cryptospore / rpms / qemu-kvm

Forked from rpms/qemu-kvm 2 years ago
Clone
218e99
From ca635f6c3ae10562a2165590bb84667aa61ad12f Mon Sep 17 00:00:00 2001
218e99
From: Max Reitz <mreitz@redhat.com>
218e99
Date: Mon, 4 Nov 2013 22:32:29 +0100
218e99
Subject: [PATCH 36/87] qcow2: Use negated overflow check mask
218e99
218e99
RH-Author: Max Reitz <mreitz@redhat.com>
218e99
Message-id: <1383604354-12743-39-git-send-email-mreitz@redhat.com>
218e99
Patchwork-id: 55338
218e99
O-Subject: [RHEL-7.0 qemu-kvm PATCH 38/43] qcow2: Use negated overflow check mask
218e99
Bugzilla: 1004347
218e99
RH-Acked-by: Kevin Wolf <kwolf@redhat.com>
218e99
RH-Acked-by: Laszlo Ersek <lersek@redhat.com>
218e99
RH-Acked-by: Fam Zheng <famz@redhat.com>
218e99
RH-Acked-by: Stefan Hajnoczi <stefanha@redhat.com>
218e99
218e99
BZ: 1004347
218e99
218e99
In qcow2_check_metadata_overlap and qcow2_pre_write_overlap_check,
218e99
change the parameter signifying the checks to perform from its current
218e99
positive form to a negative one, i.e., it will no longer explicitly
218e99
specify every check to perform but rather a mask of checks not to
218e99
perform.
218e99
218e99
Signed-off-by: Max Reitz <mreitz@redhat.com>
218e99
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
218e99
(cherry picked from commit 231bb267644ee3a9ebfd9c7f42d5d41610194b45)
218e99
218e99
Signed-off-by: Max Reitz <mreitz@redhat.com>
218e99
218e99
Conflicts:
218e99
	block/qcow2-cluster.c
218e99
218e99
Conflicts because downstream does not contain
218e99
expand_zero_clusters_in_l1().
218e99
---
218e99
 block/qcow2-cache.c    |  8 +++-----
218e99
 block/qcow2-cluster.c  |  9 ++++-----
218e99
 block/qcow2-refcount.c | 22 ++++++++++------------
218e99
 block/qcow2-snapshot.c | 12 +++++-------
218e99
 block/qcow2.c          |  5 ++---
218e99
 block/qcow2.h          |  4 ++--
218e99
 6 files changed, 26 insertions(+), 34 deletions(-)
218e99
218e99
Signed-off-by: Miroslav Rezanina <mrezanin@redhat.com>
218e99
---
218e99
 block/qcow2-cache.c    |    8 +++-----
218e99
 block/qcow2-cluster.c  |    9 ++++-----
218e99
 block/qcow2-refcount.c |   22 ++++++++++------------
218e99
 block/qcow2-snapshot.c |   12 +++++-------
218e99
 block/qcow2.c          |    5 ++---
218e99
 block/qcow2.h          |    4 ++--
218e99
 6 files changed, 26 insertions(+), 34 deletions(-)
218e99
218e99
diff --git a/block/qcow2-cache.c b/block/qcow2-cache.c
218e99
index 7bcae09..eb1d69b 100644
218e99
--- a/block/qcow2-cache.c
218e99
+++ b/block/qcow2-cache.c
218e99
@@ -115,15 +115,13 @@ static int qcow2_cache_entry_flush(BlockDriverState *bs, Qcow2Cache *c, int i)
218e99
     }
218e99
 
218e99
     if (c == s->refcount_block_cache) {
218e99
-        ret = qcow2_pre_write_overlap_check(bs,
218e99
-                QCOW2_OL_DEFAULT & ~QCOW2_OL_REFCOUNT_BLOCK,
218e99
+        ret = qcow2_pre_write_overlap_check(bs, QCOW2_OL_REFCOUNT_BLOCK,
218e99
                 c->entries[i].offset, s->cluster_size);
218e99
     } else if (c == s->l2_table_cache) {
218e99
-        ret = qcow2_pre_write_overlap_check(bs,
218e99
-                QCOW2_OL_DEFAULT & ~QCOW2_OL_ACTIVE_L2,
218e99
+        ret = qcow2_pre_write_overlap_check(bs, QCOW2_OL_ACTIVE_L2,
218e99
                 c->entries[i].offset, s->cluster_size);
218e99
     } else {
218e99
-        ret = qcow2_pre_write_overlap_check(bs, QCOW2_OL_DEFAULT,
218e99
+        ret = qcow2_pre_write_overlap_check(bs, 0,
218e99
                 c->entries[i].offset, s->cluster_size);
218e99
     }
218e99
 
