]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/journal/journalctl.c
Merge pull request #1501 from fbuihuu/fix-requires-mounts-for-directives
[thirdparty/systemd.git] / src / journal / journalctl.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3 /***
4 This file is part of systemd.
5
6 Copyright 2011 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
17
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <errno.h>
23 #include <fcntl.h>
24 #include <fnmatch.h>
25 #include <getopt.h>
26 #include <linux/fs.h>
27 #include <locale.h>
28 #include <poll.h>
29 #include <signal.h>
30 #include <stddef.h>
31 #include <stdio.h>
32 #include <stdlib.h>
33 #include <string.h>
34 #include <sys/inotify.h>
35 #include <sys/stat.h>
36 #include <unistd.h>
37
38 #include "sd-bus.h"
39 #include "sd-journal.h"
40
41 #include "acl-util.h"
42 #include "bus-error.h"
43 #include "bus-util.h"
44 #include "catalog.h"
45 #include "fileio.h"
46 #include "fsprg.h"
47 #include "hostname-util.h"
48 #include "journal-def.h"
49 #include "journal-internal.h"
50 #include "journal-qrcode.h"
51 #include "journal-vacuum.h"
52 #include "journal-verify.h"
53 #include "log.h"
54 #include "logs-show.h"
55 #include "mkdir.h"
56 #include "pager.h"
57 #include "path-util.h"
58 #include "set.h"
59 #include "sigbus.h"
60 #include "strv.h"
61 #include "terminal-util.h"
62 #include "unit-name.h"
63
64 #define DEFAULT_FSS_INTERVAL_USEC (15*USEC_PER_MINUTE)
65
66 enum {
67 /* Special values for arg_lines */
68 ARG_LINES_DEFAULT = -2,
69 ARG_LINES_ALL = -1,
70 };
71
72 static OutputMode arg_output = OUTPUT_SHORT;
73 static bool arg_utc = false;
74 static bool arg_pager_end = false;
75 static bool arg_follow = false;
76 static bool arg_full = true;
77 static bool arg_all = false;
78 static bool arg_no_pager = false;
79 static int arg_lines = ARG_LINES_DEFAULT;
80 static bool arg_no_tail = false;
81 static bool arg_quiet = false;
82 static bool arg_merge = false;
83 static bool arg_boot = false;
84 static sd_id128_t arg_boot_id = {};
85 static int arg_boot_offset = 0;
86 static bool arg_dmesg = false;
87 static const char *arg_cursor = NULL;
88 static const char *arg_after_cursor = NULL;
89 static bool arg_show_cursor = false;
90 static const char *arg_directory = NULL;
91 static char **arg_file = NULL;
92 static int arg_priorities = 0xFF;
93 static const char *arg_verify_key = NULL;
94 #ifdef HAVE_GCRYPT
95 static usec_t arg_interval = DEFAULT_FSS_INTERVAL_USEC;
96 static bool arg_force = false;
97 #endif
98 static usec_t arg_since, arg_until;
99 static bool arg_since_set = false, arg_until_set = false;
100 static char **arg_syslog_identifier = NULL;
101 static char **arg_system_units = NULL;
102 static char **arg_user_units = NULL;
103 static const char *arg_field = NULL;
104 static bool arg_catalog = false;
105 static bool arg_reverse = false;
106 static int arg_journal_type = 0;
107 static const char *arg_root = NULL;
108 static const char *arg_machine = NULL;
109 static uint64_t arg_vacuum_size = 0;
110 static uint64_t arg_vacuum_n_files = 0;
111 static usec_t arg_vacuum_time = 0;
112
113 static enum {
114 ACTION_SHOW,
115 ACTION_NEW_ID128,
116 ACTION_PRINT_HEADER,
117 ACTION_SETUP_KEYS,
118 ACTION_VERIFY,
119 ACTION_DISK_USAGE,
120 ACTION_LIST_CATALOG,
121 ACTION_DUMP_CATALOG,
122 ACTION_UPDATE_CATALOG,
123 ACTION_LIST_BOOTS,
124 ACTION_FLUSH,
125 ACTION_ROTATE,
126 ACTION_VACUUM,
127 } arg_action = ACTION_SHOW;
128
129 typedef struct BootId {
130 sd_id128_t id;
131 uint64_t first;
132 uint64_t last;
133 LIST_FIELDS(struct BootId, boot_list);
134 } BootId;
135
136 static void pager_open_if_enabled(void) {
137
138 if (arg_no_pager)
139 return;
140
141 pager_open(arg_pager_end);
142 }
143
144 static char *format_timestamp_maybe_utc(char *buf, size_t l, usec_t t) {
145
146 if (arg_utc)
147 return format_timestamp_utc(buf, l, t);
148
149 return format_timestamp(buf, l, t);
150 }
151
152 static int parse_boot_descriptor(const char *x, sd_id128_t *boot_id, int *offset) {
153 sd_id128_t id = SD_ID128_NULL;
154 int off = 0, r;
155
156 if (strlen(x) >= 32) {
157 char *t;
158
159 t = strndupa(x, 32);
160 r = sd_id128_from_string(t, &id);
161 if (r >= 0)
162 x += 32;
163
164 if (*x != '-' && *x != '+' && *x != 0)
165 return -EINVAL;
166
167 if (*x != 0) {
168 r = safe_atoi(x, &off);
169 if (r < 0)
170 return r;
171 }
172 } else {
173 r = safe_atoi(x, &off);
174 if (r < 0)
175 return r;
176 }
177
178 if (boot_id)
179 *boot_id = id;
180
181 if (offset)
182 *offset = off;
183
184 return 0;
185 }
186
187 static void help(void) {
188
189 pager_open_if_enabled();
190
191 printf("%s [OPTIONS...] [MATCHES...]\n\n"
192 "Query the journal.\n\n"
193 "Flags:\n"
194 " --system Show the system journal\n"
195 " --user Show the user journal for the current user\n"
196 " -M --machine=CONTAINER Operate on local container\n"
197 " --since=DATE Show entries not older than the specified date\n"
198 " --until=DATE Show entries not newer than the specified date\n"
199 " -c --cursor=CURSOR Show entries starting at the specified cursor\n"
200 " --after-cursor=CURSOR Show entries after the specified cursor\n"
201 " --show-cursor Print the cursor after all the entries\n"
202 " -b --boot[=ID] Show current boot or the specified boot\n"
203 " --list-boots Show terse information about recorded boots\n"
204 " -k --dmesg Show kernel message log from the current boot\n"
205 " -u --unit=UNIT Show logs from the specified unit\n"
206 " --user-unit=UNIT Show logs from the specified user unit\n"
207 " -t --identifier=STRING Show entries with the specified syslog identifier\n"
208 " -p --priority=RANGE Show entries with the specified priority\n"
209 " -e --pager-end Immediately jump to the end in the pager\n"
210 " -f --follow Follow the journal\n"
211 " -n --lines[=INTEGER] Number of journal entries to show\n"
212 " --no-tail Show all lines, even in follow mode\n"
213 " -r --reverse Show the newest entries first\n"
214 " -o --output=STRING Change journal output mode (short, short-iso,\n"
215 " short-precise, short-monotonic, verbose,\n"
216 " export, json, json-pretty, json-sse, cat)\n"
217 " --utc Express time in Coordinated Universal Time (UTC)\n"
218 " -x --catalog Add message explanations where available\n"
219 " --no-full Ellipsize fields\n"
220 " -a --all Show all fields, including long and unprintable\n"
221 " -q --quiet Do not show privilege warning\n"
222 " --no-pager Do not pipe output into a pager\n"
223 " -m --merge Show entries from all available journals\n"
224 " -D --directory=PATH Show journal files from directory\n"
225 " --file=PATH Show journal file\n"
226 " --root=ROOT Operate on catalog files underneath the root ROOT\n"
227 #ifdef HAVE_GCRYPT
228 " --interval=TIME Time interval for changing the FSS sealing key\n"
229 " --verify-key=KEY Specify FSS verification key\n"
230 " --force Override of the FSS key pair with --setup-keys\n"
231 #endif
232 "\nCommands:\n"
233 " -h --help Show this help text\n"
234 " --version Show package version\n"
235 " -F --field=FIELD List all values that a specified field takes\n"
236 " --new-id128 Generate a new 128-bit ID\n"
237 " --disk-usage Show total disk usage of all journal files\n"
