0a122b
From d8f974ead4b4c1f549441e7aac96262cf2b754ee Mon Sep 17 00:00:00 2001
0a122b
From: Max Reitz <mreitz@redhat.com>
0a122b
Date: Mon, 17 Mar 2014 22:45:29 +0100
0a122b
Subject: [PATCH 4/6] qcow2: Check bs->drv in copy_sectors()
0a122b
0a122b
RH-Author: Max Reitz <mreitz@redhat.com>
0a122b
Message-id: <1395096331-12610-2-git-send-email-mreitz@redhat.com>
0a122b
Patchwork-id: 58119
0a122b
O-Subject: [RHEL-7.0 qemu-kvm PATCH 1/3] qcow2: Check bs->drv in copy_sectors()
0a122b
Bugzilla: 1048575
0a122b
RH-Acked-by: Stefan Hajnoczi <stefanha@redhat.com>
0a122b
RH-Acked-by: Kevin Wolf <kwolf@redhat.com>
0a122b
RH-Acked-by: Fam Zheng <famz@redhat.com>
0a122b
0a122b
BZ: 1048575
0a122b
0a122b
Before dereferencing bs->drv for a call to its member bdrv_co_readv(),
0a122b
copy_sectors() should check whether that pointer is indeed valid, since
0a122b
it may have been set to NULL by e.g. a concurrent write triggering the
0a122b
corruption prevention mechanism.
0a122b
0a122b
Signed-off-by: Max Reitz <mreitz@redhat.com>
0a122b
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
0a122b
(cherry picked from commit dba2855572c746836ad90ce9154403b5929d996b)
0a122b
0a122b
Signed-off-by: Max Reitz <mreitz@redhat.com>
0a122b
---
0a122b
 block/qcow2-cluster.c | 4 ++++
0a122b
 1 file changed, 4 insertions(+)
0a122b
0a122b
Signed-off-by: Miroslav Rezanina <mrezanin@redhat.com>
0a122b
---
0a122b
 block/qcow2-cluster.c |    4 ++++
0a122b
 1 files changed, 4 insertions(+), 0 deletions(-)
0a122b
0a122b
diff --git a/block/qcow2-cluster.c b/block/qcow2-cluster.c
0a122b
index 862df0f..87c13ce 100644
0a122b
--- a/block/qcow2-cluster.c
0a122b
+++ b/block/qcow2-cluster.c
0a122b
@@ -370,6 +370,10 @@ static int coroutine_fn copy_sectors(BlockDriverState *bs,
0a122b
 
0a122b
     BLKDBG_EVENT(bs->file, BLKDBG_COW_READ);
0a122b
 
0a122b
+    if (!bs->drv) {
0a122b
+        return -ENOMEDIUM;
0a122b
+    }
0a122b
+
0a122b
     /* Call .bdrv_co_readv() directly instead of using the public block-layer
0a122b
      * interface.  This avoids double I/O throttling and request tracking,
0a122b
      * which can lead to deadlock when block layer copy-on-read is enabled.
0a122b
-- 
0a122b
1.7.1
0a122b