218e99
diff --git a/block/qcow2-cluster.c b/block/qcow2-cluster.c
218e99
index c05f182..5d13515 100644
218e99
--- a/block/qcow2-cluster.c
218e99
+++ b/block/qcow2-cluster.c
218e99
@@ -83,8 +83,8 @@ int qcow2_grow_l1_table(BlockDriverState *bs, uint64_t min_size,
218e99
 
218e99
     /* the L1 position has not yet been updated, so these clusters must
218e99
      * indeed be completely free */
218e99
-    ret = qcow2_pre_write_overlap_check(bs, QCOW2_OL_DEFAULT,
218e99
-                                        new_l1_table_offset, new_l1_size2);
218e99
+    ret = qcow2_pre_write_overlap_check(bs, 0, new_l1_table_offset,
218e99
+                                        new_l1_size2);
218e99
     if (ret < 0) {
218e99
         goto fail;
218e99
     }
218e99
@@ -160,8 +160,7 @@ int qcow2_write_l1_entry(BlockDriverState *bs, int l1_index)
218e99
         buf[i] = cpu_to_be64(s->l1_table[l1_start_index + i]);
218e99
     }
218e99
 
218e99
-    ret = qcow2_pre_write_overlap_check(bs,
218e99
-            QCOW2_OL_DEFAULT & ~QCOW2_OL_ACTIVE_L1,
218e99
+    ret = qcow2_pre_write_overlap_check(bs, QCOW2_OL_ACTIVE_L1,
218e99
             s->l1_table_offset + 8 * l1_start_index, sizeof(buf));
218e99
     if (ret < 0) {
218e99
         return ret;
218e99
@@ -386,7 +385,7 @@ static int coroutine_fn copy_sectors(BlockDriverState *bs,
218e99
                         &s->aes_encrypt_key);
218e99
     }
218e99
 
218e99
-    ret = qcow2_pre_write_overlap_check(bs, QCOW2_OL_DEFAULT,
218e99
+    ret = qcow2_pre_write_overlap_check(bs, 0,
218e99
             cluster_offset + n_start * BDRV_SECTOR_SIZE, n * BDRV_SECTOR_SIZE);
218e99
     if (ret < 0) {
218e99
         goto out;
218e99
diff --git a/block/qcow2-refcount.c b/block/qcow2-refcount.c
218e99
index 5c5683d..91c446b 100644
218e99
--- a/block/qcow2-refcount.c
218e99
+++ b/block/qcow2-refcount.c
218e99
@@ -1291,9 +1291,8 @@ static int check_oflag_copied(BlockDriverState *bs, BdrvCheckResult *res,
218e99
         }
218e99
 
218e99
         if (l2_dirty) {
218e99
-            ret = qcow2_pre_write_overlap_check(bs,
218e99
-                    QCOW2_OL_DEFAULT & ~QCOW2_OL_ACTIVE_L2, l2_offset,
218e99
-                    s->cluster_size);
218e99
+            ret = qcow2_pre_write_overlap_check(bs, QCOW2_OL_ACTIVE_L2,
218e99
+                                                l2_offset, s->cluster_size);
218e99
             if (ret < 0) {
218e99
                 fprintf(stderr, "ERROR: Could not write L2 table; metadata "
218e99
                         "overlap check failed: %s\n", strerror(-ret));
218e99
@@ -1334,8 +1333,7 @@ static int write_reftable_entry(BlockDriverState *bs, int rt_index)
218e99
         buf[i] = cpu_to_be64(s->refcount_table[rt_start_index + i]);
218e99
     }
218e99
 