238 " --vacuum-size=BYTES Reduce disk usage below specified size\n"
239 " --vacuum-files=INT Leave only the specified number of journal files\n"
240 " --vacuum-time=TIME Remove journal files older than specified time\n"
241 " --flush Flush all journal data from /run into /var\n"
242 " --rotate Request immediate rotation of the journal files\n"
243 " --header Show journal header information\n"
244 " --list-catalog Show all message IDs in the catalog\n"
245 " --dump-catalog Show entries in the message catalog\n"
246 " --update-catalog Update the message catalog database\n"
247 #ifdef HAVE_GCRYPT
248 " --setup-keys Generate a new FSS key pair\n"
249 " --verify Verify journal file consistency\n"
250 #endif
251 , program_invocation_short_name);
252 }
253
254 static int parse_argv(int argc, char *argv[]) {
255
256 enum {
257 ARG_VERSION = 0x100,
258 ARG_NO_PAGER,
259 ARG_NO_FULL,
260 ARG_NO_TAIL,
261 ARG_NEW_ID128,
262 ARG_LIST_BOOTS,
263 ARG_USER,
264 ARG_SYSTEM,
265 ARG_ROOT,
266 ARG_HEADER,
267 ARG_SETUP_KEYS,
268 ARG_FILE,
269 ARG_INTERVAL,
270 ARG_VERIFY,
271 ARG_VERIFY_KEY,
272 ARG_DISK_USAGE,
273 ARG_SINCE,
274 ARG_UNTIL,
275 ARG_AFTER_CURSOR,
276 ARG_SHOW_CURSOR,
277 ARG_USER_UNIT,
278 ARG_LIST_CATALOG,
279 ARG_DUMP_CATALOG,
280 ARG_UPDATE_CATALOG,
281 ARG_FORCE,
282 ARG_UTC,
283 ARG_FLUSH,
284 ARG_ROTATE,
285 ARG_VACUUM_SIZE,
286 ARG_VACUUM_FILES,
287 ARG_VACUUM_TIME,
288 };
289
290 static const struct option options[] = {
291 { "help", no_argument, NULL, 'h' },
292 { "version" , no_argument, NULL, ARG_VERSION },
293 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
294 { "pager-end", no_argument, NULL, 'e' },
295 { "follow", no_argument, NULL, 'f' },
296 { "force", no_argument, NULL, ARG_FORCE },
297 { "output", required_argument, NULL, 'o' },
298 { "all", no_argument, NULL, 'a' },
299 { "full", no_argument, NULL, 'l' },
300 { "no-full", no_argument, NULL, ARG_NO_FULL },
301 { "lines", optional_argument, NULL, 'n' },
302 { "no-tail", no_argument, NULL, ARG_NO_TAIL },
303 { "new-id128", no_argument, NULL, ARG_NEW_ID128 },
304 { "quiet", no_argument, NULL, 'q' },
305 { "merge", no_argument, NULL, 'm' },
306 { "boot", optional_argument, NULL, 'b' },
307 { "list-boots", no_argument, NULL, ARG_LIST_BOOTS },
308 { "this-boot", optional_argument, NULL, 'b' }, /* deprecated */
309 { "dmesg", no_argument, NULL, 'k' },
310 { "system", no_argument, NULL, ARG_SYSTEM },
311 { "user", no_argument, NULL, ARG_USER },
312 { "directory", required_argument, NULL, 'D' },
313 { "file", required_argument, NULL, ARG_FILE },
314 { "root", required_argument, NULL, ARG_ROOT },
315 { "header", no_argument, NULL, ARG_HEADER },
316 { "identifier", required_argument, NULL, 't' },
317 { "priority", required_argument, NULL, 'p' },
318 { "setup-keys", no_argument, NULL, ARG_SETUP_KEYS },
319 { "interval", required_argument, NULL, ARG_INTERVAL },
320 { "verify", no_argument, NULL, ARG_VERIFY },
321 { "verify-key", required_argument, NULL, ARG_VERIFY_KEY },
322 { "disk-usage", no_argument, NULL, ARG_DISK_USAGE },
323 { "cursor", required_argument, NULL, 'c' },
324 { "after-cursor", required_argument, NULL, ARG_AFTER_CURSOR },
325 { "show-cursor", no_argument, NULL, ARG_SHOW_CURSOR },
326 { "since", required_argument, NULL, ARG_SINCE },
327 { "until", required_argument, NULL, ARG_UNTIL },
328 { "unit", required_argument, NULL, 'u' },
329 { "user-unit", required_argument, NULL, ARG_USER_UNIT },
330 { "field", required_argument, NULL, 'F' },
331 { "catalog", no_argument, NULL, 'x' },
332 { "list-catalog", no_argument, NULL, ARG_LIST_CATALOG },
333 { "dump-catalog", no_argument, NULL, ARG_DUMP_CATALOG },
334 { "update-catalog", no_argument, NULL, ARG_UPDATE_CATALOG },
335 { "reverse", no_argument, NULL, 'r' },
336 { "machine", required_argument, NULL, 'M' },
337 { "utc", no_argument, NULL, ARG_UTC },
338 { "flush", no_argument, NULL, ARG_FLUSH },
339 { "rotate", no_argument, NULL, ARG_ROTATE },
340 { "vacuum-size", required_argument, NULL, ARG_VACUUM_SIZE },
341 { "vacuum-files", required_argument, NULL, ARG_VACUUM_FILES },
342 { "vacuum-time", required_argument, NULL, ARG_VACUUM_TIME },
343 {}
344 };
345
346 int c, r;
347
348 assert(argc >= 0);
349 assert(argv);
350
351 while ((c = getopt_long(argc, argv, "hefo:aln::qmb::kD:p:c:t:u:F:xrM:", options, NULL)) >= 0)
352
353 switch (c) {
354
355 case 'h':
356 help();
357 return 0;
358
359 case ARG_VERSION:
360 return version();
361
362 case ARG_NO_PAGER:
363 arg_no_pager = true;
364 break;
365
366 case 'e':
367 arg_pager_end = true;
368
369 if (arg_lines == ARG_LINES_DEFAULT)
370 arg_lines = 1000;
371
372 break;
373
374 case 'f':
375 arg_follow = true;
376 break;
377
378 case 'o':
379 arg_output = output_mode_from_string(optarg);
380 if (arg_output < 0) {
381 log_error("Unknown output format '%s'.", optarg);
382 return -EINVAL;
383 }
384
385 if (arg_output == OUTPUT_EXPORT ||
386 arg_output == OUTPUT_JSON ||
387 arg_output == OUTPUT_JSON_PRETTY ||
388 arg_output == OUTPUT_JSON_SSE ||
389 arg_output == OUTPUT_CAT)
390 arg_quiet = true;
391
392 break;
393
394 case 'l':
395 arg_full = true;
396 break;
397
398 case ARG_NO_FULL:
399 arg_full = false;
400 break;
401
402 case 'a':
403 arg_all = true;
404 break;
405
406 case 'n':
407 if (optarg) {
408 if (streq(optarg, "all"))
409 arg_lines = ARG_LINES_ALL;
410 else {
411 r = safe_atoi(optarg, &arg_lines);
412 if (r < 0 || arg_lines < 0) {
413 log_error("Failed to parse lines '%s'", optarg);
414 return -EINVAL;
415 }
416 }
417 } else {
418 arg_lines = 10;
419
420 /* Hmm, no argument? Maybe the next
421 * word on the command line is
422 * supposed to be the argument? Let's
423 * see if there is one, and is
424 * parsable. */
425 if (optind < argc) {
426 int n;
427 if (streq(argv[optind], "all")) {
428 arg_lines = ARG_LINES_ALL;
429 optind++;
430 } else if (safe_atoi(argv[optind], &n) >= 0 && n >= 0) {
431 arg_lines = n;
432 optind++;
433 }
434 }
435 }
436
437 break;
438
439 case ARG_NO_TAIL:
440 arg_no_tail = true;
441 break;
442
443 case ARG_NEW_ID128:
444 arg_action = ACTION_NEW_ID128;
445 break;
446
447 case 'q':
448 arg_quiet = true;
449 break;
450
451 case 'm':
452 arg_merge = true;
453 break;
454
455 case 'b':
456 arg_boot = true;
457
458 if (optarg) {
459 r = parse_boot_descriptor(optarg, &arg_boot_id, &arg_boot_offset);
460 if (r < 0) {
461 log_error("Failed to parse boot descriptor '%s'", optarg);
462 return -EINVAL;
463 }
464 } else {
465
466 /* Hmm, no argument? Maybe the next
467 * word on the command line is
468 * supposed to be the argument? Let's
469 * see if there is one and is parsable
470 * as a boot descriptor... */
471
472 if (optind < argc &&
473 parse_boot_descriptor(argv[optind], &arg_boot_id, &arg_boot_offset) >= 0)
474 optind++;
475 }
476
477 break;
478
479 case ARG_LIST_BOOTS:
480 arg_action = ACTION_LIST_BOOTS;
481 break;
482
483 case 'k':
484 arg_boot = arg_dmesg = true;
485 break;
486
487 case ARG_SYSTEM:
488 arg_journal_type |= SD_JOURNAL_SYSTEM;
489 break;
490
491 case ARG_USER:
492 arg_journal_type |= SD_JOURNAL_CURRENT_USER;
493 break;
494
495 case 'M':
496 arg_machine = optarg;
497 break;
498
499 case 'D':
500 arg_directory = optarg;
501 break;
502
503 case ARG_FILE:
504 r = glob_extend(&arg_file, optarg);
