]> git.ipfire.org Git - thirdparty/qemu.git/blame - block.c
block: Add blk_insert_bs()
[thirdparty/qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
3990d09a 24#include "config-host.h"
faf07963 25#include "qemu-common.h"
6d519a5f 26#include "trace.h"
737e150e
PB
27#include "block/block_int.h"
28#include "block/blockjob.h"
d49b6836 29#include "qemu/error-report.h"
1de7afc9 30#include "qemu/module.h"
cc7a8ea7 31#include "qapi/qmp/qerror.h"
7b1b5d19 32#include "qapi/qmp/qjson.h"
bfb197e0 33#include "sysemu/block-backend.h"
9c17d615 34#include "sysemu/sysemu.h"
1de7afc9 35#include "qemu/notify.h"
10817bf0 36#include "qemu/coroutine.h"
c13163fb 37#include "block/qapi.h"
b2023818 38#include "qmp-commands.h"
1de7afc9 39#include "qemu/timer.h"
a5ee7bd4 40#include "qapi-event.h"
db628338 41#include "block/throttle-groups.h"
fc01f7e7 42
71e72a19 43#ifdef CONFIG_BSD
7674e7bf
FB
44#include <sys/types.h>
45#include <sys/stat.h>
46#include <sys/ioctl.h>
72cf2d4f 47#include <sys/queue.h>
c5e97233 48#ifndef __DragonFly__
7674e7bf
FB
49#include <sys/disk.h>
50#endif
c5e97233 51#endif
7674e7bf 52
49dc768d
AL
53#ifdef _WIN32
54#include <windows.h>
55#endif
56
9bd2b08f
JS
57/**
58 * A BdrvDirtyBitmap can be in three possible states:
59 * (1) successor is NULL and disabled is false: full r/w mode
60 * (2) successor is NULL and disabled is true: read only mode ("disabled")
61 * (3) successor is set: frozen mode.
62 * A frozen bitmap cannot be renamed, deleted, anonymized, cleared, set,
63 * or enabled. A frozen bitmap can only abdicate() or reclaim().
64 */
e4654d2d 65struct BdrvDirtyBitmap {
aa0c7ca5
JS
66 HBitmap *bitmap; /* Dirty sector bitmap implementation */
67 BdrvDirtyBitmap *successor; /* Anonymous child; implies frozen status */
68 char *name; /* Optional non-empty unique ID */
69 int64_t size; /* Size of the bitmap (Number of sectors) */
70 bool disabled; /* Bitmap is read-only */
e4654d2d
FZ
71 QLIST_ENTRY(BdrvDirtyBitmap) list;
72};
73
1c9805a3
SH
74#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
75
1b7bdbc1
SH
76static QTAILQ_HEAD(, BlockDriverState) bdrv_states =
77 QTAILQ_HEAD_INITIALIZER(bdrv_states);
7ee930d0 78
dc364f4c
BC
79static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
80 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
81
8a22f02a
SH
82static QLIST_HEAD(, BlockDriver) bdrv_drivers =
83 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 84
f3930ed0
KW
85static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
86 const char *reference, QDict *options, int flags,
87 BlockDriverState *parent,
ce343771 88 const BdrvChildRole *child_role, Error **errp);
f3930ed0 89
ce1ffea8 90static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs);
eb852011
MA
91/* If non-zero, use only whitelisted block drivers */
92static int use_bdrv_whitelist;
93
9e0b22f4
SH
94#ifdef _WIN32
95static int is_windows_drive_prefix(const char *filename)
96{
97 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
98 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
99 filename[1] == ':');
100}
101
102int is_windows_drive(const char *filename)
103{
104 if (is_windows_drive_prefix(filename) &&
105 filename[2] == '\0')
106 return 1;
107 if (strstart(filename, "\\\\.\\", NULL) ||
108 strstart(filename, "//./", NULL))
109 return 1;
110 return 0;
111}
112#endif
113
339064d5
KW
114size_t bdrv_opt_mem_align(BlockDriverState *bs)
115{
116 if (!bs || !bs->drv) {
459b4e66
DL
117 /* page size or 4k (hdd sector size) should be on the safe side */
118 return MAX(4096, getpagesize());
339064d5
KW
119 }
120
121 return bs->bl.opt_mem_alignment;
122}
123
4196d2f0
DL
124size_t bdrv_min_mem_align(BlockDriverState *bs)
125{
126 if (!bs || !bs->drv) {
459b4e66
DL
127 /* page size or 4k (hdd sector size) should be on the safe side */
128 return MAX(4096, getpagesize());
4196d2f0
DL
129 }
130
131 return bs->bl.min_mem_alignment;
132}
133
9e0b22f4 134/* check if the path starts with "<protocol>:" */
5c98415b 135int path_has_protocol(const char *path)
9e0b22f4 136{
947995c0
PB
137 const char *p;
138
9e0b22f4
SH
139#ifdef _WIN32
140 if (is_windows_drive(path) ||
141 is_windows_drive_prefix(path)) {
142 return 0;
143 }
947995c0
PB
144 p = path + strcspn(path, ":/\\");
145#else
146 p = path + strcspn(path, ":/");
9e0b22f4
SH
147#endif
148
947995c0 149 return *p == ':';
9e0b22f4
SH
150}
151
83f64091 152int path_is_absolute(const char *path)
3b0d4f61 153{
21664424
FB
154#ifdef _WIN32
155 /* specific case for names like: "\\.\d:" */
f53f4da9 156 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 157 return 1;
f53f4da9
PB
158 }
159 return (*path == '/' || *path == '\\');
3b9f94e1 160#else
f53f4da9 161 return (*path == '/');
3b9f94e1 162#endif
3b0d4f61
FB
163}
164
83f64091
FB
165/* if filename is absolute, just copy it to dest. Otherwise, build a
166 path to it by considering it is relative to base_path. URL are
167 supported. */
168void path_combine(char *dest, int dest_size,
169 const char *base_path,
170 const char *filename)
3b0d4f61 171{
83f64091
FB
172 const char *p, *p1;
173 int len;
174
175 if (dest_size <= 0)
176 return;
177 if (path_is_absolute(filename)) {
178 pstrcpy(dest, dest_size, filename);
179 } else {
180 p = strchr(base_path, ':');
181 if (p)
182 p++;
183 else
184 p = base_path;
3b9f94e1
FB
185 p1 = strrchr(base_path, '/');
186#ifdef _WIN32
187 {
188 const char *p2;
189 p2 = strrchr(base_path, '\\');
190 if (!p1 || p2 > p1)
191 p1 = p2;
192 }
193#endif
83f64091
FB
194 if (p1)
195 p1++;
196 else
197 p1 = base_path;
198 if (p1 > p)
199 p = p1;
200 len = p - base_path;
201 if (len > dest_size - 1)
202 len = dest_size - 1;
203 memcpy(dest, base_path, len);
204 dest[len] = '\0';
205 pstrcat(dest, dest_size, filename);
3b0d4f61 206 }
3b0d4f61
FB
207}
208
0a82855a
HR
209void bdrv_get_full_backing_filename_from_filename(const char *backed,
210 const char *backing,
9f07429e
HR
211 char *dest, size_t sz,
212 Error **errp)
dc5a1371 213{
9f07429e
HR
214 if (backing[0] == '\0' || path_has_protocol(backing) ||
215 path_is_absolute(backing))
216 {
0a82855a 217 pstrcpy(dest, sz, backing);
9f07429e
HR
218 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
219 error_setg(errp, "Cannot use relative backing file names for '%s'",
220 backed);
dc5a1371 221 } else {
0a82855a 222 path_combine(dest, sz, backed, backing);
dc5a1371
PB
223 }
224}
225
9f07429e
HR
226void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
227 Error **errp)
0a82855a 228{
9f07429e
HR
229 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
230
231 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
232 dest, sz, errp);
0a82855a
HR
233}
234
0eb7217e
SH
235void bdrv_register(BlockDriver *bdrv)
236{
237 bdrv_setup_io_funcs(bdrv);
b2e12bc6 238
8a22f02a 239 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 240}
b338082b 241
7f06d47e 242BlockDriverState *bdrv_new_root(void)
b338082b 243{
7f06d47e 244 BlockDriverState *bs = bdrv_new();
e4e9986b 245
e4e9986b 246 QTAILQ_INSERT_TAIL(&bdrv_states, bs, device_list);
e4e9986b
MA
247 return bs;
248}
249
250BlockDriverState *bdrv_new(void)
251{
252 BlockDriverState *bs;
253 int i;
254
5839e53b 255 bs = g_new0(BlockDriverState, 1);
e4654d2d 256 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
257 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
258 QLIST_INIT(&bs->op_blockers[i]);
259 }
d7d512f6 260 notifier_list_init(&bs->close_notifiers);
d616b224 261 notifier_with_return_list_init(&bs->before_write_notifiers);
cc0681c4
BC
262 qemu_co_queue_init(&bs->throttled_reqs[0]);
263 qemu_co_queue_init(&bs->throttled_reqs[1]);
9fcb0251 264 bs->refcnt = 1;
dcd04228 265 bs->aio_context = qemu_get_aio_context();
d7d512f6 266
b338082b
FB
267 return bs;
268}
269
d7d512f6
PB
270void bdrv_add_close_notifier(BlockDriverState *bs, Notifier *notify)
271{
272 notifier_list_add(&bs->close_notifiers, notify);
273}
274
ea2384d3
FB
275BlockDriver *bdrv_find_format(const char *format_name)
276{
277 BlockDriver *drv1;
8a22f02a
SH
278 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
279 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 280 return drv1;
8a22f02a 281 }
ea2384d3
FB
282 }
283 return NULL;
284}
285
b64ec4e4 286static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 287{
b64ec4e4
FZ
288 static const char *whitelist_rw[] = {
289 CONFIG_BDRV_RW_WHITELIST
290 };
291 static const char *whitelist_ro[] = {
292 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
293 };
294 const char **p;
295
b64ec4e4 296 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 297 return 1; /* no whitelist, anything goes */
b64ec4e4 298 }
eb852011 299
b64ec4e4 300 for (p = whitelist_rw; *p; p++) {
eb852011
MA
301 if (!strcmp(drv->format_name, *p)) {
302 return 1;
303 }
304 }
b64ec4e4
FZ
305 if (read_only) {
306 for (p = whitelist_ro; *p; p++) {
307 if (!strcmp(drv->format_name, *p)) {
308 return 1;
309 }
310 }
311 }
eb852011
MA
312 return 0;
313}
314
5b7e1542
ZYW
315typedef struct CreateCo {
316 BlockDriver *drv;
317 char *filename;
83d0521a 318 QemuOpts *opts;
5b7e1542 319 int ret;
cc84d90f 320 Error *err;
5b7e1542
ZYW
321} CreateCo;
322
323static void coroutine_fn bdrv_create_co_entry(void *opaque)
324{
cc84d90f
HR
325 Error *local_err = NULL;
326 int ret;
327
5b7e1542
ZYW
328 CreateCo *cco = opaque;
329 assert(cco->drv);
330
c282e1fd 331 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
84d18f06 332 if (local_err) {
cc84d90f
HR
333 error_propagate(&cco->err, local_err);
334 }
335 cco->ret = ret;
5b7e1542
ZYW
336}
337
0e7e1989 338int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 339 QemuOpts *opts, Error **errp)
ea2384d3 340{
5b7e1542
ZYW
341 int ret;
342
343 Coroutine *co;
344 CreateCo cco = {
345 .drv = drv,
346 .filename = g_strdup(filename),
83d0521a 347 .opts = opts,
5b7e1542 348 .ret = NOT_DONE,
cc84d90f 349 .err = NULL,
5b7e1542
ZYW
350 };
351
c282e1fd 352 if (!drv->bdrv_create) {
cc84d90f 353 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
354 ret = -ENOTSUP;
355 goto out;
5b7e1542
ZYW
356 }
357
358 if (qemu_in_coroutine()) {
359 /* Fast-path if already in coroutine context */
360 bdrv_create_co_entry(&cco);
361 } else {
362 co = qemu_coroutine_create(bdrv_create_co_entry);
363 qemu_coroutine_enter(co, &cco);
364 while (cco.ret == NOT_DONE) {
b47ec2c4 365 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
366 }
367 }
368
369 ret = cco.ret;
cc84d90f 370 if (ret < 0) {
84d18f06 371 if (cco.err) {
cc84d90f
HR
372 error_propagate(errp, cco.err);
373 } else {
374 error_setg_errno(errp, -ret, "Could not create image");
375 }
376 }
0e7e1989 377
80168bff
LC
378out:
379 g_free(cco.filename);
5b7e1542 380 return ret;
ea2384d3
FB
381}
382
c282e1fd 383int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
384{
385 BlockDriver *drv;
cc84d90f
HR
386 Error *local_err = NULL;
387 int ret;
84a12e66 388
b65a5e12 389 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 390 if (drv == NULL) {
16905d71 391 return -ENOENT;
84a12e66
CH
392 }
393
c282e1fd 394 ret = bdrv_create(drv, filename, opts, &local_err);
84d18f06 395 if (local_err) {
cc84d90f
HR
396 error_propagate(errp, local_err);
397 }
398 return ret;
84a12e66
CH
399}
400
892b7de8
ET
401/**
402 * Try to get @bs's logical and physical block size.
403 * On success, store them in @bsz struct and return 0.
404 * On failure return -errno.
405 * @bs must not be empty.
406 */
407int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
408{
409 BlockDriver *drv = bs->drv;
410
411 if (drv && drv->bdrv_probe_blocksizes) {
412 return drv->bdrv_probe_blocksizes(bs, bsz);
413 }
414
415 return -ENOTSUP;
416}
417
418/**
419 * Try to get @bs's geometry (cyls, heads, sectors).
420 * On success, store them in @geo struct and return 0.
421 * On failure return -errno.
422 * @bs must not be empty.
423 */
424int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
425{
426 BlockDriver *drv = bs->drv;
427
428 if (drv && drv->bdrv_probe_geometry) {
429 return drv->bdrv_probe_geometry(bs, geo);
430 }
431
432 return -ENOTSUP;
433}
434
eba25057
JM
435/*
436 * Create a uniquely-named empty temporary file.
437 * Return 0 upon success, otherwise a negative errno value.
438 */
439int get_tmp_filename(char *filename, int size)
d5249393 440{
eba25057 441#ifdef _WIN32
3b9f94e1 442 char temp_dir[MAX_PATH];
eba25057
JM
443 /* GetTempFileName requires that its output buffer (4th param)
444 have length MAX_PATH or greater. */
445 assert(size >= MAX_PATH);
446 return (GetTempPath(MAX_PATH, temp_dir)
447 && GetTempFileName(temp_dir, "qem", 0, filename)
448 ? 0 : -GetLastError());
d5249393 449#else
67b915a5 450 int fd;
7ccfb2eb 451 const char *tmpdir;
0badc1ee 452 tmpdir = getenv("TMPDIR");
69bef793
AS
453 if (!tmpdir) {
454 tmpdir = "/var/tmp";
455 }
eba25057
JM
456 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
457 return -EOVERFLOW;
458 }
ea2384d3 459 fd = mkstemp(filename);
fe235a06
DH
460 if (fd < 0) {
461 return -errno;
462 }
463 if (close(fd) != 0) {
464 unlink(filename);
eba25057
JM
465 return -errno;
466 }
467 return 0;
d5249393 468#endif
eba25057 469}
fc01f7e7 470
84a12e66
CH
471/*
472 * Detect host devices. By convention, /dev/cdrom[N] is always
473 * recognized as a host CDROM.
474 */
475static BlockDriver *find_hdev_driver(const char *filename)
476{
477 int score_max = 0, score;
478 BlockDriver *drv = NULL, *d;
479
480 QLIST_FOREACH(d, &bdrv_drivers, list) {
481 if (d->bdrv_probe_device) {
482 score = d->bdrv_probe_device(filename);
483 if (score > score_max) {
484 score_max = score;
485 drv = d;
486 }
487 }
488 }
489
490 return drv;
491}
492
98289620 493BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
494 bool allow_protocol_prefix,
495 Error **errp)
83f64091
FB
496{
497 BlockDriver *drv1;
498 char protocol[128];
1cec71e3 499 int len;
83f64091 500 const char *p;
19cb3738 501
66f82cee
KW
502 /* TODO Drivers without bdrv_file_open must be specified explicitly */
503
39508e7a
CH
504 /*
505 * XXX(hch): we really should not let host device detection
506 * override an explicit protocol specification, but moving this
507 * later breaks access to device names with colons in them.
508 * Thanks to the brain-dead persistent naming schemes on udev-
509 * based Linux systems those actually are quite common.
510 */
511 drv1 = find_hdev_driver(filename);
512 if (drv1) {
513 return drv1;
514 }
515
98289620 516 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 517 return &bdrv_file;
84a12e66 518 }
98289620 519
9e0b22f4
SH
520 p = strchr(filename, ':');
521 assert(p != NULL);
1cec71e3
AL
522 len = p - filename;
523 if (len > sizeof(protocol) - 1)
524 len = sizeof(protocol) - 1;
525 memcpy(protocol, filename, len);
526 protocol[len] = '\0';
8a22f02a 527 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
5fafdf24 528 if (drv1->protocol_name &&
8a22f02a 529 !strcmp(drv1->protocol_name, protocol)) {
83f64091 530 return drv1;
8a22f02a 531 }
83f64091 532 }
b65a5e12
HR
533
534 error_setg(errp, "Unknown protocol '%s'", protocol);
83f64091
FB
535 return NULL;
536}
537
c6684249
MA
538/*
539 * Guess image format by probing its contents.
540 * This is not a good idea when your image is raw (CVE-2008-2004), but
541 * we do it anyway for backward compatibility.
542 *
543 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
544 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
545 * but can be smaller if the image file is smaller)
c6684249
MA
546 * @filename is its filename.
547 *
548 * For all block drivers, call the bdrv_probe() method to get its
549 * probing score.
550 * Return the first block driver with the highest probing score.
