]> git.ipfire.org Git - thirdparty/qemu.git/blame - block.c
block: Rename BDRV_O_INCOMING to BDRV_O_INACTIVE
[thirdparty/qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
3990d09a 24#include "config-host.h"
faf07963 25#include "qemu-common.h"
6d519a5f 26#include "trace.h"
737e150e
PB
27#include "block/block_int.h"
28#include "block/blockjob.h"
d49b6836 29#include "qemu/error-report.h"
1de7afc9 30#include "qemu/module.h"
cc7a8ea7 31#include "qapi/qmp/qerror.h"
91a097e7 32#include "qapi/qmp/qbool.h"
7b1b5d19 33#include "qapi/qmp/qjson.h"
bfb197e0 34#include "sysemu/block-backend.h"
9c17d615 35#include "sysemu/sysemu.h"
1de7afc9 36#include "qemu/notify.h"
10817bf0 37#include "qemu/coroutine.h"
c13163fb 38#include "block/qapi.h"
b2023818 39#include "qmp-commands.h"
1de7afc9 40#include "qemu/timer.h"
a5ee7bd4 41#include "qapi-event.h"
db628338 42#include "block/throttle-groups.h"
fc01f7e7 43
71e72a19 44#ifdef CONFIG_BSD
7674e7bf
FB
45#include <sys/types.h>
46#include <sys/stat.h>
47#include <sys/ioctl.h>
72cf2d4f 48#include <sys/queue.h>
c5e97233 49#ifndef __DragonFly__
7674e7bf
FB
50#include <sys/disk.h>
51#endif
c5e97233 52#endif
7674e7bf 53
49dc768d
AL
54#ifdef _WIN32
55#include <windows.h>
56#endif
57
9bd2b08f
JS
58/**
59 * A BdrvDirtyBitmap can be in three possible states:
60 * (1) successor is NULL and disabled is false: full r/w mode
61 * (2) successor is NULL and disabled is true: read only mode ("disabled")
62 * (3) successor is set: frozen mode.
63 * A frozen bitmap cannot be renamed, deleted, anonymized, cleared, set,
64 * or enabled. A frozen bitmap can only abdicate() or reclaim().
65 */
e4654d2d 66struct BdrvDirtyBitmap {
aa0c7ca5
JS
67 HBitmap *bitmap; /* Dirty sector bitmap implementation */
68 BdrvDirtyBitmap *successor; /* Anonymous child; implies frozen status */
69 char *name; /* Optional non-empty unique ID */
70 int64_t size; /* Size of the bitmap (Number of sectors) */
71 bool disabled; /* Bitmap is read-only */
e4654d2d
FZ
72 QLIST_ENTRY(BdrvDirtyBitmap) list;
73};
74
1c9805a3
SH
75#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
76
c69a4dd8 77struct BdrvStates bdrv_states = QTAILQ_HEAD_INITIALIZER(bdrv_states);
7ee930d0 78
dc364f4c
BC
79static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
80 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
81
8a22f02a
SH
82static QLIST_HEAD(, BlockDriver) bdrv_drivers =
83 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 84
f3930ed0
KW
85static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
86 const char *reference, QDict *options, int flags,
87 BlockDriverState *parent,
ce343771 88 const BdrvChildRole *child_role, Error **errp);
f3930ed0 89
ce1ffea8 90static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs);
eb852011
MA
91/* If non-zero, use only whitelisted block drivers */
92static int use_bdrv_whitelist;
93
9e0b22f4
SH
94#ifdef _WIN32
95static int is_windows_drive_prefix(const char *filename)
96{
97 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
98 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
99 filename[1] == ':');
100}
101
102int is_windows_drive(const char *filename)
103{
104 if (is_windows_drive_prefix(filename) &&
105 filename[2] == '\0')
106 return 1;
107 if (strstart(filename, "\\\\.\\", NULL) ||
108 strstart(filename, "//./", NULL))
109 return 1;
110 return 0;
111}
112#endif
113
339064d5
KW
114size_t bdrv_opt_mem_align(BlockDriverState *bs)
115{
116 if (!bs || !bs->drv) {
459b4e66
DL
117 /* page size or 4k (hdd sector size) should be on the safe side */
118 return MAX(4096, getpagesize());
339064d5
KW
119 }
120
121 return bs->bl.opt_mem_alignment;
122}
123
4196d2f0
DL
124size_t bdrv_min_mem_align(BlockDriverState *bs)
125{
126 if (!bs || !bs->drv) {
459b4e66
DL
127 /* page size or 4k (hdd sector size) should be on the safe side */
128 return MAX(4096, getpagesize());
4196d2f0
DL
129 }
130
131 return bs->bl.min_mem_alignment;
132}
133
9e0b22f4 134/* check if the path starts with "<protocol>:" */
5c98415b 135int path_has_protocol(const char *path)
9e0b22f4 136{
947995c0
PB
137 const char *p;
138
9e0b22f4
SH
139#ifdef _WIN32
140 if (is_windows_drive(path) ||
141 is_windows_drive_prefix(path)) {
142 return 0;
143 }
947995c0
PB
144 p = path + strcspn(path, ":/\\");
145#else
146 p = path + strcspn(path, ":/");
9e0b22f4
SH
147#endif
148
947995c0 149 return *p == ':';
9e0b22f4
SH
150}
151
83f64091 152int path_is_absolute(const char *path)
3b0d4f61 153{
21664424
FB
154#ifdef _WIN32
155 /* specific case for names like: "\\.\d:" */
f53f4da9 156 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 157 return 1;
f53f4da9
PB
158 }
159 return (*path == '/' || *path == '\\');
3b9f94e1 160#else
f53f4da9 161 return (*path == '/');
3b9f94e1 162#endif
3b0d4f61
FB
163}
164
83f64091
FB
165/* if filename is absolute, just copy it to dest. Otherwise, build a
166 path to it by considering it is relative to base_path. URL are
167 supported. */
168void path_combine(char *dest, int dest_size,
169 const char *base_path,
170 const char *filename)
3b0d4f61 171{
83f64091
FB
172 const char *p, *p1;
173 int len;
174
175 if (dest_size <= 0)
176 return;
177 if (path_is_absolute(filename)) {
178 pstrcpy(dest, dest_size, filename);
179 } else {
180 p = strchr(base_path, ':');
181 if (p)
182 p++;
183 else
184 p = base_path;
3b9f94e1
FB
185 p1 = strrchr(base_path, '/');
186#ifdef _WIN32
187 {
188 const char *p2;
189 p2 = strrchr(base_path, '\\');
190 if (!p1 || p2 > p1)
191 p1 = p2;
192 }
193#endif
83f64091
FB
194 if (p1)
195 p1++;
196 else
197 p1 = base_path;
198 if (p1 > p)
199 p = p1;
200 len = p - base_path;
201 if (len > dest_size - 1)
202 len = dest_size - 1;
203 memcpy(dest, base_path, len);
204 dest[len] = '\0';
205 pstrcat(dest, dest_size, filename);
3b0d4f61 206 }
3b0d4f61
FB
207}
208
0a82855a
HR
209void bdrv_get_full_backing_filename_from_filename(const char *backed,
210 const char *backing,
9f07429e
HR
211 char *dest, size_t sz,
212 Error **errp)
dc5a1371 213{
9f07429e
HR
214 if (backing[0] == '\0' || path_has_protocol(backing) ||
215 path_is_absolute(backing))
216 {
0a82855a 217 pstrcpy(dest, sz, backing);
9f07429e
HR
218 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
219 error_setg(errp, "Cannot use relative backing file names for '%s'",
220 backed);
dc5a1371 221 } else {
0a82855a 222 path_combine(dest, sz, backed, backing);
dc5a1371
PB
223 }
224}
225
9f07429e
HR
226void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
227 Error **errp)
0a82855a 228{
9f07429e
HR
229 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
230
231 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
232 dest, sz, errp);
0a82855a
HR
233}
234
0eb7217e
SH
235void bdrv_register(BlockDriver *bdrv)
236{
237 bdrv_setup_io_funcs(bdrv);
b2e12bc6 238
8a22f02a 239 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 240}
b338082b 241
7f06d47e 242BlockDriverState *bdrv_new_root(void)
b338082b 243{
7f06d47e 244 BlockDriverState *bs = bdrv_new();
e4e9986b 245
e4e9986b 246 QTAILQ_INSERT_TAIL(&bdrv_states, bs, device_list);
e4e9986b
MA
247 return bs;
248}
249
250BlockDriverState *bdrv_new(void)
251{
252 BlockDriverState *bs;
253 int i;
254
5839e53b 255 bs = g_new0(BlockDriverState, 1);
e4654d2d 256 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
257 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
258 QLIST_INIT(&bs->op_blockers[i]);
259 }
d7d512f6 260 notifier_list_init(&bs->close_notifiers);
d616b224 261 notifier_with_return_list_init(&bs->before_write_notifiers);
cc0681c4
BC
262 qemu_co_queue_init(&bs->throttled_reqs[0]);
263 qemu_co_queue_init(&bs->throttled_reqs[1]);
9fcb0251 264 bs->refcnt = 1;
dcd04228 265 bs->aio_context = qemu_get_aio_context();
d7d512f6 266
b338082b
FB
267 return bs;
268}
269
d7d512f6
PB
270void bdrv_add_close_notifier(BlockDriverState *bs, Notifier *notify)
271{
272 notifier_list_add(&bs->close_notifiers, notify);
273}
274
ea2384d3
FB
275BlockDriver *bdrv_find_format(const char *format_name)
276{
277 BlockDriver *drv1;
8a22f02a
SH
278 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
279 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 280 return drv1;
8a22f02a 281 }
ea2384d3
FB
282 }
283 return NULL;
284}
285
b64ec4e4 286static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 287{
b64ec4e4
FZ
288 static const char *whitelist_rw[] = {
289 CONFIG_BDRV_RW_WHITELIST
290 };
291 static const char *whitelist_ro[] = {
292 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
293 };
294 const char **p;
295
b64ec4e4 296 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 297 return 1; /* no whitelist, anything goes */
b64ec4e4 298 }
eb852011 299
b64ec4e4 300 for (p = whitelist_rw; *p; p++) {
eb852011
MA
301 if (!strcmp(drv->format_name, *p)) {
302 return 1;
303 }
304 }
b64ec4e4
FZ
305 if (read_only) {
306 for (p = whitelist_ro; *p; p++) {
307 if (!strcmp(drv->format_name, *p)) {
308 return 1;
309 }
310 }
311 }
eb852011
MA
312 return 0;
313}
314
5b7e1542
ZYW
315typedef struct CreateCo {
316 BlockDriver *drv;
317 char *filename;
83d0521a 318 QemuOpts *opts;
5b7e1542 319 int ret;
cc84d90f 320 Error *err;
5b7e1542
ZYW
321} CreateCo;
322
323static void coroutine_fn bdrv_create_co_entry(void *opaque)
324{
cc84d90f
HR
325 Error *local_err = NULL;
326 int ret;
327
5b7e1542
ZYW
328 CreateCo *cco = opaque;
329 assert(cco->drv);
330
c282e1fd 331 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
84d18f06 332 if (local_err) {
cc84d90f
HR
333 error_propagate(&cco->err, local_err);
334 }
335 cco->ret = ret;
5b7e1542
ZYW
336}
337
0e7e1989 338int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 339 QemuOpts *opts, Error **errp)
ea2384d3 340{
5b7e1542
ZYW
341 int ret;
342
343 Coroutine *co;
344 CreateCo cco = {
345 .drv = drv,
346 .filename = g_strdup(filename),
83d0521a 347 .opts = opts,
5b7e1542 348 .ret = NOT_DONE,
cc84d90f 349 .err = NULL,
5b7e1542
ZYW
350 };
351
c282e1fd 352 if (!drv->bdrv_create) {
cc84d90f 353 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
354 ret = -ENOTSUP;
355 goto out;
5b7e1542
ZYW
356 }
357
358 if (qemu_in_coroutine()) {
359 /* Fast-path if already in coroutine context */
360 bdrv_create_co_entry(&cco);
361 } else {
362 co = qemu_coroutine_create(bdrv_create_co_entry);
363 qemu_coroutine_enter(co, &cco);
364 while (cco.ret == NOT_DONE) {
b47ec2c4 365 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
366 }
367 }
368
369 ret = cco.ret;
cc84d90f 370 if (ret < 0) {
84d18f06 371 if (cco.err) {
cc84d90f
HR
372 error_propagate(errp, cco.err);
373 } else {
374 error_setg_errno(errp, -ret, "Could not create image");
375 }
376 }
0e7e1989 377
80168bff
LC
378out:
379 g_free(cco.filename);
5b7e1542 380 return ret;
ea2384d3
FB
381}
382
c282e1fd 383int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
384{
385 BlockDriver *drv;
cc84d90f
HR
386 Error *local_err = NULL;
387 int ret;
84a12e66 388
b65a5e12 389 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 390 if (drv == NULL) {
16905d71 391 return -ENOENT;
84a12e66
CH
392 }
393
c282e1fd 394 ret = bdrv_create(drv, filename, opts, &local_err);
84d18f06 395 if (local_err) {
cc84d90f
HR
396 error_propagate(errp, local_err);
397 }
398 return ret;
84a12e66
CH
399}
400
892b7de8
ET
401/**
402 * Try to get @bs's logical and physical block size.
403 * On success, store them in @bsz struct and return 0.
404 * On failure return -errno.
405 * @bs must not be empty.
406 */
407int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
408{
409 BlockDriver *drv = bs->drv;
410
411 if (drv && drv->bdrv_probe_blocksizes) {
412 return drv->bdrv_probe_blocksizes(bs, bsz);
413 }
414
415 return -ENOTSUP;
416}
417
418/**
419 * Try to get @bs's geometry (cyls, heads, sectors).
420 * On success, store them in @geo struct and return 0.
421 * On failure return -errno.
422 * @bs must not be empty.
423 */
424int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
425{
426 BlockDriver *drv = bs->drv;
427
428 if (drv && drv->bdrv_probe_geometry) {
429 return drv->bdrv_probe_geometry(bs, geo);
430 }
431
432 return -ENOTSUP;
433}
434
eba25057
JM
435/*
436 * Create a uniquely-named empty temporary file.
437 * Return 0 upon success, otherwise a negative errno value.
438 */
439int get_tmp_filename(char *filename, int size)
d5249393 440{
eba25057 441#ifdef _WIN32
3b9f94e1 442 char temp_dir[MAX_PATH];
eba25057
JM
443 /* GetTempFileName requires that its output buffer (4th param)
444 have length MAX_PATH or greater. */
445 assert(size >= MAX_PATH);
446 return (GetTempPath(MAX_PATH, temp_dir)
447 && GetTempFileName(temp_dir, "qem", 0, filename)
448 ? 0 : -GetLastError());
d5249393 449#else
67b915a5 450 int fd;
7ccfb2eb 451 const char *tmpdir;
0badc1ee 452 tmpdir = getenv("TMPDIR");
69bef793
AS
453 if (!tmpdir) {
454 tmpdir = "/var/tmp";
455 }
eba25057
JM
456 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
457 return -EOVERFLOW;
458 }
ea2384d3 459 fd = mkstemp(filename);
fe235a06
DH
460 if (fd < 0) {
461 return -errno;
462 }
463 if (close(fd) != 0) {
464 unlink(filename);
eba25057
JM
465 return -errno;
466 }
467 return 0;
d5249393 468#endif
eba25057 469}
fc01f7e7 470
84a12e66
CH
471/*
472 * Detect host devices. By convention, /dev/cdrom[N] is always
473 * recognized as a host CDROM.
474 */
475static BlockDriver *find_hdev_driver(const char *filename)
476{
477 int score_max = 0, score;
478 BlockDriver *drv = NULL, *d;
479
480 QLIST_FOREACH(d, &bdrv_drivers, list) {
481 if (d->bdrv_probe_device) {
482 score = d->bdrv_probe_device(filename);
483 if (score > score_max) {
484 score_max = score;
485 drv = d;
486 }
487 }
488 }
489
490 return drv;
491}
492
98289620 493BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
494 bool allow_protocol_prefix,
495 Error **errp)
83f64091
FB
496{
497 BlockDriver *drv1;
498 char protocol[128];
1cec71e3 499 int len;
83f64091 500 const char *p;
19cb3738 501
66f82cee
KW
502 /* TODO Drivers without bdrv_file_open must be specified explicitly */
503
39508e7a
CH
504 /*
505 * XXX(hch): we really should not let host device detection
506 * override an explicit protocol specification, but moving this
507 * later breaks access to device names with colons in them.
508 * Thanks to the brain-dead persistent naming schemes on udev-
509 * based Linux systems those actually are quite common.
510 */
511 drv1 = find_hdev_driver(filename);
512 if (drv1) {
513 return drv1;
514 }
515
98289620 516 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 517 return &bdrv_file;
84a12e66 518 }
98289620 519
9e0b22f4
SH
520 p = strchr(filename, ':');
521 assert(p != NULL);
1cec71e3
AL
522 len = p - filename;
523 if (len > sizeof(protocol) - 1)
524 len = sizeof(protocol) - 1;
525 memcpy(protocol, filename, len);
526 protocol[len] = '\0';
8a22f02a 527 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
5fafdf24 528 if (drv1->protocol_name &&
8a22f02a 529 !strcmp(drv1->protocol_name, protocol)) {
83f64091 530 return drv1;
8a22f02a 531 }
83f64091 532 }
b65a5e12
HR
533
534 error_setg(errp, "Unknown protocol '%s'", protocol);
83f64091
FB
535 return NULL;
536}
537
c6684249
MA
538/*
539 * Guess image format by probing its contents.
540 * This is not a good idea when your image is raw (CVE-2008-2004), but
541 * we do it anyway for backward compatibility.
542 *
543 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
544 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
545 * but can be smaller if the image file is smaller)
c6684249
MA
546 * @filename is its filename.
547 *
548 * For all block drivers, call the bdrv_probe() method to get its
549 * probing score.
550 * Return the first block driver with the highest probing score.
551 */
38f3ef57
KW
552BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
553 const char *filename)
c6684249
MA
554{
555 int score_max = 0, score;
556 BlockDriver *drv = NULL, *d;
557
558 QLIST_FOREACH(d, &bdrv_drivers, list) {
559 if (d->bdrv_probe) {
560 score = d->bdrv_probe(buf, buf_size, filename);
561 if (score > score_max) {
562 score_max = score;
563 drv = d;
564 }
565 }
566 }
567
568 return drv;
569}
570
f500a6d3 571static int find_image_format(BlockDriverState *bs, const char *filename,
34b5d2c6 572 BlockDriver **pdrv, Error **errp)
f3a5d3f8 573{
c6684249 574 BlockDriver *drv;
7cddd372 575 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 576 int ret = 0;
f8ea0b00 577
08a00559 578 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
b192af8a 579 if (bdrv_is_sg(bs) || !bdrv_is_inserted(bs) || bdrv_getlength(bs) == 0) {
ef810437 580 *pdrv = &bdrv_raw;
c98ac35d 581 return ret;
1a396859 582 }
f8ea0b00 583
83f64091 584 ret = bdrv_pread(bs, 0, buf, sizeof(buf));
83f64091 585 if (ret < 0) {
34b5d2c6
HR
586 error_setg_errno(errp, -ret, "Could not read image for determining its "
587 "format");
c98ac35d
SW
588 *pdrv = NULL;
589 return ret;
83f64091
FB
590 }
591
c6684249 592 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 593 if (!drv) {
34b5d2c6
HR
594 error_setg(errp, "Could not determine image format: No compatible "
595 "driver found");
c98ac35d
SW
596 ret = -ENOENT;
597 }
598 *pdrv = drv;
599 return ret;
ea2384d3
FB
600}
601
51762288
SH
602/**
603 * Set the current 'total_sectors' value
65a9bb25 604 * Return 0 on success, -errno on error.
