/* Copyright (c) 2001, Matej Pfajfar. * Copyright (c) 2001-2004, Roger Dingledine. * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson. * Copyright (c) 2007-2008, The Tor Project, Inc. */ /* See LICENSE for licensing information */ /* $Id$ */ const char log_c_id[] = "$Id$"; /** * \file log.c * \brief Functions to send messages to log files or the console. **/ #include "orconfig.h" #include #include #include #include #include #ifdef HAVE_SYS_TIME_H #include #endif #ifdef HAVE_TIME_H #include #endif #include "util.h" #include "log.h" #include "container.h" #include #define TRUNCATED_STR "[...truncated]" #define TRUNCATED_STR_LEN 14 /** Information for a single logfile; only used in log.c */ typedef struct logfile_t { struct logfile_t *next; /**< Next logfile_t in the linked list. */ char *filename; /**< Filename to open. */ FILE *file; /**< Stream to receive log messages. */ int seems_dead; /**< Boolean: true if the stream seems to be kaput. */ int needs_close; /**< Boolean: true if the stream gets closed on shutdown. */ int is_temporary; /**< Boolean: close after initializing logging subsystem.*/ int is_syslog; /**< Boolean: send messages to syslog. */ log_callback callback; /**< If not NULL, send messages to this function. */ log_severity_list_t *severities; /**< DOCDOC */ } logfile_t; static void log_free(logfile_t *victim); /** Helper: map a log severity to descriptive string. */ static INLINE const char * sev_to_string(int severity) { switch (severity) { case LOG_DEBUG: return "debug"; case LOG_INFO: return "info"; case LOG_NOTICE: return "notice"; case LOG_WARN: return "warn"; case LOG_ERR: return "err"; default: /* Call assert, not tor_assert, since tor_assert * calls log on failure. */ assert(0); return "UNKNOWN"; } } /** Helper: decide whether to include the function name in the log message. */ static INLINE int should_log_function_name(log_domain_mask_t domain, int severity) { switch (severity) { case LOG_DEBUG: case LOG_INFO: /* All debugging messages occur in interesting places. */ return 1; case LOG_NOTICE: case LOG_WARN: case LOG_ERR: /* We care about places where bugs occur. */ return (domain == LD_BUG); default: /* Call assert, not tor_assert, since tor_assert calls log on failure. */ assert(0); return 0; } } #define USE_LOG_MUTEX #ifdef USE_LOG_MUTEX /** A mutex to guard changes to logfiles and logging. */ static tor_mutex_t *log_mutex = NULL; #endif /** Linked list of logfile_t. */ static logfile_t *logfiles = NULL; #ifdef HAVE_SYSLOG_H static int syslog_count = 0; #endif #ifdef USE_LOG_MUTEX #define LOCK_LOGS() STMT_BEGIN \ tor_mutex_acquire(log_mutex); \ STMT_END #define UNLOCK_LOGS() STMT_BEGIN tor_mutex_release(log_mutex); STMT_END #else #define LOCK_LOGS() STMT_NIL #define UNLOCK_LOGS() STMT_NIL #endif /* What's the lowest log level anybody cares about? */ int _log_global_min_severity = LOG_NOTICE; static void delete_log(logfile_t *victim); static void close_log(logfile_t *victim); /** Name of the application: used to generate the message we write at the * start of each new log. */ static char *appname = NULL; /** Set the "application name" for the logs to name: we'll use this * name in the message we write when starting up, and at the start of each new * log. * * Tor uses this string to write the version number to the log file. */ void log_set_application_name(const char *name) { tor_free(appname); appname = name ? tor_strdup(name) : NULL; } /** Helper: Write the standard prefix for log lines to a * buf_len character buffer in buf. */ static INLINE size_t _log_prefix(char *buf, size_t buf_len, int severity) { time_t t; struct timeval now; struct tm tm; size_t n; int r; tor_gettimeofday(&now); t = (time_t)now.tv_sec; n = strftime(buf, buf_len, "%b %d %H:%M:%S", tor_localtime_r(&t, &tm)); r = tor_snprintf(buf+n, buf_len-n, ".