1 | The following changes since commit 64175afc695c0672876fbbfc31b299c86d562cb4: | 1 | The following changes since commit 9af638cc1f665712522608c5d6b8c03d8fa67666: |
---|---|---|---|
2 | 2 | ||
3 | arm_gicv3: Fix ICC_BPR1 reset value when EL3 not implemented (2017-06-07 17:21:44 +0100) | 3 | Merge remote-tracking branch 'remotes/pmaydell/tags/pull-target-arm-20200504' into staging (2020-05-04 13:37:17 +0100) |
4 | 4 | ||
5 | are available in the git repository at: | 5 | are available in the Git repository at: |
6 | 6 | ||
7 | git://github.com/codyprime/qemu-kvm-jtc.git tags/block-pull-request | 7 | https://github.com/stefanha/qemu.git tags/block-pull-request |
8 | 8 | ||
9 | for you to fetch changes up to 56faeb9bb6872b3f926b3b3e0452a70beea10af2: | 9 | for you to fetch changes up to 08b689aa6b521964b8275dd7a2564aefa5d68129: |
10 | 10 | ||
11 | block/gluster.c: Handle qdict_array_entries() failure (2017-06-09 08:41:29 -0400) | 11 | lockable: Replace locks with lock guard macros (2020-05-04 16:07:43 +0100) |
12 | 12 | ||
13 | ---------------------------------------------------------------- | 13 | ---------------------------------------------------------------- |
14 | Gluster patch | 14 | Pull request |
15 | |||
16 | v2: | ||
17 | * Fixed stray slirp submodule change [Peter] | ||
18 | |||
19 | Fixes for the lock guard macros, code conversions to the lock guard macros, and | ||
20 | support for selecting fuzzer targets with argv[0]. | ||
21 | |||
15 | ---------------------------------------------------------------- | 22 | ---------------------------------------------------------------- |
16 | 23 | ||
17 | Peter Maydell (1): | 24 | Alexander Bulekov (1): |
18 | block/gluster.c: Handle qdict_array_entries() failure | 25 | fuzz: select fuzz target using executable name |
19 | 26 | ||
20 | block/gluster.c | 3 +-- | 27 | Daniel Brodsky (2): |
21 | 1 file changed, 1 insertion(+), 2 deletions(-) | 28 | lockable: fix __COUNTER__ macro to be referenced properly |
29 | lockable: replaced locks with lock guard macros where appropriate | ||
30 | |||
31 | Simran Singhal (1): | ||
32 | lockable: Replace locks with lock guard macros | ||
33 | |||
34 | include/qemu/lockable.h | 7 +++--- | ||
35 | include/qemu/rcu.h | 2 +- | ||
36 | block/iscsi.c | 7 ++---- | ||
37 | block/nfs.c | 51 +++++++++++++++++++---------------------- | ||
38 | cpus-common.c | 14 ++++------- | ||
39 | hw/display/qxl.c | 43 ++++++++++++++++------------------ | ||
40 | hw/hyperv/hyperv.c | 15 ++++++------ | ||
41 | hw/rdma/rdma_backend.c | 50 ++++++++++++++++++++-------------------- | ||
42 | hw/rdma/rdma_rm.c | 3 +-- | ||
43 | hw/vfio/platform.c | 5 ++-- | ||
44 | migration/migration.c | 3 +-- | ||
45 | migration/multifd.c | 8 +++---- | ||
46 | migration/ram.c | 3 +-- | ||
47 | monitor/misc.c | 4 +--- | ||
48 | tests/qtest/fuzz/fuzz.c | 19 ++++++++------- | ||
49 | ui/spice-display.c | 14 +++++------ | ||
50 | util/log.c | 4 ++-- | ||
51 | util/qemu-timer.c | 17 +++++++------- | ||
52 | util/rcu.c | 8 +++---- | ||
53 | util/thread-pool.c | 3 +-- | ||
54 | util/vfio-helpers.c | 5 ++-- | ||
55 | 21 files changed, 132 insertions(+), 153 deletions(-) | ||
22 | 56 | ||
23 | -- | 57 | -- |
24 | 2.9.3 | 58 | 2.25.3 |
25 | 59 | ||
26 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Alexander Bulekov <alxndr@bu.edu> | ||
1 | 2 | ||
3 | The fuzzers are built into a binary (e.g. qemu-fuzz-i386). To select the | ||
4 | device to fuzz/fuzz target, we usually use the --fuzz-target= argument. | ||
5 | This commit allows the fuzz-target to be specified using the name of the | ||
6 | executable. If the executable name ends with -target-FUZZ_TARGET, then | ||
7 | we select the fuzz target based on this name, rather than the | ||
8 | --fuzz-target argument. This is useful for systems such as oss-fuzz | ||
9 | where we don't have control of the arguments passed to the fuzzer. | ||
10 | |||
11 | [Fixed incorrect indentation. | ||
12 | --Stefan] | ||
13 | |||
14 | Signed-off-by: Alexander Bulekov <alxndr@bu.edu> | ||
15 | Reviewed-by: Darren Kenny <darren.kenny@oracle.com> | ||
16 | Message-id: 20200421182230.6313-1-alxndr@bu.edu | ||
17 | Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | ||
18 | --- | ||
19 | tests/qtest/fuzz/fuzz.c | 19 +++++++++++-------- | ||
20 | 1 file changed, 11 insertions(+), 8 deletions(-) | ||
21 | |||
22 | diff --git a/tests/qtest/fuzz/fuzz.c b/tests/qtest/fuzz/fuzz.c | ||
23 | index XXXXXXX..XXXXXXX 100644 | ||
24 | --- a/tests/qtest/fuzz/fuzz.c | ||
25 | +++ b/tests/qtest/fuzz/fuzz.c | ||
26 | @@ -XXX,XX +XXX,XX @@ static void usage(char *path) | ||
27 | printf(" * %s : %s\n", tmp->target->name, | ||
28 | tmp->target->description); | ||
29 | } | ||
30 | + printf("Alternatively, add -target-FUZZ_TARGET to the executable name\n"); | ||
31 | exit(0); | ||
32 | } | ||
33 | |||
34 | @@ -XXX,XX +XXX,XX @@ int LLVMFuzzerInitialize(int *argc, char ***argv, char ***envp) | ||
35 | module_call_init(MODULE_INIT_QOM); | ||
36 | module_call_init(MODULE_INIT_LIBQOS); | ||
37 | |||
38 | - if (*argc <= 1) { | ||
39 | + target_name = strstr(**argv, "-target-"); | ||
40 | + if (target_name) { /* The binary name specifies the target */ | ||