51762288
SH
605 */
606static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
607{
608 BlockDriver *drv = bs->drv;
609
396759ad 610 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 611 if (bdrv_is_sg(bs))
396759ad
NB
612 return 0;
613
51762288
SH
614 /* query actual device if possible, otherwise just trust the hint */
615 if (drv->bdrv_getlength) {
616 int64_t length = drv->bdrv_getlength(bs);
617 if (length < 0) {
618 return length;
619 }
7e382003 620 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
621 }
622
623 bs->total_sectors = hint;
624 return 0;
625}
626
cddff5ba
KW
627/**
628 * Combines a QDict of new block driver @options with any missing options taken
629 * from @old_options, so that leaving out an option defaults to its old value.
630 */
631static void bdrv_join_options(BlockDriverState *bs, QDict *options,
632 QDict *old_options)
633{
634 if (bs->drv && bs->drv->bdrv_join_options) {
635 bs->drv->bdrv_join_options(options, old_options);
636 } else {
637 qdict_join(options, old_options, false);
638 }
639}
640
9e8f1835
PB
641/**
642 * Set open flags for a given discard mode
643 *
644 * Return 0 on success, -1 if the discard mode was invalid.
645 */
646int bdrv_parse_discard_flags(const char *mode, int *flags)
647{
648 *flags &= ~BDRV_O_UNMAP;
649
650 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
651 /* do nothing */
652 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
653 *flags |= BDRV_O_UNMAP;
654 } else {
655 return -1;
656 }
657
658 return 0;
659}
660
c3993cdc
SH
661/**
662 * Set open flags for a given cache mode
663 *
664 * Return 0 on success, -1 if the cache mode was invalid.
665 */
666int bdrv_parse_cache_flags(const char *mode, int *flags)
667{
668 *flags &= ~BDRV_O_CACHE_MASK;
669
670 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
671 *flags |= BDRV_O_NOCACHE | BDRV_O_CACHE_WB;
92196b2f
SH
672 } else if (!strcmp(mode, "directsync")) {
673 *flags |= BDRV_O_NOCACHE;
c3993cdc
SH
674 } else if (!strcmp(mode, "writeback")) {
675 *flags |= BDRV_O_CACHE_WB;
676 } else if (!strcmp(mode, "unsafe")) {
677 *flags |= BDRV_O_CACHE_WB;
678 *flags |= BDRV_O_NO_FLUSH;
679 } else if (!strcmp(mode, "writethrough")) {
680 /* this is the default */
681 } else {
682 return -1;
683 }
684
685 return 0;
686}
687
b1e6fc08
KW
688/*
689 * Returns the flags that a temporary snapshot should get, based on the
690 * originally requested flags (the originally requested image will have flags
691 * like a backing file)
692 */
693static int bdrv_temp_snapshot_flags(int flags)
694{
695 return (flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
696}
697
0b50cc88 698/*
8e2160e2
KW
699 * Returns the options and flags that bs->file should get if a protocol driver
700 * is expected, based on the given options and flags for the parent BDS
0b50cc88 701 */
8e2160e2
KW
702static void bdrv_inherited_options(int *child_flags, QDict *child_options,
703 int parent_flags, QDict *parent_options)
0b50cc88 704{
8e2160e2
KW
705 int flags = parent_flags;
706
0b50cc88
KW
707 /* Enable protocol handling, disable format probing for bs->file */
708 flags |= BDRV_O_PROTOCOL;
709
91a097e7
KW
710 /* If the cache mode isn't explicitly set, inherit direct and no-flush from
711 * the parent. */
712 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
713 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
714
0b50cc88 715 /* Our block drivers take care to send flushes and respect unmap policy,
91a097e7
KW
716 * so we can default to enable both on lower layers regardless of the
717 * corresponding parent options. */
718 qdict_set_default_str(child_options, BDRV_OPT_CACHE_WB, "on");
719 flags |= BDRV_O_UNMAP;
0b50cc88 720
0b50cc88 721 /* Clear flags that only apply to the top layer */
5669b44d 722 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ);
0b50cc88 723
8e2160e2 724 *child_flags = flags;
0b50cc88
KW
725}
726
f3930ed0 727const BdrvChildRole child_file = {
8e2160e2 728 .inherit_options = bdrv_inherited_options,
f3930ed0
KW
729};
730
731/*
8e2160e2
KW
732 * Returns the options and flags that bs->file should get if the use of formats
733 * (and not only protocols) is permitted for it, based on the given options and
734 * flags for the parent BDS
f3930ed0 735 */
8e2160e2
KW
736static void bdrv_inherited_fmt_options(int *child_flags, QDict *child_options,
737 int parent_flags, QDict *parent_options)
f3930ed0 738{
8e2160e2
KW
739 child_file.inherit_options(child_flags, child_options,
740 parent_flags, parent_options);
741
742 *child_flags &= ~BDRV_O_PROTOCOL;
f3930ed0
KW
743}
744
745const BdrvChildRole child_format = {
8e2160e2 746 .inherit_options = bdrv_inherited_fmt_options,
f3930ed0
KW
747};
748
317fc44e 749/*
8e2160e2
KW
750 * Returns the options and flags that bs->backing should get, based on the
751 * given options and flags for the parent BDS
317fc44e 752 */
8e2160e2
KW
753static void bdrv_backing_options(int *child_flags, QDict *child_options,
754 int parent_flags, QDict *parent_options)
317fc44e 755{
8e2160e2
KW
756 int flags = parent_flags;
757
91a097e7
KW
758 /* The cache mode is inherited unmodified for backing files */
759 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_WB);
760 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
761 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
762
317fc44e
KW
763 /* backing files always opened read-only */
764 flags &= ~(BDRV_O_RDWR | BDRV_O_COPY_ON_READ);
765
766 /* snapshot=on is handled on the top layer */
8bfea15d 767 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e 768
8e2160e2 769 *child_flags = flags;
317fc44e
KW
770}
771
f3930ed0 772static const BdrvChildRole child_backing = {
8e2160e2 773 .inherit_options = bdrv_backing_options,
f3930ed0
KW
774};
775
7b272452
KW
776static int bdrv_open_flags(BlockDriverState *bs, int flags)
777{
778 int open_flags = flags | BDRV_O_CACHE_WB;
779
780 /*
781 * Clear flags that are internal to the block layer before opening the
782 * image.
783 */
20cca275 784 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
785
786 /*
787 * Snapshots should be writable.
788 */
8bfea15d 789 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
790 open_flags |= BDRV_O_RDWR;
791 }
792
793 return open_flags;
794}
795
91a097e7
KW
796static void update_flags_from_options(int *flags, QemuOpts *opts)
797{
798 *flags &= ~BDRV_O_CACHE_MASK;
799
800 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_WB));
801 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_WB, false)) {
802 *flags |= BDRV_O_CACHE_WB;
803 }
804
805 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_NO_FLUSH));
806 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_NO_FLUSH, false)) {
807 *flags |= BDRV_O_NO_FLUSH;
808 }
809
810 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_DIRECT));
811 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_DIRECT, false)) {
812 *flags |= BDRV_O_NOCACHE;
813 }
814}
815
816static void update_options_from_flags(QDict *options, int flags)
817{
818 if (!qdict_haskey(options, BDRV_OPT_CACHE_WB)) {
819 qdict_put(options, BDRV_OPT_CACHE_WB,
820 qbool_from_bool(flags & BDRV_O_CACHE_WB));
821 }
822 if (!qdict_haskey(options, BDRV_OPT_CACHE_DIRECT)) {
823 qdict_put(options, BDRV_OPT_CACHE_DIRECT,
824 qbool_from_bool(flags & BDRV_O_NOCACHE));
825 }
826 if (!qdict_haskey(options, BDRV_OPT_CACHE_NO_FLUSH)) {
827 qdict_put(options, BDRV_OPT_CACHE_NO_FLUSH,
828 qbool_from_bool(flags & BDRV_O_NO_FLUSH));
829 }
830}
831
636ea370
KW
832static void bdrv_assign_node_name(BlockDriverState *bs,
833 const char *node_name,
834 Error **errp)
6913c0c2 835{
15489c76 836 char *gen_node_name = NULL;
6913c0c2 837
15489c76
JC
838 if (!node_name) {
839 node_name = gen_node_name = id_generate(ID_BLOCK);
840 } else if (!id_wellformed(node_name)) {
841 /*
842 * Check for empty string or invalid characters, but not if it is
843 * generated (generated names use characters not available to the user)
844 */
9aebf3b8 845 error_setg(errp, "Invalid node name");
636ea370 846 return;
6913c0c2
BC
847 }
848
0c5e94ee 849 /* takes care of avoiding namespaces collisions */
7f06d47e 850 if (blk_by_name(node_name)) {
0c5e94ee
BC
851 error_setg(errp, "node-name=%s is conflicting with a device id",
852 node_name);
15489c76 853 goto out;
0c5e94ee
BC
854 }
855
6913c0c2
BC
856 /* takes care of avoiding duplicates node names */
857 if (bdrv_find_node(node_name)) {
858 error_setg(errp, "Duplicate node name");
15489c76 859 goto out;
6913c0c2
BC
860 }
861
862 /* copy node name into the bs and insert it into the graph list */
863 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
864 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
15489c76
JC
865out:
866 g_free(gen_node_name);
6913c0c2
BC
867}
868
18edf289
KW
869static QemuOptsList bdrv_runtime_opts = {
870 .name = "bdrv_common",
871 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
872 .desc = {
873 {
874 .name = "node-name",
875 .type = QEMU_OPT_STRING,
876 .help = "Node name of the block device node",
877 },
62392ebb
KW
878 {
879 .name = "driver",
880 .type = QEMU_OPT_STRING,
881 .help = "Block driver to use for the node",
882 },
91a097e7
KW
883 {
884 .name = BDRV_OPT_CACHE_WB,
885 .type = QEMU_OPT_BOOL,
886 .help = "Enable writeback mode",
887 },
888 {
889 .name = BDRV_OPT_CACHE_DIRECT,
890 .type = QEMU_OPT_BOOL,
891 .help = "Bypass software writeback cache on the host",
892 },
893 {
894 .name = BDRV_OPT_CACHE_NO_FLUSH,
895 .type = QEMU_OPT_BOOL,
896 .help = "Ignore flush requests",
897 },
18edf289
KW
898 { /* end of list */ }
899 },
900};
901
57915332
KW
902/*
903 * Common part for opening disk images and files
b6ad491a
KW
904 *
905 * Removes all processed options from *options.
57915332 906 */
9a4f4c31 907static int bdrv_open_common(BlockDriverState *bs, BdrvChild *file,
82dc8b41 908 QDict *options, Error **errp)
57915332
KW
909{
910 int ret, open_flags;
035fccdf 911 const char *filename;
62392ebb 912 const char *driver_name = NULL;
6913c0c2 913 const char *node_name = NULL;
18edf289 914 QemuOpts *opts;
62392ebb 915 BlockDriver *drv;
34b5d2c6 916 Error *local_err = NULL;
57915332 917
6405875c 918 assert(bs->file == NULL);
707ff828 919 assert(options != NULL && bs->options != options);
57915332 920
62392ebb
KW
921 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
922 qemu_opts_absorb_qdict(opts, options, &local_err);
923 if (local_err) {
924 error_propagate(errp, local_err);
925 ret = -EINVAL;
926 goto fail_opts;
927 }
928
929 driver_name = qemu_opt_get(opts, "driver");
930 drv = bdrv_find_format(driver_name);
931 assert(drv != NULL);
932
45673671 933 if (file != NULL) {
9a4f4c31 934 filename = file->bs->filename;
45673671
KW
935 } else {
936 filename = qdict_get_try_str(options, "filename");
937 }
938
765003db
KW
939 if (drv->bdrv_needs_filename && !filename) {
940 error_setg(errp, "The '%s' block driver requires a file name",
941 drv->format_name);
18edf289
KW
942 ret = -EINVAL;
943 goto fail_opts;
6913c0c2 944 }
6913c0c2 945
82dc8b41
KW
946 trace_bdrv_open_common(bs, filename ?: "", bs->open_flags,
947 drv->format_name);
62392ebb 948
18edf289 949 node_name = qemu_opt_get(opts, "node-name");
636ea370 950 bdrv_assign_node_name(bs, node_name, &local_err);
0fb6395c 951 if (local_err) {
636ea370 952 error_propagate(errp, local_err);
18edf289
KW
953 ret = -EINVAL;
954 goto fail_opts;
5d186eb0
KW
955 }
956
c25f53b0 957 bs->request_alignment = 512;
0d51b4de 958 bs->zero_beyond_eof = true;
82dc8b41 959 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
b64ec4e4
FZ
960
961 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
962 error_setg(errp,
963 !bs->read_only && bdrv_is_whitelisted(drv, true)
964 ? "Driver '%s' can only be used for read-only devices"
965 : "Driver '%s' is not whitelisted",
966 drv->format_name);
18edf289
KW
967 ret = -ENOTSUP;
968 goto fail_opts;
b64ec4e4 969 }
57915332 970
53fec9d3 971 assert(bs->copy_on_read == 0); /* bdrv_new() and bdrv_close() make it so */
82dc8b41 972 if (bs->open_flags & BDRV_O_COPY_ON_READ) {
0ebd24e0
KW
973 if (!bs->read_only) {
974 bdrv_enable_copy_on_read(bs);
975 } else {
976 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
977 ret = -EINVAL;
978 goto fail_opts;
0ebd24e0 979 }
53fec9d3
SH
980 }
981
c2ad1b0c
KW
982 if (filename != NULL) {
983 pstrcpy(bs->filename, sizeof(bs->filename), filename);
984 } else {
985 bs->filename[0] = '\0';
986 }
91af7014 987 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 988
57915332 989 bs->drv = drv;
7267c094 990 bs->opaque = g_malloc0(drv->instance_size);
57915332 991
91a097e7
KW
992 /* Apply cache mode options */
993 update_flags_from_options(&bs->open_flags, opts);
994 bdrv_set_enable_write_cache(bs, bs->open_flags & BDRV_O_CACHE_WB);
e7c63796 995
66f82cee 996 /* Open the image, either directly or using a protocol */
82dc8b41 997 open_flags = bdrv_open_flags(bs, bs->open_flags);
66f82cee 998 if (drv->bdrv_file_open) {
5d186eb0 999 assert(file == NULL);
030be321 1000 assert(!drv->bdrv_needs_filename || filename != NULL);
34b5d2c6 1001 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
f500a6d3 1002 } else {
2af5ef70 1003 if (file == NULL) {
34b5d2c6
HR
1004 error_setg(errp, "Can't use '%s' as a block driver for the "
1005 "protocol level", drv->format_name);
2af5ef70
KW
1006 ret = -EINVAL;
1007 goto free_and_fail;
1008 }
f500a6d3 1009 bs->file = file;
34b5d2c6 1010 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
66f82cee
KW
1011 }
1012
57915332 1013 if (ret < 0) {
84d18f06 1014 if (local_err) {
34b5d2c6 1015 error_propagate(errp, local_err);
2fa9aa59
DH
1016 } else if (bs->filename[0]) {
1017 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
34b5d2c6
HR
1018 } else {
1019 error_setg_errno(errp, -ret, "Could not open image");
1020 }
57915332
KW
1021 goto free_and_fail;
1022 }
1023
a1f688f4
MA
1024 if (bs->encrypted) {
1025 error_report("Encrypted images are deprecated");
1026 error_printf("Support for them will be removed in a future release.\n"
1027 "You can use 'qemu-img convert' to convert your image"
1028 " to an unencrypted one.\n");
1029 }
1030
51762288
SH
1031 ret = refresh_total_sectors(bs, bs->total_sectors);
1032 if (ret < 0) {
34b5d2c6 1033 error_setg_errno(errp, -ret, "Could not refresh total sector count");
51762288 1034 goto free_and_fail;
57915332 1035 }
51762288 1036
3baca891
KW
1037 bdrv_refresh_limits(bs, &local_err);
1038 if (local_err) {
1039 error_propagate(errp, local_err);
1040 ret = -EINVAL;
1041 goto free_and_fail;
1042 }
1043
c25f53b0 1044 assert(bdrv_opt_mem_align(bs) != 0);
4196d2f0 1045 assert(bdrv_min_mem_align(bs) != 0);
b192af8a 1046 assert((bs->request_alignment != 0) || bdrv_is_sg(bs));
18edf289
KW
1047
1048 qemu_opts_del(opts);
57915332
KW
1049 return 0;
1050
1051free_and_fail:
f500a6d3 1052 bs->file = NULL;
7267c094 1053 g_free(bs->opaque);
57915332
KW
1054 bs->opaque = NULL;
1055 bs->drv = NULL;
18edf289
KW
1056fail_opts:
1057 qemu_opts_del(opts);
57915332
KW
1058 return ret;
1059}
1060
5e5c4f63
KW
1061static QDict *parse_json_filename(const char *filename, Error **errp)
1062{
1063 QObject *options_obj;
1064 QDict *options;
1065 int ret;
1066
1067 ret = strstart(filename, "json:", &filename);
1068 assert(ret);
1069
1070 options_obj = qobject_from_json(filename);
1071 if (!options_obj) {
1072 error_setg(errp, "Could not parse the JSON options");
1073 return NULL;
1074 }
1075
1076 if (qobject_type(options_obj) != QTYPE_QDICT) {
1077 qobject_decref(options_obj);
1078 error_setg(errp, "Invalid JSON object given");
1079 return NULL;
1080 }
1081
1082 options = qobject_to_qdict(options_obj);
1083 qdict_flatten(options);
1084
1085 return options;
1086}
1087
de3b53f0
KW
1088static void parse_json_protocol(QDict *options, const char **pfilename,
1089 Error **errp)
1090{
1091 QDict *json_options;
1092 Error *local_err = NULL;
1093
1094 /* Parse json: pseudo-protocol */
1095 if (!*pfilename || !g_str_has_prefix(*pfilename, "json:")) {
1096 return;
1097 }
1098
1099 json_options = parse_json_filename(*pfilename, &local_err);
1100 if (local_err) {
1101 error_propagate(errp, local_err);
1102 return;
1103 }
1104
1105 /* Options given in the filename have lower priority than options
1106 * specified directly */
1107 qdict_join(options, json_options, false);
1108 QDECREF(json_options);
1109 *pfilename = NULL;
1110}
1111
b6ce07aa 1112/*
f54120ff
KW
1113 * Fills in default options for opening images and converts the legacy
1114 * filename/flags pair to option QDict entries.
