1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2011 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
34 #include <sys/inotify.h>
39 #include "sd-journal.h"
42 #include "bus-error.h"
47 #include "hostname-util.h"
48 #include "journal-def.h"
49 #include "journal-internal.h"
50 #include "journal-qrcode.h"
51 #include "journal-vacuum.h"
52 #include "journal-verify.h"
54 #include "logs-show.h"
57 #include "path-util.h"
61 #include "terminal-util.h"
62 #include "unit-name.h"
64 #define DEFAULT_FSS_INTERVAL_USEC (15*USEC_PER_MINUTE)
67 /* Special values for arg_lines */
68 ARG_LINES_DEFAULT
= -2,
72 static OutputMode arg_output
= OUTPUT_SHORT
;
73 static bool arg_utc
= false;
74 static bool arg_pager_end
= false;
75 static bool arg_follow
= false;
76 static bool arg_full
= true;
77 static bool arg_all
= false;
78 static bool arg_no_pager
= false;
79 static int arg_lines
= ARG_LINES_DEFAULT
;
80 static bool arg_no_tail
= false;
81 static bool arg_quiet
= false;
82 static bool arg_merge
= false;
83 static bool arg_boot
= false;
84 static sd_id128_t arg_boot_id
= {};
85 static int arg_boot_offset
= 0;
86 static bool arg_dmesg
= false;
87 static const char *arg_cursor
= NULL
;
88 static const char *arg_after_cursor
= NULL
;
89 static bool arg_show_cursor
= false;
90 static const char *arg_directory
= NULL
;
91 static char **arg_file
= NULL
;
92 static int arg_priorities
= 0xFF;
93 static const char *arg_verify_key
= NULL
;
95 static usec_t arg_interval
= DEFAULT_FSS_INTERVAL_USEC
;
96 static bool arg_force
= false;
98 static usec_t arg_since
, arg_until
;
99 static bool arg_since_set
= false, arg_until_set
= false;
100 static char **arg_syslog_identifier
= NULL
;
101 static char **arg_system_units
= NULL
;
102 static char **arg_user_units
= NULL
;
103 static const char *arg_field
= NULL
;
104 static bool arg_catalog
= false;
105 static bool arg_reverse
= false;
106 static int arg_journal_type
= 0;
107 static const char *arg_root
= NULL
;
108 static const char *arg_machine
= NULL
;
109 static uint64_t arg_vacuum_size
= 0;
110 static uint64_t arg_vacuum_n_files
= 0;
111 static usec_t arg_vacuum_time
= 0;
122 ACTION_UPDATE_CATALOG
,
127 } arg_action
= ACTION_SHOW
;
129 typedef struct BootId
{
133 LIST_FIELDS(struct BootId
, boot_list
);
136 static void pager_open_if_enabled(void) {
141 pager_open(arg_pager_end
);
144 static char *format_timestamp_maybe_utc(char *buf
, size_t l
, usec_t t
) {
147 return format_timestamp_utc(buf
, l
, t
);
149 return format_timestamp(buf
, l
, t
);
152 static int parse_boot_descriptor(const char *x
, sd_id128_t
*boot_id
, int *offset
) {
153 sd_id128_t id
= SD_ID128_NULL
;
156 if (strlen(x
) >= 32) {
160 r
= sd_id128_from_string(t
, &id
);
164 if (*x
!= '-' && *x
!= '+' && *x
!= 0)
168 r
= safe_atoi(x
, &off
);
173 r
= safe_atoi(x
, &off
);
187 static void help(void) {
189 pager_open_if_enabled();
191 printf("%s [OPTIONS...] [MATCHES...]\n\n"
192 "Query the journal.\n\n"
194 " --system Show the system journal\n"
195 " --user Show the user journal for the current user\n"
196 " -M --machine=CONTAINER Operate on local container\n"
197 " --since=DATE Show entries not older than the specified date\n"
198 " --until=DATE Show entries not newer than the specified date\n"
199 " -c --cursor=CURSOR Show entries starting at the specified cursor\n"
200 " --after-cursor=CURSOR Show entries after the specified cursor\n"
201 " --show-cursor Print the cursor after all the entries\n"
202 " -b --boot[=ID] Show current boot or the specified boot\n"
203 " --list-boots Show terse information about recorded boots\n"
204 " -k --dmesg Show kernel message log from the current boot\n"
205 " -u --unit=UNIT Show logs from the specified unit\n"
206 " --user-unit=UNIT Show logs from the specified user unit\n"
207 " -t --identifier=STRING Show entries with the specified syslog identifier\n"
208 " -p --priority=RANGE Show entries with the specified priority\n"
209 " -e --pager-end Immediately jump to the end in the pager\n"
210 " -f --follow Follow the journal\n"
211 " -n --lines[=INTEGER] Number of journal entries to show\n"
212 " --no-tail Show all lines, even in follow mode\n"
213 " -r --reverse Show the newest entries first\n"
214 " -o --output=STRING Change journal output mode (short, short-iso,\n"
215 " short-precise, short-monotonic, verbose,\n"
216 " export, json, json-pretty, json-sse, cat)\n"
217 " --utc Express time in Coordinated Universal Time (UTC)\n"
218 " -x --catalog Add message explanations where available\n"
219 " --no-full Ellipsize fields\n"
220 " -a --all Show all fields, including long and unprintable\n"
221 " -q --quiet Do not show privilege warning\n"
222 " --no-pager Do not pipe output into a pager\n"
223 " -m --merge Show entries from all available journals\n"
224 " -D --directory=PATH Show journal files from directory\n"
225 " --file=PATH Show journal file\n"
226 " --root=ROOT Operate on catalog files underneath the root ROOT\n"
228 " --interval=TIME Time interval for changing the FSS sealing key\n"
229 " --verify-key=KEY Specify FSS verification key\n"
230 " --force Override of the FSS key pair with --setup-keys\n"
