From: "Philippe Mathieu-Daudé" <philmd@redhat.com>
To: Markus Armbruster <armbru@redhat.com>, qemu-devel@nongnu.org
Cc: "Marc-André Lureau" <marcandre.lureau@redhat.com>
Subject: Re: [PATCH 14/16] Remove superfluous ERRP_GUARD()
Date: Mon, 2 Aug 2021 21:00:25 +0200 [thread overview]
Message-ID: <ba1d0139-e4b6-32b7-6bf5-5d4a8e4ceed5@redhat.com> (raw)
In-Reply-To: <20210720125408.387910-15-armbru@redhat.com>
Cc'ing Marc-André as he recently disagreed with this.
On 7/20/21 2:54 PM, Markus Armbruster wrote:
> Macro ERRP_GUARD() is only needed when we want to dereference @errp or
> pass it to error_prepend() or error_append_hint(). Delete superfluous
> ones.
>
> Signed-off-by: Markus Armbruster <armbru@redhat.com>
> ---
> hw/remote/mpqemu-link.c | 3 ---
> qga/commands-posix-ssh.c | 17 -----------------
> qga/commands-win32.c | 1 -
> softmmu/vl.c | 1 -
> ui/console.c | 1 -
> 5 files changed, 23 deletions(-)
>
> diff --git a/hw/remote/mpqemu-link.c b/hw/remote/mpqemu-link.c
> index e67a5de72c..7e841820e5 100644
> --- a/hw/remote/mpqemu-link.c
> +++ b/hw/remote/mpqemu-link.c
> @@ -34,7 +34,6 @@
> */
> bool mpqemu_msg_send(MPQemuMsg *msg, QIOChannel *ioc, Error **errp)
> {
> - ERRP_GUARD();
> bool iolock = qemu_mutex_iothread_locked();
> bool iothread = qemu_in_iothread();
> struct iovec send[2] = {};
> @@ -97,7 +96,6 @@ bool mpqemu_msg_send(MPQemuMsg *msg, QIOChannel *ioc, Error **errp)
> static ssize_t mpqemu_read(QIOChannel *ioc, void *buf, size_t len, int **fds,
> size_t *nfds, Error **errp)
> {
> - ERRP_GUARD();
> struct iovec iov = { .iov_base = buf, .iov_len = len };
> bool iolock = qemu_mutex_iothread_locked();
> bool iothread = qemu_in_iothread();
> @@ -192,7 +190,6 @@ fail:
> uint64_t mpqemu_msg_send_and_await_reply(MPQemuMsg *msg, PCIProxyDev *pdev,
> Error **errp)
> {
> - ERRP_GUARD();
> MPQemuMsg msg_reply = {0};
> uint64_t ret = UINT64_MAX;
>
> diff --git a/qga/commands-posix-ssh.c b/qga/commands-posix-ssh.c
> index 2dda136d64..f3a580b8cc 100644
> --- a/qga/commands-posix-ssh.c
> +++ b/qga/commands-posix-ssh.c
> @@ -45,8 +45,6 @@ get_passwd_entry(const char *username, Error **errp)
> g_autoptr(GError) err = NULL;
> struct passwd *p;
>
> - ERRP_GUARD();
> -
> p = g_unix_get_passwd_entry_qemu(username, &err);
> if (p == NULL) {
> error_setg(errp, "failed to lookup user '%s': %s",
> @@ -61,8 +59,6 @@ static bool
> mkdir_for_user(const char *path, const struct passwd *p,
> mode_t mode, Error **errp)
> {
> - ERRP_GUARD();
> -
> if (g_mkdir(path, mode) == -1) {
> error_setg(errp, "failed to create directory '%s': %s",
> path, g_strerror(errno));
> @@ -87,8 +83,6 @@ mkdir_for_user(const char *path, const struct passwd *p,
> static bool
> check_openssh_pub_key(const char *key, Error **errp)
> {
> - ERRP_GUARD();
> -
> /* simple sanity-check, we may want more? */
> if (!key || key[0] == '#' || strchr(key, '\n')) {
> error_setg(errp, "invalid OpenSSH public key: '%s'", key);
> @@ -104,8 +98,6 @@ check_openssh_pub_keys(strList *keys, size_t *nkeys, Error **errp)
> size_t n = 0;
> strList *k;
>
> - ERRP_GUARD();
> -
