]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/journal/journalctl.c
logs-show: fix corrupt output with empty messages
[thirdparty/systemd.git] / src / journal / journalctl.c
CommitLineData
87d2c1ff
LP
1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3/***
4 This file is part of systemd.
5
6 Copyright 2011 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
5430f7f2
LP
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
87d2c1ff
LP
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
5430f7f2 16 Lesser General Public License for more details.
87d2c1ff 17
5430f7f2 18 You should have received a copy of the GNU Lesser General Public License
87d2c1ff
LP
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
a9cdc94f 22#include <locale.h>
87d2c1ff 23#include <fcntl.h>
ea18a4b5 24#include <fnmatch.h>
87d2c1ff
LP
25#include <errno.h>
26#include <stddef.h>
3fbf9cbb
LP
27#include <string.h>
28#include <stdio.h>
29#include <unistd.h>
30#include <stdlib.h>
72f59706 31#include <time.h>
0d43c694 32#include <getopt.h>
585314e8 33#include <signal.h>
50940700 34#include <sys/stat.h>
f982e6f7
LP
35#include <sys/ioctl.h>
36#include <linux/fs.h>
87d2c1ff 37
4468addc
LP
38#ifdef HAVE_ACL
39#include <sys/acl.h>
478c8269 40#include "acl-util.h"
4468addc
LP
41#endif
42
81527be1
LP
43#include <systemd/sd-journal.h>
44
3fbf9cbb 45#include "log.h"
7199aa96 46#include "logs-show.h"
72f59706 47#include "util.h"
e5124088 48#include "path-util.h"
68fee104 49#include "fileio.h"
0d43c694
LP
50#include "build.h"
51#include "pager.h"
a963990f 52#include "strv.h"
ea18a4b5 53#include "set.h"
dca6219e 54#include "journal-internal.h"
7560fffc 55#include "journal-def.h"
0284adc6 56#include "journal-verify.h"
4da416aa 57#include "journal-authenticate.h"
f6a971bc 58#include "journal-qrcode.h"
4da416aa 59#include "fsprg.h"
c3f60ec5 60#include "unit-name.h"
d4205751 61#include "catalog.h"
7560fffc 62
baed47c3 63#define DEFAULT_FSS_INTERVAL_USEC (15*USEC_PER_MINUTE)
250d54b5 64
df50185b 65static OutputMode arg_output = OUTPUT_SHORT;
1b12a7b5 66static bool arg_pager_end = false;
72f59706 67static bool arg_follow = false;
2b8f6883 68static bool arg_full = true;
cd4b13e0 69static bool arg_all = false;
0d43c694 70static bool arg_no_pager = false;
67e04a48 71static int arg_lines = -1;
e91af489 72static bool arg_no_tail = false;
43673799 73static bool arg_quiet = false;
9e8a535f 74static bool arg_merge = false;
d121b396 75static bool arg_boot = false;
442e2def
LP
76static sd_id128_t arg_boot_id = {};
77static int arg_boot_offset = 0;
99271804 78static bool arg_dmesg = false;
8f14c832 79static const char *arg_cursor = NULL;
248fc619
ZJS
80static const char *arg_after_cursor = NULL;
81static bool arg_show_cursor = false;
a963990f 82static const char *arg_directory = NULL;
8d98da3f 83static char **arg_file = NULL;
941e990d 84static int arg_priorities = 0xFF;
baed47c3 85static const char *arg_verify_key = NULL;
feb12d3e 86#ifdef HAVE_GCRYPT
baed47c3 87static usec_t arg_interval = DEFAULT_FSS_INTERVAL_USEC;
b8547c10 88static bool arg_force = false;
feb12d3e 89#endif
cfbc22ab
LP
90static usec_t arg_since, arg_until;
91static bool arg_since_set = false, arg_until_set = false;
b9e40524
HH
92static char **arg_system_units = NULL;
93static char **arg_user_units = NULL;
3c1668da 94static const char *arg_field = NULL;
d4205751 95static bool arg_catalog = false;
d89d6c86 96static bool arg_reverse = false;
3f3a438f 97static int arg_journal_type = 0;
13cbf3a5 98static const char *arg_root = NULL;
b6741478 99static const char *arg_machine = NULL;
50f20cfd 100
7560fffc
LP
101static enum {
102 ACTION_SHOW,
103 ACTION_NEW_ID128,
104 ACTION_PRINT_HEADER,
beec0085 105 ACTION_SETUP_KEYS,
a1a03e30
LP
106 ACTION_VERIFY,
107 ACTION_DISK_USAGE,
d4205751 108 ACTION_LIST_CATALOG,
54b7254c 109 ACTION_DUMP_CATALOG,
f1188074
ZJS
110 ACTION_UPDATE_CATALOG,
111 ACTION_LIST_BOOTS,
7560fffc
LP
112} arg_action = ACTION_SHOW;
113
a331b5e6
JJ
114typedef struct boot_id_t {
115 sd_id128_t id;
f1188074
ZJS
116 uint64_t first;
117 uint64_t last;
a331b5e6
JJ
118} boot_id_t;
119
faf5077f
DH
120static void pager_open_if_enabled(void) {
121
122 if (arg_no_pager)
123 return;
124
125 pager_open(arg_pager_end);
126}
127
442e2def
LP
128static int parse_boot_descriptor(const char *x, sd_id128_t *boot_id, int *offset) {
129 sd_id128_t id = SD_ID128_NULL;
130 int off = 0, r;
131
132 if (strlen(x) >= 32) {
133 char *t;
134
135 t = strndupa(x, 32);
136 r = sd_id128_from_string(t, &id);
137 if (r >= 0)
138 x += 32;
139
140 if (*x != '-' && *x != '+' && *x != 0)
141 return -EINVAL;
142
143 if (*x != 0) {
144 r = safe_atoi(x, &off);
145 if (r < 0)
146 return r;
147 }
148 } else {
149 r = safe_atoi(x, &off);
150 if (r < 0)
151 return r;
152 }
153
154 if (boot_id)
155 *boot_id = id;
156
157 if (offset)
158 *offset = off;
159
160 return 0;
161}
162
0d43c694
LP
163static int help(void) {
164
faf5077f
DH
165 pager_open_if_enabled();
166
cd4b13e0 167 printf("%s [OPTIONS...] [MATCHES...]\n\n"
15119c16
LP
168 "Query the journal.\n\n"
169 "Flags:\n"
248fc619 170 " --system Show only the system journal\n"
c736283b 171 " --user Show only the user journal for the current user\n"
b6741478 172 " -M --machine=CONTAINER Operate on local container\n"
c736283b
JSJ
173 " --since=DATE Start showing entries on or newer than the specified date\n"
174 " --until=DATE Stop showing entries on or older than the specified date\n"
175 " -c --cursor=CURSOR Start showing entries from the specified cursor\n"
176 " --after-cursor=CURSOR Start showing entries from after the specified cursor\n"
248fc619 177 " --show-cursor Print the cursor after all the entries\n"
c736283b 178 " -b --boot[=ID] Show data only from ID or, if unspecified, the current boot\n"
f1188074 179 " --list-boots Show terse information about recorded boots\n"
c736283b 180 " -k --dmesg Show kernel message log from the current boot\n"
248fc619
ZJS
181 " -u --unit=UNIT Show data only from the specified unit\n"
182 " --user-unit=UNIT Show data only from the specified user session unit\n"
183 " -p --priority=RANGE Show only messages within the specified priority range\n"
184 " -e --pager-end Immediately jump to end of the journal in the pager\n"
c736283b 185 " -f --follow Follow the journal\n"
248fc619
ZJS
186 " -n --lines[=INTEGER] Number of journal entries to show\n"
187 " --no-tail Show all lines, even in follow mode\n"
188 " -r --reverse Show the newest entries first\n"
f02d8367 189 " -o --output=STRING Change journal output mode (short, short-iso,\n"
c736283b
JSJ
190 " short-precise, short-monotonic, verbose,\n"
191 " export, json, json-pretty, json-sse, cat)\n"
248fc619 192 " -x --catalog Add message explanations where available\n"
2b8f6883 193 " --no-full Ellipsize fields\n"
248fc619 194 " -a --all Show all fields, including long and unprintable\n"
c736283b 195 " -q --quiet Do not show privilege warning\n"
248fc619
ZJS
196 " --no-pager Do not pipe output into a pager\n"
197 " -m --merge Show entries from all available journals\n"
198 " -D --directory=PATH Show journal files from directory\n"
199 " --file=PATH Show journal file\n"
200 " --root=ROOT Operate on catalog files underneath the root ROOT\n"
15119c16 201#ifdef HAVE_GCRYPT
248fc619
ZJS
