;
1493
1494 #ifdef HAVE_GCRYPT
1495 if (!arg_verify_key && JOURNAL_HEADER_SEALED(f->header))
1496 log_notice("Journal file %s has sealing enabled but verification key has not been passed using --verify-key=.", f->path);
1497 #endif
1498
1499 k = journal_file_verify(f, arg_verify_key, &first, &validated, &last, true);
1500 if (k == -EINVAL) {
1501 /* If the key was invalid give up right-away. */
1502 return k;
1503 } else if (k < 0) {
1504 log_warning("FAIL: %s (%s)", f->path, strerror(-k));
1505 r = k;
1506 } else {
1507 char a[FORMAT_TIMESTAMP_MAX], b[FORMAT_TIMESTAMP_MAX], c[FORMAT_TIMESPAN_MAX];
1508 log_info("PASS: %s", f->path);
1509
1510 if (arg_verify_key && JOURNAL_HEADER_SEALED(f->header)) {
1511 if (validated > 0) {
1512 log_info("=> Validated from %s to %s, final %s entries not sealed.",
1513 format_timestamp_maybe_utc(a, sizeof(a), first),
1514 format_timestamp_maybe_utc(b, sizeof(b), validated),
1515 format_timespan(c, sizeof(c), last > validated ? last - validated : 0, 0));
1516 } else if (last > 0)
1517 log_info("=> No sealing yet, %s of entries not sealed.",
1518 format_timespan(c, sizeof(c), last - first, 0));
1519 else
1520 log_info("=> No sealing yet, no entries in file.");
1521 }
1522 }
1523 }
1524
1525 return r;
1526 }
1527
1528 #ifdef HAVE_ACL
1529 static int access_check_var_log_journal(sd_journal *j) {
1530 _cleanup_strv_free_ char **g = NULL;
1531 bool have_access;
1532 int r;
1533
1534 assert(j);
1535
1536 have_access = in_group("systemd-journal") > 0;
1537
1538 if (!have_access) {
1539 /* Let's enumerate all groups from the default ACL of
1540 * the directory, which generally should allow access
1541 * to most journal files too */
1542 r = search_acl_groups(&g, "/var/log/journal/", &have_access);
1543 if (r < 0)
1544 return r;
1545 }
1546
1547 if (!have_access) {
1548
1549 if (strv_isempty(g))
1550 log_notice("Hint: You are currently not seeing messages from other users and the system.\n"
1551 " Users in the 'systemd-journal' group can see all messages. Pass -q to\n"
1552 " turn off this notice.");
1553 else {
1554 _cleanup_free_ char *s = NULL;
1555
1556 r = strv_extend(&g, "systemd-journal");
1557 if (r < 0)
1558 return log_oom();
1559
1560 strv_sort(g);
1561 strv_uniq(g);
1562
1563 s = strv_join(g, "', '");
1564 if (!s)
1565 return log_oom();
1566
1567 log_notice("Hint: You are currently not seeing messages from other users and the system.\n"
1568 " Users in the groups '%s' can see all messages.\n"
1569 " Pass -q to turn off this notice.", s);
1570 }
1571 }
1572
1573 return 0;
1574 }
1575 #endif
1576
1577 static int access_check(sd_journal *j) {
1578 Iterator it;
1579 void *code;
1580 int r = 0;
1581
1582 assert(j);
1583
1584 if (set_isempty(j->errors)) {
1585 if (hashmap_isempty(j->files))
1586 log_notice("No journal files were found.");
1587 return 0;
1588 }
1589
1590 if (set_contains(j->errors, INT_TO_PTR(-EACCES))) {
1591 #ifdef HAVE_ACL
1592 /* If /var/log/journal doesn't even exist,
1593 * unprivileged users have no access at all */
1594 if (access("/var/log/journal", F_OK) < 0 &&
1595 geteuid() != 0 &&
1596 in_group("systemd-journal") <= 0) {
1597 log_error("Unprivileged users cannot access messages, unless persistent log storage is\n"
1598 "enabled. Users in the 'systemd-journal' group may always access messages.");
1599 return -EACCES;
1600 }
1601
1602 /* If /var/log/journal exists, try to pring a nice
1603 notice if the user lacks access to it */
1604 if (!arg_quiet && geteuid() != 0) {
1605 r = access_check_var_log_journal(j);
1606 if (r < 0)
