From: Eric Blake <eblake@redhat.com>
To: qemu-devel@nongnu.org
Cc: Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
Kevin Wolf <kwolf@redhat.com>, Max Reitz <mreitz@redhat.com>,
"open list:Block layer core" <qemu-block@nongnu.org>
Subject: [Qemu-devel] [PULL 05/21] nbd/server: Hoist length check to qmp_nbd_server_add
Date: Mon, 21 Jan 2019 16:48:51 -0600 [thread overview]
Message-ID: <20190121224907.26634-6-eblake@redhat.com> (raw)
In-Reply-To: <20190121224907.26634-1-eblake@redhat.com>
We only had two callers to nbd_export_new; qemu-nbd.c always
passed a valid offset/length pair (because it already checked
the file length, to ensure that offset was in bounds), while
blockdev-nbd.c always passed 0/-1. Then nbd_export_new reduces
the size to a multiple of BDRV_SECTOR_SIZE (can only happen
when offset is not sector-aligned, since bdrv_getlength()
currently rounds up) (someday, it would be nice to have
byte-accurate lengths - but not today).
However, I'm finding it easier to work with the code if we are
consistent on having both callers pass in a valid length, and
just assert that things are sane in nbd_export_new, meaning
that no negative values were passed, and that offset+size does
not exceed 63 bits (as that really is a fundamental limit to
later operations, whether we use off_t or uint64_t).
Signed-off-by: Eric Blake <eblake@redhat.com>
Message-Id: <20190117193658.16413-6-eblake@redhat.com>
Reviewed-by: Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>
---
blockdev-nbd.c | 10 +++++++++-
nbd/server.c | 10 +++-------
2 files changed, 12 insertions(+), 8 deletions(-)
diff --git a/blockdev-nbd.c b/blockdev-nbd.c
index c76d5416b90..d73ac1b026a 100644
--- a/blockdev-nbd.c
+++ b/blockdev-nbd.c
@@ -146,6 +146,7 @@ void qmp_nbd_server_add(const char *device, bool has_name, const char *name,
BlockDriverState *bs = NULL;
BlockBackend *on_eject_blk;
NBDExport *exp;
+ int64_t len;
if (!nbd_server) {
error_setg(errp, "NBD server not running");
@@ -168,6 +169,13 @@ void qmp_nbd_server_add(const char *device, bool has_name, const char *name,
return;
}
+ len = bdrv_getlength(bs);
+ if (len < 0) {
+ error_setg_errno(errp, -len,
+ "Failed to determine the NBD export's length");
+ return;
+ }
+
if (!has_writable) {
writable = false;
}
@@ -175,7 +183,7 @@ void qmp_nbd_server_add(const char *device, bool has_name, const char *name,
writable = false;
}
- exp = nbd_export_new(bs, 0, -1, name, NULL, bitmap,
+ exp = nbd_export_new(bs, 0, len, name, NULL, bitmap,
writable ? 0 : NBD_FLAG_READ_ONLY,
NULL, false, on_eject_blk, errp);
if (!exp) {
diff --git a/nbd/server.c b/nbd/server.c
index 6b136019f82..51ee8094e02 100644
--- a/nbd/server.c
+++ b/nbd/server.c
@@ -1495,17 +1495,13 @@ NBDExport *nbd_export_new(BlockDriverState *bs, off_t dev_offset, off_t size,
exp->refcount = 1;
QTAILQ_INIT(&exp->clients);
exp->blk = blk;
+ assert(dev_offset >= 0 && dev_offset <= INT64_MAX);
exp->dev_offset = dev_offset;
exp->name = g_strdup(name);
exp->description = g_strdup(description);
exp->nbdflags = nbdflags;
- exp->size = size < 0 ? blk_getlength(blk) : size;