505 if (r < 0)
506 return log_error_errno(r, "Failed to add paths: %m");
507 break;
508
509 case ARG_ROOT:
510 arg_root = optarg;
511 break;
512
513 case 'c':
514 arg_cursor = optarg;
515 break;
516
517 case ARG_AFTER_CURSOR:
518 arg_after_cursor = optarg;
519 break;
520
521 case ARG_SHOW_CURSOR:
522 arg_show_cursor = true;
523 break;
524
525 case ARG_HEADER:
526 arg_action = ACTION_PRINT_HEADER;
527 break;
528
529 case ARG_VERIFY:
530 arg_action = ACTION_VERIFY;
531 break;
532
533 case ARG_DISK_USAGE:
534 arg_action = ACTION_DISK_USAGE;
535 break;
536
537 case ARG_VACUUM_SIZE:
538 r = parse_size(optarg, 1024, &arg_vacuum_size);
539 if (r < 0) {
540 log_error("Failed to parse vacuum size: %s", optarg);
541 return r;
542 }
543
544 arg_action = ACTION_VACUUM;
545 break;
546
547 case ARG_VACUUM_FILES:
548 r = safe_atou64(optarg, &arg_vacuum_n_files);
549 if (r < 0) {
550 log_error("Failed to parse vacuum files: %s", optarg);
551 return r;
552 }
553
554 arg_action = ACTION_VACUUM;
555 break;
556
557 case ARG_VACUUM_TIME:
558 r = parse_sec(optarg, &arg_vacuum_time);
559 if (r < 0) {
560 log_error("Failed to parse vacuum time: %s", optarg);
561 return r;
562 }
563
564 arg_action = ACTION_VACUUM;
565 break;
566
567 #ifdef HAVE_GCRYPT
568 case ARG_FORCE:
569 arg_force = true;
570 break;
571
572 case ARG_SETUP_KEYS:
573 arg_action = ACTION_SETUP_KEYS;
574 break;
575
576
577 case ARG_VERIFY_KEY:
578 arg_action = ACTION_VERIFY;
579 arg_verify_key = optarg;
580 arg_merge = false;
581 break;
582
583 case ARG_INTERVAL:
584 r = parse_sec(optarg, &arg_interval);
585 if (r < 0 || arg_interval <= 0) {
586 log_error("Failed to parse sealing key change interval: %s", optarg);
587 return -EINVAL;
588 }
589 break;
590 #else
591 case ARG_SETUP_KEYS:
592 case ARG_VERIFY_KEY:
593 case ARG_INTERVAL:
594 case ARG_FORCE:
595 log_error("Forward-secure sealing not available.");
596 return -EOPNOTSUPP;
597 #endif
598
599 case 'p': {
600 const char *dots;
601
602 dots = strstr(optarg, "..");
603 if (dots) {
604 char *a;
605 int from, to, i;
606
607 /* a range */
608 a = strndup(optarg, dots - optarg);
609 if (!a)
610 return log_oom();
611
612 from = log_level_from_string(a);
613 to = log_level_from_string(dots + 2);
614 free(a);
615
616 if (from < 0 || to < 0) {
617 log_error("Failed to parse log level range %s", optarg);
618 return -EINVAL;
619 }
620
621 arg_priorities = 0;
622
623 if (from < to) {
624 for (i = from; i <= to; i++)
625 arg_priorities |= 1 << i;
626 } else {
627 for (i = to; i <= from; i++)
628 arg_priorities |= 1 << i;
629 }
630
631 } else {
632 int p, i;
633
634 p = log_level_from_string(optarg);
635 if (p < 0) {
636 log_error("Unknown log level %s", optarg);
637 return -EINVAL;
638 }
639
640 arg_priorities = 0;
641
642 for (i = 0; i <= p; i++)
643 arg_priorities |= 1 << i;
644 }
645
646 break;
647 }
648
649 case ARG_SINCE:
650 r = parse_timestamp(optarg, &arg_since);
651 if (r < 0) {
652 log_error("Failed to parse timestamp: %s", optarg);
653 return -EINVAL;
654 }
655 arg_since_set = true;
656 break;
657
658 case ARG_UNTIL:
659 r = parse_timestamp(optarg, &arg_until);
660 if (r < 0) {
661 log_error("Failed to parse timestamp: %s", optarg);
662 return -EINVAL;
663 }
664 arg_until_set = true;
665 break;
666
667 case 't':
668 r = strv_extend(&arg_syslog_identifier, optarg);
669 if (r < 0)
670 return log_oom();
671 break;
672
673 case 'u':
674 r = strv_extend(&arg_system_units, optarg);
675 if (r < 0)
676 return log_oom();
677 break;
678
679 case ARG_USER_UNIT:
680 r = strv_extend(&arg_user_units, optarg);
681 if (r < 0)
682 return log_oom();
683 break;
684
685 case 'F':
686 arg_field = optarg;
687 break;
688
689 case 'x':
690 arg_catalog = true;
691 break;
692
693 case ARG_LIST_CATALOG:
694 arg_action = ACTION_LIST_CATALOG;
695 break;
696
697 case ARG_DUMP_CATALOG:
698 arg_action = ACTION_DUMP_CATALOG;
699 break;
700
701 case ARG_UPDATE_CATALOG:
702 arg_action = ACTION_UPDATE_CATALOG;
703 break;
704
705 case 'r':
706 arg_reverse = true;
707 break;
708
709 case ARG_UTC:
710 arg_utc = true;
711 break;
712
713 case ARG_FLUSH:
714 arg_action = ACTION_FLUSH;
715 break;
716
717 case ARG_ROTATE:
718 arg_action = ACTION_ROTATE;
719 break;
720
721 case '?':
722 return -EINVAL;
723
724 default:
725 assert_not_reached("Unhandled option");
726 }
727
728 if (arg_follow && !arg_no_tail && !arg_since && arg_lines == ARG_LINES_DEFAULT)
729 arg_lines = 10;
730
731 if (!!arg_directory + !!arg_file + !!arg_machine > 1) {
732 log_error("Please specify either -D/--directory= or --file= or -M/--machine=, not more than one.");
733 return -EINVAL;
734 }
735
736 if (arg_since_set && arg_until_set && arg_since > arg_until) {
737 log_error("--since= must be before --until=.");
738 return -EINVAL;
739 }
740
741 if (!!arg_cursor + !!arg_after_cursor + !!arg_since_set > 1) {
742 log_error("Please specify only one of --since=, --cursor=, and --after-cursor.");
743 return -EINVAL;
744 }
745
746 if (arg_follow && arg_reverse) {
747 log_error("Please specify either --reverse= or --follow=, not both.");
748 return -EINVAL;
749 }
750
751 if (arg_action != ACTION_SHOW && optind < argc) {
752 log_error("Extraneous arguments starting with '%s'", argv[optind]);
753 return -EINVAL;
754 }
755
756 if ((arg_boot || arg_action == ACTION_LIST_BOOTS) && (arg_file || arg_directory || arg_merge)) {
757 log_error("Using --boot or --list-boots with --file, --directory or --merge is not supported.");
758 return -EINVAL;
759 }
760
761 return 1;
762 }
763
764 static int generate_new_id128(void) {
765 sd_id128_t id;
766 int r;
767 unsigned i;
768
769 r = sd_id128_randomize(&id);
770 if (r < 0)
771 return log_error_errno(r, "Failed to generate ID: %m");
772
773 printf("As string:\n"
774 SD_ID128_FORMAT_STR "\n\n"
775 "As UUID:\n"
776 "%02x%02x%02x%02x-%02x%02x-%02x%02x-%02x%02x-%02x%02x%02x%02x%02x%02x\n\n"
777 "As macro:\n"
778 "#define MESSAGE_XYZ SD_ID128_MAKE(",
779 SD_ID128_FORMAT_VAL(id),
780 SD_ID128_FORMAT_VAL(id));
781 for (i = 0; i < 16; i++)
782 printf("%02x%s", id.bytes[i], i != 15 ? "," : "");
783 fputs(")\n\n", stdout);
784
785 printf("As Python constant:\n"
786 ">>> import uuid\n"
787 ">>> MESSAGE_XYZ = uuid.UUID('" SD_ID128_FORMAT_STR "')\n",
788 SD_ID128_FORMAT_VAL(id));
789
790 return 0;
791 }
792
793 static int add_matches(sd_journal *j, char **args) {
794 char **i;
795 bool have_term = false;
796
797 assert(j);
798
799 STRV_FOREACH(i, args) {
800 int r;
801
802 if (streq(*i, "+")) {
803 if (!have_term)
804 break;
805 r = sd_journal_add_disjunction(j);
806 have_term = false;
807
808 } else if (path_is_absolute(*i)) {
809 _cleanup_free_ char *p, *t = NULL, *t2 = NULL;
810 const char *path;
811 _cleanup_free_ char *interpreter = NULL;
812 struct stat st;
813
814 p = canonicalize_file_name(*i);
815 path = p ? p : *i;
816
817 if (lstat(path, &st) < 0)
818 return log_error_errno(errno, "Couldn't stat file: %m");
819
820 if (S_ISREG(st.st_mode) && (0111 & st.st_mode)) {
821 if (executable_is_script(path, &interpreter) > 0) {
822 _cleanup_free_ char *comm;
823
824 comm = strndup(basename(path), 15);
825 if (!comm)
826 return log_oom();
827
828 t = strappend("_COMM=", comm);
829
830 /* Append _EXE only if the interpreter is not a link.