41 | + target_name += strlen("-target-"); | ||
42 | + } else if (*argc > 1) { /* The target is specified as an argument */ | ||
43 | + target_name = (*argv)[1]; | ||
44 | + if (!strstr(target_name, "--fuzz-target=")) { | ||
45 | + usage(**argv); | ||
46 | + } | ||
47 | + target_name += strlen("--fuzz-target="); | ||
48 | + } else { | ||
49 | usage(**argv); | ||
50 | } | ||
51 | |||
52 | /* Identify the fuzz target */ | ||
53 | - target_name = (*argv)[1]; | ||
54 | - if (!strstr(target_name, "--fuzz-target=")) { | ||
55 | - usage(**argv); | ||
56 | - } | ||
57 | - | ||
58 | - target_name += strlen("--fuzz-target="); | ||
59 | - | ||
60 | fuzz_target = fuzz_get_target(target_name); | ||
61 | if (!fuzz_target) { | ||
62 | usage(**argv); | ||
63 | -- | ||
64 | 2.25.3 | ||
65 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Daniel Brodsky <dnbrdsky@gmail.com> | ||
1 | 2 | ||
3 | - __COUNTER__ doesn't work with ## concat | ||
4 | - replaced ## with glue() macro so __COUNTER__ is evaluated | ||
5 | |||
6 | Fixes: 3284c3ddc4 | ||
7 | |||
8 | Signed-off-by: Daniel Brodsky <dnbrdsky@gmail.com> | ||
9 | Message-id: 20200404042108.389635-2-dnbrdsky@gmail.com | ||
10 | Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | ||
11 | --- | ||
12 | include/qemu/lockable.h | 7 ++++--- | ||
13 | include/qemu/rcu.h | 2 +- | ||
14 | 2 files changed, 5 insertions(+), 4 deletions(-) | ||
15 | |||
16 | diff --git a/include/qemu/lockable.h b/include/qemu/lockable.h | ||
17 | index XXXXXXX..XXXXXXX 100644 | ||
18 | --- a/include/qemu/lockable.h | ||
19 | +++ b/include/qemu/lockable.h | ||
20 | @@ -XXX,XX +XXX,XX @@ G_DEFINE_AUTOPTR_CLEANUP_FUNC(QemuLockable, qemu_lockable_auto_unlock) | ||
21 | * } | ||
22 | */ | ||
23 | #define WITH_QEMU_LOCK_GUARD(x) \ | ||
24 | - WITH_QEMU_LOCK_GUARD_((x), qemu_lockable_auto##__COUNTER__) | ||
25 | + WITH_QEMU_LOCK_GUARD_((x), glue(qemu_lockable_auto, __COUNTER__)) | ||
26 | |||
27 | /** | ||
28 | * QEMU_LOCK_GUARD - Lock an object until the end of the scope | ||
29 | @@ -XXX,XX +XXX,XX @@ G_DEFINE_AUTOPTR_CLEANUP_FUNC(QemuLockable, qemu_lockable_auto_unlock) | ||
30 | * return; <-- mutex is automatically unlocked | ||
31 | * } | ||
32 | */ | ||
33 | -#define QEMU_LOCK_GUARD(x) \ | ||
34 | - g_autoptr(QemuLockable) qemu_lockable_auto##__COUNTER__ = \ | ||
35 | +#define QEMU_LOCK_GUARD(x) \ | ||
36 | + g_autoptr(QemuLockable) \ | ||
37 | + glue(qemu_lockable_auto, __COUNTER__) G_GNUC_UNUSED = \ | ||
38 | qemu_lockable_auto_lock(QEMU_MAKE_LOCKABLE((x))) | ||
39 | |||
40 | #endif | ||
41 | diff --git a/include/qemu/rcu.h b/include/qemu/rcu.h | ||
42 | index XXXXXXX..XXXXXXX 100644 | ||
43 | --- a/include/qemu/rcu.h | ||
44 | +++ b/include/qemu/rcu.h | ||
45 | @@ -XXX,XX +XXX,XX @@ static inline void rcu_read_auto_unlock(RCUReadAuto *r) | ||
46 | G_DEFINE_AUTOPTR_CLEANUP_FUNC(RCUReadAuto, rcu_read_auto_unlock) | ||
47 | |||
48 | #define WITH_RCU_READ_LOCK_GUARD() \ | ||
49 | - WITH_RCU_READ_LOCK_GUARD_(_rcu_read_auto##__COUNTER__) | ||
50 | + WITH_RCU_READ_LOCK_GUARD_(glue(_rcu_read_auto, __COUNTER__)) | ||
51 | |||
52 | #define WITH_RCU_READ_LOCK_GUARD_(var) \ | ||
53 | for (g_autoptr(RCUReadAuto) var = rcu_read_auto_lock(); \ | ||
54 | -- | ||
55 | 2.25.3 | ||
56 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Daniel Brodsky <dnbrdsky@gmail.com> | ||
1 | 2 | ||
3 | - ran regexp "qemu_mutex_lock\(.*\).*\n.*if" to find targets | ||
4 | - replaced result with QEMU_LOCK_GUARD if all unlocks at function end | ||
5 | - replaced result with WITH_QEMU_LOCK_GUARD if unlock not at end | ||
6 | |||
7 | Signed-off-by: Daniel Brodsky <dnbrdsky@gmail.com> | ||
8 | Reviewed-by: Juan Quintela <quintela@redhat.com> | ||
9 | Message-id: 20200404042108.389635-3-dnbrdsky@gmail.com | ||
10 | Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | ||
11 | --- | ||
12 | block/iscsi.c | 7 ++---- | ||
13 | block/nfs.c | 51 ++++++++++++++++++++----------------------- | ||
14 | cpus-common.c | 14 +++++------- | ||
15 | hw/display/qxl.c | 43 +++++++++++++++++------------------- | ||
16 | hw/vfio/platform.c | 5 ++--- | ||
17 | migration/migration.c | 3 +-- | ||
18 | migration/multifd.c | 8 +++---- | ||
19 | migration/ram.c | 3 +-- | ||
20 | monitor/misc.c | 4 +--- | ||
21 | ui/spice-display.c | 14 ++++++------ | ||
22 | util/log.c | 4 ++-- | ||
23 | util/qemu-timer.c | 17 +++++++-------- | ||
24 | util/rcu.c | 8 +++---- | ||
25 | util/thread-pool.c | 3 +-- | ||
26 | util/vfio-helpers.c | 5 ++--- | ||
27 | 15 files changed, 83 insertions(+), 106 deletions(-) | ||
28 | |||
29 | diff --git a/block/iscsi.c b/block/iscsi.c | ||
30 | index XXXXXXX..XXXXXXX 100644 | ||
31 | --- a/block/iscsi.c | ||
32 | +++ b/block/iscsi.c | ||
33 | @@ -XXX,XX +XXX,XX @@ static void iscsi_nop_timed_event(void *opaque) | ||
34 | { | ||
35 | IscsiLun *iscsilun = opaque; | ||
36 | |||
37 | - qemu_mutex_lock(&iscsilun->mutex); | ||
38 | + QEMU_LOCK_GUARD(&iscsilun->mutex); | ||
39 | if (iscsi_get_nops_in_flight(iscsilun->iscsi) >= MAX_NOP_FAILURES) { | ||
40 | error_report("iSCSI: NOP timeout. Reconnecting..."); | ||
41 | iscsilun->request_timed_out = true; | ||
42 | } else if (iscsi_nop_out_async(iscsilun->iscsi, NULL, NULL, 0, NULL) != 0) { | ||