1607 return r;
1608 }
1609 #else
1610 if (geteuid() != 0 && in_group("systemd-journal") <= 0) {
1611 log_error("Unprivileged users cannot access messages. Users in the 'systemd-journal' group\n"
1612 "group may access messages.");
1613 return -EACCES;
1614 }
1615 #endif
1616
1617 if (hashmap_isempty(j->files)) {
1618 log_error("No journal files were opened due to insufficient permissions.");
1619 r = -EACCES;
1620 }
1621 }
1622
1623 SET_FOREACH(code, j->errors, it) {
1624 int err;
1625
1626 err = -PTR_TO_INT(code);
1627 assert(err > 0);
1628
1629 if (err != EACCES)
1630 log_warning("Error was encountered while opening journal files: %s",
1631 strerror(err));
1632 }
1633
1634 return r;
1635 }
1636
1637 int main(int argc, char *argv[]) {
1638 int r;
1639 _cleanup_journal_close_ sd_journal *j = NULL;
1640 bool need_seek = false;
1641 sd_id128_t previous_boot_id;
1642 bool previous_boot_id_valid = false, first_line = true;
1643 int n_shown = 0;
1644 bool ellipsized = false;
1645
1646 setlocale(LC_ALL, "");
1647 log_parse_environment();
1648 log_open();
1649
1650 r = parse_argv(argc, argv);
1651 if (r <= 0)
1652 goto finish;
1653
1654 signal(SIGWINCH, columns_lines_cache_reset);
1655
1656 if (arg_action == ACTION_NEW_ID128) {
1657 r = generate_new_id128();
1658 goto finish;
1659 }
1660
1661 if (arg_action == ACTION_SETUP_KEYS) {
1662 r = setup_keys();
1663 goto finish;
1664 }
1665
1666 if (arg_action == ACTION_UPDATE_CATALOG ||
1667 arg_action == ACTION_LIST_CATALOG ||
1668 arg_action == ACTION_DUMP_CATALOG) {
1669
1670 _cleanup_free_ char *database;
1671
1672 database = path_join(arg_root, CATALOG_DATABASE, NULL);
1673 if (!database) {
1674 r = log_oom();
1675 goto finish;
1676 }
1677
1678 if (arg_action == ACTION_UPDATE_CATALOG) {
1679 r = catalog_update(database, arg_root, catalog_file_dirs);
1680 if (r < 0)
1681 log_error("Failed to list catalog: %s", strerror(-r));
1682 } else {
1683 bool oneline = arg_action == ACTION_LIST_CATALOG;
1684
1685 if (optind < argc)
1686 r = catalog_list_items(stdout, database,
1687 oneline, argv + optind);
1688 else
1689 r = catalog_list(stdout, database, oneline);
1690 if (r < 0)
1691 log_error("Failed to list catalog: %s", strerror(-r));
1692 }
1693
1694 goto finish;
1695 }
1696
1697 if (arg_directory)
1698 r = sd_journal_open_directory(&j, arg_directory, arg_journal_type);
1699 else if (arg_file)
1700 r = sd_journal_open_files(&j, (const char**) arg_file, 0);
1701 else if (arg_machine)
1702 r = sd_journal_open_container(&j, arg_machine, 0);
1703 else
1704 r = sd_journal_open(&j, !arg_merge*SD_JOURNAL_LOCAL_ONLY + arg_journal_type);
1705 if (r < 0) {
1706 log_error("Failed to open %s: %s",
1707 arg_directory ? arg_directory : arg_file ? "files" : "journal",
1708 strerror(-r));
1709 return EXIT_FAILURE;
1710 }
1711
1712 r = access_check(j);
1713 if (r < 0)
1714 return EXIT_FAILURE;
1715
1716 if (arg_action == ACTION_VERIFY) {
1717 r = verify(j);
1718 goto finish;
1719 }
1720
1721 if (arg_action == ACTION_PRINT_HEADER) {
1722 journal_print_header(j);
1723 return EXIT_SUCCESS;
1724 }
1725
1726 if (arg_action == ACTION_DISK_USAGE) {
1727 uint64_t bytes = 0;
1728 char sbytes[FORMAT_BYTES_MAX];
1729
1730 r = sd_journal_get_usage(j, &bytes);
1731 if (r < 0)
1732 return EXIT_FAILURE;
1733
1734 printf("Journals take up %s on disk.\n",
1735 format_bytes(sbytes, sizeof(sbytes), bytes));
1736 return EXIT_SUCCESS;
1737 }
1738
1739 if (arg_action == ACTION_LIST_BOOTS) {
1740 r = list_boots(j);
1741 goto finish;
1742 }
1743
1744 /* add_boot() must be called first!