831 Otherwise, it might be outdated often. */
832 if (lstat(interpreter, &st) == 0 &&
833 !S_ISLNK(st.st_mode)) {
834 t2 = strappend("_EXE=", interpreter);
835 if (!t2)
836 return log_oom();
837 }
838 } else
839 t = strappend("_EXE=", path);
840 } else if (S_ISCHR(st.st_mode))
841 (void) asprintf(&t, "_KERNEL_DEVICE=c%u:%u", major(st.st_rdev), minor(st.st_rdev));
842 else if (S_ISBLK(st.st_mode))
843 (void) asprintf(&t, "_KERNEL_DEVICE=b%u:%u", major(st.st_rdev), minor(st.st_rdev));
844 else {
845 log_error("File is neither a device node, nor regular file, nor executable: %s", *i);
846 return -EINVAL;
847 }
848
849 if (!t)
850 return log_oom();
851
852 r = sd_journal_add_match(j, t, 0);
853 if (t2)
854 r = sd_journal_add_match(j, t2, 0);
855 have_term = true;
856
857 } else {
858 r = sd_journal_add_match(j, *i, 0);
859 have_term = true;
860 }
861
862 if (r < 0)
863 return log_error_errno(r, "Failed to add match '%s': %m", *i);
864 }
865
866 if (!strv_isempty(args) && !have_term) {
867 log_error("\"+\" can only be used between terms");
868 return -EINVAL;
869 }
870
871 return 0;
872 }
873
874 static void boot_id_free_all(BootId *l) {
875
876 while (l) {
877 BootId *i = l;
878 LIST_REMOVE(boot_list, l, i);
879 free(i);
880 }
881 }
882
883 static int discover_next_boot(
884 sd_journal *j,
885 BootId **boot,
886 bool advance_older,
887 bool read_realtime) {
888
889 int r;
890 char match[9+32+1] = "_BOOT_ID=";
891 _cleanup_free_ BootId *next_boot = NULL;
892
893 assert(j);
894 assert(boot);
895
896 /* We expect the journal to be on the last position of a boot
897 * (in relation to the direction we are going), so that the next
898 * invocation of sd_journal_next/previous will be from a different
899 * boot. We then collect any information we desire and then jump
900 * to the last location of the new boot by using a _BOOT_ID match
901 * coming from the other journal direction. */
902
903 /* Make sure we aren't restricted by any _BOOT_ID matches, so that
904 * we can actually advance to a *different* boot. */
905 sd_journal_flush_matches(j);
906
907 if (advance_older)
908 r = sd_journal_previous(j);
909 else
910 r = sd_journal_next(j);
911 if (r < 0)
912 return r;
913 else if (r == 0)
914 return 0; /* End of journal, yay. */
915
916 next_boot = new0(BootId, 1);
917 if (!next_boot)
918 return -ENOMEM;
919
920 r = sd_journal_get_monotonic_usec(j, NULL, &next_boot->id);
921 if (r < 0)
922 return r;
923
924 if (read_realtime) {
925 r = sd_journal_get_realtime_usec(j, &next_boot->first);
926 if (r < 0)
927 return r;
928 }
929
930 /* Now seek to the last occurrence of this boot ID. */
931 sd_id128_to_string(next_boot->id, match + 9);
932 r = sd_journal_add_match(j, match, sizeof(match) - 1);
933 if (r < 0)
934 return r;
935
936 if (advance_older)
937 r = sd_journal_seek_head(j);
938 else
939 r = sd_journal_seek_tail(j);
940 if (r < 0)
941 return r;
942
943 if (advance_older)
944 r = sd_journal_next(j);
945 else
946 r = sd_journal_previous(j);
947 if (r < 0)
948 return r;
949 else if (r == 0)
950 return -ENODATA; /* This shouldn't happen. We just came from this very boot ID. */
951
952 if (read_realtime) {
953 r = sd_journal_get_realtime_usec(j, &next_boot->last);
954 if (r < 0)
955 return r;
956 }
957
958 *boot = next_boot;
959 next_boot = NULL;
960
961 return 0;
962 }
963
964 static int get_boots(
965 sd_journal *j,
966 BootId **boots,
967 BootId *query_ref_boot,
968 int ref_boot_offset) {
969
970 bool skip_once;
971 int r, count = 0;
972 BootId *head = NULL, *tail = NULL;
973 const bool advance_older = query_ref_boot && ref_boot_offset <= 0;
974
975 assert(j);
976
977 /* Adjust for the asymmetry that offset 0 is
978 * the last (and current) boot, while 1 is considered the
979 * (chronological) first boot in the journal. */
980 skip_once = query_ref_boot && sd_id128_is_null(query_ref_boot->id) && ref_boot_offset < 0;
981
982 /* Advance to the earliest/latest occurrence of our reference
983 * boot ID (taking our lookup direction into account), so that
984 * discover_next_boot() can do its job.
985 * If no reference is given, the journal head/tail will do,
986 * they're "virtual" boots after all. */
987 if (query_ref_boot && !sd_id128_is_null(query_ref_boot->id)) {
988 char match[9+32+1] = "_BOOT_ID=";
989
990 sd_journal_flush_matches(j);
991
992 sd_id128_to_string(query_ref_boot->id, match + 9);
993 r = sd_journal_add_match(j, match, sizeof(match) - 1);
994 if (r < 0)
995 return r;
996
997 if (advance_older)
998 r = sd_journal_seek_head(j);
999 else
1000 r = sd_journal_seek_tail(j);
1001 if (r < 0)
1002 return r;
1003
1004 if (advance_older)
1005 r = sd_journal_next(j);
1006 else
1007 r = sd_journal_previous(j);
1008 if (r < 0)
1009 return r;
1010 else if (r == 0)
1011 goto finish;
1012 else if (ref_boot_offset == 0) {
1013 count = 1;
1014 goto finish;
1015 }
1016 } else {
1017 if (advance_older)
1018 r = sd_journal_seek_tail(j);
1019 else
1020 r = sd_journal_seek_head(j);
1021 if (r < 0)
1022 return r;
1023
1024 /* No sd_journal_next/previous here. */
1025 }
1026
1027 for (;;) {
1028 _cleanup_free_ BootId *current = NULL;
1029
1030 r = discover_next_boot(j, &current, advance_older, !query_ref_boot);
1031 if (r < 0) {
1032 boot_id_free_all(head);
1033 return r;
1034 }
1035
1036 if (!current)
1037 break;
1038
1039 if (query_ref_boot) {
1040 if (!skip_once)
1041 ref_boot_offset += advance_older ? 1 : -1;
1042 skip_once = false;
1043
1044 if (ref_boot_offset == 0) {
1045 count = 1;
1046 query_ref_boot->id = current->id;
1047 break;
1048 }
1049 } else {
1050 LIST_INSERT_AFTER(boot_list, head, tail, current);
1051 tail = current;
1052 current = NULL;
1053 count++;
1054 }
1055 }
1056
1057 finish:
1058 if (boots)
1059 *boots = head;
1060
1061 sd_journal_flush_matches(j);
1062
1063 return count;
1064 }
1065
1066 static int list_boots(sd_journal *j) {
1067 int w, i, count;
1068 BootId *id, *all_ids;
1069
1070 assert(j);
1071
1072 count = get_boots(j, &all_ids, NULL, 0);
1073 if (count < 0)
1074 return log_error_errno(count, "Failed to determine boots: %m");
1075 if (count == 0)
1076 return count;
1077
1078 pager_open_if_enabled();
1079
1080 /* numbers are one less, but we need an extra char for the sign */
1081 w = DECIMAL_STR_WIDTH(count - 1) + 1;
1082
1083 i = 0;
1084 LIST_FOREACH(boot_list, id, all_ids) {
1085 char a[FORMAT_TIMESTAMP_MAX], b[FORMAT_TIMESTAMP_MAX];
1086
1087 printf("% *i " SD_ID128_FORMAT_STR " %s—%s\n",
1088 w, i - count + 1,
1089 SD_ID128_FORMAT_VAL(id->id),
1090 format_timestamp_maybe_utc(a, sizeof(a), id->first),
1091 format_timestamp_maybe_utc(b, sizeof(b), id->last));
1092 i++;
1093 }
1094
1095 boot_id_free_all(all_ids);
1096
1097 return 0;
1098 }
1099
1100 static int add_boot(sd_journal *j) {
1101 char match[9+32+1] = "_BOOT_ID=";
1102 int r;
1103 BootId ref_boot_id = {};
1104
1105 assert(j);
1106
1107 if (!arg_boot)
1108 return 0;
1109
1110 if (arg_boot_offset == 0 && sd_id128_equal(arg_boot_id, SD_ID128_NULL))
1111 return add_match_this_boot(j, arg_machine);
1112
1113 ref_boot_id.id = arg_boot_id;
1114 r = get_boots(j, NULL, &ref_boot_id, arg_boot_offset);
1115 assert(r <= 1);
1116 if (r <= 0) {
1117 const char *reason = (r == 0) ? "No such boot ID in journal" : strerror(-r);
1118
1119 if (sd_id128_is_null(arg_boot_id))
1120 log_error("Failed to look up boot %+i: %s", arg_boot_offset, reason);
1121 else
1122 log_error("Failed to look up boot ID "SD_ID128_FORMAT_STR"%+i: %s",
1123 SD_ID128_FORMAT_VAL(arg_boot_id), arg_boot_offset, reason);
1124
