]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/journal/journalctl.c
efivars: itialize variable
[thirdparty/systemd.git] / src / journal / journalctl.c
CommitLineData
87d2c1ff
LP
1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3/***
4 This file is part of systemd.
5
6 Copyright 2011 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
5430f7f2
LP
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
87d2c1ff
LP
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
5430f7f2 16 Lesser General Public License for more details.
87d2c1ff 17
5430f7f2 18 You should have received a copy of the GNU Lesser General Public License
87d2c1ff
LP
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
a9cdc94f 22#include <locale.h>
87d2c1ff 23#include <fcntl.h>
ea18a4b5 24#include <fnmatch.h>
87d2c1ff
LP
25#include <errno.h>
26#include <stddef.h>
3fbf9cbb
LP
27#include <string.h>
28#include <stdio.h>
29#include <unistd.h>
30#include <stdlib.h>
0d43c694 31#include <getopt.h>
585314e8 32#include <signal.h>
74055aa7 33#include <poll.h>
50940700 34#include <sys/stat.h>
74055aa7 35#include <sys/inotify.h>
f982e6f7 36#include <linux/fs.h>
87d2c1ff 37
74055aa7
LP
38#include "sd-journal.h"
39#include "sd-bus.h"
81527be1 40
3fbf9cbb 41#include "log.h"
7199aa96 42#include "logs-show.h"
72f59706 43#include "util.h"
f8eeeaf9 44#include "acl-util.h"
e5124088 45#include "path-util.h"
68fee104 46#include "fileio.h"
0d43c694
LP
47#include "build.h"
48#include "pager.h"
a963990f 49#include "strv.h"
ea18a4b5 50#include "set.h"
2cf4172a 51#include "sigbus.h"
dca6219e 52#include "journal-internal.h"
7560fffc 53#include "journal-def.h"
0284adc6 54#include "journal-verify.h"
f6a971bc 55#include "journal-qrcode.h"
dbd2a83f 56#include "journal-vacuum.h"
4da416aa 57#include "fsprg.h"
c3f60ec5 58#include "unit-name.h"
d4205751 59#include "catalog.h"
74055aa7
LP
60#include "mkdir.h"
61#include "bus-util.h"
62#include "bus-error.h"
7560fffc 63
baed47c3 64#define DEFAULT_FSS_INTERVAL_USEC (15*USEC_PER_MINUTE)
250d54b5 65
97e1cc8b
LP
66enum {
67 /* Special values for arg_lines */
68 ARG_LINES_DEFAULT = -2,
69 ARG_LINES_ALL = -1,
70};
71
df50185b 72static OutputMode arg_output = OUTPUT_SHORT;
9fd29044 73static bool arg_utc = false;
1b12a7b5 74static bool arg_pager_end = false;
72f59706 75static bool arg_follow = false;
2b8f6883 76static bool arg_full = true;
cd4b13e0 77static bool arg_all = false;
0d43c694 78static bool arg_no_pager = false;
97e1cc8b 79static int arg_lines = ARG_LINES_DEFAULT;
e91af489 80static bool arg_no_tail = false;
43673799 81static bool arg_quiet = false;
9e8a535f 82static bool arg_merge = false;
d121b396 83static bool arg_boot = false;
442e2def
LP
84static sd_id128_t arg_boot_id = {};
85static int arg_boot_offset = 0;
99271804 86static bool arg_dmesg = false;
8f14c832 87static const char *arg_cursor = NULL;
248fc619
ZJS
88static const char *arg_after_cursor = NULL;
89static bool arg_show_cursor = false;
a963990f 90static const char *arg_directory = NULL;
8d98da3f 91static char **arg_file = NULL;
941e990d 92static int arg_priorities = 0xFF;
baed47c3 93static const char *arg_verify_key = NULL;
feb12d3e 94#ifdef HAVE_GCRYPT
baed47c3 95static usec_t arg_interval = DEFAULT_FSS_INTERVAL_USEC;
b8547c10 96static bool arg_force = false;
feb12d3e 97#endif
cfbc22ab
LP
98static usec_t arg_since, arg_until;
99static bool arg_since_set = false, arg_until_set = false;
73083640 100static char **arg_syslog_identifier = NULL;
b9e40524
HH
101static char **arg_system_units = NULL;
102static char **arg_user_units = NULL;
3c1668da 103static const char *arg_field = NULL;
d4205751 104static bool arg_catalog = false;
d89d6c86 105static bool arg_reverse = false;
3f3a438f 106static int arg_journal_type = 0;
13cbf3a5 107static const char *arg_root = NULL;
b6741478 108static const char *arg_machine = NULL;
dbd2a83f
LP
109static off_t arg_vacuum_size = (off_t) -1;
110static usec_t arg_vacuum_time = USEC_INFINITY;
50f20cfd 111
7560fffc
LP
112static enum {
113 ACTION_SHOW,
114 ACTION_NEW_ID128,
115 ACTION_PRINT_HEADER,
beec0085 116 ACTION_SETUP_KEYS,
a1a03e30
LP
117 ACTION_VERIFY,
118 ACTION_DISK_USAGE,
d4205751 119 ACTION_LIST_CATALOG,
54b7254c 120 ACTION_DUMP_CATALOG,
f1188074
ZJS
121 ACTION_UPDATE_CATALOG,
122 ACTION_LIST_BOOTS,
74055aa7 123 ACTION_FLUSH,
dbd2a83f 124 ACTION_VACUUM,
7560fffc
LP
125} arg_action = ACTION_SHOW;
126
a331b5e6
JJ
127typedef struct boot_id_t {
128 sd_id128_t id;
f1188074
ZJS
129 uint64_t first;
130 uint64_t last;
a331b5e6
JJ
131} boot_id_t;
132
faf5077f
DH
133static void pager_open_if_enabled(void) {
134
135 if (arg_no_pager)
136 return;
137
138 pager_open(arg_pager_end);
139}
140
5ab99e07
LP
141static char *format_timestamp_maybe_utc(char *buf, size_t l, usec_t t) {
142
143 if (arg_utc)
144 return format_timestamp_utc(buf, l, t);
145
146 return format_timestamp(buf, l, t);
147}
148
442e2def
LP
149static int parse_boot_descriptor(const char *x, sd_id128_t *boot_id, int *offset) {
150 sd_id128_t id = SD_ID128_NULL;
151 int off = 0, r;
152
153 if (strlen(x) >= 32) {
154 char *t;
155
156 t = strndupa(x, 32);
157 r = sd_id128_from_string(t, &id);
158 if (r >= 0)
159 x += 32;
160
161 if (*x != '-' && *x != '+' && *x != 0)
162 return -EINVAL;
163
164 if (*x != 0) {
165 r = safe_atoi(x, &off);
166 if (r < 0)
167 return r;
168 }
169 } else {
170 r = safe_atoi(x, &off);
171 if (r < 0)
172 return r;
173 }
174
175 if (boot_id)
176 *boot_id = id;
177
178 if (offset)
179 *offset = off;
180
181 return 0;
182}
183
601185b4 184static void help(void) {
0d43c694 185
faf5077f
DH
186 pager_open_if_enabled();
187
cd4b13e0 188 printf("%s [OPTIONS...] [MATCHES...]\n\n"
15119c16
LP
189 "Query the journal.\n\n"
190 "Flags:\n"
eacbb4d3
ZJS
191 " --system Show the system journal\n"
192 " --user Show the user journal for the current user\n"
b6741478 193 " -M --machine=CONTAINER Operate on local container\n"
40f0b71b
ZJS
194 " --since=DATE Show entries not older than the specified date\n"
195 " --until=DATE Show entries not newer than the specified date\n"
196 " -c --cursor=CURSOR Show entries starting at the specified cursor\n"
197 " --after-cursor=CURSOR Show entries after the specified cursor\n"
248fc619 198 " --show-cursor Print the cursor after all the entries\n"
40f0b71b 199 " -b --boot[=ID] Show current boot or the specified boot\n"
f1188074 200 " --list-boots Show terse information about recorded boots\n"
c736283b 201 " -k --dmesg Show kernel message log from the current boot\n"
40f0b71b
ZJS
202 " -u --unit=UNIT Show logs from the specified unit\n"
203 " --user-unit=UNIT Show logs from the specified user unit\n"
204 " -t --identifier=STRING Show entries with the specified syslog identifier\n"
205 " -p --priority=RANGE Show entries with the specified priority\n"
206 " -e --pager-end Immediately jump to the end in the pager\n"
c736283b 207 " -f --follow Follow the journal\n"
248fc619
ZJS
208 " -n --lines[=INTEGER] Number of journal entries to show\n"
209 " --no-tail Show all lines, even in follow mode\n"
210 " -r --reverse Show the newest entries first\n"
f02d8367 211 " -o --output=STRING Change journal output mode (short, short-iso,\n"
c736283b
JSJ
212 " short-precise, short-monotonic, verbose,\n"
213 " export, json, json-pretty, json-sse, cat)\n"
9fd29044 214 " --utc Express time in Coordinated Universal Time (UTC)\n"
248fc619 215 " -x --catalog Add message explanations where available\n"
2b8f6883 216 " --no-full Ellipsize fields\n"
248fc619 217 " -a --all Show all fields, including long and unprintable\n"
c736283b 218 " -q --quiet Do not show privilege warning\n"
248fc619
ZJS
219 " --no-pager Do not pipe output into a pager\n"
220 " -m --merge Show entries from all available journals\n"
221 " -D --directory=PATH Show journal files from directory\n"
222 " --file=PATH Show journal file\n"
223 " --root=ROOT Operate on catalog files underneath the root ROOT\n"
15119c16 224#ifdef HAVE_GCRYPT
248fc619
ZJS
225 " --interval=TIME Time interval for changing the FSS sealing key\n"
226 " --verify-key=KEY Specify FSS verification key\n"
40f0b71b 227 " --force Override of the FSS key pair with --setup-keys\n"