%.3ld [%s] ", (long)now.tv_usec / 1000, sev_to_string(severity)); if (r<0) return buf_len-1; else return n+r; } /** If lf refers to an actual file that we have just opened, and the file * contains no data, log an "opening new logfile" message at the top. * * Return -1 if the log is broken and needs to be deleted, else return 0. */ static int log_tor_version(logfile_t *lf, int reset) { char buf[256]; size_t n; int is_new; if (!lf->needs_close) /* If it doesn't get closed, it isn't really a file. */ return 0; if (lf->is_temporary) /* If it's temporary, it isn't really a file. */ return 0; #ifdef HAVE_FTELLO is_new = (ftello(lf->file) == 0); #else is_new = (ftell(lf->file) == 0); #endif if (reset && !is_new) /* We are resetting, but we aren't at the start of the file; no * need to log again. */ return 0; n = _log_prefix(buf, sizeof(buf), LOG_NOTICE); if (appname) { tor_snprintf(buf+n, sizeof(buf)-n, "%s opening %slog file.\n", appname, is_new?"new ":""); } else { tor_snprintf(buf+n, sizeof(buf)-n, "Tor %s opening %slog file.\n", VERSION, is_new?"new ":""); } if (fputs(buf, lf->file) == EOF || fflush(lf->file) == EOF) /* error */ return -1; /* failed */ return 0; } /** Helper: Format a log message into a fixed-sized buffer. (This is * factored out of logv so that we never format a message more * than once.) Return a pointer to the first character of the message * portion of the formatted string. */ static INLINE char * format_msg(char *buf, size_t buf_len, log_domain_mask_t domain, int severity, const char *funcname, const char *format, va_list ap) { size_t n; int r; char *end_of_prefix; assert(buf_len >= 2); /* prevent integer underflow */ buf_len -= 2; /* subtract 2 characters so we have room for \n\0 */ n = _log_prefix(buf, buf_len, severity); end_of_prefix = buf+n; if (funcname && should_log_function_name(domain, severity)) { r = tor_snprintf(buf+n, buf_len-n, "%s(): ", funcname); if (r<0) n = strlen(buf); else n += r; } if (domain == LD_BUG && buf_len-n > 6) { memcpy(buf+n, "Bug: ", 6); n += 5; } r = tor_vsnprintf(buf+n,buf_len-n,format,ap); if (r < 0) { /* The message was too long; overwrite the end of the buffer with * "[...truncated]" */ if (buf_len >= TRUNCATED_STR_LEN) { size_t offset = buf_len-TRUNCATED_STR_LEN; /* We have an extra 2 characters after buf_len to hold the \n\0, * so it's safe to add 1 to the size here. */ strlcpy(buf+offset, TRUNCATED_STR, buf_len-offset+1); } /* Set 'n' to the end of the buffer, where we'll be writing \n\0. * Since we already subtracted 2 from buf_len, this is safe.*/ n = buf_len; } else { n += r; } buf[n]='\n'; buf[n+1]='\0'; return end_of_prefix; } /** Helper: sends a message to the appropriate logfiles, at loglevel * severity. If provided, funcname is prepended to the * message. The actual message is derived as from tor_snprintf(format,ap). */ static void logv(int severity, log_domain_mask_t domain, const char *funcname, const char *format, va_list ap) { char buf[10024]; int formatted = 0; logfile_t *lf; char *end_of_prefix=NULL; /* Call assert, not tor_assert, since tor_assert calls log on failure. */ assert(format); /* check that severity is sane. Overrunning the masks array leads to * interesting and hard to diagnose effects */ assert(severity >= LOG_ERR && severity <= LOG_DEBUG); LOCK_LOGS(); lf = logfiles; while (lf) { if (! (lf->severities->masks[SEVERITY_MASK_IDX(severity)] & domain)) { lf = lf->next; continue; } if (! (lf->file || lf->is_syslog || lf->callback)) { lf = lf->next; continue; } if (lf->seems_dead) { lf = lf->next; continue; } if (!formatted) { end_of_prefix = format_msg(buf, sizeof(buf), domain, severity, funcname, format, ap); formatted = 1; } if (lf->is_syslog) { #ifdef