233 " -h --help Show this help text\n"
234 " --version Show package version\n"
235 " -F --field=FIELD List all values that a specified field takes\n"
236 " --new-id128 Generate a new 128-bit ID\n"
237 " --disk-usage Show total disk usage of all journal files\n"
238 " --vacuum-size=BYTES Reduce disk usage below specified size\n"
239 " --vacuum-files=INT Leave only the specified number of journal files\n"
240 " --vacuum-time=TIME Remove journal files older than specified time\n"
241 " --flush Flush all journal data from /run into /var\n"
242 " --rotate Request immediate rotation of the journal files\n"
243 " --header Show journal header information\n"
244 " --list-catalog Show all message IDs in the catalog\n"
245 " --dump-catalog Show entries in the message catalog\n"
246 " --update-catalog Update the message catalog database\n"
248 " --setup-keys Generate a new FSS key pair\n"
249 " --verify Verify journal file consistency\n"
251 , program_invocation_short_name
);
254 static int parse_argv(int argc
, char *argv
[]) {
290 static const struct option options
[] = {
291 { "help", no_argument
, NULL
, 'h' },
292 { "version" , no_argument
, NULL
, ARG_VERSION
},
293 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
294 { "pager-end", no_argument
, NULL
, 'e' },
295 { "follow", no_argument
, NULL
, 'f' },
296 { "force", no_argument
, NULL
, ARG_FORCE
},
297 { "output", required_argument
, NULL
, 'o' },
298 { "all", no_argument
, NULL
, 'a' },
299 { "full", no_argument
, NULL
, 'l' },
300 { "no-full", no_argument
, NULL
, ARG_NO_FULL
},
301 { "lines", optional_argument
, NULL
, 'n' },
302 { "no-tail", no_argument
, NULL
, ARG_NO_TAIL
},
303 { "new-id128", no_argument
, NULL
, ARG_NEW_ID128
},
304 { "quiet", no_argument
, NULL
, 'q' },
305 { "merge", no_argument
, NULL
, 'm' },
306 { "boot", optional_argument
, NULL
, 'b' },
307 { "list-boots", no_argument
, NULL
, ARG_LIST_BOOTS
},
308 { "this-boot", optional_argument
, NULL
, 'b' }, /* deprecated */
309 { "dmesg", no_argument
, NULL
, 'k' },
310 { "system", no_argument
, NULL
, ARG_SYSTEM
},
311 { "user", no_argument
, NULL
, ARG_USER
},
312 { "directory", required_argument
, NULL
, 'D' },
313 { "file", required_argument
, NULL
, ARG_FILE
},
314 { "root", required_argument
, NULL
, ARG_ROOT
},
315 { "header", no_argument
, NULL
, ARG_HEADER
},
316 { "identifier", required_argument
, NULL
, 't' },
317 { "priority", required_argument
, NULL
, 'p' },
318 { "setup-keys", no_argument
, NULL
, ARG_SETUP_KEYS
},
319 { "interval", required_argument
, NULL
, ARG_INTERVAL
},
320 { "verify", no_argument
, NULL
, ARG_VERIFY
},
321 { "verify-key", required_argument
, NULL
, ARG_VERIFY_KEY
},
322 { "disk-usage", no_argument
, NULL
, ARG_DISK_USAGE
},
323 { "cursor", required_argument
, NULL
, 'c' },
324 { "after-cursor", required_argument
, NULL
, ARG_AFTER_CURSOR
},
325 { "show-cursor", no_argument
, NULL
, ARG_SHOW_CURSOR
},
326 { "since", required_argument
, NULL
, ARG_SINCE
},
327 { "until", required_argument
, NULL
, ARG_UNTIL
},
328 { "unit", required_argument
, NULL
, 'u' },
329 { "user-unit", required_argument
, NULL
, ARG_USER_UNIT
},
330 { "field", required_argument
, NULL
, 'F' },
331 { "catalog", no_argument
, NULL
, 'x' },
332 { "list-catalog", no_argument
, NULL
, ARG_LIST_CATALOG
},
333 { "dump-catalog", no_argument
, NULL
, ARG_DUMP_CATALOG
},
334 { "update-catalog", no_argument
, NULL
, ARG_UPDATE_CATALOG
},
335 { "reverse", no_argument
, NULL
, 'r' },
336 { "machine", required_argument
, NULL
, 'M' },
337 { "utc", no_argument
, NULL
, ARG_UTC
},
338 { "flush", no_argument
, NULL
, ARG_FLUSH
},
339 { "rotate", no_argument
, NULL
, ARG_ROTATE
},
340 { "vacuum-size", required_argument
, NULL
, ARG_VACUUM_SIZE
},
341 { "vacuum-files", required_argument
, NULL
, ARG_VACUUM_FILES
},
342 { "vacuum-time", required_argument
, NULL
, ARG_VACUUM_TIME
},
351 while ((c
= getopt_long(argc
, argv
, "hefo:aln::qmb::kD:p:c:t:u:F:xrM:", options
, NULL
)) >= 0)
367 arg_pager_end
= true;
369 if (arg_lines
== ARG_LINES_DEFAULT
)
379 arg_output
= output_mode_from_string(optarg
);
380 if (arg_output
< 0) {
381 log_error("Unknown output format '%s'.", optarg
);
385 if (arg_output
== OUTPUT_EXPORT
||
386 arg_output
== OUTPUT_JSON
||
387 arg_output
== OUTPUT_JSON_PRETTY
||
388 arg_output
== OUTPUT_JSON_SSE
||
389 arg_output
== OUTPUT_CAT
)
408 if (streq(optarg
, "all"))
409 arg_lines
= ARG_LINES_ALL
;
411 r
= safe_atoi(optarg
, &arg_lines
);
412 if (r
< 0 || arg_lines
< 0) {
413 log_error("Failed to parse lines '%s'", optarg
);
420 /* Hmm, no argument? Maybe the next
421 * word on the command line is
422 * supposed to be the argument? Let's
423 * see if there is one, and is
427 if (streq(argv
[optind
], "all")) {
428 arg_lines
= ARG_LINES_ALL
;
430 } else if (safe_atoi(argv
[optind
], &n
) >= 0 && n
>= 0) {
444 arg_action
= ACTION_NEW_ID128
;
459 r
= parse_boot_descriptor(optarg
, &arg_boot_id
, &arg_boot_offset
);
461 log_error("Failed to parse boot descriptor '%s'", optarg
);
466 /* Hmm, no argument? Maybe the next
467 * word on the command line is
468 * supposed to be the argument? Let's
