1 .\" Copyright (C) 2001 Andries Brouwer <aeb@cwi.nl>.
3 .\" Permission is granted to make and distribute verbatim copies of this
4 .\" manual provided the copyright notice and this permission notice are
5 .\" preserved on all copies.
7 .\" Permission is granted to copy and distribute modified versions of this
8 .\" manual under the conditions for verbatim copying, provided that the
9 .\" entire resulting derived work is distributed under the terms of a
10 .\" permission notice identical to this one.
12 .\" Since the Linux kernel and libraries are constantly changing, this
13 .\" manual page may be incorrect or out-of-date. The author(s) assume no
14 .\" responsibility for errors or omissions, or for damages resulting from
15 .\" the use of the information contained herein. The author(s) may not
16 .\" have taken the same level of care in the production of this manual,
17 .\" which is licensed free of charge, as they might when working
20 .\" Formatted or processed versions of this manual, if unaccompanied by
21 .\" the source, must acknowledge the copyright and authors of this work.
23 .TH SETLOGMASK 3 2001-10-05 "" "Linux Programmer's Manual"
25 setlogmask \- set log priority mask
28 .B #include <syslog.h>
30 .BI "int setlogmask(int " mask );
33 A process has a log priority mask that determines which calls to
36 All other calls will be ignored.
37 Logging is enabled for the priorities that have the corresponding
40 The initial mask is such that logging is enabled for all priorities.
44 function sets this logmask for the calling process,
45 and returns the previous mask.
46 If the mask argument is 0, the current logmask is not modified.
48 The eight priorities are
58 The bit corresponding to a priority \fIp\fP is \fBLOG_MASK\fP(\fIp\fP).
59 Some systems also provide a macro \fBLOG_UPTO\fP(\fIp\fP) for the mask
60 of all priorities in the above list up to and including \fIp\fP.
62 This function returns the previous log priority mask.
66 .\" The glibc logmask handling was broken in versions before glibc 2.1.1.
69 Note that the description in POSIX.1-2001 is flawed.