]>
Commit | Line | Data |
---|---|---|
d6c9574f | 1 | /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/ |
5899f3b7 | 2 | |
a7334b09 LP |
3 | /*** |
4 | This file is part of systemd. | |
5 | ||
6 | Copyright 2010 Lennart Poettering | |
7 | ||
8 | systemd is free software; you can redistribute it and/or modify it | |
9 | under the terms of the GNU General Public License as published by | |
10 | the Free Software Foundation; either version 2 of the License, or | |
11 | (at your option) any later version. | |
12 | ||
13 | systemd is distributed in the hope that it will be useful, but | |
14 | WITHOUT ANY WARRANTY; without even the implied warranty of | |
15 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
16 | General Public License for more details. | |
17 | ||
18 | You should have received a copy of the GNU General Public License | |
19 | along with systemd; If not, see <http://www.gnu.org/licenses/>. | |
20 | ***/ | |
21 | ||
5899f3b7 LP |
22 | #include <stdarg.h> |
23 | #include <stdio.h> | |
c9b97d2a | 24 | #include <errno.h> |
16801e90 LP |
25 | #include <unistd.h> |
26 | #include <fcntl.h> | |
27 | #include <sys/socket.h> | |
28 | #include <sys/un.h> | |
5899f3b7 LP |
29 | |
30 | #include "log.h" | |
16801e90 LP |
31 | #include "util.h" |
32 | #include "macro.h" | |
5899f3b7 | 33 | |
16801e90 | 34 | #define SYSLOG_TIMEOUT_USEC (5*USEC_PER_SEC) |
16801e90 LP |
35 | |
36 | static LogTarget log_target = LOG_TARGET_CONSOLE; | |
bbe63281 | 37 | static int log_max_level = LOG_INFO; |
16801e90 | 38 | |
843d2643 | 39 | static int console_fd = STDERR_FILENO; |
16801e90 LP |
40 | static int syslog_fd = -1; |
41 | static int kmsg_fd = -1; | |
42 | ||
c31e1495 LP |
43 | static bool syslog_is_stream = false; |
44 | ||
bbe63281 LP |
45 | static bool show_color = false; |
46 | static bool show_location = false; | |
47 | ||
35b8ca3a | 48 | /* Akin to glibc's __abort_msg; which is private and we hence cannot |
185986c6 LP |
49 | * use here. */ |
50 | static char *log_abort_msg = NULL; | |
51 | ||
843d2643 LP |
52 | void log_close_console(void) { |
53 | ||
54 | if (console_fd < 0) | |
55 | return; | |
16801e90 | 56 | |
c8513d54 LP |
57 | if (getpid() == 1) { |
58 | if (console_fd >= 3) | |
59 | close_nointr_nofail(console_fd); | |
60 | ||
843d2643 | 61 | console_fd = -1; |
16801e90 LP |
62 | } |
63 | } | |
64 | ||
843d2643 | 65 | static int log_open_console(void) { |
16801e90 | 66 | |
843d2643 | 67 | if (console_fd >= 0) |
16801e90 | 68 | return 0; |
843d2643 LP |
69 | |
70 | if (getpid() == 1) { | |
71 | ||
72 | if ((console_fd = open_terminal("/dev/console", O_WRONLY|O_NOCTTY|O_CLOEXEC)) < 0) { | |
73 | log_error("Failed to open /dev/console for logging: %s", strerror(-console_fd)); | |
74 | return console_fd; | |
75 | } | |
76 | ||
35b8ca3a | 77 | log_debug("Successfully opened /dev/console for logging."); |
843d2643 LP |
78 | } else |
79 | console_fd = STDERR_FILENO; | |
80 | ||
81 | return 0; | |
82 | } | |
83 | ||
84 | void log_close_kmsg(void) { | |
85 | ||
86 | if (kmsg_fd < 0) | |
87 | return; | |
88 | ||
89 | close_nointr_nofail(kmsg_fd); | |
90 | kmsg_fd = -1; | |
91 | } | |
92 | ||
93 | static int log_open_kmsg(void) { | |