551 */
38f3ef57
KW
552BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
553 const char *filename)
c6684249
MA
554{
555 int score_max = 0, score;
556 BlockDriver *drv = NULL, *d;
557
558 QLIST_FOREACH(d, &bdrv_drivers, list) {
559 if (d->bdrv_probe) {
560 score = d->bdrv_probe(buf, buf_size, filename);
561 if (score > score_max) {
562 score_max = score;
563 drv = d;
564 }
565 }
566 }
567
568 return drv;
569}
570
f500a6d3 571static int find_image_format(BlockDriverState *bs, const char *filename,
34b5d2c6 572 BlockDriver **pdrv, Error **errp)
f3a5d3f8 573{
c6684249 574 BlockDriver *drv;
7cddd372 575 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 576 int ret = 0;
f8ea0b00 577
08a00559 578 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
b192af8a 579 if (bdrv_is_sg(bs) || !bdrv_is_inserted(bs) || bdrv_getlength(bs) == 0) {
ef810437 580 *pdrv = &bdrv_raw;
c98ac35d 581 return ret;
1a396859 582 }
f8ea0b00 583
83f64091 584 ret = bdrv_pread(bs, 0, buf, sizeof(buf));
83f64091 585 if (ret < 0) {
34b5d2c6
HR
586 error_setg_errno(errp, -ret, "Could not read image for determining its "
587 "format");
c98ac35d
SW
588 *pdrv = NULL;
589 return ret;
83f64091
FB
590 }
591
c6684249 592 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 593 if (!drv) {
34b5d2c6
HR
594 error_setg(errp, "Could not determine image format: No compatible "
595 "driver found");
c98ac35d
SW
596 ret = -ENOENT;
597 }
598 *pdrv = drv;
599 return ret;
ea2384d3
FB
600}
601
51762288
SH
602/**
603 * Set the current 'total_sectors' value
65a9bb25 604 * Return 0 on success, -errno on error.
51762288
SH
605 */
606static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
607{
608 BlockDriver *drv = bs->drv;
609
396759ad 610 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 611 if (bdrv_is_sg(bs))
396759ad
NB
612 return 0;
613
51762288
SH
614 /* query actual device if possible, otherwise just trust the hint */
615 if (drv->bdrv_getlength) {
616 int64_t length = drv->bdrv_getlength(bs);
617 if (length < 0) {
618 return length;
619 }
7e382003 620 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
621 }
622
623 bs->total_sectors = hint;
624 return 0;
625}
626
9e8f1835
PB
627/**
628 * Set open flags for a given discard mode
629 *
630 * Return 0 on success, -1 if the discard mode was invalid.
631 */
632int bdrv_parse_discard_flags(const char *mode, int *flags)
633{
634 *flags &= ~BDRV_O_UNMAP;
635
636 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
637 /* do nothing */
638 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
639 *flags |= BDRV_O_UNMAP;
640 } else {
641 return -1;
642 }
643
644 return 0;
645}
646
c3993cdc
SH
647/**
648 * Set open flags for a given cache mode
649 *
650 * Return 0 on success, -1 if the cache mode was invalid.
651 */
652int bdrv_parse_cache_flags(const char *mode, int *flags)
653{
654 *flags &= ~BDRV_O_CACHE_MASK;
655
656 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
657 *flags |= BDRV_O_NOCACHE | BDRV_O_CACHE_WB;
92196b2f
SH
658 } else if (!strcmp(mode, "directsync")) {
659 *flags |= BDRV_O_NOCACHE;
c3993cdc
SH
660 } else if (!strcmp(mode, "writeback")) {
661 *flags |= BDRV_O_CACHE_WB;
662 } else if (!strcmp(mode, "unsafe")) {
663 *flags |= BDRV_O_CACHE_WB;
664 *flags |= BDRV_O_NO_FLUSH;
665 } else if (!strcmp(mode, "writethrough")) {
666 /* this is the default */
667 } else {
668 return -1;
669 }
670
671 return 0;
672}
673
b1e6fc08
KW
674/*
675 * Returns the flags that a temporary snapshot should get, based on the
676 * originally requested flags (the originally requested image will have flags
677 * like a backing file)
678 */
679static int bdrv_temp_snapshot_flags(int flags)
680{
681 return (flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
682}
683
0b50cc88 684/*
f3930ed0
KW
685 * Returns the flags that bs->file should get if a protocol driver is expected,
686 * based on the given flags for the parent BDS
0b50cc88
KW
687 */
688static int bdrv_inherited_flags(int flags)
689{
690 /* Enable protocol handling, disable format probing for bs->file */
691 flags |= BDRV_O_PROTOCOL;
692
693 /* Our block drivers take care to send flushes and respect unmap policy,
694 * so we can enable both unconditionally on lower layers. */
695 flags |= BDRV_O_CACHE_WB | BDRV_O_UNMAP;
696
0b50cc88 697 /* Clear flags that only apply to the top layer */
5669b44d 698 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ);
0b50cc88
KW
699
700 return flags;
701}
702
f3930ed0
KW
703const BdrvChildRole child_file = {
704 .inherit_flags = bdrv_inherited_flags,
705};
706
707/*
708 * Returns the flags that bs->file should get if the use of formats (and not
709 * only protocols) is permitted for it, based on the given flags for the parent
710 * BDS
711 */
712static int bdrv_inherited_fmt_flags(int parent_flags)
713{
714 int flags = child_file.inherit_flags(parent_flags);
715 return flags & ~BDRV_O_PROTOCOL;
716}
717
718const BdrvChildRole child_format = {
719 .inherit_flags = bdrv_inherited_fmt_flags,
720};
721
317fc44e 722/*
760e0063 723 * Returns the flags that bs->backing should get, based on the given flags
317fc44e
KW
724 * for the parent BDS
725 */
726static int bdrv_backing_flags(int flags)
727{
728 /* backing files always opened read-only */
729 flags &= ~(BDRV_O_RDWR | BDRV_O_COPY_ON_READ);
730
731 /* snapshot=on is handled on the top layer */
8bfea15d 732 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e
KW
733
734 return flags;
735}
736
f3930ed0
KW
737static const BdrvChildRole child_backing = {
738 .inherit_flags = bdrv_backing_flags,
739};
740
7b272452
KW
741static int bdrv_open_flags(BlockDriverState *bs, int flags)
742{
743 int open_flags = flags | BDRV_O_CACHE_WB;
744
745 /*
746 * Clear flags that are internal to the block layer before opening the
747 * image.
748 */
20cca275 749 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
750
751 /*
752 * Snapshots should be writable.
753 */
8bfea15d 754 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
755 open_flags |= BDRV_O_RDWR;
756 }
757
758 return open_flags;
759}
760
636ea370
KW
761static void bdrv_assign_node_name(BlockDriverState *bs,
762 const char *node_name,
763 Error **errp)
6913c0c2 764{
15489c76 765 char *gen_node_name = NULL;
6913c0c2 766
15489c76
JC
767 if (!node_name) {
768 node_name = gen_node_name = id_generate(ID_BLOCK);
769 } else if (!id_wellformed(node_name)) {
770 /*
771 * Check for empty string or invalid characters, but not if it is
772 * generated (generated names use characters not available to the user)
773 */
9aebf3b8 774 error_setg(errp, "Invalid node name");
636ea370 775 return;
6913c0c2
BC
776 }
777
0c5e94ee 778 /* takes care of avoiding namespaces collisions */
7f06d47e 779 if (blk_by_name(node_name)) {
0c5e94ee
BC
780 error_setg(errp, "node-name=%s is conflicting with a device id",
781 node_name);
15489c76 782 goto out;
0c5e94ee
BC
783 }
784
6913c0c2
BC
785 /* takes care of avoiding duplicates node names */
786 if (bdrv_find_node(node_name)) {
787 error_setg(errp, "Duplicate node name");
15489c76 788 goto out;
6913c0c2
BC
789 }
790
791 /* copy node name into the bs and insert it into the graph list */
792 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
793 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
15489c76
JC
794out:
795 g_free(gen_node_name);
6913c0c2
BC
796}
797
18edf289
KW
798static QemuOptsList bdrv_runtime_opts = {
799 .name = "bdrv_common",
800 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
801 .desc = {
802 {
803 .name = "node-name",
804 .type = QEMU_OPT_STRING,
805 .help = "Node name of the block device node",
806 },
807 { /* end of list */ }
808 },
809};
810
57915332
KW
811/*
812 * Common part for opening disk images and files
b6ad491a
KW
813 *
814 * Removes all processed options from *options.
57915332 815 */
9a4f4c31 816static int bdrv_open_common(BlockDriverState *bs, BdrvChild *file,
34b5d2c6 817 QDict *options, int flags, BlockDriver *drv, Error **errp)
57915332
KW
818{
819 int ret, open_flags;
035fccdf 820 const char *filename;
6913c0c2 821 const char *node_name = NULL;
18edf289 822 QemuOpts *opts;
34b5d2c6 823 Error *local_err = NULL;
57915332
KW
824
825 assert(drv != NULL);
6405875c 826 assert(bs->file == NULL);
707ff828 827 assert(options != NULL && bs->options != options);
57915332 828
45673671 829 if (file != NULL) {
9a4f4c31 830 filename = file->bs->filename;
45673671
KW
831 } else {
832 filename = qdict_get_try_str(options, "filename");
833 }
834
765003db
KW
835 if (drv->bdrv_needs_filename && !filename) {
836 error_setg(errp, "The '%s' block driver requires a file name",
837 drv->format_name);
838 return -EINVAL;
839 }
840
45673671 841 trace_bdrv_open_common(bs, filename ?: "", flags, drv->format_name);
28dcee10 842
18edf289
KW
843 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
844 qemu_opts_absorb_qdict(opts, options, &local_err);
0fb6395c 845 if (local_err) {
636ea370 846 error_propagate(errp, local_err);
18edf289
KW
847 ret = -EINVAL;
848 goto fail_opts;
6913c0c2 849 }
6913c0c2 850
18edf289 851 node_name = qemu_opt_get(opts, "node-name");
636ea370 852 bdrv_assign_node_name(bs, node_name, &local_err);
0fb6395c 853 if (local_err) {
636ea370 854 error_propagate(errp, local_err);
18edf289
KW
855 ret = -EINVAL;
856 goto fail_opts;
5d186eb0
KW
857 }
858
c25f53b0 859 bs->request_alignment = 512;
0d51b4de 860 bs->zero_beyond_eof = true;
b64ec4e4
FZ
861 open_flags = bdrv_open_flags(bs, flags);
862 bs->read_only = !(open_flags & BDRV_O_RDWR);
863
864 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
865 error_setg(errp,
866 !bs->read_only && bdrv_is_whitelisted(drv, true)
867 ? "Driver '%s' can only be used for read-only devices"
868 : "Driver '%s' is not whitelisted",
869 drv->format_name);
18edf289
KW
870 ret = -ENOTSUP;
871 goto fail_opts;
b64ec4e4 872 }
57915332 873
53fec9d3 874 assert(bs->copy_on_read == 0); /* bdrv_new() and bdrv_close() make it so */
0ebd24e0
KW
875 if (flags & BDRV_O_COPY_ON_READ) {
876 if (!bs->read_only) {
877 bdrv_enable_copy_on_read(bs);
878 } else {
879 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
880 ret = -EINVAL;
881 goto fail_opts;
0ebd24e0 882 }
53fec9d3
SH
883 }
884
c2ad1b0c
KW
885 if (filename != NULL) {
886 pstrcpy(bs->filename, sizeof(bs->filename), filename);
887 } else {
888 bs->filename[0] = '\0';
889 }
91af7014 890 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 891
57915332 892 bs->drv = drv;
7267c094 893 bs->opaque = g_malloc0(drv->instance_size);
57915332 894
03f541bd 895 bs->enable_write_cache = !!(flags & BDRV_O_CACHE_WB);
e7c63796 896
66f82cee
KW
897 /* Open the image, either directly or using a protocol */
898 if (drv->bdrv_file_open) {
5d186eb0 899 assert(file == NULL);
030be321 900 assert(!drv->bdrv_needs_filename || filename != NULL);
34b5d2c6 901 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
f500a6d3 902 } else {
2af5ef70 903 if (file == NULL) {
34b5d2c6
HR
904 error_setg(errp, "Can't use '%s' as a block driver for the "
905 "protocol level", drv->format_name);
2af5ef70
KW
906 ret = -EINVAL;
907 goto free_and_fail;
908 }
f500a6d3 909 bs->file = file;
34b5d2c6 910 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
66f82cee
KW
911 }
912
57915332 913 if (ret < 0) {
84d18f06 914 if (local_err) {
34b5d2c6 915 error_propagate(errp, local_err);
2fa9aa59
DH
916 } else if (bs->filename[0]) {
917 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
34b5d2c6
HR
918 } else {
919 error_setg_errno(errp, -ret, "Could not open image");
920 }
57915332
KW
921 goto free_and_fail;
922 }
923
a1f688f4
MA
924 if (bs->encrypted) {
925 error_report("Encrypted images are deprecated");
926 error_printf("Support for them will be removed in a future release.\n"
927 "You can use 'qemu-img convert' to convert your image"
928 " to an unencrypted one.\n");
929 }
930
51762288
SH
931 ret = refresh_total_sectors(bs, bs->total_sectors);
932 if (ret < 0) {
34b5d2c6 933 error_setg_errno(errp, -ret, "Could not refresh total sector count");
51762288 934 goto free_and_fail;
57915332 935 }
51762288 936
3baca891
KW
937 bdrv_refresh_limits(bs, &local_err);
938 if (local_err) {
939 error_propagate(errp, local_err);
940 ret = -EINVAL;
941 goto free_and_fail;
942 }
943
c25f53b0 944 assert(bdrv_opt_mem_align(bs) != 0);
4196d2f0 945 assert(bdrv_min_mem_align(bs) != 0);
b192af8a 946 assert((bs->request_alignment != 0) || bdrv_is_sg(bs));
18edf289
KW
947
948 qemu_opts_del(opts);
57915332
KW
949 return 0;
950
951free_and_fail:
f500a6d3 952 bs->file = NULL;
7267c094 953 g_free(bs->opaque);
57915332
KW
954 bs->opaque = NULL;
955 bs->drv = NULL;
18edf289
KW
956fail_opts:
957 qemu_opts_del(opts);
57915332
KW
958 return ret;
959}
960
5e5c4f63
KW
961static QDict *parse_json_filename(const char *filename, Error **errp)
962{
963 QObject *options_obj;
964 QDict *options;
965 int ret;
966
967 ret = strstart(filename, "json:", &filename);
968 assert(ret);
969
970 options_obj = qobject_from_json(filename);
971 if (!options_obj) {
972 error_setg(errp, "Could not parse the JSON options");
973 return NULL;
974 }
975
976 if (qobject_type(options_obj) != QTYPE_QDICT) {
977 qobject_decref(options_obj);
978 error_setg(errp, "Invalid JSON object given");
979 return NULL;
980 }
981
982 options = qobject_to_qdict(options_obj);
983 qdict_flatten(options);
984
985 return options;
986}
987
b6ce07aa 988/*
f54120ff
KW
989 * Fills in default options for opening images and converts the legacy
990 * filename/flags pair to option QDict entries.
53a29513
HR
991 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
992 * block driver has been specified explicitly.
b6ce07aa 993 */
53a29513 994static int bdrv_fill_options(QDict **options, const char **pfilename,
053e1578 995 int *flags, Error **errp)
ea2384d3 996{
5e5c4f63 997 const char *filename = *pfilename;
c2ad1b0c 998 const char *drvname;
53a29513 999 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 1000 bool parse_filename = false;
053e1578 1001 BlockDriver *drv = NULL;
34b5d2c6 1002 Error *local_err = NULL;
83f64091 1003
5e5c4f63
KW
1004 /* Parse json: pseudo-protocol */
1005 if (filename && g_str_has_prefix(filename, "json:")) {
1006 QDict *json_options = parse_json_filename(filename, &local_err);
1007 if (local_err) {
1008 error_propagate(errp, local_err);
1009 return -EINVAL;
1010 }
1011
1012 /* Options given in the filename have lower priority than options
1013 * specified directly */
1014 qdict_join(*options, json_options, false);
1015 QDECREF(json_options);
1016 *pfilename = filename = NULL;
1017 }
1018
53a29513 1019 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1020 if (drvname) {
1021 drv = bdrv_find_format(drvname);
1022 if (!drv) {
1023 error_setg(errp, "Unknown driver '%s'", drvname);
1024 return -ENOENT;
1025 }
1026 /* If the user has explicitly specified the driver, this choice should
1027 * override the BDRV_O_PROTOCOL flag */
1028 protocol = drv->bdrv_file_open;
53a29513
HR
1029 }
1030
1031 if (protocol) {
1032 *flags |= BDRV_O_PROTOCOL;
1033 } else {
1034 *flags &= ~BDRV_O_PROTOCOL;
1035 }
1036
035fccdf 1037 /* Fetch the file name from the options QDict if necessary */
17b005f1 1038 if (protocol && filename) {
f54120ff
KW
1039 if (!qdict_haskey(*options, "filename")) {
1040 qdict_put(*options, "filename", qstring_from_str(filename));
1041 parse_filename = true;
1042 } else {
1043 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1044 "the same time");
1045 return -EINVAL;
1046 }
035fccdf
KW
1047 }
1048
c2ad1b0c 1049 /* Find the right block driver */
f54120ff 1050 filename = qdict_get_try_str(*options, "filename");
f54120ff 1051
053e1578
HR
1052 if (!drvname && protocol) {
1053 if (filename) {
1054 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1055 if (!drv) {
053e1578 1056 return -EINVAL;
17b005f1 1057 }
053e1578
HR
1058
1059 drvname = drv->format_name;
1060 qdict_put(*options, "driver", qstring_from_str(drvname));
1061 } else {
1062 error_setg(errp, "Must specify either driver or file");
1063 return -EINVAL;
98289620 1064 }
c2ad1b0c
KW
1065 }
1066
17b005f1 1067 assert(drv || !protocol);
c2ad1b0c 1068
f54120ff 1069 /* Driver-specific filename parsing */
17b005f1 1070 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1071 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1072 if (local_err) {
34b5d2c6 1073 error_propagate(errp, local_err);
f54120ff 1074 return -EINVAL;
6963a30d 1075 }
cd5d031e
HR
1076
1077 if (!drv->bdrv_needs_filename) {
1078 qdict_del(*options, "filename");
cd5d031e 1079 }
6963a30d
KW
1080 }
1081
d44f928a
HR
1082 if (runstate_check(RUN_STATE_INMIGRATE)) {
1083 *flags |= BDRV_O_INCOMING;
1084 }
1085
f54120ff
KW
1086 return 0;
1087}
1088
b4b059f6
KW
1089static BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
1090 BlockDriverState *child_bs,
1091 const BdrvChildRole *child_role)
df581792
KW
1092{
1093 BdrvChild *child = g_new(BdrvChild, 1);
1094 *child = (BdrvChild) {
1095 .bs = child_bs,
1096 .role = child_role,
1097 };
1098
1099 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
d42a8a93 1100 QLIST_INSERT_HEAD(&child_bs->parents, child, next_parent);
b4b059f6
KW
1101
1102 return child;
df581792
KW
1103}
1104
3f09bfbc 1105static void bdrv_detach_child(BdrvChild *child)
33a60407
KW
1106{
1107 QLIST_REMOVE(child, next);
d42a8a93 1108 QLIST_REMOVE(child, next_parent);
33a60407
KW
1109 g_free(child);
1110}
1111
1112void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
1113{
779020cb
KW
1114 BlockDriverState *child_bs;
1115
1116 if (child == NULL) {
1117 return;
1118 }
33a60407
KW
1119
1120 if (child->bs->inherits_from == parent) {
1121 child->bs->inherits_from = NULL;
1122 }
1123
779020cb 1124 child_bs = child->bs;
33a60407
KW
1125 bdrv_detach_child(child);
1126 bdrv_unref(child_bs);
1127}
1128
5db15a57
KW
1129/*
1130 * Sets the backing file link of a BDS. A new reference is created; callers
1131 * which don't need their own reference any more must call bdrv_unref().