HAVE_SYSLOG_H /* XXXX Some syslog implementations have scary limits on the length of * what you can pass them. Can/should we detect this? */ syslog(severity, "%s", end_of_prefix); #endif lf = lf->next; continue; } else if (lf->callback) { lf->callback(severity, domain, end_of_prefix); lf = lf->next; continue; } if (fputs(buf, lf->file) == EOF || fflush(lf->file) == EOF) { /* error */ /* don't log the error! mark this log entry to be blown away, and * continue. */ lf->seems_dead = 1; } lf = lf->next; } UNLOCK_LOGS(); } /** Output a message to the log. */ void _log(int severity, log_domain_mask_t domain, const char *format, ...) { va_list ap; if (severity > _log_global_min_severity) return; va_start(ap,format); logv(severity, domain, NULL, format, ap); va_end(ap); } /** Output a message to the log, prefixed with a function name fn. */ #ifdef __GNUC__ void _log_fn(int severity, log_domain_mask_t domain, const char *fn, const char *format, ...) { va_list ap; if (severity > _log_global_min_severity) return; va_start(ap,format); logv(severity, domain, fn, format, ap); va_end(ap); } #else const char *_log_fn_function_name=NULL; void _log_fn(int severity, log_domain_mask_t domain, const char *format, ...) { va_list ap; if (severity > _log_global_min_severity) return; va_start(ap,format); logv(severity, domain, _log_fn_function_name, format, ap); va_end(ap); _log_fn_function_name = NULL; } void _log_debug(log_domain_mask_t domain, const char *format, ...) { va_list ap; /* For GCC we do this check in the macro. */ if (PREDICT_LIKELY(LOG_DEBUG > _log_global_min_severity)) return; va_start(ap,format); logv(LOG_DEBUG, domain, _log_fn_function_name, format, ap); va_end(ap); _log_fn_function_name = NULL; } void _log_info(log_domain_mask_t domain, const char *format, ...) { va_list ap; if (LOG_INFO > _log_global_min_severity) return; va_start(ap,format); logv(LOG_INFO, domain, _log_fn_function_name, format, ap); va_end(ap); _log_fn_function_name = NULL; } void _log_notice(log_domain_mask_t domain, const char *format, ...) { va_list ap; if (LOG_NOTICE > _log_global_min_severity) return; va_start(ap,format); logv(LOG_NOTICE, domain, _log_fn_function_name, format, ap); va_end(ap); _log_fn_function_name = NULL; } void _log_warn(log_domain_mask_t domain, const char *format, ...) { va_list ap; if (LOG_WARN > _log_global_min_severity) return; va_start(ap,format); logv(LOG_WARN, domain, _log_fn_function_name, format, ap); va_end(ap); _log_fn_function_name = NULL; } void _log_err(log_domain_mask_t domain, const char *format, ...) { va_list ap; if (LOG_ERR > _log_global_min_severity) return; va_start(ap,format); logv(LOG_ERR, domain, _log_fn_function_name, format, ap); va_end(ap); _log_fn_function_name = NULL; } #endif /** DOCDOC */ static void log_free(logfile_t *victim) { tor_free(victim->severities); tor_free(victim->filename); tor_free(victim); } /** Close all open log files, and free other static memory. */ void logs_free_all(void) { logfile_t *victim, *next; LOCK_LOGS(); next = logfiles; logfiles = NULL; UNLOCK_LOGS(); while (next) { victim = next; next = next->next; close_log(victim); log_free(victim); } tor_free(appname); } /** Remove and free the log entry victim from the linked-list * logfiles (it is probably present, but it might not be due to thread * racing issues). After this function is called, the caller shouldn't * refer to victim anymore. * * Long-term, we need to do something about races in the log subsystem * in general. See bug 222 for more details. */ static void delete_log(logfile_t *victim) { logfile_t *tmpl; if (victim == logfiles) logfiles = victim->next; else { for (tmpl = logfiles; tmpl && tmpl->next != victim; tmpl=tmpl->next) ; // tor_assert(tmpl); // tor_assert(tmpl->next == victim); if (!tmpl) return; tmpl->next = victim->next; } log_free(victim); } /** Helper: release system resources (but not memory) held by a single * logfile_t. */ static void close_log(logfile_t *victim) { if (victim->needs_close && victim->file) { fclose(victim->file); } else if (victim->is_syslog) { #ifdef HAVE_SYSLOG_H if (--syslog_count == 0) { /* There are no other syslogs; close the logging facility. */ closelog(); } #endif } } /** DOCDOC XXXX021 remove me. */ static log_severity_list_t * new_severity_list(int loglevelMin, int loglevelMax) { log_severity_list_t *out = tor_malloc_zero(sizeof(log_severity_list_t)); int i; for (i = loglevelMin; i >= loglevelMax; --i) { out->masks[SEVERITY_MASK_IDX(i)] = ~0u; } return out; } /** Add a log handler named name to send all messages in severity * to stream. Copies severity. Helper: does no locking. */ static void add_stream_log_impl(log_severity_list_t *severity, const char *name, FILE *stream) { logfile_t *lf; lf = tor_malloc_zero(sizeof(logfile_t)); lf->filename = tor_strdup(name); lf->severities = tor_memdup(severity, sizeof(log_severity_list_t)); lf->file = stream; lf->next = logfiles; logfiles = lf; _log_global_min_severity = get_min_log_level(); } /** Add a log handler named name to send all messages in severity * to stream. Steals a reference to severity; the caller must * not use it after calling this function. */ void add_stream_log(log_severity_list_t *severity, const char *name, FILE *stream) { LOCK_LOGS(); add_stream_log_impl(severity, name, stream); UNLOCK_LOGS(); } /** Initialize the global logging facility */ void init_logging(void) { if (!log_mutex) log_mutex = tor_mutex_new(); } /** Add a log handler to receive messages during startup (before the real * logs are initialized). */ void add_temp_log(void) { LOCK_LOGS(); add_stream_log_impl(new_severity_list(LOG_NOTICE, LOG_ERR), "", stdout); logfiles->is_temporary = 1; UNLOCK_LOGS(); } /** * Add a log handler to send messages in severity * to the function cb. */ int add_callback_log(log_severity_list_t *severity, log_callback cb) { logfile_t *lf; lf = tor_malloc_zero(sizeof(logfile_t)); lf->severities = tor_memdup(severity, sizeof(log_severity_list_t)); lf->filename = tor_strdup(""); lf->callback = cb; lf->next = logfiles; LOCK_LOGS(); logfiles = lf; _log_global_min_severity = get_min_log_level(); UNLOCK_LOGS(); return 0; } /** Adjust the configured severity of any logs whose callback function is * cb. */ void change_callback_log_severity(int loglevelMin, int loglevelMax, log_callback cb) { logfile_t *lf; LOCK_LOGS(); for (lf = logfiles; lf; lf = lf->next) { if (lf->callback == cb) { tor_free(lf->severities); lf->severities = new_severity_list(loglevelMin, loglevelMax); } } _log_global_min_severity = get_min_log_level(); UNLOCK_LOGS(); } /** Close any log handlers added by add_temp_log or marked by mark_logs_temp */ void close_temp_logs(void) { logfile_t *lf, **p; LOCK_LOGS(); for (p = &logfiles; *p; ) { if ((*p)->is_temporary) { lf = *p; /* we use *p here to handle the edge case of the head of the list */ *p = (*p)->next; close_log(lf); log_free(lf); } else { p = &((*p)->next); } } _log_global_min_severity = get_min_log_level(); UNLOCK_LOGS(); } /** Make all currently temporary logs (set to be closed by close_temp_logs) * live again, and close all non-temporary logs. */ void rollback_log_changes(void) { logfile_t *lf; LOCK_LOGS(); for (lf = logfiles; lf; lf = lf->next) lf->is_temporary = ! lf->is_temporary; UNLOCK_LOGS(); close_temp_logs(); } /** Configure all log handles to be closed by close_temp_logs */ void mark_logs_temp(void) { logfile_t *lf; LOCK_LOGS(); for (lf = logfiles; lf; lf = lf->next) lf->is_temporary = 1; UNLOCK_LOGS(); } /** * Add a log handler to send messages to filename. If opening * the logfile fails, -1 is returned and errno is set appropriately * (by fopen). */ int add_file_log(log_severity_list_t *severity, const char *filename) { FILE *f; logfile_t *lf; f = fopen(filename, "a"); if (!f) return -1; LOCK_LOGS(); add_stream_log_impl(severity, filename, f); logfiles->needs_close = 1; lf = logfiles; _log_global_min_severity = get_min_log_level(); UNLOCK_LOGS(); if (log_tor_version(lf, 0) < 0) { LOCK_LOGS(); delete_log(lf); UNLOCK_LOGS(); } return 0; } #ifdef HAVE_SYSLOG_H /** * Add a log handler to send messages to they system log facility. */ int add_syslog_log(log_severity_list_t *severity) { logfile_t *lf; if (syslog_count++ == 0) /* This is the first syslog. */ openlog("Tor", LOG_PID | LOG_NDELAY, LOGFACILITY); lf = tor_malloc_zero(sizeof(logfile_t)); lf->severities = tor_memdup(severity, sizeof(log_severity_list_t)); lf->filename = tor_strdup(""); lf->is_syslog = 1; LOCK_LOGS(); lf->next = logfiles; logfiles = lf; _log_global_min_severity = get_min_log_level(); UNLOCK_LOGS(); return 0; } #endif /** If level is a valid log severity, return the corresponding * numeric value. Otherwise, return -1. */ int parse_log_level(const char *level) { if (!strcasecmp(level, "err")) return LOG_ERR; if (!strcasecmp(level, "warn")) return LOG_WARN; if (!strcasecmp(level, "notice")) return LOG_NOTICE; if (!strcasecmp(level, "info")) return LOG_INFO; if (!strcasecmp(level, "debug")) return LOG_DEBUG; return -1; } /** Return the string equivalent of a given log level. */ const char * log_level_to_string(int level) { return sev_to_string(level); } /** DOCDOC */ static const char *domain_list[] = { "GENERAL", "CRYPTO", "NET", "CONFIG", "FS", "PROTOCOL", "MM", "HTTP", "APP", "CONTROL", "CIRC", "REND", "BUG", "DIR", "DIRSERV", "OR", "EDGE", "ACCT", NULL }; /** DOCDOC */ static log_domain_mask_t parse_log_domain(const char *domain) { int i; for (i=0; domain_list[i]; ++i) { if (!strcasecmp(domain, domain_list[i])) return (1u<= N_LOGGING_DOMAINS) return NULL; return domain_list[bit]; } #endif /** Parse a log severity pattern in *cfg_ptr. Advance cfg_ptr after * the end of the severityPattern. Set the value of severity_out to * the parsed pattern. Return 0 on success, -1 on failure. * * The syntax for a SeverityPattern is: *
 *   SeverityPattern = *(DomainSeverity SP)* DomainSeverity
 *   DomainSeverity = (DomainList SP)? SeverityRange
 *   SeverityRange = MinSeverity ("-" MaxSeverity )?
 *   DomainList = "[" (SP? DomainSpec SP? ",") SP? DomainSpec "]"
 *   DomainSpec = "*" | Domain | "~" Domain
 * 
* A missing MaxSeverity defaults to ERR. Severities and domains are * case-insensitive. "~" indicates negation for a domain; negation happens * last inside a DomainList. Only one SeverityRange without a DomainList is * allowed per line. */ int parse_log_severity_config(const char **cfg_ptr, log_severity_list_t *severity_out) { const char *cfg = *cfg_ptr; int got_anything = 0; int got_an_unqualified_range = 0; memset(severity_out, 0, sizeof(*severity_out)); cfg = eat_whitespace(cfg); while (*cfg) { const char *dash, *space; char *sev_lo, *sev_hi; int low, high, i; log_domain_mask_t domains = ~0u; if (*cfg == '[') { int err = 0; char *domains_str; smartlist_t *domains_list; log_domain_mask_t neg_domains = 0; const char *closebracket = strchr(cfg, ']'); if (!closebracket) return -1; domains = 0; domains_str = tor_strndup(cfg+1, closebracket-cfg-1); domains_list = smartlist_create(); smartlist_split_string(domains_list, domains_str, ",", SPLIT_SKIP_SPACE, -1); tor_free(domains_str); SMARTLIST_FOREACH(domains_list, const char *, domain, { if (!strcmp(domain, "*")) { domains = ~0u; } else { int d; int negate=0; if (*domain == '~') { negate = 1; ++domain; } d = parse_log_domain(domain); if (!d) { log_warn(LD_CONFIG, "No