From nobody Sat Feb 7 18:21:03 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=quarantine dis=none) header.from=crudebyte.com ARC-Seal: i=1; a=rsa-sha256; t=1644498806; cv=none; d=zohomail.com; s=zohoarc; b=QJBcXksUHXaZF3sO0RqiaGyeis+HcSgtZd0Y3q/mbFLepIr3q0Vn5yYaVhfy8+hY55IgXtarXEU3R5uYg1Wfjj2NgevyZnTvKbCSpGYdsJubwBi5+idOYMdhGAOumgxoj6a0QlMUkdgf1G/Hx95QsBDuNYN6GfrmibaXvF03bJo= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1644498806; h=Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:Message-ID:References:Sender:Subject:To; bh=2f/auedyRN5PsjHfuc6bSpPOyeYNidRH6eop1nQv5J8=; b=ngQmqTZYw9CwcNb8iOgnHZ91vs5ZMUIzNL4gDRk6jKoiu3QkzfLL3zRU0EbsbtCddXmSNzJ9YrfPV1uBFuBISJxT3yJB5KCKycCaRC0SwW5OEwRQ2XHD7U+k2I8rojEs8C3wRz/R0W0giQdwjzVj75WTJ9nD1yX115cVB072RHg= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1644498806890688.5600606127741; Thu, 10 Feb 2022 05:13:26 -0800 (PST) Received: from localhost ([::1]:36092 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1nI9GH-0005ti-MB for importer@patchew.org; Thu, 10 Feb 2022 08:13:25 -0500 Received: from eggs.gnu.org ([209.51.188.92]:52938) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <6d31f5fc56eed4bca8745215ca726c6b74b374ff@lizzy.crudebyte.com>) id 1nI8Iz-0001iD-Ob for qemu-devel@nongnu.org; Thu, 10 Feb 2022 07:12:09 -0500 Received: from lizzy.crudebyte.com ([91.194.90.13]:56677) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <6d31f5fc56eed4bca8745215ca726c6b74b374ff@lizzy.crudebyte.com>) id 1nI8Iu-0007ac-Tp for qemu-devel@nongnu.org; Thu, 10 Feb 2022 07:12:09 -0500 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=crudebyte.com; s=lizzy; h=Cc:To:Subject:Date:From:References:In-Reply-To: Message-Id:Content-Type:Content-Transfer-Encoding:MIME-Version:Content-ID: Content-Description; bh=2f/auedyRN5PsjHfuc6bSpPOyeYNidRH6eop1nQv5J8=; b=d8z7X qZ91HKo05ItmX2ij66/OMAk1jY3WtP0ba+N90DKIXIobWlWpEVPjJ0+N4AVt15mVdcXqkZUVIlB0X V0r+ykYE7I6/U55T9yeJ8vgrmlzsxV7tc+XJubF4wlt+1HMTw6xBvuYmWSo/UN4Qy0jVy/WBi1tI5 fBZrejgAjjI/BX9k532alu5Vt9SFpAqsqQK/h69BVJSOB0siRa9SqGcHhaI9HkXZKIE/YpJUSBlgU ZajWuPJdHrD/o/MQqvyrimckoGF/4qWyaPJXzudBvXQj0KPqSeYRWoVDBT852h+1Vyr8vpaaq123L ekcetz/ycbBhhngAwonWIeIDi4YeA==; Message-Id: <6d31f5fc56eed4bca8745215ca726c6b74b374ff.1644492115.git.qemu_oss@crudebyte.com> In-Reply-To: References: From: Christian Schoenebeck Date: Thu, 10 Feb 2022 12:21:55 +0100 Subject: [PULL 1/5] tests/9pfs: use g_autofree where possible To: qemu-devel@nongnu.org, Peter Maydell Cc: Greg Kurz Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: none client-ip=91.194.90.13; envelope-from=6d31f5fc56eed4bca8745215ca726c6b74b374ff@lizzy.crudebyte.com; helo=lizzy.crudebyte.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: pass (identity @crudebyte.com) X-ZM-MESSAGEID: 1644498809070100001 Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Signed-off-by: Christian Schoenebeck Reviewed-by: Greg Kurz Message-Id: --- tests/qtest/virtio-9p-test.c | 90 +++++++++++------------------------- 1 file changed, 27 insertions(+), 63 deletions(-) diff --git a/tests/qtest/virtio-9p-test.c b/tests/qtest/virtio-9p-test.c index 41fed41de1..502e5ad0c7 100644 --- a/tests/qtest/virtio-9p-test.c +++ b/tests/qtest/virtio-9p-test.c @@ -84,7 +84,7 @@ static void pci_config(void *obj, void *data, QGuestAlloc= ator *t_alloc) QVirtio9P *v9p =3D obj; alloc =3D t_alloc; size_t tag_len =3D qvirtio_config_readw(v9p->vdev, 0); - char *tag; + g_autofree char *tag =3D NULL; int i; =20 g_assert_cmpint(tag_len, =3D=3D, strlen(MOUNT_TAG)); @@ -94,7 +94,6 @@ static void pci_config(void *obj, void *data, QGuestAlloc= ator *t_alloc) tag[i] =3D qvirtio_config_readb(v9p->vdev, i + 2); } g_assert_cmpmem(tag, tag_len, MOUNT_TAG, tag_len); - g_free(tag); } =20 #define P9_MAX_SIZE 4096 /* Max size of a T-message or R-message */ @@ -580,7 +579,7 @@ static void do_version(QVirtio9P *v9p) { const char *version =3D "9P2000.L"; uint16_t server_len; - char *server_version; + g_autofree char *server_version =3D NULL; P9Req *req; =20 req =3D v9fs_tversion(v9p, P9_MAX_SIZE, version, P9_NOTAG); @@ -588,8 +587,6 @@ static void do_version(QVirtio9P *v9p) v9fs_rversion(req, &server_len, &server_version); =20 g_assert_cmpmem(server_version, server_len, version, strlen(version)); - - g_free(server_version); } =20 /* utility function: walk to requested dir and return