1132 */
8d24cce1
FZ
1133void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd)
1134{
5db15a57
KW
1135 if (backing_hd) {
1136 bdrv_ref(backing_hd);
1137 }
8d24cce1 1138
760e0063 1139 if (bs->backing) {
826b6ca0 1140 assert(bs->backing_blocker);
760e0063 1141 bdrv_op_unblock_all(bs->backing->bs, bs->backing_blocker);
5db15a57 1142 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
1143 } else if (backing_hd) {
1144 error_setg(&bs->backing_blocker,
81e5f78a
AG
1145 "node is used as backing hd of '%s'",
1146 bdrv_get_device_or_node_name(bs));
826b6ca0
FZ
1147 }
1148
8d24cce1 1149 if (!backing_hd) {
826b6ca0
FZ
1150 error_free(bs->backing_blocker);
1151 bs->backing_blocker = NULL;
760e0063 1152 bs->backing = NULL;
8d24cce1
FZ
1153 goto out;
1154 }
760e0063 1155 bs->backing = bdrv_attach_child(bs, backing_hd, &child_backing);
8d24cce1
FZ
1156 bs->open_flags &= ~BDRV_O_NO_BACKING;
1157 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_hd->filename);
1158 pstrcpy(bs->backing_format, sizeof(bs->backing_format),
1159 backing_hd->drv ? backing_hd->drv->format_name : "");
826b6ca0 1160
760e0063 1161 bdrv_op_block_all(backing_hd, bs->backing_blocker);
826b6ca0 1162 /* Otherwise we won't be able to commit due to check in bdrv_commit */
760e0063 1163 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
826b6ca0 1164 bs->backing_blocker);
8d24cce1 1165out:
3baca891 1166 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
1167}
1168
31ca6d07
KW
1169/*
1170 * Opens the backing file for a BlockDriverState if not yet open
1171 *
1172 * options is a QDict of options to pass to the block drivers, or NULL for an
1173 * empty set of options. The reference to the QDict is transferred to this
1174 * function (even on failure), so if the caller intends to reuse the dictionary,
1175 * it needs to use QINCREF() before calling bdrv_file_open.
1176 */
34b5d2c6 1177int bdrv_open_backing_file(BlockDriverState *bs, QDict *options, Error **errp)
9156df12 1178{
1ba4b6a5 1179 char *backing_filename = g_malloc0(PATH_MAX);
317fc44e 1180 int ret = 0;
8d24cce1 1181 BlockDriverState *backing_hd;
34b5d2c6 1182 Error *local_err = NULL;
9156df12 1183
760e0063 1184 if (bs->backing != NULL) {
31ca6d07 1185 QDECREF(options);
1ba4b6a5 1186 goto free_exit;
9156df12
PB
1187 }
1188
31ca6d07
KW
1189 /* NULL means an empty set of options */
1190 if (options == NULL) {
1191 options = qdict_new();
1192 }
1193
9156df12 1194 bs->open_flags &= ~BDRV_O_NO_BACKING;
1cb6f506
KW
1195 if (qdict_haskey(options, "file.filename")) {
1196 backing_filename[0] = '\0';
1197 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 1198 QDECREF(options);
1ba4b6a5 1199 goto free_exit;
dbecebdd 1200 } else {
9f07429e
HR
1201 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
1202 &local_err);
1203 if (local_err) {
1204 ret = -EINVAL;
1205 error_propagate(errp, local_err);
1206 QDECREF(options);
1207 goto free_exit;
1208 }
9156df12
PB
1209 }
1210
8ee79e70
KW
1211 if (!bs->drv || !bs->drv->supports_backing) {
1212 ret = -EINVAL;
1213 error_setg(errp, "Driver doesn't support backing files");
1214 QDECREF(options);
1215 goto free_exit;
1216 }
1217
e4e9986b 1218 backing_hd = bdrv_new();
8d24cce1 1219
c5f6e493
KW
1220 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
1221 qdict_put(options, "driver", qstring_from_str(bs->backing_format));
9156df12
PB
1222 }
1223
760e0063 1224 assert(bs->backing == NULL);
f3930ed0
KW
1225 ret = bdrv_open_inherit(&backing_hd,
1226 *backing_filename ? backing_filename : NULL,
ce343771 1227 NULL, options, 0, bs, &child_backing, &local_err);
9156df12 1228 if (ret < 0) {
8d24cce1
FZ
1229 bdrv_unref(backing_hd);
1230 backing_hd = NULL;
9156df12 1231 bs->open_flags |= BDRV_O_NO_BACKING;
b04b6b6e
FZ
1232 error_setg(errp, "Could not open backing file: %s",
1233 error_get_pretty(local_err));
1234 error_free(local_err);
1ba4b6a5 1235 goto free_exit;
9156df12 1236 }
df581792 1237
5db15a57
KW
1238 /* Hook up the backing file link; drop our reference, bs owns the
1239 * backing_hd reference now */
8d24cce1 1240 bdrv_set_backing_hd(bs, backing_hd);
5db15a57 1241 bdrv_unref(backing_hd);
d80ac658 1242
1ba4b6a5
BC
1243free_exit:
1244 g_free(backing_filename);
1245 return ret;
9156df12
PB
1246}
1247
da557aac
HR
1248/*
1249 * Opens a disk image whose options are given as BlockdevRef in another block
1250 * device's options.
1251 *
da557aac 1252 * If allow_none is true, no image will be opened if filename is false and no
b4b059f6 1253 * BlockdevRef is given. NULL will be returned, but errp remains unset.
da557aac
HR
1254 *
1255 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
1256 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1257 * itself, all options starting with "${bdref_key}." are considered part of the
1258 * BlockdevRef.
1259 *
1260 * The BlockdevRef will be removed from the options QDict.
1261 */
b4b059f6
KW
1262BdrvChild *bdrv_open_child(const char *filename,
1263 QDict *options, const char *bdref_key,
1264 BlockDriverState* parent,
1265 const BdrvChildRole *child_role,
1266 bool allow_none, Error **errp)
da557aac 1267{
b4b059f6
KW
1268 BdrvChild *c = NULL;
1269 BlockDriverState *bs;
da557aac
HR
1270 QDict *image_options;
1271 int ret;
1272 char *bdref_key_dot;
1273 const char *reference;
1274
df581792 1275 assert(child_role != NULL);
f67503e5 1276
da557aac
HR
1277 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1278 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
1279 g_free(bdref_key_dot);
1280
1281 reference = qdict_get_try_str(options, bdref_key);
1282 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 1283 if (!allow_none) {
da557aac
HR
1284 error_setg(errp, "A block device must be specified for \"%s\"",
1285 bdref_key);
da557aac 1286 }
b20e61e0 1287 QDECREF(image_options);
da557aac
HR
1288 goto done;
1289 }
1290
b4b059f6
KW
1291 bs = NULL;
1292 ret = bdrv_open_inherit(&bs, filename, reference, image_options, 0,
ce343771 1293 parent, child_role, errp);
df581792
KW
1294 if (ret < 0) {
1295 goto done;
1296 }
1297
b4b059f6 1298 c = bdrv_attach_child(parent, bs, child_role);
da557aac
HR
1299
1300done:
1301 qdict_del(options, bdref_key);
b4b059f6
KW
1302 return c;
1303}
1304
6b8aeca5 1305int bdrv_append_temp_snapshot(BlockDriverState *bs, int flags, Error **errp)
b998875d
KW
1306{
1307 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 1308 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 1309 int64_t total_size;
83d0521a 1310 QemuOpts *opts = NULL;
b998875d
KW
1311 QDict *snapshot_options;
1312 BlockDriverState *bs_snapshot;
c2e0dbbf 1313 Error *local_err = NULL;
b998875d
KW
1314 int ret;
1315
1316 /* if snapshot, we create a temporary backing file and open it
1317 instead of opening 'filename' directly */
1318
1319 /* Get the required size from the image */
f187743a
KW
1320 total_size = bdrv_getlength(bs);
1321 if (total_size < 0) {
6b8aeca5 1322 ret = total_size;
f187743a 1323 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 1324 goto out;
f187743a 1325 }
b998875d
KW
1326
1327 /* Create the temporary image */
1ba4b6a5 1328 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
1329 if (ret < 0) {
1330 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 1331 goto out;
b998875d
KW
1332 }
1333
ef810437 1334 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 1335 &error_abort);
39101f25 1336 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
ef810437 1337 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, &local_err);
83d0521a 1338 qemu_opts_del(opts);
b998875d
KW
1339 if (ret < 0) {
1340 error_setg_errno(errp, -ret, "Could not create temporary overlay "
1341 "'%s': %s", tmp_filename,
1342 error_get_pretty(local_err));
1343 error_free(local_err);
1ba4b6a5 1344 goto out;
b998875d
KW
1345 }
1346
1347 /* Prepare a new options QDict for the temporary file */
1348 snapshot_options = qdict_new();
1349 qdict_put(snapshot_options, "file.driver",
1350 qstring_from_str("file"));
1351 qdict_put(snapshot_options, "file.filename",
1352 qstring_from_str(tmp_filename));
e6641719
HR
1353 qdict_put(snapshot_options, "driver",
1354 qstring_from_str("qcow2"));
b998875d 1355
e4e9986b 1356 bs_snapshot = bdrv_new();
b998875d
KW
1357
1358 ret = bdrv_open(&bs_snapshot, NULL, NULL, snapshot_options,
6ebf9aa2 1359 flags, &local_err);
b998875d
KW
1360 if (ret < 0) {
1361 error_propagate(errp, local_err);
1ba4b6a5 1362 goto out;
b998875d
KW
1363 }
1364
1365 bdrv_append(bs_snapshot, bs);
1ba4b6a5
BC
1366
1367out:
1368 g_free(tmp_filename);
6b8aeca5 1369 return ret;
b998875d
KW
1370}
1371
b6ce07aa
KW
1372/*
1373 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
1374 *
1375 * options is a QDict of options to pass to the block drivers, or NULL for an
1376 * empty set of options. The reference to the QDict belongs to the block layer
1377 * after the call (even on failure), so if the caller intends to reuse the
1378 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
1379 *
1380 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
1381 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
1382 *
1383 * The reference parameter may be used to specify an existing block device which
1384 * should be opened. If specified, neither options nor a filename may be given,
1385 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 1386 */
f3930ed0
KW
1387static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
1388 const char *reference, QDict *options, int flags,
1389 BlockDriverState *parent,
ce343771 1390 const BdrvChildRole *child_role, Error **errp)
ea2384d3 1391{
b6ce07aa 1392 int ret;
9a4f4c31
KW
1393 BdrvChild *file = NULL;
1394 BlockDriverState *bs;
ce343771 1395 BlockDriver *drv = NULL;
74fe54f2 1396 const char *drvname;
34b5d2c6 1397 Error *local_err = NULL;
b1e6fc08 1398 int snapshot_flags = 0;
712e7874 1399
f67503e5 1400 assert(pbs);
f3930ed0
KW
1401 assert(!child_role || !flags);
1402 assert(!child_role == !parent);
f67503e5 1403
ddf5636d
HR
1404 if (reference) {
1405 bool options_non_empty = options ? qdict_size(options) : false;
1406 QDECREF(options);
1407
1408 if (*pbs) {
1409 error_setg(errp, "Cannot reuse an existing BDS when referencing "
1410 "another block device");
1411 return -EINVAL;
1412 }
1413
1414 if (filename || options_non_empty) {
1415 error_setg(errp, "Cannot reference an existing block device with "
1416 "additional options or a new filename");
1417 return -EINVAL;
1418 }
1419
1420 bs = bdrv_lookup_bs(reference, reference, errp);
1421 if (!bs) {
1422 return -ENODEV;
1423 }
1424 bdrv_ref(bs);
1425 *pbs = bs;
1426 return 0;
1427 }
1428
f67503e5
HR
1429 if (*pbs) {
1430 bs = *pbs;
1431 } else {
e4e9986b 1432 bs = bdrv_new();
f67503e5
HR
1433 }
1434
de9c0cec
KW
1435 /* NULL means an empty set of options */
1436 if (options == NULL) {
1437 options = qdict_new();
1438 }
1439
f3930ed0 1440 if (child_role) {
bddcec37 1441 bs->inherits_from = parent;
f3930ed0
KW
1442 flags = child_role->inherit_flags(parent->open_flags);
1443 }
1444
053e1578 1445 ret = bdrv_fill_options(&options, &filename, &flags, &local_err);
462f5bcf
KW
1446 if (local_err) {
1447 goto fail;
1448 }
1449
76c591b0 1450 /* Find the right image format driver */
76c591b0
KW
1451 drvname = qdict_get_try_str(options, "driver");
1452 if (drvname) {
1453 drv = bdrv_find_format(drvname);
1454 qdict_del(options, "driver");
1455 if (!drv) {
1456 error_setg(errp, "Unknown driver: '%s'", drvname);
1457 ret = -EINVAL;
1458 goto fail;
1459 }
1460 }
1461
1462 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 1463
f3930ed0 1464 bs->open_flags = flags;
de9c0cec 1465 bs->options = options;
b6ad491a 1466 options = qdict_clone_shallow(options);
de9c0cec 1467
f500a6d3 1468 /* Open image file without format layer */
f4788adc
KW
1469 if ((flags & BDRV_O_PROTOCOL) == 0) {
1470 if (flags & BDRV_O_RDWR) {
1471 flags |= BDRV_O_ALLOW_RDWR;
1472 }
1473 if (flags & BDRV_O_SNAPSHOT) {
1474 snapshot_flags = bdrv_temp_snapshot_flags(flags);
1475 flags = bdrv_backing_flags(flags);
1476 }
f500a6d3 1477
f3930ed0 1478 bs->open_flags = flags;
1fdd6933 1479
9a4f4c31
KW
1480 file = bdrv_open_child(filename, options, "file", bs,
1481 &child_file, true, &local_err);
1fdd6933
KW
1482 if (local_err) {
1483 ret = -EINVAL;
f4788adc
KW
1484 goto fail;
1485 }
f500a6d3
KW
1486 }
1487
76c591b0 1488 /* Image format probing */
38f3ef57 1489 bs->probed = !drv;
76c591b0 1490 if (!drv && file) {
9a4f4c31 1491 ret = find_image_format(file->bs, filename, &drv, &local_err);
17b005f1 1492 if (ret < 0) {
8bfea15d 1493 goto fail;
2a05cbe4 1494 }
76c591b0 1495 } else if (!drv) {
17b005f1
KW
1496 error_setg(errp, "Must specify either driver or file");
1497 ret = -EINVAL;
8bfea15d 1498 goto fail;
ea2384d3 1499 }
b6ce07aa 1500
53a29513
HR
1501 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
1502 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
1503 /* file must be NULL if a protocol BDS is about to be created
1504 * (the inverse results in an error message from bdrv_open_common()) */
1505 assert(!(flags & BDRV_O_PROTOCOL) || !file);
1506
b6ce07aa 1507 /* Open the image */
34b5d2c6 1508 ret = bdrv_open_common(bs, file, options, flags, drv, &local_err);
b6ce07aa 1509 if (ret < 0) {
8bfea15d 1510 goto fail;
6987307c
CH
1511 }
1512
2a05cbe4 1513 if (file && (bs->file != file)) {
9a4f4c31 1514 bdrv_unref_child(bs, file);
f500a6d3
KW
1515 file = NULL;
1516 }
1517
b6ce07aa 1518 /* If there is a backing file, use it */
9156df12 1519 if ((flags & BDRV_O_NO_BACKING) == 0) {
31ca6d07
KW
1520 QDict *backing_options;
1521
5726d872 1522 qdict_extract_subqdict(options, &backing_options, "backing.");
34b5d2c6 1523 ret = bdrv_open_backing_file(bs, backing_options, &local_err);
b6ce07aa 1524 if (ret < 0) {
b6ad491a 1525 goto close_and_fail;
b6ce07aa 1526 }
b6ce07aa
KW
1527 }
1528
91af7014
HR
1529 bdrv_refresh_filename(bs);
1530
b6ad491a 1531 /* Check if any unknown options were used */
5acd9d81 1532 if (options && (qdict_size(options) != 0)) {
b6ad491a 1533 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
1534 if (flags & BDRV_O_PROTOCOL) {
1535 error_setg(errp, "Block protocol '%s' doesn't support the option "
1536 "'%s'", drv->format_name, entry->key);
1537 } else {
1538 error_setg(errp, "Block format '%s' used by device '%s' doesn't "
1539 "support the option '%s'", drv->format_name,
bfb197e0 1540 bdrv_get_device_name(bs), entry->key);
5acd9d81 1541 }
b6ad491a
KW
1542
1543 ret = -EINVAL;
1544 goto close_and_fail;
1545 }
b6ad491a 1546
b6ce07aa 1547 if (!bdrv_key_required(bs)) {
a7f53e26
MA
1548 if (bs->blk) {
1549 blk_dev_change_media_cb(bs->blk, true);
1550 }
c3adb58f
MA
1551 } else if (!runstate_check(RUN_STATE_PRELAUNCH)
1552 && !runstate_check(RUN_STATE_INMIGRATE)
1553 && !runstate_check(RUN_STATE_PAUSED)) { /* HACK */
1554 error_setg(errp,
1555 "Guest must be stopped for opening of encrypted image");
1556 ret = -EBUSY;
1557 goto close_and_fail;
b6ce07aa
KW
1558 }
1559
c3adb58f 1560 QDECREF(options);
f67503e5 1561 *pbs = bs;
dd62f1ca
KW
1562
1563 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
1564 * temporary snapshot afterwards. */
1565 if (snapshot_flags) {
1566 ret = bdrv_append_temp_snapshot(bs, snapshot_flags, &local_err);
1567 if (local_err) {
1568 goto close_and_fail;
1569 }
1570 }
1571
b6ce07aa
KW
1572 return 0;
1573
8bfea15d 1574fail:
f500a6d3 1575 if (file != NULL) {
9a4f4c31 1576 bdrv_unref_child(bs, file);
f500a6d3 1577 }
de9c0cec 1578 QDECREF(bs->options);
b6ad491a 1579 QDECREF(options);
de9c0cec 1580 bs->options = NULL;
f67503e5
HR
1581 if (!*pbs) {
1582 /* If *pbs is NULL, a new BDS has been created in this function and
1583 needs to be freed now. Otherwise, it does not need to be closed,
1584 since it has not really been opened yet. */
1585 bdrv_unref(bs);
1586 }
84d18f06 1587 if (local_err) {
34b5d2c6
HR
1588 error_propagate(errp, local_err);
1589 }
b6ad491a 1590 return ret;
de9c0cec 1591
b6ad491a 1592close_and_fail:
f67503e5
HR
1593 /* See fail path, but now the BDS has to be always closed */
1594 if (*pbs) {
1595 bdrv_close(bs);
1596 } else {
1597 bdrv_unref(bs);
1598 }
b6ad491a 1599 QDECREF(options);
84d18f06 1600 if (local_err) {
34b5d2c6
HR
1601 error_propagate(errp, local_err);
1602 }
b6ce07aa
KW
1603 return ret;
1604}
1605
f3930ed0 1606int bdrv_open(BlockDriverState **pbs, const char *filename,
6ebf9aa2 1607 const char *reference, QDict *options, int flags, Error **errp)
f3930ed0
KW
1608{
1609 return bdrv_open_inherit(pbs, filename, reference, options, flags, NULL,
ce343771 1610 NULL, errp);
f3930ed0
KW
1611}
1612
e971aa12
JC
1613typedef struct BlockReopenQueueEntry {
1614 bool prepared;
1615 BDRVReopenState state;
1616 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1617} BlockReopenQueueEntry;
1618
1619/*
1620 * Adds a BlockDriverState to a simple queue for an atomic, transactional
1621 * reopen of multiple devices.