1745 * It may need to seek the journal to find parent boot IDs. */
1746 r = add_boot(j);
1747 if (r < 0)
1748 return EXIT_FAILURE;
1749
1750 r = add_dmesg(j);
1751 if (r < 0)
1752 return EXIT_FAILURE;
1753
1754 r = add_units(j);
1755 strv_free(arg_system_units);
1756 strv_free(arg_user_units);
1757
1758 if (r < 0) {
1759 log_error("Failed to add filter for units: %s", strerror(-r));
1760 return EXIT_FAILURE;
1761 }
1762
1763 r = add_syslog_identifier(j);
1764 if (r < 0) {
1765 log_error("Failed to add filter for syslog identifiers: %s", strerror(-r));
1766 return EXIT_FAILURE;
1767 }
1768
1769 r = add_priorities(j);
1770 if (r < 0) {
1771 log_error("Failed to add filter for priorities: %s", strerror(-r));
1772 return EXIT_FAILURE;
1773 }
1774
1775 r = add_matches(j, argv + optind);
1776 if (r < 0) {
1777 log_error("Failed to add filters: %s", strerror(-r));
1778 return EXIT_FAILURE;
1779 }
1780
1781 if (_unlikely_(log_get_max_level() >= LOG_PRI(LOG_DEBUG))) {
1782 _cleanup_free_ char *filter;
1783
1784 filter = journal_make_match_string(j);
1785 log_debug("Journal filter: %s", filter);
1786 }
1787
1788 if (arg_field) {
1789 const void *data;
1790 size_t size;
1791
1792 r = sd_journal_set_data_threshold(j, 0);
1793 if (r < 0) {
1794 log_error("Failed to unset data size threshold");
1795 return EXIT_FAILURE;
1796 }
1797
1798 r = sd_journal_query_unique(j, arg_field);
1799 if (r < 0) {
1800 log_error("Failed to query unique data objects: %s", strerror(-r));
1801 return EXIT_FAILURE;
1802 }
1803
1804 SD_JOURNAL_FOREACH_UNIQUE(j, data, size) {
1805 const void *eq;
1806
1807 if (arg_lines >= 0 && n_shown >= arg_lines)
1808 break;
1809
1810 eq = memchr(data, '=', size);
1811 if (eq)
1812 printf("%.*s\n", (int) (size - ((const uint8_t*) eq - (const uint8_t*) data + 1)), (const char*) eq + 1);
1813 else
1814 printf("%.*s\n", (int) size, (const char*) data);
1815
1816 n_shown ++;
1817 }
1818
1819 return EXIT_SUCCESS;
1820 }
1821
1822 /* Opening the fd now means the first sd_journal_wait() will actually wait */
1823 if (arg_follow) {
1824 r = sd_journal_get_fd(j);
1825 if (r < 0)
1826 return EXIT_FAILURE;
1827 }
1828
1829 if (arg_cursor || arg_after_cursor) {
1830 r = sd_journal_seek_cursor(j, arg_cursor ?: arg_after_cursor);
1831 if (r < 0) {
1832 log_error("Failed to seek to cursor: %s", strerror(-r));
1833 return EXIT_FAILURE;
1834 }
1835 if (!arg_reverse)
1836 r = sd_journal_next_skip(j, 1 + !!arg_after_cursor);
1837 else
1838 r = sd_journal_previous_skip(j, 1 + !!arg_after_cursor);
1839
1840 if (arg_after_cursor && r < 2 && !arg_follow)
1841 /* We couldn't find the next entry after the cursor. */
1842 arg_lines = 0;
1843
1844 } else if (arg_since_set && !arg_reverse) {
1845 r = sd_journal_seek_realtime_usec(j, arg_since);
1846 if (r < 0) {
1847 log_error("Failed to seek to date: %s", strerror(-r));
1848 return EXIT_FAILURE;
1849 }
1850 r = sd_journal_next(j);
1851
1852 } else if (arg_until_set && arg_reverse) {
1853 r = sd_journal_seek_realtime_usec(j, arg_until);
1854 if (r < 0) {
1855 log_error("Failed to seek to date: %s", strerror(-r));
1856 return EXIT_FAILURE;
1857 }
1858 r = sd_journal_previous(j);
1859
1860 } else if (arg_lines >= 0) {
1861 r = sd_journal_seek_tail(j);
1862 if (r < 0) {
1863 log_error("Failed to seek to tail: %s", strerror(-r));
1864 return EXIT_FAILURE;
1865 }
1866
1867 r = sd_journal_previous_skip(j, arg_lines);
1868
1869 } else if (arg_reverse) {
1870 r = sd_journal_seek_tail(j);
1871 if (r < 0) {
1872 log_error("Failed to seek to tail: %s", strerror(-r));