fid for that dir */ @@ -637,7 +634,7 @@ static void fs_walk(void *obj, void *data, QGuestAlloca= tor *t_alloc) alloc =3D t_alloc; char *wnames[P9_MAXWELEM]; uint16_t nwqid; - v9fs_qid *wqid; + g_autofree v9fs_qid *wqid =3D NULL; int i; P9Req *req; =20 @@ -655,8 +652,6 @@ static void fs_walk(void *obj, void *data, QGuestAlloca= tor *t_alloc) for (i =3D 0; i < P9_MAXWELEM; i++) { g_free(wnames[i]); } - - g_free(wqid); } =20 static bool fs_dirents_contain_name(struct V9fsDirent *e, const char* name) @@ -872,9 +867,9 @@ static void fs_readdir(void *obj, void *data, QGuestAll= ocator *t_alloc) g_assert_cmpint(fs_dirents_contain_name(entries, "."), =3D=3D, true); g_assert_cmpint(fs_dirents_contain_name(entries, ".."), =3D=3D, true); for (int i =3D 0; i < QTEST_V9FS_SYNTH_READDIR_NFILES; ++i) { - char *name =3D g_strdup_printf(QTEST_V9FS_SYNTH_READDIR_FILE, i); + g_autofree char *name =3D + g_strdup_printf(QTEST_V9FS_SYNTH_READDIR_FILE, i); g_assert_cmpint(fs_dirents_contain_name(entries, name), =3D=3D, tr= ue); - g_free(name); } =20 v9fs_free_dirents(entries); @@ -984,7 +979,8 @@ static void fs_walk_dotdot(void *obj, void *data, QGues= tAllocator *t_alloc) QVirtio9P *v9p =3D obj; alloc =3D t_alloc; char *const wnames[] =3D { g_strdup("..") }; - v9fs_qid root_qid, *wqid; + v9fs_qid root_qid; + g_autofree v9fs_qid *wqid =3D NULL; P9Req *req; =20 do_version(v9p); @@ -998,7 +994,6 @@ static void fs_walk_dotdot(void *obj, void *data, QGues= tAllocator *t_alloc) =20 g_assert_cmpmem(&root_qid, 13, wqid[0], 13); =20 - g_free(wqid); g_free(wnames[0]); } =20 @@ -1027,7 +1022,7 @@ static void fs_write(void *obj, void *data, QGuestAll= ocator *t_alloc) alloc =3D t_alloc; static const uint32_t write_count =3D P9_MAX_SIZE / 2; char *const wnames[] =3D { g_strdup(QTEST_V9FS_SYNTH_WRITE_FILE) }; - char *buf =3D g_malloc0(write_count); + g_autofree char *buf =3D g_malloc0(write_count); uint32_t count; P9Req *req; =20 @@ -1045,7 +1040,6 @@ static void fs_write(void *obj, void *data, QGuestAll= ocator *t_alloc) v9fs_rwrite(req, &count); g_assert_cmpint(count, =3D=3D, write_count); =20 - g_free(buf); g_free(wnames[0]); } =20 @@ -1125,7 +1119,7 @@ static void fs_flush_ignored(void *obj, void *data, Q= GuestAllocator *t_alloc) =20 static void do_mkdir(QVirtio9P *v9p, const char *path, const char *cname) { - char *const name =3D g_strdup(cname); + g_autofree char *name =3D g_strdup(cname); uint32_t fid; P9Req *req; =20 @@ -1134,15 +1128,13 @@ static void do_mkdir(QVirtio9P *v9p, const char *pa= th, const char *cname) req =3D v9fs_tmkdir(v9p, fid, name, 0750, 0, 0); v9fs_req_wait_for_reply(req, NULL); v9fs_rmkdir(req, NULL); - - g_free(name); } =20 /* create a regular file with Tlcreate and return file's fid */ static uint32_t do_lcreate(QVirtio9P *v9p, const char *path, const char *cname) { - char *const name =3D g_strdup(cname); + g_autofree char *name =3D g_strdup(cname); uint32_t fid; P9Req *req; =20 @@ -1152,7 +1144,6 @@ static uint32_t do_lcreate(QVirtio9P *v9p, const char= *path, v9fs_req_wait_for_reply(req, NULL); v9fs_rlcreate(req, NULL, NULL); =20 - g_free(name); return fid; } =20 @@ -1160,8 +1151,8 @@ static uint32_t do_lcreate(QVirtio9P *v9p, const char= *path, static void do_symlink(QVirtio9P *v9p, const char *path, const char *clink, const char *to) { - char *const name =3D g_strdup(clink); - char *const dst =3D g_strdup(to); + g_autofree char *name =3D g_strdup(clink); + g_autofree char *dst =3D g_strdup(to); uint32_t fid; P9Req *req; =20 @@ -1170,9 +1161,6 @@ static void do_symlink(QVirtio9P *v9p, const char *pa= th, const char *clink, req =3D v9fs_tsymlink(v9p, fid, name, dst, 0, 0); v9fs_req_wait_for_reply(req, NULL); v9fs_rsymlink(req, NULL); - - g_free(dst); - g_free(name); } =20 /* create a hard link named @a clink in directory @a path pointing to @a t= o */ @@ -1193,7 +1181,7 @@ static void do_hardlink(QVirtio9P *v9p, const char *p= ath, const char *clink, static void do_unlinkat(QVirtio9P *v9p, const char *atpath, const char *rp= ath, uint32_t flags) { - char *const name =3D g_strdup(rpath); + g_autofree char *name =3D g_strdup(rpath); uint32_t fid; P9Req *req; =20 @@ -1202,8 +1190,6 @@ static void do_unlinkat(QVirtio9P *v9p, const char *a= tpath, const char *rpath, req =3D v9fs_tunlinkat(v9p, fid, name, flags, 0); v9fs_req_wait_for_reply(req, NULL); v9fs_runlinkat(req); - - g_free(name); } =20 static void fs_readdir_split_128(void *obj, void *data, @@ -1235,8 +1221,8 @@ static void fs_create_dir(void *obj, void *data, QGue= stAllocator *t_alloc) QVirtio9P *v9p =3D obj; alloc =3D t_alloc; struct stat st; - char *root_path =3D virtio_9p_test_path(""); - char *new_dir =3D virtio_9p_test_path("01"); + g_autofree char *root_path =3D virtio_9p_test_path(""); + g_autofree char *new_dir =3D virtio_9p_test_path("01"); =20 g_assert(root_path !