469 * see if there is one and is parsable
470 * as a boot descriptor... */
473 parse_boot_descriptor(argv
[optind
], &arg_boot_id
, &arg_boot_offset
) >= 0)
480 arg_action
= ACTION_LIST_BOOTS
;
484 arg_boot
= arg_dmesg
= true;
488 arg_journal_type
|= SD_JOURNAL_SYSTEM
;
492 arg_journal_type
|= SD_JOURNAL_CURRENT_USER
;
496 arg_machine
= optarg
;
500 arg_directory
= optarg
;
504 r
= glob_extend(&arg_file
, optarg
);
506 return log_error_errno(r
, "Failed to add paths: %m");
517 case ARG_AFTER_CURSOR
:
518 arg_after_cursor
= optarg
;
521 case ARG_SHOW_CURSOR
:
522 arg_show_cursor
= true;
526 arg_action
= ACTION_PRINT_HEADER
;
530 arg_action
= ACTION_VERIFY
;
534 arg_action
= ACTION_DISK_USAGE
;
537 case ARG_VACUUM_SIZE
:
538 r
= parse_size(optarg
, 1024, &arg_vacuum_size
);
540 log_error("Failed to parse vacuum size: %s", optarg
);
544 arg_action
= ACTION_VACUUM
;
547 case ARG_VACUUM_FILES
:
548 r
= safe_atou64(optarg
, &arg_vacuum_n_files
);
550 log_error("Failed to parse vacuum files: %s", optarg
);
554 arg_action
= ACTION_VACUUM
;
557 case ARG_VACUUM_TIME
:
558 r
= parse_sec(optarg
, &arg_vacuum_time
);
560 log_error("Failed to parse vacuum time: %s", optarg
);
564 arg_action
= ACTION_VACUUM
;
573 arg_action
= ACTION_SETUP_KEYS
;
578 arg_action
= ACTION_VERIFY
;
579 arg_verify_key
= optarg
;
584 r
= parse_sec(optarg
, &arg_interval
);
585 if (r
< 0 || arg_interval
<= 0) {
586 log_error("Failed to parse sealing key change interval: %s", optarg
);
595 log_error("Forward-secure sealing not available.");
602 dots
= strstr(optarg
, "..");
608 a
= strndup(optarg
, dots
- optarg
);
612 from
= log_level_from_string(a
);
613 to
= log_level_from_string(dots
+ 2);
616 if (from
< 0 || to
< 0) {
617 log_error("Failed to parse log level range %s", optarg
);
624 for (i
= from
; i
<= to
; i
++)
625 arg_priorities
|= 1 << i
;
627 for (i
= to
; i
<= from
; i
++)
628 arg_priorities
|= 1 << i
;
634 p
= log_level_from_string(optarg
);
636 log_error("Unknown log level %s", optarg
);
642 for (i
= 0; i
<= p
; i
++)
643 arg_priorities
|= 1 << i
;
650 r
= parse_timestamp(optarg
, &arg_since
);
652 log_error("Failed to parse timestamp: %s", optarg
);
655 arg_since_set
= true;
659 r
= parse_timestamp(optarg
, &arg_until
);
661 log_error("Failed to parse timestamp: %s", optarg
);
664 arg_until_set
= true;
668 r
= strv_extend(&arg_syslog_identifier
, optarg
);
674 r
= strv_extend(&arg_system_units
, optarg
);
680 r
= strv_extend(&arg_user_units
, optarg
);
693 case ARG_LIST_CATALOG
:
694 arg_action
= ACTION_LIST_CATALOG
;
697 case ARG_DUMP_CATALOG
:
698 arg_action
= ACTION_DUMP_CATALOG
;
701 case ARG_UPDATE_CATALOG
:
702 arg_action
= ACTION_UPDATE_CATALOG
;
714 arg_action
= ACTION_FLUSH
;
718 arg_action
= ACTION_ROTATE
;
725 assert_not_reached("Unhandled option");
728 if (arg_follow
&& !arg_no_tail
&& !arg_since
&& arg_lines
== ARG_LINES_DEFAULT
)
731 if (!!arg_directory
+ !!arg_file
+ !!arg_machine
> 1) {
732 log_error("Please specify either -D/--directory= or --file= or -M/--machine=, not more than one.");
736 if (arg_since_set
&& arg_until_set
&& arg_since
> arg_until
) {
737 log_error("--since= must be before --until=.");
741 if (!!arg_cursor
+ !!arg_after_cursor
+ !!arg_since_set
> 1) {
742 log_error("Please specify only one of --since=, --cursor=, and --after-cursor.");
746 if (arg_follow
&& arg_reverse
) {
747 log_error("Please specify either --reverse= or --follow=, not both.");
751 if (arg_action
!= ACTION_SHOW
&& optind
< argc
) {
752 log_error("Extraneous arguments starting with '%s'", argv
[optind
]);
756 if ((arg_boot
|| arg_action
== ACTION_LIST_BOOTS
) && (arg_file
|| arg_directory
|| arg_merge
)) {
757 log_error("Using --boot or --list-boots with --file, --directory or --merge is not supported.");
764 static int generate_new_id128(void) {
769 r
= sd_id128_randomize(&id
);
771 return log_error_errno(r
, "Failed to generate ID: %m");
773 printf("As string:\n"
774 SD_ID128_FORMAT_STR
"\n\n"
776 "%02x%02x%02x%02x-%02x%02x-%02x%02x-%02x%02x-%02x%02x%02x%02x%02x%02x\n\n"
778 "#define MESSAGE_XYZ SD_ID128_MAKE(",
779 SD_ID128_FORMAT_VAL(id
),
780 SD_ID128_FORMAT_VAL(id
));
781 for (i
= 0; i
< 16; i
++)
782 printf("%02x%s", id
.bytes
[i
], i
!= 15 ? "," : "");
783 fputs(")\n\n", stdout
);
785 printf("As Python constant:\n"
787 ">>> MESSAGE_XYZ = uuid.UUID('" SD_ID128_FORMAT_STR
"')\n",
788 SD_ID128_FORMAT_VAL(id
));
793 static int add_matches(sd_journal
*j
, char **args
) {
795 bool have_term
= false;
799 STRV_FOREACH(i
, args
) {
802 if (streq(*i
, "+")) {
805 r
= sd_journal_add_disjunction(j
);
808 } else if (path_is_absolute(*i
)) {
809 _cleanup_free_
char *p
, *t
= NULL
, *t2
= NULL
;
811 _cleanup_free_
char *interpreter
= NULL
;
814 p
= canonicalize_file_name(*i
);
817 if (lstat(path
, &st
) < 0)
818 return log_error_errno(errno
, "Couldn't stat file: %m");
820 if (S_ISREG(st
.st_mode
) && (0111 & st
.st_mode
)) {
821 if (executable_is_script(path
, &interpreter
) > 0) {
822 _cleanup_free_
char *comm
;
824 comm
= strndup(basename(path
), 15);
828 t
= strappend("_COMM=", comm
);
830 /* Append _EXE only if the interpreter is not a link.