15119c16
LP
228#endif
229 "\nCommands:\n"
c736283b 230 " -h --help Show this help text\n"
248fc619 231 " --version Show package version\n"
dbd2a83f 232 " -F --field=FIELD List all values that a specified field takes\n"
c736283b 233 " --new-id128 Generate a new 128-bit ID\n"
c736283b 234 " --disk-usage Show total disk usage of all journal files\n"
40f0b71b
ZJS
235 " --vacuum-size=BYTES Reduce disk usage below specified size\n"
236 " --vacuum-time=TIME Remove journal files older than specified date\n"
dbd2a83f
LP
237 " --flush Flush all journal data from /run into /var\n"
238 " --header Show journal header information\n"
40f0b71b 239 " --list-catalog Show all message IDs in the catalog\n"
248fc619
ZJS
240 " --dump-catalog Show entries in the message catalog\n"
241 " --update-catalog Update the message catalog database\n"
feb12d3e 242#ifdef HAVE_GCRYPT
c736283b 243 " --setup-keys Generate a new FSS key pair\n"
248fc619 244 " --verify Verify journal file consistency\n"
feb12d3e
LP
245#endif
246 , program_invocation_short_name);
0d43c694
LP
247}
248
249static int parse_argv(int argc, char *argv[]) {
250
251 enum {
252 ARG_VERSION = 0x100,
e91af489 253 ARG_NO_PAGER,
2b8f6883 254 ARG_NO_FULL,
55ee336c 255 ARG_NO_TAIL,
dca6219e 256 ARG_NEW_ID128,
f1188074 257 ARG_LIST_BOOTS,
3f3a438f
ZJS
258 ARG_USER,
259 ARG_SYSTEM,
13cbf3a5 260 ARG_ROOT,
7560fffc 261 ARG_HEADER,
beec0085 262 ARG_SETUP_KEYS,
8d98da3f 263 ARG_FILE,
baed47c3 264 ARG_INTERVAL,
4da416aa 265 ARG_VERIFY,
a1a03e30 266 ARG_VERIFY_KEY,
cfbc22ab
LP
267 ARG_DISK_USAGE,
268 ARG_SINCE,
d4205751 269 ARG_UNTIL,
248fc619
ZJS
270 ARG_AFTER_CURSOR,
271 ARG_SHOW_CURSOR,
ffa7cd15 272 ARG_USER_UNIT,
d4205751 273 ARG_LIST_CATALOG,
54b7254c 274 ARG_DUMP_CATALOG,
3f3a438f 275 ARG_UPDATE_CATALOG,
b8547c10 276 ARG_FORCE,
9fd29044 277 ARG_UTC,
74055aa7 278 ARG_FLUSH,
dbd2a83f
LP
279 ARG_VACUUM_SIZE,
280 ARG_VACUUM_TIME,
0d43c694
LP
281 };
282
283 static const struct option options[] = {
248fc619
ZJS
284 { "help", no_argument, NULL, 'h' },
285 { "version" , no_argument, NULL, ARG_VERSION },
286 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
287 { "pager-end", no_argument, NULL, 'e' },
288 { "follow", no_argument, NULL, 'f' },
289 { "force", no_argument, NULL, ARG_FORCE },
290 { "output", required_argument, NULL, 'o' },
291 { "all", no_argument, NULL, 'a' },
292 { "full", no_argument, NULL, 'l' },
2b8f6883 293 { "no-full", no_argument, NULL, ARG_NO_FULL },
248fc619
ZJS
294 { "lines", optional_argument, NULL, 'n' },
295 { "no-tail", no_argument, NULL, ARG_NO_TAIL },
296 { "new-id128", no_argument, NULL, ARG_NEW_ID128 },
297 { "quiet", no_argument, NULL, 'q' },
298 { "merge", no_argument, NULL, 'm' },
299 { "boot", optional_argument, NULL, 'b' },
f1188074 300 { "list-boots", no_argument, NULL, ARG_LIST_BOOTS },
248fc619
ZJS
301 { "this-boot", optional_argument, NULL, 'b' }, /* deprecated */
302 { "dmesg", no_argument, NULL, 'k' },
303 { "system", no_argument, NULL, ARG_SYSTEM },
304 { "user", no_argument, NULL, ARG_USER },
305 { "directory", required_argument, NULL, 'D' },
306 { "file", required_argument, NULL, ARG_FILE },
307 { "root", required_argument, NULL, ARG_ROOT },
308 { "header", no_argument, NULL, ARG_HEADER },
73083640 309 { "identifier", required_argument, NULL, 't' },
248fc619
ZJS
310 { "priority", required_argument, NULL, 'p' },
311 { "setup-keys", no_argument, NULL, ARG_SETUP_KEYS },
312 { "interval", required_argument, NULL, ARG_INTERVAL },
313 { "verify", no_argument, NULL, ARG_VERIFY },
314 { "verify-key", required_argument, NULL, ARG_VERIFY_KEY },
315 { "disk-usage", no_argument, NULL, ARG_DISK_USAGE },
316 { "cursor", required_argument, NULL, 'c' },
317 { "after-cursor", required_argument, NULL, ARG_AFTER_CURSOR },
318 { "show-cursor", no_argument, NULL, ARG_SHOW_CURSOR },
319 { "since", required_argument, NULL, ARG_SINCE },
320 { "until", required_argument, NULL, ARG_UNTIL },
321 { "unit", required_argument, NULL, 'u' },
322 { "user-unit", required_argument, NULL, ARG_USER_UNIT },
323 { "field", required_argument, NULL, 'F' },
324 { "catalog", no_argument, NULL, 'x' },
325 { "list-catalog", no_argument, NULL, ARG_LIST_CATALOG },
326 { "dump-catalog", no_argument, NULL, ARG_DUMP_CATALOG },
327 { "update-catalog", no_argument, NULL, ARG_UPDATE_CATALOG },
328 { "reverse", no_argument, NULL, 'r' },
b6741478 329 { "machine", required_argument, NULL, 'M' },
9fd29044 330 { "utc", no_argument, NULL, ARG_UTC },
74055aa7 331 { "flush", no_argument, NULL, ARG_FLUSH },
dbd2a83f
LP
332 { "vacuum-size", required_argument, NULL, ARG_VACUUM_SIZE },
333 { "vacuum-time", required_argument, NULL, ARG_VACUUM_TIME },
eb9da376 334 {}
0d43c694
LP
335 };
336
2100675e 337 int c, r;
0d43c694
LP
338
339 assert(argc >= 0);
340 assert(argv);
341
73083640 342 while ((c = getopt_long(argc, argv, "hefo:aln::qmb::kD:p:c:t:u:F:xrM:", options, NULL)) >= 0)
0d43c694
LP
343
344 switch (c) {
345
346 case 'h':
601185b4
ZJS
347 help();
348 return 0;
0d43c694
LP
349
350 case ARG_VERSION:
351 puts(PACKAGE_STRING);
0d43c694
LP
352 puts(SYSTEMD_FEATURES);
353 return 0;
354
355 case ARG_NO_PAGER:
356 arg_no_pager = true;
357 break;
358
1b12a7b5
HH
359 case 'e':
360 arg_pager_end = true;
fe59e38b 361
97e1cc8b 362 if (arg_lines == ARG_LINES_DEFAULT)
fe59e38b
LP
363 arg_lines = 1000;
364
1b12a7b5
HH
365 break;
366
0d43c694
LP
367 case 'f':
368 arg_follow = true;
369 break;
370
371 case 'o':
1705594f 372 arg_output = output_mode_from_string(optarg);
df50185b 373 if (arg_output < 0) {
edfb521a 374 log_error("Unknown output format '%s'.", optarg);
0d43c694
LP
375 return -EINVAL;
376 }
df50185b 377
edfb521a
ZJS
378 if (arg_output == OUTPUT_EXPORT ||
379 arg_output == OUTPUT_JSON ||
380 arg_output == OUTPUT_JSON_PRETTY ||
381 arg_output == OUTPUT_JSON_SSE ||
382 arg_output == OUTPUT_CAT)
383 arg_quiet = true;
384
0d43c694
LP
385 break;
386
98a6e132 387 case 'l':
e3657ecd
ZJS
388 arg_full = true;
389 break;
390
2b8f6883
ZJS
391 case ARG_NO_FULL:
392 arg_full = false;
393 break;
394
0d43c694 395 case 'a':
cd4b13e0 396 arg_all = true;
0d43c694
LP
397 break;
398
2100675e 399 case 'n':
1705594f 400 if (optarg) {
48382487 401 if (streq(optarg, "all"))
97e1cc8b 402 arg_lines = ARG_LINES_ALL;
48382487
JJ
403 else {
404 r = safe_atoi(optarg, &arg_lines);
405 if (r < 0 || arg_lines < 0) {
406 log_error("Failed to parse lines '%s'", optarg);
407 return -EINVAL;
408 }
1705594f 409 }
96088db0 410 } else {
48382487 411 arg_lines = 10;
96088db0
LP
412
413 /* Hmm, no argument? Maybe the next
414 * word on the command line is
415 * supposed to be the argument? Let's
416 * see if there is one, and is
48382487
JJ
417 * parsable. */
418 if (optind < argc) {
419 int n;
420 if (streq(argv[optind], "all")) {
97e1cc8b 421 arg_lines = ARG_LINES_ALL;
48382487
JJ
422 optind++;
423 } else if (safe_atoi(argv[optind], &n) >= 0 && n >= 0) {
424 arg_lines = n;
425 optind++;
426 }
427 }
96088db0 428 }
1705594f 429
2100675e
LP
430 break;
431
e91af489
LP
432 case ARG_NO_TAIL:
433 arg_no_tail = true;
434 break;
435
39f7f5c1 436 case ARG_NEW_ID128:
7560fffc 437 arg_action = ACTION_NEW_ID128;
55ee336c
LP
438 break;
439
43673799
LP
440 case 'q':
441 arg_quiet = true;
490e567d 442 break;
43673799 443
9e8a535f
LP
444 case 'm':
445 arg_merge = true;
2bd3c38a
LP
446 break;
447
59cea26a 448 case 'b':
d121b396 449 arg_boot = true;
6cebe83c 450
442e2def
LP
451 if (optarg) {
452 r = parse_boot_descriptor(optarg, &arg_boot_id, &arg_boot_offset);
453 if (r < 0) {
454 log_error("Failed to parse boot descriptor '%s'", optarg);
455 return -EINVAL;
456 }
457 } else {
6cebe83c 458
442e2def
LP
459 /* Hmm, no argument? Maybe the next
460 * word on the command line is
461 * supposed to be the argument? Let's
462 * see if there is one and is parsable
463 * as a boot descriptor... */
464
465 if (optind < argc &&
466 parse_boot_descriptor(argv[optind], &arg_boot_id, &arg_boot_offset) >= 0)
6cebe83c 467 optind++;
6cebe83c 468 }
d121b396 469
59cea26a
LP
470 break;
471
f1188074
ZJS
472 case ARG_LIST_BOOTS:
473 arg_action = ACTION_LIST_BOOTS;
474 break;
475
99271804 476 case 'k':
d121b396 477 arg_boot = arg_dmesg = true;