=3D NULL); =20 @@ -1247,9 +1233,6 @@ static void fs_create_dir(void *obj, void *data, QGue= stAllocator *t_alloc) g_assert(stat(new_dir, &st) =3D=3D 0); /* ... and is actually a directory */ g_assert((st.st_mode & S_IFMT) =3D=3D S_IFDIR); - - g_free(new_dir); - g_free(root_path); } =20 static void fs_unlinkat_dir(void *obj, void *data, QGuestAllocator *t_allo= c) @@ -1257,8 +1240,8 @@ static void fs_unlinkat_dir(void *obj, void *data, QG= uestAllocator *t_alloc) QVirtio9P *v9p =3D obj; alloc =3D t_alloc; struct stat st; - char *root_path =3D virtio_9p_test_path(""); - char *new_dir =3D virtio_9p_test_path("02"); + g_autofree char *root_path =3D virtio_9p_test_path(""); + g_autofree char *new_dir =3D virtio_9p_test_path("02"); =20 g_assert(root_path !=3D NULL); =20 @@ -1273,9 +1256,6 @@ static void fs_unlinkat_dir(void *obj, void *data, QG= uestAllocator *t_alloc) do_unlinkat(v9p, "/", "02", AT_REMOVEDIR); /* directory should be gone now */ g_assert(stat(new_dir, &st) !=3D 0); - - g_free(new_dir); - g_free(root_path); } =20 static void fs_create_file(void *obj, void *data, QGuestAllocator *t_alloc) @@ -1283,7 +1263,7 @@ static void fs_create_file(void *obj, void *data, QGu= estAllocator *t_alloc) QVirtio9P *v9p =3D obj; alloc =3D t_alloc; struct stat st; - char *new_file =3D virtio_9p_test_path("03/1st_file"); + g_autofree char *new_file =3D virtio_9p_test_path("03/1st_file"); =20 do_attach(v9p); do_mkdir(v9p, "/", "03"); @@ -1293,8 +1273,6 @@ static void fs_create_file(void *obj, void *data, QGu= estAllocator *t_alloc) g_assert(stat(new_file, &st) =3D=3D 0); /* ... and is a regular file */ g_assert((st.st_mode & S_IFMT) =3D=3D S_IFREG); - - g_free(new_file); } =20 static void fs_unlinkat_file(void *obj, void *data, QGuestAllocator *t_all= oc) @@ -1302,7 +1280,7 @@ static void fs_unlinkat_file(void *obj, void *data, Q= GuestAllocator *t_alloc) QVirtio9P *v9p =3D obj; alloc =3D t_alloc; struct stat st; - char *new_file =3D virtio_9p_test_path("04/doa_file"); + g_autofree char *new_file =3D virtio_9p_test_path("04/doa_file"); =20 do_attach(v9p); do_mkdir(v9p, "/", "04"); @@ -1316,8 +1294,6 @@ static void fs_unlinkat_file(void *obj, void *data, Q= GuestAllocator *t_alloc) do_unlinkat(v9p, "04", "doa_file", 0); /* file should be gone now */ g_assert(stat(new_file, &st) !=3D 0); - - g_free(new_file); } =20 static void fs_symlink_file(void *obj, void *data, QGuestAllocator *t_allo= c) @@ -1325,8 +1301,8 @@ static void fs_symlink_file(void *obj, void *data, QG= uestAllocator *t_alloc) QVirtio9P *v9p =3D obj; alloc =3D t_alloc; struct stat st; - char *real_file =3D virtio_9p_test_path("05/real_file"); - char *symlink_file =3D virtio_9p_test_path("05/symlink_file"); + g_autofree char *real_file =3D virtio_9p_test_path("05/real_file"); + g_autofree char *symlink_file =3D virtio_9p_test_path("05/symlink_file= "); =20 do_attach(v9p); do_mkdir(v9p, "/", "05"); @@ -1338,9 +1314,6 @@ static void fs_symlink_file(void *obj, void *data, QG= uestAllocator *t_alloc) =20 /* check if created link exists now */ g_assert(stat(symlink_file, &st) =3D=3D 0); - - g_free(symlink_file); - g_free(real_file); } =20 static void fs_unlinkat_symlink(void *obj, void *data, @@ -1349,8 +1322,8 @@ static void fs_unlinkat_symlink(void *obj, void *data, QVirtio9P *v9p =3D obj; alloc =3D t_alloc; struct stat st; - char *real_file =3D virtio_9p_test_path("06/real_file"); - char *symlink_file =3D virtio_9p_test_path("06/symlink_file"); + g_autofree char *real_file =3D virtio_9p_test_path("06/real_file"); + g_autofree char *symlink_file =3D virtio_9p_test_path("06/symlink_file= "); =20 do_attach(v9p); do_mkdir(v9p, "/", "06"); @@ -1364,9 +1337,6 @@ static void fs_unlinkat_symlink(void *obj, void *data, do_unlinkat(v9p, "06", "symlink_file", 0); /* symlink should be gone now */ g_assert(stat(symlink_file, &st) !