1873 return EXIT_FAILURE;
1874 }
1875
1876 r = sd_journal_previous(j);
1877
1878 } else {
1879 r = sd_journal_seek_head(j);
1880 if (r < 0) {
1881 log_error("Failed to seek to head: %s", strerror(-r));
1882 return EXIT_FAILURE;
1883 }
1884
1885 r = sd_journal_next(j);
1886 }
1887
1888 if (r < 0) {
1889 log_error("Failed to iterate through journal: %s", strerror(-r));
1890 return EXIT_FAILURE;
1891 }
1892
1893 if (!arg_follow)
1894 pager_open_if_enabled();
1895
1896 if (!arg_quiet) {
1897 usec_t start, end;
1898 char start_buf[FORMAT_TIMESTAMP_MAX], end_buf[FORMAT_TIMESTAMP_MAX];
1899
1900 r = sd_journal_get_cutoff_realtime_usec(j, &start, &end);
1901 if (r < 0) {
1902 log_error("Failed to get cutoff: %s", strerror(-r));
1903 goto finish;
1904 }
1905
1906 if (r > 0) {
1907 if (arg_follow)
1908 printf("-- Logs begin at %s. --\n",
1909 format_timestamp_maybe_utc(start_buf, sizeof(start_buf), start));
1910 else
1911 printf("-- Logs begin at %s, end at %s. --\n",
1912 format_timestamp_maybe_utc(start_buf, sizeof(start_buf), start),
1913 format_timestamp_maybe_utc(end_buf, sizeof(end_buf), end));
1914 }
1915 }
1916
1917 for (;;) {
1918 while (arg_lines < 0 || n_shown < arg_lines || (arg_follow && !first_line)) {
1919 int flags;
1920
1921 if (need_seek) {
1922 if (!arg_reverse)
1923 r = sd_journal_next(j);
1924 else
1925 r = sd_journal_previous(j);
1926 if (r < 0) {
1927 log_error("Failed to iterate through journal: %s", strerror(-r));
1928 goto finish;
1929 }
1930 if (r == 0)
1931 break;
1932 }
1933
1934 if (arg_until_set && !arg_reverse) {
1935 usec_t usec;
1936
1937 r = sd_journal_get_realtime_usec(j, &usec);
1938 if (r < 0) {
1939 log_error("Failed to determine timestamp: %s", strerror(-r));
1940 goto finish;
1941 }
1942 if (usec > arg_until)
1943 goto finish;
1944 }
1945
1946 if (arg_since_set && arg_reverse) {
1947 usec_t usec;
1948
1949 r = sd_journal_get_realtime_usec(j, &usec);
1950 if (r < 0) {
1951 log_error("Failed to determine timestamp: %s", strerror(-r));
1952 goto finish;
1953 }
1954 if (usec < arg_since)
1955 goto finish;
1956 }
1957
1958 if (!arg_merge && !arg_quiet) {
1959 sd_id128_t boot_id;
1960
1961 r = sd_journal_get_monotonic_usec(j, NULL, &boot_id);
1962 if (r >= 0) {
1963 if (previous_boot_id_valid &&
1964 !sd_id128_equal(boot_id, previous_boot_id))
1965 printf("%s-- Reboot --%s\n",
1966 ansi_highlight(), ansi_highlight_off());
1967
1968 previous_boot_id = boot_id;
1969 previous_boot_id_valid = true;
1970 }
1971 }
1972
1973 flags =
1974 arg_all * OUTPUT_SHOW_ALL |
1975 arg_full * OUTPUT_FULL_WIDTH |
1976 on_tty() * OUTPUT_COLOR |
1977 arg_catalog * OUTPUT_CATALOG |
1978 arg_utc * OUTPUT_UTC;
1979
1980 r = output_journal(stdout, j, arg_output, 0, flags, &ellipsized);
1981 need_seek = true;
1982 if (r == -EADDRNOTAVAIL)
1983 break;
1984 else if (r < 0 || ferror(stdout))
1985 goto finish;
1986
1987 n_shown++;
1988 }
1989
1990 if (!arg_follow) {
1991 if (arg_show_cursor) {
1992 _cleanup_free_ char *cursor = NULL;
1993
1994 r = sd_journal_get_cursor(j, &cursor);
1995 if (r < 0 && r != -EADDRNOTAVAIL)
1996 log_error("Failed to get cursor: %s", strerror(-r));
1997 else if (r >= 0)
1998 printf("-- cursor: %s\n", cursor);
1999 }
2000
2001 break;
2002 }
2003
2004 r = sd_journal_wait(j, (uint64_t) -1);
2005 if (r < 0) {
2006 log_error("Couldn't wait for journal event: %s", strerror(-r));
2007 goto finish;
2008 }
2009
2010 first_line = false;
2011 }
2012
2013 finish:
2014 pager_close();
2015
2016 strv_free(arg_file);
2017
2018 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
2019 }