1622 *
1623 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
1624 * already performed, or alternatively may be NULL a new BlockReopenQueue will
1625 * be created and initialized. This newly created BlockReopenQueue should be
1626 * passed back in for subsequent calls that are intended to be of the same
1627 * atomic 'set'.
1628 *
1629 * bs is the BlockDriverState to add to the reopen queue.
1630 *
4d2cb092
KW
1631 * options contains the changed options for the associated bs
1632 * (the BlockReopenQueue takes ownership)
1633 *
e971aa12
JC
1634 * flags contains the open flags for the associated bs
1635 *
1636 * returns a pointer to bs_queue, which is either the newly allocated
1637 * bs_queue, or the existing bs_queue being used.
1638 *
1639 */
1640BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
4d2cb092
KW
1641 BlockDriverState *bs,
1642 QDict *options, int flags)
e971aa12
JC
1643{
1644 assert(bs != NULL);
1645
1646 BlockReopenQueueEntry *bs_entry;
67251a31 1647 BdrvChild *child;
4d2cb092 1648 QDict *old_options;
67251a31 1649
e971aa12
JC
1650 if (bs_queue == NULL) {
1651 bs_queue = g_new0(BlockReopenQueue, 1);
1652 QSIMPLEQ_INIT(bs_queue);
1653 }
1654
4d2cb092
KW
1655 if (!options) {
1656 options = qdict_new();
1657 }
1658
1659 old_options = qdict_clone_shallow(bs->options);
1660 qdict_join(options, old_options, false);
1661 QDECREF(old_options);
1662
f1f25a2e
KW
1663 /* bdrv_open() masks this flag out */
1664 flags &= ~BDRV_O_PROTOCOL;
1665
67251a31
KW
1666 QLIST_FOREACH(child, &bs->children, next) {
1667 int child_flags;
1668
1669 if (child->bs->inherits_from != bs) {
1670 continue;
1671 }
1672
1673 child_flags = child->role->inherit_flags(flags);
4d2cb092
KW
1674 /* TODO Pass down child flags (backing.*, extents.*, ...) */
1675 bdrv_reopen_queue(bs_queue, child->bs, NULL, child_flags);
e971aa12
JC
1676 }
1677
1678 bs_entry = g_new0(BlockReopenQueueEntry, 1);
1679 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
1680
1681 bs_entry->state.bs = bs;
4d2cb092 1682 bs_entry->state.options = options;
e971aa12
JC
1683 bs_entry->state.flags = flags;
1684
1685 return bs_queue;
1686}
1687
1688/*
1689 * Reopen multiple BlockDriverStates atomically & transactionally.
1690 *
1691 * The queue passed in (bs_queue) must have been built up previous
1692 * via bdrv_reopen_queue().
1693 *
1694 * Reopens all BDS specified in the queue, with the appropriate
1695 * flags. All devices are prepared for reopen, and failure of any
1696 * device will cause all device changes to be abandonded, and intermediate
1697 * data cleaned up.
1698 *
1699 * If all devices prepare successfully, then the changes are committed
1700 * to all devices.
1701 *
1702 */
1703int bdrv_reopen_multiple(BlockReopenQueue *bs_queue, Error **errp)
1704{
1705 int ret = -1;
1706 BlockReopenQueueEntry *bs_entry, *next;
1707 Error *local_err = NULL;
1708
1709 assert(bs_queue != NULL);
1710
1711 bdrv_drain_all();
1712
1713 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1714 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
1715 error_propagate(errp, local_err);
1716 goto cleanup;
1717 }
1718 bs_entry->prepared = true;
1719 }
1720
1721 /* If we reach this point, we have success and just need to apply the
1722 * changes
1723 */
1724 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1725 bdrv_reopen_commit(&bs_entry->state);
1726 }
1727
1728 ret = 0;
1729
1730cleanup:
1731 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
1732 if (ret && bs_entry->prepared) {
1733 bdrv_reopen_abort(&bs_entry->state);
1734 }
4d2cb092 1735 QDECREF(bs_entry->state.options);
e971aa12
JC
1736 g_free(bs_entry);
1737 }
1738 g_free(bs_queue);
1739 return ret;
1740}
1741
1742
1743/* Reopen a single BlockDriverState with the specified flags. */
1744int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
1745{
1746 int ret = -1;
1747 Error *local_err = NULL;
4d2cb092 1748 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12
JC
1749
1750 ret = bdrv_reopen_multiple(queue, &local_err);
1751 if (local_err != NULL) {
1752 error_propagate(errp, local_err);
1753 }
1754 return ret;
1755}
1756
1757
1758/*
1759 * Prepares a BlockDriverState for reopen. All changes are staged in the
1760 * 'opaque' field of the BDRVReopenState, which is used and allocated by
1761 * the block driver layer .bdrv_reopen_prepare()
1762 *
1763 * bs is the BlockDriverState to reopen
1764 * flags are the new open flags
1765 * queue is the reopen queue
1766 *
1767 * Returns 0 on success, non-zero on error. On error errp will be set
1768 * as well.
1769 *
1770 * On failure, bdrv_reopen_abort() will be called to clean up any data.
1771 * It is the responsibility of the caller to then call the abort() or
1772 * commit() for any other BDS that have been left in a prepare() state
1773 *
1774 */
1775int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
1776 Error **errp)
1777{
1778 int ret = -1;
1779 Error *local_err = NULL;
1780 BlockDriver *drv;
1781
1782 assert(reopen_state != NULL);
1783 assert(reopen_state->bs->drv != NULL);
1784 drv = reopen_state->bs->drv;
1785
1786 /* if we are to stay read-only, do not allow permission change
1787 * to r/w */
1788 if (!(reopen_state->bs->open_flags & BDRV_O_ALLOW_RDWR) &&
1789 reopen_state->flags & BDRV_O_RDWR) {
81e5f78a
AG
1790 error_setg(errp, "Node '%s' is read only",
1791 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1792 goto error;
1793 }
1794
1795
1796 ret = bdrv_flush(reopen_state->bs);
1797 if (ret) {
1798 error_set(errp, ERROR_CLASS_GENERIC_ERROR, "Error (%s) flushing drive",
1799 strerror(-ret));
1800 goto error;
1801 }
1802
1803 if (drv->bdrv_reopen_prepare) {
1804 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
1805 if (ret) {
1806 if (local_err != NULL) {
1807 error_propagate(errp, local_err);
1808 } else {
d8b6895f
LC
1809 error_setg(errp, "failed while preparing to reopen image '%s'",
1810 reopen_state->bs->filename);
e971aa12
JC
1811 }
1812 goto error;
1813 }
1814 } else {
1815 /* It is currently mandatory to have a bdrv_reopen_prepare()
1816 * handler for each supported drv. */
81e5f78a
AG
1817 error_setg(errp, "Block format '%s' used by node '%s' "
1818 "does not support reopening files", drv->format_name,
1819 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1820 ret = -1;
1821 goto error;
1822 }
1823
4d2cb092
KW
1824 /* Options that are not handled are only okay if they are unchanged
1825 * compared to the old state. It is expected that some options are only
1826 * used for the initial open, but not reopen (e.g. filename) */
1827 if (qdict_size(reopen_state->options)) {
1828 const QDictEntry *entry = qdict_first(reopen_state->options);
1829
1830 do {
1831 QString *new_obj = qobject_to_qstring(entry->value);
1832 const char *new = qstring_get_str(new_obj);
1833 const char *old = qdict_get_try_str(reopen_state->bs->options,
1834 entry->key);
1835
1836 if (!old || strcmp(new, old)) {
1837 error_setg(errp, "Cannot change the option '%s'", entry->key);
1838 ret = -EINVAL;
1839 goto error;
1840 }
1841 } while ((entry = qdict_next(reopen_state->options, entry)));
1842 }
1843
e971aa12
JC
1844 ret = 0;
1845
1846error:
1847 return ret;
1848}
1849
1850/*
1851 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
1852 * makes them final by swapping the staging BlockDriverState contents into
1853 * the active BlockDriverState contents.
1854 */
1855void bdrv_reopen_commit(BDRVReopenState *reopen_state)
1856{
1857 BlockDriver *drv;
1858
1859 assert(reopen_state != NULL);
1860 drv = reopen_state->bs->drv;
1861 assert(drv != NULL);
1862
1863 /* If there are any driver level actions to take */
1864 if (drv->bdrv_reopen_commit) {
1865 drv->bdrv_reopen_commit(reopen_state);
1866 }
1867
1868 /* set BDS specific flags now */
1869 reopen_state->bs->open_flags = reopen_state->flags;
1870 reopen_state->bs->enable_write_cache = !!(reopen_state->flags &
1871 BDRV_O_CACHE_WB);
1872 reopen_state->bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 1873
3baca891 1874 bdrv_refresh_limits(reopen_state->bs, NULL);
e971aa12
JC
1875}
1876
1877/*
1878 * Abort the reopen, and delete and free the staged changes in
1879 * reopen_state
1880 */
1881void bdrv_reopen_abort(BDRVReopenState *reopen_state)
1882{
1883 BlockDriver *drv;
1884
1885 assert(reopen_state != NULL);
1886 drv = reopen_state->bs->drv;
1887 assert(drv != NULL);
1888
1889 if (drv->bdrv_reopen_abort) {
1890 drv->bdrv_reopen_abort(reopen_state);
1891 }
1892}
1893
1894
fc01f7e7
FB
1895void bdrv_close(BlockDriverState *bs)
1896{
33384421
HR
1897 BdrvAioNotifier *ban, *ban_next;
1898
3cbc002c
PB
1899 if (bs->job) {
1900 block_job_cancel_sync(bs->job);
1901 }
99b7e775
AG
1902
1903 /* Disable I/O limits and drain all pending throttled requests */
1904 if (bs->io_limits_enabled) {
1905 bdrv_io_limits_disable(bs);
1906 }
1907
53ec73e2 1908 bdrv_drain(bs); /* complete I/O */
58fda173 1909 bdrv_flush(bs);
53ec73e2 1910 bdrv_drain(bs); /* in case flush left pending I/O */
d7d512f6 1911 notifier_list_notify(&bs->close_notifiers, bs);
7094f12f 1912
b4d02820
HR
1913 if (bs->blk) {
1914 blk_dev_change_media_cb(bs->blk, false);
1915 }
1916
3cbc002c 1917 if (bs->drv) {
6e93e7c4
KW
1918 BdrvChild *child, *next;
1919
9a7dedbc 1920 bs->drv->bdrv_close(bs);
9a4f4c31 1921 bs->drv = NULL;
9a7dedbc 1922
5db15a57 1923 bdrv_set_backing_hd(bs, NULL);
9a7dedbc 1924
9a4f4c31
KW
1925 if (bs->file != NULL) {
1926 bdrv_unref_child(bs, bs->file);
1927 bs->file = NULL;
1928 }
1929
6e93e7c4 1930 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
1931 /* TODO Remove bdrv_unref() from drivers' close function and use
1932 * bdrv_unref_child() here */
bddcec37
KW
1933 if (child->bs->inherits_from == bs) {
1934 child->bs->inherits_from = NULL;
1935 }
33a60407 1936 bdrv_detach_child(child);
6e93e7c4
KW
1937 }
1938
7267c094 1939 g_free(bs->opaque);
ea2384d3 1940 bs->opaque = NULL;
53fec9d3 1941 bs->copy_on_read = 0;
a275fa42
PB
1942 bs->backing_file[0] = '\0';
1943 bs->backing_format[0] = '\0';
6405875c
PB
1944 bs->total_sectors = 0;
1945 bs->encrypted = 0;
1946 bs->valid_key = 0;
1947 bs->sg = 0;
0d51b4de 1948 bs->zero_beyond_eof = false;
de9c0cec
KW
1949 QDECREF(bs->options);
1950 bs->options = NULL;
91af7014
HR
1951 QDECREF(bs->full_open_options);
1952 bs->full_open_options = NULL;
b338082b 1953 }
98f90dba 1954
33384421
HR
1955 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
1956 g_free(ban);
1957 }
1958 QLIST_INIT(&bs->aio_notifiers);
b338082b
FB
1959}
1960
2bc93fed
MK
1961void bdrv_close_all(void)
1962{
1963 BlockDriverState *bs;
1964
dc364f4c 1965 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
1966 AioContext *aio_context = bdrv_get_aio_context(bs);
1967
1968 aio_context_acquire(aio_context);
2bc93fed 1969 bdrv_close(bs);
ed78cda3 1970 aio_context_release(aio_context);
2bc93fed
MK
1971 }
1972}
1973
dc364f4c
BC
1974/* make a BlockDriverState anonymous by removing from bdrv_state and
1975 * graph_bdrv_state list.
d22b2f41
RH
1976 Also, NULL terminate the device_name to prevent double remove */
1977void bdrv_make_anon(BlockDriverState *bs)
1978{
bfb197e0
MA
1979 /*
1980 * Take care to remove bs from bdrv_states only when it's actually
1981 * in it. Note that bs->device_list.tqe_prev is initially null,
1982 * and gets set to non-null by QTAILQ_INSERT_TAIL(). Establish
1983 * the useful invariant "bs in bdrv_states iff bs->tqe_prev" by
1984 * resetting it to null on remove.
