1 | The following changes since commit 41feb5b955f0d7c9d071b2c5adbc404ae2895c7a: | 1 | The following changes since commit 27c94566379069fb8930bb1433dcffbf7df3203d: |
---|---|---|---|
2 | 2 | ||
3 | Merge remote-tracking branch 'remotes/vivier2/tags/linux-user-for-3.0-pull-request' into staging (2018-06-05 10:38:33 +0100) | 3 | Merge remote-tracking branch 'remotes/edgar/tags/edgar/xilinx-next-2020-04-30.for-upstream' into staging (2020-04-30 16:47:23 +0100) |
4 | 4 | ||
5 | are available in the git repository at: | 5 | are available in the Git repository at: |
6 | 6 | ||
7 | git://github.com/codyprime/qemu-kvm-jtc.git tags/block-pull-request | 7 | https://github.com/stefanha/qemu.git tags/block-pull-request |
8 | 8 | ||
9 | for you to fetch changes up to 68acc99f143b60ec4faa2903065b187d4d3c4bf3: | 9 | for you to fetch changes up to cc1adc4488059ac16d4d2772a7aa7cd1323deeca: |
10 | 10 | ||
11 | sheepdog: remove huge BSS object (2018-06-05 10:15:12 -0400) | 11 | lockable: Replace locks with lock guard macros (2020-05-01 09:19:25 +0100) |
12 | 12 | ||
13 | ---------------------------------------------------------------- | 13 | ---------------------------------------------------------------- |
14 | Sheepdog patches | 14 | Pull request |
15 | |||
16 | Fix the QEMU_LOCK_GUARD() macros, use them more widely, and allow the fuzzer | ||
17 | target to be selected from argv[0]. | ||
18 | |||
15 | ---------------------------------------------------------------- | 19 | ---------------------------------------------------------------- |
16 | 20 | ||
17 | Paolo Bonzini (2): | 21 | Alexander Bulekov (1): |
18 | sheepdog: cleanup repeated expression | 22 | fuzz: select fuzz target using executable name |
19 | sheepdog: remove huge BSS object | ||
20 | 23 | ||
21 | block/sheepdog.c | 28 +++++++++++++++------------- | 24 | Daniel Brodsky (2): |
22 | 1 file changed, 15 insertions(+), 13 deletions(-) | 25 | lockable: fix __COUNTER__ macro to be referenced properly |
26 | lockable: replaced locks with lock guard macros where appropriate | ||
27 | |||
28 | Simran Singhal (1): | ||
29 | lockable: Replace locks with lock guard macros | ||
30 | |||
31 | include/qemu/lockable.h | 7 +++--- | ||
32 | include/qemu/rcu.h | 2 +- | ||
33 | block/iscsi.c | 7 ++---- | ||
34 | block/nfs.c | 51 +++++++++++++++++++---------------------- | ||
35 | cpus-common.c | 14 ++++------- | ||
36 | hw/display/qxl.c | 43 ++++++++++++++++------------------ | ||
37 | hw/hyperv/hyperv.c | 15 ++++++------ | ||
38 | hw/rdma/rdma_backend.c | 50 ++++++++++++++++++++-------------------- | ||
39 | hw/rdma/rdma_rm.c | 3 +-- | ||
40 | hw/vfio/platform.c | 5 ++-- | ||
41 | migration/migration.c | 3 +-- | ||
42 | migration/multifd.c | 8 +++---- | ||
43 | migration/ram.c | 3 +-- | ||
44 | monitor/misc.c | 4 +--- | ||
45 | tests/qtest/fuzz/fuzz.c | 19 ++++++++------- | ||
46 | ui/spice-display.c | 14 +++++------ | ||
47 | util/log.c | 4 ++-- | ||
48 | util/qemu-timer.c | 17 +++++++------- | ||
49 | util/rcu.c | 8 +++---- | ||
50 | util/thread-pool.c | 3 +-- | ||
51 | util/vfio-helpers.c | 5 ++-- | ||
52 | slirp | 2 +- | ||
53 | 22 files changed, 133 insertions(+), 154 deletions(-) | ||
23 | 54 | ||
24 | -- | 55 | -- |
25 | 2.13.6 | 56 | 2.25.3 |
26 | 57 | ||
27 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Alexander Bulekov <alxndr@bu.edu> | ||
1 | 2 | ||
3 | The fuzzers are built into a binary (e.g. qemu-fuzz-i386). To select the | ||
4 | device to fuzz/fuzz target, we usually use the --fuzz-target= argument. | ||
5 | This commit allows the fuzz-target to be specified using the name of the | ||
6 | executable. If the executable name ends with -target-FUZZ_TARGET, then | ||
7 | we select the fuzz target based on this name, rather than the | ||
8 | --fuzz-target argument. This is useful for systems such as oss-fuzz | ||
9 | where we don't have control of the arguments passed to the fuzzer. | ||
10 | |||
11 | [Fixed incorrect indentation. | ||
12 | --Stefan] | ||
13 | |||
14 | Signed-off-by: Alexander Bulekov <alxndr@bu.edu> | ||
15 | Reviewed-by: Darren Kenny <darren.kenny@oracle.com> | ||
16 | Message-id: 20200421182230.6313-1-alxndr@bu.edu | ||
17 | Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | ||
18 | --- | ||
19 | tests/qtest/fuzz/fuzz.c | 19 +++++++++++-------- | ||
20 | slirp | 2 +- | ||
21 | 2 files changed, 12 insertions(+), 9 deletions(-) | ||
22 | |||
23 | diff --git a/tests/qtest/fuzz/fuzz.c b/tests/qtest/fuzz/fuzz.c | ||
24 | index XXXXXXX..XXXXXXX 100644 | ||
25 | --- a/tests/qtest/fuzz/fuzz.c | ||
26 | +++ b/tests/qtest/fuzz/fuzz.c | ||
27 | @@ -XXX,XX +XXX,XX @@ static void usage(char *path) | ||
28 | printf(" * %s : %s\n", tmp->target->name, | ||
29 | tmp->target->description); | ||
30 | } | ||
31 | + printf("Alternatively, add -target-FUZZ_TARGET to the executable name\n"); | ||
32 | exit(0); | ||
33 | } | ||
34 | |||
35 | @@ -XXX,XX +XXX,XX @@ int LLVMFuzzerInitialize(int *argc, char ***argv, char ***envp) | ||
36 | module_call_init(MODULE_INIT_QOM); | ||
37 | module_call_init(MODULE_INIT_LIBQOS); | ||
38 | |||
39 | - if (*argc <= 1) { | ||
40 | + target_name = strstr(**argv, "-target-"); | ||
41 | + if (target_name) { /* The binary name specifies the target */ | ||
42 | + target_name += strlen("-target-"); | ||
43 | + } else if (*argc > 1) { /* The target is specified as an argument */ | ||
44 | + target_name = (*argv)[1]; | ||
45 | + if (!strstr(target_name, "--fuzz-target=")) { | ||
46 | + usage(**argv); | ||
47 | + } | ||
48 | + target_name += strlen("--fuzz-target="); | ||
49 | + } else { | ||
50 | usage(**argv); | ||
51 | } | ||
52 | |||
53 | /* Identify the fuzz target */ | ||
54 | - target_name = (*argv)[1]; | ||
