From nobody Mon Jul 7 04:38:47 2025 Delivered-To: importer2@patchew.org Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer2=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1652458661864623.088894853666; Fri, 13 May 2022 09:17:41 -0700 (PDT) Received: from localhost ([::1]:58286 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1npXz2-0004Qn-MI for importer2@patchew.org; Fri, 13 May 2022 12:17:40 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:50158) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1npXfx-0001KZ-BG for qemu-devel@nongnu.org; Fri, 13 May 2022 11:57:57 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:49920) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1npXfv-0002I6-A8 for qemu-devel@nongnu.org; Fri, 13 May 2022 11:57:57 -0400 Received: from mail-wm1-f71.google.com (mail-wm1-f71.google.com [209.85.128.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-114-PbQIvnFDPB6l5sdlCBW2iw-1; Fri, 13 May 2022 11:57:53 -0400 Received: by mail-wm1-f71.google.com with SMTP id v191-20020a1cacc8000000b0038ce818d2efso3081028wme.1 for ; Fri, 13 May 2022 08:57:53 -0700 (PDT) Received: from DESKTOP-E7ACR7D.lan ([2001:8a0:f4d9:2101:a4fa:5f93:755f:6249]) by smtp.gmail.com with ESMTPSA id l5-20020adfc785000000b0020cdcb0efa2sm2558758wrg.34.2022.05.13.08.57.50 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 13 May 2022 08:57:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1652457474; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=2dSrVcjvWGbPjvKOoFvwRPiMAoMY8ZsrRmMQ4iX5vOA=; b=az6b3x3oRxFi/sAgKdtw+8pQrmzbW2UepsVQXRX1L5Ko/ouWkvIPjKeOF6FokuvxRSuBrn GsM01LbYkudoiFDRkjWbI+zLX1c2eZg67x43uPE5eoWe6uISqolDtsWmEcOBbZjqls8xEA 49Py1EA2/74exXsIfVz0nB7Aeu0zef8= X-MC-Unique: PbQIvnFDPB6l5sdlCBW2iw-1 X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=2dSrVcjvWGbPjvKOoFvwRPiMAoMY8ZsrRmMQ4iX5vOA=; b=796gtLoTBBevwg3JvgfdLAKunD01RNj0vj0on94EXJhXbRS4slvcf0gO1oIll3/J1G 2QDSwlmQ0pHMFOQLaLiITo0OJYt/NDVem+gqimC38VsgRrJpX9CBMvFN25rsw9Mf0lwl LTMpnsztjBHpKO3Z/icF17RAHv5Qx7yd3l14F01ct4/vAq3OguZA0pDGsUdAbDMag6Ak Rpc39OVRp0jo3bXyqjYsV/f50TvZHZ88l05mc2ze3iGJgT+Hl05F1mdf8vPhmTNRLC2v xRdpcleb/xTeutvrUPfcUVI3IBvfkrAEHu8VRm02ghv+lsThIuea24eheYeIQArHbSs1 ta0Q== X-Gm-Message-State: AOAM5310brjIl3/xrqcnOrFgF1njROCzFVnv81Cb9nUTua8RhRYf4UZN jivVJuXrbmueQDkUWR71NZxmKh8dgM+s6ho0bKpDg3Nq0WMkVVuw8NUk2fXy4U67jrL/EvctX1F gDkxgs+HzpnpQpDdzcjGeix7jbmv6O+UxOEwa0XSRsg4jldgbW4AkrLVfdzg8+NSF X-Received: by 2002:a05:6000:12d1:b0:20a:d901:3828 with SMTP id l17-20020a05600012d100b0020ad9013828mr4460024wrx.313.1652457471957; Fri, 13 May 2022 08:57:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzFdmCYCVhzfdxeFFKn09uIbB+82DoFaLlw4LIyFyY7bsHOkPI2zVSk7yoyT443H2DjZ0ZnIQ== X-Received: by 2002:a05:6000:12d1:b0:20a:d901:3828 with SMTP id l17-20020a05600012d100b0020ad9013828mr4459990wrx.313.1652457471503; Fri, 13 May 2022 08:57:51 -0700 (PDT) From: Alberto Faria To: qemu-devel@nongnu.org