43 | error_report("iSCSI: failed to sent NOP-Out. Disabling NOP messages."); | ||
44 | - goto out; | ||
45 | + return; | ||
46 | } | ||
47 | |||
48 | timer_mod(iscsilun->nop_timer, qemu_clock_get_ms(QEMU_CLOCK_REALTIME) + NOP_INTERVAL); | ||
49 | iscsi_set_events(iscsilun); | ||
50 | - | ||
51 | -out: | ||
52 | - qemu_mutex_unlock(&iscsilun->mutex); | ||
53 | } | ||
54 | |||
55 | static void iscsi_readcapacity_sync(IscsiLun *iscsilun, Error **errp) | ||
56 | diff --git a/block/nfs.c b/block/nfs.c | ||
57 | index XXXXXXX..XXXXXXX 100644 | ||
58 | --- a/block/nfs.c | ||
59 | +++ b/block/nfs.c | ||
60 | @@ -XXX,XX +XXX,XX @@ static int coroutine_fn nfs_co_preadv(BlockDriverState *bs, uint64_t offset, | ||
61 | nfs_co_init_task(bs, &task); | ||
62 | task.iov = iov; | ||
63 | |||
64 | - qemu_mutex_lock(&client->mutex); | ||
65 | - if (nfs_pread_async(client->context, client->fh, | ||
66 | - offset, bytes, nfs_co_generic_cb, &task) != 0) { | ||
67 | - qemu_mutex_unlock(&client->mutex); | ||
68 | - return -ENOMEM; | ||
69 | - } | ||
70 | + WITH_QEMU_LOCK_GUARD(&client->mutex) { | ||
71 | + if (nfs_pread_async(client->context, client->fh, | ||
72 | + offset, bytes, nfs_co_generic_cb, &task) != 0) { | ||
73 | + return -ENOMEM; | ||
74 | + } | ||
75 | |||
76 | - nfs_set_events(client); | ||
77 | - qemu_mutex_unlock(&client->mutex); | ||
78 | + nfs_set_events(client); | ||
79 | + } | ||
80 | while (!task.complete) { | ||
81 | qemu_coroutine_yield(); | ||
82 | } | ||
83 | @@ -XXX,XX +XXX,XX @@ static int coroutine_fn nfs_co_pwritev(BlockDriverState *bs, uint64_t offset, | ||
84 | buf = iov->iov[0].iov_base; | ||
85 | } | ||
86 | |||
87 | - qemu_mutex_lock(&client->mutex); | ||
88 | - if (nfs_pwrite_async(client->context, client->fh, | ||
89 | - offset, bytes, buf, | ||
90 | - nfs_co_generic_cb, &task) != 0) { | ||
91 | - qemu_mutex_unlock(&client->mutex); | ||
92 | - if (my_buffer) { | ||
93 | - g_free(buf); | ||
94 | + WITH_QEMU_LOCK_GUARD(&client->mutex) { | ||
95 | + if (nfs_pwrite_async(client->context, client->fh, | ||
96 | + offset, bytes, buf, | ||
97 | + nfs_co_generic_cb, &task) != 0) { | ||
98 | + if (my_buffer) { | ||
99 | + g_free(buf); | ||
100 | + } | ||
101 | + return -ENOMEM; | ||
102 | } | ||
103 | - return -ENOMEM; | ||
104 | - } | ||
105 | |||
106 | - nfs_set_events(client); | ||
107 | - qemu_mutex_unlock(&client->mutex); | ||
108 | + nfs_set_events(client); | ||
109 | + } | ||
110 | while (!task.complete) { | ||
111 | qemu_coroutine_yield(); | ||
112 | } | ||
113 | @@ -XXX,XX +XXX,XX @@ static int coroutine_fn nfs_co_flush(BlockDriverState *bs) | ||
114 | |||
115 | nfs_co_init_task(bs, &task); | ||
116 | |||
117 | - qemu_mutex_lock(&client->mutex); | ||
118 | - if (nfs_fsync_async(client->context, client->fh, nfs_co_generic_cb, | ||
119 | - &task) != 0) { | ||
120 | - qemu_mutex_unlock(&client->mutex); | ||
121 | - return -ENOMEM; | ||
122 | - } | ||
123 | + WITH_QEMU_LOCK_GUARD(&client->mutex) { | ||
124 | + if (nfs_fsync_async(client->context, client->fh, nfs_co_generic_cb, | ||
125 | + &task) != 0) { | ||
126 | + return -ENOMEM; | ||
127 | + } | ||
128 | |||
129 | - nfs_set_events(client); | ||
130 | - qemu_mutex_unlock(&client->mutex); | ||
131 | + nfs_set_events(client); | ||
132 | + } | ||
133 | while (!task.complete) { | ||
134 | qemu_coroutine_yield(); | ||
135 | } | ||
136 | diff --git a/cpus-common.c b/cpus-common.c | ||
137 | index XXXXXXX..XXXXXXX 100644 | ||
138 | --- a/cpus-common.c | ||
139 | +++ b/cpus-common.c | ||
140 | @@ -XXX,XX +XXX,XX @@ | ||
141 | #include "exec/cpu-common.h" | ||
142 | #include "hw/core/cpu.h" | ||
143 | #include "sysemu/cpus.h" | ||
144 | +#include "qemu/lockable.h" | ||
145 | |||
146 | static QemuMutex qemu_cpu_list_lock; | ||
147 | static QemuCond exclusive_cond; | ||
148 | @@ -XXX,XX +XXX,XX @@ static int cpu_get_free_index(void) | ||
149 | |||
150 | void cpu_list_add(CPUState *cpu) | ||
151 | { | ||
152 | - qemu_mutex_lock(&qemu_cpu_list_lock); | ||
153 | + QEMU_LOCK_GUARD(&qemu_cpu_list_lock); | ||
154 | if (cpu->cpu_index == UNASSIGNED_CPU_INDEX) { | ||
155 | cpu->cpu_index = cpu_get_free_index(); | ||
156 | assert(cpu->cpu_index != UNASSIGNED_CPU_INDEX); | ||
157 | @@ -XXX,XX +XXX,XX @@ void cpu_list_add(CPUState *cpu) | ||
158 | assert(!cpu_index_auto_assigned); | ||
159 | } | ||
160 | QTAILQ_INSERT_TAIL_RCU(&cpus, cpu, node); | ||
161 | - qemu_mutex_unlock(&qemu_cpu_list_lock); | ||
162 | } | ||
163 | |||
164 | void cpu_list_remove(CPUState *cpu) | ||
165 | { | ||
166 | - qemu_mutex_lock(&qemu_cpu_list_lock); | ||
167 | + QEMU_LOCK_GUARD(&qemu_cpu_list_lock); | ||
168 | if (!QTAILQ_IN_USE(cpu, node)) { | ||
169 | /* there is nothing to undo since cpu_exec_init() hasn't been called */ | ||
170 | - qemu_mutex_unlock(&qemu_cpu_list_lock); | ||
171 | return; | ||
172 | } | ||
173 | |||
174 | @@ -XXX,XX +XXX,XX @@ void cpu_list_remove(CPUState *cpu) | ||
175 | |||
176 | QTAILQ_REMOVE_RCU(&cpus, cpu, node); | ||
177 | cpu->cpu_index = UNASSIGNED_CPU_INDEX; | ||
178 | - qemu_mutex_unlock(&qemu_cpu_list_lock); | ||
179 | } | ||
180 | |||
181 | struct qemu_work_item { | ||
182 | @@ -XXX,XX +XXX,XX @@ void cpu_exec_start(CPUState *cpu) | ||