such loggging domain as %s", domain); err = 1; } else { if (negate) neg_domains |= d; else domains |= d; } } }); SMARTLIST_FOREACH(domains_list, char *, d, tor_free(d)); smartlist_free(domains_list); if (err) return -1; domains &= ~neg_domains; cfg = eat_whitespace(closebracket+1); } else { ++got_an_unqualified_range; } if (!strcasecmpstart(cfg, "file") || !strcasecmpstart(cfg, "stderr") || !strcasecmpstart(cfg, "stdout") || !strcasecmpstart(cfg, "syslog")) { goto done; } if (got_an_unqualified_range > 1) return -1; space = strchr(cfg, ' '); dash = strchr(cfg, '-'); if (!space) space = strchr(cfg, '\0'); if (dash && dash < space) { sev_lo = tor_strndup(cfg, dash-cfg); sev_hi = tor_strndup(dash+1, space-(dash+1)); } else { sev_lo = tor_strndup(cfg, space-cfg); sev_hi = tor_strdup("ERR"); } if ((low = parse_log_level(sev_lo)) == -1) return -1; if ((high = parse_log_level(sev_hi)) == -1) return -1; got_anything = 1; for (i=low; i >= high; --i) severity_out->masks[SEVERITY_MASK_IDX(i)] |= domains; cfg = eat_whitespace(space); } done: *cfg_ptr = cfg; return got_anything ? 0 : -1; } /** Return the least severe log level that any current log is interested in. */ int get_min_log_level(void) { logfile_t *lf; int i; int min = LOG_ERR; for (lf = logfiles; lf; lf = lf->next) { for (i = LOG_DEBUG; i > min; --i) if (lf->severities->masks[SEVERITY_MASK_IDX(i)]) min = i; } return min; } /** Switch all logs to output at most verbose level. */ void switch_logs_debug(void) { logfile_t *lf; int i; LOCK_LOGS(); for (lf = logfiles; lf; lf=lf->next) { for (i = LOG_DEBUG; i >= LOG_ERR; --i) lf->severities->masks[i] = ~0u; } UNLOCK_LOGS(); } #ifdef HAVE_EVENT_SET_LOG_CALLBACK /** A string which, if it appears in a libevent log, should be ignored. */ static const char *suppress_msg = NULL; /** Callback function passed to event_set_log() so we can intercept * log messages from libevent. */ static void libevent_logging_callback(int severity, const char *msg) { char buf[1024]; size_t n; if (suppress_msg && strstr(msg, suppress_msg)) return; n = strlcpy(buf, msg, sizeof(buf)); if (n && n < sizeof(buf) && buf[n-1] == '\n') { buf[n-1] = '\0'; } switch (severity) { case _EVENT_LOG_DEBUG: log(LOG_DEBUG, LD_NET, "Message from libevent: %s", buf); break; case _EVENT_LOG_MSG: log(LOG_INFO, LD_NET, "Message from libevent: %s", buf); break; case _EVENT_LOG_WARN: log(LOG_WARN, LD_GENERAL, "Warning from libevent: %s", buf); break; case _EVENT_LOG_ERR: log(LOG_ERR, LD_GENERAL, "Error from libevent: %s", buf); break; default: log(LOG_WARN, LD_GENERAL, "Message [%d] from libevent: %s", severity, buf); break; } } /** Set hook to intercept log messages from libevent. */ void configure_libevent_logging(void) { event_set_log_callback(libevent_logging_callback); } /** Ignore any libevent log message that contains msg. */ void suppress_libevent_log_msg(const char *msg) { suppress_msg = msg; } #else void configure_libevent_logging(void) { } void suppress_libevent_log_msg(const char *msg) { (void)msg; } #endif #if 0 static void dump_log_info(logfile_t *lf) { const char *tp; if (lf->filename) { printf("=== log into \"%s\" (%s-%s) (%stemporary)\n", lf->filename, sev_to_string(lf->min_loglevel), sev_to_string(lf->max_loglevel), lf->is_temporary?"":"not "); } else if (lf->is_syslog) { printf("=== syslog (%s-%s) (%stemporary)\n", sev_to_string(lf->min_loglevel), sev_to_string(lf->max_loglevel), lf->is_temporary?"":"not "); } else { printf("=== log (%s-%s) (%stemporary)\n", sev_to_string(lf->min_loglevel), sev_to_string(lf->max_loglevel), lf->is_temporary?"":"not "); } } void describe_logs(void) { logfile_t *lf; printf("==== BEGIN LOGS ====\n"); for (lf = logfiles; lf; lf = lf->next) dump_log_info(lf); printf("==== END LOGS ====\n"); } #endif