831 Otherwise, it might be outdated often. */
832 if (lstat(interpreter
, &st
) == 0 &&
833 !S_ISLNK(st
.st_mode
)) {
834 t2
= strappend("_EXE=", interpreter
);
839 t
= strappend("_EXE=", path
);
840 } else if (S_ISCHR(st
.st_mode
))
841 (void) asprintf(&t
, "_KERNEL_DEVICE=c%u:%u", major(st
.st_rdev
), minor(st
.st_rdev
));
842 else if (S_ISBLK(st
.st_mode
))
843 (void) asprintf(&t
, "_KERNEL_DEVICE=b%u:%u", major(st
.st_rdev
), minor(st
.st_rdev
));
845 log_error("File is neither a device node, nor regular file, nor executable: %s", *i
);
852 r
= sd_journal_add_match(j
, t
, 0);
854 r
= sd_journal_add_match(j
, t2
, 0);
858 r
= sd_journal_add_match(j
, *i
, 0);
863 return log_error_errno(r
, "Failed to add match '%s': %m", *i
);
866 if (!strv_isempty(args
) && !have_term
) {
867 log_error("\"+\" can only be used between terms");
874 static void boot_id_free_all(BootId
*l
) {
878 LIST_REMOVE(boot_list
, l
, i
);
883 static int discover_next_boot(
887 bool read_realtime
) {
890 char match
[9+32+1] = "_BOOT_ID=";
891 _cleanup_free_ BootId
*next_boot
= NULL
;
896 /* We expect the journal to be on the last position of a boot
897 * (in relation to the direction we are going), so that the next
898 * invocation of sd_journal_next/previous will be from a different
899 * boot. We then collect any information we desire and then jump
900 * to the last location of the new boot by using a _BOOT_ID match
901 * coming from the other journal direction. */
903 /* Make sure we aren't restricted by any _BOOT_ID matches, so that
904 * we can actually advance to a *different* boot. */
905 sd_journal_flush_matches(j
);
908 r
= sd_journal_previous(j
);
910 r
= sd_journal_next(j
);
914 return 0; /* End of journal, yay. */
916 next_boot
= new0(BootId
, 1);
920 r
= sd_journal_get_monotonic_usec(j
, NULL
, &next_boot
->id
);
925 r
= sd_journal_get_realtime_usec(j
, &next_boot
->first
);
930 /* Now seek to the last occurrence of this boot ID. */
931 sd_id128_to_string(next_boot
->id
, match
+ 9);
932 r
= sd_journal_add_match(j
, match
, sizeof(match
) - 1);
937 r
= sd_journal_seek_head(j
);
939 r
= sd_journal_seek_tail(j
);
944 r
= sd_journal_next(j
);
946 r
= sd_journal_previous(j
);
950 return -ENODATA
; /* This shouldn't happen. We just came from this very boot ID. */
953 r
= sd_journal_get_realtime_usec(j
, &next_boot
->last
);
964 static int get_boots(
967 BootId
*query_ref_boot
,
968 int ref_boot_offset
) {
972 BootId
*head
= NULL
, *tail
= NULL
;
973 const bool advance_older
= query_ref_boot
&& ref_boot_offset
<= 0;
977 /* Adjust for the asymmetry that offset 0 is
978 * the last (and current) boot, while 1 is considered the
979 * (chronological) first boot in the journal. */
980 skip_once
= query_ref_boot
&& sd_id128_is_null(query_ref_boot
->id
) && ref_boot_offset
< 0;
982 /* Advance to the earliest/latest occurrence of our reference
983 * boot ID (taking our lookup direction into account), so that
984 * discover_next_boot() can do its job.
985 * If no reference is given, the journal head/tail will do,
986 * they're "virtual" boots after all. */
987 if (query_ref_boot
&& !sd_id128_is_null(query_ref_boot
->id
)) {
988 char match
[9+32+1] = "_BOOT_ID=";
990 sd_journal_flush_matches(j
);
992 sd_id128_to_string(query_ref_boot
->id
, match
+ 9);
993 r
= sd_journal_add_match(j
, match
, sizeof(match
) - 1);
998 r
= sd_journal_seek_head(j
);
1000 r
= sd_journal_seek_tail(j
);
1005 r
= sd_journal_next(j
);
1007 r
= sd_journal_previous(j
);
1012 else if (ref_boot_offset
== 0) {
1018 r
= sd_journal_seek_tail(j
);
1020 r
= sd_journal_seek_head(j
);
1024 /* No sd_journal_next/previous here. */
1028 _cleanup_free_ BootId
*current
= NULL
;
1030 r
= discover_next_boot(j
, ¤t
, advance_older
, !query_ref_boot
);
1032 boot_id_free_all(head
);
1039 if (query_ref_boot
) {
1041 ref_boot_offset
+= advance_older
? 1 : -1;
1044 if (ref_boot_offset
== 0) {
1046 query_ref_boot
->id
= current
->id
;
1050 LIST_INSERT_AFTER(boot_list
, head
, tail
, current
);
1061 sd_journal_flush_matches(j
);
1066 static int list_boots(sd_journal
*j
) {
1068 BootId
*id
, *all_ids
;
1072 count
= get_boots(j
, &all_ids
, NULL
, 0);
1074 return log_error_errno(count
, "Failed to determine boots: %m");
1078 pager_open_if_enabled();
1080 /* numbers are one less, but we need an extra char for the sign */
1081 w
= DECIMAL_STR_WIDTH(count
- 1) + 1;
1084 LIST_FOREACH(boot_list
, id
, all_ids
) {
1085 char a
[FORMAT_TIMESTAMP_MAX
], b
[FORMAT_TIMESTAMP_MAX
];
1087 printf("% *i " SD_ID128_FORMAT_STR
" %s—%s\n",
1089 SD_ID128_FORMAT_VAL(id
->id
),
1090 format_timestamp_maybe_utc(a
, sizeof(a
), id
->first
),
1091 format_timestamp_maybe_utc(b
, sizeof(b
), id
->last
));
1095 boot_id_free_all(all_ids
);
1100 static int add_boot(sd_journal
*j
) {
1101 char match
[9+32+1] = "_BOOT_ID=";
1103 BootId ref_boot_id
= {};
1110 if (arg_boot_offset
== 0 && sd_id128_equal(arg_boot_id
, SD_ID128_NULL
))
1111 return add_match_this_boot(j
, arg_machine
);
1113 ref_boot_id
.id
= arg_boot_id
;
1114 r
= get_boots(j
, NULL
, &ref_boot_id
, arg_boot_offset
);
1117 const char *reason
= (r
== 0) ? "No such boot ID in journal" : strerror(-r
);
1119 if (sd_id128_is_null(arg_boot_id
))
1120 log_error("Failed to look up boot %+i: %s", arg_boot_offset
, reason
);
1122 log_error("Failed to look up boot ID "SD_ID128_FORMAT_STR
"%+i: %s",
1123 SD_ID128_FORMAT_VAL(arg_boot_id
), arg_boot_offset
, reason
);
1125 return r
== 0 ? -ENODATA
: r
;
1128 sd_id128_to_string(ref_boot_id
.id
, match
+ 9);
1130 r
= sd_journal_add_match(j
, match
, sizeof(match
) - 1);
