From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:59090) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1XKtRz-0006SR-Jg for qemu-devel@nongnu.org; Fri, 22 Aug 2014 14:20:40 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1XKtRu-0003SJ-EJ for qemu-devel@nongnu.org; Fri, 22 Aug 2014 14:20:35 -0400 Received: from dew.nodalink.com ([95.130.14.197]:39932) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1XKtRu-0003SF-3l for qemu-devel@nongnu.org; Fri, 22 Aug 2014 14:20:30 -0400 Date: Fri, 22 Aug 2014 18:20:29 +0000 From: =?iso-8859-1?Q?Beno=EEt?= Canet Message-ID: <20140822182029.GF9526@nodalink.com> References: <1408725104-17176-1-git-send-email-mreitz@redhat.com> <1408725104-17176-6-git-send-email-mreitz@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline In-Reply-To: <1408725104-17176-6-git-send-email-mreitz@redhat.com> Content-Transfer-Encoding: quoted-printable Subject: Re: [Qemu-devel] [PATCH v3 05/10] qcow2: Fix refcount blocks beyond image end List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Max Reitz Cc: Kevin Wolf , qemu-devel@nongnu.org, Stefan Hajnoczi , =?iso-8859-1?Q?Beno=EEt?= Canet On Fri, Aug 22, 2014 at 06:31:39PM +0200, Max Reitz wrote: > If the qcow2 check function detects a refcount block located beyond the > image end, grow the image appropriately. This cannot break anything and > is the logical fix for such a case. >=20 > Signed-off-by: Max Reitz > --- > block/qcow2-refcount.c | 50 ++++++++++++++++++++++++++++++++++++++++++= ++++---- > 1 file changed, 46 insertions(+), 4 deletions(-) >=20 > diff --git a/block/qcow2-refcount.c b/block/qcow2-refcount.c > index babe6cb..1f0f44e 100644 > --- a/block/qcow2-refcount.c > +++ b/block/qcow2-refcount.c > @@ -1505,7 +1505,8 @@ static int check_refblocks(BlockDriverState *bs, = BdrvCheckResult *res, > int64_t *nb_clusters) > { > BDRVQcowState *s =3D bs->opaque; > - int64_t i; > + int64_t i, size; > + int ret; > =20 > for(i =3D 0; i < s->refcount_table_size; i++) { > uint64_t offset, cluster; > @@ -1521,9 +1522,50 @@ static int check_refblocks(BlockDriverState *bs,= BdrvCheckResult *res, > } > =20 > if (cluster >=3D *nb_clusters) { > - fprintf(stderr, "ERROR refcount block %" PRId64 > - " is outside image\n", i); > - res->corruptions++; > + fprintf(stderr, "%s refcount block %" PRId64 " is outside = image\n", > + fix & BDRV_FIX_ERRORS ? "Repairing" : "ERROR", i); > + > + if (fix & BDRV_FIX_ERRORS) { > + int64_t old_nb_clusters =3D *nb_clusters; > + > + ret =3D bdrv_truncate(bs->file, offset + s->cluster_si= ze); > + if (ret < 0) { > + goto resize_fail; > + } > + size =3D bdrv_getlength(bs->file); > + if (size < 0) { > + ret =3D size; > + goto resize_fail; > + } > + > + *nb_clusters =3D size_to_clusters(s, size); > + assert(*nb_clusters >=3D old_nb_clusters); > + > + *refcount_table =3D g_try_realloc(*refcount_table, > + *nb_clusters * sizeof(uint16_t)); > + if (!*refcount_table) { > + res->check_errors++; > + return -ENOMEM; > + } > + > + memset(*refcount_table + old_nb_clusters, 0, > + (*nb_clusters - old_nb_clusters) * sizeof(uint1= 6_t)); > + > + if (cluster >=3D *nb_clusters) { > + ret =3D -EINVAL; > + goto resize_fail; > + } > + > + res->corruptions_fixed++; > + continue; > + > +resize_fail: > + res->corruptions++; > + fprintf(stderr, "ERROR could not resize image: %s\n", > + strerror(-ret)); > + } else { > + res->corruptions++; > + } > continue; > } > =20 > --=20 > 2.0.4 >=20 Reviewed-by: Beno=EEt Canet