1985 */
1986 if (bs->device_list.tqe_prev) {
dc364f4c 1987 QTAILQ_REMOVE(&bdrv_states, bs, device_list);
bfb197e0 1988 bs->device_list.tqe_prev = NULL;
d22b2f41 1989 }
dc364f4c
BC
1990 if (bs->node_name[0] != '\0') {
1991 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
1992 }
1993 bs->node_name[0] = '\0';
d22b2f41
RH
1994}
1995
8e419aef 1996/* Fields that need to stay with the top-level BDS */
4ddc07ca
PB
1997static void bdrv_move_feature_fields(BlockDriverState *bs_dest,
1998 BlockDriverState *bs_src)
8802d1fd 1999{
4ddc07ca 2000 /* move some fields that need to stay attached to the device */
8802d1fd
JC
2001
2002 /* dev info */
4ddc07ca 2003 bs_dest->copy_on_read = bs_src->copy_on_read;
8802d1fd 2004
4ddc07ca 2005 bs_dest->enable_write_cache = bs_src->enable_write_cache;
c4a248a1 2006
a9fc4408 2007 /* dirty bitmap */
e4654d2d 2008 bs_dest->dirty_bitmaps = bs_src->dirty_bitmaps;
063dd40e 2009}
a9fc4408 2010
dd62f1ca
KW
2011static void change_parent_backing_link(BlockDriverState *from,
2012 BlockDriverState *to)
2013{
2014 BdrvChild *c, *next;
2015
2016 QLIST_FOREACH_SAFE(c, &from->parents, next_parent, next) {
2017 assert(c->role != &child_backing);
2018 c->bs = to;
2019 QLIST_REMOVE(c, next_parent);
2020 QLIST_INSERT_HEAD(&to->parents, c, next_parent);
2021 bdrv_ref(to);
2022 bdrv_unref(from);
2023 }
2024 if (from->blk) {
2025 blk_set_bs(from->blk, to);
2026 if (!to->device_list.tqe_prev) {
2027 QTAILQ_INSERT_BEFORE(from, to, device_list);
2028 }
2029 QTAILQ_REMOVE(&bdrv_states, from, device_list);
2030 }
2031}
2032
2033static void swap_feature_fields(BlockDriverState *bs_top,
2034 BlockDriverState *bs_new)
2035{
2036 BlockDriverState tmp;
2037
2038 bdrv_move_feature_fields(&tmp, bs_top);
2039 bdrv_move_feature_fields(bs_top, bs_new);
2040 bdrv_move_feature_fields(bs_new, &tmp);
2041
2042 assert(!bs_new->throttle_state);
2043 if (bs_top->throttle_state) {
2044 assert(bs_top->io_limits_enabled);
2045 bdrv_io_limits_enable(bs_new, throttle_group_get_name(bs_top));
2046 bdrv_io_limits_disable(bs_top);
2047 }
2048}
2049
4ddc07ca
PB
2050/*
2051 * Add new bs contents at the top of an image chain while the chain is
2052 * live, while keeping required fields on the top layer.
2053 *
2054 * This will modify the BlockDriverState fields, and swap contents
2055 * between bs_new and bs_top. Both bs_new and bs_top are modified.
2056 *
bfb197e0 2057 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2058 *
2059 * This function does not create any image files.
dd62f1ca
KW
2060 *
2061 * bdrv_append() takes ownership of a bs_new reference and unrefs it because
2062 * that's what the callers commonly need. bs_new will be referenced by the old
2063 * parents of bs_top after bdrv_append() returns. If the caller needs to keep a
2064 * reference of its own, it must call bdrv_ref().
4ddc07ca
PB
2065 */
2066void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top)
2067{
dd62f1ca
KW
2068 assert(!bdrv_requests_pending(bs_top));
2069 assert(!bdrv_requests_pending(bs_new));
2070
2071 bdrv_ref(bs_top);
2072 change_parent_backing_link(bs_top, bs_new);
2073
2074 /* Some fields always stay on top of the backing file chain */
2075 swap_feature_fields(bs_top, bs_new);
2076
2077 bdrv_set_backing_hd(bs_new, bs_top);
2078 bdrv_unref(bs_top);
4ddc07ca 2079
dd62f1ca
KW
2080 /* bs_new is now referenced by its new parents, we don't need the
2081 * additional reference any more. */
2082 bdrv_unref(bs_new);
8802d1fd
JC
2083}
2084
3f09bfbc
KW
2085void bdrv_replace_in_backing_chain(BlockDriverState *old, BlockDriverState *new)
2086{
2087 assert(!bdrv_requests_pending(old));
2088 assert(!bdrv_requests_pending(new));
2089
2090 bdrv_ref(old);
2091
2092 if (old->blk) {
2093 /* As long as these fields aren't in BlockBackend, but in the top-level
2094 * BlockDriverState, it's not possible for a BDS to have two BBs.
2095 *
2096 * We really want to copy the fields from old to new, but we go for a
2097 * swap instead so that pointers aren't duplicated and cause trouble.
2098 * (Also, bdrv_swap() used to do the same.) */
2099 assert(!new->blk);
2100 swap_feature_fields(old, new);
2101 }
2102 change_parent_backing_link(old, new);
2103
2104 /* Change backing files if a previously independent node is added to the
2105 * chain. For active commit, we replace top by its own (indirect) backing
2106 * file and don't do anything here so we don't build a loop. */
2107 if (new->backing == NULL && !bdrv_chain_contains(backing_bs(old), new)) {
2108 bdrv_set_backing_hd(new, backing_bs(old));
2109 bdrv_set_backing_hd(old, NULL);
2110 }
2111
2112 bdrv_unref(old);
2113}
2114
4f6fd349 2115static void bdrv_delete(BlockDriverState *bs)
b338082b 2116{
3e914655 2117 assert(!bs->job);
3718d8ab 2118 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 2119 assert(!bs->refcnt);
e4654d2d 2120 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
18846dee 2121
e1b5c52e
SH
2122 bdrv_close(bs);
2123
1b7bdbc1 2124 /* remove from list, if necessary */
d22b2f41 2125 bdrv_make_anon(bs);
34c6f050 2126
7267c094 2127 g_free(bs);
fc01f7e7
FB
2128}
2129
e97fc193
AL
2130/*
2131 * Run consistency checks on an image
2132 *
e076f338 2133 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 2134 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 2135 * check are stored in res.
e97fc193 2136 */
4534ff54 2137int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 2138{
908bcd54
HR
2139 if (bs->drv == NULL) {
2140 return -ENOMEDIUM;
2141 }
e97fc193
AL
2142 if (bs->drv->bdrv_check == NULL) {
2143 return -ENOTSUP;
2144 }
2145
e076f338 2146 memset(res, 0, sizeof(*res));
4534ff54 2147 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
2148}
2149
8a426614
KW
2150#define COMMIT_BUF_SECTORS 2048
2151
33e3963e
FB
2152/* commit COW file into the raw image */
2153int bdrv_commit(BlockDriverState *bs)
2154{
19cb3738 2155 BlockDriver *drv = bs->drv;
72706ea4 2156 int64_t sector, total_sectors, length, backing_length;
8a426614 2157 int n, ro, open_flags;
0bce597d 2158 int ret = 0;
72706ea4 2159 uint8_t *buf = NULL;
33e3963e 2160
19cb3738
FB
2161 if (!drv)
2162 return -ENOMEDIUM;
6bb45158 2163
760e0063 2164 if (!bs->backing) {
4dca4b63 2165 return -ENOTSUP;
33e3963e
FB
2166 }
2167
bb00021d 2168 if (bdrv_op_is_blocked(bs, BLOCK_OP_TYPE_COMMIT_SOURCE, NULL) ||
760e0063 2169 bdrv_op_is_blocked(bs->backing->bs, BLOCK_OP_TYPE_COMMIT_TARGET, NULL)) {
2d3735d3
SH
2170 return -EBUSY;
2171 }
2172
760e0063
KW
2173 ro = bs->backing->bs->read_only;
2174 open_flags = bs->backing->bs->open_flags;
4dca4b63
NS
2175
2176 if (ro) {
760e0063 2177 if (bdrv_reopen(bs->backing->bs, open_flags | BDRV_O_RDWR, NULL)) {
0bce597d 2178 return -EACCES;
4dca4b63 2179 }
ea2384d3 2180 }
33e3963e 2181
72706ea4
JC
2182 length = bdrv_getlength(bs);
2183 if (length < 0) {
2184 ret = length;
2185 goto ro_cleanup;
2186 }
2187
760e0063 2188 backing_length = bdrv_getlength(bs->backing->bs);
72706ea4
JC
2189 if (backing_length < 0) {
2190 ret = backing_length;
2191 goto ro_cleanup;
2192 }
2193
2194 /* If our top snapshot is larger than the backing file image,
2195 * grow the backing file image if possible. If not possible,
2196 * we must return an error */
2197 if (length > backing_length) {
760e0063 2198 ret = bdrv_truncate(bs->backing->bs, length);
72706ea4
JC
2199 if (ret < 0) {
2200 goto ro_cleanup;
2201 }
2202 }
2203
2204 total_sectors = length >> BDRV_SECTOR_BITS;
857d4f46
KW
2205
2206 /* qemu_try_blockalign() for bs will choose an alignment that works for
760e0063 2207 * bs->backing->bs as well, so no need to compare the alignment manually. */
857d4f46
KW
2208 buf = qemu_try_blockalign(bs, COMMIT_BUF_SECTORS * BDRV_SECTOR_SIZE);
2209 if (buf == NULL) {
2210 ret = -ENOMEM;
2211 goto ro_cleanup;
2212 }
8a426614
KW
2213
2214 for (sector = 0; sector < total_sectors; sector += n) {
d663640c
PB
2215 ret = bdrv_is_allocated(bs, sector, COMMIT_BUF_SECTORS, &n);
2216 if (ret < 0) {
2217 goto ro_cleanup;
2218 }
2219 if (ret) {
dabfa6cc
KW
2220 ret = bdrv_read(bs, sector, buf, n);
2221 if (ret < 0) {
8a426614
KW
2222 goto ro_cleanup;
2223 }
2224
760e0063 2225 ret = bdrv_write(bs->backing->bs, sector, buf, n);
dabfa6cc 2226 if (ret < 0) {
8a426614
KW
2227 goto ro_cleanup;
2228 }
ea2384d3 2229 }
33e3963e 2230 }
95389c86 2231
1d44952f
CH
2232 if (drv->bdrv_make_empty) {
2233 ret = drv->bdrv_make_empty(bs);
dabfa6cc
KW
2234 if (ret < 0) {
2235 goto ro_cleanup;
2236 }
1d44952f
CH
2237 bdrv_flush(bs);
2238 }
95389c86 2239
3f5075ae
CH
2240 /*
2241 * Make sure all data we wrote to the backing device is actually
2242 * stable on disk.
2243 */
760e0063
KW
2244 if (bs->backing) {
2245 bdrv_flush(bs->backing->bs);
dabfa6cc 2246 }
4dca4b63 2247
dabfa6cc 2248 ret = 0;
4dca4b63 2249ro_cleanup:
857d4f46 2250 qemu_vfree(buf);
4dca4b63
NS
2251
2252 if (ro) {
0bce597d 2253 /* ignoring error return here */
760e0063 2254 bdrv_reopen(bs->backing->bs, open_flags & ~BDRV_O_RDWR, NULL);
4dca4b63
NS
2255 }
2256
1d44952f 2257 return ret;
33e3963e
FB
2258}
2259
e8877497 2260int bdrv_commit_all(void)
6ab4b5ab
MA
2261{
2262 BlockDriverState *bs;
2263
dc364f4c 2264 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2265 AioContext *aio_context = bdrv_get_aio_context(bs);
2266
2267 aio_context_acquire(aio_context);
760e0063 2268 if (bs->drv && bs->backing) {
272d2d8e
JC
2269 int ret = bdrv_commit(bs);
2270 if (ret < 0) {
ed78cda3 2271 aio_context_release(aio_context);
272d2d8e
JC
2272 return ret;
2273 }
e8877497 2274 }
ed78cda3 2275 aio_context_release(aio_context);
6ab4b5ab 2276 }
e8877497 2277 return 0;
6ab4b5ab
MA
2278}
2279
756e6736
KW
2280/*
2281 * Return values:
2282 * 0 - success
2283 * -EINVAL - backing format specified, but no file
2284 * -ENOSPC - can't update the backing file because no space is left in the
2285 * image file header
2286 * -ENOTSUP - format driver doesn't support changing the backing file
2287 */
2288int bdrv_change_backing_file(BlockDriverState *bs,
2289 const char *backing_file, const char *backing_fmt)
2290{
2291 BlockDriver *drv = bs->drv;
469ef350 2292 int ret;
756e6736 2293
5f377794
PB
2294 /* Backing file format doesn't make sense without a backing file */
2295 if (backing_fmt && !backing_file) {
2296 return -EINVAL;
2297 }
2298
756e6736 2299 if (drv->bdrv_change_backing_file != NULL) {
469ef350 2300 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 2301 } else {
469ef350 2302 ret = -ENOTSUP;
756e6736 2303 }
469ef350
PB
2304
2305 if (ret == 0) {
2306 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
2307 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
2308 }
2309 return ret;
756e6736
KW
2310}
2311
6ebdcee2
JC
2312/*
2313 * Finds the image layer in the chain that has 'bs' as its backing file.
2314 *
2315 * active is the current topmost image.
2316 *
2317 * Returns NULL if bs is not found in active's image chain,
2318 * or if active == bs.
4caf0fcd
JC
2319 *
2320 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
2321 */
2322BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
2323 BlockDriverState *bs)
2324{
760e0063
KW
2325 while (active && bs != backing_bs(active)) {
2326 active = backing_bs(active);
6ebdcee2
JC
2327 }
2328
4caf0fcd
JC
2329 return active;
2330}
6ebdcee2 2331
4caf0fcd
JC
2332/* Given a BDS, searches for the base layer. */
2333BlockDriverState *bdrv_find_base(BlockDriverState *bs)
2334{
2335 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
2336}
2337
6ebdcee2
JC
2338/*
2339 * Drops images above 'base' up to and including 'top', and sets the image
2340 * above 'top' to have base as its backing file.
2341 *
2342 * Requires that the overlay to 'top' is opened r/w, so that the backing file
2343 * information in 'bs' can be properly updated.
2344 *
2345 * E.g., this will convert the following chain:
2346 * bottom <- base <- intermediate <- top <- active
2347 *
2348 * to
2349 *
2350 * bottom <- base <- active
2351 *
2352 * It is allowed for bottom==base, in which case it converts:
2353 *
2354 * base <- intermediate <- top <- active
2355 *
2356 * to
2357 *
2358 * base <- active
2359 *
54e26900
JC
2360 * If backing_file_str is non-NULL, it will be used when modifying top's
2361 * overlay image metadata.
2362 *
6ebdcee2
JC
2363 * Error conditions:
2364 * if active == top, that is considered an error
2365 *
2366 */
2367int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 2368 BlockDriverState *base, const char *backing_file_str)
6ebdcee2 2369{
6ebdcee2 2370 BlockDriverState *new_top_bs = NULL;
6ebdcee2
JC
2371 int ret = -EIO;
2372
6ebdcee2
JC
2373 if (!top->drv || !base->drv) {
2374 goto exit;
2375 }
2376
2377 new_top_bs = bdrv_find_overlay(active, top);
2378
2379 if (new_top_bs == NULL) {
2380 /* we could not find the image above 'top', this is an error */
2381 goto exit;
2382 }
2383
760e0063 2384 /* special case of new_top_bs->backing->bs already pointing to base - nothing
6ebdcee2 2385 * to do, no intermediate images */
760e0063 2386 if (backing_bs(new_top_bs) == base) {
6ebdcee2
JC
2387 ret = 0;
2388 goto exit;
2389 }
2390
5db15a57
KW
2391 /* Make sure that base is in the backing chain of top */
2392 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
2393 goto exit;
2394 }
2395
2396 /* success - we can delete the intermediate states, and link top->base */
5db15a57 2397 backing_file_str = backing_file_str ? backing_file_str : base->filename;
54e26900 2398 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
5db15a57 2399 base->drv ? base->drv->format_name : "");
6ebdcee2
JC
2400 if (ret) {
2401 goto exit;
2402 }
5db15a57 2403 bdrv_set_backing_hd(new_top_bs, base);
6ebdcee2 2404
6ebdcee2 2405 ret = 0;
6ebdcee2 2406exit:
6ebdcee2
JC
2407 return ret;
2408}
2409
61007b31
SH
2410/**
2411 * Truncate file to 'offset' bytes (needed only for file protocols)
2412 */
2413int bdrv_truncate(BlockDriverState *bs, int64_t offset)
71d0770c 2414{
61007b31
SH
2415 BlockDriver *drv = bs->drv;
2416 int ret;
2417 if (!drv)
71d0770c 2418 return -ENOMEDIUM;
61007b31
SH
2419 if (!drv->bdrv_truncate)
2420 return -ENOTSUP;
2421 if (bs->read_only)
2422 return -EACCES;
71d0770c 2423
61007b31
SH
2424 ret = drv->bdrv_truncate(bs, offset);
2425 if (ret == 0) {
2426 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
2427 bdrv_dirty_bitmap_truncate(bs);
2428 if (bs->blk) {
2429 blk_dev_resize_cb(bs->blk);
2430 }
c0191e76 2431 }
61007b31 2432 return ret;
71d0770c
AL
2433}
2434
61007b31
SH
2435/**
2436 * Length of a allocated file in bytes. Sparse files are counted by actual
2437 * allocated space. Return < 0 if error or unknown.
2438 */
2439int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 2440{
61007b31
SH
2441 BlockDriver *drv = bs->drv;
2442 if (!drv) {
2443 return -ENOMEDIUM;
8f4754ed 2444 }
61007b31
SH
2445 if (drv->bdrv_get_allocated_file_size) {
2446 return drv->bdrv_get_allocated_file_size(bs);
2447 }
2448 if (bs->file) {
9a4f4c31 2449 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 2450 }
61007b31 2451 return -ENOTSUP;
1c9805a3 2452}
e7a8a783 2453
61007b31
SH
2454/**
2455 * Return number of sectors on success, -errno on error.
1c9805a3 2456 */
61007b31 2457int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 2458{
61007b31 2459 BlockDriver *drv = bs->drv;
498e386c 2460
61007b31
SH
2461 if (!drv)
2462 return -ENOMEDIUM;
2572b37a 2463
61007b31
SH
2464 if (drv->has_variable_length) {
2465 int ret = refresh_total_sectors(bs, bs->total_sectors);
2466 if (ret < 0) {
2467 return ret;
1c9805a3
SH
2468 }
2469 }
61007b31 2470 return bs->total_sectors;
1c9805a3 2471}
b338082b 2472
61007b31
SH
2473/**
2474 * Return length in bytes on success, -errno on error.