1132 return log_error_errno(r
, "Failed to add match: %m");
1134 r
= sd_journal_add_conjunction(j
);
1136 return log_error_errno(r
, "Failed to add conjunction: %m");
1141 static int add_dmesg(sd_journal
*j
) {
1148 r
= sd_journal_add_match(j
, "_TRANSPORT=kernel", strlen("_TRANSPORT=kernel"));
1150 return log_error_errno(r
, "Failed to add match: %m");
1152 r
= sd_journal_add_conjunction(j
);
1154 return log_error_errno(r
, "Failed to add conjunction: %m");
1159 static int get_possible_units(
1165 _cleanup_set_free_free_ Set
*found
;
1169 found
= set_new(&string_hash_ops
);
1173 NULSTR_FOREACH(field
, fields
) {
1177 r
= sd_journal_query_unique(j
, field
);
1181 SD_JOURNAL_FOREACH_UNIQUE(j
, data
, size
) {
1182 char **pattern
, *eq
;
1184 _cleanup_free_
char *u
= NULL
;
1186 eq
= memchr(data
, '=', size
);
1188 prefix
= eq
- (char*) data
+ 1;
1192 u
= strndup((char*) data
+ prefix
, size
- prefix
);
1196 STRV_FOREACH(pattern
, patterns
)
1197 if (fnmatch(*pattern
, u
, FNM_NOESCAPE
) == 0) {
1198 log_debug("Matched %s with pattern %s=%s", u
, field
, *pattern
);
1200 r
= set_consume(found
, u
);
1202 if (r
< 0 && r
!= -EEXIST
)
1215 /* This list is supposed to return the superset of unit names
1216 * possibly matched by rules added with add_matches_for_unit... */
1217 #define SYSTEM_UNITS \
1221 "OBJECT_SYSTEMD_UNIT\0" \
1224 /* ... and add_matches_for_user_unit */
1225 #define USER_UNITS \
1226 "_SYSTEMD_USER_UNIT\0" \
1228 "COREDUMP_USER_UNIT\0" \
1229 "OBJECT_SYSTEMD_USER_UNIT\0"
1231 static int add_units(sd_journal
*j
) {
1232 _cleanup_strv_free_
char **patterns
= NULL
;
1238 STRV_FOREACH(i
, arg_system_units
) {
1239 _cleanup_free_
char *u
= NULL
;
1241 r
= unit_name_mangle(*i
, UNIT_NAME_GLOB
, &u
);
1245 if (string_is_glob(u
)) {
1246 r
= strv_push(&patterns
, u
);
1251 r
= add_matches_for_unit(j
, u
);
1254 r
= sd_journal_add_disjunction(j
);
1261 if (!strv_isempty(patterns
)) {
1262 _cleanup_set_free_free_ Set
*units
= NULL
;
1266 r
= get_possible_units(j
, SYSTEM_UNITS
, patterns
, &units
);
1270 SET_FOREACH(u
, units
, it
) {
1271 r
= add_matches_for_unit(j
, u
);
1274 r
= sd_journal_add_disjunction(j
);
1281 patterns
= strv_free(patterns
);
1283 STRV_FOREACH(i
, arg_user_units
) {
1284 _cleanup_free_
char *u
= NULL
;
1286 r
= unit_name_mangle(*i
, UNIT_NAME_GLOB
, &u
);
1290 if (string_is_glob(u
)) {
1291 r
= strv_push(&patterns
, u
);
1296 r
= add_matches_for_user_unit(j
, u
, getuid());
1299 r
= sd_journal_add_disjunction(j
);
1306 if (!strv_isempty(patterns
)) {
1307 _cleanup_set_free_free_ Set
*units
= NULL
;
1311 r
= get_possible_units(j
, USER_UNITS
, patterns
, &units
);
1315 SET_FOREACH(u
, units
, it
) {
1316 r
= add_matches_for_user_unit(j
, u
, getuid());
1319 r
= sd_journal_add_disjunction(j
);
1326 /* Complain if the user request matches but nothing whatsoever was
1327 * found, since otherwise everything would be matched. */
1328 if (!(strv_isempty(arg_system_units
) && strv_isempty(arg_user_units
)) && count
== 0)
1331 r
= sd_journal_add_conjunction(j
);
1338 static int add_priorities(sd_journal
*j
) {
1339 char match
[] = "PRIORITY=0";
1343 if (arg_priorities
== 0xFF)
1346 for (i
= LOG_EMERG
; i
<= LOG_DEBUG
; i
++)
1347 if (arg_priorities
& (1 << i
)) {
1348 match
[sizeof(match
)-2] = '0' + i
;
1350 r
= sd_journal_add_match(j
, match
, strlen(match
));
1352 return log_error_errno(r
, "Failed to add match: %m");
1355 r
= sd_journal_add_conjunction(j
);
1357 return log_error_errno(r
, "Failed to add conjunction: %m");
1363 static int add_syslog_identifier(sd_journal
*j
) {
1369 STRV_FOREACH(i
, arg_syslog_identifier
) {
1372 u
= strjoina("SYSLOG_IDENTIFIER=", *i
);
1373 r
= sd_journal_add_match(j
, u
, 0);
1376 r
= sd_journal_add_disjunction(j
);
1381 r
= sd_journal_add_conjunction(j
);
1388 static int setup_keys(void) {
1390 size_t mpk_size
, seed_size
, state_size
, i
;
1391 uint8_t *mpk
, *seed
, *state
;
1393 sd_id128_t machine
, boot
;
1394 char *p
= NULL
, *k
= NULL
;
1399 r
= stat("/var/log/journal", &st
);
1400 if (r
< 0 && errno
!= ENOENT
&& errno
!= ENOTDIR
)
1401 return log_error_errno(errno
, "stat(\"%s\") failed: %m", "/var/log/journal");
1403 if (r
< 0 || !S_ISDIR(st
.st_mode
)) {
1404 log_error("%s is not a directory, must be using persistent logging for FSS.",
1405 "/var/log/journal");
1406 return r
< 0 ? -errno
: -ENOTDIR
;
1409 r
= sd_id128_get_machine(&machine
);
1411 return log_error_errno(r
, "Failed to get machine ID: %m");
1413 r
= sd_id128_get_boot(&boot
);
1415 return log_error_errno(r
, "Failed to get boot ID: %m");
1417 if (asprintf(&p
, "/var/log/journal/" SD_ID128_FORMAT_STR
"/fss",
1418 SD_ID128_FORMAT_VAL(machine
)) < 0)
1423 if (r
< 0 && errno
!= ENOENT
) {
1424 r
= log_error_errno(errno
, "unlink(\"%s\") failed: %m", p
);
1427 } else if (access(p
, F_OK
) >= 0) {
1428 log_error("Sealing key file %s exists already. Use --force to recreate.", p
);
1433 if (asprintf(&k
, "/var/log/journal/" SD_ID128_FORMAT_STR
"/fss.tmp.XXXXXX",
1434 SD_ID128_FORMAT_VAL(machine
)) < 0) {
1439 mpk_size
= FSPRG_mskinbytes(FSPRG_RECOMMENDED_SECPAR
);
1440 mpk
= alloca(mpk_size
);
1442 seed_size
= FSPRG_RECOMMENDED_SEEDLEN
;
1443 seed
= alloca(seed_size
);
1445 state_size
= FSPRG_stateinbytes(FSPRG_RECOMMENDED_SECPAR
);
1446 state
= alloca(state_size
);
1448 fd
= open("/dev/random", O_RDONLY
|O_CLOEXEC
|O_NOCTTY
);
1450 r
= log_error_errno(errno
, "Failed to open /dev/random: %m");
1454 log_info("Generating seed...");
1455 r
= loop_read_exact(fd
, seed
, seed_size
, true);
1457 log_error_errno(r
, "Failed to read random seed: %m");