218e99
-    ret = qcow2_pre_write_overlap_check(bs,
218e99
-            QCOW2_OL_DEFAULT & ~QCOW2_OL_REFCOUNT_TABLE,
218e99
+    ret = qcow2_pre_write_overlap_check(bs, QCOW2_OL_REFCOUNT_TABLE,
218e99
             s->refcount_table_offset + rt_start_index * sizeof(uint64_t),
218e99
             sizeof(buf));
218e99
     if (ret < 0) {
218e99
@@ -1386,8 +1384,7 @@ static int64_t realloc_refcount_block(BlockDriverState *bs, int reftable_index,
218e99
 
218e99
     /* new block has not yet been entered into refcount table, therefore it is
218e99
      * no refcount block yet (regarding this check) */
218e99
-    ret = qcow2_pre_write_overlap_check(bs, QCOW2_OL_DEFAULT, new_offset,
218e99
-            s->cluster_size);
218e99
+    ret = qcow2_pre_write_overlap_check(bs, 0, new_offset, s->cluster_size);
218e99
     if (ret < 0) {
218e99
         fprintf(stderr, "Could not write refcount block; metadata overlap "
218e99
                 "check failed: %s\n", strerror(-ret));
218e99
@@ -1619,8 +1616,8 @@ fail:
218e99
  * looking for overlaps with important metadata sections (L1/L2 tables etc.),
218e99
  * i.e. a sanity check without relying on the refcount tables.
218e99
  *
218e99
- * The chk parameter specifies exactly what checks to perform (being a bitmask
218e99
- * of QCow2MetadataOverlap values).
218e99
+ * The ign parameter specifies what checks not to perform (being a bitmask of
218e99
+ * QCow2MetadataOverlap values), i.e., what sections to ignore.
218e99
  *
218e99
  * Returns:
218e99
  * - 0 if writing to this offset will not affect the mentioned metadata
218e99
@@ -1628,10 +1625,11 @@ fail:
218e99
  * - a negative value (-errno) indicating an error while performing a check,
218e99
  *   e.g. when bdrv_read failed on QCOW2_OL_INACTIVE_L2
218e99
  */
218e99
-int qcow2_check_metadata_overlap(BlockDriverState *bs, int chk, int64_t offset,
218e99
+int qcow2_check_metadata_overlap(BlockDriverState *bs, int ign, int64_t offset,
218e99
                                  int64_t size)
218e99
 {
218e99
     BDRVQcowState *s = bs->opaque;
218e99
+    int chk = QCOW2_OL_DEFAULT & ~ign;
218e99
     int i, j;
218e99
 
218e99
     if (!size) {
218e99
@@ -1747,10 +1745,10 @@ static const char *metadata_ol_names[] = {
218e99
  * Returns 0 if there were neither overlaps nor errors while checking for
218e99
  * overlaps; or a negative value (-errno) on error.
218e99
  */
218e99
-int qcow2_pre_write_overlap_check(BlockDriverState *bs, int chk, int64_t offset,
218e99
+int qcow2_pre_write_overlap_check(BlockDriverState *bs, int ign, int64_t offset,
218e99
                                   int64_t size)
218e99
 {
218e99
-    int ret = qcow2_check_metadata_overlap(bs, chk, offset, size);
218e99
+    int ret = qcow2_check_metadata_overlap(bs, ign, offset, size);
218e99
 
218e99
     if (ret < 0) {
218e99
         return ret;
218e99
diff --git a/block/qcow2-snapshot.c b/block/qcow2-snapshot.c
218e99
index 450e4f5..aa88c51 100644
218e99
--- a/block/qcow2-snapshot.c
218e99
+++ b/block/qcow2-snapshot.c
218e99
@@ -191,8 +191,7 @@ static int qcow2_write_snapshots(BlockDriverState *bs)
218e99
 