Cc: qemu-block@nongnu.org, Alberto Faria , Paolo Bonzini , Stefan Hajnoczi , Kevin Wolf , Hanna Reitz , Fam Zheng , Stefan Weil Subject: [PATCH v2 03/10] block: Make bdrv_{pread, pwrite}() return 0 on success Date: Fri, 13 May 2022 16:57:42 +0100 Message-Id: <20220513155749.2488070-1-afaria@redhat.com> X-Mailer: git-send-email 2.35.3 In-Reply-To: <20220513155418.2486450-1-afaria@redhat.com> References: <20220513155418.2486450-1-afaria@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer2=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.133.124; envelope-from=afaria@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -28 X-Spam_score: -2.9 X-Spam_bar: -- X-Spam_report: (-2.9 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.082, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer2=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZM-MESSAGEID: 1652458662937100001 Content-Type: text/plain; charset="utf-8" They currently return the value of their 'bytes' parameter on success. Make them return 0 instead, for consistency with other I/O functions and in preparation to implement them using generated_co_wrapper. This also makes it clear that short reads/writes are not possible. The few callers that rely on the previous behavior are adjusted accordingly by hand. Signed-off-by: Alberto Faria Reviewed-by: Paolo Bonzini --- block/cloop.c | 2 +- block/crypto.c | 4 ++-- block/dmg.c | 10 +++++----- block/io.c | 10 ++-------- block/qcow.c | 2 +- block/qcow2.c | 4 ++-- block/qed.c | 7 +------ block/vdi.c | 2 +- block/vmdk.c | 5 ++--- tests/unit/test-block-iothread.c | 4 ++-- 10 files changed, 19 insertions(+), 31 deletions(-) diff --git a/block/cloop.c b/block/cloop.c index 9a2334495e..40b146e714 100644 --- a/block/cloop.c +++ b/block/cloop.c @@ -222,7 +222,7 @@ static inline int cloop_read_block(BlockDriverState *bs= , int block_num) =20 ret =3D bdrv_pread(bs->file, s->offsets[block_num], bytes, s->compressed_block, 0); - if (ret !=3D bytes) { + if (ret < 0) { return -1; } =20 diff --git a/block/crypto.c b/block/crypto.c index deec7fae2f..e7f5c4e31a 100644 --- a/block/crypto.c +++ b/block/crypto.c @@ -70,7 +70,7 @@ static ssize_t block_crypto_read_func(QCryptoBlock *block, error_setg_errno(errp, -ret, "Could not read encryption header"); return ret; } - return ret; + return buflen; } =20 static ssize_t block_crypto_write_func(QCryptoBlock *block, @@ -88,7 +88,7 @@ static ssize_t block_crypto_write_func(QCryptoBlock *bloc= k, error_setg_errno(errp, -ret, "Could not write encryption header"); return ret; } - return ret; + return buflen; } =20 =20 diff --git a/block/dmg.c b/block/dmg.c index 5a460c3eb1..98db18d82a 100644 --- a/block/dmg.c +++ b/block/dmg.c @@ -390,7 +390,7 @@ static int dmg_read_plist_xml(BlockDriverState *bs, Dmg= HeaderState *ds, buffer =3D g_malloc(info_length + 1); buffer[info_length] =3D '\0'; ret =3D bdrv_pread(bs->file, info_begin, info_length, buffer, 0); - if (ret !