|
|
05bba0 |
From cd10207e755b1b0470503c72c78a8d927f87a37a Mon Sep 17 00:00:00 2001
|
|
|
05bba0 |
From: Max Reitz <mreitz@redhat.com>
|
|
|
05bba0 |
Date: Sat, 13 Jun 2015 16:21:58 +0200
|
|
|
05bba0 |
Subject: [PATCH 04/42] qcow2: Catch !*host_offset for data allocation
|
|
|
05bba0 |
|
|
|
05bba0 |
Message-id: <1434212556-3927-5-git-send-email-mreitz@redhat.com>
|
|
|
05bba0 |
Patchwork-id: 66023
|
|
|
05bba0 |
O-Subject: [RHEL-7.2 qemu-kvm PATCH 04/42] qcow2: Catch !*host_offset for data allocation
|
|
|
05bba0 |
Bugzilla: 1129893
|
|
|
05bba0 |
RH-Acked-by: Jeffrey Cody <jcody@redhat.com>
|
|
|
05bba0 |
RH-Acked-by: Fam Zheng <famz@redhat.com>
|
|
|
05bba0 |
RH-Acked-by: Stefan Hajnoczi <stefanha@redhat.com>
|
|
|
05bba0 |
|
|
|
05bba0 |
BZ: 1129893
|
|
|
05bba0 |
|
|
|
05bba0 |
qcow2_alloc_cluster_offset() uses host_offset == 0 as "no preferred
|
|
|
05bba0 |
offset" for the (data) cluster range to be allocated. However, this
|
|
|
05bba0 |
offset is actually valid and may be allocated on images with a corrupted
|
|
|
05bba0 |
refcount table or first refcount block.
|
|
|
05bba0 |
|
|
|
05bba0 |
In this case, the corruption prevention should normally catch that
|
|
|
05bba0 |
write anyway (because it would overwrite the image header). But since 0
|
|
|
05bba0 |
is a special value here, the function assumes that nothing has been
|
|
|
05bba0 |
allocated at all which it asserts against.
|
|
|
05bba0 |
|
|
|
05bba0 |
Because this condition is not qemu's fault but rather that of a broken
|
|
|
05bba0 |
image, it shouldn't throw an assertion but rather mark the image corrupt
|
|
|
05bba0 |
and show an appropriate message, which this patch does by calling the
|
|
|
05bba0 |
corruption check earlier than it would be called normally (before the
|
|
|
05bba0 |
assertion).
|
|
|
05bba0 |
|
|
|
05bba0 |
Signed-off-by: Max Reitz <mreitz@redhat.com>
|
|
|
05bba0 |
Reviewed-by: Eric Blake <eblake@redhat.com>
|
|
|
05bba0 |
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
|
|
|
05bba0 |
(cherry picked from commit ff52aab2df5c5e10f231481961b88d25a3021724)
|
|
|
05bba0 |
|
|
|
05bba0 |
Signed-off-by: Max Reitz <mreitz@redhat.com>
|
|
|
05bba0 |
Signed-off-by: Miroslav Rezanina <mrezanin@redhat.com>
|
|
|
05bba0 |
---
|
|
|
05bba0 |
block/qcow2-cluster.c | 11 +++++++++++
|
|
|
05bba0 |
1 file changed, 11 insertions(+)
|
|
|
05bba0 |
|
|
|
05bba0 |
diff --git a/block/qcow2-cluster.c b/block/qcow2-cluster.c
|
|
|
05bba0 |
index 1b9609f..f2f1170 100644
|
|
|
05bba0 |
--- a/block/qcow2-cluster.c
|
|
|
05bba0 |
+++ b/block/qcow2-cluster.c
|
|
|
05bba0 |
@@ -1089,6 +1089,17 @@ static int handle_alloc(BlockDriverState *bs, uint64_t guest_offset,
|
|
|
05bba0 |
return 0;
|
|
|
05bba0 |
}
|
|
|
05bba0 |
|
|
|
05bba0 |
+ /* !*host_offset would overwrite the image header and is reserved for "no
|
|
|
05bba0 |
+ * host offset preferred". If 0 was a valid host offset, it'd trigger the
|
|
|
05bba0 |
+ * following overlap check; do that now to avoid having an invalid value in
|
|
|
05bba0 |
+ * *host_offset. */
|
|
|
05bba0 |
+ if (!alloc_cluster_offset) {
|
|
|
05bba0 |
+ ret = qcow2_pre_write_overlap_check(bs, 0, alloc_cluster_offset,
|
|
|
05bba0 |
+ nb_clusters * s->cluster_size);
|
|
|
05bba0 |
+ assert(ret < 0);
|
|
|
05bba0 |
+ goto fail;
|
|
|
05bba0 |
+ }
|
|
|
05bba0 |
+
|
|
|
05bba0 |
/*
|
|
|
05bba0 |
* Save info needed for meta data update.
|
|
|
05bba0 |
*
|
|
|
05bba0 |
--
|
|
|
05bba0 |
1.8.3.1
|
|
|
05bba0 |
|