99271804
ZJS
478 break;
479
3f3a438f
ZJS
480 case ARG_SYSTEM:
481 arg_journal_type |= SD_JOURNAL_SYSTEM;
482 break;
483
484 case ARG_USER:
485 arg_journal_type |= SD_JOURNAL_CURRENT_USER;
486 break;
487
b6741478
LP
488 case 'M':
489 arg_machine = optarg;
490 break;
491
a963990f
LP
492 case 'D':
493 arg_directory = optarg;
494 break;
495
8d98da3f
ZJS
496 case ARG_FILE:
497 r = glob_extend(&arg_file, optarg);
23bbb0de
MS
498 if (r < 0)
499 return log_error_errno(r, "Failed to add paths: %m");
8d98da3f
ZJS
500 break;
501
13cbf3a5
ZJS
502 case ARG_ROOT:
503 arg_root = optarg;
504 break;
505
8f14c832
LP
506 case 'c':
507 arg_cursor = optarg;
508 break;
509
248fc619
ZJS
510 case ARG_AFTER_CURSOR:
511 arg_after_cursor = optarg;
512 break;
513
514 case ARG_SHOW_CURSOR:
515 arg_show_cursor = true;
516 break;
517
dca6219e 518 case ARG_HEADER:
7560fffc
LP
519 arg_action = ACTION_PRINT_HEADER;
520 break;
521
feb12d3e
LP
522 case ARG_VERIFY:
523 arg_action = ACTION_VERIFY;
524 break;
525
a1a03e30
LP
526 case ARG_DISK_USAGE:
527 arg_action = ACTION_DISK_USAGE;
528 break;
529
dbd2a83f
LP
530 case ARG_VACUUM_SIZE:
531 r = parse_size(optarg, 1024, &arg_vacuum_size);
532 if (r < 0) {
533 log_error("Failed to parse vacuum size: %s", optarg);
534 return r;
535 }
536
537 arg_action = ACTION_VACUUM;
538 break;
539
540 case ARG_VACUUM_TIME:
541 r = parse_sec(optarg, &arg_vacuum_time);
542 if (r < 0) {
543 log_error("Failed to parse vacuum time: %s", optarg);
544 return r;
545 }
546
547 arg_action = ACTION_VACUUM;
548 break;
549
feb12d3e 550#ifdef HAVE_GCRYPT
b8547c10
SL
551 case ARG_FORCE:
552 arg_force = true;
553 break;
554
7560fffc
LP
555 case ARG_SETUP_KEYS:
556 arg_action = ACTION_SETUP_KEYS;
dca6219e
LP
557 break;
558
beec0085 559
baed47c3 560 case ARG_VERIFY_KEY:
4da416aa 561 arg_action = ACTION_VERIFY;
baed47c3 562 arg_verify_key = optarg;
9e8a535f 563 arg_merge = false;
4da416aa
LP
564 break;
565
baed47c3 566 case ARG_INTERVAL:
7f602784 567 r = parse_sec(optarg, &arg_interval);
baed47c3
LP
568 if (r < 0 || arg_interval <= 0) {
569 log_error("Failed to parse sealing key change interval: %s", optarg);
14d10188
LP
570 return -EINVAL;
571 }
572 break;
feb12d3e
LP
573#else
574 case ARG_SETUP_KEYS:
575 case ARG_VERIFY_KEY:
576 case ARG_INTERVAL:
b8547c10 577 case ARG_FORCE:
feb12d3e
LP
578 log_error("Forward-secure sealing not available.");
579 return -ENOTSUP;
580#endif
14d10188 581
941e990d
LP
582 case 'p': {
583 const char *dots;
584
585 dots = strstr(optarg, "..");
586 if (dots) {
587 char *a;
588 int from, to, i;
589
590 /* a range */
591 a = strndup(optarg, dots - optarg);
592 if (!a)
593 return log_oom();
594
595 from = log_level_from_string(a);
596 to = log_level_from_string(dots + 2);
597 free(a);
598
599 if (from < 0 || to < 0) {
600 log_error("Failed to parse log level range %s", optarg);
601 return -EINVAL;
602 }
603
604 arg_priorities = 0;
605
606 if (from < to) {
607 for (i = from; i <= to; i++)
608 arg_priorities |= 1 << i;
609 } else {
610 for (i = to; i <= from; i++)
611 arg_priorities |= 1 << i;
612 }
613
614 } else {
615 int p, i;
616
617 p = log_level_from_string(optarg);
618 if (p < 0) {
619 log_error("Unknown log level %s", optarg);
620 return -EINVAL;
621 }
622
623 arg_priorities = 0;
624
625 for (i = 0; i <= p; i++)
626 arg_priorities |= 1 << i;
627 }
628
629 break;
630 }
631
cfbc22ab
LP
632 case ARG_SINCE:
633 r = parse_timestamp(optarg, &arg_since);
634 if (r < 0) {
635 log_error("Failed to parse timestamp: %s", optarg);
636 return -EINVAL;
637 }
638 arg_since_set = true;
639 break;
640
641 case ARG_UNTIL:
642 r = parse_timestamp(optarg, &arg_until);
643 if (r < 0) {
644 log_error("Failed to parse timestamp: %s", optarg);
645 return -EINVAL;
646 }
647 arg_until_set = true;
648 break;
649
73083640
HH
650 case 't':
651 r = strv_extend(&arg_syslog_identifier, optarg);
652 if (r < 0)
653 return log_oom();
654 break;
655
7199aa96 656 case 'u':
b9e40524
HH
657 r = strv_extend(&arg_system_units, optarg);
658 if (r < 0)
659 return log_oom();
ffa7cd15
DW
660 break;
661
7199aa96 662 case ARG_USER_UNIT:
b9e40524
HH
663 r = strv_extend(&arg_user_units, optarg);
664 if (r < 0)
665 return log_oom();
c3f60ec5
LP
666 break;
667
15119c16
LP
668 case 'F':
669 arg_field = optarg;
670 break;
671
d4205751
LP
672 case 'x':
673 arg_catalog = true;
674 break;
675
676 case ARG_LIST_CATALOG:
677 arg_action = ACTION_LIST_CATALOG;
678 break;
679
54b7254c
ZJS
680 case ARG_DUMP_CATALOG:
681 arg_action = ACTION_DUMP_CATALOG;
682 break;
683
d4205751
LP
684 case ARG_UPDATE_CATALOG:
685 arg_action = ACTION_UPDATE_CATALOG;
686 break;
687
d89d6c86
LN
688 case 'r':
689 arg_reverse = true;
690 break;
691
9fd29044
JS
692 case ARG_UTC:
693 arg_utc = true;
694 break;
695
74055aa7
LP
696 case ARG_FLUSH:
697 arg_action = ACTION_FLUSH;
698 break;
699
eb9da376 700 case '?':
0d43c694 701 return -EINVAL;
eb9da376
LP
702
703 default:
704 assert_not_reached("Unhandled option");
0d43c694 705 }
0d43c694 706
70af7b8a 707 if (arg_follow && !arg_no_tail && !arg_since && arg_lines == ARG_LINES_DEFAULT)
e91af489
LP
708 arg_lines = 10;
709
b6741478
LP
710 if (!!arg_directory + !!arg_file + !!arg_machine > 1) {
711 log_error("Please specify either -D/--directory= or --file= or -M/--machine=, not more than one.");
8d98da3f
ZJS
712 return -EINVAL;
713 }
714
3ba09ee8 715 if (arg_since_set && arg_until_set && arg_since > arg_until) {
cfbc22ab
LP
716 log_error("--since= must be before --until=.");
717 return -EINVAL;
718 }
719
248fc619
ZJS
720 if (!!arg_cursor + !!arg_after_cursor + !!arg_since_set > 1) {
721 log_error("Please specify only one of --since=, --cursor=, and --after-cursor.");
cfbc22ab
LP
722 return -EINVAL;
723 }
724
d89d6c86
LN
725 if (arg_follow && arg_reverse) {
726 log_error("Please specify either --reverse= or --follow=, not both.");
727 return -EINVAL;
728 }
729
0b6b7c20
ZJS
730 if (arg_action != ACTION_SHOW && optind < argc) {
731 log_error("Extraneous arguments starting with '%s'", argv[optind]);
732 return -EINVAL;
733 }
734
0d43c694
LP
735 return 1;
736}
737
39f7f5c1 738static int generate_new_id128(void) {
55ee336c
LP
739 sd_id128_t id;
740 int r;
741 unsigned i;
742
743 r = sd_id128_randomize(&id);
23bbb0de
MS
744 if (r < 0)
745 return log_error_errno(r, "Failed to generate ID: %m");
55ee336c
LP
746
747 printf("As string:\n"
748 SD_ID128_FORMAT_STR "\n\n"
749 "As UUID:\n"
750 "%02x%02x%02x%02x-%02x%02x-%02x%02x-%02x%02x-%02x%02x%02x%02x%02x%02x\n\n"
751 "As macro:\n"
d489071f 752 "#define MESSAGE_XYZ SD_ID128_MAKE(",
55ee336c
LP
753 SD_ID128_FORMAT_VAL(id),
754 SD_ID128_FORMAT_VAL(id));
55ee336c
LP
755 for (i = 0; i < 16; i++)
756 printf("%02x%s", id.bytes[i], i != 15 ? "," : "");
d489071f 757 fputs(")\n\n", stdout);
55ee336c 758
d489071f
ZJS
759 printf("As Python constant:\n"
760 ">>> import uuid\n"
761 ">>> MESSAGE_XYZ = uuid.UUID('" SD_ID128_FORMAT_STR "')\n",
762 SD_ID128_FORMAT_VAL(id));
55ee336c
LP
763
764 return 0;
765}
766
a963990f
LP
767static int add_matches(sd_journal *j, char **args) {
768 char **i;
4e602943 769 bool have_term = false;
59cea26a 770
a963990f 771 assert(j);
59cea26a 772
a963990f 773 STRV_FOREACH(i, args) {
52aeb63c 774 int r;
59cea26a 775
4e602943
ZJS
776 if (streq(*i, "+")) {
777 if (!have_term)
778 break;
cbdca852 779 r = sd_journal_add_disjunction(j);
4e602943
ZJS
780 have_term = false;
781
782 } else if (path_is_absolute(*i)) {
68fee104 783 _cleanup_free_ char *p, *t = NULL, *t2 = NULL;
e5124088 784 const char *path;
68fee104 785 _cleanup_free_ char *interpreter = NULL;
a963990f 786 struct stat st;
e5124088 787
a963990f
LP
788 p = canonicalize_file_name(*i);
789 path = p ? p : *i;
e5124088 790
4a62c710
MS
791 if (stat(path, &st) < 0)
792 return log_error_errno(errno, "Couldn't stat file: %m");
e5124088 793
68fee104
ZJS
794 if (S_ISREG(st.st_mode) && (0111 & st.st_mode)) {
795 if (executable_is_script(path, &interpreter) > 0) {
796 _cleanup_free_ char *comm;
797
2b6bf07d 798 comm = strndup(basename(path), 15);
68fee104
ZJS
799 if (!comm)
800 return log_oom();
801
802 t = strappend("_COMM=", comm);
803
804 /* Append _EXE only if the interpreter is not a link.