> for (k = keys; k != NULL; k = k->next) {
> if (!check_openssh_pub_key(k->value, errp)) {
> return false;
> @@ -126,8 +118,6 @@ write_authkeys(const char *path, const GStrv keys,
> g_autofree char *contents = NULL;
> g_autoptr(GError) err = NULL;
>
> - ERRP_GUARD();
> -
> contents = g_strjoinv("\n", keys);
> if (!g_file_set_contents(path, contents, -1, &err)) {
> error_setg(errp, "failed to write to '%s': %s", path, err->message);
> @@ -155,8 +145,6 @@ read_authkeys(const char *path, Error **errp)
> g_autoptr(GError) err = NULL;
> g_autofree char *contents = NULL;
>
> - ERRP_GUARD();
> -
> if (!g_file_get_contents(path, &contents, NULL, &err)) {
> error_setg(errp, "failed to read '%s': %s", path, err->message);
> return NULL;
> @@ -178,7 +166,6 @@ qmp_guest_ssh_add_authorized_keys(const char *username, strList *keys,
> strList *k;
> size_t nkeys, nauthkeys;
>
> - ERRP_GUARD();
> reset = has_reset && reset;
>
> if (!check_openssh_pub_keys(keys, &nkeys, errp)) {
> @@ -228,8 +215,6 @@ qmp_guest_ssh_remove_authorized_keys(const char *username, strList *keys,
> GStrv a;
> size_t nkeys = 0;
>
> - ERRP_GUARD();
> -
> if (!check_openssh_pub_keys(keys, NULL, errp)) {
> return;
> }
> @@ -277,8 +262,6 @@ qmp_guest_ssh_get_authorized_keys(const char *username, Error **errp)
> g_autoptr(GuestAuthorizedKeys) ret = NULL;
> int i;
>
> - ERRP_GUARD();
> -
> p = get_passwd_entry(username, errp);
> if (p == NULL) {
> return NULL;
> diff --git a/qga/commands-win32.c b/qga/commands-win32.c
> index a099acb34d..a6d2c0d88e 100644
> --- a/qga/commands-win32.c
> +++ b/qga/commands-win32.c
> @@ -976,7 +976,6 @@ out:
>
> GuestDiskInfoList *qmp_guest_get_disks(Error **errp)
> {
> - ERRP_GUARD();
> GuestDiskInfoList *ret = NULL;
> HDEVINFO dev_info;
> SP_DEVICE_INTERFACE_DATA dev_iface_data;
> diff --git a/softmmu/vl.c b/softmmu/vl.c
> index 0d2db1abc3..f9ffeb8d4d 100644
> --- a/softmmu/vl.c
> +++ b/softmmu/vl.c
> @@ -1539,7 +1539,6 @@ machine_parse_property_opt(QemuOptsList *opts_list, const char *propname,
> {
> QDict *opts, *prop;
> bool help = false;
> - ERRP_GUARD();
>
> prop = keyval_parse(arg, opts_list->implied_opt_name, &help, errp);
> if (help) {
> diff --git a/ui/console.c b/ui/console.c
> index 5d2e6178ff..eabbbc951c 100644
> --- a/ui/console.c
> +++ b/ui/console.c
> @@ -1481,7 +1481,6 @@ static bool displaychangelistener_has_dmabuf(DisplayChangeListener *dcl)
> static bool dpy_compatible_with(QemuConsole *con,
> DisplayChangeListener *dcl, Error **errp)
> {
> - ERRP_GUARD();
> int flags;
>
> flags = con->hw_ops->get_flags ? con->hw_ops->get_flags(con->hw) : 0;
>
next prev parent reply other threads:[~2021-08-02 19:07 UTC|newest]
Thread overview: 51+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-07-20 12:53 [PATCH 00/16] Various error handling fixes and cleanups Markus Armbruster
2021-07-20 12:53 ` [PATCH 01/16] error: Use error_fatal to simplify obvious fatal errors (again) Markus Armbruster
2021-07-20 13:42 ` Eric Blake
2021-07-20 17:55 ` Peter Xu
2021-08-02 19:02 ` Philippe Mathieu-Daudé
2021-08-03 5:44 ` Markus Armbruster