16801e90 LP |
94 | |
95 | if (kmsg_fd >= 0) | |
96 | return 0; | |
97 | ||
c9b80453 | 98 | if ((kmsg_fd = open("/dev/kmsg", O_WRONLY|O_NOCTTY|O_CLOEXEC)) < 0) { |
31a7034d | 99 | log_error("Failed to open /dev/kmsg for logging: %s", strerror(errno)); |
16801e90 | 100 | return -errno; |
c9b80453 | 101 | } |
16801e90 | 102 | |
35b8ca3a | 103 | log_debug("Successfully opened /dev/kmsg for logging."); |
0dae83f9 | 104 | |
16801e90 LP |
105 | return 0; |
106 | } | |
107 | ||
108 | void log_close_syslog(void) { | |
109 | ||
843d2643 LP |
110 | if (syslog_fd < 0) |
111 | return; | |
112 | ||
113 | close_nointr_nofail(syslog_fd); | |
114 | syslog_fd = -1; | |
16801e90 LP |
115 | } |
116 | ||
c31e1495 LP |
117 | static int create_log_socket(int type) { |
118 | struct timeval tv; | |
119 | int fd; | |
120 | ||
121 | if ((fd = socket(AF_UNIX, type|SOCK_CLOEXEC, 0)) < 0) | |
122 | return -errno; | |
123 | ||
124 | /* Make sure we don't block for more than 5s when talking to | |
125 | * syslog */ | |
126 | timeval_store(&tv, SYSLOG_TIMEOUT_USEC); | |
127 | if (setsockopt(fd, SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(tv)) < 0) { | |
128 | close_nointr_nofail(fd); | |
129 | return -errno; | |
130 | } | |
131 | ||
132 | return fd; | |
133 | } | |
134 | ||
843d2643 | 135 | static int log_open_syslog(void) { |
16801e90 LP |
136 | union { |
137 | struct sockaddr sa; | |
138 | struct sockaddr_un un; | |
139 | } sa; | |
16801e90 LP |
140 | int r; |
141 | ||
16801e90 LP |
142 | if (syslog_fd >= 0) |
143 | return 0; | |
144 | ||
16801e90 LP |
145 | zero(sa); |
146 | sa.un.sun_family = AF_UNIX; | |
147 | strncpy(sa.un.sun_path, "/dev/log", sizeof(sa.un.sun_path)); | |
148 | ||
c31e1495 | 149 | if ((syslog_fd = create_log_socket(SOCK_DGRAM)) < 0) { |
16801e90 | 150 | r = -errno; |
843d2643 | 151 | goto fail; |
16801e90 LP |
152 | } |
153 | ||
c31e1495 LP |
154 | if (connect(syslog_fd, &sa.sa, sizeof(sa)) < 0) { |
155 | close_nointr_nofail(syslog_fd); | |
156 | ||
157 | /* Some legacy syslog systems still use stream | |
158 | * sockets. They really shouldn't. But what can we | |
159 | * do... */ | |
160 | if ((syslog_fd = create_log_socket(SOCK_STREAM)) < 0) { | |
161 | r = -errno; | |
162 | goto fail; | |
163 | } | |
164 | ||
165 | if (connect(syslog_fd, &sa.sa, sizeof(sa)) < 0) { | |
166 | r = -errno; | |
167 | goto fail; | |
168 | } | |
169 | ||
170 | syslog_is_stream = true; | |
171 | } else | |
172 | syslog_is_stream = false; | |
173 | ||
35b8ca3a | 174 | log_debug("Successfully opened syslog for logging."); |
0dae83f9 | 175 | |
16801e90 | 176 | return 0; |
843d2643 LP |
177 | |
178 | fail: | |
179 | log_close_syslog(); | |
31a7034d | 180 | log_debug("Failed to open syslog for logging: %s", strerror(-r)); |
843d2643 LP |
181 | return r; |
182 | } | |
183 | ||
184 | int log_open(void) { | |
185 | int r; | |
186 | ||
187 | /* If we don't use the console we close it here, to not get | |
188 | * killed by SAK. If we don't use syslog we close it here so | |
189 | * that we are not confused by somebody deleting the socket in | |
190 | * the fs. If we don't use /dev/kmsg we still keep it open, | |