1461 log_info("Generating key pair...");
1462 FSPRG_GenMK(NULL
, mpk
, seed
, seed_size
, FSPRG_RECOMMENDED_SECPAR
);
1464 log_info("Generating sealing key...");
1465 FSPRG_GenState0(state
, mpk
, seed
, seed_size
);
1467 assert(arg_interval
> 0);
1469 n
= now(CLOCK_REALTIME
);
1473 fd
= mkostemp_safe(k
, O_WRONLY
|O_CLOEXEC
);
1475 r
= log_error_errno(errno
, "Failed to open %s: %m", k
);
1479 /* Enable secure remove, exclusion from dump, synchronous
1480 * writing and in-place updating */
1481 r
= chattr_fd(fd
, FS_SECRM_FL
|FS_NODUMP_FL
|FS_SYNC_FL
|FS_NOCOW_FL
, FS_SECRM_FL
|FS_NODUMP_FL
|FS_SYNC_FL
|FS_NOCOW_FL
);
1483 log_warning_errno(errno
, "Failed to set file attributes: %m");
1486 memcpy(h
.signature
, "KSHHRHLP", 8);
1487 h
.machine_id
= machine
;
1489 h
.header_size
= htole64(sizeof(h
));
1490 h
.start_usec
= htole64(n
* arg_interval
);
1491 h
.interval_usec
= htole64(arg_interval
);
1492 h
.fsprg_secpar
= htole16(FSPRG_RECOMMENDED_SECPAR
);
1493 h
.fsprg_state_size
= htole64(state_size
);
1495 r
= loop_write(fd
, &h
, sizeof(h
), false);
1497 log_error_errno(r
, "Failed to write header: %m");
1501 r
= loop_write(fd
, state
, state_size
, false);
1503 log_error_errno(r
, "Failed to write state: %m");
1507 if (link(k
, p
) < 0) {
1508 r
= log_error_errno(errno
, "Failed to link file: %m");
1515 "The new key pair has been generated. The " ANSI_HIGHLIGHT
"secret sealing key" ANSI_NORMAL
" has been written to\n"
1516 "the following local file. This key file is automatically updated when the\n"
1517 "sealing key is advanced. It should not be used on multiple hosts.\n"
1521 "Please write down the following " ANSI_HIGHLIGHT
"secret verification key" ANSI_NORMAL
". It should be stored\n"
1522 "at a safe location and should not be saved locally on disk.\n"
1523 "\n\t" ANSI_HIGHLIGHT_RED
, p
);
1526 for (i
= 0; i
< seed_size
; i
++) {
1527 if (i
> 0 && i
% 3 == 0)
1529 printf("%02x", ((uint8_t*) seed
)[i
]);
1532 printf("/%llx-%llx\n", (unsigned long long) n
, (unsigned long long) arg_interval
);
1535 char tsb
[FORMAT_TIMESPAN_MAX
], *hn
;
1539 "The sealing key is automatically changed every %s.\n",
1540 format_timespan(tsb
, sizeof(tsb
), arg_interval
, 0));
1542 hn
= gethostname_malloc();
1545 hostname_cleanup(hn
);
1546 fprintf(stderr
, "\nThe keys have been generated for host %s/" SD_ID128_FORMAT_STR
".\n", hn
, SD_ID128_FORMAT_VAL(machine
));
1548 fprintf(stderr
, "\nThe keys have been generated for host " SD_ID128_FORMAT_STR
".\n", SD_ID128_FORMAT_VAL(machine
));
1550 #ifdef HAVE_QRENCODE
1551 /* If this is not an UTF-8 system don't print any QR codes */
1552 if (is_locale_utf8()) {
1553 fputs("\nTo transfer the verification key to your phone please scan the QR code below:\n\n", stderr
);
1554 print_qr_code(stderr
, seed
, seed_size
, n
, arg_interval
, hn
, machine
);
1574 log_error("Forward-secure sealing not available.");
1579 static int verify(sd_journal
*j
) {
1586 log_show_color(true);
1588 ORDERED_HASHMAP_FOREACH(f
, j
->files
, i
) {
1590 usec_t first
= 0, validated
= 0, last
= 0;
1593 if (!arg_verify_key
&& JOURNAL_HEADER_SEALED(f
->header
))
1594 log_notice("Journal file %s has sealing enabled but verification key has not been passed using --verify-key=.", f
->path
);
1597 k
= journal_file_verify(f
, arg_verify_key
, &first
, &validated
, &last
, true);
1599 /* If the key was invalid give up right-away. */
1602 log_warning_errno(k
, "FAIL: %s (%m)", f
->path
);
1605 char a
[FORMAT_TIMESTAMP_MAX
], b
[FORMAT_TIMESTAMP_MAX
], c
[FORMAT_TIMESPAN_MAX
];
1606 log_info("PASS: %s", f
->path
);
1608 if (arg_verify_key
&& JOURNAL_HEADER_SEALED(f
->header
)) {
1609 if (validated
> 0) {
1610 log_info("=> Validated from %s to %s, final %s entries not sealed.",
1611 format_timestamp_maybe_utc(a
, sizeof(a
), first
),
1612 format_timestamp_maybe_utc(b
, sizeof(b
), validated
),
1613 format_timespan(c
, sizeof(c
), last
> validated
? last
- validated
: 0, 0));
1614 } else if (last
> 0)
1615 log_info("=> No sealing yet, %s of entries not sealed.",
1616 format_timespan(c
, sizeof(c
), last
- first
, 0));
1618 log_info("=> No sealing yet, no entries in file.");
1626 static int access_check_var_log_journal(sd_journal
*j
) {
1628 _cleanup_strv_free_
char **g
= NULL
;
1638 /* If we are root, we should have access, don't warn. */
1642 /* If we are in the 'systemd-journal' group, we should have
1644 r
= in_group("systemd-journal");
1646 return log_error_errno(r
, "Failed to check if we are in the 'systemd-journal' group: %m");
1651 if (laccess("/run/log/journal", F_OK
) >= 0)
1652 dir
= "/run/log/journal";
1654 dir
= "/var/log/journal";
1656 /* If we are in any of the groups listed in the journal ACLs,
1657 * then all is good, too. Let's enumerate all groups from the
1658 * default ACL of the directory, which generally should allow
1659 * access to most journal files too. */
1660 r
= acl_search_groups(dir
, &g
);
1662 return log_error_errno(r
, "Failed to search journal ACL: %m");
1666 /* Print a pretty list, if there were ACLs set. */
1667 if (!strv_isempty(g
)) {
1668 _cleanup_free_
char *s
= NULL
;
1670 /* Thre are groups in the ACL, let's list them */
1671 r
= strv_extend(&g
, "systemd-journal");
1678 s
= strv_join(g
, "', '");
1682 log_notice("Hint: You are currently not seeing messages from other users and the system.\n"
1683 " Users in groups '%s' can see all messages.\n"
1684 " Pass -q to turn off this notice.", s
);
1689 /* If no ACLs were found, print a short version of the message. */
1690 log_notice("Hint: You are currently not seeing messages from other users and the system.\n"
