]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/journal/journalctl.c
util-lib: move a number of fs operations into fs-util.[ch]
[thirdparty/systemd.git] / src / journal / journalctl.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3 /***
4 This file is part of systemd.
5
6 Copyright 2011 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
17
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <errno.h>
23 #include <fcntl.h>
24 #include <fnmatch.h>
25 #include <getopt.h>
26 #include <linux/fs.h>
27 #include <locale.h>
28 #include <poll.h>
29 #include <signal.h>
30 #include <stddef.h>
31 #include <stdio.h>
32 #include <stdlib.h>
33 #include <string.h>
34 #include <sys/inotify.h>
35 #include <sys/stat.h>
36 #include <unistd.h>
37
38 #include "sd-bus.h"
39 #include "sd-journal.h"
40
41 #include "acl-util.h"
42 #include "bus-error.h"
43 #include "bus-util.h"
44 #include "catalog.h"
45 #include "chattr-util.h"
46 #include "fd-util.h"
47 #include "fileio.h"
48 #include "fs-util.h"
49 #include "fsprg.h"
50 #include "hostname-util.h"
51 #include "io-util.h"
52 #include "journal-def.h"
53 #include "journal-internal.h"
54 #include "journal-qrcode.h"
55 #include "journal-vacuum.h"
56 #include "journal-verify.h"
57 #include "log.h"
58 #include "logs-show.h"
59 #include "mkdir.h"
60 #include "pager.h"
61 #include "parse-util.h"
62 #include "path-util.h"
63 #include "rlimit-util.h"
64 #include "set.h"
65 #include "sigbus.h"
66 #include "strv.h"
67 #include "terminal-util.h"
68 #include "unit-name.h"
69 #include "user-util.h"
70
71 #define DEFAULT_FSS_INTERVAL_USEC (15*USEC_PER_MINUTE)
72
73 enum {
74 /* Special values for arg_lines */
75 ARG_LINES_DEFAULT = -2,
76 ARG_LINES_ALL = -1,
77 };
78
79 static OutputMode arg_output = OUTPUT_SHORT;
80 static bool arg_utc = false;
81 static bool arg_pager_end = false;
82 static bool arg_follow = false;
83 static bool arg_full = true;
84 static bool arg_all = false;
85 static bool arg_no_pager = false;
86 static int arg_lines = ARG_LINES_DEFAULT;
87 static bool arg_no_tail = false;
88 static bool arg_quiet = false;
89 static bool arg_merge = false;
90 static bool arg_boot = false;
91 static sd_id128_t arg_boot_id = {};
92 static int arg_boot_offset = 0;
93 static bool arg_dmesg = false;
94 static const char *arg_cursor = NULL;
95 static const char *arg_after_cursor = NULL;
96 static bool arg_show_cursor = false;
97 static const char *arg_directory = NULL;
98 static char **arg_file = NULL;
99 static int arg_priorities = 0xFF;
100 static const char *arg_verify_key = NULL;
101 #ifdef HAVE_GCRYPT
102 static usec_t arg_interval = DEFAULT_FSS_INTERVAL_USEC;
103 static bool arg_force = false;
104 #endif
105 static usec_t arg_since, arg_until;
106 static bool arg_since_set = false, arg_until_set = false;
107 static char **arg_syslog_identifier = NULL;
108 static char **arg_system_units = NULL;
109 static char **arg_user_units = NULL;
110 static const char *arg_field = NULL;
111 static bool arg_catalog = false;
112 static bool arg_reverse = false;
113 static int arg_journal_type = 0;
114 static char *arg_root = NULL;
115 static const char *arg_machine = NULL;
116 static uint64_t arg_vacuum_size = 0;
117 static uint64_t arg_vacuum_n_files = 0;
118 static usec_t arg_vacuum_time = 0;
119
120 static enum {
121 ACTION_SHOW,
122 ACTION_NEW_ID128,
123 ACTION_PRINT_HEADER,
124 ACTION_SETUP_KEYS,
125 ACTION_VERIFY,
126 ACTION_DISK_USAGE,
127 ACTION_LIST_CATALOG,
128 ACTION_DUMP_CATALOG,
129 ACTION_UPDATE_CATALOG,
130 ACTION_LIST_BOOTS,
131 ACTION_FLUSH,
132 ACTION_ROTATE,
133 ACTION_VACUUM,
134 } arg_action = ACTION_SHOW;
135
136 typedef struct BootId {
137 sd_id128_t id;
138 uint64_t first;
139 uint64_t last;
140 LIST_FIELDS(struct BootId, boot_list);
141 } BootId;
142
143 static void pager_open_if_enabled(void) {
144
145 if (arg_no_pager)
146 return;
147
148 pager_open(arg_pager_end);
149 }
150
151 static char *format_timestamp_maybe_utc(char *buf, size_t l, usec_t t) {
152
153 if (arg_utc)
154 return format_timestamp_utc(buf, l, t);
155
156 return format_timestamp(buf, l, t);
157 }
158
159 static int parse_boot_descriptor(const char *x, sd_id128_t *boot_id, int *offset) {
160 sd_id128_t id = SD_ID128_NULL;
161 int off = 0, r;
162
163 if (strlen(x) >= 32) {
164 char *t;
165
166 t = strndupa(x, 32);
167 r = sd_id128_from_string(t, &id);
168 if (r >= 0)
169 x += 32;
170
171 if (*x != '-' && *x != '+' && *x != 0)
172 return -EINVAL;
173
174 if (*x != 0) {
175 r = safe_atoi(x, &off);
176 if (r < 0)
177 return r;
178 }
179 } else {
180 r = safe_atoi(x, &off);
181 if (r < 0)
182 return r;
183 }
184
185 if (boot_id)
186 *boot_id = id;
187
188 if (offset)
189 *offset = off;
190
191 return 0;
192 }
193
194 static void help(void) {
195
196 pager_open_if_enabled();
197
198 printf("%s [OPTIONS...] [MATCHES...]\n\n"
199 "Query the journal.\n\n"
200 "Flags:\n"
201 " --system Show the system journal\n"
202 " --user Show the user journal for the current user\n"
203 " -M --machine=CONTAINER Operate on local container\n"
204 " -S --since=DATE Show entries not older than the specified date\n"
205 " -U --until=DATE Show entries not newer than the specified date\n"
206 " -c --cursor=CURSOR Show entries starting at the specified cursor\n"
207 " --after-cursor=CURSOR Show entries after the specified cursor\n"
208 " --show-cursor Print the cursor after all the entries\n"
209 " -b --boot[=ID] Show current boot or the specified boot\n"
210 " --list-boots Show terse information about recorded boots\n"
211 " -k --dmesg Show kernel message log from the current boot\n"
212 " -u --unit=UNIT Show logs from the specified unit\n"
213 " --user-unit=UNIT Show logs from the specified user unit\n"
214 " -t --identifier=STRING Show entries with the specified syslog identifier\n"
215 " -p --priority=RANGE Show entries with the specified priority\n"
216 " -e --pager-end Immediately jump to the end in the pager\n"
217 " -f --follow Follow the journal\n"
218 " -n --lines[=INTEGER] Number of journal entries to show\n"
219 " --no-tail Show all lines, even in follow mode\n"
220 " -r --reverse Show the newest entries first\n"
221 " -o --output=STRING Change journal output mode (short, short-iso,\n"
222 " short-precise, short-monotonic, verbose,\n"
223 " export, json, json-pretty, json-sse, cat)\n"
224 " --utc Express time in Coordinated Universal Time (UTC)\n"
225 " -x --catalog Add message explanations where available\n"
226 " --no-full Ellipsize fields\n"
227 " -a --all Show all fields, including long and unprintable\n"
228 " -q --quiet Do not show info messages and privilege warning\n"
229 " --no-pager Do not pipe output into a pager\n"
230 " -m --merge Show entries from all available journals\n"
231 " -D --directory=PATH Show journal files from directory\n"
232 " --file=PATH Show journal file\n"
233 " --root=ROOT Operate on catalog files underneath the root ROOT\n"
234 #ifdef HAVE_GCRYPT
235 " --interval=TIME Time interval for changing the FSS sealing key\n"
236 " --verify-key=KEY Specify FSS verification key\n"
237 " --force Override of the FSS key pair with --setup-keys\n"
238 #endif
239 "\nCommands:\n"
240 " -h --help Show this help text\n"
241 " --version Show package version\n"
242 " -F --field=FIELD List all values that a specified field takes\n"
243 " --new-id128 Generate a new 128-bit ID\n"