55 | - if (!strstr(target_name, "--fuzz-target=")) { | ||
56 | - usage(**argv); | ||
57 | - } | ||
58 | - | ||
59 | - target_name += strlen("--fuzz-target="); | ||
60 | - | ||
61 | fuzz_target = fuzz_get_target(target_name); | ||
62 | if (!fuzz_target) { | ||
63 | usage(**argv); | ||
64 | diff --git a/slirp b/slirp | ||
65 | index XXXXXXX..XXXXXXX 160000 | ||
66 | --- a/slirp | ||
67 | +++ b/slirp | ||
68 | @@ -1 +1 @@ | ||
69 | -Subproject commit 2faae0f778f818fadc873308f983289df697eb93 | ||
70 | +Subproject commit 55ab21c9a36852915b81f1b41ebaf3b6509dd8ba | ||
71 | -- | ||
72 | 2.25.3 | ||
73 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Daniel Brodsky <dnbrdsky@gmail.com> | ||
1 | 2 | ||
3 | - __COUNTER__ doesn't work with ## concat | ||
4 | - replaced ## with glue() macro so __COUNTER__ is evaluated | ||
5 | |||
6 | Fixes: 3284c3ddc4 | ||
7 | |||
8 | Signed-off-by: Daniel Brodsky <dnbrdsky@gmail.com> | ||
9 | Message-id: 20200404042108.389635-2-dnbrdsky@gmail.com | ||
10 | Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | ||
11 | --- | ||
12 | include/qemu/lockable.h | 7 ++++--- | ||
13 | include/qemu/rcu.h | 2 +- | ||
14 | 2 files changed, 5 insertions(+), 4 deletions(-) | ||
15 | |||
16 | diff --git a/include/qemu/lockable.h b/include/qemu/lockable.h | ||
17 | index XXXXXXX..XXXXXXX 100644 | ||
18 | --- a/include/qemu/lockable.h | ||
19 | +++ b/include/qemu/lockable.h | ||
20 | @@ -XXX,XX +XXX,XX @@ G_DEFINE_AUTOPTR_CLEANUP_FUNC(QemuLockable, qemu_lockable_auto_unlock) | ||
21 | * } | ||
22 | */ | ||
23 | #define WITH_QEMU_LOCK_GUARD(x) \ | ||
24 | - WITH_QEMU_LOCK_GUARD_((x), qemu_lockable_auto##__COUNTER__) | ||
25 | + WITH_QEMU_LOCK_GUARD_((x), glue(qemu_lockable_auto, __COUNTER__)) | ||
26 | |||
27 | /** | ||
28 | * QEMU_LOCK_GUARD - Lock an object until the end of the scope | ||
29 | @@ -XXX,XX +XXX,XX @@ G_DEFINE_AUTOPTR_CLEANUP_FUNC(QemuLockable, qemu_lockable_auto_unlock) | ||
30 | * return; <-- mutex is automatically unlocked | ||
31 | * } | ||
32 | */ | ||
33 | -#define QEMU_LOCK_GUARD(x) \ | ||
34 | - g_autoptr(QemuLockable) qemu_lockable_auto##__COUNTER__ = \ | ||
35 | +#define QEMU_LOCK_GUARD(x) \ | ||
36 | + g_autoptr(QemuLockable) \ | ||
37 | + glue(qemu_lockable_auto, __COUNTER__) G_GNUC_UNUSED = \ | ||
38 | qemu_lockable_auto_lock(QEMU_MAKE_LOCKABLE((x))) | ||
39 | |||
40 | #endif | ||
41 | diff --git a/include/qemu/rcu.h b/include/qemu/rcu.h | ||
42 | index XXXXXXX..XXXXXXX 100644 | ||
43 | --- a/include/qemu/rcu.h | ||
44 | +++ b/include/qemu/rcu.h | ||
45 | @@ -XXX,XX +XXX,XX @@ static inline void rcu_read_auto_unlock(RCUReadAuto *r) | ||
46 | G_DEFINE_AUTOPTR_CLEANUP_FUNC(RCUReadAuto, rcu_read_auto_unlock) | ||
47 | |||
48 | #define WITH_RCU_READ_LOCK_GUARD() \ | ||
49 | - WITH_RCU_READ_LOCK_GUARD_(_rcu_read_auto##__COUNTER__) | ||
50 | + WITH_RCU_READ_LOCK_GUARD_(glue(_rcu_read_auto, __COUNTER__)) | ||
51 | |||
52 | #define WITH_RCU_READ_LOCK_GUARD_(var) \ | ||
53 | for (g_autoptr(RCUReadAuto) var = rcu_read_auto_lock(); \ | ||
54 | -- | ||
55 | 2.25.3 | ||
56 | diff view generated by jsdifflib |
1 | From: Paolo Bonzini <pbonzini@redhat.com> | 1 | From: Daniel Brodsky <dnbrdsky@gmail.com> |
---|---|---|---|
2 | 2 | ||
3 | block/sheepdog.o has a 4M static variable that is 90% of QEMU's whole .bss | 3 | - ran regexp "qemu_mutex_lock\(.*\).*\n.*if" to find targets |
4 | section. Replace it with a heap-allocated block, and make it smaller too | 4 | - replaced result with QEMU_LOCK_GUARD if all unlocks at function end |
5 | since only the inode header is actually being used. | 5 | - replaced result with WITH_QEMU_LOCK_GUARD if unlock not at end |
6 | 6 | ||
7 | bss size goes down from 4464280 to 269976. | 7 | Signed-off-by: Daniel Brodsky <dnbrdsky@gmail.com> |
8 | Reviewed-by: Juan Quintela <quintela@redhat.com> | ||
9 | Message-id: 20200404042108.389635-3-dnbrdsky@gmail.com | ||
10 | Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | ||
11 | --- | ||
12 | block/iscsi.c | 7 ++---- | ||
13 | block/nfs.c | 51 ++++++++++++++++++++----------------------- | ||
14 | cpus-common.c | 14 +++++------- | ||
15 | hw/display/qxl.c | 43 +++++++++++++++++------------------- | ||
16 | hw/vfio/platform.c | 5 ++--- | ||
17 | migration/migration.c | 3 +-- | ||
18 | migration/multifd.c | 8 +++---- | ||
19 | migration/ram.c | 3 +-- | ||
20 | monitor/misc.c | 4 +--- | ||
21 | ui/spice-display.c | 14 ++++++------ | ||
22 | util/log.c | 4 ++-- | ||
23 | util/qemu-timer.c | 17 +++++++-------- | ||
24 | util/rcu.c | 8 +++---- | ||
25 | util/thread-pool.c | 3 +-- | ||
26 | util/vfio-helpers.c | 5 ++--- | ||
27 | 15 files changed, 83 insertions(+), 106 deletions(-) | ||
8 | 28 | ||
9 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 29 | diff --git a/block/iscsi.c b/block/iscsi.c |
10 | Reviewed-by: Jeff Cody <jcody@redhat.com> | 30 | index XXXXXXX..XXXXXXX 100644 |
11 | Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> | 31 | --- a/block/iscsi.c |
12 | Message-Id: <20180523160721.14018-3-pbonzini@redhat.com> | 32 | +++ b/block/iscsi.c |
13 | Signed-off-by: Jeff Cody <jcody@redhat.com> | 33 | @@ -XXX,XX +XXX,XX @@ static void iscsi_nop_timed_event(void *opaque) |
14 | --- | 34 | { |
15 | block/sheepdog.c | 22 ++++++++++++---------- | 35 | IscsiLun *iscsilun = opaque; |
16 | 1 file changed, 12 insertions(+), 10 deletions(-) | 36 | |
37 | - qemu_mutex_lock(&iscsilun->mutex); | ||
38 | + QEMU_LOCK_GUARD(&iscsilun->mutex); | ||
39 | if (iscsi_get_nops_in_flight(iscsilun->iscsi) >= MAX_NOP_FAILURES) { | ||
40 | error_report("iSCSI: NOP timeout. Reconnecting..."); | ||
41 | iscsilun->request_timed_out = true; | ||
42 | } else if (iscsi_nop_out_async(iscsilun->iscsi, NULL, NULL, 0, NULL) != 0) { | ||