53a29513
HR
1115 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
1116 * block driver has been specified explicitly.
b6ce07aa 1117 */
de3b53f0 1118static int bdrv_fill_options(QDict **options, const char *filename,
053e1578 1119 int *flags, Error **errp)
ea2384d3 1120{
c2ad1b0c 1121 const char *drvname;
53a29513 1122 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 1123 bool parse_filename = false;
053e1578 1124 BlockDriver *drv = NULL;
34b5d2c6 1125 Error *local_err = NULL;
83f64091 1126
53a29513 1127 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1128 if (drvname) {
1129 drv = bdrv_find_format(drvname);
1130 if (!drv) {
1131 error_setg(errp, "Unknown driver '%s'", drvname);
1132 return -ENOENT;
1133 }
1134 /* If the user has explicitly specified the driver, this choice should
1135 * override the BDRV_O_PROTOCOL flag */
1136 protocol = drv->bdrv_file_open;
53a29513
HR
1137 }
1138
1139 if (protocol) {
1140 *flags |= BDRV_O_PROTOCOL;
1141 } else {
1142 *flags &= ~BDRV_O_PROTOCOL;
1143 }
1144
91a097e7
KW
1145 /* Translate cache options from flags into options */
1146 update_options_from_flags(*options, *flags);
1147
035fccdf 1148 /* Fetch the file name from the options QDict if necessary */
17b005f1 1149 if (protocol && filename) {
f54120ff
KW
1150 if (!qdict_haskey(*options, "filename")) {
1151 qdict_put(*options, "filename", qstring_from_str(filename));
1152 parse_filename = true;
1153 } else {
1154 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1155 "the same time");
1156 return -EINVAL;
1157 }
035fccdf
KW
1158 }
1159
c2ad1b0c 1160 /* Find the right block driver */
f54120ff 1161 filename = qdict_get_try_str(*options, "filename");
f54120ff 1162
053e1578
HR
1163 if (!drvname && protocol) {
1164 if (filename) {
1165 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1166 if (!drv) {
053e1578 1167 return -EINVAL;
17b005f1 1168 }
053e1578
HR
1169
1170 drvname = drv->format_name;
1171 qdict_put(*options, "driver", qstring_from_str(drvname));
1172 } else {
1173 error_setg(errp, "Must specify either driver or file");
1174 return -EINVAL;
98289620 1175 }
c2ad1b0c
KW
1176 }
1177
17b005f1 1178 assert(drv || !protocol);
c2ad1b0c 1179
f54120ff 1180 /* Driver-specific filename parsing */
17b005f1 1181 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1182 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1183 if (local_err) {
34b5d2c6 1184 error_propagate(errp, local_err);
f54120ff 1185 return -EINVAL;
6963a30d 1186 }
cd5d031e
HR
1187
1188 if (!drv->bdrv_needs_filename) {
1189 qdict_del(*options, "filename");
cd5d031e 1190 }
6963a30d
KW
1191 }
1192
d44f928a 1193 if (runstate_check(RUN_STATE_INMIGRATE)) {
04c01a5c 1194 *flags |= BDRV_O_INACTIVE;
d44f928a
HR
1195 }
1196
f54120ff
KW
1197 return 0;
1198}
1199
b4b059f6
KW
1200static BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
1201 BlockDriverState *child_bs,
260fecf1 1202 const char *child_name,
b4b059f6 1203 const BdrvChildRole *child_role)
df581792
KW
1204{
1205 BdrvChild *child = g_new(BdrvChild, 1);
1206 *child = (BdrvChild) {
1207 .bs = child_bs,
260fecf1 1208 .name = g_strdup(child_name),
df581792
KW
1209 .role = child_role,
1210 };
1211
1212 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
d42a8a93 1213 QLIST_INSERT_HEAD(&child_bs->parents, child, next_parent);
b4b059f6
KW
1214
1215 return child;
df581792
KW
1216}
1217
3f09bfbc 1218static void bdrv_detach_child(BdrvChild *child)
33a60407
KW
1219{
1220 QLIST_REMOVE(child, next);
d42a8a93 1221 QLIST_REMOVE(child, next_parent);
260fecf1 1222 g_free(child->name);
33a60407
KW
1223 g_free(child);
1224}
1225
1226void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
1227{
779020cb
KW
1228 BlockDriverState *child_bs;
1229
1230 if (child == NULL) {
1231 return;
1232 }
33a60407
KW
1233
1234 if (child->bs->inherits_from == parent) {
1235 child->bs->inherits_from = NULL;
1236 }
1237
779020cb 1238 child_bs = child->bs;
33a60407
KW
1239 bdrv_detach_child(child);
1240 bdrv_unref(child_bs);
1241}
1242
5db15a57
KW
1243/*
1244 * Sets the backing file link of a BDS. A new reference is created; callers
1245 * which don't need their own reference any more must call bdrv_unref().
1246 */
8d24cce1
FZ
1247void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd)
1248{
5db15a57
KW
1249 if (backing_hd) {
1250 bdrv_ref(backing_hd);
1251 }
8d24cce1 1252
760e0063 1253 if (bs->backing) {
826b6ca0 1254 assert(bs->backing_blocker);
760e0063 1255 bdrv_op_unblock_all(bs->backing->bs, bs->backing_blocker);
5db15a57 1256 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
1257 } else if (backing_hd) {
1258 error_setg(&bs->backing_blocker,
81e5f78a
AG
1259 "node is used as backing hd of '%s'",
1260 bdrv_get_device_or_node_name(bs));
826b6ca0
FZ
1261 }
1262
8d24cce1 1263 if (!backing_hd) {
826b6ca0
FZ
1264 error_free(bs->backing_blocker);
1265 bs->backing_blocker = NULL;
760e0063 1266 bs->backing = NULL;
8d24cce1
FZ
1267 goto out;
1268 }
260fecf1 1269 bs->backing = bdrv_attach_child(bs, backing_hd, "backing", &child_backing);
8d24cce1
FZ
1270 bs->open_flags &= ~BDRV_O_NO_BACKING;
1271 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_hd->filename);
1272 pstrcpy(bs->backing_format, sizeof(bs->backing_format),
1273 backing_hd->drv ? backing_hd->drv->format_name : "");
826b6ca0 1274
760e0063 1275 bdrv_op_block_all(backing_hd, bs->backing_blocker);
826b6ca0 1276 /* Otherwise we won't be able to commit due to check in bdrv_commit */
760e0063 1277 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
826b6ca0 1278 bs->backing_blocker);
8d24cce1 1279out:
3baca891 1280 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
1281}
1282
31ca6d07
KW
1283/*
1284 * Opens the backing file for a BlockDriverState if not yet open
1285 *
d9b7b057
KW
1286 * bdref_key specifies the key for the image's BlockdevRef in the options QDict.
1287 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1288 * itself, all options starting with "${bdref_key}." are considered part of the
1289 * BlockdevRef.
1290 *
1291 * TODO Can this be unified with bdrv_open_image()?
31ca6d07 1292 */
d9b7b057
KW
1293int bdrv_open_backing_file(BlockDriverState *bs, QDict *parent_options,
1294 const char *bdref_key, Error **errp)
9156df12 1295{
1ba4b6a5 1296 char *backing_filename = g_malloc0(PATH_MAX);
d9b7b057
KW
1297 char *bdref_key_dot;
1298 const char *reference = NULL;
317fc44e 1299 int ret = 0;
8d24cce1 1300 BlockDriverState *backing_hd;
d9b7b057
KW
1301 QDict *options;
1302 QDict *tmp_parent_options = NULL;
34b5d2c6 1303 Error *local_err = NULL;
9156df12 1304
760e0063 1305 if (bs->backing != NULL) {
1ba4b6a5 1306 goto free_exit;
9156df12
PB
1307 }
1308
31ca6d07 1309 /* NULL means an empty set of options */
d9b7b057
KW
1310 if (parent_options == NULL) {
1311 tmp_parent_options = qdict_new();
1312 parent_options = tmp_parent_options;
31ca6d07
KW
1313 }
1314
9156df12 1315 bs->open_flags &= ~BDRV_O_NO_BACKING;
d9b7b057
KW
1316
1317 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1318 qdict_extract_subqdict(parent_options, &options, bdref_key_dot);
1319 g_free(bdref_key_dot);
1320
1321 reference = qdict_get_try_str(parent_options, bdref_key);
1322 if (reference || qdict_haskey(options, "file.filename")) {
1cb6f506
KW
1323 backing_filename[0] = '\0';
1324 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 1325 QDECREF(options);
1ba4b6a5 1326 goto free_exit;
dbecebdd 1327 } else {
9f07429e
HR
1328 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
1329 &local_err);
1330 if (local_err) {
1331 ret = -EINVAL;
1332 error_propagate(errp, local_err);
1333 QDECREF(options);
1334 goto free_exit;
1335 }
9156df12
PB
1336 }
1337
8ee79e70
KW
1338 if (!bs->drv || !bs->drv->supports_backing) {
1339 ret = -EINVAL;
1340 error_setg(errp, "Driver doesn't support backing files");
1341 QDECREF(options);
1342 goto free_exit;
1343 }
1344
c5f6e493
KW
1345 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
1346 qdict_put(options, "driver", qstring_from_str(bs->backing_format));
9156df12
PB
1347 }
1348
d9b7b057 1349 backing_hd = NULL;
f3930ed0
KW
1350 ret = bdrv_open_inherit(&backing_hd,
1351 *backing_filename ? backing_filename : NULL,
d9b7b057 1352 reference, options, 0, bs, &child_backing,
e43bfd9c 1353 errp);
9156df12 1354 if (ret < 0) {
9156df12 1355 bs->open_flags |= BDRV_O_NO_BACKING;
e43bfd9c 1356 error_prepend(errp, "Could not open backing file: ");
1ba4b6a5 1357 goto free_exit;
9156df12 1358 }
df581792 1359
5db15a57
KW
1360 /* Hook up the backing file link; drop our reference, bs owns the
1361 * backing_hd reference now */
8d24cce1 1362 bdrv_set_backing_hd(bs, backing_hd);
5db15a57 1363 bdrv_unref(backing_hd);
d80ac658 1364
d9b7b057
KW
1365 qdict_del(parent_options, bdref_key);
1366
1ba4b6a5
BC
1367free_exit:
1368 g_free(backing_filename);
d9b7b057 1369 QDECREF(tmp_parent_options);
1ba4b6a5 1370 return ret;
9156df12
PB
1371}
1372
da557aac
HR
1373/*
1374 * Opens a disk image whose options are given as BlockdevRef in another block
1375 * device's options.
1376 *
da557aac 1377 * If allow_none is true, no image will be opened if filename is false and no
b4b059f6 1378 * BlockdevRef is given. NULL will be returned, but errp remains unset.
da557aac
HR
1379 *
1380 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
1381 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1382 * itself, all options starting with "${bdref_key}." are considered part of the
1383 * BlockdevRef.
1384 *
1385 * The BlockdevRef will be removed from the options QDict.
1386 */
b4b059f6
KW
1387BdrvChild *bdrv_open_child(const char *filename,
1388 QDict *options, const char *bdref_key,
1389 BlockDriverState* parent,
1390 const BdrvChildRole *child_role,
1391 bool allow_none, Error **errp)
da557aac 1392{
b4b059f6
KW
1393 BdrvChild *c = NULL;
1394 BlockDriverState *bs;
da557aac
HR
1395 QDict *image_options;
1396 int ret;
1397 char *bdref_key_dot;
1398 const char *reference;
1399
df581792 1400 assert(child_role != NULL);
f67503e5 1401
da557aac
HR
1402 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1403 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
1404 g_free(bdref_key_dot);
1405
1406 reference = qdict_get_try_str(options, bdref_key);
1407 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 1408 if (!allow_none) {
da557aac
HR
1409 error_setg(errp, "A block device must be specified for \"%s\"",
1410 bdref_key);
da557aac 1411 }
b20e61e0 1412 QDECREF(image_options);
da557aac
HR
1413 goto done;
1414 }
1415
b4b059f6
KW
1416 bs = NULL;
1417 ret = bdrv_open_inherit(&bs, filename, reference, image_options, 0,
ce343771 1418 parent, child_role, errp);
df581792
KW
1419 if (ret < 0) {
1420 goto done;
1421 }
1422
260fecf1 1423 c = bdrv_attach_child(parent, bs, bdref_key, child_role);
da557aac
HR
1424
1425done:
1426 qdict_del(options, bdref_key);
b4b059f6
KW
1427 return c;
1428}
1429
6b8aeca5 1430int bdrv_append_temp_snapshot(BlockDriverState *bs, int flags, Error **errp)
b998875d
KW
1431{
1432 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 1433 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 1434 int64_t total_size;
83d0521a 1435 QemuOpts *opts = NULL;
b998875d
KW
1436 QDict *snapshot_options;
1437 BlockDriverState *bs_snapshot;
c2e0dbbf 1438 Error *local_err = NULL;
b998875d
KW
1439 int ret;
1440
1441 /* if snapshot, we create a temporary backing file and open it
1442 instead of opening 'filename' directly */
1443
1444 /* Get the required size from the image */
f187743a
KW
1445 total_size = bdrv_getlength(bs);
1446 if (total_size < 0) {
6b8aeca5 1447 ret = total_size;
f187743a 1448 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 1449 goto out;
f187743a 1450 }
b998875d
KW
1451
1452 /* Create the temporary image */
1ba4b6a5 1453 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
1454 if (ret < 0) {
1455 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 1456 goto out;
b998875d
KW
1457 }
1458
ef810437 1459 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 1460 &error_abort);
39101f25 1461 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
e43bfd9c 1462 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, errp);
83d0521a 1463 qemu_opts_del(opts);
b998875d 1464 if (ret < 0) {
e43bfd9c
MA
1465 error_prepend(errp, "Could not create temporary overlay '%s': ",
1466 tmp_filename);
1ba4b6a5 1467 goto out;
b998875d
KW
1468 }
1469
1470 /* Prepare a new options QDict for the temporary file */
1471 snapshot_options = qdict_new();
1472 qdict_put(snapshot_options, "file.driver",
1473 qstring_from_str("file"));
1474 qdict_put(snapshot_options, "file.filename",
1475 qstring_from_str(tmp_filename));
e6641719
HR
1476 qdict_put(snapshot_options, "driver",
1477 qstring_from_str("qcow2"));
b998875d 1478
e4e9986b 1479 bs_snapshot = bdrv_new();
b998875d
KW
1480
1481 ret = bdrv_open(&bs_snapshot, NULL, NULL, snapshot_options,
6ebf9aa2 1482 flags, &local_err);
b998875d
KW
1483 if (ret < 0) {
1484 error_propagate(errp, local_err);
1ba4b6a5 1485 goto out;
b998875d
KW
1486 }
1487
1488 bdrv_append(bs_snapshot, bs);
1ba4b6a5
BC
1489
1490out:
1491 g_free(tmp_filename);
6b8aeca5 1492 return ret;
b998875d
KW
1493}
1494
b6ce07aa
KW
1495/*
1496 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
1497 *
1498 * options is a QDict of options to pass to the block drivers, or NULL for an
1499 * empty set of options. The reference to the QDict belongs to the block layer
1500 * after the call (even on failure), so if the caller intends to reuse the
1501 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
1502 *
1503 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
1504 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
1505 *
1506 * The reference parameter may be used to specify an existing block device which
1507 * should be opened. If specified, neither options nor a filename may be given,
1508 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 1509 */
f3930ed0
KW
1510static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
1511 const char *reference, QDict *options, int flags,
1512 BlockDriverState *parent,
ce343771 1513 const BdrvChildRole *child_role, Error **errp)
ea2384d3 1514{
b6ce07aa 1515 int ret;
9a4f4c31
KW
1516 BdrvChild *file = NULL;
1517 BlockDriverState *bs;
ce343771 1518 BlockDriver *drv = NULL;
74fe54f2 1519 const char *drvname;
3e8c2e57 1520 const char *backing;
34b5d2c6 1521 Error *local_err = NULL;
b1e6fc08 1522 int snapshot_flags = 0;
712e7874 1523
f67503e5 1524 assert(pbs);
f3930ed0
KW
1525 assert(!child_role || !flags);
1526 assert(!child_role == !parent);
f67503e5 1527
ddf5636d
HR
1528 if (reference) {
1529 bool options_non_empty = options ? qdict_size(options) : false;
1530 QDECREF(options);
1531
1532 if (*pbs) {
1533 error_setg(errp, "Cannot reuse an existing BDS when referencing "
1534 "another block device");
1535 return -EINVAL;
1536 }
1537
1538 if (filename || options_non_empty) {
1539 error_setg(errp, "Cannot reference an existing block device with "
1540 "additional options or a new filename");
1541 return -EINVAL;
1542 }
1543
1544 bs = bdrv_lookup_bs(reference, reference, errp);
1545 if (!bs) {
1546 return -ENODEV;
1547 }
1548 bdrv_ref(bs);
1549 *pbs = bs;
1550 return 0;
1551 }
1552
f67503e5
HR
1553 if (*pbs) {
1554 bs = *pbs;
1555 } else {
e4e9986b 1556 bs = bdrv_new();
f67503e5
HR
1557 }
1558
de9c0cec
KW
1559 /* NULL means an empty set of options */
1560 if (options == NULL) {
1561 options = qdict_new();
1562 }
1563
145f598e 1564 /* json: syntax counts as explicit options, as if in the QDict */
de3b53f0
KW
1565 parse_json_protocol(options, &filename, &local_err);
1566 if (local_err) {
1567 ret = -EINVAL;
1568 goto fail;
1569 }
1570
145f598e
KW
1571 bs->explicit_options = qdict_clone_shallow(options);
1572
f3930ed0 1573 if (child_role) {
bddcec37 1574 bs->inherits_from = parent;
8e2160e2
KW
1575 child_role->inherit_options(&flags, options,
1576 parent->open_flags, parent->options);
f3930ed0
KW
1577 }
1578
de3b53f0 1579 ret = bdrv_fill_options(&options, filename, &flags, &local_err);
462f5bcf
KW
1580 if (local_err) {
1581 goto fail;
1582 }
1583
62392ebb
KW
1584 bs->open_flags = flags;
1585 bs->options = options;
1586 options = qdict_clone_shallow(options);
1587
76c591b0 1588 /* Find the right image format driver */
76c591b0
KW
1589 drvname = qdict_get_try_str(options, "driver");
1590 if (drvname) {
1591 drv = bdrv_find_format(drvname);
76c591b0
KW
1592 if (!drv) {
1593 error_setg(errp, "Unknown driver: '%s'", drvname);
1594 ret = -EINVAL;
1595 goto fail;
1596 }
1597 }
1598
1599 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 1600
3e8c2e57
AG
1601 backing = qdict_get_try_str(options, "backing");
1602 if (backing && *backing == '\0') {
1603 flags |= BDRV_O_NO_BACKING;
1604 qdict_del(options, "backing");
1605 }
1606
f500a6d3 1607 /* Open image file without format layer */
f4788adc
KW
1608 if ((flags & BDRV_O_PROTOCOL) == 0) {
1609 if (flags & BDRV_O_RDWR) {
1610 flags |= BDRV_O_ALLOW_RDWR;
1611 }
1612 if (flags & BDRV_O_SNAPSHOT) {
1613 snapshot_flags = bdrv_temp_snapshot_flags(flags);
8e2160e2 1614 bdrv_backing_options(&flags, options, flags, options);
f4788adc 1615 }
f500a6d3 1616
f3930ed0 1617 bs->open_flags = flags;
1fdd6933 1618
9a4f4c31
KW
1619 file = bdrv_open_child(filename, options, "file", bs,
1620 &child_file, true, &local_err);
1fdd6933
KW
1621 if (local_err) {
1622 ret = -EINVAL;
f4788adc
KW
1623 goto fail;
1624 }
f500a6d3
KW
1625 }
1626
76c591b0 1627 /* Image format probing */
38f3ef57 1628 bs->probed = !drv;
76c591b0 1629 if (!drv && file) {
9a4f4c31 1630 ret = find_image_format(file->bs, filename, &drv, &local_err);
17b005f1 1631 if (ret < 0) {
8bfea15d 1632 goto fail;
2a05cbe4 1633 }
62392ebb
KW
1634 /*
1635 * This option update would logically belong in bdrv_fill_options(),
1636 * but we first need to open bs->file for the probing to work, while
1637 * opening bs->file already requires the (mostly) final set of options
1638 * so that cache mode etc. can be inherited.