244 " --disk-usage Show total disk usage of all journal files\n"
245 " --vacuum-size=BYTES Reduce disk usage below specified size\n"
246 " --vacuum-files=INT Leave only the specified number of journal files\n"
247 " --vacuum-time=TIME Remove journal files older than specified time\n"
248 " --flush Flush all journal data from /run into /var\n"
249 " --rotate Request immediate rotation of the journal files\n"
250 " --header Show journal header information\n"
251 " --list-catalog Show all message IDs in the catalog\n"
252 " --dump-catalog Show entries in the message catalog\n"
253 " --update-catalog Update the message catalog database\n"
254 #ifdef HAVE_GCRYPT
255 " --setup-keys Generate a new FSS key pair\n"
256 " --verify Verify journal file consistency\n"
257 #endif
258 , program_invocation_short_name);
259 }
260
261 static int parse_argv(int argc, char *argv[]) {
262
263 enum {
264 ARG_VERSION = 0x100,
265 ARG_NO_PAGER,
266 ARG_NO_FULL,
267 ARG_NO_TAIL,
268 ARG_NEW_ID128,
269 ARG_LIST_BOOTS,
270 ARG_USER,
271 ARG_SYSTEM,
272 ARG_ROOT,
273 ARG_HEADER,
274 ARG_SETUP_KEYS,
275 ARG_FILE,
276 ARG_INTERVAL,
277 ARG_VERIFY,
278 ARG_VERIFY_KEY,
279 ARG_DISK_USAGE,
280 ARG_AFTER_CURSOR,
281 ARG_SHOW_CURSOR,
282 ARG_USER_UNIT,
283 ARG_LIST_CATALOG,
284 ARG_DUMP_CATALOG,
285 ARG_UPDATE_CATALOG,
286 ARG_FORCE,
287 ARG_UTC,
288 ARG_FLUSH,
289 ARG_ROTATE,
290 ARG_VACUUM_SIZE,
291 ARG_VACUUM_FILES,
292 ARG_VACUUM_TIME,
293 };
294
295 static const struct option options[] = {
296 { "help", no_argument, NULL, 'h' },
297 { "version" , no_argument, NULL, ARG_VERSION },
298 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
299 { "pager-end", no_argument, NULL, 'e' },
300 { "follow", no_argument, NULL, 'f' },
301 { "force", no_argument, NULL, ARG_FORCE },
302 { "output", required_argument, NULL, 'o' },
303 { "all", no_argument, NULL, 'a' },
304 { "full", no_argument, NULL, 'l' },
305 { "no-full", no_argument, NULL, ARG_NO_FULL },
306 { "lines", optional_argument, NULL, 'n' },
307 { "no-tail", no_argument, NULL, ARG_NO_TAIL },
308 { "new-id128", no_argument, NULL, ARG_NEW_ID128 },
309 { "quiet", no_argument, NULL, 'q' },
310 { "merge", no_argument, NULL, 'm' },
311 { "boot", optional_argument, NULL, 'b' },
312 { "list-boots", no_argument, NULL, ARG_LIST_BOOTS },
313 { "this-boot", optional_argument, NULL, 'b' }, /* deprecated */
314 { "dmesg", no_argument, NULL, 'k' },
315 { "system", no_argument, NULL, ARG_SYSTEM },
316 { "user", no_argument, NULL, ARG_USER },
317 { "directory", required_argument, NULL, 'D' },
318 { "file", required_argument, NULL, ARG_FILE },
319 { "root", required_argument, NULL, ARG_ROOT },
320 { "header", no_argument, NULL, ARG_HEADER },
321 { "identifier", required_argument, NULL, 't' },
322 { "priority", required_argument, NULL, 'p' },
323 { "setup-keys", no_argument, NULL, ARG_SETUP_KEYS },
324 { "interval", required_argument, NULL, ARG_INTERVAL },
325 { "verify", no_argument, NULL, ARG_VERIFY },
326 { "verify-key", required_argument, NULL, ARG_VERIFY_KEY },
327 { "disk-usage", no_argument, NULL, ARG_DISK_USAGE },
328 { "cursor", required_argument, NULL, 'c' },
329 { "after-cursor", required_argument, NULL, ARG_AFTER_CURSOR },
330 { "show-cursor", no_argument, NULL, ARG_SHOW_CURSOR },
331 { "since", required_argument, NULL, 'S' },
332 { "until", required_argument, NULL, 'U' },
333 { "unit", required_argument, NULL, 'u' },
334 { "user-unit", required_argument, NULL, ARG_USER_UNIT },
335 { "field", required_argument, NULL, 'F' },
336 { "catalog", no_argument, NULL, 'x' },
337 { "list-catalog", no_argument, NULL, ARG_LIST_CATALOG },
338 { "dump-catalog", no_argument, NULL, ARG_DUMP_CATALOG },
339 { "update-catalog", no_argument, NULL, ARG_UPDATE_CATALOG },
340 { "reverse", no_argument, NULL, 'r' },
341 { "machine", required_argument, NULL, 'M' },
342 { "utc", no_argument, NULL, ARG_UTC },
343 { "flush", no_argument, NULL, ARG_FLUSH },
344 { "rotate", no_argument, NULL, ARG_ROTATE },
345 { "vacuum-size", required_argument, NULL, ARG_VACUUM_SIZE },
346 { "vacuum-files", required_argument, NULL, ARG_VACUUM_FILES },
347 { "vacuum-time", required_argument, NULL, ARG_VACUUM_TIME },
348 {}
349 };
350
351 int c, r;
352
353 assert(argc >= 0);
354 assert(argv);
355
356 while ((c = getopt_long(argc, argv, "hefo:aln::qmb::kD:p:c:S:U:t:u:F:xrM:", options, NULL)) >= 0)
357
358 switch (c) {
359
360 case 'h':
361 help();
362 return 0;
363
364 case ARG_VERSION:
365 return version();
366
367 case ARG_NO_PAGER:
368 arg_no_pager = true;
369 break;
370
371 case 'e':
372 arg_pager_end = true;
373
374 if (arg_lines == ARG_LINES_DEFAULT)
375 arg_lines = 1000;
376
377 break;
378
379 case 'f':
380 arg_follow = true;
381 break;
382
383 case 'o':
384 arg_output = output_mode_from_string(optarg);
385 if (arg_output < 0) {
386 log_error("Unknown output format '%s'.", optarg);
387 return -EINVAL;
388 }
389
390 if (arg_output == OUTPUT_EXPORT ||
391 arg_output == OUTPUT_JSON ||
392 arg_output == OUTPUT_JSON_PRETTY ||
393 arg_output == OUTPUT_JSON_SSE ||
394 arg_output == OUTPUT_CAT)
395 arg_quiet = true;
396
397 break;
398
399 case 'l':
400 arg_full = true;
401 break;
402
403 case ARG_NO_FULL:
404 arg_full = false;
405 break;
406
407 case 'a':
408 arg_all = true;
409 break;
410
411 case 'n':
412 if (optarg) {
413 if (streq(optarg, "all"))
414 arg_lines = ARG_LINES_ALL;
415 else {
416 r = safe_atoi(optarg, &arg_lines);
417 if (r < 0 || arg_lines < 0) {
418 log_error("Failed to parse lines '%s'", optarg);
419 return -EINVAL;
420 }
421 }
422 } else {
423 arg_lines = 10;
424
425 /* Hmm, no argument? Maybe the next
426 * word on the command line is
427 * supposed to be the argument? Let's
428 * see if there is one, and is
429 * parsable. */
430 if (optind < argc) {
431 int n;
432 if (streq(argv[optind], "all")) {
433 arg_lines = ARG_LINES_ALL;
434 optind++;
435 } else if (safe_atoi(argv[optind], &n) >= 0 && n >= 0) {
436 arg_lines = n;
437 optind++;
438 }
439 }
440 }
441
442 break;
443
444 case ARG_NO_TAIL:
445 arg_no_tail = true;
446 break;
447
448 case ARG_NEW_ID128:
449 arg_action = ACTION_NEW_ID128;
450 break;
451
452 case 'q':
453 arg_quiet = true;
454 break;
455
456 case 'm':
457 arg_merge = true;
458 break;
459
460 case 'b':
461 arg_boot = true;
462
463 if (optarg) {
464 r = parse_boot_descriptor(optarg, &arg_boot_id, &arg_boot_offset);
465 if (r < 0) {
466 log_error("Failed to parse boot descriptor '%s'", optarg);
467 return -EINVAL;
468 }
469 } else {
470
471 /* Hmm, no argument? Maybe the next
472 * word on the command line is
473 * supposed to be the argument? Let's
474 * see if there is one and is parsable
475 * as a boot descriptor... */
476
477 if (optind < argc &&
478 parse_boot_descriptor(argv[optind], &arg_boot_id, &arg_boot_offset) >= 0)
479 optind++;
480 }
481
482 break;
483
484 case ARG_LIST_BOOTS:
485 arg_action = ACTION_LIST_BOOTS;
486 break;
487
488 case 'k':
489 arg_boot = arg_dmesg = true;
490 break;
491
492 case ARG_SYSTEM:
493 arg_journal_type |= SD_JOURNAL_SYSTEM;
494 break;
495
496 case ARG_USER:
497 arg_journal_type |= SD_JOURNAL_CURRENT_USER;
498 break;
499
500 case 'M':
501 arg_machine = optarg;
502 break;
503
504 case 'D':
505 arg_directory = optarg;
506 break;
507
508 case ARG_FILE:
509 r = glob_extend(&arg_file, optarg);
510 if (r < 0)