73e231ab 805 Otherwise, it might be outdated often. */
68fee104
ZJS
806 if (lstat(interpreter, &st) == 0 &&
807 !S_ISLNK(st.st_mode)) {
808 t2 = strappend("_EXE=", interpreter);
809 if (!t2)
810 return log_oom();
811 }
812 } else
813 t = strappend("_EXE=", path);
7de80bfe
KZ
814 } else if (S_ISCHR(st.st_mode)) {
815 if (asprintf(&t, "_KERNEL_DEVICE=c%u:%u",
816 major(st.st_rdev),
817 minor(st.st_rdev)) < 0)
818 return -ENOMEM;
819 } else if (S_ISBLK(st.st_mode)) {
820 if (asprintf(&t, "_KERNEL_DEVICE=b%u:%u",
821 major(st.st_rdev),
822 minor(st.st_rdev)) < 0)
823 return -ENOMEM;
824 } else {
fb93cf73 825 log_error("File is neither a device node, nor regular file, nor executable: %s", *i);
a963990f 826 return -EINVAL;
50940700 827 }
e5124088 828
b6a34514
LP
829 if (!t)
830 return log_oom();
831
832 r = sd_journal_add_match(j, t, 0);
68fee104
ZJS
833 if (t2)
834 r = sd_journal_add_match(j, t2, 0);
4e602943
ZJS
835 have_term = true;
836
837 } else {
cbdca852 838 r = sd_journal_add_match(j, *i, 0);
4e602943
ZJS
839 have_term = true;
840 }
e5124088 841
23bbb0de
MS
842 if (r < 0)
843 return log_error_errno(r, "Failed to add match '%s': %m", *i);
de7b95cd
LP
844 }
845
4e602943
ZJS
846 if (!strv_isempty(args) && !have_term) {
847 log_error("\"+\" can only be used between terms");
848 return -EINVAL;
849 }
850
a963990f
LP
851 return 0;
852}
853
a331b5e6
JJ
854static int boot_id_cmp(const void *a, const void *b) {
855 uint64_t _a, _b;
856
f1188074
ZJS
857 _a = ((const boot_id_t *)a)->first;
858 _b = ((const boot_id_t *)b)->first;
a331b5e6
JJ
859
860 return _a < _b ? -1 : (_a > _b ? 1 : 0);
861}
862
ea7061e4
JJ
863static int get_boots(sd_journal *j,
864 boot_id_t **boots,
865 unsigned int *count,
866 boot_id_t *query_ref_boot) {
f1188074
ZJS
867 int r;
868 const void *data;
f1188074 869 size_t length, allocated = 0;
ea7061e4
JJ
870
871 assert(j);
872 assert(boots);
873 assert(count);
f1188074
ZJS
874
875 r = sd_journal_query_unique(j, "_BOOT_ID");
876 if (r < 0)
877 return r;
878
ea7061e4 879 *count = 0;
f1188074 880 SD_JOURNAL_FOREACH_UNIQUE(j, data, length) {
ea7061e4
JJ
881 boot_id_t *id;
882
853bd5cc 883 assert(startswith(data, "_BOOT_ID="));
f1188074 884
ea7061e4 885 if (!GREEDY_REALLOC(*boots, allocated, *count + 1))
f1188074
ZJS
886 return log_oom();
887
ea7061e4 888 id = *boots + *count;
f1188074
ZJS
889
890 r = sd_id128_from_string(((const char *)data) + strlen("_BOOT_ID="), &id->id);
891 if (r < 0)
892 continue;
893
894 r = sd_journal_add_match(j, data, length);
895 if (r < 0)
896 return r;
897
898 r = sd_journal_seek_head(j);
899 if (r < 0)
900 return r;
901
902 r = sd_journal_next(j);
903 if (r < 0)
904 return r;
905 else if (r == 0)
906 goto flush;
907
908 r = sd_journal_get_realtime_usec(j, &id->first);
909 if (r < 0)
910 return r;
911
ea7061e4
JJ
912 if (query_ref_boot) {
913 id->last = 0;
914 if (sd_id128_equal(id->id, query_ref_boot->id))
915 *query_ref_boot = *id;
916 } else {
917 r = sd_journal_seek_tail(j);
918 if (r < 0)
919 return r;
f1188074 920
ea7061e4
JJ
921 r = sd_journal_previous(j);
922 if (r < 0)
923 return r;
924 else if (r == 0)
925 goto flush;
f1188074 926
ea7061e4
JJ
927 r = sd_journal_get_realtime_usec(j, &id->last);
928 if (r < 0)
929 return r;
930 }
f1188074 931
ea7061e4 932 (*count)++;
f1188074
ZJS
933 flush:
934 sd_journal_flush_matches(j);
935 }
936
ea7061e4
JJ
937 qsort_safe(*boots, *count, sizeof(boot_id_t), boot_id_cmp);
938 return 0;
939}
940
941static int list_boots(sd_journal *j) {
942 int r, w, i;
943 unsigned int count;
944 boot_id_t *id;
945 _cleanup_free_ boot_id_t *all_ids = NULL;
946
947 assert(j);
948
949 r = get_boots(j, &all_ids, &count, NULL);
950 if (r < 0)
951 return r;
952
953 pager_open_if_enabled();
f1188074
ZJS
954
955 /* numbers are one less, but we need an extra char for the sign */
956 w = DECIMAL_STR_WIDTH(count - 1) + 1;
957
958 for (id = all_ids, i = 0; id < all_ids + count; id++, i++) {
959 char a[FORMAT_TIMESTAMP_MAX], b[FORMAT_TIMESTAMP_MAX];
960
961 printf("% *i " SD_ID128_FORMAT_STR " %s—%s\n",
962 w, i - count + 1,
963 SD_ID128_FORMAT_VAL(id->id),
5ab99e07
LP
964 format_timestamp_maybe_utc(a, sizeof(a), id->first),
965 format_timestamp_maybe_utc(b, sizeof(b), id->last));
f1188074
ZJS
966 }
967
968 return 0;
969}
970
ea7061e4 971static int get_boot_id_by_offset(sd_journal *j, sd_id128_t *boot_id, int offset) {
a331b5e6 972 int r;
ea7061e4
JJ
973 unsigned int count;
974 boot_id_t ref_boot_id = {}, *id;
a331b5e6 975 _cleanup_free_ boot_id_t *all_ids = NULL;
a331b5e6
JJ
976
977 assert(j);
978 assert(boot_id);
979
ea7061e4
JJ
980 ref_boot_id.id = *boot_id;
981 r = get_boots(j, &all_ids, &count, &ref_boot_id);
a331b5e6
JJ
982 if (r < 0)
983 return r;
984
d121b396 985 if (sd_id128_equal(*boot_id, SD_ID128_NULL)) {
ea7061e4 986 if (offset > (int) count || offset <= -(int)count)
d121b396 987 return -EADDRNOTAVAIL;
a331b5e6 988
ea7061e4 989 *boot_id = all_ids[(offset <= 0)*count + offset - 1].id;
d121b396
ZJS
990 } else {
991 id = bsearch(&ref_boot_id, all_ids, count, sizeof(boot_id_t), boot_id_cmp);
a331b5e6 992
d121b396 993 if (!id ||
ea7061e4
JJ
994 offset <= 0 ? (id - all_ids) + offset < 0 :
995 (id - all_ids) + offset >= (int) count)
d121b396
ZJS
996 return -EADDRNOTAVAIL;
997
ea7061e4 998 *boot_id = (id + offset)->id;
d121b396 999 }
a963990f 1000
a331b5e6
JJ
1001 return 0;
1002}
1003
1004static int add_boot(sd_journal *j) {
1005 char match[9+32+1] = "_BOOT_ID=";
442e2def 1006 int r;
a331b5e6
JJ
1007
1008 assert(j);
1009
d121b396 1010 if (!arg_boot)
a331b5e6
JJ
1011 return 0;
1012
442e2def 1013 if (arg_boot_offset == 0 && sd_id128_equal(arg_boot_id, SD_ID128_NULL))
b6741478 1014 return add_match_this_boot(j, arg_machine);
a331b5e6 1015
ea7061e4 1016 r = get_boot_id_by_offset(j, &arg_boot_id, arg_boot_offset);
a331b5e6 1017 if (r < 0) {
442e2def 1018 if (sd_id128_equal(arg_boot_id, SD_ID128_NULL))
da927ba9 1019 log_error_errno(r, "Failed to look up boot %+i: %m", arg_boot_offset);
d121b396 1020 else
442e2def
LP
1021 log_error("Failed to look up boot ID "SD_ID128_FORMAT_STR"%+i: %s",
1022 SD_ID128_FORMAT_VAL(arg_boot_id), arg_boot_offset, strerror(-r));
a331b5e6 1023 return r;
a331b5e6
JJ
1024 }
1025
442e2def 1026 sd_id128_to_string(arg_boot_id, match + 9);
d121b396
ZJS
1027
1028 r = sd_journal_add_match(j, match, sizeof(match) - 1);
23bbb0de
MS
1029 if (r < 0)
1030 return log_error_errno(r, "Failed to add match: %m");
a331b5e6
JJ
1031
1032 r = sd_journal_add_conjunction(j);
1033 if (r < 0)
1034 return r;
1035
1036 return 0;
a963990f
LP
1037}
1038
99271804
ZJS
1039static int add_dmesg(sd_journal *j) {
1040 int r;
1041 assert(j);
1042
1043 if (!arg_dmesg)
1044 return 0;
1045
1046 r = sd_journal_add_match(j, "_TRANSPORT=kernel", strlen("_TRANSPORT=kernel"));
23bbb0de
MS
1047 if (r < 0)
1048 return log_error_errno(r, "Failed to add match: %m");
99271804
ZJS
1049
1050 r = sd_journal_add_conjunction(j);
1051 if (r < 0)
1052 return r;
1053
1054 return 0;
1055}
1056
ea18a4b5
ZJS
1057static int get_possible_units(sd_journal *j,
1058 const char *fields,
1059 char **patterns,
1060 Set **units) {
1061 _cleanup_set_free_free_ Set *found;
1062 const char *field;
c3f60ec5 1063 int r;
ea18a4b5 1064
d5099efc 1065 found = set_new(&string_hash_ops);
ea18a4b5
ZJS
1066 if (!found)
1067 return log_oom();
1068
1069 NULSTR_FOREACH(field, fields) {
1070 const void *data;
1071 size_t size;
1072
1073 r = sd_journal_query_unique(j, field);
1074 if (r < 0)
1075 return r;
1076
1077 SD_JOURNAL_FOREACH_UNIQUE(j, data, size) {
1078 char **pattern, *eq;
1079 size_t prefix;
1080 _cleanup_free_ char *u = NULL;
1081
1082 eq = memchr(data, '=', size);
1083 if (eq)
1084 prefix = eq - (char*) data + 1;