=3D info_length) { + if (ret < 0) { ret =3D -EINVAL; goto fail; } @@ -611,7 +611,7 @@ static inline int dmg_read_chunk(BlockDriverState *bs, = uint64_t sector_num) * inflated. */ ret =3D bdrv_pread(bs->file, s->offsets[chunk], s->lengths[chu= nk], s->compressed_chunk, 0); - if (ret !=3D s->lengths[chunk]) { + if (ret < 0) { return -1; } =20 @@ -637,7 +637,7 @@ static inline int dmg_read_chunk(BlockDriverState *bs, = uint64_t sector_num) * inflated. */ ret =3D bdrv_pread(bs->file, s->offsets[chunk], s->lengths[chu= nk], s->compressed_chunk, 0); - if (ret !=3D s->lengths[chunk]) { + if (ret < 0) { return -1; } =20 @@ -658,7 +658,7 @@ static inline int dmg_read_chunk(BlockDriverState *bs, = uint64_t sector_num) * inflated. */ ret =3D bdrv_pread(bs->file, s->offsets[chunk], s->lengths[chu= nk], s->compressed_chunk, 0); - if (ret !=3D s->lengths[chunk]) { + if (ret < 0) { return -1; } =20 @@ -674,7 +674,7 @@ static inline int dmg_read_chunk(BlockDriverState *bs, = uint64_t sector_num) case UDRW: /* copy */ ret =3D bdrv_pread(bs->file, s->offsets[chunk], s->lengths[chu= nk], s->uncompressed_chunk, 0); - if (ret !=3D s->lengths[chunk]) { + if (ret < 0) { return -1; } break; diff --git a/block/io.c b/block/io.c index 2ed963d9e0..78a289192e 100644 --- a/block/io.c +++ b/block/io.c @@ -1115,7 +1115,6 @@ int bdrv_make_zero(BdrvChild *child, BdrvRequestFlags= flags) int bdrv_pread(BdrvChild *child, int64_t offset, int64_t bytes, void *buf, BdrvRequestFlags flags) { - int ret; QEMUIOVector qiov =3D QEMU_IOVEC_INIT_BUF(qiov, buf, bytes); IO_CODE(); =20 @@ -1123,9 +1122,7 @@ int bdrv_pread(BdrvChild *child, int64_t offset, int6= 4_t bytes, void *buf, return -EINVAL; } =20 - ret =3D bdrv_preadv(child, offset, bytes, &qiov, flags); - - return ret < 0 ? ret : bytes; + return bdrv_preadv(child, offset, bytes, &qiov, flags); } =20 /* Return no. of bytes on success or < 0 on error. Important errors are: @@ -1137,7 +1134,6 @@ int bdrv_pread(BdrvChild *child, int64_t offset, int6= 4_t bytes, void *buf, int bdrv_pwrite(BdrvChild *child, int64_t offset, int64_t bytes, const void *buf, BdrvRequestFlags flags) { - int ret; QEMUIOVector qiov =3D QEMU_IOVEC_INIT_BUF(qiov, buf, bytes); IO_CODE(); =20 @@ -1145,9 +1141,7 @@ int bdrv_pwrite(BdrvChild *child, int64_t offset, int= 64_t bytes, return -EINVAL; } =20 - ret =3D bdrv_pwritev(child, offset, bytes, &qiov, flags); - - return ret < 0 ? ret : bytes; + return bdrv_pwritev(child, offset, bytes, &qiov, flags); } =20 /* diff --git a/block/qcow.c b/block/qcow.c index c94524b814..c646d6b16d 100644 --- a/block/qcow.c +++ b/block/qcow.c @@ -597,7 +597,7 @@ static int decompress_cluster(BlockDriverState *bs, uin= t64_t cluster_offset) csize &=3D (s->cluster_size - 1); BLKDBG_EVENT(bs->file, BLKDBG_READ_COMPRESSED); ret =3D bdrv_pread(bs->file, coffset, csize, s->cluster_data, 0); - if (ret !