Blame SOURCES/kvm-qcow2-Use-pread-for-inactive-L1-in-overlap-check.patch

218e99
From 712a6ef0d0d3bbc91953305ad8e7e96f82f19cf0 Mon Sep 17 00:00:00 2001
218e99
From: Max Reitz <mreitz@redhat.com>
218e99
Date: Mon, 4 Nov 2013 22:32:27 +0100
218e99
Subject: [PATCH 34/87] qcow2: Use pread for inactive L1 in overlap check
218e99
218e99
RH-Author: Max Reitz <mreitz@redhat.com>
218e99
Message-id: <1383604354-12743-37-git-send-email-mreitz@redhat.com>
218e99
Patchwork-id: 55336
218e99
O-Subject: [RHEL-7.0 qemu-kvm PATCH 36/43] qcow2: Use pread for inactive L1 in overlap check
218e99
Bugzilla: 1004347
218e99
RH-Acked-by: Kevin Wolf <kwolf@redhat.com>
218e99
RH-Acked-by: Laszlo Ersek <lersek@redhat.com>
218e99
RH-Acked-by: Fam Zheng <famz@redhat.com>
218e99
RH-Acked-by: Stefan Hajnoczi <stefanha@redhat.com>
218e99
218e99
BZ: 1004347
218e99
218e99
Currently, qcow2_check_metadata_overlap uses bdrv_read to read inactive
218e99
L1 tables from disk. The number of sectors to read is calculated through
218e99
a truncating integer division, therefore, if the L1 table size is not a
218e99
multiple of the sector size, the final entries will not be read and
218e99
their entries in memory remain undefined (from the g_malloc).
218e99
Using bdrv_pread fixes this.
218e99
218e99
Signed-off-by: Max Reitz <mreitz@redhat.com>
218e99
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
218e99
(cherry picked from commit 998b959c1e59044f5d5f64c482f4ce8facc8e0bc)
218e99
218e99
Signed-off-by: Max Reitz <mreitz@redhat.com>
218e99
---
218e99
 block/qcow2-refcount.c | 7 +++----
218e99
 1 file changed, 3 insertions(+), 4 deletions(-)
218e99
218e99
Signed-off-by: Miroslav Rezanina <mrezanin@redhat.com>
218e99
---
218e99
 block/qcow2-refcount.c |    7 +++----
218e99
 1 files changed, 3 insertions(+), 4 deletions(-)
218e99
218e99
diff --git a/block/qcow2-refcount.c b/block/qcow2-refcount.c
218e99
index 34fcf2f..5c5683d 100644
218e99
--- a/block/qcow2-refcount.c
218e99
+++ b/block/qcow2-refcount.c
218e99
@@ -1701,12 +1701,11 @@ int qcow2_check_metadata_overlap(BlockDriverState *bs, int chk, int64_t offset,
218e99
         for (i = 0; i < s->nb_snapshots; i++) {
218e99
             uint64_t l1_ofs = s->snapshots[i].l1_table_offset;
218e99
             uint32_t l1_sz  = s->snapshots[i].l1_size;
218e99
-            uint64_t *l1 = g_malloc(l1_sz * sizeof(uint64_t));
218e99
+            uint64_t l1_sz2 = l1_sz * sizeof(uint64_t);
218e99
+            uint64_t *l1 = g_malloc(l1_sz2);
218e99
             int ret;
218e99
 
218e99
-            ret = bdrv_read(bs->file, l1_ofs / BDRV_SECTOR_SIZE, (uint8_t *)l1,
218e99
-                            l1_sz * sizeof(uint64_t) / BDRV_SECTOR_SIZE);
218e99
-
218e99
+            ret = bdrv_pread(bs->file, l1_ofs, l1, l1_sz2);
218e99
             if (ret < 0) {
218e99
                 g_free(l1);
218e99
                 return ret;
218e99
-- 
218e99
1.7.1
218e99