511 return log_error_errno(r, "Failed to add paths: %m");
512 break;
513
514 case ARG_ROOT:
515 r = parse_path_argument_and_warn(optarg, true, &arg_root);
516 if (r < 0)
517 return r;
518 break;
519
520 case 'c':
521 arg_cursor = optarg;
522 break;
523
524 case ARG_AFTER_CURSOR:
525 arg_after_cursor = optarg;
526 break;
527
528 case ARG_SHOW_CURSOR:
529 arg_show_cursor = true;
530 break;
531
532 case ARG_HEADER:
533 arg_action = ACTION_PRINT_HEADER;
534 break;
535
536 case ARG_VERIFY:
537 arg_action = ACTION_VERIFY;
538 break;
539
540 case ARG_DISK_USAGE:
541 arg_action = ACTION_DISK_USAGE;
542 break;
543
544 case ARG_VACUUM_SIZE:
545 r = parse_size(optarg, 1024, &arg_vacuum_size);
546 if (r < 0) {
547 log_error("Failed to parse vacuum size: %s", optarg);
548 return r;
549 }
550
551 arg_action = ACTION_VACUUM;
552 break;
553
554 case ARG_VACUUM_FILES:
555 r = safe_atou64(optarg, &arg_vacuum_n_files);
556 if (r < 0) {
557 log_error("Failed to parse vacuum files: %s", optarg);
558 return r;
559 }
560
561 arg_action = ACTION_VACUUM;
562 break;
563
564 case ARG_VACUUM_TIME:
565 r = parse_sec(optarg, &arg_vacuum_time);
566 if (r < 0) {
567 log_error("Failed to parse vacuum time: %s", optarg);
568 return r;
569 }
570
571 arg_action = ACTION_VACUUM;
572 break;
573
574 #ifdef HAVE_GCRYPT
575 case ARG_FORCE:
576 arg_force = true;
577 break;
578
579 case ARG_SETUP_KEYS:
580 arg_action = ACTION_SETUP_KEYS;
581 break;
582
583
584 case ARG_VERIFY_KEY:
585 arg_action = ACTION_VERIFY;
586 arg_verify_key = optarg;
587 arg_merge = false;
588 break;
589
590 case ARG_INTERVAL:
591 r = parse_sec(optarg, &arg_interval);
592 if (r < 0 || arg_interval <= 0) {
593 log_error("Failed to parse sealing key change interval: %s", optarg);
594 return -EINVAL;
595 }
596 break;
597 #else
598 case ARG_SETUP_KEYS:
599 case ARG_VERIFY_KEY:
600 case ARG_INTERVAL:
601 case ARG_FORCE:
602 log_error("Forward-secure sealing not available.");
603 return -EOPNOTSUPP;
604 #endif
605
606 case 'p': {
607 const char *dots;
608
609 dots = strstr(optarg, "..");
610 if (dots) {
611 char *a;
612 int from, to, i;
613
614 /* a range */
615 a = strndup(optarg, dots - optarg);
616 if (!a)
617 return log_oom();
618
619 from = log_level_from_string(a);
620 to = log_level_from_string(dots + 2);
621 free(a);
622
623 if (from < 0 || to < 0) {
624 log_error("Failed to parse log level range %s", optarg);
625 return -EINVAL;
626 }
627
628 arg_priorities = 0;
629
630 if (from < to) {
631 for (i = from; i <= to; i++)
632 arg_priorities |= 1 << i;
633 } else {
634 for (i = to; i <= from; i++)
635 arg_priorities |= 1 << i;
636 }
637
638 } else {
639 int p, i;
640
641 p = log_level_from_string(optarg);
642 if (p < 0) {
643 log_error("Unknown log level %s", optarg);
644 return -EINVAL;
645 }
646
647 arg_priorities = 0;
648
649 for (i = 0; i <= p; i++)
650 arg_priorities |= 1 << i;
651 }
652
653 break;
654 }
655
656 case 'S':
657 r = parse_timestamp(optarg, &arg_since);
658 if (r < 0) {
659 log_error("Failed to parse timestamp: %s", optarg);
660 return -EINVAL;
661 }
662 arg_since_set = true;
663 break;
664
665 case 'U':
666 r = parse_timestamp(optarg, &arg_until);
667 if (r < 0) {
668 log_error("Failed to parse timestamp: %s", optarg);
669 return -EINVAL;
670 }
671 arg_until_set = true;
672 break;
673
674 case 't':
675 r = strv_extend(&arg_syslog_identifier, optarg);
676 if (r < 0)
677 return log_oom();
678 break;
679
680 case 'u':
681 r = strv_extend(&arg_system_units, optarg);
682 if (r < 0)
683 return log_oom();
684 break;
685
686 case ARG_USER_UNIT:
687 r = strv_extend(&arg_user_units, optarg);
688 if (r < 0)
689 return log_oom();
690 break;
691
692 case 'F':
693 arg_field = optarg;
694 break;
695
696 case 'x':
697 arg_catalog = true;
698 break;
699
700 case ARG_LIST_CATALOG:
701 arg_action = ACTION_LIST_CATALOG;
702 break;
703
704 case ARG_DUMP_CATALOG:
705 arg_action = ACTION_DUMP_CATALOG;
706 break;
707
708 case ARG_UPDATE_CATALOG:
709 arg_action = ACTION_UPDATE_CATALOG;
710 break;
711
712 case 'r':
713 arg_reverse = true;
714 break;
715
716 case ARG_UTC:
717 arg_utc = true;
718 break;
719
720 case ARG_FLUSH:
721 arg_action = ACTION_FLUSH;
722 break;
723
724 case ARG_ROTATE:
725 arg_action = ACTION_ROTATE;
726 break;
727
728 case '?':
729 return -EINVAL;
730
731 default:
732 assert_not_reached("Unhandled option");
733 }
734
735 if (arg_follow && !arg_no_tail && !arg_since && arg_lines == ARG_LINES_DEFAULT)
736 arg_lines = 10;
737
738 if (!!arg_directory + !!arg_file + !!arg_machine > 1) {
739 log_error("Please specify either -D/--directory= or --file= or -M/--machine=, not more than one.");
740 return -EINVAL;
741 }
742
743 if (arg_since_set && arg_until_set && arg_since > arg_until) {
744 log_error("--since= must be before --until=.");
745 return -EINVAL;
746 }
747
748 if (!!arg_cursor + !!arg_after_cursor + !!arg_since_set > 1) {
749 log_error("Please specify only one of --since=, --cursor=, and --after-cursor.");
750 return -EINVAL;
751 }
752
753 if (arg_follow && arg_reverse) {
754 log_error("Please specify either --reverse= or --follow=, not both.");
755 return -EINVAL;
756 }
757
758 if (!IN_SET(arg_action, ACTION_SHOW, ACTION_DUMP_CATALOG, ACTION_LIST_CATALOG) && optind < argc) {
759 log_error("Extraneous arguments starting with '%s'", argv[optind]);
760 return -EINVAL;
761 }
762
763 if ((arg_boot || arg_action == ACTION_LIST_BOOTS) && (arg_file || arg_directory || arg_merge)) {
764 log_error("Using --boot or --list-boots with --file, --directory or --merge is not supported.");
765 return -EINVAL;
766 }
767
768 return 1;
769 }
770
771 static int generate_new_id128(void) {
772 sd_id128_t id;
773 int r;
774 unsigned i;
775
776 r = sd_id128_randomize(&id);
777 if (r < 0)
778 return log_error_errno(r, "Failed to generate ID: %m");
779
780 printf("As string:\n"
781 SD_ID128_FORMAT_STR "\n\n"
782 "As UUID:\n"
783 "%02x%02x%02x%02x-%02x%02x-%02x%02x-%02x%02x-%02x%02x%02x%02x%02x%02x\n\n"
784 "As macro:\n"
785 "#define MESSAGE_XYZ SD_ID128_MAKE(",
786 SD_ID128_FORMAT_VAL(id),
787 SD_ID128_FORMAT_VAL(id));
788 for (i = 0; i < 16; i++)
789 printf("%02x%s", id.bytes[i], i != 15 ? "," : "");
790 fputs(")\n\n", stdout);
791
792 printf("As Python constant:\n"
793 ">>> import uuid\n"
794 ">>> MESSAGE_XYZ = uuid.UUID('" SD_ID128_FORMAT_STR "')\n",
795 SD_ID128_FORMAT_VAL(id));
796
797 return 0;
798 }
799
800 static int add_matches(sd_journal *j, char **args) {
801 char **i;
802 bool have_term = false;
803
804 assert(j);
805
806 STRV_FOREACH(i, args) {
807 int r;
808
809 if (streq(*i, "+")) {
810 if (!have_term)
811 break;
812 r = sd_journal_add_disjunction(j);
813 have_term = false;
814
815 } else if (path_is_absolute(*i)) {
816 _cleanup_free_ char *p, *t = NULL, *t2 = NULL;
817 const char *path;
818 _cleanup_free_ char *interpreter = NULL;
819 struct stat st;
820
821 p = canonicalize_file_name(*i);
822 path = p ? p : *i;
823
824 if (lstat(path, &st) < 0)
825 return log_error_errno(errno, "Couldn't stat file: %m");
826
827 if (S_ISREG(st.st_mode) && (0111 & st.st_mode)) {
828 if (executable_is_script(path, &interpreter) > 0) {
829 _cleanup_free_ char *comm;
830
831 comm = strndup(basename(path), 15);
832 if (!comm)
833 return log_oom();
834
835 t = strappend("_COMM=", comm);
836
837 /* Append _EXE only if the interpreter is not a link.