1085 else
1086 prefix = 0;
1087
1088 u = strndup((char*) data + prefix, size - prefix);
1089 if (!u)
1090 return log_oom();
1091
1092 STRV_FOREACH(pattern, patterns)
1093 if (fnmatch(*pattern, u, FNM_NOESCAPE) == 0) {
1094 log_debug("Matched %s with pattern %s=%s", u, field, *pattern);
1095
1096 r = set_consume(found, u);
1097 u = NULL;
1098 if (r < 0 && r != -EEXIST)
1099 return r;
1100
1101 break;
1102 }
1103 }
1104 }
1105
1106 *units = found;
1107 found = NULL;
1108 return 0;
1109}
1110
1111/* This list is supposed to return the superset of unit names
1112 * possibly matched by rules added with add_matches_for_unit... */
1113#define SYSTEM_UNITS \
1114 "_SYSTEMD_UNIT\0" \
1115 "COREDUMP_UNIT\0" \
1116 "UNIT\0" \
1117 "OBJECT_SYSTEMD_UNIT\0" \
1118 "_SYSTEMD_SLICE\0"
1119
1120/* ... and add_matches_for_user_unit */
1121#define USER_UNITS \
1122 "_SYSTEMD_USER_UNIT\0" \
1123 "USER_UNIT\0" \
1124 "COREDUMP_USER_UNIT\0" \
1125 "OBJECT_SYSTEMD_USER_UNIT\0"
1126
1127static int add_units(sd_journal *j) {
1128 _cleanup_strv_free_ char **patterns = NULL;
1129 int r, count = 0;
b9e40524 1130 char **i;
c3f60ec5
LP
1131
1132 assert(j);
1133
b9e40524 1134 STRV_FOREACH(i, arg_system_units) {
ea18a4b5
ZJS
1135 _cleanup_free_ char *u = NULL;
1136
1137 u = unit_name_mangle(*i, MANGLE_GLOB);
b9e40524
HH
1138 if (!u)
1139 return log_oom();
ea18a4b5
ZJS
1140
1141 if (string_is_glob(u)) {
1142 r = strv_push(&patterns, u);
1143 if (r < 0)
1144 return r;
1145 u = NULL;
1146 } else {
1147 r = add_matches_for_unit(j, u);
1148 if (r < 0)
1149 return r;
1150 r = sd_journal_add_disjunction(j);
1151 if (r < 0)
1152 return r;
1153 count ++;
1154 }
1155 }
1156
1157 if (!strv_isempty(patterns)) {
1158 _cleanup_set_free_free_ Set *units = NULL;
1159 Iterator it;
1160 char *u;
1161
1162 r = get_possible_units(j, SYSTEM_UNITS, patterns, &units);
b9e40524
HH
1163 if (r < 0)
1164 return r;
ea18a4b5
ZJS
1165
1166 SET_FOREACH(u, units, it) {
1167 r = add_matches_for_unit(j, u);
1168 if (r < 0)
1169 return r;
1170 r = sd_journal_add_disjunction(j);
1171 if (r < 0)
1172 return r;
1173 count ++;
1174 }
b9e40524 1175 }
c3f60ec5 1176
ea18a4b5
ZJS
1177 strv_free(patterns);
1178 patterns = NULL;
1179
b9e40524 1180 STRV_FOREACH(i, arg_user_units) {
ea18a4b5
ZJS
1181 _cleanup_free_ char *u = NULL;
1182
1183 u = unit_name_mangle(*i, MANGLE_GLOB);
b9e40524
HH
1184 if (!u)
1185 return log_oom();
c3f60ec5 1186
ea18a4b5
ZJS
1187 if (string_is_glob(u)) {
1188 r = strv_push(&patterns, u);
1189 if (r < 0)
1190 return r;
1191 u = NULL;
1192 } else {
1193 r = add_matches_for_user_unit(j, u, getuid());
1194 if (r < 0)
1195 return r;
1196 r = sd_journal_add_disjunction(j);
1197 if (r < 0)
1198 return r;
1199 count ++;
1200 }
1201 }
1202
1203 if (!strv_isempty(patterns)) {
1204 _cleanup_set_free_free_ Set *units = NULL;
1205 Iterator it;
1206 char *u;
b9e40524 1207
ea18a4b5 1208 r = get_possible_units(j, USER_UNITS, patterns, &units);
b9e40524
HH
1209 if (r < 0)
1210 return r;
1211
ea18a4b5
ZJS
1212 SET_FOREACH(u, units, it) {
1213 r = add_matches_for_user_unit(j, u, getuid());
1214 if (r < 0)
1215 return r;
1216 r = sd_journal_add_disjunction(j);
1217 if (r < 0)
1218 return r;
1219 count ++;
1220 }
b9e40524 1221 }
c3f60ec5 1222
ea18a4b5
ZJS
1223 /* Complain if the user request matches but nothing whatsoever was
1224 * found, since otherwise everything would be matched. */
1225 if (!(strv_isempty(arg_system_units) && strv_isempty(arg_user_units)) && count == 0)
1226 return -ENODATA;
1227
cd34b3c6
HH
1228 r = sd_journal_add_conjunction(j);
1229 if (r < 0)
1230 return r;
1231
c3f60ec5
LP
1232 return 0;
1233}
1234
941e990d
LP
1235static int add_priorities(sd_journal *j) {
1236 char match[] = "PRIORITY=0";
1237 int i, r;
941e990d
LP
1238 assert(j);
1239
1240 if (arg_priorities == 0xFF)
1241 return 0;
1242
1243 for (i = LOG_EMERG; i <= LOG_DEBUG; i++)
1244 if (arg_priorities & (1 << i)) {
1245 match[sizeof(match)-2] = '0' + i;
1246
941e990d 1247 r = sd_journal_add_match(j, match, strlen(match));
23bbb0de
MS
1248 if (r < 0)
1249 return log_error_errno(r, "Failed to add match: %m");
941e990d
LP
1250 }
1251
cd34b3c6
HH
1252 r = sd_journal_add_conjunction(j);
1253 if (r < 0)
1254 return r;
1255
941e990d
LP
1256 return 0;
1257}
1258
73083640
HH
1259
1260static int add_syslog_identifier(sd_journal *j) {
1261 int r;
1262 char **i;
1263
1264 assert(j);
1265
1266 STRV_FOREACH(i, arg_syslog_identifier) {
1267 char *u;
1268
63c372cb 1269 u = strjoina("SYSLOG_IDENTIFIER=", *i);
73083640
HH
1270 r = sd_journal_add_match(j, u, 0);
1271 if (r < 0)
1272 return r;
1273 r = sd_journal_add_disjunction(j);
1274 if (r < 0)
1275 return r;
1276 }
1277
1278 r = sd_journal_add_conjunction(j);
1279 if (r < 0)
1280 return r;
1281
1282 return 0;
1283}
1284
7560fffc
LP
1285static int setup_keys(void) {
1286#ifdef HAVE_GCRYPT
1287 size_t mpk_size, seed_size, state_size, i;
1288 uint8_t *mpk, *seed, *state;
1289 ssize_t l;
11689d2a 1290 int fd = -1, r;
7560fffc
LP
1291 sd_id128_t machine, boot;
1292 char *p = NULL, *k = NULL;
baed47c3 1293 struct FSSHeader h;
14d10188 1294 uint64_t n;
b98e3866
SL
1295 struct stat st;
1296
1297 r = stat("/var/log/journal", &st);
4a62c710
MS
1298 if (r < 0 && errno != ENOENT && errno != ENOTDIR)
1299 return log_error_errno(errno, "stat(\"%s\") failed: %m", "/var/log/journal");
b98e3866
SL
1300
1301 if (r < 0 || !S_ISDIR(st.st_mode)) {
1302 log_error("%s is not a directory, must be using persistent logging for FSS.",
1303 "/var/log/journal");
1304 return r < 0 ? -errno : -ENOTDIR;
1305 }
7560fffc
LP
1306
1307 r = sd_id128_get_machine(&machine);
23bbb0de
MS
1308 if (r < 0)
1309 return log_error_errno(r, "Failed to get machine ID: %m");
7560fffc
LP
1310
1311 r = sd_id128_get_boot(&boot);
23bbb0de
MS
1312 if (r < 0)
1313 return log_error_errno(r, "Failed to get boot ID: %m");
7560fffc 1314
baed47c3 1315 if (asprintf(&p, "/var/log/journal/" SD_ID128_FORMAT_STR "/fss",
7560fffc
LP
1316 SD_ID128_FORMAT_VAL(machine)) < 0)
1317 return log_oom();
1318
faf9da01
ZJS
1319 if (arg_force) {
1320 r = unlink(p);
1321 if (r < 0 && errno != ENOENT) {
1322 r = log_error_errno(errno, "unlink(\"%s\") failed: %m", p);
b8547c10
SL
1323 goto finish;
1324 }
faf9da01
ZJS
1325 } else if (access(p, F_OK) >= 0) {
1326 log_error("Sealing key file %s exists already. Use --force to recreate.", p);
1327 r = -EEXIST;
1328 goto finish;
7560fffc
LP
1329 }
1330
baed47c3 1331 if (asprintf(&k, "/var/log/journal/" SD_ID128_FORMAT_STR "/fss.tmp.XXXXXX",
7560fffc
LP
1332 SD_ID128_FORMAT_VAL(machine)) < 0) {
1333 r = log_oom();
1334 goto finish;
1335 }
1336
1337 mpk_size = FSPRG_mskinbytes(FSPRG_RECOMMENDED_SECPAR);
1338 mpk = alloca(mpk_size);
1339
1340 seed_size = FSPRG_RECOMMENDED_SEEDLEN;
1341 seed = alloca(seed_size);
1342
1343 state_size = FSPRG_stateinbytes(FSPRG_RECOMMENDED_SECPAR);
1344 state = alloca(state_size);
1345
1346 fd = open("/dev/random", O_RDONLY|O_CLOEXEC|O_NOCTTY);
1347 if (fd < 0) {
56f64d95 1348 log_error_errno(errno, "Failed to open /dev/random: %m");
7560fffc
LP
1349 r = -errno;
1350 goto finish;
1351 }
1352
1353 log_info("Generating seed...");
1354 l = loop_read(fd, seed, seed_size, true);
1355 if (l < 0 || (size_t) l != seed_size) {
279d3c9c 1356 log_error_errno(EIO, "Failed to read random seed: %m");
7560fffc
LP
1357 r = -EIO;
1358 goto finish;
1359 }
1360
1361 log_info("Generating key pair...");
1362 FSPRG_GenMK(NULL, mpk, seed, seed_size, FSPRG_RECOMMENDED_SECPAR);
1363
baed47c3 1364 log_info("Generating sealing key...");
7560fffc
LP
1365 FSPRG_GenState0(state, mpk, seed, seed_size);
1366
baed47c3
LP
1367 assert(arg_interval > 0);
1368
7560fffc 1369 n = now(CLOCK_REALTIME);