1639 *
1640 * Adding the driver later is somewhat ugly, but it's not an option
1641 * that would ever be inherited, so it's correct. We just need to make
1642 * sure to update both bs->options (which has the full effective
1643 * options for bs) and options (which has file.* already removed).
1644 */
1645 qdict_put(bs->options, "driver", qstring_from_str(drv->format_name));
1646 qdict_put(options, "driver", qstring_from_str(drv->format_name));
76c591b0 1647 } else if (!drv) {
17b005f1
KW
1648 error_setg(errp, "Must specify either driver or file");
1649 ret = -EINVAL;
8bfea15d 1650 goto fail;
ea2384d3 1651 }
b6ce07aa 1652
53a29513
HR
1653 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
1654 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
1655 /* file must be NULL if a protocol BDS is about to be created
1656 * (the inverse results in an error message from bdrv_open_common()) */
1657 assert(!(flags & BDRV_O_PROTOCOL) || !file);
1658
b6ce07aa 1659 /* Open the image */
82dc8b41 1660 ret = bdrv_open_common(bs, file, options, &local_err);
b6ce07aa 1661 if (ret < 0) {
8bfea15d 1662 goto fail;
6987307c
CH
1663 }
1664
2a05cbe4 1665 if (file && (bs->file != file)) {
9a4f4c31 1666 bdrv_unref_child(bs, file);
f500a6d3
KW
1667 file = NULL;
1668 }
1669
b6ce07aa 1670 /* If there is a backing file, use it */
9156df12 1671 if ((flags & BDRV_O_NO_BACKING) == 0) {
d9b7b057 1672 ret = bdrv_open_backing_file(bs, options, "backing", &local_err);
b6ce07aa 1673 if (ret < 0) {
b6ad491a 1674 goto close_and_fail;
b6ce07aa 1675 }
b6ce07aa
KW
1676 }
1677
91af7014
HR
1678 bdrv_refresh_filename(bs);
1679
b6ad491a 1680 /* Check if any unknown options were used */
5acd9d81 1681 if (options && (qdict_size(options) != 0)) {
b6ad491a 1682 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
1683 if (flags & BDRV_O_PROTOCOL) {
1684 error_setg(errp, "Block protocol '%s' doesn't support the option "
1685 "'%s'", drv->format_name, entry->key);
1686 } else {
1687 error_setg(errp, "Block format '%s' used by device '%s' doesn't "
1688 "support the option '%s'", drv->format_name,
bfb197e0 1689 bdrv_get_device_name(bs), entry->key);
5acd9d81 1690 }
b6ad491a
KW
1691
1692 ret = -EINVAL;
1693 goto close_and_fail;
1694 }
b6ad491a 1695
b6ce07aa 1696 if (!bdrv_key_required(bs)) {
a7f53e26
MA
1697 if (bs->blk) {
1698 blk_dev_change_media_cb(bs->blk, true);
1699 }
c3adb58f
MA
1700 } else if (!runstate_check(RUN_STATE_PRELAUNCH)
1701 && !runstate_check(RUN_STATE_INMIGRATE)
1702 && !runstate_check(RUN_STATE_PAUSED)) { /* HACK */
1703 error_setg(errp,
1704 "Guest must be stopped for opening of encrypted image");
1705 ret = -EBUSY;
1706 goto close_and_fail;
b6ce07aa
KW
1707 }
1708
c3adb58f 1709 QDECREF(options);
f67503e5 1710 *pbs = bs;
dd62f1ca
KW
1711
1712 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
1713 * temporary snapshot afterwards. */
1714 if (snapshot_flags) {
1715 ret = bdrv_append_temp_snapshot(bs, snapshot_flags, &local_err);
1716 if (local_err) {
1717 goto close_and_fail;
1718 }
1719 }
1720
b6ce07aa
KW
1721 return 0;
1722
8bfea15d 1723fail:
f500a6d3 1724 if (file != NULL) {
9a4f4c31 1725 bdrv_unref_child(bs, file);
f500a6d3 1726 }
145f598e 1727 QDECREF(bs->explicit_options);
de9c0cec 1728 QDECREF(bs->options);
b6ad491a 1729 QDECREF(options);
de9c0cec 1730 bs->options = NULL;
f67503e5
HR
1731 if (!*pbs) {
1732 /* If *pbs is NULL, a new BDS has been created in this function and
1733 needs to be freed now. Otherwise, it does not need to be closed,
1734 since it has not really been opened yet. */
1735 bdrv_unref(bs);
1736 }
84d18f06 1737 if (local_err) {
34b5d2c6
HR
1738 error_propagate(errp, local_err);
1739 }
b6ad491a 1740 return ret;
de9c0cec 1741
b6ad491a 1742close_and_fail:
f67503e5
HR
1743 /* See fail path, but now the BDS has to be always closed */
1744 if (*pbs) {
1745 bdrv_close(bs);
1746 } else {
1747 bdrv_unref(bs);
1748 }
b6ad491a 1749 QDECREF(options);
84d18f06 1750 if (local_err) {
34b5d2c6
HR
1751 error_propagate(errp, local_err);
1752 }
b6ce07aa
KW
1753 return ret;
1754}
1755
f3930ed0 1756int bdrv_open(BlockDriverState **pbs, const char *filename,
6ebf9aa2 1757 const char *reference, QDict *options, int flags, Error **errp)
f3930ed0
KW
1758{
1759 return bdrv_open_inherit(pbs, filename, reference, options, flags, NULL,
ce343771 1760 NULL, errp);
f3930ed0
KW
1761}
1762
e971aa12
JC
1763typedef struct BlockReopenQueueEntry {
1764 bool prepared;
1765 BDRVReopenState state;
1766 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1767} BlockReopenQueueEntry;
1768
1769/*
1770 * Adds a BlockDriverState to a simple queue for an atomic, transactional
1771 * reopen of multiple devices.
1772 *
1773 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
1774 * already performed, or alternatively may be NULL a new BlockReopenQueue will
1775 * be created and initialized. This newly created BlockReopenQueue should be
1776 * passed back in for subsequent calls that are intended to be of the same
1777 * atomic 'set'.
1778 *
1779 * bs is the BlockDriverState to add to the reopen queue.
1780 *
4d2cb092
KW
1781 * options contains the changed options for the associated bs
1782 * (the BlockReopenQueue takes ownership)
1783 *
e971aa12
JC
1784 * flags contains the open flags for the associated bs
1785 *
1786 * returns a pointer to bs_queue, which is either the newly allocated
1787 * bs_queue, or the existing bs_queue being used.
1788 *
1789 */
28518102
KW
1790static BlockReopenQueue *bdrv_reopen_queue_child(BlockReopenQueue *bs_queue,
1791 BlockDriverState *bs,
1792 QDict *options,
1793 int flags,
1794 const BdrvChildRole *role,
1795 QDict *parent_options,
1796 int parent_flags)
e971aa12
JC
1797{
1798 assert(bs != NULL);
1799
1800 BlockReopenQueueEntry *bs_entry;
67251a31 1801 BdrvChild *child;
145f598e 1802 QDict *old_options, *explicit_options;
67251a31 1803
e971aa12
JC
1804 if (bs_queue == NULL) {
1805 bs_queue = g_new0(BlockReopenQueue, 1);
1806 QSIMPLEQ_INIT(bs_queue);
1807 }
1808
4d2cb092
KW
1809 if (!options) {
1810 options = qdict_new();
1811 }
1812
28518102
KW
1813 /*
1814 * Precedence of options:
1815 * 1. Explicitly passed in options (highest)
91a097e7 1816 * 2. Set in flags (only for top level)
145f598e 1817 * 3. Retained from explicitly set options of bs
8e2160e2 1818 * 4. Inherited from parent node
28518102
KW
1819 * 5. Retained from effective options of bs
1820 */
1821
91a097e7
KW
1822 if (!parent_options) {
1823 /*
1824 * Any setting represented by flags is always updated. If the
1825 * corresponding QDict option is set, it takes precedence. Otherwise
1826 * the flag is translated into a QDict option. The old setting of bs is
1827 * not considered.
1828 */
1829 update_options_from_flags(options, flags);
1830 }
1831
145f598e
KW
1832 /* Old explicitly set values (don't overwrite by inherited value) */
1833 old_options = qdict_clone_shallow(bs->explicit_options);
1834 bdrv_join_options(bs, options, old_options);
1835 QDECREF(old_options);
1836
1837 explicit_options = qdict_clone_shallow(options);
1838
28518102
KW
1839 /* Inherit from parent node */
1840 if (parent_options) {
1841 assert(!flags);
8e2160e2 1842 role->inherit_options(&flags, options, parent_flags, parent_options);
28518102
KW
1843 }
1844
1845 /* Old values are used for options that aren't set yet */
4d2cb092 1846 old_options = qdict_clone_shallow(bs->options);
cddff5ba 1847 bdrv_join_options(bs, options, old_options);
4d2cb092
KW
1848 QDECREF(old_options);
1849
f1f25a2e
KW
1850 /* bdrv_open() masks this flag out */
1851 flags &= ~BDRV_O_PROTOCOL;
1852
67251a31 1853 QLIST_FOREACH(child, &bs->children, next) {
4c9dfe5d
KW
1854 QDict *new_child_options;
1855 char *child_key_dot;
67251a31 1856
4c9dfe5d
KW
1857 /* reopen can only change the options of block devices that were
1858 * implicitly created and inherited options. For other (referenced)
1859 * block devices, a syntax like "backing.foo" results in an error. */
67251a31
KW
1860 if (child->bs->inherits_from != bs) {
1861 continue;
1862 }
1863
4c9dfe5d
KW
1864 child_key_dot = g_strdup_printf("%s.", child->name);
1865 qdict_extract_subqdict(options, &new_child_options, child_key_dot);
1866 g_free(child_key_dot);
1867
28518102
KW
1868 bdrv_reopen_queue_child(bs_queue, child->bs, new_child_options, 0,
1869 child->role, options, flags);
e971aa12
JC
1870 }
1871
1872 bs_entry = g_new0(BlockReopenQueueEntry, 1);
1873 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
1874
1875 bs_entry->state.bs = bs;
4d2cb092 1876 bs_entry->state.options = options;
145f598e 1877 bs_entry->state.explicit_options = explicit_options;
e971aa12
JC
1878 bs_entry->state.flags = flags;
1879
1880 return bs_queue;
1881}
1882
28518102
KW
1883BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
1884 BlockDriverState *bs,
1885 QDict *options, int flags)
1886{
1887 return bdrv_reopen_queue_child(bs_queue, bs, options, flags,
1888 NULL, NULL, 0);
1889}
1890
e971aa12
JC
1891/*
1892 * Reopen multiple BlockDriverStates atomically & transactionally.
1893 *
1894 * The queue passed in (bs_queue) must have been built up previous
1895 * via bdrv_reopen_queue().
1896 *
1897 * Reopens all BDS specified in the queue, with the appropriate
1898 * flags. All devices are prepared for reopen, and failure of any
1899 * device will cause all device changes to be abandonded, and intermediate
1900 * data cleaned up.
1901 *
1902 * If all devices prepare successfully, then the changes are committed
1903 * to all devices.
1904 *
1905 */
1906int bdrv_reopen_multiple(BlockReopenQueue *bs_queue, Error **errp)
1907{
1908 int ret = -1;
1909 BlockReopenQueueEntry *bs_entry, *next;
1910 Error *local_err = NULL;
1911
1912 assert(bs_queue != NULL);
1913
1914 bdrv_drain_all();
1915
1916 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1917 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
1918 error_propagate(errp, local_err);
1919 goto cleanup;
1920 }
1921 bs_entry->prepared = true;
1922 }
1923
1924 /* If we reach this point, we have success and just need to apply the
1925 * changes
1926 */
1927 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1928 bdrv_reopen_commit(&bs_entry->state);
1929 }
1930
1931 ret = 0;
1932
1933cleanup:
1934 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
1935 if (ret && bs_entry->prepared) {
1936 bdrv_reopen_abort(&bs_entry->state);
145f598e
KW
1937 } else if (ret) {
1938 QDECREF(bs_entry->state.explicit_options);
e971aa12 1939 }
4d2cb092 1940 QDECREF(bs_entry->state.options);
e971aa12
JC
1941 g_free(bs_entry);
1942 }
1943 g_free(bs_queue);
1944 return ret;
1945}
1946
1947
1948/* Reopen a single BlockDriverState with the specified flags. */
1949int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
1950{
1951 int ret = -1;
1952 Error *local_err = NULL;
4d2cb092 1953 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12
JC
1954
1955 ret = bdrv_reopen_multiple(queue, &local_err);
1956 if (local_err != NULL) {
1957 error_propagate(errp, local_err);
1958 }
1959 return ret;
1960}
1961
1962
1963/*
1964 * Prepares a BlockDriverState for reopen. All changes are staged in the
1965 * 'opaque' field of the BDRVReopenState, which is used and allocated by
1966 * the block driver layer .bdrv_reopen_prepare()
1967 *
1968 * bs is the BlockDriverState to reopen
1969 * flags are the new open flags
1970 * queue is the reopen queue
1971 *
1972 * Returns 0 on success, non-zero on error. On error errp will be set
1973 * as well.
1974 *
1975 * On failure, bdrv_reopen_abort() will be called to clean up any data.
1976 * It is the responsibility of the caller to then call the abort() or
1977 * commit() for any other BDS that have been left in a prepare() state
1978 *
1979 */
1980int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
1981 Error **errp)
1982{
1983 int ret = -1;
1984 Error *local_err = NULL;
1985 BlockDriver *drv;
ccf9dc07
KW
1986 QemuOpts *opts;
1987 const char *value;
e971aa12
JC
1988
1989 assert(reopen_state != NULL);
1990 assert(reopen_state->bs->drv != NULL);
1991 drv = reopen_state->bs->drv;
1992
ccf9dc07
KW
1993 /* Process generic block layer options */
1994 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
1995 qemu_opts_absorb_qdict(opts, reopen_state->options, &local_err);
1996 if (local_err) {
1997 error_propagate(errp, local_err);
1998 ret = -EINVAL;
1999 goto error;
2000 }
2001
91a097e7
KW
2002 update_flags_from_options(&reopen_state->flags, opts);
2003
2004 /* If a guest device is attached, it owns WCE */
2005 if (reopen_state->bs->blk && blk_get_attached_dev(reopen_state->bs->blk)) {
2006 bool old_wce = bdrv_enable_write_cache(reopen_state->bs);
2007 bool new_wce = (reopen_state->flags & BDRV_O_CACHE_WB);
2008 if (old_wce != new_wce) {
2009 error_setg(errp, "Cannot change cache.writeback: Device attached");
2010 ret = -EINVAL;
2011 goto error;
2012 }
2013 }
2014
ccf9dc07
KW
2015 /* node-name and driver must be unchanged. Put them back into the QDict, so
2016 * that they are checked at the end of this function. */
2017 value = qemu_opt_get(opts, "node-name");
2018 if (value) {
2019 qdict_put(reopen_state->options, "node-name", qstring_from_str(value));
2020 }
2021
2022 value = qemu_opt_get(opts, "driver");
2023 if (value) {
2024 qdict_put(reopen_state->options, "driver", qstring_from_str(value));
2025 }
2026
e971aa12
JC
2027 /* if we are to stay read-only, do not allow permission change
2028 * to r/w */
2029 if (!(reopen_state->bs->open_flags & BDRV_O_ALLOW_RDWR) &&
2030 reopen_state->flags & BDRV_O_RDWR) {
81e5f78a
AG
2031 error_setg(errp, "Node '%s' is read only",
2032 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
2033 goto error;
2034 }
2035
2036
2037 ret = bdrv_flush(reopen_state->bs);
2038 if (ret) {
455b0fde 2039 error_setg_errno(errp, -ret, "Error flushing drive");
e971aa12
JC
2040 goto error;
2041 }
2042
2043 if (drv->bdrv_reopen_prepare) {
2044 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
2045 if (ret) {
2046 if (local_err != NULL) {
2047 error_propagate(errp, local_err);
2048 } else {
d8b6895f
LC
2049 error_setg(errp, "failed while preparing to reopen image '%s'",
2050 reopen_state->bs->filename);
e971aa12
JC
2051 }
2052 goto error;
2053 }
2054 } else {
2055 /* It is currently mandatory to have a bdrv_reopen_prepare()
2056 * handler for each supported drv. */
81e5f78a
AG
2057 error_setg(errp, "Block format '%s' used by node '%s' "
2058 "does not support reopening files", drv->format_name,
2059 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
2060 ret = -1;
2061 goto error;
2062 }
2063
4d2cb092
KW
2064 /* Options that are not handled are only okay if they are unchanged
2065 * compared to the old state. It is expected that some options are only
2066 * used for the initial open, but not reopen (e.g. filename) */
2067 if (qdict_size(reopen_state->options)) {
2068 const QDictEntry *entry = qdict_first(reopen_state->options);
2069
2070 do {
2071 QString *new_obj = qobject_to_qstring(entry->value);
2072 const char *new = qstring_get_str(new_obj);
2073 const char *old = qdict_get_try_str(reopen_state->bs->options,
2074 entry->key);
2075
2076 if (!old || strcmp(new, old)) {
2077 error_setg(errp, "Cannot change the option '%s'", entry->key);
2078 ret = -EINVAL;
2079 goto error;
2080 }
2081 } while ((entry = qdict_next(reopen_state->options, entry)));
2082 }
2083
e971aa12
JC
2084 ret = 0;
2085
2086error:
ccf9dc07 2087 qemu_opts_del(opts);
e971aa12
JC
2088 return ret;
2089}
2090
2091/*
2092 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
2093 * makes them final by swapping the staging BlockDriverState contents into
2094 * the active BlockDriverState contents.