202 " --interval=TIME Time interval for changing the FSS sealing key\n"
203 " --verify-key=KEY Specify FSS verification key\n"
c736283b 204 " --force Force overriding of the FSS key pair with --setup-keys\n"
15119c16
LP
205#endif
206 "\nCommands:\n"
c736283b 207 " -h --help Show this help text\n"
248fc619 208 " --version Show package version\n"
c736283b 209 " --new-id128 Generate a new 128-bit ID\n"
248fc619 210 " --header Show journal header information\n"
c736283b
JSJ
211 " --disk-usage Show total disk usage of all journal files\n"
212 " -F --field=FIELD List all values that a specified field takes\n"
248fc619
ZJS
213 " --list-catalog Show message IDs of all entries in the message catalog\n"
214 " --dump-catalog Show entries in the message catalog\n"
215 " --update-catalog Update the message catalog database\n"
feb12d3e 216#ifdef HAVE_GCRYPT
c736283b 217 " --setup-keys Generate a new FSS key pair\n"
248fc619 218 " --verify Verify journal file consistency\n"
feb12d3e
LP
219#endif
220 , program_invocation_short_name);
0d43c694
LP
221
222 return 0;
223}
224
225static int parse_argv(int argc, char *argv[]) {
226
227 enum {
228 ARG_VERSION = 0x100,
e91af489 229 ARG_NO_PAGER,
2b8f6883 230 ARG_NO_FULL,
55ee336c 231 ARG_NO_TAIL,
dca6219e 232 ARG_NEW_ID128,
f1188074 233 ARG_LIST_BOOTS,
3f3a438f
ZJS
234 ARG_USER,
235 ARG_SYSTEM,
13cbf3a5 236 ARG_ROOT,
7560fffc 237 ARG_HEADER,
beec0085 238 ARG_SETUP_KEYS,
8d98da3f 239 ARG_FILE,
baed47c3 240 ARG_INTERVAL,
4da416aa 241 ARG_VERIFY,
a1a03e30 242 ARG_VERIFY_KEY,
cfbc22ab
LP
243 ARG_DISK_USAGE,
244 ARG_SINCE,
d4205751 245 ARG_UNTIL,
248fc619
ZJS
246 ARG_AFTER_CURSOR,
247 ARG_SHOW_CURSOR,
ffa7cd15 248 ARG_USER_UNIT,
d4205751 249 ARG_LIST_CATALOG,
54b7254c 250 ARG_DUMP_CATALOG,
3f3a438f 251 ARG_UPDATE_CATALOG,
b8547c10 252 ARG_FORCE,
0d43c694
LP
253 };
254
255 static const struct option options[] = {
248fc619
ZJS
256 { "help", no_argument, NULL, 'h' },
257 { "version" , no_argument, NULL, ARG_VERSION },
258 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
259 { "pager-end", no_argument, NULL, 'e' },
260 { "follow", no_argument, NULL, 'f' },
261 { "force", no_argument, NULL, ARG_FORCE },
262 { "output", required_argument, NULL, 'o' },
263 { "all", no_argument, NULL, 'a' },
264 { "full", no_argument, NULL, 'l' },
2b8f6883 265 { "no-full", no_argument, NULL, ARG_NO_FULL },
248fc619
ZJS
266 { "lines", optional_argument, NULL, 'n' },
267 { "no-tail", no_argument, NULL, ARG_NO_TAIL },
268 { "new-id128", no_argument, NULL, ARG_NEW_ID128 },
269 { "quiet", no_argument, NULL, 'q' },
270 { "merge", no_argument, NULL, 'm' },
271 { "boot", optional_argument, NULL, 'b' },
f1188074 272 { "list-boots", no_argument, NULL, ARG_LIST_BOOTS },
248fc619
ZJS
273 { "this-boot", optional_argument, NULL, 'b' }, /* deprecated */
274 { "dmesg", no_argument, NULL, 'k' },
275 { "system", no_argument, NULL, ARG_SYSTEM },
276 { "user", no_argument, NULL, ARG_USER },
277 { "directory", required_argument, NULL, 'D' },
278 { "file", required_argument, NULL, ARG_FILE },
279 { "root", required_argument, NULL, ARG_ROOT },
280 { "header", no_argument, NULL, ARG_HEADER },
281 { "priority", required_argument, NULL, 'p' },
282 { "setup-keys", no_argument, NULL, ARG_SETUP_KEYS },
283 { "interval", required_argument, NULL, ARG_INTERVAL },
284 { "verify", no_argument, NULL, ARG_VERIFY },
285 { "verify-key", required_argument, NULL, ARG_VERIFY_KEY },
286 { "disk-usage", no_argument, NULL, ARG_DISK_USAGE },
287 { "cursor", required_argument, NULL, 'c' },
288 { "after-cursor", required_argument, NULL, ARG_AFTER_CURSOR },
289 { "show-cursor", no_argument, NULL, ARG_SHOW_CURSOR },
290 { "since", required_argument, NULL, ARG_SINCE },
291 { "until", required_argument, NULL, ARG_UNTIL },
292 { "unit", required_argument, NULL, 'u' },
293 { "user-unit", required_argument, NULL, ARG_USER_UNIT },
294 { "field", required_argument, NULL, 'F' },
295 { "catalog", no_argument, NULL, 'x' },
296 { "list-catalog", no_argument, NULL, ARG_LIST_CATALOG },
297 { "dump-catalog", no_argument, NULL, ARG_DUMP_CATALOG },
298 { "update-catalog", no_argument, NULL, ARG_UPDATE_CATALOG },
299 { "reverse", no_argument, NULL, 'r' },
b6741478 300 { "machine", required_argument, NULL, 'M' },
eb9da376 301 {}
0d43c694
LP
302 };
303
2100675e 304 int c, r;
0d43c694
LP
305
306 assert(argc >= 0);
307 assert(argv);
308
b6741478 309 while ((c = getopt_long(argc, argv, "hefo:aln::qmb::kD:p:c:u:F:xrM:", options, NULL)) >= 0) {
0d43c694
LP
310
311 switch (c) {
312
313 case 'h':
eb9da376 314 return help();
0d43c694
LP
315
316 case ARG_VERSION:
317 puts(PACKAGE_STRING);
0d43c694
LP
318 puts(SYSTEMD_FEATURES);
319 return 0;
320
321 case ARG_NO_PAGER:
322 arg_no_pager = true;
323 break;
324
1b12a7b5
HH
325 case 'e':
326 arg_pager_end = true;
fe59e38b
LP
327
328 if (arg_lines < 0)
329 arg_lines = 1000;
330
1b12a7b5
HH
331 break;
332
0d43c694
LP
333 case 'f':
334 arg_follow = true;
335 break;
336
337 case 'o':
1705594f 338 arg_output = output_mode_from_string(optarg);
df50185b 339 if (arg_output < 0) {
edfb521a 340 log_error("Unknown output format '%s'.", optarg);
0d43c694
LP
341 return -EINVAL;
342 }
df50185b 343
edfb521a
ZJS
344 if (arg_output == OUTPUT_EXPORT ||
345 arg_output == OUTPUT_JSON ||
346 arg_output == OUTPUT_JSON_PRETTY ||
347 arg_output == OUTPUT_JSON_SSE ||
348 arg_output == OUTPUT_CAT)
349 arg_quiet = true;
350
0d43c694
LP
351 break;
352
98a6e132 353 case 'l':
e3657ecd
ZJS
354 arg_full = true;
355 break;
356
2b8f6883
ZJS
357 case ARG_NO_FULL:
358 arg_full = false;
359 break;
360
0d43c694 361 case 'a':
cd4b13e0 362 arg_all = true;
0d43c694
LP
363 break;
364
2100675e 365 case 'n':
1705594f 366 if (optarg) {
67e04a48
ZJS
367 r = safe_atoi(optarg, &arg_lines);
368 if (r < 0 || arg_lines < 0) {
1705594f
LP
369 log_error("Failed to parse lines '%s'", optarg);
370 return -EINVAL;
371 }
96088db0
LP
372 } else {
373 int n;
374
375 /* Hmm, no argument? Maybe the next
376 * word on the command line is
377 * supposed to be the argument? Let's
378 * see if there is one, and is
379 * parsable as a positive
380 * integer... */
381
382 if (optind < argc &&
383 safe_atoi(argv[optind], &n) >= 0 &&
384 n >= 0) {
385
386 arg_lines = n;
387 optind++;
388 } else
389 arg_lines = 10;
390 }
1705594f 391
2100675e
LP
392 break;
393
e91af489
LP
394 case ARG_NO_TAIL:
395 arg_no_tail = true;
396 break;
397
39f7f5c1 398 case ARG_NEW_ID128:
7560fffc 399 arg_action = ACTION_NEW_ID128;
55ee336c
LP
400 break;
401
43673799
LP
402 case 'q':
403 arg_quiet = true;
490e567d 404 break;
43673799 405
9e8a535f
LP
406 case 'm':
407 arg_merge = true;
2bd3c38a
LP
408 break;
409
59cea26a 410 case 'b':
d121b396 411 arg_boot = true;
6cebe83c 412
442e2def
LP
413 if (optarg) {
414 r = parse_boot_descriptor(optarg, &arg_boot_id, &arg_boot_offset);
415 if (r < 0) {
416 log_error("Failed to parse boot descriptor '%s'", optarg);
417 return -EINVAL;
418 }
419 } else {
6cebe83c 420
442e2def
LP
421 /* Hmm, no argument? Maybe the next
422 * word on the command line is
423 * supposed to be the argument? Let's
424 * see if there is one and is parsable
425 * as a boot descriptor... */
426
427 if (optind < argc &&
428 parse_boot_descriptor(argv[optind], &arg_boot_id, &arg_boot_offset) >= 0)
6cebe83c 429 optind++;
6cebe83c 430 }
d121b396 431