838 Otherwise, it might be outdated often. */
839 if (lstat(interpreter, &st) == 0 &&
840 !S_ISLNK(st.st_mode)) {
841 t2 = strappend("_EXE=", interpreter);
842 if (!t2)
843 return log_oom();
844 }
845 } else
846 t = strappend("_EXE=", path);
847 } else if (S_ISCHR(st.st_mode))
848 (void) asprintf(&t, "_KERNEL_DEVICE=c%u:%u", major(st.st_rdev), minor(st.st_rdev));
849 else if (S_ISBLK(st.st_mode))
850 (void) asprintf(&t, "_KERNEL_DEVICE=b%u:%u", major(st.st_rdev), minor(st.st_rdev));
851 else {
852 log_error("File is neither a device node, nor regular file, nor executable: %s", *i);
853 return -EINVAL;
854 }
855
856 if (!t)
857 return log_oom();
858
859 r = sd_journal_add_match(j, t, 0);
860 if (t2)
861 r = sd_journal_add_match(j, t2, 0);
862 have_term = true;
863
864 } else {
865 r = sd_journal_add_match(j, *i, 0);
866 have_term = true;
867 }
868
869 if (r < 0)
870 return log_error_errno(r, "Failed to add match '%s': %m", *i);
871 }
872
873 if (!strv_isempty(args) && !have_term) {
874 log_error("\"+\" can only be used between terms");
875 return -EINVAL;
876 }
877
878 return 0;
879 }
880
881 static void boot_id_free_all(BootId *l) {
882
883 while (l) {
884 BootId *i = l;
885 LIST_REMOVE(boot_list, l, i);
886 free(i);
887 }
888 }
889
890 static int discover_next_boot(
891 sd_journal *j,
892 BootId **boot,
893 bool advance_older,
894 bool read_realtime) {
895
896 int r;
897 char match[9+32+1] = "_BOOT_ID=";
898 _cleanup_free_ BootId *next_boot = NULL;
899
900 assert(j);
901 assert(boot);
902
903 /* We expect the journal to be on the last position of a boot
904 * (in relation to the direction we are going), so that the next
905 * invocation of sd_journal_next/previous will be from a different
906 * boot. We then collect any information we desire and then jump
907 * to the last location of the new boot by using a _BOOT_ID match
908 * coming from the other journal direction. */
909
910 /* Make sure we aren't restricted by any _BOOT_ID matches, so that
911 * we can actually advance to a *different* boot. */
912 sd_journal_flush_matches(j);
913
914 if (advance_older)
915 r = sd_journal_previous(j);
916 else
917 r = sd_journal_next(j);
918 if (r < 0)
919 return r;
920 else if (r == 0)
921 return 0; /* End of journal, yay. */
922
923 next_boot = new0(BootId, 1);
924 if (!next_boot)
925 return -ENOMEM;
926
927 r = sd_journal_get_monotonic_usec(j, NULL, &next_boot->id);
928 if (r < 0)
929 return r;
930
931 if (read_realtime) {
932 r = sd_journal_get_realtime_usec(j, &next_boot->first);
933 if (r < 0)
934 return r;
935 }
936
937 /* Now seek to the last occurrence of this boot ID. */
938 sd_id128_to_string(next_boot->id, match + 9);
939 r = sd_journal_add_match(j, match, sizeof(match) - 1);
940 if (r < 0)
941 return r;
942
943 if (advance_older)
944 r = sd_journal_seek_head(j);
945 else
946 r = sd_journal_seek_tail(j);
947 if (r < 0)
948 return r;
949
950 if (advance_older)
951 r = sd_journal_next(j);
952 else
953 r = sd_journal_previous(j);
954 if (r < 0)
955 return r;
956 else if (r == 0)
957 return -ENODATA; /* This shouldn't happen. We just came from this very boot ID. */
958
959 if (read_realtime) {
960 r = sd_journal_get_realtime_usec(j, &next_boot->last);
961 if (r < 0)
962 return r;
963 }
964
965 *boot = next_boot;
966 next_boot = NULL;
967
968 return 0;
969 }
970
971 static int get_boots(
972 sd_journal *j,
973 BootId **boots,
974 BootId *query_ref_boot,
975 int ref_boot_offset) {
976
977 bool skip_once;
978 int r, count = 0;
979 BootId *head = NULL, *tail = NULL;
980 const bool advance_older = query_ref_boot && ref_boot_offset <= 0;
981
982 assert(j);
983
984 /* Adjust for the asymmetry that offset 0 is
985 * the last (and current) boot, while 1 is considered the
986 * (chronological) first boot in the journal. */
987 skip_once = query_ref_boot && sd_id128_is_null(query_ref_boot->id) && ref_boot_offset < 0;
988
989 /* Advance to the earliest/latest occurrence of our reference
990 * boot ID (taking our lookup direction into account), so that
991 * discover_next_boot() can do its job.
992 * If no reference is given, the journal head/tail will do,
993 * they're "virtual" boots after all. */
994 if (query_ref_boot && !sd_id128_is_null(query_ref_boot->id)) {
995 char match[9+32+1] = "_BOOT_ID=";
996
997 sd_journal_flush_matches(j);
998
999 sd_id128_to_string(query_ref_boot->id, match + 9);
1000 r = sd_journal_add_match(j, match, sizeof(match) - 1);
1001 if (r < 0)
1002 return r;
1003
1004 if (advance_older)
1005 r = sd_journal_seek_head(j);
1006 else
1007 r = sd_journal_seek_tail(j);
1008 if (r < 0)
1009 return r;
1010
1011 if (advance_older)
1012 r = sd_journal_next(j);
1013 else
1014 r = sd_journal_previous(j);
1015 if (r < 0)
1016 return r;
1017 else if (r == 0)
1018 goto finish;
1019 else if (ref_boot_offset == 0) {
1020 count = 1;
1021 goto finish;
1022 }
1023 } else {
1024 if (advance_older)
1025 r = sd_journal_seek_tail(j);
1026 else
1027 r = sd_journal_seek_head(j);
1028 if (r < 0)
1029 return r;
1030
1031 /* No sd_journal_next/previous here. */
1032 }
1033
1034 for (;;) {
1035 _cleanup_free_ BootId *current = NULL;
1036
1037 r = discover_next_boot(j, &current, advance_older, !query_ref_boot);
1038 if (r < 0) {
1039 boot_id_free_all(head);
1040 return r;
1041 }
1042
1043 if (!current)
1044 break;
1045
1046 if (query_ref_boot) {
1047 if (!skip_once)
1048 ref_boot_offset += advance_older ? 1 : -1;
1049 skip_once = false;
1050
1051 if (ref_boot_offset == 0) {
1052 count = 1;
1053 query_ref_boot->id = current->id;
1054 break;
1055 }
1056 } else {
1057 LIST_INSERT_AFTER(boot_list, head, tail, current);
1058 tail = current;
1059 current = NULL;
1060 count++;
1061 }
1062 }
1063
1064 finish:
1065 if (boots)
1066 *boots = head;
1067
1068 sd_journal_flush_matches(j);
1069
1070 return count;
1071 }
1072
1073 static int list_boots(sd_journal *j) {
1074 int w, i, count;
1075 BootId *id, *all_ids;
1076
1077 assert(j);
1078
1079 count = get_boots(j, &all_ids, NULL, 0);
1080 if (count < 0)
1081 return log_error_errno(count, "Failed to determine boots: %m");
1082 if (count == 0)
1083 return count;
1084
1085 pager_open_if_enabled();
1086
1087 /* numbers are one less, but we need an extra char for the sign */
1088 w = DECIMAL_STR_WIDTH(count - 1) + 1;
1089
1090 i = 0;
1091 LIST_FOREACH(boot_list, id, all_ids) {
1092 char a[FORMAT_TIMESTAMP_MAX], b[FORMAT_TIMESTAMP_MAX];
1093
1094 printf("% *i " SD_ID128_FORMAT_STR " %s—%s\n",
1095 w, i - count + 1,
1096 SD_ID128_FORMAT_VAL(id->id),
1097 format_timestamp_maybe_utc(a, sizeof(a), id->first),
1098 format_timestamp_maybe_utc(b, sizeof(b), id->last));
1099 i++;
1100 }
1101
1102 boot_id_free_all(all_ids);
1103
1104 return 0;
1105 }
1106
1107 static int add_boot(sd_journal *j) {
1108 char match[9+32+1] = "_BOOT_ID=";
1109 int r;
1110 BootId ref_boot_id = {};
1111
1112 assert(j);
1113
1114 if (!arg_boot)
1115 return 0;
1116
1117 if (arg_boot_offset == 0 && sd_id128_equal(arg_boot_id, SD_ID128_NULL))
1118 return add_match_this_boot(j, arg_machine);
1119
1120 ref_boot_id.id = arg_boot_id;
1121 r = get_boots(j, NULL, &ref_boot_id, arg_boot_offset);
1122 assert(r <= 1);
1123 if (r <= 0) {
1124 const char *reason = (r == 0) ? "No such boot ID in journal" : strerror(-r);
1125
1126 if (sd_id128_is_null(arg_boot_id))
1127 log_error("Failed to look up boot %+i: %s", arg_boot_offset, reason);
1128 else
1129 log_error("Failed to look up boot ID "SD_ID128_FORMAT_STR"%+i: %s",
1130 SD_ID128_FORMAT_VAL(arg_boot_id), arg_boot_offset, reason);
1131