1125 return r == 0 ? -ENODATA : r;
1126 }
1127
1128 sd_id128_to_string(ref_boot_id.id, match + 9);
1129
1130 r = sd_journal_add_match(j, match, sizeof(match) - 1);
1131 if (r < 0)
1132 return log_error_errno(r, "Failed to add match: %m");
1133
1134 r = sd_journal_add_conjunction(j);
1135 if (r < 0)
1136 return log_error_errno(r, "Failed to add conjunction: %m");
1137
1138 return 0;
1139 }
1140
1141 static int add_dmesg(sd_journal *j) {
1142 int r;
1143 assert(j);
1144
1145 if (!arg_dmesg)
1146 return 0;
1147
1148 r = sd_journal_add_match(j, "_TRANSPORT=kernel", strlen("_TRANSPORT=kernel"));
1149 if (r < 0)
1150 return log_error_errno(r, "Failed to add match: %m");
1151
1152 r = sd_journal_add_conjunction(j);
1153 if (r < 0)
1154 return log_error_errno(r, "Failed to add conjunction: %m");
1155
1156 return 0;
1157 }
1158
1159 static int get_possible_units(
1160 sd_journal *j,
1161 const char *fields,
1162 char **patterns,
1163 Set **units) {
1164
1165 _cleanup_set_free_free_ Set *found;
1166 const char *field;
1167 int r;
1168
1169 found = set_new(&string_hash_ops);
1170 if (!found)
1171 return -ENOMEM;
1172
1173 NULSTR_FOREACH(field, fields) {
1174 const void *data;
1175 size_t size;
1176
1177 r = sd_journal_query_unique(j, field);
1178 if (r < 0)
1179 return r;
1180
1181 SD_JOURNAL_FOREACH_UNIQUE(j, data, size) {
1182 char **pattern, *eq;
1183 size_t prefix;
1184 _cleanup_free_ char *u = NULL;
1185
1186 eq = memchr(data, '=', size);
1187 if (eq)
1188 prefix = eq - (char*) data + 1;
1189 else
1190 prefix = 0;
1191
1192 u = strndup((char*) data + prefix, size - prefix);
1193 if (!u)
1194 return -ENOMEM;
1195
1196 STRV_FOREACH(pattern, patterns)
1197 if (fnmatch(*pattern, u, FNM_NOESCAPE) == 0) {
1198 log_debug("Matched %s with pattern %s=%s", u, field, *pattern);
1199
1200 r = set_consume(found, u);
1201 u = NULL;
1202 if (r < 0 && r != -EEXIST)
1203 return r;
1204
1205 break;
1206 }
1207 }
1208 }
1209
1210 *units = found;
1211 found = NULL;
1212 return 0;
1213 }
1214
1215 /* This list is supposed to return the superset of unit names
1216 * possibly matched by rules added with add_matches_for_unit... */
1217 #define SYSTEM_UNITS \
1218 "_SYSTEMD_UNIT\0" \
1219 "COREDUMP_UNIT\0" \
1220 "UNIT\0" \
1221 "OBJECT_SYSTEMD_UNIT\0" \
1222 "_SYSTEMD_SLICE\0"
1223
1224 /* ... and add_matches_for_user_unit */
1225 #define USER_UNITS \
1226 "_SYSTEMD_USER_UNIT\0" \
1227 "USER_UNIT\0" \
1228 "COREDUMP_USER_UNIT\0" \
1229 "OBJECT_SYSTEMD_USER_UNIT\0"
1230
1231 static int add_units(sd_journal *j) {
1232 _cleanup_strv_free_ char **patterns = NULL;
1233 int r, count = 0;
1234 char **i;
1235
1236 assert(j);
1237
1238 STRV_FOREACH(i, arg_system_units) {
1239 _cleanup_free_ char *u = NULL;
1240
1241 r = unit_name_mangle(*i, UNIT_NAME_GLOB, &u);
1242 if (r < 0)
1243 return r;
1244
1245 if (string_is_glob(u)) {
1246 r = strv_push(&patterns, u);
1247 if (r < 0)
1248 return r;
1249 u = NULL;
1250 } else {
1251 r = add_matches_for_unit(j, u);
1252 if (r < 0)
1253 return r;
1254 r = sd_journal_add_disjunction(j);
1255 if (r < 0)
1256 return r;
1257 count ++;
1258 }
1259 }
1260
1261 if (!strv_isempty(patterns)) {
1262 _cleanup_set_free_free_ Set *units = NULL;
1263 Iterator it;
1264 char *u;
1265
1266 r = get_possible_units(j, SYSTEM_UNITS, patterns, &units);
1267 if (r < 0)
1268 return r;
1269
1270 SET_FOREACH(u, units, it) {
1271 r = add_matches_for_unit(j, u);
1272 if (r < 0)
1273 return r;
1274 r = sd_journal_add_disjunction(j);
1275 if (r < 0)
1276 return r;
1277 count ++;
1278 }
1279 }
1280
1281 patterns = strv_free(patterns);
1282
1283 STRV_FOREACH(i, arg_user_units) {
1284 _cleanup_free_ char *u = NULL;
1285
1286 r = unit_name_mangle(*i, UNIT_NAME_GLOB, &u);
1287 if (r < 0)
1288 return r;
1289
1290 if (string_is_glob(u)) {
1291 r = strv_push(&patterns, u);
1292 if (r < 0)
1293 return r;
1294 u = NULL;
1295 } else {
1296 r = add_matches_for_user_unit(j, u, getuid());
1297 if (r < 0)
1298 return r;
1299 r = sd_journal_add_disjunction(j);
1300 if (r < 0)
1301 return r;
1302 count ++;
1303 }
1304 }
1305
1306 if (!strv_isempty(patterns)) {
1307 _cleanup_set_free_free_ Set *units = NULL;
1308 Iterator it;
1309 char *u;
1310
1311 r = get_possible_units(j, USER_UNITS, patterns, &units);
1312 if (r < 0)
1313 return r;
1314
1315 SET_FOREACH(u, units, it) {
1316 r = add_matches_for_user_unit(j, u, getuid());
1317 if (r < 0)
1318 return r;
1319 r = sd_journal_add_disjunction(j);
1320 if (r < 0)
1321 return r;
1322 count ++;
1323 }
1324 }
1325
1326 /* Complain if the user request matches but nothing whatsoever was
1327 * found, since otherwise everything would be matched. */
1328 if (!(strv_isempty(arg_system_units) && strv_isempty(arg_user_units)) && count == 0)
1329 return -ENODATA;
1330
1331 r = sd_journal_add_conjunction(j);
1332 if (r < 0)
1333 return r;
1334
1335 return 0;
1336 }
1337
1338 static int add_priorities(sd_journal *j) {
1339 char match[] = "PRIORITY=0";
1340 int i, r;
1341 assert(j);
1342
1343 if (arg_priorities == 0xFF)
1344 return 0;
1345
1346 for (i = LOG_EMERG; i <= LOG_DEBUG; i++)
1347 if (arg_priorities & (1 << i)) {
1348 match[sizeof(match)-2] = '0' + i;
1349
1350 r = sd_journal_add_match(j, match, strlen(match));
1351 if (r < 0)
1352 return log_error_errno(r, "Failed to add match: %m");
1353 }
1354
1355 r = sd_journal_add_conjunction(j);
1356 if (r < 0)
1357 return log_error_errno(r, "Failed to add conjunction: %m");
1358
1359 return 0;
1360 }
1361
1362
1363 static int add_syslog_identifier(sd_journal *j) {
1364 int r;
1365 char **i;
1366
1367 assert(j);
1368
1369 STRV_FOREACH(i, arg_syslog_identifier) {
1370 char *u;
1371
1372 u = strjoina("SYSLOG_IDENTIFIER=", *i);
1373 r = sd_journal_add_match(j, u, 0);
1374 if (r < 0)
1375 return r;
1376 r = sd_journal_add_disjunction(j);
1377 if (r < 0)
1378 return r;
1379 }
1380
1381 r = sd_journal_add_conjunction(j);
1382 if (r < 0)
1383 return r;
1384
1385 return 0;
1386 }
1387
1388 static int setup_keys(void) {
1389 #ifdef HAVE_GCRYPT
1390 size_t mpk_size, seed_size, state_size, i;
1391 uint8_t *mpk, *seed, *state;
1392 int fd = -1, r;
1393 sd_id128_t machine, boot;
1394 char *p = NULL, *k = NULL;
1395 struct FSSHeader h;
1396 uint64_t n;
1397 struct stat st;
1398
1399 r = stat("/var/log/journal", &st);
1400 if (r < 0 && errno != ENOENT && errno != ENOTDIR)
1401 return log_error_errno(errno, "stat(\"%s\") failed: %m", "/var/log/journal");
1402
1403 if (r < 0 || !S_ISDIR(st.st_mode)) {
1404 log_error("%s is not a directory, must be using persistent logging for FSS.",
1405 "/var/log/journal");
1406 return r < 0 ? -errno : -ENOTDIR;
1407 }
1408
1409 r = sd_id128_get_machine(&machine);
1410 if (r < 0)
1411 return log_error_errno(r, "Failed to get machine ID: %m");
1412
1413 r = sd_id128_get_boot(&boot);
1414 if (r < 0)
1415 return log_error_errno(r, "Failed to get boot ID: %m");
1416
1417 if (asprintf(&p, "/var/log/journal/" SD_ID128_FORMAT_STR "/fss",
1418 SD_ID128_FORMAT_VAL(machine)) < 0)
1419 return log_oom();
1420
1421 if (arg_force) {
1422 r = unlink(p);
1423 if (r < 0 && errno != ENOENT) {
1424 r = log_error_errno(errno, "unlink(\"%s\") failed: %m", p);
1425 goto finish;
1426 }
1427 } else if (access(p, F_OK) >= 0) {
1428 log_error("Sealing key file %s exists already. Use --force to recreate.", p);
1429 r = -EEXIST;
1430 goto finish;
1431 }
1432
1433 if (asprintf(&k, "/var/log/journal/" SD_ID128_FORMAT_STR "/fss.tmp.XXXXXX",
1434 SD_ID128_FORMAT_VAL(machine)) < 0) {
1435 r = log_oom();
1436 goto finish;
1437 }
1438