43 | error_report("iSCSI: failed to sent NOP-Out. Disabling NOP messages."); | ||
44 | - goto out; | ||
45 | + return; | ||
46 | } | ||
47 | |||
48 | timer_mod(iscsilun->nop_timer, qemu_clock_get_ms(QEMU_CLOCK_REALTIME) + NOP_INTERVAL); | ||
49 | iscsi_set_events(iscsilun); | ||
50 | - | ||
51 | -out: | ||
52 | - qemu_mutex_unlock(&iscsilun->mutex); | ||
53 | } | ||
54 | |||
55 | static void iscsi_readcapacity_sync(IscsiLun *iscsilun, Error **errp) | ||
56 | diff --git a/block/nfs.c b/block/nfs.c | ||
57 | index XXXXXXX..XXXXXXX 100644 | ||
58 | --- a/block/nfs.c | ||
59 | +++ b/block/nfs.c | ||
60 | @@ -XXX,XX +XXX,XX @@ static int coroutine_fn nfs_co_preadv(BlockDriverState *bs, uint64_t offset, | ||
61 | nfs_co_init_task(bs, &task); | ||
62 | task.iov = iov; | ||
63 | |||
64 | - qemu_mutex_lock(&client->mutex); | ||
65 | - if (nfs_pread_async(client->context, client->fh, | ||
66 | - offset, bytes, nfs_co_generic_cb, &task) != 0) { | ||
67 | - qemu_mutex_unlock(&client->mutex); | ||
68 | - return -ENOMEM; | ||
69 | - } | ||
70 | + WITH_QEMU_LOCK_GUARD(&client->mutex) { | ||
71 | + if (nfs_pread_async(client->context, client->fh, | ||
72 | + offset, bytes, nfs_co_generic_cb, &task) != 0) { | ||
73 | + return -ENOMEM; | ||
74 | + } | ||
75 | |||
76 | - nfs_set_events(client); | ||
77 | - qemu_mutex_unlock(&client->mutex); | ||
78 | + nfs_set_events(client); | ||
79 | + } | ||
80 | while (!task.complete) { | ||
81 | qemu_coroutine_yield(); | ||
82 | } | ||
83 | @@ -XXX,XX +XXX,XX @@ static int coroutine_fn nfs_co_pwritev(BlockDriverState *bs, uint64_t offset, | ||
84 | buf = iov->iov[0].iov_base; | ||
85 | } | ||
86 | |||
87 | - qemu_mutex_lock(&client->mutex); | ||
88 | - if (nfs_pwrite_async(client->context, client->fh, | ||
89 | - offset, bytes, buf, | ||
90 | - nfs_co_generic_cb, &task) != 0) { | ||
91 | - qemu_mutex_unlock(&client->mutex); | ||
92 | - if (my_buffer) { | ||
93 | - g_free(buf); | ||
94 | + WITH_QEMU_LOCK_GUARD(&client->mutex) { | ||
95 | + if (nfs_pwrite_async(client->context, client->fh, | ||
96 | + offset, bytes, buf, | ||
97 | + nfs_co_generic_cb, &task) != 0) { | ||
98 | + if (my_buffer) { | ||
99 | + g_free(buf); | ||
100 | + } | ||
101 | + return -ENOMEM; | ||
102 | } | ||
103 | - return -ENOMEM; | ||
104 | - } | ||
105 | |||
106 | - nfs_set_events(client); | ||
107 | - qemu_mutex_unlock(&client->mutex); | ||
108 | + nfs_set_events(client); | ||
109 | + } | ||
110 | while (!task.complete) { | ||
111 | qemu_coroutine_yield(); | ||
112 | } | ||
113 | @@ -XXX,XX +XXX,XX @@ static int coroutine_fn nfs_co_flush(BlockDriverState *bs) | ||
114 | |||
115 | nfs_co_init_task(bs, &task); | ||
116 | |||
117 | - qemu_mutex_lock(&client->mutex); | ||
118 | - if (nfs_fsync_async(client->context, client->fh, nfs_co_generic_cb, | ||
119 | - &task) != 0) { | ||
120 | - qemu_mutex_unlock(&client->mutex); | ||
121 | - return -ENOMEM; | ||
122 | - } | ||
123 | + WITH_QEMU_LOCK_GUARD(&client->mutex) { | ||
124 | + if (nfs_fsync_async(client->context, client->fh, nfs_co_generic_cb, | ||
125 | + &task) != 0) { | ||
126 | + return -ENOMEM; | ||
127 | + } | ||
128 | |||
129 | - nfs_set_events(client); | ||
130 | - qemu_mutex_unlock(&client->mutex); | ||
131 | + nfs_set_events(client); | ||
132 | + } | ||
133 | while (!task.complete) { | ||
134 | qemu_coroutine_yield(); | ||
135 | } | ||
136 | diff --git a/cpus-common.c b/cpus-common.c | ||
137 | index XXXXXXX..XXXXXXX 100644 | ||
138 | --- a/cpus-common.c | ||
139 | +++ b/cpus-common.c | ||
140 | @@ -XXX,XX +XXX,XX @@ | ||
141 | #include "exec/cpu-common.h" | ||
142 | #include "hw/core/cpu.h" | ||
143 | #include "sysemu/cpus.h" | ||
144 | +#include "qemu/lockable.h" | ||
145 | |||
146 | static QemuMutex qemu_cpu_list_lock; | ||
147 | static QemuCond exclusive_cond; | ||
148 | @@ -XXX,XX +XXX,XX @@ static int cpu_get_free_index(void) | ||
149 | |||
150 | void cpu_list_add(CPUState *cpu) | ||
151 | { | ||
152 | - qemu_mutex_lock(&qemu_cpu_list_lock); | ||
153 | + QEMU_LOCK_GUARD(&qemu_cpu_list_lock); | ||
154 | if (cpu->cpu_index == UNASSIGNED_CPU_INDEX) { | ||
155 | cpu->cpu_index = cpu_get_free_index(); | ||
156 | assert(cpu->cpu_index != UNASSIGNED_CPU_INDEX); | ||
157 | @@ -XXX,XX +XXX,XX @@ void cpu_list_add(CPUState *cpu) | ||
158 | assert(!cpu_index_auto_assigned); | ||
159 | } | ||
160 | QTAILQ_INSERT_TAIL_RCU(&cpus, cpu, node); | ||
161 | - qemu_mutex_unlock(&qemu_cpu_list_lock); | ||
162 | } | ||
163 | |||
164 | void cpu_list_remove(CPUState *cpu) | ||
165 | { | ||
166 | - qemu_mutex_lock(&qemu_cpu_list_lock); | ||
167 | + QEMU_LOCK_GUARD(&qemu_cpu_list_lock); | ||
168 | if (!QTAILQ_IN_USE(cpu, node)) { | ||
169 | /* there is nothing to undo since cpu_exec_init() hasn't been called */ | ||
170 | - qemu_mutex_unlock(&qemu_cpu_list_lock); | ||
171 | return; | ||
172 | } | ||
173 | |||
174 | @@ -XXX,XX +XXX,XX @@ void cpu_list_remove(CPUState *cpu) | ||
175 | |||
176 | QTAILQ_REMOVE_RCU(&cpus, cpu, node); | ||
177 | cpu->cpu_index = UNASSIGNED_CPU_INDEX; | ||
178 | - qemu_mutex_unlock(&qemu_cpu_list_lock); | ||
179 | } | ||
180 | |||
181 | struct qemu_work_item { | ||
182 | @@ -XXX,XX +XXX,XX @@ void cpu_exec_start(CPUState *cpu) | ||
183 | * see cpu->running == true, and it will kick the CPU. | ||
184 | */ | ||
185 | if (unlikely(atomic_read(&pending_cpus))) { | ||
186 | - qemu_mutex_lock(&qemu_cpu_list_lock); | ||
187 | + QEMU_LOCK_GUARD(&qemu_cpu_list_lock); | ||
188 | if (!cpu->has_waiter) { | ||
189 | /* Not counted in pending_cpus, let the exclusive item | ||
190 | * run. Since we have the lock, just set cpu->running to true | ||
191 | @@ -XXX,XX +XXX,XX @@ void cpu_exec_start(CPUState *cpu) | ||
192 | * waiter at cpu_exec_end. | ||