=3D csize) + if (ret < 0) return -1; if (decompress_buffer(s->cluster_cache, s->cluster_size, s->cluster_data, csize) < 0) { diff --git a/block/qcow2.c b/block/qcow2.c index 5493e6b847..d5a1e8bc43 100644 --- a/block/qcow2.c +++ b/block/qcow2.c @@ -113,7 +113,7 @@ static ssize_t qcow2_crypto_hdr_read_func(QCryptoBlock = *block, size_t offset, error_setg_errno(errp, -ret, "Could not read encryption header"); return -1; } - return ret; + return buflen; } =20 =20 @@ -174,7 +174,7 @@ static ssize_t qcow2_crypto_hdr_write_func(QCryptoBlock= *block, size_t offset, error_setg_errno(errp, -ret, "Could not read encryption header"); return -1; } - return ret; + return buflen; } =20 static QDict* diff --git a/block/qed.c b/block/qed.c index ba93e99570..55da91eb72 100644 --- a/block/qed.c +++ b/block/qed.c @@ -87,14 +87,9 @@ static void qed_header_cpu_to_le(const QEDHeader *cpu, Q= EDHeader *le) int qed_write_header_sync(BDRVQEDState *s) { QEDHeader le; - int ret; =20 qed_header_cpu_to_le(&s->header, &le); - ret =3D bdrv_pwrite(s->bs->file, 0, sizeof(le), &le, 0); - if (ret !=3D sizeof(le)) { - return ret; - } - return 0; + return bdrv_pwrite(s->bs->file, 0, sizeof(le), &le, 0); } =20 /** diff --git a/block/vdi.c b/block/vdi.c index 9ef55a117a..a0be2a23b9 100644 --- a/block/vdi.c +++ b/block/vdi.c @@ -730,7 +730,7 @@ nonallocating_write: n_sectors * SECTOR_SIZE, base, 0); } =20 - return ret < 0 ? ret : 0; + return ret; } =20 static int coroutine_fn vdi_co_do_create(BlockdevCreateOptions *create_opt= ions, diff --git a/block/vmdk.c b/block/vmdk.c index aacea1095f..332565c80f 100644 --- a/block/vmdk.c +++ b/block/vmdk.c @@ -473,7 +473,6 @@ static int vmdk_parent_open(BlockDriverState *bs) if (ret < 0) { goto out; } - ret =3D 0; =20 p_name =3D strstr(desc, "parentFileNameHint"); if (p_name !=3D NULL) { @@ -905,7 +904,7 @@ static char *vmdk_read_desc(BdrvChild *file, uint64_t d= esc_offset, Error **errp) g_free(buf); return NULL; } - buf[ret] =3D 0; + buf[size] =3D 0; =20 return buf; } @@ -1630,7 +1629,7 @@ static int get_cluster_offset(BlockDriverState *bs, l2_size_bytes, l2_table, 0 - ) !=3D l2_size_bytes) { + ) < 0) { return VMDK_ERROR; } =20 diff --git a/tests/unit/test-block-iothread.c b/tests/unit/test-block-iothr= ead.c index 49fb1ef1ea..a5c163af7e 100644 --- a/tests/unit/test-block-iothread.c +++ b/tests/unit/test-block-iothread.c @@ -89,7 +89,7 @@ static void test_sync_op_pread(BdrvChild *c) =20 /* Success */ ret =3D bdrv_pread(c, 0, sizeof(buf), buf, 0); - g_assert_cmpint(ret, =3D=3D, 512); + g_assert_cmpint(ret, =3D=3D, 0); =20 /* Early error: Negative offset */ ret =3D bdrv_pread(c, -2, sizeof(buf), buf, 0); @@ -103,7 +103,7 @@ static void test_sync_op_pwrite(BdrvChild *c) =20 /* Success */ ret =3D bdrv_pwrite(c, 0, sizeof(buf), buf, 0); - g_assert_cmpint(ret, =3D=3D, 512); + g_assert_cmpint(ret, =3D=3D, 0); =20 /* Early error: Negative offset */ ret =3D bdrv_pwrite(c, -2, sizeof(buf), buf, 0); --=20 2.35.3