183 | * see cpu->running == true, and it will kick the CPU. | ||
184 | */ | ||
185 | if (unlikely(atomic_read(&pending_cpus))) { | ||
186 | - qemu_mutex_lock(&qemu_cpu_list_lock); | ||
187 | + QEMU_LOCK_GUARD(&qemu_cpu_list_lock); | ||
188 | if (!cpu->has_waiter) { | ||
189 | /* Not counted in pending_cpus, let the exclusive item | ||
190 | * run. Since we have the lock, just set cpu->running to true | ||
191 | @@ -XXX,XX +XXX,XX @@ void cpu_exec_start(CPUState *cpu) | ||
192 | * waiter at cpu_exec_end. | ||
193 | */ | ||
194 | } | ||
195 | - qemu_mutex_unlock(&qemu_cpu_list_lock); | ||
196 | } | ||
197 | } | ||
198 | |||
199 | @@ -XXX,XX +XXX,XX @@ void cpu_exec_end(CPUState *cpu) | ||
200 | * next cpu_exec_start. | ||
201 | */ | ||
202 | if (unlikely(atomic_read(&pending_cpus))) { | ||
203 | - qemu_mutex_lock(&qemu_cpu_list_lock); | ||
204 | + QEMU_LOCK_GUARD(&qemu_cpu_list_lock); | ||
205 | if (cpu->has_waiter) { | ||
206 | cpu->has_waiter = false; | ||
207 | atomic_set(&pending_cpus, pending_cpus - 1); | ||
208 | @@ -XXX,XX +XXX,XX @@ void cpu_exec_end(CPUState *cpu) | ||
209 | qemu_cond_signal(&exclusive_cond); | ||
210 | } | ||
211 | } | ||
212 | - qemu_mutex_unlock(&qemu_cpu_list_lock); | ||
213 | } | ||
214 | } | ||
215 | |||
216 | diff --git a/hw/display/qxl.c b/hw/display/qxl.c | ||
217 | index XXXXXXX..XXXXXXX 100644 | ||
218 | --- a/hw/display/qxl.c | ||
219 | +++ b/hw/display/qxl.c | ||
220 | @@ -XXX,XX +XXX,XX @@ static int qxl_track_command(PCIQXLDevice *qxl, struct QXLCommandExt *ext) | ||
221 | cmd->u.surface_create.stride); | ||
222 | return 1; | ||
223 | } | ||
224 | - qemu_mutex_lock(&qxl->track_lock); | ||
225 | - if (cmd->type == QXL_SURFACE_CMD_CREATE) { | ||
226 | - qxl->guest_surfaces.cmds[id] = ext->cmd.data; | ||
227 | - qxl->guest_surfaces.count++; | ||
228 | - if (qxl->guest_surfaces.max < qxl->guest_surfaces.count) | ||
229 | - qxl->guest_surfaces.max = qxl->guest_surfaces.count; | ||
230 | + WITH_QEMU_LOCK_GUARD(&qxl->track_lock) { | ||
231 | + if (cmd->type == QXL_SURFACE_CMD_CREATE) { | ||
232 | + qxl->guest_surfaces.cmds[id] = ext->cmd.data; | ||
233 | + qxl->guest_surfaces.count++; | ||
234 | + if (qxl->guest_surfaces.max < qxl->guest_surfaces.count) { | ||
235 | + qxl->guest_surfaces.max = qxl->guest_surfaces.count; | ||
236 | + } | ||
237 | + } | ||
238 | + if (cmd->type == QXL_SURFACE_CMD_DESTROY) { | ||
239 | + qxl->guest_surfaces.cmds[id] = 0; | ||
240 | + qxl->guest_surfaces.count--; | ||
241 | + } | ||
242 | } | ||
243 | - if (cmd->type == QXL_SURFACE_CMD_DESTROY) { | ||
244 | - qxl->guest_surfaces.cmds[id] = 0; | ||
245 | - qxl->guest_surfaces.count--; | ||
246 | - } | ||
247 | - qemu_mutex_unlock(&qxl->track_lock); | ||
248 | break; | ||
249 | } | ||
250 | case QXL_CMD_CURSOR: | ||
251 | @@ -XXX,XX +XXX,XX @@ static void interface_update_area_complete(QXLInstance *sin, | ||
252 | int i; | ||
253 | int qxl_i; | ||
254 | |||
255 | - qemu_mutex_lock(&qxl->ssd.lock); | ||
256 | + QEMU_LOCK_GUARD(&qxl->ssd.lock); | ||
257 | if (surface_id != 0 || !num_updated_rects || | ||
258 | !qxl->render_update_cookie_num) { | ||
259 | - qemu_mutex_unlock(&qxl->ssd.lock); | ||
260 | return; | ||
261 | } | ||
262 | trace_qxl_interface_update_area_complete(qxl->id, surface_id, dirty->left, | ||
263 | @@ -XXX,XX +XXX,XX @@ static void interface_update_area_complete(QXLInstance *sin, | ||
264 | * Don't bother copying or scheduling the bh since we will flip | ||
265 | * the whole area anyway on completion of the update_area async call | ||
266 | */ | ||
267 | - qemu_mutex_unlock(&qxl->ssd.lock); | ||
268 | return; | ||
269 | } | ||
270 | qxl_i = qxl->num_dirty_rects; | ||
271 | @@ -XXX,XX +XXX,XX @@ static void interface_update_area_complete(QXLInstance *sin, | ||
272 | trace_qxl_interface_update_area_complete_schedule_bh(qxl->id, | ||
273 | qxl->num_dirty_rects); | ||
274 | qemu_bh_schedule(qxl->update_area_bh); | ||
275 | - qemu_mutex_unlock(&qxl->ssd.lock); | ||
276 | } | ||
277 | |||
278 | /* called from spice server thread context only */ | ||
279 | @@ -XXX,XX +XXX,XX @@ static void ioport_write(void *opaque, hwaddr addr, | ||
280 | case QXL_IO_MONITORS_CONFIG_ASYNC: | ||
281 | async_common: | ||
282 | async = QXL_ASYNC; | ||
283 | - qemu_mutex_lock(&d->async_lock); | ||
284 | - if (d->current_async != QXL_UNDEFINED_IO) { | ||
285 | - qxl_set_guest_bug(d, "%d async started before last (%d) complete", | ||
286 | - io_port, d->current_async); | ||
287 | - qemu_mutex_unlock(&d->async_lock); | ||
288 | - return; | ||
289 | + WITH_QEMU_LOCK_GUARD(&d->async_lock) { | ||
290 | + if (d->current_async != QXL_UNDEFINED_IO) { | ||
291 | + qxl_set_guest_bug(d, "%d async started before last (%d) complete", | ||
292 | + io_port, d->current_async); | ||
293 | + return; | ||
294 | + } | ||
295 | + d->current_async = orig_io_port; | ||
296 | } | ||
297 | - d->current_async = orig_io_port; | ||
298 | - qemu_mutex_unlock(&d->async_lock); | ||
299 | break; | ||
300 | default: | ||
301 | break; | ||
302 | diff --git a/hw/vfio/platform.c b/hw/vfio/platform.c | ||
303 | index XXXXXXX..XXXXXXX 100644 | ||
304 | --- a/hw/vfio/platform.c | ||
305 | +++ b/hw/vfio/platform.c | ||
306 | @@ -XXX,XX +XXX,XX @@ | ||