2475 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 2476 */
61007b31 2477int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 2478{
61007b31 2479 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 2480
4a9c9ea0 2481 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 2482 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
2483}
2484
61007b31
SH
2485/* return 0 as number of sectors if no device present or error */
2486void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 2487{
61007b31 2488 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 2489
61007b31 2490 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
2491}
2492
61007b31 2493int bdrv_is_read_only(BlockDriverState *bs)
8d3b1a2d 2494{
61007b31 2495 return bs->read_only;
83f64091 2496}
83f64091 2497
61007b31 2498int bdrv_is_sg(BlockDriverState *bs)
f08145fe 2499{
61007b31 2500 return bs->sg;
f08145fe
KW
2501}
2502
61007b31 2503int bdrv_enable_write_cache(BlockDriverState *bs)
ab185921 2504{
61007b31 2505 return bs->enable_write_cache;
ab185921
SH
2506}
2507
61007b31 2508void bdrv_set_enable_write_cache(BlockDriverState *bs, bool wce)
da1fa91d 2509{
61007b31 2510 bs->enable_write_cache = wce;
ab185921 2511
61007b31
SH
2512 /* so a reopen() will preserve wce */
2513 if (wce) {
2514 bs->open_flags |= BDRV_O_CACHE_WB;
893a8f62 2515 } else {
61007b31 2516 bs->open_flags &= ~BDRV_O_CACHE_WB;
893a8f62 2517 }
da1fa91d
KW
2518}
2519
61007b31 2520int bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 2521{
760e0063 2522 if (bs->backing && bs->backing->bs->encrypted) {
61007b31 2523 return 1;
760e0063 2524 }
61007b31 2525 return bs->encrypted;
fc3959e4
FZ
2526}
2527
61007b31 2528int bdrv_key_required(BlockDriverState *bs)
fc3959e4 2529{
760e0063 2530 BdrvChild *backing = bs->backing;
61007b31 2531
760e0063 2532 if (backing && backing->bs->encrypted && !backing->bs->valid_key) {
61007b31 2533 return 1;
760e0063 2534 }
61007b31 2535 return (bs->encrypted && !bs->valid_key);
fc3959e4
FZ
2536}
2537
61007b31 2538int bdrv_set_key(BlockDriverState *bs, const char *key)
d0c7f642 2539{
d0c7f642 2540 int ret;
760e0063
KW
2541 if (bs->backing && bs->backing->bs->encrypted) {
2542 ret = bdrv_set_key(bs->backing->bs, key);
61007b31
SH
2543 if (ret < 0)
2544 return ret;
2545 if (!bs->encrypted)
2546 return 0;
2547 }
2548 if (!bs->encrypted) {
2549 return -EINVAL;
2550 } else if (!bs->drv || !bs->drv->bdrv_set_key) {
d0c7f642
KW
2551 return -ENOMEDIUM;
2552 }
61007b31 2553 ret = bs->drv->bdrv_set_key(bs, key);
b9c64947 2554 if (ret < 0) {
61007b31
SH
2555 bs->valid_key = 0;
2556 } else if (!bs->valid_key) {
2557 bs->valid_key = 1;
2558 if (bs->blk) {
2559 /* call the change callback now, we skipped it on open */
2560 blk_dev_change_media_cb(bs->blk, true);
2561 }
1b0288ae 2562 }
61007b31
SH
2563 return ret;
2564}
f08f2dda 2565
c5fbe571 2566/*
61007b31
SH
2567 * Provide an encryption key for @bs.
2568 * If @key is non-null:
2569 * If @bs is not encrypted, fail.
2570 * Else if the key is invalid, fail.
2571 * Else set @bs's key to @key, replacing the existing key, if any.
2572 * If @key is null:
2573 * If @bs is encrypted and still lacks a key, fail.
2574 * Else do nothing.
2575 * On failure, store an error object through @errp if non-null.
c5fbe571 2576 */
61007b31 2577void bdrv_add_key(BlockDriverState *bs, const char *key, Error **errp)
c5fbe571 2578{
61007b31
SH
2579 if (key) {
2580 if (!bdrv_is_encrypted(bs)) {
2581 error_setg(errp, "Node '%s' is not encrypted",
2582 bdrv_get_device_or_node_name(bs));
2583 } else if (bdrv_set_key(bs, key) < 0) {
c6bd8c70 2584 error_setg(errp, QERR_INVALID_PASSWORD);
4d2855a3
MA
2585 }
2586 } else {
2587 if (bdrv_key_required(bs)) {
b1ca6391
MA
2588 error_set(errp, ERROR_CLASS_DEVICE_ENCRYPTED,
2589 "'%s' (%s) is encrypted",
81e5f78a 2590 bdrv_get_device_or_node_name(bs),
4d2855a3
MA
2591 bdrv_get_encrypted_filename(bs));
2592 }
2593 }
2594}
2595
61007b31 2596const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 2597{
61007b31 2598 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
2599}
2600
61007b31 2601static int qsort_strcmp(const void *a, const void *b)
40b4f539 2602{
61007b31 2603 return strcmp(a, b);
40b4f539
KW
2604}
2605
61007b31
SH
2606void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
2607 void *opaque)
40b4f539 2608{
61007b31
SH
2609 BlockDriver *drv;
2610 int count = 0;
2611 int i;
2612 const char **formats = NULL;
40b4f539 2613
61007b31
SH
2614 QLIST_FOREACH(drv, &bdrv_drivers, list) {
2615 if (drv->format_name) {
2616 bool found = false;
2617 int i = count;
2618 while (formats && i && !found) {
2619 found = !strcmp(formats[--i], drv->format_name);
2620 }
e2a305fb 2621
61007b31
SH
2622 if (!found) {
2623 formats = g_renew(const char *, formats, count + 1);
2624 formats[count++] = drv->format_name;
2625 }
6c5a42ac 2626 }
61007b31 2627 }
6c5a42ac 2628
61007b31 2629 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 2630
61007b31
SH
2631 for (i = 0; i < count; i++) {
2632 it(opaque, formats[i]);
2633 }
40b4f539 2634
61007b31
SH
2635 g_free(formats);
2636}
40b4f539 2637
61007b31
SH
2638/* This function is to find a node in the bs graph */
2639BlockDriverState *bdrv_find_node(const char *node_name)
2640{
2641 BlockDriverState *bs;
391827eb 2642
61007b31 2643 assert(node_name);
40b4f539 2644
61007b31
SH
2645 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2646 if (!strcmp(node_name, bs->node_name)) {
2647 return bs;
40b4f539
KW
2648 }
2649 }
61007b31 2650 return NULL;
40b4f539
KW
2651}
2652
61007b31
SH
2653/* Put this QMP function here so it can access the static graph_bdrv_states. */
2654BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 2655{
61007b31
SH
2656 BlockDeviceInfoList *list, *entry;
2657 BlockDriverState *bs;
40b4f539 2658
61007b31
SH
2659 list = NULL;
2660 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2661 BlockDeviceInfo *info = bdrv_block_device_info(bs, errp);
2662 if (!info) {
2663 qapi_free_BlockDeviceInfoList(list);
2664 return NULL;
301db7c2 2665 }
61007b31
SH
2666 entry = g_malloc0(sizeof(*entry));
2667 entry->value = info;
2668 entry->next = list;
2669 list = entry;
301db7c2
RH
2670 }
2671
61007b31
SH
2672 return list;
2673}
40b4f539 2674
61007b31
SH
2675BlockDriverState *bdrv_lookup_bs(const char *device,
2676 const char *node_name,
2677 Error **errp)
2678{
2679 BlockBackend *blk;
2680 BlockDriverState *bs;
40b4f539 2681
61007b31
SH
2682 if (device) {
2683 blk = blk_by_name(device);
40b4f539 2684
61007b31
SH
2685 if (blk) {
2686 return blk_bs(blk);
2687 }
2688 }
40b4f539 2689
61007b31
SH
2690 if (node_name) {
2691 bs = bdrv_find_node(node_name);
6d519a5f 2692
61007b31
SH
2693 if (bs) {
2694 return bs;
2695 }
40b4f539
KW
2696 }
2697
61007b31
SH
2698 error_setg(errp, "Cannot find device=%s nor node_name=%s",
2699 device ? device : "",
2700 node_name ? node_name : "");
2701 return NULL;
40b4f539
KW
2702}
2703
61007b31
SH
2704/* If 'base' is in the same chain as 'top', return true. Otherwise,
2705 * return false. If either argument is NULL, return false. */
2706bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 2707{
61007b31 2708 while (top && top != base) {
760e0063 2709 top = backing_bs(top);
02c50efe 2710 }
61007b31
SH
2711
2712 return top != NULL;
02c50efe
FZ
2713}
2714
61007b31 2715BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 2716{
61007b31
SH
2717 if (!bs) {
2718 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 2719 }
61007b31 2720 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
2721}
2722
61007b31 2723BlockDriverState *bdrv_next(BlockDriverState *bs)
83f64091 2724{
61007b31
SH
2725 if (!bs) {
2726 return QTAILQ_FIRST(&bdrv_states);
857d4f46 2727 }
61007b31 2728 return QTAILQ_NEXT(bs, device_list);
83f64091 2729}
beac80cd 2730
61007b31 2731const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 2732{
61007b31 2733 return bs->node_name;
beac80cd
FB
2734}
2735
61007b31
SH
2736/* TODO check what callers really want: bs->node_name or blk_name() */
2737const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 2738{
61007b31 2739 return bs->blk ? blk_name(bs->blk) : "";
f141eafe 2740}
83f64091 2741
61007b31
SH
2742/* This can be used to identify nodes that might not have a device
2743 * name associated. Since node and device names live in the same
2744 * namespace, the result is unambiguous. The exception is if both are
2745 * absent, then this returns an empty (non-null) string. */
2746const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 2747{
61007b31 2748 return bs->blk ? blk_name(bs->blk) : bs->node_name;
beac80cd 2749}
beac80cd 2750
61007b31 2751int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 2752{
61007b31 2753 return bs->open_flags;
0b5a2445
PB
2754}
2755
61007b31 2756int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 2757{
61007b31 2758 return 1;
0b5a2445
PB
2759}
2760
61007b31 2761int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 2762{
61007b31 2763 assert(bs->drv);
0b5a2445 2764
61007b31
SH
2765 /* If BS is a copy on write image, it is initialized to
2766 the contents of the base image, which may not be zeroes. */
760e0063 2767 if (bs->backing) {
61007b31
SH
2768 return 0;
2769 }
2770 if (bs->drv->bdrv_has_zero_init) {
2771 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 2772 }
61007b31
SH
2773
2774 /* safe default */
2775 return 0;
68485420
KW
2776}
2777
61007b31 2778bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 2779{
61007b31 2780 BlockDriverInfo bdi;
b2a61371 2781
760e0063 2782 if (bs->backing) {
61007b31
SH
2783 return false;
2784 }
2785
2786 if (bdrv_get_info(bs, &bdi) == 0) {
2787 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
2788 }
2789
61007b31 2790 return false;
b2a61371
SH
2791}
2792
61007b31 2793bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 2794{
61007b31 2795 BlockDriverInfo bdi;
68485420 2796
760e0063 2797 if (bs->backing || !(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
2798 return false;
2799 }
68485420 2800
61007b31
SH
2801 if (bdrv_get_info(bs, &bdi) == 0) {
2802 return bdi.can_write_zeroes_with_unmap;
2803 }
68485420 2804
61007b31 2805 return false;
68485420
KW
2806}
2807
61007b31 2808const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 2809{
760e0063 2810 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
2811 return bs->backing_file;
2812 else if (bs->encrypted)
2813 return bs->filename;
2814 else
2815 return NULL;
b2e12bc6
CH
2816}
2817
61007b31
SH
2818void bdrv_get_backing_filename(BlockDriverState *bs,
2819 char *filename, int filename_size)
016f5cf6 2820{
61007b31
SH
2821 pstrcpy(filename, filename_size, bs->backing_file);
2822}
d318aea9 2823
61007b31
SH
2824int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
2825{
2826 BlockDriver *drv = bs->drv;
2827 if (!drv)
2828 return -ENOMEDIUM;
2829 if (!drv->bdrv_get_info)
2830 return -ENOTSUP;
2831 memset(bdi, 0, sizeof(*bdi));
2832 return drv->bdrv_get_info(bs, bdi);
2833}
016f5cf6 2834
61007b31
SH
2835ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
2836{
2837 BlockDriver *drv = bs->drv;
2838 if (drv && drv->bdrv_get_specific_info) {
2839 return drv->bdrv_get_specific_info(bs);
2840 }
2841 return NULL;
016f5cf6
AG
2842}
2843
61007b31 2844void bdrv_debug_event(BlockDriverState *bs, BlkDebugEvent event)
4265d620 2845{
61007b31
SH
2846 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
2847 return;
2848 }
4265d620 2849
61007b31 2850 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
2851}
2852
61007b31
SH
2853int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
2854 const char *tag)
4265d620 2855{
61007b31 2856 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 2857 bs = bs->file ? bs->file->bs : NULL;
61007b31 2858 }
4265d620 2859
61007b31
SH
2860 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
2861 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
2862 }
4265d620 2863
61007b31 2864 return -ENOTSUP;
4265d620
PB
2865}
2866
61007b31 2867int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 2868{
61007b31 2869 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 2870 bs = bs->file ? bs->file->bs : NULL;
61007b31 2871 }
ce1a14dc 2872
61007b31
SH
2873 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
2874 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
2875 }
2876
2877 return -ENOTSUP;
eb852011
MA
2878}
2879
61007b31 2880int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 2881{
61007b31 2882 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 2883 bs = bs->file ? bs->file->bs : NULL;
61007b31 2884 }
ce1a14dc 2885
61007b31
SH
2886 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
2887 return bs->drv->bdrv_debug_resume(bs, tag);
2888 }
ce1a14dc 2889
61007b31 2890 return -ENOTSUP;
f197fe2b
FZ
2891}
2892
61007b31 2893bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 2894{
61007b31 2895 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 2896 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 2897 }
19cb3738 2898
61007b31
SH
2899 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
2900 return bs->drv->bdrv_debug_is_suspended(bs, tag);
2901 }
f9f05dc5 2902
61007b31
SH
2903 return false;
2904}
f9f05dc5 2905
61007b31 2906int bdrv_is_snapshot(BlockDriverState *bs)
f9f05dc5 2907{
61007b31 2908 return !!(bs->open_flags & BDRV_O_SNAPSHOT);
f9f05dc5
KW
2909}
2910
61007b31
SH
2911/* backing_file can either be relative, or absolute, or a protocol. If it is
2912 * relative, it must be relative to the chain. So, passing in bs->filename
2913 * from a BDS as backing_file should not be done, as that may be relative to
2914 * the CWD rather than the chain. */
2915BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
2916 const char *backing_file)
f9f05dc5 2917{
61007b31
SH
2918 char *filename_full = NULL;
2919 char *backing_file_full = NULL;
2920 char *filename_tmp = NULL;
2921 int is_protocol = 0;
2922 BlockDriverState *curr_bs = NULL;
2923 BlockDriverState *retval = NULL;
f9f05dc5 2924
61007b31
SH
2925 if (!bs || !bs->drv || !backing_file) {
2926 return NULL;
f9f05dc5
KW
2927 }
2928
61007b31
SH
2929 filename_full = g_malloc(PATH_MAX);
2930 backing_file_full = g_malloc(PATH_MAX);
2931 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 2932
61007b31 2933 is_protocol = path_has_protocol(backing_file);
f9f05dc5 2934
760e0063 2935 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 2936
61007b31
SH
2937 /* If either of the filename paths is actually a protocol, then
2938 * compare unmodified paths; otherwise make paths relative */
2939 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
2940 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 2941 retval = curr_bs->backing->bs;
61007b31
SH
2942 break;
2943 }
2944 } else {
2945 /* If not an absolute filename path, make it relative to the current
2946 * image's filename path */
2947 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
2948 backing_file);
f9f05dc5 2949
61007b31
SH
2950 /* We are going to compare absolute pathnames */
2951 if (!realpath(filename_tmp, filename_full)) {
2952 continue;
2953 }
07f07615 2954
61007b31
SH
2955 /* We need to make sure the backing filename we are comparing against
2956 * is relative to the current image filename (or absolute) */
2957 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
2958 curr_bs->backing_file);
07f07615 2959
61007b31
SH
2960 if (!realpath(filename_tmp, backing_file_full)) {
2961 continue;
2962 }
eb489bb1 2963
61007b31 2964 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 2965 retval = curr_bs->backing->bs;
61007b31
SH
2966 break;
2967 }
2968 }
eb489bb1
KW
2969 }
2970
61007b31
SH
2971 g_free(filename_full);
2972 g_free(backing_file_full);
2973 g_free(filename_tmp);
2974 return retval;
2975}
2976
2977int bdrv_get_backing_file_depth(BlockDriverState *bs)
2978{
2979 if (!bs->drv) {
2980 return 0;
eb489bb1
KW
2981 }
2982
760e0063 2983 if (!bs->backing) {
61007b31 2984 return 0;
ca716364
KW
2985 }
2986
760e0063 2987 return 1 + bdrv_get_backing_file_depth(bs->backing->bs);
61007b31 2988}
07f07615 2989
61007b31
SH
2990void bdrv_init(void)
2991{
2992 module_call_init(MODULE_INIT_BLOCK);
2993}
29cdb251 2994
61007b31
SH
2995void bdrv_init_with_whitelist(void)
2996{
2997 use_bdrv_whitelist = 1;
2998 bdrv_init();
07f07615
PB
2999}
3000
5a8a30db 3001void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 3002{
5a8a30db
KW
3003 Error *local_err = NULL;
3004 int ret;
3005
3456a8d1
KW
3006 if (!bs->drv) {
3007 return;
3008 }
3009
7ea2d269
AK
3010 if (!(bs->open_flags & BDRV_O_INCOMING)) {
3011 return;
3012 }
3013 bs->open_flags &= ~BDRV_O_INCOMING;
3014
3456a8d1 3015 if (bs->drv->bdrv_invalidate_cache) {
5a8a30db 3016 bs->drv->bdrv_invalidate_cache(bs, &local_err);
3456a8d1 3017 } else if (bs->file) {
9a4f4c31 3018 bdrv_invalidate_cache(bs->file->bs, &local_err);
5a8a30db
KW
3019 }
3020 if (local_err) {
3021 error_propagate(errp, local_err);
3022 return;
0f15423c 3023 }
3456a8d1 3024
5a8a30db
KW
3025 ret = refresh_total_sectors(bs, bs->total_sectors);
3026 if (ret < 0) {
3027 error_setg_errno(errp, -ret, "Could not refresh total sector count");
3028 return;
3029 }
0f15423c
AL
3030}
3031
5a8a30db 3032void bdrv_invalidate_cache_all(Error **errp)
0f15423c
AL
3033{
3034 BlockDriverState *bs;
5a8a30db 3035 Error *local_err = NULL;
0f15423c 3036
dc364f4c 3037 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
3038 AioContext *aio_context = bdrv_get_aio_context(bs);
3039
3040 aio_context_acquire(aio_context);
5a8a30db 3041 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 3042 aio_context_release(aio_context);
5a8a30db
KW
3043 if (local_err) {
3044 error_propagate(errp, local_err);
3045 return;
3046 }
0f15423c
AL
3047 }
3048}
3049
19cb3738
FB
3050/**************************************************************/
3051/* removable device support */
3052
3053/**
3054 * Return TRUE if the media is present
3055 */
e031f750 3056bool bdrv_is_inserted(BlockDriverState *bs)
19cb3738
FB
3057{
3058 BlockDriver *drv = bs->drv;
28d7a789 3059 BdrvChild *child;
a1aff5bf 3060
e031f750
HR
3061 if (!drv) {
3062 return false;
3063 }
28d7a789
HR
3064 if (drv->bdrv_is_inserted) {
3065 return drv->bdrv_is_inserted(bs);
3066 }
3067 QLIST_FOREACH(child, &bs->children, next) {
3068 if (!bdrv_is_inserted(child->bs)) {
3069 return false;
3070 }
e031f750 3071 }
28d7a789 3072 return true;
19cb3738
FB
3073}
3074
3075/**
8e49ca46
MA
3076 * Return whether the media changed since the last call to this
3077 * function, or -ENOTSUP if we don't know. Most drivers don't know.