1132 return r == 0 ? -ENODATA : r;
1133 }
1134
1135 sd_id128_to_string(ref_boot_id.id, match + 9);
1136
1137 r = sd_journal_add_match(j, match, sizeof(match) - 1);
1138 if (r < 0)
1139 return log_error_errno(r, "Failed to add match: %m");
1140
1141 r = sd_journal_add_conjunction(j);
1142 if (r < 0)
1143 return log_error_errno(r, "Failed to add conjunction: %m");
1144
1145 return 0;
1146 }
1147
1148 static int add_dmesg(sd_journal *j) {
1149 int r;
1150 assert(j);
1151
1152 if (!arg_dmesg)
1153 return 0;
1154
1155 r = sd_journal_add_match(j, "_TRANSPORT=kernel", strlen("_TRANSPORT=kernel"));
1156 if (r < 0)
1157 return log_error_errno(r, "Failed to add match: %m");
1158
1159 r = sd_journal_add_conjunction(j);
1160 if (r < 0)
1161 return log_error_errno(r, "Failed to add conjunction: %m");
1162
1163 return 0;
1164 }
1165
1166 static int get_possible_units(
1167 sd_journal *j,
1168 const char *fields,
1169 char **patterns,
1170 Set **units) {
1171
1172 _cleanup_set_free_free_ Set *found;
1173 const char *field;
1174 int r;
1175
1176 found = set_new(&string_hash_ops);
1177 if (!found)
1178 return -ENOMEM;
1179
1180 NULSTR_FOREACH(field, fields) {
1181 const void *data;
1182 size_t size;
1183
1184 r = sd_journal_query_unique(j, field);
1185 if (r < 0)
1186 return r;
1187
1188 SD_JOURNAL_FOREACH_UNIQUE(j, data, size) {
1189 char **pattern, *eq;
1190 size_t prefix;
1191 _cleanup_free_ char *u = NULL;
1192
1193 eq = memchr(data, '=', size);
1194 if (eq)
1195 prefix = eq - (char*) data + 1;
1196 else
1197 prefix = 0;
1198
1199 u = strndup((char*) data + prefix, size - prefix);
1200 if (!u)
1201 return -ENOMEM;
1202
1203 STRV_FOREACH(pattern, patterns)
1204 if (fnmatch(*pattern, u, FNM_NOESCAPE) == 0) {
1205 log_debug("Matched %s with pattern %s=%s", u, field, *pattern);
1206
1207 r = set_consume(found, u);
1208 u = NULL;
1209 if (r < 0 && r != -EEXIST)
1210 return r;
1211
1212 break;
1213 }
1214 }
1215 }
1216
1217 *units = found;
1218 found = NULL;
1219 return 0;
1220 }
1221
1222 /* This list is supposed to return the superset of unit names
1223 * possibly matched by rules added with add_matches_for_unit... */
1224 #define SYSTEM_UNITS \
1225 "_SYSTEMD_UNIT\0" \
1226 "COREDUMP_UNIT\0" \
1227 "UNIT\0" \
1228 "OBJECT_SYSTEMD_UNIT\0" \
1229 "_SYSTEMD_SLICE\0"
1230
1231 /* ... and add_matches_for_user_unit */
1232 #define USER_UNITS \
1233 "_SYSTEMD_USER_UNIT\0" \
1234 "USER_UNIT\0" \
1235 "COREDUMP_USER_UNIT\0" \
1236 "OBJECT_SYSTEMD_USER_UNIT\0"
1237
1238 static int add_units(sd_journal *j) {
1239 _cleanup_strv_free_ char **patterns = NULL;
1240 int r, count = 0;
1241 char **i;
1242
1243 assert(j);
1244
1245 STRV_FOREACH(i, arg_system_units) {
1246 _cleanup_free_ char *u = NULL;
1247
1248 r = unit_name_mangle(*i, UNIT_NAME_GLOB, &u);
1249 if (r < 0)
1250 return r;
1251
1252 if (string_is_glob(u)) {
1253 r = strv_push(&patterns, u);
1254 if (r < 0)
1255 return r;
1256 u = NULL;
1257 } else {
1258 r = add_matches_for_unit(j, u);
1259 if (r < 0)
1260 return r;
1261 r = sd_journal_add_disjunction(j);
1262 if (r < 0)
1263 return r;
1264 count ++;
1265 }
1266 }
1267
1268 if (!strv_isempty(patterns)) {
1269 _cleanup_set_free_free_ Set *units = NULL;
1270 Iterator it;
1271 char *u;
1272
1273 r = get_possible_units(j, SYSTEM_UNITS, patterns, &units);
1274 if (r < 0)
1275 return r;
1276
1277 SET_FOREACH(u, units, it) {
1278 r = add_matches_for_unit(j, u);
1279 if (r < 0)
1280 return r;
1281 r = sd_journal_add_disjunction(j);
1282 if (r < 0)
1283 return r;
1284 count ++;
1285 }
1286 }
1287
1288 patterns = strv_free(patterns);
1289
1290 STRV_FOREACH(i, arg_user_units) {
1291 _cleanup_free_ char *u = NULL;
1292
1293 r = unit_name_mangle(*i, UNIT_NAME_GLOB, &u);
1294 if (r < 0)
1295 return r;
1296
1297 if (string_is_glob(u)) {
1298 r = strv_push(&patterns, u);
1299 if (r < 0)
1300 return r;
1301 u = NULL;
1302 } else {
1303 r = add_matches_for_user_unit(j, u, getuid());
1304 if (r < 0)
1305 return r;
1306 r = sd_journal_add_disjunction(j);
1307 if (r < 0)
1308 return r;
1309 count ++;
1310 }
1311 }
1312
1313 if (!strv_isempty(patterns)) {
1314 _cleanup_set_free_free_ Set *units = NULL;
1315 Iterator it;
1316 char *u;
1317
1318 r = get_possible_units(j, USER_UNITS, patterns, &units);
1319 if (r < 0)
1320 return r;
1321
1322 SET_FOREACH(u, units, it) {
1323 r = add_matches_for_user_unit(j, u, getuid());
1324 if (r < 0)
1325 return r;
1326 r = sd_journal_add_disjunction(j);
1327 if (r < 0)
1328 return r;
1329 count ++;
1330 }
1331 }
1332
1333 /* Complain if the user request matches but nothing whatsoever was
1334 * found, since otherwise everything would be matched. */
1335 if (!(strv_isempty(arg_system_units) && strv_isempty(arg_user_units)) && count == 0)
1336 return -ENODATA;
1337
1338 r = sd_journal_add_conjunction(j);
1339 if (r < 0)
1340 return r;
1341
1342 return 0;
1343 }
1344
1345 static int add_priorities(sd_journal *j) {
1346 char match[] = "PRIORITY=0";
1347 int i, r;
1348 assert(j);
1349
1350 if (arg_priorities == 0xFF)
1351 return 0;
1352
1353 for (i = LOG_EMERG; i <= LOG_DEBUG; i++)
1354 if (arg_priorities & (1 << i)) {
1355 match[sizeof(match)-2] = '0' + i;
1356
1357 r = sd_journal_add_match(j, match, strlen(match));
1358 if (r < 0)
1359 return log_error_errno(r, "Failed to add match: %m");
1360 }
1361
1362 r = sd_journal_add_conjunction(j);
1363 if (r < 0)
1364 return log_error_errno(r, "Failed to add conjunction: %m");
1365
1366 return 0;
1367 }
1368
1369
1370 static int add_syslog_identifier(sd_journal *j) {
1371 int r;
1372 char **i;
1373
1374 assert(j);
1375
1376 STRV_FOREACH(i, arg_syslog_identifier) {
1377 char *u;
1378
1379 u = strjoina("SYSLOG_IDENTIFIER=", *i);
1380 r = sd_journal_add_match(j, u, 0);
1381 if (r < 0)
1382 return r;
1383 r = sd_journal_add_disjunction(j);
1384 if (r < 0)
1385 return r;
1386 }
1387
1388 r = sd_journal_add_conjunction(j);
1389 if (r < 0)
1390 return r;
1391
1392 return 0;
1393 }
1394
1395 static int setup_keys(void) {
1396 #ifdef HAVE_GCRYPT
1397 size_t mpk_size, seed_size, state_size, i;
1398 uint8_t *mpk, *seed, *state;
1399 int fd = -1, r;
1400 sd_id128_t machine, boot;
1401 char *p = NULL, *k = NULL;
1402 struct FSSHeader h;
1403 uint64_t n;
1404 struct stat st;
1405
1406 r = stat("/var/log/journal", &st);
1407 if (r < 0 && errno != ENOENT && errno != ENOTDIR)
1408 return log_error_errno(errno, "stat(\"%s\") failed: %m", "/var/log/journal");
1409
1410 if (r < 0 || !S_ISDIR(st.st_mode)) {
1411 log_error("%s is not a directory, must be using persistent logging for FSS.",
1412 "/var/log/journal");
1413 return r < 0 ? -errno : -ENOTDIR;
1414 }
1415
1416 r = sd_id128_get_machine(&machine);
1417 if (r < 0)
1418 return log_error_errno(r, "Failed to get machine ID: %m");
1419
1420 r = sd_id128_get_boot(&boot);
1421 if (r < 0)
1422 return log_error_errno(r, "Failed to get boot ID: %m");
1423
1424 if (asprintf(&p, "/var/log/journal/" SD_ID128_FORMAT_STR "/fss",
1425 SD_ID128_FORMAT_VAL(machine)) < 0)
1426 return log_oom();
1427
1428 if (arg_force) {
1429 r = unlink(p);
1430 if (r < 0 && errno != ENOENT) {
1431 r = log_error_errno(errno, "unlink(\"%s\") failed: %m", p);
1432 goto finish;
1433 }
1434 } else if (access(p, F_OK) >= 0) {
1435 log_error("Sealing key file %s exists already. Use --force to recreate.", p);
1436 r = -EEXIST;
1437 goto finish;
1438 }
1439
1440 if (asprintf(&k, "/var/log/journal/" SD_ID128_FORMAT_STR "/fss.tmp.XXXXXX",
1441 SD_ID128_FORMAT_VAL(machine)) < 0) {
1442 r = log_oom();
1443 goto finish;
1444 }
1445
1446 mpk_size = FSPRG_mskinbytes(FSPRG_RECOMMENDED_SECPAR);