193 | */ | ||
194 | } | ||
195 | - qemu_mutex_unlock(&qemu_cpu_list_lock); | ||
196 | } | ||
197 | } | ||
198 | |||
199 | @@ -XXX,XX +XXX,XX @@ void cpu_exec_end(CPUState *cpu) | ||
200 | * next cpu_exec_start. | ||
201 | */ | ||
202 | if (unlikely(atomic_read(&pending_cpus))) { | ||
203 | - qemu_mutex_lock(&qemu_cpu_list_lock); | ||
204 | + QEMU_LOCK_GUARD(&qemu_cpu_list_lock); | ||
205 | if (cpu->has_waiter) { | ||
206 | cpu->has_waiter = false; | ||
207 | atomic_set(&pending_cpus, pending_cpus - 1); | ||
208 | @@ -XXX,XX +XXX,XX @@ void cpu_exec_end(CPUState *cpu) | ||
209 | qemu_cond_signal(&exclusive_cond); | ||
210 | } | ||
211 | } | ||
212 | - qemu_mutex_unlock(&qemu_cpu_list_lock); | ||
213 | } | ||
214 | } | ||
215 | |||
216 | diff --git a/hw/display/qxl.c b/hw/display/qxl.c | ||
217 | index XXXXXXX..XXXXXXX 100644 | ||
218 | --- a/hw/display/qxl.c | ||
219 | +++ b/hw/display/qxl.c | ||
220 | @@ -XXX,XX +XXX,XX @@ static int qxl_track_command(PCIQXLDevice *qxl, struct QXLCommandExt *ext) | ||
221 | cmd->u.surface_create.stride); | ||
222 | return 1; | ||
223 | } | ||
224 | - qemu_mutex_lock(&qxl->track_lock); | ||
225 | - if (cmd->type == QXL_SURFACE_CMD_CREATE) { | ||
226 | - qxl->guest_surfaces.cmds[id] = ext->cmd.data; | ||
227 | - qxl->guest_surfaces.count++; | ||
228 | - if (qxl->guest_surfaces.max < qxl->guest_surfaces.count) | ||
229 | - qxl->guest_surfaces.max = qxl->guest_surfaces.count; | ||
230 | + WITH_QEMU_LOCK_GUARD(&qxl->track_lock) { | ||
231 | + if (cmd->type == QXL_SURFACE_CMD_CREATE) { | ||
232 | + qxl->guest_surfaces.cmds[id] = ext->cmd.data; | ||
233 | + qxl->guest_surfaces.count++; | ||
234 | + if (qxl->guest_surfaces.max < qxl->guest_surfaces.count) { | ||
235 | + qxl->guest_surfaces.max = qxl->guest_surfaces.count; | ||
236 | + } | ||
237 | + } | ||
238 | + if (cmd->type == QXL_SURFACE_CMD_DESTROY) { | ||
239 | + qxl->guest_surfaces.cmds[id] = 0; | ||
240 | + qxl->guest_surfaces.count--; | ||
241 | + } | ||
242 | } | ||
243 | - if (cmd->type == QXL_SURFACE_CMD_DESTROY) { | ||
244 | - qxl->guest_surfaces.cmds[id] = 0; | ||
245 | - qxl->guest_surfaces.count--; | ||
246 | - } | ||
247 | - qemu_mutex_unlock(&qxl->track_lock); | ||
248 | break; | ||
249 | } | ||
250 | case QXL_CMD_CURSOR: | ||
251 | @@ -XXX,XX +XXX,XX @@ static void interface_update_area_complete(QXLInstance *sin, | ||
252 | int i; | ||
253 | int qxl_i; | ||
254 | |||
255 | - qemu_mutex_lock(&qxl->ssd.lock); | ||
256 | + QEMU_LOCK_GUARD(&qxl->ssd.lock); | ||
257 | if (surface_id != 0 || !num_updated_rects || | ||
258 | !qxl->render_update_cookie_num) { | ||
259 | - qemu_mutex_unlock(&qxl->ssd.lock); | ||
260 | return; | ||
261 | } | ||
262 | trace_qxl_interface_update_area_complete(qxl->id, surface_id, dirty->left, | ||
263 | @@ -XXX,XX +XXX,XX @@ static void interface_update_area_complete(QXLInstance *sin, | ||
264 | * Don't bother copying or scheduling the bh since we will flip | ||
265 | * the whole area anyway on completion of the update_area async call | ||
266 | */ | ||
267 | - qemu_mutex_unlock(&qxl->ssd.lock); | ||
268 | return; | ||
269 | } | ||
270 | qxl_i = qxl->num_dirty_rects; | ||
271 | @@ -XXX,XX +XXX,XX @@ static void interface_update_area_complete(QXLInstance *sin, | ||
272 | trace_qxl_interface_update_area_complete_schedule_bh(qxl->id, | ||
273 | qxl->num_dirty_rects); | ||
274 | qemu_bh_schedule(qxl->update_area_bh); | ||
275 | - qemu_mutex_unlock(&qxl->ssd.lock); | ||
276 | } | ||
277 | |||
278 | /* called from spice server thread context only */ | ||
279 | @@ -XXX,XX +XXX,XX @@ static void ioport_write(void *opaque, hwaddr addr, | ||
280 | case QXL_IO_MONITORS_CONFIG_ASYNC: | ||
281 | async_common: | ||
282 | async = QXL_ASYNC; | ||
283 | - qemu_mutex_lock(&d->async_lock); | ||
284 | - if (d->current_async != QXL_UNDEFINED_IO) { | ||
285 | - qxl_set_guest_bug(d, "%d async started before last (%d) complete", | ||
286 | - io_port, d->current_async); | ||
287 | - qemu_mutex_unlock(&d->async_lock); | ||
288 | - return; | ||
289 | + WITH_QEMU_LOCK_GUARD(&d->async_lock) { | ||
290 | + if (d->current_async != QXL_UNDEFINED_IO) { | ||
291 | + qxl_set_guest_bug(d, "%d async started before last (%d) complete", | ||
292 | + io_port, d->current_async); | ||
293 | + return; | ||
294 | + } | ||
295 | + d->current_async = orig_io_port; | ||
296 | } | ||
297 | - d->current_async = orig_io_port; | ||
298 | - qemu_mutex_unlock(&d->async_lock); | ||
299 | break; | ||
300 | default: | ||
301 | break; | ||
302 | diff --git a/hw/vfio/platform.c b/hw/vfio/platform.c | ||
303 | index XXXXXXX..XXXXXXX 100644 | ||
304 | --- a/hw/vfio/platform.c | ||
305 | +++ b/hw/vfio/platform.c | ||
306 | @@ -XXX,XX +XXX,XX @@ | ||
307 | #include "hw/vfio/vfio-platform.h" | ||
308 | #include "migration/vmstate.h" | ||
309 | #include "qemu/error-report.h" | ||
310 | +#include "qemu/lockable.h" | ||
311 | #include "qemu/main-loop.h" | ||
312 | #include "qemu/module.h" | ||
313 | #include "qemu/range.h" | ||
314 | @@ -XXX,XX +XXX,XX @@ static void vfio_intp_interrupt(VFIOINTp *intp) | ||
315 | VFIOPlatformDevice *vdev = intp->vdev; | ||
316 | bool delay_handling = false; | ||
317 | |||
318 | - qemu_mutex_lock(&vdev->intp_mutex); | ||
319 | + QEMU_LOCK_GUARD(&vdev->intp_mutex); | ||
320 | if (intp->state == VFIO_IRQ_INACTIVE) { | ||
321 | QLIST_FOREACH(tmp, &vdev->intp_list, next) { | ||
322 | if (tmp->state == VFIO_IRQ_ACTIVE || | ||
323 | @@ -XXX,XX +XXX,XX @@ static void vfio_intp_interrupt(VFIOINTp *intp) | ||
324 | QSIMPLEQ_INSERT_TAIL(&vdev->pending_intp_queue, | ||
325 | intp, pqnext); | ||
326 | ret = event_notifier_test_and_clear(intp->interrupt); | ||
327 | - qemu_mutex_unlock(&vdev->intp_mutex); | ||