19cb3738
FB
3078 */
3079int bdrv_media_changed(BlockDriverState *bs)
3080{
3081 BlockDriver *drv = bs->drv;
19cb3738 3082
8e49ca46
MA
3083 if (drv && drv->bdrv_media_changed) {
3084 return drv->bdrv_media_changed(bs);
3085 }
3086 return -ENOTSUP;
19cb3738
FB
3087}
3088
3089/**
3090 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
3091 */
f36f3949 3092void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
3093{
3094 BlockDriver *drv = bs->drv;
bfb197e0 3095 const char *device_name;
19cb3738 3096
822e1cd1
MA
3097 if (drv && drv->bdrv_eject) {
3098 drv->bdrv_eject(bs, eject_flag);
19cb3738 3099 }
6f382ed2 3100
bfb197e0
MA
3101 device_name = bdrv_get_device_name(bs);
3102 if (device_name[0] != '\0') {
3103 qapi_event_send_device_tray_moved(device_name,
a5ee7bd4 3104 eject_flag, &error_abort);
6f382ed2 3105 }
19cb3738
FB
3106}
3107
19cb3738
FB
3108/**
3109 * Lock or unlock the media (if it is locked, the user won't be able
3110 * to eject it manually).
3111 */
025e849a 3112void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
3113{
3114 BlockDriver *drv = bs->drv;
3115
025e849a 3116 trace_bdrv_lock_medium(bs, locked);
b8c6d095 3117
025e849a
MA
3118 if (drv && drv->bdrv_lock_medium) {
3119 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
3120 }
3121}
985a03b0 3122
0db6e54a
FZ
3123BdrvDirtyBitmap *bdrv_find_dirty_bitmap(BlockDriverState *bs, const char *name)
3124{
3125 BdrvDirtyBitmap *bm;
3126
3127 assert(name);
3128 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
3129 if (bm->name && !strcmp(name, bm->name)) {
3130 return bm;
3131 }
3132 }
3133 return NULL;
3134}
3135
20dca810 3136void bdrv_dirty_bitmap_make_anon(BdrvDirtyBitmap *bitmap)
0db6e54a 3137{
9bd2b08f 3138 assert(!bdrv_dirty_bitmap_frozen(bitmap));
0db6e54a
FZ
3139 g_free(bitmap->name);
3140 bitmap->name = NULL;
3141}
3142
3143BdrvDirtyBitmap *bdrv_create_dirty_bitmap(BlockDriverState *bs,
5fba6c0e 3144 uint32_t granularity,
0db6e54a 3145 const char *name,
b8afb520 3146 Error **errp)
7cd1e32a
LS
3147{
3148 int64_t bitmap_size;
e4654d2d 3149 BdrvDirtyBitmap *bitmap;
5fba6c0e 3150 uint32_t sector_granularity;
a55eb92c 3151
50717e94
PB
3152 assert((granularity & (granularity - 1)) == 0);
3153
0db6e54a
FZ
3154 if (name && bdrv_find_dirty_bitmap(bs, name)) {
3155 error_setg(errp, "Bitmap already exists: %s", name);
3156 return NULL;
3157 }
5fba6c0e
JS
3158 sector_granularity = granularity >> BDRV_SECTOR_BITS;
3159 assert(sector_granularity);
57322b78 3160 bitmap_size = bdrv_nb_sectors(bs);
b8afb520
FZ
3161 if (bitmap_size < 0) {
3162 error_setg_errno(errp, -bitmap_size, "could not get length of device");
3163 errno = -bitmap_size;
3164 return NULL;
3165 }
5839e53b 3166 bitmap = g_new0(BdrvDirtyBitmap, 1);
5fba6c0e 3167 bitmap->bitmap = hbitmap_alloc(bitmap_size, ctz32(sector_granularity));
e74e6b78 3168 bitmap->size = bitmap_size;
0db6e54a 3169 bitmap->name = g_strdup(name);
b8e6fb75 3170 bitmap->disabled = false;
e4654d2d
FZ
3171 QLIST_INSERT_HEAD(&bs->dirty_bitmaps, bitmap, list);
3172 return bitmap;
3173}
3174
9bd2b08f
JS
3175bool bdrv_dirty_bitmap_frozen(BdrvDirtyBitmap *bitmap)
3176{
3177 return bitmap->successor;
3178}
3179
b8e6fb75
JS
3180bool bdrv_dirty_bitmap_enabled(BdrvDirtyBitmap *bitmap)
3181{
9bd2b08f
JS
3182 return !(bitmap->disabled || bitmap->successor);
3183}
3184
9abe3bdc
JS
3185DirtyBitmapStatus bdrv_dirty_bitmap_status(BdrvDirtyBitmap *bitmap)
3186{
3187 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3188 return DIRTY_BITMAP_STATUS_FROZEN;
3189 } else if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3190 return DIRTY_BITMAP_STATUS_DISABLED;
3191 } else {
3192 return DIRTY_BITMAP_STATUS_ACTIVE;
3193 }
3194}
3195
9bd2b08f
JS
3196/**
3197 * Create a successor bitmap destined to replace this bitmap after an operation.
3198 * Requires that the bitmap is not frozen and has no successor.
3199 */
3200int bdrv_dirty_bitmap_create_successor(BlockDriverState *bs,
3201 BdrvDirtyBitmap *bitmap, Error **errp)
3202{
3203 uint64_t granularity;
3204 BdrvDirtyBitmap *child;
3205
3206 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3207 error_setg(errp, "Cannot create a successor for a bitmap that is "
3208 "currently frozen");
3209 return -1;
3210 }
3211 assert(!bitmap->successor);
3212
3213 /* Create an anonymous successor */
3214 granularity = bdrv_dirty_bitmap_granularity(bitmap);
3215 child = bdrv_create_dirty_bitmap(bs, granularity, NULL, errp);
3216 if (!child) {
3217 return -1;
3218 }
3219
3220 /* Successor will be on or off based on our current state. */
3221 child->disabled = bitmap->disabled;
3222
3223 /* Install the successor and freeze the parent */
3224 bitmap->successor = child;
3225 return 0;
3226}
3227
3228/**
3229 * For a bitmap with a successor, yield our name to the successor,
3230 * delete the old bitmap, and return a handle to the new bitmap.
3231 */
3232BdrvDirtyBitmap *bdrv_dirty_bitmap_abdicate(BlockDriverState *bs,
3233 BdrvDirtyBitmap *bitmap,
3234 Error **errp)
3235{
3236 char *name;
3237 BdrvDirtyBitmap *successor = bitmap->successor;
3238
3239 if (successor == NULL) {
3240 error_setg(errp, "Cannot relinquish control if "
3241 "there's no successor present");
3242 return NULL;
3243 }
3244
3245 name = bitmap->name;
3246 bitmap->name = NULL;
3247 successor->name = name;
3248 bitmap->successor = NULL;
3249 bdrv_release_dirty_bitmap(bs, bitmap);
3250
3251 return successor;
3252}
3253
3254/**
3255 * In cases of failure where we can no longer safely delete the parent,
3256 * we may wish to re-join the parent and child/successor.
3257 * The merged parent will be un-frozen, but not explicitly re-enabled.
3258 */
3259BdrvDirtyBitmap *bdrv_reclaim_dirty_bitmap(BlockDriverState *bs,
3260 BdrvDirtyBitmap *parent,
3261 Error **errp)
3262{
3263 BdrvDirtyBitmap *successor = parent->successor;
3264
3265 if (!successor) {
3266 error_setg(errp, "Cannot reclaim a successor when none is present");
3267 return NULL;
3268 }
3269
3270 if (!hbitmap_merge(parent->bitmap, successor->bitmap)) {
3271 error_setg(errp, "Merging of parent and successor bitmap failed");
3272 return NULL;
3273 }
3274 bdrv_release_dirty_bitmap(bs, successor);
3275 parent->successor = NULL;
3276
3277 return parent;
b8e6fb75
JS
3278}
3279
ce1ffea8
JS
3280/**
3281 * Truncates _all_ bitmaps attached to a BDS.
3282 */
3283static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs)
3284{
3285 BdrvDirtyBitmap *bitmap;
3286 uint64_t size = bdrv_nb_sectors(bs);
3287
3288 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
06207b0f 3289 assert(!bdrv_dirty_bitmap_frozen(bitmap));
ce1ffea8 3290 hbitmap_truncate(bitmap->bitmap, size);
5270b6a0 3291 bitmap->size = size;
ce1ffea8
JS
3292 }
3293}
3294
e4654d2d
FZ
3295void bdrv_release_dirty_bitmap(BlockDriverState *bs, BdrvDirtyBitmap *bitmap)
3296{
3297 BdrvDirtyBitmap *bm, *next;
3298 QLIST_FOREACH_SAFE(bm, &bs->dirty_bitmaps, list, next) {
3299 if (bm == bitmap) {
9bd2b08f 3300 assert(!bdrv_dirty_bitmap_frozen(bm));
e4654d2d
FZ
3301 QLIST_REMOVE(bitmap, list);
3302 hbitmap_free(bitmap->bitmap);
0db6e54a 3303 g_free(bitmap->name);
e4654d2d
FZ
3304 g_free(bitmap);
3305 return;
a55eb92c 3306 }
7cd1e32a
LS
3307 }
3308}
3309
b8e6fb75
JS
3310void bdrv_disable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3311{
9bd2b08f 3312 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3313 bitmap->disabled = true;
3314}
3315
3316void bdrv_enable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3317{
9bd2b08f 3318 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3319 bitmap->disabled = false;
3320}
3321
21b56835
FZ
3322BlockDirtyInfoList *bdrv_query_dirty_bitmaps(BlockDriverState *bs)
3323{
3324 BdrvDirtyBitmap *bm;
3325 BlockDirtyInfoList *list = NULL;
3326 BlockDirtyInfoList **plist = &list;
3327
3328 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
5839e53b
MA
3329 BlockDirtyInfo *info = g_new0(BlockDirtyInfo, 1);
3330 BlockDirtyInfoList *entry = g_new0(BlockDirtyInfoList, 1);
20dca810 3331 info->count = bdrv_get_dirty_count(bm);
592fdd02 3332 info->granularity = bdrv_dirty_bitmap_granularity(bm);
0db6e54a
FZ
3333 info->has_name = !!bm->name;
3334 info->name = g_strdup(bm->name);
9abe3bdc 3335 info->status = bdrv_dirty_bitmap_status(bm);
21b56835
FZ
3336 entry->value = info;
3337 *plist = entry;
3338 plist = &entry->next;
3339 }
3340
3341 return list;
3342}
3343
e4654d2d 3344int bdrv_get_dirty(BlockDriverState *bs, BdrvDirtyBitmap *bitmap, int64_t sector)
7cd1e32a 3345{
e4654d2d
FZ
3346 if (bitmap) {
3347 return hbitmap_get(bitmap->bitmap, sector);
7cd1e32a
LS
3348 } else {
3349 return 0;
3350 }
3351}
3352
341ebc2f
JS
3353/**
3354 * Chooses a default granularity based on the existing cluster size,
3355 * but clamped between [4K, 64K]. Defaults to 64K in the case that there
3356 * is no cluster size information available.
3357 */
3358uint32_t bdrv_get_default_bitmap_granularity(BlockDriverState *bs)
3359{
3360 BlockDriverInfo bdi;
3361 uint32_t granularity;
3362
3363 if (bdrv_get_info(bs, &bdi) >= 0 && bdi.cluster_size > 0) {
3364 granularity = MAX(4096, bdi.cluster_size);
3365 granularity = MIN(65536, granularity);
3366 } else {
3367 granularity = 65536;
3368 }
3369
3370 return granularity;
3371}
3372
592fdd02
JS
3373uint32_t bdrv_dirty_bitmap_granularity(BdrvDirtyBitmap *bitmap)
3374{
3375 return BDRV_SECTOR_SIZE << hbitmap_granularity(bitmap->bitmap);
3376}
3377
20dca810 3378void bdrv_dirty_iter_init(BdrvDirtyBitmap *bitmap, HBitmapIter *hbi)
1755da16 3379{
e4654d2d 3380 hbitmap_iter_init(hbi, bitmap->bitmap, 0);
1755da16
PB
3381}
3382
20dca810 3383void bdrv_set_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3384 int64_t cur_sector, int nr_sectors)
3385{
b8e6fb75 3386 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3387 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3388}
3389
20dca810 3390void bdrv_reset_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3391 int64_t cur_sector, int nr_sectors)
3392{
b8e6fb75 3393 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3394 hbitmap_reset(bitmap->bitmap, cur_sector, nr_sectors);
3395}
3396
e74e6b78
JS
3397void bdrv_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3398{
3399 assert(bdrv_dirty_bitmap_enabled(bitmap));
c6a8c328 3400 hbitmap_reset_all(bitmap->bitmap);
e74e6b78
JS
3401}
3402
e0c47b6c
SH
3403void bdrv_set_dirty(BlockDriverState *bs, int64_t cur_sector,
3404 int nr_sectors)
1755da16 3405{
e4654d2d
FZ
3406 BdrvDirtyBitmap *bitmap;
3407 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
b8e6fb75
JS
3408 if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3409 continue;
3410 }
e4654d2d
FZ
3411 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3412 }
1755da16
PB
3413}
3414
d58d8453
JS
3415/**
3416 * Advance an HBitmapIter to an arbitrary offset.
3417 */
3418void bdrv_set_dirty_iter(HBitmapIter *hbi, int64_t offset)
3419{
3420 assert(hbi->hb);
3421 hbitmap_iter_init(hbi, hbi->hb, offset);
3422}
3423
20dca810 3424int64_t bdrv_get_dirty_count(BdrvDirtyBitmap *bitmap)
aaa0eb75 3425{
e4654d2d 3426 return hbitmap_count(bitmap->bitmap);
aaa0eb75 3427}
f88e1a42 3428
9fcb0251
FZ
3429/* Get a reference to bs */
3430void bdrv_ref(BlockDriverState *bs)
3431{
3432 bs->refcnt++;
3433}
3434
3435/* Release a previously grabbed reference to bs.