1447 mpk = alloca(mpk_size);
1448
1449 seed_size = FSPRG_RECOMMENDED_SEEDLEN;
1450 seed = alloca(seed_size);
1451
1452 state_size = FSPRG_stateinbytes(FSPRG_RECOMMENDED_SECPAR);
1453 state = alloca(state_size);
1454
1455 fd = open("/dev/random", O_RDONLY|O_CLOEXEC|O_NOCTTY);
1456 if (fd < 0) {
1457 r = log_error_errno(errno, "Failed to open /dev/random: %m");
1458 goto finish;
1459 }
1460
1461 log_info("Generating seed...");
1462 r = loop_read_exact(fd, seed, seed_size, true);
1463 if (r < 0) {
1464 log_error_errno(r, "Failed to read random seed: %m");
1465 goto finish;
1466 }
1467
1468 log_info("Generating key pair...");
1469 FSPRG_GenMK(NULL, mpk, seed, seed_size, FSPRG_RECOMMENDED_SECPAR);
1470
1471 log_info("Generating sealing key...");
1472 FSPRG_GenState0(state, mpk, seed, seed_size);
1473
1474 assert(arg_interval > 0);
1475
1476 n = now(CLOCK_REALTIME);
1477 n /= arg_interval;
1478
1479 safe_close(fd);
1480 fd = mkostemp_safe(k, O_WRONLY|O_CLOEXEC);
1481 if (fd < 0) {
1482 r = log_error_errno(errno, "Failed to open %s: %m", k);
1483 goto finish;
1484 }
1485
1486 /* Enable secure remove, exclusion from dump, synchronous
1487 * writing and in-place updating */
1488 r = chattr_fd(fd, FS_SECRM_FL|FS_NODUMP_FL|FS_SYNC_FL|FS_NOCOW_FL, FS_SECRM_FL|FS_NODUMP_FL|FS_SYNC_FL|FS_NOCOW_FL);
1489 if (r < 0)
1490 log_warning_errno(errno, "Failed to set file attributes: %m");
1491
1492 zero(h);
1493 memcpy(h.signature, "KSHHRHLP", 8);
1494 h.machine_id = machine;
1495 h.boot_id = boot;
1496 h.header_size = htole64(sizeof(h));
1497 h.start_usec = htole64(n * arg_interval);
1498 h.interval_usec = htole64(arg_interval);
1499 h.fsprg_secpar = htole16(FSPRG_RECOMMENDED_SECPAR);
1500 h.fsprg_state_size = htole64(state_size);
1501
1502 r = loop_write(fd, &h, sizeof(h), false);
1503 if (r < 0) {
1504 log_error_errno(r, "Failed to write header: %m");
1505 goto finish;
1506 }
1507
1508 r = loop_write(fd, state, state_size, false);
1509 if (r < 0) {
1510 log_error_errno(r, "Failed to write state: %m");
1511 goto finish;
1512 }
1513
1514 if (link(k, p) < 0) {
1515 r = log_error_errno(errno, "Failed to link file: %m");
1516 goto finish;
1517 }
1518
1519 if (on_tty()) {
1520 fprintf(stderr,
1521 "\n"
1522 "The new key pair has been generated. The " ANSI_HIGHLIGHT "secret sealing key" ANSI_NORMAL " has been written to\n"
1523 "the following local file. This key file is automatically updated when the\n"
1524 "sealing key is advanced. It should not be used on multiple hosts.\n"
1525 "\n"
1526 "\t%s\n"
1527 "\n"
1528 "Please write down the following " ANSI_HIGHLIGHT "secret verification key" ANSI_NORMAL ". It should be stored\n"
1529 "at a safe location and should not be saved locally on disk.\n"
1530 "\n\t" ANSI_HIGHLIGHT_RED, p);
1531 fflush(stderr);
1532 }
1533 for (i = 0; i < seed_size; i++) {
1534 if (i > 0 && i % 3 == 0)
1535 putchar('-');
1536 printf("%02x", ((uint8_t*) seed)[i]);
1537 }
1538
1539 printf("/%llx-%llx\n", (unsigned long long) n, (unsigned long long) arg_interval);
1540
1541 if (on_tty()) {
1542 char tsb[FORMAT_TIMESPAN_MAX], *hn;
1543
1544 fprintf(stderr,
1545 ANSI_NORMAL "\n"
1546 "The sealing key is automatically changed every %s.\n",
1547 format_timespan(tsb, sizeof(tsb), arg_interval, 0));
1548
1549 hn = gethostname_malloc();
1550
1551 if (hn) {
1552 hostname_cleanup(hn);
1553 fprintf(stderr, "\nThe keys have been generated for host %s/" SD_ID128_FORMAT_STR ".\n", hn, SD_ID128_FORMAT_VAL(machine));
1554 } else
1555 fprintf(stderr, "\nThe keys have been generated for host " SD_ID128_FORMAT_STR ".\n", SD_ID128_FORMAT_VAL(machine));
1556
1557 #ifdef HAVE_QRENCODE
1558 /* If this is not an UTF-8 system don't print any QR codes */
1559 if (is_locale_utf8()) {
1560 fputs("\nTo transfer the verification key to your phone please scan the QR code below:\n\n", stderr);
1561 print_qr_code(stderr, seed, seed_size, n, arg_interval, hn, machine);
1562 }
1563 #endif
1564 free(hn);
1565 }
1566
1567 r = 0;
1568
1569 finish:
1570 safe_close(fd);
1571
1572 if (k) {
1573 unlink(k);
1574 free(k);
1575 }
1576
1577 free(p);
1578
1579 return r;
1580 #else
1581 log_error("Forward-secure sealing not available.");
1582 return -EOPNOTSUPP;
1583 #endif
1584 }
1585
1586 static int verify(sd_journal *j) {
1587 int r = 0;
1588 Iterator i;
1589 JournalFile *f;
1590
1591 assert(j);
1592
1593 log_show_color(true);
1594
1595 ORDERED_HASHMAP_FOREACH(f, j->files, i) {
1596 int k;
1597 usec_t first = 0, validated = 0, last = 0;
1598
1599 #ifdef HAVE_GCRYPT
1600 if (!arg_verify_key && JOURNAL_HEADER_SEALED(f->header))
1601 log_notice("Journal file %s has sealing enabled but verification key has not been passed using --verify-key=.", f->path);
1602 #endif
1603
1604 k = journal_file_verify(f, arg_verify_key, &first, &validated, &last, true);
1605 if (k == -EINVAL) {
1606 /* If the key was invalid give up right-away. */
1607 return k;
1608 } else if (k < 0) {
1609 log_warning_errno(k, "FAIL: %s (%m)", f->path);
1610 r = k;
1611 } else {
1612 char a[FORMAT_TIMESTAMP_MAX], b[FORMAT_TIMESTAMP_MAX], c[FORMAT_TIMESPAN_MAX];
1613 log_info("PASS: %s", f->path);
1614
1615 if (arg_verify_key && JOURNAL_HEADER_SEALED(f->header)) {
1616 if (validated > 0) {
1617 log_info("=> Validated from %s to %s, final %s entries not sealed.",
1618 format_timestamp_maybe_utc(a, sizeof(a), first),
1619 format_timestamp_maybe_utc(b, sizeof(b), validated),
1620 format_timespan(c, sizeof(c), last > validated ? last - validated : 0, 0));
1621 } else if (last > 0)
1622 log_info("=> No sealing yet, %s of entries not sealed.",
1623 format_timespan(c, sizeof(c), last - first, 0));
1624 else
1625 log_info("=> No sealing yet, no entries in file.");
1626 }
1627 }
1628 }
1629
1630 return r;
1631 }
1632
1633 static int access_check_var_log_journal(sd_journal *j) {
1634 #ifdef HAVE_ACL
1635 _cleanup_strv_free_ char **g = NULL;
1636 const char* dir;
1637 #endif
1638 int r;
1639
1640 assert(j);
1641
1642 if (arg_quiet)
1643 return 0;
1644
1645 /* If we are root, we should have access, don't warn. */
1646 if (getuid() == 0)
1647 return 0;
1648
1649 /* If we are in the 'systemd-journal' group, we should have
1650 * access too. */
1651 r = in_group("systemd-journal");
1652 if (r < 0)
1653 return log_error_errno(r, "Failed to check if we are in the 'systemd-journal' group: %m");
1654 if (r > 0)
1655 return 0;
1656
1657 #ifdef HAVE_ACL
1658 if (laccess("/run/log/journal", F_OK) >= 0)
1659 dir = "/run/log/journal";
1660 else
1661 dir = "/var/log/journal";
1662
1663 /* If we are in any of the groups listed in the journal ACLs,
1664 * then all is good, too. Let's enumerate all groups from the
1665 * default ACL of the directory, which generally should allow
1666 * access to most journal files too. */
1667 r = acl_search_groups(dir, &g);
1668 if (r < 0)
1669 return log_error_errno(r, "Failed to search journal ACL: %m");
1670 if (r > 0)
1671 return 0;
1672
1673 /* Print a pretty list, if there were ACLs set. */
1674 if (!strv_isempty(g)) {
1675 _cleanup_free_ char *s = NULL;
1676
1677 /* Thre are groups in the ACL, let's list them */
1678 r = strv_extend(&g, "systemd-journal");
1679 if (r < 0)
1680 return log_oom();
1681
1682 strv_sort(g);
1683 strv_uniq(g);
1684
1685 s = strv_join(g, "', '");
1686 if (!s)
1687 return log_oom();
1688
1689 log_notice("Hint: You are currently not seeing messages from other users and the system.\n"
1690 " Users in groups '%s' can see all messages.\n"
1691 " Pass -q to turn off this notice.", s);
1692 return 1;