307 | #include "hw/vfio/vfio-platform.h" | ||
308 | #include "migration/vmstate.h" | ||
309 | #include "qemu/error-report.h" | ||
310 | +#include "qemu/lockable.h" | ||
311 | #include "qemu/main-loop.h" | ||
312 | #include "qemu/module.h" | ||
313 | #include "qemu/range.h" | ||
314 | @@ -XXX,XX +XXX,XX @@ static void vfio_intp_interrupt(VFIOINTp *intp) | ||
315 | VFIOPlatformDevice *vdev = intp->vdev; | ||
316 | bool delay_handling = false; | ||
317 | |||
318 | - qemu_mutex_lock(&vdev->intp_mutex); | ||
319 | + QEMU_LOCK_GUARD(&vdev->intp_mutex); | ||
320 | if (intp->state == VFIO_IRQ_INACTIVE) { | ||
321 | QLIST_FOREACH(tmp, &vdev->intp_list, next) { | ||
322 | if (tmp->state == VFIO_IRQ_ACTIVE || | ||
323 | @@ -XXX,XX +XXX,XX @@ static void vfio_intp_interrupt(VFIOINTp *intp) | ||
324 | QSIMPLEQ_INSERT_TAIL(&vdev->pending_intp_queue, | ||
325 | intp, pqnext); | ||
326 | ret = event_notifier_test_and_clear(intp->interrupt); | ||
327 | - qemu_mutex_unlock(&vdev->intp_mutex); | ||
328 | return; | ||
329 | } | ||
330 | |||
331 | @@ -XXX,XX +XXX,XX @@ static void vfio_intp_interrupt(VFIOINTp *intp) | ||
332 | qemu_clock_get_ms(QEMU_CLOCK_VIRTUAL) + | ||
333 | vdev->mmap_timeout); | ||
334 | } | ||
335 | - qemu_mutex_unlock(&vdev->intp_mutex); | ||
336 | } | ||
337 | |||
338 | /** | ||
339 | diff --git a/migration/migration.c b/migration/migration.c | ||
340 | index XXXXXXX..XXXXXXX 100644 | ||
341 | --- a/migration/migration.c | ||
342 | +++ b/migration/migration.c | ||
343 | @@ -XXX,XX +XXX,XX @@ static void migrate_fd_cleanup_bh(void *opaque) | ||
344 | |||
345 | void migrate_set_error(MigrationState *s, const Error *error) | ||
346 | { | ||
347 | - qemu_mutex_lock(&s->error_mutex); | ||
348 | + QEMU_LOCK_GUARD(&s->error_mutex); | ||
349 | if (!s->error) { | ||
350 | s->error = error_copy(error); | ||
351 | } | ||
352 | - qemu_mutex_unlock(&s->error_mutex); | ||
353 | } | ||
354 | |||
355 | void migrate_fd_error(MigrationState *s, const Error *error) | ||
356 | diff --git a/migration/multifd.c b/migration/multifd.c | ||
357 | index XXXXXXX..XXXXXXX 100644 | ||
358 | --- a/migration/multifd.c | ||
359 | +++ b/migration/multifd.c | ||
360 | @@ -XXX,XX +XXX,XX @@ void multifd_recv_sync_main(void) | ||
361 | for (i = 0; i < migrate_multifd_channels(); i++) { | ||
362 | MultiFDRecvParams *p = &multifd_recv_state->params[i]; | ||
363 | |||
364 | - qemu_mutex_lock(&p->mutex); | ||
365 | - if (multifd_recv_state->packet_num < p->packet_num) { | ||
366 | - multifd_recv_state->packet_num = p->packet_num; | ||
367 | + WITH_QEMU_LOCK_GUARD(&p->mutex) { | ||
368 | + if (multifd_recv_state->packet_num < p->packet_num) { | ||
369 | + multifd_recv_state->packet_num = p->packet_num; | ||
370 | + } | ||
371 | } | ||
372 | - qemu_mutex_unlock(&p->mutex); | ||
373 | trace_multifd_recv_sync_main_signal(p->id); | ||
374 | qemu_sem_post(&p->sem_sync); | ||
375 | } | ||
376 | diff --git a/migration/ram.c b/migration/ram.c | ||
377 | index XXXXXXX..XXXXXXX 100644 | ||
378 | --- a/migration/ram.c | ||
379 | +++ b/migration/ram.c | ||
380 | @@ -XXX,XX +XXX,XX @@ static RAMBlock *unqueue_page(RAMState *rs, ram_addr_t *offset) | ||
381 | return NULL; | ||
382 | } | ||
383 | |||
384 | - qemu_mutex_lock(&rs->src_page_req_mutex); | ||
385 | + QEMU_LOCK_GUARD(&rs->src_page_req_mutex); | ||
386 | if (!QSIMPLEQ_EMPTY(&rs->src_page_requests)) { | ||
387 | struct RAMSrcPageRequest *entry = | ||
388 | QSIMPLEQ_FIRST(&rs->src_page_requests); | ||
389 | @@ -XXX,XX +XXX,XX @@ static RAMBlock *unqueue_page(RAMState *rs, ram_addr_t *offset) | ||
390 | migration_consume_urgent_request(); | ||
391 | } | ||
392 | } | ||
393 | - qemu_mutex_unlock(&rs->src_page_req_mutex); | ||
394 | |||
395 | return block; | ||
396 | } | ||
397 | diff --git a/monitor/misc.c b/monitor/misc.c | ||
398 | index XXXXXXX..XXXXXXX 100644 | ||
399 | --- a/monitor/misc.c | ||
400 | +++ b/monitor/misc.c | ||
401 | @@ -XXX,XX +XXX,XX @@ AddfdInfo *monitor_fdset_add_fd(int fd, bool has_fdset_id, int64_t fdset_id, | ||
402 | MonFdsetFd *mon_fdset_fd; | ||
403 | AddfdInfo *fdinfo; | ||
404 | |||
405 | - qemu_mutex_lock(&mon_fdsets_lock); | ||
406 | + QEMU_LOCK_GUARD(&mon_fdsets_lock); | ||
407 | if (has_fdset_id) { | ||
408 | QLIST_FOREACH(mon_fdset, &mon_fdsets, next) { | ||
409 | /* Break if match found or match impossible due to ordering by ID */ | ||
410 | @@ -XXX,XX +XXX,XX @@ AddfdInfo *monitor_fdset_add_fd(int fd, bool has_fdset_id, int64_t fdset_id, | ||
411 | if (fdset_id < 0) { | ||
412 | error_setg(errp, QERR_INVALID_PARAMETER_VALUE, "fdset-id", | ||
413 | "a non-negative value"); | ||
414 | - qemu_mutex_unlock(&mon_fdsets_lock); | ||
415 | return NULL; | ||
416 | } | ||
417 | /* Use specified fdset ID */ | ||
418 | @@ -XXX,XX +XXX,XX @@ AddfdInfo *monitor_fdset_add_fd(int fd, bool has_fdset_id, int64_t fdset_id, | ||
419 | fdinfo->fdset_id = mon_fdset->id; | ||
420 | fdinfo->fd = mon_fdset_fd->fd; | ||
421 | |||
422 | - qemu_mutex_unlock(&mon_fdsets_lock); | ||
423 | return fdinfo; | ||
424 | } | ||
425 | |||
426 | diff --git a/ui/spice-display.c b/ui/spice-display.c | ||
427 | index XXXXXXX..XXXXXXX 100644 | ||
428 | --- a/ui/spice-display.c | ||