191 | * because there is no reason to close it. */ | |
192 | ||
9fae33d2 LP |
193 | if (log_target == LOG_TARGET_NULL) { |
194 | log_close_syslog(); | |
195 | log_close_console(); | |
196 | return 0; | |
197 | } | |
198 | ||
bb7df0da LP |
199 | if (log_target != LOG_TARGET_AUTO || |
200 | getpid() == 1 || | |
f41c094c | 201 | isatty(STDERR_FILENO) <= 0) { |
bb7df0da LP |
202 | |
203 | if (log_target == LOG_TARGET_AUTO || | |
204 | log_target == LOG_TARGET_SYSLOG_OR_KMSG || | |
205 | log_target == LOG_TARGET_SYSLOG) | |
206 | if ((r = log_open_syslog()) >= 0) { | |
207 | log_close_console(); | |
208 | return r; | |
209 | } | |
210 | if (log_target == LOG_TARGET_AUTO || | |
211 | log_target == LOG_TARGET_SYSLOG_OR_KMSG || | |
212 | log_target == LOG_TARGET_KMSG) | |
213 | if ((r = log_open_kmsg()) >= 0) { | |
214 | log_close_syslog(); | |
215 | log_close_console(); | |
216 | return r; | |
217 | } | |
218 | } | |
843d2643 LP |
219 | |
220 | log_close_syslog(); | |
dcdf86bb LP |
221 | |
222 | /* Get the real /dev/console if we are PID=1, hence reopen */ | |
223 | log_close_console(); | |
843d2643 | 224 | return log_open_console(); |
16801e90 LP |
225 | } |
226 | ||
227 | void log_set_target(LogTarget target) { | |
228 | assert(target >= 0); | |
229 | assert(target < _LOG_TARGET_MAX); | |
230 | ||
231 | log_target = target; | |
232 | } | |
233 | ||
234 | void log_set_max_level(int level) { | |
235 | assert((level & LOG_PRIMASK) == level); | |
236 | ||
237 | log_max_level = level; | |
238 | } | |
239 | ||
843d2643 | 240 | static int write_to_console( |
5899f3b7 LP |
241 | int level, |
242 | const char*file, | |
243 | int line, | |
244 | const char *func, | |
843d2643 | 245 | const char *buffer) { |
5899f3b7 | 246 | |
843d2643 LP |
247 | char location[64]; |
248 | struct iovec iovec[5]; | |
249 | unsigned n = 0; | |
250 | bool highlight; | |
5899f3b7 | 251 | |
843d2643 LP |
252 | if (console_fd < 0) |
253 | return 0; | |
254 | ||
255 | snprintf(location, sizeof(location), "(%s:%u) ", file, line); | |
256 | char_array_0(location); | |
257 | ||
bbe63281 | 258 | highlight = LOG_PRI(level) <= LOG_ERR && show_color; |
843d2643 LP |
259 | |
260 | zero(iovec); | |
bbe63281 LP |
261 | if (show_location) |
262 | IOVEC_SET_STRING(iovec[n++], location); | |
843d2643 | 263 | if (highlight) |
61cbdc4b | 264 | IOVEC_SET_STRING(iovec[n++], ANSI_HIGHLIGHT_ON); |
843d2643 LP |
265 | IOVEC_SET_STRING(iovec[n++], buffer); |
266 | if (highlight) | |
61cbdc4b | 267 | IOVEC_SET_STRING(iovec[n++], ANSI_HIGHLIGHT_OFF); |
843d2643 LP |
268 | IOVEC_SET_STRING(iovec[n++], "\n"); |
269 | ||
270 | if (writev(console_fd, iovec, n) < 0) | |
271 | return -errno; | |
5899f3b7 | 272 | |
843d2643 | 273 | return 1; |
16801e90 | 274 | } |
5899f3b7 | 275 | |
16801e90 LP |
276 | static int write_to_syslog( |
277 | int level, | |
278 | const char*file, | |
279 | int line, | |
280 | const char *func, | |
843d2643 | 281 | const char *buffer) { |
16801e90 LP |
282 | |
283 | char header_priority[16], header_time[64], header_pid[16]; | |
16801e90 LP |
284 | struct iovec iovec[5]; |
285 | struct msghdr msghdr; | |
286 | time_t t; | |
287 | struct tm *tm; | |
288 | ||