1693 }
1694 #endif
1695
1696 /* If no ACLs were found, print a short version of the message. */
1697 log_notice("Hint: You are currently not seeing messages from other users and the system.\n"
1698 " Users in the 'systemd-journal' group can see all messages. Pass -q to\n"
1699 " turn off this notice.");
1700
1701 return 1;
1702 }
1703
1704 static int access_check(sd_journal *j) {
1705 Iterator it;
1706 void *code;
1707 int r = 0;
1708
1709 assert(j);
1710
1711 if (set_isempty(j->errors)) {
1712 if (ordered_hashmap_isempty(j->files))
1713 log_notice("No journal files were found.");
1714
1715 return 0;
1716 }
1717
1718 if (set_contains(j->errors, INT_TO_PTR(-EACCES))) {
1719 (void) access_check_var_log_journal(j);
1720
1721 if (ordered_hashmap_isempty(j->files))
1722 r = log_error_errno(EACCES, "No journal files were opened due to insufficient permissions.");
1723 }
1724
1725 SET_FOREACH(code, j->errors, it) {
1726 int err;
1727
1728 err = -PTR_TO_INT(code);
1729 assert(err > 0);
1730
1731 if (err == EACCES)
1732 continue;
1733
1734 log_warning_errno(err, "Error was encountered while opening journal files: %m");
1735 if (r == 0)
1736 r = -err;
1737 }
1738
1739 return r;
1740 }
1741
1742 static int flush_to_var(void) {
1743 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
1744 _cleanup_bus_flush_close_unref_ sd_bus *bus = NULL;
1745 _cleanup_close_ int watch_fd = -1;
1746 int r;
1747
1748 /* Quick exit */
1749 if (access("/run/systemd/journal/flushed", F_OK) >= 0)
1750 return 0;
1751
1752 /* OK, let's actually do the full logic, send SIGUSR1 to the
1753 * daemon and set up inotify to wait for the flushed file to appear */
1754 r = bus_connect_system_systemd(&bus);
1755 if (r < 0)
1756 return log_error_errno(r, "Failed to get D-Bus connection: %m");
1757
1758 r = sd_bus_call_method(
1759 bus,
1760 "org.freedesktop.systemd1",
1761 "/org/freedesktop/systemd1",
1762 "org.freedesktop.systemd1.Manager",
1763 "KillUnit",
1764 &error,
1765 NULL,
1766 "ssi", "systemd-journald.service", "main", SIGUSR1);
1767 if (r < 0) {
1768 log_error("Failed to kill journal service: %s", bus_error_message(&error, r));
1769 return r;
1770 }
1771
1772 mkdir_p("/run/systemd/journal", 0755);
1773
1774 watch_fd = inotify_init1(IN_NONBLOCK|IN_CLOEXEC);
1775 if (watch_fd < 0)
1776 return log_error_errno(errno, "Failed to create inotify watch: %m");
1777
1778 r = inotify_add_watch(watch_fd, "/run/systemd/journal", IN_CREATE|IN_DONT_FOLLOW|IN_ONLYDIR);
1779 if (r < 0)
1780 return log_error_errno(errno, "Failed to watch journal directory: %m");
1781
1782 for (;;) {
1783 if (access("/run/systemd/journal/flushed", F_OK) >= 0)
1784 break;
1785
1786 if (errno != ENOENT)
1787 return log_error_errno(errno, "Failed to check for existence of /run/systemd/journal/flushed: %m");
1788
1789 r = fd_wait_for_event(watch_fd, POLLIN, USEC_INFINITY);
1790 if (r < 0)
1791 return log_error_errno(r, "Failed to wait for event: %m");
1792
1793 r = flush_fd(watch_fd);
1794 if (r < 0)
1795 return log_error_errno(r, "Failed to flush inotify events: %m");
1796 }
1797
1798 return 0;
1799 }
1800
1801 static int rotate(void) {
1802 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
1803 _cleanup_bus_flush_close_unref_ sd_bus *bus = NULL;
1804 int r;
1805
1806 r = bus_connect_system_systemd(&bus);
1807 if (r < 0)
1808 return log_error_errno(r, "Failed to get D-Bus connection: %m");
1809
1810 r = sd_bus_call_method(
1811 bus,
1812 "org.freedesktop.systemd1",
1813 "/org/freedesktop/systemd1",
1814 "org.freedesktop.systemd1.Manager",
1815 "KillUnit",
1816 &error,
1817 NULL,
1818 "ssi", "systemd-journald.service", "main", SIGUSR2);
1819 if (r < 0)
1820 return log_error_errno(r, "Failed to kill journal service: %s", bus_error_message(&error, r));
1821
1822 return 0;
1823 }
1824
1825 int main(int argc, char *argv[]) {
1826 int r;
1827 _cleanup_journal_close_ sd_journal *j = NULL;
1828 bool need_seek = false;
1829 sd_id128_t previous_boot_id;
1830 bool previous_boot_id_valid = false, first_line = true;
1831 int n_shown = 0;
1832 bool ellipsized = false;
1833
1834 setlocale(LC_ALL, "");
1835 log_parse_environment();
1836 log_open();
1837
1838 r = parse_argv(argc, argv);
1839 if (r <= 0)
1840 goto finish;
1841
1842 signal(SIGWINCH, columns_lines_cache_reset);
1843 sigbus_install();
1844
1845 /* Increase max number of open files to 16K if we can, we
1846 * might needs this when browsing journal files, which might
1847 * be split up into many files. */
1848 setrlimit_closest(RLIMIT_NOFILE, &RLIMIT_MAKE_CONST(16384));
1849
1850 if (arg_action == ACTION_NEW_ID128) {
1851 r = generate_new_id128();
1852 goto finish;
1853 }
1854
1855 if (arg_action == ACTION_FLUSH) {
1856 r = flush_to_var();
1857 goto finish;
1858 }
1859
1860 if (arg_action == ACTION_ROTATE) {
1861 r = rotate();
1862 goto finish;
1863 }
1864
1865 if (arg_action == ACTION_SETUP_KEYS) {
1866 r = setup_keys();
1867 goto finish;
1868 }
1869
1870 if (arg_action == ACTION_UPDATE_CATALOG ||
1871 arg_action == ACTION_LIST_CATALOG ||
1872 arg_action == ACTION_DUMP_CATALOG) {
1873
1874 _cleanup_free_ char *database;
1875
1876 database = path_join(arg_root, CATALOG_DATABASE, NULL);
1877 if (!database) {
1878 r = log_oom();
1879 goto finish;
1880 }
1881
1882 if (arg_action == ACTION_UPDATE_CATALOG) {
1883 r = catalog_update(database, arg_root, catalog_file_dirs);
1884 if (r < 0)
1885 log_error_errno(r, "Failed to list catalog: %m");
1886 } else {
1887 bool oneline = arg_action == ACTION_LIST_CATALOG;
1888
1889 pager_open_if_enabled();
1890 if (optind < argc)
1891 r = catalog_list_items(stdout, database,
1892 oneline, argv + optind);
1893 else
1894 r = catalog_list(stdout, database, oneline);
1895 if (r < 0)
1896 log_error_errno(r, "Failed to list catalog: %m");
1897 }
1898
1899 goto finish;
1900 }
1901
1902 if (arg_directory)
1903 r = sd_journal_open_directory(&j, arg_directory, arg_journal_type);
1904 else if (arg_file)
1905 r = sd_journal_open_files(&j, (const char**) arg_file, 0);
1906 else if (arg_machine)
1907 r = sd_journal_open_container(&j, arg_machine, 0);
1908 else
1909 r = sd_journal_open(&j, !arg_merge*SD_JOURNAL_LOCAL_ONLY + arg_journal_type);
1910 if (r < 0) {
1911 log_error_errno(r, "Failed to open %s: %m",
1912 arg_directory ? arg_directory : arg_file ? "files" : "journal");
1913 goto finish;
1914 }
1915
1916 r = access_check(j);
1917 if (r < 0)
1918 goto finish;
1919
1920 if (arg_action == ACTION_VERIFY) {
1921 r = verify(j);
1922 goto finish;
1923 }
1924
1925 if (arg_action == ACTION_PRINT_HEADER) {
1926 journal_print_header(j);
1927 r = 0;
1928 goto finish;
1929 }
1930
1931 if (arg_action == ACTION_DISK_USAGE) {
1932 uint64_t bytes = 0;
1933 char sbytes[FORMAT_BYTES_MAX];
1934
1935 r = sd_journal_get_usage(j, &bytes);
1936 if (r < 0)
1937 goto finish;
1938
1939 printf("Archived and active journals take up %s on disk.\n",
1940 format_bytes(sbytes, sizeof(sbytes), bytes));
1941 goto finish;
1942 }
1943
1944 if (arg_action == ACTION_VACUUM) {
1945 Directory *d;
1946 Iterator i;
1947
1948 HASHMAP_FOREACH(d, j->directories_by_path, i) {
1949 int q;
1950
1951 if (d->is_root)
1952 continue;
1953
1954 q = journal_directory_vacuum(d->path, arg_vacuum_size, arg_vacuum_n_files, arg_vacuum_time, NULL, true);
1955 if (q < 0) {
1956 log_error_errno(q, "Failed to vacuum %s: %m", d->path);
1957 r = q;
1958 }
1959 }
1960
1961 goto finish;
1962 }
1963
1964 if (arg_action == ACTION_LIST_BOOTS) {
1965 r = list_boots(j);
1966 goto finish;
1967 }
1968
1969 /* add_boot() must be called first!