429 | +++ b/ui/spice-display.c | ||
430 | @@ -XXX,XX +XXX,XX @@ | ||
431 | #include "qemu/osdep.h" | ||
432 | #include "ui/qemu-spice.h" | ||
433 | #include "qemu/timer.h" | ||
434 | +#include "qemu/lockable.h" | ||
435 | #include "qemu/main-loop.h" | ||
436 | #include "qemu/option.h" | ||
437 | #include "qemu/queue.h" | ||
438 | @@ -XXX,XX +XXX,XX @@ void qemu_spice_display_refresh(SimpleSpiceDisplay *ssd) | ||
439 | { | ||
440 | graphic_hw_update(ssd->dcl.con); | ||
441 | |||
442 | - qemu_mutex_lock(&ssd->lock); | ||
443 | - if (QTAILQ_EMPTY(&ssd->updates) && ssd->ds) { | ||
444 | - qemu_spice_create_update(ssd); | ||
445 | - ssd->notify++; | ||
446 | + WITH_QEMU_LOCK_GUARD(&ssd->lock) { | ||
447 | + if (QTAILQ_EMPTY(&ssd->updates) && ssd->ds) { | ||
448 | + qemu_spice_create_update(ssd); | ||
449 | + ssd->notify++; | ||
450 | + } | ||
451 | } | ||
452 | - qemu_mutex_unlock(&ssd->lock); | ||
453 | |||
454 | trace_qemu_spice_display_refresh(ssd->qxl.id, ssd->notify); | ||
455 | if (ssd->notify) { | ||
456 | @@ -XXX,XX +XXX,XX @@ static int interface_get_cursor_command(QXLInstance *sin, QXLCommandExt *ext) | ||
457 | SimpleSpiceDisplay *ssd = container_of(sin, SimpleSpiceDisplay, qxl); | ||
458 | int ret; | ||
459 | |||
460 | - qemu_mutex_lock(&ssd->lock); | ||
461 | + QEMU_LOCK_GUARD(&ssd->lock); | ||
462 | if (ssd->ptr_define) { | ||
463 | *ext = ssd->ptr_define->ext; | ||
464 | ssd->ptr_define = NULL; | ||
465 | @@ -XXX,XX +XXX,XX @@ static int interface_get_cursor_command(QXLInstance *sin, QXLCommandExt *ext) | ||
466 | } else { | ||
467 | ret = false; | ||
468 | } | ||
469 | - qemu_mutex_unlock(&ssd->lock); | ||
470 | return ret; | ||
471 | } | ||
472 | |||
473 | diff --git a/util/log.c b/util/log.c | ||
474 | index XXXXXXX..XXXXXXX 100644 | ||
475 | --- a/util/log.c | ||
476 | +++ b/util/log.c | ||
477 | @@ -XXX,XX +XXX,XX @@ | ||
478 | #include "qemu/cutils.h" | ||
479 | #include "trace/control.h" | ||
480 | #include "qemu/thread.h" | ||
481 | +#include "qemu/lockable.h" | ||
482 | |||
483 | static char *logfilename; | ||
484 | static QemuMutex qemu_logfile_mutex; | ||
485 | @@ -XXX,XX +XXX,XX @@ void qemu_set_log(int log_flags) | ||
486 | if (qemu_loglevel && (!is_daemonized() || logfilename)) { | ||
487 | need_to_open_file = true; | ||
488 | } | ||
489 | - qemu_mutex_lock(&qemu_logfile_mutex); | ||
490 | + QEMU_LOCK_GUARD(&qemu_logfile_mutex); | ||
491 | if (qemu_logfile && !need_to_open_file) { | ||
492 | logfile = qemu_logfile; | ||
493 | atomic_rcu_set(&qemu_logfile, NULL); | ||
494 | @@ -XXX,XX +XXX,XX @@ void qemu_set_log(int log_flags) | ||
495 | } | ||
496 | atomic_rcu_set(&qemu_logfile, logfile); | ||
497 | } | ||
498 | - qemu_mutex_unlock(&qemu_logfile_mutex); | ||
499 | } | ||
500 | |||
501 | void qemu_log_needs_buffers(void) | ||
502 | diff --git a/util/qemu-timer.c b/util/qemu-timer.c | ||
503 | index XXXXXXX..XXXXXXX 100644 | ||
504 | --- a/util/qemu-timer.c | ||
505 | +++ b/util/qemu-timer.c | ||
506 | @@ -XXX,XX +XXX,XX @@ void timer_mod_anticipate_ns(QEMUTimer *ts, int64_t expire_time) | ||
507 | QEMUTimerList *timer_list = ts->timer_list; | ||
508 | bool rearm; | ||
509 | |||
510 | - qemu_mutex_lock(&timer_list->active_timers_lock); | ||
511 | - if (ts->expire_time == -1 || ts->expire_time > expire_time) { | ||
512 | - if (ts->expire_time != -1) { | ||
513 | - timer_del_locked(timer_list, ts); | ||
514 | + WITH_QEMU_LOCK_GUARD(&timer_list->active_timers_lock) { | ||
515 | + if (ts->expire_time == -1 || ts->expire_time > expire_time) { | ||
516 | + if (ts->expire_time != -1) { | ||
517 | + timer_del_locked(timer_list, ts); | ||
518 | + } | ||
519 | + rearm = timer_mod_ns_locked(timer_list, ts, expire_time); | ||
520 | + } else { | ||
521 | + rearm = false; | ||
522 | } | ||
523 | - rearm = timer_mod_ns_locked(timer_list, ts, expire_time); | ||
524 | - } else { | ||
525 | - rearm = false; | ||
526 | } | ||
527 | - qemu_mutex_unlock(&timer_list->active_timers_lock); | ||
528 | - | ||
529 | if (rearm) { | ||
530 | timerlist_rearm(timer_list); | ||
531 | } | ||
532 | diff --git a/util/rcu.c b/util/rcu.c | ||
533 | index XXXXXXX..XXXXXXX 100644 | ||
534 | --- a/util/rcu.c | ||
535 | +++ b/util/rcu.c | ||
536 | @@ -XXX,XX +XXX,XX @@ | ||
537 | #include "qemu/atomic.h" | ||
538 | #include "qemu/thread.h" | ||
539 | #include "qemu/main-loop.h" | ||
540 | +#include "qemu/lockable.h" | ||
541 | #if defined(CONFIG_MALLOC_TRIM) | ||
542 | #include <malloc.h> | ||
543 | #endif | ||
544 | @@ -XXX,XX +XXX,XX @@ static void wait_for_readers(void) | ||
545 | |||
546 | void synchronize_rcu(void) | ||
547 | { | ||
548 | - qemu_mutex_lock(&rcu_sync_lock); | ||
549 | + QEMU_LOCK_GUARD(&rcu_sync_lock); | ||
550 | |||
551 | /* Write RCU-protected pointers before reading p_rcu_reader->ctr. | ||
552 | * Pairs with smp_mb_placeholder() in rcu_read_lock(). | ||
553 | */ | ||
554 | smp_mb_global(); | ||
555 | |||
556 | - qemu_mutex_lock(&rcu_registry_lock); | ||
557 | + QEMU_LOCK_GUARD(&rcu_registry_lock); | ||
558 | if (!QLIST_EMPTY(®istry)) { | ||
559 | /* In either case, the atomic_mb_set below blocks stores that free | ||
560 | * old RCU-protected pointers. | ||
561 | @@ -XXX,XX +XXX,XX @@ void synchronize_rcu(void) | ||
