diff options
author | Stefano Brivio <sbrivio@redhat.com> | 2022-10-06 14:51:04 +0200 |
---|---|---|
committer | Stefano Brivio <sbrivio@redhat.com> | 2022-10-14 17:38:28 +0200 |
commit | 01efc71ddd2523594b94e8be00d9e51d6cdd6130 (patch) | |
tree | e95bd46620cd1669b02fafbfda0b9da40fd35268 /README.md | |
parent | f4e1e88e1dce3a25f3cdd8d52a1f097236911e70 (diff) | |
download | passt-01efc71ddd2523594b94e8be00d9e51d6cdd6130.tar passt-01efc71ddd2523594b94e8be00d9e51d6cdd6130.tar.gz passt-01efc71ddd2523594b94e8be00d9e51d6cdd6130.tar.bz2 passt-01efc71ddd2523594b94e8be00d9e51d6cdd6130.tar.lz passt-01efc71ddd2523594b94e8be00d9e51d6cdd6130.tar.xz passt-01efc71ddd2523594b94e8be00d9e51d6cdd6130.tar.zst passt-01efc71ddd2523594b94e8be00d9e51d6cdd6130.zip |
log, conf: Add support for logging to file
In some environments, such as KubeVirt pods, we might not have a
system logger available. We could choose to run in foreground, but
this takes away the convenient synchronisation mechanism derived from
forking to background when interfaces are ready.
Add optional logging to file with -l/--log-file and --log-size.
Unfortunately, this means we need to duplicate features that are more
appropriately implemented by a system logger, such as rotation. Keep
that reasonably simple, by using fallocate() with range collapsing
where supported (Linux kernel >= 3.15, extent-based ext4 and XFS) and
falling back to an unsophisticated block-by-block moving of entries
toward the beginning of the file once we reach the (mandatory) size
limit.
While at it, clarify the role of LOG_EMERG in passt.c.
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -289,7 +289,7 @@ speeding up local connections, and usually requiring NAT. _pasta_: * ✅ all capabilities dropped, other than `CAP_NET_BIND_SERVICE` (if granted) * ✅ with default options, user, mount, IPC, UTS, PID namespaces are detached * ✅ no external dependencies (other than a standard C library) -* ✅ restrictive seccomp profiles (26 syscalls allowed for _passt_, 40 for +* ✅ restrictive seccomp profiles (30 syscalls allowed for _passt_, 41 for _pasta_ on x86_64) * ✅ examples of [AppArmor](/passt/tree/contrib/apparmor) and [SELinux](/passt/tree/contrib/selinux) profiles available |