2021-07-20 12:53 ` [PATCH 02/16] spapr: Plug memory leak when we can't add a migration blocker Markus Armbruster
2021-07-20 13:12 ` David Gibson
2021-08-02 18:54 ` Philippe Mathieu-Daudé
2021-07-20 12:53 ` [PATCH 03/16] spapr: Explain purpose of ->fwnmi_migration_blocker more clearly Markus Armbruster
2021-07-21 6:08 ` David Gibson
2021-07-20 12:53 ` [PATCH 04/16] multi-process: Fix pci_proxy_dev_realize() error handling Markus Armbruster
2021-07-20 18:02 ` Philippe Mathieu-Daudé
2021-07-20 20:02 ` Jag Raman
2021-07-20 12:53 ` [PATCH 05/16] vhost-scsi: Plug memory leak on migrate_add_blocker() failure Markus Armbruster
2021-07-20 12:53 ` [PATCH 06/16] i386: Never free migration blocker objects instead of sometimes Markus Armbruster
2021-07-20 12:53 ` [PATCH 07/16] vfio: Avoid error_propagate() after migrate_add_blocker() Markus Armbruster
2021-07-20 18:03 ` Philippe Mathieu-Daudé
2021-07-21 6:24 ` Kirti Wankhede
2021-07-21 9:26 ` Paolo Bonzini
2021-07-21 14:12 ` Markus Armbruster
2021-07-20 12:54 ` [PATCH 08/16] whpx nvmm: Drop useless migrate_del_blocker() Markus Armbruster
2021-07-22 8:04 ` Reinoud Zandijk
2021-07-20 12:54 ` [PATCH 09/16] migration: Unify failure check for migrate_add_blocker() Markus Armbruster
2021-07-20 18:05 ` Philippe Mathieu-Daudé
2021-07-20 12:54 ` [PATCH 10/16] migration: Handle migration_incoming_setup() errors consistently Markus Armbruster
2021-07-20 18:53 ` Eric Blake
2021-07-21 14:12 ` Markus Armbruster
2021-07-20 21:55 ` Pankaj Gupta
2021-08-02 17:53 ` Dr. David Alan Gilbert
2021-08-03 5:58 ` Markus Armbruster
2021-08-31 12:47 ` Markus Armbruster
2021-07-20 12:54 ` [PATCH 11/16] microvm: Drop dead error handling in microvm_machine_state_init() Markus Armbruster
2021-07-20 13:36 ` Sergio Lopez
2021-07-20 18:06 ` Philippe Mathieu-Daudé
2021-07-20 21:59 ` Pankaj Gupta
2021-07-20 12:54 ` [PATCH 12/16] vhost: Clean up how VhostOpts method vhost_get_config() fails Markus Armbruster
2021-08-02 18:56 ` Philippe Mathieu-Daudé
2021-08-02 18:58 ` Philippe Mathieu-Daudé
2021-08-03 5:48 ` Markus Armbruster
2021-07-20 12:54 ` [PATCH 13/16] vhost: Clean up how VhostOpts method vhost_backend_init() fails Markus Armbruster
2021-08-02 18:59 ` Philippe Mathieu-Daudé
2021-07-20 12:54 ` [PATCH 14/16] Remove superfluous ERRP_GUARD() Markus Armbruster
2021-08-02 19:00 ` Philippe Mathieu-Daudé [this message]
2021-07-20 12:54 ` [PATCH 15/16] vl: Clean up -smp error handling Markus Armbruster
2021-07-20 18:07 ` Philippe Mathieu-Daudé
2021-07-20 12:54 ` [PATCH 16/16] vl: Don't continue after -smp help Markus Armbruster
2021-07-20 18:08 ` [PATCH-for-6.1? " Philippe Mathieu-Daudé
2021-07-20 21:57 ` [PATCH " Pankaj Gupta
2021-07-24 0:30 ` [PATCH 00/16] Various error handling fixes and cleanups Michael S. Tsirkin
2021-07-29 13:23 ` Markus Armbruster
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=ba1d0139-e4b6-32b7-6bf5-5d4a8e4ceed5@redhat.com \
--to=philmd@redhat.com \
--cc=armbru@redhat.com \
--cc=marcandre.lureau@redhat.com \
--cc=qemu-devel@nongnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).