328 | return; | ||
329 | } | ||
330 | |||
331 | @@ -XXX,XX +XXX,XX @@ static void vfio_intp_interrupt(VFIOINTp *intp) | ||
332 | qemu_clock_get_ms(QEMU_CLOCK_VIRTUAL) + | ||
333 | vdev->mmap_timeout); | ||
334 | } | ||
335 | - qemu_mutex_unlock(&vdev->intp_mutex); | ||
336 | } | ||
337 | |||
338 | /** | ||
339 | diff --git a/migration/migration.c b/migration/migration.c | ||
340 | index XXXXXXX..XXXXXXX 100644 | ||
341 | --- a/migration/migration.c | ||
342 | +++ b/migration/migration.c | ||
343 | @@ -XXX,XX +XXX,XX @@ static void migrate_fd_cleanup_bh(void *opaque) | ||
344 | |||
345 | void migrate_set_error(MigrationState *s, const Error *error) | ||
346 | { | ||
347 | - qemu_mutex_lock(&s->error_mutex); | ||
348 | + QEMU_LOCK_GUARD(&s->error_mutex); | ||
349 | if (!s->error) { | ||
350 | s->error = error_copy(error); | ||
351 | } | ||
352 | - qemu_mutex_unlock(&s->error_mutex); | ||
353 | } | ||
354 | |||
355 | void migrate_fd_error(MigrationState *s, const Error *error) | ||
356 | diff --git a/migration/multifd.c b/migration/multifd.c | ||
357 | index XXXXXXX..XXXXXXX 100644 | ||
358 | --- a/migration/multifd.c | ||
359 | +++ b/migration/multifd.c | ||
360 | @@ -XXX,XX +XXX,XX @@ void multifd_recv_sync_main(void) | ||
361 | for (i = 0; i < migrate_multifd_channels(); i++) { | ||
362 | MultiFDRecvParams *p = &multifd_recv_state->params[i]; | ||
363 | |||
364 | - qemu_mutex_lock(&p->mutex); | ||
365 | - if (multifd_recv_state->packet_num < p->packet_num) { | ||
366 | - multifd_recv_state->packet_num = p->packet_num; | ||
367 | + WITH_QEMU_LOCK_GUARD(&p->mutex) { | ||
368 | + if (multifd_recv_state->packet_num < p->packet_num) { | ||
369 | + multifd_recv_state->packet_num = p->packet_num; | ||
370 | + } | ||
371 | } | ||
372 | - qemu_mutex_unlock(&p->mutex); | ||
373 | trace_multifd_recv_sync_main_signal(p->id); | ||
374 | qemu_sem_post(&p->sem_sync); | ||
375 | } | ||
376 | diff --git a/migration/ram.c b/migration/ram.c | ||
377 | index XXXXXXX..XXXXXXX 100644 | ||
378 | --- a/migration/ram.c | ||
379 | +++ b/migration/ram.c | ||
380 | @@ -XXX,XX +XXX,XX @@ static RAMBlock *unqueue_page(RAMState *rs, ram_addr_t *offset) | ||
381 | return NULL; | ||
382 | } | ||
383 | |||
384 | - qemu_mutex_lock(&rs->src_page_req_mutex); | ||
385 | + QEMU_LOCK_GUARD(&rs->src_page_req_mutex); | ||
386 | if (!QSIMPLEQ_EMPTY(&rs->src_page_requests)) { | ||
387 | struct RAMSrcPageRequest *entry = | ||
388 | QSIMPLEQ_FIRST(&rs->src_page_requests); | ||
389 | @@ -XXX,XX +XXX,XX @@ static RAMBlock *unqueue_page(RAMState *rs, ram_addr_t *offset) | ||
390 | migration_consume_urgent_request(); | ||
391 | } | ||
392 | } | ||
393 | - qemu_mutex_unlock(&rs->src_page_req_mutex); | ||
394 | |||
395 | return block; | ||
396 | } | ||
397 | diff --git a/monitor/misc.c b/monitor/misc.c | ||
398 | index XXXXXXX..XXXXXXX 100644 | ||
399 | --- a/monitor/misc.c | ||
400 | +++ b/monitor/misc.c | ||
401 | @@ -XXX,XX +XXX,XX @@ AddfdInfo *monitor_fdset_add_fd(int fd, bool has_fdset_id, int64_t fdset_id, | ||
402 | MonFdsetFd *mon_fdset_fd; | ||
403 | AddfdInfo *fdinfo; | ||
404 | |||
405 | - qemu_mutex_lock(&mon_fdsets_lock); | ||
406 | + QEMU_LOCK_GUARD(&mon_fdsets_lock); | ||
407 | if (has_fdset_id) { | ||
408 | QLIST_FOREACH(mon_fdset, &mon_fdsets, next) { | ||
409 | /* Break if match found or match impossible due to ordering by ID */ | ||
410 | @@ -XXX,XX +XXX,XX @@ AddfdInfo *monitor_fdset_add_fd(int fd, bool has_fdset_id, int64_t fdset_id, | ||
411 | if (fdset_id < 0) { | ||
412 | error_setg(errp, QERR_INVALID_PARAMETER_VALUE, "fdset-id", | ||
413 | "a non-negative value"); | ||
414 | - qemu_mutex_unlock(&mon_fdsets_lock); | ||
415 | return NULL; | ||
416 | } | ||
417 | /* Use specified fdset ID */ | ||
418 | @@ -XXX,XX +XXX,XX @@ AddfdInfo *monitor_fdset_add_fd(int fd, bool has_fdset_id, int64_t fdset_id, | ||
419 | fdinfo->fdset_id = mon_fdset->id; | ||
420 | fdinfo->fd = mon_fdset_fd->fd; | ||
421 | |||
422 | - qemu_mutex_unlock(&mon_fdsets_lock); | ||
423 | return fdinfo; | ||
424 | } | ||
425 | |||
426 | diff --git a/ui/spice-display.c b/ui/spice-display.c | ||
427 | index XXXXXXX..XXXXXXX 100644 | ||
428 | --- a/ui/spice-display.c | ||
429 | +++ b/ui/spice-display.c | ||
430 | @@ -XXX,XX +XXX,XX @@ | ||
431 | #include "qemu/osdep.h" | ||
432 | #include "ui/qemu-spice.h" | ||
433 | #include "qemu/timer.h" | ||
434 | +#include "qemu/lockable.h" | ||
435 | #include "qemu/main-loop.h" | ||
436 | #include "qemu/option.h" | ||
437 | #include "qemu/queue.h" | ||
438 | @@ -XXX,XX +XXX,XX @@ void qemu_spice_display_refresh(SimpleSpiceDisplay *ssd) | ||
439 | { | ||
440 | graphic_hw_update(ssd->dcl.con); | ||
441 | |||
442 | - qemu_mutex_lock(&ssd->lock); | ||
443 | - if (QTAILQ_EMPTY(&ssd->updates) && ssd->ds) { | ||
444 | - qemu_spice_create_update(ssd); | ||
445 | - ssd->notify++; | ||
446 | + WITH_QEMU_LOCK_GUARD(&ssd->lock) { | ||
447 | + if (QTAILQ_EMPTY(&ssd->updates) && ssd->ds) { | ||
448 | + qemu_spice_create_update(ssd); | ||
449 | + ssd->notify++; | ||
450 | + } | ||
451 | } | ||
452 | - qemu_mutex_unlock(&ssd->lock); | ||
453 | |||
454 | trace_qemu_spice_display_refresh(ssd->qxl.id, ssd->notify); | ||
455 | if (ssd->notify) { | ||
456 | @@ -XXX,XX +XXX,XX @@ static int interface_get_cursor_command(QXLInstance *sin, QXLCommandExt *ext) | ||
457 | SimpleSpiceDisplay *ssd = container_of(sin, SimpleSpiceDisplay, qxl); | ||
458 | int ret; | ||
459 | |||
460 | - qemu_mutex_lock(&ssd->lock); | ||
461 | + QEMU_LOCK_GUARD(&ssd->lock); | ||
462 | if (ssd->ptr_define) { | ||
463 | *ext = ssd->ptr_define->ext; | ||
464 | ssd->ptr_define = NULL; | ||
465 | @@ -XXX,XX +XXX,XX @@ static int interface_get_cursor_command(QXLInstance *sin, QXLCommandExt *ext) | ||