1439 mpk_size = FSPRG_mskinbytes(FSPRG_RECOMMENDED_SECPAR);
1440 mpk = alloca(mpk_size);
1441
1442 seed_size = FSPRG_RECOMMENDED_SEEDLEN;
1443 seed = alloca(seed_size);
1444
1445 state_size = FSPRG_stateinbytes(FSPRG_RECOMMENDED_SECPAR);
1446 state = alloca(state_size);
1447
1448 fd = open("/dev/random", O_RDONLY|O_CLOEXEC|O_NOCTTY);
1449 if (fd < 0) {
1450 r = log_error_errno(errno, "Failed to open /dev/random: %m");
1451 goto finish;
1452 }
1453
1454 log_info("Generating seed...");
1455 r = loop_read_exact(fd, seed, seed_size, true);
1456 if (r < 0) {
1457 log_error_errno(r, "Failed to read random seed: %m");
1458 goto finish;
1459 }
1460
1461 log_info("Generating key pair...");
1462 FSPRG_GenMK(NULL, mpk, seed, seed_size, FSPRG_RECOMMENDED_SECPAR);
1463
1464 log_info("Generating sealing key...");
1465 FSPRG_GenState0(state, mpk, seed, seed_size);
1466
1467 assert(arg_interval > 0);
1468
1469 n = now(CLOCK_REALTIME);
1470 n /= arg_interval;
1471
1472 safe_close(fd);
1473 fd = mkostemp_safe(k, O_WRONLY|O_CLOEXEC);
1474 if (fd < 0) {
1475 r = log_error_errno(errno, "Failed to open %s: %m", k);
1476 goto finish;
1477 }
1478
1479 /* Enable secure remove, exclusion from dump, synchronous
1480 * writing and in-place updating */
1481 r = chattr_fd(fd, FS_SECRM_FL|FS_NODUMP_FL|FS_SYNC_FL|FS_NOCOW_FL, FS_SECRM_FL|FS_NODUMP_FL|FS_SYNC_FL|FS_NOCOW_FL);
1482 if (r < 0)
1483 log_warning_errno(errno, "Failed to set file attributes: %m");
1484
1485 zero(h);
1486 memcpy(h.signature, "KSHHRHLP", 8);
1487 h.machine_id = machine;
1488 h.boot_id = boot;
1489 h.header_size = htole64(sizeof(h));
1490 h.start_usec = htole64(n * arg_interval);
1491 h.interval_usec = htole64(arg_interval);
1492 h.fsprg_secpar = htole16(FSPRG_RECOMMENDED_SECPAR);
1493 h.fsprg_state_size = htole64(state_size);
1494
1495 r = loop_write(fd, &h, sizeof(h), false);
1496 if (r < 0) {
1497 log_error_errno(r, "Failed to write header: %m");
1498 goto finish;
1499 }
1500
1501 r = loop_write(fd, state, state_size, false);
1502 if (r < 0) {
1503 log_error_errno(r, "Failed to write state: %m");
1504 goto finish;
1505 }
1506
1507 if (link(k, p) < 0) {
1508 r = log_error_errno(errno, "Failed to link file: %m");
1509 goto finish;
1510 }
1511
1512 if (on_tty()) {
1513 fprintf(stderr,
1514 "\n"
1515 "The new key pair has been generated. The " ANSI_HIGHLIGHT "secret sealing key" ANSI_NORMAL " has been written to\n"
1516 "the following local file. This key file is automatically updated when the\n"
1517 "sealing key is advanced. It should not be used on multiple hosts.\n"
1518 "\n"
1519 "\t%s\n"
1520 "\n"
1521 "Please write down the following " ANSI_HIGHLIGHT "secret verification key" ANSI_NORMAL ". It should be stored\n"
1522 "at a safe location and should not be saved locally on disk.\n"
1523 "\n\t" ANSI_HIGHLIGHT_RED, p);
1524 fflush(stderr);
1525 }
1526 for (i = 0; i < seed_size; i++) {
1527 if (i > 0 && i % 3 == 0)
1528 putchar('-');
1529 printf("%02x", ((uint8_t*) seed)[i]);
1530 }
1531
1532 printf("/%llx-%llx\n", (unsigned long long) n, (unsigned long long) arg_interval);
1533
1534 if (on_tty()) {
1535 char tsb[FORMAT_TIMESPAN_MAX], *hn;
1536
1537 fprintf(stderr,
1538 ANSI_NORMAL "\n"
1539 "The sealing key is automatically changed every %s.\n",
1540 format_timespan(tsb, sizeof(tsb), arg_interval, 0));
1541
1542 hn = gethostname_malloc();
1543
1544 if (hn) {
1545 hostname_cleanup(hn);
1546 fprintf(stderr, "\nThe keys have been generated for host %s/" SD_ID128_FORMAT_STR ".\n", hn, SD_ID128_FORMAT_VAL(machine));
1547 } else
1548 fprintf(stderr, "\nThe keys have been generated for host " SD_ID128_FORMAT_STR ".\n", SD_ID128_FORMAT_VAL(machine));
1549
1550 #ifdef HAVE_QRENCODE
1551 /* If this is not an UTF-8 system don't print any QR codes */
1552 if (is_locale_utf8()) {
1553 fputs("\nTo transfer the verification key to your phone please scan the QR code below:\n\n", stderr);
1554 print_qr_code(stderr, seed, seed_size, n, arg_interval, hn, machine);
1555 }
1556 #endif
1557 free(hn);
1558 }
1559
1560 r = 0;
1561
1562 finish:
1563 safe_close(fd);
1564
1565 if (k) {
1566 unlink(k);
1567 free(k);
1568 }
1569
1570 free(p);
1571
1572 return r;
1573 #else
1574 log_error("Forward-secure sealing not available.");
1575 return -EOPNOTSUPP;
1576 #endif
1577 }
1578
1579 static int verify(sd_journal *j) {
1580 int r = 0;
1581 Iterator i;
1582 JournalFile *f;
1583
1584 assert(j);
1585
1586 log_show_color(true);
1587
1588 ORDERED_HASHMAP_FOREACH(f, j->files, i) {
1589 int k;
1590 usec_t first = 0, validated = 0, last = 0;
1591
1592 #ifdef HAVE_GCRYPT
1593 if (!arg_verify_key && JOURNAL_HEADER_SEALED(f->header))
1594 log_notice("Journal file %s has sealing enabled but verification key has not been passed using --verify-key=.", f->path);
1595 #endif
1596
1597 k = journal_file_verify(f, arg_verify_key, &first, &validated, &last, true);
1598 if (k == -EINVAL) {
1599 /* If the key was invalid give up right-away. */
1600 return k;
1601 } else if (k < 0) {
1602 log_warning_errno(k, "FAIL: %s (%m)", f->path);
1603 r = k;
1604 } else {
1605 char a[FORMAT_TIMESTAMP_MAX], b[FORMAT_TIMESTAMP_MAX], c[FORMAT_TIMESPAN_MAX];
1606 log_info("PASS: %s", f->path);
1607
1608 if (arg_verify_key && JOURNAL_HEADER_SEALED(f->header)) {
1609 if (validated > 0) {
1610 log_info("=> Validated from %s to %s, final %s entries not sealed.",
1611 format_timestamp_maybe_utc(a, sizeof(a), first),
1612 format_timestamp_maybe_utc(b, sizeof(b), validated),
1613 format_timespan(c, sizeof(c), last > validated ? last - validated : 0, 0));
1614 } else if (last > 0)
1615 log_info("=> No sealing yet, %s of entries not sealed.",
1616 format_timespan(c, sizeof(c), last - first, 0));
1617 else
1618 log_info("=> No sealing yet, no entries in file.");
1619 }
1620 }
1621 }
1622
1623 return r;
1624 }
1625
1626 static int access_check_var_log_journal(sd_journal *j) {
1627 #ifdef HAVE_ACL
1628 _cleanup_strv_free_ char **g = NULL;
1629 const char* dir;
1630 #endif
1631 int r;
1632
1633 assert(j);
1634
1635 if (arg_quiet)
1636 return 0;
1637
1638 /* If we are root, we should have access, don't warn. */
1639 if (getuid() == 0)
1640 return 0;
1641
1642 /* If we are in the 'systemd-journal' group, we should have
1643 * access too. */
1644 r = in_group("systemd-journal");
1645 if (r < 0)
1646 return log_error_errno(r, "Failed to check if we are in the 'systemd-journal' group: %m");
1647 if (r > 0)
1648 return 0;
1649
1650 #ifdef HAVE_ACL
1651 if (laccess("/run/log/journal", F_OK) >= 0)
1652 dir = "/run/log/journal";
1653 else
1654 dir = "/var/log/journal";
1655
1656 /* If we are in any of the groups listed in the journal ACLs,
1657 * then all is good, too. Let's enumerate all groups from the
1658 * default ACL of the directory, which generally should allow
1659 * access to most journal files too. */
1660 r = acl_search_groups(dir, &g);
1661 if (r < 0)
1662 return log_error_errno(r, "Failed to search journal ACL: %m");
1663 if (r > 0)
1664 return 0;
1665
1666 /* Print a pretty list, if there were ACLs set. */
1667 if (!strv_isempty(g)) {
1668 _cleanup_free_ char *s = NULL;
1669
1670 /* Thre are groups in the ACL, let's list them */
1671 r = strv_extend(&g, "systemd-journal");
1672 if (r < 0)
1673 return log_oom();
1674
1675 strv_sort(g);
1676 strv_uniq(g);
1677
1678 s = strv_join(g, "', '");
1679 if (!s)
1680 return log_oom();
1681
1682 log_notice("Hint: You are currently not seeing messages from other users and the system.\n"
1683 " Users in groups '%s' can see all messages.\n"
1684 " Pass -q to turn off this notice.", s);