1970 * It may need to seek the journal to find parent boot IDs. */
1971 r = add_boot(j);
1972 if (r < 0)
1973 goto finish;
1974
1975 r = add_dmesg(j);
1976 if (r < 0)
1977 goto finish;
1978
1979 r = add_units(j);
1980 if (r < 0) {
1981 log_error_errno(r, "Failed to add filter for units: %m");
1982 goto finish;
1983 }
1984
1985 r = add_syslog_identifier(j);
1986 if (r < 0) {
1987 log_error_errno(r, "Failed to add filter for syslog identifiers: %m");
1988 goto finish;
1989 }
1990
1991 r = add_priorities(j);
1992 if (r < 0)
1993 goto finish;
1994
1995 r = add_matches(j, argv + optind);
1996 if (r < 0)
1997 goto finish;
1998
1999 if (_unlikely_(log_get_max_level() >= LOG_DEBUG)) {
2000 _cleanup_free_ char *filter;
2001
2002 filter = journal_make_match_string(j);
2003 if (!filter)
2004 return log_oom();
2005
2006 log_debug("Journal filter: %s", filter);
2007 }
2008
2009 if (arg_field) {
2010 const void *data;
2011 size_t size;
2012
2013 r = sd_journal_set_data_threshold(j, 0);
2014 if (r < 0) {
2015 log_error_errno(r, "Failed to unset data size threshold: %m");
2016 goto finish;
2017 }
2018
2019 r = sd_journal_query_unique(j, arg_field);
2020 if (r < 0) {
2021 log_error_errno(r, "Failed to query unique data objects: %m");
2022 goto finish;
2023 }
2024
2025 SD_JOURNAL_FOREACH_UNIQUE(j, data, size) {
2026 const void *eq;
2027
2028 if (arg_lines >= 0 && n_shown >= arg_lines)
2029 break;
2030
2031 eq = memchr(data, '=', size);
2032 if (eq)
2033 printf("%.*s\n", (int) (size - ((const uint8_t*) eq - (const uint8_t*) data + 1)), (const char*) eq + 1);
2034 else
2035 printf("%.*s\n", (int) size, (const char*) data);
2036
2037 n_shown ++;
2038 }
2039
2040 r = 0;
2041 goto finish;
2042 }
2043
2044 /* Opening the fd now means the first sd_journal_wait() will actually wait */
2045 if (arg_follow) {
2046 r = sd_journal_get_fd(j);
2047 if (r < 0) {
2048 log_error_errno(r, "Failed to get journal fd: %m");
2049 goto finish;
2050 }
2051 }
2052
2053 if (arg_cursor || arg_after_cursor) {
2054 r = sd_journal_seek_cursor(j, arg_cursor ?: arg_after_cursor);
2055 if (r < 0) {
2056 log_error_errno(r, "Failed to seek to cursor: %m");
2057 goto finish;
2058 }
2059
2060 if (!arg_reverse)
2061 r = sd_journal_next_skip(j, 1 + !!arg_after_cursor);
2062 else
2063 r = sd_journal_previous_skip(j, 1 + !!arg_after_cursor);
2064
2065 if (arg_after_cursor && r < 2) {
2066 /* We couldn't find the next entry after the cursor. */
2067 if (arg_follow)
2068 need_seek = true;
2069 else
2070 arg_lines = 0;
2071 }
2072
2073 } else if (arg_since_set && !arg_reverse) {
2074 r = sd_journal_seek_realtime_usec(j, arg_since);
2075 if (r < 0) {
2076 log_error_errno(r, "Failed to seek to date: %m");
2077 goto finish;
2078 }
2079 r = sd_journal_next(j);
2080
2081 } else if (arg_until_set && arg_reverse) {
2082 r = sd_journal_seek_realtime_usec(j, arg_until);
2083 if (r < 0) {
2084 log_error_errno(r, "Failed to seek to date: %m");
2085 goto finish;
2086 }
2087 r = sd_journal_previous(j);
2088
2089 } else if (arg_lines >= 0) {
2090 r = sd_journal_seek_tail(j);
2091 if (r < 0) {
2092 log_error_errno(r, "Failed to seek to tail: %m");
2093 goto finish;
2094 }
2095
2096 r = sd_journal_previous_skip(j, arg_lines);
2097
2098 } else if (arg_reverse) {
2099 r = sd_journal_seek_tail(j);
2100 if (r < 0) {
2101 log_error_errno(r, "Failed to seek to tail: %m");
2102 goto finish;
2103 }
2104
2105 r = sd_journal_previous(j);
2106
2107 } else {
2108 r = sd_journal_seek_head(j);
2109 if (r < 0) {
2110 log_error_errno(r, "Failed to seek to head: %m");
2111 goto finish;
2112 }
2113
2114 r = sd_journal_next(j);
2115 }
2116
2117 if (r < 0) {
2118 log_error_errno(r, "Failed to iterate through journal: %m");
2119 goto finish;
2120 }
2121 if (r == 0) {
2122 if (arg_follow)
2123 need_seek = true;
2124 else {
2125 printf("-- No entries --\n");
2126 goto finish;
2127 }
2128 }
2129
2130 if (!arg_follow)
2131 pager_open_if_enabled();
2132
2133 if (!arg_quiet) {
2134 usec_t start, end;
2135 char start_buf[FORMAT_TIMESTAMP_MAX], end_buf[FORMAT_TIMESTAMP_MAX];
2136
2137 r = sd_journal_get_cutoff_realtime_usec(j, &start, &end);
2138 if (r < 0) {
2139 log_error_errno(r, "Failed to get cutoff: %m");
2140 goto finish;
2141 }
2142
2143 if (r > 0) {
2144 if (arg_follow)
2145 printf("-- Logs begin at %s. --\n",
2146 format_timestamp_maybe_utc(start_buf, sizeof(start_buf), start));
2147 else
2148 printf("-- Logs begin at %s, end at %s. --\n",
2149 format_timestamp_maybe_utc(start_buf, sizeof(start_buf), start),
2150 format_timestamp_maybe_utc(end_buf, sizeof(end_buf), end));
2151 }
2152 }
2153
2154 for (;;) {
2155 while (arg_lines < 0 || n_shown < arg_lines || (arg_follow && !first_line)) {
2156 int flags;
2157
2158 if (need_seek) {
2159 if (!arg_reverse)
2160 r = sd_journal_next(j);
2161 else
2162 r = sd_journal_previous(j);
2163 if (r < 0) {
2164 log_error_errno(r, "Failed to iterate through journal: %m");
2165 goto finish;
2166 }
2167 if (r == 0)
2168 break;
2169 }
2170
2171 if (arg_until_set && !arg_reverse) {
2172 usec_t usec;
2173
2174 r = sd_journal_get_realtime_usec(j, &usec);
2175 if (r < 0) {
2176 log_error_errno(r, "Failed to determine timestamp: %m");
2177 goto finish;
2178 }
2179 if (usec > arg_until)
2180 goto finish;
2181 }
2182
2183 if (arg_since_set && arg_reverse) {
2184 usec_t usec;
2185
2186 r = sd_journal_get_realtime_usec(j, &usec);
2187 if (r < 0) {
2188 log_error_errno(r, "Failed to determine timestamp: %m");
2189 goto finish;
2190 }
2191 if (usec < arg_since)
2192 goto finish;
2193 }
2194
2195 if (!arg_merge && !arg_quiet) {
2196 sd_id128_t boot_id;
2197
2198 r = sd_journal_get_monotonic_usec(j, NULL, &boot_id);
2199 if (r >= 0) {
2200 if (previous_boot_id_valid &&
2201 !sd_id128_equal(boot_id, previous_boot_id))
2202 printf("%s-- Reboot --%s\n",
2203 ansi_highlight(), ansi_normal());
2204
2205 previous_boot_id = boot_id;
2206 previous_boot_id_valid = true;
2207 }
2208 }
2209
2210 flags =
2211 arg_all * OUTPUT_SHOW_ALL |
2212 arg_full * OUTPUT_FULL_WIDTH |
2213 on_tty() * OUTPUT_COLOR |
2214 arg_catalog * OUTPUT_CATALOG |
2215 arg_utc * OUTPUT_UTC;
2216
2217 r = output_journal(stdout, j, arg_output, 0, flags, &ellipsized);
2218 need_seek = true;
2219 if (r == -EADDRNOTAVAIL)
2220 break;
2221 else if (r < 0 || ferror(stdout))
2222 goto finish;
2223
2224 n_shown++;
2225 }
2226
2227 if (!arg_follow) {
2228 if (arg_show_cursor) {
2229 _cleanup_free_ char *cursor = NULL;
2230
2231 r = sd_journal_get_cursor(j, &cursor);
2232 if (r < 0 && r != -EADDRNOTAVAIL)
2233 log_error_errno(r, "Failed to get cursor: %m");
2234 else if (r >= 0)
2235 printf("-- cursor: %s\n", cursor);
2236 }
2237
2238 break;
2239 }
2240
2241 r = sd_journal_wait(j, (uint64_t) -1);
2242 if (r < 0) {
2243 log_error_errno(r, "Couldn't wait for journal event: %m");
2244 goto finish;
2245 }
2246
2247 first_line = false;
2248 }
2249
2250 finish:
2251 pager_close();
2252
2253 strv_free(arg_file);
2254
2255 strv_free(arg_syslog_identifier);
2256 strv_free(arg_system_units);
2257 strv_free(arg_user_units);
2258
2259 free(arg_root);
2260
2261 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
2262 }