466 | } else { | ||
467 | ret = false; | ||
468 | } | ||
469 | - qemu_mutex_unlock(&ssd->lock); | ||
470 | return ret; | ||
471 | } | ||
472 | |||
473 | diff --git a/util/log.c b/util/log.c | ||
474 | index XXXXXXX..XXXXXXX 100644 | ||
475 | --- a/util/log.c | ||
476 | +++ b/util/log.c | ||
477 | @@ -XXX,XX +XXX,XX @@ | ||
478 | #include "qemu/cutils.h" | ||
479 | #include "trace/control.h" | ||
480 | #include "qemu/thread.h" | ||
481 | +#include "qemu/lockable.h" | ||
482 | |||
483 | static char *logfilename; | ||
484 | static QemuMutex qemu_logfile_mutex; | ||
485 | @@ -XXX,XX +XXX,XX @@ void qemu_set_log(int log_flags) | ||
486 | if (qemu_loglevel && (!is_daemonized() || logfilename)) { | ||
487 | need_to_open_file = true; | ||
488 | } | ||
489 | - qemu_mutex_lock(&qemu_logfile_mutex); | ||
490 | + QEMU_LOCK_GUARD(&qemu_logfile_mutex); | ||
491 | if (qemu_logfile && !need_to_open_file) { | ||
492 | logfile = qemu_logfile; | ||
493 | atomic_rcu_set(&qemu_logfile, NULL); | ||
494 | @@ -XXX,XX +XXX,XX @@ void qemu_set_log(int log_flags) | ||
495 | } | ||
496 | atomic_rcu_set(&qemu_logfile, logfile); | ||
497 | } | ||
498 | - qemu_mutex_unlock(&qemu_logfile_mutex); | ||
499 | } | ||
500 | |||
501 | void qemu_log_needs_buffers(void) | ||
502 | diff --git a/util/qemu-timer.c b/util/qemu-timer.c | ||
503 | index XXXXXXX..XXXXXXX 100644 | ||
504 | --- a/util/qemu-timer.c | ||
505 | +++ b/util/qemu-timer.c | ||
506 | @@ -XXX,XX +XXX,XX @@ void timer_mod_anticipate_ns(QEMUTimer *ts, int64_t expire_time) | ||
507 | QEMUTimerList *timer_list = ts->timer_list; | ||
508 | bool rearm; | ||
509 | |||
510 | - qemu_mutex_lock(&timer_list->active_timers_lock); | ||
511 | - if (ts->expire_time == -1 || ts->expire_time > expire_time) { | ||
512 | - if (ts->expire_time != -1) { | ||
513 | - timer_del_locked(timer_list, ts); | ||
514 | + WITH_QEMU_LOCK_GUARD(&timer_list->active_timers_lock) { | ||
515 | + if (ts->expire_time == -1 || ts->expire_time > expire_time) { | ||
516 | + if (ts->expire_time != -1) { | ||
517 | + timer_del_locked(timer_list, ts); | ||
518 | + } | ||
519 | + rearm = timer_mod_ns_locked(timer_list, ts, expire_time); | ||
520 | + } else { | ||
521 | + rearm = false; | ||
522 | } | ||
523 | - rearm = timer_mod_ns_locked(timer_list, ts, expire_time); | ||
524 | - } else { | ||
525 | - rearm = false; | ||
526 | } | ||
527 | - qemu_mutex_unlock(&timer_list->active_timers_lock); | ||
528 | - | ||
529 | if (rearm) { | ||
530 | timerlist_rearm(timer_list); | ||
531 | } | ||
532 | diff --git a/util/rcu.c b/util/rcu.c | ||
533 | index XXXXXXX..XXXXXXX 100644 | ||
534 | --- a/util/rcu.c | ||
535 | +++ b/util/rcu.c | ||
536 | @@ -XXX,XX +XXX,XX @@ | ||
537 | #include "qemu/atomic.h" | ||
538 | #include "qemu/thread.h" | ||
539 | #include "qemu/main-loop.h" | ||
540 | +#include "qemu/lockable.h" | ||
541 | #if defined(CONFIG_MALLOC_TRIM) | ||
542 | #include <malloc.h> | ||
543 | #endif | ||
544 | @@ -XXX,XX +XXX,XX @@ static void wait_for_readers(void) | ||
545 | |||
546 | void synchronize_rcu(void) | ||
547 | { | ||
548 | - qemu_mutex_lock(&rcu_sync_lock); | ||
549 | + QEMU_LOCK_GUARD(&rcu_sync_lock); | ||
550 | |||
551 | /* Write RCU-protected pointers before reading p_rcu_reader->ctr. | ||
552 | * Pairs with smp_mb_placeholder() in rcu_read_lock(). | ||
553 | */ | ||
554 | smp_mb_global(); | ||
555 | |||
556 | - qemu_mutex_lock(&rcu_registry_lock); | ||
557 | + QEMU_LOCK_GUARD(&rcu_registry_lock); | ||
558 | if (!QLIST_EMPTY(®istry)) { | ||
559 | /* In either case, the atomic_mb_set below blocks stores that free | ||
560 | * old RCU-protected pointers. | ||
561 | @@ -XXX,XX +XXX,XX @@ void synchronize_rcu(void) | ||
562 | |||
563 | wait_for_readers(); | ||
564 | } | ||
565 | - | ||
566 | - qemu_mutex_unlock(&rcu_registry_lock); | ||
567 | - qemu_mutex_unlock(&rcu_sync_lock); | ||
568 | } | ||
569 | |||
570 | |||
571 | diff --git a/util/thread-pool.c b/util/thread-pool.c | ||
572 | index XXXXXXX..XXXXXXX 100644 | ||
573 | --- a/util/thread-pool.c | ||
574 | +++ b/util/thread-pool.c | ||
575 | @@ -XXX,XX +XXX,XX @@ static void thread_pool_cancel(BlockAIOCB *acb) | ||
576 | |||
577 | trace_thread_pool_cancel(elem, elem->common.opaque); | ||
578 | |||
579 | - qemu_mutex_lock(&pool->lock); | ||
580 | + QEMU_LOCK_GUARD(&pool->lock); | ||
581 | if (elem->state == THREAD_QUEUED && | ||
582 | /* No thread has yet started working on elem. we can try to "steal" | ||
583 | * the item from the worker if we can get a signal from the | ||
584 | @@ -XXX,XX +XXX,XX @@ static void thread_pool_cancel(BlockAIOCB *acb) | ||
585 | elem->ret = -ECANCELED; | ||
586 | } | ||
587 | |||
588 | - qemu_mutex_unlock(&pool->lock); | ||
589 | } | ||
590 | |||
591 | static AioContext *thread_pool_get_aio_context(BlockAIOCB *acb) | ||
592 | diff --git a/util/vfio-helpers.c b/util/vfio-helpers.c | ||
593 | index XXXXXXX..XXXXXXX 100644 | ||
594 | --- a/util/vfio-helpers.c | ||
595 | +++ b/util/vfio-helpers.c | ||
596 | @@ -XXX,XX +XXX,XX @@ | ||
597 | #include "standard-headers/linux/pci_regs.h" | ||
598 | #include "qemu/event_notifier.h" | ||
599 | #include "qemu/vfio-helpers.h" | ||
600 | +#include "qemu/lockable.h" | ||
601 | #include "trace.h" | ||
602 | |||
603 | #define QEMU_VFIO_DEBUG 0 | ||
604 | @@ -XXX,XX +XXX,XX @@ int qemu_vfio_dma_reset_temporary(QEMUVFIOState *s) | ||
605 | .size = QEMU_VFIO_IOVA_MAX - s->high_water_mark, | ||
606 | }; | ||
607 | trace_qemu_vfio_dma_reset_temporary(s); | ||
608 | - qemu_mutex_lock(&s->lock); | ||
609 | + QEMU_LOCK_GUARD(&s->lock); | ||
610 | if (ioctl(s->container, VFIO_IOMMU_UNMAP_DMA, &unmap)) { | ||
611 | error_report("VFIO_UNMAP_DMA failed: %s", strerror(errno)); | ||