59cea26a
LP
432 break;
433
f1188074
ZJS
434 case ARG_LIST_BOOTS:
435 arg_action = ACTION_LIST_BOOTS;
436 break;
437
99271804 438 case 'k':
d121b396 439 arg_boot = arg_dmesg = true;
99271804
ZJS
440 break;
441
3f3a438f
ZJS
442 case ARG_SYSTEM:
443 arg_journal_type |= SD_JOURNAL_SYSTEM;
444 break;
445
446 case ARG_USER:
447 arg_journal_type |= SD_JOURNAL_CURRENT_USER;
448 break;
449
b6741478
LP
450 case 'M':
451 arg_machine = optarg;
452 break;
453
a963990f
LP
454 case 'D':
455 arg_directory = optarg;
456 break;
457
8d98da3f
ZJS
458 case ARG_FILE:
459 r = glob_extend(&arg_file, optarg);
460 if (r < 0) {
461 log_error("Failed to add paths: %s", strerror(-r));
462 return r;
463 };
464 break;
465
13cbf3a5
ZJS
466 case ARG_ROOT:
467 arg_root = optarg;
468 break;
469
8f14c832
LP
470 case 'c':
471 arg_cursor = optarg;
472 break;
473
248fc619
ZJS
474 case ARG_AFTER_CURSOR:
475 arg_after_cursor = optarg;
476 break;
477
478 case ARG_SHOW_CURSOR:
479 arg_show_cursor = true;
480 break;
481
dca6219e 482 case ARG_HEADER:
7560fffc
LP
483 arg_action = ACTION_PRINT_HEADER;
484 break;
485
feb12d3e
LP
486 case ARG_VERIFY:
487 arg_action = ACTION_VERIFY;
488 break;
489
a1a03e30
LP
490 case ARG_DISK_USAGE:
491 arg_action = ACTION_DISK_USAGE;
492 break;
493
feb12d3e 494#ifdef HAVE_GCRYPT
b8547c10
SL
495 case ARG_FORCE:
496 arg_force = true;
497 break;
498
7560fffc
LP
499 case ARG_SETUP_KEYS:
500 arg_action = ACTION_SETUP_KEYS;
dca6219e
LP
501 break;
502
beec0085 503
baed47c3 504 case ARG_VERIFY_KEY:
4da416aa 505 arg_action = ACTION_VERIFY;
baed47c3 506 arg_verify_key = optarg;
9e8a535f 507 arg_merge = false;
4da416aa
LP
508 break;
509
baed47c3 510 case ARG_INTERVAL:
7f602784 511 r = parse_sec(optarg, &arg_interval);
baed47c3
LP
512 if (r < 0 || arg_interval <= 0) {
513 log_error("Failed to parse sealing key change interval: %s", optarg);
14d10188
LP
514 return -EINVAL;
515 }
516 break;
feb12d3e
LP
517#else
518 case ARG_SETUP_KEYS:
519 case ARG_VERIFY_KEY:
520 case ARG_INTERVAL:
b8547c10 521 case ARG_FORCE:
feb12d3e
LP
522 log_error("Forward-secure sealing not available.");
523 return -ENOTSUP;
524#endif
14d10188 525
941e990d
LP
526 case 'p': {
527 const char *dots;
528
529 dots = strstr(optarg, "..");
530 if (dots) {
531 char *a;
532 int from, to, i;
533
534 /* a range */
535 a = strndup(optarg, dots - optarg);
536 if (!a)
537 return log_oom();
538
539 from = log_level_from_string(a);
540 to = log_level_from_string(dots + 2);
541 free(a);
542
543 if (from < 0 || to < 0) {
544 log_error("Failed to parse log level range %s", optarg);
545 return -EINVAL;
546 }
547
548 arg_priorities = 0;
549
550 if (from < to) {
551 for (i = from; i <= to; i++)
552 arg_priorities |= 1 << i;
553 } else {
554 for (i = to; i <= from; i++)
555 arg_priorities |= 1 << i;
556 }
557
558 } else {
559 int p, i;
560
561 p = log_level_from_string(optarg);
562 if (p < 0) {
563 log_error("Unknown log level %s", optarg);
564 return -EINVAL;
565 }
566
567 arg_priorities = 0;
568
569 for (i = 0; i <= p; i++)
570 arg_priorities |= 1 << i;
571 }
572
573 break;
574 }
575
cfbc22ab
LP
576 case ARG_SINCE:
577 r = parse_timestamp(optarg, &arg_since);
578 if (r < 0) {
579 log_error("Failed to parse timestamp: %s", optarg);
580 return -EINVAL;
581 }
582 arg_since_set = true;
583 break;
584
585 case ARG_UNTIL:
586 r = parse_timestamp(optarg, &arg_until);
587 if (r < 0) {
588 log_error("Failed to parse timestamp: %s", optarg);
589 return -EINVAL;
590 }
591 arg_until_set = true;
592 break;
593
7199aa96 594 case 'u':
b9e40524
HH
595 r = strv_extend(&arg_system_units, optarg);
596 if (r < 0)
597 return log_oom();
ffa7cd15
DW
598 break;
599
7199aa96 600 case ARG_USER_UNIT:
b9e40524
HH
601 r = strv_extend(&arg_user_units, optarg);
602 if (r < 0)
603 return log_oom();
c3f60ec5
LP
604 break;
605
15119c16
LP
606 case 'F':
607 arg_field = optarg;
608 break;
609
d4205751
LP
610 case 'x':
611 arg_catalog = true;
612 break;
613
614 case ARG_LIST_CATALOG:
615 arg_action = ACTION_LIST_CATALOG;
616 break;
617
54b7254c
ZJS
618 case ARG_DUMP_CATALOG:
619 arg_action = ACTION_DUMP_CATALOG;
620 break;
621
d4205751
LP
622 case ARG_UPDATE_CATALOG:
623 arg_action = ACTION_UPDATE_CATALOG;
624 break;
625
d89d6c86
LN
626 case 'r':
627 arg_reverse = true;
628 break;
629
eb9da376 630 case '?':
0d43c694 631 return -EINVAL;
eb9da376
LP
632
633 default:
634 assert_not_reached("Unhandled option");
0d43c694
LP
635 }
636 }
637
67e04a48 638 if (arg_follow && !arg_no_tail && arg_lines < 0)
e91af489
LP
639 arg_lines = 10;
640
b6741478
LP
641 if (!!arg_directory + !!arg_file + !!arg_machine > 1) {
642 log_error("Please specify either -D/--directory= or --file= or -M/--machine=, not more than one.");
8d98da3f
ZJS
643 return -EINVAL;
644 }
645
3ba09ee8 646 if (arg_since_set && arg_until_set && arg_since > arg_until) {
cfbc22ab
LP
647 log_error("--since= must be before --until=.");
648 return -EINVAL;
649 }
650
248fc619
ZJS
651 if (!!arg_cursor + !!arg_after_cursor + !!arg_since_set > 1) {
652 log_error("Please specify only one of --since=, --cursor=, and --after-cursor.");
cfbc22ab
LP
653 return -EINVAL;
654 }
655
d89d6c86
LN
656 if (arg_follow && arg_reverse) {
657 log_error("Please specify either --reverse= or --follow=, not both.");
658 return -EINVAL;
659 }
660
0d43c694
LP
661 return 1;
662}
663
39f7f5c1 664static int generate_new_id128(void) {
55ee336c
LP
665 sd_id128_t id;
666 int r;
667 unsigned i;
668
669 r = sd_id128_randomize(&id);
670 if (r < 0) {
671 log_error("Failed to generate ID: %s", strerror(-r));
672 return r;
673 }
674
675 printf("As string:\n"
676 SD_ID128_FORMAT_STR "\n\n"
677 "As UUID:\n"
678 "%02x%02x%02x%02x-%02x%02x-%02x%02x-%02x%02x-%02x%02x%02x%02x%02x%02x\n\n"
679 "As macro:\n"
d489071f 680 "#define MESSAGE_XYZ SD_ID128_MAKE(",
55ee336c
LP
681 SD_ID128_FORMAT_VAL(id),
682 SD_ID128_FORMAT_VAL(id));
55ee336c
LP
683 for (i = 0; i < 16; i++)
684 printf("%02x%s", id.bytes[i], i != 15 ? "," : "");
d489071f 685 fputs(")\n\n", stdout);
55ee336c 686
d489071f
ZJS
687 printf("As Python constant:\n"
688 ">>> import uuid\n"
689 ">>> MESSAGE_XYZ = uuid.UUID('" SD_ID128_FORMAT_STR "')\n",
690 SD_ID128_FORMAT_VAL(id));
55ee336c
LP
691
692 return 0;
693}
694
a963990f
LP
695static int add_matches(sd_journal *j, char **args) {
696 char **i;
59cea26a 697
a963990f 698 assert(j);
59cea26a 699
a963990f 700 STRV_FOREACH(i, args) {
52aeb63c 701 int r;
59cea26a 702
cbdca852
LP
703 if (streq(*i, "+"))
704 r = sd_journal_add_disjunction(j);
705 else if (path_is_absolute(*i)) {
68fee104 706 _cleanup_free_ char *p, *t = NULL, *t2 = NULL;
e5124088 707 const char *path;
68fee104 708 _cleanup_free_ char *interpreter = NULL;
a963990f 709 struct stat st;
e5124088 710
a963990f
LP
711 p = canonicalize_file_name(*i);
712 path = p ? p : *i;
e5124088
LP
713
714 if (stat(path, &st) < 0) {
e5124088 715 log_error("Couldn't stat file: %m");
a963990f 716 return -errno;
e5124088
LP
717 }
718
68fee104
ZJS
719 if (S_ISREG(st.st_mode) && (0111 & st.st_mode)) {
720 if (executable_is_script(path, &interpreter) > 0) {
721 _cleanup_free_ char *comm;
722
2b6bf07d 723 comm = strndup(basename(path), 15);
68fee104
ZJS
724 if (!comm)
725 return log_oom();
726
727 t = strappend("_COMM=", comm);
728
729 /* Append _EXE only if the interpreter is not a link.