289 | if (syslog_fd < 0) | |
843d2643 | 290 | return 0; |
16801e90 LP |
291 | |
292 | snprintf(header_priority, sizeof(header_priority), "<%i>", LOG_MAKEPRI(LOG_DAEMON, LOG_PRI(level))); | |
293 | char_array_0(header_priority); | |
294 | ||
295 | t = (time_t) (now(CLOCK_REALTIME) / USEC_PER_SEC); | |
296 | if (!(tm = localtime(&t))) | |
297 | return -EINVAL; | |
298 | ||
299 | if (strftime(header_time, sizeof(header_time), "%h %e %T ", tm) <= 0) | |
300 | return -EINVAL; | |
301 | ||
bb00e604 | 302 | snprintf(header_pid, sizeof(header_pid), "[%lu]: ", (unsigned long) getpid()); |
16801e90 LP |
303 | char_array_0(header_pid); |
304 | ||
16801e90 LP |
305 | zero(iovec); |
306 | IOVEC_SET_STRING(iovec[0], header_priority); | |
307 | IOVEC_SET_STRING(iovec[1], header_time); | |
5b6319dc | 308 | IOVEC_SET_STRING(iovec[2], program_invocation_short_name); |
16801e90 LP |
309 | IOVEC_SET_STRING(iovec[3], header_pid); |
310 | IOVEC_SET_STRING(iovec[4], buffer); | |
311 | ||
c899f8c6 | 312 | /* When using syslog via SOCK_STREAM separate the messages by NUL chars */ |
c31e1495 LP |
313 | if (syslog_is_stream) |
314 | iovec[4].iov_len++; | |
315 | ||
16801e90 LP |
316 | zero(msghdr); |
317 | msghdr.msg_iov = iovec; | |
318 | msghdr.msg_iovlen = ELEMENTSOF(iovec); | |
319 | ||
c31e1495 LP |
320 | for (;;) { |
321 | ssize_t n; | |
322 | ||
323 | if ((n = sendmsg(syslog_fd, &msghdr, MSG_NOSIGNAL)) < 0) | |
324 | return -errno; | |
325 | ||
326 | if (!syslog_is_stream || | |
327 | (size_t) n >= IOVEC_TOTAL_SIZE(iovec, ELEMENTSOF(iovec))) | |
328 | break; | |
329 | ||
330 | IOVEC_INCREMENT(iovec, ELEMENTSOF(iovec), n); | |
331 | } | |
16801e90 | 332 | |
843d2643 | 333 | return 1; |
16801e90 LP |
334 | } |
335 | ||
336 | static int write_to_kmsg( | |
337 | int level, | |
338 | const char*file, | |
339 | int line, | |
340 | const char *func, | |
843d2643 | 341 | const char *buffer) { |
16801e90 LP |
342 | |
343 | char header_priority[16], header_pid[16]; | |
16801e90 LP |
344 | struct iovec iovec[5]; |
345 | ||
346 | if (kmsg_fd < 0) | |
843d2643 | 347 | return 0; |
16801e90 LP |
348 | |
349 | snprintf(header_priority, sizeof(header_priority), "<%i>", LOG_PRI(level)); | |
350 | char_array_0(header_priority); | |
351 | ||
bb00e604 | 352 | snprintf(header_pid, sizeof(header_pid), "[%lu]: ", (unsigned long) getpid()); |
16801e90 LP |
353 | char_array_0(header_pid); |
354 | ||
16801e90 LP |
355 | zero(iovec); |
356 | IOVEC_SET_STRING(iovec[0], header_priority); | |
5b6319dc | 357 | IOVEC_SET_STRING(iovec[1], program_invocation_short_name); |
16801e90 LP |
358 | IOVEC_SET_STRING(iovec[2], header_pid); |
359 | IOVEC_SET_STRING(iovec[3], buffer); | |
843d2643 | 360 | IOVEC_SET_STRING(iovec[4], "\n"); |
16801e90 LP |
361 | |
362 | if (writev(kmsg_fd, iovec, ELEMENTSOF(iovec)) < 0) | |
363 | return -errno; | |
364 | ||
843d2643 | 365 | return 1; |
16801e90 LP |
366 | } |
367 | ||
843d2643 LP |
368 | static int log_dispatch( |
369 | int level, | |
370 | const char*file, | |
371 | int line, | |
372 | const char *func, | |
9726b29e | 373 | char *buffer) { |
843d2643 | 374 | |
9726b29e | 375 | int r = 0; |
843d2643 | 376 | |
9fae33d2 LP |