=3D 0); - - g_free(symlink_file); - g_free(real_file); } =20 static void fs_hardlink_file(void *obj, void *data, QGuestAllocator *t_all= oc) @@ -1374,8 +1344,8 @@ static void fs_hardlink_file(void *obj, void *data, Q= GuestAllocator *t_alloc) QVirtio9P *v9p =3D obj; alloc =3D t_alloc; struct stat st_real, st_link; - char *real_file =3D virtio_9p_test_path("07/real_file"); - char *hardlink_file =3D virtio_9p_test_path("07/hardlink_file"); + g_autofree char *real_file =3D virtio_9p_test_path("07/real_file"); + g_autofree char *hardlink_file =3D virtio_9p_test_path("07/hardlink_fi= le"); =20 do_attach(v9p); do_mkdir(v9p, "/", "07"); @@ -1391,9 +1361,6 @@ static void fs_hardlink_file(void *obj, void *data, Q= GuestAllocator *t_alloc) g_assert((st_link.st_mode & S_IFMT) =3D=3D S_IFREG); g_assert(st_link.st_dev =3D=3D st_real.st_dev); g_assert(st_link.st_ino =3D=3D st_real.st_ino); - - g_free(hardlink_file); - g_free(real_file); } =20 static void fs_unlinkat_hardlink(void *obj, void *data, @@ -1402,8 +1369,8 @@ static void fs_unlinkat_hardlink(void *obj, void *dat= a, QVirtio9P *v9p =3D obj; alloc =3D t_alloc; struct stat st_real, st_link; - char *real_file =3D virtio_9p_test_path("08/real_file"); - char *hardlink_file =3D virtio_9p_test_path("08/hardlink_file"); + g_autofree char *real_file =3D virtio_9p_test_path("08/real_file"); + g_autofree char *hardlink_file =3D virtio_9p_test_path("08/hardlink_fi= le"); =20 do_attach(v9p); do_mkdir(v9p, "/", "08"); @@ -1419,9 +1386,6 @@ static void fs_unlinkat_hardlink(void *obj, void *dat= a, g_assert(stat(hardlink_file, &st_link) !=3D 0); /* and old file should still exist */ g_assert(stat(real_file, &st_real) =3D=3D 0); - - g_free(hardlink_file); - g_free(real_file); } =20 static void *assign_9p_local_driver(GString *cmd_line, void *arg) --=20 2.20.1 From nobody Sat Feb 7 18:21:03 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=quarantine dis=none) header.from=crudebyte.com ARC-Seal: i=1; a=rsa-sha256; t=1644493267; cv=none; d=zohomail.com; s=zohoarc; b=dakKcsmBaqPfjOam0CWEiqYIJzlzR7Kf8FEh4lJfabzyy6e6eARXZnP8iARNt5ADotb/pPnL2smHatjBny8ggOn5MQMX3DGtW7/r/4W6OdhsKuso5nXsIgEj6TumX3r35TVAkv6vLwTsEss+ioDKrVsKRMV2zL3P6w+m2OZTlcs= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1644493267; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=rMf4KtmBn+yyQQHi+FpBQwGipj8F3jW/JGrXe3xFgzc=; b=Yv9dk586e4n0E9YPZHjLBi4nJkaqR/ha9b0cvVawQ5xhRkWvDBgPOCD+o0xRCIwfSd2IIEu2lUq1rBMeP6uZmdu+iTr/Npvk50AbLtz5ea2t8xq61eRMkDMgGwg8cN4IqbcVZeZrQ71Ls1G/zkbjfpva3wz/xmFGt6C/uOC8y3s= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1644493267810582.3828330764125; Thu, 10 Feb 2022 03:41:07 -0800 (PST) Received: from localhost ([::1]:43550 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1nI7ow-00050G-Ot for importer@patchew.org; Thu, 10 Feb 2022 06:41:06 -0500 Received: from eggs.gnu.org ([209.51.188.92]:43326) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <5279f88ced3f628b475f7b9e1cb3b5f4c0377b8c@lizzy.crudebyte.com>) id 1nI7kB-0007eh-UY for qemu-devel@nongnu.org; Thu, 10 Feb 2022 06:36:14 -0500 Received: from lizzy.crudebyte.com ([91.194.90.13]:46401) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <5279f88ced3f628b475f7b9e1cb3b5f4c0377b8c@lizzy.crudebyte.com>) id 1nI7jp-0003Sk-GD for qemu-devel@nongnu.org; Thu, 10 Feb 2022 06:36:07 -0500 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=crudebyte.com; s=lizzy; h=Cc:To:Content-Transfer-Encoding:Content-Type: MIME-Version:Subject:Date:From:References:In-Reply-To:Message-Id:Content-ID: Content-Description; bh=rMf4KtmBn+yyQQHi+FpBQwGipj8F3jW/JGrXe3xFgzc=; b=CXo1H zFIpz08LUZc9lINYj1BTXeeZHsVTReRkvoV1IWj1kIHLdUjUCPGJx8lKdxJXM43fNLZGqU3gm0dt4 y7vcc3QfUbmAh0aaJFpfZHSg0d3QXBK56VCR4UKe8Ee6OWzP8/5MHV0/9UatU0CH2tgMnPv+/AezX VaWjIUaJ8/hbV0C5lLCYz2s2cMzb4YuGuEJiVW6m1kn7a3MmFFIudU2RVwUSBD67oeW7nWwnwhvhT AMmjIHmnl9mW6JUJr9jdoz6B6L7EUX+PSqyj8kl0azpKaaLrKVKmx8ZPjz5Hwm2JY8LPROnVh0/sq zJbyEB6Yw0bMlq40KuB33guxsD3aw==; Message-Id: <5279f88ced3f628b475f7b9e1cb3b5f4c0377b8c.1644492115.git.qemu_oss@crudebyte.com> In-Reply-To: References: From: Christian Schoenebeck Date: Thu, 10 Feb 2022 12:21:55 +0100 Subject: [PULL 2/5] tests/9pfs: fix mkdir() being called twice MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable To: qemu-devel@nongnu.org, Peter Maydell Cc: Greg Kurz Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: none client-ip=91.194.90.13; envelope-from=5279f88ced3f628b475f7b9e1cb3b5f4c0377b8c@lizzy.crudebyte.com; helo=lizzy.crudebyte.