3436 * If after releasing, reference count is zero, the BlockDriverState is
3437 * deleted. */
3438void bdrv_unref(BlockDriverState *bs)
3439{
9a4d5ca6
JC
3440 if (!bs) {
3441 return;
3442 }
9fcb0251
FZ
3443 assert(bs->refcnt > 0);
3444 if (--bs->refcnt == 0) {
3445 bdrv_delete(bs);
3446 }
3447}
3448
fbe40ff7
FZ
3449struct BdrvOpBlocker {
3450 Error *reason;
3451 QLIST_ENTRY(BdrvOpBlocker) list;
3452};
3453
3454bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
3455{
3456 BdrvOpBlocker *blocker;
3457 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3458 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
3459 blocker = QLIST_FIRST(&bs->op_blockers[op]);
3460 if (errp) {
81e5f78a
AG
3461 error_setg(errp, "Node '%s' is busy: %s",
3462 bdrv_get_device_or_node_name(bs),
bfb197e0 3463 error_get_pretty(blocker->reason));
fbe40ff7
FZ
3464 }
3465 return true;
3466 }
3467 return false;
3468}
3469
3470void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
3471{
3472 BdrvOpBlocker *blocker;
3473 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3474
5839e53b 3475 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
3476 blocker->reason = reason;
3477 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
3478}
3479
3480void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
3481{
3482 BdrvOpBlocker *blocker, *next;
3483 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3484 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
3485 if (blocker->reason == reason) {
3486 QLIST_REMOVE(blocker, list);
3487 g_free(blocker);
3488 }
3489 }
3490}
3491
3492void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
3493{
3494 int i;
3495 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3496 bdrv_op_block(bs, i, reason);
3497 }
3498}
3499
3500void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
3501{
3502 int i;
3503 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3504 bdrv_op_unblock(bs, i, reason);
3505 }
3506}
3507
3508bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
3509{
3510 int i;
3511
3512 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3513 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
3514 return false;
3515 }
3516 }
3517 return true;
3518}
3519
d92ada22
LC
3520void bdrv_img_create(const char *filename, const char *fmt,
3521 const char *base_filename, const char *base_fmt,
f382d43a
MR
3522 char *options, uint64_t img_size, int flags,
3523 Error **errp, bool quiet)
f88e1a42 3524{
83d0521a
CL
3525 QemuOptsList *create_opts = NULL;
3526 QemuOpts *opts = NULL;
3527 const char *backing_fmt, *backing_file;
3528 int64_t size;
f88e1a42 3529 BlockDriver *drv, *proto_drv;
cc84d90f 3530 Error *local_err = NULL;
f88e1a42
JS
3531 int ret = 0;
3532
3533 /* Find driver and parse its options */
3534 drv = bdrv_find_format(fmt);
3535 if (!drv) {
71c79813 3536 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 3537 return;
f88e1a42
JS
3538 }
3539
b65a5e12 3540 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 3541 if (!proto_drv) {
d92ada22 3542 return;
f88e1a42
JS
3543 }
3544
c6149724
HR
3545 if (!drv->create_opts) {
3546 error_setg(errp, "Format driver '%s' does not support image creation",
3547 drv->format_name);
3548 return;
3549 }
3550
3551 if (!proto_drv->create_opts) {
3552 error_setg(errp, "Protocol driver '%s' does not support image creation",
3553 proto_drv->format_name);
3554 return;
3555 }
3556
c282e1fd
CL
3557 create_opts = qemu_opts_append(create_opts, drv->create_opts);
3558 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
3559
3560 /* Create parameter list with default values */
83d0521a 3561 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 3562 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
3563
3564 /* Parse -o options */
3565 if (options) {
dc523cd3
MA
3566 qemu_opts_do_parse(opts, options, NULL, &local_err);
3567 if (local_err) {
3568 error_report_err(local_err);
3569 local_err = NULL;
83d0521a 3570 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
3571 goto out;
3572 }
3573 }
3574
3575 if (base_filename) {
f43e47db 3576 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 3577 if (local_err) {
71c79813
LC
3578 error_setg(errp, "Backing file not supported for file format '%s'",
3579 fmt);
f88e1a42
JS
3580 goto out;
3581 }
3582 }
3583
3584 if (base_fmt) {
f43e47db 3585 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 3586 if (local_err) {
71c79813
LC
3587 error_setg(errp, "Backing file format not supported for file "
3588 "format '%s'", fmt);
f88e1a42
JS
3589 goto out;
3590 }
3591 }
3592
83d0521a
CL
3593 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
3594 if (backing_file) {
3595 if (!strcmp(filename, backing_file)) {
71c79813
LC
3596 error_setg(errp, "Error: Trying to create an image with the "
3597 "same filename as the backing file");
792da93a
JS
3598 goto out;
3599 }
3600 }
3601
83d0521a 3602 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42
JS
3603
3604 // The size for the image must always be specified, with one exception:
3605 // If we are using a backing file, we can obtain the size from there
83d0521a
CL
3606 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
3607 if (size == -1) {
3608 if (backing_file) {
66f6b814 3609 BlockDriverState *bs;
29168018 3610 char *full_backing = g_new0(char, PATH_MAX);
52bf1e72 3611 int64_t size;
63090dac 3612 int back_flags;
e6641719 3613 QDict *backing_options = NULL;
63090dac 3614
29168018
HR
3615 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
3616 full_backing, PATH_MAX,
3617 &local_err);
3618 if (local_err) {
3619 g_free(full_backing);
3620 goto out;
3621 }
3622
63090dac
PB
3623 /* backing files always opened read-only */
3624 back_flags =
3625 flags & ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 3626
e6641719
HR
3627 if (backing_fmt) {
3628 backing_options = qdict_new();
3629 qdict_put(backing_options, "driver",
3630 qstring_from_str(backing_fmt));
3631 }
3632
f67503e5 3633 bs = NULL;
e6641719 3634 ret = bdrv_open(&bs, full_backing, NULL, backing_options,
6ebf9aa2 3635 back_flags, &local_err);
29168018 3636 g_free(full_backing);
f88e1a42 3637 if (ret < 0) {
f88e1a42
JS
3638 goto out;
3639 }
52bf1e72
MA
3640 size = bdrv_getlength(bs);
3641 if (size < 0) {
3642 error_setg_errno(errp, -size, "Could not get size of '%s'",
3643 backing_file);
3644 bdrv_unref(bs);
3645 goto out;
3646 }
f88e1a42 3647
39101f25 3648 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
66f6b814
HR
3649
3650 bdrv_unref(bs);
f88e1a42 3651 } else {
71c79813 3652 error_setg(errp, "Image creation needs a size parameter");
f88e1a42
JS
3653 goto out;
3654 }
3655 }
3656
f382d43a 3657 if (!quiet) {
fe646693 3658 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 3659 qemu_opts_print(opts, " ");
f382d43a
MR
3660 puts("");
3661 }
83d0521a 3662
c282e1fd 3663 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 3664
cc84d90f
HR
3665 if (ret == -EFBIG) {
3666 /* This is generally a better message than whatever the driver would
3667 * deliver (especially because of the cluster_size_hint), since that
3668 * is most probably not much different from "image too large". */
3669 const char *cluster_size_hint = "";
83d0521a 3670 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 3671 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 3672 }
cc84d90f
HR
3673 error_setg(errp, "The image size is too large for file format '%s'"
3674 "%s", fmt, cluster_size_hint);
3675 error_free(local_err);
3676 local_err = NULL;
f88e1a42
JS
3677 }
3678
3679out:
83d0521a
CL
3680 qemu_opts_del(opts);
3681 qemu_opts_free(create_opts);
84d18f06 3682 if (local_err) {
cc84d90f
HR
3683 error_propagate(errp, local_err);
3684 }
f88e1a42 3685}
85d126f3
SH
3686
3687AioContext *bdrv_get_aio_context(BlockDriverState *bs)
3688{
dcd04228
SH
3689 return bs->aio_context;
3690}
3691
3692void bdrv_detach_aio_context(BlockDriverState *bs)
3693{
33384421
HR
3694 BdrvAioNotifier *baf;
3695
dcd04228
SH
3696 if (!bs->drv) {
3697 return;
3698 }
3699
33384421
HR
3700 QLIST_FOREACH(baf, &bs->aio_notifiers, list) {
3701 baf->detach_aio_context(baf->opaque);
3702 }
3703
13af91eb 3704 if (bs->io_limits_enabled) {
0e5b0a2d 3705 throttle_timers_detach_aio_context(&bs->throttle_timers);
13af91eb 3706 }
dcd04228
SH
3707 if (bs->drv->bdrv_detach_aio_context) {
3708 bs->drv->bdrv_detach_aio_context(bs);
3709 }
3710 if (bs->file) {
9a4f4c31 3711 bdrv_detach_aio_context(bs->file->bs);
dcd04228 3712 }
760e0063
KW
3713 if (bs->backing) {
3714 bdrv_detach_aio_context(bs->backing->bs);
dcd04228
SH
3715 }
3716
3717 bs->aio_context = NULL;
3718}
3719
3720void bdrv_attach_aio_context(BlockDriverState *bs,
3721 AioContext *new_context)
3722{
33384421
HR
3723 BdrvAioNotifier *ban;
3724
dcd04228
SH
3725 if (!bs->drv) {
3726 return;
3727 }
3728
3729 bs->aio_context = new_context;
3730
760e0063
KW
3731 if (bs->backing) {
3732 bdrv_attach_aio_context(bs->backing->bs, new_context);
dcd04228
SH
3733 }
3734 if (bs->file) {
9a4f4c31 3735 bdrv_attach_aio_context(bs->file->bs, new_context);
dcd04228
SH
3736 }
3737 if (bs->drv->bdrv_attach_aio_context) {
3738 bs->drv->bdrv_attach_aio_context(bs, new_context);
3739 }
13af91eb 3740 if (bs->io_limits_enabled) {
0e5b0a2d 3741 throttle_timers_attach_aio_context(&bs->throttle_timers, new_context);
13af91eb 3742 }
33384421
HR
3743
3744 QLIST_FOREACH(ban, &bs->aio_notifiers, list) {
3745 ban->attached_aio_context(new_context, ban->opaque);
3746 }
dcd04228
SH
3747}
3748
3749void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
3750{
53ec73e2 3751 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228
SH
3752
3753 bdrv_detach_aio_context(bs);
3754
3755 /* This function executes in the old AioContext so acquire the new one in
3756 * case it runs in a different thread.
3757 */
3758 aio_context_acquire(new_context);
3759 bdrv_attach_aio_context(bs, new_context);
3760 aio_context_release(new_context);
85d126f3 3761}
d616b224 3762
33384421
HR
3763void bdrv_add_aio_context_notifier(BlockDriverState *bs,
3764 void (*attached_aio_context)(AioContext *new_context, void *opaque),
3765 void (*detach_aio_context)(void *opaque), void *opaque)
3766{
3767 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
3768 *ban = (BdrvAioNotifier){
3769 .attached_aio_context = attached_aio_context,
3770 .detach_aio_context = detach_aio_context,
3771 .opaque = opaque
3772 };
3773
3774 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
3775}
3776
3777void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
3778 void (*attached_aio_context)(AioContext *,
3779 void *),
3780 void (*detach_aio_context)(void *),
3781 void *opaque)
3782{
3783 BdrvAioNotifier *ban, *ban_next;
3784
3785 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
3786 if (ban->attached_aio_context == attached_aio_context &&
3787 ban->detach_aio_context == detach_aio_context &&
3788 ban->opaque == opaque)
3789 {
3790 QLIST_REMOVE(ban, list);
3791 g_free(ban);
3792
3793 return;
3794 }
3795 }
3796
3797 abort();
3798}
3799
77485434
HR
3800int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
3801 BlockDriverAmendStatusCB *status_cb)
6f176b48 3802{
c282e1fd 3803 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
3804 return -ENOTSUP;
3805 }
77485434 3806 return bs->drv->bdrv_amend_options(bs, opts, status_cb);
6f176b48 3807}
f6186f49 3808
b5042a36
BC
3809/* This function will be called by the bdrv_recurse_is_first_non_filter method
3810 * of block filter and by bdrv_is_first_non_filter.
3811 * It is used to test if the given bs is the candidate or recurse more in the
3812 * node graph.
212a5a8f 3813 */
b5042a36 3814bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 3815 BlockDriverState *candidate)
f6186f49 3816{
b5042a36
BC
3817 /* return false if basic checks fails */
3818 if (!bs || !bs->drv) {
212a5a8f 3819 return false;
f6186f49
BC
3820 }
3821
b5042a36
BC
3822 /* the code reached a non block filter driver -> check if the bs is
3823 * the same as the candidate. It's the recursion termination condition.
3824 */
3825 if (!bs->drv->is_filter) {
3826 return bs == candidate;
212a5a8f 3827 }
b5042a36 3828 /* Down this path the driver is a block filter driver */
212a5a8f 3829
b5042a36
BC
3830 /* If the block filter recursion method is defined use it to recurse down
3831 * the node graph.
3832 */
3833 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 3834 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
3835 }
3836
b5042a36
BC
3837 /* the driver is a block filter but don't allow to recurse -> return false
3838 */
3839 return false;
f6186f49
BC
3840}
3841
212a5a8f
BC
3842/* This function checks if the candidate is the first non filter bs down it's
3843 * bs chain. Since we don't have pointers to parents it explore all bs chains
3844 * from the top. Some filters can choose not to pass down the recursion.
3845 */
3846bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 3847{
212a5a8f
BC
3848 BlockDriverState *bs;
3849
3850 /* walk down the bs forest recursively */
3851 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
3852 bool perm;
3853
b5042a36 3854 /* try to recurse in this top level bs */
e6dc8a1f 3855 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
3856
3857 /* candidate is the first non filter */
3858 if (perm) {
3859 return true;
3860 }
3861 }
3862
3863 return false;
f6186f49 3864}
09158f00 3865
e12f3784
WC
3866BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
3867 const char *node_name, Error **errp)
09158f00
BC
3868{
3869 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
3870 AioContext *aio_context;
3871
09158f00
BC
3872 if (!to_replace_bs) {
3873 error_setg(errp, "Node name '%s' not found", node_name);
3874 return NULL;
3875 }
3876
5a7e7a0b
SH
3877 aio_context = bdrv_get_aio_context(to_replace_bs);
3878 aio_context_acquire(aio_context);
3879
09158f00 3880 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
3881 to_replace_bs = NULL;
3882 goto out;
09158f00
BC
3883 }
3884
3885 /* We don't want arbitrary node of the BDS chain to be replaced only the top
3886 * most non filter in order to prevent data corruption.
3887 * Another benefit is that this tests exclude backing files which are
3888 * blocked by the backing blockers.
3889 */
e12f3784 3890 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 3891 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
3892 to_replace_bs = NULL;
3893 goto out;
09158f00
BC
3894 }
3895
5a7e7a0b
SH
3896out:
3897 aio_context_release(aio_context);
09158f00
BC
3898 return to_replace_bs;
3899}
448ad91d 3900
91af7014
HR
3901static bool append_open_options(QDict *d, BlockDriverState *bs)
3902{
3903 const QDictEntry *entry;
3904 bool found_any = false;
3905
3906 for (entry = qdict_first(bs->options); entry;
3907 entry = qdict_next(bs->options, entry))
3908 {
3909 /* Only take options for this level and exclude all non-driver-specific
3910 * options */
3911 if (!strchr(qdict_entry_key(entry), '.') &&
3912 strcmp(qdict_entry_key(entry), "node-name"))
3913 {
3914 qobject_incref(qdict_entry_value(entry));
3915 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
3916 found_any = true;
3917 }
3918 }
3919
3920 return found_any;
3921}
3922
3923/* Updates the following BDS fields:
3924 * - exact_filename: A filename which may be used for opening a block device
3925 * which (mostly) equals the given BDS (even without any
3926 * other options; so reading and writing must return the same
3927 * results, but caching etc. may be different)
3928 * - full_open_options: Options which, when given when opening a block device
3929 * (without a filename), result in a BDS (mostly)
3930 * equalling the given one
3931 * - filename: If exact_filename is set, it is copied here. Otherwise,
3932 * full_open_options is converted to a JSON object, prefixed with
3933 * "json:" (for use through the JSON pseudo protocol) and put here.
3934 */
3935void bdrv_refresh_filename(BlockDriverState *bs)
3936{
3937 BlockDriver *drv = bs->drv;
3938 QDict *opts;
3939
3940 if (!drv) {
3941 return;
3942 }
3943
3944 /* This BDS's file name will most probably depend on its file's name, so
3945 * refresh that first */
3946 if (bs->file) {
9a4f4c31 3947 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
3948 }
3949
3950 if (drv->bdrv_refresh_filename) {
3951 /* Obsolete information is of no use here, so drop the old file name
3952 * information before refreshing it */
3953 bs->exact_filename[0] = '\0';
3954 if (bs->full_open_options) {
3955 QDECREF(bs->full_open_options);
3956 bs->full_open_options = NULL;
3957 }
3958
3959 drv->bdrv_refresh_filename(bs);
3960 } else if (bs->file) {
3961 /* Try to reconstruct valid information from the underlying file */
3962 bool has_open_options;
3963
3964 bs->exact_filename[0] = '\0';
3965 if (bs->full_open_options) {
3966 QDECREF(bs->full_open_options);
3967 bs->full_open_options = NULL;
3968 }
3969
3970 opts = qdict_new();
3971 has_open_options = append_open_options(opts, bs);
3972
3973 /* If no specific options have been given for this BDS, the filename of
3974 * the underlying file should suffice for this one as well */
9a4f4c31
KW
3975 if (bs->file->bs->exact_filename[0] && !has_open_options) {
3976 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
3977 }
3978 /* Reconstructing the full options QDict is simple for most format block
3979 * drivers, as long as the full options are known for the underlying
3980 * file BDS. The full options QDict of that file BDS should somehow
3981 * contain a representation of the filename, therefore the following
3982 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 3983 if (bs->file->bs->full_open_options) {
91af7014
HR
3984 qdict_put_obj(opts, "driver",
3985 QOBJECT(qstring_from_str(drv->format_name)));
9a4f4c31
KW
3986 QINCREF(bs->file->bs->full_open_options);
3987 qdict_put_obj(opts, "file",
3988 QOBJECT(bs->file->bs->full_open_options));
91af7014
HR
3989
3990 bs->full_open_options = opts;
3991 } else {
3992 QDECREF(opts);
3993 }
3994 } else if (!bs->full_open_options && qdict_size(bs->options)) {
3995 /* There is no underlying file BDS (at least referenced by BDS.file),
3996 * so the full options QDict should be equal to the options given
3997 * specifically for this block device when it was opened (plus the
3998 * driver specification).
3999 * Because those options don't change, there is no need to update
4000 * full_open_options when it's already set. */
4001
4002 opts = qdict_new();
4003 append_open_options(opts, bs);
4004 qdict_put_obj(opts, "driver",
4005 QOBJECT(qstring_from_str(drv->format_name)));
4006
4007 if (bs->exact_filename[0]) {
4008 /* This may not work for all block protocol drivers (some may
4009 * require this filename to be parsed), but we have to find some
4010 * default solution here, so just include it. If some block driver
4011 * does not support pure options without any filename at all or
4012 * needs some special format of the options QDict, it needs to
4013 * implement the driver-specific bdrv_refresh_filename() function.
4014 */
4015 qdict_put_obj(opts, "filename",
4016 QOBJECT(qstring_from_str(bs->exact_filename)));
4017 }
4018
4019 bs->full_open_options = opts;
4020 }
4021
4022 if (bs->exact_filename[0]) {
4023 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4024 } else if (bs->full_open_options) {
4025 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4026 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4027 qstring_get_str(json));
4028 QDECREF(json);
4029 }
4030}