baed47c3 1370 n /= arg_interval;
7560fffc 1371
03e334a1 1372 safe_close(fd);
2d5bdf5b 1373 fd = mkostemp_safe(k, O_WRONLY|O_CLOEXEC);
7560fffc 1374 if (fd < 0) {
56f64d95 1375 log_error_errno(errno, "Failed to open %s: %m", k);
7560fffc
LP
1376 r = -errno;
1377 goto finish;
1378 }
1379
f982e6f7
LP
1380 /* Enable secure remove, exclusion from dump, synchronous
1381 * writing and in-place updating */
11689d2a
LP
1382 r = chattr_fd(fd, true, FS_SECRM_FL|FS_NODUMP_FL|FS_SYNC_FL|FS_NOCOW_FL);
1383 if (r < 0)
1384 log_warning_errno(errno, "Failed to set file attributes: %m");
f982e6f7 1385
7560fffc
LP
1386 zero(h);
1387 memcpy(h.signature, "KSHHRHLP", 8);
1388 h.machine_id = machine;
1389 h.boot_id = boot;
1390 h.header_size = htole64(sizeof(h));
baed47c3
LP
1391 h.start_usec = htole64(n * arg_interval);
1392 h.interval_usec = htole64(arg_interval);
1393 h.fsprg_secpar = htole16(FSPRG_RECOMMENDED_SECPAR);
1394 h.fsprg_state_size = htole64(state_size);
7560fffc 1395
553acb7b
ZJS
1396 r = loop_write(fd, &h, sizeof(h), false);
1397 if (r < 0) {
1398 log_error_errno(r, "Failed to write header: %m");
7560fffc
LP
1399 goto finish;
1400 }
1401
553acb7b
ZJS
1402 r = loop_write(fd, state, state_size, false);
1403 if (r < 0) {
1404 log_error_errno(r, "Failed to write state: %m");
7560fffc
LP
1405 goto finish;
1406 }
1407
1408 if (link(k, p) < 0) {
56f64d95 1409 log_error_errno(errno, "Failed to link file: %m");
7560fffc
LP
1410 r = -errno;
1411 goto finish;
1412 }
1413
8481248b 1414 if (on_tty()) {
7560fffc
LP
1415 fprintf(stderr,
1416 "\n"
baed47c3 1417 "The new key pair has been generated. The " ANSI_HIGHLIGHT_ON "secret sealing key" ANSI_HIGHLIGHT_OFF " has been written to\n"
c05276f2
LP
1418 "the following local file. This key file is automatically updated when the\n"
1419 "sealing key is advanced. It should not be used on multiple hosts.\n"
7560fffc
LP
1420 "\n"
1421 "\t%s\n"
1422 "\n"
baed47c3
LP
1423 "Please write down the following " ANSI_HIGHLIGHT_ON "secret verification key" ANSI_HIGHLIGHT_OFF ". It should be stored\n"
1424 "at a safe location and should not be saved locally on disk.\n"
7560fffc
LP
1425 "\n\t" ANSI_HIGHLIGHT_RED_ON, p);
1426 fflush(stderr);
1427 }
1428 for (i = 0; i < seed_size; i++) {
1429 if (i > 0 && i % 3 == 0)
1430 putchar('-');
1431 printf("%02x", ((uint8_t*) seed)[i]);
1432 }
1433
baed47c3
LP
1434 printf("/%llx-%llx\n", (unsigned long long) n, (unsigned long long) arg_interval);
1435
8481248b 1436 if (on_tty()) {
f6a971bc 1437 char tsb[FORMAT_TIMESPAN_MAX], *hn;
7560fffc 1438
baed47c3
LP
1439 fprintf(stderr,
1440 ANSI_HIGHLIGHT_OFF "\n"
1441 "The sealing key is automatically changed every %s.\n",
2fa4092c 1442 format_timespan(tsb, sizeof(tsb), arg_interval, 0));
f6a971bc
LP
1443
1444 hn = gethostname_malloc();
1445
1446 if (hn) {
e724b063 1447 hostname_cleanup(hn, false);
adac1c93 1448 fprintf(stderr, "\nThe keys have been generated for host %s/" SD_ID128_FORMAT_STR ".\n", hn, SD_ID128_FORMAT_VAL(machine));
f6a971bc 1449 } else
adac1c93 1450 fprintf(stderr, "\nThe keys have been generated for host " SD_ID128_FORMAT_STR ".\n", SD_ID128_FORMAT_VAL(machine));
f6a971bc
LP
1451
1452#ifdef HAVE_QRENCODE
cf5a3432 1453 /* If this is not an UTF-8 system don't print any QR codes */
09017585 1454 if (is_locale_utf8()) {
cf5a3432
LP
1455 fputs("\nTo transfer the verification key to your phone please scan the QR code below:\n\n", stderr);
1456 print_qr_code(stderr, seed, seed_size, n, arg_interval, hn, machine);
1457 }
f6a971bc
LP
1458#endif
1459 free(hn);
baed47c3 1460 }
7560fffc
LP
1461
1462 r = 0;
1463
1464finish:
03e334a1 1465 safe_close(fd);
7560fffc
LP
1466
1467 if (k) {
1468 unlink(k);
1469 free(k);
1470 }
1471
1472 free(p);
1473
1474 return r;
1475#else
feb12d3e
LP
1476 log_error("Forward-secure sealing not available.");
1477 return -ENOTSUP;
7560fffc
LP
1478#endif
1479}
1480
beec0085
LP
1481static int verify(sd_journal *j) {
1482 int r = 0;
1483 Iterator i;
1484 JournalFile *f;
1485
1486 assert(j);
1487
cedb42bb
LP
1488 log_show_color(true);
1489
c1f906bd 1490 ORDERED_HASHMAP_FOREACH(f, j->files, i) {
beec0085 1491 int k;
2a7b539a 1492 usec_t first, validated, last;
beec0085 1493
56e81f7c 1494#ifdef HAVE_GCRYPT
feb12d3e 1495 if (!arg_verify_key && JOURNAL_HEADER_SEALED(f->header))
cedb42bb 1496 log_notice("Journal file %s has sealing enabled but verification key has not been passed using --verify-key=.", f->path);
56e81f7c 1497#endif
4da416aa 1498
2a7b539a 1499 k = journal_file_verify(f, arg_verify_key, &first, &validated, &last, true);
56e81f7c 1500 if (k == -EINVAL) {
baed47c3 1501 /* If the key was invalid give up right-away. */
56e81f7c
LP
1502 return k;
1503 } else if (k < 0) {
beec0085 1504 log_warning("FAIL: %s (%s)", f->path, strerror(-k));
56e81f7c 1505 r = k;
6c7be122
LP
1506 } else {
1507 char a[FORMAT_TIMESTAMP_MAX], b[FORMAT_TIMESTAMP_MAX], c[FORMAT_TIMESPAN_MAX];
beec0085 1508 log_info("PASS: %s", f->path);
6c7be122 1509
c0ca7aee 1510 if (arg_verify_key && JOURNAL_HEADER_SEALED(f->header)) {
2a7b539a 1511 if (validated > 0) {
c0ca7aee 1512 log_info("=> Validated from %s to %s, final %s entries not sealed.",
5ab99e07
LP
1513 format_timestamp_maybe_utc(a, sizeof(a), first),
1514 format_timestamp_maybe_utc(b, sizeof(b), validated),
2fa4092c 1515 format_timespan(c, sizeof(c), last > validated ? last - validated : 0, 0));
2a7b539a 1516 } else if (last > 0)
c0ca7aee 1517 log_info("=> No sealing yet, %s of entries not sealed.",
2fa4092c 1518 format_timespan(c, sizeof(c), last - first, 0));
c0ca7aee
LP
1519 else
1520 log_info("=> No sealing yet, no entries in file.");
1521 }
6c7be122 1522 }
beec0085
LP
1523 }
1524
1525 return r;
1526}
1527
15804ceb 1528#ifdef HAVE_ACL
6fe391c5
ZJS
1529static int access_check_var_log_journal(sd_journal *j) {
1530 _cleanup_strv_free_ char **g = NULL;
1531 bool have_access;
1532 int r;
1533
1534 assert(j);
1535
1536 have_access = in_group("systemd-journal") > 0;
1537
1538 if (!have_access) {
05c18530
ZJS
1539 const char* dir;
1540
1541 if (access("/run/log/journal", F_OK) >= 0)
1542 dir = "/run/log/journal";
1543 else
1544 dir = "/var/log/journal";
1545
6fe391c5
ZJS
1546 /* Let's enumerate all groups from the default ACL of
1547 * the directory, which generally should allow access
1548 * to most journal files too */
05c18530 1549 r = search_acl_groups(&g, dir, &have_access);
6fe391c5
ZJS
1550 if (r < 0)
1551 return r;
15804ceb
LP
1552 }
1553
6fe391c5 1554 if (!have_access) {
4468addc 1555
6fe391c5 1556 if (strv_isempty(g))
3ac251b8
LP
1557 log_notice("Hint: You are currently not seeing messages from other users and the system.\n"
1558 " Users in the 'systemd-journal' group can see all messages. Pass -q to\n"
1559 " turn off this notice.");
6fe391c5
ZJS
1560 else {
1561 _cleanup_free_ char *s = NULL;
4468addc 1562
6fe391c5 1563 r = strv_extend(&g, "systemd-journal");
478c8269 1564 if (r < 0)
6fe391c5
ZJS
1565 return log_oom();
1566
1567 strv_sort(g);
1568 strv_uniq(g);
1569
1570 s = strv_join(g, "', '");
1571 if (!s)
1572 return log_oom();
1573
1574 log_notice("Hint: You are currently not seeing messages from other users and the system.\n"
05c18530 1575 " Users in groups '%s' can see all messages.\n"
3ac251b8 1576 " Pass -q to turn off this notice.", s);
4468addc 1577 }
6fe391c5 1578 }
4468addc 1579
6fe391c5
ZJS
1580 return 0;
1581}
1582#endif
4468addc 1583
6fe391c5 1584static int access_check(sd_journal *j) {
6fe391c5 1585 Iterator it;
3ac251b8 1586 void *code;
6fe391c5 1587 int r = 0;
4468addc 1588
6fe391c5 1589 assert(j);
4468addc 1590
6fe391c5 1591 if (set_isempty(j->errors)) {
c1f906bd 1592 if (ordered_hashmap_isempty(j->files))