- if (exp->size < 0) {
- error_setg_errno(errp, -exp->size,
- "Failed to determine the NBD export's length");
- goto fail;
- }
- exp->size -= exp->size % BDRV_SECTOR_SIZE;
+ assert(size >= 0 && size <= INT64_MAX - dev_offset);
+ exp->size = QEMU_ALIGN_DOWN(size, BDRV_SECTOR_SIZE);
if (bitmap) {
BdrvDirtyBitmap *bm = NULL;
--
2.20.1
next prev parent reply other threads:[~2019-01-21 22:49 UTC|newest]
Thread overview: 23+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-01-21 22:48 [Qemu-devel] [PULL 00/21] NBD patches through 2019-01-21 Eric Blake
2019-01-21 22:48 ` [Qemu-devel] [PULL 01/21] iotests: Make 233 output more reliable Eric Blake
2019-01-21 22:48 ` [Qemu-devel] [PULL 02/21] maint: Allow for EXAMPLES in texi2pod Eric Blake
2019-01-21 22:48 ` [Qemu-devel] [PULL 03/21] qemu-nbd: Enhance man page Eric Blake
2019-01-21 22:48 ` [Qemu-devel] [PULL 04/21] qemu-nbd: Sanity check partition bounds Eric Blake
2019-01-21 22:48 ` Eric Blake [this message]
2019-01-21 22:48 ` [Qemu-devel] [PULL 06/21] nbd/server: Favor [u]int64_t over off_t Eric Blake
2019-01-21 22:48 ` [Qemu-devel] [PULL 07/21] qemu-nbd: Avoid strtol open-coding Eric Blake
2019-01-21 22:48 ` [Qemu-devel] [PULL 08/21] nbd/client: Refactor nbd_receive_list() Eric Blake
2019-01-21 22:48 ` [Qemu-devel] [PULL 09/21] nbd/client: Move export name into NBDExportInfo Eric Blake
2019-01-21 22:48 ` [Qemu-devel] [PULL 10/21] nbd/client: Change signature of nbd_negotiate_simple_meta_context() Eric Blake
2019-01-21 22:48 ` [Qemu-devel] [PULL 11/21] nbd/client: Split out nbd_send_meta_query() Eric Blake
2019-01-21 22:48 ` [Qemu-devel] [PULL 12/21] nbd/client: Split out nbd_receive_one_meta_context() Eric Blake
2019-01-21 22:48 ` [Qemu-devel] [PULL 13/21] nbd/client: Refactor return of nbd_receive_negotiate() Eric Blake
2019-01-21 22:49 ` [Qemu-devel] [PULL 14/21] nbd/client: Split handshake into two functions Eric Blake
2019-01-21 22:49 ` [Qemu-devel] [PULL 15/21] nbd/client: Pull out oldstyle size determination Eric Blake
2019-01-21 22:49 ` [Qemu-devel] [PULL 16/21] nbd/client: Refactor nbd_opt_go() to support NBD_OPT_INFO Eric Blake
2019-01-21 22:49 ` [Qemu-devel] [PULL 17/21] nbd/client: Add nbd_receive_export_list() Eric Blake
2019-01-21 22:49 ` [Qemu-devel] [PULL 18/21] nbd/client: Add meta contexts to nbd_receive_export_list() Eric Blake
2019-01-21 22:49 ` [Qemu-devel] [PULL 19/21] qemu-nbd: Add --list option Eric Blake
2019-01-21 22:49 ` [Qemu-devel] [PULL 20/21] nbd/client: Work around 3.0 bug for listing meta contexts Eric Blake
2019-01-21 22:49 ` [Qemu-devel] [PULL 21/21] iotests: Enhance 223, 233 to cover 'qemu-nbd --list' Eric Blake
2019-01-22 19:23 ` [Qemu-devel] [PULL 00/21] NBD patches through 2019-01-21 Peter Maydell
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20190121224907.26634-6-eblake@redhat.com \
--to=eblake@redhat.com \
--cc=kwolf@redhat.com \
--cc=mreitz@redhat.com \
--cc=qemu-block@nongnu.org \
--cc=qemu-devel@nongnu.org \
--cc=vsementsov@virtuozzo.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).