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: pass (identity @crudebyte.com) X-ZM-MESSAGEID: 1644493269664100001 The 9p test cases use mkdtemp() to create a temporary directory for running the 'local' 9p tests with real files/dirs. Unlike mktemp() which only generates a unique file name, mkdtemp() also creates the directory, therefore the subsequent mkdir() was wrong and caused errors on some systems. Signed-off-by: Christian Schoenebeck Fixes: 136b7af2 (tests/9pfs: fix test dir for parallel tests) Reported-by: Daniel P. Berrang=C3=A9 Resolves: https://gitlab.com/qemu-project/qemu/-/issues/832 Reviewed-by: Daniel P. Berrang=C3=A9 Reviewed-by: Greg Kurz Message-Id: --- tests/qtest/libqos/virtio-9p.c | 18 +++--------------- 1 file changed, 3 insertions(+), 15 deletions(-) diff --git a/tests/qtest/libqos/virtio-9p.c b/tests/qtest/libqos/virtio-9p.c index b4e1143288..ef96ef006a 100644 --- a/tests/qtest/libqos/virtio-9p.c +++ b/tests/qtest/libqos/virtio-9p.c @@ -37,31 +37,19 @@ static char *concat_path(const char* a, const char* b) return g_build_filename(a, b, NULL); } =20 -static void init_local_test_path(void) +void virtio_9p_create_local_test_dir(void) { + struct stat st; char *pwd =3D g_get_current_dir(); char *template =3D concat_path(pwd, "qtest-9p-local-XXXXXX"); + local_test_path =3D mkdtemp(template); if (!local_test_path) { g_test_message("mkdtemp('%s') failed: %s", template, strerror(errn= o)); } - g_assert(local_test_path); g_free(pwd); -} - -void virtio_9p_create_local_test_dir(void) -{ - struct stat st; - int res; - - init_local_test_path(); =20 g_assert(local_test_path !=3D NULL); - res =3D mkdir(local_test_path, 0777); - if (res < 0) { - g_test_message("mkdir('%s') failed: %s", local_test_path, - strerror(errno)); - } =20 /* ensure test directory exists now ... */ g_assert(stat(local_test_path, &st) =3D=3D 0); --=20 2.20.1 From nobody Sat Feb 7 18:21:03 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=quarantine dis=none) header.from=crudebyte.com ARC-Seal: i=1; a=rsa-sha256; t=1644493501; cv=none; d=zohomail.com; s=zohoarc; b=SOdvH9lYoa+p7kV7vx1unhhWDHYkpoQhNGc3Ju6GHqY9ye/R77PQfjQoY95furAk/Epxa+srYZsWG9PBrXZXMvUsCxESIwbNnc/evGly2SHE0G7b43ktmOkp8msuhjiN9s8QtS2RWGZBUdrbC13UKlxDcHL4uBIP0ptWQCiIcgQ= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1644493501; h=Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:Message-ID:References:Sender:Subject:To; bh=nol1mgUdNPIinW3AvolOp2b+vCDqiMhIC5upX6MUJlg=; b=ZqHYABM5F79b2JRs/wPEyFAO8oy8FLxf6i4TDR4seUPIPSzajaYl5wrDs/NfU+gVkkvolo4lQi/G4BXI2kjqA2wvLr2E58u+8f+gHmJdQRxZ4JshFlBS38+BJHN2NbnWMzB7zjkpuDzLbUQXNOYl6sT5IMPNZhp1HiiWXr/8Hg4= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1644493501242241.1427723698015; Thu, 10 Feb 2022 03:45:01 -0800 (PST) Received: from localhost ([::1]:52020 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1nI7si-0002HJ-0F for importer@patchew.org; Thu, 10 Feb 2022 06:45:00 -0500 Received: from eggs.gnu.org ([209.51.188.92]:43324) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <98c520acce46f855d29f5f7c857103975926939e@lizzy.crudebyte.com>) id 1nI7kB-0007eg-Ou for qemu-devel@nongnu.org; Thu, 10 Feb 2022 06:36:14 -0500 Received: from lizzy.crudebyte.com ([91.194.90.13]:44097) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <98c520acce46f855d29f5f7c857103975926939e@lizzy.crudebyte.com>) id 1nI7jp-0003T7-GD for qemu-devel@nongnu.org; Thu, 10 Feb 2022 06:36:07 -0500 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=crudebyte.com; s=lizzy; h=Cc:To:Subject:Date:From:References:In-Reply-To: Message-Id:Content-Type:Content-Transfer-Encoding:MIME-Version:Content-ID: Content-Description; bh=nol1mgUdNPIinW3AvolOp2b+vCDqiMhIC5upX6MUJlg=; b=mABlf eVcgmghIK3MNl5+XXgsZrMAAtnGV/u/yXOH/PxU9EWDORqeXUMLmX8ubt6MzcvUV8o2DneUsZ4dSb 0Z10Xpv2T5QUYwZc3VSVrrpRpLsLsVRhoqU7eRPxZueGeoxqDk56uGReX1IvZm56lYmARTrIJHgxC 676Tbg1pm0CROGB7rT4tTTKY3ztSchkPPmnNsHezwAxq2T6GLo5iH0K45b5wlas+qds0niup/vTPc jiQK7SlGwEiX0dsYqsVqIdh4wNCyvIvv8xVHFld7SlSgdTVtxKxRwekxw/ksXnIqgPAHeyBp7Sghd Zr5zXJoGPzqJ5NrWMN/1R6f0YB6yw==; Message-Id: <98c520acce46f855d29f5f7c857103975926939e.1644492115.git.qemu_oss@crudebyte.com> In-Reply-To: References: From: Christian Schoenebeck Date: Thu, 10 Feb 2022 12:21:55 +0100 Subject: [PULL 3/5] tests/9pfs: Fix leak of local_test_path To: qemu-devel@nongnu.org, Peter Maydell Cc: Greg Kurz Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: none client-ip=91.194.90.13; envelope-from=98c520acce46f855d29f5f7c857103975926939e@lizzy.crudebyte.com; helo=lizzy.crudebyte.