73e231ab 730 Otherwise, it might be outdated often. */
68fee104
ZJS
731 if (lstat(interpreter, &st) == 0 &&
732 !S_ISLNK(st.st_mode)) {
733 t2 = strappend("_EXE=", interpreter);
734 if (!t2)
735 return log_oom();
736 }
737 } else
738 t = strappend("_EXE=", path);
739 } else if (S_ISCHR(st.st_mode))
b6a34514
LP
740 asprintf(&t, "_KERNEL_DEVICE=c%u:%u", major(st.st_rdev), minor(st.st_rdev));
741 else if (S_ISBLK(st.st_mode))
742 asprintf(&t, "_KERNEL_DEVICE=b%u:%u", major(st.st_rdev), minor(st.st_rdev));
743 else {
fb93cf73 744 log_error("File is neither a device node, nor regular file, nor executable: %s", *i);
a963990f 745 return -EINVAL;
50940700 746 }
e5124088 747
b6a34514
LP
748 if (!t)
749 return log_oom();
750
751 r = sd_journal_add_match(j, t, 0);
68fee104
ZJS
752 if (t2)
753 r = sd_journal_add_match(j, t2, 0);
e5124088 754 } else
cbdca852 755 r = sd_journal_add_match(j, *i, 0);
e5124088 756
de7b95cd 757 if (r < 0) {
cbdca852 758 log_error("Failed to add match '%s': %s", *i, strerror(-r));
a963990f 759 return r;
de7b95cd
LP
760 }
761 }
762
a963990f
LP
763 return 0;
764}
765
a331b5e6
JJ
766static int boot_id_cmp(const void *a, const void *b) {
767 uint64_t _a, _b;
768
f1188074
ZJS
769 _a = ((const boot_id_t *)a)->first;
770 _b = ((const boot_id_t *)b)->first;
a331b5e6
JJ
771
772 return _a < _b ? -1 : (_a > _b ? 1 : 0);
773}
774
f1188074
ZJS
775static int list_boots(sd_journal *j) {
776 int r;
777 const void *data;
778 unsigned int count = 0;
779 int w, i;
780 size_t length, allocated = 0;
781 boot_id_t *id;
782 _cleanup_free_ boot_id_t *all_ids = NULL;
783
784 r = sd_journal_query_unique(j, "_BOOT_ID");
785 if (r < 0)
786 return r;
787
788 SD_JOURNAL_FOREACH_UNIQUE(j, data, length) {
789 if (length < strlen("_BOOT_ID="))
790 continue;
791
792 if (!GREEDY_REALLOC(all_ids, allocated, count + 1))
793 return log_oom();
794
795 id = &all_ids[count];
796
797 r = sd_id128_from_string(((const char *)data) + strlen("_BOOT_ID="), &id->id);
798 if (r < 0)
799 continue;
800
801 r = sd_journal_add_match(j, data, length);
802 if (r < 0)
803 return r;
804
805 r = sd_journal_seek_head(j);
806 if (r < 0)
807 return r;
808
809 r = sd_journal_next(j);
810 if (r < 0)
811 return r;
812 else if (r == 0)
813 goto flush;
814
815 r = sd_journal_get_realtime_usec(j, &id->first);
816 if (r < 0)
817 return r;
818
819 r = sd_journal_seek_tail(j);
820 if (r < 0)
821 return r;
822
823 r = sd_journal_previous(j);
824 if (r < 0)
825 return r;
826 else if (r == 0)
827 goto flush;
828
829 r = sd_journal_get_realtime_usec(j, &id->last);
830 if (r < 0)
831 return r;
832
833 count++;
834 flush:
835 sd_journal_flush_matches(j);
836 }
837
838 qsort_safe(all_ids, count, sizeof(boot_id_t), boot_id_cmp);
839
840 /* numbers are one less, but we need an extra char for the sign */
841 w = DECIMAL_STR_WIDTH(count - 1) + 1;
842
843 for (id = all_ids, i = 0; id < all_ids + count; id++, i++) {
844 char a[FORMAT_TIMESTAMP_MAX], b[FORMAT_TIMESTAMP_MAX];
845
846 printf("% *i " SD_ID128_FORMAT_STR " %s—%s\n",
847 w, i - count + 1,
848 SD_ID128_FORMAT_VAL(id->id),
849 format_timestamp(a, sizeof(a), id->first),
850 format_timestamp(b, sizeof(b), id->last));
851 }
852
853 return 0;
854}
855
a331b5e6
JJ
856static int get_relative_boot_id(sd_journal *j, sd_id128_t *boot_id, int relative) {
857 int r;
858 const void *data;
d121b396 859 unsigned int count = 0;
a331b5e6 860 size_t length, allocated = 0;
d121b396 861 boot_id_t ref_boot_id = {SD_ID128_NULL}, *id;
a331b5e6 862 _cleanup_free_ boot_id_t *all_ids = NULL;
a331b5e6
JJ
863
864 assert(j);
865 assert(boot_id);
866
a331b5e6
JJ
867 r = sd_journal_query_unique(j, "_BOOT_ID");
868 if (r < 0)
869 return r;
870
871 SD_JOURNAL_FOREACH_UNIQUE(j, data, length) {
872 if (length < strlen("_BOOT_ID="))
873 continue;
874
d121b396 875 if (!GREEDY_REALLOC(all_ids, allocated, count + 1))
a331b5e6
JJ
876 return log_oom();
877
d121b396 878 id = &all_ids[count];
a331b5e6
JJ
879
880 r = sd_id128_from_string(((const char *)data) + strlen("_BOOT_ID="), &id->id);
d121b396 881 if (r < 0)
a331b5e6 882 continue;
a331b5e6 883
a331b5e6
JJ
884 r = sd_journal_add_match(j, data, length);
885 if (r < 0)
d121b396 886 return r;
a331b5e6
JJ
887
888 r = sd_journal_seek_head(j);
889 if (r < 0)
d121b396 890 return r;
a331b5e6
JJ
891
892 r = sd_journal_next(j);
d121b396
ZJS
893 if (r < 0)
894 return r;
895 else if (r == 0)
896 goto flush;
a331b5e6 897
f1188074 898 r = sd_journal_get_realtime_usec(j, &id->first);
a331b5e6 899 if (r < 0)
d121b396 900 return r;
a331b5e6 901
d121b396 902 if (sd_id128_equal(id->id, *boot_id))
a331b5e6 903 ref_boot_id = *id;
a331b5e6 904
d121b396
ZJS
905 count++;
906 flush:
907 sd_journal_flush_matches(j);
a331b5e6
JJ
908 }
909
7ff7394d 910 qsort_safe(all_ids, count, sizeof(boot_id_t), boot_id_cmp);
a331b5e6 911
d121b396
ZJS
912 if (sd_id128_equal(*boot_id, SD_ID128_NULL)) {
913 if (relative > (int) count || relative <= -(int)count)
914 return -EADDRNOTAVAIL;
a331b5e6 915
d121b396
ZJS
916 *boot_id = all_ids[(relative <= 0)*count + relative - 1].id;
917 } else {
918 id = bsearch(&ref_boot_id, all_ids, count, sizeof(boot_id_t), boot_id_cmp);
a331b5e6 919
d121b396
ZJS
920 if (!id ||
921 relative <= 0 ? (id - all_ids) + relative < 0 :
a54e3b3d 922 (id - all_ids) + relative >= (int) count)
d121b396
ZJS
923 return -EADDRNOTAVAIL;
924
925 *boot_id = (id + relative)->id;
926 }
a963990f 927
a331b5e6
JJ
928 return 0;
929}
930
931static int add_boot(sd_journal *j) {
932 char match[9+32+1] = "_BOOT_ID=";
442e2def 933 int r;
a331b5e6
JJ
934
935 assert(j);
936
d121b396 937 if (!arg_boot)
a331b5e6
JJ
938 return 0;
939
442e2def 940 if (arg_boot_offset == 0 && sd_id128_equal(arg_boot_id, SD_ID128_NULL))
b6741478 941 return add_match_this_boot(j, arg_machine);
a331b5e6 942
442e2def 943 r = get_relative_boot_id(j, &arg_boot_id, arg_boot_offset);
a331b5e6 944 if (r < 0) {
442e2def
LP
945 if (sd_id128_equal(arg_boot_id, SD_ID128_NULL))
946 log_error("Failed to look up boot %+i: %s", arg_boot_offset, strerror(-r));
d121b396 947 else
442e2def
LP
948 log_error("Failed to look up boot ID "SD_ID128_FORMAT_STR"%+i: %s",
949 SD_ID128_FORMAT_VAL(arg_boot_id), arg_boot_offset, strerror(-r));
a331b5e6 950 return r;
a331b5e6
JJ
951 }
952
442e2def 953 sd_id128_to_string(arg_boot_id, match + 9);
d121b396
ZJS
954
955 r = sd_journal_add_match(j, match, sizeof(match) - 1);
a331b5e6
JJ
956 if (r < 0) {
957 log_error("Failed to add match: %s", strerror(-r));
958 return r;
959 }
960
961 r = sd_journal_add_conjunction(j);
962 if (r < 0)
963 return r;
964
965 return 0;
a963990f
LP
966}
967
99271804
ZJS
968static int add_dmesg(sd_journal *j) {
969 int r;
970 assert(j);
971
972 if (!arg_dmesg)
973 return 0;
974
975 r = sd_journal_add_match(j, "_TRANSPORT=kernel", strlen("_TRANSPORT=kernel"));
976 if (r < 0) {
977 log_error("Failed to add match: %s", strerror(-r));
978 return r;
979 }
980