3ac251b8 1593 log_notice("No journal files were found.");
6fe391c5
ZJS
1594 return 0;
1595 }
4468addc 1596
3ac251b8 1597 if (set_contains(j->errors, INT_TO_PTR(-EACCES))) {
6fe391c5 1598#ifdef HAVE_ACL
05c18530
ZJS
1599 /* If /run/log/journal or /var/log/journal exist, try
1600 to pring a nice notice if the user lacks access to it. */
6fe391c5
ZJS
1601 if (!arg_quiet && geteuid() != 0) {
1602 r = access_check_var_log_journal(j);
1603 if (r < 0)
1604 return r;
4468addc 1605 }
15804ceb 1606#else
3ac251b8
LP
1607 if (geteuid() != 0 && in_group("systemd-journal") <= 0) {
1608 log_error("Unprivileged users cannot access messages. Users in the 'systemd-journal' group\n"
1609 "group may access messages.");
1610 return -EACCES;
1611 }
15804ceb 1612#endif
3ac251b8 1613
c1f906bd 1614 if (ordered_hashmap_isempty(j->files)) {
3ac251b8 1615 log_error("No journal files were opened due to insufficient permissions.");
6fe391c5
ZJS
1616 r = -EACCES;
1617 }
1618 }
15804ceb 1619
6fe391c5 1620 SET_FOREACH(code, j->errors, it) {
3ac251b8
LP
1621 int err;
1622
1623 err = -PTR_TO_INT(code);
6fe391c5 1624 assert(err > 0);
3ac251b8 1625
6fe391c5 1626 if (err != EACCES)
c33b3297 1627 log_warning_errno(err, "Error was encountered while opening journal files: %m");
6fe391c5
ZJS
1628 }
1629
6fe391c5 1630 return r;
15804ceb
LP
1631}
1632
74055aa7
LP
1633static int flush_to_var(void) {
1634 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
1635 _cleanup_bus_close_unref_ sd_bus *bus = NULL;
1636 _cleanup_close_ int watch_fd = -1;
1637 int r;
1638
1639 /* Quick exit */
1640 if (access("/run/systemd/journal/flushed", F_OK) >= 0)
1641 return 0;
1642
1643 /* OK, let's actually do the full logic, send SIGUSR1 to the
1644 * daemon and set up inotify to wait for the flushed file to appear */
1645 r = bus_open_system_systemd(&bus);
23bbb0de
MS
1646 if (r < 0)
1647 return log_error_errno(r, "Failed to get D-Bus connection: %m");
74055aa7
LP
1648
1649 r = sd_bus_call_method(
1650 bus,
1651 "org.freedesktop.systemd1",
1652 "/org/freedesktop/systemd1",
1653 "org.freedesktop.systemd1.Manager",
1654 "KillUnit",
1655 &error,
1656 NULL,
1657 "ssi", "systemd-journald.service", "main", SIGUSR1);
1658 if (r < 0) {
1659 log_error("Failed to kill journal service: %s", bus_error_message(&error, r));
1660 return r;
1661 }
1662
1663 mkdir_p("/run/systemd/journal", 0755);
1664
1665 watch_fd = inotify_init1(IN_NONBLOCK|IN_CLOEXEC);
4a62c710
MS
1666 if (watch_fd < 0)
1667 return log_error_errno(errno, "Failed to create inotify watch: %m");
74055aa7
LP
1668
1669 r = inotify_add_watch(watch_fd, "/run/systemd/journal", IN_CREATE|IN_DONT_FOLLOW|IN_ONLYDIR);
4a62c710
MS
1670 if (r < 0)
1671 return log_error_errno(errno, "Failed to watch journal directory: %m");
74055aa7
LP
1672
1673 for (;;) {
1674 if (access("/run/systemd/journal/flushed", F_OK) >= 0)
1675 break;
1676
4a62c710 1677 if (errno != ENOENT)
f131770b 1678 return log_error_errno(errno, "Failed to check for existence of /run/systemd/journal/flushed: %m");
74055aa7
LP
1679
1680 r = fd_wait_for_event(watch_fd, POLLIN, USEC_INFINITY);
23bbb0de
MS
1681 if (r < 0)
1682 return log_error_errno(r, "Failed to wait for event: %m");
74055aa7
LP
1683
1684 r = flush_fd(watch_fd);
23bbb0de
MS
1685 if (r < 0)
1686 return log_error_errno(r, "Failed to flush inotify events: %m");
74055aa7
LP
1687 }
1688
1689 return 0;
1690}
1691
a963990f
LP
1692int main(int argc, char *argv[]) {
1693 int r;
289f910e 1694 _cleanup_journal_close_ sd_journal *j = NULL;
a963990f 1695 bool need_seek = false;
14a65d65 1696 sd_id128_t previous_boot_id;
67e04a48
ZJS
1697 bool previous_boot_id_valid = false, first_line = true;
1698 int n_shown = 0;
94e0bd7d 1699 bool ellipsized = false;
a963990f 1700
a9cdc94f 1701 setlocale(LC_ALL, "");
a963990f
LP
1702 log_parse_environment();
1703 log_open();
1704
1705 r = parse_argv(argc, argv);
1706 if (r <= 0)
1707 goto finish;
1708
ed757c0c 1709 signal(SIGWINCH, columns_lines_cache_reset);
2cf4172a 1710 sigbus_install();
ed757c0c 1711
de45d726
LP
1712 /* Increase max number of open files to 16K if we can, we
1713 * might needs this when browsing journal files, which might
1714 * be split up into many files. */
1715 setrlimit_closest(RLIMIT_NOFILE, &RLIMIT_MAKE_CONST(16384));
1716
7560fffc 1717 if (arg_action == ACTION_NEW_ID128) {
a963990f
LP
1718 r = generate_new_id128();
1719 goto finish;
1720 }
1721
74055aa7
LP
1722 if (arg_action == ACTION_FLUSH) {
1723 r = flush_to_var();
1724 goto finish;
1725 }
1726
7560fffc
LP
1727 if (arg_action == ACTION_SETUP_KEYS) {
1728 r = setup_keys();
1729 goto finish;
1730 }
1731
844ec79b
ZJS
1732 if (arg_action == ACTION_UPDATE_CATALOG ||
1733 arg_action == ACTION_LIST_CATALOG ||
1734 arg_action == ACTION_DUMP_CATALOG) {
1735
0c6ea3a4
ZJS
1736 _cleanup_free_ char *database;
1737
1738 database = path_join(arg_root, CATALOG_DATABASE, NULL);
1739 if (!database) {
1740 r = log_oom();
1741 goto finish;
13cbf3a5
ZJS
1742 }
1743
844ec79b 1744 if (arg_action == ACTION_UPDATE_CATALOG) {
13cbf3a5 1745 r = catalog_update(database, arg_root, catalog_file_dirs);
844ec79b 1746 if (r < 0)
da927ba9 1747 log_error_errno(r, "Failed to list catalog: %m");
844ec79b
ZJS
1748 } else {
1749 bool oneline = arg_action == ACTION_LIST_CATALOG;
1750
1751 if (optind < argc)
13cbf3a5 1752 r = catalog_list_items(stdout, database,
844ec79b
ZJS
1753 oneline, argv + optind);
1754 else
13cbf3a5 1755 r = catalog_list(stdout, database, oneline);
844ec79b 1756 if (r < 0)
da927ba9 1757 log_error_errno(r, "Failed to list catalog: %m");
844ec79b 1758 }
d4205751 1759
d4205751
LP
1760 goto finish;
1761 }
1762
a963990f 1763 if (arg_directory)
3f3a438f 1764 r = sd_journal_open_directory(&j, arg_directory, arg_journal_type);
8d98da3f
ZJS
1765 else if (arg_file)
1766 r = sd_journal_open_files(&j, (const char**) arg_file, 0);
b6741478
LP
1767 else if (arg_machine)
1768 r = sd_journal_open_container(&j, arg_machine, 0);
a963990f 1769 else
3f3a438f 1770 r = sd_journal_open(&j, !arg_merge*SD_JOURNAL_LOCAL_ONLY + arg_journal_type);
a963990f 1771 if (r < 0) {
c33b3297
MS
1772 log_error_errno(r, "Failed to open %s: %m",
1773 arg_directory ? arg_directory : arg_file ? "files" : "journal");
763c7aa2 1774 return EXIT_FAILURE;
a963990f
LP
1775 }
1776
6fe391c5
ZJS
1777 r = access_check(j);
1778 if (r < 0)
1779 return EXIT_FAILURE;
1780
beec0085
LP
1781 if (arg_action == ACTION_VERIFY) {
1782 r = verify(j);
1783 goto finish;
1784 }
1785
7560fffc 1786 if (arg_action == ACTION_PRINT_HEADER) {
dca6219e 1787 journal_print_header(j);
763c7aa2 1788 return EXIT_SUCCESS;
dca6219e
LP
1789 }
1790
a1a03e30 1791 if (arg_action == ACTION_DISK_USAGE) {
39883f62 1792 uint64_t bytes = 0;
a1a03e30
LP
1793 char sbytes[FORMAT_BYTES_MAX];
1794
1795 r = sd_journal_get_usage(j, &bytes);
1796 if (r < 0)
763c7aa2 1797 return EXIT_FAILURE;
a1a03e30 1798
dbd2a83f 1799 printf("Archived and active journals take up %s on disk.\n",
763c7aa2
ZJS
1800 format_bytes(sbytes, sizeof(sbytes), bytes));
1801 return EXIT_SUCCESS;
a1a03e30
LP
1802 }
1803
dbd2a83f
LP
1804 if (arg_action == ACTION_VACUUM) {
1805 Directory *d;
1806 Iterator i;
1807
1808 HASHMAP_FOREACH(d, j->directories_by_path, i) {
1809 int q;
1810
1811 if (d->is_root)
1812 continue;
1813
1814 q = journal_directory_vacuum(d->path, arg_vacuum_size, arg_vacuum_time, NULL, true);
1815 if (q < 0) {
da927ba9 1816 log_error_errno(q, "Failed to vacuum: %m");
dbd2a83f
LP
1817 r = q;
1818 }
1819 }
1820
1821 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
1822 }
1823
f1188074
ZJS
1824 if (arg_action == ACTION_LIST_BOOTS) {
1825 r = list_boots(j);
1826 goto finish;
1827 }
1828
a331b5e6
JJ
1829 /* add_boot() must be called first!