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: pass (identity @crudebyte.com) X-ZM-MESSAGEID: 1644493502364100003 Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" From: Greg Kurz local_test_path is allocated in virtio_9p_create_local_test_dir() to hold t= he path of the temporary directory. It should be freed in virtio_9p_remove_local_te= st_dir() when the temporary directory is removed. Clarify the lifecycle of local_tes= t_path while here. Based-on: Signed-off-by: Greg Kurz Message-Id: <20220201151508.190035-2-groug@kaod.org> Reviewed-by: Christian Schoenebeck Signed-off-by: Christian Schoenebeck --- tests/qtest/libqos/virtio-9p.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/tests/qtest/libqos/virtio-9p.c b/tests/qtest/libqos/virtio-9p.c index ef96ef006a..5d18e5eae5 100644 --- a/tests/qtest/libqos/virtio-9p.c +++ b/tests/qtest/libqos/virtio-9p.c @@ -39,8 +39,13 @@ static char *concat_path(const char* a, const char* b) =20 void virtio_9p_create_local_test_dir(void) { + g_assert(local_test_path =3D=3D NULL); struct stat st; char *pwd =3D g_get_current_dir(); + /* + * template gets cached into local_test_path and freed in + * virtio_9p_remove_local_test_dir(). + */ char *template =3D concat_path(pwd, "qtest-9p-local-XXXXXX"); =20 local_test_path =3D mkdtemp(template); @@ -66,6 +71,8 @@ void virtio_9p_remove_local_test_dir(void) /* ignore error, dummy check to prevent compiler error */ } g_free(cmd); + g_free(local_test_path); + local_test_path =3D NULL; } =20 char *virtio_9p_test_path(const char *path) --=20 2.20.1 From nobody Sat Feb 7 18:21:03 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=quarantine dis=none) header.from=crudebyte.com ARC-Seal: i=1; a=rsa-sha256; t=1644493782; cv=none; d=zohomail.com; s=zohoarc; b=XalMs0gHZoIvRIWkRkgxZQyfPPsuGBsLYdQ1hLkM4gp2ZkcHJRomvlTgtvO1xU01pVSQEwuP8se+zMFmiGIKtapniymfIWLhVF9ISa5QuqLPMDXekldga/qsTMC11h7itxkY4LmWLhGIFngtwGMWU+vMWoKZeZQhrY1spGFEIjc= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1644493782; h=Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:Message-ID:References:Sender:Subject:To; bh=mcbRg2xlZAZHldg9PdPezpruRYnaMN84QxS/hR585+U=; b=aiCDHefHURCiBf0xh7ZlVFer8UQdcrgQYjPPD5MpIPA3s/59p3Y9FycGUuX0DQJyVn9/dyFrCR1v8YnsZLNpWGjoHTLKrxOgEwkIU1xVRC94fWH6fs2K8gBqEOmIwtnzIDgTsQJjyisyavEMSzFaT9I7xhQsYL/W3EA3RryF/qA= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1644493782643331.4123622948829; Thu, 10 Feb 2022 03:49:42 -0800 (PST) Received: from localhost ([::1]:59380 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1nI7xG-0007Sj-5O for importer@patchew.org; Thu, 10 Feb 2022 06:49:42 -0500 Received: from eggs.gnu.org ([209.51.188.92]:43344) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <7c1101e9be922915491bc9ec2ca2150554192d53@lizzy.crudebyte.com>) id 1nI7kC-0007ej-JT for qemu-devel@nongnu.org; Thu, 10 Feb 2022 06:36:14 -0500 Received: from lizzy.crudebyte.com ([91.194.90.13]:59481) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <7c1101e9be922915491bc9ec2ca2150554192d53@lizzy.crudebyte.com>) id 1nI7jp-0003U0-G9 for qemu-devel@nongnu.org; Thu, 10 Feb 2022 06:36:07 -0500 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=crudebyte.com; s=lizzy; h=Cc:To:Subject:Date:From:References:In-Reply-To: Message-Id:Content-Type:Content-Transfer-Encoding:MIME-Version:Content-ID: Content-Description; bh=mcbRg2xlZAZHldg9PdPezpruRYnaMN84QxS/hR585+U=; b=hPSY5 IwO0dXLNPdNr8awmLIiKCOgB6DPOPIvdWMQushRilJ+rUH9Dy8aKKY0s4lw4bzOgo9aruCD6cXSS+ uWn6fzGm93KtIdz/vKa7iEe29VDSOqFWa5M/UUE0ArW+R0ReB/AiX2bMQTkbf45wTftlm9MNguYsm 9WBC9sWvVvQiWmxgIL7qoIJ47H1sSenr7MC6oUygo0cN6G3GwfePVYH7h9a/eNm8oppBX6AGItNjy 3bbJmBYRCCvQO+yYpcFRRLZ9fhRryhLWiCa7jnoqtLnOJyi0NRzNpDoMZ4NI35DamdUfyFoJeKmFM 1v2lJm7qTyYKd82qr3tcsaHBSvdpg==; Message-Id: <7c1101e9be922915491bc9ec2ca2150554192d53.1644492115.git.qemu_oss@crudebyte.com> In-Reply-To: References: From: Christian Schoenebeck Date: Thu, 10 Feb 2022 12:21:55 +0100 Subject: [PULL 4/5] tests/9pfs: Use g_autofree and g_autoptr where possible To: qemu-devel@nongnu.org, Peter Maydell Cc: Greg Kurz Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: none client-ip=91.194.90.13; envelope-from=7c1101e9be922915491bc9ec2ca2150554192d53@lizzy.crudebyte.com; helo=lizzy.crudebyte.