981 r = sd_journal_add_conjunction(j);
982 if (r < 0)
983 return r;
984
985 return 0;
986}
987
ea18a4b5
ZJS
988static int get_possible_units(sd_journal *j,
989 const char *fields,
990 char **patterns,
991 Set **units) {
992 _cleanup_set_free_free_ Set *found;
993 const char *field;
c3f60ec5 994 int r;
ea18a4b5
ZJS
995
996 found = set_new(string_hash_func, string_compare_func);
997 if (!found)
998 return log_oom();
999
1000 NULSTR_FOREACH(field, fields) {
1001 const void *data;
1002 size_t size;
1003
1004 r = sd_journal_query_unique(j, field);
1005 if (r < 0)
1006 return r;
1007
1008 SD_JOURNAL_FOREACH_UNIQUE(j, data, size) {
1009 char **pattern, *eq;
1010 size_t prefix;
1011 _cleanup_free_ char *u = NULL;
1012
1013 eq = memchr(data, '=', size);
1014 if (eq)
1015 prefix = eq - (char*) data + 1;
1016 else
1017 prefix = 0;
1018
1019 u = strndup((char*) data + prefix, size - prefix);
1020 if (!u)
1021 return log_oom();
1022
1023 STRV_FOREACH(pattern, patterns)
1024 if (fnmatch(*pattern, u, FNM_NOESCAPE) == 0) {
1025 log_debug("Matched %s with pattern %s=%s", u, field, *pattern);
1026
1027 r = set_consume(found, u);
1028 u = NULL;
1029 if (r < 0 && r != -EEXIST)
1030 return r;
1031
1032 break;
1033 }
1034 }
1035 }
1036
1037 *units = found;
1038 found = NULL;
1039 return 0;
1040}
1041
1042/* This list is supposed to return the superset of unit names
1043 * possibly matched by rules added with add_matches_for_unit... */
1044#define SYSTEM_UNITS \
1045 "_SYSTEMD_UNIT\0" \
1046 "COREDUMP_UNIT\0" \
1047 "UNIT\0" \
1048 "OBJECT_SYSTEMD_UNIT\0" \
1049 "_SYSTEMD_SLICE\0"
1050
1051/* ... and add_matches_for_user_unit */
1052#define USER_UNITS \
1053 "_SYSTEMD_USER_UNIT\0" \
1054 "USER_UNIT\0" \
1055 "COREDUMP_USER_UNIT\0" \
1056 "OBJECT_SYSTEMD_USER_UNIT\0"
1057
1058static int add_units(sd_journal *j) {
1059 _cleanup_strv_free_ char **patterns = NULL;
1060 int r, count = 0;
b9e40524 1061 char **i;
c3f60ec5
LP
1062
1063 assert(j);
1064
b9e40524 1065 STRV_FOREACH(i, arg_system_units) {
ea18a4b5
ZJS
1066 _cleanup_free_ char *u = NULL;
1067
1068 u = unit_name_mangle(*i, MANGLE_GLOB);
b9e40524
HH
1069 if (!u)
1070 return log_oom();
ea18a4b5
ZJS
1071
1072 if (string_is_glob(u)) {
1073 r = strv_push(&patterns, u);
1074 if (r < 0)
1075 return r;
1076 u = NULL;
1077 } else {
1078 r = add_matches_for_unit(j, u);
1079 if (r < 0)
1080 return r;
1081 r = sd_journal_add_disjunction(j);
1082 if (r < 0)
1083 return r;
1084 count ++;
1085 }
1086 }
1087
1088 if (!strv_isempty(patterns)) {
1089 _cleanup_set_free_free_ Set *units = NULL;
1090 Iterator it;
1091 char *u;
1092
1093 r = get_possible_units(j, SYSTEM_UNITS, patterns, &units);
b9e40524
HH
1094 if (r < 0)
1095 return r;
ea18a4b5
ZJS
1096
1097 SET_FOREACH(u, units, it) {
1098 r = add_matches_for_unit(j, u);
1099 if (r < 0)
1100 return r;
1101 r = sd_journal_add_disjunction(j);
1102 if (r < 0)
1103 return r;
1104 count ++;
1105 }
b9e40524 1106 }
c3f60ec5 1107
ea18a4b5
ZJS
1108 strv_free(patterns);
1109 patterns = NULL;
1110
b9e40524 1111 STRV_FOREACH(i, arg_user_units) {
ea18a4b5
ZJS
1112 _cleanup_free_ char *u = NULL;
1113
1114 u = unit_name_mangle(*i, MANGLE_GLOB);
b9e40524
HH
1115 if (!u)
1116 return log_oom();
c3f60ec5 1117
ea18a4b5
ZJS
1118 if (string_is_glob(u)) {
1119 r = strv_push(&patterns, u);
1120 if (r < 0)
1121 return r;
1122 u = NULL;
1123 } else {
1124 r = add_matches_for_user_unit(j, u, getuid());
1125 if (r < 0)
1126 return r;
1127 r = sd_journal_add_disjunction(j);
1128 if (r < 0)
1129 return r;
1130 count ++;
1131 }
1132 }
1133
1134 if (!strv_isempty(patterns)) {
1135 _cleanup_set_free_free_ Set *units = NULL;
1136 Iterator it;
1137 char *u;
b9e40524 1138
ea18a4b5 1139 r = get_possible_units(j, USER_UNITS, patterns, &units);
b9e40524
HH
1140 if (r < 0)
1141 return r;
1142
ea18a4b5
ZJS
1143 SET_FOREACH(u, units, it) {
1144 r = add_matches_for_user_unit(j, u, getuid());
1145 if (r < 0)
1146 return r;
1147 r = sd_journal_add_disjunction(j);
1148 if (r < 0)
1149 return r;
1150 count ++;
1151 }
b9e40524 1152 }
c3f60ec5 1153
ea18a4b5
ZJS
1154 /* Complain if the user request matches but nothing whatsoever was
1155 * found, since otherwise everything would be matched. */
1156 if (!(strv_isempty(arg_system_units) && strv_isempty(arg_user_units)) && count == 0)
1157 return -ENODATA;
1158
cd34b3c6
HH
1159 r = sd_journal_add_conjunction(j);
1160 if (r < 0)
1161 return r;
1162
c3f60ec5
LP
1163 return 0;
1164}
1165
941e990d
LP
1166static int add_priorities(sd_journal *j) {
1167 char match[] = "PRIORITY=0";
1168 int i, r;
941e990d
LP
1169 assert(j);
1170
1171 if (arg_priorities == 0xFF)
1172 return 0;
1173
1174 for (i = LOG_EMERG; i <= LOG_DEBUG; i++)
1175 if (arg_priorities & (1 << i)) {
1176 match[sizeof(match)-2] = '0' + i;
1177
941e990d
LP
1178 r = sd_journal_add_match(j, match, strlen(match));
1179 if (r < 0) {
1180 log_error("Failed to add match: %s", strerror(-r));
1181 return r;
1182 }
1183 }
1184
cd34b3c6
HH
1185 r = sd_journal_add_conjunction(j);
1186 if (r < 0)
1187 return r;
1188
941e990d
LP
1189 return 0;
1190}
1191
7560fffc
LP
1192static int setup_keys(void) {
1193#ifdef HAVE_GCRYPT
1194 size_t mpk_size, seed_size, state_size, i;
1195 uint8_t *mpk, *seed, *state;
1196 ssize_t l;
f982e6f7 1197 int fd = -1, r, attr = 0;
7560fffc
LP
1198 sd_id128_t machine, boot;
1199 char *p = NULL, *k = NULL;
baed47c3 1200 struct FSSHeader h;
14d10188 1201 uint64_t n;
b98e3866
SL
1202 struct stat st;
1203
1204 r = stat("/var/log/journal", &st);
1205 if (r < 0 && errno != ENOENT && errno != ENOTDIR) {
1206 log_error("stat(\"%s\") failed: %m", "/var/log/journal");
1207 return -errno;
1208 }
1209
1210 if (r < 0 || !S_ISDIR(st.st_mode)) {
1211 log_error("%s is not a directory, must be using persistent logging for FSS.",
1212 "/var/log/journal");
1213 return r < 0 ? -errno : -ENOTDIR;
1214 }
7560fffc
LP
1215
1216 r = sd_id128_get_machine(&machine);
1217 if (r < 0) {
1218 log_error("Failed to get machine ID: %s", strerror(-r));
1219 return r;
1220 }
1221
1222 r = sd_id128_get_boot(&boot);
1223 if (r < 0) {
1224 log_error("Failed to get boot ID: %s", strerror(-r));
1225 return r;
1226 }
1227
baed47c3 1228 if (asprintf(&p, "/var/log/journal/" SD_ID128_FORMAT_STR "/fss",
7560fffc
LP
1229 SD_ID128_FORMAT_VAL(machine)) < 0)
1230 return log_oom();
1231
1232 if (access(p, F_OK) >= 0) {
b8547c10
SL
1233 if (arg_force) {
1234 r = unlink(p);
1235 if (r < 0) {
1236 log_error("unlink(\"%s\") failed: %m", p);
1237 r = -errno;
1238 goto finish;
1239 }
1240 } else {
1241 log_error("Sealing key file %s exists already. (--force to recreate)", p);
1242 r = -EEXIST;
1243 goto finish;
1244 }
7560fffc
LP
1245 }
1246
baed47c3 1247 if (asprintf(&k, "/var/log/journal/" SD_ID128_FORMAT_STR "/fss.tmp.XXXXXX",
7560fffc
LP
1248 SD_ID128_FORMAT_VAL(machine)) < 0) {
1249 r = log_oom();
1250 goto finish;
1251 }
1252
1253 mpk_size = FSPRG_mskinbytes(FSPRG_RECOMMENDED_SECPAR);