562 | |||
563 | wait_for_readers(); | ||
564 | } | ||
565 | - | ||
566 | - qemu_mutex_unlock(&rcu_registry_lock); | ||
567 | - qemu_mutex_unlock(&rcu_sync_lock); | ||
568 | } | ||
569 | |||
570 | |||
571 | diff --git a/util/thread-pool.c b/util/thread-pool.c | ||
572 | index XXXXXXX..XXXXXXX 100644 | ||
573 | --- a/util/thread-pool.c | ||
574 | +++ b/util/thread-pool.c | ||
575 | @@ -XXX,XX +XXX,XX @@ static void thread_pool_cancel(BlockAIOCB *acb) | ||
576 | |||
577 | trace_thread_pool_cancel(elem, elem->common.opaque); | ||
578 | |||
579 | - qemu_mutex_lock(&pool->lock); | ||
580 | + QEMU_LOCK_GUARD(&pool->lock); | ||
581 | if (elem->state == THREAD_QUEUED && | ||
582 | /* No thread has yet started working on elem. we can try to "steal" | ||
583 | * the item from the worker if we can get a signal from the | ||
584 | @@ -XXX,XX +XXX,XX @@ static void thread_pool_cancel(BlockAIOCB *acb) | ||
585 | elem->ret = -ECANCELED; | ||
586 | } | ||
587 | |||
588 | - qemu_mutex_unlock(&pool->lock); | ||
589 | } | ||
590 | |||
591 | static AioContext *thread_pool_get_aio_context(BlockAIOCB *acb) | ||
592 | diff --git a/util/vfio-helpers.c b/util/vfio-helpers.c | ||
593 | index XXXXXXX..XXXXXXX 100644 | ||
594 | --- a/util/vfio-helpers.c | ||
595 | +++ b/util/vfio-helpers.c | ||
596 | @@ -XXX,XX +XXX,XX @@ | ||
597 | #include "standard-headers/linux/pci_regs.h" | ||
598 | #include "qemu/event_notifier.h" | ||
599 | #include "qemu/vfio-helpers.h" | ||
600 | +#include "qemu/lockable.h" | ||
601 | #include "trace.h" | ||
602 | |||
603 | #define QEMU_VFIO_DEBUG 0 | ||
604 | @@ -XXX,XX +XXX,XX @@ int qemu_vfio_dma_reset_temporary(QEMUVFIOState *s) | ||
605 | .size = QEMU_VFIO_IOVA_MAX - s->high_water_mark, | ||
606 | }; | ||
607 | trace_qemu_vfio_dma_reset_temporary(s); | ||
608 | - qemu_mutex_lock(&s->lock); | ||
609 | + QEMU_LOCK_GUARD(&s->lock); | ||
610 | if (ioctl(s->container, VFIO_IOMMU_UNMAP_DMA, &unmap)) { | ||
611 | error_report("VFIO_UNMAP_DMA failed: %s", strerror(errno)); | ||
612 | - qemu_mutex_unlock(&s->lock); | ||
613 | return -errno; | ||
614 | } | ||
615 | s->high_water_mark = QEMU_VFIO_IOVA_MAX; | ||
616 | - qemu_mutex_unlock(&s->lock); | ||
617 | return 0; | ||
618 | } | ||
619 | |||
620 | -- | ||
621 | 2.25.3 | ||
622 | diff view generated by jsdifflib |
1 | From: Peter Maydell <peter.maydell@linaro.org> | 1 | From: Simran Singhal <singhalsimran0@gmail.com> |
---|---|---|---|
2 | 2 | ||
3 | In qemu_gluster_parse_json(), the call to qdict_array_entries() | 3 | Replace manual lock()/unlock() calls with lock guard macros |
4 | could return a negative error code, which we were ignoring | 4 | (QEMU_LOCK_GUARD/WITH_QEMU_LOCK_GUARD). |
5 | because we assigned the result to an unsigned variable. | ||
6 | Fix this by using the 'int' type instead, which matches the | ||
7 | return type of qdict_array_entries() and also the type | ||
8 | we use for the loop enumeration variable 'i'. | ||
9 | 5 | ||
10 | (Spotted by Coverity, CID 1360960.) | 6 | Signed-off-by: Simran Singhal <singhalsimran0@gmail.com> |
7 | Reviewed-by: Yuval Shaia <yuval.shaia.ml@gmail.com> | ||
8 | Reviewed-by: Marcel Apfelbaum<marcel.apfelbaum@gmail.com> | ||
9 | Tested-by: Yuval Shaia <yuval.shaia.ml@gmail.com> | ||
10 | Message-id: 20200402065035.GA15477@simran-Inspiron-5558 | ||
11 | Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | ||
12 | --- | ||
13 | hw/hyperv/hyperv.c | 15 ++++++------- | ||
14 | hw/rdma/rdma_backend.c | 50 +++++++++++++++++++++--------------------- | ||
15 | hw/rdma/rdma_rm.c | 3 +-- | ||
16 | 3 files changed, 33 insertions(+), 35 deletions(-) | ||
11 | 17 | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 18 | diff --git a/hw/hyperv/hyperv.c b/hw/hyperv/hyperv.c |
13 | Reviewed-by: Eric Blake <eblake@redhat.com> | 19 | index XXXXXXX..XXXXXXX 100644 |
14 | Reviewed-by: Jeff Cody <jcody@redhat.com> | 20 | --- a/hw/hyperv/hyperv.c |
15 | Message-id: 1496682098-1540-1-git-send-email-peter.maydell@linaro.org | 21 | +++ b/hw/hyperv/hyperv.c |
16 | Signed-off-by: Jeff Cody <jcody@redhat.com> | 22 | @@ -XXX,XX +XXX,XX @@ |
17 | --- | 23 | #include "sysemu/kvm.h" |
18 | block/gluster.c | 3 +-- | 24 | #include "qemu/bitops.h" |
19 | 1 file changed, 1 insertion(+), 2 deletions(-) | 25 | #include "qemu/error-report.h" |
26 | +#include "qemu/lockable.h" | ||
27 | #include "qemu/queue.h" | ||
28 | #include "qemu/rcu.h" | ||
29 | #include "qemu/rcu_queue.h" | ||
30 | @@ -XXX,XX +XXX,XX @@ int hyperv_set_msg_handler(uint32_t conn_id, HvMsgHandler handler, void *data) | ||
31 | int ret; | ||
32 | MsgHandler *mh; | ||
33 | |||
34 | - qemu_mutex_lock(&handlers_mutex); | ||
35 | + QEMU_LOCK_GUARD(&handlers_mutex); | ||
36 | QLIST_FOREACH(mh, &msg_handlers, link) { | ||
37 | if (mh->conn_id == conn_id) { | ||
38 | if (handler) { | ||
39 | @@ -XXX,XX +XXX,XX @@ int hyperv_set_msg_handler(uint32_t conn_id, HvMsgHandler handler, void *data) | ||
40 | g_free_rcu(mh, rcu); | ||
41 | ret = 0; | ||
42 | } | ||
43 | - goto unlock; | ||
44 | + return ret; | ||
45 | } | ||
46 | } | ||
47 | |||
48 | @@ -XXX,XX +XXX,XX @@ int hyperv_set_msg_handler(uint32_t conn_id, HvMsgHandler handler, void *data) | ||