2095 */
2096void bdrv_reopen_commit(BDRVReopenState *reopen_state)
2097{
2098 BlockDriver *drv;
2099
2100 assert(reopen_state != NULL);
2101 drv = reopen_state->bs->drv;
2102 assert(drv != NULL);
2103
2104 /* If there are any driver level actions to take */
2105 if (drv->bdrv_reopen_commit) {
2106 drv->bdrv_reopen_commit(reopen_state);
2107 }
2108
2109 /* set BDS specific flags now */
145f598e
KW
2110 QDECREF(reopen_state->bs->explicit_options);
2111
2112 reopen_state->bs->explicit_options = reopen_state->explicit_options;
e971aa12
JC
2113 reopen_state->bs->open_flags = reopen_state->flags;
2114 reopen_state->bs->enable_write_cache = !!(reopen_state->flags &
2115 BDRV_O_CACHE_WB);
2116 reopen_state->bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 2117
3baca891 2118 bdrv_refresh_limits(reopen_state->bs, NULL);
e971aa12
JC
2119}
2120
2121/*
2122 * Abort the reopen, and delete and free the staged changes in
2123 * reopen_state
2124 */
2125void bdrv_reopen_abort(BDRVReopenState *reopen_state)
2126{
2127 BlockDriver *drv;
2128
2129 assert(reopen_state != NULL);
2130 drv = reopen_state->bs->drv;
2131 assert(drv != NULL);
2132
2133 if (drv->bdrv_reopen_abort) {
2134 drv->bdrv_reopen_abort(reopen_state);
2135 }
145f598e
KW
2136
2137 QDECREF(reopen_state->explicit_options);
e971aa12
JC
2138}
2139
2140
fc01f7e7
FB
2141void bdrv_close(BlockDriverState *bs)
2142{
33384421
HR
2143 BdrvAioNotifier *ban, *ban_next;
2144
3cbc002c
PB
2145 if (bs->job) {
2146 block_job_cancel_sync(bs->job);
2147 }
99b7e775
AG
2148
2149 /* Disable I/O limits and drain all pending throttled requests */
a0d64a61 2150 if (bs->throttle_state) {
99b7e775
AG
2151 bdrv_io_limits_disable(bs);
2152 }
2153
fc27291d 2154 bdrv_drained_begin(bs); /* complete I/O */
58fda173 2155 bdrv_flush(bs);
53ec73e2 2156 bdrv_drain(bs); /* in case flush left pending I/O */
fc27291d 2157
d7d512f6 2158 notifier_list_notify(&bs->close_notifiers, bs);
7094f12f 2159
b4d02820
HR
2160 if (bs->blk) {
2161 blk_dev_change_media_cb(bs->blk, false);
2162 }
2163
3cbc002c 2164 if (bs->drv) {
6e93e7c4
KW
2165 BdrvChild *child, *next;
2166
9a7dedbc 2167 bs->drv->bdrv_close(bs);
9a4f4c31 2168 bs->drv = NULL;
9a7dedbc 2169
5db15a57 2170 bdrv_set_backing_hd(bs, NULL);
9a7dedbc 2171
9a4f4c31
KW
2172 if (bs->file != NULL) {
2173 bdrv_unref_child(bs, bs->file);
2174 bs->file = NULL;
2175 }
2176
6e93e7c4 2177 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
2178 /* TODO Remove bdrv_unref() from drivers' close function and use
2179 * bdrv_unref_child() here */
bddcec37
KW
2180 if (child->bs->inherits_from == bs) {
2181 child->bs->inherits_from = NULL;
2182 }
33a60407 2183 bdrv_detach_child(child);
6e93e7c4
KW
2184 }
2185
7267c094 2186 g_free(bs->opaque);
ea2384d3 2187 bs->opaque = NULL;
53fec9d3 2188 bs->copy_on_read = 0;
a275fa42
PB
2189 bs->backing_file[0] = '\0';
2190 bs->backing_format[0] = '\0';
6405875c
PB
2191 bs->total_sectors = 0;
2192 bs->encrypted = 0;
2193 bs->valid_key = 0;
2194 bs->sg = 0;
0d51b4de 2195 bs->zero_beyond_eof = false;
de9c0cec 2196 QDECREF(bs->options);
145f598e 2197 QDECREF(bs->explicit_options);
de9c0cec 2198 bs->options = NULL;
91af7014
HR
2199 QDECREF(bs->full_open_options);
2200 bs->full_open_options = NULL;
b338082b 2201 }
98f90dba 2202
33384421
HR
2203 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
2204 g_free(ban);
2205 }
2206 QLIST_INIT(&bs->aio_notifiers);
fc27291d 2207 bdrv_drained_end(bs);
b338082b
FB
2208}
2209
2bc93fed
MK
2210void bdrv_close_all(void)
2211{
2212 BlockDriverState *bs;
2213
dc364f4c 2214 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2215 AioContext *aio_context = bdrv_get_aio_context(bs);
2216
2217 aio_context_acquire(aio_context);
2bc93fed 2218 bdrv_close(bs);
ed78cda3 2219 aio_context_release(aio_context);
2bc93fed
MK
2220 }
2221}
2222
dc364f4c
BC
2223/* make a BlockDriverState anonymous by removing from bdrv_state and
2224 * graph_bdrv_state list.
d22b2f41
RH
2225 Also, NULL terminate the device_name to prevent double remove */
2226void bdrv_make_anon(BlockDriverState *bs)
2227{
bfb197e0
MA
2228 /*
2229 * Take care to remove bs from bdrv_states only when it's actually
2230 * in it. Note that bs->device_list.tqe_prev is initially null,
2231 * and gets set to non-null by QTAILQ_INSERT_TAIL(). Establish
2232 * the useful invariant "bs in bdrv_states iff bs->tqe_prev" by
2233 * resetting it to null on remove.
2234 */
2235 if (bs->device_list.tqe_prev) {
dc364f4c 2236 QTAILQ_REMOVE(&bdrv_states, bs, device_list);
bfb197e0 2237 bs->device_list.tqe_prev = NULL;
d22b2f41 2238 }
dc364f4c
BC
2239 if (bs->node_name[0] != '\0') {
2240 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
2241 }
2242 bs->node_name[0] = '\0';
d22b2f41
RH
2243}
2244
8e419aef 2245/* Fields that need to stay with the top-level BDS */
4ddc07ca
PB
2246static void bdrv_move_feature_fields(BlockDriverState *bs_dest,
2247 BlockDriverState *bs_src)
8802d1fd 2248{
4ddc07ca 2249 /* move some fields that need to stay attached to the device */
8802d1fd
JC
2250
2251 /* dev info */
4ddc07ca 2252 bs_dest->copy_on_read = bs_src->copy_on_read;
8802d1fd 2253
4ddc07ca 2254 bs_dest->enable_write_cache = bs_src->enable_write_cache;
c4a248a1 2255
a9fc4408 2256 /* dirty bitmap */
e4654d2d 2257 bs_dest->dirty_bitmaps = bs_src->dirty_bitmaps;
063dd40e 2258}
a9fc4408 2259
dd62f1ca
KW
2260static void change_parent_backing_link(BlockDriverState *from,
2261 BlockDriverState *to)
2262{
2263 BdrvChild *c, *next;
2264
2265 QLIST_FOREACH_SAFE(c, &from->parents, next_parent, next) {
2266 assert(c->role != &child_backing);
2267 c->bs = to;
2268 QLIST_REMOVE(c, next_parent);
2269 QLIST_INSERT_HEAD(&to->parents, c, next_parent);
2270 bdrv_ref(to);
2271 bdrv_unref(from);
2272 }
2273 if (from->blk) {
2274 blk_set_bs(from->blk, to);
2275 if (!to->device_list.tqe_prev) {
2276 QTAILQ_INSERT_BEFORE(from, to, device_list);
2277 }
2278 QTAILQ_REMOVE(&bdrv_states, from, device_list);
2279 }
2280}
2281
2282static void swap_feature_fields(BlockDriverState *bs_top,
2283 BlockDriverState *bs_new)
2284{
2285 BlockDriverState tmp;
2286
2287 bdrv_move_feature_fields(&tmp, bs_top);
2288 bdrv_move_feature_fields(bs_top, bs_new);
2289 bdrv_move_feature_fields(bs_new, &tmp);
2290
2291 assert(!bs_new->throttle_state);
2292 if (bs_top->throttle_state) {
2293 assert(bs_top->io_limits_enabled);
2294 bdrv_io_limits_enable(bs_new, throttle_group_get_name(bs_top));
2295 bdrv_io_limits_disable(bs_top);
2296 }
2297}
2298
4ddc07ca
PB
2299/*
2300 * Add new bs contents at the top of an image chain while the chain is
2301 * live, while keeping required fields on the top layer.
2302 *
2303 * This will modify the BlockDriverState fields, and swap contents
2304 * between bs_new and bs_top. Both bs_new and bs_top are modified.
2305 *
bfb197e0 2306 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2307 *
2308 * This function does not create any image files.
dd62f1ca
KW
2309 *
2310 * bdrv_append() takes ownership of a bs_new reference and unrefs it because
2311 * that's what the callers commonly need. bs_new will be referenced by the old
2312 * parents of bs_top after bdrv_append() returns. If the caller needs to keep a
2313 * reference of its own, it must call bdrv_ref().
4ddc07ca
PB
2314 */
2315void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top)
2316{
dd62f1ca
KW
2317 assert(!bdrv_requests_pending(bs_top));
2318 assert(!bdrv_requests_pending(bs_new));
2319
2320 bdrv_ref(bs_top);
2321 change_parent_backing_link(bs_top, bs_new);
2322
2323 /* Some fields always stay on top of the backing file chain */
2324 swap_feature_fields(bs_top, bs_new);
2325
2326 bdrv_set_backing_hd(bs_new, bs_top);
2327 bdrv_unref(bs_top);
4ddc07ca 2328
dd62f1ca
KW
2329 /* bs_new is now referenced by its new parents, we don't need the
2330 * additional reference any more. */
2331 bdrv_unref(bs_new);
8802d1fd
JC
2332}
2333
3f09bfbc
KW
2334void bdrv_replace_in_backing_chain(BlockDriverState *old, BlockDriverState *new)
2335{
2336 assert(!bdrv_requests_pending(old));
2337 assert(!bdrv_requests_pending(new));
2338
2339 bdrv_ref(old);
2340
2341 if (old->blk) {
2342 /* As long as these fields aren't in BlockBackend, but in the top-level
2343 * BlockDriverState, it's not possible for a BDS to have two BBs.
2344 *
2345 * We really want to copy the fields from old to new, but we go for a
2346 * swap instead so that pointers aren't duplicated and cause trouble.
2347 * (Also, bdrv_swap() used to do the same.) */
2348 assert(!new->blk);
2349 swap_feature_fields(old, new);
2350 }
2351 change_parent_backing_link(old, new);
2352
2353 /* Change backing files if a previously independent node is added to the
2354 * chain. For active commit, we replace top by its own (indirect) backing
2355 * file and don't do anything here so we don't build a loop. */
2356 if (new->backing == NULL && !bdrv_chain_contains(backing_bs(old), new)) {
2357 bdrv_set_backing_hd(new, backing_bs(old));
2358 bdrv_set_backing_hd(old, NULL);
2359 }
2360
2361 bdrv_unref(old);
2362}
2363
4f6fd349 2364static void bdrv_delete(BlockDriverState *bs)
b338082b 2365{
3e914655 2366 assert(!bs->job);
3718d8ab 2367 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 2368 assert(!bs->refcnt);
e4654d2d 2369 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
18846dee 2370
e1b5c52e
SH
2371 bdrv_close(bs);
2372
1b7bdbc1 2373 /* remove from list, if necessary */
d22b2f41 2374 bdrv_make_anon(bs);
34c6f050 2375
7267c094 2376 g_free(bs);
fc01f7e7
FB
2377}
2378
e97fc193
AL
2379/*
2380 * Run consistency checks on an image
2381 *
e076f338 2382 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 2383 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 2384 * check are stored in res.
e97fc193 2385 */
4534ff54 2386int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 2387{
908bcd54
HR
2388 if (bs->drv == NULL) {
2389 return -ENOMEDIUM;
2390 }
e97fc193
AL
2391 if (bs->drv->bdrv_check == NULL) {
2392 return -ENOTSUP;
2393 }
2394
e076f338 2395 memset(res, 0, sizeof(*res));
4534ff54 2396 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
2397}
2398
8a426614
KW
2399#define COMMIT_BUF_SECTORS 2048
2400
33e3963e
FB
2401/* commit COW file into the raw image */
2402int bdrv_commit(BlockDriverState *bs)
2403{
19cb3738 2404 BlockDriver *drv = bs->drv;
72706ea4 2405 int64_t sector, total_sectors, length, backing_length;
8a426614 2406 int n, ro, open_flags;
0bce597d 2407 int ret = 0;
72706ea4 2408 uint8_t *buf = NULL;
33e3963e 2409
19cb3738
FB
2410 if (!drv)
2411 return -ENOMEDIUM;
6bb45158 2412
760e0063 2413 if (!bs->backing) {
4dca4b63 2414 return -ENOTSUP;
33e3963e
FB
2415 }
2416
bb00021d 2417 if (bdrv_op_is_blocked(bs, BLOCK_OP_TYPE_COMMIT_SOURCE, NULL) ||
760e0063 2418 bdrv_op_is_blocked(bs->backing->bs, BLOCK_OP_TYPE_COMMIT_TARGET, NULL)) {
2d3735d3
SH
2419 return -EBUSY;
2420 }
2421
760e0063
KW
2422 ro = bs->backing->bs->read_only;
2423 open_flags = bs->backing->bs->open_flags;
4dca4b63
NS
2424
2425 if (ro) {
760e0063 2426 if (bdrv_reopen(bs->backing->bs, open_flags | BDRV_O_RDWR, NULL)) {
0bce597d 2427 return -EACCES;
4dca4b63 2428 }
ea2384d3 2429 }
33e3963e 2430
72706ea4
JC
2431 length = bdrv_getlength(bs);
2432 if (length < 0) {
2433 ret = length;
2434 goto ro_cleanup;
2435 }
2436
760e0063 2437 backing_length = bdrv_getlength(bs->backing->bs);
72706ea4
JC
2438 if (backing_length < 0) {
2439 ret = backing_length;
2440 goto ro_cleanup;
2441 }
2442
2443 /* If our top snapshot is larger than the backing file image,
2444 * grow the backing file image if possible. If not possible,
2445 * we must return an error */
2446 if (length > backing_length) {
760e0063 2447 ret = bdrv_truncate(bs->backing->bs, length);
72706ea4
JC
2448 if (ret < 0) {
2449 goto ro_cleanup;
2450 }
2451 }
2452
2453 total_sectors = length >> BDRV_SECTOR_BITS;
857d4f46
KW
2454
2455 /* qemu_try_blockalign() for bs will choose an alignment that works for
760e0063 2456 * bs->backing->bs as well, so no need to compare the alignment manually. */
857d4f46
KW
2457 buf = qemu_try_blockalign(bs, COMMIT_BUF_SECTORS * BDRV_SECTOR_SIZE);
2458 if (buf == NULL) {
2459 ret = -ENOMEM;
2460 goto ro_cleanup;
2461 }
8a426614
KW
2462
2463 for (sector = 0; sector < total_sectors; sector += n) {
d663640c
PB
2464 ret = bdrv_is_allocated(bs, sector, COMMIT_BUF_SECTORS, &n);
2465 if (ret < 0) {
2466 goto ro_cleanup;
2467 }
2468 if (ret) {
dabfa6cc
KW
2469 ret = bdrv_read(bs, sector, buf, n);
2470 if (ret < 0) {
8a426614
KW
2471 goto ro_cleanup;
2472 }
2473
760e0063 2474 ret = bdrv_write(bs->backing->bs, sector, buf, n);
dabfa6cc 2475 if (ret < 0) {
8a426614
KW
2476 goto ro_cleanup;
2477 }
ea2384d3 2478 }
33e3963e 2479 }
95389c86 2480
1d44952f
CH
2481 if (drv->bdrv_make_empty) {
2482 ret = drv->bdrv_make_empty(bs);
dabfa6cc
KW
2483 if (ret < 0) {
2484 goto ro_cleanup;
2485 }
1d44952f
CH
2486 bdrv_flush(bs);
2487 }
95389c86 2488
3f5075ae
CH
2489 /*
2490 * Make sure all data we wrote to the backing device is actually
2491 * stable on disk.
2492 */
760e0063
KW
2493 if (bs->backing) {
2494 bdrv_flush(bs->backing->bs);
dabfa6cc 2495 }
4dca4b63 2496
dabfa6cc 2497 ret = 0;
4dca4b63 2498ro_cleanup:
857d4f46 2499 qemu_vfree(buf);
4dca4b63
NS
2500
2501 if (ro) {
0bce597d 2502 /* ignoring error return here */
760e0063 2503 bdrv_reopen(bs->backing->bs, open_flags & ~BDRV_O_RDWR, NULL);
4dca4b63
NS
2504 }
2505
1d44952f 2506 return ret;
33e3963e
FB
2507}
2508
e8877497 2509int bdrv_commit_all(void)
6ab4b5ab
MA
2510{
2511 BlockDriverState *bs;
2512
dc364f4c 2513 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2514 AioContext *aio_context = bdrv_get_aio_context(bs);
2515
2516 aio_context_acquire(aio_context);
760e0063 2517 if (bs->drv && bs->backing) {
272d2d8e
JC
2518 int ret = bdrv_commit(bs);
2519 if (ret < 0) {
ed78cda3 2520 aio_context_release(aio_context);
272d2d8e
JC
2521 return ret;
2522 }
e8877497 2523 }
ed78cda3 2524 aio_context_release(aio_context);
6ab4b5ab 2525 }
e8877497 2526 return 0;
6ab4b5ab
MA
2527}
2528
756e6736
KW
2529/*
2530 * Return values:
2531 * 0 - success
2532 * -EINVAL - backing format specified, but no file
2533 * -ENOSPC - can't update the backing file because no space is left in the
2534 * image file header
2535 * -ENOTSUP - format driver doesn't support changing the backing file
2536 */
2537int bdrv_change_backing_file(BlockDriverState *bs,
2538 const char *backing_file, const char *backing_fmt)
2539{
2540 BlockDriver *drv = bs->drv;
469ef350 2541 int ret;
756e6736 2542
5f377794
PB
2543 /* Backing file format doesn't make sense without a backing file */
2544 if (backing_fmt && !backing_file) {
2545 return -EINVAL;
2546 }
2547
756e6736 2548 if (drv->bdrv_change_backing_file != NULL) {
469ef350 2549 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 2550 } else {
469ef350 2551 ret = -ENOTSUP;
756e6736 2552 }
469ef350
PB
2553
2554 if (ret == 0) {
2555 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
2556 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
2557 }
2558 return ret;
756e6736
KW
2559}
2560
6ebdcee2
JC
2561/*
2562 * Finds the image layer in the chain that has 'bs' as its backing file.
2563 *
2564 * active is the current topmost image.
2565 *
2566 * Returns NULL if bs is not found in active's image chain,
2567 * or if active == bs.
4caf0fcd
JC
2568 *
2569 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
2570 */
2571BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
2572 BlockDriverState *bs)
2573{
760e0063
KW
2574 while (active && bs != backing_bs(active)) {
2575 active = backing_bs(active);
6ebdcee2
JC
2576 }
2577
4caf0fcd
JC
2578 return active;
2579}
6ebdcee2 2580
4caf0fcd
JC
2581/* Given a BDS, searches for the base layer. */
2582BlockDriverState *bdrv_find_base(BlockDriverState *bs)
2583{
2584 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
2585}
2586
6ebdcee2
JC
2587/*
2588 * Drops images above 'base' up to and including 'top', and sets the image
2589 * above 'top' to have base as its backing file.
2590 *
2591 * Requires that the overlay to 'top' is opened r/w, so that the backing file
2592 * information in 'bs' can be properly updated.
2593 *
2594 * E.g., this will convert the following chain:
2595 * bottom <- base <- intermediate <- top <- active
2596 *
2597 * to
2598 *
2599 * bottom <- base <- active
2600 *
2601 * It is allowed for bottom==base, in which case it converts:
2602 *
2603 * base <- intermediate <- top <- active
2604 *
2605 * to
2606 *
2607 * base <- active
2608 *
54e26900
JC
2609 * If backing_file_str is non-NULL, it will be used when modifying top's
2610 * overlay image metadata.