1254 mpk = alloca(mpk_size);
1255
1256 seed_size = FSPRG_RECOMMENDED_SEEDLEN;
1257 seed = alloca(seed_size);
1258
1259 state_size = FSPRG_stateinbytes(FSPRG_RECOMMENDED_SECPAR);
1260 state = alloca(state_size);
1261
1262 fd = open("/dev/random", O_RDONLY|O_CLOEXEC|O_NOCTTY);
1263 if (fd < 0) {
1264 log_error("Failed to open /dev/random: %m");
1265 r = -errno;
1266 goto finish;
1267 }
1268
1269 log_info("Generating seed...");
1270 l = loop_read(fd, seed, seed_size, true);
1271 if (l < 0 || (size_t) l != seed_size) {
1272 log_error("Failed to read random seed: %s", strerror(EIO));
1273 r = -EIO;
1274 goto finish;
1275 }
1276
1277 log_info("Generating key pair...");
1278 FSPRG_GenMK(NULL, mpk, seed, seed_size, FSPRG_RECOMMENDED_SECPAR);
1279
baed47c3 1280 log_info("Generating sealing key...");
7560fffc
LP
1281 FSPRG_GenState0(state, mpk, seed, seed_size);
1282
baed47c3
LP
1283 assert(arg_interval > 0);
1284
7560fffc 1285 n = now(CLOCK_REALTIME);
baed47c3 1286 n /= arg_interval;
7560fffc
LP
1287
1288 close_nointr_nofail(fd);
2d5bdf5b 1289 fd = mkostemp_safe(k, O_WRONLY|O_CLOEXEC);
7560fffc
LP
1290 if (fd < 0) {
1291 log_error("Failed to open %s: %m", k);
1292 r = -errno;
1293 goto finish;
1294 }
1295
f982e6f7
LP
1296 /* Enable secure remove, exclusion from dump, synchronous
1297 * writing and in-place updating */
1298 if (ioctl(fd, FS_IOC_GETFLAGS, &attr) < 0)
1299 log_warning("FS_IOC_GETFLAGS failed: %m");
1300
1301 attr |= FS_SECRM_FL|FS_NODUMP_FL|FS_SYNC_FL|FS_NOCOW_FL;
1302
1303 if (ioctl(fd, FS_IOC_SETFLAGS, &attr) < 0)
1304 log_warning("FS_IOC_SETFLAGS failed: %m");
1305
7560fffc
LP
1306 zero(h);
1307 memcpy(h.signature, "KSHHRHLP", 8);
1308 h.machine_id = machine;
1309 h.boot_id = boot;
1310 h.header_size = htole64(sizeof(h));
baed47c3
LP
1311 h.start_usec = htole64(n * arg_interval);
1312 h.interval_usec = htole64(arg_interval);
1313 h.fsprg_secpar = htole16(FSPRG_RECOMMENDED_SECPAR);
1314 h.fsprg_state_size = htole64(state_size);
7560fffc
LP
1315
1316 l = loop_write(fd, &h, sizeof(h), false);
1317 if (l < 0 || (size_t) l != sizeof(h)) {
1318 log_error("Failed to write header: %s", strerror(EIO));
1319 r = -EIO;
1320 goto finish;
1321 }
1322
1323 l = loop_write(fd, state, state_size, false);
1324 if (l < 0 || (size_t) l != state_size) {
1325 log_error("Failed to write state: %s", strerror(EIO));
1326 r = -EIO;
1327 goto finish;
1328 }
1329
1330 if (link(k, p) < 0) {
1331 log_error("Failed to link file: %m");
1332 r = -errno;
1333 goto finish;
1334 }
1335
8481248b 1336 if (on_tty()) {
7560fffc
LP
1337 fprintf(stderr,
1338 "\n"
baed47c3 1339 "The new key pair has been generated. The " ANSI_HIGHLIGHT_ON "secret sealing key" ANSI_HIGHLIGHT_OFF " has been written to\n"
c05276f2
LP
1340 "the following local file. This key file is automatically updated when the\n"
1341 "sealing key is advanced. It should not be used on multiple hosts.\n"
7560fffc
LP
1342 "\n"
1343 "\t%s\n"
1344 "\n"
baed47c3
LP
1345 "Please write down the following " ANSI_HIGHLIGHT_ON "secret verification key" ANSI_HIGHLIGHT_OFF ". It should be stored\n"
1346 "at a safe location and should not be saved locally on disk.\n"
7560fffc
LP
1347 "\n\t" ANSI_HIGHLIGHT_RED_ON, p);
1348 fflush(stderr);
1349 }
1350 for (i = 0; i < seed_size; i++) {
1351 if (i > 0 && i % 3 == 0)
1352 putchar('-');
1353 printf("%02x", ((uint8_t*) seed)[i]);
1354 }
1355
baed47c3
LP
1356 printf("/%llx-%llx\n", (unsigned long long) n, (unsigned long long) arg_interval);
1357
8481248b 1358 if (on_tty()) {
f6a971bc 1359 char tsb[FORMAT_TIMESPAN_MAX], *hn;
7560fffc 1360
baed47c3
LP
1361 fprintf(stderr,
1362 ANSI_HIGHLIGHT_OFF "\n"
1363 "The sealing key is automatically changed every %s.\n",
2fa4092c 1364 format_timespan(tsb, sizeof(tsb), arg_interval, 0));
f6a971bc
LP
1365
1366 hn = gethostname_malloc();
1367
1368 if (hn) {
e724b063 1369 hostname_cleanup(hn, false);
adac1c93 1370 fprintf(stderr, "\nThe keys have been generated for host %s/" SD_ID128_FORMAT_STR ".\n", hn, SD_ID128_FORMAT_VAL(machine));
f6a971bc 1371 } else
adac1c93 1372 fprintf(stderr, "\nThe keys have been generated for host " SD_ID128_FORMAT_STR ".\n", SD_ID128_FORMAT_VAL(machine));
f6a971bc
LP
1373
1374#ifdef HAVE_QRENCODE
cf5a3432 1375 /* If this is not an UTF-8 system don't print any QR codes */
09017585 1376 if (is_locale_utf8()) {
cf5a3432
LP
1377 fputs("\nTo transfer the verification key to your phone please scan the QR code below:\n\n", stderr);
1378 print_qr_code(stderr, seed, seed_size, n, arg_interval, hn, machine);
1379 }
f6a971bc
LP
1380#endif
1381 free(hn);
baed47c3 1382 }
7560fffc
LP
1383
1384 r = 0;
1385
1386finish:
1387 if (fd >= 0)
1388 close_nointr_nofail(fd);
1389
1390 if (k) {
1391 unlink(k);
1392 free(k);
1393 }
1394
1395 free(p);
1396
1397 return r;
1398#else
feb12d3e
LP
1399 log_error("Forward-secure sealing not available.");
1400 return -ENOTSUP;
7560fffc
LP
1401#endif
1402}
1403
beec0085
LP
1404static int verify(sd_journal *j) {
1405 int r = 0;
1406 Iterator i;
1407 JournalFile *f;
1408
1409 assert(j);
1410
cedb42bb
LP
1411 log_show_color(true);
1412
beec0085
LP
1413 HASHMAP_FOREACH(f, j->files, i) {
1414 int k;
2a7b539a 1415 usec_t first, validated, last;
beec0085 1416
56e81f7c 1417#ifdef HAVE_GCRYPT
feb12d3e 1418 if (!arg_verify_key && JOURNAL_HEADER_SEALED(f->header))
cedb42bb 1419 log_notice("Journal file %s has sealing enabled but verification key has not been passed using --verify-key=.", f->path);
56e81f7c 1420#endif
4da416aa 1421
2a7b539a 1422 k = journal_file_verify(f, arg_verify_key, &first, &validated, &last, true);
56e81f7c 1423 if (k == -EINVAL) {
baed47c3 1424 /* If the key was invalid give up right-away. */
56e81f7c
LP
1425 return k;
1426 } else if (k < 0) {
beec0085 1427 log_warning("FAIL: %s (%s)", f->path, strerror(-k));
56e81f7c 1428 r = k;
6c7be122
LP
1429 } else {
1430 char a[FORMAT_TIMESTAMP_MAX], b[FORMAT_TIMESTAMP_MAX], c[FORMAT_TIMESPAN_MAX];
beec0085 1431 log_info("PASS: %s", f->path);
6c7be122 1432
c0ca7aee 1433 if (arg_verify_key && JOURNAL_HEADER_SEALED(f->header)) {
2a7b539a 1434 if (validated > 0) {
c0ca7aee 1435 log_info("=> Validated from %s to %s, final %s entries not sealed.",
2a7b539a
LP
1436 format_timestamp(a, sizeof(a), first),
1437 format_timestamp(b, sizeof(b), validated),
2fa4092c 1438 format_timespan(c, sizeof(c), last > validated ? last - validated : 0, 0));
2a7b539a 1439 } else if (last > 0)
c0ca7aee 1440 log_info("=> No sealing yet, %s of entries not sealed.",
2fa4092c 1441 format_timespan(c, sizeof(c), last - first, 0));
c0ca7aee
LP
1442 else
1443 log_info("=> No sealing yet, no entries in file.");
1444 }
6c7be122 1445 }
beec0085
LP
1446 }
1447
1448 return r;
1449}
1450
15804ceb 1451#ifdef HAVE_ACL
6fe391c5
ZJS
1452static int access_check_var_log_journal(sd_journal *j) {
1453 _cleanup_strv_free_ char **g = NULL;
1454 bool have_access;
1455 int r;
1456