1685 return 1;
1686 }
1687 #endif
1688
1689 /* If no ACLs were found, print a short version of the message. */
1690 log_notice("Hint: You are currently not seeing messages from other users and the system.\n"
1691 " Users in the 'systemd-journal' group can see all messages. Pass -q to\n"
1692 " turn off this notice.");
1693
1694 return 1;
1695 }
1696
1697 static int access_check(sd_journal *j) {
1698 Iterator it;
1699 void *code;
1700 int r = 0;
1701
1702 assert(j);
1703
1704 if (set_isempty(j->errors)) {
1705 if (ordered_hashmap_isempty(j->files))
1706 log_notice("No journal files were found.");
1707
1708 return 0;
1709 }
1710
1711 if (set_contains(j->errors, INT_TO_PTR(-EACCES))) {
1712 (void) access_check_var_log_journal(j);
1713
1714 if (ordered_hashmap_isempty(j->files))
1715 r = log_error_errno(EACCES, "No journal files were opened due to insufficient permissions.");
1716 }
1717
1718 SET_FOREACH(code, j->errors, it) {
1719 int err;
1720
1721 err = -PTR_TO_INT(code);
1722 assert(err > 0);
1723
1724 if (err == EACCES)
1725 continue;
1726
1727 log_warning_errno(err, "Error was encountered while opening journal files: %m");
1728 if (r == 0)
1729 r = -err;
1730 }
1731
1732 return r;
1733 }
1734
1735 static int flush_to_var(void) {
1736 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
1737 _cleanup_bus_flush_close_unref_ sd_bus *bus = NULL;
1738 _cleanup_close_ int watch_fd = -1;
1739 int r;
1740
1741 /* Quick exit */
1742 if (access("/run/systemd/journal/flushed", F_OK) >= 0)
1743 return 0;
1744
1745 /* OK, let's actually do the full logic, send SIGUSR1 to the
1746 * daemon and set up inotify to wait for the flushed file to appear */
1747 r = bus_connect_system_systemd(&bus);
1748 if (r < 0)
1749 return log_error_errno(r, "Failed to get D-Bus connection: %m");
1750
1751 r = sd_bus_call_method(
1752 bus,
1753 "org.freedesktop.systemd1",
1754 "/org/freedesktop/systemd1",
1755 "org.freedesktop.systemd1.Manager",
1756 "KillUnit",
1757 &error,
1758 NULL,
1759 "ssi", "systemd-journald.service", "main", SIGUSR1);
1760 if (r < 0) {
1761 log_error("Failed to kill journal service: %s", bus_error_message(&error, r));
1762 return r;
1763 }
1764
1765 mkdir_p("/run/systemd/journal", 0755);
1766
1767 watch_fd = inotify_init1(IN_NONBLOCK|IN_CLOEXEC);
1768 if (watch_fd < 0)
1769 return log_error_errno(errno, "Failed to create inotify watch: %m");
1770
1771 r = inotify_add_watch(watch_fd, "/run/systemd/journal", IN_CREATE|IN_DONT_FOLLOW|IN_ONLYDIR);
1772 if (r < 0)
1773 return log_error_errno(errno, "Failed to watch journal directory: %m");
1774
1775 for (;;) {
1776 if (access("/run/systemd/journal/flushed", F_OK) >= 0)
1777 break;
1778
1779 if (errno != ENOENT)
1780 return log_error_errno(errno, "Failed to check for existence of /run/systemd/journal/flushed: %m");
1781
1782 r = fd_wait_for_event(watch_fd, POLLIN, USEC_INFINITY);
1783 if (r < 0)
1784 return log_error_errno(r, "Failed to wait for event: %m");
1785
1786 r = flush_fd(watch_fd);
1787 if (r < 0)
1788 return log_error_errno(r, "Failed to flush inotify events: %m");
1789 }
1790
1791 return 0;
1792 }
1793
1794 static int rotate(void) {
1795 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
1796 _cleanup_bus_flush_close_unref_ sd_bus *bus = NULL;
1797 int r;
1798
1799 r = bus_connect_system_systemd(&bus);
1800 if (r < 0)
1801 return log_error_errno(r, "Failed to get D-Bus connection: %m");
1802
1803 r = sd_bus_call_method(
1804 bus,
1805 "org.freedesktop.systemd1",
1806 "/org/freedesktop/systemd1",
1807 "org.freedesktop.systemd1.Manager",
1808 "KillUnit",
1809 &error,
1810 NULL,
1811 "ssi", "systemd-journald.service", "main", SIGUSR2);
1812 if (r < 0)
1813 return log_error_errno(r, "Failed to kill journal service: %s", bus_error_message(&error, r));
1814
1815 return 0;
1816 }
1817
1818 int main(int argc, char *argv[]) {
1819 int r;
1820 _cleanup_journal_close_ sd_journal *j = NULL;
1821 bool need_seek = false;
1822 sd_id128_t previous_boot_id;
1823 bool previous_boot_id_valid = false, first_line = true;
1824 int n_shown = 0;
1825 bool ellipsized = false;
1826
1827 setlocale(LC_ALL, "");
1828 log_parse_environment();
1829 log_open();
1830
1831 r = parse_argv(argc, argv);
1832 if (r <= 0)
1833 goto finish;
1834
1835 signal(SIGWINCH, columns_lines_cache_reset);
1836 sigbus_install();
1837
1838 /* Increase max number of open files to 16K if we can, we
1839 * might needs this when browsing journal files, which might
1840 * be split up into many files. */
1841 setrlimit_closest(RLIMIT_NOFILE, &RLIMIT_MAKE_CONST(16384));
1842
1843 if (arg_action == ACTION_NEW_ID128) {
1844 r = generate_new_id128();
1845 goto finish;
1846 }
1847
1848 if (arg_action == ACTION_FLUSH) {
1849 r = flush_to_var();
1850 goto finish;
1851 }
1852
1853 if (arg_action == ACTION_ROTATE) {
1854 r = rotate();
1855 goto finish;
1856 }
1857
1858 if (arg_action == ACTION_SETUP_KEYS) {
1859 r = setup_keys();
1860 goto finish;
1861 }
1862
1863 if (arg_action == ACTION_UPDATE_CATALOG ||
1864 arg_action == ACTION_LIST_CATALOG ||
1865 arg_action == ACTION_DUMP_CATALOG) {
1866
1867 _cleanup_free_ char *database;
1868
1869 database = path_join(arg_root, CATALOG_DATABASE, NULL);
1870 if (!database) {
1871 r = log_oom();
1872 goto finish;
1873 }
1874
1875 if (arg_action == ACTION_UPDATE_CATALOG) {
1876 r = catalog_update(database, arg_root, catalog_file_dirs);
1877 if (r < 0)
1878 log_error_errno(r, "Failed to list catalog: %m");
1879 } else {
1880 bool oneline = arg_action == ACTION_LIST_CATALOG;
1881
1882 if (optind < argc)
1883 r = catalog_list_items(stdout, database,
1884 oneline, argv + optind);
1885 else
1886 r = catalog_list(stdout, database, oneline);
1887 if (r < 0)
1888 log_error_errno(r, "Failed to list catalog: %m");
1889 }
1890
1891 goto finish;
1892 }
1893
1894 if (arg_directory)
1895 r = sd_journal_open_directory(&j, arg_directory, arg_journal_type);
1896 else if (arg_file)
1897 r = sd_journal_open_files(&j, (const char**) arg_file, 0);
1898 else if (arg_machine)
1899 r = sd_journal_open_container(&j, arg_machine, 0);
1900 else
1901 r = sd_journal_open(&j, !arg_merge*SD_JOURNAL_LOCAL_ONLY + arg_journal_type);
1902 if (r < 0) {
1903 log_error_errno(r, "Failed to open %s: %m",
1904 arg_directory ? arg_directory : arg_file ? "files" : "journal");
1905 goto finish;
1906 }
1907
1908 r = access_check(j);
1909 if (r < 0)
1910 goto finish;
1911
1912 if (arg_action == ACTION_VERIFY) {
1913 r = verify(j);
1914 goto finish;
1915 }
1916
1917 if (arg_action == ACTION_PRINT_HEADER) {
1918 journal_print_header(j);
1919 r = 0;
1920 goto finish;
1921 }
1922
1923 if (arg_action == ACTION_DISK_USAGE) {
1924 uint64_t bytes = 0;
1925 char sbytes[FORMAT_BYTES_MAX];
1926
1927 r = sd_journal_get_usage(j, &bytes);
1928 if (r < 0)
1929 goto finish;
1930
1931 printf("Archived and active journals take up %s on disk.\n",
1932 format_bytes(sbytes, sizeof(sbytes), bytes));
1933 goto finish;
1934 }
1935
1936 if (arg_action == ACTION_VACUUM) {
1937 Directory *d;
1938 Iterator i;
1939
1940 HASHMAP_FOREACH(d, j->directories_by_path, i) {
1941 int q;
1942
1943 if (d->is_root)
1944 continue;
1945
1946 q = journal_directory_vacuum(d->path, arg_vacuum_size, arg_vacuum_n_files, arg_vacuum_time, NULL, true);
1947 if (q < 0) {
1948 log_error_errno(q, "Failed to vacuum %s: %m", d->path);
1949 r = q;
1950 }
1951 }
1952
1953 goto finish;
1954 }
1955
1956 if (arg_action == ACTION_LIST_BOOTS) {
1957 r = list_boots(j);
1958 goto finish;
1959 }
1960
1961 /* add_boot() must be called first!