2611 *
6ebdcee2
JC
2612 * Error conditions:
2613 * if active == top, that is considered an error
2614 *
2615 */
2616int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 2617 BlockDriverState *base, const char *backing_file_str)
6ebdcee2 2618{
6ebdcee2 2619 BlockDriverState *new_top_bs = NULL;
6ebdcee2
JC
2620 int ret = -EIO;
2621
6ebdcee2
JC
2622 if (!top->drv || !base->drv) {
2623 goto exit;
2624 }
2625
2626 new_top_bs = bdrv_find_overlay(active, top);
2627
2628 if (new_top_bs == NULL) {
2629 /* we could not find the image above 'top', this is an error */
2630 goto exit;
2631 }
2632
760e0063 2633 /* special case of new_top_bs->backing->bs already pointing to base - nothing
6ebdcee2 2634 * to do, no intermediate images */
760e0063 2635 if (backing_bs(new_top_bs) == base) {
6ebdcee2
JC
2636 ret = 0;
2637 goto exit;
2638 }
2639
5db15a57
KW
2640 /* Make sure that base is in the backing chain of top */
2641 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
2642 goto exit;
2643 }
2644
2645 /* success - we can delete the intermediate states, and link top->base */
5db15a57 2646 backing_file_str = backing_file_str ? backing_file_str : base->filename;
54e26900 2647 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
5db15a57 2648 base->drv ? base->drv->format_name : "");
6ebdcee2
JC
2649 if (ret) {
2650 goto exit;
2651 }
5db15a57 2652 bdrv_set_backing_hd(new_top_bs, base);
6ebdcee2 2653
6ebdcee2 2654 ret = 0;
6ebdcee2 2655exit:
6ebdcee2
JC
2656 return ret;
2657}
2658
61007b31
SH
2659/**
2660 * Truncate file to 'offset' bytes (needed only for file protocols)
2661 */
2662int bdrv_truncate(BlockDriverState *bs, int64_t offset)
71d0770c 2663{
61007b31
SH
2664 BlockDriver *drv = bs->drv;
2665 int ret;
2666 if (!drv)
71d0770c 2667 return -ENOMEDIUM;
61007b31
SH
2668 if (!drv->bdrv_truncate)
2669 return -ENOTSUP;
2670 if (bs->read_only)
2671 return -EACCES;
71d0770c 2672
61007b31
SH
2673 ret = drv->bdrv_truncate(bs, offset);
2674 if (ret == 0) {
2675 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
2676 bdrv_dirty_bitmap_truncate(bs);
2677 if (bs->blk) {
2678 blk_dev_resize_cb(bs->blk);
2679 }
c0191e76 2680 }
61007b31 2681 return ret;
71d0770c
AL
2682}
2683
61007b31
SH
2684/**
2685 * Length of a allocated file in bytes. Sparse files are counted by actual
2686 * allocated space. Return < 0 if error or unknown.
2687 */
2688int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 2689{
61007b31
SH
2690 BlockDriver *drv = bs->drv;
2691 if (!drv) {
2692 return -ENOMEDIUM;
8f4754ed 2693 }
61007b31
SH
2694 if (drv->bdrv_get_allocated_file_size) {
2695 return drv->bdrv_get_allocated_file_size(bs);
2696 }
2697 if (bs->file) {
9a4f4c31 2698 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 2699 }
61007b31 2700 return -ENOTSUP;
1c9805a3 2701}
e7a8a783 2702
61007b31
SH
2703/**
2704 * Return number of sectors on success, -errno on error.
1c9805a3 2705 */
61007b31 2706int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 2707{
61007b31 2708 BlockDriver *drv = bs->drv;
498e386c 2709
61007b31
SH
2710 if (!drv)
2711 return -ENOMEDIUM;
2572b37a 2712
61007b31
SH
2713 if (drv->has_variable_length) {
2714 int ret = refresh_total_sectors(bs, bs->total_sectors);
2715 if (ret < 0) {
2716 return ret;
1c9805a3
SH
2717 }
2718 }
61007b31 2719 return bs->total_sectors;
1c9805a3 2720}
b338082b 2721
61007b31
SH
2722/**
2723 * Return length in bytes on success, -errno on error.
2724 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 2725 */
61007b31 2726int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 2727{
61007b31 2728 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 2729
4a9c9ea0 2730 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 2731 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
2732}
2733
61007b31
SH
2734/* return 0 as number of sectors if no device present or error */
2735void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 2736{
61007b31 2737 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 2738
61007b31 2739 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
2740}
2741
61007b31 2742int bdrv_is_read_only(BlockDriverState *bs)
8d3b1a2d 2743{
61007b31 2744 return bs->read_only;
83f64091 2745}
83f64091 2746
61007b31 2747int bdrv_is_sg(BlockDriverState *bs)
f08145fe 2748{
61007b31 2749 return bs->sg;
f08145fe
KW
2750}
2751
61007b31 2752int bdrv_enable_write_cache(BlockDriverState *bs)
ab185921 2753{
61007b31 2754 return bs->enable_write_cache;
ab185921
SH
2755}
2756
61007b31 2757void bdrv_set_enable_write_cache(BlockDriverState *bs, bool wce)
da1fa91d 2758{
61007b31 2759 bs->enable_write_cache = wce;
ab185921 2760
61007b31
SH
2761 /* so a reopen() will preserve wce */
2762 if (wce) {
2763 bs->open_flags |= BDRV_O_CACHE_WB;
893a8f62 2764 } else {
61007b31 2765 bs->open_flags &= ~BDRV_O_CACHE_WB;
893a8f62 2766 }
da1fa91d
KW
2767}
2768
61007b31 2769int bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 2770{
760e0063 2771 if (bs->backing && bs->backing->bs->encrypted) {
61007b31 2772 return 1;
760e0063 2773 }
61007b31 2774 return bs->encrypted;
fc3959e4
FZ
2775}
2776
61007b31 2777int bdrv_key_required(BlockDriverState *bs)
fc3959e4 2778{
760e0063 2779 BdrvChild *backing = bs->backing;
61007b31 2780
760e0063 2781 if (backing && backing->bs->encrypted && !backing->bs->valid_key) {
61007b31 2782 return 1;
760e0063 2783 }
61007b31 2784 return (bs->encrypted && !bs->valid_key);
fc3959e4
FZ
2785}
2786
61007b31 2787int bdrv_set_key(BlockDriverState *bs, const char *key)
d0c7f642 2788{
d0c7f642 2789 int ret;
760e0063
KW
2790 if (bs->backing && bs->backing->bs->encrypted) {
2791 ret = bdrv_set_key(bs->backing->bs, key);
61007b31
SH
2792 if (ret < 0)
2793 return ret;
2794 if (!bs->encrypted)
2795 return 0;
2796 }
2797 if (!bs->encrypted) {
2798 return -EINVAL;
2799 } else if (!bs->drv || !bs->drv->bdrv_set_key) {
d0c7f642
KW
2800 return -ENOMEDIUM;
2801 }
61007b31 2802 ret = bs->drv->bdrv_set_key(bs, key);
b9c64947 2803 if (ret < 0) {
61007b31
SH
2804 bs->valid_key = 0;
2805 } else if (!bs->valid_key) {
2806 bs->valid_key = 1;
2807 if (bs->blk) {
2808 /* call the change callback now, we skipped it on open */
2809 blk_dev_change_media_cb(bs->blk, true);
2810 }
1b0288ae 2811 }
61007b31
SH
2812 return ret;
2813}
f08f2dda 2814
c5fbe571 2815/*
61007b31
SH
2816 * Provide an encryption key for @bs.
2817 * If @key is non-null:
2818 * If @bs is not encrypted, fail.
2819 * Else if the key is invalid, fail.
2820 * Else set @bs's key to @key, replacing the existing key, if any.
2821 * If @key is null:
2822 * If @bs is encrypted and still lacks a key, fail.
2823 * Else do nothing.
2824 * On failure, store an error object through @errp if non-null.
c5fbe571 2825 */
61007b31 2826void bdrv_add_key(BlockDriverState *bs, const char *key, Error **errp)
c5fbe571 2827{
61007b31
SH
2828 if (key) {
2829 if (!bdrv_is_encrypted(bs)) {
2830 error_setg(errp, "Node '%s' is not encrypted",
2831 bdrv_get_device_or_node_name(bs));
2832 } else if (bdrv_set_key(bs, key) < 0) {
c6bd8c70 2833 error_setg(errp, QERR_INVALID_PASSWORD);
4d2855a3
MA
2834 }
2835 } else {
2836 if (bdrv_key_required(bs)) {
b1ca6391
MA
2837 error_set(errp, ERROR_CLASS_DEVICE_ENCRYPTED,
2838 "'%s' (%s) is encrypted",
81e5f78a 2839 bdrv_get_device_or_node_name(bs),
4d2855a3
MA
2840 bdrv_get_encrypted_filename(bs));
2841 }
2842 }
2843}
2844
61007b31 2845const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 2846{
61007b31 2847 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
2848}
2849
61007b31 2850static int qsort_strcmp(const void *a, const void *b)
40b4f539 2851{
61007b31 2852 return strcmp(a, b);
40b4f539
KW
2853}
2854
61007b31
SH
2855void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
2856 void *opaque)
40b4f539 2857{
61007b31
SH
2858 BlockDriver *drv;
2859 int count = 0;
2860 int i;
2861 const char **formats = NULL;
40b4f539 2862
61007b31
SH
2863 QLIST_FOREACH(drv, &bdrv_drivers, list) {
2864 if (drv->format_name) {
2865 bool found = false;
2866 int i = count;
2867 while (formats && i && !found) {
2868 found = !strcmp(formats[--i], drv->format_name);
2869 }
e2a305fb 2870
61007b31
SH
2871 if (!found) {
2872 formats = g_renew(const char *, formats, count + 1);
2873 formats[count++] = drv->format_name;
2874 }
6c5a42ac 2875 }
61007b31 2876 }
6c5a42ac 2877
61007b31 2878 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 2879
61007b31
SH
2880 for (i = 0; i < count; i++) {
2881 it(opaque, formats[i]);
2882 }
40b4f539 2883
61007b31
SH
2884 g_free(formats);
2885}
40b4f539 2886
61007b31
SH
2887/* This function is to find a node in the bs graph */
2888BlockDriverState *bdrv_find_node(const char *node_name)
2889{
2890 BlockDriverState *bs;
391827eb 2891
61007b31 2892 assert(node_name);
40b4f539 2893
61007b31
SH
2894 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2895 if (!strcmp(node_name, bs->node_name)) {
2896 return bs;
40b4f539
KW
2897 }
2898 }
61007b31 2899 return NULL;
40b4f539
KW
2900}
2901
61007b31
SH
2902/* Put this QMP function here so it can access the static graph_bdrv_states. */
2903BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 2904{
61007b31
SH
2905 BlockDeviceInfoList *list, *entry;
2906 BlockDriverState *bs;
40b4f539 2907
61007b31
SH
2908 list = NULL;
2909 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2910 BlockDeviceInfo *info = bdrv_block_device_info(bs, errp);
2911 if (!info) {
2912 qapi_free_BlockDeviceInfoList(list);
2913 return NULL;
301db7c2 2914 }
61007b31
SH
2915 entry = g_malloc0(sizeof(*entry));
2916 entry->value = info;
2917 entry->next = list;
2918 list = entry;
301db7c2
RH
2919 }
2920
61007b31
SH
2921 return list;
2922}
40b4f539 2923
61007b31
SH
2924BlockDriverState *bdrv_lookup_bs(const char *device,
2925 const char *node_name,
2926 Error **errp)
2927{
2928 BlockBackend *blk;
2929 BlockDriverState *bs;
40b4f539 2930
61007b31
SH
2931 if (device) {
2932 blk = blk_by_name(device);
40b4f539 2933
61007b31 2934 if (blk) {
9f4ed6fb
AG
2935 bs = blk_bs(blk);
2936 if (!bs) {
5433c24f 2937 error_setg(errp, "Device '%s' has no medium", device);
5433c24f
HR
2938 }
2939
9f4ed6fb 2940 return bs;
61007b31
SH
2941 }
2942 }
40b4f539 2943
61007b31
SH
2944 if (node_name) {
2945 bs = bdrv_find_node(node_name);
6d519a5f 2946
61007b31
SH
2947 if (bs) {
2948 return bs;
2949 }
40b4f539
KW
2950 }
2951
61007b31
SH
2952 error_setg(errp, "Cannot find device=%s nor node_name=%s",
2953 device ? device : "",
2954 node_name ? node_name : "");
2955 return NULL;
40b4f539
KW
2956}
2957
61007b31
SH
2958/* If 'base' is in the same chain as 'top', return true. Otherwise,
2959 * return false. If either argument is NULL, return false. */
2960bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 2961{
61007b31 2962 while (top && top != base) {
760e0063 2963 top = backing_bs(top);
02c50efe 2964 }
61007b31
SH
2965
2966 return top != NULL;
02c50efe
FZ
2967}
2968
61007b31 2969BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 2970{
61007b31
SH
2971 if (!bs) {
2972 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 2973 }
61007b31 2974 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
2975}
2976
61007b31 2977BlockDriverState *bdrv_next(BlockDriverState *bs)
83f64091 2978{
61007b31
SH
2979 if (!bs) {
2980 return QTAILQ_FIRST(&bdrv_states);
857d4f46 2981 }
61007b31 2982 return QTAILQ_NEXT(bs, device_list);
83f64091 2983}
beac80cd 2984
61007b31 2985const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 2986{
61007b31 2987 return bs->node_name;
beac80cd
FB
2988}
2989
61007b31
SH
2990/* TODO check what callers really want: bs->node_name or blk_name() */
2991const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 2992{
61007b31 2993 return bs->blk ? blk_name(bs->blk) : "";
f141eafe 2994}
83f64091 2995
61007b31
SH
2996/* This can be used to identify nodes that might not have a device
2997 * name associated. Since node and device names live in the same
2998 * namespace, the result is unambiguous. The exception is if both are
2999 * absent, then this returns an empty (non-null) string. */
3000const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 3001{
61007b31 3002 return bs->blk ? blk_name(bs->blk) : bs->node_name;
beac80cd 3003}
beac80cd 3004
61007b31 3005int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 3006{
61007b31 3007 return bs->open_flags;
0b5a2445
PB
3008}
3009
61007b31 3010int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 3011{
61007b31 3012 return 1;
0b5a2445
PB
3013}
3014
61007b31 3015int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 3016{
61007b31 3017 assert(bs->drv);
0b5a2445 3018
61007b31
SH
3019 /* If BS is a copy on write image, it is initialized to
3020 the contents of the base image, which may not be zeroes. */
760e0063 3021 if (bs->backing) {
61007b31
SH
3022 return 0;
3023 }
3024 if (bs->drv->bdrv_has_zero_init) {
3025 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 3026 }
61007b31
SH
3027
3028 /* safe default */
3029 return 0;
68485420
KW
3030}
3031
61007b31 3032bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 3033{
61007b31 3034 BlockDriverInfo bdi;
b2a61371 3035
760e0063 3036 if (bs->backing) {
61007b31
SH
3037 return false;
3038 }
3039
3040 if (bdrv_get_info(bs, &bdi) == 0) {
3041 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
3042 }
3043
61007b31 3044 return false;
b2a61371
SH
3045}
3046
61007b31 3047bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 3048{
61007b31 3049 BlockDriverInfo bdi;
68485420 3050
760e0063 3051 if (bs->backing || !(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
3052 return false;
3053 }
68485420 3054
61007b31
SH
3055 if (bdrv_get_info(bs, &bdi) == 0) {
3056 return bdi.can_write_zeroes_with_unmap;
3057 }
68485420 3058
61007b31 3059 return false;
68485420
KW
3060}
3061
61007b31 3062const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 3063{
760e0063 3064 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
3065 return bs->backing_file;
3066 else if (bs->encrypted)
3067 return bs->filename;
3068 else
3069 return NULL;
b2e12bc6
CH
3070}
3071
61007b31
SH
3072void bdrv_get_backing_filename(BlockDriverState *bs,
3073 char *filename, int filename_size)
016f5cf6 3074{
61007b31
SH
3075 pstrcpy(filename, filename_size, bs->backing_file);
3076}
d318aea9 3077
61007b31
SH
3078int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
3079{
3080 BlockDriver *drv = bs->drv;
3081 if (!drv)
3082 return -ENOMEDIUM;
3083 if (!drv->bdrv_get_info)
3084 return -ENOTSUP;
3085 memset(bdi, 0, sizeof(*bdi));
3086 return drv->bdrv_get_info(bs, bdi);
3087}
016f5cf6 3088
61007b31
SH
3089ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
3090{
3091 BlockDriver *drv = bs->drv;
3092 if (drv && drv->bdrv_get_specific_info) {
3093 return drv->bdrv_get_specific_info(bs);
3094 }
3095 return NULL;
016f5cf6
AG
3096}
3097
a31939e6 3098void bdrv_debug_event(BlockDriverState *bs, BlkdebugEvent event)
4265d620 3099{
61007b31
SH
3100 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
3101 return;
3102 }
4265d620 3103
61007b31 3104 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
3105}
3106
61007b31
SH
3107int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
3108 const char *tag)
4265d620 3109{
61007b31 3110 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 3111 bs = bs->file ? bs->file->bs : NULL;
61007b31 3112 }
4265d620 3113
61007b31
SH
3114 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
3115 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
3116 }
4265d620 3117
61007b31 3118 return -ENOTSUP;
4265d620
PB
3119}
3120
61007b31 3121int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 3122{
61007b31 3123 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 3124 bs = bs->file ? bs->file->bs : NULL;
61007b31 3125 }
ce1a14dc 3126
61007b31
SH
3127 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
3128 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
3129 }
3130
3131 return -ENOTSUP;
eb852011
MA
3132}
3133
61007b31 3134int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 3135{
61007b31 3136 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 3137 bs = bs->file ? bs->file->bs : NULL;
61007b31 3138 }
ce1a14dc 3139
61007b31
SH
3140 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
3141 return bs->drv->bdrv_debug_resume(bs, tag);
3142 }
ce1a14dc 3143
61007b31 3144 return -ENOTSUP;
f197fe2b
FZ
3145}
3146
61007b31 3147bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 3148{
61007b31 3149 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 3150 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 3151 }
19cb3738 3152
61007b31
SH
3153 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
3154 return bs->drv->bdrv_debug_is_suspended(bs, tag);
3155 }
f9f05dc5 3156
61007b31
SH
3157 return false;
3158}
f9f05dc5 3159
61007b31 3160int bdrv_is_snapshot(BlockDriverState *bs)
f9f05dc5 3161{
61007b31 3162 return !!(bs->open_flags & BDRV_O_SNAPSHOT);
f9f05dc5
KW
3163}
3164
61007b31
SH
3165/* backing_file can either be relative, or absolute, or a protocol. If it is
3166 * relative, it must be relative to the chain. So, passing in bs->filename
3167 * from a BDS as backing_file should not be done, as that may be relative to
3168 * the CWD rather than the chain. */
3169BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
3170 const char *backing_file)
f9f05dc5 3171{
61007b31
SH
3172 char *filename_full = NULL;
3173 char *backing_file_full = NULL;
3174 char *filename_tmp = NULL;
3175 int is_protocol = 0;
3176 BlockDriverState *curr_bs = NULL;
3177 BlockDriverState *retval = NULL;
f9f05dc5 3178
61007b31
SH
3179 if (!bs || !bs->drv || !backing_file) {
3180 return NULL;
f9f05dc5
KW
3181 }
3182
61007b31
SH
3183 filename_full = g_malloc(PATH_MAX);
3184 backing_file_full = g_malloc(PATH_MAX);
3185 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 3186
61007b31 3187 is_protocol = path_has_protocol(backing_file);
f9f05dc5 3188
760e0063 3189 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 3190
61007b31
SH
3191 /* If either of the filename paths is actually a protocol, then
3192 * compare unmodified paths; otherwise make paths relative */
3193 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
3194 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 3195 retval = curr_bs->backing->bs;
61007b31
SH
3196 break;
3197 }
3198 } else {
3199 /* If not an absolute filename path, make it relative to the current
3200 * image's filename path */
3201 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3202 backing_file);
f9f05dc5 3203
61007b31
SH
3204 /* We are going to compare absolute pathnames */
3205 if (!realpath(filename_tmp, filename_full)) {
3206 continue;
3207 }
07f07615 3208
61007b31
SH
3209 /* We need to make sure the backing filename we are comparing against
3210 * is relative to the current image filename (or absolute) */
3211 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3212 curr_bs->backing_file);
07f07615 3213
61007b31
SH
3214 if (!realpath(filename_tmp, backing_file_full)) {
3215 continue;
3216 }
eb489bb1 3217
61007b31 3218 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 3219 retval = curr_bs->backing->bs;
61007b31
SH
3220 break;
3221 }
3222 }
eb489bb1
KW
3223 }
3224
61007b31
SH
3225 g_free(filename_full);
3226 g_free(backing_file_full);
3227 g_free(filename_tmp);
3228 return retval;
3229}
3230
3231int bdrv_get_backing_file_depth(BlockDriverState *bs)
3232{
3233 if (!bs->drv) {
3234 return 0;
eb489bb1
KW
3235 }
3236
760e0063 3237 if (!bs->backing) {
61007b31 3238 return 0;
ca716364
KW
3239 }
3240
760e0063 3241 return 1 + bdrv_get_backing_file_depth(bs->backing->bs);
61007b31 3242}
07f07615 3243
61007b31
SH
3244void bdrv_init(void)
3245{
3246 module_call_init(MODULE_INIT_BLOCK);
3247}
29cdb251 3248
61007b31
SH
3249void bdrv_init_with_whitelist(void)
3250{
3251 use_bdrv_whitelist = 1;
3252 bdrv_init();
07f07615
PB
3253}
3254
5a8a30db 3255void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 3256{
5a8a30db
KW
3257 Error *local_err = NULL;
3258 int ret;
3259
3456a8d1
KW
3260 if (!bs->drv) {
3261 return;
3262 }
3263
04c01a5c 3264 if (!(bs->open_flags & BDRV_O_INACTIVE)) {
7ea2d269
AK
3265 return;
3266 }
04c01a5c 3267 bs->open_flags &= ~BDRV_O_INACTIVE;
7ea2d269 3268
3456a8d1 3269 if (bs->drv->bdrv_invalidate_cache) {
5a8a30db 3270 bs->drv->bdrv_invalidate_cache(bs, &local_err);
3456a8d1 3271 } else if (bs->file) {
9a4f4c31 3272 bdrv_invalidate_cache(bs->file->bs, &local_err);
5a8a30db
KW
3273 }
3274 if (local_err) {
04c01a5c 3275 bs->open_flags |= BDRV_O_INACTIVE;
5a8a30db
KW
3276 error_propagate(errp, local_err);
3277 return;
0f15423c 3278 }
3456a8d1 3279
5a8a30db
KW
3280 ret = refresh_total_sectors(bs, bs->total_sectors);
3281 if (ret < 0) {
04c01a5c 3282 bs->open_flags |= BDRV_O_INACTIVE;
5a8a30db
KW
3283 error_setg_errno(errp, -ret, "Could not refresh total sector count");
3284 return;
3285 }
0f15423c
AL
3286}
3287
5a8a30db 3288void bdrv_invalidate_cache_all(Error **errp)
0f15423c
AL
3289{
3290 BlockDriverState *bs;
5a8a30db 3291 Error *local_err = NULL;
0f15423c 3292
dc364f4c 3293 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
3294 AioContext *aio_context = bdrv_get_aio_context(bs);
3295
3296 aio_context_acquire(aio_context);
5a8a30db 3297 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 3298 aio_context_release(aio_context);
5a8a30db
KW
3299 if (local_err) {
3300 error_propagate(errp, local_err);
3301 return;
3302 }
0f15423c
AL
3303 }
3304}
3305
19cb3738
FB
3306/**************************************************************/
3307/* removable device support */
3308
3309/**
3310 * Return TRUE if the media is present
3311 */
e031f750 3312bool bdrv_is_inserted(BlockDriverState *bs)
19cb3738
FB
3313{
3314 BlockDriver *drv = bs->drv;
28d7a789 3315 BdrvChild *child;
a1aff5bf 3316
e031f750
HR
3317 if (!drv) {
3318 return false;
3319 }
28d7a789
HR
3320 if (drv->bdrv_is_inserted) {
3321 return drv->bdrv_is_inserted(bs);
3322 }
3323 QLIST_FOREACH(child, &bs->children, next) {
3324 if (!bdrv_is_inserted(child->bs)) {
3325 return false;
3326 }
e031f750 3327 }
28d7a789 3328 return true;
19cb3738
FB
3329}
3330
3331/**
8e49ca46
MA
3332 * Return whether the media changed since the last call to this
3333 * function, or -ENOTSUP if we don't know. Most drivers don't know.