49 | } else { | ||
50 | ret = -ENOENT; | ||
51 | } | ||
52 | -unlock: | ||
53 | - qemu_mutex_unlock(&handlers_mutex); | ||
54 | + | ||
55 | return ret; | ||
56 | } | ||
57 | |||
58 | @@ -XXX,XX +XXX,XX @@ static int set_event_flag_handler(uint32_t conn_id, EventNotifier *notifier) | ||
59 | int ret; | ||
60 | EventFlagHandler *handler; | ||
61 | |||
62 | - qemu_mutex_lock(&handlers_mutex); | ||
63 | + QEMU_LOCK_GUARD(&handlers_mutex); | ||
64 | QLIST_FOREACH(handler, &event_flag_handlers, link) { | ||
65 | if (handler->conn_id == conn_id) { | ||
66 | if (notifier) { | ||
67 | @@ -XXX,XX +XXX,XX @@ static int set_event_flag_handler(uint32_t conn_id, EventNotifier *notifier) | ||
68 | g_free_rcu(handler, rcu); | ||
69 | ret = 0; | ||
70 | } | ||
71 | - goto unlock; | ||
72 | + return ret; | ||
73 | } | ||
74 | } | ||
75 | |||
76 | @@ -XXX,XX +XXX,XX @@ static int set_event_flag_handler(uint32_t conn_id, EventNotifier *notifier) | ||
77 | } else { | ||
78 | ret = -ENOENT; | ||
79 | } | ||
80 | -unlock: | ||
81 | - qemu_mutex_unlock(&handlers_mutex); | ||
82 | + | ||
83 | return ret; | ||
84 | } | ||
85 | |||
86 | diff --git a/hw/rdma/rdma_backend.c b/hw/rdma/rdma_backend.c | ||
87 | index XXXXXXX..XXXXXXX 100644 | ||
88 | --- a/hw/rdma/rdma_backend.c | ||
89 | +++ b/hw/rdma/rdma_backend.c | ||
90 | @@ -XXX,XX +XXX,XX @@ static int rdma_poll_cq(RdmaDeviceResources *rdma_dev_res, struct ibv_cq *ibcq) | ||
91 | struct ibv_wc wc[2]; | ||
92 | RdmaProtectedGSList *cqe_ctx_list; | ||
93 | |||
94 | - qemu_mutex_lock(&rdma_dev_res->lock); | ||
95 | - do { | ||
96 | - ne = ibv_poll_cq(ibcq, ARRAY_SIZE(wc), wc); | ||
97 | + WITH_QEMU_LOCK_GUARD(&rdma_dev_res->lock) { | ||
98 | + do { | ||
99 | + ne = ibv_poll_cq(ibcq, ARRAY_SIZE(wc), wc); | ||
100 | |||
101 | - trace_rdma_poll_cq(ne, ibcq); | ||
102 | + trace_rdma_poll_cq(ne, ibcq); | ||
103 | |||
104 | - for (i = 0; i < ne; i++) { | ||
105 | - bctx = rdma_rm_get_cqe_ctx(rdma_dev_res, wc[i].wr_id); | ||
106 | - if (unlikely(!bctx)) { | ||
107 | - rdma_error_report("No matching ctx for req %"PRId64, | ||
108 | - wc[i].wr_id); | ||
109 | - continue; | ||
110 | - } | ||
111 | + for (i = 0; i < ne; i++) { | ||
112 | + bctx = rdma_rm_get_cqe_ctx(rdma_dev_res, wc[i].wr_id); | ||
113 | + if (unlikely(!bctx)) { | ||
114 | + rdma_error_report("No matching ctx for req %"PRId64, | ||
115 | + wc[i].wr_id); | ||
116 | + continue; | ||
117 | + } | ||
118 | |||
119 | - comp_handler(bctx->up_ctx, &wc[i]); | ||
120 | + comp_handler(bctx->up_ctx, &wc[i]); | ||
121 | |||
122 | - if (bctx->backend_qp) { | ||
123 | - cqe_ctx_list = &bctx->backend_qp->cqe_ctx_list; | ||
124 | - } else { | ||
125 | - cqe_ctx_list = &bctx->backend_srq->cqe_ctx_list; | ||
126 | - } | ||
127 | + if (bctx->backend_qp) { | ||
128 | + cqe_ctx_list = &bctx->backend_qp->cqe_ctx_list; | ||
129 | + } else { | ||
130 | + cqe_ctx_list = &bctx->backend_srq->cqe_ctx_list; | ||
131 | + } | ||
132 | |||
133 | - rdma_protected_gslist_remove_int32(cqe_ctx_list, wc[i].wr_id); | ||
134 | - rdma_rm_dealloc_cqe_ctx(rdma_dev_res, wc[i].wr_id); | ||
135 | - g_free(bctx); | ||
136 | - } | ||
137 | - total_ne += ne; | ||
138 | - } while (ne > 0); | ||
139 | - atomic_sub(&rdma_dev_res->stats.missing_cqe, total_ne); | ||
140 | - qemu_mutex_unlock(&rdma_dev_res->lock); | ||
141 | + rdma_protected_gslist_remove_int32(cqe_ctx_list, wc[i].wr_id); | ||
142 | + rdma_rm_dealloc_cqe_ctx(rdma_dev_res, wc[i].wr_id); | ||
143 | + g_free(bctx); | ||
144 | + } | ||
145 | + total_ne += ne; | ||
146 | + } while (ne > 0); | ||
147 | + atomic_sub(&rdma_dev_res->stats.missing_cqe, total_ne); | ||
148 | + } | ||
149 | |||
150 | if (ne < 0) { | ||
151 | rdma_error_report("ibv_poll_cq fail, rc=%d, errno=%d", ne, errno); | ||
152 | diff --git a/hw/rdma/rdma_rm.c b/hw/rdma/rdma_rm.c | ||
153 | index XXXXXXX..XXXXXXX 100644 | ||
154 | --- a/hw/rdma/rdma_rm.c | ||
155 | +++ b/hw/rdma/rdma_rm.c | ||
156 | @@ -XXX,XX +XXX,XX @@ static inline void rdma_res_tbl_dealloc(RdmaRmResTbl *tbl, uint32_t handle) | ||
157 | { | ||
158 | trace_rdma_res_tbl_dealloc(tbl->name, handle); | ||
159 | |||
160 | - qemu_mutex_lock(&tbl->lock); | ||
161 | + QEMU_LOCK_GUARD(&tbl->lock); | ||
162 | |||
163 | if (handle < tbl->tbl_sz) { | ||
164 | clear_bit(handle, tbl->bitmap); | ||
165 | tbl->used--; | ||
166 | } | ||
167 | |||
168 | - qemu_mutex_unlock(&tbl->lock); | ||
169 | } | ||
170 | |||
171 | int rdma_rm_alloc_pd(RdmaDeviceResources *dev_res, RdmaBackendDev *backend_dev, | ||
172 | -- | ||
173 | 2.25.3 | ||
20 | 174 | ||
21 | diff --git a/block/gluster.c b/block/gluster.c | ||
22 | index XXXXXXX..XXXXXXX 100644 | ||
23 | --- a/block/gluster.c | ||
24 | +++ b/block/gluster.c | ||
25 | @@ -XXX,XX +XXX,XX @@ static int qemu_gluster_parse_json(BlockdevOptionsGluster *gconf, | ||
26 | Error *local_err = NULL; | ||
27 | char *str = NULL; | ||
28 | const char *ptr; | ||
29 | - size_t num_servers; | ||
30 | - int i, type; | ||
31 | + int i, type, num_servers; | ||
32 | |||
33 | /* create opts info from runtime_json_opts list */ | ||
34 | opts = qemu_opts_create(&runtime_json_opts, NULL, 0, &error_abort); | ||
35 | -- | ||
36 | 2.9.3 | ||
37 | |||
38 | diff view generated by jsdifflib |