1962 * It may need to seek the journal to find parent boot IDs. */
1963 r = add_boot(j);
1964 if (r < 0)
1965 goto finish;
1966
1967 r = add_dmesg(j);
1968 if (r < 0)
1969 goto finish;
1970
1971 r = add_units(j);
1972 if (r < 0) {
1973 log_error_errno(r, "Failed to add filter for units: %m");
1974 goto finish;
1975 }
1976
1977 r = add_syslog_identifier(j);
1978 if (r < 0) {
1979 log_error_errno(r, "Failed to add filter for syslog identifiers: %m");
1980 goto finish;
1981 }
1982
1983 r = add_priorities(j);
1984 if (r < 0)
1985 goto finish;
1986
1987 r = add_matches(j, argv + optind);
1988 if (r < 0)
1989 goto finish;
1990
1991 if (_unlikely_(log_get_max_level() >= LOG_DEBUG)) {
1992 _cleanup_free_ char *filter;
1993
1994 filter = journal_make_match_string(j);
1995 if (!filter)
1996 return log_oom();
1997
1998 log_debug("Journal filter: %s", filter);
1999 }
2000
2001 if (arg_field) {
2002 const void *data;
2003 size_t size;
2004
2005 r = sd_journal_set_data_threshold(j, 0);
2006 if (r < 0) {
2007 log_error_errno(r, "Failed to unset data size threshold: %m");
2008 goto finish;
2009 }
2010
2011 r = sd_journal_query_unique(j, arg_field);
2012 if (r < 0) {
2013 log_error_errno(r, "Failed to query unique data objects: %m");
2014 goto finish;
2015 }
2016
2017 SD_JOURNAL_FOREACH_UNIQUE(j, data, size) {
2018 const void *eq;
2019
2020 if (arg_lines >= 0 && n_shown >= arg_lines)
2021 break;
2022
2023 eq = memchr(data, '=', size);
2024 if (eq)
2025 printf("%.*s\n", (int) (size - ((const uint8_t*) eq - (const uint8_t*) data + 1)), (const char*) eq + 1);
2026 else
2027 printf("%.*s\n", (int) size, (const char*) data);
2028
2029 n_shown ++;
2030 }
2031
2032 r = 0;
2033 goto finish;
2034 }
2035
2036 /* Opening the fd now means the first sd_journal_wait() will actually wait */
2037 if (arg_follow) {
2038 r = sd_journal_get_fd(j);
2039 if (r < 0) {
2040 log_error_errno(r, "Failed to get journal fd: %m");
2041 goto finish;
2042 }
2043 }
2044
2045 if (arg_cursor || arg_after_cursor) {
2046 r = sd_journal_seek_cursor(j, arg_cursor ?: arg_after_cursor);
2047 if (r < 0) {
2048 log_error_errno(r, "Failed to seek to cursor: %m");
2049 goto finish;
2050 }
2051
2052 if (!arg_reverse)
2053 r = sd_journal_next_skip(j, 1 + !!arg_after_cursor);
2054 else
2055 r = sd_journal_previous_skip(j, 1 + !!arg_after_cursor);
2056
2057 if (arg_after_cursor && r < 2) {
2058 /* We couldn't find the next entry after the cursor. */
2059 if (arg_follow)
2060 need_seek = true;
2061 else
2062 arg_lines = 0;
2063 }
2064
2065 } else if (arg_since_set && !arg_reverse) {
2066 r = sd_journal_seek_realtime_usec(j, arg_since);
2067 if (r < 0) {
2068 log_error_errno(r, "Failed to seek to date: %m");
2069 goto finish;
2070 }
2071 r = sd_journal_next(j);
2072
2073 } else if (arg_until_set && arg_reverse) {
2074 r = sd_journal_seek_realtime_usec(j, arg_until);
2075 if (r < 0) {
2076 log_error_errno(r, "Failed to seek to date: %m");
2077 goto finish;
2078 }
2079 r = sd_journal_previous(j);
2080
2081 } else if (arg_lines >= 0) {
2082 r = sd_journal_seek_tail(j);
2083 if (r < 0) {
2084 log_error_errno(r, "Failed to seek to tail: %m");
2085 goto finish;
2086 }
2087
2088 r = sd_journal_previous_skip(j, arg_lines);
2089
2090 } else if (arg_reverse) {
2091 r = sd_journal_seek_tail(j);
2092 if (r < 0) {
2093 log_error_errno(r, "Failed to seek to tail: %m");
2094 goto finish;
2095 }
2096
2097 r = sd_journal_previous(j);
2098
2099 } else {
2100 r = sd_journal_seek_head(j);
2101 if (r < 0) {
2102 log_error_errno(r, "Failed to seek to head: %m");
2103 goto finish;
2104 }
2105
2106 r = sd_journal_next(j);
2107 }
2108
2109 if (r < 0) {
2110 log_error_errno(r, "Failed to iterate through journal: %m");
2111 goto finish;
2112 }
2113 if (r == 0) {
2114 if (arg_follow)
2115 need_seek = true;
2116 else {
2117 printf("-- No entries --\n");
2118 goto finish;
2119 }
2120 }
2121
2122 if (!arg_follow)
2123 pager_open_if_enabled();
2124
2125 if (!arg_quiet) {
2126 usec_t start, end;
2127 char start_buf[FORMAT_TIMESTAMP_MAX], end_buf[FORMAT_TIMESTAMP_MAX];
2128
2129 r = sd_journal_get_cutoff_realtime_usec(j, &start, &end);
2130 if (r < 0) {
2131 log_error_errno(r, "Failed to get cutoff: %m");
2132 goto finish;
2133 }
2134
2135 if (r > 0) {
2136 if (arg_follow)
2137 printf("-- Logs begin at %s. --\n",
2138 format_timestamp_maybe_utc(start_buf, sizeof(start_buf), start));
2139 else
2140 printf("-- Logs begin at %s, end at %s. --\n",
2141 format_timestamp_maybe_utc(start_buf, sizeof(start_buf), start),
2142 format_timestamp_maybe_utc(end_buf, sizeof(end_buf), end));
2143 }
2144 }
2145
2146 for (;;) {
2147 while (arg_lines < 0 || n_shown < arg_lines || (arg_follow && !first_line)) {
2148 int flags;
2149
2150 if (need_seek) {
2151 if (!arg_reverse)
2152 r = sd_journal_next(j);
2153 else
2154 r = sd_journal_previous(j);
2155 if (r < 0) {
2156 log_error_errno(r, "Failed to iterate through journal: %m");
2157 goto finish;
2158 }
2159 if (r == 0)
2160 break;
2161 }
2162
2163 if (arg_until_set && !arg_reverse) {
2164 usec_t usec;
2165
2166 r = sd_journal_get_realtime_usec(j, &usec);
2167 if (r < 0) {
2168 log_error_errno(r, "Failed to determine timestamp: %m");
2169 goto finish;
2170 }
2171 if (usec > arg_until)
2172 goto finish;
2173 }
2174
2175 if (arg_since_set && arg_reverse) {
2176 usec_t usec;
2177
2178 r = sd_journal_get_realtime_usec(j, &usec);
2179 if (r < 0) {
2180 log_error_errno(r, "Failed to determine timestamp: %m");
2181 goto finish;
2182 }
2183 if (usec < arg_since)
2184 goto finish;
2185 }
2186
2187 if (!arg_merge && !arg_quiet) {
2188 sd_id128_t boot_id;
2189
2190 r = sd_journal_get_monotonic_usec(j, NULL, &boot_id);
2191 if (r >= 0) {
2192 if (previous_boot_id_valid &&
2193 !sd_id128_equal(boot_id, previous_boot_id))
2194 printf("%s-- Reboot --%s\n",
2195 ansi_highlight(), ansi_normal());
2196
2197 previous_boot_id = boot_id;
2198 previous_boot_id_valid = true;
2199 }
2200 }
2201
2202 flags =
2203 arg_all * OUTPUT_SHOW_ALL |
2204 arg_full * OUTPUT_FULL_WIDTH |
2205 on_tty() * OUTPUT_COLOR |
2206 arg_catalog * OUTPUT_CATALOG |
2207 arg_utc * OUTPUT_UTC;
2208
2209 r = output_journal(stdout, j, arg_output, 0, flags, &ellipsized);
2210 need_seek = true;
2211 if (r == -EADDRNOTAVAIL)
2212 break;
2213 else if (r < 0 || ferror(stdout))
2214 goto finish;
2215
2216 n_shown++;
2217 }
2218
2219 if (!arg_follow) {
2220 if (arg_show_cursor) {
2221 _cleanup_free_ char *cursor = NULL;
2222
2223 r = sd_journal_get_cursor(j, &cursor);
2224 if (r < 0 && r != -EADDRNOTAVAIL)
2225 log_error_errno(r, "Failed to get cursor: %m");
2226 else if (r >= 0)
2227 printf("-- cursor: %s\n", cursor);
2228 }
2229
2230 break;
2231 }
2232
2233 r = sd_journal_wait(j, (uint64_t) -1);
2234 if (r < 0) {
2235 log_error_errno(r, "Couldn't wait for journal event: %m");
2236 goto finish;
2237 }
2238
2239 first_line = false;
2240 }
2241
2242 finish:
2243 pager_close();
2244
2245 strv_free(arg_file);
2246
2247 strv_free(arg_syslog_identifier);
2248 strv_free(arg_system_units);
2249 strv_free(arg_user_units);
2250
2251 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
2252 }