377 | if (log_target == LOG_TARGET_NULL) |
378 | return 0; | |
379 | ||
9726b29e LP |
380 | do { |
381 | char *e; | |
9499b235 | 382 | int k = 0; |
843d2643 | 383 | |
9726b29e | 384 | buffer += strspn(buffer, NEWLINE); |
843d2643 | 385 | |
9726b29e LP |
386 | if (buffer[0] == 0) |
387 | break; | |
843d2643 | 388 | |
9726b29e LP |
389 | if ((e = strpbrk(buffer, NEWLINE))) |
390 | *(e++) = 0; | |
843d2643 | 391 | |
bb7df0da LP |
392 | if (log_target == LOG_TARGET_AUTO || |
393 | log_target == LOG_TARGET_SYSLOG_OR_KMSG || | |
9726b29e LP |
394 | log_target == LOG_TARGET_SYSLOG) { |
395 | ||
9499b235 | 396 | if ((k = write_to_syslog(level, file, line, func, buffer)) < 0) { |
9726b29e LP |
397 | log_close_syslog(); |
398 | log_open_kmsg(); | |
9499b235 | 399 | } else if (k > 0) |
9726b29e LP |
400 | r++; |
401 | } | |
402 | ||
9499b235 | 403 | if (k <= 0 && |
bb7df0da LP |
404 | (log_target == LOG_TARGET_AUTO || |
405 | log_target == LOG_TARGET_SYSLOG_OR_KMSG || | |
9499b235 | 406 | log_target == LOG_TARGET_KMSG)) { |
9726b29e | 407 | |
9499b235 | 408 | if ((k = write_to_kmsg(level, file, line, func, buffer)) < 0) { |
9726b29e LP |
409 | log_close_kmsg(); |
410 | log_open_console(); | |
9499b235 | 411 | } else if (k > 0) |
9726b29e LP |
412 | r++; |
413 | } | |
414 | ||
9499b235 LP |
415 | if (k <= 0 && |
416 | (k = write_to_console(level, file, line, func, buffer)) < 0) | |
9726b29e LP |
417 | return k; |
418 | ||
419 | buffer = e; | |
420 | } while (buffer); | |
421 | ||
422 | return r; | |
843d2643 LP |
423 | } |
424 | ||
2149e37c LP |
425 | int log_dump_internal( |
426 | int level, | |
427 | const char*file, | |
428 | int line, | |
429 | const char *func, | |
430 | char *buffer) { | |
431 | ||
432 | int saved_errno, r; | |
433 | ||
434 | /* This modifies the buffer... */ | |
435 | ||
436 | if (_likely_(LOG_PRI(level) > log_max_level)) | |
437 | return 0; | |
438 | ||
439 | saved_errno = errno; | |
440 | r = log_dispatch(level, file, line, func, buffer); | |
441 | errno = saved_errno; | |
442 | ||
443 | return r; | |
444 | } | |
445 | ||
843d2643 | 446 | int log_meta( |
16801e90 LP |
447 | int level, |
448 | const char*file, | |
449 | int line, | |
450 | const char *func, | |
451 | const char *format, ...) { | |
452 | ||
addab137 | 453 | char buffer[LINE_MAX]; |
843d2643 LP |
454 | int saved_errno, r; |
455 | va_list ap; | |
16801e90 | 456 | |
93a46b0b | 457 | if (_likely_(LOG_PRI(level) > log_max_level)) |
843d2643 | 458 | return 0; |
16801e90 LP |
459 | |
460 | saved_errno = errno; | |
843d2643 LP |
461 | |
462 | va_start(ap, format); | |
463 | vsnprintf(buffer, sizeof(buffer), format, ap); | |
464 | va_end(ap); | |
465 | ||
466 | char_array_0(buffer); | |
467 | ||
468 | r = log_dispatch(level, file, line, func, buffer); | |
185986c6 | 469 | errno = saved_errno; |
843d2643 LP |
470 | |
471 | return r; | |
185986c6 | 472 | } |
16801e90 | 473 | |
185986c6 LP |
474 | void log_assert( |
475 | const char*file, | |
476 | int line, | |
477 | const char *func, | |
478 | const char *format, ...) { | |
479 | ||
addab137 | 480 | static char buffer[LINE_MAX]; |
185986c6 | 481 | int saved_errno = errno; |
843d2643 | 482 | va_list ap; |
185986c6 LP |