1691 " Users in the 'systemd-journal' group can see all messages. Pass -q to\n"
1692 " turn off this notice.");
1697 static int access_check(sd_journal
*j
) {
1704 if (set_isempty(j
->errors
)) {
1705 if (ordered_hashmap_isempty(j
->files
))
1706 log_notice("No journal files were found.");
1711 if (set_contains(j
->errors
, INT_TO_PTR(-EACCES
))) {
1712 (void) access_check_var_log_journal(j
);
1714 if (ordered_hashmap_isempty(j
->files
))
1715 r
= log_error_errno(EACCES
, "No journal files were opened due to insufficient permissions.");
1718 SET_FOREACH(code
, j
->errors
, it
) {
1721 err
= -PTR_TO_INT(code
);
1727 log_warning_errno(err
, "Error was encountered while opening journal files: %m");
1735 static int flush_to_var(void) {
1736 _cleanup_bus_error_free_ sd_bus_error error
= SD_BUS_ERROR_NULL
;
1737 _cleanup_bus_flush_close_unref_ sd_bus
*bus
= NULL
;
1738 _cleanup_close_
int watch_fd
= -1;
1742 if (access("/run/systemd/journal/flushed", F_OK
) >= 0)
1745 /* OK, let's actually do the full logic, send SIGUSR1 to the
1746 * daemon and set up inotify to wait for the flushed file to appear */
1747 r
= bus_connect_system_systemd(&bus
);
1749 return log_error_errno(r
, "Failed to get D-Bus connection: %m");
1751 r
= sd_bus_call_method(
1753 "org.freedesktop.systemd1",
1754 "/org/freedesktop/systemd1",
1755 "org.freedesktop.systemd1.Manager",
1759 "ssi", "systemd-journald.service", "main", SIGUSR1
);
1761 log_error("Failed to kill journal service: %s", bus_error_message(&error
, r
));
1765 mkdir_p("/run/systemd/journal", 0755);
1767 watch_fd
= inotify_init1(IN_NONBLOCK
|IN_CLOEXEC
);
1769 return log_error_errno(errno
, "Failed to create inotify watch: %m");
1771 r
= inotify_add_watch(watch_fd
, "/run/systemd/journal", IN_CREATE
|IN_DONT_FOLLOW
|IN_ONLYDIR
);
1773 return log_error_errno(errno
, "Failed to watch journal directory: %m");
1776 if (access("/run/systemd/journal/flushed", F_OK
) >= 0)
1779 if (errno
!= ENOENT
)
1780 return log_error_errno(errno
, "Failed to check for existence of /run/systemd/journal/flushed: %m");
1782 r
= fd_wait_for_event(watch_fd
, POLLIN
, USEC_INFINITY
);
1784 return log_error_errno(r
, "Failed to wait for event: %m");
1786 r
= flush_fd(watch_fd
);
1788 return log_error_errno(r
, "Failed to flush inotify events: %m");
1794 static int rotate(void) {
1795 _cleanup_bus_error_free_ sd_bus_error error
= SD_BUS_ERROR_NULL
;
1796 _cleanup_bus_flush_close_unref_ sd_bus
*bus
= NULL
;
1799 r
= bus_connect_system_systemd(&bus
);
1801 return log_error_errno(r
, "Failed to get D-Bus connection: %m");
1803 r
= sd_bus_call_method(
1805 "org.freedesktop.systemd1",
1806 "/org/freedesktop/systemd1",
1807 "org.freedesktop.systemd1.Manager",
1811 "ssi", "systemd-journald.service", "main", SIGUSR2
);
1813 return log_error_errno(r
, "Failed to kill journal service: %s", bus_error_message(&error
, r
));
1818 int main(int argc
, char *argv
[]) {
1820 _cleanup_journal_close_ sd_journal
*j
= NULL
;
1821 bool need_seek
= false;
1822 sd_id128_t previous_boot_id
;
1823 bool previous_boot_id_valid
= false, first_line
= true;
1825 bool ellipsized
= false;
1827 setlocale(LC_ALL
, "");
1828 log_parse_environment();
1831 r
= parse_argv(argc
, argv
);
1835 signal(SIGWINCH
, columns_lines_cache_reset
);
1838 /* Increase max number of open files to 16K if we can, we
1839 * might needs this when browsing journal files, which might
1840 * be split up into many files. */
1841 setrlimit_closest(RLIMIT_NOFILE
, &RLIMIT_MAKE_CONST(16384));
1843 if (arg_action
== ACTION_NEW_ID128
) {
1844 r
= generate_new_id128();
1848 if (arg_action
== ACTION_FLUSH
) {
1853 if (arg_action
== ACTION_ROTATE
) {
1858 if (arg_action
== ACTION_SETUP_KEYS
) {
1863 if (arg_action
== ACTION_UPDATE_CATALOG
||
1864 arg_action
== ACTION_LIST_CATALOG
||
1865 arg_action
== ACTION_DUMP_CATALOG
) {
1867 _cleanup_free_
char *database
;
1869 database
= path_join(arg_root
, CATALOG_DATABASE
, NULL
);
1875 if (arg_action
== ACTION_UPDATE_CATALOG
) {
1876 r
= catalog_update(database
, arg_root
, catalog_file_dirs
);
1878 log_error_errno(r
, "Failed to list catalog: %m");
1880 bool oneline
= arg_action
== ACTION_LIST_CATALOG
;
1883 r
= catalog_list_items(stdout
, database
,
1884 oneline
, argv
+ optind
);
1886 r
= catalog_list(stdout
, database
, oneline
);
1888 log_error_errno(r
, "Failed to list catalog: %m");
1895 r
= sd_journal_open_directory(&j
, arg_directory
, arg_journal_type
);
1897 r
= sd_journal_open_files(&j
, (const char**) arg_file
, 0);
1898 else if (arg_machine
)
1899 r
= sd_journal_open_container(&j
, arg_machine
, 0);
1901 r
= sd_journal_open(&j
, !arg_merge
*SD_JOURNAL_LOCAL_ONLY
+ arg_journal_type
);
1903 log_error_errno(r
, "Failed to open %s: %m",
1904 arg_directory
? arg_directory
: arg_file
? "files" : "journal");
1908 r
= access_check(j
);
1912 if (arg_action
== ACTION_VERIFY
) {
1917 if (arg_action
== ACTION_PRINT_HEADER
) {
1918 journal_print_header(j
);
1923 if (arg_action
== ACTION_DISK_USAGE
) {
1925 char sbytes
[FORMAT_BYTES_MAX
];
1927 r
= sd_journal_get_usage(j
, &bytes
);
1931 printf("Archived and active journals take up %s on disk.\n",
1932 format_bytes(sbytes
, sizeof(sbytes
), bytes
));
1936 if (arg_action
== ACTION_VACUUM
) {
1940 HASHMAP_FOREACH(d
, j
->directories_by_path
, i
) {
1946 q
= journal_directory_vacuum(d
->path
, arg_vacuum_size
, arg_vacuum_n_files
, arg_vacuum_time
, NULL
, true);
1948 log_error_errno(q
, "Failed to vacuum %s: %m", d
->path
);
1956 if (arg_action
== ACTION_LIST_BOOTS
) {
1961 /* add_boot() must be called first!