1457 assert(j);
1458
1459 have_access = in_group("systemd-journal") > 0;
1460
1461 if (!have_access) {
1462 /* Let's enumerate all groups from the default ACL of
1463 * the directory, which generally should allow access
1464 * to most journal files too */
1465 r = search_acl_groups(&g, "/var/log/journal/", &have_access);
1466 if (r < 0)
1467 return r;
15804ceb
LP
1468 }
1469
6fe391c5 1470 if (!have_access) {
4468addc 1471
6fe391c5 1472 if (strv_isempty(g))
3ac251b8
LP
1473 log_notice("Hint: You are currently not seeing messages from other users and the system.\n"
1474 " Users in the 'systemd-journal' group can see all messages. Pass -q to\n"
1475 " turn off this notice.");
6fe391c5
ZJS
1476 else {
1477 _cleanup_free_ char *s = NULL;
4468addc 1478
6fe391c5 1479 r = strv_extend(&g, "systemd-journal");
478c8269 1480 if (r < 0)
6fe391c5
ZJS
1481 return log_oom();
1482
1483 strv_sort(g);
1484 strv_uniq(g);
1485
1486 s = strv_join(g, "', '");
1487 if (!s)
1488 return log_oom();
1489
1490 log_notice("Hint: You are currently not seeing messages from other users and the system.\n"
3ac251b8
LP
1491 " Users in the groups '%s' can see all messages.\n"
1492 " Pass -q to turn off this notice.", s);
4468addc 1493 }
6fe391c5 1494 }
4468addc 1495
6fe391c5
ZJS
1496 return 0;
1497}
1498#endif
4468addc 1499
6fe391c5 1500static int access_check(sd_journal *j) {
6fe391c5 1501 Iterator it;
3ac251b8 1502 void *code;
6fe391c5 1503 int r = 0;
4468addc 1504
6fe391c5 1505 assert(j);
4468addc 1506
6fe391c5
ZJS
1507 if (set_isempty(j->errors)) {
1508 if (hashmap_isempty(j->files))
3ac251b8 1509 log_notice("No journal files were found.");
6fe391c5
ZJS
1510 return 0;
1511 }
4468addc 1512
3ac251b8 1513 if (set_contains(j->errors, INT_TO_PTR(-EACCES))) {
6fe391c5
ZJS
1514#ifdef HAVE_ACL
1515 /* If /var/log/journal doesn't even exist,
3ac251b8 1516 * unprivileged users have no access at all */
6fe391c5
ZJS
1517 if (access("/var/log/journal", F_OK) < 0 &&
1518 geteuid() != 0 &&
1519 in_group("systemd-journal") <= 0) {
3ac251b8
LP
1520 log_error("Unprivileged users cannot access messages, unless persistent log storage is\n"
1521 "enabled. Users in the 'systemd-journal' group may always access messages.");
6fe391c5
ZJS
1522 return -EACCES;
1523 }
4468addc 1524
6fe391c5
ZJS
1525 /* If /var/log/journal exists, try to pring a nice
1526 notice if the user lacks access to it */
1527 if (!arg_quiet && geteuid() != 0) {
1528 r = access_check_var_log_journal(j);
1529 if (r < 0)
1530 return r;
4468addc 1531 }
15804ceb 1532#else
3ac251b8
LP
1533 if (geteuid() != 0 && in_group("systemd-journal") <= 0) {
1534 log_error("Unprivileged users cannot access messages. Users in the 'systemd-journal' group\n"
1535 "group may access messages.");
1536 return -EACCES;
1537 }
15804ceb 1538#endif
3ac251b8 1539
6fe391c5 1540 if (hashmap_isempty(j->files)) {
3ac251b8 1541 log_error("No journal files were opened due to insufficient permissions.");
6fe391c5
ZJS
1542 r = -EACCES;
1543 }
1544 }
15804ceb 1545
6fe391c5 1546 SET_FOREACH(code, j->errors, it) {
3ac251b8
LP
1547 int err;
1548
1549 err = -PTR_TO_INT(code);
6fe391c5 1550 assert(err > 0);
3ac251b8 1551
6fe391c5
ZJS
1552 if (err != EACCES)
1553 log_warning("Error was encountered while opening journal files: %s",
1554 strerror(err));
1555 }
1556
6fe391c5 1557 return r;
15804ceb
LP
1558}
1559
a963990f
LP
1560int main(int argc, char *argv[]) {
1561 int r;
289f910e 1562 _cleanup_journal_close_ sd_journal *j = NULL;
a963990f 1563 bool need_seek = false;
14a65d65 1564 sd_id128_t previous_boot_id;
67e04a48
ZJS
1565 bool previous_boot_id_valid = false, first_line = true;
1566 int n_shown = 0;
94e0bd7d 1567 bool ellipsized = false;
a963990f 1568
a9cdc94f 1569 setlocale(LC_ALL, "");
a963990f
LP
1570 log_parse_environment();
1571 log_open();
1572
1573 r = parse_argv(argc, argv);
1574 if (r <= 0)
1575 goto finish;
1576
ed757c0c
LP
1577 signal(SIGWINCH, columns_lines_cache_reset);
1578
7560fffc 1579 if (arg_action == ACTION_NEW_ID128) {
a963990f
LP
1580 r = generate_new_id128();
1581 goto finish;
1582 }
1583
7560fffc
LP
1584 if (arg_action == ACTION_SETUP_KEYS) {
1585 r = setup_keys();
1586 goto finish;
1587 }
1588
844ec79b
ZJS
1589 if (arg_action == ACTION_UPDATE_CATALOG ||
1590 arg_action == ACTION_LIST_CATALOG ||
1591 arg_action == ACTION_DUMP_CATALOG) {
1592
0db80948 1593 const char* database = CATALOG_DATABASE;
7fd1b19b 1594 _cleanup_free_ char *copy = NULL;
0db80948
ZJS
1595 if (arg_root) {
1596 copy = strjoin(arg_root, "/", CATALOG_DATABASE, NULL);
3a819b1b 1597 if (!copy) {
0db80948
ZJS
1598 r = log_oom();
1599 goto finish;
1600 }
1601 path_kill_slashes(copy);
1602 database = copy;
13cbf3a5
ZJS
1603 }
1604
844ec79b 1605 if (arg_action == ACTION_UPDATE_CATALOG) {
13cbf3a5 1606 r = catalog_update(database, arg_root, catalog_file_dirs);
844ec79b
ZJS
1607 if (r < 0)
1608 log_error("Failed to list catalog: %s", strerror(-r));
1609 } else {
1610 bool oneline = arg_action == ACTION_LIST_CATALOG;
1611
1612 if (optind < argc)
13cbf3a5 1613 r = catalog_list_items(stdout, database,
844ec79b
ZJS
1614 oneline, argv + optind);
1615 else
13cbf3a5 1616 r = catalog_list(stdout, database, oneline);
844ec79b
ZJS
1617 if (r < 0)
1618 log_error("Failed to list catalog: %s", strerror(-r));
1619 }
d4205751 1620
d4205751
LP
1621 goto finish;
1622 }
1623
a963990f 1624 if (arg_directory)
3f3a438f 1625 r = sd_journal_open_directory(&j, arg_directory, arg_journal_type);
8d98da3f
ZJS
1626 else if (arg_file)
1627 r = sd_journal_open_files(&j, (const char**) arg_file, 0);
b6741478
LP
1628 else if (arg_machine)
1629 r = sd_journal_open_container(&j, arg_machine, 0);
a963990f 1630 else
3f3a438f 1631 r = sd_journal_open(&j, !arg_merge*SD_JOURNAL_LOCAL_ONLY + arg_journal_type);
a963990f 1632 if (r < 0) {
8d98da3f
ZJS
1633 log_error("Failed to open %s: %s",
1634 arg_directory ? arg_directory : arg_file ? "files" : "journal",
1635 strerror(-r));
763c7aa2 1636 return EXIT_FAILURE;
a963990f
LP
1637 }
1638
6fe391c5
ZJS
1639 r = access_check(j);
1640 if (r < 0)
1641 return EXIT_FAILURE;
1642
beec0085
LP
1643 if (arg_action == ACTION_VERIFY) {
1644 r = verify(j);
1645 goto finish;
1646 }
1647
7560fffc 1648 if (arg_action == ACTION_PRINT_HEADER) {
dca6219e 1649 journal_print_header(j);
763c7aa2 1650 return EXIT_SUCCESS;
dca6219e
LP
1651 }
1652
a1a03e30 1653 if (arg_action == ACTION_DISK_USAGE) {
39883f62 1654 uint64_t bytes = 0;
a1a03e30
LP
1655 char sbytes[FORMAT_BYTES_MAX];
1656
1657 r = sd_journal_get_usage(j, &bytes);
1658 if (r < 0)
763c7aa2 1659 return EXIT_FAILURE;
a1a03e30 1660
763c7aa2
ZJS
1661 printf("Journals take up %s on disk.\n",
1662 format_bytes(sbytes, sizeof(sbytes), bytes));
1663 return EXIT_SUCCESS;
a1a03e30
LP
1664 }
1665
f1188074
ZJS
1666 if (arg_action == ACTION_LIST_BOOTS) {
1667 r = list_boots(j);
1668 goto finish;
1669 }
1670
a331b5e6
JJ
1671 /* add_boot() must be called first!