483 | |
484 | va_start(ap, format); | |
485 | vsnprintf(buffer, sizeof(buffer), format, ap); | |
486 | va_end(ap); | |
487 | ||
488 | char_array_0(buffer); | |
489 | log_abort_msg = buffer; | |
490 | ||
843d2643 | 491 | log_dispatch(LOG_CRIT, file, line, func, buffer); |
185986c6 | 492 | abort(); |
5899f3b7 | 493 | |
185986c6 | 494 | /* If the user chose to ignore this SIGABRT, we are happy to go on, as if nothing happened. */ |
c9b97d2a | 495 | errno = saved_errno; |
5899f3b7 | 496 | } |
34f0e866 LP |
497 | |
498 | int log_set_target_from_string(const char *e) { | |
499 | LogTarget t; | |
500 | ||
501 | if ((t = log_target_from_string(e)) < 0) | |
502 | return -EINVAL; | |
503 | ||
504 | log_set_target(t); | |
505 | return 0; | |
506 | } | |
507 | ||
508 | int log_set_max_level_from_string(const char *e) { | |
509 | int t; | |
510 | ||
511 | if ((t = log_level_from_string(e)) < 0) | |
512 | return -EINVAL; | |
513 | ||
514 | log_set_max_level(t); | |
515 | return 0; | |
516 | } | |
517 | ||
518 | void log_parse_environment(void) { | |
519 | const char *e; | |
520 | ||
521 | if ((e = getenv("SYSTEMD_LOG_TARGET"))) | |
522 | if (log_set_target_from_string(e) < 0) | |
523 | log_warning("Failed to parse log target %s. Ignoring.", e); | |
524 | ||
525 | if ((e = getenv("SYSTEMD_LOG_LEVEL"))) | |
526 | if (log_set_max_level_from_string(e) < 0) | |
527 | log_warning("Failed to parse log level %s. Ignoring.", e); | |
bbe63281 | 528 | |
541d6159 | 529 | if ((e = getenv("SYSTEMD_LOG_COLOR"))) |
bbe63281 LP |
530 | if (log_show_color_from_string(e) < 0) |
531 | log_warning("Failed to parse bool %s. Ignoring.", e); | |
532 | ||
dcdf86bb | 533 | if ((e = getenv("SYSTEMD_LOG_LOCATION"))) |
bbe63281 LP |
534 | if (log_show_location_from_string(e) < 0) |
535 | log_warning("Failed to parse bool %s. Ignoring.", e); | |
34f0e866 LP |
536 | } |
537 | ||
1adf1049 LP |
538 | LogTarget log_get_target(void) { |
539 | return log_target; | |
540 | } | |
541 | ||
542 | int log_get_max_level(void) { | |
543 | return log_max_level; | |
544 | } | |
545 | ||
bbe63281 LP |
546 | void log_show_color(bool b) { |
547 | show_color = b; | |
548 | } | |
549 | ||
550 | void log_show_location(bool b) { | |
551 | show_location = b; | |
552 | } | |
553 | ||
554 | int log_show_color_from_string(const char *e) { | |
555 | int t; | |
556 | ||
557 | if ((t = parse_boolean(e)) < 0) | |
558 | return -EINVAL; | |
559 | ||
560 | log_show_color(t); | |
561 | return 0; | |
562 | } | |
563 | ||
564 | int log_show_location_from_string(const char *e) { | |
565 | int t; | |
566 | ||
567 | if ((t = parse_boolean(e)) < 0) | |
568 | return -EINVAL; | |
569 | ||
570 | log_show_location(t); | |
571 | return 0; | |
572 | } | |
573 | ||
34f0e866 LP |
574 | static const char *const log_target_table[] = { |
575 | [LOG_TARGET_CONSOLE] = "console", | |
576 | [LOG_TARGET_SYSLOG] = "syslog", | |
577 | [LOG_TARGET_KMSG] = "kmsg", | |
843d2643 | 578 | [LOG_TARGET_SYSLOG_OR_KMSG] = "syslog-or-kmsg", |
bb7df0da LP |
579 | [LOG_TARGET_NULL] = "null", |
580 | [LOG_TARGET_AUTO] = "auto" | |
34f0e866 LP |
581 | }; |
582 | ||
583 | DEFINE_STRING_TABLE_LOOKUP(log_target, LogTarget); |