218e99
     /* The snapshot list position has not yet been updated, so these clusters
218e99
      * must indeed be completely free */
218e99
-    ret = qcow2_pre_write_overlap_check(bs, QCOW2_OL_DEFAULT, offset,
218e99
-                                        snapshots_size);
218e99
+    ret = qcow2_pre_write_overlap_check(bs, 0, offset, snapshots_size);
218e99
     if (ret < 0) {
218e99
         return ret;
218e99
     }
218e99
@@ -372,8 +371,8 @@ int qcow2_snapshot_create(BlockDriverState *bs, QEMUSnapshotInfo *sn_info)
218e99
         l1_table[i] = cpu_to_be64(s->l1_table[i]);
218e99
     }
218e99
 
218e99
-    ret = qcow2_pre_write_overlap_check(bs, QCOW2_OL_DEFAULT,
218e99
-            sn->l1_table_offset, s->l1_size * sizeof(uint64_t));
218e99
+    ret = qcow2_pre_write_overlap_check(bs, 0, sn->l1_table_offset,
218e99
+                                        s->l1_size * sizeof(uint64_t));
218e99
     if (ret < 0) {
218e99
         goto fail;
218e99
     }
218e99
@@ -490,9 +489,8 @@ int qcow2_snapshot_goto(BlockDriverState *bs, const char *snapshot_id)
218e99
         goto fail;
218e99
     }
218e99
 
218e99
-    ret = qcow2_pre_write_overlap_check(bs,
218e99
-            QCOW2_OL_DEFAULT & ~QCOW2_OL_ACTIVE_L1,
218e99
-            s->l1_table_offset, cur_l1_bytes);
218e99
+    ret = qcow2_pre_write_overlap_check(bs, QCOW2_OL_ACTIVE_L1,
218e99
+                                        s->l1_table_offset, cur_l1_bytes);
218e99
     if (ret < 0) {
218e99
         goto fail;
218e99
     }
218e99
diff --git a/block/qcow2.c b/block/qcow2.c
218e99
index 8b73518..ac5ed47 100644
218e99
--- a/block/qcow2.c
218e99
+++ b/block/qcow2.c
218e99
@@ -964,7 +964,7 @@ static coroutine_fn int qcow2_co_writev(BlockDriverState *bs,
218e99
                 cur_nr_sectors * 512);
218e99
         }
218e99
 
218e99
-        ret = qcow2_pre_write_overlap_check(bs, QCOW2_OL_DEFAULT,
218e99
+        ret = qcow2_pre_write_overlap_check(bs, 0,
218e99
                 cluster_offset + index_in_cluster * BDRV_SECTOR_SIZE,
218e99
                 cur_nr_sectors * BDRV_SECTOR_SIZE);
218e99
         if (ret < 0) {
218e99
@@ -1748,8 +1748,7 @@ static int qcow2_write_compressed(BlockDriverState *bs, int64_t sector_num,
218e99
         }
218e99
         cluster_offset &= s->cluster_offset_mask;
218e99
 
218e99
-        ret = qcow2_pre_write_overlap_check(bs, QCOW2_OL_DEFAULT,
218e99
-                cluster_offset, out_len);
218e99
+        ret = qcow2_pre_write_overlap_check(bs, 0, cluster_offset, out_len);
218e99
         if (ret < 0) {
218e99
             goto fail;
218e99
         }
218e99
diff --git a/block/qcow2.h b/block/qcow2.h
218e99
index 10b7bf4..64ad43c 100644
218e99
--- a/block/qcow2.h
218e99
+++ b/block/qcow2.h
218e99
@@ -424,9 +424,9 @@ int qcow2_check_refcounts(BlockDriverState *bs, BdrvCheckResult *res,
218e99
 
218e99
 void qcow2_process_discards(BlockDriverState *bs, int ret);
218e99
 
218e99
-int qcow2_check_metadata_overlap(BlockDriverState *bs, int chk, int64_t offset,
218e99
+int qcow2_check_metadata_overlap(BlockDriverState *bs, int ign, int64_t offset,
218e99
                                  int64_t size);
218e99
-int qcow2_pre_write_overlap_check(BlockDriverState *bs, int chk, int64_t offset,
218e99
+int qcow2_pre_write_overlap_check(BlockDriverState *bs, int ign, int64_t offset,
218e99
                                   int64_t size);
218e99
 
218e99
 /* qcow2-cluster.c functions */
218e99
-- 
218e99
1.7.1
218e99