diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-14 21:14:40 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-14 21:14:40 +0000 |
commit | f342a2a222c9bf49a51d66c4a48fdfd0db50272a (patch) | |
tree | fe21ed89618a4eaf167e97bbc92cee48ec8d0420 /debian/patches/upstream | |
parent | Adding debian version 2.40-1. (diff) | |
download | util-linux-f342a2a222c9bf49a51d66c4a48fdfd0db50272a.tar.xz util-linux-f342a2a222c9bf49a51d66c4a48fdfd0db50272a.zip |
Adding debian version 2.40-2.debian/2.40-2
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'debian/patches/upstream')
-rw-r--r-- | debian/patches/upstream/lsfd-add-LSFD_DEBUG-env-var-for-debugging.patch | 231 | ||||
-rw-r--r-- | debian/patches/upstream/tests-test_mkfds-sockdiag-verify-the-recived-message.patch | 56 |
2 files changed, 287 insertions, 0 deletions
diff --git a/debian/patches/upstream/lsfd-add-LSFD_DEBUG-env-var-for-debugging.patch b/debian/patches/upstream/lsfd-add-LSFD_DEBUG-env-var-for-debugging.patch new file mode 100644 index 0000000..32a1687 --- /dev/null +++ b/debian/patches/upstream/lsfd-add-LSFD_DEBUG-env-var-for-debugging.patch @@ -0,0 +1,231 @@ +From: Masatake YAMATO <yamato@redhat.com> +Date: Sat, 30 Mar 2024 18:47:03 +0900 +Subject: lsfd: add LSFD_DEBUG env var for debugging + +Signed-off-by: Masatake YAMATO <yamato@redhat.com> +--- + misc-utils/lsfd-sock-xinfo.c | 51 ++++++++++++++++++++++++++++++++++++++------ + misc-utils/lsfd.c | 10 +++++++++ + misc-utils/lsfd.h | 15 +++++++++++++ + 3 files changed, 70 insertions(+), 6 deletions(-) + +diff --git a/misc-utils/lsfd-sock-xinfo.c b/misc-utils/lsfd-sock-xinfo.c +index a293806..71be41a 100644 +--- a/misc-utils/lsfd-sock-xinfo.c ++++ b/misc-utils/lsfd-sock-xinfo.c +@@ -179,9 +179,12 @@ static void load_sock_xinfo_no_nsswitch(struct netns *nsobj) + load_xinfo_from_proc_packet(netns); + + diagsd = socket(AF_NETLINK, SOCK_DGRAM, NETLINK_SOCK_DIAG); ++ DBG(ENDPOINTS, ul_debug("made a diagnose socket [fd=%d; %s]", diagsd, ++ (diagsd >= 0)? "successful": strerror(errno))); + if (diagsd >= 0) { + load_xinfo_from_diag_unix(diagsd, netns); + close(diagsd); ++ DBG(ENDPOINTS, ul_debug("close the diagnose socket")); + } + + if (nsobj) +@@ -337,6 +340,7 @@ static void send_diag_request(int diagsd, void *req, size_t req_size, + bool (*cb)(ino_t, size_t, void *), + ino_t netns) + { ++ int r; + struct sockaddr_nl nladdr = { + .nl_family = AF_NETLINK, + }; +@@ -361,30 +365,45 @@ static void send_diag_request(int diagsd, void *req, size_t req_size, + + __attribute__((aligned(sizeof(void *)))) uint8_t buf[8192]; + +- if (sendmsg(diagsd, &mhd, 0) < 0) ++ r = sendmsg(diagsd, &mhd, 0); ++ DBG(ENDPOINTS, ul_debug("sendmsg [rc=%d; %s]", ++ r, (r >= 0)? "successful": strerror(errno))); ++ if (r < 0) + return; + + for (;;) { + const struct nlmsghdr *h; +- int r = recvfrom(diagsd, buf, sizeof(buf), 0, NULL, NULL); ++ r = recvfrom(diagsd, buf, sizeof(buf), 0, NULL, NULL); ++ DBG(ENDPOINTS, ul_debug("recvfrom [rc=%d; %s]", ++ r, (r >= 0)? "successful": strerror(errno))); + if (r < 0) + return; + + h = (void *) buf; ++ DBG(ENDPOINTS, ul_debug(" OK: %d", NLMSG_OK(h, (size_t)r))); + if (!NLMSG_OK(h, (size_t)r)) + return; + + for (; NLMSG_OK(h, (size_t)r); h = NLMSG_NEXT(h, r)) { +- if (h->nlmsg_type == NLMSG_DONE) ++ if (h->nlmsg_type == NLMSG_DONE) { ++ DBG(ENDPOINTS, ul_debug(" DONE")); + return; +- if (h->nlmsg_type == NLMSG_ERROR) ++ } ++ if (h->nlmsg_type == NLMSG_ERROR) { ++ struct nlmsgerr *e = (struct nlmsgerr *)NLMSG_DATA(h); ++ DBG(ENDPOINTS, ul_debug(" ERROR: %s", ++ strerror(- e->error))); + return; ++ } + + if (h->nlmsg_type == SOCK_DIAG_BY_FAMILY) { ++ DBG(ENDPOINTS, ul_debug(" FAMILY")); + if (!cb(netns, h->nlmsg_len, NLMSG_DATA(h))) + return; + } ++ DBG(ENDPOINTS, ul_debug(" NEXT")); + } ++ DBG(ENDPOINTS, ul_debug(" OK: 0")); + } + } + +@@ -639,6 +658,8 @@ static void load_xinfo_from_proc_unix(ino_t netns_inode) + FILE *unix_fp; + + unix_fp = fopen("/proc/net/unix", "r"); ++ DBG(ENDPOINTS, ul_debug("open /proc/net/unix [fp=%p; %s]", unix_fp, ++ unix_fp? "successful": strerror(errno))); + if (!unix_fp) + return; + +@@ -655,13 +676,18 @@ static void load_xinfo_from_proc_unix(ino_t netns_inode) + unsigned long inode; + struct unix_xinfo *ux; + char path[UNIX_LINE_LEN + 1] = { 0 }; ++ int r; + ++ DBG(ENDPOINTS, ul_debug(" line: %s", line)); + +- if (sscanf(line, "%*x: %*x %*x %" SCNx64 " %x %x %lu %" ++ r = sscanf(line, "%*x: %*x %*x %" SCNx64 " %x %x %lu %" + stringify_value(UNIX_LINE_LEN) "[^\n]", +- &flags, &type, &st, &inode, path) < 4) ++ &flags, &type, &st, &inode, path); ++ DBG(ENDPOINTS, ul_debug(" scanf: %d", r)); ++ if (r < 4) + continue; + ++ DBG(ENDPOINTS, ul_debug(" inode: %lu", inode)); + if (inode == 0) + continue; + +@@ -675,10 +701,12 @@ static void load_xinfo_from_proc_unix(ino_t netns_inode) + ux->st = st; + xstrncpy(ux->path, path, sizeof(ux->path)); + ++ DBG(ENDPOINTS, ul_debug(" path: %s", ux->path)); + add_sock_info(&ux->sock); + } + + out: ++ DBG(ENDPOINTS, ul_debug("close /proc/net/unix")); + fclose(unix_fp); + } + +@@ -712,6 +740,9 @@ static bool handle_diag_unix(ino_t netns __attribute__((__unused__)), + + if (diag->udiag_family != AF_UNIX) + return false; ++ DBG(ENDPOINTS, ul_debug(" UNIX")); ++ DBG(ENDPOINTS, ul_debug(" LEN: %zu (>= %zu)", nlmsg_len, ++ (size_t)(NLMSG_LENGTH(sizeof(*diag))))); + + if (nlmsg_len < NLMSG_LENGTH(sizeof(*diag))) + return false; +@@ -719,21 +750,29 @@ static bool handle_diag_unix(ino_t netns __attribute__((__unused__)), + inode = (ino_t)diag->udiag_ino; + xinfo = get_sock_xinfo(inode); + ++ DBG(ENDPOINTS, ul_debug(" inode: %llu", (unsigned long long)inode)); ++ DBG(ENDPOINTS, ul_debug(" xinfo: %p", xinfo)); ++ + if (xinfo == NULL) + /* The socket is found in the diag response + but not in the proc fs. */ + return true; + ++ DBG(ENDPOINTS, ul_debug(" xinfo->class == &unix_xinfo_class: %d", ++ xinfo->class == &unix_xinfo_class)); + if (xinfo->class != &unix_xinfo_class) + return true; + unix_xinfo = (struct unix_xinfo *)xinfo; + + rta_len = nlmsg_len - NLMSG_LENGTH(sizeof(*diag)); ++ DBG(ENDPOINTS, ul_debug(" rta_len: %zu", rta_len)); + for (struct rtattr *attr = (struct rtattr *)(diag + 1); + RTA_OK(attr, rta_len); + attr = RTA_NEXT(attr, rta_len)) { + size_t len = RTA_PAYLOAD(attr); + ++ DBG(ENDPOINTS, ul_debug(" len = %2zu, type: %d", ++ rta_len, attr->rta_type)); + switch (attr->rta_type) { + case UNIX_DIAG_NAME: + unix_refill_name(xinfo, RTA_DATA(attr), len); +diff --git a/misc-utils/lsfd.c b/misc-utils/lsfd.c +index 771daef..4786d1d 100644 +--- a/misc-utils/lsfd.c ++++ b/misc-utils/lsfd.c +@@ -84,6 +84,14 @@ static int kcmp(pid_t pid1 __attribute__((__unused__)), + + #include "lsfd.h" + ++UL_DEBUG_DEFINE_MASK(lsfd); ++UL_DEBUG_DEFINE_MASKNAMES(lsfd) = UL_DEBUG_EMPTY_MASKNAMES; ++ ++static void lsfd_init_debug(void) ++{ ++ __UL_INIT_DEBUG_FROM_ENV(lsfd, LSFD_DEBUG_, 0, LSFD_DEBUG); ++} ++ + /* + * /proc/$pid/mountinfo entries + */ +@@ -2271,6 +2279,8 @@ int main(int argc, char *argv[]) + { NULL, 0, NULL, 0 }, + }; + ++ lsfd_init_debug(); ++ + setlocale(LC_ALL, ""); + bindtextdomain(PACKAGE, LOCALEDIR); + textdomain(PACKAGE); +diff --git a/misc-utils/lsfd.h b/misc-utils/lsfd.h +index 1859dc7..e646758 100644 +--- a/misc-utils/lsfd.h ++++ b/misc-utils/lsfd.h +@@ -28,7 +28,11 @@ + #include <sys/stat.h> + #include <dirent.h> + #include <inttypes.h> ++#include <stdio.h> ++#include <string.h> ++#include <stdlib.h> + ++#include "debug.h" + #include "libsmartcols.h" + #include "list.h" + #include "nls.h" +@@ -36,6 +40,17 @@ + #include "strutils.h" + #include "xalloc.h" + ++/* ++ * debug ++ */ ++UL_DEBUG_DECLARE_MASK(lsfd); ++ ++#define LSFD_DEBUG_INIT (1 << 1) ++#define LSFD_DEBUG_ENDPOINTS (1 << 2) ++#define LSFD_DEBUG_ALL 0xFFFF ++ ++#define DBG(m, x) __UL_DBG(lsfd, LSFD_DEBUG_, m, x) ++ + /* + * column IDs + */ diff --git a/debian/patches/upstream/tests-test_mkfds-sockdiag-verify-the-recived-message.patch b/debian/patches/upstream/tests-test_mkfds-sockdiag-verify-the-recived-message.patch new file mode 100644 index 0000000..efd9063 --- /dev/null +++ b/debian/patches/upstream/tests-test_mkfds-sockdiag-verify-the-recived-message.patch @@ -0,0 +1,56 @@ +From: Masatake YAMATO <yamato@redhat.com> +Date: Tue, 2 Apr 2024 06:34:40 +0900 +Subject: tests: (test_mkfds::sockdiag) verify the recived message + +Signed-off-by: Masatake YAMATO <yamato@redhat.com> +--- + tests/helpers/test_mkfds.c | 29 +++++++++++++++++++++++++++++ + 1 file changed, 29 insertions(+) + +diff --git a/tests/helpers/test_mkfds.c b/tests/helpers/test_mkfds.c +index 39427ba..4b138c2 100644 +--- a/tests/helpers/test_mkfds.c ++++ b/tests/helpers/test_mkfds.c +@@ -3200,6 +3200,25 @@ static int send_diag_request(int diagsd, void *req, size_t req_size) + return 0; + } + ++static int recv_diag_request(int diagsd) ++{ ++ __attribute__((aligned(sizeof(void *)))) uint8_t buf[8192]; ++ const struct nlmsghdr *h; ++ int r = recvfrom(diagsd, buf, sizeof(buf), 0, NULL, NULL);; ++ if (r < 0) ++ return errno; ++ ++ h = (void *)buf; ++ if (!NLMSG_OK(h, (size_t)r)) ++ return -1; ++ ++ if (h->nlmsg_type == NLMSG_ERROR) { ++ struct nlmsgerr *e = (struct nlmsgerr *)NLMSG_DATA(h); ++ return - e->error; ++ } ++ return 0; ++} ++ + static void *make_sockdiag(const struct factory *factory, struct fdesc fdescs[], + int argc, char ** argv) + { +@@ -3243,6 +3262,16 @@ static void *make_sockdiag(const struct factory *factory, struct fdesc fdescs[], + err(EXIT_FAILURE, "failed in sendmsg()"); + } + ++ e = recv_diag_request(diagsd); ++ if (e != 0) { ++ close (diagsd); ++ if (e == ENOENT) ++ err(EXIT_ENOENT, "failed in recvfrom()"); ++ if (e > 0) ++ err(EXIT_FAILURE, "failed in recvfrom()"); ++ if (e < 0) ++ errx(EXIT_FAILURE, "failed in recvfrom() => -1"); ++ } + + if (diagsd != fdescs[0].fd) { + if (dup2(diagsd, fdescs[0].fd) < 0) { |