612 | - qemu_mutex_unlock(&s->lock); | ||
613 | return -errno; | ||
614 | } | ||
615 | s->high_water_mark = QEMU_VFIO_IOVA_MAX; | ||
616 | - qemu_mutex_unlock(&s->lock); | ||
617 | return 0; | ||
618 | } | ||
619 | |||
620 | -- | ||
621 | 2.25.3 | ||
17 | 622 | ||
18 | diff --git a/block/sheepdog.c b/block/sheepdog.c | ||
19 | index XXXXXXX..XXXXXXX 100644 | ||
20 | --- a/block/sheepdog.c | ||
21 | +++ b/block/sheepdog.c | ||
22 | @@ -XXX,XX +XXX,XX @@ static int sd_snapshot_list(BlockDriverState *bs, QEMUSnapshotInfo **psn_tab) | ||
23 | QEMUSnapshotInfo *sn_tab = NULL; | ||
24 | unsigned wlen, rlen; | ||
25 | int found = 0; | ||
26 | - static SheepdogInode inode; | ||
27 | + SheepdogInode *inode; | ||
28 | unsigned long *vdi_inuse; | ||
29 | unsigned int start_nr; | ||
30 | uint64_t hval; | ||
31 | uint32_t vid; | ||
32 | |||
33 | vdi_inuse = g_malloc(max); | ||
34 | + inode = g_malloc(SD_INODE_HEADER_SIZE); | ||
35 | |||
36 | fd = connect_to_sdog(s, &local_err); | ||
37 | if (fd < 0) { | ||
38 | @@ -XXX,XX +XXX,XX @@ static int sd_snapshot_list(BlockDriverState *bs, QEMUSnapshotInfo **psn_tab) | ||
39 | } | ||
40 | |||
41 | /* we don't need to read entire object */ | ||
42 | - ret = read_object(fd, s->bs, (char *)&inode, | ||
43 | + ret = read_object(fd, s->bs, (char *)inode, | ||
44 | vid_to_vdi_oid(vid), | ||
45 | 0, SD_INODE_HEADER_SIZE, 0, | ||
46 | s->cache_flags); | ||
47 | @@ -XXX,XX +XXX,XX @@ static int sd_snapshot_list(BlockDriverState *bs, QEMUSnapshotInfo **psn_tab) | ||
48 | continue; | ||
49 | } | ||
50 | |||
51 | - if (!strcmp(inode.name, s->name) && is_snapshot(&inode)) { | ||
52 | - sn_tab[found].date_sec = inode.snap_ctime >> 32; | ||
53 | - sn_tab[found].date_nsec = inode.snap_ctime & 0xffffffff; | ||
54 | - sn_tab[found].vm_state_size = inode.vm_state_size; | ||
55 | - sn_tab[found].vm_clock_nsec = inode.vm_clock_nsec; | ||
56 | + if (!strcmp(inode->name, s->name) && is_snapshot(inode)) { | ||
57 | + sn_tab[found].date_sec = inode->snap_ctime >> 32; | ||
58 | + sn_tab[found].date_nsec = inode->snap_ctime & 0xffffffff; | ||
59 | + sn_tab[found].vm_state_size = inode->vm_state_size; | ||
60 | + sn_tab[found].vm_clock_nsec = inode->vm_clock_nsec; | ||
61 | |||
62 | snprintf(sn_tab[found].id_str, sizeof(sn_tab[found].id_str), | ||
63 | - "%" PRIu32, inode.snap_id); | ||
64 | + "%" PRIu32, inode->snap_id); | ||
65 | pstrcpy(sn_tab[found].name, | ||
66 | - MIN(sizeof(sn_tab[found].name), sizeof(inode.tag)), | ||
67 | - inode.tag); | ||
68 | + MIN(sizeof(sn_tab[found].name), sizeof(inode->tag)), | ||
69 | + inode->tag); | ||
70 | found++; | ||
71 | } | ||
72 | } | ||
73 | @@ -XXX,XX +XXX,XX @@ out: | ||
74 | *psn_tab = sn_tab; | ||
75 | |||
76 | g_free(vdi_inuse); | ||
77 | + g_free(inode); | ||
78 | |||
79 | if (ret < 0) { | ||
80 | return ret; | ||
81 | -- | ||
82 | 2.13.6 | ||
83 | |||
84 | diff view generated by jsdifflib |
1 | From: Paolo Bonzini <pbonzini@redhat.com> | 1 | From: Simran Singhal <singhalsimran0@gmail.com> |
---|---|---|---|
2 | 2 | ||
3 | The expression "SD_INODE_SIZE - sizeof(inode.data_vdi_id)" already has a macro | 3 | Replace manual lock()/unlock() calls with lock guard macros |
4 | defined for the same value (though with a nicer definition using offsetof). | 4 | (QEMU_LOCK_GUARD/WITH_QEMU_LOCK_GUARD). |
5 | Replace it. | ||
6 | 5 | ||
7 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 6 | Signed-off-by: Simran Singhal <singhalsimran0@gmail.com> |
8 | Reviewed-by: Fam Zheng <famz@redhat.com> | 7 | Reviewed-by: Yuval Shaia <yuval.shaia.ml@gmail.com> |
9 | Reviewed-by: Jeff Cody <jcody@redhat.com> | 8 | Reviewed-by: Marcel Apfelbaum<marcel.apfelbaum@gmail.com> |
10 | Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> | 9 | Tested-by: Yuval Shaia <yuval.shaia.ml@gmail.com> |
11 | Message-Id: <20180523160721.14018-2-pbonzini@redhat.com> | 10 | Message-id: 20200402065035.GA15477@simran-Inspiron-5558 |
12 | Signed-off-by: Jeff Cody <jcody@redhat.com> | 11 | Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> |
13 | --- | 12 | --- |
14 | block/sheepdog.c | 6 +++--- | 13 | hw/hyperv/hyperv.c | 15 ++++++------- |
15 | 1 file changed, 3 insertions(+), 3 deletions(-) | 14 | hw/rdma/rdma_backend.c | 50 +++++++++++++++++++++--------------------- |
15 | hw/rdma/rdma_rm.c | 3 +-- | ||
16 | 3 files changed, 33 insertions(+), 35 deletions(-) | ||
16 | 17 | ||
17 | diff --git a/block/sheepdog.c b/block/sheepdog.c | 18 | diff --git a/hw/hyperv/hyperv.c b/hw/hyperv/hyperv.c |
18 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/block/sheepdog.c | 20 | --- a/hw/hyperv/hyperv.c |
20 | +++ b/block/sheepdog.c | 21 | +++ b/hw/hyperv/hyperv.c |
21 | @@ -XXX,XX +XXX,XX @@ static int sd_truncate(BlockDriverState *bs, int64_t offset, | 22 | @@ -XXX,XX +XXX,XX @@ |
23 | #include "sysemu/kvm.h" | ||
24 | #include "qemu/bitops.h" | ||
25 | #include "qemu/error-report.h" | ||
26 | +#include "qemu/lockable.h" | ||
27 | #include "qemu/queue.h" | ||
28 | #include "qemu/rcu.h" | ||
29 | #include "qemu/rcu_queue.h" | ||
30 | @@ -XXX,XX +XXX,XX @@ int hyperv_set_msg_handler(uint32_t conn_id, HvMsgHandler handler, void *data) | ||
31 | int ret; | ||
32 | MsgHandler *mh; | ||
33 | |||
34 | - qemu_mutex_lock(&handlers_mutex); | ||
35 | + QEMU_LOCK_GUARD(&handlers_mutex); | ||
36 | QLIST_FOREACH(mh, &msg_handlers, link) { | ||
37 | if (mh->conn_id == conn_id) { | ||
38 | if (handler) { | ||
39 | @@ -XXX,XX +XXX,XX @@ int hyperv_set_msg_handler(uint32_t conn_id, HvMsgHandler handler, void *data) | ||
40 | g_free_rcu(mh, rcu); | ||
41 | ret = 0; | ||
42 | } | ||
43 | - goto unlock; | ||
44 | + return ret; | ||
45 | } | ||
22 | } | 46 | } |
23 | 47 | ||