19cb3738
FB
3334 */
3335int bdrv_media_changed(BlockDriverState *bs)
3336{
3337 BlockDriver *drv = bs->drv;
19cb3738 3338
8e49ca46
MA
3339 if (drv && drv->bdrv_media_changed) {
3340 return drv->bdrv_media_changed(bs);
3341 }
3342 return -ENOTSUP;
19cb3738
FB
3343}
3344
3345/**
3346 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
3347 */
f36f3949 3348void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
3349{
3350 BlockDriver *drv = bs->drv;
bfb197e0 3351 const char *device_name;
19cb3738 3352
822e1cd1
MA
3353 if (drv && drv->bdrv_eject) {
3354 drv->bdrv_eject(bs, eject_flag);
19cb3738 3355 }
6f382ed2 3356
bfb197e0
MA
3357 device_name = bdrv_get_device_name(bs);
3358 if (device_name[0] != '\0') {
3359 qapi_event_send_device_tray_moved(device_name,
a5ee7bd4 3360 eject_flag, &error_abort);
6f382ed2 3361 }
19cb3738
FB
3362}
3363
19cb3738
FB
3364/**
3365 * Lock or unlock the media (if it is locked, the user won't be able
3366 * to eject it manually).
3367 */
025e849a 3368void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
3369{
3370 BlockDriver *drv = bs->drv;
3371
025e849a 3372 trace_bdrv_lock_medium(bs, locked);
b8c6d095 3373
025e849a
MA
3374 if (drv && drv->bdrv_lock_medium) {
3375 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
3376 }
3377}
985a03b0 3378
0db6e54a
FZ
3379BdrvDirtyBitmap *bdrv_find_dirty_bitmap(BlockDriverState *bs, const char *name)
3380{
3381 BdrvDirtyBitmap *bm;
3382
3383 assert(name);
3384 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
3385 if (bm->name && !strcmp(name, bm->name)) {
3386 return bm;
3387 }
3388 }
3389 return NULL;
3390}
3391
20dca810 3392void bdrv_dirty_bitmap_make_anon(BdrvDirtyBitmap *bitmap)
0db6e54a 3393{
9bd2b08f 3394 assert(!bdrv_dirty_bitmap_frozen(bitmap));
0db6e54a
FZ
3395 g_free(bitmap->name);
3396 bitmap->name = NULL;
3397}
3398
3399BdrvDirtyBitmap *bdrv_create_dirty_bitmap(BlockDriverState *bs,
5fba6c0e 3400 uint32_t granularity,
0db6e54a 3401 const char *name,
b8afb520 3402 Error **errp)
7cd1e32a
LS
3403{
3404 int64_t bitmap_size;
e4654d2d 3405 BdrvDirtyBitmap *bitmap;
5fba6c0e 3406 uint32_t sector_granularity;
a55eb92c 3407
50717e94
PB
3408 assert((granularity & (granularity - 1)) == 0);
3409
0db6e54a
FZ
3410 if (name && bdrv_find_dirty_bitmap(bs, name)) {
3411 error_setg(errp, "Bitmap already exists: %s", name);
3412 return NULL;
3413 }
5fba6c0e
JS
3414 sector_granularity = granularity >> BDRV_SECTOR_BITS;
3415 assert(sector_granularity);
57322b78 3416 bitmap_size = bdrv_nb_sectors(bs);
b8afb520
FZ
3417 if (bitmap_size < 0) {
3418 error_setg_errno(errp, -bitmap_size, "could not get length of device");
3419 errno = -bitmap_size;
3420 return NULL;
3421 }
5839e53b 3422 bitmap = g_new0(BdrvDirtyBitmap, 1);
5fba6c0e 3423 bitmap->bitmap = hbitmap_alloc(bitmap_size, ctz32(sector_granularity));
e74e6b78 3424 bitmap->size = bitmap_size;
0db6e54a 3425 bitmap->name = g_strdup(name);
b8e6fb75 3426 bitmap->disabled = false;
e4654d2d
FZ
3427 QLIST_INSERT_HEAD(&bs->dirty_bitmaps, bitmap, list);
3428 return bitmap;
3429}
3430
9bd2b08f
JS
3431bool bdrv_dirty_bitmap_frozen(BdrvDirtyBitmap *bitmap)
3432{
3433 return bitmap->successor;
3434}
3435
b8e6fb75
JS
3436bool bdrv_dirty_bitmap_enabled(BdrvDirtyBitmap *bitmap)
3437{
9bd2b08f
JS
3438 return !(bitmap->disabled || bitmap->successor);
3439}
3440
9abe3bdc
JS
3441DirtyBitmapStatus bdrv_dirty_bitmap_status(BdrvDirtyBitmap *bitmap)
3442{
3443 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3444 return DIRTY_BITMAP_STATUS_FROZEN;
3445 } else if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3446 return DIRTY_BITMAP_STATUS_DISABLED;
3447 } else {
3448 return DIRTY_BITMAP_STATUS_ACTIVE;
3449 }
3450}
3451
9bd2b08f
JS
3452/**
3453 * Create a successor bitmap destined to replace this bitmap after an operation.
3454 * Requires that the bitmap is not frozen and has no successor.
3455 */
3456int bdrv_dirty_bitmap_create_successor(BlockDriverState *bs,
3457 BdrvDirtyBitmap *bitmap, Error **errp)
3458{
3459 uint64_t granularity;
3460 BdrvDirtyBitmap *child;
3461
3462 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3463 error_setg(errp, "Cannot create a successor for a bitmap that is "
3464 "currently frozen");
3465 return -1;
3466 }
3467 assert(!bitmap->successor);
3468
3469 /* Create an anonymous successor */
3470 granularity = bdrv_dirty_bitmap_granularity(bitmap);
3471 child = bdrv_create_dirty_bitmap(bs, granularity, NULL, errp);
3472 if (!child) {
3473 return -1;
3474 }
3475
3476 /* Successor will be on or off based on our current state. */
3477 child->disabled = bitmap->disabled;
3478
3479 /* Install the successor and freeze the parent */
3480 bitmap->successor = child;
3481 return 0;
3482}
3483
3484/**
3485 * For a bitmap with a successor, yield our name to the successor,
3486 * delete the old bitmap, and return a handle to the new bitmap.
3487 */
3488BdrvDirtyBitmap *bdrv_dirty_bitmap_abdicate(BlockDriverState *bs,
3489 BdrvDirtyBitmap *bitmap,
3490 Error **errp)
3491{
3492 char *name;
3493 BdrvDirtyBitmap *successor = bitmap->successor;
3494
3495 if (successor == NULL) {
3496 error_setg(errp, "Cannot relinquish control if "
3497 "there's no successor present");
3498 return NULL;
3499 }
3500
3501 name = bitmap->name;
3502 bitmap->name = NULL;
3503 successor->name = name;
3504 bitmap->successor = NULL;
3505 bdrv_release_dirty_bitmap(bs, bitmap);
3506
3507 return successor;
3508}
3509
3510/**
3511 * In cases of failure where we can no longer safely delete the parent,
3512 * we may wish to re-join the parent and child/successor.
3513 * The merged parent will be un-frozen, but not explicitly re-enabled.
3514 */
3515BdrvDirtyBitmap *bdrv_reclaim_dirty_bitmap(BlockDriverState *bs,
3516 BdrvDirtyBitmap *parent,
3517 Error **errp)
3518{
3519 BdrvDirtyBitmap *successor = parent->successor;
3520
3521 if (!successor) {
3522 error_setg(errp, "Cannot reclaim a successor when none is present");
3523 return NULL;
3524 }
3525
3526 if (!hbitmap_merge(parent->bitmap, successor->bitmap)) {
3527 error_setg(errp, "Merging of parent and successor bitmap failed");
3528 return NULL;
3529 }
3530 bdrv_release_dirty_bitmap(bs, successor);
3531 parent->successor = NULL;
3532
3533 return parent;
b8e6fb75
JS
3534}
3535
ce1ffea8
JS
3536/**
3537 * Truncates _all_ bitmaps attached to a BDS.
3538 */
3539static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs)
3540{
3541 BdrvDirtyBitmap *bitmap;
3542 uint64_t size = bdrv_nb_sectors(bs);
3543
3544 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
06207b0f 3545 assert(!bdrv_dirty_bitmap_frozen(bitmap));
ce1ffea8 3546 hbitmap_truncate(bitmap->bitmap, size);
5270b6a0 3547 bitmap->size = size;
ce1ffea8
JS
3548 }
3549}
3550
e4654d2d
FZ
3551void bdrv_release_dirty_bitmap(BlockDriverState *bs, BdrvDirtyBitmap *bitmap)
3552{
3553 BdrvDirtyBitmap *bm, *next;
3554 QLIST_FOREACH_SAFE(bm, &bs->dirty_bitmaps, list, next) {
3555 if (bm == bitmap) {
9bd2b08f 3556 assert(!bdrv_dirty_bitmap_frozen(bm));
e4654d2d
FZ
3557 QLIST_REMOVE(bitmap, list);
3558 hbitmap_free(bitmap->bitmap);
0db6e54a 3559 g_free(bitmap->name);
e4654d2d
FZ
3560 g_free(bitmap);
3561 return;
a55eb92c 3562 }
7cd1e32a
LS
3563 }
3564}
3565
b8e6fb75
JS
3566void bdrv_disable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3567{
9bd2b08f 3568 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3569 bitmap->disabled = true;
3570}
3571
3572void bdrv_enable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3573{
9bd2b08f 3574 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3575 bitmap->disabled = false;
3576}
3577
21b56835
FZ
3578BlockDirtyInfoList *bdrv_query_dirty_bitmaps(BlockDriverState *bs)
3579{
3580 BdrvDirtyBitmap *bm;
3581 BlockDirtyInfoList *list = NULL;
3582 BlockDirtyInfoList **plist = &list;
3583
3584 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
5839e53b
MA
3585 BlockDirtyInfo *info = g_new0(BlockDirtyInfo, 1);
3586 BlockDirtyInfoList *entry = g_new0(BlockDirtyInfoList, 1);
20dca810 3587 info->count = bdrv_get_dirty_count(bm);
592fdd02 3588 info->granularity = bdrv_dirty_bitmap_granularity(bm);
0db6e54a
FZ
3589 info->has_name = !!bm->name;
3590 info->name = g_strdup(bm->name);
9abe3bdc 3591 info->status = bdrv_dirty_bitmap_status(bm);
21b56835
FZ
3592 entry->value = info;
3593 *plist = entry;
3594 plist = &entry->next;
3595 }
3596
3597 return list;
3598}
3599
e4654d2d 3600int bdrv_get_dirty(BlockDriverState *bs, BdrvDirtyBitmap *bitmap, int64_t sector)
7cd1e32a 3601{
e4654d2d
FZ
3602 if (bitmap) {
3603 return hbitmap_get(bitmap->bitmap, sector);
7cd1e32a
LS
3604 } else {
3605 return 0;
3606 }
3607}
3608
341ebc2f
JS
3609/**
3610 * Chooses a default granularity based on the existing cluster size,
3611 * but clamped between [4K, 64K]. Defaults to 64K in the case that there
3612 * is no cluster size information available.
3613 */
3614uint32_t bdrv_get_default_bitmap_granularity(BlockDriverState *bs)
3615{
3616 BlockDriverInfo bdi;
3617 uint32_t granularity;
3618
3619 if (bdrv_get_info(bs, &bdi) >= 0 && bdi.cluster_size > 0) {
3620 granularity = MAX(4096, bdi.cluster_size);
3621 granularity = MIN(65536, granularity);
3622 } else {
3623 granularity = 65536;
3624 }
3625
3626 return granularity;
3627}
3628
592fdd02
JS
3629uint32_t bdrv_dirty_bitmap_granularity(BdrvDirtyBitmap *bitmap)
3630{
3631 return BDRV_SECTOR_SIZE << hbitmap_granularity(bitmap->bitmap);
3632}
3633
20dca810 3634void bdrv_dirty_iter_init(BdrvDirtyBitmap *bitmap, HBitmapIter *hbi)
1755da16 3635{
e4654d2d 3636 hbitmap_iter_init(hbi, bitmap->bitmap, 0);
1755da16
PB
3637}
3638
20dca810 3639void bdrv_set_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3640 int64_t cur_sector, int nr_sectors)
3641{
b8e6fb75 3642 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3643 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3644}
3645
20dca810 3646void bdrv_reset_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3647 int64_t cur_sector, int nr_sectors)
3648{
b8e6fb75 3649 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3650 hbitmap_reset(bitmap->bitmap, cur_sector, nr_sectors);
3651}
3652
df9a681d 3653void bdrv_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap, HBitmap **out)
e74e6b78
JS
3654{
3655 assert(bdrv_dirty_bitmap_enabled(bitmap));
df9a681d
FZ
3656 if (!out) {
3657 hbitmap_reset_all(bitmap->bitmap);
3658 } else {
3659 HBitmap *backup = bitmap->bitmap;
3660 bitmap->bitmap = hbitmap_alloc(bitmap->size,
3661 hbitmap_granularity(backup));
3662 *out = backup;
3663 }
3664}
3665
3666void bdrv_undo_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap, HBitmap *in)
3667{
3668 HBitmap *tmp = bitmap->bitmap;
3669 assert(bdrv_dirty_bitmap_enabled(bitmap));
3670 bitmap->bitmap = in;
3671 hbitmap_free(tmp);
e74e6b78
JS
3672}
3673
e0c47b6c
SH
3674void bdrv_set_dirty(BlockDriverState *bs, int64_t cur_sector,
3675 int nr_sectors)
1755da16 3676{
e4654d2d
FZ
3677 BdrvDirtyBitmap *bitmap;
3678 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
b8e6fb75
JS
3679 if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3680 continue;
3681 }
e4654d2d
FZ
3682 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3683 }
1755da16
PB
3684}
3685
d58d8453
JS
3686/**
3687 * Advance an HBitmapIter to an arbitrary offset.
3688 */
3689void bdrv_set_dirty_iter(HBitmapIter *hbi, int64_t offset)
3690{
3691 assert(hbi->hb);
3692 hbitmap_iter_init(hbi, hbi->hb, offset);
3693}
3694
20dca810 3695int64_t bdrv_get_dirty_count(BdrvDirtyBitmap *bitmap)
aaa0eb75 3696{
e4654d2d 3697 return hbitmap_count(bitmap->bitmap);
aaa0eb75 3698}
f88e1a42 3699
9fcb0251
FZ
3700/* Get a reference to bs */
3701void bdrv_ref(BlockDriverState *bs)
3702{
3703 bs->refcnt++;
3704}
3705
3706/* Release a previously grabbed reference to bs.