1962 * It may need to seek the journal to find parent boot IDs. */
1973 log_error_errno(r
, "Failed to add filter for units: %m");
1977 r
= add_syslog_identifier(j
);
1979 log_error_errno(r
, "Failed to add filter for syslog identifiers: %m");
1983 r
= add_priorities(j
);
1987 r
= add_matches(j
, argv
+ optind
);
1991 if (_unlikely_(log_get_max_level() >= LOG_DEBUG
)) {
1992 _cleanup_free_
char *filter
;
1994 filter
= journal_make_match_string(j
);
1998 log_debug("Journal filter: %s", filter
);
2005 r
= sd_journal_set_data_threshold(j
, 0);
2007 log_error_errno(r
, "Failed to unset data size threshold: %m");
2011 r
= sd_journal_query_unique(j
, arg_field
);
2013 log_error_errno(r
, "Failed to query unique data objects: %m");
2017 SD_JOURNAL_FOREACH_UNIQUE(j
, data
, size
) {
2020 if (arg_lines
>= 0 && n_shown
>= arg_lines
)
2023 eq
= memchr(data
, '=', size
);
2025 printf("%.*s\n", (int) (size
- ((const uint8_t*) eq
- (const uint8_t*) data
+ 1)), (const char*) eq
+ 1);
2027 printf("%.*s\n", (int) size
, (const char*) data
);
2036 /* Opening the fd now means the first sd_journal_wait() will actually wait */
2038 r
= sd_journal_get_fd(j
);
2040 log_error_errno(r
, "Failed to get journal fd: %m");
2045 if (arg_cursor
|| arg_after_cursor
) {
2046 r
= sd_journal_seek_cursor(j
, arg_cursor
?: arg_after_cursor
);
2048 log_error_errno(r
, "Failed to seek to cursor: %m");
2053 r
= sd_journal_next_skip(j
, 1 + !!arg_after_cursor
);
2055 r
= sd_journal_previous_skip(j
, 1 + !!arg_after_cursor
);
2057 if (arg_after_cursor
&& r
< 2) {
2058 /* We couldn't find the next entry after the cursor. */
2065 } else if (arg_since_set
&& !arg_reverse
) {
2066 r
= sd_journal_seek_realtime_usec(j
, arg_since
);
2068 log_error_errno(r
, "Failed to seek to date: %m");
2071 r
= sd_journal_next(j
);
2073 } else if (arg_until_set
&& arg_reverse
) {
2074 r
= sd_journal_seek_realtime_usec(j
, arg_until
);
2076 log_error_errno(r
, "Failed to seek to date: %m");
2079 r
= sd_journal_previous(j
);
2081 } else if (arg_lines
>= 0) {
2082 r
= sd_journal_seek_tail(j
);
2084 log_error_errno(r
, "Failed to seek to tail: %m");
2088 r
= sd_journal_previous_skip(j
, arg_lines
);
2090 } else if (arg_reverse
) {
2091 r
= sd_journal_seek_tail(j
);
2093 log_error_errno(r
, "Failed to seek to tail: %m");
2097 r
= sd_journal_previous(j
);
2100 r
= sd_journal_seek_head(j
);
2102 log_error_errno(r
, "Failed to seek to head: %m");
2106 r
= sd_journal_next(j
);
2110 log_error_errno(r
, "Failed to iterate through journal: %m");
2117 printf("-- No entries --\n");
2123 pager_open_if_enabled();
2127 char start_buf
[FORMAT_TIMESTAMP_MAX
], end_buf
[FORMAT_TIMESTAMP_MAX
];
2129 r
= sd_journal_get_cutoff_realtime_usec(j
, &start
, &end
);
2131 log_error_errno(r
, "Failed to get cutoff: %m");
2137 printf("-- Logs begin at %s. --\n",
2138 format_timestamp_maybe_utc(start_buf
, sizeof(start_buf
), start
));
2140 printf("-- Logs begin at %s, end at %s. --\n",
2141 format_timestamp_maybe_utc(start_buf
, sizeof(start_buf
), start
),
2142 format_timestamp_maybe_utc(end_buf
, sizeof(end_buf
), end
));
2147 while (arg_lines
< 0 || n_shown
< arg_lines
|| (arg_follow
&& !first_line
)) {
2152 r
= sd_journal_next(j
);
2154 r
= sd_journal_previous(j
);
2156 log_error_errno(r
, "Failed to iterate through journal: %m");
2163 if (arg_until_set
&& !arg_reverse
) {
2166 r
= sd_journal_get_realtime_usec(j
, &usec
);
2168 log_error_errno(r
, "Failed to determine timestamp: %m");
2171 if (usec
> arg_until
)
2175 if (arg_since_set
&& arg_reverse
) {
2178 r
= sd_journal_get_realtime_usec(j
, &usec
);
2180 log_error_errno(r
, "Failed to determine timestamp: %m");
2183 if (usec
< arg_since
)
2187 if (!arg_merge
&& !arg_quiet
) {
2190 r
= sd_journal_get_monotonic_usec(j
, NULL
, &boot_id
);
2192 if (previous_boot_id_valid
&&
2193 !sd_id128_equal(boot_id
, previous_boot_id
))
2194 printf("%s-- Reboot --%s\n",
2195 ansi_highlight(), ansi_normal());
2197 previous_boot_id
= boot_id
;
2198 previous_boot_id_valid
= true;
2203 arg_all
* OUTPUT_SHOW_ALL
|
2204 arg_full
* OUTPUT_FULL_WIDTH
|
2205 on_tty() * OUTPUT_COLOR
|
2206 arg_catalog
* OUTPUT_CATALOG
|
2207 arg_utc
* OUTPUT_UTC
;
2209 r
= output_journal(stdout
, j
, arg_output
, 0, flags
, &ellipsized
);
2211 if (r
== -EADDRNOTAVAIL
)
2213 else if (r
< 0 || ferror(stdout
))
2220 if (arg_show_cursor
) {
2221 _cleanup_free_
char *cursor
= NULL
;
2223 r
= sd_journal_get_cursor(j
, &cursor
);
2224 if (r
< 0 && r
!= -EADDRNOTAVAIL
)
2225 log_error_errno(r
, "Failed to get cursor: %m");
2227 printf("-- cursor: %s\n", cursor
);
2233 r
= sd_journal_wait(j
, (uint64_t) -1);
2235 log_error_errno(r
, "Couldn't wait for journal event: %m");
2245 strv_free(arg_file
);
2247 strv_free(arg_syslog_identifier
);
2248 strv_free(arg_system_units
);
2249 strv_free(arg_user_units
);
2251 return r
< 0 ? EXIT_FAILURE
: EXIT_SUCCESS
;