From nobody Fri May 3 10:44:23 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) client-ip=208.118.235.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zoho.com; spf=pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; Return-Path: Received: from lists.gnu.org (lists.gnu.org [208.118.235.17]) by mx.zohomail.com with SMTPS id 1490750292939849.0800528425696; Tue, 28 Mar 2017 18:18:12 -0700 (PDT) Received: from localhost ([::1]:55962 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1ct2FX-0002X9-NO for importer@patchew.org; Tue, 28 Mar 2017 21:18:11 -0400 Received: from eggs.gnu.org ([2001:4830:134:3::10]:41223) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1ct2EK-0001ow-HN for qemu-devel@nongnu.org; Tue, 28 Mar 2017 21:16:57 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1ct2EE-0005pF-RO for qemu-devel@nongnu.org; Tue, 28 Mar 2017 21:16:56 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:56583 helo=mx0a-001b2d01.pphosted.com) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1ct2EE-0005os-Ka for qemu-devel@nongnu.org; Tue, 28 Mar 2017 21:16:50 -0400 Received: from pps.filterd (m0098416.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.20/8.16.0.20) with SMTP id v2T194R1017505 for ; Tue, 28 Mar 2017 21:16:49 -0400 Received: from e36.co.us.ibm.com (e36.co.us.ibm.com [32.97.110.154]) by mx0b-001b2d01.pphosted.com with ESMTP id 29ft6fxqmx-1 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT) for ; Tue, 28 Mar 2017 21:16:49 -0400 Received: from localhost by e36.co.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Tue, 28 Mar 2017 19:16:49 -0600 Received: from b03cxnp08025.gho.boulder.ibm.com (9.17.130.17) by e36.co.us.ibm.com (192.168.1.136) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Tue, 28 Mar 2017 19:16:46 -0600 Received: from b03ledav002.gho.boulder.ibm.com (b03ledav002.gho.boulder.ibm.com [9.17.130.233]) by b03cxnp08025.gho.boulder.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id v2T1GiVm11010316; Tue, 28 Mar 2017 18:16:44 -0700 Received: from b03ledav002.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 8D8FE13604B; Tue, 28 Mar 2017 19:16:44 -0600 (MDT) Received: from tuxmaker.boeblingen.de.ibm.com (unknown [9.152.85.9]) by b03ledav002.gho.boulder.ibm.com (Postfix) with ESMTP id 6795B13603C; Tue, 28 Mar 2017 19:16:43 -0600 (MDT) From: Dong Jia Shi To: qemu-block@nongnu.org, kwolf@redhat.com, mreitz@redhat.com Date: Wed, 29 Mar 2017 03:16:37 +0200 X-Mailer: git-send-email 2.8.4 In-Reply-To: <20170329011637.89377-1-bjsdjshi@linux.vnet.ibm.com> References: <20170329011637.89377-1-bjsdjshi@linux.vnet.ibm.com> X-TM-AS-GCONF: 00 x-cbid: 17032901-0020-0000-0000-00000BA8640E X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00006868; HX=3.00000240; KW=3.00000007; PH=3.00000004; SC=3.00000206; SDB=6.00840175; UDB=6.00413441; IPR=6.00618078; BA=6.00005246; NDR=6.00000001; ZLA=6.00000005; ZF=6.00000009; ZB=6.00000000; ZP=6.00000000; ZH=6.00000000; ZU=6.00000002; MB=3.00014842; XFM=3.00000013; UTC=2017-03-29 01:16:47 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 17032901-0021-0000-0000-00005B3AB276 Message-Id: <20170329011637.89377-2-bjsdjshi@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2017-03-28_21:, , signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=0 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1702020001 definitions=main-1703290008 X-detected-operating-system: by eggs.gnu.org: GNU/Linux 3.x [generic] [fuzzy] X-Received-From: 148.163.158.5 Subject: [Qemu-devel] [PATCH v3 1/1] block: pass the right options for BlockDriver.bdrv_open() X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: cornelia.huck@de.ibm.com, borntraeger@de.ibm.com, bjsdjshi@linux.vnet.ibm.com, qemu-devel@nongnu.org Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail: RSF_0 Z_629925259 SPT_0 Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" raw_open() expects the caller always passing in the right actual @options parameter. But when trying to applying snapshot on a RBD image, bdrv_snapshot_goto() calls raw_open() (by calling the bdrv_open callback on the BlockDriver) with a NULL @options, and that will result in a Segmentation fault. For the other non-raw format drivers, it also makes sense to passing in the actual options, althought they don't trigger the problem so far. Let's prepare a @options by adding the "file" key-value pair to a copy of the actual options that were given for the node (i.e. bs->options), and pass it to the callback. BlockDriver.bdrv_open() expects bs->file to be NULL and just overwrites it with the result from bdrv_open_child(). If that bdrv_open_child() fails, the field becomes NULL. While we are at it, we also correct the cleanning up action for a call failure of BlockDriver.bdrv_open() by replacing bdrv_unref() with bdrv_unref_child(). Suggested-by: Max Reitz Signed-off-by: Dong Jia Shi --- block/snapshot.c | 14 ++++++++++++-- 1 file changed, 12 insertions(+), 2 deletions(-) diff --git a/block/snapshot.c b/block/snapshot.c index bf5c2ca..281626c 100644 --- a/block/snapshot.c +++ b/block/snapshot.c @@ -27,6 +27,7 @@ #include "block/block_int.h" #include "qapi/error.h" #include "qapi/qmp/qerror.h" +#include "qapi/qmp/qstring.h" =20 QemuOptsList internal_snapshot_opts =3D { .name =3D "snapshot", @@ -189,11 +190,20 @@ int bdrv_snapshot_goto(BlockDriverState *bs, } =20 if (bs->file) { + QDict *options =3D qdict_clone_shallow(bs->options); + QDict *file_options; + + qdict_extract_subqdict(options, &file_options, "file."); + QDECREF(file_options); + qdict_put(options, "file", + qstring_from_str(bdrv_get_node_name(bs->file->bs))); + drv->bdrv_close(bs); ret =3D bdrv_snapshot_goto(bs->file->bs, snapshot_id); - open_ret =3D drv->bdrv_open(bs, NULL, bs->open_flags, NULL); + open_ret =3D drv->bdrv_open(bs, options, bs->open_flags, NULL); + QDECREF(options); if (open_ret < 0) { - bdrv_unref(bs->file->bs); + bdrv_unref_child(bs, bs->file); bs->drv =3D NULL; return open_ret; } --=20 2.8.4