aboutgitcodebugslistschat
path: root/README.md
diff options
context:
space:
mode:
authorStefano Brivio <sbrivio@redhat.com>2022-10-06 14:51:04 +0200
committerStefano Brivio <sbrivio@redhat.com>2022-10-14 17:38:28 +0200
commit01efc71ddd2523594b94e8be00d9e51d6cdd6130 (patch)
treee95bd46620cd1669b02fafbfda0b9da40fd35268 /README.md
parentf4e1e88e1dce3a25f3cdd8d52a1f097236911e70 (diff)
downloadpasst-01efc71ddd2523594b94e8be00d9e51d6cdd6130.tar
passt-01efc71ddd2523594b94e8be00d9e51d6cdd6130.tar.gz
passt-01efc71ddd2523594b94e8be00d9e51d6cdd6130.tar.bz2
passt-01efc71ddd2523594b94e8be00d9e51d6cdd6130.tar.lz
passt-01efc71ddd2523594b94e8be00d9e51d6cdd6130.tar.xz
passt-01efc71ddd2523594b94e8be00d9e51d6cdd6130.tar.zst
passt-01efc71ddd2523594b94e8be00d9e51d6cdd6130.zip
log, conf: Add support for logging to file
In some environments, such as KubeVirt pods, we might not have a system logger available. We could choose to run in foreground, but this takes away the convenient synchronisation mechanism derived from forking to background when interfaces are ready. Add optional logging to file with -l/--log-file and --log-size. Unfortunately, this means we need to duplicate features that are more appropriately implemented by a system logger, such as rotation. Keep that reasonably simple, by using fallocate() with range collapsing where supported (Linux kernel >= 3.15, extent-based ext4 and XFS) and falling back to an unsophisticated block-by-block moving of entries toward the beginning of the file once we reach the (mandatory) size limit. While at it, clarify the role of LOG_EMERG in passt.c. Signed-off-by: Stefano Brivio <sbrivio@redhat.com> Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
Diffstat (limited to 'README.md')
-rw-r--r--README.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/README.md b/README.md
index 2c522b2..3dc4fc5 100644
--- a/README.md
+++ b/README.md
@@ -289,7 +289,7 @@ speeding up local connections, and usually requiring NAT. _pasta_:
* ✅ all capabilities dropped, other than `CAP_NET_BIND_SERVICE` (if granted)
* ✅ with default options, user, mount, IPC, UTS, PID namespaces are detached
* ✅ no external dependencies (other than a standard C library)
-* ✅ restrictive seccomp profiles (26 syscalls allowed for _passt_, 40 for
+* ✅ restrictive seccomp profiles (30 syscalls allowed for _passt_, 41 for
_pasta_ on x86_64)
* ✅ examples of [AppArmor](/passt/tree/contrib/apparmor) and
[SELinux](/passt/tree/contrib/selinux) profiles available