24 | /* we don't need to update entire object */ | 48 | @@ -XXX,XX +XXX,XX @@ int hyperv_set_msg_handler(uint32_t conn_id, HvMsgHandler handler, void *data) |
25 | - datalen = SD_INODE_SIZE - sizeof(s->inode.data_vdi_id); | 49 | } else { |
26 | + datalen = SD_INODE_HEADER_SIZE; | 50 | ret = -ENOENT; |
27 | s->inode.vdi_size = offset; | 51 | } |
28 | ret = write_object(fd, s->bs, (char *)&s->inode, | 52 | -unlock: |
29 | vid_to_vdi_oid(s->inode.vdi_id), s->inode.nr_copies, | 53 | - qemu_mutex_unlock(&handlers_mutex); |
30 | @@ -XXX,XX +XXX,XX @@ static int sd_snapshot_create(BlockDriverState *bs, QEMUSnapshotInfo *sn_info) | 54 | + |
31 | */ | 55 | return ret; |
32 | strncpy(s->inode.tag, sn_info->name, sizeof(s->inode.tag)); | 56 | } |
33 | /* we don't need to update entire object */ | 57 | |
34 | - datalen = SD_INODE_SIZE - sizeof(s->inode.data_vdi_id); | 58 | @@ -XXX,XX +XXX,XX @@ static int set_event_flag_handler(uint32_t conn_id, EventNotifier *notifier) |
35 | + datalen = SD_INODE_HEADER_SIZE; | 59 | int ret; |
36 | inode = g_malloc(datalen); | 60 | EventFlagHandler *handler; |
37 | 61 | ||
38 | /* refresh inode. */ | 62 | - qemu_mutex_lock(&handlers_mutex); |
39 | @@ -XXX,XX +XXX,XX @@ static int sd_snapshot_list(BlockDriverState *bs, QEMUSnapshotInfo **psn_tab) | 63 | + QEMU_LOCK_GUARD(&handlers_mutex); |
40 | /* we don't need to read entire object */ | 64 | QLIST_FOREACH(handler, &event_flag_handlers, link) { |
41 | ret = read_object(fd, s->bs, (char *)&inode, | 65 | if (handler->conn_id == conn_id) { |
42 | vid_to_vdi_oid(vid), | 66 | if (notifier) { |
43 | - 0, SD_INODE_SIZE - sizeof(inode.data_vdi_id), 0, | 67 | @@ -XXX,XX +XXX,XX @@ static int set_event_flag_handler(uint32_t conn_id, EventNotifier *notifier) |
44 | + 0, SD_INODE_HEADER_SIZE, 0, | 68 | g_free_rcu(handler, rcu); |
45 | s->cache_flags); | 69 | ret = 0; |
46 | 70 | } | |
47 | if (ret) { | 71 | - goto unlock; |
72 | + return ret; | ||
73 | } | ||
74 | } | ||
75 | |||
76 | @@ -XXX,XX +XXX,XX @@ static int set_event_flag_handler(uint32_t conn_id, EventNotifier *notifier) | ||
77 | } else { | ||
78 | ret = -ENOENT; | ||
79 | } | ||
80 | -unlock: | ||
81 | - qemu_mutex_unlock(&handlers_mutex); | ||
82 | + | ||
83 | return ret; | ||
84 | } | ||
85 | |||
86 | diff --git a/hw/rdma/rdma_backend.c b/hw/rdma/rdma_backend.c | ||
87 | index XXXXXXX..XXXXXXX 100644 | ||
88 | --- a/hw/rdma/rdma_backend.c | ||
89 | +++ b/hw/rdma/rdma_backend.c | ||
90 | @@ -XXX,XX +XXX,XX @@ static int rdma_poll_cq(RdmaDeviceResources *rdma_dev_res, struct ibv_cq *ibcq) | ||
91 | struct ibv_wc wc[2]; | ||
92 | RdmaProtectedGSList *cqe_ctx_list; | ||
93 | |||
94 | - qemu_mutex_lock(&rdma_dev_res->lock); | ||
95 | - do { | ||
96 | - ne = ibv_poll_cq(ibcq, ARRAY_SIZE(wc), wc); | ||
97 | + WITH_QEMU_LOCK_GUARD(&rdma_dev_res->lock) { | ||
98 | + do { | ||
99 | + ne = ibv_poll_cq(ibcq, ARRAY_SIZE(wc), wc); | ||
100 | |||
101 | - trace_rdma_poll_cq(ne, ibcq); | ||
102 | + trace_rdma_poll_cq(ne, ibcq); | ||
103 | |||
104 | - for (i = 0; i < ne; i++) { | ||
105 | - bctx = rdma_rm_get_cqe_ctx(rdma_dev_res, wc[i].wr_id); | ||
106 | - if (unlikely(!bctx)) { | ||
107 | - rdma_error_report("No matching ctx for req %"PRId64, | ||
108 | - wc[i].wr_id); | ||
109 | - continue; | ||
110 | - } | ||
111 | + for (i = 0; i < ne; i++) { | ||
112 | + bctx = rdma_rm_get_cqe_ctx(rdma_dev_res, wc[i].wr_id); | ||
113 | + if (unlikely(!bctx)) { | ||
114 | + rdma_error_report("No matching ctx for req %"PRId64, | ||
115 | + wc[i].wr_id); | ||
116 | + continue; | ||
117 | + } | ||
118 | |||
119 | - comp_handler(bctx->up_ctx, &wc[i]); | ||
120 | + comp_handler(bctx->up_ctx, &wc[i]); | ||
121 | |||
122 | - if (bctx->backend_qp) { | ||
123 | - cqe_ctx_list = &bctx->backend_qp->cqe_ctx_list; | ||
124 | - } else { | ||
125 | - cqe_ctx_list = &bctx->backend_srq->cqe_ctx_list; | ||
126 | - } | ||
127 | + if (bctx->backend_qp) { | ||
128 | + cqe_ctx_list = &bctx->backend_qp->cqe_ctx_list; | ||
129 | + } else { | ||
130 | + cqe_ctx_list = &bctx->backend_srq->cqe_ctx_list; | ||
131 | + } | ||
132 | |||
133 | - rdma_protected_gslist_remove_int32(cqe_ctx_list, wc[i].wr_id); | ||
134 | - rdma_rm_dealloc_cqe_ctx(rdma_dev_res, wc[i].wr_id); | ||
135 | - g_free(bctx); | ||
136 | - } | ||
137 | - total_ne += ne; | ||
138 | - } while (ne > 0); | ||
139 | - atomic_sub(&rdma_dev_res->stats.missing_cqe, total_ne); | ||
140 | - qemu_mutex_unlock(&rdma_dev_res->lock); | ||
141 | + rdma_protected_gslist_remove_int32(cqe_ctx_list, wc[i].wr_id); | ||
142 | + rdma_rm_dealloc_cqe_ctx(rdma_dev_res, wc[i].wr_id); | ||
143 | + g_free(bctx); | ||
144 | + } | ||
145 | + total_ne += ne; | ||
146 | + } while (ne > 0); | ||
147 | + atomic_sub(&rdma_dev_res->stats.missing_cqe, total_ne); | ||
148 | + } | ||
149 | |||
150 | if (ne < 0) { | ||
151 | rdma_error_report("ibv_poll_cq fail, rc=%d, errno=%d", ne, errno); | ||
152 | diff --git a/hw/rdma/rdma_rm.c b/hw/rdma/rdma_rm.c | ||
153 | index XXXXXXX..XXXXXXX 100644 | ||
154 | --- a/hw/rdma/rdma_rm.c | ||
155 | +++ b/hw/rdma/rdma_rm.c | ||
156 | @@ -XXX,XX +XXX,XX @@ static inline void rdma_res_tbl_dealloc(RdmaRmResTbl *tbl, uint32_t handle) | ||
157 | { | ||
158 | trace_rdma_res_tbl_dealloc(tbl->name, handle); | ||
159 | |||
160 | - qemu_mutex_lock(&tbl->lock); | ||
161 | + QEMU_LOCK_GUARD(&tbl->lock); | ||
162 | |||
163 | if (handle < tbl->tbl_sz) { | ||
164 | clear_bit(handle, tbl->bitmap); | ||
165 | tbl->used--; | ||
166 | } | ||
167 | |||
168 | - qemu_mutex_unlock(&tbl->lock); | ||
169 | } | ||
170 | |||
171 | int rdma_rm_alloc_pd(RdmaDeviceResources *dev_res, RdmaBackendDev *backend_dev, | ||
48 | -- | 172 | -- |
49 | 2.13.6 | 173 | 2.25.3 |
50 | 174 | ||
51 | diff view generated by jsdifflib |