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: pass (identity @crudebyte.com) X-ZM-MESSAGEID: 1644493784583100001 Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" From: Greg Kurz It is recommended to use g_autofree or g_autoptr as it reduces the odds of introducing memory leaks in future changes. Signed-off-by: Greg Kurz Message-Id: <20220201151508.190035-3-groug@kaod.org> Reviewed-by: Christian Schoenebeck Signed-off-by: Christian Schoenebeck --- tests/qtest/libqos/virtio-9p.c | 13 ++++--------- 1 file changed, 4 insertions(+), 9 deletions(-) diff --git a/tests/qtest/libqos/virtio-9p.c b/tests/qtest/libqos/virtio-9p.c index 5d18e5eae5..f51f0635cc 100644 --- a/tests/qtest/libqos/virtio-9p.c +++ b/tests/qtest/libqos/virtio-9p.c @@ -41,7 +41,7 @@ void virtio_9p_create_local_test_dir(void) { g_assert(local_test_path =3D=3D NULL); struct stat st; - char *pwd =3D g_get_current_dir(); + g_autofree char *pwd =3D g_get_current_dir(); /* * template gets cached into local_test_path and freed in * virtio_9p_remove_local_test_dir(). @@ -52,7 +52,6 @@ void virtio_9p_create_local_test_dir(void) if (!local_test_path) { g_test_message("mkdtemp('%s') failed: %s", template, strerror(errn= o)); } - g_free(pwd); =20 g_assert(local_test_path !=3D NULL); =20 @@ -65,12 +64,11 @@ void virtio_9p_create_local_test_dir(void) void virtio_9p_remove_local_test_dir(void) { g_assert(local_test_path !=3D NULL); - char *cmd =3D g_strdup_printf("rm -fr '%s'\n", local_test_path); + g_autofree char *cmd =3D g_strdup_printf("rm -fr '%s'\n", local_test_p= ath); int res =3D system(cmd); if (res < 0) { /* ignore error, dummy check to prevent compiler error */ } - g_free(cmd); g_free(local_test_path); local_test_path =3D NULL; } @@ -216,8 +214,8 @@ static void *virtio_9p_pci_create(void *pci_bus, QGuest= Allocator *t_alloc, static void regex_replace(GString *haystack, const char *pattern, const char *replace_fmt, ...) { - GRegex *regex; - char *replace, *s; + g_autoptr(GRegex) regex =3D NULL; + g_autofree char *replace =3D NULL, *s =3D NULL; va_list argp; =20 va_start(argp, replace_fmt); @@ -227,9 +225,6 @@ static void regex_replace(GString *haystack, const char= *pattern, regex =3D g_regex_new(pattern, 0, 0, NULL); s =3D g_regex_replace(regex, haystack->str, -1, 0, replace, 0, NULL); g_string_assign(haystack, s); - g_free(s); - g_regex_unref(regex); - g_free(replace); } =20 void virtio_9p_assign_local_driver(GString *cmd_line, const char *args) --=20 2.20.1 From nobody Sat Feb 7 18:21:03 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=quarantine dis=none) header.from=crudebyte.com ARC-Seal: i=1; a=rsa-sha256; t=1644493456; cv=none; d=zohomail.com; s=zohoarc; b=Q/SUkBcer4myFQqQBIF5AK5D9FiHmtDCJUg41m9zmOzxdthbzxtMfl/YPxa5AwHEFvsLMH4lz8sN9m+ziXiaKXVdiviRRdsOWKlMeRvl8V6Xhsvu6629SVTSeDeH60NEYtS4xYbcbF3hBCBl6K/U9JirZl5Hwa/iliORElnr7kI= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1644493456; h=Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:Message-ID:References:Sender:Subject:To; bh=fOUlgj1WIfegIgJq1TPnqkVSNHErz2qLJSzUUdgRiHc=; b=jxM/Csdr74XUuZHZAUPy4yhAqBzEDjlNBdRAwatknaE2DpETO2JSjQBds4Fuy7D4/JGwwYVCYa6AntuPdxJxn73nFqmV7tHBA7Qs/M8W4qTP/Iu+oPPB4uUn/LxA1HeH6oWvJrNhYrAc+FV6MrDIuhDHnjCSsaa94EOICqIeo/U= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1644493456492743.8471400789878; Thu, 10 Feb 2022 03:44:16 -0800 (PST) Received: from localhost ([::1]:49642 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1nI7ry-0000hK-J2 for importer@patchew.org; Thu, 10 Feb 2022 06:44:14 -0500 Received: from eggs.gnu.org ([209.51.188.92]:43378) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1nI7kE-0007ez-Dm for qemu-devel@nongnu.org; Thu, 10 Feb 2022 06:36:14 -0500 Received: from lizzy.crudebyte.com ([91.194.90.13]:44165) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1nI7k5-0003Vn-5R for qemu-devel@nongnu.org; Thu, 10 Feb 2022 06:36:10 -0500 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=crudebyte.com; s=lizzy; h=Cc:To:Subject:Date:From:References:In-Reply-To: Message-Id:Content-Type:Content-Transfer-Encoding:MIME-Version:Content-ID: Content-Description; bh=fOUlgj1WIfegIgJq1TPnqkVSNHErz2qLJSzUUdgRiHc=; b=H/VVi 38RnVURHDJXbsTQGCerRa9/DBWArClSajmEW4wmKbBwtz/fQ5+NWXUzcg3rLroXzNriL08Oe24Rba fT3cRgLc0CqqHP3JpfjF6hamByy4ch3ayi4HABOvwVF9kOMyb/CtLSCgi4t+Uw+NI+0xqnS3jpZTn jTDn7Xw8iP/ShwqcMeuz4hltWv6KlVWVPgPhsCiCxAaaU0Qlf3hqalnWerdovhNLDASiEI38DrOQp 6B0+Cp7XWfH7ULHB6h8757/1Z4z4A/+2Awa0X/PFMPjnZBeB43CH+G6S6MJCtXY1HZX57V8EGm51B Ux4nskNmOn9E1paqc/cYps5uogiZg==; Message-Id: In-Reply-To: References: From: Christian Schoenebeck Date: Thu, 10 Feb 2022 12:21:55 +0100 Subject: [PULL 5/5] 9pfs: Fix segfault in do_readdir_many caused by struct dirent overread To: qemu-devel@nongnu.org, Peter Maydell Cc: Greg Kurz Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: none client-ip=91.194.90.13; envelope-from=de19c79dad6a2cad54ae04ce754d47c07bf9bc93@lizzy.crudebyte.com; helo=lizzy.crudebyte.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: pass (identity @crudebyte.com) X-ZM-MESSAGEID: 1644493458921100001 Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" From: Vitaly Chikunov `struct dirent' returned from readdir(3) could be shorter (or longer) than `sizeof(struct dirent)', thus memcpy of sizeof length will overread into unallocated page causing SIGSEGV. Example stack trace: #0 0x00005555559ebeed v9fs_co_readdir_many (/usr/bin/qemu-system-x86_64 += 0x497eed) #1 0x00005555559ec2e9 v9fs_readdir (/usr/bin/qemu-system-x86_64 + 0x4982e= 9) #2 0x0000555555eb7983 coroutine_trampoline (/usr/bin/qemu-system-x86_64 += 0x963983) #3 0x00007ffff73e0be0 n/a (n/a + 0x0) While fixing, provide a helper for any future `struct dirent' cloning. Resolves: https://gitlab.com/qemu-project/qemu/-/issues/841 Cc: qemu-stable@nongnu.org Co-authored-by: Christian Schoenebeck Reviewed-by: Dmitry V. Levin Signed-off-by: Vitaly Chikunov Acked-by: Greg Kurz Reviewed-by: Christian Schoenebeck Message-Id: <20220206013419.849161-1-vt@altlinux.org> Signed-off-by: Christian Schoenebeck --- hw/9pfs/codir.c | 3 +-- include/qemu/osdep.h | 13 +++++++++++++ util/osdep.c | 21 +++++++++++++++++++++ 3 files changed, 35 insertions(+), 2 deletions(-) diff --git a/hw/9pfs/codir.c b/hw/9pfs/codir.c index 032cce04c4..c0873bde16 100644 --- a/hw/9pfs/codir.c +++ b/hw/9pfs/codir.c @@ -143,8 +143,7 @@ static int do_readdir_many(V9fsPDU *pdu, V9fsFidState *= fidp, } else { e =3D e->next =3D g_malloc0(sizeof(V9fsDirEnt)); } - e->dent =3D g_malloc0(sizeof(struct dirent)); - memcpy(e->dent, dent, sizeof(struct dirent)); + e->dent =3D qemu_dirent_dup(dent); =20 /* perform a full stat() for directory entry if requested by calle= r */ if (dostat) { diff --git a/include/qemu/osdep.h b/include/qemu/osdep.h index d1660d67fa..ce12f64853 100644 --- a/include/qemu/osdep.h +++ b/include/qemu/osdep.h @@ -805,6 +805,19 @@ static inline int platform_does_not_support_system(con= st char *command) } #endif /* !HAVE_SYSTEM_FUNCTION */ =20 +/** + * Duplicate directory entry @dent. + * + * It is highly recommended to use this function instead of open coding + * duplication of @c dirent objects, because the actual @c struct @c dirent + * size may be bigger or shorter than @c sizeof(struct dirent) and correct + * handling is platform specific (see gitlab issue #841). + * + * @dent - original directory entry to be duplicated + * @returns duplicated directory entry which should be freed with g_free() + */ +struct dirent *qemu_dirent_dup(struct dirent *dent); + #ifdef __cplusplus } #endif diff --git a/util/osdep.c b/util/osdep.c index 42a0a4986a..67fbf22778 100644 --- a/util/osdep.c +++ b/util/osdep.c @@ -33,6 +33,7 @@ extern int madvise(char *, size_t, int); #endif =20 +#include #include "qemu-common.h" #include "qemu/cutils.h" #include "qemu/sockets.h" @@ -615,3 +616,23 @@ writev(int fd, const struct iovec *iov, int iov_cnt) return readv_writev(fd, iov, iov_cnt, true); } #endif + +struct dirent * +qemu_dirent_dup(struct dirent *dent) +{ + size_t sz =3D 0; +#if defined _DIRENT_HAVE_D_RECLEN + /* Avoid use of strlen() if platform supports d_reclen. */ + sz =3D dent->d_reclen; +#endif + /* + * Test sz for zero even if d_reclen is available + * because some drivers may set d_reclen to zero. + */ + if (sz =3D=3D 0) { + /* Fallback to the most portable way. */ + sz =3D offsetof(struct dirent, d_name) + + strlen(dent->d_name) + 1; + } + return g_memdup(dent, sz); +} --=20 2.20.1