1830 * It may need to seek the journal to find parent boot IDs. */
1831 r = add_boot(j);
a963990f 1832 if (r < 0)
763c7aa2 1833 return EXIT_FAILURE;
a963990f 1834
99271804
ZJS
1835 r = add_dmesg(j);
1836 if (r < 0)
1837 return EXIT_FAILURE;
1838
b9e40524
HH
1839 r = add_units(j);
1840 strv_free(arg_system_units);
1841 strv_free(arg_user_units);
1842
ea18a4b5 1843 if (r < 0) {
da927ba9 1844 log_error_errno(r, "Failed to add filter for units: %m");
763c7aa2 1845 return EXIT_FAILURE;
ea18a4b5 1846 }
c3f60ec5 1847
73083640
HH
1848 r = add_syslog_identifier(j);
1849 if (r < 0) {
da927ba9 1850 log_error_errno(r, "Failed to add filter for syslog identifiers: %m");
73083640
HH
1851 return EXIT_FAILURE;
1852 }
1853
cd34b3c6 1854 r = add_priorities(j);
ea18a4b5 1855 if (r < 0) {
da927ba9 1856 log_error_errno(r, "Failed to add filter for priorities: %m");
763c7aa2 1857 return EXIT_FAILURE;
ea18a4b5 1858 }
a963990f 1859
cd34b3c6 1860 r = add_matches(j, argv + optind);
ea18a4b5 1861 if (r < 0) {
da927ba9 1862 log_error_errno(r, "Failed to add filters: %m");
763c7aa2 1863 return EXIT_FAILURE;
ea18a4b5 1864 }
941e990d 1865
553d2243 1866 if (_unlikely_(log_get_max_level() >= LOG_DEBUG)) {
4ad16808
ZJS
1867 _cleanup_free_ char *filter;
1868
1869 filter = journal_make_match_string(j);
1870 log_debug("Journal filter: %s", filter);
1871 }
67e04a48 1872
15119c16
LP
1873 if (arg_field) {
1874 const void *data;
1875 size_t size;
1876
21ae4593
ZJS
1877 r = sd_journal_set_data_threshold(j, 0);
1878 if (r < 0) {
1879 log_error("Failed to unset data size threshold");
1880 return EXIT_FAILURE;
1881 }
1882
15119c16
LP
1883 r = sd_journal_query_unique(j, arg_field);
1884 if (r < 0) {
da927ba9 1885 log_error_errno(r, "Failed to query unique data objects: %m");
763c7aa2 1886 return EXIT_FAILURE;
15119c16
LP
1887 }
1888
1889 SD_JOURNAL_FOREACH_UNIQUE(j, data, size) {
1890 const void *eq;
1891
67e04a48 1892 if (arg_lines >= 0 && n_shown >= arg_lines)
fd6e8875
LP
1893 break;
1894
15119c16
LP
1895 eq = memchr(data, '=', size);
1896 if (eq)
1897 printf("%.*s\n", (int) (size - ((const uint8_t*) eq - (const uint8_t*) data + 1)), (const char*) eq + 1);
1898 else
1899 printf("%.*s\n", (int) size, (const char*) data);
fd6e8875
LP
1900
1901 n_shown ++;
15119c16
LP
1902 }
1903
763c7aa2 1904 return EXIT_SUCCESS;
15119c16
LP
1905 }
1906
8d98da3f
ZJS
1907 /* Opening the fd now means the first sd_journal_wait() will actually wait */
1908 if (arg_follow) {
1909 r = sd_journal_get_fd(j);
1910 if (r < 0)
1911 return EXIT_FAILURE;
1912 }
1913
248fc619 1914 if (arg_cursor || arg_after_cursor) {
eacbb4d3 1915 r = sd_journal_seek_cursor(j, arg_cursor ?: arg_after_cursor);
08984293 1916 if (r < 0) {
da927ba9 1917 log_error_errno(r, "Failed to seek to cursor: %m");
763c7aa2 1918 return EXIT_FAILURE;
08984293 1919 }
d89d6c86 1920 if (!arg_reverse)
248fc619 1921 r = sd_journal_next_skip(j, 1 + !!arg_after_cursor);
d89d6c86 1922 else
248fc619
ZJS
1923 r = sd_journal_previous_skip(j, 1 + !!arg_after_cursor);
1924
8ee8e536 1925 if (arg_after_cursor && r < 2) {
248fc619 1926 /* We couldn't find the next entry after the cursor. */
8ee8e536
WD
1927 if (arg_follow)
1928 need_seek = true;
1929 else
1930 arg_lines = 0;
1931 }
08984293 1932
d89d6c86 1933 } else if (arg_since_set && !arg_reverse) {
cfbc22ab 1934 r = sd_journal_seek_realtime_usec(j, arg_since);
8f14c832 1935 if (r < 0) {
da927ba9 1936 log_error_errno(r, "Failed to seek to date: %m");
763c7aa2 1937 return EXIT_FAILURE;
8f14c832 1938 }
8f14c832
LP
1939 r = sd_journal_next(j);
1940
d89d6c86
LN
1941 } else if (arg_until_set && arg_reverse) {
1942 r = sd_journal_seek_realtime_usec(j, arg_until);
1943 if (r < 0) {
da927ba9 1944 log_error_errno(r, "Failed to seek to date: %m");
763c7aa2 1945 return EXIT_FAILURE;
d89d6c86
LN
1946 }
1947 r = sd_journal_previous(j);
1948
67e04a48 1949 } else if (arg_lines >= 0) {
2100675e
LP
1950 r = sd_journal_seek_tail(j);
1951 if (r < 0) {
da927ba9 1952 log_error_errno(r, "Failed to seek to tail: %m");
763c7aa2 1953 return EXIT_FAILURE;
2100675e
LP
1954 }
1955
1956 r = sd_journal_previous_skip(j, arg_lines);
8f14c832 1957
d89d6c86
LN
1958 } else if (arg_reverse) {
1959 r = sd_journal_seek_tail(j);
1960 if (r < 0) {
da927ba9 1961 log_error_errno(r, "Failed to seek to tail: %m");
763c7aa2 1962 return EXIT_FAILURE;
d89d6c86
LN
1963 }
1964
1965 r = sd_journal_previous(j);
1966
2100675e
LP
1967 } else {
1968 r = sd_journal_seek_head(j);
1969 if (r < 0) {
da927ba9 1970 log_error_errno(r, "Failed to seek to head: %m");
763c7aa2 1971 return EXIT_FAILURE;
2100675e 1972 }
6f003b43
LP
1973
1974 r = sd_journal_next(j);
1975 }
1976
1977 if (r < 0) {
da927ba9 1978 log_error_errno(r, "Failed to iterate through journal: %m");
763c7aa2 1979 return EXIT_FAILURE;
50f20cfd 1980 }
87d2c1ff 1981
faf5077f
DH
1982 if (!arg_follow)
1983 pager_open_if_enabled();
0d43c694 1984
cfbc22ab
LP
1985 if (!arg_quiet) {
1986 usec_t start, end;
1987 char start_buf[FORMAT_TIMESTAMP_MAX], end_buf[FORMAT_TIMESTAMP_MAX];
1988
1989 r = sd_journal_get_cutoff_realtime_usec(j, &start, &end);
1990 if (r < 0) {
da927ba9 1991 log_error_errno(r, "Failed to get cutoff: %m");
cfbc22ab
LP
1992 goto finish;
1993 }
1994
1995 if (r > 0) {
1996 if (arg_follow)
9048b11f 1997 printf("-- Logs begin at %s. --\n",
5ab99e07 1998 format_timestamp_maybe_utc(start_buf, sizeof(start_buf), start));
cfbc22ab 1999 else
9048b11f 2000 printf("-- Logs begin at %s, end at %s. --\n",
5ab99e07
LP
2001 format_timestamp_maybe_utc(start_buf, sizeof(start_buf), start),
2002 format_timestamp_maybe_utc(end_buf, sizeof(end_buf), end));
cfbc22ab
LP
2003 }
2004 }
2005
50f20cfd 2006 for (;;) {
67e04a48 2007 while (arg_lines < 0 || n_shown < arg_lines || (arg_follow && !first_line)) {
cfbc22ab
LP
2008 int flags;
2009
6f003b43 2010 if (need_seek) {
99613ec5 2011 if (!arg_reverse)
d89d6c86
LN
2012 r = sd_journal_next(j);
2013 else
2014 r = sd_journal_previous(j);
6f003b43 2015 if (r < 0) {
da927ba9 2016 log_error_errno(r, "Failed to iterate through journal: %m");
6f003b43
LP
2017 goto finish;
2018 }
a72b6353
ZJS
2019 if (r == 0)
2020 break;
0d43c694
LP
2021 }
2022
d89d6c86 2023 if (arg_until_set && !arg_reverse) {
cfbc22ab
LP
2024 usec_t usec;
2025
2026 r = sd_journal_get_realtime_usec(j, &usec);
2027 if (r < 0) {
da927ba9 2028 log_error_errno(r, "Failed to determine timestamp: %m");
cfbc22ab
LP
2029 goto finish;
2030 }
3ba09ee8
PF
2031 if (usec > arg_until)
2032 goto finish;
cfbc22ab
LP
2033 }
2034
d89d6c86
LN
2035 if (arg_since_set && arg_reverse) {
2036 usec_t usec;
2037
2038 r = sd_journal_get_realtime_usec(j, &usec);
2039 if (r < 0) {
da927ba9 2040 log_error_errno(r, "Failed to determine timestamp: %m");
d89d6c86
LN
2041 goto finish;
2042 }
2043 if (usec < arg_since)
2044 goto finish;
2045 }
2046
4bed2485 2047 if (!arg_merge && !arg_quiet) {
cd931c0a 2048 sd_id128_t boot_id;
14a65d65 2049
cd931c0a
LP
2050 r = sd_journal_get_monotonic_usec(j, NULL, &boot_id);
2051 if (r >= 0) {
2052 if (previous_boot_id_valid &&
2053 !sd_id128_equal(boot_id, previous_boot_id))
0b5a519c
DS
2054 printf("%s-- Reboot --%s\n",
2055 ansi_highlight(), ansi_highlight_off());
cd931c0a
LP
2056
2057 previous_boot_id = boot_id;
2058 previous_boot_id_valid = true;
2059 }
14a65d65
LP
2060 }
2061
cfbc22ab 2062 flags =
cd4b13e0 2063 arg_all * OUTPUT_SHOW_ALL |
2b8f6883 2064 arg_full * OUTPUT_FULL_WIDTH |
d4205751 2065 on_tty() * OUTPUT_COLOR |
9fd29044
JS
2066 arg_catalog * OUTPUT_CATALOG |
2067 arg_utc * OUTPUT_UTC;
cfbc22ab 2068
94e0bd7d 2069 r = output_journal(stdout, j, arg_output, 0, flags, &ellipsized);
a72b6353
ZJS
2070 need_seek = true;
2071 if (r == -EADDRNOTAVAIL)
2072 break;
2073 else if (r < 0 || ferror(stdout))
72f59706 2074 goto finish;
6f003b43 2075
cfbc22ab 2076 n_shown++;
87d2c1ff
LP
2077 }
2078
248fc619
ZJS
2079 if (!arg_follow) {
2080 if (arg_show_cursor) {
2081 _cleanup_free_ char *cursor = NULL;
2082
2083 r = sd_journal_get_cursor(j, &cursor);
2084 if (r < 0 && r != -EADDRNOTAVAIL)
da927ba9 2085 log_error_errno(r, "Failed to get cursor: %m");
248fc619
ZJS
2086 else if (r >= 0)
2087 printf("-- cursor: %s\n", cursor);
2088 }
2089
50f20cfd 2090 break;
248fc619 2091 }
50f20cfd 2092
e02d1cf7 2093 r = sd_journal_wait(j, (uint64_t) -1);
50f20cfd 2094 if (r < 0) {
da927ba9 2095 log_error_errno(r, "Couldn't wait for journal event: %m");
50f20cfd
LP
2096 goto finish;
2097 }
67e04a48
ZJS
2098
2099 first_line = false;
de190aef 2100 }
87d2c1ff
LP
2101
2102finish:
0d43c694
LP
2103 pager_close();
2104
a36b8deb
ZJS
2105 strv_free(arg_file);
2106
3fbf9cbb 2107 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
87d2c1ff 2108}