3707 * If after releasing, reference count is zero, the BlockDriverState is
3708 * deleted. */
3709void bdrv_unref(BlockDriverState *bs)
3710{
9a4d5ca6
JC
3711 if (!bs) {
3712 return;
3713 }
9fcb0251
FZ
3714 assert(bs->refcnt > 0);
3715 if (--bs->refcnt == 0) {
3716 bdrv_delete(bs);
3717 }
3718}
3719
fbe40ff7
FZ
3720struct BdrvOpBlocker {
3721 Error *reason;
3722 QLIST_ENTRY(BdrvOpBlocker) list;
3723};
3724
3725bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
3726{
3727 BdrvOpBlocker *blocker;
3728 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3729 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
3730 blocker = QLIST_FIRST(&bs->op_blockers[op]);
3731 if (errp) {
e43bfd9c
MA
3732 *errp = error_copy(blocker->reason);
3733 error_prepend(errp, "Node '%s' is busy: ",
3734 bdrv_get_device_or_node_name(bs));
fbe40ff7
FZ
3735 }
3736 return true;
3737 }
3738 return false;
3739}
3740
3741void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
3742{
3743 BdrvOpBlocker *blocker;
3744 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3745
5839e53b 3746 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
3747 blocker->reason = reason;
3748 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
3749}
3750
3751void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
3752{
3753 BdrvOpBlocker *blocker, *next;
3754 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3755 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
3756 if (blocker->reason == reason) {
3757 QLIST_REMOVE(blocker, list);
3758 g_free(blocker);
3759 }
3760 }
3761}
3762
3763void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
3764{
3765 int i;
3766 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3767 bdrv_op_block(bs, i, reason);
3768 }
3769}
3770
3771void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
3772{
3773 int i;
3774 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3775 bdrv_op_unblock(bs, i, reason);
3776 }
3777}
3778
3779bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
3780{
3781 int i;
3782
3783 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3784 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
3785 return false;
3786 }
3787 }
3788 return true;
3789}
3790
d92ada22
LC
3791void bdrv_img_create(const char *filename, const char *fmt,
3792 const char *base_filename, const char *base_fmt,
f382d43a
MR
3793 char *options, uint64_t img_size, int flags,
3794 Error **errp, bool quiet)
f88e1a42 3795{
83d0521a
CL
3796 QemuOptsList *create_opts = NULL;
3797 QemuOpts *opts = NULL;
3798 const char *backing_fmt, *backing_file;
3799 int64_t size;
f88e1a42 3800 BlockDriver *drv, *proto_drv;
cc84d90f 3801 Error *local_err = NULL;
f88e1a42
JS
3802 int ret = 0;
3803
3804 /* Find driver and parse its options */
3805 drv = bdrv_find_format(fmt);
3806 if (!drv) {
71c79813 3807 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 3808 return;
f88e1a42
JS
3809 }
3810
b65a5e12 3811 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 3812 if (!proto_drv) {
d92ada22 3813 return;
f88e1a42
JS
3814 }
3815
c6149724
HR
3816 if (!drv->create_opts) {
3817 error_setg(errp, "Format driver '%s' does not support image creation",
3818 drv->format_name);
3819 return;
3820 }
3821
3822 if (!proto_drv->create_opts) {
3823 error_setg(errp, "Protocol driver '%s' does not support image creation",
3824 proto_drv->format_name);
3825 return;
3826 }
3827
c282e1fd
CL
3828 create_opts = qemu_opts_append(create_opts, drv->create_opts);
3829 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
3830
3831 /* Create parameter list with default values */
83d0521a 3832 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 3833 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
3834
3835 /* Parse -o options */
3836 if (options) {
dc523cd3
MA
3837 qemu_opts_do_parse(opts, options, NULL, &local_err);
3838 if (local_err) {
3839 error_report_err(local_err);
3840 local_err = NULL;
83d0521a 3841 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
3842 goto out;
3843 }
3844 }
3845
3846 if (base_filename) {
f43e47db 3847 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 3848 if (local_err) {
71c79813
LC
3849 error_setg(errp, "Backing file not supported for file format '%s'",
3850 fmt);
f88e1a42
JS
3851 goto out;
3852 }
3853 }
3854
3855 if (base_fmt) {
f43e47db 3856 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 3857 if (local_err) {
71c79813
LC
3858 error_setg(errp, "Backing file format not supported for file "
3859 "format '%s'", fmt);
f88e1a42
JS
3860 goto out;
3861 }
3862 }
3863
83d0521a
CL
3864 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
3865 if (backing_file) {
3866 if (!strcmp(filename, backing_file)) {
71c79813
LC
3867 error_setg(errp, "Error: Trying to create an image with the "
3868 "same filename as the backing file");
792da93a
JS
3869 goto out;
3870 }
3871 }
3872
83d0521a 3873 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42
JS
3874
3875 // The size for the image must always be specified, with one exception:
3876 // If we are using a backing file, we can obtain the size from there
83d0521a
CL
3877 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
3878 if (size == -1) {
3879 if (backing_file) {
66f6b814 3880 BlockDriverState *bs;
29168018 3881 char *full_backing = g_new0(char, PATH_MAX);
52bf1e72 3882 int64_t size;
63090dac 3883 int back_flags;
e6641719 3884 QDict *backing_options = NULL;
63090dac 3885
29168018
HR
3886 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
3887 full_backing, PATH_MAX,
3888 &local_err);
3889 if (local_err) {
3890 g_free(full_backing);
3891 goto out;
3892 }
3893
63090dac
PB
3894 /* backing files always opened read-only */
3895 back_flags =
3896 flags & ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 3897
e6641719
HR
3898 if (backing_fmt) {
3899 backing_options = qdict_new();
3900 qdict_put(backing_options, "driver",
3901 qstring_from_str(backing_fmt));
3902 }
3903
f67503e5 3904 bs = NULL;
e6641719 3905 ret = bdrv_open(&bs, full_backing, NULL, backing_options,
6ebf9aa2 3906 back_flags, &local_err);
29168018 3907 g_free(full_backing);
f88e1a42 3908 if (ret < 0) {
f88e1a42
JS
3909 goto out;
3910 }
52bf1e72
MA
3911 size = bdrv_getlength(bs);
3912 if (size < 0) {
3913 error_setg_errno(errp, -size, "Could not get size of '%s'",
3914 backing_file);
3915 bdrv_unref(bs);
3916 goto out;
3917 }
f88e1a42 3918
39101f25 3919 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
66f6b814
HR
3920
3921 bdrv_unref(bs);
f88e1a42 3922 } else {
71c79813 3923 error_setg(errp, "Image creation needs a size parameter");
f88e1a42
JS
3924 goto out;
3925 }
3926 }
3927
f382d43a 3928 if (!quiet) {
fe646693 3929 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 3930 qemu_opts_print(opts, " ");
f382d43a
MR
3931 puts("");
3932 }
83d0521a 3933
c282e1fd 3934 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 3935
cc84d90f
HR
3936 if (ret == -EFBIG) {
3937 /* This is generally a better message than whatever the driver would
3938 * deliver (especially because of the cluster_size_hint), since that
3939 * is most probably not much different from "image too large". */
3940 const char *cluster_size_hint = "";
83d0521a 3941 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 3942 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 3943 }
cc84d90f
HR
3944 error_setg(errp, "The image size is too large for file format '%s'"
3945 "%s", fmt, cluster_size_hint);
3946 error_free(local_err);
3947 local_err = NULL;
f88e1a42
JS
3948 }
3949
3950out:
83d0521a
CL
3951 qemu_opts_del(opts);
3952 qemu_opts_free(create_opts);
84d18f06 3953 if (local_err) {
cc84d90f
HR
3954 error_propagate(errp, local_err);
3955 }
f88e1a42 3956}
85d126f3
SH
3957
3958AioContext *bdrv_get_aio_context(BlockDriverState *bs)
3959{
dcd04228
SH
3960 return bs->aio_context;
3961}
3962
3963void bdrv_detach_aio_context(BlockDriverState *bs)
3964{
33384421
HR
3965 BdrvAioNotifier *baf;
3966
dcd04228
SH
3967 if (!bs->drv) {
3968 return;
3969 }
3970
33384421
HR
3971 QLIST_FOREACH(baf, &bs->aio_notifiers, list) {
3972 baf->detach_aio_context(baf->opaque);
3973 }
3974
a0d64a61 3975 if (bs->throttle_state) {
0e5b0a2d 3976 throttle_timers_detach_aio_context(&bs->throttle_timers);
13af91eb 3977 }
dcd04228
SH
3978 if (bs->drv->bdrv_detach_aio_context) {
3979 bs->drv->bdrv_detach_aio_context(bs);
3980 }
3981 if (bs->file) {
9a4f4c31 3982 bdrv_detach_aio_context(bs->file->bs);
dcd04228 3983 }
760e0063
KW
3984 if (bs->backing) {
3985 bdrv_detach_aio_context(bs->backing->bs);
dcd04228
SH
3986 }
3987
3988 bs->aio_context = NULL;
3989}
3990
3991void bdrv_attach_aio_context(BlockDriverState *bs,
3992 AioContext *new_context)
3993{
33384421
HR
3994 BdrvAioNotifier *ban;
3995
dcd04228
SH
3996 if (!bs->drv) {
3997 return;
3998 }
3999
4000 bs->aio_context = new_context;
4001
760e0063
KW
4002 if (bs->backing) {
4003 bdrv_attach_aio_context(bs->backing->bs, new_context);
dcd04228
SH
4004 }
4005 if (bs->file) {
9a4f4c31 4006 bdrv_attach_aio_context(bs->file->bs, new_context);
dcd04228
SH
4007 }
4008 if (bs->drv->bdrv_attach_aio_context) {
4009 bs->drv->bdrv_attach_aio_context(bs, new_context);
4010 }
a0d64a61 4011 if (bs->throttle_state) {
0e5b0a2d 4012 throttle_timers_attach_aio_context(&bs->throttle_timers, new_context);
13af91eb 4013 }
33384421
HR
4014
4015 QLIST_FOREACH(ban, &bs->aio_notifiers, list) {
4016 ban->attached_aio_context(new_context, ban->opaque);
4017 }
dcd04228
SH
4018}
4019
4020void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
4021{
53ec73e2 4022 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228
SH
4023
4024 bdrv_detach_aio_context(bs);
4025
4026 /* This function executes in the old AioContext so acquire the new one in
4027 * case it runs in a different thread.
4028 */
4029 aio_context_acquire(new_context);
4030 bdrv_attach_aio_context(bs, new_context);
4031 aio_context_release(new_context);
85d126f3 4032}
d616b224 4033
33384421
HR
4034void bdrv_add_aio_context_notifier(BlockDriverState *bs,
4035 void (*attached_aio_context)(AioContext *new_context, void *opaque),
4036 void (*detach_aio_context)(void *opaque), void *opaque)
4037{
4038 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
4039 *ban = (BdrvAioNotifier){
4040 .attached_aio_context = attached_aio_context,
4041 .detach_aio_context = detach_aio_context,
4042 .opaque = opaque
4043 };
4044
4045 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
4046}
4047
4048void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
4049 void (*attached_aio_context)(AioContext *,
4050 void *),
4051 void (*detach_aio_context)(void *),
4052 void *opaque)
4053{
4054 BdrvAioNotifier *ban, *ban_next;
4055
4056 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
4057 if (ban->attached_aio_context == attached_aio_context &&
4058 ban->detach_aio_context == detach_aio_context &&
4059 ban->opaque == opaque)
4060 {
4061 QLIST_REMOVE(ban, list);
4062 g_free(ban);
4063
4064 return;
4065 }
4066 }
4067
4068 abort();
4069}
4070
77485434 4071int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
8b13976d 4072 BlockDriverAmendStatusCB *status_cb, void *cb_opaque)
6f176b48 4073{
c282e1fd 4074 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
4075 return -ENOTSUP;
4076 }
8b13976d 4077 return bs->drv->bdrv_amend_options(bs, opts, status_cb, cb_opaque);
6f176b48 4078}
f6186f49 4079
b5042a36
BC
4080/* This function will be called by the bdrv_recurse_is_first_non_filter method
4081 * of block filter and by bdrv_is_first_non_filter.
4082 * It is used to test if the given bs is the candidate or recurse more in the
4083 * node graph.
212a5a8f 4084 */
b5042a36 4085bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 4086 BlockDriverState *candidate)
f6186f49 4087{
b5042a36
BC
4088 /* return false if basic checks fails */
4089 if (!bs || !bs->drv) {
212a5a8f 4090 return false;
f6186f49
BC
4091 }
4092
b5042a36
BC
4093 /* the code reached a non block filter driver -> check if the bs is
4094 * the same as the candidate. It's the recursion termination condition.
4095 */
4096 if (!bs->drv->is_filter) {
4097 return bs == candidate;
212a5a8f 4098 }
b5042a36 4099 /* Down this path the driver is a block filter driver */
212a5a8f 4100
b5042a36
BC
4101 /* If the block filter recursion method is defined use it to recurse down
4102 * the node graph.
4103 */
4104 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 4105 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
4106 }
4107
b5042a36
BC
4108 /* the driver is a block filter but don't allow to recurse -> return false
4109 */
4110 return false;
f6186f49
BC
4111}
4112
212a5a8f
BC
4113/* This function checks if the candidate is the first non filter bs down it's
4114 * bs chain. Since we don't have pointers to parents it explore all bs chains
4115 * from the top. Some filters can choose not to pass down the recursion.
4116 */
4117bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 4118{
212a5a8f
BC
4119 BlockDriverState *bs;
4120
4121 /* walk down the bs forest recursively */
4122 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
4123 bool perm;
4124
b5042a36 4125 /* try to recurse in this top level bs */
e6dc8a1f 4126 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
4127
4128 /* candidate is the first non filter */
4129 if (perm) {
4130 return true;
4131 }
4132 }
4133
4134 return false;
f6186f49 4135}
09158f00 4136
e12f3784
WC
4137BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
4138 const char *node_name, Error **errp)
09158f00
BC
4139{
4140 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
4141 AioContext *aio_context;
4142
09158f00
BC
4143 if (!to_replace_bs) {
4144 error_setg(errp, "Node name '%s' not found", node_name);
4145 return NULL;
4146 }
4147
5a7e7a0b
SH
4148 aio_context = bdrv_get_aio_context(to_replace_bs);
4149 aio_context_acquire(aio_context);
4150
09158f00 4151 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
4152 to_replace_bs = NULL;
4153 goto out;
09158f00
BC
4154 }
4155
4156 /* We don't want arbitrary node of the BDS chain to be replaced only the top
4157 * most non filter in order to prevent data corruption.
4158 * Another benefit is that this tests exclude backing files which are
4159 * blocked by the backing blockers.
4160 */
e12f3784 4161 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 4162 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
4163 to_replace_bs = NULL;
4164 goto out;
09158f00
BC
4165 }
4166
5a7e7a0b
SH
4167out:
4168 aio_context_release(aio_context);
09158f00
BC
4169 return to_replace_bs;
4170}
448ad91d 4171
91af7014
HR
4172static bool append_open_options(QDict *d, BlockDriverState *bs)
4173{
4174 const QDictEntry *entry;
9e700c1a 4175 QemuOptDesc *desc;
260fecf1 4176 BdrvChild *child;
91af7014 4177 bool found_any = false;
260fecf1 4178 const char *p;
91af7014
HR
4179
4180 for (entry = qdict_first(bs->options); entry;
4181 entry = qdict_next(bs->options, entry))
4182 {
260fecf1
KW
4183 /* Exclude options for children */
4184 QLIST_FOREACH(child, &bs->children, next) {
4185 if (strstart(qdict_entry_key(entry), child->name, &p)
4186 && (!*p || *p == '.'))
4187 {
4188 break;
4189 }
4190 }
4191 if (child) {
9e700c1a 4192 continue;
91af7014 4193 }
9e700c1a
KW
4194
4195 /* And exclude all non-driver-specific options */
4196 for (desc = bdrv_runtime_opts.desc; desc->name; desc++) {
4197 if (!strcmp(qdict_entry_key(entry), desc->name)) {
4198 break;
4199 }
4200 }
4201 if (desc->name) {
4202 continue;
4203 }
4204
4205 qobject_incref(qdict_entry_value(entry));
4206 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
4207 found_any = true;
91af7014
HR
4208 }
4209
4210 return found_any;
4211}
4212
4213/* Updates the following BDS fields:
4214 * - exact_filename: A filename which may be used for opening a block device
4215 * which (mostly) equals the given BDS (even without any
4216 * other options; so reading and writing must return the same
4217 * results, but caching etc. may be different)
4218 * - full_open_options: Options which, when given when opening a block device
4219 * (without a filename), result in a BDS (mostly)
4220 * equalling the given one
4221 * - filename: If exact_filename is set, it is copied here. Otherwise,
4222 * full_open_options is converted to a JSON object, prefixed with
4223 * "json:" (for use through the JSON pseudo protocol) and put here.
4224 */
4225void bdrv_refresh_filename(BlockDriverState *bs)
4226{
4227 BlockDriver *drv = bs->drv;
4228 QDict *opts;
4229
4230 if (!drv) {
4231 return;
4232 }
4233
4234 /* This BDS's file name will most probably depend on its file's name, so
4235 * refresh that first */
4236 if (bs->file) {
9a4f4c31 4237 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
4238 }
4239
4240 if (drv->bdrv_refresh_filename) {
4241 /* Obsolete information is of no use here, so drop the old file name
4242 * information before refreshing it */
4243 bs->exact_filename[0] = '\0';
4244 if (bs->full_open_options) {
4245 QDECREF(bs->full_open_options);
4246 bs->full_open_options = NULL;
4247 }
4248
4cdd01d3
KW
4249 opts = qdict_new();
4250 append_open_options(opts, bs);
4251 drv->bdrv_refresh_filename(bs, opts);
4252 QDECREF(opts);
91af7014
HR
4253 } else if (bs->file) {
4254 /* Try to reconstruct valid information from the underlying file */
4255 bool has_open_options;
4256
4257 bs->exact_filename[0] = '\0';
4258 if (bs->full_open_options) {
4259 QDECREF(bs->full_open_options);
4260 bs->full_open_options = NULL;
4261 }
4262
4263 opts = qdict_new();
4264 has_open_options = append_open_options(opts, bs);
4265
4266 /* If no specific options have been given for this BDS, the filename of
4267 * the underlying file should suffice for this one as well */
9a4f4c31
KW
4268 if (bs->file->bs->exact_filename[0] && !has_open_options) {
4269 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
4270 }
4271 /* Reconstructing the full options QDict is simple for most format block
4272 * drivers, as long as the full options are known for the underlying
4273 * file BDS. The full options QDict of that file BDS should somehow
4274 * contain a representation of the filename, therefore the following
4275 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 4276 if (bs->file->bs->full_open_options) {
91af7014
HR
4277 qdict_put_obj(opts, "driver",
4278 QOBJECT(qstring_from_str(drv->format_name)));
9a4f4c31
KW
4279 QINCREF(bs->file->bs->full_open_options);
4280 qdict_put_obj(opts, "file",
4281 QOBJECT(bs->file->bs->full_open_options));
91af7014
HR
4282
4283 bs->full_open_options = opts;
4284 } else {
4285 QDECREF(opts);
4286 }
4287 } else if (!bs->full_open_options && qdict_size(bs->options)) {
4288 /* There is no underlying file BDS (at least referenced by BDS.file),
4289 * so the full options QDict should be equal to the options given
4290 * specifically for this block device when it was opened (plus the
4291 * driver specification).
4292 * Because those options don't change, there is no need to update
4293 * full_open_options when it's already set. */
4294
4295 opts = qdict_new();
4296 append_open_options(opts, bs);
4297 qdict_put_obj(opts, "driver",
4298 QOBJECT(qstring_from_str(drv->format_name)));
4299
4300 if (bs->exact_filename[0]) {
4301 /* This may not work for all block protocol drivers (some may
4302 * require this filename to be parsed), but we have to find some
4303 * default solution here, so just include it. If some block driver
4304 * does not support pure options without any filename at all or
4305 * needs some special format of the options QDict, it needs to
4306 * implement the driver-specific bdrv_refresh_filename() function.
4307 */
4308 qdict_put_obj(opts, "filename",
4309 QOBJECT(qstring_from_str(bs->exact_filename)));
4310 }
4311
4312 bs->full_open_options = opts;
4313 }
4314
4315 if (bs->exact_filename[0]) {
4316 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4317 } else if (bs->full_open_options) {
4318 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4319 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4320 qstring_get_str(json));
4321 QDECREF(json);
4322 }
4323}