1672 * It may need to seek the journal to find parent boot IDs. */
1673 r = add_boot(j);
a963990f 1674 if (r < 0)
763c7aa2 1675 return EXIT_FAILURE;
a963990f 1676
99271804
ZJS
1677 r = add_dmesg(j);
1678 if (r < 0)
1679 return EXIT_FAILURE;
1680
b9e40524
HH
1681 r = add_units(j);
1682 strv_free(arg_system_units);
1683 strv_free(arg_user_units);
1684
ea18a4b5
ZJS
1685 if (r < 0) {
1686 log_error("Failed to add filter for units: %s", strerror(-r));
763c7aa2 1687 return EXIT_FAILURE;
ea18a4b5 1688 }
c3f60ec5 1689
cd34b3c6 1690 r = add_priorities(j);
ea18a4b5
ZJS
1691 if (r < 0) {
1692 log_error("Failed to add filter for priorities: %s", strerror(-r));
763c7aa2 1693 return EXIT_FAILURE;
ea18a4b5 1694 }
a963990f 1695
cd34b3c6 1696 r = add_matches(j, argv + optind);
ea18a4b5
ZJS
1697 if (r < 0) {
1698 log_error("Failed to add filters: %s", strerror(-r));
763c7aa2 1699 return EXIT_FAILURE;
ea18a4b5 1700 }
941e990d 1701
4ad16808
ZJS
1702 if (_unlikely_(log_get_max_level() >= LOG_PRI(LOG_DEBUG))) {
1703 _cleanup_free_ char *filter;
1704
1705 filter = journal_make_match_string(j);
1706 log_debug("Journal filter: %s", filter);
1707 }
67e04a48 1708
15119c16
LP
1709 if (arg_field) {
1710 const void *data;
1711 size_t size;
1712
21ae4593
ZJS
1713 r = sd_journal_set_data_threshold(j, 0);
1714 if (r < 0) {
1715 log_error("Failed to unset data size threshold");
1716 return EXIT_FAILURE;
1717 }
1718
15119c16
LP
1719 r = sd_journal_query_unique(j, arg_field);
1720 if (r < 0) {
1721 log_error("Failed to query unique data objects: %s", strerror(-r));
763c7aa2 1722 return EXIT_FAILURE;
15119c16
LP
1723 }
1724
1725 SD_JOURNAL_FOREACH_UNIQUE(j, data, size) {
1726 const void *eq;
1727
67e04a48 1728 if (arg_lines >= 0 && n_shown >= arg_lines)
fd6e8875
LP
1729 break;
1730
15119c16
LP
1731 eq = memchr(data, '=', size);
1732 if (eq)
1733 printf("%.*s\n", (int) (size - ((const uint8_t*) eq - (const uint8_t*) data + 1)), (const char*) eq + 1);
1734 else
1735 printf("%.*s\n", (int) size, (const char*) data);
fd6e8875
LP
1736
1737 n_shown ++;
15119c16
LP
1738 }
1739
763c7aa2 1740 return EXIT_SUCCESS;
15119c16
LP
1741 }
1742
8d98da3f
ZJS
1743 /* Opening the fd now means the first sd_journal_wait() will actually wait */
1744 if (arg_follow) {
1745 r = sd_journal_get_fd(j);
1746 if (r < 0)
1747 return EXIT_FAILURE;
1748 }
1749
248fc619
ZJS
1750 if (arg_cursor || arg_after_cursor) {
1751 r = sd_journal_seek_cursor(j, arg_cursor ? arg_cursor : arg_after_cursor);
08984293 1752 if (r < 0) {
cfbc22ab 1753 log_error("Failed to seek to cursor: %s", strerror(-r));
763c7aa2 1754 return EXIT_FAILURE;
08984293 1755 }
d89d6c86 1756 if (!arg_reverse)
248fc619 1757 r = sd_journal_next_skip(j, 1 + !!arg_after_cursor);
d89d6c86 1758 else
248fc619
ZJS
1759 r = sd_journal_previous_skip(j, 1 + !!arg_after_cursor);
1760
1761 if (arg_after_cursor && r < 2 && !arg_follow)
1762 /* We couldn't find the next entry after the cursor. */
1763 arg_lines = 0;
08984293 1764
d89d6c86 1765 } else if (arg_since_set && !arg_reverse) {
cfbc22ab 1766 r = sd_journal_seek_realtime_usec(j, arg_since);
8f14c832 1767 if (r < 0) {
cfbc22ab 1768 log_error("Failed to seek to date: %s", strerror(-r));
763c7aa2 1769 return EXIT_FAILURE;
8f14c832 1770 }
8f14c832
LP
1771 r = sd_journal_next(j);
1772
d89d6c86
LN
1773 } else if (arg_until_set && arg_reverse) {
1774 r = sd_journal_seek_realtime_usec(j, arg_until);
1775 if (r < 0) {
1776 log_error("Failed to seek to date: %s", strerror(-r));
763c7aa2 1777 return EXIT_FAILURE;
d89d6c86
LN
1778 }
1779 r = sd_journal_previous(j);
1780
67e04a48 1781 } else if (arg_lines >= 0) {
2100675e
LP
1782 r = sd_journal_seek_tail(j);
1783 if (r < 0) {
1784 log_error("Failed to seek to tail: %s", strerror(-r));
763c7aa2 1785 return EXIT_FAILURE;
2100675e
LP
1786 }
1787
1788 r = sd_journal_previous_skip(j, arg_lines);
8f14c832 1789
d89d6c86
LN
1790 } else if (arg_reverse) {
1791 r = sd_journal_seek_tail(j);
1792 if (r < 0) {
1793 log_error("Failed to seek to tail: %s", strerror(-r));
763c7aa2 1794 return EXIT_FAILURE;
d89d6c86
LN
1795 }
1796
1797 r = sd_journal_previous(j);
1798
2100675e
LP
1799 } else {
1800 r = sd_journal_seek_head(j);
1801 if (r < 0) {
1802 log_error("Failed to seek to head: %s", strerror(-r));
763c7aa2 1803 return EXIT_FAILURE;
2100675e 1804 }
6f003b43
LP
1805
1806 r = sd_journal_next(j);
1807 }
1808
1809 if (r < 0) {
1810 log_error("Failed to iterate through journal: %s", strerror(-r));
763c7aa2 1811 return EXIT_FAILURE;
50f20cfd 1812 }
87d2c1ff 1813
faf5077f
DH
1814 if (!arg_follow)
1815 pager_open_if_enabled();
0d43c694 1816
cfbc22ab
LP
1817 if (!arg_quiet) {
1818 usec_t start, end;
1819 char start_buf[FORMAT_TIMESTAMP_MAX], end_buf[FORMAT_TIMESTAMP_MAX];
1820
1821 r = sd_journal_get_cutoff_realtime_usec(j, &start, &end);
1822 if (r < 0) {
1823 log_error("Failed to get cutoff: %s", strerror(-r));
1824 goto finish;
1825 }
1826
1827 if (r > 0) {
1828 if (arg_follow)
9048b11f
LP
1829 printf("-- Logs begin at %s. --\n",
1830 format_timestamp(start_buf, sizeof(start_buf), start));
cfbc22ab 1831 else
9048b11f 1832 printf("-- Logs begin at %s, end at %s. --\n",
cfbc22ab
LP
1833 format_timestamp(start_buf, sizeof(start_buf), start),
1834 format_timestamp(end_buf, sizeof(end_buf), end));
1835 }
1836 }
1837
50f20cfd 1838 for (;;) {
67e04a48 1839 while (arg_lines < 0 || n_shown < arg_lines || (arg_follow && !first_line)) {
cfbc22ab
LP
1840 int flags;
1841
6f003b43 1842 if (need_seek) {
99613ec5 1843 if (!arg_reverse)
d89d6c86
LN
1844 r = sd_journal_next(j);
1845 else
1846 r = sd_journal_previous(j);
6f003b43
LP
1847 if (r < 0) {
1848 log_error("Failed to iterate through journal: %s", strerror(-r));
1849 goto finish;
1850 }
a72b6353
ZJS
1851 if (r == 0)
1852 break;
0d43c694
LP
1853 }
1854
d89d6c86 1855 if (arg_until_set && !arg_reverse) {
cfbc22ab
LP
1856 usec_t usec;
1857
1858 r = sd_journal_get_realtime_usec(j, &usec);
1859 if (r < 0) {
1860 log_error("Failed to determine timestamp: %s", strerror(-r));
1861 goto finish;
1862 }
3ba09ee8
PF
1863 if (usec > arg_until)
1864 goto finish;
cfbc22ab
LP
1865 }
1866
d89d6c86
LN
1867 if (arg_since_set && arg_reverse) {
1868 usec_t usec;
1869
1870 r = sd_journal_get_realtime_usec(j, &usec);
1871 if (r < 0) {
1872 log_error("Failed to determine timestamp: %s", strerror(-r));
1873 goto finish;
1874 }
1875 if (usec < arg_since)
1876 goto finish;
1877 }
1878
cd931c0a
LP
1879 if (!arg_merge) {
1880 sd_id128_t boot_id;
14a65d65 1881
cd931c0a
LP
1882 r = sd_journal_get_monotonic_usec(j, NULL, &boot_id);
1883 if (r >= 0) {
1884 if (previous_boot_id_valid &&
1885 !sd_id128_equal(boot_id, previous_boot_id))
0b5a519c
DS
1886 printf("%s-- Reboot --%s\n",
1887 ansi_highlight(), ansi_highlight_off());
cd931c0a
LP
1888
1889 previous_boot_id = boot_id;
1890 previous_boot_id_valid = true;
1891 }
14a65d65
LP
1892 }
1893
cfbc22ab 1894 flags =
cd4b13e0 1895 arg_all * OUTPUT_SHOW_ALL |
2b8f6883 1896 arg_full * OUTPUT_FULL_WIDTH |
d4205751
LP
1897 on_tty() * OUTPUT_COLOR |
1898 arg_catalog * OUTPUT_CATALOG;
cfbc22ab 1899
94e0bd7d 1900 r = output_journal(stdout, j, arg_output, 0, flags, &ellipsized);
a72b6353
ZJS
1901 need_seek = true;
1902 if (r == -EADDRNOTAVAIL)
1903 break;
1904 else if (r < 0 || ferror(stdout))
72f59706 1905 goto finish;
6f003b43 1906
cfbc22ab 1907 n_shown++;
87d2c1ff
LP
1908 }
1909
248fc619
ZJS
1910 if (!arg_follow) {
1911 if (arg_show_cursor) {
1912 _cleanup_free_ char *cursor = NULL;
1913
1914 r = sd_journal_get_cursor(j, &cursor);
1915 if (r < 0 && r != -EADDRNOTAVAIL)
1916 log_error("Failed to get cursor: %s", strerror(-r));
1917 else if (r >= 0)
1918 printf("-- cursor: %s\n", cursor);
1919 }
1920
50f20cfd 1921 break;
248fc619 1922 }
50f20cfd 1923
e02d1cf7 1924 r = sd_journal_wait(j, (uint64_t) -1);
50f20cfd 1925 if (r < 0) {
7a69007a 1926 log_error("Couldn't wait for journal event: %s", strerror(-r));
50f20cfd
LP
1927 goto finish;
1928 }
67e04a48
ZJS
1929
1930 first_line = false;
de190aef 1931 }
87d2c1ff
LP
1932
1933finish:
0d43c694
LP
1934 pager_close();
1935
3fbf9cbb 1936 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
87d2c1ff 1937}